Update KubeVirt Windows VM

Add ClusterRoleBinding to YAML declaration
Remove annotation
Add EOF
Patchset 2 update (remove ClusterRoleBinding)
Patchset 2 update (edit Set up remote management of VMs)
Patchset 2 update (add secret to other ClusterRoleBindings)
Patchset 5 updates
Patchset 6 updates

Signed-off-by: Ron Stone <ronald.stone@windriver.com>
Change-Id: I11e63f97c82f4cb3e92403e8a8423d892e3160a3
This commit is contained in:
Ron Stone 2022-12-19 12:18:24 -05:00
parent c1dbf8ac53
commit e8cbaad48d
7 changed files with 57 additions and 2 deletions

View File

@ -146,6 +146,15 @@ controller-0:
name: admin-user
namespace: kube-system
---
apiVersion: v1
kind: Secret
type: kubernetes.io/service-account-token
metadata:
name: admin-user-sa-token
namespace: kube-system
annotations:
kubernetes.io/service-account.name: admin-user
---
apiVersion: rbac.authorization.k8s.io/v1
kind: ClusterRoleBinding
metadata:

View File

@ -116,7 +116,8 @@ network. Finally, RDP to the |VM| from a remote workstation.
- name: myrootdisk
dataVolume:
name: stx-lab-winserv-test-disk
EOF
#. Apply the configuration.
.. code-block::

View File

@ -40,6 +40,15 @@ applications with a Helm v2 chart.
name: admin-user
namespace: kube-system
---
apiVersion: v1
kind: Secret
type: kubernetes.io/service-account-token
metadata:
name: admin-user-sa-token
namespace: kube-system
annotations:
kubernetes.io/service-account.name: admin-user
---
apiVersion: rbac.authorization.k8s.io/v1
kind: ClusterRoleBinding
metadata:

View File

@ -34,6 +34,15 @@ an admin service account with cluster-admin role, use the following procedure:
name: admin-user
namespace: kube-system
---
apiVersion: v1
kind: Secret
type: kubernetes.io/service-account-token
metadata:
name: admin-user-sa-token
namespace: kube-system
annotations:
kubernetes.io/service-account.name: admin-user
---
apiVersion: rbac.authorization.k8s.io/v1
kind: ClusterRoleBinding
metadata:
@ -69,4 +78,4 @@ an admin service account with cluster-admin role, use the following procedure:
|prod| can also use user accounts defined in an external Windows Active
Directory to authenticate Kubernetes API, :command:`kubectl` CLI or the
Kubernetes Dashboard. For more information, see :ref:`Configure OIDC
Auth Applications <configure-oidc-auth-applications>`.
Auth Applications <configure-oidc-auth-applications>`.

View File

@ -109,6 +109,15 @@ with read/write type access to a single private namespace
name: dave-user
namespace: kube-system
---
apiVersion: v1
kind: Secret
type: kubernetes.io/service-account-token
metadata:
name: dave-user-sa-token
namespace: kube-system
annotations:
kubernetes.io/service-account.name: dave-user
---
apiVersion: rbac.authorization.k8s.io/v1
kind: RoleBinding
metadata:

View File

@ -100,6 +100,15 @@ CLIs and Clients for an admin user with cluster-admin clusterrole.
name: ${USER}
namespace: kube-system
---
apiVersion: v1
kind: Secret
type: kubernetes.io/service-account-token
metadata:
name: ${USER}-sa-token
namespace: kube-system
annotations:
kubernetes.io/service-account.name: ${USER}
---
apiVersion: rbac.authorization.k8s.io/v1
kind: ClusterRoleBinding
metadata:

View File

@ -15,6 +15,15 @@
name: kubernetes-admin
namespace: kube-system
---
apiVersion: v1
kind: Secret
type: kubernetes.io/service-account-token
metadata:
name: kubernetes-admin-sa-token
namespace: kube-system
annotations:
kubernetes.io/service-account.name: kubernetes-admin
---
apiVersion: rbac.authorization.k8s.io/v1
kind: ClusterRoleBinding
metadata: