forked from mreferre/eksutils
-
Notifications
You must be signed in to change notification settings - Fork 0
/
eksutils-pod-privileged.yaml
61 lines (61 loc) · 1.36 KB
/
eksutils-pod-privileged.yaml
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
# This creates service-account Admin in the cluster
# If you need, you can check for irsa-sa.yaml for example instruction to have a IRSA service-account with AWS policies
apiVersion: v1
kind: ServiceAccount
metadata:
name: eksutils-admin
namespace: default
---
apiVersion: rbac.authorization.k8s.io/v1beta1
kind: ClusterRoleBinding
metadata:
name: eksutils-admin
roleRef:
apiGroup: rbac.authorization.k8s.io
kind: ClusterRole
name: cluster-admin
subjects:
- kind: ServiceAccount
name: eksutils-admin
namespace: default
---
apiVersion: v1
kind: Pod
metadata:
name: eksutils-pod-privileged
namespace: kube-system
labels:
app: toolbox
spec:
# tolerations:
# #Allow daemonset to run on GPU instances
# - key: "nvidia.com/gpu"
# operator: "Exists"
# effect: "NoSchedule"
# nodeSelector:
# nvidia.com/gpu: "true"
containers:
- name: eksutils
image: allamand/eksutils:latest
command:
- tail
- -f
- /dev/null
ports:
- containerPort: 8080
name: http
protocol: TCP
resources:
requests:
cpu: 300m
memory: 512Mi
securityContext:
privileged: true
enableServiceLinks: true
restartPolicy: Always
schedulerName: default-scheduler
securityContext:
fsGroup: 0
runAsUser: 0
serviceAccount: eksutils-admin
serviceAccountName: eksutils-admin