- Sort Score
- Result 10 results
- Languages All
Results 91 - 100 of 185 for ClusterRoleBinding (0.43 sec)
-
cluster/addons/metadata-agent/stackdriver/metadata-agent-rbac.yaml
addonmanager.kubernetes.io/mode: Reconcile rules: - apiGroups: - "*" resources: - "*" verbs: - watch - get - list --- apiVersion: rbac.authorization.k8s.io/v1 kind: ClusterRoleBinding metadata: name: stackdriver:metadata-agent labels: kubernetes.io/cluster-service: "true" addonmanager.kubernetes.io/mode: Reconcile roleRef: apiGroup: rbac.authorization.k8s.io
Registered: Sat Jun 15 01:39:40 UTC 2024 - Last Modified: Mon Aug 06 15:26:35 UTC 2018 - 685 bytes - Viewed (0) -
cluster/gce/addons/loadbalancing/cloud-provider-binding.yaml
kind: Role name: gce:cloud-provider subjects: - kind: ServiceAccount name: cloud-provider namespace: kube-system --- apiVersion: rbac.authorization.k8s.io/v1 kind: ClusterRoleBinding metadata: labels: addonmanager.kubernetes.io/mode: Reconcile name: gce:cloud-provider roleRef: apiGroup: rbac.authorization.k8s.io kind: ClusterRole name: gce:cloud-provider subjects:
Registered: Sat Jun 15 01:39:40 UTC 2024 - Last Modified: Tue Aug 28 03:47:26 UTC 2018 - 685 bytes - Viewed (0) -
cluster/addons/rbac/cluster-loadbalancing/glbc/user-rolebindings.yaml
roleRef: apiGroup: rbac.authorization.k8s.io kind: Role name: system:controller:glbc subjects: - kind: User name: system:controller:glbc --- apiVersion: rbac.authorization.k8s.io/v1 kind: ClusterRoleBinding metadata: name: system:controller:glbc labels: addonmanager.kubernetes.io/mode: Reconcile roleRef: apiGroup: rbac.authorization.k8s.io kind: ClusterRole name: system:controller:glbc
Registered: Sat Jun 15 01:39:40 UTC 2024 - Last Modified: Thu May 02 05:24:48 UTC 2019 - 647 bytes - Viewed (0) -
staging/src/k8s.io/api/rbac/v1/types_swagger_doc_generated.go
return map_AggregationRule } var map_ClusterRole = map[string]string{ "": "ClusterRole is a cluster level, logical grouping of PolicyRules that can be referenced as a unit by a RoleBinding or ClusterRoleBinding.", "metadata": "Standard object's metadata.", "rules": "Rules holds all the PolicyRules for this ClusterRole",
Registered: Sat Jun 15 01:39:40 UTC 2024 - Last Modified: Mon Apr 24 20:35:20 UTC 2023 - 7.8K bytes - Viewed (0) -
cluster/addons/rbac/legacy-kubelet-user/kubelet-binding.yaml
# identify the system:nodes group. They use the kubelet identity # TODO: remove this once new nodes are granted individual identities and the # NodeAuthorizer is enabled. apiVersion: rbac.authorization.k8s.io/v1 kind: ClusterRoleBinding metadata: name: kubelet-cluster-admin labels: addonmanager.kubernetes.io/mode: Reconcile roleRef: apiGroup: rbac.authorization.k8s.io kind: ClusterRole name: system:node subjects:
Registered: Sat Jun 15 01:39:40 UTC 2024 - Last Modified: Sun Mar 24 04:11:47 UTC 2019 - 565 bytes - Viewed (0) -
cluster/addons/metrics-server/resource-reader.yaml
resourceNames: - metrics-server-v0.7.1 verbs: - get - patch - nonResourceURLs: - /metrics verbs: - get --- apiVersion: rbac.authorization.k8s.io/v1 kind: ClusterRoleBinding metadata: name: system:metrics-server labels: kubernetes.io/cluster-service: "true" addonmanager.kubernetes.io/mode: Reconcile roleRef: apiGroup: rbac.authorization.k8s.io kind: ClusterRole
Registered: Sat Jun 15 01:39:40 UTC 2024 - Last Modified: Sun May 26 01:57:01 UTC 2024 - 988 bytes - Viewed (0) -
samples/security/psp/sidecar-psp.yaml
rules: - apiGroups: - extensions resources: - podsecuritypolicies resourceNames: - istio-sidecar verbs: - use --- apiVersion: rbac.authorization.k8s.io/v1 kind: ClusterRoleBinding metadata: name: istio-sidecar-psp roleRef: apiGroup: rbac.authorization.k8s.io kind: ClusterRole name: istio-sidecar-psp subjects: - apiGroup: rbac.authorization.k8s.io kind: Group
Registered: Fri Jun 14 15:00:06 UTC 2024 - Last Modified: Mon Nov 27 17:55:37 UTC 2023 - 881 bytes - Viewed (0) -
staging/src/k8s.io/api/rbac/v1/types.go
// +k8s:deepcopy-gen:interfaces=k8s.io/apimachinery/pkg/runtime.Object // +k8s:prerelease-lifecycle-gen:introduced=1.8 // ClusterRoleBinding references a ClusterRole, but not contain it. It can reference a ClusterRole in the global namespace, // and adds who information via Subject. type ClusterRoleBinding struct { metav1.TypeMeta `json:",inline"` // Standard object's metadata. // +optional
Registered: Sat Jun 15 01:39:40 UTC 2024 - Last Modified: Thu May 23 17:42:49 UTC 2024 - 10.7K bytes - Viewed (0) -
prow/config/metrics/metrics.yaml
kind: Role name: extension-apiserver-authentication-reader subjects: - kind: ServiceAccount name: metrics-server namespace: kube-system --- apiVersion: rbac.authorization.k8s.io/v1 kind: ClusterRoleBinding metadata: labels: k8s-app: metrics-server name: metrics-server:system:auth-delegator roleRef: apiGroup: rbac.authorization.k8s.io kind: ClusterRole name: system:auth-delegator subjects:
Registered: Fri Jun 14 15:00:06 UTC 2024 - Last Modified: Thu Apr 11 20:51:38 UTC 2024 - 4.6K bytes - Viewed (0) -
cluster/addons/kube-network-policies/kube-network-policies-rbac.yaml
- list # Watch for changes to Kubernetes NetworkPolicies. - apiGroups: ["networking.k8s.io"] resources: - networkpolicies verbs: - watch - list --- kind: ClusterRoleBinding apiVersion: rbac.authorization.k8s.io/v1 metadata: name: kube-network-policies labels: addonmanager.kubernetes.io/mode: Reconcile roleRef: apiGroup: rbac.authorization.k8s.io kind: ClusterRole
Registered: Sat Jun 15 01:39:40 UTC 2024 - Last Modified: Sun Apr 21 10:01:31 UTC 2024 - 1.1K bytes - Viewed (0)