mirror of
https://github.com/optim-enterprises-bv/kubernetes.git
synced 2025-10-29 17:32:47 +00:00
SELinuxMount stays off by default, because it changes the default kubelet behavior. SELinuxChangePolicy is on by default and notifies users on Pods that could get broken by SELinuxMount feature gate.
600 lines
18 KiB
YAML
600 lines
18 KiB
YAML
apiVersion: v1
|
|
items:
|
|
- apiVersion: rbac.authorization.k8s.io/v1
|
|
kind: ClusterRoleBinding
|
|
metadata:
|
|
annotations:
|
|
rbac.authorization.kubernetes.io/autoupdate: "true"
|
|
creationTimestamp: null
|
|
labels:
|
|
kubernetes.io/bootstrapping: rbac-defaults
|
|
name: system:controller:attachdetach-controller
|
|
roleRef:
|
|
apiGroup: rbac.authorization.k8s.io
|
|
kind: ClusterRole
|
|
name: system:controller:attachdetach-controller
|
|
subjects:
|
|
- kind: ServiceAccount
|
|
name: attachdetach-controller
|
|
namespace: kube-system
|
|
- apiVersion: rbac.authorization.k8s.io/v1
|
|
kind: ClusterRoleBinding
|
|
metadata:
|
|
annotations:
|
|
rbac.authorization.kubernetes.io/autoupdate: "true"
|
|
creationTimestamp: null
|
|
labels:
|
|
kubernetes.io/bootstrapping: rbac-defaults
|
|
name: system:controller:certificate-controller
|
|
roleRef:
|
|
apiGroup: rbac.authorization.k8s.io
|
|
kind: ClusterRole
|
|
name: system:controller:certificate-controller
|
|
subjects:
|
|
- kind: ServiceAccount
|
|
name: certificate-controller
|
|
namespace: kube-system
|
|
- apiVersion: rbac.authorization.k8s.io/v1
|
|
kind: ClusterRoleBinding
|
|
metadata:
|
|
annotations:
|
|
rbac.authorization.kubernetes.io/autoupdate: "true"
|
|
creationTimestamp: null
|
|
labels:
|
|
kubernetes.io/bootstrapping: rbac-defaults
|
|
name: system:controller:clusterrole-aggregation-controller
|
|
roleRef:
|
|
apiGroup: rbac.authorization.k8s.io
|
|
kind: ClusterRole
|
|
name: system:controller:clusterrole-aggregation-controller
|
|
subjects:
|
|
- kind: ServiceAccount
|
|
name: clusterrole-aggregation-controller
|
|
namespace: kube-system
|
|
- apiVersion: rbac.authorization.k8s.io/v1
|
|
kind: ClusterRoleBinding
|
|
metadata:
|
|
annotations:
|
|
rbac.authorization.kubernetes.io/autoupdate: "true"
|
|
creationTimestamp: null
|
|
labels:
|
|
kubernetes.io/bootstrapping: rbac-defaults
|
|
name: system:controller:cronjob-controller
|
|
roleRef:
|
|
apiGroup: rbac.authorization.k8s.io
|
|
kind: ClusterRole
|
|
name: system:controller:cronjob-controller
|
|
subjects:
|
|
- kind: ServiceAccount
|
|
name: cronjob-controller
|
|
namespace: kube-system
|
|
- apiVersion: rbac.authorization.k8s.io/v1
|
|
kind: ClusterRoleBinding
|
|
metadata:
|
|
annotations:
|
|
rbac.authorization.kubernetes.io/autoupdate: "true"
|
|
creationTimestamp: null
|
|
labels:
|
|
kubernetes.io/bootstrapping: rbac-defaults
|
|
name: system:controller:daemon-set-controller
|
|
roleRef:
|
|
apiGroup: rbac.authorization.k8s.io
|
|
kind: ClusterRole
|
|
name: system:controller:daemon-set-controller
|
|
subjects:
|
|
- kind: ServiceAccount
|
|
name: daemon-set-controller
|
|
namespace: kube-system
|
|
- apiVersion: rbac.authorization.k8s.io/v1
|
|
kind: ClusterRoleBinding
|
|
metadata:
|
|
annotations:
|
|
rbac.authorization.kubernetes.io/autoupdate: "true"
|
|
creationTimestamp: null
|
|
labels:
|
|
kubernetes.io/bootstrapping: rbac-defaults
|
|
name: system:controller:deployment-controller
|
|
roleRef:
|
|
apiGroup: rbac.authorization.k8s.io
|
|
kind: ClusterRole
|
|
name: system:controller:deployment-controller
|
|
subjects:
|
|
- kind: ServiceAccount
|
|
name: deployment-controller
|
|
namespace: kube-system
|
|
- apiVersion: rbac.authorization.k8s.io/v1
|
|
kind: ClusterRoleBinding
|
|
metadata:
|
|
annotations:
|
|
rbac.authorization.kubernetes.io/autoupdate: "true"
|
|
creationTimestamp: null
|
|
labels:
|
|
kubernetes.io/bootstrapping: rbac-defaults
|
|
name: system:controller:disruption-controller
|
|
roleRef:
|
|
apiGroup: rbac.authorization.k8s.io
|
|
kind: ClusterRole
|
|
name: system:controller:disruption-controller
|
|
subjects:
|
|
- kind: ServiceAccount
|
|
name: disruption-controller
|
|
namespace: kube-system
|
|
- apiVersion: rbac.authorization.k8s.io/v1
|
|
kind: ClusterRoleBinding
|
|
metadata:
|
|
annotations:
|
|
rbac.authorization.kubernetes.io/autoupdate: "true"
|
|
creationTimestamp: null
|
|
labels:
|
|
kubernetes.io/bootstrapping: rbac-defaults
|
|
name: system:controller:endpoint-controller
|
|
roleRef:
|
|
apiGroup: rbac.authorization.k8s.io
|
|
kind: ClusterRole
|
|
name: system:controller:endpoint-controller
|
|
subjects:
|
|
- kind: ServiceAccount
|
|
name: endpoint-controller
|
|
namespace: kube-system
|
|
- apiVersion: rbac.authorization.k8s.io/v1
|
|
kind: ClusterRoleBinding
|
|
metadata:
|
|
annotations:
|
|
rbac.authorization.kubernetes.io/autoupdate: "true"
|
|
creationTimestamp: null
|
|
labels:
|
|
kubernetes.io/bootstrapping: rbac-defaults
|
|
name: system:controller:endpointslice-controller
|
|
roleRef:
|
|
apiGroup: rbac.authorization.k8s.io
|
|
kind: ClusterRole
|
|
name: system:controller:endpointslice-controller
|
|
subjects:
|
|
- kind: ServiceAccount
|
|
name: endpointslice-controller
|
|
namespace: kube-system
|
|
- apiVersion: rbac.authorization.k8s.io/v1
|
|
kind: ClusterRoleBinding
|
|
metadata:
|
|
annotations:
|
|
rbac.authorization.kubernetes.io/autoupdate: "true"
|
|
creationTimestamp: null
|
|
labels:
|
|
kubernetes.io/bootstrapping: rbac-defaults
|
|
name: system:controller:endpointslicemirroring-controller
|
|
roleRef:
|
|
apiGroup: rbac.authorization.k8s.io
|
|
kind: ClusterRole
|
|
name: system:controller:endpointslicemirroring-controller
|
|
subjects:
|
|
- kind: ServiceAccount
|
|
name: endpointslicemirroring-controller
|
|
namespace: kube-system
|
|
- apiVersion: rbac.authorization.k8s.io/v1
|
|
kind: ClusterRoleBinding
|
|
metadata:
|
|
annotations:
|
|
rbac.authorization.kubernetes.io/autoupdate: "true"
|
|
creationTimestamp: null
|
|
labels:
|
|
kubernetes.io/bootstrapping: rbac-defaults
|
|
name: system:controller:ephemeral-volume-controller
|
|
roleRef:
|
|
apiGroup: rbac.authorization.k8s.io
|
|
kind: ClusterRole
|
|
name: system:controller:ephemeral-volume-controller
|
|
subjects:
|
|
- kind: ServiceAccount
|
|
name: ephemeral-volume-controller
|
|
namespace: kube-system
|
|
- apiVersion: rbac.authorization.k8s.io/v1
|
|
kind: ClusterRoleBinding
|
|
metadata:
|
|
annotations:
|
|
rbac.authorization.kubernetes.io/autoupdate: "true"
|
|
creationTimestamp: null
|
|
labels:
|
|
kubernetes.io/bootstrapping: rbac-defaults
|
|
name: system:controller:expand-controller
|
|
roleRef:
|
|
apiGroup: rbac.authorization.k8s.io
|
|
kind: ClusterRole
|
|
name: system:controller:expand-controller
|
|
subjects:
|
|
- kind: ServiceAccount
|
|
name: expand-controller
|
|
namespace: kube-system
|
|
- apiVersion: rbac.authorization.k8s.io/v1
|
|
kind: ClusterRoleBinding
|
|
metadata:
|
|
annotations:
|
|
rbac.authorization.kubernetes.io/autoupdate: "true"
|
|
creationTimestamp: null
|
|
labels:
|
|
kubernetes.io/bootstrapping: rbac-defaults
|
|
name: system:controller:generic-garbage-collector
|
|
roleRef:
|
|
apiGroup: rbac.authorization.k8s.io
|
|
kind: ClusterRole
|
|
name: system:controller:generic-garbage-collector
|
|
subjects:
|
|
- kind: ServiceAccount
|
|
name: generic-garbage-collector
|
|
namespace: kube-system
|
|
- apiVersion: rbac.authorization.k8s.io/v1
|
|
kind: ClusterRoleBinding
|
|
metadata:
|
|
annotations:
|
|
rbac.authorization.kubernetes.io/autoupdate: "true"
|
|
creationTimestamp: null
|
|
labels:
|
|
kubernetes.io/bootstrapping: rbac-defaults
|
|
name: system:controller:horizontal-pod-autoscaler
|
|
roleRef:
|
|
apiGroup: rbac.authorization.k8s.io
|
|
kind: ClusterRole
|
|
name: system:controller:horizontal-pod-autoscaler
|
|
subjects:
|
|
- kind: ServiceAccount
|
|
name: horizontal-pod-autoscaler
|
|
namespace: kube-system
|
|
- apiVersion: rbac.authorization.k8s.io/v1
|
|
kind: ClusterRoleBinding
|
|
metadata:
|
|
annotations:
|
|
rbac.authorization.kubernetes.io/autoupdate: "true"
|
|
creationTimestamp: null
|
|
labels:
|
|
kubernetes.io/bootstrapping: rbac-defaults
|
|
name: system:controller:job-controller
|
|
roleRef:
|
|
apiGroup: rbac.authorization.k8s.io
|
|
kind: ClusterRole
|
|
name: system:controller:job-controller
|
|
subjects:
|
|
- kind: ServiceAccount
|
|
name: job-controller
|
|
namespace: kube-system
|
|
- apiVersion: rbac.authorization.k8s.io/v1
|
|
kind: ClusterRoleBinding
|
|
metadata:
|
|
annotations:
|
|
rbac.authorization.kubernetes.io/autoupdate: "true"
|
|
creationTimestamp: null
|
|
labels:
|
|
kubernetes.io/bootstrapping: rbac-defaults
|
|
name: system:controller:legacy-service-account-token-cleaner
|
|
roleRef:
|
|
apiGroup: rbac.authorization.k8s.io
|
|
kind: ClusterRole
|
|
name: system:controller:legacy-service-account-token-cleaner
|
|
subjects:
|
|
- kind: ServiceAccount
|
|
name: legacy-service-account-token-cleaner
|
|
namespace: kube-system
|
|
- apiVersion: rbac.authorization.k8s.io/v1
|
|
kind: ClusterRoleBinding
|
|
metadata:
|
|
annotations:
|
|
rbac.authorization.kubernetes.io/autoupdate: "true"
|
|
creationTimestamp: null
|
|
labels:
|
|
kubernetes.io/bootstrapping: rbac-defaults
|
|
name: system:controller:namespace-controller
|
|
roleRef:
|
|
apiGroup: rbac.authorization.k8s.io
|
|
kind: ClusterRole
|
|
name: system:controller:namespace-controller
|
|
subjects:
|
|
- kind: ServiceAccount
|
|
name: namespace-controller
|
|
namespace: kube-system
|
|
- apiVersion: rbac.authorization.k8s.io/v1
|
|
kind: ClusterRoleBinding
|
|
metadata:
|
|
annotations:
|
|
rbac.authorization.kubernetes.io/autoupdate: "true"
|
|
creationTimestamp: null
|
|
labels:
|
|
kubernetes.io/bootstrapping: rbac-defaults
|
|
name: system:controller:node-controller
|
|
roleRef:
|
|
apiGroup: rbac.authorization.k8s.io
|
|
kind: ClusterRole
|
|
name: system:controller:node-controller
|
|
subjects:
|
|
- kind: ServiceAccount
|
|
name: node-controller
|
|
namespace: kube-system
|
|
- apiVersion: rbac.authorization.k8s.io/v1
|
|
kind: ClusterRoleBinding
|
|
metadata:
|
|
annotations:
|
|
rbac.authorization.kubernetes.io/autoupdate: "true"
|
|
creationTimestamp: null
|
|
labels:
|
|
kubernetes.io/bootstrapping: rbac-defaults
|
|
name: system:controller:persistent-volume-binder
|
|
roleRef:
|
|
apiGroup: rbac.authorization.k8s.io
|
|
kind: ClusterRole
|
|
name: system:controller:persistent-volume-binder
|
|
subjects:
|
|
- kind: ServiceAccount
|
|
name: persistent-volume-binder
|
|
namespace: kube-system
|
|
- apiVersion: rbac.authorization.k8s.io/v1
|
|
kind: ClusterRoleBinding
|
|
metadata:
|
|
annotations:
|
|
rbac.authorization.kubernetes.io/autoupdate: "true"
|
|
creationTimestamp: null
|
|
labels:
|
|
kubernetes.io/bootstrapping: rbac-defaults
|
|
name: system:controller:pod-garbage-collector
|
|
roleRef:
|
|
apiGroup: rbac.authorization.k8s.io
|
|
kind: ClusterRole
|
|
name: system:controller:pod-garbage-collector
|
|
subjects:
|
|
- kind: ServiceAccount
|
|
name: pod-garbage-collector
|
|
namespace: kube-system
|
|
- apiVersion: rbac.authorization.k8s.io/v1
|
|
kind: ClusterRoleBinding
|
|
metadata:
|
|
annotations:
|
|
rbac.authorization.kubernetes.io/autoupdate: "true"
|
|
creationTimestamp: null
|
|
labels:
|
|
kubernetes.io/bootstrapping: rbac-defaults
|
|
name: system:controller:pv-protection-controller
|
|
roleRef:
|
|
apiGroup: rbac.authorization.k8s.io
|
|
kind: ClusterRole
|
|
name: system:controller:pv-protection-controller
|
|
subjects:
|
|
- kind: ServiceAccount
|
|
name: pv-protection-controller
|
|
namespace: kube-system
|
|
- apiVersion: rbac.authorization.k8s.io/v1
|
|
kind: ClusterRoleBinding
|
|
metadata:
|
|
annotations:
|
|
rbac.authorization.kubernetes.io/autoupdate: "true"
|
|
creationTimestamp: null
|
|
labels:
|
|
kubernetes.io/bootstrapping: rbac-defaults
|
|
name: system:controller:pvc-protection-controller
|
|
roleRef:
|
|
apiGroup: rbac.authorization.k8s.io
|
|
kind: ClusterRole
|
|
name: system:controller:pvc-protection-controller
|
|
subjects:
|
|
- kind: ServiceAccount
|
|
name: pvc-protection-controller
|
|
namespace: kube-system
|
|
- apiVersion: rbac.authorization.k8s.io/v1
|
|
kind: ClusterRoleBinding
|
|
metadata:
|
|
annotations:
|
|
rbac.authorization.kubernetes.io/autoupdate: "true"
|
|
creationTimestamp: null
|
|
labels:
|
|
kubernetes.io/bootstrapping: rbac-defaults
|
|
name: system:controller:replicaset-controller
|
|
roleRef:
|
|
apiGroup: rbac.authorization.k8s.io
|
|
kind: ClusterRole
|
|
name: system:controller:replicaset-controller
|
|
subjects:
|
|
- kind: ServiceAccount
|
|
name: replicaset-controller
|
|
namespace: kube-system
|
|
- apiVersion: rbac.authorization.k8s.io/v1
|
|
kind: ClusterRoleBinding
|
|
metadata:
|
|
annotations:
|
|
rbac.authorization.kubernetes.io/autoupdate: "true"
|
|
creationTimestamp: null
|
|
labels:
|
|
kubernetes.io/bootstrapping: rbac-defaults
|
|
name: system:controller:replication-controller
|
|
roleRef:
|
|
apiGroup: rbac.authorization.k8s.io
|
|
kind: ClusterRole
|
|
name: system:controller:replication-controller
|
|
subjects:
|
|
- kind: ServiceAccount
|
|
name: replication-controller
|
|
namespace: kube-system
|
|
- apiVersion: rbac.authorization.k8s.io/v1
|
|
kind: ClusterRoleBinding
|
|
metadata:
|
|
annotations:
|
|
rbac.authorization.kubernetes.io/autoupdate: "true"
|
|
creationTimestamp: null
|
|
labels:
|
|
kubernetes.io/bootstrapping: rbac-defaults
|
|
name: system:controller:resourcequota-controller
|
|
roleRef:
|
|
apiGroup: rbac.authorization.k8s.io
|
|
kind: ClusterRole
|
|
name: system:controller:resourcequota-controller
|
|
subjects:
|
|
- kind: ServiceAccount
|
|
name: resourcequota-controller
|
|
namespace: kube-system
|
|
- apiVersion: rbac.authorization.k8s.io/v1
|
|
kind: ClusterRoleBinding
|
|
metadata:
|
|
annotations:
|
|
rbac.authorization.kubernetes.io/autoupdate: "true"
|
|
creationTimestamp: null
|
|
labels:
|
|
kubernetes.io/bootstrapping: rbac-defaults
|
|
name: system:controller:root-ca-cert-publisher
|
|
roleRef:
|
|
apiGroup: rbac.authorization.k8s.io
|
|
kind: ClusterRole
|
|
name: system:controller:root-ca-cert-publisher
|
|
subjects:
|
|
- kind: ServiceAccount
|
|
name: root-ca-cert-publisher
|
|
namespace: kube-system
|
|
- apiVersion: rbac.authorization.k8s.io/v1
|
|
kind: ClusterRoleBinding
|
|
metadata:
|
|
annotations:
|
|
rbac.authorization.kubernetes.io/autoupdate: "true"
|
|
creationTimestamp: null
|
|
labels:
|
|
kubernetes.io/bootstrapping: rbac-defaults
|
|
name: system:controller:route-controller
|
|
roleRef:
|
|
apiGroup: rbac.authorization.k8s.io
|
|
kind: ClusterRole
|
|
name: system:controller:route-controller
|
|
subjects:
|
|
- kind: ServiceAccount
|
|
name: route-controller
|
|
namespace: kube-system
|
|
- apiVersion: rbac.authorization.k8s.io/v1
|
|
kind: ClusterRoleBinding
|
|
metadata:
|
|
annotations:
|
|
rbac.authorization.kubernetes.io/autoupdate: "true"
|
|
creationTimestamp: null
|
|
labels:
|
|
kubernetes.io/bootstrapping: rbac-defaults
|
|
name: system:controller:selinux-warning-controller
|
|
roleRef:
|
|
apiGroup: rbac.authorization.k8s.io
|
|
kind: ClusterRole
|
|
name: system:controller:selinux-warning-controller
|
|
subjects:
|
|
- kind: ServiceAccount
|
|
name: selinux-warning-controller
|
|
namespace: kube-system
|
|
- apiVersion: rbac.authorization.k8s.io/v1
|
|
kind: ClusterRoleBinding
|
|
metadata:
|
|
annotations:
|
|
rbac.authorization.kubernetes.io/autoupdate: "true"
|
|
creationTimestamp: null
|
|
labels:
|
|
kubernetes.io/bootstrapping: rbac-defaults
|
|
name: system:controller:service-account-controller
|
|
roleRef:
|
|
apiGroup: rbac.authorization.k8s.io
|
|
kind: ClusterRole
|
|
name: system:controller:service-account-controller
|
|
subjects:
|
|
- kind: ServiceAccount
|
|
name: service-account-controller
|
|
namespace: kube-system
|
|
- apiVersion: rbac.authorization.k8s.io/v1
|
|
kind: ClusterRoleBinding
|
|
metadata:
|
|
annotations:
|
|
rbac.authorization.kubernetes.io/autoupdate: "true"
|
|
creationTimestamp: null
|
|
labels:
|
|
kubernetes.io/bootstrapping: rbac-defaults
|
|
name: system:controller:service-cidrs-controller
|
|
roleRef:
|
|
apiGroup: rbac.authorization.k8s.io
|
|
kind: ClusterRole
|
|
name: system:controller:service-cidrs-controller
|
|
subjects:
|
|
- kind: ServiceAccount
|
|
name: service-cidrs-controller
|
|
namespace: kube-system
|
|
- apiVersion: rbac.authorization.k8s.io/v1
|
|
kind: ClusterRoleBinding
|
|
metadata:
|
|
annotations:
|
|
rbac.authorization.kubernetes.io/autoupdate: "true"
|
|
creationTimestamp: null
|
|
labels:
|
|
kubernetes.io/bootstrapping: rbac-defaults
|
|
name: system:controller:service-controller
|
|
roleRef:
|
|
apiGroup: rbac.authorization.k8s.io
|
|
kind: ClusterRole
|
|
name: system:controller:service-controller
|
|
subjects:
|
|
- kind: ServiceAccount
|
|
name: service-controller
|
|
namespace: kube-system
|
|
- apiVersion: rbac.authorization.k8s.io/v1
|
|
kind: ClusterRoleBinding
|
|
metadata:
|
|
annotations:
|
|
rbac.authorization.kubernetes.io/autoupdate: "true"
|
|
creationTimestamp: null
|
|
labels:
|
|
kubernetes.io/bootstrapping: rbac-defaults
|
|
name: system:controller:statefulset-controller
|
|
roleRef:
|
|
apiGroup: rbac.authorization.k8s.io
|
|
kind: ClusterRole
|
|
name: system:controller:statefulset-controller
|
|
subjects:
|
|
- kind: ServiceAccount
|
|
name: statefulset-controller
|
|
namespace: kube-system
|
|
- apiVersion: rbac.authorization.k8s.io/v1
|
|
kind: ClusterRoleBinding
|
|
metadata:
|
|
annotations:
|
|
rbac.authorization.kubernetes.io/autoupdate: "true"
|
|
creationTimestamp: null
|
|
labels:
|
|
kubernetes.io/bootstrapping: rbac-defaults
|
|
name: system:controller:ttl-after-finished-controller
|
|
roleRef:
|
|
apiGroup: rbac.authorization.k8s.io
|
|
kind: ClusterRole
|
|
name: system:controller:ttl-after-finished-controller
|
|
subjects:
|
|
- kind: ServiceAccount
|
|
name: ttl-after-finished-controller
|
|
namespace: kube-system
|
|
- apiVersion: rbac.authorization.k8s.io/v1
|
|
kind: ClusterRoleBinding
|
|
metadata:
|
|
annotations:
|
|
rbac.authorization.kubernetes.io/autoupdate: "true"
|
|
creationTimestamp: null
|
|
labels:
|
|
kubernetes.io/bootstrapping: rbac-defaults
|
|
name: system:controller:ttl-controller
|
|
roleRef:
|
|
apiGroup: rbac.authorization.k8s.io
|
|
kind: ClusterRole
|
|
name: system:controller:ttl-controller
|
|
subjects:
|
|
- kind: ServiceAccount
|
|
name: ttl-controller
|
|
namespace: kube-system
|
|
- apiVersion: rbac.authorization.k8s.io/v1
|
|
kind: ClusterRoleBinding
|
|
metadata:
|
|
annotations:
|
|
rbac.authorization.kubernetes.io/autoupdate: "true"
|
|
creationTimestamp: null
|
|
labels:
|
|
kubernetes.io/bootstrapping: rbac-defaults
|
|
name: system:controller:validatingadmissionpolicy-status-controller
|
|
roleRef:
|
|
apiGroup: rbac.authorization.k8s.io
|
|
kind: ClusterRole
|
|
name: system:controller:validatingadmissionpolicy-status-controller
|
|
subjects:
|
|
- kind: ServiceAccount
|
|
name: validatingadmissionpolicy-status-controller
|
|
namespace: kube-system
|
|
kind: List
|
|
metadata: {}
|