hexsha
stringlengths 40
40
| size
int64 24
1.05M
| ext
stringclasses 2
values | lang
stringclasses 1
value | max_stars_repo_path
stringlengths 5
269
| max_stars_repo_name
stringlengths 7
107
| max_stars_repo_head_hexsha
stringlengths 40
78
| max_stars_repo_licenses
sequence | max_stars_count
int64 1
84.9k
⌀ | max_stars_repo_stars_event_min_datetime
stringlengths 24
24
⌀ | max_stars_repo_stars_event_max_datetime
stringlengths 24
24
⌀ | max_issues_repo_path
stringlengths 5
269
| max_issues_repo_name
stringlengths 7
107
| max_issues_repo_head_hexsha
stringlengths 40
78
| max_issues_repo_licenses
sequence | max_issues_count
int64 1
116k
⌀ | max_issues_repo_issues_event_min_datetime
stringlengths 24
24
⌀ | max_issues_repo_issues_event_max_datetime
stringlengths 24
24
⌀ | max_forks_repo_path
stringlengths 5
269
| max_forks_repo_name
stringlengths 7
107
| max_forks_repo_head_hexsha
stringlengths 40
78
| max_forks_repo_licenses
sequence | max_forks_count
int64 1
55.9k
⌀ | max_forks_repo_forks_event_min_datetime
stringlengths 24
24
⌀ | max_forks_repo_forks_event_max_datetime
stringlengths 24
24
⌀ | content
stringlengths 24
1.05M
| avg_line_length
float64 1
304k
| max_line_length
int64 14
1.03M
| alphanum_fraction
float64 0
1
|
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
790ee8707ca88fb5918bc06ae95da48a10953eb4 | 447 | yaml | YAML | test/simulator-group/pvc-cleaner/pvc-cleaner.yaml | Prakashmoharana1985/O_RAN | 98ef4058086cfa3eddd6687def46c9410d727985 | [
"Apache-2.0"
] | 2 | 2021-01-21T14:01:25.000Z | 2021-02-19T20:43:39.000Z | test/simulator-group/pvc-cleaner/pvc-cleaner.yaml | Prakashmoharana1985/O_RAN | 98ef4058086cfa3eddd6687def46c9410d727985 | [
"Apache-2.0"
] | 4 | 2019-11-28T14:14:19.000Z | 2022-03-29T06:23:26.000Z | test/simulator-group/pvc-cleaner/pvc-cleaner.yaml | Prakashmoharana1985/O_RAN | 98ef4058086cfa3eddd6687def46c9410d727985 | [
"Apache-2.0"
] | 2 | 2021-01-23T12:10:45.000Z | 2021-08-23T07:26:18.000Z | apiVersion: v1
kind: Pod
metadata:
name: pvc-cleaner
namespace: $PVC_CLEANER_NAMESPACE
spec:
restartPolicy: Never
containers:
- name: pvc-cleaner
image: "ubuntu:20.10"
command: ["/bin/sh","-c"]
args: ["rm -rf $PVC_CLEANER_RM_PATH/*"]
volumeMounts:
- mountPath: $PVC_CLEANER_RM_PATH
name: pvc-cleaner-m-vol
volumes:
- name: pvc-cleaner-m-vol
persistentVolumeClaim:
claimName: $PVC_CLEANER_CLAIMNAME | 23.526316 | 43 | 0.684564 |
790f0b8f856b441c16f10b23e1b904708ff1c23a | 204 | yaml | YAML | hack/webhook/service.yaml | zimu312500/redis-cluster-operator | c56ba1ed193ac5e8cc055c35b0f8b2d01d1d56f1 | [
"Apache-2.0"
] | 269 | 2019-09-22T15:28:39.000Z | 2022-03-25T07:09:54.000Z | hack/webhook/service.yaml | zimu312500/redis-cluster-operator | c56ba1ed193ac5e8cc055c35b0f8b2d01d1d56f1 | [
"Apache-2.0"
] | 74 | 2019-10-23T06:20:30.000Z | 2022-03-10T01:52:45.000Z | hack/webhook/service.yaml | zimu312500/redis-cluster-operator | c56ba1ed193ac5e8cc055c35b0f8b2d01d1d56f1 | [
"Apache-2.0"
] | 110 | 2019-12-06T08:22:20.000Z | 2022-03-21T16:50:54.000Z | apiVersion: v1
kind: Service
metadata:
name: drc-admission-webhook
labels:
app: admission-webhook
spec:
ports:
- port: 443
targetPort: 7443
selector:
name: redis-cluster-operator | 17 | 32 | 0.691176 |
790f0d2905ff14da5dcf09dcd22c55c14fbfe740 | 1,453 | yaml | YAML | k8s/deployment.yaml | red-avtovo/zerotier-docker | 78fa865823330ed9c5143278ad72ebd375a41a54 | [
"MIT"
] | null | null | null | k8s/deployment.yaml | red-avtovo/zerotier-docker | 78fa865823330ed9c5143278ad72ebd375a41a54 | [
"MIT"
] | null | null | null | k8s/deployment.yaml | red-avtovo/zerotier-docker | 78fa865823330ed9c5143278ad72ebd375a41a54 | [
"MIT"
] | null | null | null | apiVersion: apps/v1
kind: Deployment
metadata:
name: zerotier
spec:
selector:
matchLabels:
app: zerotier
template:
metadata:
labels:
app: zerotier
spec:
initContainers:
- name: network-joiner
image: busybox
env:
- name: NETWORK_ID
value: "<replace with network id>"
command: [ "sh", "-c", "mkdir -p /mnt/networks.d && touch /mnt/networks.d/$(NETWORK_ID).conf" ]
volumeMounts:
- name: vol
subPath: config
mountPath: /mnt
containers:
- name: zerotier
image: zyclonite/zerotier:bridge
resources:
limits:
memory: "128Mi"
cpu: "500m"
ports:
- name: net
containerPort: 9993
volumeMounts:
- name: vol
subPath: config
mountPath: /var/lib/zerotier-one
- name: tun
readOnly: true
mountPath: /dev/net/tun
securityContext:
capabilities:
add:
- NET_ADMIN
- SYS_ADMIN
dnsPolicy: "None"
dnsConfig:
nameservers:
- 1.1.1.1
- 8.8.8.8
volumes:
- name: vol
persistentVolumeClaim:
claimName: zerotier
- name: tun
hostPath:
path: /dev/net/tun
type: '' | 23.063492 | 105 | 0.474191 |
790f3e23c82e68c11e46bfa4d5a1cfd866b7f931 | 253 | yaml | YAML | kubernetes/services/ingress/pod-service-b.yaml | NovaOrdis/playground | 6fe076b5d246ac5b492ab8d5de04eef43d797b62 | [
"Apache-2.0"
] | 5 | 2016-11-16T02:18:45.000Z | 2018-03-14T19:57:11.000Z | kubernetes/services/ingress/pod-service-b.yaml | NovaOrdis/playground | 6fe076b5d246ac5b492ab8d5de04eef43d797b62 | [
"Apache-2.0"
] | 2 | 2021-02-03T19:20:57.000Z | 2022-02-09T23:00:11.000Z | kubernetes/services/ingress/pod-service-b.yaml | ovidiuf/playground | 60a24a921994191bfe8cced9ef947fe104c51116 | [
"Apache-2.0"
] | 12 | 2019-01-17T13:05:40.000Z | 2022-03-11T06:29:43.000Z | apiVersion: v1
kind: Pod
metadata:
name: httpd-b
labels:
function: serves-http
affiliation: b
spec:
containers:
- name: httpd
image: docker.io/ovidiufeodorov/httpd
ports:
- containerPort: 80
protocol: TCP
| 16.866667 | 43 | 0.628458 |
790f591832e89f98ac06f910cc9ae9c92ffcea7c | 144 | yaml | YAML | built-in-references/Kubernetes/perf/violations/violation3878.yaml | sw47/azure-policy | 4a38e4cb4047b5364902653f0defe45f1b21bc61 | [
"MIT"
] | null | null | null | built-in-references/Kubernetes/perf/violations/violation3878.yaml | sw47/azure-policy | 4a38e4cb4047b5364902653f0defe45f1b21bc61 | [
"MIT"
] | null | null | null | built-in-references/Kubernetes/perf/violations/violation3878.yaml | sw47/azure-policy | 4a38e4cb4047b5364902653f0defe45f1b21bc61 | [
"MIT"
] | null | null | null | apiVersion: v1
kind: Pod
metadata:
name: image-demo-3878
spec:
containers:
- name: nginx
image: nginx #ritaacr.azurecr.io/nginx:latest | 18 | 49 | 0.722222 |
790f8b2d5aa1d60fdfcd6c898c0455243f2b154d | 4,735 | yaml | YAML | k8s/gen/pt-1.5-mnist-convergence-v3-8.yaml | taylanbil/ml-testing-accelerators | 10a24b5f3a32107f26dd767552a9feb9b331da60 | [
"Apache-2.0"
] | null | null | null | k8s/gen/pt-1.5-mnist-convergence-v3-8.yaml | taylanbil/ml-testing-accelerators | 10a24b5f3a32107f26dd767552a9feb9b331da60 | [
"Apache-2.0"
] | null | null | null | k8s/gen/pt-1.5-mnist-convergence-v3-8.yaml | taylanbil/ml-testing-accelerators | 10a24b5f3a32107f26dd767552a9feb9b331da60 | [
"Apache-2.0"
] | null | null | null | # Copyright 2020 Google LLC
#
# Licensed under the Apache License, Version 2.0 (the "License");
# you may not use this file except in compliance with the License.
# You may obtain a copy of the License at
#
# https://www.apache.org/licenses/LICENSE-2.0
#
# Unless required by applicable law or agreed to in writing, software
# distributed under the License is distributed on an "AS IS" BASIS,
# WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
# See the License for the specific language governing permissions and
# limitations under the License.
"apiVersion": "batch/v1beta1"
"kind": "CronJob"
"metadata":
"name": "pt-1.5-mnist-convergence-v3-8"
"namespace": "automated"
"spec":
"concurrencyPolicy": "Forbid"
"jobTemplate":
"spec":
"activeDeadlineSeconds": 3600
"backoffLimit": 2
"template":
"metadata":
"annotations":
"tf-version.cloud-tpus.google.com": "pytorch-1.5"
"spec":
"containers":
- "args":
- "python3"
- "pytorch/xla/test/test_train_mp_mnist.py"
- "--logdir=$(MODEL_DIR)"
"env":
- "name": "POD_NAME"
"valueFrom":
"fieldRef":
"fieldPath": "metadata.name"
- "name": "POD_UID"
"valueFrom":
"fieldRef":
"fieldPath": "metadata.uid"
- "name": "POD_NAMESPACE"
"valueFrom":
"fieldRef":
"fieldPath": "metadata.namespace"
- "name": "JOB_NAME"
"valueFrom":
"fieldRef":
"fieldPath": "metadata.labels['job-name']"
- "name": "METRIC_CONFIG"
"value": |
{
"metric_collection_config": {
"default_aggregation_strategies": [
"final"
],
"tags_to_ignore": [
"LearningRate"
],
"write_to_bigquery": true
},
"regression_test_config": {
"metric_subset_to_alert": [
"ExecuteTime__Percentile_99_sec_final",
"CompileTime__Percentile_99_sec_final",
"total_wall_time",
"Accuracy/test_final",
"aten_ops_sum_final"
],
"metric_success_conditions": {
"Accuracy/test_final": {
"comparison": "greater",
"success_threshold": {
"fixed_value": 98
}
},
"CompileTime__Percentile_99_sec_final": {
"comparison": "less",
"success_threshold": {
"stddevs_from_mean": 5
},
"wait_for_n_points_of_history": 10
},
"ExecuteTime__Percentile_99_sec_final": {
"comparison": "less",
"success_threshold": {
"stddevs_from_mean": 5
},
"wait_for_n_points_of_history": 10
},
"aten_ops_sum_final": {
"comparison": "less_or_equal",
"success_threshold": {
"stddevs_from_mean": 0
}
},
"total_wall_time": {
"comparison": "less",
"success_threshold": {
"stddevs_from_mean": 5
},
"wait_for_n_points_of_history": 10
}
},
"write_to_error_reporting": true
},
"test_name": "pt-1.5-mnist-convergence-v3-8"
}
- "name": "MODEL_DIR"
"value": "gs://xl-ml-test-us-central1/k8s/mnist/convergence/v3-8/$(JOB_NAME)"
- "name": "XLA_USE_BF16"
"value": "0"
"image": "gcr.io/xl-ml-test/pytorch-xla:r1.5"
"imagePullPolicy": "Always"
"name": "train"
"resources":
"limits":
"cloud-tpus.google.com/preemptible-v3": 8
"requests":
"cpu": "4.5"
"memory": "8Gi"
"volumeMounts":
- "mountPath": "/dev/shm"
"name": "dshm"
"restartPolicy": "Never"
"volumes":
- "emptyDir":
"medium": "Memory"
"name": "dshm"
"schedule": "0 14 * * *" | 35.601504 | 91 | 0.449208 |
790f9886aa2681ae92e93d646c420c22a1d0a5d0 | 579 | yaml | YAML | configuration/examples/local/manifests/loki-ingester-http-service.yaml | jpkrohling/observatorium | 4c392c4a994460c066860b12d139965f1becd4a1 | [
"Apache-2.0"
] | 11 | 2019-06-17T20:20:45.000Z | 2020-05-25T08:47:42.000Z | configuration/examples/local/manifests/loki-ingester-http-service.yaml | jpkrohling/observatorium | 4c392c4a994460c066860b12d139965f1becd4a1 | [
"Apache-2.0"
] | 144 | 2019-06-21T08:20:22.000Z | 2020-06-08T14:36:33.000Z | configuration/examples/local/manifests/loki-ingester-http-service.yaml | jpkrohling/observatorium | 4c392c4a994460c066860b12d139965f1becd4a1 | [
"Apache-2.0"
] | 22 | 2019-07-15T12:19:15.000Z | 2020-05-21T18:38:46.000Z | apiVersion: v1
kind: Service
metadata:
labels:
app.kubernetes.io/component: ingester
app.kubernetes.io/instance: observatorium-xyz
app.kubernetes.io/name: loki
app.kubernetes.io/part-of: observatorium
app.kubernetes.io/version: 2.4.2
name: observatorium-xyz-loki-ingester-http
namespace: observatorium
spec:
ports:
- name: metrics
port: 3100
targetPort: 3100
selector:
app.kubernetes.io/component: ingester
app.kubernetes.io/instance: observatorium-xyz
app.kubernetes.io/name: loki
app.kubernetes.io/part-of: observatorium
| 26.318182 | 49 | 0.735751 |
790fbe018e43389c9e94c59d6cbf05aa6c3f0893 | 121 | yaml | YAML | deploy/service_account.yaml | Bhaskers-Blu-Org1/staticroute-operator | 8cc836f5f6b5f043412ff0d961fd453a3c0eaade | [
"Apache-2.0"
] | null | null | null | deploy/service_account.yaml | Bhaskers-Blu-Org1/staticroute-operator | 8cc836f5f6b5f043412ff0d961fd453a3c0eaade | [
"Apache-2.0"
] | null | null | null | deploy/service_account.yaml | Bhaskers-Blu-Org1/staticroute-operator | 8cc836f5f6b5f043412ff0d961fd453a3c0eaade | [
"Apache-2.0"
] | 1 | 2020-07-30T10:21:48.000Z | 2020-07-30T10:21:48.000Z | apiVersion: v1
kind: ServiceAccount
metadata:
name: static-route-operator
imagePullSecrets:
- name: default-us-icr-io | 20.166667 | 29 | 0.785124 |
7910354e58abf98f5312e0ee5de16347fde71edf | 608 | yaml | YAML | kubernetes-controllers/paymentservice-deployment.yaml | otus-kuber-2019-12/gidmaster_platform | 5adb234e8250b5d040497e46d13eac27399f3071 | [
"MIT"
] | 2 | 2019-12-19T14:08:56.000Z | 2020-04-20T13:54:16.000Z | kubernetes-controllers/paymentservice-deployment.yaml | otus-kuber-2019-12/gidmaster_platform | 5adb234e8250b5d040497e46d13eac27399f3071 | [
"MIT"
] | 15 | 2020-03-06T10:02:07.000Z | 2022-01-22T11:26:42.000Z | kubernetes-controllers/paymentservice-deployment.yaml | otus-kuber-2019-12/gidmaster_platform | 5adb234e8250b5d040497e46d13eac27399f3071 | [
"MIT"
] | 2 | 2020-05-01T11:27:37.000Z | 2020-05-21T11:02:04.000Z | apiVersion: apps/v1
kind: Deployment
metadata:
name: paymentservice
labels:
app: paymentservice
spec:
replicas: 3
selector:
matchLabels:
app: paymentservice
template:
metadata:
labels:
app: paymentservice
spec:
containers:
- name: server
image: gidmaster/hipster-paymentservice:v0.0.2
ports:
- containerPort: 50051
env:
- name: PORT
value: "50051"
resources:
requests:
cpu: 100m
memory: 64Mi
limits:
cpu: 200m
memory: 128Mi
| 19 | 54 | 0.546053 |
79104bb7a88878405d82d958a49221cd7ccff61c | 143 | yaml | YAML | built-in-references/Kubernetes/perf/violations/violation790.yaml | sw47/azure-policy | 4a38e4cb4047b5364902653f0defe45f1b21bc61 | [
"MIT"
] | null | null | null | built-in-references/Kubernetes/perf/violations/violation790.yaml | sw47/azure-policy | 4a38e4cb4047b5364902653f0defe45f1b21bc61 | [
"MIT"
] | null | null | null | built-in-references/Kubernetes/perf/violations/violation790.yaml | sw47/azure-policy | 4a38e4cb4047b5364902653f0defe45f1b21bc61 | [
"MIT"
] | null | null | null | apiVersion: v1
kind: Pod
metadata:
name: image-demo-790
spec:
containers:
- name: nginx
image: nginx #ritaacr.azurecr.io/nginx:latest | 17.875 | 49 | 0.72028 |
7910546aebed70414815a96734b24f4b032e612b | 1,062 | yaml | YAML | config-root/namespaces/jx/jx-pipelines-visualizer/jx-pipelines-visualizer-ingress.yaml | chanpark/jx3-minikube | 5e8617a371cf1a1537ebede0878fb63868a8f2b4 | [
"Apache-2.0"
] | null | null | null | config-root/namespaces/jx/jx-pipelines-visualizer/jx-pipelines-visualizer-ingress.yaml | chanpark/jx3-minikube | 5e8617a371cf1a1537ebede0878fb63868a8f2b4 | [
"Apache-2.0"
] | 3 | 2022-03-12T21:21:17.000Z | 2022-03-13T03:59:28.000Z | config-root/namespaces/jx/jx-pipelines-visualizer/jx-pipelines-visualizer-ingress.yaml | chanpark/jx3-minikube | 5e8617a371cf1a1537ebede0878fb63868a8f2b4 | [
"Apache-2.0"
] | null | null | null | # Source: jx-pipelines-visualizer/templates/ingress.yaml
apiVersion: networking.k8s.io/v1
kind: Ingress
metadata:
name: jx-pipelines-visualizer
labels:
app.kubernetes.io/name: jx-pipelines-visualizer
app.kubernetes.io/instance: "jx-pipelines-visualizer"
helm.sh/chart: jx-pipelines-visualizer-1.7.5
app.kubernetes.io/version: "1.7.5"
app.kubernetes.io/managed-by: "Helm"
gitops.jenkins-x.io/pipeline: 'namespaces'
annotations:
kubernetes.io/ingress.class: nginx
nginx.ingress.kubernetes.io/auth-realm: Authentication Required - Jenkins X Pipeline Dashboard
nginx.ingress.kubernetes.io/auth-secret: jx-basic-auth-htpasswd
nginx.ingress.kubernetes.io/auth-type: basic
meta.helm.sh/release-name: 'jx-pipelines-visualizer'
namespace: jx
spec:
rules:
- host: dashboard-jx.192.168.99.100.sslip.io
http:
paths:
- pathType: ImplementationSpecific
backend:
service:
name: jx-pipelines-visualizer
port:
name: http
| 34.258065 | 98 | 0.682674 |
791062e7b0fc6a80b646a156b8229ec5fa62dc46 | 480 | yaml | YAML | demo/non-privileged-deploy.yaml | aldycool/k3s-on-prem-production | 7e60b4cd0bb3a0f25843cd542908e6f54001e9e8 | [
"Apache-2.0"
] | 94 | 2021-06-02T17:35:39.000Z | 2022-03-27T07:21:37.000Z | demo/non-privileged-deploy.yaml | aldycool/k3s-on-prem-production | 7e60b4cd0bb3a0f25843cd542908e6f54001e9e8 | [
"Apache-2.0"
] | 7 | 2021-09-06T05:16:14.000Z | 2022-03-22T21:08:45.000Z | demo/non-privileged-deploy.yaml | aldycool/k3s-on-prem-production | 7e60b4cd0bb3a0f25843cd542908e6f54001e9e8 | [
"Apache-2.0"
] | 28 | 2021-06-03T01:47:36.000Z | 2022-03-30T04:21:34.000Z | ---
apiVersion: apps/v1
kind: Deployment
metadata:
labels:
app: not-privileged-deploy
name: not-privileged-deploy
spec:
replicas: 1
selector:
matchLabels:
app: not-privileged-deploy
template:
metadata:
labels:
app: not-privileged-deploy
spec:
containers:
- image: alpine
name: alpine
stdin: true
tty: true
securityContext:
runAsUser: 1000
runAsGroup: 1000
| 18.461538 | 34 | 0.583333 |
79106c8fdb5ab9c20d228bffeafc9bad81ddbe81 | 658 | yaml | YAML | configuration/examples/local/manifests/kube-prometheus/grafana-dashboardSources.yaml | esnible/observatorium | 9daa92a95e210657124816eb5abaf5e5c7078bae | [
"Apache-2.0"
] | 1,999 | 2016-10-25T05:50:55.000Z | 2020-08-05T07:51:58.000Z | configuration/examples/local/manifests/kube-prometheus/grafana-dashboardSources.yaml | esnible/observatorium | 9daa92a95e210657124816eb5abaf5e5c7078bae | [
"Apache-2.0"
] | 542 | 2016-10-31T08:19:08.000Z | 2020-08-05T13:38:38.000Z | configuration/examples/local/manifests/kube-prometheus/grafana-dashboardSources.yaml | esnible/observatorium | 9daa92a95e210657124816eb5abaf5e5c7078bae | [
"Apache-2.0"
] | 654 | 2016-10-28T15:00:29.000Z | 2020-08-05T01:23:20.000Z | apiVersion: v1
data:
dashboards.yaml: |-
{
"apiVersion": 1,
"providers": [
{
"folder": "Default",
"folderUid": "",
"name": "0",
"options": {
"path": "/grafana-dashboard-definitions/0"
},
"orgId": 1,
"type": "file"
}
]
}
kind: ConfigMap
metadata:
labels:
app.kubernetes.io/component: grafana
app.kubernetes.io/name: grafana
app.kubernetes.io/part-of: kube-prometheus
app.kubernetes.io/version: 8.5.2
name: grafana-dashboards
namespace: monitoring
| 23.5 | 62 | 0.477204 |
7910e1b0343c023f1ffec53e56a15ec7e377439d | 716 | yaml | YAML | github/ci/phx-prow/prow/templates/hook-service.yaml | mazzystr/project-infra | 87e4ad78889093c14c7953bcb29f03890d6555ca | [
"Apache-2.0"
] | null | null | null | github/ci/phx-prow/prow/templates/hook-service.yaml | mazzystr/project-infra | 87e4ad78889093c14c7953bcb29f03890d6555ca | [
"Apache-2.0"
] | 2 | 2020-11-27T14:04:09.000Z | 2020-12-01T13:59:02.000Z | github/ci/phx-prow/prow/templates/hook-service.yaml | mazzystr/project-infra | 87e4ad78889093c14c7953bcb29f03890d6555ca | [
"Apache-2.0"
] | null | null | null | # Copyright 2016 The Kubernetes Authors All rights reserved.
#
# Licensed under the Apache License, Version 2.0 (the "License");
# you may not use this file except in compliance with the License.
# You may obtain a copy of the License at
#
# http://www.apache.org/licenses/LICENSE-2.0
#
# Unless required by applicable law or agreed to in writing, software
# distributed under the License is distributed on an "AS IS" BASIS,
# WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
# See the License for the specific language governing permissions and
# limitations under the License.
apiVersion: v1
kind: Service
metadata:
name: hook
spec:
selector:
app: hook
ports:
- port: 8888
| 29.833333 | 74 | 0.75 |
79110b17cb7a2937670b6447cbffdc3b1a665d7f | 280 | yaml | YAML | cluster/apps/home-automation/zwavejs2mqtt/pvc.yaml | heseifert/home-cluster | 349086951659b8309e945a547cd176c8ffc3f61a | [
"MIT"
] | null | null | null | cluster/apps/home-automation/zwavejs2mqtt/pvc.yaml | heseifert/home-cluster | 349086951659b8309e945a547cd176c8ffc3f61a | [
"MIT"
] | 317 | 2021-08-17T21:59:30.000Z | 2022-01-22T11:36:47.000Z | cluster/apps/home-automation/zwavejs2mqtt/pvc.yaml | heseifert/home-cluster | 349086951659b8309e945a547cd176c8ffc3f61a | [
"MIT"
] | null | null | null | ---
apiVersion: v1
kind: PersistentVolumeClaim
metadata:
name: zigbee2mqtt-config
namespace: home-automation
labels:
kasten.io/backup-volume: "enabled"
spec:
accessModes:
- ReadWriteOnce
resources:
requests:
storage: 1Gi
storageClassName: ceph-block
| 17.5 | 38 | 0.721429 |
791118df4dfad1b205d69ea7c23459f5070076b1 | 296 | yml | YAML | examples/k8s_v1.20-CSI_v1.1/kubeyml/rbd/10-restore-snapshot-larger-volume.yml | cschwede/ember-csi | b2ccacaf5675c8f6d7710109e7df877e2a371ada | [
"Apache-2.0"
] | 36 | 2018-12-13T02:57:54.000Z | 2022-01-20T23:22:44.000Z | examples/k8s_v1.20-CSI_v1.1/kubeyml/rbd/10-restore-snapshot-larger-volume.yml | cschwede/ember-csi | b2ccacaf5675c8f6d7710109e7df877e2a371ada | [
"Apache-2.0"
] | 76 | 2019-01-17T11:15:52.000Z | 2021-09-28T09:09:15.000Z | examples/k8s_v1.20-CSI_v1.1/kubeyml/rbd/10-restore-snapshot-larger-volume.yml | cschwede/ember-csi | b2ccacaf5675c8f6d7710109e7df877e2a371ada | [
"Apache-2.0"
] | 19 | 2018-12-04T11:03:50.000Z | 2021-12-21T21:50:46.000Z | apiVersion: v1
kind: PersistentVolumeClaim
metadata:
name: larger-vol-from-snap-rbd
spec:
storageClassName: csi-rbd
dataSource:
name: csi-rbd
kind: VolumeSnapshot
apiGroup: snapshot.storage.k8s.io
accessModes:
- ReadWriteOnce
resources:
requests:
storage: 3Gi
| 18.5 | 37 | 0.716216 |
79112c4caafa960a2a5598fd033298cdf4b2fd8f | 253 | yaml | YAML | modules/ocf_kubernetes/files/persistent-volume-nfs/kanboard-data-pv.yaml | MarcelWaldvogel/puppet | eca2833ca74494a4a8602ab69f1cc3a6d1f2d076 | [
"Apache-2.0",
"CC-BY-4.0"
] | 27 | 2015-03-14T04:43:52.000Z | 2021-08-22T14:46:29.000Z | modules/ocf_kubernetes/files/persistent-volume-nfs/kanboard-data-pv.yaml | MarcelWaldvogel/puppet | eca2833ca74494a4a8602ab69f1cc3a6d1f2d076 | [
"Apache-2.0",
"CC-BY-4.0"
] | 962 | 2015-02-05T01:48:27.000Z | 2022-03-31T02:35:07.000Z | modules/ocf_kubernetes/files/persistent-volume-nfs/kanboard-data-pv.yaml | MarcelWaldvogel/puppet | eca2833ca74494a4a8602ab69f1cc3a6d1f2d076 | [
"Apache-2.0",
"CC-BY-4.0"
] | 93 | 2015-07-01T03:11:04.000Z | 2021-12-05T07:20:30.000Z | apiVersion: v1
kind: PersistentVolume
metadata:
name: kanboard-data-pv
spec:
capacity:
storage: 30Gi
accessModes:
- ReadWriteMany
nfs:
path: /opt/homes/services/kanboard/data
server: filehost.ocf.berkeley.edu
readOnly: false
| 18.071429 | 43 | 0.715415 |
79114ead8cf2f9961dbc965fb05e37d6dfdd736c | 431 | yaml | YAML | iot-kafka-pipe.yaml | mc-b/iot.kafka | 78ac9dafddf79905bcc7f09fb2c811431278f8e9 | [
"Apache-2.0"
] | null | null | null | iot-kafka-pipe.yaml | mc-b/iot.kafka | 78ac9dafddf79905bcc7f09fb2c811431278f8e9 | [
"Apache-2.0"
] | null | null | null | iot-kafka-pipe.yaml | mc-b/iot.kafka | 78ac9dafddf79905bcc7f09fb2c811431278f8e9 | [
"Apache-2.0"
] | null | null | null | apiVersion: apps/v1
kind: Deployment
metadata:
name: iot-kafka-pipe
spec:
replicas: 1
selector:
matchLabels:
app: iot-kafka-pipe
template:
metadata:
labels:
app: iot-kafka-pipe
tier: backend
group: java
spec:
containers:
- name: iot-kafka-pipe
image: registry.gitlab.com/mc-b/iot-kafka/iot-kafka-pipe
imagePullPolicy: IfNotPresent
| 20.52381 | 64 | 0.603248 |
7911bfb6ad8c5ac68bd3ce9462487aa42d925acb | 566 | yaml | YAML | deploy/dev-secrets.yaml | mraarif/udacity-clouddevops-capstone | eba3963c9ed83208adcf04cc5dd98a10b658fb60 | [
"MIT"
] | null | null | null | deploy/dev-secrets.yaml | mraarif/udacity-clouddevops-capstone | eba3963c9ed83208adcf04cc5dd98a10b658fb60 | [
"MIT"
] | null | null | null | deploy/dev-secrets.yaml | mraarif/udacity-clouddevops-capstone | eba3963c9ed83208adcf04cc5dd98a10b658fb60 | [
"MIT"
] | null | null | null | apiVersion: v1
kind: Secret
metadata:
name: dev-secrets
type: Opaque
data:
DEBUG: MQ==
SECRET_KEY: c3VwZXJzZWNyZXRrZXk=
DJANGO_ALLOWED_HOSTS: bG9jYWxob3N0IDEyNy4wLjAuMSBbOjoxXQ==
SQL_ENGINE: ZGphbmdvLmRiLmJhY2tlbmRzLnBvc3RncmVzcWw=
SQL_DATABASE: aGVsbG9fZGphbmdvX2Rldg==
SQL_USER: cG9zdGdyZXM=
SQL_PASSWORD: cG9zdGdyZXM=
SQL_HOST: ZGI=
SQL_PORT: NTQzMg==
DATABASE: cG9zdGdyZXM=
NEWS_API_KEY: ZTVmNDc5MGM5ZjYzNGY1NmJhYzQ2ZDZmYjY0ODRlZDY=
POSTGRES_USER: cG9zdGdyZXM=
POSTGRES_PASSWORD: cG9zdGdyZXM=
POSTGRES_DB: aGVsbG9fZGphbmdvX2Rldg==
| 25.727273 | 60 | 0.80742 |
791213440aa82526fe1127a6c3fa74126f7368f5 | 63 | yaml | YAML | definition/01-namespace.yaml | thomas-illiet/k8s-pihole | 28986db1a15aface5c9a5ec57c1390e76cbe4306 | [
"MIT"
] | null | null | null | definition/01-namespace.yaml | thomas-illiet/k8s-pihole | 28986db1a15aface5c9a5ec57c1390e76cbe4306 | [
"MIT"
] | 1 | 2020-04-04T13:36:16.000Z | 2020-04-04T13:36:16.000Z | definition/01-namespace.yaml | thomas-illiet/k8s-pihole | 28986db1a15aface5c9a5ec57c1390e76cbe4306 | [
"MIT"
] | 2 | 2020-10-20T22:08:31.000Z | 2021-04-13T07:52:19.000Z | apiVersion: v1
kind: Namespace
metadata:
name: netboot-pihole | 15.75 | 22 | 0.793651 |
791278d947b19e609039cee2e8cc535a6ec63c81 | 251 | yaml | YAML | example/ctr/k8s/pdclient.yaml | wangxicoding/edl | 75d651e72e5297aba2e597588cf958ea336deb4e | [
"Apache-2.0"
] | null | null | null | example/ctr/k8s/pdclient.yaml | wangxicoding/edl | 75d651e72e5297aba2e597588cf958ea336deb4e | [
"Apache-2.0"
] | null | null | null | example/ctr/k8s/pdclient.yaml | wangxicoding/edl | 75d651e72e5297aba2e597588cf958ea336deb4e | [
"Apache-2.0"
] | null | null | null | apiVersion: v1
kind: Pod
metadata:
name: pdservingclient
labels:
app: pdservingclient
spec:
containers:
- name: pdservingclient
image: wangjiawei1993/pdservingclient:v4
workingDir: /
command: ['bash']
args: ['nonstop.sh']
| 17.928571 | 44 | 0.689243 |
79128ffe5bec508f53908dfdfe7c4bfe8b1513a9 | 1,604 | yaml | YAML | configs/prow-dev/cluster/tide_deployment.yaml | andylokandy/ti-community-prow | 784590e36026669024cb697a03a26e94f2be2f2e | [
"Apache-2.0"
] | null | null | null | configs/prow-dev/cluster/tide_deployment.yaml | andylokandy/ti-community-prow | 784590e36026669024cb697a03a26e94f2be2f2e | [
"Apache-2.0"
] | null | null | null | configs/prow-dev/cluster/tide_deployment.yaml | andylokandy/ti-community-prow | 784590e36026669024cb697a03a26e94f2be2f2e | [
"Apache-2.0"
] | null | null | null | apiVersion: apps/v1
kind: Deployment
metadata:
namespace: prow
name: tide
labels:
app: tide
spec:
replicas: 1 # Do not scale up.
strategy:
type: Recreate
selector:
matchLabels:
app: tide
template:
metadata:
labels:
app: tide
spec:
serviceAccountName: "tide"
containers:
- name: tide
image: gcr.io/k8s-prow/tide:v20201204-d90be1ef6b
args:
- --dry-run=false
- --config-path=/etc/config/config.yaml
- --github-token-path=/etc/github/token
- --github-endpoint=http://ghproxy
- --github-endpoint=https://api.github.com
- --github-graphql-endpoint=http://ghproxy/graphql
- --gcs-credentials-file=/etc/gcs-credentials/service-account.json
- --status-path=gs://prow-dev-tidb-logs/tide-status
- --history-uri=gs://prow-dev-tidb-logs/tide-history.json
ports:
- name: http
containerPort: 8888
volumeMounts:
- name: github-token
mountPath: /etc/github
readOnly: true
- name: config
mountPath: /etc/config
readOnly: true
- name: gcs-credentials
mountPath: /etc/gcs-credentials
readOnly: true
volumes:
- name: github-token
secret:
secretName: github-token
- name: config
configMap:
name: config
- name: gcs-credentials
secret:
secretName: gcs-credentials | 28.642857 | 78 | 0.539277 |
79129032fa30efc87048b8dbc5fd83e861d3acfd | 327 | yaml | YAML | examples/resources/role1.yaml | yuvalbdgit/TEST | e185bb5f9fe90deb2694dbc139cbaccfe81d09de | [
"Apache-2.0"
] | 3,190 | 2019-10-01T04:20:32.000Z | 2022-03-31T18:17:19.000Z | examples/resources/role1.yaml | yuvalbdgit/TEST | e185bb5f9fe90deb2694dbc139cbaccfe81d09de | [
"Apache-2.0"
] | 2,034 | 2019-10-01T07:00:14.000Z | 2022-03-21T11:22:00.000Z | examples/resources/role1.yaml | stevesloka/octant | fde2b1577293a80f16851bb24b0f36cef10878ad | [
"Apache-2.0"
] | 328 | 2019-10-02T11:02:36.000Z | 2022-03-25T08:11:01.000Z | # Copyright (c) 2019 the Octant contributors. All Rights Reserved.
# SPDX-License-Identifier: Apache-2.0
kind: Role
apiVersion: rbac.authorization.k8s.io/v1
metadata:
namespace: default
name: pod-reader
rules:
- apiGroups:
- ""
resources:
- "pods"
verbs:
- "get"
- "watch"
- "list"
| 18.166667 | 66 | 0.623853 |
7912b960aa328a73fc84e600db25e93a76c8c2af | 954 | yaml | YAML | kubernetes-networks/web-deploy.yaml | otus-kuber-2022-03/binhex386_platform | c56a60e8076596a2ef0daf4423dccd59ab74a5d8 | [
"MIT"
] | null | null | null | kubernetes-networks/web-deploy.yaml | otus-kuber-2022-03/binhex386_platform | c56a60e8076596a2ef0daf4423dccd59ab74a5d8 | [
"MIT"
] | 1 | 2022-03-29T05:46:08.000Z | 2022-03-29T05:46:08.000Z | kubernetes-networks/web-deploy.yaml | otus-kuber-2022-03/binhex386_platform | c56a60e8076596a2ef0daf4423dccd59ab74a5d8 | [
"MIT"
] | null | null | null | apiVersion: apps/v1
kind: Deployment
metadata:
name: web
spec:
replicas: 3
selector:
matchLabels:
app: web
strategy:
type: RollingUpdate
rollingUpdate:
maxUnavailable: 0
maxSurge: 100%
template:
metadata:
name: web
labels:
app: web
spec:
containers:
- name: web
image: binhex386/kubernetes-intro
volumeMounts:
- mountPath: /app
name: www
resources:
limits:
cpu: 100m
memory: 64M
readinessProbe:
httpGet:
path: /index.html
port: 8000
initContainers:
- name: init-www
image: busybox
command: ['sh', '-c', "wget -O- https://tinyurl.com/otus-k8s-intro | sh"]
volumeMounts:
- mountPath: /app
name: www
volumes:
- name: www
emptyDir: {}
| 20.73913 | 83 | 0.492662 |
7912c635a0643d51c47cade4e9dcde8652cac0a3 | 1,214 | yaml | YAML | core/kubernetes/main/hapi-fhir/hapi-fhir-mysql-deployment.yaml | Mark-Labuschagne/instant | e310ab87bcfc8f1559137849419ed4e7b71953bb | [
"Apache-2.0"
] | 11 | 2019-10-21T14:13:19.000Z | 2021-12-22T09:17:13.000Z | core/kubernetes/main/hapi-fhir/hapi-fhir-mysql-deployment.yaml | Mark-Labuschagne/instant | e310ab87bcfc8f1559137849419ed4e7b71953bb | [
"Apache-2.0"
] | 58 | 2019-11-09T22:53:51.000Z | 2022-03-29T08:07:03.000Z | core/kubernetes/main/hapi-fhir/hapi-fhir-mysql-deployment.yaml | Mark-Labuschagne/instant | e310ab87bcfc8f1559137849419ed4e7b71953bb | [
"Apache-2.0"
] | 14 | 2019-08-14T00:57:43.000Z | 2022-03-09T20:35:54.000Z | apiVersion: apps/v1
kind: Deployment
metadata:
name: hapi-fhir-mysql-deployment
labels:
package: core
spec:
replicas: 1
selector:
matchLabels:
component: hapi-fhir-mysql
strategy:
type: Recreate
template:
metadata:
labels:
component: hapi-fhir-mysql
spec:
containers:
- name: hapi-fhir-mysql
image: mysql:5.7
args:
- '--ignore-db-dir=lost+found'
env:
- name: MYSQL_DATABASE
value: hapi
- name: MYSQL_PASSWORD
value: instant101
- name: MYSQL_ROOT_PASSWORD
value: instant101
- name: MYSQL_USER
value: admin
volumeMounts:
- name: core-hapi-fhir-mysql-volume
mountPath: /var/lib/mysql
- name: core-hapi-fhir-mysql-config-map
mountPath: /etc/mysql/conf.d
restartPolicy: Always
volumes:
- name: core-hapi-fhir-mysql-volume
persistentVolumeClaim:
claimName: hapi-fhir-mysql-volume-claim
- name: core-hapi-fhir-mysql-config-map
configMap:
name: core-hapi-fhir-mysql-configmap
| 26.391304 | 51 | 0.559308 |
7912fb6d028d92168bf31784ad2cb7848b78ce03 | 4,419 | yaml | YAML | operator/seldon-operator/deploy/operator.yaml | msteijaert/seldon-core | 04ee26abd2767a65fb2a0b4fac94b2c7e2db4ead | [
"Apache-2.0"
] | 1 | 2020-12-29T03:28:42.000Z | 2020-12-29T03:28:42.000Z | operator/seldon-operator/deploy/operator.yaml | dewnull/seldon-core | 4ab72becbd8f1810be91cdade9021e1cbef1c4aa | [
"Apache-2.0"
] | null | null | null | operator/seldon-operator/deploy/operator.yaml | dewnull/seldon-core | 4ab72becbd8f1810be91cdade9021e1cbef1c4aa | [
"Apache-2.0"
] | null | null | null | apiVersion: apps/v1
kind: Deployment
metadata:
labels:
app: seldon
app.kubernetes.io/instance: seldon1
app.kubernetes.io/name: seldon
app.kubernetes.io/version: v0.5
control-plane: seldon-controller-manager
name: seldon-controller-manager
namespace: default
spec:
replicas: 1
selector:
matchLabels:
app: seldon
app.kubernetes.io/instance: seldon1
app.kubernetes.io/name: seldon
app.kubernetes.io/version: v0.5
control-plane: seldon-controller-manager
template:
metadata:
annotations:
sidecar.istio.io/inject: 'false'
labels:
app: seldon
app.kubernetes.io/instance: seldon1
app.kubernetes.io/name: seldon
app.kubernetes.io/version: v0.5
control-plane: seldon-controller-manager
spec:
containers:
- args:
- --enable-leader-election
- --webhook-port=8443
- --create-resources=$(MANAGER_CREATE_RESOURCES)
command:
- /manager
env:
- name: WATCH_NAMESPACE
value: ''
- name: RELATED_IMAGE_EXECUTOR
value: ''
- name: RELATED_IMAGE_ENGINE
value: ''
- name: RELATED_IMAGE_STORAGE_INITIALIZER
value: ''
- name: RELATED_IMAGE_SKLEARNSERVER_REST
value: ''
- name: RELATED_IMAGE_SKLEARNSERVER_GRPC
value: ''
- name: RELATED_IMAGE_XGBOOSTSERVER_REST
value: ''
- name: RELATED_IMAGE_XGBOOSTSERVER_GRPC
value: ''
- name: RELATED_IMAGE_MLFLOWSERVER_REST
value: ''
- name: RELATED_IMAGE_MLFLOWSERVER_GRPC
value: ''
- name: RELATED_IMAGE_TFPROXY_REST
value: ''
- name: RELATED_IMAGE_TFPROXY_GRPC
value: ''
- name: RELATED_IMAGE_TENSORFLOW
value: ''
- name: RELATED_IMAGE_EXPLAINER
value: ''
- name: MANAGER_CREATE_RESOURCES
value: 'true'
- name: POD_NAMESPACE
valueFrom:
fieldRef:
fieldPath: metadata.namespace
- name: CONTROLLER_ID
value: ''
- name: AMBASSADOR_ENABLED
value: 'true'
- name: AMBASSADOR_SINGLE_NAMESPACE
value: 'false'
- name: ENGINE_CONTAINER_IMAGE_AND_VERSION
value: docker.io/seldonio/engine:1.2.1-dev
- name: ENGINE_CONTAINER_IMAGE_PULL_POLICY
value: IfNotPresent
- name: ENGINE_CONTAINER_SERVICE_ACCOUNT_NAME
value: default
- name: ENGINE_CONTAINER_USER
value: ''
- name: ENGINE_LOG_MESSAGES_EXTERNALLY
value: 'false'
- name: PREDICTIVE_UNIT_SERVICE_PORT
value: '9000'
- name: PREDICTIVE_UNIT_DEFAULT_ENV_SECRET_REF_NAME
value: ''
- name: PREDICTIVE_UNIT_METRICS_PORT_NAME
value: metrics
- name: ENGINE_SERVER_GRPC_PORT
value: '5001'
- name: ENGINE_SERVER_PORT
value: '8000'
- name: ENGINE_PROMETHEUS_PATH
value: /prometheus
- name: ISTIO_ENABLED
value: 'false'
- name: ISTIO_GATEWAY
value: istio-system/seldon-gateway
- name: ISTIO_TLS_MODE
value: ''
- name: USE_EXECUTOR
value: 'true'
- name: EXECUTOR_CONTAINER_IMAGE_AND_VERSION
value: seldonio/seldon-core-executor:1.2.1-dev
- name: EXECUTOR_CONTAINER_IMAGE_PULL_POLICY
value: IfNotPresent
- name: EXECUTOR_PROMETHEUS_PATH
value: /prometheus
- name: EXECUTOR_SERVER_PORT
value: '8000'
- name: EXECUTOR_CONTAINER_USER
value: ''
- name: EXECUTOR_CONTAINER_SERVICE_ACCOUNT_NAME
value: default
- name: EXECUTOR_SERVER_METRICS_PORT_NAME
value: metrics
- name: EXECUTOR_REQUEST_LOGGER_DEFAULT_ENDPOINT
value: http://default-broker
- name: DEFAULT_USER_ID
value: ''
image: seldonio/seldon-core-operator:1.2.1-dev
name: manager
ports:
- containerPort: 8443
name: webhook-server
protocol: TCP
resources:
limits:
cpu: 500m
memory: 300Mi
requests:
cpu: 100m
memory: 200Mi
serviceAccountName: seldon-manager
terminationGracePeriodSeconds: 10
| 30.902098 | 59 | 0.595836 |
7913108dc25cdb193132035a834e18ea8e5c7cad | 1,958 | yaml | YAML | platform/kubernetes/network/network.yaml | itzmanish/micro | 5230c9fe067a4e577369fb8d36f13e6fcfcc817d | [
"Apache-2.0"
] | null | null | null | platform/kubernetes/network/network.yaml | itzmanish/micro | 5230c9fe067a4e577369fb8d36f13e6fcfcc817d | [
"Apache-2.0"
] | null | null | null | platform/kubernetes/network/network.yaml | itzmanish/micro | 5230c9fe067a4e577369fb8d36f13e6fcfcc817d | [
"Apache-2.0"
] | null | null | null | apiVersion: apps/v1
kind: Deployment
metadata:
namespace: default
name: micro-network
labels:
micro: runtime
name: micro-network
annotations:
name: 'go.micro.network'
version: 'latest'
source: 'github.com/itzmanish/micro'
owner: 'micro'
group: 'micro'
spec:
replicas: 1
selector:
matchLabels:
name: micro-network
micro: runtime
strategy:
rollingUpdate:
maxSurge: 0
maxUnavailable: 1
template:
metadata:
labels:
name: micro-network
micro: runtime
spec:
affinity:
podAntiAffinity:
preferredDuringSchedulingIgnoredDuringExecution:
- weight: 100
podAffinityTerm:
labelSelector:
matchExpressions:
- key: name
operator: In
values:
- micro-network
topologyKey: 'kubernetes.io/hostname'
volumes:
- name: shared-data
emptyDir: {}
containers:
- name: network
env:
- name: MICRO_NETWORK_TOKEN
value: 'micro.mu'
- name: MICRO_NETWORK_ADVERTISE_STRATEGY
value: 'best'
- name: MICRO_LOG_LEVEL
value: 'debug'
- name: MICRO_BROKER
value: 'nats'
- name: MICRO_BROKER_ADDRESS
value: 'nats-cluster'
- name: MICRO_REGISTRY
value: 'etcd'
- name: MICRO_REGISTRY_ADDRESS
value: 'etcd-cluster-client'
- name: MICRO_SERVER_ADDRESS
value: '0.0.0.0:8080'
args:
- network
image: micro/micro
imagePullPolicy: Always
ports:
- containerPort: 8080
name: service-port
- containerPort: 8085
name: network-port
protocol: UDP
| 26.106667 | 58 | 0.515322 |
79132ab44a2aba8070af13cc408a76e27c67c4b8 | 2,940 | yaml | YAML | nvidia-driver-installer/cos/daemonset-nvidia-v450.yaml | AlexeyPerevalov/container-engine-accelerators | 7e584fa00b6a767f447cf5b556a366f859b8156c | [
"Apache-2.0"
] | null | null | null | nvidia-driver-installer/cos/daemonset-nvidia-v450.yaml | AlexeyPerevalov/container-engine-accelerators | 7e584fa00b6a767f447cf5b556a366f859b8156c | [
"Apache-2.0"
] | null | null | null | nvidia-driver-installer/cos/daemonset-nvidia-v450.yaml | AlexeyPerevalov/container-engine-accelerators | 7e584fa00b6a767f447cf5b556a366f859b8156c | [
"Apache-2.0"
] | null | null | null | # Copyright 2017 Google Inc. All rights reserved.
#
# Licensed under the Apache License, Version 2.0 (the "License");
# you may not use this file except in compliance with the License.
# You may obtain a copy of the License at
#
# http://www.apache.org/licenses/LICENSE-2.0
#
# Unless required by applicable law or agreed to in writing, software
# distributed under the License is distributed on an "AS IS" BASIS,
# WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
# See the License for the specific language governing permissions and
# limitations under the License.
# The Dockerfile and other source for this daemonset are in
# https://github.com/GoogleCloudPlatform/cos-gpu-installer
apiVersion: apps/v1
kind: DaemonSet
metadata:
name: nvidia-driver-installer
namespace: kube-system
labels:
k8s-app: nvidia-driver-installer
spec:
selector:
matchLabels:
k8s-app: nvidia-driver-installer
updateStrategy:
type: RollingUpdate
template:
metadata:
labels:
name: nvidia-driver-installer
k8s-app: nvidia-driver-installer
spec:
affinity:
nodeAffinity:
requiredDuringSchedulingIgnoredDuringExecution:
nodeSelectorTerms:
- matchExpressions:
- key: cloud.google.com/gke-accelerator
operator: Exists
tolerations:
- operator: "Exists"
hostNetwork: true
hostPID: true
volumes:
- name: dev
hostPath:
path: /dev
- name: vulkan-icd-mount
hostPath:
path: /home/kubernetes/bin/nvidia/vulkan/icd.d
- name: nvidia-install-dir-host
hostPath:
path: /home/kubernetes/bin/nvidia
- name: root-mount
hostPath:
path: /
initContainers:
- image: gcr.io/cos-cloud/cos-gpu-installer@sha256:8d86a652759f80595cafed7d3dcde3dc53f57f9bc1e33b27bc3cfa7afea8d483
name: nvidia-driver-installer
resources:
requests:
cpu: "0.15"
securityContext:
privileged: true
env:
- name: NVIDIA_INSTALL_DIR_HOST
value: /home/kubernetes/bin/nvidia
- name: NVIDIA_INSTALL_DIR_CONTAINER
value: /usr/local/nvidia
- name: VULKAN_ICD_DIR_HOST
value: /home/kubernetes/bin/nvidia/vulkan/icd.d
- name: VULKAN_ICD_DIR_CONTAINER
value: /etc/vulkan/icd.d
- name: ROOT_MOUNT_DIR
value: /root
- name: NVIDIA_DRIVER_VERSION
value: "450.51.06"
volumeMounts:
- name: nvidia-install-dir-host
mountPath: /usr/local/nvidia
- name: vulkan-icd-mount
mountPath: /etc/vulkan/icd.d
- name: dev
mountPath: /dev
- name: root-mount
mountPath: /root
containers:
- image: "gcr.io/google-containers/pause:2.0"
name: pause
| 31.276596 | 121 | 0.634354 |
79132b9e32cf249b4d0849a89abd154ed3dadb1f | 144 | yaml | YAML | built-in-references/Kubernetes/perf/violations/violation7863.yaml | sw47/azure-policy | 4a38e4cb4047b5364902653f0defe45f1b21bc61 | [
"MIT"
] | null | null | null | built-in-references/Kubernetes/perf/violations/violation7863.yaml | sw47/azure-policy | 4a38e4cb4047b5364902653f0defe45f1b21bc61 | [
"MIT"
] | null | null | null | built-in-references/Kubernetes/perf/violations/violation7863.yaml | sw47/azure-policy | 4a38e4cb4047b5364902653f0defe45f1b21bc61 | [
"MIT"
] | null | null | null | apiVersion: v1
kind: Pod
metadata:
name: image-demo-7863
spec:
containers:
- name: nginx
image: nginx #ritaacr.azurecr.io/nginx:latest | 18 | 49 | 0.722222 |
79137faaaca00bd3125361abd348f0da12330470 | 4,703 | yaml | YAML | bin/prometheus/02-prometheus-configmap.yaml | siorellana/webpage_clon | ccdc6fcb6f4c4ad0597b0c933fac3d009945ebbd | [
"MIT"
] | 1 | 2020-03-22T21:42:51.000Z | 2020-03-22T21:42:51.000Z | bin/prometheus/02-prometheus-configmap.yaml | siorellana/test_clone | ccdc6fcb6f4c4ad0597b0c933fac3d009945ebbd | [
"MIT"
] | null | null | null | bin/prometheus/02-prometheus-configmap.yaml | siorellana/test_clone | ccdc6fcb6f4c4ad0597b0c933fac3d009945ebbd | [
"MIT"
] | null | null | null | apiVersion: v1
kind: ConfigMap
metadata:
name: prometheus-server-conf
labels:
name: prometheus-server-conf
namespace: monitoring
data:
prometheus.rules: |-
groups:
- name: devopscube demo alert
rules:
- alert: High Pod Memory
expr: sum(container_memory_usage_bytes) > 10
for: 1m
labels:
severity: critical
annotations:
summary: High Memory Usage
prometheus.yml: |-
global:
scrape_interval: 5s
evaluation_interval: 5s
rule_files:
- /etc/prometheus/prometheus.rules
alerting:
alertmanagers:
- scheme: http
static_configs:
- targets:
- "alertmanager.monitoring.svc:9093"
scrape_configs:
- job_name: 'kubernetes-apiservers'
kubernetes_sd_configs:
- role: endpoints
scheme: https
tls_config:
ca_file: /var/run/secrets/kubernetes.io/serviceaccount/ca.crt
bearer_token_file: /var/run/secrets/kubernetes.io/serviceaccount/token
relabel_configs:
- source_labels: [__meta_kubernetes_namespace, __meta_kubernetes_service_name, __meta_kubernetes_endpoint_port_name]
action: keep
regex: default;kubernetes;https
- job_name: 'kubernetes-nodes'
scheme: https
tls_config:
ca_file: /var/run/secrets/kubernetes.io/serviceaccount/ca.crt
bearer_token_file: /var/run/secrets/kubernetes.io/serviceaccount/token
kubernetes_sd_configs:
- role: node
relabel_configs:
- action: labelmap
regex: __meta_kubernetes_node_label_(.+)
- target_label: __address__
replacement: kubernetes.default.svc:443
- source_labels: [__meta_kubernetes_node_name]
regex: (.+)
target_label: __metrics_path__
replacement: /api/v1/nodes/${1}/proxy/metrics
- job_name: 'kubernetes-pods'
kubernetes_sd_configs:
- role: pod
relabel_configs:
- source_labels: [__meta_kubernetes_pod_annotation_prometheus_io_scrape]
action: keep
regex: true
- source_labels: [__meta_kubernetes_pod_annotation_prometheus_io_path]
action: replace
target_label: __metrics_path__
regex: (.+)
- source_labels: [__address__, __meta_kubernetes_pod_annotation_prometheus_io_port]
action: replace
regex: ([^:]+)(?::\d+)?;(\d+)
replacement: $1:$2
target_label: __address__
- action: labelmap
regex: __meta_kubernetes_pod_label_(.+)
- source_labels: [__meta_kubernetes_namespace]
action: replace
target_label: kubernetes_namespace
- source_labels: [__meta_kubernetes_pod_name]
action: replace
target_label: kubernetes_pod_name
- job_name: 'kubernetes-cadvisor'
scheme: https
tls_config:
ca_file: /var/run/secrets/kubernetes.io/serviceaccount/ca.crt
bearer_token_file: /var/run/secrets/kubernetes.io/serviceaccount/token
kubernetes_sd_configs:
- role: node
relabel_configs:
- action: labelmap
regex: __meta_kubernetes_node_label_(.+)
- target_label: __address__
replacement: kubernetes.default.svc:443
- source_labels: [__meta_kubernetes_node_name]
regex: (.+)
target_label: __metrics_path__
replacement: /api/v1/nodes/${1}/proxy/metrics/cadvisor
- job_name: 'kubernetes-service-endpoints'
kubernetes_sd_configs:
- role: endpoints
relabel_configs:
- source_labels: [__meta_kubernetes_service_annotation_prometheus_io_scrape]
action: keep
regex: true
- source_labels: [__meta_kubernetes_service_annotation_prometheus_io_scheme]
action: replace
target_label: __scheme__
regex: (https?)
- source_labels: [__meta_kubernetes_service_annotation_prometheus_io_path]
action: replace
target_label: __metrics_path__
regex: (.+)
- source_labels: [__address__, __meta_kubernetes_service_annotation_prometheus_io_port]
action: replace
target_label: __address__
regex: ([^:]+)(?::\d+)?;(\d+)
replacement: $1:$2
- action: labelmap
regex: __meta_kubernetes_service_label_(.+)
- source_labels: [__meta_kubernetes_namespace]
action: replace
target_label: kubernetes_namespace
- source_labels: [__meta_kubernetes_service_name]
action: replace
target_label: kubernetes_name
| 31.563758 | 124 | 0.640655 |
79139334cdfae4369cb284dbdaf89ce7021a9c9d | 1,926 | yaml | YAML | config/prow/cluster/cherrypicker_deployment.yaml | Halamix2/test-infra-1 | 076a36039ba3fe816fb3b9657d2da92e29c2813b | [
"Apache-2.0"
] | null | null | null | config/prow/cluster/cherrypicker_deployment.yaml | Halamix2/test-infra-1 | 076a36039ba3fe816fb3b9657d2da92e29c2813b | [
"Apache-2.0"
] | null | null | null | config/prow/cluster/cherrypicker_deployment.yaml | Halamix2/test-infra-1 | 076a36039ba3fe816fb3b9657d2da92e29c2813b | [
"Apache-2.0"
] | null | null | null | # Copyright 2021 The Kubernetes Authors All rights reserved.
#
# Licensed under the Apache License, Version 2.0 (the "License");
# you may not use this file except in compliance with the License.
# You may obtain a copy of the License at
#
# http://www.apache.org/licenses/LICENSE-2.0
#
# Unless required by applicable law or agreed to in writing, software
# distributed under the License is distributed on an "AS IS" BASIS,
# WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
# See the License for the specific language governing permissions and
# limitations under the License.
apiVersion: apps/v1
kind: Deployment
metadata:
namespace: default
name: cherrypicker
labels:
app: cherrypicker
spec:
replicas: 1
strategy:
type: RollingUpdate
rollingUpdate:
maxSurge: 1
maxUnavailable: 1
selector:
matchLabels:
app: cherrypicker
template:
metadata:
labels:
app: cherrypicker
spec:
serviceAccountName: ""
serviceAccount: ""
terminationGracePeriodSeconds: 180
containers:
- name: cherrypicker
image: gcr.io/k8s-prow/cherrypicker:v20220104-d6f21887c1
imagePullPolicy: Always
args:
- --github-token-path=/etc/github/token
- --github-endpoint=http://ghproxy
- --github-endpoint=https://api.github.com
- --dry-run=false
ports:
- name: http
containerPort: 8888
volumeMounts:
- name: hmac
mountPath: /etc/webhook
readOnly: true
- name: github-token
mountPath: /etc/github
readOnly: true
- name: tmp
mountPath: /tmp
volumes:
- name: tmp
emptyDir: {}
- name: hmac
secret:
secretName: hmac-token
- name: github-token
secret:
secretName: k8s-infra-cherrypick-robot-github-token
| 27.514286 | 74 | 0.639148 |
791396fac2893393082ef8d555511fd7e2825b3e | 67 | yaml | YAML | additional/initial-resources.yaml | SoeldnerConsult/vSphere-extensions | f16ec624c35ed3faf6a40c7b5c4bb37ec446d32f | [
"Apache-2.0"
] | null | null | null | additional/initial-resources.yaml | SoeldnerConsult/vSphere-extensions | f16ec624c35ed3faf6a40c7b5c4bb37ec446d32f | [
"Apache-2.0"
] | null | null | null | additional/initial-resources.yaml | SoeldnerConsult/vSphere-extensions | f16ec624c35ed3faf6a40c7b5c4bb37ec446d32f | [
"Apache-2.0"
] | null | null | null | apiVersion: v1
kind: Namespace
metadata:
name: vsphere-extensions | 16.75 | 26 | 0.80597 |
7913df8679557e73b237cbb197eb41d3a017d658 | 317 | yaml | YAML | cluster/base/cluster-settings.yaml | spacesyl/klus | f5cedc9ea80866d07f5cd3499ed7bf3c4eb930ca | [
"MIT"
] | null | null | null | cluster/base/cluster-settings.yaml | spacesyl/klus | f5cedc9ea80866d07f5cd3499ed7bf3c4eb930ca | [
"MIT"
] | 1 | 2022-02-22T14:56:45.000Z | 2022-02-22T14:56:45.000Z | cluster/base/cluster-settings.yaml | spacesyl/klus | f5cedc9ea80866d07f5cd3499ed7bf3c4eb930ca | [
"MIT"
] | null | null | null | ---
apiVersion: v1
kind: ConfigMap
metadata:
name: cluster-settings
namespace: flux-system
data:
METALLB_LB_RANGE: 10.1.0.100-10.1.0.200
METALLB_TRAEFIK_ADDR: 10.1.0.100
METALLB_K8S_GATEWAY_ADDR: 10.1.0.101
METALLB_CHRONY_ADDR: 10.1.0.102
METALLB_MQTT_ADDR: 10.1.0.103
METALLB_BLOCKY_ADDR: 10.1.0.104
| 22.642857 | 41 | 0.753943 |
79141fe3db7beaa4c538ec6cd047680c3dc13e54 | 2,160 | yaml | YAML | pkg/templates/charts/toggle/cluster-manager/templates/cluster-manager-clusterrole.yaml | jnpacker/backplane-operator | 9d04f2dd496644ba9ecdad45110529fe2e89f2a0 | [
"Apache-2.0"
] | 3 | 2022-03-17T03:37:10.000Z | 2022-03-20T21:39:59.000Z | pkg/templates/charts/toggle/cluster-manager/templates/cluster-manager-clusterrole.yaml | jnpacker/backplane-operator | 9d04f2dd496644ba9ecdad45110529fe2e89f2a0 | [
"Apache-2.0"
] | 87 | 2022-01-05T16:14:53.000Z | 2022-03-31T18:18:41.000Z | pkg/templates/charts/toggle/cluster-manager/templates/cluster-manager-clusterrole.yaml | jnpacker/backplane-operator | 9d04f2dd496644ba9ecdad45110529fe2e89f2a0 | [
"Apache-2.0"
] | 7 | 2022-02-08T03:14:16.000Z | 2022-03-31T02:29:39.000Z | apiVersion: rbac.authorization.k8s.io/v1
kind: ClusterRole
metadata:
name: '{{ .Values.org }}:{{ .Chart.Name }}:cluster-manager'
rules:
- apiGroups:
- ''
resources:
- configmaps
- namespaces
- serviceaccounts
- services
- secrets
verbs:
- create
- get
- list
- update
- watch
- patch
- delete
- apiGroups:
- coordination.k8s.io
resources:
- leases
verbs:
- create
- get
- list
- update
- watch
- patch
- apiGroups:
- ''
resources:
- nodes
verbs:
- get
- list
- watch
- apiGroups:
- authorization.k8s.io
resources:
- subjectaccessreviews
verbs:
- create
- apiGroups:
- ''
- events.k8s.io
resources:
- events
verbs:
- create
- patch
- update
- apiGroups:
- apps
resources:
- deployments
verbs:
- create
- get
- list
- update
- watch
- patch
- delete
- apiGroups:
- rbac.authorization.k8s.io
resources:
- clusterrolebindings
- rolebindings
verbs:
- create
- get
- list
- update
- watch
- patch
- delete
- apiGroups:
- rbac.authorization.k8s.io
resources:
- clusterroles
- roles
verbs:
- create
- get
- list
- update
- watch
- patch
- delete
- escalate
- bind
- apiGroups:
- apiextensions.k8s.io
resources:
- customresourcedefinitions
verbs:
- create
- get
- list
- update
- watch
- patch
- delete
- apiGroups:
- apiregistration.k8s.io
resources:
- apiservices
verbs:
- create
- get
- list
- update
- watch
- patch
- delete
- apiGroups:
- admissionregistration.k8s.io
resources:
- validatingwebhookconfigurations
- mutatingwebhookconfigurations
verbs:
- create
- get
- list
- update
- watch
- patch
- delete
- apiGroups:
- operator.open-cluster-management.io
resources:
- clustermanagers
verbs:
- get
- list
- watch
- update
- delete
- apiGroups:
- operator.open-cluster-management.io
resources:
- clustermanagers/status
verbs:
- update
- patch
- apiGroups:
- migration.k8s.io
resources:
- storageversionmigrations
verbs:
- create
- get
- list
- update
- watch
- patch
- delete
| 13.333333 | 61 | 0.623611 |
791441976a2a86783c7ee01b9231ad94257708d7 | 353 | yaml | YAML | config/rbac/cache_editor_role.yaml | mgoltzsche/jobcachefs | 6b75e780adaae234a22280f69ce8f73ffb7636f6 | [
"Apache-2.0"
] | 1 | 2022-01-24T11:46:50.000Z | 2022-01-24T11:46:50.000Z | config/rbac/cache_editor_role.yaml | mgoltzsche/jobcachefs | 6b75e780adaae234a22280f69ce8f73ffb7636f6 | [
"Apache-2.0"
] | 1 | 2021-04-26T21:46:27.000Z | 2021-04-26T21:46:27.000Z | config/rbac/cache_editor_role.yaml | mgoltzsche/k8storagex | 6b75e780adaae234a22280f69ce8f73ffb7636f6 | [
"Apache-2.0"
] | null | null | null | apiVersion: rbac.authorization.k8s.io/v1
kind: ClusterRole
metadata:
name: cache-editor-role
rules:
- apiGroups:
- k8storagex.mgoltzsche.github.com
resources:
- caches
verbs:
- create
- delete
- get
- list
- patch
- update
- watch
- apiGroups:
- k8storagex.mgoltzsche.github.com
resources:
- caches/status
verbs:
- get
| 14.708333 | 40 | 0.68272 |
7914b3189f093f3d6881427b632b052ca1e8310e | 71 | yaml | YAML | deploy/service_account.yaml | kube-sailmaker/request-operator | 01e3a49423b50aff730c2cfbad0260d7d1a52e70 | [
"Apache-2.0"
] | null | null | null | deploy/service_account.yaml | kube-sailmaker/request-operator | 01e3a49423b50aff730c2cfbad0260d7d1a52e70 | [
"Apache-2.0"
] | null | null | null | deploy/service_account.yaml | kube-sailmaker/request-operator | 01e3a49423b50aff730c2cfbad0260d7d1a52e70 | [
"Apache-2.0"
] | null | null | null | apiVersion: v1
kind: ServiceAccount
metadata:
name: request-operator
| 14.2 | 24 | 0.802817 |
7914e068d0078c059a900bd18ec0135ea3ce62c0 | 189 | yaml | YAML | kubernetes/mysql-pvc.yaml | jpconver/containerization | bf39f0a76a3656c4931e4a12d088335ffec16935 | [
"TCP-wrappers",
"ECL-1.0",
"ECL-2.0",
"Xnet",
"Linux-OpenIB",
"X11"
] | 2 | 2021-07-30T02:12:23.000Z | 2021-08-24T00:12:38.000Z | kubernetes/mysql-pvc.yaml | jpconver/containerization | bf39f0a76a3656c4931e4a12d088335ffec16935 | [
"TCP-wrappers",
"ECL-1.0",
"ECL-2.0",
"Xnet",
"Linux-OpenIB",
"X11"
] | null | null | null | kubernetes/mysql-pvc.yaml | jpconver/containerization | bf39f0a76a3656c4931e4a12d088335ffec16935 | [
"TCP-wrappers",
"ECL-1.0",
"ECL-2.0",
"Xnet",
"Linux-OpenIB",
"X11"
] | null | null | null | apiVersion: v1
kind: PersistentVolumeClaim
metadata:
name: mysql-pv-claim
labels:
app: mysql8
spec:
accessModes:
- ReadWriteOnce
resources:
requests:
storage: 5Gi
| 14.538462 | 27 | 0.693122 |
79151ca5455fc14b5d695a7a11549fc293416d64 | 683 | yml | YAML | kubernetes/k8s/ingress-service.yml | shankalpaLamichhane/infrastructures | 46a2cfbd34e59cfeb7431947f6a6a15c640b9a56 | [
"MIT"
] | null | null | null | kubernetes/k8s/ingress-service.yml | shankalpaLamichhane/infrastructures | 46a2cfbd34e59cfeb7431947f6a6a15c640b9a56 | [
"MIT"
] | 1 | 2022-02-17T14:54:18.000Z | 2022-02-17T14:54:18.000Z | kubernetes/k8s/ingress-service.yml | shankalpaLamichhane/infrastructures | 46a2cfbd34e59cfeb7431947f6a6a15c640b9a56 | [
"MIT"
] | null | null | null | apiVersion: networking.k8s.io/v1
kind: Ingress
metadata:
name: ingress-service
annotations:
kubernetes.io/ingress.class: "nginx"
nginx.ingress.kubernetes.io/use-regex: "true"
nginx.ingress.kubernetes.io/rewrite-target: /$1
spec:
rules:
- http:
paths:
- path: /?(.*)
pathType: Prefix
backend:
service:
name: client-cluster-ip-service
port:
number: 3000
- path: /api/?(.*)
pathType: Prefix
backend:
service:
name: server-cluster-ip-service
port:
number: 5000
| 25.296296 | 51 | 0.502196 |
79151cc3023790eccbf85dfcb1ef5d3e540dd482 | 200 | yaml | YAML | operators/flux/0.22.0/manifests/source-controller.serviceaccount.yaml | davidesalerno/community-operators | 1a209358bc6a9931667181ef93896b25d5fda042 | [
"Apache-2.0"
] | 53 | 2021-07-18T09:23:52.000Z | 2022-03-24T18:48:37.000Z | operators/flux/0.22.0/manifests/source-controller.serviceaccount.yaml | davidesalerno/community-operators | 1a209358bc6a9931667181ef93896b25d5fda042 | [
"Apache-2.0"
] | 974 | 2021-06-30T14:22:41.000Z | 2022-03-31T22:56:44.000Z | operators/flux/0.22.0/manifests/source-controller.serviceaccount.yaml | davidesalerno/community-operators | 1a209358bc6a9931667181ef93896b25d5fda042 | [
"Apache-2.0"
] | 305 | 2021-07-15T09:04:42.000Z | 2022-03-30T08:20:29.000Z | apiVersion: v1
kind: ServiceAccount
metadata:
labels:
app.kubernetes.io/instance: flux-system
app.kubernetes.io/part-of: flux
app.kubernetes.io/version: 0.22.0
name: source-controller
| 22.222222 | 43 | 0.74 |
7915415bc648511fc0be4b013f58e245ff0e049e | 415 | yaml | YAML | config/rbac/byomachine_editor_role.yaml | huchen2021/cluster-api-provider-bringyourownhost | 4dcd4b11d65cac47d95125162ad8826006e60938 | [
"Apache-2.0"
] | 86 | 2021-11-01T07:25:39.000Z | 2022-03-29T19:24:54.000Z | config/rbac/byomachine_editor_role.yaml | huchen2021/cluster-api-provider-bringyourownhost | 4dcd4b11d65cac47d95125162ad8826006e60938 | [
"Apache-2.0"
] | 199 | 2021-11-02T07:25:22.000Z | 2022-03-31T13:19:35.000Z | config/rbac/byomachine_editor_role.yaml | huchen2021/cluster-api-provider-bringyourownhost | 4dcd4b11d65cac47d95125162ad8826006e60938 | [
"Apache-2.0"
] | 18 | 2021-11-05T09:02:03.000Z | 2022-03-25T17:20:39.000Z | # permissions for end users to edit byomachines.
apiVersion: rbac.authorization.k8s.io/v1
kind: ClusterRole
metadata:
name: byomachine-editor-role
rules:
- apiGroups:
- infrastructure.cluster.x-k8s.io
resources:
- byomachines
verbs:
- create
- delete
- get
- list
- patch
- update
- watch
- apiGroups:
- infrastructure.cluster.x-k8s.io
resources:
- byomachines/status
verbs:
- get
| 16.6 | 48 | 0.701205 |
791557b773a0c12667203fb9a0f0a983f8385a6f | 2,236 | yaml | YAML | config-root/customresourcedefinitions/tekton-pipelines/tekton-pipeline/clustertasks.tekton.dev-crd.yaml | simonbahuchet/jx3-minikube | 6de11d2b66317cbf54b776579c05f3dd1082c9dd | [
"Apache-2.0"
] | null | null | null | config-root/customresourcedefinitions/tekton-pipelines/tekton-pipeline/clustertasks.tekton.dev-crd.yaml | simonbahuchet/jx3-minikube | 6de11d2b66317cbf54b776579c05f3dd1082c9dd | [
"Apache-2.0"
] | null | null | null | config-root/customresourcedefinitions/tekton-pipelines/tekton-pipeline/clustertasks.tekton.dev-crd.yaml | simonbahuchet/jx3-minikube | 6de11d2b66317cbf54b776579c05f3dd1082c9dd | [
"Apache-2.0"
] | null | null | null | # Source: tekton-pipeline/templates/clustertasks.tekton.dev-crd.yaml
# Copyright 2019 The Tekton Authors
#
# Licensed under the Apache License, Version 2.0 (the "License");
# you may not use this file except in compliance with the License.
# You may obtain a copy of the License at
#
# https://www.apache.org/licenses/LICENSE-2.0
#
# Unless required by applicable law or agreed to in writing, software
# distributed under the License is distributed on an "AS IS" BASIS,
# WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
# See the License for the specific language governing permissions and
# limitations under the License.
apiVersion: apiextensions.k8s.io/v1
kind: CustomResourceDefinition
metadata:
name: clustertasks.tekton.dev
labels:
app.kubernetes.io/instance: default
app.kubernetes.io/part-of: tekton-pipelines
pipeline.tekton.dev/release: "v0.17.3"
version: "v0.17.3"
gitops.jenkins-x.io/pipeline: 'customresourcedefinitions'
spec:
group: tekton.dev
preserveUnknownFields: false
versions:
- &version
name: v1alpha1
served: true
storage: false
schema:
openAPIV3Schema:
type: object
# One can use x-kubernetes-preserve-unknown-fields: true
# at the root of the schema (and inside any properties, additionalProperties)
# to get the traditional CRD behaviour that nothing is pruned, despite
# setting spec.preserveUnknownProperties: false.
#
# See https://kubernetes.io/blog/2019/06/20/crd-structural-schema/
# See issue: https://github.com/knative/serving/issues/912
x-kubernetes-preserve-unknown-fields: true
# Opt into the status subresource so metadata.generation
# starts to increment
subresources:
status: {}
- !!merge <<: *version
name: v1beta1
storage: true
names:
kind: ClusterTask
plural: clustertasks
categories:
- tekton
- tekton-pipelines
scope: Cluster
conversion:
strategy: Webhook
webhook:
conversionReviewVersions: ["v1beta1"]
clientConfig:
service:
name: tekton-pipelines-webhook
namespace: tekton-pipelines
| 33.373134 | 87 | 0.691413 |
79158fc33917c360e50ccc7259eea5df69e542af | 784 | yaml | YAML | k8s/knative/chart/knative/templates/knative/serving/namespace.yaml | ganochenkodg/click-to-deploy | 6b706e3183224894d055ff4c2aeab1543903fcaf | [
"Apache-2.0"
] | null | null | null | k8s/knative/chart/knative/templates/knative/serving/namespace.yaml | ganochenkodg/click-to-deploy | 6b706e3183224894d055ff4c2aeab1543903fcaf | [
"Apache-2.0"
] | null | null | null | k8s/knative/chart/knative/templates/knative/serving/namespace.yaml | ganochenkodg/click-to-deploy | 6b706e3183224894d055ff4c2aeab1543903fcaf | [
"Apache-2.0"
] | null | null | null | # Copyright 2018 The Knative Authors
#
# Licensed under the Apache License, Version 2.0 (the "License");
# you may not use this file except in compliance with the License.
# You may obtain a copy of the License at
#
# https://www.apache.org/licenses/LICENSE-2.0
#
# Unless required by applicable law or agreed to in writing, software
# distributed under the License is distributed on an "AS IS" BASIS,
# WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
# See the License for the specific language governing permissions and
# limitations under the License.
apiVersion: v1
kind: Namespace
metadata:
name: knative-serving
labels:
app.kubernetes.io/name: knative-serving
app.kubernetes.io/version: "1.2.0"
serving.knative.dev/release: "v1.2.0" | 35.636364 | 74 | 0.752551 |
7915be11352afda78cf44e26d3cd3f9d36f7ec2f | 162 | yaml | YAML | guestbook/guestbook-ui-svc.yaml | harikrish82/bluejay | 776ac839cb8e88be068242eccae836c4e5cc6430 | [
"Apache-2.0"
] | null | null | null | guestbook/guestbook-ui-svc.yaml | harikrish82/bluejay | 776ac839cb8e88be068242eccae836c4e5cc6430 | [
"Apache-2.0"
] | null | null | null | guestbook/guestbook-ui-svc.yaml | harikrish82/bluejay | 776ac839cb8e88be068242eccae836c4e5cc6430 | [
"Apache-2.0"
] | null | null | null | apiVersion: v1
kind: Service
metadata:
name: guestbook-ui
spec:
ports:
- port: 80
targetPort: 80
type: LoadBalancer
selector:
app: guestbook-ui
| 13.5 | 21 | 0.685185 |
7915d79a1d7f1fca6badc32bcd9aaaba19d6ad19 | 1,319 | yml | YAML | openshift/cert-service.yml | lachmanfrantisek/deployment | 40eadf1bc4014856690c3e38cdee866ce9c8931d | [
"MIT"
] | null | null | null | openshift/cert-service.yml | lachmanfrantisek/deployment | 40eadf1bc4014856690c3e38cdee866ce9c8931d | [
"MIT"
] | null | null | null | openshift/cert-service.yml | lachmanfrantisek/deployment | 40eadf1bc4014856690c3e38cdee866ce9c8931d | [
"MIT"
] | 1 | 2020-05-09T07:23:19.000Z | 2020-05-09T07:23:19.000Z | # MIT License
#
# Copyright (c) 2018-2019 Red Hat, Inc.
# Permission is hereby granted, free of charge, to any person obtaining a copy
# of this software and associated documentation files (the "Software"), to deal
# in the Software without restriction, including without limitation the rights
# to use, copy, modify, merge, publish, distribute, sublicense, and/or sell
# copies of the Software, and to permit persons to whom the Software is
# furnished to do so, subject to the following conditions:
#
# The above copyright notice and this permission notice shall be included in all
# copies or substantial portions of the Software.
#
# THE SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF ANY KIND, EXPRESS OR
# IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF MERCHANTABILITY,
# FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT. IN NO EVENT SHALL THE
# AUTHORS OR COPYRIGHT HOLDERS BE LIABLE FOR ANY CLAIM, DAMAGES OR OTHER
# LIABILITY, WHETHER IN AN ACTION OF CONTRACT, TORT OR OTHERWISE, ARISING FROM,
# OUT OF OR IN CONNECTION WITH THE SOFTWARE OR THE USE OR OTHER DEALINGS IN THE
# SOFTWARE.
---
apiVersion: v1
kind: Service
metadata:
name: get-them-certs
spec:
selector:
name: get-them-certs
app: certo
ports:
- name: certo-http
port: 80
protocol: TCP
targetPort: 8080
| 35.648649 | 80 | 0.754359 |
7915eb843ca0ea9e48f7d8025247dfb7378d87c1 | 852 | yaml | YAML | gcp/iap-ingress/base/job.yaml | stpabhi/manifests | 053a5f54abb248f9768189782625d851fe64d2a3 | [
"Apache-2.0"
] | null | null | null | gcp/iap-ingress/base/job.yaml | stpabhi/manifests | 053a5f54abb248f9768189782625d851fe64d2a3 | [
"Apache-2.0"
] | null | null | null | gcp/iap-ingress/base/job.yaml | stpabhi/manifests | 053a5f54abb248f9768189782625d851fe64d2a3 | [
"Apache-2.0"
] | null | null | null | apiVersion: batch/v1
kind: Job
metadata:
name: ingress-bootstrap
spec:
template:
spec:
containers:
- command:
- /var/ingress-config/ingress_bootstrap.sh
env:
- name: NAMESPACE
value: kubeflow
- name: TLS_SECRET_NAME
value: envoy-ingress-tls
- name: TLS_HOST_NAME
value: kubeflow.endpoints.constant-cubist-173123.cloud.goog
- name: INGRESS_NAME
value: envoy-ingress
image: gcr.io/kubeflow-images-public/ingress-setup:latest
name: bootstrap
volumeMounts:
- mountPath: /var/ingress-config/
name: ingress-config
restartPolicy: OnFailure
serviceAccountName: envoy
volumes:
- configMap:
defaultMode: 493
name: ingress-bootstrap-config
name: ingress-config
| 26.625 | 69 | 0.612676 |
7916032ccc205ea5a2ad1450314b775b15670adf | 240 | yaml | YAML | mongo_yaml/mongo_pv3.yaml | shlomoweiss/kuburnetes_ymals | 9fb9effd542d7bd4e3f3d478b3d2932c84108f73 | [
"MIT"
] | null | null | null | mongo_yaml/mongo_pv3.yaml | shlomoweiss/kuburnetes_ymals | 9fb9effd542d7bd4e3f3d478b3d2932c84108f73 | [
"MIT"
] | null | null | null | mongo_yaml/mongo_pv3.yaml | shlomoweiss/kuburnetes_ymals | 9fb9effd542d7bd4e3f3d478b3d2932c84108f73 | [
"MIT"
] | null | null | null | kind: PersistentVolume
apiVersion: v1
metadata:
name: mongo-pv-003
labels:
type: local
spec:
storageClassName: manual
capacity:
storage: 5Gi
accessModes:
- ReadWriteOnce
hostPath:
path: "/home/shlomo/mongo/data3" | 17.142857 | 36 | 0.704167 |
79160a92f282ca13c6ddd81e30c5345064c2d424 | 858 | yaml | YAML | k8s/knative/chart/knative/templates/knative/serving/serviceaccounts.yaml | ganochenkodg/click-to-deploy | 6b706e3183224894d055ff4c2aeab1543903fcaf | [
"Apache-2.0"
] | null | null | null | k8s/knative/chart/knative/templates/knative/serving/serviceaccounts.yaml | ganochenkodg/click-to-deploy | 6b706e3183224894d055ff4c2aeab1543903fcaf | [
"Apache-2.0"
] | null | null | null | k8s/knative/chart/knative/templates/knative/serving/serviceaccounts.yaml | ganochenkodg/click-to-deploy | 6b706e3183224894d055ff4c2aeab1543903fcaf | [
"Apache-2.0"
] | null | null | null | # Copyright 2018 The Knative Authors
#
# Licensed under the Apache License, Version 2.0 (the "License");
# you may not use this file except in compliance with the License.
# You may obtain a copy of the License at
#
# https://www.apache.org/licenses/LICENSE-2.0
#
# Unless required by applicable law or agreed to in writing, software
# distributed under the License is distributed on an "AS IS" BASIS,
# WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
# See the License for the specific language governing permissions and
# limitations under the License.
apiVersion: v1
kind: ServiceAccount
metadata:
name: controller
namespace: knative-serving
labels:
app.kubernetes.io/component: controller
app.kubernetes.io/name: knative-serving
app.kubernetes.io/version: "1.2.0"
serving.knative.dev/release: "v1.2.0"
| 34.32 | 74 | 0.755245 |
79160ce308bc675f3e61b0cebf0d6c3e7373a21f | 4,439 | yaml | YAML | packaging/install/cluster-operator/060-Deployment-strimzi-cluster-operator.yaml | Lionheart1984/strimzi-kafka-operator | 426f7407d279a00555498ab1378ea8d9476f3033 | [
"Apache-2.0"
] | 1 | 2020-07-08T15:59:41.000Z | 2020-07-08T15:59:41.000Z | packaging/install/cluster-operator/060-Deployment-strimzi-cluster-operator.yaml | Lionheart1984/strimzi-kafka-operator | 426f7407d279a00555498ab1378ea8d9476f3033 | [
"Apache-2.0"
] | null | null | null | packaging/install/cluster-operator/060-Deployment-strimzi-cluster-operator.yaml | Lionheart1984/strimzi-kafka-operator | 426f7407d279a00555498ab1378ea8d9476f3033 | [
"Apache-2.0"
] | null | null | null | apiVersion: apps/v1
kind: Deployment
metadata:
name: strimzi-cluster-operator
labels:
app: strimzi
spec:
replicas: 1
selector:
matchLabels:
name: strimzi-cluster-operator
strimzi.io/kind: cluster-operator
template:
metadata:
labels:
name: strimzi-cluster-operator
strimzi.io/kind: cluster-operator
spec:
serviceAccountName: strimzi-cluster-operator
volumes:
- name: strimzi-tmp
emptyDir:
medium: Memory
sizeLimit: 1Mi
- name: co-config-volume
configMap:
name: strimzi-cluster-operator
containers:
- name: strimzi-cluster-operator
image: quay.io/strimzi/operator:latest
ports:
- containerPort: 8080
name: http
args:
- /opt/strimzi/bin/cluster_operator_run.sh
volumeMounts:
- name: strimzi-tmp
mountPath: /tmp
- name: co-config-volume
mountPath: /opt/strimzi/custom-config/
env:
- name: STRIMZI_NAMESPACE
valueFrom:
fieldRef:
fieldPath: metadata.namespace
- name: STRIMZI_FULL_RECONCILIATION_INTERVAL_MS
value: "120000"
- name: STRIMZI_OPERATION_TIMEOUT_MS
value: "300000"
- name: STRIMZI_DEFAULT_TLS_SIDECAR_ENTITY_OPERATOR_IMAGE
value: quay.io/strimzi/kafka:latest-kafka-3.0.0
- name: STRIMZI_DEFAULT_KAFKA_EXPORTER_IMAGE
value: quay.io/strimzi/kafka:latest-kafka-3.0.0
- name: STRIMZI_DEFAULT_CRUISE_CONTROL_IMAGE
value: quay.io/strimzi/kafka:latest-kafka-3.0.0
- name: STRIMZI_DEFAULT_TLS_SIDECAR_CRUISE_CONTROL_IMAGE
value: quay.io/strimzi/kafka:latest-kafka-3.0.0
- name: STRIMZI_KAFKA_IMAGES
value: |
2.8.0=quay.io/strimzi/kafka:latest-kafka-2.8.0
2.8.1=quay.io/strimzi/kafka:latest-kafka-2.8.1
3.0.0=quay.io/strimzi/kafka:latest-kafka-3.0.0
- name: STRIMZI_KAFKA_CONNECT_IMAGES
value: |
2.8.0=quay.io/strimzi/kafka:latest-kafka-2.8.0
2.8.1=quay.io/strimzi/kafka:latest-kafka-2.8.1
3.0.0=quay.io/strimzi/kafka:latest-kafka-3.0.0
- name: STRIMZI_KAFKA_MIRROR_MAKER_IMAGES
value: |
2.8.0=quay.io/strimzi/kafka:latest-kafka-2.8.0
2.8.1=quay.io/strimzi/kafka:latest-kafka-2.8.1
3.0.0=quay.io/strimzi/kafka:latest-kafka-3.0.0
- name: STRIMZI_KAFKA_MIRROR_MAKER_2_IMAGES
value: |
2.8.0=quay.io/strimzi/kafka:latest-kafka-2.8.0
2.8.1=quay.io/strimzi/kafka:latest-kafka-2.8.1
3.0.0=quay.io/strimzi/kafka:latest-kafka-3.0.0
- name: STRIMZI_DEFAULT_TOPIC_OPERATOR_IMAGE
value: quay.io/strimzi/operator:latest
- name: STRIMZI_DEFAULT_USER_OPERATOR_IMAGE
value: quay.io/strimzi/operator:latest
- name: STRIMZI_DEFAULT_KAFKA_INIT_IMAGE
value: quay.io/strimzi/operator:latest
- name: STRIMZI_DEFAULT_KAFKA_BRIDGE_IMAGE
value: quay.io/strimzi/kafka-bridge:0.20.2
- name: STRIMZI_DEFAULT_JMXTRANS_IMAGE
value: quay.io/strimzi/jmxtrans:latest
- name: STRIMZI_DEFAULT_KANIKO_EXECUTOR_IMAGE
value: quay.io/strimzi/kaniko-executor:latest
- name: STRIMZI_DEFAULT_MAVEN_BUILDER
value: quay.io/strimzi/maven-builder:latest
- name: STRIMZI_OPERATOR_NAMESPACE
valueFrom:
fieldRef:
fieldPath: metadata.namespace
- name: STRIMZI_FEATURE_GATES
value: ""
livenessProbe:
httpGet:
path: /healthy
port: http
initialDelaySeconds: 10
periodSeconds: 30
readinessProbe:
httpGet:
path: /ready
port: http
initialDelaySeconds: 10
periodSeconds: 30
resources:
limits:
cpu: 1000m
memory: 384Mi
requests:
cpu: 200m
memory: 384Mi
strategy:
type: Recreate
| 37.302521 | 69 | 0.566118 |
79168b05d13931752da07c6251d5926d0c66d905 | 2,925 | yaml | YAML | stable/fairwinds-insights/templates/openapi-nginx-conf.yaml | jonDowdle/fairwinds-charts | beecf45e754ff7335ddf56066180d7c6887b4fba | [
"Apache-2.0"
] | 5 | 2019-02-14T15:49:18.000Z | 2019-05-23T19:22:51.000Z | stable/fairwinds-insights/templates/openapi-nginx-conf.yaml | jonDowdle/fairwinds-charts | beecf45e754ff7335ddf56066180d7c6887b4fba | [
"Apache-2.0"
] | 42 | 2019-01-14T19:34:18.000Z | 2019-07-05T17:19:39.000Z | stable/fairwinds-insights/templates/openapi-nginx-conf.yaml | jonDowdle/fairwinds-charts | beecf45e754ff7335ddf56066180d7c6887b4fba | [
"Apache-2.0"
] | 3 | 2019-04-26T09:42:23.000Z | 2019-06-17T20:21:31.000Z | apiVersion: v1
kind: ConfigMap
metadata:
name: openapi-nginx-conf
data:
# Copied from https://github.com/swagger-api/swagger-ui/blob/master/docker/run.sh
# and a sed command was replaced, since we can't edit mounted files
run.sh: |
#! /bin/sh
set -e
BASE_URL=${BASE_URL:-/}
NGINX_ROOT=/usr/share/nginx/html
INDEX_FILE=$NGINX_ROOT/index.html
NGINX_CONF=/etc/nginx/nginx.conf
node /usr/share/nginx/configurator $INDEX_FILE
replace_in_index () {
if [ "$1" != "**None**" ]; then
sed -i "s|/\*||g" $INDEX_FILE
sed -i "s|\*/||g" $INDEX_FILE
sed -i "s|$1|$2|g" $INDEX_FILE
fi
}
replace_or_delete_in_index () {
if [ -z "$2" ]; then
sed -i "/$1/d" $INDEX_FILE
else
replace_in_index $1 $2
fi
}
replace_in_index myApiKeyXXXX123456789 $API_KEY
if [ "$SWAGGER_JSON_URL" ]; then
sed -i "s|https://petstore.swagger.io/v2/swagger.json|$SWAGGER_JSON_URL|g" $INDEX_FILE
sed -i "s|http://example.com/api|$SWAGGER_JSON_URL|g" $INDEX_FILE
fi
if [[ -f "$SWAGGER_JSON" ]]; then
cp -s "$SWAGGER_JSON" "$NGINX_ROOT"
REL_PATH="./$(basename $SWAGGER_JSON)"
if [[ -z "$SWAGGER_ROOT" ]]; then
SWAGGER_ROOT="$(dirname $SWAGGER_JSON)"
fi
sed -i "s|https://petstore.swagger.io/v2/swagger.json|$REL_PATH|g" $INDEX_FILE
sed -i "s|http://example.com/api|$REL_PATH|g" $INDEX_FILE
fi
find $NGINX_ROOT -type f -regex ".*\.\(html\|js\|css\)" -exec sh -c "gzip < {} > {}.gz" \;
exec nginx -g 'daemon off;'
# This is copied from https://github.com/swagger-api/swagger-ui/blob/master/docker/nginx.conf
# A /health path is added and BASE_URL is manually set
nginx.conf: |
worker_processes 1;
events {
worker_connections 1024;
}
http {
include mime.types;
default_type application/octet-stream;
sendfile on;
keepalive_timeout 65;
gzip on;
gzip_static on;
gzip_disable "msie6";
gzip_vary on;
gzip_types text/plain text/css application/javascript;
map $request_method $access_control_max_age {
OPTIONS 1728000; # 20 days
}
server_tokens off; # Hide Nginx version
server {
listen 8080;
server_name localhost;
index index.html index.htm;
location /swagger {
absolute_redirect off;
alias /usr/share/nginx/html/;
expires 1d;
location ~* \.(?:json|yml|yaml)$ {
#SWAGGER_ROOT
expires -1;
include cors.conf;
}
include cors.conf;
}
location /health {
return 200 'OK';
}
# This is a hack to prevent nginx from running sed on this file, which causes a crash
# listen [::]:80;
}
}
| 25.657895 | 95 | 0.575385 |
7916ca3a897e911497f0bad7bd00b3b46ca7a2bf | 386 | yaml | YAML | fundamental/gke/helloNode/hello-node-deployment.yaml | yutako0217/gcp-getting-started-lab-jp | 934fe1ac048eeac3d60b3728344547c0646918d8 | [
"Apache-2.0"
] | 87 | 2019-05-23T01:50:44.000Z | 2022-02-15T07:21:31.000Z | fundamental/gke/helloNode/hello-node-deployment.yaml | yutako0217/gcp-getting-started-lab-jp | 934fe1ac048eeac3d60b3728344547c0646918d8 | [
"Apache-2.0"
] | 28 | 2019-06-20T09:24:10.000Z | 2021-06-16T05:31:21.000Z | fundamental/gke/helloNode/hello-node-deployment.yaml | yutako0217/gcp-getting-started-lab-jp | 934fe1ac048eeac3d60b3728344547c0646918d8 | [
"Apache-2.0"
] | 62 | 2019-05-24T14:44:20.000Z | 2022-02-15T00:37:42.000Z | apiVersion: apps/v1
kind: Deployment
metadata:
labels:
name: hello-node
name: hello-node
spec:
replicas: 1
selector:
matchLabels:
name: hello-node
template:
metadata:
labels:
name: hello-node
spec:
containers:
- image: asia.gcr.io/<project id>/hello-node:v1
name: hello-node
ports:
- containerPort: 8080
| 17.545455 | 53 | 0.603627 |
791713c732d5949111cddb672a9e594073894c2d | 748 | yaml | YAML | deploy/example/pv-blobfuse-nfs.yaml | csi-driver/blobfuse-csi-driver | 9e5ddf2ef1a61a5c726864784509d0bcdd7088da | [
"Apache-2.0"
] | 14 | 2019-02-19T06:04:45.000Z | 2019-11-11T15:05:56.000Z | deploy/example/pv-blobfuse-nfs.yaml | kubernetes-sigs/blobfuse-csi-driver | b4610aab9b294581f0f8cf9db44cba6c36157ad7 | [
"Apache-2.0"
] | 142 | 2019-12-06T07:01:11.000Z | 2020-08-09T02:18:58.000Z | deploy/example/pv-blobfuse-nfs.yaml | csi-driver/blobfuse-csi-driver | 9e5ddf2ef1a61a5c726864784509d0bcdd7088da | [
"Apache-2.0"
] | 8 | 2019-02-18T11:20:00.000Z | 2019-12-06T06:19:11.000Z | ---
apiVersion: v1
kind: PersistentVolume
metadata:
name: pv-blob
spec:
capacity:
storage: 10Gi
accessModes:
- ReadWriteMany
persistentVolumeReclaimPolicy: Retain # If set as "Delete" container would be removed after pvc deletion
storageClassName: blob-nfs
mountOptions:
- nconnect=8 # only supported on linux kernel version >= 5.3
csi:
driver: blob.csi.azure.com
readOnly: false
# make sure this volumeid is unique in the cluster
# `#` is not allowed in self defined volumeHandle
volumeHandle: unique-volumeid
volumeAttributes:
resourceGroup: EXISTING_RESOURCE_GROUP_NAME
storageAccount: EXISTING_STORAGE_ACCOUNT_NAME
containerName: EXISTING_CONTAINER_NAME
protocol: nfs
| 28.769231 | 107 | 0.735294 |
791714d5993280bd3717c7f9e84a028876971887 | 2,502 | yaml | YAML | system/controller/artifacts/08-config.yaml | sinthuja/product-vick | dc4a4a3b6d3139cd027a1247d4ce150d7988934f | [
"Apache-2.0"
] | null | null | null | system/controller/artifacts/08-config.yaml | sinthuja/product-vick | dc4a4a3b6d3139cd027a1247d4ce150d7988934f | [
"Apache-2.0"
] | null | null | null | system/controller/artifacts/08-config.yaml | sinthuja/product-vick | dc4a4a3b6d3139cd027a1247d4ce150d7988934f | [
"Apache-2.0"
] | null | null | null | apiVersion: v1
data:
cell-gateway-config: |
{
"username": "admin",
"password": "admin",
"apiVersion": "v0.14",
"registerPayload": {
"clientName": "rest_api_publisher",
"owner": "admin",
"grantType": "password refresh_token",
"saasApp": true
},
"apimBaseUrl": "https://gateway.vick-system:9443",
"tokenEndpoint": "https://gateway.vick-system:8243/token",
"trustStore": {
"location": "lib/platform/bre/security/ballerinaTruststore.p12",
"password": "ballerina"
}
}
cell-gateway-setup-config: |+
[listenerConfig]
host="0.0.0.0"
httpPort=8080
httpsPort=9095
keyStore.path="${ballerina.home}/bre/security/ballerinaKeystore.p12"
keyStore.password="ballerina"
tokenListenerPort=9096
[authConfig]
authorizationHeader="Authorization"
removeAuthHeaderFromOutMessage=false
[keyManager]
serverUrl="https://localhost:9443"
username="admin"
password="admin"
tokenContext="oauth2"
timestampSkew=5000
verifyHostname=true
[jwtTokenConfig]
issuer="https://sts.vick.wso2.com"
audience="http://org.wso2.apimgt/gateway"
certificateAlias="wso2apim"
trustStore.path="${ballerina.home}/bre/security/ballerinaTruststore.p12"
trustStore.password="ballerina"
[jwtConfig]
header="X-JWT-Assertion"
[caching]
enabled=true
tokenCache.expiryTime=900000
tokenCache.capacity=100
tokenCache.evictionFactor=0.25
[analytics]
enable=true
uploadingTimeSpanInMillis=30000
uploadingEndpoint="http://wso2sp-worker.vick-system:9090/analytics/v1.0/usage/upload-file"
rotatingPeriod=30000
task.uploadFiles=true
username="admin"
password="admin"
[b7a.observability.tracing]
enabled=true
name="zipkin"
[b7a.observability.tracing.zipkin]
reporter.hostname="wso2sp-worker.vick-system"
reporter.port=9411
reporter.api.context="/api/v1/spans"
reporter.api.version="v1"
reporter.compression.enabled=false
cell-gateway-init-image: wso2vick/cell-gateway-init
cell-gateway-image: wso2vick/cell-gateway
cell-sts-config: |
{
"endpoint": "https://gateway.vick-system:9443/api/identity/vick-auth/v1.0/sts/token",
"username": "admin",
"password": "admin"
}
cell-sts-image: wso2vick/cell-sts:latest
kind: ConfigMap
metadata:
name: vick-config
namespace: vick-system
| 27.494505 | 94 | 0.661071 |
7917203224c21bcea5a4130e39a5799d805b6754 | 1,363 | yml | YAML | crds/engines.yml | CCSolutions-io/longhorn | 85380bde1047c135ed7d9840a609d9f92e73db81 | [
"Apache-2.0"
] | null | null | null | crds/engines.yml | CCSolutions-io/longhorn | 85380bde1047c135ed7d9840a609d9f92e73db81 | [
"Apache-2.0"
] | 5 | 2021-10-18T20:08:57.000Z | 2022-03-14T22:46:50.000Z | crds/engines.yml | CCSolutions-io/longhorn | 85380bde1047c135ed7d9840a609d9f92e73db81 | [
"Apache-2.0"
] | 1 | 2022-01-20T15:33:34.000Z | 2022-01-20T15:33:34.000Z | ---
apiVersion: apiextensions.k8s.io/v1
kind: CustomResourceDefinition
metadata:
name: engines.longhorn.io
labels:
longhorn-manager: Engine
spec:
group: longhorn.io
names:
kind: Engine
listKind: EngineList
plural: engines
shortNames:
- lhe
singular: engine
scope: Namespaced
versions:
- name: v1beta1
served: true
storage: true
schema:
openAPIV3Schema:
type: object
properties:
spec:
x-kubernetes-preserve-unknown-fields: true
status:
x-kubernetes-preserve-unknown-fields: true
subresources:
status: {}
additionalPrinterColumns:
- name: State
type: string
description: The current state of the engine
jsonPath: .status.currentState
- name: Node
type: string
description: The node that the engine is on
jsonPath: .spec.nodeID
- name: InstanceManager
type: string
description: The instance manager of the engine
jsonPath: .status.instanceManagerName
- name: Image
type: string
description: The current image of the engine
jsonPath: .status.currentImage
- name: Age
type: date
jsonPath: .metadata.creationTimestamp
...
| 24.339286 | 57 | 0.595011 |
7917557aa87e91d6b5a5464af9e4b5bbfd861aca | 443 | yaml | YAML | k8s/kustomize/vault/overlays/release/service.yaml | rfarine/k8s | 8fe0190cd71c54436bb32b996e9507c657c33634 | [
"MIT"
] | 1 | 2020-07-19T19:24:58.000Z | 2020-07-19T19:24:58.000Z | k8s/kustomize/vault/overlays/release/service.yaml | rfarine/k8s | 8fe0190cd71c54436bb32b996e9507c657c33634 | [
"MIT"
] | null | null | null | k8s/kustomize/vault/overlays/release/service.yaml | rfarine/k8s | 8fe0190cd71c54436bb32b996e9507c657c33634 | [
"MIT"
] | null | null | null | ---
apiVersion: v1
kind: Service
metadata:
name: vault-service
namespace: release
labels:
app: vault
annotations:
service.beta.kubernetes.io/aws-load-balancer-internal: 0.0.0.0/0
spec:
type: ExternalName
externalName: vault.staging.svc.cluster.local
ports:
- name: http
port: 80
protocol: TCP
targetPort: 8200
- name: https
port: 443
protocol: TCP
targetPort: 8200
selector:
app: vault
| 17.038462 | 68 | 0.674944 |
79179e8e67a3b685a4434435a380773834c721bf | 13,384 | yaml | YAML | manifests/crds/appproject-crd.yaml | rakhbari/argoproj_argo-cd | a9f924bab5e54947e8ec305011bdf62bdc2387a2 | [
"Apache-2.0"
] | 641 | 2018-05-22T18:20:59.000Z | 2022-03-31T14:34:36.000Z | manifests/crds/appproject-crd.yaml | rakhbari/argoproj_argo-cd | a9f924bab5e54947e8ec305011bdf62bdc2387a2 | [
"Apache-2.0"
] | 899 | 2018-01-04T07:19:11.000Z | 2022-03-31T20:59:40.000Z | manifests/crds/appproject-crd.yaml | rakhbari/argoproj_argo-cd | a9f924bab5e54947e8ec305011bdf62bdc2387a2 | [
"Apache-2.0"
] | 1,069 | 2018-03-15T19:52:53.000Z | 2022-03-31T17:13:20.000Z | apiVersion: apiextensions.k8s.io/v1
kind: CustomResourceDefinition
metadata:
labels:
app.kubernetes.io/name: appprojects.argoproj.io
app.kubernetes.io/part-of: argocd
name: appprojects.argoproj.io
spec:
group: argoproj.io
names:
kind: AppProject
listKind: AppProjectList
plural: appprojects
shortNames:
- appproj
- appprojs
singular: appproject
scope: Namespaced
versions:
- name: v1alpha1
schema:
openAPIV3Schema:
description: 'AppProject provides a logical grouping of applications, providing
controls for: * where the apps may deploy to (cluster whitelist) * what
may be deployed (repository whitelist, resource whitelist/blacklist) * who
can access these applications (roles, OIDC group claims bindings) * and
what they can do (RBAC policies) * automation access to these roles (JWT
tokens)'
properties:
apiVersion:
description: 'APIVersion defines the versioned schema of this representation
of an object. Servers should convert recognized schemas to the latest
internal value, and may reject unrecognized values. More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#resources'
type: string
kind:
description: 'Kind is a string value representing the REST resource this
object represents. Servers may infer this from the endpoint the client
submits requests to. Cannot be updated. In CamelCase. More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#types-kinds'
type: string
metadata:
type: object
spec:
description: AppProjectSpec is the specification of an AppProject
properties:
clusterResourceBlacklist:
description: ClusterResourceBlacklist contains list of blacklisted
cluster level resources
items:
description: GroupKind specifies a Group and a Kind, but does not
force a version. This is useful for identifying concepts during
lookup stages without having partially valid types
properties:
group:
type: string
kind:
type: string
required:
- group
- kind
type: object
type: array
clusterResourceWhitelist:
description: ClusterResourceWhitelist contains list of whitelisted
cluster level resources
items:
description: GroupKind specifies a Group and a Kind, but does not
force a version. This is useful for identifying concepts during
lookup stages without having partially valid types
properties:
group:
type: string
kind:
type: string
required:
- group
- kind
type: object
type: array
description:
description: Description contains optional project description
type: string
destinations:
description: Destinations contains list of destinations available
for deployment
items:
description: ApplicationDestination holds information about the
application's destination
properties:
name:
description: Name is an alternate way of specifying the target
cluster by its symbolic name
type: string
namespace:
description: Namespace specifies the target namespace for the
application's resources. The namespace will only be set for
namespace-scoped resources that have not set a value for .metadata.namespace
type: string
server:
description: Server specifies the URL of the target cluster
and must be set to the Kubernetes control plane API
type: string
type: object
type: array
namespaceResourceBlacklist:
description: NamespaceResourceBlacklist contains list of blacklisted
namespace level resources
items:
description: GroupKind specifies a Group and a Kind, but does not
force a version. This is useful for identifying concepts during
lookup stages without having partially valid types
properties:
group:
type: string
kind:
type: string
required:
- group
- kind
type: object
type: array
namespaceResourceWhitelist:
description: NamespaceResourceWhitelist contains list of whitelisted
namespace level resources
items:
description: GroupKind specifies a Group and a Kind, but does not
force a version. This is useful for identifying concepts during
lookup stages without having partially valid types
properties:
group:
type: string
kind:
type: string
required:
- group
- kind
type: object
type: array
orphanedResources:
description: OrphanedResources specifies if controller should monitor
orphaned resources of apps in this project
properties:
ignore:
description: Ignore contains a list of resources that are to be
excluded from orphaned resources monitoring
items:
description: OrphanedResourceKey is a reference to a resource
to be ignored from
properties:
group:
type: string
kind:
type: string
name:
type: string
type: object
type: array
warn:
description: Warn indicates if warning condition should be created
for apps which have orphaned resources
type: boolean
type: object
roles:
description: Roles are user defined RBAC roles associated with this
project
items:
description: ProjectRole represents a role that has access to a
project
properties:
description:
description: Description is a description of the role
type: string
groups:
description: Groups are a list of OIDC group claims bound to
this role
items:
type: string
type: array
jwtTokens:
description: JWTTokens are a list of generated JWT tokens bound
to this role
items:
description: JWTToken holds the issuedAt and expiresAt values
of a token
properties:
exp:
format: int64
type: integer
iat:
format: int64
type: integer
id:
type: string
required:
- iat
type: object
type: array
name:
description: Name is a name for this role
type: string
policies:
description: Policies Stores a list of casbin formatted strings
that define access policies for the role in the project
items:
type: string
type: array
required:
- name
type: object
type: array
signatureKeys:
description: SignatureKeys contains a list of PGP key IDs that commits
in Git must be signed with in order to be allowed for sync
items:
description: SignatureKey is the specification of a key required
to verify commit signatures with
properties:
keyID:
description: The ID of the key in hexadecimal notation
type: string
required:
- keyID
type: object
type: array
sourceRepos:
description: SourceRepos contains list of repository URLs which can
be used for deployment
items:
type: string
type: array
syncWindows:
description: SyncWindows controls when syncs can be run for apps in
this project
items:
description: SyncWindow contains the kind, time, duration and attributes
that are used to assign the syncWindows to apps
properties:
applications:
description: Applications contains a list of applications that
the window will apply to
items:
type: string
type: array
clusters:
description: Clusters contains a list of clusters that the window
will apply to
items:
type: string
type: array
duration:
description: Duration is the amount of time the sync window
will be open
type: string
kind:
description: Kind defines if the window allows or blocks syncs
type: string
manualSync:
description: ManualSync enables manual syncs when they would
otherwise be blocked
type: boolean
namespaces:
description: Namespaces contains a list of namespaces that the
window will apply to
items:
type: string
type: array
schedule:
description: Schedule is the time the window will begin, specified
in cron format
type: string
timeZone:
description: TimeZone of the sync that will be applied to the
schedule
type: string
type: object
type: array
type: object
status:
description: AppProjectStatus contains status information for AppProject
CRs
properties:
jwtTokensByRole:
additionalProperties:
description: JWTTokens represents a list of JWT tokens
properties:
items:
items:
description: JWTToken holds the issuedAt and expiresAt values
of a token
properties:
exp:
format: int64
type: integer
iat:
format: int64
type: integer
id:
type: string
required:
- iat
type: object
type: array
type: object
description: JWTTokensByRole contains a list of JWT tokens issued
for a given role
type: object
type: object
required:
- metadata
- spec
type: object
served: true
storage: true
| 42.760383 | 175 | 0.475493 |
79183329d2c9ebf66204cab1081818e83541b6f1 | 1,025 | yaml | YAML | rook-ceph/ceph-block/ceph-storageclass.yaml | billimek/k3s-gitops | fdb3fff07f81167c8a779d97b3504a9745e92b4f | [
"Apache-2.0"
] | 6 | 2019-09-11T01:17:07.000Z | 2020-04-28T21:21:04.000Z | rook-ceph/ceph-block/ceph-storageclass.yaml | billimek/k3s-gitops | fdb3fff07f81167c8a779d97b3504a9745e92b4f | [
"Apache-2.0"
] | 1 | 2019-09-09T11:35:22.000Z | 2019-09-09T11:35:22.000Z | rook-ceph/ceph-block/ceph-storageclass.yaml | billimek/k3s-gitops | fdb3fff07f81167c8a779d97b3504a9745e92b4f | [
"Apache-2.0"
] | 1 | 2020-07-29T01:07:04.000Z | 2020-07-29T01:07:04.000Z | apiVersion: storage.k8s.io/v1
kind: StorageClass
metadata:
name: rook-ceph-block
# Change "rook-ceph" provisioner prefix to match the operator namespace if needed
provisioner: rook-ceph.rbd.csi.ceph.com
parameters:
# clusterID is the namespace where the rook cluster is running
clusterID: rook-ceph
# Ceph pool into which the RBD image shall be created
pool: replicapool
# RBD image format. Defaults to "2".
imageFormat: "2"
# RBD image features. Available for imageFormat: "2". CSI RBD currently supports only `layering` feature.
imageFeatures: layering
# The secrets contain Ceph admin credentials.
csi.storage.k8s.io/provisioner-secret-name: rook-ceph-csi
csi.storage.k8s.io/provisioner-secret-namespace: rook-ceph
csi.storage.k8s.io/node-stage-secret-name: rook-ceph-csi
csi.storage.k8s.io/node-stage-secret-namespace: rook-ceph
csi.storage.k8s.io/fstype: ext4
# Delete the rbd volume when a PVC is deleted
reclaimPolicy: Delete
allowVolumeExpansion: true
| 33.064516 | 109 | 0.747317 |
791834bfdf62ab43b323833c765bb89672b4d49f | 77 | yaml | YAML | build/crd/namespace.yaml | AresSys/AresOperator | 316911d6d02242bfe46c655a440d30f4cde05759 | [
"Apache-2.0"
] | 2 | 2021-10-30T23:15:46.000Z | 2021-11-08T11:17:41.000Z | build/crd/namespace.yaml | AresSys/AresOperator | 316911d6d02242bfe46c655a440d30f4cde05759 | [
"Apache-2.0"
] | null | null | null | build/crd/namespace.yaml | AresSys/AresOperator | 316911d6d02242bfe46c655a440d30f4cde05759 | [
"Apache-2.0"
] | null | null | null | apiVersion: v1
kind: Namespace
metadata:
labels:
app: ares
name: ares | 12.833333 | 15 | 0.701299 |
79190c8c715b48654f638443c6a97dc2147aff27 | 409 | yaml | YAML | cnf/petclinic-service-cluster-ip.yaml | ezYakaEagle442/aro-cicd | 194d39ee892545205efa37c63f8308dfa97c36a9 | [
"MIT"
] | 2 | 2020-03-24T09:25:12.000Z | 2020-04-28T08:32:53.000Z | petclinic-service-cluster-ip.yaml | ezYakaEagle442/fr-cn-aks-workshop | 1304cac94956073c9d55298bda39de008044b125 | [
"MIT"
] | 1 | 2021-09-28T16:26:47.000Z | 2021-09-28T16:41:41.000Z | petclinic-service-cluster-ip.yaml | ezYakaEagle442/fr-cn-aks-workshop | 1304cac94956073c9d55298bda39de008044b125 | [
"MIT"
] | null | null | null | apiVersion: v1
kind: Service
metadata:
name: petclinic-internal-service
#namespace: staging
#annotations:
# service.beta.kubernetes.io/azure-load-balancer-internal: "true"
spec:
ports:
- protocol: TCP
port: 80
targetPort: 8080
name: http
- protocol: TCP
port: 8081
targetPort: 8081
name: management
selector:
app: petclinic
type: ClusterIP | 20.45 | 73 | 0.650367 |
791912f48655441d1bea99335b199f4cbdc7017e | 265 | yml | YAML | development/manifests/permission-manager-secret.yml | SERGO-GMBH/permission-manager | 9f717d02c3509607daf23481f3868888c163d0e4 | [
"BSD-3-Clause"
] | 975 | 2020-01-25T07:53:49.000Z | 2022-03-28T14:52:07.000Z | development/manifests/permission-manager-secret.yml | SERGO-GMBH/permission-manager | 9f717d02c3509607daf23481f3868888c163d0e4 | [
"BSD-3-Clause"
] | 68 | 2020-01-27T07:53:09.000Z | 2022-03-27T18:30:32.000Z | development/manifests/permission-manager-secret.yml | SERGO-GMBH/permission-manager | 9f717d02c3509607daf23481f3868888c163d0e4 | [
"BSD-3-Clause"
] | 132 | 2020-01-25T11:49:14.000Z | 2022-03-24T09:33:54.000Z | apiVersion: v1
kind: Secret
metadata:
name: permission-manager
namespace: permission-manager
type: Opaque
stringData:
PORT: "4000"
CLUSTER_NAME: "${CLUSTER_NAME}"
CONTROL_PLANE_ADDRESS: "${CONTROL_PLANE_ADDRESS}"
BASIC_AUTH_PASSWORD: "${BASIC_AUTH_PASSWORD}"
| 22.083333 | 50 | 0.788679 |
7919363e7355c21a7626b644a7f115c64c806018 | 221 | yaml | YAML | pacman/resource.yaml | fenar/application-samples | c72ed941d037a5203d50e19882ea25f52b3e8876 | [
"Apache-2.0"
] | null | null | null | pacman/resource.yaml | fenar/application-samples | c72ed941d037a5203d50e19882ea25f52b3e8876 | [
"Apache-2.0"
] | null | null | null | pacman/resource.yaml | fenar/application-samples | c72ed941d037a5203d50e19882ea25f52b3e8876 | [
"Apache-2.0"
] | null | null | null | apiVersion: v1
kind: LimitRange
metadata:
name: container-mem-limit-range
spec:
limits:
- default:
memory: 256Mi
cpu: "300m"
defaultRequest:
memory: 128Mi
cpu: "150m"
type: Container
| 15.785714 | 33 | 0.633484 |
7919ccab9bec1aa60a0fc18274015889cc362e23 | 65 | yaml | YAML | examples/use-cases/namespace.yaml | denis-tingaikin/deployments-k8s | 41e6eafe7a8f2485209d6ab8662741fae2870404 | [
"Apache-2.0"
] | 8 | 2021-03-27T22:34:48.000Z | 2022-03-21T20:46:02.000Z | examples/use-cases/namespace.yaml | denis-tingaikin/deployments-k8s | 41e6eafe7a8f2485209d6ab8662741fae2870404 | [
"Apache-2.0"
] | 164 | 2021-01-26T12:14:39.000Z | 2022-03-29T15:27:19.000Z | examples/use-cases/namespace.yaml | denis-tingaikin/deployments-k8s | 41e6eafe7a8f2485209d6ab8662741fae2870404 | [
"Apache-2.0"
] | 16 | 2020-12-10T15:25:18.000Z | 2022-03-31T22:12:52.000Z | ---
apiVersion: v1
kind: Namespace
metadata:
generateName: ns-
| 10.833333 | 19 | 0.723077 |
7919de444a806ba433c1a9162e4376037cba996b | 1,852 | yml | YAML | kubernetes/dev.yml | ONSdigital/sdc-int-mock-ai-service | 575ef9d5a8c93ec995a76092507563468fb80175 | [
"MIT"
] | null | null | null | kubernetes/dev.yml | ONSdigital/sdc-int-mock-ai-service | 575ef9d5a8c93ec995a76092507563468fb80175 | [
"MIT"
] | null | null | null | kubernetes/dev.yml | ONSdigital/sdc-int-mock-ai-service | 575ef9d5a8c93ec995a76092507563468fb80175 | [
"MIT"
] | null | null | null | apiVersion: apps/v1
kind: Deployment
metadata:
name: mock-ai
labels:
app: mock-ai
spec:
replicas: 1
selector:
matchLabels:
app: mock-ai
strategy:
rollingUpdate:
maxSurge: 1
maxUnavailable: 1
type: RollingUpdate
template:
metadata:
name: mock-ai
labels:
app: mock-ai
spec:
containers:
- name: mock-ai
image: europe-west2-docker.pkg.dev/ons-ci-int/int-docker-snapshot/mock-ai:Fix_file_listing_in_help_endpoint
imagePullPolicy: Always
resources:
requests:
cpu: "0.1"
memory: "512Mi"
limits:
cpu: "0.5M"
memory: "1024Mi"
readinessProbe:
httpGet:
path: /info
port: 8162
initialDelaySeconds: 20
periodSeconds: 10
failureThreshold: 3
successThreshold: 1
livenessProbe:
httpGet:
path: /info
port: 8162
initialDelaySeconds: 30
periodSeconds: 10
failureThreshold: 3
successThreshold: 1
ports:
- name: http-server
containerPort: 8162
env:
- name: JAVA_TOOL_OPTIONS
value: "-Dspring.profiles.active=dev
-Dlogging.level.uk.gov.ons.ctp=DEBUG
-Dlogging.level.org.springframework=WARN
-Dendpoints.autoconfig.enabled=false
-Dendpoints.beans.enabled=false
-Dendpoints.configprops.enabled=false
-Dendpoints.dump.enabled=false
-Dendpoints.env.enabled=false
-Dendpoints.metrics.enabled=false
-Dendpoints.mapping.enabled=false
-Dendpoints.shutdown.enabled=false
-Dendpoints.trace.enabled=false
-Dmanagement.health.rabbit.enabled=false"
| 27.235294 | 115 | 0.572354 |
7919f5010f751ace26b28b691cf0a1fdb3bc8248 | 238 | yaml | YAML | scripts/addons/nginx-service.yaml | vinusorout/k8s-setup-local-VMs | da260e0618f1d2d790ed88b1a1bf802218f5b360 | [
"MIT"
] | 5 | 2021-03-05T10:52:10.000Z | 2021-04-10T11:22:08.000Z | scripts/addons/nginx-service.yaml | vinusorout/k8s-setup-local-VMs | da260e0618f1d2d790ed88b1a1bf802218f5b360 | [
"MIT"
] | null | null | null | scripts/addons/nginx-service.yaml | vinusorout/k8s-setup-local-VMs | da260e0618f1d2d790ed88b1a1bf802218f5b360 | [
"MIT"
] | null | null | null | apiVersion: v1
kind: Service
metadata:
name: nginx-service
namespace: kong
labels:
name: nginx-service
spec:
type: NodePort
ports:
- port: 80
protocol: TCP
targetPort: 80
nodePort: 80
selector:
app: nginx | 14.875 | 23 | 0.663866 |
7919fbafe7ff21df2e5209f63f03b1b74111a95e | 375 | yaml | YAML | staging/src/k8s.io/pod-security-admission/test/testdata/restricted/v1.7/fail/selinuxoptions0.yaml | 767829413/kubernetes | e3982ce472af31efe0cfb5165271c84f1ace0b0f | [
"Apache-2.0"
] | 84,910 | 2015-08-12T17:45:55.000Z | 2022-03-31T23:39:40.000Z | staging/src/k8s.io/pod-security-admission/test/testdata/restricted/v1.7/fail/selinuxoptions0.yaml | 767829413/kubernetes | e3982ce472af31efe0cfb5165271c84f1ace0b0f | [
"Apache-2.0"
] | 98,305 | 2015-08-12T17:35:13.000Z | 2022-03-31T23:46:47.000Z | staging/src/k8s.io/pod-security-admission/test/testdata/restricted/v1.7/fail/selinuxoptions0.yaml | 767829413/kubernetes | e3982ce472af31efe0cfb5165271c84f1ace0b0f | [
"Apache-2.0"
] | 36,592 | 2015-08-12T18:36:13.000Z | 2022-03-31T16:22:17.000Z | apiVersion: v1
kind: Pod
metadata:
name: selinuxoptions0
spec:
containers:
- image: k8s.gcr.io/pause
name: container1
securityContext:
seLinuxOptions: {}
initContainers:
- image: k8s.gcr.io/pause
name: initcontainer1
securityContext:
seLinuxOptions: {}
securityContext:
runAsNonRoot: true
seLinuxOptions:
type: somevalue
| 18.75 | 27 | 0.688 |
791a01ffe4bedd4daf130713fb5172329f89990f | 444 | yaml | YAML | assets/node-exporter/kube-rbac-proxy-secret.yaml | bburt-rh/cluster-monitoring-operator | c2a284fa751c9657d4a9590596c03c0cf534d8d5 | [
"Apache-2.0"
] | 199 | 2018-04-12T07:44:24.000Z | 2022-02-23T11:05:42.000Z | assets/node-exporter/kube-rbac-proxy-secret.yaml | bburt-rh/cluster-monitoring-operator | c2a284fa751c9657d4a9590596c03c0cf534d8d5 | [
"Apache-2.0"
] | 1,615 | 2018-04-12T15:58:53.000Z | 2022-03-31T23:26:08.000Z | assets/node-exporter/kube-rbac-proxy-secret.yaml | bburt-rh/cluster-monitoring-operator | c2a284fa751c9657d4a9590596c03c0cf534d8d5 | [
"Apache-2.0"
] | 306 | 2018-04-12T15:56:14.000Z | 2022-03-29T17:20:27.000Z | apiVersion: v1
data: {}
kind: Secret
metadata:
labels:
app.kubernetes.io/part-of: openshift-monitoring
name: node-exporter-kube-rbac-proxy-config
namespace: openshift-monitoring
stringData:
config.yaml: |-
"authorization":
"static":
- "path": "/metrics"
"resourceRequest": false
"user":
"name": "system:serviceaccount:openshift-monitoring:prometheus-k8s"
"verb": "get"
type: Opaque
| 23.368421 | 77 | 0.653153 |
791a6a4e85d439e8a64c4fc0319f2eafc51c7751 | 2,482 | yaml | YAML | k8s/vizier/base/query_broker_deployment.yaml | winmillwill/pixie | 4a0bc81fa2424397e5c5f3f7c7734fc109b02ebd | [
"Apache-2.0"
] | 1 | 2022-01-17T01:40:08.000Z | 2022-01-17T01:40:08.000Z | k8s/vizier/base/query_broker_deployment.yaml | TomMD/pixie | 4a0bc81fa2424397e5c5f3f7c7734fc109b02ebd | [
"Apache-2.0"
] | null | null | null | k8s/vizier/base/query_broker_deployment.yaml | TomMD/pixie | 4a0bc81fa2424397e5c5f3f7c7734fc109b02ebd | [
"Apache-2.0"
] | null | null | null | ---
apiVersion: apps/v1
kind: Deployment
metadata:
name: vizier-query-broker
spec:
replicas: 1
selector:
matchLabels:
name: vizier-query-broker
template:
metadata:
labels:
name: vizier-query-broker
plane: control
spec:
affinity:
nodeAffinity:
requiredDuringSchedulingIgnoredDuringExecution:
nodeSelectorTerms:
- matchExpressions:
- key: kubernetes.io/os
operator: Exists
- key: kubernetes.io/os
operator: In
values:
- linux
- matchExpressions:
- key: beta.kubernetes.io/os
operator: Exists
- key: beta.kubernetes.io/os
operator: In
values:
- linux
initContainers:
- name: mds-wait
image: gcr.io/pixie-prod/pixie-prod-artifacts/curl:1.0
# yamllint disable
command: ['sh', '-c', 'set -x;
URL="https://${SERVICE_NAME}:${SERVICE_PORT}/healthz";
until [ $(curl -m 0.5 -s -o /dev/null -w "%{http_code}" -k ${URL}) -eq 200 ]; do
echo "waiting for ${URL}"
sleep 2;
done;
']
env:
# The name of the service that the QB must connect with before becoming available.
- name: SERVICE_NAME
value: "vizier-metadata"
- name: SERVICE_PORT
value: "50400"
containers:
- name: app
image: gcr.io/pixie-oss/pixie-dev/vizier/query_broker_server_image:latest
env:
- name: PL_JWT_SIGNING_KEY
valueFrom:
secretKeyRef:
key: jwt-signing-key
name: pl-cluster-secrets
- name: PL_POD_IP_ADDRESS
valueFrom:
fieldRef:
fieldPath: status.podIP
- name: PL_POD_NAMESPACE
valueFrom:
fieldRef:
fieldPath: metadata.namespace
envFrom:
- configMapRef:
name: pl-tls-config
ports:
- containerPort: 50300
volumeMounts:
- mountPath: /certs
name: certs
livenessProbe:
httpGet:
scheme: HTTPS
path: /healthz
port: 50300
volumes:
- name: certs
secret:
secretName: service-tls-certs
- name: envoy-yaml
configMap:
name: proxy-envoy-config
| 27.88764 | 92 | 0.516519 |
791a833d2222bcf2a32bad680aa9025c7c3da723 | 83 | yml | YAML | namespaces/alvaro.yml | alvaro72/flux-get-started | 1d7dffc14a1835b58c9e46fb41f83f68a89ddb84 | [
"Apache-2.0"
] | null | null | null | namespaces/alvaro.yml | alvaro72/flux-get-started | 1d7dffc14a1835b58c9e46fb41f83f68a89ddb84 | [
"Apache-2.0"
] | null | null | null | namespaces/alvaro.yml | alvaro72/flux-get-started | 1d7dffc14a1835b58c9e46fb41f83f68a89ddb84 | [
"Apache-2.0"
] | null | null | null | apiVersion: v1
kind: Namespace
metadata:
labels:
name: alvaro
name: alvaro
| 11.857143 | 16 | 0.710843 |
791aad722187f1cbc663c538d26d385ad1936757 | 342 | yaml | YAML | cluster-agent/webui-hpa.yaml | alirezagoli/kubernetes-hpa-external-metric | 4e66f2cd5db9a6de4d07aa7ccbe8244dceca7ab0 | [
"MIT"
] | null | null | null | cluster-agent/webui-hpa.yaml | alirezagoli/kubernetes-hpa-external-metric | 4e66f2cd5db9a6de4d07aa7ccbe8244dceca7ab0 | [
"MIT"
] | null | null | null | cluster-agent/webui-hpa.yaml | alirezagoli/kubernetes-hpa-external-metric | 4e66f2cd5db9a6de4d07aa7ccbe8244dceca7ab0 | [
"MIT"
] | null | null | null | apiVersion: autoscaling/v2beta1
kind: HorizontalPodAutoscaler
metadata:
name: webui
spec:
minReplicas: 1
maxReplicas: 3
scaleTargetRef:
apiVersion: apps/v1
kind: Deployment
name: teastore-webui
metrics:
- type: External
external:
metricName: datadogmetric@default:webui-cpu-util
targetAverageValue: 60
| 20.117647 | 54 | 0.730994 |
791ae7cdb21e95093412791f6921a304f7e989c0 | 265 | yaml | YAML | utils/pvs/scanagroempresa-redis-data-persistenvolume.yaml | marcelorubini/scanterra-scanagroempresa | 0febbc282a2ab6240bd19b3583bf7f7eb27f8d54 | [
"MIT"
] | null | null | null | utils/pvs/scanagroempresa-redis-data-persistenvolume.yaml | marcelorubini/scanterra-scanagroempresa | 0febbc282a2ab6240bd19b3583bf7f7eb27f8d54 | [
"MIT"
] | null | null | null | utils/pvs/scanagroempresa-redis-data-persistenvolume.yaml | marcelorubini/scanterra-scanagroempresa | 0febbc282a2ab6240bd19b3583bf7f7eb27f8d54 | [
"MIT"
] | null | null | null | apiVersion: v1
kind: PersistentVolume
metadata:
name: scanagroempresa-redis-data
spec:
storageClassName: local-storage
capacity:
storage: 100Mi
accessModes:
- ReadWriteOnce
hostPath:
path: /var/lib/tmp/sae-redis-data
type: DirectoryOrCreate
| 18.928571 | 37 | 0.74717 |
791aecfb4fe8428cde8f3488dfa7bb0a0bdd9f2f | 642 | yaml | YAML | namespaces/live-1.cloud-platform.service.justice.gov.uk/family-mediators-api-production/00-namespace.yaml | digitalronin/cloud-platform-environments | b617fa089ee2a7dafc53602808326ae7d56fd6d9 | [
"MIT"
] | null | null | null | namespaces/live-1.cloud-platform.service.justice.gov.uk/family-mediators-api-production/00-namespace.yaml | digitalronin/cloud-platform-environments | b617fa089ee2a7dafc53602808326ae7d56fd6d9 | [
"MIT"
] | null | null | null | namespaces/live-1.cloud-platform.service.justice.gov.uk/family-mediators-api-production/00-namespace.yaml | digitalronin/cloud-platform-environments | b617fa089ee2a7dafc53602808326ae7d56fd6d9 | [
"MIT"
] | null | null | null | apiVersion: v1
kind: Namespace
metadata:
name: family-mediators-api-production
labels:
cloud-platform.justice.gov.uk/is-production: "true"
cloud-platform.justice.gov.uk/environment-name: "production"
annotations:
cloud-platform.justice.gov.uk/business-unit: "Family Justice"
cloud-platform.justice.gov.uk/application: "Family Mediators API"
cloud-platform.justice.gov.uk/owner: "Family Justice: family-justice-team@digital.justice.gov.uk"
cloud-platform.justice.gov.uk/source-code: "https://github.com/ministryofjustice/family-mediators-api"
cloud-platform.justice.gov.uk/slack-channel: "cross_justice_team"
| 45.857143 | 106 | 0.771028 |
791b3fa24019116c1664ee10e440693f7af4f430 | 350 | yaml | YAML | sample/01/schedulepod.yaml | yansheng133/initk8sfortraining | d2605c708c8187c8ffbb4e86e2c909ccb07bb822 | [
"Apache-2.0"
] | null | null | null | sample/01/schedulepod.yaml | yansheng133/initk8sfortraining | d2605c708c8187c8ffbb4e86e2c909ccb07bb822 | [
"Apache-2.0"
] | null | null | null | sample/01/schedulepod.yaml | yansheng133/initk8sfortraining | d2605c708c8187c8ffbb4e86e2c909ccb07bb822 | [
"Apache-2.0"
] | null | null | null | apiVersion: v1
kind: Pod
metadata:
labels:
run: schedulepod
name: schedulepod
spec:
containers:
- args:
- /bin/sleep
- "3600"
image: busybox
name: schedulepod
resources: {}
dnsPolicy: ClusterFirst
restartPolicy: Always
tolerations:
- key: "gpu"
operator: "Equal"
value: "a100"
effect: "NoSchedule"
| 15.909091 | 25 | 0.637143 |
791bfbf5f53fc8094937117a414008ec0b0b5d9d | 2,047 | yaml | YAML | base/demo/ingress/config.yaml | nckturner/appmesh-cloudmap-demo | f3f47f3b872965876860684261a479b4c5dce628 | [
"Apache-2.0"
] | null | null | null | base/demo/ingress/config.yaml | nckturner/appmesh-cloudmap-demo | f3f47f3b872965876860684261a479b4c5dce628 | [
"Apache-2.0"
] | null | null | null | base/demo/ingress/config.yaml | nckturner/appmesh-cloudmap-demo | f3f47f3b872965876860684261a479b4c5dce628 | [
"Apache-2.0"
] | null | null | null | apiVersion: v1
kind: ConfigMap
metadata:
name: ingress
namespace: demo
data:
envoy.yaml: |
static_resources:
listeners:
- address:
socket_address:
address: 0.0.0.0
port_value: 8080
filter_chains:
- filters:
- name: envoy.http_connection_manager
config:
access_log:
- name: envoy.file_access_log
config:
path: /dev/stdout
codec_type: auto
stat_prefix: ingress_http
http_filters:
- name: envoy.router
config: {}
route_config:
name: local_route
virtual_hosts:
- name: local_service
domains: ["*"]
routes:
- match:
prefix: "/"
route:
cluster: podinfo
host_rewrite: podinfo.demo
timeout: 5s
retry_policy:
retry_on: "gateway-error,connect-failure,refused-stream"
num_retries: 5
per_try_timeout: 5s
clusters:
- name: podinfo
connect_timeout: 0.30s
type: strict_dns
lb_policy: round_robin
load_assignment:
cluster_name: podinfo
endpoints:
- lb_endpoints:
- endpoint:
address:
socket_address:
address: podinfo.demo
port_value: 9898
admin:
access_log_path: /dev/null
address:
socket_address:
address: 0.0.0.0
port_value: 9999
| 31.984375 | 90 | 0.392281 |
791c2e20ad8b20b7132d8b30b21919da3f3d94c2 | 260 | yaml | YAML | deploy/role_binding.yaml | aneeshkp/barometer-operator | 0a53738ac40eb4f49a2e95e83e0093eef53d7db8 | [
"Apache-2.0"
] | 3 | 2019-07-01T16:03:43.000Z | 2020-06-24T08:23:20.000Z | deploy/role_binding.yaml | aneeshkp/barometer-operator | 0a53738ac40eb4f49a2e95e83e0093eef53d7db8 | [
"Apache-2.0"
] | null | null | null | deploy/role_binding.yaml | aneeshkp/barometer-operator | 0a53738ac40eb4f49a2e95e83e0093eef53d7db8 | [
"Apache-2.0"
] | 1 | 2020-06-24T08:23:24.000Z | 2020-06-24T08:23:24.000Z | kind: RoleBinding
apiVersion: rbac.authorization.k8s.io/v1
metadata:
name: barometer-operator-rolebinding
subjects:
- kind: ServiceAccount
name: barometer-operator
roleRef:
kind: Role
name: barometer-operator-role
apiGroup: rbac.authorization.k8s.io
| 21.666667 | 40 | 0.792308 |
791c6884f2286bf50fb8a7e31bbec71351cbd714 | 144 | yaml | YAML | built-in-references/Kubernetes/perf/violations/violation7152.yaml | sw47/azure-policy | 4a38e4cb4047b5364902653f0defe45f1b21bc61 | [
"MIT"
] | null | null | null | built-in-references/Kubernetes/perf/violations/violation7152.yaml | sw47/azure-policy | 4a38e4cb4047b5364902653f0defe45f1b21bc61 | [
"MIT"
] | null | null | null | built-in-references/Kubernetes/perf/violations/violation7152.yaml | sw47/azure-policy | 4a38e4cb4047b5364902653f0defe45f1b21bc61 | [
"MIT"
] | null | null | null | apiVersion: v1
kind: Pod
metadata:
name: image-demo-7152
spec:
containers:
- name: nginx
image: nginx #ritaacr.azurecr.io/nginx:latest | 18 | 49 | 0.722222 |
791c8ca61be4668daaac4b8f10c0d2c4864cff92 | 2,138 | yml | YAML | argo-workflow/BuildAdditions/wrkflw-toolbox.yml | mycancerdb-team/analysis-workflows | 322e3a17bed450e533c08249ab5de5c480c1282a | [
"MIT"
] | null | null | null | argo-workflow/BuildAdditions/wrkflw-toolbox.yml | mycancerdb-team/analysis-workflows | 322e3a17bed450e533c08249ab5de5c480c1282a | [
"MIT"
] | null | null | null | argo-workflow/BuildAdditions/wrkflw-toolbox.yml | mycancerdb-team/analysis-workflows | 322e3a17bed450e533c08249ab5de5c480c1282a | [
"MIT"
] | null | null | null | apiVersion: apps/v1
kind: Deployment
metadata:
name: wrkflw-tools
namespace: argo
labels:
app: wrkflw-tools
spec:
replicas: 1
selector:
matchLabels:
app: wrkflw-tools
template:
metadata:
labels:
app: wrkflw-tools
spec:
dnsPolicy: ClusterFirstWithHostNet
imagePullSecrets:
- name: mgbio-cred
- name: mcdb-bot
containers:
- name: wrkflw-tools
image: docker.cancerdb.io/mcdb-bots/bootstrap:mgbio
#resources:
# requests:
# memory: "60Gi"
# cpu: "50"
# limits:
# memory: "600Gi"
# cpu: "50"
env:
# - name: SMPLE
# value: "mcdb006-normal-exome"
# - name: BAM
# value: "/data/output/mcdb006/normal_mcdb006.bam"
# - name: REF_FILE
# value: "/ref-hg38/reference_genome/all_sequences.fa"
- name: FASTQR1
value: "/data/samples/tumor-exome/TL-21-3AMURU27_T_DSQ1_1.fastq.gz"
- name: FASTQR2
value: "/data/samples/tumor-exome/TL-21-3AMURU27_T_DSQ1_2.fastq.gz"
- name: OUTPUTDIR
value: "/data/output"
- name: DATATYPE
value: "tumor-exome"
- name: SAMPLEID
value: "mcdb010"
- name: PLATFORMUNIT
value: "HJC52BBXX.1"
- name: PLATFORM
value: "/data/output/mcdb005/hla/hla_calls/combined_calls.txt"
- name: SEQHOUSE
value: "Tempus"
command: ["/bin/bash", "-c", "--"]
args: ["while true; do sleep 30; done;"]
imagePullPolicy: Always
securityContext:
privileged: true
volumeMounts:
- mountPath: /ref-hg38
name: workflow-ref-hg38-dev
# - mountPath: /data
# name: workflow-data-dev
hostNetwork: true
volumes:
- name: workflow-ref-hg38-dev
persistentVolumeClaim:
claimName: workflow-ref-hg38-dev
readOnly: false
# - name: workflow-data-dev
# persistentVolumeClaim:
# claimName: immuno-data-pvc-mcdb010
# readOnly: false
| 28.506667 | 77 | 0.555659 |
791c90ecae6707c5fc540f0a4e2a355cd14d0314 | 377 | yml | YAML | build/nginx/kubernetes/rc.yml | CarmenAPuccio/easyTravel-Docker | 2cf204923f06959f07232b8dfb86a1ae323c1ad9 | [
"MIT"
] | 20 | 2019-02-18T18:36:19.000Z | 2022-02-20T12:20:34.000Z | build/nginx/kubernetes/rc.yml | CarmenAPuccio/easyTravel-Docker | 2cf204923f06959f07232b8dfb86a1ae323c1ad9 | [
"MIT"
] | 5 | 2019-02-20T13:39:39.000Z | 2020-06-03T04:27:06.000Z | build/nginx/kubernetes/rc.yml | CarmenAPuccio/easyTravel-Docker | 2cf204923f06959f07232b8dfb86a1ae323c1ad9 | [
"MIT"
] | 34 | 2019-03-12T12:27:52.000Z | 2022-02-14T01:19:45.000Z | apiVersion: v1
kind: ReplicationController
metadata:
name: nginx-rc
spec:
replicas: 1
selector:
app: reverse-proxy
template:
metadata:
labels:
app: reverse-proxy
tier: frontend
spec:
containers:
- name: nginx
image: dynatrace/easytravel-nginx
ports:
- containerPort: 80
- containerPort: 443 | 18.85 | 41 | 0.607427 |
791d110a1b8bb2ab267977ddf8503edd9890d5cf | 310 | yaml | YAML | cryptoiberoapi-service.yaml | rafcasto/cryptoibero_cyptoprice_api | 033c2fbec38d1a2c29f3b4ce86b84d1f31b40fa9 | [
"Apache-2.0"
] | null | null | null | cryptoiberoapi-service.yaml | rafcasto/cryptoibero_cyptoprice_api | 033c2fbec38d1a2c29f3b4ce86b84d1f31b40fa9 | [
"Apache-2.0"
] | null | null | null | cryptoiberoapi-service.yaml | rafcasto/cryptoibero_cyptoprice_api | 033c2fbec38d1a2c29f3b4ce86b84d1f31b40fa9 | [
"Apache-2.0"
] | null | null | null | apiVersion: v1
kind: Service
metadata:
name: cryptoibero-svc
labels:
app: cryptoibero-api
spec:
type: LoadBalancer
ports:
- port: 5000
targetPort: 5000
name: http
protocol: TCP
- port: 5001
targetPort: 5001
name: https
protocol: TCP
selector:
app: cryptoibero-api | 16.315789 | 24 | 0.66129 |
791d4bc7b9cb359d56e1317789a8957ee368d5ea | 134 | yml | YAML | kafka/30service.yml | AurelienGalicher/k8s-training | 3b5e157538b6b7c909fa5762b4c6bf705942d6ea | [
"Apache-2.0"
] | null | null | null | kafka/30service.yml | AurelienGalicher/k8s-training | 3b5e157538b6b7c909fa5762b4c6bf705942d6ea | [
"Apache-2.0"
] | null | null | null | kafka/30service.yml | AurelienGalicher/k8s-training | 3b5e157538b6b7c909fa5762b4c6bf705942d6ea | [
"Apache-2.0"
] | 1 | 2020-10-01T19:21:10.000Z | 2020-10-01T19:21:10.000Z | ---
apiVersion: v1
kind: Service
metadata:
name: kafka
#namespace: kafka
spec:
ports:
- port: 9092
selector:
app: kafka
| 11.166667 | 19 | 0.649254 |
791ddae73f866feca9bb31757899ee4fd07ad403 | 1,236 | yaml | YAML | vendor/github.com/kubernetes-incubator/external-storage/iscsi/targetd/kubernetes/iscsi-provisioner-class.yaml | pohly/kubernetes-csi | 18548a585db44dbf0631dae7390391ae9f9bed21 | [
"Apache-2.0"
] | 35 | 2018-08-29T09:44:50.000Z | 2022-03-17T12:06:45.000Z | vendor/github.com/kubernetes-incubator/external-storage/iscsi/targetd/kubernetes/iscsi-provisioner-class.yaml | pohly/kubernetes-csi | 18548a585db44dbf0631dae7390391ae9f9bed21 | [
"Apache-2.0"
] | 5 | 2018-09-06T06:47:05.000Z | 2020-06-25T20:27:28.000Z | vendor/github.com/kubernetes-incubator/external-storage/iscsi/targetd/kubernetes/iscsi-provisioner-class.yaml | pohly/kubernetes-csi | 18548a585db44dbf0631dae7390391ae9f9bed21 | [
"Apache-2.0"
] | 7 | 2018-09-06T04:55:11.000Z | 2021-12-09T05:41:10.000Z | kind: StorageClass
apiVersion: storage.k8s.io/v1
metadata:
name: iscsi-targetd-vg-targetd
provisioner: iscsi-targetd
parameters:
# this id where the iscsi server is running
targetPortal: 192.168.99.100:3260
# if you are using multipath, you can specify additional IPs here, default empty
# portals: 192.168.99.101:3260,192.168.99.102:3260
# this is the iscsi server iqn
iqn: iqn.2003-01.org.linux-iscsi.minishift:targetd
# this is the iscsi interface to be used, the default is default
# iscsiInterface: default
# this must be on eof the volume groups condifgured in targed.yaml, the default is vg-targetd
# volumeGroup: vg-targetd
# this is a comma separated list of initiators that will be give access to the created volumes, they must correspond to what you have configured in your nodes.
initiators: iqn.2017-04.com.example:node1
# whether or not to use chap authentication for discovery operations
chapAuthDiscovery: "true"
# whether or not to use chap authentication for session operations
chapAuthSession: "true"
# This is the filesystem you want your volume to be formatted with, default xfs
# fsType: xfs
# Whether the volume should be mounted in readonly mode, default false
# readonly: false | 35.314286 | 159 | 0.771036 |
791e35ba78720c329411c596bee08e4caa74dcc7 | 581 | yaml | YAML | scripts/challenge-6/insurance-deployment.yaml | Navaneethsen/MSOpenHackSA2021 | a74cb8edca5e49be3e7005af5d784506d8ff376e | [
"MIT"
] | null | null | null | scripts/challenge-6/insurance-deployment.yaml | Navaneethsen/MSOpenHackSA2021 | a74cb8edca5e49be3e7005af5d784506d8ff376e | [
"MIT"
] | null | null | null | scripts/challenge-6/insurance-deployment.yaml | Navaneethsen/MSOpenHackSA2021 | a74cb8edca5e49be3e7005af5d784506d8ff376e | [
"MIT"
] | null | null | null | apiVersion: apps/v1
kind: Deployment
metadata:
name: insurance-deployment
namespace: insurance
labels:
deploy: insurance
spec:
replicas: 2
selector:
matchLabels:
app: insurance
template:
metadata:
labels:
app: insurance
spec:
containers:
- image: "registrysiq8419.azurecr.io/insurance:1.0"
imagePullPolicy: Always
name: insurance
resources:
limits:
memory: 2048Mi
cpu: 500m
ports:
- containerPort: 8081
name: http
protocol: TCP | 20.034483 | 57 | 0.586919 |
791e7a20c525e0e579780c6c7f8b2b58f5e0c7c1 | 528 | yaml | YAML | assets/prometheus-operator-user-workload/cluster-role-binding.yaml | erkanerol/cluster-monitoring-operator | dc830dff02fdcc13290723786f469b7c812103e2 | [
"Apache-2.0"
] | null | null | null | assets/prometheus-operator-user-workload/cluster-role-binding.yaml | erkanerol/cluster-monitoring-operator | dc830dff02fdcc13290723786f469b7c812103e2 | [
"Apache-2.0"
] | null | null | null | assets/prometheus-operator-user-workload/cluster-role-binding.yaml | erkanerol/cluster-monitoring-operator | dc830dff02fdcc13290723786f469b7c812103e2 | [
"Apache-2.0"
] | null | null | null | apiVersion: rbac.authorization.k8s.io/v1
kind: ClusterRoleBinding
metadata:
labels:
app.kubernetes.io/component: controller
app.kubernetes.io/name: prometheus-operator
app.kubernetes.io/part-of: openshift-monitoring
app.kubernetes.io/version: 0.50.0
name: prometheus-user-workload-operator
roleRef:
apiGroup: rbac.authorization.k8s.io
kind: ClusterRole
name: prometheus-user-workload-operator
subjects:
- kind: ServiceAccount
name: prometheus-operator
namespace: openshift-user-workload-monitoring
| 29.333333 | 51 | 0.785985 |
791f0aa951e0759fd90139d183214980991952b0 | 144 | yaml | YAML | built-in-references/Kubernetes/perf/violations/violation5910.yaml | sw47/azure-policy | 4a38e4cb4047b5364902653f0defe45f1b21bc61 | [
"MIT"
] | null | null | null | built-in-references/Kubernetes/perf/violations/violation5910.yaml | sw47/azure-policy | 4a38e4cb4047b5364902653f0defe45f1b21bc61 | [
"MIT"
] | null | null | null | built-in-references/Kubernetes/perf/violations/violation5910.yaml | sw47/azure-policy | 4a38e4cb4047b5364902653f0defe45f1b21bc61 | [
"MIT"
] | null | null | null | apiVersion: v1
kind: Pod
metadata:
name: image-demo-5910
spec:
containers:
- name: nginx
image: nginx #ritaacr.azurecr.io/nginx:latest | 18 | 49 | 0.722222 |
791f330a8f8b91177d83b2f723d9820283a954b6 | 341 | yaml | YAML | examples/nginx-deploy.yaml | josejayesh/k8s | f1499989242a21eedb3506d1281a5bbed177fc10 | [
"BSD-2-Clause"
] | null | null | null | examples/nginx-deploy.yaml | josejayesh/k8s | f1499989242a21eedb3506d1281a5bbed177fc10 | [
"BSD-2-Clause"
] | null | null | null | examples/nginx-deploy.yaml | josejayesh/k8s | f1499989242a21eedb3506d1281a5bbed177fc10 | [
"BSD-2-Clause"
] | null | null | null | apiVersion: apps/v1
kind: Deployment
metadata:
name: nginx-deployment
labels:
app: nginx
spec:
replicas: 10
selector:
matchLabels:
app: nginx
template:
metadata:
labels:
app: nginx
spec:
containers:
- name: nginx
image: nginx:1.15.4
ports:
- containerPort: 80 | 16.238095 | 27 | 0.583578 |
791f4acd98805db35c91bad57579f65be0a804d5 | 94 | yaml | YAML | airflow-sa-rbac/airflow-sa.yaml | roitvt/airflow-spark-k8s | cd2a0ec63e1fb9ad43beb725a65e4d65a4d85206 | [
"Apache-2.0"
] | 2 | 2020-04-26T11:12:11.000Z | 2020-09-14T16:36:42.000Z | airflow-sa-rbac/airflow-sa.yaml | roitvt/airflow-spark-k8s | cd2a0ec63e1fb9ad43beb725a65e4d65a4d85206 | [
"Apache-2.0"
] | 1 | 2020-04-14T18:20:20.000Z | 2020-04-14T18:26:27.000Z | airflow-sa-rbac/airflow-sa.yaml | roitvt/airflow-spark-k8s | cd2a0ec63e1fb9ad43beb725a65e4d65a4d85206 | [
"Apache-2.0"
] | null | null | null | apiVersion: v1
kind: ServiceAccount
metadata:
name: airflow-sa
namespace: spark-operator
| 13.428571 | 27 | 0.776596 |
79203ce3490965072c31764c3df657bea749cf7a | 902 | yaml | YAML | plugins/plugin-kubectl/tests/data/k8s/job.yaml | aairom/kui | 3ff09bc1d60d005008ccf8f80bfd8bda16dba967 | [
"Apache-2.0"
] | 1,681 | 2018-11-29T19:07:30.000Z | 2021-03-21T03:07:38.000Z | plugins/plugin-kubectl/tests/data/k8s/job.yaml | aairom/kui | 3ff09bc1d60d005008ccf8f80bfd8bda16dba967 | [
"Apache-2.0"
] | 5,573 | 2018-11-29T18:17:24.000Z | 2021-03-23T19:08:32.000Z | plugins/plugin-kubectl/tests/data/k8s/job.yaml | aairom/kui | 3ff09bc1d60d005008ccf8f80bfd8bda16dba967 | [
"Apache-2.0"
] | 168 | 2018-11-29T17:54:25.000Z | 2021-03-19T16:38:36.000Z | #
# Copyright 2021 The Kubernetes Authors
#
# Licensed under the Apache License, Version 2.0 (the "License");
# you may not use this file except in compliance with the License.
# You may obtain a copy of the License at
#
# http://www.apache.org/licenses/LICENSE-2.0
#
# Unless required by applicable law or agreed to in writing, software
# distributed under the License is distributed on an "AS IS" BASIS,
# WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
# See the License for the specific language governing permissions and
# limitations under the License.
#
apiVersion: batch/v1
kind: Job
metadata:
name: pi
spec:
completions: 20
parallelism: 4
template:
spec:
containers:
- name: pi
image: quay.io/biocontainers/perl-io-all
command: ["perl", "-Mbignum=bpi", "-wle", "print bpi(2000)"]
restartPolicy: Never
backoffLimit: 4
| 28.1875 | 74 | 0.713969 |
792063117e25e04be41a7c13a49d075922d1f6af | 462 | yaml | YAML | server/kindle-weather-display-deploy.yaml | bostrt/kindle-weather-display | dab01bf410d0613322cc829a0a7d5e07019ce22e | [
"MIT"
] | null | null | null | server/kindle-weather-display-deploy.yaml | bostrt/kindle-weather-display | dab01bf410d0613322cc829a0a7d5e07019ce22e | [
"MIT"
] | null | null | null | server/kindle-weather-display-deploy.yaml | bostrt/kindle-weather-display | dab01bf410d0613322cc829a0a7d5e07019ce22e | [
"MIT"
] | null | null | null | apiVersion: apps/v1
kind: Deployment
metadata:
name: kindle-weather
labels:
app: kindle-weather
name: kindle-weather
spec:
replicas: 1
selector:
matchLabels:
app: kindle-weather
template:
metadata:
labels:
app: kindle-weather
name: kindle-weather
spec:
containers:
- name: kindle-weather
image: quay.io/bostrt/kindle-weather-display:latest
ports:
- containerPort: 80
| 18.48 | 59 | 0.62987 |
792081de615c3ac21980c8b26e54a7931990684f | 747 | yaml | YAML | k8s/ingress.yaml | cernops/goermis | warning: refname 'HEAD' is ambiguous.
71b43c40465b1fdb2573a7f24699c16be671458d | [
"ECL-2.0",
"Apache-2.0"
] | null | null | null | k8s/ingress.yaml | cernops/goermis | warning: refname 'HEAD' is ambiguous.
71b43c40465b1fdb2573a7f24699c16be671458d | [
"ECL-2.0",
"Apache-2.0"
] | null | null | null | k8s/ingress.yaml | cernops/goermis | warning: refname 'HEAD' is ambiguous.
71b43c40465b1fdb2573a7f24699c16be671458d | [
"ECL-2.0",
"Apache-2.0"
] | null | null | null | ---
apiVersion: networking.k8s.io/v1
kind: Ingress
metadata:
name: goermis-ingress
namespace: default
annotations:
kubernetes.io/ingress.class: nginx
nginx.ingress.kubernetes.io/ssl-passthrough: "true"
nginx.ingress.kubernetes.io/ssl-redirect: "true"
nginx.ingress.kubernetes.io/backend-protocol: "https"
spec:
rules:
- host: goermisk8s.cern.ch
http:
paths:
- path: /
pathType: Prefix
backend:
service:
name: goermis-service
port:
number: 443
tls:
- hosts:
- goermisk8s.cern.ch
| 25.758621 | 61 | 0.495315 |
7921e55504d120f52024fcb6ae0125123e6d0b8c | 346 | yaml | YAML | roles/ks-monitor/files/prometheus/sources/prometheus-clusterRole.yaml | klj890/ks-installer | 42fc304f1f03e5c80c2ae1ae0e7998b6f77d96ee | [
"Apache-2.0"
] | null | null | null | roles/ks-monitor/files/prometheus/sources/prometheus-clusterRole.yaml | klj890/ks-installer | 42fc304f1f03e5c80c2ae1ae0e7998b6f77d96ee | [
"Apache-2.0"
] | null | null | null | roles/ks-monitor/files/prometheus/sources/prometheus-clusterRole.yaml | klj890/ks-installer | 42fc304f1f03e5c80c2ae1ae0e7998b6f77d96ee | [
"Apache-2.0"
] | null | null | null | apiVersion: rbac.authorization.k8s.io/v1
kind: ClusterRole
metadata:
name: kubesphere-prometheus-k8s
rules:
- apiGroups:
- ""
resources:
- nodes/metrics
- nodes
- services
- endpoints
- pods
verbs:
- get
- list
- watch
- nonResourceURLs:
- /metrics
verbs:
- get
| 15.727273 | 40 | 0.554913 |
7921e6d54483ca462c4a26d8774a3335ec6cc5b8 | 752 | yml | YAML | 01-static-yaml/deployment.yml | murdos/deploy-sith | ada9e931cfaf517bfdf3a2cda25c6fcf4924351b | [
"Apache-2.0"
] | null | null | null | 01-static-yaml/deployment.yml | murdos/deploy-sith | ada9e931cfaf517bfdf3a2cda25c6fcf4924351b | [
"Apache-2.0"
] | null | null | null | 01-static-yaml/deployment.yml | murdos/deploy-sith | ada9e931cfaf517bfdf3a2cda25c6fcf4924351b | [
"Apache-2.0"
] | null | null | null | ---
kind: Deployment
apiVersion: apps/v1
metadata:
name: hello
labels:
app: hello
spec:
replicas: 3
selector:
matchLabels:
app: hello
template:
metadata:
labels:
app: hello
spec:
containers:
- name: hello
image: registry.gitlab.com/gitops-heros/sith:0.1
ports:
- name: web
containerPort: 8080
resources:
limits:
cpu: "1"
memory: "16Mi"
requests:
cpu: "0.2"
memory: "8Mi"
livenessProbe:
httpGet:
path: /
port: web
readinessProbe:
httpGet:
path: /
port: web
| 19.282051 | 58 | 0.446809 |
792234bef425a5c6cd32571ed95a981c23e7e05c | 115 | yaml | YAML | platforms/hyperledger-indy/releases/dev/partner/partner-partner-steward-2-vault-auth/service-account.yaml | sauveer/bevel | 67d9f9e2eab0d0f8ceb57e5b5c1e28755e3aa0f5 | [
"Apache-2.0"
] | null | null | null | platforms/hyperledger-indy/releases/dev/partner/partner-partner-steward-2-vault-auth/service-account.yaml | sauveer/bevel | 67d9f9e2eab0d0f8ceb57e5b5c1e28755e3aa0f5 | [
"Apache-2.0"
] | null | null | null | platforms/hyperledger-indy/releases/dev/partner/partner-partner-steward-2-vault-auth/service-account.yaml | sauveer/bevel | 67d9f9e2eab0d0f8ceb57e5b5c1e28755e3aa0f5 | [
"Apache-2.0"
] | null | null | null | apiVersion: v1
kind: ServiceAccount
metadata:
name: partner-partner-steward-2-vault-auth
namespace: partner-ns
| 19.166667 | 44 | 0.791304 |
79229472a662eb5e5a8acb75042b570d80f71143 | 152 | yaml | YAML | charts/tic-tac-toe/templates/web/service.yaml | theothertomelliott/tic-tac-toverengineered | 3420d67cf43f2a0a4110b1a19d597bfae6209523 | [
"MIT"
] | 3 | 2021-05-27T13:30:02.000Z | 2021-07-05T22:49:38.000Z | charts/tic-tac-toe/templates/web/service.yaml | theothertomelliott/tic-tac-toverengineered | 3420d67cf43f2a0a4110b1a19d597bfae6209523 | [
"MIT"
] | null | null | null | charts/tic-tac-toe/templates/web/service.yaml | theothertomelliott/tic-tac-toverengineered | 3420d67cf43f2a0a4110b1a19d597bfae6209523 | [
"MIT"
] | null | null | null | ---
apiVersion: v1
kind: Service
metadata:
name: web
spec:
selector:
app: web
ports:
- protocol: TCP
port: 80
targetPort: 8080 | 12.666667 | 22 | 0.605263 |
7922b11671f2a19e21ae91a631e296a957e5f6f5 | 373 | yaml | YAML | f5-ipam-controller-operator/config/rbac/f5ipamctlr_editor_role.yaml | F5Networks/f5-ipam-controller | c85a46e23cf66f1549b59d8f6e12d66e329be380 | [
"Apache-2.0"
] | 4 | 2021-06-30T07:59:23.000Z | 2022-02-01T23:25:27.000Z | f5-ipam-controller-operator/config/rbac/f5ipamctlr_editor_role.yaml | F5Networks/f5-ipam-controller | c85a46e23cf66f1549b59d8f6e12d66e329be380 | [
"Apache-2.0"
] | 83 | 2021-03-16T13:04:07.000Z | 2022-03-30T11:48:15.000Z | f5-ipam-controller-operator/config/rbac/f5ipamctlr_editor_role.yaml | F5Networks/f5-ipam-controller | c85a46e23cf66f1549b59d8f6e12d66e329be380 | [
"Apache-2.0"
] | 16 | 2021-03-03T10:11:04.000Z | 2021-08-24T04:36:11.000Z | # permissions for end users to edit f5ipamctlrs.
apiVersion: rbac.authorization.k8s.io/v1
kind: ClusterRole
metadata:
name: f5ipamctlr-editor-role
rules:
- apiGroups:
- fic.f5.com
resources:
- f5ipamctlrs
verbs:
- create
- delete
- get
- list
- patch
- update
- watch
- apiGroups:
- fic.f5.com
resources:
- f5ipamctlrs/status
verbs:
- get
| 14.92 | 48 | 0.678284 |
7922c75f5bef5d80641ba1a750a5a29445171637 | 306 | yaml | YAML | tests/seccomp/allowed.yaml | jvanz/psp-migration | b66aa38b04066d75ad843fa0dd7065b56d85d5e4 | [
"MIT"
] | 27 | 2021-12-01T13:04:54.000Z | 2022-03-26T01:01:31.000Z | tests/seccomp/allowed.yaml | jvanz/psp-migration | b66aa38b04066d75ad843fa0dd7065b56d85d5e4 | [
"MIT"
] | 21 | 2021-12-01T14:37:54.000Z | 2022-02-09T00:58:16.000Z | tests/seccomp/allowed.yaml | jvanz/psp-migration | b66aa38b04066d75ad843fa0dd7065b56d85d5e4 | [
"MIT"
] | 3 | 2021-12-01T12:26:42.000Z | 2021-12-21T11:08:02.000Z | apiVersion: v1
kind: Pod
metadata:
name: nginx-seccomp-allowed
annotations:
container.seccomp.security.alpha.kubernetes.io/nginx: runtime/default
labels:
app: nginx-seccomp
spec:
securityContext:
seccompProfile:
type: RuntimeDefault
containers:
- name: nginx
image: nginx
| 19.125 | 73 | 0.72549 |
7922d6b35b3ec015eb1d06c57a086a81c003b95e | 364 | yaml | YAML | manifests/0000_26_cloud-controller-manager-operator_00_namespace.yaml | JoelSpeed/cluster-cloud-controller-manager-operator | a53683a944353c75e6d76a4e17b0ce4e5aed4dbc | [
"Apache-2.0"
] | 1 | 2020-10-22T13:26:05.000Z | 2020-10-22T13:26:05.000Z | manifests/0000_26_cloud-controller-manager-operator_00_namespace.yaml | JoelSpeed/cluster-cloud-controller-manager-operator | a53683a944353c75e6d76a4e17b0ce4e5aed4dbc | [
"Apache-2.0"
] | null | null | null | manifests/0000_26_cloud-controller-manager-operator_00_namespace.yaml | JoelSpeed/cluster-cloud-controller-manager-operator | a53683a944353c75e6d76a4e17b0ce4e5aed4dbc | [
"Apache-2.0"
] | null | null | null | apiVersion: v1
kind: Namespace
metadata:
annotations:
include.release.openshift.io/single-node-developer: "true"
include.release.openshift.io/self-managed-high-availability: "true"
openshift.io/node-selector: ""
labels:
openshift.io/run-level: "0"
openshift.io/cluster-monitoring: "true"
name: openshift-cloud-controller-manager-operator
| 30.333333 | 71 | 0.747253 |
7922e9a27ee59fd6994f87240a65fbaac05cd50b | 150 | yaml | YAML | Kubernetes/poll.service.yaml | LeoHnvl/DevOps | 062771a4e77acbc824db95e3c3514fb9d9c8a1df | [
"MIT"
] | null | null | null | Kubernetes/poll.service.yaml | LeoHnvl/DevOps | 062771a4e77acbc824db95e3c3514fb9d9c8a1df | [
"MIT"
] | null | null | null | Kubernetes/poll.service.yaml | LeoHnvl/DevOps | 062771a4e77acbc824db95e3c3514fb9d9c8a1df | [
"MIT"
] | null | null | null | apiVersion: v1
kind: Service
metadata:
name: poll
spec:
selector:
app: poll
ports:
- protocol: TCP
port: 80
targetPort: 80 | 13.636364 | 21 | 0.613333 |
79234a0d018e9366f039c87b84955d10be89258f | 230 | yaml | YAML | experimental/kubernetes/ha/echo/sched/svcs/spin-echo-sched.yaml | enterstudio/spinnaker | 66d0952f09efa2228aa45e6fe669bb3504415467 | [
"Apache-2.0"
] | 4 | 2015-11-30T21:52:01.000Z | 2018-07-30T22:10:01.000Z | experimental/kubernetes/ha/echo/sched/svcs/spin-echo-sched.yaml | enterstudio/spinnaker | 66d0952f09efa2228aa45e6fe669bb3504415467 | [
"Apache-2.0"
] | null | null | null | experimental/kubernetes/ha/echo/sched/svcs/spin-echo-sched.yaml | enterstudio/spinnaker | 66d0952f09efa2228aa45e6fe669bb3504415467 | [
"Apache-2.0"
] | 6 | 2015-11-22T04:00:53.000Z | 2019-03-21T08:09:34.000Z | apiVersion: v1
kind: Service
metadata:
name: spin-echo-sched
namespace: spinnaker
labels:
app: spin
stack: echo
detail: sched
spec:
ports:
- port: 8089
selector:
load-balancer-spin-echo-sched: "true"
| 15.333333 | 41 | 0.665217 |
79236083c82c66aad3a6d474cd950548b26c993a | 3,739 | yaml | YAML | cluster/manifests/flannel/daemonset.yaml | elgalu/kubernetes-on-aws | 85c985877b6307d98b145c80090d27de2db891a2 | [
"MIT"
] | null | null | null | cluster/manifests/flannel/daemonset.yaml | elgalu/kubernetes-on-aws | 85c985877b6307d98b145c80090d27de2db891a2 | [
"MIT"
] | null | null | null | cluster/manifests/flannel/daemonset.yaml | elgalu/kubernetes-on-aws | 85c985877b6307d98b145c80090d27de2db891a2 | [
"MIT"
] | null | null | null | apiVersion: apps/v1
kind: DaemonSet
metadata:
name: kube-flannel
namespace: kube-system
labels:
application: flannel
version: v0.11.0-10
spec:
updateStrategy:
type: OnDelete
selector:
matchLabels:
application: flannel
template:
metadata:
labels:
application: flannel
version: v0.11.0-10
spec:
priorityClassName: system-node-critical
serviceAccountName: flannel
containers:
- name: delayed-install-cni
image: registry.opensource.zalan.do/teapot/flannel-awaiter:master-4
command:
- /await-and-copy
stdin: true
volumeMounts:
- name: cni
mountPath: /etc/cni/net.d
- name: flannel-cfg
mountPath: /etc/kube-flannel/
env:
- name: CNI_CONFIG_SOURCE
value: /etc/kube-flannel/cni-conf.json
- name: CNI_CONFIG_TARGET
value: /etc/cni/net.d/10-flannel.conflist
resources:
requests:
cpu: 25m
memory: 50Mi
ephemeral-storage: 256Mi
limits:
cpu: 25m
memory: 50Mi
- name: apiserver-proxy
image: registry.opensource.zalan.do/teapot/etcd-proxy:master-6
command:
- /bin/sh
args:
- -c
- "exec /etcd-proxy --listen-address 127.0.0.1:333 $KUBERNETES_SERVICE_HOST:$KUBERNETES_SERVICE_PORT"
resources:
requests:
cpu: 25m
memory: 25Mi
ephemeral-storage: 256Mi
limits:
cpu: 25m
memory: 25Mi
- name: kube-flannel
image: registry.opensource.zalan.do/teapot/flannel:v0.11.0-10
command:
- /opt/bin/flanneld
args:
- --ip-masq
- --kube-subnet-mgr
- --v=2
env:
- name: KUBERNETES_SERVICE_HOST
value: "127.0.0.1"
- name: KUBERNETES_SERVICE_PORT
value: "333"
- name: POD_NAME
valueFrom:
fieldRef:
fieldPath: metadata.name
- name: POD_NAMESPACE
valueFrom:
fieldRef:
fieldPath: metadata.namespace
resources:
requests:
cpu: "{{ .Cluster.ConfigItems.flannel_cpu }}"
memory: "{{ .Cluster.ConfigItems.flannel_memory }}"
ephemeral-storage: 256Mi
limits:
cpu: "{{ .Cluster.ConfigItems.flannel_cpu }}"
memory: "{{ .Cluster.ConfigItems.flannel_memory }}"
securityContext:
privileged: true
volumeMounts:
- name: flannel-cfg
mountPath: /etc/kube-flannel/
- name: run
mountPath: /run
- args:
- -c
- /tc-flannel.sh
command:
- /bin/bash
image: registry.opensource.zalan.do/teapot/flannel-tc:v0.0.3
name: flannel-tc
resources:
requests:
cpu: 1m
memory: 25Mi
ephemeral-storage: 256Mi
limits:
cpu: 1m
memory: 25Mi
securityContext:
privileged: true
stdin: true
volumeMounts:
- mountPath: /run
name: run
- mountPath: /lib/tc
name: lib-tc
hostNetwork: true
tolerations:
- operator: Exists
effect: NoSchedule
- operator: Exists
effect: NoExecute
volumes:
- name: flannel-cfg
configMap:
name: kube-flannel-cfg
- name: cni
hostPath:
path: /etc/kubernetes/cni/net.d
- name: run
hostPath:
path: /run
- hostPath:
path: /lib/tc
type: ""
name: lib-tc
| 26.51773 | 109 | 0.527414 |
79236223a9770221f605f3e4829b8b3add7391aa | 2,122 | yaml | YAML | lab/stacks/keycloak/manifests/keycloak-deployment.yaml | Richard-Barrett/supportit | 524f3077c5c10041c022b09dc19a4d715584aa19 | [
"MIT"
] | null | null | null | lab/stacks/keycloak/manifests/keycloak-deployment.yaml | Richard-Barrett/supportit | 524f3077c5c10041c022b09dc19a4d715584aa19 | [
"MIT"
] | 4 | 2022-01-31T17:06:33.000Z | 2022-03-04T16:36:24.000Z | lab/stacks/keycloak/manifests/keycloak-deployment.yaml | Richard-Barrett/supportit | 524f3077c5c10041c022b09dc19a4d715584aa19 | [
"MIT"
] | null | null | null | apiVersion: apps/v1
kind: Deployment
metadata:
annotations:
kompose.cmd: kompose convert -f docker-compose.yaml
kompose.version: 1.24.0 (HEAD)
labels:
io.kompose.service: keycloak
name: keycloak
spec:
replicas: 1
selector:
matchLabels:
io.kompose.service: keycloak
strategy:
type: Recreate
template:
metadata:
annotations:
kompose.cmd: kompose convert -f docker-compose.yaml
kompose.version: 1.24.0 (HEAD)
labels:
io.kompose.service: keycloak
spec:
containers:
- env:
- name: DB_ADDR
value: keycloak_db
- name: DB_DATABASE
value: keycloak
- name: DB_PASSWORD
- name: DB_PORT
value: "5432"
- name: DB_USER
value: keycloak
- name: DB_VENDOR
value: postgres
- name: KEYCLOAK_LOGLEVEL
value: DEBUG
- name: KEYCLOAK_PASSWORD
- name: KEYCLOAK_STATISTICS
value: all
- name: KEYCLOAK_USER
value: admin
image: jboss/keycloak
name: keycloak
ports:
- containerPort: 8443
- containerPort: 8080
- containerPort: 9990
resources:
requests:
memory: "64mi"
cpu: "200m"
limits:
memory: "128mi"
cpu: "400m"
volumeMounts:
- mountPath: /data
name: keycloak-data
- mountPath: /opt/jboss/keycloak/providers
name: keycloak-claim1
- mountPath: /opt/jboss/keycloak/standalone/configuration
name: keycloak-claim2
restartPolicy: Always
volumes:
- name: keycloak-data
persistentVolumeClaim:
claimName: keycloak-data
- name: keycloak-claim1
persistentVolumeClaim:
claimName: keycloak-claim1
- name: keycloak-claim2
persistentVolumeClaim:
claimName: keycloak-claim2
status: {}
| 27.558442 | 69 | 0.535344 |
7923695ff6af03408d925a1884d5267dab905543 | 144 | yaml | YAML | built-in-references/Kubernetes/perf/violations/violation2536.yaml | sw47/azure-policy | 4a38e4cb4047b5364902653f0defe45f1b21bc61 | [
"MIT"
] | null | null | null | built-in-references/Kubernetes/perf/violations/violation2536.yaml | sw47/azure-policy | 4a38e4cb4047b5364902653f0defe45f1b21bc61 | [
"MIT"
] | null | null | null | built-in-references/Kubernetes/perf/violations/violation2536.yaml | sw47/azure-policy | 4a38e4cb4047b5364902653f0defe45f1b21bc61 | [
"MIT"
] | null | null | null | apiVersion: v1
kind: Pod
metadata:
name: image-demo-2536
spec:
containers:
- name: nginx
image: nginx #ritaacr.azurecr.io/nginx:latest | 18 | 49 | 0.722222 |
7923bf505effd312d0ee6da8e228c986ff104467 | 247 | yaml | YAML | deploy/sandbox/sandboxtenant.clusterrole.yaml | lulf/strimzi-sandbox | a022d8e0c374c28be3f2944a1f8fc0ddc1585fff | [
"Apache-2.0"
] | 4 | 2020-08-07T13:59:04.000Z | 2020-09-26T12:51:31.000Z | deploy/sandbox/sandboxtenant.clusterrole.yaml | lulf/strimzi-sandbox | a022d8e0c374c28be3f2944a1f8fc0ddc1585fff | [
"Apache-2.0"
] | null | null | null | deploy/sandbox/sandboxtenant.clusterrole.yaml | lulf/strimzi-sandbox | a022d8e0c374c28be3f2944a1f8fc0ddc1585fff | [
"Apache-2.0"
] | 1 | 2020-09-26T12:57:12.000Z | 2020-09-26T12:57:12.000Z | apiVersion: rbac.authorization.k8s.io/v1
kind: ClusterRole
metadata:
name: sandbox-tenant
rules:
- apiGroups: [ "kafka.strimzi.io" ]
resources: [ "kafkatopics" ]
verbs: [ "create", "update", "patch", "get", "list", "watch", "delete" ]
| 27.444444 | 76 | 0.65587 |