Search Options

Results per page
Sort
Preferred Languages
Advance

Results 101 - 110 of 210 for clusterRoles (0.17 sec)

  1. samples/security/spire/spire-quickstart.yaml

      name: spire-server
      namespace: spire
    roleRef:
      kind: Role
      name: spire-server-role
      apiGroup: rbac.authorization.k8s.io
    
    ---
    # ClusterRules for the SPIRE Controller Manager.
    apiVersion: rbac.authorization.k8s.io/v1
    kind: ClusterRole
    metadata:
      name: manager-role
    rules:
      - apiGroups: [""]
        resources: ["namespaces"]
        verbs: ["get", "list", "watch"]
    Registered: Fri Jun 14 15:00:06 UTC 2024
    - Last Modified: Thu Oct 12 16:12:42 UTC 2023
    - 32.2K bytes
    - Viewed (0)
  2. pkg/apis/rbac/v1alpha1/zz_generated.conversion.go

    	}
    	if err := s.AddGeneratedConversionFunc((*v1alpha1.ClusterRole)(nil), (*rbac.ClusterRole)(nil), func(a, b interface{}, scope conversion.Scope) error {
    		return Convert_v1alpha1_ClusterRole_To_rbac_ClusterRole(a.(*v1alpha1.ClusterRole), b.(*rbac.ClusterRole), scope)
    	}); err != nil {
    		return err
    	}
    	if err := s.AddGeneratedConversionFunc((*rbac.ClusterRole)(nil), (*v1alpha1.ClusterRole)(nil), func(a, b interface{}, scope conversion.Scope) error {
    Registered: Sat Jun 15 01:39:40 UTC 2024
    - Last Modified: Tue Aug 24 19:47:49 UTC 2021
    - 23.6K bytes
    - Viewed (0)
  3. cluster/addons/metrics-server/resource-reader.yaml

    apiVersion: rbac.authorization.k8s.io/v1
    kind: ClusterRole
    metadata:
      name: system:metrics-server
      labels:
        kubernetes.io/cluster-service: "true"
        addonmanager.kubernetes.io/mode: Reconcile
    rules:
      - apiGroups: [""]
        resources:
          - nodes/metrics
        verbs:
          - get
      - apiGroups: [""]
        resources:
          - pods
          - nodes
        verbs:
          - get
          - list
          - watch
      - apiGroups: ["apps"]
    Registered: Sat Jun 15 01:39:40 UTC 2024
    - Last Modified: Sun May 26 01:57:01 UTC 2024
    - 988 bytes
    - Viewed (0)
  4. cluster/addons/volumesnapshots/volume-snapshot-controller/rbac-volume-snapshot-controller.yaml

      labels:
        addonmanager.kubernetes.io/mode: Reconcile
    subjects:
      - kind: ServiceAccount
        name: volume-snapshot-controller
        namespace: kube-system
    roleRef:
      kind: ClusterRole
      # change the name also here if the ClusterRole gets renamed
      name: volume-snapshot-controller-runner
      apiGroup: rbac.authorization.k8s.io
    
    ---
    kind: Role
    apiVersion: rbac.authorization.k8s.io/v1
    metadata:
    Registered: Sat Jun 15 01:39:40 UTC 2024
    - Last Modified: Fri Sep 16 14:09:47 UTC 2022
    - 2.9K bytes
    - Viewed (0)
  5. manifests/charts/istio-cni/templates/clusterrolebinding.yaml

        install.operator.istio.io/owning-resource: {{ .Values.ownerName | default "unknown" }}
        operator.istio.io/component: "Cni"
    roleRef:
      apiGroup: rbac.authorization.k8s.io
      kind: ClusterRole
      name: {{ template "name" . }}
    subjects:
    - kind: ServiceAccount
      name: {{ template "name" . }}
      namespace: {{ .Release.Namespace }}
    ---
    {{- if .Values.cni.repair.enabled }}
    Registered: Fri Jun 14 15:00:06 UTC 2024
    - Last Modified: Fri May 17 21:52:29 UTC 2024
    - 1.9K bytes
    - Viewed (0)
  6. samples/security/psp/sidecar-psp.yaml

        - NET_RAW
      seLinux:
        rule: RunAsAny
      supplementalGroups:
        rule: RunAsAny
      runAsUser:
        rule: RunAsAny
      fsGroup:
        rule: RunAsAny
      volumes:
        - '*'
    ---
    kind: ClusterRole
    apiVersion: rbac.authorization.k8s.io/v1
    metadata:
      name: istio-sidecar-psp
    rules:
      - apiGroups:
          - extensions
        resources:
          - podsecuritypolicies
        resourceNames:
          - istio-sidecar
    Registered: Fri Jun 14 15:00:06 UTC 2024
    - Last Modified: Mon Nov 27 17:55:37 UTC 2023
    - 881 bytes
    - Viewed (0)
  7. cluster/addons/rbac/legacy-kubelet-user-disable/kubelet-binding.yaml

      apiGroup: rbac.authorization.k8s.io
      kind: ClusterRole
      name: system:node
    subjects: []
    ---
    # This is required so that new clusters still have bootstrap permissions
    apiVersion: rbac.authorization.k8s.io/v1
    kind: ClusterRoleBinding
    metadata:
      name: kubelet-bootstrap
      labels:
        addonmanager.kubernetes.io/mode: Reconcile
    roleRef:
      apiGroup: rbac.authorization.k8s.io
      kind: ClusterRole
      name: system:node-bootstrapper
    Registered: Sat Jun 15 01:39:40 UTC 2024
    - Last Modified: Sun Mar 24 04:11:47 UTC 2019
    - 782 bytes
    - Viewed (0)
  8. manifests/charts/ztunnel/templates/rbac.yaml

        {{- .Values.labels | toYaml | nindent 4}}
      annotations:
        {{- .Values.annotations | toYaml | nindent 4 }}
    ---
    {{- if (eq .Values.platform "openshift") }}
    apiVersion: rbac.authorization.k8s.io/v1
    kind: ClusterRole
    metadata:
      name: ztunnel
      labels:
        app: ztunnel
        release: {{ .Release.Name }}
        istio.io/rev: {{ .Values.revision | default "default" }}
    Registered: Fri Jun 14 15:00:06 UTC 2024
    - Last Modified: Sat May 04 01:17:57 UTC 2024
    - 1.3K bytes
    - Viewed (0)
  9. cluster/addons/kube-network-policies/kube-network-policies-rbac.yaml

    kind: ClusterRole
    apiVersion: rbac.authorization.k8s.io/v1
    metadata:
      name: system:network-policies
      namespace: kube-system
      labels:
        addonmanager.kubernetes.io/mode: Reconcile
    rules:
      - apiGroups: [""]
        resources:
          - pods
          - nodes
          - namespaces
        verbs:
          - get
          - watch
          - list
      # Watch for changes to Kubernetes NetworkPolicies.
      - apiGroups: ["networking.k8s.io"]
        resources:
    Registered: Sat Jun 15 01:39:40 UTC 2024
    - Last Modified: Sun Apr 21 10:01:31 UTC 2024
    - 1.1K bytes
    - Viewed (0)
  10. prow/config/metrics/metrics.yaml

      apiGroup: rbac.authorization.k8s.io
      kind: ClusterRole
      name: system:auth-delegator
    subjects:
    - kind: ServiceAccount
      name: metrics-server
      namespace: kube-system
    ---
    apiVersion: rbac.authorization.k8s.io/v1
    kind: ClusterRoleBinding
    metadata:
      labels:
        k8s-app: metrics-server
      name: system:metrics-server
    roleRef:
      apiGroup: rbac.authorization.k8s.io
      kind: ClusterRole
      name: system:metrics-server
    subjects:
    Registered: Fri Jun 14 15:00:06 UTC 2024
    - Last Modified: Thu Apr 11 20:51:38 UTC 2024
    - 4.6K bytes
    - Viewed (0)
Back to top