- Sort Score
- Result 10 results
- Languages All
Results 121 - 130 of 306 for Reconciled (0.15 sec)
-
operator/cmd/mesh/operator-remove.go
l.LogAndFatal(err) } } reconciler, err := helmreconciler.NewHelmReconciler(client, kubeClient, iop, &helmreconciler.Options{DryRun: args.DryRun, Log: l}) if err != nil { l.LogAndFatal(err) } rs, err := reconciler.GetPrunedResources(orArgs.revision, false, string(name.IstioOperatorComponentName)) if err != nil { l.LogAndFatal(err) }
Registered: Fri Jun 14 15:00:06 UTC 2024 - Last Modified: Fri Mar 15 01:18:49 UTC 2024 - 5.4K bytes - Viewed (0) -
cluster/addons/rbac/kubelet-api-auth/kube-apiserver-kubelet-api-admin-binding.yaml
apiVersion: rbac.authorization.k8s.io/v1 kind: ClusterRoleBinding metadata: name: kube-apiserver-kubelet-api-admin labels: addonmanager.kubernetes.io/mode: Reconcile roleRef: apiGroup: rbac.authorization.k8s.io kind: ClusterRole name: kubelet-api-admin subjects: - apiGroup: rbac.authorization.k8s.io kind: User
Registered: Sat Jun 15 01:39:40 UTC 2024 - Last Modified: Sun Mar 24 04:11:47 UTC 2019 - 427 bytes - Viewed (0) -
cluster/addons/calico-policy-controller/typha-horizontal-autoscaler-serviceaccount.yaml
apiVersion: v1 kind: ServiceAccount metadata: name: typha-cpha namespace: kube-system labels:
Registered: Sat Jun 15 01:39:40 UTC 2024 - Last Modified: Thu Nov 14 15:32:57 UTC 2019 - 147 bytes - Viewed (0) -
cluster/addons/calico-policy-controller/calico-cpva-clusterrolebinding.yaml
kind: ClusterRoleBinding apiVersion: rbac.authorization.k8s.io/v1 metadata: name: calico-cpva labels: addonmanager.kubernetes.io/mode: Reconcile subjects: - kind: ServiceAccount name: calico-cpva namespace: kube-system roleRef: kind: ClusterRole name: calico-cpva
Registered: Sat Jun 15 01:39:40 UTC 2024 - Last Modified: Thu Nov 14 15:32:57 UTC 2019 - 324 bytes - Viewed (0) -
cluster/addons/calico-policy-controller/typha-horizontal-autoscaler-clusterrolebinding.yaml
apiVersion: rbac.authorization.k8s.io/v1 kind: ClusterRoleBinding metadata: name: typha-cpha labels: addonmanager.kubernetes.io/mode: Reconcile roleRef: apiGroup: rbac.authorization.k8s.io kind: ClusterRole name: typha-cpha subjects: - kind: ServiceAccount name: typha-cpha
Registered: Sat Jun 15 01:39:40 UTC 2024 - Last Modified: Thu Nov 14 15:32:57 UTC 2019 - 321 bytes - Viewed (0) -
cluster/addons/calico-policy-controller/typha-vertical-autoscaler-clusterrolebinding.yaml
apiVersion: rbac.authorization.k8s.io/v1 kind: ClusterRoleBinding metadata: name: typha-cpva labels: addonmanager.kubernetes.io/mode: Reconcile roleRef: apiGroup: rbac.authorization.k8s.io kind: ClusterRole name: typha-cpva subjects: - kind: ServiceAccount name: typha-cpva
Registered: Sat Jun 15 01:39:40 UTC 2024 - Last Modified: Thu Nov 14 15:32:57 UTC 2019 - 321 bytes - Viewed (0) -
cluster/addons/rbac/kubelet-api-auth/kubelet-api-admin-role.yaml
# This role allows full access to the kubelet API apiVersion: rbac.authorization.k8s.io/v1 kind: ClusterRole metadata: name: kubelet-api-admin labels: addonmanager.kubernetes.io/mode: Reconcile rules: - apiGroups: - "" resources: - nodes/proxy - nodes/log - nodes/stats - nodes/metrics verbs:
Registered: Sat Jun 15 01:39:40 UTC 2024 - Last Modified: Fri Oct 21 18:57:07 UTC 2022 - 323 bytes - Viewed (0) -
cluster/addons/node-problem-detector/standalone/npd-binding.yaml
apiVersion: rbac.authorization.k8s.io/v1 kind: ClusterRoleBinding metadata: name: npd-binding labels: kubernetes.io/cluster-service: "true" addonmanager.kubernetes.io/mode: Reconcile roleRef: apiGroup: rbac.authorization.k8s.io kind: ClusterRole name: system:node-problem-detector subjects: - apiGroup: rbac.authorization.k8s.io kind: User
Registered: Sat Jun 15 01:39:40 UTC 2024 - Last Modified: Mon Aug 21 09:29:37 UTC 2017 - 397 bytes - Viewed (0) -
staging/src/k8s.io/apiserver/pkg/util/peerproxy/peerproxy_handler.go
storageversionManager storageversion.Manager // proxy transport proxyTransport http.RoundTripper // identity for this server serverId string // reconciler that is used to fetch host port of peer apiserver when proxying request to a peer reconciler reconcilers.PeerEndpointLeaseReconciler serializer runtime.NegotiatedSerializer
Registered: Sat Jun 15 01:39:40 UTC 2024 - Last Modified: Wed Jul 19 00:36:22 UTC 2023 - 11.5K bytes - Viewed (0) -
cluster/addons/metrics-server/auth-reader.yaml
apiVersion: rbac.authorization.k8s.io/v1 kind: RoleBinding metadata: name: metrics-server-auth-reader namespace: kube-system labels: kubernetes.io/cluster-service: "true" addonmanager.kubernetes.io/mode: Reconcile roleRef: apiGroup: rbac.authorization.k8s.io kind: Role name: extension-apiserver-authentication-reader subjects: - kind: ServiceAccount name: metrics-server
Registered: Sat Jun 15 01:39:40 UTC 2024 - Last Modified: Sun Sep 03 20:14:57 UTC 2017 - 419 bytes - Viewed (0)