Granting Kubernetes access
Omnia grants Kubernetes node access to users defined on the kube_control_plane using the k8s_access.yml
playbook.
Prerequisites
Ensure the Kubernetes cluster is up and running.
Input parameters
Update the variable
user_name
, in theinput/k8s_access_config.yml
file with a comma-separated list of users.Parameter
Details
user_name
String
Required
A comma-separated list of users to whom access must be granted.
Every user defined here must have a home directory configured on the kube_control_plane.
Sample values:
user1
oruser1,user2,user3
.
Verify that all intended users have a home directory (in the format
/home/<user_name>
) set up on the kube_control_plane.Job access is granted based on the values provided in
resources
andverbs
variables inscheduler/roles/k8s_access/template/role.yml.j2
. These values cannot be modified.resources
are a list of kubernetes objects or entities that are used to define, configure, and manage applications or infrastructure within a Kubernetes cluster. Possible values include["pods", "services", "deployments", "jobs"]
.verbs
are a list of actions that can be taken on theresources
. Possible values are["create", "get", "list", "update", "delete"]
.
The passed inventory should contain a defined
kube_control_plane
.
[auth_server]
#node12
#AI Scheduler: Kubernetes
[kube_control_plane]
# node1
[kube_node]
# node2
# node3
# node4
# node5
# node6
To run the playbook, use the below command:
cd scheduler
ansible-playbook -i inventory k8s_access.yml
If you have any feedback about Omnia documentation, please reach out at omnia.readme@dell.com.