kubelet-binding.yaml 607 B

1234567891011121314151617181920
  1. # The GKE environments don't have kubelets with certificates that
  2. # identify the system:nodes group. They use the kubelet identity
  3. # TODO: remove this once new nodes are granted individual identities and the
  4. # NodeAuthorizer is enabled.
  5. apiVersion: rbac.authorization.k8s.io/v1
  6. kind: ClusterRoleBinding
  7. metadata:
  8. name: kubelet-cluster-admin
  9. labels:
  10. kubernetes.io/cluster-service: "true"
  11. addonmanager.kubernetes.io/mode: Reconcile
  12. roleRef:
  13. apiGroup: rbac.authorization.k8s.io
  14. kind: ClusterRole
  15. name: system:node
  16. subjects:
  17. - apiGroup: rbac.authorization.k8s.io
  18. kind: User
  19. name: kubelet