Skip to content
Merged
Show file tree
Hide file tree
Changes from all commits
Commits
File filter

Filter by extension

Filter by extension

Conversations
Failed to load comments.
Loading
Jump to
Jump to file
Failed to load files.
Loading
Diff view
Diff view
15 changes: 15 additions & 0 deletions content/embeds/admission-service.md
Original file line number Diff line number Diff line change
@@ -0,0 +1,15 @@
```yaml
apiVersion: v1
kind: Service
metadata:
name: admission
labels:
app: redis-enterprise
spec:
ports:
- port: 443
protocol: TCP
targetPort: 8443
selector:
name: redis-enterprise-operator
```
34 changes: 34 additions & 0 deletions content/embeds/admission_webhook.md
Original file line number Diff line number Diff line change
@@ -0,0 +1,34 @@
```yaml
apiVersion: admissionregistration.k8s.io/v1
kind: ValidatingWebhookConfiguration
metadata:
labels:
app: redis-enterprise
name: redis-enterprise-admission
webhooks:
- admissionReviewVersions:
- v1beta1
clientConfig:
service:
name: admission
path: /admission
namespace: OPERATOR_NAMESPACE
caBundle: "" # Fill in with BASE64 encoded signed cert
failurePolicy: Fail
matchPolicy: Exact
name: redisenterprise.admission.redislabs
rules:
- apiGroups:
- app.redislabs.com
apiVersions:
- v1alpha1
operations:
- CREATE
- UPDATE
resources:
- redisenterprisedatabases
- redisenterpriseactiveactivedatabases
- redisenterpriseremoteclusters
sideEffects: None
timeoutSeconds: 30
```
187 changes: 187 additions & 0 deletions content/embeds/log_collector_role_all_mode.md
Original file line number Diff line number Diff line change
@@ -0,0 +1,187 @@
```yaml
# The minimal Role and ClusterRole required for running the log collector in 'all' mode.
# The roles should be bound to the user executing the log collector, in each of the namespaces to be collected.
apiVersion: rbac.authorization.k8s.io/v1
kind: Role
metadata:
name: redis-enterprise-log-collector
rules:
- apiGroups:
- ""
resources:
- pods
- pods/log
verbs:
- get
- list
- apiGroups:
- ""
resources:
- pods/exec
verbs:
- create
- apiGroups:
- ""
resources:
- events
- services
- endpoints
- configmaps
- secrets
- resourcequotas
- limitranges
- persistentvolumeclaims
- replicationcontrollers
verbs:
- get
- list
- apiGroups:
- apps
resources:
- deployments
- daemonsets
- replicasets
- statefulsets
verbs:
- get
- list
- apiGroups:
- batch
resources:
- cronjobs
- jobs
verbs:
- get
- list
- apiGroups:
- rbac.authorization.k8s.io
resources:
- roles
- rolebindings
verbs:
- get
- list
- apiGroups:
- autoscaling
resources:
- horizontalpodautoscalers
verbs:
- get
- list
- apiGroups:
- policy
resources:
- poddisruptionbudgets
verbs:
- get
- list
- apiGroups:
- app.redislabs.com
resources:
- "*"
verbs:
- get
- list
- apiGroups:
- networking.k8s.io
resources:
- ingresses
- networkpolicies
verbs:
- get
- list
- apiGroups:
- route.openshift.io
resources:
- routes
verbs:
- get
- list
- apiGroups:
- operators.coreos.com
resources:
- clusterserviceversions
- subscriptions
- installplans
- catalogsources
verbs:
- get
- list
- apiGroups:
- networking.istio.io
resources:
- gateways
- virtualservices
verbs:
- get
- list
---
apiVersion: rbac.authorization.k8s.io/v1
kind: ClusterRole
metadata:
name: redis-enterprise-log-collector
rules:
- apiGroups:
- ""
resources:
- nodes
- persistentvolumes
verbs:
- get
- list
- apiGroups:
- ""
resources:
- namespaces
verbs:
- get
- apiGroups:
- rbac.authorization.k8s.io
resources:
- clusterroles
- clusterrolebindings
verbs:
- get
- list
- apiGroups:
- apiextensions.k8s.io
resources:
- customresourcedefinitions
resourceNames:
- redisenterpriseclusters.app.redislabs.com
- redisenterprisedatabases.app.redislabs.com
- redisenterpriseremoteclusters.app.redislabs.com
- redisenterpriseactiveactivedatabases.app.redislabs.com
verbs:
- get
- list
- apiGroups:
- admissionregistration.k8s.io
resources:
- validatingwebhookconfigurations
verbs:
- get
- list
- apiGroups:
- storage.k8s.io
resources:
- volumeattachments
- storageclasses
verbs:
- get
- list
- apiGroups:
- policy
resources:
- podsecuritypolicy
verbs:
- get
- list
- apiGroups:
- certificates.k8s.io
resources:
- certificatesigningrequests
verbs:
- get
- list
```
146 changes: 146 additions & 0 deletions content/embeds/log_collector_role_restricted_mode.md
Original file line number Diff line number Diff line change
@@ -0,0 +1,146 @@
```yaml
# The minimal Role and ClusterRole required for running the log collector in 'restricted' mode.
# The roles should be bound to the user executing the log collector, in each of the namespaces to be collected.
apiVersion: rbac.authorization.k8s.io/v1
kind: Role
metadata:
name: redis-enterprise-log-collector
rules:
- apiGroups:
- ""
resources:
- pods
- pods/log
verbs:
- get
- list
- apiGroups:
- ""
resources:
- pods/exec
verbs:
- create
- apiGroups:
- ""
resources:
- events
- services
- endpoints
- configmaps
- secrets
- resourcequotas
- limitranges
- persistentvolumeclaims
- replicationcontrollers
verbs:
- get
- list
- apiGroups:
- apps
resources:
- deployments
- daemonsets
- replicasets
- statefulsets
verbs:
- get
- list
- apiGroups:
- batch
resources:
- cronjobs
- jobs
verbs:
- get
- list
- apiGroups:
- rbac.authorization.k8s.io
resources:
- roles
- rolebindings
verbs:
- get
- list
- apiGroups:
- autoscaling
resources:
- horizontalpodautoscalers
verbs:
- get
- list
- apiGroups:
- policy
resources:
- poddisruptionbudgets
verbs:
- get
- list
- apiGroups:
- app.redislabs.com
resources:
- "*"
verbs:
- get
- list
- apiGroups:
- networking.k8s.io
resources:
- ingresses
- networkpolicies
verbs:
- get
- list
- apiGroups:
- route.openshift.io
resources:
- routes
verbs:
- get
- list
---
apiVersion: rbac.authorization.k8s.io/v1
kind: ClusterRole
metadata:
name: redis-enterprise-log-collector
rules:
- apiGroups:
- ""
resources:
- persistentvolumes
verbs:
- get
- list
- apiGroups:
- ""
resources:
- namespaces
verbs:
- get
- apiGroups:
- rbac.authorization.k8s.io
resources:
- clusterroles
- clusterrolebindings
verbs:
- get
- list
- apiGroups:
- apiextensions.k8s.io
resources:
- customresourcedefinitions
resourceNames:
- redisenterpriseclusters.app.redislabs.com
- redisenterprisedatabases.app.redislabs.com
- redisenterpriseremoteclusters.app.redislabs.com
- redisenterpriseactiveactivedatabases.app.redislabs.com
verbs:
- list
- get
- apiGroups:
- admissionregistration.k8s.io
resources:
- validatingwebhookconfigurations
verbs:
- list
- get
```
12 changes: 12 additions & 0 deletions content/embeds/multi-ns_operator_cluster_role.md
Original file line number Diff line number Diff line change
@@ -0,0 +1,12 @@
```yaml
apiVersion: rbac.authorization.k8s.io/v1
kind: ClusterRole
metadata:
name: redis-enterprise-operator-consumer-ns
labels:
app: redis-enterprise
rules:
- apiGroups: [""]
resources: ["namespaces"]
verbs: ["list", "watch"]
```
Loading
Loading