Search Options

Results per page
Sort
Preferred Languages
Advance

Results 51 - 60 of 65 for ClusterRoleBinding (0.32 sec)

  1. cni/README.md

        - `istio-cni-config` configmap with CNI plugin config to add to CNI plugin chained config
        - creates service-account `istio-cni` with `ClusterRoleBinding` to allow gets on pods' info and delete/modifications for recovery.
    
    - `install-cni` container
        - copies `istio-cni` and `istio-iptables` to `/opt/cni/bin`
    Registered: Fri Jun 14 15:00:06 UTC 2024
    - Last Modified: Fri May 03 19:29:42 UTC 2024
    - 12.3K bytes
    - Viewed (0)
  2. pkg/printers/internalversion/printers.go

    		{Name: "Role", Type: "string", Description: rbacv1beta1.ClusterRoleBinding{}.SwaggerDoc()["roleRef"]},
    		{Name: "Age", Type: "string", Description: metav1.ObjectMeta{}.SwaggerDoc()["creationTimestamp"]},
    		{Name: "Users", Type: "string", Priority: 1, Description: "Users in the clusterRoleBinding"},
    		{Name: "Groups", Type: "string", Priority: 1, Description: "Groups in the clusterRoleBinding"},
    Registered: Sat Jun 15 01:39:40 UTC 2024
    - Last Modified: Tue Jun 11 14:04:15 UTC 2024
    - 128.3K bytes
    - Viewed (0)
  3. hack/local-up-cluster.sh

        ${KUBECTL} --kubeconfig "${CERT_DIR}/admin.kubeconfig" create clusterrolebinding kube-apiserver-kubelet-admin --clusterrole=system:kubelet-api-admin --user=kube-apiserver
    
        # Grant kubelets permission to request client certificates
    Registered: Sat Jun 15 01:39:40 UTC 2024
    - Last Modified: Sat May 25 02:33:52 UTC 2024
    - 53.3K bytes
    - Viewed (0)
  4. operator/cmd/mesh/testdata/manifest-generate/output/pilot_default.golden.yaml

      - ""
      resources:
      - serviceaccounts
      verbs:
      - get
      - watch
      - list
      - update
      - patch
      - create
      - delete
    
    ---
    apiVersion: rbac.authorization.k8s.io/v1
    kind: ClusterRoleBinding
    metadata:
      labels:
        app: istio-reader
        release: istio
      name: istio-reader-clusterrole-istio-system
    roleRef:
      apiGroup: rbac.authorization.k8s.io
      kind: ClusterRole
    Registered: Fri Jun 14 15:00:06 UTC 2024
    - Last Modified: Wed Jan 10 05:10:03 UTC 2024
    - 102.6K bytes
    - Viewed (0)
  5. common/scripts/metallb-native.yaml

      kind: Role
      name: pod-lister
    subjects:
    - kind: ServiceAccount
      name: speaker
      namespace: metallb-system
    ---
    apiVersion: rbac.authorization.k8s.io/v1
    kind: ClusterRoleBinding
    metadata:
      labels:
        app: metallb
      name: metallb-system:controller
    roleRef:
      apiGroup: rbac.authorization.k8s.io
      kind: ClusterRole
      name: metallb-system:controller
    subjects:
    Registered: Fri Jun 14 15:00:06 UTC 2024
    - Last Modified: Fri Feb 23 23:56:31 UTC 2024
    - 63.9K bytes
    - Viewed (0)
  6. pkg/printers/internalversion/printers_test.go

    		}
    	}
    }
    
    func TestPrintClusterRoleBinding(t *testing.T) {
    	tests := []struct {
    		binding  rbac.ClusterRoleBinding
    		options  printers.GenerateOptions
    		expected []metav1.TableRow
    	}{
    		// Basic cluster role binding
    		{
    			binding: rbac.ClusterRoleBinding{
    				ObjectMeta: metav1.ObjectMeta{
    					Name:              "binding1",
    Registered: Sat Jun 15 01:39:40 UTC 2024
    - Last Modified: Tue Jun 11 14:04:15 UTC 2024
    - 218.6K bytes
    - Viewed (0)
  7. staging/src/k8s.io/cli-runtime/artifacts/openapi/swagger-with-shared-parameters.json

            {
              "group": "rbac.authorization.k8s.io",
              "kind": "ClusterRole",
              "version": "v1"
            }
          ]
        },
        "io.k8s.api.rbac.v1.ClusterRoleBinding": {
          "description": "ClusterRoleBinding references a ClusterRole, but not contain it.  It can reference a ClusterRole in the global namespace, and adds who information via Subject.",
          "properties": {
            "apiVersion": {
    Registered: Sat Jun 15 01:39:40 UTC 2024
    - Last Modified: Tue Feb 20 15:45:02 UTC 2024
    - 2.3M bytes
    - Viewed (0)
  8. prow/config/calico.yaml

          - ipamconfigs
        verbs:
          - get
          - list
          - create
          - update
          - delete
    ---
    # Source: calico/templates/calico-kube-controllers-rbac.yaml
    kind: ClusterRoleBinding
    apiVersion: rbac.authorization.k8s.io/v1
    metadata:
      name: calico-kube-controllers
    roleRef:
      apiGroup: rbac.authorization.k8s.io
      kind: ClusterRole
      name: calico-kube-controllers
    subjects:
    Registered: Fri Jun 14 15:00:06 UTC 2024
    - Last Modified: Tue May 21 18:32:01 UTC 2024
    - 246.5K bytes
    - Viewed (0)
  9. api/openapi-spec/swagger.json

            {
              "group": "rbac.authorization.k8s.io",
              "kind": "ClusterRole",
              "version": "v1"
            }
          ]
        },
        "io.k8s.api.rbac.v1.ClusterRoleBinding": {
          "description": "ClusterRoleBinding references a ClusterRole, but not contain it.  It can reference a ClusterRole in the global namespace, and adds who information via Subject.",
          "properties": {
            "apiVersion": {
    Registered: Sat Jun 15 01:39:40 UTC 2024
    - Last Modified: Wed Jun 05 18:37:07 UTC 2024
    - 3.1M bytes
    - Viewed (0)
  10. operator/cmd/mesh/testdata/manifest-generate/data-snapshot.tar.gz

    key: istio.io/rev operator: In values: {{- if (eq .Values.revision "") }} - "default" {{- else }} - "{{ .Values.revision }}" {{- end }} --- {{- end }} manifests/charts/istio-control/istio-discovery/templates/clusterrolebinding.yaml apiVersion: rbac.authorization.k8s.io/v1 kind: ClusterRoleBinding metadata: name: istiod-clusterrole{{- if not (eq .Values.revision "")}}-{{ .Values.revision }}{{- end }}-{{ .Release.Namespace }} labels: app: istiod release: {{ .Release.Name }} roleRef: apiGroup: rbac.authorization.k8s.io...
    Registered: Fri Jun 14 15:00:06 UTC 2024
    - Last Modified: Wed Jan 10 05:10:03 UTC 2024
    - 198.1K bytes
    - Viewed (0)
Back to top