- Sort Score
- Result 10 results
- Languages All
Results 131 - 140 of 165 for roleRef (0.17 sec)
-
samples/addons/kiali.yaml
app.kubernetes.io/name: kiali app.kubernetes.io/instance: kiali version: "v1.85.0" app.kubernetes.io/version: "v1.85.0" app.kubernetes.io/managed-by: Helm app.kubernetes.io/part-of: "kiali" roleRef: apiGroup: rbac.authorization.k8s.io kind: ClusterRole name: kiali subjects: - kind: ServiceAccount name: kiali namespace: istio-system ... ---
Registered: Fri Jun 14 15:00:06 UTC 2024 - Last Modified: Wed Jun 12 18:57:35 UTC 2024 - 10.6K bytes - Viewed (0) -
cmd/kubeadm/app/phases/copycerts/copycerts.go
return apiclient.CreateOrUpdateRoleBinding(client, &rbac.RoleBinding{ ObjectMeta: metav1.ObjectMeta{ Name: kubeadmconstants.KubeadmCertsClusterRoleName, Namespace: metav1.NamespaceSystem, }, RoleRef: rbac.RoleRef{ APIGroup: rbac.GroupName, Kind: "Role", Name: kubeadmconstants.KubeadmCertsClusterRoleName, }, Subjects: []rbac.Subject{ { Kind: rbac.GroupKind,
Registered: Sat Jun 15 01:39:40 UTC 2024 - Last Modified: Sun Jan 01 00:15:30 UTC 2023 - 10.2K bytes - Viewed (0) -
cluster/addons/dns/coredns/coredns.yaml.base
metadata: annotations: rbac.authorization.kubernetes.io/autoupdate: "true" labels: kubernetes.io/bootstrapping: rbac-defaults addonmanager.kubernetes.io/mode: EnsureExists name: system:coredns roleRef: apiGroup: rbac.authorization.k8s.io kind: ClusterRole name: system:coredns subjects: - kind: ServiceAccount name: coredns namespace: kube-system --- apiVersion: v1 kind: ConfigMap metadata:
Registered: Sat Jun 15 01:39:40 UTC 2024 - Last Modified: Wed Oct 18 23:50:49 UTC 2023 - 4.9K bytes - Viewed (0) -
cluster/addons/dns/coredns/coredns.yaml.in
metadata: annotations: rbac.authorization.kubernetes.io/autoupdate: "true" labels: kubernetes.io/bootstrapping: rbac-defaults addonmanager.kubernetes.io/mode: EnsureExists name: system:coredns roleRef: apiGroup: rbac.authorization.k8s.io kind: ClusterRole name: system:coredns subjects: - kind: ServiceAccount name: coredns namespace: kube-system --- apiVersion: v1 kind: ConfigMap metadata:
Registered: Sat Jun 15 01:39:40 UTC 2024 - Last Modified: Wed Oct 18 23:50:49 UTC 2023 - 4.9K bytes - Viewed (0) -
samples/security/spire/spire-quickstart.yaml
kind: ClusterRoleBinding apiVersion: rbac.authorization.k8s.io/v1 metadata: name: spire-server-cluster-role-binding subjects: - kind: ServiceAccount name: spire-server namespace: spire roleRef: kind: ClusterRole name: spire-server-cluster-role apiGroup: rbac.authorization.k8s.io --- # Role for the SPIRE server. kind: Role apiVersion: rbac.authorization.k8s.io/v1 metadata:
Registered: Fri Jun 14 15:00:06 UTC 2024 - Last Modified: Thu Oct 12 16:12:42 UTC 2023 - 32.2K bytes - Viewed (0) -
operator/cmd/mesh/testdata/operator/output/operator-init.yaml
--- kind: ClusterRoleBinding apiVersion: rbac.authorization.k8s.io/v1 metadata: name: istio-operator subjects: - kind: ServiceAccount name: istio-operator namespace: operator-test-namespace roleRef: kind: ClusterRole name: istio-operator apiGroup: rbac.authorization.k8s.io --- --- apiVersion: apps/v1 kind: Deployment metadata: namespace: operator-test-namespace
Registered: Fri Jun 14 15:00:06 UTC 2024 - Last Modified: Wed Jan 10 05:10:03 UTC 2024 - 5.3K bytes - Viewed (0) -
operator/cmd/mesh/testdata/operator/output/operator-dump.yaml
--- kind: ClusterRoleBinding apiVersion: rbac.authorization.k8s.io/v1 metadata: name: istio-operator subjects: - kind: ServiceAccount name: istio-operator namespace: operator-test-namespace roleRef: kind: ClusterRole name: istio-operator apiGroup: rbac.authorization.k8s.io --- --- apiVersion: apps/v1 kind: Deployment metadata: namespace: operator-test-namespace
Registered: Fri Jun 14 15:00:06 UTC 2024 - Last Modified: Wed Jan 10 05:10:03 UTC 2024 - 5.4K bytes - Viewed (0) -
cluster/addons/dns/coredns/coredns.yaml.sed
metadata: annotations: rbac.authorization.kubernetes.io/autoupdate: "true" labels: kubernetes.io/bootstrapping: rbac-defaults addonmanager.kubernetes.io/mode: EnsureExists name: system:coredns roleRef: apiGroup: rbac.authorization.k8s.io kind: ClusterRole name: system:coredns subjects: - kind: ServiceAccount name: coredns namespace: kube-system --- apiVersion: v1 kind: ConfigMap metadata:
Registered: Sat Jun 15 01:39:40 UTC 2024 - Last Modified: Wed Oct 18 23:50:49 UTC 2023 - 4.9K bytes - Viewed (0) -
operator/cmd/mesh/testdata/operator/output/operator-remove.yaml
--- kind: ClusterRoleBinding apiVersion: rbac.authorization.k8s.io/v1 metadata: name: istio-operator subjects: - kind: ServiceAccount name: istio-operator namespace: operator-test-namespace roleRef: kind: ClusterRole name: istio-operator apiGroup: rbac.authorization.k8s.io --- # SYNC WITH manifests/charts/base/files apiVersion: apiextensions.k8s.io/v1beta1 kind: CustomResourceDefinition
Registered: Fri Jun 14 15:00:06 UTC 2024 - Last Modified: Fri Aug 21 01:45:21 UTC 2020 - 5.4K bytes - Viewed (0) -
cmd/kubeadm/app/phases/addons/dns/manifests.go
` // CoreDNSClusterRoleBinding is the CoreDNS Clusterrolebinding manifest CoreDNSClusterRoleBinding = ` apiVersion: rbac.authorization.k8s.io/v1 kind: ClusterRoleBinding metadata: name: system:coredns roleRef: apiGroup: rbac.authorization.k8s.io kind: ClusterRole name: system:coredns subjects: - kind: ServiceAccount name: coredns namespace: kube-system `
Registered: Sat Jun 15 01:39:40 UTC 2024 - Last Modified: Fri Oct 20 09:59:39 UTC 2023 - 5.4K bytes - Viewed (0)