# This YAML file contains all RBAC objects that are necessary to run external # CSI health monitor controller. # # In production, each CSI driver deployment has to be customized: # - to avoid conflicts, use non-default namespace and different names # for non-namespaced entities like the ClusterRole # - decide whether the deployment replicates the external CSI # health monitor controller, in which case leadership election must be enabled; # this influences the RBAC setup, see below apiVersion: v1 kind: ServiceAccount metadata: name: csi-external-health-monitor-controller # replace with non-default namespace name namespace: default --- # Health monitor controller must be able to work with PVs, PVCs, Nodes and Pods kind: ClusterRole apiVersion: rbac.authorization.k8s.io/v1 metadata: name: external-health-monitor-controller-runner rules: - apiGroups: [""] resources: ["persistentvolumes"] verbs: ["get", "list", "watch"] - apiGroups: [""] resources: ["persistentvolumeclaims"] verbs: ["get", "list", "watch"] - apiGroups: [""] resources: ["nodes"] verbs: ["get", "list", "watch"] - apiGroups: [""] resources: ["pods"] verbs: ["get", "list", "watch"] - apiGroups: [""] resources: ["event"] verbs: ["get", "list", "watch", "create", "patch"] --- kind: ClusterRoleBinding apiVersion: rbac.authorization.k8s.io/v1 metadata: name: csi-external-health-monitor-controller-role subjects: - kind: ServiceAccount name: csi-external-health-monitor-controller # replace with non-default namespace name namespace: default roleRef: kind: ClusterRole name: external-health-monitor-controller-runner apiGroup: rbac.authorization.k8s.io --- # Health monitor controller must be able to work with configmaps or leases in the current namespace # if (and only if) leadership election is enabled kind: Role apiVersion: rbac.authorization.k8s.io/v1 metadata: # replace with non-default namespace name namespace: default name: external-health-monitor-controller-cfg rules: - apiGroups: ["coordination.k8s.io"] resources: ["leases"] verbs: ["get", "watch", "list", "delete", "update", "create"] --- kind: RoleBinding apiVersion: rbac.authorization.k8s.io/v1 metadata: name: csi-external-health-monitor-controller-role-cfg # replace with non-default namespace name namespace: default subjects: - kind: ServiceAccount name: csi-external-health-monitor-controller # replace with non-default namespace name namespace: default roleRef: kind: Role name: external-health-monitor-controller-cfg apiGroup: rbac.authorization.k8s.io