Search Options

Results per page
Sort
Preferred Languages
Advance

Results 1 - 10 of 12 for ClusterRoleBinding (0.51 sec)

  1. api/openapi-spec/v3/apis__rbac.authorization.k8s.io__v1_openapi.json

              {
                "group": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "version": "v1"
              }
            ]
          },
          "io.k8s.api.rbac.v1.ClusterRoleBinding": {
            "description": "ClusterRoleBinding references a ClusterRole, but not contain it.  It can reference a ClusterRole in the global namespace, and adds who information via Subject.",
            "properties": {
              "apiVersion": {
    Registered: Sat Jun 15 01:39:40 UTC 2024
    - Last Modified: Fri Mar 08 04:18:56 UTC 2024
    - 352.2K bytes
    - Viewed (0)
  2. CHANGELOG/CHANGELOG-1.6.md

      * Update command invocations to pass separate --from-literal flags for each value
    
    ### RBAC
    Registered: Sat Jun 15 01:39:40 UTC 2024
    - Last Modified: Thu Dec 24 02:28:26 UTC 2020
    - 304K bytes
    - Viewed (0)
  3. CHANGELOG/CHANGELOG-1.7.md

        * Before upgrading, users must ensure their controller manager will enable the csrapproving controller, create an RBAC ClusterRole and ClusterRoleBinding to approve CSRs for the same group, then upgrade. Example roles to enable the equivalent behavior can be found in the [TLS bootstrapping](https://kubernetes.io/docs/admin/kubelet-tls-bootstrapping/) documentation.
    
    
    Registered: Sat Jun 15 01:39:40 UTC 2024
    - Last Modified: Thu May 05 13:44:43 UTC 2022
    - 308.7K bytes
    - Viewed (0)
  4. prow/config/calico.yaml

          - ipamconfigs
        verbs:
          - get
          - list
          - create
          - update
          - delete
    ---
    # Source: calico/templates/calico-kube-controllers-rbac.yaml
    kind: ClusterRoleBinding
    apiVersion: rbac.authorization.k8s.io/v1
    metadata:
      name: calico-kube-controllers
    roleRef:
      apiGroup: rbac.authorization.k8s.io
      kind: ClusterRole
      name: calico-kube-controllers
    subjects:
    Registered: Fri Jun 14 15:00:06 UTC 2024
    - Last Modified: Tue May 21 18:32:01 UTC 2024
    - 246.5K bytes
    - Viewed (0)
  5. CHANGELOG/CHANGELOG-1.14.md

        - `kubectl create clusterrolebinding anonymous-discovery --clusterrole=system:discovery --group=system:unauthenticated`
        - `kubectl create clusterrolebinding anonymous-access-review --clusterrole=system:basic-user --group=system:unauthenticated`
    Registered: Sat Jun 15 01:39:40 UTC 2024
    - Last Modified: Mon Jun 14 22:06:39 UTC 2021
    - 271.5K bytes
    - Viewed (0)
  6. CHANGELOG/CHANGELOG-1.8.md

    ## Known Issues
    
    Registered: Sat Jun 15 01:39:40 UTC 2024
    - Last Modified: Tue Feb 20 15:45:02 UTC 2024
    - 312.2K bytes
    - Viewed (0)
  7. CHANGELOG/CHANGELOG-1.12.md

        * Action required: The following clusterrole and clusterrolebinding should be applied:
        ```
             kind: List
             apiVersion: v1
             items:
             - apiVersion: rbac.authorization.k8s.io/v1
               kind: ClusterRole
               metadata:
    Registered: Sat Jun 15 01:39:40 UTC 2024
    - Last Modified: Thu Feb 06 06:04:15 UTC 2020
    - 293.8K bytes
    - Viewed (0)
  8. CHANGELOG/CHANGELOG-1.18.md

    - `kubectl create clusterrolebinding` creates rbac.authorization.k8s.io/v1 object ([#85889](https://github.com/kubernetes/kubernetes/pull/85889), [@oke-py](https://github.com/oke-py)) [SIG CLI]
    Registered: Sat Jun 15 01:39:40 UTC 2024
    - Last Modified: Wed Jun 16 17:18:28 UTC 2021
    - 373.2K bytes
    - Viewed (0)
  9. CHANGELOG/CHANGELOG-1.20.md

      - network_plugin_operations_total
      - network_plugin_operations_errors_total ([#93066](https://github.com/kubernetes/kubernetes/pull/93066), [@AnishShah](https://github.com/AnishShah))
    Registered: Sat Jun 15 01:39:40 UTC 2024
    - Last Modified: Wed Jan 19 21:05:45 UTC 2022
    - 409K bytes
    - Viewed (0)
  10. CHANGELOG/CHANGELOG-1.13.md

        * `kubectl delete node/<nodeName>`
        * or grant self-deletion permission explicitly:
            * `kubectl create clusterrole self-deleting-nodes --verb=delete --resource=nodes`
            * `kubectl create clusterrolebinding self-deleting-nodes --clusterrole=self-deleting-nodes --group=system:nodes`
    Registered: Sat Jun 15 01:39:40 UTC 2024
    - Last Modified: Thu May 05 13:44:43 UTC 2022
    - 273.1K bytes
    - Viewed (0)
Back to top