Created
July 7, 2020 10:27
-
-
Save IronCore864/c599a34c8556cbfd0c874a9cccf54947 to your computer and use it in GitHub Desktop.
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
--- | |
apiVersion: rbac.authorization.k8s.io/v1 | |
kind: Role | |
metadata: | |
name: eks:podsecuritypolicy:privileged | |
namespace: kube-system | |
labels: | |
kubernetes.io/cluster-service: "true" | |
eks.amazonaws.com/component: pod-security-policy | |
rules: | |
- apiGroups: | |
- policy | |
resourceNames: | |
- privileged | |
resources: | |
- podsecuritypolicies | |
verbs: | |
- use | |
--- | |
apiVersion: rbac.authorization.k8s.io/v1 | |
kind: RoleBinding | |
metadata: | |
name: eks:podsecuritypolicy:privileged | |
namespace: kube-system | |
annotations: | |
kubernetes.io/description: 'Allow service account aws-node to use awsnode psp in kube-system namespace.' | |
labels: | |
kubernetes.io/cluster-service: "true" | |
eks.amazonaws.com/component: pod-security-policy | |
roleRef: | |
apiGroup: rbac.authorization.k8s.io | |
kind: Role | |
name: eks:podsecuritypolicy:privileged | |
subjects: | |
- kind: ServiceAccount | |
name: aws-node | |
namespace: kube-system |
Sign up for free
to join this conversation on GitHub.
Already have an account?
Sign in to comment