hexsha
stringlengths 40
40
| size
int64 24
1.05M
| ext
stringclasses 2
values | lang
stringclasses 1
value | max_stars_repo_path
stringlengths 5
269
| max_stars_repo_name
stringlengths 7
107
| max_stars_repo_head_hexsha
stringlengths 40
78
| max_stars_repo_licenses
sequence | max_stars_count
int64 1
84.9k
⌀ | max_stars_repo_stars_event_min_datetime
stringlengths 24
24
⌀ | max_stars_repo_stars_event_max_datetime
stringlengths 24
24
⌀ | max_issues_repo_path
stringlengths 5
269
| max_issues_repo_name
stringlengths 7
107
| max_issues_repo_head_hexsha
stringlengths 40
78
| max_issues_repo_licenses
sequence | max_issues_count
int64 1
116k
⌀ | max_issues_repo_issues_event_min_datetime
stringlengths 24
24
⌀ | max_issues_repo_issues_event_max_datetime
stringlengths 24
24
⌀ | max_forks_repo_path
stringlengths 5
269
| max_forks_repo_name
stringlengths 7
107
| max_forks_repo_head_hexsha
stringlengths 40
78
| max_forks_repo_licenses
sequence | max_forks_count
int64 1
55.9k
⌀ | max_forks_repo_forks_event_min_datetime
stringlengths 24
24
⌀ | max_forks_repo_forks_event_max_datetime
stringlengths 24
24
⌀ | content
stringlengths 24
1.05M
| avg_line_length
float64 1
304k
| max_line_length
int64 14
1.03M
| alphanum_fraction
float64 0
1
|
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
f7fc926d65d04751060484045002fbded295fb95 | 867 | yaml | YAML | swe/swe-app-api-deploy.yaml | jeffrey-anderson/intro-to-kubernetes | c79b27aa09937b90ae99be05be806a16c250e63e | [
"MIT"
] | null | null | null | swe/swe-app-api-deploy.yaml | jeffrey-anderson/intro-to-kubernetes | c79b27aa09937b90ae99be05be806a16c250e63e | [
"MIT"
] | null | null | null | swe/swe-app-api-deploy.yaml | jeffrey-anderson/intro-to-kubernetes | c79b27aa09937b90ae99be05be806a16c250e63e | [
"MIT"
] | 1 | 2022-02-14T03:33:57.000Z | 2022-02-14T03:33:57.000Z | apiVersion: apps/v1
kind: Deployment
metadata:
name: swe-app-api
namespace: swe
spec:
selector:
matchLabels:
app: swe-app-api
replicas: 2
strategy:
type: Recreate
template:
metadata:
labels:
app: swe-app-api
spec:
containers:
- image: datadaddy/swe-api-k8s:0.1
imagePullPolicy: Always
name: swe-app-api
env:
- name: POSTGRES_PASSWORD
valueFrom:
secretKeyRef:
name: postgres-db-password
key: password
- name: POSTGRES_DB_URL
value: jdbc:postgresql://postgres.swe.svc.cluster.local:5432/postgres
resources:
requests:
memory: "64Mi"
cpu: "250m"
limits:
memory: "750Mi"
cpu: "500m"
ports:
- containerPort: 3000
| 22.230769 | 79 | 0.539792 |
f7fc95448d17460484cecbc87bcdb4de0672fe98 | 195 | yaml | YAML | sqlserver/Kubernetes_Service.yaml | mohamedmejri/AKS-Angular-AspnetCore-SQLServer | 32c8e25c2bc4f9569644d06c25bbce8b0c0f99af | [
"MIT"
] | 41 | 2018-09-17T13:19:34.000Z | 2022-03-01T10:52:12.000Z | sqlserver/Kubernetes_Service.yaml | mohamedmejri/AKS-Angular-AspnetCore-SQLServer | 32c8e25c2bc4f9569644d06c25bbce8b0c0f99af | [
"MIT"
] | null | null | null | sqlserver/Kubernetes_Service.yaml | mohamedmejri/AKS-Angular-AspnetCore-SQLServer | 32c8e25c2bc4f9569644d06c25bbce8b0c0f99af | [
"MIT"
] | 28 | 2018-09-17T23:50:51.000Z | 2022-03-29T01:14:50.000Z | apiVersion: v1
kind: Service
metadata:
name: mssql-sample-service
spec:
selector:
app: mssql-sample
ports:
- protocol: TCP
port: 1433
targetPort: 1433
type: ClusterIP | 16.25 | 28 | 0.666667 |
f7fcae8c43b4e202848d7a3fad802515db4c1033 | 752 | yaml | YAML | 02.ckad/ckad-prep/02.ckad/configmap/redis-configmap.yaml | cnb0/learning-cka.ckad | da576edc5ab1014d1a652d4db99451bb49519aab | [
"MIT"
] | 1 | 2021-11-29T01:36:45.000Z | 2021-11-29T01:36:45.000Z | 02.ckad/ckad-prep/02.ckad/configmap/redis-configmap.yaml | cnb0/learning-cka.ckad | da576edc5ab1014d1a652d4db99451bb49519aab | [
"MIT"
] | null | null | null | 02.ckad/ckad-prep/02.ckad/configmap/redis-configmap.yaml | cnb0/learning-cka.ckad | da576edc5ab1014d1a652d4db99451bb49519aab | [
"MIT"
] | 3 | 2021-11-28T14:40:19.000Z | 2022-01-23T02:21:28.000Z | apiVersion: v1
kind: Pod
metadata:
name: redis
spec:
containers:
- name: redis
image: kubernetes/redis:v1
env:
- name: MASTER
value: "true"
ports:
- containerPort: 6379
resources:
limits:
cpu: "0.1"
volumeMounts:
- mountPath: /redis-master-data
name: data
- mountPath: /redis-master
name: config
volumes:
- name: data
emptyDir: {}
- name: config
configMap:
name: example-redis-config
items:
- key: redis-config
path: redis.conf
# kubectl exec -it redis redis-cli
# 127.0.0.1:6379> CONFIG GET maxmemory
# 1) "maxmemory"
# 2) "2097152"
# 127.0.0.1:6379> CONFIG GET maxmemory-policy
# 1) "maxmemory-policy"
# 2) "allkeys-lru"
| 19.282051 | 47 | 0.595745 |
f7fd57cdf1475d41aebab9155412ae3d12ab9bd4 | 292 | yaml | YAML | docker-k8s-scripts/kubernetes/invalid.hpa-svr3.yaml | disidle/HelloGit | 8114b05b1640c78f1cc40a916f328ecaa6ab608e | [
"Apache-2.0"
] | null | null | null | docker-k8s-scripts/kubernetes/invalid.hpa-svr3.yaml | disidle/HelloGit | 8114b05b1640c78f1cc40a916f328ecaa6ab608e | [
"Apache-2.0"
] | null | null | null | docker-k8s-scripts/kubernetes/invalid.hpa-svr3.yaml | disidle/HelloGit | 8114b05b1640c78f1cc40a916f328ecaa6ab608e | [
"Apache-2.0"
] | null | null | null | apiVersion: autoscaling/v1
kind: HorizontalPodAutoscaler
metadata:
name: svr3-deployment
namespace: ns-demo
spec:
scaleTargetRef:
apiVersion: extensions/v1beta1
kind: Deployment
name: svr3-deployment
minReplicas: 1
maxReplicas: 10
targetCPUUtilizationPercentage: 40
| 18.25 | 36 | 0.770548 |
f7fd631e72750a9bc4e070cb62243b2c894b83ba | 433 | yml | YAML | manifests/deployment-8.yml | JysinTestOrg/hello-kubernetes | 4a400365fbe4c5913d6ea02ff15ee104b8868373 | [
"MIT"
] | null | null | null | manifests/deployment-8.yml | JysinTestOrg/hello-kubernetes | 4a400365fbe4c5913d6ea02ff15ee104b8868373 | [
"MIT"
] | null | null | null | manifests/deployment-8.yml | JysinTestOrg/hello-kubernetes | 4a400365fbe4c5913d6ea02ff15ee104b8868373 | [
"MIT"
] | 4 | 2020-12-31T05:17:59.000Z | 2021-03-25T14:34:22.000Z | apiVersion : apps/v1
kind: Deployment
metadata:
name: "jysinakscluster-dfd5"
spec:
replicas: 2
selector:
matchLabels:
app: "jysinakscluster-dfd5"
template:
metadata:
labels:
app: "jysinakscluster-dfd5"
spec:
containers:
- name: "jysinakscluster-dfd5"
image: "jysintestrigistry.azurecr.io/jysinakscluster"
ports:
- containerPort: 80 | 22.789474 | 64 | 0.605081 |
f7fd8cb288887baecddb509f41316d12c0365fc2 | 556 | yaml | YAML | e2e/testdata/live-apply/crd-and-cr/resources/crd.yaml | mark-dropbear/kpt | 6bae6f610258d7c6afd5323aa18aade4f9523861 | [
"Apache-2.0"
] | null | null | null | e2e/testdata/live-apply/crd-and-cr/resources/crd.yaml | mark-dropbear/kpt | 6bae6f610258d7c6afd5323aa18aade4f9523861 | [
"Apache-2.0"
] | null | null | null | e2e/testdata/live-apply/crd-and-cr/resources/crd.yaml | mark-dropbear/kpt | 6bae6f610258d7c6afd5323aa18aade4f9523861 | [
"Apache-2.0"
] | null | null | null | apiVersion: apiextensions.k8s.io/v1
kind: CustomResourceDefinition
metadata:
name: customs.kpt.dev
spec:
conversion:
strategy: None
group: kpt.dev
names:
kind: Custom
listKind: CustomList
plural: customs
singular: custom
scope: Cluster
versions:
- name: v1
schema:
openAPIV3Schema:
properties:
apiVersion:
type: string
kind:
type: string
metadata:
type: object
type: object
served: true
storage: true
subresources: {}
| 18.533333 | 35 | 0.597122 |
f7fddb53867544337ef425aa83cbf38ec6e2d4e5 | 538 | yaml | YAML | roles/kube_prometheus/files/kube-prometheus/node-exporter-service.yaml | intel/container-environment-setup | 8b0d383f4b64e413be1b70b7ba6905f8fcdb5e49 | [
"Apache-2.0"
] | null | null | null | roles/kube_prometheus/files/kube-prometheus/node-exporter-service.yaml | intel/container-environment-setup | 8b0d383f4b64e413be1b70b7ba6905f8fcdb5e49 | [
"Apache-2.0"
] | null | null | null | roles/kube_prometheus/files/kube-prometheus/node-exporter-service.yaml | intel/container-environment-setup | 8b0d383f4b64e413be1b70b7ba6905f8fcdb5e49 | [
"Apache-2.0"
] | null | null | null | # SPDX-License-Identifier: Apache-2.0
# Copyright(c) Copyright 2018 CoreOS, Inc
#
# Modifications copyright (C) 2020 Intel Corporation
apiVersion: v1
kind: Service
metadata:
labels:
app.kubernetes.io/component: exporter
app.kubernetes.io/name: node-exporter
app.kubernetes.io/part-of: kube-prometheus
app.kubernetes.io/version: 1.3.1
name: node-exporter
namespace: monitoring
spec:
clusterIP: None
ports:
- name: https
port: 9100
targetPort: https
selector:
app.kubernetes.io/name: node-exporter
| 23.391304 | 52 | 0.728625 |
f7fe21bc5e7bc2ccb2fb5cc653e45ce02bbe1bc7 | 298 | yaml | YAML | deploy-apps-clusters/deploy-ibmliberty.yaml | ranum/kube-samples | ecf831f4300afaa65b9f22128bf391a14676ed97 | [
"Apache-2.0"
] | 92 | 2018-01-03T08:12:21.000Z | 2022-03-06T09:42:57.000Z | deploy-apps-clusters/deploy-ibmliberty.yaml | ranum/kube-samples | ecf831f4300afaa65b9f22128bf391a14676ed97 | [
"Apache-2.0"
] | 35 | 2018-02-22T21:06:48.000Z | 2022-02-22T15:12:15.000Z | deploy-apps-clusters/deploy-ibmliberty.yaml | ranum/kube-samples | ecf831f4300afaa65b9f22128bf391a14676ed97 | [
"Apache-2.0"
] | 91 | 2018-01-04T16:36:50.000Z | 2022-03-24T00:07:15.000Z | apiVersion: apps/v1
kind: Deployment
metadata:
name: ibmliberty-deployment
spec:
replicas: 3
selector:
matchLabels:
app: ibmliberty
template:
metadata:
labels:
app: ibmliberty
spec:
containers:
- name: ibmliberty
image: icr.io/ibmliberty
| 16.555556 | 32 | 0.637584 |
f7fe51dff520bd852d9b27c78bf2538b0aef59a9 | 250 | yaml | YAML | jupyter/jupyter-web-app/base/cluster-role-binding.yaml | adamjm/manifests | 912d9d2af04de9cfc761113d1e5a44d6418ed0a8 | [
"Apache-2.0"
] | 9,272 | 2018-01-29T14:14:06.000Z | 2022-03-31T14:01:45.000Z | jupyter/jupyter-web-app/base/cluster-role-binding.yaml | adamjm/manifests | 912d9d2af04de9cfc761113d1e5a44d6418ed0a8 | [
"Apache-2.0"
] | 6,321 | 2018-01-29T14:00:15.000Z | 2022-03-31T21:21:07.000Z | jupyter/jupyter-web-app/base/cluster-role-binding.yaml | adamjm/manifests | 912d9d2af04de9cfc761113d1e5a44d6418ed0a8 | [
"Apache-2.0"
] | 1,909 | 2018-01-30T01:31:58.000Z | 2022-03-30T07:43:48.000Z | apiVersion: rbac.authorization.k8s.io/v1
kind: ClusterRoleBinding
metadata:
name: cluster-role-binding
roleRef:
apiGroup: rbac.authorization.k8s.io
kind: ClusterRole
name: cluster-role
subjects:
- kind: ServiceAccount
name: service-account
| 20.833333 | 40 | 0.788 |
f7fe64b901d0eed8b3ec9f681d3f9037d1a06e5e | 2,236 | yaml | YAML | dev/manifests/cluster-config/pod.validating.config.yaml | pahanik/test-task | 0a6c74d8dc6fdd77440d18f720b9b3da60617701 | [
"MIT"
] | null | null | null | dev/manifests/cluster-config/pod.validating.config.yaml | pahanik/test-task | 0a6c74d8dc6fdd77440d18f720b9b3da60617701 | [
"MIT"
] | null | null | null | dev/manifests/cluster-config/pod.validating.config.yaml | pahanik/test-task | 0a6c74d8dc6fdd77440d18f720b9b3da60617701 | [
"MIT"
] | null | null | null | apiVersion: admissionregistration.k8s.io/v1
kind: ValidatingWebhookConfiguration
metadata:
name: "simple-kubernetes-webhook.acme.com"
webhooks:
- name: "simple-kubernetes-webhook.acme.com"
namespaceSelector:
matchLabels:
admission-webhook: enabled
rules:
- apiGroups: [""]
apiVersions: ["v1"]
operations: ["CREATE", "UPDATE"]
resources: ["pods"]
scope: "*"
clientConfig:
service:
namespace: default
name: simple-kubernetes-webhook
path: /validate-pods
port: 443
caBundle: |
LS0tLS1CRUdJTiBDRVJUSUZJQ0FURS0tLS0tCk1JSUMzakNDQWNZQ0NRRFlHcU05a0ZZUjJqQU5CZ2tx
aGtpRzl3MEJBUXNGQURBeE1Rc3dDUVlEVlFRR0V3SkIKVlRFaU1DQUdBMVVFQXd3WmMybHRjR3hsTFd0
MVltVnlibVYwWlhNdGQyVmlhRzl2YXpBZUZ3MHlNVEV3TVRRdwpPREEyTkRCYUZ3MHlNakV3TVRRd09E
QTJOREJhTURFeEN6QUpCZ05WQkFZVEFrRlZNU0l3SUFZRFZRUUREQmx6CmFXMXdiR1V0YTNWaVpYSnVa
WFJsY3kxM1pXSm9iMjlyTUlJQklqQU5CZ2txaGtpRzl3MEJBUUVGQUFPQ0FROEEKTUlJQkNnS0NBUUVB
M1piR3NzSk9GZ2JkTlBDMUJjZVdaeGN4RDVoRkc0M0YxTXRwTXdzeDUrTFlJejQ3M0pPTgo0RGh6Snlr
V3huTVZEOEd4UElYYzNWUGNsVHp0V3dvdjdyOVo4dUxDRWdFakwyRWJFbjBKVzVTK2s2NkYwK0ZaCjI1
Y1lQNWVqMjVOd1Iwb3ZpbU9VZUpFelcyQktCT3ZGTTlPcmlhN0tkYkdRTWxRSkVFK3JMNXQxYWZmamhu
SVEKdk80MFZwblBFMkQvdmZzaTlEdmVyaTZFOFc2OWJxMEJ4NXRkZUZBalN1Q0FOWldLNjhjOEhIQ3Er
U3FjQ2ZaeAp5YVRmd09xQmsvYWkrMGE3a0RpUXRELzBiY0xyNkRnS3ZkckxRSmZveUlidHE1SklMamtu
U2VhNFJPazRMYS9xCmN3KytpNFZpVWtOS3pUSTVUWWV0c0NKWDFhZFdBMXYvQ3dJREFRQUJNQTBHQ1Nx
R1NJYjNEUUVCQ3dVQUE0SUIKQVFEWXMrNDRuWFc0STZLeSs2VGlGVjZveTErc3lMN2pFNlVONE1oM1JD
eWY4Y1Q0MEVBM3VEcTlZYjVmK3BySQpMbXZpd2RLbm1CbzhHR24zN1N1YWNtYmdMOUlxVlJUZ0hlSGZw
dElsblMwRklDNFVlM1hKOVRxSkNqbDBGbjgyCm9jK05FSytITjNkcldyMjMrdnZObnVlRzI4djhNenpD
V2JjZk9pd0I1TGQxZ0RDbEhIc2RhSHpJZFVjdkk1dGUKbFdzM3U0aXFyYkJDdWFUOWV6OUk5RTdqdHdr
R0hwVVpFV2tiNVhLcEt4SlNXQVRyWm5sTGRtTWxDb2FqM2grawpvbkNSd3R6L2d1aFc3dVJaWlQ4NGtE
MS9SWGo5d3VySE4zZ1NsVDAyVkhFeHpFUUoxM21aVS82V2p3dE05NWVmCmt6NzZiY2VoR05MU0hPU2lE
U1V5b0tBUQotLS0tLUVORCBDRVJUSUZJQ0FURS0tLS0tCg==
admissionReviewVersions: ["v1"]
sideEffects: None
timeoutSeconds: 2
| 50.818182 | 88 | 0.817531 |
f7fe74f2b01e505abf729d9044a54f612db94568 | 456 | yaml | YAML | staging-service.yaml | likhia/python-rest-service | 053e73e5bb97bf1b9822e47fcf4a8fe13ec85353 | [
"MIT"
] | null | null | null | staging-service.yaml | likhia/python-rest-service | 053e73e5bb97bf1b9822e47fcf4a8fe13ec85353 | [
"MIT"
] | null | null | null | staging-service.yaml | likhia/python-rest-service | 053e73e5bb97bf1b9822e47fcf4a8fe13ec85353 | [
"MIT"
] | null | null | null | kind: Service
apiVersion: v1
metadata:
name: python-rest-service
namespace: staging
labels:
app: python-rest-service
app.kubernetes.io/component: python-rest-service
app.kubernetes.io/instance: python-rest-service
annotations:
openshift.io/generated-by: OpenShiftNewApp
spec:
ports:
- name: 8080-tcp
protocol: TCP
port: 8080
targetPort: 8080
type: ClusterIP
selector:
deployment: python-rest-service
| 21.714286 | 52 | 0.710526 |
f7feaaaec302e4388e18d2b319d6110fd0174554 | 983 | yaml | YAML | jenkins/packaging-pod.yaml | mccobr/mobilecoin | cd7753a0aed838097b456d230151fb34e8cff034 | [
"Apache-2.0"
] | 140 | 2020-04-15T17:51:12.000Z | 2020-10-02T19:51:57.000Z | jenkins/packaging-pod.yaml | mccobr/mobilecoin | cd7753a0aed838097b456d230151fb34e8cff034 | [
"Apache-2.0"
] | 292 | 2020-10-22T00:34:35.000Z | 2022-03-29T09:29:14.000Z | jenkins/packaging-pod.yaml | mccobr/mobilecoin | cd7753a0aed838097b456d230151fb34e8cff034 | [
"Apache-2.0"
] | 32 | 2020-04-15T18:17:07.000Z | 2020-10-19T23:25:42.000Z | apiVersion: v1
kind: Pod
metadata:
labels:
build-pipeline-name: mobilecoin-build
spec:
nodeSelector:
builder-node: "true"
affinity:
podAntiAffinity:
preferredDuringSchedulingIgnoredDuringExecution:
- weight: 100
podAffinityTerm:
labelSelector:
matchExpressions:
- key: build-pipeline-name
operator: In
values:
- mobilecoin-build
topologyKey: "kubernetes.io/hostname"
containers:
- name: kaniko
# Need the debug container to get busybox
image: gcr.io/kaniko-project/executor:v1.6.0-debug
imagePullPolicy: Always
command:
- /busybox/cat
tty: true
volumeMounts:
- name: jenkins-docker-cfg
mountPath: /kaniko/.docker
volumes:
- name: jenkins-docker-cfg
secret:
secretName: docker-credentials
items:
- key: .dockerconfigjson
path: config.json
| 22.340909 | 56 | 0.600203 |
f7fecdb951ef3a0af94b776cec94bd7202449e9a | 144 | yaml | YAML | built-in-references/Kubernetes/perf/violations/violation7391.yaml | sw47/azure-policy | 4a38e4cb4047b5364902653f0defe45f1b21bc61 | [
"MIT"
] | null | null | null | built-in-references/Kubernetes/perf/violations/violation7391.yaml | sw47/azure-policy | 4a38e4cb4047b5364902653f0defe45f1b21bc61 | [
"MIT"
] | null | null | null | built-in-references/Kubernetes/perf/violations/violation7391.yaml | sw47/azure-policy | 4a38e4cb4047b5364902653f0defe45f1b21bc61 | [
"MIT"
] | null | null | null | apiVersion: v1
kind: Pod
metadata:
name: image-demo-7391
spec:
containers:
- name: nginx
image: nginx #ritaacr.azurecr.io/nginx:latest | 18 | 49 | 0.722222 |
f7feff091dff894023429e42c639832f602cdfcd | 92 | yaml | YAML | cluster/apps/awx/serviceaccount-awx-operator.yaml | sdigit/egnet-k3s | a8886e71c1cbf1632a6bccad4c9bef9bf31cc516 | [
"MIT"
] | null | null | null | cluster/apps/awx/serviceaccount-awx-operator.yaml | sdigit/egnet-k3s | a8886e71c1cbf1632a6bccad4c9bef9bf31cc516 | [
"MIT"
] | null | null | null | cluster/apps/awx/serviceaccount-awx-operator.yaml | sdigit/egnet-k3s | a8886e71c1cbf1632a6bccad4c9bef9bf31cc516 | [
"MIT"
] | null | null | null | apiVersion: v1
kind: ServiceAccount
metadata:
name: awx-operator
namespace: default
| 15.333333 | 22 | 0.75 |
f7ff199e00eea338fbd113970ed162d4d6101999 | 752 | yaml | YAML | kubeflow-deployments/private-blueprint/.build/kubeflow-apps/~g_v1_configmap_workflow-controller-parameters.yaml | jlewi/kubeflow-dev | 5e5093e182a277e8518b1a8abcccb05d20466d35 | [
"Apache-2.0"
] | 5 | 2018-07-17T08:32:53.000Z | 2020-12-11T01:26:06.000Z | kubeflow-deployments/private-blueprint/.build/kubeflow-apps/~g_v1_configmap_workflow-controller-parameters.yaml | jlewi/kubeflow-dev | 5e5093e182a277e8518b1a8abcccb05d20466d35 | [
"Apache-2.0"
] | 16 | 2019-04-14T17:53:46.000Z | 2022-03-02T09:58:52.000Z | kubeflow-deployments/private-blueprint/.build/kubeflow-apps/~g_v1_configmap_workflow-controller-parameters.yaml | jlewi/kubeflow-dev | 5e5093e182a277e8518b1a8abcccb05d20466d35 | [
"Apache-2.0"
] | 10 | 2018-03-06T23:13:21.000Z | 2020-06-26T06:50:10.000Z | apiVersion: v1
kind: ConfigMap
metadata:
name: workflow-controller-parameters
namespace: kubeflow
labels:
app.kubernetes.io/component: argo
app.kubernetes.io/name: argo
kustomize.component: argo
data:
namespace: ""
artifactRepositoryAccessKeySecretKey: accesskey
artifactRepositoryAccessKeySecretName: mlpipeline-minio-artifact
artifactRepositoryBucket: mlpipeline
artifactRepositoryEndpoint: minio-service.kubeflow:9000
artifactRepositoryInsecure: "true"
artifactRepositoryKeyPrefix: artifacts
artifactRepositorySecretKeySecretKey: secretkey
artifactRepositorySecretKeySecretName: mlpipeline-minio-artifact
clusterDomain: cluster.local
containerRuntimeExecutor: docker
executorImage: argoproj/argoexec:v2.3.0
| 32.695652 | 66 | 0.827128 |
f7ff1ccf047b4d855ded6f2df164df6e9d0e7821 | 297 | yaml | YAML | score/testdata/pod-ephemeral-storage-request-nomatch-limit.yaml | ryo-yamaoka/kube-score | 6e098da24bca875d760e7b522332118f27e17b69 | [
"MIT"
] | null | null | null | score/testdata/pod-ephemeral-storage-request-nomatch-limit.yaml | ryo-yamaoka/kube-score | 6e098da24bca875d760e7b522332118f27e17b69 | [
"MIT"
] | 1 | 2022-02-03T15:35:05.000Z | 2022-02-03T15:35:05.000Z | score/testdata/pod-ephemeral-storage-request-nomatch-limit.yaml | ryo-yamaoka/kube-score | 6e098da24bca875d760e7b522332118f27e17b69 | [
"MIT"
] | null | null | null | apiVersion: v1
kind: Pod
metadata:
name: pod-test-1
spec:
containers:
- name: foobar
image: foo/bar:123
resources:
limits:
cpu: 200m
memory: 1Gi
ephemeral-storage: 2Gi
requests:
cpu: 200m
memory: 1Gi
ephemeral-storage: 1Gi
| 16.5 | 30 | 0.572391 |
f7ff7fbf38b59ea8e71645fd4f93cd4d93050d5b | 370 | yaml | YAML | operators/flux/0.14.2/manifests/source-controller.service.yaml | eemcmullan/community-operators-prod | 781ce347284282f7f37d431df1fd035d7232c47b | [
"Apache-2.0"
] | 449 | 2019-01-08T21:21:22.000Z | 2022-03-30T02:23:33.000Z | operators/flux/0.14.2/manifests/source-controller.service.yaml | eemcmullan/community-operators-prod | 781ce347284282f7f37d431df1fd035d7232c47b | [
"Apache-2.0"
] | 2,828 | 2019-01-09T14:16:10.000Z | 2021-07-30T14:09:52.000Z | operators/flux/0.14.2/manifests/source-controller.service.yaml | eemcmullan/community-operators-prod | 781ce347284282f7f37d431df1fd035d7232c47b | [
"Apache-2.0"
] | 982 | 2019-01-08T22:05:07.000Z | 2022-03-21T21:31:51.000Z | apiVersion: v1
kind: Service
metadata:
labels:
app.kubernetes.io/instance: flux-system
app.kubernetes.io/part-of: flux
app.kubernetes.io/version: 0.14.2
control-plane: controller
name: source-controller
spec:
ports:
- name: http
port: 80
protocol: TCP
targetPort: http
selector:
app: source-controller
type: ClusterIP
| 19.473684 | 43 | 0.678378 |
f7ffa1cb37cdb3e625bfb6229e6834a875e58ed1 | 844 | yml | YAML | sample_k8s_cronjob.yml | tonytan4ever/docker_openstack_syntribos | 2003ea55c1993c45f4fcd3f479c95faf644aff51 | [
"MIT"
] | null | null | null | sample_k8s_cronjob.yml | tonytan4ever/docker_openstack_syntribos | 2003ea55c1993c45f4fcd3f479c95faf644aff51 | [
"MIT"
] | null | null | null | sample_k8s_cronjob.yml | tonytan4ever/docker_openstack_syntribos | 2003ea55c1993c45f4fcd3f479c95faf644aff51 | [
"MIT"
] | null | null | null | apiVersion: batch/v1beta1
kind: CronJob
metadata:
name: syntribos-cronjob
spec:
schedule: "*/1 * * * *"
jobTemplate:
spec:
template:
spec:
containers:
- name: daily-syntribos-cronjob
image: tonytan4ever/docker-openstack-syntribos:latest
env:
- name: config_file_location
value: /syntribos_tests_dir/syntribos_demo.conf
volumeMounts:
- mountPath: /syntribos_tests_dir
name: syntribos-test-volume
restartPolicy: OnFailure
volumes:
- name: syntribos-test-volume
hostPath:
# directory location on host
path: /Users/tonytan4ever/projects/Mine/syntribos_test
# this field is optional
type: Directory
| 30.142857 | 70 | 0.565166 |
f7ffd3975afe53f4171bec2109a290db97678394 | 308 | yaml | YAML | k8s/challenge123/shared/configmap.yaml | JuFranze/Lloyds_OH_container | ef2894425eb9e001de7318faff60dc6ad88af8f8 | [
"MIT"
] | 1 | 2020-09-09T15:40:59.000Z | 2020-09-09T15:40:59.000Z | k8s/challenge123/shared/configmap.yaml | JuFranze/Lloyds_OH_container | ef2894425eb9e001de7318faff60dc6ad88af8f8 | [
"MIT"
] | null | null | null | k8s/challenge123/shared/configmap.yaml | JuFranze/Lloyds_OH_container | ef2894425eb9e001de7318faff60dc6ad88af8f8 | [
"MIT"
] | 1 | 2020-09-11T21:32:57.000Z | 2020-09-11T21:32:57.000Z | apiVersion: v1
kind: ConfigMap
metadata:
name: tripviewer-config-map
namespace: tripviewer
data:
SQL_USER: "sqladminoOb9604"
SQL_PASSWORD: "kK5mx8Du0"
SQL_SERVER: "sqlserveroob9604.database.windows.net"
TRIPS_API_ENDPOINT: "http://trips"
USERPROFILE_API_ENDPOINT: "http://userprofile" | 28 | 54 | 0.756494 |
790010287d11161957bacca123be56a4f742098e | 2,882 | yaml | YAML | config-root/namespaces/jx/lighthouse/lighthouse-keeper-deploy.yaml | mk-tech-labs/jx-cluster-repo | c94cafe874d11a09d6ef66c9777f84a93ee1d33e | [
"Apache-2.0"
] | null | null | null | config-root/namespaces/jx/lighthouse/lighthouse-keeper-deploy.yaml | mk-tech-labs/jx-cluster-repo | c94cafe874d11a09d6ef66c9777f84a93ee1d33e | [
"Apache-2.0"
] | 1 | 2022-01-10T17:05:34.000Z | 2022-01-10T17:05:34.000Z | config-root/namespaces/jx/lighthouse/lighthouse-keeper-deploy.yaml | mk-tech-labs/jx-cluster-repo | c94cafe874d11a09d6ef66c9777f84a93ee1d33e | [
"Apache-2.0"
] | null | null | null | # Source: lighthouse/templates/keeper-deployment.yaml
apiVersion: apps/v1
kind: Deployment
metadata:
name: lighthouse-keeper
labels:
chart: "lighthouse-1.5.4"
app: lighthouse-keeper
gitops.jenkins-x.io/pipeline: 'namespaces'
annotations:
meta.helm.sh/release-name: 'lighthouse'
wave.pusher.com/update-on-config-change: 'true'
namespace: jx
spec:
replicas: 1
strategy:
type: RollingUpdate
rollingUpdate:
maxSurge: 1
maxUnavailable: 1
selector:
matchLabels:
app: lighthouse-keeper
template:
metadata:
annotations:
ad.datadoghq.com/keeper.logs: '[{"source":"lighthouse","service":"keeper"}]'
prometheus.io/port: "9090"
prometheus.io/scrape: "true"
jenkins-x.io/hash: '67c776bf82621e022317a40d90de6ff011c91691631856781119358c252609d4'
labels:
app: lighthouse-keeper
spec:
serviceAccountName: lighthouse-keeper
terminationGracePeriodSeconds: 30
containers:
- name: lighthouse-keeper
image: ghcr.io/jenkins-x/lighthouse-keeper:1.5.4
imagePullPolicy: IfNotPresent
args:
- "--namespace=jx"
ports:
- name: http
containerPort: 8888
protocol: TCP
livenessProbe:
httpGet:
path: /
port: http
initialDelaySeconds: 120
periodSeconds: 10
successThreshold: 1
timeoutSeconds: 1
readinessProbe:
httpGet:
path: /
port: http
periodSeconds: 10
successThreshold: 1
timeoutSeconds: 1
env:
- name: "GIT_KIND"
value: "github"
- name: "GIT_SERVER"
value: "https://github.com"
- name: "GIT_USER"
value: mk-gh-bot
- name: "GIT_TOKEN"
valueFrom:
secretKeyRef:
name: lighthouse-oauth-token
key: oauth
- name: "JX_LOG_FORMAT"
value: "stackdriver"
- name: "LOGRUS_FORMAT"
value: "stackdriver"
- name: LOGRUS_SERVICE
value: "lighthouse"
- name: LOGRUS_SERVICE_VERSION
value: "1.5.4"
- name: LOGRUS_STACK_SKIP
value: ""
- name: "LIGHTHOUSE_KEEPER_STATUS_CONTEXT_LABEL"
value: "Lighthouse Merge Status"
- name: LIGHTHOUSE_TRIGGER_ON_MISSING
value: "enable"
envFrom:
- secretRef:
name: jx-boot-job-env-vars
optional: true
resources:
limits:
cpu: 400m
memory: 512Mi
requests:
cpu: 100m
memory: 128Mi
| 29.408163 | 93 | 0.532963 |
790025b38b886940cc0140fc53f4db388f6fb285 | 366 | yaml | YAML | content/ja/examples/application/job/job-tmpl.yaml | austinbv/website | 944ab0d67da06385eb2d52c62a12372e2b4816b9 | [
"CC-BY-4.0"
] | 3,157 | 2017-10-18T13:28:53.000Z | 2022-03-31T06:41:57.000Z | content/ja/examples/application/job/job-tmpl.yaml | austinbv/website | 944ab0d67da06385eb2d52c62a12372e2b4816b9 | [
"CC-BY-4.0"
] | 27,074 | 2017-10-18T09:53:11.000Z | 2022-03-31T23:57:19.000Z | content/ja/examples/application/job/job-tmpl.yaml | austinbv/website | 944ab0d67da06385eb2d52c62a12372e2b4816b9 | [
"CC-BY-4.0"
] | 11,539 | 2017-10-18T15:54:11.000Z | 2022-03-31T12:51:54.000Z | apiVersion: batch/v1
kind: Job
metadata:
name: process-item-$ITEM
labels:
jobgroup: jobexample
spec:
template:
metadata:
name: jobexample
labels:
jobgroup: jobexample
spec:
containers:
- name: c
image: busybox
command: ["sh", "-c", "echo Processing item $ITEM && sleep 5"]
restartPolicy: Never
| 19.263158 | 70 | 0.601093 |
7900d738ca38bf992b8a757a8aad6cfbad21d1b1 | 226 | yaml | YAML | yaml-config-files/host-path-pv.yaml | cristofp/kubernetes-sphere-it-workshop | 639f89fe43cc7dac18872a432eaaa18ae4c252e4 | [
"MIT"
] | null | null | null | yaml-config-files/host-path-pv.yaml | cristofp/kubernetes-sphere-it-workshop | 639f89fe43cc7dac18872a432eaaa18ae4c252e4 | [
"MIT"
] | null | null | null | yaml-config-files/host-path-pv.yaml | cristofp/kubernetes-sphere-it-workshop | 639f89fe43cc7dac18872a432eaaa18ae4c252e4 | [
"MIT"
] | null | null | null | apiVersion: v1
kind: PersistentVolume
metadata:
name: host-path-pv
labels:
type: local
spec:
storageClassName: manual
capacity:
storage: 10Gi
accessModes:
- ReadWriteOnce
hostPath:
path: "/mnt/data" | 16.142857 | 26 | 0.69469 |
79011b03f1c39116cfed6b7b6bca865f3ae0d293 | 1,407 | yaml | YAML | example/rbac/prometheus-operator/prometheus-operator-deployment.yaml | erhudy/prometheus-operator | 56e89dfa0bac7a6b38a962059127992e64f69301 | [
"Apache-2.0"
] | 2 | 2022-02-26T06:31:34.000Z | 2022-02-26T06:31:36.000Z | example/rbac/prometheus-operator/prometheus-operator-deployment.yaml | erhudy/prometheus-operator | 56e89dfa0bac7a6b38a962059127992e64f69301 | [
"Apache-2.0"
] | 21 | 2022-01-20T07:19:39.000Z | 2022-03-25T07:24:25.000Z | example/rbac/prometheus-operator/prometheus-operator-deployment.yaml | erhudy/prometheus-operator | 56e89dfa0bac7a6b38a962059127992e64f69301 | [
"Apache-2.0"
] | 2 | 2022-02-02T20:38:20.000Z | 2022-02-03T14:50:27.000Z | apiVersion: apps/v1
kind: Deployment
metadata:
labels:
app.kubernetes.io/component: controller
app.kubernetes.io/name: prometheus-operator
app.kubernetes.io/version: 0.53.1
name: prometheus-operator
namespace: default
spec:
replicas: 1
selector:
matchLabels:
app.kubernetes.io/component: controller
app.kubernetes.io/name: prometheus-operator
template:
metadata:
annotations:
kubectl.kubernetes.io/default-container: prometheus-operator
labels:
app.kubernetes.io/component: controller
app.kubernetes.io/name: prometheus-operator
app.kubernetes.io/version: 0.53.1
spec:
containers:
- args:
- --kubelet-service=kube-system/kubelet
- --prometheus-config-reloader=quay.io/prometheus-operator/prometheus-config-reloader:v0.53.1
image: quay.io/prometheus-operator/prometheus-operator:v0.53.1
name: prometheus-operator
ports:
- containerPort: 8080
name: http
resources:
limits:
cpu: 200m
memory: 200Mi
requests:
cpu: 100m
memory: 100Mi
securityContext:
allowPrivilegeEscalation: false
nodeSelector:
kubernetes.io/os: linux
securityContext:
runAsNonRoot: true
runAsUser: 65534
serviceAccountName: prometheus-operator
| 28.714286 | 101 | 0.646766 |
7901257826bb3e8323818ea50680eff145d28ba3 | 1,492 | yaml | YAML | prow/cluster/monitoring/secrets/alertmanager-prow_secret.yaml | mdafsanhossain/test-infra | 06c857b1f187de3321e154d3011bba465f011013 | [
"Apache-2.0"
] | null | null | null | prow/cluster/monitoring/secrets/alertmanager-prow_secret.yaml | mdafsanhossain/test-infra | 06c857b1f187de3321e154d3011bba465f011013 | [
"Apache-2.0"
] | null | null | null | prow/cluster/monitoring/secrets/alertmanager-prow_secret.yaml | mdafsanhossain/test-infra | 06c857b1f187de3321e154d3011bba465f011013 | [
"Apache-2.0"
] | null | null | null | # Please replace '{{ smtp_app_username }}' and '{{ smtp_app_password }}' below with the URL of slack incoming hook
# before `kubectl apply -f`
apiVersion: v1
kind: Secret
metadata:
name: alertmanager-prow
namespace: prow-monitoring
stringData:
# TODO: send alerts to Slack instead.
# Reference: https://github.com/kubernetes/test-infra/blob/master/config/prow/cluster/monitoring/secrets/alertmanager-prow_secret.yaml
alertmanager.yaml: |
global:
resolve_timeout: 5m
smtp_smarthost: 'smtp.gmail.com:587'
smtp_auth_username: '{{ smtp_app_username }}'
smtp_auth_identity: '{{ smtp_app_username }}'
smtp_auth_password: '{{ smtp_app_password }}'
smtp_from: '{{ smtp_app_username }}'
smtp_require_tls: true
route:
group_by: ['alertname', 'job']
group_wait: 30s
group_interval: 10m
repeat_interval: 4h
receiver: 'no-op-alerts'
routes:
- receiver: 'email-alerts'
group_interval: 5m
repeat_interval: 2h
match_re:
severity: 'critical|high'
receivers:
- name: 'email-alerts'
email_configs:
- to: 'kn-infra-gcp-org-admins@knative.team'
text: '{{ template "custom_email_text" . }}'
headers:
subject: '[Knative prow] {{ template "email.default.subject" . }}'
- name: 'no-op-alerts'
templates:
- '*.tmpl'
msg.tmpl: |
{{ define "custom_email_text" }}{{ .CommonAnnotations.message }}{{ end }}
type: Opaque
| 31.083333 | 136 | 0.647453 |
790196df8d141b3a77f6292a2af5551635d96b40 | 284 | yaml | YAML | examples/v0.12/ubuntu_cluster_kubernetes_ceph/modules/kube/dash_rolebind.yaml | castleguarders/terraform-provider-libvirt | b8977e9feec20cbff0de33435f1426e0d62d6cd1 | [
"Apache-2.0"
] | null | null | null | examples/v0.12/ubuntu_cluster_kubernetes_ceph/modules/kube/dash_rolebind.yaml | castleguarders/terraform-provider-libvirt | b8977e9feec20cbff0de33435f1426e0d62d6cd1 | [
"Apache-2.0"
] | null | null | null | examples/v0.12/ubuntu_cluster_kubernetes_ceph/modules/kube/dash_rolebind.yaml | castleguarders/terraform-provider-libvirt | b8977e9feec20cbff0de33435f1426e0d62d6cd1 | [
"Apache-2.0"
] | null | null | null | apiVersion: rbac.authorization.k8s.io/v1
kind: ClusterRoleBinding
metadata:
name: admin-user
roleRef:
apiGroup: rbac.authorization.k8s.io
kind: ClusterRole
name: cluster-admin
subjects:
- kind: ServiceAccount
name: admin-user
namespace: kubernetes-dashboard
| 21.846154 | 40 | 0.746479 |
7901e9b2f1f947b19d145f72dd0c5adf28628a42 | 189 | yml | YAML | ch07/02/mysql-pvc.yml | LargeOrange/k8sAction | 4041543fd5c5f31996d6237f35468a59dbc9b156 | [
"MIT"
] | 43 | 2019-12-02T14:10:54.000Z | 2022-03-22T08:34:48.000Z | ch07/02/mysql-pvc.yml | LargeOrange/k8sAction | 4041543fd5c5f31996d6237f35468a59dbc9b156 | [
"MIT"
] | 1 | 2021-09-27T09:55:10.000Z | 2021-09-27T09:55:10.000Z | ch07/02/mysql-pvc.yml | LargeOrange/k8sAction | 4041543fd5c5f31996d6237f35468a59dbc9b156 | [
"MIT"
] | 42 | 2019-12-11T08:43:35.000Z | 2022-03-23T17:49:25.000Z | apiVersion: v1
kind: PersistentVolumeClaim
metadata:
name: mysql-pvc
spec:
storageClassName: standard
accessModes:
- ReadWriteOnce
resources:
requests:
storage: 250Mi
| 15.75 | 28 | 0.730159 |
7902360ed7c644e9bc47a1f84a4a1e67212c1592 | 263 | yml | YAML | docker-localstack/k8s/localstack-pv.yml | brijeshdhaker/docker-hadoop-cluster | 6a50d45c4fa81db7494ca670a6fdef73bd73d963 | [
"MIT"
] | null | null | null | docker-localstack/k8s/localstack-pv.yml | brijeshdhaker/docker-hadoop-cluster | 6a50d45c4fa81db7494ca670a6fdef73bd73d963 | [
"MIT"
] | null | null | null | docker-localstack/k8s/localstack-pv.yml | brijeshdhaker/docker-hadoop-cluster | 6a50d45c4fa81db7494ca670a6fdef73bd73d963 | [
"MIT"
] | null | null | null | #
---
#
apiVersion: v1
kind: PersistentVolume
metadata:
name: localstack-pvolume
namespace: localstack
spec:
storageClassName: manual
capacity:
storage: 10Gi
accessModes:
- ReadWriteOnce
- ReadWriteMany
hostPath:
path: "/apps/hostpath" | 15.470588 | 26 | 0.707224 |
79027198440efa617ffcb96e36ffc4d728b0bd76 | 451 | yml | YAML | assigment-3/kubernetes_files/deployments/product-price.yml | Ra0k/cloud-computing-course | 5661aa6b377fc9c898704e344d40ee5efd2908d0 | [
"Apache-2.0"
] | null | null | null | assigment-3/kubernetes_files/deployments/product-price.yml | Ra0k/cloud-computing-course | 5661aa6b377fc9c898704e344d40ee5efd2908d0 | [
"Apache-2.0"
] | null | null | null | assigment-3/kubernetes_files/deployments/product-price.yml | Ra0k/cloud-computing-course | 5661aa6b377fc9c898704e344d40ee5efd2908d0 | [
"Apache-2.0"
] | null | null | null | apiVersion: apps/v1
kind: Deployment
metadata:
name: product-price-service-deployment
labels:
app: product-price-service
spec:
replicas: 1
selector:
matchLabels:
app: product-price-service
template:
metadata:
labels:
app: product-price-service
spec:
containers:
- name: product-price-service
image: ra0k/microservice:productprice
ports:
- containerPort: 9003
| 20.5 | 47 | 0.640798 |
79028192b253dfaa89bb0dae05dd355671aa5662 | 928 | yaml | YAML | deploy/example/statefulset.yaml | manishgzp/blob-csi-driver-aks | 10c443e4b015dee709bd06ebc249fc787e7ab281 | [
"Apache-2.0"
] | null | null | null | deploy/example/statefulset.yaml | manishgzp/blob-csi-driver-aks | 10c443e4b015dee709bd06ebc249fc787e7ab281 | [
"Apache-2.0"
] | null | null | null | deploy/example/statefulset.yaml | manishgzp/blob-csi-driver-aks | 10c443e4b015dee709bd06ebc249fc787e7ab281 | [
"Apache-2.0"
] | null | null | null | ---
apiVersion: apps/v1
kind: StatefulSet
metadata:
name: statefulset-blobfuse
labels:
app: nginx
spec:
serviceName: statefulset-blobfuse
replicas: 1
template:
metadata:
labels:
app: nginx
spec:
containers:
- name: statefulset-blobfuse
image: nginx
command:
- "/bin/sh"
- "-c"
- while true; do echo $(date) >> /mnt/blobfuse/outfile; sleep 1; done
volumeMounts:
- name: persistent-storage
mountPath: /mnt/blobfuse
updateStrategy:
type: RollingUpdate
selector:
matchLabels:
app: nginx
volumeClaimTemplates:
- metadata:
name: persistent-storage
annotations:
volume.beta.kubernetes.io/storage-class: blobfuse.csi.azure.com
spec:
accessModes: ["ReadWriteOnce"]
resources:
requests:
storage: 100Gi
| 22.634146 | 81 | 0.578664 |
7902b739c143cd05dd6f2eb50e02ab77c9d83c40 | 1,420 | yaml | YAML | manifests/deployment.yaml | ezYakaEagle442/azch-captureorder | 44e993987ad3c1acee86cadde34b9620fbb693ab | [
"MIT"
] | null | null | null | manifests/deployment.yaml | ezYakaEagle442/azch-captureorder | 44e993987ad3c1acee86cadde34b9620fbb693ab | [
"MIT"
] | null | null | null | manifests/deployment.yaml | ezYakaEagle442/azch-captureorder | 44e993987ad3c1acee86cadde34b9620fbb693ab | [
"MIT"
] | null | null | null | apiVersion: apps/v1
kind: Deployment
metadata:
name: captureorder
spec:
selector:
matchLabels:
app: captureorder
replicas: 2
template:
metadata:
labels:
app: captureorder
spec:
containers:
- name: captureorder
image: ezyakaeagle442registry.azurecr.io/captureorder # replace with your own repository
imagePullPolicy: Always
readinessProbe:
httpGet:
port: 8080
path: /healthz
livenessProbe:
httpGet:
port: 8080
path: /healthz
resources:
requests:
memory: "64Mi"
cpu: "100m"
limits:
memory: "128Mi"
cpu: "500m"
env:
- name: TEAMNAME
value: 'placeholder' # will be patched at deployment time by value of 'teamName' in the variable group
- name: MONGOHOST
valueFrom:
secretKeyRef:
name: mongodb
key: mongoHost
- name: MONGOUSER
valueFrom:
secretKeyRef:
name: mongodb
key: mongoUser
- name: MONGOPASSWORD
valueFrom:
secretKeyRef:
name: mongodb
key: mongoPassword
ports:
- containerPort: 80
| 26.296296 | 114 | 0.490141 |
7903a6ec9690e17bd34ee329dd1a1c77ca48967e | 841 | yaml | YAML | roles/kubespray-phase/files/registry-pv.yaml | Vpsmaster-eu/NMaaS | 737dccfc9e6dcc7fa38cded9623b303732487cb4 | [
"Apache-2.0"
] | 16 | 2020-05-11T16:51:48.000Z | 2022-01-25T21:35:21.000Z | roles/kubespray-phase/files/registry-pv.yaml | Vpsmaster-eu/NMaaS | 737dccfc9e6dcc7fa38cded9623b303732487cb4 | [
"Apache-2.0"
] | 2 | 2021-04-09T21:13:01.000Z | 2021-07-21T19:46:59.000Z | roles/kubespray-phase/files/registry-pv.yaml | Orange-OpenSource/NMaaS | ad85ac1efd6deba8e264a14d3d87bdb5d9f168e6 | [
"Apache-2.0"
] | 6 | 2020-02-25T10:38:57.000Z | 2022-02-06T16:07:02.000Z | ---
# Copyright 2020 Orange
#
# Licensed under the Apache License, Version 2.0 (the "License");
# you may not use this file except in compliance with the License.
# You may obtain a copy of the License at
#
# http://www.apache.org/licenses/LICENSE-2.0
#
# Unless required by applicable law or agreed to in writing, software
# distributed under the License is distributed on an "AS IS" BASIS,
# WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
# See the License for the specific language governing permissions and
# limitations under the License.
apiVersion: v1
kind: PersistentVolume
metadata:
name: registry-pv-volume
labels:
type: local-storage
spec:
storageClassName: local-storage
capacity:
storage: 10Gi
accessModes:
- ReadWriteOnce
hostPath:
path: "/mnt/data"
| 27.129032 | 76 | 0.726516 |
7903c39c6467cd9e6b351ceee34153a7577cb9fe | 429 | yaml | YAML | content/zh/examples/pods/security/security-context.yaml | tamarabarbosa/website | 6b15373d6124f034efd4655a3134f3d0d343ab60 | [
"CC-BY-4.0"
] | 2 | 2022-01-30T01:59:42.000Z | 2022-02-24T01:04:00.000Z | content/zh/examples/pods/security/security-context.yaml | tamarabarbosa/website | 6b15373d6124f034efd4655a3134f3d0d343ab60 | [
"CC-BY-4.0"
] | null | null | null | content/zh/examples/pods/security/security-context.yaml | tamarabarbosa/website | 6b15373d6124f034efd4655a3134f3d0d343ab60 | [
"CC-BY-4.0"
] | 1 | 2022-02-20T17:06:08.000Z | 2022-02-20T17:06:08.000Z | apiVersion: v1
kind: Pod
metadata:
name: security-context-demo
spec:
securityContext:
runAsUser: 1000
runAsGroup: 3000
fsGroup: 2000
volumes:
- name: sec-ctx-vol
emptyDir: {}
containers:
- name: sec-ctx-demo
image: busybox:1.28
command: [ "sh", "-c", "sleep 1h" ]
volumeMounts:
- name: sec-ctx-vol
mountPath: /data/demo
securityContext:
allowPrivilegeEscalation: false
| 19.5 | 39 | 0.645688 |
79043b7c4405a589fea303daaf1a94732b58c247 | 242 | yaml | YAML | sandbox/k8s/redis/redis-service.yaml | AnkurBansalSF/loopback4-microservice-catalog | 88c87c5b5c80a2579e21b0574a5d2d4aac0a2540 | [
"MIT"
] | 264 | 2020-07-20T07:30:30.000Z | 2022-03-07T05:46:11.000Z | sandbox/k8s/redis/redis-service.yaml | AnkurBansalSF/loopback4-microservice-catalog | 88c87c5b5c80a2579e21b0574a5d2d4aac0a2540 | [
"MIT"
] | 601 | 2020-05-29T05:52:56.000Z | 2022-03-31T11:34:37.000Z | sandbox/k8s/redis/redis-service.yaml | AnkurBansalSF/loopback4-microservice-catalog | 88c87c5b5c80a2579e21b0574a5d2d4aac0a2540 | [
"MIT"
] | 45 | 2020-08-03T12:54:04.000Z | 2022-03-29T12:17:34.000Z | apiVersion: v1
kind: Service
metadata:
labels:
io.sourceloop.service: redis
name: redis
spec:
ports:
- name: "6379"
port: 6379
targetPort: 6379
selector:
io.sourceloop.service: redis
status:
loadBalancer: {}
| 15.125 | 32 | 0.657025 |
7904b49caca40759bb863c6cb1c51ab77b78f32c | 183 | yaml | YAML | bootstrap/trunk/sonarqube/sonar-pvc.yaml | DPD-30/devStack | 6afe5775f423ff0115e8f028a6efbc477f67f509 | [
"Apache-2.0"
] | null | null | null | bootstrap/trunk/sonarqube/sonar-pvc.yaml | DPD-30/devStack | 6afe5775f423ff0115e8f028a6efbc477f67f509 | [
"Apache-2.0"
] | null | null | null | bootstrap/trunk/sonarqube/sonar-pvc.yaml | DPD-30/devStack | 6afe5775f423ff0115e8f028a6efbc477f67f509 | [
"Apache-2.0"
] | null | null | null | apiVersion: v1
kind: PersistentVolumeClaim
metadata:
name: sonarpvc
spec:
accessModes:
- ReadWriteOnce
storageClassName: default
resources:
requests:
storage: 16Gi | 16.636364 | 27 | 0.743169 |
7904fb36569a49523560cd5ad6e68096887b4d19 | 8,009 | yaml | YAML | k8s/europe-west4/gen/tf-r2.3.2-bert-mnli-conv-v2-32.yaml | will-cromar/ml-testing-accelerators | 7d4837085931c97ee54e0df8f0a6ae5a47360dfc | [
"Apache-2.0"
] | null | null | null | k8s/europe-west4/gen/tf-r2.3.2-bert-mnli-conv-v2-32.yaml | will-cromar/ml-testing-accelerators | 7d4837085931c97ee54e0df8f0a6ae5a47360dfc | [
"Apache-2.0"
] | null | null | null | k8s/europe-west4/gen/tf-r2.3.2-bert-mnli-conv-v2-32.yaml | will-cromar/ml-testing-accelerators | 7d4837085931c97ee54e0df8f0a6ae5a47360dfc | [
"Apache-2.0"
] | null | null | null | # Copyright 2020 Google LLC
#
# Licensed under the Apache License, Version 2.0 (the "License");
# you may not use this file except in compliance with the License.
# You may obtain a copy of the License at
#
# https://www.apache.org/licenses/LICENSE-2.0
#
# Unless required by applicable law or agreed to in writing, software
# distributed under the License is distributed on an "AS IS" BASIS,
# WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
# See the License for the specific language governing permissions and
# limitations under the License.
"apiVersion": "batch/v1beta1"
"kind": "CronJob"
"metadata":
"labels":
"accelerator": "v2-32"
"benchmarkId": "tf-r2.3.2-bert-mnli-conv-v2-32"
"frameworkVersion": "tf-r2.3.2"
"mode": "conv"
"model": "bert-mnli"
"name": "tf-r2.3.2-bert-mnli-conv-v2-32"
"namespace": "automated"
"spec":
"concurrencyPolicy": "Forbid"
"jobTemplate":
"metadata":
"annotations":
"ml-testing-accelerators/gcs-subdir": "tf-r2.3.2/bert-mnli/conv/v2-32"
"ml-testing-accelerators/metric-config": |
{
"sources": [
{
"literals": {
"assertions": {
"duration": {
"inclusive_bounds": false,
"std_devs_from_mean": {
"comparison": "LESS",
"std_devs": 5
},
"wait_for_n_data_points": 10
}
}
}
},
{
"tensorboard": {
"aggregate_assertions": [
{
"assertion": {
"inclusive_bounds": true,
"std_devs_from_mean": {
"comparison": "GREATER",
"std_devs": 2
},
"wait_for_n_data_points": 0
},
"strategy": "AVERAGE",
"tag": "examples_per_second"
}
],
"exclude_tags": [
],
"include_tags": [
{
"strategies": [
"FINAL"
],
"tag_pattern": "*"
}
],
"merge_runs": false
}
}
]
}
"labels":
"accelerator": "v2-32"
"benchmarkId": "tf-r2.3.2-bert-mnli-conv-v2-32"
"frameworkVersion": "tf-r2.3.2"
"mode": "conv"
"model": "bert-mnli"
"spec":
"activeDeadlineSeconds": 36000
"backoffLimit": 1
"template":
"metadata":
"annotations":
"reserved.cloud-tpus.google.com": "false"
"tf-version.cloud-tpus.google.com": "2.3.2"
"spec":
"containers":
- "env":
- "name": "POD_NAME"
"valueFrom":
"fieldRef":
"fieldPath": "metadata.name"
- "name": "POD_NAMESPACE"
"valueFrom":
"fieldRef":
"fieldPath": "metadata.namespace"
"image": "gcr.io/xl-ml-test/health-monitor:stable"
"imagePullPolicy": "Always"
"name": "monitor"
- "args":
- "python3"
- "official/nlp/bert/run_classifier.py"
- "--tpu=$(KUBE_GOOGLE_CLOUD_TPU_ENDPOINTS)"
- "--steps_per_loop=1000"
- "--input_meta_data_path=$(BERT_CLASSIFICATION_DIR)/mnli_meta_data"
- "--train_data_path=$(BERT_CLASSIFICATION_DIR)/mnli_train.tf_record"
- "--eval_data_path=$(BERT_CLASSIFICATION_DIR)/mnli_eval.tf_record"
- "--bert_config_file=$(KERAS_BERT_DIR)/uncased_L-24_H-1024_A-16/bert_config.json"
- "--init_checkpoint=$(KERAS_BERT_DIR)/uncased_L-24_H-1024_A-16/bert_model.ckpt"
- "--learning_rate=3e-5"
- "--distribution_strategy=tpu"
- "--model_dir=$(MODEL_DIR)"
- "--train_batch_size=256"
- "--eval_batch_size=256"
- "--num_train_epochs=6"
"env":
- "name": "POD_NAME"
"valueFrom":
"fieldRef":
"fieldPath": "metadata.name"
- "name": "POD_UID"
"valueFrom":
"fieldRef":
"fieldPath": "metadata.uid"
- "name": "POD_NAMESPACE"
"valueFrom":
"fieldRef":
"fieldPath": "metadata.namespace"
- "name": "JOB_NAME"
"valueFrom":
"fieldRef":
"fieldPath": "metadata.labels['job-name']"
- "name": "MODEL_DIR"
"value": "$(OUTPUT_BUCKET)/tf-r2.3.2/bert-mnli/conv/v2-32/$(JOB_NAME)"
"envFrom":
- "configMapRef":
"name": "gcs-buckets"
"image": "gcr.io/xl-ml-test/tensorflow:r2.3.2"
"imagePullPolicy": "Always"
"name": "train"
"resources":
"limits":
"cloud-tpus.google.com/v2": 32
"requests":
"cpu": 2
"memory": "20G"
"volumeMounts":
- "mountPath": "/dev/shm"
"name": "dshm"
"readOnly": false
"initContainers":
- "env":
- "name": "POD_NAME"
"valueFrom":
"fieldRef":
"fieldPath": "metadata.name"
- "name": "POD_UID"
"valueFrom":
"fieldRef":
"fieldPath": "metadata.uid"
- "name": "POD_NAMESPACE"
"valueFrom":
"fieldRef":
"fieldPath": "metadata.namespace"
- "name": "JOB_NAME"
"valueFrom":
"fieldRef":
"fieldPath": "metadata.labels['job-name']"
- "name": "MODEL_DIR"
"value": "$(OUTPUT_BUCKET)/tf-r2.3.2/bert-mnli/conv/v2-32/$(JOB_NAME)"
- "name": "METRIC_CONFIG"
"value": |
{
"metric_collection_config": {
"default_aggregation_strategies": [
"final"
],
"metric_to_aggregation_strategies": {
"examples_per_second": [
"average"
]
},
"use_run_name_prefix": true,
"write_to_bigquery": true
},
"regression_test_config": {
"metric_success_conditions": {
"examples_per_second_average": {
"comparison": "greater_or_equal",
"success_threshold": {
"stddevs_from_mean": 2
}
},
"total_wall_time": {
"comparison": "less",
"success_threshold": {
"stddevs_from_mean": 5
},
"wait_for_n_points_of_history": 10
}
}
},
"test_name": "tf-r2.3.2-bert-mnli-conv-v2-32"
}
"envFrom":
- "configMapRef":
"name": "gcs-buckets"
"image": "gcr.io/xl-ml-test/publisher:stable"
"imagePullPolicy": "Always"
"name": "publisher"
"nodeSelector":
"tpu-available": "true"
"restartPolicy": "Never"
"volumes":
- "emptyDir":
"medium": "Memory"
"name": "dshm"
"schedule": "0 4 * * *"
"successfulJobsHistoryLimit": 1 | 35.127193 | 94 | 0.434261 |
79051231b9950a7001ae1a9c46b261a93bec4641 | 1,294 | yaml | YAML | kubeflow-deployments/private-blueprint/.build/kubeflow-apps/apps_v1_deployment_pytorch-operator.yaml | jlewi/kubeflow-dev | 5e5093e182a277e8518b1a8abcccb05d20466d35 | [
"Apache-2.0"
] | 5 | 2018-07-17T08:32:53.000Z | 2020-12-11T01:26:06.000Z | kubeflow-deployments/private-blueprint/.build/kubeflow-apps/apps_v1_deployment_pytorch-operator.yaml | jlewi/kubeflow-dev | 5e5093e182a277e8518b1a8abcccb05d20466d35 | [
"Apache-2.0"
] | 16 | 2019-04-14T17:53:46.000Z | 2022-03-02T09:58:52.000Z | kubeflow-deployments/private-blueprint/.build/kubeflow-apps/apps_v1_deployment_pytorch-operator.yaml | jlewi/kubeflow-dev | 5e5093e182a277e8518b1a8abcccb05d20466d35 | [
"Apache-2.0"
] | 10 | 2018-03-06T23:13:21.000Z | 2020-06-26T06:50:10.000Z | apiVersion: apps/v1
kind: Deployment
metadata:
name: pytorch-operator
namespace: kubeflow
labels:
app.kubernetes.io/component: pytorch
app.kubernetes.io/name: pytorch-operator
kustomize.component: pytorch-operator
spec:
replicas: 1
selector:
matchLabels:
name: pytorch-operator
app.kubernetes.io/component: pytorch
app.kubernetes.io/name: pytorch-operator
kustomize.component: pytorch-operator
template:
metadata:
labels:
name: pytorch-operator
app.kubernetes.io/component: pytorch
app.kubernetes.io/name: pytorch-operator
kustomize.component: pytorch-operator
annotations:
sidecar.istio.io/inject: "false"
spec:
serviceAccountName: pytorch-operator
containers:
- name: pytorch-operator
image: gcr.io/gcp-private-dev/mirror/gcr.io/kubeflow-images-public/pytorch-operator:vmaster-gd596e904
command:
- /pytorch-operator.v1
- --alsologtostderr
- -v=1
- --monitoring-port=8443
env:
- name: MY_POD_NAMESPACE
valueFrom:
fieldRef:
fieldPath: metadata.namespace
- name: MY_POD_NAME
valueFrom:
fieldRef:
fieldPath: metadata.name
| 28.130435 | 109 | 0.642195 |
79052148c1e4f2921af84e4964ab5a951b9c507a | 1,231 | yaml | YAML | kubernetes-volumes/minio-statefulset.yaml | otus-kuber-2021-12/Dweaty_platform | 1f594b4bc1ff2e9e5ce2b78989d804700aaff9a6 | [
"MIT"
] | null | null | null | kubernetes-volumes/minio-statefulset.yaml | otus-kuber-2021-12/Dweaty_platform | 1f594b4bc1ff2e9e5ce2b78989d804700aaff9a6 | [
"MIT"
] | 5 | 2022-01-16T15:25:46.000Z | 2022-02-08T05:20:34.000Z | kubernetes-volumes/minio-statefulset.yaml | otus-kuber-2021-12/Dweaty_platform | 1f594b4bc1ff2e9e5ce2b78989d804700aaff9a6 | [
"MIT"
] | null | null | null | apiVersion: apps/v1
kind: StatefulSet
metadata:
# This name uniquely identifies the StatefulSet
name: minio
spec:
serviceName: minio
replicas: 1
selector:
matchLabels:
app: minio # has to match .spec.template.metadata.labels
template:
metadata:
labels:
app: minio # has to match .spec.selector.matchLabels
spec:
containers:
- name: minio
env:
- name: MINIO_ACCESS_KEY
valueFrom:
secretKeyRef:
name: minio
key: username
- name: MINIO_SECRET_KEY
valueFrom:
secretKeyRef:
name: minio
key: password
image: minio/minio:RELEASE.2019-07-10T00-34-56Z
args:
- server
- /data
ports:
- containerPort: 9000
volumeMounts:
- name: data
mountPath: /data
livenessProbe:
httpGet:
path: /minio/health/live
port: 9000
initialDelaySeconds: 120
periodSeconds: 20
volumeClaimTemplates:
- metadata:
name: data
spec:
accessModes:
- ReadWriteOnce
resources:
requests:
storage: 10Gi | 23.226415 | 62 | 0.547522 |
7905468d0f07a471f0d42099b0adb9a8c7ecb59b | 569 | yaml | YAML | kubernetes/ui/deployment.yaml | target/consensource | cf21e3e7ef69d8de34c91cee4e2c3e49a63ce1c0 | [
"ECL-2.0",
"Apache-2.0",
"MIT"
] | 90 | 2019-04-17T16:09:51.000Z | 2022-02-15T10:33:59.000Z | kubernetes/ui/deployment.yaml | target/consensource | cf21e3e7ef69d8de34c91cee4e2c3e49a63ce1c0 | [
"ECL-2.0",
"Apache-2.0",
"MIT"
] | 32 | 2019-04-08T15:53:20.000Z | 2021-01-26T16:09:58.000Z | kubernetes/ui/deployment.yaml | target/consensource | cf21e3e7ef69d8de34c91cee4e2c3e49a63ce1c0 | [
"ECL-2.0",
"Apache-2.0",
"MIT"
] | 23 | 2019-04-08T18:25:57.000Z | 2022-01-31T12:16:15.000Z | apiVersion: apps/v1
kind: Deployment
metadata:
name: ui
spec:
replicas: 1
revisionHistoryLimit: 2
selector:
matchLabels:
app: ui
template:
metadata:
labels:
app: ui
spec:
containers:
- name: ui
image: target/consensource-ui:latest
imagePullPolicy: Always
resources:
limits:
cpu: 50m
memory: 100Mi
requests:
cpu: 20m
memory: 50Mi
ports:
- name: http
containerPort: 80
| 18.966667 | 46 | 0.500879 |
79056608ce95c1499fd0e98426327b3061391941 | 1,071 | yaml | YAML | templates/configmap.yaml | zakaria2905/helm-k6 | 5ac5e32bc16b464227cbdeff552f9816f088a0b8 | [
"Apache-1.1"
] | null | null | null | templates/configmap.yaml | zakaria2905/helm-k6 | 5ac5e32bc16b464227cbdeff552f9816f088a0b8 | [
"Apache-1.1"
] | null | null | null | templates/configmap.yaml | zakaria2905/helm-k6 | 5ac5e32bc16b464227cbdeff552f9816f088a0b8 | [
"Apache-1.1"
] | null | null | null | apiVersion: v1
kind: ConfigMap
metadata:
name: k6-scripts
data:
nginx-test.js: |
import http, { FileData } from 'k6/http';
import { check } from 'k6';
import { FormData } from 'https://jslib.k6.io/formdata/0.0.2/index.js';
export const options = {
discardResponseBodies: true,
scenarios: {
contacts: {
executor: 'per-vu-iterations',
vus: 1,
iterations: 100,
maxDuration: '10s',
},
},
};
const binFile = open('/data/pda765_2019-10-30_02.16.11.txt.gz','b');
export default function () {
const responses = http.post('http://10.129.3.14:31485/contentListener', binFile
);
check(responses, { 'is status 200': (r) => r.status === 200, });
}
/*export default function () {
const payload = JSON.stringify({
email: 'aaa',
password: 'bbb',
});
const responses = http.post('http://loalhost:8888/contentListener', payload);
check(responses, { 'is status 200': (r) => r.status === 200, });
}*/ | 24.340909 | 86 | 0.557423 |
7905a3095bcb650028bc74de68e37cbd939057f4 | 1,639 | yaml | YAML | config/core/configmaps/default-pingsource.yaml | psschwei/eventing | 0310bf9c1c23ca0a553a02d116fe46db22c19cb4 | [
"Apache-2.0"
] | 1,139 | 2018-07-23T21:00:21.000Z | 2022-03-29T09:05:27.000Z | config/core/configmaps/default-pingsource.yaml | psschwei/eventing | 0310bf9c1c23ca0a553a02d116fe46db22c19cb4 | [
"Apache-2.0"
] | 6,023 | 2018-07-23T20:33:03.000Z | 2022-03-31T21:56:10.000Z | config/core/configmaps/default-pingsource.yaml | psschwei/eventing | 0310bf9c1c23ca0a553a02d116fe46db22c19cb4 | [
"Apache-2.0"
] | 501 | 2018-07-23T20:38:56.000Z | 2022-03-30T20:02:39.000Z | # Copyright 2020 The Knative Authors
#
# Licensed under the Apache License, Version 2.0 (the "License");
# you may not use this file except in compliance with the License.
# You may obtain a copy of the License at
#
# https://www.apache.org/licenses/LICENSE-2.0
#
# Unless required by applicable law or agreed to in writing, software
# distributed under the License is distributed on an "AS IS" BASIS,
# WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
# See the License for the specific language governing permissions and
# limitations under the License.
apiVersion: v1
kind: ConfigMap
metadata:
name: config-ping-defaults
namespace: knative-eventing
labels:
eventing.knative.dev/release: devel
annotations:
knative.dev/example-checksum: "9185c153"
app.kubernetes.io/version: devel
app.kubernetes.io/name: knative-eventing
data:
_example: |
################################
# #
# EXAMPLE CONFIGURATION #
# #
################################
# This block is not actually functional configuration,
# but serves to illustrate the available configuration
# options and document them in a way that is accessible
# to users that `kubectl edit` this config map.
#
# These sample configuration options may be copied out of
# this example block and unindented to be in the data block
# to actually change the configuration.
# Max number of bytes allowed to be sent for message excluding any
# base64 decoding. Default is no limit set for data
data-max-size: -1
| 35.630435 | 74 | 0.671141 |
7905bcefda827bf478accc98a6ef761c91dfad10 | 951 | yaml | YAML | part2/2.03/manifests/deployment.yaml | YouqinS/DevOpsWithKubernetesHUMSCS | a71acf1ee5f296df27d60ed6cf56bb7794df58c4 | [
"MIT"
] | null | null | null | part2/2.03/manifests/deployment.yaml | YouqinS/DevOpsWithKubernetesHUMSCS | a71acf1ee5f296df27d60ed6cf56bb7794df58c4 | [
"MIT"
] | null | null | null | part2/2.03/manifests/deployment.yaml | YouqinS/DevOpsWithKubernetesHUMSCS | a71acf1ee5f296df27d60ed6cf56bb7794df58c4 | [
"MIT"
] | null | null | null | apiVersion: apps/v1
kind: Deployment
metadata:
labels:
app: hashgenerator
name: hashgenerator
namespace: other-app-ns
spec:
progressDeadlineSeconds: 600
replicas: 1
revisionHistoryLimit: 10
selector:
matchLabels:
app: hashgenerator
strategy:
rollingUpdate:
maxSurge: 25%
maxUnavailable: 25%
type: RollingUpdate
template:
metadata:
labels:
app: hashgenerator
spec:
containers:
- image: lnsth/logoutput:exercise_2.03
imagePullPolicy: Always
name: logoutput
resources: {}
terminationMessagePath: /dev/termination-log
terminationMessagePolicy: File
- name: pingpong
image: lnsth/pingpong:exercise_2.03
imagePullPolicy: Always
dnsPolicy: ClusterFirst
restartPolicy: Always
schedulerName: default-scheduler
securityContext: {}
terminationGracePeriodSeconds: 30
| 23.775 | 54 | 0.659306 |
7905d90a0e0e7f0a81e2839208b3a50acbb54618 | 237 | yaml | YAML | manifests/0000_90_ingress-operator_00_prometheusrole.yaml | mythi/cluster-ingress-operator | 59d6032927526b08852926bea4f7df460287d6bd | [
"Apache-2.0"
] | null | null | null | manifests/0000_90_ingress-operator_00_prometheusrole.yaml | mythi/cluster-ingress-operator | 59d6032927526b08852926bea4f7df460287d6bd | [
"Apache-2.0"
] | null | null | null | manifests/0000_90_ingress-operator_00_prometheusrole.yaml | mythi/cluster-ingress-operator | 59d6032927526b08852926bea4f7df460287d6bd | [
"Apache-2.0"
] | null | null | null | apiVersion: rbac.authorization.k8s.io/v1
kind: Role
metadata:
name: prometheus-k8s
namespace: openshift-ingress-operator
rules:
- apiGroups:
- ""
resources:
- services
- endpoints
- pods
verbs:
- get
- list
- watch
| 13.941176 | 40 | 0.679325 |
7905dd955190ae7e56dc5e54412920841f345f68 | 1,028 | yaml | YAML | cluster/examples/kubernetes/ceph/csi/example/rbd/storageclass.yaml | nixpanic/rook | 86cccaa554a0aeae938be4ade5b0100e77a53166 | [
"Apache-2.0"
] | 1 | 2019-08-13T18:20:22.000Z | 2019-08-13T18:20:22.000Z | cluster/examples/kubernetes/ceph/csi/example/rbd/storageclass.yaml | nixpanic/rook | 86cccaa554a0aeae938be4ade5b0100e77a53166 | [
"Apache-2.0"
] | null | null | null | cluster/examples/kubernetes/ceph/csi/example/rbd/storageclass.yaml | nixpanic/rook | 86cccaa554a0aeae938be4ade5b0100e77a53166 | [
"Apache-2.0"
] | null | null | null | apiVersion: storage.k8s.io/v1
kind: StorageClass
metadata:
name: csi-rbd
provisioner: rbd.csi.ceph.com
parameters:
# Specify a string that identifies your cluster. Ceph CSI supports any
# unique string. When Ceph CSI is deployed by Rook use the Rook namespace,
# for example "rook-ceph".
clusterID: rook-ceph
# Ceph pool into which the RBD image shall be created
pool: rbd
# RBD image format. Defaults to "2".
imageFormat: "2"
# RBD image features. Available for imageFormat: "2". CSI RBD currently supports only `layering` feature.
imageFeatures: layering
# The secrets have to contain Ceph admin credentials.
csi.storage.k8s.io/provisioner-secret-name: csi-rbd-secret
csi.storage.k8s.io/provisioner-secret-namespace: default
csi.storage.k8s.io/node-stage-secret-name: csi-rbd-secret
csi.storage.k8s.io/node-stage-secret-namespace: default
# uncomment the following to use rbd-nbd as mounter on supported nodes
#mounter: rbd-nbd
reclaimPolicy: Delete
| 34.266667 | 109 | 0.730545 |
7905e5d06fa619b66a28583d87b199f4b44d7230 | 1,197 | yml | YAML | vcs/kustomize/vcs/overlays/local/vcs/verifier/add-profiles.yml | talwinder50/k8s | 542d2918d2e4976a768ab05adfa314c3006c220f | [
"Apache-2.0"
] | null | null | null | vcs/kustomize/vcs/overlays/local/vcs/verifier/add-profiles.yml | talwinder50/k8s | 542d2918d2e4976a768ab05adfa314c3006c220f | [
"Apache-2.0"
] | null | null | null | vcs/kustomize/vcs/overlays/local/vcs/verifier/add-profiles.yml | talwinder50/k8s | 542d2918d2e4976a768ab05adfa314c3006c220f | [
"Apache-2.0"
] | null | null | null | #
# Copyright SecureKey Technologies Inc. All Rights Reserved.
#
# SPDX-License-Identifier: Apache-2.0
#
---
kind: Job
apiVersion: batch/v1
metadata:
name: verifier-vcs-add-profiles
spec:
template:
spec:
volumes:
- name: script
configMap:
name: verifier-vcs-add-profiles-script
restartPolicy: Never
initContainers:
- name: wait
image: busybox
imagePullPolicy: IfNotPresent
command: ["sh"]
args: ["-c", "sleep 5"]
- name: healthcheck-ready
image: busybox
imagePullPolicy: IfNotPresent
command: ["/bin/sh"]
args:
- "-c"
- |
while [[ "$(wget -T 5 -S --spider http://${VERIFIER_VCS_SERVICE_HOST}/healthcheck 2>&1 | grep '200 OK')" == "" ]];
do echo "waiting for endpoint";
sleep 5;
done;
containers:
- name: verifier-vcs-add-profiles
image: "alpine:latest"
imagePullPolicy: IfNotPresent
command: ["/bin/sh"]
args: ["/opt/vcs_verifier_configure.sh"]
volumeMounts:
- name: script
mountPath: /opt
| 26.021739 | 128 | 0.539683 |
7905fec4c355cb25a1630b0443c1c5b9b2d4642c | 801 | yaml | YAML | cloud/kubernetes/multiregion/client-secure.yaml | cargillb/cockroach | c260786553e54bb596395fd5b12075c614d8c577 | [
"MIT",
"BSD-3-Clause"
] | null | null | null | cloud/kubernetes/multiregion/client-secure.yaml | cargillb/cockroach | c260786553e54bb596395fd5b12075c614d8c577 | [
"MIT",
"BSD-3-Clause"
] | null | null | null | cloud/kubernetes/multiregion/client-secure.yaml | cargillb/cockroach | c260786553e54bb596395fd5b12075c614d8c577 | [
"MIT",
"BSD-3-Clause"
] | null | null | null | apiVersion: v1
kind: Pod
metadata:
name: cockroachdb-client-secure
labels:
app: cockroachdb-client
spec:
serviceAccountName: cockroachdb
containers:
- name: cockroachdb-client
image: cockroachdb/cockroach:v20.1.0
imagePullPolicy: IfNotPresent
volumeMounts:
- name: client-certs
mountPath: /cockroach-certs
# Keep a pod open indefinitely so kubectl exec can be used to get a shell to it
# and run cockroach client commands, such as cockroach sql, cockroach node status, etc.
command:
- sleep
- "2147483648" # 2^31
# This pod isn't doing anything important, so don't bother waiting to terminate it.
terminationGracePeriodSeconds: 0
volumes:
- name: client-certs
secret:
secretName: cockroachdb.client.root
defaultMode: 256
| 28.607143 | 91 | 0.716604 |
79060d995d459b106dd46c5fb90f51fbfdeb915e | 173 | yaml | YAML | practice/pods2/task-4/pod.yaml | MMerzinger/kubernetes-fundamentals | 27c219a14c0081746814657c8adf06a8bc689b51 | [
"MIT"
] | 2 | 2021-09-14T06:29:35.000Z | 2021-09-14T06:29:49.000Z | practice/pods2/task-4/pod.yaml | MMerzinger/kubernetes-fundamentals | 27c219a14c0081746814657c8adf06a8bc689b51 | [
"MIT"
] | null | null | null | practice/pods2/task-4/pod.yaml | MMerzinger/kubernetes-fundamentals | 27c219a14c0081746814657c8adf06a8bc689b51 | [
"MIT"
] | 1 | 2022-01-17T10:09:42.000Z | 2022-01-17T10:09:42.000Z | apiVersion: v1
kind: Pod
metadata:
name: task-4
spec:
containers:
- image: ubuntu
name: ubuntu
command:
- "/bin/bash"
- "-c"
args:
- sleep 3600 | 13.307692 | 17 | 0.572254 |
79061d843b2de448a413a0a4cc31f7a5df80e265 | 686 | yaml | YAML | ft_services/srcs/phpmyadmin/srcs/phpmyadmin-deployment.yaml | maxdesalle/libft | 8845656e1f5cc1fec052cf97fc8f5839b2b590a8 | [
"Unlicense"
] | 3 | 2021-01-06T13:50:12.000Z | 2022-02-28T09:16:15.000Z | ft_services/srcs/phpmyadmin/srcs/phpmyadmin-deployment.yaml | maxdesalle/libft | 8845656e1f5cc1fec052cf97fc8f5839b2b590a8 | [
"Unlicense"
] | null | null | null | ft_services/srcs/phpmyadmin/srcs/phpmyadmin-deployment.yaml | maxdesalle/libft | 8845656e1f5cc1fec052cf97fc8f5839b2b590a8 | [
"Unlicense"
] | 1 | 2020-11-23T12:58:18.000Z | 2020-11-23T12:58:18.000Z | apiVersion: apps/v1
kind: Deployment
metadata:
name: phpmyadmin
spec:
selector:
matchLabels:
app: phpmyadmin
strategy:
type: Recreate
replicas: 1
template:
metadata:
labels:
app: phpmyadmin
spec:
containers:
- image: my_phpmyadmin
name: phpmyadmin
imagePullPolicy: Never
ports:
- name: php-port
containerPort: 5000
livenessProbe:
exec:
command:
- sh
- -c
- "service telegraf status && service nginx status && service mariadb status && service php-fpm7 status"
initialDelaySeconds: 5
periodSeconds: 5
| 21.4375 | 116 | 0.569971 |
79063298679b35939164f56e03ba320d21e98be2 | 375 | yaml | YAML | k8s/horizon/10.1/ltsc2019/horizon/patch-hrz-enable-dam.yaml | vijayraavi/container-deployment | 1cf8639e85118a334dfa6cbaaa7b28605f215568 | [
"Apache-2.0"
] | 21 | 2020-12-17T11:41:28.000Z | 2022-03-29T01:24:12.000Z | k8s/horizon/10.1/ltsc2019/horizon/patch-hrz-enable-dam.yaml | sitecoremaster/container-deployment | 10e578b9e6cb64d464a37015832c175db3f6ad00 | [
"Apache-2.0"
] | 11 | 2020-12-17T15:55:57.000Z | 2022-02-23T12:31:22.000Z | k8s/horizon/10.1/ltsc2019/horizon/patch-hrz-enable-dam.yaml | sitecoremaster/container-deployment | 10e578b9e6cb64d464a37015832c175db3f6ad00 | [
"Apache-2.0"
] | 16 | 2020-12-17T14:20:10.000Z | 2022-03-17T19:09:55.000Z | apiVersion: apps/v1
kind: Deployment
metadata:
name: hrz
spec:
selector:
matchLabels:
app: hrz
template:
metadata:
labels:
app: hrz
spec:
nodeSelector:
kubernetes.io/os: windows
containers:
- name: sitecore-horizon
env:
- name: Sitecore_Plugins__Filters__ContentHub
value: +ContentHub
| 17.857143 | 53 | 0.605333 |
790632a2eac4e49f8f57e5f5b52ef2303cd444bc | 381 | yaml | YAML | config-root/namespaces/jx/jxboot-helmfile-resources/jenkins-x-docker-registry.yaml | markphip/jx3-minikube-vault | 651fb256e9f3e2435641d7dd586438c3ba21176a | [
"Apache-2.0"
] | null | null | null | config-root/namespaces/jx/jxboot-helmfile-resources/jenkins-x-docker-registry.yaml | markphip/jx3-minikube-vault | 651fb256e9f3e2435641d7dd586438c3ba21176a | [
"Apache-2.0"
] | null | null | null | config-root/namespaces/jx/jxboot-helmfile-resources/jenkins-x-docker-registry.yaml | markphip/jx3-minikube-vault | 651fb256e9f3e2435641d7dd586438c3ba21176a | [
"Apache-2.0"
] | null | null | null | # Source: jxboot-helmfile-resources/templates/jenkins-x-docker-registry.yaml
apiVersion: v1
kind: ConfigMap
metadata:
name: jenkins-x-docker-registry
annotations:
expose.config.fabric8.io/clusterip-port-if-empty-key: docker.registry
namespace: jx
labels:
gitops.jenkins-x.io/pipeline: 'namespaces'
data:
kaniko.flags: "--insecure"
docker.registry: 10.106.36.28
| 27.214286 | 76 | 0.75853 |
790632ee8c68abf7ec640e6a94fc9370410e26d8 | 418 | yml | YAML | k8s/postman-runtime-service.yml | nehrman/microcks-ansible-operator | 574b8282c90ba00885424fd2a9e954d2b33acec9 | [
"Apache-2.0"
] | 13 | 2019-03-08T15:07:32.000Z | 2022-03-08T04:38:56.000Z | k8s/postman-runtime-service.yml | alericks21/microks-ansible-operator | f2cde327b0d1d2c43fdd8b37127ba52985874872 | [
"Apache-2.0"
] | 70 | 2019-03-12T13:52:30.000Z | 2022-03-23T20:09:53.000Z | k8s/postman-runtime-service.yml | alericks21/microks-ansible-operator | f2cde327b0d1d2c43fdd8b37127ba52985874872 | [
"Apache-2.0"
] | 3 | 2019-03-12T12:55:17.000Z | 2021-12-29T12:37:11.000Z | kind: Service
apiVersion: v1
metadata:
name: "{{name}}-postman-runtime"
namespace: '{{ meta.namespace }}'
labels:
app: "{{name}}"
container: postman-runtime
group: microcks
spec:
ports:
- protocol: TCP
port: 8080
targetPort: 3000
name: postman-runtime
type: ClusterIP
sessionAffinity: None
selector:
app: "{{name}}"
container: postman-runtime
group: microcks | 19.904762 | 35 | 0.638756 |
790651aff57462f17782db7816aa07b752a7bda8 | 1,935 | yaml | YAML | docs/wi_run.yaml | cloudspannerecosystem/gcsb | 0a71c86f9b36cc9278f935e7405ad1220afd1e1f | [
"Apache-2.0"
] | 19 | 2022-02-08T02:24:52.000Z | 2022-03-03T06:18:47.000Z | docs/wi_run.yaml | cloudspannerecosystem/gcsb | 0a71c86f9b36cc9278f935e7405ad1220afd1e1f | [
"Apache-2.0"
] | 5 | 2022-02-08T04:45:46.000Z | 2022-03-17T05:55:19.000Z | docs/wi_run.yaml | cloudspannerecosystem/gcsb | 0a71c86f9b36cc9278f935e7405ad1220afd1e1f | [
"Apache-2.0"
] | 1 | 2022-02-24T11:37:21.000Z | 2022-02-24T11:37:21.000Z | # Copyright 2022 Google LLC
#
# Licensed under the Apache License, Version 2.0 (the "License");
# you may not use this file except in compliance with the License.
# You may obtain a copy of the License at
#
# http://www.apache.org/licenses/LICENSE-2.0
#
# Unless required by applicable law or agreed to in writing, software
# distributed under the License is distributed on an "AS IS" BASIS,
# WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
# See the License for the specific language governing permissions and
# limitations under the License.
apiVersion: apps/v1
kind: Deployment
metadata:
name: gcsb-run
namespace: gcsb
spec:
replicas: 1 # EDIT: Number of instances of gcsb
selector:
matchLabels:
app: gcsb-run
template:
metadata:
labels:
app: gcsb-run
spec:
serviceAccountName: gcsb
containers:
- name: gcsb-run
image: gcr.io/<project>/gcsb:latest # EDIT: Your GCP Project ID
command:
- /gcsb
- run # run or run
args:
- --project=YOUR_PROJECT_ID # EDIT: Your GCP Project ID
- --instance=YOUR_INSTANCE_ID # EDIT: Your Spanner Instance ID
- --database=YOUR_DATABASE # EDIT: Your Spanner Database Name
- --table=YOUR_TABLE # EDIT: Your Table Name
- --operations=1000000 # EDIT: Number of Operations
- --threads=10 # EDIT: Number of Threads
- --reads=50 # EDIT: Read Weight (Example: 50 = 50% reads)
- --writes=50 # EDIT: Write Weight (Example: 50 = 50% writes)
- --sample-size=5 # EDIT: Percentage of table to sample for generating reads (Example: 5 = 5% of the rows in the table)
resources:
requests:
cpu: "6"
memory: 4Gi
limits:
cpu: "6"
memory: 4Gi | 36.509434 | 141 | 0.605168 |
7906567dbebb998dbc08332d5737a92dadf55e0a | 487 | yaml | YAML | fluxcd/apps/base/ceph-cephfs-pvc/pv.yaml | geraldwuhoo/homelab-iac | d61a6dbf1fe017e1b5aede87caaf9d00d0a530cd | [
"MIT"
] | null | null | null | fluxcd/apps/base/ceph-cephfs-pvc/pv.yaml | geraldwuhoo/homelab-iac | d61a6dbf1fe017e1b5aede87caaf9d00d0a530cd | [
"MIT"
] | null | null | null | fluxcd/apps/base/ceph-cephfs-pvc/pv.yaml | geraldwuhoo/homelab-iac | d61a6dbf1fe017e1b5aede87caaf9d00d0a530cd | [
"MIT"
] | null | null | null | ---
apiVersion: v1
kind: PersistentVolume
metadata:
name: pv
spec:
accessModes:
- ReadWriteMany
capacity:
storage: 1Ti
csi:
driver: cephfs.csi.ceph.com
nodeStageSecretRef:
name: csi-cephfs-secret
namespace: default
volumeAttributes:
"clusterID": "${CEPH_CLUSTER_ID}"
"fsName": "cephfs"
"staticVolume": "true"
volumeHandle: pv
persistentVolumeReclaimPolicy: Retain
storageClassName: ceph-cephfs-sc
volumeMode: Filesystem
| 19.48 | 39 | 0.687885 |
790692878e532d452495559e047fc2ea122f2ac7 | 391 | yaml | YAML | config/rbac/tunnel_editor_role.yaml | adyanth/cloudflare-controller | 7f89dfe1c80469dd8f49d0b9b674cf6be3ae7979 | [
"Apache-2.0"
] | 14 | 2022-01-26T20:17:54.000Z | 2022-03-30T13:56:34.000Z | config/rbac/tunnel_editor_role.yaml | adyanth/cloudflare-controller | 7f89dfe1c80469dd8f49d0b9b674cf6be3ae7979 | [
"Apache-2.0"
] | 29 | 2022-01-17T10:48:44.000Z | 2022-03-31T15:55:02.000Z | config/rbac/tunnel_editor_role.yaml | adyanth/cloudflare-controller | 7f89dfe1c80469dd8f49d0b9b674cf6be3ae7979 | [
"Apache-2.0"
] | 1 | 2022-03-29T06:48:03.000Z | 2022-03-29T06:48:03.000Z | # permissions for end users to edit tunnels.
apiVersion: rbac.authorization.k8s.io/v1
kind: ClusterRole
metadata:
name: tunnel-editor-role
rules:
- apiGroups:
- networking.cfargotunnel.com
resources:
- tunnels
verbs:
- create
- delete
- get
- list
- patch
- update
- watch
- apiGroups:
- networking.cfargotunnel.com
resources:
- tunnels/status
verbs:
- get
| 15.64 | 44 | 0.693095 |
79069aaae1c0ebb4f2ca7c2a8984b52112d4347c | 5,608 | yaml | YAML | bindata/oauth-apiserver/deploy.yaml | sg00dwin/cluster-authentication-operator | f3ce0832d72f133018b14e6767c59e34c6fb2f35 | [
"Apache-2.0"
] | null | null | null | bindata/oauth-apiserver/deploy.yaml | sg00dwin/cluster-authentication-operator | f3ce0832d72f133018b14e6767c59e34c6fb2f35 | [
"Apache-2.0"
] | null | null | null | bindata/oauth-apiserver/deploy.yaml | sg00dwin/cluster-authentication-operator | f3ce0832d72f133018b14e6767c59e34c6fb2f35 | [
"Apache-2.0"
] | null | null | null | apiVersion: apps/v1
kind: Deployment
metadata:
namespace: openshift-oauth-apiserver
name: apiserver
labels:
app: openshift-oauth-apiserver
apiserver: "true"
# The number of replicas will be set in code to the number of master nodes.
spec:
strategy:
type: RollingUpdate
rollingUpdate:
# To ensure that only one pod at a time writes to the node's
# audit log, require the update strategy to proceed a node at a
# time. Only when a master node has its existing
# oauth-apiserver pod stopped will a new one be allowed to
# start.
maxUnavailable: 1
maxSurge: 0
selector:
matchLabels:
app: openshift-oauth-apiserver
apiserver: "true"
template:
metadata:
name: openshift-oauth-apiserver
labels:
app: openshift-oauth-apiserver
apiserver: "true"
spec:
serviceAccountName: oauth-apiserver-sa
priorityClassName: system-node-critical
initContainers:
- name: fix-audit-permissions
terminationMessagePolicy: FallbackToLogsOnError
image: ${IMAGE}
imagePullPolicy: IfNotPresent
command: ['sh', '-c', 'chmod 0700 /var/log/oauth-apiserver && touch /var/log/oauth-apiserver/audit.log && chmod 0600 /var/log/oauth-apiserver/*']
securityContext:
privileged: true
resources:
requests:
cpu: 15m
memory: 50Mi
volumeMounts:
- mountPath: /var/log/oauth-apiserver
name: audit-dir
containers:
- name: oauth-apiserver
terminationMessagePolicy: FallbackToLogsOnError
image: ${IMAGE}
imagePullPolicy: IfNotPresent
command: ["/bin/bash", "-ec"]
args:
- |
if [ -s /var/run/configmaps/trusted-ca-bundle/tls-ca-bundle.pem ]; then
echo "Copying system trust bundle"
cp -f /var/run/configmaps/trusted-ca-bundle/tls-ca-bundle.pem /etc/pki/ca-trust/extracted/pem/tls-ca-bundle.pem
fi
exec oauth-apiserver start \
--secure-port=8443 \
--audit-log-path=/var/log/oauth-apiserver/audit.log \
--audit-log-format=json \
--audit-log-maxsize=100 \
--audit-log-maxbackup=10 \
--etcd-cafile=/var/run/configmaps/etcd-serving-ca/ca-bundle.crt \
--etcd-keyfile=/var/run/secrets/etcd-client/tls.key \
--etcd-certfile=/var/run/secrets/etcd-client/tls.crt \
--shutdown-delay-duration=3s \
--tls-private-key-file=/var/run/secrets/serving-cert/tls.key \
--tls-cert-file=/var/run/secrets/serving-cert/tls.crt \
${FLAGS}
resources:
requests:
memory: 200Mi
cpu: 150m
# we need to set this to privileged to be able to write audit to /var/log/oauth-apiserver
securityContext:
privileged: true
ports:
- containerPort: 8443
volumeMounts:
- mountPath: /var/run/configmaps/audit
name: audit-policies
- mountPath: /var/run/secrets/etcd-client
name: etcd-client
- mountPath: /var/run/configmaps/etcd-serving-ca
name: etcd-serving-ca
- mountPath: /var/run/configmaps/trusted-ca-bundle
name: trusted-ca-bundle
- mountPath: /var/run/secrets/serving-cert
name: serving-cert
- mountPath: /var/run/secrets/encryption-config
name: encryption-config
- mountPath: /var/log/oauth-apiserver
name: audit-dir
livenessProbe:
initialDelaySeconds: 30
httpGet:
scheme: HTTPS
port: 8443
path: healthz
readinessProbe:
failureThreshold: 10
httpGet:
scheme: HTTPS
port: 8443
path: readyz
terminationGracePeriodSeconds: 70 # a bit more than the 60 seconds timeout of non-long-running requests
volumes:
- name: audit-policies
configMap:
name: audit-${REVISION}
- name: etcd-client
secret:
secretName: etcd-client
- name: etcd-serving-ca
configMap:
name: etcd-serving-ca
- name: serving-cert
secret:
secretName: serving-cert
- name: trusted-ca-bundle
configMap:
name: trusted-ca-bundle
optional: true
items:
- key: ca-bundle.crt
path: tls-ca-bundle.pem
- name: encryption-config
secret:
secretName: encryption-config-${REVISION}
optional: true
- hostPath:
path: /var/log/oauth-apiserver
name: audit-dir
nodeSelector:
node-role.kubernetes.io/master: ""
tolerations:
# Ensure pod can be scheduled on master nodes
- key: "node-role.kubernetes.io/master"
operator: "Exists"
effect: "NoSchedule"
# Ensure pod can be evicted if the node is unreachable
- key: "node.kubernetes.io/unreachable"
operator: "Exists"
effect: "NoExecute"
tolerationSeconds: 120
# Ensure scheduling is delayed until node readiness
# (i.e. network operator configures CNI on the node)
- key: "node.kubernetes.io/not-ready"
operator: "Exists"
effect: "NoExecute"
tolerationSeconds: 120
# Anti-affinity is configured in code due to the need to scope
# selection to the computed pod template.
| 35.493671 | 155 | 0.589337 |
7906dd9149820c8cc34dcb88e6e36df7d5536841 | 1,351 | yaml | YAML | pattern-distributed/sp/wso2sp-worker-9-service.yaml | ChulaniKarandana/Mavericks_Kubernetes_Client | 2b4dd5b0675a93d440870defe673e3c4fd68f0e7 | [
"Apache-2.0"
] | null | null | null | pattern-distributed/sp/wso2sp-worker-9-service.yaml | ChulaniKarandana/Mavericks_Kubernetes_Client | 2b4dd5b0675a93d440870defe673e3c4fd68f0e7 | [
"Apache-2.0"
] | null | null | null | pattern-distributed/sp/wso2sp-worker-9-service.yaml | ChulaniKarandana/Mavericks_Kubernetes_Client | 2b4dd5b0675a93d440870defe673e3c4fd68f0e7 | [
"Apache-2.0"
] | null | null | null | # Copyright (c) 2018, WSO2 Inc. (http://www.wso2.org) All Rights Reserved.
#
# Licensed under the Apache License, Version 2.0 (the "License");
# you may not use this file except in compliance with the License.
# You may obtain a copy of the License at
#
# http://www.apache.org/licenses/LICENSE-2.0
#
# Unless required by applicable law or agreed to in writing, software
# distributed under the License is distributed on an "AS IS" BASIS,
# WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
# See the License for the specific language governing permissions and
# limitations under the License.
apiVersion: v1
kind: Service
metadata:
name: wso2sp-worker-9
labels:
node: wso2sp-worker-9
pattern: wso2sp-pattern-distributed
spec:
ports:
# ports that this service should serve on
-
name: 'http-port-1'
port: 9090
protocol: TCP
-
name: 'https-port-1'
port: 9543
protocol: TCP
-
name: 'https-port-2'
port: 9544
protocol: TCP
-
name: 'https-port-3'
port: 7070
protocol: TCP
-
name: 'https-port-4'
port: 7443
protocol: TCP
# label keys and values that must match in order to receive traffic for this service
selector:
node: wso2sp-worker-9
pattern: wso2sp-pattern-distributed
clusterIP: None
| 26.490196 | 86 | 0.675796 |
79072fd1cedef6023d714f6b4cbbe9c10e1fc11f | 512 | yml | YAML | assets/pod-readiness.yml | cachac/kubelabs | 545c27ca5a9f0255ea5f78b26a527be5d02b9eaf | [
"MIT"
] | null | null | null | assets/pod-readiness.yml | cachac/kubelabs | 545c27ca5a9f0255ea5f78b26a527be5d02b9eaf | [
"MIT"
] | null | null | null | assets/pod-readiness.yml | cachac/kubelabs | 545c27ca5a9f0255ea5f78b26a527be5d02b9eaf | [
"MIT"
] | null | null | null | apiVersion: v1
kind: Pod
metadata:
name: readiness-pod
labels:
test: readiness
namespace: default
spec:
containers:
- name: readiness
env:
- name: APP_START_DELAY
value: "60"
image: kodekloud/webapp-delayed-start
resources: {}
imagePullPolicy: Always
ports:
- containerPort: 8080
protocol: TCP
readinessProbe:
httpGet:
path: /ready
port: 8080
initialDelaySeconds: 30
periodSeconds: 5
| 19.692308 | 43 | 0.589844 |
7907f370f64dc46cebbc3fa25f43907225612526 | 1,122 | yaml | YAML | golang/go-guestbook/kubernetes-manifests/base/guestbook-backend.deployment.yaml | clustership/cloud-code-samples | bff368f7435625246b6616ce5346af9ff68a55c5 | [
"0BSD"
] | null | null | null | golang/go-guestbook/kubernetes-manifests/base/guestbook-backend.deployment.yaml | clustership/cloud-code-samples | bff368f7435625246b6616ce5346af9ff68a55c5 | [
"0BSD"
] | null | null | null | golang/go-guestbook/kubernetes-manifests/base/guestbook-backend.deployment.yaml | clustership/cloud-code-samples | bff368f7435625246b6616ce5346af9ff68a55c5 | [
"0BSD"
] | null | null | null | apiVersion: apps/v1
kind: Deployment
metadata:
name: go-guestbook-backend
labels:
app: guestbook
tier: backend
spec:
replicas: 1
selector:
matchLabels:
app: guestbook
tier: backend
template:
metadata:
labels:
app: guestbook
tier: backend
spec:
initContainers:
- name: init-db-ready
image: mongo:4
command: ['/bin/sh', '-c']
args:
- echo "Waiting for mongodb at go-guestbook-mongodb:27017 to go live before the BE...";
- until (mongo --host go-guestbook-mongodb:27017 >/dev/null) do echo "Waiting for connection for 2 sec."; sleep 2; done
containers:
- name: backend
image: guestbook-backend
ports:
- name: http-server
containerPort: 8080
- name: debug
containerPort: 3000
readinessProbe:
tcpSocket:
port: 8080
initialDelaySeconds: 5
periodSeconds: 10
env:
- name: PORT
value: "8080"
- name: GUESTBOOK_DB_ADDR
value: go-guestbook-mongodb:27017
| 24.933333 | 129 | 0.571301 |
7908072f9d3c9dfc5c05dacab847887753c8337a | 3,884 | yaml | YAML | config/prow/cluster/hook_deployment.yaml | pawbana/test-infra | 622f84b9c05fc9ecb58081328e55197cddd1ed73 | [
"Apache-2.0"
] | null | null | null | config/prow/cluster/hook_deployment.yaml | pawbana/test-infra | 622f84b9c05fc9ecb58081328e55197cddd1ed73 | [
"Apache-2.0"
] | null | null | null | config/prow/cluster/hook_deployment.yaml | pawbana/test-infra | 622f84b9c05fc9ecb58081328e55197cddd1ed73 | [
"Apache-2.0"
] | null | null | null | # Copyright 2016 The Kubernetes Authors All rights reserved.
#
# Licensed under the Apache License, Version 2.0 (the "License");
# you may not use this file except in compliance with the License.
# You may obtain a copy of the License at
#
# http://www.apache.org/licenses/LICENSE-2.0
#
# Unless required by applicable law or agreed to in writing, software
# distributed under the License is distributed on an "AS IS" BASIS,
# WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
# See the License for the specific language governing permissions and
# limitations under the License.
apiVersion: apps/v1
kind: Deployment
metadata:
namespace: default
name: hook
labels:
app: hook
spec:
replicas: 4
strategy:
type: RollingUpdate
rollingUpdate:
maxSurge: 1
maxUnavailable: 1
selector:
matchLabels:
app: hook
template:
metadata:
labels:
app: hook
spec:
serviceAccountName: hook
terminationGracePeriodSeconds: 180
containers:
- name: hook
image: gcr.io/k8s-prow/hook:v20220211-e4574accfe
imagePullPolicy: Always
args:
- --dry-run=false
- --slack-token-file=/etc/slack/token
- --github-endpoint=http://ghproxy
- --github-endpoint=https://api.github.com
- --github-token-path=/etc/github/oauth
- --config-path=/etc/config/config.yaml
- --job-config-path=/etc/job-config
env:
# Use KUBECONFIG envvar rather than --kubeconfig flag in order to provide multiple configs to merge.
- name: KUBECONFIG
value: "/etc/kubeconfig/config:/etc/kubeconfig-build-test-infra-trusted/kubeconfig"
ports:
- name: http
containerPort: 8888
- name: metrics
containerPort: 9090
volumeMounts:
- name: slack
mountPath: /etc/slack
- name: hmac
mountPath: /etc/webhook
readOnly: true
- name: oauth
mountPath: /etc/github
readOnly: true
- name: config
mountPath: /etc/config
readOnly: true
- name: job-config
mountPath: /etc/job-config
readOnly: true
- name: plugins
mountPath: /etc/plugins
readOnly: true
- name: cat-api
mountPath: /etc/cat-api
readOnly: true
- name: unsplash-api
mountPath: /etc/unsplash-api
readOnly: true
- name: kubeconfig
mountPath: /etc/kubeconfig
readOnly: true
- mountPath: /etc/kubeconfig-build-test-infra-trusted
name: kubeconfig-build-test-infra-trusted
readOnly: true
livenessProbe:
httpGet:
path: /healthz
port: 8081
initialDelaySeconds: 3
periodSeconds: 3
readinessProbe:
httpGet:
path: /healthz/ready
port: 8081
initialDelaySeconds: 10
periodSeconds: 3
timeoutSeconds: 600
volumes:
- name: slack
secret:
secretName: slack-token
- name: hmac
secret:
secretName: hmac-token
- name: oauth
secret:
secretName: oauth-token
- name: config
configMap:
name: config
- name: job-config
configMap:
name: job-config
- name: plugins
configMap:
name: plugins
- name: cat-api
configMap:
name: cat-api-key
- name: unsplash-api
secret:
secretName: unsplash-api-key
- name: kubeconfig
secret:
defaultMode: 420
secretName: kubeconfig
- name: kubeconfig-build-test-infra-trusted
secret:
defaultMode: 420
secretName: kubeconfig-build-test-infra-trusted
| 28.558824 | 108 | 0.588826 |
790831927fe08292e4186e22413e1a6c1b87192a | 288 | yaml | YAML | deploy/bitbucket/bitbucket-pv.yaml | Devops-as-a-Service-Project/main | 666dfb95e5ff40bea165bedacc773f0357efba67 | [
"Apache-2.0"
] | null | null | null | deploy/bitbucket/bitbucket-pv.yaml | Devops-as-a-Service-Project/main | 666dfb95e5ff40bea165bedacc773f0357efba67 | [
"Apache-2.0"
] | null | null | null | deploy/bitbucket/bitbucket-pv.yaml | Devops-as-a-Service-Project/main | 666dfb95e5ff40bea165bedacc773f0357efba67 | [
"Apache-2.0"
] | null | null | null | kind: PersistentVolume
apiVersion: v1
metadata:
name: bitbucket-pv-volume
labels:
type: local
app: bitbucket
spec:
storageClassName: manual
capacity:
storage: 15Gi
accessModes:
- ReadWriteMany
hostPath:
path: "/mnt/kube-data/bitbucket"
type: Directory
| 16.941176 | 36 | 0.701389 |
79086369803d1bff088dc75723ff9d2b4c38d12a | 6,466 | yaml | YAML | config/300-salesforcesource.yaml | fossabot/triggermesh | b82d2b35141af2a09f4717909243a5c9eacbbde0 | [
"Apache-2.0"
] | 1 | 2021-12-31T11:12:54.000Z | 2021-12-31T11:12:54.000Z | config/300-salesforcesource.yaml | gafinan/triggermesh | 1b13797fc7918eeac72d635d54c68cf9418bebeb | [
"Apache-2.0"
] | null | null | null | config/300-salesforcesource.yaml | gafinan/triggermesh | 1b13797fc7918eeac72d635d54c68cf9418bebeb | [
"Apache-2.0"
] | null | null | null | # Copyright 2021 TriggerMesh Inc.
#
# Licensed under the Apache License, Version 2.0 (the "License");
# you may not use this file except in compliance with the License.
# You may obtain a copy of the License at
#
# http://www.apache.org/licenses/LICENSE-2.0
#
# Unless required by applicable law or agreed to in writing, software
# distributed under the License is distributed on an "AS IS" BASIS,
# WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
# See the License for the specific language governing permissions and
# limitations under the License.
apiVersion: apiextensions.k8s.io/v1
kind: CustomResourceDefinition
metadata:
name: salesforcesources.sources.triggermesh.io
labels:
eventing.knative.dev/source: 'true'
duck.knative.dev/source: 'true'
knative.dev/crd-install: 'true'
triggermesh.io/crd-install: 'true'
annotations:
registry.knative.dev/eventTypes: |
[
{ "type": "com.salesforce.stream.message" }
]
spec:
group: sources.triggermesh.io
scope: Namespaced
names:
kind: SalesforceSource
plural: salesforcesources
categories:
- all
- knative
- eventing
- sources
versions:
- name: v1alpha1
served: true
storage: true
subresources:
status: {}
schema:
openAPIV3Schema:
description: TriggerMesh event source for Salesforce.
type: object
properties:
spec:
description: Desired state of the event source.
type: object
properties:
auth:
description: Authentication method to interact with the Salesforce API.
type: object
properties:
clientID:
description: Client ID.
type: string
server:
description: Salesforce server.
type: string
user:
description: Salesforce user.
type: string
certKey:
description: Certificate key to sign authentication requests with the Salesforce API.
type: object
properties:
value:
description: Literal value of the certificate key.
type: string
valueFromSecret:
description: A reference to a Kubernetes Secret containing the certificate key.
type: object
properties:
name:
type: string
key:
type: string
required:
- name
- key
oneOf:
- required: [value]
- required: [valueFromSecret]
required:
- clientID
- server
- user
- certKey
apiVersion:
description: Salesforce API version.
type: string
subscription:
description: Subscription to a Salesforce channel.
type: object
properties:
channel:
type: string
replayID:
type: integer
required:
- channel
sink:
description: The destination of events received via Salesforce streams.
type: object
properties:
ref:
description: Reference to an addressable Kubernetes object to be used as the destination of events.
type: object
properties:
apiVersion:
type: string
kind:
type: string
namespace:
type: string
name:
type: string
required:
- apiVersion
- kind
- name
uri:
description: URI to use as the destination of events.
type: string
format: uri
oneOf:
- required: [ref]
- required: [uri]
required:
- auth
- subscription
- sink
status:
description: Reported status of the event source.
type: object
properties:
sinkUri:
description: URI of the sink where events are currently sent to.
type: string
format: uri
ceAttributes:
type: array
items:
type: object
properties:
type:
type: string
source:
type: string
required:
- type
- source
observedGeneration:
type: integer
format: int64
conditions:
type: array
items:
type: object
properties:
type:
type: string
status:
type: string
enum: ['True', 'False', Unknown]
severity:
type: string
enum: [Error, Warning, Info]
reason:
type: string
message:
type: string
lastTransitionTime:
type: string
format: date-time
required:
- type
- status
additionalPrinterColumns:
- name: Ready
type: string
jsonPath: .status.conditions[?(@.type=='Ready')].status
- name: Reason
type: string
jsonPath: .status.conditions[?(@.type=='Ready')].reason
- name: Sink
type: string
jsonPath: .status.sinkUri
- name: Age
type: date
jsonPath: .metadata.creationTimestamp
| 32.822335 | 119 | 0.457161 |
7908c2f3801eacb07ed0533934e150cbda63db7f | 392 | yaml | YAML | go/stackman/config/rbac/datatransportlayer_viewer_role.yaml | agiledev624/go-eth-develop | 482a10570230950507eee1694e37751e04bc8923 | [
"MIT"
] | 674 | 2021-04-12T06:05:00.000Z | 2022-03-31T10:19:07.000Z | go/stackman/config/rbac/datatransportlayer_viewer_role.yaml | agiledev624/go-eth-develop | 482a10570230950507eee1694e37751e04bc8923 | [
"MIT"
] | 1,768 | 2021-04-12T00:31:35.000Z | 2022-03-31T23:39:20.000Z | go/stackman/config/rbac/datatransportlayer_viewer_role.yaml | agiledev624/go-eth-develop | 482a10570230950507eee1694e37751e04bc8923 | [
"MIT"
] | 242 | 2021-04-12T06:05:02.000Z | 2022-03-31T20:26:53.000Z | # permissions for end users to view datatransportlayers.
apiVersion: rbac.authorization.k8s.io/v1
kind: ClusterRole
metadata:
name: datatransportlayer-viewer-role
rules:
- apiGroups:
- stack.optimism-stacks.net
resources:
- datatransportlayers
verbs:
- get
- list
- watch
- apiGroups:
- stack.optimism-stacks.net
resources:
- datatransportlayers/status
verbs:
- get
| 18.666667 | 56 | 0.739796 |
7908d0b76ef37c51f4d6232d0f8ee8f965948bed | 160 | yaml | YAML | deis/manifests/deis-etcd-discovery-token.yaml | arschles/deis-charts | f2dac9a8c25a6344192a6c376c1d078b4b55c83d | [
"Apache-2.0"
] | null | null | null | deis/manifests/deis-etcd-discovery-token.yaml | arschles/deis-charts | f2dac9a8c25a6344192a6c376c1d078b4b55c83d | [
"Apache-2.0"
] | null | null | null | deis/manifests/deis-etcd-discovery-token.yaml | arschles/deis-charts | f2dac9a8c25a6344192a6c376c1d078b4b55c83d | [
"Apache-2.0"
] | null | null | null | kind: Secret
apiVersion: v1
metadata:
name: deis-etcd-discovery-token
namespace: deis
data:
token: "RTJENjQ1NzYtRDU0Ny00OThDLUFGNzEtM0NGNkVGMzE5QThCCg=="
| 20 | 63 | 0.8 |
7908d1bb599840179b6d18e8ae71f7403d60ba1a | 477 | yaml | YAML | staging/src/k8s.io/pod-security-admission/test/testdata/restricted/v1.21/pass/hostports0.yaml | 767829413/kubernetes | e3982ce472af31efe0cfb5165271c84f1ace0b0f | [
"Apache-2.0"
] | 84,910 | 2015-08-12T17:45:55.000Z | 2022-03-31T23:39:40.000Z | staging/src/k8s.io/pod-security-admission/test/testdata/restricted/v1.21/pass/hostports0.yaml | 767829413/kubernetes | e3982ce472af31efe0cfb5165271c84f1ace0b0f | [
"Apache-2.0"
] | 98,305 | 2015-08-12T17:35:13.000Z | 2022-03-31T23:46:47.000Z | staging/src/k8s.io/pod-security-admission/test/testdata/restricted/v1.21/pass/hostports0.yaml | 767829413/kubernetes | e3982ce472af31efe0cfb5165271c84f1ace0b0f | [
"Apache-2.0"
] | 36,592 | 2015-08-12T18:36:13.000Z | 2022-03-31T16:22:17.000Z | apiVersion: v1
kind: Pod
metadata:
name: hostports0
spec:
containers:
- image: k8s.gcr.io/pause
name: container1
ports:
- containerPort: 12345
securityContext:
allowPrivilegeEscalation: false
initContainers:
- image: k8s.gcr.io/pause
name: initcontainer1
ports:
- containerPort: 12346
securityContext:
allowPrivilegeEscalation: false
securityContext:
runAsNonRoot: true
seccompProfile:
type: RuntimeDefault
| 19.875 | 37 | 0.70021 |
7908fa5351fc416b615928653b5f990a6189c3ef | 992 | yaml | YAML | k8s-load-simu-setup/pgbench.yaml | aws-samples/postgres-lightweight-locks-simulator | 9648d0676f349258b4c318eb6511d89265d948ea | [
"MIT-0"
] | 4 | 2021-11-10T01:54:00.000Z | 2022-02-25T20:06:10.000Z | k8s-load-simu-setup/pgbench.yaml | aws-samples/postgres-lightweight-locks-simulator | 9648d0676f349258b4c318eb6511d89265d948ea | [
"MIT-0"
] | 1 | 2021-12-19T20:07:53.000Z | 2021-12-19T20:34:11.000Z | k8s-load-simu-setup/pgbench.yaml | aws-samples/postgres-lightweight-locks-simulator | 9648d0676f349258b4c318eb6511d89265d948ea | [
"MIT-0"
] | 3 | 2021-12-15T07:52:08.000Z | 2022-02-09T14:22:43.000Z | apiVersion: apps/v1
kind: Deployment
metadata:
labels:
app: pgbench
name: pgbench
spec:
replicas: 1
selector:
matchLabels:
app: pgbench
template:
metadata:
labels:
app: pgbench
spec:
#nodeSelector:
# lifecycle: Ec2Spot
containers:
- name: pgbench
envFrom:
- secretRef:
name: db-creds
env:
- name: DURATION
value: "100000"
- name: CLIENTS
value: "5"
- name: DBHOST
#value: "db.czk5ni6ofaxj.us-west-2.rds.amazonaws.com"
value: "aa501bb12bde3437a87c195a9ed5edd7-8393eef865b22115.elb.us-west-2.amazonaws.com"
image: 448389607377.dkr.ecr.us-west-2.amazonaws.com/simu-app-load:0.3
imagePullPolicy: Always
command: ["/start-pgbench.sh"]
resources:
requests:
cpu: 512m
memory: 512Mi
hostNetwork: true
| 24.8 | 100 | 0.539315 |
790929e9781e0595a4e601e8478e2ac60546eab4 | 1,503 | yaml | YAML | deploy/free5gc-stage-3.0.4/ueransim/ueransim-gnb.yaml | wheam2002/free5gmano | 088258abf847c2577bc8b1eb19781c2c454d160c | [
"Apache-2.0"
] | null | null | null | deploy/free5gc-stage-3.0.4/ueransim/ueransim-gnb.yaml | wheam2002/free5gmano | 088258abf847c2577bc8b1eb19781c2c454d160c | [
"Apache-2.0"
] | null | null | null | deploy/free5gc-stage-3.0.4/ueransim/ueransim-gnb.yaml | wheam2002/free5gmano | 088258abf847c2577bc8b1eb19781c2c454d160c | [
"Apache-2.0"
] | null | null | null | apiVersion: apps/v1
kind: Deployment
metadata:
name: ueransim-gnb-deployment
labels:
app: ueransim-gnb
spec:
replicas: 1
selector:
matchLabels:
app: ueransim-gnb
template:
metadata:
labels:
app: ueransim-gnb
spec:
containers:
- name: ueransim-gnb
imagePullPolicy: IfNotPresent
image: free5gmano/ueransim:v3.1.0
securityContext:
privileged: true
command: ["/bin/bash", "-c"]
args: ["./build/nr-gnb -c ./config/free5gc-gnb.yaml"]
volumeMounts:
- name: gnb-conf
mountPath: /UERANSIM/config/free5gc-gnb.yaml
subPath: free5gc-gnb.yaml
initContainers:
- name: init-network-client
image: sdnvortex/network-controller:v0.4.9
command: ["/go/bin/client"]
args: ["-s=unix:///tmp/vortex.sock", "-b=br0", "-n=eth1", "-i=192.168.2.171/23"]
env:
- name: POD_NAME
valueFrom:
fieldRef:
fieldPath: metadata.name
- name: POD_NAMESPACE
valueFrom:
fieldRef:
fieldPath: metadata.namespace
- name: POD_UUID
valueFrom:
fieldRef:
fieldPath: metadata.uid
volumeMounts:
- mountPath: /tmp/
name: grpc-sock
volumes:
- name: gnb-conf
configMap:
name: ueransim-configmap
items:
- key: free5gc-gnb.yaml
path: free5gc-gnb.yaml
| 26.368421 | 88 | 0.549568 |
7909a5dbe18dcb8414d9a8b2fbad51a3cbb9596b | 1,539 | yaml | YAML | config/manager/deployment.yaml | nRFCloud/cockroach-operator | 855a60c28ef48d80a73782c0e7ca063949aad0f4 | [
"Apache-2.0"
] | 1 | 2020-05-22T09:38:17.000Z | 2020-05-22T09:38:17.000Z | config/manager/deployment.yaml | nRFCloud/cockroach-operator | 855a60c28ef48d80a73782c0e7ca063949aad0f4 | [
"Apache-2.0"
] | 7 | 2020-05-07T18:54:53.000Z | 2020-06-01T15:31:25.000Z | config/manager/deployment.yaml | abhishekdwivedi3060/cockroach-operator | af6b92bec88c3ca8e0c2c63cbd9bc28c22705d0f | [
"Apache-2.0"
] | 1 | 2020-05-08T19:23:56.000Z | 2020-05-08T19:23:56.000Z | # Copyright 2022 The Cockroach Authors
#
# Licensed under the Apache License, Version 2.0 (the "License");
# you may not use this file except in compliance with the License.
# You may obtain a copy of the License at
#
# https://www.apache.org/licenses/LICENSE-2.0
#
# Unless required by applicable law or agreed to in writing, software
# distributed under the License is distributed on an "AS IS" BASIS,
# WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
# See the License for the specific language governing permissions and
# limitations under the License.
---
apiVersion: apps/v1
kind: Deployment
metadata:
name: manager
labels:
app: cockroach-operator
spec:
replicas: 1
selector:
matchLabels:
app: cockroach-operator
template:
metadata:
labels:
app: cockroach-operator
spec:
serviceAccountName: cockroach-operator-sa
containers:
- name: cockroach-operator
image: cockroachdb/cockroach-operator:latest
imagePullPolicy: IfNotPresent
args:
- -zap-log-level
- info
env:
- name: OPERATOR_NAME
value: cockroachdb
- name: POD_NAME
valueFrom:
fieldRef:
fieldPath: metadata.name
- name: NAMESPACE
valueFrom:
fieldRef:
fieldPath: metadata.namespace
resources:
requests:
cpu: 10m
memory: 32Mi
| 28.5 | 74 | 0.617284 |
7909bc947ef153597420def70506be9b4bc8f086 | 762 | yaml | YAML | config/webhook/service.yaml | Cogility/flink-on-k8s-operator | 5ad7cff42ae6f82b27463d6e4b66d37eb2b38bbd | [
"Apache-2.0"
] | 628 | 2019-09-05T20:05:46.000Z | 2022-03-30T09:08:13.000Z | config/webhook/service.yaml | Cogility/flink-on-k8s-operator | 5ad7cff42ae6f82b27463d6e4b66d37eb2b38bbd | [
"Apache-2.0"
] | 431 | 2019-09-20T19:40:47.000Z | 2022-03-30T09:49:27.000Z | config/webhook/service.yaml | Cogility/flink-on-k8s-operator | 5ad7cff42ae6f82b27463d6e4b66d37eb2b38bbd | [
"Apache-2.0"
] | 265 | 2019-09-06T22:12:01.000Z | 2022-03-23T07:01:02.000Z | # Copyright 2019 Google LLC
#
# Licensed under the Apache License, Version 2.0 (the "License");
# you may not use this file except in compliance with the License.
# You may obtain a copy of the License at
#
# https://www.apache.org/licenses/LICENSE-2.0
#
# Unless required by applicable law or agreed to in writing, software
# distributed under the License is distributed on an "AS IS" BASIS,
# WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
# See the License for the specific language governing permissions and
# limitations under the License.
apiVersion: v1
kind: Service
metadata:
name: webhook-service
namespace: system
spec:
ports:
- port: 443
targetPort: 443
selector:
control-plane: controller-manager
| 29.307692 | 74 | 0.746719 |
7909df30b5b3e1dd9cae0c95ce62fd05749d2993 | 1,846 | yaml | YAML | kubecode/deployment_django.yaml | EmpireErwinKooi/k8s-tutorial-python | 3e4bc13f293c02ece65ee590dc193c4e5ba10892 | [
"Apache-2.0"
] | null | null | null | kubecode/deployment_django.yaml | EmpireErwinKooi/k8s-tutorial-python | 3e4bc13f293c02ece65ee590dc193c4e5ba10892 | [
"Apache-2.0"
] | null | null | null | kubecode/deployment_django.yaml | EmpireErwinKooi/k8s-tutorial-python | 3e4bc13f293c02ece65ee590dc193c4e5ba10892 | [
"Apache-2.0"
] | null | null | null | apiVersion: apps/v1
kind: Deployment
metadata:
name: django-deployment
labels:
app: django
spec:
# Number of pods in the deployment's replica set
replicas: 2
selector:
matchLabels:
app: django
template:
metadata:
labels:
app: django
spec:
containers:
- name: django
# Notice the tag is also included in the image
image: kubernetes101/django_image:09f1419
ports:
- containerPort: 8000
# Minimum and maximum resources allocated to the container.
resources:
requests:
memory: "64Mi"
cpu: "200m"
limits:
memory: "128Mi"
cpu: "400m"
# Add envconfigmap configmap variables to the environment
envFrom:
- configMapRef:
name: postgres-config
env:
# POSTGRES_PASSWORD are defined in a secret called "db-password".
# These hold the database access information that is injected as environment variables
# into the django pod
- name: POSTGRES_PASSWORD
valueFrom:
secretKeyRef:
name: db-password
key: db-password
# The AWS credentials are needed for Django to put static files into an S3 bucket for the
# production deployment. Used by django-storages
- name: AWS_STORAGE_BUCKET_NAME
valueFrom:
secretKeyRef:
name: s3-secrets
key: s3bucket
- name: AWS_ACCESS_KEY_ID
valueFrom:
secretKeyRef:
name: s3-secrets
key: s3accesskey
- name: AWS_SECRET_ACCESS_KEY
valueFrom:
secretKeyRef:
name: s3-secrets
key: s3secretkey
| 29.774194 | 99 | 0.559588 |
7909e37b1cc18ef8b3e96077860f2af17a8b3ba0 | 271 | yaml | YAML | Devops/KUBERNETES/k8s/exemplo1/hpa.yaml | FranciscoWallison/Desenvolvimento-aplicacoes-com-micros-servicos | 98cef123aa0bd413285ec5dcce747881d43ebdc5 | [
"BSD-2-Clause"
] | 8 | 2021-09-14T16:08:41.000Z | 2022-02-14T17:59:55.000Z | Devops/KUBERNETES/k8s/exemplo1/hpa.yaml | FranciscoWallison/Desenvolvimento-aplicacoes-com-micros-servicos | 98cef123aa0bd413285ec5dcce747881d43ebdc5 | [
"BSD-2-Clause"
] | null | null | null | Devops/KUBERNETES/k8s/exemplo1/hpa.yaml | FranciscoWallison/Desenvolvimento-aplicacoes-com-micros-servicos | 98cef123aa0bd413285ec5dcce747881d43ebdc5 | [
"BSD-2-Clause"
] | 1 | 2021-09-14T16:08:31.000Z | 2021-09-14T16:08:31.000Z | apiVersion: autoscaling/v1
kind: HorizontalPodAutoscaler
metadata:
name: php-apache-hpa
spec:
maxReplicas: 5
minReplicas: 1
scaleTargetRef:
apiVersion: extensions/v1
kind: Deployment
name: php-apache-hpa
targetCPUUtilizationPercentage: 20 | 22.583333 | 36 | 0.738007 |
7909fbfae1a6ef1acb761f8843d4d0ad36ae6f24 | 419 | yaml | YAML | config-root/namespaces/keycloak/keycloak/charts/keycloak/keycloak-sa.yaml | vkvych-at-vitech/sdlc-env-1 | 148b679df9e8305d153c09e7408387736d96f622 | [
"Apache-2.0"
] | null | null | null | config-root/namespaces/keycloak/keycloak/charts/keycloak/keycloak-sa.yaml | vkvych-at-vitech/sdlc-env-1 | 148b679df9e8305d153c09e7408387736d96f622 | [
"Apache-2.0"
] | null | null | null | config-root/namespaces/keycloak/keycloak/charts/keycloak/keycloak-sa.yaml | vkvych-at-vitech/sdlc-env-1 | 148b679df9e8305d153c09e7408387736d96f622 | [
"Apache-2.0"
] | null | null | null | # Source: keycloak/charts/keycloak/templates/serviceaccount.yaml
apiVersion: v1
kind: ServiceAccount
metadata:
name: keycloak
labels:
helm.sh/chart: keycloak-9.5.0
app.kubernetes.io/name: keycloak
app.kubernetes.io/instance: keycloak
app.kubernetes.io/version: "11.0.2"
app.kubernetes.io/managed-by: Helm
gitops.jenkins-x.io/pipeline: 'namespaces'
namespace: keycloak
imagePullSecrets: []
| 27.933333 | 64 | 0.74463 |
790a49c344bc873cecf42ba1d392cdf8d3cfe643 | 197 | yaml | YAML | k8sManifests/metalLB-conf.yaml | binnes/k8s-RaspberryPi | 076392e1e15ec7904b5e230b3f395e1dd9f5562e | [
"Apache-2.0"
] | 6 | 2019-06-19T17:17:26.000Z | 2021-11-20T13:56:59.000Z | k8sManifests/metalLB-conf.yaml | binnes/k8s-RaspberryPi | 076392e1e15ec7904b5e230b3f395e1dd9f5562e | [
"Apache-2.0"
] | null | null | null | k8sManifests/metalLB-conf.yaml | binnes/k8s-RaspberryPi | 076392e1e15ec7904b5e230b3f395e1dd9f5562e | [
"Apache-2.0"
] | null | null | null | apiVersion: v1
kind: ConfigMap
metadata:
namespace: metallb-system
name: config
data:
config: |
address-pools:
- name: default
protocol: layer2
addresses:
- IPRange
| 15.153846 | 27 | 0.649746 |
790a6f566d8bb9321415e3eed044efdb6e1bc5b3 | 1,272 | yaml | YAML | manifests/benchmark/deploymentPrometheusOperator.yaml | awgreene/telemeter | b8fa131f1c911f46a89f0230d6d624500de0ee16 | [
"Apache-2.0"
] | null | null | null | manifests/benchmark/deploymentPrometheusOperator.yaml | awgreene/telemeter | b8fa131f1c911f46a89f0230d6d624500de0ee16 | [
"Apache-2.0"
] | null | null | null | manifests/benchmark/deploymentPrometheusOperator.yaml | awgreene/telemeter | b8fa131f1c911f46a89f0230d6d624500de0ee16 | [
"Apache-2.0"
] | null | null | null | apiVersion: apps/v1
kind: Deployment
metadata:
labels:
app.kubernetes.io/component: controller
app.kubernetes.io/name: prometheus-operator
app.kubernetes.io/version: v0.33.0
name: prometheus-operator
namespace: telemeter-benchmark
spec:
replicas: 1
selector:
matchLabels:
app.kubernetes.io/component: controller
app.kubernetes.io/name: prometheus-operator
template:
metadata:
labels:
app.kubernetes.io/component: controller
app.kubernetes.io/name: prometheus-operator
app.kubernetes.io/version: v0.33.0
spec:
containers:
- args:
- --kubelet-service=kube-system/kubelet
- --logtostderr=true
- --config-reloader-image=quay.io/coreos/configmap-reload:v0.0.1
- --prometheus-config-reloader=quay.io/coreos/prometheus-config-reloader:v0.33.0
image: quay.io/coreos/prometheus-operator:v0.33.0
name: prometheus-operator
ports:
- containerPort: 8080
name: http
resources:
limits:
cpu: 200m
memory: 200Mi
requests:
cpu: 100m
memory: 100Mi
nodeSelector:
beta.kubernetes.io/os: linux
serviceAccountName: prometheus-operator
| 28.909091 | 88 | 0.640723 |
790a9322e302601842883a7251787a82ff5c91b2 | 142 | yaml | YAML | built-in-references/Kubernetes/perf/violations/violation57.yaml | sw47/azure-policy | 4a38e4cb4047b5364902653f0defe45f1b21bc61 | [
"MIT"
] | null | null | null | built-in-references/Kubernetes/perf/violations/violation57.yaml | sw47/azure-policy | 4a38e4cb4047b5364902653f0defe45f1b21bc61 | [
"MIT"
] | null | null | null | built-in-references/Kubernetes/perf/violations/violation57.yaml | sw47/azure-policy | 4a38e4cb4047b5364902653f0defe45f1b21bc61 | [
"MIT"
] | null | null | null | apiVersion: v1
kind: Pod
metadata:
name: image-demo-57
spec:
containers:
- name: nginx
image: nginx #ritaacr.azurecr.io/nginx:latest | 17.75 | 49 | 0.71831 |
790aa805ff88552775f917c79e02091a6b11d1b9 | 397 | yaml | YAML | resources/manifests/coredns/cluster-role-binding.yaml | jValdron/terraform-render-bootstrap | 5353769db663814d3d91346068f3222709e1c0cd | [
"MIT"
] | 338 | 2020-02-21T23:17:27.000Z | 2022-03-12T15:01:28.000Z | resources/manifests/coredns/cluster-role-binding.yaml | aknuds1/terraform-render-bootstrap | 3734a5f94d806e66788af1ef021a0652ad6fc217 | [
"MIT"
] | 1,253 | 2020-02-24T10:03:19.000Z | 2022-02-24T09:52:17.000Z | resources/manifests/coredns/cluster-role-binding.yaml | aknuds1/terraform-render-bootstrap | 3734a5f94d806e66788af1ef021a0652ad6fc217 | [
"MIT"
] | 63 | 2017-10-04T15:49:34.000Z | 2019-08-29T15:24:29.000Z | apiVersion: rbac.authorization.k8s.io/v1
kind: ClusterRoleBinding
metadata:
name: system:coredns
labels:
kubernetes.io/bootstrapping: rbac-defaults
annotations:
rbac.authorization.kubernetes.io/autoupdate: "true"
roleRef:
apiGroup: rbac.authorization.k8s.io
kind: ClusterRole
name: system:coredns
subjects:
- kind: ServiceAccount
name: coredns
namespace: kube-system
| 23.352941 | 55 | 0.763224 |
790b07a03572b79127a161b32b17a24d8151be8e | 2,630 | yml | YAML | lab/kubernetes/domino/domino12.yml | edy/domino-docker | 5018402470cd62475f8a25a3352315ee972f6624 | [
"Apache-2.0"
] | 67 | 2018-11-13T08:39:32.000Z | 2022-02-15T09:12:17.000Z | lab/kubernetes/domino/domino12.yml | edy/domino-docker | 5018402470cd62475f8a25a3352315ee972f6624 | [
"Apache-2.0"
] | 30 | 2018-11-22T19:15:55.000Z | 2022-03-04T18:19:43.000Z | lab/kubernetes/domino/domino12.yml | edy/domino-docker | 5018402470cd62475f8a25a3352315ee972f6624 | [
"Apache-2.0"
] | 52 | 2018-11-22T18:36:23.000Z | 2022-03-15T19:34:01.000Z | apiVersion: v1
kind: Pod
metadata:
name: domino12
namespace: default
labels:
app: hcl-domino
spec:
imagePullSecrets:
- name: regcred
securityContext:
runAsNonRoot: true
runAsUser: 1000
fsGroup: 1000
fsGroupChangePolicy: "OnRootMismatch"
containers:
- env:
- name: LANG
value: "en_US.UTF-8"
- name: DOMINO_DOCKER_STDOUT
value: "yes"
- name: SetupAutoConfigure
value: "1"
- name: SERVERSETUP_SERVER_TYPE
value: first
- name: SERVERSETUP_ADMIN_FIRSTNAME
value: "Martin"
- name: SERVERSETUP_ADMIN_LASTNAME
value: "Bishop"
- name: SERVERSETUP_ADMIN_PASSWORD
value: "2manysecrets"
- name: SERVERSETUP_ADMIN_IDFILEPATH
value: "/local/notesdata/domino/html/admin.id"
- name: SERVERSETUP_NETWORK_HOSTNAME
value: "master.domino-lab.net"
- name: SERVERSETUP_ORG_CERTIFIERPASSWORD
value: "2manysecrets"
- name: SERVERSETUP_SERVER_DOMAINNAME
value: "DominoLab"
- name: SERVERSETUP_ORG_ORGNAME
value: "DominoLab"
- name: SERVERSETUP_SERVER_NAME
value: "master.domino.lab"
- name: SERVERSETUP_SERVER_SERVERTASKS
value: "replica,router,update,amgr,adminp,http,certmgr -ACCEPT_TOU_AUTO_CONFIG"
- name: SERVERSETUP_SECURITY_ACL_PROHIBITANONYMOUSACCESS
value: "true"
- name: SERVERSETUP_SECURITY_ACL_ADDLOCALDOMAINADMINS
value: "true"
name: domino12
image: registry.domino-lab.net:5000/hclcom/domino:latest
securityContext:
capabilities:
add: ["SYS_PTRACE"]
runAsNonRoot: true
runAsUser: 1000
volumeMounts:
- name: domino-data
mountPath: /local
ports:
- containerPort: 1352
protocol: TCP
- containerPort: 80
protocol: TCP
- containerPort: 443
protocol: TCP
livenessProbe:
exec:
command:
- /domino_docker_healthcheck.sh
initialDelaySeconds: 60
periodSeconds: 20
readinessProbe:
exec:
command:
- /domino_docker_healthcheck.sh
- ready
initialDelaySeconds: 60
periodSeconds: 20
# this init container is a work-around to change file-system permissions for some local stoarge providers
initContainers:
- name: domino-startup
image: busybox:latest
command: [ 'sh', '-c', 'chmod 777 /local' ]
securityContext:
privileged: true
runAsNonRoot: false
runAsUser: 0
volumeMounts:
- name: domino-data
mountPath: /local
volumes:
- name: domino-data
persistentVolumeClaim:
claimName: local-path-pvc
| 19.774436 | 107 | 0.660837 |
790b2e1e4c844a823d6b4234d62d4d9d07de921e | 476 | yaml | YAML | charts/enterprise-metrics/exports/small/v1.Service-enterprise-metrics-ruler.yaml | sbcd90/helm-charts | cd8ad2891a8c22bb34f77570795f4afb24014e54 | [
"Apache-2.0"
] | null | null | null | charts/enterprise-metrics/exports/small/v1.Service-enterprise-metrics-ruler.yaml | sbcd90/helm-charts | cd8ad2891a8c22bb34f77570795f4afb24014e54 | [
"Apache-2.0"
] | null | null | null | charts/enterprise-metrics/exports/small/v1.Service-enterprise-metrics-ruler.yaml | sbcd90/helm-charts | cd8ad2891a8c22bb34f77570795f4afb24014e54 | [
"Apache-2.0"
] | 1 | 2021-08-24T06:20:48.000Z | 2021-08-24T06:20:48.000Z | apiVersion: v1
kind: Service
metadata:
labels:
app: enterprise-metrics-ruler
app.kubernetes.io/managed-by: Helmraiser
chart: enterprise-metrics-1.4.2
heritage: Helm
release: enterprise-metrics
name: enterprise-metrics-ruler
namespace: enterprise-metrics
spec:
ports:
- name: http-metrics
port: 8080
protocol: TCP
targetPort: http-metrics
selector:
app: enterprise-metrics-ruler
release: enterprise-metrics
type: ClusterIP
| 21.636364 | 44 | 0.720588 |
790b4faeaa3c635e84ab249645e7d7865cf900ff | 4,284 | yaml | YAML | tests/helm/tracing/static/collection-monitoring-false.output.yaml | jmroz-sumo/sumologic-kubernetes-collection | aba8c051c4a415270b17095467826892bc46ee2b | [
"Apache-2.0"
] | null | null | null | tests/helm/tracing/static/collection-monitoring-false.output.yaml | jmroz-sumo/sumologic-kubernetes-collection | aba8c051c4a415270b17095467826892bc46ee2b | [
"Apache-2.0"
] | null | null | null | tests/helm/tracing/static/collection-monitoring-false.output.yaml | jmroz-sumo/sumologic-kubernetes-collection | aba8c051c4a415270b17095467826892bc46ee2b | [
"Apache-2.0"
] | null | null | null | ---
# Source: sumologic/templates/traces/otelcol/configmap.yaml
apiVersion: v1
kind: ConfigMap
metadata:
name: RELEASE-NAME-sumologic-otelcol
labels:
app: RELEASE-NAME-sumologic-fluentd-metrics
chart: "sumologic-%CURRENT_CHART_VERSION%"
release: "RELEASE-NAME"
heritage: "Helm"
data:
traces.otelcol.conf.yaml: |
exporters:
otlphttp:
compression: gzip
traces_endpoint: ${SUMO_ENDPOINT_DEFAULT_TRACES_SOURCE}
sumologic:
compress_encoding: gzip
endpoint: ${SUMO_ENDPOINT_DEFAULT_METRICS_SOURCE}
log_format: text
max_request_body_size: 1048576
metadata_attributes:
- k8s.*
- host.name
metric_format: prometheus
retry_on_failure:
enabled: true
initial_interval: 5s
max_elapsed_time: 120s
max_interval: 30s
sending_queue:
enabled: false
num_consumers: 10
queue_size: 5000
source_category: "%{namespace}/%{pod_name}"
source_host: '%{host.name}'
source_name: "%{namespace}.%{pod}.%{container}"
timeout: 5s
zipkin:
endpoint: ${SUMO_ENDPOINT_DEFAULT_TRACES_SOURCE}
extensions:
health_check: {}
memory_ballast:
size_mib: 683
processors:
batch:
send_batch_max_size: 512
send_batch_size: 256
timeout: 5s
cascading_filter:
num_traces: 200000
k8s_tagger:
extract:
annotations:
- key: '*'
tag_name: k8s.pod.annotation.%s
labels:
- key: '*'
tag_name: k8s.pod.label.%s
metadata:
- containerId
- containerName
- clusterName
- daemonSetName
- deploymentName
- hostName
- namespace
- nodeName
- podId
- podName
- replicaSetName
- serviceName
- statefulSetName
namespace_labels:
- key: '*'
tag_name: k8s.namespace.label.%s
owner_lookup_enabled: true
passthrough: false
memory_limiter:
check_interval: 5s
limit_mib: 1900
resource:
attributes:
- action: upsert
key: k8s.cluster.name
value: kubernetes
resourcedetection:
detectors:
- system
override: false
timeout: 10s
source:
annotation_prefix: k8s.pod.annotation.
collector: "kubernetes"
container_key: k8s.container.name
exclude_container_regex: ""
exclude_host_regex: ""
exclude_namespace_regex: "sumologic|foo"
exclude_pod_regex: ""
namespace_key: k8s.namespace.name
pod_key: k8s.pod.name
pod_name_key: k8s.pod.pod_name
pod_template_hash_key: k8s.pod.label.pod-template-hash
source_category: "%{namespace}/%{pod_name}"
source_category_prefix: "kubernetes/"
source_category_replace_dash: "/"
source_host_key: k8s.pod.hostname
source_name: "%{namespace}.%{pod}.%{container}"
receivers:
jaeger:
protocols:
grpc:
endpoint: 0.0.0.0:14250
thrift_binary:
endpoint: 0.0.0.0:6832
thrift_compact:
endpoint: 0.0.0.0:6831
thrift_http:
endpoint: 0.0.0.0:14268
opencensus:
endpoint: 0.0.0.0:55678
otlp:
protocols:
grpc:
endpoint: 0.0.0.0:4317
http:
endpoint: 0.0.0.0:55681
zipkin:
endpoint: 0.0.0.0:9411
service:
extensions:
- health_check
- memory_ballast
pipelines:
metrics:
exporters:
- sumologic
processors:
- memory_limiter
- k8s_tagger
- resourcedetection
- resource
- batch
receivers:
- otlp
traces:
exporters:
- otlphttp
processors:
- memory_limiter
- k8s_tagger
- source
- resource
- cascading_filter
- batch
receivers:
- jaeger
- opencensus
- otlp
- zipkin
| 26.444444 | 63 | 0.55112 |
790b681772599c43f2a9ba20ffe40a2890547184 | 452 | yaml | YAML | yaml/edge-worker.yaml | mfatihaktas/edge-load-balance | b866ca47ba37a605eeba05658b1d302f6855a23f | [
"MIT"
] | null | null | null | yaml/edge-worker.yaml | mfatihaktas/edge-load-balance | b866ca47ba37a605eeba05658b1d302f6855a23f | [
"MIT"
] | null | null | null | yaml/edge-worker.yaml | mfatihaktas/edge-load-balance | b866ca47ba37a605eeba05658b1d302f6855a23f | [
"MIT"
] | null | null | null | apiVersion: apps/v1
kind: Deployment
metadata:
name: edge-worker
labels:
app: edge-worker
spec:
replicas: 2
selector:
matchLabels:
app: edge-worker
template:
metadata:
labels:
app: edge-worker
spec:
containers:
- name: edge-worker
image: mfatihaktas/edge-load-balance
ports:
- containerPort: 5000
command: ["python3", "-u"]
args: ["/home/app/worker.py"]
| 18.833333 | 44 | 0.588496 |
790b6a6c56b2f428d4eca8bdb57b8f6bb61b9f37 | 87 | yaml | YAML | config/rbac/topolvm_node_service_account.yaml | nbalacha/lvm-operator | c7d35aeb5bede9e280e5d199c2e5ff64d4ac25a6 | [
"Apache-2.0"
] | 8 | 2021-12-10T13:52:44.000Z | 2022-03-03T15:40:34.000Z | config/rbac/topolvm_node_service_account.yaml | nbalacha/lvm-operator | c7d35aeb5bede9e280e5d199c2e5ff64d4ac25a6 | [
"Apache-2.0"
] | 129 | 2021-12-02T11:08:54.000Z | 2022-03-31T13:57:56.000Z | config/rbac/topolvm_node_service_account.yaml | nbalacha/lvm-operator | c7d35aeb5bede9e280e5d199c2e5ff64d4ac25a6 | [
"Apache-2.0"
] | 12 | 2021-12-02T06:15:02.000Z | 2022-03-28T11:35:33.000Z | apiVersion: v1
kind: ServiceAccount
metadata:
name: topolvm-node
namespace: system
| 14.5 | 20 | 0.781609 |
790bd94885cda2288730f1b7ffc70606b1cc8429 | 617 | yaml | YAML | block-storage-attacher/tests/e2e/deploy/clusterrole.yaml | mumutyal/ibmcloud-storage-utilities | 5b04125ddf1fe3206e19974ee3d4728a79745d91 | [
"Apache-2.0"
] | 4 | 2018-12-31T23:36:47.000Z | 2022-03-15T08:34:14.000Z | block-storage-attacher/tests/e2e/deploy/clusterrole.yaml | mumutyal/ibmcloud-storage-utilities | 5b04125ddf1fe3206e19974ee3d4728a79745d91 | [
"Apache-2.0"
] | 23 | 2018-10-29T22:16:20.000Z | 2022-02-02T04:59:48.000Z | block-storage-attacher/tests/e2e/deploy/clusterrole.yaml | mumutyal/ibmcloud-storage-utilities | 5b04125ddf1fe3206e19974ee3d4728a79745d91 | [
"Apache-2.0"
] | 54 | 2018-10-16T19:40:27.000Z | 2022-01-06T09:44:27.000Z | kind: ClusterRole
apiVersion: rbac.authorization.k8s.io/v1alpha1
metadata:
name: armada-storage-e2e-runner
rules:
- apiGroups: [""]
resources: ["persistentvolumes"]
verbs: ["get", "list", "watch", "create", "delete"]
- apiGroups: [""]
resources: ["persistentvolumeclaims"]
verbs: ["get", "list", "watch", "update"]
- apiGroups: ["storage.k8s.io"]
resources: ["storageclasses"]
verbs: ["get", "list", "watch"]
- apiGroups: [""]
resources: ["events"]
verbs: ["watch", "create", "update", "patch"]
- apiGroups: [""]
resources: ["services", "endpoints"]
verbs: ["get"]
| 29.380952 | 55 | 0.6094 |
790c4de14977945700b6354751b301c16ae3e05d | 331 | yaml | YAML | kubernetes-storage/hw/pod.yaml | otus-kuber-2019-06/Win32Sector_platform | ef0e530c8df7dcc26928f1382a925f5118a28f14 | [
"MIT"
] | null | null | null | kubernetes-storage/hw/pod.yaml | otus-kuber-2019-06/Win32Sector_platform | ef0e530c8df7dcc26928f1382a925f5118a28f14 | [
"MIT"
] | null | null | null | kubernetes-storage/hw/pod.yaml | otus-kuber-2019-06/Win32Sector_platform | ef0e530c8df7dcc26928f1382a925f5118a28f14 | [
"MIT"
] | null | null | null | apiVersion: v1
kind: Pod
metadata:
name: storage-pod
spec:
containers:
- name: storage-pod
image: ubuntu
command: ["/bin/bash", "-ec", "while :; do sleep 2; done"]
volumeMounts:
- mountPath: /data
name: storage-pvc
volumes:
- name: storage-pvc
persistentVolumeClaim:
claimName: storage-pvc | 20.6875 | 62 | 0.643505 |
790c95fb4af1eb0e511d15591f071d6506eb9d4c | 477 | yaml | YAML | secret-operator/src/test/resources/supersecret-secret.yaml | lreimer/graal-operators | a18a9e82468d3bc6592a71478a478d371d3fa079 | [
"MIT"
] | 7 | 2019-12-30T22:18:11.000Z | 2022-01-18T15:00:13.000Z | secret-operator/src/test/resources/supersecret-secret.yaml | lreimer/graal-operators | a18a9e82468d3bc6592a71478a478d371d3fa079 | [
"MIT"
] | null | null | null | secret-operator/src/test/resources/supersecret-secret.yaml | lreimer/graal-operators | a18a9e82468d3bc6592a71478a478d371d3fa079 | [
"MIT"
] | 2 | 2021-02-05T08:49:23.000Z | 2021-07-15T08:03:14.000Z | apiVersion: v1
kind: Secret
metadata:
name: supersecret-secret
data:
publicKey: MIIBIjANBgkqhkiG9w0BAQEFAAOCAQ8AMIIBCgKCAQEAxypyzd575MVvi2eUbIdG/89afyfuBU+anCX5758gJaMkBUy6HdnVMNhuF/QWCVmOrF/o0RzI/BSn5XSAgaEOfKsFnEOF5MVswwPSb3XhKNTN7B0ZEJ7r8tibMFjWfVt7bBV0etVm5ZrXYBERJtDvU7i9PCCLmNmBgf8bqjFzQ9Y78XzbQ2JixR6wZX0HgdF7NbC4UarrYd4sWU1juZU3QjjdzhrPfOonN390h0/kdCnXp8rRdaP1bpmZJ0rFAVJ2l8kWRgtVqxcq053Ffp3UCnhcKGerprpbwCwX9ARyAMw1V7xD4PhNOvFphV8ZMV1z3r4M8Dk64/EgW78Tnp7apQIDAQAB
| 68.142857 | 405 | 0.9413 |
790cd7fc66d13c8346ee044484a2eddd4885b291 | 206 | yaml | YAML | charts/hadoop/templates/mysql-service.yaml | CrazyGirlFriend/helm3catalog | 725805e1a5121083fcf142b3578fa7ae3ef94848 | [
"Apache-2.0"
] | 16 | 2021-05-16T03:07:49.000Z | 2021-06-18T03:02:54.000Z | charts/hadoop/templates/mysql-service.yaml | CrazyGirlFriend/helm3catalog | 725805e1a5121083fcf142b3578fa7ae3ef94848 | [
"Apache-2.0"
] | null | null | null | charts/hadoop/templates/mysql-service.yaml | CrazyGirlFriend/helm3catalog | 725805e1a5121083fcf142b3578fa7ae3ef94848 | [
"Apache-2.0"
] | null | null | null | apiVersion: v1
kind: Service
metadata:
name: mysql
labels:
name: mysql
spec:
type: NodePort
ports:
- port: 3306
protocol: TCP
targetPort: 3306
name: http
selector:
app: mysql | 13.733333 | 20 | 0.645631 |
790d61ce94106aa1aac71ac604d0cd94a7065222 | 432 | yaml | YAML | executor/ansible/provider/local-pv/templates/pv.yaml | DipanshKhandelwal/litmus | 69c679f9fc59fcd23f9d8daa2fddb766b559cbc8 | [
"Apache-2.0"
] | 1 | 2019-10-16T20:33:40.000Z | 2019-10-16T20:33:40.000Z | executor/ansible/provider/local-pv/templates/pv.yaml | DipanshKhandelwal/litmus | 69c679f9fc59fcd23f9d8daa2fddb766b559cbc8 | [
"Apache-2.0"
] | null | null | null | executor/ansible/provider/local-pv/templates/pv.yaml | DipanshKhandelwal/litmus | 69c679f9fc59fcd23f9d8daa2fddb766b559cbc8 | [
"Apache-2.0"
] | null | null | null | ---
apiVersion: v1
kind: PersistentVolume
metadata:
name: local-pv
spec:
capacity:
storage: 5G
accessModes:
- ReadWriteOnce
persistentVolumeReclaimPolicy: Retain
storageClassName: local-storage
local:
path: /mnt/disks/vol1
nodeAffinity:
required:
nodeSelectorTerms:
- matchExpressions:
- key: kubernetes.io/hostname
operator: In
values:
- kubeminion-01
| 18.782609 | 39 | 0.657407 |
790d7633f611f373b70fc0172bb94c7f1f8a4748 | 973 | yaml | YAML | jenkins/04-jenkins-deployment.yaml | bbende/k3s-config | 9b771ab704054d2032b8a2e099d19649e32a4e40 | [
"Apache-2.0"
] | 1 | 2021-09-23T09:31:31.000Z | 2021-09-23T09:31:31.000Z | jenkins/04-jenkins-deployment.yaml | bbende/k3s-config | 9b771ab704054d2032b8a2e099d19649e32a4e40 | [
"Apache-2.0"
] | null | null | null | jenkins/04-jenkins-deployment.yaml | bbende/k3s-config | 9b771ab704054d2032b8a2e099d19649e32a4e40 | [
"Apache-2.0"
] | 1 | 2021-11-29T20:41:53.000Z | 2021-11-29T20:41:53.000Z | apiVersion: apps/v1
kind: Deployment
metadata:
name: jenkins
namespace: jenkins
spec:
replicas: 1
selector:
matchLabels:
app: jenkins-server
template:
metadata:
labels:
app: jenkins-server
spec:
securityContext:
fsGroup: 1000
runAsUser: 1000
serviceAccountName: jenkins-admin
containers:
- name: jenkins
image: jenkins4eval/jenkins:latest
resources:
limits:
memory: "1Gi"
cpu: "1000m"
requests:
memory: "500Mi"
cpu: "500m"
ports:
- name: httpport
containerPort: 8080
- name: jnlpport
containerPort: 50000
volumeMounts:
- name: jenkins-data
mountPath: /var/jenkins_home
volumes:
- name: jenkins-data
persistentVolumeClaim:
claimName: jenkins-pvc
| 23.166667 | 44 | 0.524152 |
790d9a5de10b49974897cbe4641f4e05b65a6ed7 | 203 | yaml | YAML | integration/init/istio/expected/base/charts/sidecarInjectorWebhook/templates/serviceaccount.yaml | joeyb/ship | 871abc30582a80f5f6313b5e5c778c9df83f1286 | [
"Apache-2.0"
] | null | null | null | integration/init/istio/expected/base/charts/sidecarInjectorWebhook/templates/serviceaccount.yaml | joeyb/ship | 871abc30582a80f5f6313b5e5c778c9df83f1286 | [
"Apache-2.0"
] | null | null | null | integration/init/istio/expected/base/charts/sidecarInjectorWebhook/templates/serviceaccount.yaml | joeyb/ship | 871abc30582a80f5f6313b5e5c778c9df83f1286 | [
"Apache-2.0"
] | null | null | null | apiVersion: v1
kind: ServiceAccount
metadata:
labels:
app: sidecarInjectorWebhook
istio: sidecar-injector
release: istio
name: istio-sidecar-injector-service-account
namespace: default
| 20.3 | 46 | 0.763547 |
790dacfa994935bd1258bb689ca075e8a5187bf5 | 144 | yaml | YAML | built-in-references/Kubernetes/perf/violations/violation4295.yaml | sw47/azure-policy | 4a38e4cb4047b5364902653f0defe45f1b21bc61 | [
"MIT"
] | null | null | null | built-in-references/Kubernetes/perf/violations/violation4295.yaml | sw47/azure-policy | 4a38e4cb4047b5364902653f0defe45f1b21bc61 | [
"MIT"
] | null | null | null | built-in-references/Kubernetes/perf/violations/violation4295.yaml | sw47/azure-policy | 4a38e4cb4047b5364902653f0defe45f1b21bc61 | [
"MIT"
] | null | null | null | apiVersion: v1
kind: Pod
metadata:
name: image-demo-4295
spec:
containers:
- name: nginx
image: nginx #ritaacr.azurecr.io/nginx:latest | 18 | 49 | 0.722222 |
790de3913c9b9394d5040bea6f932daf95a8a5d4 | 288 | yml | YAML | Source/K8s/azure-storage-secret.yml | dolittle-casestudies/ocfev | e485ea33132eaf67a27a1dc6060a4afe7c5a14f8 | [
"MIT"
] | 1 | 2018-06-08T08:48:42.000Z | 2018-06-08T08:48:42.000Z | Source/K8s/azure-storage-secret.yml | dolittle-casestudies/ocfev | e485ea33132eaf67a27a1dc6060a4afe7c5a14f8 | [
"MIT"
] | 39 | 2018-05-16T06:57:05.000Z | 2018-06-14T12:57:59.000Z | Source/K8s/azure-storage-secret.yml | dolittle-casestudies/ocfev | e485ea33132eaf67a27a1dc6060a4afe7c5a14f8 | [
"MIT"
] | 2 | 2018-05-28T10:21:26.000Z | 2021-09-15T12:00:18.000Z | apiVersion: v1
kind: Secret
metadata:
name: azure-storage-secret
namespace: ocfev
type: Opaque
data:
azurestorageaccountname: b2NmZXY=
azurestorageaccountkey: alhGZWUwU0I3NVd2K0FGU0Ntd2ZVUzh0NzN1VHpYZjRsaC9IZGxyZEtwTEFOUnRyUkJWdTZrRUZnWlF4L2cyaG1Jd1ZhcUl2Zkc1S0RTZXdydHk5dWc9PQ==
| 28.8 | 146 | 0.868056 |
790df257dfdf7889c09281f2a89996b5f03b03f5 | 3,233 | yaml | YAML | kubernetes1.2/roles/master/files/skydns-rc.yaml | cloudawan/cloudawan_install | ee0dae116a413feda09a71db0df986c4a3004d75 | [
"Apache-2.0"
] | null | null | null | kubernetes1.2/roles/master/files/skydns-rc.yaml | cloudawan/cloudawan_install | ee0dae116a413feda09a71db0df986c4a3004d75 | [
"Apache-2.0"
] | null | null | null | kubernetes1.2/roles/master/files/skydns-rc.yaml | cloudawan/cloudawan_install | ee0dae116a413feda09a71db0df986c4a3004d75 | [
"Apache-2.0"
] | null | null | null | apiVersion: v1
kind: ReplicationController
metadata:
name: kube-dns-v10
namespace: kube-system
labels:
k8s-app: kube-dns
version: v10
kubernetes.io/cluster-service: "true"
spec:
replicas: 1
selector:
k8s-app: kube-dns
version: v10
template:
metadata:
labels:
k8s-app: kube-dns
version: v10
kubernetes.io/cluster-service: "true"
spec:
containers:
- name: etcd
image: gcr.io/google_containers/etcd:2.0.9
resources:
# keep request = limit to keep this container in guaranteed class
limits:
cpu: 100m
memory: 50Mi
requests:
cpu: 100m
memory: 50Mi
command:
- /usr/local/bin/etcd
- -data-dir
- /var/etcd/data
- -listen-client-urls
- http://127.0.0.1:2379,http://127.0.0.1:4001
- -advertise-client-urls
- http://127.0.0.1:2379,http://127.0.0.1:4001
- -initial-cluster-token
- skydns-etcd
volumeMounts:
- name: etcd-storage
mountPath: /var/etcd/data
- name: kube2sky
image: gcr.io/google_containers/kube2sky:1.12
resources:
# keep request = limit to keep this container in guaranteed class
limits:
cpu: 100m
memory: 50Mi
requests:
cpu: 100m
memory: 50Mi
args:
# command = "/kube2sky"
- --domain=cluster.local
- name: skydns
image: gcr.io/google_containers/skydns:2015-10-13-8c72f8c
resources:
# keep request = limit to keep this container in guaranteed class
limits:
cpu: 100m
memory: 50Mi
requests:
cpu: 100m
memory: 50Mi
args:
# command = "/skydns"
- -machines=http://127.0.0.1:4001
- -addr=0.0.0.0:53
- -ns-rotate=false
- -domain=cluster.local.
ports:
- containerPort: 53
name: dns
protocol: UDP
- containerPort: 53
name: dns-tcp
protocol: TCP
livenessProbe:
httpGet:
path: /healthz
port: 8080
scheme: HTTP
initialDelaySeconds: 30
timeoutSeconds: 5
readinessProbe:
httpGet:
path: /healthz
port: 8080
scheme: HTTP
initialDelaySeconds: 1
timeoutSeconds: 5
- name: healthz
image: gcr.io/google_containers/exechealthz:1.0
resources:
# keep request = limit to keep this container in guaranteed class
limits:
cpu: 10m
memory: 20Mi
requests:
cpu: 10m
memory: 20Mi
args:
- -cmd=nslookup kubernetes.default.svc.cluster.local 127.0.0.1 >/dev/null
- -port=8080
ports:
- containerPort: 8080
protocol: TCP
volumes:
- name: etcd-storage
emptyDir: {}
dnsPolicy: Default # Don't use cluster DNS.
| 27.87069 | 82 | 0.506341 |
790dfa76e9600480cc90a87ec87e8915cb30b8b7 | 543 | yaml | YAML | assets/prometheus-k8s/service-account.yaml | lack/cluster-monitoring-operator | a227f52b202b322bcf3dea7230c6cb0a86b9865b | [
"Apache-2.0"
] | null | null | null | assets/prometheus-k8s/service-account.yaml | lack/cluster-monitoring-operator | a227f52b202b322bcf3dea7230c6cb0a86b9865b | [
"Apache-2.0"
] | 1 | 2021-04-16T10:19:44.000Z | 2021-04-16T10:19:44.000Z | assets/prometheus-k8s/service-account.yaml | lack/cluster-monitoring-operator | a227f52b202b322bcf3dea7230c6cb0a86b9865b | [
"Apache-2.0"
] | null | null | null | apiVersion: v1
kind: ServiceAccount
metadata:
annotations:
serviceaccounts.openshift.io/oauth-redirectreference.prometheus-k8s: '{"kind":"OAuthRedirectReference","apiVersion":"v1","reference":{"kind":"Route","name":"prometheus-k8s"}}'
labels:
app.kubernetes.io/component: prometheus
app.kubernetes.io/managed-by: cluster-monitoring-operator
app.kubernetes.io/name: prometheus
app.kubernetes.io/part-of: openshift-monitoring
app.kubernetes.io/version: 2.24.0
name: prometheus-k8s
namespace: openshift-monitoring
| 38.785714 | 179 | 0.758748 |
790e44307d2a9e1396a12ead9103d4d72317c82f | 83 | yaml | YAML | config/rbac/edge_api_service_account.yaml | gciavarrini/k4e-operator | 93aad5c0cfbb4ef9065701613c1c53ed2d39b448 | [
"Apache-2.0"
] | 7 | 2022-02-01T16:13:22.000Z | 2022-03-24T01:35:59.000Z | config/rbac/edge_api_service_account.yaml | gciavarrini/k4e-operator | 93aad5c0cfbb4ef9065701613c1c53ed2d39b448 | [
"Apache-2.0"
] | 31 | 2022-02-04T15:12:04.000Z | 2022-03-31T15:01:12.000Z | config/rbac/edge_api_service_account.yaml | gciavarrini/k4e-operator | 93aad5c0cfbb4ef9065701613c1c53ed2d39b448 | [
"Apache-2.0"
] | 3 | 2022-02-11T01:33:44.000Z | 2022-03-14T03:51:57.000Z | apiVersion: v1
kind: ServiceAccount
metadata:
name: edge-api
namespace: system
| 13.833333 | 20 | 0.771084 |
790e4b8dad1bbbc9384b8e944f77ac7fd8e3e5b5 | 620 | yml | YAML | postgres/storage.yml | matakan/atlassian-jira-datacenter | c68a8175e34eebbb79d9b7ed93c21bfb04277a7b | [
"PostgreSQL"
] | null | null | null | postgres/storage.yml | matakan/atlassian-jira-datacenter | c68a8175e34eebbb79d9b7ed93c21bfb04277a7b | [
"PostgreSQL"
] | null | null | null | postgres/storage.yml | matakan/atlassian-jira-datacenter | c68a8175e34eebbb79d9b7ed93c21bfb04277a7b | [
"PostgreSQL"
] | null | null | null | #---
#apiVersion: v1
#kind: PersistentVolumeClaim
#metadata:
# name: postgres
# namespace: jira
#spec:
# accessModes:
# - ReadWriteMany
# storageClassName: "postgres"
# resources:
# requests:
# storage: 5Gi
#---
#apiVersion: v1
#kind: PersistentVolume
#metadata:
# namespace: jira
# name: postgres
#spec:
# capacity:
# storage: 5Gi
# accessModes:
# - ReadWriteMany
# storageClassName: "postgres"
# hostPath:
# path: "/var/data"
---
apiVersion: v1
kind: PersistentVolumeClaim
metadata:
name: postgres-pvc
spec:
accessModes:
- ReadWriteOnce
resources:
requests:
storage: 8Gi
| 15.897436 | 31 | 0.674194 |
790e62a11aea8b96843a9c312a9585b751bcf2e1 | 389 | yaml | YAML | config/rbac/application_editor_role.yaml | modoki-paas/modoki-operator | e82d05c749e1157949a4b554638729e161f799e9 | [
"MIT"
] | null | null | null | config/rbac/application_editor_role.yaml | modoki-paas/modoki-operator | e82d05c749e1157949a4b554638729e161f799e9 | [
"MIT"
] | 6 | 2020-07-24T14:15:56.000Z | 2020-10-19T09:09:04.000Z | config/rbac/application_editor_role.yaml | modoki-paas/modoki-operator | e82d05c749e1157949a4b554638729e161f799e9 | [
"MIT"
] | null | null | null | # permissions for end users to edit applications.
apiVersion: rbac.authorization.k8s.io/v1
kind: ClusterRole
metadata:
name: application-editor-role
rules:
- apiGroups:
- modoki.tsuzu.dev
resources:
- applications
verbs:
- create
- delete
- get
- list
- patch
- update
- watch
- apiGroups:
- modoki.tsuzu.dev
resources:
- applications/status
verbs:
- get
| 15.56 | 49 | 0.691517 |
790e7f9752bec0e0932f3fe8c9adb2d87e07e7ba | 760 | yaml | YAML | Documentation/files/logging/fluentd-aggregator-svc.yaml | trescst/tectonic-installer | ac53505c0301d3a909a0032472d350a1cb58a888 | [
"Apache-2.0"
] | 46 | 2017-09-18T08:31:19.000Z | 2022-01-31T00:30:03.000Z | Documentation/files/logging/fluentd-aggregator-svc.yaml | trescst/tectonic-installer | ac53505c0301d3a909a0032472d350a1cb58a888 | [
"Apache-2.0"
] | 59 | 2017-08-31T15:45:49.000Z | 2019-02-27T11:55:00.000Z | Documentation/files/logging/fluentd-aggregator-svc.yaml | trescst/tectonic-installer | ac53505c0301d3a909a0032472d350a1cb58a888 | [
"Apache-2.0"
] | 71 | 2017-08-28T23:20:26.000Z | 2022-03-03T21:00:27.000Z | apiVersion: v1
kind: Service
metadata:
name: fluentd-aggregator
namespace: logging
labels:
k8s-app: fluentd-aggregator
spec:
type: ClusterIP
selector:
k8s-app: fluentd-aggregator
ports:
- name: fluentd-input
port: 24224
targetPort: fwd-input
protocol: TCP
- name: fluentd-input-udp
port: 24224
targetPort: fwd-input-udp
protocol: UDP
# Exposes Prometheus metrics
- name: prometheus-metrics
port: 24231
targetPort: prom-metrics
protocol: TCP
# Can be accessed using "kubectl proxy" at:
# http://127.0.0.1:8001/api/v1/proxy/namespaces/kube-system/services/fluentd-aggregator:monitor-agent/api/plugins.json
- name: monitor-agent
port: 24220
targetPort: monitor-agent
protocol: TCP
| 23.75 | 120 | 0.703947 |
790e855d3c88a7748c4dafa05de7a015e3d85e26 | 2,501 | yaml | YAML | upgrade/kubelet/yaml/crd/crd.yaml | ihcsim/controllers | cd2ae03341b48f02f93a01d9bac2d3b3e864591f | [
"Apache-2.0"
] | 2 | 2021-02-05T21:00:00.000Z | 2021-05-20T14:24:00.000Z | upgrade/kubelet/yaml/crd/crd.yaml | ihcsim/controllers | cd2ae03341b48f02f93a01d9bac2d3b3e864591f | [
"Apache-2.0"
] | null | null | null | upgrade/kubelet/yaml/crd/crd.yaml | ihcsim/controllers | cd2ae03341b48f02f93a01d9bac2d3b3e864591f | [
"Apache-2.0"
] | 1 | 2021-05-11T23:07:09.000Z | 2021-05-11T23:07:09.000Z | apiVersion: apiextensions.k8s.io/v1
kind: CustomResourceDefinition
metadata:
name: kubeletupgrades.clusterop.isim.dev
spec:
names:
categories: ["clusterop"]
kind: KubeletUpgrade
listKind: KubeletUpgradeList
plural: kubeletupgrades
shortNames: ["kc"]
singular: kubeletupgrade
group: clusterop.isim.dev
scope: Cluster
versions:
- name: v1alpha1
served: true
storage: true
subresources:
status: {}
additionalPrinterColumns:
- name: Kubelet Version
description: The kubelet version of the last successful upgrade.
jsonPath: .status.kubeletVersion
type: string
- name: Next Scheduled Time
description: The datetime of the next scheduled upgrade
format: date-time
jsonPath: .status.nextScheduledTime
type: string
schema:
openAPIV3Schema:
type: object
properties:
spec:
type: object
properties:
failurePolicy:
type: string
maxUnavailable:
type: integer
schedule:
type: string
selector:
type: object
properties:
matchExpressions:
type: array
items:
type: object
properties:
key:
type: string
operator:
type: string
values:
type: array
items:
type: string
strategy:
type: string
targetKubeletVersion:
type: string
status:
type: object
properties:
conditions:
type: array
items:
type: object
properties:
lastTransitionTime:
type: string
format: date-time
message:
type: string
reason:
type: string
status:
type: string
type:
type: string
kubeletVersion:
type: string
nextScheduledTime:
type: string
format: date-time
| 28.420455 | 70 | 0.453818 |
790ea07e2d8a0ccdf4bc1644c612990ab51eeeb8 | 844 | yml | YAML | k8s.yml | jaskon139/kubesail | 260d0715f56e5a34196e954fe26ef3f0963d9b56 | [
"MIT"
] | null | null | null | k8s.yml | jaskon139/kubesail | 260d0715f56e5a34196e954fe26ef3f0963d9b56 | [
"MIT"
] | null | null | null | k8s.yml | jaskon139/kubesail | 260d0715f56e5a34196e954fe26ef3f0963d9b56 | [
"MIT"
] | 2 | 2020-09-18T10:17:11.000Z | 2020-09-30T10:40:37.000Z | apiVersion: apps/v1
kind: Deployment
metadata:
name: v2ray
spec:
selector:
matchLabels:
app: v2ray
replicas: 1
template:
metadata:
labels:
app: v2ray
spec:
containers:
- name: v2ray
image: jaskon139/kubesail2:latest
imagePullPolicy: Always
resources:
requests:
cpu: 5m
memory: 64Mi
limits:
cpu: 100m
memory: 512Mi
ports:
- containerPort: 8080
env:
- name: CONFIG_JSON
value: '{"inbounds":[{"port":8080,"protocol":"vmess","settings":{"clients":[{"id":"852217f3-b83d-412e-b8b7-93706a6dd4e9","alterId":64}]},"streamSettings":{"network":"ws","wsSettings":{"path":"/ws"}}}],"outbounds":[{"protocol":"freedom","settings":{}}]}'
| 27.225806 | 267 | 0.531991 |
790ea3787dc2ebc542ab539e8ec9306f55cf22ae | 340 | yml | YAML | chapter9/labs/deployment/deployment_nginx.yml | spontaneously5201314/docker-k8s-devops-master | 3734d81c50f56725fb09d9dc7928617fa478cd99 | [
"Apache-2.0"
] | null | null | null | chapter9/labs/deployment/deployment_nginx.yml | spontaneously5201314/docker-k8s-devops-master | 3734d81c50f56725fb09d9dc7928617fa478cd99 | [
"Apache-2.0"
] | null | null | null | chapter9/labs/deployment/deployment_nginx.yml | spontaneously5201314/docker-k8s-devops-master | 3734d81c50f56725fb09d9dc7928617fa478cd99 | [
"Apache-2.0"
] | null | null | null | apiVersion: apps/v1
kind: Deployment
metadata:
name: nginx-deployment
labels:
app: nginx
spec:
replicas: 3
selector:
matchLabels:
app: nginx
template:
metadata:
labels:
app: nginx
spec:
containers:
- name: nginx
image: nginx:1.12.2
ports:
- containerPort: 80 | 16.190476 | 27 | 0.582353 |
790ed5f8f0d9c15ee2b34f11a84b2c5bf18136a9 | 647 | yaml | YAML | config-root/namespaces/jx/lighthouse/lighthouse-external-plugins-cm.yaml | OrgNameRavi/GoogleSecretManager | 16788c3646fefa35587acb0cdb23679379507735 | [
"Apache-2.0"
] | null | null | null | config-root/namespaces/jx/lighthouse/lighthouse-external-plugins-cm.yaml | OrgNameRavi/GoogleSecretManager | 16788c3646fefa35587acb0cdb23679379507735 | [
"Apache-2.0"
] | null | null | null | config-root/namespaces/jx/lighthouse/lighthouse-external-plugins-cm.yaml | OrgNameRavi/GoogleSecretManager | 16788c3646fefa35587acb0cdb23679379507735 | [
"Apache-2.0"
] | null | null | null | # Source: lighthouse/templates/config-external-plugins.yaml
apiVersion: v1
kind: ConfigMap
metadata:
name: lighthouse-external-plugins
labels:
app: lighthouse-lighthouse
chart: "lighthouse-1.1.42"
release: "lighthouse"
gitops.jenkins-x.io/pipeline: 'namespaces'
annotations:
meta.helm.sh/release-name: 'lighthouse'
namespace: jx
data:
config.yaml: |-
- name: cd-indicators
requiredResources:
- kind: Service
name: cd-indicators
namespace: jx
- name: lighthouse-webui-plugin
requiredResources:
- kind: Service
name: lighthouse-webui-plugin
namespace: jx
| 24.884615 | 59 | 0.676971 |
790ed69d61edec82c40342aa0d3d008a95e8a941 | 321 | yaml | YAML | e2e/addon/mock/testdata/fluxcd/resources/service/svc-source-controller.yaml | zhiyuone/kubevela | 25e33cdd6d9d87baca28c7b610f44199f32a1e47 | [
"Apache-2.0"
] | 3,530 | 2020-09-03T18:20:47.000Z | 2022-03-31T13:14:22.000Z | e2e/addon/mock/testdata/fluxcd/resources/service/svc-source-controller.yaml | zhiyuone/kubevela | 25e33cdd6d9d87baca28c7b610f44199f32a1e47 | [
"Apache-2.0"
] | 2,821 | 2020-09-11T02:24:38.000Z | 2022-03-31T17:44:07.000Z | e2e/addon/mock/testdata/fluxcd/resources/service/svc-source-controller.yaml | zhiyuone/kubevela | 25e33cdd6d9d87baca28c7b610f44199f32a1e47 | [
"Apache-2.0"
] | 530 | 2020-09-11T02:45:16.000Z | 2022-03-30T10:50:18.000Z | apiVersion: v1
kind: Service
metadata:
labels:
app.kubernetes.io/instance: flux-system
control-plane: controller
name: source-controller
namespace: flux-system
spec:
ports:
- name: http
port: 80
protocol: TCP
targetPort: http
selector:
app: source-controller
type: ClusterIP
| 17.833333 | 43 | 0.682243 |
790ee676958f245c2d8b76e5663db1ac73f19777 | 2,185 | yaml | YAML | deployments/kubernetes/manifests/crd.yaml | sherifkayad/Forecastle | 783021023b90553dbb0fd26a08b3ba2949c3442d | [
"Apache-2.0"
] | null | null | null | deployments/kubernetes/manifests/crd.yaml | sherifkayad/Forecastle | 783021023b90553dbb0fd26a08b3ba2949c3442d | [
"Apache-2.0"
] | null | null | null | deployments/kubernetes/manifests/crd.yaml | sherifkayad/Forecastle | 783021023b90553dbb0fd26a08b3ba2949c3442d | [
"Apache-2.0"
] | null | null | null | ---
# Source: forecastle/templates/crd.yaml
apiVersion: apiextensions.k8s.io/v1
kind: CustomResourceDefinition
metadata:
name: forecastleapps.forecastle.stakater.com
spec:
conversion:
strategy: None
group: forecastle.stakater.com
names:
kind: ForecastleApp
listKind: ForecastleAppList
plural: forecastleapps
singular: forecastleapp
preserveUnknownFields: true
scope: Namespaced
versions:
- name: v1alpha1
schema:
openAPIV3Schema:
properties:
apiVersion:
description: 'APIVersion defines the versioned schema of this representation
of an object. Servers should convert recognized schemas to the latest
internal value, and may reject unrecognized values. More info: https://git.k8s.io/community/contributors/devel/api-conventions.md#resources'
type: string
kind:
description: 'Kind is a string value representing the REST resource this
object represents. Servers may infer this from the endpoint the client
submits requests to. Cannot be updated. In CamelCase. More info: https://git.k8s.io/community/contributors/devel/api-conventions.md#types-kinds'
type: string
metadata:
type: object
spec:
properties:
group:
type: string
icon:
type: string
instance:
type: string
name:
type: string
networkRestricted:
type: boolean
properties:
additionalProperties:
type: string
type: object
url:
type: string
urlFrom:
properties:
ingressRef:
type: object
routeRef:
type: object
type: object
required:
- name
- group
- icon
type: object
status:
type: object
served: true
storage: true
subresources:
status: {}
| 30.347222 | 158 | 0.554233 |