Last active
November 24, 2021 10:45
-
-
Save frezbo/0c1fab2618b1ef5713365444d1cbf75c to your computer and use it in GitHub Desktop.
gcp ccm
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
| --- | |
| apiVersion: v1 | |
| kind: ServiceAccount | |
| metadata: | |
| name: cloud-controller-manager | |
| namespace: kube-system | |
| --- | |
| apiVersion: rbac.authorization.k8s.io/v1 | |
| kind: ClusterRole | |
| metadata: | |
| name: system:cloud-provider | |
| rules: | |
| - apiGroups: | |
| - "" | |
| resources: | |
| - events | |
| verbs: | |
| - create | |
| - patch | |
| - update | |
| - apiGroups: | |
| - "" | |
| resources: | |
| - services/status | |
| verbs: | |
| - patch | |
| - update | |
| --- | |
| apiVersion: rbac.authorization.k8s.io/v1 | |
| kind: ClusterRoleBinding | |
| metadata: | |
| name: system:cloud-provider | |
| roleRef: | |
| apiGroup: rbac.authorization.k8s.io | |
| kind: ClusterRole | |
| name: system:cloud-provider | |
| subjects: | |
| - kind: ServiceAccount | |
| name: cloud-provider | |
| namespace: kube-system | |
| --- | |
| apiVersion: rbac.authorization.k8s.io/v1 | |
| kind: ClusterRole | |
| metadata: | |
| name: system:cloud-controller-manager | |
| rules: | |
| - apiGroups: | |
| - "" | |
| - events.k8s.io | |
| resources: | |
| - events | |
| verbs: | |
| - create | |
| - patch | |
| - update | |
| - apiGroups: | |
| - coordination.k8s.io | |
| resources: | |
| - leases | |
| verbs: | |
| - create | |
| - apiGroups: | |
| - coordination.k8s.io | |
| resourceNames: | |
| - cloud-controller-manager | |
| resources: | |
| - leases | |
| verbs: | |
| - get | |
| - update | |
| - apiGroups: | |
| - "" | |
| resources: | |
| - endpoints | |
| - serviceaccounts | |
| verbs: | |
| - create | |
| - get | |
| - update | |
| - apiGroups: | |
| - "" | |
| resources: | |
| - nodes | |
| verbs: | |
| - get | |
| - update | |
| - apiGroups: | |
| - "" | |
| resources: | |
| - namespaces | |
| verbs: | |
| - get | |
| - apiGroups: | |
| - "" | |
| resources: | |
| - nodes/status | |
| verbs: | |
| - patch | |
| - update | |
| - apiGroups: | |
| - "" | |
| resources: | |
| - secrets | |
| verbs: | |
| - create | |
| - delete | |
| - get | |
| - update | |
| - apiGroups: | |
| - "authentication.k8s.io" | |
| resources: | |
| - tokenreviews | |
| verbs: | |
| - create | |
| - apiGroups: | |
| - "*" | |
| resources: | |
| - "*" | |
| verbs: | |
| - list | |
| - watch | |
| - apiGroups: | |
| - "" | |
| resources: | |
| - serviceaccounts/token | |
| verbs: | |
| - create | |
| --- | |
| apiVersion: rbac.authorization.k8s.io/v1 | |
| kind: ClusterRole | |
| metadata: | |
| name: system:controller:cloud-node-controller | |
| rules: | |
| - apiGroups: | |
| - "" | |
| resources: | |
| - events | |
| verbs: | |
| - create | |
| - patch | |
| - update | |
| - apiGroups: | |
| - "" | |
| resources: | |
| - nodes | |
| verbs: | |
| - get | |
| - list | |
| - update | |
| - delete | |
| - patch | |
| - apiGroups: | |
| - "" | |
| resources: | |
| - nodes/status | |
| verbs: | |
| - get | |
| - list | |
| - update | |
| - delete | |
| - patch | |
| - apiGroups: | |
| - "" | |
| resources: | |
| - pods | |
| verbs: | |
| - list | |
| - delete | |
| - apiGroups: | |
| - "" | |
| resources: | |
| - pods/status | |
| verbs: | |
| - list | |
| - delete | |
| --- | |
| apiVersion: rbac.authorization.k8s.io/v1 | |
| kind: RoleBinding | |
| metadata: | |
| name: cloud-controller-manager:apiserver-authentication-reader | |
| namespace: kube-system | |
| roleRef: | |
| apiGroup: rbac.authorization.k8s.io | |
| kind: Role | |
| name: extension-apiserver-authentication-reader | |
| subjects: | |
| - apiGroup: "" | |
| kind: ServiceAccount | |
| name: cloud-controller-manager | |
| namespace: kube-system | |
| --- | |
| apiVersion: rbac.authorization.k8s.io/v1 | |
| kind: ClusterRoleBinding | |
| metadata: | |
| name: system:cloud-controller-manager | |
| roleRef: | |
| apiGroup: rbac.authorization.k8s.io | |
| kind: ClusterRole | |
| name: system:cloud-controller-manager | |
| subjects: | |
| - kind: ServiceAccount | |
| name: cloud-controller-manager | |
| namespace: kube-system | |
| --- | |
| apiVersion: rbac.authorization.k8s.io/v1 | |
| kind: ClusterRoleBinding | |
| metadata: | |
| name: system:controller:cloud-node-controller | |
| roleRef: | |
| apiGroup: rbac.authorization.k8s.io | |
| kind: ClusterRole | |
| name: system:controller:cloud-node-controller | |
| subjects: | |
| - kind: ServiceAccount | |
| name: cloud-node-controller | |
| namespace: kube-system | |
| --- | |
| apiVersion: apps/v1 | |
| kind: DaemonSet | |
| metadata: | |
| name: cloud-controller-manager | |
| namespace: kube-system | |
| labels: | |
| tier: control-plane | |
| k8s-app: cloud-controller-manager | |
| spec: | |
| selector: | |
| matchLabels: | |
| k8s-app: cloud-controller-manager | |
| updateStrategy: | |
| type: RollingUpdate | |
| template: | |
| metadata: | |
| labels: | |
| tier: control-plane | |
| k8s-app: cloud-controller-manager | |
| spec: | |
| nodeSelector: | |
| node-role.kubernetes.io/master: "" | |
| tolerations: | |
| - key: node.cloudprovider.kubernetes.io/uninitialized | |
| value: "true" | |
| effect: NoSchedule | |
| - key: node-role.kubernetes.io/master | |
| effect: NoSchedule | |
| securityContext: | |
| seccompProfile: | |
| type: RuntimeDefault | |
| runAsUser: 65521 | |
| runAsNonRoot: true | |
| priorityClassName: system-node-critical | |
| hostNetwork: true | |
| serviceAccountName: cloud-controller-manager | |
| containers: | |
| - name: cloud-controller-manager | |
| image: quay.io/openshift/origin-gcp-cloud-controller-manager:4.10.0 | |
| resources: | |
| requests: | |
| cpu: 50m | |
| command: | |
| - /bin/gcp-cloud-controller-manager | |
| args: | |
| - --bind-address=127.0.0.1 | |
| - --cloud-provider=gce | |
| - --use-service-account-credentials | |
| - --configure-cloud-routes=false | |
| - --allocate-node-cidrs=false | |
| - --controllers=*,-nodeipam | |
| livenessProbe: | |
| httpGet: | |
| host: 127.0.0.1 | |
| port: 10258 | |
| path: /healthz | |
| scheme: HTTPS | |
| initialDelaySeconds: 15 | |
| timeoutSeconds: 15 |
Sign up for free
to join this conversation on GitHub.
Already have an account?
Sign in to comment