- Sort Score
- Result 10 results
- Languages All
Results 81 - 90 of 898 for serviceAccount (0.23 sec)
-
istioctl/pkg/writer/ztunnel/configdump/api.go
Protocol string `json:"protocol"` Name string `json:"name"` Namespace string `json:"namespace"` ServiceAccount string `json:"serviceAccount"` WorkloadName string `json:"workloadName"` WorkloadType string `json:"workloadType"` CanonicalName string `json:"canonicalName"`
Registered: Fri Jun 14 15:00:06 UTC 2024 - Last Modified: Thu Jun 13 16:51:29 UTC 2024 - 5.5K bytes - Viewed (0) -
tests/integration/security/egress_sidecar_tls_origination_test.go
}, }, } for _, tc := range testCases { t.NewSubTest(tc.name).Run(func(t framework.TestContext) { if tc.authorizeSidecar { serviceAccount := tc.from.Config().ServiceAccountName() serviceAccountName := serviceAccount[strings.LastIndex(serviceAccount, "/")+1:] authorizeSidecar(t, tc.from.Config().Namespace, serviceAccountName) }
Registered: Fri Jun 14 15:00:06 UTC 2024 - Last Modified: Mon Apr 08 22:02:59 UTC 2024 - 10.4K bytes - Viewed (0) -
manifests/charts/ztunnel/templates/rbac.yaml
apiVersion: v1 kind: ServiceAccount {{- with .Values.imagePullSecrets }} imagePullSecrets: {{- range . }} - name: {{ . }} {{- end }} {{- end }} metadata: name: ztunnel namespace: {{ .Release.Namespace }} labels: {{- .Values.labels | toYaml | nindent 4}} annotations: {{- .Values.annotations | toYaml | nindent 4 }} --- {{- if (eq .Values.platform "openshift") }} apiVersion: rbac.authorization.k8s.io/v1
Registered: Fri Jun 14 15:00:06 UTC 2024 - Last Modified: Sat May 04 01:17:57 UTC 2024 - 1.3K bytes - Viewed (0) -
cni/pkg/nodeagent/testdata/localhost.yaml
# This allows local testing by sending requests through the local ztunnel to other servers running on localhost. workloads: - uid: cluster1//v1/Pod/default/local name: local namespace: default serviceAccount: default workloadIps: ["127.0.0.1"] protocol: HBONE node: local network: "" services: "default/example.com": 80: 8080 "default/example2.com": 80: 8080
Registered: Fri Jun 14 15:00:06 UTC 2024 - Last Modified: Fri Jan 26 20:34:28 UTC 2024 - 1.2K bytes - Viewed (0) -
cluster/gce/addons/loadbalancing/cloud-provider-binding.yaml
addonmanager.kubernetes.io/mode: Reconcile name: gce:cloud-provider namespace: kube-system roleRef: apiGroup: rbac.authorization.k8s.io kind: Role name: gce:cloud-provider subjects: - kind: ServiceAccount name: cloud-provider namespace: kube-system --- apiVersion: rbac.authorization.k8s.io/v1 kind: ClusterRoleBinding metadata: labels: addonmanager.kubernetes.io/mode: Reconcile
Registered: Sat Jun 15 01:39:40 UTC 2024 - Last Modified: Tue Aug 28 03:47:26 UTC 2018 - 685 bytes - Viewed (0) -
pkg/test/framework/components/echo/kube/deployment.go
} return config, nil } func createServiceAccount(client kubernetes.Interface, ns string, serviceAccount string) error { scopes.Framework.Debugf("Creating service account for: %s/%s", ns, serviceAccount) _, err := client.CoreV1().ServiceAccounts(ns).Create(context.TODO(), &corev1.ServiceAccount{ ObjectMeta: metav1.ObjectMeta{Name: serviceAccount}, }, metav1.CreateOptions{}) return err }
Registered: Fri Jun 14 15:00:06 UTC 2024 - Last Modified: Thu May 09 12:26:52 UTC 2024 - 24.1K bytes - Viewed (0) -
cluster/addons/cloud-controller-manager/cloud-node-controller-binding.yaml
name: system::leader-locking-cloud-controller-manager namespace: kube-system roleRef: apiGroup: rbac.authorization.k8s.io kind: Role name: system::leader-locking-cloud-controller-manager subjects: - kind: ServiceAccount name: cloud-controller-manager namespace: kube-system --- apiVersion: rbac.authorization.k8s.io/v1 kind: ClusterRoleBinding metadata: labels: addonmanager.kubernetes.io/mode: Reconcile
Registered: Sat Jun 15 01:39:40 UTC 2024 - Last Modified: Thu Nov 03 17:38:23 UTC 2022 - 1.2K bytes - Viewed (0) -
pkg/kube/kclient/index_test.go
return nil } return []SaNode{{ ServiceAccount: types.NamespacedName{ Namespace: pod.Namespace, Name: pod.Spec.ServiceAccountName, }, Node: pod.Spec.NodeName, }} }) k1 := SaNode{ ServiceAccount: types.NamespacedName{ Namespace: "ns", Name: "sa", }, Node: "node", } k2 := SaNode{ ServiceAccount: types.NamespacedName{ Namespace: "ns",
Registered: Fri Jun 14 15:00:06 UTC 2024 - Last Modified: Thu May 04 03:49:30 UTC 2023 - 5.7K bytes - Viewed (0) -
cluster/addons/volumesnapshots/volume-snapshot-controller/rbac-volume-snapshot-controller.yaml
# RBAC file for the volume snapshot controller. apiVersion: v1 kind: ServiceAccount metadata: name: volume-snapshot-controller namespace: kube-system labels: kubernetes.io/cluster-service: "true" addonmanager.kubernetes.io/mode: Reconcile --- kind: ClusterRole apiVersion: rbac.authorization.k8s.io/v1 metadata: # rename if there are conflicts name: volume-snapshot-controller-runner namespace: kube-system labels:
Registered: Sat Jun 15 01:39:40 UTC 2024 - Last Modified: Fri Sep 16 14:09:47 UTC 2022 - 2.9K bytes - Viewed (0) -
manifests/charts/base/values.yaml
defaults: global: # ImagePullSecrets for control plane ServiceAccount, list of secrets in the same namespace # to use for pulling any images in pods that reference this ServiceAccount. # Must be set for any cluster configured with private docker registry. imagePullSecrets: [] # Used to locate istiod. istioNamespace: istio-system externalIstiod: false remotePilotAddress: ""
Registered: Fri Jun 14 15:00:06 UTC 2024 - Last Modified: Mon Apr 22 22:00:40 UTC 2024 - 1.3K bytes - Viewed (0)