Skip to content

Commit

Permalink
k8s api docs 7.8.2-2
Browse files Browse the repository at this point in the history
  • Loading branch information
github-actions[bot] committed Jan 22, 2025
1 parent 4ce749d commit 921308c
Show file tree
Hide file tree
Showing 25 changed files with 1,606 additions and 1 deletion.
15 changes: 15 additions & 0 deletions content/embeds/admission-service.md
Original file line number Diff line number Diff line change
@@ -0,0 +1,15 @@
```yaml
apiVersion: v1
kind: Service
metadata:
name: admission
labels:
app: redis-enterprise
spec:
ports:
- port: 443
protocol: TCP
targetPort: 8443
selector:
name: redis-enterprise-operator
```
34 changes: 34 additions & 0 deletions content/embeds/admission_webhook.md
Original file line number Diff line number Diff line change
@@ -0,0 +1,34 @@
```yaml
apiVersion: admissionregistration.k8s.io/v1
kind: ValidatingWebhookConfiguration
metadata:
labels:
app: redis-enterprise
name: redis-enterprise-admission
webhooks:
- admissionReviewVersions:
- v1beta1
clientConfig:
service:
name: admission
path: /admission
namespace: OPERATOR_NAMESPACE
caBundle: "" # Fill in with BASE64 encoded signed cert
failurePolicy: Fail
matchPolicy: Exact
name: redisenterprise.admission.redislabs
rules:
- apiGroups:
- app.redislabs.com
apiVersions:
- v1alpha1
operations:
- CREATE
- UPDATE
resources:
- redisenterprisedatabases
- redisenterpriseactiveactivedatabases
- redisenterpriseremoteclusters
sideEffects: None
timeoutSeconds: 30
```
187 changes: 187 additions & 0 deletions content/embeds/log_collector_role_all_mode.md
Original file line number Diff line number Diff line change
@@ -0,0 +1,187 @@
```yaml
# The minimal Role and ClusterRole required for running the log collector in 'all' mode.
# The roles should be bound to the user executing the log collector, in each of the namespaces to be collected.
apiVersion: rbac.authorization.k8s.io/v1
kind: Role
metadata:
name: redis-enterprise-log-collector
rules:
- apiGroups:
- ""
resources:
- pods
- pods/log
verbs:
- get
- list
- apiGroups:
- ""
resources:
- pods/exec
verbs:
- create
- apiGroups:
- ""
resources:
- events
- services
- endpoints
- configmaps
- secrets
- resourcequotas
- limitranges
- persistentvolumeclaims
- replicationcontrollers
verbs:
- get
- list
- apiGroups:
- apps
resources:
- deployments
- daemonsets
- replicasets
- statefulsets
verbs:
- get
- list
- apiGroups:
- batch
resources:
- cronjobs
- jobs
verbs:
- get
- list
- apiGroups:
- rbac.authorization.k8s.io
resources:
- roles
- rolebindings
verbs:
- get
- list
- apiGroups:
- autoscaling
resources:
- horizontalpodautoscalers
verbs:
- get
- list
- apiGroups:
- policy
resources:
- poddisruptionbudgets
verbs:
- get
- list
- apiGroups:
- app.redislabs.com
resources:
- "*"
verbs:
- get
- list
- apiGroups:
- networking.k8s.io
resources:
- ingresses
- networkpolicies
verbs:
- get
- list
- apiGroups:
- route.openshift.io
resources:
- routes
verbs:
- get
- list
- apiGroups:
- operators.coreos.com
resources:
- clusterserviceversions
- subscriptions
- installplans
- catalogsources
verbs:
- get
- list
- apiGroups:
- networking.istio.io
resources:
- gateways
- virtualservices
verbs:
- get
- list
---
apiVersion: rbac.authorization.k8s.io/v1
kind: ClusterRole
metadata:
name: redis-enterprise-log-collector
rules:
- apiGroups:
- ""
resources:
- nodes
- persistentvolumes
verbs:
- get
- list
- apiGroups:
- ""
resources:
- namespaces
verbs:
- get
- apiGroups:
- rbac.authorization.k8s.io
resources:
- clusterroles
- clusterrolebindings
verbs:
- get
- list
- apiGroups:
- apiextensions.k8s.io
resources:
- customresourcedefinitions
resourceNames:
- redisenterpriseclusters.app.redislabs.com
- redisenterprisedatabases.app.redislabs.com
- redisenterpriseremoteclusters.app.redislabs.com
- redisenterpriseactiveactivedatabases.app.redislabs.com
verbs:
- get
- list
- apiGroups:
- admissionregistration.k8s.io
resources:
- validatingwebhookconfigurations
verbs:
- get
- list
- apiGroups:
- storage.k8s.io
resources:
- volumeattachments
- storageclasses
verbs:
- get
- list
- apiGroups:
- policy
resources:
- podsecuritypolicy
verbs:
- get
- list
- apiGroups:
- certificates.k8s.io
resources:
- certificatesigningrequests
verbs:
- get
- list
```
146 changes: 146 additions & 0 deletions content/embeds/log_collector_role_restricted_mode.md
Original file line number Diff line number Diff line change
@@ -0,0 +1,146 @@
```yaml
# The minimal Role and ClusterRole required for running the log collector in 'restricted' mode.
# The roles should be bound to the user executing the log collector, in each of the namespaces to be collected.
apiVersion: rbac.authorization.k8s.io/v1
kind: Role
metadata:
name: redis-enterprise-log-collector
rules:
- apiGroups:
- ""
resources:
- pods
- pods/log
verbs:
- get
- list
- apiGroups:
- ""
resources:
- pods/exec
verbs:
- create
- apiGroups:
- ""
resources:
- events
- services
- endpoints
- configmaps
- secrets
- resourcequotas
- limitranges
- persistentvolumeclaims
- replicationcontrollers
verbs:
- get
- list
- apiGroups:
- apps
resources:
- deployments
- daemonsets
- replicasets
- statefulsets
verbs:
- get
- list
- apiGroups:
- batch
resources:
- cronjobs
- jobs
verbs:
- get
- list
- apiGroups:
- rbac.authorization.k8s.io
resources:
- roles
- rolebindings
verbs:
- get
- list
- apiGroups:
- autoscaling
resources:
- horizontalpodautoscalers
verbs:
- get
- list
- apiGroups:
- policy
resources:
- poddisruptionbudgets
verbs:
- get
- list
- apiGroups:
- app.redislabs.com
resources:
- "*"
verbs:
- get
- list
- apiGroups:
- networking.k8s.io
resources:
- ingresses
- networkpolicies
verbs:
- get
- list
- apiGroups:
- route.openshift.io
resources:
- routes
verbs:
- get
- list
---
apiVersion: rbac.authorization.k8s.io/v1
kind: ClusterRole
metadata:
name: redis-enterprise-log-collector
rules:
- apiGroups:
- ""
resources:
- persistentvolumes
verbs:
- get
- list
- apiGroups:
- ""
resources:
- namespaces
verbs:
- get
- apiGroups:
- rbac.authorization.k8s.io
resources:
- clusterroles
- clusterrolebindings
verbs:
- get
- list
- apiGroups:
- apiextensions.k8s.io
resources:
- customresourcedefinitions
resourceNames:
- redisenterpriseclusters.app.redislabs.com
- redisenterprisedatabases.app.redislabs.com
- redisenterpriseremoteclusters.app.redislabs.com
- redisenterpriseactiveactivedatabases.app.redislabs.com
verbs:
- list
- get
- apiGroups:
- admissionregistration.k8s.io
resources:
- validatingwebhookconfigurations
verbs:
- list
- get
```
12 changes: 12 additions & 0 deletions content/embeds/multi-ns_operator_cluster_role.md
Original file line number Diff line number Diff line change
@@ -0,0 +1,12 @@
```yaml
apiVersion: rbac.authorization.k8s.io/v1
kind: ClusterRole
metadata:
name: redis-enterprise-operator-consumer-ns
labels:
app: redis-enterprise
rules:
- apiGroups: [""]
resources: ["namespaces"]
verbs: ["list", "watch"]
```
Loading

0 comments on commit 921308c

Please sign in to comment.