Search Options

Results per page
Sort
Preferred Languages
Advance

Results 91 - 100 of 185 for ClusterRoleBinding (0.43 sec)

  1. cluster/addons/metadata-agent/stackdriver/metadata-agent-rbac.yaml

        addonmanager.kubernetes.io/mode: Reconcile
    rules:
    - apiGroups:
      - "*"
      resources:
      - "*"
      verbs:
      - watch
      - get
      - list
    ---
    apiVersion: rbac.authorization.k8s.io/v1
    kind: ClusterRoleBinding
    metadata:
      name: stackdriver:metadata-agent
      labels:
        kubernetes.io/cluster-service: "true"
        addonmanager.kubernetes.io/mode: Reconcile
    roleRef:
      apiGroup: rbac.authorization.k8s.io
    Registered: Sat Jun 15 01:39:40 UTC 2024
    - Last Modified: Mon Aug 06 15:26:35 UTC 2018
    - 685 bytes
    - Viewed (0)
  2. cluster/gce/addons/loadbalancing/cloud-provider-binding.yaml

      kind: Role
      name: gce:cloud-provider
    subjects:
    - kind: ServiceAccount
      name: cloud-provider
      namespace: kube-system
    ---
    apiVersion: rbac.authorization.k8s.io/v1
    kind: ClusterRoleBinding
    metadata:
      labels:
        addonmanager.kubernetes.io/mode: Reconcile
      name: gce:cloud-provider
    roleRef:
      apiGroup: rbac.authorization.k8s.io
      kind: ClusterRole
      name: gce:cloud-provider
    subjects:
    Registered: Sat Jun 15 01:39:40 UTC 2024
    - Last Modified: Tue Aug 28 03:47:26 UTC 2018
    - 685 bytes
    - Viewed (0)
  3. cluster/addons/rbac/cluster-loadbalancing/glbc/user-rolebindings.yaml

    roleRef:
      apiGroup: rbac.authorization.k8s.io
      kind: Role
      name: system:controller:glbc
    subjects:
    - kind: User
      name: system:controller:glbc
    ---
    apiVersion: rbac.authorization.k8s.io/v1
    kind: ClusterRoleBinding
    metadata:
      name: system:controller:glbc
      labels:
        addonmanager.kubernetes.io/mode: Reconcile
    roleRef:
      apiGroup: rbac.authorization.k8s.io
      kind: ClusterRole
      name: system:controller:glbc
    Registered: Sat Jun 15 01:39:40 UTC 2024
    - Last Modified: Thu May 02 05:24:48 UTC 2019
    - 647 bytes
    - Viewed (0)
  4. staging/src/k8s.io/api/rbac/v1/types_swagger_doc_generated.go

    	return map_AggregationRule
    }
    
    var map_ClusterRole = map[string]string{
    	"":                "ClusterRole is a cluster level, logical grouping of PolicyRules that can be referenced as a unit by a RoleBinding or ClusterRoleBinding.",
    	"metadata":        "Standard object's metadata.",
    	"rules":           "Rules holds all the PolicyRules for this ClusterRole",
    Registered: Sat Jun 15 01:39:40 UTC 2024
    - Last Modified: Mon Apr 24 20:35:20 UTC 2023
    - 7.8K bytes
    - Viewed (0)
  5. cluster/addons/rbac/legacy-kubelet-user/kubelet-binding.yaml

    # identify the system:nodes group.  They use the kubelet identity
    # TODO: remove this once new nodes are granted individual identities and the
    # NodeAuthorizer is enabled.
    apiVersion: rbac.authorization.k8s.io/v1
    kind: ClusterRoleBinding
    metadata:
      name: kubelet-cluster-admin
      labels:
        addonmanager.kubernetes.io/mode: Reconcile
    roleRef:
      apiGroup: rbac.authorization.k8s.io
      kind: ClusterRole
      name: system:node
    subjects:
    Registered: Sat Jun 15 01:39:40 UTC 2024
    - Last Modified: Sun Mar 24 04:11:47 UTC 2019
    - 565 bytes
    - Viewed (0)
  6. cluster/addons/metrics-server/resource-reader.yaml

        resourceNames:
          - metrics-server-v0.7.1
        verbs:
          - get
          - patch
      - nonResourceURLs:
        - /metrics
        verbs:
          - get
    ---
    apiVersion: rbac.authorization.k8s.io/v1
    kind: ClusterRoleBinding
    metadata:
      name: system:metrics-server
      labels:
        kubernetes.io/cluster-service: "true"
        addonmanager.kubernetes.io/mode: Reconcile
    roleRef:
      apiGroup: rbac.authorization.k8s.io
      kind: ClusterRole
    Registered: Sat Jun 15 01:39:40 UTC 2024
    - Last Modified: Sun May 26 01:57:01 UTC 2024
    - 988 bytes
    - Viewed (0)
  7. samples/security/psp/sidecar-psp.yaml

    rules:
      - apiGroups:
          - extensions
        resources:
          - podsecuritypolicies
        resourceNames:
          - istio-sidecar
        verbs:
          - use
    ---
    apiVersion: rbac.authorization.k8s.io/v1
    kind: ClusterRoleBinding
    metadata:
      name: istio-sidecar-psp
    roleRef:
      apiGroup: rbac.authorization.k8s.io
      kind: ClusterRole
      name: istio-sidecar-psp
    subjects:
      - apiGroup: rbac.authorization.k8s.io
        kind: Group
    Registered: Fri Jun 14 15:00:06 UTC 2024
    - Last Modified: Mon Nov 27 17:55:37 UTC 2023
    - 881 bytes
    - Viewed (0)
  8. staging/src/k8s.io/api/rbac/v1/types.go

    // +k8s:deepcopy-gen:interfaces=k8s.io/apimachinery/pkg/runtime.Object
    // +k8s:prerelease-lifecycle-gen:introduced=1.8
    
    // ClusterRoleBinding references a ClusterRole, but not contain it.  It can reference a ClusterRole in the global namespace,
    // and adds who information via Subject.
    type ClusterRoleBinding struct {
    	metav1.TypeMeta `json:",inline"`
    	// Standard object's metadata.
    	// +optional
    Registered: Sat Jun 15 01:39:40 UTC 2024
    - Last Modified: Thu May 23 17:42:49 UTC 2024
    - 10.7K bytes
    - Viewed (0)
  9. prow/config/metrics/metrics.yaml

      kind: Role
      name: extension-apiserver-authentication-reader
    subjects:
    - kind: ServiceAccount
      name: metrics-server
      namespace: kube-system
    ---
    apiVersion: rbac.authorization.k8s.io/v1
    kind: ClusterRoleBinding
    metadata:
      labels:
        k8s-app: metrics-server
      name: metrics-server:system:auth-delegator
    roleRef:
      apiGroup: rbac.authorization.k8s.io
      kind: ClusterRole
      name: system:auth-delegator
    subjects:
    Registered: Fri Jun 14 15:00:06 UTC 2024
    - Last Modified: Thu Apr 11 20:51:38 UTC 2024
    - 4.6K bytes
    - Viewed (0)
  10. cluster/addons/kube-network-policies/kube-network-policies-rbac.yaml

          - list
      # Watch for changes to Kubernetes NetworkPolicies.
      - apiGroups: ["networking.k8s.io"]
        resources:
          - networkpolicies
        verbs:
          - watch
          - list
    ---
    kind: ClusterRoleBinding
    apiVersion: rbac.authorization.k8s.io/v1
    metadata:
      name: kube-network-policies
      labels:
        addonmanager.kubernetes.io/mode: Reconcile
    roleRef:
      apiGroup: rbac.authorization.k8s.io
      kind: ClusterRole
    Registered: Sat Jun 15 01:39:40 UTC 2024
    - Last Modified: Sun Apr 21 10:01:31 UTC 2024
    - 1.1K bytes
    - Viewed (0)
Back to top