Advertisement
Guest User

Untitled

a guest
Aug 18th, 2019
105
0
Never
Not a member of Pastebin yet? Sign Up, it unlocks many cool features!
text 0.80 KB | None | 0 0
  1. apiVersion: rbac.authorization.k8s.io/v1
  2. kind: ClusterRole
  3. metadata:
  4. name: privileged-role
  5. rules:
  6. - apiGroups: [""]
  7. resources: ["secrets", "pods", "pods/log", "services"]
  8. verbs: ["get", "watch", "list", "create", "delete"]
  9. - apiGroups: ["batch"]
  10. resources: ["jobs"]
  11. verbs: ["get", "watch", "list", "create", "delete"]
  12. - apiGroups: ["apps"]
  13. resources: ["deployments"]
  14. verbs: ["get", "watch", "list", "create", "delete"]
  15. - apiGroups: ["extensions"]
  16. resources: ["deployments"]
  17. verbs: ["get", "watch", "list", "create", "delete"]
  18. ---
  19. kind: ClusterRoleBinding
  20. apiVersion: rbac.authorization.k8s.io/v1
  21. metadata:
  22. name: privileged-role-binding
  23. subjects:
  24. - kind: ServiceAccount
  25. name: default
  26. namespace: kubeflow
  27. roleRef:
  28. kind: ClusterRole
  29. name: privileged-role
  30. apiGroup: rbac.authorization.k8s.io
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement