- Sort Score
- Result 10 results
- Languages All
Results 51 - 60 of 60 for ClusterRoleBinding (0.58 sec)
-
hack/local-up-cluster.sh
${KUBECTL} --kubeconfig "${CERT_DIR}/admin.kubeconfig" create clusterrolebinding kube-apiserver-kubelet-admin --clusterrole=system:kubelet-api-admin --user=kube-apiserver # Grant kubelets permission to request client certificates
Registered: Sat Jun 15 01:39:40 UTC 2024 - Last Modified: Sat May 25 02:33:52 UTC 2024 - 53.3K bytes - Viewed (0) -
common/scripts/metallb-native.yaml
kind: Role name: pod-lister subjects: - kind: ServiceAccount name: speaker namespace: metallb-system --- apiVersion: rbac.authorization.k8s.io/v1 kind: ClusterRoleBinding metadata: labels: app: metallb name: metallb-system:controller roleRef: apiGroup: rbac.authorization.k8s.io kind: ClusterRole name: metallb-system:controller subjects:
Registered: Fri Jun 14 15:00:06 UTC 2024 - Last Modified: Fri Feb 23 23:56:31 UTC 2024 - 63.9K bytes - Viewed (0) -
pkg/printers/internalversion/printers_test.go
} } } func TestPrintClusterRoleBinding(t *testing.T) { tests := []struct { binding rbac.ClusterRoleBinding options printers.GenerateOptions expected []metav1.TableRow }{ // Basic cluster role binding { binding: rbac.ClusterRoleBinding{ ObjectMeta: metav1.ObjectMeta{ Name: "binding1",
Registered: Sat Jun 15 01:39:40 UTC 2024 - Last Modified: Tue Jun 11 14:04:15 UTC 2024 - 218.6K bytes - Viewed (0) -
staging/src/k8s.io/cli-runtime/artifacts/openapi/swagger-with-shared-parameters.json
{ "group": "rbac.authorization.k8s.io", "kind": "ClusterRole", "version": "v1" } ] }, "io.k8s.api.rbac.v1.ClusterRoleBinding": { "description": "ClusterRoleBinding references a ClusterRole, but not contain it. It can reference a ClusterRole in the global namespace, and adds who information via Subject.", "properties": { "apiVersion": {
Registered: Sat Jun 15 01:39:40 UTC 2024 - Last Modified: Tue Feb 20 15:45:02 UTC 2024 - 2.3M bytes - Viewed (0) -
prow/config/calico.yaml
- ipamconfigs verbs: - get - list - create - update - delete --- # Source: calico/templates/calico-kube-controllers-rbac.yaml kind: ClusterRoleBinding apiVersion: rbac.authorization.k8s.io/v1 metadata: name: calico-kube-controllers roleRef: apiGroup: rbac.authorization.k8s.io kind: ClusterRole name: calico-kube-controllers subjects:
Registered: Fri Jun 14 15:00:06 UTC 2024 - Last Modified: Tue May 21 18:32:01 UTC 2024 - 246.5K bytes - Viewed (0) -
api/openapi-spec/swagger.json
{ "group": "rbac.authorization.k8s.io", "kind": "ClusterRole", "version": "v1" } ] }, "io.k8s.api.rbac.v1.ClusterRoleBinding": { "description": "ClusterRoleBinding references a ClusterRole, but not contain it. It can reference a ClusterRole in the global namespace, and adds who information via Subject.", "properties": { "apiVersion": {
Registered: Sat Jun 15 01:39:40 UTC 2024 - Last Modified: Wed Jun 05 18:37:07 UTC 2024 - 3.1M bytes - Viewed (0) -
CHANGELOG/CHANGELOG-1.8.md
## Known Issues
Registered: Sat Jun 15 01:39:40 UTC 2024 - Last Modified: Tue Feb 20 15:45:02 UTC 2024 - 312.2K bytes - Viewed (0) -
pkg/generated/openapi/zz_generated.openapi.go
Registered: Sat Jun 15 01:39:40 UTC 2024 - Last Modified: Wed Jun 05 18:37:07 UTC 2024 - 3M bytes - Viewed (0) -
staging/src/k8s.io/cli-runtime/artifacts/openapi/swagger.json
{ "group": "rbac.authorization.k8s.io", "kind": "ClusterRole", "version": "v1" } ] }, "io.k8s.api.rbac.v1.ClusterRoleBinding": { "description": "ClusterRoleBinding references a ClusterRole, but not contain it. It can reference a ClusterRole in the global namespace, and adds who information via Subject.", "properties": { "apiVersion": {
Registered: Sat Jun 15 01:39:40 UTC 2024 - Last Modified: Tue Feb 20 15:45:02 UTC 2024 - 4.5M bytes - Viewed (0) -
cluster/gce/gci/configure-helper.sh
Registered: Sat Jun 15 01:39:40 UTC 2024 - Last Modified: Mon Jun 10 22:07:47 UTC 2024 - 141.1K bytes - Viewed (0)