Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Create RBAC and service account, and attach it to deployment #17

Open
retpolanne opened this issue Apr 27, 2020 · 0 comments
Open

Create RBAC and service account, and attach it to deployment #17

retpolanne opened this issue Apr 27, 2020 · 0 comments

Comments

@retpolanne
Copy link
Contributor

retpolanne commented Apr 27, 2020

In order for mitose to watch changes to configmaps, we need to create a service account and bind RBAC rules to it. It's good to add it to the documentation and maybe to the yaml we have on the repo:

apiVersion: rbac.authorization.k8s.io/v1
kind: ClusterRole
metadata:
  name: mitose
  namespace: mitose
rules:
- apiGroups: [""]
  resources: ["configmaps"]
  verbs: ["get", "list", "watch"]
- apiGroups: ["extensions"]
  resources: ["deployment"]
  verbs: ["get", "update"]
---
apiVersion: rbac.authorization.k8s.io/v1
kind: ClusterRoleBinding
metadata:
  name: mitose
  namespace: mitose
roleRef:
  apiGroup: rbac.authorization.k8s.io
  kind: ClusterRole
  name: mitose
subjects:
- kind: ServiceAccount
  name: mitose
  namespace: mitose

And also attach the service account to the deployment.

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

No branches or pull requests

1 participant