- Sort Score
- Result 10 results
- Languages All
Results 11 - 20 of 20 for clusterrolebindings (0.6 sec)
-
istioctl/pkg/multicluster/remote_secret.go
if mf.Component != component.BaseComponentName && mf.Component != component.PilotComponentName { continue } for _, m := range mf.Manifests { if m.GetKind() == "ClusterRole" || m.GetKind() == "ClusterRoleBinding" { included = append(included, m.Content) } if m.GetKind() == "ServiceAccount" && m.GetName() == "istio-reader-service-account" { included = append(included, m.Content) } } }
Registered: Wed Nov 06 22:53:10 UTC 2024 - Last Modified: Thu Aug 15 16:31:46 UTC 2024 - 23.3K bytes - Viewed (0) -
CHANGELOG/CHANGELOG-1.6.md
* Update command invocations to pass separate --from-literal flags for each value ### RBAC
Registered: Fri Nov 01 09:05:11 UTC 2024 - Last Modified: Thu Dec 24 02:28:26 UTC 2020 - 304K bytes - Viewed (0) -
CHANGELOG/CHANGELOG-1.7.md
* Before upgrading, users must ensure their controller manager will enable the csrapproving controller, create an RBAC ClusterRole and ClusterRoleBinding to approve CSRs for the same group, then upgrade. Example roles to enable the equivalent behavior can be found in the [TLS bootstrapping](https://kubernetes.io/docs/admin/kubelet-tls-bootstrapping/) documentation.
Registered: Fri Nov 01 09:05:11 UTC 2024 - Last Modified: Thu May 05 13:44:43 UTC 2022 - 308.7K bytes - Viewed (1) -
CHANGELOG/CHANGELOG-1.14.md
- `kubectl create clusterrolebinding anonymous-discovery --clusterrole=system:discovery --group=system:unauthenticated` - `kubectl create clusterrolebinding anonymous-access-review --clusterrole=system:basic-user --group=system:unauthenticated`
Registered: Fri Nov 01 09:05:11 UTC 2024 - Last Modified: Mon Jun 14 22:06:39 UTC 2021 - 271.5K bytes - Viewed (0) -
CHANGELOG/CHANGELOG-1.18.md
- `kubectl create clusterrolebinding` creates rbac.authorization.k8s.io/v1 object ([#85889](https://github.com/kubernetes/kubernetes/pull/85889), [@oke-py](https://github.com/oke-py)) [SIG CLI]
Registered: Fri Nov 01 09:05:11 UTC 2024 - Last Modified: Wed Jun 16 17:18:28 UTC 2021 - 373.2K bytes - Viewed (0) -
CHANGELOG/CHANGELOG-1.12.md
* Action required: The following clusterrole and clusterrolebinding should be applied: ``` kind: List apiVersion: v1 items: - apiVersion: rbac.authorization.k8s.io/v1 kind: ClusterRole metadata:
Registered: Fri Nov 01 09:05:11 UTC 2024 - Last Modified: Thu Feb 06 06:04:15 UTC 2020 - 293.8K bytes - Viewed (0) -
CHANGELOG/CHANGELOG-1.29.md
- Kubeadm: do not exit with an error if the "super-admin.conf" cannot create a ClusterRoleBinding for the "cluster-admin" user, due to the ClusterRoleBInding already existing. ([#125821](https://github.com/kubernetes/kubernetes/pull/125821), [@neolit123](https://github.com/neolit123)) [SIG Cluster Lifecycle]
Registered: Fri Nov 01 09:05:11 UTC 2024 - Last Modified: Wed Oct 23 04:37:31 UTC 2024 - 375.1K bytes - Viewed (1) -
CHANGELOG/CHANGELOG-1.20.md
- network_plugin_operations_total - network_plugin_operations_errors_total ([#93066](https://github.com/kubernetes/kubernetes/pull/93066), [@AnishShah](https://github.com/AnishShah))
Registered: Fri Nov 01 09:05:11 UTC 2024 - Last Modified: Wed Jan 19 21:05:45 UTC 2022 - 409K bytes - Viewed (0) -
CHANGELOG/CHANGELOG-1.13.md
* `kubectl delete node/<nodeName>` * or grant self-deletion permission explicitly: * `kubectl create clusterrole self-deleting-nodes --verb=delete --resource=nodes` * `kubectl create clusterrolebinding self-deleting-nodes --clusterrole=self-deleting-nodes --group=system:nodes`
Registered: Fri Nov 01 09:05:11 UTC 2024 - Last Modified: Thu May 05 13:44:43 UTC 2022 - 273.1K bytes - Viewed (0) -
CHANGELOG/CHANGELOG-1.11.md
* or grant self-deletion permission explicitly: * `kubectl create clusterrole self-deleting-nodes --verb=delete --resource=nodes` * `kubectl create clusterrolebinding self-deleting-nodes --clusterrole=self-deleting-nodes --group=system:nodes`
Registered: Fri Nov 01 09:05:11 UTC 2024 - Last Modified: Thu Feb 06 06:04:15 UTC 2020 - 328.4K bytes - Viewed (0)