- Sort Score
- Result 10 results
- Languages All
Results 11 - 20 of 26 for role (0.04 sec)
-
prow/config/metrics/metrics.yaml
apiVersion: rbac.authorization.k8s.io/v1 kind: RoleBinding metadata: labels: k8s-app: metrics-server name: metrics-server-auth-reader namespace: kube-system roleRef: apiGroup: rbac.authorization.k8s.io kind: Role name: extension-apiserver-authentication-reader subjects: - kind: ServiceAccount name: metrics-server namespace: kube-system --- apiVersion: rbac.authorization.k8s.io/v1 kind: ClusterRoleBinding metadata:
Registered: Fri Jun 14 15:00:06 UTC 2024 - Last Modified: Thu Apr 11 20:51:38 UTC 2024 - 4.6K bytes - Viewed (0) -
operator/pkg/name/name.go
PodStr = "Pod" PDBStr = "PodDisruptionBudget" ReplicaSetStr = "ReplicaSet" RoleStr = "Role" RoleBindingStr = "RoleBinding" SAStr = "ServiceAccount" ServiceStr = "Service" SecretStr = "Secret"
Registered: Fri Jun 14 15:00:06 UTC 2024 - Last Modified: Tue May 14 19:23:44 UTC 2024 - 7.9K bytes - Viewed (0) -
Makefile.core.mk
sed -e '1 i {{- if .Values.global.configCluster }}' -e '$$ a {{- end }}' manifests/charts/istio-control/istio-discovery/templates/role.yaml > manifests/charts/istiod-remote/templates/role.yaml sed -e '1 i {{- if .Values.global.configCluster }}' -e '$$ a {{- end }}' manifests/charts/istio-control/istio-discovery/templates/rolebinding.yaml > manifests/charts/istiod-remote/templates/rolebinding.yaml
Registered: Fri Jun 14 15:00:06 UTC 2024 - Last Modified: Sun Jun 02 19:53:04 UTC 2024 - 23.2K bytes - Viewed (0) -
pilot/cmd/pilot-agent/app/cmd.go
// K8S proxyArgs.DNSDomain = getDNSDomain(proxyArgs.PodNamespace, proxyArgs.DNSDomain) log.WithLabels("ips", proxyArgs.IPAddresses, "type", proxyArgs.Type, "id", proxyArgs.ID, "domain", proxyArgs.DNSDomain).Info("Proxy role") return nil } func getExcludeInterfaces() sets.String { excludeAddrs := sets.New[string]() // Get list of excluded interfaces from pod annotation
Registered: Fri Jun 14 15:00:06 UTC 2024 - Last Modified: Thu May 16 22:12:28 UTC 2024 - 11.9K bytes - Viewed (0) -
manifests/charts/istio-control/istio-discovery/values.yaml
experimental: stableValidationPolicy: false global: # Used to locate istiod. istioNamespace: istio-system # List of cert-signers to allow "approve" action in the istio cluster role # # certSigners: # - clusterissuers.cert-manager.io/istio-ca certSigners: [] # enable pod disruption budget for the control plane, which is used to
Registered: Fri Jun 14 15:00:06 UTC 2024 - Last Modified: Mon Jun 03 01:55:05 UTC 2024 - 21.1K bytes - Viewed (0) -
common/scripts/kind_provisioner.sh
Registered: Fri Jun 14 15:00:06 UTC 2024 - Last Modified: Mon Apr 08 19:12:55 UTC 2024 - 17.3K bytes - Viewed (0) -
pilot/pkg/security/authz/builder/testdata/http/extended-allow-full-rule-out.yaml
name: envoy.filters.http.rbac typedConfig: '@type': type.googleapis.com/envoy.extensions.filters.http.rbac.v3.RBAC rules: policies: ns[foo]-policy[httpbin-1]-rule[0]: permissions: - andRules: rules: - orRules: rules: - header: name: :authority stringMatch: exact: exact.com
Registered: Fri Jun 14 15:00:06 UTC 2024 - Last Modified: Fri May 03 18:02:42 UTC 2024 - 39K bytes - Viewed (0) -
manifests/charts/istiod-remote/values.yaml
experimental: stableValidationPolicy: false global: # Used to locate istiod. istioNamespace: istio-system # List of cert-signers to allow "approve" action in the istio cluster role # # certSigners: # - clusterissuers.cert-manager.io/istio-ca certSigners: [] # enable pod disruption budget for the control plane, which is used to
Registered: Fri Jun 14 15:00:06 UTC 2024 - Last Modified: Mon Jun 03 01:55:05 UTC 2024 - 21K bytes - Viewed (0) -
prow/config/calico.yaml
a negated version, prefixed with \"Not\". All the match criteria within a rule must be satisfied for a packet to match. A single rule can contain the positive and negative version of a match and both must be satisfied for the rule to match." properties: action: type: string
Registered: Fri Jun 14 15:00:06 UTC 2024 - Last Modified: Tue May 21 18:32:01 UTC 2024 - 246.5K bytes - Viewed (0) -
pilot/pkg/security/authz/builder/testdata/http/allow-full-rule-out.yaml
name: envoy.filters.http.rbac typedConfig: '@type': type.googleapis.com/envoy.extensions.filters.http.rbac.v3.RBAC rules: policies: ns[foo]-policy[httpbin-1]-rule[0]: permissions: - andRules: rules: - orRules: rules: - header: name: :authority stringMatch: exact: exact.com
Registered: Fri Jun 14 15:00:06 UTC 2024 - Last Modified: Sat Apr 20 01:58:53 UTC 2024 - 32.6K bytes - Viewed (0)