diff --git a/examples/minikube/README.md b/examples/minikube/README.md index 6d3e5a7..5a7488d 100644 --- a/examples/minikube/README.md +++ b/examples/minikube/README.md @@ -18,16 +18,24 @@ $ ./generate.sh ``` ## Generated architecture diagrams +**Note**: In the following architecture diagrams, both red labels and red arrows indicate unfound Kubernetes resources. + Architecture diagram of Kubernetes resources in the minikube `default` namespace: ![minikube default namespace](minikube-default.png) Architecture diagram of Kubernetes resources in the minikube `kubernetes-dashboard` namespace: ![minikube kubernetes-dashboard namespace](minikube-dashboard.png) +Architecture diagram of Kubernetes resources in the minikube `ingress-nginx` namespace: +![minikube ingress-nginx namespace](minikube-ingress-nginx.png) + +Architecture diagram of Kubernetes resources in the minikube `kube-system` namespace: +![minikube kube-system namespace](minikube-kube-system.png) + Architecture diagram of all minikube Kubernetes resources except for RBAC ones: ![minikube](minikube-without-rbac.png) -**Note**: [minikube-without-rbac-corrected.yml](minikube-without-rbac-corrected.yml) was manually corrected to better group some Kubernetes resources (see `#ADDED:` and `#CHANGED:` comments). +**Note**: [minikube-without-rbac-corrected.yml](minikube-without-rbac-corrected.yml) was manually corrected to better clustering some Kubernetes resources (see `#ADDED:` and `#CHANGED:` comments). Corrected architecture diagram of all minikube Kubernetes resources except for RBAC ones: ![minikube](minikube-without-rbac-corrected.png) @@ -35,4 +43,5 @@ Corrected architecture diagram of all minikube Kubernetes resources except for R Architecture diagram of all minikube Kubernetes resources: ![Minikube](minikube.png) -**Note**: In the previous architecture diagram, both red labels and red arrows indicate unfound Kubernetes resources. +Architecture diagram of all minikube RBAC-related Kubernetes resources: +![Minikube RBAC](minikube-rbac.png) diff --git a/examples/minikube/generate.sh b/examples/minikube/generate.sh index f074b8a..ca38a53 100755 --- a/examples/minikube/generate.sh +++ b/examples/minikube/generate.sh @@ -8,6 +8,11 @@ kubectl get clusterrole,clusterrolebinding,crd,configmap,ds,deployment,hpa,ingre # Generate Kubernetes architecture diagram. $BIN/kube-diagrams -vv ${cluster_name}.yml +# Get all RBAC-related Kubernetes resources. +kubectl get clusterrole,clusterrolebinding,role,rolebinding,serviceaccount -A -o=yaml > ${cluster_name}-rbac.yml +# Generate Kubernetes architecture diagram. +$BIN/kube-diagrams -vv ${cluster_name}-rbac.yml + # Get all Kubernetes resources except for rbac ones. kubectl get crd,configmap,ds,deployment,hpa,ingress,ingressclass,job,node,pod,replicaset,secret,service,serviceaccount,storageclass,namespace -A -o=yaml > ${cluster_name}-without-rbac.yml # Generate Kubernetes architecture diagram. @@ -25,3 +30,14 @@ $BIN/kube-diagrams -v ${cluster_name}-default.yml kubectl get configmap,ds,deployment,hpa,ingress,job,pod,replicaset,role,rolebinding,secret,service,serviceaccount -n kubernetes-dashboard -o=yaml > ${cluster_name}-dashboard.yml # Generate Kubernetes architecture diagram. $BIN/kube-diagrams -v ${cluster_name}-dashboard.yml + +# Get all Kubernetes resources in the ingress-nginx namespace. +kubectl get configmap,ds,deployment,hpa,ingress,job,pod,replicaset,role,rolebinding,secret,service,serviceaccount -n ingress-nginx -o=yaml > ${cluster_name}-ingress-nginx.yml +# Generate Kubernetes architecture diagram. +$BIN/kube-diagrams -v ${cluster_name}-ingress-nginx.yml + +# Get all Kubernetes resources in the kube-system namespace. +kubectl get configmap,ds,deployment,hpa,ingress,job,pod,replicaset,role,rolebinding,secret,service,serviceaccount -n kube-system -o=yaml > ${cluster_name}-kube-system.yml +# Generate Kubernetes architecture diagram. +$BIN/kube-diagrams -v ${cluster_name}-kube-system.yml + diff --git a/examples/minikube/minikube-ingress-nginx.png b/examples/minikube/minikube-ingress-nginx.png new file mode 100644 index 0000000..9243529 Binary files /dev/null and b/examples/minikube/minikube-ingress-nginx.png differ diff --git a/examples/minikube/minikube-ingress-nginx.yml b/examples/minikube/minikube-ingress-nginx.yml new file mode 100644 index 0000000..2f1469e --- /dev/null +++ b/examples/minikube/minikube-ingress-nginx.yml @@ -0,0 +1,2456 @@ +apiVersion: v1 +items: +- apiVersion: v1 + data: + hsts: "false" + kind: ConfigMap + metadata: + annotations: + kubectl.kubernetes.io/last-applied-configuration: | + {"apiVersion":"v1","data":{"hsts":"false"},"kind":"ConfigMap","metadata":{"annotations":{},"labels":{"app.kubernetes.io/component":"controller","app.kubernetes.io/instance":"ingress-nginx","app.kubernetes.io/name":"ingress-nginx"},"name":"ingress-nginx-controller","namespace":"ingress-nginx"}} + creationTimestamp: "2024-12-26T23:25:47Z" + labels: + app.kubernetes.io/component: controller + app.kubernetes.io/instance: ingress-nginx + app.kubernetes.io/name: ingress-nginx + managedFields: + - apiVersion: v1 + fieldsType: FieldsV1 + fieldsV1: + f:data: + .: {} + f:hsts: {} + f:metadata: + f:annotations: + .: {} + f:kubectl.kubernetes.io/last-applied-configuration: {} + f:labels: + .: {} + f:app.kubernetes.io/component: {} + f:app.kubernetes.io/instance: {} + f:app.kubernetes.io/name: {} + manager: kubectl-client-side-apply + operation: Update + time: "2024-12-26T23:25:47Z" + name: ingress-nginx-controller + namespace: ingress-nginx + resourceVersion: "500" + uid: 31dfdda6-86b1-444a-a71f-85011c5eff35 +- apiVersion: v1 + data: + ca.crt: | + -----BEGIN CERTIFICATE----- + MIIDBjCCAe6gAwIBAgIBATANBgkqhkiG9w0BAQsFADAVMRMwEQYDVQQDEwptaW5p + a3ViZUNBMB4XDTIzMDIwNDA3NTMzNloXDTMzMDIwMjA3NTMzNlowFTETMBEGA1UE + AxMKbWluaWt1YmVDQTCCASIwDQYJKoZIhvcNAQEBBQADggEPADCCAQoCggEBAM3l + n8dtEkPntkBRSF7NBlwCbwI3BRxHL5LUSROCfr/tFyuJ8XiZa8yv/DbiCKDFWeBr + lJwWOJ3HjrjQc+nBIjbG3spMaOr9Kgut7UKyYEeIZxBSz5GBd7rlRuBwOkRqEXtS + /H/TxVzgrugfKbI+ALtzbtHTzKKLDGaYjAC5t2jQ/PtzQ3s4cB8Z/fk03n9woBC8 + 6makLFQXXPj65y09hb/slxIbi4hyRe4hdQYnxeY+PKmuEZIaed5gFrN/EDDtrtwn + bcPY3Pwc0/b1+S44TcB+eWMq28zPLeO/Kjziw8q+1wldKWIXJJSUAUU5dBOtlRol + yfr7t0ibsft1OTVCisECAwEAAaNhMF8wDgYDVR0PAQH/BAQDAgKkMB0GA1UdJQQW + MBQGCCsGAQUFBwMCBggrBgEFBQcDATAPBgNVHRMBAf8EBTADAQH/MB0GA1UdDgQW + BBS1Nak8XxDdSOq3r1qdAXNmQRttCzANBgkqhkiG9w0BAQsFAAOCAQEAxrabqVKs + u9hJTiUNhLEQTOVR7gMuonymonQ73488pQHKKIyAM8It+ClgP+YdZtRi+uxGgQ3m + kwbJbf1ybysY++tIKbUXfsal/wcrt2hbqk6HJxca/YaYL7qja6N/BElct07RQhLf + DpMtfqokyBh/yOlobBkrrA+RylGVi1ebWgFM7xtzmuPpeIYurNIcXGpp0d21RuRz + 0Oxd9g/HHAzZihXbHfPeJJdiQBtPvQ83TZ+T2E0MCkLDUC1okRztR8R5YPG6nZli + zVRBh41095iSNFKJhFQyu5Qzme98wdBBQGoxcMOoXk6ioeDQUywHaJMjdCANqubf + I700WTtGVr503w== + -----END CERTIFICATE----- + kind: ConfigMap + metadata: + annotations: + kubernetes.io/description: Contains a CA bundle that can be used to verify the + kube-apiserver when using internal endpoints such as the internal service + IP or kubernetes.default.svc. No other usage is guaranteed across distributions + of Kubernetes clusters. + creationTimestamp: "2024-12-26T23:25:47Z" + managedFields: + - apiVersion: v1 + fieldsType: FieldsV1 + fieldsV1: + f:data: + .: {} + f:ca.crt: {} + f:metadata: + f:annotations: + .: {} + f:kubernetes.io/description: {} + manager: kube-controller-manager + operation: Update + time: "2024-12-26T23:25:47Z" + name: kube-root-ca.crt + namespace: ingress-nginx + resourceVersion: "488" + uid: b8167ec5-27a6-4909-abc5-977ad85d0916 +- apiVersion: v1 + kind: ConfigMap + metadata: + annotations: + kubectl.kubernetes.io/last-applied-configuration: | + {"apiVersion":"v1","kind":"ConfigMap","metadata":{"annotations":{},"labels":{"app.kubernetes.io/component":"controller","app.kubernetes.io/instance":"ingress-nginx","app.kubernetes.io/name":"ingress-nginx"},"name":"tcp-services","namespace":"ingress-nginx"}} + creationTimestamp: "2024-12-26T23:25:47Z" + labels: + app.kubernetes.io/component: controller + app.kubernetes.io/instance: ingress-nginx + app.kubernetes.io/name: ingress-nginx + managedFields: + - apiVersion: v1 + fieldsType: FieldsV1 + fieldsV1: + f:metadata: + f:annotations: + .: {} + f:kubectl.kubernetes.io/last-applied-configuration: {} + f:labels: + .: {} + f:app.kubernetes.io/component: {} + f:app.kubernetes.io/instance: {} + f:app.kubernetes.io/name: {} + manager: kubectl-client-side-apply + operation: Update + time: "2024-12-26T23:25:47Z" + name: tcp-services + namespace: ingress-nginx + resourceVersion: "501" + uid: ef4998c0-1659-42dc-ba74-b379a17b4acc +- apiVersion: v1 + kind: ConfigMap + metadata: + annotations: + kubectl.kubernetes.io/last-applied-configuration: | + {"apiVersion":"v1","kind":"ConfigMap","metadata":{"annotations":{},"labels":{"app.kubernetes.io/component":"controller","app.kubernetes.io/instance":"ingress-nginx","app.kubernetes.io/name":"ingress-nginx"},"name":"udp-services","namespace":"ingress-nginx"}} + creationTimestamp: "2024-12-26T23:25:47Z" + labels: + app.kubernetes.io/component: controller + app.kubernetes.io/instance: ingress-nginx + app.kubernetes.io/name: ingress-nginx + managedFields: + - apiVersion: v1 + fieldsType: FieldsV1 + fieldsV1: + f:metadata: + f:annotations: + .: {} + f:kubectl.kubernetes.io/last-applied-configuration: {} + f:labels: + .: {} + f:app.kubernetes.io/component: {} + f:app.kubernetes.io/instance: {} + f:app.kubernetes.io/name: {} + manager: kubectl-client-side-apply + operation: Update + time: "2024-12-26T23:25:47Z" + name: udp-services + namespace: ingress-nginx + resourceVersion: "502" + uid: 68c36d5c-c82e-400d-ba01-f876b7c7473e +- apiVersion: apps/v1 + kind: Deployment + metadata: + annotations: + deployment.kubernetes.io/revision: "1" + kubectl.kubernetes.io/last-applied-configuration: | + {"apiVersion":"apps/v1","kind":"Deployment","metadata":{"annotations":{},"labels":{"app.kubernetes.io/component":"controller","app.kubernetes.io/instance":"ingress-nginx","app.kubernetes.io/name":"ingress-nginx"},"name":"ingress-nginx-controller","namespace":"ingress-nginx"},"spec":{"minReadySeconds":0,"revisionHistoryLimit":10,"selector":{"matchLabels":{"app.kubernetes.io/component":"controller","app.kubernetes.io/instance":"ingress-nginx","app.kubernetes.io/name":"ingress-nginx"}},"strategy":{"rollingUpdate":{"maxUnavailable":1},"type":"RollingUpdate"},"template":{"metadata":{"labels":{"app.kubernetes.io/component":"controller","app.kubernetes.io/instance":"ingress-nginx","app.kubernetes.io/name":"ingress-nginx","gcp-auth-skip-secret":"true"}},"spec":{"containers":[{"args":["/nginx-ingress-controller","--election-id=ingress-nginx-leader","--controller-class=k8s.io/ingress-nginx","--watch-ingress-without-class=true","--configmap=$(POD_NAMESPACE)/ingress-nginx-controller","--tcp-services-configmap=$(POD_NAMESPACE)/tcp-services","--udp-services-configmap=$(POD_NAMESPACE)/udp-services","--validating-webhook=:8443","--validating-webhook-certificate=/usr/local/certificates/cert","--validating-webhook-key=/usr/local/certificates/key"],"env":[{"name":"POD_NAME","valueFrom":{"fieldRef":{"fieldPath":"metadata.name"}}},{"name":"POD_NAMESPACE","valueFrom":{"fieldRef":{"fieldPath":"metadata.namespace"}}},{"name":"LD_PRELOAD","value":"/usr/local/lib/libmimalloc.so"}],"image":"registry.k8s.io/ingress-nginx/controller:v1.5.1@sha256:4ba73c697770664c1e00e9f968de14e08f606ff961c76e5d7033a4a9c593c629","imagePullPolicy":"IfNotPresent","lifecycle":{"preStop":{"exec":{"command":["/wait-shutdown"]}}},"livenessProbe":{"failureThreshold":5,"httpGet":{"path":"/healthz","port":10254,"scheme":"HTTP"},"initialDelaySeconds":10,"periodSeconds":10,"successThreshold":1,"timeoutSeconds":1},"name":"controller","ports":[{"containerPort":80,"hostPort":80,"name":"http","protocol":"TCP"},{"containerPort":443,"hostPort":443,"name":"https","protocol":"TCP"},{"containerPort":8443,"name":"webhook","protocol":"TCP"}],"readinessProbe":{"failureThreshold":3,"httpGet":{"path":"/healthz","port":10254,"scheme":"HTTP"},"initialDelaySeconds":10,"periodSeconds":10,"successThreshold":1,"timeoutSeconds":1},"resources":{"requests":{"cpu":"100m","memory":"90Mi"}},"securityContext":{"allowPrivilegeEscalation":true,"capabilities":{"add":["NET_BIND_SERVICE"],"drop":["ALL"]},"runAsUser":101},"volumeMounts":[{"mountPath":"/usr/local/certificates/","name":"webhook-cert","readOnly":true}]}],"dnsPolicy":"ClusterFirst","nodeSelector":{"kubernetes.io/os":"linux","minikube.k8s.io/primary":"true"},"serviceAccountName":"ingress-nginx","terminationGracePeriodSeconds":0,"tolerations":[{"effect":"NoSchedule","key":"node-role.kubernetes.io/master","operator":"Equal"}],"volumes":[{"name":"webhook-cert","secret":{"secretName":"ingress-nginx-admission"}}]}}}} + creationTimestamp: "2024-12-26T23:25:47Z" + generation: 1 + labels: + app.kubernetes.io/component: controller + app.kubernetes.io/instance: ingress-nginx + app.kubernetes.io/name: ingress-nginx + managedFields: + - apiVersion: apps/v1 + fieldsType: FieldsV1 + fieldsV1: + f:metadata: + f:annotations: + .: {} + f:kubectl.kubernetes.io/last-applied-configuration: {} + f:labels: + .: {} + f:app.kubernetes.io/component: {} + f:app.kubernetes.io/instance: {} + f:app.kubernetes.io/name: {} + f:spec: + f:progressDeadlineSeconds: {} + f:replicas: {} + f:revisionHistoryLimit: {} + f:selector: {} + f:strategy: + f:rollingUpdate: + .: {} + f:maxSurge: {} + f:maxUnavailable: {} + f:type: {} + f:template: + f:metadata: + f:labels: + .: {} + f:app.kubernetes.io/component: {} + f:app.kubernetes.io/instance: {} + f:app.kubernetes.io/name: {} + f:gcp-auth-skip-secret: {} + f:spec: + f:containers: + k:{"name":"controller"}: + .: {} + f:args: {} + f:env: + .: {} + k:{"name":"LD_PRELOAD"}: + .: {} + f:name: {} + f:value: {} + k:{"name":"POD_NAME"}: + .: {} + f:name: {} + f:valueFrom: + .: {} + f:fieldRef: {} + k:{"name":"POD_NAMESPACE"}: + .: {} + f:name: {} + f:valueFrom: + .: {} + f:fieldRef: {} + f:image: {} + f:imagePullPolicy: {} + f:lifecycle: + .: {} + f:preStop: + .: {} + f:exec: + .: {} + f:command: {} + f:livenessProbe: + .: {} + f:failureThreshold: {} + f:httpGet: + .: {} + f:path: {} + f:port: {} + f:scheme: {} + f:initialDelaySeconds: {} + f:periodSeconds: {} + f:successThreshold: {} + f:timeoutSeconds: {} + f:name: {} + f:ports: + .: {} + k:{"containerPort":80,"protocol":"TCP"}: + .: {} + f:containerPort: {} + f:hostPort: {} + f:name: {} + f:protocol: {} + k:{"containerPort":443,"protocol":"TCP"}: + .: {} + f:containerPort: {} + f:hostPort: {} + f:name: {} + f:protocol: {} + k:{"containerPort":8443,"protocol":"TCP"}: + .: {} + f:containerPort: {} + f:name: {} + f:protocol: {} + f:readinessProbe: + .: {} + f:failureThreshold: {} + f:httpGet: + .: {} + f:path: {} + f:port: {} + f:scheme: {} + f:initialDelaySeconds: {} + f:periodSeconds: {} + f:successThreshold: {} + f:timeoutSeconds: {} + f:resources: + .: {} + f:requests: + .: {} + f:cpu: {} + f:memory: {} + f:securityContext: + .: {} + f:allowPrivilegeEscalation: {} + f:capabilities: + .: {} + f:add: {} + f:drop: {} + f:runAsUser: {} + f:terminationMessagePath: {} + f:terminationMessagePolicy: {} + f:volumeMounts: + .: {} + k:{"mountPath":"/usr/local/certificates/"}: + .: {} + f:mountPath: {} + f:name: {} + f:readOnly: {} + f:dnsPolicy: {} + f:nodeSelector: {} + f:restartPolicy: {} + f:schedulerName: {} + f:securityContext: {} + f:serviceAccount: {} + f:serviceAccountName: {} + f:terminationGracePeriodSeconds: {} + f:tolerations: {} + f:volumes: + .: {} + k:{"name":"webhook-cert"}: + .: {} + f:name: {} + f:secret: + .: {} + f:defaultMode: {} + f:secretName: {} + manager: kubectl-client-side-apply + operation: Update + time: "2024-12-26T23:25:47Z" + - apiVersion: apps/v1 + fieldsType: FieldsV1 + fieldsV1: + f:metadata: + f:annotations: + f:deployment.kubernetes.io/revision: {} + f:status: + f:availableReplicas: {} + f:conditions: + .: {} + k:{"type":"Available"}: + .: {} + f:lastTransitionTime: {} + f:lastUpdateTime: {} + f:message: {} + f:reason: {} + f:status: {} + f:type: {} + k:{"type":"Progressing"}: + .: {} + f:lastTransitionTime: {} + f:lastUpdateTime: {} + f:message: {} + f:reason: {} + f:status: {} + f:type: {} + f:observedGeneration: {} + f:readyReplicas: {} + f:replicas: {} + f:updatedReplicas: {} + manager: kube-controller-manager + operation: Update + subresource: status + time: "2024-12-27T17:53:23Z" + name: ingress-nginx-controller + namespace: ingress-nginx + resourceVersion: "41920" + uid: 3b92e91d-a21c-40ab-ada7-643805ec26d5 + spec: + progressDeadlineSeconds: 600 + replicas: 1 + revisionHistoryLimit: 10 + selector: + matchLabels: + app.kubernetes.io/component: controller + app.kubernetes.io/instance: ingress-nginx + app.kubernetes.io/name: ingress-nginx + strategy: + rollingUpdate: + maxSurge: 25% + maxUnavailable: 1 + type: RollingUpdate + template: + metadata: + creationTimestamp: null + labels: + app.kubernetes.io/component: controller + app.kubernetes.io/instance: ingress-nginx + app.kubernetes.io/name: ingress-nginx + gcp-auth-skip-secret: "true" + spec: + containers: + - args: + - /nginx-ingress-controller + - --election-id=ingress-nginx-leader + - --controller-class=k8s.io/ingress-nginx + - --watch-ingress-without-class=true + - --configmap=$(POD_NAMESPACE)/ingress-nginx-controller + - --tcp-services-configmap=$(POD_NAMESPACE)/tcp-services + - --udp-services-configmap=$(POD_NAMESPACE)/udp-services + - --validating-webhook=:8443 + - --validating-webhook-certificate=/usr/local/certificates/cert + - --validating-webhook-key=/usr/local/certificates/key + env: + - name: POD_NAME + valueFrom: + fieldRef: + apiVersion: v1 + fieldPath: metadata.name + - name: POD_NAMESPACE + valueFrom: + fieldRef: + apiVersion: v1 + fieldPath: metadata.namespace + - name: LD_PRELOAD + value: /usr/local/lib/libmimalloc.so + image: registry.k8s.io/ingress-nginx/controller:v1.5.1@sha256:4ba73c697770664c1e00e9f968de14e08f606ff961c76e5d7033a4a9c593c629 + imagePullPolicy: IfNotPresent + lifecycle: + preStop: + exec: + command: + - /wait-shutdown + livenessProbe: + failureThreshold: 5 + httpGet: + path: /healthz + port: 10254 + scheme: HTTP + initialDelaySeconds: 10 + periodSeconds: 10 + successThreshold: 1 + timeoutSeconds: 1 + name: controller + ports: + - containerPort: 80 + hostPort: 80 + name: http + protocol: TCP + - containerPort: 443 + hostPort: 443 + name: https + protocol: TCP + - containerPort: 8443 + name: webhook + protocol: TCP + readinessProbe: + failureThreshold: 3 + httpGet: + path: /healthz + port: 10254 + scheme: HTTP + initialDelaySeconds: 10 + periodSeconds: 10 + successThreshold: 1 + timeoutSeconds: 1 + resources: + requests: + cpu: 100m + memory: 90Mi + securityContext: + allowPrivilegeEscalation: true + capabilities: + add: + - NET_BIND_SERVICE + drop: + - ALL + runAsUser: 101 + terminationMessagePath: /dev/termination-log + terminationMessagePolicy: File + volumeMounts: + - mountPath: /usr/local/certificates/ + name: webhook-cert + readOnly: true + dnsPolicy: ClusterFirst + nodeSelector: + kubernetes.io/os: linux + minikube.k8s.io/primary: "true" + restartPolicy: Always + schedulerName: default-scheduler + securityContext: {} + serviceAccount: ingress-nginx + serviceAccountName: ingress-nginx + terminationGracePeriodSeconds: 0 + tolerations: + - effect: NoSchedule + key: node-role.kubernetes.io/master + operator: Equal + volumes: + - name: webhook-cert + secret: + defaultMode: 420 + secretName: ingress-nginx-admission + status: + availableReplicas: 1 + conditions: + - lastTransitionTime: "2024-12-26T23:25:47Z" + lastUpdateTime: "2024-12-26T23:25:47Z" + message: Deployment has minimum availability. + reason: MinimumReplicasAvailable + status: "True" + type: Available + - lastTransitionTime: "2024-12-26T23:25:47Z" + lastUpdateTime: "2024-12-26T23:26:53Z" + message: ReplicaSet "ingress-nginx-controller-77669ff58" has successfully progressed. + reason: NewReplicaSetAvailable + status: "True" + type: Progressing + observedGeneration: 1 + readyReplicas: 1 + replicas: 1 + updatedReplicas: 1 +- apiVersion: batch/v1 + kind: Job + metadata: + annotations: + batch.kubernetes.io/job-tracking: "" + kubectl.kubernetes.io/last-applied-configuration: | + {"apiVersion":"batch/v1","kind":"Job","metadata":{"annotations":{},"labels":{"app.kubernetes.io/component":"admission-webhook","app.kubernetes.io/instance":"ingress-nginx","app.kubernetes.io/name":"ingress-nginx"},"name":"ingress-nginx-admission-create","namespace":"ingress-nginx"},"spec":{"template":{"metadata":{"labels":{"app.kubernetes.io/component":"admission-webhook","app.kubernetes.io/instance":"ingress-nginx","app.kubernetes.io/name":"ingress-nginx"},"name":"ingress-nginx-admission-create"},"spec":{"containers":[{"args":["create","--host=ingress-nginx-controller-admission,ingress-nginx-controller-admission.$(POD_NAMESPACE).svc","--namespace=$(POD_NAMESPACE)","--secret-name=ingress-nginx-admission"],"env":[{"name":"POD_NAMESPACE","valueFrom":{"fieldRef":{"fieldPath":"metadata.namespace"}}}],"image":"registry.k8s.io/ingress-nginx/kube-webhook-certgen:v20220916-gd32f8c343@sha256:39c5b2e3310dc4264d638ad28d9d1d96c4cbb2b2dcfb52368fe4e3c63f61e10f","imagePullPolicy":"IfNotPresent","name":"create","securityContext":{"allowPrivilegeEscalation":false}}],"nodeSelector":{"kubernetes.io/os":"linux","minikube.k8s.io/primary":"true"},"restartPolicy":"OnFailure","securityContext":{"runAsNonRoot":true,"runAsUser":2000},"serviceAccountName":"ingress-nginx-admission"}}}} + creationTimestamp: "2024-12-26T23:25:47Z" + generation: 1 + labels: + app.kubernetes.io/component: admission-webhook + app.kubernetes.io/instance: ingress-nginx + app.kubernetes.io/name: ingress-nginx + managedFields: + - apiVersion: batch/v1 + fieldsType: FieldsV1 + fieldsV1: + f:metadata: + f:annotations: + .: {} + f:kubectl.kubernetes.io/last-applied-configuration: {} + f:labels: + .: {} + f:app.kubernetes.io/component: {} + f:app.kubernetes.io/instance: {} + f:app.kubernetes.io/name: {} + f:spec: + f:backoffLimit: {} + f:completionMode: {} + f:completions: {} + f:parallelism: {} + f:suspend: {} + f:template: + f:metadata: + f:labels: + .: {} + f:app.kubernetes.io/component: {} + f:app.kubernetes.io/instance: {} + f:app.kubernetes.io/name: {} + f:name: {} + f:spec: + f:containers: + k:{"name":"create"}: + .: {} + f:args: {} + f:env: + .: {} + k:{"name":"POD_NAMESPACE"}: + .: {} + f:name: {} + f:valueFrom: + .: {} + f:fieldRef: {} + f:image: {} + f:imagePullPolicy: {} + f:name: {} + f:resources: {} + f:securityContext: + .: {} + f:allowPrivilegeEscalation: {} + f:terminationMessagePath: {} + f:terminationMessagePolicy: {} + f:dnsPolicy: {} + f:nodeSelector: {} + f:restartPolicy: {} + f:schedulerName: {} + f:securityContext: + .: {} + f:runAsNonRoot: {} + f:runAsUser: {} + f:serviceAccount: {} + f:serviceAccountName: {} + f:terminationGracePeriodSeconds: {} + manager: kubectl-client-side-apply + operation: Update + time: "2024-12-26T23:25:47Z" + - apiVersion: batch/v1 + fieldsType: FieldsV1 + fieldsV1: + f:status: + f:completionTime: {} + f:conditions: {} + f:ready: {} + f:startTime: {} + f:succeeded: {} + f:uncountedTerminatedPods: {} + manager: kube-controller-manager + operation: Update + subresource: status + time: "2024-12-26T23:25:59Z" + name: ingress-nginx-admission-create + namespace: ingress-nginx + resourceVersion: "576" + uid: 01e1b9b0-bb64-46bc-ab12-1d3e72fbdcbd + spec: + backoffLimit: 6 + completionMode: NonIndexed + completions: 1 + parallelism: 1 + selector: + matchLabels: + controller-uid: 01e1b9b0-bb64-46bc-ab12-1d3e72fbdcbd + suspend: false + template: + metadata: + creationTimestamp: null + labels: + app.kubernetes.io/component: admission-webhook + app.kubernetes.io/instance: ingress-nginx + app.kubernetes.io/name: ingress-nginx + controller-uid: 01e1b9b0-bb64-46bc-ab12-1d3e72fbdcbd + job-name: ingress-nginx-admission-create + name: ingress-nginx-admission-create + spec: + containers: + - args: + - create + - --host=ingress-nginx-controller-admission,ingress-nginx-controller-admission.$(POD_NAMESPACE).svc + - --namespace=$(POD_NAMESPACE) + - --secret-name=ingress-nginx-admission + env: + - name: POD_NAMESPACE + valueFrom: + fieldRef: + apiVersion: v1 + fieldPath: metadata.namespace + image: registry.k8s.io/ingress-nginx/kube-webhook-certgen:v20220916-gd32f8c343@sha256:39c5b2e3310dc4264d638ad28d9d1d96c4cbb2b2dcfb52368fe4e3c63f61e10f + imagePullPolicy: IfNotPresent + name: create + resources: {} + securityContext: + allowPrivilegeEscalation: false + terminationMessagePath: /dev/termination-log + terminationMessagePolicy: File + dnsPolicy: ClusterFirst + nodeSelector: + kubernetes.io/os: linux + minikube.k8s.io/primary: "true" + restartPolicy: OnFailure + schedulerName: default-scheduler + securityContext: + runAsNonRoot: true + runAsUser: 2000 + serviceAccount: ingress-nginx-admission + serviceAccountName: ingress-nginx-admission + terminationGracePeriodSeconds: 30 + status: + completionTime: "2024-12-26T23:25:59Z" + conditions: + - lastProbeTime: "2024-12-26T23:25:59Z" + lastTransitionTime: "2024-12-26T23:25:59Z" + status: "True" + type: Complete + ready: 0 + startTime: "2024-12-26T23:25:47Z" + succeeded: 1 + uncountedTerminatedPods: {} +- apiVersion: batch/v1 + kind: Job + metadata: + annotations: + batch.kubernetes.io/job-tracking: "" + kubectl.kubernetes.io/last-applied-configuration: | + {"apiVersion":"batch/v1","kind":"Job","metadata":{"annotations":{},"labels":{"app.kubernetes.io/component":"admission-webhook","app.kubernetes.io/instance":"ingress-nginx","app.kubernetes.io/name":"ingress-nginx"},"name":"ingress-nginx-admission-patch","namespace":"ingress-nginx"},"spec":{"template":{"metadata":{"labels":{"app.kubernetes.io/component":"admission-webhook","app.kubernetes.io/instance":"ingress-nginx","app.kubernetes.io/name":"ingress-nginx"},"name":"ingress-nginx-admission-patch"},"spec":{"containers":[{"args":["patch","--webhook-name=ingress-nginx-admission","--namespace=$(POD_NAMESPACE)","--patch-mutating=false","--secret-name=ingress-nginx-admission","--patch-failure-policy=Fail"],"env":[{"name":"POD_NAMESPACE","valueFrom":{"fieldRef":{"fieldPath":"metadata.namespace"}}}],"image":"registry.k8s.io/ingress-nginx/kube-webhook-certgen:v20220916-gd32f8c343@sha256:39c5b2e3310dc4264d638ad28d9d1d96c4cbb2b2dcfb52368fe4e3c63f61e10f","imagePullPolicy":"IfNotPresent","name":"patch","securityContext":{"allowPrivilegeEscalation":false}}],"nodeSelector":{"kubernetes.io/os":"linux","minikube.k8s.io/primary":"true"},"restartPolicy":"OnFailure","securityContext":{"runAsNonRoot":true,"runAsUser":2000},"serviceAccountName":"ingress-nginx-admission"}}}} + creationTimestamp: "2024-12-26T23:25:47Z" + generation: 1 + labels: + app.kubernetes.io/component: admission-webhook + app.kubernetes.io/instance: ingress-nginx + app.kubernetes.io/name: ingress-nginx + managedFields: + - apiVersion: batch/v1 + fieldsType: FieldsV1 + fieldsV1: + f:metadata: + f:annotations: + .: {} + f:kubectl.kubernetes.io/last-applied-configuration: {} + f:labels: + .: {} + f:app.kubernetes.io/component: {} + f:app.kubernetes.io/instance: {} + f:app.kubernetes.io/name: {} + f:spec: + f:backoffLimit: {} + f:completionMode: {} + f:completions: {} + f:parallelism: {} + f:suspend: {} + f:template: + f:metadata: + f:labels: + .: {} + f:app.kubernetes.io/component: {} + f:app.kubernetes.io/instance: {} + f:app.kubernetes.io/name: {} + f:name: {} + f:spec: + f:containers: + k:{"name":"patch"}: + .: {} + f:args: {} + f:env: + .: {} + k:{"name":"POD_NAMESPACE"}: + .: {} + f:name: {} + f:valueFrom: + .: {} + f:fieldRef: {} + f:image: {} + f:imagePullPolicy: {} + f:name: {} + f:resources: {} + f:securityContext: + .: {} + f:allowPrivilegeEscalation: {} + f:terminationMessagePath: {} + f:terminationMessagePolicy: {} + f:dnsPolicy: {} + f:nodeSelector: {} + f:restartPolicy: {} + f:schedulerName: {} + f:securityContext: + .: {} + f:runAsNonRoot: {} + f:runAsUser: {} + f:serviceAccount: {} + f:serviceAccountName: {} + f:terminationGracePeriodSeconds: {} + manager: kubectl-client-side-apply + operation: Update + time: "2024-12-26T23:25:47Z" + - apiVersion: batch/v1 + fieldsType: FieldsV1 + fieldsV1: + f:status: + f:completionTime: {} + f:conditions: {} + f:ready: {} + f:startTime: {} + f:succeeded: {} + f:uncountedTerminatedPods: {} + manager: kube-controller-manager + operation: Update + subresource: status + time: "2024-12-26T23:25:59Z" + name: ingress-nginx-admission-patch + namespace: ingress-nginx + resourceVersion: "578" + uid: 8bfaee46-1b1d-4067-b066-2ff0a9911bdf + spec: + backoffLimit: 6 + completionMode: NonIndexed + completions: 1 + parallelism: 1 + selector: + matchLabels: + controller-uid: 8bfaee46-1b1d-4067-b066-2ff0a9911bdf + suspend: false + template: + metadata: + creationTimestamp: null + labels: + app.kubernetes.io/component: admission-webhook + app.kubernetes.io/instance: ingress-nginx + app.kubernetes.io/name: ingress-nginx + controller-uid: 8bfaee46-1b1d-4067-b066-2ff0a9911bdf + job-name: ingress-nginx-admission-patch + name: ingress-nginx-admission-patch + spec: + containers: + - args: + - patch + - --webhook-name=ingress-nginx-admission + - --namespace=$(POD_NAMESPACE) + - --patch-mutating=false + - --secret-name=ingress-nginx-admission + - --patch-failure-policy=Fail + env: + - name: POD_NAMESPACE + valueFrom: + fieldRef: + apiVersion: v1 + fieldPath: metadata.namespace + image: registry.k8s.io/ingress-nginx/kube-webhook-certgen:v20220916-gd32f8c343@sha256:39c5b2e3310dc4264d638ad28d9d1d96c4cbb2b2dcfb52368fe4e3c63f61e10f + imagePullPolicy: IfNotPresent + name: patch + resources: {} + securityContext: + allowPrivilegeEscalation: false + terminationMessagePath: /dev/termination-log + terminationMessagePolicy: File + dnsPolicy: ClusterFirst + nodeSelector: + kubernetes.io/os: linux + minikube.k8s.io/primary: "true" + restartPolicy: OnFailure + schedulerName: default-scheduler + securityContext: + runAsNonRoot: true + runAsUser: 2000 + serviceAccount: ingress-nginx-admission + serviceAccountName: ingress-nginx-admission + terminationGracePeriodSeconds: 30 + status: + completionTime: "2024-12-26T23:25:59Z" + conditions: + - lastProbeTime: "2024-12-26T23:25:59Z" + lastTransitionTime: "2024-12-26T23:25:59Z" + status: "True" + type: Complete + ready: 0 + startTime: "2024-12-26T23:25:47Z" + succeeded: 1 + uncountedTerminatedPods: {} +- apiVersion: v1 + kind: Pod + metadata: + creationTimestamp: "2024-12-26T23:25:47Z" + generateName: ingress-nginx-admission-create- + labels: + app.kubernetes.io/component: admission-webhook + app.kubernetes.io/instance: ingress-nginx + app.kubernetes.io/name: ingress-nginx + controller-uid: 01e1b9b0-bb64-46bc-ab12-1d3e72fbdcbd + job-name: ingress-nginx-admission-create + managedFields: + - apiVersion: v1 + fieldsType: FieldsV1 + fieldsV1: + f:metadata: + f:generateName: {} + f:labels: + .: {} + f:app.kubernetes.io/component: {} + f:app.kubernetes.io/instance: {} + f:app.kubernetes.io/name: {} + f:controller-uid: {} + f:job-name: {} + f:ownerReferences: + .: {} + k:{"uid":"01e1b9b0-bb64-46bc-ab12-1d3e72fbdcbd"}: {} + f:spec: + f:containers: + k:{"name":"create"}: + .: {} + f:args: {} + f:env: + .: {} + k:{"name":"POD_NAMESPACE"}: + .: {} + f:name: {} + f:valueFrom: + .: {} + f:fieldRef: {} + f:image: {} + f:imagePullPolicy: {} + f:name: {} + f:resources: {} + f:securityContext: + .: {} + f:allowPrivilegeEscalation: {} + f:terminationMessagePath: {} + f:terminationMessagePolicy: {} + f:dnsPolicy: {} + f:enableServiceLinks: {} + f:nodeSelector: {} + f:restartPolicy: {} + f:schedulerName: {} + f:securityContext: + .: {} + f:runAsNonRoot: {} + f:runAsUser: {} + f:serviceAccount: {} + f:serviceAccountName: {} + f:terminationGracePeriodSeconds: {} + manager: kube-controller-manager + operation: Update + time: "2024-12-26T23:25:47Z" + - apiVersion: v1 + fieldsType: FieldsV1 + fieldsV1: + f:status: + f:conditions: + k:{"type":"ContainersReady"}: + .: {} + f:lastProbeTime: {} + f:lastTransitionTime: {} + f:reason: {} + f:status: {} + f:type: {} + k:{"type":"Initialized"}: + .: {} + f:lastProbeTime: {} + f:lastTransitionTime: {} + f:reason: {} + f:status: {} + f:type: {} + k:{"type":"Ready"}: + .: {} + f:lastProbeTime: {} + f:lastTransitionTime: {} + f:reason: {} + f:status: {} + f:type: {} + f:containerStatuses: {} + f:hostIP: {} + f:phase: {} + f:podIP: {} + f:podIPs: + .: {} + k:{"ip":"10.244.0.5"}: + .: {} + f:ip: {} + f:startTime: {} + manager: kubelet + operation: Update + subresource: status + time: "2024-12-26T23:25:58Z" + name: ingress-nginx-admission-create-fdk95 + namespace: ingress-nginx + ownerReferences: + - apiVersion: batch/v1 + blockOwnerDeletion: true + controller: true + kind: Job + name: ingress-nginx-admission-create + uid: 01e1b9b0-bb64-46bc-ab12-1d3e72fbdcbd + resourceVersion: "574" + uid: 76c028fe-0db5-45cd-9749-f6c6eafaaf61 + spec: + containers: + - args: + - create + - --host=ingress-nginx-controller-admission,ingress-nginx-controller-admission.$(POD_NAMESPACE).svc + - --namespace=$(POD_NAMESPACE) + - --secret-name=ingress-nginx-admission + env: + - name: POD_NAMESPACE + valueFrom: + fieldRef: + apiVersion: v1 + fieldPath: metadata.namespace + image: registry.k8s.io/ingress-nginx/kube-webhook-certgen:v20220916-gd32f8c343@sha256:39c5b2e3310dc4264d638ad28d9d1d96c4cbb2b2dcfb52368fe4e3c63f61e10f + imagePullPolicy: IfNotPresent + name: create + resources: {} + securityContext: + allowPrivilegeEscalation: false + terminationMessagePath: /dev/termination-log + terminationMessagePolicy: File + volumeMounts: + - mountPath: /var/run/secrets/kubernetes.io/serviceaccount + name: kube-api-access-drtdn + readOnly: true + dnsPolicy: ClusterFirst + enableServiceLinks: true + nodeName: minikube + nodeSelector: + kubernetes.io/os: linux + minikube.k8s.io/primary: "true" + preemptionPolicy: PreemptLowerPriority + priority: 0 + restartPolicy: OnFailure + schedulerName: default-scheduler + securityContext: + runAsNonRoot: true + runAsUser: 2000 + serviceAccount: ingress-nginx-admission + serviceAccountName: ingress-nginx-admission + terminationGracePeriodSeconds: 30 + tolerations: + - effect: NoExecute + key: node.kubernetes.io/not-ready + operator: Exists + tolerationSeconds: 300 + - effect: NoExecute + key: node.kubernetes.io/unreachable + operator: Exists + tolerationSeconds: 300 + volumes: + - name: kube-api-access-drtdn + projected: + defaultMode: 420 + sources: + - serviceAccountToken: + expirationSeconds: 3607 + path: token + - configMap: + items: + - key: ca.crt + path: ca.crt + name: kube-root-ca.crt + - downwardAPI: + items: + - fieldRef: + apiVersion: v1 + fieldPath: metadata.namespace + path: namespace + status: + conditions: + - lastProbeTime: null + lastTransitionTime: "2024-12-26T23:25:47Z" + reason: PodCompleted + status: "True" + type: Initialized + - lastProbeTime: null + lastTransitionTime: "2024-12-26T23:25:47Z" + reason: PodCompleted + status: "False" + type: Ready + - lastProbeTime: null + lastTransitionTime: "2024-12-26T23:25:47Z" + reason: PodCompleted + status: "False" + type: ContainersReady + - lastProbeTime: null + lastTransitionTime: "2024-12-26T23:25:47Z" + status: "True" + type: PodScheduled + containerStatuses: + - containerID: docker://9fbfdb5c49c6eac5170bb0c7f235b1f285d6543e8edb9b2065dd235c599e7ff9 + image: registry.k8s.io/ingress-nginx/kube-webhook-certgen@sha256:39c5b2e3310dc4264d638ad28d9d1d96c4cbb2b2dcfb52368fe4e3c63f61e10f + imageID: docker-pullable://registry.k8s.io/ingress-nginx/kube-webhook-certgen@sha256:39c5b2e3310dc4264d638ad28d9d1d96c4cbb2b2dcfb52368fe4e3c63f61e10f + lastState: {} + name: create + ready: false + restartCount: 0 + started: false + state: + terminated: + containerID: docker://9fbfdb5c49c6eac5170bb0c7f235b1f285d6543e8edb9b2065dd235c599e7ff9 + exitCode: 0 + finishedAt: "2024-12-26T23:25:55Z" + reason: Completed + startedAt: "2024-12-26T23:25:55Z" + hostIP: 192.168.64.7 + phase: Succeeded + podIP: 10.244.0.5 + podIPs: + - ip: 10.244.0.5 + qosClass: BestEffort + startTime: "2024-12-26T23:25:47Z" +- apiVersion: v1 + kind: Pod + metadata: + creationTimestamp: "2024-12-26T23:25:47Z" + generateName: ingress-nginx-admission-patch- + labels: + app.kubernetes.io/component: admission-webhook + app.kubernetes.io/instance: ingress-nginx + app.kubernetes.io/name: ingress-nginx + controller-uid: 8bfaee46-1b1d-4067-b066-2ff0a9911bdf + job-name: ingress-nginx-admission-patch + managedFields: + - apiVersion: v1 + fieldsType: FieldsV1 + fieldsV1: + f:metadata: + f:generateName: {} + f:labels: + .: {} + f:app.kubernetes.io/component: {} + f:app.kubernetes.io/instance: {} + f:app.kubernetes.io/name: {} + f:controller-uid: {} + f:job-name: {} + f:ownerReferences: + .: {} + k:{"uid":"8bfaee46-1b1d-4067-b066-2ff0a9911bdf"}: {} + f:spec: + f:containers: + k:{"name":"patch"}: + .: {} + f:args: {} + f:env: + .: {} + k:{"name":"POD_NAMESPACE"}: + .: {} + f:name: {} + f:valueFrom: + .: {} + f:fieldRef: {} + f:image: {} + f:imagePullPolicy: {} + f:name: {} + f:resources: {} + f:securityContext: + .: {} + f:allowPrivilegeEscalation: {} + f:terminationMessagePath: {} + f:terminationMessagePolicy: {} + f:dnsPolicy: {} + f:enableServiceLinks: {} + f:nodeSelector: {} + f:restartPolicy: {} + f:schedulerName: {} + f:securityContext: + .: {} + f:runAsNonRoot: {} + f:runAsUser: {} + f:serviceAccount: {} + f:serviceAccountName: {} + f:terminationGracePeriodSeconds: {} + manager: kube-controller-manager + operation: Update + time: "2024-12-26T23:25:47Z" + - apiVersion: v1 + fieldsType: FieldsV1 + fieldsV1: + f:status: + f:conditions: + k:{"type":"ContainersReady"}: + .: {} + f:lastProbeTime: {} + f:lastTransitionTime: {} + f:reason: {} + f:status: {} + f:type: {} + k:{"type":"Initialized"}: + .: {} + f:lastProbeTime: {} + f:lastTransitionTime: {} + f:reason: {} + f:status: {} + f:type: {} + k:{"type":"Ready"}: + .: {} + f:lastProbeTime: {} + f:lastTransitionTime: {} + f:reason: {} + f:status: {} + f:type: {} + f:containerStatuses: {} + f:hostIP: {} + f:phase: {} + f:podIP: {} + f:podIPs: + .: {} + k:{"ip":"10.244.0.6"}: + .: {} + f:ip: {} + f:startTime: {} + manager: kubelet + operation: Update + subresource: status + time: "2024-12-26T23:25:58Z" + name: ingress-nginx-admission-patch-97fmh + namespace: ingress-nginx + ownerReferences: + - apiVersion: batch/v1 + blockOwnerDeletion: true + controller: true + kind: Job + name: ingress-nginx-admission-patch + uid: 8bfaee46-1b1d-4067-b066-2ff0a9911bdf + resourceVersion: "575" + uid: c88ae5c6-1294-40d7-8721-e723d07e02e1 + spec: + containers: + - args: + - patch + - --webhook-name=ingress-nginx-admission + - --namespace=$(POD_NAMESPACE) + - --patch-mutating=false + - --secret-name=ingress-nginx-admission + - --patch-failure-policy=Fail + env: + - name: POD_NAMESPACE + valueFrom: + fieldRef: + apiVersion: v1 + fieldPath: metadata.namespace + image: registry.k8s.io/ingress-nginx/kube-webhook-certgen:v20220916-gd32f8c343@sha256:39c5b2e3310dc4264d638ad28d9d1d96c4cbb2b2dcfb52368fe4e3c63f61e10f + imagePullPolicy: IfNotPresent + name: patch + resources: {} + securityContext: + allowPrivilegeEscalation: false + terminationMessagePath: /dev/termination-log + terminationMessagePolicy: File + volumeMounts: + - mountPath: /var/run/secrets/kubernetes.io/serviceaccount + name: kube-api-access-rrpjd + readOnly: true + dnsPolicy: ClusterFirst + enableServiceLinks: true + nodeName: minikube + nodeSelector: + kubernetes.io/os: linux + minikube.k8s.io/primary: "true" + preemptionPolicy: PreemptLowerPriority + priority: 0 + restartPolicy: OnFailure + schedulerName: default-scheduler + securityContext: + runAsNonRoot: true + runAsUser: 2000 + serviceAccount: ingress-nginx-admission + serviceAccountName: ingress-nginx-admission + terminationGracePeriodSeconds: 30 + tolerations: + - effect: NoExecute + key: node.kubernetes.io/not-ready + operator: Exists + tolerationSeconds: 300 + - effect: NoExecute + key: node.kubernetes.io/unreachable + operator: Exists + tolerationSeconds: 300 + volumes: + - name: kube-api-access-rrpjd + projected: + defaultMode: 420 + sources: + - serviceAccountToken: + expirationSeconds: 3607 + path: token + - configMap: + items: + - key: ca.crt + path: ca.crt + name: kube-root-ca.crt + - downwardAPI: + items: + - fieldRef: + apiVersion: v1 + fieldPath: metadata.namespace + path: namespace + status: + conditions: + - lastProbeTime: null + lastTransitionTime: "2024-12-26T23:25:47Z" + reason: PodCompleted + status: "True" + type: Initialized + - lastProbeTime: null + lastTransitionTime: "2024-12-26T23:25:47Z" + reason: PodCompleted + status: "False" + type: Ready + - lastProbeTime: null + lastTransitionTime: "2024-12-26T23:25:47Z" + reason: PodCompleted + status: "False" + type: ContainersReady + - lastProbeTime: null + lastTransitionTime: "2024-12-26T23:25:47Z" + status: "True" + type: PodScheduled + containerStatuses: + - containerID: docker://a35bf4e8251f0ffe56bab48511a1ccd88b11b47c06a8a489d03935a0d5e02905 + image: registry.k8s.io/ingress-nginx/kube-webhook-certgen@sha256:39c5b2e3310dc4264d638ad28d9d1d96c4cbb2b2dcfb52368fe4e3c63f61e10f + imageID: docker-pullable://registry.k8s.io/ingress-nginx/kube-webhook-certgen@sha256:39c5b2e3310dc4264d638ad28d9d1d96c4cbb2b2dcfb52368fe4e3c63f61e10f + lastState: {} + name: patch + ready: false + restartCount: 0 + started: false + state: + terminated: + containerID: docker://a35bf4e8251f0ffe56bab48511a1ccd88b11b47c06a8a489d03935a0d5e02905 + exitCode: 0 + finishedAt: "2024-12-26T23:25:55Z" + reason: Completed + startedAt: "2024-12-26T23:25:55Z" + hostIP: 192.168.64.7 + phase: Succeeded + podIP: 10.244.0.6 + podIPs: + - ip: 10.244.0.6 + qosClass: BestEffort + startTime: "2024-12-26T23:25:47Z" +- apiVersion: v1 + kind: Pod + metadata: + creationTimestamp: "2024-12-26T23:25:47Z" + generateName: ingress-nginx-controller-77669ff58- + labels: + app.kubernetes.io/component: controller + app.kubernetes.io/instance: ingress-nginx + app.kubernetes.io/name: ingress-nginx + gcp-auth-skip-secret: "true" + pod-template-hash: 77669ff58 + managedFields: + - apiVersion: v1 + fieldsType: FieldsV1 + fieldsV1: + f:metadata: + f:generateName: {} + f:labels: + .: {} + f:app.kubernetes.io/component: {} + f:app.kubernetes.io/instance: {} + f:app.kubernetes.io/name: {} + f:gcp-auth-skip-secret: {} + f:pod-template-hash: {} + f:ownerReferences: + .: {} + k:{"uid":"52d07913-e848-49ad-b81c-8581f7f2ce6d"}: {} + f:spec: + f:containers: + k:{"name":"controller"}: + .: {} + f:args: {} + f:env: + .: {} + k:{"name":"LD_PRELOAD"}: + .: {} + f:name: {} + f:value: {} + k:{"name":"POD_NAME"}: + .: {} + f:name: {} + f:valueFrom: + .: {} + f:fieldRef: {} + k:{"name":"POD_NAMESPACE"}: + .: {} + f:name: {} + f:valueFrom: + .: {} + f:fieldRef: {} + f:image: {} + f:imagePullPolicy: {} + f:lifecycle: + .: {} + f:preStop: + .: {} + f:exec: + .: {} + f:command: {} + f:livenessProbe: + .: {} + f:failureThreshold: {} + f:httpGet: + .: {} + f:path: {} + f:port: {} + f:scheme: {} + f:initialDelaySeconds: {} + f:periodSeconds: {} + f:successThreshold: {} + f:timeoutSeconds: {} + f:name: {} + f:ports: + .: {} + k:{"containerPort":80,"protocol":"TCP"}: + .: {} + f:containerPort: {} + f:hostPort: {} + f:name: {} + f:protocol: {} + k:{"containerPort":443,"protocol":"TCP"}: + .: {} + f:containerPort: {} + f:hostPort: {} + f:name: {} + f:protocol: {} + k:{"containerPort":8443,"protocol":"TCP"}: + .: {} + f:containerPort: {} + f:name: {} + f:protocol: {} + f:readinessProbe: + .: {} + f:failureThreshold: {} + f:httpGet: + .: {} + f:path: {} + f:port: {} + f:scheme: {} + f:initialDelaySeconds: {} + f:periodSeconds: {} + f:successThreshold: {} + f:timeoutSeconds: {} + f:resources: + .: {} + f:requests: + .: {} + f:cpu: {} + f:memory: {} + f:securityContext: + .: {} + f:allowPrivilegeEscalation: {} + f:capabilities: + .: {} + f:add: {} + f:drop: {} + f:runAsUser: {} + f:terminationMessagePath: {} + f:terminationMessagePolicy: {} + f:volumeMounts: + .: {} + k:{"mountPath":"/usr/local/certificates/"}: + .: {} + f:mountPath: {} + f:name: {} + f:readOnly: {} + f:dnsPolicy: {} + f:enableServiceLinks: {} + f:nodeSelector: {} + f:restartPolicy: {} + f:schedulerName: {} + f:securityContext: {} + f:serviceAccount: {} + f:serviceAccountName: {} + f:terminationGracePeriodSeconds: {} + f:tolerations: {} + f:volumes: + .: {} + k:{"name":"webhook-cert"}: + .: {} + f:name: {} + f:secret: + .: {} + f:defaultMode: {} + f:secretName: {} + manager: kube-controller-manager + operation: Update + time: "2024-12-26T23:25:47Z" + - apiVersion: v1 + fieldsType: FieldsV1 + fieldsV1: + f:status: + f:conditions: + k:{"type":"ContainersReady"}: + .: {} + f:lastProbeTime: {} + f:lastTransitionTime: {} + f:status: {} + f:type: {} + k:{"type":"Initialized"}: + .: {} + f:lastProbeTime: {} + f:lastTransitionTime: {} + f:status: {} + f:type: {} + k:{"type":"Ready"}: + .: {} + f:lastProbeTime: {} + f:lastTransitionTime: {} + f:status: {} + f:type: {} + f:containerStatuses: {} + f:hostIP: {} + f:phase: {} + f:podIP: {} + f:podIPs: + .: {} + k:{"ip":"10.244.0.7"}: + .: {} + f:ip: {} + f:startTime: {} + manager: kubelet + operation: Update + subresource: status + time: "2024-12-27T17:53:23Z" + name: ingress-nginx-controller-77669ff58-dzr84 + namespace: ingress-nginx + ownerReferences: + - apiVersion: apps/v1 + blockOwnerDeletion: true + controller: true + kind: ReplicaSet + name: ingress-nginx-controller-77669ff58 + uid: 52d07913-e848-49ad-b81c-8581f7f2ce6d + resourceVersion: "41912" + uid: c0fe70fb-5b02-44d4-8eaa-3a07788587c7 + spec: + containers: + - args: + - /nginx-ingress-controller + - --election-id=ingress-nginx-leader + - --controller-class=k8s.io/ingress-nginx + - --watch-ingress-without-class=true + - --configmap=$(POD_NAMESPACE)/ingress-nginx-controller + - --tcp-services-configmap=$(POD_NAMESPACE)/tcp-services + - --udp-services-configmap=$(POD_NAMESPACE)/udp-services + - --validating-webhook=:8443 + - --validating-webhook-certificate=/usr/local/certificates/cert + - --validating-webhook-key=/usr/local/certificates/key + env: + - name: POD_NAME + valueFrom: + fieldRef: + apiVersion: v1 + fieldPath: metadata.name + - name: POD_NAMESPACE + valueFrom: + fieldRef: + apiVersion: v1 + fieldPath: metadata.namespace + - name: LD_PRELOAD + value: /usr/local/lib/libmimalloc.so + image: registry.k8s.io/ingress-nginx/controller:v1.5.1@sha256:4ba73c697770664c1e00e9f968de14e08f606ff961c76e5d7033a4a9c593c629 + imagePullPolicy: IfNotPresent + lifecycle: + preStop: + exec: + command: + - /wait-shutdown + livenessProbe: + failureThreshold: 5 + httpGet: + path: /healthz + port: 10254 + scheme: HTTP + initialDelaySeconds: 10 + periodSeconds: 10 + successThreshold: 1 + timeoutSeconds: 1 + name: controller + ports: + - containerPort: 80 + hostPort: 80 + name: http + protocol: TCP + - containerPort: 443 + hostPort: 443 + name: https + protocol: TCP + - containerPort: 8443 + name: webhook + protocol: TCP + readinessProbe: + failureThreshold: 3 + httpGet: + path: /healthz + port: 10254 + scheme: HTTP + initialDelaySeconds: 10 + periodSeconds: 10 + successThreshold: 1 + timeoutSeconds: 1 + resources: + requests: + cpu: 100m + memory: 90Mi + securityContext: + allowPrivilegeEscalation: true + capabilities: + add: + - NET_BIND_SERVICE + drop: + - ALL + runAsUser: 101 + terminationMessagePath: /dev/termination-log + terminationMessagePolicy: File + volumeMounts: + - mountPath: /usr/local/certificates/ + name: webhook-cert + readOnly: true + - mountPath: /var/run/secrets/kubernetes.io/serviceaccount + name: kube-api-access-tpw2r + readOnly: true + dnsPolicy: ClusterFirst + enableServiceLinks: true + nodeName: minikube + nodeSelector: + kubernetes.io/os: linux + minikube.k8s.io/primary: "true" + preemptionPolicy: PreemptLowerPriority + priority: 0 + restartPolicy: Always + schedulerName: default-scheduler + securityContext: {} + serviceAccount: ingress-nginx + serviceAccountName: ingress-nginx + terminationGracePeriodSeconds: 0 + tolerations: + - effect: NoSchedule + key: node-role.kubernetes.io/master + operator: Equal + - effect: NoExecute + key: node.kubernetes.io/not-ready + operator: Exists + tolerationSeconds: 300 + - effect: NoExecute + key: node.kubernetes.io/unreachable + operator: Exists + tolerationSeconds: 300 + volumes: + - name: webhook-cert + secret: + defaultMode: 420 + secretName: ingress-nginx-admission + - name: kube-api-access-tpw2r + projected: + defaultMode: 420 + sources: + - serviceAccountToken: + expirationSeconds: 3607 + path: token + - configMap: + items: + - key: ca.crt + path: ca.crt + name: kube-root-ca.crt + - downwardAPI: + items: + - fieldRef: + apiVersion: v1 + fieldPath: metadata.namespace + path: namespace + status: + conditions: + - lastProbeTime: null + lastTransitionTime: "2024-12-26T23:25:47Z" + status: "True" + type: Initialized + - lastProbeTime: null + lastTransitionTime: "2024-12-26T23:26:53Z" + status: "True" + type: Ready + - lastProbeTime: null + lastTransitionTime: "2024-12-26T23:26:53Z" + status: "True" + type: ContainersReady + - lastProbeTime: null + lastTransitionTime: "2024-12-26T23:25:47Z" + status: "True" + type: PodScheduled + containerStatuses: + - containerID: docker://5fc4ea29a11a6679d1550e73dbba1255a3cf25686ee58a15a4b427bdf69beb3e + image: registry.k8s.io/ingress-nginx/controller@sha256:4ba73c697770664c1e00e9f968de14e08f606ff961c76e5d7033a4a9c593c629 + imageID: docker-pullable://registry.k8s.io/ingress-nginx/controller@sha256:4ba73c697770664c1e00e9f968de14e08f606ff961c76e5d7033a4a9c593c629 + lastState: {} + name: controller + ready: true + restartCount: 0 + started: true + state: + running: + startedAt: "2024-12-26T23:26:42Z" + hostIP: 192.168.64.7 + phase: Running + podIP: 10.244.0.7 + podIPs: + - ip: 10.244.0.7 + qosClass: Burstable + startTime: "2024-12-26T23:25:47Z" +- apiVersion: apps/v1 + kind: ReplicaSet + metadata: + annotations: + deployment.kubernetes.io/desired-replicas: "1" + deployment.kubernetes.io/max-replicas: "2" + deployment.kubernetes.io/revision: "1" + creationTimestamp: "2024-12-26T23:25:47Z" + generation: 1 + labels: + app.kubernetes.io/component: controller + app.kubernetes.io/instance: ingress-nginx + app.kubernetes.io/name: ingress-nginx + gcp-auth-skip-secret: "true" + pod-template-hash: 77669ff58 + managedFields: + - apiVersion: apps/v1 + fieldsType: FieldsV1 + fieldsV1: + f:metadata: + f:annotations: + .: {} + f:deployment.kubernetes.io/desired-replicas: {} + f:deployment.kubernetes.io/max-replicas: {} + f:deployment.kubernetes.io/revision: {} + f:labels: + .: {} + f:app.kubernetes.io/component: {} + f:app.kubernetes.io/instance: {} + f:app.kubernetes.io/name: {} + f:gcp-auth-skip-secret: {} + f:pod-template-hash: {} + f:ownerReferences: + .: {} + k:{"uid":"3b92e91d-a21c-40ab-ada7-643805ec26d5"}: {} + f:spec: + f:replicas: {} + f:selector: {} + f:template: + f:metadata: + f:labels: + .: {} + f:app.kubernetes.io/component: {} + f:app.kubernetes.io/instance: {} + f:app.kubernetes.io/name: {} + f:gcp-auth-skip-secret: {} + f:pod-template-hash: {} + f:spec: + f:containers: + k:{"name":"controller"}: + .: {} + f:args: {} + f:env: + .: {} + k:{"name":"LD_PRELOAD"}: + .: {} + f:name: {} + f:value: {} + k:{"name":"POD_NAME"}: + .: {} + f:name: {} + f:valueFrom: + .: {} + f:fieldRef: {} + k:{"name":"POD_NAMESPACE"}: + .: {} + f:name: {} + f:valueFrom: + .: {} + f:fieldRef: {} + f:image: {} + f:imagePullPolicy: {} + f:lifecycle: + .: {} + f:preStop: + .: {} + f:exec: + .: {} + f:command: {} + f:livenessProbe: + .: {} + f:failureThreshold: {} + f:httpGet: + .: {} + f:path: {} + f:port: {} + f:scheme: {} + f:initialDelaySeconds: {} + f:periodSeconds: {} + f:successThreshold: {} + f:timeoutSeconds: {} + f:name: {} + f:ports: + .: {} + k:{"containerPort":80,"protocol":"TCP"}: + .: {} + f:containerPort: {} + f:hostPort: {} + f:name: {} + f:protocol: {} + k:{"containerPort":443,"protocol":"TCP"}: + .: {} + f:containerPort: {} + f:hostPort: {} + f:name: {} + f:protocol: {} + k:{"containerPort":8443,"protocol":"TCP"}: + .: {} + f:containerPort: {} + f:name: {} + f:protocol: {} + f:readinessProbe: + .: {} + f:failureThreshold: {} + f:httpGet: + .: {} + f:path: {} + f:port: {} + f:scheme: {} + f:initialDelaySeconds: {} + f:periodSeconds: {} + f:successThreshold: {} + f:timeoutSeconds: {} + f:resources: + .: {} + f:requests: + .: {} + f:cpu: {} + f:memory: {} + f:securityContext: + .: {} + f:allowPrivilegeEscalation: {} + f:capabilities: + .: {} + f:add: {} + f:drop: {} + f:runAsUser: {} + f:terminationMessagePath: {} + f:terminationMessagePolicy: {} + f:volumeMounts: + .: {} + k:{"mountPath":"/usr/local/certificates/"}: + .: {} + f:mountPath: {} + f:name: {} + f:readOnly: {} + f:dnsPolicy: {} + f:nodeSelector: {} + f:restartPolicy: {} + f:schedulerName: {} + f:securityContext: {} + f:serviceAccount: {} + f:serviceAccountName: {} + f:terminationGracePeriodSeconds: {} + f:tolerations: {} + f:volumes: + .: {} + k:{"name":"webhook-cert"}: + .: {} + f:name: {} + f:secret: + .: {} + f:defaultMode: {} + f:secretName: {} + manager: kube-controller-manager + operation: Update + time: "2024-12-26T23:25:47Z" + - apiVersion: apps/v1 + fieldsType: FieldsV1 + fieldsV1: + f:status: + f:availableReplicas: {} + f:fullyLabeledReplicas: {} + f:observedGeneration: {} + f:readyReplicas: {} + f:replicas: {} + manager: kube-controller-manager + operation: Update + subresource: status + time: "2024-12-27T17:53:23Z" + name: ingress-nginx-controller-77669ff58 + namespace: ingress-nginx + ownerReferences: + - apiVersion: apps/v1 + blockOwnerDeletion: true + controller: true + kind: Deployment + name: ingress-nginx-controller + uid: 3b92e91d-a21c-40ab-ada7-643805ec26d5 + resourceVersion: "41918" + uid: 52d07913-e848-49ad-b81c-8581f7f2ce6d + spec: + replicas: 1 + selector: + matchLabels: + app.kubernetes.io/component: controller + app.kubernetes.io/instance: ingress-nginx + app.kubernetes.io/name: ingress-nginx + pod-template-hash: 77669ff58 + template: + metadata: + creationTimestamp: null + labels: + app.kubernetes.io/component: controller + app.kubernetes.io/instance: ingress-nginx + app.kubernetes.io/name: ingress-nginx + gcp-auth-skip-secret: "true" + pod-template-hash: 77669ff58 + spec: + containers: + - args: + - /nginx-ingress-controller + - --election-id=ingress-nginx-leader + - --controller-class=k8s.io/ingress-nginx + - --watch-ingress-without-class=true + - --configmap=$(POD_NAMESPACE)/ingress-nginx-controller + - --tcp-services-configmap=$(POD_NAMESPACE)/tcp-services + - --udp-services-configmap=$(POD_NAMESPACE)/udp-services + - --validating-webhook=:8443 + - --validating-webhook-certificate=/usr/local/certificates/cert + - --validating-webhook-key=/usr/local/certificates/key + env: + - name: POD_NAME + valueFrom: + fieldRef: + apiVersion: v1 + fieldPath: metadata.name + - name: POD_NAMESPACE + valueFrom: + fieldRef: + apiVersion: v1 + fieldPath: metadata.namespace + - name: LD_PRELOAD + value: /usr/local/lib/libmimalloc.so + image: registry.k8s.io/ingress-nginx/controller:v1.5.1@sha256:4ba73c697770664c1e00e9f968de14e08f606ff961c76e5d7033a4a9c593c629 + imagePullPolicy: IfNotPresent + lifecycle: + preStop: + exec: + command: + - /wait-shutdown + livenessProbe: + failureThreshold: 5 + httpGet: + path: /healthz + port: 10254 + scheme: HTTP + initialDelaySeconds: 10 + periodSeconds: 10 + successThreshold: 1 + timeoutSeconds: 1 + name: controller + ports: + - containerPort: 80 + hostPort: 80 + name: http + protocol: TCP + - containerPort: 443 + hostPort: 443 + name: https + protocol: TCP + - containerPort: 8443 + name: webhook + protocol: TCP + readinessProbe: + failureThreshold: 3 + httpGet: + path: /healthz + port: 10254 + scheme: HTTP + initialDelaySeconds: 10 + periodSeconds: 10 + successThreshold: 1 + timeoutSeconds: 1 + resources: + requests: + cpu: 100m + memory: 90Mi + securityContext: + allowPrivilegeEscalation: true + capabilities: + add: + - NET_BIND_SERVICE + drop: + - ALL + runAsUser: 101 + terminationMessagePath: /dev/termination-log + terminationMessagePolicy: File + volumeMounts: + - mountPath: /usr/local/certificates/ + name: webhook-cert + readOnly: true + dnsPolicy: ClusterFirst + nodeSelector: + kubernetes.io/os: linux + minikube.k8s.io/primary: "true" + restartPolicy: Always + schedulerName: default-scheduler + securityContext: {} + serviceAccount: ingress-nginx + serviceAccountName: ingress-nginx + terminationGracePeriodSeconds: 0 + tolerations: + - effect: NoSchedule + key: node-role.kubernetes.io/master + operator: Equal + volumes: + - name: webhook-cert + secret: + defaultMode: 420 + secretName: ingress-nginx-admission + status: + availableReplicas: 1 + fullyLabeledReplicas: 1 + observedGeneration: 1 + readyReplicas: 1 + replicas: 1 +- apiVersion: rbac.authorization.k8s.io/v1 + kind: Role + metadata: + annotations: + kubectl.kubernetes.io/last-applied-configuration: | + {"apiVersion":"rbac.authorization.k8s.io/v1","kind":"Role","metadata":{"annotations":{},"labels":{"app.kubernetes.io/component":"controller","app.kubernetes.io/instance":"ingress-nginx","app.kubernetes.io/name":"ingress-nginx"},"name":"ingress-nginx","namespace":"ingress-nginx"},"rules":[{"apiGroups":[""],"resources":["namespaces"],"verbs":["get"]},{"apiGroups":[""],"resources":["configmaps","pods","secrets","endpoints"],"verbs":["get","list","watch"]},{"apiGroups":[""],"resources":["services"],"verbs":["get","list","watch"]},{"apiGroups":["networking.k8s.io"],"resources":["ingresses"],"verbs":["get","list","watch"]},{"apiGroups":["networking.k8s.io"],"resources":["ingresses/status"],"verbs":["update"]},{"apiGroups":["networking.k8s.io"],"resources":["ingressclasses"],"verbs":["get","list","watch"]},{"apiGroups":[""],"resourceNames":["ingress-nginx-leader"],"resources":["configmaps"],"verbs":["get","update"]},{"apiGroups":[""],"resources":["configmaps"],"verbs":["create"]},{"apiGroups":["coordination.k8s.io"],"resourceNames":["ingress-nginx-leader"],"resources":["leases"],"verbs":["get","update"]},{"apiGroups":["coordination.k8s.io"],"resources":["leases"],"verbs":["create"]},{"apiGroups":[""],"resources":["events"],"verbs":["create","patch"]},{"apiGroups":["discovery.k8s.io"],"resources":["endpointslices"],"verbs":["list","watch","get"]}]} + creationTimestamp: "2024-12-26T23:25:47Z" + labels: + app.kubernetes.io/component: controller + app.kubernetes.io/instance: ingress-nginx + app.kubernetes.io/name: ingress-nginx + managedFields: + - apiVersion: rbac.authorization.k8s.io/v1 + fieldsType: FieldsV1 + fieldsV1: + f:metadata: + f:annotations: + .: {} + f:kubectl.kubernetes.io/last-applied-configuration: {} + f:labels: + .: {} + f:app.kubernetes.io/component: {} + f:app.kubernetes.io/instance: {} + f:app.kubernetes.io/name: {} + f:rules: {} + manager: kubectl-client-side-apply + operation: Update + time: "2024-12-26T23:25:47Z" + name: ingress-nginx + namespace: ingress-nginx + resourceVersion: "492" + uid: 4ce88b37-408b-4548-bb4c-3d943192c709 + rules: + - apiGroups: + - "" + resources: + - namespaces + verbs: + - get + - apiGroups: + - "" + resources: + - configmaps + - pods + - secrets + - endpoints + verbs: + - get + - list + - watch + - apiGroups: + - "" + resources: + - services + verbs: + - get + - list + - watch + - apiGroups: + - networking.k8s.io + resources: + - ingresses + verbs: + - get + - list + - watch + - apiGroups: + - networking.k8s.io + resources: + - ingresses/status + verbs: + - update + - apiGroups: + - networking.k8s.io + resources: + - ingressclasses + verbs: + - get + - list + - watch + - apiGroups: + - "" + resourceNames: + - ingress-nginx-leader + resources: + - configmaps + verbs: + - get + - update + - apiGroups: + - "" + resources: + - configmaps + verbs: + - create + - apiGroups: + - coordination.k8s.io + resourceNames: + - ingress-nginx-leader + resources: + - leases + verbs: + - get + - update + - apiGroups: + - coordination.k8s.io + resources: + - leases + verbs: + - create + - apiGroups: + - "" + resources: + - events + verbs: + - create + - patch + - apiGroups: + - discovery.k8s.io + resources: + - endpointslices + verbs: + - list + - watch + - get +- apiVersion: rbac.authorization.k8s.io/v1 + kind: Role + metadata: + annotations: + kubectl.kubernetes.io/last-applied-configuration: | + {"apiVersion":"rbac.authorization.k8s.io/v1","kind":"Role","metadata":{"annotations":{},"labels":{"app.kubernetes.io/component":"admission-webhook","app.kubernetes.io/instance":"ingress-nginx","app.kubernetes.io/name":"ingress-nginx"},"name":"ingress-nginx-admission","namespace":"ingress-nginx"},"rules":[{"apiGroups":[""],"resources":["secrets"],"verbs":["get","create"]}]} + creationTimestamp: "2024-12-26T23:25:47Z" + labels: + app.kubernetes.io/component: admission-webhook + app.kubernetes.io/instance: ingress-nginx + app.kubernetes.io/name: ingress-nginx + managedFields: + - apiVersion: rbac.authorization.k8s.io/v1 + fieldsType: FieldsV1 + fieldsV1: + f:metadata: + f:annotations: + .: {} + f:kubectl.kubernetes.io/last-applied-configuration: {} + f:labels: + .: {} + f:app.kubernetes.io/component: {} + f:app.kubernetes.io/instance: {} + f:app.kubernetes.io/name: {} + f:rules: {} + manager: kubectl-client-side-apply + operation: Update + time: "2024-12-26T23:25:47Z" + name: ingress-nginx-admission + namespace: ingress-nginx + resourceVersion: "493" + uid: 6d733c56-2f3c-48f3-a918-26ec465f5f77 + rules: + - apiGroups: + - "" + resources: + - secrets + verbs: + - get + - create +- apiVersion: rbac.authorization.k8s.io/v1 + kind: RoleBinding + metadata: + annotations: + kubectl.kubernetes.io/last-applied-configuration: | + {"apiVersion":"rbac.authorization.k8s.io/v1","kind":"RoleBinding","metadata":{"annotations":{},"labels":{"app.kubernetes.io/component":"controller","app.kubernetes.io/instance":"ingress-nginx","app.kubernetes.io/name":"ingress-nginx"},"name":"ingress-nginx","namespace":"ingress-nginx"},"roleRef":{"apiGroup":"rbac.authorization.k8s.io","kind":"Role","name":"ingress-nginx"},"subjects":[{"kind":"ServiceAccount","name":"ingress-nginx","namespace":"ingress-nginx"}]} + creationTimestamp: "2024-12-26T23:25:47Z" + labels: + app.kubernetes.io/component: controller + app.kubernetes.io/instance: ingress-nginx + app.kubernetes.io/name: ingress-nginx + managedFields: + - apiVersion: rbac.authorization.k8s.io/v1 + fieldsType: FieldsV1 + fieldsV1: + f:metadata: + f:annotations: + .: {} + f:kubectl.kubernetes.io/last-applied-configuration: {} + f:labels: + .: {} + f:app.kubernetes.io/component: {} + f:app.kubernetes.io/instance: {} + f:app.kubernetes.io/name: {} + f:roleRef: {} + f:subjects: {} + manager: kubectl-client-side-apply + operation: Update + time: "2024-12-26T23:25:47Z" + name: ingress-nginx + namespace: ingress-nginx + resourceVersion: "496" + uid: 72122120-3e79-4e28-a854-7d175414322f + roleRef: + apiGroup: rbac.authorization.k8s.io + kind: Role + name: ingress-nginx + subjects: + - kind: ServiceAccount + name: ingress-nginx + namespace: ingress-nginx +- apiVersion: rbac.authorization.k8s.io/v1 + kind: RoleBinding + metadata: + annotations: + kubectl.kubernetes.io/last-applied-configuration: | + {"apiVersion":"rbac.authorization.k8s.io/v1","kind":"RoleBinding","metadata":{"annotations":{},"labels":{"app.kubernetes.io/component":"admission-webhook","app.kubernetes.io/instance":"ingress-nginx","app.kubernetes.io/name":"ingress-nginx"},"name":"ingress-nginx-admission","namespace":"ingress-nginx"},"roleRef":{"apiGroup":"rbac.authorization.k8s.io","kind":"Role","name":"ingress-nginx-admission"},"subjects":[{"kind":"ServiceAccount","name":"ingress-nginx-admission","namespace":"ingress-nginx"}]} + creationTimestamp: "2024-12-26T23:25:47Z" + labels: + app.kubernetes.io/component: admission-webhook + app.kubernetes.io/instance: ingress-nginx + app.kubernetes.io/name: ingress-nginx + managedFields: + - apiVersion: rbac.authorization.k8s.io/v1 + fieldsType: FieldsV1 + fieldsV1: + f:metadata: + f:annotations: + .: {} + f:kubectl.kubernetes.io/last-applied-configuration: {} + f:labels: + .: {} + f:app.kubernetes.io/component: {} + f:app.kubernetes.io/instance: {} + f:app.kubernetes.io/name: {} + f:roleRef: {} + f:subjects: {} + manager: kubectl-client-side-apply + operation: Update + time: "2024-12-26T23:25:47Z" + name: ingress-nginx-admission + namespace: ingress-nginx + resourceVersion: "497" + uid: 2b4f4703-3abd-43a0-b4a4-c33af70dac07 + roleRef: + apiGroup: rbac.authorization.k8s.io + kind: Role + name: ingress-nginx-admission + subjects: + - kind: ServiceAccount + name: ingress-nginx-admission + namespace: ingress-nginx +- apiVersion: v1 + data: + ca: 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 + cert: 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 + key: LS0tLS1CRUdJTiBFQyBQUklWQVRFIEtFWS0tLS0tCk1IY0NBUUVFSUV2emVBZFA4S3JqSFcvekVvVzNxeGhOOUFjcS9CUG5JZzBqVkVDbktpdnVvQW9HQ0NxR1NNNDkKQXdFSG9VUURRZ0FFUE5tS1NwaFVxWE4rS0xxREFZUmRFdjlXZ0JPUjFobTNlSlB4TkRkNENnQkJXTU9OSHF3YQpWY21TSkdFMUtKNTFWT0hycC9WZjhhZ0g0NkF3clFtRnJBPT0KLS0tLS1FTkQgRUMgUFJJVkFURSBLRVktLS0tLQo= + kind: Secret + metadata: + creationTimestamp: "2024-12-26T23:25:55Z" + managedFields: + - apiVersion: v1 + fieldsType: FieldsV1 + fieldsV1: + f:data: + .: {} + f:ca: {} + f:cert: {} + f:key: {} + f:type: {} + manager: kube-webhook-certgen + operation: Update + time: "2024-12-26T23:25:55Z" + name: ingress-nginx-admission + namespace: ingress-nginx + resourceVersion: "561" + uid: 29b020b8-c68d-401b-90a0-d487f06abd78 + type: Opaque +- apiVersion: v1 + kind: Service + metadata: + annotations: + kubectl.kubernetes.io/last-applied-configuration: | + {"apiVersion":"v1","kind":"Service","metadata":{"annotations":{},"labels":{"app.kubernetes.io/component":"controller","app.kubernetes.io/instance":"ingress-nginx","app.kubernetes.io/name":"ingress-nginx"},"name":"ingress-nginx-controller","namespace":"ingress-nginx"},"spec":{"ipFamilies":["IPv4"],"ipFamilyPolicy":"SingleStack","ports":[{"appProtocol":"http","name":"http","port":80,"protocol":"TCP","targetPort":"http"},{"appProtocol":"https","name":"https","port":443,"protocol":"TCP","targetPort":"https"}],"selector":{"app.kubernetes.io/component":"controller","app.kubernetes.io/instance":"ingress-nginx","app.kubernetes.io/name":"ingress-nginx"},"type":"NodePort"}} + creationTimestamp: "2024-12-26T23:25:47Z" + labels: + app.kubernetes.io/component: controller + app.kubernetes.io/instance: ingress-nginx + app.kubernetes.io/name: ingress-nginx + managedFields: + - apiVersion: v1 + fieldsType: FieldsV1 + fieldsV1: + f:metadata: + f:annotations: + .: {} + f:kubectl.kubernetes.io/last-applied-configuration: {} + f:labels: + .: {} + f:app.kubernetes.io/component: {} + f:app.kubernetes.io/instance: {} + f:app.kubernetes.io/name: {} + f:spec: + f:externalTrafficPolicy: {} + f:internalTrafficPolicy: {} + f:ipFamilies: {} + f:ipFamilyPolicy: {} + f:ports: + .: {} + k:{"port":80,"protocol":"TCP"}: + .: {} + f:appProtocol: {} + f:name: {} + f:port: {} + f:protocol: {} + f:targetPort: {} + k:{"port":443,"protocol":"TCP"}: + .: {} + f:appProtocol: {} + f:name: {} + f:port: {} + f:protocol: {} + f:targetPort: {} + f:selector: {} + f:sessionAffinity: {} + f:type: {} + manager: kubectl-client-side-apply + operation: Update + time: "2024-12-26T23:25:47Z" + name: ingress-nginx-controller + namespace: ingress-nginx + resourceVersion: "506" + uid: 2a178d28-2708-44d6-8b25-72e33065eb05 + spec: + clusterIP: 10.110.210.62 + clusterIPs: + - 10.110.210.62 + externalTrafficPolicy: Cluster + internalTrafficPolicy: Cluster + ipFamilies: + - IPv4 + ipFamilyPolicy: SingleStack + ports: + - appProtocol: http + name: http + nodePort: 31886 + port: 80 + protocol: TCP + targetPort: http + - appProtocol: https + name: https + nodePort: 30497 + port: 443 + protocol: TCP + targetPort: https + selector: + app.kubernetes.io/component: controller + app.kubernetes.io/instance: ingress-nginx + app.kubernetes.io/name: ingress-nginx + sessionAffinity: None + type: NodePort + status: + loadBalancer: {} +- apiVersion: v1 + kind: Service + metadata: + annotations: + kubectl.kubernetes.io/last-applied-configuration: | + {"apiVersion":"v1","kind":"Service","metadata":{"annotations":{},"labels":{"app.kubernetes.io/component":"controller","app.kubernetes.io/instance":"ingress-nginx","app.kubernetes.io/name":"ingress-nginx"},"name":"ingress-nginx-controller-admission","namespace":"ingress-nginx"},"spec":{"ports":[{"appProtocol":"https","name":"https-webhook","port":443,"targetPort":"webhook"}],"selector":{"app.kubernetes.io/component":"controller","app.kubernetes.io/instance":"ingress-nginx","app.kubernetes.io/name":"ingress-nginx"},"type":"ClusterIP"}} + creationTimestamp: "2024-12-26T23:25:47Z" + labels: + app.kubernetes.io/component: controller + app.kubernetes.io/instance: ingress-nginx + app.kubernetes.io/name: ingress-nginx + managedFields: + - apiVersion: v1 + fieldsType: FieldsV1 + fieldsV1: + f:metadata: + f:annotations: + .: {} + f:kubectl.kubernetes.io/last-applied-configuration: {} + f:labels: + .: {} + f:app.kubernetes.io/component: {} + f:app.kubernetes.io/instance: {} + f:app.kubernetes.io/name: {} + f:spec: + f:internalTrafficPolicy: {} + f:ports: + .: {} + k:{"port":443,"protocol":"TCP"}: + .: {} + f:appProtocol: {} + f:name: {} + f:port: {} + f:protocol: {} + f:targetPort: {} + f:selector: {} + f:sessionAffinity: {} + f:type: {} + manager: kubectl-client-side-apply + operation: Update + time: "2024-12-26T23:25:47Z" + name: ingress-nginx-controller-admission + namespace: ingress-nginx + resourceVersion: "510" + uid: 6591a78b-8faa-4890-ac29-39b6e90e46d2 + spec: + clusterIP: 10.107.10.84 + clusterIPs: + - 10.107.10.84 + internalTrafficPolicy: Cluster + ipFamilies: + - IPv4 + ipFamilyPolicy: SingleStack + ports: + - appProtocol: https + name: https-webhook + port: 443 + protocol: TCP + targetPort: webhook + selector: + app.kubernetes.io/component: controller + app.kubernetes.io/instance: ingress-nginx + app.kubernetes.io/name: ingress-nginx + sessionAffinity: None + type: ClusterIP + status: + loadBalancer: {} +- apiVersion: v1 + kind: ServiceAccount + metadata: + creationTimestamp: "2024-12-26T23:25:47Z" + name: default + namespace: ingress-nginx + resourceVersion: "489" + uid: 40c2ad97-aa43-4d0d-988a-bf744ef0eb74 +- apiVersion: v1 + automountServiceAccountToken: true + kind: ServiceAccount + metadata: + annotations: + kubectl.kubernetes.io/last-applied-configuration: | + {"apiVersion":"v1","automountServiceAccountToken":true,"kind":"ServiceAccount","metadata":{"annotations":{},"labels":{"app.kubernetes.io/component":"controller","app.kubernetes.io/instance":"ingress-nginx","app.kubernetes.io/name":"ingress-nginx"},"name":"ingress-nginx","namespace":"ingress-nginx"}} + creationTimestamp: "2024-12-26T23:25:47Z" + labels: + app.kubernetes.io/component: controller + app.kubernetes.io/instance: ingress-nginx + app.kubernetes.io/name: ingress-nginx + managedFields: + - apiVersion: v1 + fieldsType: FieldsV1 + fieldsV1: + f:automountServiceAccountToken: {} + f:metadata: + f:annotations: + .: {} + f:kubectl.kubernetes.io/last-applied-configuration: {} + f:labels: + .: {} + f:app.kubernetes.io/component: {} + f:app.kubernetes.io/instance: {} + f:app.kubernetes.io/name: {} + manager: kubectl-client-side-apply + operation: Update + time: "2024-12-26T23:25:47Z" + name: ingress-nginx + namespace: ingress-nginx + resourceVersion: "490" + uid: 5c7d4f04-ef53-40a2-b688-9fc3c063e1d2 +- apiVersion: v1 + kind: ServiceAccount + metadata: + annotations: + kubectl.kubernetes.io/last-applied-configuration: | + {"apiVersion":"v1","kind":"ServiceAccount","metadata":{"annotations":{},"labels":{"app.kubernetes.io/component":"admission-webhook","app.kubernetes.io/instance":"ingress-nginx","app.kubernetes.io/name":"ingress-nginx"},"name":"ingress-nginx-admission","namespace":"ingress-nginx"}} + creationTimestamp: "2024-12-26T23:25:47Z" + labels: + app.kubernetes.io/component: admission-webhook + app.kubernetes.io/instance: ingress-nginx + app.kubernetes.io/name: ingress-nginx + managedFields: + - apiVersion: v1 + fieldsType: FieldsV1 + fieldsV1: + f:metadata: + f:annotations: + .: {} + f:kubectl.kubernetes.io/last-applied-configuration: {} + f:labels: + .: {} + f:app.kubernetes.io/component: {} + f:app.kubernetes.io/instance: {} + f:app.kubernetes.io/name: {} + manager: kubectl-client-side-apply + operation: Update + time: "2024-12-26T23:25:47Z" + name: ingress-nginx-admission + namespace: ingress-nginx + resourceVersion: "491" + uid: 3b41c7f7-d882-45cb-8bab-82b66bc52cfe +kind: List +metadata: + resourceVersion: "" + selfLink: "" diff --git a/examples/minikube/minikube-kube-system.png b/examples/minikube/minikube-kube-system.png new file mode 100644 index 0000000..1f9f4b7 Binary files /dev/null and b/examples/minikube/minikube-kube-system.png differ diff --git a/examples/minikube/minikube-kube-system.yml b/examples/minikube/minikube-kube-system.yml new file mode 100644 index 0000000..02f9876 --- /dev/null +++ b/examples/minikube/minikube-kube-system.yml @@ -0,0 +1,5273 @@ +apiVersion: v1 +items: +- apiVersion: v1 + data: + Corefile: | + .:53 { + log + errors + health { + lameduck 5s + } + ready + kubernetes cluster.local in-addr.arpa ip6.arpa { + pods insecure + fallthrough in-addr.arpa ip6.arpa + ttl 30 + } + prometheus :9153 + hosts { + 192.168.64.1 host.minikube.internal + fallthrough + } + forward . /etc/resolv.conf { + max_concurrent 1000 + } + cache 30 + loop + reload + loadbalance + } + kind: ConfigMap + metadata: + creationTimestamp: "2024-12-26T23:24:19Z" + managedFields: + - apiVersion: v1 + fieldsType: FieldsV1 + fieldsV1: + f:data: {} + manager: kubeadm + operation: Update + time: "2024-12-26T23:24:19Z" + - apiVersion: v1 + fieldsType: FieldsV1 + fieldsV1: + f:data: + f:Corefile: {} + manager: kubectl-replace + operation: Update + time: "2024-12-26T23:24:21Z" + name: coredns + namespace: kube-system + resourceVersion: "256" + uid: 98f0017d-c529-4076-819b-0bc7f5cda839 +- apiVersion: v1 + data: + client-ca-file: | + -----BEGIN CERTIFICATE----- + MIIDBjCCAe6gAwIBAgIBATANBgkqhkiG9w0BAQsFADAVMRMwEQYDVQQDEwptaW5p + a3ViZUNBMB4XDTIzMDIwNDA3NTMzNloXDTMzMDIwMjA3NTMzNlowFTETMBEGA1UE + AxMKbWluaWt1YmVDQTCCASIwDQYJKoZIhvcNAQEBBQADggEPADCCAQoCggEBAM3l + n8dtEkPntkBRSF7NBlwCbwI3BRxHL5LUSROCfr/tFyuJ8XiZa8yv/DbiCKDFWeBr + lJwWOJ3HjrjQc+nBIjbG3spMaOr9Kgut7UKyYEeIZxBSz5GBd7rlRuBwOkRqEXtS + /H/TxVzgrugfKbI+ALtzbtHTzKKLDGaYjAC5t2jQ/PtzQ3s4cB8Z/fk03n9woBC8 + 6makLFQXXPj65y09hb/slxIbi4hyRe4hdQYnxeY+PKmuEZIaed5gFrN/EDDtrtwn + bcPY3Pwc0/b1+S44TcB+eWMq28zPLeO/Kjziw8q+1wldKWIXJJSUAUU5dBOtlRol + yfr7t0ibsft1OTVCisECAwEAAaNhMF8wDgYDVR0PAQH/BAQDAgKkMB0GA1UdJQQW + MBQGCCsGAQUFBwMCBggrBgEFBQcDATAPBgNVHRMBAf8EBTADAQH/MB0GA1UdDgQW + BBS1Nak8XxDdSOq3r1qdAXNmQRttCzANBgkqhkiG9w0BAQsFAAOCAQEAxrabqVKs + u9hJTiUNhLEQTOVR7gMuonymonQ73488pQHKKIyAM8It+ClgP+YdZtRi+uxGgQ3m + kwbJbf1ybysY++tIKbUXfsal/wcrt2hbqk6HJxca/YaYL7qja6N/BElct07RQhLf + DpMtfqokyBh/yOlobBkrrA+RylGVi1ebWgFM7xtzmuPpeIYurNIcXGpp0d21RuRz + 0Oxd9g/HHAzZihXbHfPeJJdiQBtPvQ83TZ+T2E0MCkLDUC1okRztR8R5YPG6nZli + zVRBh41095iSNFKJhFQyu5Qzme98wdBBQGoxcMOoXk6ioeDQUywHaJMjdCANqubf + I700WTtGVr503w== + -----END CERTIFICATE----- + requestheader-allowed-names: '["front-proxy-client"]' + requestheader-client-ca-file: | + -----BEGIN CERTIFICATE----- + MIIDCjCCAfKgAwIBAgIBADANBgkqhkiG9w0BAQsFADAZMRcwFQYDVQQDEw5mcm9u + dC1wcm94eS1jYTAeFw0yNDEyMjYyMzI0MDRaFw0zNDEyMjQyMzI0MDRaMBkxFzAV + BgNVBAMTDmZyb250LXByb3h5LWNhMIIBIjANBgkqhkiG9w0BAQEFAAOCAQ8AMIIB + CgKCAQEAsgzZsSFRh9Hf1Fs4gcsr36PSEfyvHGCAHRFuNhDIpnTI2bVdQ5Vs8HlU + uZqhoYKp1F0g8Pq0eoh01OngiksuL8J6iAZPlYvJXq+UY6BZcjnu8GBWyJKbfgbf + 2858HB5DkhT7+JReUQi0o8TUZV8KDRwc/egSu6s7uH6RcGWkOUUoISXK4LSBbFW4 + EMCFHLqGLRbqchFiLKzWrLSKPQSaWPLh/FkrtWUtNeaPAwRuQIJxI25u2XmXUshM + 6zyoxMmVc7alcfCIfBQ5WmvTlxzGyH3LM/P0ABBR504iZTxwDHosuAQYMesYnT8B + klYiE6FK060y2fQ5nppQkkb6MC7l7wIDAQABo10wWzAOBgNVHQ8BAf8EBAMCAqQw + DwYDVR0TAQH/BAUwAwEB/zAdBgNVHQ4EFgQUEl7LIKCa9zrunj4eSTy6tgJrDoYw + GQYDVR0RBBIwEIIOZnJvbnQtcHJveHktY2EwDQYJKoZIhvcNAQELBQADggEBACmr + Ake3d+ZOCnfUC1EcNbjOI5gydD4ZforI9ciIUAgED0NWfuT3qfUAKWCNYHhgCTq6 + Xv6ON33A4x42J97lUGyfz9BqqqN68zDK7YG9bEmnACCC8PRDa8JFCgbeRtr6zYJw + kIqjHwAbfup5Ku4JFN7ohrkI226mV0vdsufsWlHCTEbIsNYTU+CfSd9wfXlsRYuF + wKmWp2PEkv976GyN6eWVF22Pwls+RLcg8X5QVgKj760r3PbJxMEPs+2B/R+7TBjG + 72OpMAt3KYYXE/ZDbkIOPL/FUWPQBYJOyCDbjQe3tSvRl+MZNgNsNdExWF/5/5V+ + wj0XdZmzJUHgnaChWHA= + -----END CERTIFICATE----- + requestheader-extra-headers-prefix: '["X-Remote-Extra-"]' + requestheader-group-headers: '["X-Remote-Group"]' + requestheader-username-headers: '["X-Remote-User"]' + kind: ConfigMap + metadata: + creationTimestamp: "2024-12-26T23:24:16Z" + managedFields: + - apiVersion: v1 + fieldsType: FieldsV1 + fieldsV1: + f:data: + .: {} + f:client-ca-file: {} + f:requestheader-allowed-names: {} + f:requestheader-client-ca-file: {} + f:requestheader-extra-headers-prefix: {} + f:requestheader-group-headers: {} + f:requestheader-username-headers: {} + manager: kube-apiserver + operation: Update + time: "2024-12-26T23:24:16Z" + name: extension-apiserver-authentication + namespace: kube-system + resourceVersion: "33" + uid: ffcabc58-9d70-4bd7-bc93-bc2f986b400a +- apiVersion: v1 + data: + config.conf: |- + apiVersion: kubeproxy.config.k8s.io/v1alpha1 + bindAddress: 0.0.0.0 + bindAddressHardFail: false + clientConnection: + acceptContentTypes: "" + burst: 0 + contentType: "" + kubeconfig: /var/lib/kube-proxy/kubeconfig.conf + qps: 0 + clusterCIDR: 10.244.0.0/16 + configSyncPeriod: 0s + conntrack: + maxPerCore: 0 + min: null + tcpCloseWaitTimeout: 0s + tcpEstablishedTimeout: 0s + detectLocal: + bridgeInterface: "" + interfaceNamePrefix: "" + detectLocalMode: "" + enableProfiling: false + healthzBindAddress: "" + hostnameOverride: "" + iptables: + localhostNodePorts: null + masqueradeAll: false + masqueradeBit: null + minSyncPeriod: 0s + syncPeriod: 0s + ipvs: + excludeCIDRs: null + minSyncPeriod: 0s + scheduler: "" + strictARP: false + syncPeriod: 0s + tcpFinTimeout: 0s + tcpTimeout: 0s + udpTimeout: 0s + kind: KubeProxyConfiguration + metricsBindAddress: 0.0.0.0:10249 + mode: "" + nodePortAddresses: null + oomScoreAdj: null + portRange: "" + showHiddenMetricsForVersion: "" + winkernel: + enableDSR: false + forwardHealthCheckVip: false + networkName: "" + rootHnsEndpointName: "" + sourceVip: "" + kubeconfig.conf: |- + apiVersion: v1 + kind: Config + clusters: + - cluster: + certificate-authority: /var/run/secrets/kubernetes.io/serviceaccount/ca.crt + server: https://control-plane.minikube.internal:8443 + name: default + contexts: + - context: + cluster: default + namespace: default + user: default + name: default + current-context: default + users: + - name: default + user: + tokenFile: /var/run/secrets/kubernetes.io/serviceaccount/token + kind: ConfigMap + metadata: + creationTimestamp: "2024-12-26T23:24:19Z" + labels: + app: kube-proxy + managedFields: + - apiVersion: v1 + fieldsType: FieldsV1 + fieldsV1: + f:data: + .: {} + f:config.conf: {} + f:kubeconfig.conf: {} + f:metadata: + f:labels: + .: {} + f:app: {} + manager: kubeadm + operation: Update + time: "2024-12-26T23:24:19Z" + name: kube-proxy + namespace: kube-system + resourceVersion: "238" + uid: c818ec85-d4bd-4153-80d0-520c2990e0e2 +- apiVersion: v1 + data: + ca.crt: | + -----BEGIN CERTIFICATE----- + MIIDBjCCAe6gAwIBAgIBATANBgkqhkiG9w0BAQsFADAVMRMwEQYDVQQDEwptaW5p + a3ViZUNBMB4XDTIzMDIwNDA3NTMzNloXDTMzMDIwMjA3NTMzNlowFTETMBEGA1UE + AxMKbWluaWt1YmVDQTCCASIwDQYJKoZIhvcNAQEBBQADggEPADCCAQoCggEBAM3l + n8dtEkPntkBRSF7NBlwCbwI3BRxHL5LUSROCfr/tFyuJ8XiZa8yv/DbiCKDFWeBr + lJwWOJ3HjrjQc+nBIjbG3spMaOr9Kgut7UKyYEeIZxBSz5GBd7rlRuBwOkRqEXtS + /H/TxVzgrugfKbI+ALtzbtHTzKKLDGaYjAC5t2jQ/PtzQ3s4cB8Z/fk03n9woBC8 + 6makLFQXXPj65y09hb/slxIbi4hyRe4hdQYnxeY+PKmuEZIaed5gFrN/EDDtrtwn + bcPY3Pwc0/b1+S44TcB+eWMq28zPLeO/Kjziw8q+1wldKWIXJJSUAUU5dBOtlRol + yfr7t0ibsft1OTVCisECAwEAAaNhMF8wDgYDVR0PAQH/BAQDAgKkMB0GA1UdJQQW + MBQGCCsGAQUFBwMCBggrBgEFBQcDATAPBgNVHRMBAf8EBTADAQH/MB0GA1UdDgQW + BBS1Nak8XxDdSOq3r1qdAXNmQRttCzANBgkqhkiG9w0BAQsFAAOCAQEAxrabqVKs + u9hJTiUNhLEQTOVR7gMuonymonQ73488pQHKKIyAM8It+ClgP+YdZtRi+uxGgQ3m + kwbJbf1ybysY++tIKbUXfsal/wcrt2hbqk6HJxca/YaYL7qja6N/BElct07RQhLf + DpMtfqokyBh/yOlobBkrrA+RylGVi1ebWgFM7xtzmuPpeIYurNIcXGpp0d21RuRz + 0Oxd9g/HHAzZihXbHfPeJJdiQBtPvQ83TZ+T2E0MCkLDUC1okRztR8R5YPG6nZli + zVRBh41095iSNFKJhFQyu5Qzme98wdBBQGoxcMOoXk6ioeDQUywHaJMjdCANqubf + I700WTtGVr503w== + -----END CERTIFICATE----- + kind: ConfigMap + metadata: + annotations: + kubernetes.io/description: Contains a CA bundle that can be used to verify the + kube-apiserver when using internal endpoints such as the internal service + IP or kubernetes.default.svc. No other usage is guaranteed across distributions + of Kubernetes clusters. + creationTimestamp: "2024-12-26T23:24:31Z" + managedFields: + - apiVersion: v1 + fieldsType: FieldsV1 + fieldsV1: + f:data: + .: {} + f:ca.crt: {} + f:metadata: + f:annotations: + .: {} + f:kubernetes.io/description: {} + manager: kube-controller-manager + operation: Update + time: "2024-12-26T23:24:31Z" + name: kube-root-ca.crt + namespace: kube-system + resourceVersion: "302" + uid: 766578e3-12a3-4853-8074-537b453bfb3e +- apiVersion: v1 + data: + ClusterConfiguration: | + apiServer: + certSANs: + - 127.0.0.1 + - localhost + - 192.168.64.7 + extraArgs: + authorization-mode: Node,RBAC + enable-admission-plugins: NamespaceLifecycle,LimitRanger,ServiceAccount,DefaultStorageClass,DefaultTolerationSeconds,NodeRestriction,MutatingAdmissionWebhook,ValidatingAdmissionWebhook,ResourceQuota + timeoutForControlPlane: 4m0s + apiVersion: kubeadm.k8s.io/v1beta3 + certificatesDir: /var/lib/minikube/certs + clusterName: mk + controlPlaneEndpoint: control-plane.minikube.internal:8443 + controllerManager: + extraArgs: + allocate-node-cidrs: "true" + leader-elect: "false" + dns: {} + etcd: + local: + dataDir: /var/lib/minikube/etcd + extraArgs: + proxy-refresh-interval: "70000" + imageRepository: registry.k8s.io + kind: ClusterConfiguration + kubernetesVersion: v1.26.1 + networking: + dnsDomain: cluster.local + podSubnet: 10.244.0.0/16 + serviceSubnet: 10.96.0.0/12 + scheduler: + extraArgs: + leader-elect: "false" + kind: ConfigMap + metadata: + creationTimestamp: "2024-12-26T23:24:18Z" + managedFields: + - apiVersion: v1 + fieldsType: FieldsV1 + fieldsV1: + f:data: + .: {} + f:ClusterConfiguration: {} + manager: kubeadm + operation: Update + time: "2024-12-26T23:24:18Z" + name: kubeadm-config + namespace: kube-system + resourceVersion: "199" + uid: ad523960-e806-48e1-b60a-8a1b35f9b406 +- apiVersion: v1 + data: + kubelet: | + apiVersion: kubelet.config.k8s.io/v1beta1 + authentication: + anonymous: + enabled: false + webhook: + cacheTTL: 0s + enabled: true + x509: + clientCAFile: /var/lib/minikube/certs/ca.crt + authorization: + mode: Webhook + webhook: + cacheAuthorizedTTL: 0s + cacheUnauthorizedTTL: 0s + cgroupDriver: cgroupfs + clusterDNS: + - 10.96.0.10 + clusterDomain: cluster.local + cpuManagerReconcilePeriod: 0s + evictionHard: + imagefs.available: 0% + nodefs.available: 0% + nodefs.inodesFree: 0% + evictionPressureTransitionPeriod: 0s + failSwapOn: false + fileCheckFrequency: 0s + hairpinMode: hairpin-veth + healthzBindAddress: 127.0.0.1 + healthzPort: 10248 + httpCheckFrequency: 0s + imageGCHighThresholdPercent: 100 + imageMinimumGCAge: 0s + kind: KubeletConfiguration + logging: + flushFrequency: 0 + options: + json: + infoBufferSize: "0" + verbosity: 0 + memorySwap: {} + nodeStatusReportFrequency: 0s + nodeStatusUpdateFrequency: 0s + resolvConf: /run/systemd/resolve/resolv.conf + rotateCertificates: true + runtimeRequestTimeout: 15m0s + shutdownGracePeriod: 0s + shutdownGracePeriodCriticalPods: 0s + staticPodPath: /etc/kubernetes/manifests + streamingConnectionIdleTimeout: 0s + syncFrequency: 0s + volumeStatsAggPeriod: 0s + kind: ConfigMap + metadata: + creationTimestamp: "2024-12-26T23:24:18Z" + managedFields: + - apiVersion: v1 + fieldsType: FieldsV1 + fieldsV1: + f:data: + .: {} + f:kubelet: {} + manager: kubeadm + operation: Update + time: "2024-12-26T23:24:18Z" + name: kubelet-config + namespace: kube-system + resourceVersion: "202" + uid: 393c4ab7-18a7-4bba-8025-5827b732472f +- apiVersion: apps/v1 + kind: DaemonSet + metadata: + annotations: + deprecated.daemonset.template.generation: "1" + creationTimestamp: "2024-12-26T23:24:19Z" + generation: 1 + labels: + k8s-app: kube-proxy + managedFields: + - apiVersion: apps/v1 + fieldsType: FieldsV1 + fieldsV1: + f:metadata: + f:annotations: + .: {} + f:deprecated.daemonset.template.generation: {} + f:labels: + .: {} + f:k8s-app: {} + f:spec: + f:revisionHistoryLimit: {} + f:selector: {} + f:template: + f:metadata: + f:labels: + .: {} + f:k8s-app: {} + f:spec: + f:containers: + k:{"name":"kube-proxy"}: + .: {} + f:command: {} + f:env: + .: {} + k:{"name":"NODE_NAME"}: + .: {} + f:name: {} + f:valueFrom: + .: {} + f:fieldRef: {} + f:image: {} + f:imagePullPolicy: {} + f:name: {} + f:resources: {} + f:securityContext: + .: {} + f:privileged: {} + f:terminationMessagePath: {} + f:terminationMessagePolicy: {} + f:volumeMounts: + .: {} + k:{"mountPath":"/lib/modules"}: + .: {} + f:mountPath: {} + f:name: {} + f:readOnly: {} + k:{"mountPath":"/run/xtables.lock"}: + .: {} + f:mountPath: {} + f:name: {} + k:{"mountPath":"/var/lib/kube-proxy"}: + .: {} + f:mountPath: {} + f:name: {} + f:dnsPolicy: {} + f:hostNetwork: {} + f:nodeSelector: {} + f:priorityClassName: {} + f:restartPolicy: {} + f:schedulerName: {} + f:securityContext: {} + f:serviceAccount: {} + f:serviceAccountName: {} + f:terminationGracePeriodSeconds: {} + f:tolerations: {} + f:volumes: + .: {} + k:{"name":"kube-proxy"}: + .: {} + f:configMap: + .: {} + f:defaultMode: {} + f:name: {} + f:name: {} + k:{"name":"lib-modules"}: + .: {} + f:hostPath: + .: {} + f:path: {} + f:type: {} + f:name: {} + k:{"name":"xtables-lock"}: + .: {} + f:hostPath: + .: {} + f:path: {} + f:type: {} + f:name: {} + f:updateStrategy: + f:rollingUpdate: + .: {} + f:maxSurge: {} + f:maxUnavailable: {} + f:type: {} + manager: kubeadm + operation: Update + time: "2024-12-26T23:24:19Z" + - apiVersion: apps/v1 + fieldsType: FieldsV1 + fieldsV1: + f:status: + f:currentNumberScheduled: {} + f:desiredNumberScheduled: {} + f:numberAvailable: {} + f:numberReady: {} + f:observedGeneration: {} + f:updatedNumberScheduled: {} + manager: kube-controller-manager + operation: Update + subresource: status + time: "2024-12-27T17:53:25Z" + name: kube-proxy + namespace: kube-system + resourceVersion: "41943" + uid: 1e7933c6-ff5a-4c53-ab62-74703a673cb9 + spec: + revisionHistoryLimit: 10 + selector: + matchLabels: + k8s-app: kube-proxy + template: + metadata: + creationTimestamp: null + labels: + k8s-app: kube-proxy + spec: + containers: + - command: + - /usr/local/bin/kube-proxy + - --config=/var/lib/kube-proxy/config.conf + - --hostname-override=$(NODE_NAME) + env: + - name: NODE_NAME + valueFrom: + fieldRef: + apiVersion: v1 + fieldPath: spec.nodeName + image: registry.k8s.io/kube-proxy:v1.26.1 + imagePullPolicy: IfNotPresent + name: kube-proxy + resources: {} + securityContext: + privileged: true + terminationMessagePath: /dev/termination-log + terminationMessagePolicy: File + volumeMounts: + - mountPath: /var/lib/kube-proxy + name: kube-proxy + - mountPath: /run/xtables.lock + name: xtables-lock + - mountPath: /lib/modules + name: lib-modules + readOnly: true + dnsPolicy: ClusterFirst + hostNetwork: true + nodeSelector: + kubernetes.io/os: linux + priorityClassName: system-node-critical + restartPolicy: Always + schedulerName: default-scheduler + securityContext: {} + serviceAccount: kube-proxy + serviceAccountName: kube-proxy + terminationGracePeriodSeconds: 30 + tolerations: + - operator: Exists + volumes: + - configMap: + defaultMode: 420 + name: kube-proxy + name: kube-proxy + - hostPath: + path: /run/xtables.lock + type: FileOrCreate + name: xtables-lock + - hostPath: + path: /lib/modules + type: "" + name: lib-modules + updateStrategy: + rollingUpdate: + maxSurge: 0 + maxUnavailable: 1 + type: RollingUpdate + status: + currentNumberScheduled: 1 + desiredNumberScheduled: 1 + numberAvailable: 1 + numberMisscheduled: 0 + numberReady: 1 + observedGeneration: 1 + updatedNumberScheduled: 1 +- apiVersion: apps/v1 + kind: Deployment + metadata: + annotations: + deployment.kubernetes.io/revision: "1" + creationTimestamp: "2024-12-26T23:24:19Z" + generation: 2 + labels: + k8s-app: kube-dns + managedFields: + - apiVersion: apps/v1 + fieldsType: FieldsV1 + fieldsV1: + f:spec: + f:replicas: {} + manager: minikube + operation: Update + subresource: scale + - apiVersion: apps/v1 + fieldsType: FieldsV1 + fieldsV1: + f:metadata: + f:labels: + .: {} + f:k8s-app: {} + f:spec: + f:progressDeadlineSeconds: {} + f:revisionHistoryLimit: {} + f:selector: {} + f:strategy: + f:rollingUpdate: + .: {} + f:maxSurge: {} + f:maxUnavailable: {} + f:type: {} + f:template: + f:metadata: + f:labels: + .: {} + f:k8s-app: {} + f:spec: + f:affinity: + .: {} + f:podAntiAffinity: + .: {} + f:preferredDuringSchedulingIgnoredDuringExecution: {} + f:containers: + k:{"name":"coredns"}: + .: {} + f:args: {} + f:image: {} + f:imagePullPolicy: {} + f:livenessProbe: + .: {} + f:failureThreshold: {} + f:httpGet: + .: {} + f:path: {} + f:port: {} + f:scheme: {} + f:initialDelaySeconds: {} + f:periodSeconds: {} + f:successThreshold: {} + f:timeoutSeconds: {} + f:name: {} + f:ports: + .: {} + k:{"containerPort":53,"protocol":"TCP"}: + .: {} + f:containerPort: {} + f:name: {} + f:protocol: {} + k:{"containerPort":53,"protocol":"UDP"}: + .: {} + f:containerPort: {} + f:name: {} + f:protocol: {} + k:{"containerPort":9153,"protocol":"TCP"}: + .: {} + f:containerPort: {} + f:name: {} + f:protocol: {} + f:readinessProbe: + .: {} + f:failureThreshold: {} + f:httpGet: + .: {} + f:path: {} + f:port: {} + f:scheme: {} + f:periodSeconds: {} + f:successThreshold: {} + f:timeoutSeconds: {} + f:resources: + .: {} + f:limits: + .: {} + f:memory: {} + f:requests: + .: {} + f:cpu: {} + f:memory: {} + f:securityContext: + .: {} + f:allowPrivilegeEscalation: {} + f:capabilities: + .: {} + f:add: {} + f:drop: {} + f:readOnlyRootFilesystem: {} + f:terminationMessagePath: {} + f:terminationMessagePolicy: {} + f:volumeMounts: + .: {} + k:{"mountPath":"/etc/coredns"}: + .: {} + f:mountPath: {} + f:name: {} + f:readOnly: {} + f:dnsPolicy: {} + f:nodeSelector: {} + f:priorityClassName: {} + f:restartPolicy: {} + f:schedulerName: {} + f:securityContext: {} + f:serviceAccount: {} + f:serviceAccountName: {} + f:terminationGracePeriodSeconds: {} + f:tolerations: {} + f:volumes: + .: {} + k:{"name":"config-volume"}: + .: {} + f:configMap: + .: {} + f:defaultMode: {} + f:items: {} + f:name: {} + f:name: {} + manager: kubeadm + operation: Update + time: "2024-12-26T23:24:19Z" + - apiVersion: apps/v1 + fieldsType: FieldsV1 + fieldsV1: + f:metadata: + f:annotations: + .: {} + f:deployment.kubernetes.io/revision: {} + f:status: + f:availableReplicas: {} + f:conditions: + .: {} + k:{"type":"Available"}: + .: {} + f:lastTransitionTime: {} + f:lastUpdateTime: {} + f:message: {} + f:reason: {} + f:status: {} + f:type: {} + k:{"type":"Progressing"}: + .: {} + f:lastTransitionTime: {} + f:lastUpdateTime: {} + f:message: {} + f:reason: {} + f:status: {} + f:type: {} + f:observedGeneration: {} + f:readyReplicas: {} + f:replicas: {} + f:updatedReplicas: {} + manager: kube-controller-manager + operation: Update + subresource: status + time: "2024-12-27T17:53:23Z" + name: coredns + namespace: kube-system + resourceVersion: "41913" + uid: ade21f51-f5f9-48f0-9179-59925cbd215d + spec: + progressDeadlineSeconds: 600 + replicas: 1 + revisionHistoryLimit: 10 + selector: + matchLabels: + k8s-app: kube-dns + strategy: + rollingUpdate: + maxSurge: 25% + maxUnavailable: 1 + type: RollingUpdate + template: + metadata: + creationTimestamp: null + labels: + k8s-app: kube-dns + spec: + affinity: + podAntiAffinity: + preferredDuringSchedulingIgnoredDuringExecution: + - podAffinityTerm: + labelSelector: + matchExpressions: + - key: k8s-app + operator: In + values: + - kube-dns + topologyKey: kubernetes.io/hostname + weight: 100 + containers: + - args: + - -conf + - /etc/coredns/Corefile + image: registry.k8s.io/coredns/coredns:v1.9.3 + imagePullPolicy: IfNotPresent + livenessProbe: + failureThreshold: 5 + httpGet: + path: /health + port: 8080 + scheme: HTTP + initialDelaySeconds: 60 + periodSeconds: 10 + successThreshold: 1 + timeoutSeconds: 5 + name: coredns + ports: + - containerPort: 53 + name: dns + protocol: UDP + - containerPort: 53 + name: dns-tcp + protocol: TCP + - containerPort: 9153 + name: metrics + protocol: TCP + readinessProbe: + failureThreshold: 3 + httpGet: + path: /ready + port: 8181 + scheme: HTTP + periodSeconds: 10 + successThreshold: 1 + timeoutSeconds: 1 + resources: + limits: + memory: 170Mi + requests: + cpu: 100m + memory: 70Mi + securityContext: + allowPrivilegeEscalation: false + capabilities: + add: + - NET_BIND_SERVICE + drop: + - all + readOnlyRootFilesystem: true + terminationMessagePath: /dev/termination-log + terminationMessagePolicy: File + volumeMounts: + - mountPath: /etc/coredns + name: config-volume + readOnly: true + dnsPolicy: Default + nodeSelector: + kubernetes.io/os: linux + priorityClassName: system-cluster-critical + restartPolicy: Always + schedulerName: default-scheduler + securityContext: {} + serviceAccount: coredns + serviceAccountName: coredns + terminationGracePeriodSeconds: 30 + tolerations: + - key: CriticalAddonsOnly + operator: Exists + - effect: NoSchedule + key: node-role.kubernetes.io/control-plane + volumes: + - configMap: + defaultMode: 420 + items: + - key: Corefile + path: Corefile + name: coredns + name: config-volume + status: + availableReplicas: 1 + conditions: + - lastTransitionTime: "2024-12-26T23:24:32Z" + lastUpdateTime: "2024-12-26T23:24:32Z" + message: Deployment has minimum availability. + reason: MinimumReplicasAvailable + status: "True" + type: Available + - lastTransitionTime: "2024-12-26T23:24:32Z" + lastUpdateTime: "2024-12-26T23:24:36Z" + message: ReplicaSet "coredns-787d4945fb" has successfully progressed. + reason: NewReplicaSetAvailable + status: "True" + type: Progressing + observedGeneration: 2 + readyReplicas: 1 + replicas: 1 + updatedReplicas: 1 +- apiVersion: apps/v1 + kind: Deployment + metadata: + annotations: + deployment.kubernetes.io/revision: "1" + kubectl.kubernetes.io/last-applied-configuration: | + {"apiVersion":"apps/v1","kind":"Deployment","metadata":{"annotations":{},"labels":{"addonmanager.kubernetes.io/mode":"Reconcile","k8s-app":"metrics-server","kubernetes.io/minikube-addons":"metrics-server"},"name":"metrics-server","namespace":"kube-system"},"spec":{"selector":{"matchLabels":{"k8s-app":"metrics-server"}},"strategy":{"rollingUpdate":{"maxUnavailable":0}},"template":{"metadata":{"labels":{"k8s-app":"metrics-server"},"name":"metrics-server"},"spec":{"containers":[{"args":["--cert-dir=/tmp","--secure-port=4443","--kubelet-preferred-address-types=InternalIP,ExternalIP,Hostname","--kubelet-use-node-status-port","--metric-resolution=60s","--kubelet-insecure-tls"],"image":"registry.k8s.io/metrics-server/metrics-server:v0.6.2@sha256:f977ad859fb500c1302d9c3428c6271db031bb7431e7076213b676b345a88dc2","imagePullPolicy":"IfNotPresent","livenessProbe":{"failureThreshold":3,"httpGet":{"path":"/livez","port":"https","scheme":"HTTPS"},"periodSeconds":10},"name":"metrics-server","ports":[{"containerPort":4443,"name":"https","protocol":"TCP"}],"readinessProbe":{"failureThreshold":3,"httpGet":{"path":"/readyz","port":"https","scheme":"HTTPS"},"periodSeconds":10},"resources":{"requests":{"cpu":"100m","memory":"200Mi"}},"securityContext":{"readOnlyRootFilesystem":true,"runAsNonRoot":true,"runAsUser":1000},"volumeMounts":[{"mountPath":"/tmp","name":"tmp-dir"}]}],"priorityClassName":"system-cluster-critical","serviceAccountName":"metrics-server","volumes":[{"emptyDir":{},"name":"tmp-dir"}]}}}} + creationTimestamp: "2024-12-26T23:26:51Z" + generation: 1 + labels: + addonmanager.kubernetes.io/mode: Reconcile + k8s-app: metrics-server + kubernetes.io/minikube-addons: metrics-server + managedFields: + - apiVersion: apps/v1 + fieldsType: FieldsV1 + fieldsV1: + f:metadata: + f:annotations: + .: {} + f:kubectl.kubernetes.io/last-applied-configuration: {} + f:labels: + .: {} + f:addonmanager.kubernetes.io/mode: {} + f:k8s-app: {} + f:kubernetes.io/minikube-addons: {} + f:spec: + f:progressDeadlineSeconds: {} + f:replicas: {} + f:revisionHistoryLimit: {} + f:selector: {} + f:strategy: + f:rollingUpdate: + .: {} + f:maxSurge: {} + f:maxUnavailable: {} + f:type: {} + f:template: + f:metadata: + f:labels: + .: {} + f:k8s-app: {} + f:name: {} + f:spec: + f:containers: + k:{"name":"metrics-server"}: + .: {} + f:args: {} + f:image: {} + f:imagePullPolicy: {} + f:livenessProbe: + .: {} + f:failureThreshold: {} + f:httpGet: + .: {} + f:path: {} + f:port: {} + f:scheme: {} + f:periodSeconds: {} + f:successThreshold: {} + f:timeoutSeconds: {} + f:name: {} + f:ports: + .: {} + k:{"containerPort":4443,"protocol":"TCP"}: + .: {} + f:containerPort: {} + f:name: {} + f:protocol: {} + f:readinessProbe: + .: {} + f:failureThreshold: {} + f:httpGet: + .: {} + f:path: {} + f:port: {} + f:scheme: {} + f:periodSeconds: {} + f:successThreshold: {} + f:timeoutSeconds: {} + f:resources: + .: {} + f:requests: + .: {} + f:cpu: {} + f:memory: {} + f:securityContext: + .: {} + f:readOnlyRootFilesystem: {} + f:runAsNonRoot: {} + f:runAsUser: {} + f:terminationMessagePath: {} + f:terminationMessagePolicy: {} + f:volumeMounts: + .: {} + k:{"mountPath":"/tmp"}: + .: {} + f:mountPath: {} + f:name: {} + f:dnsPolicy: {} + f:priorityClassName: {} + f:restartPolicy: {} + f:schedulerName: {} + f:securityContext: {} + f:serviceAccount: {} + f:serviceAccountName: {} + f:terminationGracePeriodSeconds: {} + f:volumes: + .: {} + k:{"name":"tmp-dir"}: + .: {} + f:emptyDir: {} + f:name: {} + manager: kubectl-client-side-apply + operation: Update + time: "2024-12-26T23:26:51Z" + - apiVersion: apps/v1 + fieldsType: FieldsV1 + fieldsV1: + f:metadata: + f:annotations: + f:deployment.kubernetes.io/revision: {} + f:status: + f:availableReplicas: {} + f:conditions: + .: {} + k:{"type":"Available"}: + .: {} + f:lastTransitionTime: {} + f:lastUpdateTime: {} + f:message: {} + f:reason: {} + f:status: {} + f:type: {} + k:{"type":"Progressing"}: + .: {} + f:lastTransitionTime: {} + f:lastUpdateTime: {} + f:message: {} + f:reason: {} + f:status: {} + f:type: {} + f:observedGeneration: {} + f:readyReplicas: {} + f:replicas: {} + f:updatedReplicas: {} + manager: kube-controller-manager + operation: Update + subresource: status + time: "2024-12-27T17:53:24Z" + name: metrics-server + namespace: kube-system + resourceVersion: "41938" + uid: f877f1e1-0d53-40e1-aa65-54e3ad1f5212 + spec: + progressDeadlineSeconds: 600 + replicas: 1 + revisionHistoryLimit: 10 + selector: + matchLabels: + k8s-app: metrics-server + strategy: + rollingUpdate: + maxSurge: 25% + maxUnavailable: 0 + type: RollingUpdate + template: + metadata: + creationTimestamp: null + labels: + k8s-app: metrics-server + name: metrics-server + spec: + containers: + - args: + - --cert-dir=/tmp + - --secure-port=4443 + - --kubelet-preferred-address-types=InternalIP,ExternalIP,Hostname + - --kubelet-use-node-status-port + - --metric-resolution=60s + - --kubelet-insecure-tls + image: registry.k8s.io/metrics-server/metrics-server:v0.6.2@sha256:f977ad859fb500c1302d9c3428c6271db031bb7431e7076213b676b345a88dc2 + imagePullPolicy: IfNotPresent + livenessProbe: + failureThreshold: 3 + httpGet: + path: /livez + port: https + scheme: HTTPS + periodSeconds: 10 + successThreshold: 1 + timeoutSeconds: 1 + name: metrics-server + ports: + - containerPort: 4443 + name: https + protocol: TCP + readinessProbe: + failureThreshold: 3 + httpGet: + path: /readyz + port: https + scheme: HTTPS + periodSeconds: 10 + successThreshold: 1 + timeoutSeconds: 1 + resources: + requests: + cpu: 100m + memory: 200Mi + securityContext: + readOnlyRootFilesystem: true + runAsNonRoot: true + runAsUser: 1000 + terminationMessagePath: /dev/termination-log + terminationMessagePolicy: File + volumeMounts: + - mountPath: /tmp + name: tmp-dir + dnsPolicy: ClusterFirst + priorityClassName: system-cluster-critical + restartPolicy: Always + schedulerName: default-scheduler + securityContext: {} + serviceAccount: metrics-server + serviceAccountName: metrics-server + terminationGracePeriodSeconds: 30 + volumes: + - emptyDir: {} + name: tmp-dir + status: + availableReplicas: 1 + conditions: + - lastTransitionTime: "2024-12-26T23:26:51Z" + lastUpdateTime: "2024-12-26T23:27:03Z" + message: ReplicaSet "metrics-server-5f8fcc9bb7" has successfully progressed. + reason: NewReplicaSetAvailable + status: "True" + type: Progressing + - lastTransitionTime: "2024-12-27T17:53:24Z" + lastUpdateTime: "2024-12-27T17:53:24Z" + message: Deployment has minimum availability. + reason: MinimumReplicasAvailable + status: "True" + type: Available + observedGeneration: 1 + readyReplicas: 1 + replicas: 1 + updatedReplicas: 1 +- apiVersion: v1 + kind: Pod + metadata: + creationTimestamp: "2024-12-26T23:24:32Z" + generateName: coredns-787d4945fb- + labels: + k8s-app: kube-dns + pod-template-hash: 787d4945fb + managedFields: + - apiVersion: v1 + fieldsType: FieldsV1 + fieldsV1: + f:metadata: + f:generateName: {} + f:labels: + .: {} + f:k8s-app: {} + f:pod-template-hash: {} + f:ownerReferences: + .: {} + k:{"uid":"e9f6aaf8-8687-40a6-9763-f7391066ff22"}: {} + f:spec: + f:affinity: + .: {} + f:podAntiAffinity: + .: {} + f:preferredDuringSchedulingIgnoredDuringExecution: {} + f:containers: + k:{"name":"coredns"}: + .: {} + f:args: {} + f:image: {} + f:imagePullPolicy: {} + f:livenessProbe: + .: {} + f:failureThreshold: {} + f:httpGet: + .: {} + f:path: {} + f:port: {} + f:scheme: {} + f:initialDelaySeconds: {} + f:periodSeconds: {} + f:successThreshold: {} + f:timeoutSeconds: {} + f:name: {} + f:ports: + .: {} + k:{"containerPort":53,"protocol":"TCP"}: + .: {} + f:containerPort: {} + f:name: {} + f:protocol: {} + k:{"containerPort":53,"protocol":"UDP"}: + .: {} + f:containerPort: {} + f:name: {} + f:protocol: {} + k:{"containerPort":9153,"protocol":"TCP"}: + .: {} + f:containerPort: {} + f:name: {} + f:protocol: {} + f:readinessProbe: + .: {} + f:failureThreshold: {} + f:httpGet: + .: {} + f:path: {} + f:port: {} + f:scheme: {} + f:periodSeconds: {} + f:successThreshold: {} + f:timeoutSeconds: {} + f:resources: + .: {} + f:limits: + .: {} + f:memory: {} + f:requests: + .: {} + f:cpu: {} + f:memory: {} + f:securityContext: + .: {} + f:allowPrivilegeEscalation: {} + f:capabilities: + .: {} + f:add: {} + f:drop: {} + f:readOnlyRootFilesystem: {} + f:terminationMessagePath: {} + f:terminationMessagePolicy: {} + f:volumeMounts: + .: {} + k:{"mountPath":"/etc/coredns"}: + .: {} + f:mountPath: {} + f:name: {} + f:readOnly: {} + f:dnsPolicy: {} + f:enableServiceLinks: {} + f:nodeSelector: {} + f:priorityClassName: {} + f:restartPolicy: {} + f:schedulerName: {} + f:securityContext: {} + f:serviceAccount: {} + f:serviceAccountName: {} + f:terminationGracePeriodSeconds: {} + f:tolerations: {} + f:volumes: + .: {} + k:{"name":"config-volume"}: + .: {} + f:configMap: + .: {} + f:defaultMode: {} + f:items: {} + f:name: {} + f:name: {} + manager: kube-controller-manager + operation: Update + time: "2024-12-26T23:24:32Z" + - apiVersion: v1 + fieldsType: FieldsV1 + fieldsV1: + f:status: + f:conditions: + k:{"type":"ContainersReady"}: + .: {} + f:lastProbeTime: {} + f:lastTransitionTime: {} + f:status: {} + f:type: {} + k:{"type":"Initialized"}: + .: {} + f:lastProbeTime: {} + f:lastTransitionTime: {} + f:status: {} + f:type: {} + k:{"type":"Ready"}: + .: {} + f:lastProbeTime: {} + f:lastTransitionTime: {} + f:status: {} + f:type: {} + f:containerStatuses: {} + f:hostIP: {} + f:phase: {} + f:podIP: {} + f:podIPs: + .: {} + k:{"ip":"10.244.0.3"}: + .: {} + f:ip: {} + f:startTime: {} + manager: kubelet + operation: Update + subresource: status + time: "2024-12-27T17:53:23Z" + name: coredns-787d4945fb-h6jf5 + namespace: kube-system + ownerReferences: + - apiVersion: apps/v1 + blockOwnerDeletion: true + controller: true + kind: ReplicaSet + name: coredns-787d4945fb + uid: e9f6aaf8-8687-40a6-9763-f7391066ff22 + resourceVersion: "41908" + uid: 3bedc04a-b1b9-40f6-b3f9-8aef6c0d6a60 + spec: + affinity: + podAntiAffinity: + preferredDuringSchedulingIgnoredDuringExecution: + - podAffinityTerm: + labelSelector: + matchExpressions: + - key: k8s-app + operator: In + values: + - kube-dns + topologyKey: kubernetes.io/hostname + weight: 100 + containers: + - args: + - -conf + - /etc/coredns/Corefile + image: registry.k8s.io/coredns/coredns:v1.9.3 + imagePullPolicy: IfNotPresent + livenessProbe: + failureThreshold: 5 + httpGet: + path: /health + port: 8080 + scheme: HTTP + initialDelaySeconds: 60 + periodSeconds: 10 + successThreshold: 1 + timeoutSeconds: 5 + name: coredns + ports: + - containerPort: 53 + name: dns + protocol: UDP + - containerPort: 53 + name: dns-tcp + protocol: TCP + - containerPort: 9153 + name: metrics + protocol: TCP + readinessProbe: + failureThreshold: 3 + httpGet: + path: /ready + port: 8181 + scheme: HTTP + periodSeconds: 10 + successThreshold: 1 + timeoutSeconds: 1 + resources: + limits: + memory: 170Mi + requests: + cpu: 100m + memory: 70Mi + securityContext: + allowPrivilegeEscalation: false + capabilities: + add: + - NET_BIND_SERVICE + drop: + - all + readOnlyRootFilesystem: true + terminationMessagePath: /dev/termination-log + terminationMessagePolicy: File + volumeMounts: + - mountPath: /etc/coredns + name: config-volume + readOnly: true + - mountPath: /var/run/secrets/kubernetes.io/serviceaccount + name: kube-api-access-bnl9v + readOnly: true + dnsPolicy: Default + enableServiceLinks: true + nodeName: minikube + nodeSelector: + kubernetes.io/os: linux + preemptionPolicy: PreemptLowerPriority + priority: 2000000000 + priorityClassName: system-cluster-critical + restartPolicy: Always + schedulerName: default-scheduler + securityContext: {} + serviceAccount: coredns + serviceAccountName: coredns + terminationGracePeriodSeconds: 30 + tolerations: + - key: CriticalAddonsOnly + operator: Exists + - effect: NoSchedule + key: node-role.kubernetes.io/control-plane + - effect: NoExecute + key: node.kubernetes.io/not-ready + operator: Exists + tolerationSeconds: 300 + - effect: NoExecute + key: node.kubernetes.io/unreachable + operator: Exists + tolerationSeconds: 300 + volumes: + - configMap: + defaultMode: 420 + items: + - key: Corefile + path: Corefile + name: coredns + name: config-volume + - name: kube-api-access-bnl9v + projected: + defaultMode: 420 + sources: + - serviceAccountToken: + expirationSeconds: 3607 + path: token + - configMap: + items: + - key: ca.crt + path: ca.crt + name: kube-root-ca.crt + - downwardAPI: + items: + - fieldRef: + apiVersion: v1 + fieldPath: metadata.namespace + path: namespace + status: + conditions: + - lastProbeTime: null + lastTransitionTime: "2024-12-26T23:24:32Z" + status: "True" + type: Initialized + - lastProbeTime: null + lastTransitionTime: "2024-12-26T23:24:34Z" + status: "True" + type: Ready + - lastProbeTime: null + lastTransitionTime: "2024-12-26T23:24:34Z" + status: "True" + type: ContainersReady + - lastProbeTime: null + lastTransitionTime: "2024-12-26T23:24:32Z" + status: "True" + type: PodScheduled + containerStatuses: + - containerID: docker://97f3fb2ad94c66e23cc9f3e0d5b1b5d9e44baa7b645f41e3a9342fa87780dcb4 + image: registry.k8s.io/coredns/coredns:v1.9.3 + imageID: docker-pullable://registry.k8s.io/coredns/coredns@sha256:8e352a029d304ca7431c6507b56800636c321cb52289686a581ab70aaa8a2e2a + lastState: {} + name: coredns + ready: true + restartCount: 0 + started: true + state: + running: + startedAt: "2024-12-26T23:24:34Z" + hostIP: 192.168.64.7 + phase: Running + podIP: 10.244.0.3 + podIPs: + - ip: 10.244.0.3 + qosClass: Burstable + startTime: "2024-12-26T23:24:32Z" +- apiVersion: v1 + kind: Pod + metadata: + annotations: + kubeadm.kubernetes.io/etcd.advertise-client-urls: https://192.168.64.7:2379 + kubernetes.io/config.hash: 4d233308ffa66cebe878dec39fe48ba0 + kubernetes.io/config.mirror: 4d233308ffa66cebe878dec39fe48ba0 + kubernetes.io/config.seen: "2024-12-26T23:24:19.681500235Z" + kubernetes.io/config.source: file + creationTimestamp: "2024-12-26T23:24:20Z" + labels: + component: etcd + tier: control-plane + managedFields: + - apiVersion: v1 + fieldsType: FieldsV1 + fieldsV1: + f:metadata: + f:annotations: + .: {} + f:kubeadm.kubernetes.io/etcd.advertise-client-urls: {} + f:kubernetes.io/config.hash: {} + f:kubernetes.io/config.mirror: {} + f:kubernetes.io/config.seen: {} + f:kubernetes.io/config.source: {} + f:labels: + .: {} + f:component: {} + f:tier: {} + f:ownerReferences: + .: {} + k:{"uid":"067e4911-dfc8-4e14-aa1a-bff67e325624"}: {} + f:spec: + f:containers: + k:{"name":"etcd"}: + .: {} + f:command: {} + f:image: {} + f:imagePullPolicy: {} + f:livenessProbe: + .: {} + f:failureThreshold: {} + f:httpGet: + .: {} + f:host: {} + f:path: {} + f:port: {} + f:scheme: {} + f:initialDelaySeconds: {} + f:periodSeconds: {} + f:successThreshold: {} + f:timeoutSeconds: {} + f:name: {} + f:resources: + .: {} + f:requests: + .: {} + f:cpu: {} + f:memory: {} + f:startupProbe: + .: {} + f:failureThreshold: {} + f:httpGet: + .: {} + f:host: {} + f:path: {} + f:port: {} + f:scheme: {} + f:initialDelaySeconds: {} + f:periodSeconds: {} + f:successThreshold: {} + f:timeoutSeconds: {} + f:terminationMessagePath: {} + f:terminationMessagePolicy: {} + f:volumeMounts: + .: {} + k:{"mountPath":"/var/lib/minikube/certs/etcd"}: + .: {} + f:mountPath: {} + f:name: {} + k:{"mountPath":"/var/lib/minikube/etcd"}: + .: {} + f:mountPath: {} + f:name: {} + f:dnsPolicy: {} + f:enableServiceLinks: {} + f:hostNetwork: {} + f:nodeName: {} + f:priorityClassName: {} + f:restartPolicy: {} + f:schedulerName: {} + f:securityContext: + .: {} + f:seccompProfile: + .: {} + f:type: {} + f:terminationGracePeriodSeconds: {} + f:tolerations: {} + f:volumes: + .: {} + k:{"name":"etcd-certs"}: + .: {} + f:hostPath: + .: {} + f:path: {} + f:type: {} + f:name: {} + k:{"name":"etcd-data"}: + .: {} + f:hostPath: + .: {} + f:path: {} + f:type: {} + f:name: {} + manager: kubelet + operation: Update + time: "2024-12-26T23:24:20Z" + - apiVersion: v1 + fieldsType: FieldsV1 + fieldsV1: + f:status: + f:conditions: + .: {} + k:{"type":"ContainersReady"}: + .: {} + f:lastProbeTime: {} + f:lastTransitionTime: {} + f:status: {} + f:type: {} + k:{"type":"Initialized"}: + .: {} + f:lastProbeTime: {} + f:lastTransitionTime: {} + f:status: {} + f:type: {} + k:{"type":"PodScheduled"}: + .: {} + f:lastProbeTime: {} + f:lastTransitionTime: {} + f:status: {} + f:type: {} + k:{"type":"Ready"}: + .: {} + f:lastProbeTime: {} + f:lastTransitionTime: {} + f:status: {} + f:type: {} + f:containerStatuses: {} + f:hostIP: {} + f:phase: {} + f:podIP: {} + f:podIPs: + .: {} + k:{"ip":"192.168.64.7"}: + .: {} + f:ip: {} + f:startTime: {} + manager: kubelet + operation: Update + subresource: status + time: "2024-12-27T17:53:23Z" + name: etcd-minikube + namespace: kube-system + ownerReferences: + - apiVersion: v1 + controller: true + kind: Node + name: minikube + uid: 067e4911-dfc8-4e14-aa1a-bff67e325624 + resourceVersion: "41925" + uid: 384a0b36-43c4-4cb8-b619-034d0ddf21b1 + spec: + containers: + - command: + - etcd + - --advertise-client-urls=https://192.168.64.7:2379 + - --cert-file=/var/lib/minikube/certs/etcd/server.crt + - --client-cert-auth=true + - --data-dir=/var/lib/minikube/etcd + - --experimental-initial-corrupt-check=true + - --experimental-watch-progress-notify-interval=5s + - --initial-advertise-peer-urls=https://192.168.64.7:2380 + - --initial-cluster=minikube=https://192.168.64.7:2380 + - --key-file=/var/lib/minikube/certs/etcd/server.key + - --listen-client-urls=https://127.0.0.1:2379,https://192.168.64.7:2379 + - --listen-metrics-urls=http://127.0.0.1:2381 + - --listen-peer-urls=https://192.168.64.7:2380 + - --name=minikube + - --peer-cert-file=/var/lib/minikube/certs/etcd/peer.crt + - --peer-client-cert-auth=true + - --peer-key-file=/var/lib/minikube/certs/etcd/peer.key + - --peer-trusted-ca-file=/var/lib/minikube/certs/etcd/ca.crt + - --proxy-refresh-interval=70000 + - --snapshot-count=10000 + - --trusted-ca-file=/var/lib/minikube/certs/etcd/ca.crt + image: registry.k8s.io/etcd:3.5.6-0 + imagePullPolicy: IfNotPresent + livenessProbe: + failureThreshold: 8 + httpGet: + host: 127.0.0.1 + path: /health?exclude=NOSPACE&serializable=true + port: 2381 + scheme: HTTP + initialDelaySeconds: 10 + periodSeconds: 10 + successThreshold: 1 + timeoutSeconds: 15 + name: etcd + resources: + requests: + cpu: 100m + memory: 100Mi + startupProbe: + failureThreshold: 24 + httpGet: + host: 127.0.0.1 + path: /health?serializable=false + port: 2381 + scheme: HTTP + initialDelaySeconds: 10 + periodSeconds: 10 + successThreshold: 1 + timeoutSeconds: 15 + terminationMessagePath: /dev/termination-log + terminationMessagePolicy: File + volumeMounts: + - mountPath: /var/lib/minikube/etcd + name: etcd-data + - mountPath: /var/lib/minikube/certs/etcd + name: etcd-certs + dnsPolicy: ClusterFirst + enableServiceLinks: true + hostNetwork: true + nodeName: minikube + preemptionPolicy: PreemptLowerPriority + priority: 2000001000 + priorityClassName: system-node-critical + restartPolicy: Always + schedulerName: default-scheduler + securityContext: + seccompProfile: + type: RuntimeDefault + terminationGracePeriodSeconds: 30 + tolerations: + - effect: NoExecute + operator: Exists + volumes: + - hostPath: + path: /var/lib/minikube/certs/etcd + type: DirectoryOrCreate + name: etcd-certs + - hostPath: + path: /var/lib/minikube/etcd + type: DirectoryOrCreate + name: etcd-data + status: + conditions: + - lastProbeTime: null + lastTransitionTime: "2024-12-26T23:24:19Z" + status: "True" + type: Initialized + - lastProbeTime: null + lastTransitionTime: "2024-12-26T23:24:26Z" + status: "True" + type: Ready + - lastProbeTime: null + lastTransitionTime: "2024-12-26T23:24:26Z" + status: "True" + type: ContainersReady + - lastProbeTime: null + lastTransitionTime: "2024-12-26T23:24:19Z" + status: "True" + type: PodScheduled + containerStatuses: + - containerID: docker://9607cfd75dfa5d4809193a66f44fdbf9fcb40a191cc09533efff0299557cd208 + image: registry.k8s.io/etcd:3.5.6-0 + imageID: docker-pullable://registry.k8s.io/etcd@sha256:dd75ec974b0a2a6f6bb47001ba09207976e625db898d1b16735528c009cb171c + lastState: {} + name: etcd + ready: true + restartCount: 0 + started: true + state: + running: + startedAt: "2024-12-26T23:24:13Z" + hostIP: 192.168.64.7 + phase: Running + podIP: 192.168.64.7 + podIPs: + - ip: 192.168.64.7 + qosClass: Burstable + startTime: "2024-12-26T23:24:19Z" +- apiVersion: v1 + kind: Pod + metadata: + annotations: + kubeadm.kubernetes.io/kube-apiserver.advertise-address.endpoint: 192.168.64.7:8443 + kubernetes.io/config.hash: 6c27bb07114fca4106b83b1d46160bc2 + kubernetes.io/config.mirror: 6c27bb07114fca4106b83b1d46160bc2 + kubernetes.io/config.seen: "2024-12-26T23:24:08.466325673Z" + kubernetes.io/config.source: file + creationTimestamp: "2024-12-26T23:24:18Z" + labels: + component: kube-apiserver + tier: control-plane + managedFields: + - apiVersion: v1 + fieldsType: FieldsV1 + fieldsV1: + f:metadata: + f:annotations: + .: {} + f:kubeadm.kubernetes.io/kube-apiserver.advertise-address.endpoint: {} + f:kubernetes.io/config.hash: {} + f:kubernetes.io/config.mirror: {} + f:kubernetes.io/config.seen: {} + f:kubernetes.io/config.source: {} + f:labels: + .: {} + f:component: {} + f:tier: {} + f:ownerReferences: + .: {} + k:{"uid":"067e4911-dfc8-4e14-aa1a-bff67e325624"}: {} + f:spec: + f:containers: + k:{"name":"kube-apiserver"}: + .: {} + f:command: {} + f:image: {} + f:imagePullPolicy: {} + f:livenessProbe: + .: {} + f:failureThreshold: {} + f:httpGet: + .: {} + f:host: {} + f:path: {} + f:port: {} + f:scheme: {} + f:initialDelaySeconds: {} + f:periodSeconds: {} + f:successThreshold: {} + f:timeoutSeconds: {} + f:name: {} + f:readinessProbe: + .: {} + f:failureThreshold: {} + f:httpGet: + .: {} + f:host: {} + f:path: {} + f:port: {} + f:scheme: {} + f:periodSeconds: {} + f:successThreshold: {} + f:timeoutSeconds: {} + f:resources: + .: {} + f:requests: + .: {} + f:cpu: {} + f:startupProbe: + .: {} + f:failureThreshold: {} + f:httpGet: + .: {} + f:host: {} + f:path: {} + f:port: {} + f:scheme: {} + f:initialDelaySeconds: {} + f:periodSeconds: {} + f:successThreshold: {} + f:timeoutSeconds: {} + f:terminationMessagePath: {} + f:terminationMessagePolicy: {} + f:volumeMounts: + .: {} + k:{"mountPath":"/etc/ssl/certs"}: + .: {} + f:mountPath: {} + f:name: {} + f:readOnly: {} + k:{"mountPath":"/usr/share/ca-certificates"}: + .: {} + f:mountPath: {} + f:name: {} + f:readOnly: {} + k:{"mountPath":"/var/lib/minikube/certs"}: + .: {} + f:mountPath: {} + f:name: {} + f:readOnly: {} + f:dnsPolicy: {} + f:enableServiceLinks: {} + f:hostNetwork: {} + f:nodeName: {} + f:priorityClassName: {} + f:restartPolicy: {} + f:schedulerName: {} + f:securityContext: + .: {} + f:seccompProfile: + .: {} + f:type: {} + f:terminationGracePeriodSeconds: {} + f:tolerations: {} + f:volumes: + .: {} + k:{"name":"ca-certs"}: + .: {} + f:hostPath: + .: {} + f:path: {} + f:type: {} + f:name: {} + k:{"name":"k8s-certs"}: + .: {} + f:hostPath: + .: {} + f:path: {} + f:type: {} + f:name: {} + k:{"name":"usr-share-ca-certificates"}: + .: {} + f:hostPath: + .: {} + f:path: {} + f:type: {} + f:name: {} + manager: kubelet + operation: Update + time: "2024-12-26T23:24:18Z" + - apiVersion: v1 + fieldsType: FieldsV1 + fieldsV1: + f:status: + f:conditions: + .: {} + k:{"type":"ContainersReady"}: + .: {} + f:lastProbeTime: {} + f:lastTransitionTime: {} + f:status: {} + f:type: {} + k:{"type":"Initialized"}: + .: {} + f:lastProbeTime: {} + f:lastTransitionTime: {} + f:status: {} + f:type: {} + k:{"type":"PodScheduled"}: + .: {} + f:lastProbeTime: {} + f:lastTransitionTime: {} + f:status: {} + f:type: {} + k:{"type":"Ready"}: + .: {} + f:lastProbeTime: {} + f:lastTransitionTime: {} + f:status: {} + f:type: {} + f:containerStatuses: {} + f:hostIP: {} + f:phase: {} + f:podIP: {} + f:podIPs: + .: {} + k:{"ip":"192.168.64.7"}: + .: {} + f:ip: {} + f:startTime: {} + manager: kubelet + operation: Update + subresource: status + time: "2024-12-27T17:53:23Z" + name: kube-apiserver-minikube + namespace: kube-system + ownerReferences: + - apiVersion: v1 + controller: true + kind: Node + name: minikube + uid: 067e4911-dfc8-4e14-aa1a-bff67e325624 + resourceVersion: "41907" + uid: 1eb0f38d-a50a-434c-909c-151a45e11785 + spec: + containers: + - command: + - kube-apiserver + - --advertise-address=192.168.64.7 + - --allow-privileged=true + - --authorization-mode=Node,RBAC + - --client-ca-file=/var/lib/minikube/certs/ca.crt + - --enable-admission-plugins=NamespaceLifecycle,LimitRanger,ServiceAccount,DefaultStorageClass,DefaultTolerationSeconds,NodeRestriction,MutatingAdmissionWebhook,ValidatingAdmissionWebhook,ResourceQuota + - --enable-bootstrap-token-auth=true + - --etcd-cafile=/var/lib/minikube/certs/etcd/ca.crt + - --etcd-certfile=/var/lib/minikube/certs/apiserver-etcd-client.crt + - --etcd-keyfile=/var/lib/minikube/certs/apiserver-etcd-client.key + - --etcd-servers=https://127.0.0.1:2379 + - --kubelet-client-certificate=/var/lib/minikube/certs/apiserver-kubelet-client.crt + - --kubelet-client-key=/var/lib/minikube/certs/apiserver-kubelet-client.key + - --kubelet-preferred-address-types=InternalIP,ExternalIP,Hostname + - --proxy-client-cert-file=/var/lib/minikube/certs/front-proxy-client.crt + - --proxy-client-key-file=/var/lib/minikube/certs/front-proxy-client.key + - --requestheader-allowed-names=front-proxy-client + - --requestheader-client-ca-file=/var/lib/minikube/certs/front-proxy-ca.crt + - --requestheader-extra-headers-prefix=X-Remote-Extra- + - --requestheader-group-headers=X-Remote-Group + - --requestheader-username-headers=X-Remote-User + - --secure-port=8443 + - --service-account-issuer=https://kubernetes.default.svc.cluster.local + - --service-account-key-file=/var/lib/minikube/certs/sa.pub + - --service-account-signing-key-file=/var/lib/minikube/certs/sa.key + - --service-cluster-ip-range=10.96.0.0/12 + - --tls-cert-file=/var/lib/minikube/certs/apiserver.crt + - --tls-private-key-file=/var/lib/minikube/certs/apiserver.key + image: registry.k8s.io/kube-apiserver:v1.26.1 + imagePullPolicy: IfNotPresent + livenessProbe: + failureThreshold: 8 + httpGet: + host: 192.168.64.7 + path: /livez + port: 8443 + scheme: HTTPS + initialDelaySeconds: 10 + periodSeconds: 10 + successThreshold: 1 + timeoutSeconds: 15 + name: kube-apiserver + readinessProbe: + failureThreshold: 3 + httpGet: + host: 192.168.64.7 + path: /readyz + port: 8443 + scheme: HTTPS + periodSeconds: 1 + successThreshold: 1 + timeoutSeconds: 15 + resources: + requests: + cpu: 250m + startupProbe: + failureThreshold: 24 + httpGet: + host: 192.168.64.7 + path: /livez + port: 8443 + scheme: HTTPS + initialDelaySeconds: 10 + periodSeconds: 10 + successThreshold: 1 + timeoutSeconds: 15 + terminationMessagePath: /dev/termination-log + terminationMessagePolicy: File + volumeMounts: + - mountPath: /etc/ssl/certs + name: ca-certs + readOnly: true + - mountPath: /var/lib/minikube/certs + name: k8s-certs + readOnly: true + - mountPath: /usr/share/ca-certificates + name: usr-share-ca-certificates + readOnly: true + dnsPolicy: ClusterFirst + enableServiceLinks: true + hostNetwork: true + nodeName: minikube + preemptionPolicy: PreemptLowerPriority + priority: 2000001000 + priorityClassName: system-node-critical + restartPolicy: Always + schedulerName: default-scheduler + securityContext: + seccompProfile: + type: RuntimeDefault + terminationGracePeriodSeconds: 30 + tolerations: + - effect: NoExecute + operator: Exists + volumes: + - hostPath: + path: /etc/ssl/certs + type: DirectoryOrCreate + name: ca-certs + - hostPath: + path: /var/lib/minikube/certs + type: DirectoryOrCreate + name: k8s-certs + - hostPath: + path: /usr/share/ca-certificates + type: DirectoryOrCreate + name: usr-share-ca-certificates + status: + conditions: + - lastProbeTime: null + lastTransitionTime: "2024-12-26T23:24:08Z" + status: "True" + type: Initialized + - lastProbeTime: null + lastTransitionTime: "2024-12-26T23:24:30Z" + status: "True" + type: Ready + - lastProbeTime: null + lastTransitionTime: "2024-12-26T23:24:30Z" + status: "True" + type: ContainersReady + - lastProbeTime: null + lastTransitionTime: "2024-12-26T23:24:08Z" + status: "True" + type: PodScheduled + containerStatuses: + - containerID: docker://43a11653dd11918dc35e011d12338e8367133368cc3b53fb2989a5c942ee4595 + image: registry.k8s.io/kube-apiserver:v1.26.1 + imageID: docker-pullable://registry.k8s.io/kube-apiserver@sha256:99e1ed9fbc8a8d36a70f148f25130c02e0e366875249906be0bcb2c2d9df0c26 + lastState: {} + name: kube-apiserver + ready: true + restartCount: 0 + started: true + state: + running: + startedAt: "2024-12-26T23:24:14Z" + hostIP: 192.168.64.7 + phase: Running + podIP: 192.168.64.7 + podIPs: + - ip: 192.168.64.7 + qosClass: Burstable + startTime: "2024-12-26T23:24:08Z" +- apiVersion: v1 + kind: Pod + metadata: + annotations: + kubernetes.io/config.hash: 96939d3d2117efe8f605629d47b5f330 + kubernetes.io/config.mirror: 96939d3d2117efe8f605629d47b5f330 + kubernetes.io/config.seen: "2024-12-26T23:24:19.681549880Z" + kubernetes.io/config.source: file + creationTimestamp: "2024-12-26T23:24:19Z" + labels: + component: kube-controller-manager + tier: control-plane + managedFields: + - apiVersion: v1 + fieldsType: FieldsV1 + fieldsV1: + f:metadata: + f:annotations: + .: {} + f:kubernetes.io/config.hash: {} + f:kubernetes.io/config.mirror: {} + f:kubernetes.io/config.seen: {} + f:kubernetes.io/config.source: {} + f:labels: + .: {} + f:component: {} + f:tier: {} + f:ownerReferences: + .: {} + k:{"uid":"067e4911-dfc8-4e14-aa1a-bff67e325624"}: {} + f:spec: + f:containers: + k:{"name":"kube-controller-manager"}: + .: {} + f:command: {} + f:image: {} + f:imagePullPolicy: {} + f:livenessProbe: + .: {} + f:failureThreshold: {} + f:httpGet: + .: {} + f:host: {} + f:path: {} + f:port: {} + f:scheme: {} + f:initialDelaySeconds: {} + f:periodSeconds: {} + f:successThreshold: {} + f:timeoutSeconds: {} + f:name: {} + f:resources: + .: {} + f:requests: + .: {} + f:cpu: {} + f:startupProbe: + .: {} + f:failureThreshold: {} + f:httpGet: + .: {} + f:host: {} + f:path: {} + f:port: {} + f:scheme: {} + f:initialDelaySeconds: {} + f:periodSeconds: {} + f:successThreshold: {} + f:timeoutSeconds: {} + f:terminationMessagePath: {} + f:terminationMessagePolicy: {} + f:volumeMounts: + .: {} + k:{"mountPath":"/etc/kubernetes/controller-manager.conf"}: + .: {} + f:mountPath: {} + f:name: {} + f:readOnly: {} + k:{"mountPath":"/etc/ssl/certs"}: + .: {} + f:mountPath: {} + f:name: {} + f:readOnly: {} + k:{"mountPath":"/usr/libexec/kubernetes/kubelet-plugins/volume/exec"}: + .: {} + f:mountPath: {} + f:name: {} + k:{"mountPath":"/usr/share/ca-certificates"}: + .: {} + f:mountPath: {} + f:name: {} + f:readOnly: {} + k:{"mountPath":"/var/lib/minikube/certs"}: + .: {} + f:mountPath: {} + f:name: {} + f:readOnly: {} + f:dnsPolicy: {} + f:enableServiceLinks: {} + f:hostNetwork: {} + f:nodeName: {} + f:priorityClassName: {} + f:restartPolicy: {} + f:schedulerName: {} + f:securityContext: + .: {} + f:seccompProfile: + .: {} + f:type: {} + f:terminationGracePeriodSeconds: {} + f:tolerations: {} + f:volumes: + .: {} + k:{"name":"ca-certs"}: + .: {} + f:hostPath: + .: {} + f:path: {} + f:type: {} + f:name: {} + k:{"name":"flexvolume-dir"}: + .: {} + f:hostPath: + .: {} + f:path: {} + f:type: {} + f:name: {} + k:{"name":"k8s-certs"}: + .: {} + f:hostPath: + .: {} + f:path: {} + f:type: {} + f:name: {} + k:{"name":"kubeconfig"}: + .: {} + f:hostPath: + .: {} + f:path: {} + f:type: {} + f:name: {} + k:{"name":"usr-share-ca-certificates"}: + .: {} + f:hostPath: + .: {} + f:path: {} + f:type: {} + f:name: {} + manager: kubelet + operation: Update + time: "2024-12-26T23:24:19Z" + - apiVersion: v1 + fieldsType: FieldsV1 + fieldsV1: + f:status: + f:conditions: + .: {} + k:{"type":"ContainersReady"}: + .: {} + f:lastProbeTime: {} + f:lastTransitionTime: {} + f:status: {} + f:type: {} + k:{"type":"Initialized"}: + .: {} + f:lastProbeTime: {} + f:lastTransitionTime: {} + f:status: {} + f:type: {} + k:{"type":"PodScheduled"}: + .: {} + f:lastProbeTime: {} + f:lastTransitionTime: {} + f:status: {} + f:type: {} + k:{"type":"Ready"}: + .: {} + f:lastProbeTime: {} + f:lastTransitionTime: {} + f:status: {} + f:type: {} + f:containerStatuses: {} + f:hostIP: {} + f:phase: {} + f:podIP: {} + f:podIPs: + .: {} + k:{"ip":"192.168.64.7"}: + .: {} + f:ip: {} + f:startTime: {} + manager: kubelet + operation: Update + subresource: status + time: "2024-12-27T17:53:25Z" + name: kube-controller-manager-minikube + namespace: kube-system + ownerReferences: + - apiVersion: v1 + controller: true + kind: Node + name: minikube + uid: 067e4911-dfc8-4e14-aa1a-bff67e325624 + resourceVersion: "41941" + uid: 578a15a9-8037-48ba-9079-26d56ad55d3e + spec: + containers: + - command: + - kube-controller-manager + - --allocate-node-cidrs=true + - --authentication-kubeconfig=/etc/kubernetes/controller-manager.conf + - --authorization-kubeconfig=/etc/kubernetes/controller-manager.conf + - --bind-address=127.0.0.1 + - --client-ca-file=/var/lib/minikube/certs/ca.crt + - --cluster-cidr=10.244.0.0/16 + - --cluster-name=mk + - --cluster-signing-cert-file=/var/lib/minikube/certs/ca.crt + - --cluster-signing-key-file=/var/lib/minikube/certs/ca.key + - --controllers=*,bootstrapsigner,tokencleaner + - --kubeconfig=/etc/kubernetes/controller-manager.conf + - --leader-elect=false + - --requestheader-client-ca-file=/var/lib/minikube/certs/front-proxy-ca.crt + - --root-ca-file=/var/lib/minikube/certs/ca.crt + - --service-account-private-key-file=/var/lib/minikube/certs/sa.key + - --service-cluster-ip-range=10.96.0.0/12 + - --use-service-account-credentials=true + image: registry.k8s.io/kube-controller-manager:v1.26.1 + imagePullPolicy: IfNotPresent + livenessProbe: + failureThreshold: 8 + httpGet: + host: 127.0.0.1 + path: /healthz + port: 10257 + scheme: HTTPS + initialDelaySeconds: 10 + periodSeconds: 10 + successThreshold: 1 + timeoutSeconds: 15 + name: kube-controller-manager + resources: + requests: + cpu: 200m + startupProbe: + failureThreshold: 24 + httpGet: + host: 127.0.0.1 + path: /healthz + port: 10257 + scheme: HTTPS + initialDelaySeconds: 10 + periodSeconds: 10 + successThreshold: 1 + timeoutSeconds: 15 + terminationMessagePath: /dev/termination-log + terminationMessagePolicy: File + volumeMounts: + - mountPath: /etc/ssl/certs + name: ca-certs + readOnly: true + - mountPath: /usr/libexec/kubernetes/kubelet-plugins/volume/exec + name: flexvolume-dir + - mountPath: /var/lib/minikube/certs + name: k8s-certs + readOnly: true + - mountPath: /etc/kubernetes/controller-manager.conf + name: kubeconfig + readOnly: true + - mountPath: /usr/share/ca-certificates + name: usr-share-ca-certificates + readOnly: true + dnsPolicy: ClusterFirst + enableServiceLinks: true + hostNetwork: true + nodeName: minikube + preemptionPolicy: PreemptLowerPriority + priority: 2000001000 + priorityClassName: system-node-critical + restartPolicy: Always + schedulerName: default-scheduler + securityContext: + seccompProfile: + type: RuntimeDefault + terminationGracePeriodSeconds: 30 + tolerations: + - effect: NoExecute + operator: Exists + volumes: + - hostPath: + path: /etc/ssl/certs + type: DirectoryOrCreate + name: ca-certs + - hostPath: + path: /usr/libexec/kubernetes/kubelet-plugins/volume/exec + type: DirectoryOrCreate + name: flexvolume-dir + - hostPath: + path: /var/lib/minikube/certs + type: DirectoryOrCreate + name: k8s-certs + - hostPath: + path: /etc/kubernetes/controller-manager.conf + type: FileOrCreate + name: kubeconfig + - hostPath: + path: /usr/share/ca-certificates + type: DirectoryOrCreate + name: usr-share-ca-certificates + status: + conditions: + - lastProbeTime: null + lastTransitionTime: "2024-12-26T23:24:19Z" + status: "True" + type: Initialized + - lastProbeTime: null + lastTransitionTime: "2024-12-26T23:24:31Z" + status: "True" + type: Ready + - lastProbeTime: null + lastTransitionTime: "2024-12-26T23:24:31Z" + status: "True" + type: ContainersReady + - lastProbeTime: null + lastTransitionTime: "2024-12-26T23:24:19Z" + status: "True" + type: PodScheduled + containerStatuses: + - containerID: docker://7f96ee406d0657e08bb8563193229c7cd2438aa1fc9fe9c0f642acc1ab692d00 + image: registry.k8s.io/kube-controller-manager:v1.26.1 + imageID: docker-pullable://registry.k8s.io/kube-controller-manager@sha256:40adecbe3a40aa147c7d6e9a1f5fbd99b3f6d42d5222483ed3a47337d4f9a10b + lastState: {} + name: kube-controller-manager + ready: true + restartCount: 0 + started: true + state: + running: + startedAt: "2024-12-26T23:24:13Z" + hostIP: 192.168.64.7 + phase: Running + podIP: 192.168.64.7 + podIPs: + - ip: 192.168.64.7 + qosClass: Burstable + startTime: "2024-12-26T23:24:19Z" +- apiVersion: v1 + kind: Pod + metadata: + creationTimestamp: "2024-12-26T23:24:31Z" + generateName: kube-proxy- + labels: + controller-revision-hash: 6bc4695d8c + k8s-app: kube-proxy + pod-template-generation: "1" + managedFields: + - apiVersion: v1 + fieldsType: FieldsV1 + fieldsV1: + f:metadata: + f:generateName: {} + f:labels: + .: {} + f:controller-revision-hash: {} + f:k8s-app: {} + f:pod-template-generation: {} + f:ownerReferences: + .: {} + k:{"uid":"1e7933c6-ff5a-4c53-ab62-74703a673cb9"}: {} + f:spec: + f:affinity: + .: {} + f:nodeAffinity: + .: {} + f:requiredDuringSchedulingIgnoredDuringExecution: {} + f:containers: + k:{"name":"kube-proxy"}: + .: {} + f:command: {} + f:env: + .: {} + k:{"name":"NODE_NAME"}: + .: {} + f:name: {} + f:valueFrom: + .: {} + f:fieldRef: {} + f:image: {} + f:imagePullPolicy: {} + f:name: {} + f:resources: {} + f:securityContext: + .: {} + f:privileged: {} + f:terminationMessagePath: {} + f:terminationMessagePolicy: {} + f:volumeMounts: + .: {} + k:{"mountPath":"/lib/modules"}: + .: {} + f:mountPath: {} + f:name: {} + f:readOnly: {} + k:{"mountPath":"/run/xtables.lock"}: + .: {} + f:mountPath: {} + f:name: {} + k:{"mountPath":"/var/lib/kube-proxy"}: + .: {} + f:mountPath: {} + f:name: {} + f:dnsPolicy: {} + f:enableServiceLinks: {} + f:hostNetwork: {} + f:nodeSelector: {} + f:priorityClassName: {} + f:restartPolicy: {} + f:schedulerName: {} + f:securityContext: {} + f:serviceAccount: {} + f:serviceAccountName: {} + f:terminationGracePeriodSeconds: {} + f:tolerations: {} + f:volumes: + .: {} + k:{"name":"kube-proxy"}: + .: {} + f:configMap: + .: {} + f:defaultMode: {} + f:name: {} + f:name: {} + k:{"name":"lib-modules"}: + .: {} + f:hostPath: + .: {} + f:path: {} + f:type: {} + f:name: {} + k:{"name":"xtables-lock"}: + .: {} + f:hostPath: + .: {} + f:path: {} + f:type: {} + f:name: {} + manager: kube-controller-manager + operation: Update + time: "2024-12-26T23:24:31Z" + - apiVersion: v1 + fieldsType: FieldsV1 + fieldsV1: + f:status: + f:conditions: + k:{"type":"ContainersReady"}: + .: {} + f:lastProbeTime: {} + f:lastTransitionTime: {} + f:status: {} + f:type: {} + k:{"type":"Initialized"}: + .: {} + f:lastProbeTime: {} + f:lastTransitionTime: {} + f:status: {} + f:type: {} + k:{"type":"Ready"}: + .: {} + f:lastProbeTime: {} + f:lastTransitionTime: {} + f:status: {} + f:type: {} + f:containerStatuses: {} + f:hostIP: {} + f:phase: {} + f:podIP: {} + f:podIPs: + .: {} + k:{"ip":"192.168.64.7"}: + .: {} + f:ip: {} + f:startTime: {} + manager: kubelet + operation: Update + subresource: status + time: "2024-12-27T17:53:25Z" + name: kube-proxy-frtq7 + namespace: kube-system + ownerReferences: + - apiVersion: apps/v1 + blockOwnerDeletion: true + controller: true + kind: DaemonSet + name: kube-proxy + uid: 1e7933c6-ff5a-4c53-ab62-74703a673cb9 + resourceVersion: "41942" + uid: 487447d7-1283-44ee-8821-3987ea19b295 + spec: + affinity: + nodeAffinity: + requiredDuringSchedulingIgnoredDuringExecution: + nodeSelectorTerms: + - matchFields: + - key: metadata.name + operator: In + values: + - minikube + containers: + - command: + - /usr/local/bin/kube-proxy + - --config=/var/lib/kube-proxy/config.conf + - --hostname-override=$(NODE_NAME) + env: + - name: NODE_NAME + valueFrom: + fieldRef: + apiVersion: v1 + fieldPath: spec.nodeName + image: registry.k8s.io/kube-proxy:v1.26.1 + imagePullPolicy: IfNotPresent + name: kube-proxy + resources: {} + securityContext: + privileged: true + terminationMessagePath: /dev/termination-log + terminationMessagePolicy: File + volumeMounts: + - mountPath: /var/lib/kube-proxy + name: kube-proxy + - mountPath: /run/xtables.lock + name: xtables-lock + - mountPath: /lib/modules + name: lib-modules + readOnly: true + - mountPath: /var/run/secrets/kubernetes.io/serviceaccount + name: kube-api-access-7mkwz + readOnly: true + dnsPolicy: ClusterFirst + enableServiceLinks: true + hostNetwork: true + nodeName: minikube + nodeSelector: + kubernetes.io/os: linux + preemptionPolicy: PreemptLowerPriority + priority: 2000001000 + priorityClassName: system-node-critical + restartPolicy: Always + schedulerName: default-scheduler + securityContext: {} + serviceAccount: kube-proxy + serviceAccountName: kube-proxy + terminationGracePeriodSeconds: 30 + tolerations: + - operator: Exists + - effect: NoExecute + key: node.kubernetes.io/not-ready + operator: Exists + - effect: NoExecute + key: node.kubernetes.io/unreachable + operator: Exists + - effect: NoSchedule + key: node.kubernetes.io/disk-pressure + operator: Exists + - effect: NoSchedule + key: node.kubernetes.io/memory-pressure + operator: Exists + - effect: NoSchedule + key: node.kubernetes.io/pid-pressure + operator: Exists + - effect: NoSchedule + key: node.kubernetes.io/unschedulable + operator: Exists + - effect: NoSchedule + key: node.kubernetes.io/network-unavailable + operator: Exists + volumes: + - configMap: + defaultMode: 420 + name: kube-proxy + name: kube-proxy + - hostPath: + path: /run/xtables.lock + type: FileOrCreate + name: xtables-lock + - hostPath: + path: /lib/modules + type: "" + name: lib-modules + - name: kube-api-access-7mkwz + projected: + defaultMode: 420 + sources: + - serviceAccountToken: + expirationSeconds: 3607 + path: token + - configMap: + items: + - key: ca.crt + path: ca.crt + name: kube-root-ca.crt + - downwardAPI: + items: + - fieldRef: + apiVersion: v1 + fieldPath: metadata.namespace + path: namespace + status: + conditions: + - lastProbeTime: null + lastTransitionTime: "2024-12-26T23:24:31Z" + status: "True" + type: Initialized + - lastProbeTime: null + lastTransitionTime: "2024-12-26T23:24:33Z" + status: "True" + type: Ready + - lastProbeTime: null + lastTransitionTime: "2024-12-26T23:24:33Z" + status: "True" + type: ContainersReady + - lastProbeTime: null + lastTransitionTime: "2024-12-26T23:24:31Z" + status: "True" + type: PodScheduled + containerStatuses: + - containerID: docker://d00203c12abdef415fd6941da5530d53deffb7e5c05111deab948e9a0cb85736 + image: registry.k8s.io/kube-proxy:v1.26.1 + imageID: docker-pullable://registry.k8s.io/kube-proxy@sha256:85f705e7d98158a67432c53885b0d470c673b0fad3693440b45d07efebcda1c3 + lastState: {} + name: kube-proxy + ready: true + restartCount: 0 + started: true + state: + running: + startedAt: "2024-12-26T23:24:32Z" + hostIP: 192.168.64.7 + phase: Running + podIP: 192.168.64.7 + podIPs: + - ip: 192.168.64.7 + qosClass: BestEffort + startTime: "2024-12-26T23:24:31Z" +- apiVersion: v1 + kind: Pod + metadata: + annotations: + kubernetes.io/config.hash: 197cd0de602d7cb722d0bd2daf878121 + kubernetes.io/config.mirror: 197cd0de602d7cb722d0bd2daf878121 + kubernetes.io/config.seen: "2024-12-26T23:24:08.466375624Z" + kubernetes.io/config.source: file + creationTimestamp: "2024-12-26T23:24:18Z" + labels: + component: kube-scheduler + tier: control-plane + managedFields: + - apiVersion: v1 + fieldsType: FieldsV1 + fieldsV1: + f:metadata: + f:annotations: + .: {} + f:kubernetes.io/config.hash: {} + f:kubernetes.io/config.mirror: {} + f:kubernetes.io/config.seen: {} + f:kubernetes.io/config.source: {} + f:labels: + .: {} + f:component: {} + f:tier: {} + f:ownerReferences: + .: {} + k:{"uid":"067e4911-dfc8-4e14-aa1a-bff67e325624"}: {} + f:spec: + f:containers: + k:{"name":"kube-scheduler"}: + .: {} + f:command: {} + f:image: {} + f:imagePullPolicy: {} + f:livenessProbe: + .: {} + f:failureThreshold: {} + f:httpGet: + .: {} + f:host: {} + f:path: {} + f:port: {} + f:scheme: {} + f:initialDelaySeconds: {} + f:periodSeconds: {} + f:successThreshold: {} + f:timeoutSeconds: {} + f:name: {} + f:resources: + .: {} + f:requests: + .: {} + f:cpu: {} + f:startupProbe: + .: {} + f:failureThreshold: {} + f:httpGet: + .: {} + f:host: {} + f:path: {} + f:port: {} + f:scheme: {} + f:initialDelaySeconds: {} + f:periodSeconds: {} + f:successThreshold: {} + f:timeoutSeconds: {} + f:terminationMessagePath: {} + f:terminationMessagePolicy: {} + f:volumeMounts: + .: {} + k:{"mountPath":"/etc/kubernetes/scheduler.conf"}: + .: {} + f:mountPath: {} + f:name: {} + f:readOnly: {} + f:dnsPolicy: {} + f:enableServiceLinks: {} + f:hostNetwork: {} + f:nodeName: {} + f:priorityClassName: {} + f:restartPolicy: {} + f:schedulerName: {} + f:securityContext: + .: {} + f:seccompProfile: + .: {} + f:type: {} + f:terminationGracePeriodSeconds: {} + f:tolerations: {} + f:volumes: + .: {} + k:{"name":"kubeconfig"}: + .: {} + f:hostPath: + .: {} + f:path: {} + f:type: {} + f:name: {} + manager: kubelet + operation: Update + time: "2024-12-26T23:24:18Z" + - apiVersion: v1 + fieldsType: FieldsV1 + fieldsV1: + f:status: + f:conditions: + .: {} + k:{"type":"ContainersReady"}: + .: {} + f:lastProbeTime: {} + f:lastTransitionTime: {} + f:status: {} + f:type: {} + k:{"type":"Initialized"}: + .: {} + f:lastProbeTime: {} + f:lastTransitionTime: {} + f:status: {} + f:type: {} + k:{"type":"PodScheduled"}: + .: {} + f:lastProbeTime: {} + f:lastTransitionTime: {} + f:status: {} + f:type: {} + k:{"type":"Ready"}: + .: {} + f:lastProbeTime: {} + f:lastTransitionTime: {} + f:status: {} + f:type: {} + f:containerStatuses: {} + f:hostIP: {} + f:phase: {} + f:podIP: {} + f:podIPs: + .: {} + k:{"ip":"192.168.64.7"}: + .: {} + f:ip: {} + f:startTime: {} + manager: kubelet + operation: Update + subresource: status + time: "2024-12-27T17:53:25Z" + name: kube-scheduler-minikube + namespace: kube-system + ownerReferences: + - apiVersion: v1 + controller: true + kind: Node + name: minikube + uid: 067e4911-dfc8-4e14-aa1a-bff67e325624 + resourceVersion: "41939" + uid: 18c6228f-48d8-4cf3-9fe3-833e56e9865e + spec: + containers: + - command: + - kube-scheduler + - --authentication-kubeconfig=/etc/kubernetes/scheduler.conf + - --authorization-kubeconfig=/etc/kubernetes/scheduler.conf + - --bind-address=127.0.0.1 + - --kubeconfig=/etc/kubernetes/scheduler.conf + - --leader-elect=false + image: registry.k8s.io/kube-scheduler:v1.26.1 + imagePullPolicy: IfNotPresent + livenessProbe: + failureThreshold: 8 + httpGet: + host: 127.0.0.1 + path: /healthz + port: 10259 + scheme: HTTPS + initialDelaySeconds: 10 + periodSeconds: 10 + successThreshold: 1 + timeoutSeconds: 15 + name: kube-scheduler + resources: + requests: + cpu: 100m + startupProbe: + failureThreshold: 24 + httpGet: + host: 127.0.0.1 + path: /healthz + port: 10259 + scheme: HTTPS + initialDelaySeconds: 10 + periodSeconds: 10 + successThreshold: 1 + timeoutSeconds: 15 + terminationMessagePath: /dev/termination-log + terminationMessagePolicy: File + volumeMounts: + - mountPath: /etc/kubernetes/scheduler.conf + name: kubeconfig + readOnly: true + dnsPolicy: ClusterFirst + enableServiceLinks: true + hostNetwork: true + nodeName: minikube + preemptionPolicy: PreemptLowerPriority + priority: 2000001000 + priorityClassName: system-node-critical + restartPolicy: Always + schedulerName: default-scheduler + securityContext: + seccompProfile: + type: RuntimeDefault + terminationGracePeriodSeconds: 30 + tolerations: + - effect: NoExecute + operator: Exists + volumes: + - hostPath: + path: /etc/kubernetes/scheduler.conf + type: FileOrCreate + name: kubeconfig + status: + conditions: + - lastProbeTime: null + lastTransitionTime: "2024-12-26T23:24:20Z" + status: "True" + type: Initialized + - lastProbeTime: null + lastTransitionTime: "2024-12-26T23:24:29Z" + status: "True" + type: Ready + - lastProbeTime: null + lastTransitionTime: "2024-12-26T23:24:29Z" + status: "True" + type: ContainersReady + - lastProbeTime: null + lastTransitionTime: "2024-12-26T23:24:20Z" + status: "True" + type: PodScheduled + containerStatuses: + - containerID: docker://35d2502ae3970d4ade8f0998c7e1f0628fa5525736ab137d121f8689331d67aa + image: registry.k8s.io/kube-scheduler:v1.26.1 + imageID: docker-pullable://registry.k8s.io/kube-scheduler@sha256:af0292c2c4fa6d09ee8544445eef373c1c280113cb6c968398a37da3744c41e4 + lastState: {} + name: kube-scheduler + ready: true + restartCount: 0 + started: true + state: + running: + startedAt: "2024-12-26T23:24:13Z" + hostIP: 192.168.64.7 + phase: Running + podIP: 192.168.64.7 + podIPs: + - ip: 192.168.64.7 + qosClass: Burstable + startTime: "2024-12-26T23:24:20Z" +- apiVersion: v1 + kind: Pod + metadata: + creationTimestamp: "2024-12-26T23:26:51Z" + generateName: metrics-server-5f8fcc9bb7- + labels: + k8s-app: metrics-server + pod-template-hash: 5f8fcc9bb7 + managedFields: + - apiVersion: v1 + fieldsType: FieldsV1 + fieldsV1: + f:metadata: + f:generateName: {} + f:labels: + .: {} + f:k8s-app: {} + f:pod-template-hash: {} + f:ownerReferences: + .: {} + k:{"uid":"93ecb540-a33d-495f-a0e1-1b5fefb3fe04"}: {} + f:spec: + f:containers: + k:{"name":"metrics-server"}: + .: {} + f:args: {} + f:image: {} + f:imagePullPolicy: {} + f:livenessProbe: + .: {} + f:failureThreshold: {} + f:httpGet: + .: {} + f:path: {} + f:port: {} + f:scheme: {} + f:periodSeconds: {} + f:successThreshold: {} + f:timeoutSeconds: {} + f:name: {} + f:ports: + .: {} + k:{"containerPort":4443,"protocol":"TCP"}: + .: {} + f:containerPort: {} + f:name: {} + f:protocol: {} + f:readinessProbe: + .: {} + f:failureThreshold: {} + f:httpGet: + .: {} + f:path: {} + f:port: {} + f:scheme: {} + f:periodSeconds: {} + f:successThreshold: {} + f:timeoutSeconds: {} + f:resources: + .: {} + f:requests: + .: {} + f:cpu: {} + f:memory: {} + f:securityContext: + .: {} + f:readOnlyRootFilesystem: {} + f:runAsNonRoot: {} + f:runAsUser: {} + f:terminationMessagePath: {} + f:terminationMessagePolicy: {} + f:volumeMounts: + .: {} + k:{"mountPath":"/tmp"}: + .: {} + f:mountPath: {} + f:name: {} + f:dnsPolicy: {} + f:enableServiceLinks: {} + f:priorityClassName: {} + f:restartPolicy: {} + f:schedulerName: {} + f:securityContext: {} + f:serviceAccount: {} + f:serviceAccountName: {} + f:terminationGracePeriodSeconds: {} + f:volumes: + .: {} + k:{"name":"tmp-dir"}: + .: {} + f:emptyDir: {} + f:name: {} + manager: kube-controller-manager + operation: Update + time: "2024-12-26T23:26:51Z" + - apiVersion: v1 + fieldsType: FieldsV1 + fieldsV1: + f:status: + f:conditions: + k:{"type":"ContainersReady"}: + .: {} + f:lastProbeTime: {} + f:lastTransitionTime: {} + f:status: {} + f:type: {} + k:{"type":"Initialized"}: + .: {} + f:lastProbeTime: {} + f:lastTransitionTime: {} + f:status: {} + f:type: {} + k:{"type":"Ready"}: + .: {} + f:lastProbeTime: {} + f:lastTransitionTime: {} + f:status: {} + f:type: {} + f:containerStatuses: {} + f:hostIP: {} + f:phase: {} + f:podIP: {} + f:podIPs: + .: {} + k:{"ip":"10.244.0.8"}: + .: {} + f:ip: {} + f:startTime: {} + manager: kubelet + operation: Update + subresource: status + time: "2024-12-27T17:53:24Z" + name: metrics-server-5f8fcc9bb7-cnkld + namespace: kube-system + ownerReferences: + - apiVersion: apps/v1 + blockOwnerDeletion: true + controller: true + kind: ReplicaSet + name: metrics-server-5f8fcc9bb7 + uid: 93ecb540-a33d-495f-a0e1-1b5fefb3fe04 + resourceVersion: "41933" + uid: a3ffadb5-fc0c-45a3-bfe9-3ddd947ee12a + spec: + containers: + - args: + - --cert-dir=/tmp + - --secure-port=4443 + - --kubelet-preferred-address-types=InternalIP,ExternalIP,Hostname + - --kubelet-use-node-status-port + - --metric-resolution=60s + - --kubelet-insecure-tls + image: registry.k8s.io/metrics-server/metrics-server:v0.6.2@sha256:f977ad859fb500c1302d9c3428c6271db031bb7431e7076213b676b345a88dc2 + imagePullPolicy: IfNotPresent + livenessProbe: + failureThreshold: 3 + httpGet: + path: /livez + port: https + scheme: HTTPS + periodSeconds: 10 + successThreshold: 1 + timeoutSeconds: 1 + name: metrics-server + ports: + - containerPort: 4443 + name: https + protocol: TCP + readinessProbe: + failureThreshold: 3 + httpGet: + path: /readyz + port: https + scheme: HTTPS + periodSeconds: 10 + successThreshold: 1 + timeoutSeconds: 1 + resources: + requests: + cpu: 100m + memory: 200Mi + securityContext: + readOnlyRootFilesystem: true + runAsNonRoot: true + runAsUser: 1000 + terminationMessagePath: /dev/termination-log + terminationMessagePolicy: File + volumeMounts: + - mountPath: /tmp + name: tmp-dir + - mountPath: /var/run/secrets/kubernetes.io/serviceaccount + name: kube-api-access-kf82s + readOnly: true + dnsPolicy: ClusterFirst + enableServiceLinks: true + nodeName: minikube + preemptionPolicy: PreemptLowerPriority + priority: 2000000000 + priorityClassName: system-cluster-critical + restartPolicy: Always + schedulerName: default-scheduler + securityContext: {} + serviceAccount: metrics-server + serviceAccountName: metrics-server + terminationGracePeriodSeconds: 30 + tolerations: + - effect: NoExecute + key: node.kubernetes.io/not-ready + operator: Exists + tolerationSeconds: 300 + - effect: NoExecute + key: node.kubernetes.io/unreachable + operator: Exists + tolerationSeconds: 300 + volumes: + - emptyDir: {} + name: tmp-dir + - name: kube-api-access-kf82s + projected: + defaultMode: 420 + sources: + - serviceAccountToken: + expirationSeconds: 3607 + path: token + - configMap: + items: + - key: ca.crt + path: ca.crt + name: kube-root-ca.crt + - downwardAPI: + items: + - fieldRef: + apiVersion: v1 + fieldPath: metadata.namespace + path: namespace + status: + conditions: + - lastProbeTime: null + lastTransitionTime: "2024-12-26T23:26:51Z" + status: "True" + type: Initialized + - lastProbeTime: null + lastTransitionTime: "2024-12-26T23:27:03Z" + status: "True" + type: Ready + - lastProbeTime: null + lastTransitionTime: "2024-12-26T23:27:03Z" + status: "True" + type: ContainersReady + - lastProbeTime: null + lastTransitionTime: "2024-12-26T23:26:51Z" + status: "True" + type: PodScheduled + containerStatuses: + - containerID: docker://cb942ffac859c47e7e9b6dd5ff4f9e9438656c062a5c7d86f6f7c2d474a9c9a0 + image: registry.k8s.io/metrics-server/metrics-server@sha256:f977ad859fb500c1302d9c3428c6271db031bb7431e7076213b676b345a88dc2 + imageID: docker-pullable://registry.k8s.io/metrics-server/metrics-server@sha256:f977ad859fb500c1302d9c3428c6271db031bb7431e7076213b676b345a88dc2 + lastState: {} + name: metrics-server + ready: true + restartCount: 0 + started: true + state: + running: + startedAt: "2024-12-26T23:27:00Z" + hostIP: 192.168.64.7 + phase: Running + podIP: 10.244.0.8 + podIPs: + - ip: 10.244.0.8 + qosClass: Burstable + startTime: "2024-12-26T23:26:51Z" +- apiVersion: v1 + kind: Pod + metadata: + annotations: + kubectl.kubernetes.io/last-applied-configuration: | + {"apiVersion":"v1","kind":"Pod","metadata":{"annotations":{},"labels":{"addonmanager.kubernetes.io/mode":"Reconcile","integration-test":"storage-provisioner"},"name":"storage-provisioner","namespace":"kube-system"},"spec":{"containers":[{"command":["/storage-provisioner"],"image":"gcr.io/k8s-minikube/storage-provisioner:v5","imagePullPolicy":"IfNotPresent","name":"storage-provisioner","volumeMounts":[{"mountPath":"/tmp","name":"tmp"}]}],"hostNetwork":true,"serviceAccountName":"storage-provisioner","volumes":[{"hostPath":{"path":"/tmp","type":"Directory"},"name":"tmp"}]}} + creationTimestamp: "2024-12-26T23:24:21Z" + labels: + addonmanager.kubernetes.io/mode: Reconcile + integration-test: storage-provisioner + managedFields: + - apiVersion: v1 + fieldsType: FieldsV1 + fieldsV1: + f:status: + f:conditions: + .: {} + k:{"type":"PodScheduled"}: + .: {} + f:lastProbeTime: {} + f:lastTransitionTime: {} + f:message: {} + f:reason: {} + f:status: {} + f:type: {} + manager: kube-scheduler + operation: Update + subresource: status + time: "2024-12-26T23:24:21Z" + - apiVersion: v1 + fieldsType: FieldsV1 + fieldsV1: + f:metadata: + f:annotations: + .: {} + f:kubectl.kubernetes.io/last-applied-configuration: {} + f:labels: + .: {} + f:addonmanager.kubernetes.io/mode: {} + f:integration-test: {} + f:spec: + f:containers: + k:{"name":"storage-provisioner"}: + .: {} + f:command: {} + f:image: {} + f:imagePullPolicy: {} + f:name: {} + f:resources: {} + f:terminationMessagePath: {} + f:terminationMessagePolicy: {} + f:volumeMounts: + .: {} + k:{"mountPath":"/tmp"}: + .: {} + f:mountPath: {} + f:name: {} + f:dnsPolicy: {} + f:enableServiceLinks: {} + f:hostNetwork: {} + f:restartPolicy: {} + f:schedulerName: {} + f:securityContext: {} + f:serviceAccount: {} + f:serviceAccountName: {} + f:terminationGracePeriodSeconds: {} + f:volumes: + .: {} + k:{"name":"tmp"}: + .: {} + f:hostPath: + .: {} + f:path: {} + f:type: {} + f:name: {} + manager: kubectl-client-side-apply + operation: Update + time: "2024-12-26T23:24:21Z" + - apiVersion: v1 + fieldsType: FieldsV1 + fieldsV1: + f:status: + f:conditions: + k:{"type":"ContainersReady"}: + .: {} + f:lastProbeTime: {} + f:lastTransitionTime: {} + f:status: {} + f:type: {} + k:{"type":"Initialized"}: + .: {} + f:lastProbeTime: {} + f:lastTransitionTime: {} + f:status: {} + f:type: {} + k:{"type":"Ready"}: + .: {} + f:lastProbeTime: {} + f:lastTransitionTime: {} + f:status: {} + f:type: {} + f:containerStatuses: {} + f:hostIP: {} + f:phase: {} + f:podIP: {} + f:podIPs: + .: {} + k:{"ip":"192.168.64.7"}: + .: {} + f:ip: {} + f:startTime: {} + manager: kubelet + operation: Update + subresource: status + time: "2024-12-27T17:53:23Z" + name: storage-provisioner + namespace: kube-system + resourceVersion: "41926" + uid: a47d3b4c-2208-4e3c-83d4-1684afd53a26 + spec: + containers: + - command: + - /storage-provisioner + image: gcr.io/k8s-minikube/storage-provisioner:v5 + imagePullPolicy: IfNotPresent + name: storage-provisioner + resources: {} + terminationMessagePath: /dev/termination-log + terminationMessagePolicy: File + volumeMounts: + - mountPath: /tmp + name: tmp + - mountPath: /var/run/secrets/kubernetes.io/serviceaccount + name: kube-api-access-kj89z + readOnly: true + dnsPolicy: ClusterFirst + enableServiceLinks: true + hostNetwork: true + nodeName: minikube + preemptionPolicy: PreemptLowerPriority + priority: 0 + restartPolicy: Always + schedulerName: default-scheduler + securityContext: {} + serviceAccount: storage-provisioner + serviceAccountName: storage-provisioner + terminationGracePeriodSeconds: 30 + tolerations: + - effect: NoExecute + key: node.kubernetes.io/not-ready + operator: Exists + tolerationSeconds: 300 + - effect: NoExecute + key: node.kubernetes.io/unreachable + operator: Exists + tolerationSeconds: 300 + volumes: + - hostPath: + path: /tmp + type: Directory + name: tmp + - name: kube-api-access-kj89z + projected: + defaultMode: 420 + sources: + - serviceAccountToken: + expirationSeconds: 3607 + path: token + - configMap: + items: + - key: ca.crt + path: ca.crt + name: kube-root-ca.crt + - downwardAPI: + items: + - fieldRef: + apiVersion: v1 + fieldPath: metadata.namespace + path: namespace + status: + conditions: + - lastProbeTime: null + lastTransitionTime: "2024-12-26T23:24:31Z" + status: "True" + type: Initialized + - lastProbeTime: null + lastTransitionTime: "2024-12-26T23:25:05Z" + status: "True" + type: Ready + - lastProbeTime: null + lastTransitionTime: "2024-12-26T23:25:05Z" + status: "True" + type: ContainersReady + - lastProbeTime: null + lastTransitionTime: "2024-12-26T23:24:31Z" + status: "True" + type: PodScheduled + containerStatuses: + - containerID: docker://23326e1a11e342fbae2981a93731e81aaeda85f2370bec9205a6c3b2649c1143 + image: gcr.io/k8s-minikube/storage-provisioner:v5 + imageID: docker-pullable://gcr.io/k8s-minikube/storage-provisioner@sha256:18eb69d1418e854ad5a19e399310e52808a8321e4c441c1dddad8977a0d7a944 + lastState: + terminated: + containerID: docker://7ebdd20e2d399bf50cde7cabb3eb94a600699d3926b2e7c159a92d923c333b98 + exitCode: 1 + finishedAt: "2024-12-26T23:25:03Z" + reason: Error + startedAt: "2024-12-26T23:24:32Z" + name: storage-provisioner + ready: true + restartCount: 1 + started: true + state: + running: + startedAt: "2024-12-26T23:25:04Z" + hostIP: 192.168.64.7 + phase: Running + podIP: 192.168.64.7 + podIPs: + - ip: 192.168.64.7 + qosClass: BestEffort + startTime: "2024-12-26T23:24:31Z" +- apiVersion: apps/v1 + kind: ReplicaSet + metadata: + annotations: + deployment.kubernetes.io/desired-replicas: "1" + deployment.kubernetes.io/max-replicas: "2" + deployment.kubernetes.io/revision: "1" + creationTimestamp: "2024-12-26T23:24:32Z" + generation: 1 + labels: + k8s-app: kube-dns + pod-template-hash: 787d4945fb + managedFields: + - apiVersion: apps/v1 + fieldsType: FieldsV1 + fieldsV1: + f:metadata: + f:annotations: + .: {} + f:deployment.kubernetes.io/desired-replicas: {} + f:deployment.kubernetes.io/max-replicas: {} + f:deployment.kubernetes.io/revision: {} + f:labels: + .: {} + f:k8s-app: {} + f:pod-template-hash: {} + f:ownerReferences: + .: {} + k:{"uid":"ade21f51-f5f9-48f0-9179-59925cbd215d"}: {} + f:spec: + f:replicas: {} + f:selector: {} + f:template: + f:metadata: + f:labels: + .: {} + f:k8s-app: {} + f:pod-template-hash: {} + f:spec: + f:affinity: + .: {} + f:podAntiAffinity: + .: {} + f:preferredDuringSchedulingIgnoredDuringExecution: {} + f:containers: + k:{"name":"coredns"}: + .: {} + f:args: {} + f:image: {} + f:imagePullPolicy: {} + f:livenessProbe: + .: {} + f:failureThreshold: {} + f:httpGet: + .: {} + f:path: {} + f:port: {} + f:scheme: {} + f:initialDelaySeconds: {} + f:periodSeconds: {} + f:successThreshold: {} + f:timeoutSeconds: {} + f:name: {} + f:ports: + .: {} + k:{"containerPort":53,"protocol":"TCP"}: + .: {} + f:containerPort: {} + f:name: {} + f:protocol: {} + k:{"containerPort":53,"protocol":"UDP"}: + .: {} + f:containerPort: {} + f:name: {} + f:protocol: {} + k:{"containerPort":9153,"protocol":"TCP"}: + .: {} + f:containerPort: {} + f:name: {} + f:protocol: {} + f:readinessProbe: + .: {} + f:failureThreshold: {} + f:httpGet: + .: {} + f:path: {} + f:port: {} + f:scheme: {} + f:periodSeconds: {} + f:successThreshold: {} + f:timeoutSeconds: {} + f:resources: + .: {} + f:limits: + .: {} + f:memory: {} + f:requests: + .: {} + f:cpu: {} + f:memory: {} + f:securityContext: + .: {} + f:allowPrivilegeEscalation: {} + f:capabilities: + .: {} + f:add: {} + f:drop: {} + f:readOnlyRootFilesystem: {} + f:terminationMessagePath: {} + f:terminationMessagePolicy: {} + f:volumeMounts: + .: {} + k:{"mountPath":"/etc/coredns"}: + .: {} + f:mountPath: {} + f:name: {} + f:readOnly: {} + f:dnsPolicy: {} + f:nodeSelector: {} + f:priorityClassName: {} + f:restartPolicy: {} + f:schedulerName: {} + f:securityContext: {} + f:serviceAccount: {} + f:serviceAccountName: {} + f:terminationGracePeriodSeconds: {} + f:tolerations: {} + f:volumes: + .: {} + k:{"name":"config-volume"}: + .: {} + f:configMap: + .: {} + f:defaultMode: {} + f:items: {} + f:name: {} + f:name: {} + manager: kube-controller-manager + operation: Update + time: "2024-12-26T23:24:32Z" + - apiVersion: apps/v1 + fieldsType: FieldsV1 + fieldsV1: + f:status: + f:availableReplicas: {} + f:fullyLabeledReplicas: {} + f:observedGeneration: {} + f:readyReplicas: {} + f:replicas: {} + manager: kube-controller-manager + operation: Update + subresource: status + time: "2024-12-27T17:53:23Z" + name: coredns-787d4945fb + namespace: kube-system + ownerReferences: + - apiVersion: apps/v1 + blockOwnerDeletion: true + controller: true + kind: Deployment + name: coredns + uid: ade21f51-f5f9-48f0-9179-59925cbd215d + resourceVersion: "41911" + uid: e9f6aaf8-8687-40a6-9763-f7391066ff22 + spec: + replicas: 1 + selector: + matchLabels: + k8s-app: kube-dns + pod-template-hash: 787d4945fb + template: + metadata: + creationTimestamp: null + labels: + k8s-app: kube-dns + pod-template-hash: 787d4945fb + spec: + affinity: + podAntiAffinity: + preferredDuringSchedulingIgnoredDuringExecution: + - podAffinityTerm: + labelSelector: + matchExpressions: + - key: k8s-app + operator: In + values: + - kube-dns + topologyKey: kubernetes.io/hostname + weight: 100 + containers: + - args: + - -conf + - /etc/coredns/Corefile + image: registry.k8s.io/coredns/coredns:v1.9.3 + imagePullPolicy: IfNotPresent + livenessProbe: + failureThreshold: 5 + httpGet: + path: /health + port: 8080 + scheme: HTTP + initialDelaySeconds: 60 + periodSeconds: 10 + successThreshold: 1 + timeoutSeconds: 5 + name: coredns + ports: + - containerPort: 53 + name: dns + protocol: UDP + - containerPort: 53 + name: dns-tcp + protocol: TCP + - containerPort: 9153 + name: metrics + protocol: TCP + readinessProbe: + failureThreshold: 3 + httpGet: + path: /ready + port: 8181 + scheme: HTTP + periodSeconds: 10 + successThreshold: 1 + timeoutSeconds: 1 + resources: + limits: + memory: 170Mi + requests: + cpu: 100m + memory: 70Mi + securityContext: + allowPrivilegeEscalation: false + capabilities: + add: + - NET_BIND_SERVICE + drop: + - all + readOnlyRootFilesystem: true + terminationMessagePath: /dev/termination-log + terminationMessagePolicy: File + volumeMounts: + - mountPath: /etc/coredns + name: config-volume + readOnly: true + dnsPolicy: Default + nodeSelector: + kubernetes.io/os: linux + priorityClassName: system-cluster-critical + restartPolicy: Always + schedulerName: default-scheduler + securityContext: {} + serviceAccount: coredns + serviceAccountName: coredns + terminationGracePeriodSeconds: 30 + tolerations: + - key: CriticalAddonsOnly + operator: Exists + - effect: NoSchedule + key: node-role.kubernetes.io/control-plane + volumes: + - configMap: + defaultMode: 420 + items: + - key: Corefile + path: Corefile + name: coredns + name: config-volume + status: + availableReplicas: 1 + fullyLabeledReplicas: 1 + observedGeneration: 1 + readyReplicas: 1 + replicas: 1 +- apiVersion: apps/v1 + kind: ReplicaSet + metadata: + annotations: + deployment.kubernetes.io/desired-replicas: "1" + deployment.kubernetes.io/max-replicas: "2" + deployment.kubernetes.io/revision: "1" + creationTimestamp: "2024-12-26T23:26:51Z" + generation: 1 + labels: + k8s-app: metrics-server + pod-template-hash: 5f8fcc9bb7 + managedFields: + - apiVersion: apps/v1 + fieldsType: FieldsV1 + fieldsV1: + f:metadata: + f:annotations: + .: {} + f:deployment.kubernetes.io/desired-replicas: {} + f:deployment.kubernetes.io/max-replicas: {} + f:deployment.kubernetes.io/revision: {} + f:labels: + .: {} + f:k8s-app: {} + f:pod-template-hash: {} + f:ownerReferences: + .: {} + k:{"uid":"f877f1e1-0d53-40e1-aa65-54e3ad1f5212"}: {} + f:spec: + f:replicas: {} + f:selector: {} + f:template: + f:metadata: + f:labels: + .: {} + f:k8s-app: {} + f:pod-template-hash: {} + f:name: {} + f:spec: + f:containers: + k:{"name":"metrics-server"}: + .: {} + f:args: {} + f:image: {} + f:imagePullPolicy: {} + f:livenessProbe: + .: {} + f:failureThreshold: {} + f:httpGet: + .: {} + f:path: {} + f:port: {} + f:scheme: {} + f:periodSeconds: {} + f:successThreshold: {} + f:timeoutSeconds: {} + f:name: {} + f:ports: + .: {} + k:{"containerPort":4443,"protocol":"TCP"}: + .: {} + f:containerPort: {} + f:name: {} + f:protocol: {} + f:readinessProbe: + .: {} + f:failureThreshold: {} + f:httpGet: + .: {} + f:path: {} + f:port: {} + f:scheme: {} + f:periodSeconds: {} + f:successThreshold: {} + f:timeoutSeconds: {} + f:resources: + .: {} + f:requests: + .: {} + f:cpu: {} + f:memory: {} + f:securityContext: + .: {} + f:readOnlyRootFilesystem: {} + f:runAsNonRoot: {} + f:runAsUser: {} + f:terminationMessagePath: {} + f:terminationMessagePolicy: {} + f:volumeMounts: + .: {} + k:{"mountPath":"/tmp"}: + .: {} + f:mountPath: {} + f:name: {} + f:dnsPolicy: {} + f:priorityClassName: {} + f:restartPolicy: {} + f:schedulerName: {} + f:securityContext: {} + f:serviceAccount: {} + f:serviceAccountName: {} + f:terminationGracePeriodSeconds: {} + f:volumes: + .: {} + k:{"name":"tmp-dir"}: + .: {} + f:emptyDir: {} + f:name: {} + manager: kube-controller-manager + operation: Update + time: "2024-12-26T23:26:51Z" + - apiVersion: apps/v1 + fieldsType: FieldsV1 + fieldsV1: + f:status: + f:availableReplicas: {} + f:fullyLabeledReplicas: {} + f:observedGeneration: {} + f:readyReplicas: {} + f:replicas: {} + manager: kube-controller-manager + operation: Update + subresource: status + time: "2024-12-27T17:53:24Z" + name: metrics-server-5f8fcc9bb7 + namespace: kube-system + ownerReferences: + - apiVersion: apps/v1 + blockOwnerDeletion: true + controller: true + kind: Deployment + name: metrics-server + uid: f877f1e1-0d53-40e1-aa65-54e3ad1f5212 + resourceVersion: "41936" + uid: 93ecb540-a33d-495f-a0e1-1b5fefb3fe04 + spec: + replicas: 1 + selector: + matchLabels: + k8s-app: metrics-server + pod-template-hash: 5f8fcc9bb7 + template: + metadata: + creationTimestamp: null + labels: + k8s-app: metrics-server + pod-template-hash: 5f8fcc9bb7 + name: metrics-server + spec: + containers: + - args: + - --cert-dir=/tmp + - --secure-port=4443 + - --kubelet-preferred-address-types=InternalIP,ExternalIP,Hostname + - --kubelet-use-node-status-port + - --metric-resolution=60s + - --kubelet-insecure-tls + image: registry.k8s.io/metrics-server/metrics-server:v0.6.2@sha256:f977ad859fb500c1302d9c3428c6271db031bb7431e7076213b676b345a88dc2 + imagePullPolicy: IfNotPresent + livenessProbe: + failureThreshold: 3 + httpGet: + path: /livez + port: https + scheme: HTTPS + periodSeconds: 10 + successThreshold: 1 + timeoutSeconds: 1 + name: metrics-server + ports: + - containerPort: 4443 + name: https + protocol: TCP + readinessProbe: + failureThreshold: 3 + httpGet: + path: /readyz + port: https + scheme: HTTPS + periodSeconds: 10 + successThreshold: 1 + timeoutSeconds: 1 + resources: + requests: + cpu: 100m + memory: 200Mi + securityContext: + readOnlyRootFilesystem: true + runAsNonRoot: true + runAsUser: 1000 + terminationMessagePath: /dev/termination-log + terminationMessagePolicy: File + volumeMounts: + - mountPath: /tmp + name: tmp-dir + dnsPolicy: ClusterFirst + priorityClassName: system-cluster-critical + restartPolicy: Always + schedulerName: default-scheduler + securityContext: {} + serviceAccount: metrics-server + serviceAccountName: metrics-server + terminationGracePeriodSeconds: 30 + volumes: + - emptyDir: {} + name: tmp-dir + status: + availableReplicas: 1 + fullyLabeledReplicas: 1 + observedGeneration: 1 + readyReplicas: 1 + replicas: 1 +- apiVersion: rbac.authorization.k8s.io/v1 + kind: Role + metadata: + annotations: + rbac.authorization.kubernetes.io/autoupdate: "true" + creationTimestamp: "2024-12-26T23:24:17Z" + labels: + kubernetes.io/bootstrapping: rbac-defaults + managedFields: + - apiVersion: rbac.authorization.k8s.io/v1 + fieldsType: FieldsV1 + fieldsV1: + f:metadata: + f:annotations: + .: {} + f:rbac.authorization.kubernetes.io/autoupdate: {} + f:labels: + .: {} + f:kubernetes.io/bootstrapping: {} + f:rules: {} + manager: kube-apiserver + operation: Update + time: "2024-12-26T23:24:17Z" + name: extension-apiserver-authentication-reader + namespace: kube-system + resourceVersion: "180" + uid: 1c7ac7bb-5708-4d8a-bc81-65fcca84be41 + rules: + - apiGroups: + - "" + resourceNames: + - extension-apiserver-authentication + resources: + - configmaps + verbs: + - get + - list + - watch +- apiVersion: rbac.authorization.k8s.io/v1 + kind: Role + metadata: + creationTimestamp: "2024-12-26T23:24:19Z" + managedFields: + - apiVersion: rbac.authorization.k8s.io/v1 + fieldsType: FieldsV1 + fieldsV1: + f:rules: {} + manager: kubeadm + operation: Update + time: "2024-12-26T23:24:19Z" + name: kube-proxy + namespace: kube-system + resourceVersion: "242" + uid: de60cbd3-36ef-4049-a199-d9102309a102 + rules: + - apiGroups: + - "" + resourceNames: + - kube-proxy + resources: + - configmaps + verbs: + - get +- apiVersion: rbac.authorization.k8s.io/v1 + kind: Role + metadata: + creationTimestamp: "2024-12-26T23:24:18Z" + managedFields: + - apiVersion: rbac.authorization.k8s.io/v1 + fieldsType: FieldsV1 + fieldsV1: + f:rules: {} + manager: kubeadm + operation: Update + time: "2024-12-26T23:24:18Z" + name: kubeadm:kubelet-config + namespace: kube-system + resourceVersion: "203" + uid: c6fea816-668c-492e-a6e5-7a045a1e452d + rules: + - apiGroups: + - "" + resourceNames: + - kubelet-config + resources: + - configmaps + verbs: + - get +- apiVersion: rbac.authorization.k8s.io/v1 + kind: Role + metadata: + creationTimestamp: "2024-12-26T23:24:18Z" + managedFields: + - apiVersion: rbac.authorization.k8s.io/v1 + fieldsType: FieldsV1 + fieldsV1: + f:rules: {} + manager: kubeadm + operation: Update + time: "2024-12-26T23:24:18Z" + name: kubeadm:nodes-kubeadm-config + namespace: kube-system + resourceVersion: "200" + uid: 075ef39f-bf9c-4969-a61f-a7f2d1a2e0f2 + rules: + - apiGroups: + - "" + resourceNames: + - kubeadm-config + resources: + - configmaps + verbs: + - get +- apiVersion: rbac.authorization.k8s.io/v1 + kind: Role + metadata: + annotations: + rbac.authorization.kubernetes.io/autoupdate: "true" + creationTimestamp: "2024-12-26T23:24:17Z" + labels: + kubernetes.io/bootstrapping: rbac-defaults + managedFields: + - apiVersion: rbac.authorization.k8s.io/v1 + fieldsType: FieldsV1 + fieldsV1: + f:metadata: + f:annotations: + .: {} + f:rbac.authorization.kubernetes.io/autoupdate: {} + f:labels: + .: {} + f:kubernetes.io/bootstrapping: {} + f:rules: {} + manager: kube-apiserver + operation: Update + time: "2024-12-26T23:24:17Z" + name: system::leader-locking-kube-controller-manager + namespace: kube-system + resourceVersion: "184" + uid: 25cf874d-a294-43a9-8393-d175776447b4 + rules: + - apiGroups: + - "" + resources: + - configmaps + verbs: + - watch + - apiGroups: + - "" + resourceNames: + - kube-controller-manager + resources: + - configmaps + verbs: + - get + - update +- apiVersion: rbac.authorization.k8s.io/v1 + kind: Role + metadata: + annotations: + rbac.authorization.kubernetes.io/autoupdate: "true" + creationTimestamp: "2024-12-26T23:24:17Z" + labels: + kubernetes.io/bootstrapping: rbac-defaults + managedFields: + - apiVersion: rbac.authorization.k8s.io/v1 + fieldsType: FieldsV1 + fieldsV1: + f:metadata: + f:annotations: + .: {} + f:rbac.authorization.kubernetes.io/autoupdate: {} + f:labels: + .: {} + f:kubernetes.io/bootstrapping: {} + f:rules: {} + manager: kube-apiserver + operation: Update + time: "2024-12-26T23:24:17Z" + name: system::leader-locking-kube-scheduler + namespace: kube-system + resourceVersion: "185" + uid: c23c1e96-5f2c-4ae2-a6d1-e41b10a8bbb2 + rules: + - apiGroups: + - "" + resources: + - configmaps + verbs: + - watch + - apiGroups: + - "" + resourceNames: + - kube-scheduler + resources: + - configmaps + verbs: + - get + - update +- apiVersion: rbac.authorization.k8s.io/v1 + kind: Role + metadata: + annotations: + rbac.authorization.kubernetes.io/autoupdate: "true" + creationTimestamp: "2024-12-26T23:24:17Z" + labels: + kubernetes.io/bootstrapping: rbac-defaults + managedFields: + - apiVersion: rbac.authorization.k8s.io/v1 + fieldsType: FieldsV1 + fieldsV1: + f:metadata: + f:annotations: + .: {} + f:rbac.authorization.kubernetes.io/autoupdate: {} + f:labels: + .: {} + f:kubernetes.io/bootstrapping: {} + f:rules: {} + manager: kube-apiserver + operation: Update + time: "2024-12-26T23:24:17Z" + name: system:controller:bootstrap-signer + namespace: kube-system + resourceVersion: "181" + uid: eeeb29b6-2852-42e4-ac9b-64cb4d8457f0 + rules: + - apiGroups: + - "" + resources: + - secrets + verbs: + - get + - list + - watch +- apiVersion: rbac.authorization.k8s.io/v1 + kind: Role + metadata: + annotations: + rbac.authorization.kubernetes.io/autoupdate: "true" + creationTimestamp: "2024-12-26T23:24:17Z" + labels: + kubernetes.io/bootstrapping: rbac-defaults + managedFields: + - apiVersion: rbac.authorization.k8s.io/v1 + fieldsType: FieldsV1 + fieldsV1: + f:metadata: + f:annotations: + .: {} + f:rbac.authorization.kubernetes.io/autoupdate: {} + f:labels: + .: {} + f:kubernetes.io/bootstrapping: {} + f:rules: {} + manager: kube-apiserver + operation: Update + time: "2024-12-26T23:24:17Z" + name: system:controller:cloud-provider + namespace: kube-system + resourceVersion: "182" + uid: 0a72be4e-38e8-4723-b5f5-c82e5a98969d + rules: + - apiGroups: + - "" + resources: + - configmaps + verbs: + - create + - get + - list + - watch +- apiVersion: rbac.authorization.k8s.io/v1 + kind: Role + metadata: + annotations: + rbac.authorization.kubernetes.io/autoupdate: "true" + creationTimestamp: "2024-12-26T23:24:17Z" + labels: + kubernetes.io/bootstrapping: rbac-defaults + managedFields: + - apiVersion: rbac.authorization.k8s.io/v1 + fieldsType: FieldsV1 + fieldsV1: + f:metadata: + f:annotations: + .: {} + f:rbac.authorization.kubernetes.io/autoupdate: {} + f:labels: + .: {} + f:kubernetes.io/bootstrapping: {} + f:rules: {} + manager: kube-apiserver + operation: Update + time: "2024-12-26T23:24:17Z" + name: system:controller:token-cleaner + namespace: kube-system + resourceVersion: "183" + uid: 20f42249-0519-46eb-a4ac-e4e00879bb13 + rules: + - apiGroups: + - "" + resources: + - secrets + verbs: + - delete + - get + - list + - watch + - apiGroups: + - "" + - events.k8s.io + resources: + - events + verbs: + - create + - patch + - update +- apiVersion: rbac.authorization.k8s.io/v1 + kind: Role + metadata: + annotations: + kubectl.kubernetes.io/last-applied-configuration: | + {"apiVersion":"rbac.authorization.k8s.io/v1","kind":"Role","metadata":{"annotations":{},"labels":{"addonmanager.kubernetes.io/mode":"EnsureExists"},"name":"system:persistent-volume-provisioner","namespace":"kube-system"},"rules":[{"apiGroups":[""],"resources":["endpoints"],"verbs":["watch","create"]},{"apiGroups":[""],"resourceNames":["k8s.io-minikube-hostpath"],"resources":["endpoints"],"verbs":["get","update","create"]}]} + creationTimestamp: "2024-12-26T23:24:21Z" + labels: + addonmanager.kubernetes.io/mode: EnsureExists + managedFields: + - apiVersion: rbac.authorization.k8s.io/v1 + fieldsType: FieldsV1 + fieldsV1: + f:metadata: + f:annotations: + .: {} + f:kubectl.kubernetes.io/last-applied-configuration: {} + f:labels: + .: {} + f:addonmanager.kubernetes.io/mode: {} + f:rules: {} + manager: kubectl-client-side-apply + operation: Update + time: "2024-12-26T23:24:21Z" + name: system:persistent-volume-provisioner + namespace: kube-system + resourceVersion: "260" + uid: 90a003d2-0962-4567-ab09-6f08705523c1 + rules: + - apiGroups: + - "" + resources: + - endpoints + verbs: + - watch + - create + - apiGroups: + - "" + resourceNames: + - k8s.io-minikube-hostpath + resources: + - endpoints + verbs: + - get + - update + - create +- apiVersion: rbac.authorization.k8s.io/v1 + kind: RoleBinding + metadata: + creationTimestamp: "2024-12-26T23:24:19Z" + managedFields: + - apiVersion: rbac.authorization.k8s.io/v1 + fieldsType: FieldsV1 + fieldsV1: + f:roleRef: {} + f:subjects: {} + manager: kubeadm + operation: Update + time: "2024-12-26T23:24:19Z" + name: kube-proxy + namespace: kube-system + resourceVersion: "245" + uid: d79dc7e5-e8be-4fe0-94a0-1d4ab7881bdf + roleRef: + apiGroup: rbac.authorization.k8s.io + kind: Role + name: kube-proxy + subjects: + - apiGroup: rbac.authorization.k8s.io + kind: Group + name: system:bootstrappers:kubeadm:default-node-token +- apiVersion: rbac.authorization.k8s.io/v1 + kind: RoleBinding + metadata: + creationTimestamp: "2024-12-26T23:24:18Z" + managedFields: + - apiVersion: rbac.authorization.k8s.io/v1 + fieldsType: FieldsV1 + fieldsV1: + f:roleRef: {} + f:subjects: {} + manager: kubeadm + operation: Update + time: "2024-12-26T23:24:18Z" + name: kubeadm:kubelet-config + namespace: kube-system + resourceVersion: "204" + uid: abeb7a6b-fbf6-444e-8f05-b945dc621d97 + roleRef: + apiGroup: rbac.authorization.k8s.io + kind: Role + name: kubeadm:kubelet-config + subjects: + - apiGroup: rbac.authorization.k8s.io + kind: Group + name: system:nodes + - apiGroup: rbac.authorization.k8s.io + kind: Group + name: system:bootstrappers:kubeadm:default-node-token +- apiVersion: rbac.authorization.k8s.io/v1 + kind: RoleBinding + metadata: + creationTimestamp: "2024-12-26T23:24:18Z" + managedFields: + - apiVersion: rbac.authorization.k8s.io/v1 + fieldsType: FieldsV1 + fieldsV1: + f:roleRef: {} + f:subjects: {} + manager: kubeadm + operation: Update + time: "2024-12-26T23:24:18Z" + name: kubeadm:nodes-kubeadm-config + namespace: kube-system + resourceVersion: "201" + uid: 20cbd096-8e3f-46ef-8e66-eb3052a6e6b3 + roleRef: + apiGroup: rbac.authorization.k8s.io + kind: Role + name: kubeadm:nodes-kubeadm-config + subjects: + - apiGroup: rbac.authorization.k8s.io + kind: Group + name: system:bootstrappers:kubeadm:default-node-token + - apiGroup: rbac.authorization.k8s.io + kind: Group + name: system:nodes +- apiVersion: rbac.authorization.k8s.io/v1 + kind: RoleBinding + metadata: + annotations: + kubectl.kubernetes.io/last-applied-configuration: | + {"apiVersion":"rbac.authorization.k8s.io/v1","kind":"RoleBinding","metadata":{"annotations":{},"labels":{"addonmanager.kubernetes.io/mode":"Reconcile","k8s-app":"metrics-server"},"name":"metrics-server-auth-reader","namespace":"kube-system"},"roleRef":{"apiGroup":"rbac.authorization.k8s.io","kind":"Role","name":"extension-apiserver-authentication-reader"},"subjects":[{"kind":"ServiceAccount","name":"metrics-server","namespace":"kube-system"}]} + creationTimestamp: "2024-12-26T23:26:51Z" + labels: + addonmanager.kubernetes.io/mode: Reconcile + k8s-app: metrics-server + managedFields: + - apiVersion: rbac.authorization.k8s.io/v1 + fieldsType: FieldsV1 + fieldsV1: + f:metadata: + f:annotations: + .: {} + f:kubectl.kubernetes.io/last-applied-configuration: {} + f:labels: + .: {} + f:addonmanager.kubernetes.io/mode: {} + f:k8s-app: {} + f:roleRef: {} + f:subjects: {} + manager: kubectl-client-side-apply + operation: Update + time: "2024-12-26T23:26:51Z" + name: metrics-server-auth-reader + namespace: kube-system + resourceVersion: "654" + uid: 0eda289e-0ae8-451c-bb63-c8b20580f130 + roleRef: + apiGroup: rbac.authorization.k8s.io + kind: Role + name: extension-apiserver-authentication-reader + subjects: + - kind: ServiceAccount + name: metrics-server + namespace: kube-system +- apiVersion: rbac.authorization.k8s.io/v1 + kind: RoleBinding + metadata: + annotations: + rbac.authorization.kubernetes.io/autoupdate: "true" + creationTimestamp: "2024-12-26T23:24:17Z" + labels: + kubernetes.io/bootstrapping: rbac-defaults + managedFields: + - apiVersion: rbac.authorization.k8s.io/v1 + fieldsType: FieldsV1 + fieldsV1: + f:metadata: + f:annotations: + .: {} + f:rbac.authorization.kubernetes.io/autoupdate: {} + f:labels: + .: {} + f:kubernetes.io/bootstrapping: {} + f:roleRef: {} + f:subjects: {} + manager: kube-apiserver + operation: Update + time: "2024-12-26T23:24:17Z" + name: system::extension-apiserver-authentication-reader + namespace: kube-system + resourceVersion: "186" + uid: 26fcb4ec-60dd-4e71-b1cc-62c06b2a36d7 + roleRef: + apiGroup: rbac.authorization.k8s.io + kind: Role + name: extension-apiserver-authentication-reader + subjects: + - apiGroup: rbac.authorization.k8s.io + kind: User + name: system:kube-controller-manager + - apiGroup: rbac.authorization.k8s.io + kind: User + name: system:kube-scheduler +- apiVersion: rbac.authorization.k8s.io/v1 + kind: RoleBinding + metadata: + annotations: + rbac.authorization.kubernetes.io/autoupdate: "true" + creationTimestamp: "2024-12-26T23:24:17Z" + labels: + kubernetes.io/bootstrapping: rbac-defaults + managedFields: + - apiVersion: rbac.authorization.k8s.io/v1 + fieldsType: FieldsV1 + fieldsV1: + f:metadata: + f:annotations: + .: {} + f:rbac.authorization.kubernetes.io/autoupdate: {} + f:labels: + .: {} + f:kubernetes.io/bootstrapping: {} + f:roleRef: {} + f:subjects: {} + manager: kube-apiserver + operation: Update + time: "2024-12-26T23:24:17Z" + name: system::leader-locking-kube-controller-manager + namespace: kube-system + resourceVersion: "187" + uid: 61f48dc8-18f6-4f07-b414-247c7d5bf518 + roleRef: + apiGroup: rbac.authorization.k8s.io + kind: Role + name: system::leader-locking-kube-controller-manager + subjects: + - apiGroup: rbac.authorization.k8s.io + kind: User + name: system:kube-controller-manager + - kind: ServiceAccount + name: kube-controller-manager + namespace: kube-system +- apiVersion: rbac.authorization.k8s.io/v1 + kind: RoleBinding + metadata: + annotations: + rbac.authorization.kubernetes.io/autoupdate: "true" + creationTimestamp: "2024-12-26T23:24:17Z" + labels: + kubernetes.io/bootstrapping: rbac-defaults + managedFields: + - apiVersion: rbac.authorization.k8s.io/v1 + fieldsType: FieldsV1 + fieldsV1: + f:metadata: + f:annotations: + .: {} + f:rbac.authorization.kubernetes.io/autoupdate: {} + f:labels: + .: {} + f:kubernetes.io/bootstrapping: {} + f:roleRef: {} + f:subjects: {} + manager: kube-apiserver + operation: Update + time: "2024-12-26T23:24:17Z" + name: system::leader-locking-kube-scheduler + namespace: kube-system + resourceVersion: "188" + uid: a2fd47cc-74c8-4dfc-b5a7-b9159f8fee90 + roleRef: + apiGroup: rbac.authorization.k8s.io + kind: Role + name: system::leader-locking-kube-scheduler + subjects: + - apiGroup: rbac.authorization.k8s.io + kind: User + name: system:kube-scheduler + - kind: ServiceAccount + name: kube-scheduler + namespace: kube-system +- apiVersion: rbac.authorization.k8s.io/v1 + kind: RoleBinding + metadata: + annotations: + rbac.authorization.kubernetes.io/autoupdate: "true" + creationTimestamp: "2024-12-26T23:24:17Z" + labels: + kubernetes.io/bootstrapping: rbac-defaults + managedFields: + - apiVersion: rbac.authorization.k8s.io/v1 + fieldsType: FieldsV1 + fieldsV1: + f:metadata: + f:annotations: + .: {} + f:rbac.authorization.kubernetes.io/autoupdate: {} + f:labels: + .: {} + f:kubernetes.io/bootstrapping: {} + f:roleRef: {} + f:subjects: {} + manager: kube-apiserver + operation: Update + time: "2024-12-26T23:24:17Z" + name: system:controller:bootstrap-signer + namespace: kube-system + resourceVersion: "189" + uid: 1b696bb4-5b5a-45e5-aa83-c34eda440d39 + roleRef: + apiGroup: rbac.authorization.k8s.io + kind: Role + name: system:controller:bootstrap-signer + subjects: + - kind: ServiceAccount + name: bootstrap-signer + namespace: kube-system +- apiVersion: rbac.authorization.k8s.io/v1 + kind: RoleBinding + metadata: + annotations: + rbac.authorization.kubernetes.io/autoupdate: "true" + creationTimestamp: "2024-12-26T23:24:17Z" + labels: + kubernetes.io/bootstrapping: rbac-defaults + managedFields: + - apiVersion: rbac.authorization.k8s.io/v1 + fieldsType: FieldsV1 + fieldsV1: + f:metadata: + f:annotations: + .: {} + f:rbac.authorization.kubernetes.io/autoupdate: {} + f:labels: + .: {} + f:kubernetes.io/bootstrapping: {} + f:roleRef: {} + f:subjects: {} + manager: kube-apiserver + operation: Update + time: "2024-12-26T23:24:17Z" + name: system:controller:cloud-provider + namespace: kube-system + resourceVersion: "190" + uid: 751df838-7f39-4e47-bb04-cebbe7a4a289 + roleRef: + apiGroup: rbac.authorization.k8s.io + kind: Role + name: system:controller:cloud-provider + subjects: + - kind: ServiceAccount + name: cloud-provider + namespace: kube-system +- apiVersion: rbac.authorization.k8s.io/v1 + kind: RoleBinding + metadata: + annotations: + rbac.authorization.kubernetes.io/autoupdate: "true" + creationTimestamp: "2024-12-26T23:24:17Z" + labels: + kubernetes.io/bootstrapping: rbac-defaults + managedFields: + - apiVersion: rbac.authorization.k8s.io/v1 + fieldsType: FieldsV1 + fieldsV1: + f:metadata: + f:annotations: + .: {} + f:rbac.authorization.kubernetes.io/autoupdate: {} + f:labels: + .: {} + f:kubernetes.io/bootstrapping: {} + f:roleRef: {} + f:subjects: {} + manager: kube-apiserver + operation: Update + time: "2024-12-26T23:24:17Z" + name: system:controller:token-cleaner + namespace: kube-system + resourceVersion: "191" + uid: 4ff468ca-620f-4d1c-9588-2f124ad4811a + roleRef: + apiGroup: rbac.authorization.k8s.io + kind: Role + name: system:controller:token-cleaner + subjects: + - kind: ServiceAccount + name: token-cleaner + namespace: kube-system +- apiVersion: rbac.authorization.k8s.io/v1 + kind: RoleBinding + metadata: + annotations: + kubectl.kubernetes.io/last-applied-configuration: | + {"apiVersion":"rbac.authorization.k8s.io/v1","kind":"RoleBinding","metadata":{"annotations":{},"labels":{"addonmanager.kubernetes.io/mode":"EnsureExists"},"name":"system:persistent-volume-provisioner","namespace":"kube-system"},"roleRef":{"apiGroup":"rbac.authorization.k8s.io","kind":"Role","name":"system:persistent-volume-provisioner"},"subjects":[{"kind":"ServiceAccount","name":"storage-provisioner","namespace":"kube-system"}]} + creationTimestamp: "2024-12-26T23:24:21Z" + labels: + addonmanager.kubernetes.io/mode: EnsureExists + managedFields: + - apiVersion: rbac.authorization.k8s.io/v1 + fieldsType: FieldsV1 + fieldsV1: + f:metadata: + f:annotations: + .: {} + f:kubectl.kubernetes.io/last-applied-configuration: {} + f:labels: + .: {} + f:addonmanager.kubernetes.io/mode: {} + f:roleRef: {} + f:subjects: {} + manager: kubectl-client-side-apply + operation: Update + time: "2024-12-26T23:24:21Z" + name: system:persistent-volume-provisioner + namespace: kube-system + resourceVersion: "261" + uid: 680277cb-5800-46ac-939e-7ecfcaa6c724 + roleRef: + apiGroup: rbac.authorization.k8s.io + kind: Role + name: system:persistent-volume-provisioner + subjects: + - kind: ServiceAccount + name: storage-provisioner + namespace: kube-system +- apiVersion: v1 + data: + auth-extra-groups: c3lzdGVtOmJvb3RzdHJhcHBlcnM6a3ViZWFkbTpkZWZhdWx0LW5vZGUtdG9rZW4= + expiration: MjAyNC0xMi0yN1QyMzoyNDoxOVo= + token-id: MGdqOGlj + token-secret: M2Y5MG1xMWs3cGxkeXFhbw== + usage-bootstrap-authentication: dHJ1ZQ== + usage-bootstrap-signing: dHJ1ZQ== + kind: Secret + metadata: + creationTimestamp: "2024-12-26T23:24:19Z" + managedFields: + - apiVersion: v1 + fieldsType: FieldsV1 + fieldsV1: + f:data: + .: {} + f:auth-extra-groups: {} + f:expiration: {} + f:token-id: {} + f:token-secret: {} + f:usage-bootstrap-authentication: {} + f:usage-bootstrap-signing: {} + f:type: {} + manager: kubeadm + operation: Update + time: "2024-12-26T23:24:19Z" + name: bootstrap-token-0gj8ic + namespace: kube-system + resourceVersion: "222" + uid: 44c50e3b-ff3b-47a6-a73e-c2e0b9dec648 + type: bootstrap.kubernetes.io/token +- apiVersion: v1 + kind: Service + metadata: + annotations: + prometheus.io/port: "9153" + prometheus.io/scrape: "true" + creationTimestamp: "2024-12-26T23:24:19Z" + labels: + k8s-app: kube-dns + kubernetes.io/cluster-service: "true" + kubernetes.io/name: CoreDNS + managedFields: + - apiVersion: v1 + fieldsType: FieldsV1 + fieldsV1: + f:metadata: + f:annotations: + .: {} + f:prometheus.io/port: {} + f:prometheus.io/scrape: {} + f:labels: + .: {} + f:k8s-app: {} + f:kubernetes.io/cluster-service: {} + f:kubernetes.io/name: {} + f:spec: + f:clusterIP: {} + f:internalTrafficPolicy: {} + f:ports: + .: {} + k:{"port":53,"protocol":"TCP"}: + .: {} + f:name: {} + f:port: {} + f:protocol: {} + f:targetPort: {} + k:{"port":53,"protocol":"UDP"}: + .: {} + f:name: {} + f:port: {} + f:protocol: {} + f:targetPort: {} + k:{"port":9153,"protocol":"TCP"}: + .: {} + f:name: {} + f:port: {} + f:protocol: {} + f:targetPort: {} + f:selector: {} + f:sessionAffinity: {} + f:type: {} + manager: kubeadm + operation: Update + time: "2024-12-26T23:24:19Z" + name: kube-dns + namespace: kube-system + resourceVersion: "237" + uid: 7c37127e-8785-4098-b9fd-c40d02954523 + spec: + clusterIP: 10.96.0.10 + clusterIPs: + - 10.96.0.10 + internalTrafficPolicy: Cluster + ipFamilies: + - IPv4 + ipFamilyPolicy: SingleStack + ports: + - name: dns + port: 53 + protocol: UDP + targetPort: 53 + - name: dns-tcp + port: 53 + protocol: TCP + targetPort: 53 + - name: metrics + port: 9153 + protocol: TCP + targetPort: 9153 + selector: + k8s-app: kube-dns + sessionAffinity: None + type: ClusterIP + status: + loadBalancer: {} +- apiVersion: v1 + kind: Service + metadata: + annotations: + kubectl.kubernetes.io/last-applied-configuration: | + {"apiVersion":"v1","kind":"Service","metadata":{"annotations":{},"labels":{"addonmanager.kubernetes.io/mode":"Reconcile","k8s-app":"metrics-server","kubernetes.io/minikube-addons":"metrics-server","kubernetes.io/minikube-addons-endpoint":"metrics-server","kubernetes.io/name":"Metrics-server"},"name":"metrics-server","namespace":"kube-system"},"spec":{"ports":[{"name":"https","port":443,"protocol":"TCP","targetPort":"https"}],"selector":{"k8s-app":"metrics-server"}}} + creationTimestamp: "2024-12-26T23:26:51Z" + labels: + addonmanager.kubernetes.io/mode: Reconcile + k8s-app: metrics-server + kubernetes.io/minikube-addons: metrics-server + kubernetes.io/minikube-addons-endpoint: metrics-server + kubernetes.io/name: Metrics-server + managedFields: + - apiVersion: v1 + fieldsType: FieldsV1 + fieldsV1: + f:metadata: + f:annotations: + .: {} + f:kubectl.kubernetes.io/last-applied-configuration: {} + f:labels: + .: {} + f:addonmanager.kubernetes.io/mode: {} + f:k8s-app: {} + f:kubernetes.io/minikube-addons: {} + f:kubernetes.io/minikube-addons-endpoint: {} + f:kubernetes.io/name: {} + f:spec: + f:internalTrafficPolicy: {} + f:ports: + .: {} + k:{"port":443,"protocol":"TCP"}: + .: {} + f:name: {} + f:port: {} + f:protocol: {} + f:targetPort: {} + f:selector: {} + f:sessionAffinity: {} + f:type: {} + manager: kubectl-client-side-apply + operation: Update + time: "2024-12-26T23:26:51Z" + name: metrics-server + namespace: kube-system + resourceVersion: "662" + uid: e9a68f29-4d60-4de0-aece-0f4826ea9360 + spec: + clusterIP: 10.96.159.178 + clusterIPs: + - 10.96.159.178 + internalTrafficPolicy: Cluster + ipFamilies: + - IPv4 + ipFamilyPolicy: SingleStack + ports: + - name: https + port: 443 + protocol: TCP + targetPort: https + selector: + k8s-app: metrics-server + sessionAffinity: None + type: ClusterIP + status: + loadBalancer: {} +- apiVersion: v1 + kind: ServiceAccount + metadata: + creationTimestamp: "2024-12-26T23:24:18Z" + name: attachdetach-controller + namespace: kube-system + resourceVersion: "216" + uid: 0cd0911d-9e56-487a-946b-56670cc4088c +- apiVersion: v1 + kind: ServiceAccount + metadata: + creationTimestamp: "2024-12-26T23:24:18Z" + name: bootstrap-signer + namespace: kube-system + resourceVersion: "210" + uid: f2be5467-09f5-473b-9121-879a5231603d +- apiVersion: v1 + kind: ServiceAccount + metadata: + creationTimestamp: "2024-12-26T23:24:18Z" + name: certificate-controller + namespace: kube-system + resourceVersion: "209" + uid: be326252-8908-4119-86d8-7e8bea001dc2 +- apiVersion: v1 + kind: ServiceAccount + metadata: + creationTimestamp: "2024-12-26T23:24:28Z" + name: clusterrole-aggregation-controller + namespace: kube-system + resourceVersion: "279" + uid: dfad3473-0bd2-497a-8c9e-a851ea86f84c +- apiVersion: v1 + kind: ServiceAccount + metadata: + creationTimestamp: "2024-12-26T23:24:19Z" + name: coredns + namespace: kube-system + resourceVersion: "234" + uid: 17d7c5d9-f666-4e6e-8cee-e8b302f488fa +- apiVersion: v1 + kind: ServiceAccount + metadata: + creationTimestamp: "2024-12-26T23:24:31Z" + name: cronjob-controller + namespace: kube-system + resourceVersion: "300" + uid: c2c9a2e2-c727-4c4a-847c-372c86d5c288 +- apiVersion: v1 + kind: ServiceAccount + metadata: + creationTimestamp: "2024-12-26T23:24:28Z" + name: daemon-set-controller + namespace: kube-system + resourceVersion: "281" + uid: 6a2ce7f4-d121-41a4-b06d-d8dfff0bbb55 +- apiVersion: v1 + kind: ServiceAccount + metadata: + creationTimestamp: "2024-12-26T23:24:31Z" + name: default + namespace: kube-system + resourceVersion: "311" + uid: cda3a446-f039-4d73-be3f-ea367a0945ff +- apiVersion: v1 + kind: ServiceAccount + metadata: + creationTimestamp: "2024-12-26T23:24:18Z" + name: deployment-controller + namespace: kube-system + resourceVersion: "206" + uid: e3e93531-0af5-493b-aad5-7ec3dae4fe21 +- apiVersion: v1 + kind: ServiceAccount + metadata: + creationTimestamp: "2024-12-26T23:24:18Z" + name: disruption-controller + namespace: kube-system + resourceVersion: "207" + uid: a647368b-6b30-4a95-9105-18081ae6a2ee +- apiVersion: v1 + kind: ServiceAccount + metadata: + creationTimestamp: "2024-12-26T23:24:28Z" + name: endpoint-controller + namespace: kube-system + resourceVersion: "278" + uid: 60ffa2cc-0d5c-425b-a916-675f3f47fca3 +- apiVersion: v1 + kind: ServiceAccount + metadata: + creationTimestamp: "2024-12-26T23:24:29Z" + name: endpointslice-controller + namespace: kube-system + resourceVersion: "285" + uid: 5130a22e-4593-4c39-b21c-9cb6aa07b75c +- apiVersion: v1 + kind: ServiceAccount + metadata: + creationTimestamp: "2024-12-26T23:24:18Z" + name: endpointslicemirroring-controller + namespace: kube-system + resourceVersion: "211" + uid: 8d009d48-b1d8-4a08-80ed-b327c3e53000 +- apiVersion: v1 + kind: ServiceAccount + metadata: + creationTimestamp: "2024-12-26T23:24:30Z" + name: ephemeral-volume-controller + namespace: kube-system + resourceVersion: "294" + uid: 78d33082-a136-4299-95c1-745b711170c4 +- apiVersion: v1 + kind: ServiceAccount + metadata: + creationTimestamp: "2024-12-26T23:24:29Z" + name: expand-controller + namespace: kube-system + resourceVersion: "287" + uid: 2ae86cee-81c8-4c06-95f4-88d407f9d3e7 +- apiVersion: v1 + kind: ServiceAccount + metadata: + creationTimestamp: "2024-12-26T23:24:29Z" + name: generic-garbage-collector + namespace: kube-system + resourceVersion: "288" + uid: 6036d9ef-3b54-421b-b4eb-9a985defc5cc +- apiVersion: v1 + kind: ServiceAccount + metadata: + creationTimestamp: "2024-12-26T23:24:30Z" + name: horizontal-pod-autoscaler + namespace: kube-system + resourceVersion: "297" + uid: b76ddae7-573a-47f4-b167-98d7a8acda9b +- apiVersion: v1 + kind: ServiceAccount + metadata: + creationTimestamp: "2024-12-26T23:24:18Z" + name: job-controller + namespace: kube-system + resourceVersion: "205" + uid: 25e14415-46db-4b74-b4ab-45cb9f7c22e1 +- apiVersion: v1 + kind: ServiceAccount + metadata: + creationTimestamp: "2024-12-26T23:24:19Z" + name: kube-proxy + namespace: kube-system + resourceVersion: "240" + uid: fccc2d1f-7a10-4bca-babf-684356b3d6bb +- apiVersion: v1 + kind: ServiceAccount + metadata: + annotations: + kubectl.kubernetes.io/last-applied-configuration: | + {"apiVersion":"v1","kind":"ServiceAccount","metadata":{"annotations":{},"labels":{"addonmanager.kubernetes.io/mode":"Reconcile","k8s-app":"metrics-server"},"name":"metrics-server","namespace":"kube-system"}} + creationTimestamp: "2024-12-26T23:26:51Z" + labels: + addonmanager.kubernetes.io/mode: Reconcile + k8s-app: metrics-server + managedFields: + - apiVersion: v1 + fieldsType: FieldsV1 + fieldsV1: + f:metadata: + f:annotations: + .: {} + f:kubectl.kubernetes.io/last-applied-configuration: {} + f:labels: + .: {} + f:addonmanager.kubernetes.io/mode: {} + f:k8s-app: {} + manager: kubectl-client-side-apply + operation: Update + time: "2024-12-26T23:26:51Z" + name: metrics-server + namespace: kube-system + resourceVersion: "640" + uid: 1278418b-073a-4177-8bdd-caa148f9849c +- apiVersion: v1 + kind: ServiceAccount + metadata: + creationTimestamp: "2024-12-26T23:24:28Z" + name: namespace-controller + namespace: kube-system + resourceVersion: "277" + uid: 12d682f3-42be-4a07-8b54-c88029f9ac35 +- apiVersion: v1 + kind: ServiceAccount + metadata: + creationTimestamp: "2024-12-26T23:24:18Z" + name: node-controller + namespace: kube-system + resourceVersion: "218" + uid: 063be8e1-bb5b-45ff-b2cf-b74cad43d943 +- apiVersion: v1 + kind: ServiceAccount + metadata: + creationTimestamp: "2024-12-26T23:24:18Z" + name: persistent-volume-binder + namespace: kube-system + resourceVersion: "214" + uid: ec472778-d52d-4019-a7f1-5fcda084053a +- apiVersion: v1 + kind: ServiceAccount + metadata: + creationTimestamp: "2024-12-26T23:24:28Z" + name: pod-garbage-collector + namespace: kube-system + resourceVersion: "276" + uid: 7ef84bc1-6e14-4702-8dca-80afcdfd128b +- apiVersion: v1 + kind: ServiceAccount + metadata: + creationTimestamp: "2024-12-26T23:24:28Z" + name: pv-protection-controller + namespace: kube-system + resourceVersion: "284" + uid: 926aa29b-cff7-4d69-9642-10e4f258afd2 +- apiVersion: v1 + kind: ServiceAccount + metadata: + creationTimestamp: "2024-12-26T23:24:30Z" + name: pvc-protection-controller + namespace: kube-system + resourceVersion: "295" + uid: 5988a127-4bda-4978-aecf-4cf960dbd91c +- apiVersion: v1 + kind: ServiceAccount + metadata: + creationTimestamp: "2024-12-26T23:24:30Z" + name: replicaset-controller + namespace: kube-system + resourceVersion: "292" + uid: 3aa87a67-a302-4e21-bdd8-c52d2cd184a2 +- apiVersion: v1 + kind: ServiceAccount + metadata: + creationTimestamp: "2024-12-26T23:24:18Z" + name: replication-controller + namespace: kube-system + resourceVersion: "212" + uid: 48441ac9-7c63-4cbf-b2cd-2c5d5a188652 +- apiVersion: v1 + kind: ServiceAccount + metadata: + creationTimestamp: "2024-12-26T23:24:28Z" + name: resourcequota-controller + namespace: kube-system + resourceVersion: "280" + uid: 4d3b7a0d-41c5-4f2a-a108-1dd5332ac883 +- apiVersion: v1 + kind: ServiceAccount + metadata: + creationTimestamp: "2024-12-26T23:24:18Z" + name: root-ca-cert-publisher + namespace: kube-system + resourceVersion: "213" + uid: 7170c368-fb11-4305-b1ca-cda15cbd3c1a +- apiVersion: v1 + kind: ServiceAccount + metadata: + creationTimestamp: "2024-12-26T23:24:29Z" + name: service-account-controller + namespace: kube-system + resourceVersion: "286" + uid: 4a63fb84-8702-4c7a-8c0c-d653566710db +- apiVersion: v1 + kind: ServiceAccount + metadata: + creationTimestamp: "2024-12-26T23:24:29Z" + name: service-controller + namespace: kube-system + resourceVersion: "289" + uid: 03e485a9-8eb4-4602-9246-7bd8633efeeb +- apiVersion: v1 + kind: ServiceAccount + metadata: + creationTimestamp: "2024-12-26T23:24:18Z" + name: statefulset-controller + namespace: kube-system + resourceVersion: "208" + uid: 99cf030f-2f5d-44a4-a5f9-3e5f6d2656c5 +- apiVersion: v1 + kind: ServiceAccount + metadata: + annotations: + kubectl.kubernetes.io/last-applied-configuration: | + {"apiVersion":"v1","kind":"ServiceAccount","metadata":{"annotations":{},"labels":{"addonmanager.kubernetes.io/mode":"Reconcile"},"name":"storage-provisioner","namespace":"kube-system"}} + creationTimestamp: "2024-12-26T23:24:21Z" + labels: + addonmanager.kubernetes.io/mode: Reconcile + managedFields: + - apiVersion: v1 + fieldsType: FieldsV1 + fieldsV1: + f:metadata: + f:annotations: + .: {} + f:kubectl.kubernetes.io/last-applied-configuration: {} + f:labels: + .: {} + f:addonmanager.kubernetes.io/mode: {} + manager: kubectl-client-side-apply + operation: Update + time: "2024-12-26T23:24:21Z" + name: storage-provisioner + namespace: kube-system + resourceVersion: "258" + uid: 57840dfe-e7e4-41f8-9fc8-0ef7beee8091 +- apiVersion: v1 + kind: ServiceAccount + metadata: + creationTimestamp: "2024-12-26T23:24:28Z" + name: token-cleaner + namespace: kube-system + resourceVersion: "283" + uid: ad500e5c-844f-46d6-9281-20a86b51b7aa +- apiVersion: v1 + kind: ServiceAccount + metadata: + creationTimestamp: "2024-12-26T23:24:30Z" + name: ttl-after-finished-controller + namespace: kube-system + resourceVersion: "296" + uid: 01395a96-984c-4d8e-8d0b-ddd93548ee5c +- apiVersion: v1 + kind: ServiceAccount + metadata: + creationTimestamp: "2024-12-26T23:24:28Z" + name: ttl-controller + namespace: kube-system + resourceVersion: "282" + uid: b67b982b-90e4-4c36-832e-445531dcb6a8 +kind: List +metadata: + resourceVersion: "" + selfLink: "" diff --git a/examples/minikube/minikube-rbac.png b/examples/minikube/minikube-rbac.png new file mode 100644 index 0000000..b02b474 Binary files /dev/null and b/examples/minikube/minikube-rbac.png differ diff --git a/examples/minikube/minikube-rbac.yml b/examples/minikube/minikube-rbac.yml new file mode 100644 index 0000000..b7c7d36 --- /dev/null +++ b/examples/minikube/minikube-rbac.yml @@ -0,0 +1,8648 @@ +apiVersion: v1 +items: +- aggregationRule: + clusterRoleSelectors: + - matchLabels: + rbac.authorization.k8s.io/aggregate-to-admin: "true" + apiVersion: rbac.authorization.k8s.io/v1 + kind: ClusterRole + metadata: + annotations: + rbac.authorization.kubernetes.io/autoupdate: "true" + creationTimestamp: "2024-12-26T23:24:17Z" + labels: + kubernetes.io/bootstrapping: rbac-defaults + managedFields: + - apiVersion: rbac.authorization.k8s.io/v1 + fieldsType: FieldsV1 + fieldsV1: + f:rules: {} + manager: clusterrole-aggregation-controller + operation: Apply + time: "2024-12-26T23:26:51Z" + - apiVersion: rbac.authorization.k8s.io/v1 + fieldsType: FieldsV1 + fieldsV1: + f:aggregationRule: + .: {} + f:clusterRoleSelectors: {} + f:metadata: + f:annotations: + .: {} + f:rbac.authorization.kubernetes.io/autoupdate: {} + f:labels: + .: {} + f:kubernetes.io/bootstrapping: {} + manager: kube-apiserver + operation: Update + time: "2024-12-26T23:24:17Z" + name: admin + resourceVersion: "657" + uid: 36c7b491-4eec-4e35-a90e-f6e7351921c1 + rules: + - apiGroups: + - "" + resources: + - pods/attach + - pods/exec + - pods/portforward + - pods/proxy + - secrets + - services/proxy + verbs: + - get + - list + - watch + - apiGroups: + - "" + resources: + - serviceaccounts + verbs: + - impersonate + - apiGroups: + - "" + resources: + - pods + - pods/attach + - pods/exec + - pods/portforward + - pods/proxy + verbs: + - create + - delete + - deletecollection + - patch + - update + - apiGroups: + - "" + resources: + - pods/eviction + verbs: + - create + - apiGroups: + - "" + resources: + - configmaps + - events + - persistentvolumeclaims + - replicationcontrollers + - replicationcontrollers/scale + - secrets + - serviceaccounts + - services + - services/proxy + verbs: + - create + - delete + - deletecollection + - patch + - update + - apiGroups: + - "" + resources: + - serviceaccounts/token + verbs: + - create + - apiGroups: + - apps + resources: + - daemonsets + - deployments + - deployments/rollback + - deployments/scale + - replicasets + - replicasets/scale + - statefulsets + - statefulsets/scale + verbs: + - create + - delete + - deletecollection + - patch + - update + - apiGroups: + - autoscaling + resources: + - horizontalpodautoscalers + verbs: + - create + - delete + - deletecollection + - patch + - update + - apiGroups: + - batch + resources: + - cronjobs + - jobs + verbs: + - create + - delete + - deletecollection + - patch + - update + - apiGroups: + - extensions + resources: + - daemonsets + - deployments + - deployments/rollback + - deployments/scale + - ingresses + - networkpolicies + - replicasets + - replicasets/scale + - replicationcontrollers/scale + verbs: + - create + - delete + - deletecollection + - patch + - update + - apiGroups: + - policy + resources: + - poddisruptionbudgets + verbs: + - create + - delete + - deletecollection + - patch + - update + - apiGroups: + - networking.k8s.io + resources: + - ingresses + - networkpolicies + verbs: + - create + - delete + - deletecollection + - patch + - update + - apiGroups: + - coordination.k8s.io + resources: + - leases + verbs: + - create + - delete + - deletecollection + - get + - list + - patch + - update + - watch + - apiGroups: + - metrics.k8s.io + resources: + - pods + - nodes + verbs: + - get + - list + - watch + - apiGroups: + - "" + resources: + - configmaps + - endpoints + - persistentvolumeclaims + - persistentvolumeclaims/status + - pods + - replicationcontrollers + - replicationcontrollers/scale + - serviceaccounts + - services + - services/status + verbs: + - get + - list + - watch + - apiGroups: + - "" + resources: + - bindings + - events + - limitranges + - namespaces/status + - pods/log + - pods/status + - replicationcontrollers/status + - resourcequotas + - resourcequotas/status + verbs: + - get + - list + - watch + - apiGroups: + - "" + resources: + - namespaces + verbs: + - get + - list + - watch + - apiGroups: + - discovery.k8s.io + resources: + - endpointslices + verbs: + - get + - list + - watch + - apiGroups: + - apps + resources: + - controllerrevisions + - daemonsets + - daemonsets/status + - deployments + - deployments/scale + - deployments/status + - replicasets + - replicasets/scale + - replicasets/status + - statefulsets + - statefulsets/scale + - statefulsets/status + verbs: + - get + - list + - watch + - apiGroups: + - autoscaling + resources: + - horizontalpodautoscalers + - horizontalpodautoscalers/status + verbs: + - get + - list + - watch + - apiGroups: + - batch + resources: + - cronjobs + - cronjobs/status + - jobs + - jobs/status + verbs: + - get + - list + - watch + - apiGroups: + - extensions + resources: + - daemonsets + - daemonsets/status + - deployments + - deployments/scale + - deployments/status + - ingresses + - ingresses/status + - networkpolicies + - replicasets + - replicasets/scale + - replicasets/status + - replicationcontrollers/scale + verbs: + - get + - list + - watch + - apiGroups: + - policy + resources: + - poddisruptionbudgets + - poddisruptionbudgets/status + verbs: + - get + - list + - watch + - apiGroups: + - networking.k8s.io + resources: + - ingresses + - ingresses/status + - networkpolicies + verbs: + - get + - list + - watch + - apiGroups: + - authorization.k8s.io + resources: + - localsubjectaccessreviews + verbs: + - create + - apiGroups: + - rbac.authorization.k8s.io + resources: + - rolebindings + - roles + verbs: + - create + - delete + - deletecollection + - get + - list + - patch + - update + - watch +- apiVersion: rbac.authorization.k8s.io/v1 + kind: ClusterRole + metadata: + annotations: + rbac.authorization.kubernetes.io/autoupdate: "true" + creationTimestamp: "2024-12-26T23:24:17Z" + labels: + kubernetes.io/bootstrapping: rbac-defaults + managedFields: + - apiVersion: rbac.authorization.k8s.io/v1 + fieldsType: FieldsV1 + fieldsV1: + f:metadata: + f:annotations: + .: {} + f:rbac.authorization.kubernetes.io/autoupdate: {} + f:labels: + .: {} + f:kubernetes.io/bootstrapping: {} + f:rules: {} + manager: kube-apiserver + operation: Update + time: "2024-12-26T23:24:17Z" + name: cluster-admin + resourceVersion: "74" + uid: b6cb9a95-97f6-4925-986f-b7eec0102c5d + rules: + - apiGroups: + - '*' + resources: + - '*' + verbs: + - '*' + - nonResourceURLs: + - '*' + verbs: + - '*' +- aggregationRule: + clusterRoleSelectors: + - matchLabels: + rbac.authorization.k8s.io/aggregate-to-edit: "true" + apiVersion: rbac.authorization.k8s.io/v1 + kind: ClusterRole + metadata: + annotations: + rbac.authorization.kubernetes.io/autoupdate: "true" + creationTimestamp: "2024-12-26T23:24:17Z" + labels: + kubernetes.io/bootstrapping: rbac-defaults + rbac.authorization.k8s.io/aggregate-to-admin: "true" + managedFields: + - apiVersion: rbac.authorization.k8s.io/v1 + fieldsType: FieldsV1 + fieldsV1: + f:rules: {} + manager: clusterrole-aggregation-controller + operation: Apply + time: "2024-12-26T23:26:51Z" + - apiVersion: rbac.authorization.k8s.io/v1 + fieldsType: FieldsV1 + fieldsV1: + f:aggregationRule: + .: {} + f:clusterRoleSelectors: {} + f:metadata: + f:annotations: + .: {} + f:rbac.authorization.kubernetes.io/autoupdate: {} + f:labels: + .: {} + f:kubernetes.io/bootstrapping: {} + f:rbac.authorization.k8s.io/aggregate-to-admin: {} + manager: kube-apiserver + operation: Update + time: "2024-12-26T23:24:17Z" + name: edit + resourceVersion: "653" + uid: 84b48757-9633-4c9b-944a-2c1249bbf08e + rules: + - apiGroups: + - "" + resources: + - pods/attach + - pods/exec + - pods/portforward + - pods/proxy + - secrets + - services/proxy + verbs: + - get + - list + - watch + - apiGroups: + - "" + resources: + - serviceaccounts + verbs: + - impersonate + - apiGroups: + - "" + resources: + - pods + - pods/attach + - pods/exec + - pods/portforward + - pods/proxy + verbs: + - create + - delete + - deletecollection + - patch + - update + - apiGroups: + - "" + resources: + - pods/eviction + verbs: + - create + - apiGroups: + - "" + resources: + - configmaps + - events + - persistentvolumeclaims + - replicationcontrollers + - replicationcontrollers/scale + - secrets + - serviceaccounts + - services + - services/proxy + verbs: + - create + - delete + - deletecollection + - patch + - update + - apiGroups: + - "" + resources: + - serviceaccounts/token + verbs: + - create + - apiGroups: + - apps + resources: + - daemonsets + - deployments + - deployments/rollback + - deployments/scale + - replicasets + - replicasets/scale + - statefulsets + - statefulsets/scale + verbs: + - create + - delete + - deletecollection + - patch + - update + - apiGroups: + - autoscaling + resources: + - horizontalpodautoscalers + verbs: + - create + - delete + - deletecollection + - patch + - update + - apiGroups: + - batch + resources: + - cronjobs + - jobs + verbs: + - create + - delete + - deletecollection + - patch + - update + - apiGroups: + - extensions + resources: + - daemonsets + - deployments + - deployments/rollback + - deployments/scale + - ingresses + - networkpolicies + - replicasets + - replicasets/scale + - replicationcontrollers/scale + verbs: + - create + - delete + - deletecollection + - patch + - update + - apiGroups: + - policy + resources: + - poddisruptionbudgets + verbs: + - create + - delete + - deletecollection + - patch + - update + - apiGroups: + - networking.k8s.io + resources: + - ingresses + - networkpolicies + verbs: + - create + - delete + - deletecollection + - patch + - update + - apiGroups: + - coordination.k8s.io + resources: + - leases + verbs: + - create + - delete + - deletecollection + - get + - list + - patch + - update + - watch + - apiGroups: + - metrics.k8s.io + resources: + - pods + - nodes + verbs: + - get + - list + - watch + - apiGroups: + - "" + resources: + - configmaps + - endpoints + - persistentvolumeclaims + - persistentvolumeclaims/status + - pods + - replicationcontrollers + - replicationcontrollers/scale + - serviceaccounts + - services + - services/status + verbs: + - get + - list + - watch + - apiGroups: + - "" + resources: + - bindings + - events + - limitranges + - namespaces/status + - pods/log + - pods/status + - replicationcontrollers/status + - resourcequotas + - resourcequotas/status + verbs: + - get + - list + - watch + - apiGroups: + - "" + resources: + - namespaces + verbs: + - get + - list + - watch + - apiGroups: + - discovery.k8s.io + resources: + - endpointslices + verbs: + - get + - list + - watch + - apiGroups: + - apps + resources: + - controllerrevisions + - daemonsets + - daemonsets/status + - deployments + - deployments/scale + - deployments/status + - replicasets + - replicasets/scale + - replicasets/status + - statefulsets + - statefulsets/scale + - statefulsets/status + verbs: + - get + - list + - watch + - apiGroups: + - autoscaling + resources: + - horizontalpodautoscalers + - horizontalpodautoscalers/status + verbs: + - get + - list + - watch + - apiGroups: + - batch + resources: + - cronjobs + - cronjobs/status + - jobs + - jobs/status + verbs: + - get + - list + - watch + - apiGroups: + - extensions + resources: + - daemonsets + - daemonsets/status + - deployments + - deployments/scale + - deployments/status + - ingresses + - ingresses/status + - networkpolicies + - replicasets + - replicasets/scale + - replicasets/status + - replicationcontrollers/scale + verbs: + - get + - list + - watch + - apiGroups: + - policy + resources: + - poddisruptionbudgets + - poddisruptionbudgets/status + verbs: + - get + - list + - watch + - apiGroups: + - networking.k8s.io + resources: + - ingresses + - ingresses/status + - networkpolicies + verbs: + - get + - list + - watch +- apiVersion: rbac.authorization.k8s.io/v1 + kind: ClusterRole + metadata: + annotations: + kubectl.kubernetes.io/last-applied-configuration: | + {"apiVersion":"rbac.authorization.k8s.io/v1","kind":"ClusterRole","metadata":{"annotations":{},"labels":{"app.kubernetes.io/instance":"ingress-nginx","app.kubernetes.io/name":"ingress-nginx"},"name":"ingress-nginx"},"rules":[{"apiGroups":[""],"resources":["configmaps","endpoints","nodes","pods","secrets","namespaces"],"verbs":["list","watch"]},{"apiGroups":["coordination.k8s.io"],"resources":["leases"],"verbs":["list","watch"]},{"apiGroups":[""],"resources":["nodes"],"verbs":["get"]},{"apiGroups":[""],"resources":["services"],"verbs":["get","list","watch"]},{"apiGroups":["networking.k8s.io"],"resources":["ingresses"],"verbs":["get","list","watch"]},{"apiGroups":[""],"resources":["events"],"verbs":["create","patch"]},{"apiGroups":["networking.k8s.io"],"resources":["ingresses/status"],"verbs":["update"]},{"apiGroups":["networking.k8s.io"],"resources":["ingressclasses"],"verbs":["get","list","watch"]},{"apiGroups":["discovery.k8s.io"],"resources":["endpointslices"],"verbs":["list","watch","get"]}]} + creationTimestamp: "2024-12-26T23:25:47Z" + labels: + app.kubernetes.io/instance: ingress-nginx + app.kubernetes.io/name: ingress-nginx + managedFields: + - apiVersion: rbac.authorization.k8s.io/v1 + fieldsType: FieldsV1 + fieldsV1: + f:metadata: + f:annotations: + .: {} + f:kubectl.kubernetes.io/last-applied-configuration: {} + f:labels: + .: {} + f:app.kubernetes.io/instance: {} + f:app.kubernetes.io/name: {} + f:rules: {} + manager: kubectl-client-side-apply + operation: Update + time: "2024-12-26T23:25:47Z" + name: ingress-nginx + resourceVersion: "494" + uid: 495aa35f-c1ee-480a-959f-0d93ad1c083f + rules: + - apiGroups: + - "" + resources: + - configmaps + - endpoints + - nodes + - pods + - secrets + - namespaces + verbs: + - list + - watch + - apiGroups: + - coordination.k8s.io + resources: + - leases + verbs: + - list + - watch + - apiGroups: + - "" + resources: + - nodes + verbs: + - get + - apiGroups: + - "" + resources: + - services + verbs: + - get + - list + - watch + - apiGroups: + - networking.k8s.io + resources: + - ingresses + verbs: + - get + - list + - watch + - apiGroups: + - "" + resources: + - events + verbs: + - create + - patch + - apiGroups: + - networking.k8s.io + resources: + - ingresses/status + verbs: + - update + - apiGroups: + - networking.k8s.io + resources: + - ingressclasses + verbs: + - get + - list + - watch + - apiGroups: + - discovery.k8s.io + resources: + - endpointslices + verbs: + - list + - watch + - get +- apiVersion: rbac.authorization.k8s.io/v1 + kind: ClusterRole + metadata: + annotations: + kubectl.kubernetes.io/last-applied-configuration: | + {"apiVersion":"rbac.authorization.k8s.io/v1","kind":"ClusterRole","metadata":{"annotations":{},"labels":{"app.kubernetes.io/component":"admission-webhook","app.kubernetes.io/instance":"ingress-nginx","app.kubernetes.io/name":"ingress-nginx"},"name":"ingress-nginx-admission"},"rules":[{"apiGroups":["admissionregistration.k8s.io"],"resources":["validatingwebhookconfigurations"],"verbs":["get","update"]}]} + creationTimestamp: "2024-12-26T23:25:47Z" + labels: + app.kubernetes.io/component: admission-webhook + app.kubernetes.io/instance: ingress-nginx + app.kubernetes.io/name: ingress-nginx + managedFields: + - apiVersion: rbac.authorization.k8s.io/v1 + fieldsType: FieldsV1 + fieldsV1: + f:metadata: + f:annotations: + .: {} + f:kubectl.kubernetes.io/last-applied-configuration: {} + f:labels: + .: {} + f:app.kubernetes.io/component: {} + f:app.kubernetes.io/instance: {} + f:app.kubernetes.io/name: {} + f:rules: {} + manager: kubectl-client-side-apply + operation: Update + time: "2024-12-26T23:25:47Z" + name: ingress-nginx-admission + resourceVersion: "495" + uid: e188c6a5-4471-44e0-a375-f967b96e61ff + rules: + - apiGroups: + - admissionregistration.k8s.io + resources: + - validatingwebhookconfigurations + verbs: + - get + - update +- apiVersion: rbac.authorization.k8s.io/v1 + kind: ClusterRole + metadata: + creationTimestamp: "2024-12-26T23:24:19Z" + managedFields: + - apiVersion: rbac.authorization.k8s.io/v1 + fieldsType: FieldsV1 + fieldsV1: + f:rules: {} + manager: kubeadm + operation: Update + time: "2024-12-26T23:24:19Z" + name: kubeadm:get-nodes + resourceVersion: "223" + uid: b223bf88-228e-45f6-975b-1ae6e6649a34 + rules: + - apiGroups: + - "" + resources: + - nodes + verbs: + - get +- apiVersion: rbac.authorization.k8s.io/v1 + kind: ClusterRole + metadata: + annotations: + kubectl.kubernetes.io/last-applied-configuration: | + {"apiVersion":"rbac.authorization.k8s.io/v1","kind":"ClusterRole","metadata":{"annotations":{},"labels":{"addonmanager.kubernetes.io/mode":"Reconcile","k8s-app":"kubernetes-dashboard","kubernetes.io/minikube-addons":"dashboard"},"name":"kubernetes-dashboard"},"rules":[{"apiGroups":["metrics.k8s.io"],"resources":["pods","nodes"],"verbs":["get","list","watch"]}]} + creationTimestamp: "2024-12-26T23:24:31Z" + labels: + addonmanager.kubernetes.io/mode: Reconcile + k8s-app: kubernetes-dashboard + kubernetes.io/minikube-addons: dashboard + managedFields: + - apiVersion: rbac.authorization.k8s.io/v1 + fieldsType: FieldsV1 + fieldsV1: + f:metadata: + f:annotations: + .: {} + f:kubectl.kubernetes.io/last-applied-configuration: {} + f:labels: + .: {} + f:addonmanager.kubernetes.io/mode: {} + f:k8s-app: {} + f:kubernetes.io/minikube-addons: {} + f:rules: {} + manager: kubectl-client-side-apply + operation: Update + time: "2024-12-26T23:24:31Z" + name: kubernetes-dashboard + resourceVersion: "331" + uid: e30e74e1-246a-48de-a2a0-ea9a0ad29293 + rules: + - apiGroups: + - metrics.k8s.io + resources: + - pods + - nodes + verbs: + - get + - list + - watch +- apiVersion: rbac.authorization.k8s.io/v1 + kind: ClusterRole + metadata: + annotations: + rbac.authorization.kubernetes.io/autoupdate: "true" + creationTimestamp: "2024-12-26T23:24:17Z" + labels: + kubernetes.io/bootstrapping: rbac-defaults + rbac.authorization.k8s.io/aggregate-to-admin: "true" + managedFields: + - apiVersion: rbac.authorization.k8s.io/v1 + fieldsType: FieldsV1 + fieldsV1: + f:metadata: + f:annotations: + .: {} + f:rbac.authorization.kubernetes.io/autoupdate: {} + f:labels: + .: {} + f:kubernetes.io/bootstrapping: {} + f:rbac.authorization.k8s.io/aggregate-to-admin: {} + f:rules: {} + manager: kube-apiserver + operation: Update + time: "2024-12-26T23:24:17Z" + name: system:aggregate-to-admin + resourceVersion: "82" + uid: c6f4a2b7-2bf0-43d9-97dd-79ff014f52e7 + rules: + - apiGroups: + - authorization.k8s.io + resources: + - localsubjectaccessreviews + verbs: + - create + - apiGroups: + - rbac.authorization.k8s.io + resources: + - rolebindings + - roles + verbs: + - create + - delete + - deletecollection + - get + - list + - patch + - update + - watch +- apiVersion: rbac.authorization.k8s.io/v1 + kind: ClusterRole + metadata: + annotations: + rbac.authorization.kubernetes.io/autoupdate: "true" + creationTimestamp: "2024-12-26T23:24:17Z" + labels: + kubernetes.io/bootstrapping: rbac-defaults + rbac.authorization.k8s.io/aggregate-to-edit: "true" + managedFields: + - apiVersion: rbac.authorization.k8s.io/v1 + fieldsType: FieldsV1 + fieldsV1: + f:metadata: + f:annotations: + .: {} + f:rbac.authorization.kubernetes.io/autoupdate: {} + f:labels: + .: {} + f:kubernetes.io/bootstrapping: {} + f:rbac.authorization.k8s.io/aggregate-to-edit: {} + f:rules: {} + manager: kube-apiserver + operation: Update + time: "2024-12-26T23:24:17Z" + name: system:aggregate-to-edit + resourceVersion: "83" + uid: 89347b91-fcbd-4d09-ab34-7cadeefdfb7c + rules: + - apiGroups: + - "" + resources: + - pods/attach + - pods/exec + - pods/portforward + - pods/proxy + - secrets + - services/proxy + verbs: + - get + - list + - watch + - apiGroups: + - "" + resources: + - serviceaccounts + verbs: + - impersonate + - apiGroups: + - "" + resources: + - pods + - pods/attach + - pods/exec + - pods/portforward + - pods/proxy + verbs: + - create + - delete + - deletecollection + - patch + - update + - apiGroups: + - "" + resources: + - pods/eviction + verbs: + - create + - apiGroups: + - "" + resources: + - configmaps + - events + - persistentvolumeclaims + - replicationcontrollers + - replicationcontrollers/scale + - secrets + - serviceaccounts + - services + - services/proxy + verbs: + - create + - delete + - deletecollection + - patch + - update + - apiGroups: + - "" + resources: + - serviceaccounts/token + verbs: + - create + - apiGroups: + - apps + resources: + - daemonsets + - deployments + - deployments/rollback + - deployments/scale + - replicasets + - replicasets/scale + - statefulsets + - statefulsets/scale + verbs: + - create + - delete + - deletecollection + - patch + - update + - apiGroups: + - autoscaling + resources: + - horizontalpodautoscalers + verbs: + - create + - delete + - deletecollection + - patch + - update + - apiGroups: + - batch + resources: + - cronjobs + - jobs + verbs: + - create + - delete + - deletecollection + - patch + - update + - apiGroups: + - extensions + resources: + - daemonsets + - deployments + - deployments/rollback + - deployments/scale + - ingresses + - networkpolicies + - replicasets + - replicasets/scale + - replicationcontrollers/scale + verbs: + - create + - delete + - deletecollection + - patch + - update + - apiGroups: + - policy + resources: + - poddisruptionbudgets + verbs: + - create + - delete + - deletecollection + - patch + - update + - apiGroups: + - networking.k8s.io + resources: + - ingresses + - networkpolicies + verbs: + - create + - delete + - deletecollection + - patch + - update + - apiGroups: + - coordination.k8s.io + resources: + - leases + verbs: + - create + - delete + - deletecollection + - get + - list + - patch + - update + - watch +- apiVersion: rbac.authorization.k8s.io/v1 + kind: ClusterRole + metadata: + annotations: + rbac.authorization.kubernetes.io/autoupdate: "true" + creationTimestamp: "2024-12-26T23:24:17Z" + labels: + kubernetes.io/bootstrapping: rbac-defaults + rbac.authorization.k8s.io/aggregate-to-view: "true" + managedFields: + - apiVersion: rbac.authorization.k8s.io/v1 + fieldsType: FieldsV1 + fieldsV1: + f:metadata: + f:annotations: + .: {} + f:rbac.authorization.kubernetes.io/autoupdate: {} + f:labels: + .: {} + f:kubernetes.io/bootstrapping: {} + f:rbac.authorization.k8s.io/aggregate-to-view: {} + f:rules: {} + manager: kube-apiserver + operation: Update + time: "2024-12-26T23:24:17Z" + name: system:aggregate-to-view + resourceVersion: "84" + uid: d2aa44e5-9d8a-488d-bbc8-11f4fe7499d3 + rules: + - apiGroups: + - "" + resources: + - configmaps + - endpoints + - persistentvolumeclaims + - persistentvolumeclaims/status + - pods + - replicationcontrollers + - replicationcontrollers/scale + - serviceaccounts + - services + - services/status + verbs: + - get + - list + - watch + - apiGroups: + - "" + resources: + - bindings + - events + - limitranges + - namespaces/status + - pods/log + - pods/status + - replicationcontrollers/status + - resourcequotas + - resourcequotas/status + verbs: + - get + - list + - watch + - apiGroups: + - "" + resources: + - namespaces + verbs: + - get + - list + - watch + - apiGroups: + - discovery.k8s.io + resources: + - endpointslices + verbs: + - get + - list + - watch + - apiGroups: + - apps + resources: + - controllerrevisions + - daemonsets + - daemonsets/status + - deployments + - deployments/scale + - deployments/status + - replicasets + - replicasets/scale + - replicasets/status + - statefulsets + - statefulsets/scale + - statefulsets/status + verbs: + - get + - list + - watch + - apiGroups: + - autoscaling + resources: + - horizontalpodautoscalers + - horizontalpodautoscalers/status + verbs: + - get + - list + - watch + - apiGroups: + - batch + resources: + - cronjobs + - cronjobs/status + - jobs + - jobs/status + verbs: + - get + - list + - watch + - apiGroups: + - extensions + resources: + - daemonsets + - daemonsets/status + - deployments + - deployments/scale + - deployments/status + - ingresses + - ingresses/status + - networkpolicies + - replicasets + - replicasets/scale + - replicasets/status + - replicationcontrollers/scale + verbs: + - get + - list + - watch + - apiGroups: + - policy + resources: + - poddisruptionbudgets + - poddisruptionbudgets/status + verbs: + - get + - list + - watch + - apiGroups: + - networking.k8s.io + resources: + - ingresses + - ingresses/status + - networkpolicies + verbs: + - get + - list + - watch +- apiVersion: rbac.authorization.k8s.io/v1 + kind: ClusterRole + metadata: + annotations: + kubectl.kubernetes.io/last-applied-configuration: | + {"apiVersion":"rbac.authorization.k8s.io/v1","kind":"ClusterRole","metadata":{"annotations":{},"labels":{"addonmanager.kubernetes.io/mode":"Reconcile","k8s-app":"metrics-server","rbac.authorization.k8s.io/aggregate-to-admin":"true","rbac.authorization.k8s.io/aggregate-to-edit":"true","rbac.authorization.k8s.io/aggregate-to-view":"true"},"name":"system:aggregated-metrics-reader"},"rules":[{"apiGroups":["metrics.k8s.io"],"resources":["pods","nodes"],"verbs":["get","list","watch"]}]} + creationTimestamp: "2024-12-26T23:26:51Z" + labels: + addonmanager.kubernetes.io/mode: Reconcile + k8s-app: metrics-server + rbac.authorization.k8s.io/aggregate-to-admin: "true" + rbac.authorization.k8s.io/aggregate-to-edit: "true" + rbac.authorization.k8s.io/aggregate-to-view: "true" + managedFields: + - apiVersion: rbac.authorization.k8s.io/v1 + fieldsType: FieldsV1 + fieldsV1: + f:metadata: + f:annotations: + .: {} + f:kubectl.kubernetes.io/last-applied-configuration: {} + f:labels: + .: {} + f:addonmanager.kubernetes.io/mode: {} + f:k8s-app: {} + f:rbac.authorization.k8s.io/aggregate-to-admin: {} + f:rbac.authorization.k8s.io/aggregate-to-edit: {} + f:rbac.authorization.k8s.io/aggregate-to-view: {} + f:rules: {} + manager: kubectl-client-side-apply + operation: Update + time: "2024-12-26T23:26:51Z" + name: system:aggregated-metrics-reader + resourceVersion: "649" + uid: e22d1917-32e7-48da-bbb3-9586a5ea1ecd + rules: + - apiGroups: + - metrics.k8s.io + resources: + - pods + - nodes + verbs: + - get + - list + - watch +- apiVersion: rbac.authorization.k8s.io/v1 + kind: ClusterRole + metadata: + annotations: + rbac.authorization.kubernetes.io/autoupdate: "true" + creationTimestamp: "2024-12-26T23:24:17Z" + labels: + kubernetes.io/bootstrapping: rbac-defaults + managedFields: + - apiVersion: rbac.authorization.k8s.io/v1 + fieldsType: FieldsV1 + fieldsV1: + f:metadata: + f:annotations: + .: {} + f:rbac.authorization.kubernetes.io/autoupdate: {} + f:labels: + .: {} + f:kubernetes.io/bootstrapping: {} + f:rules: {} + manager: kube-apiserver + operation: Update + time: "2024-12-26T23:24:17Z" + name: system:auth-delegator + resourceVersion: "90" + uid: 3a8f64be-86f7-4a49-a71d-ec11cd71da63 + rules: + - apiGroups: + - authentication.k8s.io + resources: + - tokenreviews + verbs: + - create + - apiGroups: + - authorization.k8s.io + resources: + - subjectaccessreviews + verbs: + - create +- apiVersion: rbac.authorization.k8s.io/v1 + kind: ClusterRole + metadata: + annotations: + rbac.authorization.kubernetes.io/autoupdate: "true" + creationTimestamp: "2024-12-26T23:24:17Z" + labels: + kubernetes.io/bootstrapping: rbac-defaults + managedFields: + - apiVersion: rbac.authorization.k8s.io/v1 + fieldsType: FieldsV1 + fieldsV1: + f:metadata: + f:annotations: + .: {} + f:rbac.authorization.kubernetes.io/autoupdate: {} + f:labels: + .: {} + f:kubernetes.io/bootstrapping: {} + f:rules: {} + manager: kube-apiserver + operation: Update + time: "2024-12-26T23:24:17Z" + name: system:basic-user + resourceVersion: "77" + uid: 4c9269c0-1ec1-4576-9901-7799204bedd2 + rules: + - apiGroups: + - authorization.k8s.io + resources: + - selfsubjectaccessreviews + - selfsubjectrulesreviews + verbs: + - create +- apiVersion: rbac.authorization.k8s.io/v1 + kind: ClusterRole + metadata: + annotations: + rbac.authorization.kubernetes.io/autoupdate: "true" + creationTimestamp: "2024-12-26T23:24:17Z" + labels: + kubernetes.io/bootstrapping: rbac-defaults + managedFields: + - apiVersion: rbac.authorization.k8s.io/v1 + fieldsType: FieldsV1 + fieldsV1: + f:metadata: + f:annotations: + .: {} + f:rbac.authorization.kubernetes.io/autoupdate: {} + f:labels: + .: {} + f:kubernetes.io/bootstrapping: {} + f:rules: {} + manager: kube-apiserver + operation: Update + time: "2024-12-26T23:24:17Z" + name: system:certificates.k8s.io:certificatesigningrequests:nodeclient + resourceVersion: "95" + uid: 209431bb-eada-4729-8d0a-f2d6f9404c03 + rules: + - apiGroups: + - certificates.k8s.io + resources: + - certificatesigningrequests/nodeclient + verbs: + - create +- apiVersion: rbac.authorization.k8s.io/v1 + kind: ClusterRole + metadata: + annotations: + rbac.authorization.kubernetes.io/autoupdate: "true" + creationTimestamp: "2024-12-26T23:24:17Z" + labels: + kubernetes.io/bootstrapping: rbac-defaults + managedFields: + - apiVersion: rbac.authorization.k8s.io/v1 + fieldsType: FieldsV1 + fieldsV1: + f:metadata: + f:annotations: + .: {} + f:rbac.authorization.kubernetes.io/autoupdate: {} + f:labels: + .: {} + f:kubernetes.io/bootstrapping: {} + f:rules: {} + manager: kube-apiserver + operation: Update + time: "2024-12-26T23:24:17Z" + name: system:certificates.k8s.io:certificatesigningrequests:selfnodeclient + resourceVersion: "96" + uid: 7b2e7f05-5a3b-4a23-926d-4b5df0ed4cb7 + rules: + - apiGroups: + - certificates.k8s.io + resources: + - certificatesigningrequests/selfnodeclient + verbs: + - create +- apiVersion: rbac.authorization.k8s.io/v1 + kind: ClusterRole + metadata: + annotations: + rbac.authorization.kubernetes.io/autoupdate: "true" + creationTimestamp: "2024-12-26T23:24:17Z" + labels: + kubernetes.io/bootstrapping: rbac-defaults + managedFields: + - apiVersion: rbac.authorization.k8s.io/v1 + fieldsType: FieldsV1 + fieldsV1: + f:metadata: + f:annotations: + .: {} + f:rbac.authorization.kubernetes.io/autoupdate: {} + f:labels: + .: {} + f:kubernetes.io/bootstrapping: {} + f:rules: {} + manager: kube-apiserver + operation: Update + time: "2024-12-26T23:24:17Z" + name: system:certificates.k8s.io:kube-apiserver-client-approver + resourceVersion: "100" + uid: 437ee77f-af28-47ce-818b-43dc8f5b25c5 + rules: + - apiGroups: + - certificates.k8s.io + resourceNames: + - kubernetes.io/kube-apiserver-client + resources: + - signers + verbs: + - approve +- apiVersion: rbac.authorization.k8s.io/v1 + kind: ClusterRole + metadata: + annotations: + rbac.authorization.kubernetes.io/autoupdate: "true" + creationTimestamp: "2024-12-26T23:24:17Z" + labels: + kubernetes.io/bootstrapping: rbac-defaults + managedFields: + - apiVersion: rbac.authorization.k8s.io/v1 + fieldsType: FieldsV1 + fieldsV1: + f:metadata: + f:annotations: + .: {} + f:rbac.authorization.kubernetes.io/autoupdate: {} + f:labels: + .: {} + f:kubernetes.io/bootstrapping: {} + f:rules: {} + manager: kube-apiserver + operation: Update + time: "2024-12-26T23:24:17Z" + name: system:certificates.k8s.io:kube-apiserver-client-kubelet-approver + resourceVersion: "101" + uid: b931265b-dfce-4238-9261-0d2b57cde71c + rules: + - apiGroups: + - certificates.k8s.io + resourceNames: + - kubernetes.io/kube-apiserver-client-kubelet + resources: + - signers + verbs: + - approve +- apiVersion: rbac.authorization.k8s.io/v1 + kind: ClusterRole + metadata: + annotations: + rbac.authorization.kubernetes.io/autoupdate: "true" + creationTimestamp: "2024-12-26T23:24:17Z" + labels: + kubernetes.io/bootstrapping: rbac-defaults + managedFields: + - apiVersion: rbac.authorization.k8s.io/v1 + fieldsType: FieldsV1 + fieldsV1: + f:metadata: + f:annotations: + .: {} + f:rbac.authorization.kubernetes.io/autoupdate: {} + f:labels: + .: {} + f:kubernetes.io/bootstrapping: {} + f:rules: {} + manager: kube-apiserver + operation: Update + time: "2024-12-26T23:24:17Z" + name: system:certificates.k8s.io:kubelet-serving-approver + resourceVersion: "99" + uid: d9581b25-2be1-492f-b596-86c60802c5a3 + rules: + - apiGroups: + - certificates.k8s.io + resourceNames: + - kubernetes.io/kubelet-serving + resources: + - signers + verbs: + - approve +- apiVersion: rbac.authorization.k8s.io/v1 + kind: ClusterRole + metadata: + annotations: + rbac.authorization.kubernetes.io/autoupdate: "true" + creationTimestamp: "2024-12-26T23:24:17Z" + labels: + kubernetes.io/bootstrapping: rbac-defaults + managedFields: + - apiVersion: rbac.authorization.k8s.io/v1 + fieldsType: FieldsV1 + fieldsV1: + f:metadata: + f:annotations: + .: {} + f:rbac.authorization.kubernetes.io/autoupdate: {} + f:labels: + .: {} + f:kubernetes.io/bootstrapping: {} + f:rules: {} + manager: kube-apiserver + operation: Update + time: "2024-12-26T23:24:17Z" + name: system:certificates.k8s.io:legacy-unknown-approver + resourceVersion: "98" + uid: 5ed06d53-1139-430f-a816-8303b0979154 + rules: + - apiGroups: + - certificates.k8s.io + resourceNames: + - kubernetes.io/legacy-unknown + resources: + - signers + verbs: + - approve +- apiVersion: rbac.authorization.k8s.io/v1 + kind: ClusterRole + metadata: + annotations: + rbac.authorization.kubernetes.io/autoupdate: "true" + creationTimestamp: "2024-12-26T23:24:17Z" + labels: + kubernetes.io/bootstrapping: rbac-defaults + managedFields: + - apiVersion: rbac.authorization.k8s.io/v1 + fieldsType: FieldsV1 + fieldsV1: + f:metadata: + f:annotations: + .: {} + f:rbac.authorization.kubernetes.io/autoupdate: {} + f:labels: + .: {} + f:kubernetes.io/bootstrapping: {} + f:rules: {} + manager: kube-apiserver + operation: Update + time: "2024-12-26T23:24:17Z" + name: system:controller:attachdetach-controller + resourceVersion: "105" + uid: 1a82f2af-5174-45d7-a072-100922a2142b + rules: + - apiGroups: + - "" + resources: + - persistentvolumeclaims + - persistentvolumes + verbs: + - list + - watch + - apiGroups: + - "" + resources: + - nodes + verbs: + - get + - list + - watch + - apiGroups: + - "" + resources: + - nodes/status + verbs: + - patch + - update + - apiGroups: + - "" + resources: + - pods + verbs: + - list + - watch + - apiGroups: + - "" + - events.k8s.io + resources: + - events + verbs: + - create + - patch + - update + - apiGroups: + - storage.k8s.io + resources: + - volumeattachments + verbs: + - create + - delete + - get + - list + - watch + - apiGroups: + - storage.k8s.io + resources: + - csidrivers + verbs: + - get + - list + - watch + - apiGroups: + - storage.k8s.io + resources: + - csinodes + verbs: + - get + - list + - watch +- apiVersion: rbac.authorization.k8s.io/v1 + kind: ClusterRole + metadata: + annotations: + rbac.authorization.kubernetes.io/autoupdate: "true" + creationTimestamp: "2024-12-26T23:24:17Z" + labels: + kubernetes.io/bootstrapping: rbac-defaults + managedFields: + - apiVersion: rbac.authorization.k8s.io/v1 + fieldsType: FieldsV1 + fieldsV1: + f:metadata: + f:annotations: + .: {} + f:rbac.authorization.kubernetes.io/autoupdate: {} + f:labels: + .: {} + f:kubernetes.io/bootstrapping: {} + f:rules: {} + manager: kube-apiserver + operation: Update + time: "2024-12-26T23:24:17Z" + name: system:controller:certificate-controller + resourceVersion: "131" + uid: 866fe2a3-4d5d-4769-aec5-cc44821d8c09 + rules: + - apiGroups: + - certificates.k8s.io + resources: + - certificatesigningrequests + verbs: + - delete + - get + - list + - watch + - apiGroups: + - certificates.k8s.io + resources: + - certificatesigningrequests/approval + - certificatesigningrequests/status + verbs: + - update + - apiGroups: + - certificates.k8s.io + resourceNames: + - kubernetes.io/kube-apiserver-client-kubelet + resources: + - signers + verbs: + - approve + - apiGroups: + - certificates.k8s.io + resourceNames: + - kubernetes.io/kube-apiserver-client + - kubernetes.io/kube-apiserver-client-kubelet + - kubernetes.io/kubelet-serving + - kubernetes.io/legacy-unknown + resources: + - signers + verbs: + - sign + - apiGroups: + - authorization.k8s.io + resources: + - subjectaccessreviews + verbs: + - create + - apiGroups: + - "" + - events.k8s.io + resources: + - events + verbs: + - create + - patch + - update +- apiVersion: rbac.authorization.k8s.io/v1 + kind: ClusterRole + metadata: + annotations: + rbac.authorization.kubernetes.io/autoupdate: "true" + creationTimestamp: "2024-12-26T23:24:17Z" + labels: + kubernetes.io/bootstrapping: rbac-defaults + managedFields: + - apiVersion: rbac.authorization.k8s.io/v1 + fieldsType: FieldsV1 + fieldsV1: + f:metadata: + f:annotations: + .: {} + f:rbac.authorization.kubernetes.io/autoupdate: {} + f:labels: + .: {} + f:kubernetes.io/bootstrapping: {} + f:rules: {} + manager: kube-apiserver + operation: Update + time: "2024-12-26T23:24:17Z" + name: system:controller:clusterrole-aggregation-controller + resourceVersion: "106" + uid: cfb2e532-6414-4433-9584-a45c7b6a10b2 + rules: + - apiGroups: + - rbac.authorization.k8s.io + resources: + - clusterroles + verbs: + - escalate + - get + - list + - patch + - update + - watch +- apiVersion: rbac.authorization.k8s.io/v1 + kind: ClusterRole + metadata: + annotations: + rbac.authorization.kubernetes.io/autoupdate: "true" + creationTimestamp: "2024-12-26T23:24:17Z" + labels: + kubernetes.io/bootstrapping: rbac-defaults + managedFields: + - apiVersion: rbac.authorization.k8s.io/v1 + fieldsType: FieldsV1 + fieldsV1: + f:metadata: + f:annotations: + .: {} + f:rbac.authorization.kubernetes.io/autoupdate: {} + f:labels: + .: {} + f:kubernetes.io/bootstrapping: {} + f:rules: {} + manager: kube-apiserver + operation: Update + time: "2024-12-26T23:24:17Z" + name: system:controller:cronjob-controller + resourceVersion: "107" + uid: 3d02b44d-d394-45e5-9f51-fd44b569aab4 + rules: + - apiGroups: + - batch + resources: + - cronjobs + verbs: + - get + - list + - update + - watch + - apiGroups: + - batch + resources: + - jobs + verbs: + - create + - delete + - get + - list + - patch + - update + - watch + - apiGroups: + - batch + resources: + - cronjobs/status + verbs: + - update + - apiGroups: + - batch + resources: + - cronjobs/finalizers + verbs: + - update + - apiGroups: + - "" + resources: + - pods + verbs: + - delete + - list + - apiGroups: + - "" + - events.k8s.io + resources: + - events + verbs: + - create + - patch + - update +- apiVersion: rbac.authorization.k8s.io/v1 + kind: ClusterRole + metadata: + annotations: + rbac.authorization.kubernetes.io/autoupdate: "true" + creationTimestamp: "2024-12-26T23:24:17Z" + labels: + kubernetes.io/bootstrapping: rbac-defaults + managedFields: + - apiVersion: rbac.authorization.k8s.io/v1 + fieldsType: FieldsV1 + fieldsV1: + f:metadata: + f:annotations: + .: {} + f:rbac.authorization.kubernetes.io/autoupdate: {} + f:labels: + .: {} + f:kubernetes.io/bootstrapping: {} + f:rules: {} + manager: kube-apiserver + operation: Update + time: "2024-12-26T23:24:17Z" + name: system:controller:daemon-set-controller + resourceVersion: "108" + uid: d753fc5d-5261-4894-a6e0-7cbcbe4546df + rules: + - apiGroups: + - apps + - extensions + resources: + - daemonsets + verbs: + - get + - list + - watch + - apiGroups: + - apps + - extensions + resources: + - daemonsets/status + verbs: + - update + - apiGroups: + - apps + - extensions + resources: + - daemonsets/finalizers + verbs: + - update + - apiGroups: + - "" + resources: + - nodes + verbs: + - list + - watch + - apiGroups: + - "" + resources: + - pods + verbs: + - create + - delete + - list + - patch + - watch + - apiGroups: + - "" + resources: + - pods/binding + verbs: + - create + - apiGroups: + - apps + resources: + - controllerrevisions + verbs: + - create + - delete + - get + - list + - patch + - update + - watch + - apiGroups: + - "" + - events.k8s.io + resources: + - events + verbs: + - create + - patch + - update +- apiVersion: rbac.authorization.k8s.io/v1 + kind: ClusterRole + metadata: + annotations: + rbac.authorization.kubernetes.io/autoupdate: "true" + creationTimestamp: "2024-12-26T23:24:17Z" + labels: + kubernetes.io/bootstrapping: rbac-defaults + managedFields: + - apiVersion: rbac.authorization.k8s.io/v1 + fieldsType: FieldsV1 + fieldsV1: + f:metadata: + f:annotations: + .: {} + f:rbac.authorization.kubernetes.io/autoupdate: {} + f:labels: + .: {} + f:kubernetes.io/bootstrapping: {} + f:rules: {} + manager: kube-apiserver + operation: Update + time: "2024-12-26T23:24:17Z" + name: system:controller:deployment-controller + resourceVersion: "109" + uid: 4218b62b-3e65-4921-93bb-cdbbe61658eb + rules: + - apiGroups: + - apps + - extensions + resources: + - deployments + verbs: + - get + - list + - update + - watch + - apiGroups: + - apps + - extensions + resources: + - deployments/status + verbs: + - update + - apiGroups: + - apps + - extensions + resources: + - deployments/finalizers + verbs: + - update + - apiGroups: + - apps + - extensions + resources: + - replicasets + verbs: + - create + - delete + - get + - list + - patch + - update + - watch + - apiGroups: + - "" + resources: + - pods + verbs: + - get + - list + - update + - watch + - apiGroups: + - "" + - events.k8s.io + resources: + - events + verbs: + - create + - patch + - update +- apiVersion: rbac.authorization.k8s.io/v1 + kind: ClusterRole + metadata: + annotations: + rbac.authorization.kubernetes.io/autoupdate: "true" + creationTimestamp: "2024-12-26T23:24:17Z" + labels: + kubernetes.io/bootstrapping: rbac-defaults + managedFields: + - apiVersion: rbac.authorization.k8s.io/v1 + fieldsType: FieldsV1 + fieldsV1: + f:metadata: + f:annotations: + .: {} + f:rbac.authorization.kubernetes.io/autoupdate: {} + f:labels: + .: {} + f:kubernetes.io/bootstrapping: {} + f:rules: {} + manager: kube-apiserver + operation: Update + time: "2024-12-26T23:24:17Z" + name: system:controller:disruption-controller + resourceVersion: "110" + uid: c2937ac5-a77f-4291-a388-f0cb07bc20fa + rules: + - apiGroups: + - apps + - extensions + resources: + - deployments + verbs: + - get + - list + - watch + - apiGroups: + - apps + - extensions + resources: + - replicasets + verbs: + - get + - list + - watch + - apiGroups: + - "" + resources: + - replicationcontrollers + verbs: + - get + - list + - watch + - apiGroups: + - policy + resources: + - poddisruptionbudgets + verbs: + - get + - list + - watch + - apiGroups: + - apps + resources: + - statefulsets + verbs: + - get + - list + - watch + - apiGroups: + - policy + resources: + - poddisruptionbudgets/status + verbs: + - update + - apiGroups: + - '*' + resources: + - '*/scale' + verbs: + - get + - apiGroups: + - "" + - events.k8s.io + resources: + - events + verbs: + - create + - patch + - update + - apiGroups: + - "" + resources: + - pods/status + verbs: + - patch +- apiVersion: rbac.authorization.k8s.io/v1 + kind: ClusterRole + metadata: + annotations: + rbac.authorization.kubernetes.io/autoupdate: "true" + creationTimestamp: "2024-12-26T23:24:17Z" + labels: + kubernetes.io/bootstrapping: rbac-defaults + managedFields: + - apiVersion: rbac.authorization.k8s.io/v1 + fieldsType: FieldsV1 + fieldsV1: + f:metadata: + f:annotations: + .: {} + f:rbac.authorization.kubernetes.io/autoupdate: {} + f:labels: + .: {} + f:kubernetes.io/bootstrapping: {} + f:rules: {} + manager: kube-apiserver + operation: Update + time: "2024-12-26T23:24:17Z" + name: system:controller:endpoint-controller + resourceVersion: "111" + uid: ee088d6c-7ba0-43e7-b28e-015bcee2be14 + rules: + - apiGroups: + - "" + resources: + - pods + - services + verbs: + - get + - list + - watch + - apiGroups: + - "" + resources: + - endpoints + verbs: + - create + - delete + - get + - list + - update + - apiGroups: + - "" + resources: + - endpoints/restricted + verbs: + - create + - apiGroups: + - "" + - events.k8s.io + resources: + - events + verbs: + - create + - patch + - update +- apiVersion: rbac.authorization.k8s.io/v1 + kind: ClusterRole + metadata: + annotations: + rbac.authorization.kubernetes.io/autoupdate: "true" + creationTimestamp: "2024-12-26T23:24:17Z" + labels: + kubernetes.io/bootstrapping: rbac-defaults + managedFields: + - apiVersion: rbac.authorization.k8s.io/v1 + fieldsType: FieldsV1 + fieldsV1: + f:metadata: + f:annotations: + .: {} + f:rbac.authorization.kubernetes.io/autoupdate: {} + f:labels: + .: {} + f:kubernetes.io/bootstrapping: {} + f:rules: {} + manager: kube-apiserver + operation: Update + time: "2024-12-26T23:24:17Z" + name: system:controller:endpointslice-controller + resourceVersion: "112" + uid: 32227548-6666-4583-a017-bab1ebe7a3e1 + rules: + - apiGroups: + - "" + resources: + - nodes + - pods + - services + verbs: + - get + - list + - watch + - apiGroups: + - "" + resources: + - services/finalizers + verbs: + - update + - apiGroups: + - discovery.k8s.io + resources: + - endpointslices + verbs: + - create + - delete + - get + - list + - update + - apiGroups: + - "" + - events.k8s.io + resources: + - events + verbs: + - create + - patch + - update +- apiVersion: rbac.authorization.k8s.io/v1 + kind: ClusterRole + metadata: + annotations: + rbac.authorization.kubernetes.io/autoupdate: "true" + creationTimestamp: "2024-12-26T23:24:17Z" + labels: + kubernetes.io/bootstrapping: rbac-defaults + managedFields: + - apiVersion: rbac.authorization.k8s.io/v1 + fieldsType: FieldsV1 + fieldsV1: + f:metadata: + f:annotations: + .: {} + f:rbac.authorization.kubernetes.io/autoupdate: {} + f:labels: + .: {} + f:kubernetes.io/bootstrapping: {} + f:rules: {} + manager: kube-apiserver + operation: Update + time: "2024-12-26T23:24:17Z" + name: system:controller:endpointslicemirroring-controller + resourceVersion: "113" + uid: bfa70017-83bd-4f02-a05b-2165febf518f + rules: + - apiGroups: + - "" + resources: + - endpoints + - services + verbs: + - get + - list + - watch + - apiGroups: + - "" + resources: + - services/finalizers + verbs: + - update + - apiGroups: + - "" + resources: + - endpoints/finalizers + verbs: + - update + - apiGroups: + - discovery.k8s.io + resources: + - endpointslices + verbs: + - create + - delete + - get + - list + - update + - apiGroups: + - "" + - events.k8s.io + resources: + - events + verbs: + - create + - patch + - update +- apiVersion: rbac.authorization.k8s.io/v1 + kind: ClusterRole + metadata: + annotations: + rbac.authorization.kubernetes.io/autoupdate: "true" + creationTimestamp: "2024-12-26T23:24:17Z" + labels: + kubernetes.io/bootstrapping: rbac-defaults + managedFields: + - apiVersion: rbac.authorization.k8s.io/v1 + fieldsType: FieldsV1 + fieldsV1: + f:metadata: + f:annotations: + .: {} + f:rbac.authorization.kubernetes.io/autoupdate: {} + f:labels: + .: {} + f:kubernetes.io/bootstrapping: {} + f:rules: {} + manager: kube-apiserver + operation: Update + time: "2024-12-26T23:24:17Z" + name: system:controller:ephemeral-volume-controller + resourceVersion: "115" + uid: cdd5b7ec-f117-4a4d-aca2-85a2b40c9a37 + rules: + - apiGroups: + - "" + resources: + - pods + verbs: + - get + - list + - watch + - apiGroups: + - "" + resources: + - pods/finalizers + verbs: + - update + - apiGroups: + - "" + resources: + - persistentvolumeclaims + verbs: + - create + - get + - list + - watch + - apiGroups: + - "" + - events.k8s.io + resources: + - events + verbs: + - create + - patch + - update +- apiVersion: rbac.authorization.k8s.io/v1 + kind: ClusterRole + metadata: + annotations: + rbac.authorization.kubernetes.io/autoupdate: "true" + creationTimestamp: "2024-12-26T23:24:17Z" + labels: + kubernetes.io/bootstrapping: rbac-defaults + managedFields: + - apiVersion: rbac.authorization.k8s.io/v1 + fieldsType: FieldsV1 + fieldsV1: + f:metadata: + f:annotations: + .: {} + f:rbac.authorization.kubernetes.io/autoupdate: {} + f:labels: + .: {} + f:kubernetes.io/bootstrapping: {} + f:rules: {} + manager: kube-apiserver + operation: Update + time: "2024-12-26T23:24:17Z" + name: system:controller:expand-controller + resourceVersion: "114" + uid: 75564c6a-4a34-403f-aa06-34d9b738746c + rules: + - apiGroups: + - "" + resources: + - persistentvolumes + verbs: + - get + - list + - patch + - update + - watch + - apiGroups: + - "" + resources: + - persistentvolumeclaims/status + verbs: + - patch + - update + - apiGroups: + - "" + resources: + - persistentvolumeclaims + verbs: + - get + - list + - watch + - apiGroups: + - storage.k8s.io + resources: + - storageclasses + verbs: + - get + - list + - watch + - apiGroups: + - "" + resources: + - endpoints + - services + verbs: + - get + - apiGroups: + - "" + resources: + - secrets + verbs: + - get + - apiGroups: + - "" + - events.k8s.io + resources: + - events + verbs: + - create + - patch + - update +- apiVersion: rbac.authorization.k8s.io/v1 + kind: ClusterRole + metadata: + annotations: + rbac.authorization.kubernetes.io/autoupdate: "true" + creationTimestamp: "2024-12-26T23:24:17Z" + labels: + kubernetes.io/bootstrapping: rbac-defaults + managedFields: + - apiVersion: rbac.authorization.k8s.io/v1 + fieldsType: FieldsV1 + fieldsV1: + f:metadata: + f:annotations: + .: {} + f:rbac.authorization.kubernetes.io/autoupdate: {} + f:labels: + .: {} + f:kubernetes.io/bootstrapping: {} + f:rules: {} + manager: kube-apiserver + operation: Update + time: "2024-12-26T23:24:17Z" + name: system:controller:generic-garbage-collector + resourceVersion: "116" + uid: 8b2a0870-ea4e-4425-8b59-441d97ae64b2 + rules: + - apiGroups: + - '*' + resources: + - '*' + verbs: + - delete + - get + - list + - patch + - update + - watch + - apiGroups: + - "" + - events.k8s.io + resources: + - events + verbs: + - create + - patch + - update +- apiVersion: rbac.authorization.k8s.io/v1 + kind: ClusterRole + metadata: + annotations: + rbac.authorization.kubernetes.io/autoupdate: "true" + creationTimestamp: "2024-12-26T23:24:17Z" + labels: + kubernetes.io/bootstrapping: rbac-defaults + managedFields: + - apiVersion: rbac.authorization.k8s.io/v1 + fieldsType: FieldsV1 + fieldsV1: + f:metadata: + f:annotations: + .: {} + f:rbac.authorization.kubernetes.io/autoupdate: {} + f:labels: + .: {} + f:kubernetes.io/bootstrapping: {} + f:rules: {} + manager: kube-apiserver + operation: Update + time: "2024-12-26T23:24:17Z" + name: system:controller:horizontal-pod-autoscaler + resourceVersion: "117" + uid: ee42df33-18b2-4086-85df-a8e4dcff1857 + rules: + - apiGroups: + - autoscaling + resources: + - horizontalpodautoscalers + verbs: + - get + - list + - watch + - apiGroups: + - autoscaling + resources: + - horizontalpodautoscalers/status + verbs: + - update + - apiGroups: + - '*' + resources: + - '*/scale' + verbs: + - get + - update + - apiGroups: + - "" + resources: + - pods + verbs: + - list + - apiGroups: + - "" + resourceNames: + - 'http:heapster:' + - 'https:heapster:' + resources: + - services/proxy + verbs: + - get + - apiGroups: + - metrics.k8s.io + resources: + - pods + verbs: + - list + - apiGroups: + - custom.metrics.k8s.io + resources: + - '*' + verbs: + - get + - list + - apiGroups: + - external.metrics.k8s.io + resources: + - '*' + verbs: + - get + - list + - apiGroups: + - "" + - events.k8s.io + resources: + - events + verbs: + - create + - patch + - update +- apiVersion: rbac.authorization.k8s.io/v1 + kind: ClusterRole + metadata: + annotations: + rbac.authorization.kubernetes.io/autoupdate: "true" + creationTimestamp: "2024-12-26T23:24:17Z" + labels: + kubernetes.io/bootstrapping: rbac-defaults + managedFields: + - apiVersion: rbac.authorization.k8s.io/v1 + fieldsType: FieldsV1 + fieldsV1: + f:metadata: + f:annotations: + .: {} + f:rbac.authorization.kubernetes.io/autoupdate: {} + f:labels: + .: {} + f:kubernetes.io/bootstrapping: {} + f:rules: {} + manager: kube-apiserver + operation: Update + time: "2024-12-26T23:24:17Z" + name: system:controller:job-controller + resourceVersion: "118" + uid: 65120779-ad91-486f-a2e1-0257e2140071 + rules: + - apiGroups: + - batch + resources: + - jobs + verbs: + - get + - list + - patch + - update + - watch + - apiGroups: + - batch + resources: + - jobs/status + verbs: + - update + - apiGroups: + - batch + resources: + - jobs/finalizers + verbs: + - update + - apiGroups: + - "" + resources: + - pods + verbs: + - create + - delete + - list + - patch + - watch + - apiGroups: + - "" + - events.k8s.io + resources: + - events + verbs: + - create + - patch + - update +- apiVersion: rbac.authorization.k8s.io/v1 + kind: ClusterRole + metadata: + annotations: + rbac.authorization.kubernetes.io/autoupdate: "true" + creationTimestamp: "2024-12-26T23:24:17Z" + labels: + kubernetes.io/bootstrapping: rbac-defaults + managedFields: + - apiVersion: rbac.authorization.k8s.io/v1 + fieldsType: FieldsV1 + fieldsV1: + f:metadata: + f:annotations: + .: {} + f:rbac.authorization.kubernetes.io/autoupdate: {} + f:labels: + .: {} + f:kubernetes.io/bootstrapping: {} + f:rules: {} + manager: kube-apiserver + operation: Update + time: "2024-12-26T23:24:17Z" + name: system:controller:namespace-controller + resourceVersion: "119" + uid: 8f4f5b73-0e85-4e49-81e7-806330d3a50a + rules: + - apiGroups: + - "" + resources: + - namespaces + verbs: + - delete + - get + - list + - watch + - apiGroups: + - "" + resources: + - namespaces/finalize + - namespaces/status + verbs: + - update + - apiGroups: + - '*' + resources: + - '*' + verbs: + - delete + - deletecollection + - get + - list +- apiVersion: rbac.authorization.k8s.io/v1 + kind: ClusterRole + metadata: + annotations: + rbac.authorization.kubernetes.io/autoupdate: "true" + creationTimestamp: "2024-12-26T23:24:17Z" + labels: + kubernetes.io/bootstrapping: rbac-defaults + managedFields: + - apiVersion: rbac.authorization.k8s.io/v1 + fieldsType: FieldsV1 + fieldsV1: + f:metadata: + f:annotations: + .: {} + f:rbac.authorization.kubernetes.io/autoupdate: {} + f:labels: + .: {} + f:kubernetes.io/bootstrapping: {} + f:rules: {} + manager: kube-apiserver + operation: Update + time: "2024-12-26T23:24:17Z" + name: system:controller:node-controller + resourceVersion: "120" + uid: 5c19cd0e-d34d-4005-9fa6-c5b7f1fd83ee + rules: + - apiGroups: + - "" + resources: + - nodes + verbs: + - delete + - get + - list + - patch + - update + - apiGroups: + - "" + resources: + - nodes/status + verbs: + - patch + - update + - apiGroups: + - "" + resources: + - pods/status + verbs: + - patch + - update + - apiGroups: + - "" + resources: + - pods + verbs: + - delete + - list + - apiGroups: + - networking.k8s.io + resources: + - clustercidrs + verbs: + - create + - get + - list + - update + - apiGroups: + - "" + - events.k8s.io + resources: + - events + verbs: + - create + - patch + - update + - apiGroups: + - "" + resources: + - pods + verbs: + - get +- apiVersion: rbac.authorization.k8s.io/v1 + kind: ClusterRole + metadata: + annotations: + rbac.authorization.kubernetes.io/autoupdate: "true" + creationTimestamp: "2024-12-26T23:24:17Z" + labels: + kubernetes.io/bootstrapping: rbac-defaults + managedFields: + - apiVersion: rbac.authorization.k8s.io/v1 + fieldsType: FieldsV1 + fieldsV1: + f:metadata: + f:annotations: + .: {} + f:rbac.authorization.kubernetes.io/autoupdate: {} + f:labels: + .: {} + f:kubernetes.io/bootstrapping: {} + f:rules: {} + manager: kube-apiserver + operation: Update + time: "2024-12-26T23:24:17Z" + name: system:controller:persistent-volume-binder + resourceVersion: "121" + uid: 88ce69f0-db18-4fe9-ae6a-5c2798b01ea3 + rules: + - apiGroups: + - "" + resources: + - persistentvolumes + verbs: + - create + - delete + - get + - list + - update + - watch + - apiGroups: + - "" + resources: + - persistentvolumes/status + verbs: + - update + - apiGroups: + - "" + resources: + - persistentvolumeclaims + verbs: + - get + - list + - update + - watch + - apiGroups: + - "" + resources: + - persistentvolumeclaims/status + verbs: + - update + - apiGroups: + - "" + resources: + - pods + verbs: + - create + - delete + - get + - list + - watch + - apiGroups: + - storage.k8s.io + resources: + - storageclasses + verbs: + - get + - list + - watch + - apiGroups: + - "" + resources: + - endpoints + verbs: + - create + - delete + - get + - update + - apiGroups: + - "" + resources: + - services + verbs: + - create + - delete + - get + - apiGroups: + - "" + resources: + - secrets + verbs: + - get + - apiGroups: + - "" + resources: + - nodes + verbs: + - get + - list + - apiGroups: + - "" + resources: + - events + verbs: + - watch + - apiGroups: + - "" + - events.k8s.io + resources: + - events + verbs: + - create + - patch + - update +- apiVersion: rbac.authorization.k8s.io/v1 + kind: ClusterRole + metadata: + annotations: + rbac.authorization.kubernetes.io/autoupdate: "true" + creationTimestamp: "2024-12-26T23:24:17Z" + labels: + kubernetes.io/bootstrapping: rbac-defaults + managedFields: + - apiVersion: rbac.authorization.k8s.io/v1 + fieldsType: FieldsV1 + fieldsV1: + f:metadata: + f:annotations: + .: {} + f:rbac.authorization.kubernetes.io/autoupdate: {} + f:labels: + .: {} + f:kubernetes.io/bootstrapping: {} + f:rules: {} + manager: kube-apiserver + operation: Update + time: "2024-12-26T23:24:17Z" + name: system:controller:pod-garbage-collector + resourceVersion: "122" + uid: 12134efe-c1d3-4a8f-9a80-8b4abf6336b3 + rules: + - apiGroups: + - "" + resources: + - pods + verbs: + - delete + - list + - watch + - apiGroups: + - "" + resources: + - nodes + verbs: + - get + - list + - apiGroups: + - "" + resources: + - pods/status + verbs: + - patch +- apiVersion: rbac.authorization.k8s.io/v1 + kind: ClusterRole + metadata: + annotations: + rbac.authorization.kubernetes.io/autoupdate: "true" + creationTimestamp: "2024-12-26T23:24:17Z" + labels: + kubernetes.io/bootstrapping: rbac-defaults + managedFields: + - apiVersion: rbac.authorization.k8s.io/v1 + fieldsType: FieldsV1 + fieldsV1: + f:metadata: + f:annotations: + .: {} + f:rbac.authorization.kubernetes.io/autoupdate: {} + f:labels: + .: {} + f:kubernetes.io/bootstrapping: {} + f:rules: {} + manager: kube-apiserver + operation: Update + time: "2024-12-26T23:24:17Z" + name: system:controller:pv-protection-controller + resourceVersion: "133" + uid: e75aac6e-4b4c-41a1-9695-218b98bed801 + rules: + - apiGroups: + - "" + resources: + - persistentvolumes + verbs: + - get + - list + - update + - watch + - apiGroups: + - "" + - events.k8s.io + resources: + - events + verbs: + - create + - patch + - update +- apiVersion: rbac.authorization.k8s.io/v1 + kind: ClusterRole + metadata: + annotations: + rbac.authorization.kubernetes.io/autoupdate: "true" + creationTimestamp: "2024-12-26T23:24:17Z" + labels: + kubernetes.io/bootstrapping: rbac-defaults + managedFields: + - apiVersion: rbac.authorization.k8s.io/v1 + fieldsType: FieldsV1 + fieldsV1: + f:metadata: + f:annotations: + .: {} + f:rbac.authorization.kubernetes.io/autoupdate: {} + f:labels: + .: {} + f:kubernetes.io/bootstrapping: {} + f:rules: {} + manager: kube-apiserver + operation: Update + time: "2024-12-26T23:24:17Z" + name: system:controller:pvc-protection-controller + resourceVersion: "132" + uid: fbf99fff-ef35-47bb-986b-5d9771a1ae96 + rules: + - apiGroups: + - "" + resources: + - persistentvolumeclaims + verbs: + - get + - list + - update + - watch + - apiGroups: + - "" + resources: + - pods + verbs: + - get + - list + - watch + - apiGroups: + - "" + - events.k8s.io + resources: + - events + verbs: + - create + - patch + - update +- apiVersion: rbac.authorization.k8s.io/v1 + kind: ClusterRole + metadata: + annotations: + rbac.authorization.kubernetes.io/autoupdate: "true" + creationTimestamp: "2024-12-26T23:24:17Z" + labels: + kubernetes.io/bootstrapping: rbac-defaults + managedFields: + - apiVersion: rbac.authorization.k8s.io/v1 + fieldsType: FieldsV1 + fieldsV1: + f:metadata: + f:annotations: + .: {} + f:rbac.authorization.kubernetes.io/autoupdate: {} + f:labels: + .: {} + f:kubernetes.io/bootstrapping: {} + f:rules: {} + manager: kube-apiserver + operation: Update + time: "2024-12-26T23:24:17Z" + name: system:controller:replicaset-controller + resourceVersion: "123" + uid: 3d2a0e68-e1df-4df8-aa87-d585c0277da1 + rules: + - apiGroups: + - apps + - extensions + resources: + - replicasets + verbs: + - get + - list + - update + - watch + - apiGroups: + - apps + - extensions + resources: + - replicasets/status + verbs: + - update + - apiGroups: + - apps + - extensions + resources: + - replicasets/finalizers + verbs: + - update + - apiGroups: + - "" + resources: + - pods + verbs: + - create + - delete + - list + - patch + - watch + - apiGroups: + - "" + - events.k8s.io + resources: + - events + verbs: + - create + - patch + - update +- apiVersion: rbac.authorization.k8s.io/v1 + kind: ClusterRole + metadata: + annotations: + rbac.authorization.kubernetes.io/autoupdate: "true" + creationTimestamp: "2024-12-26T23:24:17Z" + labels: + kubernetes.io/bootstrapping: rbac-defaults + managedFields: + - apiVersion: rbac.authorization.k8s.io/v1 + fieldsType: FieldsV1 + fieldsV1: + f:metadata: + f:annotations: + .: {} + f:rbac.authorization.kubernetes.io/autoupdate: {} + f:labels: + .: {} + f:kubernetes.io/bootstrapping: {} + f:rules: {} + manager: kube-apiserver + operation: Update + time: "2024-12-26T23:24:17Z" + name: system:controller:replication-controller + resourceVersion: "124" + uid: a35e342e-893d-454c-9a4b-ead2a515edca + rules: + - apiGroups: + - "" + resources: + - replicationcontrollers + verbs: + - get + - list + - update + - watch + - apiGroups: + - "" + resources: + - replicationcontrollers/status + verbs: + - update + - apiGroups: + - "" + resources: + - replicationcontrollers/finalizers + verbs: + - update + - apiGroups: + - "" + resources: + - pods + verbs: + - create + - delete + - list + - patch + - watch + - apiGroups: + - "" + - events.k8s.io + resources: + - events + verbs: + - create + - patch + - update +- apiVersion: rbac.authorization.k8s.io/v1 + kind: ClusterRole + metadata: + annotations: + rbac.authorization.kubernetes.io/autoupdate: "true" + creationTimestamp: "2024-12-26T23:24:17Z" + labels: + kubernetes.io/bootstrapping: rbac-defaults + managedFields: + - apiVersion: rbac.authorization.k8s.io/v1 + fieldsType: FieldsV1 + fieldsV1: + f:metadata: + f:annotations: + .: {} + f:rbac.authorization.kubernetes.io/autoupdate: {} + f:labels: + .: {} + f:kubernetes.io/bootstrapping: {} + f:rules: {} + manager: kube-apiserver + operation: Update + time: "2024-12-26T23:24:17Z" + name: system:controller:resourcequota-controller + resourceVersion: "125" + uid: 0abb5386-280a-49bb-aac8-a78f3bfa0c45 + rules: + - apiGroups: + - '*' + resources: + - '*' + verbs: + - list + - watch + - apiGroups: + - "" + resources: + - resourcequotas/status + verbs: + - update + - apiGroups: + - "" + - events.k8s.io + resources: + - events + verbs: + - create + - patch + - update +- apiVersion: rbac.authorization.k8s.io/v1 + kind: ClusterRole + metadata: + annotations: + rbac.authorization.kubernetes.io/autoupdate: "true" + creationTimestamp: "2024-12-26T23:24:17Z" + labels: + kubernetes.io/bootstrapping: rbac-defaults + managedFields: + - apiVersion: rbac.authorization.k8s.io/v1 + fieldsType: FieldsV1 + fieldsV1: + f:metadata: + f:annotations: + .: {} + f:rbac.authorization.kubernetes.io/autoupdate: {} + f:labels: + .: {} + f:kubernetes.io/bootstrapping: {} + f:rules: {} + manager: kube-apiserver + operation: Update + time: "2024-12-26T23:24:17Z" + name: system:controller:root-ca-cert-publisher + resourceVersion: "135" + uid: d7e901f0-db4a-4927-b768-e8a9e6700a42 + rules: + - apiGroups: + - "" + resources: + - configmaps + verbs: + - create + - update + - apiGroups: + - "" + - events.k8s.io + resources: + - events + verbs: + - create + - patch + - update +- apiVersion: rbac.authorization.k8s.io/v1 + kind: ClusterRole + metadata: + annotations: + rbac.authorization.kubernetes.io/autoupdate: "true" + creationTimestamp: "2024-12-26T23:24:17Z" + labels: + kubernetes.io/bootstrapping: rbac-defaults + managedFields: + - apiVersion: rbac.authorization.k8s.io/v1 + fieldsType: FieldsV1 + fieldsV1: + f:metadata: + f:annotations: + .: {} + f:rbac.authorization.kubernetes.io/autoupdate: {} + f:labels: + .: {} + f:kubernetes.io/bootstrapping: {} + f:rules: {} + manager: kube-apiserver + operation: Update + time: "2024-12-26T23:24:17Z" + name: system:controller:route-controller + resourceVersion: "126" + uid: 92ce6ebc-34cc-4fd7-8c3e-1de9ff0a54dc + rules: + - apiGroups: + - "" + resources: + - nodes + verbs: + - list + - watch + - apiGroups: + - "" + resources: + - nodes/status + verbs: + - patch + - apiGroups: + - "" + - events.k8s.io + resources: + - events + verbs: + - create + - patch + - update +- apiVersion: rbac.authorization.k8s.io/v1 + kind: ClusterRole + metadata: + annotations: + rbac.authorization.kubernetes.io/autoupdate: "true" + creationTimestamp: "2024-12-26T23:24:17Z" + labels: + kubernetes.io/bootstrapping: rbac-defaults + managedFields: + - apiVersion: rbac.authorization.k8s.io/v1 + fieldsType: FieldsV1 + fieldsV1: + f:metadata: + f:annotations: + .: {} + f:rbac.authorization.kubernetes.io/autoupdate: {} + f:labels: + .: {} + f:kubernetes.io/bootstrapping: {} + f:rules: {} + manager: kube-apiserver + operation: Update + time: "2024-12-26T23:24:17Z" + name: system:controller:service-account-controller + resourceVersion: "127" + uid: 2ace56c1-e0e6-4375-b9aa-c29022a6f75b + rules: + - apiGroups: + - "" + resources: + - serviceaccounts + verbs: + - create + - apiGroups: + - "" + - events.k8s.io + resources: + - events + verbs: + - create + - patch + - update +- apiVersion: rbac.authorization.k8s.io/v1 + kind: ClusterRole + metadata: + annotations: + rbac.authorization.kubernetes.io/autoupdate: "true" + creationTimestamp: "2024-12-26T23:24:17Z" + labels: + kubernetes.io/bootstrapping: rbac-defaults + managedFields: + - apiVersion: rbac.authorization.k8s.io/v1 + fieldsType: FieldsV1 + fieldsV1: + f:metadata: + f:annotations: + .: {} + f:rbac.authorization.kubernetes.io/autoupdate: {} + f:labels: + .: {} + f:kubernetes.io/bootstrapping: {} + f:rules: {} + manager: kube-apiserver + operation: Update + time: "2024-12-26T23:24:17Z" + name: system:controller:service-controller + resourceVersion: "128" + uid: f02efeaf-63b2-48cb-ade0-a2973d3950d8 + rules: + - apiGroups: + - "" + resources: + - services + verbs: + - get + - list + - watch + - apiGroups: + - "" + resources: + - services/status + verbs: + - patch + - update + - apiGroups: + - "" + resources: + - nodes + verbs: + - list + - watch + - apiGroups: + - "" + - events.k8s.io + resources: + - events + verbs: + - create + - patch + - update +- apiVersion: rbac.authorization.k8s.io/v1 + kind: ClusterRole + metadata: + annotations: + rbac.authorization.kubernetes.io/autoupdate: "true" + creationTimestamp: "2024-12-26T23:24:17Z" + labels: + kubernetes.io/bootstrapping: rbac-defaults + managedFields: + - apiVersion: rbac.authorization.k8s.io/v1 + fieldsType: FieldsV1 + fieldsV1: + f:metadata: + f:annotations: + .: {} + f:rbac.authorization.kubernetes.io/autoupdate: {} + f:labels: + .: {} + f:kubernetes.io/bootstrapping: {} + f:rules: {} + manager: kube-apiserver + operation: Update + time: "2024-12-26T23:24:17Z" + name: system:controller:statefulset-controller + resourceVersion: "129" + uid: ad867de0-7335-4f55-aaf7-e4e57df937c7 + rules: + - apiGroups: + - "" + resources: + - pods + verbs: + - list + - watch + - apiGroups: + - apps + resources: + - statefulsets + verbs: + - get + - list + - watch + - apiGroups: + - apps + resources: + - statefulsets/status + verbs: + - update + - apiGroups: + - apps + resources: + - statefulsets/finalizers + verbs: + - update + - apiGroups: + - "" + resources: + - pods + verbs: + - create + - delete + - get + - patch + - update + - apiGroups: + - apps + resources: + - controllerrevisions + verbs: + - create + - delete + - get + - list + - patch + - update + - watch + - apiGroups: + - "" + resources: + - persistentvolumeclaims + verbs: + - create + - get + - apiGroups: + - "" + - events.k8s.io + resources: + - events + verbs: + - create + - patch + - update +- apiVersion: rbac.authorization.k8s.io/v1 + kind: ClusterRole + metadata: + annotations: + rbac.authorization.kubernetes.io/autoupdate: "true" + creationTimestamp: "2024-12-26T23:24:17Z" + labels: + kubernetes.io/bootstrapping: rbac-defaults + managedFields: + - apiVersion: rbac.authorization.k8s.io/v1 + fieldsType: FieldsV1 + fieldsV1: + f:metadata: + f:annotations: + .: {} + f:rbac.authorization.kubernetes.io/autoupdate: {} + f:labels: + .: {} + f:kubernetes.io/bootstrapping: {} + f:rules: {} + manager: kube-apiserver + operation: Update + time: "2024-12-26T23:24:17Z" + name: system:controller:ttl-after-finished-controller + resourceVersion: "134" + uid: 5e06dad2-a631-4b41-aee2-bc736b99596b + rules: + - apiGroups: + - batch + resources: + - jobs + verbs: + - delete + - get + - list + - watch + - apiGroups: + - "" + - events.k8s.io + resources: + - events + verbs: + - create + - patch + - update +- apiVersion: rbac.authorization.k8s.io/v1 + kind: ClusterRole + metadata: + annotations: + rbac.authorization.kubernetes.io/autoupdate: "true" + creationTimestamp: "2024-12-26T23:24:17Z" + labels: + kubernetes.io/bootstrapping: rbac-defaults + managedFields: + - apiVersion: rbac.authorization.k8s.io/v1 + fieldsType: FieldsV1 + fieldsV1: + f:metadata: + f:annotations: + .: {} + f:rbac.authorization.kubernetes.io/autoupdate: {} + f:labels: + .: {} + f:kubernetes.io/bootstrapping: {} + f:rules: {} + manager: kube-apiserver + operation: Update + time: "2024-12-26T23:24:17Z" + name: system:controller:ttl-controller + resourceVersion: "130" + uid: 04065ddf-c279-453c-a8df-ddb5a1d12659 + rules: + - apiGroups: + - "" + resources: + - nodes + verbs: + - list + - patch + - update + - watch + - apiGroups: + - "" + - events.k8s.io + resources: + - events + verbs: + - create + - patch + - update +- apiVersion: rbac.authorization.k8s.io/v1 + kind: ClusterRole + metadata: + creationTimestamp: "2024-12-26T23:24:19Z" + managedFields: + - apiVersion: rbac.authorization.k8s.io/v1 + fieldsType: FieldsV1 + fieldsV1: + f:rules: {} + manager: kubeadm + operation: Update + time: "2024-12-26T23:24:19Z" + name: system:coredns + resourceVersion: "232" + uid: 07999b4e-467b-4e13-864a-1937543b91cd + rules: + - apiGroups: + - "" + resources: + - endpoints + - services + - pods + - namespaces + verbs: + - list + - watch + - apiGroups: + - "" + resources: + - nodes + verbs: + - get + - apiGroups: + - discovery.k8s.io + resources: + - endpointslices + verbs: + - list + - watch +- apiVersion: rbac.authorization.k8s.io/v1 + kind: ClusterRole + metadata: + annotations: + rbac.authorization.kubernetes.io/autoupdate: "true" + creationTimestamp: "2024-12-26T23:24:17Z" + labels: + kubernetes.io/bootstrapping: rbac-defaults + managedFields: + - apiVersion: rbac.authorization.k8s.io/v1 + fieldsType: FieldsV1 + fieldsV1: + f:metadata: + f:annotations: + .: {} + f:rbac.authorization.kubernetes.io/autoupdate: {} + f:labels: + .: {} + f:kubernetes.io/bootstrapping: {} + f:rules: {} + manager: kube-apiserver + operation: Update + time: "2024-12-26T23:24:17Z" + name: system:discovery + resourceVersion: "75" + uid: 80ce4c90-fac0-4b85-97e0-225446360c97 + rules: + - nonResourceURLs: + - /api + - /api/* + - /apis + - /apis/* + - /healthz + - /livez + - /openapi + - /openapi/* + - /readyz + - /version + - /version/ + verbs: + - get +- apiVersion: rbac.authorization.k8s.io/v1 + kind: ClusterRole + metadata: + annotations: + rbac.authorization.kubernetes.io/autoupdate: "true" + creationTimestamp: "2024-12-26T23:24:17Z" + labels: + kubernetes.io/bootstrapping: rbac-defaults + managedFields: + - apiVersion: rbac.authorization.k8s.io/v1 + fieldsType: FieldsV1 + fieldsV1: + f:metadata: + f:annotations: + .: {} + f:rbac.authorization.kubernetes.io/autoupdate: {} + f:labels: + .: {} + f:kubernetes.io/bootstrapping: {} + f:rules: {} + manager: kube-apiserver + operation: Update + time: "2024-12-26T23:24:17Z" + name: system:heapster + resourceVersion: "85" + uid: 760a9448-5b6d-4f0f-a4ad-bf631d8f55a1 + rules: + - apiGroups: + - "" + resources: + - events + - namespaces + - nodes + - pods + verbs: + - get + - list + - watch + - apiGroups: + - extensions + resources: + - deployments + verbs: + - get + - list + - watch +- apiVersion: rbac.authorization.k8s.io/v1 + kind: ClusterRole + metadata: + annotations: + rbac.authorization.kubernetes.io/autoupdate: "true" + creationTimestamp: "2024-12-26T23:24:17Z" + labels: + kubernetes.io/bootstrapping: rbac-defaults + managedFields: + - apiVersion: rbac.authorization.k8s.io/v1 + fieldsType: FieldsV1 + fieldsV1: + f:metadata: + f:annotations: + .: {} + f:rbac.authorization.kubernetes.io/autoupdate: {} + f:labels: + .: {} + f:kubernetes.io/bootstrapping: {} + f:rules: {} + manager: kube-apiserver + operation: Update + time: "2024-12-26T23:24:17Z" + name: system:kube-aggregator + resourceVersion: "91" + uid: f5112cbf-366f-48d8-bdcc-21132d8e606c + rules: + - apiGroups: + - "" + resources: + - endpoints + - services + verbs: + - get + - list + - watch +- apiVersion: rbac.authorization.k8s.io/v1 + kind: ClusterRole + metadata: + annotations: + rbac.authorization.kubernetes.io/autoupdate: "true" + creationTimestamp: "2024-12-26T23:24:17Z" + labels: + kubernetes.io/bootstrapping: rbac-defaults + managedFields: + - apiVersion: rbac.authorization.k8s.io/v1 + fieldsType: FieldsV1 + fieldsV1: + f:metadata: + f:annotations: + .: {} + f:rbac.authorization.kubernetes.io/autoupdate: {} + f:labels: + .: {} + f:kubernetes.io/bootstrapping: {} + f:rules: {} + manager: kube-apiserver + operation: Update + time: "2024-12-26T23:24:17Z" + name: system:kube-controller-manager + resourceVersion: "92" + uid: c99c7923-79ac-4781-bb04-64d95bfc4135 + rules: + - apiGroups: + - "" + - events.k8s.io + resources: + - events + verbs: + - create + - patch + - update + - apiGroups: + - coordination.k8s.io + resources: + - leases + verbs: + - create + - apiGroups: + - coordination.k8s.io + resourceNames: + - kube-controller-manager + resources: + - leases + verbs: + - get + - update + - apiGroups: + - "" + resources: + - endpoints + verbs: + - create + - apiGroups: + - "" + resourceNames: + - kube-controller-manager + resources: + - endpoints + verbs: + - get + - update + - apiGroups: + - "" + resources: + - secrets + - serviceaccounts + verbs: + - create + - apiGroups: + - "" + resources: + - secrets + verbs: + - delete + - apiGroups: + - "" + resources: + - configmaps + - namespaces + - secrets + - serviceaccounts + verbs: + - get + - apiGroups: + - "" + resources: + - secrets + - serviceaccounts + verbs: + - update + - apiGroups: + - authentication.k8s.io + resources: + - tokenreviews + verbs: + - create + - apiGroups: + - authorization.k8s.io + resources: + - subjectaccessreviews + verbs: + - create + - apiGroups: + - '*' + resources: + - '*' + verbs: + - list + - watch + - apiGroups: + - "" + resources: + - serviceaccounts/token + verbs: + - create +- apiVersion: rbac.authorization.k8s.io/v1 + kind: ClusterRole + metadata: + annotations: + rbac.authorization.kubernetes.io/autoupdate: "true" + creationTimestamp: "2024-12-26T23:24:17Z" + labels: + kubernetes.io/bootstrapping: rbac-defaults + managedFields: + - apiVersion: rbac.authorization.k8s.io/v1 + fieldsType: FieldsV1 + fieldsV1: + f:metadata: + f:annotations: + .: {} + f:rbac.authorization.kubernetes.io/autoupdate: {} + f:labels: + .: {} + f:kubernetes.io/bootstrapping: {} + f:rules: {} + manager: kube-apiserver + operation: Update + time: "2024-12-26T23:24:17Z" + name: system:kube-dns + resourceVersion: "93" + uid: dc616071-79d9-420c-9188-383b304762e3 + rules: + - apiGroups: + - "" + resources: + - endpoints + - services + verbs: + - list + - watch +- apiVersion: rbac.authorization.k8s.io/v1 + kind: ClusterRole + metadata: + annotations: + rbac.authorization.kubernetes.io/autoupdate: "true" + creationTimestamp: "2024-12-26T23:24:17Z" + labels: + kubernetes.io/bootstrapping: rbac-defaults + managedFields: + - apiVersion: rbac.authorization.k8s.io/v1 + fieldsType: FieldsV1 + fieldsV1: + f:metadata: + f:annotations: + .: {} + f:rbac.authorization.kubernetes.io/autoupdate: {} + f:labels: + .: {} + f:kubernetes.io/bootstrapping: {} + f:rules: {} + manager: kube-apiserver + operation: Update + time: "2024-12-26T23:24:17Z" + name: system:kube-scheduler + resourceVersion: "104" + uid: 5b5b54b5-8b31-47cb-ae32-8cf1af57047a + rules: + - apiGroups: + - "" + - events.k8s.io + resources: + - events + verbs: + - create + - patch + - update + - apiGroups: + - coordination.k8s.io + resources: + - leases + verbs: + - create + - apiGroups: + - coordination.k8s.io + resourceNames: + - kube-scheduler + resources: + - leases + verbs: + - get + - update + - apiGroups: + - "" + resources: + - endpoints + verbs: + - create + - apiGroups: + - "" + resourceNames: + - kube-scheduler + resources: + - endpoints + verbs: + - get + - update + - apiGroups: + - "" + resources: + - nodes + verbs: + - get + - list + - watch + - apiGroups: + - "" + resources: + - pods + verbs: + - delete + - get + - list + - watch + - apiGroups: + - "" + resources: + - bindings + - pods/binding + verbs: + - create + - apiGroups: + - "" + resources: + - pods/status + verbs: + - patch + - update + - apiGroups: + - "" + resources: + - replicationcontrollers + - services + verbs: + - get + - list + - watch + - apiGroups: + - apps + - extensions + resources: + - replicasets + verbs: + - get + - list + - watch + - apiGroups: + - apps + resources: + - statefulsets + verbs: + - get + - list + - watch + - apiGroups: + - policy + resources: + - poddisruptionbudgets + verbs: + - get + - list + - watch + - apiGroups: + - "" + resources: + - persistentvolumeclaims + - persistentvolumes + verbs: + - get + - list + - watch + - apiGroups: + - authentication.k8s.io + resources: + - tokenreviews + verbs: + - create + - apiGroups: + - authorization.k8s.io + resources: + - subjectaccessreviews + verbs: + - create + - apiGroups: + - storage.k8s.io + resources: + - csinodes + verbs: + - get + - list + - watch + - apiGroups: + - "" + resources: + - namespaces + verbs: + - get + - list + - watch + - apiGroups: + - storage.k8s.io + resources: + - csidrivers + verbs: + - get + - list + - watch + - apiGroups: + - storage.k8s.io + resources: + - csistoragecapacities + verbs: + - get + - list + - watch +- apiVersion: rbac.authorization.k8s.io/v1 + kind: ClusterRole + metadata: + annotations: + rbac.authorization.kubernetes.io/autoupdate: "true" + creationTimestamp: "2024-12-26T23:24:17Z" + labels: + kubernetes.io/bootstrapping: rbac-defaults + managedFields: + - apiVersion: rbac.authorization.k8s.io/v1 + fieldsType: FieldsV1 + fieldsV1: + f:metadata: + f:annotations: + .: {} + f:rbac.authorization.kubernetes.io/autoupdate: {} + f:labels: + .: {} + f:kubernetes.io/bootstrapping: {} + f:rules: {} + manager: kube-apiserver + operation: Update + time: "2024-12-26T23:24:17Z" + name: system:kubelet-api-admin + resourceVersion: "88" + uid: 4041bc94-5481-437c-93a7-690a355ac3fb + rules: + - apiGroups: + - "" + resources: + - nodes + verbs: + - get + - list + - watch + - apiGroups: + - "" + resources: + - nodes + verbs: + - proxy + - apiGroups: + - "" + resources: + - nodes/log + - nodes/metrics + - nodes/proxy + - nodes/spec + - nodes/stats + verbs: + - '*' +- apiVersion: rbac.authorization.k8s.io/v1 + kind: ClusterRole + metadata: + annotations: + kubectl.kubernetes.io/last-applied-configuration: | + {"apiVersion":"rbac.authorization.k8s.io/v1","kind":"ClusterRole","metadata":{"annotations":{},"labels":{"addonmanager.kubernetes.io/mode":"Reconcile","k8s-app":"metrics-server"},"name":"system:metrics-server"},"rules":[{"apiGroups":[""],"resources":["nodes/metrics"],"verbs":["get"]},{"apiGroups":[""],"resources":["pods","nodes"],"verbs":["get","list","watch"]}]} + creationTimestamp: "2024-12-26T23:26:51Z" + labels: + addonmanager.kubernetes.io/mode: Reconcile + k8s-app: metrics-server + managedFields: + - apiVersion: rbac.authorization.k8s.io/v1 + fieldsType: FieldsV1 + fieldsV1: + f:metadata: + f:annotations: + .: {} + f:kubectl.kubernetes.io/last-applied-configuration: {} + f:labels: + .: {} + f:addonmanager.kubernetes.io/mode: {} + f:k8s-app: {} + f:rules: {} + manager: kubectl-client-side-apply + operation: Update + time: "2024-12-26T23:26:51Z" + name: system:metrics-server + resourceVersion: "658" + uid: 94005afd-7f12-47f8-9362-41a297c189ed + rules: + - apiGroups: + - "" + resources: + - nodes/metrics + verbs: + - get + - apiGroups: + - "" + resources: + - pods + - nodes + verbs: + - get + - list + - watch +- apiVersion: rbac.authorization.k8s.io/v1 + kind: ClusterRole + metadata: + annotations: + rbac.authorization.kubernetes.io/autoupdate: "true" + creationTimestamp: "2024-12-26T23:24:17Z" + labels: + kubernetes.io/bootstrapping: rbac-defaults + managedFields: + - apiVersion: rbac.authorization.k8s.io/v1 + fieldsType: FieldsV1 + fieldsV1: + f:metadata: + f:annotations: + .: {} + f:rbac.authorization.kubernetes.io/autoupdate: {} + f:labels: + .: {} + f:kubernetes.io/bootstrapping: {} + f:rules: {} + manager: kube-apiserver + operation: Update + time: "2024-12-26T23:24:17Z" + name: system:monitoring + resourceVersion: "76" + uid: 9633b874-28bb-479d-8b97-aab2ddca7f81 + rules: + - nonResourceURLs: + - /healthz + - /healthz/* + - /livez + - /livez/* + - /metrics + - /metrics/slis + - /readyz + - /readyz/* + verbs: + - get +- apiVersion: rbac.authorization.k8s.io/v1 + kind: ClusterRole + metadata: + annotations: + rbac.authorization.kubernetes.io/autoupdate: "true" + creationTimestamp: "2024-12-26T23:24:17Z" + labels: + kubernetes.io/bootstrapping: rbac-defaults + managedFields: + - apiVersion: rbac.authorization.k8s.io/v1 + fieldsType: FieldsV1 + fieldsV1: + f:metadata: + f:annotations: + .: {} + f:rbac.authorization.kubernetes.io/autoupdate: {} + f:labels: + .: {} + f:kubernetes.io/bootstrapping: {} + f:rules: {} + manager: kube-apiserver + operation: Update + time: "2024-12-26T23:24:17Z" + name: system:node + resourceVersion: "86" + uid: 418885cd-99aa-4795-b2e5-318936a7f4f9 + rules: + - apiGroups: + - authentication.k8s.io + resources: + - tokenreviews + verbs: + - create + - apiGroups: + - authorization.k8s.io + resources: + - localsubjectaccessreviews + - subjectaccessreviews + verbs: + - create + - apiGroups: + - "" + resources: + - services + verbs: + - get + - list + - watch + - apiGroups: + - "" + resources: + - nodes + verbs: + - create + - get + - list + - watch + - apiGroups: + - "" + resources: + - nodes/status + verbs: + - patch + - update + - apiGroups: + - "" + resources: + - nodes + verbs: + - patch + - update + - apiGroups: + - "" + resources: + - events + verbs: + - create + - patch + - update + - apiGroups: + - "" + resources: + - pods + verbs: + - get + - list + - watch + - apiGroups: + - "" + resources: + - pods + verbs: + - create + - delete + - apiGroups: + - "" + resources: + - pods/status + verbs: + - patch + - update + - apiGroups: + - "" + resources: + - pods/eviction + verbs: + - create + - apiGroups: + - "" + resources: + - configmaps + - secrets + verbs: + - get + - list + - watch + - apiGroups: + - "" + resources: + - persistentvolumeclaims + - persistentvolumes + verbs: + - get + - apiGroups: + - "" + resources: + - endpoints + verbs: + - get + - apiGroups: + - certificates.k8s.io + resources: + - certificatesigningrequests + verbs: + - create + - get + - list + - watch + - apiGroups: + - coordination.k8s.io + resources: + - leases + verbs: + - create + - delete + - get + - patch + - update + - apiGroups: + - storage.k8s.io + resources: + - volumeattachments + verbs: + - get + - apiGroups: + - "" + resources: + - serviceaccounts/token + verbs: + - create + - apiGroups: + - "" + resources: + - persistentvolumeclaims/status + verbs: + - get + - patch + - update + - apiGroups: + - storage.k8s.io + resources: + - csidrivers + verbs: + - get + - list + - watch + - apiGroups: + - storage.k8s.io + resources: + - csinodes + verbs: + - create + - delete + - get + - patch + - update + - apiGroups: + - node.k8s.io + resources: + - runtimeclasses + verbs: + - get + - list + - watch +- apiVersion: rbac.authorization.k8s.io/v1 + kind: ClusterRole + metadata: + annotations: + rbac.authorization.kubernetes.io/autoupdate: "true" + creationTimestamp: "2024-12-26T23:24:17Z" + labels: + kubernetes.io/bootstrapping: rbac-defaults + managedFields: + - apiVersion: rbac.authorization.k8s.io/v1 + fieldsType: FieldsV1 + fieldsV1: + f:metadata: + f:annotations: + .: {} + f:rbac.authorization.kubernetes.io/autoupdate: {} + f:labels: + .: {} + f:kubernetes.io/bootstrapping: {} + f:rules: {} + manager: kube-apiserver + operation: Update + time: "2024-12-26T23:24:17Z" + name: system:node-bootstrapper + resourceVersion: "89" + uid: bace5b4d-e645-48a9-984d-7d7faf4a0a5e + rules: + - apiGroups: + - certificates.k8s.io + resources: + - certificatesigningrequests + verbs: + - create + - get + - list + - watch +- apiVersion: rbac.authorization.k8s.io/v1 + kind: ClusterRole + metadata: + annotations: + rbac.authorization.kubernetes.io/autoupdate: "true" + creationTimestamp: "2024-12-26T23:24:17Z" + labels: + kubernetes.io/bootstrapping: rbac-defaults + managedFields: + - apiVersion: rbac.authorization.k8s.io/v1 + fieldsType: FieldsV1 + fieldsV1: + f:metadata: + f:annotations: + .: {} + f:rbac.authorization.kubernetes.io/autoupdate: {} + f:labels: + .: {} + f:kubernetes.io/bootstrapping: {} + f:rules: {} + manager: kube-apiserver + operation: Update + time: "2024-12-26T23:24:17Z" + name: system:node-problem-detector + resourceVersion: "87" + uid: ef781454-1fb8-4e59-a82b-17ff00afa2ba + rules: + - apiGroups: + - "" + resources: + - nodes + verbs: + - get + - apiGroups: + - "" + resources: + - nodes/status + verbs: + - patch + - apiGroups: + - "" + - events.k8s.io + resources: + - events + verbs: + - create + - patch + - update +- apiVersion: rbac.authorization.k8s.io/v1 + kind: ClusterRole + metadata: + annotations: + rbac.authorization.kubernetes.io/autoupdate: "true" + creationTimestamp: "2024-12-26T23:24:17Z" + labels: + kubernetes.io/bootstrapping: rbac-defaults + managedFields: + - apiVersion: rbac.authorization.k8s.io/v1 + fieldsType: FieldsV1 + fieldsV1: + f:metadata: + f:annotations: + .: {} + f:rbac.authorization.kubernetes.io/autoupdate: {} + f:labels: + .: {} + f:kubernetes.io/bootstrapping: {} + f:rules: {} + manager: kube-apiserver + operation: Update + time: "2024-12-26T23:24:17Z" + name: system:node-proxier + resourceVersion: "103" + uid: b0b866d3-99c2-4359-bcda-0e4ac0288859 + rules: + - apiGroups: + - "" + resources: + - endpoints + - services + verbs: + - list + - watch + - apiGroups: + - "" + resources: + - nodes + verbs: + - get + - list + - watch + - apiGroups: + - "" + - events.k8s.io + resources: + - events + verbs: + - create + - patch + - update + - apiGroups: + - discovery.k8s.io + resources: + - endpointslices + verbs: + - list + - watch +- apiVersion: rbac.authorization.k8s.io/v1 + kind: ClusterRole + metadata: + annotations: + rbac.authorization.kubernetes.io/autoupdate: "true" + creationTimestamp: "2024-12-26T23:24:17Z" + labels: + kubernetes.io/bootstrapping: rbac-defaults + managedFields: + - apiVersion: rbac.authorization.k8s.io/v1 + fieldsType: FieldsV1 + fieldsV1: + f:metadata: + f:annotations: + .: {} + f:rbac.authorization.kubernetes.io/autoupdate: {} + f:labels: + .: {} + f:kubernetes.io/bootstrapping: {} + f:rules: {} + manager: kube-apiserver + operation: Update + time: "2024-12-26T23:24:17Z" + name: system:persistent-volume-provisioner + resourceVersion: "94" + uid: 5719fe56-c572-41ee-83be-15cce814cb2e + rules: + - apiGroups: + - "" + resources: + - persistentvolumes + verbs: + - create + - delete + - get + - list + - watch + - apiGroups: + - "" + resources: + - persistentvolumeclaims + verbs: + - get + - list + - update + - watch + - apiGroups: + - storage.k8s.io + resources: + - storageclasses + verbs: + - get + - list + - watch + - apiGroups: + - "" + resources: + - events + verbs: + - watch + - apiGroups: + - "" + - events.k8s.io + resources: + - events + verbs: + - create + - patch + - update +- apiVersion: rbac.authorization.k8s.io/v1 + kind: ClusterRole + metadata: + annotations: + rbac.authorization.kubernetes.io/autoupdate: "true" + creationTimestamp: "2024-12-26T23:24:17Z" + labels: + kubernetes.io/bootstrapping: rbac-defaults + managedFields: + - apiVersion: rbac.authorization.k8s.io/v1 + fieldsType: FieldsV1 + fieldsV1: + f:metadata: + f:annotations: + .: {} + f:rbac.authorization.kubernetes.io/autoupdate: {} + f:labels: + .: {} + f:kubernetes.io/bootstrapping: {} + f:rules: {} + manager: kube-apiserver + operation: Update + time: "2024-12-26T23:24:17Z" + name: system:public-info-viewer + resourceVersion: "78" + uid: c0b7857d-9489-4639-9aeb-47a44038a92d + rules: + - nonResourceURLs: + - /healthz + - /livez + - /readyz + - /version + - /version/ + verbs: + - get +- apiVersion: rbac.authorization.k8s.io/v1 + kind: ClusterRole + metadata: + annotations: + rbac.authorization.kubernetes.io/autoupdate: "true" + creationTimestamp: "2024-12-26T23:24:17Z" + labels: + kubernetes.io/bootstrapping: rbac-defaults + managedFields: + - apiVersion: rbac.authorization.k8s.io/v1 + fieldsType: FieldsV1 + fieldsV1: + f:metadata: + f:annotations: + .: {} + f:rbac.authorization.kubernetes.io/autoupdate: {} + f:labels: + .: {} + f:kubernetes.io/bootstrapping: {} + f:rules: {} + manager: kube-apiserver + operation: Update + time: "2024-12-26T23:24:17Z" + name: system:service-account-issuer-discovery + resourceVersion: "102" + uid: cc7d0b1f-b2df-4275-abed-caa3bd1edd23 + rules: + - nonResourceURLs: + - /.well-known/openid-configuration + - /openid/v1/jwks + verbs: + - get +- apiVersion: rbac.authorization.k8s.io/v1 + kind: ClusterRole + metadata: + annotations: + rbac.authorization.kubernetes.io/autoupdate: "true" + creationTimestamp: "2024-12-26T23:24:17Z" + labels: + kubernetes.io/bootstrapping: rbac-defaults + managedFields: + - apiVersion: rbac.authorization.k8s.io/v1 + fieldsType: FieldsV1 + fieldsV1: + f:metadata: + f:annotations: + .: {} + f:rbac.authorization.kubernetes.io/autoupdate: {} + f:labels: + .: {} + f:kubernetes.io/bootstrapping: {} + f:rules: {} + manager: kube-apiserver + operation: Update + time: "2024-12-26T23:24:17Z" + name: system:volume-scheduler + resourceVersion: "97" + uid: bfd5ce84-1c1f-4105-b252-260b0ee8c458 + rules: + - apiGroups: + - "" + resources: + - persistentvolumes + verbs: + - get + - list + - patch + - update + - watch + - apiGroups: + - storage.k8s.io + resources: + - storageclasses + verbs: + - get + - list + - watch + - apiGroups: + - "" + resources: + - persistentvolumeclaims + verbs: + - get + - list + - patch + - update + - watch +- aggregationRule: + clusterRoleSelectors: + - matchLabels: + rbac.authorization.k8s.io/aggregate-to-view: "true" + apiVersion: rbac.authorization.k8s.io/v1 + kind: ClusterRole + metadata: + annotations: + rbac.authorization.kubernetes.io/autoupdate: "true" + creationTimestamp: "2024-12-26T23:24:17Z" + labels: + kubernetes.io/bootstrapping: rbac-defaults + rbac.authorization.k8s.io/aggregate-to-edit: "true" + managedFields: + - apiVersion: rbac.authorization.k8s.io/v1 + fieldsType: FieldsV1 + fieldsV1: + f:rules: {} + manager: clusterrole-aggregation-controller + operation: Apply + time: "2024-12-26T23:26:51Z" + - apiVersion: rbac.authorization.k8s.io/v1 + fieldsType: FieldsV1 + fieldsV1: + f:aggregationRule: + .: {} + f:clusterRoleSelectors: {} + f:metadata: + f:annotations: + .: {} + f:rbac.authorization.kubernetes.io/autoupdate: {} + f:labels: + .: {} + f:kubernetes.io/bootstrapping: {} + f:rbac.authorization.k8s.io/aggregate-to-edit: {} + manager: kube-apiserver + operation: Update + time: "2024-12-26T23:24:17Z" + name: view + resourceVersion: "651" + uid: 1441dbdb-3628-4605-acf1-080a48914ec7 + rules: + - apiGroups: + - "" + resources: + - configmaps + - endpoints + - persistentvolumeclaims + - persistentvolumeclaims/status + - pods + - replicationcontrollers + - replicationcontrollers/scale + - serviceaccounts + - services + - services/status + verbs: + - get + - list + - watch + - apiGroups: + - "" + resources: + - bindings + - events + - limitranges + - namespaces/status + - pods/log + - pods/status + - replicationcontrollers/status + - resourcequotas + - resourcequotas/status + verbs: + - get + - list + - watch + - apiGroups: + - "" + resources: + - namespaces + verbs: + - get + - list + - watch + - apiGroups: + - discovery.k8s.io + resources: + - endpointslices + verbs: + - get + - list + - watch + - apiGroups: + - apps + resources: + - controllerrevisions + - daemonsets + - daemonsets/status + - deployments + - deployments/scale + - deployments/status + - replicasets + - replicasets/scale + - replicasets/status + - statefulsets + - statefulsets/scale + - statefulsets/status + verbs: + - get + - list + - watch + - apiGroups: + - autoscaling + resources: + - horizontalpodautoscalers + - horizontalpodautoscalers/status + verbs: + - get + - list + - watch + - apiGroups: + - batch + resources: + - cronjobs + - cronjobs/status + - jobs + - jobs/status + verbs: + - get + - list + - watch + - apiGroups: + - extensions + resources: + - daemonsets + - daemonsets/status + - deployments + - deployments/scale + - deployments/status + - ingresses + - ingresses/status + - networkpolicies + - replicasets + - replicasets/scale + - replicasets/status + - replicationcontrollers/scale + verbs: + - get + - list + - watch + - apiGroups: + - policy + resources: + - poddisruptionbudgets + - poddisruptionbudgets/status + verbs: + - get + - list + - watch + - apiGroups: + - networking.k8s.io + resources: + - ingresses + - ingresses/status + - networkpolicies + verbs: + - get + - list + - watch + - apiGroups: + - metrics.k8s.io + resources: + - pods + - nodes + verbs: + - get + - list + - watch +- apiVersion: rbac.authorization.k8s.io/v1 + kind: ClusterRoleBinding + metadata: + annotations: + rbac.authorization.kubernetes.io/autoupdate: "true" + creationTimestamp: "2024-12-26T23:24:17Z" + labels: + kubernetes.io/bootstrapping: rbac-defaults + managedFields: + - apiVersion: rbac.authorization.k8s.io/v1 + fieldsType: FieldsV1 + fieldsV1: + f:metadata: + f:annotations: + .: {} + f:rbac.authorization.kubernetes.io/autoupdate: {} + f:labels: + .: {} + f:kubernetes.io/bootstrapping: {} + f:roleRef: {} + f:subjects: {} + manager: kube-apiserver + operation: Update + time: "2024-12-26T23:24:17Z" + name: cluster-admin + resourceVersion: "136" + uid: 443d7934-f593-418c-ad82-fb1dc78bd90c + roleRef: + apiGroup: rbac.authorization.k8s.io + kind: ClusterRole + name: cluster-admin + subjects: + - apiGroup: rbac.authorization.k8s.io + kind: Group + name: system:masters +- apiVersion: rbac.authorization.k8s.io/v1 + kind: ClusterRoleBinding + metadata: + annotations: + kubectl.kubernetes.io/last-applied-configuration: | + {"apiVersion":"rbac.authorization.k8s.io/v1","kind":"ClusterRoleBinding","metadata":{"annotations":{},"labels":{"app.kubernetes.io/instance":"ingress-nginx","app.kubernetes.io/name":"ingress-nginx"},"name":"ingress-nginx"},"roleRef":{"apiGroup":"rbac.authorization.k8s.io","kind":"ClusterRole","name":"ingress-nginx"},"subjects":[{"kind":"ServiceAccount","name":"ingress-nginx","namespace":"ingress-nginx"}]} + creationTimestamp: "2024-12-26T23:25:47Z" + labels: + app.kubernetes.io/instance: ingress-nginx + app.kubernetes.io/name: ingress-nginx + managedFields: + - apiVersion: rbac.authorization.k8s.io/v1 + fieldsType: FieldsV1 + fieldsV1: + f:metadata: + f:annotations: + .: {} + f:kubectl.kubernetes.io/last-applied-configuration: {} + f:labels: + .: {} + f:app.kubernetes.io/instance: {} + f:app.kubernetes.io/name: {} + f:roleRef: {} + f:subjects: {} + manager: kubectl-client-side-apply + operation: Update + time: "2024-12-26T23:25:47Z" + name: ingress-nginx + resourceVersion: "498" + uid: 877c7a45-04e4-4021-b49b-8328f3a7a9ba + roleRef: + apiGroup: rbac.authorization.k8s.io + kind: ClusterRole + name: ingress-nginx + subjects: + - kind: ServiceAccount + name: ingress-nginx + namespace: ingress-nginx +- apiVersion: rbac.authorization.k8s.io/v1 + kind: ClusterRoleBinding + metadata: + annotations: + kubectl.kubernetes.io/last-applied-configuration: | + {"apiVersion":"rbac.authorization.k8s.io/v1","kind":"ClusterRoleBinding","metadata":{"annotations":{},"labels":{"app.kubernetes.io/component":"admission-webhook","app.kubernetes.io/instance":"ingress-nginx","app.kubernetes.io/name":"ingress-nginx"},"name":"ingress-nginx-admission"},"roleRef":{"apiGroup":"rbac.authorization.k8s.io","kind":"ClusterRole","name":"ingress-nginx-admission"},"subjects":[{"kind":"ServiceAccount","name":"ingress-nginx-admission","namespace":"ingress-nginx"}]} + creationTimestamp: "2024-12-26T23:25:47Z" + labels: + app.kubernetes.io/component: admission-webhook + app.kubernetes.io/instance: ingress-nginx + app.kubernetes.io/name: ingress-nginx + managedFields: + - apiVersion: rbac.authorization.k8s.io/v1 + fieldsType: FieldsV1 + fieldsV1: + f:metadata: + f:annotations: + .: {} + f:kubectl.kubernetes.io/last-applied-configuration: {} + f:labels: + .: {} + f:app.kubernetes.io/component: {} + f:app.kubernetes.io/instance: {} + f:app.kubernetes.io/name: {} + f:roleRef: {} + f:subjects: {} + manager: kubectl-client-side-apply + operation: Update + time: "2024-12-26T23:25:47Z" + name: ingress-nginx-admission + resourceVersion: "499" + uid: 351f045d-f682-4018-be48-9b9790d83e26 + roleRef: + apiGroup: rbac.authorization.k8s.io + kind: ClusterRole + name: ingress-nginx-admission + subjects: + - kind: ServiceAccount + name: ingress-nginx-admission + namespace: ingress-nginx +- apiVersion: rbac.authorization.k8s.io/v1 + kind: ClusterRoleBinding + metadata: + creationTimestamp: "2024-12-26T23:24:19Z" + managedFields: + - apiVersion: rbac.authorization.k8s.io/v1 + fieldsType: FieldsV1 + fieldsV1: + f:roleRef: {} + f:subjects: {} + manager: kubeadm + operation: Update + time: "2024-12-26T23:24:19Z" + name: kubeadm:get-nodes + resourceVersion: "224" + uid: d4f83581-36bd-4ed7-a748-105f8c61b514 + roleRef: + apiGroup: rbac.authorization.k8s.io + kind: ClusterRole + name: kubeadm:get-nodes + subjects: + - apiGroup: rbac.authorization.k8s.io + kind: Group + name: system:bootstrappers:kubeadm:default-node-token +- apiVersion: rbac.authorization.k8s.io/v1 + kind: ClusterRoleBinding + metadata: + creationTimestamp: "2024-12-26T23:24:19Z" + managedFields: + - apiVersion: rbac.authorization.k8s.io/v1 + fieldsType: FieldsV1 + fieldsV1: + f:roleRef: {} + f:subjects: {} + manager: kubeadm + operation: Update + time: "2024-12-26T23:24:19Z" + name: kubeadm:kubelet-bootstrap + resourceVersion: "225" + uid: d6398f27-d179-41a0-871c-0659be6960cc + roleRef: + apiGroup: rbac.authorization.k8s.io + kind: ClusterRole + name: system:node-bootstrapper + subjects: + - apiGroup: rbac.authorization.k8s.io + kind: Group + name: system:bootstrappers:kubeadm:default-node-token +- apiVersion: rbac.authorization.k8s.io/v1 + kind: ClusterRoleBinding + metadata: + creationTimestamp: "2024-12-26T23:24:19Z" + managedFields: + - apiVersion: rbac.authorization.k8s.io/v1 + fieldsType: FieldsV1 + fieldsV1: + f:roleRef: {} + f:subjects: {} + manager: kubeadm + operation: Update + time: "2024-12-26T23:24:19Z" + name: kubeadm:node-autoapprove-bootstrap + resourceVersion: "226" + uid: d2db21f2-f49a-4e10-85f5-55d25418ea04 + roleRef: + apiGroup: rbac.authorization.k8s.io + kind: ClusterRole + name: system:certificates.k8s.io:certificatesigningrequests:nodeclient + subjects: + - apiGroup: rbac.authorization.k8s.io + kind: Group + name: system:bootstrappers:kubeadm:default-node-token +- apiVersion: rbac.authorization.k8s.io/v1 + kind: ClusterRoleBinding + metadata: + creationTimestamp: "2024-12-26T23:24:19Z" + managedFields: + - apiVersion: rbac.authorization.k8s.io/v1 + fieldsType: FieldsV1 + fieldsV1: + f:roleRef: {} + f:subjects: {} + manager: kubeadm + operation: Update + time: "2024-12-26T23:24:19Z" + name: kubeadm:node-autoapprove-certificate-rotation + resourceVersion: "227" + uid: 83b14bae-dc30-45b7-aae9-b507d86974eb + roleRef: + apiGroup: rbac.authorization.k8s.io + kind: ClusterRole + name: system:certificates.k8s.io:certificatesigningrequests:selfnodeclient + subjects: + - apiGroup: rbac.authorization.k8s.io + kind: Group + name: system:nodes +- apiVersion: rbac.authorization.k8s.io/v1 + kind: ClusterRoleBinding + metadata: + creationTimestamp: "2024-12-26T23:24:19Z" + managedFields: + - apiVersion: rbac.authorization.k8s.io/v1 + fieldsType: FieldsV1 + fieldsV1: + f:roleRef: {} + f:subjects: {} + manager: kubeadm + operation: Update + time: "2024-12-26T23:24:19Z" + name: kubeadm:node-proxier + resourceVersion: "241" + uid: 752d09df-39e9-4583-9987-d36a7db7b88a + roleRef: + apiGroup: rbac.authorization.k8s.io + kind: ClusterRole + name: system:node-proxier + subjects: + - kind: ServiceAccount + name: kube-proxy + namespace: kube-system +- apiVersion: rbac.authorization.k8s.io/v1 + kind: ClusterRoleBinding + metadata: + annotations: + kubectl.kubernetes.io/last-applied-configuration: | + {"apiVersion":"rbac.authorization.k8s.io/v1","kind":"ClusterRoleBinding","metadata":{"annotations":{},"labels":{"addonmanager.kubernetes.io/mode":"Reconcile","k8s-app":"kubernetes-dashboard","kubernetes.io/minikube-addons":"dashboard"},"name":"kubernetes-dashboard"},"roleRef":{"apiGroup":"rbac.authorization.k8s.io","kind":"ClusterRole","name":"cluster-admin"},"subjects":[{"kind":"ServiceAccount","name":"kubernetes-dashboard","namespace":"kubernetes-dashboard"}]} + creationTimestamp: "2024-12-26T23:24:31Z" + labels: + addonmanager.kubernetes.io/mode: Reconcile + k8s-app: kubernetes-dashboard + kubernetes.io/minikube-addons: dashboard + managedFields: + - apiVersion: rbac.authorization.k8s.io/v1 + fieldsType: FieldsV1 + fieldsV1: + f:metadata: + f:annotations: + .: {} + f:kubectl.kubernetes.io/last-applied-configuration: {} + f:labels: + .: {} + f:addonmanager.kubernetes.io/mode: {} + f:k8s-app: {} + f:kubernetes.io/minikube-addons: {} + f:roleRef: {} + f:subjects: {} + manager: kubectl-client-side-apply + operation: Update + time: "2024-12-26T23:24:31Z" + name: kubernetes-dashboard + resourceVersion: "334" + uid: 6db145b1-acf7-4dd3-ae95-13f317e947d5 + roleRef: + apiGroup: rbac.authorization.k8s.io + kind: ClusterRole + name: cluster-admin + subjects: + - kind: ServiceAccount + name: kubernetes-dashboard + namespace: kubernetes-dashboard +- apiVersion: rbac.authorization.k8s.io/v1 + kind: ClusterRoleBinding + metadata: + annotations: + kubectl.kubernetes.io/last-applied-configuration: | + {"apiVersion":"rbac.authorization.k8s.io/v1","kind":"ClusterRoleBinding","metadata":{"annotations":{},"labels":{"addonmanager.kubernetes.io/mode":"Reconcile","k8s-app":"metrics-server"},"name":"metrics-server:system:auth-delegator"},"roleRef":{"apiGroup":"rbac.authorization.k8s.io","kind":"ClusterRole","name":"system:auth-delegator"},"subjects":[{"kind":"ServiceAccount","name":"metrics-server","namespace":"kube-system"}]} + creationTimestamp: "2024-12-26T23:26:51Z" + labels: + addonmanager.kubernetes.io/mode: Reconcile + k8s-app: metrics-server + managedFields: + - apiVersion: rbac.authorization.k8s.io/v1 + fieldsType: FieldsV1 + fieldsV1: + f:metadata: + f:annotations: + .: {} + f:kubectl.kubernetes.io/last-applied-configuration: {} + f:labels: + .: {} + f:addonmanager.kubernetes.io/mode: {} + f:k8s-app: {} + f:roleRef: {} + f:subjects: {} + manager: kubectl-client-side-apply + operation: Update + time: "2024-12-26T23:26:51Z" + name: metrics-server:system:auth-delegator + resourceVersion: "656" + uid: d170f566-7455-4187-9b7b-206351e9c589 + roleRef: + apiGroup: rbac.authorization.k8s.io + kind: ClusterRole + name: system:auth-delegator + subjects: + - kind: ServiceAccount + name: metrics-server + namespace: kube-system +- apiVersion: rbac.authorization.k8s.io/v1 + kind: ClusterRoleBinding + metadata: + creationTimestamp: "2024-12-26T23:24:19Z" + managedFields: + - apiVersion: rbac.authorization.k8s.io/v1 + fieldsType: FieldsV1 + fieldsV1: + f:roleRef: {} + f:subjects: {} + manager: kubectl-create + operation: Update + time: "2024-12-26T23:24:19Z" + name: minikube-rbac + resourceVersion: "251" + uid: 292de0d4-211d-40cf-bec5-be5473d269ad + roleRef: + apiGroup: rbac.authorization.k8s.io + kind: ClusterRole + name: cluster-admin + subjects: + - kind: ServiceAccount + name: default + namespace: kube-system +- apiVersion: rbac.authorization.k8s.io/v1 + kind: ClusterRoleBinding + metadata: + annotations: + kubectl.kubernetes.io/last-applied-configuration: | + {"apiVersion":"rbac.authorization.k8s.io/v1","kind":"ClusterRoleBinding","metadata":{"annotations":{},"labels":{"addonmanager.kubernetes.io/mode":"EnsureExists"},"name":"storage-provisioner"},"roleRef":{"apiGroup":"rbac.authorization.k8s.io","kind":"ClusterRole","name":"system:persistent-volume-provisioner"},"subjects":[{"kind":"ServiceAccount","name":"storage-provisioner","namespace":"kube-system"}]} + creationTimestamp: "2024-12-26T23:24:21Z" + labels: + addonmanager.kubernetes.io/mode: EnsureExists + managedFields: + - apiVersion: rbac.authorization.k8s.io/v1 + fieldsType: FieldsV1 + fieldsV1: + f:metadata: + f:annotations: + .: {} + f:kubectl.kubernetes.io/last-applied-configuration: {} + f:labels: + .: {} + f:addonmanager.kubernetes.io/mode: {} + f:roleRef: {} + f:subjects: {} + manager: kubectl-client-side-apply + operation: Update + time: "2024-12-26T23:24:21Z" + name: storage-provisioner + resourceVersion: "259" + uid: 6ae5d76b-7f74-4aac-976e-8d7dc77b2815 + roleRef: + apiGroup: rbac.authorization.k8s.io + kind: ClusterRole + name: system:persistent-volume-provisioner + subjects: + - kind: ServiceAccount + name: storage-provisioner + namespace: kube-system +- apiVersion: rbac.authorization.k8s.io/v1 + kind: ClusterRoleBinding + metadata: + annotations: + rbac.authorization.kubernetes.io/autoupdate: "true" + creationTimestamp: "2024-12-26T23:24:17Z" + labels: + kubernetes.io/bootstrapping: rbac-defaults + managedFields: + - apiVersion: rbac.authorization.k8s.io/v1 + fieldsType: FieldsV1 + fieldsV1: + f:metadata: + f:annotations: + .: {} + f:rbac.authorization.kubernetes.io/autoupdate: {} + f:labels: + .: {} + f:kubernetes.io/bootstrapping: {} + f:roleRef: {} + f:subjects: {} + manager: kube-apiserver + operation: Update + time: "2024-12-26T23:24:17Z" + name: system:basic-user + resourceVersion: "139" + uid: 756c3410-40b8-44bb-a2bc-35620ef78f5b + roleRef: + apiGroup: rbac.authorization.k8s.io + kind: ClusterRole + name: system:basic-user + subjects: + - apiGroup: rbac.authorization.k8s.io + kind: Group + name: system:authenticated +- apiVersion: rbac.authorization.k8s.io/v1 + kind: ClusterRoleBinding + metadata: + annotations: + rbac.authorization.kubernetes.io/autoupdate: "true" + creationTimestamp: "2024-12-26T23:24:17Z" + labels: + kubernetes.io/bootstrapping: rbac-defaults + managedFields: + - apiVersion: rbac.authorization.k8s.io/v1 + fieldsType: FieldsV1 + fieldsV1: + f:metadata: + f:annotations: + .: {} + f:rbac.authorization.kubernetes.io/autoupdate: {} + f:labels: + .: {} + f:kubernetes.io/bootstrapping: {} + f:roleRef: {} + f:subjects: {} + manager: kube-apiserver + operation: Update + time: "2024-12-26T23:24:17Z" + name: system:controller:attachdetach-controller + resourceVersion: "148" + uid: bc0865ef-5c06-40f4-a661-504f18c1dfd2 + roleRef: + apiGroup: rbac.authorization.k8s.io + kind: ClusterRole + name: system:controller:attachdetach-controller + subjects: + - kind: ServiceAccount + name: attachdetach-controller + namespace: kube-system +- apiVersion: rbac.authorization.k8s.io/v1 + kind: ClusterRoleBinding + metadata: + annotations: + rbac.authorization.kubernetes.io/autoupdate: "true" + creationTimestamp: "2024-12-26T23:24:17Z" + labels: + kubernetes.io/bootstrapping: rbac-defaults + managedFields: + - apiVersion: rbac.authorization.k8s.io/v1 + fieldsType: FieldsV1 + fieldsV1: + f:metadata: + f:annotations: + .: {} + f:rbac.authorization.kubernetes.io/autoupdate: {} + f:labels: + .: {} + f:kubernetes.io/bootstrapping: {} + f:roleRef: {} + f:subjects: {} + manager: kube-apiserver + operation: Update + time: "2024-12-26T23:24:17Z" + name: system:controller:certificate-controller + resourceVersion: "174" + uid: 76c51f32-ec3a-458e-a6b5-a0d5ebcb4ff5 + roleRef: + apiGroup: rbac.authorization.k8s.io + kind: ClusterRole + name: system:controller:certificate-controller + subjects: + - kind: ServiceAccount + name: certificate-controller + namespace: kube-system +- apiVersion: rbac.authorization.k8s.io/v1 + kind: ClusterRoleBinding + metadata: + annotations: + rbac.authorization.kubernetes.io/autoupdate: "true" + creationTimestamp: "2024-12-26T23:24:17Z" + labels: + kubernetes.io/bootstrapping: rbac-defaults + managedFields: + - apiVersion: rbac.authorization.k8s.io/v1 + fieldsType: FieldsV1 + fieldsV1: + f:metadata: + f:annotations: + .: {} + f:rbac.authorization.kubernetes.io/autoupdate: {} + f:labels: + .: {} + f:kubernetes.io/bootstrapping: {} + f:roleRef: {} + f:subjects: {} + manager: kube-apiserver + operation: Update + time: "2024-12-26T23:24:17Z" + name: system:controller:clusterrole-aggregation-controller + resourceVersion: "149" + uid: 5581dae9-bb4e-4ceb-8620-23f6956ff088 + roleRef: + apiGroup: rbac.authorization.k8s.io + kind: ClusterRole + name: system:controller:clusterrole-aggregation-controller + subjects: + - kind: ServiceAccount + name: clusterrole-aggregation-controller + namespace: kube-system +- apiVersion: rbac.authorization.k8s.io/v1 + kind: ClusterRoleBinding + metadata: + annotations: + rbac.authorization.kubernetes.io/autoupdate: "true" + creationTimestamp: "2024-12-26T23:24:17Z" + labels: + kubernetes.io/bootstrapping: rbac-defaults + managedFields: + - apiVersion: rbac.authorization.k8s.io/v1 + fieldsType: FieldsV1 + fieldsV1: + f:metadata: + f:annotations: + .: {} + f:rbac.authorization.kubernetes.io/autoupdate: {} + f:labels: + .: {} + f:kubernetes.io/bootstrapping: {} + f:roleRef: {} + f:subjects: {} + manager: kube-apiserver + operation: Update + time: "2024-12-26T23:24:17Z" + name: system:controller:cronjob-controller + resourceVersion: "150" + uid: d7d6108e-0508-4e62-91af-3f1d96768266 + roleRef: + apiGroup: rbac.authorization.k8s.io + kind: ClusterRole + name: system:controller:cronjob-controller + subjects: + - kind: ServiceAccount + name: cronjob-controller + namespace: kube-system +- apiVersion: rbac.authorization.k8s.io/v1 + kind: ClusterRoleBinding + metadata: + annotations: + rbac.authorization.kubernetes.io/autoupdate: "true" + creationTimestamp: "2024-12-26T23:24:17Z" + labels: + kubernetes.io/bootstrapping: rbac-defaults + managedFields: + - apiVersion: rbac.authorization.k8s.io/v1 + fieldsType: FieldsV1 + fieldsV1: + f:metadata: + f:annotations: + .: {} + f:rbac.authorization.kubernetes.io/autoupdate: {} + f:labels: + .: {} + f:kubernetes.io/bootstrapping: {} + f:roleRef: {} + f:subjects: {} + manager: kube-apiserver + operation: Update + time: "2024-12-26T23:24:17Z" + name: system:controller:daemon-set-controller + resourceVersion: "151" + uid: 0fca3669-33c3-469c-8fa7-645d8e55f03c + roleRef: + apiGroup: rbac.authorization.k8s.io + kind: ClusterRole + name: system:controller:daemon-set-controller + subjects: + - kind: ServiceAccount + name: daemon-set-controller + namespace: kube-system +- apiVersion: rbac.authorization.k8s.io/v1 + kind: ClusterRoleBinding + metadata: + annotations: + rbac.authorization.kubernetes.io/autoupdate: "true" + creationTimestamp: "2024-12-26T23:24:17Z" + labels: + kubernetes.io/bootstrapping: rbac-defaults + managedFields: + - apiVersion: rbac.authorization.k8s.io/v1 + fieldsType: FieldsV1 + fieldsV1: + f:metadata: + f:annotations: + .: {} + f:rbac.authorization.kubernetes.io/autoupdate: {} + f:labels: + .: {} + f:kubernetes.io/bootstrapping: {} + f:roleRef: {} + f:subjects: {} + manager: kube-apiserver + operation: Update + time: "2024-12-26T23:24:17Z" + name: system:controller:deployment-controller + resourceVersion: "152" + uid: c99db659-5a57-4876-8767-85966b607f18 + roleRef: + apiGroup: rbac.authorization.k8s.io + kind: ClusterRole + name: system:controller:deployment-controller + subjects: + - kind: ServiceAccount + name: deployment-controller + namespace: kube-system +- apiVersion: rbac.authorization.k8s.io/v1 + kind: ClusterRoleBinding + metadata: + annotations: + rbac.authorization.kubernetes.io/autoupdate: "true" + creationTimestamp: "2024-12-26T23:24:17Z" + labels: + kubernetes.io/bootstrapping: rbac-defaults + managedFields: + - apiVersion: rbac.authorization.k8s.io/v1 + fieldsType: FieldsV1 + fieldsV1: + f:metadata: + f:annotations: + .: {} + f:rbac.authorization.kubernetes.io/autoupdate: {} + f:labels: + .: {} + f:kubernetes.io/bootstrapping: {} + f:roleRef: {} + f:subjects: {} + manager: kube-apiserver + operation: Update + time: "2024-12-26T23:24:17Z" + name: system:controller:disruption-controller + resourceVersion: "153" + uid: 8d58f466-f8b6-4844-b472-25305f413b58 + roleRef: + apiGroup: rbac.authorization.k8s.io + kind: ClusterRole + name: system:controller:disruption-controller + subjects: + - kind: ServiceAccount + name: disruption-controller + namespace: kube-system +- apiVersion: rbac.authorization.k8s.io/v1 + kind: ClusterRoleBinding + metadata: + annotations: + rbac.authorization.kubernetes.io/autoupdate: "true" + creationTimestamp: "2024-12-26T23:24:17Z" + labels: + kubernetes.io/bootstrapping: rbac-defaults + managedFields: + - apiVersion: rbac.authorization.k8s.io/v1 + fieldsType: FieldsV1 + fieldsV1: + f:metadata: + f:annotations: + .: {} + f:rbac.authorization.kubernetes.io/autoupdate: {} + f:labels: + .: {} + f:kubernetes.io/bootstrapping: {} + f:roleRef: {} + f:subjects: {} + manager: kube-apiserver + operation: Update + time: "2024-12-26T23:24:17Z" + name: system:controller:endpoint-controller + resourceVersion: "154" + uid: 09562554-05f3-4d89-930a-810c71d1548c + roleRef: + apiGroup: rbac.authorization.k8s.io + kind: ClusterRole + name: system:controller:endpoint-controller + subjects: + - kind: ServiceAccount + name: endpoint-controller + namespace: kube-system +- apiVersion: rbac.authorization.k8s.io/v1 + kind: ClusterRoleBinding + metadata: + annotations: + rbac.authorization.kubernetes.io/autoupdate: "true" + creationTimestamp: "2024-12-26T23:24:17Z" + labels: + kubernetes.io/bootstrapping: rbac-defaults + managedFields: + - apiVersion: rbac.authorization.k8s.io/v1 + fieldsType: FieldsV1 + fieldsV1: + f:metadata: + f:annotations: + .: {} + f:rbac.authorization.kubernetes.io/autoupdate: {} + f:labels: + .: {} + f:kubernetes.io/bootstrapping: {} + f:roleRef: {} + f:subjects: {} + manager: kube-apiserver + operation: Update + time: "2024-12-26T23:24:17Z" + name: system:controller:endpointslice-controller + resourceVersion: "155" + uid: 3b5b9741-5adf-461d-b832-ff80e87ad8af + roleRef: + apiGroup: rbac.authorization.k8s.io + kind: ClusterRole + name: system:controller:endpointslice-controller + subjects: + - kind: ServiceAccount + name: endpointslice-controller + namespace: kube-system +- apiVersion: rbac.authorization.k8s.io/v1 + kind: ClusterRoleBinding + metadata: + annotations: + rbac.authorization.kubernetes.io/autoupdate: "true" + creationTimestamp: "2024-12-26T23:24:17Z" + labels: + kubernetes.io/bootstrapping: rbac-defaults + managedFields: + - apiVersion: rbac.authorization.k8s.io/v1 + fieldsType: FieldsV1 + fieldsV1: + f:metadata: + f:annotations: + .: {} + f:rbac.authorization.kubernetes.io/autoupdate: {} + f:labels: + .: {} + f:kubernetes.io/bootstrapping: {} + f:roleRef: {} + f:subjects: {} + manager: kube-apiserver + operation: Update + time: "2024-12-26T23:24:17Z" + name: system:controller:endpointslicemirroring-controller + resourceVersion: "156" + uid: bc27a312-14b1-499b-9248-5f9f0de229f6 + roleRef: + apiGroup: rbac.authorization.k8s.io + kind: ClusterRole + name: system:controller:endpointslicemirroring-controller + subjects: + - kind: ServiceAccount + name: endpointslicemirroring-controller + namespace: kube-system +- apiVersion: rbac.authorization.k8s.io/v1 + kind: ClusterRoleBinding + metadata: + annotations: + rbac.authorization.kubernetes.io/autoupdate: "true" + creationTimestamp: "2024-12-26T23:24:17Z" + labels: + kubernetes.io/bootstrapping: rbac-defaults + managedFields: + - apiVersion: rbac.authorization.k8s.io/v1 + fieldsType: FieldsV1 + fieldsV1: + f:metadata: + f:annotations: + .: {} + f:rbac.authorization.kubernetes.io/autoupdate: {} + f:labels: + .: {} + f:kubernetes.io/bootstrapping: {} + f:roleRef: {} + f:subjects: {} + manager: kube-apiserver + operation: Update + time: "2024-12-26T23:24:17Z" + name: system:controller:ephemeral-volume-controller + resourceVersion: "158" + uid: c2e8f833-c043-4cf6-b887-e2a4736a5219 + roleRef: + apiGroup: rbac.authorization.k8s.io + kind: ClusterRole + name: system:controller:ephemeral-volume-controller + subjects: + - kind: ServiceAccount + name: ephemeral-volume-controller + namespace: kube-system +- apiVersion: rbac.authorization.k8s.io/v1 + kind: ClusterRoleBinding + metadata: + annotations: + rbac.authorization.kubernetes.io/autoupdate: "true" + creationTimestamp: "2024-12-26T23:24:17Z" + labels: + kubernetes.io/bootstrapping: rbac-defaults + managedFields: + - apiVersion: rbac.authorization.k8s.io/v1 + fieldsType: FieldsV1 + fieldsV1: + f:metadata: + f:annotations: + .: {} + f:rbac.authorization.kubernetes.io/autoupdate: {} + f:labels: + .: {} + f:kubernetes.io/bootstrapping: {} + f:roleRef: {} + f:subjects: {} + manager: kube-apiserver + operation: Update + time: "2024-12-26T23:24:17Z" + name: system:controller:expand-controller + resourceVersion: "157" + uid: d29422c2-c170-4034-9975-d2d9bf3f5427 + roleRef: + apiGroup: rbac.authorization.k8s.io + kind: ClusterRole + name: system:controller:expand-controller + subjects: + - kind: ServiceAccount + name: expand-controller + namespace: kube-system +- apiVersion: rbac.authorization.k8s.io/v1 + kind: ClusterRoleBinding + metadata: + annotations: + rbac.authorization.kubernetes.io/autoupdate: "true" + creationTimestamp: "2024-12-26T23:24:17Z" + labels: + kubernetes.io/bootstrapping: rbac-defaults + managedFields: + - apiVersion: rbac.authorization.k8s.io/v1 + fieldsType: FieldsV1 + fieldsV1: + f:metadata: + f:annotations: + .: {} + f:rbac.authorization.kubernetes.io/autoupdate: {} + f:labels: + .: {} + f:kubernetes.io/bootstrapping: {} + f:roleRef: {} + f:subjects: {} + manager: kube-apiserver + operation: Update + time: "2024-12-26T23:24:17Z" + name: system:controller:generic-garbage-collector + resourceVersion: "159" + uid: def43976-9212-4b1b-b3af-c74b1979f5c9 + roleRef: + apiGroup: rbac.authorization.k8s.io + kind: ClusterRole + name: system:controller:generic-garbage-collector + subjects: + - kind: ServiceAccount + name: generic-garbage-collector + namespace: kube-system +- apiVersion: rbac.authorization.k8s.io/v1 + kind: ClusterRoleBinding + metadata: + annotations: + rbac.authorization.kubernetes.io/autoupdate: "true" + creationTimestamp: "2024-12-26T23:24:17Z" + labels: + kubernetes.io/bootstrapping: rbac-defaults + managedFields: + - apiVersion: rbac.authorization.k8s.io/v1 + fieldsType: FieldsV1 + fieldsV1: + f:metadata: + f:annotations: + .: {} + f:rbac.authorization.kubernetes.io/autoupdate: {} + f:labels: + .: {} + f:kubernetes.io/bootstrapping: {} + f:roleRef: {} + f:subjects: {} + manager: kube-apiserver + operation: Update + time: "2024-12-26T23:24:17Z" + name: system:controller:horizontal-pod-autoscaler + resourceVersion: "160" + uid: 0aecb9d8-843f-48d2-bb40-a3c91b537722 + roleRef: + apiGroup: rbac.authorization.k8s.io + kind: ClusterRole + name: system:controller:horizontal-pod-autoscaler + subjects: + - kind: ServiceAccount + name: horizontal-pod-autoscaler + namespace: kube-system +- apiVersion: rbac.authorization.k8s.io/v1 + kind: ClusterRoleBinding + metadata: + annotations: + rbac.authorization.kubernetes.io/autoupdate: "true" + creationTimestamp: "2024-12-26T23:24:17Z" + labels: + kubernetes.io/bootstrapping: rbac-defaults + managedFields: + - apiVersion: rbac.authorization.k8s.io/v1 + fieldsType: FieldsV1 + fieldsV1: + f:metadata: + f:annotations: + .: {} + f:rbac.authorization.kubernetes.io/autoupdate: {} + f:labels: + .: {} + f:kubernetes.io/bootstrapping: {} + f:roleRef: {} + f:subjects: {} + manager: kube-apiserver + operation: Update + time: "2024-12-26T23:24:17Z" + name: system:controller:job-controller + resourceVersion: "161" + uid: 886cca49-9de1-4360-8306-166fa2cb91e3 + roleRef: + apiGroup: rbac.authorization.k8s.io + kind: ClusterRole + name: system:controller:job-controller + subjects: + - kind: ServiceAccount + name: job-controller + namespace: kube-system +- apiVersion: rbac.authorization.k8s.io/v1 + kind: ClusterRoleBinding + metadata: + annotations: + rbac.authorization.kubernetes.io/autoupdate: "true" + creationTimestamp: "2024-12-26T23:24:17Z" + labels: + kubernetes.io/bootstrapping: rbac-defaults + managedFields: + - apiVersion: rbac.authorization.k8s.io/v1 + fieldsType: FieldsV1 + fieldsV1: + f:metadata: + f:annotations: + .: {} + f:rbac.authorization.kubernetes.io/autoupdate: {} + f:labels: + .: {} + f:kubernetes.io/bootstrapping: {} + f:roleRef: {} + f:subjects: {} + manager: kube-apiserver + operation: Update + time: "2024-12-26T23:24:17Z" + name: system:controller:namespace-controller + resourceVersion: "162" + uid: aaf2b3c4-1706-475e-ae99-27a370038e55 + roleRef: + apiGroup: rbac.authorization.k8s.io + kind: ClusterRole + name: system:controller:namespace-controller + subjects: + - kind: ServiceAccount + name: namespace-controller + namespace: kube-system +- apiVersion: rbac.authorization.k8s.io/v1 + kind: ClusterRoleBinding + metadata: + annotations: + rbac.authorization.kubernetes.io/autoupdate: "true" + creationTimestamp: "2024-12-26T23:24:17Z" + labels: + kubernetes.io/bootstrapping: rbac-defaults + managedFields: + - apiVersion: rbac.authorization.k8s.io/v1 + fieldsType: FieldsV1 + fieldsV1: + f:metadata: + f:annotations: + .: {} + f:rbac.authorization.kubernetes.io/autoupdate: {} + f:labels: + .: {} + f:kubernetes.io/bootstrapping: {} + f:roleRef: {} + f:subjects: {} + manager: kube-apiserver + operation: Update + time: "2024-12-26T23:24:17Z" + name: system:controller:node-controller + resourceVersion: "163" + uid: 0564ae6b-f9d2-44bd-9aa4-dd0500facc6c + roleRef: + apiGroup: rbac.authorization.k8s.io + kind: ClusterRole + name: system:controller:node-controller + subjects: + - kind: ServiceAccount + name: node-controller + namespace: kube-system +- apiVersion: rbac.authorization.k8s.io/v1 + kind: ClusterRoleBinding + metadata: + annotations: + rbac.authorization.kubernetes.io/autoupdate: "true" + creationTimestamp: "2024-12-26T23:24:17Z" + labels: + kubernetes.io/bootstrapping: rbac-defaults + managedFields: + - apiVersion: rbac.authorization.k8s.io/v1 + fieldsType: FieldsV1 + fieldsV1: + f:metadata: + f:annotations: + .: {} + f:rbac.authorization.kubernetes.io/autoupdate: {} + f:labels: + .: {} + f:kubernetes.io/bootstrapping: {} + f:roleRef: {} + f:subjects: {} + manager: kube-apiserver + operation: Update + time: "2024-12-26T23:24:17Z" + name: system:controller:persistent-volume-binder + resourceVersion: "164" + uid: 686f1d59-d1a0-4900-b502-252cc096ee63 + roleRef: + apiGroup: rbac.authorization.k8s.io + kind: ClusterRole + name: system:controller:persistent-volume-binder + subjects: + - kind: ServiceAccount + name: persistent-volume-binder + namespace: kube-system +- apiVersion: rbac.authorization.k8s.io/v1 + kind: ClusterRoleBinding + metadata: + annotations: + rbac.authorization.kubernetes.io/autoupdate: "true" + creationTimestamp: "2024-12-26T23:24:17Z" + labels: + kubernetes.io/bootstrapping: rbac-defaults + managedFields: + - apiVersion: rbac.authorization.k8s.io/v1 + fieldsType: FieldsV1 + fieldsV1: + f:metadata: + f:annotations: + .: {} + f:rbac.authorization.kubernetes.io/autoupdate: {} + f:labels: + .: {} + f:kubernetes.io/bootstrapping: {} + f:roleRef: {} + f:subjects: {} + manager: kube-apiserver + operation: Update + time: "2024-12-26T23:24:17Z" + name: system:controller:pod-garbage-collector + resourceVersion: "165" + uid: c07a0a6a-41a6-46e8-b315-715d12cc3d50 + roleRef: + apiGroup: rbac.authorization.k8s.io + kind: ClusterRole + name: system:controller:pod-garbage-collector + subjects: + - kind: ServiceAccount + name: pod-garbage-collector + namespace: kube-system +- apiVersion: rbac.authorization.k8s.io/v1 + kind: ClusterRoleBinding + metadata: + annotations: + rbac.authorization.kubernetes.io/autoupdate: "true" + creationTimestamp: "2024-12-26T23:24:17Z" + labels: + kubernetes.io/bootstrapping: rbac-defaults + managedFields: + - apiVersion: rbac.authorization.k8s.io/v1 + fieldsType: FieldsV1 + fieldsV1: + f:metadata: + f:annotations: + .: {} + f:rbac.authorization.kubernetes.io/autoupdate: {} + f:labels: + .: {} + f:kubernetes.io/bootstrapping: {} + f:roleRef: {} + f:subjects: {} + manager: kube-apiserver + operation: Update + time: "2024-12-26T23:24:17Z" + name: system:controller:pv-protection-controller + resourceVersion: "176" + uid: e0769e12-4a15-4433-aedd-c06d3d232241 + roleRef: + apiGroup: rbac.authorization.k8s.io + kind: ClusterRole + name: system:controller:pv-protection-controller + subjects: + - kind: ServiceAccount + name: pv-protection-controller + namespace: kube-system +- apiVersion: rbac.authorization.k8s.io/v1 + kind: ClusterRoleBinding + metadata: + annotations: + rbac.authorization.kubernetes.io/autoupdate: "true" + creationTimestamp: "2024-12-26T23:24:17Z" + labels: + kubernetes.io/bootstrapping: rbac-defaults + managedFields: + - apiVersion: rbac.authorization.k8s.io/v1 + fieldsType: FieldsV1 + fieldsV1: + f:metadata: + f:annotations: + .: {} + f:rbac.authorization.kubernetes.io/autoupdate: {} + f:labels: + .: {} + f:kubernetes.io/bootstrapping: {} + f:roleRef: {} + f:subjects: {} + manager: kube-apiserver + operation: Update + time: "2024-12-26T23:24:17Z" + name: system:controller:pvc-protection-controller + resourceVersion: "175" + uid: 8dee7175-9dd0-4a32-a94f-d9efea4a795a + roleRef: + apiGroup: rbac.authorization.k8s.io + kind: ClusterRole + name: system:controller:pvc-protection-controller + subjects: + - kind: ServiceAccount + name: pvc-protection-controller + namespace: kube-system +- apiVersion: rbac.authorization.k8s.io/v1 + kind: ClusterRoleBinding + metadata: + annotations: + rbac.authorization.kubernetes.io/autoupdate: "true" + creationTimestamp: "2024-12-26T23:24:17Z" + labels: + kubernetes.io/bootstrapping: rbac-defaults + managedFields: + - apiVersion: rbac.authorization.k8s.io/v1 + fieldsType: FieldsV1 + fieldsV1: + f:metadata: + f:annotations: + .: {} + f:rbac.authorization.kubernetes.io/autoupdate: {} + f:labels: + .: {} + f:kubernetes.io/bootstrapping: {} + f:roleRef: {} + f:subjects: {} + manager: kube-apiserver + operation: Update + time: "2024-12-26T23:24:17Z" + name: system:controller:replicaset-controller + resourceVersion: "166" + uid: 63713176-7e29-43c0-8df9-13520f262f9d + roleRef: + apiGroup: rbac.authorization.k8s.io + kind: ClusterRole + name: system:controller:replicaset-controller + subjects: + - kind: ServiceAccount + name: replicaset-controller + namespace: kube-system +- apiVersion: rbac.authorization.k8s.io/v1 + kind: ClusterRoleBinding + metadata: + annotations: + rbac.authorization.kubernetes.io/autoupdate: "true" + creationTimestamp: "2024-12-26T23:24:17Z" + labels: + kubernetes.io/bootstrapping: rbac-defaults + managedFields: + - apiVersion: rbac.authorization.k8s.io/v1 + fieldsType: FieldsV1 + fieldsV1: + f:metadata: + f:annotations: + .: {} + f:rbac.authorization.kubernetes.io/autoupdate: {} + f:labels: + .: {} + f:kubernetes.io/bootstrapping: {} + f:roleRef: {} + f:subjects: {} + manager: kube-apiserver + operation: Update + time: "2024-12-26T23:24:17Z" + name: system:controller:replication-controller + resourceVersion: "167" + uid: 3caca170-b6da-4465-9c23-e7a43cd22e00 + roleRef: + apiGroup: rbac.authorization.k8s.io + kind: ClusterRole + name: system:controller:replication-controller + subjects: + - kind: ServiceAccount + name: replication-controller + namespace: kube-system +- apiVersion: rbac.authorization.k8s.io/v1 + kind: ClusterRoleBinding + metadata: + annotations: + rbac.authorization.kubernetes.io/autoupdate: "true" + creationTimestamp: "2024-12-26T23:24:17Z" + labels: + kubernetes.io/bootstrapping: rbac-defaults + managedFields: + - apiVersion: rbac.authorization.k8s.io/v1 + fieldsType: FieldsV1 + fieldsV1: + f:metadata: + f:annotations: + .: {} + f:rbac.authorization.kubernetes.io/autoupdate: {} + f:labels: + .: {} + f:kubernetes.io/bootstrapping: {} + f:roleRef: {} + f:subjects: {} + manager: kube-apiserver + operation: Update + time: "2024-12-26T23:24:17Z" + name: system:controller:resourcequota-controller + resourceVersion: "168" + uid: dc88ba84-658d-4177-a2cc-70abe64f62a7 + roleRef: + apiGroup: rbac.authorization.k8s.io + kind: ClusterRole + name: system:controller:resourcequota-controller + subjects: + - kind: ServiceAccount + name: resourcequota-controller + namespace: kube-system +- apiVersion: rbac.authorization.k8s.io/v1 + kind: ClusterRoleBinding + metadata: + annotations: + rbac.authorization.kubernetes.io/autoupdate: "true" + creationTimestamp: "2024-12-26T23:24:17Z" + labels: + kubernetes.io/bootstrapping: rbac-defaults + managedFields: + - apiVersion: rbac.authorization.k8s.io/v1 + fieldsType: FieldsV1 + fieldsV1: + f:metadata: + f:annotations: + .: {} + f:rbac.authorization.kubernetes.io/autoupdate: {} + f:labels: + .: {} + f:kubernetes.io/bootstrapping: {} + f:roleRef: {} + f:subjects: {} + manager: kube-apiserver + operation: Update + time: "2024-12-26T23:24:17Z" + name: system:controller:root-ca-cert-publisher + resourceVersion: "178" + uid: 68acbc6d-83b0-4708-9844-c8584b0ebfdf + roleRef: + apiGroup: rbac.authorization.k8s.io + kind: ClusterRole + name: system:controller:root-ca-cert-publisher + subjects: + - kind: ServiceAccount + name: root-ca-cert-publisher + namespace: kube-system +- apiVersion: rbac.authorization.k8s.io/v1 + kind: ClusterRoleBinding + metadata: + annotations: + rbac.authorization.kubernetes.io/autoupdate: "true" + creationTimestamp: "2024-12-26T23:24:17Z" + labels: + kubernetes.io/bootstrapping: rbac-defaults + managedFields: + - apiVersion: rbac.authorization.k8s.io/v1 + fieldsType: FieldsV1 + fieldsV1: + f:metadata: + f:annotations: + .: {} + f:rbac.authorization.kubernetes.io/autoupdate: {} + f:labels: + .: {} + f:kubernetes.io/bootstrapping: {} + f:roleRef: {} + f:subjects: {} + manager: kube-apiserver + operation: Update + time: "2024-12-26T23:24:17Z" + name: system:controller:route-controller + resourceVersion: "169" + uid: 24370451-d602-4ee6-a799-613fc27f340c + roleRef: + apiGroup: rbac.authorization.k8s.io + kind: ClusterRole + name: system:controller:route-controller + subjects: + - kind: ServiceAccount + name: route-controller + namespace: kube-system +- apiVersion: rbac.authorization.k8s.io/v1 + kind: ClusterRoleBinding + metadata: + annotations: + rbac.authorization.kubernetes.io/autoupdate: "true" + creationTimestamp: "2024-12-26T23:24:17Z" + labels: + kubernetes.io/bootstrapping: rbac-defaults + managedFields: + - apiVersion: rbac.authorization.k8s.io/v1 + fieldsType: FieldsV1 + fieldsV1: + f:metadata: + f:annotations: + .: {} + f:rbac.authorization.kubernetes.io/autoupdate: {} + f:labels: + .: {} + f:kubernetes.io/bootstrapping: {} + f:roleRef: {} + f:subjects: {} + manager: kube-apiserver + operation: Update + time: "2024-12-26T23:24:17Z" + name: system:controller:service-account-controller + resourceVersion: "170" + uid: 28d89425-65fc-4777-a4ec-ce67e6620c60 + roleRef: + apiGroup: rbac.authorization.k8s.io + kind: ClusterRole + name: system:controller:service-account-controller + subjects: + - kind: ServiceAccount + name: service-account-controller + namespace: kube-system +- apiVersion: rbac.authorization.k8s.io/v1 + kind: ClusterRoleBinding + metadata: + annotations: + rbac.authorization.kubernetes.io/autoupdate: "true" + creationTimestamp: "2024-12-26T23:24:17Z" + labels: + kubernetes.io/bootstrapping: rbac-defaults + managedFields: + - apiVersion: rbac.authorization.k8s.io/v1 + fieldsType: FieldsV1 + fieldsV1: + f:metadata: + f:annotations: + .: {} + f:rbac.authorization.kubernetes.io/autoupdate: {} + f:labels: + .: {} + f:kubernetes.io/bootstrapping: {} + f:roleRef: {} + f:subjects: {} + manager: kube-apiserver + operation: Update + time: "2024-12-26T23:24:17Z" + name: system:controller:service-controller + resourceVersion: "171" + uid: 02b2b67d-d38c-452c-8104-72f0f05da4de + roleRef: + apiGroup: rbac.authorization.k8s.io + kind: ClusterRole + name: system:controller:service-controller + subjects: + - kind: ServiceAccount + name: service-controller + namespace: kube-system +- apiVersion: rbac.authorization.k8s.io/v1 + kind: ClusterRoleBinding + metadata: + annotations: + rbac.authorization.kubernetes.io/autoupdate: "true" + creationTimestamp: "2024-12-26T23:24:17Z" + labels: + kubernetes.io/bootstrapping: rbac-defaults + managedFields: + - apiVersion: rbac.authorization.k8s.io/v1 + fieldsType: FieldsV1 + fieldsV1: + f:metadata: + f:annotations: + .: {} + f:rbac.authorization.kubernetes.io/autoupdate: {} + f:labels: + .: {} + f:kubernetes.io/bootstrapping: {} + f:roleRef: {} + f:subjects: {} + manager: kube-apiserver + operation: Update + time: "2024-12-26T23:24:17Z" + name: system:controller:statefulset-controller + resourceVersion: "172" + uid: 5a0df86d-1f0e-4c44-8f14-a432131ab141 + roleRef: + apiGroup: rbac.authorization.k8s.io + kind: ClusterRole + name: system:controller:statefulset-controller + subjects: + - kind: ServiceAccount + name: statefulset-controller + namespace: kube-system +- apiVersion: rbac.authorization.k8s.io/v1 + kind: ClusterRoleBinding + metadata: + annotations: + rbac.authorization.kubernetes.io/autoupdate: "true" + creationTimestamp: "2024-12-26T23:24:17Z" + labels: + kubernetes.io/bootstrapping: rbac-defaults + managedFields: + - apiVersion: rbac.authorization.k8s.io/v1 + fieldsType: FieldsV1 + fieldsV1: + f:metadata: + f:annotations: + .: {} + f:rbac.authorization.kubernetes.io/autoupdate: {} + f:labels: + .: {} + f:kubernetes.io/bootstrapping: {} + f:roleRef: {} + f:subjects: {} + manager: kube-apiserver + operation: Update + time: "2024-12-26T23:24:17Z" + name: system:controller:ttl-after-finished-controller + resourceVersion: "177" + uid: 0527a6ff-1105-475c-be3f-3f795b54467b + roleRef: + apiGroup: rbac.authorization.k8s.io + kind: ClusterRole + name: system:controller:ttl-after-finished-controller + subjects: + - kind: ServiceAccount + name: ttl-after-finished-controller + namespace: kube-system +- apiVersion: rbac.authorization.k8s.io/v1 + kind: ClusterRoleBinding + metadata: + annotations: + rbac.authorization.kubernetes.io/autoupdate: "true" + creationTimestamp: "2024-12-26T23:24:17Z" + labels: + kubernetes.io/bootstrapping: rbac-defaults + managedFields: + - apiVersion: rbac.authorization.k8s.io/v1 + fieldsType: FieldsV1 + fieldsV1: + f:metadata: + f:annotations: + .: {} + f:rbac.authorization.kubernetes.io/autoupdate: {} + f:labels: + .: {} + f:kubernetes.io/bootstrapping: {} + f:roleRef: {} + f:subjects: {} + manager: kube-apiserver + operation: Update + time: "2024-12-26T23:24:17Z" + name: system:controller:ttl-controller + resourceVersion: "173" + uid: e7fb00bb-cd8c-444c-9212-bf4c4192da9a + roleRef: + apiGroup: rbac.authorization.k8s.io + kind: ClusterRole + name: system:controller:ttl-controller + subjects: + - kind: ServiceAccount + name: ttl-controller + namespace: kube-system +- apiVersion: rbac.authorization.k8s.io/v1 + kind: ClusterRoleBinding + metadata: + creationTimestamp: "2024-12-26T23:24:19Z" + managedFields: + - apiVersion: rbac.authorization.k8s.io/v1 + fieldsType: FieldsV1 + fieldsV1: + f:roleRef: {} + f:subjects: {} + manager: kubeadm + operation: Update + time: "2024-12-26T23:24:19Z" + name: system:coredns + resourceVersion: "233" + uid: ca9661aa-1a7a-4bf7-9d79-b5daab5a7d8f + roleRef: + apiGroup: rbac.authorization.k8s.io + kind: ClusterRole + name: system:coredns + subjects: + - kind: ServiceAccount + name: coredns + namespace: kube-system +- apiVersion: rbac.authorization.k8s.io/v1 + kind: ClusterRoleBinding + metadata: + annotations: + rbac.authorization.kubernetes.io/autoupdate: "true" + creationTimestamp: "2024-12-26T23:24:17Z" + labels: + kubernetes.io/bootstrapping: rbac-defaults + managedFields: + - apiVersion: rbac.authorization.k8s.io/v1 + fieldsType: FieldsV1 + fieldsV1: + f:metadata: + f:annotations: + .: {} + f:rbac.authorization.kubernetes.io/autoupdate: {} + f:labels: + .: {} + f:kubernetes.io/bootstrapping: {} + f:roleRef: {} + f:subjects: {} + manager: kube-apiserver + operation: Update + time: "2024-12-26T23:24:17Z" + name: system:discovery + resourceVersion: "138" + uid: e216803f-888c-4a2e-b864-6fc1c5d528cb + roleRef: + apiGroup: rbac.authorization.k8s.io + kind: ClusterRole + name: system:discovery + subjects: + - apiGroup: rbac.authorization.k8s.io + kind: Group + name: system:authenticated +- apiVersion: rbac.authorization.k8s.io/v1 + kind: ClusterRoleBinding + metadata: + annotations: + rbac.authorization.kubernetes.io/autoupdate: "true" + creationTimestamp: "2024-12-26T23:24:17Z" + labels: + kubernetes.io/bootstrapping: rbac-defaults + managedFields: + - apiVersion: rbac.authorization.k8s.io/v1 + fieldsType: FieldsV1 + fieldsV1: + f:metadata: + f:annotations: + .: {} + f:rbac.authorization.kubernetes.io/autoupdate: {} + f:labels: + .: {} + f:kubernetes.io/bootstrapping: {} + f:roleRef: {} + f:subjects: {} + manager: kube-apiserver + operation: Update + time: "2024-12-26T23:24:17Z" + name: system:kube-controller-manager + resourceVersion: "142" + uid: 6486cdc5-bd4b-40ac-91ec-f84e3a360c1d + roleRef: + apiGroup: rbac.authorization.k8s.io + kind: ClusterRole + name: system:kube-controller-manager + subjects: + - apiGroup: rbac.authorization.k8s.io + kind: User + name: system:kube-controller-manager +- apiVersion: rbac.authorization.k8s.io/v1 + kind: ClusterRoleBinding + metadata: + annotations: + rbac.authorization.kubernetes.io/autoupdate: "true" + creationTimestamp: "2024-12-26T23:24:17Z" + labels: + kubernetes.io/bootstrapping: rbac-defaults + managedFields: + - apiVersion: rbac.authorization.k8s.io/v1 + fieldsType: FieldsV1 + fieldsV1: + f:metadata: + f:annotations: + .: {} + f:rbac.authorization.kubernetes.io/autoupdate: {} + f:labels: + .: {} + f:kubernetes.io/bootstrapping: {} + f:roleRef: {} + f:subjects: {} + manager: kube-apiserver + operation: Update + time: "2024-12-26T23:24:17Z" + name: system:kube-dns + resourceVersion: "143" + uid: 76f36264-8373-405d-943c-7e99631179d7 + roleRef: + apiGroup: rbac.authorization.k8s.io + kind: ClusterRole + name: system:kube-dns + subjects: + - kind: ServiceAccount + name: kube-dns + namespace: kube-system +- apiVersion: rbac.authorization.k8s.io/v1 + kind: ClusterRoleBinding + metadata: + annotations: + rbac.authorization.kubernetes.io/autoupdate: "true" + creationTimestamp: "2024-12-26T23:24:17Z" + labels: + kubernetes.io/bootstrapping: rbac-defaults + managedFields: + - apiVersion: rbac.authorization.k8s.io/v1 + fieldsType: FieldsV1 + fieldsV1: + f:metadata: + f:annotations: + .: {} + f:rbac.authorization.kubernetes.io/autoupdate: {} + f:labels: + .: {} + f:kubernetes.io/bootstrapping: {} + f:roleRef: {} + f:subjects: {} + manager: kube-apiserver + operation: Update + time: "2024-12-26T23:24:17Z" + name: system:kube-scheduler + resourceVersion: "144" + uid: 8cef868c-1aa4-4736-94ea-5380556821de + roleRef: + apiGroup: rbac.authorization.k8s.io + kind: ClusterRole + name: system:kube-scheduler + subjects: + - apiGroup: rbac.authorization.k8s.io + kind: User + name: system:kube-scheduler +- apiVersion: rbac.authorization.k8s.io/v1 + kind: ClusterRoleBinding + metadata: + annotations: + kubectl.kubernetes.io/last-applied-configuration: | + {"apiVersion":"rbac.authorization.k8s.io/v1","kind":"ClusterRoleBinding","metadata":{"annotations":{},"labels":{"addonmanager.kubernetes.io/mode":"Reconcile","k8s-app":"metrics-server"},"name":"system:metrics-server"},"roleRef":{"apiGroup":"rbac.authorization.k8s.io","kind":"ClusterRole","name":"system:metrics-server"},"subjects":[{"kind":"ServiceAccount","name":"metrics-server","namespace":"kube-system"}]} + creationTimestamp: "2024-12-26T23:26:51Z" + labels: + addonmanager.kubernetes.io/mode: Reconcile + k8s-app: metrics-server + managedFields: + - apiVersion: rbac.authorization.k8s.io/v1 + fieldsType: FieldsV1 + fieldsV1: + f:metadata: + f:annotations: + .: {} + f:kubectl.kubernetes.io/last-applied-configuration: {} + f:labels: + .: {} + f:addonmanager.kubernetes.io/mode: {} + f:k8s-app: {} + f:roleRef: {} + f:subjects: {} + manager: kubectl-client-side-apply + operation: Update + time: "2024-12-26T23:26:51Z" + name: system:metrics-server + resourceVersion: "660" + uid: a49896c0-efca-431d-a7c2-f44731e3d869 + roleRef: + apiGroup: rbac.authorization.k8s.io + kind: ClusterRole + name: system:metrics-server + subjects: + - kind: ServiceAccount + name: metrics-server + namespace: kube-system +- apiVersion: rbac.authorization.k8s.io/v1 + kind: ClusterRoleBinding + metadata: + annotations: + rbac.authorization.kubernetes.io/autoupdate: "true" + creationTimestamp: "2024-12-26T23:24:17Z" + labels: + kubernetes.io/bootstrapping: rbac-defaults + managedFields: + - apiVersion: rbac.authorization.k8s.io/v1 + fieldsType: FieldsV1 + fieldsV1: + f:metadata: + f:annotations: + .: {} + f:rbac.authorization.kubernetes.io/autoupdate: {} + f:labels: + .: {} + f:kubernetes.io/bootstrapping: {} + f:roleRef: {} + f:subjects: {} + manager: kube-apiserver + operation: Update + time: "2024-12-26T23:24:17Z" + name: system:monitoring + resourceVersion: "137" + uid: ccd1ebd6-2238-4c24-a06b-3a29808857c7 + roleRef: + apiGroup: rbac.authorization.k8s.io + kind: ClusterRole + name: system:monitoring + subjects: + - apiGroup: rbac.authorization.k8s.io + kind: Group + name: system:monitoring +- apiVersion: rbac.authorization.k8s.io/v1 + kind: ClusterRoleBinding + metadata: + annotations: + rbac.authorization.kubernetes.io/autoupdate: "true" + creationTimestamp: "2024-12-26T23:24:17Z" + labels: + kubernetes.io/bootstrapping: rbac-defaults + managedFields: + - apiVersion: rbac.authorization.k8s.io/v1 + fieldsType: FieldsV1 + fieldsV1: + f:metadata: + f:annotations: + .: {} + f:rbac.authorization.kubernetes.io/autoupdate: {} + f:labels: + .: {} + f:kubernetes.io/bootstrapping: {} + f:roleRef: {} + manager: kube-apiserver + operation: Update + time: "2024-12-26T23:24:17Z" + name: system:node + resourceVersion: "146" + uid: 7aaa45ba-6ea2-4b56-b538-59da7b717502 + roleRef: + apiGroup: rbac.authorization.k8s.io + kind: ClusterRole + name: system:node +- apiVersion: rbac.authorization.k8s.io/v1 + kind: ClusterRoleBinding + metadata: + annotations: + rbac.authorization.kubernetes.io/autoupdate: "true" + creationTimestamp: "2024-12-26T23:24:17Z" + labels: + kubernetes.io/bootstrapping: rbac-defaults + managedFields: + - apiVersion: rbac.authorization.k8s.io/v1 + fieldsType: FieldsV1 + fieldsV1: + f:metadata: + f:annotations: + .: {} + f:rbac.authorization.kubernetes.io/autoupdate: {} + f:labels: + .: {} + f:kubernetes.io/bootstrapping: {} + f:roleRef: {} + f:subjects: {} + manager: kube-apiserver + operation: Update + time: "2024-12-26T23:24:17Z" + name: system:node-proxier + resourceVersion: "141" + uid: 0674fdc5-3056-43ec-a8bb-376066fe2b29 + roleRef: + apiGroup: rbac.authorization.k8s.io + kind: ClusterRole + name: system:node-proxier + subjects: + - apiGroup: rbac.authorization.k8s.io + kind: User + name: system:kube-proxy +- apiVersion: rbac.authorization.k8s.io/v1 + kind: ClusterRoleBinding + metadata: + annotations: + rbac.authorization.kubernetes.io/autoupdate: "true" + creationTimestamp: "2024-12-26T23:24:17Z" + labels: + kubernetes.io/bootstrapping: rbac-defaults + managedFields: + - apiVersion: rbac.authorization.k8s.io/v1 + fieldsType: FieldsV1 + fieldsV1: + f:metadata: + f:annotations: + .: {} + f:rbac.authorization.kubernetes.io/autoupdate: {} + f:labels: + .: {} + f:kubernetes.io/bootstrapping: {} + f:roleRef: {} + f:subjects: {} + manager: kube-apiserver + operation: Update + time: "2024-12-26T23:24:17Z" + name: system:public-info-viewer + resourceVersion: "140" + uid: b10ce9f4-02f9-4d03-b2e5-a155f90d19e3 + roleRef: + apiGroup: rbac.authorization.k8s.io + kind: ClusterRole + name: system:public-info-viewer + subjects: + - apiGroup: rbac.authorization.k8s.io + kind: Group + name: system:authenticated + - apiGroup: rbac.authorization.k8s.io + kind: Group + name: system:unauthenticated +- apiVersion: rbac.authorization.k8s.io/v1 + kind: ClusterRoleBinding + metadata: + annotations: + rbac.authorization.kubernetes.io/autoupdate: "true" + creationTimestamp: "2024-12-26T23:24:17Z" + labels: + kubernetes.io/bootstrapping: rbac-defaults + managedFields: + - apiVersion: rbac.authorization.k8s.io/v1 + fieldsType: FieldsV1 + fieldsV1: + f:metadata: + f:annotations: + .: {} + f:rbac.authorization.kubernetes.io/autoupdate: {} + f:labels: + .: {} + f:kubernetes.io/bootstrapping: {} + f:roleRef: {} + f:subjects: {} + manager: kube-apiserver + operation: Update + time: "2024-12-26T23:24:17Z" + name: system:service-account-issuer-discovery + resourceVersion: "147" + uid: 90bf2c14-00ae-4401-bf53-8ad86a46c6d4 + roleRef: + apiGroup: rbac.authorization.k8s.io + kind: ClusterRole + name: system:service-account-issuer-discovery + subjects: + - apiGroup: rbac.authorization.k8s.io + kind: Group + name: system:serviceaccounts +- apiVersion: rbac.authorization.k8s.io/v1 + kind: ClusterRoleBinding + metadata: + annotations: + rbac.authorization.kubernetes.io/autoupdate: "true" + creationTimestamp: "2024-12-26T23:24:17Z" + labels: + kubernetes.io/bootstrapping: rbac-defaults + managedFields: + - apiVersion: rbac.authorization.k8s.io/v1 + fieldsType: FieldsV1 + fieldsV1: + f:metadata: + f:annotations: + .: {} + f:rbac.authorization.kubernetes.io/autoupdate: {} + f:labels: + .: {} + f:kubernetes.io/bootstrapping: {} + f:roleRef: {} + f:subjects: {} + manager: kube-apiserver + operation: Update + time: "2024-12-26T23:24:17Z" + name: system:volume-scheduler + resourceVersion: "145" + uid: fe9acedd-14e7-4f0e-9e74-409b44e3aada + roleRef: + apiGroup: rbac.authorization.k8s.io + kind: ClusterRole + name: system:volume-scheduler + subjects: + - apiGroup: rbac.authorization.k8s.io + kind: User + name: system:kube-scheduler +- apiVersion: rbac.authorization.k8s.io/v1 + kind: Role + metadata: + annotations: + kubectl.kubernetes.io/last-applied-configuration: | + {"apiVersion":"rbac.authorization.k8s.io/v1","kind":"Role","metadata":{"annotations":{},"labels":{"app.kubernetes.io/component":"controller","app.kubernetes.io/instance":"ingress-nginx","app.kubernetes.io/name":"ingress-nginx"},"name":"ingress-nginx","namespace":"ingress-nginx"},"rules":[{"apiGroups":[""],"resources":["namespaces"],"verbs":["get"]},{"apiGroups":[""],"resources":["configmaps","pods","secrets","endpoints"],"verbs":["get","list","watch"]},{"apiGroups":[""],"resources":["services"],"verbs":["get","list","watch"]},{"apiGroups":["networking.k8s.io"],"resources":["ingresses"],"verbs":["get","list","watch"]},{"apiGroups":["networking.k8s.io"],"resources":["ingresses/status"],"verbs":["update"]},{"apiGroups":["networking.k8s.io"],"resources":["ingressclasses"],"verbs":["get","list","watch"]},{"apiGroups":[""],"resourceNames":["ingress-nginx-leader"],"resources":["configmaps"],"verbs":["get","update"]},{"apiGroups":[""],"resources":["configmaps"],"verbs":["create"]},{"apiGroups":["coordination.k8s.io"],"resourceNames":["ingress-nginx-leader"],"resources":["leases"],"verbs":["get","update"]},{"apiGroups":["coordination.k8s.io"],"resources":["leases"],"verbs":["create"]},{"apiGroups":[""],"resources":["events"],"verbs":["create","patch"]},{"apiGroups":["discovery.k8s.io"],"resources":["endpointslices"],"verbs":["list","watch","get"]}]} + creationTimestamp: "2024-12-26T23:25:47Z" + labels: + app.kubernetes.io/component: controller + app.kubernetes.io/instance: ingress-nginx + app.kubernetes.io/name: ingress-nginx + managedFields: + - apiVersion: rbac.authorization.k8s.io/v1 + fieldsType: FieldsV1 + fieldsV1: + f:metadata: + f:annotations: + .: {} + f:kubectl.kubernetes.io/last-applied-configuration: {} + f:labels: + .: {} + f:app.kubernetes.io/component: {} + f:app.kubernetes.io/instance: {} + f:app.kubernetes.io/name: {} + f:rules: {} + manager: kubectl-client-side-apply + operation: Update + time: "2024-12-26T23:25:47Z" + name: ingress-nginx + namespace: ingress-nginx + resourceVersion: "492" + uid: 4ce88b37-408b-4548-bb4c-3d943192c709 + rules: + - apiGroups: + - "" + resources: + - namespaces + verbs: + - get + - apiGroups: + - "" + resources: + - configmaps + - pods + - secrets + - endpoints + verbs: + - get + - list + - watch + - apiGroups: + - "" + resources: + - services + verbs: + - get + - list + - watch + - apiGroups: + - networking.k8s.io + resources: + - ingresses + verbs: + - get + - list + - watch + - apiGroups: + - networking.k8s.io + resources: + - ingresses/status + verbs: + - update + - apiGroups: + - networking.k8s.io + resources: + - ingressclasses + verbs: + - get + - list + - watch + - apiGroups: + - "" + resourceNames: + - ingress-nginx-leader + resources: + - configmaps + verbs: + - get + - update + - apiGroups: + - "" + resources: + - configmaps + verbs: + - create + - apiGroups: + - coordination.k8s.io + resourceNames: + - ingress-nginx-leader + resources: + - leases + verbs: + - get + - update + - apiGroups: + - coordination.k8s.io + resources: + - leases + verbs: + - create + - apiGroups: + - "" + resources: + - events + verbs: + - create + - patch + - apiGroups: + - discovery.k8s.io + resources: + - endpointslices + verbs: + - list + - watch + - get +- apiVersion: rbac.authorization.k8s.io/v1 + kind: Role + metadata: + annotations: + kubectl.kubernetes.io/last-applied-configuration: | + {"apiVersion":"rbac.authorization.k8s.io/v1","kind":"Role","metadata":{"annotations":{},"labels":{"app.kubernetes.io/component":"admission-webhook","app.kubernetes.io/instance":"ingress-nginx","app.kubernetes.io/name":"ingress-nginx"},"name":"ingress-nginx-admission","namespace":"ingress-nginx"},"rules":[{"apiGroups":[""],"resources":["secrets"],"verbs":["get","create"]}]} + creationTimestamp: "2024-12-26T23:25:47Z" + labels: + app.kubernetes.io/component: admission-webhook + app.kubernetes.io/instance: ingress-nginx + app.kubernetes.io/name: ingress-nginx + managedFields: + - apiVersion: rbac.authorization.k8s.io/v1 + fieldsType: FieldsV1 + fieldsV1: + f:metadata: + f:annotations: + .: {} + f:kubectl.kubernetes.io/last-applied-configuration: {} + f:labels: + .: {} + f:app.kubernetes.io/component: {} + f:app.kubernetes.io/instance: {} + f:app.kubernetes.io/name: {} + f:rules: {} + manager: kubectl-client-side-apply + operation: Update + time: "2024-12-26T23:25:47Z" + name: ingress-nginx-admission + namespace: ingress-nginx + resourceVersion: "493" + uid: 6d733c56-2f3c-48f3-a918-26ec465f5f77 + rules: + - apiGroups: + - "" + resources: + - secrets + verbs: + - get + - create +- apiVersion: rbac.authorization.k8s.io/v1 + kind: Role + metadata: + creationTimestamp: "2024-12-26T23:24:19Z" + managedFields: + - apiVersion: rbac.authorization.k8s.io/v1 + fieldsType: FieldsV1 + fieldsV1: + f:rules: {} + manager: kubeadm + operation: Update + time: "2024-12-26T23:24:19Z" + name: kubeadm:bootstrap-signer-clusterinfo + namespace: kube-public + resourceVersion: "229" + uid: a199368f-1eab-4a52-b106-85cee140a5e2 + rules: + - apiGroups: + - "" + resourceNames: + - cluster-info + resources: + - configmaps + verbs: + - get +- apiVersion: rbac.authorization.k8s.io/v1 + kind: Role + metadata: + annotations: + rbac.authorization.kubernetes.io/autoupdate: "true" + creationTimestamp: "2024-12-26T23:24:17Z" + labels: + kubernetes.io/bootstrapping: rbac-defaults + managedFields: + - apiVersion: rbac.authorization.k8s.io/v1 + fieldsType: FieldsV1 + fieldsV1: + f:metadata: + f:annotations: + .: {} + f:rbac.authorization.kubernetes.io/autoupdate: {} + f:labels: + .: {} + f:kubernetes.io/bootstrapping: {} + f:rules: {} + manager: kube-apiserver + operation: Update + time: "2024-12-26T23:24:17Z" + name: system:controller:bootstrap-signer + namespace: kube-public + resourceVersion: "179" + uid: 4afb6345-8515-4521-ab0d-4dedfe91285b + rules: + - apiGroups: + - "" + resources: + - configmaps + verbs: + - get + - list + - watch + - apiGroups: + - "" + resourceNames: + - cluster-info + resources: + - configmaps + verbs: + - update + - apiGroups: + - "" + - events.k8s.io + resources: + - events + verbs: + - create + - patch + - update +- apiVersion: rbac.authorization.k8s.io/v1 + kind: Role + metadata: + annotations: + rbac.authorization.kubernetes.io/autoupdate: "true" + creationTimestamp: "2024-12-26T23:24:17Z" + labels: + kubernetes.io/bootstrapping: rbac-defaults + managedFields: + - apiVersion: rbac.authorization.k8s.io/v1 + fieldsType: FieldsV1 + fieldsV1: + f:metadata: + f:annotations: + .: {} + f:rbac.authorization.kubernetes.io/autoupdate: {} + f:labels: + .: {} + f:kubernetes.io/bootstrapping: {} + f:rules: {} + manager: kube-apiserver + operation: Update + time: "2024-12-26T23:24:17Z" + name: extension-apiserver-authentication-reader + namespace: kube-system + resourceVersion: "180" + uid: 1c7ac7bb-5708-4d8a-bc81-65fcca84be41 + rules: + - apiGroups: + - "" + resourceNames: + - extension-apiserver-authentication + resources: + - configmaps + verbs: + - get + - list + - watch +- apiVersion: rbac.authorization.k8s.io/v1 + kind: Role + metadata: + creationTimestamp: "2024-12-26T23:24:19Z" + managedFields: + - apiVersion: rbac.authorization.k8s.io/v1 + fieldsType: FieldsV1 + fieldsV1: + f:rules: {} + manager: kubeadm + operation: Update + time: "2024-12-26T23:24:19Z" + name: kube-proxy + namespace: kube-system + resourceVersion: "242" + uid: de60cbd3-36ef-4049-a199-d9102309a102 + rules: + - apiGroups: + - "" + resourceNames: + - kube-proxy + resources: + - configmaps + verbs: + - get +- apiVersion: rbac.authorization.k8s.io/v1 + kind: Role + metadata: + creationTimestamp: "2024-12-26T23:24:18Z" + managedFields: + - apiVersion: rbac.authorization.k8s.io/v1 + fieldsType: FieldsV1 + fieldsV1: + f:rules: {} + manager: kubeadm + operation: Update + time: "2024-12-26T23:24:18Z" + name: kubeadm:kubelet-config + namespace: kube-system + resourceVersion: "203" + uid: c6fea816-668c-492e-a6e5-7a045a1e452d + rules: + - apiGroups: + - "" + resourceNames: + - kubelet-config + resources: + - configmaps + verbs: + - get +- apiVersion: rbac.authorization.k8s.io/v1 + kind: Role + metadata: + creationTimestamp: "2024-12-26T23:24:18Z" + managedFields: + - apiVersion: rbac.authorization.k8s.io/v1 + fieldsType: FieldsV1 + fieldsV1: + f:rules: {} + manager: kubeadm + operation: Update + time: "2024-12-26T23:24:18Z" + name: kubeadm:nodes-kubeadm-config + namespace: kube-system + resourceVersion: "200" + uid: 075ef39f-bf9c-4969-a61f-a7f2d1a2e0f2 + rules: + - apiGroups: + - "" + resourceNames: + - kubeadm-config + resources: + - configmaps + verbs: + - get +- apiVersion: rbac.authorization.k8s.io/v1 + kind: Role + metadata: + annotations: + rbac.authorization.kubernetes.io/autoupdate: "true" + creationTimestamp: "2024-12-26T23:24:17Z" + labels: + kubernetes.io/bootstrapping: rbac-defaults + managedFields: + - apiVersion: rbac.authorization.k8s.io/v1 + fieldsType: FieldsV1 + fieldsV1: + f:metadata: + f:annotations: + .: {} + f:rbac.authorization.kubernetes.io/autoupdate: {} + f:labels: + .: {} + f:kubernetes.io/bootstrapping: {} + f:rules: {} + manager: kube-apiserver + operation: Update + time: "2024-12-26T23:24:17Z" + name: system::leader-locking-kube-controller-manager + namespace: kube-system + resourceVersion: "184" + uid: 25cf874d-a294-43a9-8393-d175776447b4 + rules: + - apiGroups: + - "" + resources: + - configmaps + verbs: + - watch + - apiGroups: + - "" + resourceNames: + - kube-controller-manager + resources: + - configmaps + verbs: + - get + - update +- apiVersion: rbac.authorization.k8s.io/v1 + kind: Role + metadata: + annotations: + rbac.authorization.kubernetes.io/autoupdate: "true" + creationTimestamp: "2024-12-26T23:24:17Z" + labels: + kubernetes.io/bootstrapping: rbac-defaults + managedFields: + - apiVersion: rbac.authorization.k8s.io/v1 + fieldsType: FieldsV1 + fieldsV1: + f:metadata: + f:annotations: + .: {} + f:rbac.authorization.kubernetes.io/autoupdate: {} + f:labels: + .: {} + f:kubernetes.io/bootstrapping: {} + f:rules: {} + manager: kube-apiserver + operation: Update + time: "2024-12-26T23:24:17Z" + name: system::leader-locking-kube-scheduler + namespace: kube-system + resourceVersion: "185" + uid: c23c1e96-5f2c-4ae2-a6d1-e41b10a8bbb2 + rules: + - apiGroups: + - "" + resources: + - configmaps + verbs: + - watch + - apiGroups: + - "" + resourceNames: + - kube-scheduler + resources: + - configmaps + verbs: + - get + - update +- apiVersion: rbac.authorization.k8s.io/v1 + kind: Role + metadata: + annotations: + rbac.authorization.kubernetes.io/autoupdate: "true" + creationTimestamp: "2024-12-26T23:24:17Z" + labels: + kubernetes.io/bootstrapping: rbac-defaults + managedFields: + - apiVersion: rbac.authorization.k8s.io/v1 + fieldsType: FieldsV1 + fieldsV1: + f:metadata: + f:annotations: + .: {} + f:rbac.authorization.kubernetes.io/autoupdate: {} + f:labels: + .: {} + f:kubernetes.io/bootstrapping: {} + f:rules: {} + manager: kube-apiserver + operation: Update + time: "2024-12-26T23:24:17Z" + name: system:controller:bootstrap-signer + namespace: kube-system + resourceVersion: "181" + uid: eeeb29b6-2852-42e4-ac9b-64cb4d8457f0 + rules: + - apiGroups: + - "" + resources: + - secrets + verbs: + - get + - list + - watch +- apiVersion: rbac.authorization.k8s.io/v1 + kind: Role + metadata: + annotations: + rbac.authorization.kubernetes.io/autoupdate: "true" + creationTimestamp: "2024-12-26T23:24:17Z" + labels: + kubernetes.io/bootstrapping: rbac-defaults + managedFields: + - apiVersion: rbac.authorization.k8s.io/v1 + fieldsType: FieldsV1 + fieldsV1: + f:metadata: + f:annotations: + .: {} + f:rbac.authorization.kubernetes.io/autoupdate: {} + f:labels: + .: {} + f:kubernetes.io/bootstrapping: {} + f:rules: {} + manager: kube-apiserver + operation: Update + time: "2024-12-26T23:24:17Z" + name: system:controller:cloud-provider + namespace: kube-system + resourceVersion: "182" + uid: 0a72be4e-38e8-4723-b5f5-c82e5a98969d + rules: + - apiGroups: + - "" + resources: + - configmaps + verbs: + - create + - get + - list + - watch +- apiVersion: rbac.authorization.k8s.io/v1 + kind: Role + metadata: + annotations: + rbac.authorization.kubernetes.io/autoupdate: "true" + creationTimestamp: "2024-12-26T23:24:17Z" + labels: + kubernetes.io/bootstrapping: rbac-defaults + managedFields: + - apiVersion: rbac.authorization.k8s.io/v1 + fieldsType: FieldsV1 + fieldsV1: + f:metadata: + f:annotations: + .: {} + f:rbac.authorization.kubernetes.io/autoupdate: {} + f:labels: + .: {} + f:kubernetes.io/bootstrapping: {} + f:rules: {} + manager: kube-apiserver + operation: Update + time: "2024-12-26T23:24:17Z" + name: system:controller:token-cleaner + namespace: kube-system + resourceVersion: "183" + uid: 20f42249-0519-46eb-a4ac-e4e00879bb13 + rules: + - apiGroups: + - "" + resources: + - secrets + verbs: + - delete + - get + - list + - watch + - apiGroups: + - "" + - events.k8s.io + resources: + - events + verbs: + - create + - patch + - update +- apiVersion: rbac.authorization.k8s.io/v1 + kind: Role + metadata: + annotations: + kubectl.kubernetes.io/last-applied-configuration: | + {"apiVersion":"rbac.authorization.k8s.io/v1","kind":"Role","metadata":{"annotations":{},"labels":{"addonmanager.kubernetes.io/mode":"EnsureExists"},"name":"system:persistent-volume-provisioner","namespace":"kube-system"},"rules":[{"apiGroups":[""],"resources":["endpoints"],"verbs":["watch","create"]},{"apiGroups":[""],"resourceNames":["k8s.io-minikube-hostpath"],"resources":["endpoints"],"verbs":["get","update","create"]}]} + creationTimestamp: "2024-12-26T23:24:21Z" + labels: + addonmanager.kubernetes.io/mode: EnsureExists + managedFields: + - apiVersion: rbac.authorization.k8s.io/v1 + fieldsType: FieldsV1 + fieldsV1: + f:metadata: + f:annotations: + .: {} + f:kubectl.kubernetes.io/last-applied-configuration: {} + f:labels: + .: {} + f:addonmanager.kubernetes.io/mode: {} + f:rules: {} + manager: kubectl-client-side-apply + operation: Update + time: "2024-12-26T23:24:21Z" + name: system:persistent-volume-provisioner + namespace: kube-system + resourceVersion: "260" + uid: 90a003d2-0962-4567-ab09-6f08705523c1 + rules: + - apiGroups: + - "" + resources: + - endpoints + verbs: + - watch + - create + - apiGroups: + - "" + resourceNames: + - k8s.io-minikube-hostpath + resources: + - endpoints + verbs: + - get + - update + - create +- apiVersion: rbac.authorization.k8s.io/v1 + kind: Role + metadata: + annotations: + kubectl.kubernetes.io/last-applied-configuration: | + {"apiVersion":"rbac.authorization.k8s.io/v1","kind":"Role","metadata":{"annotations":{},"labels":{"addonmanager.kubernetes.io/mode":"Reconcile","k8s-app":"kubernetes-dashboard","kubernetes.io/minikube-addons":"dashboard"},"name":"kubernetes-dashboard","namespace":"kubernetes-dashboard"},"rules":[{"apiGroups":[""],"resourceNames":["kubernetes-dashboard-key-holder","kubernetes-dashboard-certs","kubernetes-dashboard-csrf"],"resources":["secrets"],"verbs":["get","update","delete"]},{"apiGroups":[""],"resourceNames":["kubernetes-dashboard-settings"],"resources":["configmaps"],"verbs":["get","update"]},{"apiGroups":[""],"resourceNames":["heapster","dashboard-metrics-scraper"],"resources":["services"],"verbs":["proxy"]},{"apiGroups":[""],"resourceNames":["heapster","http:heapster:","https:heapster:","dashboard-metrics-scraper","http:dashboard-metrics-scraper"],"resources":["services/proxy"],"verbs":["get"]}]} + creationTimestamp: "2024-12-26T23:24:32Z" + labels: + addonmanager.kubernetes.io/mode: Reconcile + k8s-app: kubernetes-dashboard + kubernetes.io/minikube-addons: dashboard + managedFields: + - apiVersion: rbac.authorization.k8s.io/v1 + fieldsType: FieldsV1 + fieldsV1: + f:metadata: + f:annotations: + .: {} + f:kubectl.kubernetes.io/last-applied-configuration: {} + f:labels: + .: {} + f:addonmanager.kubernetes.io/mode: {} + f:k8s-app: {} + f:kubernetes.io/minikube-addons: {} + f:rules: {} + manager: kubectl-client-side-apply + operation: Update + time: "2024-12-26T23:24:32Z" + name: kubernetes-dashboard + namespace: kubernetes-dashboard + resourceVersion: "344" + uid: b5e66e4c-bb30-4ce7-8e68-9d85b3cb4564 + rules: + - apiGroups: + - "" + resourceNames: + - kubernetes-dashboard-key-holder + - kubernetes-dashboard-certs + - kubernetes-dashboard-csrf + resources: + - secrets + verbs: + - get + - update + - delete + - apiGroups: + - "" + resourceNames: + - kubernetes-dashboard-settings + resources: + - configmaps + verbs: + - get + - update + - apiGroups: + - "" + resourceNames: + - heapster + - dashboard-metrics-scraper + resources: + - services + verbs: + - proxy + - apiGroups: + - "" + resourceNames: + - heapster + - 'http:heapster:' + - 'https:heapster:' + - dashboard-metrics-scraper + - http:dashboard-metrics-scraper + resources: + - services/proxy + verbs: + - get +- apiVersion: rbac.authorization.k8s.io/v1 + kind: RoleBinding + metadata: + annotations: + kubectl.kubernetes.io/last-applied-configuration: | + {"apiVersion":"rbac.authorization.k8s.io/v1","kind":"RoleBinding","metadata":{"annotations":{},"labels":{"app.kubernetes.io/component":"controller","app.kubernetes.io/instance":"ingress-nginx","app.kubernetes.io/name":"ingress-nginx"},"name":"ingress-nginx","namespace":"ingress-nginx"},"roleRef":{"apiGroup":"rbac.authorization.k8s.io","kind":"Role","name":"ingress-nginx"},"subjects":[{"kind":"ServiceAccount","name":"ingress-nginx","namespace":"ingress-nginx"}]} + creationTimestamp: "2024-12-26T23:25:47Z" + labels: + app.kubernetes.io/component: controller + app.kubernetes.io/instance: ingress-nginx + app.kubernetes.io/name: ingress-nginx + managedFields: + - apiVersion: rbac.authorization.k8s.io/v1 + fieldsType: FieldsV1 + fieldsV1: + f:metadata: + f:annotations: + .: {} + f:kubectl.kubernetes.io/last-applied-configuration: {} + f:labels: + .: {} + f:app.kubernetes.io/component: {} + f:app.kubernetes.io/instance: {} + f:app.kubernetes.io/name: {} + f:roleRef: {} + f:subjects: {} + manager: kubectl-client-side-apply + operation: Update + time: "2024-12-26T23:25:47Z" + name: ingress-nginx + namespace: ingress-nginx + resourceVersion: "496" + uid: 72122120-3e79-4e28-a854-7d175414322f + roleRef: + apiGroup: rbac.authorization.k8s.io + kind: Role + name: ingress-nginx + subjects: + - kind: ServiceAccount + name: ingress-nginx + namespace: ingress-nginx +- apiVersion: rbac.authorization.k8s.io/v1 + kind: RoleBinding + metadata: + annotations: + kubectl.kubernetes.io/last-applied-configuration: | + {"apiVersion":"rbac.authorization.k8s.io/v1","kind":"RoleBinding","metadata":{"annotations":{},"labels":{"app.kubernetes.io/component":"admission-webhook","app.kubernetes.io/instance":"ingress-nginx","app.kubernetes.io/name":"ingress-nginx"},"name":"ingress-nginx-admission","namespace":"ingress-nginx"},"roleRef":{"apiGroup":"rbac.authorization.k8s.io","kind":"Role","name":"ingress-nginx-admission"},"subjects":[{"kind":"ServiceAccount","name":"ingress-nginx-admission","namespace":"ingress-nginx"}]} + creationTimestamp: "2024-12-26T23:25:47Z" + labels: + app.kubernetes.io/component: admission-webhook + app.kubernetes.io/instance: ingress-nginx + app.kubernetes.io/name: ingress-nginx + managedFields: + - apiVersion: rbac.authorization.k8s.io/v1 + fieldsType: FieldsV1 + fieldsV1: + f:metadata: + f:annotations: + .: {} + f:kubectl.kubernetes.io/last-applied-configuration: {} + f:labels: + .: {} + f:app.kubernetes.io/component: {} + f:app.kubernetes.io/instance: {} + f:app.kubernetes.io/name: {} + f:roleRef: {} + f:subjects: {} + manager: kubectl-client-side-apply + operation: Update + time: "2024-12-26T23:25:47Z" + name: ingress-nginx-admission + namespace: ingress-nginx + resourceVersion: "497" + uid: 2b4f4703-3abd-43a0-b4a4-c33af70dac07 + roleRef: + apiGroup: rbac.authorization.k8s.io + kind: Role + name: ingress-nginx-admission + subjects: + - kind: ServiceAccount + name: ingress-nginx-admission + namespace: ingress-nginx +- apiVersion: rbac.authorization.k8s.io/v1 + kind: RoleBinding + metadata: + creationTimestamp: "2024-12-26T23:24:19Z" + managedFields: + - apiVersion: rbac.authorization.k8s.io/v1 + fieldsType: FieldsV1 + fieldsV1: + f:roleRef: {} + f:subjects: {} + manager: kubeadm + operation: Update + time: "2024-12-26T23:24:19Z" + name: kubeadm:bootstrap-signer-clusterinfo + namespace: kube-public + resourceVersion: "230" + uid: fffa43ed-79d4-47e5-be0b-e6c905eed3f4 + roleRef: + apiGroup: rbac.authorization.k8s.io + kind: Role + name: kubeadm:bootstrap-signer-clusterinfo + subjects: + - apiGroup: rbac.authorization.k8s.io + kind: User + name: system:anonymous +- apiVersion: rbac.authorization.k8s.io/v1 + kind: RoleBinding + metadata: + annotations: + rbac.authorization.kubernetes.io/autoupdate: "true" + creationTimestamp: "2024-12-26T23:24:17Z" + labels: + kubernetes.io/bootstrapping: rbac-defaults + managedFields: + - apiVersion: rbac.authorization.k8s.io/v1 + fieldsType: FieldsV1 + fieldsV1: + f:metadata: + f:annotations: + .: {} + f:rbac.authorization.kubernetes.io/autoupdate: {} + f:labels: + .: {} + f:kubernetes.io/bootstrapping: {} + f:roleRef: {} + f:subjects: {} + manager: kube-apiserver + operation: Update + time: "2024-12-26T23:24:17Z" + name: system:controller:bootstrap-signer + namespace: kube-public + resourceVersion: "192" + uid: 26972f7c-8fe8-43d5-9808-ea88401806b3 + roleRef: + apiGroup: rbac.authorization.k8s.io + kind: Role + name: system:controller:bootstrap-signer + subjects: + - kind: ServiceAccount + name: bootstrap-signer + namespace: kube-system +- apiVersion: rbac.authorization.k8s.io/v1 + kind: RoleBinding + metadata: + creationTimestamp: "2024-12-26T23:24:19Z" + managedFields: + - apiVersion: rbac.authorization.k8s.io/v1 + fieldsType: FieldsV1 + fieldsV1: + f:roleRef: {} + f:subjects: {} + manager: kubeadm + operation: Update + time: "2024-12-26T23:24:19Z" + name: kube-proxy + namespace: kube-system + resourceVersion: "245" + uid: d79dc7e5-e8be-4fe0-94a0-1d4ab7881bdf + roleRef: + apiGroup: rbac.authorization.k8s.io + kind: Role + name: kube-proxy + subjects: + - apiGroup: rbac.authorization.k8s.io + kind: Group + name: system:bootstrappers:kubeadm:default-node-token +- apiVersion: rbac.authorization.k8s.io/v1 + kind: RoleBinding + metadata: + creationTimestamp: "2024-12-26T23:24:18Z" + managedFields: + - apiVersion: rbac.authorization.k8s.io/v1 + fieldsType: FieldsV1 + fieldsV1: + f:roleRef: {} + f:subjects: {} + manager: kubeadm + operation: Update + time: "2024-12-26T23:24:18Z" + name: kubeadm:kubelet-config + namespace: kube-system + resourceVersion: "204" + uid: abeb7a6b-fbf6-444e-8f05-b945dc621d97 + roleRef: + apiGroup: rbac.authorization.k8s.io + kind: Role + name: kubeadm:kubelet-config + subjects: + - apiGroup: rbac.authorization.k8s.io + kind: Group + name: system:nodes + - apiGroup: rbac.authorization.k8s.io + kind: Group + name: system:bootstrappers:kubeadm:default-node-token +- apiVersion: rbac.authorization.k8s.io/v1 + kind: RoleBinding + metadata: + creationTimestamp: "2024-12-26T23:24:18Z" + managedFields: + - apiVersion: rbac.authorization.k8s.io/v1 + fieldsType: FieldsV1 + fieldsV1: + f:roleRef: {} + f:subjects: {} + manager: kubeadm + operation: Update + time: "2024-12-26T23:24:18Z" + name: kubeadm:nodes-kubeadm-config + namespace: kube-system + resourceVersion: "201" + uid: 20cbd096-8e3f-46ef-8e66-eb3052a6e6b3 + roleRef: + apiGroup: rbac.authorization.k8s.io + kind: Role + name: kubeadm:nodes-kubeadm-config + subjects: + - apiGroup: rbac.authorization.k8s.io + kind: Group + name: system:bootstrappers:kubeadm:default-node-token + - apiGroup: rbac.authorization.k8s.io + kind: Group + name: system:nodes +- apiVersion: rbac.authorization.k8s.io/v1 + kind: RoleBinding + metadata: + annotations: + kubectl.kubernetes.io/last-applied-configuration: | + {"apiVersion":"rbac.authorization.k8s.io/v1","kind":"RoleBinding","metadata":{"annotations":{},"labels":{"addonmanager.kubernetes.io/mode":"Reconcile","k8s-app":"metrics-server"},"name":"metrics-server-auth-reader","namespace":"kube-system"},"roleRef":{"apiGroup":"rbac.authorization.k8s.io","kind":"Role","name":"extension-apiserver-authentication-reader"},"subjects":[{"kind":"ServiceAccount","name":"metrics-server","namespace":"kube-system"}]} + creationTimestamp: "2024-12-26T23:26:51Z" + labels: + addonmanager.kubernetes.io/mode: Reconcile + k8s-app: metrics-server + managedFields: + - apiVersion: rbac.authorization.k8s.io/v1 + fieldsType: FieldsV1 + fieldsV1: + f:metadata: + f:annotations: + .: {} + f:kubectl.kubernetes.io/last-applied-configuration: {} + f:labels: + .: {} + f:addonmanager.kubernetes.io/mode: {} + f:k8s-app: {} + f:roleRef: {} + f:subjects: {} + manager: kubectl-client-side-apply + operation: Update + time: "2024-12-26T23:26:51Z" + name: metrics-server-auth-reader + namespace: kube-system + resourceVersion: "654" + uid: 0eda289e-0ae8-451c-bb63-c8b20580f130 + roleRef: + apiGroup: rbac.authorization.k8s.io + kind: Role + name: extension-apiserver-authentication-reader + subjects: + - kind: ServiceAccount + name: metrics-server + namespace: kube-system +- apiVersion: rbac.authorization.k8s.io/v1 + kind: RoleBinding + metadata: + annotations: + rbac.authorization.kubernetes.io/autoupdate: "true" + creationTimestamp: "2024-12-26T23:24:17Z" + labels: + kubernetes.io/bootstrapping: rbac-defaults + managedFields: + - apiVersion: rbac.authorization.k8s.io/v1 + fieldsType: FieldsV1 + fieldsV1: + f:metadata: + f:annotations: + .: {} + f:rbac.authorization.kubernetes.io/autoupdate: {} + f:labels: + .: {} + f:kubernetes.io/bootstrapping: {} + f:roleRef: {} + f:subjects: {} + manager: kube-apiserver + operation: Update + time: "2024-12-26T23:24:17Z" + name: system::extension-apiserver-authentication-reader + namespace: kube-system + resourceVersion: "186" + uid: 26fcb4ec-60dd-4e71-b1cc-62c06b2a36d7 + roleRef: + apiGroup: rbac.authorization.k8s.io + kind: Role + name: extension-apiserver-authentication-reader + subjects: + - apiGroup: rbac.authorization.k8s.io + kind: User + name: system:kube-controller-manager + - apiGroup: rbac.authorization.k8s.io + kind: User + name: system:kube-scheduler +- apiVersion: rbac.authorization.k8s.io/v1 + kind: RoleBinding + metadata: + annotations: + rbac.authorization.kubernetes.io/autoupdate: "true" + creationTimestamp: "2024-12-26T23:24:17Z" + labels: + kubernetes.io/bootstrapping: rbac-defaults + managedFields: + - apiVersion: rbac.authorization.k8s.io/v1 + fieldsType: FieldsV1 + fieldsV1: + f:metadata: + f:annotations: + .: {} + f:rbac.authorization.kubernetes.io/autoupdate: {} + f:labels: + .: {} + f:kubernetes.io/bootstrapping: {} + f:roleRef: {} + f:subjects: {} + manager: kube-apiserver + operation: Update + time: "2024-12-26T23:24:17Z" + name: system::leader-locking-kube-controller-manager + namespace: kube-system + resourceVersion: "187" + uid: 61f48dc8-18f6-4f07-b414-247c7d5bf518 + roleRef: + apiGroup: rbac.authorization.k8s.io + kind: Role + name: system::leader-locking-kube-controller-manager + subjects: + - apiGroup: rbac.authorization.k8s.io + kind: User + name: system:kube-controller-manager + - kind: ServiceAccount + name: kube-controller-manager + namespace: kube-system +- apiVersion: rbac.authorization.k8s.io/v1 + kind: RoleBinding + metadata: + annotations: + rbac.authorization.kubernetes.io/autoupdate: "true" + creationTimestamp: "2024-12-26T23:24:17Z" + labels: + kubernetes.io/bootstrapping: rbac-defaults + managedFields: + - apiVersion: rbac.authorization.k8s.io/v1 + fieldsType: FieldsV1 + fieldsV1: + f:metadata: + f:annotations: + .: {} + f:rbac.authorization.kubernetes.io/autoupdate: {} + f:labels: + .: {} + f:kubernetes.io/bootstrapping: {} + f:roleRef: {} + f:subjects: {} + manager: kube-apiserver + operation: Update + time: "2024-12-26T23:24:17Z" + name: system::leader-locking-kube-scheduler + namespace: kube-system + resourceVersion: "188" + uid: a2fd47cc-74c8-4dfc-b5a7-b9159f8fee90 + roleRef: + apiGroup: rbac.authorization.k8s.io + kind: Role + name: system::leader-locking-kube-scheduler + subjects: + - apiGroup: rbac.authorization.k8s.io + kind: User + name: system:kube-scheduler + - kind: ServiceAccount + name: kube-scheduler + namespace: kube-system +- apiVersion: rbac.authorization.k8s.io/v1 + kind: RoleBinding + metadata: + annotations: + rbac.authorization.kubernetes.io/autoupdate: "true" + creationTimestamp: "2024-12-26T23:24:17Z" + labels: + kubernetes.io/bootstrapping: rbac-defaults + managedFields: + - apiVersion: rbac.authorization.k8s.io/v1 + fieldsType: FieldsV1 + fieldsV1: + f:metadata: + f:annotations: + .: {} + f:rbac.authorization.kubernetes.io/autoupdate: {} + f:labels: + .: {} + f:kubernetes.io/bootstrapping: {} + f:roleRef: {} + f:subjects: {} + manager: kube-apiserver + operation: Update + time: "2024-12-26T23:24:17Z" + name: system:controller:bootstrap-signer + namespace: kube-system + resourceVersion: "189" + uid: 1b696bb4-5b5a-45e5-aa83-c34eda440d39 + roleRef: + apiGroup: rbac.authorization.k8s.io + kind: Role + name: system:controller:bootstrap-signer + subjects: + - kind: ServiceAccount + name: bootstrap-signer + namespace: kube-system +- apiVersion: rbac.authorization.k8s.io/v1 + kind: RoleBinding + metadata: + annotations: + rbac.authorization.kubernetes.io/autoupdate: "true" + creationTimestamp: "2024-12-26T23:24:17Z" + labels: + kubernetes.io/bootstrapping: rbac-defaults + managedFields: + - apiVersion: rbac.authorization.k8s.io/v1 + fieldsType: FieldsV1 + fieldsV1: + f:metadata: + f:annotations: + .: {} + f:rbac.authorization.kubernetes.io/autoupdate: {} + f:labels: + .: {} + f:kubernetes.io/bootstrapping: {} + f:roleRef: {} + f:subjects: {} + manager: kube-apiserver + operation: Update + time: "2024-12-26T23:24:17Z" + name: system:controller:cloud-provider + namespace: kube-system + resourceVersion: "190" + uid: 751df838-7f39-4e47-bb04-cebbe7a4a289 + roleRef: + apiGroup: rbac.authorization.k8s.io + kind: Role + name: system:controller:cloud-provider + subjects: + - kind: ServiceAccount + name: cloud-provider + namespace: kube-system +- apiVersion: rbac.authorization.k8s.io/v1 + kind: RoleBinding + metadata: + annotations: + rbac.authorization.kubernetes.io/autoupdate: "true" + creationTimestamp: "2024-12-26T23:24:17Z" + labels: + kubernetes.io/bootstrapping: rbac-defaults + managedFields: + - apiVersion: rbac.authorization.k8s.io/v1 + fieldsType: FieldsV1 + fieldsV1: + f:metadata: + f:annotations: + .: {} + f:rbac.authorization.kubernetes.io/autoupdate: {} + f:labels: + .: {} + f:kubernetes.io/bootstrapping: {} + f:roleRef: {} + f:subjects: {} + manager: kube-apiserver + operation: Update + time: "2024-12-26T23:24:17Z" + name: system:controller:token-cleaner + namespace: kube-system + resourceVersion: "191" + uid: 4ff468ca-620f-4d1c-9588-2f124ad4811a + roleRef: + apiGroup: rbac.authorization.k8s.io + kind: Role + name: system:controller:token-cleaner + subjects: + - kind: ServiceAccount + name: token-cleaner + namespace: kube-system +- apiVersion: rbac.authorization.k8s.io/v1 + kind: RoleBinding + metadata: + annotations: + kubectl.kubernetes.io/last-applied-configuration: | + {"apiVersion":"rbac.authorization.k8s.io/v1","kind":"RoleBinding","metadata":{"annotations":{},"labels":{"addonmanager.kubernetes.io/mode":"EnsureExists"},"name":"system:persistent-volume-provisioner","namespace":"kube-system"},"roleRef":{"apiGroup":"rbac.authorization.k8s.io","kind":"Role","name":"system:persistent-volume-provisioner"},"subjects":[{"kind":"ServiceAccount","name":"storage-provisioner","namespace":"kube-system"}]} + creationTimestamp: "2024-12-26T23:24:21Z" + labels: + addonmanager.kubernetes.io/mode: EnsureExists + managedFields: + - apiVersion: rbac.authorization.k8s.io/v1 + fieldsType: FieldsV1 + fieldsV1: + f:metadata: + f:annotations: + .: {} + f:kubectl.kubernetes.io/last-applied-configuration: {} + f:labels: + .: {} + f:addonmanager.kubernetes.io/mode: {} + f:roleRef: {} + f:subjects: {} + manager: kubectl-client-side-apply + operation: Update + time: "2024-12-26T23:24:21Z" + name: system:persistent-volume-provisioner + namespace: kube-system + resourceVersion: "261" + uid: 680277cb-5800-46ac-939e-7ecfcaa6c724 + roleRef: + apiGroup: rbac.authorization.k8s.io + kind: Role + name: system:persistent-volume-provisioner + subjects: + - kind: ServiceAccount + name: storage-provisioner + namespace: kube-system +- apiVersion: rbac.authorization.k8s.io/v1 + kind: RoleBinding + metadata: + annotations: + kubectl.kubernetes.io/last-applied-configuration: | + {"apiVersion":"rbac.authorization.k8s.io/v1","kind":"RoleBinding","metadata":{"annotations":{},"labels":{"addonmanager.kubernetes.io/mode":"Reconcile","k8s-app":"kubernetes-dashboard","kubernetes.io/minikube-addons":"dashboard"},"name":"kubernetes-dashboard","namespace":"kubernetes-dashboard"},"roleRef":{"apiGroup":"rbac.authorization.k8s.io","kind":"Role","name":"kubernetes-dashboard"},"subjects":[{"kind":"ServiceAccount","name":"kubernetes-dashboard","namespace":"kubernetes-dashboard"}]} + creationTimestamp: "2024-12-26T23:24:32Z" + labels: + addonmanager.kubernetes.io/mode: Reconcile + k8s-app: kubernetes-dashboard + kubernetes.io/minikube-addons: dashboard + managedFields: + - apiVersion: rbac.authorization.k8s.io/v1 + fieldsType: FieldsV1 + fieldsV1: + f:metadata: + f:annotations: + .: {} + f:kubectl.kubernetes.io/last-applied-configuration: {} + f:labels: + .: {} + f:addonmanager.kubernetes.io/mode: {} + f:k8s-app: {} + f:kubernetes.io/minikube-addons: {} + f:roleRef: {} + f:subjects: {} + manager: kubectl-client-side-apply + operation: Update + time: "2024-12-26T23:24:32Z" + name: kubernetes-dashboard + namespace: kubernetes-dashboard + resourceVersion: "346" + uid: a6e5a990-f256-4910-950e-2419bfa3230a + roleRef: + apiGroup: rbac.authorization.k8s.io + kind: Role + name: kubernetes-dashboard + subjects: + - kind: ServiceAccount + name: kubernetes-dashboard + namespace: kubernetes-dashboard +- apiVersion: v1 + kind: ServiceAccount + metadata: + creationTimestamp: "2024-12-26T23:24:31Z" + name: default + namespace: default + resourceVersion: "314" + uid: 56ce5b99-fb97-40b6-a220-0eff6fd067e5 +- apiVersion: v1 + kind: ServiceAccount + metadata: + creationTimestamp: "2024-12-26T23:25:47Z" + name: default + namespace: ingress-nginx + resourceVersion: "489" + uid: 40c2ad97-aa43-4d0d-988a-bf744ef0eb74 +- apiVersion: v1 + automountServiceAccountToken: true + kind: ServiceAccount + metadata: + annotations: + kubectl.kubernetes.io/last-applied-configuration: | + {"apiVersion":"v1","automountServiceAccountToken":true,"kind":"ServiceAccount","metadata":{"annotations":{},"labels":{"app.kubernetes.io/component":"controller","app.kubernetes.io/instance":"ingress-nginx","app.kubernetes.io/name":"ingress-nginx"},"name":"ingress-nginx","namespace":"ingress-nginx"}} + creationTimestamp: "2024-12-26T23:25:47Z" + labels: + app.kubernetes.io/component: controller + app.kubernetes.io/instance: ingress-nginx + app.kubernetes.io/name: ingress-nginx + managedFields: + - apiVersion: v1 + fieldsType: FieldsV1 + fieldsV1: + f:automountServiceAccountToken: {} + f:metadata: + f:annotations: + .: {} + f:kubectl.kubernetes.io/last-applied-configuration: {} + f:labels: + .: {} + f:app.kubernetes.io/component: {} + f:app.kubernetes.io/instance: {} + f:app.kubernetes.io/name: {} + manager: kubectl-client-side-apply + operation: Update + time: "2024-12-26T23:25:47Z" + name: ingress-nginx + namespace: ingress-nginx + resourceVersion: "490" + uid: 5c7d4f04-ef53-40a2-b688-9fc3c063e1d2 +- apiVersion: v1 + kind: ServiceAccount + metadata: + annotations: + kubectl.kubernetes.io/last-applied-configuration: | + {"apiVersion":"v1","kind":"ServiceAccount","metadata":{"annotations":{},"labels":{"app.kubernetes.io/component":"admission-webhook","app.kubernetes.io/instance":"ingress-nginx","app.kubernetes.io/name":"ingress-nginx"},"name":"ingress-nginx-admission","namespace":"ingress-nginx"}} + creationTimestamp: "2024-12-26T23:25:47Z" + labels: + app.kubernetes.io/component: admission-webhook + app.kubernetes.io/instance: ingress-nginx + app.kubernetes.io/name: ingress-nginx + managedFields: + - apiVersion: v1 + fieldsType: FieldsV1 + fieldsV1: + f:metadata: + f:annotations: + .: {} + f:kubectl.kubernetes.io/last-applied-configuration: {} + f:labels: + .: {} + f:app.kubernetes.io/component: {} + f:app.kubernetes.io/instance: {} + f:app.kubernetes.io/name: {} + manager: kubectl-client-side-apply + operation: Update + time: "2024-12-26T23:25:47Z" + name: ingress-nginx-admission + namespace: ingress-nginx + resourceVersion: "491" + uid: 3b41c7f7-d882-45cb-8bab-82b66bc52cfe +- apiVersion: v1 + kind: ServiceAccount + metadata: + creationTimestamp: "2024-12-26T23:24:31Z" + name: default + namespace: kube-node-lease + resourceVersion: "313" + uid: adb868a5-43a9-4cfc-91ee-d812433cdabc +- apiVersion: v1 + kind: ServiceAccount + metadata: + creationTimestamp: "2024-12-26T23:24:31Z" + name: default + namespace: kube-public + resourceVersion: "312" + uid: e2ef593c-a055-4ca1-894e-a0777c357723 +- apiVersion: v1 + kind: ServiceAccount + metadata: + creationTimestamp: "2024-12-26T23:24:18Z" + name: attachdetach-controller + namespace: kube-system + resourceVersion: "216" + uid: 0cd0911d-9e56-487a-946b-56670cc4088c +- apiVersion: v1 + kind: ServiceAccount + metadata: + creationTimestamp: "2024-12-26T23:24:18Z" + name: bootstrap-signer + namespace: kube-system + resourceVersion: "210" + uid: f2be5467-09f5-473b-9121-879a5231603d +- apiVersion: v1 + kind: ServiceAccount + metadata: + creationTimestamp: "2024-12-26T23:24:18Z" + name: certificate-controller + namespace: kube-system + resourceVersion: "209" + uid: be326252-8908-4119-86d8-7e8bea001dc2 +- apiVersion: v1 + kind: ServiceAccount + metadata: + creationTimestamp: "2024-12-26T23:24:28Z" + name: clusterrole-aggregation-controller + namespace: kube-system + resourceVersion: "279" + uid: dfad3473-0bd2-497a-8c9e-a851ea86f84c +- apiVersion: v1 + kind: ServiceAccount + metadata: + creationTimestamp: "2024-12-26T23:24:19Z" + name: coredns + namespace: kube-system + resourceVersion: "234" + uid: 17d7c5d9-f666-4e6e-8cee-e8b302f488fa +- apiVersion: v1 + kind: ServiceAccount + metadata: + creationTimestamp: "2024-12-26T23:24:31Z" + name: cronjob-controller + namespace: kube-system + resourceVersion: "300" + uid: c2c9a2e2-c727-4c4a-847c-372c86d5c288 +- apiVersion: v1 + kind: ServiceAccount + metadata: + creationTimestamp: "2024-12-26T23:24:28Z" + name: daemon-set-controller + namespace: kube-system + resourceVersion: "281" + uid: 6a2ce7f4-d121-41a4-b06d-d8dfff0bbb55 +- apiVersion: v1 + kind: ServiceAccount + metadata: + creationTimestamp: "2024-12-26T23:24:31Z" + name: default + namespace: kube-system + resourceVersion: "311" + uid: cda3a446-f039-4d73-be3f-ea367a0945ff +- apiVersion: v1 + kind: ServiceAccount + metadata: + creationTimestamp: "2024-12-26T23:24:18Z" + name: deployment-controller + namespace: kube-system + resourceVersion: "206" + uid: e3e93531-0af5-493b-aad5-7ec3dae4fe21 +- apiVersion: v1 + kind: ServiceAccount + metadata: + creationTimestamp: "2024-12-26T23:24:18Z" + name: disruption-controller + namespace: kube-system + resourceVersion: "207" + uid: a647368b-6b30-4a95-9105-18081ae6a2ee +- apiVersion: v1 + kind: ServiceAccount + metadata: + creationTimestamp: "2024-12-26T23:24:28Z" + name: endpoint-controller + namespace: kube-system + resourceVersion: "278" + uid: 60ffa2cc-0d5c-425b-a916-675f3f47fca3 +- apiVersion: v1 + kind: ServiceAccount + metadata: + creationTimestamp: "2024-12-26T23:24:29Z" + name: endpointslice-controller + namespace: kube-system + resourceVersion: "285" + uid: 5130a22e-4593-4c39-b21c-9cb6aa07b75c +- apiVersion: v1 + kind: ServiceAccount + metadata: + creationTimestamp: "2024-12-26T23:24:18Z" + name: endpointslicemirroring-controller + namespace: kube-system + resourceVersion: "211" + uid: 8d009d48-b1d8-4a08-80ed-b327c3e53000 +- apiVersion: v1 + kind: ServiceAccount + metadata: + creationTimestamp: "2024-12-26T23:24:30Z" + name: ephemeral-volume-controller + namespace: kube-system + resourceVersion: "294" + uid: 78d33082-a136-4299-95c1-745b711170c4 +- apiVersion: v1 + kind: ServiceAccount + metadata: + creationTimestamp: "2024-12-26T23:24:29Z" + name: expand-controller + namespace: kube-system + resourceVersion: "287" + uid: 2ae86cee-81c8-4c06-95f4-88d407f9d3e7 +- apiVersion: v1 + kind: ServiceAccount + metadata: + creationTimestamp: "2024-12-26T23:24:29Z" + name: generic-garbage-collector + namespace: kube-system + resourceVersion: "288" + uid: 6036d9ef-3b54-421b-b4eb-9a985defc5cc +- apiVersion: v1 + kind: ServiceAccount + metadata: + creationTimestamp: "2024-12-26T23:24:30Z" + name: horizontal-pod-autoscaler + namespace: kube-system + resourceVersion: "297" + uid: b76ddae7-573a-47f4-b167-98d7a8acda9b +- apiVersion: v1 + kind: ServiceAccount + metadata: + creationTimestamp: "2024-12-26T23:24:18Z" + name: job-controller + namespace: kube-system + resourceVersion: "205" + uid: 25e14415-46db-4b74-b4ab-45cb9f7c22e1 +- apiVersion: v1 + kind: ServiceAccount + metadata: + creationTimestamp: "2024-12-26T23:24:19Z" + name: kube-proxy + namespace: kube-system + resourceVersion: "240" + uid: fccc2d1f-7a10-4bca-babf-684356b3d6bb +- apiVersion: v1 + kind: ServiceAccount + metadata: + annotations: + kubectl.kubernetes.io/last-applied-configuration: | + {"apiVersion":"v1","kind":"ServiceAccount","metadata":{"annotations":{},"labels":{"addonmanager.kubernetes.io/mode":"Reconcile","k8s-app":"metrics-server"},"name":"metrics-server","namespace":"kube-system"}} + creationTimestamp: "2024-12-26T23:26:51Z" + labels: + addonmanager.kubernetes.io/mode: Reconcile + k8s-app: metrics-server + managedFields: + - apiVersion: v1 + fieldsType: FieldsV1 + fieldsV1: + f:metadata: + f:annotations: + .: {} + f:kubectl.kubernetes.io/last-applied-configuration: {} + f:labels: + .: {} + f:addonmanager.kubernetes.io/mode: {} + f:k8s-app: {} + manager: kubectl-client-side-apply + operation: Update + time: "2024-12-26T23:26:51Z" + name: metrics-server + namespace: kube-system + resourceVersion: "640" + uid: 1278418b-073a-4177-8bdd-caa148f9849c +- apiVersion: v1 + kind: ServiceAccount + metadata: + creationTimestamp: "2024-12-26T23:24:28Z" + name: namespace-controller + namespace: kube-system + resourceVersion: "277" + uid: 12d682f3-42be-4a07-8b54-c88029f9ac35 +- apiVersion: v1 + kind: ServiceAccount + metadata: + creationTimestamp: "2024-12-26T23:24:18Z" + name: node-controller + namespace: kube-system + resourceVersion: "218" + uid: 063be8e1-bb5b-45ff-b2cf-b74cad43d943 +- apiVersion: v1 + kind: ServiceAccount + metadata: + creationTimestamp: "2024-12-26T23:24:18Z" + name: persistent-volume-binder + namespace: kube-system + resourceVersion: "214" + uid: ec472778-d52d-4019-a7f1-5fcda084053a +- apiVersion: v1 + kind: ServiceAccount + metadata: + creationTimestamp: "2024-12-26T23:24:28Z" + name: pod-garbage-collector + namespace: kube-system + resourceVersion: "276" + uid: 7ef84bc1-6e14-4702-8dca-80afcdfd128b +- apiVersion: v1 + kind: ServiceAccount + metadata: + creationTimestamp: "2024-12-26T23:24:28Z" + name: pv-protection-controller + namespace: kube-system + resourceVersion: "284" + uid: 926aa29b-cff7-4d69-9642-10e4f258afd2 +- apiVersion: v1 + kind: ServiceAccount + metadata: + creationTimestamp: "2024-12-26T23:24:30Z" + name: pvc-protection-controller + namespace: kube-system + resourceVersion: "295" + uid: 5988a127-4bda-4978-aecf-4cf960dbd91c +- apiVersion: v1 + kind: ServiceAccount + metadata: + creationTimestamp: "2024-12-26T23:24:30Z" + name: replicaset-controller + namespace: kube-system + resourceVersion: "292" + uid: 3aa87a67-a302-4e21-bdd8-c52d2cd184a2 +- apiVersion: v1 + kind: ServiceAccount + metadata: + creationTimestamp: "2024-12-26T23:24:18Z" + name: replication-controller + namespace: kube-system + resourceVersion: "212" + uid: 48441ac9-7c63-4cbf-b2cd-2c5d5a188652 +- apiVersion: v1 + kind: ServiceAccount + metadata: + creationTimestamp: "2024-12-26T23:24:28Z" + name: resourcequota-controller + namespace: kube-system + resourceVersion: "280" + uid: 4d3b7a0d-41c5-4f2a-a108-1dd5332ac883 +- apiVersion: v1 + kind: ServiceAccount + metadata: + creationTimestamp: "2024-12-26T23:24:18Z" + name: root-ca-cert-publisher + namespace: kube-system + resourceVersion: "213" + uid: 7170c368-fb11-4305-b1ca-cda15cbd3c1a +- apiVersion: v1 + kind: ServiceAccount + metadata: + creationTimestamp: "2024-12-26T23:24:29Z" + name: service-account-controller + namespace: kube-system + resourceVersion: "286" + uid: 4a63fb84-8702-4c7a-8c0c-d653566710db +- apiVersion: v1 + kind: ServiceAccount + metadata: + creationTimestamp: "2024-12-26T23:24:29Z" + name: service-controller + namespace: kube-system + resourceVersion: "289" + uid: 03e485a9-8eb4-4602-9246-7bd8633efeeb +- apiVersion: v1 + kind: ServiceAccount + metadata: + creationTimestamp: "2024-12-26T23:24:18Z" + name: statefulset-controller + namespace: kube-system + resourceVersion: "208" + uid: 99cf030f-2f5d-44a4-a5f9-3e5f6d2656c5 +- apiVersion: v1 + kind: ServiceAccount + metadata: + annotations: + kubectl.kubernetes.io/last-applied-configuration: | + {"apiVersion":"v1","kind":"ServiceAccount","metadata":{"annotations":{},"labels":{"addonmanager.kubernetes.io/mode":"Reconcile"},"name":"storage-provisioner","namespace":"kube-system"}} + creationTimestamp: "2024-12-26T23:24:21Z" + labels: + addonmanager.kubernetes.io/mode: Reconcile + managedFields: + - apiVersion: v1 + fieldsType: FieldsV1 + fieldsV1: + f:metadata: + f:annotations: + .: {} + f:kubectl.kubernetes.io/last-applied-configuration: {} + f:labels: + .: {} + f:addonmanager.kubernetes.io/mode: {} + manager: kubectl-client-side-apply + operation: Update + time: "2024-12-26T23:24:21Z" + name: storage-provisioner + namespace: kube-system + resourceVersion: "258" + uid: 57840dfe-e7e4-41f8-9fc8-0ef7beee8091 +- apiVersion: v1 + kind: ServiceAccount + metadata: + creationTimestamp: "2024-12-26T23:24:28Z" + name: token-cleaner + namespace: kube-system + resourceVersion: "283" + uid: ad500e5c-844f-46d6-9281-20a86b51b7aa +- apiVersion: v1 + kind: ServiceAccount + metadata: + creationTimestamp: "2024-12-26T23:24:30Z" + name: ttl-after-finished-controller + namespace: kube-system + resourceVersion: "296" + uid: 01395a96-984c-4d8e-8d0b-ddd93548ee5c +- apiVersion: v1 + kind: ServiceAccount + metadata: + creationTimestamp: "2024-12-26T23:24:28Z" + name: ttl-controller + namespace: kube-system + resourceVersion: "282" + uid: b67b982b-90e4-4c36-832e-445531dcb6a8 +- apiVersion: v1 + kind: ServiceAccount + metadata: + creationTimestamp: "2024-12-26T23:24:31Z" + name: default + namespace: kubernetes-dashboard + resourceVersion: "329" + uid: 8d4ba8e5-e6f8-438b-8a69-ab8378a289e6 +- apiVersion: v1 + kind: ServiceAccount + metadata: + annotations: + kubectl.kubernetes.io/last-applied-configuration: | + {"apiVersion":"v1","kind":"ServiceAccount","metadata":{"annotations":{},"labels":{"addonmanager.kubernetes.io/mode":"Reconcile","k8s-app":"kubernetes-dashboard","kubernetes.io/minikube-addons":"dashboard"},"name":"kubernetes-dashboard","namespace":"kubernetes-dashboard"}} + creationTimestamp: "2024-12-26T23:24:32Z" + labels: + addonmanager.kubernetes.io/mode: Reconcile + k8s-app: kubernetes-dashboard + kubernetes.io/minikube-addons: dashboard + managedFields: + - apiVersion: v1 + fieldsType: FieldsV1 + fieldsV1: + f:metadata: + f:annotations: + .: {} + f:kubectl.kubernetes.io/last-applied-configuration: {} + f:labels: + .: {} + f:addonmanager.kubernetes.io/mode: {} + f:k8s-app: {} + f:kubernetes.io/minikube-addons: {} + manager: kubectl-client-side-apply + operation: Update + time: "2024-12-26T23:24:32Z" + name: kubernetes-dashboard + namespace: kubernetes-dashboard + resourceVersion: "356" + uid: e8ba225d-faa4-4069-add1-ebb00db88d0c +kind: List +metadata: + resourceVersion: "" + selfLink: "" diff --git a/examples/minikube/minikube-without-rbac.yml b/examples/minikube/minikube-without-rbac.yml index 61ea4c3..d972dc5 100644 --- a/examples/minikube/minikube-without-rbac.yml +++ b/examples/minikube/minikube-without-rbac.yml @@ -2817,9 +2817,9 @@ items: manager: kubelet operation: Update subresource: status - time: "2024-12-27T19:03:37Z" + time: "2024-12-27T19:34:17Z" name: minikube - resourceVersion: "45666" + resourceVersion: "47379" uid: 067e4911-dfc8-4e14-aa1a-bff67e325624 spec: podCIDR: 10.244.0.0/24 @@ -2844,25 +2844,25 @@ items: memory: 8135160Ki pods: "110" conditions: - - lastHeartbeatTime: "2024-12-27T19:03:37Z" + - lastHeartbeatTime: "2024-12-27T19:34:17Z" lastTransitionTime: "2024-12-27T17:53:20Z" message: kubelet has sufficient memory available reason: KubeletHasSufficientMemory status: "False" type: MemoryPressure - - lastHeartbeatTime: "2024-12-27T19:03:37Z" + - lastHeartbeatTime: "2024-12-27T19:34:17Z" lastTransitionTime: "2024-12-27T17:53:20Z" message: kubelet has no disk pressure reason: KubeletHasNoDiskPressure status: "False" type: DiskPressure - - lastHeartbeatTime: "2024-12-27T19:03:37Z" + - lastHeartbeatTime: "2024-12-27T19:34:17Z" lastTransitionTime: "2024-12-27T17:53:20Z" message: kubelet has sufficient PID available reason: KubeletHasSufficientPID status: "False" type: PIDPressure - - lastHeartbeatTime: "2024-12-27T19:03:37Z" + - lastHeartbeatTime: "2024-12-27T19:34:17Z" lastTransitionTime: "2024-12-27T17:53:30Z" message: kubelet is posting ready status reason: KubeletReady diff --git a/examples/minikube/minikube.png b/examples/minikube/minikube.png index 8940778..f5e1de3 100644 Binary files a/examples/minikube/minikube.png and b/examples/minikube/minikube.png differ diff --git a/examples/minikube/minikube.yml b/examples/minikube/minikube.yml index 52b0b62..df88291 100644 --- a/examples/minikube/minikube.yml +++ b/examples/minikube/minikube.yml @@ -9740,9 +9740,9 @@ items: manager: kubelet operation: Update subresource: status - time: "2024-12-27T19:03:37Z" + time: "2024-12-27T19:34:17Z" name: minikube - resourceVersion: "45666" + resourceVersion: "47379" uid: 067e4911-dfc8-4e14-aa1a-bff67e325624 spec: podCIDR: 10.244.0.0/24 @@ -9767,25 +9767,25 @@ items: memory: 8135160Ki pods: "110" conditions: - - lastHeartbeatTime: "2024-12-27T19:03:37Z" + - lastHeartbeatTime: "2024-12-27T19:34:17Z" lastTransitionTime: "2024-12-27T17:53:20Z" message: kubelet has sufficient memory available reason: KubeletHasSufficientMemory status: "False" type: MemoryPressure - - lastHeartbeatTime: "2024-12-27T19:03:37Z" + - lastHeartbeatTime: "2024-12-27T19:34:17Z" lastTransitionTime: "2024-12-27T17:53:20Z" message: kubelet has no disk pressure reason: KubeletHasNoDiskPressure status: "False" type: DiskPressure - - lastHeartbeatTime: "2024-12-27T19:03:37Z" + - lastHeartbeatTime: "2024-12-27T19:34:17Z" lastTransitionTime: "2024-12-27T17:53:20Z" message: kubelet has sufficient PID available reason: KubeletHasSufficientPID status: "False" type: PIDPressure - - lastHeartbeatTime: "2024-12-27T19:03:37Z" + - lastHeartbeatTime: "2024-12-27T19:34:17Z" lastTransitionTime: "2024-12-27T17:53:30Z" message: kubelet is posting ready status reason: KubeletReady