增加可选部署

This commit is contained in:
dxin
2025-12-22 11:12:04 +08:00
parent 62a4ced1a6
commit 9abd8bdf46
22 changed files with 3421 additions and 37 deletions

View File

@@ -0,0 +1,73 @@
# 创建 ServiceAccount放在 apex-evaluation 命名空间)
apiVersion: v1
kind: ServiceAccount
metadata:
name: apex-user
namespace: apex-evaluation # 明确 ServiceAccount 所在的命名空间(必填)
---
# 创建 ServiceAccount放在 sit 命名空间)
apiVersion: v1
kind: ServiceAccount
metadata:
name: apex-user
namespace: sit # 在 sit 命名空间也创建相同的 ServiceAccount
---
# 为 apex-evaluation 命名空间创建 Role
apiVersion: rbac.authorization.k8s.io/v1
kind: Role
metadata:
name: apex-user-role
namespace: apex-evaluation
rules:
- apiGroups: ["", "apps", "extensions", "batch", "networking.k8s.io"]
resources: ["pods", "pods/log", "pods/exec", "statefulsets", "deployments", "daemonsets", "services", "configmaps", "secrets", "events", "replicasets"]
verbs: ["get", "list", "watch", "create", "update", "patch", "delete"]
- apiGroups: ["metrics.k8s.io"]
resources: ["pods","nodes"]
verbs: ["get","list","watch"]
---
# 为 sit 命名空间创建 Role
apiVersion: rbac.authorization.k8s.io/v1
kind: Role
metadata:
name: apex-user-role
namespace: sit
rules:
- apiGroups: ["", "apps", "extensions", "batch", "networking.k8s.io"]
resources: ["pods", "pods/log", "pods/exec", "statefulsets", "deployments", "daemonsets", "services", "configmaps", "secrets", "events", "replicasets"]
verbs: ["get", "list", "watch", "create", "update", "patch", "delete"]
- apiGroups: ["metrics.k8s.io"]
resources: ["pods","nodes"]
verbs: ["get","list","watch"]
---
# 将 apex-evaluation 命名空间的 Role 绑定到 ServiceAccount
apiVersion: rbac.authorization.k8s.io/v1
kind: RoleBinding
metadata:
name: apex-user-binding
namespace: apex-evaluation
subjects:
- kind: ServiceAccount
name: apex-user
namespace: apex-evaluation
roleRef:
apiGroup: rbac.authorization.k8s.io
kind: Role
name: apex-user-role
---
# 将 sit 命名空间的 Role 绑定到 ServiceAccount
apiVersion: rbac.authorization.k8s.io/v1
kind: RoleBinding
metadata:
name: apex-user-binding
namespace: sit
subjects:
- kind: ServiceAccount
name: apex-user
namespace: sit
roleRef:
apiGroup: rbac.authorization.k8s.io
kind: Role
name: apex-user-role