Skip to content
Toggle navigation
P
Projects
G
Groups
S
Snippets
Help
EKS tools
/
components
This project
Loading...
Sign in
Toggle navigation
Go to a project
Project
Repository
Issues
0
Merge Requests
0
Pipelines
Wiki
Snippets
Settings
Activity
Graph
Charts
Create a new issue
Jobs
Commits
Issue Boards
Files
Commits
Branches
Tags
Contributors
Graph
Compare
Charts
Commit 992cfe6e
authored
Apr 27, 2020
by
Diego Lima
Browse files
Options
Browse Files
Download
Email Patches
Plain Diff
Add new file
0 parents
Hide whitespace changes
Inline
Side-by-side
Showing
1 changed file
with
152 additions
and
0 deletions
components.yaml
components.yaml
0 → 100644
View file @
992cfe6
---
apiVersion
:
rbac.authorization.k8s.io/v1
kind
:
ClusterRole
metadata
:
name
:
system:aggregated-metrics-reader
labels
:
rbac.authorization.k8s.io/aggregate-to-view
:
"
true"
rbac.authorization.k8s.io/aggregate-to-edit
:
"
true"
rbac.authorization.k8s.io/aggregate-to-admin
:
"
true"
rules
:
-
apiGroups
:
[
"
metrics.k8s.io"
]
resources
:
[
"
pods"
,
"
nodes"
]
verbs
:
[
"
get"
,
"
list"
,
"
watch"
]
---
apiVersion
:
rbac.authorization.k8s.io/v1
kind
:
ClusterRoleBinding
metadata
:
name
:
metrics-server:system:auth-delegator
roleRef
:
apiGroup
:
rbac.authorization.k8s.io
kind
:
ClusterRole
name
:
system:auth-delegator
subjects
:
-
kind
:
ServiceAccount
name
:
metrics-server
namespace
:
kube-system
---
apiVersion
:
rbac.authorization.k8s.io/v1
kind
:
RoleBinding
metadata
:
name
:
metrics-server-auth-reader
namespace
:
kube-system
roleRef
:
apiGroup
:
rbac.authorization.k8s.io
kind
:
Role
name
:
extension-apiserver-authentication-reader
subjects
:
-
kind
:
ServiceAccount
name
:
metrics-server
namespace
:
kube-system
---
apiVersion
:
apiregistration.k8s.io/v1beta1
kind
:
APIService
metadata
:
name
:
v1beta1.metrics.k8s.io
spec
:
service
:
name
:
metrics-server
namespace
:
kube-system
group
:
metrics.k8s.io
version
:
v1beta1
insecureSkipTLSVerify
:
true
groupPriorityMinimum
:
100
versionPriority
:
100
---
apiVersion
:
v1
kind
:
ServiceAccount
metadata
:
name
:
metrics-server
namespace
:
kube-system
---
apiVersion
:
apps/v1
kind
:
Deployment
metadata
:
name
:
metrics-server
namespace
:
kube-system
labels
:
k8s-app
:
metrics-server
spec
:
selector
:
matchLabels
:
k8s-app
:
metrics-server
template
:
metadata
:
name
:
metrics-server
labels
:
k8s-app
:
metrics-server
spec
:
serviceAccountName
:
metrics-server
volumes
:
# mount in tmp so we can safely use from-scratch images and/or read-only containers
-
name
:
tmp-dir
emptyDir
:
{}
containers
:
-
name
:
metrics-server
image
:
k8s.gcr.io/metrics-server-amd64:v0.3.6
imagePullPolicy
:
IfNotPresent
args
:
-
--kubelet-preferred-address-types=InternalIP
-
--cert-dir=/tmp
-
--secure-port=4443
ports
:
-
name
:
main-port
containerPort
:
4443
protocol
:
TCP
securityContext
:
readOnlyRootFilesystem
:
true
runAsNonRoot
:
true
runAsUser
:
1000
volumeMounts
:
-
name
:
tmp-dir
mountPath
:
/tmp
nodeSelector
:
kubernetes.io/os
:
linux
kubernetes.io/arch
:
"
amd64"
---
apiVersion
:
v1
kind
:
Service
metadata
:
name
:
metrics-server
namespace
:
kube-system
labels
:
kubernetes.io/name
:
"
Metrics-server"
kubernetes.io/cluster-service
:
"
true"
spec
:
selector
:
k8s-app
:
metrics-server
ports
:
-
port
:
443
protocol
:
TCP
targetPort
:
main-port
---
apiVersion
:
rbac.authorization.k8s.io/v1
kind
:
ClusterRole
metadata
:
name
:
system:metrics-server
rules
:
-
apiGroups
:
-
"
"
resources
:
-
pods
-
nodes
-
nodes/stats
-
namespaces
-
configmaps
verbs
:
-
get
-
list
-
watch
---
apiVersion
:
rbac.authorization.k8s.io/v1
kind
:
ClusterRoleBinding
metadata
:
name
:
system:metrics-server
roleRef
:
apiGroup
:
rbac.authorization.k8s.io
kind
:
ClusterRole
name
:
system:metrics-server
subjects
:
-
kind
:
ServiceAccount
name
:
metrics-server
namespace
:
kube-system
Write
Preview
Markdown
is supported
Attach a file
You are about to add
0
people
to the discussion. Proceed with caution.
Finish editing this message first!
Cancel
Please
register
or
sign in
to post a comment