Search Options

Results per page
Sort
Preferred Languages
Advance

Results 121 - 130 of 306 for Reconciled (0.15 sec)

  1. operator/cmd/mesh/operator-remove.go

    			l.LogAndFatal(err)
    		}
    	}
    	reconciler, err := helmreconciler.NewHelmReconciler(client, kubeClient, iop, &helmreconciler.Options{DryRun: args.DryRun, Log: l})
    	if err != nil {
    		l.LogAndFatal(err)
    	}
    	rs, err := reconciler.GetPrunedResources(orArgs.revision, false, string(name.IstioOperatorComponentName))
    	if err != nil {
    		l.LogAndFatal(err)
    	}
    Registered: Fri Jun 14 15:00:06 UTC 2024
    - Last Modified: Fri Mar 15 01:18:49 UTC 2024
    - 5.4K bytes
    - Viewed (0)
  2. cluster/addons/rbac/kubelet-api-auth/kube-apiserver-kubelet-api-admin-binding.yaml

    apiVersion: rbac.authorization.k8s.io/v1
    kind: ClusterRoleBinding
    metadata:
      name: kube-apiserver-kubelet-api-admin
      labels:
        addonmanager.kubernetes.io/mode: Reconcile
    roleRef:
      apiGroup: rbac.authorization.k8s.io
      kind: ClusterRole
      name: kubelet-api-admin
    subjects:
    - apiGroup: rbac.authorization.k8s.io
      kind: User
    Registered: Sat Jun 15 01:39:40 UTC 2024
    - Last Modified: Sun Mar 24 04:11:47 UTC 2019
    - 427 bytes
    - Viewed (0)
  3. cluster/addons/calico-policy-controller/typha-horizontal-autoscaler-serviceaccount.yaml

    apiVersion: v1
    kind: ServiceAccount
    metadata:
      name: typha-cpha
      namespace: kube-system
      labels:
    Registered: Sat Jun 15 01:39:40 UTC 2024
    - Last Modified: Thu Nov 14 15:32:57 UTC 2019
    - 147 bytes
    - Viewed (0)
  4. cluster/addons/calico-policy-controller/calico-cpva-clusterrolebinding.yaml

    kind: ClusterRoleBinding
    apiVersion: rbac.authorization.k8s.io/v1
    metadata:
      name: calico-cpva
      labels:
        addonmanager.kubernetes.io/mode: Reconcile
    subjects:
      - kind: ServiceAccount
        name: calico-cpva
        namespace: kube-system
    roleRef:
      kind: ClusterRole
      name: calico-cpva
    Registered: Sat Jun 15 01:39:40 UTC 2024
    - Last Modified: Thu Nov 14 15:32:57 UTC 2019
    - 324 bytes
    - Viewed (0)
  5. cluster/addons/calico-policy-controller/typha-horizontal-autoscaler-clusterrolebinding.yaml

    apiVersion: rbac.authorization.k8s.io/v1
    kind: ClusterRoleBinding
    metadata:
      name: typha-cpha
      labels:
        addonmanager.kubernetes.io/mode: Reconcile
    roleRef:
      apiGroup: rbac.authorization.k8s.io
      kind: ClusterRole
      name: typha-cpha
    subjects:
      - kind: ServiceAccount
        name: typha-cpha
    Registered: Sat Jun 15 01:39:40 UTC 2024
    - Last Modified: Thu Nov 14 15:32:57 UTC 2019
    - 321 bytes
    - Viewed (0)
  6. cluster/addons/calico-policy-controller/typha-vertical-autoscaler-clusterrolebinding.yaml

    apiVersion: rbac.authorization.k8s.io/v1
    kind: ClusterRoleBinding
    metadata:
      name: typha-cpva
      labels:
        addonmanager.kubernetes.io/mode: Reconcile
    roleRef:
      apiGroup: rbac.authorization.k8s.io
      kind: ClusterRole
      name: typha-cpva
    subjects:
      - kind: ServiceAccount
        name: typha-cpva
    Registered: Sat Jun 15 01:39:40 UTC 2024
    - Last Modified: Thu Nov 14 15:32:57 UTC 2019
    - 321 bytes
    - Viewed (0)
  7. cluster/addons/rbac/kubelet-api-auth/kubelet-api-admin-role.yaml

    # This role allows full access to the kubelet API
    apiVersion: rbac.authorization.k8s.io/v1
    kind: ClusterRole
    metadata:
      name: kubelet-api-admin
      labels:
        addonmanager.kubernetes.io/mode: Reconcile
    rules:
    - apiGroups:
      - ""
      resources:
      - nodes/proxy
      - nodes/log
      - nodes/stats
      - nodes/metrics
      verbs:
    Registered: Sat Jun 15 01:39:40 UTC 2024
    - Last Modified: Fri Oct 21 18:57:07 UTC 2022
    - 323 bytes
    - Viewed (0)
  8. cluster/addons/node-problem-detector/standalone/npd-binding.yaml

    apiVersion: rbac.authorization.k8s.io/v1
    kind: ClusterRoleBinding
    metadata:
      name: npd-binding
      labels:
        kubernetes.io/cluster-service: "true"
        addonmanager.kubernetes.io/mode: Reconcile
    roleRef:
      apiGroup: rbac.authorization.k8s.io
      kind: ClusterRole
      name: system:node-problem-detector
    subjects:
    - apiGroup: rbac.authorization.k8s.io
      kind: User
    Registered: Sat Jun 15 01:39:40 UTC 2024
    - Last Modified: Mon Aug 21 09:29:37 UTC 2017
    - 397 bytes
    - Viewed (0)
  9. staging/src/k8s.io/apiserver/pkg/util/peerproxy/peerproxy_handler.go

    	storageversionManager storageversion.Manager
    
    	// proxy transport
    	proxyTransport http.RoundTripper
    
    	// identity for this server
    	serverId string
    
    	// reconciler that is used to fetch host port of peer apiserver when proxying request to a peer
    	reconciler reconcilers.PeerEndpointLeaseReconciler
    
    	serializer runtime.NegotiatedSerializer
    
    Registered: Sat Jun 15 01:39:40 UTC 2024
    - Last Modified: Wed Jul 19 00:36:22 UTC 2023
    - 11.5K bytes
    - Viewed (0)
  10. cluster/addons/metrics-server/auth-reader.yaml

    apiVersion: rbac.authorization.k8s.io/v1
    kind: RoleBinding
    metadata:
      name: metrics-server-auth-reader
      namespace: kube-system
      labels:
        kubernetes.io/cluster-service: "true"
        addonmanager.kubernetes.io/mode: Reconcile
    roleRef:
      apiGroup: rbac.authorization.k8s.io
      kind: Role
      name: extension-apiserver-authentication-reader
    subjects:
    - kind: ServiceAccount
      name: metrics-server
    Registered: Sat Jun 15 01:39:40 UTC 2024
    - Last Modified: Sun Sep 03 20:14:57 UTC 2017
    - 419 bytes
    - Viewed (0)
Back to top