- Sort Score
- Num 10 results
- Language All
Results 1 - 6 of 6 for clusterrolebinding (0.11 seconds)
The search processing time has exceeded the limit. The displayed results may be partial.
-
CHANGELOG/CHANGELOG-1.6.md
* Update command invocations to pass separate --from-literal flags for each value ### RBAC
Created: Fri Dec 26 09:05:12 GMT 2025 - Last Modified: Thu Dec 24 02:28:26 GMT 2020 - 304K bytes - Click Count (0) -
CHANGELOG/CHANGELOG-1.14.md
- `kubectl create clusterrolebinding anonymous-discovery --clusterrole=system:discovery --group=system:unauthenticated` - `kubectl create clusterrolebinding anonymous-access-review --clusterrole=system:basic-user --group=system:unauthenticated`Created: Fri Dec 26 09:05:12 GMT 2025 - Last Modified: Mon Jun 14 22:06:39 GMT 2021 - 271.5K bytes - Click Count (0) -
CHANGELOG/CHANGELOG-1.18.md
- `kubectl create clusterrolebinding` creates rbac.authorization.k8s.io/v1 object ([#85889](https://github.com/kubernetes/kubernetes/pull/85889), [@oke-py](https://github.com/oke-py)) [SIG CLI]
Created: Fri Dec 26 09:05:12 GMT 2025 - Last Modified: Wed Jun 16 17:18:28 GMT 2021 - 373.2K bytes - Click Count (0) -
CHANGELOG/CHANGELOG-1.29.md
- Kubeadm: do not exit with an error if the "super-admin.conf" cannot create a ClusterRoleBinding for the "cluster-admin" user, due to the ClusterRoleBInding already existing. ([#125821](https://github.com/kubernetes/kubernetes/pull/125821), [@neolit123](https://github.com/neolit123)) [SIG Cluster Lifecycle]
Created: Fri Dec 26 09:05:12 GMT 2025 - Last Modified: Wed Mar 12 00:36:01 GMT 2025 - 429.6K bytes - Click Count (1) -
CHANGELOG/CHANGELOG-1.11.md
* or grant self-deletion permission explicitly: * `kubectl create clusterrole self-deleting-nodes --verb=delete --resource=nodes` * `kubectl create clusterrolebinding self-deleting-nodes --clusterrole=self-deleting-nodes --group=system:nodes`Created: Fri Dec 26 09:05:12 GMT 2025 - Last Modified: Thu Feb 06 06:04:15 GMT 2020 - 328.4K bytes - Click Count (0) -
CHANGELOG/CHANGELOG-1.10.md
[@caesarxuchao](https://github.com/caesarxuchao)) * Using kubectl gcp auth plugin with a Google Service Account to authenticate to a cluster now additionally requests a token with the "userinfo.email" scope. This way, users can write ClusterRoleBindings/RoleBindings with the email address of the service account directly. (This is a breaking change if the numeric uniqueIDs of the Google service accounts were being used in RBAC role bindings. The behavior can be overridden by explicitly specifying...
Created: Fri Dec 26 09:05:12 GMT 2025 - Last Modified: Thu May 05 13:44:43 GMT 2022 - 341.8K bytes - Click Count (0)