181 lines
4.9 KiB
YAML
181 lines
4.9 KiB
YAML
---
|
|
apiVersion: v1
|
|
kind: ServiceAccount
|
|
metadata:
|
|
labels:
|
|
k8s-addon: cluster-autoscaler.addons.k8s.io
|
|
k8s-app: cluster-autoscaler
|
|
name: cluster-autoscaler
|
|
namespace: kube-system
|
|
---
|
|
apiVersion: rbac.authorization.k8s.io/v1
|
|
kind: ClusterRole
|
|
metadata:
|
|
name: cluster-autoscaler
|
|
labels:
|
|
k8s-addon: cluster-autoscaler.addons.k8s.io
|
|
k8s-app: cluster-autoscaler
|
|
rules:
|
|
- apiGroups: [""]
|
|
resources: ["events", "endpoints"]
|
|
verbs: ["create", "patch"]
|
|
- apiGroups: [""]
|
|
resources: ["pods/eviction"]
|
|
verbs: ["create"]
|
|
- apiGroups: [""]
|
|
resources: ["pods/status"]
|
|
verbs: ["update"]
|
|
- apiGroups: [""]
|
|
resources: ["endpoints"]
|
|
resourceNames: ["cluster-autoscaler"]
|
|
verbs: ["get", "update"]
|
|
- apiGroups: [""]
|
|
resources: ["nodes"]
|
|
verbs: ["watch", "list", "get", "update"]
|
|
- apiGroups: [""]
|
|
resources:
|
|
- "namespaces"
|
|
- "pods"
|
|
- "services"
|
|
- "replicationcontrollers"
|
|
- "persistentvolumeclaims"
|
|
- "persistentvolumes"
|
|
verbs: ["watch", "list", "get"]
|
|
- apiGroups: ["extensions"]
|
|
resources: ["replicasets", "daemonsets"]
|
|
verbs: ["watch", "list", "get"]
|
|
- apiGroups: ["policy"]
|
|
resources: ["poddisruptionbudgets"]
|
|
verbs: ["watch", "list"]
|
|
- apiGroups: ["apps"]
|
|
resources: ["statefulsets", "replicasets", "daemonsets"]
|
|
verbs: ["watch", "list", "get"]
|
|
- apiGroups: ["storage.k8s.io"]
|
|
resources: ["storageclasses", "csinodes", "csidrivers", "csistoragecapacities", "volumeattachments"]
|
|
verbs: ["watch", "list", "get"]
|
|
- apiGroups: ["batch", "extensions"]
|
|
resources: ["jobs"]
|
|
verbs: ["get", "list", "watch", "patch"]
|
|
- apiGroups: ["coordination.k8s.io"]
|
|
resources: ["leases"]
|
|
verbs: ["create"]
|
|
- apiGroups: ["coordination.k8s.io"]
|
|
resourceNames: ["cluster-autoscaler"]
|
|
resources: ["leases"]
|
|
verbs: ["get", "update"]
|
|
---
|
|
apiVersion: rbac.authorization.k8s.io/v1
|
|
kind: Role
|
|
metadata:
|
|
name: cluster-autoscaler
|
|
namespace: kube-system
|
|
labels:
|
|
k8s-addon: cluster-autoscaler.addons.k8s.io
|
|
k8s-app: cluster-autoscaler
|
|
rules:
|
|
- apiGroups: [""]
|
|
resources: ["configmaps"]
|
|
verbs: ["create", "list", "watch"]
|
|
- apiGroups: [""]
|
|
resources: ["configmaps"]
|
|
resourceNames: ["cluster-autoscaler-status", "cluster-autoscaler-priority-expander"]
|
|
verbs: ["delete", "get", "update", "watch"]
|
|
|
|
---
|
|
apiVersion: rbac.authorization.k8s.io/v1
|
|
kind: ClusterRoleBinding
|
|
metadata:
|
|
name: cluster-autoscaler
|
|
labels:
|
|
k8s-addon: cluster-autoscaler.addons.k8s.io
|
|
k8s-app: cluster-autoscaler
|
|
roleRef:
|
|
apiGroup: rbac.authorization.k8s.io
|
|
kind: ClusterRole
|
|
name: cluster-autoscaler
|
|
subjects:
|
|
- kind: ServiceAccount
|
|
name: cluster-autoscaler
|
|
namespace: kube-system
|
|
|
|
---
|
|
apiVersion: rbac.authorization.k8s.io/v1
|
|
kind: RoleBinding
|
|
metadata:
|
|
name: cluster-autoscaler
|
|
namespace: kube-system
|
|
labels:
|
|
k8s-addon: cluster-autoscaler.addons.k8s.io
|
|
k8s-app: cluster-autoscaler
|
|
roleRef:
|
|
apiGroup: rbac.authorization.k8s.io
|
|
kind: Role
|
|
name: cluster-autoscaler
|
|
subjects:
|
|
- kind: ServiceAccount
|
|
name: cluster-autoscaler
|
|
namespace: kube-system
|
|
|
|
---
|
|
apiVersion: apps/v1
|
|
kind: Deployment
|
|
metadata:
|
|
name: cluster-autoscaler
|
|
namespace: kube-system
|
|
labels:
|
|
app: cluster-autoscaler
|
|
spec:
|
|
replicas: 1
|
|
selector:
|
|
matchLabels:
|
|
app: cluster-autoscaler
|
|
template:
|
|
metadata:
|
|
labels:
|
|
app: cluster-autoscaler
|
|
annotations:
|
|
prometheus.io/scrape: 'true'
|
|
prometheus.io/port: '8085'
|
|
spec:
|
|
priorityClassName: system-cluster-critical
|
|
securityContext:
|
|
runAsNonRoot: true
|
|
runAsUser: 65534
|
|
fsGroup: 65534
|
|
seccompProfile:
|
|
type: RuntimeDefault
|
|
serviceAccountName: cluster-autoscaler
|
|
containers:
|
|
- image: registry.k8s.io/autoscaling/cluster-autoscaler:v1.32.1
|
|
name: cluster-autoscaler
|
|
resources:
|
|
limits:
|
|
cpu: 100m
|
|
memory: 600Mi
|
|
requests:
|
|
cpu: 100m
|
|
memory: 600Mi
|
|
command:
|
|
- ./cluster-autoscaler
|
|
- --v=4
|
|
- --stderrthreshold=info
|
|
- --cloud-provider=aws
|
|
- --skip-nodes-with-local-storage=false
|
|
- --expander=least-waste
|
|
- --node-group-auto-discovery=asg:tag=k8s.io/cluster-autoscaler/enabled,k8s.io/cluster-autoscaler/<YOUR CLUSTER NAME>
|
|
volumeMounts:
|
|
- name: ssl-certs
|
|
mountPath: /etc/ssl/certs/ca-certificates.crt # /etc/ssl/certs/ca-bundle.crt for Amazon Linux Worker Nodes
|
|
readOnly: true
|
|
imagePullPolicy: "Always"
|
|
securityContext:
|
|
allowPrivilegeEscalation: false
|
|
capabilities:
|
|
drop:
|
|
- ALL
|
|
readOnlyRootFilesystem: true
|
|
volumes:
|
|
- name: ssl-certs
|
|
hostPath:
|
|
path: "/etc/ssl/certs/ca-bundle.crt"
|