Skip to content
Toggle navigation
P
Projects
G
Groups
S
Snippets
Help
EKS tools
/
components
This project
Loading...
Sign in
Toggle navigation
Go to a project
Project
Repository
Issues
0
Merge Requests
0
Pipelines
Wiki
Snippets
Settings
Activity
Graph
Charts
Create a new issue
Jobs
Commits
Issue Boards
Files
Commits
Branches
Tags
Contributors
Graph
Compare
Charts
Commit 992cfe6e
authored
4 years ago
by
Diego Lima
Browse files
Options
Browse Files
Download
Email Patches
Plain Diff
Add new file
0 parents
master
Show whitespace changes
Inline
Side-by-side
Showing
1 changed file
with
152 additions
and
0 deletions
components.yaml
components.yaml
0 → 100644
View file @
992cfe6
---
apiVersion
:
rbac.authorization.k8s.io/v1
kind
:
ClusterRole
metadata
:
name
:
system:aggregated-metrics-reader
labels
:
rbac.authorization.k8s.io/aggregate-to-view
:
"
true"
rbac.authorization.k8s.io/aggregate-to-edit
:
"
true"
rbac.authorization.k8s.io/aggregate-to-admin
:
"
true"
rules
:
-
apiGroups
:
[
"
metrics.k8s.io"
]
resources
:
[
"
pods"
,
"
nodes"
]
verbs
:
[
"
get"
,
"
list"
,
"
watch"
]
---
apiVersion
:
rbac.authorization.k8s.io/v1
kind
:
ClusterRoleBinding
metadata
:
name
:
metrics-server:system:auth-delegator
roleRef
:
apiGroup
:
rbac.authorization.k8s.io
kind
:
ClusterRole
name
:
system:auth-delegator
subjects
:
-
kind
:
ServiceAccount
name
:
metrics-server
namespace
:
kube-system
---
apiVersion
:
rbac.authorization.k8s.io/v1
kind
:
RoleBinding
metadata
:
name
:
metrics-server-auth-reader
namespace
:
kube-system
roleRef
:
apiGroup
:
rbac.authorization.k8s.io
kind
:
Role
name
:
extension-apiserver-authentication-reader
subjects
:
-
kind
:
ServiceAccount
name
:
metrics-server
namespace
:
kube-system
---
apiVersion
:
apiregistration.k8s.io/v1beta1
kind
:
APIService
metadata
:
name
:
v1beta1.metrics.k8s.io
spec
:
service
:
name
:
metrics-server
namespace
:
kube-system
group
:
metrics.k8s.io
version
:
v1beta1
insecureSkipTLSVerify
:
true
groupPriorityMinimum
:
100
versionPriority
:
100
---
apiVersion
:
v1
kind
:
ServiceAccount
metadata
:
name
:
metrics-server
namespace
:
kube-system
---
apiVersion
:
apps/v1
kind
:
Deployment
metadata
:
name
:
metrics-server
namespace
:
kube-system
labels
:
k8s-app
:
metrics-server
spec
:
selector
:
matchLabels
:
k8s-app
:
metrics-server
template
:
metadata
:
name
:
metrics-server
labels
:
k8s-app
:
metrics-server
spec
:
serviceAccountName
:
metrics-server
volumes
:
# mount in tmp so we can safely use from-scratch images and/or read-only containers
-
name
:
tmp-dir
emptyDir
:
{}
containers
:
-
name
:
metrics-server
image
:
k8s.gcr.io/metrics-server-amd64:v0.3.6
imagePullPolicy
:
IfNotPresent
args
:
-
--kubelet-preferred-address-types=InternalIP
-
--cert-dir=/tmp
-
--secure-port=4443
ports
:
-
name
:
main-port
containerPort
:
4443
protocol
:
TCP
securityContext
:
readOnlyRootFilesystem
:
true
runAsNonRoot
:
true
runAsUser
:
1000
volumeMounts
:
-
name
:
tmp-dir
mountPath
:
/tmp
nodeSelector
:
kubernetes.io/os
:
linux
kubernetes.io/arch
:
"
amd64"
---
apiVersion
:
v1
kind
:
Service
metadata
:
name
:
metrics-server
namespace
:
kube-system
labels
:
kubernetes.io/name
:
"
Metrics-server"
kubernetes.io/cluster-service
:
"
true"
spec
:
selector
:
k8s-app
:
metrics-server
ports
:
-
port
:
443
protocol
:
TCP
targetPort
:
main-port
---
apiVersion
:
rbac.authorization.k8s.io/v1
kind
:
ClusterRole
metadata
:
name
:
system:metrics-server
rules
:
-
apiGroups
:
-
"
"
resources
:
-
pods
-
nodes
-
nodes/stats
-
namespaces
-
configmaps
verbs
:
-
get
-
list
-
watch
---
apiVersion
:
rbac.authorization.k8s.io/v1
kind
:
ClusterRoleBinding
metadata
:
name
:
system:metrics-server
roleRef
:
apiGroup
:
rbac.authorization.k8s.io
kind
:
ClusterRole
name
:
system:metrics-server
subjects
:
-
kind
:
ServiceAccount
name
:
metrics-server
namespace
:
kube-system
This diff is collapsed.
Click to expand it.
Write
Preview
Markdown
is supported
Attach a file
You are about to add
0
people
to the discussion. Proceed with caution.
Finish editing this message first!
Cancel
Please
register
or
sign in
to post a comment