Search Options

Results per page
Sort
Preferred Languages
Advance

Results 81 - 90 of 119 for ClusterRoleBinding (0.34 sec)

  1. samples/security/psp/sidecar-psp.yaml

    rules:
      - apiGroups:
          - extensions
        resources:
          - podsecuritypolicies
        resourceNames:
          - istio-sidecar
        verbs:
          - use
    ---
    apiVersion: rbac.authorization.k8s.io/v1
    kind: ClusterRoleBinding
    metadata:
      name: istio-sidecar-psp
    roleRef:
      apiGroup: rbac.authorization.k8s.io
      kind: ClusterRole
      name: istio-sidecar-psp
    subjects:
      - apiGroup: rbac.authorization.k8s.io
        kind: Group
    Registered: Fri Jun 14 15:00:06 UTC 2024
    - Last Modified: Mon Nov 27 17:55:37 UTC 2023
    - 881 bytes
    - Viewed (0)
  2. prow/config/metrics/metrics.yaml

      kind: Role
      name: extension-apiserver-authentication-reader
    subjects:
    - kind: ServiceAccount
      name: metrics-server
      namespace: kube-system
    ---
    apiVersion: rbac.authorization.k8s.io/v1
    kind: ClusterRoleBinding
    metadata:
      labels:
        k8s-app: metrics-server
      name: metrics-server:system:auth-delegator
    roleRef:
      apiGroup: rbac.authorization.k8s.io
      kind: ClusterRole
      name: system:auth-delegator
    subjects:
    Registered: Fri Jun 14 15:00:06 UTC 2024
    - Last Modified: Thu Apr 11 20:51:38 UTC 2024
    - 4.6K bytes
    - Viewed (0)
  3. tests/integration/create_cluster_gke.sh

      --cluster-version="$CLUSTER_VERSION" \
      --zone="$ZONE" \
      --machine-type="$MACHINE_TYPE" \
      --num-nodes="$NUM_NODES" \
      --no-enable-legacy-authorization
    
    # This is a hack to handle the case where clusterrolebinding creation returns:
    #
    # Error from server (Forbidden): clusterrolebindings.rbac.authorization.k8s.io is forbidden: User "client" cannot
    # create clusterrolebindings.rbac.authorization.k8s.io at the cluster scope
    Registered: Fri Jun 14 15:00:06 UTC 2024
    - Last Modified: Sat Mar 12 16:02:51 UTC 2022
    - 3.8K bytes
    - Viewed (0)
  4. cluster/addons/kube-network-policies/kube-network-policies-rbac.yaml

          - list
      # Watch for changes to Kubernetes NetworkPolicies.
      - apiGroups: ["networking.k8s.io"]
        resources:
          - networkpolicies
        verbs:
          - watch
          - list
    ---
    kind: ClusterRoleBinding
    apiVersion: rbac.authorization.k8s.io/v1
    metadata:
      name: kube-network-policies
      labels:
        addonmanager.kubernetes.io/mode: Reconcile
    roleRef:
      apiGroup: rbac.authorization.k8s.io
      kind: ClusterRole
    Registered: Sat Jun 15 01:39:40 UTC 2024
    - Last Modified: Sun Apr 21 10:01:31 UTC 2024
    - 1.1K bytes
    - Viewed (0)
  5. cmd/kubeadm/app/phases/addons/dns/manifests.go

    - apiGroups:
      - discovery.k8s.io
      resources:
      - endpointslices
      verbs:
      - list
      - watch
    `
    	// CoreDNSClusterRoleBinding is the CoreDNS Clusterrolebinding manifest
    	CoreDNSClusterRoleBinding = `
    apiVersion: rbac.authorization.k8s.io/v1
    kind: ClusterRoleBinding
    metadata:
      name: system:coredns
    roleRef:
      apiGroup: rbac.authorization.k8s.io
      kind: ClusterRole
      name: system:coredns
    subjects:
    Registered: Sat Jun 15 01:39:40 UTC 2024
    - Last Modified: Fri Oct 20 09:59:39 UTC 2023
    - 5.4K bytes
    - Viewed (0)
  6. samples/security/spire/README.md

      ```bash
      $ kubectl delete namespace spire
      ```
    
    1.  Delete the ClusterRole, ClusterRoleBinding, Role, RoleBindings, ValidatingWebhookConfiguration, CSIDriver, and CustomResourceDefinition:
    
      ```bash
      $ kubectl delete clusterrole spire-server-cluster-role spire-agent-cluster-role manager-role
      $ kubectl delete clusterrolebinding spire-server-cluster-role-binding spire-agent-cluster-role-binding manager-role-binding
    Registered: Fri Jun 14 15:00:06 UTC 2024
    - Last Modified: Fri Feb 24 22:08:56 UTC 2023
    - 4.1K bytes
    - Viewed (0)
  7. manifests/charts/ztunnel/templates/rbac.yaml

    rules:
    - apiGroups: ["security.openshift.io"]
      resources: ["securitycontextconstraints"]
      resourceNames: ["privileged"]
      verbs: ["use"]
    ---
    apiVersion: rbac.authorization.k8s.io/v1
    kind: ClusterRoleBinding
    metadata:
      name: ztunnel
      labels:
        app: ztunnel
        release: {{ .Release.Name }}
        istio.io/rev: {{ .Values.revision | default "default" }}
    Registered: Fri Jun 14 15:00:06 UTC 2024
    - Last Modified: Sat May 04 01:17:57 UTC 2024
    - 1.3K bytes
    - Viewed (0)
  8. pkg/apis/rbac/v1alpha1/defaults.go

    	"k8s.io/apimachinery/pkg/runtime"
    )
    
    func addDefaultingFuncs(scheme *runtime.Scheme) error {
    	return RegisterDefaults(scheme)
    }
    
    func SetDefaults_ClusterRoleBinding(obj *rbacv1alpha1.ClusterRoleBinding) {
    	if len(obj.RoleRef.APIGroup) == 0 {
    		obj.RoleRef.APIGroup = GroupName
    	}
    }
    func SetDefaults_RoleBinding(obj *rbacv1alpha1.RoleBinding) {
    	if len(obj.RoleRef.APIGroup) == 0 {
    Registered: Sat Jun 15 01:39:40 UTC 2024
    - Last Modified: Thu Jun 22 18:30:51 UTC 2017
    - 1.4K bytes
    - Viewed (0)
  9. pkg/apis/rbac/v1/defaults.go

    	rbacv1 "k8s.io/api/rbac/v1"
    	"k8s.io/apimachinery/pkg/runtime"
    )
    
    func addDefaultingFuncs(scheme *runtime.Scheme) error {
    	return RegisterDefaults(scheme)
    }
    
    func SetDefaults_ClusterRoleBinding(obj *rbacv1.ClusterRoleBinding) {
    	if len(obj.RoleRef.APIGroup) == 0 {
    		obj.RoleRef.APIGroup = GroupName
    	}
    }
    func SetDefaults_RoleBinding(obj *rbacv1.RoleBinding) {
    	if len(obj.RoleRef.APIGroup) == 0 {
    		obj.RoleRef.APIGroup = GroupName
    Registered: Sat Jun 15 01:39:40 UTC 2024
    - Last Modified: Wed Aug 09 21:04:54 UTC 2017
    - 1.3K bytes
    - Viewed (0)
  10. pkg/apis/rbac/v1beta1/defaults.go

    	"k8s.io/apimachinery/pkg/runtime"
    )
    
    func addDefaultingFuncs(scheme *runtime.Scheme) error {
    	return RegisterDefaults(scheme)
    }
    
    func SetDefaults_ClusterRoleBinding(obj *rbacv1beta1.ClusterRoleBinding) {
    	if len(obj.RoleRef.APIGroup) == 0 {
    		obj.RoleRef.APIGroup = GroupName
    	}
    }
    func SetDefaults_RoleBinding(obj *rbacv1beta1.RoleBinding) {
    	if len(obj.RoleRef.APIGroup) == 0 {
    Registered: Sat Jun 15 01:39:40 UTC 2024
    - Last Modified: Thu Jun 22 18:30:51 UTC 2017
    - 1.3K bytes
    - Viewed (0)
Back to top