- Sort Score
- Result 10 results
- Languages All
Results 1 - 9 of 9 for Carole (0.26 sec)
-
manifests/charts/gateways/istio-ingress/templates/role.yaml
{{ $gateway := index .Values "gateways" "istio-ingressgateway" }} apiVersion: rbac.authorization.k8s.io/v1 kind: Role metadata: name: {{ $gateway.name }}-sds namespace: {{ .Release.Namespace }} labels: release: {{ .Release.Name }} istio.io/rev: {{ .Values.revision | default "default" | quote }} install.operator.istio.io/owning-resource: {{ .Values.ownerName | default "unknown" }} operator.istio.io/component: "IngressGateways" rules:
Others - Registered: Wed May 08 22:53:08 GMT 2024 - Last Modified: Thu Apr 18 18:16:49 GMT 2024 - 540 bytes - Viewed (0) -
manifests/charts/istio-control/istio-discovery/values.yaml
experimental: stableValidationPolicy: false global: # Used to locate istiod. istioNamespace: istio-system # List of cert-signers to allow "approve" action in the istio cluster role # # certSigners: # - clusterissuers.cert-manager.io/istio-ca certSigners: [] # enable pod disruption budget for the control plane, which is used to
Others - Registered: Wed May 08 22:53:08 GMT 2024 - Last Modified: Mon Apr 22 22:00:40 GMT 2024 - 20.3K bytes - Viewed (0) -
manifests/charts/gateways/istio-egress/templates/rolebindings.yaml
install.operator.istio.io/owning-resource: {{ .Values.ownerName | default "unknown" }} operator.istio.io/component: "EgressGateways" roleRef: apiGroup: rbac.authorization.k8s.io kind: Role name: {{ $gateway.name }}-sds subjects: - kind: ServiceAccount name: {{ $gateway.name }}-service-account
Others - Registered: Wed May 08 22:53:08 GMT 2024 - Last Modified: Thu Apr 18 18:16:49 GMT 2024 - 630 bytes - Viewed (0) -
Makefile.core.mk
sed -e '1 i {{- if .Values.global.configCluster }}' -e '$$ a {{- end }}' manifests/charts/istio-control/istio-discovery/templates/role.yaml > manifests/charts/istiod-remote/templates/role.yaml sed -e '1 i {{- if .Values.global.configCluster }}' -e '$$ a {{- end }}' manifests/charts/istio-control/istio-discovery/templates/rolebinding.yaml > manifests/charts/istiod-remote/templates/rolebinding.yaml
Plain Text - Registered: Wed May 08 22:53:08 GMT 2024 - Last Modified: Wed May 08 20:25:15 GMT 2024 - 22.5K bytes - Viewed (0) -
manifests/charts/gateways/istio-egress/templates/role.yaml
{{ $gateway := index .Values "gateways" "istio-egressgateway" }} apiVersion: rbac.authorization.k8s.io/v1 kind: Role metadata: name: {{ $gateway.name }}-sds namespace: {{ .Release.Namespace }} labels: release: {{ .Release.Name }} istio.io/rev: {{ .Values.revision | default "default" | quote }} install.operator.istio.io/owning-resource: {{ .Values.ownerName | default "unknown" }} operator.istio.io/component: "EgressGateways" rules:
Others - Registered: Wed May 08 22:53:08 GMT 2024 - Last Modified: Thu Apr 18 18:16:49 GMT 2024 - 538 bytes - Viewed (0) -
manifests/charts/istio-cni/templates/clusterrolebinding.yaml
subjects: - kind: ServiceAccount name: istio-cni namespace: {{ .Release.Namespace}} roleRef: apiGroup: rbac.authorization.k8s.io kind: ClusterRole name: istio-cni-repair-role {{- end }} --- {{- if .Values.cni.ambient.enabled }} apiVersion: rbac.authorization.k8s.io/v1 kind: ClusterRoleBinding metadata: name: istio-cni-ambient labels: k8s-app: istio-cni-repair
Others - Registered: Wed May 08 22:53:08 GMT 2024 - Last Modified: Wed May 01 20:25:40 GMT 2024 - 1.7K bytes - Viewed (0) -
manifests/charts/istiod-remote/values.yaml
experimental: stableValidationPolicy: false global: # Used to locate istiod. istioNamespace: istio-system # List of cert-signers to allow "approve" action in the istio cluster role # # certSigners: # - clusterissuers.cert-manager.io/istio-ca certSigners: [] # enable pod disruption budget for the control plane, which is used to
Others - Registered: Wed May 08 22:53:08 GMT 2024 - Last Modified: Mon Apr 22 22:00:40 GMT 2024 - 20.2K bytes - Viewed (0) -
manifests/charts/gateways/istio-ingress/templates/rolebindings.yaml
install.operator.istio.io/owning-resource: {{ .Values.ownerName | default "unknown" }} operator.istio.io/component: "IngressGateways" roleRef: apiGroup: rbac.authorization.k8s.io kind: Role name: {{ $gateway.name }}-sds subjects: - kind: ServiceAccount name: {{ $gateway.name }}-service-account
Others - Registered: Wed May 08 22:53:08 GMT 2024 - Last Modified: Thu Apr 18 18:16:49 GMT 2024 - 632 bytes - Viewed (0) -
manifests/charts/istio-cni/templates/clusterrole.yaml
resourceNames: ["privileged"] verbs: ["use"] {{- end }} --- {{- if .Values.cni.repair.enabled }} apiVersion: rbac.authorization.k8s.io/v1 kind: ClusterRole metadata: name: istio-cni-repair-role labels: app: istio-cni release: {{ .Release.Name }} istio.io/rev: {{ .Values.revision | default "default" }} install.operator.istio.io/owning-resource: {{ .Values.ownerName | default "unknown" }}
Others - Registered: Wed May 08 22:53:08 GMT 2024 - Last Modified: Sat May 04 01:55:56 GMT 2024 - 2.2K bytes - Viewed (0)