hexsha
stringlengths 40
40
| size
int64 24
1.05M
| ext
stringclasses 2
values | lang
stringclasses 1
value | max_stars_repo_path
stringlengths 5
269
| max_stars_repo_name
stringlengths 7
107
| max_stars_repo_head_hexsha
stringlengths 40
78
| max_stars_repo_licenses
sequence | max_stars_count
int64 1
84.9k
⌀ | max_stars_repo_stars_event_min_datetime
stringlengths 24
24
⌀ | max_stars_repo_stars_event_max_datetime
stringlengths 24
24
⌀ | max_issues_repo_path
stringlengths 5
269
| max_issues_repo_name
stringlengths 7
107
| max_issues_repo_head_hexsha
stringlengths 40
78
| max_issues_repo_licenses
sequence | max_issues_count
int64 1
116k
⌀ | max_issues_repo_issues_event_min_datetime
stringlengths 24
24
⌀ | max_issues_repo_issues_event_max_datetime
stringlengths 24
24
⌀ | max_forks_repo_path
stringlengths 5
269
| max_forks_repo_name
stringlengths 7
107
| max_forks_repo_head_hexsha
stringlengths 40
78
| max_forks_repo_licenses
sequence | max_forks_count
int64 1
55.9k
⌀ | max_forks_repo_forks_event_min_datetime
stringlengths 24
24
⌀ | max_forks_repo_forks_event_max_datetime
stringlengths 24
24
⌀ | content
stringlengths 24
1.05M
| avg_line_length
float64 1
304k
| max_line_length
int64 14
1.03M
| alphanum_fraction
float64 0
1
|
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
73addbd4ba3f0dc5d1539820393b7590b459a370 | 436 | yaml | YAML | files/addons/clusterrolebindings.yaml | navikt/ansible-nais | 206d2a75ef42434c2b27b0f7b832a6daeddd5087 | [
"MIT"
] | 15 | 2017-07-11T06:18:43.000Z | 2020-06-22T17:33:37.000Z | files/addons/clusterrolebindings.yaml | navikt/ansible-nais | 206d2a75ef42434c2b27b0f7b832a6daeddd5087 | [
"MIT"
] | 38 | 2017-09-08T05:26:47.000Z | 2021-03-04T07:30:02.000Z | files/addons/clusterrolebindings.yaml | navikt/ansible-nais | 206d2a75ef42434c2b27b0f7b832a6daeddd5087 | [
"MIT"
] | 5 | 2017-09-06T09:44:44.000Z | 2020-03-25T07:41:59.000Z | ---
apiVersion: rbac.authorization.k8s.io/v1
kind: ClusterRoleBinding
metadata:
annotations:
rbac.authorization.kubernetes.io/autoupdate: "true"
labels:
kubernetes.io/bootstrapping: rbac-defaults
name: nais-admin
roleRef:
apiGroup: rbac.authorization.k8s.io
kind: ClusterRole
name: cluster-admin
subjects:
# aura group
- apiGroup: rbac.authorization.k8s.io
kind: Group
name: 59dbf5e6-8243-471c-bd57-162346f08d75
| 22.947368 | 55 | 0.766055 |
73ae006d44fde72bc257f8acce827eed681cc1ed | 142 | yaml | YAML | built-in-references/Kubernetes/perf/violations/violation37.yaml | sw47/azure-policy | 4a38e4cb4047b5364902653f0defe45f1b21bc61 | [
"MIT"
] | null | null | null | built-in-references/Kubernetes/perf/violations/violation37.yaml | sw47/azure-policy | 4a38e4cb4047b5364902653f0defe45f1b21bc61 | [
"MIT"
] | null | null | null | built-in-references/Kubernetes/perf/violations/violation37.yaml | sw47/azure-policy | 4a38e4cb4047b5364902653f0defe45f1b21bc61 | [
"MIT"
] | null | null | null | apiVersion: v1
kind: Pod
metadata:
name: image-demo-37
spec:
containers:
- name: nginx
image: nginx #ritaacr.azurecr.io/nginx:latest | 17.75 | 49 | 0.71831 |
73ae0a406bc89e66f25584ea8f03141943f9885a | 309 | yaml | YAML | deploy/role_binding.yaml | kant/multicloud-operators-subscription | eef5b259bcc8dec9b557904381bb2a99d34dd86c | [
"Apache-2.0"
] | null | null | null | deploy/role_binding.yaml | kant/multicloud-operators-subscription | eef5b259bcc8dec9b557904381bb2a99d34dd86c | [
"Apache-2.0"
] | null | null | null | deploy/role_binding.yaml | kant/multicloud-operators-subscription | eef5b259bcc8dec9b557904381bb2a99d34dd86c | [
"Apache-2.0"
] | null | null | null | kind: RoleBinding
apiVersion: rbac.authorization.k8s.io/v1
metadata:
name: multicloud-operators-subscription
subjects:
- kind: ServiceAccount
name: multicloud-operators-subscription
namespace: default
roleRef:
kind: Role
name: multicloud-operators-subscription
apiGroup: rbac.authorization.k8s.io
| 23.769231 | 41 | 0.805825 |
73ae28ac9698b49ba62c80af26f7bceb9401f0fa | 191 | yaml | YAML | kubernetes-security/task02/03-clusterrole-pods-viewers.yaml | otus-kuber-2021-12/i2r-devops_platform | 32fa0a6903d66a9320487d1ce7a0e47455915c19 | [
"MIT"
] | null | null | null | kubernetes-security/task02/03-clusterrole-pods-viewers.yaml | otus-kuber-2021-12/i2r-devops_platform | 32fa0a6903d66a9320487d1ce7a0e47455915c19 | [
"MIT"
] | 4 | 2022-01-23T08:31:10.000Z | 2022-03-05T07:32:02.000Z | kubernetes-security/task02/03-clusterrole-pods-viewers.yaml | otus-kuber-2021-12/i2r-devops_platform | 32fa0a6903d66a9320487d1ce7a0e47455915c19 | [
"MIT"
] | 2 | 2021-01-27T16:26:05.000Z | 2021-04-23T03:18:16.000Z | apiVersion: rbac.authorization.k8s.io/v1
kind: ClusterRole
metadata:
name: pods-viewers
rules:
- apiGroups:
- ""
resources:
- pods
- pods/status
verbs:
- get
- list
- watch
| 12.733333 | 40 | 0.659686 |
73ae2c748cfa16491910ca8c513c35700053ac26 | 1,079 | yml | YAML | hysds/user_rules/deployment.yml | unity-sds/unity-sps-prototype | b4a9c7841502fb14cad2ea61f52f5ac4031e17c1 | [
"Apache-2.0"
] | 1 | 2022-03-08T02:57:20.000Z | 2022-03-08T02:57:20.000Z | hysds/user_rules/deployment.yml | unity-sds/unity-sps-prototype | b4a9c7841502fb14cad2ea61f52f5ac4031e17c1 | [
"Apache-2.0"
] | 37 | 2021-12-02T12:06:00.000Z | 2022-03-29T15:28:54.000Z | hysds/user_rules/deployment.yml | unity-sds/unity-sps-prototype | b4a9c7841502fb14cad2ea61f52f5ac4031e17c1 | [
"Apache-2.0"
] | 3 | 2021-12-07T18:15:27.000Z | 2022-03-04T20:41:25.000Z | apiVersion: apps/v1
kind: Deployment
metadata:
name: user-rules
labels:
app: user-rules
spec:
# replicas: 2
selector:
matchLabels:
app: user-rules
template:
metadata:
labels:
app: user-rules
spec:
securityContext:
runAsUser: 0
runAsGroup: 0
containers:
- name: user-rules
image: hysds-core:unity-v0.0.1
command: ["supervisord", "--nodaemon"]
volumeMounts:
- name: celeryconfig
mountPath: /home/ops/hysds/celeryconfig.py
subPath: celeryconfig.py
- name: supervisord-user-rules
mountPath: /etc/supervisord.conf
subPath: supervisord.conf
- name: data-work
mountPath: /private/tmp/data
volumes:
- name: celeryconfig
configMap:
name: celeryconfig
- name: supervisord-user-rules
configMap:
name: supervisord-user-rules
- name: data-work
hostPath:
path: /private/tmp/data
| 25.093023 | 56 | 0.55051 |
73ae75346372909881af4b0078fccd4eb8164b89 | 265 | yml | YAML | manifests/service-8873.yml | AjayTester1/docker-node-hello-world | 2b5c1ea6e481971c6b62d96e396fa896300d7a94 | [
"MIT"
] | null | null | null | manifests/service-8873.yml | AjayTester1/docker-node-hello-world | 2b5c1ea6e481971c6b62d96e396fa896300d7a94 | [
"MIT"
] | null | null | null | manifests/service-8873.yml | AjayTester1/docker-node-hello-world | 2b5c1ea6e481971c6b62d96e396fa896300d7a94 | [
"MIT"
] | null | null | null | apiVersion: v1
kind: Service
metadata:
name: "akskodey-8873"
labels:
app: "akskodey-8873"
spec:
type: LoadBalancer
ports:
- port: 4000
targetPort: 4000
protocol: TCP
name: http
selector:
app: "akskodey-8873" | 17.666667 | 28 | 0.592453 |
73af0a4be0ee4a5ad81afc020e427ed6870d0960 | 807 | yml | YAML | deployment/deployment.yml | Chathuru/kubernetes-cluster-autoscaler | 3a329fddf040b8d94853010e2b632ac5a98686a6 | [
"Apache-2.0"
] | 4 | 2021-08-13T15:53:21.000Z | 2021-11-18T23:07:15.000Z | deployment/deployment.yml | Chathuru/kubernetes-cluster-autoscaler | 3a329fddf040b8d94853010e2b632ac5a98686a6 | [
"Apache-2.0"
] | null | null | null | deployment/deployment.yml | Chathuru/kubernetes-cluster-autoscaler | 3a329fddf040b8d94853010e2b632ac5a98686a6 | [
"Apache-2.0"
] | null | null | null | apiVersion: apps/v1
kind: Deployment
metadata:
name: autoscalar
namespace: kube-system
spec:
replicas: 1
revisionHistoryLimit: 10
selector:
matchLabels:
k8s-app: kube-autoscalar
strategy:
type: RollingUpdate
rollingUpdate:
maxSurge: 25%
maxUnavailable: 1
template:
metadata:
labels:
k8s-app: kube-autoscalar
spec:
containers:
- name: autoscalar
image: chathuru/autoscaler:latest
imagePullPolicy: Always
volumeMounts:
- name: config
mountPath: /go/bin/conf.yml
subPath: conf.yml
serviceAccount: autoscalar
serviceAccountName: autoscalar
terminationGracePeriodSeconds: 30
volumes:
- name: config
configMap:
name: autoscalar-config
| 21.810811 | 41 | 0.636927 |
73af668ccd875c130374bd1a9ec2a3c8f6cacdf4 | 449 | yaml | YAML | staging/src/k8s.io/pod-security-admission/test/testdata/restricted/v1.9/fail/apparmorprofile0.yaml | 767829413/kubernetes | e3982ce472af31efe0cfb5165271c84f1ace0b0f | [
"Apache-2.0"
] | 84,910 | 2015-08-12T17:45:55.000Z | 2022-03-31T23:39:40.000Z | staging/src/k8s.io/pod-security-admission/test/testdata/restricted/v1.9/fail/apparmorprofile0.yaml | 767829413/kubernetes | e3982ce472af31efe0cfb5165271c84f1ace0b0f | [
"Apache-2.0"
] | 98,305 | 2015-08-12T17:35:13.000Z | 2022-03-31T23:46:47.000Z | staging/src/k8s.io/pod-security-admission/test/testdata/restricted/v1.9/fail/apparmorprofile0.yaml | 767829413/kubernetes | e3982ce472af31efe0cfb5165271c84f1ace0b0f | [
"Apache-2.0"
] | 36,592 | 2015-08-12T18:36:13.000Z | 2022-03-31T16:22:17.000Z | apiVersion: v1
kind: Pod
metadata:
annotations:
container.apparmor.security.beta.kubernetes.io/container1: unconfined
name: apparmorprofile0
spec:
containers:
- image: k8s.gcr.io/pause
name: container1
securityContext:
allowPrivilegeEscalation: false
initContainers:
- image: k8s.gcr.io/pause
name: initcontainer1
securityContext:
allowPrivilegeEscalation: false
securityContext:
runAsNonRoot: true
| 22.45 | 73 | 0.743875 |
73b0109caccf5877557c3a30bdfad40b6ebd0344 | 316 | yaml | YAML | prometheus/node-exporter/node-exporter-svc.yaml | huangronaldo6/kubernetes | 44dd037ecf993a21d1458f9ce0f3ea098ddb4fb8 | [
"Apache-2.0"
] | 35 | 2020-12-03T12:14:09.000Z | 2022-03-15T00:12:09.000Z | prometheus/node-exporter/node-exporter-svc.yaml | 774181401/kubernetes-1 | dd832c9687348c72a9c099b65674260ca2c68ba2 | [
"MIT"
] | 4 | 2020-12-19T13:56:51.000Z | 2021-10-03T10:35:24.000Z | prometheus/node-exporter/node-exporter-svc.yaml | 774181401/kubernetes-1 | dd832c9687348c72a9c099b65674260ca2c68ba2 | [
"MIT"
] | 41 | 2020-09-09T03:26:38.000Z | 2022-03-23T01:34:51.000Z | apiVersion: v1
kind: Service
metadata:
name: node-exporter
namespace: public-service
labels:
app: node-exporter
annotations:
prometheus.io/scrape: 'true'
spec:
selector:
app: node-exporter
ports:
- name: node-exporter
port: 9100
protocol: TCP
targetPort: 9100
clusterIP: None
| 16.631579 | 32 | 0.686709 |
73b0e8083ab6cae669cc341881729bd613869558 | 302 | yaml | YAML | persistent-volume-claims/maven-source.yaml | tripvibe/tv-ci-cd | f35cd3d8eb6809938cbe5fe327debca34d6de912 | [
"Apache-2.0"
] | 2 | 2020-09-15T09:50:31.000Z | 2020-09-15T14:13:21.000Z | persistent-volume-claims/maven-source.yaml | tripvibe/tv-ci-cd | f35cd3d8eb6809938cbe5fe327debca34d6de912 | [
"Apache-2.0"
] | null | null | null | persistent-volume-claims/maven-source.yaml | tripvibe/tv-ci-cd | f35cd3d8eb6809938cbe5fe327debca34d6de912 | [
"Apache-2.0"
] | null | null | null | apiVersion: v1
kind: PersistentVolumeClaim
metadata:
name: maven-source
annotations:
volume.beta.kubernetes.io/storage-provisioner: openshift.org/aws-efs
spec:
resources:
requests:
storage: 2Gi
storageClassName: aws-efs
volumeMode: Filesystem
accessModes:
- ReadWriteMany
| 20.133333 | 72 | 0.748344 |
73b0ec120c0a78ec70b6fb5ea32622d7938ffb95 | 1,926 | yaml | YAML | config/prow/cluster/cherrypicker_deployment.yaml | wangzhen-fit2cloud/test-infra | 0aa0d7b9cee8832e9eca748952131baaa809351c | [
"Apache-2.0"
] | null | null | null | config/prow/cluster/cherrypicker_deployment.yaml | wangzhen-fit2cloud/test-infra | 0aa0d7b9cee8832e9eca748952131baaa809351c | [
"Apache-2.0"
] | null | null | null | config/prow/cluster/cherrypicker_deployment.yaml | wangzhen-fit2cloud/test-infra | 0aa0d7b9cee8832e9eca748952131baaa809351c | [
"Apache-2.0"
] | null | null | null | # Copyright 2021 The Kubernetes Authors All rights reserved.
#
# Licensed under the Apache License, Version 2.0 (the "License");
# you may not use this file except in compliance with the License.
# You may obtain a copy of the License at
#
# http://www.apache.org/licenses/LICENSE-2.0
#
# Unless required by applicable law or agreed to in writing, software
# distributed under the License is distributed on an "AS IS" BASIS,
# WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
# See the License for the specific language governing permissions and
# limitations under the License.
apiVersion: apps/v1
kind: Deployment
metadata:
namespace: default
name: cherrypicker
labels:
app: cherrypicker
spec:
replicas: 1
strategy:
type: RollingUpdate
rollingUpdate:
maxSurge: 1
maxUnavailable: 1
selector:
matchLabels:
app: cherrypicker
template:
metadata:
labels:
app: cherrypicker
spec:
serviceAccountName: ""
serviceAccount: ""
terminationGracePeriodSeconds: 180
containers:
- name: cherrypicker
image: gcr.io/k8s-prow/cherrypicker:v20220330-40eb179576
imagePullPolicy: Always
args:
- --github-token-path=/etc/github/token
- --github-endpoint=http://ghproxy
- --github-endpoint=https://api.github.com
- --dry-run=false
ports:
- name: http
containerPort: 8888
volumeMounts:
- name: hmac
mountPath: /etc/webhook
readOnly: true
- name: github-token
mountPath: /etc/github
readOnly: true
- name: tmp
mountPath: /tmp
volumes:
- name: tmp
emptyDir: {}
- name: hmac
secret:
secretName: hmac-token
- name: github-token
secret:
secretName: k8s-infra-cherrypick-robot-github-token
| 27.514286 | 74 | 0.639148 |
73b120600907f3f6d5d6ced1d76dcf384c49914d | 1,217 | yaml | YAML | .deploy/deployment.yaml | rkrmr33/rkrmr33-demo-app-ui | 29d218c553ddf0c74647a3362713eac198a2c881 | [
"Apache-2.0"
] | null | null | null | .deploy/deployment.yaml | rkrmr33/rkrmr33-demo-app-ui | 29d218c553ddf0c74647a3362713eac198a2c881 | [
"Apache-2.0"
] | null | null | null | .deploy/deployment.yaml | rkrmr33/rkrmr33-demo-app-ui | 29d218c553ddf0c74647a3362713eac198a2c881 | [
"Apache-2.0"
] | null | null | null | apiVersion: apps/v1
kind: Deployment
metadata:
name: demo-app-ui
spec:
selector:
matchLabels:
app: demo-app-ui
template:
metadata:
labels:
app: demo-app-ui
spec:
securityContext:
runAsNonRoot: true
runAsUser: 10001
runAsGroup: 10001
fsGroup: 10001
containers:
- name: demo-app-ui
image: quay.io/roikramer120/demo-app-ui
env:
- name: ENV
value: production
securityContext:
allowPrivilegeEscalation: false
ports:
- name: http
containerPort: 3000
livenessProbe:
httpGet:
path: /healthz
port: 3000
initialDelaySeconds: 15
periodSeconds: 20
readinessProbe:
httpGet:
path: /readyz
port: 3000
initialDelaySeconds: 5
periodSeconds: 10
resources:
limits:
cpu: 800m
memory: 2048Mi
requests:
cpu: 200m
memory: 256Mi
imagePullPolicy: IfNotPresent
terminationGracePeriodSeconds: 10
| 23.862745 | 49 | 0.506984 |
73b138eb880fda20b116070960c270caccd89218 | 322 | yaml | YAML | cluster/apps/media/jellyfin/config-pvc.yaml | fabricesemti80/k8s-cluster-mk4 | 5934091980272dd875b0d09bc9c106f312ab4fdc | [
"MIT"
] | 1 | 2021-12-29T15:16:51.000Z | 2021-12-29T15:16:51.000Z | cluster/apps/media/jellyfin/config-pvc.yaml | fabricesemti80/k8s-cluster-mk4 | 5934091980272dd875b0d09bc9c106f312ab4fdc | [
"MIT"
] | 1 | 2021-12-03T13:47:42.000Z | 2021-12-13T19:34:51.000Z | cluster/apps/media/jellyfin/config-pvc.yaml | fabricesemti80/k8s-cluster-mk4 | 5934091980272dd875b0d09bc9c106f312ab4fdc | [
"MIT"
] | null | null | null | ---
apiVersion: v1
kind: PersistentVolumeClaim
metadata:
name: jellyfin-config-v1
namespace: media
labels:
kasten.io/backup-volume: "enabled"
spec:
accessModes:
- ReadWriteOnce
resources:
requests:
storage: 100Gi
#? replace me with your storage class name
storageClassName: hdd-nfs-storage
| 18.941176 | 44 | 0.717391 |
73b13d5382f4b2845d5eee38277f4f36991b9568 | 324 | yaml | YAML | DevOps/GKE/gkeYaml/autoTrain.yaml | TWCurry/emotion-recognition-training-platform | 748fcdf2558fbfe9fb1523ef4024e7373543f0e3 | [
"MIT"
] | null | null | null | DevOps/GKE/gkeYaml/autoTrain.yaml | TWCurry/emotion-recognition-training-platform | 748fcdf2558fbfe9fb1523ef4024e7373543f0e3 | [
"MIT"
] | null | null | null | DevOps/GKE/gkeYaml/autoTrain.yaml | TWCurry/emotion-recognition-training-platform | 748fcdf2558fbfe9fb1523ef4024e7373543f0e3 | [
"MIT"
] | null | null | null | # CronJob
apiVersion: batch/v1beta1
kind: CronJob
metadata:
name: autotraining
spec:
schedule: "*/5 * * * *"
jobTemplate:
spec:
template:
spec:
containers:
- name: autotraining
image: eu.gcr.io/majestic-hybrid-301217/model-trainer:latest
restartPolicy: Never | 21.6 | 72 | 0.611111 |
73b141f74387ddac235a072d4e850f1103b1901d | 183 | yaml | YAML | templates/k8s/stream-status.service.yaml | ucd-library/casita-krm-deployment | 41620d7a5d13eebd429662cb1bcd50cdb81e7388 | [
"MIT"
] | null | null | null | templates/k8s/stream-status.service.yaml | ucd-library/casita-krm-deployment | 41620d7a5d13eebd429662cb1bcd50cdb81e7388 | [
"MIT"
] | 2 | 2020-10-27T18:20:19.000Z | 2021-05-17T14:44:48.000Z | templates/k8s/stream-status.service.yaml | ucd-library/casita-krm-deployment | 41620d7a5d13eebd429662cb1bcd50cdb81e7388 | [
"MIT"
] | null | null | null | apiVersion: v1
kind: Service
metadata:
name: stream-status-service
spec:
selector:
app: stream-status-deployment
ports:
- protocol: TCP
port: 3000
targetPort: 3000 | 16.636364 | 33 | 0.704918 |
73b1b912c9d0dec436f11ab121d3cb174a21a67a | 513 | yml | YAML | hpa/k8s/job.yml | k8sland/verifier_labs | 2a856305cde60c5acd7c710fa1b402dad661282f | [
"Apache-2.0"
] | null | null | null | hpa/k8s/job.yml | k8sland/verifier_labs | 2a856305cde60c5acd7c710fa1b402dad661282f | [
"Apache-2.0"
] | null | null | null | hpa/k8s/job.yml | k8sland/verifier_labs | 2a856305cde60c5acd7c710fa1b402dad661282f | [
"Apache-2.0"
] | 1 | 2021-05-23T18:41:43.000Z | 2021-05-23T18:41:43.000Z | apiVersion: batch/v1
kind: Job
metadata:
name: hpa
spec:
template:
spec:
serviceAccount: k8sland
containers:
- name: lab
image: k8sland/verifier:v1.2.1
imagePullPolicy: IfNotPresent
command: ["/bin/verifier", "--u=fernand", "--l=hpa", "--s"]
volumeMounts:
- mountPath: /assets
name: assets
restartPolicy: Never
volumes:
- name: assets
secret:
secretName: hpa
backoffLimit: 4
| 22.304348 | 69 | 0.54386 |
73b1c0ec87567a464686ec3a88ff4e524f30f223 | 64 | yaml | YAML | install/kubernetes/kpaas/serviceaccount.yaml | fuhsicloud/fuhsicloud | 7c3836cca308ad994709de69802d25b1fe126ea2 | [
"Apache-2.0"
] | 1 | 2021-03-09T03:41:59.000Z | 2021-03-09T03:41:59.000Z | install/kubernetes/kpaas/serviceaccount.yaml | fuhsicloud/fuhsicloud | 7c3836cca308ad994709de69802d25b1fe126ea2 | [
"Apache-2.0"
] | null | null | null | install/kubernetes/kpaas/serviceaccount.yaml | fuhsicloud/fuhsicloud | 7c3836cca308ad994709de69802d25b1fe126ea2 | [
"Apache-2.0"
] | null | null | null | apiVersion: v1
kind: ServiceAccount
metadata:
name: fuhsicloud | 16 | 20 | 0.8125 |
73b1ca725a370ba45513dafefd7a043112ba5663 | 2,596 | yaml | YAML | dev-tools/minikube/4-Services/secret-service/sourceDeploy.yaml | workloadco/workload | ad664c8f6935d4946732f2092d96cf4ecbbc6a6c | [
"Apache-2.0"
] | 1 | 2021-09-24T17:32:32.000Z | 2021-09-24T17:32:32.000Z | dev-tools/minikube/4-Services/secret-service/sourceDeploy.yaml | workloadco/workload | ad664c8f6935d4946732f2092d96cf4ecbbc6a6c | [
"Apache-2.0"
] | null | null | null | dev-tools/minikube/4-Services/secret-service/sourceDeploy.yaml | workloadco/workload | ad664c8f6935d4946732f2092d96cf4ecbbc6a6c | [
"Apache-2.0"
] | null | null | null | apiVersion: apps/v1
kind: Deployment
metadata:
name: secret-service
namespace: oih-dev-ns
spec:
replicas: 1
selector:
matchLabels:
app: secret-service
template:
metadata:
labels:
app: secret-service
spec:
containers:
- name: secret-service
image: node:12-alpine
command: ["/bin/sh"]
args: ["-c", "yarn install --non-interactive && yarn start:container"]
workingDir: /usr/src/app
ports:
- containerPort: 3000
env:
- name: NODE_ENV
value: development
- name: CRYPTO_DISABLED
value: "true"
- name: IAM_TOKEN
valueFrom:
secretKeyRef:
name: shared-secret
key: iamtoken
- name: MONGODB_CONNECTION
valueFrom:
secretKeyRef:
name: shared-secret
key: secretServiceMongourl
- # value: 8ce00058-5f75-435f-9026-ad952480e15a
# - name: IAM_OIDC_SERVICE_CLIENT_SECRET
# valueFrom:
# secretKeyRef:
# name: secret-service
# key: 'client-secret'
name: "INTROSPECT_TYPE" # - name: IAM_OIDC_SERVICE_CLIENT_ID
value: "basic"
- name: "INTROSPECT_ENDPOINT_BASIC"
value: "http://iam.oih-dev-ns.svc.cluster.local:3099/api/v1/tokens/introspect"
- name: PORT
value: "3000"
- name: API_BASE
value: "/api/v1"
- name: LOG_LEVEL
value: "info"
- name: TTL_AUTHFLOW
value: "2m"
- name: DEBUG_MODE
value: "true"
- name: RABBITMQ_URI
value: "amqp://guest:[email protected]:5672"
- name: "ORIGINWHITELIST"
value: "localoih.com,http://web-ui.localoih.com,http://localhost:3000"
resources:
limits:
cpu: "0.1"
memory: 1000Mi
volumeMounts:
- name: code
mountPath: /usr/src/app
subPath: services/secret-service
livenessProbe:
httpGet:
port: 3000
path: /healthcheck
initialDelaySeconds: 300
timeoutSeconds: 1
readinessProbe:
httpGet:
port: 3000
path: /healthcheck
initialDelaySeconds: 120
timeoutSeconds: 1
imagePullPolicy: IfNotPresent
volumes:
- name: code
persistentVolumeClaim:
claimName: source-volume-claim
minReadySeconds: 10
revisionHistoryLimit: 2
| 28.844444 | 88 | 0.548536 |
73b1d4e79089b7e46af6ba3f76f9eaa2cb536297 | 196 | yaml | YAML | 06/demos/demo1/istio/kiali-secret.yaml | innfocco/istio-managing-apps-kubernetes | f851776b04739bbbfb6e277c1dd687cef31de772 | [
"MIT"
] | null | null | null | 06/demos/demo1/istio/kiali-secret.yaml | innfocco/istio-managing-apps-kubernetes | f851776b04739bbbfb6e277c1dd687cef31de772 | [
"MIT"
] | 3 | 2020-09-07T22:51:23.000Z | 2022-02-19T07:41:23.000Z | service-mesh/istio/sample/istio-plural-course/06/demos/demo1/istio/kiali-secret.yaml | abhioncbr/kubernetes-Example | 3d70afa28a7920a8ecc37fb62f2f54025193f589 | [
"MIT"
] | null | null | null | apiVersion: v1
kind: Secret
metadata:
name: kiali
namespace: istio-system
labels:
app: kiali
type: Opaque
data:
username: YWRtaW4= # admin
passphrase: YWRtaW4= # admin :) | 17.818182 | 33 | 0.658163 |
73b23829834621d6f4644f6b33ea571fdefa7fb0 | 666 | yaml | YAML | apps/smart-home/unifi-controller/ingress.yaml | LukeChannings/k8s-at-home | 0f95935192ef9e18d95e9b88b0b28049ef94a885 | [
"MIT"
] | 9 | 2020-05-11T03:54:48.000Z | 2022-01-15T22:14:40.000Z | apps/smart-home/unifi-controller/ingress.yaml | LukeChannings/k8s-at-home | 0f95935192ef9e18d95e9b88b0b28049ef94a885 | [
"MIT"
] | 4 | 2020-05-04T07:28:08.000Z | 2020-05-06T06:53:48.000Z | apps/smart-home/unifi-controller/ingress.yaml | LukeChannings/k8s-at-home | 0f95935192ef9e18d95e9b88b0b28049ef94a885 | [
"MIT"
] | 5 | 2020-05-12T10:28:06.000Z | 2021-11-09T09:48:58.000Z | ---
apiVersion: networking.k8s.io/v1
kind: Ingress
metadata:
name: unifi-controller
namespace: unifi
annotations:
cert-manager.io/cluster-issuer: "letsencrypt-production"
kubernetes.io/ingress.class: internal
haproxy.org/server-ssl: "true"
haproxy.org/ssl-redirect: "true"
spec:
tls:
- hosts:
- unifi.private.channings.me
secretName: unifi-controller-tls
rules:
- host: unifi.private.channings.me
http:
paths:
- path: /
pathType: ImplementationSpecific
backend:
service:
name: controller
port:
name: https
| 23.785714 | 60 | 0.594595 |
73b23de951dbb3c13c9284bb00783e6765dd0b0c | 874 | yaml | YAML | kafka/channel/config/deployments/webhook-service.yaml | lberk/eventing-ceph | 112c693f49d7223f13856e56f87bfc29c8a6d41c | [
"Apache-2.0"
] | null | null | null | kafka/channel/config/deployments/webhook-service.yaml | lberk/eventing-ceph | 112c693f49d7223f13856e56f87bfc29c8a6d41c | [
"Apache-2.0"
] | null | null | null | kafka/channel/config/deployments/webhook-service.yaml | lberk/eventing-ceph | 112c693f49d7223f13856e56f87bfc29c8a6d41c | [
"Apache-2.0"
] | 1 | 2020-10-15T00:40:58.000Z | 2020-10-15T00:40:58.000Z | # Copyright 2020 The Knative Authors
#
# Licensed under the Apache License, Version 2.0 (the "License");
# you may not use this file except in compliance with the License.
# You may obtain a copy of the License at
#
# https://www.apache.org/licenses/LICENSE-2.0
#
# Unless required by applicable law or agreed to in writing, software
# distributed under the License is distributed on an "AS IS" BASIS,
# WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
# See the License for the specific language governing permissions and
# limitations under the License.
apiVersion: v1
kind: Service
metadata:
name: kafka-webhook
namespace: knative-eventing
labels:
contrib.eventing.knative.dev/release: devel
role: kafka-webhook
spec:
ports:
- name: https-webhook
port: 443
targetPort: 8443
selector:
role: kafka-webhook
| 29.133333 | 74 | 0.740275 |
73b260f0541a38350e0eda89cf7bc92f3293bb66 | 3,485 | yaml | YAML | manifests/03-deployment.yaml | isabella232/cloud-credential-operator | 517f71efb6c5babddc7207b5e6331f51316f5880 | [
"Apache-2.0"
] | null | null | null | manifests/03-deployment.yaml | isabella232/cloud-credential-operator | 517f71efb6c5babddc7207b5e6331f51316f5880 | [
"Apache-2.0"
] | 1 | 2021-04-16T10:22:13.000Z | 2021-04-16T10:22:13.000Z | manifests/03-deployment.yaml | isabella232/cloud-credential-operator | 517f71efb6c5babddc7207b5e6331f51316f5880 | [
"Apache-2.0"
] | null | null | null | apiVersion: apps/v1
kind: Deployment
metadata:
annotations:
config.openshift.io/inject-proxy: cloud-credential-operator
exclude.release.openshift.io/internal-openshift-hosted: "true"
include.release.openshift.io/self-managed-high-availability: "true"
name: cloud-credential-operator
namespace: openshift-cloud-credential-operator
spec:
replicas: 1
revisionHistoryLimit: 4
selector:
matchLabels:
control-plane: controller-manager
controller-tools.k8s.io: "1.0"
strategy:
type: Recreate
template:
metadata:
annotations:
workload.openshift.io/management: '{"effect": "PreferredDuringScheduling"}'
labels:
app: cloud-credential-operator
control-plane: controller-manager
controller-tools.k8s.io: "1.0"
spec:
containers:
- args:
- --secure-listen-address=0.0.0.0:8443
- --upstream=http://127.0.0.1:2112/
- --tls-cert-file=/etc/tls/private/tls.crt
- --tls-private-key-file=/etc/tls/private/tls.key
- --logtostderr=true
image: quay.io/openshift/origin-kube-rbac-proxy:latest
imagePullPolicy: IfNotPresent
name: kube-rbac-proxy
ports:
- containerPort: 8443
name: metrics
protocol: TCP
resources:
requests:
memory: 20Mi
cpu: 10m
terminationMessagePath: /dev/termination-log
terminationMessagePolicy: File
volumeMounts:
- mountPath: /etc/tls/private
name: cloud-credential-operator-serving-cert
- args:
- |
if [ -s /var/run/configmaps/trusted-ca-bundle/tls-ca-bundle.pem ]; then
echo "Copying system trust bundle"
cp -f /var/run/configmaps/trusted-ca-bundle/tls-ca-bundle.pem /etc/pki/ca-trust/extracted/pem/tls-ca-bundle.pem
fi
exec /usr/bin/cloud-credential-operator operator
command:
- /bin/bash
- -ec
env:
- name: RELEASE_VERSION
value: 0.0.1-snapshot
- name: AWS_POD_IDENTITY_WEBHOOK_IMAGE
value: quay.io/openshift/aws-pod-identity-webhook:latest
image: quay.io/openshift/origin-cloud-credential-operator:latest
imagePullPolicy: IfNotPresent
name: cloud-credential-operator
resources:
requests:
cpu: 10m
memory: 150Mi
terminationMessagePolicy: FallbackToLogsOnError
volumeMounts:
- mountPath: /var/run/configmaps/trusted-ca-bundle
name: cco-trusted-ca
nodeSelector:
node-role.kubernetes.io/master: ""
priorityClassName: system-cluster-critical
serviceAccountName: cloud-credential-operator
terminationGracePeriodSeconds: 10
tolerations:
- effect: NoSchedule
key: node-role.kubernetes.io/master
operator: Exists
- effect: NoExecute
key: node.kubernetes.io/unreachable
operator: Exists
tolerationSeconds: 120
- effect: NoExecute
key: node.kubernetes.io/not-ready
operator: Exists
tolerationSeconds: 120
volumes:
- configMap:
items:
- key: ca-bundle.crt
path: tls-ca-bundle.pem
name: cco-trusted-ca
optional: true
name: cco-trusted-ca
- name: cloud-credential-operator-serving-cert
secret:
secretName: cloud-credential-operator-serving-cert
| 33.190476 | 125 | 0.62726 |
73b2a599ddf92cd0441b0cb5787fba770fd5d37b | 584 | yaml | YAML | staging/src/k8s.io/pod-security-admission/test/testdata/restricted/v1.22/fail/restrictedvolumes9.yaml | pec017/kubernetes | 217abf604505743fa2c2a24577300b2fcbdf92c5 | [
"Apache-2.0"
] | 2 | 2015-11-03T14:30:39.000Z | 2016-09-12T05:24:37.000Z | staging/src/k8s.io/pod-security-admission/test/testdata/restricted/v1.22/fail/restrictedvolumes9.yaml | pec017/kubernetes | 217abf604505743fa2c2a24577300b2fcbdf92c5 | [
"Apache-2.0"
] | 1 | 2018-02-23T16:48:28.000Z | 2018-02-23T19:10:22.000Z | staging/src/k8s.io/pod-security-admission/test/testdata/restricted/v1.22/fail/restrictedvolumes9.yaml | pec017/kubernetes | 217abf604505743fa2c2a24577300b2fcbdf92c5 | [
"Apache-2.0"
] | 1 | 2018-08-31T07:57:58.000Z | 2018-08-31T07:57:58.000Z | apiVersion: v1
kind: Pod
metadata:
name: restrictedvolumes9
spec:
containers:
- image: k8s.gcr.io/pause
name: container1
securityContext:
allowPrivilegeEscalation: false
capabilities:
drop:
- ALL
initContainers:
- image: k8s.gcr.io/pause
name: initcontainer1
securityContext:
allowPrivilegeEscalation: false
capabilities:
drop:
- ALL
securityContext:
runAsNonRoot: true
seccompProfile:
type: RuntimeDefault
volumes:
- cephfs:
monitors:
- testing
name: volume-cephfs
| 18.83871 | 37 | 0.64726 |
73b2a69acf4c0daa5a0b131f31f1795b7dcc4784 | 255 | yaml | YAML | lab13/mongodb-pv-gcepd.yaml | jagin/kubernetes-workshop | aba8903f640551c7b7c3af308874400e9eda89bf | [
"MIT"
] | 11 | 2018-10-03T09:02:08.000Z | 2020-02-22T15:37:56.000Z | lab13/mongodb-pv-gcepd.yaml | jagin/kubernetes-workshop | aba8903f640551c7b7c3af308874400e9eda89bf | [
"MIT"
] | null | null | null | lab13/mongodb-pv-gcepd.yaml | jagin/kubernetes-workshop | aba8903f640551c7b7c3af308874400e9eda89bf | [
"MIT"
] | 1 | 2019-11-23T21:59:23.000Z | 2019-11-23T21:59:23.000Z | apiVersion: v1
kind: PersistentVolume
metadata:
name: mongodb-pv
spec:
capacity:
storage: 1Gi
accessModes:
- ReadWriteOnce
- ReadOnlyMany
persistentVolumeReclaimPolicy: Retain
gcePersistentDisk:
pdName: mongodb
fsType: nfs4
| 17 | 39 | 0.729412 |
73b2aeb28ac8623bc152db0c5a46464d28296e15 | 808 | yaml | YAML | k8s/linkis-gateway-service.yaml | cumtcwf/Linkis | a2585a928e18b13fa9f2bed079a382897310606b | [
"Apache-2.0"
] | 1 | 2019-09-23T07:27:03.000Z | 2019-09-23T07:27:03.000Z | k8s/linkis-gateway-service.yaml | LiveFly/Linkis | 098aa0a93ab538ab97b2dbf2f6af21b30f671b41 | [
"Apache-2.0"
] | null | null | null | k8s/linkis-gateway-service.yaml | LiveFly/Linkis | 098aa0a93ab538ab97b2dbf2f6af21b30f671b41 | [
"Apache-2.0"
] | 2 | 2020-11-14T09:21:36.000Z | 2020-12-17T06:33:24.000Z | #
# Copyright 2019 WeBank
#
# Licensed under the Apache License, Version 2.0 (the "License");
# you may not use this file except in compliance with the License.
# You may obtain a copy of the License at
#
# http://www.apache.org/licenses/LICENSE-2.0
#
# Unless required by applicable law or agreed to in writing, software
# distributed under the License is distributed on an "AS IS" BASIS,
# WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
# See the License for the specific language governing permissions and
# limitations under the License.
apiVersion: v1
kind: Service
metadata:
name: linkis-gateway-service
spec:
selector:
app: linkis-gateway
ports:
- name: http
port: 14001
protocol: TCP
targetPort: 14001
nodePort: 32111
type: NodePort
| 27.862069 | 74 | 0.731436 |
73b2d7478c8a61cf1af4856d226d9773ffb65ff0 | 818 | yaml | YAML | config/bases/api-gateway/api-gateway-service.yaml | pwittrock-me/petclinic-config | 1a867bb9a931b3d1de6def0f40116d1e5c130edd | [
"Apache-2.0"
] | null | null | null | config/bases/api-gateway/api-gateway-service.yaml | pwittrock-me/petclinic-config | 1a867bb9a931b3d1de6def0f40116d1e5c130edd | [
"Apache-2.0"
] | null | null | null | config/bases/api-gateway/api-gateway-service.yaml | pwittrock-me/petclinic-config | 1a867bb9a931b3d1de6def0f40116d1e5c130edd | [
"Apache-2.0"
] | null | null | null | # Copyright 2018 Google Inc.
#
# Licensed under the Apache License, Version 2.0 (the "License");
# you may not use this file except in compliance with the License.
# You may obtain a copy of the License at
#
# https://www.apache.org/licenses/LICENSE-2.0
#
# Unless required by applicable law or agreed to in writing, software
# distributed under the License is distributed on an "AS IS" BASIS,
# WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
# See the License for the specific language governing permissions and
# limitations under the License.
apiVersion: v1
kind: Service
metadata:
labels:
io.kompose.service: api-gateway
name: api-gateway
spec:
ports:
- name: "8080"
port: 8080
targetPort: 8080
selector:
io.kompose.service: api-gateway
type: LoadBalancer
| 29.214286 | 74 | 0.739609 |
73b3383a0628b25109a72175d21905b2953ffce8 | 1,299 | yaml | YAML | docs/orchestration/kubernetes/minio-distributed-daemonset.yaml | arthurhanlon/minio | a43d9119a938582ba361cb240ac9d22738f19885 | [
"Apache-2.0"
] | 1 | 2022-02-25T23:42:16.000Z | 2022-02-25T23:42:16.000Z | docs/orchestration/kubernetes/minio-distributed-daemonset.yaml | arthurhanlon/minio | a43d9119a938582ba361cb240ac9d22738f19885 | [
"Apache-2.0"
] | null | null | null | docs/orchestration/kubernetes/minio-distributed-daemonset.yaml | arthurhanlon/minio | a43d9119a938582ba361cb240ac9d22738f19885 | [
"Apache-2.0"
] | 1 | 2022-03-20T01:38:01.000Z | 2022-03-20T01:38:01.000Z | apiVersion: apps/v1
kind: DaemonSet
metadata:
name: minio
labels:
app: minio
spec:
selector:
matchLabels:
app: minio
template:
metadata:
labels:
app: minio
spec:
# We only deploy minio to the specified nodes. select your nodes by using `kubectl label node hostname1 -l minio-server=true`
nodeSelector:
minio-server: "true"
# This is to maximize network performance, the headless service can be used to connect to a random host.
hostNetwork: true
# We're just using a hostpath. This path must be the same on all servers, and should be the largest, fastest block device you can fit.
volumes:
- name: storage
hostPath:
path: /data/minio/
containers:
- name: minio
env:
- name: MINIO_ACCESS_KEY
value: "minio"
- name: MINIO_SECRET_KEY
value: "minio123"
image: minio/minio:RELEASE.2019-09-11T19-53-16Z
# Unfortunately you must manually define each server. Perhaps autodiscovery via DNS can be implemented in the future.
args:
- server
- http://hostname{1...4}/data/minio
ports:
- containerPort: 9000
volumeMounts:
- name: storage
mountPath: /data/minio/
| 30.209302 | 140 | 0.621247 |
73b339e588c02fad0224a8798474f74bdc99ed6b | 573 | yaml | YAML | namespaces/live-1.cloud-platform.service.justice.gov.uk/pecs-move-platform-backend-staging/00-namespace.yaml | martyn-w/cloud-platform-environments | 784924e37ebb6e2c074f88bf8fbb4eb7bdf3d634 | [
"MIT"
] | null | null | null | namespaces/live-1.cloud-platform.service.justice.gov.uk/pecs-move-platform-backend-staging/00-namespace.yaml | martyn-w/cloud-platform-environments | 784924e37ebb6e2c074f88bf8fbb4eb7bdf3d634 | [
"MIT"
] | null | null | null | namespaces/live-1.cloud-platform.service.justice.gov.uk/pecs-move-platform-backend-staging/00-namespace.yaml | martyn-w/cloud-platform-environments | 784924e37ebb6e2c074f88bf8fbb4eb7bdf3d634 | [
"MIT"
] | null | null | null | apiVersion: v1
kind: Namespace
metadata:
name: pecs-move-platform-backend-staging
labels:
cloud-platform.justice.gov.uk/is-production: "false"
cloud-platform.justice.gov.uk/environment-name: "staging"
annotations:
cloud-platform.justice.gov.uk/business-unit: "Digital and Technology"
cloud-platform.justice.gov.uk/application: "pecs-move-platform-backend"
cloud-platform.justice.gov.uk/owner: "[email protected]"
cloud-platform.justice.gov.uk/source-code: "https://github.com/ministryofjustice/pecs-move-platform-backend"
| 44.076923 | 112 | 0.771379 |
73b36af1b1b8e4566f9ff5948a970bf2044c6732 | 239 | yaml | YAML | tekton/kaniko-build-knative-example/sa/secret.yaml | azkaoru/tekton-tutorial | 4cdca7bac8a2eeb9e06f98588e9924271438be11 | [
"Apache-2.0"
] | null | null | null | tekton/kaniko-build-knative-example/sa/secret.yaml | azkaoru/tekton-tutorial | 4cdca7bac8a2eeb9e06f98588e9924271438be11 | [
"Apache-2.0"
] | null | null | null | tekton/kaniko-build-knative-example/sa/secret.yaml | azkaoru/tekton-tutorial | 4cdca7bac8a2eeb9e06f98588e9924271438be11 | [
"Apache-2.0"
] | null | null | null | apiVersion: v1
kind: Secret
metadata:
name: openshift-cr-push-secret
annotations:
tekton.dev/docker-0: image-registry.openshift-image-registry.svc:5000
type: kubernetes.io/basic-auth
data:
username: <base64>
password: <base64>
| 21.727273 | 73 | 0.757322 |
73b375df575bbeba85d735866ba3705a08941fa0 | 2,236 | yaml | YAML | config-root/customresourcedefinitions/tekton-pipelines/tekton-pipeline/clustertasks.tekton.dev-crd.yaml | andreasevers/jx3-gke-vault-sflabs | 1ee96b5b8d6d7fcbb8a7474fec07d4c5d336a9f9 | [
"Apache-2.0"
] | 1 | 2020-10-13T14:29:04.000Z | 2020-10-13T14:29:04.000Z | config-root/customresourcedefinitions/tekton-pipelines/tekton-pipeline/clustertasks.tekton.dev-crd.yaml | andreasevers/jx3-gke-vault-sflabs | 1ee96b5b8d6d7fcbb8a7474fec07d4c5d336a9f9 | [
"Apache-2.0"
] | 302 | 2020-10-06T15:15:25.000Z | 2021-02-05T17:59:24.000Z | config-root/customresourcedefinitions/tekton-pipelines/tekton-pipeline/clustertasks.tekton.dev-crd.yaml | andreasevers/jx3-gke-vault-sflabs | 1ee96b5b8d6d7fcbb8a7474fec07d4c5d336a9f9 | [
"Apache-2.0"
] | 1 | 2020-10-09T08:33:21.000Z | 2020-10-09T08:33:21.000Z | # Source: tekton-pipeline/templates/clustertasks.tekton.dev-crd.yaml
# Copyright 2019 The Tekton Authors
#
# Licensed under the Apache License, Version 2.0 (the "License");
# you may not use this file except in compliance with the License.
# You may obtain a copy of the License at
#
# https://www.apache.org/licenses/LICENSE-2.0
#
# Unless required by applicable law or agreed to in writing, software
# distributed under the License is distributed on an "AS IS" BASIS,
# WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
# See the License for the specific language governing permissions and
# limitations under the License.
apiVersion: apiextensions.k8s.io/v1
kind: CustomResourceDefinition
metadata:
name: clustertasks.tekton.dev
labels:
app.kubernetes.io/instance: default
app.kubernetes.io/part-of: tekton-pipelines
pipeline.tekton.dev/release: "v0.20.1"
version: "v0.20.1"
gitops.jenkins-x.io/pipeline: 'customresourcedefinitions'
spec:
group: tekton.dev
preserveUnknownFields: false
versions:
- &version
name: v1alpha1
served: true
storage: false
schema:
openAPIV3Schema:
type: object
# One can use x-kubernetes-preserve-unknown-fields: true
# at the root of the schema (and inside any properties, additionalProperties)
# to get the traditional CRD behaviour that nothing is pruned, despite
# setting spec.preserveUnknownProperties: false.
#
# See https://kubernetes.io/blog/2019/06/20/crd-structural-schema/
# See issue: https://github.com/knative/serving/issues/912
x-kubernetes-preserve-unknown-fields: true
# Opt into the status subresource so metadata.generation
# starts to increment
subresources:
status: {}
- !!merge <<: *version
name: v1beta1
storage: true
names:
kind: ClusterTask
plural: clustertasks
categories:
- tekton
- tekton-pipelines
scope: Cluster
conversion:
strategy: Webhook
webhook:
conversionReviewVersions: ["v1beta1"]
clientConfig:
service:
name: tekton-pipelines-webhook
namespace: tekton-pipelines
| 33.373134 | 87 | 0.691413 |
73b39fdebd0a3f72c268e8468646335191be4a01 | 1,055 | yaml | YAML | 2-network-policies/mongodb/nosqlclient-deployment.yaml | cloudogu/k8s-security-demos | f759315f21e89c970514bc2226a825764fab7fe7 | [
"MIT"
] | 63 | 2019-04-24T21:59:36.000Z | 2022-01-02T13:10:50.000Z | 2-network-policies/mongodb/nosqlclient-deployment.yaml | cloudogu/k8s-security-demos | f759315f21e89c970514bc2226a825764fab7fe7 | [
"MIT"
] | 6 | 2019-08-23T15:33:48.000Z | 2021-01-25T09:31:02.000Z | 2-network-policies/mongodb/nosqlclient-deployment.yaml | cloudogu/k8s-security-demos | f759315f21e89c970514bc2226a825764fab7fe7 | [
"MIT"
] | 14 | 2020-05-24T18:28:35.000Z | 2021-08-11T00:32:43.000Z | apiVersion: apps/v1
kind: Deployment
metadata:
labels:
run: nosqlclient
name: nosqlclient
namespace: production
spec:
selector:
matchLabels:
run: nosqlclient
strategy:
type: Recreate
template:
metadata:
labels:
run: nosqlclient
spec:
containers:
- image: mongoclient/mongoclient:4.0.1
name: nosqlclient
resources:
requests:
#cpu: 100m
memory: 128Mi
limits:
#cpu: 500m
memory: 512Mi
# Error: failed to connect to server [mongodb:27017]
# Doesn't seem to happen without readiness probe :-/
#readinessProbe:
# httpGet:
# path: /
# port: 3000
livenessProbe:
httpGet:
path: /
port: 3000
ports:
- containerPort: 3000
env:
- name: MONGO_URL
value: mongodb://mongodb
- name: MONGOCLIENT_DEFAULT_CONNECTION_URL
value: mongodb://mongodb/users
| 22.446809 | 60 | 0.536493 |
73b3f93a2419672da40294ae0e7b93f2d62d8871 | 914 | yaml | YAML | challenge_3/minecraft_two.yaml | drcrook1/minecraft_hack | 39404b841ccb8a94279887ff7f290354b47d26e0 | [
"MIT"
] | null | null | null | challenge_3/minecraft_two.yaml | drcrook1/minecraft_hack | 39404b841ccb8a94279887ff7f290354b47d26e0 | [
"MIT"
] | null | null | null | challenge_3/minecraft_two.yaml | drcrook1/minecraft_hack | 39404b841ccb8a94279887ff7f290354b47d26e0 | [
"MIT"
] | null | null | null | kind: StatefulSet
apiVersion: apps/v1
metadata:
name: minecraft-1-13-2
spec:
serviceName: minecraft-1-13-2
selector:
matchLabels:
app: minecraft-1-13-2
replicas: 1
template:
metadata:
labels:
app: minecraft-1-13-2
spec:
containers:
- name: minecraft-1-13-2
image: ytechie/minecraft
imagePullPolicy: Always
env:
- name: EULA
value: "TRUE"
ports:
- containerPort: 25575
name: portone
- containerPort: 25565
name: porttwo
volumeMounts:
- name: minecraft-vol
mountPath: /data
volumeClaimTemplates:
- metadata:
name: minecraft-vol
spec:
accessModes: [ "ReadWriteOnce" ]
storageClassName: default
resources:
requests:
storage: 1000M | 23.435897 | 40 | 0.532823 |
73b482e0be32c0d62582bfb7b4352e2e51360e84 | 434 | yaml | YAML | _course_files/Chapter 6 Services/webapp-service.yaml | boriphuth/k8s-fleetman | 5bc31a72d7fadd7f0550d0390fcab9525055663b | [
"MIT"
] | 1 | 2019-10-23T09:14:35.000Z | 2019-10-23T09:14:35.000Z | _course_files/Chapter 6 Services/webapp-service.yaml | boriphuth/k8s-fleetman | 5bc31a72d7fadd7f0550d0390fcab9525055663b | [
"MIT"
] | null | null | null | _course_files/Chapter 6 Services/webapp-service.yaml | boriphuth/k8s-fleetman | 5bc31a72d7fadd7f0550d0390fcab9525055663b | [
"MIT"
] | null | null | null | apiVersion: v1
kind: Service
metadata:
name: fleetman-webapp
spec:
# This defines which pods are going to be represented by this Service
# The service becomes a network endpoint for either other services
# or maybe external users to connect to (eg browser)
selector:
app: webapp
# release: "0"
release: "0-5"
ports:
- name: http
port: 80
nodePort: 30080
type: NodePort
| 20.666667 | 72 | 0.64977 |
73b484f3eb8150c39c1b5fde3e05a36a05d01bae | 691 | yaml | YAML | install/aks/manifests/rttest-send-kafka-100k-50m.yaml | david618/elastic-ingest | 19a8cfde1755a1ffc49ca624d6c771d1d5a1313c | [
"Apache-2.0"
] | 2 | 2019-07-28T18:27:48.000Z | 2020-12-14T05:28:16.000Z | install/aks/manifests/rttest-send-kafka-100k-50m.yaml | david618/elastic-ingest | 19a8cfde1755a1ffc49ca624d6c771d1d5a1313c | [
"Apache-2.0"
] | null | null | null | install/aks/manifests/rttest-send-kafka-100k-50m.yaml | david618/elastic-ingest | 19a8cfde1755a1ffc49ca624d6c771d1d5a1313c | [
"Apache-2.0"
] | 1 | 2020-12-14T05:28:28.000Z | 2020-12-14T05:28:28.000Z | apiVersion: apps/v1
kind: Deployment
metadata:
name: rttest-send-kafka-100k-50m
spec:
selector:
matchLabels:
app: rttest-send-kafka-100k-50m
replicas: 1
template:
metadata:
labels:
app: rttest-send-kafka-100k-50m
spec:
containers:
- name: rttest-send-kafka-100k-50m
image: david62243/rttest-send:v0.3
command: ["/bin/bash", "-c"]
#imagePullPolicy: Always
args:
- >
cd /opt/rttest;
java -cp target/rttest.jar com.esri.rttest.send.Kafka gateway-cp-kafka-headless:9092 planes9 planes00000 100000 50000000;
tail -f /dev/null
nodeSelector:
func: test
| 25.592593 | 133 | 0.607815 |
73b48763a73da9d6e74d30a0e8a8cb0788c2a1ad | 3,270 | yaml | YAML | deploy/crds/core.humio.com_humioexternalclusters_crd.yaml | Crevil/humio-operator | 41c992bdaee568eb85525b7ea4feef795e4e4dd8 | [
"Apache-2.0"
] | null | null | null | deploy/crds/core.humio.com_humioexternalclusters_crd.yaml | Crevil/humio-operator | 41c992bdaee568eb85525b7ea4feef795e4e4dd8 | [
"Apache-2.0"
] | null | null | null | deploy/crds/core.humio.com_humioexternalclusters_crd.yaml | Crevil/humio-operator | 41c992bdaee568eb85525b7ea4feef795e4e4dd8 | [
"Apache-2.0"
] | null | null | null | apiVersion: apiextensions.k8s.io/v1
kind: CustomResourceDefinition
metadata:
name: humioexternalclusters.core.humio.com
labels:
app: 'humio-operator'
app.kubernetes.io/name: 'humio-operator'
app.kubernetes.io/instance: 'humio-operator'
app.kubernetes.io/managed-by: 'Helm'
helm.sh/chart: 'humio-operator-0.0.12'
spec:
group: core.humio.com
names:
kind: HumioExternalCluster
listKind: HumioExternalClusterList
plural: humioexternalclusters
singular: humioexternalcluster
scope: Namespaced
versions:
- additionalPrinterColumns:
- description: The state of the external Humio cluster
jsonPath: .status.state
name: State
type: string
name: v1alpha1
schema:
openAPIV3Schema:
description: HumioExternalCluster is the Schema for the humioexternalclusters
API
properties:
apiVersion:
description: 'APIVersion defines the versioned schema of this representation
of an object. Servers should convert recognized schemas to the latest
internal value, and may reject unrecognized values. More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#resources'
type: string
kind:
description: 'Kind is a string value representing the REST resource this
object represents. Servers may infer this from the endpoint the client
submits requests to. Cannot be updated. In CamelCase. More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#types-kinds'
type: string
metadata:
type: object
spec:
description: HumioExternalClusterSpec defines the desired state of HumioExternalCluster
properties:
apiTokenSecretName:
description: APITokenSecretName is used to obtain the API token we
need to use when communicating with the external Humio cluster.
The secret must contain a key "token" which holds the Humio API
token.
type: string
caSecretName:
description: CASecretName is used to point to a Kubernetes secret
that holds the CA that will be used to issue intra-cluster TLS certificates.
The secret must contain a key "ca.crt" which holds the CA certificate
in PEM format.
type: string
insecure:
description: TLSDisabled is used to disable intra-cluster TLS when
cert-manager is being used.
type: boolean
url:
description: Url is used to connect to the Humio cluster we want to
use.
type: string
type: object
status:
description: HumioExternalClusterStatus defines the observed state of
HumioExternalCluster
properties:
state:
type: string
version:
type: string
type: object
type: object
served: true
storage: true
subresources:
status: {}
| 40.37037 | 175 | 0.624465 |
73b4b2df3a1668a71e0f037bc44e4ec7c80ecab3 | 7,648 | yaml | YAML | k8s/us-central1/gen/tf-nightly-efficientnet-func-k80-x8.yaml | will-cromar/ml-testing-accelerators | 7d4837085931c97ee54e0df8f0a6ae5a47360dfc | [
"Apache-2.0"
] | null | null | null | k8s/us-central1/gen/tf-nightly-efficientnet-func-k80-x8.yaml | will-cromar/ml-testing-accelerators | 7d4837085931c97ee54e0df8f0a6ae5a47360dfc | [
"Apache-2.0"
] | null | null | null | k8s/us-central1/gen/tf-nightly-efficientnet-func-k80-x8.yaml | will-cromar/ml-testing-accelerators | 7d4837085931c97ee54e0df8f0a6ae5a47360dfc | [
"Apache-2.0"
] | null | null | null | # Copyright 2020 Google LLC
#
# Licensed under the Apache License, Version 2.0 (the "License");
# you may not use this file except in compliance with the License.
# You may obtain a copy of the License at
#
# https://www.apache.org/licenses/LICENSE-2.0
#
# Unless required by applicable law or agreed to in writing, software
# distributed under the License is distributed on an "AS IS" BASIS,
# WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
# See the License for the specific language governing permissions and
# limitations under the License.
"apiVersion": "batch/v1beta1"
"kind": "CronJob"
"metadata":
"labels":
"accelerator": "k80-x8"
"benchmarkId": "tf-nightly-efficientnet-func-k80-x8"
"frameworkVersion": "tf-nightly"
"mode": "func"
"model": "efficientnet"
"name": "tf-nightly-efficientnet-func-k80-x8"
"namespace": "automated"
"spec":
"concurrencyPolicy": "Forbid"
"jobTemplate":
"metadata":
"annotations":
"ml-testing-accelerators/gcs-subdir": "tf-nightly/efficientnet/func/k80-x8"
"ml-testing-accelerators/metric-config": |
{
"sources": [
{
"literals": {
"assertions": {
"duration": {
"inclusive_bounds": false,
"std_devs_from_mean": {
"comparison": "LESS",
"std_devs": 5
},
"wait_for_n_data_points": 10
}
}
}
},
{
"tensorboard": {
"aggregate_assertions": [
{
"assertion": {
"inclusive_bounds": true,
"std_devs_from_mean": {
"comparison": "GREATER",
"std_devs": 4
},
"wait_for_n_data_points": 0
},
"strategy": "AVERAGE",
"tag": "examples_per_second"
}
],
"exclude_tags": [
],
"include_tags": [
{
"strategies": [
"FINAL"
],
"tag_pattern": "*"
}
],
"merge_runs": false
}
}
]
}
"labels":
"accelerator": "k80-x8"
"benchmarkId": "tf-nightly-efficientnet-func-k80-x8"
"frameworkVersion": "tf-nightly"
"mode": "func"
"model": "efficientnet"
"spec":
"activeDeadlineSeconds": 14400
"backoffLimit": 1
"template":
"spec":
"containers":
- "args":
- "python3"
- "official/vision/image_classification/classifier_trainer.py"
- "--data_dir=$(IMAGENET_DIR)"
- "--model_type=efficientnet"
- "--dataset=imagenet"
- "--mode=train_and_eval"
- "--model_dir=$(MODEL_DIR)"
- |
--params_override="evaluation":
"epochs_between_evals": 1
"model":
"model_params":
"model_name": "efficientnet-b0"
"runtime":
"all_reduce_alg": "hierarchical_copy"
"num_gpus": 8
"train":
"epochs": 1
"train_dataset":
"builder": "records"
"validation_dataset":
"builder": "records"
- "--config_file=official/vision/image_classification/configs/examples/efficientnet/imagenet/efficientnet-b0-gpu.yaml"
"env":
- "name": "POD_NAME"
"valueFrom":
"fieldRef":
"fieldPath": "metadata.name"
- "name": "POD_UID"
"valueFrom":
"fieldRef":
"fieldPath": "metadata.uid"
- "name": "POD_NAMESPACE"
"valueFrom":
"fieldRef":
"fieldPath": "metadata.namespace"
- "name": "JOB_NAME"
"valueFrom":
"fieldRef":
"fieldPath": "metadata.labels['job-name']"
- "name": "MODEL_DIR"
"value": "$(OUTPUT_BUCKET)/tf-nightly/efficientnet/func/k80-x8/$(JOB_NAME)"
"envFrom":
- "configMapRef":
"name": "gcs-buckets"
"image": "gcr.io/xl-ml-test/tensorflow:nightly"
"imagePullPolicy": "Always"
"name": "train"
"resources":
"limits":
"nvidia.com/gpu": 8
"requests":
"cpu": 2
"memory": "20G"
"volumeMounts":
- "mountPath": "/dev/shm"
"name": "dshm"
"readOnly": false
"initContainers":
- "env":
- "name": "POD_NAME"
"valueFrom":
"fieldRef":
"fieldPath": "metadata.name"
- "name": "POD_UID"
"valueFrom":
"fieldRef":
"fieldPath": "metadata.uid"
- "name": "POD_NAMESPACE"
"valueFrom":
"fieldRef":
"fieldPath": "metadata.namespace"
- "name": "JOB_NAME"
"valueFrom":
"fieldRef":
"fieldPath": "metadata.labels['job-name']"
- "name": "MODEL_DIR"
"value": "$(OUTPUT_BUCKET)/tf-nightly/efficientnet/func/k80-x8/$(JOB_NAME)"
- "name": "METRIC_CONFIG"
"value": |
{
"metric_collection_config": {
"default_aggregation_strategies": [
"final"
],
"metric_to_aggregation_strategies": {
"examples_per_second": [
"average"
]
},
"use_run_name_prefix": true,
"write_to_bigquery": true
},
"regression_test_config": {
"metric_success_conditions": {
"examples_per_second_average": {
"comparison": "greater_or_equal",
"success_threshold": {
"stddevs_from_mean": 4
}
},
"total_wall_time": {
"comparison": "less",
"success_threshold": {
"stddevs_from_mean": 5
},
"wait_for_n_points_of_history": 10
}
}
},
"test_name": "tf-nightly-efficientnet-func-k80-x8"
}
"envFrom":
- "configMapRef":
"name": "gcs-buckets"
"image": "gcr.io/xl-ml-test/publisher:stable"
"imagePullPolicy": "Always"
"name": "publisher"
"nodeSelector":
"cloud.google.com/gke-accelerator": "nvidia-tesla-k80"
"priorityClassName": "gpu-k80"
"restartPolicy": "Never"
"volumes":
- "emptyDir":
"medium": "Memory"
"name": "dshm"
"schedule": "0 8 * * *"
"successfulJobsHistoryLimit": 1
"suspend": true | 34.45045 | 130 | 0.431616 |
73b4d6a6858c5337d8ab5d91f26fe6f2bf84e8b9 | 409 | yml | YAML | infra/kubernetes/vaccination-api-service.yml | fossabot/DIVOC | 9460d2926fcb96b3d9d282f3d9c074351e732343 | [
"MIT"
] | 145 | 2020-12-31T10:24:39.000Z | 2022-02-15T12:16:27.000Z | infra/kubernetes/vaccination-api-service.yml | InduprasadSR/DIVOC | 4afea495e4a800c953f7b58a262889b18d7df6a6 | [
"MIT"
] | 198 | 2020-12-24T03:30:28.000Z | 2022-03-31T12:02:30.000Z | infra/kubernetes/vaccination-api-service.yml | InduprasadSR/DIVOC | 4afea495e4a800c953f7b58a262889b18d7df6a6 | [
"MIT"
] | 193 | 2020-12-31T10:24:44.000Z | 2022-03-31T17:05:34.000Z | apiVersion: v1
kind: Service
metadata:
finalizers:
- service.kubernetes.io/load-balancer-cleanup
labels:
k8s-app: vaccination-api
name: vaccination-api
spec:
externalTrafficPolicy: Cluster
ports:
- name: "tcp-8000"
port: 8000
protocol: TCP
targetPort: 8000
selector:
k8s-app: vaccination-api
sessionAffinity: None
type: LoadBalancer
status:
loadBalancer: {} | 19.47619 | 49 | 0.696822 |
73b4e8db525639702772e9edcce50153dd4e2d80 | 221 | yaml | YAML | 150-questions/51/51.yaml | dudick123/ckad-study | 04739f1b41621553524a7a2973a9006b3be3749b | [
"Apache-2.0"
] | null | null | null | 150-questions/51/51.yaml | dudick123/ckad-study | 04739f1b41621553524a7a2973a9006b3be3749b | [
"Apache-2.0"
] | null | null | null | 150-questions/51/51.yaml | dudick123/ckad-study | 04739f1b41621553524a7a2973a9006b3be3749b | [
"Apache-2.0"
] | null | null | null | apiVersion: v1
kind: Pod
metadata:
name: nginx-node-selector-01
labels:
env: test
spec:
containers:
- name: nginx
image: nginx
imagePullPolicy: IfNotPresent
nodeSelector:
nodeName: nginxnode-01
| 14.733333 | 33 | 0.696833 |
73b54a37324cae4d0d6955bc06606d6a36e301bd | 200 | yaml | YAML | manifests/splunk-kubernetes-objects/secret.yaml | RentTheRunway/splunk-connect-for-kubernetes | feed1fd66f8fdba17213e78bbcc49427c0c41dce | [
"Apache-2.0"
] | 304 | 2018-05-16T07:03:33.000Z | 2022-03-22T00:46:15.000Z | manifests/splunk-kubernetes-objects/secret.yaml | RentTheRunway/splunk-connect-for-kubernetes | feed1fd66f8fdba17213e78bbcc49427c0c41dce | [
"Apache-2.0"
] | 562 | 2018-05-25T08:10:02.000Z | 2022-03-30T10:15:02.000Z | manifests/splunk-kubernetes-objects/secret.yaml | RentTheRunway/splunk-connect-for-kubernetes | feed1fd66f8fdba17213e78bbcc49427c0c41dce | [
"Apache-2.0"
] | 283 | 2018-06-03T05:44:35.000Z | 2022-03-22T21:38:03.000Z | ---
apiVersion: v1
kind: Secret
metadata:
name: splunk-kubernetes-objects
labels:
app: splunk-kubernetes-objects
version: 1.4.9
type: Opaque
data:
splunk_hec_token: TVktU1BMVU5LLVRPS0VO
| 16.666667 | 40 | 0.745 |
73b55b7c526bbc0f6da0be5e8ab3e839fd4233cf | 144 | yaml | YAML | built-in-references/Kubernetes/perf/violations/violation8619.yaml | sw47/azure-policy | 4a38e4cb4047b5364902653f0defe45f1b21bc61 | [
"MIT"
] | null | null | null | built-in-references/Kubernetes/perf/violations/violation8619.yaml | sw47/azure-policy | 4a38e4cb4047b5364902653f0defe45f1b21bc61 | [
"MIT"
] | null | null | null | built-in-references/Kubernetes/perf/violations/violation8619.yaml | sw47/azure-policy | 4a38e4cb4047b5364902653f0defe45f1b21bc61 | [
"MIT"
] | null | null | null | apiVersion: v1
kind: Pod
metadata:
name: image-demo-8619
spec:
containers:
- name: nginx
image: nginx #ritaacr.azurecr.io/nginx:latest | 18 | 49 | 0.722222 |
73b5a4046bc8fdd2069b7b98f1585c83a35e58af | 1,043 | yml | YAML | assets/x/webpage.yml | cachac/kubelabs | 545c27ca5a9f0255ea5f78b26a527be5d02b9eaf | [
"MIT"
] | null | null | null | assets/x/webpage.yml | cachac/kubelabs | 545c27ca5a9f0255ea5f78b26a527be5d02b9eaf | [
"MIT"
] | null | null | null | assets/x/webpage.yml | cachac/kubelabs | 545c27ca5a9f0255ea5f78b26a527be5d02b9eaf | [
"MIT"
] | null | null | null | apiVersion: apps/v1
kind: Deployment
metadata:
name: deploy-webpage
namespace: public
spec:
replicas: 2
strategy:
type: RollingUpdate
rollingUpdate:
maxSurge: 25%
maxUnavailable: 50%
selector:
matchLabels:
app: webpage
template:
metadata:
name: webpage
labels:
app: webpage
spec:
containers:
- name: webpage
image: cachac/kubelabs_webapp:1.1.7
ports:
- containerPort: 8080
resources:
limits:
cpu: 100m
memory: 100Mi
requests:
cpu: 10m
memory: 50Mi
volumeMounts:
- name: config-volume
mountPath: /usr/share/nginx/html/config.js
readOnly: true
subPath: config.js
volumes:
- name: config-volume
configMap:
name: cm-webpage-config
items: # convierte las entradas CM-data en archivos dentro del volumen.
- key: CONFIG_JS
path: config.js
| 20.057692 | 82 | 0.549377 |
73b5b7a01e32718db500ca4055ab067c3f910b59 | 269 | yaml | YAML | examples/manifests/service-lb-new-addr.yaml | davidwalter0/llb | aab1398736efad183b950b20bdf302fd1f20d2b4 | [
"Apache-2.0"
] | null | null | null | examples/manifests/service-lb-new-addr.yaml | davidwalter0/llb | aab1398736efad183b950b20bdf302fd1f20d2b4 | [
"Apache-2.0"
] | null | null | null | examples/manifests/service-lb-new-addr.yaml | davidwalter0/llb | aab1398736efad183b950b20bdf302fd1f20d2b4 | [
"Apache-2.0"
] | null | null | null | # ------------------------- Service ------------------------- #
---
apiVersion: v1
kind: Service
metadata:
name: echo5
labels:
app: echo
spec:
selector:
app: echo
ports:
- port: 8888
name: echo
loadBalancerIP: 192.168.0.228
type: LoadBalancer
| 15.823529 | 63 | 0.520446 |
73b5bbaa694d4c123c64c44c537ad51257ee8ce2 | 2,002 | yaml | YAML | Infrastructure/HelmCharts/MySQL5.7/templates/mysqld-configmap.yaml | izzyacademy/MassiveData-Course-Resources | c8a58225fa18fbde9250ca7cbbca22d97cbea56f | [
"Apache-2.0"
] | null | null | null | Infrastructure/HelmCharts/MySQL5.7/templates/mysqld-configmap.yaml | izzyacademy/MassiveData-Course-Resources | c8a58225fa18fbde9250ca7cbbca22d97cbea56f | [
"Apache-2.0"
] | null | null | null | Infrastructure/HelmCharts/MySQL5.7/templates/mysqld-configmap.yaml | izzyacademy/MassiveData-Course-Resources | c8a58225fa18fbde9250ca7cbbca22d97cbea56f | [
"Apache-2.0"
] | 1 | 2021-01-19T12:37:15.000Z | 2021-01-19T12:37:15.000Z | apiVersion: v1
kind: ConfigMap
metadata:
name: mysqld-config
namespace: "{{ .Values.infrastructure.namespace }}"
data:
mysqld.cnf: |-
# Mounted at /etc/mysql/mysql.conf.d/mysqld.cnf
[mysqld]
server_id = 3
pid-file = /var/run/mysqld/mysqld.pid
socket = /var/run/mysqld/mysqld.sock
datadir = /var/lib/mysql
#log-error = /var/log/mysql/error.log
# Disabling symbolic-links is recommended to prevent assorted security risks
symbolic-links=0
# The value of log_bin is the base name of the sequence of binlog files.
log_bin = mysql-bin
# The binlog-format must be set to ROW or row.
binlog_format = row
# The binlog_row_image must be set to FULL or full
binlog_row_image = full
# This is the number of days for automatic binlog file removal. The default is 0 which means no automatic removal.
expire_logs_days = 7
# Boolean which enables/disables support for including the original SQL statement in the binlog entry.
binlog_rows_query_log_events = on
# Whether updates received by a replica server from a replication source server should be logged to the replica's own binary log
log_slave_updates = on
# Boolean which specifies whether GTID mode of the MySQL server is enabled or not.
gtid_mode = on
# Boolean which instructs the server whether or not to enforce GTID consistency by allowing
# the execution of statements that can be logged in a transactionally safe manner; required when using GTIDs.
enforce_gtid_consistency = on
# The number of seconds the server waits for activity on an interactive connection before closing it.
interactive_timeout = 36000
# The number of seconds the server waits for activity on a noninteractive connection before closing it.
wait_timeout = 72000
# end of file
| 37.074074 | 133 | 0.672328 |
73b5f07ac592b79f001e8c3a4ce1e9dbdac0b740 | 734 | yaml | YAML | namespaces/live-1.cloud-platform.service.justice.gov.uk/pathfinder-preprod/00-namespace.yaml | digitalronin/cloud-platform-environments | b617fa089ee2a7dafc53602808326ae7d56fd6d9 | [
"MIT"
] | null | null | null | namespaces/live-1.cloud-platform.service.justice.gov.uk/pathfinder-preprod/00-namespace.yaml | digitalronin/cloud-platform-environments | b617fa089ee2a7dafc53602808326ae7d56fd6d9 | [
"MIT"
] | null | null | null | namespaces/live-1.cloud-platform.service.justice.gov.uk/pathfinder-preprod/00-namespace.yaml | digitalronin/cloud-platform-environments | b617fa089ee2a7dafc53602808326ae7d56fd6d9 | [
"MIT"
] | null | null | null | apiVersion: v1
kind: Namespace
metadata:
name: pathfinder-preprod
labels:
cloud-platform.justice.gov.uk/is-production: "false"
cloud-platform.justice.gov.uk/environment-name: "preprod"
annotations:
cloud-platform.justice.gov.uk/business-unit: "HMPPS"
cloud-platform.justice.gov.uk/application: "pathfinder"
cloud-platform.justice.gov.uk/owner: "Digital Prison Services: [email protected]"
cloud-platform.justice.gov.uk/source-code: "https://github.com/ministryofjustice/pathfinder.git"
cloud-platform.justice.gov.uk/slack-alert-channel: "dps_alerts_non_prod"
cloud-platform.justice.gov.uk/slack-channel: "pathfinder_comms"
cloud-platform.justice.gov.uk/team-name: "pathfinder"
| 45.875 | 100 | 0.765668 |
73b62ea9f1b637fbdd940ad4e18e53d3831cad26 | 163 | yaml | YAML | k8s/mysql/persistent-volume.yaml | Emerson-dev/laravel-docker | 0871dad19a3a8def1fef6638161ba79e945b7eed | [
"MIT"
] | null | null | null | k8s/mysql/persistent-volume.yaml | Emerson-dev/laravel-docker | 0871dad19a3a8def1fef6638161ba79e945b7eed | [
"MIT"
] | null | null | null | k8s/mysql/persistent-volume.yaml | Emerson-dev/laravel-docker | 0871dad19a3a8def1fef6638161ba79e945b7eed | [
"MIT"
] | null | null | null | apiVersion: v1
kind: PersistentVolumeClaim
metadata:
name: mysql-pv-claim
spec:
accessModes:
- ReadWriteOnce
resources:
requests:
storage: 10Gi | 16.3 | 27 | 0.717791 |
73b7400ed6a1e5eb3dd30f24d89a59a76b2a2f43 | 3,205 | yaml | YAML | advanced/pattern-2/apim-gw/wso2apim-gateway-deployment.yaml | vacorrea/k8sapim | 908c074dce333f6646419c7a5b8e26a235b018f4 | [
"Apache-2.0"
] | null | null | null | advanced/pattern-2/apim-gw/wso2apim-gateway-deployment.yaml | vacorrea/k8sapim | 908c074dce333f6646419c7a5b8e26a235b018f4 | [
"Apache-2.0"
] | null | null | null | advanced/pattern-2/apim-gw/wso2apim-gateway-deployment.yaml | vacorrea/k8sapim | 908c074dce333f6646419c7a5b8e26a235b018f4 | [
"Apache-2.0"
] | null | null | null | # Copyright (c) 2017, WSO2 Inc. (http://www.wso2.org) All Rights Reserved.
#
# Licensed under the Apache License, Version 2.0 (the "License");
# you may not use this file except in compliance with the License.
# You may obtain a copy of the License at
#
# http://www.apache.org/licenses/LICENSE-2.0
#
# Unless required by applicable law or agreed to in writing, software
# distributed under the License is distributed on an "AS IS" BASIS,
# WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
# See the License for the specific language governing permissions and
# limitations under the License.
apiVersion: apps/v1
kind: Deployment
metadata:
name: wso2apim-pattern-2-gateway-deployment
spec:
replicas: 1
strategy:
rollingUpdate:
maxSurge: 1
maxUnavailable: 0
type: RollingUpdate
selector:
matchLabels:
deployment: wso2apim-pattern-2-gateway
template:
metadata:
labels:
deployment: wso2apim-pattern-2-gateway
spec:
containers:
- name: wso2apim-gateway
image: wso2/wso2am:2.6.0
livenessProbe:
exec:
command:
- /bin/sh
- -c
- nc -z localhost 8243
initialDelaySeconds: 240
failureThreshold: 3
periodSeconds: 10
readinessProbe:
exec:
command:
- /bin/sh
- -c
- nc -z localhost 8243
initialDelaySeconds: 240
failureThreshold: 3
periodSeconds: 10
lifecycle:
preStop:
exec:
command: ['sh', '-c', '${WSO2_SERVER_HOME}/bin/wso2server.sh stop']
resources:
requests:
memory: 2Gi
cpu: 2000m
limits:
memory: 3Gi
cpu: 3000m
imagePullPolicy: Always
securityContext:
runAsUser: 802
ports:
-
containerPort: 8280
protocol: "TCP"
-
containerPort: 8243
protocol: "TCP"
-
containerPort: 9763
protocol: "TCP"
-
containerPort: 9443
protocol: "TCP"
volumeMounts:
- name: apim-storage-volume
mountPath: /home/wso2carbon/wso2am-2.6.0/repository/deployment/server
- name: apim-gateway-conf
mountPath: /home/wso2carbon/wso2-config-volume/repository/conf
- name: apim-gateway-conf-axis2
mountPath: /home/wso2carbon/wso2-config-volume/repository/conf/axis2
- name: apim-additional-artifact-storage-volume
mountPath: "/home/wso2carbon/wso2-artifact-volume"
serviceAccountName: "wso2svc-account"
volumes:
- name: apim-storage-volume
persistentVolumeClaim:
claimName: wso2apim-pattern-2-gateway-shared-server-volume-claim
- name: apim-additional-artifact-storage-volume
persistentVolumeClaim:
claimName: apim-additional-artifact-volume-claim
- name: apim-gateway-conf
configMap:
name: apim-gateway-conf
- name: apim-gateway-conf-axis2
configMap:
name: apim-gateway-conf-axis2
| 30.52381 | 82 | 0.602496 |
73b74c6ed08724875e228ff17dc098fda29de79a | 471 | yaml | YAML | k8sconfig/app-local/k8s-app.yaml | yohanswanepoel/django_skaffold | 9de2050ad342dfd9d49592754b0db57fb880f1e7 | [
"MIT"
] | null | null | null | k8sconfig/app-local/k8s-app.yaml | yohanswanepoel/django_skaffold | 9de2050ad342dfd9d49592754b0db57fb880f1e7 | [
"MIT"
] | 5 | 2020-06-03T08:38:32.000Z | 2022-02-10T08:19:39.000Z | k8sconfig/app-local/k8s-app.yaml | yohanswanepoel/django_skaffold | 9de2050ad342dfd9d49592754b0db57fb880f1e7 | [
"MIT"
] | null | null | null | apiVersion: apps/v1
kind: Deployment
metadata:
name: skaffold-demo
spec:
replicas: 1
selector:
matchLabels:
app: skaffold-demo
template:
metadata:
labels:
app: skaffold-demo
spec:
restartPolicy: Always
containers:
- name: skaffold-demo
image: johan/skaffold-demo
ports:
- containerPort: 8000
resources:
limits:
memory: "128Mi"
cpu: "250m" | 18.84 | 34 | 0.56051 |
73b75c1f48511c84c400e2ff4e177dd3cb75528e | 1,717 | yaml | YAML | assets/kube-state-metrics/cluster-role.yaml | matthyx/cluster-monitoring-operator | 728bb3530a6629caabdd0cbd84ba80941641098f | [
"Apache-2.0"
] | 199 | 2018-04-12T07:44:24.000Z | 2022-02-23T11:05:42.000Z | assets/kube-state-metrics/cluster-role.yaml | matthyx/cluster-monitoring-operator | 728bb3530a6629caabdd0cbd84ba80941641098f | [
"Apache-2.0"
] | 1,615 | 2018-04-12T15:58:53.000Z | 2022-03-31T23:26:08.000Z | assets/kube-state-metrics/cluster-role.yaml | matthyx/cluster-monitoring-operator | 728bb3530a6629caabdd0cbd84ba80941641098f | [
"Apache-2.0"
] | 306 | 2018-04-12T15:56:14.000Z | 2022-03-29T17:20:27.000Z | apiVersion: rbac.authorization.k8s.io/v1
kind: ClusterRole
metadata:
labels:
app.kubernetes.io/component: exporter
app.kubernetes.io/name: kube-state-metrics
app.kubernetes.io/part-of: openshift-monitoring
app.kubernetes.io/version: 2.3.0
name: kube-state-metrics
rules:
- apiGroups:
- ""
resources:
- configmaps
- secrets
- nodes
- pods
- services
- resourcequotas
- replicationcontrollers
- limitranges
- persistentvolumeclaims
- persistentvolumes
- namespaces
- endpoints
verbs:
- list
- watch
- apiGroups:
- apps
resources:
- statefulsets
- daemonsets
- deployments
- replicasets
verbs:
- list
- watch
- apiGroups:
- batch
resources:
- cronjobs
- jobs
verbs:
- list
- watch
- apiGroups:
- autoscaling
resources:
- horizontalpodautoscalers
verbs:
- list
- watch
- apiGroups:
- authentication.k8s.io
resources:
- tokenreviews
verbs:
- create
- apiGroups:
- authorization.k8s.io
resources:
- subjectaccessreviews
verbs:
- create
- apiGroups:
- policy
resources:
- poddisruptionbudgets
verbs:
- list
- watch
- apiGroups:
- certificates.k8s.io
resources:
- certificatesigningrequests
verbs:
- list
- watch
- apiGroups:
- storage.k8s.io
resources:
- storageclasses
- volumeattachments
verbs:
- list
- watch
- apiGroups:
- admissionregistration.k8s.io
resources:
- mutatingwebhookconfigurations
- validatingwebhookconfigurations
verbs:
- list
- watch
- apiGroups:
- networking.k8s.io
resources:
- networkpolicies
- ingresses
verbs:
- list
- watch
- apiGroups:
- coordination.k8s.io
resources:
- leases
verbs:
- list
- watch
| 15.468468 | 51 | 0.679091 |
73b7eed7203e0809f53c3694152e6035d56d02cf | 166 | yaml | YAML | build/automation/lib/k8s/template/deployment/stacks/stack/base/template/namespace.yaml | nhsd-exeter/make-devops | 6b3f50e3bee40482f62529f3a915bd241c326e2f | [
"MIT"
] | 5 | 2020-10-03T09:31:46.000Z | 2022-03-04T10:29:53.000Z | build/automation/lib/k8s/template/deployment/stacks/stack/base/template/namespace.yaml | nhsd-exeter/make-devops | 6b3f50e3bee40482f62529f3a915bd241c326e2f | [
"MIT"
] | 34 | 2021-03-30T13:42:20.000Z | 2022-03-05T08:36:22.000Z | build/automation/lib/k8s/template/deployment/stacks/stack/base/template/namespace.yaml | nhsd-exeter/make-devops | 6b3f50e3bee40482f62529f3a915bd241c326e2f | [
"MIT"
] | 2 | 2020-09-21T10:44:50.000Z | 2020-11-10T16:36:20.000Z | apiVersion: v1
kind: Namespace
metadata:
name: K8S_APP_NAMESPACE_TO_REPLACE
labels:
ttl: K8S_TTL_TO_REPLACE
project-group: PROJECT_GROUP_SHORT_TO_REPLACE
| 20.75 | 49 | 0.807229 |
73b8014389279e84d92dbdf21566954c4b27f5fd | 475 | yaml | YAML | namespaces/live-1.cloud-platform.service.justice.gov.uk/formbuilder-platform-test-production/user-datastore-service-account.yaml | martyn-w/cloud-platform-environments | 784924e37ebb6e2c074f88bf8fbb4eb7bdf3d634 | [
"MIT"
] | 28 | 2018-07-13T15:02:24.000Z | 2022-03-17T09:23:54.000Z | namespaces/live-1.cloud-platform.service.justice.gov.uk/formbuilder-platform-test-production/user-datastore-service-account.yaml | martyn-w/cloud-platform-environments | 784924e37ebb6e2c074f88bf8fbb4eb7bdf3d634 | [
"MIT"
] | 963 | 2018-05-30T15:46:06.000Z | 2022-03-30T10:06:39.000Z | namespaces/live-1.cloud-platform.service.justice.gov.uk/formbuilder-platform-test-production/user-datastore-service-account.yaml | martyn-w/cloud-platform-environments | 784924e37ebb6e2c074f88bf8fbb4eb7bdf3d634 | [
"MIT"
] | 29 | 2018-12-04T09:37:36.000Z | 2022-02-25T10:35:34.000Z | ---
# Source: formbuilder-platform/templates/user-datastore-service-account.yaml
# auto-generated from fb-cloud-platforms-environments
# We need to run the user datastore as a distinct service account
# so that it can be granted access to read the service token secrets
# from the formbuilder-services-test-production namespace
apiVersion: v1
kind: ServiceAccount
metadata:
name: formbuilder-user-datastore-test-production
namespace: formbuilder-platform-test-production
| 39.583333 | 76 | 0.814737 |
73b807ea9283ab7ae93e0a66a8e995c2d5311eb2 | 228 | yaml | YAML | kubernetes/meetup-svc.yaml | ipedrazas/hashicorp-meetup3 | 17c893c1693bd43a3ad4380d2f5316e4b2c06c4d | [
"MIT"
] | 1 | 2016-06-06T18:43:42.000Z | 2016-06-06T18:43:42.000Z | kubernetes/meetup-svc.yaml | ipedrazas/hashicorp-meetup3 | 17c893c1693bd43a3ad4380d2f5316e4b2c06c4d | [
"MIT"
] | null | null | null | kubernetes/meetup-svc.yaml | ipedrazas/hashicorp-meetup3 | 17c893c1693bd43a3ad4380d2f5316e4b2c06c4d | [
"MIT"
] | 1 | 2016-05-19T19:20:30.000Z | 2016-05-19T19:20:30.000Z | apiVersion: v1
kind: Service
metadata:
name: meetup
labels:
name: meetup
spec:
type: LoadBalancer
ports:
- port: 5000
targetPort: 5000
nodePort: 30009
protocol: TCP
selector:
name: meetup
| 14.25 | 22 | 0.640351 |
73b83d6ba378e902781710bfe5c4a1e6bee1debd | 219 | yaml | YAML | vendor/k8s.io/kubernetes/hack/testdata/filter/pod-apply-selector.yaml | sharang-d/kops | 35cf4a352e2e115714f3d28fbda81feec2ae8a4e | [
"Apache-2.0"
] | 220 | 2017-01-07T14:32:15.000Z | 2022-02-22T08:56:16.000Z | hack/testdata/filter/pod-apply-selector.yaml | FairwindsOps/kubernetes | 8a5fa5f74f9577319178c25b54b09d37e9c6d998 | [
"Apache-2.0"
] | 455 | 2015-07-28T11:14:25.000Z | 2018-06-20T14:10:35.000Z | hack/testdata/filter/pod-apply-selector.yaml | FairwindsOps/kubernetes | 8a5fa5f74f9577319178c25b54b09d37e9c6d998 | [
"Apache-2.0"
] | 90 | 2015-08-26T15:52:13.000Z | 2021-05-19T12:19:34.000Z | apiVersion: v1
kind: Pod
metadata:
name: selector-test-pod
labels:
name: selector-test-pod
unique-label: bingbang
spec:
containers:
- name: kubernetes-pause
image: gcr.io/google-containers/pause:2.0
| 18.25 | 45 | 0.712329 |
73b8587d3c42b1f3662346cf761309e34546b7e7 | 288 | yml | YAML | k8s/TechTalksProducer/producer-service.yml | pablogularte/PracticoSonarCube | 87493bcd5653018a70a23ac49fc4f2aa3b612f19 | [
"MIT"
] | 21 | 2019-08-10T04:50:48.000Z | 2021-12-12T20:18:48.000Z | k8s/TechTalksProducer/producer-service.yml | pablogularte/PracticoSonarCube | 87493bcd5653018a70a23ac49fc4f2aa3b612f19 | [
"MIT"
] | 46 | 2019-12-24T08:01:27.000Z | 2022-03-15T21:28:59.000Z | k8s/TechTalksProducer/producer-service.yml | pablogularte/PracticoSonarCube | 87493bcd5653018a70a23ac49fc4f2aa3b612f19 | [
"MIT"
] | 24 | 2019-08-27T12:42:42.000Z | 2022-03-29T22:05:52.000Z | apiVersion: v1
kind: Service
metadata:
name: rabbitmq-producer-service
labels:
run: rabbitmq-producer
spec:
type: LoadBalancer
# type: ClusterIP
ports:
- port: 80
targetPort: 80
name: http-port
protocol: TCP
selector:
run: rabbitmq-producer
| 16 | 33 | 0.65625 |
73b8744efd573cc9cbdf1ae173c05f8118190ee1 | 255 | yaml | YAML | clusters/aws-dev-mgmt2/flux/cluster-apps/podinfo-group-helmrelease-values.yaml | ruzickap/k8s-tf-eks-argocd | f50da597e13bce5b053a217a3222f9c33f2d52e7 | [
"Apache-2.0"
] | 2 | 2022-01-17T21:52:29.000Z | 2022-01-31T08:34:49.000Z | clusters/aws-dev-mgmt2/flux/cluster-apps/podinfo-group-helmrelease-values.yaml | ruzickap/k8s-tf-eks-argocd | f50da597e13bce5b053a217a3222f9c33f2d52e7 | [
"Apache-2.0"
] | 10 | 2022-01-30T21:29:08.000Z | 2022-03-25T21:14:05.000Z | clusters/aws-dev-mgmt2/flux/cluster-apps/podinfo-group-helmrelease-values.yaml | ruzickap/k8s-tf-eks-argocd | f50da597e13bce5b053a217a3222f9c33f2d52e7 | [
"Apache-2.0"
] | null | null | null | apiVersion: v1
kind: ConfigMap
metadata:
name: podinfo-group-helmrelease-values
namespace: podinfo
data:
values.yaml: |
ui:
color: "#34577c"
message: "group-helmrelease-values"
ingress:
enabled: true
className: nginx
| 18.214286 | 41 | 0.666667 |
73b88f4235d9fe635c2b16933398d4e0abe3df6a | 17,579 | yaml | YAML | resources/application-connector/charts/application-registry/templates/dashboard-configmap.yaml | Abd4llA/kyma | 4b9d4fe82d550c92eb242b8eed0e5361c3cd8c4f | [
"Apache-2.0"
] | 1 | 2019-11-08T13:39:08.000Z | 2019-11-08T13:39:08.000Z | resources/application-connector/charts/application-registry/templates/dashboard-configmap.yaml | Abd4llA/kyma | 4b9d4fe82d550c92eb242b8eed0e5361c3cd8c4f | [
"Apache-2.0"
] | null | null | null | resources/application-connector/charts/application-registry/templates/dashboard-configmap.yaml | Abd4llA/kyma | 4b9d4fe82d550c92eb242b8eed0e5361c3cd8c4f | [
"Apache-2.0"
] | 1 | 2020-11-04T04:20:42.000Z | 2020-11-04T04:20:42.000Z | apiVersion: v1
kind: ConfigMap
metadata:
name: application-registry-dashboard
labels:
grafana_dashboard: "1"
app: monitoring-grafana
data:
application-registry-dashboard.json: |-
{
"annotations": {
"list": [
{
"builtIn": 1,
"datasource": "-- Grafana --",
"enable": true,
"hide": true,
"iconColor": "rgba(0, 211, 255, 1)",
"name": "Annotations & Alerts",
"type": "dashboard"
}
]
},
"editable": true,
"gnetId": null,
"graphTooltip": 0,
"iteration": 1534500781495,
"links": [],
"panels": [
{
"collapsed": false,
"gridPos": {
"h": 1,
"w": 24,
"x": 0,
"y": 0
},
"id": 18,
"panels": [],
"title": "Resources and Replicas",
"type": "row"
},
{
"cacheTimeout": null,
"colorBackground": false,
"colorValue": false,
"colors": [
"#299c46",
"rgba(237, 129, 40, 0.89)",
"#d44a3a"
],
"datasource": "Prometheus",
"format": "none",
"gauge": {
"maxValue": 100,
"minValue": 0,
"show": false,
"thresholdLabels": false,
"thresholdMarkers": true
},
"gridPos": {
"h": 9,
"w": 8,
"x": 0,
"y": 1
},
"id": 20,
"interval": null,
"links": [],
"mappingType": 1,
"mappingTypes": [
{
"name": "value to text",
"value": 1
},
{
"name": "range to text",
"value": 2
}
],
"maxDataPoints": 100,
"nullPointMode": "connected",
"nullText": null,
"postfix": " cores",
"postfixFontSize": "50%",
"prefix": "",
"prefixFontSize": "50%",
"rangeMaps": [
{
"from": "null",
"text": "N/A",
"to": "null"
}
],
"sparkline": {
"fillColor": "rgba(31, 118, 189, 0.18)",
"full": false,
"lineColor": "rgb(31, 120, 193)",
"show": true
},
"tableColumn": "",
"targets": [
{
"expr": "sum(rate(container_cpu_usage_seconds_total{namespace=\"kyma-integration\",pod_name=~\"application-registry.*\"}[3m]))",
"format": "time_series",
"intervalFactor": 2,
"refId": "A"
}
],
"thresholds": "",
"title": "CPU",
"type": "singlestat",
"valueFontSize": "80%",
"valueMaps": [
{
"op": "=",
"text": "N/A",
"value": "null"
}
],
"valueName": "avg"
},
{
"cacheTimeout": null,
"colorBackground": false,
"colorValue": false,
"colors": [
"#299c46",
"rgba(237, 129, 40, 0.89)",
"#d44a3a"
],
"datasource": "Prometheus",
"format": "none",
"gauge": {
"maxValue": 100,
"minValue": 0,
"show": false,
"thresholdLabels": false,
"thresholdMarkers": true
},
"gridPos": {
"h": 9,
"w": 8,
"x": 8,
"y": 1
},
"id": 22,
"interval": null,
"links": [],
"mappingType": 1,
"mappingTypes": [
{
"name": "value to text",
"value": 1
},
{
"name": "range to text",
"value": 2
}
],
"maxDataPoints": 100,
"nullPointMode": "connected",
"nullText": null,
"postfix": " GB",
"postfixFontSize": "50%",
"prefix": "",
"prefixFontSize": "50%",
"rangeMaps": [
{
"from": "null",
"text": "N/A",
"to": "null"
}
],
"sparkline": {
"fillColor": "rgba(31, 118, 189, 0.18)",
"full": false,
"lineColor": "rgb(31, 120, 193)",
"show": true
},
"tableColumn": "",
"targets": [
{
"expr": "sum(container_memory_usage_bytes{namespace=\"kyma-integration\",pod_name=~\"application-registry.*\"}) / 1024^3",
"format": "time_series",
"intervalFactor": 1,
"refId": "A"
}
],
"thresholds": "",
"title": "Memory",
"type": "singlestat",
"valueFontSize": "80%",
"valueMaps": [
{
"op": "=",
"text": "N/A",
"value": "null"
}
],
"valueName": "avg"
},
{
"cacheTimeout": null,
"colorBackground": false,
"colorValue": false,
"colors": [
"#299c46",
"rgba(237, 129, 40, 0.89)",
"#d44a3a"
],
"datasource": "Prometheus",
"format": "Bps",
"gauge": {
"maxValue": 100,
"minValue": 0,
"show": false,
"thresholdLabels": false,
"thresholdMarkers": true
},
"gridPos": {
"h": 9,
"w": 8,
"x": 16,
"y": 1
},
"id": 24,
"interval": null,
"links": [],
"mappingType": 1,
"mappingTypes": [
{
"name": "value to text",
"value": 1
},
{
"name": "range to text",
"value": 2
}
],
"maxDataPoints": 100,
"nullPointMode": "connected",
"nullText": null,
"postfix": "",
"postfixFontSize": "50%",
"prefix": "",
"prefixFontSize": "50%",
"rangeMaps": [
{
"from": "null",
"text": "N/A",
"to": "null"
}
],
"sparkline": {
"fillColor": "rgba(31, 118, 189, 0.18)",
"full": false,
"lineColor": "rgb(31, 120, 193)",
"show": true
},
"tableColumn": "",
"targets": [
{
"expr": "sum(rate(container_network_transmit_bytes_total{namespace=\"kyma-integration\",pod_name=~\"application-registry.*\"}[3m])) + sum(rate(container_network_receive_bytes_total{namespace=\"kyma-integration\",pod_name=~\"application-registry.*\"}[3m]))",
"format": "time_series",
"intervalFactor": 2,
"refId": "A"
}
],
"thresholds": "",
"title": "Network",
"type": "singlestat",
"valueFontSize": "80%",
"valueMaps": [
{
"op": "=",
"text": "N/A",
"value": "null"
}
],
"valueName": "avg"
},
{
"aliasColors": {},
"bars": false,
"dashLength": 10,
"dashes": false,
"datasource": "Prometheus",
"fill": 1,
"gridPos": {
"h": 9,
"w": 24,
"x": 0,
"y": 10
},
"id": 8,
"legend": {
"avg": false,
"current": false,
"max": false,
"min": false,
"show": true,
"total": false,
"values": false
},
"lines": true,
"linewidth": 1,
"links": [],
"nullPointMode": "null",
"percentage": false,
"pointradius": 5,
"points": false,
"renderer": "flot",
"seriesOverrides": [],
"spaceLength": 10,
"stack": false,
"steppedLine": false,
"targets": [
{
"expr": "max(kube_deployment_status_replicas{deployment=\"application-registry\",namespace=\"kyma-integration\"}) without (instance, pod)",
"format": "time_series",
"intervalFactor": 2,
"legendFormat": "current replicas",
"refId": "A"
},
{
"expr": "min(kube_deployment_status_replicas_available{deployment=\"application-registry\",namespace=\"kyma-integration\"}) without (instance, pod)",
"format": "time_series",
"intervalFactor": 2,
"legendFormat": "available",
"refId": "B"
},
{
"expr": "max(kube_deployment_status_replicas_unavailable{deployment=\"application-registry\",namespace=\"kyma-integration\"}) without (instance, pod)",
"format": "time_series",
"intervalFactor": 2,
"legendFormat": "unavailable",
"refId": "C"
},
{
"expr": "min(kube_deployment_status_replicas_updated{deployment=\"application-registry\",namespace=\"kyma-integration\"}) without (instance, pod)",
"format": "time_series",
"intervalFactor": 2,
"legendFormat": "updated",
"refId": "D"
},
{
"expr": "max(kube_deployment_spec_replicas{deployment=\"application-registry\",namespace=\"kyma-integration\"}) without (instance, pod)",
"format": "time_series",
"intervalFactor": 2,
"legendFormat": "desired",
"refId": "E"
}
],
"thresholds": [],
"timeFrom": null,
"timeShift": null,
"title": "Replicas",
"tooltip": {
"shared": true,
"sort": 0,
"value_type": "individual"
},
"type": "graph",
"xaxis": {
"buckets": null,
"mode": "time",
"name": null,
"show": true,
"values": []
},
"yaxes": [
{
"format": "short",
"label": null,
"logBase": 1,
"max": null,
"min": null,
"show": true
},
{
"format": "short",
"label": null,
"logBase": 1,
"max": null,
"min": null,
"show": false
}
],
"yaxis": {
"align": false,
"alignLevel": null
}
},
{
"collapsed": false,
"gridPos": {
"h": 1,
"w": 24,
"x": 0,
"y": 19
},
"id": 16,
"panels": [],
"title": "Request Duration",
"type": "row"
},
{
"aliasColors": {},
"bars": false,
"dashLength": 10,
"dashes": false,
"datasource": "Prometheus",
"fill": 1,
"gridPos": {
"h": 9,
"w": 24,
"x": 0,
"y": 20
},
"id": 10,
"legend": {
"avg": false,
"current": false,
"max": false,
"min": false,
"show": true,
"total": false,
"values": false
},
"lines": true,
"linewidth": 1,
"links": [],
"nullPointMode": "null",
"percentage": false,
"pointradius": 5,
"points": false,
"renderer": "flot",
"seriesOverrides": [],
"spaceLength": 10,
"stack": false,
"steppedLine": false,
"targets": [
{
"expr": "application_registry_endpoints_duration{exported_endpoint=~\"$endpoint\", quantile=\"0.995\"}",
"format": "time_series",
"intervalFactor": 1,
"legendFormat": "{{`{{ exported_endpoint}}`}}",
"refId": "A"
}
],
"thresholds": [],
"timeFrom": "5h",
"timeShift": null,
"title": "99.5%ile of request duration",
"tooltip": {
"shared": true,
"sort": 0,
"value_type": "individual"
},
"type": "graph",
"xaxis": {
"buckets": null,
"mode": "time",
"name": null,
"show": true,
"values": []
},
"yaxes": [
{
"format": "s",
"label": null,
"logBase": 1,
"max": null,
"min": null,
"show": true
},
{
"format": "short",
"label": null,
"logBase": 1,
"max": null,
"min": null,
"show": false
}
],
"yaxis": {
"align": false,
"alignLevel": null
}
},
{
"collapsed": false,
"gridPos": {
"h": 1,
"w": 24,
"x": 0,
"y": 29
},
"id": 14,
"panels": [],
"title": "Response Codes",
"type": "row"
},
{
"aliasColors": {},
"bars": false,
"dashLength": 10,
"dashes": false,
"datasource": "Prometheus",
"fill": 1,
"gridPos": {
"h": 9,
"w": 24,
"x": 0,
"y": 30
},
"id": 12,
"legend": {
"avg": false,
"current": false,
"max": false,
"min": false,
"show": true,
"total": false,
"values": false
},
"lines": true,
"linewidth": 1,
"links": [],
"nullPointMode": "null",
"percentage": false,
"pointradius": 5,
"points": false,
"renderer": "flot",
"seriesOverrides": [],
"spaceLength": 10,
"stack": false,
"steppedLine": false,
"targets": [
{
"expr": "increase(application_registry_endpoints_responses{exported_endpoint=~\"$endpoint\"}[10m])",
"format": "time_series",
"intervalFactor": 1,
"legendFormat": "{{`{{exported_endpoint}}`}} {{`{{status}}`}}",
"refId": "A"
}
],
"thresholds": [],
"timeFrom": "5h",
"timeShift": null,
"title": "Codes: $endpoint",
"tooltip": {
"shared": true,
"sort": 0,
"value_type": "individual"
},
"type": "graph",
"xaxis": {
"buckets": null,
"mode": "time",
"name": null,
"show": true,
"values": []
},
"yaxes": [
{
"format": "none",
"label": null,
"logBase": 1,
"max": null,
"min": null,
"show": true
},
{
"format": "short",
"label": null,
"logBase": 1,
"max": null,
"min": null,
"show": false
}
],
"yaxis": {
"align": false,
"alignLevel": null
}
}
],
"schemaVersion": 16,
"style": "dark",
"tags": [
"kyma"
],
"templating": {
"list": [
{
"allValue": null,
"current": {
"isNone": true,
"selected": false,
"text": "None",
"value": ""
},
"datasource": "Prometheus",
"hide": 0,
"includeAll": false,
"label": null,
"multi": true,
"name": "endpoint",
"options": [],
"query": "label_values(application_registry_endpoints_duration ,exported_endpoint)",
"refresh": 1,
"regex": "",
"sort": 0,
"tagValuesQuery": "",
"tags": [],
"tagsQuery": "",
"type": "query",
"useTags": false
}
]
},
"time": {
"from": "now-2h",
"to": "now"
},
"timepicker": {
"refresh_intervals": [
"5s",
"10s",
"30s",
"1m",
"5m",
"15m",
"30m",
"1h",
"2h",
"1d"
],
"time_options": [
"5m",
"15m",
"1h",
"6h",
"12h",
"24h",
"2d",
"7d",
"30d"
]
},
"timezone": "",
"title": "Kyma / Application Connector / Application Registry",
"uid": "24yXN4tmk",
"version": 1
}
| 26.715805 | 271 | 0.356391 |
73b8b2c98e1cf9b827e7ea6731271a15c50cc7d4 | 202 | yaml | YAML | K8s/descriptors/shipping-service.yaml | dbennerIBM/microservices-robot-shop | 1660d788edb0c36f0884130fd45e3348a2994c31 | [
"Apache-2.0"
] | null | null | null | K8s/descriptors/shipping-service.yaml | dbennerIBM/microservices-robot-shop | 1660d788edb0c36f0884130fd45e3348a2994c31 | [
"Apache-2.0"
] | null | null | null | K8s/descriptors/shipping-service.yaml | dbennerIBM/microservices-robot-shop | 1660d788edb0c36f0884130fd45e3348a2994c31 | [
"Apache-2.0"
] | null | null | null | apiVersion: v1
kind: Service
metadata:
name: shipping
spec:
type: NodePort
selector:
app: shipping
ports:
- port: 31008
nodePort: 31008
targetPort: shipping-port
protocol: TCP
| 14.428571 | 29 | 0.683168 |
73b8b519ec8881783769cc1ab2ae5c797dc54828 | 323 | yaml | YAML | bindata/oauth-apiserver/RBAC/useroauthaccesstokens_clusterrole.yaml | arjunrn/cluster-authentication-operator | 260cb3edc2491cc9fd13c5f6098c4d6928f93f89 | [
"Apache-2.0"
] | 36 | 2019-02-20T19:51:56.000Z | 2022-01-20T09:51:15.000Z | bindata/oauth-apiserver/RBAC/useroauthaccesstokens_clusterrole.yaml | arjunrn/cluster-authentication-operator | 260cb3edc2491cc9fd13c5f6098c4d6928f93f89 | [
"Apache-2.0"
] | 537 | 2019-01-17T17:16:45.000Z | 2022-03-31T21:13:23.000Z | bindata/oauth-apiserver/RBAC/useroauthaccesstokens_clusterrole.yaml | arjunrn/cluster-authentication-operator | 260cb3edc2491cc9fd13c5f6098c4d6928f93f89 | [
"Apache-2.0"
] | 76 | 2019-01-29T17:38:58.000Z | 2022-03-09T12:43:45.000Z | apiVersion: rbac.authorization.k8s.io/v1
kind: ClusterRole
metadata:
annotations:
rbac.authorization.kubernetes.io/autoupdate: "true"
name: system:openshift:useroauthaccesstoken-manager
rules:
- apiGroups:
- oauth.openshift.io
resources:
- useroauthaccesstokens
verbs:
- get
- list
- watch
- delete
| 19 | 55 | 0.743034 |
73b8be8848131870b19bae77fdb5152daa408c0d | 613 | yaml | YAML | config-root/cluster/resources/jx-observability/promtail/promtail-clusterrole.yaml | dockerpac/x3-cluster-lenscicd | 893c894c79ea533382c695576a9a27b96d9da3c6 | [
"Apache-2.0"
] | null | null | null | config-root/cluster/resources/jx-observability/promtail/promtail-clusterrole.yaml | dockerpac/x3-cluster-lenscicd | 893c894c79ea533382c695576a9a27b96d9da3c6 | [
"Apache-2.0"
] | 27 | 2021-11-14T21:19:56.000Z | 2021-11-15T13:27:51.000Z | config-root/cluster/resources/jx-observability/promtail/promtail-clusterrole.yaml | dockerpac/jx3-cluster-lenscicd | 893c894c79ea533382c695576a9a27b96d9da3c6 | [
"Apache-2.0"
] | 1 | 2022-03-23T04:21:27.000Z | 2022-03-23T04:21:27.000Z | # Source: promtail/templates/clusterrole.yaml
kind: ClusterRole
apiVersion: rbac.authorization.k8s.io/v1
metadata:
name: promtail
labels:
helm.sh/chart: promtail-3.5.0
app.kubernetes.io/name: promtail
app.kubernetes.io/instance: promtail
app.kubernetes.io/version: "2.2.0"
app.kubernetes.io/managed-by: Helm
gitops.jenkins-x.io/pipeline: 'cluster'
annotations:
meta.helm.sh/release-name: 'promtail'
rules:
- apiGroups:
- ""
resources:
- nodes
- nodes/proxy
- services
- endpoints
- pods
verbs:
- get
- watch
- list
| 21.892857 | 45 | 0.641109 |
73b911d0f86acb6c3a961145d2ba96a4a133907e | 150 | yaml | YAML | k8s_api_client/resources/service.yaml | kontera-technologies/kong-opa | ba374461e9f51cd546a1a83b92c097ea230c7bf7 | [
"Apache-2.0"
] | 238 | 2017-04-27T20:53:16.000Z | 2022-03-29T15:27:58.000Z | k8s_api_client/resources/service.yaml | kontera-technologies/kong-opa | ba374461e9f51cd546a1a83b92c097ea230c7bf7 | [
"Apache-2.0"
] | 88 | 2017-04-26T02:58:57.000Z | 2022-03-30T20:05:25.000Z | k8s_api_client/resources/service.yaml | kontera-technologies/kong-opa | ba374461e9f51cd546a1a83b92c097ea230c7bf7 | [
"Apache-2.0"
] | 152 | 2017-04-27T18:28:25.000Z | 2022-03-30T21:44:24.000Z | kind: Service
apiVersion: v1
metadata:
name: opa-kubernetes-api-client
spec:
selector:
app: opa-kubernetes-api-client
ports:
- port: 8181
| 15 | 34 | 0.713333 |
73b93d015a7fc342268ae1e4eb37c4348cb2faf4 | 233 | yaml | YAML | kubernetes/deploy/kube-prometheus/monitoring-demo/calico/service.yaml | aloy-nora/lnmp | 52e33d6424d7fdf619a4717a9561f56a9a8e1751 | [
"Apache-2.0"
] | 512 | 2017-09-22T16:20:15.000Z | 2022-03-31T05:24:21.000Z | kubernetes/deploy/kube-prometheus/monitoring-demo/calico/service.yaml | aloy-nora/lnmp | 52e33d6424d7fdf619a4717a9561f56a9a8e1751 | [
"Apache-2.0"
] | 863 | 2017-09-12T00:52:03.000Z | 2022-02-12T07:37:17.000Z | kubernetes/deploy/kube-prometheus/monitoring-demo/calico/service.yaml | aloy-nora/lnmp | 52e33d6424d7fdf619a4717a9561f56a9a8e1751 | [
"Apache-2.0"
] | 127 | 2017-10-13T17:38:10.000Z | 2022-03-19T04:55:46.000Z | apiVersion: v1
kind: Service
metadata:
name: felix-metrics-svc
namespace: kube-system
labels:
app: calico-felix
spec:
selector:
k8s-app: calico-node
ports:
- port: 9091
name: metrics-http
targetPort: 9091
| 15.533333 | 25 | 0.682403 |
73b94ba734a441e6ac24439d9909c0920707f32e | 1,209 | yaml | YAML | acumosk8s-public-cloud/azure/HELM/k8-elk-chart/templates/elasticsearch/service.yaml | borisbaldassari/system-integration | 38933e7adad7d61b7f3af9b34c7a2b7c37c96177 | [
"Apache-2.0"
] | 4 | 2018-04-13T15:19:24.000Z | 2021-03-09T13:00:23.000Z | acumosk8s-public-cloud/azure/HELM/k8-elk-chart/templates/elasticsearch/service.yaml | Talbot3/integration-acumos | 66e4ec6176a50dc0bd3e65e4640e90699e4bd9c3 | [
"ECL-2.0",
"Apache-2.0"
] | 1 | 2021-06-28T12:06:21.000Z | 2021-08-13T06:56:09.000Z | acumosk8s-public-cloud/azure/HELM/k8-elk-chart/templates/elasticsearch/service.yaml | Talbot3/integration-acumos | 66e4ec6176a50dc0bd3e65e4640e90699e4bd9c3 | [
"ECL-2.0",
"Apache-2.0"
] | 13 | 2018-10-04T14:08:35.000Z | 2021-05-05T13:06:39.000Z | # ===============LICENSE_START=======================================================
# Acumos Apache-2.0
# ===================================================================================
# Copyright (C) 2019 AT&T Intellectual Property & Tech Mahindra. All rights reserved.
# ===================================================================================
# This Acumos software file is distributed by AT&T and Tech Mahindra
# under the Apache License, Version 2.0 (the "License");
# you may not use this file except in compliance with the License.
# You may obtain a copy of the License at
#
# http://www.apache.org/licenses/LICENSE-2.0
#
# This file is distributed on an "AS IS" BASIS,
# WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
# See the License for the specific language governing permissions and
# limitations under the License.
# ===============LICENSE_END=========================================================
apiVersion: v1
kind: Service
metadata:
name: elasticsearch
namespace: "{{ .Values.namespace }}"
labels:
app: elasticsearch
spec:
ports:
- name: elasticsearch
port: 9200
targetPort: 9200
selector:
app: elasticsearch
| 37.78125 | 85 | 0.545079 |
73b953de44a53baf5ccb0aed43fec56ad1563435 | 30,126 | yaml | YAML | operators/multiclusterobservability/manifests/base/grafana/dash-k8s-compute-resources-node-pods.yaml | openshift-cherrypick-robot/multicluster-observability-operator | 52a134e7267be3b712654be7cfcf52f43b0ad517 | [
"Apache-2.0"
] | null | null | null | operators/multiclusterobservability/manifests/base/grafana/dash-k8s-compute-resources-node-pods.yaml | openshift-cherrypick-robot/multicluster-observability-operator | 52a134e7267be3b712654be7cfcf52f43b0ad517 | [
"Apache-2.0"
] | null | null | null | operators/multiclusterobservability/manifests/base/grafana/dash-k8s-compute-resources-node-pods.yaml | openshift-cherrypick-robot/multicluster-observability-operator | 52a134e7267be3b712654be7cfcf52f43b0ad517 | [
"Apache-2.0"
] | null | null | null | apiVersion: v1
data:
k8s-compute-resources-node-pods.json: |-
{
"annotations": {
"list": [
{
"builtIn": 1,
"datasource": "-- Grafana --",
"enable": true,
"hide": true,
"iconColor": "rgba(0, 211, 255, 1)",
"name": "Annotations & Alerts",
"type": "dashboard"
}
]
},
"description": "prometheus operator ",
"editable": true,
"gnetId": 12119,
"graphTooltip": 0,
"id": 7,
"iteration": 1619465861537,
"links": [],
"panels": [
{
"collapsed": false,
"datasource": "$datasource",
"gridPos": {
"h": 1,
"w": 24,
"x": 0,
"y": 0
},
"id": 5,
"panels": [],
"repeat": null,
"title": "CPU Usage",
"type": "row"
},
{
"aliasColors": {},
"bars": false,
"dashLength": 10,
"dashes": false,
"datasource": "$datasource",
"fieldConfig": {
"defaults": {
"custom": {},
"links": []
},
"overrides": []
},
"fill": 10,
"fillGradient": 0,
"gridPos": {
"h": 7,
"w": 24,
"x": 0,
"y": 1
},
"hiddenSeries": false,
"id": 1,
"interval": "",
"legend": {
"avg": false,
"current": false,
"max": false,
"min": false,
"show": true,
"total": false,
"values": false
},
"lines": true,
"linewidth": 0,
"links": [],
"nullPointMode": "null as zero",
"options": {
"alertThreshold": true
},
"percentage": false,
"pluginVersion": "7.4.2",
"pointradius": 5,
"points": false,
"renderer": "flot",
"seriesOverrides": [],
"spaceLength": 10,
"stack": true,
"steppedLine": false,
"targets": [
{
"expr": "sum(node_namespace_pod_container:container_cpu_usage_seconds_total:sum_rate{cluster=\"$cluster\", node=\"$node\"}) by (pod)",
"format": "time_series",
"intervalFactor": 2,
"legendFormat": "{{pod}}",
"legendLink": null,
"refId": "A",
"step": 10
}
],
"thresholds": [],
"timeFrom": null,
"timeRegions": [],
"timeShift": null,
"title": "CPU Usage",
"tooltip": {
"shared": false,
"sort": 0,
"value_type": "individual"
},
"type": "graph",
"xaxis": {
"buckets": null,
"mode": "time",
"name": null,
"show": true,
"values": []
},
"yaxes": [
{
"format": "short",
"label": null,
"logBase": 1,
"max": null,
"min": 0,
"show": true
},
{
"format": "short",
"label": null,
"logBase": 1,
"max": null,
"min": null,
"show": false
}
],
"yaxis": {
"align": false,
"alignLevel": null
}
},
{
"collapsed": false,
"datasource": "$datasource",
"gridPos": {
"h": 1,
"w": 24,
"x": 0,
"y": 8
},
"id": 6,
"panels": [],
"repeat": null,
"title": "CPU Quota",
"type": "row"
},
{
"datasource": "$datasource",
"fieldConfig": {
"defaults": {
"color": {
"mode": "thresholds"
},
"custom": {
"align": null,
"filterable": false
},
"decimals": 2,
"mappings": [],
"noValue": "-",
"thresholds": {
"mode": "absolute",
"steps": [
{
"color": "green",
"value": null
},
{
"color": "red",
"value": 80
}
]
},
"unit": "short"
},
"overrides": [
{
"matcher": {
"id": "byName",
"options": "Value #A"
},
"properties": [
{
"id": "displayName",
"value": "CPU Usage"
},
{
"id": "unit",
"value": "short"
},
{
"id": "decimals",
"value": 2
},
{
"id": "custom.align",
"value": "left"
}
]
},
{
"matcher": {
"id": "byName",
"options": "Value #B"
},
"properties": [
{
"id": "displayName",
"value": "CPU Requests"
},
{
"id": "unit",
"value": "short"
},
{
"id": "decimals",
"value": 2
},
{
"id": "custom.align",
"value": "left"
}
]
},
{
"matcher": {
"id": "byName",
"options": "Value #C"
},
"properties": [
{
"id": "displayName",
"value": "CPU Requests %"
},
{
"id": "unit",
"value": "percentunit"
},
{
"id": "decimals",
"value": 2
},
{
"id": "custom.align",
"value": "left"
}
]
},
{
"matcher": {
"id": "byName",
"options": "Value #D"
},
"properties": [
{
"id": "displayName",
"value": "CPU Limits"
},
{
"id": "unit",
"value": "short"
},
{
"id": "decimals",
"value": 2
},
{
"id": "custom.align",
"value": "left"
}
]
},
{
"matcher": {
"id": "byName",
"options": "Value #E"
},
"properties": [
{
"id": "displayName",
"value": "CPU Limits %"
},
{
"id": "unit",
"value": "percentunit"
},
{
"id": "decimals",
"value": 2
},
{
"id": "custom.align",
"value": "left"
}
]
},
{
"matcher": {
"id": "byName",
"options": "pod"
},
"properties": [
{
"id": "displayName",
"value": "Pod"
},
{
"id": "unit",
"value": "short"
},
{
"id": "decimals",
"value": 2
},
{
"id": "custom.align",
"value": "left"
},
{
"id": "custom.width",
"value": 400
}
]
}
]
},
"gridPos": {
"h": 12,
"w": 24,
"x": 0,
"y": 9
},
"id": 2,
"links": [],
"options": {
"showHeader": true
},
"pluginVersion": "7.4.2",
"targets": [
{
"expr": "sum(node_namespace_pod_container:container_cpu_usage_seconds_total:sum_rate{cluster=\"$cluster\", node=\"$node\"}) by (pod)",
"format": "table",
"instant": true,
"intervalFactor": 2,
"legendFormat": "",
"refId": "A",
"step": 10
},
{
"expr": "sum(kube_pod_container_resource_requests{cluster=\"$cluster\", node=\"$node\", resource=\"cpu\"}) by (pod)",
"format": "table",
"instant": true,
"interval": "",
"intervalFactor": 2,
"legendFormat": "",
"refId": "B",
"step": 10
},
{
"expr": "sum(node_namespace_pod_container:container_cpu_usage_seconds_total:sum_rate{cluster=\"$cluster\", node=\"$node\"}) by (pod) / sum(kube_pod_container_resource_requests{cluster=\"$cluster\", node=\"$node\", resource=\"cpu\"}) by (pod)",
"format": "table",
"instant": true,
"interval": "",
"intervalFactor": 2,
"legendFormat": "",
"refId": "C",
"step": 10
},
{
"expr": "sum(kube_pod_container_resource_limits{cluster=\"$cluster\", node=\"$node\", resource=\"cpu\"}) by (pod)",
"format": "table",
"instant": true,
"interval": "",
"intervalFactor": 2,
"legendFormat": "",
"refId": "D",
"step": 10
},
{
"expr": "sum(node_namespace_pod_container:container_cpu_usage_seconds_total:sum_rate{cluster=\"$cluster\", node=\"$node\"}) by (pod) / sum(kube_pod_container_resource_limits{cluster=\"$cluster\", node=\"$node\", resource=\"cpu\"}) by (pod)",
"format": "table",
"instant": true,
"interval": "",
"intervalFactor": 2,
"legendFormat": "",
"refId": "E",
"step": 10
}
],
"timeFrom": null,
"timeShift": null,
"title": "CPU Quota",
"transformations": [
{
"id": "merge",
"options": {
"reducers": []
}
},
{
"id": "filterFieldsByName",
"options": {
"include": {
"names": [
"pod",
"Value #A",
"Value #B",
"Value #C",
"Value #D",
"Value #E"
]
}
}
}
],
"type": "table"
},
{
"collapsed": false,
"datasource": "$datasource",
"gridPos": {
"h": 1,
"w": 24,
"x": 0,
"y": 21
},
"id": 7,
"panels": [],
"repeat": null,
"title": "Memory Usage",
"type": "row"
},
{
"aliasColors": {},
"bars": false,
"dashLength": 10,
"dashes": false,
"datasource": "$datasource",
"fieldConfig": {
"defaults": {
"custom": {},
"links": []
},
"overrides": []
},
"fill": 10,
"fillGradient": 0,
"gridPos": {
"h": 9,
"w": 24,
"x": 0,
"y": 22
},
"hiddenSeries": false,
"id": 3,
"legend": {
"avg": false,
"current": false,
"max": false,
"min": false,
"show": true,
"total": false,
"values": false
},
"lines": true,
"linewidth": 0,
"links": [],
"nullPointMode": "null as zero",
"options": {
"alertThreshold": true
},
"percentage": false,
"pluginVersion": "7.4.2",
"pointradius": 5,
"points": false,
"renderer": "flot",
"seriesOverrides": [],
"spaceLength": 10,
"stack": true,
"steppedLine": false,
"targets": [
{
"expr": "sum(container_memory_working_set_bytes{cluster=\"$cluster\", node=\"$node\", container!=\"\",job=\"kubelet\", metrics_path=\"\/metrics\/cadvisor\", image!=\"\"}) by (pod)",
"format": "time_series",
"intervalFactor": 2,
"legendFormat": "{{pod}}",
"legendLink": null,
"refId": "A",
"step": 10
}
],
"thresholds": [],
"timeFrom": null,
"timeRegions": [],
"timeShift": null,
"title": "Memory Usage (w/o cache)",
"tooltip": {
"shared": false,
"sort": 0,
"value_type": "individual"
},
"type": "graph",
"xaxis": {
"buckets": null,
"mode": "time",
"name": null,
"show": true,
"values": []
},
"yaxes": [
{
"format": "bytes",
"label": null,
"logBase": 1,
"max": null,
"min": 0,
"show": true
},
{
"format": "short",
"label": null,
"logBase": 1,
"max": null,
"min": null,
"show": false
}
],
"yaxis": {
"align": false,
"alignLevel": null
}
},
{
"collapsed": false,
"datasource": "$datasource",
"gridPos": {
"h": 1,
"w": 24,
"x": 0,
"y": 31
},
"id": 8,
"panels": [],
"repeat": null,
"title": "Memory Quota",
"type": "row"
},
{
"datasource": "$datasource",
"fieldConfig": {
"defaults": {
"color": {
"mode": "thresholds"
},
"custom": {
"align": null,
"filterable": false
},
"decimals": 2,
"mappings": [],
"noValue": "-",
"thresholds": {
"mode": "absolute",
"steps": [
{
"color": "green",
"value": null
},
{
"color": "red",
"value": 80
}
]
},
"unit": "short"
},
"overrides": [
{
"matcher": {
"id": "byName",
"options": "Value #A"
},
"properties": [
{
"id": "displayName",
"value": "Memory Usage"
},
{
"id": "unit",
"value": "bytes"
},
{
"id": "decimals",
"value": 2
},
{
"id": "custom.align",
"value": "left"
}
]
},
{
"matcher": {
"id": "byName",
"options": "Value #B"
},
"properties": [
{
"id": "displayName",
"value": "Memory Requests"
},
{
"id": "unit",
"value": "bytes"
},
{
"id": "decimals",
"value": 2
},
{
"id": "custom.align",
"value": "left"
}
]
},
{
"matcher": {
"id": "byName",
"options": "Value #C"
},
"properties": [
{
"id": "displayName",
"value": "Memory Requests %"
},
{
"id": "unit",
"value": "percentunit"
},
{
"id": "decimals",
"value": 2
},
{
"id": "custom.align",
"value": "left"
}
]
},
{
"matcher": {
"id": "byName",
"options": "Value #D"
},
"properties": [
{
"id": "displayName",
"value": "Memory Limits"
},
{
"id": "unit",
"value": "bytes"
},
{
"id": "decimals",
"value": 2
},
{
"id": "custom.align",
"value": "left"
}
]
},
{
"matcher": {
"id": "byName",
"options": "Value #E"
},
"properties": [
{
"id": "displayName",
"value": "Memory Limits %"
},
{
"id": "unit",
"value": "percentunit"
},
{
"id": "decimals",
"value": 2
},
{
"id": "custom.align",
"value": "left"
}
]
},
{
"matcher": {
"id": "byName",
"options": "Value #F"
},
"properties": [
{
"id": "displayName",
"value": "Memory Usage (RSS)"
},
{
"id": "unit",
"value": "bytes"
},
{
"id": "decimals",
"value": 2
},
{
"id": "custom.align",
"value": "left"
}
]
},
{
"matcher": {
"id": "byName",
"options": "Value #G"
},
"properties": [
{
"id": "displayName",
"value": "Memory Usage (Cache)"
},
{
"id": "unit",
"value": "bytes"
},
{
"id": "decimals",
"value": 2
},
{
"id": "custom.align",
"value": "left"
}
]
},
{
"matcher": {
"id": "byName",
"options": "Value #H"
},
"properties": [
{
"id": "displayName",
"value": "Memory Usage (Swap)"
},
{
"id": "unit",
"value": "bytes"
},
{
"id": "decimals",
"value": 2
},
{
"id": "custom.align",
"value": "left"
},
{
"id": "noValue",
"value": "-"
}
]
},
{
"matcher": {
"id": "byName",
"options": "pod"
},
"properties": [
{
"id": "displayName",
"value": "Pod"
},
{
"id": "unit",
"value": "short"
},
{
"id": "decimals",
"value": 2
},
{
"id": "custom.align",
"value": "left"
},
{
"id": "custom.width",
"value": 400
}
]
}
]
},
"gridPos": {
"h": 12,
"w": 24,
"x": 0,
"y": 32
},
"id": 4,
"links": [],
"options": {
"showHeader": true
},
"pluginVersion": "7.4.2",
"targets": [
{
"expr": "sum(container_memory_working_set_bytes{cluster=\"$cluster\", node=\"$node\",container!=\"\",job=\"kubelet\", metrics_path=\"\/metrics\/cadvisor\", image!=\"\"}) by (pod)",
"format": "table",
"instant": true,
"intervalFactor": 2,
"legendFormat": "",
"refId": "A",
"step": 10
},
{
"expr": "sum(kube_pod_container_resource_requests{cluster=\"$cluster\", node=\"$node\", resource=\"cpu\"}) by (pod)",
"format": "table",
"instant": true,
"interval": "",
"intervalFactor": 2,
"legendFormat": "",
"refId": "B",
"step": 10
},
{
"expr": "sum(container_memory_working_set_bytes{cluster=\"$cluster\", node=\"$node\",container!=\"\",job=\"kubelet\", metrics_path=\"\/metrics\/cadvisor\", image!=\"\"}) by (pod) / sum(kube_pod_container_resource_requests{node=\"$node\", resource=\"memory\"}) by (pod)",
"format": "table",
"instant": true,
"interval": "",
"intervalFactor": 2,
"legendFormat": "",
"refId": "C",
"step": 10
},
{
"expr": "sum(kube_pod_container_resource_limits{cluster=\"$cluster\", node=\"$node\", resource=\"cpu\"}) by (pod)",
"format": "table",
"instant": true,
"interval": "",
"intervalFactor": 2,
"legendFormat": "",
"refId": "D",
"step": 10
},
{
"expr": "sum(container_memory_working_set_bytes{cluster=\"$cluster\", node=\"$node\",container!=\"\",job=\"kubelet\", metrics_path=\"\/metrics\/cadvisor\", image!=\"\"}) by (pod) / sum(kube_pod_container_resource_limits{node=\"$node\", resource=\"memory\"}) by (pod)",
"format": "table",
"instant": true,
"interval": "",
"intervalFactor": 2,
"legendFormat": "",
"refId": "E",
"step": 10
},
{
"expr": "sum(container_memory_rss{cluster=\"$cluster\", node=\"$node\",container!=\"\",job=\"kubelet\", metrics_path=\"\/metrics\/cadvisor\", image!=\"\"}) by (pod)",
"format": "table",
"instant": true,
"intervalFactor": 2,
"legendFormat": "",
"refId": "F",
"step": 10
},
{
"expr": "sum(container_memory_cache{cluster=\"$cluster\", node=\"$node\",container!=\"\",job=\"kubelet\", metrics_path=\"\/metrics\/cadvisor\", image!=\"\"}) by (pod)",
"format": "table",
"instant": true,
"intervalFactor": 2,
"legendFormat": "",
"refId": "G",
"step": 10
},
{
"expr": "sum(container_memory_swap{cluster=\"$cluster\", node=\"$node\",container!=\"\",job=\"kubelet\", metrics_path=\"\/metrics\/cadvisor\", image!=\"\"}) by (pod)",
"format": "table",
"instant": true,
"intervalFactor": 2,
"legendFormat": "",
"refId": "H",
"step": 10
}
],
"timeFrom": null,
"timeShift": null,
"title": "Memory Quota",
"transformations": [
{
"id": "merge",
"options": {
"reducers": []
}
},
{
"id": "filterFieldsByName",
"options": {
"include": {
"names": [
"pod",
"Value #A",
"Value #B",
"Value #C",
"Value #D",
"Value #E",
"Value #F",
"Value #G",
"Value #H"
]
}
}
}
],
"type": "table"
}
],
"refresh": "1m",
"schemaVersion": 27,
"style": "dark",
"tags": ["kubernetes-mixin"],
"templating": {
"list": [
{
"current": {
"selected": false,
"text": "",
"value": ""
},
"description": null,
"error": null,
"hide": 2,
"includeAll": false,
"label": null,
"multi": false,
"name": "datasource",
"options": [],
"query": "prometheus",
"refresh": 1,
"regex": "",
"skipUrlSync": false,
"type": "datasource"
},
{
"allValue": null,
"current": {
"selected": true,
"text": "",
"value": ""
},
"datasource": "$datasource",
"definition": "",
"description": null,
"error": null,
"hide": 0,
"includeAll": false,
"label": null,
"multi": false,
"name": "cluster",
"options": [],
"query": {
"query": "label_values(kube_pod_info, cluster)",
"refId": "Observatorium-cluster-Variable-Query"
},
"refresh": 1,
"regex": "",
"skipUrlSync": false,
"sort": 1,
"tagValuesQuery": "",
"tags": [],
"tagsQuery": "",
"type": "query",
"useTags": false
},
{
"allValue": null,
"current": {
"selected": true,
"text": "",
"value": ""
},
"datasource": "$datasource",
"definition": "",
"description": null,
"error": null,
"hide": 0,
"includeAll": false,
"label": null,
"multi": false,
"name": "node",
"options": [],
"query": {
"query": "label_values(kube_pod_info{cluster=\"$cluster\"}, node)",
"refId": "Observatorium-node-Variable-Query"
},
"refresh": 1,
"regex": "",
"skipUrlSync": false,
"sort": 1,
"tagValuesQuery": "",
"tags": [],
"tagsQuery": "",
"type": "query",
"useTags": false
}
]
},
"time": {
"from": "now-3h",
"to": "now"
},
"timepicker": {
"refresh_intervals": ["1m", "5m", "15m", "30m", "1h", "2h", "1d"],
"time_options": ["5m", "15m", "1h", "6h", "12h", "24h", "2d", "7d", "30d"]
},
"timezone": "browser",
"title": "Kubernetes / Compute Resources / Node (Pods)",
"uid": "200ac8fdbfbb74b39aff88118e4d1c2c",
"version": 3
}
kind: ConfigMap
metadata:
name: grafana-dashboard-k8s-compute-resources-node-pods
namespace: open-cluster-management-observability
labels:
general-folder: "true"
| 28.828708 | 284 | 0.292737 |
73b956bbfaab7a5c9d8a6d2cc33b0ccc1300aa26 | 1,445 | yaml | YAML | ingress/controllers/nginx/examples/tcp/rc-tcp.yaml | ravihansa3000/kubernetes-contrib | c1b1d84aa128b90785e6140a8bd3af3666847a94 | [
"Apache-2.0"
] | null | null | null | ingress/controllers/nginx/examples/tcp/rc-tcp.yaml | ravihansa3000/kubernetes-contrib | c1b1d84aa128b90785e6140a8bd3af3666847a94 | [
"Apache-2.0"
] | null | null | null | ingress/controllers/nginx/examples/tcp/rc-tcp.yaml | ravihansa3000/kubernetes-contrib | c1b1d84aa128b90785e6140a8bd3af3666847a94 | [
"Apache-2.0"
] | null | null | null | apiVersion: v1
kind: ReplicationController
metadata:
name: nginx-ingress-controller
labels:
k8s-app: nginx-ingress-lb
spec:
replicas: 1
selector:
k8s-app: nginx-ingress-lb
template:
metadata:
labels:
k8s-app: nginx-ingress-lb
name: nginx-ingress-lb
spec:
terminationGracePeriodSeconds: 60
containers:
- image: gcr.io/google_containers/nginx-ingress-controller:0.62
name: nginx-ingress-lb
imagePullPolicy: Always
livenessProbe:
httpGet:
path: /healthz
port: 10249
scheme: HTTP
initialDelaySeconds: 30
timeoutSeconds: 5
# use downward API
env:
- name: POD_NAME
valueFrom:
fieldRef:
fieldPath: metadata.name
- name: POD_NAMESPACE
valueFrom:
fieldRef:
fieldPath: metadata.namespace
ports:
- containerPort: 80
hostPort: 80
- containerPort: 443
hostPort: 443
# service echoheaders as TCP service default/echoheaders:9000
# 9000 indicates the port used to expose the service
- containerPort: 9000
hostPort: 9000
args:
- /nginx-ingress-controller
- --default-backend-service=default/default-http-backend
- --tcp-services-configmap=default/tcp-configmap-example
| 27.788462 | 69 | 0.584775 |
73b994b6416fc2343dfe44f4aae56b4450d998cd | 1,256 | yaml | YAML | scripts/k8s/archive/x-dev-collection2.yaml | caitlinadams/deafrica-scripts | a4c0ac7ba640fd60606da1d214c972cb5b588556 | [
"Apache-2.0"
] | 3 | 2021-11-12T08:07:31.000Z | 2022-02-13T22:18:16.000Z | scripts/k8s/archive/x-dev-collection2.yaml | caitlinadams/deafrica-scripts | a4c0ac7ba640fd60606da1d214c972cb5b588556 | [
"Apache-2.0"
] | 6 | 2021-09-06T06:01:17.000Z | 2021-09-29T05:24:27.000Z | scripts/k8s/archive/x-dev-collection2.yaml | digitalearthafrica/scripts | ed1e91857764e77ab0f4fc5ea4e541f1cb8406ad | [
"Apache-2.0"
] | 1 | 2021-11-16T23:38:10.000Z | 2021-11-16T23:38:10.000Z | apiVersion: v1
kind: Pod
metadata:
name: x-dev-collection2
labels:
app: x-dev-collection2
annotations:
iam.amazonaws.com/role: deafrica-ec2-s3_access
spec:
containers:
- name: datacube-alchemist-container
image: opendatacube/datacube-alchemist
env:
- name: DB_USERNAME
valueFrom:
secretKeyRef:
name: collection2-datacube
key: postgres-username
- name: DB_PASSWORD
valueFrom:
secretKeyRef:
name: collection2-datacube
key: postgres-password
- name: ADMIN_USERNAME
valueFrom:
secretKeyRef:
name: deafrica-eks
key: postgres-username
- name: ADMIN_PASSWORD
valueFrom:
secretKeyRef:
name: deafrica-eks
key: postgres-password
- name: DATACUBE_CONFIG_PATH
value: "/opt/custom-config.conf"
- name: DB_DATABASE
value: "collection2"
- name: DB_HOSTNAME
value: "database.local"
- name: DB_PORT
value: "5432"
- name: AWS_DEFAULT_REGION
value: us-west-2
ports:
- containerPort: 80
command: ["/bin/sh", "-ec", "docker-entrypoint.sh && while :; do echo '.'; sleep 5 ; done"]
nodeSelector:
beta.kubernetes.io/os: linux
| 25.12 | 95 | 0.618631 |
73b9d0802e883eaac9063964d77a9d414a7e17fc | 255 | yaml | YAML | deploy/csi-azurefile-driver.yaml | ivankostic85/azurefile-csi-driver | 991151f3cdba66f124f396665bba4c2615a73e01 | [
"Apache-2.0"
] | 83 | 2019-03-07T09:18:45.000Z | 2022-03-23T18:02:26.000Z | deploy/csi-azurefile-driver.yaml | ivankostic85/azurefile-csi-driver | 991151f3cdba66f124f396665bba4c2615a73e01 | [
"Apache-2.0"
] | 905 | 2019-03-08T11:42:14.000Z | 2022-03-31T11:33:26.000Z | deploy/csi-azurefile-driver.yaml | ivankostic85/azurefile-csi-driver | 991151f3cdba66f124f396665bba4c2615a73e01 | [
"Apache-2.0"
] | 89 | 2019-04-13T01:50:52.000Z | 2022-03-31T10:20:21.000Z | ---
apiVersion: storage.k8s.io/v1
kind: CSIDriver
metadata:
name: file.csi.azure.com
annotations:
csiDriver: latest
snapshot: v3.0.3
spec:
attachRequired: false
podInfoOnMount: true
volumeLifecycleModes:
- Persistent
- Ephemeral
| 17 | 29 | 0.713725 |
73ba4bbfb2fb17611e5d29e1a9913c108b646777 | 185 | yaml | YAML | pod-scheduling/node-name.yaml | diegoazd/kubernetes-avanzado | 91e244833f0989b7936c84c88609efc0921053ad | [
"Apache-2.0"
] | null | null | null | pod-scheduling/node-name.yaml | diegoazd/kubernetes-avanzado | 91e244833f0989b7936c84c88609efc0921053ad | [
"Apache-2.0"
] | null | null | null | pod-scheduling/node-name.yaml | diegoazd/kubernetes-avanzado | 91e244833f0989b7936c84c88609efc0921053ad | [
"Apache-2.0"
] | 2 | 2021-08-31T00:28:38.000Z | 2021-09-02T01:30:40.000Z | apiVersion: v1
kind: Pod
metadata:
name: nginx
labels:
app: nginx
spec:
containers:
- name: nginx
image: nginx
imagePullPolicy: IfNotPresent
nodeName: <NODE_NAME>
| 14.230769 | 33 | 0.686486 |
73baa15cb89314e81d16e826ff5238e0a355fdb5 | 441 | yaml | YAML | Kubernetes YAML/Persistent volumes/Kafka-PV-1.yaml | amirsoleimanii/kafka-docker | 2d589378288aa39afe4e2f01ca77508b54f42a6c | [
"Apache-2.0"
] | 1 | 2019-09-30T09:57:31.000Z | 2019-09-30T09:57:31.000Z | Kubernetes YAML/Persistent volumes/Kafka-PV-1.yaml | amirsoleimanii/kafka-docker | 2d589378288aa39afe4e2f01ca77508b54f42a6c | [
"Apache-2.0"
] | null | null | null | Kubernetes YAML/Persistent volumes/Kafka-PV-1.yaml | amirsoleimanii/kafka-docker | 2d589378288aa39afe4e2f01ca77508b54f42a6c | [
"Apache-2.0"
] | null | null | null | apiVersion: v1
kind: PersistentVolume
metadata:
name: kafka1
spec:
capacity:
storage: 500Gi
accessModes:
- ReadWriteOnce
persistentVolumeReclaimPolicy: Retain
storageClassName: standard
local:
path: /opt/volumes/kafka
nodeAffinity:
required:
nodeSelectorTerms:
- matchExpressions:
- key: kubernetes.io/hostname
operator: In
values:
- Slave-1
| 20.045455 | 40 | 0.632653 |
73bacaeaf9fbdd0c2edb20767141c9c81cca2e80 | 66 | yaml | YAML | ubi-noop-go/deploy/service_account.yaml | brianwcook/om-env-example | 0ae3846bb9674cac748f08213417bed37f419861 | [
"Apache-2.0"
] | 3 | 2021-05-24T16:08:30.000Z | 2021-07-06T14:10:43.000Z | ubi-noop-go/deploy/service_account.yaml | jsm84/rhm-env-example | 3e93e2a851dbf14f7e4b25bba29e032db2ff21c2 | [
"Apache-2.0"
] | null | null | null | ubi-noop-go/deploy/service_account.yaml | jsm84/rhm-env-example | 3e93e2a851dbf14f7e4b25bba29e032db2ff21c2 | [
"Apache-2.0"
] | 2 | 2019-12-12T21:02:16.000Z | 2019-12-16T18:13:30.000Z | apiVersion: v1
kind: ServiceAccount
metadata:
name: ubi-noop-go
| 13.2 | 20 | 0.772727 |
73bacde53adaa39e03e816713871260d33d1af02 | 258 | yaml | YAML | demo/niko/pvc.yaml | ggriffiths/kubeup | af91d9801bade9f9236adb45ac911f69a6f26b14 | [
"Apache-2.0"
] | null | null | null | demo/niko/pvc.yaml | ggriffiths/kubeup | af91d9801bade9f9236adb45ac911f69a6f26b14 | [
"Apache-2.0"
] | null | null | null | demo/niko/pvc.yaml | ggriffiths/kubeup | af91d9801bade9f9236adb45ac911f69a6f26b14 | [
"Apache-2.0"
] | null | null | null | apiVersion: v1
kind: PersistentVolumeClaim
metadata:
name: koka-pvc-local
namespace: default
annotations:
volume.beta.kubernetes.io/storage-class: koka-sc-local
spec:
accessModes:
- ReadWriteOnce
resources:
requests:
storage: 3Gi
| 18.428571 | 58 | 0.728682 |
73bad7ffb6e0bc320542b598d8117e8b6504bbda | 224 | yaml | YAML | kube/wp/production/database/essential-genes-internal-database-svc.yaml | mpi2/essential-genes-database | 0ac8fa9aaf828156e4302beb1c89f4303d73fc11 | [
"Apache-2.0"
] | null | null | null | kube/wp/production/database/essential-genes-internal-database-svc.yaml | mpi2/essential-genes-database | 0ac8fa9aaf828156e4302beb1c89f4303d73fc11 | [
"Apache-2.0"
] | null | null | null | kube/wp/production/database/essential-genes-internal-database-svc.yaml | mpi2/essential-genes-database | 0ac8fa9aaf828156e4302beb1c89f4303d73fc11 | [
"Apache-2.0"
] | null | null | null | apiVersion: v1
kind: Service
metadata:
name: essential-genes-internal-database
namespace: mi-essential-genes
spec:
ports:
- port: 5432
protocol: TCP
selector:
app: essential-genes-database
type: NodePort
| 17.230769 | 41 | 0.727679 |
73baedfb35c1806927283e815f22ac571c57e147 | 1,170 | yaml | YAML | config/500-mutating-webhook.yaml | n3wscott/net-istio | 4e45782e0d2f95e8d86db53f56d7ba4baa0f24bc | [
"Apache-2.0"
] | null | null | null | config/500-mutating-webhook.yaml | n3wscott/net-istio | 4e45782e0d2f95e8d86db53f56d7ba4baa0f24bc | [
"Apache-2.0"
] | 9 | 2020-10-30T05:25:37.000Z | 2022-01-12T11:39:25.000Z | config/500-mutating-webhook.yaml | n3wscott/net-istio | 4e45782e0d2f95e8d86db53f56d7ba4baa0f24bc | [
"Apache-2.0"
] | null | null | null | # Copyright 2020 The Knative Authors
#
# Licensed under the Apache License, Version 2.0 (the "License");
# you may not use this file except in compliance with the License.
# You may obtain a copy of the License at
#
# https://www.apache.org/licenses/LICENSE-2.0
#
# Unless required by applicable law or agreed to in writing, software
# distributed under the License is distributed on an "AS IS" BASIS,
# WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
# See the License for the specific language governing permissions and
# limitations under the License.
apiVersion: admissionregistration.k8s.io/v1
kind: MutatingWebhookConfiguration
metadata:
name: webhook.istio.networking.internal.knative.dev
labels:
serving.knative.dev/release: devel
networking.knative.dev/ingress-provider: istio
webhooks:
- admissionReviewVersions:
- v1beta1
clientConfig:
service:
name: istio-webhook
namespace: knative-serving
failurePolicy: Fail
sideEffects: None
objectSelector:
matchExpressions:
- {key: "serving.knative.dev/configuration", operator: Exists}
name: webhook.istio.networking.internal.knative.dev
| 33.428571 | 74 | 0.763248 |
73baee7aeac36ca89e439a57efe15c2bfa30a2b4 | 1,566 | yaml | YAML | deploy/install/01-prerequisite/04-default-setting.yaml | yasker/lm-rewrite | f9d8d1575db49f80d36fccfd30a3ac93ca5c30e6 | [
"Apache-2.0"
] | 50 | 2017-04-18T02:56:28.000Z | 2019-04-27T14:22:55.000Z | deploy/install/01-prerequisite/04-default-setting.yaml | yasker/lm-rewrite | f9d8d1575db49f80d36fccfd30a3ac93ca5c30e6 | [
"Apache-2.0"
] | 93 | 2017-04-13T20:19:22.000Z | 2019-06-10T22:03:55.000Z | deploy/install/01-prerequisite/04-default-setting.yaml | yasker/lm-rewrite | f9d8d1575db49f80d36fccfd30a3ac93ca5c30e6 | [
"Apache-2.0"
] | 28 | 2017-04-17T05:19:51.000Z | 2019-05-22T19:32:17.000Z | apiVersion: v1
kind: ConfigMap
metadata:
name: longhorn-default-setting
namespace: longhorn-system
data:
default-setting.yaml: |-
#backup-target:
#backup-target-credential-secret:
#allow-recurring-job-while-volume-detached:
#create-default-disk-labeled-nodes:
#default-data-path:
#replica-soft-anti-affinity:
#replica-auto-balance:
#storage-over-provisioning-percentage:
#storage-minimal-available-percentage:
#upgrade-checker:
#default-replica-count:
#default-data-locality:
#default-longhorn-static-storage-class:
#backupstore-poll-interval:
#taint-toleration:
#system-managed-components-node-selector:
#priority-class:
#auto-salvage:
#auto-delete-pod-when-volume-detached-unexpectedly:
#disable-scheduling-on-cordoned-node:
#replica-zone-soft-anti-affinity:
#node-down-pod-deletion-policy:
#allow-node-drain-with-last-healthy-replica:
#mkfs-ext4-parameters:
#disable-replica-rebuild:
#replica-replenishment-wait-interval:
#concurrent-replica-rebuild-per-node-limit:
#disable-revision-counter:
#system-managed-pods-image-pull-policy:
#allow-volume-creation-with-degraded-availability:
#auto-cleanup-system-generated-snapshot:
#concurrent-automatic-engine-upgrade-per-node-limit:
#backing-image-cleanup-wait-interval:
#backing-image-recovery-wait-interval:
#guaranteed-engine-manager-cpu:
#guaranteed-replica-manager-cpu:
#kubernetes-cluster-autoscaler-enabled:
#orphan-auto-deletion:
#storage-network:
| 33.319149 | 56 | 0.727331 |
73baf2fa20967d88e055598bd38b82b7a7f021f9 | 1,671 | yaml | YAML | applications/mindspore-summary/en/oauth-proxy.yaml | GeorgeCao-hw/infra-mindspore | fdb7f3fb8451b29292ebc0410e4674cd68d495e4 | [
"Apache-2.0"
] | null | null | null | applications/mindspore-summary/en/oauth-proxy.yaml | GeorgeCao-hw/infra-mindspore | fdb7f3fb8451b29292ebc0410e4674cd68d495e4 | [
"Apache-2.0"
] | null | null | null | applications/mindspore-summary/en/oauth-proxy.yaml | GeorgeCao-hw/infra-mindspore | fdb7f3fb8451b29292ebc0410e4674cd68d495e4 | [
"Apache-2.0"
] | null | null | null | ---
apiVersion: apps/v1
kind: Deployment
metadata:
labels:
k8s-app: oauth2-proxy
name: oauth2-proxy
spec:
replicas: 1
selector:
matchLabels:
k8s-app: oauth2-proxy
template:
metadata:
labels:
k8s-app: oauth2-proxy
spec:
containers:
- args:
- --provider=gitee
- --email-domain=*
- --proxy-prefix=/en/2021summary/oauth2
- --skip-auth-regex=^/en/2021summary/agreement_ch.html
- --skip-auth-regex=^/en/2021summary/agreement_en.html
- --upstream=http://mindspore-summary.mindspore-summary-en.svc.cluster.local
- --http-address=0.0.0.0:4180
- --cookie-expire=6h0m0s
- --set-xauthrequest=true
- --custom-templates-dir=/bin/static/login
- --custom-templates-sign-in=mindspore-en.html
env:
- name: OAUTH2_PROXY_CLIENT_ID
valueFrom:
secretKeyRef:
key: client_id
name: oauth-secrets
- name: OAUTH2_PROXY_CLIENT_SECRET
valueFrom:
secretKeyRef:
key: client_secret
name: oauth-secrets
- name: OAUTH2_PROXY_COOKIE_SECRET
valueFrom:
secretKeyRef:
key: cookie_secret
name: oauth-secrets
image: swr.cn-north-4.myhuaweicloud.com/opensourceway/common/oauth2-proxy:662b2634654d5fb1aa65a59da62728c9184a4a9c
imagePullPolicy: Always
name: oauth2-proxy
ports:
- containerPort: 4180
protocol: TCP | 32.134615 | 124 | 0.550569 |
73bb0883e9ffb3090318e131a5e28f577ac97faa | 3,733 | yaml | YAML | test/e2e/testdata/enable_api_group_versions/case-c-target-manually-added-mutations.yaml | nate-double-u/vmware-tanzu-velero | de0fe7ff67c1d9782c20c5b0c90fca7d292cc39e | [
"Apache-2.0"
] | 3,133 | 2019-09-30T20:45:09.000Z | 2022-03-31T22:59:26.000Z | test/e2e/testdata/enable_api_group_versions/case-c-target-manually-added-mutations.yaml | nate-double-u/vmware-tanzu-velero | de0fe7ff67c1d9782c20c5b0c90fca7d292cc39e | [
"Apache-2.0"
] | 2,266 | 2019-09-30T20:20:59.000Z | 2022-03-31T18:17:44.000Z | test/e2e/testdata/enable_api_group_versions/case-c-target-manually-added-mutations.yaml | nate-double-u/vmware-tanzu-velero | de0fe7ff67c1d9782c20c5b0c90fca7d292cc39e | [
"Apache-2.0"
] | 663 | 2019-10-02T16:48:17.000Z | 2022-03-29T08:33:57.000Z | apiVersion: apiextensions.k8s.io/v1
kind: CustomResourceDefinition
metadata:
annotations:
cert-manager.io/inject-ca-from: music-system/music-serving-cert
controller-gen.kubebuilder.io/version: v0.2.5
name: rockbands.music.example.io
spec:
group: music.example.io
names:
kind: RockBand
listKind: RockBandList
plural: rockbands
singular: rockband
scope: Namespaced
versions:
- name: v1
schema:
openAPIV3Schema:
description: RockBand is the Schema for the rockbands API
properties:
apiVersion:
description: 'APIVersion defines the versioned schema of this representation of an object. Servers should convert recognized schemas to the latest internal value, and may reject unrecognized values. More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#resources'
type: string
kind:
description: 'Kind is a string value representing the REST resource this object represents. Servers may infer this from the endpoint the client submits requests to. Cannot be updated. In CamelCase. More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#types-kinds'
type: string
metadata:
type: object
spec:
description: RockBandSpec defines the desired state of RockBand
properties:
genre:
type: string
leadSinger:
type: string
numberComponents:
format: int32
type: integer
type: object
status:
description: RockBandStatus defines the observed state of RockBand
properties:
lastPlayed:
type: string
required:
- lastPlayed
type: object
type: object
served: true
storage: false
- name: v2
schema:
openAPIV3Schema:
description: RockBand is the Schema for the rockbands API
properties:
apiVersion:
description: 'APIVersion defines the versioned schema of this representation of an object. Servers should convert recognized schemas to the latest internal value, and may reject unrecognized values. More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#resources'
type: string
kind:
description: 'Kind is a string value representing the REST resource this object represents. Servers may infer this from the endpoint the client submits requests to. Cannot be updated. In CamelCase. More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#types-kinds'
type: string
metadata:
type: object
spec:
description: RockBandSpec defines the desired state of RockBand
properties:
bass:
type: string
drummer:
type: string
genre:
type: string
leadGuitar:
type: string
leadSinger:
type: string
numberComponents:
format: int32
type: integer
type: object
status:
description: RockBandStatus defines the observed state of RockBand
properties:
lastPlayed:
type: string
type: object
type: object
served: true
storage: true
subresources:
status: {}
status:
acceptedNames:
kind: ""
plural: ""
conditions: []
storedVersions: []
| 37.707071 | 317 | 0.617198 |
73bb656cdfd0c8ae3815d36d82ae6885cd94c17f | 520 | yaml | YAML | config-root/cluster/jx/jxboot-helmfile-resources/charts/gcactivities/clusterrole.yaml | vikrant82/jx3 | 4ff366a52ab63552fee0d6a68904eb1a09b7e609 | [
"Apache-2.0"
] | null | null | null | config-root/cluster/jx/jxboot-helmfile-resources/charts/gcactivities/clusterrole.yaml | vikrant82/jx3 | 4ff366a52ab63552fee0d6a68904eb1a09b7e609 | [
"Apache-2.0"
] | null | null | null | config-root/cluster/jx/jxboot-helmfile-resources/charts/gcactivities/clusterrole.yaml | vikrant82/jx3 | 4ff366a52ab63552fee0d6a68904eb1a09b7e609 | [
"Apache-2.0"
] | null | null | null | # Source: jxboot-helmfile-resources/charts/gcactivities/templates/clusterrole.yaml
apiVersion: rbac.authorization.k8s.io/v1
kind: ClusterRole
metadata:
name: gcactivities-jx
labels:
gitops.jenkins-x.io/pipeline: 'cluster'
rules:
- apiGroups:
- apiextensions.k8s.io
resources:
- customresourcedefinitions
verbs:
- get
- create
- patch
- update
- apiGroups:
- ""
resources:
- namespaces
verbs:
- get
- delete
- list
- apiGroups:
- apps
resources:
- deployments
verbs:
- get
| 16.25 | 82 | 0.694231 |
73bb7fded1b8c9be729b8916e27dd4c3b18d9842 | 232 | yaml | YAML | apps/app-networking-consumer/k8s/service.yaml | Albertoimpl/k8s-for-the-busy | 4bd79b685e264fc1799dca5b0ca7df78415c4eb6 | [
"Apache-2.0"
] | 53 | 2019-10-18T12:02:13.000Z | 2022-01-17T12:59:47.000Z | apps/app-networking-consumer/k8s/service.yaml | Albertoimpl/k8s-for-the-busy | 4bd79b685e264fc1799dca5b0ca7df78415c4eb6 | [
"Apache-2.0"
] | 1 | 2021-06-13T16:08:23.000Z | 2021-06-13T16:08:23.000Z | apps/app-networking-consumer/k8s/service.yaml | Albertoimpl/k8s-for-the-busy | 4bd79b685e264fc1799dca5b0ca7df78415c4eb6 | [
"Apache-2.0"
] | 23 | 2019-11-08T09:29:30.000Z | 2021-11-10T12:36:43.000Z | apiVersion: v1
kind: Service
metadata:
name: service-myapp-consumer
labels:
app: myapp-consumer
spec:
selector:
app: myapp-consumer
ports:
- protocol: TCP
port: 8080
targetPort: 8080
type: NodePort
| 15.466667 | 30 | 0.668103 |
73bbe9edb1758f15cce165be664eb06c8222555c | 377 | yaml | YAML | services/ingress-wildcard-demo.yaml | ZeroExistence/cka-review-stuffs | d83311a5e24bb710a079781c717726e853593f11 | [
"MIT"
] | null | null | null | services/ingress-wildcard-demo.yaml | ZeroExistence/cka-review-stuffs | d83311a5e24bb710a079781c717726e853593f11 | [
"MIT"
] | null | null | null | services/ingress-wildcard-demo.yaml | ZeroExistence/cka-review-stuffs | d83311a5e24bb710a079781c717726e853593f11 | [
"MIT"
] | null | null | null | apiVersion: networking.k8s.io/v1
kind: Ingress
metadata:
name: ingress-wildcard-demo
annotations:
nginx.ingress.kubernetes.io/rewrite-target: /
spec:
rules:
- host: "demo.moe.ph"
http:
paths:
- path: "/"
pathType: Prefix
backend:
service:
name: echo-cluster-service
port:
number: 8080
| 19.842105 | 49 | 0.572944 |
73bbfab970fc2b4a1a3a966c88fa76e2cbe8b5f4 | 307 | yaml | YAML | cloud/k8/apps/secrets/vehicle-secrets.yaml | Tanzu-Solutions-Engineering/IoT-connected-vehicles-showcase | c48f1ee6c80248159988d3977ed91ca45570ba9e | [
"Apache-2.0"
] | 5 | 2022-01-01T15:49:41.000Z | 2022-02-09T15:01:30.000Z | cloud/k8/apps/secrets/vehicle-secrets.yaml | Tanzu-Solutions-Engineering/IoT-connected-vehicles-showcase | c48f1ee6c80248159988d3977ed91ca45570ba9e | [
"Apache-2.0"
] | null | null | null | cloud/k8/apps/secrets/vehicle-secrets.yaml | Tanzu-Solutions-Engineering/IoT-connected-vehicles-showcase | c48f1ee6c80248159988d3977ed91ca45570ba9e | [
"Apache-2.0"
] | null | null | null | apiVersion: v1
kind: Secret
metadata:
name: vehicle-secrets
type: Opaque
data:
spring_rabbitmq_username: dmVoaWNsZQ==
spring_rabbitmq_password: c2VjdXJpdHk=
db-username: cG9zdGdyZXM=
db-password: c2VjdXJpdHk=
rabbitmq-stream_uris: cmFiYml0bXEtc3RyZWFtOi8vdmVoaWNsZTpzZWN1cml0eUByYWJiaXRtcTo1NTUy | 27.909091 | 88 | 0.833876 |
73bbfbe291593a9c3d17f3f7266e2b9f4a83c226 | 476 | yaml | YAML | src/test/resources/com/cloudbees/jenkins/plugins/kubernetes_credentials_provider/convertors/AWSCredentialsConvertorTest/corruptMFASerialNumber.yaml | garyttierney/kubernetes-credentials-provider-plugin | 5d878e59451ec75acffb6804240debbd517e4bc8 | [
"MIT"
] | 46 | 2018-03-15T17:14:12.000Z | 2021-11-11T02:42:15.000Z | src/test/resources/com/cloudbees/jenkins/plugins/kubernetes_credentials_provider/convertors/AWSCredentialsConvertorTest/corruptMFASerialNumber.yaml | garyttierney/kubernetes-credentials-provider-plugin | 5d878e59451ec75acffb6804240debbd517e4bc8 | [
"MIT"
] | 34 | 2018-03-15T19:53:40.000Z | 2021-07-14T15:05:12.000Z | src/test/resources/com/cloudbees/jenkins/plugins/kubernetes_credentials_provider/convertors/AWSCredentialsConvertorTest/corruptMFASerialNumber.yaml | garyttierney/kubernetes-credentials-provider-plugin | 5d878e59451ec75acffb6804240debbd517e4bc8 | [
"MIT"
] | 56 | 2018-03-15T17:12:52.000Z | 2022-03-09T15:33:53.000Z | apiVersion: v1
kind: Secret
metadata:
# this is the jenkins id.
name: "a-test-aws"
labels:
# so we know what type it is.
"jenkins.io/credentials-type": "aws"
annotations:
# description - can not be a label as spaces are not allowed
"jenkins.io/credentials-description" : "credentials from Kubernetes"
type: Opaque
data:
# UTF-8 base64 encoded
accessKey: bXlVc2VybmFtZQ== #myUsername
secretKey: UGEkJHdvcmQ= #Pa$$word
iamMfaSerialNumber: hello
| 25.052632 | 72 | 0.712185 |
73bc1542953c95d611a211545dbe0c9ecbac1fd2 | 486 | yml | YAML | manifests/deployment.yml | Keffjeff/pipelines-javascript-docker | 611b7097cf6253653390741ad239b008e44c2b1f | [
"CC-BY-4.0",
"MIT"
] | null | null | null | manifests/deployment.yml | Keffjeff/pipelines-javascript-docker | 611b7097cf6253653390741ad239b008e44c2b1f | [
"CC-BY-4.0",
"MIT"
] | null | null | null | manifests/deployment.yml | Keffjeff/pipelines-javascript-docker | 611b7097cf6253653390741ad239b008e44c2b1f | [
"CC-BY-4.0",
"MIT"
] | null | null | null | apiVersion : apps/v1
kind: Deployment
metadata:
name: keffjeffpipelinesjavascriptdocker
spec:
replicas: 1
selector:
matchLabels:
app: keffjeffpipelinesjavascriptdocker
template:
metadata:
labels:
app: keffjeffpipelinesjavascriptdocker
spec:
containers:
- name: keffjeffpipelinesjavascriptdocker
image: jtacr.azurecr.io/keffjeffpipelinesjavascriptdocker
ports:
- containerPort: 8080 | 25.578947 | 68 | 0.670782 |
73bcbf647a9284e64fcfdbc4d73170bda5d8ec7e | 1,900 | yaml | YAML | alto-inspect-scott.yaml | scottymcandrew/k8s-google-hackathon-github | 26908fb7574f6b74c951a7180f40f6bfeaf8da82 | [
"Apache-2.0"
] | null | null | null | alto-inspect-scott.yaml | scottymcandrew/k8s-google-hackathon-github | 26908fb7574f6b74c951a7180f40f6bfeaf8da82 | [
"Apache-2.0"
] | 1 | 2020-10-16T19:22:03.000Z | 2020-10-16T19:22:03.000Z | alto-inspect-scott.yaml | scottymcandrew/k8s-google-hackathon-github | 26908fb7574f6b74c951a7180f40f6bfeaf8da82 | [
"Apache-2.0"
] | null | null | null | ################
# CREATE CONFIGMAP IN ADVANCE e.g.
# kubectl create configmap alto-inspect-vars --from-literal=alto.ip=1.1.1.1 -n kube-system
# ##############
apiVersion: apps/v1
kind: DaemonSet
metadata:
name: alto-inspect
namespace: kube-system
spec:
selector:
matchLabels:
app: alto-inspect
template:
metadata:
labels:
app: alto-inspect
spec:
hostNetwork: true
containers:
- name: alto-inspect
image: scotty2hotty/k8s-visibility:v1
env:
- name: FW_IP
valueFrom:
configMapKeyRef:
# The ConfigMap containing the value you want to assign to FW_IP
name: alto-inspect-vars
# Specify the key associated with the value
key: alto.ip
- name: PYTHONPATH
value: "/usr/local/lib/python2.7"
command: [ "/bin/bash", "-c" ]
args:
- echo starting;
echo \n >> /root/strongswan-cfg/ipsec.conf/root/strongswan-cfg/ipsec.conf;
echo " right=$FW_IP" >> /root/strongswan-cfg/ipsec.conf;
/root/nwcfg/runall.sh;
securityContext:
privileged: true
capabilities:
add: ["SYS_ADMIN"]
volumeMounts:
- name: docker-sock-mount
mountPath: /var/run/docker.sock
- name: docker-netns-mount
mountPath: /var/run/netns/
- name: docker-lib-modules
mountPath: /lib/modules/
volumes:
- name: docker-sock-mount
hostPath:
path: /var/run/docker.sock
# directory location on host
- name: docker-netns-mount
hostPath:
path: /var/run/docker/netns/
- name: docker-lib-modules
hostPath:
path: /lib/modules/
| 31.147541 | 90 | 0.528947 |
73bcdf27ffd1852ac88768de19187d1676bb4912 | 1,092 | yaml | YAML | repo/cpd3/modules/adm-mongodb/x86_64/3.0.2/adm/mongodb-role.yaml | horfee/cloud-pak | 5a5800dd05439d32582213c76d0901c526378d79 | [
"Apache-2.0"
] | 104 | 2018-10-30T16:07:27.000Z | 2022-03-29T08:25:28.000Z | repo/cpd3/modules/adm-mongodb/x86_64/3.0.2/adm/mongodb-role.yaml | horfee/cloud-pak | 5a5800dd05439d32582213c76d0901c526378d79 | [
"Apache-2.0"
] | 33 | 2018-11-05T19:35:16.000Z | 2022-03-23T15:52:38.000Z | repo/cpd3/modules/adm-mongodb/x86_64/3.0.2/adm/mongodb-role.yaml | horfee/cloud-pak | 5a5800dd05439d32582213c76d0901c526378d79 | [
"Apache-2.0"
] | 1,244 | 2018-11-18T18:04:47.000Z | 2022-03-30T20:29:05.000Z | kind: Role
apiVersion: rbac.authorization.k8s.io/v1
metadata:
name: mongodb-role
rules:
- apiGroups: [""]
resources: ["pods", "pods/log", "pods/exec"]
verbs: ["get", "list", "patch", "delete", "watch", "update", "create"]
- apiGroups: [""]
resources: ["services"]
verbs: ["get", "list", "patch", "delete", "watch", "update", "create"]
- apiGroups: [""]
resources: ["secrets"]
verbs: ["get", "list", "watch", "patch", "delete", "update", "create"]
- apiGroups: [""]
resources: ["configmaps"]
verbs: ["get", "list", "watch", "patch", "delete", "update", "create"]
- apiGroups: ["batch", "extensions", "apps"]
resources: ["jobs", "deployments"]
verbs: ["get", "list", "watch", "patch", "delete", "update", "create"]
- apiGroups: ["apps"]
resources: ["statefulsets"]
verbs: ["get", "list", "watch", "patch", "delete", "update", "create"]
- apiGroups: ["mongodb.com"]
resources: ["mongodb", "mongodb/finalizers", "mongodbusers", "opsmanagers", "opsmanagers/finalizers"]
verbs: ["get", "list", "watch", "patch", "delete", "update", "create", "deletecollection"]
| 33.090909 | 103 | 0.608059 |
73bd79d30a09388e2762cd9ebf5f17074cb9fa08 | 495 | yaml | YAML | istio_ingress/templates/service.yaml | beantownpub/helm | 6b57486290bbf1f62100969ed0fd2935bf60aac3 | [
"Unlicense"
] | null | null | null | istio_ingress/templates/service.yaml | beantownpub/helm | 6b57486290bbf1f62100969ed0fd2935bf60aac3 | [
"Unlicense"
] | null | null | null | istio_ingress/templates/service.yaml | beantownpub/helm | 6b57486290bbf1f62100969ed0fd2935bf60aac3 | [
"Unlicense"
] | null | null | null | apiVersion: v1
kind: Service
metadata:
labels:
app: istio-ingress
istio: ingress
name: istio-ingress
spec:
ports:
- name: status-port
nodePort: 32382
port: 15021
protocol: TCP
targetPort: 15021
- name: http2
nodePort: 30080
port: 80
protocol: TCP
targetPort: 80
- name: https
nodePort: 30443
port: 443
protocol: TCP
targetPort: 443
selector:
app: istio-ingress
istio: ingress
sessionAffinity: None
type: NodePort
| 16.5 | 23 | 0.648485 |
73bd8933ad2185c3e43dc329807fb69b8ed60223 | 318 | yaml | YAML | tests/tests/legacy_kustomizations/istio-install/test_data/expected/policy_v1beta1_poddisruptionbudget_istio-pilot.yaml | pathologywatch/manifests | 622a1974ef841406b45bd3ae51ba507cbaf4bf89 | [
"Apache-2.0"
] | 376 | 2019-02-27T01:32:34.000Z | 2022-03-29T14:02:39.000Z | tests/tests/legacy_kustomizations/istio-install/test_data/expected/policy_v1beta1_poddisruptionbudget_istio-pilot.yaml | pathologywatch/manifests | 622a1974ef841406b45bd3ae51ba507cbaf4bf89 | [
"Apache-2.0"
] | 2,171 | 2019-02-27T17:37:34.000Z | 2022-03-31T18:16:26.000Z | tests/tests/legacy_kustomizations/istio-install/test_data/expected/policy_v1beta1_poddisruptionbudget_istio-pilot.yaml | pathologywatch/manifests | 622a1974ef841406b45bd3ae51ba507cbaf4bf89 | [
"Apache-2.0"
] | 643 | 2019-02-27T01:49:11.000Z | 2022-03-31T06:31:15.000Z | apiVersion: policy/v1beta1
kind: PodDisruptionBudget
metadata:
labels:
app: pilot
chart: pilot
heritage: Tiller
istio: pilot
release: istio
name: istio-pilot
namespace: istio-system
spec:
minAvailable: 1
selector:
matchLabels:
app: pilot
istio: pilot
release: istio
| 16.736842 | 26 | 0.672956 |
73bd9e17daa328aaeaf3d023a21c071d5b1b8f58 | 100 | yaml | YAML | resources/jobernetes-sa.yaml | AtzeDeVries/jobernetes | def3bf6fd6bfa060313bc65ca04e16d95383c468 | [
"Apache-2.0"
] | 1 | 2017-10-18T21:16:03.000Z | 2017-10-18T21:16:03.000Z | resources/jobernetes-sa.yaml | AtzeDeVries/jobernetes | def3bf6fd6bfa060313bc65ca04e16d95383c468 | [
"Apache-2.0"
] | 3 | 2017-10-19T08:42:49.000Z | 2017-10-29T17:03:20.000Z | resources/jobernetes-sa.yaml | AtzeDeVries/jobernetes | def3bf6fd6bfa060313bc65ca04e16d95383c468 | [
"Apache-2.0"
] | 2 | 2017-10-13T13:27:58.000Z | 2018-12-24T15:20:11.000Z | ---
apiVersion: v1
kind: ServiceAccount
metadata:
labels:
app: jobernetes
name: jobernetes
| 11.111111 | 20 | 0.71 |
73bdc9b925f807990de0c72bd6c98402398e290b | 1,182 | yml | YAML | alertmanager-deployment.yml | arubasu/k8s-prometheus | 2bf1c55c6fc965e04eee9ce19cb44124b80c3e3a | [
"MIT"
] | null | null | null | alertmanager-deployment.yml | arubasu/k8s-prometheus | 2bf1c55c6fc965e04eee9ce19cb44124b80c3e3a | [
"MIT"
] | null | null | null | alertmanager-deployment.yml | arubasu/k8s-prometheus | 2bf1c55c6fc965e04eee9ce19cb44124b80c3e3a | [
"MIT"
] | null | null | null | apiVersion: apps/v1
kind: Deployment
metadata:
name: alertmanager
namespace: monitoring
spec:
replicas: 1
selector:
matchLabels:
app: alertmanager
template:
metadata:
labels:
app: alertmanager
spec:
containers:
- name: prometheus-alertmanager
image: prom/alertmanager:v0.14.0
args:
- --config.file=/etc/config/alertmanager.yml
- --storage.path=/data
- --web.external-url=/
ports:
- containerPort: 9093
volumeMounts:
- mountPath: /etc/config
name: config-volume
- mountPath: /data
name: storage-volume
- name: prometheus-alertmanager-configmap-reload
image: jimmidyson/configmap-reload:v0.1
args:
- --volume-dir=/etc/config
- --webhook-url=http://localhost:9093/-/reload
volumeMounts:
- mountPath: /etc/config
name: config-volume
readOnly: true
volumes:
- configMap:
defaultMode: 420
name: alertmanager-conf
name: config-volume
- emptyDir: {}
name: storage-volume | 26.266667 | 56 | 0.563452 |
73bdf89e45fee352a708981e25c96c491fe137e8 | 144 | yaml | YAML | built-in-references/Kubernetes/perf/violations/violation6665.yaml | sw47/azure-policy | 4a38e4cb4047b5364902653f0defe45f1b21bc61 | [
"MIT"
] | null | null | null | built-in-references/Kubernetes/perf/violations/violation6665.yaml | sw47/azure-policy | 4a38e4cb4047b5364902653f0defe45f1b21bc61 | [
"MIT"
] | null | null | null | built-in-references/Kubernetes/perf/violations/violation6665.yaml | sw47/azure-policy | 4a38e4cb4047b5364902653f0defe45f1b21bc61 | [
"MIT"
] | null | null | null | apiVersion: v1
kind: Pod
metadata:
name: image-demo-6665
spec:
containers:
- name: nginx
image: nginx #ritaacr.azurecr.io/nginx:latest | 18 | 49 | 0.722222 |
73be9e88b14afcb3787d5e1402d3a960fe10cee6 | 66 | yaml | YAML | deploy/100-namespace.yaml | novoselskiy/build | fe6783411a65044d6afba965c6228f77a950e4c4 | [
"Apache-2.0"
] | 351 | 2020-08-24T07:50:58.000Z | 2022-03-28T15:40:08.000Z | deploy/100-namespace.yaml | novoselskiy/build | fe6783411a65044d6afba965c6228f77a950e4c4 | [
"Apache-2.0"
] | 732 | 2020-08-17T16:48:21.000Z | 2022-03-31T18:36:08.000Z | deploy/100-namespace.yaml | novoselskiy/build | fe6783411a65044d6afba965c6228f77a950e4c4 | [
"Apache-2.0"
] | 53 | 2020-08-17T18:12:02.000Z | 2022-03-29T07:42:58.000Z | apiVersion: v1
kind: Namespace
metadata:
name: shipwright-build
| 13.2 | 24 | 0.787879 |
73becd42148bc2843dcb546ecb471a7aae76b5c0 | 386 | yaml | YAML | docs/examples/guides/secret-engines/aws/pod.yaml | eaydogan/docs-1 | 3358b4db85d8800dd4e868a3db1955b65d5fe099 | [
"Apache-2.0"
] | null | null | null | docs/examples/guides/secret-engines/aws/pod.yaml | eaydogan/docs-1 | 3358b4db85d8800dd4e868a3db1955b65d5fe099 | [
"Apache-2.0"
] | null | null | null | docs/examples/guides/secret-engines/aws/pod.yaml | eaydogan/docs-1 | 3358b4db85d8800dd4e868a3db1955b65d5fe099 | [
"Apache-2.0"
] | null | null | null | apiVersion: v1
kind: Pod
metadata:
name: mypod
namespace: trial
spec:
containers:
- name: mypod
image: busybox
command:
- sleep
- "3600"
volumeMounts:
- name: my-vault-volume
mountPath: "/etc/aws"
readOnly: true
serviceAccountName: vault
volumes:
- name: my-vault-volume
persistentVolumeClaim:
claimName: csi-pvc-aws | 18.380952 | 30 | 0.629534 |
73bf032fdd8130c293eb6eca271e744c8a58f175 | 388 | yaml | YAML | pipeline/upstream/base/pipeline/ml-pipeline-viewer-crd-role.yaml | pathologywatch/manifests | 622a1974ef841406b45bd3ae51ba507cbaf4bf89 | [
"Apache-2.0"
] | 376 | 2019-02-27T01:32:34.000Z | 2022-03-29T14:02:39.000Z | pipeline/upstream/base/pipeline/ml-pipeline-viewer-crd-role.yaml | pathologywatch/manifests | 622a1974ef841406b45bd3ae51ba507cbaf4bf89 | [
"Apache-2.0"
] | 2,171 | 2019-02-27T17:37:34.000Z | 2022-03-31T18:16:26.000Z | pipeline/upstream/base/pipeline/ml-pipeline-viewer-crd-role.yaml | pathologywatch/manifests | 622a1974ef841406b45bd3ae51ba507cbaf4bf89 | [
"Apache-2.0"
] | 643 | 2019-02-27T01:49:11.000Z | 2022-03-31T06:31:15.000Z | apiVersion: rbac.authorization.k8s.io/v1
kind: Role
metadata:
name: ml-pipeline-viewer-controller-role
rules:
- apiGroups:
- '*'
resources:
- deployments
- services
verbs:
- create
- get
- list
- watch
- update
- patch
- delete
- apiGroups:
- kubeflow.org
resources:
- viewers
verbs:
- create
- get
- list
- watch
- update
- patch
- delete
| 12.516129 | 42 | 0.623711 |
73bf1199ee2bcd6260df61c677e42e0dd750d8e1 | 99 | yaml | YAML | test/e2e_node/testing-manifests/sriovdp-sa.yaml | lack/kubernetes | aaf4ce1cf2d4201a23e332030ccfeab6c17351fd | [
"Apache-2.0"
] | 84,910 | 2015-08-12T17:45:55.000Z | 2022-03-31T23:39:40.000Z | test/e2e_node/testing-manifests/sriovdp-sa.yaml | lack/kubernetes | aaf4ce1cf2d4201a23e332030ccfeab6c17351fd | [
"Apache-2.0"
] | 98,305 | 2015-08-12T17:35:13.000Z | 2022-03-31T23:46:47.000Z | test/e2e_node/testing-manifests/sriovdp-sa.yaml | lack/kubernetes | aaf4ce1cf2d4201a23e332030ccfeab6c17351fd | [
"Apache-2.0"
] | 36,592 | 2015-08-12T18:36:13.000Z | 2022-03-31T16:22:17.000Z | apiVersion: v1
kind: ServiceAccount
metadata:
name: sriov-device-plugin
namespace: kube-system
| 16.5 | 27 | 0.787879 |
73bf7625b603ab91017916476f744674faebf200 | 2,817 | yaml | YAML | mungegithub/submit-queue/deployment/kubernetes/configmap.yaml | mjbright/kubernetes.contrib | 5de7ce6d1ab70c1459dc193e6ee9658b9788399c | [
"Apache-2.0"
] | null | null | null | mungegithub/submit-queue/deployment/kubernetes/configmap.yaml | mjbright/kubernetes.contrib | 5de7ce6d1ab70c1459dc193e6ee9658b9788399c | [
"Apache-2.0"
] | null | null | null | mungegithub/submit-queue/deployment/kubernetes/configmap.yaml | mjbright/kubernetes.contrib | 5de7ce6d1ab70c1459dc193e6ee9658b9788399c | [
"Apache-2.0"
] | null | null | null | apiVersion: v1
kind: ConfigMap
metadata:
name: kubernetes-sq-config
data:
# basic config options.
config.http-cache-dir: /cache/httpcache
config.organization: kubernetes
config.project: kubernetes
config.pr-mungers: blunderbuss,lgtm-after-commit,cherrypick-auto-approve,label-unapproved-picks,needs-rebase,ok-to-test,rebuild-request,path-label,size,stale-pending-ci,stale-green-ci,block-path,release-note-label,comment-deleter,submit-queue,issue-cacher,flake-manager,old-test-getter,close-stale-pr,docs-need-no-retest,issue-triager,nag-flake-issues
config.state: open
config.token-file: /etc/secret-volume/token
# test-options feature options.
test-options.required-retest-contexts: "\"Jenkins GCE e2e\",\"Jenkins unit/integration\",\"Jenkins verification\",\"Jenkins GCE Node e2e\""
# submit-queue options.
submit-queue.required-contexts: "Jenkins GCE Node e2e"
submit-queue.nonblocking-jenkins-jobs: kubernetes-cross-build,kubernetes-e2e-gke-staging,kubernetes-e2e-gke-staging-parallel,kubernetes-e2e-gce-serial,kubernetes-e2e-gke-serial,kubernetes-e2e-gke-test,kubernetes-e2e-gce-examples,kubernetes-e2e-gce-federation,kubernetes-e2e-gce-scalability,kubernetes-soak-continuous-e2e-gce,kubernetes-soak-continuous-e2e-gke,kubernetes-kubemark-5-gce,kubernetes-kubemark-500-gce,kubernetes-kubemark-gce-scale,kubelet-serial-gce-e2e-ci
submit-queue.jenkins-jobs: kubelet-gce-e2e-ci,kubernetes-build,kubernetes-test-go,kubernetes-verify-master,kubernetes-e2e-gce,kubernetes-e2e-gce-slow,kubernetes-e2e-gke,kubernetes-e2e-gke-slow
submit-queue.presubmit-jobs: kubernetes-pull-build-test-e2e-gce,kubernetes-pull-build-test-e2e-gke,kubernetes-pull-build-test-federation-e2e-gce,node-pull-build-e2e-test
submit-queue.weak-stable-jobs: "\"\""
submit-queue.do-not-merge-milestones: "next-candidate,v1.5,pre-1.5-general,"
submit-queue.admin-port: "9999"
submit-queue.chart-url: http://storage.googleapis.com/kubernetes-test-history/k8s-queue-health.svg
submit-queue.history-url: http://storage.googleapis.com/kubernetes-test-history/static/index.html
# options used by the GCS feature.
gcs.gcs-bucket: kubernetes-jenkins
gcs.gcs-logs-dir: logs
gcs.pull-logs-dir: pr-logs
gcs.pull-key: pull
# munger specific options.
path-label.path-label-config: path-label.txt
block-path.block-path-config: block-path.yaml
gitrepo.repo-dir: /gitrepos
gitrepo.enable-md-yaml: "false"
flake-manager.test-owners-csv: /gitrepos/kubernetes/test/test_owners.csv
old-test-getter.number-of-old-test-results: "5"
assign-fixes.fixes-issue-reassign: "false"
blunderbuss.blunderbuss-reassign: "false"
size.generated-files-config: generated-files.txt
check-labels.label-file: "/gitrepos/kubernetes/labels.yaml"
issue-categorizer.triager-url: "http://issue-triager-service:5000"
| 61.23913 | 471 | 0.789137 |
73bf9cdd4908994042b199bd3b8edb1039658460 | 704 | yml | YAML | lib/pharos/resources/pharos/01-cluster-role-controller-manager.yml | Baremetrics/pharos-cluster | 504a6d1a3c0eaf34e09e4b62952bb76a6d38b99e | [
"Apache-2.0"
] | 315 | 2018-04-03T13:59:16.000Z | 2022-01-25T19:01:05.000Z | lib/pharos/resources/pharos/01-cluster-role-controller-manager.yml | Baremetrics/pharos-cluster | 504a6d1a3c0eaf34e09e4b62952bb76a6d38b99e | [
"Apache-2.0"
] | 743 | 2018-04-03T14:00:11.000Z | 2021-06-06T00:04:17.000Z | lib/pharos/resources/pharos/01-cluster-role-controller-manager.yml | Baremetrics/pharos-cluster | 504a6d1a3c0eaf34e09e4b62952bb76a6d38b99e | [
"Apache-2.0"
] | 48 | 2018-04-16T11:45:09.000Z | 2021-10-17T18:45:04.000Z | # RBAC rules for the kubernetes cloud-controller-manager controllers
---
apiVersion: rbac.authorization.k8s.io/v1
kind: ClusterRole
metadata:
name: system:cloud-controller-manager
rules:
- apiGroups:
- ""
resources:
- events
verbs:
- create
- patch
- update
- apiGroups:
- ""
resources:
- nodes
verbs:
- '*'
- apiGroups:
- ""
resources:
- nodes/status
verbs:
- patch
- apiGroups:
- ""
resources:
- services
verbs:
- list
- patch
- update
- watch
- apiGroups:
- ""
resources:
- serviceaccounts
- secrets
verbs:
- get
- list
- create
- apiGroups:
- ""
resources:
- endpoints
verbs:
- create
- get
- list
- watch
- update | 12.8 | 68 | 0.610795 |
73bfc1d3b46122ddfd6161531a9faa95f6315eae | 249 | yaml | YAML | assets/prometheus-operator/service-account.yaml | tsmetana/cluster-monitoring-operator | 1509a34d53c4ce092ec23e63de50acaca1aac87c | [
"Apache-2.0"
] | null | null | null | assets/prometheus-operator/service-account.yaml | tsmetana/cluster-monitoring-operator | 1509a34d53c4ce092ec23e63de50acaca1aac87c | [
"Apache-2.0"
] | null | null | null | assets/prometheus-operator/service-account.yaml | tsmetana/cluster-monitoring-operator | 1509a34d53c4ce092ec23e63de50acaca1aac87c | [
"Apache-2.0"
] | null | null | null | apiVersion: v1
kind: ServiceAccount
metadata:
labels:
app.kubernetes.io/component: controller
app.kubernetes.io/name: prometheus-operator
app.kubernetes.io/version: v0.43.0
name: prometheus-operator
namespace: openshift-monitoring
| 24.9 | 47 | 0.771084 |
73bfd454b0efe688a6ae4e5ab1d86d29ff9c5488 | 5,646 | yaml | YAML | lunchbadger/gateway/templates/configmap.yaml | niklaushirt/helm-charts | b4cff45a5ea519f817a2813e461bbee11aad2d1b | [
"Apache-2.0"
] | null | null | null | lunchbadger/gateway/templates/configmap.yaml | niklaushirt/helm-charts | b4cff45a5ea519f817a2813e461bbee11aad2d1b | [
"Apache-2.0"
] | 4 | 2019-07-29T11:14:37.000Z | 2019-07-29T11:14:44.000Z | lunchbadger/gateway/templates/configmap.yaml | niklaushirt/helm-charts | b4cff45a5ea519f817a2813e461bbee11aad2d1b | [
"Apache-2.0"
] | 2 | 2019-12-10T08:42:49.000Z | 2020-12-29T17:21:11.000Z | apiVersion: v1
kind: ConfigMap
metadata:
labels:
environment: dev
producer: lunchbadger
name: gateway-lunchbadger-dev
data:
system.config.yml: |-
db:
redis:
emulate: true
host: localhost
port: 6379
namespace: EG
cli:
url: http://localhost:9876
crypto:
cipherKey: sensitiveKey
algorithm: aes256
saltRounds: 10
session:
secret: keyboard cat
resave: false
saveUninitialized: false
accessTokens:
timeToExpiry: 7200000
refreshTokens:
timeToExpiry: 7200000
authorizationCodes:
timeToExpiry: 300000
gateway.config.yml: |-
admin:
port: 9876
hostname: localhost
serviceEndpoints:
backend:
url: {{ .Values.ingressAddress | quote }}
{{- if eq true .Values.production }}
https:
port: 443
tls:
"*.lunchbadger.io":
key: "/etc/lunchbadger-tls/lunchbadger.io.key.pem"
cert: "/etc/lunchbadger-tls/lunchbadger.io.cert.pem"
"api.lunchbadger.com":
key: "/etc/lunchbadger-tls/lunchbadger.com.key.pem"
cert: "/etc/lunchbadger-tls/lunchbadger.com.cert.pem"
"kube-watcher.lunchbadger.com":
key: "/etc/lunchbadger-tls/lunchbadger.com.key.pem"
cert: "/etc/lunchbadger-tls/lunchbadger.com.cert.pem"
"default":
key: "/etc/lunchbadger-tls/lunchbadger.io.key.pem"
cert: "/etc/lunchbadger-tls/lunchbadger.io.cert.pem"
apiEndpoints:
lunchbadger-api:
host: 'api.lunchbadger.com'
path: '*'
kube-watcher-api:
host: 'kube-watcher.lunchbadger.com'
path: '*'
internal-api:
host: 'internal-*-dev.lunchbadger.io'
path: '*'
serverless-api:
host: 'sls-*-dev.lunchbadger.io'
path: '*'
admin-gateway-api:
host: 'admin-*-*-dev.lunchbadger.io'
path: '*'
gateway-traffic:
host: '*-*-dev.lunchbadger.io'
path: '*'
policies:
- proxy
- cors
- expression
- jwt
- terminate
pipelines:
producersAPI:
apiEndpoints:
- lunchbadger-api
policies:
- cors:
- action:
origin:
- {{ .Values.origin | quote }}
credentials: true
- expression:
- action:
jscode: |
const parts = (req.headers['authorization'] || '').split(' '); // '
const authenticated = parts.length === 2 && parts[0].toLowerCase() === 'bearer' && parts[1] === {{ quote .Values.producersAPIKey }};
if (authenticated) {
req.user = { sub: 'wordpress' };
}
- terminate:
- condition:
name: expression
expression: '!req.user'
action:
statusCode: 401
- proxy:
- action:
serviceEndpoint: backend
changeOrigin: false
adminAPI:
apiEndpoints:
- kube-watcher-api
- internal-api
- serverless-api
- admin-gateway-api
policies:
- cors:
- action:
origin:
- {{ .Values.origin | quote }}
credentials: true
- jwt:
- action:
issuer: https://www.lunchbadger.com
audience: 4kzhU5LqlUpQJmjbMevWkWyt9adeKK
checkCredentialExistence: false
algorithms:
- RS256
secretOrPublicKey: | {{ range .Values.jwtPublicKey | split "\\n" }}
{{ . }}{{ end }}
- terminate:
- condition:
name: not
condition:
name: allOf
conditions:
- name: expression
expression: 'req.user && req.user.sub'
- name: oneOf
conditions:
- name: expression
expression: |
const hostParts = req.host.split('-');
req.user.sub === hostParts[0] ||
req.user.sub === hostParts[1] ||
req.user.sub === hostParts[2];
- name: expression
expression: |
const urlParts = req.url.split('/');
req.user.sub===urlParts[2] || req.user.sub===(urlParts[3] || '').split('-')[0];
action:
statusCode: 401
message: Unmatching sub claim
- proxy:
- action:
serviceEndpoint: backend
changeOrigin: false
gatewayTraffic:
apiEndpoints:
- gateway-traffic
policies:
- proxy:
- action:
serviceEndpoint: backend
changeOrigin: false
{{- else }}
http:
port: 80
apiEndpoints:
all:
host: '*'
path: '*'
policies:
- cors
- proxy
pipelines:
all:
apiEndpoints:
- all
policies:
- cors:
- action:
origin:
- http://localhost:8000
- {{ .Values.origin | quote }}
- proxy:
- action:
serviceEndpoint: backend
changeOrigin: false
{{- end }}
| 29.103093 | 150 | 0.463868 |
73c002c04666ef2a1d32bb940990c34c1bc86329 | 261 | yaml | YAML | envoy-headers-body-transformation/lua-filter/k8s/ext-service/svc.yaml | renuka-fernando/demos | e804756a7be8876fc0af8789b7ed1f69edfc3d02 | [
"Apache-2.0"
] | 4 | 2020-10-26T18:00:04.000Z | 2022-03-28T11:27:16.000Z | envoy-headers-body-transformation/lua-filter/k8s/ext-service/svc.yaml | renuka-fernando/demos | e804756a7be8876fc0af8789b7ed1f69edfc3d02 | [
"Apache-2.0"
] | null | null | null | envoy-headers-body-transformation/lua-filter/k8s/ext-service/svc.yaml | renuka-fernando/demos | e804756a7be8876fc0af8789b7ed1f69edfc3d02 | [
"Apache-2.0"
] | null | null | null | apiVersion: v1
kind: Service
metadata:
labels:
choreo.component: ext-bal-service
name: ext-bal-service
spec:
ports:
- name: proxy-http-port
port: 9090
protocol: TCP
targetPort: http-port
selector:
choreo.component: ext-bal-service
| 17.4 | 37 | 0.693487 |
73c01e07bbd51599cd28a3f863182ae66196e6a6 | 53 | yaml | YAML | tests/sdk/python/yaml-test/ns2.yaml | polivbr/pulumi-kubernetes | 36a5fb34240a38a60b52a5f4e55e66e248d9305f | [
"Apache-2.0"
] | 277 | 2018-06-18T14:57:09.000Z | 2022-03-29T04:05:06.000Z | tests/sdk/python/yaml-test/ns2.yaml | polivbr/pulumi-kubernetes | 36a5fb34240a38a60b52a5f4e55e66e248d9305f | [
"Apache-2.0"
] | 1,447 | 2018-06-20T00:58:34.000Z | 2022-03-31T21:28:43.000Z | tests/sdk/python/yaml-test/ns2.yaml | polivbr/pulumi-kubernetes | 36a5fb34240a38a60b52a5f4e55e66e248d9305f | [
"Apache-2.0"
] | 95 | 2018-06-30T03:30:05.000Z | 2022-03-29T04:05:09.000Z | apiVersion: v1
kind: Namespace
metadata:
name: cg2
| 10.6 | 15 | 0.754717 |
73c033fd12a3147bbdeb7e3aa45c8136299ff07f | 1,811 | yaml | YAML | deploy/kubernetes/base/controller.yaml | nelvadas/gcp-compute-persistent-disk-csi-driver | 95946b4cd68d1d65fa9786753b4ec1ba81af2184 | [
"Apache-2.0"
] | null | null | null | deploy/kubernetes/base/controller.yaml | nelvadas/gcp-compute-persistent-disk-csi-driver | 95946b4cd68d1d65fa9786753b4ec1ba81af2184 | [
"Apache-2.0"
] | null | null | null | deploy/kubernetes/base/controller.yaml | nelvadas/gcp-compute-persistent-disk-csi-driver | 95946b4cd68d1d65fa9786753b4ec1ba81af2184 | [
"Apache-2.0"
] | null | null | null | kind: StatefulSet
apiVersion: apps/v1
metadata:
name: csi-gce-pd-controller
spec:
serviceName: "csi-gce-pd"
replicas: 1
selector:
matchLabels:
app: gcp-compute-persistent-disk-csi-driver
template:
metadata:
labels:
app: gcp-compute-persistent-disk-csi-driver
spec:
serviceAccountName: csi-controller-sa
priorityClassName: gce-pd-csi-driver-controller
containers:
- name: csi-provisioner
image: gke.gcr.io/csi-provisioner
args:
- "--v=5"
- "--csi-address=/csi/csi.sock"
- "--feature-gates=Topology=true"
volumeMounts:
- name: socket-dir
mountPath: /csi
- name: csi-attacher
image: gke.gcr.io/csi-attacher
args:
- "--v=5"
- "--csi-address=/csi/csi.sock"
volumeMounts:
- name: socket-dir
mountPath: /csi
- name: gce-pd-driver
# Don't change base image without changing pdImagePlaceholder in
# test/k8s-integration/main.go
image: gke.gcr.io/gcp-compute-persistent-disk-csi-driver
args:
- "--v=5"
- "--endpoint=unix:/csi/csi.sock"
env:
- name: GOOGLE_APPLICATION_CREDENTIALS
value: "/etc/cloud-sa/cloud-sa.json"
volumeMounts:
- name: socket-dir
mountPath: /csi
- name: cloud-sa-volume
readOnly: true
mountPath: "/etc/cloud-sa"
volumes:
- name: socket-dir
emptyDir: {}
- name: cloud-sa-volume
secret:
secretName: cloud-sa
# This is needed due to https://github.com/kubernetes-sigs/kustomize/issues/504
volumeClaimTemplates: []
| 30.183333 | 81 | 0.548868 |
73c12d70bc3dbb3d278115f27b74b9e4d6e1508e | 261 | yaml | YAML | deploy/tilt/parca-agent-serviceAccount.yaml | ltagliamonte-dd/parca-agent | afa2d0c6c4b36c84d0ff1516b9b192e4eace35bd | [
"Apache-2.0"
] | 851 | 2019-05-23T08:04:44.000Z | 2021-09-29T21:34:22.000Z | deploy/tilt/parca-agent-serviceAccount.yaml | ltagliamonte-dd/parca-agent | afa2d0c6c4b36c84d0ff1516b9b192e4eace35bd | [
"Apache-2.0"
] | 129 | 2021-10-05T12:56:42.000Z | 2022-03-30T10:31:39.000Z | deploy/tilt/parca-agent-serviceAccount.yaml | mrueg/parca | 39fcad0cc1e702f481d00d51ebe381a9f764a323 | [
"Apache-2.0"
] | 48 | 2019-05-22T15:19:38.000Z | 2021-09-18T15:17:49.000Z | apiVersion: v1
kind: ServiceAccount
metadata:
labels:
app.kubernetes.io/component: observability
app.kubernetes.io/instance: parca-agent
app.kubernetes.io/name: parca-agent
app.kubernetes.io/version: dev
name: parca-agent
namespace: parca
| 23.727273 | 46 | 0.750958 |
73c15e1472b4065a25142babae976c3851c4642f | 2,822 | yaml | YAML | envoy-jaeger/envoy.yaml | owlvey/devops | a1c5f1a8bbb47715e55052a43d22096a7576f643 | [
"Apache-2.0"
] | null | null | null | envoy-jaeger/envoy.yaml | owlvey/devops | a1c5f1a8bbb47715e55052a43d22096a7576f643 | [
"Apache-2.0"
] | null | null | null | envoy-jaeger/envoy.yaml | owlvey/devops | a1c5f1a8bbb47715e55052a43d22096a7576f643 | [
"Apache-2.0"
] | null | null | null | apiVersion: v1
kind: ConfigMap
metadata:
name: envoy-cm
namespace: owlvey
data:
envoy.yml: |
admin:
access_log_path: /tmp/admin_access.log
address:
socket_address:
protocol: TCP
address: 127.0.0.1
port_value: 9901
static_resources:
listeners:
- name: listener_0
address:
socket_address:
protocol: TCP
address: 0.0.0.0
port_value: 10000
traffic_direction: OUTBOUND
filter_chains:
- filters:
- name: envoy.filters.network.http_connection_manager
typed_config:
"@type": type.googleapis.com/envoy.config.filter.network.http_connection_manager.v2.HttpConnectionManager
generate_request_id: true
tracing:
provider:
name: envoy.tracers.zipkin
typed_config:
"@type": type.googleapis.com/envoy.config.trace.v2.ZipkinConfig
collector_cluster: jaeger
collector_endpoint: "/api/v2/spans"
shared_span_context: false
collector_endpoint_version: HTTP_JSON
codec_type: auto
access_log:
- name: envoy.access_loggers.file
typed_config:
"@type": type.googleapis.com/envoy.config.accesslog.v2.FileAccessLog
path: "/tmp/access.log"
stat_prefix: ingress_http
route_config:
name: local_route
virtual_hosts:
- name: local_service
domains: ["*"]
routes:
- match:
prefix: "/"
route:
cluster: service_owlvey_api
http_filters:
- name: envoy.filters.http.router
typed_config: {}
clusters:
- name: jaeger
connect_timeout: 1s
type: strict_dns
lb_policy: round_robin
load_assignment:
cluster_name: jaeger
endpoints:
- lb_endpoints:
- endpoint:
address:
socket_address:
address: jaeger-service.owlvey.svc.cluster.local
port_value: 9411
- name: service_owlvey_api
connect_timeout: 1s
type: strict_dns
lb_policy: round_robin
load_assignment:
cluster_name: local_service
endpoints:
- lb_endpoints:
- endpoint:
address:
socket_address:
address: service-api.owlvey.svc.cluster.local
port_value: 48100
| 32.813953 | 119 | 0.50815 |