kind: ClusterRole apiVersion: rbac.authorization.k8s.io/v1 metadata: name: katib-controller rules: - apiGroups: - "" resources: - configmaps - serviceaccounts - services - secrets verbs: - "*" - apiGroups: - "" resources: - pods - pods/log - pods/status verbs: - "*" - apiGroups: - batch resources: - jobs - cronjobs verbs: - "*" - apiGroups: - apiextensions.k8s.io resources: - customresourcedefinitions verbs: - create - get - apiGroups: - admissionregistration.k8s.io resources: - validatingwebhookconfigurations - mutatingwebhookconfigurations verbs: - '*' - apiGroups: - kubeflow.org resources: - experiments - experiments/status - trials - trials/status verbs: - "*" - apiGroups: - kubeflow.org resources: - tfjobs - pytorchjobs verbs: - "*" --- apiVersion: v1 kind: ServiceAccount metadata: name: katib-controller --- kind: ClusterRoleBinding apiVersion: rbac.authorization.k8s.io/v1 metadata: name: katib-controller roleRef: apiGroup: rbac.authorization.k8s.io kind: ClusterRole name: katib-controller subjects: - kind: ServiceAccount name: katib-controller