k8s.io/kubernetes@v1.31.0-alpha.0.0.20240520171757-56147500dadc/cluster/addons/rbac/legacy-kubelet-user/kubelet-binding.yaml (about) 1 # The GKE environments don't have kubelets with certificates that 2 # identify the system:nodes group. They use the kubelet identity 3 # TODO: remove this once new nodes are granted individual identities and the 4 # NodeAuthorizer is enabled. 5 apiVersion: rbac.authorization.k8s.io/v1 6 kind: ClusterRoleBinding 7 metadata: 8 name: kubelet-cluster-admin 9 labels: 10 addonmanager.kubernetes.io/mode: Reconcile 11 roleRef: 12 apiGroup: rbac.authorization.k8s.io 13 kind: ClusterRole 14 name: system:node 15 subjects: 16 - apiGroup: rbac.authorization.k8s.io 17 kind: User 18 name: kubelet