hexsha
stringlengths 40
40
| size
int64 24
1.05M
| ext
stringclasses 2
values | lang
stringclasses 1
value | max_stars_repo_path
stringlengths 5
269
| max_stars_repo_name
stringlengths 7
107
| max_stars_repo_head_hexsha
stringlengths 40
78
| max_stars_repo_licenses
sequence | max_stars_count
int64 1
84.9k
⌀ | max_stars_repo_stars_event_min_datetime
stringlengths 24
24
⌀ | max_stars_repo_stars_event_max_datetime
stringlengths 24
24
⌀ | max_issues_repo_path
stringlengths 5
269
| max_issues_repo_name
stringlengths 7
107
| max_issues_repo_head_hexsha
stringlengths 40
78
| max_issues_repo_licenses
sequence | max_issues_count
int64 1
116k
⌀ | max_issues_repo_issues_event_min_datetime
stringlengths 24
24
⌀ | max_issues_repo_issues_event_max_datetime
stringlengths 24
24
⌀ | max_forks_repo_path
stringlengths 5
269
| max_forks_repo_name
stringlengths 7
107
| max_forks_repo_head_hexsha
stringlengths 40
78
| max_forks_repo_licenses
sequence | max_forks_count
int64 1
55.9k
⌀ | max_forks_repo_forks_event_min_datetime
stringlengths 24
24
⌀ | max_forks_repo_forks_event_max_datetime
stringlengths 24
24
⌀ | content
stringlengths 24
1.05M
| avg_line_length
float64 1
304k
| max_line_length
int64 14
1.03M
| alphanum_fraction
float64 0
1
|
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
73db7f853e5494b5fce04e6f0adc401bee27e1bb | 573 | yaml | YAML | kubernetes/deployment.yaml | guilhermehardt/ecsdemo-nodejs | 82f9fe893104111a7fddab71484a2c7b0cc48632 | [
"MIT"
] | null | null | null | kubernetes/deployment.yaml | guilhermehardt/ecsdemo-nodejs | 82f9fe893104111a7fddab71484a2c7b0cc48632 | [
"MIT"
] | null | null | null | kubernetes/deployment.yaml | guilhermehardt/ecsdemo-nodejs | 82f9fe893104111a7fddab71484a2c7b0cc48632 | [
"MIT"
] | null | null | null | apiVersion: apps/v1
kind: Deployment
metadata:
name: ecsdemo-nodejs
labels:
app: ecsdemo-nodejs
namespace: default
spec:
replicas: 2
selector:
matchLabels:
app: ecsdemo-nodejs
strategy:
rollingUpdate:
maxSurge: 50%
maxUnavailable: 50%
type: RollingUpdate
template:
metadata:
labels:
app: ecsdemo-nodejs
spec:
containers:
- image: brentley/ecsdemo-nodejs:latest
imagePullPolicy: Always
name: ecsdemo-nodejs
ports:
- containerPort: 3000
protocol: TCP
| 19.1 | 45 | 0.628272 |
73dbb65bbdbac5043e65b93430b4e8b506bf4185 | 2,240 | yaml | YAML | tekton/configmaps/environment.yaml | vietstacker/manuela-dev-meetup | 42444a4fa3b337ae0e237dc5b5f5c981ae24d633 | [
"Apache-2.0"
] | null | null | null | tekton/configmaps/environment.yaml | vietstacker/manuela-dev-meetup | 42444a4fa3b337ae0e237dc5b5f5c981ae24d633 | [
"Apache-2.0"
] | null | null | null | tekton/configmaps/environment.yaml | vietstacker/manuela-dev-meetup | 42444a4fa3b337ae0e237dc5b5f5c981ae24d633 | [
"Apache-2.0"
] | null | null | null | apiVersion: v1
kind: ConfigMap
metadata:
name: environment
data:
GIT_EMAIL: "[email protected]"
GIT_USERNAME: "Tutj"
GIT_DEV_REPO_URL: https://github.com/vietstacker/manuela-dev-meetup.git
GIT_OPS_REPO_TEST_URL: https://github.com/vietstacker/manuela-gitops-meetup.git
GIT_OPS_REPO_PROD_URL: https://github.com/vietstacker/manuela-gitops-meetup.git
IOT_CONSUMER_REMOTE_IMAGE: quay.io/hluong/iot-consumer
IOT_CONSUMER_YAML_PATH: images.(name==messaging).newTag
IOT_CONSUMER_TEST_KUSTOMIZATION_PATH: config/instances/manuela-tst/kustomization.yaml
IOT_CONSUMER_PROD_KUSTOMIZATION_PATH: config/templates/manuela-openshift/messaging/kustomization.yaml
IOT_CONSUMER_PROD_IMAGESTREAM_PATH: config/templates/manuela-openshift/messaging/messaging-is.yaml
IOT_FRONTEND_REMOTE_IMAGE: quay.io/hluong/iot-frontend
IOT_FRONTEND_YAML_PATH: images.(name==line-dashboard).newTag
IOT_FRONTEND_TEST_KUSTOMIZATION_PATH: config/instances/manuela-tst/kustomization.yaml
IOT_FRONTEND_PROD_KUSTOMIZATION_PATH: config/templates/manuela-openshift/line-dashboard/kustomization.yaml
IOT_FRONTEND_PROD_IMAGESTREAM_PATH: config/templates/manuela-openshift/line-dashboard/line-dashboard-is.yaml
IOT_SWSENSOR_REMOTE_IMAGE: quay.io/hluong/iot-software-sensor
IOT_SWSENSOR_YAML_PATH: images.(name==machine-sensor).newTag
IOT_SWSENSOR_TEST_KUSTOMIZATION_PATH: config/instances/manuela-tst/kustomization.yaml
IOT_SWSENSOR_PROD_KUSTOMIZATION_PATH: config/templates/manuela-openshift/machine-sensor/kustomization.yaml
IOT_SWSENSOR_PROD_IMAGESTREAM_PATH: config/templates/manuela-openshift/machine-sensor/machine-sensor-is.yaml
IOT_ANOMALY_REMOTE_IMAGE: quay.io/hluong/iot-anomaly-detection
IOT_ANOMALY_YAML_PATH: images.(name==anomaly-detection).newTag
IOT_ANOMALY_TEST_KUSTOMIZATION_PATH: config/instances/manuela-tst/kustomization.yaml
IOT_ANOMALY_PROD_KUSTOMIZATION_PATH: config/templates/manuela-openshift/anomaly-detection/kustomization.yaml
IOT_ANOMALY_PROD_IMAGESTREAM_PATH: config/templates/manuela-openshift/anomaly-detection/anomaly-detection-is.yaml
BUMPVERSION_REMOTE_IMAGE: quay.io/hluong/bumpversion
HTTPD_IONIC_REMOTE_IMAGE: quay.io/hluong/httpd-ionic
PUSHPROX_REMOTE_IMAGE: quay.io/manuela/pushprox
| 65.882353 | 115 | 0.855357 |
73dbbf58fd10cebd5a5f972d66aeb706dd6a649c | 3,457 | yaml | YAML | Templates/kafka/cm.yaml | Gitwangshuo/dockerfiles | 36e0285b704d594fda3e49bef5c5ec474865fd64 | [
"Apache-2.0"
] | null | null | null | Templates/kafka/cm.yaml | Gitwangshuo/dockerfiles | 36e0285b704d594fda3e49bef5c5ec474865fd64 | [
"Apache-2.0"
] | null | null | null | Templates/kafka/cm.yaml | Gitwangshuo/dockerfiles | 36e0285b704d594fda3e49bef5c5ec474865fd64 | [
"Apache-2.0"
] | null | null | null | apiVersion: v1
kind: ConfigMap
metadata:
name: kafka
namespace: default
labels:
app: kafka
kubernetes.io/cluster-service: "true"
data:
server.properties: |
listeners=PLAINTEXT://:9093
zookeeper.connect=
log.dir=/var/lib/kafka
auto.create.topics.enable=true
auto.leader.rebalance.enable=true
background.threads=10
compression.type=producer
delete.topic.enable=false
leader.imbalance.check.interval.seconds=300
leader.imbalance.per.broker.percentage=10
log.flush.interval.messages=9223372036854775807
log.flush.offset.checkpoint.interval.ms=60000
log.flush.scheduler.interval.ms=9223372036854775807
log.retention.bytes=-1
log.retention.hours=168
log.roll.hours=168
log.roll.jitter.hours=0
log.segment.bytes=1073741824
log.segment.delete.delay.ms=60000
message.max.bytes=1000012
min.insync.replicas=1
num.io.threads=8
num.network.threads=3
num.recovery.threads.per.data.dir=1
num.replica.fetchers=1
offset.metadata.max.bytes=4096
offsets.commit.required.acks=-1
offsets.commit.timeout.ms=5000
offsets.load.buffer.size=5242880
offsets.retention.check.interval.ms=600000
offsets.retention.minutes=1440
offsets.topic.compression.codec=0
offsets.topic.num.partitions=50
offsets.topic.replication.factor=3
offsets.topic.segment.bytes=104857600
queued.max.requests=500
quota.consumer.default=9223372036854775807
quota.producer.default=9223372036854775807
replica.fetch.min.bytes=1
replica.fetch.wait.max.ms=500
replica.high.watermark.checkpoint.interval.ms=5000
replica.lag.time.max.ms=10000
replica.socket.receive.buffer.bytes=65536
replica.socket.timeout.ms=30000
request.timeout.ms=30000
socket.receive.buffer.bytes=102400
socket.request.max.bytes=104857600
socket.send.buffer.bytes=102400
unclean.leader.election.enable=true
zookeeper.session.timeout.ms=6000
zookeeper.set.acl=false
broker.id.generation.enable=true
connections.max.idle.ms=600000
controlled.shutdown.enable=true
controlled.shutdown.max.retries=3
controlled.shutdown.retry.backoff.ms=5000
controller.socket.timeout.ms=30000
default.replication.factor=1
fetch.purgatory.purge.interval.requests=1000
group.max.session.timeout.ms=300000
group.min.session.timeout.ms=6000
log.cleaner.backoff.ms=15000
log.cleaner.dedupe.buffer.size=134217728
log.cleaner.delete.retention.ms=86400000
log.cleaner.enable=true
log.cleaner.io.buffer.load.factor=0.9
log.cleaner.io.buffer.size=524288
log.cleaner.io.max.bytes.per.second=1.7976931348623157E308
log.cleaner.min.cleanable.ratio=0.5
log.cleaner.min.compaction.lag.ms=0
log.cleaner.threads=1
log.cleanup.policy=delete
log.index.interval.bytes=4096
log.index.size.max.bytes=10485760
log.message.timestamp.difference.max.ms=9223372036854775807
log.message.timestamp.type=CreateTime
log.preallocate=false
log.retention.check.interval.ms=300000
max.connections.per.ip=2147483647
num.partitions=1
producer.purgatory.purge.interval.requests=1000
replica.fetch.backoff.ms=1000
replica.fetch.max.bytes=1048576
replica.fetch.response.max.bytes=10485760
reserved.broker.max.id=1000 | 36.389474 | 64 | 0.722881 |
73dbf1ae17e696de2c4b9d220b66317538f4ee95 | 7,547 | yaml | YAML | k8s/us-central1/gen/tf-r2.4.0-ncf-func-k80-x8.yaml | will-cromar/ml-testing-accelerators | 7d4837085931c97ee54e0df8f0a6ae5a47360dfc | [
"Apache-2.0"
] | null | null | null | k8s/us-central1/gen/tf-r2.4.0-ncf-func-k80-x8.yaml | will-cromar/ml-testing-accelerators | 7d4837085931c97ee54e0df8f0a6ae5a47360dfc | [
"Apache-2.0"
] | null | null | null | k8s/us-central1/gen/tf-r2.4.0-ncf-func-k80-x8.yaml | will-cromar/ml-testing-accelerators | 7d4837085931c97ee54e0df8f0a6ae5a47360dfc | [
"Apache-2.0"
] | null | null | null | # Copyright 2020 Google LLC
#
# Licensed under the Apache License, Version 2.0 (the "License");
# you may not use this file except in compliance with the License.
# You may obtain a copy of the License at
#
# https://www.apache.org/licenses/LICENSE-2.0
#
# Unless required by applicable law or agreed to in writing, software
# distributed under the License is distributed on an "AS IS" BASIS,
# WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
# See the License for the specific language governing permissions and
# limitations under the License.
"apiVersion": "batch/v1beta1"
"kind": "CronJob"
"metadata":
"labels":
"accelerator": "k80-x8"
"benchmarkId": "tf-r2.4.0-ncf-func-k80-x8"
"frameworkVersion": "tf-r2.4.0"
"mode": "func"
"model": "ncf"
"name": "tf-r2.4.0-ncf-func-k80-x8"
"namespace": "automated"
"spec":
"concurrencyPolicy": "Forbid"
"jobTemplate":
"metadata":
"annotations":
"ml-testing-accelerators/gcs-subdir": "tf-r2.4.0/ncf/func/k80-x8"
"ml-testing-accelerators/metric-config": |
{
"sources": [
{
"literals": {
"assertions": {
"duration": {
"inclusive_bounds": false,
"std_devs_from_mean": {
"comparison": "LESS",
"std_devs": 5
},
"wait_for_n_data_points": 10
}
}
}
},
{
"tensorboard": {
"aggregate_assertions": [
{
"assertion": {
"inclusive_bounds": true,
"std_devs_from_mean": {
"comparison": "GREATER",
"std_devs": 2
},
"wait_for_n_data_points": 0
},
"strategy": "AVERAGE",
"tag": "examples_per_second"
}
],
"exclude_tags": [
],
"include_tags": [
{
"strategies": [
"FINAL"
],
"tag_pattern": "*"
}
],
"merge_runs": false
}
}
]
}
"labels":
"accelerator": "k80-x8"
"benchmarkId": "tf-r2.4.0-ncf-func-k80-x8"
"frameworkVersion": "tf-r2.4.0"
"mode": "func"
"model": "ncf"
"spec":
"activeDeadlineSeconds": 3600
"backoffLimit": 1
"template":
"spec":
"containers":
- "args":
- "python3"
- "official/recommendation/ncf_keras_main.py"
- "--train_dataset_path=$(NCF_DIR)/tpu_data_dir/training_cycle_*/*"
- "--eval_dataset_path=$(NCF_DIR)/tpu_data_dir/eval_data/*"
- "--input_meta_data_path=$(NCF_DIR)/tpu_data_dir/metadata"
- "--data_dir=$(NCF_DIR)/movielens_data"
- "--batch_size=99000"
- "--learning_rate=3e-5"
- "--dataset=ml-20m"
- "--eval_batch_size=160000"
- "--learning_rate=0.00382059"
- "--beta1=0.783529"
- "--beta2=0.909003"
- "--epsilon=1.45439e-07"
- "--num_factors=64"
- "--hr_threshold=0.635"
- "--layers=256,256,128,64"
- "--use_synthetic_data=false"
- "--model_dir=$(MODEL_DIR)"
- "--train_epochs=1"
- "--ml_perf=true"
- "--keras_use_ctl=false"
"env":
- "name": "POD_NAME"
"valueFrom":
"fieldRef":
"fieldPath": "metadata.name"
- "name": "POD_UID"
"valueFrom":
"fieldRef":
"fieldPath": "metadata.uid"
- "name": "POD_NAMESPACE"
"valueFrom":
"fieldRef":
"fieldPath": "metadata.namespace"
- "name": "JOB_NAME"
"valueFrom":
"fieldRef":
"fieldPath": "metadata.labels['job-name']"
- "name": "MODEL_DIR"
"value": "$(OUTPUT_BUCKET)/tf-r2.4.0/ncf/func/k80-x8/$(JOB_NAME)"
"envFrom":
- "configMapRef":
"name": "gcs-buckets"
"image": "gcr.io/xl-ml-test/tensorflow:r2.4.0"
"imagePullPolicy": "Always"
"name": "train"
"resources":
"limits":
"nvidia.com/gpu": 8
"requests":
"cpu": 2
"memory": "20G"
"volumeMounts":
- "mountPath": "/dev/shm"
"name": "dshm"
"readOnly": false
"initContainers":
- "env":
- "name": "POD_NAME"
"valueFrom":
"fieldRef":
"fieldPath": "metadata.name"
- "name": "POD_UID"
"valueFrom":
"fieldRef":
"fieldPath": "metadata.uid"
- "name": "POD_NAMESPACE"
"valueFrom":
"fieldRef":
"fieldPath": "metadata.namespace"
- "name": "JOB_NAME"
"valueFrom":
"fieldRef":
"fieldPath": "metadata.labels['job-name']"
- "name": "MODEL_DIR"
"value": "$(OUTPUT_BUCKET)/tf-r2.4.0/ncf/func/k80-x8/$(JOB_NAME)"
- "name": "METRIC_CONFIG"
"value": |
{
"metric_collection_config": {
"default_aggregation_strategies": [
"final"
],
"metric_to_aggregation_strategies": {
"examples_per_second": [
"average"
]
},
"use_run_name_prefix": true,
"write_to_bigquery": true
},
"regression_test_config": {
"metric_success_conditions": {
"examples_per_second_average": {
"comparison": "greater_or_equal",
"success_threshold": {
"stddevs_from_mean": 2
}
},
"total_wall_time": {
"comparison": "less",
"success_threshold": {
"stddevs_from_mean": 5
},
"wait_for_n_points_of_history": 10
}
}
},
"test_name": "tf-r2.4.0-ncf-func-k80-x8"
}
"envFrom":
- "configMapRef":
"name": "gcs-buckets"
"image": "gcr.io/xl-ml-test/publisher:stable"
"imagePullPolicy": "Always"
"name": "publisher"
"nodeSelector":
"cloud.google.com/gke-accelerator": "nvidia-tesla-k80"
"priorityClassName": "gpu-k80"
"restartPolicy": "Never"
"volumes":
- "emptyDir":
"medium": "Memory"
"name": "dshm"
"schedule": "0 6 * * *"
"successfulJobsHistoryLimit": 1 | 34.304545 | 79 | 0.422817 |
73dc29a777c8e9a6573a7d25a24f777eb8b5dd38 | 508 | yaml | YAML | module02/01-myappspa-pod.yaml | MirecX/java-k8s-workshop | a9681f1967e7ee0cabe23025dd7fda49ee61d924 | [
"MIT"
] | null | null | null | module02/01-myappspa-pod.yaml | MirecX/java-k8s-workshop | a9681f1967e7ee0cabe23025dd7fda49ee61d924 | [
"MIT"
] | null | null | null | module02/01-myappspa-pod.yaml | MirecX/java-k8s-workshop | a9681f1967e7ee0cabe23025dd7fda49ee61d924 | [
"MIT"
] | null | null | null |
kind: Pod
apiVersion: v1
metadata:
name: spa
spec:
containers:
- name: myappspa
image: mirofinstat001.azurecr.io/myappspa:v1 # Best practice - always define specific tag, do not rely on latest
imagePullPolicy: Always # Best practice for security - user will no access to image might get it from local cache
env:
- name: NGINX_HTTP_PORT_NUMBER
value: "8080"
ports: # We cannot run on ports <1024 because that would require root
- containerPort: 8080
| 31.75 | 122 | 0.688976 |
73dc30d8a7d851d6517d61d3145e8045a7afb2a4 | 798 | yaml | YAML | MehirStuff/spacy_ner/kubernetes_dir/spacy_jobs/make3.yaml | recommeddit/Labs | 292fd2087e420d9b61126408e9e36d1191e8a39b | [
"MIT"
] | 1 | 2022-02-27T23:57:55.000Z | 2022-02-27T23:57:55.000Z | MehirStuff/spacy_ner/kubernetes_dir/spacy_jobs/make3.yaml | recommeddit/Labs | 292fd2087e420d9b61126408e9e36d1191e8a39b | [
"MIT"
] | 24 | 2021-10-11T00:57:49.000Z | 2022-03-02T05:11:54.000Z | MehirStuff/spacy_ner/kubernetes_dir/spacy_jobs/make3.yaml | recommeddit/Labs | 292fd2087e420d9b61126408e9e36d1191e8a39b | [
"MIT"
] | null | null | null | apiVersion: batch/v1
kind: Job
metadata:
name: spacy-job3
namespace: recommeddit
spec:
template:
spec:
containers:
- name: spacy-pod
image: mehir123/spacy:latest
command: ["/bin/sh"]
args: ["-c", "wandb agent mehir/spacy_ner/5sxp9iui & wandb agent mehir/spacy_ner/5sxp9iui"]
resources:
limits:
memory: 10Gi
cpu: 2
nvidia.com/gpu: 1
ephemeral-storage: 5Gi
requests:
memory: 10Gi
cpu: 2
nvidia.com/gpu: 1
ephemeral-storage: 5Gi
volumeMounts:
- mountPath: /tempstore
name: tempstore
volumes:
- name: tempstore
emptyDir: {}
restartPolicy: Never
backoffLimit: 4
| 24.181818 | 99 | 0.532581 |
73dc47bfc103c3dd8bdfce79fb91c199f322960c | 1,276 | yaml | YAML | example-yaml/deployment-for-hpa.yaml | ImagineLearning/kubernetes-docker-desktop | 167f9deb6c06161f07168ee971b3a7a99b8f8fd3 | [
"MIT"
] | null | null | null | example-yaml/deployment-for-hpa.yaml | ImagineLearning/kubernetes-docker-desktop | 167f9deb6c06161f07168ee971b3a7a99b8f8fd3 | [
"MIT"
] | null | null | null | example-yaml/deployment-for-hpa.yaml | ImagineLearning/kubernetes-docker-desktop | 167f9deb6c06161f07168ee971b3a7a99b8f8fd3 | [
"MIT"
] | null | null | null | apiVersion: apps/v1
kind: Deployment
metadata:
name: rainbow-deployment
labels:
app: rainbow
spec:
replicas: 3
selector:
matchLabels:
app: rainbow
template:
metadata:
labels:
app: rainbow
spec:
containers:
- name: rainbow
image: nginx
env:
- name: PODNAME
valueFrom:
fieldRef:
fieldPath: metadata.name
- name: nginx_conf
value: |-
user nginx;
worker_processes 1;
error_log /var/log/nginx/error.log warn;
pid /var/run/nginx.pid;
events {
worker_connections 1024;
}
http {
server {
listen 80;
location / {
default_type text/plain;
return 200 '${PODNAME}';
}
}
}
command:
- '/bin/sh'
- '-c'
- 'echo $nginx_conf > /nginx.conf.template && envsubst < /nginx.conf.template > /etc/nginx/nginx.conf && exec nginx -g "daemon off;"'
resources:
limits:
cpu: 50m
memory: 50Mi
requests:
cpu: 1m
memory: 1Mi
| 22.385965 | 141 | 0.453762 |
73dc6250aa7a414a66547f4e86d53b20e58c9b0c | 642 | yaml | YAML | workshop/Lab2/guestbook-deployment.yaml | IBM/svccat | 7b893fbb56ab8b2a69120fdd0203c7ae56fb62f9 | [
"Apache-2.0"
] | 5 | 2019-05-07T16:06:50.000Z | 2020-06-20T06:29:19.000Z | workshop/Lab2/guestbook-deployment.yaml | IBM/svccat | 7b893fbb56ab8b2a69120fdd0203c7ae56fb62f9 | [
"Apache-2.0"
] | 2 | 2018-06-08T13:57:04.000Z | 2019-04-07T02:54:29.000Z | workshop/Lab2/guestbook-deployment.yaml | IBM/svccat | 7b893fbb56ab8b2a69120fdd0203c7ae56fb62f9 | [
"Apache-2.0"
] | 7 | 2018-06-26T01:19:50.000Z | 2020-06-29T14:07:13.000Z | apiVersion: apps/v1
kind: Deployment
metadata:
name: guestbook
labels:
app: guestbook
spec:
replicas: 1
selector:
matchLabels:
app: guestbook
template:
metadata:
labels:
app: guestbook
spec:
containers:
- name: guestbook
image: ibmcom/guestbook:v1
ports:
- name: http-server
containerPort: 3000
env:
- name: REDIS_MASTER_SERVICE_HOST
value: "INSERT_HOST_HERE"
- name: REDIS_MASTER_SERVICE_PORT
value: "INSERT_PORT_HERE"
- name: REDIS_MASTER_SERVICE_PASSWORD
value: "INSERT_PASSWORD_HERE"
| 21.4 | 45 | 0.61215 |
73dc836aa4bbaddd386f9bed50f1573605b00c38 | 602 | yml | YAML | frontend.yml | CloudNativeCZ/public-cloud-kubernetes-demo | 53acd0754d51fea7b228264b392cd17fe20d3e3e | [
"MIT"
] | null | null | null | frontend.yml | CloudNativeCZ/public-cloud-kubernetes-demo | 53acd0754d51fea7b228264b392cd17fe20d3e3e | [
"MIT"
] | 1 | 2018-06-20T07:54:11.000Z | 2018-06-20T07:54:11.000Z | frontend.yml | CloudNativeCZ/public-cloud-kubernetes-demo | 53acd0754d51fea7b228264b392cd17fe20d3e3e | [
"MIT"
] | null | null | null | apiVersion: apps/v1 # for versions before 1.9.0 use apps/v1beta2
kind: Deployment
metadata:
name: frontend
labels:
app: frontend
spec:
selector:
matchLabels:
app: frontend
role: master
tier: frontend
replicas: 1
template:
metadata:
labels:
app: frontend
role: master
tier: frontend
spec:
containers:
- name: frontend
image: pkotas/kubernetes-demo-frontend:latest # or just image: redis
imagePullPolicy: Always
ports:
- containerPort: 80
- containerPort: 8080
| 21.5 | 79 | 0.598007 |
73dd65073bf3c87c476d1eff8515e838d36c76be | 693 | yml | YAML | ngnix_php-fpm/ngnix_config.yml | roelsieg/test_minikube | 8540de2f413861d39269777521063757d043e19e | [
"CC0-1.0"
] | null | null | null | ngnix_php-fpm/ngnix_config.yml | roelsieg/test_minikube | 8540de2f413861d39269777521063757d043e19e | [
"CC0-1.0"
] | null | null | null | ngnix_php-fpm/ngnix_config.yml | roelsieg/test_minikube | 8540de2f413861d39269777521063757d043e19e | [
"CC0-1.0"
] | null | null | null | apiVersion: v1
kind: ConfigMap
metadata:
name: nginx-config
data:
nginx.conf: |
server {
index index.php index.html;
error_log /var/log/nginx/error.log;
access_log /var/log/nginx/access.log;
root /var/www/html;
location / {
try_files $uri $uri/ /index.php?$query_string;
}
location ~ .php$ {
try_files $uri =404;
fastcgi_split_path_info ^(.+.php)(/.+)$;
fastcgi_pass php-fpm-service:9000;
fastcgi_index index.php;
include fastcgi_params;
fastcgi_param SCRIPT_FILENAME $document_root$fastcgi_script_name;
fastcgi_param PATH_INFO $fastcgi_path_info;
}
}
| 27.72 | 75 | 0.614719 |
73dd82a49779c86cf6ecb880efbcfcb1ef303c8f | 312 | yaml | YAML | examples/clusterctl/clusterrolebinding.yaml | xunpan/cluster-api-provider-ibmcloud | 7a9f60cfcffebe9e4dfaaa7126b89a747863460f | [
"Apache-2.0"
] | null | null | null | examples/clusterctl/clusterrolebinding.yaml | xunpan/cluster-api-provider-ibmcloud | 7a9f60cfcffebe9e4dfaaa7126b89a747863460f | [
"Apache-2.0"
] | null | null | null | examples/clusterctl/clusterrolebinding.yaml | xunpan/cluster-api-provider-ibmcloud | 7a9f60cfcffebe9e4dfaaa7126b89a747863460f | [
"Apache-2.0"
] | null | null | null | apiVersion: rbac.authorization.k8s.io/v1
kind: ClusterRoleBinding
metadata:
name: ibmcloud-admin-role-binding
labels:
app: clusterctl
roleRef:
apiGroup: rbac.authorization.k8s.io
kind: ClusterRole
name: ibmcloud-service-account
subjects:
- kind: ServiceAccount
name: ibmcloud-service-account
| 22.285714 | 40 | 0.772436 |
73ddd1b404d6d6deb875db3a1ee1bb4c8abf294f | 211 | yaml | YAML | deploy/backup-s3.yaml | jwenjian/percona-server-mongodb-operator | 44c9db2e30792c9bece7f970a9841fa1df7d1a6d | [
"Apache-2.0"
] | 325 | 2019-03-11T08:05:50.000Z | 2022-03-29T03:35:21.000Z | deploy/backup-s3.yaml | jwenjian/percona-server-mongodb-operator | 44c9db2e30792c9bece7f970a9841fa1df7d1a6d | [
"Apache-2.0"
] | 645 | 2019-03-17T10:02:38.000Z | 2022-03-31T17:33:51.000Z | deploy/backup-s3.yaml | jwenjian/percona-server-mongodb-operator | 44c9db2e30792c9bece7f970a9841fa1df7d1a6d | [
"Apache-2.0"
] | 148 | 2019-03-17T07:16:58.000Z | 2022-03-23T15:12:37.000Z | apiVersion: v1
kind: Secret
metadata:
name: my-cluster-name-backup-s3
type: Opaque
data:
AWS_ACCESS_KEY_ID: UkVQTEFDRS1XSVRILUFXUy1BQ0NFU1MtS0VZ
AWS_SECRET_ACCESS_KEY: UkVQTEFDRS1XSVRILUFXUy1TRUNSRVQtS0VZ
| 23.444444 | 61 | 0.848341 |
73de7219f18e06db9ed48bda34530f5d04e89453 | 1,612 | yaml | YAML | control-plane-operator/controllers/hostedcontrolplane/assets/olm/catalog-certified.deployment.yaml | mdelder/hypershift | 4fc9a8e2c9ecbabc9b1671b4c55951bae6cb019e | [
"Apache-2.0"
] | null | null | null | control-plane-operator/controllers/hostedcontrolplane/assets/olm/catalog-certified.deployment.yaml | mdelder/hypershift | 4fc9a8e2c9ecbabc9b1671b4c55951bae6cb019e | [
"Apache-2.0"
] | null | null | null | control-plane-operator/controllers/hostedcontrolplane/assets/olm/catalog-certified.deployment.yaml | mdelder/hypershift | 4fc9a8e2c9ecbabc9b1671b4c55951bae6cb019e | [
"Apache-2.0"
] | null | null | null | apiVersion: apps/v1
kind: Deployment
metadata:
name: certified-operators-catalog
annotations:
target.workload.openshift.io/management: '{"effect": "PreferredDuringScheduling"}'
image.openshift.io/triggers: |-
[{"from":{"kind":"ImageStreamTag","name":"olm-certified-catalogs:v4.8"},"fieldPath":"spec.template.spec.containers[?(@.name==\"registry\")].image"}]
spec:
selector:
matchLabels:
olm.catalogSource: certified-operators
replicas: 1
template:
metadata:
labels:
olm.catalogSource: certified-operators
spec:
nodeSelector:
kubernetes.io/os: linux
containers:
- name: registry
image: registry.redhat.io/redhat/certified-operator-index:v4.8
imagePullPolicy: Always
ports:
- containerPort: 50051
name: grpc
protocol: TCP
terminationMessagePath: /dev/termination-log
readinessProbe:
exec:
command:
- grpc_health_probe
- '-addr=:50051'
initialDelaySeconds: 5
timeoutSeconds: 5
periodSeconds: 10
successThreshold: 1
failureThreshold: 3
livenessProbe:
exec:
command:
- grpc_health_probe
- '-addr=:50051'
initialDelaySeconds: 10
timeoutSeconds: 1
periodSeconds: 10
successThreshold: 1
failureThreshold: 3
resources:
requests:
cpu: 10m
memory: 50Mi
| 29.851852 | 154 | 0.561414 |
73dfd6da8bfaad7d90328c6a953967aa17a4f3e0 | 144 | yaml | YAML | built-in-references/Kubernetes/perf/violations/violation4659.yaml | sw47/azure-policy | 4a38e4cb4047b5364902653f0defe45f1b21bc61 | [
"MIT"
] | null | null | null | built-in-references/Kubernetes/perf/violations/violation4659.yaml | sw47/azure-policy | 4a38e4cb4047b5364902653f0defe45f1b21bc61 | [
"MIT"
] | null | null | null | built-in-references/Kubernetes/perf/violations/violation4659.yaml | sw47/azure-policy | 4a38e4cb4047b5364902653f0defe45f1b21bc61 | [
"MIT"
] | null | null | null | apiVersion: v1
kind: Pod
metadata:
name: image-demo-4659
spec:
containers:
- name: nginx
image: nginx #ritaacr.azurecr.io/nginx:latest | 18 | 49 | 0.722222 |
73e0085d26d94cd541a9800a6061175756c549ca | 3,400 | yaml | YAML | config/prow/cluster/deck_deployment.yaml | M00nF1sh/test-infra | e901afff0c5a8b6b51d60d082f8a371edcfb0966 | [
"Apache-2.0"
] | null | null | null | config/prow/cluster/deck_deployment.yaml | M00nF1sh/test-infra | e901afff0c5a8b6b51d60d082f8a371edcfb0966 | [
"Apache-2.0"
] | null | null | null | config/prow/cluster/deck_deployment.yaml | M00nF1sh/test-infra | e901afff0c5a8b6b51d60d082f8a371edcfb0966 | [
"Apache-2.0"
] | null | null | null | # Copyright 2016 The Kubernetes Authors All rights reserved.
#
# Licensed under the Apache License, Version 2.0 (the "License");
# you may not use this file except in compliance with the License.
# You may obtain a copy of the License at
#
# http://www.apache.org/licenses/LICENSE-2.0
#
# Unless required by applicable law or agreed to in writing, software
# distributed under the License is distributed on an "AS IS" BASIS,
# WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
# See the License for the specific language governing permissions and
# limitations under the License.
apiVersion: apps/v1
kind: Deployment
metadata:
namespace: default
name: deck
labels:
app: deck
spec:
replicas: 3
strategy:
type: RollingUpdate
rollingUpdate:
maxSurge: 1
maxUnavailable: 1
selector:
matchLabels:
app: deck
template:
metadata:
labels:
app: deck
spec:
serviceAccountName: deck
terminationGracePeriodSeconds: 30
containers:
- name: deck
image: gcr.io/k8s-prow/deck:v20201203-4778e22d27
imagePullPolicy: Always
ports:
- name: http
containerPort: 8080
args:
- --kubeconfig=/etc/kubeconfig/config
- --tide-url=http://tide/
- --hook-url=http://hook:8888/plugin-help
- --redirect-http-to=prow.k8s.io
- --oauth-url=/github-login
- --config-path=/etc/config/config.yaml
- --job-config-path=/etc/job-config
- --spyglass=true
- --rerun-creates-job
- --github-token-path=/etc/github/oauth
- --github-endpoint=http://ghproxy
- --github-endpoint=https://api.github.com
- --github-oauth-config-file=/etc/githuboauth/secret
- --cookie-secret=/etc/cookie/secret
- --plugin-config=/etc/plugins/plugins.yaml
volumeMounts:
- name: oauth-config
mountPath: /etc/githuboauth
readOnly: true
- name: cookie-secret
mountPath: /etc/cookie
readOnly: true
- mountPath: /etc/kubeconfig
name: kubeconfig
readOnly: true
- name: config
mountPath: /etc/config
readOnly: true
- name: job-config
mountPath: /etc/job-config
readOnly: true
- name: oauth-token
mountPath: /etc/github
readOnly: true
- name: plugins
mountPath: /etc/plugins
readOnly: true
livenessProbe:
httpGet:
path: /healthz
port: 8081
initialDelaySeconds: 3
periodSeconds: 3
readinessProbe:
httpGet:
path: /healthz/ready
port: 8081
initialDelaySeconds: 10
periodSeconds: 3
timeoutSeconds: 600
volumes:
- name: oauth-config
secret:
secretName: github-oauth-config
- name: oauth-token
secret:
secretName: oauth-token
- name: cookie-secret
secret:
secretName: cookie
- name: kubeconfig
secret:
defaultMode: 420
secretName: kubeconfig
- name: config
configMap:
name: config
- name: job-config
configMap:
name: job-config
- name: plugins
configMap:
name: plugins
| 28.333333 | 74 | 0.589118 |
73e0331805f9ecaf5823d4da25d19ea2659e81af | 578 | yaml | YAML | ingress/prometheus/alert-manager-ingress.yaml | ryuzakyl/kubernetes-examples | c7a837ddfaa735e2f132af3eaf074845708541c3 | [
"MIT"
] | null | null | null | ingress/prometheus/alert-manager-ingress.yaml | ryuzakyl/kubernetes-examples | c7a837ddfaa735e2f132af3eaf074845708541c3 | [
"MIT"
] | null | null | null | ingress/prometheus/alert-manager-ingress.yaml | ryuzakyl/kubernetes-examples | c7a837ddfaa735e2f132af3eaf074845708541c3 | [
"MIT"
] | null | null | null | apiVersion: networking.k8s.io/v1
kind: Ingress
metadata:
name: alert-manager-ingress
namespace: monitoring
annotations:
# nginx.ingress.kubernetes.io/backend-protocol: "HTTPS"
nginx.ingress.kubernetes.io/rewrite-target: /$2
nginx.ingress.kubernetes.io/configuration-snippet: |
rewrite ^(/alert-manager)$ $1/ redirect;
spec:
rules:
- http:
paths:
- pathType: Prefix
path: /alert-manager(/|$)(.*)
backend:
service:
name: alertmanager-main
port:
number: 9093
| 26.272727 | 59 | 0.603806 |
73e033fa46821967c556266cb5460a1caeedd6c2 | 229 | yaml | YAML | logstash/sample/service.yaml | pawankkamboj/ELK-k8s | 2be518a5c712220379d29301e89585c5c7e6b034 | [
"Apache-2.0"
] | null | null | null | logstash/sample/service.yaml | pawankkamboj/ELK-k8s | 2be518a5c712220379d29301e89585c5c7e6b034 | [
"Apache-2.0"
] | null | null | null | logstash/sample/service.yaml | pawankkamboj/ELK-k8s | 2be518a5c712220379d29301e89585c5c7e6b034 | [
"Apache-2.0"
] | null | null | null | ---
apiVersion: v1
kind: Service
metadata:
name: elk-logstash
namespace: logging
labels:
app: elk-logstash
spec:
ports:
- name: http
port: 80
protocol: TCP
targetPort: 5044
selector:
app: logstash
| 13.470588 | 21 | 0.650655 |
73e0347d3c4eb72ea60ffdc02119997247c2aa59 | 397 | yaml | YAML | configmaps/pod-1.yaml | cafeconk8s/k8sdesdecero | 6cb899e74c757ac010c4d8cfd16014c061d29278 | [
"MIT"
] | null | null | null | configmaps/pod-1.yaml | cafeconk8s/k8sdesdecero | 6cb899e74c757ac010c4d8cfd16014c061d29278 | [
"MIT"
] | null | null | null | configmaps/pod-1.yaml | cafeconk8s/k8sdesdecero | 6cb899e74c757ac010c4d8cfd16014c061d29278 | [
"MIT"
] | null | null | null | apiVersion: v1
kind: Pod
metadata:
name: pod-1
spec:
containers:
- name: configmaps-test
image: k8s.gcr.io/busybox
command: [ "/bin/sh", "-c", "env" ]
env:
# Define the environment variable
- name: SPECIAL_LEVEL_KEY
valueFrom:
configMapKeyRef:
name: special-config
key: special.how
restartPolicy: Never
| 22.055556 | 41 | 0.571788 |
73e0def71dfb575b2b4f8972780b4953b270a309 | 2,587 | yaml | YAML | apps/prow/cluster/tide_deployment.yaml | azylinski/k8s.io | 3e80c90c300d004f89fb3a81b84b1baaf764cf0a | [
"Apache-2.0"
] | null | null | null | apps/prow/cluster/tide_deployment.yaml | azylinski/k8s.io | 3e80c90c300d004f89fb3a81b84b1baaf764cf0a | [
"Apache-2.0"
] | null | null | null | apps/prow/cluster/tide_deployment.yaml | azylinski/k8s.io | 3e80c90c300d004f89fb3a81b84b1baaf764cf0a | [
"Apache-2.0"
] | null | null | null | # Copyright 2021 The Kubernetes Authors All rights reserved.
#
# Licensed under the Apache License, Version 2.0 (the "License");
# you may not use this file except in compliance with the License.
# You may obtain a copy of the License at
#
# http://www.apache.org/licenses/LICENSE-2.0
#
# Unless required by applicable law or agreed to in writing, software
# distributed under the License is distributed on an "AS IS" BASIS,
# WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
# See the License for the specific language governing permissions and
# limitations under the License.
apiVersion: apps/v1
kind: Deployment
metadata:
namespace: prow
name: tide
labels:
app: tide
spec:
replicas: 1 # Do not scale up.
strategy:
type: Recreate
selector:
matchLabels:
app: tide
template:
metadata:
labels:
app: tide
spec:
serviceAccountName: tide
containers:
- name: tide
image: gcr.io/k8s-prow/tide:v20211202-56b576a000
args:
- --config-path=/etc/config/config.yaml
- --dry-run=false
- --github-endpoint=http://ghproxy.prow.svc.cluster.local
- --github-endpoint=https://api.github.com
- --github-token-path=/etc/github/token
- --gcs-credentials-file=/etc/gcs-credentials/service-account.json
- --job-config-path=/etc/job-config
- --history-uri=gs://k8s-infra-prow-results/tide-history.json
- --status-path=gs://k8s-infra-prow-results/tide-status-checkpoint.yaml
ports:
- name: http
containerPort: 8888
- name: metrics
containerPort: 9090
securityContext:
allowPrivilegeEscalation: false
capabilities:
drop:
- "ALL"
privileged: false
volumeMounts:
- name: github-token
mountPath: /etc/github
readOnly: true
- name: config
mountPath: /etc/config
readOnly: true
- name: job-config
mountPath: /etc/job-config
readOnly: true
- name: gcs-credentials
mountPath: /etc/gcs-credentials
readOnly: true
volumes:
- name: github-token
secret:
defaultMode: 420
secretName: k8s-infra-ci-robot-github-token
- name: gcs-credentials
secret:
defaultMode: 420
secretName: k8s-infra-prow-sa-key
- name: config
configMap:
name: config
- name: job-config
configMap:
name: job-config
| 29.735632 | 79 | 0.614998 |
73e0e70ade949785d68ff5598d32c2d8e4af7eb7 | 445 | yaml | YAML | test/deprecated_hpa.yaml | adobe/porter2k8s | 1f215d78084066c66f5226b5d7e8f37e9ca862a8 | [
"Apache-2.0"
] | 16 | 2020-07-15T21:36:18.000Z | 2020-12-13T07:40:55.000Z | test/deprecated_hpa.yaml | adobe/porter2k8s | 1f215d78084066c66f5226b5d7e8f37e9ca862a8 | [
"Apache-2.0"
] | null | null | null | test/deprecated_hpa.yaml | adobe/porter2k8s | 1f215d78084066c66f5226b5d7e8f37e9ca862a8 | [
"Apache-2.0"
] | 2 | 2020-09-27T11:10:30.000Z | 2020-11-18T23:33:08.000Z | ---
apiVersion: autoscaling/v2beta1
kind: HorizontalPodAutoscaler
metadata:
name: &name telemachus
labels:
app: *name
spec:
scaleTargetRef:
apiVersion: apps/v1
kind: Deployment
name: *name
minReplicas: 2 # Don't set this value lower than 2. Just in case, a value less than 2 will be overridden to 2 in prod.
maxReplicas: 10
metrics:
- type: Resource
resource:
name: cpu
targetAverageUtilization: 70
| 22.25 | 120 | 0.698876 |
73e189ded50320d45f4a7c611d1e398fa4459cd8 | 214 | yaml | YAML | replicaset-nginx-example-2/nginx-pod-with-out-rs.yaml | bbb-86-ko/kubernetes-study | 82b3b963d7dc6a16ab5c50eed5bf78ed8e5fa93e | [
"MIT"
] | 1 | 2020-10-17T02:53:15.000Z | 2020-10-17T02:53:15.000Z | replicaset-nginx-example-2/nginx-pod-with-out-rs.yaml | bbb-86-ko/kubernetes-study | 82b3b963d7dc6a16ab5c50eed5bf78ed8e5fa93e | [
"MIT"
] | null | null | null | replicaset-nginx-example-2/nginx-pod-with-out-rs.yaml | bbb-86-ko/kubernetes-study | 82b3b963d7dc6a16ab5c50eed5bf78ed8e5fa93e | [
"MIT"
] | 3 | 2020-10-17T02:53:40.000Z | 2020-10-19T04:28:34.000Z | apiVersion: v1
kind: Pod
metadata:
name: my-nginx-pod
labels:
app: my-nginx-pods-label
spec:
containers:
- name: my-nginx-container
image: nginx:latest
ports:
- containerPort: 80
protocol: TCP
| 15.285714 | 27 | 0.686916 |
73e1953ca283f2af88bec0ff8afbb2d94f92a842 | 11,546 | yaml | YAML | namespaces/live-1.cloud-platform.service.justice.gov.uk/laa-apply-for-legalaid-production/http_status_codes_grafana_dashboard.yaml | rossjones/cloud-platform-environments | 85a4e19cf012d97d885c6ea91379ca3f7b59a49a | [
"MIT"
] | 28 | 2018-07-13T15:02:24.000Z | 2022-03-17T09:23:54.000Z | namespaces/live-1.cloud-platform.service.justice.gov.uk/laa-apply-for-legalaid-production/http_status_codes_grafana_dashboard.yaml | happygeneralist/recall-decisions-alpha | 09124f3994a878e9969e7b4326088b2ae7bfd170 | [
"MIT"
] | 963 | 2018-05-30T15:46:06.000Z | 2022-03-30T10:06:39.000Z | namespaces/live-1.cloud-platform.service.justice.gov.uk/laa-apply-for-legalaid-production/http_status_codes_grafana_dashboard.yaml | happygeneralist/recall-decisions-alpha | 09124f3994a878e9969e7b4326088b2ae7bfd170 | [
"MIT"
] | 29 | 2018-12-04T09:37:36.000Z | 2022-02-25T10:35:34.000Z | apiVersion: v1
kind: ConfigMap
metadata:
name: grafana-status-codes
namespace: laa-apply-for-legalaid-production
labels:
grafana_dashboard: ""
data:
laa-apply-status-codes-dashboard.json: |
{
"__inputs": [],
"__requires": [
{
"type": "grafana",
"id": "grafana",
"name": "Grafana",
"version": "5.4.3"
},
{
"type": "panel",
"id": "graph",
"name": "Graph",
"version": "5.0.0"
},
{
"type": "datasource",
"id": "prometheus",
"name": "Prometheus",
"version": "5.0.0"
},
{
"type": "panel",
"id": "table",
"name": "Table",
"version": "5.0.0"
}
],
"annotations": {
"list": [
{
"builtIn": 1,
"datasource": "-- Grafana --",
"enable": true,
"hide": true,
"iconColor": "rgba(0, 211, 255, 1)",
"name": "Annotations & Alerts",
"type": "dashboard"
}
]
},
"editable": true,
"gnetId": null,
"graphTooltip": 0,
"id": null,
"iteration": 1553606503506,
"links": [],
"panels": [
{
"collapsed": false,
"gridPos": {
"h": 1,
"w": 24,
"x": 0,
"y": 0
},
"id": 4,
"panels": [],
"repeat": null,
"title": "HTTP Status",
"type": "row"
},
{
"aliasColors": {},
"bars": false,
"dashLength": 10,
"dashes": false,
"datasource": "$datasource",
"fill": 10,
"gridPos": {
"h": 9,
"w": 24,
"x": 0,
"y": 1
},
"id": 0,
"legend": {
"avg": false,
"current": false,
"max": false,
"min": false,
"show": true,
"total": false,
"values": false
},
"lines": true,
"linewidth": 0,
"links": [],
"nullPointMode": "null as zero",
"percentage": false,
"pointradius": 5,
"points": false,
"renderer": "flot",
"seriesOverrides": [],
"spaceLength": 10,
"stack": true,
"steppedLine": false,
"targets": [
{
"expr": "sum(rate(ruby_http_requests_total{status=\"$status\", namespace=\"$namespace\"}[5m]))",
"format": "time_series",
"intervalFactor": 2,
"legendFormat": "$status",
"legendLink": null,
"refId": "A",
"step": 10
}
],
"thresholds": [],
"timeFrom": null,
"timeRegions": [],
"timeShift": null,
"title": "rate(5m) | $status | $namespace",
"tooltip": {
"shared": true,
"sort": 0,
"value_type": "individual"
},
"type": "graph",
"xaxis": {
"buckets": null,
"mode": "time",
"name": null,
"show": true,
"values": []
},
"yaxes": [
{
"format": "short",
"label": null,
"logBase": 1,
"max": null,
"min": 0,
"show": true
},
{
"format": "short",
"label": null,
"logBase": 1,
"max": null,
"min": null,
"show": false
}
],
"yaxis": {
"align": false,
"alignLevel": null
}
},
{
"aliasColors": {},
"bars": false,
"columns": [],
"dashLength": 10,
"dashes": false,
"datasource": "$datasource",
"fill": 1,
"fontSize": "100%",
"gridPos": {
"h": 10,
"w": 24,
"x": 0,
"y": 10
},
"id": 3,
"legend": {
"avg": false,
"current": false,
"max": false,
"min": false,
"show": true,
"total": false,
"values": false
},
"lines": true,
"linewidth": 1,
"links": [],
"nullPointMode": "null as zero",
"pageSize": null,
"percentage": false,
"pointradius": 5,
"points": false,
"renderer": "flot",
"scroll": true,
"seriesOverrides": [],
"showHeader": true,
"sort": {
"col": 0,
"desc": true
},
"spaceLength": 10,
"stack": false,
"steppedLine": false,
"styles": [
{
"alias": "Time",
"dateFormat": "YYYY-MM-DD HH:mm:ss",
"link": false,
"pattern": "Time",
"type": "date"
},
{
"alias": "",
"colorMode": null,
"colors": [
"rgba(245, 54, 54, 0.9)",
"rgba(237, 129, 40, 0.89)",
"rgba(50, 172, 45, 0.97)"
],
"dateFormat": "YYYY-MM-DD HH:mm:ss",
"decimals": 2,
"mappingType": 1,
"pattern": "__name__",
"thresholds": [],
"type": "hidden",
"unit": "short"
},
{
"alias": "",
"colorMode": null,
"colors": [
"rgba(245, 54, 54, 0.9)",
"rgba(237, 129, 40, 0.89)",
"rgba(50, 172, 45, 0.97)"
],
"dateFormat": "YYYY-MM-DD HH:mm:ss",
"decimals": 2,
"mappingType": 1,
"pattern": "namespace",
"thresholds": [],
"type": "hidden",
"unit": "short"
},
{
"alias": "",
"colorMode": null,
"colors": [
"rgba(245, 54, 54, 0.9)",
"rgba(237, 129, 40, 0.89)",
"rgba(50, 172, 45, 0.97)"
],
"dateFormat": "YYYY-MM-DD HH:mm:ss",
"decimals": 2,
"mappingType": 1,
"pattern": "service",
"thresholds": [],
"type": "hidden",
"unit": "short"
},
{
"alias": "",
"colorMode": null,
"colors": [
"rgba(245, 54, 54, 0.9)",
"rgba(237, 129, 40, 0.89)",
"rgba(50, 172, 45, 0.97)"
],
"dateFormat": "YYYY-MM-DD HH:mm:ss",
"decimals": 2,
"mappingType": 1,
"pattern": "endpoint",
"thresholds": [],
"type": "hidden",
"unit": "short"
}
],
"targets": [
{
"expr": "ruby_http_requests_total{status=\"$status\", namespace=\"$namespace\"}",
"format": "table",
"intervalFactor": 1,
"refId": "A"
}
],
"thresholds": [],
"timeFrom": null,
"timeShift": null,
"title": "$status | $namespace",
"tooltip": {
"shared": true,
"sort": 0,
"value_type": "individual"
},
"transform": "table",
"type": "table",
"xaxis": {
"buckets": null,
"mode": "time",
"name": null,
"show": true,
"values": []
},
"yaxes": [
{
"format": "short",
"label": null,
"logBase": 1,
"max": null,
"min": 0,
"show": true
},
{
"format": "short",
"label": null,
"logBase": 1,
"max": null,
"min": null,
"show": false
}
]
}
],
"refresh": false,
"schemaVersion": 16,
"style": "dark",
"tags": [],
"templating": {
"list": [
{
"current": {
"selected": true,
"text": "Prometheus",
"value": "Prometheus"
},
"hide": 0,
"label": null,
"name": "datasource",
"options": [],
"query": "prometheus",
"refresh": 1,
"regex": "",
"skipUrlSync": false,
"type": "datasource"
},
{
"allValue": null,
"current": {
"selected": true,
"text": "laa-apply-for-legalaid-staging",
"value": "laa-apply-for-legalaid-staging"
},
"hide": 0,
"includeAll": false,
"label": "namespace",
"multi": false,
"name": "namespace",
"options": [
{
"selected": false,
"text": "laa-apply-for-legalaid-uat",
"value": "laa-apply-for-legalaid-uat"
},
{
"selected": true,
"text": "laa-apply-for-legalaid-staging",
"value": "laa-apply-for-legalaid-staging"
},
{
"selected": false,
"text": "laa-apply-for-legalaid-production",
"value": "laa-apply-for-legalaid-production"
}
],
"query": "laa-apply-for-legalaid-uat, laa-apply-for-legalaid-staging, laa-apply-for-legalaid-production",
"skipUrlSync": false,
"type": "custom"
},
{
"allValue": null,
"current": {},
"datasource": "$datasource",
"definition": "label_values(ruby_http_requests_total{namespace=\"$namespace\"}, status)",
"hide": 0,
"includeAll": false,
"label": "status",
"multi": false,
"name": "status",
"options": [],
"query": "label_values(ruby_http_requests_total{namespace=\"$namespace\"}, status)",
"refresh": 1,
"regex": "",
"skipUrlSync": false,
"sort": 2,
"tagValuesQuery": "",
"tags": [],
"tagsQuery": "",
"type": "query",
"useTags": false
}
]
},
"time": {
"from": "now-7d",
"to": "now"
},
"timepicker": {
"refresh_intervals": [
"5s",
"10s",
"30s",
"1m",
"5m",
"15m",
"30m",
"1h",
"2h",
"1d"
],
"time_options": [
"5m",
"15m",
"1h",
"6h",
"12h",
"24h",
"2d",
"7d",
"30d"
]
},
"timezone": "",
"title": "LAA Apply / HTTP Status codes",
"uid": "36a118233e8f4e8ca66eac7ac86da1d4",
"version": 1
}
| 26.542529 | 119 | 0.342716 |
73e26d8442b3cb9fb8c8609b929c58d6dbefc149 | 127 | yaml | YAML | k8s/distributor-svc.yaml | ranton256/cortex | eafcc9243d517fcf11e5255b30dea275377f09c5 | [
"Apache-2.0"
] | 1 | 2021-07-09T08:03:07.000Z | 2021-07-09T08:03:07.000Z | k8s/distributor-svc.yaml | ranton256/cortex | eafcc9243d517fcf11e5255b30dea275377f09c5 | [
"Apache-2.0"
] | 1 | 2021-06-02T10:10:56.000Z | 2021-06-02T10:10:56.000Z | k8s/distributor-svc.yaml | ranton256/cortex | eafcc9243d517fcf11e5255b30dea275377f09c5 | [
"Apache-2.0"
] | 1 | 2020-12-09T15:06:40.000Z | 2020-12-09T15:06:40.000Z | ---
apiVersion: v1
kind: Service
metadata:
name: distributor
spec:
ports:
- port: 80
selector:
name: distributor
| 11.545455 | 21 | 0.661417 |
73e27f0be92c41deb85352a613775bc04f8b222c | 66 | yaml | YAML | charts/fleet-simulator/templates/serviceaccount.yaml | fossabot/fleet | 442328cf64826f9ea6b08be68f6cb14248f96cc3 | [
"Apache-2.0"
] | 1,101 | 2020-03-29T17:20:41.000Z | 2022-03-30T20:47:44.000Z | charts/fleet-simulator/templates/serviceaccount.yaml | fossabot/fleet | 442328cf64826f9ea6b08be68f6cb14248f96cc3 | [
"Apache-2.0"
] | 550 | 2020-03-31T09:38:12.000Z | 2022-03-30T18:54:42.000Z | charts/fleet-simulator/templates/serviceaccount.yaml | fossabot/fleet | 442328cf64826f9ea6b08be68f6cb14248f96cc3 | [
"Apache-2.0"
] | 152 | 2020-03-29T15:57:50.000Z | 2022-03-30T08:28:08.000Z | apiVersion: v1
kind: ServiceAccount
metadata:
name: fleet-agent
| 13.2 | 20 | 0.787879 |
73e2a380c8bd0dd3a3d956d3559c8bd2fa68aeb4 | 7,517 | yaml | YAML | config/300-awscognitoidentitysource.yaml | cab105/triggermesh | 6c2b08c9f9ccef5652f8b3433831844a47dba757 | [
"Apache-2.0"
] | null | null | null | config/300-awscognitoidentitysource.yaml | cab105/triggermesh | 6c2b08c9f9ccef5652f8b3433831844a47dba757 | [
"Apache-2.0"
] | null | null | null | config/300-awscognitoidentitysource.yaml | cab105/triggermesh | 6c2b08c9f9ccef5652f8b3433831844a47dba757 | [
"Apache-2.0"
] | null | null | null | # Copyright 2022 TriggerMesh Inc.
#
# Licensed under the Apache License, Version 2.0 (the "License");
# you may not use this file except in compliance with the License.
# You may obtain a copy of the License at
#
# http://www.apache.org/licenses/LICENSE-2.0
#
# Unless required by applicable law or agreed to in writing, software
# distributed under the License is distributed on an "AS IS" BASIS,
# WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
# See the License for the specific language governing permissions and
# limitations under the License.
apiVersion: apiextensions.k8s.io/v1
kind: CustomResourceDefinition
metadata:
name: awscognitoidentitysources.sources.triggermesh.io
labels:
eventing.knative.dev/source: 'true'
duck.knative.dev/source: 'true'
knative.dev/crd-install: 'true'
triggermesh.io/crd-install: 'true'
annotations:
registry.knative.dev/eventTypes: |
[
{ "type": "com.amazon.cognito-identity.sync_trigger" }
]
spec:
group: sources.triggermesh.io
scope: Namespaced
names:
kind: AWSCognitoIdentitySource
plural: awscognitoidentitysources
categories:
- all
- knative
- eventing
- sources
versions:
- name: v1alpha1
served: true
storage: true
subresources:
status: {}
schema:
openAPIV3Schema:
description: TriggerMesh event source for Amazon Cognito Identity Pool.
type: object
properties:
spec:
description: Desired state of the event source.
type: object
properties:
arn:
description: ARN of the Amazon Cognito Identity Pool to receive notifications from.
The expected format is documented at
https://docs.aws.amazon.com/IAM/latest/UserGuide/list_amazoncognitoidentity.html#amazoncognitoidentity-resources-for-iam-policies.
type: string
pattern: ^arn:aws(-cn|-us-gov)?:cognito-identity:[a-z]{2}(-gov)?-[a-z]+-\d:\d{12}:identitypool\/.+$
auth:
description: Authentication method to interact with the Amazon Cognito API.
type: object
properties:
credentials:
description: Security credentials authentication. For more information about AWS security
credentials, please refer to the AWS General Reference at
https://docs.aws.amazon.com/general/latest/gr/aws-security-credentials.html.
type: object
properties:
accessKeyID:
description: Access key ID.
type: object
properties:
value:
description: Literal value of the access key ID.
type: string
valueFromSecret:
description: A reference to a Kubernetes Secret object containing the access key ID.
type: object
properties:
name:
type: string
key:
type: string
required:
- name
- key
oneOf:
- required: [value]
- required: [valueFromSecret]
secretAccessKey:
description: Secret access key.
type: object
properties:
value:
description: Literal value of the secret access key.
type: string
format: password
valueFromSecret:
description: A reference to a Kubernetes Secret object containing the secret access key.
type: object
properties:
name:
type: string
key:
type: string
required:
- name
- key
oneOf:
- required: [value]
- required: [valueFromSecret]
sink:
description: The destination of events sourced from the Amazon Cognito Identity Pool.
type: object
properties:
ref:
description: Reference to an addressable Kubernetes object to be used as the destination of events.
type: object
properties:
apiVersion:
type: string
kind:
type: string
namespace:
type: string
name:
type: string
required:
- apiVersion
- kind
- name
uri:
description: URI to use as the destination of events.
type: string
format: uri
oneOf:
- required: [ref]
- required: [uri]
required:
- arn
- sink
status:
description: Reported status of the event source.
type: object
properties:
sinkUri:
description: URI of the sink where events are currently sent to.
type: string
format: uri
ceAttributes:
type: array
items:
type: object
properties:
type:
type: string
source:
type: string
required:
- type
- source
observedGeneration:
type: integer
format: int64
conditions:
type: array
items:
type: object
properties:
type:
type: string
status:
type: string
enum: ['True', 'False', Unknown]
severity:
type: string
enum: [Error, Warning, Info]
reason:
type: string
message:
type: string
lastTransitionTime:
type: string
format: date-time
required:
- type
- status
additionalPrinterColumns:
- name: Ready
type: string
jsonPath: .status.conditions[?(@.type=='Ready')].status
- name: Reason
type: string
jsonPath: .status.conditions[?(@.type=='Ready')].reason
- name: Sink
type: string
jsonPath: .status.sinkUri
- name: Age
type: date
jsonPath: .metadata.creationTimestamp
| 37.029557 | 148 | 0.46029 |
73e2a8c6f63b591315b1e6694bde8e8d6484ad7b | 196 | yaml | YAML | kubernetes-templating/kubecfg/shippingservice-service.yaml | otus-kuber-2021-09/tjmaru_platform | 7fd100f5bd5f540fc5eb815e14c7b9c69b61bdbc | [
"MIT"
] | null | null | null | kubernetes-templating/kubecfg/shippingservice-service.yaml | otus-kuber-2021-09/tjmaru_platform | 7fd100f5bd5f540fc5eb815e14c7b9c69b61bdbc | [
"MIT"
] | 7 | 2021-11-11T02:31:09.000Z | 2022-03-30T18:15:29.000Z | kubernetes-templating/kubecfg/shippingservice-service.yaml | otus-kuber-2021-09/tjmaru_platform | 7fd100f5bd5f540fc5eb815e14c7b9c69b61bdbc | [
"MIT"
] | 2 | 2020-09-12T08:11:31.000Z | 2020-09-14T20:51:20.000Z | ---
apiVersion: v1
kind: Service
metadata:
name: shippingservice
spec:
type: ClusterIP
selector:
app: shippingservice
ports:
- name: grpc
port: 50051
targetPort: 50051
| 14 | 24 | 0.663265 |
73e2ad1cddcd03114187c6e731b68cd979eb9eb7 | 1,825 | yaml | YAML | config/prow/cluster/needs-rebase_deployment.yaml | midnightconman/test-infra | c930a1d5f949bb9212078a05442cd39ccaae8cf3 | [
"Apache-2.0"
] | null | null | null | config/prow/cluster/needs-rebase_deployment.yaml | midnightconman/test-infra | c930a1d5f949bb9212078a05442cd39ccaae8cf3 | [
"Apache-2.0"
] | null | null | null | config/prow/cluster/needs-rebase_deployment.yaml | midnightconman/test-infra | c930a1d5f949bb9212078a05442cd39ccaae8cf3 | [
"Apache-2.0"
] | null | null | null | # Copyright 2016 The Kubernetes Authors All rights reserved.
#
# Licensed under the Apache License, Version 2.0 (the "License");
# you may not use this file except in compliance with the License.
# You may obtain a copy of the License at
#
# http://www.apache.org/licenses/LICENSE-2.0
#
# Unless required by applicable law or agreed to in writing, software
# distributed under the License is distributed on an "AS IS" BASIS,
# WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
# See the License for the specific language governing permissions and
# limitations under the License.
apiVersion: apps/v1
kind: Deployment
metadata:
namespace: default
name: needs-rebase
labels:
app: needs-rebase
spec:
replicas: 1
selector:
matchLabels:
app: needs-rebase
template:
metadata:
labels:
app: needs-rebase
spec:
terminationGracePeriodSeconds: 180
containers:
- name: needs-rebase
image: gcr.io/k8s-prow/needs-rebase:v20220519-b5565f45aa
imagePullPolicy: Always
args:
- --dry-run=false
- --github-endpoint=http://ghproxy
- --github-endpoint=https://api.github.com
- --github-token-path=/etc/github/oauth
- --update-period=6h
ports:
- name: http
containerPort: 8888
volumeMounts:
- name: hmac
mountPath: /etc/webhook
readOnly: true
- name: oauth
mountPath: /etc/github
readOnly: true
- name: plugins
mountPath: /etc/plugins
readOnly: true
volumes:
- name: hmac
secret:
secretName: hmac-token
- name: oauth
secret:
secretName: oauth-token
- name: plugins
configMap:
name: plugins
| 27.651515 | 74 | 0.629041 |
73e2c6155288ebe506883f9d770990e6332e5399 | 144 | yaml | YAML | built-in-references/Kubernetes/perf/violations/violation4738.yaml | sw47/azure-policy | 4a38e4cb4047b5364902653f0defe45f1b21bc61 | [
"MIT"
] | null | null | null | built-in-references/Kubernetes/perf/violations/violation4738.yaml | sw47/azure-policy | 4a38e4cb4047b5364902653f0defe45f1b21bc61 | [
"MIT"
] | null | null | null | built-in-references/Kubernetes/perf/violations/violation4738.yaml | sw47/azure-policy | 4a38e4cb4047b5364902653f0defe45f1b21bc61 | [
"MIT"
] | null | null | null | apiVersion: v1
kind: Pod
metadata:
name: image-demo-4738
spec:
containers:
- name: nginx
image: nginx #ritaacr.azurecr.io/nginx:latest | 18 | 49 | 0.722222 |
73e335fda36c0542c7e469f8b21c7d2cf1ed38c0 | 1,434 | yaml | YAML | config-root/namespaces/jx/jxboot-helmfile-resources/jenkins-x-pod-template-promote-cm.yaml | ssvinoth22/jx3-vinoth | 983c1b784c6c150785d7a90914e4d1ce133beca1 | [
"Apache-2.0"
] | 1 | 2020-10-01T19:42:59.000Z | 2020-10-01T19:42:59.000Z | config-root/namespaces/jx/jxboot-helmfile-resources/jenkins-x-pod-template-promote-cm.yaml | ssvinoth22/jx3-vinoth | 983c1b784c6c150785d7a90914e4d1ce133beca1 | [
"Apache-2.0"
] | 149 | 2020-09-25T10:09:48.000Z | 2020-10-12T15:53:45.000Z | config-root/namespaces/jx/jxboot-helmfile-resources/jenkins-x-pod-template-promote-cm.yaml | ssvinoth22/jx3-vinoth | 983c1b784c6c150785d7a90914e4d1ce133beca1 | [
"Apache-2.0"
] | null | null | null | # Source: jxboot-helmfile-resources/templates/jenkins-x-pod-templates.yaml
apiVersion: v1
kind: ConfigMap
metadata:
name: "jenkins-x-pod-template-promote"
labels:
jenkins.io/kind: podTemplate
gitops.jenkins-x.io/pipeline: 'namespaces'
namespace: jx
data:
pod: "apiVersion: v1\nkind: Pod\nmetadata:\n name: jenkins-promote\n labels:\n jenkins.io/kind: build-pod\n annotations:\n jenkins-x.io/devpodPorts: \nspec:\n serviceAccount: tekton-sa\n nodeSelector:\n volumes:\n - name: workspace-volume\n emptyDir: {}\n containers:\n - name: promote\n image: gcr.io/jenkinsxio/builder-jx:2.1.150-769\n args:\n - cat\n command:\n - /bin/sh\n - -c\n workingDir: /home/jenkins\n securityContext:\n privileged: true\n tty: true\n env:\n - name: DOCKER_REGISTRY\n valueFrom:\n configMapKeyRef:\n name: jenkins-x-docker-registry\n key: docker.registry\n - name: GIT_AUTHOR_EMAIL\n value: [email protected]\n - name: GIT_AUTHOR_NAME\n value: jenkins-x-bot\n - name: GIT_COMMITTER_EMAIL\n value: [email protected]\n - name: GIT_COMMITTER_NAME\n value: jenkins-x-bot\n - name: XDG_CONFIG_HOME\n value: /home/jenkins\n resources:\n requests:\n cpu: 200m\n memory: 100Mi\n limits:\n volumeMounts:\n - mountPath: /home/jenkins\n name: workspace-volume"
| 119.5 | 1,164 | 0.665969 |
73e3cc2790217850fc1bc4221889cef67ac8f734 | 221 | yaml | YAML | manifests/keeper-service.yaml | lsst-sqre/ltd-keeper | c658bcce726764e7416a8a386b418e83912b0f32 | [
"Apache-2.0",
"MIT"
] | 5 | 2016-05-16T18:46:26.000Z | 2019-07-08T15:16:41.000Z | manifests/keeper-service.yaml | lsst-sqre/ltd-keeper | c658bcce726764e7416a8a386b418e83912b0f32 | [
"Apache-2.0",
"MIT"
] | 46 | 2016-02-18T16:54:36.000Z | 2022-03-25T19:43:45.000Z | manifests/keeper-service.yaml | lsst-sqre/ltd-keeper | c658bcce726764e7416a8a386b418e83912b0f32 | [
"Apache-2.0",
"MIT"
] | 4 | 2016-08-20T23:10:07.000Z | 2022-03-25T19:52:09.000Z | apiVersion: v1
kind: Service
metadata:
name: keeper
labels:
name: keeper
spec:
ports:
- name: keeper-http
protocol: TCP
port: 8080
targetPort: keeper-uwsgi
selector:
name: keeper-api
| 14.733333 | 30 | 0.638009 |
73e3dd7aa8a416a50d4ab016c5358460845d1f20 | 359 | yaml | YAML | test/e2e/testdata/hello-b/hello-b.yaml | karolkrawczyk/eunomia | 3b2f79538b8150383be3d75fdb587d714d929cb9 | [
"Apache-2.0"
] | 168 | 2019-05-29T17:53:06.000Z | 2022-03-08T15:48:49.000Z | test/e2e/testdata/hello-b/hello-b.yaml | karolkrawczyk/eunomia | 3b2f79538b8150383be3d75fdb587d714d929cb9 | [
"Apache-2.0"
] | 311 | 2019-05-29T19:45:32.000Z | 2022-03-09T20:15:58.000Z | test/e2e/testdata/hello-b/hello-b.yaml | karolkrawczyk/eunomia | 3b2f79538b8150383be3d75fdb587d714d929cb9 | [
"Apache-2.0"
] | 70 | 2019-05-29T17:53:36.000Z | 2022-03-03T14:10:09.000Z | apiVersion: apps/v1
kind: Deployment
metadata:
name: hello-test-b
spec:
replicas: 1
selector:
matchLabels:
name: hello-test-b
template:
metadata:
labels:
name: hello-test-b
spec:
containers:
- name: hello-test-b
image: gcr.io/google-samples/hello-app:1.0
imagePullPolicy: IfNotPresent
| 18.894737 | 52 | 0.618384 |
73e49d07beb7a540e4d9b17ff4d3445184d17a52 | 286 | yaml | YAML | docs/source/container/Level2/resources/sample-pvc.yaml | makotow/NetAppDigitalTransformationLab | 7b832bc1660a0cbeaf5da340bf6d2767838fe7c9 | [
"MIT"
] | 5 | 2018-07-04T01:34:40.000Z | 2020-02-14T20:52:20.000Z | docs/source/container/Level2/resources/sample-pvc.yaml | makotow/NetAppDigitalTransformationLab | 7b832bc1660a0cbeaf5da340bf6d2767838fe7c9 | [
"MIT"
] | 8 | 2018-08-27T12:48:50.000Z | 2019-09-17T15:36:53.000Z | docs/source/container/Level2/resources/sample-pvc.yaml | makotow/NetAppDigitalTransformationLab | 7b832bc1660a0cbeaf5da340bf6d2767838fe7c9 | [
"MIT"
] | 3 | 2018-07-19T04:43:27.000Z | 2020-10-16T05:35:01.000Z | apiVersion: v1
kind: PersistentVolumeClaim
metadata:
name: sample-pv-claim
labels:
app: アプリケーション名
annotations:
trident.netapp.io/exportPolicy: "default"
spec:
accessModes:
- ReadWriteOnce
resources:
requests:
storage: 20Gi
storageClassName: ontap-gold
| 17.875 | 45 | 0.72028 |
73e4b875f0ae970cb12d40eb102f0bba84b82037 | 103 | yml | YAML | micro-java/src/main/jkube/cm.yml | gpAniaRedHat/DO288-apps | 870fa8a1c167aa766b9bdc640ea95d3ee787bec2 | [
"Apache-2.0"
] | null | null | null | micro-java/src/main/jkube/cm.yml | gpAniaRedHat/DO288-apps | 870fa8a1c167aa766b9bdc640ea95d3ee787bec2 | [
"Apache-2.0"
] | null | null | null | micro-java/src/main/jkube/cm.yml | gpAniaRedHat/DO288-apps | 870fa8a1c167aa766b9bdc640ea95d3ee787bec2 | [
"Apache-2.0"
] | null | null | null | apiVersion: v1
kind: ConfigMap
metadata:
name: configmap-hello
data:
APP_MSG: this is a new value
| 14.714286 | 31 | 0.747573 |
73e4bab3ec07fe7607e4a779de0c87344f0a2641 | 416 | yaml | YAML | services/loadbalancer-deployment.yaml | cafeconk8s/k8sdesdecero | 6cb899e74c757ac010c4d8cfd16014c061d29278 | [
"MIT"
] | null | null | null | services/loadbalancer-deployment.yaml | cafeconk8s/k8sdesdecero | 6cb899e74c757ac010c4d8cfd16014c061d29278 | [
"MIT"
] | null | null | null | services/loadbalancer-deployment.yaml | cafeconk8s/k8sdesdecero | 6cb899e74c757ac010c4d8cfd16014c061d29278 | [
"MIT"
] | null | null | null | apiVersion: apps/v1
kind: Deployment
metadata:
name: deployment-lb
spec:
selector:
matchLabels:
app: nginx
env: prod
replicas: 2
template:
metadata:
labels:
app: nginx
env: prod
spec:
containers:
- name: hello
image: "us-docker.pkg.dev/google-samples/containers/gke/hello-app:2.0"
env:
- name: "PORT"
value: "50001"
| 18.086957 | 78 | 0.569712 |
73e4ca4252214162233de111fa06b94c88055ffa | 212 | yaml | YAML | node-app-service.yaml | alfreddagenais/-kilukru-dev-node-app-docker-kubernetes | 963169c92170b0d4f5ac88c96ad13205d12c79bb | [
"MIT"
] | null | null | null | node-app-service.yaml | alfreddagenais/-kilukru-dev-node-app-docker-kubernetes | 963169c92170b0d4f5ac88c96ad13205d12c79bb | [
"MIT"
] | null | null | null | node-app-service.yaml | alfreddagenais/-kilukru-dev-node-app-docker-kubernetes | 963169c92170b0d4f5ac88c96ad13205d12c79bb | [
"MIT"
] | null | null | null | apiVersion: v1
kind: Service
metadata:
name: node-app-service
spec:
selector:
app: node-app
type: LoadBalancer
ports:
- protocol: TCP
port: 5000
targetPort: 8080
nodePort: 32006
| 15.142857 | 24 | 0.650943 |
73e6346eb5134b932a4584f1be6c22215827dfe1 | 144 | yaml | YAML | built-in-references/Kubernetes/perf/violations/violation4243.yaml | sw47/azure-policy | 4a38e4cb4047b5364902653f0defe45f1b21bc61 | [
"MIT"
] | null | null | null | built-in-references/Kubernetes/perf/violations/violation4243.yaml | sw47/azure-policy | 4a38e4cb4047b5364902653f0defe45f1b21bc61 | [
"MIT"
] | null | null | null | built-in-references/Kubernetes/perf/violations/violation4243.yaml | sw47/azure-policy | 4a38e4cb4047b5364902653f0defe45f1b21bc61 | [
"MIT"
] | null | null | null | apiVersion: v1
kind: Pod
metadata:
name: image-demo-4243
spec:
containers:
- name: nginx
image: nginx #ritaacr.azurecr.io/nginx:latest | 18 | 49 | 0.722222 |
73e66bac176e7dbbfbe505563bfe5d9cafe8a809 | 184 | yaml | YAML | deploy/pvc.yaml | aiwantaozi/clean_flexvolume | 3c13ccac366b6eb6a29ee0be9022c1c71dc28f40 | [
"Apache-2.0"
] | null | null | null | deploy/pvc.yaml | aiwantaozi/clean_flexvolume | 3c13ccac366b6eb6a29ee0be9022c1c71dc28f40 | [
"Apache-2.0"
] | null | null | null | deploy/pvc.yaml | aiwantaozi/clean_flexvolume | 3c13ccac366b6eb6a29ee0be9022c1c71dc28f40 | [
"Apache-2.0"
] | null | null | null |
kind: PersistentVolumeClaim
apiVersion: v1
metadata:
name: pv-claim
spec:
storageClassName: slow
accessModes:
- ReadWriteOnce
resources:
requests:
storage: 10Mi
| 14.153846 | 27 | 0.717391 |
73e6ea2b8f0beabda71e88498600da6b55cd1d86 | 256 | yaml | YAML | boskos/cluster/metrics-service.yaml | dgn/istio-test-infra | 6b6b5be7879d6a034ac2a1280d90675a116dffa1 | [
"Apache-2.0"
] | null | null | null | boskos/cluster/metrics-service.yaml | dgn/istio-test-infra | 6b6b5be7879d6a034ac2a1280d90675a116dffa1 | [
"Apache-2.0"
] | null | null | null | boskos/cluster/metrics-service.yaml | dgn/istio-test-infra | 6b6b5be7879d6a034ac2a1280d90675a116dffa1 | [
"Apache-2.0"
] | null | null | null | apiVersion: v1
kind: Service
metadata:
name: boskos-metrics
namespace: boskos
spec:
selector:
app: boskos-metrics
ports:
- name: default
protocol: TCP
port: 80
targetPort: 8080
type: LoadBalancer
loadBalancerIP: 34.83.176.210
| 16 | 31 | 0.695313 |
73e7004c189a589d2f96172743cd528b9bb3c1a0 | 1,128 | yaml | YAML | prow/cluster/sinker_deployment.yaml | fejta/istio-test-infra | 355f8a0d2296afb44b9a1c700ba8b75a131cae8c | [
"Apache-2.0"
] | null | null | null | prow/cluster/sinker_deployment.yaml | fejta/istio-test-infra | 355f8a0d2296afb44b9a1c700ba8b75a131cae8c | [
"Apache-2.0"
] | null | null | null | prow/cluster/sinker_deployment.yaml | fejta/istio-test-infra | 355f8a0d2296afb44b9a1c700ba8b75a131cae8c | [
"Apache-2.0"
] | null | null | null | apiVersion: apps/v1
kind: Deployment
metadata:
name: sinker
namespace: default
labels:
app.kubernetes.io/part-of: prow
app: sinker
spec:
replicas: 1
selector:
matchLabels:
app: sinker
template:
metadata:
labels:
app: sinker
spec:
serviceAccountName: sinker
containers:
- name: sinker
image: gcr.io/k8s-prow/sinker:v20210830-7828cc98e3
args:
- --config-path=/etc/config/config.yaml
- --dry-run=false
- --job-config-path=/etc/job-config
- --kubeconfig=/etc/kubeconfig/istio-config
volumeMounts:
- name: config
mountPath: /etc/config
readOnly: true
- name: job-config
mountPath: /etc/job-config
readOnly: true
- mountPath: /etc/kubeconfig
name: kubeconfig
readOnly: true
volumes:
- name: config
configMap:
name: config
- name: job-config
configMap:
name: job-config
- name: kubeconfig
secret:
defaultMode: 420
secretName: kubeconfig
| 23.020408 | 58 | 0.567376 |
73e70f5490406aca8057ee8a88b42f6d87a05d8f | 183 | yaml | YAML | deploy/overlays/stg/serviceaccount.yaml | makocchan0509/bookinfo-manifests | daee2b2350cb608fd4128f34ce8b4557b6b95765 | [
"Apache-2.0"
] | null | null | null | deploy/overlays/stg/serviceaccount.yaml | makocchan0509/bookinfo-manifests | daee2b2350cb608fd4128f34ce8b4557b6b95765 | [
"Apache-2.0"
] | null | null | null | deploy/overlays/stg/serviceaccount.yaml | makocchan0509/bookinfo-manifests | daee2b2350cb608fd4128f34ce8b4557b6b95765 | [
"Apache-2.0"
] | null | null | null | apiVersion: v1
kind: ServiceAccount
metadata:
name: bookinfo-reviews
annotations:
argocd.argoproj.io/sync-options: PruneLast=true
imagePullSecrets:
- name: gitlab-auth-secret
| 20.333333 | 51 | 0.786885 |
73e740392b8c0e967bf8cda7e84c5a11ded4f69d | 245 | yaml | YAML | src/monitor/deploy/clusterrole_binding.yaml | rkamudhan/multicloud-k8s | 072d2ddb8e7ed4c9be8b0b8e9c3c1a3ea58b370c | [
"Apache-2.0"
] | 31 | 2018-10-02T14:52:36.000Z | 2021-11-14T20:38:55.000Z | src/monitor/deploy/clusterrole_binding.yaml | rkamudhan/multicloud-k8s | 072d2ddb8e7ed4c9be8b0b8e9c3c1a3ea58b370c | [
"Apache-2.0"
] | 3 | 2019-02-26T23:03:07.000Z | 2019-05-13T16:21:24.000Z | src/monitor/deploy/clusterrole_binding.yaml | rkamudhan/multicloud-k8s | 072d2ddb8e7ed4c9be8b0b8e9c3c1a3ea58b370c | [
"Apache-2.0"
] | 31 | 2019-01-15T19:51:25.000Z | 2022-02-08T14:47:57.000Z | kind: ClusterRoleBinding
apiVersion: rbac.authorization.k8s.io/v1
metadata:
name: monitor
subjects:
- kind: ServiceAccount
name: monitor
namespace: default
roleRef:
kind: ClusterRole
name: monitor
apiGroup: rbac.authorization.k8s.io
| 18.846154 | 40 | 0.779592 |
73e84a39a61aa4f778b64869f2baa442105b2243 | 142 | yaml | YAML | kube/services/jupyterhub/jupyterhub-storage.yaml | apittas/cloud-automation | 6aaeab3cf34cee00e4a60ce3db23d3178240ce8f | [
"Apache-2.0"
] | 1 | 2019-06-04T16:55:32.000Z | 2019-06-04T16:55:32.000Z | kube/services/jupyterhub/jupyterhub-storage.yaml | apittas/cloud-automation | 6aaeab3cf34cee00e4a60ce3db23d3178240ce8f | [
"Apache-2.0"
] | null | null | null | kube/services/jupyterhub/jupyterhub-storage.yaml | apittas/cloud-automation | 6aaeab3cf34cee00e4a60ce3db23d3178240ce8f | [
"Apache-2.0"
] | 2 | 2019-04-03T18:20:42.000Z | 2019-08-06T15:12:48.000Z | kind: StorageClass
apiVersion: storage.k8s.io/v1
metadata:
name: jupyter-storage
provisioner: kubernetes.io/aws-ebs
parameters:
type: gp2
| 17.75 | 34 | 0.788732 |
73e851c9c66107076789cf450d0aa0fc596bbbff | 138 | yaml | YAML | services.yaml | rafaeldalsenter/kubernetes-web-app-clientes | 4b1bb9e9354bb32370b4ed319d6d7f1e5084a326 | [
"MIT"
] | 1 | 2020-04-15T23:23:43.000Z | 2020-04-15T23:23:43.000Z | services.yaml | rafaeldalsenter/kubernetes-web-app-clientes | 4b1bb9e9354bb32370b4ed319d6d7f1e5084a326 | [
"MIT"
] | null | null | null | services.yaml | rafaeldalsenter/kubernetes-web-app-clientes | 4b1bb9e9354bb32370b4ed319d6d7f1e5084a326 | [
"MIT"
] | 1 | 2020-08-11T11:41:54.000Z | 2020-08-11T11:41:54.000Z | apiVersion: v1
kind: Service
metadata:
name: service-app
spec:
type: LoadBalancer
selector:
app: app-pod
ports:
- port: 80
| 11.5 | 20 | 0.673913 |
73e8803bdba654310414ddcd7af048d0877fe9a3 | 877 | yaml | YAML | jmeter_influxdb_deploy.yaml | xykong/jmeter-kubernetes | 1736e42a3ca624ae081702a7de3e2770f5fba917 | [
"Apache-2.0"
] | null | null | null | jmeter_influxdb_deploy.yaml | xykong/jmeter-kubernetes | 1736e42a3ca624ae081702a7de3e2770f5fba917 | [
"Apache-2.0"
] | null | null | null | jmeter_influxdb_deploy.yaml | xykong/jmeter-kubernetes | 1736e42a3ca624ae081702a7de3e2770f5fba917 | [
"Apache-2.0"
] | null | null | null | apiVersion: apps/v1
kind: Deployment
metadata:
name: jmeter-influxdb
labels:
app: jmeter-influxdb
spec:
replicas: 1
selector:
matchLabels:
app: jmeter-influxdb
template:
metadata:
labels:
app: jmeter-influxdb
spec:
containers:
- image: influxdb
imagePullPolicy: IfNotPresent
name: influxdb
volumeMounts:
- name: config-volume
mountPath: /etc/influxdb
ports:
- containerPort: 8083
name: influx
- containerPort: 8086
name: api
- containerPort: 2003
name: graphite
volumes:
- name: config-volume
configMap:
name: influxdb-config
tolerations:
- key: "type"
operator: "Equal"
value: "jmeter"
effect: NoExecute | 22.487179 | 39 | 0.539339 |
73e8d6dd938a7bc905246e441db29ce4434e5d5d | 280 | yaml | YAML | test/helm/vgs/templates/pvc1.yaml | dell/csi-volumegroup-snapshotter | 7571b3e5a955b5ac21636ea52f58b2cbe82fb42b | [
"Apache-2.0"
] | 1 | 2021-11-02T16:25:37.000Z | 2021-11-02T16:25:37.000Z | test/helm/vgs/templates/pvc1.yaml | dell/csi-volumegroup-snapshotter | 7571b3e5a955b5ac21636ea52f58b2cbe82fb42b | [
"Apache-2.0"
] | 7 | 2021-11-03T21:03:24.000Z | 2022-03-18T19:54:53.000Z | test/helm/vgs/templates/pvc1.yaml | dell/csi-volumegroup-snapshotter | 7571b3e5a955b5ac21636ea52f58b2cbe82fb42b | [
"Apache-2.0"
] | null | null | null | kind: PersistentVolumeClaim
apiVersion: v1
metadata:
name: pvol0
namespace: helmtest-vxflexos
labels:
volume-group: vgs-snap-label
spec:
accessModes:
- ReadWriteOnce
volumeMode: Filesystem
resources:
requests:
storage: 8Gi
storageClassName: vgs-test
| 17.5 | 32 | 0.735714 |
73e9376369b10fd630a14edaf21ecfd781f27e62 | 174 | yaml | YAML | kubernetes/e2e_test/test_yaml/yaml-conflict-first.yaml | Prahladk09/python-1 | 2dfb3035535e4be52ba549f1ff47acbe573b73f6 | [
"Apache-2.0"
] | 4,417 | 2018-01-13T04:30:48.000Z | 2022-03-31T15:33:59.000Z | kubernetes/e2e_test/test_yaml/yaml-conflict-first.yaml | Prahladk09/python-1 | 2dfb3035535e4be52ba549f1ff47acbe573b73f6 | [
"Apache-2.0"
] | 1,414 | 2018-01-12T19:31:56.000Z | 2022-03-31T22:01:02.000Z | kubernetes/e2e_test/test_yaml/yaml-conflict-first.yaml | Prahladk09/python-1 | 2dfb3035535e4be52ba549f1ff47acbe573b73f6 | [
"Apache-2.0"
] | 2,854 | 2018-01-14T08:57:33.000Z | 2022-03-31T01:41:56.000Z | apiVersion: v1
kind: Service
metadata:
name: mock-2
labels:
app: mock-2
spec:
ports:
- port: 99
protocol: TCP
targetPort: 9949
selector:
app: mock-2 | 13.384615 | 20 | 0.632184 |
73e93d715ad9a34f0f83795bb4385713edf31581 | 489 | yaml | YAML | cluster/apps/dev/tekton/ingress.yaml | no1here0003/home-cluster | 992267e6e31ecd404c09a102d038bc30a1111090 | [
"MIT"
] | 2 | 2022-01-23T02:37:51.000Z | 2022-02-01T15:27:33.000Z | cluster/apps/dev/tekton/ingress.yaml | no1here0003/home-cluster | 992267e6e31ecd404c09a102d038bc30a1111090 | [
"MIT"
] | 3 | 2021-12-22T13:30:55.000Z | 2022-03-25T00:38:46.000Z | cluster/apps/dev/tekton/ingress.yaml | no1here0003/home-cluster | 992267e6e31ecd404c09a102d038bc30a1111090 | [
"MIT"
] | null | null | null | ---
apiVersion: networking.k8s.io/v1
kind: Ingress
metadata:
name: tekton
namespace: tekton-pipelines
spec:
ingressClassName: nginx
rules:
- host: tekton.${INTERNAL_DOMAIN}
http:
paths:
- backend:
service:
name: tekton-dashboard
port:
name: http
path: /
pathType: Prefix
tls:
- hosts:
- tekton.${INTERNAL_DOMAIN}
- secretName: tekton-tls-internal
| 20.375 | 38 | 0.537832 |
73e9b403827253353db139d68252b6d40a369ed7 | 1,151 | yaml | YAML | config/webhook-service.yaml | knative-sandbox/net-certmanager | 1e16563b2e937179fcb062f7fe88c258576f9b9e | [
"Apache-2.0"
] | 15 | 2020-07-18T05:46:13.000Z | 2022-03-31T15:28:07.000Z | config/webhook-service.yaml | knative-sandbox/net-certmanager | 1e16563b2e937179fcb062f7fe88c258576f9b9e | [
"Apache-2.0"
] | 329 | 2020-07-15T14:09:15.000Z | 2022-03-31T03:45:06.000Z | config/webhook-service.yaml | knative-sandbox/net-certmanager | 1e16563b2e937179fcb062f7fe88c258576f9b9e | [
"Apache-2.0"
] | 18 | 2020-07-18T05:46:32.000Z | 2022-03-18T10:57:29.000Z | # Copyright 2020 The Knative Authors
#
# Licensed under the Apache License, Version 2.0 (the "License");
# you may not use this file except in compliance with the License.
# You may obtain a copy of the License at
#
# https://www.apache.org/licenses/LICENSE-2.0
#
# Unless required by applicable law or agreed to in writing, software
# distributed under the License is distributed on an "AS IS" BASIS,
# WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
# See the License for the specific language governing permissions and
# limitations under the License.
apiVersion: v1
kind: Service
metadata:
name: net-certmanager-webhook
namespace: knative-serving
labels:
role: net-certmanager-webhook
serving.knative.dev/release: devel
networking.knative.dev/certificate-provider: cert-manager
spec:
ports:
# Define metrics and profiling for them to be accessible within service meshes.
- name: http-metrics
port: 9090
targetPort: 9090
- name: http-profiling
port: 8008
targetPort: 8008
- name: https-webhook
port: 443
targetPort: 8443
selector:
app: net-certmanager-webhook
| 30.289474 | 81 | 0.742832 |
73ea172581efcdc1d2919167621ce93d7ddc407b | 113 | yaml | YAML | docs/admin/resourcequota/object-counts.yaml | AlainRoy/alainroy.github.io | abd3ee50f5ffa3bc61383e0fa7cb66ed32e5d6e4 | [
"Apache-2.0"
] | null | null | null | docs/admin/resourcequota/object-counts.yaml | AlainRoy/alainroy.github.io | abd3ee50f5ffa3bc61383e0fa7cb66ed32e5d6e4 | [
"Apache-2.0"
] | null | null | null | docs/admin/resourcequota/object-counts.yaml | AlainRoy/alainroy.github.io | abd3ee50f5ffa3bc61383e0fa7cb66ed32e5d6e4 | [
"Apache-2.0"
] | null | null | null | apiVersion: v1
kind: ResourceQuota
metadata:
name: object-counts
spec:
hard:
persistentvolumeclaims: "2"
| 14.125 | 31 | 0.743363 |
73eaa1f3d182128e155433db6985a844cf61ac61 | 1,465 | yaml | YAML | clusters/app.ci/prow/03_deployment/boskos_reaper.yaml | andrewballantyne/release | 4d3f488791a09f505151c820dcb68559b2d94f65 | [
"Apache-2.0"
] | 1 | 2022-02-14T10:38:50.000Z | 2022-02-14T10:38:50.000Z | clusters/app.ci/prow/03_deployment/boskos_reaper.yaml | andrewballantyne/release | 4d3f488791a09f505151c820dcb68559b2d94f65 | [
"Apache-2.0"
] | null | null | null | clusters/app.ci/prow/03_deployment/boskos_reaper.yaml | andrewballantyne/release | 4d3f488791a09f505151c820dcb68559b2d94f65 | [
"Apache-2.0"
] | null | null | null | apiVersion: apps/v1
kind: Deployment
metadata:
name: boskos-reaper
labels:
app: prow
component: boskos-reaper
namespace: ci
spec:
replicas: 1
selector:
matchLabels:
component: boskos-reaper
template:
metadata:
labels:
app: prow
component: boskos-reaper
spec:
terminationGracePeriodSeconds: 30
containers:
- name: boskos-reaper
image: gcr.io/k8s-staging-boskos/reaper:v20220208-21245b5
args:
- --boskos-url=http://boskos
- --resource-type=aws-quota-slice,azure4-quota-slice,azure-2-quota-slice,azurestack-quota-slice,azuremag-quota-slice,equinix-ocp-metal-quota-slice,gcp-quota-slice,libvirt-ppc64le-quota-slice,libvirt-s390x-quota-slice,openstack-quota-slice,openstack-kuryr-quota-slice,openstack-vexxhost-quota-slice,openstack-vh-mecha-central-quota-slice,openstack-vh-mecha-az0-quota-slice,openstack-ppc64le-quota-slice,vsphere-quota-slice,ovirt-quota-slice,packet-quota-slice,packet-edge-quota-slice,openstack-osuosl-quota-slice,aws-cpaas-quota-slice,hypershift-quota-slice,alibaba-quota-slice,aws-2-quota-slice,aws-arm64-quota-slice,azurestack-quota-slice,gcp-openshift-gce-devel-ci-2-quota-slice,ibmcloud-quota-slice,metal-quota-slice,osd-ephemeral-quota-slice,ovirt-upgrade-quota-slice,aws-china-quota-slice,aws-usgov-quota-slice,vsphere-discon-quota-slice,vsphere-clusterbot-quota-slice,vsphere-clusterbot-quota-slice
- --target-state=free
| 52.321429 | 912 | 0.756997 |
73eabc019a399ac5ea51880744697682f72f27cd | 296 | yaml | YAML | controllers/testdata/transformers/deployment.yaml | AdamKorcz/kustomize-controller | 74f08c3f1b3ec8ab8725c7775da8d32903996835 | [
"Apache-2.0"
] | 173 | 2020-04-15T08:58:43.000Z | 2022-03-30T06:12:09.000Z | controllers/testdata/transformers/deployment.yaml | AdamKorcz/kustomize-controller | 74f08c3f1b3ec8ab8725c7775da8d32903996835 | [
"Apache-2.0"
] | 245 | 2020-06-19T13:40:55.000Z | 2022-03-31T08:58:41.000Z | controllers/testdata/transformers/deployment.yaml | AdamKorcz/kustomize-controller | 74f08c3f1b3ec8ab8725c7775da8d32903996835 | [
"Apache-2.0"
] | 116 | 2020-04-16T14:41:29.000Z | 2022-03-29T12:46:59.000Z | apiVersion: apps/v1
kind: Deployment
metadata:
name: podinfo
labels:
app: podinfo
spec:
replicas: 1
selector:
matchLabels:
app: podinfo
template:
metadata:
labels:
app: podinfo
spec:
containers:
- name: podinfo
image: podinfo
| 14.8 | 24 | 0.594595 |
73eae77680acf4b70df9f860e9be611d8793dc7e | 108 | yaml | YAML | source-codes/Advanced Kubernetes Usage/Namespaces and Resource Limits/cpu-limits.yaml | yinkokpheng/Kubernetes | a44972c21fef54a616e1f9c704dfc443cb085d1b | [
"MIT"
] | null | null | null | source-codes/Advanced Kubernetes Usage/Namespaces and Resource Limits/cpu-limits.yaml | yinkokpheng/Kubernetes | a44972c21fef54a616e1f9c704dfc443cb085d1b | [
"MIT"
] | null | null | null | source-codes/Advanced Kubernetes Usage/Namespaces and Resource Limits/cpu-limits.yaml | yinkokpheng/Kubernetes | a44972c21fef54a616e1f9c704dfc443cb085d1b | [
"MIT"
] | null | null | null | apiVersion: v1
kind: ResourceQuota
metadata:
name: compute-resources
spec:
hard:
limits.cpu: "400m"
| 13.5 | 25 | 0.722222 |
73eaf5f2e02a1ca4717026402f3b3ec1b2fc1418 | 1,554 | yaml | YAML | prow/test/integration/prow/cluster/horologium_deployment.yaml | rahulii/test-infra | 34ab18218e7e212a75f8699a0b90c648a81b8c93 | [
"Apache-2.0"
] | 3,390 | 2016-04-29T00:20:54.000Z | 2022-03-30T17:32:08.000Z | prow/test/integration/prow/cluster/horologium_deployment.yaml | rahulii/test-infra | 34ab18218e7e212a75f8699a0b90c648a81b8c93 | [
"Apache-2.0"
] | 25,178 | 2016-04-29T21:19:05.000Z | 2022-03-31T23:33:12.000Z | prow/test/integration/prow/cluster/horologium_deployment.yaml | rahulii/test-infra | 34ab18218e7e212a75f8699a0b90c648a81b8c93 | [
"Apache-2.0"
] | 2,271 | 2016-04-28T21:42:21.000Z | 2022-03-31T02:24:49.000Z | # Copyright 2017 The Kubernetes Authors All rights reserved.
#
# Licensed under the Apache License, Version 2.0 (the "License");
# you may not use this file except in compliance with the License.
# You may obtain a copy of the License at
#
# http://www.apache.org/licenses/LICENSE-2.0
#
# Unless required by applicable law or agreed to in writing, software
# distributed under the License is distributed on an "AS IS" BASIS,
# WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
# See the License for the specific language governing permissions and
# limitations under the License.
apiVersion: apps/v1
kind: Deployment
metadata:
namespace: default
name: horologium
labels:
app: horologium
spec:
replicas: 1 # Do not scale up.
strategy:
type: Recreate
selector:
matchLabels:
app: horologium
template:
metadata:
labels:
app: horologium
spec:
serviceAccountName: horologium
terminationGracePeriodSeconds: 30
containers:
- name: horologium
image: localhost:5000/horologium
args:
- --config-path=/etc/config/config.yaml
- --job-config-path=/etc/job-config
- --dry-run=false
volumeMounts:
- name: config
mountPath: /etc/config
readOnly: true
- name: job-config
mountPath: /etc/job-config
readOnly: true
volumes:
- name: config
configMap:
name: config
- name: job-config
configMap:
name: job-config
| 27.263158 | 74 | 0.655084 |
73eb4f3789ff33598e670ba3f9f360891a00cead | 66 | yaml | YAML | docker-hub-limits/pull-through-cache/server/ha/01-namespace.yaml | khan202122/Kubernetes-Master-Class | aa0d432beec8d01585fe35021078f5d990a97851 | [
"Apache-2.0"
] | 259 | 2021-05-09T20:35:33.000Z | 2022-03-29T06:41:19.000Z | docker-hub-limits/pull-through-cache/server/ha/01-namespace.yaml | khan202122/Kubernetes-Master-Class | aa0d432beec8d01585fe35021078f5d990a97851 | [
"Apache-2.0"
] | 8 | 2021-05-27T22:43:43.000Z | 2022-02-01T23:47:38.000Z | docker-hub-limits/pull-through-cache/server/ha/01-namespace.yaml | khan202122/Kubernetes-Master-Class | aa0d432beec8d01585fe35021078f5d990a97851 | [
"Apache-2.0"
] | 138 | 2021-05-11T18:59:26.000Z | 2022-02-04T10:25:42.000Z | ---
apiVersion: v1
kind: Namespace
metadata:
name: pull-through
| 11 | 20 | 0.727273 |
73ec43e4c9704897dbcf61342a8c6dbd9a74af27 | 845 | yaml | YAML | setup/configs/monitoring/prometheus/prometheus-clusterRoleBinding.yaml | google/harpia | be8b66d4f7925e35fad1b6acd5b7fd3317de98a2 | [
"Apache-2.0"
] | 16 | 2019-02-17T18:04:32.000Z | 2021-03-08T10:17:08.000Z | setup/configs/monitoring/prometheus/prometheus-clusterRoleBinding.yaml | google/harpia | be8b66d4f7925e35fad1b6acd5b7fd3317de98a2 | [
"Apache-2.0"
] | null | null | null | setup/configs/monitoring/prometheus/prometheus-clusterRoleBinding.yaml | google/harpia | be8b66d4f7925e35fad1b6acd5b7fd3317de98a2 | [
"Apache-2.0"
] | 8 | 2019-03-26T01:51:36.000Z | 2021-10-14T15:07:02.000Z | # Copyright 2019 Google LLC
#
# Licensed under the Apache License, Version 2.0 (the "License");
# you may not use this file except in compliance with the License.
# You may obtain a copy of the License at
#
# http://www.apache.org/licenses/LICENSE-2.0
#
# Unless required by applicable law or agreed to in writing, software
# distributed under the License is distributed on an "AS IS" BASIS,
# WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
# See the License for the specific language governing permissions and
# limitations under the License.
apiVersion: rbac.authorization.k8s.io/v1
kind: ClusterRoleBinding
metadata:
name: prometheus-k8s
roleRef:
apiGroup: rbac.authorization.k8s.io
kind: ClusterRole
name: prometheus-k8s
subjects:
- kind: ServiceAccount
name: prometheus-k8s
namespace: monitoring
| 31.296296 | 74 | 0.769231 |
73ec489fe3f03f1dce0be669d5f389c3bf55c81b | 1,042 | yaml | YAML | contrib/natss/config/200-addressable-resolver-clusterrole.yaml | sigmavirus24/eventing | a7b69f40bdd5d6e5d98ccf3b609ba555a378e046 | [
"Apache-2.0"
] | null | null | null | contrib/natss/config/200-addressable-resolver-clusterrole.yaml | sigmavirus24/eventing | a7b69f40bdd5d6e5d98ccf3b609ba555a378e046 | [
"Apache-2.0"
] | null | null | null | contrib/natss/config/200-addressable-resolver-clusterrole.yaml | sigmavirus24/eventing | a7b69f40bdd5d6e5d98ccf3b609ba555a378e046 | [
"Apache-2.0"
] | null | null | null | # Copyright 2019 The Knative Authors
#
# Licensed under the Apache License, Version 2.0 (the "License");
# you may not use this file except in compliance with the License.
# You may obtain a copy of the License at
#
# http://www.apache.org/licenses/LICENSE-2.0
#
# Unless required by applicable law or agreed to in writing, software
# distributed under the License is distributed on an "AS IS" BASIS,
# WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
# See the License for the specific language governing permissions and
# limitations under the License.
apiVersion: rbac.authorization.k8s.io/v1
kind: ClusterRole
metadata:
name: natss-addressable-resolver
labels:
eventing.knative.dev/release: devel
duck.knative.dev/addressable: "true"
# Do not use this role directly. These rules will be added to the "addressable-resolver" role.
rules:
- apiGroups:
- messaging.knative.dev
resources:
- natsschannels
- natsschannels/status
verbs:
- get
- list
- watch
| 31.575758 | 94 | 0.729367 |
73ec6461d2cc715bead609be6327535dd68e7c6e | 144 | yaml | YAML | built-in-references/Kubernetes/perf/violations/violation5006.yaml | sw47/azure-policy | 4a38e4cb4047b5364902653f0defe45f1b21bc61 | [
"MIT"
] | null | null | null | built-in-references/Kubernetes/perf/violations/violation5006.yaml | sw47/azure-policy | 4a38e4cb4047b5364902653f0defe45f1b21bc61 | [
"MIT"
] | null | null | null | built-in-references/Kubernetes/perf/violations/violation5006.yaml | sw47/azure-policy | 4a38e4cb4047b5364902653f0defe45f1b21bc61 | [
"MIT"
] | null | null | null | apiVersion: v1
kind: Pod
metadata:
name: image-demo-5006
spec:
containers:
- name: nginx
image: nginx #ritaacr.azurecr.io/nginx:latest | 18 | 49 | 0.722222 |
73ec6a986f67781e7d00da5300c83eaf1e73d7e7 | 180 | yaml | YAML | workloads/nginx-service.yaml | raghunath1986/kubernetes-kaniko | 5d8dae5b2d49a40f1b0d0ea91a6daca32d85c893 | [
"Apache-2.0"
] | null | null | null | workloads/nginx-service.yaml | raghunath1986/kubernetes-kaniko | 5d8dae5b2d49a40f1b0d0ea91a6daca32d85c893 | [
"Apache-2.0"
] | null | null | null | workloads/nginx-service.yaml | raghunath1986/kubernetes-kaniko | 5d8dae5b2d49a40f1b0d0ea91a6daca32d85c893 | [
"Apache-2.0"
] | null | null | null | apiVersion: v1
kind: Service
metadata:
name: nginx-service
namespace: kaniko
spec:
selector:
app: nginx
ports:
- port: 80
targetPort: 80
type: LoadBalancer
| 13.846154 | 21 | 0.672222 |
73ec77dcd64aa7391512a3f4d55db9a257aaa9ed | 596 | yml | YAML | deployment.yml | wkorando/cnsd-message-consumer | 2de7df44eee7bee4b93894e919e6699f54ca7804 | [
"MIT"
] | null | null | null | deployment.yml | wkorando/cnsd-message-consumer | 2de7df44eee7bee4b93894e919e6699f54ca7804 | [
"MIT"
] | null | null | null | deployment.yml | wkorando/cnsd-message-consumer | 2de7df44eee7bee4b93894e919e6699f54ca7804 | [
"MIT"
] | null | null | null | apiVersion: apps/v1
kind: Deployment
metadata:
labels:
run: message-consumer-service
name: message-consumer-service
namespace: default
spec:
replicas: 1
revisionHistoryLimit: 1
selector:
matchLabels:
run: message-consumer-service
template:
metadata:
labels:
run: message-consumer-service
spec:
containers:
- image: ${REGISTRY_URL}/${REGISTRY_NAMESPACE}/${IMAGE_NAME}:${IMAGE_TAG}
name: message-consumer-service
lifecycle:
preStop:
exec:
command: ["/bin/bash", "-c", "sleep 5"] | 23.84 | 79 | 0.622483 |
73ec91daeb8013357385c8a244053c13e4dbcf3e | 1,858 | yaml | YAML | assets/csidriveroperators/shared-resource/09_deployment.yaml | coreydaley/openshift-cluster-storage-operator | c816f049fe28ea31dd004604e950f3f48086e881 | [
"Apache-2.0"
] | null | null | null | assets/csidriveroperators/shared-resource/09_deployment.yaml | coreydaley/openshift-cluster-storage-operator | c816f049fe28ea31dd004604e950f3f48086e881 | [
"Apache-2.0"
] | null | null | null | assets/csidriveroperators/shared-resource/09_deployment.yaml | coreydaley/openshift-cluster-storage-operator | c816f049fe28ea31dd004604e950f3f48086e881 | [
"Apache-2.0"
] | null | null | null | apiVersion: apps/v1
kind: Deployment
metadata:
name: shared-resource-csi-driver-operator
namespace: openshift-cluster-csi-drivers
spec:
replicas: 1
selector:
matchLabels:
name: shared-resource-csi-driver-operator
strategy: {}
template:
metadata:
annotations:
target.workload.openshift.io/management: '{"effect": "PreferredDuringScheduling"}'
labels:
name: shared-resource-csi-driver-operator
spec:
containers:
- args:
- start
- -v=${LOG_LEVEL}
env:
- name: DRIVER_IMAGE
value: ${DRIVER_IMAGE}
- name: NODE_DRIVER_REGISTRAR_IMAGE
value: ${NODE_DRIVER_REGISTRAR_IMAGE}
- name: WEBHOOK_IMAGE
value: ${WEBHOOK_IMAGE}
- name: POD_NAME
valueFrom:
fieldRef:
fieldPath: metadata.name
image: ${OPERATOR_IMAGE}
imagePullPolicy: IfNotPresent
name: shared-resource-csi-driver-operator
resources:
requests:
memory: 50Mi
cpu: 10m
ports:
- name: provisioner-m
containerPort: 6000
protocol: TCP
volumeMounts:
- mountPath: /etc/secrets
name: shared-resource-csi-driver-operator-metrics-serving-cert
priorityClassName: system-cluster-critical
serviceAccountName: shared-resource-csi-driver-operator
nodeSelector:
node-role.kubernetes.io/master: ""
tolerations:
- key: CriticalAddonsOnly
operator: Exists
- key: node-role.kubernetes.io/master
operator: Exists
effect: "NoSchedule"
volumes:
- name: shared-resource-csi-driver-operator-metrics-serving-cert
secret:
defaultMode: 420
secretName: shared-resource-csi-driver-operator-metrics-serving-cert
| 29.492063 | 90 | 0.618945 |
73ecdbb18c242b817c2310ea33de6fa8cb231f84 | 68 | yaml | YAML | cluster/namespaces/system-network.yaml | heseifert/home-cluster | 349086951659b8309e945a547cd176c8ffc3f61a | [
"MIT"
] | null | null | null | cluster/namespaces/system-network.yaml | heseifert/home-cluster | 349086951659b8309e945a547cd176c8ffc3f61a | [
"MIT"
] | 317 | 2021-08-17T21:59:30.000Z | 2022-01-22T11:36:47.000Z | cluster/namespaces/system-network.yaml | heseifert/home-cluster | 349086951659b8309e945a547cd176c8ffc3f61a | [
"MIT"
] | null | null | null | ---
apiVersion: v1
kind: Namespace
metadata:
name: system-network
| 11.333333 | 22 | 0.735294 |
73ed3d122a74dda7828b001d4ae42777cb129c8d | 228 | yaml | YAML | icp-backend/configMaps-secrets-istio-calico/calico/weave.yaml | newerton/ICP-Airways | d5cf843f7c537a70d4ffbbfa48e1b646a0cc8d3b | [
"MIT"
] | 41 | 2018-06-06T18:28:34.000Z | 2020-08-15T23:57:33.000Z | icp-backend/configMaps-secrets-istio-calico/calico/weave.yaml | newerton/ICP-Airways | d5cf843f7c537a70d4ffbbfa48e1b646a0cc8d3b | [
"MIT"
] | 116 | 2018-05-28T07:43:06.000Z | 2019-08-06T07:01:51.000Z | icp-backend/configMaps-secrets-istio-calico/calico/weave.yaml | newerton/ICP-Airways | d5cf843f7c537a70d4ffbbfa48e1b646a0cc8d3b | [
"MIT"
] | 20 | 2018-06-28T11:11:41.000Z | 2021-06-09T06:16:29.000Z | kind: NetworkPolicy
apiVersion: networking.k8s.io/v1
metadata:
namespace: default
name: weave-allow-all-namespaces
spec:
podSelector:
matchLabels:
app: weave-scope
ingress:
- from:
- namespaceSelector: {} | 19 | 34 | 0.710526 |
73ed457923b3d85bd0305204f91d66e9ae4644f0 | 2,343 | yaml | YAML | k8s/base/role.yaml | dxas90/bobr-status | 9918a338b4cfb47c48e769bc014fcae998a9ad71 | [
"Apache-2.0"
] | null | null | null | k8s/base/role.yaml | dxas90/bobr-status | 9918a338b4cfb47c48e769bc014fcae998a9ad71 | [
"Apache-2.0"
] | null | null | null | k8s/base/role.yaml | dxas90/bobr-status | 9918a338b4cfb47c48e769bc014fcae998a9ad71 | [
"Apache-2.0"
] | null | null | null | ---
kind: Role
apiVersion: rbac.authorization.k8s.io/v1
metadata:
name: k8s-bobr-status-role
labels:
app: k8s-bobr-status
rules:
- verbs:
- get
- list
- watch
apiGroups:
- ""
resources:
- configmaps
- endpoints
- persistentvolumeclaims
- persistentvolumeclaims/status
- pods
- replicationcontrollers
- replicationcontrollers/scale
- serviceaccounts
- services
- services/status
- verbs:
- get
- list
- watch
apiGroups:
- ""
resources:
- bindings
- events
- limitranges
- namespaces/status
- pods/log
- pods/status
- replicationcontrollers/status
- resourcequotas
- resourcequotas/status
- verbs:
- get
- list
- watch
apiGroups:
- ""
resources:
- namespaces
- verbs:
- get
- list
- watch
apiGroups:
- apps
resources:
- controllerrevisions
- daemonsets
- daemonsets/status
- deployments
- deployments/scale
- deployments/status
- replicasets
- replicasets/scale
- replicasets/status
- statefulsets
- statefulsets/scale
- statefulsets/status
- verbs:
- get
- list
- watch
apiGroups:
- autoscaling
resources:
- horizontalpodautoscalers
- horizontalpodautoscalers/status
- verbs:
- get
- list
- watch
apiGroups:
- batch
resources:
- cronjobs
- cronjobs/status
- jobs
- jobs/status
- verbs:
- get
- list
- watch
apiGroups:
- extensions
resources:
- daemonsets
- daemonsets/status
- deployments
- deployments/scale
- deployments/status
- ingresses
- ingresses/status
- networkpolicies
- replicasets
- replicasets/scale
- replicasets/status
- replicationcontrollers/scale
- verbs:
- get
- list
- watch
apiGroups:
- policy
resources:
- poddisruptionbudgets
- poddisruptionbudgets/status
- verbs:
- get
- list
- watch
apiGroups:
- networking.k8s.io
resources:
- ingresses
- ingresses/status
- networkpolicies
| 18.448819 | 40 | 0.549723 |
73eda8cadb9dc9826bdf45dce987aa17c4f6feee | 2,233 | yaml | YAML | cluster/core/rook-ceph/rook-direct-mount/deployment.yaml | 5thsymphony/cluster-k3s | 0f9310368c443733032ffb6e47313269ee987c40 | [
"MIT"
] | null | null | null | cluster/core/rook-ceph/rook-direct-mount/deployment.yaml | 5thsymphony/cluster-k3s | 0f9310368c443733032ffb6e47313269ee987c40 | [
"MIT"
] | 1 | 2021-11-03T16:48:19.000Z | 2021-11-03T16:48:19.000Z | cluster/core/rook-ceph/rook-direct-mount/deployment.yaml | 5thsymphony/cluster-k3s | 0f9310368c443733032ffb6e47313269ee987c40 | [
"MIT"
] | null | null | null | ---
apiVersion: apps/v1
kind: Deployment
metadata:
name: rook-direct-mount
namespace: rook-ceph # namespace:cluster
labels:
app: rook-direct-mount
spec:
replicas: 1
selector:
matchLabels:
app: rook-direct-mount
template:
metadata:
labels:
app: rook-direct-mount
spec:
dnsPolicy: ClusterFirstWithHostNet
containers:
- name: rook-direct-mount
image: rook/ceph:v1.8.2
command: ["/tini"]
args: ["-g", "--", "/usr/local/bin/toolbox.sh"]
imagePullPolicy: IfNotPresent
env:
- name: ROOK_CEPH_USERNAME
valueFrom:
secretKeyRef:
name: rook-ceph-mon
key: ceph-username
- name: ROOK_CEPH_SECRET
valueFrom:
secretKeyRef:
name: rook-ceph-mon
key: ceph-secret
securityContext:
privileged: true
volumeMounts:
- mountPath: /dev
name: dev
- mountPath: /sys/bus
name: sysbus
- mountPath: /lib/modules
name: libmodules
- name: mon-endpoint-volume
mountPath: /etc/rook
# - name: nas-data
# mountPath: /mnt/nas-data
- name: direct-mount-scripts
mountPath: /scripts
# if hostNetwork: false, the "rbd map" command hangs, see https://github.com/rook/rook/issues/2021
hostNetwork: true
volumes:
- name: dev
hostPath:
path: /dev
- name: sysbus
hostPath:
path: /sys/bus
- name: libmodules
hostPath:
path: /lib/modules
- name: mon-endpoint-volume
configMap:
name: rook-ceph-mon-endpoints
items:
- key: data
path: mon-endpoints
# - name: nas-data
# nfs:
# server: "${NAS_ADDR}"
# path: /tycho/Data
- name: direct-mount-scripts
projected:
defaultMode: 0775
sources:
- configMap:
name: direct-mount-scripts
| 27.9125 | 104 | 0.495298 |
73ee0f4e4c6151c0b8c12c031bcf59dcefa10391 | 302 | yaml | YAML | yamls/voyager/clusterrolebinding_release-name-voyager-license-reader.yaml | jmnote/kubeyaml | 675b07a90d2295f697e89294dd31030943836a0d | [
"Apache-2.0"
] | 1 | 2022-01-28T16:03:48.000Z | 2022-01-28T16:03:48.000Z | yamls/voyager/clusterrolebinding_release-name-voyager-license-reader.yaml | jmnote/kubeyaml | 675b07a90d2295f697e89294dd31030943836a0d | [
"Apache-2.0"
] | null | null | null | yamls/voyager/clusterrolebinding_release-name-voyager-license-reader.yaml | jmnote/kubeyaml | 675b07a90d2295f697e89294dd31030943836a0d | [
"Apache-2.0"
] | 1 | 2022-02-15T07:57:28.000Z | 2022-02-15T07:57:28.000Z | apiVersion: rbac.authorization.k8s.io/v1
kind: ClusterRoleBinding
metadata:
name: RELEASE-NAME-voyager-license-reader
roleRef:
apiGroup: rbac.authorization.k8s.io
kind: ClusterRole
name: appscode:license-reader
subjects:
- kind: ServiceAccount
name: RELEASE-NAME-voyager
namespace: default
| 23.230769 | 43 | 0.794702 |
73eeab75abfa189ef23af090b285f2c52bafaf4b | 208 | yml | YAML | manifests/service.yml | raveerk/pipelines-javascript-docker | 3ab3e69acd123b5469c162c2d05941aaa93ac58d | [
"CC-BY-4.0",
"MIT"
] | null | null | null | manifests/service.yml | raveerk/pipelines-javascript-docker | 3ab3e69acd123b5469c162c2d05941aaa93ac58d | [
"CC-BY-4.0",
"MIT"
] | null | null | null | manifests/service.yml | raveerk/pipelines-javascript-docker | 3ab3e69acd123b5469c162c2d05941aaa93ac58d | [
"CC-BY-4.0",
"MIT"
] | null | null | null | apiVersion: v1
kind: Service
metadata:
name: raveerkpipelinesjavascriptdocker
spec:
type: LoadBalancer
ports:
- port: 8080
selector:
app: raveerkpipelinesjavascriptdocker | 20.8 | 45 | 0.6875 |
73eeafcf58558da243f2b22895f538f89da8d1dc | 564 | yml | YAML | deployment.yml | Pinknode/apps | dfd5303215a41a7ca93d7612f74577ec66d45727 | [
"Apache-2.0"
] | null | null | null | deployment.yml | Pinknode/apps | dfd5303215a41a7ca93d7612f74577ec66d45727 | [
"Apache-2.0"
] | null | null | null | deployment.yml | Pinknode/apps | dfd5303215a41a7ca93d7612f74577ec66d45727 | [
"Apache-2.0"
] | 1 | 2021-08-19T16:17:46.000Z | 2021-08-19T16:17:46.000Z | apiVersion: apps/v1
kind: Deployment
metadata:
name: pn-apps
namespace: pn-apps
spec:
replicas: 1
selector:
matchLabels:
app: pn-apps
strategy:
rollingUpdate:
maxSurge: 1
maxUnavailable: 1
minReadySeconds: 5
template:
metadata:
labels:
app: pn-apps
spec:
containers:
- name: pn-apps
image: gcr.io/pinknode-infra-gke/pn-apps-custom:latest
ports:
- containerPort: 80
resources:
requests:
cpu: 100m
limits:
cpu: 100m
| 18.193548 | 62 | 0.569149 |
73ef90345c2a9858f5fcdc9d05654d7c638c9f88 | 940 | yaml | YAML | github/config/202-webhook-clusterrolebinding.yaml | tcnghia/eventing-contrib | 26fafb098d315d02ce526b0b2e8642dfcf2e7fcc | [
"Apache-2.0"
] | 12 | 2020-09-15T00:35:46.000Z | 2022-02-08T15:29:22.000Z | github/config/202-webhook-clusterrolebinding.yaml | tcnghia/eventing-contrib | 26fafb098d315d02ce526b0b2e8642dfcf2e7fcc | [
"Apache-2.0"
] | 253 | 2020-09-14T18:55:58.000Z | 2022-03-31T13:28:50.000Z | github/config/202-webhook-clusterrolebinding.yaml | tcnghia/eventing-contrib | 26fafb098d315d02ce526b0b2e8642dfcf2e7fcc | [
"Apache-2.0"
] | 26 | 2020-09-14T18:00:31.000Z | 2022-03-18T10:57:54.000Z | # Copyright 2019 The Knative Authors
#
# Licensed under the Apache License, Version 2.0 (the "License");
# you may not use this file except in compliance with the License.
# You may obtain a copy of the License at
#
# http://www.apache.org/licenses/LICENSE-2.0
#
# Unless required by applicable law or agreed to in writing, software
# distributed under the License is distributed on an "AS IS" BASIS,
# WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
# See the License for the specific language governing permissions and
# limitations under the License.
apiVersion: rbac.authorization.k8s.io/v1
kind: ClusterRoleBinding
metadata:
name: eventing-sources-github-webhook
labels:
contrib.eventing.knative.dev/release: devel
subjects:
- kind: ServiceAccount
name: github-webhook
namespace: knative-sources
roleRef:
apiGroup: rbac.authorization.k8s.io
kind: ClusterRole
name: github-webhook
| 31.333333 | 74 | 0.765957 |
73f0555753c82e8a8782e1510cc8e0f2a034b87f | 450 | yaml | YAML | Templates/redis/sentinel/es-client-pdb.yaml | DaoCloud-Labs/dockerfiles | 89cf65db1ad3b5158d768a95fe93c6acdd627508 | [
"Apache-2.0"
] | null | null | null | Templates/redis/sentinel/es-client-pdb.yaml | DaoCloud-Labs/dockerfiles | 89cf65db1ad3b5158d768a95fe93c6acdd627508 | [
"Apache-2.0"
] | null | null | null | Templates/redis/sentinel/es-client-pdb.yaml | DaoCloud-Labs/dockerfiles | 89cf65db1ad3b5158d768a95fe93c6acdd627508 | [
"Apache-2.0"
] | 2 | 2020-04-15T10:19:23.000Z | 2020-04-16T04:53:47.000Z | # --------------------------------------------
# Created by Statemood, 2018.01.06
# [email protected]
#
# Project dockerfiles:
# https://github.com/Statemood/dockerfiles
# --------------------------------------------
apiVersion: policy/v1beta1
kind: PodDisruptionBudget
metadata:
name: elasticsearch-client
spec:
maxUnavailable: 1
minAvailable: 1
selector:
matchLabels:
component: elasticsearch
role: client
| 22.5 | 46 | 0.564444 |
73f055b72399c6de46054440e1844bdbf9e00f05 | 169 | yaml | YAML | kubernetes_manifests/configmap-ml.yaml | made-ml-in-prod-2021/inference_examples | 01eadaa36201fd40f62799ec8b9c17491aa46123 | [
"MIT"
] | null | null | null | kubernetes_manifests/configmap-ml.yaml | made-ml-in-prod-2021/inference_examples | 01eadaa36201fd40f62799ec8b9c17491aa46123 | [
"MIT"
] | null | null | null | kubernetes_manifests/configmap-ml.yaml | made-ml-in-prod-2021/inference_examples | 01eadaa36201fd40f62799ec8b9c17491aa46123 | [
"MIT"
] | 1 | 2021-05-29T14:02:58.000Z | 2021-05-29T14:02:58.000Z | apiVersion: v1
kind: ConfigMap
metadata:
name: config-ml
labels:
app: fastapi
data:
config.yaml: |
val1: 12
kekek: 12
another.yaml: |
your entry
| 13 | 17 | 0.639053 |
73f0b90949e3e676c6c3172614b8b8b5419972a4 | 171 | yaml | YAML | mutating-webhook/deployment/service.yaml | m0c1-us/kubeplus | bb092d4565ea8b8b7a7beec8fbcef5692fa0a299 | [
"Apache-2.0"
] | 396 | 2018-03-30T19:56:17.000Z | 2022-03-23T09:35:31.000Z | mutating-webhook/deployment/service.yaml | m0c1-us/kubeplus | bb092d4565ea8b8b7a7beec8fbcef5692fa0a299 | [
"Apache-2.0"
] | 182 | 2018-04-24T03:12:00.000Z | 2022-02-28T18:27:11.000Z | mutating-webhook/deployment/service.yaml | m0c1-us/kubeplus | bb092d4565ea8b8b7a7beec8fbcef5692fa0a299 | [
"Apache-2.0"
] | 64 | 2018-04-25T00:02:37.000Z | 2022-03-16T02:46:03.000Z | apiVersion: v1
kind: Service
metadata:
name: crd-hook-service
labels:
app: crd-hook
spec:
ports:
- port: 443
targetPort: 443
selector:
app: crd-hook
| 13.153846 | 24 | 0.654971 |
73f0ef4b08659b392b103e0ca0ab4f6209646716 | 1,059 | yaml | YAML | docker-registry/03-registry-deployment.yaml | agentbellnorm/raspberry-pile-configs | 65fd4d33cdf657a452404f92ec0f70d87c35a884 | [
"Apache-2.0"
] | 1 | 2021-09-23T09:31:31.000Z | 2021-09-23T09:31:31.000Z | docker-registry/03-registry-deployment.yaml | agentbellnorm/raspberry-pile-configs | 65fd4d33cdf657a452404f92ec0f70d87c35a884 | [
"Apache-2.0"
] | null | null | null | docker-registry/03-registry-deployment.yaml | agentbellnorm/raspberry-pile-configs | 65fd4d33cdf657a452404f92ec0f70d87c35a884 | [
"Apache-2.0"
] | 1 | 2021-11-29T20:41:53.000Z | 2021-11-29T20:41:53.000Z | apiVersion: apps/v1
kind: Deployment
metadata:
name: docker-registry
namespace: docker-registry
labels:
app: docker-registry
spec:
replicas: 1
selector:
matchLabels:
app: docker-registry
template:
metadata:
labels:
app: docker-registry
spec:
containers:
- name: docker-registry
image: registry
ports:
- containerPort: 5000
volumeMounts:
- name: storage
mountPath: /var/lib/registry
- name: htpasswd
mountPath: /auth
readOnly: true
env:
- name: REGISTRY_AUTH
value: htpasswd
- name: REGISTRY_AUTH_HTPASSWD_REALM
value: Docker Registry
- name: REGISTRY_AUTH_HTPASSWD_PATH
value: /auth/htpasswd
- name: REGISTRY_STORAGE_DELETE_ENABLED
value: "true"
volumes:
- name: storage
persistentVolumeClaim:
claimName: docker-registry-pvc
- name: htpasswd
secret:
secretName: docker-registry-htpasswd
| 23.533333 | 47 | 0.595845 |
73f1abc2692a9c4eb5f6ec0e75ba914d8349e0c6 | 192 | yaml | YAML | deploy/configmap.yaml | Nexinto/k8s-bigip-ipam | 93661934b782ab2345f7a9fcd329364c76475466 | [
"Apache-2.0"
] | null | null | null | deploy/configmap.yaml | Nexinto/k8s-bigip-ipam | 93661934b782ab2345f7a9fcd329364c76475466 | [
"Apache-2.0"
] | null | null | null | deploy/configmap.yaml | Nexinto/k8s-bigip-ipam | 93661934b782ab2345f7a9fcd329364c76475466 | [
"Apache-2.0"
] | null | null | null | ---
apiVersion: v1
kind: ConfigMap
metadata:
name: k8s-bigip-ipam
namespace: kube-system
data:
LOG_LEVEL: debug
CONTROLLER_TAG: kubernetes
F5_PARTITION: kubernetes
REQUIRE_TAG: ""
| 16 | 28 | 0.744792 |
73f1ced401a2e18051355dfd52a5c34c66513827 | 67 | yaml | YAML | deploy/service_account.yaml | paroque28/gpu-operator | fa52fb951a7bc5b9b5c5e1c245f2d1af6157aadf | [
"Apache-2.0"
] | 1 | 2020-11-22T23:07:56.000Z | 2020-11-22T23:07:56.000Z | deploy/service_account.yaml | ArangoGutierrez/gpu-operator | 0dfd2e46a0c4de78ef2193b1d8ea169009504e92 | [
"Apache-2.0"
] | null | null | null | deploy/service_account.yaml | ArangoGutierrez/gpu-operator | 0dfd2e46a0c4de78ef2193b1d8ea169009504e92 | [
"Apache-2.0"
] | null | null | null | apiVersion: v1
kind: ServiceAccount
metadata:
name: gpu-operator
| 13.4 | 20 | 0.791045 |
73f1d86ae0ad96f6188c4af740a05c0456ebe0a1 | 114 | yaml | YAML | example/pod.yaml | brendandburns/admission-control-sdk | c05ceca689adfdf4d767cf382e63178e346031e0 | [
"MIT"
] | 2 | 2022-02-26T19:51:13.000Z | 2022-02-28T15:36:33.000Z | example/pod.yaml | brendandburns/admission-control-sdk | c05ceca689adfdf4d767cf382e63178e346031e0 | [
"MIT"
] | null | null | null | example/pod.yaml | brendandburns/admission-control-sdk | c05ceca689adfdf4d767cf382e63178e346031e0 | [
"MIT"
] | null | null | null | apiVersion: v1
kind: Pod
metadata:
name: smooth-app
spec:
containers:
- image: busybox
name: smooth-app
| 12.666667 | 20 | 0.692982 |
73f213a93c541258ddda53ecc54ced7c2aaf744b | 448 | yml | YAML | kubernetes/reddit/post-deployment.yml | Torchun/otus_microservices | c6ccbc1ffde647123ed3942820c883b5e619b680 | [
"MIT"
] | null | null | null | kubernetes/reddit/post-deployment.yml | Torchun/otus_microservices | c6ccbc1ffde647123ed3942820c883b5e619b680 | [
"MIT"
] | 4 | 2021-02-05T13:41:09.000Z | 2021-04-29T13:36:13.000Z | kubernetes/reddit/post-deployment.yml | Torchun/otus_microservices | c6ccbc1ffde647123ed3942820c883b5e619b680 | [
"MIT"
] | 2 | 2021-02-24T20:51:36.000Z | 2021-07-15T13:14:14.000Z | apiVersion: apps/v1
kind: Deployment
metadata:
name: post
labels:
app: reddit
component: post
spec:
replicas: 3
selector:
matchLabels:
app: reddit
component: post
template:
metadata:
name: post
labels:
app: reddit
component: post
spec:
containers:
- image: torchun/post
name: post
env:
- name: POST_DATABASE_HOST
value: post-db
| 16.592593 | 36 | 0.566964 |
73f26b715c84a5603ac1c20eeeda22e5f427cbab | 1,032 | yaml | YAML | kubernetes-networks/canary/web-deploy-canary2.yaml | otus-kuber-2020-11/evbedarev_platform | 207f1563490b4fbf23b91291886f1d1045b11d0e | [
"MIT"
] | null | null | null | kubernetes-networks/canary/web-deploy-canary2.yaml | otus-kuber-2020-11/evbedarev_platform | 207f1563490b4fbf23b91291886f1d1045b11d0e | [
"MIT"
] | 3 | 2021-01-05T19:16:16.000Z | 2021-05-04T19:12:48.000Z | kubernetes-networks/canary/web-deploy-canary2.yaml | otus-kuber-2020-11/evbedarev_platform | 207f1563490b4fbf23b91291886f1d1045b11d0e | [
"MIT"
] | null | null | null | apiVersion: apps/v1
kind: Deployment
metadata:
name: web-canary2
spec:
replicas: 1
selector:
matchLabels:
app: web-canary2
strategy:
type: RollingUpdate
rollingUpdate:
maxUnavailable: 100%
maxSurge: 100%
template:
metadata:
name: web-canary2
labels: # Метки в формате key: value
app: web-canary2
spec: # Описание Pod
containers: # Описание контейнеров внутри Pod
- name: apache2
image: madjo/kuber:apache_canary
readinessProbe:
httpGet:
path: /index.html
port: 8000
livenessProbe:
tcpSocket: { port: 8000 }
volumeMounts:
- name: app
mountPath: /app
initContainers:
- name: busybox
image: busybox
command: ['sh', '-c', 'echo "<html><head><title>Hello2!</title></head></html>" > /app/index.html']
volumeMounts:
- name: app
mountPath: /app
volumes:
- name: app
emptyDir: {}
| 23.454545 | 106 | 0.55814 |
73f2becf0e530ff49ca17ecb7e67b6b97ff20f59 | 223 | yaml | YAML | 4-platform-admin/constraint-ext-services/contacts-svc-lb.yaml | mollypi/build-a-platform-with-krm | 100a7759b0263c4e524560bbfdabb84f04ff0ab1 | [
"Apache-2.0"
] | 39 | 2021-05-25T23:00:30.000Z | 2022-02-11T21:49:14.000Z | 4-platform-admin/constraint-ext-services/contacts-svc-lb.yaml | mollypi/build-a-platform-with-krm | 100a7759b0263c4e524560bbfdabb84f04ff0ab1 | [
"Apache-2.0"
] | 12 | 2021-05-30T15:34:47.000Z | 2021-12-18T13:33:08.000Z | 4-platform-admin/constraint-ext-services/contacts-svc-lb.yaml | mollypi/build-a-platform-with-krm | 100a7759b0263c4e524560bbfdabb84f04ff0ab1 | [
"Apache-2.0"
] | 23 | 2021-05-26T19:38:43.000Z | 2022-03-30T00:43:07.000Z | apiVersion: v1
kind: Service
metadata:
name: contacts
namespace: contacts
labels:
org: cymbal-bank
spec:
type: LoadBalancer
selector:
app: contacts
ports:
- name: http
port: 80
targetPort: 8080 | 14.866667 | 21 | 0.67713 |
73f30eedfa3994a54d1c07ee992356ba2d3ccddc | 5,998 | yaml | YAML | sample-manifests/hub/04_AI-Disconnected-MirrorConfig.yaml | eifrach/ztp-the-hard-way | b1474620b0804f572e8d9bfdf6b477c6a140694d | [
"Apache-2.0"
] | 28 | 2021-06-11T14:02:16.000Z | 2022-03-01T12:59:09.000Z | sample-manifests/hub/04_AI-Disconnected-MirrorConfig.yaml | eifrach/ztp-the-hard-way | b1474620b0804f572e8d9bfdf6b477c6a140694d | [
"Apache-2.0"
] | 14 | 2021-06-21T14:40:42.000Z | 2022-03-30T17:14:48.000Z | sample-manifests/hub/04_AI-Disconnected-MirrorConfig.yaml | eifrach/ztp-the-hard-way | b1474620b0804f572e8d9bfdf6b477c6a140694d | [
"Apache-2.0"
] | 22 | 2021-06-15T10:15:45.000Z | 2022-03-09T22:54:30.000Z | apiVersion: v1
kind: ConfigMap
metadata:
name: hyper1-mirror-config
namespace: open-cluster-management
labels:
app: assisted-service
data:
ca-bundle.crt: |
-----BEGIN CERTIFICATE-----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-----END CERTIFICATE-----
registries.conf: |
unqualified-search-registries = ["registry.access.redhat.com", "docker.io"]
[[registry]]
prefix = ""
location = "quay.io/acm-d"
mirror-by-digest-only = true
[[registry.mirror]]
location = "bm-cluster-1-hyper.e2e.bos.redhat.com:5000/rhacm2"
[[registry]]
prefix = ""
location = "quay.io/ocpmetal"
mirror-by-digest-only = true
[[registry.mirror]]
location = "bm-cluster-1-hyper.e2e.bos.redhat.com:5000/ocpmetal"
[[registry]]
prefix = ""
location = "quay.io/openshift-community-operators/hive-operator"
mirror-by-digest-only = true
[[registry.mirror]]
location = "bm-cluster-1-hyper.e2e.bos.redhat.com:5000/olm/openshift-community-operators-hive-operator"
[[registry]]
prefix = ""
location = "quay.io/openshift-hive/hive"
mirror-by-digest-only = true
[[registry.mirror]]
location = "bm-cluster-1-hyper.e2e.bos.redhat.com:5000/olm/openshift-hive-hive"
[[registry]]
prefix = ""
location = "quay.io/openshift-release-dev/ocp-release"
mirror-by-digest-only = true
[[registry.mirror]]
location = "bm-cluster-1-hyper.e2e.bos.redhat.com:5000/ocp4"
[[registry]]
prefix = ""
location = "quay.io/openshift-release-dev/ocp-v4.0-art-dev"
mirror-by-digest-only = true
[[registry.mirror]]
location = "bm-cluster-1-hyper.e2e.bos.redhat.com:5000/ocp4"
[[registry]]
prefix = ""
location = "quay.io:443/acm-d"
mirror-by-digest-only = true
[[registry.mirror]]
location = "bm-cluster-1-hyper.e2e.bos.redhat.com:5000/rhacm2"
[[registry]]
prefix = ""
location = "registry.redhat.io/openshift4"
mirror-by-digest-only = true
[[registry.mirror]]
location = "bm-cluster-1-hyper.e2e.bos.redhat.com:5000/openshift4"
[[registry]]
prefix = ""
location = "registry.redhat.io/openshift4/ose-local-storage-diskmaker"
mirror-by-digest-only = true
[[registry.mirror]]
location = "bm-cluster-1-hyper.e2e.bos.redhat.com:5000/olm/openshift4-ose-local-storage-diskmaker"
[[registry]]
prefix = ""
location = "registry.redhat.io/openshift4/ose-local-storage-operator"
mirror-by-digest-only = true
[[registry.mirror]]
location = "bm-cluster-1-hyper.e2e.bos.redhat.com:5000/olm/openshift4-ose-local-storage-operator"
[[registry]]
prefix = ""
location = "registry.redhat.io/openshift4/ose-local-storage-operator-bundle"
mirror-by-digest-only = true
[[registry.mirror]]
location = "bm-cluster-1-hyper.e2e.bos.redhat.com:5000/olm/openshift4-ose-local-storage-operator-bundle"
[[registry]]
prefix = ""
location = "registry.redhat.io/openshift4/ose-local-storage-static-provisioner"
mirror-by-digest-only = true
[[registry.mirror]]
location = "bm-cluster-1-hyper.e2e.bos.redhat.com:5000/olm/openshift4-ose-local-storage-static-provisioner"
[[registry]]
prefix = ""
location = "registry.redhat.io/rhacm2"
mirror-by-digest-only = true
[[registry.mirror]]
location = "bm-cluster-1-hyper.e2e.bos.redhat.com:5000/rhacm2"
[[registry]]
prefix = ""
location = "registry.redhat.io/rhel8"
mirror-by-digest-only = true
[[registry.mirror]]
location = "bm-cluster-1-hyper.e2e.bos.redhat.com:5000/rhel8"
| 37.72327 | 115 | 0.734745 |
73f32a46089333d367a66e374cc01fc0b96ff137 | 4,982 | yaml | YAML | k8s/hlf-kubernetes-dsg/7.peers/org1/peer0Org1.yaml | sivapr5/DSG-Hyperledger | 856c21ade3086a9de8af4672d8b1df5009e49269 | [
"Apache-2.0"
] | null | null | null | k8s/hlf-kubernetes-dsg/7.peers/org1/peer0Org1.yaml | sivapr5/DSG-Hyperledger | 856c21ade3086a9de8af4672d8b1df5009e49269 | [
"Apache-2.0"
] | null | null | null | k8s/hlf-kubernetes-dsg/7.peers/org1/peer0Org1.yaml | sivapr5/DSG-Hyperledger | 856c21ade3086a9de8af4672d8b1df5009e49269 | [
"Apache-2.0"
] | null | null | null | apiVersion: apps/v1
kind: Deployment
metadata:
name: peer0-org1
spec:
selector:
matchLabels:
name: peer0-org1
replicas: 1
template:
metadata:
labels:
name: peer0-org1
spec:
volumes:
- name: fabricfiles
persistentVolumeClaim:
claimName: mypvc
- name: builders-config
configMap:
name: builders-config
items:
- key: core.yaml
path: core.yaml
- name: external-builder-detect
configMap:
name: builders-config
items:
- key: detect
path: detect
mode: 0544
- name: external-builder-build
configMap:
name: builders-config
items:
- key: build
path: build
mode: 0544
- name: external-builder-release
configMap:
name: builders-config
items:
- key: release
path: release
mode: 0544
containers:
- name: peer
image: hyperledger/fabric-peer:2.3
command: ["sh", "-c", "peer node start"]
env:
- name: CORE_PEER_ADDRESSAUTODETECT
value: "true"
- name: CORE_PEER_ID
value: peer0-org1
- name: CORE_PEER_ADDRESS
value: peer0-org1:7051
- name: CORE_PEER_LISTENADDRESS
value: 0.0.0.0:7051
- name: CORE_PEER_EVENTS_ADDRESS
value: 0.0.0.0:7061
- name: CORE_PEER_GOSSIP_BOOTSTRAP
value: peer0-org1:7051
- name: CORE_PEER_GOSSIP_ENDPOINT
value: peer0-org1:7051
- name: CORE_PEER_GOSSIP_EXTERNALENDPOINT
value: peer0-org1:7051
- name: CORE_PEER_GOSSIP_ORGLEADER
value: "false"
- name: CORE_PEER_GOSSIP_USELEADERELECTION
value: "true"
- name: CORE_PEER_PROFILE_ENABLED
value: "true"
- name: CORE_PEER_LOCALMSPID
value: Org1MSP
- name: CORE_PEER_MSPCONFIGPATH
value: /organizations/peerOrganizations/org1.example.com/peers/peer0.org1.example.com/msp
- name: FABRIC_LOGGING_SPEC
value: debug
- name: CORE_PEER_TLS_ENABLED
value: "true"
- name: CORE_PEER_TLS_CERT_FILE
value: /organizations/peerOrganizations/org1.example.com/peers/peer0.org1.example.com/tls/server.crt
- name: CORE_PEER_TLS_KEY_FILE
value: /organizations/peerOrganizations/org1.example.com/peers/peer0.org1.example.com/tls/server.key
- name: CORE_PEER_TLS_ROOTCERT_FILE
value: /organizations/peerOrganizations/org1.example.com/peers/peer0.org1.example.com/tls/ca.crt
- name: CORE_LEDGER_STATE_STATEDATABASE
value: "CouchDB"
- name: CORE_LEDGER_STATE_COUCHDBCONFIG_COUCHDBADDRESS
value: "localhost:5984"
- name: FABRIC_CFG_PATH
value: /etc/hyperledger/fabric
- name: CORE_OPERATIONS_LISTENADDRESS
value: 0.0.0.0:9443
- name: CORE_METRICS_PROVIDER
value: prometheus
ports:
- containerPort: 7051
- containerPort: 7052
- containerPort: 7053
- containerPort: 9443
resources:
limits:
memory: "300Mi"
cpu: "200m"
requests:
memory: "200Mi"
cpu: "100m"
volumeMounts:
- mountPath: /opt/gopath/src/github.com/chaincode/
name: fabricfiles
subPath: chaincode/
- mountPath: /organizations
name: fabricfiles
subPath: organizations
- mountPath: /var/hyperledger/production
name: fabricfiles
subPath: state/org1/peer0
- mountPath: /etc/hyperledger/fabric/core.yaml
name: builders-config
subPath: core.yaml
- mountPath: /builders/external/bin/detect
name: external-builder-detect
subPath: detect
- mountPath: /builders/external/bin/build
name: external-builder-build
subPath: build
- mountPath: /builders/external/bin/release
name: external-builder-release
subPath: release
- name: couchdb
image: hyperledger/fabric-couchdb:0.4.15
resources:
limits:
memory: "300Mi"
cpu: "200m"
requests:
memory: "200Mi"
cpu: "150m"
volumeMounts:
- mountPath: /var/lib/data
name: fabricfiles
subPath: state/org1/peer0-couchdb
| 34.123288 | 114 | 0.53051 |
73f37e95a76f44a873116d34b5bbd4fbba661ece | 953 | yaml | YAML | prow/cluster/pipeline_deployment.yaml | saiyan86/test-infra | aee591979efe3c8bca3281efab9dc1cb52bf8829 | [
"Apache-2.0"
] | null | null | null | prow/cluster/pipeline_deployment.yaml | saiyan86/test-infra | aee591979efe3c8bca3281efab9dc1cb52bf8829 | [
"Apache-2.0"
] | null | null | null | prow/cluster/pipeline_deployment.yaml | saiyan86/test-infra | aee591979efe3c8bca3281efab9dc1cb52bf8829 | [
"Apache-2.0"
] | null | null | null | kind: Deployment
apiVersion: apps/v1
metadata:
name: prow-pipeline
namespace: default
spec:
replicas: 1
strategy:
type: Recreate
selector:
matchLabels:
app: prow-pipeline
template:
metadata:
labels:
app: prow-pipeline
spec:
# serviceAccountName: prow-pipeline
containers:
- name: pipeline
image: gcr.io/k8s-prow/pipeline:v20190821-d4eea7f3f
args:
- --all-contexts
- --config=/etc/prow-config/config.yaml
- --build-cluster=/etc/build-cluster/cluster
volumeMounts:
- mountPath: /etc/build-cluster
name: build-cluster
readOnly: true
- mountPath: /etc/prow-config
name: prow-config
readOnly: true
volumes:
- name: build-cluster
secret:
defaultMode: 420
secretName: build-cluster
- name: prow-config
configMap:
name: config
| 23.243902 | 59 | 0.588667 |
73f3c05ef7d0e45cd1e99492d81605b81a57fdba | 327 | yaml | YAML | Helm/rkm-outpost/templates/rkm-outpost-operator/rolebinding-rkm-outpost-operator.yaml | andiexer/rkm | fc18b44c0e9d7c30e8626b8ac035c964310d9ecd | [
"Apache-2.0"
] | 5 | 2020-03-29T13:02:08.000Z | 2020-09-07T10:02:03.000Z | Helm/rkm-outpost/templates/rkm-outpost-operator/rolebinding-rkm-outpost-operator.yaml | andiexer/rkm | fc18b44c0e9d7c30e8626b8ac035c964310d9ecd | [
"Apache-2.0"
] | 6 | 2020-03-29T13:06:37.000Z | 2020-07-19T15:34:47.000Z | Helm/rkm-outpost/templates/rkm-outpost-operator/rolebinding-rkm-outpost-operator.yaml | andiexer/rkm | fc18b44c0e9d7c30e8626b8ac035c964310d9ecd | [
"Apache-2.0"
] | 1 | 2020-04-02T08:56:28.000Z | 2020-04-02T08:56:28.000Z | ---
apiVersion: rbac.authorization.k8s.io/v1
kind: RoleBinding
metadata:
labels:
app: rkm
role: outpost-operator
name: rkm-outpost-operator
roleRef:
apiGroup: rbac.authorization.k8s.io
kind: Role
name: rkm-outpost-operator
subjects:
- kind: ServiceAccount
name: rkm-outpost-operator
namespace: rkm-outpost | 20.4375 | 40 | 0.746177 |
73f42c675025e5c60b60b4c63e25d5b2464dadf6 | 357 | yaml | YAML | examples/kubernetes/luks-encrypted-volumes/luks-pod.yaml | appuio/csi-cloudscale | 3258a3fd4ea6d1c8a79cfa6c07da284d28c8c30b | [
"Apache-2.0"
] | 13 | 2018-12-18T10:18:13.000Z | 2021-12-17T08:20:42.000Z | examples/kubernetes/luks-encrypted-volumes/luks-pod.yaml | appuio/csi-cloudscale | 3258a3fd4ea6d1c8a79cfa6c07da284d28c8c30b | [
"Apache-2.0"
] | 22 | 2018-11-12T09:05:32.000Z | 2021-10-14T12:33:44.000Z | examples/kubernetes/luks-encrypted-volumes/luks-pod.yaml | appuio/csi-cloudscale | 3258a3fd4ea6d1c8a79cfa6c07da284d28c8c30b | [
"Apache-2.0"
] | 9 | 2018-11-12T08:53:20.000Z | 2021-05-25T08:00:12.000Z | kind: Pod
apiVersion: v1
metadata:
name: my-csi-app-luks
spec:
containers:
- name: my-frontend
image: busybox
volumeMounts:
- mountPath: "/data"
name: my-cloudscale-volume
command: [ "sleep", "1000000" ]
volumes:
- name: my-cloudscale-volume
persistentVolumeClaim:
claimName: csi-pod-pvc-luks
| 21 | 37 | 0.619048 |
73f478051cee1639b503f2976e9c04d67fb87dd3 | 144 | yaml | YAML | built-in-references/Kubernetes/perf/violations/violation5792.yaml | sw47/azure-policy | 4a38e4cb4047b5364902653f0defe45f1b21bc61 | [
"MIT"
] | null | null | null | built-in-references/Kubernetes/perf/violations/violation5792.yaml | sw47/azure-policy | 4a38e4cb4047b5364902653f0defe45f1b21bc61 | [
"MIT"
] | null | null | null | built-in-references/Kubernetes/perf/violations/violation5792.yaml | sw47/azure-policy | 4a38e4cb4047b5364902653f0defe45f1b21bc61 | [
"MIT"
] | null | null | null | apiVersion: v1
kind: Pod
metadata:
name: image-demo-5792
spec:
containers:
- name: nginx
image: nginx #ritaacr.azurecr.io/nginx:latest | 18 | 49 | 0.722222 |
73f4d97612a4f5e8d73404409e0cfc08d07e8d1f | 3,150 | yaml | YAML | deploy/k8s/node-daemonset.yaml | jairov4/cloudstack-csi-driver | 81a9b2b7922fe81fd8f21eb00c498e8f7277df63 | [
"Apache-2.0"
] | 6 | 2021-01-12T20:59:13.000Z | 2022-03-21T21:31:58.000Z | deploy/k8s/node-daemonset.yaml | jairov4/cloudstack-csi-driver | 81a9b2b7922fe81fd8f21eb00c498e8f7277df63 | [
"Apache-2.0"
] | 2 | 2021-01-13T16:40:02.000Z | 2022-03-29T07:19:12.000Z | deploy/k8s/node-daemonset.yaml | jairov4/cloudstack-csi-driver | 81a9b2b7922fe81fd8f21eb00c498e8f7277df63 | [
"Apache-2.0"
] | 4 | 2021-07-12T15:29:16.000Z | 2022-02-24T12:15:12.000Z | apiVersion: apps/v1
kind: DaemonSet
metadata:
name: cloudstack-csi-node
namespace: kube-system
spec:
selector:
matchLabels:
app.kubernetes.io/name: cloudstack-csi-node
updateStrategy:
type: RollingUpdate
template:
metadata:
labels:
app.kubernetes.io/name: cloudstack-csi-node
app.kubernetes.io/part-of: cloudstack-csi-driver
spec:
nodeSelector:
kubernetes.io/os: linux
tolerations:
- effect: NoExecute
operator: Exists
- effect: NoSchedule
operator: Exists
containers:
- name: cloudstack-csi-node
image: cloudstack-csi-driver
imagePullPolicy: Always
args:
- "-endpoint=$(CSI_ENDPOINT)"
- "-cloudstackconfig=/etc/cloudstack-csi-driver/cloud-config"
- "-nodeName=$(NODE_NAME)"
- "-debug"
env:
- name: CSI_ENDPOINT
value: unix:///csi/csi.sock
- name: NODE_NAME
valueFrom:
fieldRef:
fieldPath: spec.nodeName
securityContext:
privileged: true
volumeMounts:
- name: plugin-dir
mountPath: /csi
- name: kubelet-dir
mountPath: /var/lib/kubelet
# needed so that any mounts setup inside this container are
# propagated back to the host machine.
mountPropagation: Bidirectional
- name: device-dir
mountPath: /dev
- name: cloud-init-dir
mountPath: /run/cloud-init/
- name: cloudstack-conf
mountPath: /etc/cloudstack-csi-driver
- name: node-driver-registrar
image: k8s.gcr.io/sig-storage/csi-node-driver-registrar:v2.0.1
imagePullPolicy: IfNotPresent
args:
- "--csi-address=$(ADDRESS)"
- "--kubelet-registration-path=$(DRIVER_REG_SOCK_PATH)"
- "--v=5"
env:
- name: ADDRESS
value: /csi/csi.sock
- name: DRIVER_REG_SOCK_PATH
value: /var/lib/kubelet/plugins/csi.cloudstack.apache.org/csi.sock
securityContext:
privileged: true
volumeMounts:
- name: plugin-dir
mountPath: /csi
- name: registration-dir
mountPath: /registration
volumes:
- name: plugin-dir
hostPath:
path: /var/lib/kubelet/plugins/csi.cloudstack.apache.org/
type: DirectoryOrCreate
- name: kubelet-dir
hostPath:
path: /var/lib/kubelet
type: Directory
- name: device-dir
hostPath:
path: /dev
type: Directory
- name: registration-dir
hostPath:
path: /var/lib/kubelet/plugins_registry
type: Directory
- name: cloud-init-dir
hostPath:
path: /run/cloud-init/
type: Directory
- name: cloudstack-conf
secret:
secretName: cloudstack-secret
| 30.582524 | 80 | 0.537143 |
73f52376086d242c71ebf4030c19aaf52be3e781 | 1,113 | yaml | YAML | prow/oss/cluster/monitoring/grafana_expose.yaml | bjh83/oss-test-infra | c92da5629f45699b81b7ef6b37ffc51e95c6e407 | [
"Apache-2.0"
] | null | null | null | prow/oss/cluster/monitoring/grafana_expose.yaml | bjh83/oss-test-infra | c92da5629f45699b81b7ef6b37ffc51e95c6e407 | [
"Apache-2.0"
] | null | null | null | prow/oss/cluster/monitoring/grafana_expose.yaml | bjh83/oss-test-infra | c92da5629f45699b81b7ef6b37ffc51e95c6e407 | [
"Apache-2.0"
] | null | null | null | ---
apiVersion: v1
kind: Service
metadata:
labels:
app: grafana
name: grafana
namespace: prow-monitoring
spec:
type: NodePort
sessionAffinity: ClientIP
ports:
- name: http
port: 3001
targetPort: http
- name: nginx
port: 80
targetPort: nginx
selector:
app: grafana
# TODO(chaodaiG): uncomment this once figure out how to support ingress
# ---
# apiVersion: networking.gke.io/v1beta1
# kind: ManagedCertificate
# metadata:
# name: oss-prow-knative-dev
# namespace: prow-monitoring
# spec:
# domains:
# - oss-prow.knative.dev
# ---
# apiVersion: extensions/v1beta1
# kind: Ingress
# metadata:
# name: grafana
# namespace: prow-monitoring
# annotations:
# kubernetes.io/ingress.global-static-ip-name: prow-monitoring-grafana
# kubernetes.io/ingress.class: "gce"
# kubernetes.io/tls-acme: "true"
# networking.gke.io/managed-certificates: oss-prow-knative-dev
# spec:
# rules:
# - host: oss-prow.knative.dev
# http:
# paths:
# - path: /monitoring
# backend:
# serviceName: grafana
# servicePort: 80
| 21.823529 | 74 | 0.660377 |
73f592fbf7cb46d129a3db8c2ca7192076de006f | 289 | yaml | YAML | examples/01-clusterrole.yaml | adambkaplan/projected-resource-csi-driver | 48c7d3ff17480e58b9b2d1822a740758df4c9e7e | [
"Apache-2.0"
] | null | null | null | examples/01-clusterrole.yaml | adambkaplan/projected-resource-csi-driver | 48c7d3ff17480e58b9b2d1822a740758df4c9e7e | [
"Apache-2.0"
] | null | null | null | examples/01-clusterrole.yaml | adambkaplan/projected-resource-csi-driver | 48c7d3ff17480e58b9b2d1822a740758df4c9e7e | [
"Apache-2.0"
] | null | null | null | apiVersion: rbac.authorization.k8s.io/v1
kind: ClusterRole
metadata:
name: projected-resource-my-share
rules:
- apiGroups:
- projectedresource.storage.openshift.io
resources:
- shares
resourceNames:
- my-share
verbs:
- get
- list
- watch | 19.266667 | 46 | 0.643599 |
73f5942a0a3866f2df5c101e6ba1c2b1679eb8c4 | 632 | yaml | YAML | coordinator-client/contributor-job.yaml | kobigurk/aleo-setup-coordinator | d9604635b4626e5fb16933a5fa22b4383c9026f1 | [
"Apache-2.0"
] | 5 | 2020-09-25T20:46:56.000Z | 2021-11-26T14:56:51.000Z | coordinator-client/contributor-job.yaml | kobigurk/aleo-setup-coordinator | d9604635b4626e5fb16933a5fa22b4383c9026f1 | [
"Apache-2.0"
] | 29 | 2020-09-19T01:36:45.000Z | 2022-01-27T14:07:33.000Z | coordinator-client/contributor-job.yaml | kobigurk/aleo-setup-coordinator | d9604635b4626e5fb16933a5fa22b4383c9026f1 | [
"Apache-2.0"
] | 3 | 2020-09-22T06:20:29.000Z | 2021-07-30T02:04:24.000Z | apiVersion: batch/v1
kind: Job
metadata:
name: contributor
spec:
template:
metadata:
labels:
app: contributor
spec:
containers:
- image: coordinator-client:test
name: contributor
envFrom:
- configMapRef:
name: contributor
volumeMounts:
- name: contributor
mountPath: "/mnt/secrets"
readOnly: true
command: ["npm"]
args: ["start", "--", "contribute"]
restartPolicy: Never
volumes:
- name: contributor
secret:
secretName: contributor
| 22.571429 | 45 | 0.522152 |
73f59b76a7aba09a05aa1c934075082d14f1bbed | 92 | yaml | YAML | namespaces/deploy.yaml | AloisReitbauer/hipstershop-gitops | 9f141b8b71480af060a712a70a53d8c2227a531c | [
"Apache-2.0"
] | null | null | null | namespaces/deploy.yaml | AloisReitbauer/hipstershop-gitops | 9f141b8b71480af060a712a70a53d8c2227a531c | [
"Apache-2.0"
] | null | null | null | namespaces/deploy.yaml | AloisReitbauer/hipstershop-gitops | 9f141b8b71480af060a712a70a53d8c2227a531c | [
"Apache-2.0"
] | null | null | null | apiVersion: v1
kind: Namespace
metadata:
labels:
name: hipstershop
name: hipstershop | 15.333333 | 21 | 0.75 |
73f5e55b647ce55e657df62700191aca30b35c78 | 27,844 | yaml | YAML | charts/vela-minimal/crds/core.oam.dev_traitdefinitions.yaml | baikai/RudrX | 3d2fcacb5a98af841b4b69995a0be204f6062c81 | [
"Apache-2.0"
] | null | null | null | charts/vela-minimal/crds/core.oam.dev_traitdefinitions.yaml | baikai/RudrX | 3d2fcacb5a98af841b4b69995a0be204f6062c81 | [
"Apache-2.0"
] | 1 | 2021-11-24T03:04:30.000Z | 2021-11-24T03:04:30.000Z | charts/vela-minimal/crds/core.oam.dev_traitdefinitions.yaml | baikai/RudrX | 3d2fcacb5a98af841b4b69995a0be204f6062c81 | [
"Apache-2.0"
] | null | null | null |
---
apiVersion: apiextensions.k8s.io/v1
kind: CustomResourceDefinition
metadata:
annotations:
controller-gen.kubebuilder.io/version: v0.6.2
name: traitdefinitions.core.oam.dev
spec:
group: core.oam.dev
names:
categories:
- oam
kind: TraitDefinition
listKind: TraitDefinitionList
plural: traitdefinitions
shortNames:
- trait
singular: traitdefinition
scope: Namespaced
versions:
- additionalPrinterColumns:
- jsonPath: .spec.appliesToWorkloads
name: APPLIES-TO
type: string
- jsonPath: .metadata.annotations.definition\.oam\.dev/description
name: DESCRIPTION
type: string
name: v1alpha2
schema:
openAPIV3Schema:
description: A TraitDefinition registers a kind of Kubernetes custom resource
as a valid OAM trait kind by referencing its CustomResourceDefinition. The
CRD is used to validate the schema of the trait when it is embedded in an
OAM ApplicationConfiguration.
properties:
apiVersion:
description: 'APIVersion defines the versioned schema of this representation
of an object. Servers should convert recognized schemas to the latest
internal value, and may reject unrecognized values. More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#resources'
type: string
kind:
description: 'Kind is a string value representing the REST resource this
object represents. Servers may infer this from the endpoint the client
submits requests to. Cannot be updated. In CamelCase. More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#types-kinds'
type: string
metadata:
type: object
spec:
description: A TraitDefinitionSpec defines the desired state of a TraitDefinition.
properties:
appliesToWorkloads:
description: AppliesToWorkloads specifies the list of workload kinds
this trait applies to. Workload kinds are specified in kind.group/version
format, e.g. server.core.oam.dev/v1alpha2. Traits that omit this
field apply to all workload kinds.
items:
type: string
type: array
conflictsWith:
description: 'ConflictsWith specifies the list of traits(CRD name,
Definition name, CRD group) which could not apply to the same workloads
with this trait. Traits that omit this field can work with any other
traits. Example rules: "service" # Trait definition name "services.k8s.io"
# API resource/crd name "*.networking.k8s.io" # API group "labelSelector:foo=bar"
# label selector labelSelector format: https://pkg.go.dev/k8s.io/apimachinery/pkg/labels#Parse'
items:
type: string
type: array
definitionRef:
description: Reference to the CustomResourceDefinition that defines
this trait kind.
properties:
name:
description: Name of the referenced CustomResourceDefinition.
type: string
version:
description: Version indicate which version should be used if
CRD has multiple versions by default it will use the first one
if not specified
type: string
required:
- name
type: object
extension:
description: Extension is used for extension needs by OAM platform
builders
type: object
x-kubernetes-preserve-unknown-fields: true
podDisruptive:
description: PodDisruptive specifies whether using the trait will
cause the pod to restart or not.
type: boolean
revisionEnabled:
description: Revision indicates whether a trait is aware of component
revision
type: boolean
schematic:
description: Schematic defines the data format and template of the
encapsulation of the trait
properties:
cue:
description: CUE defines the encapsulation in CUE format
properties:
template:
description: Template defines the abstraction template data
of the capability, it will replace the old CUE template
in extension field. Template is a required field if CUE
is defined in Capability Definition.
type: string
required:
- template
type: object
helm:
description: A Helm represents resources used by a Helm module
properties:
release:
description: Release records a Helm release used by a Helm
module workload.
type: object
x-kubernetes-preserve-unknown-fields: true
repository:
description: HelmRelease records a Helm repository used by
a Helm module workload.
type: object
x-kubernetes-preserve-unknown-fields: true
required:
- release
- repository
type: object
kube:
description: Kube defines the encapsulation in raw Kubernetes
resource format
properties:
parameters:
description: Parameters defines configurable parameters
items:
description: A KubeParameter defines a configurable parameter
of a component.
properties:
description:
description: Description of this parameter.
type: string
fieldPaths:
description: "FieldPaths specifies an array of fields
within this workload that will be overwritten by the
value of this parameter. \tAll fields must be of the
same type. Fields are specified as JSON field paths
without a leading dot, for example 'spec.replicas'."
items:
type: string
type: array
name:
description: Name of this parameter
type: string
required:
default: false
description: Required specifies whether or not a value
for this parameter must be supplied when authoring
an Application.
type: boolean
type:
description: 'ValueType indicates the type of the parameter
value, and only supports basic data types: string,
number, boolean.'
enum:
- string
- number
- boolean
type: string
required:
- fieldPaths
- name
- type
type: object
type: array
template:
description: Template defines the raw Kubernetes resource
type: object
x-kubernetes-preserve-unknown-fields: true
required:
- template
type: object
terraform:
description: Terraform is the struct to describe cloud resources
managed by Hashicorp Terraform
properties:
configuration:
description: Configuration is Terraform Configuration
type: string
deleteResource:
default: true
description: DeleteResource will determine whether provisioned
cloud resources will be deleted when CR is deleted
type: boolean
path:
description: Path is the sub-directory of remote git repository.
It's valid when remote is set
type: string
providerRef:
description: ProviderReference specifies the reference to
Provider
properties:
name:
description: Name of the referenced object.
type: string
namespace:
default: default
description: Namespace of the secret.
type: string
required:
- name
type: object
type:
default: hcl
description: Type specifies which Terraform configuration
it is, HCL or JSON syntax
enum:
- hcl
- json
- remote
type: string
required:
- configuration
type: object
type: object
status:
description: Status defines the custom health policy and status message
for trait
properties:
customStatus:
description: CustomStatus defines the custom status message that
could display to user
type: string
healthPolicy:
description: HealthPolicy defines the health check policy for
the abstraction
type: string
type: object
workloadRefPath:
description: WorkloadRefPath indicates where/if a trait accepts a
workloadRef object
type: string
type: object
status:
description: TraitDefinitionStatus is the status of TraitDefinition
properties:
conditions:
description: Conditions of the resource.
items:
description: A Condition that may apply to a resource.
properties:
lastTransitionTime:
description: LastTransitionTime is the last time this condition
transitioned from one status to another.
format: date-time
type: string
message:
description: A Message containing details about this condition's
last transition from one status to another, if any.
type: string
reason:
description: A Reason for this condition's last transition from
one status to another.
type: string
status:
description: Status of this condition; is it currently True,
False, or Unknown?
type: string
type:
description: Type of this condition. At most one of each condition
type may apply to a resource at any point in time.
type: string
required:
- lastTransitionTime
- reason
- status
- type
type: object
type: array
configMapRef:
description: ConfigMapRef refer to a ConfigMap which contains OpenAPI
V3 JSON schema of Component parameters.
type: string
latestRevision:
description: LatestRevision of the trait definition
properties:
name:
type: string
revision:
format: int64
type: integer
revisionHash:
description: RevisionHash record the hash value of the spec of
ApplicationRevision object.
type: string
required:
- name
- revision
type: object
type: object
type: object
served: true
storage: false
subresources:
status: {}
- additionalPrinterColumns:
- jsonPath: .spec.appliesToWorkloads
name: APPLIES-TO
type: string
- jsonPath: .metadata.annotations.definition\.oam\.dev/description
name: DESCRIPTION
type: string
name: v1beta1
schema:
openAPIV3Schema:
description: A TraitDefinition registers a kind of Kubernetes custom resource
as a valid OAM trait kind by referencing its CustomResourceDefinition. The
CRD is used to validate the schema of the trait when it is embedded in an
OAM ApplicationConfiguration.
properties:
apiVersion:
description: 'APIVersion defines the versioned schema of this representation
of an object. Servers should convert recognized schemas to the latest
internal value, and may reject unrecognized values. More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#resources'
type: string
kind:
description: 'Kind is a string value representing the REST resource this
object represents. Servers may infer this from the endpoint the client
submits requests to. Cannot be updated. In CamelCase. More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#types-kinds'
type: string
metadata:
type: object
spec:
description: A TraitDefinitionSpec defines the desired state of a TraitDefinition.
properties:
appliesToWorkloads:
description: AppliesToWorkloads specifies the list of workload kinds
this trait applies to. Workload kinds are specified in kind.group/version
format, e.g. server.core.oam.dev/v1alpha2. Traits that omit this
field apply to all workload kinds.
items:
type: string
type: array
conflictsWith:
description: 'ConflictsWith specifies the list of traits(CRD name,
Definition name, CRD group) which could not apply to the same workloads
with this trait. Traits that omit this field can work with any other
traits. Example rules: "service" # Trait definition name "services.k8s.io"
# API resource/crd name "*.networking.k8s.io" # API group "labelSelector:foo=bar"
# label selector labelSelector format: https://pkg.go.dev/k8s.io/apimachinery/pkg/labels#Parse'
items:
type: string
type: array
definitionRef:
description: Reference to the CustomResourceDefinition that defines
this trait kind.
properties:
name:
description: Name of the referenced CustomResourceDefinition.
type: string
version:
description: Version indicate which version should be used if
CRD has multiple versions by default it will use the first one
if not specified
type: string
required:
- name
type: object
extension:
description: Extension is used for extension needs by OAM platform
builders
type: object
x-kubernetes-preserve-unknown-fields: true
manageWorkload:
description: ManageWorkload defines the trait would be responsible
for creating the workload
type: boolean
podDisruptive:
description: PodDisruptive specifies whether using the trait will
cause the pod to restart or not.
type: boolean
revisionEnabled:
description: Revision indicates whether a trait is aware of component
revision
type: boolean
schematic:
description: Schematic defines the data format and template of the
encapsulation of the trait
properties:
cue:
description: CUE defines the encapsulation in CUE format
properties:
template:
description: Template defines the abstraction template data
of the capability, it will replace the old CUE template
in extension field. Template is a required field if CUE
is defined in Capability Definition.
type: string
required:
- template
type: object
helm:
description: A Helm represents resources used by a Helm module
properties:
release:
description: Release records a Helm release used by a Helm
module workload.
type: object
x-kubernetes-preserve-unknown-fields: true
repository:
description: HelmRelease records a Helm repository used by
a Helm module workload.
type: object
x-kubernetes-preserve-unknown-fields: true
required:
- release
- repository
type: object
kube:
description: Kube defines the encapsulation in raw Kubernetes
resource format
properties:
parameters:
description: Parameters defines configurable parameters
items:
description: A KubeParameter defines a configurable parameter
of a component.
properties:
description:
description: Description of this parameter.
type: string
fieldPaths:
description: "FieldPaths specifies an array of fields
within this workload that will be overwritten by the
value of this parameter. \tAll fields must be of the
same type. Fields are specified as JSON field paths
without a leading dot, for example 'spec.replicas'."
items:
type: string
type: array
name:
description: Name of this parameter
type: string
required:
default: false
description: Required specifies whether or not a value
for this parameter must be supplied when authoring
an Application.
type: boolean
type:
description: 'ValueType indicates the type of the parameter
value, and only supports basic data types: string,
number, boolean.'
enum:
- string
- number
- boolean
type: string
required:
- fieldPaths
- name
- type
type: object
type: array
template:
description: Template defines the raw Kubernetes resource
type: object
x-kubernetes-preserve-unknown-fields: true
required:
- template
type: object
terraform:
description: Terraform is the struct to describe cloud resources
managed by Hashicorp Terraform
properties:
configuration:
description: Configuration is Terraform Configuration
type: string
deleteResource:
default: true
description: DeleteResource will determine whether provisioned
cloud resources will be deleted when CR is deleted
type: boolean
path:
description: Path is the sub-directory of remote git repository.
It's valid when remote is set
type: string
providerRef:
description: ProviderReference specifies the reference to
Provider
properties:
name:
description: Name of the referenced object.
type: string
namespace:
default: default
description: Namespace of the secret.
type: string
required:
- name
type: object
type:
default: hcl
description: Type specifies which Terraform configuration
it is, HCL or JSON syntax
enum:
- hcl
- json
- remote
type: string
required:
- configuration
type: object
type: object
skipRevisionAffect:
description: SkipRevisionAffect defines the update this trait will
not generate a new application Revision
type: boolean
status:
description: Status defines the custom health policy and status message
for trait
properties:
customStatus:
description: CustomStatus defines the custom status message that
could display to user
type: string
healthPolicy:
description: HealthPolicy defines the health check policy for
the abstraction
type: string
type: object
workloadRefPath:
description: WorkloadRefPath indicates where/if a trait accepts a
workloadRef object
type: string
type: object
status:
description: TraitDefinitionStatus is the status of TraitDefinition
properties:
conditions:
description: Conditions of the resource.
items:
description: A Condition that may apply to a resource.
properties:
lastTransitionTime:
description: LastTransitionTime is the last time this condition
transitioned from one status to another.
format: date-time
type: string
message:
description: A Message containing details about this condition's
last transition from one status to another, if any.
type: string
reason:
description: A Reason for this condition's last transition from
one status to another.
type: string
status:
description: Status of this condition; is it currently True,
False, or Unknown?
type: string
type:
description: Type of this condition. At most one of each condition
type may apply to a resource at any point in time.
type: string
required:
- lastTransitionTime
- reason
- status
- type
type: object
type: array
configMapRef:
description: ConfigMapRef refer to a ConfigMap which contains OpenAPI
V3 JSON schema of Component parameters.
type: string
latestRevision:
description: LatestRevision of the component definition
properties:
name:
type: string
revision:
format: int64
type: integer
revisionHash:
description: RevisionHash record the hash value of the spec of
ApplicationRevision object.
type: string
required:
- name
- revision
type: object
type: object
type: object
served: true
storage: true
subresources:
status: {}
status:
acceptedNames:
kind: ""
plural: ""
conditions: []
storedVersions: []
| 45.947195 | 175 | 0.480427 |
73f68596a9af6b4d74f492f0c475c978200a30c4 | 253 | yml | YAML | manifests/nginx/service.yml | giang12/kubepi | 8c8606e7089faeac3bc3d41c71489dbdc1b6b000 | [
"MIT"
] | 14 | 2018-10-27T03:59:08.000Z | 2020-11-19T11:47:08.000Z | manifests/nginx/service.yml | giang12/kubepi | 8c8606e7089faeac3bc3d41c71489dbdc1b6b000 | [
"MIT"
] | 15 | 2018-10-26T18:53:22.000Z | 2019-12-11T20:32:53.000Z | manifests/nginx/service.yml | giang12/kubepi | 8c8606e7089faeac3bc3d41c71489dbdc1b6b000 | [
"MIT"
] | 12 | 2018-11-10T03:33:34.000Z | 2021-03-24T15:32:48.000Z | apiVersion: v1
kind: Service
metadata:
name: ingress-nginx
namespace: ingress-nginx
spec:
type: LoadBalancer
ports:
- name: http
port: 80
protocol: TCP
- name: https
port: 443
protocol: TCP
selector:
app: ingress-nginx
| 14.882353 | 26 | 0.664032 |
73f70156a91fd61519c4ab4e94b4d5512771ccb2 | 393 | yaml | YAML | chart/templates/taskcluster-secrets-service-web.yaml | wellplayedgames/taskcluster-operator | 7d3a985cc60d2541a733abf33fee6a91075f8c25 | [
"Apache-2.0"
] | 2 | 2020-09-21T16:23:02.000Z | 2020-09-21T16:43:10.000Z | chart/templates/taskcluster-secrets-service-web.yaml | wellplayedgames/taskcluster-operator | 7d3a985cc60d2541a733abf33fee6a91075f8c25 | [
"Apache-2.0"
] | 5 | 2020-09-24T17:00:25.000Z | 2020-10-14T17:50:51.000Z | chart/templates/taskcluster-secrets-service-web.yaml | wellplayedgames/taskcluster-operator | 7d3a985cc60d2541a733abf33fee6a91075f8c25 | [
"Apache-2.0"
] | null | null | null | kind: Service
apiVersion: v1
metadata:
name: taskcluster-secrets
labels: &ref_0
app.kubernetes.io/name: taskcluster-secrets
app.kubernetes.io/instance: '{{ .Release.Name }}'
app.kubernetes.io/component: taskcluster-secrets-web
app.kubernetes.io/part-of: taskcluster
spec:
type: NodePort
selector: *ref_0
ports:
- protocol: TCP
port: 80
targetPort: 80
| 23.117647 | 56 | 0.699746 |
73f7822fff16b1a6eb937e105dd792f80261f737 | 9,688 | yaml | YAML | assets/thanos-querier/deployment.yaml | aliceh/cluster-monitoring-operator | 8eaa60227030c0ecf02df1aaf36a221932ad961d | [
"Apache-2.0"
] | null | null | null | assets/thanos-querier/deployment.yaml | aliceh/cluster-monitoring-operator | 8eaa60227030c0ecf02df1aaf36a221932ad961d | [
"Apache-2.0"
] | null | null | null | assets/thanos-querier/deployment.yaml | aliceh/cluster-monitoring-operator | 8eaa60227030c0ecf02df1aaf36a221932ad961d | [
"Apache-2.0"
] | null | null | null | apiVersion: apps/v1
kind: Deployment
metadata:
labels:
app.kubernetes.io/component: query-layer
app.kubernetes.io/instance: thanos-querier
app.kubernetes.io/managed-by: cluster-monitoring-operator
app.kubernetes.io/name: thanos-query
app.kubernetes.io/part-of: openshift-monitoring
app.kubernetes.io/version: 0.25.2
name: thanos-querier
namespace: openshift-monitoring
spec:
replicas: 2
selector:
matchLabels:
app.kubernetes.io/component: query-layer
app.kubernetes.io/instance: thanos-querier
app.kubernetes.io/name: thanos-query
app.kubernetes.io/part-of: openshift-monitoring
strategy:
rollingUpdate:
maxUnavailable: 1
template:
metadata:
annotations:
target.workload.openshift.io/management: '{"effect": "PreferredDuringScheduling"}'
labels:
app.kubernetes.io/component: query-layer
app.kubernetes.io/instance: thanos-querier
app.kubernetes.io/managed-by: cluster-monitoring-operator
app.kubernetes.io/name: thanos-query
app.kubernetes.io/part-of: openshift-monitoring
app.kubernetes.io/version: 0.25.2
spec:
affinity:
podAntiAffinity:
requiredDuringSchedulingIgnoredDuringExecution:
- labelSelector:
matchLabels:
app.kubernetes.io/component: query-layer
app.kubernetes.io/instance: thanos-querier
app.kubernetes.io/name: thanos-query
app.kubernetes.io/part-of: openshift-monitoring
topologyKey: kubernetes.io/hostname
containers:
- args:
- query
- --grpc-address=127.0.0.1:10901
- --http-address=127.0.0.1:9090
- --log.format=logfmt
- --query.replica-label=prometheus_replica
- --query.replica-label=thanos_ruler_replica
- --store=dnssrv+_grpc._tcp.prometheus-operated.openshift-monitoring.svc.cluster.local
- --query.auto-downsampling
- --store.sd-dns-resolver=miekgdns
- --grpc-client-tls-secure
- --grpc-client-tls-cert=/etc/tls/grpc/client.crt
- --grpc-client-tls-key=/etc/tls/grpc/client.key
- --grpc-client-tls-ca=/etc/tls/grpc/ca.crt
- --grpc-client-server-name=prometheus-grpc
- --rule=dnssrv+_grpc._tcp.prometheus-operated.openshift-monitoring.svc.cluster.local
- --target=dnssrv+_grpc._tcp.prometheus-operated.openshift-monitoring.svc.cluster.local
env:
- name: HOST_IP_ADDRESS
valueFrom:
fieldRef:
fieldPath: status.hostIP
image: quay.io/thanos/thanos:v0.25.2
imagePullPolicy: IfNotPresent
name: thanos-query
ports:
- containerPort: 9090
name: http
resources:
requests:
cpu: 10m
memory: 12Mi
terminationMessagePolicy: FallbackToLogsOnError
volumeMounts:
- mountPath: /etc/tls/grpc
name: secret-grpc-tls
- args:
- -provider=openshift
- -https-address=:9091
- -http-address=
- -email-domain=*
- -upstream=http://localhost:9090
- -openshift-service-account=thanos-querier
- '-openshift-sar={"resource": "namespaces", "verb": "get"}'
- '-openshift-delegate-urls={"/": {"resource": "namespaces", "verb": "get"}}'
- -tls-cert=/etc/tls/private/tls.crt
- -tls-key=/etc/tls/private/tls.key
- -client-secret-file=/var/run/secrets/kubernetes.io/serviceaccount/token
- -cookie-secret-file=/etc/proxy/secrets/session_secret
- -openshift-ca=/etc/pki/tls/cert.pem
- -openshift-ca=/var/run/secrets/kubernetes.io/serviceaccount/ca.crt
- -bypass-auth-for=^/-/(healthy|ready)$
env:
- name: HTTP_PROXY
value: ""
- name: HTTPS_PROXY
value: ""
- name: NO_PROXY
value: ""
image: quay.io/openshift/oauth-proxy:latest
livenessProbe:
failureThreshold: 4
httpGet:
path: /-/healthy
port: 9091
scheme: HTTPS
initialDelaySeconds: 5
periodSeconds: 30
name: oauth-proxy
ports:
- containerPort: 9091
name: web
readinessProbe:
failureThreshold: 20
httpGet:
path: /-/ready
port: 9091
scheme: HTTPS
initialDelaySeconds: 5
periodSeconds: 5
resources:
requests:
cpu: 1m
memory: 20Mi
terminationMessagePolicy: FallbackToLogsOnError
volumeMounts:
- mountPath: /etc/tls/private
name: secret-thanos-querier-tls
- mountPath: /etc/proxy/secrets
name: secret-thanos-querier-oauth-cookie
- args:
- --secure-listen-address=0.0.0.0:9092
- --upstream=http://127.0.0.1:9095
- --config-file=/etc/kube-rbac-proxy/config.yaml
- --tls-cert-file=/etc/tls/private/tls.crt
- --tls-private-key-file=/etc/tls/private/tls.key
- --tls-cipher-suites=TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256,TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256,TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384,TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384,TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305,TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305
- --logtostderr=true
- --allow-paths=/api/v1/query,/api/v1/query_range,/api/v1/labels,/api/v1/label/*/values,/api/v1/series
image: quay.io/brancz/kube-rbac-proxy:v0.11.0
name: kube-rbac-proxy
ports:
- containerPort: 9092
name: tenancy
resources:
requests:
cpu: 1m
memory: 15Mi
terminationMessagePolicy: FallbackToLogsOnError
volumeMounts:
- mountPath: /etc/tls/private
name: secret-thanos-querier-tls
- mountPath: /etc/kube-rbac-proxy
name: secret-thanos-querier-kube-rbac-proxy
- args:
- --insecure-listen-address=127.0.0.1:9095
- --upstream=http://127.0.0.1:9090
- --label=namespace
- --enable-label-apis
- --error-on-replace
image: quay.io/prometheuscommunity/prom-label-proxy:v0.4.0
name: prom-label-proxy
resources:
requests:
cpu: 1m
memory: 15Mi
terminationMessagePolicy: FallbackToLogsOnError
- args:
- --secure-listen-address=0.0.0.0:9093
- --upstream=http://127.0.0.1:9095
- --config-file=/etc/kube-rbac-proxy/config.yaml
- --tls-cert-file=/etc/tls/private/tls.crt
- --tls-private-key-file=/etc/tls/private/tls.key
- --tls-cipher-suites=TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256,TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256,TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384,TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384,TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305,TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305
- --logtostderr=true
- --allow-paths=/api/v1/rules
image: quay.io/brancz/kube-rbac-proxy:v0.11.0
name: kube-rbac-proxy-rules
ports:
- containerPort: 9093
name: tenancy-rules
resources:
requests:
cpu: 1m
memory: 15Mi
terminationMessagePolicy: FallbackToLogsOnError
volumeMounts:
- mountPath: /etc/tls/private
name: secret-thanos-querier-tls
- mountPath: /etc/kube-rbac-proxy
name: secret-thanos-querier-kube-rbac-proxy-rules
- args:
- --secure-listen-address=0.0.0.0:9094
- --upstream=http://127.0.0.1:9090
- --config-file=/etc/kube-rbac-proxy/config.yaml
- --tls-cert-file=/etc/tls/private/tls.crt
- --tls-private-key-file=/etc/tls/private/tls.key
- --tls-cipher-suites=TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256,TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256,TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384,TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384,TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305,TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305
- --client-ca-file=/etc/tls/client/client-ca.crt
- --logtostderr=true
- --allow-paths=/metrics
image: quay.io/brancz/kube-rbac-proxy:v0.11.0
name: kube-rbac-proxy-metrics
ports:
- containerPort: 9094
name: metrics
resources:
requests:
cpu: 1m
memory: 15Mi
terminationMessagePolicy: FallbackToLogsOnError
volumeMounts:
- mountPath: /etc/tls/private
name: secret-thanos-querier-tls
- mountPath: /etc/kube-rbac-proxy
name: secret-thanos-querier-kube-rbac-proxy-metrics
- mountPath: /etc/tls/client
name: metrics-client-ca
readOnly: true
nodeSelector:
kubernetes.io/os: linux
priorityClassName: system-cluster-critical
serviceAccountName: thanos-querier
terminationGracePeriodSeconds: 120
volumes:
- name: secret-thanos-querier-tls
secret:
secretName: thanos-querier-tls
- name: secret-thanos-querier-oauth-cookie
secret:
secretName: thanos-querier-oauth-cookie
- name: secret-thanos-querier-kube-rbac-proxy
secret:
secretName: thanos-querier-kube-rbac-proxy
- name: secret-thanos-querier-kube-rbac-proxy-rules
secret:
secretName: thanos-querier-kube-rbac-proxy-rules
- name: secret-thanos-querier-kube-rbac-proxy-metrics
secret:
secretName: thanos-querier-kube-rbac-proxy-metrics
- configMap:
name: metrics-client-ca
name: metrics-client-ca
| 38.752 | 261 | 0.627168 |
73f7aaceca68ab60a806b43aa174eadbedeb5d67 | 201 | yaml | YAML | influxdb/10-svc.yaml | spurin/use-cases | 9d042ddaa64990e2b5127969abe7c4f11ce139bf | [
"MIT"
] | 14 | 2019-10-14T17:37:20.000Z | 2022-03-10T10:44:56.000Z | influxdb/10-svc.yaml | spurin/use-cases | 9d042ddaa64990e2b5127969abe7c4f11ce139bf | [
"MIT"
] | 9 | 2019-10-14T17:35:05.000Z | 2022-02-22T17:13:17.000Z | influxdb/10-svc.yaml | spurin/use-cases | 9d042ddaa64990e2b5127969abe7c4f11ce139bf | [
"MIT"
] | 12 | 2019-10-15T08:06:13.000Z | 2022-02-22T15:49:17.000Z | apiVersion: v1
kind: Service
metadata:
labels:
app: influxdb
name: influxdb
spec:
clusterIP: None
ports:
- port: 8086
protocol: TCP
targetPort: 8086
selector:
app: influxdb
| 13.4 | 20 | 0.666667 |
73f7ac039c33f3d8d6b6f5db39d23737ff499d66 | 362 | yaml | YAML | kubernetes-controllers/paymentservice-replicaset.yaml | otus-kuber-2021-03/vyzhiga_platform | 80716cf0c2f26461a0e903a727499d1096efa4b1 | [
"MIT"
] | null | null | null | kubernetes-controllers/paymentservice-replicaset.yaml | otus-kuber-2021-03/vyzhiga_platform | 80716cf0c2f26461a0e903a727499d1096efa4b1 | [
"MIT"
] | 4 | 2021-05-12T07:19:05.000Z | 2021-09-27T05:49:09.000Z | kubernetes-controllers/paymentservice-replicaset.yaml | otus-kuber-2021-03/vyzhiga_platform | 80716cf0c2f26461a0e903a727499d1096efa4b1 | [
"MIT"
] | null | null | null | apiVersion: apps/v1
kind: ReplicaSet
metadata:
name: paymentservice
labels:
app: paymentservice
spec:
replicas: 3
selector:
matchLabels:
app: paymentservice
template:
metadata:
labels:
app: paymentservice
spec:
containers:
- name: paymentservice
image: vyzhiga/hipster-paymentservice:v0.0.1 | 19.052632 | 52 | 0.651934 |
73f7cce496901e2081c49af173cae0d2758f9bc9 | 1,087 | yaml | YAML | deployment.yaml | quanbisen/k8s-api-service | 40e0fedb2c522433c5782efed01af635b6eb7789 | [
"MIT"
] | 2 | 2022-02-11T14:29:04.000Z | 2022-03-22T04:10:19.000Z | deployment.yaml | quanbisen/k8s-api-service | 40e0fedb2c522433c5782efed01af635b6eb7789 | [
"MIT"
] | 1 | 2022-03-03T08:27:18.000Z | 2022-03-06T09:20:53.000Z | deployment.yaml | quanbisen/k8s-api-service | 40e0fedb2c522433c5782efed01af635b6eb7789 | [
"MIT"
] | 1 | 2022-03-29T10:18:54.000Z | 2022-03-29T10:18:54.000Z | apiVersion: apps/v1
kind: Deployment
metadata:
labels:
app.kubernetes.io/instance: k8s-api-service
name: k8s-api-service
namespace: dev
spec:
replicas: 1
selector:
matchLabels:
app.kubernetes.io/instance: k8s-api-service
template:
metadata:
annotations:
sidecar.istio.io/inject: "false"
labels:
app.kubernetes.io/instance: k8s-api-service
spec:
containers:
- image: k8s-api-service
imagePullPolicy: Always
name: app
ports:
- containerPort: 8080
name: api
protocol: TCP
readinessProbe:
failureThreshold: 3
httpGet:
path: /api/v1/health_check
port: api
scheme: HTTP
periodSeconds: 10
successThreshold: 1
timeoutSeconds: 1
resources:
limits:
cpu: 500m
memory: 1024Mi
requests:
cpu: 100m
memory: 128Mi | 25.27907 | 119 | 0.50966 |
73f81934e4704299a892161b6d346501c0562279 | 65 | yaml | YAML | deploy/namespace.yaml | omnibuildplatform/OmniRepository | bc8beeb8ac771c20360e547a964d9857e88abd01 | [
"MIT"
] | null | null | null | deploy/namespace.yaml | omnibuildplatform/OmniRepository | bc8beeb8ac771c20360e547a964d9857e88abd01 | [
"MIT"
] | null | null | null | deploy/namespace.yaml | omnibuildplatform/OmniRepository | bc8beeb8ac771c20360e547a964d9857e88abd01 | [
"MIT"
] | null | null | null | apiVersion: v1
kind: Namespace
metadata:
name: omni-repository
| 13 | 23 | 0.784615 |
73f82c379fbe18ec130bc7f6d6e8be7686bf2e92 | 393 | yaml | YAML | config/rbac/auditlogging_editor_role.yaml | ibm-ci-bot/ibm-auditlogging-operator | 0456f033a7d17db6b1fd0fb62df09768c939e421 | [
"Apache-2.0"
] | 5 | 2020-10-17T09:50:07.000Z | 2021-08-20T00:07:26.000Z | config/rbac/auditlogging_editor_role.yaml | ibm-ci-bot/ibm-auditlogging-operator | 0456f033a7d17db6b1fd0fb62df09768c939e421 | [
"Apache-2.0"
] | 221 | 2020-02-11T05:55:39.000Z | 2022-03-17T04:30:27.000Z | config/rbac/auditlogging_editor_role.yaml | ibm-ci-bot/ibm-auditlogging-operator | 0456f033a7d17db6b1fd0fb62df09768c939e421 | [
"Apache-2.0"
] | 9 | 2020-03-24T17:54:11.000Z | 2021-04-29T22:07:58.000Z | # permissions for end users to edit auditloggings.
apiVersion: rbac.authorization.k8s.io/v1
kind: ClusterRole
metadata:
name: auditlogging-editor-role
rules:
- apiGroups:
- operator.ibm.com
resources:
- auditloggings
verbs:
- create
- delete
- get
- list
- patch
- update
- watch
- apiGroups:
- operator.ibm.com
resources:
- auditloggings/status
verbs:
- get
| 15.72 | 50 | 0.694656 |
73f890e9a2a4b58f36631591921fa4c208ce3e75 | 212 | yaml | YAML | kubernetes/yaml/aws/kibishiiAWSStorageClass.yaml | ywk253100/distributed-data-generator | a4180b36a8174379d79ace5d91be2639674f6de3 | [
"Apache-2.0"
] | null | null | null | kubernetes/yaml/aws/kibishiiAWSStorageClass.yaml | ywk253100/distributed-data-generator | a4180b36a8174379d79ace5d91be2639674f6de3 | [
"Apache-2.0"
] | null | null | null | kubernetes/yaml/aws/kibishiiAWSStorageClass.yaml | ywk253100/distributed-data-generator | a4180b36a8174379d79ace5d91be2639674f6de3 | [
"Apache-2.0"
] | null | null | null | apiVersion: storage.k8s.io/v1
kind: StorageClass
metadata:
name: kibishii-storage-class
provisioner: kubernetes.io/aws-ebs
parameters:
type: gp2
reclaimPolicy: Delete
volumeBindingMode: WaitForFirstConsumer
| 19.272727 | 39 | 0.820755 |
73f8a3c2cce269316b505992abc2b8536dafbb1e | 244 | yml | YAML | step15/application/apl-3-svc.yml | reapsow/15_DandK | 88eb3871f74b079164c4a8661455cadca7f8f74b | [
"MIT"
] | 25 | 2020-10-31T06:14:06.000Z | 2022-03-02T12:52:55.000Z | step15/application/apl-3-svc.yml | reapsow/15_DandK | 88eb3871f74b079164c4a8661455cadca7f8f74b | [
"MIT"
] | null | null | null | step15/application/apl-3-svc.yml | reapsow/15_DandK | 88eb3871f74b079164c4a8661455cadca7f8f74b | [
"MIT"
] | 29 | 2020-08-16T23:32:15.000Z | 2022-03-06T13:29:18.000Z | ##
## HTTPS 모의 애플리케이션 서비스
##
apiVersion: v1
kind: Service
metadata:
name: web-apl3
spec:
selector:
apl: web-apl3 ## 파드 템플릿의 라벨과 일치해야 함
ports:
- name: https
protocol: TCP
port: 443
type: LoadBalancer ## 외부 지향 로드밸런서
| 15.25 | 44 | 0.618852 |