Skip to content

Commit 49cada4

Browse files
redisdocsapp[bot]github-actions[bot]paoloredis
authored
k8s api docs 7.8.2-2 (#1085)
* k8s api docs 7.8.2-2 * Ignore redis_enterprise_active_active_database_api.md changes --------- Co-authored-by: github-actions[bot] <41898282+github-actions[bot]@users.noreply.github.com> Co-authored-by: paoloredis <paolo.lazzari@redis.com>
1 parent 3759f40 commit 49cada4

24 files changed

+1027
-0
lines changed

content/embeds/admission-service.md

Lines changed: 15 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,15 @@
1+
```yaml
2+
apiVersion: v1
3+
kind: Service
4+
metadata:
5+
name: admission
6+
labels:
7+
app: redis-enterprise
8+
spec:
9+
ports:
10+
- port: 443
11+
protocol: TCP
12+
targetPort: 8443
13+
selector:
14+
name: redis-enterprise-operator
15+
```

content/embeds/admission_webhook.md

Lines changed: 34 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,34 @@
1+
```yaml
2+
apiVersion: admissionregistration.k8s.io/v1
3+
kind: ValidatingWebhookConfiguration
4+
metadata:
5+
labels:
6+
app: redis-enterprise
7+
name: redis-enterprise-admission
8+
webhooks:
9+
- admissionReviewVersions:
10+
- v1beta1
11+
clientConfig:
12+
service:
13+
name: admission
14+
path: /admission
15+
namespace: OPERATOR_NAMESPACE
16+
caBundle: "" # Fill in with BASE64 encoded signed cert
17+
failurePolicy: Fail
18+
matchPolicy: Exact
19+
name: redisenterprise.admission.redislabs
20+
rules:
21+
- apiGroups:
22+
- app.redislabs.com
23+
apiVersions:
24+
- v1alpha1
25+
operations:
26+
- CREATE
27+
- UPDATE
28+
resources:
29+
- redisenterprisedatabases
30+
- redisenterpriseactiveactivedatabases
31+
- redisenterpriseremoteclusters
32+
sideEffects: None
33+
timeoutSeconds: 30
34+
```
Lines changed: 187 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,187 @@
1+
```yaml
2+
# The minimal Role and ClusterRole required for running the log collector in 'all' mode.
3+
# The roles should be bound to the user executing the log collector, in each of the namespaces to be collected.
4+
apiVersion: rbac.authorization.k8s.io/v1
5+
kind: Role
6+
metadata:
7+
name: redis-enterprise-log-collector
8+
rules:
9+
- apiGroups:
10+
- ""
11+
resources:
12+
- pods
13+
- pods/log
14+
verbs:
15+
- get
16+
- list
17+
- apiGroups:
18+
- ""
19+
resources:
20+
- pods/exec
21+
verbs:
22+
- create
23+
- apiGroups:
24+
- ""
25+
resources:
26+
- events
27+
- services
28+
- endpoints
29+
- configmaps
30+
- secrets
31+
- resourcequotas
32+
- limitranges
33+
- persistentvolumeclaims
34+
- replicationcontrollers
35+
verbs:
36+
- get
37+
- list
38+
- apiGroups:
39+
- apps
40+
resources:
41+
- deployments
42+
- daemonsets
43+
- replicasets
44+
- statefulsets
45+
verbs:
46+
- get
47+
- list
48+
- apiGroups:
49+
- batch
50+
resources:
51+
- cronjobs
52+
- jobs
53+
verbs:
54+
- get
55+
- list
56+
- apiGroups:
57+
- rbac.authorization.k8s.io
58+
resources:
59+
- roles
60+
- rolebindings
61+
verbs:
62+
- get
63+
- list
64+
- apiGroups:
65+
- autoscaling
66+
resources:
67+
- horizontalpodautoscalers
68+
verbs:
69+
- get
70+
- list
71+
- apiGroups:
72+
- policy
73+
resources:
74+
- poddisruptionbudgets
75+
verbs:
76+
- get
77+
- list
78+
- apiGroups:
79+
- app.redislabs.com
80+
resources:
81+
- "*"
82+
verbs:
83+
- get
84+
- list
85+
- apiGroups:
86+
- networking.k8s.io
87+
resources:
88+
- ingresses
89+
- networkpolicies
90+
verbs:
91+
- get
92+
- list
93+
- apiGroups:
94+
- route.openshift.io
95+
resources:
96+
- routes
97+
verbs:
98+
- get
99+
- list
100+
- apiGroups:
101+
- operators.coreos.com
102+
resources:
103+
- clusterserviceversions
104+
- subscriptions
105+
- installplans
106+
- catalogsources
107+
verbs:
108+
- get
109+
- list
110+
- apiGroups:
111+
- networking.istio.io
112+
resources:
113+
- gateways
114+
- virtualservices
115+
verbs:
116+
- get
117+
- list
118+
---
119+
apiVersion: rbac.authorization.k8s.io/v1
120+
kind: ClusterRole
121+
metadata:
122+
name: redis-enterprise-log-collector
123+
rules:
124+
- apiGroups:
125+
- ""
126+
resources:
127+
- nodes
128+
- persistentvolumes
129+
verbs:
130+
- get
131+
- list
132+
- apiGroups:
133+
- ""
134+
resources:
135+
- namespaces
136+
verbs:
137+
- get
138+
- apiGroups:
139+
- rbac.authorization.k8s.io
140+
resources:
141+
- clusterroles
142+
- clusterrolebindings
143+
verbs:
144+
- get
145+
- list
146+
- apiGroups:
147+
- apiextensions.k8s.io
148+
resources:
149+
- customresourcedefinitions
150+
resourceNames:
151+
- redisenterpriseclusters.app.redislabs.com
152+
- redisenterprisedatabases.app.redislabs.com
153+
- redisenterpriseremoteclusters.app.redislabs.com
154+
- redisenterpriseactiveactivedatabases.app.redislabs.com
155+
verbs:
156+
- get
157+
- list
158+
- apiGroups:
159+
- admissionregistration.k8s.io
160+
resources:
161+
- validatingwebhookconfigurations
162+
verbs:
163+
- get
164+
- list
165+
- apiGroups:
166+
- storage.k8s.io
167+
resources:
168+
- volumeattachments
169+
- storageclasses
170+
verbs:
171+
- get
172+
- list
173+
- apiGroups:
174+
- policy
175+
resources:
176+
- podsecuritypolicy
177+
verbs:
178+
- get
179+
- list
180+
- apiGroups:
181+
- certificates.k8s.io
182+
resources:
183+
- certificatesigningrequests
184+
verbs:
185+
- get
186+
- list
187+
```
Lines changed: 146 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,146 @@
1+
```yaml
2+
# The minimal Role and ClusterRole required for running the log collector in 'restricted' mode.
3+
# The roles should be bound to the user executing the log collector, in each of the namespaces to be collected.
4+
apiVersion: rbac.authorization.k8s.io/v1
5+
kind: Role
6+
metadata:
7+
name: redis-enterprise-log-collector
8+
rules:
9+
- apiGroups:
10+
- ""
11+
resources:
12+
- pods
13+
- pods/log
14+
verbs:
15+
- get
16+
- list
17+
- apiGroups:
18+
- ""
19+
resources:
20+
- pods/exec
21+
verbs:
22+
- create
23+
- apiGroups:
24+
- ""
25+
resources:
26+
- events
27+
- services
28+
- endpoints
29+
- configmaps
30+
- secrets
31+
- resourcequotas
32+
- limitranges
33+
- persistentvolumeclaims
34+
- replicationcontrollers
35+
verbs:
36+
- get
37+
- list
38+
- apiGroups:
39+
- apps
40+
resources:
41+
- deployments
42+
- daemonsets
43+
- replicasets
44+
- statefulsets
45+
verbs:
46+
- get
47+
- list
48+
- apiGroups:
49+
- batch
50+
resources:
51+
- cronjobs
52+
- jobs
53+
verbs:
54+
- get
55+
- list
56+
- apiGroups:
57+
- rbac.authorization.k8s.io
58+
resources:
59+
- roles
60+
- rolebindings
61+
verbs:
62+
- get
63+
- list
64+
- apiGroups:
65+
- autoscaling
66+
resources:
67+
- horizontalpodautoscalers
68+
verbs:
69+
- get
70+
- list
71+
- apiGroups:
72+
- policy
73+
resources:
74+
- poddisruptionbudgets
75+
verbs:
76+
- get
77+
- list
78+
- apiGroups:
79+
- app.redislabs.com
80+
resources:
81+
- "*"
82+
verbs:
83+
- get
84+
- list
85+
- apiGroups:
86+
- networking.k8s.io
87+
resources:
88+
- ingresses
89+
- networkpolicies
90+
verbs:
91+
- get
92+
- list
93+
- apiGroups:
94+
- route.openshift.io
95+
resources:
96+
- routes
97+
verbs:
98+
- get
99+
- list
100+
---
101+
apiVersion: rbac.authorization.k8s.io/v1
102+
kind: ClusterRole
103+
metadata:
104+
name: redis-enterprise-log-collector
105+
rules:
106+
- apiGroups:
107+
- ""
108+
resources:
109+
- persistentvolumes
110+
verbs:
111+
- get
112+
- list
113+
- apiGroups:
114+
- ""
115+
resources:
116+
- namespaces
117+
verbs:
118+
- get
119+
- apiGroups:
120+
- rbac.authorization.k8s.io
121+
resources:
122+
- clusterroles
123+
- clusterrolebindings
124+
verbs:
125+
- get
126+
- list
127+
- apiGroups:
128+
- apiextensions.k8s.io
129+
resources:
130+
- customresourcedefinitions
131+
resourceNames:
132+
- redisenterpriseclusters.app.redislabs.com
133+
- redisenterprisedatabases.app.redislabs.com
134+
- redisenterpriseremoteclusters.app.redislabs.com
135+
- redisenterpriseactiveactivedatabases.app.redislabs.com
136+
verbs:
137+
- list
138+
- get
139+
- apiGroups:
140+
- admissionregistration.k8s.io
141+
resources:
142+
- validatingwebhookconfigurations
143+
verbs:
144+
- list
145+
- get
146+
```
Lines changed: 12 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,12 @@
1+
```yaml
2+
apiVersion: rbac.authorization.k8s.io/v1
3+
kind: ClusterRole
4+
metadata:
5+
name: redis-enterprise-operator-consumer-ns
6+
labels:
7+
app: redis-enterprise
8+
rules:
9+
- apiGroups: [""]
10+
resources: ["namespaces"]
11+
verbs: ["list", "watch"]
12+
```

0 commit comments

Comments
 (0)