From b5e17f91cdabad8830843e9830232fb4c820dbec Mon Sep 17 00:00:00 2001 From: lixiang Date: Mon, 10 Aug 2020 15:54:22 +0800 Subject: [PATCH] ClusterRole: add permission to access priorityclasses.scheduling.k8s.io --- charts/descheduler/templates/clusterrole.yaml | 3 +++ kubernetes/rbac.yaml | 3 +++ 2 files changed, 6 insertions(+) diff --git a/charts/descheduler/templates/clusterrole.yaml b/charts/descheduler/templates/clusterrole.yaml index b63ef308f..2a2091736 100644 --- a/charts/descheduler/templates/clusterrole.yaml +++ b/charts/descheduler/templates/clusterrole.yaml @@ -18,4 +18,7 @@ rules: - apiGroups: [""] resources: ["pods/eviction"] verbs: ["create"] +- apiGroups: ["scheduling.k8s.io"] + resources: ["priorityclasses"] + verbs: ["get", "watch", "list"] {{- end -}} diff --git a/kubernetes/rbac.yaml b/kubernetes/rbac.yaml index 1432caab4..079964360 100644 --- a/kubernetes/rbac.yaml +++ b/kubernetes/rbac.yaml @@ -17,6 +17,9 @@ rules: - apiGroups: [""] resources: ["pods/eviction"] verbs: ["create"] +- apiGroups: ["scheduling.k8s.io"] + resources: ["priorityclasses"] + verbs: ["get", "watch", "list"] --- apiVersion: v1 kind: ServiceAccount