manifests/noderesourcetopology/cluster-role.yaml (78 lines of code) (raw):
apiVersion: v1
kind: ServiceAccount
metadata:
name: topo-aware-scheduler
namespace: kube-system
---
apiVersion: rbac.authorization.k8s.io/v1
kind: ClusterRole
metadata:
name: noderesourcetoplogy-handler
rules:
- apiGroups: ["topology.node.k8s.io"]
resources: ["noderesourcetopologies"]
verbs: ["get", "list", "watch"]
- apiGroups: [""]
resources: ["nodes"]
verbs: ["get", "list", "patch"]
- apiGroups: [""]
resources: ["pods"]
verbs: ["get","list","watch","update"]
- apiGroups: ["rbac.authorization.k8s.io"]
resources: ["*"]
verbs: ["*"]
---
apiVersion: rbac.authorization.k8s.io/v1
kind: ClusterRoleBinding
metadata:
name: topo-aware-scheduler-as-kube-scheduler
subjects:
- kind: ServiceAccount
name: topo-aware-scheduler
namespace: kube-system
roleRef:
kind: ClusterRole
name: noderesourcetoplogy-handler
apiGroup: rbac.authorization.k8s.io
---
apiVersion: rbac.authorization.k8s.io/v1
kind: ClusterRoleBinding
metadata:
name: my-scheduler-as-volume-scheduler
subjects:
- kind: ServiceAccount
name: my-scheduler
namespace: kube-system
roleRef:
kind: ClusterRole
name: system:volume-scheduler
apiGroup: rbac.authorization.k8s.io
---
apiVersion: rbac.authorization.k8s.io/v1
kind: RoleBinding
metadata:
name: topo-aware-scheduler-as-kube-scheduler
namespace: kube-system
subjects:
- kind: ServiceAccount
name: topo-aware-scheduler
namespace: kube-system
roleRef:
kind: Role
name: extension-apiserver-authentication-reader
apiGroup: rbac.authorization.k8s.io
---
apiVersion: rbac.authorization.k8s.io/v1
kind: ClusterRoleBinding
metadata:
name: noderesourcetoplogy
namespace: kube-system
subjects:
- kind: User
name: system:kube-scheduler
namespace: kube-system
apiGroup: rbac.authorization.k8s.io
roleRef:
kind: ClusterRole
name: noderesourcetoplogy-handler
apiGroup: rbac.authorization.k8s.io