hexsha
stringlengths
40
40
size
int64
24
1.05M
ext
stringclasses
2 values
lang
stringclasses
1 value
max_stars_repo_path
stringlengths
5
269
max_stars_repo_name
stringlengths
7
107
max_stars_repo_head_hexsha
stringlengths
40
78
max_stars_repo_licenses
sequence
max_stars_count
int64
1
84.9k
max_stars_repo_stars_event_min_datetime
stringlengths
24
24
max_stars_repo_stars_event_max_datetime
stringlengths
24
24
max_issues_repo_path
stringlengths
5
269
max_issues_repo_name
stringlengths
7
107
max_issues_repo_head_hexsha
stringlengths
40
78
max_issues_repo_licenses
sequence
max_issues_count
int64
1
116k
max_issues_repo_issues_event_min_datetime
stringlengths
24
24
max_issues_repo_issues_event_max_datetime
stringlengths
24
24
max_forks_repo_path
stringlengths
5
269
max_forks_repo_name
stringlengths
7
107
max_forks_repo_head_hexsha
stringlengths
40
78
max_forks_repo_licenses
sequence
max_forks_count
int64
1
55.9k
max_forks_repo_forks_event_min_datetime
stringlengths
24
24
max_forks_repo_forks_event_max_datetime
stringlengths
24
24
content
stringlengths
24
1.05M
avg_line_length
float64
1
304k
max_line_length
int64
14
1.03M
alphanum_fraction
float64
0
1
79241a53d0ae3c5baf14d8c65806df70ecf70154
1,025
yaml
YAML
overlays/instances/instance1/environments/test/secrets.yaml
apigee/apigee-hybrid-install
7c646e6456c8de1b75dbe18223939756ab92715e
[ "Apache-2.0" ]
null
null
null
overlays/instances/instance1/environments/test/secrets.yaml
apigee/apigee-hybrid-install
7c646e6456c8de1b75dbe18223939756ab92715e
[ "Apache-2.0" ]
null
null
null
overlays/instances/instance1/environments/test/secrets.yaml
apigee/apigee-hybrid-install
7c646e6456c8de1b75dbe18223939756ab92715e
[ "Apache-2.0" ]
null
null
null
# Copyright 2022 Google LLC # # Licensed under the Apache License, Version 2.0 (the "License"); # you may not use this file except in compliance with the License. # You may obtain a copy of the License at # # https://www.apache.org/licenses/LICENSE-2.0 # # Unless required by applicable law or agreed to in writing, software # distributed under the License is distributed on an "AS IS" BASIS, # WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. # See the License for the specific language governing permissions and # limitations under the License. apiVersion: v1 kind: Secret metadata: name: "env-encryption-keys" # kpt-set: ${ORGANIZATION_NAME}-${ENVIRONMENT_NAME}-encryption-keys namespace: "apigee" # kpt-set: ${APIGEE_NAMESPACE} type: Opaque data: kmsEncryptionKey: | YVd4dmRtVmhjR2x6TVRJek5EVTJOdz09 cacheEncryptionKey: | YVd4dmRtVmhjR2x6TVRJek5EVTJOdz09 envKvmEncryptionKey: | YVd4dmRtVmhjR2x6TVRJek5EVTJOdz09 kvmEncryptionKey: | YVd4dmRtVmhjR2x6TVRJek5EVTJOdz09
34.166667
97
0.771707
79249a6fb1cfd2f664f80f7a1dafaf9e8f55a10b
144
yaml
YAML
demo-app/base/service-account.yaml
justinzamora02/gitops
63cac129c523ffe7e8fe5ed109f2a9ea2ae86fa4
[ "Apache-2.0" ]
null
null
null
demo-app/base/service-account.yaml
justinzamora02/gitops
63cac129c523ffe7e8fe5ed109f2a9ea2ae86fa4
[ "Apache-2.0" ]
null
null
null
demo-app/base/service-account.yaml
justinzamora02/gitops
63cac129c523ffe7e8fe5ed109f2a9ea2ae86fa4
[ "Apache-2.0" ]
null
null
null
apiVersion: v1 kind: ServiceAccount metadata: name: sa annotations: argocd.argoproj.io/sync-wave: "1" argocd.argoproj.io/hook: Sync
18
37
0.722222
7924d7e77c9415047ad48d5ab6ad15a19a321a1c
761
yaml
YAML
examples/demo/rollingUpdate/demo_v1.yaml
lt-schmidt-jr/foremast
5ae42288831234830e21e7bd3e28e395b8960c7c
[ "Apache-2.0" ]
128
2018-12-14T17:53:03.000Z
2022-03-04T07:50:05.000Z
examples/demo/rollingUpdate/demo_v1.yaml
lt-schmidt-jr/foremast
5ae42288831234830e21e7bd3e28e395b8960c7c
[ "Apache-2.0" ]
91
2018-12-18T19:51:13.000Z
2022-02-26T04:39:05.000Z
examples/demo/rollingUpdate/demo_v1.yaml
lt-schmidt-jr/foremast
5ae42288831234830e21e7bd3e28e395b8960c7c
[ "Apache-2.0" ]
37
2018-12-19T18:02:53.000Z
2022-02-24T08:03:49.000Z
apiVersion: apps/v1 kind: Deployment metadata: labels: app: demo # Application Name appType: spring-boot # Application Type name: demo namespace: foremast-examples spec: replicas: 5 selector: matchLabels: app: demo template: metadata: labels: app: demo version: v1 annotations: prometheus.io/scrape: "true" prometheus.io/scheme: "http" prometheus.io/port: "8080" prometheus.io/path: "/actuator/prometheus" spec: containers: - name: app image: docker.io/foremast/k8s-metrics-demo:0.1.5 imagePullPolicy: Always env: - name: APP_NAME value: demo ports: - name: http containerPort: 8080
21.742857
56
0.592641
7924df45c1adccc81b20dcfb479b03820814144f
247
yaml
YAML
install/00_namespace.yaml
jupierce/cluster-autoscaler-operator
52ee4f03604b6a51b3b09913c72859e10f00faa0
[ "Apache-2.0" ]
null
null
null
install/00_namespace.yaml
jupierce/cluster-autoscaler-operator
52ee4f03604b6a51b3b09913c72859e10f00faa0
[ "Apache-2.0" ]
null
null
null
install/00_namespace.yaml
jupierce/cluster-autoscaler-operator
52ee4f03604b6a51b3b09913c72859e10f00faa0
[ "Apache-2.0" ]
1
2021-07-29T04:10:19.000Z
2021-07-29T04:10:19.000Z
--- apiVersion: v1 kind: Namespace metadata: name: openshift-machine-api labels: name: openshift-machine-api # allow openshift-monitoring to look for ServiceMonitor objects in this namespace openshift.io/cluster-monitoring: "true"
24.7
85
0.753036
7925640ecadab16673653afdd8a0b9ffcf3164be
396
yaml
YAML
config/rbac/metamorphcluster_viewer_role.yaml
bm-metamorph/cluster-api-provider-metamorph
fffe4404e53d1e25ea504ec3df6b533c0e0522f6
[ "Apache-2.0" ]
null
null
null
config/rbac/metamorphcluster_viewer_role.yaml
bm-metamorph/cluster-api-provider-metamorph
fffe4404e53d1e25ea504ec3df6b533c0e0522f6
[ "Apache-2.0" ]
null
null
null
config/rbac/metamorphcluster_viewer_role.yaml
bm-metamorph/cluster-api-provider-metamorph
fffe4404e53d1e25ea504ec3df6b533c0e0522f6
[ "Apache-2.0" ]
1
2020-09-09T10:29:58.000Z
2020-09-09T10:29:58.000Z
# permissions for end users to view metamorphclusters. apiVersion: rbac.authorization.k8s.io/v1 kind: ClusterRole metadata: name: metamorphcluster-viewer-role rules: - apiGroups: - infrastructure.cluster.x-k8s.io resources: - metamorphclusters verbs: - get - list - watch - apiGroups: - infrastructure.cluster.x-k8s.io resources: - metamorphclusters/status verbs: - get
18.857143
54
0.737374
79256cccaed6d7d18ca9c49f900b8c0d87aed0ec
411
yaml
YAML
config-root/namespaces/myjenkins/jenkins/jenkins-sa.yaml
lexarflash8g/jx3-eks-vault
c1f80d27c72fba5860b9dcce47e298a19bcb1f37
[ "Apache-2.0" ]
null
null
null
config-root/namespaces/myjenkins/jenkins/jenkins-sa.yaml
lexarflash8g/jx3-eks-vault
c1f80d27c72fba5860b9dcce47e298a19bcb1f37
[ "Apache-2.0" ]
16
2021-03-13T04:48:03.000Z
2021-03-18T21:48:17.000Z
config-root/namespaces/myjenkins/jenkins/jenkins-sa.yaml
lexarflash8g/jx3-eks-vault
c1f80d27c72fba5860b9dcce47e298a19bcb1f37
[ "Apache-2.0" ]
null
null
null
# Source: jenkins/templates/service-account.yaml apiVersion: v1 kind: ServiceAccount metadata: name: jenkins namespace: myjenkins labels: "app.kubernetes.io/name": 'jenkins' "helm.sh/chart": "jenkins-3.2.4" "app.kubernetes.io/managed-by": "Helm" "app.kubernetes.io/instance": "jenkins" "app.kubernetes.io/component": "jenkins-controller" gitops.jenkins-x.io/pipeline: 'namespaces'
29.357143
55
0.712895
7925934416bbc7192649f3ba94fbf63e78d42d96
376
yaml
YAML
k8s/deployment.yaml
cwcordell/time-warp
070e944ece228393f3c8ece977c26601a926fa72
[ "MIT" ]
null
null
null
k8s/deployment.yaml
cwcordell/time-warp
070e944ece228393f3c8ece977c26601a926fa72
[ "MIT" ]
null
null
null
k8s/deployment.yaml
cwcordell/time-warp
070e944ece228393f3c8ece977c26601a926fa72
[ "MIT" ]
null
null
null
apiVersion: apps/v1 kind: Deployment metadata: name: timewarp labels: app: timewarp spec: replicas: 1 selector: matchLabels: app: timewarp template: metadata: labels: app: timewarp spec: containers: - name: timewarp image: cordelltech/timewarp ports: - containerPort: 8000 name: http
16.347826
35
0.593085
7925aa14e1471fe76b7918241ca508fafc13e41d
3,606
yaml
YAML
deploy/2_crd.yaml
teamupstart/rbac-manager
32e35b6100153f441a923e5f9b2abde3e0c741fe
[ "Apache-2.0" ]
728
2019-07-12T19:40:21.000Z
2022-03-31T08:31:29.000Z
deploy/2_crd.yaml
teamupstart/rbac-manager
32e35b6100153f441a923e5f9b2abde3e0c741fe
[ "Apache-2.0" ]
202
2019-07-11T07:42:51.000Z
2022-03-28T13:22:27.000Z
deploy/2_crd.yaml
teamupstart/rbac-manager
32e35b6100153f441a923e5f9b2abde3e0c741fe
[ "Apache-2.0" ]
81
2019-07-17T09:43:32.000Z
2022-03-21T17:24:54.000Z
--- apiVersion: apiextensions.k8s.io/v1 kind: CustomResourceDefinition metadata: labels: app: rbac-manager name: rbacdefinitions.rbacmanager.reactiveops.io spec: group: rbacmanager.reactiveops.io names: kind: RBACDefinition plural: rbacdefinitions singular: rbacdefinition shortNames: - rbd - rbacdef scope: Cluster versions: - name: v1beta1 served: true storage: true schema: openAPIV3Schema: required: - rbacBindings type: object properties: rbacBindings: items: properties: clusterRoleBindings: items: properties: clusterRole: type: string required: - clusterRole type: object type: array name: type: string roleBindings: items: properties: clusterRole: type: string namespace: type: string namespaceSelector: type: object properties: matchLabels: type: object additionalProperties: type: string matchExpressions: type: array items: type: object properties: key: type: string operator: type: string enum: - Exists - DoesNotExist - In - NotIn values: type: array items: type: string required: - key - operator role: type: string type: object type: array subjects: items: type: object properties: imagePullSecrets: type: array items: type: string kind: type: string enum: - Group - ServiceAccount - User name: type: string namespace: type: string required: - name - kind type: array required: - name - subjects type: object type: array status: type: object
32.486486
52
0.29645
792676a4bddb92df1edf41b5c36dfd44ecbb3366
41,887
yaml
YAML
packages/cert-manager-1.3.0/crd/000_CustomResourceDefinition_certificaterequests.cert-manager.io.yaml
vfeld/schocken-infrastructure
ae49776bb461defa4592f0a3dc974e7409917982
[ "MIT" ]
null
null
null
packages/cert-manager-1.3.0/crd/000_CustomResourceDefinition_certificaterequests.cert-manager.io.yaml
vfeld/schocken-infrastructure
ae49776bb461defa4592f0a3dc974e7409917982
[ "MIT" ]
null
null
null
packages/cert-manager-1.3.0/crd/000_CustomResourceDefinition_certificaterequests.cert-manager.io.yaml
vfeld/schocken-infrastructure
ae49776bb461defa4592f0a3dc974e7409917982
[ "MIT" ]
null
null
null
--- apiVersion: apiextensions.k8s.io/v1 kind: CustomResourceDefinition metadata: annotations: cert-manager.io/inject-ca-from-secret: cert-manager/cert-manager-webhook-ca labels: app: cert-manager app.kubernetes.io/instance: cert-manager app.kubernetes.io/name: cert-manager name: certificaterequests.cert-manager.io spec: conversion: strategy: Webhook webhook: clientConfig: service: name: cert-manager-webhook namespace: cert-manager path: /convert conversionReviewVersions: - v1 - v1beta1 group: cert-manager.io names: categories: - cert-manager kind: CertificateRequest listKind: CertificateRequestList plural: certificaterequests shortNames: - cr - crs singular: certificaterequest scope: Namespaced versions: - additionalPrinterColumns: - jsonPath: ".status.conditions[?(@.type==\"Approved\")].status" name: Approved type: string - jsonPath: ".status.conditions[?(@.type==\"Denied\")].status" name: Denied type: string - jsonPath: ".status.conditions[?(@.type==\"Ready\")].status" name: Ready type: string - jsonPath: ".spec.issuerRef.name" name: Issuer type: string - jsonPath: ".spec.username" name: Requestor type: string - jsonPath: ".status.conditions[?(@.type==\"Ready\")].message" name: Status priority: 1 type: string - description: CreationTimestamp is a timestamp representing the server time when this object was created. It is not guaranteed to be set in happens-before order across separate operations. Clients may not set this value. It is represented in RFC3339 form and is in UTC. jsonPath: ".metadata.creationTimestamp" name: Age type: date name: v1alpha2 schema: openAPIV3Schema: description: "A CertificateRequest is used to request a signed certificate from one of the configured issuers. \n All fields within the CertificateRequest's `spec` are immutable after creation. A CertificateRequest will either succeed or fail, as denoted by its `status.state` field. \n A CertificateRequest is a one-shot resource, meaning it represents a single point in time request for a certificate and cannot be re-used." properties: apiVersion: description: "APIVersion defines the versioned schema of this representation of an object. Servers should convert recognized schemas to the latest internal value, and may reject unrecognized values. More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#resources" type: string kind: description: "Kind is a string value representing the REST resource this object represents. Servers may infer this from the endpoint the client submits requests to. Cannot be updated. In CamelCase. More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#types-kinds" type: string metadata: type: object spec: description: Desired state of the CertificateRequest resource. properties: csr: description: The PEM-encoded x509 certificate signing request to be submitted to the CA for signing. format: byte type: string duration: description: "The requested 'duration' (i.e. lifetime) of the Certificate. This option may be ignored/overridden by some issuer types." type: string extra: additionalProperties: items: type: string type: array description: Extra contains extra attributes of the user that created the CertificateRequest. Populated by the cert-manager webhook on creation and immutable. type: object groups: description: Groups contains group membership of the user that created the CertificateRequest. Populated by the cert-manager webhook on creation and immutable. items: type: string type: array x-kubernetes-list-type: atomic isCA: description: "IsCA will request to mark the certificate as valid for certificate signing when submitting to the issuer. This will automatically add the `cert sign` usage to the list of `usages`." type: boolean issuerRef: description: "IssuerRef is a reference to the issuer for this CertificateRequest. If the `kind` field is not set, or set to `Issuer`, an Issuer resource with the given name in the same namespace as the CertificateRequest will be used. If the `kind` field is set to `ClusterIssuer`, a ClusterIssuer with the provided name will be used. The `name` field in this stanza is required at all times. The group field refers to the API group of the issuer which defaults to `cert-manager.io` if empty." properties: group: description: Group of the resource being referred to. type: string kind: description: Kind of the resource being referred to. type: string name: description: Name of the resource being referred to. type: string required: - name type: object uid: description: UID contains the uid of the user that created the CertificateRequest. Populated by the cert-manager webhook on creation and immutable. type: string usages: description: "Usages is the set of x509 usages that are requested for the certificate. Defaults to `digital signature` and `key encipherment` if not specified." items: description: "KeyUsage specifies valid usage contexts for keys. See: https://tools.ietf.org/html/rfc5280#section-4.2.1.3 https://tools.ietf.org/html/rfc5280#section-4.2.1.12 Valid KeyUsage values are as follows: \"signing\", \"digital signature\", \"content commitment\", \"key encipherment\", \"key agreement\", \"data encipherment\", \"cert sign\", \"crl sign\", \"encipher only\", \"decipher only\", \"any\", \"server auth\", \"client auth\", \"code signing\", \"email protection\", \"s/mime\", \"ipsec end system\", \"ipsec tunnel\", \"ipsec user\", \"timestamping\", \"ocsp signing\", \"microsoft sgc\", \"netscape sgc\"" enum: - signing - digital signature - content commitment - key encipherment - key agreement - data encipherment - cert sign - crl sign - encipher only - decipher only - any - server auth - client auth - code signing - email protection - s/mime - ipsec end system - ipsec tunnel - ipsec user - timestamping - ocsp signing - microsoft sgc - netscape sgc type: string type: array username: description: Username contains the name of the user that created the CertificateRequest. Populated by the cert-manager webhook on creation and immutable. type: string required: - csr - issuerRef type: object status: description: Status of the CertificateRequest. This is set and managed automatically. properties: ca: description: "The PEM encoded x509 certificate of the signer, also known as the CA (Certificate Authority). This is set on a best-effort basis by different issuers. If not set, the CA is assumed to be unknown/not available." format: byte type: string certificate: description: "The PEM encoded x509 certificate resulting from the certificate signing request. If not set, the CertificateRequest has either not been completed or has failed. More information on failure can be found by checking the `conditions` field." format: byte type: string conditions: description: "List of status conditions to indicate the status of a CertificateRequest. Known condition types are `Ready` and `InvalidRequest`." items: description: CertificateRequestCondition contains condition information for a CertificateRequest. properties: lastTransitionTime: description: LastTransitionTime is the timestamp corresponding to the last status change of this condition. format: date-time type: string message: description: "Message is a human readable description of the details of the last transition, complementing reason." type: string reason: description: "Reason is a brief machine readable explanation for the condition's last transition." type: string status: description: "Status of the condition, one of (`True`, `False`, `Unknown`)." enum: - "True" - "False" - Unknown type: string type: description: "Type of the condition, known values are (`Ready`, `InvalidRequest`, `Approved`, `Denied`)." type: string required: - status - type type: object type: array failureTime: description: FailureTime stores the time that this CertificateRequest failed. This is used to influence garbage collection and back-off. format: date-time type: string type: object type: object served: true storage: false subresources: status: {} - additionalPrinterColumns: - jsonPath: ".status.conditions[?(@.type==\"Approved\")].status" name: Approved type: string - jsonPath: ".status.conditions[?(@.type==\"Denied\")].status" name: Denied type: string - jsonPath: ".status.conditions[?(@.type==\"Ready\")].status" name: Ready type: string - jsonPath: ".spec.issuerRef.name" name: Issuer type: string - jsonPath: ".spec.username" name: Requestor type: string - jsonPath: ".status.conditions[?(@.type==\"Ready\")].message" name: Status priority: 1 type: string - description: CreationTimestamp is a timestamp representing the server time when this object was created. It is not guaranteed to be set in happens-before order across separate operations. Clients may not set this value. It is represented in RFC3339 form and is in UTC. jsonPath: ".metadata.creationTimestamp" name: Age type: date name: v1alpha3 schema: openAPIV3Schema: description: "A CertificateRequest is used to request a signed certificate from one of the configured issuers. \n All fields within the CertificateRequest's `spec` are immutable after creation. A CertificateRequest will either succeed or fail, as denoted by its `status.state` field. \n A CertificateRequest is a one-shot resource, meaning it represents a single point in time request for a certificate and cannot be re-used." properties: apiVersion: description: "APIVersion defines the versioned schema of this representation of an object. Servers should convert recognized schemas to the latest internal value, and may reject unrecognized values. More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#resources" type: string kind: description: "Kind is a string value representing the REST resource this object represents. Servers may infer this from the endpoint the client submits requests to. Cannot be updated. In CamelCase. More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#types-kinds" type: string metadata: type: object spec: description: Desired state of the CertificateRequest resource. properties: csr: description: The PEM-encoded x509 certificate signing request to be submitted to the CA for signing. format: byte type: string duration: description: "The requested 'duration' (i.e. lifetime) of the Certificate. This option may be ignored/overridden by some issuer types." type: string extra: additionalProperties: items: type: string type: array description: Extra contains extra attributes of the user that created the CertificateRequest. Populated by the cert-manager webhook on creation and immutable. type: object groups: description: Groups contains group membership of the user that created the CertificateRequest. Populated by the cert-manager webhook on creation and immutable. items: type: string type: array x-kubernetes-list-type: atomic isCA: description: "IsCA will request to mark the certificate as valid for certificate signing when submitting to the issuer. This will automatically add the `cert sign` usage to the list of `usages`." type: boolean issuerRef: description: "IssuerRef is a reference to the issuer for this CertificateRequest. If the `kind` field is not set, or set to `Issuer`, an Issuer resource with the given name in the same namespace as the CertificateRequest will be used. If the `kind` field is set to `ClusterIssuer`, a ClusterIssuer with the provided name will be used. The `name` field in this stanza is required at all times. The group field refers to the API group of the issuer which defaults to `cert-manager.io` if empty." properties: group: description: Group of the resource being referred to. type: string kind: description: Kind of the resource being referred to. type: string name: description: Name of the resource being referred to. type: string required: - name type: object uid: description: UID contains the uid of the user that created the CertificateRequest. Populated by the cert-manager webhook on creation and immutable. type: string usages: description: "Usages is the set of x509 usages that are requested for the certificate. Defaults to `digital signature` and `key encipherment` if not specified." items: description: "KeyUsage specifies valid usage contexts for keys. See: https://tools.ietf.org/html/rfc5280#section-4.2.1.3 https://tools.ietf.org/html/rfc5280#section-4.2.1.12 Valid KeyUsage values are as follows: \"signing\", \"digital signature\", \"content commitment\", \"key encipherment\", \"key agreement\", \"data encipherment\", \"cert sign\", \"crl sign\", \"encipher only\", \"decipher only\", \"any\", \"server auth\", \"client auth\", \"code signing\", \"email protection\", \"s/mime\", \"ipsec end system\", \"ipsec tunnel\", \"ipsec user\", \"timestamping\", \"ocsp signing\", \"microsoft sgc\", \"netscape sgc\"" enum: - signing - digital signature - content commitment - key encipherment - key agreement - data encipherment - cert sign - crl sign - encipher only - decipher only - any - server auth - client auth - code signing - email protection - s/mime - ipsec end system - ipsec tunnel - ipsec user - timestamping - ocsp signing - microsoft sgc - netscape sgc type: string type: array username: description: Username contains the name of the user that created the CertificateRequest. Populated by the cert-manager webhook on creation and immutable. type: string required: - csr - issuerRef type: object status: description: Status of the CertificateRequest. This is set and managed automatically. properties: ca: description: "The PEM encoded x509 certificate of the signer, also known as the CA (Certificate Authority). This is set on a best-effort basis by different issuers. If not set, the CA is assumed to be unknown/not available." format: byte type: string certificate: description: "The PEM encoded x509 certificate resulting from the certificate signing request. If not set, the CertificateRequest has either not been completed or has failed. More information on failure can be found by checking the `conditions` field." format: byte type: string conditions: description: "List of status conditions to indicate the status of a CertificateRequest. Known condition types are `Ready` and `InvalidRequest`." items: description: CertificateRequestCondition contains condition information for a CertificateRequest. properties: lastTransitionTime: description: LastTransitionTime is the timestamp corresponding to the last status change of this condition. format: date-time type: string message: description: "Message is a human readable description of the details of the last transition, complementing reason." type: string reason: description: "Reason is a brief machine readable explanation for the condition's last transition." type: string status: description: "Status of the condition, one of (`True`, `False`, `Unknown`)." enum: - "True" - "False" - Unknown type: string type: description: "Type of the condition, known values are (`Ready`, `InvalidRequest`, `Approved`, `Denied`)." type: string required: - status - type type: object type: array failureTime: description: FailureTime stores the time that this CertificateRequest failed. This is used to influence garbage collection and back-off. format: date-time type: string type: object type: object served: true storage: false subresources: status: {} - additionalPrinterColumns: - jsonPath: ".status.conditions[?(@.type==\"Approved\")].status" name: Approved type: string - jsonPath: ".status.conditions[?(@.type==\"Denied\")].status" name: Denied type: string - jsonPath: ".status.conditions[?(@.type==\"Ready\")].status" name: Ready type: string - jsonPath: ".spec.issuerRef.name" name: Issuer type: string - jsonPath: ".spec.username" name: Requestor type: string - jsonPath: ".status.conditions[?(@.type==\"Ready\")].message" name: Status priority: 1 type: string - description: CreationTimestamp is a timestamp representing the server time when this object was created. It is not guaranteed to be set in happens-before order across separate operations. Clients may not set this value. It is represented in RFC3339 form and is in UTC. jsonPath: ".metadata.creationTimestamp" name: Age type: date name: v1beta1 schema: openAPIV3Schema: description: "A CertificateRequest is used to request a signed certificate from one of the configured issuers. \n All fields within the CertificateRequest's `spec` are immutable after creation. A CertificateRequest will either succeed or fail, as denoted by its `status.state` field. \n A CertificateRequest is a one-shot resource, meaning it represents a single point in time request for a certificate and cannot be re-used." properties: apiVersion: description: "APIVersion defines the versioned schema of this representation of an object. Servers should convert recognized schemas to the latest internal value, and may reject unrecognized values. More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#resources" type: string kind: description: "Kind is a string value representing the REST resource this object represents. Servers may infer this from the endpoint the client submits requests to. Cannot be updated. In CamelCase. More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#types-kinds" type: string metadata: type: object spec: description: Desired state of the CertificateRequest resource. properties: duration: description: "The requested 'duration' (i.e. lifetime) of the Certificate. This option may be ignored/overridden by some issuer types." type: string extra: additionalProperties: items: type: string type: array description: Extra contains extra attributes of the user that created the CertificateRequest. Populated by the cert-manager webhook on creation and immutable. type: object groups: description: Groups contains group membership of the user that created the CertificateRequest. Populated by the cert-manager webhook on creation and immutable. items: type: string type: array x-kubernetes-list-type: atomic isCA: description: "IsCA will request to mark the certificate as valid for certificate signing when submitting to the issuer. This will automatically add the `cert sign` usage to the list of `usages`." type: boolean issuerRef: description: "IssuerRef is a reference to the issuer for this CertificateRequest. If the `kind` field is not set, or set to `Issuer`, an Issuer resource with the given name in the same namespace as the CertificateRequest will be used. If the `kind` field is set to `ClusterIssuer`, a ClusterIssuer with the provided name will be used. The `name` field in this stanza is required at all times. The group field refers to the API group of the issuer which defaults to `cert-manager.io` if empty." properties: group: description: Group of the resource being referred to. type: string kind: description: Kind of the resource being referred to. type: string name: description: Name of the resource being referred to. type: string required: - name type: object request: description: The PEM-encoded x509 certificate signing request to be submitted to the CA for signing. format: byte type: string uid: description: UID contains the uid of the user that created the CertificateRequest. Populated by the cert-manager webhook on creation and immutable. type: string usages: description: "Usages is the set of x509 usages that are requested for the certificate. Defaults to `digital signature` and `key encipherment` if not specified." items: description: "KeyUsage specifies valid usage contexts for keys. See: https://tools.ietf.org/html/rfc5280#section-4.2.1.3 https://tools.ietf.org/html/rfc5280#section-4.2.1.12 Valid KeyUsage values are as follows: \"signing\", \"digital signature\", \"content commitment\", \"key encipherment\", \"key agreement\", \"data encipherment\", \"cert sign\", \"crl sign\", \"encipher only\", \"decipher only\", \"any\", \"server auth\", \"client auth\", \"code signing\", \"email protection\", \"s/mime\", \"ipsec end system\", \"ipsec tunnel\", \"ipsec user\", \"timestamping\", \"ocsp signing\", \"microsoft sgc\", \"netscape sgc\"" enum: - signing - digital signature - content commitment - key encipherment - key agreement - data encipherment - cert sign - crl sign - encipher only - decipher only - any - server auth - client auth - code signing - email protection - s/mime - ipsec end system - ipsec tunnel - ipsec user - timestamping - ocsp signing - microsoft sgc - netscape sgc type: string type: array username: description: Username contains the name of the user that created the CertificateRequest. Populated by the cert-manager webhook on creation and immutable. type: string required: - issuerRef - request type: object status: description: Status of the CertificateRequest. This is set and managed automatically. properties: ca: description: "The PEM encoded x509 certificate of the signer, also known as the CA (Certificate Authority). This is set on a best-effort basis by different issuers. If not set, the CA is assumed to be unknown/not available." format: byte type: string certificate: description: "The PEM encoded x509 certificate resulting from the certificate signing request. If not set, the CertificateRequest has either not been completed or has failed. More information on failure can be found by checking the `conditions` field." format: byte type: string conditions: description: "List of status conditions to indicate the status of a CertificateRequest. Known condition types are `Ready` and `InvalidRequest`." items: description: CertificateRequestCondition contains condition information for a CertificateRequest. properties: lastTransitionTime: description: LastTransitionTime is the timestamp corresponding to the last status change of this condition. format: date-time type: string message: description: "Message is a human readable description of the details of the last transition, complementing reason." type: string reason: description: "Reason is a brief machine readable explanation for the condition's last transition." type: string status: description: "Status of the condition, one of (`True`, `False`, `Unknown`)." enum: - "True" - "False" - Unknown type: string type: description: "Type of the condition, known values are (`Ready`, `InvalidRequest`, `Approved`, `Denied`)." type: string required: - status - type type: object type: array failureTime: description: FailureTime stores the time that this CertificateRequest failed. This is used to influence garbage collection and back-off. format: date-time type: string type: object required: - spec type: object served: true storage: false subresources: status: {} - additionalPrinterColumns: - jsonPath: ".status.conditions[?(@.type==\"Approved\")].status" name: Approved type: string - jsonPath: ".status.conditions[?(@.type==\"Denied\")].status" name: Denied type: string - jsonPath: ".status.conditions[?(@.type==\"Ready\")].status" name: Ready type: string - jsonPath: ".spec.issuerRef.name" name: Issuer type: string - jsonPath: ".spec.username" name: Requestor type: string - jsonPath: ".status.conditions[?(@.type==\"Ready\")].message" name: Status priority: 1 type: string - description: CreationTimestamp is a timestamp representing the server time when this object was created. It is not guaranteed to be set in happens-before order across separate operations. Clients may not set this value. It is represented in RFC3339 form and is in UTC. jsonPath: ".metadata.creationTimestamp" name: Age type: date name: v1 schema: openAPIV3Schema: description: "A CertificateRequest is used to request a signed certificate from one of the configured issuers. \n All fields within the CertificateRequest's `spec` are immutable after creation. A CertificateRequest will either succeed or fail, as denoted by its `status.state` field. \n A CertificateRequest is a one-shot resource, meaning it represents a single point in time request for a certificate and cannot be re-used." properties: apiVersion: description: "APIVersion defines the versioned schema of this representation of an object. Servers should convert recognized schemas to the latest internal value, and may reject unrecognized values. More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#resources" type: string kind: description: "Kind is a string value representing the REST resource this object represents. Servers may infer this from the endpoint the client submits requests to. Cannot be updated. In CamelCase. More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#types-kinds" type: string metadata: type: object spec: description: Desired state of the CertificateRequest resource. properties: duration: description: "The requested 'duration' (i.e. lifetime) of the Certificate. This option may be ignored/overridden by some issuer types." type: string extra: additionalProperties: items: type: string type: array description: Extra contains extra attributes of the user that created the CertificateRequest. Populated by the cert-manager webhook on creation and immutable. type: object groups: description: Groups contains group membership of the user that created the CertificateRequest. Populated by the cert-manager webhook on creation and immutable. items: type: string type: array x-kubernetes-list-type: atomic isCA: description: "IsCA will request to mark the certificate as valid for certificate signing when submitting to the issuer. This will automatically add the `cert sign` usage to the list of `usages`." type: boolean issuerRef: description: "IssuerRef is a reference to the issuer for this CertificateRequest. If the `kind` field is not set, or set to `Issuer`, an Issuer resource with the given name in the same namespace as the CertificateRequest will be used. If the `kind` field is set to `ClusterIssuer`, a ClusterIssuer with the provided name will be used. The `name` field in this stanza is required at all times. The group field refers to the API group of the issuer which defaults to `cert-manager.io` if empty." properties: group: description: Group of the resource being referred to. type: string kind: description: Kind of the resource being referred to. type: string name: description: Name of the resource being referred to. type: string required: - name type: object request: description: The PEM-encoded x509 certificate signing request to be submitted to the CA for signing. format: byte type: string uid: description: UID contains the uid of the user that created the CertificateRequest. Populated by the cert-manager webhook on creation and immutable. type: string usages: description: "Usages is the set of x509 usages that are requested for the certificate. If usages are set they SHOULD be encoded inside the CSR spec Defaults to `digital signature` and `key encipherment` if not specified." items: description: "KeyUsage specifies valid usage contexts for keys. See: https://tools.ietf.org/html/rfc5280#section-4.2.1.3 https://tools.ietf.org/html/rfc5280#section-4.2.1.12 Valid KeyUsage values are as follows: \"signing\", \"digital signature\", \"content commitment\", \"key encipherment\", \"key agreement\", \"data encipherment\", \"cert sign\", \"crl sign\", \"encipher only\", \"decipher only\", \"any\", \"server auth\", \"client auth\", \"code signing\", \"email protection\", \"s/mime\", \"ipsec end system\", \"ipsec tunnel\", \"ipsec user\", \"timestamping\", \"ocsp signing\", \"microsoft sgc\", \"netscape sgc\"" enum: - signing - digital signature - content commitment - key encipherment - key agreement - data encipherment - cert sign - crl sign - encipher only - decipher only - any - server auth - client auth - code signing - email protection - s/mime - ipsec end system - ipsec tunnel - ipsec user - timestamping - ocsp signing - microsoft sgc - netscape sgc type: string type: array username: description: Username contains the name of the user that created the CertificateRequest. Populated by the cert-manager webhook on creation and immutable. type: string required: - issuerRef - request type: object status: description: Status of the CertificateRequest. This is set and managed automatically. properties: ca: description: "The PEM encoded x509 certificate of the signer, also known as the CA (Certificate Authority). This is set on a best-effort basis by different issuers. If not set, the CA is assumed to be unknown/not available." format: byte type: string certificate: description: "The PEM encoded x509 certificate resulting from the certificate signing request. If not set, the CertificateRequest has either not been completed or has failed. More information on failure can be found by checking the `conditions` field." format: byte type: string conditions: description: "List of status conditions to indicate the status of a CertificateRequest. Known condition types are `Ready` and `InvalidRequest`." items: description: CertificateRequestCondition contains condition information for a CertificateRequest. properties: lastTransitionTime: description: LastTransitionTime is the timestamp corresponding to the last status change of this condition. format: date-time type: string message: description: "Message is a human readable description of the details of the last transition, complementing reason." type: string reason: description: "Reason is a brief machine readable explanation for the condition's last transition." type: string status: description: "Status of the condition, one of (`True`, `False`, `Unknown`)." enum: - "True" - "False" - Unknown type: string type: description: "Type of the condition, known values are (`Ready`, `InvalidRequest`, `Approved`, `Denied`)." type: string required: - status - type type: object type: array failureTime: description: FailureTime stores the time that this CertificateRequest failed. This is used to influence garbage collection and back-off. format: date-time type: string type: object required: - spec type: object served: true storage: true subresources: status: {} status: acceptedNames: kind: "" plural: "" conditions: [] storedVersions: []
58.015235
651
0.561582
79269638063956003132ac2f090dfd5ef3d774bf
298
yaml
YAML
examples/simple/job2.yaml
Akiros001/k8s-AppController
c55ce0588dbd96679637ab0c07f3889c6c29be2c
[ "Apache-2.0" ]
233
2016-08-02T13:29:31.000Z
2022-03-25T13:51:52.000Z
examples/simple/job2.yaml
Akiros001/k8s-AppController
c55ce0588dbd96679637ab0c07f3889c6c29be2c
[ "Apache-2.0" ]
233
2016-08-05T12:50:44.000Z
2018-10-17T13:31:42.000Z
examples/simple/job2.yaml
Akiros001/k8s-AppController
c55ce0588dbd96679637ab0c07f3889c6c29be2c
[ "Apache-2.0" ]
41
2016-08-16T10:11:56.000Z
2021-11-27T17:54:25.000Z
apiVersion: batch/v1 kind: Job metadata: name: test-job2 spec: template: metadata: name: test-job2 spec: containers: - name: test-container image: gcr.io/google_containers/busybox command: [ "/bin/sh", "-c", "sleep 20; env"] restartPolicy: Never
19.866667
52
0.610738
7926dbff539d69c1b4347960ad7715e04763938a
371
yaml
YAML
apps/frontend/hpa.yaml
therealmitchconnors/gitops-istio
1d63130b275d470083315266223a421a9f2b1331
[ "Apache-2.0" ]
null
null
null
apps/frontend/hpa.yaml
therealmitchconnors/gitops-istio
1d63130b275d470083315266223a421a9f2b1331
[ "Apache-2.0" ]
1
2021-11-30T21:30:28.000Z
2021-11-30T21:30:28.000Z
apps/frontend/hpa.yaml
therealmitchconnors/gitops-istio
1d63130b275d470083315266223a421a9f2b1331
[ "Apache-2.0" ]
null
null
null
apiVersion: autoscaling/v2beta2 kind: HorizontalPodAutoscaler metadata: name: frontend namespace: prod spec: scaleTargetRef: apiVersion: apps/v1 kind: Deployment name: frontend minReplicas: 1 maxReplicas: 4 metrics: - type: Resource resource: name: cpu target: type: Utilization averageUtilization: 99
19.526316
32
0.665768
7927061bd25ed0f93154c087366fda17de9ce325
422
yaml
YAML
Helm/rkm-outpost/templates/network-policy-default-deny-allow-dns.yaml
andiexer/rkm
fc18b44c0e9d7c30e8626b8ac035c964310d9ecd
[ "Apache-2.0" ]
5
2020-03-29T13:02:08.000Z
2020-09-07T10:02:03.000Z
Helm/rkm-outpost/templates/network-policy-default-deny-allow-dns.yaml
andiexer/rkm
fc18b44c0e9d7c30e8626b8ac035c964310d9ecd
[ "Apache-2.0" ]
6
2020-03-29T13:06:37.000Z
2020-07-19T15:34:47.000Z
Helm/rkm-outpost/templates/network-policy-default-deny-allow-dns.yaml
andiexer/rkm
fc18b44c0e9d7c30e8626b8ac035c964310d9ecd
[ "Apache-2.0" ]
1
2020-04-02T08:56:28.000Z
2020-04-02T08:56:28.000Z
--- apiVersion: networking.k8s.io/v1 kind: NetworkPolicy metadata: name: netpol-default-deny-allow-dns spec: podSelector: matchLabels: {} policyTypes: - Ingress - Egress egress: - to: - namespaceSelector: matchLabels: name: kube-system podSelector: matchLabels: name: kube-dns - ports: - protocol: TCP port: 53 - protocol: UDP port: 53
17.583333
37
0.599526
792717f44a37550e47f8f826aabbbc5eff5b77af
16,042
yaml
YAML
config/300-azureeventhubsource.yaml
angie1148/triggermesh
b8b9d9bf6605835c92dc9b9b0fca36bca9c661bb
[ "Apache-2.0" ]
2
2022-02-04T15:50:07.000Z
2022-03-29T18:51:06.000Z
config/300-azureeventhubsource.yaml
angie1148/triggermesh
b8b9d9bf6605835c92dc9b9b0fca36bca9c661bb
[ "Apache-2.0" ]
1
2022-03-18T09:52:12.000Z
2022-03-18T09:52:12.000Z
config/300-azureeventhubsource.yaml
angie1148/triggermesh
b8b9d9bf6605835c92dc9b9b0fca36bca9c661bb
[ "Apache-2.0" ]
null
null
null
# Copyright 2022 TriggerMesh Inc. # # Licensed under the Apache License, Version 2.0 (the "License"); # you may not use this file except in compliance with the License. # You may obtain a copy of the License at # # http://www.apache.org/licenses/LICENSE-2.0 # # Unless required by applicable law or agreed to in writing, software # distributed under the License is distributed on an "AS IS" BASIS, # WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. # See the License for the specific language governing permissions and # limitations under the License. apiVersion: apiextensions.k8s.io/v1 kind: CustomResourceDefinition metadata: name: azureeventhubsources.sources.triggermesh.io labels: eventing.knative.dev/source: 'true' duck.knative.dev/source: 'true' knative.dev/crd-install: 'true' triggermesh.io/crd-install: 'true' annotations: registry.knative.dev/eventTypes: | [ { "type": "com.azure.eventhub.event" } ] spec: group: sources.triggermesh.io scope: Namespaced names: kind: AzureEventHubSource plural: azureeventhubsources categories: - all - knative - eventing - sources versions: - name: v1alpha1 served: true storage: true subresources: status: {} schema: openAPIV3Schema: description: TriggerMesh event source for Azure Event Hubs. type: object properties: spec: description: Desired state of the event source. type: object properties: adapterOverrides: description: Kubernetes object parameters to apply on top of default adapter values. type: object properties: resources: description: 'Compute Resources required by the adapter. More info: https://kubernetes.io/docs/concepts/configuration/manage-resources-containers/' type: object properties: limits: additionalProperties: anyOf: - type: integer - type: string pattern: ^(\+|-)?(([0-9]+(\.[0-9]*)?)|(\.[0-9]+))(([KMGTPE]i)|[numkMGTPE]|([eE](\+|-)?(([0-9]+(\.[0-9]*)?)|(\.[0-9]+))))?$ x-kubernetes-int-or-string: true description: 'Limits describes the maximum amount of compute resources allowed. More info: https://kubernetes.io/docs/concepts/configuration/manage-resources-containers/' type: object requests: additionalProperties: anyOf: - type: integer - type: string pattern: ^(\+|-)?(([0-9]+(\.[0-9]*)?)|(\.[0-9]+))(([KMGTPE]i)|[numkMGTPE]|([eE](\+|-)?(([0-9]+(\.[0-9]*)?)|(\.[0-9]+))))?$ x-kubernetes-int-or-string: true description: 'Requests describes the minimum amount of compute resources required. If Requests is omitted for a container, it defaults to Limits if that is explicitly specified, otherwise to an implementation-defined value. More info: https://kubernetes.io/docs/concepts/configuration/manage-resources-containers/' type: object tolerations: description: Pod tolerations, as documented at https://kubernetes.io/docs/concepts/scheduling-eviction/taint-and-toleration/ type: array items: type: object properties: key: description: Taint key that the toleration applies to. type: string operator: description: Key's relationship to the value. type: string enum: [Exists, Equal] value: description: Taint value the toleration matches to. type: string effect: description: Taint effect to match. type: string enum: [NoSchedule, PreferNoSchedule, NoExecute] tolerationSeconds: description: Period of time a toleration of effect NoExecute tolerates the taint. type: integer format: int64 eventHubID: description: |- Resource ID of the Event Hubs instance. The expected format is /subscriptions/{subscriptionId}/resourceGroups/{resourceGroupName}/providers/Microsoft.EventHub/namespaces/{namespaceName}/eventhubs/{eventHubName} type: string pattern: ^\/subscriptions\/[a-z0-9-]+\/resourceGroups\/[\w.()-]+\/providers\/Microsoft.EventHub\/namespaces\/[A-Za-z0-9-]{6,50}\/event[Hh]ubs\/[a-zA-Z0-9][\w.-]{0,49}$ auth: description: Authentication method to interact with the Azure Event Hubs REST API. type: object properties: sasToken: description: An Azure shared access signature (SAS) token. For more information about SAS tokens, please refer to the Azure Storage documentation at https://docs.microsoft.com/en-us/azure/storage/common/storage-sas-overview. type: object properties: keyName: description: Name of the key used by the SAS token. Mutually exclusive with 'connectionString'. type: object properties: value: description: Literal name of the key. type: string valueFromSecret: description: A reference to a Kubernetes Secret object containing the key's name. type: object properties: name: type: string key: type: string required: - name - key oneOf: - required: [value] - required: [valueFromSecret] keyValue: description: Value of the key used by the SAS token. Mutually exclusive with 'connectionString'. type: object properties: value: description: Literal value of the key. type: string valueFromSecret: description: A reference to a Kubernetes Secret object containing the key's value. type: object properties: name: type: string key: type: string required: - name - key oneOf: - required: [value] - required: [valueFromSecret] connectionString: description: Connection string containing both the resource URI of the Event Hubs instance, and the SAS token. Mutually exclusive with 'keyName' and 'keyValue'. type: object properties: value: description: Literal value of the connection string. type: string valueFromSecret: description: A reference to a Kubernetes Secret object containing the connection string. type: object properties: name: type: string key: type: string required: - name - key oneOf: - required: [value] - required: [valueFromSecret] oneOf: - required: - keyName - keyValue - required: - connectionString servicePrincipal: description: Credentials of an Azure Service Principal. For more information about service principals, please refer to the Azure Active Directory documentation at https://docs.microsoft.com/en-us/azure/active-directory/develop/app-objects-and-service-principals. type: object properties: tenantID: description: ID of the Azure Active Directory tenant. type: object properties: value: description: Literal value of the tenant ID. type: string format: guid pattern: ^[0-9A-Fa-f]{8}(?:-[0-9A-Fa-f]{4}){3}-[0-9A-Fa-f]{12}$ valueFromSecret: description: A reference to a Kubernetes Secret object containing the tenant ID. type: object properties: name: type: string key: type: string required: - name - key oneOf: - required: [value] - required: [valueFromSecret] clientID: description: ID of the registered client/application. type: object properties: value: description: Literal value of the client ID. type: string format: guid pattern: ^[0-9A-Fa-f]{8}(?:-[0-9A-Fa-f]{4}){3}-[0-9A-Fa-f]{12}$ valueFromSecret: description: A reference to a Kubernetes Secret object containing the client ID. type: object properties: name: type: string key: type: string required: - name - key oneOf: - required: [value] - required: [valueFromSecret] clientSecret: description: Secret associated with the registered client/application. type: object properties: value: description: Literal value of the client secret. type: string format: password valueFromSecret: description: A reference to a Kubernetes Secret object containing the client secret. type: object properties: name: type: string key: type: string required: - name - key oneOf: - required: [value] - required: [valueFromSecret] required: - tenantID - clientID - clientSecret oneOf: - required: [sasToken] - required: [servicePrincipal] sink: description: The destination of events sourced from Azure Event Hubs. type: object properties: ref: description: Reference to an addressable Kubernetes object to be used as the destination of events. type: object properties: apiVersion: type: string kind: type: string namespace: type: string name: type: string required: - apiVersion - kind - name uri: description: URI to use as the destination of events. type: string format: uri oneOf: - required: [ref] - required: [uri] required: - eventHubID - auth - sink status: description: Reported status of the event source. type: object properties: sinkUri: description: URI of the sink where events are currently sent to. type: string format: uri ceAttributes: type: array items: type: object properties: type: type: string source: type: string required: - type - source observedGeneration: type: integer format: int64 conditions: type: array items: type: object properties: type: type: string status: type: string enum: ['True', 'False', Unknown] severity: type: string enum: [Error, Warning, Info] reason: type: string message: type: string lastTransitionTime: type: string format: date-time required: - type - status additionalPrinterColumns: - name: Ready type: string jsonPath: .status.conditions[?(@.type=='Ready')].status - name: Reason type: string jsonPath: .status.conditions[?(@.type=='Ready')].reason - name: Sink type: string jsonPath: .status.sinkUri - name: Age type: date jsonPath: .metadata.creationTimestamp
43.356757
183
0.423077
79280a2009001e4b16ea019ee0cc82b79d9f9a4e
1,025
yaml
YAML
k8s/mks-config/service.yaml
MiniTeks/mks
c054a2343f1e20e1a181c1501aeb73b19b457121
[ "Apache-2.0" ]
10
2022-01-25T09:37:54.000Z
2022-03-12T12:39:45.000Z
k8s/mks-config/service.yaml
MiniTeks/mks
c054a2343f1e20e1a181c1501aeb73b19b457121
[ "Apache-2.0" ]
22
2022-01-30T13:10:39.000Z
2022-03-01T12:40:13.000Z
k8s/mks-config/service.yaml
MiniTeks/mks
c054a2343f1e20e1a181c1501aeb73b19b457121
[ "Apache-2.0" ]
1
2022-02-20T06:29:40.000Z
2022-02-20T06:29:40.000Z
# SPDX-License-Identifier: Apache-2.0 # SPDX-FileCopyrightText: 2022 Satyam Bhardwaj <[email protected]> # SPDX-FileCopyrightText: 2022 Utkarsh Chaurasia <[email protected]> # SPDX-FileCopyrightText: 2022 Avinal Kumar <[email protected]> # Licensed under the Apache License, Version 2.0 (the "License"); # you may not use this file except in compliance with the License. # You may obtain a copy of the License at # http://www.apache.org/licenses/LICENSE-2.0 # Unless required by applicable law or agreed to in writing, software # distributed under the License is distributed on an "AS IS" BASIS, # WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. # See the License for the specific language governing permissions and # limitations under the License. apiVersion: v1 kind: Service metadata: name: mks-server namespace: mks spec: selector: app: mks-server externalIPs: - "1.2.4.120" ports: - name: mks-server port: 4000 targetPort: 4000 status: loadBalancer: {}
31.060606
74
0.748293
792816bd7eb7a43cabaa20a9c029e7df000f126b
146
yaml
YAML
overlays/development-monitoring/ops/bbb-basic-auth-secret.yaml
willokay/jitsi-deployment
1ffcaa0f64d7d157861156e406602deacd13a2b5
[ "MIT" ]
null
null
null
overlays/development-monitoring/ops/bbb-basic-auth-secret.yaml
willokay/jitsi-deployment
1ffcaa0f64d7d157861156e406602deacd13a2b5
[ "MIT" ]
null
null
null
overlays/development-monitoring/ops/bbb-basic-auth-secret.yaml
willokay/jitsi-deployment
1ffcaa0f64d7d157861156e406602deacd13a2b5
[ "MIT" ]
null
null
null
apiVersion: v1 kind: Secret metadata: namespace: monitoring name: bbb-basic-auth data: username: ZXVkaQ== password: Q29taWNW type: Opaque
14.6
23
0.746575
79281ca7cef7366788f748f05384b660911c61cb
193
yml
YAML
infra/k8s/depot/internal/service.prod.yml
skeswa/gophr
e811c582b32b7fd3ec5915d1b91e28c81e47d8cd
[ "Apache-2.0" ]
19
2016-03-12T19:47:43.000Z
2016-09-28T15:48:31.000Z
infra/k8s/depot/internal/service.prod.yml
skeswa/gophr
e811c582b32b7fd3ec5915d1b91e28c81e47d8cd
[ "Apache-2.0" ]
126
2016-03-29T18:28:12.000Z
2016-09-29T03:29:45.000Z
infra/k8s/depot/internal/service.prod.yml
gophr-pm/gophr
e811c582b32b7fd3ec5915d1b91e28c81e47d8cd
[ "Apache-2.0" ]
2
2016-11-01T03:04:07.000Z
2016-11-22T06:35:36.000Z
apiVersion: v1 kind: Service metadata: name: depot-int-svc labels: module: depot-int namespace: gophr spec: ports: - name: http port: 80 selector: module: depot-int
13.785714
21
0.647668
7928203c9c17c166d513417355f36c268b41e7a9
1,157
yaml
YAML
cluster/addons/dashboard/dashboard-controller.yaml
ibotty/kubernetes
e58788be6da4b89b318b1b8760f1110b39e47b19
[ "Apache-2.0" ]
null
null
null
cluster/addons/dashboard/dashboard-controller.yaml
ibotty/kubernetes
e58788be6da4b89b318b1b8760f1110b39e47b19
[ "Apache-2.0" ]
null
null
null
cluster/addons/dashboard/dashboard-controller.yaml
ibotty/kubernetes
e58788be6da4b89b318b1b8760f1110b39e47b19
[ "Apache-2.0" ]
null
null
null
# This file should be kept in sync with cluster/images/hyperkube/dashboard-rc.yaml # and cluster/gce/coreos/kube-manifests/addons/dashboard/dashboard-controller.yaml apiVersion: v1 kind: ReplicationController metadata: name: kubernetes-dashboard-v1.0.1 namespace: kube-system labels: k8s-app: kubernetes-dashboard version: v1.0.1 kubernetes.io/cluster-service: "true" spec: replicas: 1 selector: k8s-app: kubernetes-dashboard template: metadata: labels: k8s-app: kubernetes-dashboard version: v1.0.1 kubernetes.io/cluster-service: "true" spec: containers: - name: kubernetes-dashboard image: gcr.io/google_containers/kubernetes-dashboard-amd64:v1.0.1 resources: # keep request = limit to keep this container in guaranteed class limits: cpu: 100m memory: 50Mi requests: cpu: 100m memory: 50Mi ports: - containerPort: 9090 livenessProbe: httpGet: path: / port: 9090 initialDelaySeconds: 30 timeoutSeconds: 30
27.547619
82
0.627485
7928ec4dd79a858a89df5625de938b0b4149c9ec
963
yaml
YAML
pkg/addons/data/ClusterRole.rbac.authorization.k8s.io/system-controller-disruption-controller.yaml
openshift-cherrypick-robot/openshift-azure
a75d167bd88bb88366f1e7cb137de4e57496a176
[ "Apache-2.0" ]
null
null
null
pkg/addons/data/ClusterRole.rbac.authorization.k8s.io/system-controller-disruption-controller.yaml
openshift-cherrypick-robot/openshift-azure
a75d167bd88bb88366f1e7cb137de4e57496a176
[ "Apache-2.0" ]
null
null
null
pkg/addons/data/ClusterRole.rbac.authorization.k8s.io/system-controller-disruption-controller.yaml
openshift-cherrypick-robot/openshift-azure
a75d167bd88bb88366f1e7cb137de4e57496a176
[ "Apache-2.0" ]
null
null
null
apiVersion: rbac.authorization.k8s.io/v1 kind: ClusterRole metadata: annotations: authorization.openshift.io/system-only: "true" rbac.authorization.kubernetes.io/autoupdate: "true" labels: kubernetes.io/bootstrapping: rbac-defaults name: system:controller:disruption-controller rules: - apiGroups: - apps - extensions resources: - deployments verbs: - get - list - watch - apiGroups: - apps - extensions resources: - replicasets verbs: - get - list - watch - apiGroups: - "" resources: - replicationcontrollers verbs: - get - list - watch - apiGroups: - policy resources: - poddisruptionbudgets verbs: - get - list - watch - apiGroups: - apps resources: - statefulsets verbs: - get - list - watch - apiGroups: - policy resources: - poddisruptionbudgets/status verbs: - update - apiGroups: - "" resources: - events verbs: - create - patch - update
14.373134
55
0.657321
792938ef4de8b97551721e139bcfb27f9c37306c
1,593
yaml
YAML
manifests-k8s/0013_deployment_special-resource-controller-manager.yaml
rmr-silicom/special-resource-operator
6faf0b12578eafe485b224b5b1d10d21b5d7b764
[ "Apache-2.0" ]
19
2019-09-27T15:43:54.000Z
2021-11-13T13:44:58.000Z
manifests-k8s/0013_deployment_special-resource-controller-manager.yaml
rmr-silicom/special-resource-operator
6faf0b12578eafe485b224b5b1d10d21b5d7b764
[ "Apache-2.0" ]
309
2020-01-31T13:21:31.000Z
2022-03-31T10:44:10.000Z
manifests-k8s/0013_deployment_special-resource-controller-manager.yaml
rmr-silicom/special-resource-operator
6faf0b12578eafe485b224b5b1d10d21b5d7b764
[ "Apache-2.0" ]
34
2020-11-09T14:26:53.000Z
2022-03-27T17:24:37.000Z
apiVersion: apps/v1 kind: Deployment metadata: labels: control-plane: controller-manager name: special-resource-controller-manager namespace: openshift-special-resource-operator spec: replicas: 1 selector: matchLabels: control-plane: controller-manager template: metadata: labels: control-plane: controller-manager spec: containers: - args: - --enable-leader-election command: - /manager env: - name: OPERATOR_NAMESPACE valueFrom: fieldRef: fieldPath: metadata.namespace - name: RELEASE_VERSION value: 0.0.1-snapshot - name: SSL_CERT_DIR value: /etc/pki/tls/certs image: quay.io/openshift-psap/special-resource-operator:operator-sdk-version imagePullPolicy: Always name: manager resources: limits: cpu: 300m memory: 500Mi requests: cpu: 300m memory: 500Mi securityContext: allowPrivilegeEscalation: false readOnlyRootFilesystem: true volumeMounts: - mountPath: /cache name: cache-volume - mountPath: /home/nonroot/.docker name: cred-volume securityContext: runAsGroup: 499 runAsNonRoot: true runAsUser: 499 serviceAccountName: special-resource-controller-manager terminationGracePeriodSeconds: 10 volumes: - emptyDir: {} name: cache-volume - emptyDir: {} name: cred-volume
26.114754
84
0.595104
79294ef9209c9940c88bee45e364d44a73667036
18,578
yaml
YAML
k8s/graphite-configmap.yaml
michal-franc/screeps-grafana
3960273d0845ce772eb8544af99f17eff6a51b31
[ "MIT" ]
null
null
null
k8s/graphite-configmap.yaml
michal-franc/screeps-grafana
3960273d0845ce772eb8544af99f17eff6a51b31
[ "MIT" ]
null
null
null
k8s/graphite-configmap.yaml
michal-franc/screeps-grafana
3960273d0845ce772eb8544af99f17eff6a51b31
[ "MIT" ]
1
2021-10-31T21:03:54.000Z
2021-10-31T21:03:54.000Z
apiVersion: v1 kind: ConfigMap metadata: name: graphite-config namespace: screeps data: carbon.conf: "[cache]\n# Configure carbon directories.\n#\n# OS environment variables can be used to tell carbon where graphite is\n# installed, where to read configuration from and where to write data.\n#\n# GRAPHITE_ROOT - Root directory of the graphite installation.\n# Defaults to ../\n# GRAPHITE_CONF_DIR \ - Configuration directory (where this file lives).\n# Defaults to $GRAPHITE_ROOT/conf/\n# GRAPHITE_STORAGE_DIR - Storage directory for whipser/rrd/log/pid files.\n# Defaults to $GRAPHITE_ROOT/storage/\n#\n# To change other directory paths, add settings to this file. The following\n# configuration variables are available with these default values:\n#\n\n# STORAGE_DIR = /opt/graphite/storage/whisper/\n# CONF_DIR = /opt/graphite/conf/\n# LOG_DIR = /opt/graphite/storage/log/\n# PID_DIR = /var/run/\n\nLOCAL_DATA_DIR = /opt/graphite/storage/whisper/\n\n# Enable daily log rotation. If disabled, a kill -HUP can be used after a manual rotate\nENABLE_LOGROTATION = True\n\n# Specify the user to drop privileges to\n# If this is blank carbon runs as the user that invokes it\n# This user must have write access to the local data directory\nUSER =\n#\n# NOTE: The above settings must be set under [relay] and [aggregator]\n# to take effect for those daemons as well\n\n# Limit the size of the cache to avoid swapping or becoming CPU bound.\n# Sorts and serving cache queries gets more expensive as the cache grows.\n# Use the value \"inf\" (infinity) for an unlimited cache size.\nMAX_CACHE_SIZE = inf\n\n# Limits the number of whisper update_many() calls per second, which effectively\n# means the number of write requests sent to the disk. This is intended to\n# prevent over-utilizing the disk and thus starving the rest of the system.\n# When the rate of required updates exceeds this, then carbon's caching will\n# take effect and increase the overall throughput accordingly.\nMAX_UPDATES_PER_SECOND = 500\n\n# If defined, this changes the MAX_UPDATES_PER_SECOND in Carbon when a\n# stop/shutdown is initiated. This helps when MAX_UPDATES_PER_SECOND is\n# relatively low and carbon has cached a lot of updates; it enables the carbon\n# daemon to shutdown more quickly. \n# MAX_UPDATES_PER_SECOND_ON_SHUTDOWN = 1000\n\n# Softly limits the number of whisper files that get created each minute.\n# Setting this value low (like at 50) is a good way to ensure your graphite\n# system will not be adversely impacted when a bunch of new metrics are\n# sent to it. The trade off is that it will take much longer for those metrics'\n# database files to all get created and thus longer until the data becomes usable.\n# Setting this value high (like \"inf\" for infinity) will cause graphite to create\n# the files quickly but at the risk of slowing I/O down considerably for a while.\nMAX_CREATES_PER_MINUTE = 50\n\nLINE_RECEIVER_INTERFACE = 0.0.0.0\nLINE_RECEIVER_PORT = 2003\n\n# Set this to True to enable the UDP listener. By default this is off\n# because it is very common to run multiple carbon daemons and managing\n# another (rarely used) port for every carbon instance is not fun.\nENABLE_UDP_LISTENER = True\nUDP_RECEIVER_INTERFACE = 0.0.0.0\nUDP_RECEIVER_PORT = 2003\n\nPICKLE_RECEIVER_INTERFACE = 0.0.0.0\nPICKLE_RECEIVER_PORT = 2004\n\n# Set to false to disable logging of successful connections\nLOG_LISTENER_CONNECTIONS = False\n\n# Per security concerns outlined in Bug #817247 the pickle receiver\n# will use a more secure and slightly less efficient unpickler.\n# Set this to True to revert to the old-fashioned insecure unpickler.\nUSE_INSECURE_UNPICKLER = False\n\nCACHE_QUERY_INTERFACE = 0.0.0.0\nCACHE_QUERY_PORT = 7002\n\n# Set this to False to drop datapoints received after the cache\n# reaches MAX_CACHE_SIZE. If this is True (the default) then sockets\n# over which metrics are received will temporarily stop accepting\n# data until the cache size falls below 95% MAX_CACHE_SIZE.\nUSE_FLOW_CONTROL = True\n\n# By default, carbon-cache will log every whisper update and cache hit. This can be excessive and\n# degrade performance if logging on the same volume as the whisper data is stored.\nLOG_UPDATES = False\nLOG_CACHE_HITS = False\nLOG_CACHE_QUEUE_SORTS = True\n\n# The thread that writes metrics to disk can use on of the following strategies\n# determining the order in which metrics are removed from cache and flushed to\n# disk. The default option preserves the same behavior as has been historically\n# available in version 0.9.10.\n#\n# sorted - All metrics in the cache will be counted and an ordered list of\n# them will be sorted according to the number of datapoints in the cache at the\n# moment of the list's creation. Metrics will then be flushed from the cache to\n# disk in that order.\n#\n# max - The writer thread will always pop and flush the metric from cache\n# that has the most datapoints. This will give a strong flush preference to\n# frequently updated metrics and will also reduce random file-io. Infrequently\n# updated metrics may only ever be persisted to disk at daemon shutdown if\n# there are a large number of metrics which receive very frequent updates OR if\n# disk i/o is very slow.\n#\n# naive - Metrics will be flushed from the cache to disk in an unordered\n# fashion. This strategy may be desirable in situations where the storage for\n# whisper files is solid state, CPU resources are very limited or deference to\n# the OS's i/o scheduler is expected to compensate for the random write\n# pattern.\n#\nCACHE_WRITE_STRATEGY = sorted\n\n# On some systems it is desirable for whisper to write synchronously.\n# Set this option to True if you'd like to try this. Basically it will\n# shift the onus of buffering writes from the kernel into carbon's cache.\nWHISPER_AUTOFLUSH = False\n\n# By default new Whisper files are created pre-allocated with the data region\n# filled with zeros to prevent fragmentation and speed up contiguous reads and\n# writes (which are common). Enabling this option will cause Whisper to create\n# the file sparsely instead. Enabling this option may allow a large increase of\n# MAX_CREATES_PER_MINUTE but may have longer term performance implications\n# depending on the underlying storage configuration.\n# WHISPER_SPARSE_CREATE = False\n\n# Only beneficial on linux filesystems that support the fallocate system call.\n# It maintains the benefits of contiguous reads/writes, but with a potentially\n# much faster creation speed, by allowing the kernel to handle the block\n# allocation and zero-ing. Enabling this option may allow a large increase of\n# MAX_CREATES_PER_MINUTE. If enabled on an OS or filesystem that is unsupported\n# this option will gracefully fallback to standard POSIX file access methods.\nWHISPER_FALLOCATE_CREATE = False\n\n# Enabling this option will cause Whisper to lock each Whisper file it writes\n# to with an exclusive lock (LOCK_EX, see: man 2 flock). This is useful when\n# multiple carbon-cache daemons are writing to the same files\n# WHISPER_LOCK_WRITES = False\n\n# Set this to True to enable whitelisting and blacklisting of metrics in\n# CONF_DIR/whitelist and CONF_DIR/blacklist. If the whitelist is missing or\n# empty, all metrics will pass through\n# USE_WHITELIST = False\n\n# By default, carbon itself will log statistics (such as a count,\n# metricsReceived) with the top level prefix of 'carbon' at an interval of 60\n# seconds. Set CARBON_METRIC_INTERVAL to 0 to disable instrumentation\n# CARBON_METRIC_PREFIX = carbon\n# CARBON_METRIC_INTERVAL = 60\n\n# Enable AMQP if you want to receve metrics using an amqp broker\n# ENABLE_AMQP = False\n\n# Verbose means a line will be logged for every metric received\n# useful for testing\n# AMQP_VERBOSE = False\n\n# AMQP_HOST = localhost\n# AMQP_PORT = 5672\n# AMQP_VHOST = /\n# AMQP_USER = guest\n# AMQP_PASSWORD = guest\n# AMQP_EXCHANGE = graphite\n# AMQP_METRIC_NAME_IN_BODY = False\n\n# The manhole interface allows you to SSH into the carbon daemon\n# and get a python interpreter. BE CAREFUL WITH THIS! If you do\n# something like time.sleep() in the interpreter, the whole process\n# will sleep! This is *extremely* helpful in debugging, assuming\n# you are familiar with the code. If you are not, please don't\n# mess with this, you are asking for trouble :)\n#\n# ENABLE_MANHOLE = False\n# MANHOLE_INTERFACE = 127.0.0.1\n# MANHOLE_PORT = 7222\n# MANHOLE_USER = admin\n# MANHOLE_PUBLIC_KEY = ssh-rsa AAAAB3NzaC1yc2EAAAABiwAaAIEAoxN0sv/e4eZCPpi3N3KYvyzRaBaMeS2RsOQ/cDuKv11dlNzVeiyc3RFmCv5Rjwn/lQ79y0zyHxw67qLyhQ/kDzINc4cY41ivuQXm2tPmgvexdrBv5nsfEpjs3gLZfJnyvlcVyWK/lId8WUvEWSWHTzsbtmXAF2raJMdgLTbQ8wE=\n\n# Patterns for all of the metrics this machine will store. Read more at\n# http://en.wikipedia.org/wiki/Advanced_Message_Queuing_Protocol#Bindings\n#\n# Example: store all sales, linux servers, and utilization metrics\n# BIND_PATTERNS = sales.#, servers.linux.#, #.utilization\n#\n# Example: store everything\n# BIND_PATTERNS = #\n\n# To configure special settings for the carbon-cache instance 'b', uncomment this:\n#[cache:b]\n#LINE_RECEIVER_PORT = 2103\n#PICKLE_RECEIVER_PORT = 2104\n#CACHE_QUERY_PORT = 7102\n# and any other settings you want to customize, defaults are inherited\n# from [carbon] section.\n# You can then specify the --instance=b option to manage this instance\n\n\n\n[relay]\nLINE_RECEIVER_INTERFACE = 0.0.0.0\nLINE_RECEIVER_PORT = 2013\nPICKLE_RECEIVER_INTERFACE = 0.0.0.0\nPICKLE_RECEIVER_PORT = 2014\nUDP_RECEIVER_INTERFACE = 0.0.0.0\nUDP_RECEIVER_PORT = 2013\n\n\n# Set to false to disable logging of successful connections\nLOG_LISTENER_CONNECTIONS = True\n\n# Carbon-relay has several options for metric routing controlled by RELAY_METHOD\n#\n# Use relay-rules.conf to route metrics to destinations based on pattern rules\n#RELAY_METHOD = rules\n#\n# Use consistent-hashing for even distribution of metrics between destinations\n#RELAY_METHOD = consistent-hashing\n#\n# Use consistent-hashing but take into account an aggregation-rules.conf shared\n# by downstream carbon-aggregator daemons. This will ensure that all metrics\n# that map to a given aggregation rule are sent to the same carbon-aggregator\n# instance.\n# Enable this for carbon-relays that send to a group of carbon-aggregators\n#RELAY_METHOD = aggregated-consistent-hashing\nRELAY_METHOD = rules\n\n# If you use consistent-hashing you can add redundancy by replicating every\n# datapoint to more than one machine.\nREPLICATION_FACTOR = 1\n\n# This is a list of carbon daemons we will send any relayed or\n# generated metrics to. The default provided would send to a single\n# carbon-cache instance on the default port. However if you\n# use multiple carbon-cache instances then it would look like this:\n#\n# DESTINATIONS = 127.0.0.1:2004:a, 127.0.0.1:2104:b\n#\n# The general form is IP:PORT:INSTANCE where the :INSTANCE part is\n# optional and refers to the \"None\" instance if omitted.\n#\n# Note that if the destinations are all carbon-caches then this should\n# exactly match the webapp's CARBONLINK_HOSTS setting in terms of\n# instances listed (order matters!).\n#\n# If using RELAY_METHOD = rules, all destinations used in relay-rules.conf\n# must be defined in this list\nDESTINATIONS = 127.0.0.1:2004\n\n# This defines the maximum \"message size\" between carbon daemons.\n# You shouldn't need to tune this unless you really know what you're doing.\nMAX_DATAPOINTS_PER_MESSAGE = 500\nMAX_QUEUE_SIZE = 10000\n\n# Set this to False to drop datapoints when any send queue (sending datapoints\n# to a downstream carbon daemon) hits MAX_QUEUE_SIZE. If this is True (the\n# default) then sockets over which metrics are received will temporarily stop accepting\n# data until the send queues fall below 80% MAX_QUEUE_SIZE.\nUSE_FLOW_CONTROL = True\n\n# Set this to True to enable whitelisting and blacklisting of metrics in\n# CONF_DIR/whitelist and CONF_DIR/blacklist. If the whitelist is missing or\n# empty, all metrics will pass through\n# USE_WHITELIST = False\n\n# By default, carbon itself will log statistics (such as a count,\n# metricsReceived) with the top level prefix of 'carbon' at an interval of 60\n# seconds. Set CARBON_METRIC_INTERVAL to 0 to disable instrumentation\n# CARBON_METRIC_PREFIX = carbon\n# CARBON_METRIC_INTERVAL = 60\n\n\n[aggregator]\nLINE_RECEIVER_INTERFACE = 0.0.0.0\nLINE_RECEIVER_PORT = 2023\n\nPICKLE_RECEIVER_INTERFACE = 0.0.0.0\nPICKLE_RECEIVER_PORT = 2024\n\n# Set to false to disable logging of successful connections\nLOG_LISTENER_CONNECTIONS = False\n\n# If set true, metric received will be forwarded to DESTINATIONS in addition to\n# the output of the aggregation rules. If set false the carbon-aggregator will\n# only ever send the output of aggregation.\nFORWARD_ALL = True\n\n# This is a list of carbon daemons we will send any relayed or\n# generated metrics to. The default provided would send to a single\n# carbon-cache instance on the default port. However if you\n# use multiple carbon-cache instances then it would look like this:\n#\n# DESTINATIONS = 127.0.0.1:2004:a, 127.0.0.1:2104:b\n# \n# The format is comma-delimited IP:PORT:INSTANCE where the :INSTANCE part is\n# optional and refers to the \"None\" instance if omitted.\n#\n# Note that if the destinations are all carbon-caches then this should\n# exactly match the webapp's CARBONLINK_HOSTS setting in terms of\n# instances listed (order matters!).\nDESTINATIONS = 127.0.0.1:2004\n\n# If you want to add redundancy to your data by replicating every\n# datapoint to more than one machine, increase this.\nREPLICATION_FACTOR = 1\n\n# This is the maximum number of datapoints that can be queued up\n# for a single destination. Once this limit is hit, we will\n# stop accepting new data if USE_FLOW_CONTROL is True, otherwise\n# we will drop any subsequently received datapoints.\nMAX_QUEUE_SIZE = 10000\n\n# Set this to False to drop datapoints when any send queue (sending datapoints\n# to a downstream carbon daemon) hits MAX_QUEUE_SIZE. If this is True (the\n# default) then sockets over which metrics are received will temporarily stop accepting\n# data until the send queues fall below 80% MAX_QUEUE_SIZE.\nUSE_FLOW_CONTROL = True\n\n# This defines the maximum \"message size\" between carbon daemons.\n# You shouldn't need to tune this unless you really know what you're doing.\nMAX_DATAPOINTS_PER_MESSAGE = 500\n\n# This defines how many datapoints the aggregator remembers for\n# each metric. Aggregation only happens for datapoints that fall in\n# the past MAX_AGGREGATION_INTERVALS * intervalSize seconds.\nMAX_AGGREGATION_INTERVALS = 5\n\n# By default (WRITE_BACK_FREQUENCY = 0), carbon-aggregator will write back\n# aggregated data points once every rule.frequency seconds, on a per-rule basis.\n# Set this (WRITE_BACK_FREQUENCY = N) to write back all aggregated data points\n# every N seconds, independent of rule frequency. This is useful, for example,\n# to be able to query partially aggregated metrics from carbon-cache without\n# having to first wait rule.frequency seconds.\n# WRITE_BACK_FREQUENCY = 0\n\n# Set this to True to enable whitelisting and blacklisting of metrics in\n# CONF_DIR/whitelist and CONF_DIR/blacklist. If the whitelist is missing or\n# empty, all metrics will pass through\n# USE_WHITELIST = False\n\n# By default, carbon itself will log statistics (such as a count,\n# metricsReceived) with the top level prefix of 'carbon' at an interval of 60\n# seconds. Set CARBON_METRIC_INTERVAL to 0 to disable instrumentation\n# CARBON_METRIC_PREFIX = carbon\n# CARBON_METRIC_INTERVAL = 60" storage-aggregation.conf: |- # Aggregation methods for whisper files. Entries are scanned in order, # and first match wins. This file is scanned for changes every 60 seconds # # [name] # pattern = <regex> # xFilesFactor = <float between 0 and 1> # aggregationMethod = <average|sum|last|max|min> # # name: Arbitrary unique name for the rule # pattern: Regex pattern to match against the metric name # xFilesFactor: Ratio of valid data points required for aggregation to the next retention to occur # aggregationMethod: function to apply to data points for aggregation # [min] pattern = \.min$ xFilesFactor = 0.1 aggregationMethod = min [max] pattern = \.max$ xFilesFactor = 0.1 aggregationMethod = max [count] pattern = \.count$ xFilesFactor = 0 aggregationMethod = sum [lower] pattern = \.lower(_\d+)?$ xFilesFactor = 0.1 aggregationMethod = min [upper] pattern = \.upper(_\d+)?$ xFilesFactor = 0.1 aggregationMethod = max [sum] pattern = \.sum$ xFilesFactor = 0 aggregationMethod = sum [gauges] pattern = ^.*\.gauges\..* xFilesFactor = 0 aggregationMethod = last [default_average] pattern = .* xFilesFactor = 0.5 aggregationMethod = average storage-schemas.conf: |- # Schema definitions for Whisper files. Entries are scanned in order, # and first match wins. This file is scanned for changes every 60 seconds. # # [name] # pattern = regex # retentions = timePerPoint:timeToStore, timePerPoint:timeToStore, ... # Carbon's internal metrics. This entry should match what is specified in # CARBON_METRIC_PREFIX and CARBON_METRIC_INTERVAL settings [carbon] pattern = ^carbon\. retentions = 5s:1d,1m:90d [collectd] pattern = ^collectd.* retentions = 10s:1d,1m:28d,10m:1y [statsd] pattern = ^stats.* retentions = 10s:1d,1m:28d,10m:1y,1h:2y [default_1min_for_1day] pattern = .* retentions = 5s:1d,1m:28d
68.807407
219
0.739046
79299680213941167a3e674ef8c416b2c1d73bc9
1,797
yml
YAML
k8s/whitelist.yml
drewsuitor/minecraft
3fc88650783c589d780810d7e10ecda0126b052b
[ "MIT" ]
null
null
null
k8s/whitelist.yml
drewsuitor/minecraft
3fc88650783c589d780810d7e10ecda0126b052b
[ "MIT" ]
null
null
null
k8s/whitelist.yml
drewsuitor/minecraft
3fc88650783c589d780810d7e10ecda0126b052b
[ "MIT" ]
null
null
null
apiVersion: v1 data: whitelist.json: | [ { "uuid": "6ae6cfa5-ff76-3f1a-a0ad-8a11bcd0a88d", "name": "Kiro__" }, { "uuid": "9327e9bb-a0fb-3e28-bc6c-9686f90055c2", "name": "OC_Transpo" }, { "uuid": "69919047-abd3-3a02-967f-982b31911dfd", "name": "TheDeviousKitty" }, { "uuid": "e7bc6e02-bcd3-3a76-833c-c8584414be6b", "name": "big_data_energy" }, { "uuid": "0177a97c-45b3-3b53-b486-ada81eaec99b", "name": "AssEater8000" }, { "uuid": "d31fbc5f-06d9-3e99-97a7-d0ad247c78ad", "name": "park_Jihoon" }, { "uuid": "1c8dd0be-1fcb-3540-bdf6-347db9c116af", "name": "Americas_Ass" }, { "uuid": "ab6d3630-7239-3e89-ac52-82363fb80959", "name": "KaptannG" }, { "uuid": "c37fd0be-03ad-3c4e-b906-1f29a06952aa", "name": "AutisticFetus" }, { "uuid": "c011ac99-fcbf-3285-b31b-dfe8b387aa06", "name": "StokedHugh" }, { "uuid": "73f9b98f-993d-31da-900b-9b28c6e99c8b", "name": "yunglum" }, { "uuid": "dd863319-2af6-3d0c-905d-be36fe40534f", "name": "JasCoco" }, { "uuid": "e33784ec-0d31-31b4-873d-3df65761613d", "name": "sampersand" }, { "uuid": "2e082b99-ebd2-3fb9-af0d-19792f511256", "name": "mat" }, { "uuid": "77068c89-ae36-3b99-a3ee-667c5577c6d1", "name": "itsannarichi" }, { "uuid": "7d3762e7-832a-3331-b1dc-324426e036b4", "name": "IHaveNoRagrets" } ] kind: ConfigMap metadata: name: whitelist
24.616438
56
0.483027
7929e73a65114f3b21133604d8de30c03dd1caef
831
yaml
YAML
manifests/envs/movie-dev/config-template.yaml
gcr-solutions/recommender-system-dev-workshop-code
d3b74cc7006fa061e17d5ada4a7d48f90d3610cd
[ "Apache-2.0" ]
10
2021-07-14T09:14:47.000Z
2022-01-24T09:21:41.000Z
manifests/envs/movie-dev/config-template.yaml
gcr-solutions/recommender-system-dev-workshop-code
d3b74cc7006fa061e17d5ada4a7d48f90d3610cd
[ "Apache-2.0" ]
null
null
null
manifests/envs/movie-dev/config-template.yaml
gcr-solutions/recommender-system-dev-workshop-code
d3b74cc7006fa061e17d5ada4a7d48f90d3610cd
[ "Apache-2.0" ]
92
2021-06-18T05:13:53.000Z
2022-01-25T08:15:49.000Z
apiVersion: v1 kind: ConfigMap metadata: name: rs-movie-dev-config data: redis_port: "6379" redis_host: "REDIS_HOST_PLACEHOLDER" messge_broker_redis_port: "6379" messge_broker_redis_host: "redis-cart" aws_region: "__AWS_REGION__" s3_bucket: "aws-gcr-rs-sol-dev-workshop-__AWS_REGION__-__AWS_ACCOUNT_ID__" s3_prefix: "sample-data-movie" click_record_file_path: 'sample-data-movie/system/ingest-data/action/' user_record_file_path: 'sample-data-movie/system/ingest-data/user/' click_record_bucket: 'aws-gcr-rs-sol-dev-workshop-__AWS_REGION__-__AWS_ACCOUNT_ID__' local_data_folder: '/rs-data/movie-dev/' method: "__METHOD__" scenario: "movie" stage: "dev-workshop" aws-exports.json: | { "DEPLOY_TYPE": "MOVIE", "NEWS_API_URL": "/api/v1/demo", "MOVIE_API_URL": "/api/v1/demo" }
33.24
86
0.736462
792a4b946acc9cb5882b5cdaf32e705291c9337d
143
yaml
YAML
k8s/namespace.yaml
TechnicalFreak/dev-environments
607e5fb408f2bc881455d11acb7ac8c6f4bcc2e5
[ "MIT" ]
null
null
null
k8s/namespace.yaml
TechnicalFreak/dev-environments
607e5fb408f2bc881455d11acb7ac8c6f4bcc2e5
[ "MIT" ]
null
null
null
k8s/namespace.yaml
TechnicalFreak/dev-environments
607e5fb408f2bc881455d11acb7ac8c6f4bcc2e5
[ "MIT" ]
null
null
null
{ "apiVersion": "v1", "kind": "Namespace", "metadata": { "name": "__branch__", "labels": { "name": "__branch__" } } }
14.3
26
0.468531
792a83da961a9312c71d9951de76b71a407c4205
203
yaml
YAML
test/resources/resource_mutate_endpoint.yaml
abhi-kapoor/kyverno
99efd8136fb3a1b5ca4e37cd841054afcdd3c636
[ "Apache-2.0" ]
1,725
2020-10-06T00:54:22.000Z
2022-03-31T15:24:56.000Z
test/resources/resource_mutate_endpoint.yaml
abhi-kapoor/kyverno
99efd8136fb3a1b5ca4e37cd841054afcdd3c636
[ "Apache-2.0" ]
1,739
2020-10-06T05:23:18.000Z
2022-03-31T23:30:48.000Z
test/resources/resource_mutate_endpoint.yaml
abhi-kapoor/kyverno
99efd8136fb3a1b5ca4e37cd841054afcdd3c636
[ "Apache-2.0" ]
265
2020-10-14T14:54:43.000Z
2022-03-29T10:49:26.000Z
apiVersion: v1 kind: Endpoints metadata: name: test-endpoint labels: label : test subsets: - addresses: - ip: 192.168.10.171 ports: - name: secure-connection port: 443 protocol: TCP
15.615385
27
0.669951
792ab6504daa7f7f75a8c94e82e31926713680ea
577
yaml
YAML
infra/k8s-service.yaml
vilvamani/springboot
2c9eb3344fe95985cdd13b7fbe6e56705026c37d
[ "Apache-2.0" ]
null
null
null
infra/k8s-service.yaml
vilvamani/springboot
2c9eb3344fe95985cdd13b7fbe6e56705026c37d
[ "Apache-2.0" ]
null
null
null
infra/k8s-service.yaml
vilvamani/springboot
2c9eb3344fe95985cdd13b7fbe6e56705026c37d
[ "Apache-2.0" ]
1
2020-11-08T08:46:41.000Z
2020-11-08T08:46:41.000Z
apiVersion: v1 kind: Service metadata: name: springboot-svc labels: app.kubernetes.io/name: springbootapp app.kubernetes.io/component: microservice spec: # In a production setup, we recommend accessing Grafana through an external Loadbalancer # or through a public IP. # type: LoadBalancer # You could also use NodePort to expose the service at a randomly-generated port type: NodePort ports: - protocol: TCP port: 8080 targetPort: 8080 selector: app.kubernetes.io/name: springbootapp app.kubernetes.io/component: microservice
27.47619
90
0.736568
792bf53994adcc241a2f1ed220914d888aa8d10e
2,262
yaml
YAML
resources/operator.yaml
AaruniAggarwal/benchmark-operator
0d4c35f23684c2fd705c6b4624e25ef98032752a
[ "Apache-2.0" ]
null
null
null
resources/operator.yaml
AaruniAggarwal/benchmark-operator
0d4c35f23684c2fd705c6b4624e25ef98032752a
[ "Apache-2.0" ]
null
null
null
resources/operator.yaml
AaruniAggarwal/benchmark-operator
0d4c35f23684c2fd705c6b4624e25ef98032752a
[ "Apache-2.0" ]
null
null
null
apiVersion: apps/v1 kind: Deployment metadata: name: benchmark-operator namespace: my-ripsaw spec: replicas: 1 selector: matchLabels: name: benchmark-operator template: metadata: labels: name: benchmark-operator spec: tolerations: - key: role value: workload effect: NoSchedule affinity: nodeAffinity: preferredDuringSchedulingIgnoredDuringExecution: - weight: 100 preference: matchExpressions: - key: node-role.kubernetes.io/workload operator: In values: - "" serviceAccountName: benchmark-operator containers: - name: ansible command: - /usr/local/bin/ao-logs - /tmp/ansible-operator/runner - stdout image: quay.io/multi-arch/benchmark-operator:latest imagePullPolicy: "Always" volumeMounts: - mountPath: /tmp/ansible-operator/runner name: runner readOnly: true - name: benchmark-operator image: quay.io/multi-arch/benchmark-operator:latest imagePullPolicy: Always env: - name: WATCH_NAMESPACE valueFrom: fieldRef: fieldPath: metadata.namespace - name: POD_NAME valueFrom: fieldRef: fieldPath: metadata.name - name: OPERATOR_NAME value: "benchmark-operator" - name: WORKER_BENCHMARK_RIPSAW_CLOUDBULLDOZER_IO value: "1" - name: ANSIBLE_VERBOSITY value: "4" volumeMounts: - mountPath: /tmp/ansible-operator/runner name: runner - name: redis-master image: k8s.gcr.io/redis:v1 env: - name: MASTER value: "true" ports: - containerPort: 6379 resources: limits: cpu: "0.1" volumeMounts: - mountPath: /redis-master-data name: data volumes: - name: data emptyDir: {} - name: runner emptyDir: {}
27.585366
61
0.516799
792c95034108e592bc01f19db877a2d234a1e76f
942
yml
YAML
scripts/installer-for-ibm-storage-enabler-for-containers/yamls/templates/pvc-template.yml
Bhaskers-Blu-Org1/ubiquity-k8s
42562dee1c0d4f16f50ee4622cd0a2e2dc628b98
[ "Apache-2.0" ]
42
2017-04-01T00:38:36.000Z
2021-03-17T16:17:13.000Z
scripts/installer-for-ibm-storage-enabler-for-containers/yamls/templates/pvc-template.yml
Bhaskers-Blu-Org1/ubiquity-k8s
42562dee1c0d4f16f50ee4622cd0a2e2dc628b98
[ "Apache-2.0" ]
177
2017-05-03T23:22:44.000Z
2021-03-24T03:34:47.000Z
scripts/installer-for-ibm-storage-enabler-for-containers/yamls/templates/pvc-template.yml
IBM/ubiquity-k8s
42562dee1c0d4f16f50ee4622cd0a2e2dc628b98
[ "Apache-2.0" ]
23
2017-04-06T16:06:55.000Z
2020-06-29T13:43:36.000Z
# This is an IBM Storage Enabler for Containers PVC template. kind: PersistentVolumeClaim apiVersion: v1 metadata: name: "<PVC name>" # NOTE : Uses annotations storage-class only in k8s 1.5 version. # ------ #annotations: # volume.beta.kubernetes.io/storage-class: "STORAGE_CLASS_NAME" # NOTE : User label only if you want to set the PV name (the default is PV=PVC-ID) # ------ #labels: # pv-name: "<PV name>" # Ubiquity provisioner will create a PV with <PV name> instead of PVC-ID. spec: # NOTE : Use storageClassName only in k8s version 1.6+. For lower versions uses volume.beta.kubernetes.io/storage-class storageClassName: <Storage Class Name> accessModes: - ReadWriteOnce # Currently Ubiquity scbe backend supports only ReadWriteOnce mode. # Ubiquity Spectrum Scale backend supports ReadWriteOnce and ReadWriteMany mode. resources: requests: storage: <Number>Gi
37.68
121
0.703822
792ca3553abe88d5741b2dd36b6d0760887a0703
416
yaml
YAML
config/rbac/tkemanagedmachinepool_viewer_role.yaml
leoryu/cluster-api-provider-tencent
a3ca095687c4c6b3f2c4c9023cfa8e254c0c9b6d
[ "Apache-2.0" ]
55
2018-11-12T10:47:05.000Z
2022-03-09T09:49:54.000Z
config/rbac/tkemanagedmachinepool_viewer_role.yaml
leoryu/cluster-api-provider-tencent
a3ca095687c4c6b3f2c4c9023cfa8e254c0c9b6d
[ "Apache-2.0" ]
10
2019-06-17T13:40:57.000Z
2022-03-18T01:51:09.000Z
config/rbac/tkemanagedmachinepool_viewer_role.yaml
leoryu/cluster-api-provider-tencent
a3ca095687c4c6b3f2c4c9023cfa8e254c0c9b6d
[ "Apache-2.0" ]
8
2018-11-12T10:46:47.000Z
2021-12-20T06:35:06.000Z
# permissions for end users to view tkemanagedmachinepools. apiVersion: rbac.authorization.k8s.io/v1 kind: ClusterRole metadata: name: tkemanagedmachinepool-viewer-role rules: - apiGroups: - infrastructure.cluster.x-k8s.io resources: - tkemanagedmachinepools verbs: - get - list - watch - apiGroups: - infrastructure.cluster.x-k8s.io resources: - tkemanagedmachinepools/status verbs: - get
19.809524
59
0.75
792cb41eb0ba8b4f4149c21c9cf75b1fe43aea93
730
yaml
YAML
experimental/addons/kubeflow/resources/ClusterRole-260.yaml
jrkeen/catalog
750f329164816f0bdacfe8a39e5c9c9a93cf6c41
[ "Apache-2.0" ]
65
2020-05-27T03:36:33.000Z
2022-03-23T09:50:59.000Z
experimental/addons/kubeflow/resources/ClusterRole-260.yaml
jrkeen/catalog
750f329164816f0bdacfe8a39e5c9c9a93cf6c41
[ "Apache-2.0" ]
76
2020-05-29T09:14:26.000Z
2022-03-28T14:31:33.000Z
experimental/addons/kubeflow/resources/ClusterRole-260.yaml
jrkeen/catalog
750f329164816f0bdacfe8a39e5c9c9a93cf6c41
[ "Apache-2.0" ]
61
2020-05-26T03:19:48.000Z
2022-03-24T21:57:12.000Z
apiVersion: rbac.authorization.k8s.io/v1 kind: ClusterRole metadata: labels: app: tensorboards-web-app kustomize.component: tensorboards-web-app name: tensorboards-web-app-cluster-role rules: - apiGroups: - "" resources: - namespaces verbs: - get - list - apiGroups: - authorization.k8s.io resources: - subjectaccessreviews verbs: - create - apiGroups: - tensorboard.kubeflow.org resources: - tensorboards - tensorboards/finalizers verbs: - get - list - create - delete - apiGroups: - "" resources: - persistentvolumeclaims verbs: - create - delete - get - list - apiGroups: - storage.k8s.io resources: - storageclasses verbs: - get - list - watch
14.897959
45
0.668493
792cb7435d219f0d10a4d3d3fb772a94162f5bb3
137
yaml
YAML
namespaces/live-1.cloud-platform.service.justice.gov.uk/support-labelling-webhook/03-resourcequota.yaml
martyn-w/cloud-platform-environments
784924e37ebb6e2c074f88bf8fbb4eb7bdf3d634
[ "MIT" ]
28
2018-07-13T15:02:24.000Z
2022-03-17T09:23:54.000Z
namespaces/live-1.cloud-platform.service.justice.gov.uk/support-labelling-webhook/03-resourcequota.yaml
martyn-w/cloud-platform-environments
784924e37ebb6e2c074f88bf8fbb4eb7bdf3d634
[ "MIT" ]
963
2018-05-30T15:46:06.000Z
2022-03-30T10:06:39.000Z
namespaces/live-1.cloud-platform.service.justice.gov.uk/support-labelling-webhook/03-resourcequota.yaml
martyn-w/cloud-platform-environments
784924e37ebb6e2c074f88bf8fbb4eb7bdf3d634
[ "MIT" ]
29
2018-12-04T09:37:36.000Z
2022-02-25T10:35:34.000Z
apiVersion: v1 kind: ResourceQuota metadata: name: namespace-quota namespace: support-labelling-webhook spec: hard: pods: "50"
15.222222
38
0.737226
792cc6e518d92cfdc60ace14ac2e795d9c67d5be
515
yaml
YAML
manifests/setup/prometheus-operator-service.yaml
souhireCF/kube-prometheus
8386ee39cb32c592de10f85418a9bd590b6577cf
[ "Apache-2.0" ]
null
null
null
manifests/setup/prometheus-operator-service.yaml
souhireCF/kube-prometheus
8386ee39cb32c592de10f85418a9bd590b6577cf
[ "Apache-2.0" ]
null
null
null
manifests/setup/prometheus-operator-service.yaml
souhireCF/kube-prometheus
8386ee39cb32c592de10f85418a9bd590b6577cf
[ "Apache-2.0" ]
1
2021-05-06T09:36:23.000Z
2021-05-06T09:36:23.000Z
apiVersion: v1 kind: Service metadata: labels: app.kubernetes.io/component: controller app.kubernetes.io/name: prometheus-operator app.kubernetes.io/part-of: kube-prometheus app.kubernetes.io/version: 0.46.0 name: prometheus-operator namespace: monitoring spec: clusterIP: None ports: - name: https port: 8443 targetPort: https selector: app.kubernetes.io/component: controller app.kubernetes.io/name: prometheus-operator app.kubernetes.io/part-of: kube-prometheus
24.52381
47
0.733981
792cd50880af68665357582ed16b07c25f988b3d
794
yaml
YAML
job-app/job-app-manual-persistent.yaml
cimox/kubernetes-for-dummies
e82afba83df8fd3734a059072b4037a24927e601
[ "MIT" ]
3
2021-02-23T14:58:55.000Z
2022-01-08T04:45:06.000Z
job-app/job-app-manual-persistent.yaml
cimox/kubernetes-for-dummies
e82afba83df8fd3734a059072b4037a24927e601
[ "MIT" ]
null
null
null
job-app/job-app-manual-persistent.yaml
cimox/kubernetes-for-dummies
e82afba83df8fd3734a059072b4037a24927e601
[ "MIT" ]
1
2021-07-26T10:59:26.000Z
2021-07-26T10:59:26.000Z
apiVersion: batch/v1 kind: Job metadata: generateName: job-app- namespace: jobs spec: template: spec: containers: - name: job-app image: cimox/job-app:0.0.6 env: - name: EDGE_API_URL value: 'http://edge-app-service.edge.svc.cluster.local:5000/job' - name: JOB_TYPE value: 'stateful' - name: FIB_N value: '35' volumeMounts: - mountPath: /mnt/storage name: storage resources: requests: memory: "64Mi" cpu: "250m" limits: memory: "128Mi" cpu: "500m" volumes: - name: storage hostPath: path: /c/minikube-pv restartPolicy: Never backoffLimit: 1
22.685714
76
0.502519
792cfd4d59f96cc6bfa713b8e623d3273da0f9a1
366
yaml
YAML
mbox-operator/config/rbac/mbkojibuilder_viewer_role.yaml
Zlopez/mbbox
bc7cbdb74fd9ec0071617bbcf15f32f0e44935ac
[ "MIT" ]
12
2020-02-19T01:49:02.000Z
2021-06-22T12:47:33.000Z
mbox-operator/config/rbac/mbkojibuilder_viewer_role.yaml
Zlopez/mbbox
bc7cbdb74fd9ec0071617bbcf15f32f0e44935ac
[ "MIT" ]
146
2020-02-25T13:08:48.000Z
2021-04-13T07:02:05.000Z
mbox-operator/config/rbac/mbkojibuilder_viewer_role.yaml
Zlopez/mbbox
bc7cbdb74fd9ec0071617bbcf15f32f0e44935ac
[ "MIT" ]
7
2020-02-19T08:52:05.000Z
2021-01-29T07:32:31.000Z
# permissions for end users to view mbkojibuilders. apiVersion: rbac.authorization.k8s.io/v1 kind: ClusterRole metadata: name: mbkojibuilder-viewer-role rules: - apiGroups: - apps.fedoraproject.org resources: - mbkojibuilders verbs: - get - list - watch - apiGroups: - apps.fedoraproject.org resources: - mbkojibuilders/status verbs: - get
17.428571
51
0.726776
792d1ff0880320810ab549c3d56033efabc11c80
3,937
yaml
YAML
config/prow/cluster/deck_deployment.yaml
mmiranda96/test-infra
c3c067c2da561932d8e25bc07dc6f675c9b645a6
[ "Apache-2.0" ]
null
null
null
config/prow/cluster/deck_deployment.yaml
mmiranda96/test-infra
c3c067c2da561932d8e25bc07dc6f675c9b645a6
[ "Apache-2.0" ]
null
null
null
config/prow/cluster/deck_deployment.yaml
mmiranda96/test-infra
c3c067c2da561932d8e25bc07dc6f675c9b645a6
[ "Apache-2.0" ]
null
null
null
# Copyright 2016 The Kubernetes Authors All rights reserved. # # Licensed under the Apache License, Version 2.0 (the "License"); # you may not use this file except in compliance with the License. # You may obtain a copy of the License at # # http://www.apache.org/licenses/LICENSE-2.0 # # Unless required by applicable law or agreed to in writing, software # distributed under the License is distributed on an "AS IS" BASIS, # WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. # See the License for the specific language governing permissions and # limitations under the License. apiVersion: apps/v1 kind: Deployment metadata: namespace: default name: deck labels: app: deck spec: replicas: 3 strategy: type: RollingUpdate rollingUpdate: maxSurge: 1 maxUnavailable: 1 selector: matchLabels: app: deck template: metadata: labels: app: deck spec: serviceAccountName: deck terminationGracePeriodSeconds: 30 containers: - name: deck image: gcr.io/k8s-prow/deck:v20220114-6a6ac6b4e0 imagePullPolicy: Always ports: - name: http containerPort: 8080 - name: metrics containerPort: 9090 args: - --tide-url=http://tide/ - --hook-url=http://hook:8888/plugin-help - --redirect-http-to=prow.k8s.io - --oauth-url=/github-login - --config-path=/etc/config/config.yaml - --job-config-path=/etc/job-config - --spyglass=true - --rerun-creates-job - --github-token-path=/etc/github/oauth - --github-endpoint=http://ghproxy - --github-endpoint=https://api.github.com - --github-oauth-config-file=/etc/githuboauth/secret - --cookie-secret=/etc/cookie/secret - --plugin-config=/etc/plugins/plugins.yaml env: # Use KUBECONFIG envvar rather than --kubeconfig flag in order to provide multiple configs to merge. - name: KUBECONFIG value: "/etc/kubeconfig/config:/etc/kubeconfig-build-test-infra-trusted/kubeconfig" volumeMounts: - name: oauth-config mountPath: /etc/githuboauth readOnly: true - name: cookie-secret mountPath: /etc/cookie readOnly: true - mountPath: /etc/kubeconfig name: kubeconfig readOnly: true - mountPath: /etc/kubeconfig-build-test-infra-trusted name: kubeconfig-build-test-infra-trusted readOnly: true - name: config mountPath: /etc/config readOnly: true - name: job-config mountPath: /etc/job-config readOnly: true - name: oauth-token mountPath: /etc/github readOnly: true - name: plugins mountPath: /etc/plugins readOnly: true livenessProbe: httpGet: path: /healthz port: 8081 initialDelaySeconds: 3 periodSeconds: 3 readinessProbe: httpGet: path: /healthz/ready port: 8081 initialDelaySeconds: 10 periodSeconds: 3 timeoutSeconds: 600 volumes: - name: oauth-config secret: secretName: github-oauth-config - name: oauth-token secret: secretName: oauth-token - name: cookie-secret secret: secretName: cookie - name: kubeconfig secret: defaultMode: 420 secretName: kubeconfig - name: kubeconfig-build-test-infra-trusted secret: defaultMode: 420 secretName: kubeconfig-build-test-infra-trusted - name: config configMap: name: config - name: job-config configMap: name: job-config - name: plugins configMap: name: plugins
29.825758
108
0.597917
792d594874ffd7640b460650cebef767c980a9a1
144
yaml
YAML
built-in-references/Kubernetes/perf/violations/violation4249.yaml
sw47/azure-policy
4a38e4cb4047b5364902653f0defe45f1b21bc61
[ "MIT" ]
null
null
null
built-in-references/Kubernetes/perf/violations/violation4249.yaml
sw47/azure-policy
4a38e4cb4047b5364902653f0defe45f1b21bc61
[ "MIT" ]
null
null
null
built-in-references/Kubernetes/perf/violations/violation4249.yaml
sw47/azure-policy
4a38e4cb4047b5364902653f0defe45f1b21bc61
[ "MIT" ]
null
null
null
apiVersion: v1 kind: Pod metadata: name: image-demo-4249 spec: containers: - name: nginx image: nginx #ritaacr.azurecr.io/nginx:latest
18
49
0.722222
792dc05b6de437930a789048af80d7338af12def
82
yaml
YAML
deploy/service_account.yaml
odra/openshift-template-operator
c9ee0aa303ca2dc0e1b3224af707d9d150e0c43b
[ "Apache-2.0" ]
null
null
null
deploy/service_account.yaml
odra/openshift-template-operator
c9ee0aa303ca2dc0e1b3224af707d9d150e0c43b
[ "Apache-2.0" ]
null
null
null
deploy/service_account.yaml
odra/openshift-template-operator
c9ee0aa303ca2dc0e1b3224af707d9d150e0c43b
[ "Apache-2.0" ]
null
null
null
apiVersion: v1 kind: ServiceAccount metadata: name: openshift-template-operator
16.4
35
0.817073
792dc37db54c50c74a91deab5a79f3fcbb1b8ece
552
yaml
YAML
example/base/deployment.yaml
The-Outsider-Renaissance/CI
432ff2b171965ee94873cb2215e3012208cb7ca6
[ "Apache-2.0" ]
null
null
null
example/base/deployment.yaml
The-Outsider-Renaissance/CI
432ff2b171965ee94873cb2215e3012208cb7ca6
[ "Apache-2.0" ]
null
null
null
example/base/deployment.yaml
The-Outsider-Renaissance/CI
432ff2b171965ee94873cb2215e3012208cb7ca6
[ "Apache-2.0" ]
null
null
null
apiVersion: apps/v1 kind: Deployment metadata: name: example spec: replicas: 1 selector: matchLabels: app: example template: metadata: labels: app: example spec: containers: - name: example image: ealen/echo-server imagePullPolicy: Always ports: - name: http containerPort: 80 resources: requests: cpu: 50m memory: 128Mi limits: cpu: 100m memory: 256Mi
19.714286
34
0.498188
792dc9711c247cfbe924ce445724095b00ac0b6b
3,444
yaml
YAML
prow/staging/cluster/deck_deployment.yaml
radufa/test-infra-kyma
6a6e1382cc6888f496bc400f48b1a730041e1858
[ "Apache-2.0" ]
null
null
null
prow/staging/cluster/deck_deployment.yaml
radufa/test-infra-kyma
6a6e1382cc6888f496bc400f48b1a730041e1858
[ "Apache-2.0" ]
null
null
null
prow/staging/cluster/deck_deployment.yaml
radufa/test-infra-kyma
6a6e1382cc6888f496bc400f48b1a730041e1858
[ "Apache-2.0" ]
null
null
null
# Copyright 2016 The Kubernetes Authors All rights reserved. # # Licensed under the Apache License, Version 2.0 (the "License"); # you may not use this file except in compliance with the License. # You may obtain a copy of the License at # # http://www.apache.org/licenses/LICENSE-2.0 # # Unless required by applicable law or agreed to in writing, software # distributed under the License is distributed on an "AS IS" BASIS, # WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. # See the License for the specific language governing permissions and # limitations under the License. apiVersion: apps/v1 kind: Deployment metadata: namespace: default name: deck labels: app: deck spec: replicas: 3 strategy: type: RollingUpdate rollingUpdate: maxSurge: 1 maxUnavailable: 1 selector: matchLabels: app: deck template: metadata: labels: app: deck spec: serviceAccountName: deck terminationGracePeriodSeconds: 30 containers: - name: deck image: gcr.io/k8s-prow/deck:v20210318-ffb8032f91 imagePullPolicy: Always ports: - name: http containerPort: 8080 args: - --kubeconfig=/etc/kubeconfig/config - --tide-url=http://tide/ - --hook-url=http://hook:8888/plugin-help - --redirect-http-to=status-dev.prow.build.kyma-project.io - --oauth-url=/github-login - --config-path=/etc/config/config.yaml - --job-config-path=/etc/job-config - --spyglass=true - --rerun-creates-job - --github-token-path=/etc/github/oauth - --github-endpoint=http://ghproxy - --github-endpoint=https://api.github.com - --github-oauth-config-file=/etc/githuboauth/secret - --cookie-secret=/etc/cookie/secret - --plugin-config=/etc/plugins/plugins.yaml volumeMounts: - name: oauth-config mountPath: /etc/githuboauth readOnly: true - name: cookie-secret mountPath: /etc/cookie readOnly: true - mountPath: /etc/kubeconfig name: kubeconfig readOnly: true - name: config mountPath: /etc/config readOnly: true - name: job-config mountPath: /etc/job-config readOnly: true - name: oauth-token mountPath: /etc/github readOnly: true - name: plugins mountPath: /etc/plugins readOnly: true livenessProbe: httpGet: path: /healthz port: 8081 initialDelaySeconds: 3 periodSeconds: 3 readinessProbe: httpGet: path: /healthz/ready port: 8081 initialDelaySeconds: 10 periodSeconds: 3 timeoutSeconds: 600 volumes: - name: oauth-config secret: secretName: github-oauth-config - name: oauth-token secret: secretName: oauth-token - name: cookie-secret secret: secretName: cookie - name: kubeconfig secret: defaultMode: 420 secretName: workload-clusters-kubeconfig - name: config configMap: name: config - name: job-config configMap: name: job-config - name: plugins configMap: name: plugins
28.7
74
0.592625
792dd43d864ff0901824a0d9410866b3d422ad67
2,764
yaml
YAML
k8s/vizier/base/kelvin_deployment.yaml
domechn/pixie
4044d6c4f691eaee4971dab00b37868dc24a466c
[ "Apache-2.0" ]
1
2022-01-17T01:40:08.000Z
2022-01-17T01:40:08.000Z
k8s/vizier/base/kelvin_deployment.yaml
domechn/pixie
4044d6c4f691eaee4971dab00b37868dc24a466c
[ "Apache-2.0" ]
null
null
null
k8s/vizier/base/kelvin_deployment.yaml
domechn/pixie
4044d6c4f691eaee4971dab00b37868dc24a466c
[ "Apache-2.0" ]
null
null
null
--- apiVersion: apps/v1 kind: Deployment metadata: name: kelvin spec: selector: matchLabels: name: kelvin template: metadata: labels: name: kelvin plane: data spec: affinity: nodeAffinity: requiredDuringSchedulingIgnoredDuringExecution: nodeSelectorTerms: - matchExpressions: - key: kubernetes.io/os operator: Exists - key: kubernetes.io/os operator: In values: - linux - matchExpressions: - key: beta.kubernetes.io/os operator: Exists - key: beta.kubernetes.io/os operator: In values: - linux initContainers: - name: qb-wait image: gcr.io/pixie-prod/pixie-prod-artifacts/curl:1.0 # yamllint disable command: ['sh', '-c', 'set -x; URL="https://${SERVICE_NAME}:${SERVICE_PORT}/healthz"; until [ $(curl -m 0.5 -s -o /dev/null -w "%{http_code}" -k ${URL}) -eq 200 ]; do echo "waiting for ${URL}" sleep 2; done; '] env: # The name of the service that Kelvin must connect with before becoming available. - name: SERVICE_NAME value: "vizier-query-broker" - name: SERVICE_PORT value: "50300" containers: - name: app image: gcr.io/pixie-oss/pixie-dev/vizier/kelvin_image:latest envFrom: - configMapRef: name: pl-tls-config env: - name: PL_HOST_PATH value: "/host" - name: PL_POD_NAME valueFrom: fieldRef: fieldPath: metadata.name - name: PL_POD_IP valueFrom: fieldRef: fieldPath: status.podIP - name: PL_HOST_IP valueFrom: fieldRef: fieldPath: status.hostIP - name: PL_JWT_SIGNING_KEY valueFrom: secretKeyRef: key: jwt-signing-key name: pl-cluster-secrets - name: PL_NAMESPACE valueFrom: fieldRef: fieldPath: metadata.namespace - name: TCMALLOC_SAMPLE_PARAMETER value: "1048576" ports: - containerPort: 59300 volumeMounts: - mountPath: /certs name: certs - name: sys mountPath: /sys readOnly: true resources: {} terminationGracePeriodSeconds: 30 volumes: - name: certs secret: secretName: service-tls-certs - name: sys hostPath: path: /sys type: Directory
27.366337
92
0.506151
792e02a5a33854ee84fdcc075620b95fa5f82d01
189
yaml
YAML
tests/kyverno/defaults/validate-namespace-metadata/ignore-existing-auxiliary-annotation.yaml
appuio/component-appuio-cloud
aff279f9590fcada2810be59e549450d0a000a27
[ "BSD-3-Clause" ]
null
null
null
tests/kyverno/defaults/validate-namespace-metadata/ignore-existing-auxiliary-annotation.yaml
appuio/component-appuio-cloud
aff279f9590fcada2810be59e549450d0a000a27
[ "BSD-3-Clause" ]
20
2021-08-30T09:43:17.000Z
2022-02-14T09:13:03.000Z
tests/kyverno/defaults/validate-namespace-metadata/ignore-existing-auxiliary-annotation.yaml
appuio/component-appuio-cloud
aff279f9590fcada2810be59e549450d0a000a27
[ "BSD-3-Clause" ]
1
2022-03-01T10:00:00.000Z
2022-03-01T10:00:00.000Z
kind: Namespace apiVersion: v1 metadata: name: ignore-existing-auxiliary-annotation annotations: test.appuio.io/environment: staging external.cool-tool.io/already-existing: XXX
23.625
47
0.777778
792e4defeb0ff0f17f1f0d66c1d6912af66504a3
330
yaml
YAML
mock-data/large-cluster/k8s/v1:ServiceAccount/kubevious-default.yaml
kubevious/logic-processor
f3b502fdd851fc955ddb00b39da589bbf05566e3
[ "Apache-2.0" ]
null
null
null
mock-data/large-cluster/k8s/v1:ServiceAccount/kubevious-default.yaml
kubevious/logic-processor
f3b502fdd851fc955ddb00b39da589bbf05566e3
[ "Apache-2.0" ]
null
null
null
mock-data/large-cluster/k8s/v1:ServiceAccount/kubevious-default.yaml
kubevious/logic-processor
f3b502fdd851fc955ddb00b39da589bbf05566e3
[ "Apache-2.0" ]
1
2022-01-16T20:19:54.000Z
2022-01-16T20:19:54.000Z
kind: ServiceAccount apiVersion: v1 metadata: name: default namespace: kubevious selfLink: /api/v1/namespaces/kubevious/serviceaccounts/default uid: e1576445-707e-11ea-8ebf-42010a800207 resourceVersion: '31986420' creationTimestamp: '2020-03-27T23:01:23Z' secrets: - name: default-token-tj4fr
23.571429
66
0.727273
792e5f4114721cbb7a7bf94954753b86c96cf954
441
yaml
YAML
pkg/v1/tkr/config/rbac/tanzukubernetesrelease_editor_role.yaml
benjaminapetersen/tanzu-framework
fbabd54a42868572dee518178c64dcb80fc02cd2
[ "Apache-2.0" ]
92
2021-10-04T07:46:46.000Z
2022-03-24T22:13:14.000Z
pkg/v1/tkr/config/rbac/tanzukubernetesrelease_editor_role.yaml
benjaminapetersen/tanzu-framework
fbabd54a42868572dee518178c64dcb80fc02cd2
[ "Apache-2.0" ]
1,061
2021-10-04T09:35:11.000Z
2022-03-31T21:34:35.000Z
pkg/v1/tkr/config/rbac/tanzukubernetesrelease_editor_role.yaml
benjaminapetersen/tanzu-framework
fbabd54a42868572dee518178c64dcb80fc02cd2
[ "Apache-2.0" ]
110
2021-10-04T07:22:29.000Z
2022-03-23T20:18:07.000Z
# permissions for end users to edit tanzukubernetesreleases. apiVersion: rbac.authorization.k8s.io/v1 kind: ClusterRole metadata: name: tanzukubernetesrelease-editor-role rules: - apiGroups: - run.tanzu.vmware.com resources: - tanzukubernetesreleases verbs: - create - delete - get - list - patch - update - watch - apiGroups: - run.tanzu.vmware.com resources: - tanzukubernetesreleases/status verbs: - get
17.64
60
0.723356
792e68840ea638be84ab2a26e84361be7e802de8
161
yaml
YAML
deployment-multitier-app/rsvp-db-service.yaml
ToniChaz/kubernetes-training
e84af5ea3f896b32fef015f94da39e58e7446693
[ "MIT" ]
null
null
null
deployment-multitier-app/rsvp-db-service.yaml
ToniChaz/kubernetes-training
e84af5ea3f896b32fef015f94da39e58e7446693
[ "MIT" ]
null
null
null
deployment-multitier-app/rsvp-db-service.yaml
ToniChaz/kubernetes-training
e84af5ea3f896b32fef015f94da39e58e7446693
[ "MIT" ]
null
null
null
apiVersion: v1 kind: Service metadata: name: mongodb labels: app: rsvpdb spec: ports: - port: 27017 protocol: TCP selector: appdb: rsvpdb
11.5
17
0.652174
792e8b553ae80e6c382054fb20272a309fe09fc3
127
yaml
YAML
k8s/addons/dashboard/36-rbac-admin-serviceAccount.yaml
rakeliu/Manual
ecd31fa816a74bbd6b93449fd612a0646e9b6510
[ "MIT" ]
null
null
null
k8s/addons/dashboard/36-rbac-admin-serviceAccount.yaml
rakeliu/Manual
ecd31fa816a74bbd6b93449fd612a0646e9b6510
[ "MIT" ]
null
null
null
k8s/addons/dashboard/36-rbac-admin-serviceAccount.yaml
rakeliu/Manual
ecd31fa816a74bbd6b93449fd612a0646e9b6510
[ "MIT" ]
null
null
null
# ServiceAccount admin-user apiVersion: v1 kind: ServiceAccount metadata: name: admin-user namespace: kubernetes-dashboard
18.142857
33
0.80315
792ea6178d3228fc3695b0aecf8091ec264a33c6
172
yaml
YAML
manifests/service.yaml
GeorgeNiece/pinger
c8926c4620e7a838dd15163f34b94ee53babbaf4
[ "MIT" ]
3
2018-10-25T19:59:19.000Z
2021-06-02T01:38:40.000Z
manifests/service.yaml
GeorgeNiece/pinger
c8926c4620e7a838dd15163f34b94ee53babbaf4
[ "MIT" ]
2
2019-10-08T03:02:03.000Z
2019-10-15T22:46:26.000Z
manifests/service.yaml
reselbob/pinger
2dff82ba2cd1cdc764638f594b809a258d5991b6
[ "MIT" ]
null
null
null
apiVersion: v1 kind: Service metadata: name: pinger spec: selector: app: pinger ports: - protocol: TCP port: 3000 targetPort: 3000 type: NodePort
12.285714
20
0.651163
792f1a3ce7d69b894780f680fa940f7fdc123830
424
yaml
YAML
helm/templates/redis-deployment.yaml
fossabot/kraken-3
7ac472de8ff6f44aac4dbd231f896f00e6f3b278
[ "Apache-2.0" ]
null
null
null
helm/templates/redis-deployment.yaml
fossabot/kraken-3
7ac472de8ff6f44aac4dbd231f896f00e6f3b278
[ "Apache-2.0" ]
null
null
null
helm/templates/redis-deployment.yaml
fossabot/kraken-3
7ac472de8ff6f44aac4dbd231f896f00e6f3b278
[ "Apache-2.0" ]
null
null
null
apiVersion: apps/v1 kind: Deployment metadata: labels: kraken.service: redis name: redis spec: replicas: 1 selector: matchLabels: kraken.service: redis template: metadata: labels: kraken.service: redis spec: containers: - name: redis image: redis:6 ports: - name: redis containerPort: 6379 restartPolicy: Always
17.666667
33
0.57783
792f4ec7b7c2e97b002b3227b6c71bbbab87f3b0
875
yml
YAML
serviceCenter/kubernetes/deployment.yml
Rinuys/example-hotel-booking
8f948ec7bd0ff1e699f5692e44a940f411179ac7
[ "MIT" ]
1
2021-06-14T00:59:12.000Z
2021-06-14T00:59:12.000Z
serviceCenter/kubernetes/deployment.yml
Rinuys/example-hotel-booking
8f948ec7bd0ff1e699f5692e44a940f411179ac7
[ "MIT" ]
null
null
null
serviceCenter/kubernetes/deployment.yml
Rinuys/example-hotel-booking
8f948ec7bd0ff1e699f5692e44a940f411179ac7
[ "MIT" ]
null
null
null
apiVersion: apps/v1 kind: Deployment metadata: name: serviceCenter labels: app: serviceCenter spec: replicas: 1 selector: matchLabels: app: serviceCenter template: metadata: labels: app: serviceCenter spec: containers: - name: serviceCenter image: username/serviceCenter:latest ports: - containerPort: 8080 readinessProbe: httpGet: path: '/actuator/health' port: 8080 initialDelaySeconds: 10 timeoutSeconds: 2 periodSeconds: 5 failureThreshold: 10 livenessProbe: httpGet: path: '/actuator/health' port: 8080 initialDelaySeconds: 120 timeoutSeconds: 2 periodSeconds: 5 failureThreshold: 5
23.648649
46
0.545143
79300a771ebd0d1b3b4163c5ec396698c3ae143b
1,911
yaml
YAML
eventstore-statefulset.yaml
ildella/EventStore-Kubernetes
e3e958cd6344f92434a0499499a2bb69580fa298
[ "Apache-2.0" ]
null
null
null
eventstore-statefulset.yaml
ildella/EventStore-Kubernetes
e3e958cd6344f92434a0499499a2bb69580fa298
[ "Apache-2.0" ]
null
null
null
eventstore-statefulset.yaml
ildella/EventStore-Kubernetes
e3e958cd6344f92434a0499499a2bb69580fa298
[ "Apache-2.0" ]
null
null
null
apiVersion: apps/v1 kind: StatefulSet metadata: name: eventstore spec: selector: matchLabels: app: eventstore replicas: 3 serviceName: eventstore template: metadata: labels: app: eventstore spec: containers: - name: eventstore image: "eventstore/eventstore:release-5.0.2" volumeMounts: - mountPath: "/usr/data/eventstore" name: eventstore-pv-storage env: - name: EVENTSTORE_INT_IP valueFrom: fieldRef: fieldPath: status.podIP - name: EVENTSTORE_EXT_IP valueFrom: fieldRef: fieldPath: status.podIP - name: EVENTSTORE_INT_TCP_PORT value: "1111" - name: EVENTSTORE_EXT_TCP_PORT value: "1112" - name: EVENTSTORE_INT_HTTP_PORT value: "2114" - name: EVENTSTORE_EXT_HTTP_PORT value: "2113" - name: EVENTSTORE_CLUSTER_SIZE value: "2" - name: EVENTSTORE_CLUSTER_DNS value: "eventstore.default.svc.cluster.local" - name: EVENTSTORE_CLUSTER_GOSSIP_PORT value: "2114" - name: EVENTSTORE_GOSSIP_ALLOWED_DIFFERENCE_MS value: "600000" - name: EVENTSTORE_INT_HTTP_PREFIXES value: "http://*:2114/" - name: EVENTSTORE_EXT_HTTP_PREFIXES value: "http://*:2113/" ports: - containerPort: 2113 - containerPort: 2114 - containerPort: 1111 - containerPort: 1112 volumeClaimTemplates: - metadata: name: eventstore-pv-storage spec: accessModes: - ReadWriteOnce resources: requests: storage: 10Gi
29.4
59
0.526426
7930457657c7a95a7cb97e635cf0249e8f78402b
449
yaml
YAML
examples/gateways/github-gateway-configmap.yaml
locona/argo-events
9122d50783511e7d08e9020f27249899fa015fe2
[ "Apache-2.0" ]
1
2019-04-17T23:10:21.000Z
2019-04-17T23:10:21.000Z
examples/gateways/github-gateway-configmap.yaml
locona/argo-events
9122d50783511e7d08e9020f27249899fa015fe2
[ "Apache-2.0" ]
null
null
null
examples/gateways/github-gateway-configmap.yaml
locona/argo-events
9122d50783511e7d08e9020f27249899fa015fe2
[ "Apache-2.0" ]
1
2020-09-02T06:33:20.000Z
2020-09-02T06:33:20.000Z
apiVersion: v1 kind: ConfigMap metadata: name: github-gateway-configmap data: project_1: |- id: 1234 owner: "owner-example" repository: "repo-example" hook: endpoint: "/push" port: "12000" url: "placeholderurl" events: - "*" apiToken: name: github-access key: token webHookSecret: name: github-access key: secret insecure: false active: true contentType: "json"
17.96
32
0.605791
793058a15104855f3acd5a0cc75ba20e4ceb58f5
1,329
yaml
YAML
job-certbot.yaml
TheoHelfenberger/kubernetes-letsencrypt-wildcard-dns
74ebcea306e303ba3cd65704158b8270881b6c22
[ "Apache-2.0" ]
2
2019-06-07T22:21:05.000Z
2022-01-15T21:45:24.000Z
job-certbot.yaml
TheoHelfenberger/kubernetes-letsencrypt-wildcard-dns
74ebcea306e303ba3cd65704158b8270881b6c22
[ "Apache-2.0" ]
null
null
null
job-certbot.yaml
TheoHelfenberger/kubernetes-letsencrypt-wildcard-dns
74ebcea306e303ba3cd65704158b8270881b6c22
[ "Apache-2.0" ]
null
null
null
apiVersion: batch/v1 kind: Job metadata: name: certbotdns labels: purpose: certbot spec: template: spec: serviceAccountName: certbot automountServiceAccountToken: true containers: - name: certbotdns image: mbuckrogers/gcednscertbot args: - "--server=$(LE_SERVER)" - "-n" - "-v" - "--dns-google" - "--dns-google-propagation-seconds=60" - "--email=$(EMAIL)" - "--agree-tos" - "--dns-google-credentials=$(GOOGLE_APPLICATION_CREDENTIALS)" - "--deploy-hook=deployhook.sh" - "-d $(DOMAINS)" - certonly imagePullPolicy: Always volumeMounts: - name: google-cloud-key mountPath: /var/secrets/google - name: certs-storage mountPath: /etc/letsencrypt/ env: - name: GOOGLE_APPLICATION_CREDENTIALS value: /var/secrets/google/key.json envFrom: - configMapRef: name: certbot-config volumes: - name: google-cloud-key secret: secretName: dns-key - name: certs-storage gcePersistentDisk: pdName: certbot-disk fsType: ext4 #emptyDir: {} restartPolicy: Never
27.6875
72
0.531226
79306d6c839f981ad021cf2282929aca132ef3d2
567
yaml
YAML
test/inject-webhook.yaml
warmchang/patch-operator
bfc442bf566c4f442d1409b9a9641607942cc8e1
[ "Apache-2.0" ]
18
2022-01-05T18:06:02.000Z
2022-03-24T10:53:16.000Z
test/inject-webhook.yaml
warmchang/patch-operator
bfc442bf566c4f442d1409b9a9641607942cc8e1
[ "Apache-2.0" ]
11
2021-12-30T20:47:07.000Z
2022-03-24T22:46:18.000Z
test/inject-webhook.yaml
warmchang/patch-operator
bfc442bf566c4f442d1409b9a9641607942cc8e1
[ "Apache-2.0" ]
7
2021-12-23T19:15:42.000Z
2022-03-24T05:20:58.000Z
apiVersion: admissionregistration.k8s.io/v1 kind: MutatingWebhookConfiguration metadata: name: patch-operator-inject annotations: service.beta.openshift.io/inject-cabundle: "true" webhooks: - admissionReviewVersions: - v1 clientConfig: service: name: patch-operator-webhook-service namespace: patch-operator path: /inject failurePolicy: Fail name: patch-operator-inject.redhatcop.redhat.io rules: - apiGroups: - "" apiVersions: - v1 operations: - CREATE resources: - configmaps sideEffects: None
21.807692
53
0.707231
7930bc0b360b3ae87ca5b45c82eee23e96477070
2,161
yaml
YAML
manifests/prometheus-roleSpecificNamespaces.yaml
donahues12/kube-prometheus
83dc5e97a7c9511ae0a37f10fca062118bc92e95
[ "Apache-2.0" ]
null
null
null
manifests/prometheus-roleSpecificNamespaces.yaml
donahues12/kube-prometheus
83dc5e97a7c9511ae0a37f10fca062118bc92e95
[ "Apache-2.0" ]
10
2022-01-11T07:53:11.000Z
2022-03-25T11:43:46.000Z
kubernetes-monitoring/manifests/prometheus-roleSpecificNamespaces.yaml
otus-kuber-2021-12/suxarikisme_platform
bf2a6e3445bfb07cb56845a5b605528d7916a1a0
[ "MIT" ]
1
2022-03-16T01:18:23.000Z
2022-03-16T01:18:23.000Z
apiVersion: rbac.authorization.k8s.io/v1 items: - apiVersion: rbac.authorization.k8s.io/v1 kind: Role metadata: labels: app.kubernetes.io/component: prometheus app.kubernetes.io/instance: k8s app.kubernetes.io/name: prometheus app.kubernetes.io/part-of: kube-prometheus app.kubernetes.io/version: 2.33.0 name: prometheus-k8s namespace: default rules: - apiGroups: - "" resources: - services - endpoints - pods verbs: - get - list - watch - apiGroups: - extensions resources: - ingresses verbs: - get - list - watch - apiGroups: - networking.k8s.io resources: - ingresses verbs: - get - list - watch - apiVersion: rbac.authorization.k8s.io/v1 kind: Role metadata: labels: app.kubernetes.io/component: prometheus app.kubernetes.io/instance: k8s app.kubernetes.io/name: prometheus app.kubernetes.io/part-of: kube-prometheus app.kubernetes.io/version: 2.33.0 name: prometheus-k8s namespace: kube-system rules: - apiGroups: - "" resources: - services - endpoints - pods verbs: - get - list - watch - apiGroups: - extensions resources: - ingresses verbs: - get - list - watch - apiGroups: - networking.k8s.io resources: - ingresses verbs: - get - list - watch - apiVersion: rbac.authorization.k8s.io/v1 kind: Role metadata: labels: app.kubernetes.io/component: prometheus app.kubernetes.io/instance: k8s app.kubernetes.io/name: prometheus app.kubernetes.io/part-of: kube-prometheus app.kubernetes.io/version: 2.33.0 name: prometheus-k8s namespace: monitoring rules: - apiGroups: - "" resources: - services - endpoints - pods verbs: - get - list - watch - apiGroups: - extensions resources: - ingresses verbs: - get - list - watch - apiGroups: - networking.k8s.io resources: - ingresses verbs: - get - list - watch kind: RoleList
18.313559
48
0.599722
7931935b943ad22e9b18779de61b0d6589cd0aee
30,828
yaml
YAML
k8s/strimzi/081-Crd-kafkauser.yaml
raestrada/kafka-workshop-modulo03-lab1
7a6400139434748b20df80760de8342cf0f5badf
[ "MIT" ]
null
null
null
k8s/strimzi/081-Crd-kafkauser.yaml
raestrada/kafka-workshop-modulo03-lab1
7a6400139434748b20df80760de8342cf0f5badf
[ "MIT" ]
null
null
null
k8s/strimzi/081-Crd-kafkauser.yaml
raestrada/kafka-workshop-modulo03-lab1
7a6400139434748b20df80760de8342cf0f5badf
[ "MIT" ]
null
null
null
apiVersion: apiextensions.k8s.io/v1 kind: CustomResourceDefinition metadata: name: kafkausers.kafka.strimzi.io namespace: kafka labels: app: strimzi strimzi.io/crd-install: "true" spec: group: kafka.strimzi.io names: kind: KafkaUser listKind: KafkaUserList singular: kafkauser plural: kafkausers shortNames: - ku categories: - strimzi scope: Namespaced conversion: strategy: None versions: - name: v1beta2 served: true storage: true subresources: status: {} additionalPrinterColumns: - name: Cluster description: The name of the Kafka cluster this user belongs to jsonPath: .metadata.labels.strimzi\.io/cluster type: string - name: Authentication description: How the user is authenticated jsonPath: .spec.authentication.type type: string - name: Authorization description: How the user is authorised jsonPath: .spec.authorization.type type: string - name: Ready description: The state of the custom resource jsonPath: .status.conditions[?(@.type=="Ready")].status type: string schema: openAPIV3Schema: type: object properties: spec: type: object properties: authentication: type: object properties: type: type: string enum: - tls - scram-sha-512 description: Authentication type. required: - type description: Authentication mechanism enabled for this Kafka user. authorization: type: object properties: acls: type: array items: type: object properties: host: type: string description: The host from which the action described in the ACL rule is allowed or denied. operation: type: string enum: - Read - Write - Create - Delete - Alter - Describe - ClusterAction - AlterConfigs - DescribeConfigs - IdempotentWrite - All description: 'Operation which will be allowed or denied. Supported operations are: Read, Write, Create, Delete, Alter, Describe, ClusterAction, AlterConfigs, DescribeConfigs, IdempotentWrite and All.' resource: type: object properties: name: type: string description: Name of resource for which given ACL rule applies. Can be combined with `patternType` field to use prefix pattern. patternType: type: string enum: - literal - prefix description: Describes the pattern used in the resource field. The supported types are `literal` and `prefix`. With `literal` pattern type, the resource field will be used as a definition of a full name. With `prefix` pattern type, the resource name will be used only as a prefix. Default value is `literal`. type: type: string enum: - topic - group - cluster - transactionalId description: Resource type. The available resource types are `topic`, `group`, `cluster`, and `transactionalId`. required: - type description: Indicates the resource for which given ACL rule applies. type: type: string enum: - allow - deny description: The type of the rule. Currently the only supported type is `allow`. ACL rules with type `allow` are used to allow user to execute the specified operations. Default value is `allow`. required: - operation - resource description: List of ACL rules which should be applied to this user. type: type: string enum: - simple description: Authorization type. Currently the only supported type is `simple`. `simple` authorization type uses Kafka's `kafka.security.authorizer.AclAuthorizer` class for authorization. required: - acls - type description: Authorization rules for this Kafka user. quotas: type: object properties: consumerByteRate: type: integer minimum: 0 description: A quota on the maximum bytes per-second that each client group can fetch from a broker before the clients in the group are throttled. Defined on a per-broker basis. producerByteRate: type: integer minimum: 0 description: A quota on the maximum bytes per-second that each client group can publish to a broker before the clients in the group are throttled. Defined on a per-broker basis. requestPercentage: type: integer minimum: 0 description: A quota on the maximum CPU utilization of each client group as a percentage of network and I/O threads. description: Quotas on requests to control the broker resources used by clients. Network bandwidth and request rate quotas can be enforced.Kafka documentation for Kafka User quotas can be found at http://kafka.apache.org/documentation/#design_quotas. template: type: object properties: secret: type: object properties: metadata: type: object properties: labels: x-kubernetes-preserve-unknown-fields: true type: object description: Labels added to the resource template. Can be applied to different resources such as `StatefulSets`, `Deployments`, `Pods`, and `Services`. annotations: x-kubernetes-preserve-unknown-fields: true type: object description: Annotations added to the resource template. Can be applied to different resources such as `StatefulSets`, `Deployments`, `Pods`, and `Services`. description: Metadata applied to the resource. description: Template for KafkaUser resources. The template allows users to specify how the `Secret` with password or TLS certificates is generated. description: Template to specify how Kafka User `Secrets` are generated. description: The specification of the user. status: type: object properties: conditions: type: array items: type: object properties: type: type: string description: The unique identifier of a condition, used to distinguish between other conditions in the resource. status: type: string description: The status of the condition, either True, False or Unknown. lastTransitionTime: type: string description: Last time the condition of a type changed from one status to another. The required format is 'yyyy-MM-ddTHH:mm:ssZ', in the UTC time zone. reason: type: string description: The reason for the condition's last transition (a single word in CamelCase). message: type: string description: Human-readable message indicating details about the condition's last transition. description: List of status conditions. observedGeneration: type: integer description: The generation of the CRD that was last reconciled by the operator. username: type: string description: Username. secret: type: string description: The name of `Secret` where the credentials are stored. description: The status of the Kafka User. - name: v1beta1 served: true storage: false subresources: status: {} additionalPrinterColumns: - name: Cluster description: The name of the Kafka cluster this user belongs to jsonPath: .metadata.labels.strimzi\.io/cluster type: string - name: Authentication description: How the user is authenticated jsonPath: .spec.authentication.type type: string - name: Authorization description: How the user is authorised jsonPath: .spec.authorization.type type: string - name: Ready description: The state of the custom resource jsonPath: .status.conditions[?(@.type=="Ready")].status type: string schema: openAPIV3Schema: type: object properties: spec: type: object properties: authentication: type: object properties: type: type: string enum: - tls - scram-sha-512 description: Authentication type. required: - type description: Authentication mechanism enabled for this Kafka user. authorization: type: object properties: acls: type: array items: type: object properties: host: type: string description: The host from which the action described in the ACL rule is allowed or denied. operation: type: string enum: - Read - Write - Create - Delete - Alter - Describe - ClusterAction - AlterConfigs - DescribeConfigs - IdempotentWrite - All description: 'Operation which will be allowed or denied. Supported operations are: Read, Write, Create, Delete, Alter, Describe, ClusterAction, AlterConfigs, DescribeConfigs, IdempotentWrite and All.' resource: type: object properties: name: type: string description: Name of resource for which given ACL rule applies. Can be combined with `patternType` field to use prefix pattern. patternType: type: string enum: - literal - prefix description: Describes the pattern used in the resource field. The supported types are `literal` and `prefix`. With `literal` pattern type, the resource field will be used as a definition of a full name. With `prefix` pattern type, the resource name will be used only as a prefix. Default value is `literal`. type: type: string enum: - topic - group - cluster - transactionalId description: Resource type. The available resource types are `topic`, `group`, `cluster`, and `transactionalId`. required: - type description: Indicates the resource for which given ACL rule applies. type: type: string enum: - allow - deny description: The type of the rule. Currently the only supported type is `allow`. ACL rules with type `allow` are used to allow user to execute the specified operations. Default value is `allow`. required: - operation - resource description: List of ACL rules which should be applied to this user. type: type: string enum: - simple description: Authorization type. Currently the only supported type is `simple`. `simple` authorization type uses Kafka's `kafka.security.authorizer.AclAuthorizer` class for authorization. required: - acls - type description: Authorization rules for this Kafka user. quotas: type: object properties: consumerByteRate: type: integer minimum: 0 description: A quota on the maximum bytes per-second that each client group can fetch from a broker before the clients in the group are throttled. Defined on a per-broker basis. producerByteRate: type: integer minimum: 0 description: A quota on the maximum bytes per-second that each client group can publish to a broker before the clients in the group are throttled. Defined on a per-broker basis. requestPercentage: type: integer minimum: 0 description: A quota on the maximum CPU utilization of each client group as a percentage of network and I/O threads. description: Quotas on requests to control the broker resources used by clients. Network bandwidth and request rate quotas can be enforced.Kafka documentation for Kafka User quotas can be found at http://kafka.apache.org/documentation/#design_quotas. template: type: object properties: secret: type: object properties: metadata: type: object properties: labels: x-kubernetes-preserve-unknown-fields: true type: object description: Labels added to the resource template. Can be applied to different resources such as `StatefulSets`, `Deployments`, `Pods`, and `Services`. annotations: x-kubernetes-preserve-unknown-fields: true type: object description: Annotations added to the resource template. Can be applied to different resources such as `StatefulSets`, `Deployments`, `Pods`, and `Services`. description: Metadata applied to the resource. description: Template for KafkaUser resources. The template allows users to specify how the `Secret` with password or TLS certificates is generated. description: Template to specify how Kafka User `Secrets` are generated. description: The specification of the user. status: type: object properties: conditions: type: array items: type: object properties: type: type: string description: The unique identifier of a condition, used to distinguish between other conditions in the resource. status: type: string description: The status of the condition, either True, False or Unknown. lastTransitionTime: type: string description: Last time the condition of a type changed from one status to another. The required format is 'yyyy-MM-ddTHH:mm:ssZ', in the UTC time zone. reason: type: string description: The reason for the condition's last transition (a single word in CamelCase). message: type: string description: Human-readable message indicating details about the condition's last transition. description: List of status conditions. observedGeneration: type: integer description: The generation of the CRD that was last reconciled by the operator. username: type: string description: Username. secret: type: string description: The name of `Secret` where the credentials are stored. description: The status of the Kafka User. - name: v1alpha1 served: true storage: false subresources: status: {} additionalPrinterColumns: - name: Cluster description: The name of the Kafka cluster this user belongs to jsonPath: .metadata.labels.strimzi\.io/cluster type: string - name: Authentication description: How the user is authenticated jsonPath: .spec.authentication.type type: string - name: Authorization description: How the user is authorised jsonPath: .spec.authorization.type type: string - name: Ready description: The state of the custom resource jsonPath: .status.conditions[?(@.type=="Ready")].status type: string schema: openAPIV3Schema: type: object properties: spec: type: object properties: authentication: type: object properties: type: type: string enum: - tls - scram-sha-512 description: Authentication type. required: - type description: Authentication mechanism enabled for this Kafka user. authorization: type: object properties: acls: type: array items: type: object properties: host: type: string description: The host from which the action described in the ACL rule is allowed or denied. operation: type: string enum: - Read - Write - Create - Delete - Alter - Describe - ClusterAction - AlterConfigs - DescribeConfigs - IdempotentWrite - All description: 'Operation which will be allowed or denied. Supported operations are: Read, Write, Create, Delete, Alter, Describe, ClusterAction, AlterConfigs, DescribeConfigs, IdempotentWrite and All.' resource: type: object properties: name: type: string description: Name of resource for which given ACL rule applies. Can be combined with `patternType` field to use prefix pattern. patternType: type: string enum: - literal - prefix description: Describes the pattern used in the resource field. The supported types are `literal` and `prefix`. With `literal` pattern type, the resource field will be used as a definition of a full name. With `prefix` pattern type, the resource name will be used only as a prefix. Default value is `literal`. type: type: string enum: - topic - group - cluster - transactionalId description: Resource type. The available resource types are `topic`, `group`, `cluster`, and `transactionalId`. required: - type description: Indicates the resource for which given ACL rule applies. type: type: string enum: - allow - deny description: The type of the rule. Currently the only supported type is `allow`. ACL rules with type `allow` are used to allow user to execute the specified operations. Default value is `allow`. required: - operation - resource description: List of ACL rules which should be applied to this user. type: type: string enum: - simple description: Authorization type. Currently the only supported type is `simple`. `simple` authorization type uses Kafka's `kafka.security.authorizer.AclAuthorizer` class for authorization. required: - acls - type description: Authorization rules for this Kafka user. quotas: type: object properties: consumerByteRate: type: integer minimum: 0 description: A quota on the maximum bytes per-second that each client group can fetch from a broker before the clients in the group are throttled. Defined on a per-broker basis. producerByteRate: type: integer minimum: 0 description: A quota on the maximum bytes per-second that each client group can publish to a broker before the clients in the group are throttled. Defined on a per-broker basis. requestPercentage: type: integer minimum: 0 description: A quota on the maximum CPU utilization of each client group as a percentage of network and I/O threads. description: Quotas on requests to control the broker resources used by clients. Network bandwidth and request rate quotas can be enforced.Kafka documentation for Kafka User quotas can be found at http://kafka.apache.org/documentation/#design_quotas. template: type: object properties: secret: type: object properties: metadata: type: object properties: labels: x-kubernetes-preserve-unknown-fields: true type: object description: Labels added to the resource template. Can be applied to different resources such as `StatefulSets`, `Deployments`, `Pods`, and `Services`. annotations: x-kubernetes-preserve-unknown-fields: true type: object description: Annotations added to the resource template. Can be applied to different resources such as `StatefulSets`, `Deployments`, `Pods`, and `Services`. description: Metadata applied to the resource. description: Template for KafkaUser resources. The template allows users to specify how the `Secret` with password or TLS certificates is generated. description: Template to specify how Kafka User `Secrets` are generated. description: The specification of the user. status: type: object properties: conditions: type: array items: type: object properties: type: type: string description: The unique identifier of a condition, used to distinguish between other conditions in the resource. status: type: string description: The status of the condition, either True, False or Unknown. lastTransitionTime: type: string description: Last time the condition of a type changed from one status to another. The required format is 'yyyy-MM-ddTHH:mm:ssZ', in the UTC time zone. reason: type: string description: The reason for the condition's last transition (a single word in CamelCase). message: type: string description: Human-readable message indicating details about the condition's last transition. description: List of status conditions. observedGeneration: type: integer description: The generation of the CRD that was last reconciled by the operator. username: type: string description: Username. secret: type: string description: The name of `Secret` where the credentials are stored. description: The status of the Kafka User.
45.268722
123
0.450305
79319b51aac70a556dedf242a3efdcdc536f2ed5
70
yaml
YAML
deploy/service_account.yaml
kaappi/kaappi-operator
fd8356b4ce79204bd2c2d38e15b50dacea95dc38
[ "Apache-2.0" ]
null
null
null
deploy/service_account.yaml
kaappi/kaappi-operator
fd8356b4ce79204bd2c2d38e15b50dacea95dc38
[ "Apache-2.0" ]
null
null
null
deploy/service_account.yaml
kaappi/kaappi-operator
fd8356b4ce79204bd2c2d38e15b50dacea95dc38
[ "Apache-2.0" ]
null
null
null
apiVersion: v1 kind: ServiceAccount metadata: name: kaappi-operator
14
23
0.8
7931d8d29cb0c0502277c8564d438c3cc1e6df60
5,653
yaml
YAML
assets/node.yaml
RomanBednar/openstack-cinder-csi-driver-operator
0488d278dd9b45e36f980e0294b821d4189b80d6
[ "Apache-2.0" ]
null
null
null
assets/node.yaml
RomanBednar/openstack-cinder-csi-driver-operator
0488d278dd9b45e36f980e0294b821d4189b80d6
[ "Apache-2.0" ]
null
null
null
assets/node.yaml
RomanBednar/openstack-cinder-csi-driver-operator
0488d278dd9b45e36f980e0294b821d4189b80d6
[ "Apache-2.0" ]
null
null
null
kind: DaemonSet apiVersion: apps/v1 metadata: name: openstack-cinder-csi-driver-node namespace: openshift-cluster-csi-drivers annotations: config.openshift.io/inject-proxy: csi-driver spec: selector: matchLabels: app: openstack-cinder-csi-driver-node updateStrategy: type: RollingUpdate rollingUpdate: maxUnavailable: 10% template: metadata: labels: app: openstack-cinder-csi-driver-node spec: hostNetwork: true serviceAccount: openstack-cinder-csi-driver-node-sa priorityClassName: system-node-critical nodeSelector: kubernetes.io/os: linux tolerations: - operator: Exists containers: - name: csi-driver securityContext: privileged: true capabilities: add: ["SYS_ADMIN"] allowPrivilegeEscalation: true image: ${DRIVER_IMAGE} imagePullPolicy: IfNotPresent args : - /bin/cinder-csi-plugin - "--nodeid=$(NODE_ID)" - "--endpoint=$(CSI_ENDPOINT)" - "--cloud-config=$(CLOUD_CONFIG)" - "--v=${LOG_LEVEL}" env: - name: NODE_ID valueFrom: fieldRef: fieldPath: spec.nodeName - name: CSI_ENDPOINT value: unix://csi/csi.sock - name: CLOUD_CONFIG value: /etc/kubernetes/config/cloud.conf volumeMounts: - name: socket-dir mountPath: /csi - name: kubelet-dir mountPath: /var/lib/kubelet mountPropagation: "Bidirectional" - name: pods-probe-dir mountPath: /dev mountPropagation: "HostToContainer" - name: secret-cinderplugin mountPath: /etc/kubernetes/secret readOnly: true - name: config-cinderplugin mountPath: /etc/kubernetes/config readOnly: true - name: cacert mountPath: /etc/kubernetes/static-pod-resources/configmaps/cloud-config ports: - name: healthz # Due to hostNetwork, this port is open on all nodes! containerPort: 10300 protocol: TCP livenessProbe: httpGet: path: /healthz port: healthz initialDelaySeconds: 10 timeoutSeconds: 10 periodSeconds: 30 failureThreshold: 5 resources: requests: memory: 50Mi cpu: 10m - name: node-driver-registrar image: ${NODE_DRIVER_REGISTRAR_IMAGE} imagePullPolicy: IfNotPresent args: - "--v=5" - "--csi-address=$(ADDRESS)" - "--kubelet-registration-path=$(DRIVER_REG_SOCK_PATH)" lifecycle: preStop: exec: command: ["/bin/sh", "-c", "rm -rf /registration/cinder.csi.openstack.org /registration/cinder.csi.openstack.org-reg.sock"] env: - name: ADDRESS value: /csi/csi.sock - name: DRIVER_REG_SOCK_PATH value: /var/lib/kubelet/plugins/cinder.csi.openstack.org/csi.sock - name: KUBE_NODE_NAME valueFrom: fieldRef: fieldPath: spec.nodeName volumeMounts: - name: socket-dir mountPath: /csi - name: registration-dir mountPath: /registration resources: requests: memory: 50Mi cpu: 10m - name: csi-liveness-probe image: ${LIVENESS_PROBE_IMAGE} imagePullPolicy: IfNotPresent args: - --csi-address=/csi/csi.sock - --probe-timeout=10s - --health-port=10300 - --v=${LOG_LEVEL} volumeMounts: - name: socket-dir mountPath: /csi resources: requests: memory: 50Mi cpu: 10m volumes: - name: socket-dir hostPath: path: /var/lib/kubelet/plugins/cinder.csi.openstack.org type: DirectoryOrCreate - name: registration-dir hostPath: path: /var/lib/kubelet/plugins_registry/ type: Directory - name: kubelet-dir hostPath: path: /var/lib/kubelet type: Directory - name: pods-probe-dir hostPath: path: /dev type: Directory - name: secret-cinderplugin secret: secretName: openstack-cloud-credentials items: - key: clouds.yaml path: clouds.yaml - name: config-cinderplugin configMap: name: openstack-cinder-config items: - key: cloud.conf path: cloud.conf - key: multiaz-cloud.conf path: multiaz-cloud.conf - name: cacert # Extract ca-bundle.pem to /etc/kubernetes/static-pod-resources/configmaps/cloud-config if present. # Let the pod start when the ConfigMap does not exist or the certificate # is not preset there. The certificate file will be created once the # ConfigMap is created / the certificate is added to it. configMap: name: cloud-provider-config items: - key: ca-bundle.pem path: ca-bundle.pem optional: true
32.866279
139
0.525915
79324c0fe90c7bc4d21cdf0bd87b3f40a7d1605b
1,469
yml
YAML
k8s_watch_deployment_iam.yml
HDFGroup/hsds-bucket-loader
23ed46a27e43a5ac55be460c6ea00ddbeead7198
[ "BSD-2-Clause" ]
2
2021-01-19T17:19:40.000Z
2022-01-30T09:05:04.000Z
k8s_watch_deployment_iam.yml
HDFGroup/hsds-bucket-loader
23ed46a27e43a5ac55be460c6ea00ddbeead7198
[ "BSD-2-Clause" ]
null
null
null
k8s_watch_deployment_iam.yml
HDFGroup/hsds-bucket-loader
23ed46a27e43a5ac55be460c6ea00ddbeead7198
[ "BSD-2-Clause" ]
null
null
null
apiVersion: apps/v1 kind: Deployment metadata: labels: app: hsds-bucket-watch name: hsds-bucket-watch spec: replicas: 1 selector: matchLabels: app: hsds-bucket-watch template: metadata: labels: app: hsds-bucket-watch spec: serviceAccountName: hsds-eks-policy containers: - name: watch image: hdfgroup/bucket_loader:v0.3 imagePullPolicy: IfNotPresent resources: requests: memory: "128M" limits: memory: "256M" volumeMounts: - name: bucket-config mountPath: "/config/config.yml" subPath: config.yml env: - name: RUN_COMMAND value: watch - name: PASSWORD_FILE value: /config/passwd.txt - name: HS_USERNAME valueFrom: secretKeyRef: name: hs-loader-keys key: hs_username - name: HS_PASSWORD valueFrom: secretKeyRef: name: hs-loader-keys key: hs_password volumes: - name: accounts secret: secretName: user-password - name: bucket-config configMap: name: hsds-bucket-loader-config - name: hsds-config configMap: name: hsds-config - name: hsds-override configMap: name: hsds-override
24.898305
44
0.520762
79325ed446384801963fd8b095dc0bc841b3b4af
79
yaml
YAML
mlflow-tracking-operator/deploy/service_account.yaml
zhaoxiyi/DancingRobot
d143f9bbff2efb61e830745103b3f1f2f3d15afe
[ "Apache-2.0" ]
3
2019-10-23T06:42:44.000Z
2019-11-08T14:51:40.000Z
mlflow-tracking-operator/deploy/service_account.yaml
zhaoxiyi/DancingRobot
d143f9bbff2efb61e830745103b3f1f2f3d15afe
[ "Apache-2.0" ]
null
null
null
mlflow-tracking-operator/deploy/service_account.yaml
zhaoxiyi/DancingRobot
d143f9bbff2efb61e830745103b3f1f2f3d15afe
[ "Apache-2.0" ]
4
2019-10-24T07:54:22.000Z
2019-11-08T14:51:56.000Z
apiVersion: v1 kind: ServiceAccount metadata: name: mlflow-tracking-operator
15.8
32
0.810127
793271adb456ea9eb57ba615336a5765f511ca19
469
yaml
YAML
k8s/hpa/fc-api-hpa.yaml
juanitotrrj/fc-devops
530ef4bafd40b2a2aa93679d8638a31f2f762721
[ "MIT" ]
null
null
null
k8s/hpa/fc-api-hpa.yaml
juanitotrrj/fc-devops
530ef4bafd40b2a2aa93679d8638a31f2f762721
[ "MIT" ]
null
null
null
k8s/hpa/fc-api-hpa.yaml
juanitotrrj/fc-devops
530ef4bafd40b2a2aa93679d8638a31f2f762721
[ "MIT" ]
null
null
null
kind: HorizontalPodAutoscaler apiVersion: autoscaling/v2beta1 metadata: name: fc-api-hpa namespace: tarroja labels: app: fc-api spec: scaleTargetRef: kind: Deployment name: fc-api apiVersion: extensions/v1beta1 minReplicas: 1 maxReplicas: 2 metrics: - type: Resource resource: name: memory targetAverageUtilization: 100 - type: Resource resource: name: cpu targetAverageUtilization: 100
19.541667
37
0.671642
7932b4fcf1449772ecba2f8036069ac9f132c365
79
yaml
YAML
platform/new/girder-csa.yaml
astro-friedel/cis-startup
c9b581588bda179687c5c1813e41c43b1cf4b4ac
[ "BSD-3-Clause" ]
null
null
null
platform/new/girder-csa.yaml
astro-friedel/cis-startup
c9b581588bda179687c5c1813e41c43b1cf4b4ac
[ "BSD-3-Clause" ]
null
null
null
platform/new/girder-csa.yaml
astro-friedel/cis-startup
c9b581588bda179687c5c1813e41c43b1cf4b4ac
[ "BSD-3-Clause" ]
null
null
null
apiVersion: v1 kind: ServiceAccount metadata: name: cis namespace: cis-dev
13.166667
20
0.759494
7932f1f37214dd55b741242c0636a6bcc052f43d
701
yaml
YAML
k8s_helm/01_apps-without-helm/red/red-deployment.yaml
hboshnak/trainings
49d02999cf6a7d92d852cef4a6d1522ee233657a
[ "Apache-2.0" ]
24
2020-08-04T17:06:58.000Z
2022-03-31T08:49:11.000Z
k8s_helm/01_apps-without-helm/red/red-deployment.yaml
hboshnak/trainings
49d02999cf6a7d92d852cef4a6d1522ee233657a
[ "Apache-2.0" ]
40
2020-12-04T10:25:04.000Z
2021-12-23T11:09:36.000Z
k8s_helm/01_apps-without-helm/red/red-deployment.yaml
hboshnak/trainings
49d02999cf6a7d92d852cef4a6d1522ee233657a
[ "Apache-2.0" ]
19
2020-07-28T12:21:03.000Z
2022-01-27T09:36:58.000Z
apiVersion: apps/v1 kind: Deployment metadata: name: red labels: app: red spec: replicas: 1 selector: matchLabels: app: red template: metadata: labels: app: red spec: containers: - name: red image: nginx:1.19.2 volumeMounts: - name: html mountPath: /usr/share/nginx/html resources: requests: cpu: 100m memory: 100Mi limits: cpu: 100m memory: 100Mi volumes: - name: html configMap: name: red items: - key: body path: index.html
18.945946
46
0.455064
79334022c35ab090b4eb64854a5cbf24387ea8db
363
yaml
YAML
k8s/ingress.yaml
pnieto/forotecnoloxico-contenedores-k8s
14363b678c9232e5b05056b1c9fb9e188870cf55
[ "Apache-2.0" ]
null
null
null
k8s/ingress.yaml
pnieto/forotecnoloxico-contenedores-k8s
14363b678c9232e5b05056b1c9fb9e188870cf55
[ "Apache-2.0" ]
null
null
null
k8s/ingress.yaml
pnieto/forotecnoloxico-contenedores-k8s
14363b678c9232e5b05056b1c9fb9e188870cf55
[ "Apache-2.0" ]
null
null
null
apiVersion: networking.k8s.io/v1 kind: Ingress metadata: name: echo-ingress labels: name: echo-ingress spec: tls: - hosts: - echo.test rules: - host: echo.test http: paths: - pathType: Prefix path: "/" backend: service: name: echo-service port: number: 80
16.5
32
0.515152
7933649d866cace549ddcc450b0c309ded12530c
949
yaml
YAML
ansible/roles/pool/files/blockValidator.yaml
JPaulMora/grin-pool
c980fdbcae4edeaa661d36d5b6da6f7a49beed05
[ "Apache-2.0" ]
null
null
null
ansible/roles/pool/files/blockValidator.yaml
JPaulMora/grin-pool
c980fdbcae4edeaa661d36d5b6da6f7a49beed05
[ "Apache-2.0" ]
null
null
null
ansible/roles/pool/files/blockValidator.yaml
JPaulMora/grin-pool
c980fdbcae4edeaa661d36d5b6da6f7a49beed05
[ "Apache-2.0" ]
null
null
null
apiVersion: batch/v1beta1 kind: CronJob metadata: name: blockvalidator spec: schedule: "3 * * * *" jobTemplate: spec: template: spec: containers: - name: blockvalidator image: funkypenguin/grinpool-services command: ["/usr/local/bin/blockValidator.py"] env: - name: MYSQL_ROOT_PASSWORD valueFrom: secretKeyRef: name: mysql-pass key: password # volumeMounts: # directory inside container # - mountPath: /services # name: poolservicesdir # volumes: # directory location on host # - name: poolservicesdir # hostPath: # path: /data/services imagePullSecrets: - name: regsecret restartPolicy: Never concurrencyPolicy: Replace successfulJobsHistoryLimit: 0 failedJobsHistoryLimit: 1
27.114286
57
0.559536
79338d818040aaa7bb595d94785445ac6784843d
11,259
yaml
YAML
itg-tests/es-it/ReeferItgTests.yaml
prafullkotecha/refarch-kc
22e5d08a2d81260ddf73e9d41dfb4c86467ed74d
[ "Apache-2.0" ]
30
2019-01-17T07:51:53.000Z
2022-03-22T05:10:46.000Z
itg-tests/es-it/ReeferItgTests.yaml
prafullkotecha/refarch-kc
22e5d08a2d81260ddf73e9d41dfb4c86467ed74d
[ "Apache-2.0" ]
23
2019-10-01T11:45:33.000Z
2022-02-06T01:52:20.000Z
itg-tests/es-it/ReeferItgTests.yaml
prafullkotecha/refarch-kc
22e5d08a2d81260ddf73e9d41dfb4c86467ed74d
[ "Apache-2.0" ]
31
2019-01-29T06:18:07.000Z
2022-03-19T07:15:23.000Z
apiVersion: batch/v1 kind: Job metadata: name: reefer-itgtests-job spec: template: metadata: name: reefer-itgtests-job spec: containers: - name: ibmcase-python image: quay.io/ibmcase/kcontainer-python:itgtests imagePullPolicy: Always command: - /bin/bash - -c - | # Obfuscate KAFKA_PASSWORD if [ "`echo -n ${KAFKA_PASSWORD} | wc -c`" -gt 3 ]; then FIRST_CH=${KAFKA_PASSWORD:0:1} LAST_CH=${KAFKA_PASSWORD: -1} OBFUSCATED_PASSWORD="${FIRST_CH}*****${LAST_CH}" else OBFUSCATED_PASSWORD="*******" fi echo "-----------------------------------------------------------------" echo "-- Reefer Container Shipment EDA application Integration Tests --" echo "-----------------------------------------------------------------" echo echo "Executing integrations tests from branch $BRANCH of $GITHUB_REPO" echo "Kafka Brokers: $KAFKA_BROKERS" echo "Kafka Security protocol: $SECURITY_PROTOCOL" echo "Kafka SASL mechanism: $SASL_MECHANISM" echo "Kafka user: $KAFKA_USER" echo "Kafka password: $OBFUSCATED_PASSWORD" echo "Orders topic name: $ITGTESTS_ORDERS_TOPIC" echo "Order Command topic name: $ITGTESTS_ORDER_COMMANDS_TOPIC" echo "Containers topic name: $ITGTESTS_CONTAINERS_TOPIC" echo "------------------------------------------------------------------" echo # Check important environments variables are properly set if [ -z "$KAFKA_BROKERS" ]; then echo "[ERROR] - KAFKA_BROKERS environment variable must be set." exit 1 fi # Check that a Kafka user and password are provided if there is authentication set up if [ "$SECURITY_PROTOCOL" == "SASL_PLAINTEXT" ] || [ "$SECURITY_PROTOCOL" == "SASL_SSL" ]; then if [ -z "$KAFKA_USER" ]; then echo "[ERROR] - A Kafka user was not provided." exit 1 fi if [ -z "$KAFKA_PASSWORD" ]; then echo "[ERROR] - A Kafka password was not provided." exit 1 fi fi # Ideally, we would check here if SECURITY_PROTOCOL is SSL or SASL_SSL which are the two security protocols that use SSL certs. # However, IBM Event Streams on IBM Cloud uses SASL_SSL but there is no need for a certificate. # Hence, we can only warn that if [ "$SECURITY_PROTOCOL" == "SSL" ] || [ "$SECURITY_PROTOCOL" == "SASL_SSL" ]; then if [ ! -f "$PEM_CERT" ]; then echo "[WARNING] - A PEM certificate could not be found. This might be necessary to establish the appropriate secured communication to the Kafka cluster." echo "[WARNING] - If it is needed, make sure you have created a Kubernetes Secret named 'kafka-truststore-pem' with the PEM certificate" echo "[WARNING] - as referenced in the Integration Tests YAML file." fi fi # Creating the working directory mkdir ${WORKING_DIR} && cd ${WORKING_DIR} # Clone the repository where the integration tests to be executed are and checkout the specific branch git clone ${GITHUB_REPO} && cd ${REPO_NAME} && if [ "master" != "${BRANCH}" ]; then git checkout ${BRANCH}; fi # Get into the location for the integration tests cd ${ITGTESTS_LOCATION} # Execute the integration tests # Create the tests reporting file touch /tmp/results.txt export PYTHONPATH=${PYTHONPATH}:${WORKING_DIR}/${REPO_NAME}/itg-tests echo '******************************************' echo '******************************************' echo '********** E2E Happy Path ************' echo '******************************************' echo '******************************************' python -u E2EHappyPath.py && source /tmp/E2EHappyPath.properties echo '******************************************' echo '******************************************' echo '********* Saga No Container **********' echo '******************************************' echo '******************************************' python -u Saga_NoContainer.py echo '******************************************' echo '******************************************' echo '********** Saga No Voyage ************' echo '******************************************' echo '******************************************' python -u Saga_NoVoyage.py && source /tmp/SagaNoVoyage.properties echo '******************************************' echo '******************************************' echo '********** Order Cancelled ***********' echo '******************************************' echo '******************************************' python -u OrderCancellation.py echo '******************************************' echo '******************************************' echo '********* Container Anomaly **********' echo '******************************************' echo '******************************************' python -u ContainerAnomaly.py echo '****************************************************' echo '****************************************************' echo '********* Retry and Dead Letter Queue **********' echo '****************************************************' echo '****************************************************' python -u ContainerAnomalyDlq.py echo echo 'END RESULTS:' echo cat /tmp/results.txt echo "---------" echo "-- END --" echo "---------" env: # Event Streams Kafka brokers. You MUST create a configmap in advance with the brokers information: # oc create configmap kafka-brokers --from-literal=brokers='<replace with comma-separated list of brokers>' -n <namespace> # You can find the list of brokers either in the Event Streams UI or when you login through the CLI: cloudctl es init - name: KAFKA_BROKERS valueFrom: configMapKeyRef: name: "kafka-brokers" key: brokers # Your Event Streams credentials. You can find it in the Event Streams UI on the connect to this cluster link # You MUST create this secret in advance with the Event Streams username and password: # kubectl create secret generic eventstreams-cred --from-literal=username='<replace with kafka username>' --from-literal=password='<replace with kafka password>' - name: KAFKA_USER valueFrom: secretKeyRef: name: "kafka-credentials" key: username optional: true - name: KAFKA_PASSWORD valueFrom: secretKeyRef: name: "kafka-credentials" key: password optional: true # Location of your Event Streams pem certificate for ssl connections. You MUST download it in advance. # This can be downloaded from the Event Streams UI. - name: PEM_CERT value: "/tmp/certs/kafka-cert.pem" # TODO Documentation TBD - name: SASL_MECHANISM value: "PLAIN" # TODO Documentation TBD - name: SECURITY_PROTOCOL value: "SASL_SSL" # Your working directory within the container - name: WORKING_DIR value: "/tmp/github" # Github repository containing the integration tests to be executed - name: GITHUB_REPO value: "https://github.com/ibm-cloud-architecture/refarch-kc.git" # Specific branch for the integration tests - name: BRANCH value: "master" # Name of the repository - name: REPO_NAME value: "refarch-kc" # Location of the integration tests folder within the repository - name: ITGTESTS_LOCATION value: "itg-tests/es-it" # Order command microservice's service name - name: ORDER_CMD_MS value: "order-command-ms:9080" # Order query microservice's service name - name: ORDER_QUERY_MS value: "order-query-ms:9080" # Container microservice's service name - name: CONTAINER_SPRING_MS value: "spring-container-ms:8080" # Voyage microservice's service name - name: VOYAGE_MS value: "voyages-ms:3000" # Orders topic name - name: ITGTESTS_ORDERS_TOPIC #value: "itg-orders" valueFrom: configMapKeyRef: name: kafka-topics key: ordersTopic # Order Command topic name - name: ITGTESTS_ORDER_COMMANDS_TOPIC #value: "itg-order-commands" valueFrom: configMapKeyRef: name: kafka-topics key: orderCommandsTopic # Containers topic name - name: ITGTESTS_CONTAINERS_TOPIC #value: "itg-containers" valueFrom: configMapKeyRef: name: kafka-topics key: containersTopic # Container anomaly retry topic name - name: ITGTESTS_CONTAINER_ANOMALY_RETRY_TOPIC #value: "itg-container-anomaly-retry" valueFrom: configMapKeyRef: name: kafka-topics key: containerAnomalyRetryTopic # Container anomaly dead topic name - name: ITGTESTS_CONTAINER_ANOMALY_DEAD_TOPIC #value: "itg-container-anomaly-dead" valueFrom: configMapKeyRef: name: kafka-topics key: containerAnomalyDeadTopic # Location where the Event Streams pem certificate contained in the eventstreams-pem-file secret will be loaded to. volumeMounts: - mountPath: "/tmp/certs" name: eventstreams-pem-file volumes: # You MUST create this secret with the Event Streams pem certificate in advance. First, download the Event Streams pem certificate. # Then create the secret: oc create secret generic eventstreams-cert-pem --from-file=es-cert.pem=<LOCATION_OF_YOUR_EVENT_STREAMS_PEM_CERTIFICATE> -n <namespace> - name: eventstreams-pem-file secret: secretName: "kafka-truststore-pem" optional: true restartPolicy: Never backoffLimit: 0
44.501976
171
0.490008
7933d396501392b91e7b02da8485ea47757b032e
507
yaml
YAML
portal de noticias/portal-noticias-replicaset.yaml
lucas-silvs/Kubernetes_II_Alura
3ed5ff7cb4d0e21889e74d2cfef4a75c2cc3494d
[ "MIT" ]
null
null
null
portal de noticias/portal-noticias-replicaset.yaml
lucas-silvs/Kubernetes_II_Alura
3ed5ff7cb4d0e21889e74d2cfef4a75c2cc3494d
[ "MIT" ]
null
null
null
portal de noticias/portal-noticias-replicaset.yaml
lucas-silvs/Kubernetes_II_Alura
3ed5ff7cb4d0e21889e74d2cfef4a75c2cc3494d
[ "MIT" ]
null
null
null
apiVersion: apps/v1 kind: ReplicaSet metadata: name: portal-noticias-replicaset spec: template: metadata: name: portal-de-noticias labels: app: portal-noticias spec: containers: - name: portal-conainer image: aluracursos/portal-noticias:1 ports: - containerPort: 80 envFrom: - configMapRef: name: portal-configmap replicas: 3 selector: matchLabels: app: portal-noticias
20.28
46
0.581854
79340804b27aec4df08192c3022ec865a57a519f
688
yaml
YAML
infrastructure/jenkins/jenkins.yaml
9447-team-4/Soteria
810362686012b60dabc8a138837ad5f9aac44c09
[ "MIT" ]
null
null
null
infrastructure/jenkins/jenkins.yaml
9447-team-4/Soteria
810362686012b60dabc8a138837ad5f9aac44c09
[ "MIT" ]
5
2021-06-27T11:37:38.000Z
2021-07-05T10:29:34.000Z
infrastructure/jenkins/jenkins.yaml
9447-team-4/Soteria
810362686012b60dabc8a138837ad5f9aac44c09
[ "MIT" ]
null
null
null
apiVersion: apps/v1 kind: Deployment metadata: name: jenkins spec: replicas: 1 selector: matchLabels: app: jenkins template: metadata: labels: app: jenkins spec: securityContext: runAsUser: 0 fsGroup: 0 containers: - name: jenkins image: jenkins/jenkins:lts ports: - name: http-port containerPort: 8080 - name: jnlp-port containerPort: 50000 volumeMounts: - name: jenkins-storage mountPath: /var/jenkins_home volumes: - name: jenkins-storage persistentVolumeClaim: claimName: jenkins-pvc
20.848485
40
0.561047
79345cc3ebf1a1bba72ae63925e0b2836d3ba3ac
877
yaml
YAML
config/manager/manager.yaml
Davoska/cincinnati-operator
a3107f885a3290f10ae24147c27930bbc911f1a0
[ "Apache-2.0" ]
null
null
null
config/manager/manager.yaml
Davoska/cincinnati-operator
a3107f885a3290f10ae24147c27930bbc911f1a0
[ "Apache-2.0" ]
null
null
null
config/manager/manager.yaml
Davoska/cincinnati-operator
a3107f885a3290f10ae24147c27930bbc911f1a0
[ "Apache-2.0" ]
null
null
null
apiVersion: apps/v1 kind: Deployment metadata: name: updateservice-operator spec: replicas: 1 selector: matchLabels: name: updateservice-operator template: metadata: labels: name: updateservice-operator spec: serviceAccountName: updateservice-operator containers: - name: updateservice-operator image: controller:latest imagePullPolicy: Always env: - name: POD_NAME valueFrom: fieldRef: fieldPath: metadata.name - name: POD_NAMESPACE valueFrom: fieldRef: fieldPath: metadata.namespace - name: OPERATOR_NAME value: "updateservice-operator" - name: RELATED_IMAGE_OPERAND value: "quay.io/cincinnati/cincinnati:latest"
26.575758
59
0.575827
7934618e760fb288d3a3931b2bf0659b82ab3eee
199
yaml
YAML
manifests/medicines-api/base/service.yaml
uk-gov-mirror/MHRA.products
1628abd2086943c728668a1fd9dcbe134abece55
[ "MIT" ]
10
2019-12-06T15:35:07.000Z
2022-02-16T18:04:31.000Z
manifests/medicines-api/base/service.yaml
uk-gov-mirror/MHRA.products
1628abd2086943c728668a1fd9dcbe134abece55
[ "MIT" ]
567
2019-12-04T14:17:17.000Z
2022-02-17T20:47:59.000Z
manifests/medicines-api/base/service.yaml
uk-gov-mirror/MHRA.products
1628abd2086943c728668a1fd9dcbe134abece55
[ "MIT" ]
12
2019-12-10T14:59:57.000Z
2022-01-16T09:43:12.000Z
apiVersion: v1 kind: Service metadata: name: medicines-api labels: app: medicines-api spec: ports: - port: 80 targetPort: 8000 name: http selector: app: medicines-api
14.214286
22
0.643216
7934bb8e2ffe7d939acf61b5dedb7e4fc16981b3
254
yaml
YAML
prow/cluster/hook_service.yaml
jacob-delgado/test-infra
8289b92190e512792e0a4ee0ef9807934633d5df
[ "Apache-2.0" ]
61
2017-05-26T00:07:10.000Z
2021-09-23T13:06:42.000Z
prow/cluster/hook_service.yaml
jacob-delgado/test-infra
8289b92190e512792e0a4ee0ef9807934633d5df
[ "Apache-2.0" ]
3,300
2017-04-13T19:26:26.000Z
2022-03-31T22:02:45.000Z
prow/cluster/hook_service.yaml
jacob-delgado/test-infra
8289b92190e512792e0a4ee0ef9807934633d5df
[ "Apache-2.0" ]
171
2017-04-13T19:09:05.000Z
2022-03-28T13:12:20.000Z
apiVersion: v1 kind: Service metadata: labels: app: hook app.kubernetes.io/part-of: prow name: hook namespace: default spec: selector: app: hook ports: - name: main port: 8888 - name: metrics port: 9090 type: NodePort
14.111111
35
0.645669
7934bee0dbf7d776a876e1452bf0e21619732a6f
497
yaml
YAML
experimental/addons/kubeflow/resources/ClusterRole-206.yaml
jrkeen/catalog
750f329164816f0bdacfe8a39e5c9c9a93cf6c41
[ "Apache-2.0" ]
65
2020-05-27T03:36:33.000Z
2022-03-23T09:50:59.000Z
experimental/addons/kubeflow/resources/ClusterRole-206.yaml
jrkeen/catalog
750f329164816f0bdacfe8a39e5c9c9a93cf6c41
[ "Apache-2.0" ]
76
2020-05-29T09:14:26.000Z
2022-03-28T14:31:33.000Z
experimental/addons/kubeflow/resources/ClusterRole-206.yaml
jrkeen/catalog
750f329164816f0bdacfe8a39e5c9c9a93cf6c41
[ "Apache-2.0" ]
61
2020-05-26T03:19:48.000Z
2022-03-24T21:57:12.000Z
apiVersion: rbac.authorization.k8s.io/v1 kind: ClusterRole metadata: labels: app.kubernetes.io/component: knative-eventing app.kubernetes.io/name: knative-eventing eventing.knative.dev/release: v0.22.1 kustomize.component: knative rbac.authorization.k8s.io/aggregate-to-admin: "true" rbac.authorization.kubeflow.org/aggregate-to-kubeflow-admin: "true" name: knative-flows-namespaced-admin rules: - apiGroups: - flows.knative.dev resources: - '*' verbs: - '*'
26.157895
71
0.730382
7934dd01f92cac6959e74bd8cb52d3f0c90c2b02
1,008
yaml
YAML
docker/kubernetes/sawtooth-create-pbft-keys.yaml
RomarQ/sawtooth-core
b900f4f3a2ffda9f6fb32a57fd4eacc41be86e5a
[ "Apache-2.0" ]
1,530
2016-05-07T16:13:52.000Z
2022-03-30T04:32:48.000Z
docker/kubernetes/sawtooth-create-pbft-keys.yaml
RomarQ/sawtooth-core
b900f4f3a2ffda9f6fb32a57fd4eacc41be86e5a
[ "Apache-2.0" ]
906
2016-05-11T16:45:17.000Z
2022-01-27T19:24:21.000Z
docker/kubernetes/sawtooth-create-pbft-keys.yaml
RomarQ/sawtooth-core
b900f4f3a2ffda9f6fb32a57fd4eacc41be86e5a
[ "Apache-2.0" ]
891
2016-05-11T16:45:32.000Z
2022-03-20T07:25:46.000Z
# Copyright 2019 Cargill Incorporated # # Licensed under the Apache License, Version 2.0 (the License); # you may not use this file except in compliance with the License. # You may obtain a copy of the License at # # http://www.apache.org/licenses/LICENSE-2.0 # # Unless required by applicable law or agreed to in writing, software # distributed under the License is distributed on an AS IS BASIS, # WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. # See the License for the specific language governing permissions and # limitations under the License. apiVersion: batch/v1 kind: Job metadata: name: pbft-keys spec: template: spec: containers: - name: pbft-keys-generator image: hyperledger/sawtooth-shell command: - bash args: - -c - "for i in {0..4}; do sawadm keygen -q pbft${i}; done && cd /etc/sawtooth/keys/ && grep '' * | sed 's/\\.//' | sed 's/:/:\ /'" restartPolicy: Never backoffLimit: 4
31.5
137
0.670635
7934e02d99b1827d3256446e97c95c80381d56d9
757
yaml
YAML
nfs-server/nfs-server-rc.yaml
adlrocha/fabric-on-kubernetes
17574b75b32b992edad3c2ae442d50290af51af8
[ "Apache-2.0" ]
23
2018-04-25T07:42:06.000Z
2022-03-04T03:18:15.000Z
nfs-server/nfs-server-rc.yaml
fushui-Fang/fabric-on-kubernetes
17574b75b32b992edad3c2ae442d50290af51af8
[ "Apache-2.0" ]
3
2018-09-11T06:14:51.000Z
2021-04-28T13:55:43.000Z
nfs-server/nfs-server-rc.yaml
fushui-Fang/fabric-on-kubernetes
17574b75b32b992edad3c2ae442d50290af51af8
[ "Apache-2.0" ]
13
2018-06-15T00:54:28.000Z
2022-01-26T03:35:45.000Z
apiVersion: v1 kind: ReplicationController metadata: name: nfs-server spec: replicas: 1 selector: role: nfs-server template: metadata: labels: role: nfs-server spec: containers: - name: nfs-server image: gcr.io/google_containers/volume-nfs:0.8 ports: - name: nfs containerPort: 2049 - name: mountd containerPort: 20048 - name: rpcbind containerPort: 111 securityContext: privileged: true volumeMounts: - mountPath: /exports name: nfs-export-fast volumes: - name: nfs-export-fast persistentVolumeClaim: claimName: nfs-server-pvc-fast
22.939394
54
0.554822
79353be9fa011fd658d4a57999e1e362bf4c33b6
582
yaml
YAML
deploy/kubernetes/csi-config-map.yaml
antmoveh/carina
6b2df56d8fa16cb616a6c8f449b754690486df2e
[ "Apache-2.0" ]
267
2021-08-18T10:54:31.000Z
2022-03-31T17:00:41.000Z
deploy/kubernetes/csi-config-map.yaml
antmoveh/carina
6b2df56d8fa16cb616a6c8f449b754690486df2e
[ "Apache-2.0" ]
32
2021-08-20T09:37:52.000Z
2022-03-04T05:45:01.000Z
deploy/kubernetes/csi-config-map.yaml
antmoveh/carina
6b2df56d8fa16cb616a6c8f449b754690486df2e
[ "Apache-2.0" ]
32
2021-08-19T07:08:49.000Z
2022-03-17T14:48:19.000Z
--- apiVersion: v1 kind: ConfigMap metadata: name: carina-csi-config namespace: kube-system labels: class: carina data: config.json: |- { "diskSelector": [ { "name": "carina-vg-ssd" , "re": ["loop2+"], "policy": "LVM", "nodeLabel": "kubernetes.io/hostname" }, { "name": "carina-vg-hdd", "re": ["loop3+"], "policy": "LVM", "nodeLabel": "kubernetes.io/hostname" } ], "diskScanInterval": "300", "schedulerStrategy": "spreadout" }
20.785714
47
0.479381
7935798979dbaef9f0f45e99c46cd0ae51d57539
1,107
yaml
YAML
deployments/fpga_admissionwebhook/base/intel-fpga-webhook-deployment.yaml
todaywasawesome/intel-device-plugins-for-kubernetes
96d9e642e1ef053f1ac8092450288b8a54a42c3d
[ "Apache-2.0" ]
1
2020-08-03T05:28:26.000Z
2020-08-03T05:28:26.000Z
deployments/fpga_admissionwebhook/base/intel-fpga-webhook-deployment.yaml
morganyvm/intel-device-plugins-for-kubernetes
06f0aeb5ab4351c62aa3e4f36c654534dad00b6c
[ "Apache-2.0" ]
null
null
null
deployments/fpga_admissionwebhook/base/intel-fpga-webhook-deployment.yaml
morganyvm/intel-device-plugins-for-kubernetes
06f0aeb5ab4351c62aa3e4f36c654534dad00b6c
[ "Apache-2.0" ]
null
null
null
apiVersion: apps/v1 kind: Deployment metadata: name: intel-fpga-webhook-deployment labels: app: intel-fpga-webhook spec: replicas: 1 selector: matchLabels: app: intel-fpga-webhook template: metadata: labels: app: intel-fpga-webhook spec: containers: - name: fpga-mutator image: intel/intel-fpga-admissionwebhook:devel imagePullPolicy: IfNotPresent ports: - containerPort: 8443 name: webhook-api securityContext: runAsNonRoot: true runAsUser: 3210 runAsGroup: 3210 readOnlyRootFilesystem: true args: - -tls-cert-file=/etc/webhook/certs/cert.pem - -tls-private-key-file=/etc/webhook/certs/key.pem - -mode=preprogrammed - -v=1 volumeMounts: - name: webhook-certs mountPath: /etc/webhook/certs readOnly: true volumes: - name: webhook-certs secret: secretName: intel-fpga-webhook-certs
26.357143
62
0.559169
793585841cc54da568972aabc416562fe5eb3a33
654
yaml
YAML
install/0000_00_cluster-version-operator_00_namespace.yaml
mcoops/cluster-version-operator
bc972aafe17f22b0f7f9f6552a327196c77dddf8
[ "Apache-2.0" ]
null
null
null
install/0000_00_cluster-version-operator_00_namespace.yaml
mcoops/cluster-version-operator
bc972aafe17f22b0f7f9f6552a327196c77dddf8
[ "Apache-2.0" ]
null
null
null
install/0000_00_cluster-version-operator_00_namespace.yaml
mcoops/cluster-version-operator
bc972aafe17f22b0f7f9f6552a327196c77dddf8
[ "Apache-2.0" ]
null
null
null
apiVersion: v1 kind: Namespace metadata: name: openshift-cluster-version annotations: kubernetes.io/description: The cluster-version operator manages OpenShift updates and reconciles core resources and cluster operators. include.release.openshift.io/self-managed-high-availability: "true" openshift.io/node-selector: "" workload.openshift.io/allowed: "management" labels: name: openshift-cluster-version openshift.io/run-level: "1" openshift.io/cluster-monitoring: "true" pod-security.kubernetes.io/enforce: privileged pod-security.kubernetes.io/audit: privileged pod-security.kubernetes.io/warn: privileged
38.470588
138
0.767584
79359be0c2db51a67d3bb8bba5ee790e589df1f0
89
yaml
YAML
namespaces/ns-ip-pub.yaml
preinking/flux-quanby
f86202b987a565f6a8c44e00951270f6a01ed616
[ "Apache-2.0" ]
null
null
null
namespaces/ns-ip-pub.yaml
preinking/flux-quanby
f86202b987a565f6a8c44e00951270f6a01ed616
[ "Apache-2.0" ]
null
null
null
namespaces/ns-ip-pub.yaml
preinking/flux-quanby
f86202b987a565f6a8c44e00951270f6a01ed616
[ "Apache-2.0" ]
null
null
null
apiVersion: v1 kind: Namespace metadata: labels: name: ns-ip-pub name: ns-ip-pub
12.714286
19
0.685393
7935bef27cf703866bc12442c7cb1ceaee702e60
370
yaml
YAML
install/tekton-ing.yaml
gitcpu-io/install-jx-gitlab
933ca634bb7e3f7b26bf94a26bc9cc291d323478
[ "Apache-2.0" ]
null
null
null
install/tekton-ing.yaml
gitcpu-io/install-jx-gitlab
933ca634bb7e3f7b26bf94a26bc9cc291d323478
[ "Apache-2.0" ]
null
null
null
install/tekton-ing.yaml
gitcpu-io/install-jx-gitlab
933ca634bb7e3f7b26bf94a26bc9cc291d323478
[ "Apache-2.0" ]
null
null
null
apiVersion: networking.k8s.io/v1 kind: Ingress metadata: name: tekton-dashboard namespace: tekton-pipelines spec: rules: - host: tekton-jx.devopsman.io http: paths: - pathType: ImplementationSpecific backend: service: name: tekton-dashboard port: number: 9097
21.764706
44
0.559459
7936019261b64ef3e760a3c2049df769a45cd1d0
824
yaml
YAML
bins/challenges_qualifiers/NRFIN_00033/pov/cyborg-seeder.yaml
ucsb-seclab/hacrs-input-generator
7de089518541e3d0841622bcd3c950c7d83adc33
[ "BSD-2-Clause" ]
3
2019-12-20T02:04:42.000Z
2019-12-20T02:04:51.000Z
bins/challenges_qualifiers/NRFIN_00033/pov/cyborg-seeder.yaml
ucsb-seclab/hacrs-input-generator
7de089518541e3d0841622bcd3c950c7d83adc33
[ "BSD-2-Clause" ]
null
null
null
bins/challenges_qualifiers/NRFIN_00033/pov/cyborg-seeder.yaml
ucsb-seclab/hacrs-input-generator
7de089518541e3d0841622bcd3c950c7d83adc33
[ "BSD-2-Clause" ]
null
null
null
apiVersion: v1 kind: Pod metadata: name: cyborg-seeder-qualifiers-nrfin00033 labels: type: cyborg-seeder spec: # specification of the pod's contents restartPolicy: Never #OnFailure imagePullSecrets: - name: ucsbseclab-dockerhub volumes: - name: cyborg-results persistentVolumeClaim: claimName: cyborg-results containers: - name: cyborg-seeder-qualifiers-nrfin00033 stdin: true tty: true image: "zardus/research:cyborg-generator" command: ["/bin/bash", "-c", "python /home/angr/cyborg-generator/kubernetes_seeder.py qualifiers NRFIN_00033 3600 6"] imagePullPolicy: Always volumeMounts: - name: cyborg-results mountPath: "/results" resources: limits: cpu: 1 memory: 10Gi requests: cpu: 1 memory: 10Gi
20.6
121
0.67233
793606f8284e4c300e5b527b3fa0a05496c8fe96
279
yaml
YAML
postgres/templates/services.yaml
ruchir15/exercises
686d97a92a0ec0f0daa84f365920b53847cc02ab
[ "MIT" ]
null
null
null
postgres/templates/services.yaml
ruchir15/exercises
686d97a92a0ec0f0daa84f365920b53847cc02ab
[ "MIT" ]
3
2022-02-13T21:00:07.000Z
2022-02-27T10:43:26.000Z
postgres/templates/services.yaml
ruchir15/exercises
686d97a92a0ec0f0daa84f365920b53847cc02ab
[ "MIT" ]
null
null
null
apiVersion: v1 kind: Service metadata: name: 'postgres' labels: app: 'postgres' namespace: '{{ .Values.POSTGRES_NS }}' spec: type: ClusterIP ports: - port: 5432 targetPort: http-db # protocol: TCP name: port-12 selector: app: postgres
16.411765
40
0.616487
793686b6b4f440acce975c19317b6a2c63af6017
194
yaml
YAML
operator/pkg/helmreconciler/testdata/configmap-changed.yaml
kyoujuro/istio
29cc1d05ff4a7c77b21f6bd88003f6510bc25e36
[ "Apache-2.0" ]
43
2020-07-15T18:41:57.000Z
2022-03-31T08:23:38.000Z
operator/pkg/helmreconciler/testdata/configmap-changed.yaml
kyoujuro/istio
29cc1d05ff4a7c77b21f6bd88003f6510bc25e36
[ "Apache-2.0" ]
310
2020-06-23T10:25:49.000Z
2022-03-31T09:27:09.000Z
operator/pkg/helmreconciler/testdata/configmap-changed.yaml
kyoujuro/istio
29cc1d05ff4a7c77b21f6bd88003f6510bc25e36
[ "Apache-2.0" ]
55
2020-07-14T01:31:42.000Z
2022-03-29T07:51:33.000Z
apiVersion: v1 kind: ConfigMap metadata: name: config namespace: istio-system data: # Can't delete a field until we mandate >= Kube 1.16. See ApplyObject comments. field: two new: new
19.4
81
0.721649
7936c013c6c04537434f2850007858cc3635591a
354
yml
YAML
k8s_oom_events/cluster-role.yml
infwonder/kubernetes-course
9db9706ce15db4bf32ab36b3f18ed5b7f6dfdfe5
[ "MIT" ]
null
null
null
k8s_oom_events/cluster-role.yml
infwonder/kubernetes-course
9db9706ce15db4bf32ab36b3f18ed5b7f6dfdfe5
[ "MIT" ]
null
null
null
k8s_oom_events/cluster-role.yml
infwonder/kubernetes-course
9db9706ce15db4bf32ab36b3f18ed5b7f6dfdfe5
[ "MIT" ]
null
null
null
--- apiVersion: rbac.authorization.k8s.io/v1 kind: ClusterRole metadata: name: kubernetes-oom-event-generator rules: - apiGroups: - "" resources: - events - pods - pods/status verbs: - get - list - watch - apiGroups: - "" resources: - events verbs: - create - patch
14.75
40
0.531073
7936d0d37ce99db8bec04940e7222fad020e90eb
208
yaml
YAML
.github/tekton/shared-storage.yaml
kubesphere-sigs/ks-releaser
90a51c55d2681cb7f0f51120067ae95aa5976188
[ "Apache-2.0" ]
7
2021-11-07T12:07:13.000Z
2021-12-21T20:37:33.000Z
.github/tekton/shared-storage.yaml
kubesphere-sigs/ks-releaser
90a51c55d2681cb7f0f51120067ae95aa5976188
[ "Apache-2.0" ]
72
2021-11-01T13:21:37.000Z
2022-03-31T12:22:47.000Z
.github/tekton/shared-storage.yaml
kubesphere-sigs/ks-releaser
90a51c55d2681cb7f0f51120067ae95aa5976188
[ "Apache-2.0" ]
3
2021-11-03T02:45:02.000Z
2021-11-07T21:52:11.000Z
apiVersion: v1 kind: PersistentVolumeClaim metadata: name: ks-releaser-source-shared-storage spec: resources: requests: storage: 16Mi volumeMode: Filesystem accessModes: - ReadWriteOnce
17.333333
41
0.740385
793706f9496355d08a158c75c27eac729aa1e017
144
yaml
YAML
built-in-references/Kubernetes/perf/violations/violation1000.yaml
sw47/azure-policy
4a38e4cb4047b5364902653f0defe45f1b21bc61
[ "MIT" ]
null
null
null
built-in-references/Kubernetes/perf/violations/violation1000.yaml
sw47/azure-policy
4a38e4cb4047b5364902653f0defe45f1b21bc61
[ "MIT" ]
null
null
null
built-in-references/Kubernetes/perf/violations/violation1000.yaml
sw47/azure-policy
4a38e4cb4047b5364902653f0defe45f1b21bc61
[ "MIT" ]
null
null
null
apiVersion: v1 kind: Pod metadata: name: image-demo-1000 spec: containers: - name: nginx image: nginx #ritaacr.azurecr.io/nginx:latest
18
49
0.722222
79370761c778d7b39d7aca0440459cb64402a444
229
yaml
YAML
python/python-guestbook/src/backend/kubernetes-manifests/guestbook-mongodb.service.yaml
davidponder/cloud-code-samples
9d7f08e48fd8355c31ac428ff660a24bf1bef742
[ "0BSD" ]
319
2019-03-29T02:21:27.000Z
2022-03-12T00:03:32.000Z
python/python-guestbook/src/backend/kubernetes-manifests/guestbook-mongodb.service.yaml
davidponder/cloud-code-samples
9d7f08e48fd8355c31ac428ff660a24bf1bef742
[ "0BSD" ]
779
2019-03-29T16:53:09.000Z
2022-03-31T18:48:08.000Z
python/python-guestbook/src/backend/kubernetes-manifests/guestbook-mongodb.service.yaml
davidponder/cloud-code-samples
9d7f08e48fd8355c31ac428ff660a24bf1bef742
[ "0BSD" ]
182
2019-03-29T14:17:33.000Z
2022-03-14T22:31:12.000Z
apiVersion: v1 kind: Service metadata: name: python-guestbook-mongodb labels: app: python-guestbook tier: db spec: ports: - port: 27017 targetPort: 27017 selector: app: python-guestbook tier: db
15.266667
32
0.663755
793735bd2e9bd3eed7502c1d6afc8cec2d8d6940
491
yaml
YAML
kubeflow-deployments/private-blueprint/.build/kubeflow-apps/rbac.authorization.k8s.io_v1_role_ml-pipeline.yaml
jlewi/kubeflow-dev
5e5093e182a277e8518b1a8abcccb05d20466d35
[ "Apache-2.0" ]
5
2018-07-17T08:32:53.000Z
2020-12-11T01:26:06.000Z
kubeflow-deployments/private-blueprint/.build/kubeflow-apps/rbac.authorization.k8s.io_v1_role_ml-pipeline.yaml
jlewi/kubeflow-dev
5e5093e182a277e8518b1a8abcccb05d20466d35
[ "Apache-2.0" ]
16
2019-04-14T17:53:46.000Z
2022-03-02T09:58:52.000Z
kubeflow-deployments/private-blueprint/.build/kubeflow-apps/rbac.authorization.k8s.io_v1_role_ml-pipeline.yaml
jlewi/kubeflow-dev
5e5093e182a277e8518b1a8abcccb05d20466d35
[ "Apache-2.0" ]
10
2018-03-06T23:13:21.000Z
2020-06-26T06:50:10.000Z
apiVersion: rbac.authorization.k8s.io/v1 kind: Role metadata: name: ml-pipeline namespace: kubeflow labels: app: ml-pipeline rules: - resources: - pods apiGroups: - "" verbs: - get - list - delete - resources: - workflows apiGroups: - argoproj.io verbs: - create - get - list - watch - update - patch - delete - resources: - scheduledworkflows apiGroups: - kubeflow.org verbs: - create - get - list - update - patch - delete
12.275
40
0.619145
79378d5c82f690da044dc80916c63f2ca33935a0
259
yaml
YAML
yml/chpt19_promethus/5_prometheus-svc.yaml
Cerberus2077/k8s-ops
8534a0a9c0cc55725e35e26ce76a056c2ff27322
[ "MIT" ]
null
null
null
yml/chpt19_promethus/5_prometheus-svc.yaml
Cerberus2077/k8s-ops
8534a0a9c0cc55725e35e26ce76a056c2ff27322
[ "MIT" ]
null
null
null
yml/chpt19_promethus/5_prometheus-svc.yaml
Cerberus2077/k8s-ops
8534a0a9c0cc55725e35e26ce76a056c2ff27322
[ "MIT" ]
null
null
null
apiVersion: v1 kind: Service metadata: name: prometheus namespace: monitor-sa labels: app: prometheus spec: type: NodePort ports: - port: 9090 targetPort: 9090 protocol: TCP selector: app: prometheus component: server
14.388889
23
0.664093
79379f256a17e2cb1871b1867911832a7d99990a
494
yaml
YAML
kubernetes/post-tweet.yaml
AaronGrainer/gpt2-twitter-kubernetes
a33feb86231950dde5ee943bf5cfaf3915a23db2
[ "Apache-2.0" ]
3
2020-05-06T19:52:49.000Z
2020-08-16T18:51:52.000Z
kubernetes/post-tweet.yaml
AaronGrainer/gpt2-twitter-kubernetes
a33feb86231950dde5ee943bf5cfaf3915a23db2
[ "Apache-2.0" ]
19
2020-05-05T17:41:37.000Z
2021-05-27T14:22:58.000Z
kubernetes/post-tweet.yaml
AaronGrainer/gpt2-twitter-kubernetes
a33feb86231950dde5ee943bf5cfaf3915a23db2
[ "Apache-2.0" ]
null
null
null
apiVersion: batch/v1beta1 kind: CronJob metadata: name: gpt2-post-tweet namespace: gpt2-twitter labels: app: gpt2-twitter spec: schedule: "0 9 * * *" jobTemplate: spec: template: spec: restartPolicy: Never containers: - name: gpt2-post-tweet image: docker.io/aarongrainer/gpt2-post-tweet command: ["python", "-m", "src.scripts.post_tweets"] successfulJobsHistoryLimit: 3 failedJobsHistoryLimit: 1
23.52381
67
0.621457
7937cf13725631e7c71e713836d0cf8e50ff540c
112
yaml
YAML
deployments/ingress/namespace.yaml
valep27/kubernetes-tutorial
3bca9d4f6ea0b6415bb63fe605b2354ec23f8a23
[ "MIT" ]
2
2018-05-02T08:17:14.000Z
2018-05-02T08:17:54.000Z
deployments/ingress/namespace.yaml
valep27/kubernetes-tutorial
3bca9d4f6ea0b6415bb63fe605b2354ec23f8a23
[ "MIT" ]
null
null
null
deployments/ingress/namespace.yaml
valep27/kubernetes-tutorial
3bca9d4f6ea0b6415bb63fe605b2354ec23f8a23
[ "MIT" ]
null
null
null
# define a namespace for ingress-related elements apiVersion: v1 kind: Namespace metadata: name: ingress-nginx
22.4
49
0.803571
7938029f0dcf951a83127d54ad1081756b3efb16
117
yaml
YAML
clusters/staging/config-maps/cell-vars.yaml
zhirafovod/flux2-kustomize-helm-example
6fbd4e65dbaef2d58cc333d581ddb8bb3b024bd6
[ "Apache-2.0" ]
null
null
null
clusters/staging/config-maps/cell-vars.yaml
zhirafovod/flux2-kustomize-helm-example
6fbd4e65dbaef2d58cc333d581ddb8bb3b024bd6
[ "Apache-2.0" ]
null
null
null
clusters/staging/config-maps/cell-vars.yaml
zhirafovod/flux2-kustomize-helm-example
6fbd4e65dbaef2d58cc333d581ddb8bb3b024bd6
[ "Apache-2.0" ]
null
null
null
apiVersion: v1 kind: ConfigMap metadata: name: cell-vars namespace: flux-system data: some_hostname_var: "bar"
14.625
26
0.752137
793837a38800536f1381e204eb02a06a5bc3b40b
20,861
yaml
YAML
manifests/operatorconfiguration.crd.yaml
RossVertizan/postgres-operator
eac8f47859c857ad375e73d265d03bbf1480a9cc
[ "MIT" ]
null
null
null
manifests/operatorconfiguration.crd.yaml
RossVertizan/postgres-operator
eac8f47859c857ad375e73d265d03bbf1480a9cc
[ "MIT" ]
null
null
null
manifests/operatorconfiguration.crd.yaml
RossVertizan/postgres-operator
eac8f47859c857ad375e73d265d03bbf1480a9cc
[ "MIT" ]
null
null
null
apiVersion: apiextensions.k8s.io/v1 kind: CustomResourceDefinition metadata: name: operatorconfigurations.acid.zalan.do spec: group: acid.zalan.do names: kind: OperatorConfiguration listKind: OperatorConfigurationList plural: operatorconfigurations singular: operatorconfiguration shortNames: - opconfig categories: - all scope: Namespaced versions: - name: v1 served: true storage: true subresources: status: {} additionalPrinterColumns: - name: Image type: string description: Spilo image to be used for Pods jsonPath: .configuration.docker_image - name: Cluster-Label type: string description: Label for K8s resources created by operator jsonPath: .configuration.kubernetes.cluster_name_label - name: Service-Account type: string description: Name of service account to be used jsonPath: .configuration.kubernetes.pod_service_account_name - name: Min-Instances type: integer description: Minimum number of instances per Postgres cluster jsonPath: .configuration.min_instances - name: Age type: date jsonPath: .metadata.creationTimestamp schema: openAPIV3Schema: type: object required: - kind - apiVersion - configuration properties: kind: type: string enum: - OperatorConfiguration apiVersion: type: string enum: - acid.zalan.do/v1 configuration: type: object properties: docker_image: type: string default: "registry.opensource.zalan.do/acid/spilo-14:2.1-p2" enable_crd_validation: type: boolean default: true enable_lazy_spilo_upgrade: type: boolean default: false enable_pgversion_env_var: type: boolean default: true enable_shm_volume: type: boolean default: true enable_spilo_wal_path_compat: type: boolean default: false etcd_host: type: string default: "" kubernetes_use_configmaps: type: boolean default: false max_instances: type: integer minimum: -1 # -1 = disabled default: -1 min_instances: type: integer minimum: -1 # -1 = disabled default: -1 resync_period: type: string default: "30m" repair_period: type: string default: "5m" set_memory_request_to_limit: type: boolean default: false sidecar_docker_images: type: object additionalProperties: type: string sidecars: type: array nullable: true items: type: object x-kubernetes-preserve-unknown-fields: true workers: type: integer minimum: 1 default: 8 users: type: object properties: replication_username: type: string default: standby super_username: type: string default: postgres major_version_upgrade: type: object properties: major_version_upgrade_mode: type: string default: "off" minimal_major_version: type: string default: "9.6" target_major_version: type: string default: "14" kubernetes: type: object properties: additional_pod_capabilities: type: array items: type: string cluster_domain: type: string default: "cluster.local" cluster_labels: type: object additionalProperties: type: string default: application: spilo cluster_name_label: type: string default: "cluster-name" custom_pod_annotations: type: object additionalProperties: type: string delete_annotation_date_key: type: string delete_annotation_name_key: type: string downscaler_annotations: type: array items: type: string enable_init_containers: type: boolean default: true enable_pod_antiaffinity: type: boolean default: false enable_pod_disruption_budget: type: boolean default: true enable_sidecars: type: boolean default: true infrastructure_roles_secret_name: type: string infrastructure_roles_secrets: type: array nullable: true items: type: object required: - secretname - userkey - passwordkey properties: secretname: type: string userkey: type: string passwordkey: type: string rolekey: type: string defaultuservalue: type: string defaultrolevalue: type: string details: type: string template: type: boolean inherited_annotations: type: array items: type: string inherited_labels: type: array items: type: string master_pod_move_timeout: type: string default: "20m" node_readiness_label: type: object additionalProperties: type: string oauth_token_secret_name: type: string default: "postgresql-operator" pdb_name_format: type: string default: "postgres-{cluster}-pdb" pod_antiaffinity_topology_key: type: string default: "kubernetes.io/hostname" pod_environment_configmap: type: string pod_environment_secret: type: string pod_management_policy: type: string enum: - "ordered_ready" - "parallel" default: "ordered_ready" pod_priority_class_name: type: string pod_role_label: type: string default: "spilo-role" pod_service_account_definition: type: string default: "" pod_service_account_name: type: string default: "postgres-pod" pod_service_account_role_binding_definition: type: string default: "" pod_terminate_grace_period: type: string default: "5m" secret_name_template: type: string default: "{username}.{cluster}.credentials.{tprkind}.{tprgroup}" spilo_allow_privilege_escalation: type: boolean default: true spilo_runasuser: type: integer spilo_runasgroup: type: integer spilo_fsgroup: type: integer spilo_privileged: type: boolean default: false storage_resize_mode: type: string enum: - "ebs" - "pvc" - "off" default: "pvc" toleration: type: object additionalProperties: type: string watched_namespace: type: string postgres_pod_resources: type: object properties: default_cpu_limit: type: string pattern: '^(\d+m|\d+(\.\d{1,3})?)$' default: "1" default_cpu_request: type: string pattern: '^(\d+m|\d+(\.\d{1,3})?)$' default: "100m" default_memory_limit: type: string pattern: '^(\d+(e\d+)?|\d+(\.\d+)?(e\d+)?[EPTGMK]i?)$' default: "500Mi" default_memory_request: type: string pattern: '^(\d+(e\d+)?|\d+(\.\d+)?(e\d+)?[EPTGMK]i?)$' default: "100Mi" default_ephemeral_storage_limit: type: string pattern: '^(\d+(e\d+)?|\d+(\.\d+)?(e\d+)?[EPTGMK]i?)$' default: "1Gi" default_ephemeral_storage_request: type: string pattern: '^(\d+(e\d+)?|\d+(\.\d+)?(e\d+)?[EPTGMK]i?)$' default: "1Gi" min_cpu_limit: type: string pattern: '^(\d+m|\d+(\.\d{1,3})?)$' default: "250m" min_memory_limit: type: string pattern: '^(\d+(e\d+)?|\d+(\.\d+)?(e\d+)?[EPTGMK]i?)$' default: "250Mi" timeouts: type: object properties: pod_label_wait_timeout: type: string default: "10m" pod_deletion_wait_timeout: type: string default: "10m" ready_wait_interval: type: string default: "4s" ready_wait_timeout: type: string default: "30s" resource_check_interval: type: string default: "3s" resource_check_timeout: type: string default: "10m" load_balancer: type: object properties: custom_service_annotations: type: object additionalProperties: type: string db_hosted_zone: type: string default: "db.example.com" enable_master_load_balancer: type: boolean default: true enable_replica_load_balancer: type: boolean default: false external_traffic_policy: type: string enum: - "Cluster" - "Local" default: "Cluster" master_dns_name_format: type: string default: "{cluster}.{team}.{hostedzone}" replica_dns_name_format: type: string default: "{cluster}-repl.{team}.{hostedzone}" aws_or_gcp: type: object properties: additional_secret_mount: type: string additional_secret_mount_path: type: string default: "/meta/credentials" aws_region: type: string default: "eu-central-1" enable_ebs_gp3_migration: type: boolean default: false enable_ebs_gp3_migration_max_size: type: integer default: 1000 gcp_credentials: type: string kube_iam_role: type: string log_s3_bucket: type: string wal_az_storage_account: type: string wal_gs_bucket: type: string wal_s3_bucket: type: string logical_backup: type: object properties: logical_backup_docker_image: type: string default: "registry.opensource.zalan.do/acid/logical-backup:v1.7.0" logical_backup_google_application_credentials: type: string logical_backup_job_prefix: type: string default: "logical-backup-" logical_backup_provider: type: string default: "s3" logical_backup_s3_access_key_id: type: string logical_backup_s3_bucket: type: string logical_backup_s3_endpoint: type: string logical_backup_s3_region: type: string logical_backup_s3_secret_access_key: type: string logical_backup_s3_sse: type: string logical_backup_schedule: type: string pattern: '^(\d+|\*)(/\d+)?(\s+(\d+|\*)(/\d+)?){4}$' default: "30 00 * * *" debug: type: object properties: debug_logging: type: boolean default: true enable_database_access: type: boolean default: true teams_api: type: object properties: enable_admin_role_for_users: type: boolean default: true enable_postgres_team_crd: type: boolean default: true enable_postgres_team_crd_superusers: type: boolean default: false enable_team_member_deprecation: type: boolean default: false enable_team_superuser: type: boolean default: false enable_teams_api: type: boolean default: true pam_configuration: type: string default: "https://info.example.com/oauth2/tokeninfo?access_token= uid realm=/employees" pam_role_name: type: string default: "zalandos" postgres_superuser_teams: type: array items: type: string protected_role_names: type: array items: type: string default: - admin role_deletion_suffix: type: string default: "_deleted" team_admin_role: type: string default: "admin" team_api_role_configuration: type: object additionalProperties: type: string default: log_statement: all teams_api_url: type: string default: "https://teams.example.com/api/" logging_rest_api: type: object properties: api_port: type: integer default: 8080 cluster_history_entries: type: integer default: 1000 ring_log_lines: type: integer default: 100 scalyr: # deprecated type: object properties: scalyr_api_key: type: string scalyr_cpu_limit: type: string pattern: '^(\d+m|\d+(\.\d{1,3})?)$' default: "1" scalyr_cpu_request: type: string pattern: '^(\d+m|\d+(\.\d{1,3})?)$' default: "100m" scalyr_image: type: string scalyr_memory_limit: type: string pattern: '^(\d+(e\d+)?|\d+(\.\d+)?(e\d+)?[EPTGMK]i?)$' default: "500Mi" scalyr_memory_request: type: string pattern: '^(\d+(e\d+)?|\d+(\.\d+)?(e\d+)?[EPTGMK]i?)$' default: "50Mi" scalyr_server_url: type: string default: "https://upload.eu.scalyr.com" connection_pooler: type: object properties: connection_pooler_schema: type: string default: "pooler" connection_pooler_user: type: string default: "pooler" connection_pooler_image: type: string default: "registry.opensource.zalan.do/acid/pgbouncer:master-18" connection_pooler_max_db_connections: type: integer default: 60 connection_pooler_mode: type: string enum: - "session" - "transaction" default: "transaction" connection_pooler_number_of_instances: type: integer minimum: 1 default: 2 connection_pooler_default_cpu_limit: type: string pattern: '^(\d+m|\d+(\.\d{1,3})?)$' default: "1" connection_pooler_default_cpu_request: type: string pattern: '^(\d+m|\d+(\.\d{1,3})?)$' default: "500m" connection_pooler_default_memory_limit: type: string pattern: '^(\d+(e\d+)?|\d+(\.\d+)?(e\d+)?[EPTGMK]i?)$' default: "100Mi" connection_pooler_default_memory_request: type: string pattern: '^(\d+(e\d+)?|\d+(\.\d+)?(e\d+)?[EPTGMK]i?)$' default: "100Mi" status: type: object additionalProperties: type: string
36.28
107
0.407267
79388a31403111f6b79223859664f39206000ae2
412
yaml
YAML
config/rbac/azurestackhcimachine_viewer_role.yaml
nwoodmsft/cluster-api-provider-azurestackhci
d5671a29078ffd6201a8c08739a3e4a211e0593f
[ "Apache-2.0" ]
null
null
null
config/rbac/azurestackhcimachine_viewer_role.yaml
nwoodmsft/cluster-api-provider-azurestackhci
d5671a29078ffd6201a8c08739a3e4a211e0593f
[ "Apache-2.0" ]
null
null
null
config/rbac/azurestackhcimachine_viewer_role.yaml
nwoodmsft/cluster-api-provider-azurestackhci
d5671a29078ffd6201a8c08739a3e4a211e0593f
[ "Apache-2.0" ]
null
null
null
# permissions for end users to view azurestackhcimachines. apiVersion: rbac.authorization.k8s.io/v1 kind: ClusterRole metadata: name: azurestackhcimachine-viewer-role rules: - apiGroups: - infrastructure.cluster.x-k8s.io resources: - azurestackhcimachines verbs: - get - list - watch - apiGroups: - infrastructure.cluster.x-k8s.io resources: - azurestackhcimachines/status verbs: - get
19.619048
58
0.747573
79389215ddd6388afd5fbfec11187f1bf431bcda
172
yml
YAML
operator/serviceaccount.yml
kustomhippie/klum-operator
654fac3e152fd5dff1cb4e65334728395dca007d
[ "Apache-2.0" ]
null
null
null
operator/serviceaccount.yml
kustomhippie/klum-operator
654fac3e152fd5dff1cb4e65334728395dca007d
[ "Apache-2.0" ]
1
2021-10-20T05:07:03.000Z
2021-10-20T05:07:03.000Z
operator/serviceaccount.yml
kustomhippie/klum-operator
654fac3e152fd5dff1cb4e65334728395dca007d
[ "Apache-2.0" ]
null
null
null
--- apiVersion: v1 kind: ServiceAccount metadata: name: klum-operator labels: app.kubernetes.io/name: klum-operator app.kubernetes.io/component: operator ...
14.333333
41
0.715116
7938954466d8a9ca0e04babb20b3b99c4ed554b2
66
yaml
YAML
pipeline/rootsa.yaml
revit13/the-mesh-for-data
630fdb415d03ad2bc00099f156cde7b00cbeca82
[ "Apache-2.0" ]
32
2020-09-24T10:14:52.000Z
2021-05-13T15:58:11.000Z
pipeline/rootsa.yaml
revit13/the-mesh-for-data
630fdb415d03ad2bc00099f156cde7b00cbeca82
[ "Apache-2.0" ]
327
2020-09-22T08:23:35.000Z
2021-05-25T04:18:58.000Z
pipeline/rootsa.yaml
revit13/the-mesh-for-data
630fdb415d03ad2bc00099f156cde7b00cbeca82
[ "Apache-2.0" ]
29
2020-09-10T08:39:00.000Z
2021-05-24T17:17:31.000Z
--- apiVersion: v1 kind: ServiceAccount metadata: name: root-sa
11
20
0.727273
7938a9e2ea856ff2569a1f7f48d196b53e303c3d
590
yaml
YAML
hack/istio/prometheus-ingress.yaml
ScriptingShrimp/kiali
12d991191f8bc02b1c27040c78e940a8b65d8e3e
[ "Apache-2.0" ]
2,870
2018-03-26T11:31:51.000Z
2022-03-31T03:18:18.000Z
hack/istio/prometheus-ingress.yaml
ScriptingShrimp/kiali
12d991191f8bc02b1c27040c78e940a8b65d8e3e
[ "Apache-2.0" ]
3,669
2018-03-23T23:29:26.000Z
2022-03-31T20:02:18.000Z
hack/istio/prometheus-ingress.yaml
ScriptingShrimp/kiali
12d991191f8bc02b1c27040c78e940a8b65d8e3e
[ "Apache-2.0" ]
469
2018-03-23T20:12:54.000Z
2022-03-30T17:47:58.000Z
# Use this Ingress to access the Prometheus UI. # Example when on minikube: # kubectl apply -n istio-system -f prometheus-ingress.yaml # gio open http://$(minikube ip)/graph --- apiVersion: networking.k8s.io/v1 kind: Ingress metadata: name: prometheus annotations: nginx.ingress.kubernetes.io/backend-protocol: HTTP nginx.ingress.kubernetes.io/secure-backends: 'false' spec: rules: - http: paths: - path: / pathType: ImplementationSpecific backend: service: name: prometheus port: number: 9090
24.583333
60
0.645763
79392a5a633c40da3db7812018ac16d511df88c2
136
yaml
YAML
lessons/074/0-metrics-server/0-service-account.yaml
murasaki718/tutorials
ad55a1f34f2dc050a5ccbceae0c09def0626dccf
[ "MIT" ]
225
2020-12-12T03:41:46.000Z
2022-03-30T20:07:31.000Z
lessons/074/0-metrics-server/0-service-account.yaml
kevAnto/tutorials
9db76b5eeb6a54afabae6a4e386f155cc5dbc025
[ "MIT" ]
9
2021-09-18T12:36:23.000Z
2022-03-11T17:24:20.000Z
lessons/074/0-metrics-server/0-service-account.yaml
kevAnto/tutorials
9db76b5eeb6a54afabae6a4e386f155cc5dbc025
[ "MIT" ]
410
2020-12-24T03:34:33.000Z
2022-03-31T22:38:13.000Z
--- apiVersion: v1 kind: ServiceAccount metadata: labels: k8s-app: metrics-server name: metrics-server namespace: kube-system
15.111111
27
0.727941
7939d3f3886a718d2dbd252c1f99d31b871f10a5
818
yaml
YAML
bins/challenges_examples/NRFIN_00079/pov/cyborg-seeder.yaml
ucsb-seclab/hacrs-input-generator
7de089518541e3d0841622bcd3c950c7d83adc33
[ "BSD-2-Clause" ]
3
2019-12-20T02:04:42.000Z
2019-12-20T02:04:51.000Z
bins/challenges_examples/NRFIN_00079/pov/cyborg-seeder.yaml
ucsb-seclab/hacrs-input-generator
7de089518541e3d0841622bcd3c950c7d83adc33
[ "BSD-2-Clause" ]
null
null
null
bins/challenges_examples/NRFIN_00079/pov/cyborg-seeder.yaml
ucsb-seclab/hacrs-input-generator
7de089518541e3d0841622bcd3c950c7d83adc33
[ "BSD-2-Clause" ]
null
null
null
apiVersion: v1 kind: Pod metadata: name: cyborg-seeder-examples-nrfin00079 labels: type: cyborg-seeder spec: # specification of the pod's contents restartPolicy: Never #OnFailure imagePullSecrets: - name: ucsbseclab-dockerhub volumes: - name: cyborg-results persistentVolumeClaim: claimName: cyborg-results containers: - name: cyborg-seeder-examples-nrfin00079 stdin: true tty: true image: "zardus/research:cyborg-generator" command: ["/bin/bash", "-c", "python /home/angr/cyborg-generator/kubernetes_seeder.py examples NRFIN_00079 3600 6"] imagePullPolicy: Always volumeMounts: - name: cyborg-results mountPath: "/results" resources: limits: cpu: 1 memory: 10Gi requests: cpu: 1 memory: 10Gi
20.45
119
0.669927
7939e2d24ea6cf77b59808c538930b111845410f
2,135
yaml
YAML
mock-data/large-cluster/k8s/rbac.authorization.k8s.io:ClusterRole/system:controller:horizontal-pod-autoscaler.yaml
kubevious/logic-processor
f3b502fdd851fc955ddb00b39da589bbf05566e3
[ "Apache-2.0" ]
null
null
null
mock-data/large-cluster/k8s/rbac.authorization.k8s.io:ClusterRole/system:controller:horizontal-pod-autoscaler.yaml
kubevious/logic-processor
f3b502fdd851fc955ddb00b39da589bbf05566e3
[ "Apache-2.0" ]
null
null
null
mock-data/large-cluster/k8s/rbac.authorization.k8s.io:ClusterRole/system:controller:horizontal-pod-autoscaler.yaml
kubevious/logic-processor
f3b502fdd851fc955ddb00b39da589bbf05566e3
[ "Apache-2.0" ]
1
2022-01-16T20:19:54.000Z
2022-01-16T20:19:54.000Z
kind: ClusterRole apiVersion: rbac.authorization.k8s.io/v1 metadata: name: 'system:controller:horizontal-pod-autoscaler' selfLink: >- /apis/rbac.authorization.k8s.io/v1/clusterroles/system%3Acontroller%3Ahorizontal-pod-autoscaler uid: af73c719-3437-11ea-9cdc-42010a8001cf resourceVersion: '61446104' creationTimestamp: '2020-01-11T06:00:35Z' labels: kubernetes.io/bootstrapping: rbac-defaults annotations: rbac.authorization.kubernetes.io/autoupdate: 'true' rules: - verbs: - get - list - watch apiGroups: - autoscaling resources: - horizontalpodautoscalers - verbs: - update apiGroups: - autoscaling resources: - horizontalpodautoscalers/status - verbs: - get - update apiGroups: - '*' resources: - '*/scale' - verbs: - list apiGroups: - '' resources: - pods - verbs: - get apiGroups: - '' resources: - services/proxy resourceNames: - 'http:heapster:' - 'https:heapster:' - verbs: - list apiGroups: - metrics.k8s.io resources: - pods - verbs: - get - list apiGroups: - custom.metrics.k8s.io resources: - '*' - verbs: - create - patch - update apiGroups: - '' resources: - events - verbs: - create apiGroups: - events.k8s.io resources: - events - verbs: - patch apiGroups: - events.k8s.io resources: - events - verbs: - update apiGroups: - events.k8s.io resources: - events
20.931373
103
0.441686
7939e5bf0526bea640540b7202136558b9207597
212
yaml
YAML
kubernetes/service.yaml
hack19-istio/playerbackend
a8548c4bb07bc4d4aceaec7bd0de7a97597550fa
[ "MIT" ]
null
null
null
kubernetes/service.yaml
hack19-istio/playerbackend
a8548c4bb07bc4d4aceaec7bd0de7a97597550fa
[ "MIT" ]
1
2021-12-28T22:26:33.000Z
2021-12-28T22:26:48.000Z
kubernetes/service.yaml
AlexRogalskiy/playerbackend
a8548c4bb07bc4d4aceaec7bd0de7a97597550fa
[ "MIT" ]
2
2019-09-11T08:12:57.000Z
2021-12-28T22:26:17.000Z
apiVersion: v1 kind: Service metadata: namespace: hack-istio-player-backend name: player-backend spec: selector: app: player-backend ports: - protocol: TCP port: 8080 targetPort: 3000
16.307692
38
0.683962
793a9e0616afb7617b37d5dfe016f2954cc44f76
315
yaml
YAML
dist/entities/claim/queue.yaml
vicjicaman/microservice-auth-realm
2bb8d5356a9280b9b4d2f7a501de5b61b51270e7
[ "MIT" ]
null
null
null
dist/entities/claim/queue.yaml
vicjicaman/microservice-auth-realm
2bb8d5356a9280b9b4d2f7a501de5b61b51270e7
[ "MIT" ]
null
null
null
dist/entities/claim/queue.yaml
vicjicaman/microservice-auth-realm
2bb8d5356a9280b9b4d2f7a501de5b61b51270e7
[ "MIT" ]
null
null
null
apiVersion: v1 kind: PersistentVolumeClaim metadata: name: auth-queue-volume-claim namespace: 'repoflow-blog-namespace' spec: storageClassName: local-storage accessModes: - ReadWriteOnce resources: requests: storage: "100Mi" selector: matchLabels: service: "auth-queue-service"
18.529412
38
0.71746
793aaa0f655ee181b4733acfc927af6b61166ba9
1,312
yaml
YAML
proxy/kubernetes/proxy-deployment-crash-canary.yaml
weiminyu/nomulus
156344e40813a46209b7b50828ff3e4ede538f52
[ "Apache-2.0" ]
1,644
2016-10-18T15:05:43.000Z
2022-03-19T21:45:23.000Z
proxy/kubernetes/proxy-deployment-crash-canary.yaml
weiminyu/nomulus
156344e40813a46209b7b50828ff3e4ede538f52
[ "Apache-2.0" ]
332
2016-10-18T15:33:58.000Z
2022-03-30T12:48:37.000Z
proxy/kubernetes/proxy-deployment-crash-canary.yaml
weiminyu/nomulus
156344e40813a46209b7b50828ff3e4ede538f52
[ "Apache-2.0" ]
270
2016-10-18T14:56:43.000Z
2022-03-27T17:54:07.000Z
apiVersion: apps/v1 kind: Deployment metadata: namespace: default name: proxy-deployment-canary labels: app: proxy-canary spec: replicas: 3 selector: matchLabels: app: proxy-canary template: metadata: labels: app: proxy-canary spec: containers: - name: proxy-canary image: gcr.io/GCP_PROJECT/proxy ports: - containerPort: 30000 name: health-check - containerPort: 30001 name: whois - containerPort: 30002 name: epp - containerPort: 30010 name: http-whois - containerPort: 30011 name: https-whois readinessProbe: tcpSocket: port: health-check initialDelaySeconds: 5 periodSeconds: 10 livenessProbe: tcpSocket: port: health-check initialDelaySeconds: 15 periodSeconds: 20 imagePullPolicy: Always args: ["--env", "crash_canary", "--log"] env: - name: POD_ID valueFrom: fieldRef: fieldPath: metadata.name - name: NAMESPACE_ID valueFrom: fieldRef: fieldPath: metadata.namespace - name: CONTAINER_NAME value: proxy-canary
23.854545
48
0.550305
793aee79dd4b66a9e2afde2e8c0ca4e0af24da6d
1,564
yaml
YAML
manifests/function/flux/helm-controller/manager/deployment.yaml
kozhukalov/airshipctl
3bdde483feaedeb14c4af317b3590f1491d384c7
[ "Apache-2.0" ]
null
null
null
manifests/function/flux/helm-controller/manager/deployment.yaml
kozhukalov/airshipctl
3bdde483feaedeb14c4af317b3590f1491d384c7
[ "Apache-2.0" ]
null
null
null
manifests/function/flux/helm-controller/manager/deployment.yaml
kozhukalov/airshipctl
3bdde483feaedeb14c4af317b3590f1491d384c7
[ "Apache-2.0" ]
null
null
null
apiVersion: apps/v1 kind: Deployment metadata: labels: app.kubernetes.io/instance: flux-system app.kubernetes.io/version: v0.2.0 control-plane: controller name: helm-controller namespace: flux-system spec: replicas: 1 selector: matchLabels: app: helm-controller template: metadata: annotations: prometheus.io/port: "8080" prometheus.io/scrape: "true" labels: app: helm-controller spec: containers: - args: - --events-addr= - --watch-all-namespaces=true - --log-level=info - --log-json - --enable-leader-election env: - name: RUNTIME_NAMESPACE valueFrom: fieldRef: fieldPath: metadata.namespace image: ghcr.io/fluxcd/helm-controller:v0.1.3 imagePullPolicy: IfNotPresent livenessProbe: httpGet: path: /metrics port: http-prom name: manager ports: - containerPort: 8080 name: http-prom resources: limits: cpu: 1000m memory: 1Gi requests: cpu: 100m memory: 64Mi securityContext: allowPrivilegeEscalation: false readOnlyRootFilesystem: true volumeMounts: - mountPath: /tmp name: temp nodeSelector: kubernetes.io/arch: amd64 kubernetes.io/os: linux terminationGracePeriodSeconds: 10 volumes: - emptyDir: {} name: temp
24.061538
52
0.558824