-
Notifications
You must be signed in to change notification settings - Fork 1
/
Copy pathall-in-one.yaml
370 lines (369 loc) · 8.85 KB
/
all-in-one.yaml
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
122
123
124
125
126
127
128
129
130
131
132
133
134
135
136
137
138
139
140
141
142
143
144
145
146
147
148
149
150
151
152
153
154
155
156
157
158
159
160
161
162
163
164
165
166
167
168
169
170
171
172
173
174
175
176
177
178
179
180
181
182
183
184
185
186
187
188
189
190
191
192
193
194
195
196
197
198
199
200
201
202
203
204
205
206
207
208
209
210
211
212
213
214
215
216
217
218
219
220
221
222
223
224
225
226
227
228
229
230
231
232
233
234
235
236
237
238
239
240
241
242
243
244
245
246
247
248
249
250
251
252
253
254
255
256
257
258
259
260
261
262
263
264
265
266
267
268
269
270
271
272
273
274
275
276
277
278
279
280
281
282
283
284
285
286
287
288
289
290
291
292
293
294
295
296
297
298
299
300
301
302
303
304
305
306
307
308
309
310
311
312
313
314
315
316
317
318
319
320
321
322
323
324
325
326
327
328
329
330
331
332
333
334
335
336
337
338
339
340
341
342
343
344
345
346
347
348
349
350
351
352
353
354
355
356
357
358
359
360
361
362
363
364
365
366
367
368
369
370
apiVersion: v1
kind: Namespace
metadata:
labels:
control-plane: log2rbac
name: log2rbac
---
apiVersion: apiextensions.k8s.io/v1
kind: CustomResourceDefinition
metadata:
annotations:
controller-gen.kubebuilder.io/version: v0.7.0
creationTimestamp: null
name: rbacnegotiations.kremser.dev
spec:
group: kremser.dev
names:
kind: RbacNegotiation
listKind: RbacNegotiationList
plural: rbacnegotiations
shortNames:
- rn
- rbacn
singular: rbacnegotiation
scope: Namespaced
versions:
- additionalPrinterColumns:
- description: For which kind the rbac negotiation was requested
jsonPath: .spec.for.kind
name: for kind
type: string
- description: Name of the {kind}
jsonPath: .spec.for.name
name: for name
type: string
- description: State of the negotiation
jsonPath: .status.status
name: status
type: string
- description: Name of the associated role
jsonPath: .spec.role.name
name: role
priority: 10
type: string
- description: How many RBAC entries have been added to the role
jsonPath: .status.entriesAdded
name: entries
priority: 12
type: string
- description: When the last reconciliation was done
jsonPath: .status.lastCheck
name: checked
priority: 13
type: date
name: v1
schema:
openAPIV3Schema:
description: RbacNegotiation is the Schema for the rbacnegotiations API
properties:
apiVersion:
description: 'APIVersion defines the versioned schema of this representation of an object. Servers should convert recognized schemas to the latest internal value, and may reject unrecognized values. More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#resources'
type: string
kind:
description: 'Kind is a string value representing the REST resource this object represents. Servers may infer this from the endpoint the client submits requests to. Cannot be updated. In CamelCase. More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#types-kinds'
type: string
metadata:
type: object
spec:
description: RbacNegotiationSpec defines the desired state of RbacNegotiation
properties:
for:
description: ForSpec identifies the application of which the logs will be used for RBAC negotiation
properties:
kind:
enum:
- Deployment
- deployment
- deploy
- ReplicaSet
- replicaset
- rs
- DaemonSet
- daemonset
- ds
- StatefulSet
- statefulset
- ss
- Service
- service
- svc
type: string
name:
type: string
namespace:
type: string
podSelector:
additionalProperties:
type: string
description: this can override the real pod selector that's associated for the deployment,rs,ds,ss or svc
type: object
required:
- name
type: object
role:
description: RoleSpec identifies the role that would be updated by the operator
properties:
createIfNotExist:
type: boolean
isClusterRole:
type: boolean
name:
type: string
required:
- name
type: object
serviceAccountName:
description: this can override the real service account that's specified in the deployment,rs,ds or ss
type: string
required:
- for
type: object
status:
description: RbacNegotiationStatus defines the observed state of RbacNegotiation
properties:
entriesAdded:
format: int32
minimum: 0
type: integer
lastCheck:
format: date-time
type: string
status:
default: Requested
enum:
- Requested
- InProgress
- Error
- Stable
- Synced
type: string
type: object
type: object
x-kubernetes-preserve-unknown-fields: true
served: true
storage: true
subresources:
status: {}
status:
acceptedNames:
kind: ""
plural: ""
conditions: []
storedVersions: []
---
apiVersion: v1
kind: ServiceAccount
metadata:
name: log2rbac
namespace: log2rbac
---
apiVersion: rbac.authorization.k8s.io/v1
kind: Role
metadata:
name: leader-election-role
namespace: log2rbac
rules:
- apiGroups:
- ""
resources:
- configmaps
verbs:
- get
- list
- watch
- create
- update
- patch
- delete
- apiGroups:
- coordination.k8s.io
resources:
- leases
verbs:
- get
- list
- watch
- create
- update
- patch
- delete
- apiGroups:
- ""
resources:
- events
verbs:
- create
- patch
---
apiVersion: rbac.authorization.k8s.io/v1
kind: ClusterRole
metadata:
creationTimestamp: null
name: log2rbac-role
rules:
- apiGroups:
- '*'
resources:
- '*'
verbs:
- '*'
---
apiVersion: rbac.authorization.k8s.io/v1
kind: ClusterRole
metadata:
name: metrics-reader
rules:
- nonResourceURLs:
- /metrics
verbs:
- get
---
apiVersion: rbac.authorization.k8s.io/v1
kind: ClusterRole
metadata:
name: proxy-role
rules:
- apiGroups:
- authentication.k8s.io
resources:
- tokenreviews
verbs:
- create
- apiGroups:
- authorization.k8s.io
resources:
- subjectaccessreviews
verbs:
- create
---
apiVersion: rbac.authorization.k8s.io/v1
kind: RoleBinding
metadata:
name: leader-election-rolebinding
namespace: log2rbac
roleRef:
apiGroup: rbac.authorization.k8s.io
kind: Role
name: leader-election-role
subjects:
- kind: ServiceAccount
name: log2rbac
namespace: log2rbac
---
apiVersion: rbac.authorization.k8s.io/v1
kind: ClusterRoleBinding
metadata:
name: log2rbac-rolebinding
roleRef:
apiGroup: rbac.authorization.k8s.io
kind: ClusterRole
name: log2rbac-role
subjects:
- kind: ServiceAccount
name: log2rbac
namespace: log2rbac
---
apiVersion: rbac.authorization.k8s.io/v1
kind: ClusterRoleBinding
metadata:
name: proxy-rolebinding
roleRef:
apiGroup: rbac.authorization.k8s.io
kind: ClusterRole
name: proxy-role
subjects:
- kind: ServiceAccount
name: log2rbac
namespace: log2rbac
---
apiVersion: v1
data:
controller_manager_config.yaml: |+
apiVersion: controller-runtime.sigs.k8s.io/v1alpha1
kind: ControllerManagerConfig
health:
healthProbeBindAddress: :8081
metrics:
bindAddress: 127.0.0.1:8080
webhook:
port: 9443
leaderElection:
leaderElect: true
resourceName: 924cc958.dev
kind: ConfigMap
metadata:
name: manager-config
namespace: log2rbac
---
apiVersion: v1
kind: Service
metadata:
labels:
control-plane: log2rbac
name: log2rbac-metrics-service
namespace: log2rbac
spec:
ports:
- name: https
port: 8443
protocol: TCP
targetPort: https
selector:
control-plane: log2rbac
---
apiVersion: apps/v1
kind: Deployment
metadata:
labels:
control-plane: log2rbac
name: log2rbac
namespace: log2rbac
spec:
replicas: 1
selector:
matchLabels:
control-plane: log2rbac
template:
metadata:
annotations:
kubectl.kubernetes.io/default-container: manager
labels:
control-plane: log2rbac
id: log2rbac
spec:
containers:
- args:
- --leader-elect
command:
- /log2rbac
image: jkremser/log2rbac:latest
imagePullPolicy: IfNotPresent
livenessProbe:
httpGet:
path: /healthz
port: 8081
initialDelaySeconds: 15
periodSeconds: 20
name: manager
readinessProbe:
httpGet:
path: /readyz
port: 8081
initialDelaySeconds: 5
periodSeconds: 10
resources:
limits:
cpu: 500m
memory: 128Mi
requests:
cpu: 10m
memory: 64Mi
securityContext:
allowPrivilegeEscalation: false
readOnlyRootFilesystem: true
runAsNonRoot: false
securityContext:
runAsNonRoot: false
serviceAccountName: log2rbac
terminationGracePeriodSeconds: 10