File size: 1,978 Bytes
23804b3 |
1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 83 84 85 86 |
# RBAC Configuration for Cyber-LLM
apiVersion: v1
kind: ServiceAccount
metadata:
name: cyber-llm-service-account
namespace: cyber-llm
labels:
app.kubernetes.io/name: cyber-llm
app.kubernetes.io/component: rbac
---
apiVersion: rbac.authorization.k8s.io/v1
kind: Role
metadata:
name: cyber-llm-role
namespace: cyber-llm
labels:
app.kubernetes.io/name: cyber-llm
app.kubernetes.io/component: rbac
rules:
# Pod management permissions (for agent scaling)
- apiGroups: [""]
resources: ["pods"]
verbs: ["get", "list", "watch"]
- apiGroups: [""]
resources: ["pods/status"]
verbs: ["get"]
# ConfigMap and Secret access
- apiGroups: [""]
resources: ["configmaps", "secrets"]
verbs: ["get", "list", "watch"]
# Events for monitoring
- apiGroups: [""]
resources: ["events"]
verbs: ["create", "patch"]
---
apiVersion: rbac.authorization.k8s.io/v1
kind: RoleBinding
metadata:
name: cyber-llm-role-binding
namespace: cyber-llm
labels:
app.kubernetes.io/name: cyber-llm
app.kubernetes.io/component: rbac
subjects:
- kind: ServiceAccount
name: cyber-llm-service-account
namespace: cyber-llm
roleRef:
kind: Role
name: cyber-llm-role
apiGroup: rbac.authorization.k8s.io
---
# ClusterRole for cross-namespace operations (if needed)
apiVersion: rbac.authorization.k8s.io/v1
kind: ClusterRole
metadata:
name: cyber-llm-cluster-role
labels:
app.kubernetes.io/name: cyber-llm
app.kubernetes.io/component: rbac
rules:
# Metrics collection
- apiGroups: ["metrics.k8s.io"]
resources: ["pods", "nodes"]
verbs: ["get", "list"]
---
apiVersion: rbac.authorization.k8s.io/v1
kind: ClusterRoleBinding
metadata:
name: cyber-llm-cluster-role-binding
labels:
app.kubernetes.io/name: cyber-llm
app.kubernetes.io/component: rbac
subjects:
- kind: ServiceAccount
name: cyber-llm-service-account
namespace: cyber-llm
roleRef:
kind: ClusterRole
name: cyber-llm-cluster-role
apiGroup: rbac.authorization.k8s.io
|