- Sort Score
- Result 10 results
- Languages All
Results 1 - 10 of 28 for Carole (0.24 sec)
-
manifests/charts/istio-control/istio-discovery/templates/role.yaml
apiVersion: rbac.authorization.k8s.io/v1 kind: Role metadata: name: istiod{{- if not (eq .Values.revision "")}}-{{ .Values.revision }}{{- end }} namespace: {{ .Values.global.istioNamespace }} labels: app: istiod release: {{ .Release.Name }} rules: # permissions to verify the webhook is ready and rejecting # invalid config. We use --server-dry-run so no config is persisted. - apiGroups: ["networking.istio.io"] verbs: ["create"]
Others - Registered: Wed Mar 20 22:53:08 GMT 2024 - Last Modified: Thu May 04 16:21:31 GMT 2023 - 971 bytes - Viewed (0) -
manifests/charts/istio-control/istio-discovery/templates/rolebinding.yaml
namespace: {{ .Values.global.istioNamespace }} labels: app: istiod release: {{ .Release.Name }} roleRef: apiGroup: rbac.authorization.k8s.io kind: Role name: istiod{{- if not (eq .Values.revision "")}}-{{ .Values.revision }}{{- end }} subjects: - kind: ServiceAccount name: istiod{{- if not (eq .Values.revision "") }}-{{ .Values.revision }}{{- end }}
Others - Registered: Wed Mar 20 22:53:08 GMT 2024 - Last Modified: Wed Jun 09 22:42:56 GMT 2021 - 581 bytes - Viewed (0) -
manifests/charts/gateway/templates/role.yaml
{{/*Set up roles for Istio Gateway. Not required for gateway-api*/}} {{- if .Values.rbac.enabled }} apiVersion: rbac.authorization.k8s.io/v1 kind: Role metadata: name: {{ include "gateway.serviceAccountName" . }} namespace: {{ .Release.Namespace }} labels: {{- include "gateway.labels" . | nindent 4}} annotations: {{- .Values.annotations | toYaml | nindent 4 }} rules: - apiGroups: [""] resources: ["secrets"]
Others - Registered: Wed Apr 24 22:53:08 GMT 2024 - Last Modified: Tue Feb 21 16:58:32 GMT 2023 - 963 bytes - Viewed (0) -
manifests/charts/gateways/istio-ingress/templates/role.yaml
{{ $gateway := index .Values "gateways" "istio-ingressgateway" }} apiVersion: rbac.authorization.k8s.io/v1 kind: Role metadata: name: {{ $gateway.name }}-sds namespace: {{ .Release.Namespace }} labels: release: {{ .Release.Name }} istio.io/rev: {{ .Values.revision | default "default" | quote }} install.operator.istio.io/owning-resource: {{ .Values.ownerName | default "unknown" }} operator.istio.io/component: "IngressGateways" rules:
Others - Registered: Wed Apr 24 22:53:08 GMT 2024 - Last Modified: Thu Apr 18 18:16:49 GMT 2024 - 540 bytes - Viewed (0) -
common-protos/k8s.io/api/authorization/v1beta1/generated.proto
// It is entirely possible to get an error and be able to continue determine authorization status in spite of it. // For instance, RBAC can be missing a role, but enough roles are still present and bound to reason about the request. // +optional optional string evaluationError = 3; }
Plain Text - Registered: Wed Apr 24 22:53:08 GMT 2024 - Last Modified: Mon Mar 11 18:43:24 GMT 2024 - 11.9K bytes - Viewed (0) -
manifests/charts/istio-control/istio-discovery/values.yaml
meshConfig: enablePrometheusMerge: true global: # Used to locate istiod. istioNamespace: istio-system # List of cert-signers to allow "approve" action in the istio cluster role # # certSigners: # - clusterissuers.cert-manager.io/istio-ca certSigners: [] # enable pod disruption budget for the control plane, which is used to
Others - Registered: Wed Mar 20 22:53:08 GMT 2024 - Last Modified: Mon Mar 11 16:58:23 GMT 2024 - 19.6K bytes - Viewed (0) -
manifests/charts/gateways/istio-ingress/templates/rolebindings.yaml
install.operator.istio.io/owning-resource: {{ .Values.ownerName | default "unknown" }} operator.istio.io/component: "IngressGateways" roleRef: apiGroup: rbac.authorization.k8s.io kind: Role name: {{ $gateway.name }}-sds subjects: - kind: ServiceAccount name: {{ $gateway.name }}-service-account
Others - Registered: Wed Apr 24 22:53:08 GMT 2024 - Last Modified: Thu Apr 18 18:16:49 GMT 2024 - 632 bytes - Viewed (0) -
manifests/addons/values-grafana.yaml
ldap: existingSecret: true env: GF_SECURITY_ADMIN_USER: "admin" GF_SECURITY_ADMIN_PASSWORD: "admin" GF_AUTH_BASIC_ENABLED: "false" GF_AUTH_ANONYMOUS_ENABLED: "true" GF_AUTH_ANONYMOUS_ORG_ROLE: Admin # Expose on port 3000 to match the Istio docs service: port: 3000 securityContext: null # Set up out dashboards dashboardProviders: dashboardproviders.yaml: apiVersion: 1
Others - Registered: Wed Apr 24 22:53:08 GMT 2024 - Last Modified: Wed Oct 25 02:07:51 GMT 2023 - 1.7K bytes - Viewed (0) -
common-protos/k8s.io/api/rbac/v1/generated.proto
// +optional repeated string nonResourceURLs = 5; } // Role is a namespaced, logical grouping of PolicyRules that can be referenced as a unit by a RoleBinding. message Role { // Standard object's metadata. // +optional optional k8s.io.apimachinery.pkg.apis.meta.v1.ObjectMeta metadata = 1; // Rules holds all the PolicyRules for this Role // +optional repeated PolicyRule rules = 2; }
Plain Text - Registered: Wed Apr 24 22:53:08 GMT 2024 - Last Modified: Mon Mar 11 18:43:24 GMT 2024 - 7.6K bytes - Viewed (0) -
manifests/charts/istio-cni/templates/clusterrole.yaml
resources: ["pods","nodes","namespaces"] verbs: ["get", "list", "watch"] --- {{- if .Values.cni.repair.enabled }} apiVersion: rbac.authorization.k8s.io/v1 kind: ClusterRole metadata: name: istio-cni-repair-role labels: app: istio-cni release: {{ .Release.Name }} istio.io/rev: {{ .Values.revision | default "default" }} install.operator.istio.io/owning-resource: {{ .Values.ownerName | default "unknown" }}
Others - Registered: Wed Apr 24 22:53:08 GMT 2024 - Last Modified: Wed Dec 20 22:14:13 GMT 2023 - 2K bytes - Viewed (0)