k8s.io/kubernetes@v1.31.0-alpha.0.0.20240520171757-56147500dadc/cluster/addons/rbac/legacy-kubelet-user/kubelet-binding.yaml (about)

     1  # The GKE environments don't have kubelets with certificates that
     2  # identify the system:nodes group.  They use the kubelet identity
     3  # TODO: remove this once new nodes are granted individual identities and the
     4  # NodeAuthorizer is enabled.
     5  apiVersion: rbac.authorization.k8s.io/v1
     6  kind: ClusterRoleBinding
     7  metadata:
     8    name: kubelet-cluster-admin
     9    labels:
    10      addonmanager.kubernetes.io/mode: Reconcile
    11  roleRef:
    12    apiGroup: rbac.authorization.k8s.io
    13    kind: ClusterRole
    14    name: system:node
    15  subjects:
    16  - apiGroup: rbac.authorization.k8s.io
    17    kind: User
    18    name: kubelet