- Sort Score
- Result 10 results
- Languages All
Results 51 - 60 of 65 for ClusterRoleBinding (0.32 sec)
-
cni/README.md
- `istio-cni-config` configmap with CNI plugin config to add to CNI plugin chained config - creates service-account `istio-cni` with `ClusterRoleBinding` to allow gets on pods' info and delete/modifications for recovery. - `install-cni` container - copies `istio-cni` and `istio-iptables` to `/opt/cni/bin`
Registered: Fri Jun 14 15:00:06 UTC 2024 - Last Modified: Fri May 03 19:29:42 UTC 2024 - 12.3K bytes - Viewed (0) -
pkg/printers/internalversion/printers.go
{Name: "Role", Type: "string", Description: rbacv1beta1.ClusterRoleBinding{}.SwaggerDoc()["roleRef"]}, {Name: "Age", Type: "string", Description: metav1.ObjectMeta{}.SwaggerDoc()["creationTimestamp"]}, {Name: "Users", Type: "string", Priority: 1, Description: "Users in the clusterRoleBinding"}, {Name: "Groups", Type: "string", Priority: 1, Description: "Groups in the clusterRoleBinding"},
Registered: Sat Jun 15 01:39:40 UTC 2024 - Last Modified: Tue Jun 11 14:04:15 UTC 2024 - 128.3K bytes - Viewed (0) -
hack/local-up-cluster.sh
${KUBECTL} --kubeconfig "${CERT_DIR}/admin.kubeconfig" create clusterrolebinding kube-apiserver-kubelet-admin --clusterrole=system:kubelet-api-admin --user=kube-apiserver # Grant kubelets permission to request client certificates
Registered: Sat Jun 15 01:39:40 UTC 2024 - Last Modified: Sat May 25 02:33:52 UTC 2024 - 53.3K bytes - Viewed (0) -
operator/cmd/mesh/testdata/manifest-generate/output/pilot_default.golden.yaml
- "" resources: - serviceaccounts verbs: - get - watch - list - update - patch - create - delete --- apiVersion: rbac.authorization.k8s.io/v1 kind: ClusterRoleBinding metadata: labels: app: istio-reader release: istio name: istio-reader-clusterrole-istio-system roleRef: apiGroup: rbac.authorization.k8s.io kind: ClusterRole
Registered: Fri Jun 14 15:00:06 UTC 2024 - Last Modified: Wed Jan 10 05:10:03 UTC 2024 - 102.6K bytes - Viewed (0) -
common/scripts/metallb-native.yaml
kind: Role name: pod-lister subjects: - kind: ServiceAccount name: speaker namespace: metallb-system --- apiVersion: rbac.authorization.k8s.io/v1 kind: ClusterRoleBinding metadata: labels: app: metallb name: metallb-system:controller roleRef: apiGroup: rbac.authorization.k8s.io kind: ClusterRole name: metallb-system:controller subjects:
Registered: Fri Jun 14 15:00:06 UTC 2024 - Last Modified: Fri Feb 23 23:56:31 UTC 2024 - 63.9K bytes - Viewed (0) -
pkg/printers/internalversion/printers_test.go
} } } func TestPrintClusterRoleBinding(t *testing.T) { tests := []struct { binding rbac.ClusterRoleBinding options printers.GenerateOptions expected []metav1.TableRow }{ // Basic cluster role binding { binding: rbac.ClusterRoleBinding{ ObjectMeta: metav1.ObjectMeta{ Name: "binding1",
Registered: Sat Jun 15 01:39:40 UTC 2024 - Last Modified: Tue Jun 11 14:04:15 UTC 2024 - 218.6K bytes - Viewed (0) -
staging/src/k8s.io/cli-runtime/artifacts/openapi/swagger-with-shared-parameters.json
{ "group": "rbac.authorization.k8s.io", "kind": "ClusterRole", "version": "v1" } ] }, "io.k8s.api.rbac.v1.ClusterRoleBinding": { "description": "ClusterRoleBinding references a ClusterRole, but not contain it. It can reference a ClusterRole in the global namespace, and adds who information via Subject.", "properties": { "apiVersion": {
Registered: Sat Jun 15 01:39:40 UTC 2024 - Last Modified: Tue Feb 20 15:45:02 UTC 2024 - 2.3M bytes - Viewed (0) -
prow/config/calico.yaml
- ipamconfigs verbs: - get - list - create - update - delete --- # Source: calico/templates/calico-kube-controllers-rbac.yaml kind: ClusterRoleBinding apiVersion: rbac.authorization.k8s.io/v1 metadata: name: calico-kube-controllers roleRef: apiGroup: rbac.authorization.k8s.io kind: ClusterRole name: calico-kube-controllers subjects:
Registered: Fri Jun 14 15:00:06 UTC 2024 - Last Modified: Tue May 21 18:32:01 UTC 2024 - 246.5K bytes - Viewed (0) -
api/openapi-spec/swagger.json
{ "group": "rbac.authorization.k8s.io", "kind": "ClusterRole", "version": "v1" } ] }, "io.k8s.api.rbac.v1.ClusterRoleBinding": { "description": "ClusterRoleBinding references a ClusterRole, but not contain it. It can reference a ClusterRole in the global namespace, and adds who information via Subject.", "properties": { "apiVersion": {
Registered: Sat Jun 15 01:39:40 UTC 2024 - Last Modified: Wed Jun 05 18:37:07 UTC 2024 - 3.1M bytes - Viewed (0) -
operator/cmd/mesh/testdata/manifest-generate/data-snapshot.tar.gz
key: istio.io/rev operator: In values: {{- if (eq .Values.revision "") }} - "default" {{- else }} - "{{ .Values.revision }}" {{- end }} --- {{- end }} manifests/charts/istio-control/istio-discovery/templates/clusterrolebinding.yaml apiVersion: rbac.authorization.k8s.io/v1 kind: ClusterRoleBinding metadata: name: istiod-clusterrole{{- if not (eq .Values.revision "")}}-{{ .Values.revision }}{{- end }}-{{ .Release.Namespace }} labels: app: istiod release: {{ .Release.Name }} roleRef: apiGroup: rbac.authorization.k8s.io...
Registered: Fri Jun 14 15:00:06 UTC 2024 - Last Modified: Wed Jan 10 05:10:03 UTC 2024 - 198.1K bytes - Viewed (0)