Skip to content

Latest commit

 

History

History
89 lines (86 loc) · 1.55 KB

nkmo_clusterrole_yaml.adoc

File metadata and controls

89 lines (86 loc) · 1.55 KB
sidebar permalink keywords summary
sidebar
nkmo_clusterrole_yaml.html
NKMO, yaml,
An Example YAML file for NKMO Clusterrole

NKMO Clusterrole YAML Example

The kubectl component of the NetApp Kubernetes Monitoring Operator (NKMO) needs to be configured with access to the following kubernetes objects, at a minimum: agents, clusterroles, clusterrolebindings, customresourcedefinitions, deployments, namespaces, roles, rolebindings, secrets, serviceaccounts, and services. Below is an example clusterrole with these minimum privileges.

apiVersion: rbac.authorization.k8s.io/v1
kind: ClusterRole
metadata:
  name: netapp-kubernetes-monitoring-operator-installer-role
rules:
- apiGroups:
  - ""
  resources:
  - services
  - serviceaccounts
  - secrets
  - namespaces
  verbs:
  - get
  - list
  - create
  - patch
  - update
  - delete
- apiGroups:
  - rbac.authorization.k8s.io
  resources:
  - roles
  - clusterroles
  - rolebindings
  - clusterrolebindings
  verbs:
  - get
  - list
  - create
  - patch
  - update
  - delete
  - escalate
  - bind
- apiGroups:
  - apiextensions.k8s.io
  resources:
  - customresourcedefinitions
  verbs:
  - get
  - list
  - create
  - patch
  - update
  - delete
- apiGroups:
  - apps
  resources:
  - deployments
  verbs:
  - get
  - list
  - create
  - patch
  - update
  - delete
- apiGroups:
  - monitoring.netapp.com
  resources:
  - agents
  verbs:
  - get
  - list
  - create
  - patch
  - update
  - delete