Search Options

Results per page
Sort
Preferred Languages
Advance

Results 21 - 30 of 65 for ClusterRoleBinding (0.29 sec)

  1. cmd/kubeadm/app/util/apiclient/idempotency.go

    		return nil
    	}
    	return lastError
    }
    
    // CreateOrUpdateClusterRoleBinding creates a ClusterRoleBinding if the target resource doesn't exist. If the resource exists already, this function will update the resource instead.
    func CreateOrUpdateClusterRoleBinding(client clientset.Interface, clusterRoleBinding *rbac.ClusterRoleBinding) error {
    	var lastError error
    	err := wait.PollUntilContextTimeout(context.Background(),
    Registered: Sat Jun 15 01:39:40 UTC 2024
    - Last Modified: Sun Feb 18 11:14:32 UTC 2024
    - 18.4K bytes
    - Viewed (0)
  2. cluster/addons/metrics-server/resource-reader.yaml

        resourceNames:
          - metrics-server-v0.7.1
        verbs:
          - get
          - patch
      - nonResourceURLs:
        - /metrics
        verbs:
          - get
    ---
    apiVersion: rbac.authorization.k8s.io/v1
    kind: ClusterRoleBinding
    metadata:
      name: system:metrics-server
      labels:
        kubernetes.io/cluster-service: "true"
        addonmanager.kubernetes.io/mode: Reconcile
    roleRef:
      apiGroup: rbac.authorization.k8s.io
      kind: ClusterRole
    Registered: Sat Jun 15 01:39:40 UTC 2024
    - Last Modified: Sun May 26 01:57:01 UTC 2024
    - 988 bytes
    - Viewed (0)
  3. staging/src/k8s.io/api/rbac/v1/types.go

    // +k8s:deepcopy-gen:interfaces=k8s.io/apimachinery/pkg/runtime.Object
    // +k8s:prerelease-lifecycle-gen:introduced=1.8
    
    // ClusterRoleBinding references a ClusterRole, but not contain it.  It can reference a ClusterRole in the global namespace,
    // and adds who information via Subject.
    type ClusterRoleBinding struct {
    	metav1.TypeMeta `json:",inline"`
    	// Standard object's metadata.
    	// +optional
    Registered: Sat Jun 15 01:39:40 UTC 2024
    - Last Modified: Thu May 23 17:42:49 UTC 2024
    - 10.7K bytes
    - Viewed (0)
  4. prow/config/metrics/metrics.yaml

      kind: Role
      name: extension-apiserver-authentication-reader
    subjects:
    - kind: ServiceAccount
      name: metrics-server
      namespace: kube-system
    ---
    apiVersion: rbac.authorization.k8s.io/v1
    kind: ClusterRoleBinding
    metadata:
      labels:
        k8s-app: metrics-server
      name: metrics-server:system:auth-delegator
    roleRef:
      apiGroup: rbac.authorization.k8s.io
      kind: ClusterRole
      name: system:auth-delegator
    subjects:
    Registered: Fri Jun 14 15:00:06 UTC 2024
    - Last Modified: Thu Apr 11 20:51:38 UTC 2024
    - 4.6K bytes
    - Viewed (0)
  5. cluster/addons/kube-network-policies/kube-network-policies-rbac.yaml

          - list
      # Watch for changes to Kubernetes NetworkPolicies.
      - apiGroups: ["networking.k8s.io"]
        resources:
          - networkpolicies
        verbs:
          - watch
          - list
    ---
    kind: ClusterRoleBinding
    apiVersion: rbac.authorization.k8s.io/v1
    metadata:
      name: kube-network-policies
      labels:
        addonmanager.kubernetes.io/mode: Reconcile
    roleRef:
      apiGroup: rbac.authorization.k8s.io
      kind: ClusterRole
    Registered: Sat Jun 15 01:39:40 UTC 2024
    - Last Modified: Sun Apr 21 10:01:31 UTC 2024
    - 1.1K bytes
    - Viewed (0)
  6. staging/src/k8s.io/api/rbac/v1/generated.pb.go

    func (m *ClusterRoleBinding) Reset()      { *m = ClusterRoleBinding{} }
    func (*ClusterRoleBinding) ProtoMessage() {}
    func (*ClusterRoleBinding) Descriptor() ([]byte, []int) {
    	return fileDescriptor_c8ba2e7dd472de66, []int{2}
    }
    func (m *ClusterRoleBinding) XXX_Unmarshal(b []byte) error {
    	return m.Unmarshal(b)
    }
    func (m *ClusterRoleBinding) XXX_Marshal(b []byte, deterministic bool) ([]byte, error) {
    Registered: Sat Jun 15 01:39:40 UTC 2024
    - Last Modified: Fri Mar 01 06:06:37 UTC 2024
    - 77.5K bytes
    - Viewed (0)
  7. manifests/charts/ztunnel/templates/rbac.yaml

    rules:
    - apiGroups: ["security.openshift.io"]
      resources: ["securitycontextconstraints"]
      resourceNames: ["privileged"]
      verbs: ["use"]
    ---
    apiVersion: rbac.authorization.k8s.io/v1
    kind: ClusterRoleBinding
    metadata:
      name: ztunnel
      labels:
        app: ztunnel
        release: {{ .Release.Name }}
        istio.io/rev: {{ .Values.revision | default "default" }}
    Registered: Fri Jun 14 15:00:06 UTC 2024
    - Last Modified: Sat May 04 01:17:57 UTC 2024
    - 1.3K bytes
    - Viewed (0)
  8. staging/src/k8s.io/api/rbac/v1beta1/generated.pb.go

    func (m *ClusterRoleBinding) Reset()      { *m = ClusterRoleBinding{} }
    func (*ClusterRoleBinding) ProtoMessage() {}
    func (*ClusterRoleBinding) Descriptor() ([]byte, []int) {
    	return fileDescriptor_c5bc2d145acd4e45, []int{2}
    }
    func (m *ClusterRoleBinding) XXX_Unmarshal(b []byte) error {
    	return m.Unmarshal(b)
    }
    func (m *ClusterRoleBinding) XXX_Marshal(b []byte, deterministic bool) ([]byte, error) {
    Registered: Sat Jun 15 01:39:40 UTC 2024
    - Last Modified: Fri Mar 01 06:06:37 UTC 2024
    - 77.6K bytes
    - Viewed (0)
  9. staging/src/k8s.io/api/rbac/v1alpha1/generated.pb.go

    func (m *ClusterRoleBinding) Reset()      { *m = ClusterRoleBinding{} }
    func (*ClusterRoleBinding) ProtoMessage() {}
    func (*ClusterRoleBinding) Descriptor() ([]byte, []int) {
    	return fileDescriptor_758889dfd9a88fa6, []int{2}
    }
    func (m *ClusterRoleBinding) XXX_Unmarshal(b []byte) error {
    	return m.Unmarshal(b)
    }
    func (m *ClusterRoleBinding) XXX_Marshal(b []byte, deterministic bool) ([]byte, error) {
    Registered: Sat Jun 15 01:39:40 UTC 2024
    - Last Modified: Fri Mar 01 06:06:37 UTC 2024
    - 77.7K bytes
    - Viewed (0)
  10. cluster/addons/node-problem-detector/npd.yaml

    metadata:
      name: node-problem-detector
      namespace: kube-system
      labels:
        kubernetes.io/cluster-service: "true"
        addonmanager.kubernetes.io/mode: Reconcile
    ---
    apiVersion: rbac.authorization.k8s.io/v1
    kind: ClusterRoleBinding
    metadata:
      name: npd-binding
      labels:
        kubernetes.io/cluster-service: "true"
        addonmanager.kubernetes.io/mode: Reconcile
    roleRef:
      apiGroup: rbac.authorization.k8s.io
      kind: ClusterRole
    Registered: Sat Jun 15 01:39:40 UTC 2024
    - Last Modified: Thu May 30 04:14:02 UTC 2024
    - 2.6K bytes
    - Viewed (0)
Back to top