2 apiVersion: rbac.authorization.k8s.io/v1beta1
4 name: cmk-third-party-resource-controller
6 - apiGroups: ["cmk.intel.com"]
9 - apiGroups: ["extensions"]
10 resources: ["thirdpartyresources", "thirdpartyresources.extensions"]
14 apiVersion: rbac.authorization.k8s.io/v1beta1
16 name: cmk-custom-resource-definition-controller
18 - apiGroups: ["intel.com"]
21 - apiGroups: ["apiextensions.k8s.io"]
22 resources: ["customresourcedefinitions", "customresourcedefinitions.extensions"]
26 apiVersion: rbac.authorization.k8s.io/v1beta1
28 name: cmk-daemonset-controller
30 - apiGroups: ["extensions", "apps"]
31 resources: ["daemonsets", "daemonsets.extensions", "daemonsets.apps"]
35 apiVersion: rbac.authorization.k8s.io/v1beta1
37 name: cmk-version-controller
39 - nonResourceURLs: ["*"]
44 apiVersion: rbac.authorization.k8s.io/v1beta1
46 name: cmk-webhook-installer
48 - apiGroups: ["", "apps", "extensions", "admissionregistration.k8s.io"]
49 resources: ["secrets", "configmaps", "deployments", "services", "mutatingwebhookconfigurations"]
53 apiVersion: rbac.authorization.k8s.io/v1beta1
61 apiVersion: rbac.authorization.k8s.io/v1beta1
62 kind: ClusterRoleBinding
64 name: cmk-role-binding-daemonset
66 apiGroup: rbac.authorization.k8s.io
68 name: cmk-daemonset-controller
70 - kind: ServiceAccount
71 name: cmk-serviceaccount
72 namespace: cmk-namespace
74 apiVersion: rbac.authorization.k8s.io/v1beta1
75 kind: ClusterRoleBinding
77 name: cmk-role-binding-node
79 apiGroup: rbac.authorization.k8s.io
83 - kind: ServiceAccount
84 name: cmk-serviceaccount
85 namespace: cmk-namespace
87 apiVersion: rbac.authorization.k8s.io/v1beta1
88 kind: ClusterRoleBinding
90 name: cmk-role-binding-tpr
92 apiGroup: rbac.authorization.k8s.io
94 name: cmk-third-party-resource-controller
96 - kind: ServiceAccount
97 name: cmk-serviceaccount
98 namespace: cmk-namespace
100 apiVersion: rbac.authorization.k8s.io/v1beta1
101 kind: ClusterRoleBinding
103 name: cmk-role-binding-crd
105 apiGroup: rbac.authorization.k8s.io
107 name: cmk-custom-resource-definition-controller
109 - kind: ServiceAccount
110 name: cmk-serviceaccount
111 namespace: cmk-namespace
113 apiVersion: rbac.authorization.k8s.io/v1beta1
114 kind: ClusterRoleBinding
116 name: cmk-role-binding-version
118 apiGroup: rbac.authorization.k8s.io
120 name: cmk-version-controller
122 - kind: ServiceAccount
123 name: cmk-serviceaccount
124 namespace: cmk-namespace
126 apiVersion: rbac.authorization.k8s.io/v1beta1
127 kind: ClusterRoleBinding
129 name: cmk-role-binding-webhook-installer
131 apiGroup: rbac.authorization.k8s.io
133 name: cmk-webhook-installer
135 - kind: ServiceAccount
136 name: cmk-serviceaccount
137 namespace: cmk-namespace
139 apiVersion: rbac.authorization.k8s.io/v1beta1
140 kind: ClusterRoleBinding
142 name: cmk-role-binding-node-lister
144 apiGroup: rbac.authorization.k8s.io
146 name: cmk-node-lister
148 - kind: ServiceAccount
149 name: cmk-serviceaccount
150 namespace: cmk-namespace