Search Options

Results per page
Sort
Preferred Languages
Advance

Results 11 - 20 of 20 for clusterrolebinding (0.16 sec)

  1. CHANGELOG/CHANGELOG-1.8.md

    ## Known Issues
    
    Registered: Fri Nov 01 09:05:11 UTC 2024
    - Last Modified: Tue Feb 20 15:45:02 UTC 2024
    - 312.2K bytes
    - Viewed (0)
  2. CHANGELOG/CHANGELOG-1.18.md

    - `kubectl create clusterrolebinding` creates rbac.authorization.k8s.io/v1 object ([#85889](https://github.com/kubernetes/kubernetes/pull/85889), [@oke-py](https://github.com/oke-py)) [SIG CLI]
    Registered: Fri Nov 01 09:05:11 UTC 2024
    - Last Modified: Wed Jun 16 17:18:28 UTC 2021
    - 373.2K bytes
    - Viewed (0)
  3. CHANGELOG/CHANGELOG-1.12.md

        * Action required: The following clusterrole and clusterrolebinding should be applied:
        ```
             kind: List
             apiVersion: v1
             items:
             - apiVersion: rbac.authorization.k8s.io/v1
               kind: ClusterRole
               metadata:
    Registered: Fri Nov 01 09:05:11 UTC 2024
    - Last Modified: Thu Feb 06 06:04:15 UTC 2020
    - 293.8K bytes
    - Viewed (0)
  4. CHANGELOG/CHANGELOG-1.29.md

    - Kubeadm: do not exit with an error if the "super-admin.conf" cannot create a ClusterRoleBinding for the "cluster-admin" user, due to the ClusterRoleBInding already existing. ([#125821](https://github.com/kubernetes/kubernetes/pull/125821), [@neolit123](https://github.com/neolit123)) [SIG Cluster Lifecycle]
    Registered: Fri Nov 01 09:05:11 UTC 2024
    - Last Modified: Wed Oct 23 04:37:31 UTC 2024
    - 375.1K bytes
    - Viewed (1)
  5. CHANGELOG/CHANGELOG-1.20.md

      - network_plugin_operations_total
      - network_plugin_operations_errors_total ([#93066](https://github.com/kubernetes/kubernetes/pull/93066), [@AnishShah](https://github.com/AnishShah))
    Registered: Fri Nov 01 09:05:11 UTC 2024
    - Last Modified: Wed Jan 19 21:05:45 UTC 2022
    - 409K bytes
    - Viewed (0)
  6. CHANGELOG/CHANGELOG-1.13.md

        * `kubectl delete node/<nodeName>`
        * or grant self-deletion permission explicitly:
            * `kubectl create clusterrole self-deleting-nodes --verb=delete --resource=nodes`
            * `kubectl create clusterrolebinding self-deleting-nodes --clusterrole=self-deleting-nodes --group=system:nodes`
    Registered: Fri Nov 01 09:05:11 UTC 2024
    - Last Modified: Thu May 05 13:44:43 UTC 2022
    - 273.1K bytes
    - Viewed (0)
  7. CHANGELOG/CHANGELOG-1.9.md

    * Use `not-ready` to replace `notReady` in node condition taint keys. ([#51266](https://github.com/kubernetes/kubernetes/pull/51266), [@resouer](https://github.com/resouer))
    * Support completion for --clusterrole of kubectl create clusterrolebinding ([#48267](https://github.com/kubernetes/kubernetes/pull/48267), [@superbrothers](https://github.com/superbrothers))
    Registered: Fri Nov 01 09:05:11 UTC 2024
    - Last Modified: Tue Nov 16 10:46:27 UTC 2021
    - 313.7K bytes
    - Viewed (0)
  8. istioctl/pkg/precheck/precheck.go

    		},
    		{
    			group:    "rbac.authorization.k8s.io",
    			version:  "v1",
    			resource: "clusterroles",
    		},
    		{
    			group:    "rbac.authorization.k8s.io",
    			version:  "v1",
    			resource: "clusterrolebindings",
    		},
    		{
    			group:    "apiextensions.k8s.io",
    			version:  "v1",
    			resource: "customresourcedefinitions",
    		},
    		{
    			namespace: istioNamespace,
    			group:     "rbac.authorization.k8s.io",
    Registered: Wed Nov 06 22:53:10 UTC 2024
    - Last Modified: Thu Oct 24 02:31:32 UTC 2024
    - 15.3K bytes
    - Viewed (0)
  9. CHANGELOG/CHANGELOG-1.11.md

        * or grant self-deletion permission explicitly:
            * `kubectl create clusterrole self-deleting-nodes --verb=delete --resource=nodes`
            * `kubectl create clusterrolebinding self-deleting-nodes --clusterrole=self-deleting-nodes --group=system:nodes`
    Registered: Fri Nov 01 09:05:11 UTC 2024
    - Last Modified: Thu Feb 06 06:04:15 UTC 2020
    - 328.4K bytes
    - Viewed (0)
  10. CHANGELOG/CHANGELOG-1.10.md

    [@caesarxuchao](https://github.com/caesarxuchao))
    
    * Using kubectl gcp auth plugin with a Google Service Account to authenticate to a cluster now additionally requests a token with the  "userinfo.email" scope. This way, users can write ClusterRoleBindings/RoleBindings with the email address of the service account directly. (This is a breaking change if the numeric uniqueIDs of the Google service accounts were being used in RBAC role bindings. The behavior can be overridden by explicitly specifying...
    Registered: Fri Nov 01 09:05:11 UTC 2024
    - Last Modified: Thu May 05 13:44:43 UTC 2022
    - 341.8K bytes
    - Viewed (0)
Back to top