examples/kfp-spark/spark-rbac.yaml

32 lines
764 B
YAML

apiVersion: v1
kind: ServiceAccount
metadata:
name: spark-sa
namespace: kubeflow
---
apiVersion: rbac.authorization.k8s.io/v1
kind: Role
metadata:
namespace: kubeflow
name: spark-role
rules:
- apiGroups: [""]
resources: ["pods", "services", "configmaps", "pods/log"]
verbs: ["create", "get", "watch", "list", "post", "delete", "patch"]
- apiGroups: ["sparkoperator.k8s.io"]
resources: ["sparkapplications"]
verbs: ["create", "get", "watch", "list", "post", "delete", "patch"]
---
apiVersion: rbac.authorization.k8s.io/v1
kind: RoleBinding
metadata:
name: spark-role-binding
namespace: kubeflow
subjects:
- kind: ServiceAccount
name: spark-sa
namespace: kubeflow
roleRef:
kind: Role
name: spark-role
apiGroup: rbac.authorization.k8s.io