Update KubeVirt Windows VM
Add ClusterRoleBinding to YAML declaration Remove annotation Add EOF Patchset 2 update (remove ClusterRoleBinding) Patchset 2 update (edit Set up remote management of VMs) Patchset 2 update (add secret to other ClusterRoleBindings) Patchset 5 updates Patchset 6 updates Signed-off-by: Ron Stone <ronald.stone@windriver.com> Change-Id: I11e63f97c82f4cb3e92403e8a8423d892e3160a3
This commit is contained in:
parent
c1dbf8ac53
commit
e8cbaad48d
@ -146,6 +146,15 @@ controller-0:
|
|||||||
name: admin-user
|
name: admin-user
|
||||||
namespace: kube-system
|
namespace: kube-system
|
||||||
---
|
---
|
||||||
|
apiVersion: v1
|
||||||
|
kind: Secret
|
||||||
|
type: kubernetes.io/service-account-token
|
||||||
|
metadata:
|
||||||
|
name: admin-user-sa-token
|
||||||
|
namespace: kube-system
|
||||||
|
annotations:
|
||||||
|
kubernetes.io/service-account.name: admin-user
|
||||||
|
---
|
||||||
apiVersion: rbac.authorization.k8s.io/v1
|
apiVersion: rbac.authorization.k8s.io/v1
|
||||||
kind: ClusterRoleBinding
|
kind: ClusterRoleBinding
|
||||||
metadata:
|
metadata:
|
||||||
|
@ -116,7 +116,8 @@ network. Finally, RDP to the |VM| from a remote workstation.
|
|||||||
- name: myrootdisk
|
- name: myrootdisk
|
||||||
dataVolume:
|
dataVolume:
|
||||||
name: stx-lab-winserv-test-disk
|
name: stx-lab-winserv-test-disk
|
||||||
|
EOF
|
||||||
|
|
||||||
#. Apply the configuration.
|
#. Apply the configuration.
|
||||||
|
|
||||||
.. code-block::
|
.. code-block::
|
||||||
|
@ -40,6 +40,15 @@ applications with a Helm v2 chart.
|
|||||||
name: admin-user
|
name: admin-user
|
||||||
namespace: kube-system
|
namespace: kube-system
|
||||||
---
|
---
|
||||||
|
apiVersion: v1
|
||||||
|
kind: Secret
|
||||||
|
type: kubernetes.io/service-account-token
|
||||||
|
metadata:
|
||||||
|
name: admin-user-sa-token
|
||||||
|
namespace: kube-system
|
||||||
|
annotations:
|
||||||
|
kubernetes.io/service-account.name: admin-user
|
||||||
|
---
|
||||||
apiVersion: rbac.authorization.k8s.io/v1
|
apiVersion: rbac.authorization.k8s.io/v1
|
||||||
kind: ClusterRoleBinding
|
kind: ClusterRoleBinding
|
||||||
metadata:
|
metadata:
|
||||||
|
@ -34,6 +34,15 @@ an admin service account with cluster-admin role, use the following procedure:
|
|||||||
name: admin-user
|
name: admin-user
|
||||||
namespace: kube-system
|
namespace: kube-system
|
||||||
---
|
---
|
||||||
|
apiVersion: v1
|
||||||
|
kind: Secret
|
||||||
|
type: kubernetes.io/service-account-token
|
||||||
|
metadata:
|
||||||
|
name: admin-user-sa-token
|
||||||
|
namespace: kube-system
|
||||||
|
annotations:
|
||||||
|
kubernetes.io/service-account.name: admin-user
|
||||||
|
---
|
||||||
apiVersion: rbac.authorization.k8s.io/v1
|
apiVersion: rbac.authorization.k8s.io/v1
|
||||||
kind: ClusterRoleBinding
|
kind: ClusterRoleBinding
|
||||||
metadata:
|
metadata:
|
||||||
@ -69,4 +78,4 @@ an admin service account with cluster-admin role, use the following procedure:
|
|||||||
|prod| can also use user accounts defined in an external Windows Active
|
|prod| can also use user accounts defined in an external Windows Active
|
||||||
Directory to authenticate Kubernetes API, :command:`kubectl` CLI or the
|
Directory to authenticate Kubernetes API, :command:`kubectl` CLI or the
|
||||||
Kubernetes Dashboard. For more information, see :ref:`Configure OIDC
|
Kubernetes Dashboard. For more information, see :ref:`Configure OIDC
|
||||||
Auth Applications <configure-oidc-auth-applications>`.
|
Auth Applications <configure-oidc-auth-applications>`.
|
||||||
|
@ -109,6 +109,15 @@ with read/write type access to a single private namespace
|
|||||||
name: dave-user
|
name: dave-user
|
||||||
namespace: kube-system
|
namespace: kube-system
|
||||||
---
|
---
|
||||||
|
apiVersion: v1
|
||||||
|
kind: Secret
|
||||||
|
type: kubernetes.io/service-account-token
|
||||||
|
metadata:
|
||||||
|
name: dave-user-sa-token
|
||||||
|
namespace: kube-system
|
||||||
|
annotations:
|
||||||
|
kubernetes.io/service-account.name: dave-user
|
||||||
|
---
|
||||||
apiVersion: rbac.authorization.k8s.io/v1
|
apiVersion: rbac.authorization.k8s.io/v1
|
||||||
kind: RoleBinding
|
kind: RoleBinding
|
||||||
metadata:
|
metadata:
|
||||||
|
@ -100,6 +100,15 @@ CLIs and Clients for an admin user with cluster-admin clusterrole.
|
|||||||
name: ${USER}
|
name: ${USER}
|
||||||
namespace: kube-system
|
namespace: kube-system
|
||||||
---
|
---
|
||||||
|
apiVersion: v1
|
||||||
|
kind: Secret
|
||||||
|
type: kubernetes.io/service-account-token
|
||||||
|
metadata:
|
||||||
|
name: ${USER}-sa-token
|
||||||
|
namespace: kube-system
|
||||||
|
annotations:
|
||||||
|
kubernetes.io/service-account.name: ${USER}
|
||||||
|
---
|
||||||
apiVersion: rbac.authorization.k8s.io/v1
|
apiVersion: rbac.authorization.k8s.io/v1
|
||||||
kind: ClusterRoleBinding
|
kind: ClusterRoleBinding
|
||||||
metadata:
|
metadata:
|
||||||
|
@ -15,6 +15,15 @@
|
|||||||
name: kubernetes-admin
|
name: kubernetes-admin
|
||||||
namespace: kube-system
|
namespace: kube-system
|
||||||
---
|
---
|
||||||
|
apiVersion: v1
|
||||||
|
kind: Secret
|
||||||
|
type: kubernetes.io/service-account-token
|
||||||
|
metadata:
|
||||||
|
name: kubernetes-admin-sa-token
|
||||||
|
namespace: kube-system
|
||||||
|
annotations:
|
||||||
|
kubernetes.io/service-account.name: kubernetes-admin
|
||||||
|
---
|
||||||
apiVersion: rbac.authorization.k8s.io/v1
|
apiVersion: rbac.authorization.k8s.io/v1
|
||||||
kind: ClusterRoleBinding
|
kind: ClusterRoleBinding
|
||||||
metadata:
|
metadata:
|
||||||
|
Loading…
x
Reference in New Issue
Block a user