eks_infrastructure/rbac.yaml (184 lines of code) (raw):
apiVersion: rbac.authorization.k8s.io/v1
kind: Role
metadata:
name: default-role
namespace: default
rules:
- apiGroups:
- ""
resources:
- pods
- pods/portforward
- pods/log
verbs:
- get
- list
- create
- delete
- apiGroups:
- "apps"
resources:
- deployments
verbs:
- create
- delete
- get
- apiGroups:
- ""
resources:
- services
verbs:
- create
- delete
- get
---
apiVersion: rbac.authorization.k8s.io/v1
kind: RoleBinding
metadata:
name: default-role-binding
namespace: default
roleRef:
apiGroup: rbac.authorization.k8s.io
kind: Role
name: default-role
subjects:
- apiGroup: rbac.authorization.k8s.io
kind: User
name: test-role
---
apiVersion: rbac.authorization.k8s.io/v1
kind: Role
metadata:
name: pytorch-role
namespace: pytorch
rules:
- apiGroups:
- "kubeflow.org"
resources:
- pytorchjobs
verbs:
- get
- create
- delete
- apiGroups:
- ""
resources:
- pods
- pods/log
verbs:
- get
---
apiVersion: rbac.authorization.k8s.io/v1
kind: RoleBinding
metadata:
name: pytorch-role-binding
namespace: pytorch
roleRef:
apiGroup: rbac.authorization.k8s.io
kind: Role
name: pytorch-role
subjects:
- apiGroup: rbac.authorization.k8s.io
kind: User
name: test-role
---
apiVersion: rbac.authorization.k8s.io/v1
kind: Role
metadata:
name: tensorflow-role
namespace: tensorflow
rules:
- apiGroups:
- "kubeflow.org"
resources:
- mpijobs
verbs:
- get
- create
- delete
- apiGroups:
- ""
resources:
- pods
- pods/log
verbs:
- get
- list
---
apiVersion: rbac.authorization.k8s.io/v1
kind: RoleBinding
metadata:
name: tensorflow-role-binding
namespace: tensorflow
roleRef:
apiGroup: rbac.authorization.k8s.io
kind: Role
name: tensorflow-role
subjects:
- apiGroup: rbac.authorization.k8s.io
kind: User
name: test-role
---
apiVersion: rbac.authorization.k8s.io/v1
kind: Role
metadata:
name: mxnet-role
namespace: mxnet
rules:
- apiGroups:
- "kubeflow.org"
resources:
- mxjobs
- mpijobs
verbs:
- get
- create
- delete
- apiGroups:
- ""
resources:
- pods
- pods/log
verbs:
- get
- list
---
apiVersion: rbac.authorization.k8s.io/v1
kind: RoleBinding
metadata:
name: mxnet-role-binding
namespace: mxnet
roleRef:
apiGroup: rbac.authorization.k8s.io
kind: Role
name: mxnet-role
subjects:
- apiGroup: rbac.authorization.k8s.io
kind: User
name: test-role
---
apiVersion: rbac.authorization.k8s.io/v1
kind: ClusterRole
metadata:
name: eks-cluster-role
rules:
- apiGroups:
- ""
resources:
- namespaces
verbs:
- list
- create
---
apiVersion: rbac.authorization.k8s.io/v1
kind: ClusterRoleBinding
metadata:
name: eks-cluster-role-binding
subjects:
- kind: User
name: test-role
apiGroup: rbac.authorization.k8s.io
roleRef:
kind: ClusterRole
name: eks-cluster-role
apiGroup: rbac.authorization.k8s.io