hexsha
stringlengths 40
40
| size
int64 24
1.05M
| ext
stringclasses 2
values | lang
stringclasses 1
value | max_stars_repo_path
stringlengths 5
269
| max_stars_repo_name
stringlengths 7
107
| max_stars_repo_head_hexsha
stringlengths 40
78
| max_stars_repo_licenses
sequence | max_stars_count
int64 1
84.9k
⌀ | max_stars_repo_stars_event_min_datetime
stringlengths 24
24
⌀ | max_stars_repo_stars_event_max_datetime
stringlengths 24
24
⌀ | max_issues_repo_path
stringlengths 5
269
| max_issues_repo_name
stringlengths 7
107
| max_issues_repo_head_hexsha
stringlengths 40
78
| max_issues_repo_licenses
sequence | max_issues_count
int64 1
116k
⌀ | max_issues_repo_issues_event_min_datetime
stringlengths 24
24
⌀ | max_issues_repo_issues_event_max_datetime
stringlengths 24
24
⌀ | max_forks_repo_path
stringlengths 5
269
| max_forks_repo_name
stringlengths 7
107
| max_forks_repo_head_hexsha
stringlengths 40
78
| max_forks_repo_licenses
sequence | max_forks_count
int64 1
55.9k
⌀ | max_forks_repo_forks_event_min_datetime
stringlengths 24
24
⌀ | max_forks_repo_forks_event_max_datetime
stringlengths 24
24
⌀ | content
stringlengths 24
1.05M
| avg_line_length
float64 1
304k
| max_line_length
int64 14
1.03M
| alphanum_fraction
float64 0
1
|
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
f77135f72eec8b292baa668d4b2b08b060c0874b | 267 | yaml | YAML | srcs/mysql/pv/pv-volume.yaml | M-Philippe/ft_services | f251ed8427c81441dce87e549ec5bc6dac9792aa | [
"MIT"
] | null | null | null | srcs/mysql/pv/pv-volume.yaml | M-Philippe/ft_services | f251ed8427c81441dce87e549ec5bc6dac9792aa | [
"MIT"
] | null | null | null | srcs/mysql/pv/pv-volume.yaml | M-Philippe/ft_services | f251ed8427c81441dce87e549ec5bc6dac9792aa | [
"MIT"
] | null | null | null | apiVersion: v1
kind: PersistentVolume
metadata:
name: mysql-pv-volume
labels:
type: local
spec:
storageClassName: manual
capacity:
storage: 10000Mi
accessModes:
- ReadWriteOnce
hostPath:
path: "/home/LOGIN/ft_services/srcs/mysql/database/" | 19.071429 | 56 | 0.722846 |
f7718a504cc34f33d817388fe90fb36558070613 | 110 | yml | YAML | kubernetes/gateway-postgres/persistentvolume.yml | okafke/ddcc-gateway | 1166592069d6cfba9d9571b469114c868ca86d61 | [
"Apache-2.0"
] | null | null | null | kubernetes/gateway-postgres/persistentvolume.yml | okafke/ddcc-gateway | 1166592069d6cfba9d9571b469114c868ca86d61 | [
"Apache-2.0"
] | null | null | null | kubernetes/gateway-postgres/persistentvolume.yml | okafke/ddcc-gateway | 1166592069d6cfba9d9571b469114c868ca86d61 | [
"Apache-2.0"
] | null | null | null | apiVersion: v1
kind: PersistentVolume
metadata:
labels:
app: ddcc-gateway
name: ddcc-gateway-pv-volume | 18.333333 | 30 | 0.754545 |
f771c7e4a98e8ac149ba9b90312e539fde18c958 | 340 | yaml | YAML | yamls/mysql/secret_release-name-mysql.yaml | jmnote/kubeyaml | 675b07a90d2295f697e89294dd31030943836a0d | [
"Apache-2.0"
] | 1 | 2022-01-28T16:03:48.000Z | 2022-01-28T16:03:48.000Z | yamls/mysql/secret_release-name-mysql.yaml | jmnote/kubeyaml | 675b07a90d2295f697e89294dd31030943836a0d | [
"Apache-2.0"
] | null | null | null | yamls/mysql/secret_release-name-mysql.yaml | jmnote/kubeyaml | 675b07a90d2295f697e89294dd31030943836a0d | [
"Apache-2.0"
] | 1 | 2022-02-15T07:57:28.000Z | 2022-02-15T07:57:28.000Z | apiVersion: v1
data:
mysql-password: enkwQm9XcGN3bQ==
mysql-root-password: YUFFRlNFWmtYMg==
kind: Secret
metadata:
labels:
app.kubernetes.io/instance: RELEASE-NAME
app.kubernetes.io/managed-by: Helm
app.kubernetes.io/name: mysql
helm.sh/chart: mysql-8.8.23
name: RELEASE-NAME-mysql
namespace: default
type: Opaque
| 22.666667 | 44 | 0.735294 |
f771f55194361e075d6daeeb62e2caf8c7abfe6e | 487 | yaml | YAML | deploy/validatingwebhook.yaml | hoseazhai/admission-registry | 1399d8e961acf411ad953ed3d9720fcc26d87039 | [
"Apache-2.0"
] | null | null | null | deploy/validatingwebhook.yaml | hoseazhai/admission-registry | 1399d8e961acf411ad953ed3d9720fcc26d87039 | [
"Apache-2.0"
] | null | null | null | deploy/validatingwebhook.yaml | hoseazhai/admission-registry | 1399d8e961acf411ad953ed3d9720fcc26d87039 | [
"Apache-2.0"
] | null | null | null | apiVersion: admissionregistration.k8s.io/v1
kind: ValidatingWebhookConfiguration
metadata:
name: admission-registry
webhooks:
- name: io.ydzs.admission-registry
rules:
- apiGroups: [""]
apiVersions: ["v1"]
operations: ["CREATE"]
resources: ["pods"]
clientConfig:
service:
namespace: default
name: admission-registry
path: "/validate"
caBundle: ""
admissionReviewVersions: ["v1"]
sideEffects: None | 25.631579 | 43 | 0.632444 |
f7725276b2aba2eebfec87d9eb9e2e7f1c73a125 | 558 | yaml | YAML | openshift/gitops/manifests/rfe/rbac/base/rfe-automation-role.yaml | sabre1041/rhel-edge-automation-arch | 12b6ba214f754b9d63cabec0a5be9b552f03f4ec | [
"Apache-2.0"
] | null | null | null | openshift/gitops/manifests/rfe/rbac/base/rfe-automation-role.yaml | sabre1041/rhel-edge-automation-arch | 12b6ba214f754b9d63cabec0a5be9b552f03f4ec | [
"Apache-2.0"
] | null | null | null | openshift/gitops/manifests/rfe/rbac/base/rfe-automation-role.yaml | sabre1041/rhel-edge-automation-arch | 12b6ba214f754b9d63cabec0a5be9b552f03f4ec | [
"Apache-2.0"
] | null | null | null | apiVersion: rbac.authorization.k8s.io/v1
kind: Role
metadata:
name: rfe-automation
namespace: rfe
rules:
- apiGroups:
- ""
resources:
- pods
- services
- secrets
verbs:
- list
- get
- apiGroups:
- ""
resources:
- pods/exec
verbs:
- update
- create
- apiGroups:
- kubevirt.io
resources:
- virtualmachineinstances
verbs:
- get
- list
- apiGroups:
- route.openshift.io
resources:
- routes
verbs:
- get
- list
| 15.081081 | 40 | 0.521505 |
f772722801056d1de12745304ec0e4728f438e1c | 382 | yml | YAML | mydeploy.yml | nagendra464/project | ef605ebd68731b8de015a4f87d6fde84d7661b0b | [
"MIT"
] | null | null | null | mydeploy.yml | nagendra464/project | ef605ebd68731b8de015a4f87d6fde84d7661b0b | [
"MIT"
] | null | null | null | mydeploy.yml | nagendra464/project | ef605ebd68731b8de015a4f87d6fde84d7661b0b | [
"MIT"
] | null | null | null | apiVersion: apps/v1
kind: Deployment
metadata:
name: myjavaapp-deploy
labels:
app: myjavaapp
spec:
replicas: 2
selector:
matchLabels:
app: myjavaapp
template:
metadata:
labels:
app: myjavaapp
spec:
containers:
- name: myjavaapp-container
image: nagendra464/deployimage:1
ports:
- containerPort: 8080
| 17.363636 | 40 | 0.625654 |
f7729c0b1adc99a588b5a05ad927c31c7b9a5163 | 475 | yaml | YAML | namespaces/live-1.cloud-platform.service.justice.gov.uk/demo-app/00-namespace.yaml | umaar/cloud-platform-environments | c0fab9757b5fe340998457e182424ac1027b7c5f | [
"MIT"
] | null | null | null | namespaces/live-1.cloud-platform.service.justice.gov.uk/demo-app/00-namespace.yaml | umaar/cloud-platform-environments | c0fab9757b5fe340998457e182424ac1027b7c5f | [
"MIT"
] | null | null | null | namespaces/live-1.cloud-platform.service.justice.gov.uk/demo-app/00-namespace.yaml | umaar/cloud-platform-environments | c0fab9757b5fe340998457e182424ac1027b7c5f | [
"MIT"
] | null | null | null | apiVersion: v1
kind: Namespace
metadata:
name: demo-app
labels:
cloud-platform.justice.gov.uk/is-production: "false"
cloud-platform.justice.gov.uk/environment-name: "prod"
annotations:
cloud-platform.justice.gov.uk/business-unit: "cloud-platform"
cloud-platform.justice.gov.uk/application: "demo-app"
cloud-platform.justice.gov.uk/owner: "cloud-platform: oliver.anwyll@digital.justice.gov.uk"
cloud-platform.justice.gov.uk/source-code: "github"
| 36.538462 | 95 | 0.747368 |
f772cd5f63053f8cc30e6515e0d3bbd0f94e8c0f | 421 | yaml | YAML | kubernetes/70-hvpa-deployment.yaml | timuthy/hvpa-controller | 531ed4269a58f51bc7e5ab2ca17d0871cd8a6e53 | [
"Apache-2.0"
] | 30 | 2019-05-13T06:32:39.000Z | 2021-11-12T07:51:34.000Z | kubernetes/70-hvpa-deployment.yaml | timuthy/hvpa-controller | 531ed4269a58f51bc7e5ab2ca17d0871cd8a6e53 | [
"Apache-2.0"
] | 43 | 2019-07-15T10:05:16.000Z | 2022-03-31T14:31:49.000Z | kubernetes/70-hvpa-deployment.yaml | timuthy/hvpa-controller | 531ed4269a58f51bc7e5ab2ca17d0871cd8a6e53 | [
"Apache-2.0"
] | 14 | 2019-05-11T05:44:16.000Z | 2022-03-24T14:24:06.000Z | apiVersion: apps/v1
kind: Deployment
metadata:
name: hvpa-controller
namespace: system
spec:
replicas: 1
selector:
matchLabels:
controller: hvpa
template:
metadata:
labels:
controller: hvpa
spec:
containers:
- image: ggaurav10/hvpa-controller:latest
name: hvpa-manager
command:
- ./manager
- --logtostderr=true
- --v=2
| 17.541667 | 47 | 0.586698 |
f772cf232fec09b2fe98c39bbcf5c645c27f6558 | 300 | yaml | YAML | kubernetes/step03_ingress/app2-deploy.yaml | maximilianou/weekly49 | 15e7ce4ca664e8ba7d3c8108c86579c9e163ff51 | [
"MIT"
] | null | null | null | kubernetes/step03_ingress/app2-deploy.yaml | maximilianou/weekly49 | 15e7ce4ca664e8ba7d3c8108c86579c9e163ff51 | [
"MIT"
] | null | null | null | kubernetes/step03_ingress/app2-deploy.yaml | maximilianou/weekly49 | 15e7ce4ca664e8ba7d3c8108c86579c9e163ff51 | [
"MIT"
] | null | null | null | apiVersion: apps/v1
kind: Deployment
metadata:
labels:
app: app2
name: app2
namespace: app2-ns
spec:
replicas: 1
selector:
matchLabels:
app: app2
template:
metadata:
labels:
app: app2
spec:
containers:
- image: nginx
name: app2
| 14.285714 | 22 | 0.58 |
f773281c4fee50a2a70f9f44ab9b75c884a54dc9 | 197 | yaml | YAML | tests/stacks/aws/test_data/expected/~g_v1_serviceaccount_alb-ingress-controller.yaml | pathologywatch/manifests | 622a1974ef841406b45bd3ae51ba507cbaf4bf89 | [
"Apache-2.0"
] | 376 | 2019-02-27T01:32:34.000Z | 2022-03-29T14:02:39.000Z | tests/stacks/aws/test_data/expected/~g_v1_serviceaccount_alb-ingress-controller.yaml | pathologywatch/manifests | 622a1974ef841406b45bd3ae51ba507cbaf4bf89 | [
"Apache-2.0"
] | 2,171 | 2019-02-27T17:37:34.000Z | 2022-03-31T18:16:26.000Z | tests/stacks/aws/test_data/expected/~g_v1_serviceaccount_alb-ingress-controller.yaml | pathologywatch/manifests | 622a1974ef841406b45bd3ae51ba507cbaf4bf89 | [
"Apache-2.0"
] | 643 | 2019-02-27T01:49:11.000Z | 2022-03-31T06:31:15.000Z | apiVersion: v1
kind: ServiceAccount
metadata:
labels:
app: aws-alb-ingress-controller
kustomize.component: aws-alb-ingress-controller
name: alb-ingress-controller
namespace: kubeflow
| 21.888889 | 51 | 0.771574 |
f77389720d5b0b223320309d8f4627fc30f6f7f7 | 254 | yaml | YAML | vagrantProvision/yaml/pvc_nfs.yaml | StevenJDH/Qlik-Sense-On-Kubernetes | 0756f522bb43cffe08556c7aaf3f27d7774726b3 | [
"MIT"
] | 1 | 2019-11-28T07:46:58.000Z | 2019-11-28T07:46:58.000Z | vagrantProvision/yaml/pvc_nfs.yaml | StevenJDH/Qlik-Sense-On-Kubernetes | 0756f522bb43cffe08556c7aaf3f27d7774726b3 | [
"MIT"
] | null | null | null | vagrantProvision/yaml/pvc_nfs.yaml | StevenJDH/Qlik-Sense-On-Kubernetes | 0756f522bb43cffe08556c7aaf3f27d7774726b3 | [
"MIT"
] | null | null | null | kind: PersistentVolumeClaim
apiVersion: v1
metadata:
name: pvc-qse
annotations:
volume.beta.kubernetes.io/storage-class: localnfs
spec:
storageClassName: localnfs
accessModes:
- ReadWriteMany
resources:
requests:
storage: 1Gi
| 18.142857 | 53 | 0.73622 |
f773e4dff8afbb8dd7cb36d63c0251e24f84aa54 | 518 | yaml | YAML | ingress-nginx/nginx-configuration.yaml | AlteroSMART/memo | 43a02d9f8e649bbcc91103933e9df2e73fe53300 | [
"MIT"
] | null | null | null | ingress-nginx/nginx-configuration.yaml | AlteroSMART/memo | 43a02d9f8e649bbcc91103933e9df2e73fe53300 | [
"MIT"
] | null | null | null | ingress-nginx/nginx-configuration.yaml | AlteroSMART/memo | 43a02d9f8e649bbcc91103933e9df2e73fe53300 | [
"MIT"
] | null | null | null | kind: ConfigMap
apiVersion: v1
metadata:
name: nginx-configuration
namespace: ingress-nginx
labels:
app.kubernetes.io/name: ingress-nginx
app.kubernetes.io/part-of: ingress-nginx
data:
enable-brotli: "true"
map-hash-bucket-size: "256"
proxy-body-size: "50m"
proxy-buffer-size: "8k"
proxy-buffers: "4 8k"
proxy-connect-timeout: "2"
ssl-protocols: "TLSv1.3 TLSv1.2"
ssl-early-data: "true"
enable-real-ip: "true"
forwarded-for-header: "X-Forwarded-For"
proxy-real-ip-cidr: "0.0.0.0/0"
| 24.666667 | 44 | 0.696911 |
f77496048e436c25c58ccf14302c4855db2e53a8 | 144 | yaml | YAML | built-in-references/Kubernetes/perf/violations/violation7005.yaml | sw47/azure-policy | 4a38e4cb4047b5364902653f0defe45f1b21bc61 | [
"MIT"
] | null | null | null | built-in-references/Kubernetes/perf/violations/violation7005.yaml | sw47/azure-policy | 4a38e4cb4047b5364902653f0defe45f1b21bc61 | [
"MIT"
] | null | null | null | built-in-references/Kubernetes/perf/violations/violation7005.yaml | sw47/azure-policy | 4a38e4cb4047b5364902653f0defe45f1b21bc61 | [
"MIT"
] | null | null | null | apiVersion: v1
kind: Pod
metadata:
name: image-demo-7005
spec:
containers:
- name: nginx
image: nginx #ritaacr.azurecr.io/nginx:latest | 18 | 49 | 0.722222 |
f774ce5595a532f1f2d2c6c22de6c8b7bea723e7 | 466 | yaml | YAML | config-root/namespaces/server1/jenkins/jenkins-sa.yaml | borderx/jx3-minikube | 0347fd946219541eda8f2930362d1d6b3340b7a4 | [
"Apache-2.0"
] | null | null | null | config-root/namespaces/server1/jenkins/jenkins-sa.yaml | borderx/jx3-minikube | 0347fd946219541eda8f2930362d1d6b3340b7a4 | [
"Apache-2.0"
] | 14 | 2022-01-29T07:38:26.000Z | 2022-01-30T03:36:58.000Z | config-root/namespaces/server1/jenkins/jenkins-sa.yaml | borderx/jx3-minikube | 0347fd946219541eda8f2930362d1d6b3340b7a4 | [
"Apache-2.0"
] | null | null | null | # Source: jenkins/templates/service-account.yaml
apiVersion: v1
kind: ServiceAccount
metadata:
name: jenkins
namespace: server1
labels:
"app.kubernetes.io/name": 'jenkins'
"helm.sh/chart": "jenkins-3.11.3"
"app.kubernetes.io/managed-by": "Helm"
"app.kubernetes.io/instance": "jenkins"
"app.kubernetes.io/component": "jenkins-controller"
gitops.jenkins-x.io/pipeline: 'namespaces'
annotations:
meta.helm.sh/release-name: 'jenkins'
| 29.125 | 55 | 0.7103 |
f774f7a016eb8ff1d0c39b3b6eb9b25f4c0d49e5 | 1,385 | yaml | YAML | manifests/deployment.yaml | shashankbarsin/azch-captureorder | b760b15839f99fdd0c6cbe1efaaafb9a8221c1f2 | [
"MIT"
] | null | null | null | manifests/deployment.yaml | shashankbarsin/azch-captureorder | b760b15839f99fdd0c6cbe1efaaafb9a8221c1f2 | [
"MIT"
] | null | null | null | manifests/deployment.yaml | shashankbarsin/azch-captureorder | b760b15839f99fdd0c6cbe1efaaafb9a8221c1f2 | [
"MIT"
] | null | null | null | apiVersion: apps/v1
kind: Deployment
metadata:
name: captureorder
spec:
selector:
matchLabels:
app: captureorder
replicas: 2
template:
metadata:
labels:
app: captureorder
spec:
containers:
- name: captureorder
image: shasbdois.azurecr.io/captureorder:placeholdertag
imagePullPolicy: Always
readinessProbe:
httpGet:
port: 8080
path: /healthz
livenessProbe:
httpGet:
port: 8080
path: /healthz
resources:
requests:
memory: "64Mi"
cpu: "100m"
limits:
memory: "128Mi"
cpu: "500m"
env:
- name: TEAMNAME
value: 'team-azch' # will be patched at deployment time by value of 'teamName' in the variable group
- name: MONGOHOST
valueFrom:
secretKeyRef:
name: mongodb
key: mongoHost
- name: MONGOUSER
valueFrom:
secretKeyRef:
name: mongodb
key: mongoUser
- name: MONGOPASSWORD
valueFrom:
secretKeyRef:
name: mongodb
key: mongoPassword
ports:
- containerPort: 80
| 25.648148 | 112 | 0.480866 |
f7752b877bb76dc901dedea5421cefad30b7ca4b | 278 | yml | YAML | dory/doryd-intro/sc-from-production.yml | NimbleStorage/container-examples | b97ad1cde30bbaa798974a05de3e4dee713f52de | [
"Apache-2.0"
] | 6 | 2019-08-22T17:45:07.000Z | 2020-07-10T08:16:39.000Z | dory/doryd-intro/sc-from-production.yml | drajen/container-examples | ccf23c68e0de0160d34a9db95b9dde73da0322d8 | [
"Apache-2.0"
] | null | null | null | dory/doryd-intro/sc-from-production.yml | drajen/container-examples | ccf23c68e0de0160d34a9db95b9dde73da0322d8 | [
"Apache-2.0"
] | 3 | 2018-10-01T20:52:13.000Z | 2019-11-15T04:49:56.000Z | ---
kind: StorageClass
apiVersion: storage.k8s.io/v1
metadata:
name: from-production
provisioner: dev.hpe.com/nimble
parameters:
description: "Clone from production database."
cloneOf: "transactionaldb-26063d7f-d7f2-11e7-8f86-000c291bed2c"
snapshot: "nightly-locktables"
| 25.272727 | 65 | 0.78777 |
f77565d498b7d999d4efd88457930e537a6b86d7 | 436 | yaml | YAML | beginner/attendee-resources/workshop-03b/rabbitmq-svc.yaml | dbartalos/training-jetstack-kubernetes | a374d847540a03a385686c8fdbfee2790dcfe7f8 | [
"MIT"
] | null | null | null | beginner/attendee-resources/workshop-03b/rabbitmq-svc.yaml | dbartalos/training-jetstack-kubernetes | a374d847540a03a385686c8fdbfee2790dcfe7f8 | [
"MIT"
] | null | null | null | beginner/attendee-resources/workshop-03b/rabbitmq-svc.yaml | dbartalos/training-jetstack-kubernetes | a374d847540a03a385686c8fdbfee2790dcfe7f8 | [
"MIT"
] | null | null | null | ---
# Modified from https://github.com/microservices-demo/microservices-demo
# Please see this repository for the original
apiVersion: v1
kind: Service
metadata:
name: rabbitmq
labels:
name: rabbitmq
spec:
ports:
# the port that this service should serve on
- port: 5672
name: rabbitmq
targetPort: 5672
- port: 9090
name: exporter
targetPort: exporter
protocol: TCP
selector:
name: rabbitmq
| 18.956522 | 72 | 0.699541 |
f7757e2bc6cadee959a1a9075df3da1dce27de0e | 741 | yaml | YAML | manifests/05_Pods/05-08_kuard-pod-vol-nfs_a.yaml | ttarczynski/kubernetes-101-workshop | ed30cdd109d70a71662e15e9e2927e9a26e647e1 | [
"Apache-2.0"
] | 6 | 2018-04-03T10:18:17.000Z | 2021-05-30T01:34:36.000Z | manifests/05_Pods/05-08_kuard-pod-vol-nfs_a.yaml | ttarczynski/kubernetes-101-workshop | ed30cdd109d70a71662e15e9e2927e9a26e647e1 | [
"Apache-2.0"
] | null | null | null | manifests/05_Pods/05-08_kuard-pod-vol-nfs_a.yaml | ttarczynski/kubernetes-101-workshop | ed30cdd109d70a71662e15e9e2927e9a26e647e1 | [
"Apache-2.0"
] | 1 | 2018-07-21T17:29:39.000Z | 2018-07-21T17:29:39.000Z | apiVersion: v1
kind: Pod
metadata:
name: kuard-a
spec:
volumes:
- name: "kuard-data"
nfs:
server: ks101
path: "/var/export"
containers:
- image: gcr.io/kuar-demo/kuard-amd64:1
name: kuard-a
volumeMounts:
- mountPath: "/data"
name: "kuard-data"
resources:
requests:
cpu: "600m"
memory: "128Mi"
limits:
cpu: "1000m"
memory: "256Mi"
livenessProbe:
httpGet:
path: /healthy
port: 8080
initialDelaySeconds: 5
timeoutSeconds: 1
periodSeconds: 10
failureThreshold: 3
ports:
- containerPort: 8080
name: http
protocol: TCP
| 20.583333 | 43 | 0.51552 |
f7769fbc95e80196efb92deb6a5a48734cd9b64c | 2,020 | yaml | YAML | hashicorp/vault/injector/injector-deployment.yaml | kumarshivam12/cicd-pileline | 8aaef55e7e13f5e4c9e12695af67af3b3706cd90 | [
"MIT"
] | null | null | null | hashicorp/vault/injector/injector-deployment.yaml | kumarshivam12/cicd-pileline | 8aaef55e7e13f5e4c9e12695af67af3b3706cd90 | [
"MIT"
] | null | null | null | hashicorp/vault/injector/injector-deployment.yaml | kumarshivam12/cicd-pileline | 8aaef55e7e13f5e4c9e12695af67af3b3706cd90 | [
"MIT"
] | null | null | null | apiVersion: apps/v1
kind: Deployment
metadata:
name: vault-example-agent-injector
labels:
app.kubernetes.io/name: vault-example-agent-injector
component: webhook
spec:
replicas: 1
selector:
matchLabels:
app.kubernetes.io/name: vault-example-agent-injector
component: webhook
template:
metadata:
labels:
app.kubernetes.io/name: vault-example-agent-injector
component: webhook
spec:
serviceAccountName: vault-example-agent-injector
securityContext:
runAsNonRoot: true
runAsGroup: 1000
runAsUser: 100
containers:
- name: sidecar-injector
image: "hashicorp/vault-k8s:0.1.2"
imagePullPolicy: IfNotPresent
env:
- name: AGENT_INJECT_LISTEN
value: ":8080"
- name: AGENT_INJECT_LOG_LEVEL
value: "info"
- name: AGENT_INJECT_VAULT_ADDR
value: https://vault-example.vault-example.svc:8200
- name: AGENT_INJECT_VAULT_IMAGE
value: "vault:1.3.1"
- name: AGENT_INJECT_TLS_AUTO
value: vault-example-agent-injector-cfg
- name: AGENT_INJECT_TLS_AUTO_HOSTS
value: vault-example-agent-injector-svc,vault-example-agent-injector-svc.vault-example,vault-example-agent-injector-svc.vault-example.svc
args:
- agent-inject
- 2>&1
livenessProbe:
httpGet:
path: /health/ready
port: 8080
scheme: HTTPS
failureThreshold: 2
initialDelaySeconds: 1
periodSeconds: 2
successThreshold: 1
timeoutSeconds: 5
readinessProbe:
httpGet:
path: /health/ready
port: 8080
scheme: HTTPS
failureThreshold: 2
initialDelaySeconds: 2
periodSeconds: 2
successThreshold: 1
timeoutSeconds: 5
| 31.076923 | 151 | 0.578218 |
f776b6a69b8e482aa9cd2e46a7f828f73d47094d | 1,176 | yaml | YAML | config/common/webhook/mutatingwebhookconfiguration.yaml | toszr/dynatrace-operator | 74a9f23304f0aa6446abdc34a6e7df56dd5c4627 | [
"Apache-2.0"
] | null | null | null | config/common/webhook/mutatingwebhookconfiguration.yaml | toszr/dynatrace-operator | 74a9f23304f0aa6446abdc34a6e7df56dd5c4627 | [
"Apache-2.0"
] | null | null | null | config/common/webhook/mutatingwebhookconfiguration.yaml | toszr/dynatrace-operator | 74a9f23304f0aa6446abdc34a6e7df56dd5c4627 | [
"Apache-2.0"
] | null | null | null | apiVersion: admissionregistration.k8s.io/v1
kind: MutatingWebhookConfiguration
metadata:
name: dynatrace-webhook
labels:
dynatrace.com/operator: dynakube
internal.dynatrace.com/component: webhook
webhooks:
- name: webhook.pod.dynatrace.com
reinvocationPolicy: IfNeeded
rules:
- apiGroups: [ "" ]
apiVersions: [ "v1" ]
operations: [ "CREATE" ]
resources: [ "pods" ]
scope: Namespaced
namespaceSelector:
matchExpressions:
- key: dynakube.dynatrace.com/instance
operator: Exists
clientConfig:
service:
name: dynatrace-webhook
namespace: dynatrace
path: /inject
admissionReviewVersions: [ "v1beta1", "v1" ]
sideEffects: None
- name: webhook.ns.dynatrace.com
reinvocationPolicy: IfNeeded
rules:
- apiGroups: [ "" ]
apiVersions: [ "v1" ]
operations: [ "CREATE", "UPDATE"]
resources: [ "namespaces" ]
scope: Cluster
clientConfig:
service:
name: dynatrace-webhook
namespace: dynatrace
path: /label-ns
admissionReviewVersions: [ "v1beta1", "v1" ]
sideEffects: None
| 27.348837 | 48 | 0.626701 |
f7770499e2055fd01ae8517e54eb6214d0135382 | 77 | yaml | YAML | infrastructure/manifests/namespace.yaml | brendan-travis/api-playground | b154bc3ba8f7d12636f8d85d128178d036e2f3d3 | [
"MIT"
] | null | null | null | infrastructure/manifests/namespace.yaml | brendan-travis/api-playground | b154bc3ba8f7d12636f8d85d128178d036e2f3d3 | [
"MIT"
] | null | null | null | infrastructure/manifests/namespace.yaml | brendan-travis/api-playground | b154bc3ba8f7d12636f8d85d128178d036e2f3d3 | [
"MIT"
] | null | null | null | kind: Namespace
apiVersion: v1
metadata:
name: api
labels:
name: api
| 11 | 15 | 0.688312 |
f7775adfd503dd617bd87babed73d21dcd48e53c | 425 | yaml | YAML | manifests/goapp.yaml | kenji-kk/cicd-handson-2021-code | bfd937757e68c1c1f8ed5b75b6edc52a9726246c | [
"MIT"
] | null | null | null | manifests/goapp.yaml | kenji-kk/cicd-handson-2021-code | bfd937757e68c1c1f8ed5b75b6edc52a9726246c | [
"MIT"
] | null | null | null | manifests/goapp.yaml | kenji-kk/cicd-handson-2021-code | bfd937757e68c1c1f8ed5b75b6edc52a9726246c | [
"MIT"
] | null | null | null | apiVersion: apps/v1
kind: Deployment
metadata:
name: goapp-deployment
spec:
selector:
matchLabels:
app: goapp
template:
metadata:
labels:
app: goapp
spec:
containers:
- name: goapp
image: docker.pkg.github.com/kenji-kk/cicd-handson-2021-code/go-image:base
ports:
- containerPort: 9090
imagePullSecrets:
- name: dockerconfigjson-github-com
| 20.238095 | 82 | 0.630588 |
f7779749a008403e9613437537a8bddc49e0917d | 226 | yaml | YAML | manifests/office/onlyoffice-service.yaml | eluminare/fleet-apps | 1cdd24ff58817d92a77d1f4f3d5a180764bc24d9 | [
"Apache-2.0"
] | null | null | null | manifests/office/onlyoffice-service.yaml | eluminare/fleet-apps | 1cdd24ff58817d92a77d1f4f3d5a180764bc24d9 | [
"Apache-2.0"
] | null | null | null | manifests/office/onlyoffice-service.yaml | eluminare/fleet-apps | 1cdd24ff58817d92a77d1f4f3d5a180764bc24d9 | [
"Apache-2.0"
] | null | null | null | ---
apiVersion: v1
kind: Service
metadata:
name: office
annotations:
traefik.backend.circuitbreaker: "NetworkErrorRatio() > 0.5"
spec:
ports:
- name: http
targetPort: 80
port: 80
selector:
app: office | 16.142857 | 63 | 0.668142 |
f777ba27724b317f84ef16b1db6baa49bdb5135b | 1,450 | yaml | YAML | vendor/k8s.io/ingress/examples/udp/nginx/nginx-udp-ingress-controller.yaml | derkoe/alb-ingress-controller | 03cf52c2c7c0d21cf9685cc29aebec2bc02fb550 | [
"Apache-2.0"
] | 1 | 2020-01-22T10:54:58.000Z | 2020-01-22T10:54:58.000Z | vendor/k8s.io/ingress/examples/udp/nginx/nginx-udp-ingress-controller.yaml | derkoe/alb-ingress-controller | 03cf52c2c7c0d21cf9685cc29aebec2bc02fb550 | [
"Apache-2.0"
] | null | null | null | vendor/k8s.io/ingress/examples/udp/nginx/nginx-udp-ingress-controller.yaml | derkoe/alb-ingress-controller | 03cf52c2c7c0d21cf9685cc29aebec2bc02fb550 | [
"Apache-2.0"
] | 1 | 2020-05-03T05:40:19.000Z | 2020-05-03T05:40:19.000Z | apiVersion: v1
kind: ReplicationController
metadata:
name: nginx-udp-ingress-controller
labels:
k8s-app: nginx-udp-ingress-lb
namespace: kube-system
spec:
replicas: 1
selector:
k8s-app: nginx-udp-ingress-lb
template:
metadata:
labels:
k8s-app: nginx-udp-ingress-lb
name: nginx-udp-ingress-lb
spec:
terminationGracePeriodSeconds: 60
containers:
- image: gcr.io/google_containers/nginx-ingress-controller:0.9.0-beta.13
name: nginx-udp-ingress-lb
readinessProbe:
httpGet:
path: /healthz
port: 10254
scheme: HTTP
livenessProbe:
httpGet:
path: /healthz
port: 10254
scheme: HTTP
initialDelaySeconds: 10
timeoutSeconds: 1
env:
- name: POD_NAME
valueFrom:
fieldRef:
fieldPath: metadata.name
- name: POD_NAMESPACE
valueFrom:
fieldRef:
fieldPath: metadata.namespace
ports:
- containerPort: 80
hostPort: 80
- containerPort: 443
hostPort: 443
- containerPort: 9001
hostPort: 9001
args:
- /nginx-ingress-controller
- --default-backend-service=$(POD_NAMESPACE)/default-http-backend
- --udp-services-configmap=$(POD_NAMESPACE)/nginx-udp-ingress-configmap
| 26.851852 | 79 | 0.570345 |
f77816870fd0c5c00c12d9a282f153a63bd4986f | 340 | yaml | YAML | install/kubernetes/consul/configmap.yaml | sjclijie/kplcloud | c28b7cd11a462ad051019d0a6f844c0093a405d2 | [
"Apache-2.0"
] | 660 | 2019-07-03T10:41:35.000Z | 2022-03-19T08:07:25.000Z | install/kubernetes/consul/configmap.yaml | sjclijie/kplcloud | c28b7cd11a462ad051019d0a6f844c0093a405d2 | [
"Apache-2.0"
] | 4 | 2019-12-30T12:07:31.000Z | 2021-08-16T01:29:12.000Z | install/kubernetes/consul/configmap.yaml | sjclijie/kplcloud | c28b7cd11a462ad051019d0a6f844c0093a405d2 | [
"Apache-2.0"
] | 206 | 2019-08-01T10:58:33.000Z | 2022-03-15T15:05:08.000Z | # StatefulSet to run the actual Consul server cluster.
apiVersion: v1
kind: ConfigMap
metadata:
name: consul-server-config
labels:
app: consul
data:
extra-from-values.json: "{\"acl_master_token\": \"2a8073a8-5c91-3d2c-871a-bbbeb030d1f6\",\"acl_datacenter\":\"dc1\",\"acl_default_policy\":\"allow\",\"acl_down_policy\":\"allow\"}"
| 34 | 182 | 0.720588 |
f77820a371a6b9f8291d5a2305b69d04a8fbae2a | 195 | yaml | YAML | docs/examples/dev/volumesnapshot/storageclass.yaml | endrec/stash-docs | 0473e7fe9cd9b814715acc10f7c978c7244ce475 | [
"Apache-2.0"
] | null | null | null | docs/examples/dev/volumesnapshot/storageclass.yaml | endrec/stash-docs | 0473e7fe9cd9b814715acc10f7c978c7244ce475 | [
"Apache-2.0"
] | null | null | null | docs/examples/dev/volumesnapshot/storageclass.yaml | endrec/stash-docs | 0473e7fe9cd9b814715acc10f7c978c7244ce475 | [
"Apache-2.0"
] | null | null | null | apiVersion: storage.k8s.io/v1
kind: StorageClass
metadata:
name: standard
parameters:
type: pd-standard
provisioner: pd.csi.storage.gke.io
reclaimPolicy: Delete
volumeBindingMode: Immediate
| 17.727273 | 34 | 0.805128 |
f77856dadd67c7d089f677fc5eabc80c22b3e51d | 1,481 | yaml | YAML | k8/deployment_fng.yaml | acalles/fungus | 906ef2974ea30a9392b1c36a6073de347bee86c9 | [
"Apache-2.0"
] | null | null | null | k8/deployment_fng.yaml | acalles/fungus | 906ef2974ea30a9392b1c36a6073de347bee86c9 | [
"Apache-2.0"
] | null | null | null | k8/deployment_fng.yaml | acalles/fungus | 906ef2974ea30a9392b1c36a6073de347bee86c9 | [
"Apache-2.0"
] | null | null | null | # This YAML exposes the fields defined in the UI. It can be edited directly or have new YAML pasted in.
# Not all available Kubernetes properties are recognized by the form exposed in the UI, and unrecognized properties are ignored during import.
# If the required properties are not supported by this step, the 'Deploy raw Kubernetes YAML' step can be used to deploy YAML directly to Kubernetes, and supports all properties.
apiVersion: apps/v1
kind: Deployment
metadata:
name: fungusappdeployment
labels:
appgungus: api
spec:
selector:
matchLabels:
octopusexport: OctopusExport
revisionHistoryLimit: 2
replicas: 1
progressDeadlineSeconds: 90
strategy:
type: RollingUpdate
rollingUpdate:
maxUnavailable: 1
maxSurge: 1
template:
metadata:
labels:
appgungus: api
octopusexport: OctopusExport
spec:
terminationGracePeriodSeconds: 30
containers:
- name: nginx
image: nginx
ports:
- containerPort: 80
securityContext:
runAsNonRoot: true
affinity:
podAntiAffinity:
preferredDuringSchedulingIgnoredDuringExecution:
- weight: 100
podAffinityTerm:
labelSelector:
matchExpressions:
- key: app
operator: In
values:
- web
topologyKey: kubernetes.io/hostname
| 30.854167 | 178 | 0.634706 |
f778ab7c1b56ec50f41c90bb40fc41fbead6ae44 | 474 | yaml | YAML | manifests/03-metrics-service.yaml | KodieGlosserIBM/cluster-machine-approver | 0f3f77132e57f7acb8ddeb319b2091e5ae7688bc | [
"Apache-2.0"
] | null | null | null | manifests/03-metrics-service.yaml | KodieGlosserIBM/cluster-machine-approver | 0f3f77132e57f7acb8ddeb319b2091e5ae7688bc | [
"Apache-2.0"
] | null | null | null | manifests/03-metrics-service.yaml | KodieGlosserIBM/cluster-machine-approver | 0f3f77132e57f7acb8ddeb319b2091e5ae7688bc | [
"Apache-2.0"
] | null | null | null | apiVersion: v1
kind: Service
metadata:
name: machine-approver
namespace: openshift-cluster-machine-approver
annotations:
service.alpha.openshift.io/serving-cert-secret-name: machine-approver-tls
exclude.release.openshift.io/internal-openshift-hosted: "true"
labels:
app: machine-approver
spec:
type: ClusterIP
clusterIP: None
ports:
- name: https
port: 9192
targetPort: https
selector:
app: machine-approver
sessionAffinity: None
| 22.571429 | 77 | 0.740506 |
f778e7fb7804e24af2e2f5869b7030560c227966 | 763 | yaml | YAML | workloads/Pods/volumes/emptyDir/emptyDirs.yaml | hwakabh/ckad-manifests | 395b8a883d0b7387281c6a751b651abd65c28e47 | [
"MIT"
] | null | null | null | workloads/Pods/volumes/emptyDir/emptyDirs.yaml | hwakabh/ckad-manifests | 395b8a883d0b7387281c6a751b651abd65c28e47 | [
"MIT"
] | 9 | 2020-02-09T14:26:39.000Z | 2020-03-15T08:06:31.000Z | workloads/Pods/volumes/emptyDir/emptyDirs.yaml | hwakabh/k8s-manifests | 395b8a883d0b7387281c6a751b651abd65c28e47 | [
"MIT"
] | null | null | null | ---
apiVersion: v1
kind: Pod
metadata:
name: busybox
spec:
volumes:
- name: myvolume1
emptyDir: {}
- name: myvolume2
emptyDir: {}
containers:
- name: busybox1
image: busybox:latest
command:
- /bin/sh
- -c
- 'sleep 600'
volumeMounts:
- mountPath: /foo
name: myvolume1
- name: busybox2
image: busybox:latest
command:
- /bin/sh
- -c
- 'sleep 600'
volumeMounts:
- mountPath: /bar
name: myvolume2
# kubectl exec -it busybox -c busybox1 -- /bin/sh
# df -h
# ls -al /foo
# touch /foo/busybox1
# ls -al /foo/busybox1
# exit
# kubectl exec -it busybox -c busybox2 -- /bin/sh
# df -h
# ls -al /bar
# touch /bar/busybox2
# ls -al /bar/busybox*
# exit
| 17.340909 | 49 | 0.568807 |
f779491f13521b51f155648deb78e2cda0d7d671 | 368 | yaml | YAML | Cloud Developer Nanodegree/P3 - Refactor Udagram app into Microservices and Deploy/udacity-c3-deployment/k8s/pod-example/pod.yaml | vkbhandare/Udacity-1 | da3e5df92857421609f9ed101e029c6d533cbb72 | [
"MIT"
] | 149 | 2017-01-14T09:54:05.000Z | 2022-03-06T20:55:08.000Z | Cloud Developer Nanodegree/P3 - Refactor Udagram app into Microservices and Deploy/udacity-c3-deployment/k8s/pod-example/pod.yaml | vkbhandare/Udacity-1 | da3e5df92857421609f9ed101e029c6d533cbb72 | [
"MIT"
] | 9 | 2017-10-05T23:21:50.000Z | 2022-02-13T13:39:07.000Z | Cloud Developer Nanodegree/P3 - Refactor Udagram app into Microservices and Deploy/udacity-c3-deployment/k8s/pod-example/pod.yaml | vkbhandare/Udacity-1 | da3e5df92857421609f9ed101e029c6d533cbb72 | [
"MIT"
] | 130 | 2016-12-30T07:14:29.000Z | 2022-01-03T13:05:46.000Z | apiVersion: v1
kind: Pod
metadata:
name: pod-example
spec:
containers:
- image: scheele/reverseproxy
name: reverseproxy
imagePullPolicy: Always
resources:
requests:
memory: "64Mi"
cpu: "250m"
limits:
memory: "1024Mi"
cpu: "500m"
ports:
- containerPort: 8080
restartPolicy: Always | 19.368421 | 37 | 0.586957 |
f779ac9772a04d1b4ccd4cd91978973861ad8db3 | 338 | yaml | YAML | k8s/grafana-data-sc.yaml | michal-franc/screeps-grafana | 3960273d0845ce772eb8544af99f17eff6a51b31 | [
"MIT"
] | null | null | null | k8s/grafana-data-sc.yaml | michal-franc/screeps-grafana | 3960273d0845ce772eb8544af99f17eff6a51b31 | [
"MIT"
] | null | null | null | k8s/grafana-data-sc.yaml | michal-franc/screeps-grafana | 3960273d0845ce772eb8544af99f17eff6a51b31 | [
"MIT"
] | 1 | 2021-10-31T21:03:54.000Z | 2021-10-31T21:03:54.000Z | apiVersion: storage.k8s.io/v1
kind: StorageClass
metadata:
name: openebs-sc-grafana-data
namespace: screeps
annotations:
openebs.io/cas-type: cstor
cas.openebs.io/config: |
- name: StoragePoolClaim
value: "cstor-disk-pool"
- name: ReplicaCount
value: "3"
provisioner: openebs.io/provisioner-iscsi | 26 | 41 | 0.692308 |
f779fd8c167030677e4f644b3768e99d30fe978d | 2,172 | yaml | YAML | config/prow/cluster/statusreconciler_deployment.yaml | YangLu1031/test-infra | 098c9483868afe50bbab4d93d269bf4d2c090430 | [
"Apache-2.0"
] | null | null | null | config/prow/cluster/statusreconciler_deployment.yaml | YangLu1031/test-infra | 098c9483868afe50bbab4d93d269bf4d2c090430 | [
"Apache-2.0"
] | 1 | 2021-05-21T02:33:36.000Z | 2021-05-21T05:48:11.000Z | config/prow/cluster/statusreconciler_deployment.yaml | YangLu1031/test-infra | 098c9483868afe50bbab4d93d269bf4d2c090430 | [
"Apache-2.0"
] | 2 | 2021-05-21T02:29:06.000Z | 2021-05-24T02:08:44.000Z | # Copyright 2016 The Kubernetes Authors All rights reserved.
#
# Licensed under the Apache License, Version 2.0 (the "License");
# you may not use this file except in compliance with the License.
# You may obtain a copy of the License at
#
# http://www.apache.org/licenses/LICENSE-2.0
#
# Unless required by applicable law or agreed to in writing, software
# distributed under the License is distributed on an "AS IS" BASIS,
# WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
# See the License for the specific language governing permissions and
# limitations under the License.
apiVersion: apps/v1
kind: Deployment
metadata:
namespace: default
name: statusreconciler
labels:
app: statusreconciler
spec:
replicas: 1
selector:
matchLabels:
app: statusreconciler
template:
metadata:
labels:
app: statusreconciler
spec:
serviceAccountName: statusreconciler
terminationGracePeriodSeconds: 180
containers:
- name: statusreconciler
image: gcr.io/k8s-prow/status-reconciler:v20210520-56277900f8
imagePullPolicy: Always
args:
- --dry-run=false
- --continue-on-error=true
- --plugin-config=/etc/plugins/plugins.yaml
- --config-path=/etc/config/config.yaml
- --github-token-path=/etc/github/oauth
- --github-endpoint=http://ghproxy
- --github-endpoint=https://api.github.com
- --job-config-path=/etc/job-config
- --denylist=kubernetes/kubernetes
volumeMounts:
- name: oauth
mountPath: /etc/github
readOnly: true
- name: config
mountPath: /etc/config
readOnly: true
- name: job-config
mountPath: /etc/job-config
readOnly: true
- name: plugins
mountPath: /etc/plugins
readOnly: true
volumes:
- name: oauth
secret:
secretName: oauth-token
- name: config
configMap:
name: config
- name: job-config
configMap:
name: job-config
- name: plugins
configMap:
name: plugins
| 29.351351 | 74 | 0.635359 |
f77a1b85692da2ed59f95dff98b1166ea1e0fc62 | 379 | yaml | YAML | staging/src/k8s.io/pod-security-admission/test/testdata/restricted/v1.9/fail/hostnamespaces1.yaml | 767829413/kubernetes | e3982ce472af31efe0cfb5165271c84f1ace0b0f | [
"Apache-2.0"
] | 84,910 | 2015-08-12T17:45:55.000Z | 2022-03-31T23:39:40.000Z | staging/src/k8s.io/pod-security-admission/test/testdata/restricted/v1.9/fail/hostnamespaces1.yaml | 767829413/kubernetes | e3982ce472af31efe0cfb5165271c84f1ace0b0f | [
"Apache-2.0"
] | 98,305 | 2015-08-12T17:35:13.000Z | 2022-03-31T23:46:47.000Z | staging/src/k8s.io/pod-security-admission/test/testdata/restricted/v1.9/fail/hostnamespaces1.yaml | 767829413/kubernetes | e3982ce472af31efe0cfb5165271c84f1ace0b0f | [
"Apache-2.0"
] | 36,592 | 2015-08-12T18:36:13.000Z | 2022-03-31T16:22:17.000Z | apiVersion: v1
kind: Pod
metadata:
name: hostnamespaces1
spec:
containers:
- image: k8s.gcr.io/pause
name: container1
securityContext:
allowPrivilegeEscalation: false
hostNetwork: true
initContainers:
- image: k8s.gcr.io/pause
name: initcontainer1
securityContext:
allowPrivilegeEscalation: false
securityContext:
runAsNonRoot: true
| 19.947368 | 37 | 0.728232 |
f77a4371d33928b1961cf0c560dfb92b35eab1d4 | 3,995 | yml | YAML | nexus/nexus3/kubernetes/nexus3-statefulset.yml | smthkissinger/docker-images | 35e868295d04fa780325ada4168381f1e80e8fe4 | [
"BSD-3-Clause"
] | 63 | 2018-02-04T03:31:22.000Z | 2022-03-07T08:27:39.000Z | nexus/nexus3/kubernetes/nexus3-statefulset.yml | smthkissinger/docker-images | 35e868295d04fa780325ada4168381f1e80e8fe4 | [
"BSD-3-Clause"
] | 3 | 2020-06-15T03:41:03.000Z | 2020-06-15T03:41:04.000Z | nexus/nexus3/kubernetes/nexus3-statefulset.yml | smthkissinger/docker-images | 35e868295d04fa780325ada4168381f1e80e8fe4 | [
"BSD-3-Clause"
] | 40 | 2018-01-22T16:31:16.000Z | 2022-03-08T04:40:42.000Z | apiVersion: apps/v1
kind: StatefulSet
metadata:
name: nexus3
namespace: default
labels:
app: nexus3
spec:
selector:
matchLabels:
app: nexus3
serviceName: nexus3
replicas: 1
#minReadySeconds: 60 #滚动升级时60s后认为该pod就绪
template:
metadata:
labels:
app: nexus3
spec:
terminationGracePeriodSeconds: 60 ##k8s将会给应用发送SIGTERM信号,可以用来正确、优雅地关闭应用,默认为30秒
#从私有仓库下载镜像
#imagePullSecrets:
#- name: registrykey-ali-ext
securityContext:
sysctls:
#kubernetes >= v1.11 and kernel version >= 4.15 needed
#- name: kernel.msgmax
# value: "65536"
- name: net.ipv4.tcp_syncookies
value: "0"
- name: net.ipv4.ip_local_port_range
value: "1024 65535"
- name: net.core.somaxconn
value: "65535"
- name: net.ipv4.ip_unprivileged_port_start
value: "0"
- name: net.ipv4.tcp_tw_reuse
value: "1"
- name: net.ipv4.tcp_fin_timeout
value: "30"
- name: net.ipv4.tcp_keepalive_intvl
value: "10"
- name: net.ipv4.tcp_keepalive_probes
value: "2"
- name: net.ipv4.tcp_keepalive_time
value: "120"
- name: net.ipv4.tcp_ecn
value: "1"
- name: net.ipv4.tcp_max_syn_backlog
value: "65536"
- name: net.ipv4.tcp_rfc1337
value: "1"
- name: net.ipv4.tcp_slow_start_after_idle
value: "0"
- name: net.ipv4.tcp_fack
value: "1"
- name: net.ipv4.tcp_max_tw_buckets
value: "262144"
- name: net.ipv4.tcp_fastopen
value: "3"
- name: net.ipv4.icmp_ratelimit
value: "100"
- name: net.ipv4.tcp_abort_on_overflow
value: "1"
- name: net.ipv4.tcp_adv_win_scale
value: "2"
- name: net.ipv4.tcp_retries2
value: "8"
- name: net.ipv4.tcp_syn_retries
value: "3"
- name: net.ipv4.tcp_synack_retries
value: "2"
- name: net.unix.max_dgram_qlen
value: "512"
- name: net.ipv4.tcp_fwmark_accept
value: "1"
- name: net.ipv4.fwmark_reflect
value: "1"
initContainers:
- name: volume-mount-uid
image: busybox
command: ["sh", "-c", "chown -R 200:200 /nexus-data"]
volumeMounts:
- name: nexus-data
mountPath: "/nexus-data"
containers:
- name: nexus3
image: sonatype/nexus3
imagePullPolicy: Always
livenessProbe: #kubernetes认为该pod是存活的,不存活则需要重启
httpGet:
path: /
port: 8081
scheme: HTTP
initialDelaySeconds: 60 # equals to the maximum startup time of the application + couple of seconds
timeoutSeconds: 5
successThreshold: 1
failureThreshold: 5
readinessProbe: #kubernetes认为该pod是启动成功的
httpGet:
path: /
port: 8081
scheme: HTTP
initialDelaySeconds: 30 # equals to minimum startup time of the application
timeoutSeconds: 5
successThreshold: 1
failureThreshold: 5
resources:
# keep request = limit to keep this container in guaranteed class
requests:
cpu: 500m
memory: 1Gi
limits:
cpu: 8000m
memory: 8Gi
ports:
- name: web
containerPort: 8081
- name: docker
containerPort: 5003
volumeMounts:
- name: nexus-data
mountPath: "/nexus-data"
volumeClaimTemplates:
- metadata:
name: nexus-data
spec:
accessModes:
- ReadWriteOnce
#ceph rbd storageclass
#storageClassName: rbd
resources:
requests:
storage: 512Gi
| 29.592593 | 109 | 0.539424 |
f77a7caeff3715c67b467ba6d7b8ad5fec0d6539 | 168 | yaml | YAML | container-asp/service.yaml | kienpham2000/container-demo | 3e88bfcdd036630ef816f9f78369bc254fae7b65 | [
"MIT"
] | 1 | 2021-01-05T22:35:10.000Z | 2021-01-05T22:35:10.000Z | container-asp/service.yaml | kienpham2000/container-demo | 3e88bfcdd036630ef816f9f78369bc254fae7b65 | [
"MIT"
] | 2 | 2022-02-13T23:31:58.000Z | 2022-02-13T23:31:59.000Z | container-asp/service.yaml | kienpham2000/container-demo | 3e88bfcdd036630ef816f9f78369bc254fae7b65 | [
"MIT"
] | null | null | null | apiVersion: v1
kind: Service
metadata:
name: asp
spec:
selector:
app: asp
type: LoadBalancer
ports:
- protocol: TCP
port: 80
targetPort: 80
| 12.923077 | 20 | 0.630952 |
f77ad100e10d554ea938f79b8292b460b927c800 | 1,780 | yaml | YAML | cluster/addons/cluster-loadbalancing/glbc/glbc-controller.yaml | threadstonesecure/Kubernetes | 639c129650acd14a6ed6de7744abf672c6609a3e | [
"Apache-2.0"
] | 6 | 2019-04-28T08:26:36.000Z | 2022-02-11T00:12:09.000Z | cluster/addons/cluster-loadbalancing/glbc/glbc-controller.yaml | threadstonesecure/Kubernetes | 639c129650acd14a6ed6de7744abf672c6609a3e | [
"Apache-2.0"
] | 1 | 2015-09-02T23:09:28.000Z | 2015-09-02T23:11:15.000Z | cluster/addons/cluster-loadbalancing/glbc/glbc-controller.yaml | threadstonesecure/Kubernetes | 639c129650acd14a6ed6de7744abf672c6609a3e | [
"Apache-2.0"
] | 15 | 2018-07-16T21:19:05.000Z | 2022-03-28T18:43:43.000Z | apiVersion: v1
kind: ReplicationController
metadata:
name: l7-lb-controller
namespace: kube-system
labels:
k8s-app: glbc
version: v0.5.1
kubernetes.io/cluster-service: "true"
kubernetes.io/name: "GLBC"
spec:
# There should never be more than 1 controller alive simultaneously.
replicas: 1
selector:
k8s-app: glbc
version: v0.5.1
template:
metadata:
labels:
k8s-app: glbc
version: v0.5.1
name: glbc
kubernetes.io/cluster-service: "true"
spec:
terminationGracePeriodSeconds: 600
containers:
- name: default-http-backend
# Any image is permissable as long as:
# 1. It serves a 404 page at /
# 2. It serves 200 on a /healthz endpoint
image: gcr.io/google_containers/defaultbackend:1.0
livenessProbe:
httpGet:
path: /healthz
port: 8080
scheme: HTTP
initialDelaySeconds: 30
timeoutSeconds: 5
ports:
- containerPort: 8080
resources:
limits:
cpu: 10m
memory: 20Mi
requests:
cpu: 10m
memory: 20Mi
- image: gcr.io/google_containers/glbc:0.5.1
livenessProbe:
httpGet:
path: /healthz
port: 8081
scheme: HTTP
initialDelaySeconds: 30
# healthz reaches out to GCE
periodSeconds: 30
timeoutSeconds: 5
name: l7-lb-controller
resources:
limits:
cpu: 100m
memory: 100Mi
requests:
cpu: 100m
memory: 50Mi
args:
- --default-backend-service=kube-system/default-http-backend
- --sync-period=300s
| 25.797101 | 70 | 0.555056 |
f77b6e8eb6a5960560282a6b73cad9771afd21ab | 5,764 | yaml | YAML | tests/stacks/openshift/application/seldon/test_data/expected/apps_v1_deployment_seldon-controller-manager.yaml | AlexGuoMe/manifests | ff90db7e1ade710f310057c3b20a24a8b7eb0494 | [
"Apache-2.0"
] | null | null | null | tests/stacks/openshift/application/seldon/test_data/expected/apps_v1_deployment_seldon-controller-manager.yaml | AlexGuoMe/manifests | ff90db7e1ade710f310057c3b20a24a8b7eb0494 | [
"Apache-2.0"
] | null | null | null | tests/stacks/openshift/application/seldon/test_data/expected/apps_v1_deployment_seldon-controller-manager.yaml | AlexGuoMe/manifests | ff90db7e1ade710f310057c3b20a24a8b7eb0494 | [
"Apache-2.0"
] | null | null | null | apiVersion: apps/v1
kind: Deployment
metadata:
labels:
app: seldon
app.kubernetes.io/component: seldon
app.kubernetes.io/instance: seldon-core
app.kubernetes.io/name: seldon-core-operator
app.kubernetes.io/version: 1.4.0
control-plane: seldon-controller-manager
name: seldon-controller-manager
namespace: kubeflow
spec:
replicas: 1
selector:
matchLabels:
app: seldon
app.kubernetes.io/component: seldon
app.kubernetes.io/instance: seldon1
app.kubernetes.io/name: seldon-core-operator
app.kubernetes.io/version: v0.5
control-plane: seldon-controller-manager
template:
metadata:
annotations:
prometheus.io/scrape: "true"
sidecar.istio.io/inject: "false"
labels:
app: seldon
app.kubernetes.io/component: seldon
app.kubernetes.io/instance: seldon1
app.kubernetes.io/name: seldon-core-operator
app.kubernetes.io/version: v0.5
control-plane: seldon-controller-manager
spec:
containers:
- args:
- --enable-leader-election
- --webhook-port=8443
- --create-resources=$(MANAGER_CREATE_RESOURCES)
- ""
command:
- /manager
env:
- name: WATCH_NAMESPACE
value: ""
- name: RELATED_IMAGE_EXECUTOR
value: ""
- name: RELATED_IMAGE_ENGINE
value: ""
- name: RELATED_IMAGE_STORAGE_INITIALIZER
value: ""
- name: RELATED_IMAGE_SKLEARNSERVER_REST
value: ""
- name: RELATED_IMAGE_SKLEARNSERVER_GRPC
value: ""
- name: RELATED_IMAGE_XGBOOSTSERVER_REST
value: ""
- name: RELATED_IMAGE_XGBOOSTSERVER_GRPC
value: ""
- name: RELATED_IMAGE_MLFLOWSERVER_REST
value: ""
- name: RELATED_IMAGE_MLFLOWSERVER_GRPC
value: ""
- name: RELATED_IMAGE_TFPROXY_REST
value: ""
- name: RELATED_IMAGE_TFPROXY_GRPC
value: ""
- name: RELATED_IMAGE_TENSORFLOW
value: ""
- name: RELATED_IMAGE_EXPLAINER
value: ""
- name: RELATED_IMAGE_MOCK_CLASSIFIER
value: ""
- name: MANAGER_CREATE_RESOURCES
value: "false"
- name: POD_NAMESPACE
valueFrom:
fieldRef:
fieldPath: metadata.namespace
- name: CONTROLLER_ID
value: ""
- name: AMBASSADOR_ENABLED
value: "true"
- name: AMBASSADOR_SINGLE_NAMESPACE
value: "false"
- name: ENGINE_CONTAINER_IMAGE_AND_VERSION
value: uhub.service.ucloud.cn/a4x-kubeflow/seldonio/engine:1.4.0
- name: ENGINE_CONTAINER_IMAGE_PULL_POLICY
value: IfNotPresent
- name: ENGINE_CONTAINER_SERVICE_ACCOUNT_NAME
value: default
- name: ENGINE_CONTAINER_USER
value: "8888"
- name: ENGINE_LOG_MESSAGES_EXTERNALLY
value: "false"
- name: PREDICTIVE_UNIT_SERVICE_PORT
value: "9000"
- name: PREDICTIVE_UNIT_DEFAULT_ENV_SECRET_REF_NAME
value: ""
- name: PREDICTIVE_UNIT_METRICS_PORT_NAME
value: metrics
- name: ENGINE_SERVER_GRPC_PORT
value: "5001"
- name: ENGINE_SERVER_PORT
value: "8000"
- name: ENGINE_PROMETHEUS_PATH
value: /prometheus
- name: ISTIO_ENABLED
value: "true"
- name: KEDA_ENABLED
value: "false"
- name: ISTIO_GATEWAY
value: kubeflow/kubeflow-gateway
- name: ISTIO_TLS_MODE
value: ""
- name: USE_EXECUTOR
value: "true"
- name: EXECUTOR_CONTAINER_IMAGE_AND_VERSION
value: uhub.service.ucloud.cn/a4x-kubeflow/seldonio/seldon-core-executor:1.4.0
- name: EXECUTOR_CONTAINER_IMAGE_PULL_POLICY
value: IfNotPresent
- name: EXECUTOR_PROMETHEUS_PATH
value: /prometheus
- name: EXECUTOR_SERVER_PORT
value: "8000"
- name: EXECUTOR_CONTAINER_USER
value: "8888"
- name: EXECUTOR_CONTAINER_SERVICE_ACCOUNT_NAME
value: default
- name: EXECUTOR_SERVER_METRICS_PORT_NAME
value: metrics
- name: EXECUTOR_REQUEST_LOGGER_DEFAULT_ENDPOINT
value: http://default-broker
- name: DEFAULT_USER_ID
value: "8888"
- name: EXECUTOR_DEFAULT_CPU_REQUEST
value: 500m
- name: EXECUTOR_DEFAULT_MEMORY_REQUEST
value: 512Mi
- name: EXECUTOR_DEFAULT_CPU_LIMIT
value: 500m
- name: EXECUTOR_DEFAULT_MEMORY_LIMIT
value: 512Mi
- name: ENGINE_DEFAULT_CPU_REQUEST
value: 500m
- name: ENGINE_DEFAULT_MEMORY_REQUEST
value: 512Mi
- name: ENGINE_DEFAULT_CPU_LIMIT
value: 500m
- name: ENGINE_DEFAULT_MEMORY_LIMIT
value: 512Mi
image: uhub.service.ucloud.cn/a4x-kubeflow/seldonio/seldon-core-operator:1.4.0
imagePullPolicy: IfNotPresent
name: manager
ports:
- containerPort: 8443
name: webhook-server
protocol: TCP
- containerPort: 8080
name: metrics
protocol: TCP
resources:
limits:
cpu: 500m
memory: 300Mi
requests:
cpu: 100m
memory: 200Mi
volumeMounts:
- mountPath: /tmp/k8s-webhook-server/serving-certs
name: cert
readOnly: true
serviceAccountName: seldon-manager
terminationGracePeriodSeconds: 10
volumes:
- name: cert
secret:
defaultMode: 420
secretName: seldon-webhook-server-cert
| 31.845304 | 88 | 0.601492 |
f77b9978f2dddac208e39dd936facefd04c662d8 | 194 | yaml | YAML | deploy/yaml/oscar-service.yaml | rajitha1998/oscar | 01e414318ac2b7993d77a05feac17b2fe9948e99 | [
"Apache-2.0"
] | 54 | 2018-11-08T17:31:59.000Z | 2022-03-25T10:02:58.000Z | deploy/yaml/oscar-service.yaml | rajitha1998/oscar | 01e414318ac2b7993d77a05feac17b2fe9948e99 | [
"Apache-2.0"
] | 26 | 2018-10-17T11:14:47.000Z | 2022-03-09T12:53:18.000Z | deploy/yaml/oscar-service.yaml | rajitha1998/oscar | 01e414318ac2b7993d77a05feac17b2fe9948e99 | [
"Apache-2.0"
] | 6 | 2019-10-31T02:58:50.000Z | 2022-03-09T13:18:36.000Z | apiVersion: v1
kind: Service
metadata:
name: oscar
namespace: oscar
spec:
ports:
- name: endpoint
port: 8080
protocol: TCP
targetPort: 8080
selector:
app: oscar | 14.923077 | 22 | 0.639175 |
f77b9f8eb54f18a1de9891bb2edc31c50fd274c3 | 1,066 | yaml | YAML | services/postgres/statefulset.yaml | kristinn93/homelab | 3bafb8f3965cc8311e7d5a1aee27044b4ba4f132 | [
"MIT"
] | null | null | null | services/postgres/statefulset.yaml | kristinn93/homelab | 3bafb8f3965cc8311e7d5a1aee27044b4ba4f132 | [
"MIT"
] | null | null | null | services/postgres/statefulset.yaml | kristinn93/homelab | 3bafb8f3965cc8311e7d5a1aee27044b4ba4f132 | [
"MIT"
] | null | null | null | apiVersion: apps/v1
kind: StatefulSet
metadata:
name: postgres-statefulset
namespace: default
labels:
app: postgres
spec:
serviceName: "postgres"
replicas: 1
selector:
matchLabels:
app: postgres
template:
metadata:
labels:
app: postgres
spec:
containers:
- name: postgres
image: postgres:12
env:
- name: POSTGRES_DB
valueFrom:
secretKeyRef:
name: postgres
key: db
- name: POSTGRES_USER
valueFrom:
secretKeyRef:
name: postgres
key: user
- name: POSTGRES_PASSWORD
valueFrom:
secretKeyRef:
name: postgres
key: password
ports:
- containerPort: 5432
name: postgresdb
volumeMounts:
- name: data
mountPath: /data
subPath: postgres
volumes:
- name: data
persistentVolumeClaim:
claimName: postgres-pvc | 22.208333 | 35 | 0.515009 |
f77bbc160facabfdf393d236b1809f74b29bd822 | 1,397 | yaml | YAML | ingress/nginx-ingress.yaml | sbugalski/k8s-examples | a36b7432db12e849864c943094390b76b201753e | [
"Apache-2.0"
] | 3 | 2018-12-16T15:53:05.000Z | 2021-09-22T14:31:15.000Z | ingress/nginx-ingress.yaml | sbugalski/k8s-examples | a36b7432db12e849864c943094390b76b201753e | [
"Apache-2.0"
] | null | null | null | ingress/nginx-ingress.yaml | sbugalski/k8s-examples | a36b7432db12e849864c943094390b76b201753e | [
"Apache-2.0"
] | 27 | 2019-01-23T02:53:37.000Z | 2021-05-31T04:50:04.000Z | apiVersion: apps/v1
kind: Deployment
metadata:
name: nginx-ingress
namespace: nginx-ingress
spec:
replicas: 1
selector:
matchLabels:
app: nginx-ingress
template:
metadata:
labels:
app: nginx-ingress
spec:
serviceAccountName: nginx-ingress
containers:
- image: nginx/nginx-ingress:edge
imagePullPolicy: Always
name: nginx-ingress
ports:
- name: http
containerPort: 80
- name: https
containerPort: 443
env:
- name: POD_NAMESPACE
valueFrom:
fieldRef:
fieldPath: metadata.namespace
- name: POD_NAME
valueFrom:
fieldRef:
fieldPath: metadata.name
args:
- -nginx-configmaps=$(POD_NAMESPACE)/nginx-config # A ConfigMap resource for customizing NGINX configuration.
- -ingress-class=nginx-ingress # The Ingress controller will only process Ingress resources that belong to its class
- -default-server-tls-secret=$(POD_NAMESPACE)/default-server-secret
- -external-service=nginx-ingress # name of the service of type LoadBalancer through which the Ingress controller pods are exposed externally.
- -report-ingress-status
#- -v=3 # Enables extensive logging. Useful for trooublshooting.
#- -enable-leader-election
| 32.488372 | 153 | 0.629205 |
f77c0da1d9fd27ebf5102086cc9a8f714464d62d | 761 | yaml | YAML | kustomize/50-longhorn/all/patch.yaml | chrisshiels/kubernetes | a5b4640bcf5fe097ad199ae5899791952e63176e | [
"MIT"
] | null | null | null | kustomize/50-longhorn/all/patch.yaml | chrisshiels/kubernetes | a5b4640bcf5fe097ad199ae5899791952e63176e | [
"MIT"
] | null | null | null | kustomize/50-longhorn/all/patch.yaml | chrisshiels/kubernetes | a5b4640bcf5fe097ad199ae5899791952e63176e | [
"MIT"
] | null | null | null | ---
apiVersion: v1
kind: ConfigMap
metadata:
name: longhorn-storageclass
namespace: longhorn-system
data:
storageclass.yaml: |
kind: StorageClass
apiVersion: storage.k8s.io/v1
metadata:
name: longhorn
provisioner: driver.longhorn.io
allowVolumeExpansion: true
reclaimPolicy: Retain
volumeBindingMode: Immediate
parameters:
numberOfReplicas: "3"
staleReplicaTimeout: "2880"
fromBackup: ""
# diskSelector: "ssd,fast"
# nodeSelector: "storage,fast"
# recurringJobs: '[{"name":"snap", "task":"snapshot", "cron":"*/1 * * * *", "retain":1},
# {"name":"backup", "task":"backup", "cron":"*/2 * * * *", "retain":1,
# "labels": {"interval":"2m"}}]'
| 29.269231 | 93 | 0.592641 |
f77c23c9a06b11ad7766fccbafc2e428c2c1b7d0 | 144 | yaml | YAML | built-in-references/Kubernetes/perf/violations/violation9975.yaml | sw47/azure-policy | 4a38e4cb4047b5364902653f0defe45f1b21bc61 | [
"MIT"
] | null | null | null | built-in-references/Kubernetes/perf/violations/violation9975.yaml | sw47/azure-policy | 4a38e4cb4047b5364902653f0defe45f1b21bc61 | [
"MIT"
] | null | null | null | built-in-references/Kubernetes/perf/violations/violation9975.yaml | sw47/azure-policy | 4a38e4cb4047b5364902653f0defe45f1b21bc61 | [
"MIT"
] | null | null | null | apiVersion: v1
kind: Pod
metadata:
name: image-demo-9975
spec:
containers:
- name: nginx
image: nginx #ritaacr.azurecr.io/nginx:latest | 18 | 49 | 0.722222 |
f77c298718f51cb1ec732c00bd7d81f7b150ea17 | 373 | yaml | YAML | addons/prometheus-operator/grafana/grafana-config.yaml | techize/bonsai | 7f9e6719fa29522aedbbbf56d3f0063a1e9222bc | [
"Apache-2.0"
] | 55 | 2020-05-21T19:09:17.000Z | 2022-03-12T01:30:25.000Z | addons/prometheus-operator/grafana/grafana-config.yaml | techize/bonsai | 7f9e6719fa29522aedbbbf56d3f0063a1e9222bc | [
"Apache-2.0"
] | 4 | 2020-05-21T18:35:38.000Z | 2021-02-17T20:47:54.000Z | addons/prometheus-operator/grafana/grafana-config.yaml | techize/bonsai | 7f9e6719fa29522aedbbbf56d3f0063a1e9222bc | [
"Apache-2.0"
] | 16 | 2020-08-04T14:33:34.000Z | 2022-01-25T16:45:37.000Z | apiVersion: v1
kind: Secret
type: Opaque
metadata:
name: promo-grafana
namespace: default
labels:
app.kubernetes.io/instance: promo
app.kubernetes.io/managed-by: Tiller
app.kubernetes.io/name: grafana
app.kubernetes.io/version: 6.7.1
helm.sh/chart: grafana-5.0.12
data:
admin-password: cHJvbS1vcGVyYXRvcg==
admin-user: YWRtaW4=
ldap-toml: "" | 23.3125 | 40 | 0.718499 |
f77c82be65fe497fed514fd87adfa6f86c85007a | 332 | yaml | YAML | experimental/addons/kubeflow/resources/ClusterRole-215.yaml | wangyikewxgm/catalog | 6e893546ceaee1d90fe16506695296520fdcef54 | [
"Apache-2.0"
] | 65 | 2020-05-27T03:36:33.000Z | 2022-03-23T09:50:59.000Z | experimental/addons/kubeflow/resources/ClusterRole-215.yaml | wangyikewxgm/catalog | 6e893546ceaee1d90fe16506695296520fdcef54 | [
"Apache-2.0"
] | 76 | 2020-05-29T09:14:26.000Z | 2022-03-28T14:31:33.000Z | experimental/addons/kubeflow/resources/ClusterRole-215.yaml | wangyikewxgm/catalog | 6e893546ceaee1d90fe16506695296520fdcef54 | [
"Apache-2.0"
] | 61 | 2020-05-26T03:19:48.000Z | 2022-03-24T21:57:12.000Z | apiVersion: rbac.authorization.k8s.io/v1
kind: ClusterRole
metadata:
labels:
duck.knative.dev/podspecable: "true"
serving.knative.dev/release: v0.22.1
name: knative-serving-podspecable-binding
rules:
- apiGroups:
- serving.knative.dev
resources:
- configurations
- services
verbs:
- list
- watch
- patch
| 18.444444 | 43 | 0.716867 |
f77cc5a06d5ad4c90445392c6bcd5cdc00a3f69b | 206 | yaml | YAML | assets/addons/storageclass.aws/v1.0.0.yaml | javefang/kaptain | b2d20b09ac91b1c7113ed9b0d3104ed5223fc7a4 | [
"Apache-2.0"
] | 2 | 2018-05-14T14:49:04.000Z | 2018-06-06T09:10:39.000Z | assets/addons/storageclass.aws/v1.0.0.yaml | javefang/kaptain | b2d20b09ac91b1c7113ed9b0d3104ed5223fc7a4 | [
"Apache-2.0"
] | 1 | 2018-05-04T09:26:09.000Z | 2018-05-04T09:26:09.000Z | assets/addons/storageclass.aws/v1.0.0.yaml | javefang/kaptain | b2d20b09ac91b1c7113ed9b0d3104ed5223fc7a4 | [
"Apache-2.0"
] | null | null | null | apiVersion: storage.k8s.io/v1
kind: StorageClass
metadata:
name: standard
annotations:
storageclass.kubernetes.io/is-default-class: "true"
parameters:
type: gp2
provisioner: kubernetes.io/aws-ebs
| 20.6 | 55 | 0.771845 |
f77ce68204eb3a65b5919ced6b7e0f482db1e4d6 | 2,439 | yml | YAML | admin/kubernetes/k8s_deployment_azure.yml | kevinschoon/hsds | 03890edfa735cc77da3bc06f6cf5de5bd40d1e23 | [
"Apache-2.0"
] | null | null | null | admin/kubernetes/k8s_deployment_azure.yml | kevinschoon/hsds | 03890edfa735cc77da3bc06f6cf5de5bd40d1e23 | [
"Apache-2.0"
] | null | null | null | admin/kubernetes/k8s_deployment_azure.yml | kevinschoon/hsds | 03890edfa735cc77da3bc06f6cf5de5bd40d1e23 | [
"Apache-2.0"
] | null | null | null | apiVersion: apps/v1
kind: Deployment
metadata:
labels:
app: hsds
name: hsds
spec:
replicas: 1
selector:
matchLabels:
app: hsds
template:
metadata:
labels:
app: hsds
spec:
containers:
-
name: sn
image: "hdfgroup/hsds"
imagePullPolicy: IfNotPresent
volumeMounts:
- name: accounts
mountPath: "/config/passwd.txt"
subPath: passwd.txt
- name: config
mountPath: "/config/config.yml"
subPath: config.yml
- name: override
mountPath: "/config/override.yml"
subPath: override.yml
ports:
-
containerPort: 5101
env:
- name: NODE_TYPE
value: sn
- name: PASSWORD_FILE
value: /config/passwd.txt
- name: AZURE_CONNECTION_STRING
valueFrom:
secretKeyRef:
name: azure-conn-str
key: az_conn_str
- name: AZURE_APP_ID # for Active Directory authentication
valueFrom:
secretKeyRef:
name: azure-ad-ids
key: az_app_id
- name: AZURE_RESOURCE_ID # for Active Directory authentication
valueFrom:
secretKeyRef:
name: azure-ad-ids
key: az_resource_id
-
name: dn
image: "hdfgroup/hsds"
lifecycle:
preStop:
exec:
command: ["/usr/bin/curl", "-X", "DELETE", "http://127.0.0.1:6101/prestop"]
imagePullPolicy: IfNotPresent
volumeMounts:
- name: config
mountPath: "/config/config.yml"
subPath: config.yml
- name: override
mountPath: "/config/override.yml"
subPath: override.yml
ports:
-
containerPort: 6101
env:
- name: NODE_TYPE
value: dn
- name: AZURE_CONNECTION_STRING
valueFrom:
secretKeyRef:
name: azure-conn-str
key: az_conn_str
volumes:
- name: accounts
secret:
secretName: user-password
- name: config
configMap:
name: hsds-config
- name: override
configMap:
name: hsds-override
| 26.51087 | 91 | 0.489545 |
f77d63ef3469b51f1d583fbd4c37971a649f3cac | 1,104 | yaml | YAML | operatorhub/operator-lifecycle-manager/deploy/okd/manifests/0.7.0/13-catalog-operator.deployment.yaml | smthkissinger/docker-images | 35e868295d04fa780325ada4168381f1e80e8fe4 | [
"BSD-3-Clause"
] | 63 | 2018-02-04T03:31:22.000Z | 2022-03-07T08:27:39.000Z | operatorhub/operator-lifecycle-manager/deploy/okd/manifests/0.7.0/13-catalog-operator.deployment.yaml | smthkissinger/docker-images | 35e868295d04fa780325ada4168381f1e80e8fe4 | [
"BSD-3-Clause"
] | 3 | 2020-06-15T03:41:03.000Z | 2020-06-15T03:41:04.000Z | operatorhub/operator-lifecycle-manager/deploy/okd/manifests/0.7.0/13-catalog-operator.deployment.yaml | smthkissinger/docker-images | 35e868295d04fa780325ada4168381f1e80e8fe4 | [
"BSD-3-Clause"
] | 40 | 2018-01-22T16:31:16.000Z | 2022-03-08T04:40:42.000Z | ##---
# Source: olm/templates/13-catalog-operator.deployment.yaml
apiVersion: apps/v1
kind: Deployment
metadata:
name: catalog-operator
namespace: operator-lifecycle-manager
labels:
app: catalog-operator
spec:
strategy:
type: RollingUpdate
replicas: 1
selector:
matchLabels:
app: catalog-operator
template:
metadata:
labels:
app: catalog-operator
spec:
serviceAccountName: olm-operator-serviceaccount
containers:
- name: catalog-operator
command:
- /bin/catalog
- '-namespace'
- operator-lifecycle-manager
- '-debug'
image: quay.io/coreos/catalog@sha256:8fc933e660a5b143bce7a5e4cb1606630fa9497cc252a7e47e0def3c18268f45
imagePullPolicy: IfNotPresent
ports:
- containerPort: 8080
livenessProbe:
httpGet:
path: /healthz
port: 8080
readinessProbe:
httpGet:
path: /healthz
port: 8080
imagePullSecrets:
- name: coreos-pull-secret
| 25.090909 | 111 | 0.604167 |
f77d6751524662050e42b1737693b194879407b2 | 131 | yaml | YAML | namespaces/live-1.cloud-platform.service.justice.gov.uk/dso-monitoring-prod/03-resourcequota.yaml | rossjones/cloud-platform-environments | 85a4e19cf012d97d885c6ea91379ca3f7b59a49a | [
"MIT"
] | 28 | 2018-07-13T15:02:24.000Z | 2022-03-17T09:23:54.000Z | namespaces/live-1.cloud-platform.service.justice.gov.uk/dso-monitoring-prod/03-resourcequota.yaml | happygeneralist/recall-decisions-alpha | 09124f3994a878e9969e7b4326088b2ae7bfd170 | [
"MIT"
] | 963 | 2018-05-30T15:46:06.000Z | 2022-03-30T10:06:39.000Z | namespaces/live-1.cloud-platform.service.justice.gov.uk/dso-monitoring-prod/03-resourcequota.yaml | happygeneralist/recall-decisions-alpha | 09124f3994a878e9969e7b4326088b2ae7bfd170 | [
"MIT"
] | 29 | 2018-12-04T09:37:36.000Z | 2022-02-25T10:35:34.000Z | apiVersion: v1
kind: ResourceQuota
metadata:
name: namespace-quota
namespace: dso-monitoring-prod
spec:
hard:
pods: "50"
| 14.555556 | 32 | 0.725191 |
f77da027163954e669c0abe13caa9f31ff1d62f4 | 993 | yaml | YAML | applications/robot-gitee-openeuler/repo-watcher-src-openeuler/configmap.yaml | wanghao75/infra-mindspore | 47e2b30e28cd97ce9881b19cc0629e6f3d58aa58 | [
"Apache-2.0"
] | null | null | null | applications/robot-gitee-openeuler/repo-watcher-src-openeuler/configmap.yaml | wanghao75/infra-mindspore | 47e2b30e28cd97ce9881b19cc0629e6f3d58aa58 | [
"Apache-2.0"
] | 1 | 2021-10-21T03:36:22.000Z | 2021-10-21T03:36:22.000Z | applications/robot-gitee-openeuler/repo-watcher-src-openeuler/configmap.yaml | wanghao75/infra-mindspore | 47e2b30e28cd97ce9881b19cc0629e6f3d58aa58 | [
"Apache-2.0"
] | null | null | null | apiVersion: v1
kind: ConfigMap
metadata:
name: configmap
data:
config.yaml: |
config:
watching_files:
org: openeuler
repo: community
branch: master
repo_org: src-openeuler
sig_file_path: sig/sigs.yaml
sig_dir: sig
concurrent_size: 2000
interval: 3
enable_creating_obs_meta_project: true
obs_meta_project:
obs_repo:
org: src-openeuler
repo: obs_meta
branch: master
project_dir: master/openEuler:Factory
project_file_name: _service
project_template_path: /app/conf/robot-gitee/app_config/project
project: |
<services>
<service name="tar_scm">
<param name="scm">git</param>
<param name="url">git@gitee.com:src-openeuler/#projectname#.git</param>
<param name="exclude">*</param>
<param name="extract">*</param>
<param name="revision">master</param>
</service>
</services>
| 26.837838 | 81 | 0.607251 |
f77dd3f784a2360d9857d1044463f9e645089fd5 | 572 | yaml | YAML | 5-applications/kafka/consumer-target/manifests/kafka-consumer-svc.yaml | paolocarta/ocp-gitops-argocd | bcf104f8ddf1a835763d174e6df8d11167d92df1 | [
"Apache-2.0"
] | 9 | 2020-06-03T12:35:40.000Z | 2020-12-25T23:26:57.000Z | 5-applications/kafka/consumer-target/manifests/kafka-consumer-svc.yaml | paolocarta/ocp-gitops-argocd | bcf104f8ddf1a835763d174e6df8d11167d92df1 | [
"Apache-2.0"
] | null | null | null | 5-applications/kafka/consumer-target/manifests/kafka-consumer-svc.yaml | paolocarta/ocp-gitops-argocd | bcf104f8ddf1a835763d174e6df8d11167d92df1 | [
"Apache-2.0"
] | 1 | 2020-11-29T16:03:02.000Z | 2020-11-29T16:03:02.000Z | apiVersion: v1
kind: Service
metadata:
labels:
app: kafka-target-consumer
app.kubernetes.io/component: kafka-target-consumer
app.kubernetes.io/instance: kafka-target-consumer
name: kafka-target-consumer
spec:
ports:
- name: 8080-tcp
port: 8080
protocol: TCP
targetPort: 8080
- name: 8443-tcp
port: 8443
protocol: TCP
targetPort: 8443
- name: 8778-tcp
port: 8778
protocol: TCP
targetPort: 8778
selector:
deployment: kafka-target-consumer
sessionAffinity: None
type: ClusterIP
status:
loadBalancer: {}
| 19.724138 | 54 | 0.690559 |
f77e308d7d9ff77d6ccd7498c94d1c0513c613b6 | 1,215 | yaml | YAML | kubernetes-controllers/node-exporter-daemonset.yaml | otus-kuber-2020-11/stitrace_platform | 4b9f663b3cdb2c56178e8ce2a7146047dc7b337b | [
"MIT"
] | null | null | null | kubernetes-controllers/node-exporter-daemonset.yaml | otus-kuber-2020-11/stitrace_platform | 4b9f663b3cdb2c56178e8ce2a7146047dc7b337b | [
"MIT"
] | null | null | null | kubernetes-controllers/node-exporter-daemonset.yaml | otus-kuber-2020-11/stitrace_platform | 4b9f663b3cdb2c56178e8ce2a7146047dc7b337b | [
"MIT"
] | null | null | null | apiVersion: apps/v1
kind: DaemonSet
metadata:
name: node-exporter
labels:
app: node-exporter
spec:
selector:
matchLabels:
app: node-exporter
template:
metadata:
labels:
app: node-exporter
spec:
hostNetwork: true
hostPID: true
containers:
- name: node-exporter
image: quay.io/prometheus/node-exporter:v1.0.1
args:
- "--web.listen-address=127.0.0.1:9100"
- "--path.procfs=/host/proc"
- "--path.sysfs=/host/sys"
- "--path.rootfs=/host/root"
- "--no-collector.wifi"
- "--no-collector.hwmon"
volumeMounts:
- mountPath: /host/proc
mountPropagation: HostToContainer
name: proc
readOnly: true
- mountPath: /host/sys
mountPropagation: HostToContainer
name: sys
readOnly: true
- mountPath: /host/root
mountPropagation: HostToContainer
name: root
readOnly: true
tolerations:
- effect: NoSchedule
operator: Exists
volumes:
- name: proc
hostPath:
path: /proc
- name: sys
hostPath:
path: /sys
- name: root
hostPath:
path: /
| 22.090909 | 52 | 0.56214 |
f77eb933fb9836d1810f0eb67cc6c96ca55fa4d8 | 904 | yaml | YAML | prow/cluster/sinker_deployment.yaml | ran-huang/configs | 818934320139cefb57064e2d0e3cdbbc901b7b10 | [
"Apache-2.0"
] | null | null | null | prow/cluster/sinker_deployment.yaml | ran-huang/configs | 818934320139cefb57064e2d0e3cdbbc901b7b10 | [
"Apache-2.0"
] | null | null | null | prow/cluster/sinker_deployment.yaml | ran-huang/configs | 818934320139cefb57064e2d0e3cdbbc901b7b10 | [
"Apache-2.0"
] | null | null | null | apiVersion: apps/v1
kind: Deployment
metadata:
namespace: prow
name: sinker
labels:
app: sinker
spec:
selector:
matchLabels:
app: sinker
replicas: 1
template:
metadata:
labels:
app: sinker
spec:
serviceAccountName: "sinker"
containers:
- name: sinker
image: gcr.io/k8s-prow/sinker:v20211206-64485af39f
args:
- --config-path=/etc/config/config.yaml
- --job-config-path=/etc/job-config
- --dry-run=false
volumeMounts:
- name: config
mountPath: /etc/config
readOnly: true
- name: job-config
mountPath: /etc/job-config
readOnly: true
volumes:
- name: config
configMap:
name: config
- name: job-config
configMap:
name: job-config | 23.179487 | 60 | 0.526549 |
f77ebe1a20377bb5648e48f9b516532d9eb8b26b | 90 | yaml | YAML | pipeline/acs/sonar/namespace.yaml | kahlai/flask-vote-app | e186f9251df1c3c6fbaa9c7139e350b6ec767dbd | [
"MIT"
] | 7 | 2019-02-20T13:30:10.000Z | 2021-09-13T20:44:02.000Z | pipeline/acs/sonar/namespace.yaml | kahlai/flask-vote-app | e186f9251df1c3c6fbaa9c7139e350b6ec767dbd | [
"MIT"
] | 3 | 2020-05-14T14:33:05.000Z | 2021-08-23T07:31:08.000Z | pipeline/acs/sonar/namespace.yaml | kahlai/flask-vote-app | e186f9251df1c3c6fbaa9c7139e350b6ec767dbd | [
"MIT"
] | 295 | 2019-02-17T04:39:14.000Z | 2021-09-22T15:41:08.000Z | apiVersion: v1
kind: Namespace
metadata:
name: sonar
spec:
finalizers:
- kubernetes
| 11.25 | 15 | 0.733333 |
f77ef7028e8b899c531b388c254799738e7a3981 | 143 | yaml | YAML | built-in-references/Kubernetes/perf/violations/violation499.yaml | sw47/azure-policy | 4a38e4cb4047b5364902653f0defe45f1b21bc61 | [
"MIT"
] | null | null | null | built-in-references/Kubernetes/perf/violations/violation499.yaml | sw47/azure-policy | 4a38e4cb4047b5364902653f0defe45f1b21bc61 | [
"MIT"
] | null | null | null | built-in-references/Kubernetes/perf/violations/violation499.yaml | sw47/azure-policy | 4a38e4cb4047b5364902653f0defe45f1b21bc61 | [
"MIT"
] | null | null | null | apiVersion: v1
kind: Pod
metadata:
name: image-demo-499
spec:
containers:
- name: nginx
image: nginx #ritaacr.azurecr.io/nginx:latest | 17.875 | 49 | 0.72028 |
f77f241ee66a31bd6f3362688f910614f543bbb4 | 139 | yaml | YAML | manifests/0002_serviceaccount_special-resource-controller-manager.yaml | rmr-silicom/special-resource-operator | 6faf0b12578eafe485b224b5b1d10d21b5d7b764 | [
"Apache-2.0"
] | 19 | 2019-09-27T15:43:54.000Z | 2021-11-13T13:44:58.000Z | manifests/0002_serviceaccount_special-resource-controller-manager.yaml | rmr-silicom/special-resource-operator | 6faf0b12578eafe485b224b5b1d10d21b5d7b764 | [
"Apache-2.0"
] | 309 | 2020-01-31T13:21:31.000Z | 2022-03-31T10:44:10.000Z | manifests/0002_serviceaccount_special-resource-controller-manager.yaml | rmr-silicom/special-resource-operator | 6faf0b12578eafe485b224b5b1d10d21b5d7b764 | [
"Apache-2.0"
] | 34 | 2020-11-09T14:26:53.000Z | 2022-03-27T17:24:37.000Z | apiVersion: v1
kind: ServiceAccount
metadata:
name: special-resource-controller-manager
namespace: openshift-special-resource-operator
| 23.166667 | 48 | 0.827338 |
f77f6df88617e0388e2907a262b36fc17911fabe | 3,572 | yaml | YAML | atomix-raft-storage/crds/storage.atomix.io/multiraftprotocols.yaml | frouzbeh/atomix-helm-charts | 22fa3ca2a51103fc4abd02fea182a870ece211db | [
"Apache-2.0"
] | null | null | null | atomix-raft-storage/crds/storage.atomix.io/multiraftprotocols.yaml | frouzbeh/atomix-helm-charts | 22fa3ca2a51103fc4abd02fea182a870ece211db | [
"Apache-2.0"
] | 5 | 2020-05-29T09:01:53.000Z | 2021-05-14T16:08:28.000Z | atomix-raft-storage/crds/storage.atomix.io/multiraftprotocols.yaml | frouzbeh/atomix-helm-charts | 22fa3ca2a51103fc4abd02fea182a870ece211db | [
"Apache-2.0"
] | 5 | 2020-04-14T05:41:29.000Z | 2021-02-02T21:21:09.000Z | apiVersion: apiextensions.k8s.io/v1
kind: CustomResourceDefinition
metadata:
name: multiraftprotocols.storage.atomix.io
spec:
group: storage.atomix.io
names:
kind: MultiRaftProtocol
listKind: MultiRaftProtocolList
plural: multiraftprotocols
singular: multiraftprotocol
scope: Namespaced
versions:
- name: v2beta2
served: true
storage: true
subresources:
status: {}
schema:
openAPIV3Schema:
type: object
required:
- spec
properties:
spec:
type: object
properties:
replicas:
type: integer
minimum: 1
default: 1
groups:
type: integer
minimum: 1
maximum: 1024
default: 1
image:
type: string
imagePullPolicy:
type: string
imagePullSecrets:
type: array
items:
type: object
required:
- name
properties:
name:
type: string
securityContext:
type: object
x-kubernetes-preserve-unknown-fields: true
volumeClaimTemplate:
x-kubernetes-preserve-unknown-fields: true
type: object
raft:
type: object
properties:
quorumSize:
type: integer
readReplicas:
type: integer
heartbeatPeriod:
type: string
electionTimeout:
type: string
snapshotEntryThreshold:
type: integer
minimum: 0
compactionRetainEntries:
type: integer
minimum: 0
status:
type: object
properties:
revision:
type: integer
replicas:
type: array
items:
type: object
required:
- id
- host
- port
properties:
id:
type: string
nodeId:
type: string
host:
type: string
port:
type: integer
extraPorts:
type: object
additionalProperties:
type: integer
ready:
type: boolean
partitions:
type: array
items:
type: object
required:
- id
- replicas
properties:
id:
type: integer
minimum: 1
host:
type: string
port:
type: integer
replicas:
type: array
items:
type: string
readReplicas:
type: array
items:
type: string
ready:
type: boolean | 28.576 | 58 | 0.371781 |
f77f8c104cabc0e272f17a83652a66dbef9607ef | 381 | yaml | YAML | config/rbac/etcdcluster_editor_role.yaml | oliver-Lee668/etcd-operator | a73769d87348d2fb0bd5ee6346282bbf5491b925 | [
"Apache-2.0"
] | 1 | 2021-08-21T06:00:32.000Z | 2021-08-21T06:00:32.000Z | config/rbac/etcdcluster_editor_role.yaml | oliver-Lee668/etcd-operator | a73769d87348d2fb0bd5ee6346282bbf5491b925 | [
"Apache-2.0"
] | null | null | null | config/rbac/etcdcluster_editor_role.yaml | oliver-Lee668/etcd-operator | a73769d87348d2fb0bd5ee6346282bbf5491b925 | [
"Apache-2.0"
] | 5 | 2021-01-03T07:50:44.000Z | 2021-12-30T03:09:02.000Z | # permissions for end users to edit etcdclusters.
apiVersion: rbac.authorization.k8s.io/v1
kind: ClusterRole
metadata:
name: etcdcluster-editor-role
rules:
- apiGroups:
- etcd.ydzs.io
resources:
- etcdclusters
verbs:
- create
- delete
- get
- list
- patch
- update
- watch
- apiGroups:
- etcd.ydzs.io
resources:
- etcdclusters/status
verbs:
- get
| 15.24 | 49 | 0.685039 |
f77fa57d6f42f269ce868f7d15d5f629a1a32be2 | 235 | yaml | YAML | manifests/0000_30_openshift-apiserver-operator_03_trusted_ca_cm.yaml | marun/cluster-openshift-apiserver-operator | 76ae60eb1baa4496a5097c3be282873f99ea70d3 | [
"Apache-2.0"
] | null | null | null | manifests/0000_30_openshift-apiserver-operator_03_trusted_ca_cm.yaml | marun/cluster-openshift-apiserver-operator | 76ae60eb1baa4496a5097c3be282873f99ea70d3 | [
"Apache-2.0"
] | null | null | null | manifests/0000_30_openshift-apiserver-operator_03_trusted_ca_cm.yaml | marun/cluster-openshift-apiserver-operator | 76ae60eb1baa4496a5097c3be282873f99ea70d3 | [
"Apache-2.0"
] | null | null | null | apiVersion: v1
kind: ConfigMap
metadata:
namespace: openshift-apiserver-operator
name: trusted-ca-bundle
annotations:
release.openshift.io/create-only: "true"
labels:
config.openshift.io/inject-trusted-cabundle: "true"
| 23.5 | 55 | 0.757447 |
f77fa6470ca28352b31d43410181f10335703412 | 394 | yaml | YAML | driver/examples/version1/volume/staticprovisioning/static_pod.yaml | amdabhad/ibm-spectrum-scale-csi | b3593df8b0830703da792e691e691d0e6cea80b3 | [
"Apache-2.0"
] | 46 | 2020-01-17T19:08:44.000Z | 2022-03-29T15:19:07.000Z | driver/examples/version1/volume/staticprovisioning/static_pod.yaml | amdabhad/ibm-spectrum-scale-csi | b3593df8b0830703da792e691e691d0e6cea80b3 | [
"Apache-2.0"
] | 428 | 2020-01-17T19:17:00.000Z | 2022-03-31T12:47:11.000Z | driver/examples/version1/volume/staticprovisioning/static_pod.yaml | amdabhad/ibm-spectrum-scale-csi | b3593df8b0830703da792e691e691d0e6cea80b3 | [
"Apache-2.0"
] | 42 | 2020-01-17T20:39:31.000Z | 2022-03-25T11:38:27.000Z | apiVersion: v1
kind: Pod
metadata:
name: csi-scale-staticdemo-pod
labels:
app: nginx
spec:
containers:
- name: web-server
image: nginx
volumeMounts:
- name: mypvc
mountPath: /usr/share/nginx/html/scale
ports:
- containerPort: 80
volumes:
- name: mypvc
persistentVolumeClaim:
claimName: scale-static-pvc
readOnly: false
| 17.909091 | 47 | 0.629442 |
f77fb1f2917407fc9467433be802bd8d6e343aa1 | 409 | yaml | YAML | test/expected/large/themes/Service.yaml | michalgawliksas/ky | f523bcfdf7a83c74426d2f54d5e0da149ce3e16d | [
"MIT"
] | 6 | 2020-03-03T15:13:50.000Z | 2021-04-28T04:15:38.000Z | test/expected/large/themes/Service.yaml | michalgawliksas/ky | f523bcfdf7a83c74426d2f54d5e0da149ce3e16d | [
"MIT"
] | 2 | 2021-03-20T13:02:34.000Z | 2021-03-29T15:17:09.000Z | test/expected/large/themes/Service.yaml | michalgawliksas/ky | f523bcfdf7a83c74426d2f54d5e0da149ce3e16d | [
"MIT"
] | 1 | 2021-03-19T09:23:50.000Z | 2021-03-19T09:23:50.000Z | ---
apiVersion: v1
kind: Service
metadata:
annotations:
foo.com/duname: themes
foo.com/duversion: 3.5.103-20190925.1569388185230
foo.com/version: 3.5.103
labels:
app.kubernetes.io/name: themes
helm.sh/chart: themes-3.5.103
name: themes
spec:
ports:
- name: http
port: 80
protocol: TCP
targetPort: http
selector:
app.kubernetes.io/name: themes
type: ClusterIP
| 18.590909 | 53 | 0.674817 |
f77fbc7f0c7595fac0bd61821b7cfdcadcef1c4a | 2,326 | yaml | YAML | config/prow/cluster/crier_deployment.yaml | habibrosyad/test-infra | cc960e1e71944f3442eefad24f195fa645ef5842 | [
"Apache-2.0"
] | null | null | null | config/prow/cluster/crier_deployment.yaml | habibrosyad/test-infra | cc960e1e71944f3442eefad24f195fa645ef5842 | [
"Apache-2.0"
] | null | null | null | config/prow/cluster/crier_deployment.yaml | habibrosyad/test-infra | cc960e1e71944f3442eefad24f195fa645ef5842 | [
"Apache-2.0"
] | 1 | 2021-06-23T09:32:48.000Z | 2021-06-23T09:32:48.000Z | # Copyright 2019 The Kubernetes Authors All rights reserved.
#
# Licensed under the Apache License, Version 2.0 (the "License");
# you may not use this file except in compliance with the License.
# You may obtain a copy of the License at
#
# http://www.apache.org/licenses/LICENSE-2.0
#
# Unless required by applicable law or agreed to in writing, software
# distributed under the License is distributed on an "AS IS" BASIS,
# WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
# See the License for the specific language governing permissions and
# limitations under the License.
apiVersion: apps/v1
kind: Deployment
metadata:
namespace: default
name: crier
labels:
app: crier
spec:
replicas: 1
selector:
matchLabels:
app: crier
template:
metadata:
labels:
app: crier
spec:
serviceAccountName: crier
terminationGracePeriodSeconds: 30
containers:
- name: crier
image: gcr.io/k8s-prow/crier:v20201001-0240871903
args:
- --blob-storage-workers=1
- --config-path=/etc/config/config.yaml
- --github-endpoint=http://ghproxy
- --github-endpoint=https://api.github.com
- --github-token-path=/etc/github/oauth
- --github-workers=5
- --job-config-path=/etc/job-config
- --kubeconfig=/etc/kubeconfig/config
- --kubernetes-blob-storage-workers=1
- --slack-token-file=/etc/slack/token
- --slack-workers=1
volumeMounts:
- mountPath: /etc/kubeconfig
name: kubeconfig
readOnly: true
- name: config
mountPath: /etc/config
readOnly: true
- name: job-config
mountPath: /etc/job-config
readOnly: true
- name: oauth
mountPath: /etc/github
readOnly: true
- name: slack
mountPath: /etc/slack
readOnly: true
volumes:
- name: config
configMap:
name: config
- name: job-config
configMap:
name: job-config
- name: oauth
secret:
secretName: oauth-token
- name: slack
secret:
secretName: slack-token
- name: kubeconfig
secret:
defaultMode: 420
secretName: kubeconfig
| 28.365854 | 74 | 0.61178 |
f77fc790d08f14538eaa58fae5d95d0e2e0f6637 | 158 | yaml | YAML | nextcloud/pvc.yaml | acheaito/nextcloud-kubernetes | 53321115625bf8c98fe4e63d9d7435c258e271f3 | [
"MIT"
] | 33 | 2019-02-11T12:46:49.000Z | 2022-03-25T18:46:39.000Z | nextcloud/pvc.yaml | acheaito/nextcloud-kubernetes | 53321115625bf8c98fe4e63d9d7435c258e271f3 | [
"MIT"
] | 4 | 2020-07-11T09:21:59.000Z | 2021-01-17T22:53:53.000Z | nextcloud/pvc.yaml | acheaito/nextcloud-kubernetes | 53321115625bf8c98fe4e63d9d7435c258e271f3 | [
"MIT"
] | 20 | 2019-04-14T09:17:47.000Z | 2021-11-23T11:40:14.000Z | apiVersion: v1
kind: PersistentVolumeClaim
metadata:
name: app-pvc
spec:
accessModes:
- ReadWriteOnce
resources:
requests:
storage: 500Gi
| 14.363636 | 27 | 0.708861 |
f77ff3c567cfbbdbdaf3039a0a48ca1bcb1e28f1 | 143 | yaml | YAML | built-in-references/Kubernetes/perf/violations/violation716.yaml | sw47/azure-policy | 4a38e4cb4047b5364902653f0defe45f1b21bc61 | [
"MIT"
] | null | null | null | built-in-references/Kubernetes/perf/violations/violation716.yaml | sw47/azure-policy | 4a38e4cb4047b5364902653f0defe45f1b21bc61 | [
"MIT"
] | null | null | null | built-in-references/Kubernetes/perf/violations/violation716.yaml | sw47/azure-policy | 4a38e4cb4047b5364902653f0defe45f1b21bc61 | [
"MIT"
] | null | null | null | apiVersion: v1
kind: Pod
metadata:
name: image-demo-716
spec:
containers:
- name: nginx
image: nginx #ritaacr.azurecr.io/nginx:latest | 17.875 | 49 | 0.72028 |
f78010a454d9fa7195064147c40030330ec76e24 | 380 | yml | YAML | kubernetes/deployment.yml | hema221985/DeployAKSNew | 847a070aee8ed14d1aca3d435f0c73c78caf1bd4 | [
"MIT"
] | null | null | null | kubernetes/deployment.yml | hema221985/DeployAKSNew | 847a070aee8ed14d1aca3d435f0c73c78caf1bd4 | [
"MIT"
] | null | null | null | kubernetes/deployment.yml | hema221985/DeployAKSNew | 847a070aee8ed14d1aca3d435f0c73c78caf1bd4 | [
"MIT"
] | null | null | null | apiVersion : apps/v1
kind: Deployment
metadata:
name: sampleapp
spec:
#replicas: #replicaNo#
replicas: 1
selector:
matchLabels:
app: sampleapp
template:
metadata:
labels:
app: sampleapp
spec:
containers:
- name: sampleapp
image: k8sexamplesacr.azurecr.io/sampleapp
ports:
- containerPort: 80 | 19 | 52 | 0.605263 |
f78033ff1bf1f345ae61cfc37572787b5dfe5aaa | 470 | yaml | YAML | samples/accelerate/app.yaml | wsxiaozhang/fluid | 4ada89dc6a37a26d6581ef1f1143c4b1ea7a28dc | [
"Apache-2.0"
] | 1,086 | 2020-08-31T12:51:52.000Z | 2022-03-31T07:51:03.000Z | samples/accelerate/app.yaml | wsxiaozhang/fluid | 4ada89dc6a37a26d6581ef1f1143c4b1ea7a28dc | [
"Apache-2.0"
] | 1,226 | 2020-09-01T08:18:41.000Z | 2022-03-31T12:17:35.000Z | samples/accelerate/app.yaml | wsxiaozhang/fluid | 4ada89dc6a37a26d6581ef1f1143c4b1ea7a28dc | [
"Apache-2.0"
] | 422 | 2020-08-31T12:31:15.000Z | 2022-03-31T17:32:55.000Z | apiVersion: batch/v1
kind: Job
metadata:
name: fluid-copy-test
spec:
template:
spec:
restartPolicy: OnFailure
containers:
- name: busybox
image: busybox
command: ["/bin/sh"]
args: ["-c", "set -x; time cp -r /data/hbase ./"]
volumeMounts:
- mountPath: /data
name: hbase-vol
volumes:
- name: hbase-vol
persistentVolumeClaim:
claimName: hbase
| 22.380952 | 59 | 0.52766 |
f7808dae6b618919f6e65b7955a2f19f374e905f | 333 | yaml | YAML | prod/cephfs/static-pv-csi-secret.yaml | nuvla/deployment-k8s | 0ad15f43522fccf857f416943a14f47b2af7cedf | [
"Apache-2.0"
] | null | null | null | prod/cephfs/static-pv-csi-secret.yaml | nuvla/deployment-k8s | 0ad15f43522fccf857f416943a14f47b2af7cedf | [
"Apache-2.0"
] | 1 | 2022-01-07T08:38:00.000Z | 2022-01-07T08:38:00.000Z | prod/cephfs/static-pv-csi-secret.yaml | nuvla/deployment-k8s | 0ad15f43522fccf857f416943a14f47b2af7cedf | [
"Apache-2.0"
] | null | null | null | ---
# Secret manifest containing ID and key for pre-provisioned subvolume.
apiVersion: v1
kind: Secret
metadata:
name: rook-ceph-csi
namespace: nuvla
data:
# admin in base64
userID: <CHANGE_ME_ID>
# admin's secret used to mount the cephfs volume. base64 of key from `ceph auth get client.admin`.
userKey: <CHANGE_ME_KEY>
| 25.615385 | 100 | 0.741742 |
f7809f58f4676aa679afb8fafbad96bb8465e56b | 1,009 | yaml | YAML | kubernetes-controllers/paymentservice-deployment-reverse.yaml | otus-kuber-2019-12/secretduroi_platform | aaa581d8b7d14591641e47009bb1afd9467dead0 | [
"MIT"
] | null | null | null | kubernetes-controllers/paymentservice-deployment-reverse.yaml | otus-kuber-2019-12/secretduroi_platform | aaa581d8b7d14591641e47009bb1afd9467dead0 | [
"MIT"
] | 1 | 2020-01-15T20:22:26.000Z | 2020-01-15T20:22:26.000Z | kubernetes-controllers/paymentservice-deployment-reverse.yaml | otus-kuber-2019-12/secretduroi_platform | aaa581d8b7d14591641e47009bb1afd9467dead0 | [
"MIT"
] | 1 | 2019-12-30T20:04:24.000Z | 2019-12-30T20:04:24.000Z | apiVersion: apps/v1
kind: Deployment
metadata:
name: paymentservice
labels:
app: paymentservice
spec:
replicas: 3
selector:
matchLabels:
app: paymentservice
strategy:
rollingUpdate:
maxSurge: 0
maxUnavailable: 1
template:
metadata:
labels:
app: paymentservice
spec:
containers:
- name: server
image: tuntsov/hipster-payment:v0.0.2
env:
- name: PRODUCT_CATALOG_SERVICE_ADDR
value: "productcatalogservice:3550"
- name: CURRENCY_SERVICE_ADDR
value: "currencyservice:7000"
- name: CART_SERVICE_ADDR
value: "cartservice:7070"
- name: RECOMMENDATION_SERVICE_ADDR
value: "recommendationservice:8080"
- name: SHIPPING_SERVICE_ADDR
value: "shippingservice:50051"
- name: CHECKOUT_SERVICE_ADDR
value: "checkoutservice:5050"
- name: AD_SERVICE_ADDR
value: "adservice:9555"
| 25.225 | 47 | 0.612488 |
f780ad0d5f4822bc3d781b4fee83b63d36ee4883 | 309 | yaml | YAML | namespaces/live-1.cloud-platform.service.justice.gov.uk/laa-aws-dev/01-rbac.yaml | martyn-w/cloud-platform-environments | 784924e37ebb6e2c074f88bf8fbb4eb7bdf3d634 | [
"MIT"
] | 28 | 2018-07-13T15:02:24.000Z | 2022-03-17T09:23:54.000Z | namespaces/live-1.cloud-platform.service.justice.gov.uk/laa-aws-dev/01-rbac.yaml | martyn-w/cloud-platform-environments | 784924e37ebb6e2c074f88bf8fbb4eb7bdf3d634 | [
"MIT"
] | 963 | 2018-05-30T15:46:06.000Z | 2022-03-30T10:06:39.000Z | namespaces/live-1.cloud-platform.service.justice.gov.uk/laa-aws-dev/01-rbac.yaml | martyn-w/cloud-platform-environments | 784924e37ebb6e2c074f88bf8fbb4eb7bdf3d634 | [
"MIT"
] | 29 | 2018-12-04T09:37:36.000Z | 2022-02-25T10:35:34.000Z | kind: RoleBinding
apiVersion: rbac.authorization.k8s.io/v1
metadata:
name: laa-aws-dev-admin
namespace: laa-aws-dev
subjects:
- kind: Group
name: "github:laa-aws-infrastructure"
apiGroup: rbac.authorization.k8s.io
roleRef:
kind: ClusterRole
name: admin
apiGroup: rbac.authorization.k8s.io
| 22.071429 | 41 | 0.747573 |
f7811f0e84357f0ba7d924c2ce932bcb1a123525 | 310 | yaml | YAML | k8s/base/deployment.yaml | deepak-gc/kustomize-namespace-issue | 14a8204b07d893c1745b04852a118260be03b526 | [
"MIT"
] | null | null | null | k8s/base/deployment.yaml | deepak-gc/kustomize-namespace-issue | 14a8204b07d893c1745b04852a118260be03b526 | [
"MIT"
] | null | null | null | k8s/base/deployment.yaml | deepak-gc/kustomize-namespace-issue | 14a8204b07d893c1745b04852a118260be03b526 | [
"MIT"
] | null | null | null | apiVersion: apps/v1
kind: Deployment
metadata:
name: app
labels:
app: app
spec:
replicas: 1
selector:
matchLabels:
app: app
template:
metadata:
labels:
app: app
spec:
containers:
- name: app-api
image: gcr.io/google-samples/node-hello:1.0
| 14.761905 | 53 | 0.583871 |
f781243daf6d697ab995e596cf686b5ec5af07c7 | 553 | yml | YAML | services/identity/ingress.yml | wolkenschloss/nubes | 218a04bde90f402d3d6c7981520bcd2e2ed15fc4 | [
"ECL-2.0",
"Apache-2.0"
] | null | null | null | services/identity/ingress.yml | wolkenschloss/nubes | 218a04bde90f402d3d6c7981520bcd2e2ed15fc4 | [
"ECL-2.0",
"Apache-2.0"
] | 78 | 2021-11-10T12:17:54.000Z | 2022-02-20T19:19:37.000Z | services/identity/ingress.yml | wolkenschloss/nubes | 218a04bde90f402d3d6c7981520bcd2e2ed15fc4 | [
"ECL-2.0",
"Apache-2.0"
] | null | null | null | apiVersion: networking.k8s.io/v1
kind: Ingress
metadata:
name: dex
annotations:
cert-manager.io/cluster-issuer: ca-issuer
kubernetes.io/ingress.class: public
nginx.ingress.kubernetes.io/service-upstream: "true"
spec:
tls:
- hosts:
- dex.wolkenschloss.test
secretName: dex-cert
rules:
- host: dex.wolkenschloss.test
http:
paths:
- path: /
pathType: Prefix
backend:
service:
name: dex
port:
name: web
| 22.12 | 56 | 0.556962 |
f78130b39830dad46c017a372dbf601ce0c2457a | 1,575 | yaml | YAML | workloads/podinfo-dep.yaml | pakisto/flux-get-started | f07196bd1f996b69b9540fd772cc69b919df3633 | [
"Apache-2.0"
] | null | null | null | workloads/podinfo-dep.yaml | pakisto/flux-get-started | f07196bd1f996b69b9540fd772cc69b919df3633 | [
"Apache-2.0"
] | null | null | null | workloads/podinfo-dep.yaml | pakisto/flux-get-started | f07196bd1f996b69b9540fd772cc69b919df3633 | [
"Apache-2.0"
] | null | null | null | ---
apiVersion: apps/v1
kind: Deployment
metadata:
name: podinfo
namespace: demo
labels:
app: podinfo
annotations:
flux.weave.works/automated: "true"
flux.weave.works/tag.init: glob:1.4.*
flux.weave.works/tag.podinfod: glob:1.4.*
flux.weave.works/locked: 'true'
flux.weave.works/locked_msg: 1.4.2 does not work for us
flux.weave.works/locked_user: Changyu Seon (선찬규) <changyu.seon@bespinglobal.com>
spec:
strategy:
rollingUpdate:
maxUnavailable: 0
type: RollingUpdate
selector:
matchLabels:
app: podinfo
template:
metadata:
annotations:
prometheus.io/scrape: "true"
labels:
app: podinfo
spec:
initContainers:
- name: init
image: alpine:3.10
command:
- sleep
- "1"
containers:
- name: podinfod
image: stefanprodan/podinfo:1.4.1
imagePullPolicy: IfNotPresent
ports:
- containerPort: 9898
name: http
protocol: TCP
command:
- ./podinfo
- --port=9898
- --level=info
- --random-delay=false
- --random-error=false
env:
- name: PODINFO_UI_COLOR
value: green
livenessProbe:
httpGet:
path: /healthz
port: 9898
readinessProbe:
httpGet:
path: /readyz
port: 9898
resources:
limits:
cpu: 1000m
memory: 128Mi
requests:
cpu: 10m
memory: 64Mi
| 22.826087 | 89 | 0.548571 |
f7814393b5c42df78893a82fe5842f4d7ff0c96d | 1,167 | yaml | YAML | mock-data/large-cluster/k8s/rbac.authorization.k8s.io:ClusterRoleBinding/system:gke-uas-metrics-reader.yaml | kubevious/logic-processor | f3b502fdd851fc955ddb00b39da589bbf05566e3 | [
"Apache-2.0"
] | null | null | null | mock-data/large-cluster/k8s/rbac.authorization.k8s.io:ClusterRoleBinding/system:gke-uas-metrics-reader.yaml | kubevious/logic-processor | f3b502fdd851fc955ddb00b39da589bbf05566e3 | [
"Apache-2.0"
] | null | null | null | mock-data/large-cluster/k8s/rbac.authorization.k8s.io:ClusterRoleBinding/system:gke-uas-metrics-reader.yaml | kubevious/logic-processor | f3b502fdd851fc955ddb00b39da589bbf05566e3 | [
"Apache-2.0"
] | 1 | 2022-01-16T20:19:54.000Z | 2022-01-16T20:19:54.000Z | kind: ClusterRoleBinding
apiVersion: rbac.authorization.k8s.io/v1
metadata:
name: 'system:gke-uas-metrics-reader'
selfLink: >-
/apis/rbac.authorization.k8s.io/v1/clusterrolebindings/system%3Agke-uas-metrics-reader
uid: 4faffd00-03f3-427b-b857-06445fb947f3
resourceVersion: '61445003'
creationTimestamp: '2020-06-13T07:50:47Z'
labels:
addonmanager.kubernetes.io/mode: Reconcile
annotations:
kubectl.kubernetes.io/last-applied-configuration: >
{"apiVersion":"rbac.authorization.k8s.io/v1","kind":"ClusterRoleBinding","metadata":{"annotations":{},"labels":{"addonmanager.kubernetes.io/mode":"Reconcile"},"name":"system:gke-uas-metrics-reader"},"roleRef":{"apiGroup":"rbac.authorization.k8s.io","kind":"ClusterRole","name":"system:gke-uas-metrics-reader"},"subjects":[{"kind":"User","name":"system:vpa-recommender","namespace":"kube-system"}]}
subjects:
-
kind: User
apiGroup: rbac.authorization.k8s.io
name: 'system:vpa-recommender'
namespace: kube-system
roleRef:
apiGroup: rbac.authorization.k8s.io
kind: ClusterRole
name: 'system:gke-uas-metrics-reader'
| 44.884615 | 409 | 0.702656 |
f7814c620689ea1eec4fda939ad47e540b0a3adc | 5,257 | yaml | YAML | AIO/kubernetes/deployment/kubernetes-client-deployment.yaml | borisbaldassari/system-integration | 38933e7adad7d61b7f3af9b34c7a2b7c37c96177 | [
"Apache-2.0"
] | 1 | 2020-12-09T14:35:11.000Z | 2020-12-09T14:35:11.000Z | AIO/kubernetes/deployment/kubernetes-client-deployment.yaml | borisbaldassari/system-integration | 38933e7adad7d61b7f3af9b34c7a2b7c37c96177 | [
"Apache-2.0"
] | 1 | 2021-06-28T12:06:21.000Z | 2021-08-13T06:56:09.000Z | AIO/kubernetes/deployment/kubernetes-client-deployment.yaml | borisbaldassari/system-integration | 38933e7adad7d61b7f3af9b34c7a2b7c37c96177 | [
"Apache-2.0"
] | 2 | 2021-05-05T13:11:11.000Z | 2021-12-13T19:14:53.000Z | apiVersion: apps/v1
# ===============LICENSE_START=======================================================
# Acumos Apache-2.0
# ===================================================================================
# Copyright (C) 2017-2018 AT&T Intellectual Property & Tech Mahindra. All rights reserved.
# ===================================================================================
# This Acumos software file is distributed by AT&T and Tech Mahindra
# under the Apache License, Version 2.0 (the "License");
# you may not use this file except in compliance with the License.
# You may obtain a copy of the License at
#
# http://www.apache.org/licenses/LICENSE-2.0
#
# This file is distributed on an "AS IS" BASIS,
# WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
# See the License for the specific language governing permissions and
# limitations under the License.
# ===============LICENSE_END=========================================================
# What this is: kubernetes template for Acumos kubernetes-client deployment
# How to use:
kind: Deployment
metadata:
namespace: <ACUMOS_NAMESPACE>
name: kubernetes-client
labels:
app: kubernetes-client
spec:
replicas: 1
selector:
matchLabels:
app: kubernetes-client
strategy:
type: Recreate
template:
metadata:
labels:
app: kubernetes-client
<ACUMOS_SERVICE_LABEL_KEY>: <ACUMOS_KUBERNETES_CLIENT_SERVICE_LABEL>
spec:
affinity:
podAntiAffinity:
requiredDuringSchedulingIgnoredDuringExecution:
- labelSelector:
matchExpressions:
- key: <ACUMOS_SERVICE_LABEL_KEY>
operator: NotIn
values:
- <ACUMOS_KUBERNETES_CLIENT_SERVICE_LABEL>
topologyKey: "kubernetes.io/node"
imagePullSecrets:
- name: acumos-registry
containers:
- name: kubernetes-client
image: <KUBERNETES_CLIENT_IMAGE>
command: ["/bin/sh", "-c"]
args:
- set -x;
cd maven;
java $JAVA_OPTS -Dhttp.proxyHost=$ACUMOS_HTTP_PROXY_HOST -Dhttp.proxyPort=$ACUMOS_HTTP_PROXY_PORT -Dhttp.nonProxyHosts=$ACUMOS_HTTP_NON_PROXY_HOSTS -Dhttps.proxyHost=$ACUMOS_HTTP_PROXY_HOST -Dhttps.proxyPort=$ACUMOS_HTTP_PROXY_PORT -Dhttps.nonProxyHosts=$ACUMOS_HTTP_NON_PROXY_HOSTS -Djava.security.egd=file:/dev/./urandom -jar *.jar
env:
- name: ACUMOS_HTTP_NON_PROXY_HOSTS
value: "<ACUMOS_HTTP_NON_PROXY_HOSTS>|cds-service"
- name: ACUMOS_HTTP_PROXY_HOST
value: "<ACUMOS_HTTP_PROXY_HOST>"
- name: ACUMOS_HTTP_PROXY_PORT
value: "<ACUMOS_HTTP_PROXY_PORT>"
- name: JAVA_OPTS
value: "-Xms128m -Xmx512m"
- name: SPRING_APPLICATION_JSON
value: '{
"logging": {
"level": {
"root": "INFO"
}
},
"kube" : {
"incrementPort": "8557",
"singleModelPort": "8556",
"folderPath": "/maven/home",
"singleNodePort": "30333",
"singleTargetPort": "8061",
"dataBrokerModelPort": "8556",
"dataBrokerNodePort": "30556",
"dataBrokerTargetPort": "8556",
"mlTargetPort": "8061",
"nginxImageName": "nginx",
"nexusEndPointURL": "http://localhost:80"
},
"dockerproxy": {
"host": "<ACUMOS_DOCKER_PROXY_HOST>",
"port": "<ACUMOS_DOCKER_PROXY_PORT>"
},
"blueprint": {
"ImageName": "<BLUEPRINT_ORCHESTRATOR_IMAGE>",
"name": "blueprint-orchestrator",
"nodePort": "30555",
"port": "8061"
},
"nexus": {
"url": "http://<ACUMOS_NEXUS_HOST>:<ACUMOS_NEXUS_API_PORT>/<ACUMOS_NEXUS_MAVEN_REPO_PATH>/<ACUMOS_NEXUS_MAVEN_REPO>/",
"password": "<ACUMOS_NEXUS_RW_USER_PASSWORD>",
"username": "<ACUMOS_NEXUS_RW_USER>",
"groupid": "<ACUMOS_NEXUS_GROUP>"
},
"cmndatasvc": {
"cmndatasvcendpointurl": "http://<ACUMOS_CDS_HOST>:<ACUMOS_CDS_PORT>/ccds",
"cmndatasvcuser": "<ACUMOS_CDS_USER>",
"cmndatasvcpwd": "<ACUMOS_CDS_PASSWORD>"
},
"probe": {
"probeImageName": "<PROTO_VIEWER_IMAGE>",
"probeImagePORT": "5006",
"probeModelPort": "5006",
"probeNodePort": "30800",
"probeTargetPort": "5006",
"probeApiPort": "5006",
"probeExternalPort": "30800",
"probeSchemaPort": "80"
},
"logstash": {
"host": "<ACUMOS_ELK_HOST>",
"ip": "<ACUMOS_ELK_HOST_IP>",
"port": "<ACUMOS_ELK_LOGSTASH_PORT>"
},
"server": { "port": "8082" }
}'
ports:
- containerPort: 8082
volumeMounts:
- mountPath: /maven/logs
name: logs
restartPolicy: Always
volumes:
- name: logs
persistentVolumeClaim:
claimName: <ACUMOS_KUBERNETES_CLIENT_SERVICE_LABEL>
| 37.820144 | 343 | 0.544988 |
f7815066be6a30330564fca55173e91b8124b8d0 | 474 | yaml | YAML | pkg/sync/v71/data/ClusterRole.rbac.authorization.k8s.io/customer-admin-controller.yaml | troy0820/openshift-azure | 2760ef235865f6bc17d359bc74f8d5059ebb0386 | [
"Apache-2.0"
] | 55 | 2018-08-03T04:38:28.000Z | 2021-07-26T16:42:09.000Z | pkg/sync/v71/data/ClusterRole.rbac.authorization.k8s.io/customer-admin-controller.yaml | troy0820/openshift-azure | 2760ef235865f6bc17d359bc74f8d5059ebb0386 | [
"Apache-2.0"
] | 2,257 | 2018-07-26T21:29:25.000Z | 2022-03-27T06:07:22.000Z | pkg/sync/v71/data/ClusterRole.rbac.authorization.k8s.io/customer-admin-controller.yaml | troy0820/openshift-azure | 2760ef235865f6bc17d359bc74f8d5059ebb0386 | [
"Apache-2.0"
] | 62 | 2018-07-24T12:16:53.000Z | 2021-12-09T18:02:58.000Z | apiVersion: rbac.authorization.k8s.io/v1
kind: ClusterRole
metadata:
name: customer-admin-controller
rules:
- apiGroups:
- rbac.authorization.k8s.io
resources:
- rolebindings
verbs:
- create
- delete
- get
- list
- patch
- update
- watch
- apiGroups:
- ""
resources:
- namespaces
verbs:
- get
- list
- watch
- create
- apiGroups:
- user.openshift.io
resources:
- groups
- users
verbs:
- create
- get
- update
- list
| 12.810811 | 40 | 0.632911 |
f781d6fb7dae1cafc6be86c0c623c02c9fde255d | 969 | yaml | YAML | kubernetes/replica-set/hotel-fahmi-rs.yaml | KNobHack/ukk-hotel | 01f187292d4cb6743f676d1e4b75fa954a83c14a | [
"MIT"
] | null | null | null | kubernetes/replica-set/hotel-fahmi-rs.yaml | KNobHack/ukk-hotel | 01f187292d4cb6743f676d1e4b75fa954a83c14a | [
"MIT"
] | null | null | null | kubernetes/replica-set/hotel-fahmi-rs.yaml | KNobHack/ukk-hotel | 01f187292d4cb6743f676d1e4b75fa954a83c14a | [
"MIT"
] | null | null | null | apiVersion: apps/v1
kind: ReplicaSet
metadata:
name: hotel-fahmi-server-rs
spec:
replicas: 3
selector:
matchLabels:
framework: codeigniter-4
language: php
type: server
app: hotel-fahmi-server
template:
metadata:
name: hotel-fahmi-server
labels:
framework: codeigniter-4
language: php
type: server
app: hotel-fahmi-server
annotations:
description: merupakan aplikasi hotel fahmi yang bersifat server untuk berintaraksi dengan user
spec:
containers:
- name: hotel-fahmi
image: localhost:5000/hotel-fahmi
ports:
- containerPort: 80
livenessProbe:
httpGet:
path: /health
port: 80
initialDelaySeconds: 0
periodSeconds: 10
timeoutSeconds: 1
successThreshold: 1
failureThreshold: 3
imagePullSecrets:
- name: regcred
| 24.225 | 103 | 0.591331 |
f7826643ff738910e46266834b84878b9018a876 | 891 | yaml | YAML | tests/integration-tests/sa-attachement/ref/final-deployment.yaml | isabella232/node-refiner | 225b66b62dd0ba57e537fd8096654675bc9bf0bc | [
"Apache-2.0"
] | 1 | 2022-02-01T17:59:49.000Z | 2022-02-01T17:59:49.000Z | tests/integration-tests/sa-attachement/ref/final-deployment.yaml | SAP/node-refiner | 13ccfd48d6b1dfabbf27374c694a97d6b9f4a8ba | [
"Apache-2.0"
] | 1 | 2022-02-27T19:10:17.000Z | 2022-02-27T19:10:17.000Z | tests/integration-tests/sa-attachement/ref/final-deployment.yaml | isabella232/node-refiner | 225b66b62dd0ba57e537fd8096654675bc9bf0bc | [
"Apache-2.0"
] | 1 | 2022-02-27T18:46:46.000Z | 2022-02-27T18:46:46.000Z | apiVersion: apps/v1
kind: Deployment
metadata:
name: node-refiner-test
labels:
app: node-refiner
spec:
replicas: 1
selector:
matchLabels:
app: node-refiner
template:
metadata:
labels:
app: node-refiner
spec:
serviceAccountName: node-refiner-sa
containers:
- name: application
image: alisoliman/node-refiner:${IMAGE_TAGGED}
imagePullPolicy: Always
ports:
- name: health
containerPort: 9102
protocol: TCP
livenessProbe:
httpGet:
path: /alive
port: health
env:
- name: LISTENING_PORT
value: "8080"
resources:
requests:
cpu: "50m"
memory: "256Mi"
limits:
cpu: "200m"
memory: "512Mi"
| 22.275 | 56 | 0.502806 |
f782c655d2b7cc91f163b791fac0d01372c856df | 397 | yaml | YAML | infrastructure/30_monitoring/40_prometheus-adapter/clusterRole.yaml | bygui86/workshop-tage-2021 | 0ae299118d9913fb122e9b259e37df98ef46d2d7 | [
"Apache-2.0"
] | null | null | null | infrastructure/30_monitoring/40_prometheus-adapter/clusterRole.yaml | bygui86/workshop-tage-2021 | 0ae299118d9913fb122e9b259e37df98ef46d2d7 | [
"Apache-2.0"
] | null | null | null | infrastructure/30_monitoring/40_prometheus-adapter/clusterRole.yaml | bygui86/workshop-tage-2021 | 0ae299118d9913fb122e9b259e37df98ef46d2d7 | [
"Apache-2.0"
] | 8 | 2021-09-07T08:11:06.000Z | 2021-09-07T09:15:00.000Z | apiVersion: rbac.authorization.k8s.io/v1
kind: ClusterRole
metadata:
name: prometheus-adapter
rules:
- apiGroups:
- policy
resources:
- podsecuritypolicies
verbs:
- use
resourceNames:
- sbt-restricted
- apiGroups:
- ""
resources:
- nodes
- namespaces
- pods
- services
verbs:
- get
- list
- watch
| 14.703704 | 40 | 0.559194 |
f78337b5e11b24a5456b291de6995eebc9497242 | 149 | yaml | YAML | kubernetes/postgres/svc.yaml | kukam/docker-pwe | 230a161f68f9e7e340e9a6c2698b3ec9c19b594d | [
"Apache-2.0"
] | null | null | null | kubernetes/postgres/svc.yaml | kukam/docker-pwe | 230a161f68f9e7e340e9a6c2698b3ec9c19b594d | [
"Apache-2.0"
] | null | null | null | kubernetes/postgres/svc.yaml | kukam/docker-pwe | 230a161f68f9e7e340e9a6c2698b3ec9c19b594d | [
"Apache-2.0"
] | null | null | null | ---
apiVersion: v1
kind: Service
metadata:
name: pwe-postgres-svc
namespace: pwe
spec:
ports:
- port: 7775
selector:
app: pwe-postgres
| 12.416667 | 24 | 0.671141 |
f783ca2ed4f6ef5ee29d974221f257df17aa2c95 | 587 | yaml | YAML | strimzi-kustomize/cluster-operator/030-ClusterRoleBinding-strimzi-cluster-operator-kafka-broker-delegation.yaml | DonatoVerardi/hello-kafka | 552d9b3b24ee86c6a6e2acf0683973a888abe862 | [
"Apache-2.0"
] | null | null | null | strimzi-kustomize/cluster-operator/030-ClusterRoleBinding-strimzi-cluster-operator-kafka-broker-delegation.yaml | DonatoVerardi/hello-kafka | 552d9b3b24ee86c6a6e2acf0683973a888abe862 | [
"Apache-2.0"
] | null | null | null | strimzi-kustomize/cluster-operator/030-ClusterRoleBinding-strimzi-cluster-operator-kafka-broker-delegation.yaml | DonatoVerardi/hello-kafka | 552d9b3b24ee86c6a6e2acf0683973a888abe862 | [
"Apache-2.0"
] | null | null | null | apiVersion: rbac.authorization.k8s.io/v1
kind: ClusterRoleBinding
metadata:
name: strimzi-cluster-operator-kafka-broker-delegation
labels:
app: strimzi
# The Kafka broker cluster role must be bound to the cluster operator service account so that it can delegate the cluster role to the Kafka brokers.
# This must be done to avoid escalating privileges which would be blocked by Kubernetes.
subjects:
- kind: ServiceAccount
name: strimzi-cluster-operator
namespace: strimzi
roleRef:
kind: ClusterRole
name: strimzi-kafka-broker
apiGroup: rbac.authorization.k8s.io
| 34.529412 | 148 | 0.785349 |
f78401d2143dfed9f33563fca34f9d9c4a542b65 | 756 | yaml | YAML | fluentd/fluentd-aggregator-svc.yaml | zcp-aks-lab/zcp-logging | b58038c7637fb2accaa43cdc8aef5d83953df83e | [
"Apache-2.0"
] | null | null | null | fluentd/fluentd-aggregator-svc.yaml | zcp-aks-lab/zcp-logging | b58038c7637fb2accaa43cdc8aef5d83953df83e | [
"Apache-2.0"
] | null | null | null | fluentd/fluentd-aggregator-svc.yaml | zcp-aks-lab/zcp-logging | b58038c7637fb2accaa43cdc8aef5d83953df83e | [
"Apache-2.0"
] | null | null | null | apiVersion: v1
kind: Service
metadata:
name: fluentd-aggregator
namespace: zcp-system
labels:
app: fluentd-aggregator
spec:
type: ClusterIP
selector:
app: fluentd-aggregator
ports:
- name: fluentd-input
port: 24224
targetPort: fwd-input
protocol: TCP
- name: fluentd-input-udp
port: 24224
targetPort: fwd-input-udp
protocol: UDP
# Exposes Prometheus metrics
- name: prometheus-metrics
port: 24231
targetPort: prom-metrics
protocol: TCP
# Can be accessed using "kubectl proxy" at:
# http://127.0.0.1:8001/api/v1/proxy/namespaces/kube-system/services/fluentd-aggregator:monitor-agent/api/plugins.json
- name: monitor-agent
port: 24220
targetPort: monitor-agent
protocol: TCP
| 22.909091 | 120 | 0.702381 |
f7844d8b5bce419f51a098128d6e14da6fc2f553 | 7,023 | yaml | YAML | manifests/logging/dashboards.yaml | victoriouscoder/oreilly-kubernetes | 61d0c06f422627ceba53ee5e5ccfbdf6d7aca52c | [
"Apache-2.0"
] | 323 | 2017-02-10T18:10:51.000Z | 2022-03-24T08:04:37.000Z | manifests/logging/dashboards.yaml | acropcom/oreilly-kubernetes | 5b1d1fe682d948ebc4282710f71aa34bb1c477ad | [
"Apache-2.0"
] | 6 | 2017-02-14T16:04:30.000Z | 2019-01-03T11:35:38.000Z | manifests/logging/dashboards.yaml | acropcom/oreilly-kubernetes | 5b1d1fe682d948ebc4282710f71aa34bb1c477ad | [
"Apache-2.0"
] | 254 | 2017-02-14T14:57:20.000Z | 2022-03-15T00:01:24.000Z | apiVersion: v1
kind: ConfigMap
metadata:
name: grafana
namespace: logging
data:
dashboards.json: |-
{
"__inputs": [
{
"name": "DS_PROMETHEUS",
"label": "prometheus",
"description": "",
"type": "datasource",
"pluginId": "prometheus",
"pluginName": "Prometheus"
}
],
"__requires": [
{
"type": "panel",
"id": "singlestat",
"name": "Singlestat",
"version": ""
},
{
"type": "panel",
"id": "graph",
"name": "Graph",
"version": ""
},
{
"type": "grafana",
"id": "grafana",
"name": "Grafana",
"version": "3.1.1"
},
{
"type": "datasource",
"id": "prometheus",
"name": "Prometheus",
"version": "1.0.0"
}
],
"id": null,
"title": "Kubernetes",
"tags": [],
"style": "dark",
"timezone": "browser",
"editable": true,
"hideControls": false,
"sharedCrosshair": false,
"rows": [
{
"title": "New row",
"height": "250px",
"editable": true,
"collapse": false,
"panels": [
{
"title": "Number of Pods",
"error": false,
"span": 12,
"editable": true,
"type": "singlestat",
"isNew": true,
"id": 2,
"targets": [
{
"refId": "A",
"expr": "count(count(container_start_time_seconds{io_kubernetes_pod_name!=\"\"}) by (io_kubernetes_pod_name))",
"intervalFactor": 2,
"step": 240
}
],
"links": [],
"datasource": "${DS_PROMETHEUS}",
"maxDataPoints": 100,
"interval": null,
"cacheTimeout": null,
"format": "none",
"prefix": "",
"postfix": "",
"nullText": null,
"valueMaps": [
{
"value": "null",
"op": "=",
"text": "N/A"
}
],
"mappingTypes": [
{
"name": "value to text",
"value": 1
},
{
"name": "range to text",
"value": 2
}
],
"rangeMaps": [
{
"from": "null",
"to": "null",
"text": "N/A"
}
],
"mappingType": 1,
"nullPointMode": "connected",
"valueName": "avg",
"prefixFontSize": "50%",
"valueFontSize": "80%",
"postfixFontSize": "50%",
"thresholds": "20,25",
"colorBackground": false,
"colorValue": false,
"colors": [
"rgba(50, 172, 45, 0.97)",
"rgba(237, 129, 40, 0.89)",
"rgba(245, 54, 54, 0.9)"
],
"sparkline": {
"show": false,
"full": false,
"lineColor": "rgb(31, 120, 193)",
"fillColor": "rgba(31, 118, 189, 0.18)"
},
"gauge": {
"show": true,
"minValue": 0,
"maxValue": 30,
"thresholdMarkers": true,
"thresholdLabels": false
}
}
]
},
{
"collapse": false,
"editable": true,
"height": "250px",
"panels": [
{
"aliasColors": {},
"bars": false,
"datasource": "${DS_PROMETHEUS}",
"editable": true,
"error": false,
"fill": 1,
"grid": {
"threshold1": null,
"threshold1Color": "rgba(216, 200, 27, 0.27)",
"threshold2": null,
"threshold2Color": "rgba(234, 112, 112, 0.22)"
},
"id": 1,
"isNew": true,
"legend": {
"avg": false,
"current": false,
"max": false,
"min": false,
"show": true,
"total": false,
"values": false
},
"lines": true,
"linewidth": 2,
"links": [],
"nullPointMode": "connected",
"percentage": false,
"pointradius": 5,
"points": false,
"renderer": "flot",
"seriesOverrides": [],
"span": 12,
"stack": false,
"steppedLine": false,
"targets": [
{
"expr": "count(count(container_start_time_seconds{io_kubernetes_pod_name!=\"\"}) by (io_kubernetes_pod_name))",
"intervalFactor": 2,
"legendFormat": "",
"refId": "A",
"step": 20
}
],
"timeFrom": null,
"timeShift": null,
"title": "Pods",
"tooltip": {
"msResolution": true,
"shared": true,
"sort": 0,
"value_type": "cumulative"
},
"type": "graph",
"xaxis": {
"show": true
},
"yaxes": [
{
"format": "short",
"label": null,
"logBase": 1,
"max": null,
"min": null,
"show": true
},
{
"format": "short",
"label": null,
"logBase": 1,
"max": null,
"min": null,
"show": true
}
]
}
],
"title": "Row"
}
],
"time": {
"from": "now-3h",
"to": "now"
},
"timepicker": {
"refresh_intervals": [
"5s",
"10s",
"30s",
"1m",
"5m",
"15m",
"30m",
"1h",
"2h",
"1d"
],
"time_options": [
"5m",
"15m",
"1h",
"6h",
"12h",
"24h",
"2d",
"7d",
"30d"
]
},
"templating": {
"list": []
},
"annotations": {
"list": []
},
"refresh": "5s",
"schemaVersion": 12,
"version": 5,
"links": [],
"gnetId": null
} | 26.501887 | 129 | 0.316959 |
f784b57c936ce855e5eb986da1df0632353f9c66 | 1,753 | yaml | YAML | test/e2e/manifests/mixins/argo-workflows-agent-ca-certificates.yaml | BearerPipelineTest/argo-workflows | ecd91b1c4215a2ab8742f7c43eaade98a1d47eba | [
"Apache-2.0"
] | null | null | null | test/e2e/manifests/mixins/argo-workflows-agent-ca-certificates.yaml | BearerPipelineTest/argo-workflows | ecd91b1c4215a2ab8742f7c43eaade98a1d47eba | [
"Apache-2.0"
] | 18 | 2022-02-01T23:09:58.000Z | 2022-03-31T23:28:41.000Z | test/e2e/manifests/mixins/argo-workflows-agent-ca-certificates.yaml | BearerPipelineTest/argo-workflows | ecd91b1c4215a2ab8742f7c43eaade98a1d47eba | [
"Apache-2.0"
] | null | null | null | # You can use the following command to generate a self-signed certificate:
# openssl req -x509 -newkey rsa:4096 -keyout key.pem -out cert.pem -sha256 -days 365
# also see: https://stackoverflow.com/a/10176685
apiVersion: v1
kind: Secret
metadata:
name: argo-workflows-agent-ca-certificates
stringData:
customcert.pem: >
-----BEGIN CERTIFICATE-----
MIIDrzCCApegAwIBAgIQCDvgVpBCRrGhdWrJWZHHSjANBgkqhkiG9w0BAQUFADBh
MQswCQYDVQQGEwJVUzEVMBMGA1UEChMMRGlnaUNlcnQgSW5jMRkwFwYDVQQLExB3
d3cuZGlnaWNlcnQuY29tMSAwHgYDVQQDExdEaWdpQ2VydCBHbG9iYWwgUm9vdCBD
QTAeFw0wNjExMTAwMDAwMDBaFw0zMTExMTAwMDAwMDBaMGExCzAJBgNVBAYTAlVT
MRUwEwYDVQQKEwxEaWdpQ2VydCBJbmMxGTAXBgNVBAsTEHd3dy5kaWdpY2VydC5j
b20xIDAeBgNVBAMTF0RpZ2lDZXJ0IEdsb2JhbCBSb290IENBMIIBIjANBgkqhkiG
9w0BAQEFAAOCAQ8AMIIBCgKCAQEA4jvhEXLeqKTTo1eqUKKPC3eQyaKl7hLOllsB
CSDMAZOnTjC3U/dDxGkAV53ijSLdhwZAAIEJzs4bg7/fzTtxRuLWZscFs3YnFo97
nh6Vfe63SKMI2tavegw5BmV/Sl0fvBf4q77uKNd0f3p4mVmFaG5cIzJLv07A6Fpt
43C/dxC//AH2hdmoRBBYMql1GNXRor5H4idq9Joz+EkIYIvUX7Q6hL+hqkpMfT7P
T19sdl6gSzeRntwi5m3OFBqOasv+zbMUZBfHWymeMr/y7vrTC0LUq7dBMtoM1O/4
gdW7jVg/tRvoSSiicNoxBN33shbyTApOB6jtSj1etX+jkMOvJwIDAQABo2MwYTAO
BgNVHQ8BAf8EBAMCAYYwDwYDVR0TAQH/BAUwAwEB/zAdBgNVHQ4EFgQUA95QNVbR
TLtm8KPiGxvDl7I90VUwHwYDVR0jBBgwFoAUA95QNVbRTLtm8KPiGxvDl7I90VUw
DQYJKoZIhvcNAQEFBQADggEBAMucN6pIExIK+t1EnE9SsPTfrgT1eXkIoyQY/Esr
hMAtudXH/vTBH1jLuG2cenTnmCmrEbXjcKChzUyImZOMkXDiqw8cvpOp/2PV5Adg
06O/nVsJ8dWO41P0jmP6P6fbtGbfYmbW0W5BjfIttep3Sp+dWOIrWcBAI+0tKIJF
PnlUkiaY4IBIqDfv8NZ5YBberOgOzW6sRBc4L0na4UU+Krk2U886UAb3LujEV0ls
YSEY1QSteDwsOoBrp+uvFRTp2InBuThs4pFsiv9kuXclVzDAGySj4dzp30d8tbQk
CAUw7C29C79Fv1C5qfPrmAESrciIxpg0X40KPMbp1ZWVbd4=
-----END CERTIFICATE-----
| 54.78125 | 85 | 0.865374 |
f785088e928170ab31e9e3e382756473797445df | 701 | yaml | YAML | mattermost/worker.yaml | rm511130/k8s-antipatterns | bea46379d78025faa59655de2214f87adf1954d9 | [
"Apache-2.0"
] | null | null | null | mattermost/worker.yaml | rm511130/k8s-antipatterns | bea46379d78025faa59655de2214f87adf1954d9 | [
"Apache-2.0"
] | null | null | null | mattermost/worker.yaml | rm511130/k8s-antipatterns | bea46379d78025faa59655de2214f87adf1954d9 | [
"Apache-2.0"
] | 1 | 2021-09-24T06:20:32.000Z | 2021-09-24T06:20:32.000Z | apiVersion: apps/v1
kind: Deployment
metadata:
labels:
app: mattermost
role: mattermost-worker
name: mattermost-worker
namespace: default
spec:
replicas: 1
selector:
matchLabels:
role: mattermost-worker
template:
metadata:
labels:
app: mattermost
role: mattermost-worker
spec:
containers:
- image: __REGISTRY_IP__/mattermost-worker:5.21.0
name: mattermost-worker
ports:
- containerPort: 80
protocol: TCP
volumeMounts:
- name: config-volume
mountPath: /var/mattermost/config
volumes:
- name: config-volume
configMap:
name: mattermost-v1
| 21.242424 | 55 | 0.611983 |
f785badcd5d4aae6ef3a821057705d7c4331fab2 | 3,084 | yaml | YAML | pkg/addons/assets/efa-device-plugin.yaml | Luis-DevOps/eksctl | 1a2c3bd8bfffd5b300f63f3ea8fd8452042be77d | [
"Apache-2.0"
] | 3,871 | 2018-06-05T19:11:38.000Z | 2022-03-31T17:53:22.000Z | pkg/addons/assets/efa-device-plugin.yaml | Luis-DevOps/eksctl | 1a2c3bd8bfffd5b300f63f3ea8fd8452042be77d | [
"Apache-2.0"
] | 3,322 | 2018-06-05T20:07:26.000Z | 2022-03-31T23:25:59.000Z | pkg/addons/assets/efa-device-plugin.yaml | Luis-DevOps/eksctl | 1a2c3bd8bfffd5b300f63f3ea8fd8452042be77d | [
"Apache-2.0"
] | 1,167 | 2018-06-05T20:03:09.000Z | 2022-03-31T23:29:23.000Z | ---
apiVersion: apps/v1
kind: DaemonSet
metadata:
name: aws-efa-k8s-device-plugin-daemonset
namespace: kube-system
spec:
selector:
matchLabels:
name: aws-efa-k8s-device-plugin
updateStrategy:
type: RollingUpdate
template:
metadata:
# This annotation is deprecated. Kept here for backward compatibility
# See https://kubernetes.io/docs/tasks/administer-cluster/guaranteed-scheduling-critical-addon-pods/
annotations:
scheduler.alpha.kubernetes.io/critical-pod: ""
labels:
name: aws-efa-k8s-device-plugin
spec:
serviceAccount: default
tolerations:
- key: CriticalAddonsOnly
operator: Exists
- key: aws.amazon.com/efa
operator: Exists
effect: NoSchedule
# Mark this pod as a critical add-on; when enabled, the critical add-on
# scheduler reserves resources for critical add-on pods so that they can
# be rescheduled after a failure.
# See https://kubernetes.io/docs/tasks/administer-cluster/guaranteed-scheduling-critical-addon-pods/
priorityClassName: "system-node-critical"
affinity:
nodeAffinity:
# EFA supported instances: https://docs.aws.amazon.com/AWSEC2/latest/UserGuide/efa.html#efa-instance-types
requiredDuringSchedulingIgnoredDuringExecution:
nodeSelectorTerms:
- matchExpressions:
- key: "beta.kubernetes.io/instance-type"
operator: In
values:
- c5n.18xlarge
- c5n.metal
- g4dn.metal
- i3en.24xlarge
- i3en.metal
- inf1.24xlarge
- m5dn.24xlarge
- m5n.24xlarge
- p3dn.24xlarge
- r5dn.24xlarge
- r5n.24xlarge
- p4d.24xlarge
- matchExpressions:
- key: "node.kubernetes.io/instance-type"
operator: In
values:
- c5n.18xlarge
- c5n.metal
- g4dn.metal
- i3en.24xlarge
- i3en.metal
- inf1.24xlarge
- m5dn.24xlarge
- m5n.24xlarge
- p3dn.24xlarge
- r5dn.24xlarge
- r5n.24xlarge
- p4d.24xlarge
hostNetwork: true
containers:
- image: "%s.dkr.ecr.%s.%s/eks/aws-efa-k8s-device-plugin:v0.3.3"
name: aws-efa-k8s-device-plugin
securityContext:
allowPrivilegeEscalation: false
capabilities:
drop: ["ALL"]
volumeMounts:
- name: device-plugin
mountPath: /var/lib/kubelet/device-plugins
volumes:
- name: device-plugin
hostPath:
path: /var/lib/kubelet/device-plugins
| 35.860465 | 116 | 0.523671 |
f785f61671983b240fb2567b1546d970814b155d | 2,471 | yaml | YAML | config/prow/cluster/crier_deployment.yaml | kngoutham/test-infra | 9720cce6f1f62be07cb63bfcb1d119b10c819353 | [
"Apache-2.0"
] | null | null | null | config/prow/cluster/crier_deployment.yaml | kngoutham/test-infra | 9720cce6f1f62be07cb63bfcb1d119b10c819353 | [
"Apache-2.0"
] | null | null | null | config/prow/cluster/crier_deployment.yaml | kngoutham/test-infra | 9720cce6f1f62be07cb63bfcb1d119b10c819353 | [
"Apache-2.0"
] | null | null | null | # Copyright 2019 The Kubernetes Authors All rights reserved.
#
# Licensed under the Apache License, Version 2.0 (the "License");
# you may not use this file except in compliance with the License.
# You may obtain a copy of the License at
#
# http://www.apache.org/licenses/LICENSE-2.0
#
# Unless required by applicable law or agreed to in writing, software
# distributed under the License is distributed on an "AS IS" BASIS,
# WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
# See the License for the specific language governing permissions and
# limitations under the License.
apiVersion: apps/v1
kind: Deployment
metadata:
namespace: default
name: crier
labels:
app: crier
spec:
replicas: 1
selector:
matchLabels:
app: crier
template:
metadata:
labels:
app: crier
spec:
serviceAccountName: crier
terminationGracePeriodSeconds: 30
containers:
- name: crier
image: gcr.io/k8s-prow/crier:v20210421-8709509fc9
args:
- --blob-storage-workers=1
- --config-path=/etc/config/config.yaml
- --github-endpoint=http://ghproxy
- --github-endpoint=https://api.github.com
- --github-token-path=/etc/github/oauth
- --github-workers=5
- --job-config-path=/etc/job-config
- --kubernetes-blob-storage-workers=1
- --slack-token-file=/etc/slack/token
- --slack-workers=1
env:
# Use KUBECONFIG envvar rather than --kubeconfig flag in order to provide multiple configs to merge.
- name: KUBECONFIG
value: "/etc/kubeconfig/config"
volumeMounts:
- mountPath: /etc/kubeconfig
name: kubeconfig
readOnly: true
- name: config
mountPath: /etc/config
readOnly: true
- name: job-config
mountPath: /etc/job-config
readOnly: true
- name: oauth
mountPath: /etc/github
readOnly: true
- name: slack
mountPath: /etc/slack
readOnly: true
volumes:
- name: config
configMap:
name: config
- name: job-config
configMap:
name: job-config
- name: oauth
secret:
secretName: oauth-token
- name: slack
secret:
secretName: slack-token
- name: kubeconfig
secret:
defaultMode: 420
secretName: kubeconfig
| 29.070588 | 108 | 0.613517 |
f786727e9dd1760429c78a7b4e265515ec6103de | 12,386 | yaml | YAML | manifests/splunk-kubernetes-logging/configMap.yaml | dengalebr/splunk-connect-for-kubernetes | 20e67c6f2dcf4d06f6efc7cc6763126946a6956f | [
"Apache-2.0"
] | 1 | 2020-03-06T20:07:43.000Z | 2020-03-06T20:07:43.000Z | manifests/splunk-kubernetes-logging/configMap.yaml | dengalebr/splunk-connect-for-kubernetes | 20e67c6f2dcf4d06f6efc7cc6763126946a6956f | [
"Apache-2.0"
] | null | null | null | manifests/splunk-kubernetes-logging/configMap.yaml | dengalebr/splunk-connect-for-kubernetes | 20e67c6f2dcf4d06f6efc7cc6763126946a6956f | [
"Apache-2.0"
] | null | null | null | ---
apiVersion: v1
kind: ConfigMap
metadata:
name: splunk-kubernetes-logging
labels:
app: splunk-kubernetes-logging
version: 1.4.0
data:
fluent.conf: |-
@include system.conf
@include source.containers.conf
@include source.files.conf
@include source.journald.conf
@include monit.conf
@include output.conf
@include prometheus.conf
system.conf: |-
# system wide configurations
<system>
log_level info
root_dir /tmp/fluentd
</system>
prometheus.conf: |-
# input plugin that exports metrics
<source>
@type prometheus
</source>
<source>
@type forward
</source>
# input plugin that collects metrics from MonitorAgent
<source>
@type prometheus_monitor
<labels>
host ${hostname}
</labels>
</source>
# input plugin that collects metrics for output plugin
<source>
@type prometheus_output_monitor
<labels>
host ${hostname}
</labels>
</source>
source.containers.conf: |-
# This configuration file for Fluentd / td-agent is used
# to watch changes to Docker log files. The kubelet creates symlinks that
# capture the pod name, namespace, container name & Docker container ID
# to the docker logs for pods in the /var/log/containers directory on the host.
# If running this fluentd configuration in a Docker container, the /var/log
# directory should be mounted in the container.
# reading kubelet logs from journal
#
# Reference:
# https://github.com/kubernetes/community/blob/20d2f6f5498a5668bae2aea9dcaf4875b9c06ccb/contributors/design-proposals/node/kubelet-cri-logging.md
#
# Json Log Example:
# {"log":"[info:2016-02-16T16:04:05.930-08:00] Some log text here\n","stream":"stdout","time":"2016-02-17T00:04:05.931087621Z"}
# CRI Log Example (not supported):
# 2016-02-17T00:04:05.931087621Z stdout [info:2016-02-16T16:04:05.930-08:00] Some log text here
<source>
@id containers.log
@type tail
@label @SPLUNK
tag tail.containers.*
path /var/log/containers/*.log
pos_file /var/log/splunk-fluentd-containers.log.pos
path_key source
read_from_head true
<parse>
@type json
time_format %Y-%m-%dT%H:%M:%S.%NZ
time_key time
time_type string
localtime false
</parse>
</source>
source.files.conf: |-
# This fluentd conf file contains sources for log files other than container logs.
<source>
@id tail.file.kube-audit
@type tail
@label @SPLUNK
tag tail.file.kube:apiserver-audit
path /var/log/kube-apiserver-audit.log
pos_file /var/log/splunk-fluentd-kube-audit.pos
read_from_head true
path_key source
<parse>
@type regexp
expression /^(?<log>.*)$/
time_key time
time_type string
time_format %Y-%m-%dT%H:%M:%SZ
</parse>
</source>
source.journald.conf: |-
# This fluentd conf file contains configurations for reading logs from systemd journal.
<source>
@id journald-docker
@type systemd
@label @SPLUNK
tag journald.kube:docker
path "/run/log/journal"
matches [{ "_SYSTEMD_UNIT": "docker.service" }]
read_from_head true
<storage>
@type local
persistent true
path /var/log/splunkd-fluentd-journald-docker.pos.json
</storage>
<entry>
field_map {"MESSAGE": "log", "_SYSTEMD_UNIT": "source"}
field_map_strict true
</entry>
</source>
<source>
@id journald-kubelet
@type systemd
@label @SPLUNK
tag journald.kube:kubelet
path "/run/log/journal"
matches [{ "_SYSTEMD_UNIT": "kubelet.service" }]
read_from_head true
<storage>
@type local
persistent true
path /var/log/splunkd-fluentd-journald-kubelet.pos.json
</storage>
<entry>
field_map {"MESSAGE": "log", "_SYSTEMD_UNIT": "source"}
field_map_strict true
</entry>
</source>
monit.conf: |-
<source>
@id fluentd-monitor-agent
@type monitor_agent
@label @SPLUNK
tag monitor_agent
</source>
output.conf: |-
<label @SPLUNK>
# = filters for container logs =
<filter tail.containers.var.log.containers.dns-controller*dns-controller*.log>
@type concat
key log
timeout_label @SPLUNK
stream_identity_key stream
multiline_start_regexp /^\w[0-1]\d[0-3]\d/
flush_interval 5s
separator ""
use_first_timestamp true
</filter>
<filter tail.containers.var.log.containers.kube-dns*sidecar*.log>
@type concat
key log
timeout_label @SPLUNK
stream_identity_key stream
multiline_start_regexp /^\w[0-1]\d[0-3]\d/
flush_interval 5s
separator ""
use_first_timestamp true
</filter>
<filter tail.containers.var.log.containers.kube-dns*dnsmasq*.log>
@type concat
key log
timeout_label @SPLUNK
stream_identity_key stream
multiline_start_regexp /^\w[0-1]\d[0-3]\d/
flush_interval 5s
separator ""
use_first_timestamp true
</filter>
<filter tail.containers.var.log.containers.kube-apiserver*kube-apiserver*.log>
@type concat
key log
timeout_label @SPLUNK
stream_identity_key stream
multiline_start_regexp /^\w[0-1]\d[0-3]\d/
flush_interval 5s
separator ""
use_first_timestamp true
</filter>
<filter tail.containers.var.log.containers.kube-controller-manager*kube-controller-manager*.log>
@type concat
key log
timeout_label @SPLUNK
stream_identity_key stream
multiline_start_regexp /^\w[0-1]\d[0-3]\d/
flush_interval 5s
separator ""
use_first_timestamp true
</filter>
<filter tail.containers.var.log.containers.kube-dns-autoscaler*autoscaler*.log>
@type concat
key log
timeout_label @SPLUNK
stream_identity_key stream
multiline_start_regexp /^\w[0-1]\d[0-3]\d/
flush_interval 5s
separator ""
use_first_timestamp true
</filter>
<filter tail.containers.var.log.containers.kube-proxy*kube-proxy*.log>
@type concat
key log
timeout_label @SPLUNK
stream_identity_key stream
multiline_start_regexp /^\w[0-1]\d[0-3]\d/
flush_interval 5s
separator ""
use_first_timestamp true
</filter>
<filter tail.containers.var.log.containers.kube-scheduler*kube-scheduler*.log>
@type concat
key log
timeout_label @SPLUNK
stream_identity_key stream
multiline_start_regexp /^\w[0-1]\d[0-3]\d/
flush_interval 5s
separator ""
use_first_timestamp true
</filter>
<filter tail.containers.var.log.containers.kube-dns*kubedns*.log>
@type concat
key log
timeout_label @SPLUNK
stream_identity_key stream
multiline_start_regexp /^\w[0-1]\d[0-3]\d/
flush_interval 5s
separator ""
use_first_timestamp true
</filter>
# Enrich log with k8s metadata
<filter tail.containers.**>
@type kubernetes_metadata
annotation_match [ "^splunk\.com" ]
de_dot false
</filter>
<filter tail.containers.**>
@type record_transformer
enable_ruby
<record>
# set the sourcetype from splunk.com/sourcetype pod annotation or set it to kube:container:CONTAINER_NAME
sourcetype ${record.dig("kubernetes", "annotations", "splunk.com/sourcetype") ? "kube:"+record.dig("kubernetes", "annotations", "splunk.com/sourcetype") : "kube:container:"+record.dig("kubernetes","container_name")}
container_name ${record.dig("kubernetes","container_name")}
namespace ${record.dig("kubernetes","namespace_name")}
pod ${record.dig("kubernetes","pod_name")}
container_id ${record.dig("docker","container_id")}
pod_uid ${record.dig("kubernetes","pod_id")}
container_image ${record.dig("kubernetes","container_image")}
# set the cluster_name field to the configured value, or default to "cluster_name"
cluster_name cluster_name
# set the index field to the value found in the pod splunk.com/index annotations. if not set, use namespace annotation, or default to the default_index
index ${record.dig("kubernetes", "annotations", "splunk.com/index") ? record.dig("kubernetes", "annotations", "splunk.com/index") : record.dig("kubernetes", "namespace_annotations", "splunk.com/index") ? (record["kubernetes"]["namespace_annotations"]["splunk.com/index"]) : ("main")}
label_app ${record.dig("kubernetes","labels","app")}
label_k8s-app ${record.dig("kubernetes","labels","k8s-app")}
label_release ${record.dig("kubernetes","labels","release")}
blacklist ${record.dig("kubernetes", "annotations", "splunk.com/exclude") ? record.dig("kubernetes", "annotations", "splunk.com/exclude") : record.dig("kubernetes", "namespace_annotations", "splunk.com/exclude") ? (record["kubernetes"]["namespace_annotations"]["splunk.com/exclude"]) : ("false")}
</record>
</filter>
<filter tail.containers.**>
# Exclude all logs that are blacklisted
@type grep
<exclude>
key blacklist
pattern /^true$/
</exclude>
</filter>
# extract pod_uid and container_name for CRIO runtime
# = filters for journald logs =
<filter journald.kube:kubelet>
@type concat
key log
timeout_label @SPLUNK
multiline_start_regexp /^\w[0-1]\d[0-3]\d/
flush_interval 5s
</filter>
# create source and sourcetype
<filter journald.**>
@type jq_transformer
jq '.record.source = "/run/log/journal/" + .record.source | .record.sourcetype = (.tag | ltrimstr("journald.")) | .record.cluster_name = "cluster_name" | .record.index = "main" |.record'
</filter>
# = filters for non-container log files =
# extract sourcetype
<filter tail.file.**>
@type jq_transformer
jq '.record.sourcetype = (.tag | ltrimstr("tail.file.")) | .record.cluster_name = "cluster_name" | .record.index = "main" | .record'
</filter>
# = filters for monitor agent =
<filter monitor_agent>
@type jq_transformer
jq ".record.source = \"namespace:#{ENV['MY_NAMESPACE']}/pod:#{ENV['MY_POD_NAME']}\" | .record.sourcetype = \"fluentd:monitor-agent\" | .record.cluster_name = \"cluster_name\" | .record.index = \"main\" | .record"
</filter>
# = custom filters specified by users =
# = output =
<match **>
@type splunk_hec
protocol https
hec_host "MY-SPLUNK-HOST"
hec_port 8088
hec_token "#{ENV['SPLUNK_HEC_TOKEN']}"
index_key index
insecure_ssl true
host "#{ENV['K8S_NODE_NAME']}"
source_key source
sourcetype_key sourcetype
<fields>
# currently CRI does not produce log paths with all the necessary
# metadata to parse out pod, namespace, container_name, container_id.
# this may be resolved in the future by this issue: https://github.com/kubernetes/kubernetes/issues/58638#issuecomment-385126031
container_image
pod_uid
pod
container_name
namespace
container_id
cluster_name
label_app
label_k8s-app
label_release
</fields>
<buffer>
@type memory
chunk_limit_records 100000
chunk_limit_size 200m
flush_interval 5s
flush_thread_count 1
overflow_action block
retry_max_times 3
total_limit_size 600m
</buffer>
<format monitor_agent>
@type json
</format>
<format>
# we just want to keep the raw logs, not the structure created by docker or journald
@type single_value
message_key log
add_newline false
</format>
</match>
</label>
| 34.792135 | 306 | 0.6228 |
f786ca6de729cc4ffea379fe5325e49fc0f283f1 | 286 | yaml | YAML | vendor/k8s.io/kubernetes/examples/mysql-cinder-pd/mysql-service.yaml | BinaryTreeNode/KDS | 6220475814b42733c86ac0005e8548bb9a481c75 | [
"Apache-2.0"
] | 1 | 2020-07-02T14:53:18.000Z | 2020-07-02T14:53:18.000Z | vendor/k8s.io/kubernetes/examples/mysql-cinder-pd/mysql-service.yaml | BinaryTreeNode/KDS | 6220475814b42733c86ac0005e8548bb9a481c75 | [
"Apache-2.0"
] | null | null | null | vendor/k8s.io/kubernetes/examples/mysql-cinder-pd/mysql-service.yaml | BinaryTreeNode/KDS | 6220475814b42733c86ac0005e8548bb9a481c75 | [
"Apache-2.0"
] | null | null | null | apiVersion: v1
kind: Service
metadata:
labels:
name: mysql
name: mysql
spec:
ports:
# the port that this service should serve on
- port: 3306
# label keys and values that must match in order to receive traffic for this service
selector:
name: mysql | 22 | 87 | 0.671329 |
f7871a377b8e0339d40bc475722d80ac9a433e4f | 429 | yaml | YAML | readiness/14-readiness-http.yaml | JesusPaz/k8s | 8545e3a14cf1c7690d2e08d6925b7bbcdc4c1b91 | [
"MIT"
] | null | null | null | readiness/14-readiness-http.yaml | JesusPaz/k8s | 8545e3a14cf1c7690d2e08d6925b7bbcdc4c1b91 | [
"MIT"
] | null | null | null | readiness/14-readiness-http.yaml | JesusPaz/k8s | 8545e3a14cf1c7690d2e08d6925b7bbcdc4c1b91 | [
"MIT"
] | null | null | null | apiVersion: v1
kind: Pod
metadata:
name: nginx
labels:
app: nginx
spec:
containers:
- name: nginx
image: nginx/alpine
ports:
- containerPort: 80
readinessProbe:
httpGet:
path: /
port: 80
initialDelaySeconds: 5
periodSeconds: 10
livenessProbe:
tcpSocket:
port: 80
initialDelaySeconds: 15
periodSeconds: 20
| 17.875 | 31 | 0.55711 |
f7876660ace1351843c3d668402c42d65841547e | 332 | yaml | YAML | pod-security-policy/flexvolume-drivers/examples/disallowed.yaml | blairdrummond/gatekeeper-policies | 2bbcd0cf3985945f881c2d18b6db55fb1b4747b3 | [
"MIT"
] | 9 | 2020-05-08T04:14:27.000Z | 2022-03-04T19:55:56.000Z | pod-security-policy/flexvolume-drivers/examples/disallowed.yaml | blairdrummond/gatekeeper-policies | 2bbcd0cf3985945f881c2d18b6db55fb1b4747b3 | [
"MIT"
] | 17 | 2020-08-24T21:09:27.000Z | 2022-03-22T00:02:37.000Z | pod-security-policy/flexvolume-drivers/examples/disallowed.yaml | blairdrummond/gatekeeper-policies | 2bbcd0cf3985945f881c2d18b6db55fb1b4747b3 | [
"MIT"
] | 8 | 2020-05-11T19:42:29.000Z | 2021-08-15T14:52:41.000Z | apiVersion: v1
kind: Pod
metadata:
name: nginx-flexvolume-driver-disallowed
labels:
app: nginx-flexvolume-driver
spec:
containers:
- name: nginx
image: nginx
volumeMounts:
- mountPath: /test
name: test
readOnly: true
volumes:
- name: test
flexVolume:
driver: "example/customdriver"
| 17.473684 | 42 | 0.662651 |
f787b8c6df71bcafa0e7d783240f0910c3eea9e1 | 145 | yaml | YAML | k8s/mongo-secret.yaml | IovanB/run-devops | bfbd42d73dcdadefecf5e162a696b84ee71d51ba | [
"MIT"
] | null | null | null | k8s/mongo-secret.yaml | IovanB/run-devops | bfbd42d73dcdadefecf5e162a696b84ee71d51ba | [
"MIT"
] | null | null | null | k8s/mongo-secret.yaml | IovanB/run-devops | bfbd42d73dcdadefecf5e162a696b84ee71d51ba | [
"MIT"
] | 1 | 2022-02-10T08:52:34.000Z | 2022-02-10T08:52:34.000Z | apiVersion: v1
kind: Secret
metadata:
name: mongo-secret
type: Opaque
data:
mongo-root-username: bW9uZ28=
mongo-root-password: bW9uZ29kYg== | 18.125 | 35 | 0.758621 |
f787d71cf66fe6656a63d636308fdab4b8aecc85 | 1,694 | yaml | YAML | label_sync/cluster/label_sync_cron_job.yaml | jayunit100/test-infra | 7df53966c9636de0d0dfc67b1499605e5d1b0372 | [
"Apache-2.0"
] | null | null | null | label_sync/cluster/label_sync_cron_job.yaml | jayunit100/test-infra | 7df53966c9636de0d0dfc67b1499605e5d1b0372 | [
"Apache-2.0"
] | null | null | null | label_sync/cluster/label_sync_cron_job.yaml | jayunit100/test-infra | 7df53966c9636de0d0dfc67b1499605e5d1b0372 | [
"Apache-2.0"
] | null | null | null | # Copyright 2017 The Kubernetes Authors All rights reserved.
#
# Licensed under the Apache License, Version 2.0 (the "License");
# you may not use this file except in compliance with the License.
# You may obtain a copy of the License at
#
# http://www.apache.org/licenses/LICENSE-2.0
#
# Unless required by applicable law or agreed to in writing, software
# distributed under the License is distributed on an "AS IS" BASIS,
# WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
# See the License for the specific language governing permissions and
# limitations under the License.
---
apiVersion: batch/v1beta1
kind: CronJob
metadata:
name: label-sync
spec:
schedule: "17 * * * *" # Every hour at 17 minutes past the hour
concurrencyPolicy: Forbid
jobTemplate:
metadata:
labels:
app: label-sync
spec:
template:
spec:
containers:
- name: label-sync
image: gcr.io/k8s-prow/label_sync:v20200812-8936af3bd4
args:
- --config=/etc/config/labels.yaml
- --confirm=true
- --orgs=kubernetes,kubernetes-client,kubernetes-csi,kubernetes-incubator,kubernetes-sigs
- --token=/etc/github/oauth
volumeMounts:
- name: oauth
mountPath: /etc/github
readOnly: true
- name: config
mountPath: /etc/config
readOnly: true
restartPolicy: Never
volumes:
- name: oauth
secret:
secretName: oauth-token
- name: config
configMap:
name: label-config
| 32.576923 | 103 | 0.608028 |
f787e06160d829b959da3420810ba67a7deb3240 | 282 | yaml | YAML | k8s/clusters/cluster-1/manifests/home-automation/home-assistant/pvc.yaml | dcplaya/home-ops | d37e07ac1c708cf5c27e426133c4cd9ffa64d003 | [
"Apache-2.0"
] | null | null | null | k8s/clusters/cluster-1/manifests/home-automation/home-assistant/pvc.yaml | dcplaya/home-ops | d37e07ac1c708cf5c27e426133c4cd9ffa64d003 | [
"Apache-2.0"
] | 91 | 2022-02-20T02:36:55.000Z | 2022-03-31T23:59:37.000Z | k8s/clusters/cluster-1/manifests/home-automation/home-assistant/pvc.yaml | dcplaya/home-ops | d37e07ac1c708cf5c27e426133c4cd9ffa64d003 | [
"Apache-2.0"
] | null | null | null | ---
apiVersion: v1
kind: PersistentVolumeClaim
metadata:
name: home-assistant-config-v1
namespace: home-automation
labels:
k10.kasten.io/backup: "true"
spec:
accessModes:
- ReadWriteOnce
resources:
requests:
storage: 1Gi
storageClassName: ceph-block
| 15.666667 | 32 | 0.70922 |
f787f9c4d8d5a656a274b769da1502ed30693d2e | 1,577 | yaml | YAML | MongoDB/MongoDB-posts/mongodb-deployment.yaml | adaptivenetlab/Riset-MicroServices | 70dd22464b6e5c6d5539abc0a0cad9bab4879fe0 | [
"Apache-2.0"
] | null | null | null | MongoDB/MongoDB-posts/mongodb-deployment.yaml | adaptivenetlab/Riset-MicroServices | 70dd22464b6e5c6d5539abc0a0cad9bab4879fe0 | [
"Apache-2.0"
] | null | null | null | MongoDB/MongoDB-posts/mongodb-deployment.yaml | adaptivenetlab/Riset-MicroServices | 70dd22464b6e5c6d5539abc0a0cad9bab4879fe0 | [
"Apache-2.0"
] | null | null | null | apiVersion: apps/v1
kind: Deployment
metadata:
labels:
app: mongo-posts
name: mongo-posts
spec:
replicas: 1
selector:
matchLabels:
app: mongo-posts
strategy: {}
template:
metadata:
labels:
app: mongo-posts
spec:
containers:
- image: mongo:4.4.6
name: mongo-posts
args: ["--dbpath","/data/db"]
livenessProbe:
exec:
command:
- mongo
- --disableImplicitSessions
- --eval
- "db.adminCommand('ping')"
initialDelaySeconds: 30
periodSeconds: 10
timeoutSeconds: 5
successThreshold: 1
failureThreshold: 6
readinessProbe:
exec:
command:
- mongo
- --disableImplicitSessions
- --eval
- "db.adminCommand('ping')"
initialDelaySeconds: 30
periodSeconds: 10
timeoutSeconds: 5
successThreshold: 1
failureThreshold: 6
env:
- name: MONGO_INITDB_ROOT_USERNAME
valueFrom:
secretKeyRef:
name: mongo-creds
key: username
- name: MONGO_INITDB_ROOT_PASSWORD
valueFrom:
secretKeyRef:
name: mongo-creds
key: password
volumeMounts:
- name: "mongo-data-dir-posts"
mountPath: "/data/db"
volumes:
- name: "mongo-data-dir-posts"
persistentVolumeClaim:
claimName: "mongo-data-posts"
| 24.640625 | 42 | 0.513633 |
f7881719932cd03d0a22a107af5599681289dc7c | 2,395 | yaml | YAML | config/manager/operator-deployment.yaml | DoNnMyTh/camel-k | dab66604c12ba81cece7f58819753789517af3b6 | [
"Apache-2.0"
] | null | null | null | config/manager/operator-deployment.yaml | DoNnMyTh/camel-k | dab66604c12ba81cece7f58819753789517af3b6 | [
"Apache-2.0"
] | null | null | null | config/manager/operator-deployment.yaml | DoNnMyTh/camel-k | dab66604c12ba81cece7f58819753789517af3b6 | [
"Apache-2.0"
] | null | null | null | # ---------------------------------------------------------------------------
# Licensed to the Apache Software Foundation (ASF) under one or more
# contributor license agreements. See the NOTICE file distributed with
# this work for additional information regarding copyright ownership.
# The ASF licenses this file to You under the Apache License, Version 2.0
# (the "License"); you may not use this file except in compliance with
# the License. You may obtain a copy of the License at
#
# http://www.apache.org/licenses/LICENSE-2.0
#
# Unless required by applicable law or agreed to in writing, software
# distributed under the License is distributed on an "AS IS" BASIS,
# WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
# See the License for the specific language governing permissions and
# limitations under the License.
# ---------------------------------------------------------------------------
apiVersion: apps/v1
kind: Deployment
metadata:
name: camel-k-operator
labels:
app: "camel-k"
camel.apache.org/component: operator
spec:
replicas: 1
strategy:
type: Recreate
selector:
matchLabels:
name: camel-k-operator
template:
metadata:
labels:
name: camel-k-operator
camel.apache.org/component: operator
app: "camel-k"
spec:
serviceAccountName: camel-k-operator
containers:
- name: camel-k-operator
image: docker.io/apache/camel-k:1.9.0-SNAPSHOT
imagePullPolicy: IfNotPresent
command:
- kamel
- operator
ports:
- containerPort: 8080
name: metrics
env:
- name: WATCH_NAMESPACE
valueFrom:
fieldRef:
fieldPath: metadata.namespace
- name: OPERATOR_NAME
value: "camel-k"
- name: POD_NAME
valueFrom:
fieldRef:
fieldPath: metadata.name
# NAMESPACE is always the operator namespace, independently of WATCH_NAMESPACE
- name: NAMESPACE
valueFrom:
fieldRef:
fieldPath: metadata.namespace
livenessProbe:
httpGet:
path: /healthz
port: 8081
initialDelaySeconds: 20
periodSeconds: 10
| 33.263889 | 90 | 0.5762 |
f7886058c6412e29eb2c84e532933531a3de4fa9 | 144 | yaml | YAML | built-in-references/Kubernetes/perf/violations/violation2987.yaml | sw47/azure-policy | 4a38e4cb4047b5364902653f0defe45f1b21bc61 | [
"MIT"
] | null | null | null | built-in-references/Kubernetes/perf/violations/violation2987.yaml | sw47/azure-policy | 4a38e4cb4047b5364902653f0defe45f1b21bc61 | [
"MIT"
] | null | null | null | built-in-references/Kubernetes/perf/violations/violation2987.yaml | sw47/azure-policy | 4a38e4cb4047b5364902653f0defe45f1b21bc61 | [
"MIT"
] | null | null | null | apiVersion: v1
kind: Pod
metadata:
name: image-demo-2987
spec:
containers:
- name: nginx
image: nginx #ritaacr.azurecr.io/nginx:latest | 18 | 49 | 0.722222 |
f78878a524c5d5b6b4dd7333891fe1b6152f9b44 | 216 | yaml | YAML | APIs/YAMLs/DEV/RatingsWeb/ratingsweb-service.yaml | monojit18/ASHK8sWorkshop | abc326ef2fda57be45f8c238a4542356f34b0ad5 | [
"Apache-2.0"
] | 1 | 2021-04-28T13:40:33.000Z | 2021-04-28T13:40:33.000Z | APIs/YAMLs/DEV/RatingsWeb/ratingsweb-service.yaml | monojit18/ASHK8sWorkshop | abc326ef2fda57be45f8c238a4542356f34b0ad5 | [
"Apache-2.0"
] | null | null | null | APIs/YAMLs/DEV/RatingsWeb/ratingsweb-service.yaml | monojit18/ASHK8sWorkshop | abc326ef2fda57be45f8c238a4542356f34b0ad5 | [
"Apache-2.0"
] | null | null | null | apiVersion: v1
kind: Service
metadata:
name: ratingsweb-service
namespace: ash-workshop-dev
spec:
selector:
app: ratingsweb-pod
ports:
- protocol: TCP
port: 80
targetPort: 8080
type: ClusterIP | 16.615385 | 29 | 0.703704 |
f788a2a85c03f72ef302a9d00402a3a8082d5aa7 | 964 | yaml | YAML | git-ops/timewindow/guestbook/redis-slave-deployment.yaml | ianzhang366/applifecycle-samples | 0117f33ae169a14aaf1942e91e9c5e907a0e1b61 | [
"MIT"
] | null | null | null | git-ops/timewindow/guestbook/redis-slave-deployment.yaml | ianzhang366/applifecycle-samples | 0117f33ae169a14aaf1942e91e9c5e907a0e1b61 | [
"MIT"
] | null | null | null | git-ops/timewindow/guestbook/redis-slave-deployment.yaml | ianzhang366/applifecycle-samples | 0117f33ae169a14aaf1942e91e9c5e907a0e1b61 | [
"MIT"
] | 1 | 2021-10-20T03:56:29.000Z | 2021-10-20T03:56:29.000Z | apiVersion: apps/v1 # for k8s versions before 1.9.0 use apps/v1beta2 and before 1.8.0 use extensions/v1beta1
kind: Deployment
metadata:
name: redis-slave
namespace: guestbook
spec:
selector:
matchLabels:
app: redis
role: slave
tier: backend
replicas: 2
template:
metadata:
labels:
app: redis
role: slave
tier: backend
spec:
containers:
- name: slave
image: gcr.io/google_samples/gb-redisslave:v1
resources:
requests:
cpu: 100m
memory: 100Mi
env:
- name: GET_HOSTS_FROM
value: dns
# If your cluster config does not include a dns service, then to
# instead access an environment variable to find the master
# service's host, comment out the 'value: dns' line above, and
# uncomment the line below:
# value: env
ports:
- containerPort: 6379
| 26.054054 | 110 | 0.590249 |
f788b866e33be4dacbd7109f9c2e1909567d780e | 68,710 | yaml | YAML | operators/portworx/1.8.0/core_v1_storagecluster_crd.yaml | FlorentinDUBOIS/community-operators | b96c7491ec04aa3aac3aaa0299ff35160263d15e | [
"Apache-2.0"
] | 8 | 2021-11-01T11:55:20.000Z | 2022-03-25T19:27:59.000Z | operators/portworx/1.8.0/core_v1_storagecluster_crd.yaml | FlorentinDUBOIS/community-operators | b96c7491ec04aa3aac3aaa0299ff35160263d15e | [
"Apache-2.0"
] | 654 | 2021-10-29T18:50:12.000Z | 2022-03-31T19:10:03.000Z | operators/portworx/1.8.0/core_v1_storagecluster_crd.yaml | FlorentinDUBOIS/community-operators | b96c7491ec04aa3aac3aaa0299ff35160263d15e | [
"Apache-2.0"
] | 273 | 2021-10-30T15:04:04.000Z | 2022-03-31T07:31:24.000Z | apiVersion: apiextensions.k8s.io/v1
kind: CustomResourceDefinition
metadata:
name: storageclusters.core.libopenstorage.org
spec:
group: core.libopenstorage.org
names:
kind: StorageCluster
listKind: StorageClusterList
plural: storageclusters
singular: storagecluster
shortNames:
- stc
scope: Namespaced
versions:
- name: v1
served: true
storage: true
subresources:
status: {}
additionalPrinterColumns:
- description: The unique ID of the storage cluster
jsonPath: .status.clusterUid
name: Cluster UUID
type: string
- description: The status of the storage cluster
jsonPath: .status.phase
name: Status
type: string
- description: The version of the storage cluster
jsonPath: .spec.version
name: Version
type: string
- description: The age of the storage cluster
jsonPath: .metadata.creationTimestamp
name: Age
type: date
schema:
openAPIV3Schema:
type: object
properties:
spec:
type: object
description: The desired behavior of the storage cluster.
properties:
metadata:
type: object
description: Metadata contains metadata for different storage cluster components.
properties:
annotations:
type: object
x-kubernetes-preserve-unknown-fields: true
description: >-
The annotations section of spec is a map of map to pass custom annotations to different
storage cluster components. The key specifies component in format of "kind/component",
e.g. "deployment/stork" to pass custom annotations to stork deployment. The value is a map of
string that contains custom annotation key and value pairs.
labels:
type: object
x-kubernetes-preserve-unknown-fields: true
description: >-
The labels section of spec is a map of map to pass custom labels to different storage cluster
components. The key specifies component in format of "kind/component", e.g. "service/portworx-api"
to pass custom labels to portworx-api service. The value is a map of string that contains custom
label key and value pairs.
resources:
type: object
description: Specifies the compute resource requirements for the storage pod.
properties:
requests:
type: object
description: Requested resources for the storage pod.
properties:
memory:
type: string
description: Requested memory for the storage pod.
cpu:
type: string
description: Requested cpu for the storage pod.
image:
type: string
description: Docker image of the storage driver.
version:
type: string
description: Version of the storage driver. This field is read-only.
imagePullPolicy:
type: string
description: Image pull policy. One of Always, Never, IfNotPresent. Defaults to Always.
imagePullSecret:
type: string
description: Image pull secret is a reference to secret in the same namespace as the
StorageCluster. It is used for pulling all images used by the StorageCluster.
customImageRegistry:
type: string
description: >-
Custom container image registry server that will be used instead of
index.docker.io to download Docker images. This may include the repository as well.
(Example: myregistry.net:5443 or myregistry.com/myrepository)
preserveFullCustomImageRegistry:
type: boolean
description: >-
Setting this to true this stops part of the image tag being swallowed when setting a
customImageRegistry with a / in it. When set to false using a customImageRegistry of
`example.io/public` and an image of `portworx/oci-monitor` the full image path is is
`example.io/public/oci-monitor`, setting to true gives you
`example.io/public/portworx/oci-monitor`. Defaults to false
secretsProvider:
type: string
description: Secrets provider is the name of secret provider that driver will connect to.
startPort:
type: integer
format: int32
minimum: 0
description: Start port is the starting port in the range of ports used by the cluster.
autoUpdateComponents:
type: string
description: A strategy to determine how component versions are to be updated automatically.
updateStrategy:
type: object
description: An update strategy to replace existing StorageCluster pods with new pods.
properties:
type:
type: string
description: Type of storage cluster update. Can be RollingUpdate or OnDelete.
Default is RollingUpdate.
enum:
- RollingUpdate
- OnDelete
rollingUpdate:
type: object
description: Spec to control the desired behavior of storage cluster rolling update.
properties:
maxUnavailable:
x-kubernetes-int-or-string: true
description: >-
The maximum number of StorageCluster pods that can be unavailable
during the update. Value can be an absolute number (ex: 5) or a percentage of
total number of StorageCluster pods at the start of the update (ex: 10%).
Absolute number is calculated from percentage by rounding up. This cannot be 0.
Default value is 1. Example: when this is set to 30%, at most 30% of the total
number of nodes that should be running the storage pod can have their pods
stopped for an update at any given time. The update starts by stopping at most
30% of those StorageCluster pods and then brings up new StorageCluster pods in
their place. Once the new pods are available, it then proceeds onto other
StorageCluster pods, thus ensuring that at least 70% of original number of
StorageCluster pods are available at all times during the update.
deleteStrategy:
type: object
description: Delete strategy to uninstall and wipe the storage cluster.
properties:
type:
type: string
description: Type of storage cluster delete. Can be Uninstall or UninstallAndWipe.
There is no default delete strategy. When no delete strategy only objects managed
by the StorageCluster controller and owned by the StorageCluster object are deleted.
The storage driver will be left in a state where it will not be managed by any object.
Uninstall strategy ensures that the cluster is completely uninstalled even from the
storage driver perspective. UninstallAndWipe strategy ensures that the cluster is
completely uninstalled as well as the storage devices and metadata are wiped for
reuse. This may result in data loss.
enum:
- Uninstall
- UninstallAndWipe
revisionHistoryLimit:
type: integer
format: int32
description: The number of old history to retain to allow rollback. This is a pointer
to distinguish between an explicit zero and not specified. Defaults to 10.
featureGates:
type: object
x-kubernetes-preserve-unknown-fields: true
description: This is a map of feature names to string values.
runtimeOptions:
type: object
x-kubernetes-preserve-unknown-fields: true
description: This is map of any runtime options that need to be sent to the storage
driver. The value is a string.
placement:
type: object
description: Describes placement configuration for the storage cluster pods.
properties:
nodeAffinity:
type: object
description: Describes node affinity scheduling rules for the storage cluster pods.
This is exactly the same object as Kubernetes node affinity for pods.
properties:
requiredDuringSchedulingIgnoredDuringExecution:
type: object
properties:
nodeSelectorTerms:
type: array
items:
type: object
properties:
matchExpressions:
type: array
items:
type: object
properties:
key:
type: string
operator:
type: string
values:
type: array
items:
type: string
required:
- key
- operator
matchFields:
type: array
items:
type: object
properties:
key:
type: string
operator:
type: string
values:
type: array
items:
type: string
required:
- key
- operator
required:
- nodeSelectorTerms
preferredDuringSchedulingIgnoredDuringExecution:
type: array
items:
type: object
properties:
weight:
type: integer
preference:
type: object
properties:
matchExpressions:
type: array
items:
type: object
properties:
key:
type: string
operator:
type: string
values:
type: array
items:
type: string
required:
- key
- operator
matchFields:
type: array
items:
type: object
properties:
key:
type: string
operator:
type: string
values:
type: array
items:
type: string
required:
- key
- operator
required:
- preference
- weight
tolerations:
type: array
description: Tolerations for all the pods deployed by the StorageCluster controller.
The pod with this toleration attached will tolerate any taint that matches the
triple <key,value,effect> using the matching operator <operator>.
items:
type: object
properties:
effect:
type: string
description: Effect indicates the taint effect to match. Empty means match
all taint effects. When specified, allowed values are NoSchedule,
PreferNoSchedule and NoExecute.
key:
type: string
description: Key is the taint key that the toleration applies to. Empty means
match all taint keys. If the key is empty, operator must be Exists; this
combination means to match all values and all keys.
operator:
type: string
description: "Operator represents a key's relationship to the value. Valid
operators are Exists and Equal. Defaults to Equal. Exists is equivalent to
wildcard for value, so that a pod can tolerate all taints of a particular category."
value:
type: string
description: Value is the taint value the toleration matches to. If the operator
is Exists, the value should be empty, otherwise just a regular string.
tolerationSeconds:
type: integer
description: TolerationSeconds represents the period of time the toleration
(which must be of effect NoExecute, otherwise this field is ignored) tolerates
the taint. By default, it is not set, which means tolerate the taint forever
(do not evict). Zero and negative values will be treated as 0 (evict
immediately) by the system.
kvdb:
type: object
description: Details of KVDB that the storage driver will use.
properties:
internal:
type: boolean
description: Flag indicating whether to use internal KVDB or an external KVDB.
endpoints:
type: array
description: If using external KVDB, this is the list of KVDB endpoints.
items:
type: string
authSecret:
type: string
description: Authentication secret is the name of Kubernetes secret containing
information to authenticate with the external KVDB. It could have the username/password
for basic auth, certificate information or an ACL token.
storage:
type: object
description: Details of the storage used by the storage driver.
properties:
useAll:
type: boolean
description: Use all available, unformatted, unpartitioned devices. This will be
ignored if spec.storage.devices is not empty.
useAllWithPartitions:
type: boolean
description: Use all available unformatted devices. This will be
ignored if spec.storage.devices is not empty.
forceUseDisks:
type: boolean
description: Flag indicating to use the devices even if there is file system present
on it. Note that the devices may be wiped before using.
devices:
type: array
description: List of devices to be used by the storage driver.
items:
type: string
cacheDevices:
type: array
description: List of cache devices to be used by the storage driver.
items:
type: string
journalDevice:
type: string
description: Device used for journaling.
systemMetadataDevice:
type: string
description: Device that will be used to store system metadata by the driver.
kvdbDevice:
type: string
description: Device used for internal KVDB.
cloudStorage:
type: object
description: Details of storage used in cloud environment.
properties:
provider:
type: string
description: Cloud provider name.
maxStorageNodes:
type: integer
format: int32
minimum: 0
description: Maximum nodes that will have storage in the cluster.
maxStorageNodesPerZone:
type: integer
format: int32
minimum: 0
description: Maximum nodes in every zone that will have storage in the cluster.
maxStorageNodesPerZonePerNodeGroup:
type: integer
format: int32
minimum: 0
description: Maximum nodes in every zone in every node group that will have storage
in the cluster.
nodePoolLabel:
type: string
description: Kubernetes node label key with which nodes are grouped into node pools
for storage distribution in cloud environment.
deviceSpecs:
type: array
description: List of storage device specs. A cloud storage device will be created
for every spec in the list. The specs will be applied to all nodes in the cluster
up to spec.cloudStorage.maxStorageNodes or spec.cloudStorage.maxStorageNodesPerZone
or spec.cloudStorage.maxStorageNodesPerZonePerNodeGroup.
This will be ignored if spec.cloudStorage.capacitySpecs is present.
items:
type: string
capacitySpecs:
type: array
description: List of cluster wide storage types and their capacities. A single
capacity spec identifies a storage pool with a set of minimum requested IOPS
and size. Based on the cloud provider, the total storage capacity will get
divided amongst the nodes. The nodes bearing storage themselves will get
uniformly distributed across all the zones.
items:
type: object
properties:
minIOPS:
type: integer
format: int64
minimum: 0
description: Minimum IOPS expected from the cloud drive.
minCapacityInGiB:
type: integer
format: int64
minimum: 0
description: Minimum capacity for this storage cluster. The total capacity
of devices created by this capacity spec should not be less than this
number for the entire cluster.
maxCapacityInGiB:
type: integer
format: int64
minimum: 0
description: Maximum capacity for this storage cluster. The total capacity
of devices created by this capacity spec should not be greater than this
number for the entire cluster.
options:
type: object
x-kubernetes-preserve-unknown-fields: true
description: Additional options required to provision the drive in cloud.
journalDeviceSpec:
type: string
description: Device spec for the journal device.
systemMetadataDeviceSpec:
type: string
description: Device spec for the metadata device. This device will be used to store
system metadata by the driver.
kvdbDeviceSpec:
type: string
description: Device spec for internal KVDB device.
network:
type: object
description: Contains network information that is needed by the storage driver.
properties:
dataInterface:
type: string
description: Name of the network interface used by the storage driver for data traffic.
mgmtInterface:
type: string
description: Name of the network interface used by the storage driver for management traffic.
stork:
type: object
description: Contains STORK related spec.
properties:
enabled:
type: boolean
description: Flag indicating whether STORK needs to be enabled.
lockImage:
type: boolean
description: Flag indicating if the STORK image needs to be locked to the given image.
If the image is not locked, it can be updated by the storage driver during upgrades.
image:
type: string
description: Docker image of the STORK container.
hostNetwork:
type: boolean
description: Flag indicating if Stork pods should run in host network.
args:
type: object
x-kubernetes-preserve-unknown-fields: true
description: >-
It is map of arguments given to STORK. Example: driver: pxd
env:
type: array
description: List of environment variables used by STORK. This is an array of
Kubernetes EnvVar where the value can be given directly or from a source like field,
config map or secret.
items:
type: object
properties:
name:
type: string
value:
type: string
valueFrom:
type: object
properties:
configMapKeyRef:
type: object
properties:
key:
type: string
name:
type: string
optional:
type: boolean
fieldRef:
type: object
properties:
apiVersion:
type: string
fieldPath:
type: string
resourceFieldRef:
type: object
properties:
containerName:
type: string
divisor:
type: string
resource:
type: string
secretKeyRef:
type: object
properties:
key:
type: string
name:
type: string
optional:
type: boolean
volumes:
type: array
items:
type: object
properties:
name:
type: string
readOnly:
type: boolean
mountPath:
type: string
mountPropagation:
type: string
hostPath:
type: object
properties:
path:
type: string
type:
type: string
secret:
type: object
properties:
secretName:
type: string
defaultMode:
type: integer
optional:
type: boolean
items:
type: array
items:
type: object
properties:
key:
type: string
path:
type: string
mode:
type: integer
configMap:
type: object
properties:
name:
type: string
defaultMode:
type: integer
optional:
type: boolean
items:
type: array
items:
type: object
properties:
key:
type: string
path:
type: string
mode:
type: integer
projected:
type: object
properties:
defaultMode:
type: integer
sources:
type: array
items:
type: object
properties:
secret:
type: object
properties:
name:
type: string
optional:
type: boolean
items:
type: array
items:
type: object
properties:
key:
type: string
path:
type: string
mode:
type: integer
configMap:
type: object
properties:
name:
type: string
optional:
type: boolean
items:
type: array
items:
type: object
properties:
key:
type: string
path:
type: string
mode:
type: integer
userInterface:
type: object
description: Contains spec of a user interface for the storage driver.
properties:
enabled:
type: boolean
description: Flag indicating whether the user interface needs to be enabled.
lockImage:
type: boolean
description: Flag indicating if the user interface image needs to be locked to the given
image. If the image is not locked, it can be updated by the storage driver during upgrades.
image:
type: string
description: Docker image of the user interface container.
env:
type: array
description: List of environment variables used by the UI components. This is an array
of Kubernetes EnvVar where the value can be given directly or from a source like field,
config map or secret.
items:
type: object
properties:
name:
type: string
value:
type: string
valueFrom:
type: object
properties:
configMapKeyRef:
type: object
properties:
key:
type: string
name:
type: string
optional:
type: boolean
fieldRef:
type: object
properties:
apiVersion:
type: string
fieldPath:
type: string
resourceFieldRef:
type: object
properties:
containerName:
type: string
divisor:
type: string
resource:
type: string
secretKeyRef:
type: object
properties:
key:
type: string
name:
type: string
optional:
type: boolean
autopilot:
type: object
description: Contains spec of autopilot component for storage driver.
properties:
enabled:
type: boolean
description: Flag indicating whether autopilot needs to be enabled.
lockImage:
type: boolean
description: Flag indicating if the autopilot image needs to be locked to the given image.
If the image is not locked, it can be updated by the storage driver during upgrades.
image:
type: string
description: Docker image of the autopilot container.
args:
type: object
x-kubernetes-preserve-unknown-fields: true
description: >-
It is a map of arguments provided to autopilot. Example: log-level: debug
env:
type: array
description: List of environment variables used by autopilot. This is an array of
Kubernetes EnvVar where the value can be given directly or from a source like field,
config map or secret.
items:
type: object
properties:
name:
type: string
value:
type: string
valueFrom:
type: object
properties:
configMapKeyRef:
type: object
properties:
key:
type: string
name:
type: string
optional:
type: boolean
fieldRef:
type: object
properties:
apiVersion:
type: string
fieldPath:
type: string
resourceFieldRef:
type: object
properties:
containerName:
type: string
divisor:
type: string
resource:
type: string
secretKeyRef:
type: object
properties:
key:
type: string
name:
type: string
optional:
type: boolean
volumes:
type: array
items:
type: object
properties:
name:
type: string
readOnly:
type: boolean
mountPath:
type: string
mountPropagation:
type: string
hostPath:
type: object
properties:
path:
type: string
type:
type: string
secret:
type: object
properties:
secretName:
type: string
defaultMode:
type: integer
optional:
type: boolean
items:
type: array
items:
type: object
properties:
key:
type: string
path:
type: string
mode:
type: integer
configMap:
type: object
properties:
name:
type: string
defaultMode:
type: integer
optional:
type: boolean
items:
type: array
items:
type: object
properties:
key:
type: string
path:
type: string
mode:
type: integer
projected:
type: object
properties:
defaultMode:
type: integer
sources:
type: array
items:
type: object
properties:
secret:
type: object
properties:
name:
type: string
optional:
type: boolean
items:
type: array
items:
type: object
properties:
key:
type: string
path:
type: string
mode:
type: integer
configMap:
type: object
properties:
name:
type: string
optional:
type: boolean
items:
type: array
items:
type: object
properties:
key:
type: string
path:
type: string
mode:
type: integer
providers:
type: array
description: List of input data providers to autopilot.
items:
type: object
properties:
name:
type: string
description: Unique name of the data provider.
type:
type: string
description: Type of the data provider. For instance - prometheus
params:
type: object
x-kubernetes-preserve-unknown-fields: true
description: Map of key-value params for the provider.
monitoring:
type: object
description: Contains monitoring configuration for the storage cluster.
properties:
enableMetrics:
type: boolean
description: "If this flag is enabled it will expose the storage cluster metrics to external
monitoring solutions like Prometheus. DEPRECATED - use prometheus.exportMetrics instead"
prometheus:
type: object
description: Contains configuration of Prometheus to monitor the storage cluster.
properties:
exportMetrics:
type: boolean
description: If this flag is enabled it will expose the storage cluster metrics to Prometheus.
enabled:
type: boolean
description: Flag indicating whether Prometheus stack needs to be enabled and deployed
by the Storage operator.
remoteWriteEndpoint:
type: string
description: Specifies the remote write endpoint for Prometheus.
alertManager:
type: object
description: Contains configuration of AlertManager for the storage cluster.
properties:
enabled:
type: boolean
description: Flag indicating whether AlertManager needs to be enabled and deployed
by the Storage operator.
telemetry:
type: object
description: Contains telemetry configuration for the storage cluster.
properties:
enabled:
type: boolean
description: Flag indicates if telemetry component needs to be enabled
image:
type: string
description: Docker image of the telemetry container.
security:
type: object
description: Contains security configuration for the storage cluster.
properties:
enabled:
type: boolean
description: Flag indicating whether security features need to be enabled for the storage cluster.
auth:
type: object
description: Authorization configurations for a RBAC enabled storage cluster
properties:
guestAccess:
type: string
description: Defines the access mode of a guest user
selfSigned:
type: object
description: Configuration for self signed authentication
properties:
issuer:
type: string
description: Token issuer for the tokens used to connect with storage cluster.
tokenLifetime:
type: string
description: Lifetime of auto-generated RBAC tokens to access the storage cluster.
sharedSecret:
type: string
description: Shared secret is the name of the Kubernetes secret containing the shared key
used for signing RBAC tokens. The secret has to be present in the StorageCluster namespace.
csi:
type: object
description: Contains CSI configuration for the storage cluster.
properties:
enabled:
type: boolean
description: Flag indicating whether CSI needs to be installed for the storage cluster.
installSnapshotController:
type: boolean
description: Flag indicating whether CSI Snapshot Controller needs to be installed for the storage cluster.
env:
type: array
description: List of environment variables used by the driver. This is an array of Kubernetes
EnvVar where the value can be given directly or from a source like field, config map or secret.
items:
type: object
properties:
name:
type: string
value:
type: string
valueFrom:
type: object
properties:
configMapKeyRef:
type: object
properties:
key:
type: string
name:
type: string
optional:
type: boolean
fieldRef:
type: object
properties:
apiVersion:
type: string
fieldPath:
type: string
resourceFieldRef:
type: object
properties:
containerName:
type: string
divisor:
type: string
resource:
type: string
secretKeyRef:
type: object
properties:
key:
type: string
name:
type: string
optional:
type: boolean
volumes:
type: array
items:
type: object
properties:
name:
type: string
readOnly:
type: boolean
mountPath:
type: string
mountPropagation:
type: string
hostPath:
type: object
properties:
path:
type: string
type:
type: string
secret:
type: object
properties:
secretName:
type: string
defaultMode:
type: integer
optional:
type: boolean
items:
type: array
items:
type: object
properties:
key:
type: string
path:
type: string
mode:
type: integer
configMap:
type: object
properties:
name:
type: string
defaultMode:
type: integer
optional:
type: boolean
items:
type: array
items:
type: object
properties:
key:
type: string
path:
type: string
mode:
type: integer
projected:
type: object
properties:
defaultMode:
type: integer
sources:
type: array
items:
type: object
properties:
secret:
type: object
properties:
name:
type: string
optional:
type: boolean
items:
type: array
items:
type: object
properties:
key:
type: string
path:
type: string
mode:
type: integer
configMap:
type: object
properties:
name:
type: string
optional:
type: boolean
items:
type: array
items:
type: object
properties:
key:
type: string
path:
type: string
mode:
type: integer
nodes:
type: array
description: Node level configurations that will override the configuration at cluster level.
These configurations can be for individual nodes or can be grouped to override configuration
of multiple nodes based on label selectors.
items:
type: object
properties:
selector:
type: object
description: Configuration in this node block is applied to nodes based on this selector.
Use either nodeName of labelSelector, not both. If nodeName is used, labelSelector will
be ignored.
properties:
nodeName:
type: string
description: Name of the Kubernetes node that is to be selected. If present then the
labelSelector is ignored even if the node with the given name is absent and the
labelSelector matches another node.
labelSelector:
type: object
description: It is a label query over all the nodes. The result of matchLabels and
matchExpressions is ANDed. An empty label selector matches all nodes. A null
label selector matches no objects.
properties:
matchLabels:
type: object
x-kubernetes-preserve-unknown-fields: true
description: It is a map of key-value pairs. A single key-value in the matchLabels
map is equivalent to an element of matchExpressions, whose key field is "key", the
operator is "In", and the values array contains only "value". The requirements are ANDed.
matchExpressions:
type: array
description: It is a list of label selector requirements. The requirements are ANDed.
items:
type: object
properties:
key:
type: string
description: It is the label key that the selector applies to.
operator:
type: string
description: "It represents a key's relationship to a set of values. Valid operators
are In, NotIn, Exists and DoesNotExist."
values:
type: array
description: It is an array of string values. If the operator is In or NotIn,
the values array must be non-empty. If the operator is Exists or DoesNotExist,
the values array must be empty.
items:
type: string
storage:
type: object
description: Details of the storage used by the storage driver.
properties:
useAll:
type: boolean
description: Use all available, unformatted, unpartitioned devices. This will be
ignored if spec.storage.devices is not empty.
useAllWithPartitions:
type: boolean
description: Use all available unformatted devices. This will be
ignored if spec.storage.devices is not empty.
forceUseDisks:
type: boolean
description: Flag indicating to use the devices even if there is file system present
on it. Note that the devices may be wiped before using.
devices:
type: array
description: List of devices to be used by the storage driver.
items:
type: string
cacheDevices:
type: array
description: List of cache devices to be used by the storage driver.
items:
type: string
journalDevice:
type: string
description: Device used for journaling.
systemMetadataDevice:
type: string
description: Device that will be used to store system metadata by the driver.
kvdbDevice:
type: string
description: Device used for internal KVDB.
cloudStorage:
type: object
description: Details of storage used in cloud environment.
properties:
deviceSpecs:
type: array
description: List of storage device specs. A cloud storage device will be created
for every spec in the list. The specs will be applied to all nodes in the cluster
that match the node group selector. The number of nodes that will come up with
storage are constrained by maxStorageNodes, maxStorageNodesPerZone and
maxStorageNodesPerZonePerNodeGroup.
items:
type: string
journalDeviceSpec:
type: string
description: Device spec for the journal device.
systemMetadataDeviceSpec:
type: string
description: Device spec for the metadata device. This device will be used to store
system metadata by the driver.
kvdbDeviceSpec:
type: string
description: Device spec for internal KVDB device.
maxStorageNodesPerZonePerNodeGroup:
type: integer
format: int32
minimum: 0
description: Maximum nodes in every zone in every node group that will have storage
in the cluster.
network:
type: object
description: Contains network information that is needed by the storage driver.
properties:
dataInterface:
type: string
description: Name of the network interface used by the storage driver for data traffic.
mgmtInterface:
type: string
description: Name of the network interface used by the storage driver for
management traffic.
runtimeOptions:
type: object
x-kubernetes-preserve-unknown-fields: true
description: This is map of any runtime options that need to be sent to the storage
driver. The value is a string. If runtime options are present here at node level,
they will override the ones from cluster configuration.
env:
type: array
description: List of environment variables used by the driver. This is an array
of Kubernetes EnvVar where the value can be given directly or from a source
like field, config map or secret. Environment variables specified here at the
node level will be merged with the ones present in cluster configuration and
sent to the nodes. If there is duplicate, the node level value will take precedence.
items:
type: object
properties:
name:
type: string
value:
type: string
valueFrom:
type: object
properties:
configMapKeyRef:
type: object
properties:
key:
type: string
name:
type: string
optional:
type: boolean
fieldRef:
type: object
properties:
apiVersion:
type: string
fieldPath:
type: string
resourceFieldRef:
type: object
properties:
containerName:
type: string
divisor:
type: string
resource:
type: string
secretKeyRef:
type: object
properties:
key:
type: string
name:
type: string
optional:
type: boolean
status:
type: object
description: Most recently observed status of the storage cluster. This data may not be up to date.
properties:
clusterName:
type: string
description: Name of the storage cluster.
version:
type: string
description: Version of the storage driver.
clusterUid:
type: string
description: Unique ID of the storage cluster.
phase:
type: string
description: Phase of the StorageCluster is a simple, high-level summary of where the
StorageCluster is in its lifecycle. The condition array contains more detailed
information about the state of the cluster.
collisionCount:
type: integer
format: int32
description: Count of hash collisions for the StorageCluster. The StorageCluster controller
uses this field as a collision avoidance mechanism when it needs to create the name of
the newest ControllerRevision.
storage:
type: object
description: Contains details of storage in the cluster.
properties:
storageNodesPerZone:
type: integer
format: int64
description: The number of storage nodes per zone in the cluster.
desiredImages:
type: object
description: Represents all the desired images of various components.
properties:
stork:
type: string
description: Desired image for stork.
userInterface:
type: string
description: Desired image for user interface.
autopilot:
type: string
description: Desired image for autopilot.
csiNodeDriverRegistrar:
type: string
description: Desired image for CSI node driver registrar.
csiDriverRegistrar:
type: string
description: Desired image for CSI driver registrar.
csiProvisioner:
type: string
description: Desired image for CSI provisioner.
csiAttacher:
type: string
description: Desired image for CSI attacher.
csiResizer:
type: string
description: Desired image for CSI resizer.
csiSnapshotter:
type: string
description: Desired image for CSI snapshotter.
csiSnapshotController:
type: string
description: Desired image for CSI snapshot controller.
csiHealthMonitorController:
type: string
description: Desired image for CSI health monitor controller.
prometheusOperator:
type: string
description: Desired image for Prometheus operator.
prometheusConfigMapReload:
type: string
description: Desired image for Prometheus config map reload.
prometheusConfigReloader:
type: string
description: Desired image for Prometheus config reloader.
prometheus:
type: string
description: Desired image for Prometheus.
alertManager:
type: string
description: Desired image for AlertManager.
telemetry:
type: string
description: Desired image for telemetry.
metricsCollector:
type: string
description: Desired image for metrics collector.
metricsCollectorProxy:
type: string
description: Desired image for metrics collector proxy.
conditions:
type: array
description: Contains details for the current condition of this cluster.
items:
type: object
properties:
type:
type: string
description: Type of the condition.
status:
type: string
description: Status of the condition.
reason:
type: string
description: Reason is human readable message indicating details about the current
state of the cluster.
- name: v1alpha1
served: false
storage: false
subresources:
status: {}
schema:
openAPIV3Schema:
type: object
x-kubernetes-preserve-unknown-fields: true
| 48.661473 | 127 | 0.39428 |
f788d353d61309df8f743afd0094b53ada0190f0 | 358 | yaml | YAML | kubernetes-monitoring/service.yaml | otus-kuber-2019-12/igorsidorov2019_platform | e0c3df1504b4019c27bb2be19101e966384a34f2 | [
"MIT"
] | null | null | null | kubernetes-monitoring/service.yaml | otus-kuber-2019-12/igorsidorov2019_platform | e0c3df1504b4019c27bb2be19101e966384a34f2 | [
"MIT"
] | 2 | 2020-01-17T10:27:19.000Z | 2020-03-06T14:39:18.000Z | kubernetes-monitoring/service.yaml | otus-kuber-2019-12/igorsidorov2019_platform | e0c3df1504b4019c27bb2be19101e966384a34f2 | [
"MIT"
] | null | null | null | apiVersion: v1
kind: Service
metadata:
name: nginx-service
namespace: monitoring
labels:
app: nginx-service
prometheus: default
spec:
selector:
app: nginx-mon
type: ClusterIP
ports:
- name: web
protocol: TCP
port: 80
targetPort: 80
- name: metrics
protocol: TCP
port: 9113
targetPort: 9113
| 16.272727 | 23 | 0.628492 |
f789af8e562d8d59748603c032b0fd4745374777 | 858 | yml | YAML | docs/recipes/docker-server/kubernetes/lhci-deployment.yml | revolunet/lighthouse-ci | 44c4e7dd15877d32073c15f7f4084918eb14e9b5 | [
"Apache-2.0"
] | null | null | null | docs/recipes/docker-server/kubernetes/lhci-deployment.yml | revolunet/lighthouse-ci | 44c4e7dd15877d32073c15f7f4084918eb14e9b5 | [
"Apache-2.0"
] | 1 | 2021-02-24T03:52:14.000Z | 2021-02-24T03:52:14.000Z | docs/recipes/docker-server/kubernetes/lhci-deployment.yml | revolunet/lighthouse-ci | 44c4e7dd15877d32073c15f7f4084918eb14e9b5 | [
"Apache-2.0"
] | null | null | null | apiVersion: apps/v1
kind: Deployment
metadata:
name: lhci-server
spec:
selector:
matchLabels:
name: lhci-server
# there can be only one pod at a time because of the persistent volume claim
strategy:
type: Recreate
template:
metadata:
name: lhci-pod
labels:
name: lhci-server
spec:
containers:
- name: lhci-server
image: docker.io/patrickhulce/lhci-server:0.6.1
volumeMounts:
- mountPath: '/data'
name: lhci-data-volume
# required for ingress health checks to work
ports:
- containerPort: 9001
readinessProbe:
httpGet:
path: /healthz
port: 9001
volumes:
- name: lhci-data-volume
persistentVolumeClaim:
claimName: lhci-data-claim
| 24.514286 | 78 | 0.572261 |