kubelet-binding.yaml 565 B

12345678910111213141516171819
  1. # The GKE environments don't have kubelets with certificates that
  2. # identify the system:nodes group. They use the kubelet identity
  3. # TODO: remove this once new nodes are granted individual identities and the
  4. # NodeAuthorizer is enabled.
  5. apiVersion: rbac.authorization.k8s.io/v1
  6. kind: ClusterRoleBinding
  7. metadata:
  8. name: kubelet-cluster-admin
  9. labels:
  10. addonmanager.kubernetes.io/mode: Reconcile
  11. roleRef:
  12. apiGroup: rbac.authorization.k8s.io
  13. kind: ClusterRole
  14. name: system:node
  15. subjects:
  16. - apiGroup: rbac.authorization.k8s.io
  17. kind: User
  18. name: kubelet