Lokasi ngalangkungan proxy:   [ UP ]  
[Ngawartoskeun bug]   [Panyetelan cookie]                
Skip to content

Commit eaaedef

Browse files
Merge pull request #16054 from WilliamAntonRohm/issue-5181
sql-docs/issues/5181 -- duplicated text
2 parents 0c91eb2 + 638f88f commit eaaedef

1 file changed

Lines changed: 3 additions & 38 deletions

File tree

docs/big-data-cluster/kubernetes-rbac.md

Lines changed: 3 additions & 38 deletions
Original file line numberDiff line numberDiff line change
@@ -76,47 +76,12 @@ subjects:
7676
EOF
7777
```
7878

79-
The service account, cluster role and the cluster role binding can be created either before or post BDC deployment. Kubernetes automatically updates the permission for the Telegraf service account. If these are created as a pod deployment, you will see a few minutes delay in the pod and node metrics being collected.
80-
81-
```console
82-
export CLUSTER_NAME=mssql-cluster
83-
kubectl create -f - <<EOF
84-
---
85-
apiVersion: rbac.authorization.k8s.io/v1
86-
kind: ClusterRole
87-
metadata:
88-
name: ${CLUSTER_NAME}:cr-mssql-metricsdc-reader
89-
rules:
90-
- apiGroups:
91-
- '*'
92-
resources:
93-
- pods
94-
- nodes/stats
95-
verbs:
96-
- get
97-
---
98-
apiVersion: rbac.authorization.k8s.io/v1
99-
kind: ClusterRoleBinding
100-
metadata:
101-
name: ${CLUSTER_NAME}:crb-mssql-metricsdc-reader
102-
roleRef:
103-
apiGroup: rbac.authorization.k8s.io
104-
kind: ClusterRole
105-
name: ${CLUSTER_NAME}:cr-mssql-metricsdc-reader
106-
subjects:
107-
- kind: ServiceAccount
108-
name: sa-mssql-metricsdc-reader
109-
namespace: ${CLUSTER_NAME}
110-
EOF
111-
```
112-
113-
​> [!NOTE]
114-
> The service account, cluster role and the cluster role binding can be created either before or post BDC deployment. Kubernetes will automatically update the permission for the Telegraf service account. If these are created pod deployment, you will see a few minutes delay in the pod and node metrics being collected.
79+
The service account, cluster role and the cluster role binding can be created either before or post BDC deployment. Kubernetes automatically updates the permission for the Telegraf service account. If these are created as a pod deployment, you will see a few minutes' delay in the pod and node metrics being collected.
11580

11681
> [!NOTE]
11782
> SQL Server 2019 CU5 introduces two feature switches to control the collection of pod and node metrics. By default these parameters are set to true in all environment targets, except OpenShift where the default is overridden.
11883
119-
You can customize the these settings in the security section in the `control.json` deployment configuration file:
84+
You can customize these settings in the security section in the `control.json` deployment configuration file:
12085

12186
```json
12287
  "security": {
@@ -126,4 +91,4 @@ You can customize the these settings in the security section in the `control.js
12691
  }
12792
```
12893

129-
If these settings are set to `false`, BDC deployemnt workflow will not attempt to create the service account, cluster role, and the binding for Telegraf.
94+
If these settings are set to `false`, BDC deployment workflow will not attempt to create the service account, cluster role, and the binding for Telegraf.

0 commit comments

Comments
 (0)