kind: ClusterRole apiVersion: rbac.authorization.k8s.io/v1 metadata: name: katib-controller rules: - apiGroups: - "" resources: - configmaps - serviceaccounts - services - events - namespaces - persistentvolumes - persistentvolumeclaims - pods - pods/log - pods/status verbs: - "*" - apiGroups: - apps resources: - deployments verbs: - "*" - apiGroups: - rbac.authorization.k8s.io resources: - roles - rolebindings verbs: - "*" - apiGroups: - batch resources: - jobs - cronjobs verbs: - "*" - apiGroups: - kubeflow.org resources: - experiments - experiments/status - experiments/finalizers - trials - trials/status - trials/finalizers - suggestions - suggestions/status - suggestions/finalizers - tfjobs - pytorchjobs - mpijobs verbs: - "*" - apiGroups: - tekton.dev resources: - pipelineruns - taskruns verbs: - "*" --- apiVersion: v1 kind: ServiceAccount metadata: name: katib-controller namespace: kubeflow --- kind: ClusterRoleBinding apiVersion: rbac.authorization.k8s.io/v1 metadata: name: katib-controller roleRef: apiGroup: rbac.authorization.k8s.io kind: ClusterRole name: katib-controller subjects: - kind: ServiceAccount name: katib-controller namespace: kubeflow