hexsha
stringlengths 40
40
| size
int64 24
1.05M
| ext
stringclasses 2
values | lang
stringclasses 1
value | max_stars_repo_path
stringlengths 5
269
| max_stars_repo_name
stringlengths 7
107
| max_stars_repo_head_hexsha
stringlengths 40
78
| max_stars_repo_licenses
sequence | max_stars_count
int64 1
84.9k
⌀ | max_stars_repo_stars_event_min_datetime
stringlengths 24
24
⌀ | max_stars_repo_stars_event_max_datetime
stringlengths 24
24
⌀ | max_issues_repo_path
stringlengths 5
269
| max_issues_repo_name
stringlengths 7
107
| max_issues_repo_head_hexsha
stringlengths 40
78
| max_issues_repo_licenses
sequence | max_issues_count
int64 1
116k
⌀ | max_issues_repo_issues_event_min_datetime
stringlengths 24
24
⌀ | max_issues_repo_issues_event_max_datetime
stringlengths 24
24
⌀ | max_forks_repo_path
stringlengths 5
269
| max_forks_repo_name
stringlengths 7
107
| max_forks_repo_head_hexsha
stringlengths 40
78
| max_forks_repo_licenses
sequence | max_forks_count
int64 1
55.9k
⌀ | max_forks_repo_forks_event_min_datetime
stringlengths 24
24
⌀ | max_forks_repo_forks_event_max_datetime
stringlengths 24
24
⌀ | content
stringlengths 24
1.05M
| avg_line_length
float64 1
304k
| max_line_length
int64 14
1.03M
| alphanum_fraction
float64 0
1
|
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
79241a53d0ae3c5baf14d8c65806df70ecf70154 | 1,025 | yaml | YAML | overlays/instances/instance1/environments/test/secrets.yaml | apigee/apigee-hybrid-install | 7c646e6456c8de1b75dbe18223939756ab92715e | [
"Apache-2.0"
] | null | null | null | overlays/instances/instance1/environments/test/secrets.yaml | apigee/apigee-hybrid-install | 7c646e6456c8de1b75dbe18223939756ab92715e | [
"Apache-2.0"
] | null | null | null | overlays/instances/instance1/environments/test/secrets.yaml | apigee/apigee-hybrid-install | 7c646e6456c8de1b75dbe18223939756ab92715e | [
"Apache-2.0"
] | null | null | null | # Copyright 2022 Google LLC
#
# Licensed under the Apache License, Version 2.0 (the "License");
# you may not use this file except in compliance with the License.
# You may obtain a copy of the License at
#
# https://www.apache.org/licenses/LICENSE-2.0
#
# Unless required by applicable law or agreed to in writing, software
# distributed under the License is distributed on an "AS IS" BASIS,
# WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
# See the License for the specific language governing permissions and
# limitations under the License.
apiVersion: v1
kind: Secret
metadata:
name: "env-encryption-keys" # kpt-set: ${ORGANIZATION_NAME}-${ENVIRONMENT_NAME}-encryption-keys
namespace: "apigee" # kpt-set: ${APIGEE_NAMESPACE}
type: Opaque
data:
kmsEncryptionKey: |
YVd4dmRtVmhjR2x6TVRJek5EVTJOdz09
cacheEncryptionKey: |
YVd4dmRtVmhjR2x6TVRJek5EVTJOdz09
envKvmEncryptionKey: |
YVd4dmRtVmhjR2x6TVRJek5EVTJOdz09
kvmEncryptionKey: |
YVd4dmRtVmhjR2x6TVRJek5EVTJOdz09
| 34.166667 | 97 | 0.771707 |
79249a6fb1cfd2f664f80f7a1dafaf9e8f55a10b | 144 | yaml | YAML | demo-app/base/service-account.yaml | justinzamora02/gitops | 63cac129c523ffe7e8fe5ed109f2a9ea2ae86fa4 | [
"Apache-2.0"
] | null | null | null | demo-app/base/service-account.yaml | justinzamora02/gitops | 63cac129c523ffe7e8fe5ed109f2a9ea2ae86fa4 | [
"Apache-2.0"
] | null | null | null | demo-app/base/service-account.yaml | justinzamora02/gitops | 63cac129c523ffe7e8fe5ed109f2a9ea2ae86fa4 | [
"Apache-2.0"
] | null | null | null | apiVersion: v1
kind: ServiceAccount
metadata:
name: sa
annotations:
argocd.argoproj.io/sync-wave: "1"
argocd.argoproj.io/hook: Sync
| 18 | 37 | 0.722222 |
7924d7e77c9415047ad48d5ab6ad15a19a321a1c | 761 | yaml | YAML | examples/demo/rollingUpdate/demo_v1.yaml | lt-schmidt-jr/foremast | 5ae42288831234830e21e7bd3e28e395b8960c7c | [
"Apache-2.0"
] | 128 | 2018-12-14T17:53:03.000Z | 2022-03-04T07:50:05.000Z | examples/demo/rollingUpdate/demo_v1.yaml | lt-schmidt-jr/foremast | 5ae42288831234830e21e7bd3e28e395b8960c7c | [
"Apache-2.0"
] | 91 | 2018-12-18T19:51:13.000Z | 2022-02-26T04:39:05.000Z | examples/demo/rollingUpdate/demo_v1.yaml | lt-schmidt-jr/foremast | 5ae42288831234830e21e7bd3e28e395b8960c7c | [
"Apache-2.0"
] | 37 | 2018-12-19T18:02:53.000Z | 2022-02-24T08:03:49.000Z | apiVersion: apps/v1
kind: Deployment
metadata:
labels:
app: demo # Application Name
appType: spring-boot # Application Type
name: demo
namespace: foremast-examples
spec:
replicas: 5
selector:
matchLabels:
app: demo
template:
metadata:
labels:
app: demo
version: v1
annotations:
prometheus.io/scrape: "true"
prometheus.io/scheme: "http"
prometheus.io/port: "8080"
prometheus.io/path: "/actuator/prometheus"
spec:
containers:
- name: app
image: docker.io/foremast/k8s-metrics-demo:0.1.5
imagePullPolicy: Always
env:
- name: APP_NAME
value: demo
ports:
- name: http
containerPort: 8080
| 21.742857 | 56 | 0.592641 |
7924df45c1adccc81b20dcfb479b03820814144f | 247 | yaml | YAML | install/00_namespace.yaml | jupierce/cluster-autoscaler-operator | 52ee4f03604b6a51b3b09913c72859e10f00faa0 | [
"Apache-2.0"
] | null | null | null | install/00_namespace.yaml | jupierce/cluster-autoscaler-operator | 52ee4f03604b6a51b3b09913c72859e10f00faa0 | [
"Apache-2.0"
] | null | null | null | install/00_namespace.yaml | jupierce/cluster-autoscaler-operator | 52ee4f03604b6a51b3b09913c72859e10f00faa0 | [
"Apache-2.0"
] | 1 | 2021-07-29T04:10:19.000Z | 2021-07-29T04:10:19.000Z | ---
apiVersion: v1
kind: Namespace
metadata:
name: openshift-machine-api
labels:
name: openshift-machine-api
# allow openshift-monitoring to look for ServiceMonitor objects in this namespace
openshift.io/cluster-monitoring: "true"
| 24.7 | 85 | 0.753036 |
7925640ecadab16673653afdd8a0b9ffcf3164be | 396 | yaml | YAML | config/rbac/metamorphcluster_viewer_role.yaml | bm-metamorph/cluster-api-provider-metamorph | fffe4404e53d1e25ea504ec3df6b533c0e0522f6 | [
"Apache-2.0"
] | null | null | null | config/rbac/metamorphcluster_viewer_role.yaml | bm-metamorph/cluster-api-provider-metamorph | fffe4404e53d1e25ea504ec3df6b533c0e0522f6 | [
"Apache-2.0"
] | null | null | null | config/rbac/metamorphcluster_viewer_role.yaml | bm-metamorph/cluster-api-provider-metamorph | fffe4404e53d1e25ea504ec3df6b533c0e0522f6 | [
"Apache-2.0"
] | 1 | 2020-09-09T10:29:58.000Z | 2020-09-09T10:29:58.000Z | # permissions for end users to view metamorphclusters.
apiVersion: rbac.authorization.k8s.io/v1
kind: ClusterRole
metadata:
name: metamorphcluster-viewer-role
rules:
- apiGroups:
- infrastructure.cluster.x-k8s.io
resources:
- metamorphclusters
verbs:
- get
- list
- watch
- apiGroups:
- infrastructure.cluster.x-k8s.io
resources:
- metamorphclusters/status
verbs:
- get
| 18.857143 | 54 | 0.737374 |
79256cccaed6d7d18ca9c49f900b8c0d87aed0ec | 411 | yaml | YAML | config-root/namespaces/myjenkins/jenkins/jenkins-sa.yaml | lexarflash8g/jx3-eks-vault | c1f80d27c72fba5860b9dcce47e298a19bcb1f37 | [
"Apache-2.0"
] | null | null | null | config-root/namespaces/myjenkins/jenkins/jenkins-sa.yaml | lexarflash8g/jx3-eks-vault | c1f80d27c72fba5860b9dcce47e298a19bcb1f37 | [
"Apache-2.0"
] | 16 | 2021-03-13T04:48:03.000Z | 2021-03-18T21:48:17.000Z | config-root/namespaces/myjenkins/jenkins/jenkins-sa.yaml | lexarflash8g/jx3-eks-vault | c1f80d27c72fba5860b9dcce47e298a19bcb1f37 | [
"Apache-2.0"
] | null | null | null | # Source: jenkins/templates/service-account.yaml
apiVersion: v1
kind: ServiceAccount
metadata:
name: jenkins
namespace: myjenkins
labels:
"app.kubernetes.io/name": 'jenkins'
"helm.sh/chart": "jenkins-3.2.4"
"app.kubernetes.io/managed-by": "Helm"
"app.kubernetes.io/instance": "jenkins"
"app.kubernetes.io/component": "jenkins-controller"
gitops.jenkins-x.io/pipeline: 'namespaces'
| 29.357143 | 55 | 0.712895 |
7925934416bbc7192649f3ba94fbf63e78d42d96 | 376 | yaml | YAML | k8s/deployment.yaml | cwcordell/time-warp | 070e944ece228393f3c8ece977c26601a926fa72 | [
"MIT"
] | null | null | null | k8s/deployment.yaml | cwcordell/time-warp | 070e944ece228393f3c8ece977c26601a926fa72 | [
"MIT"
] | null | null | null | k8s/deployment.yaml | cwcordell/time-warp | 070e944ece228393f3c8ece977c26601a926fa72 | [
"MIT"
] | null | null | null | apiVersion: apps/v1
kind: Deployment
metadata:
name: timewarp
labels:
app: timewarp
spec:
replicas: 1
selector:
matchLabels:
app: timewarp
template:
metadata:
labels:
app: timewarp
spec:
containers:
- name: timewarp
image: cordelltech/timewarp
ports:
- containerPort: 8000
name: http
| 16.347826 | 35 | 0.593085 |
7925aa14e1471fe76b7918241ca508fafc13e41d | 3,606 | yaml | YAML | deploy/2_crd.yaml | teamupstart/rbac-manager | 32e35b6100153f441a923e5f9b2abde3e0c741fe | [
"Apache-2.0"
] | 728 | 2019-07-12T19:40:21.000Z | 2022-03-31T08:31:29.000Z | deploy/2_crd.yaml | teamupstart/rbac-manager | 32e35b6100153f441a923e5f9b2abde3e0c741fe | [
"Apache-2.0"
] | 202 | 2019-07-11T07:42:51.000Z | 2022-03-28T13:22:27.000Z | deploy/2_crd.yaml | teamupstart/rbac-manager | 32e35b6100153f441a923e5f9b2abde3e0c741fe | [
"Apache-2.0"
] | 81 | 2019-07-17T09:43:32.000Z | 2022-03-21T17:24:54.000Z | ---
apiVersion: apiextensions.k8s.io/v1
kind: CustomResourceDefinition
metadata:
labels:
app: rbac-manager
name: rbacdefinitions.rbacmanager.reactiveops.io
spec:
group: rbacmanager.reactiveops.io
names:
kind: RBACDefinition
plural: rbacdefinitions
singular: rbacdefinition
shortNames:
- rbd
- rbacdef
scope: Cluster
versions:
- name: v1beta1
served: true
storage: true
schema:
openAPIV3Schema:
required:
- rbacBindings
type: object
properties:
rbacBindings:
items:
properties:
clusterRoleBindings:
items:
properties:
clusterRole:
type: string
required:
- clusterRole
type: object
type: array
name:
type: string
roleBindings:
items:
properties:
clusterRole:
type: string
namespace:
type: string
namespaceSelector:
type: object
properties:
matchLabels:
type: object
additionalProperties:
type: string
matchExpressions:
type: array
items:
type: object
properties:
key:
type: string
operator:
type:
string
enum:
- Exists
- DoesNotExist
- In
- NotIn
values:
type: array
items:
type: string
required:
- key
- operator
role:
type: string
type: object
type: array
subjects:
items:
type: object
properties:
imagePullSecrets:
type: array
items:
type: string
kind:
type: string
enum:
- Group
- ServiceAccount
- User
name:
type: string
namespace:
type: string
required:
- name
- kind
type: array
required:
- name
- subjects
type: object
type: array
status:
type: object
| 32.486486 | 52 | 0.29645 |
792676a4bddb92df1edf41b5c36dfd44ecbb3366 | 41,887 | yaml | YAML | packages/cert-manager-1.3.0/crd/000_CustomResourceDefinition_certificaterequests.cert-manager.io.yaml | vfeld/schocken-infrastructure | ae49776bb461defa4592f0a3dc974e7409917982 | [
"MIT"
] | null | null | null | packages/cert-manager-1.3.0/crd/000_CustomResourceDefinition_certificaterequests.cert-manager.io.yaml | vfeld/schocken-infrastructure | ae49776bb461defa4592f0a3dc974e7409917982 | [
"MIT"
] | null | null | null | packages/cert-manager-1.3.0/crd/000_CustomResourceDefinition_certificaterequests.cert-manager.io.yaml | vfeld/schocken-infrastructure | ae49776bb461defa4592f0a3dc974e7409917982 | [
"MIT"
] | null | null | null | ---
apiVersion: apiextensions.k8s.io/v1
kind: CustomResourceDefinition
metadata:
annotations:
cert-manager.io/inject-ca-from-secret: cert-manager/cert-manager-webhook-ca
labels:
app: cert-manager
app.kubernetes.io/instance: cert-manager
app.kubernetes.io/name: cert-manager
name: certificaterequests.cert-manager.io
spec:
conversion:
strategy: Webhook
webhook:
clientConfig:
service:
name: cert-manager-webhook
namespace: cert-manager
path: /convert
conversionReviewVersions:
- v1
- v1beta1
group: cert-manager.io
names:
categories:
- cert-manager
kind: CertificateRequest
listKind: CertificateRequestList
plural: certificaterequests
shortNames:
- cr
- crs
singular: certificaterequest
scope: Namespaced
versions:
- additionalPrinterColumns:
- jsonPath: ".status.conditions[?(@.type==\"Approved\")].status"
name: Approved
type: string
- jsonPath: ".status.conditions[?(@.type==\"Denied\")].status"
name: Denied
type: string
- jsonPath: ".status.conditions[?(@.type==\"Ready\")].status"
name: Ready
type: string
- jsonPath: ".spec.issuerRef.name"
name: Issuer
type: string
- jsonPath: ".spec.username"
name: Requestor
type: string
- jsonPath: ".status.conditions[?(@.type==\"Ready\")].message"
name: Status
priority: 1
type: string
- description: CreationTimestamp is a timestamp representing the server time when this object was created. It is not guaranteed to be set in happens-before order across separate operations. Clients may not set this value. It is represented in RFC3339 form and is in UTC.
jsonPath: ".metadata.creationTimestamp"
name: Age
type: date
name: v1alpha2
schema:
openAPIV3Schema:
description: "A CertificateRequest is used to request a signed certificate from one of the configured issuers. \n All fields within the CertificateRequest's `spec` are immutable after creation. A CertificateRequest will either succeed or fail, as denoted by its `status.state` field. \n A CertificateRequest is a one-shot resource, meaning it represents a single point in time request for a certificate and cannot be re-used."
properties:
apiVersion:
description: "APIVersion defines the versioned schema of this representation of an object. Servers should convert recognized schemas to the latest internal value, and may reject unrecognized values. More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#resources"
type: string
kind:
description: "Kind is a string value representing the REST resource this object represents. Servers may infer this from the endpoint the client submits requests to. Cannot be updated. In CamelCase. More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#types-kinds"
type: string
metadata:
type: object
spec:
description: Desired state of the CertificateRequest resource.
properties:
csr:
description: The PEM-encoded x509 certificate signing request to be submitted to the CA for signing.
format: byte
type: string
duration:
description: "The requested 'duration' (i.e. lifetime) of the Certificate. This option may be ignored/overridden by some issuer types."
type: string
extra:
additionalProperties:
items:
type: string
type: array
description: Extra contains extra attributes of the user that created the CertificateRequest. Populated by the cert-manager webhook on creation and immutable.
type: object
groups:
description: Groups contains group membership of the user that created the CertificateRequest. Populated by the cert-manager webhook on creation and immutable.
items:
type: string
type: array
x-kubernetes-list-type: atomic
isCA:
description: "IsCA will request to mark the certificate as valid for certificate signing when submitting to the issuer. This will automatically add the `cert sign` usage to the list of `usages`."
type: boolean
issuerRef:
description: "IssuerRef is a reference to the issuer for this CertificateRequest. If the `kind` field is not set, or set to `Issuer`, an Issuer resource with the given name in the same namespace as the CertificateRequest will be used. If the `kind` field is set to `ClusterIssuer`, a ClusterIssuer with the provided name will be used. The `name` field in this stanza is required at all times. The group field refers to the API group of the issuer which defaults to `cert-manager.io` if empty."
properties:
group:
description: Group of the resource being referred to.
type: string
kind:
description: Kind of the resource being referred to.
type: string
name:
description: Name of the resource being referred to.
type: string
required:
- name
type: object
uid:
description: UID contains the uid of the user that created the CertificateRequest. Populated by the cert-manager webhook on creation and immutable.
type: string
usages:
description: "Usages is the set of x509 usages that are requested for the certificate. Defaults to `digital signature` and `key encipherment` if not specified."
items:
description: "KeyUsage specifies valid usage contexts for keys. See: https://tools.ietf.org/html/rfc5280#section-4.2.1.3 https://tools.ietf.org/html/rfc5280#section-4.2.1.12 Valid KeyUsage values are as follows: \"signing\", \"digital signature\", \"content commitment\", \"key encipherment\", \"key agreement\", \"data encipherment\", \"cert sign\", \"crl sign\", \"encipher only\", \"decipher only\", \"any\", \"server auth\", \"client auth\", \"code signing\", \"email protection\", \"s/mime\", \"ipsec end system\", \"ipsec tunnel\", \"ipsec user\", \"timestamping\", \"ocsp signing\", \"microsoft sgc\", \"netscape sgc\""
enum:
- signing
- digital signature
- content commitment
- key encipherment
- key agreement
- data encipherment
- cert sign
- crl sign
- encipher only
- decipher only
- any
- server auth
- client auth
- code signing
- email protection
- s/mime
- ipsec end system
- ipsec tunnel
- ipsec user
- timestamping
- ocsp signing
- microsoft sgc
- netscape sgc
type: string
type: array
username:
description: Username contains the name of the user that created the CertificateRequest. Populated by the cert-manager webhook on creation and immutable.
type: string
required:
- csr
- issuerRef
type: object
status:
description: Status of the CertificateRequest. This is set and managed automatically.
properties:
ca:
description: "The PEM encoded x509 certificate of the signer, also known as the CA (Certificate Authority). This is set on a best-effort basis by different issuers. If not set, the CA is assumed to be unknown/not available."
format: byte
type: string
certificate:
description: "The PEM encoded x509 certificate resulting from the certificate signing request. If not set, the CertificateRequest has either not been completed or has failed. More information on failure can be found by checking the `conditions` field."
format: byte
type: string
conditions:
description: "List of status conditions to indicate the status of a CertificateRequest. Known condition types are `Ready` and `InvalidRequest`."
items:
description: CertificateRequestCondition contains condition information for a CertificateRequest.
properties:
lastTransitionTime:
description: LastTransitionTime is the timestamp corresponding to the last status change of this condition.
format: date-time
type: string
message:
description: "Message is a human readable description of the details of the last transition, complementing reason."
type: string
reason:
description: "Reason is a brief machine readable explanation for the condition's last transition."
type: string
status:
description: "Status of the condition, one of (`True`, `False`, `Unknown`)."
enum:
- "True"
- "False"
- Unknown
type: string
type:
description: "Type of the condition, known values are (`Ready`, `InvalidRequest`, `Approved`, `Denied`)."
type: string
required:
- status
- type
type: object
type: array
failureTime:
description: FailureTime stores the time that this CertificateRequest failed. This is used to influence garbage collection and back-off.
format: date-time
type: string
type: object
type: object
served: true
storage: false
subresources:
status: {}
- additionalPrinterColumns:
- jsonPath: ".status.conditions[?(@.type==\"Approved\")].status"
name: Approved
type: string
- jsonPath: ".status.conditions[?(@.type==\"Denied\")].status"
name: Denied
type: string
- jsonPath: ".status.conditions[?(@.type==\"Ready\")].status"
name: Ready
type: string
- jsonPath: ".spec.issuerRef.name"
name: Issuer
type: string
- jsonPath: ".spec.username"
name: Requestor
type: string
- jsonPath: ".status.conditions[?(@.type==\"Ready\")].message"
name: Status
priority: 1
type: string
- description: CreationTimestamp is a timestamp representing the server time when this object was created. It is not guaranteed to be set in happens-before order across separate operations. Clients may not set this value. It is represented in RFC3339 form and is in UTC.
jsonPath: ".metadata.creationTimestamp"
name: Age
type: date
name: v1alpha3
schema:
openAPIV3Schema:
description: "A CertificateRequest is used to request a signed certificate from one of the configured issuers. \n All fields within the CertificateRequest's `spec` are immutable after creation. A CertificateRequest will either succeed or fail, as denoted by its `status.state` field. \n A CertificateRequest is a one-shot resource, meaning it represents a single point in time request for a certificate and cannot be re-used."
properties:
apiVersion:
description: "APIVersion defines the versioned schema of this representation of an object. Servers should convert recognized schemas to the latest internal value, and may reject unrecognized values. More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#resources"
type: string
kind:
description: "Kind is a string value representing the REST resource this object represents. Servers may infer this from the endpoint the client submits requests to. Cannot be updated. In CamelCase. More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#types-kinds"
type: string
metadata:
type: object
spec:
description: Desired state of the CertificateRequest resource.
properties:
csr:
description: The PEM-encoded x509 certificate signing request to be submitted to the CA for signing.
format: byte
type: string
duration:
description: "The requested 'duration' (i.e. lifetime) of the Certificate. This option may be ignored/overridden by some issuer types."
type: string
extra:
additionalProperties:
items:
type: string
type: array
description: Extra contains extra attributes of the user that created the CertificateRequest. Populated by the cert-manager webhook on creation and immutable.
type: object
groups:
description: Groups contains group membership of the user that created the CertificateRequest. Populated by the cert-manager webhook on creation and immutable.
items:
type: string
type: array
x-kubernetes-list-type: atomic
isCA:
description: "IsCA will request to mark the certificate as valid for certificate signing when submitting to the issuer. This will automatically add the `cert sign` usage to the list of `usages`."
type: boolean
issuerRef:
description: "IssuerRef is a reference to the issuer for this CertificateRequest. If the `kind` field is not set, or set to `Issuer`, an Issuer resource with the given name in the same namespace as the CertificateRequest will be used. If the `kind` field is set to `ClusterIssuer`, a ClusterIssuer with the provided name will be used. The `name` field in this stanza is required at all times. The group field refers to the API group of the issuer which defaults to `cert-manager.io` if empty."
properties:
group:
description: Group of the resource being referred to.
type: string
kind:
description: Kind of the resource being referred to.
type: string
name:
description: Name of the resource being referred to.
type: string
required:
- name
type: object
uid:
description: UID contains the uid of the user that created the CertificateRequest. Populated by the cert-manager webhook on creation and immutable.
type: string
usages:
description: "Usages is the set of x509 usages that are requested for the certificate. Defaults to `digital signature` and `key encipherment` if not specified."
items:
description: "KeyUsage specifies valid usage contexts for keys. See: https://tools.ietf.org/html/rfc5280#section-4.2.1.3 https://tools.ietf.org/html/rfc5280#section-4.2.1.12 Valid KeyUsage values are as follows: \"signing\", \"digital signature\", \"content commitment\", \"key encipherment\", \"key agreement\", \"data encipherment\", \"cert sign\", \"crl sign\", \"encipher only\", \"decipher only\", \"any\", \"server auth\", \"client auth\", \"code signing\", \"email protection\", \"s/mime\", \"ipsec end system\", \"ipsec tunnel\", \"ipsec user\", \"timestamping\", \"ocsp signing\", \"microsoft sgc\", \"netscape sgc\""
enum:
- signing
- digital signature
- content commitment
- key encipherment
- key agreement
- data encipherment
- cert sign
- crl sign
- encipher only
- decipher only
- any
- server auth
- client auth
- code signing
- email protection
- s/mime
- ipsec end system
- ipsec tunnel
- ipsec user
- timestamping
- ocsp signing
- microsoft sgc
- netscape sgc
type: string
type: array
username:
description: Username contains the name of the user that created the CertificateRequest. Populated by the cert-manager webhook on creation and immutable.
type: string
required:
- csr
- issuerRef
type: object
status:
description: Status of the CertificateRequest. This is set and managed automatically.
properties:
ca:
description: "The PEM encoded x509 certificate of the signer, also known as the CA (Certificate Authority). This is set on a best-effort basis by different issuers. If not set, the CA is assumed to be unknown/not available."
format: byte
type: string
certificate:
description: "The PEM encoded x509 certificate resulting from the certificate signing request. If not set, the CertificateRequest has either not been completed or has failed. More information on failure can be found by checking the `conditions` field."
format: byte
type: string
conditions:
description: "List of status conditions to indicate the status of a CertificateRequest. Known condition types are `Ready` and `InvalidRequest`."
items:
description: CertificateRequestCondition contains condition information for a CertificateRequest.
properties:
lastTransitionTime:
description: LastTransitionTime is the timestamp corresponding to the last status change of this condition.
format: date-time
type: string
message:
description: "Message is a human readable description of the details of the last transition, complementing reason."
type: string
reason:
description: "Reason is a brief machine readable explanation for the condition's last transition."
type: string
status:
description: "Status of the condition, one of (`True`, `False`, `Unknown`)."
enum:
- "True"
- "False"
- Unknown
type: string
type:
description: "Type of the condition, known values are (`Ready`, `InvalidRequest`, `Approved`, `Denied`)."
type: string
required:
- status
- type
type: object
type: array
failureTime:
description: FailureTime stores the time that this CertificateRequest failed. This is used to influence garbage collection and back-off.
format: date-time
type: string
type: object
type: object
served: true
storage: false
subresources:
status: {}
- additionalPrinterColumns:
- jsonPath: ".status.conditions[?(@.type==\"Approved\")].status"
name: Approved
type: string
- jsonPath: ".status.conditions[?(@.type==\"Denied\")].status"
name: Denied
type: string
- jsonPath: ".status.conditions[?(@.type==\"Ready\")].status"
name: Ready
type: string
- jsonPath: ".spec.issuerRef.name"
name: Issuer
type: string
- jsonPath: ".spec.username"
name: Requestor
type: string
- jsonPath: ".status.conditions[?(@.type==\"Ready\")].message"
name: Status
priority: 1
type: string
- description: CreationTimestamp is a timestamp representing the server time when this object was created. It is not guaranteed to be set in happens-before order across separate operations. Clients may not set this value. It is represented in RFC3339 form and is in UTC.
jsonPath: ".metadata.creationTimestamp"
name: Age
type: date
name: v1beta1
schema:
openAPIV3Schema:
description: "A CertificateRequest is used to request a signed certificate from one of the configured issuers. \n All fields within the CertificateRequest's `spec` are immutable after creation. A CertificateRequest will either succeed or fail, as denoted by its `status.state` field. \n A CertificateRequest is a one-shot resource, meaning it represents a single point in time request for a certificate and cannot be re-used."
properties:
apiVersion:
description: "APIVersion defines the versioned schema of this representation of an object. Servers should convert recognized schemas to the latest internal value, and may reject unrecognized values. More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#resources"
type: string
kind:
description: "Kind is a string value representing the REST resource this object represents. Servers may infer this from the endpoint the client submits requests to. Cannot be updated. In CamelCase. More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#types-kinds"
type: string
metadata:
type: object
spec:
description: Desired state of the CertificateRequest resource.
properties:
duration:
description: "The requested 'duration' (i.e. lifetime) of the Certificate. This option may be ignored/overridden by some issuer types."
type: string
extra:
additionalProperties:
items:
type: string
type: array
description: Extra contains extra attributes of the user that created the CertificateRequest. Populated by the cert-manager webhook on creation and immutable.
type: object
groups:
description: Groups contains group membership of the user that created the CertificateRequest. Populated by the cert-manager webhook on creation and immutable.
items:
type: string
type: array
x-kubernetes-list-type: atomic
isCA:
description: "IsCA will request to mark the certificate as valid for certificate signing when submitting to the issuer. This will automatically add the `cert sign` usage to the list of `usages`."
type: boolean
issuerRef:
description: "IssuerRef is a reference to the issuer for this CertificateRequest. If the `kind` field is not set, or set to `Issuer`, an Issuer resource with the given name in the same namespace as the CertificateRequest will be used. If the `kind` field is set to `ClusterIssuer`, a ClusterIssuer with the provided name will be used. The `name` field in this stanza is required at all times. The group field refers to the API group of the issuer which defaults to `cert-manager.io` if empty."
properties:
group:
description: Group of the resource being referred to.
type: string
kind:
description: Kind of the resource being referred to.
type: string
name:
description: Name of the resource being referred to.
type: string
required:
- name
type: object
request:
description: The PEM-encoded x509 certificate signing request to be submitted to the CA for signing.
format: byte
type: string
uid:
description: UID contains the uid of the user that created the CertificateRequest. Populated by the cert-manager webhook on creation and immutable.
type: string
usages:
description: "Usages is the set of x509 usages that are requested for the certificate. Defaults to `digital signature` and `key encipherment` if not specified."
items:
description: "KeyUsage specifies valid usage contexts for keys. See: https://tools.ietf.org/html/rfc5280#section-4.2.1.3 https://tools.ietf.org/html/rfc5280#section-4.2.1.12 Valid KeyUsage values are as follows: \"signing\", \"digital signature\", \"content commitment\", \"key encipherment\", \"key agreement\", \"data encipherment\", \"cert sign\", \"crl sign\", \"encipher only\", \"decipher only\", \"any\", \"server auth\", \"client auth\", \"code signing\", \"email protection\", \"s/mime\", \"ipsec end system\", \"ipsec tunnel\", \"ipsec user\", \"timestamping\", \"ocsp signing\", \"microsoft sgc\", \"netscape sgc\""
enum:
- signing
- digital signature
- content commitment
- key encipherment
- key agreement
- data encipherment
- cert sign
- crl sign
- encipher only
- decipher only
- any
- server auth
- client auth
- code signing
- email protection
- s/mime
- ipsec end system
- ipsec tunnel
- ipsec user
- timestamping
- ocsp signing
- microsoft sgc
- netscape sgc
type: string
type: array
username:
description: Username contains the name of the user that created the CertificateRequest. Populated by the cert-manager webhook on creation and immutable.
type: string
required:
- issuerRef
- request
type: object
status:
description: Status of the CertificateRequest. This is set and managed automatically.
properties:
ca:
description: "The PEM encoded x509 certificate of the signer, also known as the CA (Certificate Authority). This is set on a best-effort basis by different issuers. If not set, the CA is assumed to be unknown/not available."
format: byte
type: string
certificate:
description: "The PEM encoded x509 certificate resulting from the certificate signing request. If not set, the CertificateRequest has either not been completed or has failed. More information on failure can be found by checking the `conditions` field."
format: byte
type: string
conditions:
description: "List of status conditions to indicate the status of a CertificateRequest. Known condition types are `Ready` and `InvalidRequest`."
items:
description: CertificateRequestCondition contains condition information for a CertificateRequest.
properties:
lastTransitionTime:
description: LastTransitionTime is the timestamp corresponding to the last status change of this condition.
format: date-time
type: string
message:
description: "Message is a human readable description of the details of the last transition, complementing reason."
type: string
reason:
description: "Reason is a brief machine readable explanation for the condition's last transition."
type: string
status:
description: "Status of the condition, one of (`True`, `False`, `Unknown`)."
enum:
- "True"
- "False"
- Unknown
type: string
type:
description: "Type of the condition, known values are (`Ready`, `InvalidRequest`, `Approved`, `Denied`)."
type: string
required:
- status
- type
type: object
type: array
failureTime:
description: FailureTime stores the time that this CertificateRequest failed. This is used to influence garbage collection and back-off.
format: date-time
type: string
type: object
required:
- spec
type: object
served: true
storage: false
subresources:
status: {}
- additionalPrinterColumns:
- jsonPath: ".status.conditions[?(@.type==\"Approved\")].status"
name: Approved
type: string
- jsonPath: ".status.conditions[?(@.type==\"Denied\")].status"
name: Denied
type: string
- jsonPath: ".status.conditions[?(@.type==\"Ready\")].status"
name: Ready
type: string
- jsonPath: ".spec.issuerRef.name"
name: Issuer
type: string
- jsonPath: ".spec.username"
name: Requestor
type: string
- jsonPath: ".status.conditions[?(@.type==\"Ready\")].message"
name: Status
priority: 1
type: string
- description: CreationTimestamp is a timestamp representing the server time when this object was created. It is not guaranteed to be set in happens-before order across separate operations. Clients may not set this value. It is represented in RFC3339 form and is in UTC.
jsonPath: ".metadata.creationTimestamp"
name: Age
type: date
name: v1
schema:
openAPIV3Schema:
description: "A CertificateRequest is used to request a signed certificate from one of the configured issuers. \n All fields within the CertificateRequest's `spec` are immutable after creation. A CertificateRequest will either succeed or fail, as denoted by its `status.state` field. \n A CertificateRequest is a one-shot resource, meaning it represents a single point in time request for a certificate and cannot be re-used."
properties:
apiVersion:
description: "APIVersion defines the versioned schema of this representation of an object. Servers should convert recognized schemas to the latest internal value, and may reject unrecognized values. More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#resources"
type: string
kind:
description: "Kind is a string value representing the REST resource this object represents. Servers may infer this from the endpoint the client submits requests to. Cannot be updated. In CamelCase. More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#types-kinds"
type: string
metadata:
type: object
spec:
description: Desired state of the CertificateRequest resource.
properties:
duration:
description: "The requested 'duration' (i.e. lifetime) of the Certificate. This option may be ignored/overridden by some issuer types."
type: string
extra:
additionalProperties:
items:
type: string
type: array
description: Extra contains extra attributes of the user that created the CertificateRequest. Populated by the cert-manager webhook on creation and immutable.
type: object
groups:
description: Groups contains group membership of the user that created the CertificateRequest. Populated by the cert-manager webhook on creation and immutable.
items:
type: string
type: array
x-kubernetes-list-type: atomic
isCA:
description: "IsCA will request to mark the certificate as valid for certificate signing when submitting to the issuer. This will automatically add the `cert sign` usage to the list of `usages`."
type: boolean
issuerRef:
description: "IssuerRef is a reference to the issuer for this CertificateRequest. If the `kind` field is not set, or set to `Issuer`, an Issuer resource with the given name in the same namespace as the CertificateRequest will be used. If the `kind` field is set to `ClusterIssuer`, a ClusterIssuer with the provided name will be used. The `name` field in this stanza is required at all times. The group field refers to the API group of the issuer which defaults to `cert-manager.io` if empty."
properties:
group:
description: Group of the resource being referred to.
type: string
kind:
description: Kind of the resource being referred to.
type: string
name:
description: Name of the resource being referred to.
type: string
required:
- name
type: object
request:
description: The PEM-encoded x509 certificate signing request to be submitted to the CA for signing.
format: byte
type: string
uid:
description: UID contains the uid of the user that created the CertificateRequest. Populated by the cert-manager webhook on creation and immutable.
type: string
usages:
description: "Usages is the set of x509 usages that are requested for the certificate. If usages are set they SHOULD be encoded inside the CSR spec Defaults to `digital signature` and `key encipherment` if not specified."
items:
description: "KeyUsage specifies valid usage contexts for keys. See: https://tools.ietf.org/html/rfc5280#section-4.2.1.3 https://tools.ietf.org/html/rfc5280#section-4.2.1.12 Valid KeyUsage values are as follows: \"signing\", \"digital signature\", \"content commitment\", \"key encipherment\", \"key agreement\", \"data encipherment\", \"cert sign\", \"crl sign\", \"encipher only\", \"decipher only\", \"any\", \"server auth\", \"client auth\", \"code signing\", \"email protection\", \"s/mime\", \"ipsec end system\", \"ipsec tunnel\", \"ipsec user\", \"timestamping\", \"ocsp signing\", \"microsoft sgc\", \"netscape sgc\""
enum:
- signing
- digital signature
- content commitment
- key encipherment
- key agreement
- data encipherment
- cert sign
- crl sign
- encipher only
- decipher only
- any
- server auth
- client auth
- code signing
- email protection
- s/mime
- ipsec end system
- ipsec tunnel
- ipsec user
- timestamping
- ocsp signing
- microsoft sgc
- netscape sgc
type: string
type: array
username:
description: Username contains the name of the user that created the CertificateRequest. Populated by the cert-manager webhook on creation and immutable.
type: string
required:
- issuerRef
- request
type: object
status:
description: Status of the CertificateRequest. This is set and managed automatically.
properties:
ca:
description: "The PEM encoded x509 certificate of the signer, also known as the CA (Certificate Authority). This is set on a best-effort basis by different issuers. If not set, the CA is assumed to be unknown/not available."
format: byte
type: string
certificate:
description: "The PEM encoded x509 certificate resulting from the certificate signing request. If not set, the CertificateRequest has either not been completed or has failed. More information on failure can be found by checking the `conditions` field."
format: byte
type: string
conditions:
description: "List of status conditions to indicate the status of a CertificateRequest. Known condition types are `Ready` and `InvalidRequest`."
items:
description: CertificateRequestCondition contains condition information for a CertificateRequest.
properties:
lastTransitionTime:
description: LastTransitionTime is the timestamp corresponding to the last status change of this condition.
format: date-time
type: string
message:
description: "Message is a human readable description of the details of the last transition, complementing reason."
type: string
reason:
description: "Reason is a brief machine readable explanation for the condition's last transition."
type: string
status:
description: "Status of the condition, one of (`True`, `False`, `Unknown`)."
enum:
- "True"
- "False"
- Unknown
type: string
type:
description: "Type of the condition, known values are (`Ready`, `InvalidRequest`, `Approved`, `Denied`)."
type: string
required:
- status
- type
type: object
type: array
failureTime:
description: FailureTime stores the time that this CertificateRequest failed. This is used to influence garbage collection and back-off.
format: date-time
type: string
type: object
required:
- spec
type: object
served: true
storage: true
subresources:
status: {}
status:
acceptedNames:
kind: ""
plural: ""
conditions: []
storedVersions: [] | 58.015235 | 651 | 0.561582 |
79269638063956003132ac2f090dfd5ef3d774bf | 298 | yaml | YAML | examples/simple/job2.yaml | Akiros001/k8s-AppController | c55ce0588dbd96679637ab0c07f3889c6c29be2c | [
"Apache-2.0"
] | 233 | 2016-08-02T13:29:31.000Z | 2022-03-25T13:51:52.000Z | examples/simple/job2.yaml | Akiros001/k8s-AppController | c55ce0588dbd96679637ab0c07f3889c6c29be2c | [
"Apache-2.0"
] | 233 | 2016-08-05T12:50:44.000Z | 2018-10-17T13:31:42.000Z | examples/simple/job2.yaml | Akiros001/k8s-AppController | c55ce0588dbd96679637ab0c07f3889c6c29be2c | [
"Apache-2.0"
] | 41 | 2016-08-16T10:11:56.000Z | 2021-11-27T17:54:25.000Z | apiVersion: batch/v1
kind: Job
metadata:
name: test-job2
spec:
template:
metadata:
name: test-job2
spec:
containers:
- name: test-container
image: gcr.io/google_containers/busybox
command: [ "/bin/sh", "-c", "sleep 20; env"]
restartPolicy: Never
| 19.866667 | 52 | 0.610738 |
7926dbff539d69c1b4347960ad7715e04763938a | 371 | yaml | YAML | apps/frontend/hpa.yaml | therealmitchconnors/gitops-istio | 1d63130b275d470083315266223a421a9f2b1331 | [
"Apache-2.0"
] | null | null | null | apps/frontend/hpa.yaml | therealmitchconnors/gitops-istio | 1d63130b275d470083315266223a421a9f2b1331 | [
"Apache-2.0"
] | 1 | 2021-11-30T21:30:28.000Z | 2021-11-30T21:30:28.000Z | apps/frontend/hpa.yaml | therealmitchconnors/gitops-istio | 1d63130b275d470083315266223a421a9f2b1331 | [
"Apache-2.0"
] | null | null | null | apiVersion: autoscaling/v2beta2
kind: HorizontalPodAutoscaler
metadata:
name: frontend
namespace: prod
spec:
scaleTargetRef:
apiVersion: apps/v1
kind: Deployment
name: frontend
minReplicas: 1
maxReplicas: 4
metrics:
- type: Resource
resource:
name: cpu
target:
type: Utilization
averageUtilization: 99 | 19.526316 | 32 | 0.665768 |
7927061bd25ed0f93154c087366fda17de9ce325 | 422 | yaml | YAML | Helm/rkm-outpost/templates/network-policy-default-deny-allow-dns.yaml | andiexer/rkm | fc18b44c0e9d7c30e8626b8ac035c964310d9ecd | [
"Apache-2.0"
] | 5 | 2020-03-29T13:02:08.000Z | 2020-09-07T10:02:03.000Z | Helm/rkm-outpost/templates/network-policy-default-deny-allow-dns.yaml | andiexer/rkm | fc18b44c0e9d7c30e8626b8ac035c964310d9ecd | [
"Apache-2.0"
] | 6 | 2020-03-29T13:06:37.000Z | 2020-07-19T15:34:47.000Z | Helm/rkm-outpost/templates/network-policy-default-deny-allow-dns.yaml | andiexer/rkm | fc18b44c0e9d7c30e8626b8ac035c964310d9ecd | [
"Apache-2.0"
] | 1 | 2020-04-02T08:56:28.000Z | 2020-04-02T08:56:28.000Z | ---
apiVersion: networking.k8s.io/v1
kind: NetworkPolicy
metadata:
name: netpol-default-deny-allow-dns
spec:
podSelector:
matchLabels: {}
policyTypes:
- Ingress
- Egress
egress:
- to:
- namespaceSelector:
matchLabels:
name: kube-system
podSelector:
matchLabels:
name: kube-dns
- ports:
- protocol: TCP
port: 53
- protocol: UDP
port: 53 | 17.583333 | 37 | 0.599526 |
792717f44a37550e47f8f826aabbbc5eff5b77af | 16,042 | yaml | YAML | config/300-azureeventhubsource.yaml | angie1148/triggermesh | b8b9d9bf6605835c92dc9b9b0fca36bca9c661bb | [
"Apache-2.0"
] | 2 | 2022-02-04T15:50:07.000Z | 2022-03-29T18:51:06.000Z | config/300-azureeventhubsource.yaml | angie1148/triggermesh | b8b9d9bf6605835c92dc9b9b0fca36bca9c661bb | [
"Apache-2.0"
] | 1 | 2022-03-18T09:52:12.000Z | 2022-03-18T09:52:12.000Z | config/300-azureeventhubsource.yaml | angie1148/triggermesh | b8b9d9bf6605835c92dc9b9b0fca36bca9c661bb | [
"Apache-2.0"
] | null | null | null | # Copyright 2022 TriggerMesh Inc.
#
# Licensed under the Apache License, Version 2.0 (the "License");
# you may not use this file except in compliance with the License.
# You may obtain a copy of the License at
#
# http://www.apache.org/licenses/LICENSE-2.0
#
# Unless required by applicable law or agreed to in writing, software
# distributed under the License is distributed on an "AS IS" BASIS,
# WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
# See the License for the specific language governing permissions and
# limitations under the License.
apiVersion: apiextensions.k8s.io/v1
kind: CustomResourceDefinition
metadata:
name: azureeventhubsources.sources.triggermesh.io
labels:
eventing.knative.dev/source: 'true'
duck.knative.dev/source: 'true'
knative.dev/crd-install: 'true'
triggermesh.io/crd-install: 'true'
annotations:
registry.knative.dev/eventTypes: |
[
{ "type": "com.azure.eventhub.event" }
]
spec:
group: sources.triggermesh.io
scope: Namespaced
names:
kind: AzureEventHubSource
plural: azureeventhubsources
categories:
- all
- knative
- eventing
- sources
versions:
- name: v1alpha1
served: true
storage: true
subresources:
status: {}
schema:
openAPIV3Schema:
description: TriggerMesh event source for Azure Event Hubs.
type: object
properties:
spec:
description: Desired state of the event source.
type: object
properties:
adapterOverrides:
description: Kubernetes object parameters to apply on top of default adapter values.
type: object
properties:
resources:
description: 'Compute Resources required by the adapter. More info:
https://kubernetes.io/docs/concepts/configuration/manage-resources-containers/'
type: object
properties:
limits:
additionalProperties:
anyOf:
- type: integer
- type: string
pattern: ^(\+|-)?(([0-9]+(\.[0-9]*)?)|(\.[0-9]+))(([KMGTPE]i)|[numkMGTPE]|([eE](\+|-)?(([0-9]+(\.[0-9]*)?)|(\.[0-9]+))))?$
x-kubernetes-int-or-string: true
description: 'Limits describes the maximum amount of compute resources allowed. More info:
https://kubernetes.io/docs/concepts/configuration/manage-resources-containers/'
type: object
requests:
additionalProperties:
anyOf:
- type: integer
- type: string
pattern: ^(\+|-)?(([0-9]+(\.[0-9]*)?)|(\.[0-9]+))(([KMGTPE]i)|[numkMGTPE]|([eE](\+|-)?(([0-9]+(\.[0-9]*)?)|(\.[0-9]+))))?$
x-kubernetes-int-or-string: true
description: 'Requests describes the minimum amount of compute resources required.
If Requests is omitted for a container, it defaults to Limits if that is explicitly
specified, otherwise to an implementation-defined value. More info:
https://kubernetes.io/docs/concepts/configuration/manage-resources-containers/'
type: object
tolerations:
description: Pod tolerations, as documented at
https://kubernetes.io/docs/concepts/scheduling-eviction/taint-and-toleration/
type: array
items:
type: object
properties:
key:
description: Taint key that the toleration applies to.
type: string
operator:
description: Key's relationship to the value.
type: string
enum: [Exists, Equal]
value:
description: Taint value the toleration matches to.
type: string
effect:
description: Taint effect to match.
type: string
enum: [NoSchedule, PreferNoSchedule, NoExecute]
tolerationSeconds:
description: Period of time a toleration of effect NoExecute tolerates the taint.
type: integer
format: int64
eventHubID:
description: |-
Resource ID of the Event Hubs instance.
The expected format is
/subscriptions/{subscriptionId}/resourceGroups/{resourceGroupName}/providers/Microsoft.EventHub/namespaces/{namespaceName}/eventhubs/{eventHubName}
type: string
pattern: ^\/subscriptions\/[a-z0-9-]+\/resourceGroups\/[\w.()-]+\/providers\/Microsoft.EventHub\/namespaces\/[A-Za-z0-9-]{6,50}\/event[Hh]ubs\/[a-zA-Z0-9][\w.-]{0,49}$
auth:
description: Authentication method to interact with the Azure Event Hubs REST API.
type: object
properties:
sasToken:
description: An Azure shared access signature (SAS) token. For more information about SAS tokens,
please refer to the Azure Storage documentation at
https://docs.microsoft.com/en-us/azure/storage/common/storage-sas-overview.
type: object
properties:
keyName:
description: Name of the key used by the SAS token. Mutually exclusive with 'connectionString'.
type: object
properties:
value:
description: Literal name of the key.
type: string
valueFromSecret:
description: A reference to a Kubernetes Secret object containing the key's name.
type: object
properties:
name:
type: string
key:
type: string
required:
- name
- key
oneOf:
- required: [value]
- required: [valueFromSecret]
keyValue:
description: Value of the key used by the SAS token. Mutually exclusive with 'connectionString'.
type: object
properties:
value:
description: Literal value of the key.
type: string
valueFromSecret:
description: A reference to a Kubernetes Secret object containing the key's value.
type: object
properties:
name:
type: string
key:
type: string
required:
- name
- key
oneOf:
- required: [value]
- required: [valueFromSecret]
connectionString:
description: Connection string containing both the resource URI of the Event Hubs instance, and
the SAS token. Mutually exclusive with 'keyName' and 'keyValue'.
type: object
properties:
value:
description: Literal value of the connection string.
type: string
valueFromSecret:
description: A reference to a Kubernetes Secret object containing the connection string.
type: object
properties:
name:
type: string
key:
type: string
required:
- name
- key
oneOf:
- required: [value]
- required: [valueFromSecret]
oneOf:
- required:
- keyName
- keyValue
- required:
- connectionString
servicePrincipal:
description: Credentials of an Azure Service Principal. For more information about service
principals, please refer to the Azure Active Directory documentation at
https://docs.microsoft.com/en-us/azure/active-directory/develop/app-objects-and-service-principals.
type: object
properties:
tenantID:
description: ID of the Azure Active Directory tenant.
type: object
properties:
value:
description: Literal value of the tenant ID.
type: string
format: guid
pattern: ^[0-9A-Fa-f]{8}(?:-[0-9A-Fa-f]{4}){3}-[0-9A-Fa-f]{12}$
valueFromSecret:
description: A reference to a Kubernetes Secret object containing the tenant ID.
type: object
properties:
name:
type: string
key:
type: string
required:
- name
- key
oneOf:
- required: [value]
- required: [valueFromSecret]
clientID:
description: ID of the registered client/application.
type: object
properties:
value:
description: Literal value of the client ID.
type: string
format: guid
pattern: ^[0-9A-Fa-f]{8}(?:-[0-9A-Fa-f]{4}){3}-[0-9A-Fa-f]{12}$
valueFromSecret:
description: A reference to a Kubernetes Secret object containing the client ID.
type: object
properties:
name:
type: string
key:
type: string
required:
- name
- key
oneOf:
- required: [value]
- required: [valueFromSecret]
clientSecret:
description: Secret associated with the registered client/application.
type: object
properties:
value:
description: Literal value of the client secret.
type: string
format: password
valueFromSecret:
description: A reference to a Kubernetes Secret object containing the client secret.
type: object
properties:
name:
type: string
key:
type: string
required:
- name
- key
oneOf:
- required: [value]
- required: [valueFromSecret]
required:
- tenantID
- clientID
- clientSecret
oneOf:
- required: [sasToken]
- required: [servicePrincipal]
sink:
description: The destination of events sourced from Azure Event Hubs.
type: object
properties:
ref:
description: Reference to an addressable Kubernetes object to be used as the destination of events.
type: object
properties:
apiVersion:
type: string
kind:
type: string
namespace:
type: string
name:
type: string
required:
- apiVersion
- kind
- name
uri:
description: URI to use as the destination of events.
type: string
format: uri
oneOf:
- required: [ref]
- required: [uri]
required:
- eventHubID
- auth
- sink
status:
description: Reported status of the event source.
type: object
properties:
sinkUri:
description: URI of the sink where events are currently sent to.
type: string
format: uri
ceAttributes:
type: array
items:
type: object
properties:
type:
type: string
source:
type: string
required:
- type
- source
observedGeneration:
type: integer
format: int64
conditions:
type: array
items:
type: object
properties:
type:
type: string
status:
type: string
enum: ['True', 'False', Unknown]
severity:
type: string
enum: [Error, Warning, Info]
reason:
type: string
message:
type: string
lastTransitionTime:
type: string
format: date-time
required:
- type
- status
additionalPrinterColumns:
- name: Ready
type: string
jsonPath: .status.conditions[?(@.type=='Ready')].status
- name: Reason
type: string
jsonPath: .status.conditions[?(@.type=='Ready')].reason
- name: Sink
type: string
jsonPath: .status.sinkUri
- name: Age
type: date
jsonPath: .metadata.creationTimestamp
| 43.356757 | 183 | 0.423077 |
79280a2009001e4b16ea019ee0cc82b79d9f9a4e | 1,025 | yaml | YAML | k8s/mks-config/service.yaml | MiniTeks/mks | c054a2343f1e20e1a181c1501aeb73b19b457121 | [
"Apache-2.0"
] | 10 | 2022-01-25T09:37:54.000Z | 2022-03-12T12:39:45.000Z | k8s/mks-config/service.yaml | MiniTeks/mks | c054a2343f1e20e1a181c1501aeb73b19b457121 | [
"Apache-2.0"
] | 22 | 2022-01-30T13:10:39.000Z | 2022-03-01T12:40:13.000Z | k8s/mks-config/service.yaml | MiniTeks/mks | c054a2343f1e20e1a181c1501aeb73b19b457121 | [
"Apache-2.0"
] | 1 | 2022-02-20T06:29:40.000Z | 2022-02-20T06:29:40.000Z | # SPDX-License-Identifier: Apache-2.0
# SPDX-FileCopyrightText: 2022 Satyam Bhardwaj <[email protected]>
# SPDX-FileCopyrightText: 2022 Utkarsh Chaurasia <[email protected]>
# SPDX-FileCopyrightText: 2022 Avinal Kumar <[email protected]>
# Licensed under the Apache License, Version 2.0 (the "License");
# you may not use this file except in compliance with the License.
# You may obtain a copy of the License at
# http://www.apache.org/licenses/LICENSE-2.0
# Unless required by applicable law or agreed to in writing, software
# distributed under the License is distributed on an "AS IS" BASIS,
# WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
# See the License for the specific language governing permissions and
# limitations under the License.
apiVersion: v1
kind: Service
metadata:
name: mks-server
namespace: mks
spec:
selector:
app: mks-server
externalIPs:
- "1.2.4.120"
ports:
- name: mks-server
port: 4000
targetPort: 4000
status:
loadBalancer: {} | 31.060606 | 74 | 0.748293 |
792816bd7eb7a43cabaa20a9c029e7df000f126b | 146 | yaml | YAML | overlays/development-monitoring/ops/bbb-basic-auth-secret.yaml | willokay/jitsi-deployment | 1ffcaa0f64d7d157861156e406602deacd13a2b5 | [
"MIT"
] | null | null | null | overlays/development-monitoring/ops/bbb-basic-auth-secret.yaml | willokay/jitsi-deployment | 1ffcaa0f64d7d157861156e406602deacd13a2b5 | [
"MIT"
] | null | null | null | overlays/development-monitoring/ops/bbb-basic-auth-secret.yaml | willokay/jitsi-deployment | 1ffcaa0f64d7d157861156e406602deacd13a2b5 | [
"MIT"
] | null | null | null | apiVersion: v1
kind: Secret
metadata:
namespace: monitoring
name: bbb-basic-auth
data:
username: ZXVkaQ==
password: Q29taWNW
type: Opaque
| 14.6 | 23 | 0.746575 |
79281ca7cef7366788f748f05384b660911c61cb | 193 | yml | YAML | infra/k8s/depot/internal/service.prod.yml | skeswa/gophr | e811c582b32b7fd3ec5915d1b91e28c81e47d8cd | [
"Apache-2.0"
] | 19 | 2016-03-12T19:47:43.000Z | 2016-09-28T15:48:31.000Z | infra/k8s/depot/internal/service.prod.yml | skeswa/gophr | e811c582b32b7fd3ec5915d1b91e28c81e47d8cd | [
"Apache-2.0"
] | 126 | 2016-03-29T18:28:12.000Z | 2016-09-29T03:29:45.000Z | infra/k8s/depot/internal/service.prod.yml | gophr-pm/gophr | e811c582b32b7fd3ec5915d1b91e28c81e47d8cd | [
"Apache-2.0"
] | 2 | 2016-11-01T03:04:07.000Z | 2016-11-22T06:35:36.000Z | apiVersion: v1
kind: Service
metadata:
name: depot-int-svc
labels:
module: depot-int
namespace: gophr
spec:
ports:
- name: http
port: 80
selector:
module: depot-int
| 13.785714 | 21 | 0.647668 |
7928203c9c17c166d513417355f36c268b41e7a9 | 1,157 | yaml | YAML | cluster/addons/dashboard/dashboard-controller.yaml | ibotty/kubernetes | e58788be6da4b89b318b1b8760f1110b39e47b19 | [
"Apache-2.0"
] | null | null | null | cluster/addons/dashboard/dashboard-controller.yaml | ibotty/kubernetes | e58788be6da4b89b318b1b8760f1110b39e47b19 | [
"Apache-2.0"
] | null | null | null | cluster/addons/dashboard/dashboard-controller.yaml | ibotty/kubernetes | e58788be6da4b89b318b1b8760f1110b39e47b19 | [
"Apache-2.0"
] | null | null | null | # This file should be kept in sync with cluster/images/hyperkube/dashboard-rc.yaml
# and cluster/gce/coreos/kube-manifests/addons/dashboard/dashboard-controller.yaml
apiVersion: v1
kind: ReplicationController
metadata:
name: kubernetes-dashboard-v1.0.1
namespace: kube-system
labels:
k8s-app: kubernetes-dashboard
version: v1.0.1
kubernetes.io/cluster-service: "true"
spec:
replicas: 1
selector:
k8s-app: kubernetes-dashboard
template:
metadata:
labels:
k8s-app: kubernetes-dashboard
version: v1.0.1
kubernetes.io/cluster-service: "true"
spec:
containers:
- name: kubernetes-dashboard
image: gcr.io/google_containers/kubernetes-dashboard-amd64:v1.0.1
resources:
# keep request = limit to keep this container in guaranteed class
limits:
cpu: 100m
memory: 50Mi
requests:
cpu: 100m
memory: 50Mi
ports:
- containerPort: 9090
livenessProbe:
httpGet:
path: /
port: 9090
initialDelaySeconds: 30
timeoutSeconds: 30
| 27.547619 | 82 | 0.627485 |
7928ec4dd79a858a89df5625de938b0b4149c9ec | 963 | yaml | YAML | pkg/addons/data/ClusterRole.rbac.authorization.k8s.io/system-controller-disruption-controller.yaml | openshift-cherrypick-robot/openshift-azure | a75d167bd88bb88366f1e7cb137de4e57496a176 | [
"Apache-2.0"
] | null | null | null | pkg/addons/data/ClusterRole.rbac.authorization.k8s.io/system-controller-disruption-controller.yaml | openshift-cherrypick-robot/openshift-azure | a75d167bd88bb88366f1e7cb137de4e57496a176 | [
"Apache-2.0"
] | null | null | null | pkg/addons/data/ClusterRole.rbac.authorization.k8s.io/system-controller-disruption-controller.yaml | openshift-cherrypick-robot/openshift-azure | a75d167bd88bb88366f1e7cb137de4e57496a176 | [
"Apache-2.0"
] | null | null | null | apiVersion: rbac.authorization.k8s.io/v1
kind: ClusterRole
metadata:
annotations:
authorization.openshift.io/system-only: "true"
rbac.authorization.kubernetes.io/autoupdate: "true"
labels:
kubernetes.io/bootstrapping: rbac-defaults
name: system:controller:disruption-controller
rules:
- apiGroups:
- apps
- extensions
resources:
- deployments
verbs:
- get
- list
- watch
- apiGroups:
- apps
- extensions
resources:
- replicasets
verbs:
- get
- list
- watch
- apiGroups:
- ""
resources:
- replicationcontrollers
verbs:
- get
- list
- watch
- apiGroups:
- policy
resources:
- poddisruptionbudgets
verbs:
- get
- list
- watch
- apiGroups:
- apps
resources:
- statefulsets
verbs:
- get
- list
- watch
- apiGroups:
- policy
resources:
- poddisruptionbudgets/status
verbs:
- update
- apiGroups:
- ""
resources:
- events
verbs:
- create
- patch
- update
| 14.373134 | 55 | 0.657321 |
792938ef4de8b97551721e139bcfb27f9c37306c | 1,593 | yaml | YAML | manifests-k8s/0013_deployment_special-resource-controller-manager.yaml | rmr-silicom/special-resource-operator | 6faf0b12578eafe485b224b5b1d10d21b5d7b764 | [
"Apache-2.0"
] | 19 | 2019-09-27T15:43:54.000Z | 2021-11-13T13:44:58.000Z | manifests-k8s/0013_deployment_special-resource-controller-manager.yaml | rmr-silicom/special-resource-operator | 6faf0b12578eafe485b224b5b1d10d21b5d7b764 | [
"Apache-2.0"
] | 309 | 2020-01-31T13:21:31.000Z | 2022-03-31T10:44:10.000Z | manifests-k8s/0013_deployment_special-resource-controller-manager.yaml | rmr-silicom/special-resource-operator | 6faf0b12578eafe485b224b5b1d10d21b5d7b764 | [
"Apache-2.0"
] | 34 | 2020-11-09T14:26:53.000Z | 2022-03-27T17:24:37.000Z | apiVersion: apps/v1
kind: Deployment
metadata:
labels:
control-plane: controller-manager
name: special-resource-controller-manager
namespace: openshift-special-resource-operator
spec:
replicas: 1
selector:
matchLabels:
control-plane: controller-manager
template:
metadata:
labels:
control-plane: controller-manager
spec:
containers:
- args:
- --enable-leader-election
command:
- /manager
env:
- name: OPERATOR_NAMESPACE
valueFrom:
fieldRef:
fieldPath: metadata.namespace
- name: RELEASE_VERSION
value: 0.0.1-snapshot
- name: SSL_CERT_DIR
value: /etc/pki/tls/certs
image: quay.io/openshift-psap/special-resource-operator:operator-sdk-version
imagePullPolicy: Always
name: manager
resources:
limits:
cpu: 300m
memory: 500Mi
requests:
cpu: 300m
memory: 500Mi
securityContext:
allowPrivilegeEscalation: false
readOnlyRootFilesystem: true
volumeMounts:
- mountPath: /cache
name: cache-volume
- mountPath: /home/nonroot/.docker
name: cred-volume
securityContext:
runAsGroup: 499
runAsNonRoot: true
runAsUser: 499
serviceAccountName: special-resource-controller-manager
terminationGracePeriodSeconds: 10
volumes:
- emptyDir: {}
name: cache-volume
- emptyDir: {}
name: cred-volume
| 26.114754 | 84 | 0.595104 |
79294ef9209c9940c88bee45e364d44a73667036 | 18,578 | yaml | YAML | k8s/graphite-configmap.yaml | michal-franc/screeps-grafana | 3960273d0845ce772eb8544af99f17eff6a51b31 | [
"MIT"
] | null | null | null | k8s/graphite-configmap.yaml | michal-franc/screeps-grafana | 3960273d0845ce772eb8544af99f17eff6a51b31 | [
"MIT"
] | null | null | null | k8s/graphite-configmap.yaml | michal-franc/screeps-grafana | 3960273d0845ce772eb8544af99f17eff6a51b31 | [
"MIT"
] | 1 | 2021-10-31T21:03:54.000Z | 2021-10-31T21:03:54.000Z | apiVersion: v1
kind: ConfigMap
metadata:
name: graphite-config
namespace: screeps
data:
carbon.conf: "[cache]\n# Configure carbon directories.\n#\n# OS environment variables
can be used to tell carbon where graphite is\n# installed, where to read configuration
from and where to write data.\n#\n# GRAPHITE_ROOT - Root directory of
the graphite installation.\n# Defaults to ../\n# GRAPHITE_CONF_DIR
\ - Configuration directory (where this file lives).\n# Defaults
to $GRAPHITE_ROOT/conf/\n# GRAPHITE_STORAGE_DIR - Storage directory for whipser/rrd/log/pid
files.\n# Defaults to $GRAPHITE_ROOT/storage/\n#\n# To
change other directory paths, add settings to this file. The following\n# configuration
variables are available with these default values:\n#\n\n# STORAGE_DIR = /opt/graphite/storage/whisper/\n#
CONF_DIR = /opt/graphite/conf/\n# LOG_DIR = /opt/graphite/storage/log/\n#
PID_DIR = /var/run/\n\nLOCAL_DATA_DIR = /opt/graphite/storage/whisper/\n\n#
Enable daily log rotation. If disabled, a kill -HUP can be used after a manual
rotate\nENABLE_LOGROTATION = True\n\n# Specify the user to drop privileges to\n#
If this is blank carbon runs as the user that invokes it\n# This user must have
write access to the local data directory\nUSER =\n#\n# NOTE: The above settings
must be set under [relay] and [aggregator]\n# to take effect for those daemons
as well\n\n# Limit the size of the cache to avoid swapping or becoming CPU bound.\n#
Sorts and serving cache queries gets more expensive as the cache grows.\n# Use
the value \"inf\" (infinity) for an unlimited cache size.\nMAX_CACHE_SIZE = inf\n\n#
Limits the number of whisper update_many() calls per second, which effectively\n#
means the number of write requests sent to the disk. This is intended to\n# prevent
over-utilizing the disk and thus starving the rest of the system.\n# When the
rate of required updates exceeds this, then carbon's caching will\n# take effect
and increase the overall throughput accordingly.\nMAX_UPDATES_PER_SECOND = 500\n\n#
If defined, this changes the MAX_UPDATES_PER_SECOND in Carbon when a\n# stop/shutdown
is initiated. This helps when MAX_UPDATES_PER_SECOND is\n# relatively low and
carbon has cached a lot of updates; it enables the carbon\n# daemon to shutdown
more quickly. \n# MAX_UPDATES_PER_SECOND_ON_SHUTDOWN = 1000\n\n# Softly limits
the number of whisper files that get created each minute.\n# Setting this value
low (like at 50) is a good way to ensure your graphite\n# system will not be adversely
impacted when a bunch of new metrics are\n# sent to it. The trade off is that
it will take much longer for those metrics'\n# database files to all get created
and thus longer until the data becomes usable.\n# Setting this value high (like
\"inf\" for infinity) will cause graphite to create\n# the files quickly but at
the risk of slowing I/O down considerably for a while.\nMAX_CREATES_PER_MINUTE
= 50\n\nLINE_RECEIVER_INTERFACE = 0.0.0.0\nLINE_RECEIVER_PORT = 2003\n\n# Set
this to True to enable the UDP listener. By default this is off\n# because it
is very common to run multiple carbon daemons and managing\n# another (rarely
used) port for every carbon instance is not fun.\nENABLE_UDP_LISTENER = True\nUDP_RECEIVER_INTERFACE
= 0.0.0.0\nUDP_RECEIVER_PORT = 2003\n\nPICKLE_RECEIVER_INTERFACE = 0.0.0.0\nPICKLE_RECEIVER_PORT
= 2004\n\n# Set to false to disable logging of successful connections\nLOG_LISTENER_CONNECTIONS
= False\n\n# Per security concerns outlined in Bug #817247 the pickle receiver\n#
will use a more secure and slightly less efficient unpickler.\n# Set this to True
to revert to the old-fashioned insecure unpickler.\nUSE_INSECURE_UNPICKLER = False\n\nCACHE_QUERY_INTERFACE
= 0.0.0.0\nCACHE_QUERY_PORT = 7002\n\n# Set this to False to drop datapoints received
after the cache\n# reaches MAX_CACHE_SIZE. If this is True (the default) then
sockets\n# over which metrics are received will temporarily stop accepting\n#
data until the cache size falls below 95% MAX_CACHE_SIZE.\nUSE_FLOW_CONTROL =
True\n\n# By default, carbon-cache will log every whisper update and cache hit.
This can be excessive and\n# degrade performance if logging on the same volume
as the whisper data is stored.\nLOG_UPDATES = False\nLOG_CACHE_HITS = False\nLOG_CACHE_QUEUE_SORTS
= True\n\n# The thread that writes metrics to disk can use on of the following
strategies\n# determining the order in which metrics are removed from cache and
flushed to\n# disk. The default option preserves the same behavior as has been
historically\n# available in version 0.9.10.\n#\n# sorted - All metrics in the
cache will be counted and an ordered list of\n# them will be sorted according
to the number of datapoints in the cache at the\n# moment of the list's creation.
Metrics will then be flushed from the cache to\n# disk in that order.\n#\n# max
- The writer thread will always pop and flush the metric from cache\n# that has
the most datapoints. This will give a strong flush preference to\n# frequently
updated metrics and will also reduce random file-io. Infrequently\n# updated metrics
may only ever be persisted to disk at daemon shutdown if\n# there are a large
number of metrics which receive very frequent updates OR if\n# disk i/o is very
slow.\n#\n# naive - Metrics will be flushed from the cache to disk in an unordered\n#
fashion. This strategy may be desirable in situations where the storage for\n#
whisper files is solid state, CPU resources are very limited or deference to\n#
the OS's i/o scheduler is expected to compensate for the random write\n# pattern.\n#\nCACHE_WRITE_STRATEGY
= sorted\n\n# On some systems it is desirable for whisper to write synchronously.\n#
Set this option to True if you'd like to try this. Basically it will\n# shift
the onus of buffering writes from the kernel into carbon's cache.\nWHISPER_AUTOFLUSH
= False\n\n# By default new Whisper files are created pre-allocated with the data
region\n# filled with zeros to prevent fragmentation and speed up contiguous reads
and\n# writes (which are common). Enabling this option will cause Whisper to create\n#
the file sparsely instead. Enabling this option may allow a large increase of\n#
MAX_CREATES_PER_MINUTE but may have longer term performance implications\n# depending
on the underlying storage configuration.\n# WHISPER_SPARSE_CREATE = False\n\n#
Only beneficial on linux filesystems that support the fallocate system call.\n#
It maintains the benefits of contiguous reads/writes, but with a potentially\n#
much faster creation speed, by allowing the kernel to handle the block\n# allocation
and zero-ing. Enabling this option may allow a large increase of\n# MAX_CREATES_PER_MINUTE.
If enabled on an OS or filesystem that is unsupported\n# this option will gracefully
fallback to standard POSIX file access methods.\nWHISPER_FALLOCATE_CREATE = False\n\n#
Enabling this option will cause Whisper to lock each Whisper file it writes\n#
to with an exclusive lock (LOCK_EX, see: man 2 flock). This is useful when\n#
multiple carbon-cache daemons are writing to the same files\n# WHISPER_LOCK_WRITES
= False\n\n# Set this to True to enable whitelisting and blacklisting of metrics
in\n# CONF_DIR/whitelist and CONF_DIR/blacklist. If the whitelist is missing or\n#
empty, all metrics will pass through\n# USE_WHITELIST = False\n\n# By default,
carbon itself will log statistics (such as a count,\n# metricsReceived) with the
top level prefix of 'carbon' at an interval of 60\n# seconds. Set CARBON_METRIC_INTERVAL
to 0 to disable instrumentation\n# CARBON_METRIC_PREFIX = carbon\n# CARBON_METRIC_INTERVAL
= 60\n\n# Enable AMQP if you want to receve metrics using an amqp broker\n# ENABLE_AMQP
= False\n\n# Verbose means a line will be logged for every metric received\n#
useful for testing\n# AMQP_VERBOSE = False\n\n# AMQP_HOST = localhost\n# AMQP_PORT
= 5672\n# AMQP_VHOST = /\n# AMQP_USER = guest\n# AMQP_PASSWORD = guest\n# AMQP_EXCHANGE
= graphite\n# AMQP_METRIC_NAME_IN_BODY = False\n\n# The manhole interface allows
you to SSH into the carbon daemon\n# and get a python interpreter. BE CAREFUL
WITH THIS! If you do\n# something like time.sleep() in the interpreter, the whole
process\n# will sleep! This is *extremely* helpful in debugging, assuming\n# you
are familiar with the code. If you are not, please don't\n# mess with this, you
are asking for trouble :)\n#\n# ENABLE_MANHOLE = False\n# MANHOLE_INTERFACE =
127.0.0.1\n# MANHOLE_PORT = 7222\n# MANHOLE_USER = admin\n# MANHOLE_PUBLIC_KEY
= ssh-rsa AAAAB3NzaC1yc2EAAAABiwAaAIEAoxN0sv/e4eZCPpi3N3KYvyzRaBaMeS2RsOQ/cDuKv11dlNzVeiyc3RFmCv5Rjwn/lQ79y0zyHxw67qLyhQ/kDzINc4cY41ivuQXm2tPmgvexdrBv5nsfEpjs3gLZfJnyvlcVyWK/lId8WUvEWSWHTzsbtmXAF2raJMdgLTbQ8wE=\n\n#
Patterns for all of the metrics this machine will store. Read more at\n# http://en.wikipedia.org/wiki/Advanced_Message_Queuing_Protocol#Bindings\n#\n#
Example: store all sales, linux servers, and utilization metrics\n# BIND_PATTERNS
= sales.#, servers.linux.#, #.utilization\n#\n# Example: store everything\n# BIND_PATTERNS
= #\n\n# To configure special settings for the carbon-cache instance 'b', uncomment
this:\n#[cache:b]\n#LINE_RECEIVER_PORT = 2103\n#PICKLE_RECEIVER_PORT = 2104\n#CACHE_QUERY_PORT
= 7102\n# and any other settings you want to customize, defaults are inherited\n#
from [carbon] section.\n# You can then specify the --instance=b option to manage
this instance\n\n\n\n[relay]\nLINE_RECEIVER_INTERFACE = 0.0.0.0\nLINE_RECEIVER_PORT
= 2013\nPICKLE_RECEIVER_INTERFACE = 0.0.0.0\nPICKLE_RECEIVER_PORT = 2014\nUDP_RECEIVER_INTERFACE
= 0.0.0.0\nUDP_RECEIVER_PORT = 2013\n\n\n# Set to false to disable logging of
successful connections\nLOG_LISTENER_CONNECTIONS = True\n\n# Carbon-relay has
several options for metric routing controlled by RELAY_METHOD\n#\n# Use relay-rules.conf
to route metrics to destinations based on pattern rules\n#RELAY_METHOD = rules\n#\n#
Use consistent-hashing for even distribution of metrics between destinations\n#RELAY_METHOD
= consistent-hashing\n#\n# Use consistent-hashing but take into account an aggregation-rules.conf
shared\n# by downstream carbon-aggregator daemons. This will ensure that all metrics\n#
that map to a given aggregation rule are sent to the same carbon-aggregator\n#
instance.\n# Enable this for carbon-relays that send to a group of carbon-aggregators\n#RELAY_METHOD
= aggregated-consistent-hashing\nRELAY_METHOD = rules\n\n# If you use consistent-hashing
you can add redundancy by replicating every\n# datapoint to more than one machine.\nREPLICATION_FACTOR
= 1\n\n# This is a list of carbon daemons we will send any relayed or\n# generated
metrics to. The default provided would send to a single\n# carbon-cache instance
on the default port. However if you\n# use multiple carbon-cache instances then
it would look like this:\n#\n# DESTINATIONS = 127.0.0.1:2004:a, 127.0.0.1:2104:b\n#\n#
The general form is IP:PORT:INSTANCE where the :INSTANCE part is\n# optional and
refers to the \"None\" instance if omitted.\n#\n# Note that if the destinations
are all carbon-caches then this should\n# exactly match the webapp's CARBONLINK_HOSTS
setting in terms of\n# instances listed (order matters!).\n#\n# If using RELAY_METHOD
= rules, all destinations used in relay-rules.conf\n# must be defined in this
list\nDESTINATIONS = 127.0.0.1:2004\n\n# This defines the maximum \"message size\"
between carbon daemons.\n# You shouldn't need to tune this unless you really know
what you're doing.\nMAX_DATAPOINTS_PER_MESSAGE = 500\nMAX_QUEUE_SIZE = 10000\n\n#
Set this to False to drop datapoints when any send queue (sending datapoints\n#
to a downstream carbon daemon) hits MAX_QUEUE_SIZE. If this is True (the\n# default)
then sockets over which metrics are received will temporarily stop accepting\n#
data until the send queues fall below 80% MAX_QUEUE_SIZE.\nUSE_FLOW_CONTROL =
True\n\n# Set this to True to enable whitelisting and blacklisting of metrics
in\n# CONF_DIR/whitelist and CONF_DIR/blacklist. If the whitelist is missing or\n#
empty, all metrics will pass through\n# USE_WHITELIST = False\n\n# By default,
carbon itself will log statistics (such as a count,\n# metricsReceived) with the
top level prefix of 'carbon' at an interval of 60\n# seconds. Set CARBON_METRIC_INTERVAL
to 0 to disable instrumentation\n# CARBON_METRIC_PREFIX = carbon\n# CARBON_METRIC_INTERVAL
= 60\n\n\n[aggregator]\nLINE_RECEIVER_INTERFACE = 0.0.0.0\nLINE_RECEIVER_PORT
= 2023\n\nPICKLE_RECEIVER_INTERFACE = 0.0.0.0\nPICKLE_RECEIVER_PORT = 2024\n\n#
Set to false to disable logging of successful connections\nLOG_LISTENER_CONNECTIONS
= False\n\n# If set true, metric received will be forwarded to DESTINATIONS in
addition to\n# the output of the aggregation rules. If set false the carbon-aggregator
will\n# only ever send the output of aggregation.\nFORWARD_ALL = True\n\n# This
is a list of carbon daemons we will send any relayed or\n# generated metrics to.
The default provided would send to a single\n# carbon-cache instance on the default
port. However if you\n# use multiple carbon-cache instances then it would look
like this:\n#\n# DESTINATIONS = 127.0.0.1:2004:a, 127.0.0.1:2104:b\n# \n# The
format is comma-delimited IP:PORT:INSTANCE where the :INSTANCE part is\n# optional
and refers to the \"None\" instance if omitted.\n#\n# Note that if the destinations
are all carbon-caches then this should\n# exactly match the webapp's CARBONLINK_HOSTS
setting in terms of\n# instances listed (order matters!).\nDESTINATIONS = 127.0.0.1:2004\n\n#
If you want to add redundancy to your data by replicating every\n# datapoint to
more than one machine, increase this.\nREPLICATION_FACTOR = 1\n\n# This is the
maximum number of datapoints that can be queued up\n# for a single destination.
Once this limit is hit, we will\n# stop accepting new data if USE_FLOW_CONTROL
is True, otherwise\n# we will drop any subsequently received datapoints.\nMAX_QUEUE_SIZE
= 10000\n\n# Set this to False to drop datapoints when any send queue (sending
datapoints\n# to a downstream carbon daemon) hits MAX_QUEUE_SIZE. If this is True
(the\n# default) then sockets over which metrics are received will temporarily
stop accepting\n# data until the send queues fall below 80% MAX_QUEUE_SIZE.\nUSE_FLOW_CONTROL
= True\n\n# This defines the maximum \"message size\" between carbon daemons.\n#
You shouldn't need to tune this unless you really know what you're doing.\nMAX_DATAPOINTS_PER_MESSAGE
= 500\n\n# This defines how many datapoints the aggregator remembers for\n# each
metric. Aggregation only happens for datapoints that fall in\n# the past MAX_AGGREGATION_INTERVALS
* intervalSize seconds.\nMAX_AGGREGATION_INTERVALS = 5\n\n# By default (WRITE_BACK_FREQUENCY
= 0), carbon-aggregator will write back\n# aggregated data points once every rule.frequency
seconds, on a per-rule basis.\n# Set this (WRITE_BACK_FREQUENCY = N) to write
back all aggregated data points\n# every N seconds, independent of rule frequency.
This is useful, for example,\n# to be able to query partially aggregated metrics
from carbon-cache without\n# having to first wait rule.frequency seconds.\n# WRITE_BACK_FREQUENCY
= 0\n\n# Set this to True to enable whitelisting and blacklisting of metrics in\n#
CONF_DIR/whitelist and CONF_DIR/blacklist. If the whitelist is missing or\n# empty,
all metrics will pass through\n# USE_WHITELIST = False\n\n# By default, carbon
itself will log statistics (such as a count,\n# metricsReceived) with the top
level prefix of 'carbon' at an interval of 60\n# seconds. Set CARBON_METRIC_INTERVAL
to 0 to disable instrumentation\n# CARBON_METRIC_PREFIX = carbon\n# CARBON_METRIC_INTERVAL
= 60"
storage-aggregation.conf: |-
# Aggregation methods for whisper files. Entries are scanned in order,
# and first match wins. This file is scanned for changes every 60 seconds
#
# [name]
# pattern = <regex>
# xFilesFactor = <float between 0 and 1>
# aggregationMethod = <average|sum|last|max|min>
#
# name: Arbitrary unique name for the rule
# pattern: Regex pattern to match against the metric name
# xFilesFactor: Ratio of valid data points required for aggregation to the next retention to occur
# aggregationMethod: function to apply to data points for aggregation
#
[min]
pattern = \.min$
xFilesFactor = 0.1
aggregationMethod = min
[max]
pattern = \.max$
xFilesFactor = 0.1
aggregationMethod = max
[count]
pattern = \.count$
xFilesFactor = 0
aggregationMethod = sum
[lower]
pattern = \.lower(_\d+)?$
xFilesFactor = 0.1
aggregationMethod = min
[upper]
pattern = \.upper(_\d+)?$
xFilesFactor = 0.1
aggregationMethod = max
[sum]
pattern = \.sum$
xFilesFactor = 0
aggregationMethod = sum
[gauges]
pattern = ^.*\.gauges\..*
xFilesFactor = 0
aggregationMethod = last
[default_average]
pattern = .*
xFilesFactor = 0.5
aggregationMethod = average
storage-schemas.conf: |-
# Schema definitions for Whisper files. Entries are scanned in order,
# and first match wins. This file is scanned for changes every 60 seconds.
#
# [name]
# pattern = regex
# retentions = timePerPoint:timeToStore, timePerPoint:timeToStore, ...
# Carbon's internal metrics. This entry should match what is specified in
# CARBON_METRIC_PREFIX and CARBON_METRIC_INTERVAL settings
[carbon]
pattern = ^carbon\.
retentions = 5s:1d,1m:90d
[collectd]
pattern = ^collectd.*
retentions = 10s:1d,1m:28d,10m:1y
[statsd]
pattern = ^stats.*
retentions = 10s:1d,1m:28d,10m:1y,1h:2y
[default_1min_for_1day]
pattern = .*
retentions = 5s:1d,1m:28d
| 68.807407 | 219 | 0.739046 |
79299680213941167a3e674ef8c416b2c1d73bc9 | 1,797 | yml | YAML | k8s/whitelist.yml | drewsuitor/minecraft | 3fc88650783c589d780810d7e10ecda0126b052b | [
"MIT"
] | null | null | null | k8s/whitelist.yml | drewsuitor/minecraft | 3fc88650783c589d780810d7e10ecda0126b052b | [
"MIT"
] | null | null | null | k8s/whitelist.yml | drewsuitor/minecraft | 3fc88650783c589d780810d7e10ecda0126b052b | [
"MIT"
] | null | null | null | apiVersion: v1
data:
whitelist.json: |
[
{
"uuid": "6ae6cfa5-ff76-3f1a-a0ad-8a11bcd0a88d",
"name": "Kiro__"
},
{
"uuid": "9327e9bb-a0fb-3e28-bc6c-9686f90055c2",
"name": "OC_Transpo"
},
{
"uuid": "69919047-abd3-3a02-967f-982b31911dfd",
"name": "TheDeviousKitty"
},
{
"uuid": "e7bc6e02-bcd3-3a76-833c-c8584414be6b",
"name": "big_data_energy"
},
{
"uuid": "0177a97c-45b3-3b53-b486-ada81eaec99b",
"name": "AssEater8000"
},
{
"uuid": "d31fbc5f-06d9-3e99-97a7-d0ad247c78ad",
"name": "park_Jihoon"
},
{
"uuid": "1c8dd0be-1fcb-3540-bdf6-347db9c116af",
"name": "Americas_Ass"
},
{
"uuid": "ab6d3630-7239-3e89-ac52-82363fb80959",
"name": "KaptannG"
},
{
"uuid": "c37fd0be-03ad-3c4e-b906-1f29a06952aa",
"name": "AutisticFetus"
},
{
"uuid": "c011ac99-fcbf-3285-b31b-dfe8b387aa06",
"name": "StokedHugh"
},
{
"uuid": "73f9b98f-993d-31da-900b-9b28c6e99c8b",
"name": "yunglum"
},
{
"uuid": "dd863319-2af6-3d0c-905d-be36fe40534f",
"name": "JasCoco"
},
{
"uuid": "e33784ec-0d31-31b4-873d-3df65761613d",
"name": "sampersand"
},
{
"uuid": "2e082b99-ebd2-3fb9-af0d-19792f511256",
"name": "mat"
},
{
"uuid": "77068c89-ae36-3b99-a3ee-667c5577c6d1",
"name": "itsannarichi"
},
{
"uuid": "7d3762e7-832a-3331-b1dc-324426e036b4",
"name": "IHaveNoRagrets"
}
]
kind: ConfigMap
metadata:
name: whitelist
| 24.616438 | 56 | 0.483027 |
7929e73a65114f3b21133604d8de30c03dd1caef | 831 | yaml | YAML | manifests/envs/movie-dev/config-template.yaml | gcr-solutions/recommender-system-dev-workshop-code | d3b74cc7006fa061e17d5ada4a7d48f90d3610cd | [
"Apache-2.0"
] | 10 | 2021-07-14T09:14:47.000Z | 2022-01-24T09:21:41.000Z | manifests/envs/movie-dev/config-template.yaml | gcr-solutions/recommender-system-dev-workshop-code | d3b74cc7006fa061e17d5ada4a7d48f90d3610cd | [
"Apache-2.0"
] | null | null | null | manifests/envs/movie-dev/config-template.yaml | gcr-solutions/recommender-system-dev-workshop-code | d3b74cc7006fa061e17d5ada4a7d48f90d3610cd | [
"Apache-2.0"
] | 92 | 2021-06-18T05:13:53.000Z | 2022-01-25T08:15:49.000Z | apiVersion: v1
kind: ConfigMap
metadata:
name: rs-movie-dev-config
data:
redis_port: "6379"
redis_host: "REDIS_HOST_PLACEHOLDER"
messge_broker_redis_port: "6379"
messge_broker_redis_host: "redis-cart"
aws_region: "__AWS_REGION__"
s3_bucket: "aws-gcr-rs-sol-dev-workshop-__AWS_REGION__-__AWS_ACCOUNT_ID__"
s3_prefix: "sample-data-movie"
click_record_file_path: 'sample-data-movie/system/ingest-data/action/'
user_record_file_path: 'sample-data-movie/system/ingest-data/user/'
click_record_bucket: 'aws-gcr-rs-sol-dev-workshop-__AWS_REGION__-__AWS_ACCOUNT_ID__'
local_data_folder: '/rs-data/movie-dev/'
method: "__METHOD__"
scenario: "movie"
stage: "dev-workshop"
aws-exports.json: |
{
"DEPLOY_TYPE": "MOVIE",
"NEWS_API_URL": "/api/v1/demo",
"MOVIE_API_URL": "/api/v1/demo"
} | 33.24 | 86 | 0.736462 |
792a4b946acc9cb5882b5cdaf32e705291c9337d | 143 | yaml | YAML | k8s/namespace.yaml | TechnicalFreak/dev-environments | 607e5fb408f2bc881455d11acb7ac8c6f4bcc2e5 | [
"MIT"
] | null | null | null | k8s/namespace.yaml | TechnicalFreak/dev-environments | 607e5fb408f2bc881455d11acb7ac8c6f4bcc2e5 | [
"MIT"
] | null | null | null | k8s/namespace.yaml | TechnicalFreak/dev-environments | 607e5fb408f2bc881455d11acb7ac8c6f4bcc2e5 | [
"MIT"
] | null | null | null | {
"apiVersion": "v1",
"kind": "Namespace",
"metadata": {
"name": "__branch__",
"labels": {
"name": "__branch__"
}
}
} | 14.3 | 26 | 0.468531 |
792a83da961a9312c71d9951de76b71a407c4205 | 203 | yaml | YAML | test/resources/resource_mutate_endpoint.yaml | abhi-kapoor/kyverno | 99efd8136fb3a1b5ca4e37cd841054afcdd3c636 | [
"Apache-2.0"
] | 1,725 | 2020-10-06T00:54:22.000Z | 2022-03-31T15:24:56.000Z | test/resources/resource_mutate_endpoint.yaml | abhi-kapoor/kyverno | 99efd8136fb3a1b5ca4e37cd841054afcdd3c636 | [
"Apache-2.0"
] | 1,739 | 2020-10-06T05:23:18.000Z | 2022-03-31T23:30:48.000Z | test/resources/resource_mutate_endpoint.yaml | abhi-kapoor/kyverno | 99efd8136fb3a1b5ca4e37cd841054afcdd3c636 | [
"Apache-2.0"
] | 265 | 2020-10-14T14:54:43.000Z | 2022-03-29T10:49:26.000Z | apiVersion: v1
kind: Endpoints
metadata:
name: test-endpoint
labels:
label : test
subsets:
- addresses:
- ip: 192.168.10.171
ports:
- name: secure-connection
port: 443
protocol: TCP | 15.615385 | 27 | 0.669951 |
792ab6504daa7f7f75a8c94e82e31926713680ea | 577 | yaml | YAML | infra/k8s-service.yaml | vilvamani/springboot | 2c9eb3344fe95985cdd13b7fbe6e56705026c37d | [
"Apache-2.0"
] | null | null | null | infra/k8s-service.yaml | vilvamani/springboot | 2c9eb3344fe95985cdd13b7fbe6e56705026c37d | [
"Apache-2.0"
] | null | null | null | infra/k8s-service.yaml | vilvamani/springboot | 2c9eb3344fe95985cdd13b7fbe6e56705026c37d | [
"Apache-2.0"
] | 1 | 2020-11-08T08:46:41.000Z | 2020-11-08T08:46:41.000Z | apiVersion: v1
kind: Service
metadata:
name: springboot-svc
labels:
app.kubernetes.io/name: springbootapp
app.kubernetes.io/component: microservice
spec:
# In a production setup, we recommend accessing Grafana through an external Loadbalancer
# or through a public IP.
# type: LoadBalancer
# You could also use NodePort to expose the service at a randomly-generated port
type: NodePort
ports:
- protocol: TCP
port: 8080
targetPort: 8080
selector:
app.kubernetes.io/name: springbootapp
app.kubernetes.io/component: microservice
| 27.47619 | 90 | 0.736568 |
792bf53994adcc241a2f1ed220914d888aa8d10e | 2,262 | yaml | YAML | resources/operator.yaml | AaruniAggarwal/benchmark-operator | 0d4c35f23684c2fd705c6b4624e25ef98032752a | [
"Apache-2.0"
] | null | null | null | resources/operator.yaml | AaruniAggarwal/benchmark-operator | 0d4c35f23684c2fd705c6b4624e25ef98032752a | [
"Apache-2.0"
] | null | null | null | resources/operator.yaml | AaruniAggarwal/benchmark-operator | 0d4c35f23684c2fd705c6b4624e25ef98032752a | [
"Apache-2.0"
] | null | null | null | apiVersion: apps/v1
kind: Deployment
metadata:
name: benchmark-operator
namespace: my-ripsaw
spec:
replicas: 1
selector:
matchLabels:
name: benchmark-operator
template:
metadata:
labels:
name: benchmark-operator
spec:
tolerations:
- key: role
value: workload
effect: NoSchedule
affinity:
nodeAffinity:
preferredDuringSchedulingIgnoredDuringExecution:
- weight: 100
preference:
matchExpressions:
- key: node-role.kubernetes.io/workload
operator: In
values:
- ""
serviceAccountName: benchmark-operator
containers:
- name: ansible
command:
- /usr/local/bin/ao-logs
- /tmp/ansible-operator/runner
- stdout
image: quay.io/multi-arch/benchmark-operator:latest
imagePullPolicy: "Always"
volumeMounts:
- mountPath: /tmp/ansible-operator/runner
name: runner
readOnly: true
- name: benchmark-operator
image: quay.io/multi-arch/benchmark-operator:latest
imagePullPolicy: Always
env:
- name: WATCH_NAMESPACE
valueFrom:
fieldRef:
fieldPath: metadata.namespace
- name: POD_NAME
valueFrom:
fieldRef:
fieldPath: metadata.name
- name: OPERATOR_NAME
value: "benchmark-operator"
- name: WORKER_BENCHMARK_RIPSAW_CLOUDBULLDOZER_IO
value: "1"
- name: ANSIBLE_VERBOSITY
value: "4"
volumeMounts:
- mountPath: /tmp/ansible-operator/runner
name: runner
- name: redis-master
image: k8s.gcr.io/redis:v1
env:
- name: MASTER
value: "true"
ports:
- containerPort: 6379
resources:
limits:
cpu: "0.1"
volumeMounts:
- mountPath: /redis-master-data
name: data
volumes:
- name: data
emptyDir: {}
- name: runner
emptyDir: {}
| 27.585366 | 61 | 0.516799 |
792c95034108e592bc01f19db877a2d234a1e76f | 942 | yml | YAML | scripts/installer-for-ibm-storage-enabler-for-containers/yamls/templates/pvc-template.yml | Bhaskers-Blu-Org1/ubiquity-k8s | 42562dee1c0d4f16f50ee4622cd0a2e2dc628b98 | [
"Apache-2.0"
] | 42 | 2017-04-01T00:38:36.000Z | 2021-03-17T16:17:13.000Z | scripts/installer-for-ibm-storage-enabler-for-containers/yamls/templates/pvc-template.yml | Bhaskers-Blu-Org1/ubiquity-k8s | 42562dee1c0d4f16f50ee4622cd0a2e2dc628b98 | [
"Apache-2.0"
] | 177 | 2017-05-03T23:22:44.000Z | 2021-03-24T03:34:47.000Z | scripts/installer-for-ibm-storage-enabler-for-containers/yamls/templates/pvc-template.yml | IBM/ubiquity-k8s | 42562dee1c0d4f16f50ee4622cd0a2e2dc628b98 | [
"Apache-2.0"
] | 23 | 2017-04-06T16:06:55.000Z | 2020-06-29T13:43:36.000Z | # This is an IBM Storage Enabler for Containers PVC template.
kind: PersistentVolumeClaim
apiVersion: v1
metadata:
name: "<PVC name>"
# NOTE : Uses annotations storage-class only in k8s 1.5 version.
# ------
#annotations:
# volume.beta.kubernetes.io/storage-class: "STORAGE_CLASS_NAME"
# NOTE : User label only if you want to set the PV name (the default is PV=PVC-ID)
# ------
#labels:
# pv-name: "<PV name>" # Ubiquity provisioner will create a PV with <PV name> instead of PVC-ID.
spec:
# NOTE : Use storageClassName only in k8s version 1.6+. For lower versions uses volume.beta.kubernetes.io/storage-class
storageClassName: <Storage Class Name>
accessModes:
- ReadWriteOnce # Currently Ubiquity scbe backend supports only ReadWriteOnce mode.
# Ubiquity Spectrum Scale backend supports ReadWriteOnce and ReadWriteMany mode.
resources:
requests:
storage: <Number>Gi
| 37.68 | 121 | 0.703822 |
792ca3553abe88d5741b2dd36b6d0760887a0703 | 416 | yaml | YAML | config/rbac/tkemanagedmachinepool_viewer_role.yaml | leoryu/cluster-api-provider-tencent | a3ca095687c4c6b3f2c4c9023cfa8e254c0c9b6d | [
"Apache-2.0"
] | 55 | 2018-11-12T10:47:05.000Z | 2022-03-09T09:49:54.000Z | config/rbac/tkemanagedmachinepool_viewer_role.yaml | leoryu/cluster-api-provider-tencent | a3ca095687c4c6b3f2c4c9023cfa8e254c0c9b6d | [
"Apache-2.0"
] | 10 | 2019-06-17T13:40:57.000Z | 2022-03-18T01:51:09.000Z | config/rbac/tkemanagedmachinepool_viewer_role.yaml | leoryu/cluster-api-provider-tencent | a3ca095687c4c6b3f2c4c9023cfa8e254c0c9b6d | [
"Apache-2.0"
] | 8 | 2018-11-12T10:46:47.000Z | 2021-12-20T06:35:06.000Z | # permissions for end users to view tkemanagedmachinepools.
apiVersion: rbac.authorization.k8s.io/v1
kind: ClusterRole
metadata:
name: tkemanagedmachinepool-viewer-role
rules:
- apiGroups:
- infrastructure.cluster.x-k8s.io
resources:
- tkemanagedmachinepools
verbs:
- get
- list
- watch
- apiGroups:
- infrastructure.cluster.x-k8s.io
resources:
- tkemanagedmachinepools/status
verbs:
- get
| 19.809524 | 59 | 0.75 |
792cb41eb0ba8b4f4149c21c9cf75b1fe43aea93 | 730 | yaml | YAML | experimental/addons/kubeflow/resources/ClusterRole-260.yaml | jrkeen/catalog | 750f329164816f0bdacfe8a39e5c9c9a93cf6c41 | [
"Apache-2.0"
] | 65 | 2020-05-27T03:36:33.000Z | 2022-03-23T09:50:59.000Z | experimental/addons/kubeflow/resources/ClusterRole-260.yaml | jrkeen/catalog | 750f329164816f0bdacfe8a39e5c9c9a93cf6c41 | [
"Apache-2.0"
] | 76 | 2020-05-29T09:14:26.000Z | 2022-03-28T14:31:33.000Z | experimental/addons/kubeflow/resources/ClusterRole-260.yaml | jrkeen/catalog | 750f329164816f0bdacfe8a39e5c9c9a93cf6c41 | [
"Apache-2.0"
] | 61 | 2020-05-26T03:19:48.000Z | 2022-03-24T21:57:12.000Z | apiVersion: rbac.authorization.k8s.io/v1
kind: ClusterRole
metadata:
labels:
app: tensorboards-web-app
kustomize.component: tensorboards-web-app
name: tensorboards-web-app-cluster-role
rules:
- apiGroups:
- ""
resources:
- namespaces
verbs:
- get
- list
- apiGroups:
- authorization.k8s.io
resources:
- subjectaccessreviews
verbs:
- create
- apiGroups:
- tensorboard.kubeflow.org
resources:
- tensorboards
- tensorboards/finalizers
verbs:
- get
- list
- create
- delete
- apiGroups:
- ""
resources:
- persistentvolumeclaims
verbs:
- create
- delete
- get
- list
- apiGroups:
- storage.k8s.io
resources:
- storageclasses
verbs:
- get
- list
- watch
| 14.897959 | 45 | 0.668493 |
792cb7435d219f0d10a4d3d3fb772a94162f5bb3 | 137 | yaml | YAML | namespaces/live-1.cloud-platform.service.justice.gov.uk/support-labelling-webhook/03-resourcequota.yaml | martyn-w/cloud-platform-environments | 784924e37ebb6e2c074f88bf8fbb4eb7bdf3d634 | [
"MIT"
] | 28 | 2018-07-13T15:02:24.000Z | 2022-03-17T09:23:54.000Z | namespaces/live-1.cloud-platform.service.justice.gov.uk/support-labelling-webhook/03-resourcequota.yaml | martyn-w/cloud-platform-environments | 784924e37ebb6e2c074f88bf8fbb4eb7bdf3d634 | [
"MIT"
] | 963 | 2018-05-30T15:46:06.000Z | 2022-03-30T10:06:39.000Z | namespaces/live-1.cloud-platform.service.justice.gov.uk/support-labelling-webhook/03-resourcequota.yaml | martyn-w/cloud-platform-environments | 784924e37ebb6e2c074f88bf8fbb4eb7bdf3d634 | [
"MIT"
] | 29 | 2018-12-04T09:37:36.000Z | 2022-02-25T10:35:34.000Z | apiVersion: v1
kind: ResourceQuota
metadata:
name: namespace-quota
namespace: support-labelling-webhook
spec:
hard:
pods: "50"
| 15.222222 | 38 | 0.737226 |
792cc6e518d92cfdc60ace14ac2e795d9c67d5be | 515 | yaml | YAML | manifests/setup/prometheus-operator-service.yaml | souhireCF/kube-prometheus | 8386ee39cb32c592de10f85418a9bd590b6577cf | [
"Apache-2.0"
] | null | null | null | manifests/setup/prometheus-operator-service.yaml | souhireCF/kube-prometheus | 8386ee39cb32c592de10f85418a9bd590b6577cf | [
"Apache-2.0"
] | null | null | null | manifests/setup/prometheus-operator-service.yaml | souhireCF/kube-prometheus | 8386ee39cb32c592de10f85418a9bd590b6577cf | [
"Apache-2.0"
] | 1 | 2021-05-06T09:36:23.000Z | 2021-05-06T09:36:23.000Z | apiVersion: v1
kind: Service
metadata:
labels:
app.kubernetes.io/component: controller
app.kubernetes.io/name: prometheus-operator
app.kubernetes.io/part-of: kube-prometheus
app.kubernetes.io/version: 0.46.0
name: prometheus-operator
namespace: monitoring
spec:
clusterIP: None
ports:
- name: https
port: 8443
targetPort: https
selector:
app.kubernetes.io/component: controller
app.kubernetes.io/name: prometheus-operator
app.kubernetes.io/part-of: kube-prometheus
| 24.52381 | 47 | 0.733981 |
792cd50880af68665357582ed16b07c25f988b3d | 794 | yaml | YAML | job-app/job-app-manual-persistent.yaml | cimox/kubernetes-for-dummies | e82afba83df8fd3734a059072b4037a24927e601 | [
"MIT"
] | 3 | 2021-02-23T14:58:55.000Z | 2022-01-08T04:45:06.000Z | job-app/job-app-manual-persistent.yaml | cimox/kubernetes-for-dummies | e82afba83df8fd3734a059072b4037a24927e601 | [
"MIT"
] | null | null | null | job-app/job-app-manual-persistent.yaml | cimox/kubernetes-for-dummies | e82afba83df8fd3734a059072b4037a24927e601 | [
"MIT"
] | 1 | 2021-07-26T10:59:26.000Z | 2021-07-26T10:59:26.000Z | apiVersion: batch/v1
kind: Job
metadata:
generateName: job-app-
namespace: jobs
spec:
template:
spec:
containers:
- name: job-app
image: cimox/job-app:0.0.6
env:
- name: EDGE_API_URL
value: 'http://edge-app-service.edge.svc.cluster.local:5000/job'
- name: JOB_TYPE
value: 'stateful'
- name: FIB_N
value: '35'
volumeMounts:
- mountPath: /mnt/storage
name: storage
resources:
requests:
memory: "64Mi"
cpu: "250m"
limits:
memory: "128Mi"
cpu: "500m"
volumes:
- name: storage
hostPath:
path: /c/minikube-pv
restartPolicy: Never
backoffLimit: 1
| 22.685714 | 76 | 0.502519 |
792cfd4d59f96cc6bfa713b8e623d3273da0f9a1 | 366 | yaml | YAML | mbox-operator/config/rbac/mbkojibuilder_viewer_role.yaml | Zlopez/mbbox | bc7cbdb74fd9ec0071617bbcf15f32f0e44935ac | [
"MIT"
] | 12 | 2020-02-19T01:49:02.000Z | 2021-06-22T12:47:33.000Z | mbox-operator/config/rbac/mbkojibuilder_viewer_role.yaml | Zlopez/mbbox | bc7cbdb74fd9ec0071617bbcf15f32f0e44935ac | [
"MIT"
] | 146 | 2020-02-25T13:08:48.000Z | 2021-04-13T07:02:05.000Z | mbox-operator/config/rbac/mbkojibuilder_viewer_role.yaml | Zlopez/mbbox | bc7cbdb74fd9ec0071617bbcf15f32f0e44935ac | [
"MIT"
] | 7 | 2020-02-19T08:52:05.000Z | 2021-01-29T07:32:31.000Z | # permissions for end users to view mbkojibuilders.
apiVersion: rbac.authorization.k8s.io/v1
kind: ClusterRole
metadata:
name: mbkojibuilder-viewer-role
rules:
- apiGroups:
- apps.fedoraproject.org
resources:
- mbkojibuilders
verbs:
- get
- list
- watch
- apiGroups:
- apps.fedoraproject.org
resources:
- mbkojibuilders/status
verbs:
- get
| 17.428571 | 51 | 0.726776 |
792d1ff0880320810ab549c3d56033efabc11c80 | 3,937 | yaml | YAML | config/prow/cluster/deck_deployment.yaml | mmiranda96/test-infra | c3c067c2da561932d8e25bc07dc6f675c9b645a6 | [
"Apache-2.0"
] | null | null | null | config/prow/cluster/deck_deployment.yaml | mmiranda96/test-infra | c3c067c2da561932d8e25bc07dc6f675c9b645a6 | [
"Apache-2.0"
] | null | null | null | config/prow/cluster/deck_deployment.yaml | mmiranda96/test-infra | c3c067c2da561932d8e25bc07dc6f675c9b645a6 | [
"Apache-2.0"
] | null | null | null | # Copyright 2016 The Kubernetes Authors All rights reserved.
#
# Licensed under the Apache License, Version 2.0 (the "License");
# you may not use this file except in compliance with the License.
# You may obtain a copy of the License at
#
# http://www.apache.org/licenses/LICENSE-2.0
#
# Unless required by applicable law or agreed to in writing, software
# distributed under the License is distributed on an "AS IS" BASIS,
# WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
# See the License for the specific language governing permissions and
# limitations under the License.
apiVersion: apps/v1
kind: Deployment
metadata:
namespace: default
name: deck
labels:
app: deck
spec:
replicas: 3
strategy:
type: RollingUpdate
rollingUpdate:
maxSurge: 1
maxUnavailable: 1
selector:
matchLabels:
app: deck
template:
metadata:
labels:
app: deck
spec:
serviceAccountName: deck
terminationGracePeriodSeconds: 30
containers:
- name: deck
image: gcr.io/k8s-prow/deck:v20220114-6a6ac6b4e0
imagePullPolicy: Always
ports:
- name: http
containerPort: 8080
- name: metrics
containerPort: 9090
args:
- --tide-url=http://tide/
- --hook-url=http://hook:8888/plugin-help
- --redirect-http-to=prow.k8s.io
- --oauth-url=/github-login
- --config-path=/etc/config/config.yaml
- --job-config-path=/etc/job-config
- --spyglass=true
- --rerun-creates-job
- --github-token-path=/etc/github/oauth
- --github-endpoint=http://ghproxy
- --github-endpoint=https://api.github.com
- --github-oauth-config-file=/etc/githuboauth/secret
- --cookie-secret=/etc/cookie/secret
- --plugin-config=/etc/plugins/plugins.yaml
env:
# Use KUBECONFIG envvar rather than --kubeconfig flag in order to provide multiple configs to merge.
- name: KUBECONFIG
value: "/etc/kubeconfig/config:/etc/kubeconfig-build-test-infra-trusted/kubeconfig"
volumeMounts:
- name: oauth-config
mountPath: /etc/githuboauth
readOnly: true
- name: cookie-secret
mountPath: /etc/cookie
readOnly: true
- mountPath: /etc/kubeconfig
name: kubeconfig
readOnly: true
- mountPath: /etc/kubeconfig-build-test-infra-trusted
name: kubeconfig-build-test-infra-trusted
readOnly: true
- name: config
mountPath: /etc/config
readOnly: true
- name: job-config
mountPath: /etc/job-config
readOnly: true
- name: oauth-token
mountPath: /etc/github
readOnly: true
- name: plugins
mountPath: /etc/plugins
readOnly: true
livenessProbe:
httpGet:
path: /healthz
port: 8081
initialDelaySeconds: 3
periodSeconds: 3
readinessProbe:
httpGet:
path: /healthz/ready
port: 8081
initialDelaySeconds: 10
periodSeconds: 3
timeoutSeconds: 600
volumes:
- name: oauth-config
secret:
secretName: github-oauth-config
- name: oauth-token
secret:
secretName: oauth-token
- name: cookie-secret
secret:
secretName: cookie
- name: kubeconfig
secret:
defaultMode: 420
secretName: kubeconfig
- name: kubeconfig-build-test-infra-trusted
secret:
defaultMode: 420
secretName: kubeconfig-build-test-infra-trusted
- name: config
configMap:
name: config
- name: job-config
configMap:
name: job-config
- name: plugins
configMap:
name: plugins
| 29.825758 | 108 | 0.597917 |
792d594874ffd7640b460650cebef767c980a9a1 | 144 | yaml | YAML | built-in-references/Kubernetes/perf/violations/violation4249.yaml | sw47/azure-policy | 4a38e4cb4047b5364902653f0defe45f1b21bc61 | [
"MIT"
] | null | null | null | built-in-references/Kubernetes/perf/violations/violation4249.yaml | sw47/azure-policy | 4a38e4cb4047b5364902653f0defe45f1b21bc61 | [
"MIT"
] | null | null | null | built-in-references/Kubernetes/perf/violations/violation4249.yaml | sw47/azure-policy | 4a38e4cb4047b5364902653f0defe45f1b21bc61 | [
"MIT"
] | null | null | null | apiVersion: v1
kind: Pod
metadata:
name: image-demo-4249
spec:
containers:
- name: nginx
image: nginx #ritaacr.azurecr.io/nginx:latest | 18 | 49 | 0.722222 |
792dc05b6de437930a789048af80d7338af12def | 82 | yaml | YAML | deploy/service_account.yaml | odra/openshift-template-operator | c9ee0aa303ca2dc0e1b3224af707d9d150e0c43b | [
"Apache-2.0"
] | null | null | null | deploy/service_account.yaml | odra/openshift-template-operator | c9ee0aa303ca2dc0e1b3224af707d9d150e0c43b | [
"Apache-2.0"
] | null | null | null | deploy/service_account.yaml | odra/openshift-template-operator | c9ee0aa303ca2dc0e1b3224af707d9d150e0c43b | [
"Apache-2.0"
] | null | null | null | apiVersion: v1
kind: ServiceAccount
metadata:
name: openshift-template-operator
| 16.4 | 35 | 0.817073 |
792dc37db54c50c74a91deab5a79f3fcbb1b8ece | 552 | yaml | YAML | example/base/deployment.yaml | The-Outsider-Renaissance/CI | 432ff2b171965ee94873cb2215e3012208cb7ca6 | [
"Apache-2.0"
] | null | null | null | example/base/deployment.yaml | The-Outsider-Renaissance/CI | 432ff2b171965ee94873cb2215e3012208cb7ca6 | [
"Apache-2.0"
] | null | null | null | example/base/deployment.yaml | The-Outsider-Renaissance/CI | 432ff2b171965ee94873cb2215e3012208cb7ca6 | [
"Apache-2.0"
] | null | null | null | apiVersion: apps/v1
kind: Deployment
metadata:
name: example
spec:
replicas: 1
selector:
matchLabels:
app: example
template:
metadata:
labels:
app: example
spec:
containers:
- name: example
image: ealen/echo-server
imagePullPolicy: Always
ports:
- name: http
containerPort: 80
resources:
requests:
cpu: 50m
memory: 128Mi
limits:
cpu: 100m
memory: 256Mi | 19.714286 | 34 | 0.498188 |
792dc9711c247cfbe924ce445724095b00ac0b6b | 3,444 | yaml | YAML | prow/staging/cluster/deck_deployment.yaml | radufa/test-infra-kyma | 6a6e1382cc6888f496bc400f48b1a730041e1858 | [
"Apache-2.0"
] | null | null | null | prow/staging/cluster/deck_deployment.yaml | radufa/test-infra-kyma | 6a6e1382cc6888f496bc400f48b1a730041e1858 | [
"Apache-2.0"
] | null | null | null | prow/staging/cluster/deck_deployment.yaml | radufa/test-infra-kyma | 6a6e1382cc6888f496bc400f48b1a730041e1858 | [
"Apache-2.0"
] | null | null | null | # Copyright 2016 The Kubernetes Authors All rights reserved.
#
# Licensed under the Apache License, Version 2.0 (the "License");
# you may not use this file except in compliance with the License.
# You may obtain a copy of the License at
#
# http://www.apache.org/licenses/LICENSE-2.0
#
# Unless required by applicable law or agreed to in writing, software
# distributed under the License is distributed on an "AS IS" BASIS,
# WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
# See the License for the specific language governing permissions and
# limitations under the License.
apiVersion: apps/v1
kind: Deployment
metadata:
namespace: default
name: deck
labels:
app: deck
spec:
replicas: 3
strategy:
type: RollingUpdate
rollingUpdate:
maxSurge: 1
maxUnavailable: 1
selector:
matchLabels:
app: deck
template:
metadata:
labels:
app: deck
spec:
serviceAccountName: deck
terminationGracePeriodSeconds: 30
containers:
- name: deck
image: gcr.io/k8s-prow/deck:v20210318-ffb8032f91
imagePullPolicy: Always
ports:
- name: http
containerPort: 8080
args:
- --kubeconfig=/etc/kubeconfig/config
- --tide-url=http://tide/
- --hook-url=http://hook:8888/plugin-help
- --redirect-http-to=status-dev.prow.build.kyma-project.io
- --oauth-url=/github-login
- --config-path=/etc/config/config.yaml
- --job-config-path=/etc/job-config
- --spyglass=true
- --rerun-creates-job
- --github-token-path=/etc/github/oauth
- --github-endpoint=http://ghproxy
- --github-endpoint=https://api.github.com
- --github-oauth-config-file=/etc/githuboauth/secret
- --cookie-secret=/etc/cookie/secret
- --plugin-config=/etc/plugins/plugins.yaml
volumeMounts:
- name: oauth-config
mountPath: /etc/githuboauth
readOnly: true
- name: cookie-secret
mountPath: /etc/cookie
readOnly: true
- mountPath: /etc/kubeconfig
name: kubeconfig
readOnly: true
- name: config
mountPath: /etc/config
readOnly: true
- name: job-config
mountPath: /etc/job-config
readOnly: true
- name: oauth-token
mountPath: /etc/github
readOnly: true
- name: plugins
mountPath: /etc/plugins
readOnly: true
livenessProbe:
httpGet:
path: /healthz
port: 8081
initialDelaySeconds: 3
periodSeconds: 3
readinessProbe:
httpGet:
path: /healthz/ready
port: 8081
initialDelaySeconds: 10
periodSeconds: 3
timeoutSeconds: 600
volumes:
- name: oauth-config
secret:
secretName: github-oauth-config
- name: oauth-token
secret:
secretName: oauth-token
- name: cookie-secret
secret:
secretName: cookie
- name: kubeconfig
secret:
defaultMode: 420
secretName: workload-clusters-kubeconfig
- name: config
configMap:
name: config
- name: job-config
configMap:
name: job-config
- name: plugins
configMap:
name: plugins
| 28.7 | 74 | 0.592625 |
792dd43d864ff0901824a0d9410866b3d422ad67 | 2,764 | yaml | YAML | k8s/vizier/base/kelvin_deployment.yaml | domechn/pixie | 4044d6c4f691eaee4971dab00b37868dc24a466c | [
"Apache-2.0"
] | 1 | 2022-01-17T01:40:08.000Z | 2022-01-17T01:40:08.000Z | k8s/vizier/base/kelvin_deployment.yaml | domechn/pixie | 4044d6c4f691eaee4971dab00b37868dc24a466c | [
"Apache-2.0"
] | null | null | null | k8s/vizier/base/kelvin_deployment.yaml | domechn/pixie | 4044d6c4f691eaee4971dab00b37868dc24a466c | [
"Apache-2.0"
] | null | null | null | ---
apiVersion: apps/v1
kind: Deployment
metadata:
name: kelvin
spec:
selector:
matchLabels:
name: kelvin
template:
metadata:
labels:
name: kelvin
plane: data
spec:
affinity:
nodeAffinity:
requiredDuringSchedulingIgnoredDuringExecution:
nodeSelectorTerms:
- matchExpressions:
- key: kubernetes.io/os
operator: Exists
- key: kubernetes.io/os
operator: In
values:
- linux
- matchExpressions:
- key: beta.kubernetes.io/os
operator: Exists
- key: beta.kubernetes.io/os
operator: In
values:
- linux
initContainers:
- name: qb-wait
image: gcr.io/pixie-prod/pixie-prod-artifacts/curl:1.0
# yamllint disable
command: ['sh', '-c', 'set -x;
URL="https://${SERVICE_NAME}:${SERVICE_PORT}/healthz";
until [ $(curl -m 0.5 -s -o /dev/null -w "%{http_code}" -k ${URL}) -eq 200 ]; do
echo "waiting for ${URL}"
sleep 2;
done;
']
env:
# The name of the service that Kelvin must connect with before becoming available.
- name: SERVICE_NAME
value: "vizier-query-broker"
- name: SERVICE_PORT
value: "50300"
containers:
- name: app
image: gcr.io/pixie-oss/pixie-dev/vizier/kelvin_image:latest
envFrom:
- configMapRef:
name: pl-tls-config
env:
- name: PL_HOST_PATH
value: "/host"
- name: PL_POD_NAME
valueFrom:
fieldRef:
fieldPath: metadata.name
- name: PL_POD_IP
valueFrom:
fieldRef:
fieldPath: status.podIP
- name: PL_HOST_IP
valueFrom:
fieldRef:
fieldPath: status.hostIP
- name: PL_JWT_SIGNING_KEY
valueFrom:
secretKeyRef:
key: jwt-signing-key
name: pl-cluster-secrets
- name: PL_NAMESPACE
valueFrom:
fieldRef:
fieldPath: metadata.namespace
- name: TCMALLOC_SAMPLE_PARAMETER
value: "1048576"
ports:
- containerPort: 59300
volumeMounts:
- mountPath: /certs
name: certs
- name: sys
mountPath: /sys
readOnly: true
resources: {}
terminationGracePeriodSeconds: 30
volumes:
- name: certs
secret:
secretName: service-tls-certs
- name: sys
hostPath:
path: /sys
type: Directory
| 27.366337 | 92 | 0.506151 |
792e02a5a33854ee84fdcc075620b95fa5f82d01 | 189 | yaml | YAML | tests/kyverno/defaults/validate-namespace-metadata/ignore-existing-auxiliary-annotation.yaml | appuio/component-appuio-cloud | aff279f9590fcada2810be59e549450d0a000a27 | [
"BSD-3-Clause"
] | null | null | null | tests/kyverno/defaults/validate-namespace-metadata/ignore-existing-auxiliary-annotation.yaml | appuio/component-appuio-cloud | aff279f9590fcada2810be59e549450d0a000a27 | [
"BSD-3-Clause"
] | 20 | 2021-08-30T09:43:17.000Z | 2022-02-14T09:13:03.000Z | tests/kyverno/defaults/validate-namespace-metadata/ignore-existing-auxiliary-annotation.yaml | appuio/component-appuio-cloud | aff279f9590fcada2810be59e549450d0a000a27 | [
"BSD-3-Clause"
] | 1 | 2022-03-01T10:00:00.000Z | 2022-03-01T10:00:00.000Z | kind: Namespace
apiVersion: v1
metadata:
name: ignore-existing-auxiliary-annotation
annotations:
test.appuio.io/environment: staging
external.cool-tool.io/already-existing: XXX
| 23.625 | 47 | 0.777778 |
792e4defeb0ff0f17f1f0d66c1d6912af66504a3 | 330 | yaml | YAML | mock-data/large-cluster/k8s/v1:ServiceAccount/kubevious-default.yaml | kubevious/logic-processor | f3b502fdd851fc955ddb00b39da589bbf05566e3 | [
"Apache-2.0"
] | null | null | null | mock-data/large-cluster/k8s/v1:ServiceAccount/kubevious-default.yaml | kubevious/logic-processor | f3b502fdd851fc955ddb00b39da589bbf05566e3 | [
"Apache-2.0"
] | null | null | null | mock-data/large-cluster/k8s/v1:ServiceAccount/kubevious-default.yaml | kubevious/logic-processor | f3b502fdd851fc955ddb00b39da589bbf05566e3 | [
"Apache-2.0"
] | 1 | 2022-01-16T20:19:54.000Z | 2022-01-16T20:19:54.000Z | kind: ServiceAccount
apiVersion: v1
metadata:
name: default
namespace: kubevious
selfLink: /api/v1/namespaces/kubevious/serviceaccounts/default
uid: e1576445-707e-11ea-8ebf-42010a800207
resourceVersion: '31986420'
creationTimestamp: '2020-03-27T23:01:23Z'
secrets:
-
name: default-token-tj4fr
| 23.571429 | 66 | 0.727273 |
792e5f4114721cbb7a7bf94954753b86c96cf954 | 441 | yaml | YAML | pkg/v1/tkr/config/rbac/tanzukubernetesrelease_editor_role.yaml | benjaminapetersen/tanzu-framework | fbabd54a42868572dee518178c64dcb80fc02cd2 | [
"Apache-2.0"
] | 92 | 2021-10-04T07:46:46.000Z | 2022-03-24T22:13:14.000Z | pkg/v1/tkr/config/rbac/tanzukubernetesrelease_editor_role.yaml | benjaminapetersen/tanzu-framework | fbabd54a42868572dee518178c64dcb80fc02cd2 | [
"Apache-2.0"
] | 1,061 | 2021-10-04T09:35:11.000Z | 2022-03-31T21:34:35.000Z | pkg/v1/tkr/config/rbac/tanzukubernetesrelease_editor_role.yaml | benjaminapetersen/tanzu-framework | fbabd54a42868572dee518178c64dcb80fc02cd2 | [
"Apache-2.0"
] | 110 | 2021-10-04T07:22:29.000Z | 2022-03-23T20:18:07.000Z | # permissions for end users to edit tanzukubernetesreleases.
apiVersion: rbac.authorization.k8s.io/v1
kind: ClusterRole
metadata:
name: tanzukubernetesrelease-editor-role
rules:
- apiGroups:
- run.tanzu.vmware.com
resources:
- tanzukubernetesreleases
verbs:
- create
- delete
- get
- list
- patch
- update
- watch
- apiGroups:
- run.tanzu.vmware.com
resources:
- tanzukubernetesreleases/status
verbs:
- get
| 17.64 | 60 | 0.723356 |
792e68840ea638be84ab2a26e84361be7e802de8 | 161 | yaml | YAML | deployment-multitier-app/rsvp-db-service.yaml | ToniChaz/kubernetes-training | e84af5ea3f896b32fef015f94da39e58e7446693 | [
"MIT"
] | null | null | null | deployment-multitier-app/rsvp-db-service.yaml | ToniChaz/kubernetes-training | e84af5ea3f896b32fef015f94da39e58e7446693 | [
"MIT"
] | null | null | null | deployment-multitier-app/rsvp-db-service.yaml | ToniChaz/kubernetes-training | e84af5ea3f896b32fef015f94da39e58e7446693 | [
"MIT"
] | null | null | null | apiVersion: v1
kind: Service
metadata:
name: mongodb
labels:
app: rsvpdb
spec:
ports:
- port: 27017
protocol: TCP
selector:
appdb: rsvpdb
| 11.5 | 17 | 0.652174 |
792e8b553ae80e6c382054fb20272a309fe09fc3 | 127 | yaml | YAML | k8s/addons/dashboard/36-rbac-admin-serviceAccount.yaml | rakeliu/Manual | ecd31fa816a74bbd6b93449fd612a0646e9b6510 | [
"MIT"
] | null | null | null | k8s/addons/dashboard/36-rbac-admin-serviceAccount.yaml | rakeliu/Manual | ecd31fa816a74bbd6b93449fd612a0646e9b6510 | [
"MIT"
] | null | null | null | k8s/addons/dashboard/36-rbac-admin-serviceAccount.yaml | rakeliu/Manual | ecd31fa816a74bbd6b93449fd612a0646e9b6510 | [
"MIT"
] | null | null | null | # ServiceAccount admin-user
apiVersion: v1
kind: ServiceAccount
metadata:
name: admin-user
namespace: kubernetes-dashboard
| 18.142857 | 33 | 0.80315 |
792ea6178d3228fc3695b0aecf8091ec264a33c6 | 172 | yaml | YAML | manifests/service.yaml | GeorgeNiece/pinger | c8926c4620e7a838dd15163f34b94ee53babbaf4 | [
"MIT"
] | 3 | 2018-10-25T19:59:19.000Z | 2021-06-02T01:38:40.000Z | manifests/service.yaml | GeorgeNiece/pinger | c8926c4620e7a838dd15163f34b94ee53babbaf4 | [
"MIT"
] | 2 | 2019-10-08T03:02:03.000Z | 2019-10-15T22:46:26.000Z | manifests/service.yaml | reselbob/pinger | 2dff82ba2cd1cdc764638f594b809a258d5991b6 | [
"MIT"
] | null | null | null | apiVersion: v1
kind: Service
metadata:
name: pinger
spec:
selector:
app: pinger
ports:
-
protocol: TCP
port: 3000
targetPort: 3000
type: NodePort
| 12.285714 | 20 | 0.651163 |
792f1a3ce7d69b894780f680fa940f7fdc123830 | 424 | yaml | YAML | helm/templates/redis-deployment.yaml | fossabot/kraken-3 | 7ac472de8ff6f44aac4dbd231f896f00e6f3b278 | [
"Apache-2.0"
] | null | null | null | helm/templates/redis-deployment.yaml | fossabot/kraken-3 | 7ac472de8ff6f44aac4dbd231f896f00e6f3b278 | [
"Apache-2.0"
] | null | null | null | helm/templates/redis-deployment.yaml | fossabot/kraken-3 | 7ac472de8ff6f44aac4dbd231f896f00e6f3b278 | [
"Apache-2.0"
] | null | null | null | apiVersion: apps/v1
kind: Deployment
metadata:
labels:
kraken.service: redis
name: redis
spec:
replicas: 1
selector:
matchLabels:
kraken.service: redis
template:
metadata:
labels:
kraken.service: redis
spec:
containers:
- name: redis
image: redis:6
ports:
- name: redis
containerPort: 6379
restartPolicy: Always
| 17.666667 | 33 | 0.57783 |
792f4ec7b7c2e97b002b3227b6c71bbbab87f3b0 | 875 | yml | YAML | serviceCenter/kubernetes/deployment.yml | Rinuys/example-hotel-booking | 8f948ec7bd0ff1e699f5692e44a940f411179ac7 | [
"MIT"
] | 1 | 2021-06-14T00:59:12.000Z | 2021-06-14T00:59:12.000Z | serviceCenter/kubernetes/deployment.yml | Rinuys/example-hotel-booking | 8f948ec7bd0ff1e699f5692e44a940f411179ac7 | [
"MIT"
] | null | null | null | serviceCenter/kubernetes/deployment.yml | Rinuys/example-hotel-booking | 8f948ec7bd0ff1e699f5692e44a940f411179ac7 | [
"MIT"
] | null | null | null | apiVersion: apps/v1
kind: Deployment
metadata:
name: serviceCenter
labels:
app: serviceCenter
spec:
replicas: 1
selector:
matchLabels:
app: serviceCenter
template:
metadata:
labels:
app: serviceCenter
spec:
containers:
- name: serviceCenter
image: username/serviceCenter:latest
ports:
- containerPort: 8080
readinessProbe:
httpGet:
path: '/actuator/health'
port: 8080
initialDelaySeconds: 10
timeoutSeconds: 2
periodSeconds: 5
failureThreshold: 10
livenessProbe:
httpGet:
path: '/actuator/health'
port: 8080
initialDelaySeconds: 120
timeoutSeconds: 2
periodSeconds: 5
failureThreshold: 5 | 23.648649 | 46 | 0.545143 |
79300a771ebd0d1b3b4163c5ec396698c3ae143b | 1,911 | yaml | YAML | eventstore-statefulset.yaml | ildella/EventStore-Kubernetes | e3e958cd6344f92434a0499499a2bb69580fa298 | [
"Apache-2.0"
] | null | null | null | eventstore-statefulset.yaml | ildella/EventStore-Kubernetes | e3e958cd6344f92434a0499499a2bb69580fa298 | [
"Apache-2.0"
] | null | null | null | eventstore-statefulset.yaml | ildella/EventStore-Kubernetes | e3e958cd6344f92434a0499499a2bb69580fa298 | [
"Apache-2.0"
] | null | null | null | apiVersion: apps/v1
kind: StatefulSet
metadata:
name: eventstore
spec:
selector:
matchLabels:
app: eventstore
replicas: 3
serviceName: eventstore
template:
metadata:
labels:
app: eventstore
spec:
containers:
- name: eventstore
image: "eventstore/eventstore:release-5.0.2"
volumeMounts:
- mountPath: "/usr/data/eventstore"
name: eventstore-pv-storage
env:
- name: EVENTSTORE_INT_IP
valueFrom:
fieldRef:
fieldPath: status.podIP
- name: EVENTSTORE_EXT_IP
valueFrom:
fieldRef:
fieldPath: status.podIP
- name: EVENTSTORE_INT_TCP_PORT
value: "1111"
- name: EVENTSTORE_EXT_TCP_PORT
value: "1112"
- name: EVENTSTORE_INT_HTTP_PORT
value: "2114"
- name: EVENTSTORE_EXT_HTTP_PORT
value: "2113"
- name: EVENTSTORE_CLUSTER_SIZE
value: "2"
- name: EVENTSTORE_CLUSTER_DNS
value: "eventstore.default.svc.cluster.local"
- name: EVENTSTORE_CLUSTER_GOSSIP_PORT
value: "2114"
- name: EVENTSTORE_GOSSIP_ALLOWED_DIFFERENCE_MS
value: "600000"
- name: EVENTSTORE_INT_HTTP_PREFIXES
value: "http://*:2114/"
- name: EVENTSTORE_EXT_HTTP_PREFIXES
value: "http://*:2113/"
ports:
- containerPort: 2113
- containerPort: 2114
- containerPort: 1111
- containerPort: 1112
volumeClaimTemplates:
- metadata:
name: eventstore-pv-storage
spec:
accessModes:
- ReadWriteOnce
resources:
requests:
storage: 10Gi
| 29.4 | 59 | 0.526426 |
7930457657c7a95a7cb97e635cf0249e8f78402b | 449 | yaml | YAML | examples/gateways/github-gateway-configmap.yaml | locona/argo-events | 9122d50783511e7d08e9020f27249899fa015fe2 | [
"Apache-2.0"
] | 1 | 2019-04-17T23:10:21.000Z | 2019-04-17T23:10:21.000Z | examples/gateways/github-gateway-configmap.yaml | locona/argo-events | 9122d50783511e7d08e9020f27249899fa015fe2 | [
"Apache-2.0"
] | null | null | null | examples/gateways/github-gateway-configmap.yaml | locona/argo-events | 9122d50783511e7d08e9020f27249899fa015fe2 | [
"Apache-2.0"
] | 1 | 2020-09-02T06:33:20.000Z | 2020-09-02T06:33:20.000Z | apiVersion: v1
kind: ConfigMap
metadata:
name: github-gateway-configmap
data:
project_1: |-
id: 1234
owner: "owner-example"
repository: "repo-example"
hook:
endpoint: "/push"
port: "12000"
url: "placeholderurl"
events:
- "*"
apiToken:
name: github-access
key: token
webHookSecret:
name: github-access
key: secret
insecure: false
active: true
contentType: "json"
| 17.96 | 32 | 0.605791 |
793058a15104855f3acd5a0cc75ba20e4ceb58f5 | 1,329 | yaml | YAML | job-certbot.yaml | TheoHelfenberger/kubernetes-letsencrypt-wildcard-dns | 74ebcea306e303ba3cd65704158b8270881b6c22 | [
"Apache-2.0"
] | 2 | 2019-06-07T22:21:05.000Z | 2022-01-15T21:45:24.000Z | job-certbot.yaml | TheoHelfenberger/kubernetes-letsencrypt-wildcard-dns | 74ebcea306e303ba3cd65704158b8270881b6c22 | [
"Apache-2.0"
] | null | null | null | job-certbot.yaml | TheoHelfenberger/kubernetes-letsencrypt-wildcard-dns | 74ebcea306e303ba3cd65704158b8270881b6c22 | [
"Apache-2.0"
] | null | null | null | apiVersion: batch/v1
kind: Job
metadata:
name: certbotdns
labels:
purpose: certbot
spec:
template:
spec:
serviceAccountName: certbot
automountServiceAccountToken: true
containers:
- name: certbotdns
image: mbuckrogers/gcednscertbot
args:
- "--server=$(LE_SERVER)"
- "-n"
- "-v"
- "--dns-google"
- "--dns-google-propagation-seconds=60"
- "--email=$(EMAIL)"
- "--agree-tos"
- "--dns-google-credentials=$(GOOGLE_APPLICATION_CREDENTIALS)"
- "--deploy-hook=deployhook.sh"
- "-d $(DOMAINS)"
- certonly
imagePullPolicy: Always
volumeMounts:
- name: google-cloud-key
mountPath: /var/secrets/google
- name: certs-storage
mountPath: /etc/letsencrypt/
env:
- name: GOOGLE_APPLICATION_CREDENTIALS
value: /var/secrets/google/key.json
envFrom:
- configMapRef:
name: certbot-config
volumes:
- name: google-cloud-key
secret:
secretName: dns-key
- name: certs-storage
gcePersistentDisk:
pdName: certbot-disk
fsType: ext4
#emptyDir: {}
restartPolicy: Never | 27.6875 | 72 | 0.531226 |
79306d6c839f981ad021cf2282929aca132ef3d2 | 567 | yaml | YAML | test/inject-webhook.yaml | warmchang/patch-operator | bfc442bf566c4f442d1409b9a9641607942cc8e1 | [
"Apache-2.0"
] | 18 | 2022-01-05T18:06:02.000Z | 2022-03-24T10:53:16.000Z | test/inject-webhook.yaml | warmchang/patch-operator | bfc442bf566c4f442d1409b9a9641607942cc8e1 | [
"Apache-2.0"
] | 11 | 2021-12-30T20:47:07.000Z | 2022-03-24T22:46:18.000Z | test/inject-webhook.yaml | warmchang/patch-operator | bfc442bf566c4f442d1409b9a9641607942cc8e1 | [
"Apache-2.0"
] | 7 | 2021-12-23T19:15:42.000Z | 2022-03-24T05:20:58.000Z | apiVersion: admissionregistration.k8s.io/v1
kind: MutatingWebhookConfiguration
metadata:
name: patch-operator-inject
annotations:
service.beta.openshift.io/inject-cabundle: "true"
webhooks:
- admissionReviewVersions:
- v1
clientConfig:
service:
name: patch-operator-webhook-service
namespace: patch-operator
path: /inject
failurePolicy: Fail
name: patch-operator-inject.redhatcop.redhat.io
rules:
- apiGroups:
- ""
apiVersions:
- v1
operations:
- CREATE
resources:
- configmaps
sideEffects: None | 21.807692 | 53 | 0.707231 |
7930bc0b360b3ae87ca5b45c82eee23e96477070 | 2,161 | yaml | YAML | manifests/prometheus-roleSpecificNamespaces.yaml | donahues12/kube-prometheus | 83dc5e97a7c9511ae0a37f10fca062118bc92e95 | [
"Apache-2.0"
] | null | null | null | manifests/prometheus-roleSpecificNamespaces.yaml | donahues12/kube-prometheus | 83dc5e97a7c9511ae0a37f10fca062118bc92e95 | [
"Apache-2.0"
] | 10 | 2022-01-11T07:53:11.000Z | 2022-03-25T11:43:46.000Z | kubernetes-monitoring/manifests/prometheus-roleSpecificNamespaces.yaml | otus-kuber-2021-12/suxarikisme_platform | bf2a6e3445bfb07cb56845a5b605528d7916a1a0 | [
"MIT"
] | 1 | 2022-03-16T01:18:23.000Z | 2022-03-16T01:18:23.000Z | apiVersion: rbac.authorization.k8s.io/v1
items:
- apiVersion: rbac.authorization.k8s.io/v1
kind: Role
metadata:
labels:
app.kubernetes.io/component: prometheus
app.kubernetes.io/instance: k8s
app.kubernetes.io/name: prometheus
app.kubernetes.io/part-of: kube-prometheus
app.kubernetes.io/version: 2.33.0
name: prometheus-k8s
namespace: default
rules:
- apiGroups:
- ""
resources:
- services
- endpoints
- pods
verbs:
- get
- list
- watch
- apiGroups:
- extensions
resources:
- ingresses
verbs:
- get
- list
- watch
- apiGroups:
- networking.k8s.io
resources:
- ingresses
verbs:
- get
- list
- watch
- apiVersion: rbac.authorization.k8s.io/v1
kind: Role
metadata:
labels:
app.kubernetes.io/component: prometheus
app.kubernetes.io/instance: k8s
app.kubernetes.io/name: prometheus
app.kubernetes.io/part-of: kube-prometheus
app.kubernetes.io/version: 2.33.0
name: prometheus-k8s
namespace: kube-system
rules:
- apiGroups:
- ""
resources:
- services
- endpoints
- pods
verbs:
- get
- list
- watch
- apiGroups:
- extensions
resources:
- ingresses
verbs:
- get
- list
- watch
- apiGroups:
- networking.k8s.io
resources:
- ingresses
verbs:
- get
- list
- watch
- apiVersion: rbac.authorization.k8s.io/v1
kind: Role
metadata:
labels:
app.kubernetes.io/component: prometheus
app.kubernetes.io/instance: k8s
app.kubernetes.io/name: prometheus
app.kubernetes.io/part-of: kube-prometheus
app.kubernetes.io/version: 2.33.0
name: prometheus-k8s
namespace: monitoring
rules:
- apiGroups:
- ""
resources:
- services
- endpoints
- pods
verbs:
- get
- list
- watch
- apiGroups:
- extensions
resources:
- ingresses
verbs:
- get
- list
- watch
- apiGroups:
- networking.k8s.io
resources:
- ingresses
verbs:
- get
- list
- watch
kind: RoleList
| 18.313559 | 48 | 0.599722 |
7931935b943ad22e9b18779de61b0d6589cd0aee | 30,828 | yaml | YAML | k8s/strimzi/081-Crd-kafkauser.yaml | raestrada/kafka-workshop-modulo03-lab1 | 7a6400139434748b20df80760de8342cf0f5badf | [
"MIT"
] | null | null | null | k8s/strimzi/081-Crd-kafkauser.yaml | raestrada/kafka-workshop-modulo03-lab1 | 7a6400139434748b20df80760de8342cf0f5badf | [
"MIT"
] | null | null | null | k8s/strimzi/081-Crd-kafkauser.yaml | raestrada/kafka-workshop-modulo03-lab1 | 7a6400139434748b20df80760de8342cf0f5badf | [
"MIT"
] | null | null | null | apiVersion: apiextensions.k8s.io/v1
kind: CustomResourceDefinition
metadata:
name: kafkausers.kafka.strimzi.io
namespace: kafka
labels:
app: strimzi
strimzi.io/crd-install: "true"
spec:
group: kafka.strimzi.io
names:
kind: KafkaUser
listKind: KafkaUserList
singular: kafkauser
plural: kafkausers
shortNames:
- ku
categories:
- strimzi
scope: Namespaced
conversion:
strategy: None
versions:
- name: v1beta2
served: true
storage: true
subresources:
status: {}
additionalPrinterColumns:
- name: Cluster
description: The name of the Kafka cluster this user belongs to
jsonPath: .metadata.labels.strimzi\.io/cluster
type: string
- name: Authentication
description: How the user is authenticated
jsonPath: .spec.authentication.type
type: string
- name: Authorization
description: How the user is authorised
jsonPath: .spec.authorization.type
type: string
- name: Ready
description: The state of the custom resource
jsonPath: .status.conditions[?(@.type=="Ready")].status
type: string
schema:
openAPIV3Schema:
type: object
properties:
spec:
type: object
properties:
authentication:
type: object
properties:
type:
type: string
enum:
- tls
- scram-sha-512
description: Authentication type.
required:
- type
description: Authentication mechanism enabled for this Kafka user.
authorization:
type: object
properties:
acls:
type: array
items:
type: object
properties:
host:
type: string
description: The host from which the action described in
the ACL rule is allowed or denied.
operation:
type: string
enum:
- Read
- Write
- Create
- Delete
- Alter
- Describe
- ClusterAction
- AlterConfigs
- DescribeConfigs
- IdempotentWrite
- All
description: 'Operation which will be allowed or denied.
Supported operations are: Read, Write, Create, Delete,
Alter, Describe, ClusterAction, AlterConfigs, DescribeConfigs,
IdempotentWrite and All.'
resource:
type: object
properties:
name:
type: string
description: Name of resource for which given ACL rule
applies. Can be combined with `patternType` field
to use prefix pattern.
patternType:
type: string
enum:
- literal
- prefix
description: Describes the pattern used in the resource
field. The supported types are `literal` and `prefix`.
With `literal` pattern type, the resource field will
be used as a definition of a full name. With `prefix`
pattern type, the resource name will be used only
as a prefix. Default value is `literal`.
type:
type: string
enum:
- topic
- group
- cluster
- transactionalId
description: Resource type. The available resource types
are `topic`, `group`, `cluster`, and `transactionalId`.
required:
- type
description: Indicates the resource for which given ACL
rule applies.
type:
type: string
enum:
- allow
- deny
description: The type of the rule. Currently the only supported
type is `allow`. ACL rules with type `allow` are used
to allow user to execute the specified operations. Default
value is `allow`.
required:
- operation
- resource
description: List of ACL rules which should be applied to this
user.
type:
type: string
enum:
- simple
description: Authorization type. Currently the only supported
type is `simple`. `simple` authorization type uses Kafka's `kafka.security.authorizer.AclAuthorizer`
class for authorization.
required:
- acls
- type
description: Authorization rules for this Kafka user.
quotas:
type: object
properties:
consumerByteRate:
type: integer
minimum: 0
description: A quota on the maximum bytes per-second that each
client group can fetch from a broker before the clients in the
group are throttled. Defined on a per-broker basis.
producerByteRate:
type: integer
minimum: 0
description: A quota on the maximum bytes per-second that each
client group can publish to a broker before the clients in the
group are throttled. Defined on a per-broker basis.
requestPercentage:
type: integer
minimum: 0
description: A quota on the maximum CPU utilization of each client
group as a percentage of network and I/O threads.
description: Quotas on requests to control the broker resources used
by clients. Network bandwidth and request rate quotas can be enforced.Kafka
documentation for Kafka User quotas can be found at http://kafka.apache.org/documentation/#design_quotas.
template:
type: object
properties:
secret:
type: object
properties:
metadata:
type: object
properties:
labels:
x-kubernetes-preserve-unknown-fields: true
type: object
description: Labels added to the resource template. Can
be applied to different resources such as `StatefulSets`,
`Deployments`, `Pods`, and `Services`.
annotations:
x-kubernetes-preserve-unknown-fields: true
type: object
description: Annotations added to the resource template.
Can be applied to different resources such as `StatefulSets`,
`Deployments`, `Pods`, and `Services`.
description: Metadata applied to the resource.
description: Template for KafkaUser resources. The template allows
users to specify how the `Secret` with password or TLS certificates
is generated.
description: Template to specify how Kafka User `Secrets` are generated.
description: The specification of the user.
status:
type: object
properties:
conditions:
type: array
items:
type: object
properties:
type:
type: string
description: The unique identifier of a condition, used to distinguish
between other conditions in the resource.
status:
type: string
description: The status of the condition, either True, False
or Unknown.
lastTransitionTime:
type: string
description: Last time the condition of a type changed from
one status to another. The required format is 'yyyy-MM-ddTHH:mm:ssZ',
in the UTC time zone.
reason:
type: string
description: The reason for the condition's last transition
(a single word in CamelCase).
message:
type: string
description: Human-readable message indicating details about
the condition's last transition.
description: List of status conditions.
observedGeneration:
type: integer
description: The generation of the CRD that was last reconciled by
the operator.
username:
type: string
description: Username.
secret:
type: string
description: The name of `Secret` where the credentials are stored.
description: The status of the Kafka User.
- name: v1beta1
served: true
storage: false
subresources:
status: {}
additionalPrinterColumns:
- name: Cluster
description: The name of the Kafka cluster this user belongs to
jsonPath: .metadata.labels.strimzi\.io/cluster
type: string
- name: Authentication
description: How the user is authenticated
jsonPath: .spec.authentication.type
type: string
- name: Authorization
description: How the user is authorised
jsonPath: .spec.authorization.type
type: string
- name: Ready
description: The state of the custom resource
jsonPath: .status.conditions[?(@.type=="Ready")].status
type: string
schema:
openAPIV3Schema:
type: object
properties:
spec:
type: object
properties:
authentication:
type: object
properties:
type:
type: string
enum:
- tls
- scram-sha-512
description: Authentication type.
required:
- type
description: Authentication mechanism enabled for this Kafka user.
authorization:
type: object
properties:
acls:
type: array
items:
type: object
properties:
host:
type: string
description: The host from which the action described in
the ACL rule is allowed or denied.
operation:
type: string
enum:
- Read
- Write
- Create
- Delete
- Alter
- Describe
- ClusterAction
- AlterConfigs
- DescribeConfigs
- IdempotentWrite
- All
description: 'Operation which will be allowed or denied.
Supported operations are: Read, Write, Create, Delete,
Alter, Describe, ClusterAction, AlterConfigs, DescribeConfigs,
IdempotentWrite and All.'
resource:
type: object
properties:
name:
type: string
description: Name of resource for which given ACL rule
applies. Can be combined with `patternType` field
to use prefix pattern.
patternType:
type: string
enum:
- literal
- prefix
description: Describes the pattern used in the resource
field. The supported types are `literal` and `prefix`.
With `literal` pattern type, the resource field will
be used as a definition of a full name. With `prefix`
pattern type, the resource name will be used only
as a prefix. Default value is `literal`.
type:
type: string
enum:
- topic
- group
- cluster
- transactionalId
description: Resource type. The available resource types
are `topic`, `group`, `cluster`, and `transactionalId`.
required:
- type
description: Indicates the resource for which given ACL
rule applies.
type:
type: string
enum:
- allow
- deny
description: The type of the rule. Currently the only supported
type is `allow`. ACL rules with type `allow` are used
to allow user to execute the specified operations. Default
value is `allow`.
required:
- operation
- resource
description: List of ACL rules which should be applied to this
user.
type:
type: string
enum:
- simple
description: Authorization type. Currently the only supported
type is `simple`. `simple` authorization type uses Kafka's `kafka.security.authorizer.AclAuthorizer`
class for authorization.
required:
- acls
- type
description: Authorization rules for this Kafka user.
quotas:
type: object
properties:
consumerByteRate:
type: integer
minimum: 0
description: A quota on the maximum bytes per-second that each
client group can fetch from a broker before the clients in the
group are throttled. Defined on a per-broker basis.
producerByteRate:
type: integer
minimum: 0
description: A quota on the maximum bytes per-second that each
client group can publish to a broker before the clients in the
group are throttled. Defined on a per-broker basis.
requestPercentage:
type: integer
minimum: 0
description: A quota on the maximum CPU utilization of each client
group as a percentage of network and I/O threads.
description: Quotas on requests to control the broker resources used
by clients. Network bandwidth and request rate quotas can be enforced.Kafka
documentation for Kafka User quotas can be found at http://kafka.apache.org/documentation/#design_quotas.
template:
type: object
properties:
secret:
type: object
properties:
metadata:
type: object
properties:
labels:
x-kubernetes-preserve-unknown-fields: true
type: object
description: Labels added to the resource template. Can
be applied to different resources such as `StatefulSets`,
`Deployments`, `Pods`, and `Services`.
annotations:
x-kubernetes-preserve-unknown-fields: true
type: object
description: Annotations added to the resource template.
Can be applied to different resources such as `StatefulSets`,
`Deployments`, `Pods`, and `Services`.
description: Metadata applied to the resource.
description: Template for KafkaUser resources. The template allows
users to specify how the `Secret` with password or TLS certificates
is generated.
description: Template to specify how Kafka User `Secrets` are generated.
description: The specification of the user.
status:
type: object
properties:
conditions:
type: array
items:
type: object
properties:
type:
type: string
description: The unique identifier of a condition, used to distinguish
between other conditions in the resource.
status:
type: string
description: The status of the condition, either True, False
or Unknown.
lastTransitionTime:
type: string
description: Last time the condition of a type changed from
one status to another. The required format is 'yyyy-MM-ddTHH:mm:ssZ',
in the UTC time zone.
reason:
type: string
description: The reason for the condition's last transition
(a single word in CamelCase).
message:
type: string
description: Human-readable message indicating details about
the condition's last transition.
description: List of status conditions.
observedGeneration:
type: integer
description: The generation of the CRD that was last reconciled by
the operator.
username:
type: string
description: Username.
secret:
type: string
description: The name of `Secret` where the credentials are stored.
description: The status of the Kafka User.
- name: v1alpha1
served: true
storage: false
subresources:
status: {}
additionalPrinterColumns:
- name: Cluster
description: The name of the Kafka cluster this user belongs to
jsonPath: .metadata.labels.strimzi\.io/cluster
type: string
- name: Authentication
description: How the user is authenticated
jsonPath: .spec.authentication.type
type: string
- name: Authorization
description: How the user is authorised
jsonPath: .spec.authorization.type
type: string
- name: Ready
description: The state of the custom resource
jsonPath: .status.conditions[?(@.type=="Ready")].status
type: string
schema:
openAPIV3Schema:
type: object
properties:
spec:
type: object
properties:
authentication:
type: object
properties:
type:
type: string
enum:
- tls
- scram-sha-512
description: Authentication type.
required:
- type
description: Authentication mechanism enabled for this Kafka user.
authorization:
type: object
properties:
acls:
type: array
items:
type: object
properties:
host:
type: string
description: The host from which the action described in
the ACL rule is allowed or denied.
operation:
type: string
enum:
- Read
- Write
- Create
- Delete
- Alter
- Describe
- ClusterAction
- AlterConfigs
- DescribeConfigs
- IdempotentWrite
- All
description: 'Operation which will be allowed or denied.
Supported operations are: Read, Write, Create, Delete,
Alter, Describe, ClusterAction, AlterConfigs, DescribeConfigs,
IdempotentWrite and All.'
resource:
type: object
properties:
name:
type: string
description: Name of resource for which given ACL rule
applies. Can be combined with `patternType` field
to use prefix pattern.
patternType:
type: string
enum:
- literal
- prefix
description: Describes the pattern used in the resource
field. The supported types are `literal` and `prefix`.
With `literal` pattern type, the resource field will
be used as a definition of a full name. With `prefix`
pattern type, the resource name will be used only
as a prefix. Default value is `literal`.
type:
type: string
enum:
- topic
- group
- cluster
- transactionalId
description: Resource type. The available resource types
are `topic`, `group`, `cluster`, and `transactionalId`.
required:
- type
description: Indicates the resource for which given ACL
rule applies.
type:
type: string
enum:
- allow
- deny
description: The type of the rule. Currently the only supported
type is `allow`. ACL rules with type `allow` are used
to allow user to execute the specified operations. Default
value is `allow`.
required:
- operation
- resource
description: List of ACL rules which should be applied to this
user.
type:
type: string
enum:
- simple
description: Authorization type. Currently the only supported
type is `simple`. `simple` authorization type uses Kafka's `kafka.security.authorizer.AclAuthorizer`
class for authorization.
required:
- acls
- type
description: Authorization rules for this Kafka user.
quotas:
type: object
properties:
consumerByteRate:
type: integer
minimum: 0
description: A quota on the maximum bytes per-second that each
client group can fetch from a broker before the clients in the
group are throttled. Defined on a per-broker basis.
producerByteRate:
type: integer
minimum: 0
description: A quota on the maximum bytes per-second that each
client group can publish to a broker before the clients in the
group are throttled. Defined on a per-broker basis.
requestPercentage:
type: integer
minimum: 0
description: A quota on the maximum CPU utilization of each client
group as a percentage of network and I/O threads.
description: Quotas on requests to control the broker resources used
by clients. Network bandwidth and request rate quotas can be enforced.Kafka
documentation for Kafka User quotas can be found at http://kafka.apache.org/documentation/#design_quotas.
template:
type: object
properties:
secret:
type: object
properties:
metadata:
type: object
properties:
labels:
x-kubernetes-preserve-unknown-fields: true
type: object
description: Labels added to the resource template. Can
be applied to different resources such as `StatefulSets`,
`Deployments`, `Pods`, and `Services`.
annotations:
x-kubernetes-preserve-unknown-fields: true
type: object
description: Annotations added to the resource template.
Can be applied to different resources such as `StatefulSets`,
`Deployments`, `Pods`, and `Services`.
description: Metadata applied to the resource.
description: Template for KafkaUser resources. The template allows
users to specify how the `Secret` with password or TLS certificates
is generated.
description: Template to specify how Kafka User `Secrets` are generated.
description: The specification of the user.
status:
type: object
properties:
conditions:
type: array
items:
type: object
properties:
type:
type: string
description: The unique identifier of a condition, used to distinguish
between other conditions in the resource.
status:
type: string
description: The status of the condition, either True, False
or Unknown.
lastTransitionTime:
type: string
description: Last time the condition of a type changed from
one status to another. The required format is 'yyyy-MM-ddTHH:mm:ssZ',
in the UTC time zone.
reason:
type: string
description: The reason for the condition's last transition
(a single word in CamelCase).
message:
type: string
description: Human-readable message indicating details about
the condition's last transition.
description: List of status conditions.
observedGeneration:
type: integer
description: The generation of the CRD that was last reconciled by
the operator.
username:
type: string
description: Username.
secret:
type: string
description: The name of `Secret` where the credentials are stored.
description: The status of the Kafka User.
| 45.268722 | 123 | 0.450305 |
79319b51aac70a556dedf242a3efdcdc536f2ed5 | 70 | yaml | YAML | deploy/service_account.yaml | kaappi/kaappi-operator | fd8356b4ce79204bd2c2d38e15b50dacea95dc38 | [
"Apache-2.0"
] | null | null | null | deploy/service_account.yaml | kaappi/kaappi-operator | fd8356b4ce79204bd2c2d38e15b50dacea95dc38 | [
"Apache-2.0"
] | null | null | null | deploy/service_account.yaml | kaappi/kaappi-operator | fd8356b4ce79204bd2c2d38e15b50dacea95dc38 | [
"Apache-2.0"
] | null | null | null | apiVersion: v1
kind: ServiceAccount
metadata:
name: kaappi-operator
| 14 | 23 | 0.8 |
7931d8d29cb0c0502277c8564d438c3cc1e6df60 | 5,653 | yaml | YAML | assets/node.yaml | RomanBednar/openstack-cinder-csi-driver-operator | 0488d278dd9b45e36f980e0294b821d4189b80d6 | [
"Apache-2.0"
] | null | null | null | assets/node.yaml | RomanBednar/openstack-cinder-csi-driver-operator | 0488d278dd9b45e36f980e0294b821d4189b80d6 | [
"Apache-2.0"
] | null | null | null | assets/node.yaml | RomanBednar/openstack-cinder-csi-driver-operator | 0488d278dd9b45e36f980e0294b821d4189b80d6 | [
"Apache-2.0"
] | null | null | null | kind: DaemonSet
apiVersion: apps/v1
metadata:
name: openstack-cinder-csi-driver-node
namespace: openshift-cluster-csi-drivers
annotations:
config.openshift.io/inject-proxy: csi-driver
spec:
selector:
matchLabels:
app: openstack-cinder-csi-driver-node
updateStrategy:
type: RollingUpdate
rollingUpdate:
maxUnavailable: 10%
template:
metadata:
labels:
app: openstack-cinder-csi-driver-node
spec:
hostNetwork: true
serviceAccount: openstack-cinder-csi-driver-node-sa
priorityClassName: system-node-critical
nodeSelector:
kubernetes.io/os: linux
tolerations:
- operator: Exists
containers:
- name: csi-driver
securityContext:
privileged: true
capabilities:
add: ["SYS_ADMIN"]
allowPrivilegeEscalation: true
image: ${DRIVER_IMAGE}
imagePullPolicy: IfNotPresent
args :
- /bin/cinder-csi-plugin
- "--nodeid=$(NODE_ID)"
- "--endpoint=$(CSI_ENDPOINT)"
- "--cloud-config=$(CLOUD_CONFIG)"
- "--v=${LOG_LEVEL}"
env:
- name: NODE_ID
valueFrom:
fieldRef:
fieldPath: spec.nodeName
- name: CSI_ENDPOINT
value: unix://csi/csi.sock
- name: CLOUD_CONFIG
value: /etc/kubernetes/config/cloud.conf
volumeMounts:
- name: socket-dir
mountPath: /csi
- name: kubelet-dir
mountPath: /var/lib/kubelet
mountPropagation: "Bidirectional"
- name: pods-probe-dir
mountPath: /dev
mountPropagation: "HostToContainer"
- name: secret-cinderplugin
mountPath: /etc/kubernetes/secret
readOnly: true
- name: config-cinderplugin
mountPath: /etc/kubernetes/config
readOnly: true
- name: cacert
mountPath: /etc/kubernetes/static-pod-resources/configmaps/cloud-config
ports:
- name: healthz
# Due to hostNetwork, this port is open on all nodes!
containerPort: 10300
protocol: TCP
livenessProbe:
httpGet:
path: /healthz
port: healthz
initialDelaySeconds: 10
timeoutSeconds: 10
periodSeconds: 30
failureThreshold: 5
resources:
requests:
memory: 50Mi
cpu: 10m
- name: node-driver-registrar
image: ${NODE_DRIVER_REGISTRAR_IMAGE}
imagePullPolicy: IfNotPresent
args:
- "--v=5"
- "--csi-address=$(ADDRESS)"
- "--kubelet-registration-path=$(DRIVER_REG_SOCK_PATH)"
lifecycle:
preStop:
exec:
command: ["/bin/sh", "-c", "rm -rf /registration/cinder.csi.openstack.org /registration/cinder.csi.openstack.org-reg.sock"]
env:
- name: ADDRESS
value: /csi/csi.sock
- name: DRIVER_REG_SOCK_PATH
value: /var/lib/kubelet/plugins/cinder.csi.openstack.org/csi.sock
- name: KUBE_NODE_NAME
valueFrom:
fieldRef:
fieldPath: spec.nodeName
volumeMounts:
- name: socket-dir
mountPath: /csi
- name: registration-dir
mountPath: /registration
resources:
requests:
memory: 50Mi
cpu: 10m
- name: csi-liveness-probe
image: ${LIVENESS_PROBE_IMAGE}
imagePullPolicy: IfNotPresent
args:
- --csi-address=/csi/csi.sock
- --probe-timeout=10s
- --health-port=10300
- --v=${LOG_LEVEL}
volumeMounts:
- name: socket-dir
mountPath: /csi
resources:
requests:
memory: 50Mi
cpu: 10m
volumes:
- name: socket-dir
hostPath:
path: /var/lib/kubelet/plugins/cinder.csi.openstack.org
type: DirectoryOrCreate
- name: registration-dir
hostPath:
path: /var/lib/kubelet/plugins_registry/
type: Directory
- name: kubelet-dir
hostPath:
path: /var/lib/kubelet
type: Directory
- name: pods-probe-dir
hostPath:
path: /dev
type: Directory
- name: secret-cinderplugin
secret:
secretName: openstack-cloud-credentials
items:
- key: clouds.yaml
path: clouds.yaml
- name: config-cinderplugin
configMap:
name: openstack-cinder-config
items:
- key: cloud.conf
path: cloud.conf
- key: multiaz-cloud.conf
path: multiaz-cloud.conf
- name: cacert
# Extract ca-bundle.pem to /etc/kubernetes/static-pod-resources/configmaps/cloud-config if present.
# Let the pod start when the ConfigMap does not exist or the certificate
# is not preset there. The certificate file will be created once the
# ConfigMap is created / the certificate is added to it.
configMap:
name: cloud-provider-config
items:
- key: ca-bundle.pem
path: ca-bundle.pem
optional: true
| 32.866279 | 139 | 0.525915 |
79324c0fe90c7bc4d21cdf0bd87b3f40a7d1605b | 1,469 | yml | YAML | k8s_watch_deployment_iam.yml | HDFGroup/hsds-bucket-loader | 23ed46a27e43a5ac55be460c6ea00ddbeead7198 | [
"BSD-2-Clause"
] | 2 | 2021-01-19T17:19:40.000Z | 2022-01-30T09:05:04.000Z | k8s_watch_deployment_iam.yml | HDFGroup/hsds-bucket-loader | 23ed46a27e43a5ac55be460c6ea00ddbeead7198 | [
"BSD-2-Clause"
] | null | null | null | k8s_watch_deployment_iam.yml | HDFGroup/hsds-bucket-loader | 23ed46a27e43a5ac55be460c6ea00ddbeead7198 | [
"BSD-2-Clause"
] | null | null | null | apiVersion: apps/v1
kind: Deployment
metadata:
labels:
app: hsds-bucket-watch
name: hsds-bucket-watch
spec:
replicas: 1
selector:
matchLabels:
app: hsds-bucket-watch
template:
metadata:
labels:
app: hsds-bucket-watch
spec:
serviceAccountName: hsds-eks-policy
containers:
-
name: watch
image: hdfgroup/bucket_loader:v0.3
imagePullPolicy: IfNotPresent
resources:
requests:
memory: "128M"
limits:
memory: "256M"
volumeMounts:
- name: bucket-config
mountPath: "/config/config.yml"
subPath: config.yml
env:
- name: RUN_COMMAND
value: watch
- name: PASSWORD_FILE
value: /config/passwd.txt
- name: HS_USERNAME
valueFrom:
secretKeyRef:
name: hs-loader-keys
key: hs_username
- name: HS_PASSWORD
valueFrom:
secretKeyRef:
name: hs-loader-keys
key: hs_password
volumes:
- name: accounts
secret:
secretName: user-password
- name: bucket-config
configMap:
name: hsds-bucket-loader-config
- name: hsds-config
configMap:
name: hsds-config
- name: hsds-override
configMap:
name: hsds-override | 24.898305 | 44 | 0.520762 |
79325ed446384801963fd8b095dc0bc841b3b4af | 79 | yaml | YAML | mlflow-tracking-operator/deploy/service_account.yaml | zhaoxiyi/DancingRobot | d143f9bbff2efb61e830745103b3f1f2f3d15afe | [
"Apache-2.0"
] | 3 | 2019-10-23T06:42:44.000Z | 2019-11-08T14:51:40.000Z | mlflow-tracking-operator/deploy/service_account.yaml | zhaoxiyi/DancingRobot | d143f9bbff2efb61e830745103b3f1f2f3d15afe | [
"Apache-2.0"
] | null | null | null | mlflow-tracking-operator/deploy/service_account.yaml | zhaoxiyi/DancingRobot | d143f9bbff2efb61e830745103b3f1f2f3d15afe | [
"Apache-2.0"
] | 4 | 2019-10-24T07:54:22.000Z | 2019-11-08T14:51:56.000Z | apiVersion: v1
kind: ServiceAccount
metadata:
name: mlflow-tracking-operator
| 15.8 | 32 | 0.810127 |
793271adb456ea9eb57ba615336a5765f511ca19 | 469 | yaml | YAML | k8s/hpa/fc-api-hpa.yaml | juanitotrrj/fc-devops | 530ef4bafd40b2a2aa93679d8638a31f2f762721 | [
"MIT"
] | null | null | null | k8s/hpa/fc-api-hpa.yaml | juanitotrrj/fc-devops | 530ef4bafd40b2a2aa93679d8638a31f2f762721 | [
"MIT"
] | null | null | null | k8s/hpa/fc-api-hpa.yaml | juanitotrrj/fc-devops | 530ef4bafd40b2a2aa93679d8638a31f2f762721 | [
"MIT"
] | null | null | null | kind: HorizontalPodAutoscaler
apiVersion: autoscaling/v2beta1
metadata:
name: fc-api-hpa
namespace: tarroja
labels:
app: fc-api
spec:
scaleTargetRef:
kind: Deployment
name: fc-api
apiVersion: extensions/v1beta1
minReplicas: 1
maxReplicas: 2
metrics:
- type: Resource
resource:
name: memory
targetAverageUtilization: 100
- type: Resource
resource:
name: cpu
targetAverageUtilization: 100
| 19.541667 | 37 | 0.671642 |
7932b4fcf1449772ecba2f8036069ac9f132c365 | 79 | yaml | YAML | platform/new/girder-csa.yaml | astro-friedel/cis-startup | c9b581588bda179687c5c1813e41c43b1cf4b4ac | [
"BSD-3-Clause"
] | null | null | null | platform/new/girder-csa.yaml | astro-friedel/cis-startup | c9b581588bda179687c5c1813e41c43b1cf4b4ac | [
"BSD-3-Clause"
] | null | null | null | platform/new/girder-csa.yaml | astro-friedel/cis-startup | c9b581588bda179687c5c1813e41c43b1cf4b4ac | [
"BSD-3-Clause"
] | null | null | null | apiVersion: v1
kind: ServiceAccount
metadata:
name: cis
namespace: cis-dev
| 13.166667 | 20 | 0.759494 |
7932f1f37214dd55b741242c0636a6bcc052f43d | 701 | yaml | YAML | k8s_helm/01_apps-without-helm/red/red-deployment.yaml | hboshnak/trainings | 49d02999cf6a7d92d852cef4a6d1522ee233657a | [
"Apache-2.0"
] | 24 | 2020-08-04T17:06:58.000Z | 2022-03-31T08:49:11.000Z | k8s_helm/01_apps-without-helm/red/red-deployment.yaml | hboshnak/trainings | 49d02999cf6a7d92d852cef4a6d1522ee233657a | [
"Apache-2.0"
] | 40 | 2020-12-04T10:25:04.000Z | 2021-12-23T11:09:36.000Z | k8s_helm/01_apps-without-helm/red/red-deployment.yaml | hboshnak/trainings | 49d02999cf6a7d92d852cef4a6d1522ee233657a | [
"Apache-2.0"
] | 19 | 2020-07-28T12:21:03.000Z | 2022-01-27T09:36:58.000Z | apiVersion: apps/v1
kind: Deployment
metadata:
name: red
labels:
app: red
spec:
replicas: 1
selector:
matchLabels:
app: red
template:
metadata:
labels:
app: red
spec:
containers:
- name: red
image: nginx:1.19.2
volumeMounts:
- name: html
mountPath: /usr/share/nginx/html
resources:
requests:
cpu: 100m
memory: 100Mi
limits:
cpu: 100m
memory: 100Mi
volumes:
- name: html
configMap:
name: red
items:
- key: body
path: index.html
| 18.945946 | 46 | 0.455064 |
79334022c35ab090b4eb64854a5cbf24387ea8db | 363 | yaml | YAML | k8s/ingress.yaml | pnieto/forotecnoloxico-contenedores-k8s | 14363b678c9232e5b05056b1c9fb9e188870cf55 | [
"Apache-2.0"
] | null | null | null | k8s/ingress.yaml | pnieto/forotecnoloxico-contenedores-k8s | 14363b678c9232e5b05056b1c9fb9e188870cf55 | [
"Apache-2.0"
] | null | null | null | k8s/ingress.yaml | pnieto/forotecnoloxico-contenedores-k8s | 14363b678c9232e5b05056b1c9fb9e188870cf55 | [
"Apache-2.0"
] | null | null | null | apiVersion: networking.k8s.io/v1
kind: Ingress
metadata:
name: echo-ingress
labels:
name: echo-ingress
spec:
tls:
- hosts:
- echo.test
rules:
- host: echo.test
http:
paths:
- pathType: Prefix
path: "/"
backend:
service:
name: echo-service
port:
number: 80
| 16.5 | 32 | 0.515152 |
7933649d866cace549ddcc450b0c309ded12530c | 949 | yaml | YAML | ansible/roles/pool/files/blockValidator.yaml | JPaulMora/grin-pool | c980fdbcae4edeaa661d36d5b6da6f7a49beed05 | [
"Apache-2.0"
] | null | null | null | ansible/roles/pool/files/blockValidator.yaml | JPaulMora/grin-pool | c980fdbcae4edeaa661d36d5b6da6f7a49beed05 | [
"Apache-2.0"
] | null | null | null | ansible/roles/pool/files/blockValidator.yaml | JPaulMora/grin-pool | c980fdbcae4edeaa661d36d5b6da6f7a49beed05 | [
"Apache-2.0"
] | null | null | null | apiVersion: batch/v1beta1
kind: CronJob
metadata:
name: blockvalidator
spec:
schedule: "3 * * * *"
jobTemplate:
spec:
template:
spec:
containers:
- name: blockvalidator
image: funkypenguin/grinpool-services
command: ["/usr/local/bin/blockValidator.py"]
env:
- name: MYSQL_ROOT_PASSWORD
valueFrom:
secretKeyRef:
name: mysql-pass
key: password
# volumeMounts: # directory inside container
# - mountPath: /services
# name: poolservicesdir
# volumes: # directory location on host
# - name: poolservicesdir
# hostPath:
# path: /data/services
imagePullSecrets:
- name: regsecret
restartPolicy: Never
concurrencyPolicy: Replace
successfulJobsHistoryLimit: 0
failedJobsHistoryLimit: 1
| 27.114286 | 57 | 0.559536 |
79338d818040aaa7bb595d94785445ac6784843d | 11,259 | yaml | YAML | itg-tests/es-it/ReeferItgTests.yaml | prafullkotecha/refarch-kc | 22e5d08a2d81260ddf73e9d41dfb4c86467ed74d | [
"Apache-2.0"
] | 30 | 2019-01-17T07:51:53.000Z | 2022-03-22T05:10:46.000Z | itg-tests/es-it/ReeferItgTests.yaml | prafullkotecha/refarch-kc | 22e5d08a2d81260ddf73e9d41dfb4c86467ed74d | [
"Apache-2.0"
] | 23 | 2019-10-01T11:45:33.000Z | 2022-02-06T01:52:20.000Z | itg-tests/es-it/ReeferItgTests.yaml | prafullkotecha/refarch-kc | 22e5d08a2d81260ddf73e9d41dfb4c86467ed74d | [
"Apache-2.0"
] | 31 | 2019-01-29T06:18:07.000Z | 2022-03-19T07:15:23.000Z | apiVersion: batch/v1
kind: Job
metadata:
name: reefer-itgtests-job
spec:
template:
metadata:
name: reefer-itgtests-job
spec:
containers:
- name: ibmcase-python
image: quay.io/ibmcase/kcontainer-python:itgtests
imagePullPolicy: Always
command:
- /bin/bash
- -c
- |
# Obfuscate KAFKA_PASSWORD
if [ "`echo -n ${KAFKA_PASSWORD} | wc -c`" -gt 3 ]; then
FIRST_CH=${KAFKA_PASSWORD:0:1}
LAST_CH=${KAFKA_PASSWORD: -1}
OBFUSCATED_PASSWORD="${FIRST_CH}*****${LAST_CH}"
else
OBFUSCATED_PASSWORD="*******"
fi
echo "-----------------------------------------------------------------"
echo "-- Reefer Container Shipment EDA application Integration Tests --"
echo "-----------------------------------------------------------------"
echo
echo "Executing integrations tests from branch $BRANCH of $GITHUB_REPO"
echo "Kafka Brokers: $KAFKA_BROKERS"
echo "Kafka Security protocol: $SECURITY_PROTOCOL"
echo "Kafka SASL mechanism: $SASL_MECHANISM"
echo "Kafka user: $KAFKA_USER"
echo "Kafka password: $OBFUSCATED_PASSWORD"
echo "Orders topic name: $ITGTESTS_ORDERS_TOPIC"
echo "Order Command topic name: $ITGTESTS_ORDER_COMMANDS_TOPIC"
echo "Containers topic name: $ITGTESTS_CONTAINERS_TOPIC"
echo "------------------------------------------------------------------"
echo
# Check important environments variables are properly set
if [ -z "$KAFKA_BROKERS" ]; then
echo "[ERROR] - KAFKA_BROKERS environment variable must be set."
exit 1
fi
# Check that a Kafka user and password are provided if there is authentication set up
if [ "$SECURITY_PROTOCOL" == "SASL_PLAINTEXT" ] || [ "$SECURITY_PROTOCOL" == "SASL_SSL" ]; then
if [ -z "$KAFKA_USER" ]; then
echo "[ERROR] - A Kafka user was not provided."
exit 1
fi
if [ -z "$KAFKA_PASSWORD" ]; then
echo "[ERROR] - A Kafka password was not provided."
exit 1
fi
fi
# Ideally, we would check here if SECURITY_PROTOCOL is SSL or SASL_SSL which are the two security protocols that use SSL certs.
# However, IBM Event Streams on IBM Cloud uses SASL_SSL but there is no need for a certificate.
# Hence, we can only warn that
if [ "$SECURITY_PROTOCOL" == "SSL" ] || [ "$SECURITY_PROTOCOL" == "SASL_SSL" ]; then
if [ ! -f "$PEM_CERT" ]; then
echo "[WARNING] - A PEM certificate could not be found. This might be necessary to establish the appropriate secured communication to the Kafka cluster."
echo "[WARNING] - If it is needed, make sure you have created a Kubernetes Secret named 'kafka-truststore-pem' with the PEM certificate"
echo "[WARNING] - as referenced in the Integration Tests YAML file."
fi
fi
# Creating the working directory
mkdir ${WORKING_DIR} && cd ${WORKING_DIR}
# Clone the repository where the integration tests to be executed are and checkout the specific branch
git clone ${GITHUB_REPO} && cd ${REPO_NAME} && if [ "master" != "${BRANCH}" ]; then git checkout ${BRANCH}; fi
# Get into the location for the integration tests
cd ${ITGTESTS_LOCATION}
# Execute the integration tests
# Create the tests reporting file
touch /tmp/results.txt
export PYTHONPATH=${PYTHONPATH}:${WORKING_DIR}/${REPO_NAME}/itg-tests
echo '******************************************'
echo '******************************************'
echo '********** E2E Happy Path ************'
echo '******************************************'
echo '******************************************'
python -u E2EHappyPath.py && source /tmp/E2EHappyPath.properties
echo '******************************************'
echo '******************************************'
echo '********* Saga No Container **********'
echo '******************************************'
echo '******************************************'
python -u Saga_NoContainer.py
echo '******************************************'
echo '******************************************'
echo '********** Saga No Voyage ************'
echo '******************************************'
echo '******************************************'
python -u Saga_NoVoyage.py && source /tmp/SagaNoVoyage.properties
echo '******************************************'
echo '******************************************'
echo '********** Order Cancelled ***********'
echo '******************************************'
echo '******************************************'
python -u OrderCancellation.py
echo '******************************************'
echo '******************************************'
echo '********* Container Anomaly **********'
echo '******************************************'
echo '******************************************'
python -u ContainerAnomaly.py
echo '****************************************************'
echo '****************************************************'
echo '********* Retry and Dead Letter Queue **********'
echo '****************************************************'
echo '****************************************************'
python -u ContainerAnomalyDlq.py
echo
echo 'END RESULTS:'
echo
cat /tmp/results.txt
echo "---------"
echo "-- END --"
echo "---------"
env:
# Event Streams Kafka brokers. You MUST create a configmap in advance with the brokers information:
# oc create configmap kafka-brokers --from-literal=brokers='<replace with comma-separated list of brokers>' -n <namespace>
# You can find the list of brokers either in the Event Streams UI or when you login through the CLI: cloudctl es init
- name: KAFKA_BROKERS
valueFrom:
configMapKeyRef:
name: "kafka-brokers"
key: brokers
# Your Event Streams credentials. You can find it in the Event Streams UI on the connect to this cluster link
# You MUST create this secret in advance with the Event Streams username and password:
# kubectl create secret generic eventstreams-cred --from-literal=username='<replace with kafka username>' --from-literal=password='<replace with kafka password>'
- name: KAFKA_USER
valueFrom:
secretKeyRef:
name: "kafka-credentials"
key: username
optional: true
- name: KAFKA_PASSWORD
valueFrom:
secretKeyRef:
name: "kafka-credentials"
key: password
optional: true
# Location of your Event Streams pem certificate for ssl connections. You MUST download it in advance.
# This can be downloaded from the Event Streams UI.
- name: PEM_CERT
value: "/tmp/certs/kafka-cert.pem"
# TODO Documentation TBD
- name: SASL_MECHANISM
value: "PLAIN"
# TODO Documentation TBD
- name: SECURITY_PROTOCOL
value: "SASL_SSL"
# Your working directory within the container
- name: WORKING_DIR
value: "/tmp/github"
# Github repository containing the integration tests to be executed
- name: GITHUB_REPO
value: "https://github.com/ibm-cloud-architecture/refarch-kc.git"
# Specific branch for the integration tests
- name: BRANCH
value: "master"
# Name of the repository
- name: REPO_NAME
value: "refarch-kc"
# Location of the integration tests folder within the repository
- name: ITGTESTS_LOCATION
value: "itg-tests/es-it"
# Order command microservice's service name
- name: ORDER_CMD_MS
value: "order-command-ms:9080"
# Order query microservice's service name
- name: ORDER_QUERY_MS
value: "order-query-ms:9080"
# Container microservice's service name
- name: CONTAINER_SPRING_MS
value: "spring-container-ms:8080"
# Voyage microservice's service name
- name: VOYAGE_MS
value: "voyages-ms:3000"
# Orders topic name
- name: ITGTESTS_ORDERS_TOPIC
#value: "itg-orders"
valueFrom:
configMapKeyRef:
name: kafka-topics
key: ordersTopic
# Order Command topic name
- name: ITGTESTS_ORDER_COMMANDS_TOPIC
#value: "itg-order-commands"
valueFrom:
configMapKeyRef:
name: kafka-topics
key: orderCommandsTopic
# Containers topic name
- name: ITGTESTS_CONTAINERS_TOPIC
#value: "itg-containers"
valueFrom:
configMapKeyRef:
name: kafka-topics
key: containersTopic
# Container anomaly retry topic name
- name: ITGTESTS_CONTAINER_ANOMALY_RETRY_TOPIC
#value: "itg-container-anomaly-retry"
valueFrom:
configMapKeyRef:
name: kafka-topics
key: containerAnomalyRetryTopic
# Container anomaly dead topic name
- name: ITGTESTS_CONTAINER_ANOMALY_DEAD_TOPIC
#value: "itg-container-anomaly-dead"
valueFrom:
configMapKeyRef:
name: kafka-topics
key: containerAnomalyDeadTopic
# Location where the Event Streams pem certificate contained in the eventstreams-pem-file secret will be loaded to.
volumeMounts:
- mountPath: "/tmp/certs"
name: eventstreams-pem-file
volumes:
# You MUST create this secret with the Event Streams pem certificate in advance. First, download the Event Streams pem certificate.
# Then create the secret: oc create secret generic eventstreams-cert-pem --from-file=es-cert.pem=<LOCATION_OF_YOUR_EVENT_STREAMS_PEM_CERTIFICATE> -n <namespace>
- name: eventstreams-pem-file
secret:
secretName: "kafka-truststore-pem"
optional: true
restartPolicy: Never
backoffLimit: 0
| 44.501976 | 171 | 0.490008 |
7933d396501392b91e7b02da8485ea47757b032e | 507 | yaml | YAML | portal de noticias/portal-noticias-replicaset.yaml | lucas-silvs/Kubernetes_II_Alura | 3ed5ff7cb4d0e21889e74d2cfef4a75c2cc3494d | [
"MIT"
] | null | null | null | portal de noticias/portal-noticias-replicaset.yaml | lucas-silvs/Kubernetes_II_Alura | 3ed5ff7cb4d0e21889e74d2cfef4a75c2cc3494d | [
"MIT"
] | null | null | null | portal de noticias/portal-noticias-replicaset.yaml | lucas-silvs/Kubernetes_II_Alura | 3ed5ff7cb4d0e21889e74d2cfef4a75c2cc3494d | [
"MIT"
] | null | null | null | apiVersion: apps/v1
kind: ReplicaSet
metadata:
name: portal-noticias-replicaset
spec:
template:
metadata:
name: portal-de-noticias
labels:
app: portal-noticias
spec:
containers:
- name: portal-conainer
image: aluracursos/portal-noticias:1
ports:
- containerPort: 80
envFrom:
- configMapRef:
name: portal-configmap
replicas: 3
selector:
matchLabels:
app: portal-noticias
| 20.28 | 46 | 0.581854 |
79340804b27aec4df08192c3022ec865a57a519f | 688 | yaml | YAML | infrastructure/jenkins/jenkins.yaml | 9447-team-4/Soteria | 810362686012b60dabc8a138837ad5f9aac44c09 | [
"MIT"
] | null | null | null | infrastructure/jenkins/jenkins.yaml | 9447-team-4/Soteria | 810362686012b60dabc8a138837ad5f9aac44c09 | [
"MIT"
] | 5 | 2021-06-27T11:37:38.000Z | 2021-07-05T10:29:34.000Z | infrastructure/jenkins/jenkins.yaml | 9447-team-4/Soteria | 810362686012b60dabc8a138837ad5f9aac44c09 | [
"MIT"
] | null | null | null | apiVersion: apps/v1
kind: Deployment
metadata:
name: jenkins
spec:
replicas: 1
selector:
matchLabels:
app: jenkins
template:
metadata:
labels:
app: jenkins
spec:
securityContext:
runAsUser: 0
fsGroup: 0
containers:
- name: jenkins
image: jenkins/jenkins:lts
ports:
- name: http-port
containerPort: 8080
- name: jnlp-port
containerPort: 50000
volumeMounts:
- name: jenkins-storage
mountPath: /var/jenkins_home
volumes:
- name: jenkins-storage
persistentVolumeClaim:
claimName: jenkins-pvc
| 20.848485 | 40 | 0.561047 |
79345cc3ebf1a1bba72ae63925e0b2836d3ba3ac | 877 | yaml | YAML | config/manager/manager.yaml | Davoska/cincinnati-operator | a3107f885a3290f10ae24147c27930bbc911f1a0 | [
"Apache-2.0"
] | null | null | null | config/manager/manager.yaml | Davoska/cincinnati-operator | a3107f885a3290f10ae24147c27930bbc911f1a0 | [
"Apache-2.0"
] | null | null | null | config/manager/manager.yaml | Davoska/cincinnati-operator | a3107f885a3290f10ae24147c27930bbc911f1a0 | [
"Apache-2.0"
] | null | null | null | apiVersion: apps/v1
kind: Deployment
metadata:
name: updateservice-operator
spec:
replicas: 1
selector:
matchLabels:
name: updateservice-operator
template:
metadata:
labels:
name: updateservice-operator
spec:
serviceAccountName: updateservice-operator
containers:
- name: updateservice-operator
image: controller:latest
imagePullPolicy: Always
env:
- name: POD_NAME
valueFrom:
fieldRef:
fieldPath: metadata.name
- name: POD_NAMESPACE
valueFrom:
fieldRef:
fieldPath: metadata.namespace
- name: OPERATOR_NAME
value: "updateservice-operator"
- name: RELATED_IMAGE_OPERAND
value: "quay.io/cincinnati/cincinnati:latest"
| 26.575758 | 59 | 0.575827 |
7934618e760fb288d3a3931b2bf0659b82ab3eee | 199 | yaml | YAML | manifests/medicines-api/base/service.yaml | uk-gov-mirror/MHRA.products | 1628abd2086943c728668a1fd9dcbe134abece55 | [
"MIT"
] | 10 | 2019-12-06T15:35:07.000Z | 2022-02-16T18:04:31.000Z | manifests/medicines-api/base/service.yaml | uk-gov-mirror/MHRA.products | 1628abd2086943c728668a1fd9dcbe134abece55 | [
"MIT"
] | 567 | 2019-12-04T14:17:17.000Z | 2022-02-17T20:47:59.000Z | manifests/medicines-api/base/service.yaml | uk-gov-mirror/MHRA.products | 1628abd2086943c728668a1fd9dcbe134abece55 | [
"MIT"
] | 12 | 2019-12-10T14:59:57.000Z | 2022-01-16T09:43:12.000Z | apiVersion: v1
kind: Service
metadata:
name: medicines-api
labels:
app: medicines-api
spec:
ports:
- port: 80
targetPort: 8000
name: http
selector:
app: medicines-api
| 14.214286 | 22 | 0.643216 |
7934bb8e2ffe7d939acf61b5dedb7e4fc16981b3 | 254 | yaml | YAML | prow/cluster/hook_service.yaml | jacob-delgado/test-infra | 8289b92190e512792e0a4ee0ef9807934633d5df | [
"Apache-2.0"
] | 61 | 2017-05-26T00:07:10.000Z | 2021-09-23T13:06:42.000Z | prow/cluster/hook_service.yaml | jacob-delgado/test-infra | 8289b92190e512792e0a4ee0ef9807934633d5df | [
"Apache-2.0"
] | 3,300 | 2017-04-13T19:26:26.000Z | 2022-03-31T22:02:45.000Z | prow/cluster/hook_service.yaml | jacob-delgado/test-infra | 8289b92190e512792e0a4ee0ef9807934633d5df | [
"Apache-2.0"
] | 171 | 2017-04-13T19:09:05.000Z | 2022-03-28T13:12:20.000Z | apiVersion: v1
kind: Service
metadata:
labels:
app: hook
app.kubernetes.io/part-of: prow
name: hook
namespace: default
spec:
selector:
app: hook
ports:
- name: main
port: 8888
- name: metrics
port: 9090
type: NodePort
| 14.111111 | 35 | 0.645669 |
7934bee0dbf7d776a876e1452bf0e21619732a6f | 497 | yaml | YAML | experimental/addons/kubeflow/resources/ClusterRole-206.yaml | jrkeen/catalog | 750f329164816f0bdacfe8a39e5c9c9a93cf6c41 | [
"Apache-2.0"
] | 65 | 2020-05-27T03:36:33.000Z | 2022-03-23T09:50:59.000Z | experimental/addons/kubeflow/resources/ClusterRole-206.yaml | jrkeen/catalog | 750f329164816f0bdacfe8a39e5c9c9a93cf6c41 | [
"Apache-2.0"
] | 76 | 2020-05-29T09:14:26.000Z | 2022-03-28T14:31:33.000Z | experimental/addons/kubeflow/resources/ClusterRole-206.yaml | jrkeen/catalog | 750f329164816f0bdacfe8a39e5c9c9a93cf6c41 | [
"Apache-2.0"
] | 61 | 2020-05-26T03:19:48.000Z | 2022-03-24T21:57:12.000Z | apiVersion: rbac.authorization.k8s.io/v1
kind: ClusterRole
metadata:
labels:
app.kubernetes.io/component: knative-eventing
app.kubernetes.io/name: knative-eventing
eventing.knative.dev/release: v0.22.1
kustomize.component: knative
rbac.authorization.k8s.io/aggregate-to-admin: "true"
rbac.authorization.kubeflow.org/aggregate-to-kubeflow-admin: "true"
name: knative-flows-namespaced-admin
rules:
- apiGroups:
- flows.knative.dev
resources:
- '*'
verbs:
- '*'
| 26.157895 | 71 | 0.730382 |
7934dd01f92cac6959e74bd8cb52d3f0c90c2b02 | 1,008 | yaml | YAML | docker/kubernetes/sawtooth-create-pbft-keys.yaml | RomarQ/sawtooth-core | b900f4f3a2ffda9f6fb32a57fd4eacc41be86e5a | [
"Apache-2.0"
] | 1,530 | 2016-05-07T16:13:52.000Z | 2022-03-30T04:32:48.000Z | docker/kubernetes/sawtooth-create-pbft-keys.yaml | RomarQ/sawtooth-core | b900f4f3a2ffda9f6fb32a57fd4eacc41be86e5a | [
"Apache-2.0"
] | 906 | 2016-05-11T16:45:17.000Z | 2022-01-27T19:24:21.000Z | docker/kubernetes/sawtooth-create-pbft-keys.yaml | RomarQ/sawtooth-core | b900f4f3a2ffda9f6fb32a57fd4eacc41be86e5a | [
"Apache-2.0"
] | 891 | 2016-05-11T16:45:32.000Z | 2022-03-20T07:25:46.000Z | # Copyright 2019 Cargill Incorporated
#
# Licensed under the Apache License, Version 2.0 (the License);
# you may not use this file except in compliance with the License.
# You may obtain a copy of the License at
#
# http://www.apache.org/licenses/LICENSE-2.0
#
# Unless required by applicable law or agreed to in writing, software
# distributed under the License is distributed on an AS IS BASIS,
# WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
# See the License for the specific language governing permissions and
# limitations under the License.
apiVersion: batch/v1
kind: Job
metadata:
name: pbft-keys
spec:
template:
spec:
containers:
- name: pbft-keys-generator
image: hyperledger/sawtooth-shell
command:
- bash
args:
- -c
- "for i in {0..4}; do sawadm keygen -q pbft${i}; done && cd /etc/sawtooth/keys/ && grep '' * | sed 's/\\.//' | sed 's/:/:\ /'"
restartPolicy: Never
backoffLimit: 4
| 31.5 | 137 | 0.670635 |
7934e02d99b1827d3256446e97c95c80381d56d9 | 757 | yaml | YAML | nfs-server/nfs-server-rc.yaml | adlrocha/fabric-on-kubernetes | 17574b75b32b992edad3c2ae442d50290af51af8 | [
"Apache-2.0"
] | 23 | 2018-04-25T07:42:06.000Z | 2022-03-04T03:18:15.000Z | nfs-server/nfs-server-rc.yaml | fushui-Fang/fabric-on-kubernetes | 17574b75b32b992edad3c2ae442d50290af51af8 | [
"Apache-2.0"
] | 3 | 2018-09-11T06:14:51.000Z | 2021-04-28T13:55:43.000Z | nfs-server/nfs-server-rc.yaml | fushui-Fang/fabric-on-kubernetes | 17574b75b32b992edad3c2ae442d50290af51af8 | [
"Apache-2.0"
] | 13 | 2018-06-15T00:54:28.000Z | 2022-01-26T03:35:45.000Z | apiVersion: v1
kind: ReplicationController
metadata:
name: nfs-server
spec:
replicas: 1
selector:
role: nfs-server
template:
metadata:
labels:
role: nfs-server
spec:
containers:
- name: nfs-server
image: gcr.io/google_containers/volume-nfs:0.8
ports:
- name: nfs
containerPort: 2049
- name: mountd
containerPort: 20048
- name: rpcbind
containerPort: 111
securityContext:
privileged: true
volumeMounts:
- mountPath: /exports
name: nfs-export-fast
volumes:
- name: nfs-export-fast
persistentVolumeClaim:
claimName: nfs-server-pvc-fast
| 22.939394 | 54 | 0.554822 |
79353be9fa011fd658d4a57999e1e362bf4c33b6 | 582 | yaml | YAML | deploy/kubernetes/csi-config-map.yaml | antmoveh/carina | 6b2df56d8fa16cb616a6c8f449b754690486df2e | [
"Apache-2.0"
] | 267 | 2021-08-18T10:54:31.000Z | 2022-03-31T17:00:41.000Z | deploy/kubernetes/csi-config-map.yaml | antmoveh/carina | 6b2df56d8fa16cb616a6c8f449b754690486df2e | [
"Apache-2.0"
] | 32 | 2021-08-20T09:37:52.000Z | 2022-03-04T05:45:01.000Z | deploy/kubernetes/csi-config-map.yaml | antmoveh/carina | 6b2df56d8fa16cb616a6c8f449b754690486df2e | [
"Apache-2.0"
] | 32 | 2021-08-19T07:08:49.000Z | 2022-03-17T14:48:19.000Z | ---
apiVersion: v1
kind: ConfigMap
metadata:
name: carina-csi-config
namespace: kube-system
labels:
class: carina
data:
config.json: |-
{
"diskSelector": [
{
"name": "carina-vg-ssd" ,
"re": ["loop2+"],
"policy": "LVM",
"nodeLabel": "kubernetes.io/hostname"
},
{
"name": "carina-vg-hdd",
"re": ["loop3+"],
"policy": "LVM",
"nodeLabel": "kubernetes.io/hostname"
}
],
"diskScanInterval": "300",
"schedulerStrategy": "spreadout"
} | 20.785714 | 47 | 0.479381 |
7935798979dbaef9f0f45e99c46cd0ae51d57539 | 1,107 | yaml | YAML | deployments/fpga_admissionwebhook/base/intel-fpga-webhook-deployment.yaml | todaywasawesome/intel-device-plugins-for-kubernetes | 96d9e642e1ef053f1ac8092450288b8a54a42c3d | [
"Apache-2.0"
] | 1 | 2020-08-03T05:28:26.000Z | 2020-08-03T05:28:26.000Z | deployments/fpga_admissionwebhook/base/intel-fpga-webhook-deployment.yaml | morganyvm/intel-device-plugins-for-kubernetes | 06f0aeb5ab4351c62aa3e4f36c654534dad00b6c | [
"Apache-2.0"
] | null | null | null | deployments/fpga_admissionwebhook/base/intel-fpga-webhook-deployment.yaml | morganyvm/intel-device-plugins-for-kubernetes | 06f0aeb5ab4351c62aa3e4f36c654534dad00b6c | [
"Apache-2.0"
] | null | null | null | apiVersion: apps/v1
kind: Deployment
metadata:
name: intel-fpga-webhook-deployment
labels:
app: intel-fpga-webhook
spec:
replicas: 1
selector:
matchLabels:
app: intel-fpga-webhook
template:
metadata:
labels:
app: intel-fpga-webhook
spec:
containers:
- name: fpga-mutator
image: intel/intel-fpga-admissionwebhook:devel
imagePullPolicy: IfNotPresent
ports:
- containerPort: 8443
name: webhook-api
securityContext:
runAsNonRoot: true
runAsUser: 3210
runAsGroup: 3210
readOnlyRootFilesystem: true
args:
- -tls-cert-file=/etc/webhook/certs/cert.pem
- -tls-private-key-file=/etc/webhook/certs/key.pem
- -mode=preprogrammed
- -v=1
volumeMounts:
- name: webhook-certs
mountPath: /etc/webhook/certs
readOnly: true
volumes:
- name: webhook-certs
secret:
secretName: intel-fpga-webhook-certs
| 26.357143 | 62 | 0.559169 |
793585841cc54da568972aabc416562fe5eb3a33 | 654 | yaml | YAML | install/0000_00_cluster-version-operator_00_namespace.yaml | mcoops/cluster-version-operator | bc972aafe17f22b0f7f9f6552a327196c77dddf8 | [
"Apache-2.0"
] | null | null | null | install/0000_00_cluster-version-operator_00_namespace.yaml | mcoops/cluster-version-operator | bc972aafe17f22b0f7f9f6552a327196c77dddf8 | [
"Apache-2.0"
] | null | null | null | install/0000_00_cluster-version-operator_00_namespace.yaml | mcoops/cluster-version-operator | bc972aafe17f22b0f7f9f6552a327196c77dddf8 | [
"Apache-2.0"
] | null | null | null | apiVersion: v1
kind: Namespace
metadata:
name: openshift-cluster-version
annotations:
kubernetes.io/description: The cluster-version operator manages OpenShift updates and reconciles core resources and cluster operators.
include.release.openshift.io/self-managed-high-availability: "true"
openshift.io/node-selector: ""
workload.openshift.io/allowed: "management"
labels:
name: openshift-cluster-version
openshift.io/run-level: "1"
openshift.io/cluster-monitoring: "true"
pod-security.kubernetes.io/enforce: privileged
pod-security.kubernetes.io/audit: privileged
pod-security.kubernetes.io/warn: privileged
| 38.470588 | 138 | 0.767584 |
79359be0c2db51a67d3bb8bba5ee790e589df1f0 | 89 | yaml | YAML | namespaces/ns-ip-pub.yaml | preinking/flux-quanby | f86202b987a565f6a8c44e00951270f6a01ed616 | [
"Apache-2.0"
] | null | null | null | namespaces/ns-ip-pub.yaml | preinking/flux-quanby | f86202b987a565f6a8c44e00951270f6a01ed616 | [
"Apache-2.0"
] | null | null | null | namespaces/ns-ip-pub.yaml | preinking/flux-quanby | f86202b987a565f6a8c44e00951270f6a01ed616 | [
"Apache-2.0"
] | null | null | null | apiVersion: v1
kind: Namespace
metadata:
labels:
name: ns-ip-pub
name: ns-ip-pub
| 12.714286 | 19 | 0.685393 |
7935bef27cf703866bc12442c7cb1ceaee702e60 | 370 | yaml | YAML | install/tekton-ing.yaml | gitcpu-io/install-jx-gitlab | 933ca634bb7e3f7b26bf94a26bc9cc291d323478 | [
"Apache-2.0"
] | null | null | null | install/tekton-ing.yaml | gitcpu-io/install-jx-gitlab | 933ca634bb7e3f7b26bf94a26bc9cc291d323478 | [
"Apache-2.0"
] | null | null | null | install/tekton-ing.yaml | gitcpu-io/install-jx-gitlab | 933ca634bb7e3f7b26bf94a26bc9cc291d323478 | [
"Apache-2.0"
] | null | null | null | apiVersion: networking.k8s.io/v1
kind: Ingress
metadata:
name: tekton-dashboard
namespace: tekton-pipelines
spec:
rules:
- host: tekton-jx.devopsman.io
http:
paths:
- pathType: ImplementationSpecific
backend:
service:
name: tekton-dashboard
port:
number: 9097
| 21.764706 | 44 | 0.559459 |
7936019261b64ef3e760a3c2049df769a45cd1d0 | 824 | yaml | YAML | bins/challenges_qualifiers/NRFIN_00033/pov/cyborg-seeder.yaml | ucsb-seclab/hacrs-input-generator | 7de089518541e3d0841622bcd3c950c7d83adc33 | [
"BSD-2-Clause"
] | 3 | 2019-12-20T02:04:42.000Z | 2019-12-20T02:04:51.000Z | bins/challenges_qualifiers/NRFIN_00033/pov/cyborg-seeder.yaml | ucsb-seclab/hacrs-input-generator | 7de089518541e3d0841622bcd3c950c7d83adc33 | [
"BSD-2-Clause"
] | null | null | null | bins/challenges_qualifiers/NRFIN_00033/pov/cyborg-seeder.yaml | ucsb-seclab/hacrs-input-generator | 7de089518541e3d0841622bcd3c950c7d83adc33 | [
"BSD-2-Clause"
] | null | null | null | apiVersion: v1
kind: Pod
metadata:
name: cyborg-seeder-qualifiers-nrfin00033
labels:
type: cyborg-seeder
spec: # specification of the pod's contents
restartPolicy: Never #OnFailure
imagePullSecrets:
- name: ucsbseclab-dockerhub
volumes:
- name: cyborg-results
persistentVolumeClaim:
claimName: cyborg-results
containers:
- name: cyborg-seeder-qualifiers-nrfin00033
stdin: true
tty: true
image: "zardus/research:cyborg-generator"
command: ["/bin/bash", "-c", "python /home/angr/cyborg-generator/kubernetes_seeder.py qualifiers NRFIN_00033 3600 6"]
imagePullPolicy: Always
volumeMounts:
- name: cyborg-results
mountPath: "/results"
resources:
limits:
cpu: 1
memory: 10Gi
requests:
cpu: 1
memory: 10Gi
| 20.6 | 121 | 0.67233 |
793606f8284e4c300e5b527b3fa0a05496c8fe96 | 279 | yaml | YAML | postgres/templates/services.yaml | ruchir15/exercises | 686d97a92a0ec0f0daa84f365920b53847cc02ab | [
"MIT"
] | null | null | null | postgres/templates/services.yaml | ruchir15/exercises | 686d97a92a0ec0f0daa84f365920b53847cc02ab | [
"MIT"
] | 3 | 2022-02-13T21:00:07.000Z | 2022-02-27T10:43:26.000Z | postgres/templates/services.yaml | ruchir15/exercises | 686d97a92a0ec0f0daa84f365920b53847cc02ab | [
"MIT"
] | null | null | null | apiVersion: v1
kind: Service
metadata:
name: 'postgres'
labels:
app: 'postgres'
namespace: '{{ .Values.POSTGRES_NS }}'
spec:
type: ClusterIP
ports:
- port: 5432
targetPort: http-db
# protocol: TCP
name: port-12
selector:
app: postgres
| 16.411765 | 40 | 0.616487 |
793686b6b4f440acce975c19317b6a2c63af6017 | 194 | yaml | YAML | operator/pkg/helmreconciler/testdata/configmap-changed.yaml | kyoujuro/istio | 29cc1d05ff4a7c77b21f6bd88003f6510bc25e36 | [
"Apache-2.0"
] | 43 | 2020-07-15T18:41:57.000Z | 2022-03-31T08:23:38.000Z | operator/pkg/helmreconciler/testdata/configmap-changed.yaml | kyoujuro/istio | 29cc1d05ff4a7c77b21f6bd88003f6510bc25e36 | [
"Apache-2.0"
] | 310 | 2020-06-23T10:25:49.000Z | 2022-03-31T09:27:09.000Z | operator/pkg/helmreconciler/testdata/configmap-changed.yaml | kyoujuro/istio | 29cc1d05ff4a7c77b21f6bd88003f6510bc25e36 | [
"Apache-2.0"
] | 55 | 2020-07-14T01:31:42.000Z | 2022-03-29T07:51:33.000Z | apiVersion: v1
kind: ConfigMap
metadata:
name: config
namespace: istio-system
data:
# Can't delete a field until we mandate >= Kube 1.16. See ApplyObject comments.
field: two
new: new
| 19.4 | 81 | 0.721649 |
7936c013c6c04537434f2850007858cc3635591a | 354 | yml | YAML | k8s_oom_events/cluster-role.yml | infwonder/kubernetes-course | 9db9706ce15db4bf32ab36b3f18ed5b7f6dfdfe5 | [
"MIT"
] | null | null | null | k8s_oom_events/cluster-role.yml | infwonder/kubernetes-course | 9db9706ce15db4bf32ab36b3f18ed5b7f6dfdfe5 | [
"MIT"
] | null | null | null | k8s_oom_events/cluster-role.yml | infwonder/kubernetes-course | 9db9706ce15db4bf32ab36b3f18ed5b7f6dfdfe5 | [
"MIT"
] | null | null | null | ---
apiVersion: rbac.authorization.k8s.io/v1
kind: ClusterRole
metadata:
name: kubernetes-oom-event-generator
rules:
- apiGroups:
- ""
resources:
- events
- pods
- pods/status
verbs:
- get
- list
- watch
- apiGroups:
- ""
resources:
- events
verbs:
- create
- patch
| 14.75 | 40 | 0.531073 |
7936d0d37ce99db8bec04940e7222fad020e90eb | 208 | yaml | YAML | .github/tekton/shared-storage.yaml | kubesphere-sigs/ks-releaser | 90a51c55d2681cb7f0f51120067ae95aa5976188 | [
"Apache-2.0"
] | 7 | 2021-11-07T12:07:13.000Z | 2021-12-21T20:37:33.000Z | .github/tekton/shared-storage.yaml | kubesphere-sigs/ks-releaser | 90a51c55d2681cb7f0f51120067ae95aa5976188 | [
"Apache-2.0"
] | 72 | 2021-11-01T13:21:37.000Z | 2022-03-31T12:22:47.000Z | .github/tekton/shared-storage.yaml | kubesphere-sigs/ks-releaser | 90a51c55d2681cb7f0f51120067ae95aa5976188 | [
"Apache-2.0"
] | 3 | 2021-11-03T02:45:02.000Z | 2021-11-07T21:52:11.000Z | apiVersion: v1
kind: PersistentVolumeClaim
metadata:
name: ks-releaser-source-shared-storage
spec:
resources:
requests:
storage: 16Mi
volumeMode: Filesystem
accessModes:
- ReadWriteOnce
| 17.333333 | 41 | 0.740385 |
793706f9496355d08a158c75c27eac729aa1e017 | 144 | yaml | YAML | built-in-references/Kubernetes/perf/violations/violation1000.yaml | sw47/azure-policy | 4a38e4cb4047b5364902653f0defe45f1b21bc61 | [
"MIT"
] | null | null | null | built-in-references/Kubernetes/perf/violations/violation1000.yaml | sw47/azure-policy | 4a38e4cb4047b5364902653f0defe45f1b21bc61 | [
"MIT"
] | null | null | null | built-in-references/Kubernetes/perf/violations/violation1000.yaml | sw47/azure-policy | 4a38e4cb4047b5364902653f0defe45f1b21bc61 | [
"MIT"
] | null | null | null | apiVersion: v1
kind: Pod
metadata:
name: image-demo-1000
spec:
containers:
- name: nginx
image: nginx #ritaacr.azurecr.io/nginx:latest | 18 | 49 | 0.722222 |
79370761c778d7b39d7aca0440459cb64402a444 | 229 | yaml | YAML | python/python-guestbook/src/backend/kubernetes-manifests/guestbook-mongodb.service.yaml | davidponder/cloud-code-samples | 9d7f08e48fd8355c31ac428ff660a24bf1bef742 | [
"0BSD"
] | 319 | 2019-03-29T02:21:27.000Z | 2022-03-12T00:03:32.000Z | python/python-guestbook/src/backend/kubernetes-manifests/guestbook-mongodb.service.yaml | davidponder/cloud-code-samples | 9d7f08e48fd8355c31ac428ff660a24bf1bef742 | [
"0BSD"
] | 779 | 2019-03-29T16:53:09.000Z | 2022-03-31T18:48:08.000Z | python/python-guestbook/src/backend/kubernetes-manifests/guestbook-mongodb.service.yaml | davidponder/cloud-code-samples | 9d7f08e48fd8355c31ac428ff660a24bf1bef742 | [
"0BSD"
] | 182 | 2019-03-29T14:17:33.000Z | 2022-03-14T22:31:12.000Z | apiVersion: v1
kind: Service
metadata:
name: python-guestbook-mongodb
labels:
app: python-guestbook
tier: db
spec:
ports:
- port: 27017
targetPort: 27017
selector:
app: python-guestbook
tier: db
| 15.266667 | 32 | 0.663755 |
793735bd2e9bd3eed7502c1d6afc8cec2d8d6940 | 491 | yaml | YAML | kubeflow-deployments/private-blueprint/.build/kubeflow-apps/rbac.authorization.k8s.io_v1_role_ml-pipeline.yaml | jlewi/kubeflow-dev | 5e5093e182a277e8518b1a8abcccb05d20466d35 | [
"Apache-2.0"
] | 5 | 2018-07-17T08:32:53.000Z | 2020-12-11T01:26:06.000Z | kubeflow-deployments/private-blueprint/.build/kubeflow-apps/rbac.authorization.k8s.io_v1_role_ml-pipeline.yaml | jlewi/kubeflow-dev | 5e5093e182a277e8518b1a8abcccb05d20466d35 | [
"Apache-2.0"
] | 16 | 2019-04-14T17:53:46.000Z | 2022-03-02T09:58:52.000Z | kubeflow-deployments/private-blueprint/.build/kubeflow-apps/rbac.authorization.k8s.io_v1_role_ml-pipeline.yaml | jlewi/kubeflow-dev | 5e5093e182a277e8518b1a8abcccb05d20466d35 | [
"Apache-2.0"
] | 10 | 2018-03-06T23:13:21.000Z | 2020-06-26T06:50:10.000Z | apiVersion: rbac.authorization.k8s.io/v1
kind: Role
metadata:
name: ml-pipeline
namespace: kubeflow
labels:
app: ml-pipeline
rules:
- resources:
- pods
apiGroups:
- ""
verbs:
- get
- list
- delete
- resources:
- workflows
apiGroups:
- argoproj.io
verbs:
- create
- get
- list
- watch
- update
- patch
- delete
- resources:
- scheduledworkflows
apiGroups:
- kubeflow.org
verbs:
- create
- get
- list
- update
- patch
- delete
| 12.275 | 40 | 0.619145 |
79378d5c82f690da044dc80916c63f2ca33935a0 | 259 | yaml | YAML | yml/chpt19_promethus/5_prometheus-svc.yaml | Cerberus2077/k8s-ops | 8534a0a9c0cc55725e35e26ce76a056c2ff27322 | [
"MIT"
] | null | null | null | yml/chpt19_promethus/5_prometheus-svc.yaml | Cerberus2077/k8s-ops | 8534a0a9c0cc55725e35e26ce76a056c2ff27322 | [
"MIT"
] | null | null | null | yml/chpt19_promethus/5_prometheus-svc.yaml | Cerberus2077/k8s-ops | 8534a0a9c0cc55725e35e26ce76a056c2ff27322 | [
"MIT"
] | null | null | null | apiVersion: v1
kind: Service
metadata:
name: prometheus
namespace: monitor-sa
labels:
app: prometheus
spec:
type: NodePort
ports:
- port: 9090
targetPort: 9090
protocol: TCP
selector:
app: prometheus
component: server
| 14.388889 | 23 | 0.664093 |
79379f256a17e2cb1871b1867911832a7d99990a | 494 | yaml | YAML | kubernetes/post-tweet.yaml | AaronGrainer/gpt2-twitter-kubernetes | a33feb86231950dde5ee943bf5cfaf3915a23db2 | [
"Apache-2.0"
] | 3 | 2020-05-06T19:52:49.000Z | 2020-08-16T18:51:52.000Z | kubernetes/post-tweet.yaml | AaronGrainer/gpt2-twitter-kubernetes | a33feb86231950dde5ee943bf5cfaf3915a23db2 | [
"Apache-2.0"
] | 19 | 2020-05-05T17:41:37.000Z | 2021-05-27T14:22:58.000Z | kubernetes/post-tweet.yaml | AaronGrainer/gpt2-twitter-kubernetes | a33feb86231950dde5ee943bf5cfaf3915a23db2 | [
"Apache-2.0"
] | null | null | null | apiVersion: batch/v1beta1
kind: CronJob
metadata:
name: gpt2-post-tweet
namespace: gpt2-twitter
labels:
app: gpt2-twitter
spec:
schedule: "0 9 * * *"
jobTemplate:
spec:
template:
spec:
restartPolicy: Never
containers:
- name: gpt2-post-tweet
image: docker.io/aarongrainer/gpt2-post-tweet
command: ["python", "-m", "src.scripts.post_tweets"]
successfulJobsHistoryLimit: 3
failedJobsHistoryLimit: 1
| 23.52381 | 67 | 0.621457 |
7937cf13725631e7c71e713836d0cf8e50ff540c | 112 | yaml | YAML | deployments/ingress/namespace.yaml | valep27/kubernetes-tutorial | 3bca9d4f6ea0b6415bb63fe605b2354ec23f8a23 | [
"MIT"
] | 2 | 2018-05-02T08:17:14.000Z | 2018-05-02T08:17:54.000Z | deployments/ingress/namespace.yaml | valep27/kubernetes-tutorial | 3bca9d4f6ea0b6415bb63fe605b2354ec23f8a23 | [
"MIT"
] | null | null | null | deployments/ingress/namespace.yaml | valep27/kubernetes-tutorial | 3bca9d4f6ea0b6415bb63fe605b2354ec23f8a23 | [
"MIT"
] | null | null | null | # define a namespace for ingress-related elements
apiVersion: v1
kind: Namespace
metadata:
name: ingress-nginx | 22.4 | 49 | 0.803571 |
7938029f0dcf951a83127d54ad1081756b3efb16 | 117 | yaml | YAML | clusters/staging/config-maps/cell-vars.yaml | zhirafovod/flux2-kustomize-helm-example | 6fbd4e65dbaef2d58cc333d581ddb8bb3b024bd6 | [
"Apache-2.0"
] | null | null | null | clusters/staging/config-maps/cell-vars.yaml | zhirafovod/flux2-kustomize-helm-example | 6fbd4e65dbaef2d58cc333d581ddb8bb3b024bd6 | [
"Apache-2.0"
] | null | null | null | clusters/staging/config-maps/cell-vars.yaml | zhirafovod/flux2-kustomize-helm-example | 6fbd4e65dbaef2d58cc333d581ddb8bb3b024bd6 | [
"Apache-2.0"
] | null | null | null | apiVersion: v1
kind: ConfigMap
metadata:
name: cell-vars
namespace: flux-system
data:
some_hostname_var: "bar"
| 14.625 | 26 | 0.752137 |
793837a38800536f1381e204eb02a06a5bc3b40b | 20,861 | yaml | YAML | manifests/operatorconfiguration.crd.yaml | RossVertizan/postgres-operator | eac8f47859c857ad375e73d265d03bbf1480a9cc | [
"MIT"
] | null | null | null | manifests/operatorconfiguration.crd.yaml | RossVertizan/postgres-operator | eac8f47859c857ad375e73d265d03bbf1480a9cc | [
"MIT"
] | null | null | null | manifests/operatorconfiguration.crd.yaml | RossVertizan/postgres-operator | eac8f47859c857ad375e73d265d03bbf1480a9cc | [
"MIT"
] | null | null | null | apiVersion: apiextensions.k8s.io/v1
kind: CustomResourceDefinition
metadata:
name: operatorconfigurations.acid.zalan.do
spec:
group: acid.zalan.do
names:
kind: OperatorConfiguration
listKind: OperatorConfigurationList
plural: operatorconfigurations
singular: operatorconfiguration
shortNames:
- opconfig
categories:
- all
scope: Namespaced
versions:
- name: v1
served: true
storage: true
subresources:
status: {}
additionalPrinterColumns:
- name: Image
type: string
description: Spilo image to be used for Pods
jsonPath: .configuration.docker_image
- name: Cluster-Label
type: string
description: Label for K8s resources created by operator
jsonPath: .configuration.kubernetes.cluster_name_label
- name: Service-Account
type: string
description: Name of service account to be used
jsonPath: .configuration.kubernetes.pod_service_account_name
- name: Min-Instances
type: integer
description: Minimum number of instances per Postgres cluster
jsonPath: .configuration.min_instances
- name: Age
type: date
jsonPath: .metadata.creationTimestamp
schema:
openAPIV3Schema:
type: object
required:
- kind
- apiVersion
- configuration
properties:
kind:
type: string
enum:
- OperatorConfiguration
apiVersion:
type: string
enum:
- acid.zalan.do/v1
configuration:
type: object
properties:
docker_image:
type: string
default: "registry.opensource.zalan.do/acid/spilo-14:2.1-p2"
enable_crd_validation:
type: boolean
default: true
enable_lazy_spilo_upgrade:
type: boolean
default: false
enable_pgversion_env_var:
type: boolean
default: true
enable_shm_volume:
type: boolean
default: true
enable_spilo_wal_path_compat:
type: boolean
default: false
etcd_host:
type: string
default: ""
kubernetes_use_configmaps:
type: boolean
default: false
max_instances:
type: integer
minimum: -1 # -1 = disabled
default: -1
min_instances:
type: integer
minimum: -1 # -1 = disabled
default: -1
resync_period:
type: string
default: "30m"
repair_period:
type: string
default: "5m"
set_memory_request_to_limit:
type: boolean
default: false
sidecar_docker_images:
type: object
additionalProperties:
type: string
sidecars:
type: array
nullable: true
items:
type: object
x-kubernetes-preserve-unknown-fields: true
workers:
type: integer
minimum: 1
default: 8
users:
type: object
properties:
replication_username:
type: string
default: standby
super_username:
type: string
default: postgres
major_version_upgrade:
type: object
properties:
major_version_upgrade_mode:
type: string
default: "off"
minimal_major_version:
type: string
default: "9.6"
target_major_version:
type: string
default: "14"
kubernetes:
type: object
properties:
additional_pod_capabilities:
type: array
items:
type: string
cluster_domain:
type: string
default: "cluster.local"
cluster_labels:
type: object
additionalProperties:
type: string
default:
application: spilo
cluster_name_label:
type: string
default: "cluster-name"
custom_pod_annotations:
type: object
additionalProperties:
type: string
delete_annotation_date_key:
type: string
delete_annotation_name_key:
type: string
downscaler_annotations:
type: array
items:
type: string
enable_init_containers:
type: boolean
default: true
enable_pod_antiaffinity:
type: boolean
default: false
enable_pod_disruption_budget:
type: boolean
default: true
enable_sidecars:
type: boolean
default: true
infrastructure_roles_secret_name:
type: string
infrastructure_roles_secrets:
type: array
nullable: true
items:
type: object
required:
- secretname
- userkey
- passwordkey
properties:
secretname:
type: string
userkey:
type: string
passwordkey:
type: string
rolekey:
type: string
defaultuservalue:
type: string
defaultrolevalue:
type: string
details:
type: string
template:
type: boolean
inherited_annotations:
type: array
items:
type: string
inherited_labels:
type: array
items:
type: string
master_pod_move_timeout:
type: string
default: "20m"
node_readiness_label:
type: object
additionalProperties:
type: string
oauth_token_secret_name:
type: string
default: "postgresql-operator"
pdb_name_format:
type: string
default: "postgres-{cluster}-pdb"
pod_antiaffinity_topology_key:
type: string
default: "kubernetes.io/hostname"
pod_environment_configmap:
type: string
pod_environment_secret:
type: string
pod_management_policy:
type: string
enum:
- "ordered_ready"
- "parallel"
default: "ordered_ready"
pod_priority_class_name:
type: string
pod_role_label:
type: string
default: "spilo-role"
pod_service_account_definition:
type: string
default: ""
pod_service_account_name:
type: string
default: "postgres-pod"
pod_service_account_role_binding_definition:
type: string
default: ""
pod_terminate_grace_period:
type: string
default: "5m"
secret_name_template:
type: string
default: "{username}.{cluster}.credentials.{tprkind}.{tprgroup}"
spilo_allow_privilege_escalation:
type: boolean
default: true
spilo_runasuser:
type: integer
spilo_runasgroup:
type: integer
spilo_fsgroup:
type: integer
spilo_privileged:
type: boolean
default: false
storage_resize_mode:
type: string
enum:
- "ebs"
- "pvc"
- "off"
default: "pvc"
toleration:
type: object
additionalProperties:
type: string
watched_namespace:
type: string
postgres_pod_resources:
type: object
properties:
default_cpu_limit:
type: string
pattern: '^(\d+m|\d+(\.\d{1,3})?)$'
default: "1"
default_cpu_request:
type: string
pattern: '^(\d+m|\d+(\.\d{1,3})?)$'
default: "100m"
default_memory_limit:
type: string
pattern: '^(\d+(e\d+)?|\d+(\.\d+)?(e\d+)?[EPTGMK]i?)$'
default: "500Mi"
default_memory_request:
type: string
pattern: '^(\d+(e\d+)?|\d+(\.\d+)?(e\d+)?[EPTGMK]i?)$'
default: "100Mi"
default_ephemeral_storage_limit:
type: string
pattern: '^(\d+(e\d+)?|\d+(\.\d+)?(e\d+)?[EPTGMK]i?)$'
default: "1Gi"
default_ephemeral_storage_request:
type: string
pattern: '^(\d+(e\d+)?|\d+(\.\d+)?(e\d+)?[EPTGMK]i?)$'
default: "1Gi"
min_cpu_limit:
type: string
pattern: '^(\d+m|\d+(\.\d{1,3})?)$'
default: "250m"
min_memory_limit:
type: string
pattern: '^(\d+(e\d+)?|\d+(\.\d+)?(e\d+)?[EPTGMK]i?)$'
default: "250Mi"
timeouts:
type: object
properties:
pod_label_wait_timeout:
type: string
default: "10m"
pod_deletion_wait_timeout:
type: string
default: "10m"
ready_wait_interval:
type: string
default: "4s"
ready_wait_timeout:
type: string
default: "30s"
resource_check_interval:
type: string
default: "3s"
resource_check_timeout:
type: string
default: "10m"
load_balancer:
type: object
properties:
custom_service_annotations:
type: object
additionalProperties:
type: string
db_hosted_zone:
type: string
default: "db.example.com"
enable_master_load_balancer:
type: boolean
default: true
enable_replica_load_balancer:
type: boolean
default: false
external_traffic_policy:
type: string
enum:
- "Cluster"
- "Local"
default: "Cluster"
master_dns_name_format:
type: string
default: "{cluster}.{team}.{hostedzone}"
replica_dns_name_format:
type: string
default: "{cluster}-repl.{team}.{hostedzone}"
aws_or_gcp:
type: object
properties:
additional_secret_mount:
type: string
additional_secret_mount_path:
type: string
default: "/meta/credentials"
aws_region:
type: string
default: "eu-central-1"
enable_ebs_gp3_migration:
type: boolean
default: false
enable_ebs_gp3_migration_max_size:
type: integer
default: 1000
gcp_credentials:
type: string
kube_iam_role:
type: string
log_s3_bucket:
type: string
wal_az_storage_account:
type: string
wal_gs_bucket:
type: string
wal_s3_bucket:
type: string
logical_backup:
type: object
properties:
logical_backup_docker_image:
type: string
default: "registry.opensource.zalan.do/acid/logical-backup:v1.7.0"
logical_backup_google_application_credentials:
type: string
logical_backup_job_prefix:
type: string
default: "logical-backup-"
logical_backup_provider:
type: string
default: "s3"
logical_backup_s3_access_key_id:
type: string
logical_backup_s3_bucket:
type: string
logical_backup_s3_endpoint:
type: string
logical_backup_s3_region:
type: string
logical_backup_s3_secret_access_key:
type: string
logical_backup_s3_sse:
type: string
logical_backup_schedule:
type: string
pattern: '^(\d+|\*)(/\d+)?(\s+(\d+|\*)(/\d+)?){4}$'
default: "30 00 * * *"
debug:
type: object
properties:
debug_logging:
type: boolean
default: true
enable_database_access:
type: boolean
default: true
teams_api:
type: object
properties:
enable_admin_role_for_users:
type: boolean
default: true
enable_postgres_team_crd:
type: boolean
default: true
enable_postgres_team_crd_superusers:
type: boolean
default: false
enable_team_member_deprecation:
type: boolean
default: false
enable_team_superuser:
type: boolean
default: false
enable_teams_api:
type: boolean
default: true
pam_configuration:
type: string
default: "https://info.example.com/oauth2/tokeninfo?access_token= uid realm=/employees"
pam_role_name:
type: string
default: "zalandos"
postgres_superuser_teams:
type: array
items:
type: string
protected_role_names:
type: array
items:
type: string
default:
- admin
role_deletion_suffix:
type: string
default: "_deleted"
team_admin_role:
type: string
default: "admin"
team_api_role_configuration:
type: object
additionalProperties:
type: string
default:
log_statement: all
teams_api_url:
type: string
default: "https://teams.example.com/api/"
logging_rest_api:
type: object
properties:
api_port:
type: integer
default: 8080
cluster_history_entries:
type: integer
default: 1000
ring_log_lines:
type: integer
default: 100
scalyr: # deprecated
type: object
properties:
scalyr_api_key:
type: string
scalyr_cpu_limit:
type: string
pattern: '^(\d+m|\d+(\.\d{1,3})?)$'
default: "1"
scalyr_cpu_request:
type: string
pattern: '^(\d+m|\d+(\.\d{1,3})?)$'
default: "100m"
scalyr_image:
type: string
scalyr_memory_limit:
type: string
pattern: '^(\d+(e\d+)?|\d+(\.\d+)?(e\d+)?[EPTGMK]i?)$'
default: "500Mi"
scalyr_memory_request:
type: string
pattern: '^(\d+(e\d+)?|\d+(\.\d+)?(e\d+)?[EPTGMK]i?)$'
default: "50Mi"
scalyr_server_url:
type: string
default: "https://upload.eu.scalyr.com"
connection_pooler:
type: object
properties:
connection_pooler_schema:
type: string
default: "pooler"
connection_pooler_user:
type: string
default: "pooler"
connection_pooler_image:
type: string
default: "registry.opensource.zalan.do/acid/pgbouncer:master-18"
connection_pooler_max_db_connections:
type: integer
default: 60
connection_pooler_mode:
type: string
enum:
- "session"
- "transaction"
default: "transaction"
connection_pooler_number_of_instances:
type: integer
minimum: 1
default: 2
connection_pooler_default_cpu_limit:
type: string
pattern: '^(\d+m|\d+(\.\d{1,3})?)$'
default: "1"
connection_pooler_default_cpu_request:
type: string
pattern: '^(\d+m|\d+(\.\d{1,3})?)$'
default: "500m"
connection_pooler_default_memory_limit:
type: string
pattern: '^(\d+(e\d+)?|\d+(\.\d+)?(e\d+)?[EPTGMK]i?)$'
default: "100Mi"
connection_pooler_default_memory_request:
type: string
pattern: '^(\d+(e\d+)?|\d+(\.\d+)?(e\d+)?[EPTGMK]i?)$'
default: "100Mi"
status:
type: object
additionalProperties:
type: string
| 36.28 | 107 | 0.407267 |
79388a31403111f6b79223859664f39206000ae2 | 412 | yaml | YAML | config/rbac/azurestackhcimachine_viewer_role.yaml | nwoodmsft/cluster-api-provider-azurestackhci | d5671a29078ffd6201a8c08739a3e4a211e0593f | [
"Apache-2.0"
] | null | null | null | config/rbac/azurestackhcimachine_viewer_role.yaml | nwoodmsft/cluster-api-provider-azurestackhci | d5671a29078ffd6201a8c08739a3e4a211e0593f | [
"Apache-2.0"
] | null | null | null | config/rbac/azurestackhcimachine_viewer_role.yaml | nwoodmsft/cluster-api-provider-azurestackhci | d5671a29078ffd6201a8c08739a3e4a211e0593f | [
"Apache-2.0"
] | null | null | null | # permissions for end users to view azurestackhcimachines.
apiVersion: rbac.authorization.k8s.io/v1
kind: ClusterRole
metadata:
name: azurestackhcimachine-viewer-role
rules:
- apiGroups:
- infrastructure.cluster.x-k8s.io
resources:
- azurestackhcimachines
verbs:
- get
- list
- watch
- apiGroups:
- infrastructure.cluster.x-k8s.io
resources:
- azurestackhcimachines/status
verbs:
- get
| 19.619048 | 58 | 0.747573 |
79389215ddd6388afd5fbfec11187f1bf431bcda | 172 | yml | YAML | operator/serviceaccount.yml | kustomhippie/klum-operator | 654fac3e152fd5dff1cb4e65334728395dca007d | [
"Apache-2.0"
] | null | null | null | operator/serviceaccount.yml | kustomhippie/klum-operator | 654fac3e152fd5dff1cb4e65334728395dca007d | [
"Apache-2.0"
] | 1 | 2021-10-20T05:07:03.000Z | 2021-10-20T05:07:03.000Z | operator/serviceaccount.yml | kustomhippie/klum-operator | 654fac3e152fd5dff1cb4e65334728395dca007d | [
"Apache-2.0"
] | null | null | null | ---
apiVersion: v1
kind: ServiceAccount
metadata:
name: klum-operator
labels:
app.kubernetes.io/name: klum-operator
app.kubernetes.io/component: operator
...
| 14.333333 | 41 | 0.715116 |
7938954466d8a9ca0e04babb20b3b99c4ed554b2 | 66 | yaml | YAML | pipeline/rootsa.yaml | revit13/the-mesh-for-data | 630fdb415d03ad2bc00099f156cde7b00cbeca82 | [
"Apache-2.0"
] | 32 | 2020-09-24T10:14:52.000Z | 2021-05-13T15:58:11.000Z | pipeline/rootsa.yaml | revit13/the-mesh-for-data | 630fdb415d03ad2bc00099f156cde7b00cbeca82 | [
"Apache-2.0"
] | 327 | 2020-09-22T08:23:35.000Z | 2021-05-25T04:18:58.000Z | pipeline/rootsa.yaml | revit13/the-mesh-for-data | 630fdb415d03ad2bc00099f156cde7b00cbeca82 | [
"Apache-2.0"
] | 29 | 2020-09-10T08:39:00.000Z | 2021-05-24T17:17:31.000Z | ---
apiVersion: v1
kind: ServiceAccount
metadata:
name: root-sa
| 11 | 20 | 0.727273 |
7938a9e2ea856ff2569a1f7f48d196b53e303c3d | 590 | yaml | YAML | hack/istio/prometheus-ingress.yaml | ScriptingShrimp/kiali | 12d991191f8bc02b1c27040c78e940a8b65d8e3e | [
"Apache-2.0"
] | 2,870 | 2018-03-26T11:31:51.000Z | 2022-03-31T03:18:18.000Z | hack/istio/prometheus-ingress.yaml | ScriptingShrimp/kiali | 12d991191f8bc02b1c27040c78e940a8b65d8e3e | [
"Apache-2.0"
] | 3,669 | 2018-03-23T23:29:26.000Z | 2022-03-31T20:02:18.000Z | hack/istio/prometheus-ingress.yaml | ScriptingShrimp/kiali | 12d991191f8bc02b1c27040c78e940a8b65d8e3e | [
"Apache-2.0"
] | 469 | 2018-03-23T20:12:54.000Z | 2022-03-30T17:47:58.000Z | # Use this Ingress to access the Prometheus UI.
# Example when on minikube:
# kubectl apply -n istio-system -f prometheus-ingress.yaml
# gio open http://$(minikube ip)/graph
---
apiVersion: networking.k8s.io/v1
kind: Ingress
metadata:
name: prometheus
annotations:
nginx.ingress.kubernetes.io/backend-protocol: HTTP
nginx.ingress.kubernetes.io/secure-backends: 'false'
spec:
rules:
- http:
paths:
- path: /
pathType: ImplementationSpecific
backend:
service:
name: prometheus
port:
number: 9090
| 24.583333 | 60 | 0.645763 |
79392a5a633c40da3db7812018ac16d511df88c2 | 136 | yaml | YAML | lessons/074/0-metrics-server/0-service-account.yaml | murasaki718/tutorials | ad55a1f34f2dc050a5ccbceae0c09def0626dccf | [
"MIT"
] | 225 | 2020-12-12T03:41:46.000Z | 2022-03-30T20:07:31.000Z | lessons/074/0-metrics-server/0-service-account.yaml | kevAnto/tutorials | 9db76b5eeb6a54afabae6a4e386f155cc5dbc025 | [
"MIT"
] | 9 | 2021-09-18T12:36:23.000Z | 2022-03-11T17:24:20.000Z | lessons/074/0-metrics-server/0-service-account.yaml | kevAnto/tutorials | 9db76b5eeb6a54afabae6a4e386f155cc5dbc025 | [
"MIT"
] | 410 | 2020-12-24T03:34:33.000Z | 2022-03-31T22:38:13.000Z | ---
apiVersion: v1
kind: ServiceAccount
metadata:
labels:
k8s-app: metrics-server
name: metrics-server
namespace: kube-system
| 15.111111 | 27 | 0.727941 |
7939d3f3886a718d2dbd252c1f99d31b871f10a5 | 818 | yaml | YAML | bins/challenges_examples/NRFIN_00079/pov/cyborg-seeder.yaml | ucsb-seclab/hacrs-input-generator | 7de089518541e3d0841622bcd3c950c7d83adc33 | [
"BSD-2-Clause"
] | 3 | 2019-12-20T02:04:42.000Z | 2019-12-20T02:04:51.000Z | bins/challenges_examples/NRFIN_00079/pov/cyborg-seeder.yaml | ucsb-seclab/hacrs-input-generator | 7de089518541e3d0841622bcd3c950c7d83adc33 | [
"BSD-2-Clause"
] | null | null | null | bins/challenges_examples/NRFIN_00079/pov/cyborg-seeder.yaml | ucsb-seclab/hacrs-input-generator | 7de089518541e3d0841622bcd3c950c7d83adc33 | [
"BSD-2-Clause"
] | null | null | null | apiVersion: v1
kind: Pod
metadata:
name: cyborg-seeder-examples-nrfin00079
labels:
type: cyborg-seeder
spec: # specification of the pod's contents
restartPolicy: Never #OnFailure
imagePullSecrets:
- name: ucsbseclab-dockerhub
volumes:
- name: cyborg-results
persistentVolumeClaim:
claimName: cyborg-results
containers:
- name: cyborg-seeder-examples-nrfin00079
stdin: true
tty: true
image: "zardus/research:cyborg-generator"
command: ["/bin/bash", "-c", "python /home/angr/cyborg-generator/kubernetes_seeder.py examples NRFIN_00079 3600 6"]
imagePullPolicy: Always
volumeMounts:
- name: cyborg-results
mountPath: "/results"
resources:
limits:
cpu: 1
memory: 10Gi
requests:
cpu: 1
memory: 10Gi
| 20.45 | 119 | 0.669927 |
7939e2d24ea6cf77b59808c538930b111845410f | 2,135 | yaml | YAML | mock-data/large-cluster/k8s/rbac.authorization.k8s.io:ClusterRole/system:controller:horizontal-pod-autoscaler.yaml | kubevious/logic-processor | f3b502fdd851fc955ddb00b39da589bbf05566e3 | [
"Apache-2.0"
] | null | null | null | mock-data/large-cluster/k8s/rbac.authorization.k8s.io:ClusterRole/system:controller:horizontal-pod-autoscaler.yaml | kubevious/logic-processor | f3b502fdd851fc955ddb00b39da589bbf05566e3 | [
"Apache-2.0"
] | null | null | null | mock-data/large-cluster/k8s/rbac.authorization.k8s.io:ClusterRole/system:controller:horizontal-pod-autoscaler.yaml | kubevious/logic-processor | f3b502fdd851fc955ddb00b39da589bbf05566e3 | [
"Apache-2.0"
] | 1 | 2022-01-16T20:19:54.000Z | 2022-01-16T20:19:54.000Z | kind: ClusterRole
apiVersion: rbac.authorization.k8s.io/v1
metadata:
name: 'system:controller:horizontal-pod-autoscaler'
selfLink: >-
/apis/rbac.authorization.k8s.io/v1/clusterroles/system%3Acontroller%3Ahorizontal-pod-autoscaler
uid: af73c719-3437-11ea-9cdc-42010a8001cf
resourceVersion: '61446104'
creationTimestamp: '2020-01-11T06:00:35Z'
labels:
kubernetes.io/bootstrapping: rbac-defaults
annotations:
rbac.authorization.kubernetes.io/autoupdate: 'true'
rules:
-
verbs:
- get
- list
- watch
apiGroups:
- autoscaling
resources:
- horizontalpodautoscalers
-
verbs:
- update
apiGroups:
- autoscaling
resources:
- horizontalpodautoscalers/status
-
verbs:
- get
- update
apiGroups:
- '*'
resources:
- '*/scale'
-
verbs:
- list
apiGroups:
- ''
resources:
- pods
-
verbs:
- get
apiGroups:
- ''
resources:
- services/proxy
resourceNames:
- 'http:heapster:'
- 'https:heapster:'
-
verbs:
- list
apiGroups:
- metrics.k8s.io
resources:
- pods
-
verbs:
- get
- list
apiGroups:
- custom.metrics.k8s.io
resources:
- '*'
-
verbs:
- create
- patch
- update
apiGroups:
- ''
resources:
- events
-
verbs:
- create
apiGroups:
- events.k8s.io
resources:
- events
-
verbs:
- patch
apiGroups:
- events.k8s.io
resources:
- events
-
verbs:
- update
apiGroups:
- events.k8s.io
resources:
- events
| 20.931373 | 103 | 0.441686 |
7939e5bf0526bea640540b7202136558b9207597 | 212 | yaml | YAML | kubernetes/service.yaml | hack19-istio/playerbackend | a8548c4bb07bc4d4aceaec7bd0de7a97597550fa | [
"MIT"
] | null | null | null | kubernetes/service.yaml | hack19-istio/playerbackend | a8548c4bb07bc4d4aceaec7bd0de7a97597550fa | [
"MIT"
] | 1 | 2021-12-28T22:26:33.000Z | 2021-12-28T22:26:48.000Z | kubernetes/service.yaml | AlexRogalskiy/playerbackend | a8548c4bb07bc4d4aceaec7bd0de7a97597550fa | [
"MIT"
] | 2 | 2019-09-11T08:12:57.000Z | 2021-12-28T22:26:17.000Z | apiVersion: v1
kind: Service
metadata:
namespace: hack-istio-player-backend
name: player-backend
spec:
selector:
app: player-backend
ports:
- protocol: TCP
port: 8080
targetPort: 3000
| 16.307692 | 38 | 0.683962 |
793a9e0616afb7617b37d5dfe016f2954cc44f76 | 315 | yaml | YAML | dist/entities/claim/queue.yaml | vicjicaman/microservice-auth-realm | 2bb8d5356a9280b9b4d2f7a501de5b61b51270e7 | [
"MIT"
] | null | null | null | dist/entities/claim/queue.yaml | vicjicaman/microservice-auth-realm | 2bb8d5356a9280b9b4d2f7a501de5b61b51270e7 | [
"MIT"
] | null | null | null | dist/entities/claim/queue.yaml | vicjicaman/microservice-auth-realm | 2bb8d5356a9280b9b4d2f7a501de5b61b51270e7 | [
"MIT"
] | null | null | null |
apiVersion: v1
kind: PersistentVolumeClaim
metadata:
name: auth-queue-volume-claim
namespace: 'repoflow-blog-namespace'
spec:
storageClassName: local-storage
accessModes:
- ReadWriteOnce
resources:
requests:
storage: "100Mi"
selector:
matchLabels:
service: "auth-queue-service"
| 18.529412 | 38 | 0.71746 |
793aaa0f655ee181b4733acfc927af6b61166ba9 | 1,312 | yaml | YAML | proxy/kubernetes/proxy-deployment-crash-canary.yaml | weiminyu/nomulus | 156344e40813a46209b7b50828ff3e4ede538f52 | [
"Apache-2.0"
] | 1,644 | 2016-10-18T15:05:43.000Z | 2022-03-19T21:45:23.000Z | proxy/kubernetes/proxy-deployment-crash-canary.yaml | weiminyu/nomulus | 156344e40813a46209b7b50828ff3e4ede538f52 | [
"Apache-2.0"
] | 332 | 2016-10-18T15:33:58.000Z | 2022-03-30T12:48:37.000Z | proxy/kubernetes/proxy-deployment-crash-canary.yaml | weiminyu/nomulus | 156344e40813a46209b7b50828ff3e4ede538f52 | [
"Apache-2.0"
] | 270 | 2016-10-18T14:56:43.000Z | 2022-03-27T17:54:07.000Z | apiVersion: apps/v1
kind: Deployment
metadata:
namespace: default
name: proxy-deployment-canary
labels:
app: proxy-canary
spec:
replicas: 3
selector:
matchLabels:
app: proxy-canary
template:
metadata:
labels:
app: proxy-canary
spec:
containers:
- name: proxy-canary
image: gcr.io/GCP_PROJECT/proxy
ports:
- containerPort: 30000
name: health-check
- containerPort: 30001
name: whois
- containerPort: 30002
name: epp
- containerPort: 30010
name: http-whois
- containerPort: 30011
name: https-whois
readinessProbe:
tcpSocket:
port: health-check
initialDelaySeconds: 5
periodSeconds: 10
livenessProbe:
tcpSocket:
port: health-check
initialDelaySeconds: 15
periodSeconds: 20
imagePullPolicy: Always
args: ["--env", "crash_canary", "--log"]
env:
- name: POD_ID
valueFrom:
fieldRef:
fieldPath: metadata.name
- name: NAMESPACE_ID
valueFrom:
fieldRef:
fieldPath: metadata.namespace
- name: CONTAINER_NAME
value: proxy-canary
| 23.854545 | 48 | 0.550305 |
793aee79dd4b66a9e2afde2e8c0ca4e0af24da6d | 1,564 | yaml | YAML | manifests/function/flux/helm-controller/manager/deployment.yaml | kozhukalov/airshipctl | 3bdde483feaedeb14c4af317b3590f1491d384c7 | [
"Apache-2.0"
] | null | null | null | manifests/function/flux/helm-controller/manager/deployment.yaml | kozhukalov/airshipctl | 3bdde483feaedeb14c4af317b3590f1491d384c7 | [
"Apache-2.0"
] | null | null | null | manifests/function/flux/helm-controller/manager/deployment.yaml | kozhukalov/airshipctl | 3bdde483feaedeb14c4af317b3590f1491d384c7 | [
"Apache-2.0"
] | null | null | null | apiVersion: apps/v1
kind: Deployment
metadata:
labels:
app.kubernetes.io/instance: flux-system
app.kubernetes.io/version: v0.2.0
control-plane: controller
name: helm-controller
namespace: flux-system
spec:
replicas: 1
selector:
matchLabels:
app: helm-controller
template:
metadata:
annotations:
prometheus.io/port: "8080"
prometheus.io/scrape: "true"
labels:
app: helm-controller
spec:
containers:
- args:
- --events-addr=
- --watch-all-namespaces=true
- --log-level=info
- --log-json
- --enable-leader-election
env:
- name: RUNTIME_NAMESPACE
valueFrom:
fieldRef:
fieldPath: metadata.namespace
image: ghcr.io/fluxcd/helm-controller:v0.1.3
imagePullPolicy: IfNotPresent
livenessProbe:
httpGet:
path: /metrics
port: http-prom
name: manager
ports:
- containerPort: 8080
name: http-prom
resources:
limits:
cpu: 1000m
memory: 1Gi
requests:
cpu: 100m
memory: 64Mi
securityContext:
allowPrivilegeEscalation: false
readOnlyRootFilesystem: true
volumeMounts:
- mountPath: /tmp
name: temp
nodeSelector:
kubernetes.io/arch: amd64
kubernetes.io/os: linux
terminationGracePeriodSeconds: 10
volumes:
- emptyDir: {}
name: temp
| 24.061538 | 52 | 0.558824 |