add pdb policy rbac
This commit is contained in:
parent
c9183959bd
commit
8eba7e23b9
2 changed files with 22 additions and 0 deletions
|
@ -4,3 +4,4 @@ apiVersion: kustomize.config.k8s.io/v1beta1
|
|||
kind: Kustomization
|
||||
resources:
|
||||
- ./helmrelease.yaml
|
||||
- ./rbac.yaml
|
||||
|
|
21
kubernetes/apps/kube-system/descheduler/app/rbac.yaml
Normal file
21
kubernetes/apps/kube-system/descheduler/app/rbac.yaml
Normal file
|
@ -0,0 +1,21 @@
|
|||
apiVersion: rbac.authorization.k8s.io/v1
|
||||
kind: ClusterRole
|
||||
metadata:
|
||||
name: descheduler-pdb-reader
|
||||
rules:
|
||||
- apiGroups: ["policy"]
|
||||
resources: ["poddisruptionbudgets"]
|
||||
verbs: ["list", "get", "watch"]
|
||||
---
|
||||
apiVersion: rbac.authorization.k8s.io/v1
|
||||
kind: ClusterRoleBinding
|
||||
metadata:
|
||||
name: descheduler-pdb-reader
|
||||
subjects:
|
||||
- kind: ServiceAccount
|
||||
name: descheduler
|
||||
namespace: kube-system
|
||||
roleRef:
|
||||
kind: ClusterRole
|
||||
name: descheduler-pdb-reader
|
||||
apiGroup: rbac.authorization.k8s.io
|
Reference in a new issue