Search Options

Results per page
Sort
Preferred Languages
Advance

Results 131 - 140 of 210 for clusterRoles (0.16 sec)

  1. manifests/charts/istio-operator/templates/clusterrole_binding.yaml

    subjects:
    - kind: ServiceAccount
      name: istio-operator{{- if not (eq .Values.revision "") }}-{{ .Values.revision }}{{- end }}
      namespace: {{.Release.Namespace}}
    roleRef:
      kind: ClusterRole
      name: istio-operator{{- if not (eq .Values.revision "") }}-{{ .Values.revision }}{{- end }}
      apiGroup: rbac.authorization.k8s.io
    Registered: Fri Jun 14 15:00:06 UTC 2024
    - Last Modified: Wed Jul 28 18:55:36 UTC 2021
    - 498 bytes
    - Viewed (0)
  2. cluster/addons/calico-policy-controller/calico-cpva-clusterrolebinding.yaml

    metadata:
      name: calico-cpva
      labels:
        addonmanager.kubernetes.io/mode: Reconcile
    subjects:
      - kind: ServiceAccount
        name: calico-cpva
        namespace: kube-system
    roleRef:
      kind: ClusterRole
      name: calico-cpva
    Registered: Sat Jun 15 01:39:40 UTC 2024
    - Last Modified: Thu Nov 14 15:32:57 UTC 2019
    - 324 bytes
    - Viewed (0)
  3. cluster/addons/calico-policy-controller/typha-horizontal-autoscaler-clusterrolebinding.yaml

    apiVersion: rbac.authorization.k8s.io/v1
    kind: ClusterRoleBinding
    metadata:
      name: typha-cpha
      labels:
        addonmanager.kubernetes.io/mode: Reconcile
    roleRef:
      apiGroup: rbac.authorization.k8s.io
      kind: ClusterRole
      name: typha-cpha
    subjects:
      - kind: ServiceAccount
        name: typha-cpha
    Registered: Sat Jun 15 01:39:40 UTC 2024
    - Last Modified: Thu Nov 14 15:32:57 UTC 2019
    - 321 bytes
    - Viewed (0)
  4. cluster/addons/calico-policy-controller/typha-vertical-autoscaler-clusterrolebinding.yaml

    apiVersion: rbac.authorization.k8s.io/v1
    kind: ClusterRoleBinding
    metadata:
      name: typha-cpva
      labels:
        addonmanager.kubernetes.io/mode: Reconcile
    roleRef:
      apiGroup: rbac.authorization.k8s.io
      kind: ClusterRole
      name: typha-cpva
    subjects:
      - kind: ServiceAccount
        name: typha-cpva
    Registered: Sat Jun 15 01:39:40 UTC 2024
    - Last Modified: Thu Nov 14 15:32:57 UTC 2019
    - 321 bytes
    - Viewed (0)
  5. cluster/addons/rbac/kubelet-api-auth/kubelet-api-admin-role.yaml

    # This role allows full access to the kubelet API
    apiVersion: rbac.authorization.k8s.io/v1
    kind: ClusterRole
    metadata:
      name: kubelet-api-admin
      labels:
        addonmanager.kubernetes.io/mode: Reconcile
    rules:
    - apiGroups:
      - ""
      resources:
      - nodes/proxy
      - nodes/log
      - nodes/stats
      - nodes/metrics
      verbs:
    Registered: Sat Jun 15 01:39:40 UTC 2024
    - Last Modified: Fri Oct 21 18:57:07 UTC 2022
    - 323 bytes
    - Viewed (0)
  6. cluster/addons/node-problem-detector/standalone/npd-binding.yaml

    kind: ClusterRoleBinding
    metadata:
      name: npd-binding
      labels:
        kubernetes.io/cluster-service: "true"
        addonmanager.kubernetes.io/mode: Reconcile
    roleRef:
      apiGroup: rbac.authorization.k8s.io
      kind: ClusterRole
      name: system:node-problem-detector
    subjects:
    - apiGroup: rbac.authorization.k8s.io
      kind: User
    Registered: Sat Jun 15 01:39:40 UTC 2024
    - Last Modified: Mon Aug 21 09:29:37 UTC 2017
    - 397 bytes
    - Viewed (0)
  7. cluster/addons/rbac/kubelet-api-auth/kube-apiserver-kubelet-api-admin-binding.yaml

    apiVersion: rbac.authorization.k8s.io/v1
    kind: ClusterRoleBinding
    metadata:
      name: kube-apiserver-kubelet-api-admin
      labels:
        addonmanager.kubernetes.io/mode: Reconcile
    roleRef:
      apiGroup: rbac.authorization.k8s.io
      kind: ClusterRole
      name: kubelet-api-admin
    subjects:
    - apiGroup: rbac.authorization.k8s.io
      kind: User
    Registered: Sat Jun 15 01:39:40 UTC 2024
    - Last Modified: Sun Mar 24 04:11:47 UTC 2019
    - 427 bytes
    - Viewed (0)
  8. plugin/pkg/auth/authorizer/rbac/bootstrappolicy/controller_policy_test.go

    var rolesWithAllowStar = sets.NewString(
    	saRolePrefix+"namespace-controller",
    	saRolePrefix+"generic-garbage-collector",
    	saRolePrefix+"resourcequota-controller",
    	saRolePrefix+"horizontal-pod-autoscaler",
    	saRolePrefix+"clusterrole-aggregation-controller",
    	saRolePrefix+"disruption-controller",
    )
    
    // TestNoStarsForControllers confirms that no controller role has star verbs, groups,
    Registered: Sat Jun 15 01:39:40 UTC 2024
    - Last Modified: Fri May 24 05:24:17 UTC 2019
    - 2.9K bytes
    - Viewed (0)
  9. cluster/addons/rbac/cluster-loadbalancing/glbc/user-rolebindings.yaml

    apiVersion: rbac.authorization.k8s.io/v1
    kind: ClusterRoleBinding
    metadata:
      name: system:controller:glbc
      labels:
        addonmanager.kubernetes.io/mode: Reconcile
    roleRef:
      apiGroup: rbac.authorization.k8s.io
      kind: ClusterRole
      name: system:controller:glbc
    subjects:
    - kind: User
    Registered: Sat Jun 15 01:39:40 UTC 2024
    - Last Modified: Thu May 02 05:24:48 UTC 2019
    - 647 bytes
    - Viewed (0)
  10. cluster/addons/rbac/legacy-kubelet-user/kubelet-binding.yaml

    apiVersion: rbac.authorization.k8s.io/v1
    kind: ClusterRoleBinding
    metadata:
      name: kubelet-cluster-admin
      labels:
        addonmanager.kubernetes.io/mode: Reconcile
    roleRef:
      apiGroup: rbac.authorization.k8s.io
      kind: ClusterRole
      name: system:node
    subjects:
    - apiGroup: rbac.authorization.k8s.io
      kind: User
    Registered: Sat Jun 15 01:39:40 UTC 2024
    - Last Modified: Sun Mar 24 04:11:47 UTC 2019
    - 565 bytes
    - Viewed (0)
Back to top