Administrator
- Administrator
- All Products
Resource
| Description
|
---|---|
Services
| Used to communicate across Kubernetes Pods.
|
Pods
| Used to run Spark drivers and Spark executors.
|
Secrets
| Used to pass sensitive metadata to Kubernetes Pods.
|
Configmaps
| Used to pass Spark configurations to Kubernetes Pods.
|
DaemonSets
| Used to deploy the Spark shuffle service.
|
Deployments
| Used to deploy a keystore on the cluster so that Kubernetes Pods can use keys to access the Secure Agent.
|
The permissions in this code snippet applies to all namespaces.apiVersion: rbac.authorization.k8s.io/v1 kind: ClusterRole metadata: name: optimized-cluster-role rules: - apiGroups: [""] resources: ["services","pods","secrets","configmaps"] verbs: ["watch","list","get","create","update","patch","delete","deletecollection"] - apiGroups: ["apps"] resources: ["daemonsets","deployments"] verbs: ["watch","list","get","create","update","patch","delete","deletecollection"] - apiGroups: [""] resources: ["nodes"] verbs: ["watch","list","get","patch"] - apiGroups: [""] resources: ["namespaces","persistentvolumeclaims"] verbs: ["watch","list","get"]
apiVersion: rbac.authorization.k8s.io/v1 kind: Role metadata: name: rbac-informatica-np-admin namespace: informatica rules: - apiGroups: [""] resources: ["services","pods","secrets","configmaps"] verbs: ["watch","list","get","create","update","patch","delete","deletecollection"] - apiGroups: ["apps"] resources: ["daemonsets","deployments"] verbs: ["watch","list","get","create","update","patch","delete","deletecollection"]
apiVersion: rbac.authorization.k8s.io/v1 kind: ClusterRole metadata: name: rbac-informatica-global-admin rules: - apiGroups: [""] resources: ["nodes"] verbs: ["watch","list","get","patch"] - apiGroups: [""] resources: ["namespaces", "persistentvolumeclaims"] verbs: ["watch","list","get"]
The permissions in this code snippet applies to all namespaces.apiVersion: rbac.authorization.k8s.io/v1 kind: ClusterRole metadata: name: optimized-cluster-role rules: - apiGroups: [""] resources: ["services","pods","secrets","configmaps"] verbs: ["watch","list","get","create","update","patch","delete","deletecollection"] - apiGroups: [""] resources: ["nodes"] verbs: ["watch","list","get"] - apiGroups: [""] resources: ["namespaces","persistentvolumeclaims"] verbs: ["watch","list","get"]
apiVersion: rbac.authorization.k8s.io/v1 kind: Role metadata: name: rbac-informatica-np-admin namespace: informatica rules: - apiGroups: [""] resources: ["services","pods","secrets","configmaps"] verbs: ["watch","list","get","create","update","patch","delete","deletecollection"]
apiVersion: rbac.authorization.k8s.io/v1 kind: ClusterRole metadata: name: rbac-informatica-global-admin rules: - apiGroups: [""] resources: ["nodes"] verbs: ["watch","list","get"] - apiGroups: [""] resources: ["namespaces", "persistentvolumeclaims"] verbs: ["watch","list","get"]
rules: - apiGroups: ["scheduling.k8s.io"] resources: ["priority classes"] verbs: ["list","create","update","patch","delete"]
ccs.enable.app.priority=true