hexsha
stringlengths 40
40
| size
int64 24
1.05M
| ext
stringclasses 2
values | lang
stringclasses 1
value | max_stars_repo_path
stringlengths 5
269
| max_stars_repo_name
stringlengths 7
107
| max_stars_repo_head_hexsha
stringlengths 40
78
| max_stars_repo_licenses
sequence | max_stars_count
int64 1
84.9k
⌀ | max_stars_repo_stars_event_min_datetime
stringlengths 24
24
⌀ | max_stars_repo_stars_event_max_datetime
stringlengths 24
24
⌀ | max_issues_repo_path
stringlengths 5
269
| max_issues_repo_name
stringlengths 7
107
| max_issues_repo_head_hexsha
stringlengths 40
78
| max_issues_repo_licenses
sequence | max_issues_count
int64 1
116k
⌀ | max_issues_repo_issues_event_min_datetime
stringlengths 24
24
⌀ | max_issues_repo_issues_event_max_datetime
stringlengths 24
24
⌀ | max_forks_repo_path
stringlengths 5
269
| max_forks_repo_name
stringlengths 7
107
| max_forks_repo_head_hexsha
stringlengths 40
78
| max_forks_repo_licenses
sequence | max_forks_count
int64 1
55.9k
⌀ | max_forks_repo_forks_event_min_datetime
stringlengths 24
24
⌀ | max_forks_repo_forks_event_max_datetime
stringlengths 24
24
⌀ | content
stringlengths 24
1.05M
| avg_line_length
float64 1
304k
| max_line_length
int64 14
1.03M
| alphanum_fraction
float64 0
1
|
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
f74108a0bff0536e7fbdc6690e829272375abbfe | 154,954 | yaml | YAML | manifests/crds/cluster-analysis-template-crd.yaml | ekmixon/argo-rollouts | 75cdde7606cc5fdcd4254ba44960f1d61ff7c67a | [
"Apache-2.0"
] | null | null | null | manifests/crds/cluster-analysis-template-crd.yaml | ekmixon/argo-rollouts | 75cdde7606cc5fdcd4254ba44960f1d61ff7c67a | [
"Apache-2.0"
] | null | null | null | manifests/crds/cluster-analysis-template-crd.yaml | ekmixon/argo-rollouts | 75cdde7606cc5fdcd4254ba44960f1d61ff7c67a | [
"Apache-2.0"
] | null | null | null | apiVersion: apiextensions.k8s.io/v1
kind: CustomResourceDefinition
metadata:
annotations:
controller-gen.kubebuilder.io/version: v0.5.0
name: clusteranalysistemplates.argoproj.io
spec:
group: argoproj.io
names:
kind: ClusterAnalysisTemplate
listKind: ClusterAnalysisTemplateList
plural: clusteranalysistemplates
shortNames:
- cat
singular: clusteranalysistemplate
preserveUnknownFields: false
scope: Cluster
versions:
- name: v1alpha1
schema:
openAPIV3Schema:
properties:
apiVersion:
type: string
kind:
type: string
metadata:
type: object
spec:
properties:
args:
items:
properties:
name:
type: string
value:
type: string
valueFrom:
properties:
fieldRef:
properties:
fieldPath:
type: string
required:
- fieldPath
type: object
secretKeyRef:
properties:
key:
type: string
name:
type: string
required:
- key
- name
type: object
type: object
required:
- name
type: object
type: array
metrics:
items:
properties:
consecutiveErrorLimit:
anyOf:
- type: integer
- type: string
x-kubernetes-int-or-string: true
count:
anyOf:
- type: integer
- type: string
x-kubernetes-int-or-string: true
failureCondition:
type: string
failureLimit:
anyOf:
- type: integer
- type: string
x-kubernetes-int-or-string: true
inconclusiveLimit:
anyOf:
- type: integer
- type: string
x-kubernetes-int-or-string: true
initialDelay:
type: string
interval:
type: string
name:
type: string
provider:
properties:
cloudWatch:
properties:
interval:
type: string
metricDataQueries:
items:
properties:
expression:
type: string
id:
type: string
label:
type: string
metricStat:
properties:
metric:
properties:
dimensions:
items:
properties:
name:
type: string
value:
type: string
type: object
type: array
metricName:
type: string
namespace:
type: string
type: object
period:
anyOf:
- type: integer
- type: string
x-kubernetes-int-or-string: true
stat:
type: string
unit:
type: string
type: object
period:
anyOf:
- type: integer
- type: string
x-kubernetes-int-or-string: true
returnData:
type: boolean
type: object
type: array
required:
- metricDataQueries
type: object
datadog:
properties:
interval:
type: string
query:
type: string
required:
- query
type: object
graphite:
properties:
address:
type: string
query:
type: string
type: object
job:
properties:
metadata:
properties:
annotations:
additionalProperties:
type: string
type: object
labels:
additionalProperties:
type: string
type: object
type: object
spec:
properties:
activeDeadlineSeconds:
format: int64
type: integer
backoffLimit:
format: int32
type: integer
completions:
format: int32
type: integer
manualSelector:
type: boolean
parallelism:
format: int32
type: integer
selector:
properties:
matchExpressions:
items:
properties:
key:
type: string
operator:
type: string
values:
items:
type: string
type: array
required:
- key
- operator
type: object
type: array
matchLabels:
additionalProperties:
type: string
type: object
type: object
template:
properties:
metadata:
properties:
annotations:
additionalProperties:
type: string
type: object
labels:
additionalProperties:
type: string
type: object
type: object
spec:
properties:
activeDeadlineSeconds:
format: int64
type: integer
affinity:
properties:
nodeAffinity:
properties:
preferredDuringSchedulingIgnoredDuringExecution:
items:
properties:
preference:
properties:
matchExpressions:
items:
properties:
key:
type: string
operator:
type: string
values:
items:
type: string
type: array
required:
- key
- operator
type: object
type: array
matchFields:
items:
properties:
key:
type: string
operator:
type: string
values:
items:
type: string
type: array
required:
- key
- operator
type: object
type: array
type: object
weight:
format: int32
type: integer
required:
- preference
- weight
type: object
type: array
requiredDuringSchedulingIgnoredDuringExecution:
properties:
nodeSelectorTerms:
items:
properties:
matchExpressions:
items:
properties:
key:
type: string
operator:
type: string
values:
items:
type: string
type: array
required:
- key
- operator
type: object
type: array
matchFields:
items:
properties:
key:
type: string
operator:
type: string
values:
items:
type: string
type: array
required:
- key
- operator
type: object
type: array
type: object
type: array
required:
- nodeSelectorTerms
type: object
type: object
podAffinity:
properties:
preferredDuringSchedulingIgnoredDuringExecution:
items:
properties:
podAffinityTerm:
properties:
labelSelector:
properties:
matchExpressions:
items:
properties:
key:
type: string
operator:
type: string
values:
items:
type: string
type: array
required:
- key
- operator
type: object
type: array
matchLabels:
additionalProperties:
type: string
type: object
type: object
namespaces:
items:
type: string
type: array
topologyKey:
type: string
required:
- topologyKey
type: object
weight:
format: int32
type: integer
required:
- podAffinityTerm
- weight
type: object
type: array
requiredDuringSchedulingIgnoredDuringExecution:
items:
properties:
labelSelector:
properties:
matchExpressions:
items:
properties:
key:
type: string
operator:
type: string
values:
items:
type: string
type: array
required:
- key
- operator
type: object
type: array
matchLabels:
additionalProperties:
type: string
type: object
type: object
namespaces:
items:
type: string
type: array
topologyKey:
type: string
required:
- topologyKey
type: object
type: array
type: object
podAntiAffinity:
properties:
preferredDuringSchedulingIgnoredDuringExecution:
items:
properties:
podAffinityTerm:
properties:
labelSelector:
properties:
matchExpressions:
items:
properties:
key:
type: string
operator:
type: string
values:
items:
type: string
type: array
required:
- key
- operator
type: object
type: array
matchLabels:
additionalProperties:
type: string
type: object
type: object
namespaces:
items:
type: string
type: array
topologyKey:
type: string
required:
- topologyKey
type: object
weight:
format: int32
type: integer
required:
- podAffinityTerm
- weight
type: object
type: array
requiredDuringSchedulingIgnoredDuringExecution:
items:
properties:
labelSelector:
properties:
matchExpressions:
items:
properties:
key:
type: string
operator:
type: string
values:
items:
type: string
type: array
required:
- key
- operator
type: object
type: array
matchLabels:
additionalProperties:
type: string
type: object
type: object
namespaces:
items:
type: string
type: array
topologyKey:
type: string
required:
- topologyKey
type: object
type: array
type: object
type: object
automountServiceAccountToken:
type: boolean
containers:
items:
properties:
args:
items:
type: string
type: array
command:
items:
type: string
type: array
env:
items:
properties:
name:
type: string
value:
type: string
valueFrom:
properties:
configMapKeyRef:
properties:
key:
type: string
name:
type: string
optional:
type: boolean
required:
- key
type: object
fieldRef:
properties:
apiVersion:
type: string
fieldPath:
type: string
required:
- fieldPath
type: object
resourceFieldRef:
properties:
containerName:
type: string
divisor:
anyOf:
- type: integer
- type: string
pattern: ^(\+|-)?(([0-9]+(\.[0-9]*)?)|(\.[0-9]+))(([KMGTPE]i)|[numkMGTPE]|([eE](\+|-)?(([0-9]+(\.[0-9]*)?)|(\.[0-9]+))))?$
x-kubernetes-int-or-string: true
resource:
type: string
required:
- resource
type: object
secretKeyRef:
properties:
key:
type: string
name:
type: string
optional:
type: boolean
required:
- key
type: object
type: object
required:
- name
type: object
type: array
envFrom:
items:
properties:
configMapRef:
properties:
name:
type: string
optional:
type: boolean
type: object
prefix:
type: string
secretRef:
properties:
name:
type: string
optional:
type: boolean
type: object
type: object
type: array
image:
type: string
imagePullPolicy:
type: string
lifecycle:
properties:
postStart:
properties:
exec:
properties:
command:
items:
type: string
type: array
type: object
httpGet:
properties:
host:
type: string
httpHeaders:
items:
properties:
name:
type: string
value:
type: string
required:
- name
- value
type: object
type: array
path:
type: string
port:
anyOf:
- type: integer
- type: string
x-kubernetes-int-or-string: true
scheme:
type: string
required:
- port
type: object
tcpSocket:
properties:
host:
type: string
port:
anyOf:
- type: integer
- type: string
x-kubernetes-int-or-string: true
required:
- port
type: object
type: object
preStop:
properties:
exec:
properties:
command:
items:
type: string
type: array
type: object
httpGet:
properties:
host:
type: string
httpHeaders:
items:
properties:
name:
type: string
value:
type: string
required:
- name
- value
type: object
type: array
path:
type: string
port:
anyOf:
- type: integer
- type: string
x-kubernetes-int-or-string: true
scheme:
type: string
required:
- port
type: object
tcpSocket:
properties:
host:
type: string
port:
anyOf:
- type: integer
- type: string
x-kubernetes-int-or-string: true
required:
- port
type: object
type: object
type: object
livenessProbe:
properties:
exec:
properties:
command:
items:
type: string
type: array
type: object
failureThreshold:
format: int32
type: integer
httpGet:
properties:
host:
type: string
httpHeaders:
items:
properties:
name:
type: string
value:
type: string
required:
- name
- value
type: object
type: array
path:
type: string
port:
anyOf:
- type: integer
- type: string
x-kubernetes-int-or-string: true
scheme:
type: string
required:
- port
type: object
initialDelaySeconds:
format: int32
type: integer
periodSeconds:
format: int32
type: integer
successThreshold:
format: int32
type: integer
tcpSocket:
properties:
host:
type: string
port:
anyOf:
- type: integer
- type: string
x-kubernetes-int-or-string: true
required:
- port
type: object
timeoutSeconds:
format: int32
type: integer
type: object
name:
type: string
ports:
items:
properties:
containerPort:
format: int32
type: integer
hostIP:
type: string
hostPort:
format: int32
type: integer
name:
type: string
protocol:
default: TCP
type: string
required:
- containerPort
type: object
type: array
x-kubernetes-list-map-keys:
- containerPort
- protocol
x-kubernetes-list-type: map
readinessProbe:
properties:
exec:
properties:
command:
items:
type: string
type: array
type: object
failureThreshold:
format: int32
type: integer
httpGet:
properties:
host:
type: string
httpHeaders:
items:
properties:
name:
type: string
value:
type: string
required:
- name
- value
type: object
type: array
path:
type: string
port:
anyOf:
- type: integer
- type: string
x-kubernetes-int-or-string: true
scheme:
type: string
required:
- port
type: object
initialDelaySeconds:
format: int32
type: integer
periodSeconds:
format: int32
type: integer
successThreshold:
format: int32
type: integer
tcpSocket:
properties:
host:
type: string
port:
anyOf:
- type: integer
- type: string
x-kubernetes-int-or-string: true
required:
- port
type: object
timeoutSeconds:
format: int32
type: integer
type: object
resources:
properties:
limits:
x-kubernetes-preserve-unknown-fields: true
requests:
x-kubernetes-preserve-unknown-fields: true
type: object
securityContext:
properties:
allowPrivilegeEscalation:
type: boolean
capabilities:
properties:
add:
items:
type: string
type: array
drop:
items:
type: string
type: array
type: object
privileged:
type: boolean
procMount:
type: string
readOnlyRootFilesystem:
type: boolean
runAsGroup:
format: int64
type: integer
runAsNonRoot:
type: boolean
runAsUser:
format: int64
type: integer
seLinuxOptions:
properties:
level:
type: string
role:
type: string
type:
type: string
user:
type: string
type: object
seccompProfile:
properties:
localhostProfile:
type: string
type:
type: string
required:
- type
type: object
windowsOptions:
properties:
gmsaCredentialSpec:
type: string
gmsaCredentialSpecName:
type: string
runAsUserName:
type: string
type: object
type: object
startupProbe:
properties:
exec:
properties:
command:
items:
type: string
type: array
type: object
failureThreshold:
format: int32
type: integer
httpGet:
properties:
host:
type: string
httpHeaders:
items:
properties:
name:
type: string
value:
type: string
required:
- name
- value
type: object
type: array
path:
type: string
port:
anyOf:
- type: integer
- type: string
x-kubernetes-int-or-string: true
scheme:
type: string
required:
- port
type: object
initialDelaySeconds:
format: int32
type: integer
periodSeconds:
format: int32
type: integer
successThreshold:
format: int32
type: integer
tcpSocket:
properties:
host:
type: string
port:
anyOf:
- type: integer
- type: string
x-kubernetes-int-or-string: true
required:
- port
type: object
timeoutSeconds:
format: int32
type: integer
type: object
stdin:
type: boolean
stdinOnce:
type: boolean
terminationMessagePath:
type: string
terminationMessagePolicy:
type: string
tty:
type: boolean
volumeDevices:
items:
properties:
devicePath:
type: string
name:
type: string
required:
- devicePath
- name
type: object
type: array
volumeMounts:
items:
properties:
mountPath:
type: string
mountPropagation:
type: string
name:
type: string
readOnly:
type: boolean
subPath:
type: string
subPathExpr:
type: string
required:
- mountPath
- name
type: object
type: array
workingDir:
type: string
required:
- name
type: object
type: array
dnsConfig:
properties:
nameservers:
items:
type: string
type: array
options:
items:
properties:
name:
type: string
value:
type: string
type: object
type: array
searches:
items:
type: string
type: array
type: object
dnsPolicy:
type: string
enableServiceLinks:
type: boolean
ephemeralContainers:
items:
properties:
args:
items:
type: string
type: array
command:
items:
type: string
type: array
env:
items:
properties:
name:
type: string
value:
type: string
valueFrom:
properties:
configMapKeyRef:
properties:
key:
type: string
name:
type: string
optional:
type: boolean
required:
- key
type: object
fieldRef:
properties:
apiVersion:
type: string
fieldPath:
type: string
required:
- fieldPath
type: object
resourceFieldRef:
properties:
containerName:
type: string
divisor:
anyOf:
- type: integer
- type: string
pattern: ^(\+|-)?(([0-9]+(\.[0-9]*)?)|(\.[0-9]+))(([KMGTPE]i)|[numkMGTPE]|([eE](\+|-)?(([0-9]+(\.[0-9]*)?)|(\.[0-9]+))))?$
x-kubernetes-int-or-string: true
resource:
type: string
required:
- resource
type: object
secretKeyRef:
properties:
key:
type: string
name:
type: string
optional:
type: boolean
required:
- key
type: object
type: object
required:
- name
type: object
type: array
envFrom:
items:
properties:
configMapRef:
properties:
name:
type: string
optional:
type: boolean
type: object
prefix:
type: string
secretRef:
properties:
name:
type: string
optional:
type: boolean
type: object
type: object
type: array
image:
type: string
imagePullPolicy:
type: string
lifecycle:
properties:
postStart:
properties:
exec:
properties:
command:
items:
type: string
type: array
type: object
httpGet:
properties:
host:
type: string
httpHeaders:
items:
properties:
name:
type: string
value:
type: string
required:
- name
- value
type: object
type: array
path:
type: string
port:
anyOf:
- type: integer
- type: string
x-kubernetes-int-or-string: true
scheme:
type: string
required:
- port
type: object
tcpSocket:
properties:
host:
type: string
port:
anyOf:
- type: integer
- type: string
x-kubernetes-int-or-string: true
required:
- port
type: object
type: object
preStop:
properties:
exec:
properties:
command:
items:
type: string
type: array
type: object
httpGet:
properties:
host:
type: string
httpHeaders:
items:
properties:
name:
type: string
value:
type: string
required:
- name
- value
type: object
type: array
path:
type: string
port:
anyOf:
- type: integer
- type: string
x-kubernetes-int-or-string: true
scheme:
type: string
required:
- port
type: object
tcpSocket:
properties:
host:
type: string
port:
anyOf:
- type: integer
- type: string
x-kubernetes-int-or-string: true
required:
- port
type: object
type: object
type: object
livenessProbe:
properties:
exec:
properties:
command:
items:
type: string
type: array
type: object
failureThreshold:
format: int32
type: integer
httpGet:
properties:
host:
type: string
httpHeaders:
items:
properties:
name:
type: string
value:
type: string
required:
- name
- value
type: object
type: array
path:
type: string
port:
anyOf:
- type: integer
- type: string
x-kubernetes-int-or-string: true
scheme:
type: string
required:
- port
type: object
initialDelaySeconds:
format: int32
type: integer
periodSeconds:
format: int32
type: integer
successThreshold:
format: int32
type: integer
tcpSocket:
properties:
host:
type: string
port:
anyOf:
- type: integer
- type: string
x-kubernetes-int-or-string: true
required:
- port
type: object
timeoutSeconds:
format: int32
type: integer
type: object
name:
type: string
ports:
items:
properties:
containerPort:
format: int32
type: integer
hostIP:
type: string
hostPort:
format: int32
type: integer
name:
type: string
protocol:
default: TCP
type: string
required:
- containerPort
type: object
type: array
readinessProbe:
properties:
exec:
properties:
command:
items:
type: string
type: array
type: object
failureThreshold:
format: int32
type: integer
httpGet:
properties:
host:
type: string
httpHeaders:
items:
properties:
name:
type: string
value:
type: string
required:
- name
- value
type: object
type: array
path:
type: string
port:
anyOf:
- type: integer
- type: string
x-kubernetes-int-or-string: true
scheme:
type: string
required:
- port
type: object
initialDelaySeconds:
format: int32
type: integer
periodSeconds:
format: int32
type: integer
successThreshold:
format: int32
type: integer
tcpSocket:
properties:
host:
type: string
port:
anyOf:
- type: integer
- type: string
x-kubernetes-int-or-string: true
required:
- port
type: object
timeoutSeconds:
format: int32
type: integer
type: object
resources:
properties:
limits:
x-kubernetes-preserve-unknown-fields: true
requests:
x-kubernetes-preserve-unknown-fields: true
type: object
securityContext:
properties:
allowPrivilegeEscalation:
type: boolean
capabilities:
properties:
add:
items:
type: string
type: array
drop:
items:
type: string
type: array
type: object
privileged:
type: boolean
procMount:
type: string
readOnlyRootFilesystem:
type: boolean
runAsGroup:
format: int64
type: integer
runAsNonRoot:
type: boolean
runAsUser:
format: int64
type: integer
seLinuxOptions:
properties:
level:
type: string
role:
type: string
type:
type: string
user:
type: string
type: object
seccompProfile:
properties:
localhostProfile:
type: string
type:
type: string
required:
- type
type: object
windowsOptions:
properties:
gmsaCredentialSpec:
type: string
gmsaCredentialSpecName:
type: string
runAsUserName:
type: string
type: object
type: object
startupProbe:
properties:
exec:
properties:
command:
items:
type: string
type: array
type: object
failureThreshold:
format: int32
type: integer
httpGet:
properties:
host:
type: string
httpHeaders:
items:
properties:
name:
type: string
value:
type: string
required:
- name
- value
type: object
type: array
path:
type: string
port:
anyOf:
- type: integer
- type: string
x-kubernetes-int-or-string: true
scheme:
type: string
required:
- port
type: object
initialDelaySeconds:
format: int32
type: integer
periodSeconds:
format: int32
type: integer
successThreshold:
format: int32
type: integer
tcpSocket:
properties:
host:
type: string
port:
anyOf:
- type: integer
- type: string
x-kubernetes-int-or-string: true
required:
- port
type: object
timeoutSeconds:
format: int32
type: integer
type: object
stdin:
type: boolean
stdinOnce:
type: boolean
targetContainerName:
type: string
terminationMessagePath:
type: string
terminationMessagePolicy:
type: string
tty:
type: boolean
volumeDevices:
items:
properties:
devicePath:
type: string
name:
type: string
required:
- devicePath
- name
type: object
type: array
volumeMounts:
items:
properties:
mountPath:
type: string
mountPropagation:
type: string
name:
type: string
readOnly:
type: boolean
subPath:
type: string
subPathExpr:
type: string
required:
- mountPath
- name
type: object
type: array
workingDir:
type: string
required:
- name
type: object
type: array
hostAliases:
items:
properties:
hostnames:
items:
type: string
type: array
ip:
type: string
type: object
type: array
hostIPC:
type: boolean
hostNetwork:
type: boolean
hostPID:
type: boolean
hostname:
type: string
imagePullSecrets:
items:
properties:
name:
type: string
type: object
type: array
initContainers:
items:
properties:
args:
items:
type: string
type: array
command:
items:
type: string
type: array
env:
items:
properties:
name:
type: string
value:
type: string
valueFrom:
properties:
configMapKeyRef:
properties:
key:
type: string
name:
type: string
optional:
type: boolean
required:
- key
type: object
fieldRef:
properties:
apiVersion:
type: string
fieldPath:
type: string
required:
- fieldPath
type: object
resourceFieldRef:
properties:
containerName:
type: string
divisor:
anyOf:
- type: integer
- type: string
pattern: ^(\+|-)?(([0-9]+(\.[0-9]*)?)|(\.[0-9]+))(([KMGTPE]i)|[numkMGTPE]|([eE](\+|-)?(([0-9]+(\.[0-9]*)?)|(\.[0-9]+))))?$
x-kubernetes-int-or-string: true
resource:
type: string
required:
- resource
type: object
secretKeyRef:
properties:
key:
type: string
name:
type: string
optional:
type: boolean
required:
- key
type: object
type: object
required:
- name
type: object
type: array
envFrom:
items:
properties:
configMapRef:
properties:
name:
type: string
optional:
type: boolean
type: object
prefix:
type: string
secretRef:
properties:
name:
type: string
optional:
type: boolean
type: object
type: object
type: array
image:
type: string
imagePullPolicy:
type: string
lifecycle:
properties:
postStart:
properties:
exec:
properties:
command:
items:
type: string
type: array
type: object
httpGet:
properties:
host:
type: string
httpHeaders:
items:
properties:
name:
type: string
value:
type: string
required:
- name
- value
type: object
type: array
path:
type: string
port:
anyOf:
- type: integer
- type: string
x-kubernetes-int-or-string: true
scheme:
type: string
required:
- port
type: object
tcpSocket:
properties:
host:
type: string
port:
anyOf:
- type: integer
- type: string
x-kubernetes-int-or-string: true
required:
- port
type: object
type: object
preStop:
properties:
exec:
properties:
command:
items:
type: string
type: array
type: object
httpGet:
properties:
host:
type: string
httpHeaders:
items:
properties:
name:
type: string
value:
type: string
required:
- name
- value
type: object
type: array
path:
type: string
port:
anyOf:
- type: integer
- type: string
x-kubernetes-int-or-string: true
scheme:
type: string
required:
- port
type: object
tcpSocket:
properties:
host:
type: string
port:
anyOf:
- type: integer
- type: string
x-kubernetes-int-or-string: true
required:
- port
type: object
type: object
type: object
livenessProbe:
properties:
exec:
properties:
command:
items:
type: string
type: array
type: object
failureThreshold:
format: int32
type: integer
httpGet:
properties:
host:
type: string
httpHeaders:
items:
properties:
name:
type: string
value:
type: string
required:
- name
- value
type: object
type: array
path:
type: string
port:
anyOf:
- type: integer
- type: string
x-kubernetes-int-or-string: true
scheme:
type: string
required:
- port
type: object
initialDelaySeconds:
format: int32
type: integer
periodSeconds:
format: int32
type: integer
successThreshold:
format: int32
type: integer
tcpSocket:
properties:
host:
type: string
port:
anyOf:
- type: integer
- type: string
x-kubernetes-int-or-string: true
required:
- port
type: object
timeoutSeconds:
format: int32
type: integer
type: object
name:
type: string
ports:
items:
properties:
containerPort:
format: int32
type: integer
hostIP:
type: string
hostPort:
format: int32
type: integer
name:
type: string
protocol:
default: TCP
type: string
required:
- containerPort
type: object
type: array
x-kubernetes-list-map-keys:
- containerPort
- protocol
x-kubernetes-list-type: map
readinessProbe:
properties:
exec:
properties:
command:
items:
type: string
type: array
type: object
failureThreshold:
format: int32
type: integer
httpGet:
properties:
host:
type: string
httpHeaders:
items:
properties:
name:
type: string
value:
type: string
required:
- name
- value
type: object
type: array
path:
type: string
port:
anyOf:
- type: integer
- type: string
x-kubernetes-int-or-string: true
scheme:
type: string
required:
- port
type: object
initialDelaySeconds:
format: int32
type: integer
periodSeconds:
format: int32
type: integer
successThreshold:
format: int32
type: integer
tcpSocket:
properties:
host:
type: string
port:
anyOf:
- type: integer
- type: string
x-kubernetes-int-or-string: true
required:
- port
type: object
timeoutSeconds:
format: int32
type: integer
type: object
resources:
properties:
limits:
x-kubernetes-preserve-unknown-fields: true
requests:
x-kubernetes-preserve-unknown-fields: true
type: object
securityContext:
properties:
allowPrivilegeEscalation:
type: boolean
capabilities:
properties:
add:
items:
type: string
type: array
drop:
items:
type: string
type: array
type: object
privileged:
type: boolean
procMount:
type: string
readOnlyRootFilesystem:
type: boolean
runAsGroup:
format: int64
type: integer
runAsNonRoot:
type: boolean
runAsUser:
format: int64
type: integer
seLinuxOptions:
properties:
level:
type: string
role:
type: string
type:
type: string
user:
type: string
type: object
seccompProfile:
properties:
localhostProfile:
type: string
type:
type: string
required:
- type
type: object
windowsOptions:
properties:
gmsaCredentialSpec:
type: string
gmsaCredentialSpecName:
type: string
runAsUserName:
type: string
type: object
type: object
startupProbe:
properties:
exec:
properties:
command:
items:
type: string
type: array
type: object
failureThreshold:
format: int32
type: integer
httpGet:
properties:
host:
type: string
httpHeaders:
items:
properties:
name:
type: string
value:
type: string
required:
- name
- value
type: object
type: array
path:
type: string
port:
anyOf:
- type: integer
- type: string
x-kubernetes-int-or-string: true
scheme:
type: string
required:
- port
type: object
initialDelaySeconds:
format: int32
type: integer
periodSeconds:
format: int32
type: integer
successThreshold:
format: int32
type: integer
tcpSocket:
properties:
host:
type: string
port:
anyOf:
- type: integer
- type: string
x-kubernetes-int-or-string: true
required:
- port
type: object
timeoutSeconds:
format: int32
type: integer
type: object
stdin:
type: boolean
stdinOnce:
type: boolean
terminationMessagePath:
type: string
terminationMessagePolicy:
type: string
tty:
type: boolean
volumeDevices:
items:
properties:
devicePath:
type: string
name:
type: string
required:
- devicePath
- name
type: object
type: array
volumeMounts:
items:
properties:
mountPath:
type: string
mountPropagation:
type: string
name:
type: string
readOnly:
type: boolean
subPath:
type: string
subPathExpr:
type: string
required:
- mountPath
- name
type: object
type: array
workingDir:
type: string
required:
- name
type: object
type: array
nodeName:
type: string
nodeSelector:
additionalProperties:
type: string
type: object
overhead:
additionalProperties:
anyOf:
- type: integer
- type: string
pattern: ^(\+|-)?(([0-9]+(\.[0-9]*)?)|(\.[0-9]+))(([KMGTPE]i)|[numkMGTPE]|([eE](\+|-)?(([0-9]+(\.[0-9]*)?)|(\.[0-9]+))))?$
x-kubernetes-int-or-string: true
type: object
preemptionPolicy:
type: string
priority:
format: int32
type: integer
priorityClassName:
type: string
readinessGates:
items:
properties:
conditionType:
type: string
required:
- conditionType
type: object
type: array
restartPolicy:
type: string
runtimeClassName:
type: string
schedulerName:
type: string
securityContext:
properties:
fsGroup:
format: int64
type: integer
fsGroupChangePolicy:
type: string
runAsGroup:
format: int64
type: integer
runAsNonRoot:
type: boolean
runAsUser:
format: int64
type: integer
seLinuxOptions:
properties:
level:
type: string
role:
type: string
type:
type: string
user:
type: string
type: object
seccompProfile:
properties:
localhostProfile:
type: string
type:
type: string
required:
- type
type: object
supplementalGroups:
items:
format: int64
type: integer
type: array
sysctls:
items:
properties:
name:
type: string
value:
type: string
required:
- name
- value
type: object
type: array
windowsOptions:
properties:
gmsaCredentialSpec:
type: string
gmsaCredentialSpecName:
type: string
runAsUserName:
type: string
type: object
type: object
serviceAccount:
type: string
serviceAccountName:
type: string
setHostnameAsFQDN:
type: boolean
shareProcessNamespace:
type: boolean
subdomain:
type: string
terminationGracePeriodSeconds:
format: int64
type: integer
tolerations:
items:
properties:
effect:
type: string
key:
type: string
operator:
type: string
tolerationSeconds:
format: int64
type: integer
value:
type: string
type: object
type: array
topologySpreadConstraints:
items:
properties:
labelSelector:
properties:
matchExpressions:
items:
properties:
key:
type: string
operator:
type: string
values:
items:
type: string
type: array
required:
- key
- operator
type: object
type: array
matchLabels:
additionalProperties:
type: string
type: object
type: object
maxSkew:
format: int32
type: integer
topologyKey:
type: string
whenUnsatisfiable:
type: string
required:
- maxSkew
- topologyKey
- whenUnsatisfiable
type: object
type: array
x-kubernetes-list-map-keys:
- topologyKey
- whenUnsatisfiable
x-kubernetes-list-type: map
volumes:
x-kubernetes-preserve-unknown-fields: true
required:
- containers
type: object
type: object
ttlSecondsAfterFinished:
format: int32
type: integer
required:
- template
type: object
required:
- spec
type: object
kayenta:
properties:
address:
type: string
application:
type: string
canaryConfigName:
type: string
configurationAccountName:
type: string
metricsAccountName:
type: string
scopes:
items:
properties:
controlScope:
properties:
end:
type: string
region:
type: string
scope:
type: string
start:
type: string
step:
format: int64
type: integer
required:
- end
- region
- scope
- start
- step
type: object
experimentScope:
properties:
end:
type: string
region:
type: string
scope:
type: string
start:
type: string
step:
format: int64
type: integer
required:
- end
- region
- scope
- start
- step
type: object
name:
type: string
required:
- controlScope
- experimentScope
- name
type: object
type: array
storageAccountName:
type: string
threshold:
properties:
marginal:
format: int64
type: integer
pass:
format: int64
type: integer
required:
- marginal
- pass
type: object
required:
- address
- application
- canaryConfigName
- configurationAccountName
- metricsAccountName
- scopes
- storageAccountName
- threshold
type: object
newRelic:
properties:
profile:
type: string
query:
type: string
required:
- query
type: object
prometheus:
properties:
address:
type: string
query:
type: string
type: object
wavefront:
properties:
address:
type: string
query:
type: string
type: object
web:
properties:
body:
type: string
headers:
items:
properties:
key:
type: string
value:
type: string
required:
- key
- value
type: object
type: array
insecure:
type: boolean
jsonPath:
type: string
method:
type: string
timeoutSeconds:
format: int64
type: integer
url:
type: string
required:
- url
type: object
type: object
successCondition:
type: string
required:
- name
- provider
type: object
type: array
required:
- metrics
type: object
required:
- spec
type: object
served: true
storage: true
| 62.255524 | 184 | 0.155052 |
f74111f3b0fc2cd931e01568bda15fbbc5b1d3e4 | 316 | yaml | YAML | app-helm/templates/deployment-api.yaml | theindiangeek/exercises | 5acca0a900e080e152cde78be4fd6911457a68ae | [
"MIT"
] | null | null | null | app-helm/templates/deployment-api.yaml | theindiangeek/exercises | 5acca0a900e080e152cde78be4fd6911457a68ae | [
"MIT"
] | null | null | null | app-helm/templates/deployment-api.yaml | theindiangeek/exercises | 5acca0a900e080e152cde78be4fd6911457a68ae | [
"MIT"
] | null | null | null | apiVersion: apps/v1
kind: Deployment
metadata:
name: api
spec:
replicas: 3
selector:
matchLabels:
app: api
template:
metadata:
labels:
app: api
spec:
containers:
- name: api
image: theindiangeek/edjx-api:latest
ports:
- containerPort: 8081
| 15.8 | 44 | 0.585443 |
f74128ebf3768f9f3b758ce137df4a7fb6b863c6 | 235,252 | yaml | YAML | apps/cluster-api/capo/manifests/03-cni.yaml | Jeremy-Boyle/asi-project | a17e563ded830993c2b73ada035b6039b11e15d8 | [
"MIT"
] | null | null | null | apps/cluster-api/capo/manifests/03-cni.yaml | Jeremy-Boyle/asi-project | a17e563ded830993c2b73ada035b6039b11e15d8 | [
"MIT"
] | null | null | null | apps/cluster-api/capo/manifests/03-cni.yaml | Jeremy-Boyle/asi-project | a17e563ded830993c2b73ada035b6039b11e15d8 | [
"MIT"
] | null | null | null | ---
apiVersion: v1
data:
calico-3-21.yaml: |+
---
# Source: calico/templates/calico-config.yaml
# This ConfigMap is used to configure a self-hosted Calico installation.
kind: ConfigMap
apiVersion: v1
metadata:
name: calico-config
namespace: kube-system
data:
# Typha is disabled.
typha_service_name: "none"
# Configure the backend to use.
calico_backend: "bird"
# Configure the MTU to use for workload interfaces and tunnels.
# By default, MTU is auto-detected, and explicitly setting this field should not be required.
# You can override auto-detection by providing a non-zero value.
veth_mtu: "0"
# The CNI network configuration to install on each node. The special
# values in this config will be automatically populated.
cni_network_config: |-
{
"name": "k8s-pod-network",
"cniVersion": "0.3.1",
"plugins": [
{
"type": "calico",
"log_level": "info",
"log_file_path": "/var/log/calico/cni/cni.log",
"datastore_type": "kubernetes",
"nodename": "__KUBERNETES_NODE_NAME__",
"mtu": __CNI_MTU__,
"ipam": {
"type": "calico-ipam"
},
"policy": {
"type": "k8s"
},
"kubernetes": {
"kubeconfig": "__KUBECONFIG_FILEPATH__"
}
},
{
"type": "portmap",
"snat": true,
"capabilities": {"portMappings": true}
},
{
"type": "bandwidth",
"capabilities": {"bandwidth": true}
}
]
}
---
# Source: calico/templates/kdd-crds.yaml
apiVersion: apiextensions.k8s.io/v1
kind: CustomResourceDefinition
metadata:
name: bgpconfigurations.crd.projectcalico.org
spec:
group: crd.projectcalico.org
names:
kind: BGPConfiguration
listKind: BGPConfigurationList
plural: bgpconfigurations
singular: bgpconfiguration
scope: Cluster
versions:
- name: v1
schema:
openAPIV3Schema:
description: BGPConfiguration contains the configuration for any BGP routing.
properties:
apiVersion:
description: 'APIVersion defines the versioned schema of this representation
of an object. Servers should convert recognized schemas to the latest
internal value, and may reject unrecognized values. More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#resources'
type: string
kind:
description: 'Kind is a string value representing the REST resource this
object represents. Servers may infer this from the endpoint the client
submits requests to. Cannot be updated. In CamelCase. More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#types-kinds'
type: string
metadata:
type: object
spec:
description: BGPConfigurationSpec contains the values of the BGP configuration.
properties:
asNumber:
description: 'ASNumber is the default AS number used by a node. [Default:
64512]'
format: int32
type: integer
communities:
description: Communities is a list of BGP community values and their
arbitrary names for tagging routes.
items:
description: Community contains standard or large community value
and its name.
properties:
name:
description: Name given to community value.
type: string
value:
description: Value must be of format `aa:nn` or `aa:nn:mm`.
For standard community use `aa:nn` format, where `aa` and
`nn` are 16 bit number. For large community use `aa:nn:mm`
format, where `aa`, `nn` and `mm` are 32 bit number. Where,
`aa` is an AS Number, `nn` and `mm` are per-AS identifier.
pattern: ^(\d+):(\d+)$|^(\d+):(\d+):(\d+)$
type: string
type: object
type: array
listenPort:
description: ListenPort is the port where BGP protocol should listen.
Defaults to 179
maximum: 65535
minimum: 1
type: integer
logSeverityScreen:
description: 'LogSeverityScreen is the log severity above which logs
are sent to the stdout. [Default: INFO]'
type: string
nodeToNodeMeshEnabled:
description: 'NodeToNodeMeshEnabled sets whether full node to node
BGP mesh is enabled. [Default: true]'
type: boolean
prefixAdvertisements:
description: PrefixAdvertisements contains per-prefix advertisement
configuration.
items:
description: PrefixAdvertisement configures advertisement properties
for the specified CIDR.
properties:
cidr:
description: CIDR for which properties should be advertised.
type: string
communities:
description: Communities can be list of either community names
already defined in `Specs.Communities` or community value
of format `aa:nn` or `aa:nn:mm`. For standard community use
`aa:nn` format, where `aa` and `nn` are 16 bit number. For
large community use `aa:nn:mm` format, where `aa`, `nn` and
`mm` are 32 bit number. Where,`aa` is an AS Number, `nn` and
`mm` are per-AS identifier.
items:
type: string
type: array
type: object
type: array
serviceClusterIPs:
description: ServiceClusterIPs are the CIDR blocks from which service
cluster IPs are allocated. If specified, Calico will advertise these
blocks, as well as any cluster IPs within them.
items:
description: ServiceClusterIPBlock represents a single allowed ClusterIP
CIDR block.
properties:
cidr:
type: string
type: object
type: array
serviceExternalIPs:
description: ServiceExternalIPs are the CIDR blocks for Kubernetes
Service External IPs. Kubernetes Service ExternalIPs will only be
advertised if they are within one of these blocks.
items:
description: ServiceExternalIPBlock represents a single allowed
External IP CIDR block.
properties:
cidr:
type: string
type: object
type: array
serviceLoadBalancerIPs:
description: ServiceLoadBalancerIPs are the CIDR blocks for Kubernetes
Service LoadBalancer IPs. Kubernetes Service status.LoadBalancer.Ingress
IPs will only be advertised if they are within one of these blocks.
items:
description: ServiceLoadBalancerIPBlock represents a single allowed
LoadBalancer IP CIDR block.
properties:
cidr:
type: string
type: object
type: array
type: object
type: object
served: true
storage: true
status:
acceptedNames:
kind: ""
plural: ""
conditions: []
storedVersions: []
---
apiVersion: apiextensions.k8s.io/v1
kind: CustomResourceDefinition
metadata:
name: bgppeers.crd.projectcalico.org
spec:
group: crd.projectcalico.org
names:
kind: BGPPeer
listKind: BGPPeerList
plural: bgppeers
singular: bgppeer
scope: Cluster
versions:
- name: v1
schema:
openAPIV3Schema:
properties:
apiVersion:
description: 'APIVersion defines the versioned schema of this representation
of an object. Servers should convert recognized schemas to the latest
internal value, and may reject unrecognized values. More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#resources'
type: string
kind:
description: 'Kind is a string value representing the REST resource this
object represents. Servers may infer this from the endpoint the client
submits requests to. Cannot be updated. In CamelCase. More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#types-kinds'
type: string
metadata:
type: object
spec:
description: BGPPeerSpec contains the specification for a BGPPeer resource.
properties:
asNumber:
description: The AS Number of the peer.
format: int32
type: integer
keepOriginalNextHop:
description: Option to keep the original nexthop field when routes
are sent to a BGP Peer. Setting "true" configures the selected BGP
Peers node to use the "next hop keep;" instead of "next hop self;"(default)
in the specific branch of the Node on "bird.cfg".
type: boolean
maxRestartTime:
description: Time to allow for software restart. When specified,
this is configured as the graceful restart timeout. When not specified,
the BIRD default of 120s is used.
type: string
node:
description: The node name identifying the Calico node instance that
is targeted by this peer. If this is not set, and no nodeSelector
is specified, then this BGP peer selects all nodes in the cluster.
type: string
nodeSelector:
description: Selector for the nodes that should have this peering. When
this is set, the Node field must be empty.
type: string
password:
description: Optional BGP password for the peerings generated by this
BGPPeer resource.
properties:
secretKeyRef:
description: Selects a key of a secret in the node pod's namespace.
properties:
key:
description: The key of the secret to select from. Must be
a valid secret key.
type: string
name:
description: 'Name of the referent. More info: https://kubernetes.io/docs/concepts/overview/working-with-objects/names/#names
TODO: Add other useful fields. apiVersion, kind, uid?'
type: string
optional:
description: Specify whether the Secret or its key must be
defined
type: boolean
required:
- key
type: object
type: object
peerIP:
description: The IP address of the peer followed by an optional port
number to peer with. If port number is given, format should be `[<IPv6>]:port`
or `<IPv4>:<port>` for IPv4. If optional port number is not set,
and this peer IP and ASNumber belongs to a calico/node with ListenPort
set in BGPConfiguration, then we use that port to peer.
type: string
peerSelector:
description: Selector for the remote nodes to peer with. When this
is set, the PeerIP and ASNumber fields must be empty. For each
peering between the local node and selected remote nodes, we configure
an IPv4 peering if both ends have NodeBGPSpec.IPv4Address specified,
and an IPv6 peering if both ends have NodeBGPSpec.IPv6Address specified. The
remote AS number comes from the remote node's NodeBGPSpec.ASNumber,
or the global default if that is not set.
type: string
sourceAddress:
description: Specifies whether and how to configure a source address
for the peerings generated by this BGPPeer resource. Default value
"UseNodeIP" means to configure the node IP as the source address. "None"
means not to configure a source address.
type: string
type: object
type: object
served: true
storage: true
status:
acceptedNames:
kind: ""
plural: ""
conditions: []
storedVersions: []
---
apiVersion: apiextensions.k8s.io/v1
kind: CustomResourceDefinition
metadata:
name: blockaffinities.crd.projectcalico.org
spec:
group: crd.projectcalico.org
names:
kind: BlockAffinity
listKind: BlockAffinityList
plural: blockaffinities
singular: blockaffinity
scope: Cluster
versions:
- name: v1
schema:
openAPIV3Schema:
properties:
apiVersion:
description: 'APIVersion defines the versioned schema of this representation
of an object. Servers should convert recognized schemas to the latest
internal value, and may reject unrecognized values. More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#resources'
type: string
kind:
description: 'Kind is a string value representing the REST resource this
object represents. Servers may infer this from the endpoint the client
submits requests to. Cannot be updated. In CamelCase. More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#types-kinds'
type: string
metadata:
type: object
spec:
description: BlockAffinitySpec contains the specification for a BlockAffinity
resource.
properties:
cidr:
type: string
deleted:
description: Deleted indicates that this block affinity is being deleted.
This field is a string for compatibility with older releases that
mistakenly treat this field as a string.
type: string
node:
type: string
state:
type: string
required:
- cidr
- deleted
- node
- state
type: object
type: object
served: true
storage: true
status:
acceptedNames:
kind: ""
plural: ""
conditions: []
storedVersions: []
---
---
apiVersion: apiextensions.k8s.io/v1
kind: CustomResourceDefinition
metadata:
annotations:
controller-gen.kubebuilder.io/version: (devel)
creationTimestamp: null
name: caliconodestatuses.crd.projectcalico.org
spec:
group: crd.projectcalico.org
names:
kind: CalicoNodeStatus
listKind: CalicoNodeStatusList
plural: caliconodestatuses
singular: caliconodestatus
scope: Cluster
versions:
- name: v1
schema:
openAPIV3Schema:
properties:
apiVersion:
description: 'APIVersion defines the versioned schema of this representation
of an object. Servers should convert recognized schemas to the latest
internal value, and may reject unrecognized values. More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#resources'
type: string
kind:
description: 'Kind is a string value representing the REST resource this
object represents. Servers may infer this from the endpoint the client
submits requests to. Cannot be updated. In CamelCase. More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#types-kinds'
type: string
metadata:
type: object
spec:
description: CalicoNodeStatusSpec contains the specification for a CalicoNodeStatus
resource.
properties:
classes:
description: Classes declares the types of information to monitor
for this calico/node, and allows for selective status reporting
about certain subsets of information.
items:
type: string
type: array
node:
description: The node name identifies the Calico node instance for
node status.
type: string
updatePeriodSeconds:
description: UpdatePeriodSeconds is the period at which CalicoNodeStatus
should be updated. Set to 0 to disable CalicoNodeStatus refresh.
Maximum update period is one day.
format: int32
type: integer
type: object
status:
description: CalicoNodeStatusStatus defines the observed state of CalicoNodeStatus.
No validation needed for status since it is updated by Calico.
properties:
agent:
description: Agent holds agent status on the node.
properties:
birdV4:
description: BIRDV4 represents the latest observed status of bird4.
properties:
lastBootTime:
description: LastBootTime holds the value of lastBootTime
from bird.ctl output.
type: string
lastReconfigurationTime:
description: LastReconfigurationTime holds the value of lastReconfigTime
from bird.ctl output.
type: string
routerID:
description: Router ID used by bird.
type: string
state:
description: The state of the BGP Daemon.
type: string
version:
description: Version of the BGP daemon
type: string
type: object
birdV6:
description: BIRDV6 represents the latest observed status of bird6.
properties:
lastBootTime:
description: LastBootTime holds the value of lastBootTime
from bird.ctl output.
type: string
lastReconfigurationTime:
description: LastReconfigurationTime holds the value of lastReconfigTime
from bird.ctl output.
type: string
routerID:
description: Router ID used by bird.
type: string
state:
description: The state of the BGP Daemon.
type: string
version:
description: Version of the BGP daemon
type: string
type: object
type: object
bgp:
description: BGP holds node BGP status.
properties:
numberEstablishedV4:
description: The total number of IPv4 established bgp sessions.
type: integer
numberEstablishedV6:
description: The total number of IPv6 established bgp sessions.
type: integer
numberNotEstablishedV4:
description: The total number of IPv4 non-established bgp sessions.
type: integer
numberNotEstablishedV6:
description: The total number of IPv6 non-established bgp sessions.
type: integer
peersV4:
description: PeersV4 represents IPv4 BGP peers status on the node.
items:
description: CalicoNodePeer contains the status of BGP peers
on the node.
properties:
peerIP:
description: IP address of the peer whose condition we are
reporting.
type: string
since:
description: Since the state or reason last changed.
type: string
state:
description: State is the BGP session state.
type: string
type:
description: Type indicates whether this peer is configured
via the node-to-node mesh, or via en explicit global or
per-node BGPPeer object.
type: string
type: object
type: array
peersV6:
description: PeersV6 represents IPv6 BGP peers status on the node.
items:
description: CalicoNodePeer contains the status of BGP peers
on the node.
properties:
peerIP:
description: IP address of the peer whose condition we are
reporting.
type: string
since:
description: Since the state or reason last changed.
type: string
state:
description: State is the BGP session state.
type: string
type:
description: Type indicates whether this peer is configured
via the node-to-node mesh, or via en explicit global or
per-node BGPPeer object.
type: string
type: object
type: array
required:
- numberEstablishedV4
- numberEstablishedV6
- numberNotEstablishedV4
- numberNotEstablishedV6
type: object
lastUpdated:
description: LastUpdated is a timestamp representing the server time
when CalicoNodeStatus object last updated. It is represented in
RFC3339 form and is in UTC.
format: date-time
nullable: true
type: string
routes:
description: Routes reports routes known to the Calico BGP daemon
on the node.
properties:
routesV4:
description: RoutesV4 represents IPv4 routes on the node.
items:
description: CalicoNodeRoute contains the status of BGP routes
on the node.
properties:
destination:
description: Destination of the route.
type: string
gateway:
description: Gateway for the destination.
type: string
interface:
description: Interface for the destination
type: string
learnedFrom:
description: LearnedFrom contains information regarding
where this route originated.
properties:
peerIP:
description: If sourceType is NodeMesh or BGPPeer, IP
address of the router that sent us this route.
type: string
sourceType:
description: Type of the source where a route is learned
from.
type: string
type: object
type:
description: Type indicates if the route is being used for
forwarding or not.
type: string
type: object
type: array
routesV6:
description: RoutesV6 represents IPv6 routes on the node.
items:
description: CalicoNodeRoute contains the status of BGP routes
on the node.
properties:
destination:
description: Destination of the route.
type: string
gateway:
description: Gateway for the destination.
type: string
interface:
description: Interface for the destination
type: string
learnedFrom:
description: LearnedFrom contains information regarding
where this route originated.
properties:
peerIP:
description: If sourceType is NodeMesh or BGPPeer, IP
address of the router that sent us this route.
type: string
sourceType:
description: Type of the source where a route is learned
from.
type: string
type: object
type:
description: Type indicates if the route is being used for
forwarding or not.
type: string
type: object
type: array
type: object
type: object
type: object
served: true
storage: true
status:
acceptedNames:
kind: ""
plural: ""
conditions: []
storedVersions: []
---
apiVersion: apiextensions.k8s.io/v1
kind: CustomResourceDefinition
metadata:
name: clusterinformations.crd.projectcalico.org
spec:
group: crd.projectcalico.org
names:
kind: ClusterInformation
listKind: ClusterInformationList
plural: clusterinformations
singular: clusterinformation
scope: Cluster
versions:
- name: v1
schema:
openAPIV3Schema:
description: ClusterInformation contains the cluster specific information.
properties:
apiVersion:
description: 'APIVersion defines the versioned schema of this representation
of an object. Servers should convert recognized schemas to the latest
internal value, and may reject unrecognized values. More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#resources'
type: string
kind:
description: 'Kind is a string value representing the REST resource this
object represents. Servers may infer this from the endpoint the client
submits requests to. Cannot be updated. In CamelCase. More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#types-kinds'
type: string
metadata:
type: object
spec:
description: ClusterInformationSpec contains the values of describing
the cluster.
properties:
calicoVersion:
description: CalicoVersion is the version of Calico that the cluster
is running
type: string
clusterGUID:
description: ClusterGUID is the GUID of the cluster
type: string
clusterType:
description: ClusterType describes the type of the cluster
type: string
datastoreReady:
description: DatastoreReady is used during significant datastore migrations
to signal to components such as Felix that it should wait before
accessing the datastore.
type: boolean
variant:
description: Variant declares which variant of Calico should be active.
type: string
type: object
type: object
served: true
storage: true
status:
acceptedNames:
kind: ""
plural: ""
conditions: []
storedVersions: []
---
apiVersion: apiextensions.k8s.io/v1
kind: CustomResourceDefinition
metadata:
name: felixconfigurations.crd.projectcalico.org
spec:
group: crd.projectcalico.org
names:
kind: FelixConfiguration
listKind: FelixConfigurationList
plural: felixconfigurations
singular: felixconfiguration
scope: Cluster
versions:
- name: v1
schema:
openAPIV3Schema:
description: Felix Configuration contains the configuration for Felix.
properties:
apiVersion:
description: 'APIVersion defines the versioned schema of this representation
of an object. Servers should convert recognized schemas to the latest
internal value, and may reject unrecognized values. More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#resources'
type: string
kind:
description: 'Kind is a string value representing the REST resource this
object represents. Servers may infer this from the endpoint the client
submits requests to. Cannot be updated. In CamelCase. More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#types-kinds'
type: string
metadata:
type: object
spec:
description: FelixConfigurationSpec contains the values of the Felix configuration.
properties:
allowIPIPPacketsFromWorkloads:
description: 'AllowIPIPPacketsFromWorkloads controls whether Felix
will add a rule to drop IPIP encapsulated traffic from workloads
[Default: false]'
type: boolean
allowVXLANPacketsFromWorkloads:
description: 'AllowVXLANPacketsFromWorkloads controls whether Felix
will add a rule to drop VXLAN encapsulated traffic from workloads
[Default: false]'
type: boolean
awsSrcDstCheck:
description: 'Set source-destination-check on AWS EC2 instances. Accepted
value must be one of "DoNothing", "Enable" or "Disable". [Default:
DoNothing]'
enum:
- DoNothing
- Enable
- Disable
type: string
bpfConnectTimeLoadBalancingEnabled:
description: 'BPFConnectTimeLoadBalancingEnabled when in BPF mode,
controls whether Felix installs the connection-time load balancer. The
connect-time load balancer is required for the host to be able to
reach Kubernetes services and it improves the performance of pod-to-service
connections. The only reason to disable it is for debugging purposes. [Default:
true]'
type: boolean
bpfDataIfacePattern:
description: BPFDataIfacePattern is a regular expression that controls
which interfaces Felix should attach BPF programs to in order to
catch traffic to/from the network. This needs to match the interfaces
that Calico workload traffic flows over as well as any interfaces
that handle incoming traffic to nodeports and services from outside
the cluster. It should not match the workload interfaces (usually
named cali...).
type: string
bpfDisableUnprivileged:
description: 'BPFDisableUnprivileged, if enabled, Felix sets the kernel.unprivileged_bpf_disabled
sysctl to disable unprivileged use of BPF. This ensures that unprivileged
users cannot access Calico''s BPF maps and cannot insert their own
BPF programs to interfere with Calico''s. [Default: true]'
type: boolean
bpfEnabled:
description: 'BPFEnabled, if enabled Felix will use the BPF dataplane.
[Default: false]'
type: boolean
bpfExtToServiceConnmark:
description: 'BPFExtToServiceConnmark in BPF mode, control a 32bit
mark that is set on connections from an external client to a local
service. This mark allows us to control how packets of that connection
are routed within the host and how is routing intepreted by RPF
check. [Default: 0]'
type: integer
bpfExternalServiceMode:
description: 'BPFExternalServiceMode in BPF mode, controls how connections
from outside the cluster to services (node ports and cluster IPs)
are forwarded to remote workloads. If set to "Tunnel" then both
request and response traffic is tunneled to the remote node. If
set to "DSR", the request traffic is tunneled but the response traffic
is sent directly from the remote node. In "DSR" mode, the remote
node appears to use the IP of the ingress node; this requires a
permissive L2 network. [Default: Tunnel]'
type: string
bpfKubeProxyEndpointSlicesEnabled:
description: BPFKubeProxyEndpointSlicesEnabled in BPF mode, controls
whether Felix's embedded kube-proxy accepts EndpointSlices or not.
type: boolean
bpfKubeProxyIptablesCleanupEnabled:
description: 'BPFKubeProxyIptablesCleanupEnabled, if enabled in BPF
mode, Felix will proactively clean up the upstream Kubernetes kube-proxy''s
iptables chains. Should only be enabled if kube-proxy is not running. [Default:
true]'
type: boolean
bpfKubeProxyMinSyncPeriod:
description: 'BPFKubeProxyMinSyncPeriod, in BPF mode, controls the
minimum time between updates to the dataplane for Felix''s embedded
kube-proxy. Lower values give reduced set-up latency. Higher values
reduce Felix CPU usage by batching up more work. [Default: 1s]'
type: string
bpfLogLevel:
description: 'BPFLogLevel controls the log level of the BPF programs
when in BPF dataplane mode. One of "Off", "Info", or "Debug". The
logs are emitted to the BPF trace pipe, accessible with the command
`tc exec bpf debug`. [Default: Off].'
type: string
chainInsertMode:
description: 'ChainInsertMode controls whether Felix hooks the kernel''s
top-level iptables chains by inserting a rule at the top of the
chain or by appending a rule at the bottom. insert is the safe default
since it prevents Calico''s rules from being bypassed. If you switch
to append mode, be sure that the other rules in the chains signal
acceptance by falling through to the Calico rules, otherwise the
Calico policy will be bypassed. [Default: insert]'
type: string
dataplaneDriver:
type: string
debugDisableLogDropping:
type: boolean
debugMemoryProfilePath:
type: string
debugSimulateCalcGraphHangAfter:
type: string
debugSimulateDataplaneHangAfter:
type: string
defaultEndpointToHostAction:
description: 'DefaultEndpointToHostAction controls what happens to
traffic that goes from a workload endpoint to the host itself (after
the traffic hits the endpoint egress policy). By default Calico
blocks traffic from workload endpoints to the host itself with an
iptables "DROP" action. If you want to allow some or all traffic
from endpoint to host, set this parameter to RETURN or ACCEPT. Use
RETURN if you have your own rules in the iptables "INPUT" chain;
Calico will insert its rules at the top of that chain, then "RETURN"
packets to the "INPUT" chain once it has completed processing workload
endpoint egress policy. Use ACCEPT to unconditionally accept packets
from workloads after processing workload endpoint egress policy.
[Default: Drop]'
type: string
deviceRouteProtocol:
description: This defines the route protocol added to programmed device
routes, by default this will be RTPROT_BOOT when left blank.
type: integer
deviceRouteSourceAddress:
description: This is the source address to use on programmed device
routes. By default the source address is left blank, leaving the
kernel to choose the source address used.
type: string
disableConntrackInvalidCheck:
type: boolean
endpointReportingDelay:
type: string
endpointReportingEnabled:
type: boolean
externalNodesList:
description: ExternalNodesCIDRList is a list of CIDR's of external-non-calico-nodes
which may source tunnel traffic and have the tunneled traffic be
accepted at calico nodes.
items:
type: string
type: array
failsafeInboundHostPorts:
description: 'FailsafeInboundHostPorts is a list of UDP/TCP ports
and CIDRs that Felix will allow incoming traffic to host endpoints
on irrespective of the security policy. This is useful to avoid
accidentally cutting off a host with incorrect configuration. For
back-compatibility, if the protocol is not specified, it defaults
to "tcp". If a CIDR is not specified, it will allow traffic from
all addresses. To disable all inbound host ports, use the value
none. The default value allows ssh access and DHCP. [Default: tcp:22,
udp:68, tcp:179, tcp:2379, tcp:2380, tcp:6443, tcp:6666, tcp:6667]'
items:
description: ProtoPort is combination of protocol, port, and CIDR.
Protocol and port must be specified.
properties:
net:
type: string
port:
type: integer
protocol:
type: string
required:
- port
- protocol
type: object
type: array
failsafeOutboundHostPorts:
description: 'FailsafeOutboundHostPorts is a list of UDP/TCP ports
and CIDRs that Felix will allow outgoing traffic from host endpoints
to irrespective of the security policy. This is useful to avoid
accidentally cutting off a host with incorrect configuration. For
back-compatibility, if the protocol is not specified, it defaults
to "tcp". If a CIDR is not specified, it will allow traffic from
all addresses. To disable all outbound host ports, use the value
none. The default value opens etcd''s standard ports to ensure that
Felix does not get cut off from etcd as well as allowing DHCP and
DNS. [Default: tcp:179, tcp:2379, tcp:2380, tcp:6443, tcp:6666,
tcp:6667, udp:53, udp:67]'
items:
description: ProtoPort is combination of protocol, port, and CIDR.
Protocol and port must be specified.
properties:
net:
type: string
port:
type: integer
protocol:
type: string
required:
- port
- protocol
type: object
type: array
featureDetectOverride:
description: FeatureDetectOverride is used to override the feature
detection. Values are specified in a comma separated list with no
spaces, example; "SNATFullyRandom=true,MASQFullyRandom=false,RestoreSupportsLock=".
"true" or "false" will force the feature, empty or omitted values
are auto-detected.
type: string
genericXDPEnabled:
description: 'GenericXDPEnabled enables Generic XDP so network cards
that don''t support XDP offload or driver modes can use XDP. This
is not recommended since it doesn''t provide better performance
than iptables. [Default: false]'
type: boolean
healthEnabled:
type: boolean
healthHost:
type: string
healthPort:
type: integer
interfaceExclude:
description: 'InterfaceExclude is a comma-separated list of interfaces
that Felix should exclude when monitoring for host endpoints. The
default value ensures that Felix ignores Kubernetes'' IPVS dummy
interface, which is used internally by kube-proxy. If you want to
exclude multiple interface names using a single value, the list
supports regular expressions. For regular expressions you must wrap
the value with ''/''. For example having values ''/^kube/,veth1''
will exclude all interfaces that begin with ''kube'' and also the
interface ''veth1''. [Default: kube-ipvs0]'
type: string
interfacePrefix:
description: 'InterfacePrefix is the interface name prefix that identifies
workload endpoints and so distinguishes them from host endpoint
interfaces. Note: in environments other than bare metal, the orchestrators
configure this appropriately. For example our Kubernetes and Docker
integrations set the ''cali'' value, and our OpenStack integration
sets the ''tap'' value. [Default: cali]'
type: string
interfaceRefreshInterval:
description: InterfaceRefreshInterval is the period at which Felix
rescans local interfaces to verify their state. The rescan can be
disabled by setting the interval to 0.
type: string
ipipEnabled:
type: boolean
ipipMTU:
description: 'IPIPMTU is the MTU to set on the tunnel device. See
Configuring MTU [Default: 1440]'
type: integer
ipsetsRefreshInterval:
description: 'IpsetsRefreshInterval is the period at which Felix re-checks
all iptables state to ensure that no other process has accidentally
broken Calico''s rules. Set to 0 to disable iptables refresh. [Default:
90s]'
type: string
iptablesBackend:
description: IptablesBackend specifies which backend of iptables will
be used. The default is legacy.
type: string
iptablesFilterAllowAction:
type: string
iptablesLockFilePath:
description: 'IptablesLockFilePath is the location of the iptables
lock file. You may need to change this if the lock file is not in
its standard location (for example if you have mapped it into Felix''s
container at a different path). [Default: /run/xtables.lock]'
type: string
iptablesLockProbeInterval:
description: 'IptablesLockProbeInterval is the time that Felix will
wait between attempts to acquire the iptables lock if it is not
available. Lower values make Felix more responsive when the lock
is contended, but use more CPU. [Default: 50ms]'
type: string
iptablesLockTimeout:
description: 'IptablesLockTimeout is the time that Felix will wait
for the iptables lock, or 0, to disable. To use this feature, Felix
must share the iptables lock file with all other processes that
also take the lock. When running Felix inside a container, this
requires the /run directory of the host to be mounted into the calico/node
or calico/felix container. [Default: 0s disabled]'
type: string
iptablesMangleAllowAction:
type: string
iptablesMarkMask:
description: 'IptablesMarkMask is the mask that Felix selects its
IPTables Mark bits from. Should be a 32 bit hexadecimal number with
at least 8 bits set, none of which clash with any other mark bits
in use on the system. [Default: 0xff000000]'
format: int32
type: integer
iptablesNATOutgoingInterfaceFilter:
type: string
iptablesPostWriteCheckInterval:
description: 'IptablesPostWriteCheckInterval is the period after Felix
has done a write to the dataplane that it schedules an extra read
back in order to check the write was not clobbered by another process.
This should only occur if another application on the system doesn''t
respect the iptables lock. [Default: 1s]'
type: string
iptablesRefreshInterval:
description: 'IptablesRefreshInterval is the period at which Felix
re-checks the IP sets in the dataplane to ensure that no other process
has accidentally broken Calico''s rules. Set to 0 to disable IP
sets refresh. Note: the default for this value is lower than the
other refresh intervals as a workaround for a Linux kernel bug that
was fixed in kernel version 4.11. If you are using v4.11 or greater
you may want to set this to, a higher value to reduce Felix CPU
usage. [Default: 10s]'
type: string
ipv6Support:
type: boolean
kubeNodePortRanges:
description: 'KubeNodePortRanges holds list of port ranges used for
service node ports. Only used if felix detects kube-proxy running
in ipvs mode. Felix uses these ranges to separate host and workload
traffic. [Default: 30000:32767].'
items:
anyOf:
- type: integer
- type: string
pattern: ^.*
x-kubernetes-int-or-string: true
type: array
logFilePath:
description: 'LogFilePath is the full path to the Felix log. Set to
none to disable file logging. [Default: /var/log/calico/felix.log]'
type: string
logPrefix:
description: 'LogPrefix is the log prefix that Felix uses when rendering
LOG rules. [Default: calico-packet]'
type: string
logSeverityFile:
description: 'LogSeverityFile is the log severity above which logs
are sent to the log file. [Default: Info]'
type: string
logSeverityScreen:
description: 'LogSeverityScreen is the log severity above which logs
are sent to the stdout. [Default: Info]'
type: string
logSeveritySys:
description: 'LogSeveritySys is the log severity above which logs
are sent to the syslog. Set to None for no logging to syslog. [Default:
Info]'
type: string
maxIpsetSize:
type: integer
metadataAddr:
description: 'MetadataAddr is the IP address or domain name of the
server that can answer VM queries for cloud-init metadata. In OpenStack,
this corresponds to the machine running nova-api (or in Ubuntu,
nova-api-metadata). A value of none (case insensitive) means that
Felix should not set up any NAT rule for the metadata path. [Default:
127.0.0.1]'
type: string
metadataPort:
description: 'MetadataPort is the port of the metadata server. This,
combined with global.MetadataAddr (if not ''None''), is used to
set up a NAT rule, from 169.254.169.254:80 to MetadataAddr:MetadataPort.
In most cases this should not need to be changed [Default: 8775].'
type: integer
mtuIfacePattern:
description: MTUIfacePattern is a regular expression that controls
which interfaces Felix should scan in order to calculate the host's
MTU. This should not match workload interfaces (usually named cali...).
type: string
natOutgoingAddress:
description: NATOutgoingAddress specifies an address to use when performing
source NAT for traffic in a natOutgoing pool that is leaving the
network. By default the address used is an address on the interface
the traffic is leaving on (ie it uses the iptables MASQUERADE target)
type: string
natPortRange:
anyOf:
- type: integer
- type: string
description: NATPortRange specifies the range of ports that is used
for port mapping when doing outgoing NAT. When unset the default
behavior of the network stack is used.
pattern: ^.*
x-kubernetes-int-or-string: true
netlinkTimeout:
type: string
openstackRegion:
description: 'OpenstackRegion is the name of the region that a particular
Felix belongs to. In a multi-region Calico/OpenStack deployment,
this must be configured somehow for each Felix (here in the datamodel,
or in felix.cfg or the environment on each compute node), and must
match the [calico] openstack_region value configured in neutron.conf
on each node. [Default: Empty]'
type: string
policySyncPathPrefix:
description: 'PolicySyncPathPrefix is used to by Felix to communicate
policy changes to external services, like Application layer policy.
[Default: Empty]'
type: string
prometheusGoMetricsEnabled:
description: 'PrometheusGoMetricsEnabled disables Go runtime metrics
collection, which the Prometheus client does by default, when set
to false. This reduces the number of metrics reported, reducing
Prometheus load. [Default: true]'
type: boolean
prometheusMetricsEnabled:
description: 'PrometheusMetricsEnabled enables the Prometheus metrics
server in Felix if set to true. [Default: false]'
type: boolean
prometheusMetricsHost:
description: 'PrometheusMetricsHost is the host that the Prometheus
metrics server should bind to. [Default: empty]'
type: string
prometheusMetricsPort:
description: 'PrometheusMetricsPort is the TCP port that the Prometheus
metrics server should bind to. [Default: 9091]'
type: integer
prometheusProcessMetricsEnabled:
description: 'PrometheusProcessMetricsEnabled disables process metrics
collection, which the Prometheus client does by default, when set
to false. This reduces the number of metrics reported, reducing
Prometheus load. [Default: true]'
type: boolean
prometheusWireGuardMetricsEnabled:
description: 'PrometheusWireGuardMetricsEnabled disables wireguard
metrics collection, which the Prometheus client does by default,
when set to false. This reduces the number of metrics reported,
reducing Prometheus load. [Default: true]'
type: boolean
removeExternalRoutes:
description: Whether or not to remove device routes that have not
been programmed by Felix. Disabling this will allow external applications
to also add device routes. This is enabled by default which means
we will remove externally added routes.
type: boolean
reportingInterval:
description: 'ReportingInterval is the interval at which Felix reports
its status into the datastore or 0 to disable. Must be non-zero
in OpenStack deployments. [Default: 30s]'
type: string
reportingTTL:
description: 'ReportingTTL is the time-to-live setting for process-wide
status reports. [Default: 90s]'
type: string
routeRefreshInterval:
description: 'RouteRefreshInterval is the period at which Felix re-checks
the routes in the dataplane to ensure that no other process has
accidentally broken Calico''s rules. Set to 0 to disable route refresh.
[Default: 90s]'
type: string
routeSource:
description: 'RouteSource configures where Felix gets its routing
information. - WorkloadIPs: use workload endpoints to construct
routes. - CalicoIPAM: the default - use IPAM data to construct routes.'
type: string
routeTableRange:
description: Calico programs additional Linux route tables for various
purposes. RouteTableRange specifies the indices of the route tables
that Calico should use.
properties:
max:
type: integer
min:
type: integer
required:
- max
- min
type: object
serviceLoopPrevention:
description: 'When service IP advertisement is enabled, prevent routing
loops to service IPs that are not in use, by dropping or rejecting
packets that do not get DNAT''d by kube-proxy. Unless set to "Disabled",
in which case such routing loops continue to be allowed. [Default:
Drop]'
type: string
sidecarAccelerationEnabled:
description: 'SidecarAccelerationEnabled enables experimental sidecar
acceleration [Default: false]'
type: boolean
usageReportingEnabled:
description: 'UsageReportingEnabled reports anonymous Calico version
number and cluster size to projectcalico.org. Logs warnings returned
by the usage server. For example, if a significant security vulnerability
has been discovered in the version of Calico being used. [Default:
true]'
type: boolean
usageReportingInitialDelay:
description: 'UsageReportingInitialDelay controls the minimum delay
before Felix makes a report. [Default: 300s]'
type: string
usageReportingInterval:
description: 'UsageReportingInterval controls the interval at which
Felix makes reports. [Default: 86400s]'
type: string
useInternalDataplaneDriver:
type: boolean
vxlanEnabled:
type: boolean
vxlanMTU:
description: 'VXLANMTU is the MTU to set on the tunnel device. See
Configuring MTU [Default: 1440]'
type: integer
vxlanPort:
type: integer
vxlanVNI:
type: integer
wireguardEnabled:
description: 'WireguardEnabled controls whether Wireguard is enabled.
[Default: false]'
type: boolean
wireguardHostEncryptionEnabled:
description: 'WireguardHostEncryptionEnabled controls whether Wireguard
host-to-host encryption is enabled. [Default: false]'
type: boolean
wireguardInterfaceName:
description: 'WireguardInterfaceName specifies the name to use for
the Wireguard interface. [Default: wg.calico]'
type: string
wireguardListeningPort:
description: 'WireguardListeningPort controls the listening port used
by Wireguard. [Default: 51820]'
type: integer
wireguardMTU:
description: 'WireguardMTU controls the MTU on the Wireguard interface.
See Configuring MTU [Default: 1420]'
type: integer
wireguardRoutingRulePriority:
description: 'WireguardRoutingRulePriority controls the priority value
to use for the Wireguard routing rule. [Default: 99]'
type: integer
xdpEnabled:
description: 'XDPEnabled enables XDP acceleration for suitable untracked
incoming deny rules. [Default: true]'
type: boolean
xdpRefreshInterval:
description: 'XDPRefreshInterval is the period at which Felix re-checks
all XDP state to ensure that no other process has accidentally broken
Calico''s BPF maps or attached programs. Set to 0 to disable XDP
refresh. [Default: 90s]'
type: string
type: object
type: object
served: true
storage: true
status:
acceptedNames:
kind: ""
plural: ""
conditions: []
storedVersions: []
---
apiVersion: apiextensions.k8s.io/v1
kind: CustomResourceDefinition
metadata:
name: globalnetworkpolicies.crd.projectcalico.org
spec:
group: crd.projectcalico.org
names:
kind: GlobalNetworkPolicy
listKind: GlobalNetworkPolicyList
plural: globalnetworkpolicies
singular: globalnetworkpolicy
scope: Cluster
versions:
- name: v1
schema:
openAPIV3Schema:
properties:
apiVersion:
description: 'APIVersion defines the versioned schema of this representation
of an object. Servers should convert recognized schemas to the latest
internal value, and may reject unrecognized values. More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#resources'
type: string
kind:
description: 'Kind is a string value representing the REST resource this
object represents. Servers may infer this from the endpoint the client
submits requests to. Cannot be updated. In CamelCase. More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#types-kinds'
type: string
metadata:
type: object
spec:
properties:
applyOnForward:
description: ApplyOnForward indicates to apply the rules in this policy
on forward traffic.
type: boolean
doNotTrack:
description: DoNotTrack indicates whether packets matched by the rules
in this policy should go through the data plane's connection tracking,
such as Linux conntrack. If True, the rules in this policy are
applied before any data plane connection tracking, and packets allowed
by this policy are marked as not to be tracked.
type: boolean
egress:
description: The ordered set of egress rules. Each rule contains
a set of packet match criteria and a corresponding action to apply.
items:
description: "A Rule encapsulates a set of match criteria and an
action. Both selector-based security Policy and security Profiles
reference rules - separated out as a list of rules for both ingress
and egress packet matching. \n Each positive match criteria has
a negated version, prefixed with \"Not\". All the match criteria
within a rule must be satisfied for a packet to match. A single
rule can contain the positive and negative version of a match
and both must be satisfied for the rule to match."
properties:
action:
type: string
destination:
description: Destination contains the match criteria that apply
to destination entity.
properties:
namespaceSelector:
description: "NamespaceSelector is an optional field that
contains a selector expression. Only traffic that originates
from (or terminates at) endpoints within the selected
namespaces will be matched. When both NamespaceSelector
and another selector are defined on the same rule, then
only workload endpoints that are matched by both selectors
will be selected by the rule. \n For NetworkPolicy, an
empty NamespaceSelector implies that the Selector is limited
to selecting only workload endpoints in the same namespace
as the NetworkPolicy. \n For NetworkPolicy, `global()`
NamespaceSelector implies that the Selector is limited
to selecting only GlobalNetworkSet or HostEndpoint. \n
For GlobalNetworkPolicy, an empty NamespaceSelector implies
the Selector applies to workload endpoints across all
namespaces."
type: string
nets:
description: Nets is an optional field that restricts the
rule to only apply to traffic that originates from (or
terminates at) IP addresses in any of the given subnets.
items:
type: string
type: array
notNets:
description: NotNets is the negated version of the Nets
field.
items:
type: string
type: array
notPorts:
description: NotPorts is the negated version of the Ports
field. Since only some protocols have ports, if any ports
are specified it requires the Protocol match in the Rule
to be set to "TCP" or "UDP".
items:
anyOf:
- type: integer
- type: string
pattern: ^.*
x-kubernetes-int-or-string: true
type: array
notSelector:
description: NotSelector is the negated version of the Selector
field. See Selector field for subtleties with negated
selectors.
type: string
ports:
description: "Ports is an optional field that restricts
the rule to only apply to traffic that has a source (destination)
port that matches one of these ranges/values. This value
is a list of integers or strings that represent ranges
of ports. \n Since only some protocols have ports, if
any ports are specified it requires the Protocol match
in the Rule to be set to \"TCP\" or \"UDP\"."
items:
anyOf:
- type: integer
- type: string
pattern: ^.*
x-kubernetes-int-or-string: true
type: array
selector:
description: "Selector is an optional field that contains
a selector expression (see Policy for sample syntax).
\ Only traffic that originates from (terminates at) endpoints
matching the selector will be matched. \n Note that: in
addition to the negated version of the Selector (see NotSelector
below), the selector expression syntax itself supports
negation. The two types of negation are subtly different.
One negates the set of matched endpoints, the other negates
the whole match: \n \tSelector = \"!has(my_label)\" matches
packets that are from other Calico-controlled \tendpoints
that do not have the label \"my_label\". \n \tNotSelector
= \"has(my_label)\" matches packets that are not from
Calico-controlled \tendpoints that do have the label \"my_label\".
\n The effect is that the latter will accept packets from
non-Calico sources whereas the former is limited to packets
from Calico-controlled endpoints."
type: string
serviceAccounts:
description: ServiceAccounts is an optional field that restricts
the rule to only apply to traffic that originates from
(or terminates at) a pod running as a matching service
account.
properties:
names:
description: Names is an optional field that restricts
the rule to only apply to traffic that originates
from (or terminates at) a pod running as a service
account whose name is in the list.
items:
type: string
type: array
selector:
description: Selector is an optional field that restricts
the rule to only apply to traffic that originates
from (or terminates at) a pod running as a service
account that matches the given label selector. If
both Names and Selector are specified then they are
AND'ed.
type: string
type: object
services:
description: "Services is an optional field that contains
options for matching Kubernetes Services. If specified,
only traffic that originates from or terminates at endpoints
within the selected service(s) will be matched, and only
to/from each endpoint's port. \n Services cannot be specified
on the same rule as Selector, NotSelector, NamespaceSelector,
Nets, NotNets or ServiceAccounts. \n Ports and NotPorts
can only be specified with Services on ingress rules."
properties:
name:
description: Name specifies the name of a Kubernetes
Service to match.
type: string
namespace:
description: Namespace specifies the namespace of the
given Service. If left empty, the rule will match
within this policy's namespace.
type: string
type: object
type: object
http:
description: HTTP contains match criteria that apply to HTTP
requests.
properties:
methods:
description: Methods is an optional field that restricts
the rule to apply only to HTTP requests that use one of
the listed HTTP Methods (e.g. GET, PUT, etc.) Multiple
methods are OR'd together.
items:
type: string
type: array
paths:
description: 'Paths is an optional field that restricts
the rule to apply to HTTP requests that use one of the
listed HTTP Paths. Multiple paths are OR''d together.
e.g: - exact: /foo - prefix: /bar NOTE: Each entry may
ONLY specify either a `exact` or a `prefix` match. The
validator will check for it.'
items:
description: 'HTTPPath specifies an HTTP path to match.
It may be either of the form: exact: <path>: which matches
the path exactly or prefix: <path-prefix>: which matches
the path prefix'
properties:
exact:
type: string
prefix:
type: string
type: object
type: array
type: object
icmp:
description: ICMP is an optional field that restricts the rule
to apply to a specific type and code of ICMP traffic. This
should only be specified if the Protocol field is set to "ICMP"
or "ICMPv6".
properties:
code:
description: Match on a specific ICMP code. If specified,
the Type value must also be specified. This is a technical
limitation imposed by the kernel's iptables firewall,
which Calico uses to enforce the rule.
type: integer
type:
description: Match on a specific ICMP type. For example
a value of 8 refers to ICMP Echo Request (i.e. pings).
type: integer
type: object
ipVersion:
description: IPVersion is an optional field that restricts the
rule to only match a specific IP version.
type: integer
metadata:
description: Metadata contains additional information for this
rule
properties:
annotations:
additionalProperties:
type: string
description: Annotations is a set of key value pairs that
give extra information about the rule
type: object
type: object
notICMP:
description: NotICMP is the negated version of the ICMP field.
properties:
code:
description: Match on a specific ICMP code. If specified,
the Type value must also be specified. This is a technical
limitation imposed by the kernel's iptables firewall,
which Calico uses to enforce the rule.
type: integer
type:
description: Match on a specific ICMP type. For example
a value of 8 refers to ICMP Echo Request (i.e. pings).
type: integer
type: object
notProtocol:
anyOf:
- type: integer
- type: string
description: NotProtocol is the negated version of the Protocol
field.
pattern: ^.*
x-kubernetes-int-or-string: true
protocol:
anyOf:
- type: integer
- type: string
description: "Protocol is an optional field that restricts the
rule to only apply to traffic of a specific IP protocol. Required
if any of the EntityRules contain Ports (because ports only
apply to certain protocols). \n Must be one of these string
values: \"TCP\", \"UDP\", \"ICMP\", \"ICMPv6\", \"SCTP\",
\"UDPLite\" or an integer in the range 1-255."
pattern: ^.*
x-kubernetes-int-or-string: true
source:
description: Source contains the match criteria that apply to
source entity.
properties:
namespaceSelector:
description: "NamespaceSelector is an optional field that
contains a selector expression. Only traffic that originates
from (or terminates at) endpoints within the selected
namespaces will be matched. When both NamespaceSelector
and another selector are defined on the same rule, then
only workload endpoints that are matched by both selectors
will be selected by the rule. \n For NetworkPolicy, an
empty NamespaceSelector implies that the Selector is limited
to selecting only workload endpoints in the same namespace
as the NetworkPolicy. \n For NetworkPolicy, `global()`
NamespaceSelector implies that the Selector is limited
to selecting only GlobalNetworkSet or HostEndpoint. \n
For GlobalNetworkPolicy, an empty NamespaceSelector implies
the Selector applies to workload endpoints across all
namespaces."
type: string
nets:
description: Nets is an optional field that restricts the
rule to only apply to traffic that originates from (or
terminates at) IP addresses in any of the given subnets.
items:
type: string
type: array
notNets:
description: NotNets is the negated version of the Nets
field.
items:
type: string
type: array
notPorts:
description: NotPorts is the negated version of the Ports
field. Since only some protocols have ports, if any ports
are specified it requires the Protocol match in the Rule
to be set to "TCP" or "UDP".
items:
anyOf:
- type: integer
- type: string
pattern: ^.*
x-kubernetes-int-or-string: true
type: array
notSelector:
description: NotSelector is the negated version of the Selector
field. See Selector field for subtleties with negated
selectors.
type: string
ports:
description: "Ports is an optional field that restricts
the rule to only apply to traffic that has a source (destination)
port that matches one of these ranges/values. This value
is a list of integers or strings that represent ranges
of ports. \n Since only some protocols have ports, if
any ports are specified it requires the Protocol match
in the Rule to be set to \"TCP\" or \"UDP\"."
items:
anyOf:
- type: integer
- type: string
pattern: ^.*
x-kubernetes-int-or-string: true
type: array
selector:
description: "Selector is an optional field that contains
a selector expression (see Policy for sample syntax).
\ Only traffic that originates from (terminates at) endpoints
matching the selector will be matched. \n Note that: in
addition to the negated version of the Selector (see NotSelector
below), the selector expression syntax itself supports
negation. The two types of negation are subtly different.
One negates the set of matched endpoints, the other negates
the whole match: \n \tSelector = \"!has(my_label)\" matches
packets that are from other Calico-controlled \tendpoints
that do not have the label \"my_label\". \n \tNotSelector
= \"has(my_label)\" matches packets that are not from
Calico-controlled \tendpoints that do have the label \"my_label\".
\n The effect is that the latter will accept packets from
non-Calico sources whereas the former is limited to packets
from Calico-controlled endpoints."
type: string
serviceAccounts:
description: ServiceAccounts is an optional field that restricts
the rule to only apply to traffic that originates from
(or terminates at) a pod running as a matching service
account.
properties:
names:
description: Names is an optional field that restricts
the rule to only apply to traffic that originates
from (or terminates at) a pod running as a service
account whose name is in the list.
items:
type: string
type: array
selector:
description: Selector is an optional field that restricts
the rule to only apply to traffic that originates
from (or terminates at) a pod running as a service
account that matches the given label selector. If
both Names and Selector are specified then they are
AND'ed.
type: string
type: object
services:
description: "Services is an optional field that contains
options for matching Kubernetes Services. If specified,
only traffic that originates from or terminates at endpoints
within the selected service(s) will be matched, and only
to/from each endpoint's port. \n Services cannot be specified
on the same rule as Selector, NotSelector, NamespaceSelector,
Nets, NotNets or ServiceAccounts. \n Ports and NotPorts
can only be specified with Services on ingress rules."
properties:
name:
description: Name specifies the name of a Kubernetes
Service to match.
type: string
namespace:
description: Namespace specifies the namespace of the
given Service. If left empty, the rule will match
within this policy's namespace.
type: string
type: object
type: object
required:
- action
type: object
type: array
ingress:
description: The ordered set of ingress rules. Each rule contains
a set of packet match criteria and a corresponding action to apply.
items:
description: "A Rule encapsulates a set of match criteria and an
action. Both selector-based security Policy and security Profiles
reference rules - separated out as a list of rules for both ingress
and egress packet matching. \n Each positive match criteria has
a negated version, prefixed with \"Not\". All the match criteria
within a rule must be satisfied for a packet to match. A single
rule can contain the positive and negative version of a match
and both must be satisfied for the rule to match."
properties:
action:
type: string
destination:
description: Destination contains the match criteria that apply
to destination entity.
properties:
namespaceSelector:
description: "NamespaceSelector is an optional field that
contains a selector expression. Only traffic that originates
from (or terminates at) endpoints within the selected
namespaces will be matched. When both NamespaceSelector
and another selector are defined on the same rule, then
only workload endpoints that are matched by both selectors
will be selected by the rule. \n For NetworkPolicy, an
empty NamespaceSelector implies that the Selector is limited
to selecting only workload endpoints in the same namespace
as the NetworkPolicy. \n For NetworkPolicy, `global()`
NamespaceSelector implies that the Selector is limited
to selecting only GlobalNetworkSet or HostEndpoint. \n
For GlobalNetworkPolicy, an empty NamespaceSelector implies
the Selector applies to workload endpoints across all
namespaces."
type: string
nets:
description: Nets is an optional field that restricts the
rule to only apply to traffic that originates from (or
terminates at) IP addresses in any of the given subnets.
items:
type: string
type: array
notNets:
description: NotNets is the negated version of the Nets
field.
items:
type: string
type: array
notPorts:
description: NotPorts is the negated version of the Ports
field. Since only some protocols have ports, if any ports
are specified it requires the Protocol match in the Rule
to be set to "TCP" or "UDP".
items:
anyOf:
- type: integer
- type: string
pattern: ^.*
x-kubernetes-int-or-string: true
type: array
notSelector:
description: NotSelector is the negated version of the Selector
field. See Selector field for subtleties with negated
selectors.
type: string
ports:
description: "Ports is an optional field that restricts
the rule to only apply to traffic that has a source (destination)
port that matches one of these ranges/values. This value
is a list of integers or strings that represent ranges
of ports. \n Since only some protocols have ports, if
any ports are specified it requires the Protocol match
in the Rule to be set to \"TCP\" or \"UDP\"."
items:
anyOf:
- type: integer
- type: string
pattern: ^.*
x-kubernetes-int-or-string: true
type: array
selector:
description: "Selector is an optional field that contains
a selector expression (see Policy for sample syntax).
\ Only traffic that originates from (terminates at) endpoints
matching the selector will be matched. \n Note that: in
addition to the negated version of the Selector (see NotSelector
below), the selector expression syntax itself supports
negation. The two types of negation are subtly different.
One negates the set of matched endpoints, the other negates
the whole match: \n \tSelector = \"!has(my_label)\" matches
packets that are from other Calico-controlled \tendpoints
that do not have the label \"my_label\". \n \tNotSelector
= \"has(my_label)\" matches packets that are not from
Calico-controlled \tendpoints that do have the label \"my_label\".
\n The effect is that the latter will accept packets from
non-Calico sources whereas the former is limited to packets
from Calico-controlled endpoints."
type: string
serviceAccounts:
description: ServiceAccounts is an optional field that restricts
the rule to only apply to traffic that originates from
(or terminates at) a pod running as a matching service
account.
properties:
names:
description: Names is an optional field that restricts
the rule to only apply to traffic that originates
from (or terminates at) a pod running as a service
account whose name is in the list.
items:
type: string
type: array
selector:
description: Selector is an optional field that restricts
the rule to only apply to traffic that originates
from (or terminates at) a pod running as a service
account that matches the given label selector. If
both Names and Selector are specified then they are
AND'ed.
type: string
type: object
services:
description: "Services is an optional field that contains
options for matching Kubernetes Services. If specified,
only traffic that originates from or terminates at endpoints
within the selected service(s) will be matched, and only
to/from each endpoint's port. \n Services cannot be specified
on the same rule as Selector, NotSelector, NamespaceSelector,
Nets, NotNets or ServiceAccounts. \n Ports and NotPorts
can only be specified with Services on ingress rules."
properties:
name:
description: Name specifies the name of a Kubernetes
Service to match.
type: string
namespace:
description: Namespace specifies the namespace of the
given Service. If left empty, the rule will match
within this policy's namespace.
type: string
type: object
type: object
http:
description: HTTP contains match criteria that apply to HTTP
requests.
properties:
methods:
description: Methods is an optional field that restricts
the rule to apply only to HTTP requests that use one of
the listed HTTP Methods (e.g. GET, PUT, etc.) Multiple
methods are OR'd together.
items:
type: string
type: array
paths:
description: 'Paths is an optional field that restricts
the rule to apply to HTTP requests that use one of the
listed HTTP Paths. Multiple paths are OR''d together.
e.g: - exact: /foo - prefix: /bar NOTE: Each entry may
ONLY specify either a `exact` or a `prefix` match. The
validator will check for it.'
items:
description: 'HTTPPath specifies an HTTP path to match.
It may be either of the form: exact: <path>: which matches
the path exactly or prefix: <path-prefix>: which matches
the path prefix'
properties:
exact:
type: string
prefix:
type: string
type: object
type: array
type: object
icmp:
description: ICMP is an optional field that restricts the rule
to apply to a specific type and code of ICMP traffic. This
should only be specified if the Protocol field is set to "ICMP"
or "ICMPv6".
properties:
code:
description: Match on a specific ICMP code. If specified,
the Type value must also be specified. This is a technical
limitation imposed by the kernel's iptables firewall,
which Calico uses to enforce the rule.
type: integer
type:
description: Match on a specific ICMP type. For example
a value of 8 refers to ICMP Echo Request (i.e. pings).
type: integer
type: object
ipVersion:
description: IPVersion is an optional field that restricts the
rule to only match a specific IP version.
type: integer
metadata:
description: Metadata contains additional information for this
rule
properties:
annotations:
additionalProperties:
type: string
description: Annotations is a set of key value pairs that
give extra information about the rule
type: object
type: object
notICMP:
description: NotICMP is the negated version of the ICMP field.
properties:
code:
description: Match on a specific ICMP code. If specified,
the Type value must also be specified. This is a technical
limitation imposed by the kernel's iptables firewall,
which Calico uses to enforce the rule.
type: integer
type:
description: Match on a specific ICMP type. For example
a value of 8 refers to ICMP Echo Request (i.e. pings).
type: integer
type: object
notProtocol:
anyOf:
- type: integer
- type: string
description: NotProtocol is the negated version of the Protocol
field.
pattern: ^.*
x-kubernetes-int-or-string: true
protocol:
anyOf:
- type: integer
- type: string
description: "Protocol is an optional field that restricts the
rule to only apply to traffic of a specific IP protocol. Required
if any of the EntityRules contain Ports (because ports only
apply to certain protocols). \n Must be one of these string
values: \"TCP\", \"UDP\", \"ICMP\", \"ICMPv6\", \"SCTP\",
\"UDPLite\" or an integer in the range 1-255."
pattern: ^.*
x-kubernetes-int-or-string: true
source:
description: Source contains the match criteria that apply to
source entity.
properties:
namespaceSelector:
description: "NamespaceSelector is an optional field that
contains a selector expression. Only traffic that originates
from (or terminates at) endpoints within the selected
namespaces will be matched. When both NamespaceSelector
and another selector are defined on the same rule, then
only workload endpoints that are matched by both selectors
will be selected by the rule. \n For NetworkPolicy, an
empty NamespaceSelector implies that the Selector is limited
to selecting only workload endpoints in the same namespace
as the NetworkPolicy. \n For NetworkPolicy, `global()`
NamespaceSelector implies that the Selector is limited
to selecting only GlobalNetworkSet or HostEndpoint. \n
For GlobalNetworkPolicy, an empty NamespaceSelector implies
the Selector applies to workload endpoints across all
namespaces."
type: string
nets:
description: Nets is an optional field that restricts the
rule to only apply to traffic that originates from (or
terminates at) IP addresses in any of the given subnets.
items:
type: string
type: array
notNets:
description: NotNets is the negated version of the Nets
field.
items:
type: string
type: array
notPorts:
description: NotPorts is the negated version of the Ports
field. Since only some protocols have ports, if any ports
are specified it requires the Protocol match in the Rule
to be set to "TCP" or "UDP".
items:
anyOf:
- type: integer
- type: string
pattern: ^.*
x-kubernetes-int-or-string: true
type: array
notSelector:
description: NotSelector is the negated version of the Selector
field. See Selector field for subtleties with negated
selectors.
type: string
ports:
description: "Ports is an optional field that restricts
the rule to only apply to traffic that has a source (destination)
port that matches one of these ranges/values. This value
is a list of integers or strings that represent ranges
of ports. \n Since only some protocols have ports, if
any ports are specified it requires the Protocol match
in the Rule to be set to \"TCP\" or \"UDP\"."
items:
anyOf:
- type: integer
- type: string
pattern: ^.*
x-kubernetes-int-or-string: true
type: array
selector:
description: "Selector is an optional field that contains
a selector expression (see Policy for sample syntax).
\ Only traffic that originates from (terminates at) endpoints
matching the selector will be matched. \n Note that: in
addition to the negated version of the Selector (see NotSelector
below), the selector expression syntax itself supports
negation. The two types of negation are subtly different.
One negates the set of matched endpoints, the other negates
the whole match: \n \tSelector = \"!has(my_label)\" matches
packets that are from other Calico-controlled \tendpoints
that do not have the label \"my_label\". \n \tNotSelector
= \"has(my_label)\" matches packets that are not from
Calico-controlled \tendpoints that do have the label \"my_label\".
\n The effect is that the latter will accept packets from
non-Calico sources whereas the former is limited to packets
from Calico-controlled endpoints."
type: string
serviceAccounts:
description: ServiceAccounts is an optional field that restricts
the rule to only apply to traffic that originates from
(or terminates at) a pod running as a matching service
account.
properties:
names:
description: Names is an optional field that restricts
the rule to only apply to traffic that originates
from (or terminates at) a pod running as a service
account whose name is in the list.
items:
type: string
type: array
selector:
description: Selector is an optional field that restricts
the rule to only apply to traffic that originates
from (or terminates at) a pod running as a service
account that matches the given label selector. If
both Names and Selector are specified then they are
AND'ed.
type: string
type: object
services:
description: "Services is an optional field that contains
options for matching Kubernetes Services. If specified,
only traffic that originates from or terminates at endpoints
within the selected service(s) will be matched, and only
to/from each endpoint's port. \n Services cannot be specified
on the same rule as Selector, NotSelector, NamespaceSelector,
Nets, NotNets or ServiceAccounts. \n Ports and NotPorts
can only be specified with Services on ingress rules."
properties:
name:
description: Name specifies the name of a Kubernetes
Service to match.
type: string
namespace:
description: Namespace specifies the namespace of the
given Service. If left empty, the rule will match
within this policy's namespace.
type: string
type: object
type: object
required:
- action
type: object
type: array
namespaceSelector:
description: NamespaceSelector is an optional field for an expression
used to select a pod based on namespaces.
type: string
order:
description: Order is an optional field that specifies the order in
which the policy is applied. Policies with higher "order" are applied
after those with lower order. If the order is omitted, it may be
considered to be "infinite" - i.e. the policy will be applied last. Policies
with identical order will be applied in alphanumerical order based
on the Policy "Name".
type: number
preDNAT:
description: PreDNAT indicates to apply the rules in this policy before
any DNAT.
type: boolean
selector:
description: "The selector is an expression used to pick pick out
the endpoints that the policy should be applied to. \n Selector
expressions follow this syntax: \n \tlabel == \"string_literal\"
\ -> comparison, e.g. my_label == \"foo bar\" \tlabel != \"string_literal\"
\ -> not equal; also matches if label is not present \tlabel in
{ \"a\", \"b\", \"c\", ... } -> true if the value of label X is
one of \"a\", \"b\", \"c\" \tlabel not in { \"a\", \"b\", \"c\",
... } -> true if the value of label X is not one of \"a\", \"b\",
\"c\" \thas(label_name) -> True if that label is present \t! expr
-> negation of expr \texpr && expr -> Short-circuit and \texpr
|| expr -> Short-circuit or \t( expr ) -> parens for grouping \tall()
or the empty selector -> matches all endpoints. \n Label names are
allowed to contain alphanumerics, -, _ and /. String literals are
more permissive but they do not support escape characters. \n Examples
(with made-up labels): \n \ttype == \"webserver\" && deployment
== \"prod\" \ttype in {\"frontend\", \"backend\"} \tdeployment !=
\"dev\" \t! has(label_name)"
type: string
serviceAccountSelector:
description: ServiceAccountSelector is an optional field for an expression
used to select a pod based on service accounts.
type: string
types:
description: "Types indicates whether this policy applies to ingress,
or to egress, or to both. When not explicitly specified (and so
the value on creation is empty or nil), Calico defaults Types according
to what Ingress and Egress rules are present in the policy. The
default is: \n - [ PolicyTypeIngress ], if there are no Egress rules
(including the case where there are also no Ingress rules) \n
- [ PolicyTypeEgress ], if there are Egress rules but no Ingress
rules \n - [ PolicyTypeIngress, PolicyTypeEgress ], if there are
both Ingress and Egress rules. \n When the policy is read back again,
Types will always be one of these values, never empty or nil."
items:
description: PolicyType enumerates the possible values of the PolicySpec
Types field.
type: string
type: array
type: object
type: object
served: true
storage: true
status:
acceptedNames:
kind: ""
plural: ""
conditions: []
storedVersions: []
---
apiVersion: apiextensions.k8s.io/v1
kind: CustomResourceDefinition
metadata:
name: globalnetworksets.crd.projectcalico.org
spec:
group: crd.projectcalico.org
names:
kind: GlobalNetworkSet
listKind: GlobalNetworkSetList
plural: globalnetworksets
singular: globalnetworkset
scope: Cluster
versions:
- name: v1
schema:
openAPIV3Schema:
description: GlobalNetworkSet contains a set of arbitrary IP sub-networks/CIDRs
that share labels to allow rules to refer to them via selectors. The labels
of GlobalNetworkSet are not namespaced.
properties:
apiVersion:
description: 'APIVersion defines the versioned schema of this representation
of an object. Servers should convert recognized schemas to the latest
internal value, and may reject unrecognized values. More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#resources'
type: string
kind:
description: 'Kind is a string value representing the REST resource this
object represents. Servers may infer this from the endpoint the client
submits requests to. Cannot be updated. In CamelCase. More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#types-kinds'
type: string
metadata:
type: object
spec:
description: GlobalNetworkSetSpec contains the specification for a NetworkSet
resource.
properties:
nets:
description: The list of IP networks that belong to this set.
items:
type: string
type: array
type: object
type: object
served: true
storage: true
status:
acceptedNames:
kind: ""
plural: ""
conditions: []
storedVersions: []
---
apiVersion: apiextensions.k8s.io/v1
kind: CustomResourceDefinition
metadata:
name: hostendpoints.crd.projectcalico.org
spec:
group: crd.projectcalico.org
names:
kind: HostEndpoint
listKind: HostEndpointList
plural: hostendpoints
singular: hostendpoint
scope: Cluster
versions:
- name: v1
schema:
openAPIV3Schema:
properties:
apiVersion:
description: 'APIVersion defines the versioned schema of this representation
of an object. Servers should convert recognized schemas to the latest
internal value, and may reject unrecognized values. More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#resources'
type: string
kind:
description: 'Kind is a string value representing the REST resource this
object represents. Servers may infer this from the endpoint the client
submits requests to. Cannot be updated. In CamelCase. More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#types-kinds'
type: string
metadata:
type: object
spec:
description: HostEndpointSpec contains the specification for a HostEndpoint
resource.
properties:
expectedIPs:
description: "The expected IP addresses (IPv4 and IPv6) of the endpoint.
If \"InterfaceName\" is not present, Calico will look for an interface
matching any of the IPs in the list and apply policy to that. Note:
\tWhen using the selector match criteria in an ingress or egress
security Policy \tor Profile, Calico converts the selector into
a set of IP addresses. For host \tendpoints, the ExpectedIPs field
is used for that purpose. (If only the interface \tname is specified,
Calico does not learn the IPs of the interface for use in match
\tcriteria.)"
items:
type: string
type: array
interfaceName:
description: "Either \"*\", or the name of a specific Linux interface
to apply policy to; or empty. \"*\" indicates that this HostEndpoint
governs all traffic to, from or through the default network namespace
of the host named by the \"Node\" field; entering and leaving that
namespace via any interface, including those from/to non-host-networked
local workloads. \n If InterfaceName is not \"*\", this HostEndpoint
only governs traffic that enters or leaves the host through the
specific interface named by InterfaceName, or - when InterfaceName
is empty - through the specific interface that has one of the IPs
in ExpectedIPs. Therefore, when InterfaceName is empty, at least
one expected IP must be specified. Only external interfaces (such
as \"eth0\") are supported here; it isn't possible for a HostEndpoint
to protect traffic through a specific local workload interface.
\n Note: Only some kinds of policy are implemented for \"*\" HostEndpoints;
initially just pre-DNAT policy. Please check Calico documentation
for the latest position."
type: string
node:
description: The node name identifying the Calico node instance.
type: string
ports:
description: Ports contains the endpoint's named ports, which may
be referenced in security policy rules.
items:
properties:
name:
type: string
port:
type: integer
protocol:
anyOf:
- type: integer
- type: string
pattern: ^.*
x-kubernetes-int-or-string: true
required:
- name
- port
- protocol
type: object
type: array
profiles:
description: A list of identifiers of security Profile objects that
apply to this endpoint. Each profile is applied in the order that
they appear in this list. Profile rules are applied after the selector-based
security policy.
items:
type: string
type: array
type: object
type: object
served: true
storage: true
status:
acceptedNames:
kind: ""
plural: ""
conditions: []
storedVersions: []
---
apiVersion: apiextensions.k8s.io/v1
kind: CustomResourceDefinition
metadata:
name: ipamblocks.crd.projectcalico.org
spec:
group: crd.projectcalico.org
names:
kind: IPAMBlock
listKind: IPAMBlockList
plural: ipamblocks
singular: ipamblock
scope: Cluster
versions:
- name: v1
schema:
openAPIV3Schema:
properties:
apiVersion:
description: 'APIVersion defines the versioned schema of this representation
of an object. Servers should convert recognized schemas to the latest
internal value, and may reject unrecognized values. More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#resources'
type: string
kind:
description: 'Kind is a string value representing the REST resource this
object represents. Servers may infer this from the endpoint the client
submits requests to. Cannot be updated. In CamelCase. More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#types-kinds'
type: string
metadata:
type: object
spec:
description: IPAMBlockSpec contains the specification for an IPAMBlock
resource.
properties:
affinity:
type: string
allocations:
items:
type: integer
# TODO: This nullable is manually added in. We should update controller-gen
# to handle []*int properly itself.
nullable: true
type: array
attributes:
items:
properties:
handle_id:
type: string
secondary:
additionalProperties:
type: string
type: object
type: object
type: array
cidr:
type: string
deleted:
type: boolean
strictAffinity:
type: boolean
unallocated:
items:
type: integer
type: array
required:
- allocations
- attributes
- cidr
- strictAffinity
- unallocated
type: object
type: object
served: true
storage: true
status:
acceptedNames:
kind: ""
plural: ""
conditions: []
storedVersions: []
---
apiVersion: apiextensions.k8s.io/v1
kind: CustomResourceDefinition
metadata:
name: ipamconfigs.crd.projectcalico.org
spec:
group: crd.projectcalico.org
names:
kind: IPAMConfig
listKind: IPAMConfigList
plural: ipamconfigs
singular: ipamconfig
scope: Cluster
versions:
- name: v1
schema:
openAPIV3Schema:
properties:
apiVersion:
description: 'APIVersion defines the versioned schema of this representation
of an object. Servers should convert recognized schemas to the latest
internal value, and may reject unrecognized values. More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#resources'
type: string
kind:
description: 'Kind is a string value representing the REST resource this
object represents. Servers may infer this from the endpoint the client
submits requests to. Cannot be updated. In CamelCase. More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#types-kinds'
type: string
metadata:
type: object
spec:
description: IPAMConfigSpec contains the specification for an IPAMConfig
resource.
properties:
autoAllocateBlocks:
type: boolean
maxBlocksPerHost:
description: MaxBlocksPerHost, if non-zero, is the max number of blocks
that can be affine to each host.
type: integer
strictAffinity:
type: boolean
required:
- autoAllocateBlocks
- strictAffinity
type: object
type: object
served: true
storage: true
status:
acceptedNames:
kind: ""
plural: ""
conditions: []
storedVersions: []
---
apiVersion: apiextensions.k8s.io/v1
kind: CustomResourceDefinition
metadata:
name: ipamhandles.crd.projectcalico.org
spec:
group: crd.projectcalico.org
names:
kind: IPAMHandle
listKind: IPAMHandleList
plural: ipamhandles
singular: ipamhandle
scope: Cluster
versions:
- name: v1
schema:
openAPIV3Schema:
properties:
apiVersion:
description: 'APIVersion defines the versioned schema of this representation
of an object. Servers should convert recognized schemas to the latest
internal value, and may reject unrecognized values. More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#resources'
type: string
kind:
description: 'Kind is a string value representing the REST resource this
object represents. Servers may infer this from the endpoint the client
submits requests to. Cannot be updated. In CamelCase. More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#types-kinds'
type: string
metadata:
type: object
spec:
description: IPAMHandleSpec contains the specification for an IPAMHandle
resource.
properties:
block:
additionalProperties:
type: integer
type: object
deleted:
type: boolean
handleID:
type: string
required:
- block
- handleID
type: object
type: object
served: true
storage: true
status:
acceptedNames:
kind: ""
plural: ""
conditions: []
storedVersions: []
---
apiVersion: apiextensions.k8s.io/v1
kind: CustomResourceDefinition
metadata:
name: ippools.crd.projectcalico.org
spec:
group: crd.projectcalico.org
names:
kind: IPPool
listKind: IPPoolList
plural: ippools
singular: ippool
scope: Cluster
versions:
- name: v1
schema:
openAPIV3Schema:
properties:
apiVersion:
description: 'APIVersion defines the versioned schema of this representation
of an object. Servers should convert recognized schemas to the latest
internal value, and may reject unrecognized values. More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#resources'
type: string
kind:
description: 'Kind is a string value representing the REST resource this
object represents. Servers may infer this from the endpoint the client
submits requests to. Cannot be updated. In CamelCase. More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#types-kinds'
type: string
metadata:
type: object
spec:
description: IPPoolSpec contains the specification for an IPPool resource.
properties:
allowedUses:
description: AllowedUse controls what the IP pool will be used for. If
not specified or empty, defaults to ["Tunnel", "Workload"] for back-compatibility
items:
type: string
type: array
blockSize:
description: The block size to use for IP address assignments from
this pool. Defaults to 26 for IPv4 and 112 for IPv6.
type: integer
cidr:
description: The pool CIDR.
type: string
disabled:
description: When disabled is true, Calico IPAM will not assign addresses
from this pool.
type: boolean
disableBGPExport:
description: 'Disable exporting routes from this IP Pool’s CIDR over
BGP. [Default: false]'
type: boolean
ipip:
description: 'Deprecated: this field is only used for APIv1 backwards
compatibility. Setting this field is not allowed, this field is
for internal use only.'
properties:
enabled:
description: When enabled is true, ipip tunneling will be used
to deliver packets to destinations within this pool.
type: boolean
mode:
description: The IPIP mode. This can be one of "always" or "cross-subnet". A
mode of "always" will also use IPIP tunneling for routing to
destination IP addresses within this pool. A mode of "cross-subnet"
will only use IPIP tunneling when the destination node is on
a different subnet to the originating node. The default value
(if not specified) is "always".
type: string
type: object
ipipMode:
description: Contains configuration for IPIP tunneling for this pool.
If not specified, then this is defaulted to "Never" (i.e. IPIP tunneling
is disabled).
type: string
nat-outgoing:
description: 'Deprecated: this field is only used for APIv1 backwards
compatibility. Setting this field is not allowed, this field is
for internal use only.'
type: boolean
natOutgoing:
description: When nat-outgoing is true, packets sent from Calico networked
containers in this pool to destinations outside of this pool will
be masqueraded.
type: boolean
nodeSelector:
description: Allows IPPool to allocate for a specific node by label
selector.
type: string
vxlanMode:
description: Contains configuration for VXLAN tunneling for this pool.
If not specified, then this is defaulted to "Never" (i.e. VXLAN
tunneling is disabled).
type: string
required:
- cidr
type: object
type: object
served: true
storage: true
status:
acceptedNames:
kind: ""
plural: ""
conditions: []
storedVersions: []
---
apiVersion: apiextensions.k8s.io/v1
kind: CustomResourceDefinition
metadata:
name: ipreservations.crd.projectcalico.org
spec:
group: crd.projectcalico.org
names:
kind: IPReservation
listKind: IPReservationList
plural: ipreservations
singular: ipreservation
scope: Cluster
versions:
- name: v1
schema:
openAPIV3Schema:
properties:
apiVersion:
description: 'APIVersion defines the versioned schema of this representation
of an object. Servers should convert recognized schemas to the latest
internal value, and may reject unrecognized values. More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#resources'
type: string
kind:
description: 'Kind is a string value representing the REST resource this
object represents. Servers may infer this from the endpoint the client
submits requests to. Cannot be updated. In CamelCase. More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#types-kinds'
type: string
metadata:
type: object
spec:
description: IPReservationSpec contains the specification for an IPReservation
resource.
properties:
reservedCIDRs:
description: ReservedCIDRs is a list of CIDRs and/or IP addresses
that Calico IPAM will exclude from new allocations.
items:
type: string
type: array
type: object
type: object
served: true
storage: true
status:
acceptedNames:
kind: ""
plural: ""
conditions: []
storedVersions: []
---
apiVersion: apiextensions.k8s.io/v1
kind: CustomResourceDefinition
metadata:
name: kubecontrollersconfigurations.crd.projectcalico.org
spec:
group: crd.projectcalico.org
names:
kind: KubeControllersConfiguration
listKind: KubeControllersConfigurationList
plural: kubecontrollersconfigurations
singular: kubecontrollersconfiguration
scope: Cluster
versions:
- name: v1
schema:
openAPIV3Schema:
properties:
apiVersion:
description: 'APIVersion defines the versioned schema of this representation
of an object. Servers should convert recognized schemas to the latest
internal value, and may reject unrecognized values. More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#resources'
type: string
kind:
description: 'Kind is a string value representing the REST resource this
object represents. Servers may infer this from the endpoint the client
submits requests to. Cannot be updated. In CamelCase. More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#types-kinds'
type: string
metadata:
type: object
spec:
description: KubeControllersConfigurationSpec contains the values of the
Kubernetes controllers configuration.
properties:
controllers:
description: Controllers enables and configures individual Kubernetes
controllers
properties:
namespace:
description: Namespace enables and configures the namespace controller.
Enabled by default, set to nil to disable.
properties:
reconcilerPeriod:
description: 'ReconcilerPeriod is the period to perform reconciliation
with the Calico datastore. [Default: 5m]'
type: string
type: object
node:
description: Node enables and configures the node controller.
Enabled by default, set to nil to disable.
properties:
hostEndpoint:
description: HostEndpoint controls syncing nodes to host endpoints.
Disabled by default, set to nil to disable.
properties:
autoCreate:
description: 'AutoCreate enables automatic creation of
host endpoints for every node. [Default: Disabled]'
type: string
type: object
leakGracePeriod:
description: 'LeakGracePeriod is the period used by the controller
to determine if an IP address has been leaked. Set to 0
to disable IP garbage collection. [Default: 15m]'
type: string
reconcilerPeriod:
description: 'ReconcilerPeriod is the period to perform reconciliation
with the Calico datastore. [Default: 5m]'
type: string
syncLabels:
description: 'SyncLabels controls whether to copy Kubernetes
node labels to Calico nodes. [Default: Enabled]'
type: string
type: object
policy:
description: Policy enables and configures the policy controller.
Enabled by default, set to nil to disable.
properties:
reconcilerPeriod:
description: 'ReconcilerPeriod is the period to perform reconciliation
with the Calico datastore. [Default: 5m]'
type: string
type: object
serviceAccount:
description: ServiceAccount enables and configures the service
account controller. Enabled by default, set to nil to disable.
properties:
reconcilerPeriod:
description: 'ReconcilerPeriod is the period to perform reconciliation
with the Calico datastore. [Default: 5m]'
type: string
type: object
workloadEndpoint:
description: WorkloadEndpoint enables and configures the workload
endpoint controller. Enabled by default, set to nil to disable.
properties:
reconcilerPeriod:
description: 'ReconcilerPeriod is the period to perform reconciliation
with the Calico datastore. [Default: 5m]'
type: string
type: object
type: object
etcdV3CompactionPeriod:
description: 'EtcdV3CompactionPeriod is the period between etcdv3
compaction requests. Set to 0 to disable. [Default: 10m]'
type: string
healthChecks:
description: 'HealthChecks enables or disables support for health
checks [Default: Enabled]'
type: string
logSeverityScreen:
description: 'LogSeverityScreen is the log severity above which logs
are sent to the stdout. [Default: Info]'
type: string
prometheusMetricsPort:
description: 'PrometheusMetricsPort is the TCP port that the Prometheus
metrics server should bind to. Set to 0 to disable. [Default: 9094]'
type: integer
required:
- controllers
type: object
status:
description: KubeControllersConfigurationStatus represents the status
of the configuration. It's useful for admins to be able to see the actual
config that was applied, which can be modified by environment variables
on the kube-controllers process.
properties:
environmentVars:
additionalProperties:
type: string
description: EnvironmentVars contains the environment variables on
the kube-controllers that influenced the RunningConfig.
type: object
runningConfig:
description: RunningConfig contains the effective config that is running
in the kube-controllers pod, after merging the API resource with
any environment variables.
properties:
controllers:
description: Controllers enables and configures individual Kubernetes
controllers
properties:
namespace:
description: Namespace enables and configures the namespace
controller. Enabled by default, set to nil to disable.
properties:
reconcilerPeriod:
description: 'ReconcilerPeriod is the period to perform
reconciliation with the Calico datastore. [Default:
5m]'
type: string
type: object
node:
description: Node enables and configures the node controller.
Enabled by default, set to nil to disable.
properties:
hostEndpoint:
description: HostEndpoint controls syncing nodes to host
endpoints. Disabled by default, set to nil to disable.
properties:
autoCreate:
description: 'AutoCreate enables automatic creation
of host endpoints for every node. [Default: Disabled]'
type: string
type: object
leakGracePeriod:
description: 'LeakGracePeriod is the period used by the
controller to determine if an IP address has been leaked.
Set to 0 to disable IP garbage collection. [Default:
15m]'
type: string
reconcilerPeriod:
description: 'ReconcilerPeriod is the period to perform
reconciliation with the Calico datastore. [Default:
5m]'
type: string
syncLabels:
description: 'SyncLabels controls whether to copy Kubernetes
node labels to Calico nodes. [Default: Enabled]'
type: string
type: object
policy:
description: Policy enables and configures the policy controller.
Enabled by default, set to nil to disable.
properties:
reconcilerPeriod:
description: 'ReconcilerPeriod is the period to perform
reconciliation with the Calico datastore. [Default:
5m]'
type: string
type: object
serviceAccount:
description: ServiceAccount enables and configures the service
account controller. Enabled by default, set to nil to disable.
properties:
reconcilerPeriod:
description: 'ReconcilerPeriod is the period to perform
reconciliation with the Calico datastore. [Default:
5m]'
type: string
type: object
workloadEndpoint:
description: WorkloadEndpoint enables and configures the workload
endpoint controller. Enabled by default, set to nil to disable.
properties:
reconcilerPeriod:
description: 'ReconcilerPeriod is the period to perform
reconciliation with the Calico datastore. [Default:
5m]'
type: string
type: object
type: object
etcdV3CompactionPeriod:
description: 'EtcdV3CompactionPeriod is the period between etcdv3
compaction requests. Set to 0 to disable. [Default: 10m]'
type: string
healthChecks:
description: 'HealthChecks enables or disables support for health
checks [Default: Enabled]'
type: string
logSeverityScreen:
description: 'LogSeverityScreen is the log severity above which
logs are sent to the stdout. [Default: Info]'
type: string
prometheusMetricsPort:
description: 'PrometheusMetricsPort is the TCP port that the Prometheus
metrics server should bind to. Set to 0 to disable. [Default:
9094]'
type: integer
required:
- controllers
type: object
type: object
type: object
served: true
storage: true
status:
acceptedNames:
kind: ""
plural: ""
conditions: []
storedVersions: []
---
apiVersion: apiextensions.k8s.io/v1
kind: CustomResourceDefinition
metadata:
name: networkpolicies.crd.projectcalico.org
spec:
group: crd.projectcalico.org
names:
kind: NetworkPolicy
listKind: NetworkPolicyList
plural: networkpolicies
singular: networkpolicy
scope: Namespaced
versions:
- name: v1
schema:
openAPIV3Schema:
properties:
apiVersion:
description: 'APIVersion defines the versioned schema of this representation
of an object. Servers should convert recognized schemas to the latest
internal value, and may reject unrecognized values. More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#resources'
type: string
kind:
description: 'Kind is a string value representing the REST resource this
object represents. Servers may infer this from the endpoint the client
submits requests to. Cannot be updated. In CamelCase. More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#types-kinds'
type: string
metadata:
type: object
spec:
properties:
egress:
description: The ordered set of egress rules. Each rule contains
a set of packet match criteria and a corresponding action to apply.
items:
description: "A Rule encapsulates a set of match criteria and an
action. Both selector-based security Policy and security Profiles
reference rules - separated out as a list of rules for both ingress
and egress packet matching. \n Each positive match criteria has
a negated version, prefixed with \"Not\". All the match criteria
within a rule must be satisfied for a packet to match. A single
rule can contain the positive and negative version of a match
and both must be satisfied for the rule to match."
properties:
action:
type: string
destination:
description: Destination contains the match criteria that apply
to destination entity.
properties:
namespaceSelector:
description: "NamespaceSelector is an optional field that
contains a selector expression. Only traffic that originates
from (or terminates at) endpoints within the selected
namespaces will be matched. When both NamespaceSelector
and another selector are defined on the same rule, then
only workload endpoints that are matched by both selectors
will be selected by the rule. \n For NetworkPolicy, an
empty NamespaceSelector implies that the Selector is limited
to selecting only workload endpoints in the same namespace
as the NetworkPolicy. \n For NetworkPolicy, `global()`
NamespaceSelector implies that the Selector is limited
to selecting only GlobalNetworkSet or HostEndpoint. \n
For GlobalNetworkPolicy, an empty NamespaceSelector implies
the Selector applies to workload endpoints across all
namespaces."
type: string
nets:
description: Nets is an optional field that restricts the
rule to only apply to traffic that originates from (or
terminates at) IP addresses in any of the given subnets.
items:
type: string
type: array
notNets:
description: NotNets is the negated version of the Nets
field.
items:
type: string
type: array
notPorts:
description: NotPorts is the negated version of the Ports
field. Since only some protocols have ports, if any ports
are specified it requires the Protocol match in the Rule
to be set to "TCP" or "UDP".
items:
anyOf:
- type: integer
- type: string
pattern: ^.*
x-kubernetes-int-or-string: true
type: array
notSelector:
description: NotSelector is the negated version of the Selector
field. See Selector field for subtleties with negated
selectors.
type: string
ports:
description: "Ports is an optional field that restricts
the rule to only apply to traffic that has a source (destination)
port that matches one of these ranges/values. This value
is a list of integers or strings that represent ranges
of ports. \n Since only some protocols have ports, if
any ports are specified it requires the Protocol match
in the Rule to be set to \"TCP\" or \"UDP\"."
items:
anyOf:
- type: integer
- type: string
pattern: ^.*
x-kubernetes-int-or-string: true
type: array
selector:
description: "Selector is an optional field that contains
a selector expression (see Policy for sample syntax).
\ Only traffic that originates from (terminates at) endpoints
matching the selector will be matched. \n Note that: in
addition to the negated version of the Selector (see NotSelector
below), the selector expression syntax itself supports
negation. The two types of negation are subtly different.
One negates the set of matched endpoints, the other negates
the whole match: \n \tSelector = \"!has(my_label)\" matches
packets that are from other Calico-controlled \tendpoints
that do not have the label \"my_label\". \n \tNotSelector
= \"has(my_label)\" matches packets that are not from
Calico-controlled \tendpoints that do have the label \"my_label\".
\n The effect is that the latter will accept packets from
non-Calico sources whereas the former is limited to packets
from Calico-controlled endpoints."
type: string
serviceAccounts:
description: ServiceAccounts is an optional field that restricts
the rule to only apply to traffic that originates from
(or terminates at) a pod running as a matching service
account.
properties:
names:
description: Names is an optional field that restricts
the rule to only apply to traffic that originates
from (or terminates at) a pod running as a service
account whose name is in the list.
items:
type: string
type: array
selector:
description: Selector is an optional field that restricts
the rule to only apply to traffic that originates
from (or terminates at) a pod running as a service
account that matches the given label selector. If
both Names and Selector are specified then they are
AND'ed.
type: string
type: object
services:
description: "Services is an optional field that contains
options for matching Kubernetes Services. If specified,
only traffic that originates from or terminates at endpoints
within the selected service(s) will be matched, and only
to/from each endpoint's port. \n Services cannot be specified
on the same rule as Selector, NotSelector, NamespaceSelector,
Nets, NotNets or ServiceAccounts. \n Ports and NotPorts
can only be specified with Services on ingress rules."
properties:
name:
description: Name specifies the name of a Kubernetes
Service to match.
type: string
namespace:
description: Namespace specifies the namespace of the
given Service. If left empty, the rule will match
within this policy's namespace.
type: string
type: object
type: object
http:
description: HTTP contains match criteria that apply to HTTP
requests.
properties:
methods:
description: Methods is an optional field that restricts
the rule to apply only to HTTP requests that use one of
the listed HTTP Methods (e.g. GET, PUT, etc.) Multiple
methods are OR'd together.
items:
type: string
type: array
paths:
description: 'Paths is an optional field that restricts
the rule to apply to HTTP requests that use one of the
listed HTTP Paths. Multiple paths are OR''d together.
e.g: - exact: /foo - prefix: /bar NOTE: Each entry may
ONLY specify either a `exact` or a `prefix` match. The
validator will check for it.'
items:
description: 'HTTPPath specifies an HTTP path to match.
It may be either of the form: exact: <path>: which matches
the path exactly or prefix: <path-prefix>: which matches
the path prefix'
properties:
exact:
type: string
prefix:
type: string
type: object
type: array
type: object
icmp:
description: ICMP is an optional field that restricts the rule
to apply to a specific type and code of ICMP traffic. This
should only be specified if the Protocol field is set to "ICMP"
or "ICMPv6".
properties:
code:
description: Match on a specific ICMP code. If specified,
the Type value must also be specified. This is a technical
limitation imposed by the kernel's iptables firewall,
which Calico uses to enforce the rule.
type: integer
type:
description: Match on a specific ICMP type. For example
a value of 8 refers to ICMP Echo Request (i.e. pings).
type: integer
type: object
ipVersion:
description: IPVersion is an optional field that restricts the
rule to only match a specific IP version.
type: integer
metadata:
description: Metadata contains additional information for this
rule
properties:
annotations:
additionalProperties:
type: string
description: Annotations is a set of key value pairs that
give extra information about the rule
type: object
type: object
notICMP:
description: NotICMP is the negated version of the ICMP field.
properties:
code:
description: Match on a specific ICMP code. If specified,
the Type value must also be specified. This is a technical
limitation imposed by the kernel's iptables firewall,
which Calico uses to enforce the rule.
type: integer
type:
description: Match on a specific ICMP type. For example
a value of 8 refers to ICMP Echo Request (i.e. pings).
type: integer
type: object
notProtocol:
anyOf:
- type: integer
- type: string
description: NotProtocol is the negated version of the Protocol
field.
pattern: ^.*
x-kubernetes-int-or-string: true
protocol:
anyOf:
- type: integer
- type: string
description: "Protocol is an optional field that restricts the
rule to only apply to traffic of a specific IP protocol. Required
if any of the EntityRules contain Ports (because ports only
apply to certain protocols). \n Must be one of these string
values: \"TCP\", \"UDP\", \"ICMP\", \"ICMPv6\", \"SCTP\",
\"UDPLite\" or an integer in the range 1-255."
pattern: ^.*
x-kubernetes-int-or-string: true
source:
description: Source contains the match criteria that apply to
source entity.
properties:
namespaceSelector:
description: "NamespaceSelector is an optional field that
contains a selector expression. Only traffic that originates
from (or terminates at) endpoints within the selected
namespaces will be matched. When both NamespaceSelector
and another selector are defined on the same rule, then
only workload endpoints that are matched by both selectors
will be selected by the rule. \n For NetworkPolicy, an
empty NamespaceSelector implies that the Selector is limited
to selecting only workload endpoints in the same namespace
as the NetworkPolicy. \n For NetworkPolicy, `global()`
NamespaceSelector implies that the Selector is limited
to selecting only GlobalNetworkSet or HostEndpoint. \n
For GlobalNetworkPolicy, an empty NamespaceSelector implies
the Selector applies to workload endpoints across all
namespaces."
type: string
nets:
description: Nets is an optional field that restricts the
rule to only apply to traffic that originates from (or
terminates at) IP addresses in any of the given subnets.
items:
type: string
type: array
notNets:
description: NotNets is the negated version of the Nets
field.
items:
type: string
type: array
notPorts:
description: NotPorts is the negated version of the Ports
field. Since only some protocols have ports, if any ports
are specified it requires the Protocol match in the Rule
to be set to "TCP" or "UDP".
items:
anyOf:
- type: integer
- type: string
pattern: ^.*
x-kubernetes-int-or-string: true
type: array
notSelector:
description: NotSelector is the negated version of the Selector
field. See Selector field for subtleties with negated
selectors.
type: string
ports:
description: "Ports is an optional field that restricts
the rule to only apply to traffic that has a source (destination)
port that matches one of these ranges/values. This value
is a list of integers or strings that represent ranges
of ports. \n Since only some protocols have ports, if
any ports are specified it requires the Protocol match
in the Rule to be set to \"TCP\" or \"UDP\"."
items:
anyOf:
- type: integer
- type: string
pattern: ^.*
x-kubernetes-int-or-string: true
type: array
selector:
description: "Selector is an optional field that contains
a selector expression (see Policy for sample syntax).
\ Only traffic that originates from (terminates at) endpoints
matching the selector will be matched. \n Note that: in
addition to the negated version of the Selector (see NotSelector
below), the selector expression syntax itself supports
negation. The two types of negation are subtly different.
One negates the set of matched endpoints, the other negates
the whole match: \n \tSelector = \"!has(my_label)\" matches
packets that are from other Calico-controlled \tendpoints
that do not have the label \"my_label\". \n \tNotSelector
= \"has(my_label)\" matches packets that are not from
Calico-controlled \tendpoints that do have the label \"my_label\".
\n The effect is that the latter will accept packets from
non-Calico sources whereas the former is limited to packets
from Calico-controlled endpoints."
type: string
serviceAccounts:
description: ServiceAccounts is an optional field that restricts
the rule to only apply to traffic that originates from
(or terminates at) a pod running as a matching service
account.
properties:
names:
description: Names is an optional field that restricts
the rule to only apply to traffic that originates
from (or terminates at) a pod running as a service
account whose name is in the list.
items:
type: string
type: array
selector:
description: Selector is an optional field that restricts
the rule to only apply to traffic that originates
from (or terminates at) a pod running as a service
account that matches the given label selector. If
both Names and Selector are specified then they are
AND'ed.
type: string
type: object
services:
description: "Services is an optional field that contains
options for matching Kubernetes Services. If specified,
only traffic that originates from or terminates at endpoints
within the selected service(s) will be matched, and only
to/from each endpoint's port. \n Services cannot be specified
on the same rule as Selector, NotSelector, NamespaceSelector,
Nets, NotNets or ServiceAccounts. \n Ports and NotPorts
can only be specified with Services on ingress rules."
properties:
name:
description: Name specifies the name of a Kubernetes
Service to match.
type: string
namespace:
description: Namespace specifies the namespace of the
given Service. If left empty, the rule will match
within this policy's namespace.
type: string
type: object
type: object
required:
- action
type: object
type: array
ingress:
description: The ordered set of ingress rules. Each rule contains
a set of packet match criteria and a corresponding action to apply.
items:
description: "A Rule encapsulates a set of match criteria and an
action. Both selector-based security Policy and security Profiles
reference rules - separated out as a list of rules for both ingress
and egress packet matching. \n Each positive match criteria has
a negated version, prefixed with \"Not\". All the match criteria
within a rule must be satisfied for a packet to match. A single
rule can contain the positive and negative version of a match
and both must be satisfied for the rule to match."
properties:
action:
type: string
destination:
description: Destination contains the match criteria that apply
to destination entity.
properties:
namespaceSelector:
description: "NamespaceSelector is an optional field that
contains a selector expression. Only traffic that originates
from (or terminates at) endpoints within the selected
namespaces will be matched. When both NamespaceSelector
and another selector are defined on the same rule, then
only workload endpoints that are matched by both selectors
will be selected by the rule. \n For NetworkPolicy, an
empty NamespaceSelector implies that the Selector is limited
to selecting only workload endpoints in the same namespace
as the NetworkPolicy. \n For NetworkPolicy, `global()`
NamespaceSelector implies that the Selector is limited
to selecting only GlobalNetworkSet or HostEndpoint. \n
For GlobalNetworkPolicy, an empty NamespaceSelector implies
the Selector applies to workload endpoints across all
namespaces."
type: string
nets:
description: Nets is an optional field that restricts the
rule to only apply to traffic that originates from (or
terminates at) IP addresses in any of the given subnets.
items:
type: string
type: array
notNets:
description: NotNets is the negated version of the Nets
field.
items:
type: string
type: array
notPorts:
description: NotPorts is the negated version of the Ports
field. Since only some protocols have ports, if any ports
are specified it requires the Protocol match in the Rule
to be set to "TCP" or "UDP".
items:
anyOf:
- type: integer
- type: string
pattern: ^.*
x-kubernetes-int-or-string: true
type: array
notSelector:
description: NotSelector is the negated version of the Selector
field. See Selector field for subtleties with negated
selectors.
type: string
ports:
description: "Ports is an optional field that restricts
the rule to only apply to traffic that has a source (destination)
port that matches one of these ranges/values. This value
is a list of integers or strings that represent ranges
of ports. \n Since only some protocols have ports, if
any ports are specified it requires the Protocol match
in the Rule to be set to \"TCP\" or \"UDP\"."
items:
anyOf:
- type: integer
- type: string
pattern: ^.*
x-kubernetes-int-or-string: true
type: array
selector:
description: "Selector is an optional field that contains
a selector expression (see Policy for sample syntax).
\ Only traffic that originates from (terminates at) endpoints
matching the selector will be matched. \n Note that: in
addition to the negated version of the Selector (see NotSelector
below), the selector expression syntax itself supports
negation. The two types of negation are subtly different.
One negates the set of matched endpoints, the other negates
the whole match: \n \tSelector = \"!has(my_label)\" matches
packets that are from other Calico-controlled \tendpoints
that do not have the label \"my_label\". \n \tNotSelector
= \"has(my_label)\" matches packets that are not from
Calico-controlled \tendpoints that do have the label \"my_label\".
\n The effect is that the latter will accept packets from
non-Calico sources whereas the former is limited to packets
from Calico-controlled endpoints."
type: string
serviceAccounts:
description: ServiceAccounts is an optional field that restricts
the rule to only apply to traffic that originates from
(or terminates at) a pod running as a matching service
account.
properties:
names:
description: Names is an optional field that restricts
the rule to only apply to traffic that originates
from (or terminates at) a pod running as a service
account whose name is in the list.
items:
type: string
type: array
selector:
description: Selector is an optional field that restricts
the rule to only apply to traffic that originates
from (or terminates at) a pod running as a service
account that matches the given label selector. If
both Names and Selector are specified then they are
AND'ed.
type: string
type: object
services:
description: "Services is an optional field that contains
options for matching Kubernetes Services. If specified,
only traffic that originates from or terminates at endpoints
within the selected service(s) will be matched, and only
to/from each endpoint's port. \n Services cannot be specified
on the same rule as Selector, NotSelector, NamespaceSelector,
Nets, NotNets or ServiceAccounts. \n Ports and NotPorts
can only be specified with Services on ingress rules."
properties:
name:
description: Name specifies the name of a Kubernetes
Service to match.
type: string
namespace:
description: Namespace specifies the namespace of the
given Service. If left empty, the rule will match
within this policy's namespace.
type: string
type: object
type: object
http:
description: HTTP contains match criteria that apply to HTTP
requests.
properties:
methods:
description: Methods is an optional field that restricts
the rule to apply only to HTTP requests that use one of
the listed HTTP Methods (e.g. GET, PUT, etc.) Multiple
methods are OR'd together.
items:
type: string
type: array
paths:
description: 'Paths is an optional field that restricts
the rule to apply to HTTP requests that use one of the
listed HTTP Paths. Multiple paths are OR''d together.
e.g: - exact: /foo - prefix: /bar NOTE: Each entry may
ONLY specify either a `exact` or a `prefix` match. The
validator will check for it.'
items:
description: 'HTTPPath specifies an HTTP path to match.
It may be either of the form: exact: <path>: which matches
the path exactly or prefix: <path-prefix>: which matches
the path prefix'
properties:
exact:
type: string
prefix:
type: string
type: object
type: array
type: object
icmp:
description: ICMP is an optional field that restricts the rule
to apply to a specific type and code of ICMP traffic. This
should only be specified if the Protocol field is set to "ICMP"
or "ICMPv6".
properties:
code:
description: Match on a specific ICMP code. If specified,
the Type value must also be specified. This is a technical
limitation imposed by the kernel's iptables firewall,
which Calico uses to enforce the rule.
type: integer
type:
description: Match on a specific ICMP type. For example
a value of 8 refers to ICMP Echo Request (i.e. pings).
type: integer
type: object
ipVersion:
description: IPVersion is an optional field that restricts the
rule to only match a specific IP version.
type: integer
metadata:
description: Metadata contains additional information for this
rule
properties:
annotations:
additionalProperties:
type: string
description: Annotations is a set of key value pairs that
give extra information about the rule
type: object
type: object
notICMP:
description: NotICMP is the negated version of the ICMP field.
properties:
code:
description: Match on a specific ICMP code. If specified,
the Type value must also be specified. This is a technical
limitation imposed by the kernel's iptables firewall,
which Calico uses to enforce the rule.
type: integer
type:
description: Match on a specific ICMP type. For example
a value of 8 refers to ICMP Echo Request (i.e. pings).
type: integer
type: object
notProtocol:
anyOf:
- type: integer
- type: string
description: NotProtocol is the negated version of the Protocol
field.
pattern: ^.*
x-kubernetes-int-or-string: true
protocol:
anyOf:
- type: integer
- type: string
description: "Protocol is an optional field that restricts the
rule to only apply to traffic of a specific IP protocol. Required
if any of the EntityRules contain Ports (because ports only
apply to certain protocols). \n Must be one of these string
values: \"TCP\", \"UDP\", \"ICMP\", \"ICMPv6\", \"SCTP\",
\"UDPLite\" or an integer in the range 1-255."
pattern: ^.*
x-kubernetes-int-or-string: true
source:
description: Source contains the match criteria that apply to
source entity.
properties:
namespaceSelector:
description: "NamespaceSelector is an optional field that
contains a selector expression. Only traffic that originates
from (or terminates at) endpoints within the selected
namespaces will be matched. When both NamespaceSelector
and another selector are defined on the same rule, then
only workload endpoints that are matched by both selectors
will be selected by the rule. \n For NetworkPolicy, an
empty NamespaceSelector implies that the Selector is limited
to selecting only workload endpoints in the same namespace
as the NetworkPolicy. \n For NetworkPolicy, `global()`
NamespaceSelector implies that the Selector is limited
to selecting only GlobalNetworkSet or HostEndpoint. \n
For GlobalNetworkPolicy, an empty NamespaceSelector implies
the Selector applies to workload endpoints across all
namespaces."
type: string
nets:
description: Nets is an optional field that restricts the
rule to only apply to traffic that originates from (or
terminates at) IP addresses in any of the given subnets.
items:
type: string
type: array
notNets:
description: NotNets is the negated version of the Nets
field.
items:
type: string
type: array
notPorts:
description: NotPorts is the negated version of the Ports
field. Since only some protocols have ports, if any ports
are specified it requires the Protocol match in the Rule
to be set to "TCP" or "UDP".
items:
anyOf:
- type: integer
- type: string
pattern: ^.*
x-kubernetes-int-or-string: true
type: array
notSelector:
description: NotSelector is the negated version of the Selector
field. See Selector field for subtleties with negated
selectors.
type: string
ports:
description: "Ports is an optional field that restricts
the rule to only apply to traffic that has a source (destination)
port that matches one of these ranges/values. This value
is a list of integers or strings that represent ranges
of ports. \n Since only some protocols have ports, if
any ports are specified it requires the Protocol match
in the Rule to be set to \"TCP\" or \"UDP\"."
items:
anyOf:
- type: integer
- type: string
pattern: ^.*
x-kubernetes-int-or-string: true
type: array
selector:
description: "Selector is an optional field that contains
a selector expression (see Policy for sample syntax).
\ Only traffic that originates from (terminates at) endpoints
matching the selector will be matched. \n Note that: in
addition to the negated version of the Selector (see NotSelector
below), the selector expression syntax itself supports
negation. The two types of negation are subtly different.
One negates the set of matched endpoints, the other negates
the whole match: \n \tSelector = \"!has(my_label)\" matches
packets that are from other Calico-controlled \tendpoints
that do not have the label \"my_label\". \n \tNotSelector
= \"has(my_label)\" matches packets that are not from
Calico-controlled \tendpoints that do have the label \"my_label\".
\n The effect is that the latter will accept packets from
non-Calico sources whereas the former is limited to packets
from Calico-controlled endpoints."
type: string
serviceAccounts:
description: ServiceAccounts is an optional field that restricts
the rule to only apply to traffic that originates from
(or terminates at) a pod running as a matching service
account.
properties:
names:
description: Names is an optional field that restricts
the rule to only apply to traffic that originates
from (or terminates at) a pod running as a service
account whose name is in the list.
items:
type: string
type: array
selector:
description: Selector is an optional field that restricts
the rule to only apply to traffic that originates
from (or terminates at) a pod running as a service
account that matches the given label selector. If
both Names and Selector are specified then they are
AND'ed.
type: string
type: object
services:
description: "Services is an optional field that contains
options for matching Kubernetes Services. If specified,
only traffic that originates from or terminates at endpoints
within the selected service(s) will be matched, and only
to/from each endpoint's port. \n Services cannot be specified
on the same rule as Selector, NotSelector, NamespaceSelector,
Nets, NotNets or ServiceAccounts. \n Ports and NotPorts
can only be specified with Services on ingress rules."
properties:
name:
description: Name specifies the name of a Kubernetes
Service to match.
type: string
namespace:
description: Namespace specifies the namespace of the
given Service. If left empty, the rule will match
within this policy's namespace.
type: string
type: object
type: object
required:
- action
type: object
type: array
order:
description: Order is an optional field that specifies the order in
which the policy is applied. Policies with higher "order" are applied
after those with lower order. If the order is omitted, it may be
considered to be "infinite" - i.e. the policy will be applied last. Policies
with identical order will be applied in alphanumerical order based
on the Policy "Name".
type: number
selector:
description: "The selector is an expression used to pick pick out
the endpoints that the policy should be applied to. \n Selector
expressions follow this syntax: \n \tlabel == \"string_literal\"
\ -> comparison, e.g. my_label == \"foo bar\" \tlabel != \"string_literal\"
\ -> not equal; also matches if label is not present \tlabel in
{ \"a\", \"b\", \"c\", ... } -> true if the value of label X is
one of \"a\", \"b\", \"c\" \tlabel not in { \"a\", \"b\", \"c\",
... } -> true if the value of label X is not one of \"a\", \"b\",
\"c\" \thas(label_name) -> True if that label is present \t! expr
-> negation of expr \texpr && expr -> Short-circuit and \texpr
|| expr -> Short-circuit or \t( expr ) -> parens for grouping \tall()
or the empty selector -> matches all endpoints. \n Label names are
allowed to contain alphanumerics, -, _ and /. String literals are
more permissive but they do not support escape characters. \n Examples
(with made-up labels): \n \ttype == \"webserver\" && deployment
== \"prod\" \ttype in {\"frontend\", \"backend\"} \tdeployment !=
\"dev\" \t! has(label_name)"
type: string
serviceAccountSelector:
description: ServiceAccountSelector is an optional field for an expression
used to select a pod based on service accounts.
type: string
types:
description: "Types indicates whether this policy applies to ingress,
or to egress, or to both. When not explicitly specified (and so
the value on creation is empty or nil), Calico defaults Types according
to what Ingress and Egress are present in the policy. The default
is: \n - [ PolicyTypeIngress ], if there are no Egress rules (including
the case where there are also no Ingress rules) \n - [ PolicyTypeEgress
], if there are Egress rules but no Ingress rules \n - [ PolicyTypeIngress,
PolicyTypeEgress ], if there are both Ingress and Egress rules.
\n When the policy is read back again, Types will always be one
of these values, never empty or nil."
items:
description: PolicyType enumerates the possible values of the PolicySpec
Types field.
type: string
type: array
type: object
type: object
served: true
storage: true
status:
acceptedNames:
kind: ""
plural: ""
conditions: []
storedVersions: []
---
apiVersion: apiextensions.k8s.io/v1
kind: CustomResourceDefinition
metadata:
name: networksets.crd.projectcalico.org
spec:
group: crd.projectcalico.org
names:
kind: NetworkSet
listKind: NetworkSetList
plural: networksets
singular: networkset
scope: Namespaced
versions:
- name: v1
schema:
openAPIV3Schema:
description: NetworkSet is the Namespaced-equivalent of the GlobalNetworkSet.
properties:
apiVersion:
description: 'APIVersion defines the versioned schema of this representation
of an object. Servers should convert recognized schemas to the latest
internal value, and may reject unrecognized values. More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#resources'
type: string
kind:
description: 'Kind is a string value representing the REST resource this
object represents. Servers may infer this from the endpoint the client
submits requests to. Cannot be updated. In CamelCase. More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#types-kinds'
type: string
metadata:
type: object
spec:
description: NetworkSetSpec contains the specification for a NetworkSet
resource.
properties:
nets:
description: The list of IP networks that belong to this set.
items:
type: string
type: array
type: object
type: object
served: true
storage: true
status:
acceptedNames:
kind: ""
plural: ""
conditions: []
storedVersions: []
---
---
# Source: calico/templates/calico-kube-controllers-rbac.yaml
# Include a clusterrole for the kube-controllers component,
# and bind it to the calico-kube-controllers serviceaccount.
kind: ClusterRole
apiVersion: rbac.authorization.k8s.io/v1
metadata:
name: calico-kube-controllers
rules:
# Nodes are watched to monitor for deletions.
- apiGroups: [""]
resources:
- nodes
verbs:
- watch
- list
- get
# Pods are watched to check for existence as part of IPAM controller.
- apiGroups: [""]
resources:
- pods
verbs:
- get
- list
- watch
# IPAM resources are manipulated when nodes are deleted.
- apiGroups: ["crd.projectcalico.org"]
resources:
- ippools
- ipreservations
verbs:
- list
- apiGroups: ["crd.projectcalico.org"]
resources:
- blockaffinities
- ipamblocks
- ipamhandles
verbs:
- get
- list
- create
- update
- delete
- watch
# kube-controllers manages hostendpoints.
- apiGroups: ["crd.projectcalico.org"]
resources:
- hostendpoints
verbs:
- get
- list
- create
- update
- delete
# Needs access to update clusterinformations.
- apiGroups: ["crd.projectcalico.org"]
resources:
- clusterinformations
verbs:
- get
- create
- update
# KubeControllersConfiguration is where it gets its config
- apiGroups: ["crd.projectcalico.org"]
resources:
- kubecontrollersconfigurations
verbs:
# read its own config
- get
# create a default if none exists
- create
# update status
- update
# watch for changes
- watch
---
kind: ClusterRoleBinding
apiVersion: rbac.authorization.k8s.io/v1
metadata:
name: calico-kube-controllers
roleRef:
apiGroup: rbac.authorization.k8s.io
kind: ClusterRole
name: calico-kube-controllers
subjects:
- kind: ServiceAccount
name: calico-kube-controllers
namespace: kube-system
---
---
# Source: calico/templates/calico-node-rbac.yaml
# Include a clusterrole for the calico-node DaemonSet,
# and bind it to the calico-node serviceaccount.
kind: ClusterRole
apiVersion: rbac.authorization.k8s.io/v1
metadata:
name: calico-node
rules:
# The CNI plugin needs to get pods, nodes, and namespaces.
- apiGroups: [""]
resources:
- pods
- nodes
- namespaces
verbs:
- get
# EndpointSlices are used for Service-based network policy rule
# enforcement.
- apiGroups: ["discovery.k8s.io"]
resources:
- endpointslices
verbs:
- watch
- list
- apiGroups: [""]
resources:
- endpoints
- services
verbs:
# Used to discover service IPs for advertisement.
- watch
- list
# Used to discover Typhas.
- get
# Pod CIDR auto-detection on kubeadm needs access to config maps.
- apiGroups: [""]
resources:
- configmaps
verbs:
- get
- apiGroups: [""]
resources:
- nodes/status
verbs:
# Needed for clearing NodeNetworkUnavailable flag.
- patch
# Calico stores some configuration information in node annotations.
- update
# Watch for changes to Kubernetes NetworkPolicies.
- apiGroups: ["networking.k8s.io"]
resources:
- networkpolicies
verbs:
- watch
- list
# Used by Calico for policy information.
- apiGroups: [""]
resources:
- pods
- namespaces
- serviceaccounts
verbs:
- list
- watch
# The CNI plugin patches pods/status.
- apiGroups: [""]
resources:
- pods/status
verbs:
- patch
# Calico monitors various CRDs for config.
- apiGroups: ["crd.projectcalico.org"]
resources:
- globalfelixconfigs
- felixconfigurations
- bgppeers
- globalbgpconfigs
- bgpconfigurations
- ippools
- ipreservations
- ipamblocks
- globalnetworkpolicies
- globalnetworksets
- networkpolicies
- networksets
- clusterinformations
- hostendpoints
- blockaffinities
- caliconodestatuses
verbs:
- get
- list
- watch
# Calico must create and update some CRDs on startup.
- apiGroups: ["crd.projectcalico.org"]
resources:
- ippools
- felixconfigurations
- clusterinformations
verbs:
- create
- update
# Calico must update some CRDs.
- apiGroups: [ "crd.projectcalico.org" ]
resources:
- caliconodestatuses
verbs:
- update
# Calico stores some configuration information on the node.
- apiGroups: [""]
resources:
- nodes
verbs:
- get
- list
- watch
# These permissions are only required for upgrade from v2.6, and can
# be removed after upgrade or on fresh installations.
- apiGroups: ["crd.projectcalico.org"]
resources:
- bgpconfigurations
- bgppeers
verbs:
- create
- update
# These permissions are required for Calico CNI to perform IPAM allocations.
- apiGroups: ["crd.projectcalico.org"]
resources:
- blockaffinities
- ipamblocks
- ipamhandles
verbs:
- get
- list
- create
- update
- delete
- apiGroups: ["crd.projectcalico.org"]
resources:
- ipamconfigs
verbs:
- get
# Block affinities must also be watchable by confd for route aggregation.
- apiGroups: ["crd.projectcalico.org"]
resources:
- blockaffinities
verbs:
- watch
# The Calico IPAM migration needs to get daemonsets. These permissions can be
# removed if not upgrading from an installation using host-local IPAM.
- apiGroups: ["apps"]
resources:
- daemonsets
verbs:
- get
---
apiVersion: rbac.authorization.k8s.io/v1
kind: ClusterRoleBinding
metadata:
name: calico-node
roleRef:
apiGroup: rbac.authorization.k8s.io
kind: ClusterRole
name: calico-node
subjects:
- kind: ServiceAccount
name: calico-node
namespace: kube-system
---
# Source: calico/templates/calico-node.yaml
# This manifest installs the calico-node container, as well
# as the CNI plugins and network config on
# each master and worker node in a Kubernetes cluster.
kind: DaemonSet
apiVersion: apps/v1
metadata:
name: calico-node
namespace: kube-system
labels:
k8s-app: calico-node
spec:
selector:
matchLabels:
k8s-app: calico-node
updateStrategy:
type: RollingUpdate
rollingUpdate:
maxUnavailable: 1
template:
metadata:
labels:
k8s-app: calico-node
spec:
nodeSelector:
kubernetes.io/os: linux
hostNetwork: true
tolerations:
# Make sure calico-node gets scheduled on all nodes.
- effect: NoSchedule
operator: Exists
# Mark the pod as a critical add-on for rescheduling.
- key: CriticalAddonsOnly
operator: Exists
- effect: NoExecute
operator: Exists
serviceAccountName: calico-node
# Minimize downtime during a rolling upgrade or deletion; tell Kubernetes to do a "force
# deletion": https://kubernetes.io/docs/concepts/workloads/pods/pod/#termination-of-pods.
terminationGracePeriodSeconds: 0
priorityClassName: system-node-critical
initContainers:
# This container performs upgrade from host-local IPAM to calico-ipam.
# It can be deleted if this is a fresh installation, or if you have already
# upgraded to use calico-ipam.
- name: upgrade-ipam
image: docker.io/calico/cni:v3.21.2
command: ["/opt/cni/bin/calico-ipam", "-upgrade"]
envFrom:
- configMapRef:
# Allow KUBERNETES_SERVICE_HOST and KUBERNETES_SERVICE_PORT to be overridden for eBPF mode.
name: kubernetes-services-endpoint
optional: true
env:
- name: KUBERNETES_NODE_NAME
valueFrom:
fieldRef:
fieldPath: spec.nodeName
- name: CALICO_NETWORKING_BACKEND
valueFrom:
configMapKeyRef:
name: calico-config
key: calico_backend
volumeMounts:
- mountPath: /var/lib/cni/networks
name: host-local-net-dir
- mountPath: /host/opt/cni/bin
name: cni-bin-dir
securityContext:
privileged: true
# This container installs the CNI binaries
# and CNI network config file on each node.
- name: install-cni
image: docker.io/calico/cni:v3.21.2
command: ["/opt/cni/bin/install"]
envFrom:
- configMapRef:
# Allow KUBERNETES_SERVICE_HOST and KUBERNETES_SERVICE_PORT to be overridden for eBPF mode.
name: kubernetes-services-endpoint
optional: true
env:
# Name of the CNI config file to create.
- name: CNI_CONF_NAME
value: "10-calico.conflist"
# The CNI network config to install on each node.
- name: CNI_NETWORK_CONFIG
valueFrom:
configMapKeyRef:
name: calico-config
key: cni_network_config
# Set the hostname based on the k8s node name.
- name: KUBERNETES_NODE_NAME
valueFrom:
fieldRef:
fieldPath: spec.nodeName
# CNI MTU Config variable
- name: CNI_MTU
valueFrom:
configMapKeyRef:
name: calico-config
key: veth_mtu
# Prevents the container from sleeping forever.
- name: SLEEP
value: "false"
volumeMounts:
- mountPath: /host/opt/cni/bin
name: cni-bin-dir
- mountPath: /host/etc/cni/net.d
name: cni-net-dir
securityContext:
privileged: true
# Adds a Flex Volume Driver that creates a per-pod Unix Domain Socket to allow Dikastes
# to communicate with Felix over the Policy Sync API.
- name: flexvol-driver
image: docker.io/calico/pod2daemon-flexvol:v3.21.2
volumeMounts:
- name: flexvol-driver-host
mountPath: /host/driver
securityContext:
privileged: true
containers:
# Runs calico-node container on each Kubernetes node. This
# container programs network policy and routes on each
# host.
- name: calico-node
image: docker.io/calico/node:v3.21.2
envFrom:
- configMapRef:
# Allow KUBERNETES_SERVICE_HOST and KUBERNETES_SERVICE_PORT to be overridden for eBPF mode.
name: kubernetes-services-endpoint
optional: true
env:
# Use Kubernetes API as the backing datastore.
- name: DATASTORE_TYPE
value: "kubernetes"
# Wait for the datastore.
- name: WAIT_FOR_DATASTORE
value: "true"
# Set based on the k8s node name.
- name: NODENAME
valueFrom:
fieldRef:
fieldPath: spec.nodeName
# Choose the backend to use.
- name: CALICO_NETWORKING_BACKEND
valueFrom:
configMapKeyRef:
name: calico-config
key: calico_backend
# Cluster type to identify the deployment type
- name: CLUSTER_TYPE
value: "k8s,bgp"
# Auto-detect the BGP IP address.
- name: IP
value: "autodetect"
# Enable IPIP
- name: CALICO_IPV4POOL_IPIP
value: "Always"
# Enable or Disable VXLAN on the default IP pool.
- name: CALICO_IPV4POOL_VXLAN
value: "Never"
# Set MTU for tunnel device used if ipip is enabled
- name: FELIX_IPINIPMTU
valueFrom:
configMapKeyRef:
name: calico-config
key: veth_mtu
# Set MTU for the VXLAN tunnel device.
- name: FELIX_VXLANMTU
valueFrom:
configMapKeyRef:
name: calico-config
key: veth_mtu
# Set MTU for the Wireguard tunnel device.
- name: FELIX_WIREGUARDMTU
valueFrom:
configMapKeyRef:
name: calico-config
key: veth_mtu
# The default IPv4 pool to create on startup if none exists. Pod IPs will be
# chosen from this range. Changing this value after installation will have
# no effect. This should fall within `--cluster-cidr`.
- name: CALICO_IPV4POOL_CIDR
value: "10.244.0.0/16"
# Disable file logging so `kubectl logs` works.
- name: CALICO_DISABLE_FILE_LOGGING
value: "true"
# Set Felix endpoint to host default action to ACCEPT.
- name: FELIX_DEFAULTENDPOINTTOHOSTACTION
value: "ACCEPT"
# Disable IPv6 on Kubernetes.
- name: FELIX_IPV6SUPPORT
value: "false"
- name: FELIX_HEALTHENABLED
value: "true"
securityContext:
privileged: true
resources:
requests:
cpu: 250m
lifecycle:
preStop:
exec:
command:
- /bin/calico-node
- -shutdown
livenessProbe:
exec:
command:
- /bin/calico-node
- -felix-live
- -bird-live
periodSeconds: 10
initialDelaySeconds: 10
failureThreshold: 6
timeoutSeconds: 10
readinessProbe:
exec:
command:
- /bin/calico-node
- -felix-ready
- -bird-ready
periodSeconds: 10
timeoutSeconds: 10
volumeMounts:
# For maintaining CNI plugin API credentials.
- mountPath: /host/etc/cni/net.d
name: cni-net-dir
readOnly: false
- mountPath: /lib/modules
name: lib-modules
readOnly: true
- mountPath: /run/xtables.lock
name: xtables-lock
readOnly: false
- mountPath: /var/run/calico
name: var-run-calico
readOnly: false
- mountPath: /var/lib/calico
name: var-lib-calico
readOnly: false
- name: policysync
mountPath: /var/run/nodeagent
# For eBPF mode, we need to be able to mount the BPF filesystem at /sys/fs/bpf so we mount in the
# parent directory.
- name: sysfs
mountPath: /sys/fs/
# Bidirectional means that, if we mount the BPF filesystem at /sys/fs/bpf it will propagate to the host.
# If the host is known to mount that filesystem already then Bidirectional can be omitted.
mountPropagation: Bidirectional
- name: cni-log-dir
mountPath: /var/log/calico/cni
readOnly: true
volumes:
# Used by calico-node.
- name: lib-modules
hostPath:
path: /lib/modules
- name: var-run-calico
hostPath:
path: /var/run/calico
- name: var-lib-calico
hostPath:
path: /var/lib/calico
- name: xtables-lock
hostPath:
path: /run/xtables.lock
type: FileOrCreate
- name: sysfs
hostPath:
path: /sys/fs/
type: DirectoryOrCreate
# Used to install CNI.
- name: cni-bin-dir
hostPath:
path: /opt/cni/bin
- name: cni-net-dir
hostPath:
path: /etc/cni/net.d
# Used to access CNI logs.
- name: cni-log-dir
hostPath:
path: /var/log/calico/cni
# Mount in the directory for host-local IPAM allocations. This is
# used when upgrading from host-local to calico-ipam, and can be removed
# if not using the upgrade-ipam init container.
- name: host-local-net-dir
hostPath:
path: /var/lib/cni/networks
# Used to create per-pod Unix Domain Sockets
- name: policysync
hostPath:
type: DirectoryOrCreate
path: /var/run/nodeagent
# Used to install Flex Volume Driver
- name: flexvol-driver-host
hostPath:
type: DirectoryOrCreate
path: /usr/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds
---
apiVersion: v1
kind: ServiceAccount
metadata:
name: calico-node
namespace: kube-system
---
# Source: calico/templates/calico-kube-controllers.yaml
# See https://github.com/projectcalico/kube-controllers
apiVersion: apps/v1
kind: Deployment
metadata:
name: calico-kube-controllers
namespace: kube-system
labels:
k8s-app: calico-kube-controllers
spec:
# The controllers can only have a single active instance.
replicas: 1
selector:
matchLabels:
k8s-app: calico-kube-controllers
strategy:
type: Recreate
template:
metadata:
name: calico-kube-controllers
namespace: kube-system
labels:
k8s-app: calico-kube-controllers
spec:
nodeSelector:
kubernetes.io/os: linux
tolerations:
# Mark the pod as a critical add-on for rescheduling.
- key: CriticalAddonsOnly
operator: Exists
- key: node-role.kubernetes.io/master
effect: NoSchedule
serviceAccountName: calico-kube-controllers
priorityClassName: system-cluster-critical
containers:
- name: calico-kube-controllers
image: docker.io/calico/kube-controllers:v3.21.2
env:
# Choose which controllers to run.
- name: ENABLED_CONTROLLERS
value: node
- name: DATASTORE_TYPE
value: kubernetes
livenessProbe:
exec:
command:
- /usr/bin/check-status
- -l
periodSeconds: 10
initialDelaySeconds: 10
failureThreshold: 6
timeoutSeconds: 10
readinessProbe:
exec:
command:
- /usr/bin/check-status
- -r
periodSeconds: 10
---
apiVersion: v1
kind: ServiceAccount
metadata:
name: calico-kube-controllers
namespace: kube-system
---
# This manifest creates a Pod Disruption Budget for Controller to allow K8s Cluster Autoscaler to evict
apiVersion: policy/v1beta1
kind: PodDisruptionBudget
metadata:
name: calico-kube-controllers
namespace: kube-system
labels:
k8s-app: calico-kube-controllers
spec:
maxUnavailable: 1
selector:
matchLabels:
k8s-app: calico-kube-controllers
---
# Source: calico/templates/calico-etcd-secrets.yaml
---
# Source: calico/templates/calico-typha.yaml
---
# Source: calico/templates/configure-canal.yaml
kind: ConfigMap
metadata:
name: calico-cni-openstack
namespace: openstack | 52.901282 | 179 | 0.479256 |
f74130694a0ce3616ff518a77d06d364fa9adfa0 | 646 | yml | YAML | Chapter08/08-begin/config-service/k8s/deployment.yml | npalm/cloud-native-spring-in-action | 7cb7acabd47b14a522e39eac65989c08dd2cc9c0 | [
"Apache-2.0"
] | 1 | 2022-01-07T22:07:44.000Z | 2022-01-07T22:07:44.000Z | Chapter08/08-begin/config-service/k8s/deployment.yml | email2dhiren/cloud-native-spring-in-action | 7cb7acabd47b14a522e39eac65989c08dd2cc9c0 | [
"Apache-2.0"
] | null | null | null | Chapter08/08-begin/config-service/k8s/deployment.yml | email2dhiren/cloud-native-spring-in-action | 7cb7acabd47b14a522e39eac65989c08dd2cc9c0 | [
"Apache-2.0"
] | null | null | null | apiVersion: apps/v1
kind: Deployment
metadata:
name: config-service
labels:
app: config-service
spec:
replicas: 1
selector:
matchLabels:
app: config-service
template:
metadata:
labels:
app: config-service
spec:
containers:
- name: config-service
image: polarbookshop/config-service:0.0.1-SNAPSHOT
imagePullPolicy: Always
lifecycle:
preStop:
exec:
command: [ "sh", "-c", "sleep 5" ]
ports:
- containerPort: 8888
env:
- name: BPL_JVM_THREAD_COUNT
value: "50" | 22.275862 | 60 | 0.540248 |
f741fc4cd59af3dfe7fb5af969f1d60dbd828bd8 | 202 | yaml | YAML | test/e2e/test_data/rollout/service.yaml | FillZpp/rollouts | 6c1ae60f9c3b5aea1a8d853fa48ed5cbd3326bc1 | [
"Apache-2.0"
] | 8 | 2022-01-14T10:37:04.000Z | 2022-03-27T11:02:56.000Z | test/e2e/test_data/rollout/service.yaml | FillZpp/rollouts | 6c1ae60f9c3b5aea1a8d853fa48ed5cbd3326bc1 | [
"Apache-2.0"
] | 25 | 2022-01-14T05:37:52.000Z | 2022-03-31T07:08:39.000Z | test/e2e/test_data/rollout/service.yaml | FillZpp/rollouts | 6c1ae60f9c3b5aea1a8d853fa48ed5cbd3326bc1 | [
"Apache-2.0"
] | 4 | 2022-01-14T10:37:07.000Z | 2022-03-22T04:22:59.000Z | apiVersion: v1
kind: Service
metadata:
name: echoserver
labels:
app: echoserver
spec:
ports:
- port: 80
targetPort: 8080
protocol: TCP
name: http
selector:
app: echoserver
| 13.466667 | 20 | 0.658416 |
f7420b5b14bff1f0719924f2ee820b22748bdcb0 | 1,538 | yaml | YAML | deploy/3_deployment.yaml | schlapzz/rbac-manager | 560ebda763c91458b5cc157038d13afe1c496667 | [
"Apache-2.0"
] | 728 | 2019-07-12T19:40:21.000Z | 2022-03-31T08:31:29.000Z | deploy/3_deployment.yaml | schlapzz/rbac-manager | 560ebda763c91458b5cc157038d13afe1c496667 | [
"Apache-2.0"
] | 202 | 2019-07-11T07:42:51.000Z | 2022-03-28T13:22:27.000Z | deploy/3_deployment.yaml | schlapzz/rbac-manager | 560ebda763c91458b5cc157038d13afe1c496667 | [
"Apache-2.0"
] | 81 | 2019-07-17T09:43:32.000Z | 2022-03-21T17:24:54.000Z | apiVersion: apps/v1
kind: Deployment
metadata:
name: rbac-manager
namespace: rbac-manager
labels:
app: rbac-manager
spec:
replicas: 1
selector:
matchLabels:
app: rbac-manager
release: rbac-manager
template:
metadata:
labels:
app: rbac-manager
release: rbac-manager
spec:
serviceAccountName: rbac-manager
containers:
- name: rbac-manager
image: "quay.io/reactiveops/rbac-manager:v1"
imagePullPolicy: Always
# these liveness probes use the metrics endpoint
readinessProbe:
httpGet:
scheme: HTTP
path: /metrics
port: 8042
initialDelaySeconds: 5
timeoutSeconds: 3
periodSeconds: 3
failureThreshold: 3
livenessProbe:
httpGet:
scheme: HTTP
path: /metrics
port: 8042
initialDelaySeconds: 5
timeoutSeconds: 3
periodSeconds: 10
failureThreshold: 3
securityContext:
allowPrivilegeEscalation: false
privileged: false
readOnlyRootFilesystem: true
runAsNonRoot: true
capabilities:
drop:
- ALL
resources:
limits:
cpu: 100m
memory: 128Mi
requests:
cpu: 100m
memory: 128Mi
ports:
# metrics port
- name: http-metrics
containerPort: 8042
protocol: TCP
| 24.03125 | 56 | 0.542913 |
f74214a5639e42005eac47c04aae07bdd94959aa | 945 | yaml | YAML | kubernetes-networks/canary/web-canary-deploy.yaml | otus-kuber-2021-03/AleksandrZooLZakharov_platform | 82f60003d7bb21c14915788d445675a8eccc846c | [
"MIT"
] | null | null | null | kubernetes-networks/canary/web-canary-deploy.yaml | otus-kuber-2021-03/AleksandrZooLZakharov_platform | 82f60003d7bb21c14915788d445675a8eccc846c | [
"MIT"
] | 1 | 2021-02-08T20:17:55.000Z | 2021-02-08T20:17:55.000Z | kubernetes-networks/canary/web-canary-deploy.yaml | otus-kuber-2021-03/AleksandrZooLZakharov_platform | 82f60003d7bb21c14915788d445675a8eccc846c | [
"MIT"
] | 3 | 2021-01-15T15:45:24.000Z | 2021-01-20T19:44:26.000Z | apiVersion: apps/v1
kind: Deployment
metadata:
name: web-canary
namespace: canary
spec:
replicas: 2
strategy:
type: RollingUpdate
rollingUpdate:
maxUnavailable: 0
maxSurge: 100%
selector:
matchLabels:
app: web
template:
metadata:
name: web
labels:
app: web
spec:
containers:
- name: web
image: zoolgle/web:1.0
readinessProbe:
httpGet:
path: /index.html
port: 8000
livenessProbe:
tcpSocket:
port: 8000
volumeMounts:
- name: web-app-volume
mountPath: /app
initContainers:
- name: webinit
image: busybox:1.31.0
command: ['sh', '-c', 'wget -O- https://tinyurl.com/otus-k8s-intro | sh']
volumeMounts:
- name: web-app-volume
mountPath: /app
volumes:
- name: web-app-volume
emptyDir: {}
| 21 | 81 | 0.538624 |
f7426667b3ff644f5df0efd89c5f341562efee04 | 5,699 | yaml | YAML | deploy/v1.14.0/csi-azuredisk-controller.yaml | csi-driver/azuredisk-csi-driver | 3bccad414accffa605d524c047a398b43ae7313e | [
"Apache-2.0"
] | null | null | null | deploy/v1.14.0/csi-azuredisk-controller.yaml | csi-driver/azuredisk-csi-driver | 3bccad414accffa605d524c047a398b43ae7313e | [
"Apache-2.0"
] | 34 | 2019-02-15T13:44:02.000Z | 2019-03-04T03:02:56.000Z | deploy/v1.14.0/csi-azuredisk-controller.yaml | csi-driver/azuredisk-csi-driver | 3bccad414accffa605d524c047a398b43ae7313e | [
"Apache-2.0"
] | null | null | null | ---
kind: Deployment
apiVersion: apps/v1
metadata:
name: csi-azuredisk-controller
namespace: kube-system
spec:
replicas: 2
selector:
matchLabels:
app: csi-azuredisk-controller
template:
metadata:
labels:
app: csi-azuredisk-controller
spec:
hostNetwork: true
serviceAccountName: csi-azuredisk-controller-sa
nodeSelector:
kubernetes.io/os: linux # add "kubernetes.io/role: master" to run controller on master node
priorityClassName: system-cluster-critical
tolerations:
- key: "node-role.kubernetes.io/master"
operator: "Exists"
effect: "NoSchedule"
- key: "node-role.kubernetes.io/controlplane"
operator: "Exists"
effect: "NoSchedule"
- key: "node-role.kubernetes.io/control-plane"
operator: "Exists"
effect: "NoSchedule"
containers:
- name: csi-provisioner
image: mcr.microsoft.com/oss/kubernetes-csi/csi-provisioner:v3.1.0
args:
- "--feature-gates=Topology=true"
- "--csi-address=$(ADDRESS)"
- "--v=2"
- "--timeout=15s"
- "--leader-election"
- "--leader-election-namespace=kube-system"
- "--worker-threads=40"
- "--extra-create-metadata=true"
- "--strict-topology=true"
env:
- name: ADDRESS
value: /csi/csi.sock
volumeMounts:
- mountPath: /csi
name: socket-dir
resources:
limits:
memory: 500Mi
requests:
cpu: 10m
memory: 20Mi
- name: csi-attacher
image: mcr.microsoft.com/oss/kubernetes-csi/csi-attacher:v3.4.0
args:
- "-v=2"
- "-csi-address=$(ADDRESS)"
- "-timeout=600s"
- "-leader-election"
- "--leader-election-namespace=kube-system"
- "-worker-threads=500"
env:
- name: ADDRESS
value: /csi/csi.sock
volumeMounts:
- mountPath: /csi
name: socket-dir
resources:
limits:
memory: 500Mi
requests:
cpu: 10m
memory: 20Mi
- name: csi-snapshotter
image: mcr.microsoft.com/oss/kubernetes-csi/csi-snapshotter:v5.0.1
args:
- "-csi-address=$(ADDRESS)"
- "-leader-election"
- "--leader-election-namespace=kube-system"
- "--v=2"
env:
- name: ADDRESS
value: /csi/csi.sock
volumeMounts:
- name: socket-dir
mountPath: /csi
resources:
limits:
memory: 100Mi
requests:
cpu: 10m
memory: 20Mi
- name: csi-resizer
image: mcr.microsoft.com/oss/kubernetes-csi/csi-resizer:v1.4.0
args:
- "-csi-address=$(ADDRESS)"
- "-v=2"
- "-leader-election"
- "--leader-election-namespace=kube-system"
- '-handle-volume-inuse-error=false'
- '-feature-gates=RecoverVolumeExpansionFailure=true'
- "-timeout=240s"
env:
- name: ADDRESS
value: /csi/csi.sock
volumeMounts:
- name: socket-dir
mountPath: /csi
resources:
limits:
memory: 500Mi
requests:
cpu: 10m
memory: 20Mi
- name: liveness-probe
image: mcr.microsoft.com/oss/kubernetes-csi/livenessprobe:v2.5.0
args:
- --csi-address=/csi/csi.sock
- --probe-timeout=3s
- --health-port=29602
- --v=2
volumeMounts:
- name: socket-dir
mountPath: /csi
resources:
limits:
memory: 100Mi
requests:
cpu: 10m
memory: 20Mi
- name: azuredisk
image: mcr.microsoft.com/k8s/csi/azuredisk-csi:v1.14.0
imagePullPolicy: IfNotPresent
args:
- "--v=5"
- "--endpoint=$(CSI_ENDPOINT)"
- "--metrics-address=0.0.0.0:29604"
- "--user-agent-suffix=OSS-kubectl"
- "--disable-avset-nodes=false"
- "--allow-empty-cloud-config=false"
ports:
- containerPort: 29602
name: healthz
protocol: TCP
- containerPort: 29604
name: metrics
protocol: TCP
livenessProbe:
failureThreshold: 5
httpGet:
path: /healthz
port: healthz
initialDelaySeconds: 30
timeoutSeconds: 10
periodSeconds: 30
env:
- name: AZURE_CREDENTIAL_FILE
valueFrom:
configMapKeyRef:
name: azure-cred-file
key: path
optional: true
- name: CSI_ENDPOINT
value: unix:///csi/csi.sock
volumeMounts:
- mountPath: /csi
name: socket-dir
- mountPath: /etc/kubernetes/
name: azure-cred
resources:
limits:
memory: 500Mi
requests:
cpu: 10m
memory: 20Mi
volumes:
- name: socket-dir
emptyDir: {}
- name: azure-cred
hostPath:
path: /etc/kubernetes/
type: DirectoryOrCreate
| 30.475936 | 100 | 0.481137 |
f7427c5d07482821863a4321f388dd8d30390aa5 | 219 | yaml | YAML | cluster/apps/media/bazarr/config-pvc.yaml | wojcik91/k3s-gitops | 783a6dbb33fc8f7ab85235226cbe57fc9a85f4ad | [
"MIT"
] | null | null | null | cluster/apps/media/bazarr/config-pvc.yaml | wojcik91/k3s-gitops | 783a6dbb33fc8f7ab85235226cbe57fc9a85f4ad | [
"MIT"
] | 1 | 2021-08-19T20:38:43.000Z | 2021-08-19T20:38:43.000Z | cluster/apps/media/bazarr/config-pvc.yaml | wojcik91/k3s-gitops | 783a6dbb33fc8f7ab85235226cbe57fc9a85f4ad | [
"MIT"
] | null | null | null | ---
apiVersion: v1
kind: PersistentVolumeClaim
metadata:
name: bazarr-config-v1
namespace: media
spec:
accessModes:
- ReadWriteOnce
resources:
requests:
storage: 1Gi
storageClassName: nfs-client
| 15.642857 | 30 | 0.716895 |
f742e4f56c4b25e77fbfca8a7ff3e3991568f4e6 | 6,025 | yaml | YAML | k8s/us-central1/gen/tf-nightly-retinanet-func-v3-8.yaml | michaelbanfield/ml-testing-accelerators | c88001b4b2a205d5fa193cfbe5af6728dd602ee1 | [
"Apache-2.0"
] | 1 | 2020-05-09T18:59:09.000Z | 2020-05-09T18:59:09.000Z | k8s/us-central1/gen/tf-nightly-retinanet-func-v3-8.yaml | michaelbanfield/ml-testing-accelerators | c88001b4b2a205d5fa193cfbe5af6728dd602ee1 | [
"Apache-2.0"
] | null | null | null | k8s/us-central1/gen/tf-nightly-retinanet-func-v3-8.yaml | michaelbanfield/ml-testing-accelerators | c88001b4b2a205d5fa193cfbe5af6728dd602ee1 | [
"Apache-2.0"
] | null | null | null | # Copyright 2020 Google LLC
#
# Licensed under the Apache License, Version 2.0 (the "License");
# you may not use this file except in compliance with the License.
# You may obtain a copy of the License at
#
# https://www.apache.org/licenses/LICENSE-2.0
#
# Unless required by applicable law or agreed to in writing, software
# distributed under the License is distributed on an "AS IS" BASIS,
# WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
# See the License for the specific language governing permissions and
# limitations under the License.
"apiVersion": "batch/v1beta1"
"kind": "CronJob"
"metadata":
"name": "tf-nightly-retinanet-func-v3-8"
"namespace": "automated"
"spec":
"concurrencyPolicy": "Forbid"
"jobTemplate":
"spec":
"activeDeadlineSeconds": 3600
"backoffLimit": 1
"template":
"metadata":
"annotations":
"tf-version.cloud-tpus.google.com": "nightly"
"spec":
"containers":
- "env":
- "name": "POD_NAME"
"valueFrom":
"fieldRef":
"fieldPath": "metadata.name"
- "name": "POD_NAMESPACE"
"valueFrom":
"fieldRef":
"fieldPath": "metadata.namespace"
"image": "gcr.io/xl-ml-test/health-monitor:stable"
"imagePullPolicy": "Always"
"name": "monitor"
- "args":
- "python3"
- "official/vision/detection/main.py"
- |
--params_override="architecture":
"use_bfloat16": true
"eval":
"batch_size": 64
"eval_file_pattern": "$(COCO_DIR)/val*"
"val_json_file": "$(COCO_DIR)/instances_val2017.json"
"predict":
"batch_size": 64
"train":
"batch_size": 64
"checkpoint":
"path": "$(RESNET_PRETRAIN_DIR)/resnet50-checkpoint-2018-02-07"
"prefix": "resnet50/"
"total_steps": 1000
"train_file_pattern": "$(COCO_DIR)/train*"
- "--model_dir=$(MODEL_DIR)"
- "--mode=train"
- "--tpu=$(KUBE_GOOGLE_CLOUD_TPU_ENDPOINTS)"
- "--strategy_type=tpu"
"env":
- "name": "POD_NAME"
"valueFrom":
"fieldRef":
"fieldPath": "metadata.name"
- "name": "POD_UID"
"valueFrom":
"fieldRef":
"fieldPath": "metadata.uid"
- "name": "POD_NAMESPACE"
"valueFrom":
"fieldRef":
"fieldPath": "metadata.namespace"
- "name": "JOB_NAME"
"valueFrom":
"fieldRef":
"fieldPath": "metadata.labels['job-name']"
- "name": "MODEL_DIR"
"value": "$(OUTPUT_BUCKET)/tf-nightly/retinanet/func/v3-8/$(JOB_NAME)"
"envFrom":
- "configMapRef":
"name": "gcs-buckets"
"image": "gcr.io/xl-ml-test/tensorflow:nightly"
"imagePullPolicy": "Always"
"name": "train"
"resources":
"limits":
"cloud-tpus.google.com/preemptible-v3": 8
"requests":
"cpu": 2
"memory": "20G"
"volumeMounts":
- "mountPath": "/dev/shm"
"name": "dshm"
"readOnly": false
"initContainers":
- "env":
- "name": "POD_NAME"
"valueFrom":
"fieldRef":
"fieldPath": "metadata.name"
- "name": "POD_UID"
"valueFrom":
"fieldRef":
"fieldPath": "metadata.uid"
- "name": "POD_NAMESPACE"
"valueFrom":
"fieldRef":
"fieldPath": "metadata.namespace"
- "name": "JOB_NAME"
"valueFrom":
"fieldRef":
"fieldPath": "metadata.labels['job-name']"
- "name": "MODEL_DIR"
"value": "$(OUTPUT_BUCKET)/tf-nightly/retinanet/func/v3-8/$(JOB_NAME)"
- "name": "METRIC_CONFIG"
"value": |
{
"metric_collection_config": {
"default_aggregation_strategies": [
"final"
],
"metric_to_aggregation_strategies": {
"examples_per_second": [
"average"
]
},
"use_run_name_prefix": true,
"write_to_bigquery": true
},
"regression_test_config": {
"metric_success_conditions": {
"examples_per_second_average": {
"comparison": "greater_or_equal",
"success_threshold": {
"stddevs_from_mean": 4
}
},
"total_wall_time": {
"comparison": "less",
"success_threshold": {
"stddevs_from_mean": 5
},
"wait_for_n_points_of_history": 10
}
}
},
"test_name": "tf-nightly-retinanet-func-v3-8"
}
"envFrom":
- "configMapRef":
"name": "gcs-buckets"
"image": "gcr.io/xl-ml-test/publisher:stable"
"imagePullPolicy": "Always"
"name": "publisher"
"nodeSelector":
"tpu-available": "true"
"restartPolicy": "Never"
"volumes":
- "emptyDir":
"medium": "Memory"
"name": "dshm"
"schedule": "0 8 * * *"
"successfulJobsHistoryLimit": 1
"suspend": true | 35.233918 | 84 | 0.454108 |
f742f4b91a4d44cb8259fa8f7f4f902200c229f7 | 3,257 | yaml | YAML | vendor/github.com/openshift/api/console/v1/0000_10_consoleclidownload.crd.yaml | frobware/origin | 4439d905af8ea7ca58b9edf79d668188780df057 | [
"Apache-2.0"
] | 9 | 2021-07-20T08:51:09.000Z | 2022-01-26T14:43:22.000Z | vendor/github.com/openshift/api/console/v1/0000_10_consoleclidownload.crd.yaml | frobware/origin | 4439d905af8ea7ca58b9edf79d668188780df057 | [
"Apache-2.0"
] | 148 | 2021-07-23T17:36:17.000Z | 2022-03-29T07:22:17.000Z | vendor/github.com/openshift/api/console/v1/0000_10_consoleclidownload.crd.yaml | frobware/origin | 4439d905af8ea7ca58b9edf79d668188780df057 | [
"Apache-2.0"
] | 27 | 2021-07-16T10:16:42.000Z | 2022-03-30T06:27:53.000Z | apiVersion: apiextensions.k8s.io/v1
kind: CustomResourceDefinition
metadata:
name: consoleclidownloads.console.openshift.io
annotations:
description: Extension for configuring openshift web console command line interface
(CLI) downloads.
displayName: ConsoleCLIDownload
include.release.openshift.io/ibm-cloud-managed: "true"
include.release.openshift.io/self-managed-high-availability: "true"
include.release.openshift.io/single-node-developer: "true"
spec:
scope: Cluster
group: console.openshift.io
names:
plural: consoleclidownloads
singular: consoleclidownload
kind: ConsoleCLIDownload
listKind: ConsoleCLIDownloadList
versions:
- name: v1
served: true
storage: true
additionalPrinterColumns:
- name: Display name
type: string
jsonPath: .spec.displayName
- name: Age
type: string
jsonPath: .metadata.creationTimestamp
subresources:
status: {}
schema:
openAPIV3Schema:
description: ConsoleCLIDownload is an extension for configuring openshift
web console command line interface (CLI) downloads.
type: object
required:
- spec
properties:
apiVersion:
description: 'APIVersion defines the versioned schema of this representation
of an object. Servers should convert recognized schemas to the latest
internal value, and may reject unrecognized values. More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#resources'
type: string
kind:
description: 'Kind is a string value representing the REST resource this
object represents. Servers may infer this from the endpoint the client
submits requests to. Cannot be updated. In CamelCase. More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#types-kinds'
type: string
metadata:
type: object
spec:
description: ConsoleCLIDownloadSpec is the desired cli download configuration.
type: object
required:
- description
- displayName
- links
properties:
description:
description: description is the description of the CLI download (can
include markdown).
type: string
displayName:
description: displayName is the display name of the CLI download.
type: string
links:
description: links is a list of objects that provide CLI download
link details.
type: array
items:
type: object
required:
- href
properties:
href:
description: href is the absolute secure URL for the link (must
use https)
type: string
pattern: ^https://
text:
description: text is the display text for the link
type: string
| 38.317647 | 175 | 0.604851 |
f742f60af243a4000bcf0f139cfea496f8a14190 | 3,425 | yaml | YAML | k8s/cloud/base/api_deployment.yaml | laozhudetui/pixie | eb6a73480c9f30a7c33cf2d77512740a5bc5caef | [
"Apache-2.0"
] | null | null | null | k8s/cloud/base/api_deployment.yaml | laozhudetui/pixie | eb6a73480c9f30a7c33cf2d77512740a5bc5caef | [
"Apache-2.0"
] | null | null | null | k8s/cloud/base/api_deployment.yaml | laozhudetui/pixie | eb6a73480c9f30a7c33cf2d77512740a5bc5caef | [
"Apache-2.0"
] | null | null | null | ---
apiVersion: apps/v1
kind: Deployment
metadata:
name: api-server
spec:
selector:
matchLabels:
name: api-server
template:
metadata:
labels:
name: api-server
spec:
containers:
- name: api-server
image: gcr.io/pl-dev-infra/cloud/api_server_image
ports:
- containerPort: 51200
readinessProbe:
httpGet:
scheme: HTTPS
path: /healthz
port: 51200
livenessProbe:
httpGet:
scheme: HTTPS
path: /healthz
port: 51200
envFrom:
- configMapRef:
name: pl-tls-config
- configMapRef:
name: pl-domain-config
env:
- name: PL_JWT_SIGNING_KEY
valueFrom:
secretKeyRef:
name: cloud-auth-secrets
key: jwt-signing-key
- name: PL_SESSION_KEY
valueFrom:
secretKeyRef:
name: cloud-session-secrets
key: session-key
- name: PL_VZMGR_SERVICE
valueFrom:
configMapKeyRef:
name: pl-service-config
key: PL_VZMGR_SERVICE
- name: PL_AUTH_SERVICE
valueFrom:
configMapKeyRef:
name: pl-service-config
key: PL_AUTH_SERVICE
- name: PL_PROJECT_MANAGER_SERVICE
valueFrom:
configMapKeyRef:
name: pl-service-config
key: PL_PROJECT_MANAGER_SERVICE
- name: PL_PROFILE_SERVICE
valueFrom:
configMapKeyRef:
name: pl-service-config
key: PL_PROFILE_SERVICE
- name: PL_ARTIFACT_TRACKER_SERVICE
valueFrom:
configMapKeyRef:
name: pl-service-config
key: PL_ARTIFACT_TRACKER_SERVICE
- name: PL_ELASTIC_SERVICE
valueFrom:
configMapKeyRef:
name: pl-service-config
key: PL_ELASTIC_SERVICE
- name: PL_SEGMENT_WRITE_KEY
valueFrom:
configMapKeyRef:
name: segment-config
key: write-key
- name: PL_VIZIER_IMAGE_SECRET_PATH
value: /vizier-image-secret
- name: PL_VIZIER_IMAGE_SECRET_FILE
value: vizier_image_secret.json
- name: PL_ELASTIC_USERNAME
value: elastic
- name: PL_ELASTIC_PASSWORD
valueFrom:
secretKeyRef:
name: pl-elastic-es-elastic-user
key: elastic
- name: PL_ELASTIC_CA_CERT
value: /elastic-certs-pub/tls.crt
- name: PL_WORK_DOMAIN
value: work.$(PL_DOMAIN_NAME)
- name: PL_KRATOS_BROWSER_URL
value: https://$(PL_WORK_DOMAIN)/oauth/kratos
volumeMounts:
- name: certs
mountPath: /certs
- name: vizier-image-secret
mountPath: /vizier-image-secret
- name: elastic-certs-pub
mountPath: /elastic-certs-pub
volumes:
- name: certs
secret:
secretName: service-tls-certs
- name: vizier-image-secret
secret:
secretName: vizier-image-secret
optional: true
- name: envoy-yaml
configMap:
name: proxy-envoy-config
- name: elastic-certs-pub
secret:
secretName: pl-elastic-es-http-certs-public
| 28.781513 | 57 | 0.545985 |
f74398d54dbfaa833d3d75b016e60ab06e2905e9 | 577 | yaml | YAML | k8s/manifests/frontend-deployment.yaml | RGPosadas/Mull | 09a10107181721433792de277395b72ef7b52f5f | [
"MIT"
] | 6 | 2020-09-08T23:42:47.000Z | 2021-09-18T08:36:57.000Z | k8s/manifests/frontend-deployment.yaml | RGPosadas/Mull | 09a10107181721433792de277395b72ef7b52f5f | [
"MIT"
] | 257 | 2020-09-09T20:16:08.000Z | 2021-04-12T13:09:53.000Z | k8s/manifests/frontend-deployment.yaml | RGPosadas/LitterRally | 09a10107181721433792de277395b72ef7b52f5f | [
"MIT"
] | 2 | 2021-08-29T00:47:11.000Z | 2021-11-02T21:28:05.000Z | # This manifest is reponsible for deploying our frontend.
apiVersion: apps/v1
kind: Deployment
metadata:
name: mull-frontend
namespace: mull
spec:
replicas: 1
selector:
matchLabels:
app.kubernetes.io/name: mull-frontend
template:
metadata:
labels:
app.kubernetes.io/name: mull-frontend
spec:
containers:
- name: mull-frontend
image: 'ritchellegmp/mull-frontend:latest'
imagePullPolicy: Always
ports:
- name: frontend
containerPort: 4200
protocol: TCP
| 23.08 | 57 | 0.62565 |
f743eff6bead1b6a58f9e51b693d874e4017c65e | 28,797 | yaml | YAML | operator/v1/0000_70_dns-operator_00.crd.yaml | njhale/openshift-api | 8f38b76486205b59403b60592f30b3736ef90d3d | [
"Apache-2.0"
] | null | null | null | operator/v1/0000_70_dns-operator_00.crd.yaml | njhale/openshift-api | 8f38b76486205b59403b60592f30b3736ef90d3d | [
"Apache-2.0"
] | 27 | 2018-12-05T04:05:29.000Z | 2019-01-17T14:42:10.000Z | vendor/github.com/openshift/api/operator/v1/0000_70_dns-operator_00.crd.yaml | thunderboltsid/installer | d907e1459681cc4a2f5ce141318d40260bd14500 | [
"Apache-2.0"
] | 6 | 2018-12-04T21:41:16.000Z | 2019-01-08T12:33:16.000Z | apiVersion: apiextensions.k8s.io/v1
kind: CustomResourceDefinition
metadata:
annotations:
api-approved.openshift.io: https://github.com/openshift/api/pull/475
include.release.openshift.io/ibm-cloud-managed: "true"
include.release.openshift.io/self-managed-high-availability: "true"
include.release.openshift.io/single-node-developer: "true"
name: dnses.operator.openshift.io
spec:
group: operator.openshift.io
names:
kind: DNS
listKind: DNSList
plural: dnses
singular: dns
scope: Cluster
versions:
- name: v1
schema:
openAPIV3Schema:
description: "DNS manages the CoreDNS component to provide a name resolution
service for pods and services in the cluster. \n This supports the DNS-based
service discovery specification: https://github.com/kubernetes/dns/blob/master/docs/specification.md
\n More details: https://kubernetes.io/docs/tasks/administer-cluster/coredns
\n Compatibility level 1: Stable within a major release for a minimum of
12 months or 3 minor releases (whichever is longer)."
properties:
apiVersion:
description: 'APIVersion defines the versioned schema of this representation
of an object. Servers should convert recognized schemas to the latest
internal value, and may reject unrecognized values. More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#resources'
type: string
kind:
description: 'Kind is a string value representing the REST resource this
object represents. Servers may infer this from the endpoint the client
submits requests to. Cannot be updated. In CamelCase. More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#types-kinds'
type: string
metadata:
type: object
spec:
description: spec is the specification of the desired behavior of the
DNS.
properties:
logLevel:
default: Normal
description: 'logLevel describes the desired logging verbosity for
CoreDNS. Any one of the following values may be specified: * Normal
logs errors from upstream resolvers. * Debug logs errors, NXDOMAIN
responses, and NODATA responses. * Trace logs errors and all responses. Setting
logLevel: Trace will produce extremely verbose logs. Valid values
are: "Normal", "Debug", "Trace". Defaults to "Normal".'
enum:
- Normal
- Debug
- Trace
type: string
managementState:
description: managementState indicates whether the DNS operator should
manage cluster DNS
pattern: ^(Managed|Unmanaged|Force|Removed)$
type: string
nodePlacement:
description: "nodePlacement provides explicit control over the scheduling
of DNS pods. \n Generally, it is useful to run a DNS pod on every
node so that DNS queries are always handled by a local DNS pod instead
of going over the network to a DNS pod on another node. However,
security policies may require restricting the placement of DNS pods
to specific nodes. For example, if a security policy prohibits pods
on arbitrary nodes from communicating with the API, a node selector
can be specified to restrict DNS pods to nodes that are permitted
to communicate with the API. Conversely, if running DNS pods on
nodes with a particular taint is desired, a toleration can be specified
for that taint. \n If unset, defaults are used. See nodePlacement
for more details."
properties:
nodeSelector:
additionalProperties:
type: string
description: "nodeSelector is the node selector applied to DNS
pods. \n If empty, the default is used, which is currently the
following: \n kubernetes.io/os: linux \n This default is subject
to change. \n If set, the specified selector is used and replaces
the default."
type: object
tolerations:
description: "tolerations is a list of tolerations applied to
DNS pods. \n If empty, the DNS operator sets a toleration for
the \"node-role.kubernetes.io/master\" taint. This default
is subject to change. Specifying tolerations without including
a toleration for the \"node-role.kubernetes.io/master\" taint
may be risky as it could lead to an outage if all worker nodes
become unavailable. \n Note that the daemon controller adds
some tolerations as well. See https://kubernetes.io/docs/concepts/scheduling-eviction/taint-and-toleration/"
items:
description: The pod this Toleration is attached to tolerates
any taint that matches the triple <key,value,effect> using
the matching operator <operator>.
properties:
effect:
description: Effect indicates the taint effect to match.
Empty means match all taint effects. When specified, allowed
values are NoSchedule, PreferNoSchedule and NoExecute.
type: string
key:
description: Key is the taint key that the toleration applies
to. Empty means match all taint keys. If the key is empty,
operator must be Exists; this combination means to match
all values and all keys.
type: string
operator:
description: Operator represents a key's relationship to
the value. Valid operators are Exists and Equal. Defaults
to Equal. Exists is equivalent to wildcard for value,
so that a pod can tolerate all taints of a particular
category.
type: string
tolerationSeconds:
description: TolerationSeconds represents the period of
time the toleration (which must be of effect NoExecute,
otherwise this field is ignored) tolerates the taint.
By default, it is not set, which means tolerate the taint
forever (do not evict). Zero and negative values will
be treated as 0 (evict immediately) by the system.
format: int64
type: integer
value:
description: Value is the taint value the toleration matches
to. If the operator is Exists, the value should be empty,
otherwise just a regular string.
type: string
type: object
type: array
type: object
operatorLogLevel:
default: Normal
description: 'operatorLogLevel controls the logging level of the DNS
Operator. Valid values are: "Normal", "Debug", "Trace". Defaults
to "Normal". setting operatorLogLevel: Trace will produce extremely
verbose logs.'
enum:
- Normal
- Debug
- Trace
type: string
servers:
description: "servers is a list of DNS resolvers that provide name
query delegation for one or more subdomains outside the scope of
the cluster domain. If servers consists of more than one Server,
longest suffix match will be used to determine the Server. \n For
example, if there are two Servers, one for \"foo.com\" and another
for \"a.foo.com\", and the name query is for \"www.a.foo.com\",
it will be routed to the Server with Zone \"a.foo.com\". \n If this
field is nil, no servers are created."
items:
description: Server defines the schema for a server that runs per
instance of CoreDNS.
properties:
forwardPlugin:
description: forwardPlugin defines a schema for configuring
CoreDNS to proxy DNS messages to upstream resolvers.
properties:
policy:
default: Random
description: "policy is used to determine the order in which
upstream servers are selected for querying. Any one of
the following values may be specified: \n * \"Random\"
picks a random upstream server for each query. * \"RoundRobin\"
picks upstream servers in a round-robin order, moving
to the next server for each new query. * \"Sequential\"
tries querying upstream servers in a sequential order
until one responds, starting with the first server for
each new query. \n The default value is \"Random\""
enum:
- Random
- RoundRobin
- Sequential
type: string
transportConfig:
description: "transportConfig is used to configure the transport
type, server name, and optional custom CA or CA bundle
to use when forwarding DNS requests to an upstream resolver.
\n The default value is \"\" (empty) which results in
a standard cleartext connection being used when forwarding
DNS requests to an upstream resolver."
properties:
tls:
description: tls contains the additional configuration
options to use when Transport is set to "TLS".
properties:
caBundle:
description: "caBundle references a ConfigMap that
must contain either a single CA Certificate or
a CA Bundle (in the case of multiple upstreams
signed by different CAs). This allows cluster
administrators to provide their own CA or CA bundle
for validating the certificate of upstream resolvers.
\n 1. The configmap must contain a `ca-bundle.crt`
key. 2. The value must be a PEM encoded CA certificate
or CA bundle. 3. The administrator must create
this configmap in the openshift-config namespace."
properties:
name:
description: name is the metadata.name of the
referenced config map
type: string
required:
- name
type: object
serverName:
description: serverName is the upstream server to
connect to when forwarding DNS queries. This is
required when Transport is set to "TLS". ServerName
will be validated against the DNS naming conventions
in RFC 1123 and should match the TLS certificate
installed in the upstream resolver(s).
maxLength: 253
pattern: ^([a-zA-Z0-9]|[a-zA-Z0-9][a-zA-Z0-9\-]{0,61}[a-zA-Z0-9])(\.([a-zA-Z0-9]|[a-zA-Z0-9][a-zA-Z0-9\-]{0,61}[a-zA-Z0-9]))*$
type: string
required:
- serverName
type: object
transport:
description: "transport allows cluster administrators
to opt-in to using a DNS-over-TLS connection between
cluster DNS and an upstream resolver(s). Configuring
TLS as the transport at this level without configuring
a CABundle will result in the system certificates
being used to verify the serving certificate of the
upstream resolver(s). \n Possible values: \"\" (empty)
- This means no explicit choice has been made and
the platform chooses the default which is subject
to change over time. The current default is \"Cleartext\".
\"Cleartext\" - Cluster admin specified cleartext
option. This results in the same functionality as
an empty value but may be useful when a cluster admin
wants to be more explicit about the transport, or
wants to switch from \"TLS\" to \"Cleartext\" explicitly.
\"TLS\" - This indicates that DNS queries should be
sent over a TLS connection. If Transport is set to
TLS, you MUST also set ServerName."
enum:
- TLS
- Cleartext
- ""
type: string
type: object
upstreams:
description: "upstreams is a list of resolvers to forward
name queries for subdomains of Zones. Each instance of
CoreDNS performs health checking of Upstreams. When a
healthy upstream returns an error during the exchange,
another resolver is tried from Upstreams. The Upstreams
are selected in the order specified in Policy. Each upstream
is represented by an IP address or IP:port if the upstream
listens on a port other than 53. \n A maximum of 15 upstreams
is allowed per ForwardPlugin."
items:
type: string
maxItems: 15
type: array
type: object
name:
description: name is required and specifies a unique name for
the server. Name must comply with the Service Name Syntax
of rfc6335.
type: string
zones:
description: zones is required and specifies the subdomains
that Server is authoritative for. Zones must conform to the
rfc1123 definition of a subdomain. Specifying the cluster
domain (i.e., "cluster.local") is invalid.
items:
type: string
type: array
type: object
type: array
upstreamResolvers:
default: {}
description: "upstreamResolvers defines a schema for configuring CoreDNS
to proxy DNS messages to upstream resolvers for the case of the
default (\".\") server \n If this field is not specified, the upstream
used will default to /etc/resolv.conf, with policy \"sequential\""
properties:
policy:
default: Sequential
description: "Policy is used to determine the order in which upstream
servers are selected for querying. Any one of the following
values may be specified: \n * \"Random\" picks a random upstream
server for each query. * \"RoundRobin\" picks upstream servers
in a round-robin order, moving to the next server for each new
query. * \"Sequential\" tries querying upstream servers in a
sequential order until one responds, starting with the first
server for each new query. \n The default value is \"Sequential\""
enum:
- Random
- RoundRobin
- Sequential
type: string
transportConfig:
description: "transportConfig is used to configure the transport
type, server name, and optional custom CA or CA bundle to use
when forwarding DNS requests to an upstream resolver. \n The
default value is \"\" (empty) which results in a standard cleartext
connection being used when forwarding DNS requests to an upstream
resolver."
properties:
tls:
description: tls contains the additional configuration options
to use when Transport is set to "TLS".
properties:
caBundle:
description: "caBundle references a ConfigMap that must
contain either a single CA Certificate or a CA Bundle
(in the case of multiple upstreams signed by different
CAs). This allows cluster administrators to provide
their own CA or CA bundle for validating the certificate
of upstream resolvers. \n 1. The configmap must contain
a `ca-bundle.crt` key. 2. The value must be a PEM encoded
CA certificate or CA bundle. 3. The administrator must
create this configmap in the openshift-config namespace."
properties:
name:
description: name is the metadata.name of the referenced
config map
type: string
required:
- name
type: object
serverName:
description: serverName is the upstream server to connect
to when forwarding DNS queries. This is required when
Transport is set to "TLS". ServerName will be validated
against the DNS naming conventions in RFC 1123 and should
match the TLS certificate installed in the upstream
resolver(s).
maxLength: 253
pattern: ^([a-zA-Z0-9]|[a-zA-Z0-9][a-zA-Z0-9\-]{0,61}[a-zA-Z0-9])(\.([a-zA-Z0-9]|[a-zA-Z0-9][a-zA-Z0-9\-]{0,61}[a-zA-Z0-9]))*$
type: string
required:
- serverName
type: object
transport:
description: "transport allows cluster administrators to opt-in
to using a DNS-over-TLS connection between cluster DNS and
an upstream resolver(s). Configuring TLS as the transport
at this level without configuring a CABundle will result
in the system certificates being used to verify the serving
certificate of the upstream resolver(s). \n Possible values:
\"\" (empty) - This means no explicit choice has been made
and the platform chooses the default which is subject to
change over time. The current default is \"Cleartext\".
\"Cleartext\" - Cluster admin specified cleartext option.
This results in the same functionality as an empty value
but may be useful when a cluster admin wants to be more
explicit about the transport, or wants to switch from \"TLS\"
to \"Cleartext\" explicitly. \"TLS\" - This indicates that
DNS queries should be sent over a TLS connection. If Transport
is set to TLS, you MUST also set ServerName."
enum:
- TLS
- Cleartext
- ""
type: string
type: object
upstreams:
default:
- type: SystemResolvConf
description: "Upstreams is a list of resolvers to forward name
queries for the \".\" domain. Each instance of CoreDNS performs
health checking of Upstreams. When a healthy upstream returns
an error during the exchange, another resolver is tried from
Upstreams. The Upstreams are selected in the order specified
in Policy. \n A maximum of 15 upstreams is allowed per ForwardPlugin.
If no Upstreams are specified, /etc/resolv.conf is used by default"
items:
anyOf:
- not:
required:
- address
- port
properties:
type:
enum:
- ""
- SystemResolvConf
- optional:
- port
properties:
type:
enum:
- Network
required:
- address
description: "Upstream can either be of type SystemResolvConf,
or of type Network. \n * For an Upstream of type SystemResolvConf,
no further fields are necessary: The upstream will be configured
to use /etc/resolv.conf. * For an Upstream of type Network,
a NetworkResolver field needs to be defined with an IP address
or IP:port if the upstream listens on a port other than 53."
properties:
address:
anyOf:
- format: ipv4
- format: ipv6
description: Address must be defined when Type is set to
Network. It will be ignored otherwise. It must be a valid
ipv4 or ipv6 address.
type: string
port:
default: 53
description: Port may be defined when Type is set to Network.
It will be ignored otherwise. Port must be between 65535
format: int32
maximum: 65535
minimum: 1
type: integer
type:
description: "Type defines whether this upstream contains
an IP/IP:port resolver or the local /etc/resolv.conf.
Type accepts 2 possible values: SystemResolvConf or Network.
\n * When SystemResolvConf is used, the Upstream structure
does not require any further fields to be defined: /etc/resolv.conf
will be used * When Network is used, the Upstream structure
must contain at least an Address"
enum:
- SystemResolvConf
- Network
- ""
type: string
required:
- type
type: object
maxItems: 15
type: array
type: object
type: object
status:
description: status is the most recently observed status of the DNS.
properties:
clusterDomain:
description: "clusterDomain is the local cluster DNS domain suffix
for DNS services. This will be a subdomain as defined in RFC 1034,
section 3.5: https://tools.ietf.org/html/rfc1034#section-3.5 Example:
\"cluster.local\" \n More info: https://kubernetes.io/docs/concepts/services-networking/dns-pod-service"
type: string
clusterIP:
description: "clusterIP is the service IP through which this DNS is
made available. \n In the case of the default DNS, this will be
a well known IP that is used as the default nameserver for pods
that are using the default ClusterFirst DNS policy. \n In general,
this IP can be specified in a pod's spec.dnsConfig.nameservers list
or used explicitly when performing name resolution from within the
cluster. Example: dig foo.com @<service IP> \n More info: https://kubernetes.io/docs/concepts/services-networking/service/#virtual-ips-and-service-proxies"
type: string
conditions:
description: "conditions provide information about the state of the
DNS on the cluster. \n These are the supported DNS conditions: \n
\ * Available - True if the following conditions are met: *
DNS controller daemonset is available. - False if any of those
conditions are unsatisfied."
items:
description: OperatorCondition is just the standard condition fields.
properties:
lastTransitionTime:
format: date-time
type: string
message:
type: string
reason:
type: string
status:
type: string
type:
type: string
type: object
type: array
required:
- clusterDomain
- clusterIP
type: object
type: object
served: true
storage: true
subresources:
status: {}
| 59.131417 | 175 | 0.491787 |
f744c51e01e48e71962d6fd1dcf9f86c149ef4e0 | 205 | yaml | YAML | deployments/kubernetes/helm/rancher-saas-ops/templates/service-update-api.yaml | onzack/rancher-saas-chart | 46259859923d86726ab6153f1176ca0abea4b0c7 | [
"Apache-2.0"
] | 5 | 2020-12-08T17:04:17.000Z | 2022-03-08T09:32:06.000Z | deployments/kubernetes/helm/rancher-saas-ops/templates/service-update-api.yaml | onzack/rancher-saas-chart | 46259859923d86726ab6153f1176ca0abea4b0c7 | [
"Apache-2.0"
] | 4 | 2021-01-29T14:46:08.000Z | 2021-03-11T16:15:14.000Z | deployments/kubernetes/helm/rancher-saas-ops/templates/service-update-api.yaml | onzack/rancher-saas-chart | 46259859923d86726ab6153f1176ca0abea4b0c7 | [
"Apache-2.0"
] | 1 | 2020-12-17T16:11:11.000Z | 2020-12-17T16:11:11.000Z | ---
apiVersion: v1
kind: Service
metadata:
name: update-api
spec:
selector:
app: rancher-saas-ops
role: update-api
ports:
- name: hattp
protocol: TCP
port: 9000
targetPort: 9000 | 14.642857 | 25 | 0.64878 |
f744d2831a81da9d16491956d5245862a5d657a0 | 853 | yaml | YAML | kube/replay-controller.yaml | paralin/dota-replay-app | f141188d47cb1aad5cdfcf80002dee5fbe7c9455 | [
"MIT"
] | null | null | null | kube/replay-controller.yaml | paralin/dota-replay-app | f141188d47cb1aad5cdfcf80002dee5fbe7c9455 | [
"MIT"
] | null | null | null | kube/replay-controller.yaml | paralin/dota-replay-app | f141188d47cb1aad5cdfcf80002dee5fbe7c9455 | [
"MIT"
] | null | null | null | apiVersion: v1
kind: ReplicationController
metadata:
labels:
app: replay
name: replay
spec:
replicas: 1
selector:
app: replay
template:
metadata:
labels:
app: replay
spec:
containers:
- command:
- bash
- -c
- source /etc/kube-replay/config && node main.js
image: paralin/dota-replay:latest
imagePullPolicy: Always
name: replay
ports:
- containerPort: 80
name: web
- containerPort: 10304
name: desktop
volumeMounts:
- mountPath: /etc/kube-replay
name: replay-config
readOnly: true
dnsPolicy: ClusterFirst
restartPolicy: Always
terminationGracePeriodSeconds: 30
volumes:
- name: replay-config
secret:
secretName: replay-config
| 21.325 | 56 | 0.575615 |
f744db7aded18b29cd4c4526ab63eb92a4315d91 | 930 | yaml | YAML | deploy/03-deployment.yaml | tanelmae/private-dns | 1bf9b515802c9aed4cb80a781804024bd7253668 | [
"MIT"
] | 3 | 2020-03-09T12:18:27.000Z | 2021-12-12T13:37:44.000Z | deploy/03-deployment.yaml | tanelmae/private-dns | 1bf9b515802c9aed4cb80a781804024bd7253668 | [
"MIT"
] | null | null | null | deploy/03-deployment.yaml | tanelmae/private-dns | 1bf9b515802c9aed4cb80a781804024bd7253668 | [
"MIT"
] | null | null | null | ---
apiVersion: apps/v1
kind: Deployment
metadata:
name: pdns
namespace: default
labels:
app: pdns
spec:
# There can be only one or there will be constant race
# Later there could be multiple with leadership selection
replicas: 1
selector:
matchLabels:
app: pdns
template:
metadata:
labels:
app: pdns
spec:
volumes:
- name: service-account
secret:
secretName: dns-account
defaultMode: 256
serviceAccountName: pdns
restartPolicy: Always
containers:
- name: service
image: tanelmae/private-dns:latest
imagePullPolicy: Always
args:
- "-gcp-zone=k8s-dns"
- "-gcp-reverse-zone=k8s-reverse-dns"
- "-gcp-cred=/account/dns.json"
- "-v=4"
volumeMounts:
- name: service-account
mountPath: "/account"
| 23.25 | 59 | 0.566667 |
f74519c6b267fac6ac9edded468c5269ddc771e0 | 1,825 | yaml | YAML | config/prow/cluster/needs-rebase_deployment.yaml | zvonkok/test-infra | deabdd6688295244ce3870818108b1f7a825368e | [
"Apache-2.0"
] | null | null | null | config/prow/cluster/needs-rebase_deployment.yaml | zvonkok/test-infra | deabdd6688295244ce3870818108b1f7a825368e | [
"Apache-2.0"
] | null | null | null | config/prow/cluster/needs-rebase_deployment.yaml | zvonkok/test-infra | deabdd6688295244ce3870818108b1f7a825368e | [
"Apache-2.0"
] | null | null | null | # Copyright 2016 The Kubernetes Authors All rights reserved.
#
# Licensed under the Apache License, Version 2.0 (the "License");
# you may not use this file except in compliance with the License.
# You may obtain a copy of the License at
#
# http://www.apache.org/licenses/LICENSE-2.0
#
# Unless required by applicable law or agreed to in writing, software
# distributed under the License is distributed on an "AS IS" BASIS,
# WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
# See the License for the specific language governing permissions and
# limitations under the License.
apiVersion: apps/v1
kind: Deployment
metadata:
namespace: default
name: needs-rebase
labels:
app: needs-rebase
spec:
replicas: 1
selector:
matchLabels:
app: needs-rebase
template:
metadata:
labels:
app: needs-rebase
spec:
terminationGracePeriodSeconds: 180
containers:
- name: needs-rebase
image: gcr.io/k8s-prow/needs-rebase:v20220120-e267164240
imagePullPolicy: Always
args:
- --dry-run=false
- --github-endpoint=http://ghproxy
- --github-endpoint=https://api.github.com
- --github-token-path=/etc/github/oauth
- --update-period=6h
ports:
- name: http
containerPort: 8888
volumeMounts:
- name: hmac
mountPath: /etc/webhook
readOnly: true
- name: oauth
mountPath: /etc/github
readOnly: true
- name: plugins
mountPath: /etc/plugins
readOnly: true
volumes:
- name: hmac
secret:
secretName: hmac-token
- name: oauth
secret:
secretName: oauth-token
- name: plugins
configMap:
name: plugins
| 27.651515 | 74 | 0.629041 |
f745524703753629ff890d2e17471d30c5498373 | 1,082 | yaml | YAML | kubernetes-networks/web-deploy.yaml | otus-kuber-2020-11/wabat_platform | e55c8d35afbcb789f17bc28a6bfd5bd0bb344216 | [
"MIT"
] | null | null | null | kubernetes-networks/web-deploy.yaml | otus-kuber-2020-11/wabat_platform | e55c8d35afbcb789f17bc28a6bfd5bd0bb344216 | [
"MIT"
] | null | null | null | kubernetes-networks/web-deploy.yaml | otus-kuber-2020-11/wabat_platform | e55c8d35afbcb789f17bc28a6bfd5bd0bb344216 | [
"MIT"
] | 1 | 2021-01-04T14:29:42.000Z | 2021-01-04T14:29:42.000Z | ---
apiVersion: apps/v1
kind: Deployment
metadata:
name: web
spec:
strategy:
type: RollingUpdate
rollingUpdate:
maxSurge: 100% # how many pods we can add at a time
maxUnavailable: 0 # maxUnavailable define how many pods can be# unavailable during the rolling update
replicas: 1
selector:
matchLabels:
app: web
template:
metadata:
labels:
app: web
spec:
containers:
- name: web
image: 3davinci/tinyweb:0.1
imagePullPolicy: Always
livenessProbe:
tcpSocket:
port: 8000
readinessProbe:
httpGet:
path: /index.html
port: 8000
volumeMounts:
- name: app
mountPath: /var/www/localhost/app
initContainers:
- name: init
image: busybox:1.31.0
command: ['sh', '-c', 'wget -O- https://tinyurl.com/otus-k8s-intro | sh']
volumeMounts:
- name: app
mountPath: /app
volumes:
- name: app
emptyDir: {}
| 24.044444 | 107 | 0.542514 |
f74686e03a4ba896e187d04f278907c84e58c3fb | 77 | yaml | YAML | deploy/service_account.yaml | YuriHeupa/cassandra-k8s-operator | 32e19526f79e2db31429f670b13e0472743a3684 | [
"Apache-2.0"
] | 2 | 2020-02-15T07:07:02.000Z | 2020-04-04T18:35:23.000Z | deploy/service_account.yaml | YuriHeupa/cassandra-k8s-operator | 32e19526f79e2db31429f670b13e0472743a3684 | [
"Apache-2.0"
] | null | null | null | deploy/service_account.yaml | YuriHeupa/cassandra-k8s-operator | 32e19526f79e2db31429f670b13e0472743a3684 | [
"Apache-2.0"
] | 2 | 2020-02-07T04:40:37.000Z | 2021-05-20T20:31:02.000Z | apiVersion: v1
kind: ServiceAccount
metadata:
name: cassandra-k8s-operator
| 15.4 | 30 | 0.805195 |
f746d6594a6290fdcb798a09e4689e142a832e91 | 401 | yaml | YAML | namespaces/live-1.cloud-platform.service.justice.gov.uk/dps-management-prod/01-rbac.yaml | rossjones/cloud-platform-environments | 85a4e19cf012d97d885c6ea91379ca3f7b59a49a | [
"MIT"
] | 28 | 2018-07-13T15:02:24.000Z | 2022-03-17T09:23:54.000Z | namespaces/live-1.cloud-platform.service.justice.gov.uk/dps-management-prod/01-rbac.yaml | happygeneralist/recall-decisions-alpha | 09124f3994a878e9969e7b4326088b2ae7bfd170 | [
"MIT"
] | 963 | 2018-05-30T15:46:06.000Z | 2022-03-30T10:06:39.000Z | namespaces/live-1.cloud-platform.service.justice.gov.uk/dps-management-prod/01-rbac.yaml | happygeneralist/recall-decisions-alpha | 09124f3994a878e9969e7b4326088b2ae7bfd170 | [
"MIT"
] | 29 | 2018-12-04T09:37:36.000Z | 2022-02-25T10:35:34.000Z | ---
kind: RoleBinding
apiVersion: rbac.authorization.k8s.io/v1
metadata:
name: dps-management-prod-admin
namespace: dps-management-prod
subjects:
- kind: Group
name: "github:dps-shared"
apiGroup: rbac.authorization.k8s.io
- kind: Group
name: "github:dps-tech"
apiGroup: rbac.authorization.k8s.io
roleRef:
kind: ClusterRole
name: admin
apiGroup: rbac.authorization.k8s.io
| 22.277778 | 40 | 0.72818 |
f746f45824fe1ae348a901dd67a99d0c71685f12 | 944 | yml | YAML | k3s/postgres/deployment.yml | virtool/virtool-workflow | 7c0ec9f7fade66c4682e0783bdc6f9ba247e0a1f | [
"MIT"
] | 5 | 2020-09-24T20:29:08.000Z | 2022-03-17T14:50:56.000Z | k3s/postgres/deployment.yml | virtool/virtool-workflow | 7c0ec9f7fade66c4682e0783bdc6f9ba247e0a1f | [
"MIT"
] | 126 | 2020-10-01T23:38:34.000Z | 2022-03-31T08:26:28.000Z | k3s/postgres/deployment.yml | virtool/virtool-workflow | 7c0ec9f7fade66c4682e0783bdc6f9ba247e0a1f | [
"MIT"
] | 5 | 2020-09-29T21:29:46.000Z | 2021-07-27T20:34:58.000Z |
apiVersion: apps/v1
kind: Deployment
metadata:
name: postgres
labels:
app: postgres
group: db
spec:
replicas: 1
selector:
matchLabels:
app: postgres
template:
metadata:
labels:
app: postgres
type: db
spec:
volumes: # indicates which PVC are available for this Deployment
- name: postgres-storage
persistentVolumeClaim:
claimName: postgres-pvc
containers:
- name: postgres
image: postgres:9.6-alpine
ports:
- containerPort: 5432
envFrom:
- configMapRef:
name: postgres-config
volumeMounts: # indicates which Volume (from spec.template.spec.volumes) should be used
- name: postgres-storage # name of the Volume
mountPath: /var/lib/postgresql/data # path inside the container | 27.764706 | 113 | 0.5625 |
f74770e9fa061f216763f0b6cd7aaf3ebe4af04a | 247 | yaml | YAML | docs/crds/pullsecret.yaml | ravidbro/assisted-service | 846f2dc89d10b74ed95cb99a6a8888902fb11497 | [
"Apache-2.0"
] | null | null | null | docs/crds/pullsecret.yaml | ravidbro/assisted-service | 846f2dc89d10b74ed95cb99a6a8888902fb11497 | [
"Apache-2.0"
] | 1 | 2021-04-16T10:23:39.000Z | 2021-04-16T10:23:39.000Z | docs/crds/pullsecret.yaml | ravidbro/assisted-service | 846f2dc89d10b74ed95cb99a6a8888902fb11497 | [
"Apache-2.0"
] | null | null | null | apiVersion: v1
kind: Secret
type: kubernetes.io/dockerconfigjson
metadata:
name: pull-secret
namespace: assisted-installer
stringData:
.dockerconfigjson: '{"auths":{"cloud.openshift.com":{"auth":"dXNlcjpwYXNzd29yZAo=","email":"r@rr.com"}}}'
| 27.444444 | 107 | 0.744939 |
f747c9079fdf750273482dce722c5efc5c18308e | 422 | yaml | YAML | Devops/KUBERNETES/k8s/exemplo2/explo4-deployment-and-replicaset/nginx-deployment.yaml | FranciscoWallison/Desenvolvimento-aplicacoes-com-micros-servicos | 98cef123aa0bd413285ec5dcce747881d43ebdc5 | [
"BSD-2-Clause"
] | 8 | 2021-09-14T16:08:41.000Z | 2022-02-14T17:59:55.000Z | Devops/KUBERNETES/k8s/exemplo2/explo4-deployment-and-replicaset/nginx-deployment.yaml | FranciscoWallison/Desenvolvimento-aplicacoes-com-micros-servicos | 98cef123aa0bd413285ec5dcce747881d43ebdc5 | [
"BSD-2-Clause"
] | null | null | null | Devops/KUBERNETES/k8s/exemplo2/explo4-deployment-and-replicaset/nginx-deployment.yaml | FranciscoWallison/Desenvolvimento-aplicacoes-com-micros-servicos | 98cef123aa0bd413285ec5dcce747881d43ebdc5 | [
"BSD-2-Clause"
] | 1 | 2021-09-14T16:08:31.000Z | 2021-09-14T16:08:31.000Z | apiVersion: apps/v1
kind: Deployment
metadata:
name: nginx-deployment
spec:
replicas: 3
selector:
matchLabels:
app: nginx-pod
template:
# iniciando configurações do POD
metadata:
name: nginx-pod
labels:
app: nginx-pod
spec:
containers:
- name: nginx-container
image: nginx:stable
ports:
- containerPort: 80
| 19.181818 | 35 | 0.56872 |
f7483473fe4fe2c8acb52f677594d2e482d32f2b | 293 | yaml | YAML | services/component-repository/k8s/deployment/service.yaml | workloadco/workload | ad664c8f6935d4946732f2092d96cf4ecbbc6a6c | [
"Apache-2.0"
] | 123 | 2018-08-17T21:39:49.000Z | 2022-02-26T00:13:54.000Z | services/component-repository/k8s/deployment/service.yaml | workloadco/workload | ad664c8f6935d4946732f2092d96cf4ecbbc6a6c | [
"Apache-2.0"
] | 714 | 2017-09-29T09:48:41.000Z | 2022-03-11T09:24:12.000Z | services/component-repository/k8s/deployment/service.yaml | workloadco/workload | ad664c8f6935d4946732f2092d96cf4ecbbc6a6c | [
"Apache-2.0"
] | 39 | 2017-09-29T09:43:33.000Z | 2021-11-02T08:56:02.000Z | apiVersion: v1
kind: Service
metadata:
name: component-repository-service
namespace: oih-dev-ns
labels:
app: component-repository-service
spec:
type: NodePort
selector:
app: component-repository
ports:
- name: "1234"
protocol: TCP
port: 1234
targetPort: 1234
| 17.235294 | 37 | 0.699659 |
f7485dbdad025070180c73c9dcebafbe105bbc61 | 180 | yaml | YAML | manifests/leader/diago-secret.yaml | t-bfame/diago | 6e2cd59205482168643dfa981df3e094b31f2621 | [
"Apache-2.0"
] | 4 | 2020-08-17T15:48:54.000Z | 2021-04-16T01:56:23.000Z | manifests/leader/diago-secret.yaml | t-bfame/diago | 6e2cd59205482168643dfa981df3e094b31f2621 | [
"Apache-2.0"
] | 6 | 2021-01-01T04:20:57.000Z | 2021-04-16T02:17:29.000Z | manifests/leader/diago-secret.yaml | t-bfame/diago | 6e2cd59205482168643dfa981df3e094b31f2621 | [
"Apache-2.0"
] | 1 | 2021-05-19T18:57:05.000Z | 2021-05-19T18:57:05.000Z | apiVersion: v1
kind: Secret
metadata:
name: diago-secret
labels:
app.kubernetes.io/name: diago
app.kubernetes.io/part-of: diago
stringData:
DIAGO_GRAFANA_API_KEY: ""
| 18 | 36 | 0.733333 |
f7486b862bb5fb37daed755783a7b8fbfa526e7a | 3,707 | yaml | YAML | examples/operator/flekszible-operator-tls-configmap.yaml | elek/flekszible | 2bd3dd8d53e2698fc317a567c16c9f9ac27aa13e | [
"Apache-2.0"
] | 37 | 2019-01-12T10:36:58.000Z | 2021-11-15T06:56:47.000Z | examples/operator/flekszible-operator-tls-configmap.yaml | elek/flekszible | 2bd3dd8d53e2698fc317a567c16c9f9ac27aa13e | [
"Apache-2.0"
] | 1 | 2021-08-01T19:15:46.000Z | 2021-08-01T19:15:46.000Z | examples/operator/flekszible-operator-tls-configmap.yaml | elek/flekszible | 2bd3dd8d53e2698fc317a567c16c9f9ac27aa13e | [
"Apache-2.0"
] | 2 | 2020-10-22T07:03:39.000Z | 2021-08-19T04:52:55.000Z |
apiVersion: v1
kind: ConfigMap
metadata:
name: flekszible-operator-tls
data:
server.key: |
-----BEGIN RSA PRIVATE KEY-----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-----END RSA PRIVATE KEY-----
server.crt: |
-----BEGIN CERTIFICATE-----
MIIEuTCCAqGgAwIBAgIQEohgj/1XI/2c32y1J70zyTANBgkqhkiG9w0BAQsFADAN
MQswCQYDVQQDEwJjYTAeFw0yMDA2MjEwOTM5NDVaFw0yMTEyMjEwOTM3NTFaMB4x
HDAaBgNVBAMTE2ZsZWtzemlibGUtb3BlcmF0b3IwggEiMA0GCSqGSIb3DQEBAQUA
A4IBDwAwggEKAoIBAQDGi3r8Ud6mqmNEgRF/5jt3jwtnM18OysipQNU25ExVMdP4
Ec49FIXPAjD+Sht3uSq5kAO7saBwhRL4iPaYzsUw/u1VqBgkPgybQ3iRejfo+Vsc
ZiYZU5t5XgfZ3MBgKy5L+jt15TP73XhwzmOHcYczJmoPlm2SwDAuo4jQgWEiqIfv
Wqlcul6OgYdCgMGgBNLcGlHskEX5/o7iYupYGjcChBDSW+XD6zHWIXVP6tFML+p2
6iPW68N9DTJl8j4HMBmaQmRS9LYPNP8UDa5t3/z6icf9oQa8wVYZPVP+GikzqPyB
NBgNGPgPf0SGC11Ou0HAQcpeq/aCJj/ehgkwmvD/AgMBAAGjggECMIH/MA4GA1Ud
DwEB/wQEAwIDuDAdBgNVHSUEFjAUBggrBgEFBQcDAQYIKwYBBQUHAwIwHQYDVR0O
BBYEFK+0C1U9M5NMQXnbUE7PQ1gex4FbMB8GA1UdIwQYMBaAFN8OHkfuomJsTDlj
Dt/CzpOWM+WAMIGNBgNVHREEgYUwgYKCE2ZsZWtzemlibGUtb3BlcmF0b3KCG2Zs
ZWtzemlibGUtb3BlcmF0b3IuZGVmYXVsdIIfZmxla3N6aWJsZS1vcGVyYXRvci5k
ZWZhdWx0LnN2Y4ItZmxla3N6aWJsZS1vcGVyYXRvci5kZWZhdWx0LnN2Yy5jbHVz
dGVyLmxvY2FsMA0GCSqGSIb3DQEBCwUAA4ICAQAwrPYSRyOfZtvoGvwUxc3vSNRB
cLA15ud934dt0YtPeX/FxwSoV9glaSl68D/KO6STVTPvr8jUAlzB1KOFYnmIUicD
rldy9WfUpYi7ZdELW8+3YnISv+G+es6YlAXexKdfW55u3MgNl1YfAMgjCmO4pqxb
skxKOIREIdmc+IA1F4Lp7r6hbMMIKvbNgD/7HZJuFcFv7lmiS+pZ2wpCLk6EfA3l
aVRD11sP4+38LzuavRzVfE+GPEs2Dr5ZHusk8LOBEozWN0hIO68us5xBwvxqSqlO
aLnXg8Xsv2Vhcygt4v/4ffwQ4xqavzXAM70PxjwSLryr2xPfj91VCe3U3EBApxck
aAsHN0O41VwxkO6+dRUEJ+U1qtkeC27TGaLzlsY8XFBWVYk6z/60yLOyTfr6GRuy
ha/CDUcidLB5jRvMSakLP9NPEAnkThW4m0A0mH+IUfGbskElydMvIORx/XKWCveA
H2Hn8TLBmyA71K767096lB0GTAijAy/+8rrwQCsXVncQG0DXi9T23unqTzoeF88B
82YMshWe7fDnaXZNxZs6f2tb8dvOA/epXOt6/DiFxyR/v0Bf3nv9drWOf6Y74rEx
XBKXHq30/dQvoAFnW0fnXiZOaWXoFi+t8Jn7I2znghJmSr4e+eZtTDkFrzwp4IRG
o3JJfAZ2XCVgwAIKvg==
-----END CERTIFICATE-----
| 57.921875 | 68 | 0.876989 |
f74929d0af4e54bce3d3bb9570572b61724c8653 | 127 | yaml | YAML | operators-examples/qiskit-dev-operator/operator/deploy/sectret.yaml | renier/glowing-quantum | 2d554e69b023db5e7cff5ac7c2d714bd570e3b47 | [
"Apache-2.0"
] | null | null | null | operators-examples/qiskit-dev-operator/operator/deploy/sectret.yaml | renier/glowing-quantum | 2d554e69b023db5e7cff5ac7c2d714bd570e3b47 | [
"Apache-2.0"
] | 2 | 2020-07-13T20:59:15.000Z | 2020-08-18T13:26:40.000Z | operators-examples/qiskit-dev-operator/operator/deploy/sectret.yaml | renier/glowing-quantum | 2d554e69b023db5e7cff5ac7c2d714bd570e3b47 | [
"Apache-2.0"
] | 2 | 2020-07-13T20:53:55.000Z | 2020-08-09T18:26:01.000Z | apiVersion: v1
kind: Secret
metadata:
name: qiskit-secret
type: Opaque
data:
qiskit-secret.cfg: <base64 encoded secret.cfg> | 18.142857 | 48 | 0.76378 |
f74953ce5d2dce139329e653a93d70b438882cd0 | 177 | yaml | YAML | k8s-manifests/kiali-secret.yaml | allanhung/istio-fleetman | 6779573a68f92d86a45c6ce6ecc8884137363218 | [
"MIT"
] | 241 | 2019-06-13T20:37:08.000Z | 2022-03-14T09:07:25.000Z | k8s-manifests/kiali-secret.yaml | allanhung/istio-fleetman | 6779573a68f92d86a45c6ce6ecc8884137363218 | [
"MIT"
] | 42 | 2019-06-13T16:20:31.000Z | 2020-11-26T16:14:53.000Z | k8s-manifests/kiali-secret.yaml | allanhung/istio-fleetman | 6779573a68f92d86a45c6ce6ecc8884137363218 | [
"MIT"
] | 444 | 2019-09-04T14:59:38.000Z | 2022-03-25T01:03:55.000Z | apiVersion: v1
kind: Secret
type: Opaque
metadata:
name: kiali
namespace: istio-system
labels:
app: kiali
data:
username: YWRtaW4=
passphrase: YWRtaW4=
| 14.75 | 26 | 0.672316 |
f7495b7924506c5c0af4d4a2ce2132e12184b5b2 | 338 | yml | YAML | .k8s/pod1.yml | marcinkaw/CiDotNetTest2 | c8b53d6f5543ba1f15f6ff52e456edbcaf63e026 | [
"MIT"
] | null | null | null | .k8s/pod1.yml | marcinkaw/CiDotNetTest2 | c8b53d6f5543ba1f15f6ff52e456edbcaf63e026 | [
"MIT"
] | null | null | null | .k8s/pod1.yml | marcinkaw/CiDotNetTest2 | c8b53d6f5543ba1f15f6ff52e456edbcaf63e026 | [
"MIT"
] | null | null | null | apiVersion: v1
kind: ReplicationController
metadata:
name: cidotnet-rc
spec:
replicas: 1
selector:
app: cidotnet-app
template:
metadata:
labels:
app: cidotnet-app
spec:
containers:
- name: cidotnet-pod
image: markaw/cidotnet-app
ports:
- containerPort: 80
| 16.9 | 36 | 0.594675 |
f74970b0aa27dcab558b3ce2f1822332848e5502 | 1,034 | yaml | YAML | Initialize/yaml/upstream/upstream.yaml | Azure/azure-signalr-bench | 5155f68defd76d85c87f677fba957d69bfd7dfb3 | [
"MIT"
] | 32 | 2018-07-30T02:17:48.000Z | 2020-12-12T17:26:45.000Z | Initialize/yaml/upstream/upstream.yaml | Azure/azure-signalr-bench | 5155f68defd76d85c87f677fba957d69bfd7dfb3 | [
"MIT"
] | 7 | 2018-07-30T07:35:52.000Z | 2021-08-30T03:18:25.000Z | Initialize/yaml/upstream/upstream.yaml | Azure/azure-signalr-bench | 5155f68defd76d85c87f677fba957d69bfd7dfb3 | [
"MIT"
] | 8 | 2018-09-29T02:41:25.000Z | 2021-07-27T04:04:39.000Z | apiVersion: apps/v1 # for versions before 1.9.0 use apps/v1beta2
kind: Deployment
metadata:
name: upstream
spec:
selector:
matchLabels:
app: upstream
replicas: 1 # tells deployment to run 2 pods matching the template
template:
metadata:
labels:
app: upstream
spec:
nodeSelector:
agentpool: captain
containers:
- name: upstream
image: signalrbenchmark/perf:1.4.4
resources:
requests:
cpu: 100m
memory: 1024Mi
limits:
cpu: 150m
memory: 1024Mi
volumeMounts:
- mountPath: "/mnt/perf"
name: volume
command: ["/bin/sh", "-c"]
args: ["cp /mnt/perf/manifest/SignalRUpstream/SignalRUpstream.zip /home ; cd /home ; unzip SignalRUpstream.zip ; exec ./SignalRUpstream"]
volumes:
- name: volume
azureFile:
secretName: azure-secret
shareName: perf
readOnly: false
| 27.210526 | 147 | 0.558027 |
f74992e7321b4198ca2eb07f10b7e87460da9912 | 496 | yaml | YAML | 06.pod.network.config/k8s/local-redis-deployment.yaml | press-any-key-tech/001.docker-k8s-demo | 8469aadc5d17781751e0c98b802a422542db58b3 | [
"MIT"
] | null | null | null | 06.pod.network.config/k8s/local-redis-deployment.yaml | press-any-key-tech/001.docker-k8s-demo | 8469aadc5d17781751e0c98b802a422542db58b3 | [
"MIT"
] | null | null | null | 06.pod.network.config/k8s/local-redis-deployment.yaml | press-any-key-tech/001.docker-k8s-demo | 8469aadc5d17781751e0c98b802a422542db58b3 | [
"MIT"
] | null | null | null | apiVersion: apps/v1
kind: Deployment
metadata:
name: local-redis
labels:
deployment: local-redis
spec:
replicas: 1
selector:
matchLabels:
pod: local-redis
template:
metadata:
labels:
pod: local-redis
spec:
containers:
- name: redis
image: redis:alpine
imagePullPolicy: IfNotPresent
resources:
requests:
cpu: 100m
memory: 100Mi
ports:
- containerPort: 6379
| 18.37037 | 45 | 0.566532 |
f749f21a04895f81e00ccb6822f3b082803a9eb8 | 763 | yaml | YAML | k8s/clusters/sidero-control/integrations/dhcp-server/deployment.yaml | raspbernetes/k8s-cluster | f8eaae22efca5a6f87351990dde1238bfbdd3cd2 | [
"Apache-2.0"
] | 4 | 2020-02-24T09:47:31.000Z | 2020-03-11T04:06:12.000Z | k8s/clusters/sidero-control/integrations/dhcp-server/deployment.yaml | Raspbernetes/k8s-cluster | 8bb455d5b94e0c0e31173ceb2f9f31156517e592 | [
"Apache-2.0"
] | null | null | null | k8s/clusters/sidero-control/integrations/dhcp-server/deployment.yaml | Raspbernetes/k8s-cluster | 8bb455d5b94e0c0e31173ceb2f9f31156517e592 | [
"Apache-2.0"
] | 1 | 2020-03-17T10:28:35.000Z | 2020-03-17T10:28:35.000Z | ---
apiVersion: apps/v1
kind: Deployment
metadata:
name: dhcp-server
namespace: kube-system
spec:
selector:
matchLabels:
app: dhcp-server
template:
metadata:
labels:
app: dhcp-server
spec:
containers:
- args:
- sleep 1000000000;
command:
- /bin/sh
- -c
- --
image: xunholy/dhcp-server:latest
imagePullPolicy: Always
name: dhcp-server
resources: {}
securityContext: {}
terminationMessagePath: /dev/termination-log
terminationMessagePolicy: File
volumeMounts:
- mountPath: /etc/dhcp
name: server-config
hostNetwork: true
volumes:
- emptyDir: {}
name: server-config
| 20.621622 | 52 | 0.566186 |
f749f8e573d733cbaa8b65c0c1264e9edbcbf7ef | 574 | yml | YAML | jobs/cron.job.yml | siimp/kubernetes-samples | 69f37858ee4aa382d6952aaeb6e0e04e903109f1 | [
"MIT"
] | null | null | null | jobs/cron.job.yml | siimp/kubernetes-samples | 69f37858ee4aa382d6952aaeb6e0e04e903109f1 | [
"MIT"
] | null | null | null | jobs/cron.job.yml | siimp/kubernetes-samples | 69f37858ee4aa382d6952aaeb6e0e04e903109f1 | [
"MIT"
] | null | null | null | apiVersion: batch/v1
kind: CronJob
metadata:
name: my-cron-job
spec:
concurrencyPolicy: Allow
schedule: "*/1 * * * *"
jobTemplate:
spec:
template:
metadata:
name: my-cron-job
labels:
job: my-cron-job
spec:
restartPolicy: OnFailure
containers:
- name: my-cron-job
image: alpine:3.15.0
resources:
limits:
memory: "16Mi"
cpu: "10m"
command: ["sh", "-c", 'echo "doing my job $(date)"'] | 23.916667 | 66 | 0.468641 |
f74a581ed3bb31d45ba2d37f6217c901924f5f24 | 546 | yaml | YAML | manifests/namespace-install/02b_workflow-controller-role.yaml | elikatsis/argo | f92284d7108ebf92907008d8f12a0696ee467a43 | [
"Apache-2.0"
] | 2 | 2020-03-10T02:37:00.000Z | 2020-08-29T15:42:15.000Z | manifests/namespace-install/02b_workflow-controller-role.yaml | elikatsis/argo | f92284d7108ebf92907008d8f12a0696ee467a43 | [
"Apache-2.0"
] | 1 | 2019-08-19T13:08:11.000Z | 2019-08-19T13:08:11.000Z | manifests/namespace-install/02b_workflow-controller-role.yaml | elikatsis/argo | f92284d7108ebf92907008d8f12a0696ee467a43 | [
"Apache-2.0"
] | 3 | 2020-09-26T15:49:43.000Z | 2020-11-18T19:13:30.000Z | apiVersion: rbac.authorization.k8s.io/v1
kind: Role
metadata:
name: argo-role
rules:
- apiGroups:
- ""
resources:
- pods
- pods/exec
verbs:
- create
- get
- list
- watch
- update
- patch
- delete
- apiGroups:
- ""
resources:
- configmaps
verbs:
- get
- watch
- list
- apiGroups:
- ""
resources:
- persistentvolumeclaims
verbs:
- create
- delete
- apiGroups:
- argoproj.io
resources:
- workflows
- workflows/finalizers
verbs:
- get
- list
- watch
- update
- patch
- delete
| 11.869565 | 40 | 0.602564 |
f74a5df6130a94c8887236c4a24d894db726c1a9 | 1,840 | yaml | YAML | apps/prow/cluster/horologium_deployment.yaml | xmudrii/k8s.io | a8ec49c1a6517200b580e302c809f3a908d4a366 | [
"Apache-2.0"
] | null | null | null | apps/prow/cluster/horologium_deployment.yaml | xmudrii/k8s.io | a8ec49c1a6517200b580e302c809f3a908d4a366 | [
"Apache-2.0"
] | null | null | null | apps/prow/cluster/horologium_deployment.yaml | xmudrii/k8s.io | a8ec49c1a6517200b580e302c809f3a908d4a366 | [
"Apache-2.0"
] | null | null | null | # Copyright 2021 The Kubernetes Authors All rights reserved.
#
# Licensed under the Apache License, Version 2.0 (the "License");
# you may not use this file except in compliance with the License.
# You may obtain a copy of the License at
#
# http://www.apache.org/licenses/LICENSE-2.0
#
# Unless required by applicable law or agreed to in writing, software
# distributed under the License is distributed on an "AS IS" BASIS,
# WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
# See the License for the specific language governing permissions and
# limitations under the License.
apiVersion: apps/v1
kind: Deployment
metadata:
namespace: prow
name: horologium
labels:
app: horologium
spec:
replicas: 1 # Do not scale up.
strategy:
type: Recreate
selector:
matchLabels:
app: horologium
template:
metadata:
labels:
app: horologium
spec:
serviceAccountName: horologium
terminationGracePeriodSeconds: 30
containers:
- name: horologium
image: gcr.io/k8s-prow/horologium:v20211108-892eb8add1
args:
- --config-path=/etc/config/config.yaml
- --dry-run=false
- --job-config-path=/etc/job-config
ports:
- name: metrics
containerPort: 9090
volumeMounts:
- name: config
mountPath: /etc/config
readOnly: true
- name: job-config
mountPath: /etc/job-config
readOnly: true
securityContext:
allowPrivilegeEscalation: false
capabilities:
drop:
- "ALL"
privileged: false
readOnlyRootFilesystem: true
volumes:
- name: config
configMap:
name: config
- name: job-config
configMap:
name: job-config
| 27.462687 | 74 | 0.63587 |
f74ab7f0fb2d400c6a2730c2e7c39c1e9a787a27 | 241 | yaml | YAML | examples/csi-storageclass.yaml | princerachit/cstor-csi | 31f93abf7963084ba7167d1fd99a30d5bcdb1414 | [
"Apache-2.0"
] | 18 | 2019-12-06T14:15:44.000Z | 2022-03-31T14:53:17.000Z | examples/csi-storageclass.yaml | princerachit/cstor-csi | 31f93abf7963084ba7167d1fd99a30d5bcdb1414 | [
"Apache-2.0"
] | 94 | 2019-10-31T06:13:23.000Z | 2022-03-01T06:45:04.000Z | examples/csi-storageclass.yaml | princerachit/cstor-csi | 31f93abf7963084ba7167d1fd99a30d5bcdb1414 | [
"Apache-2.0"
] | 18 | 2019-11-06T14:37:30.000Z | 2022-03-31T12:10:08.000Z | kind: StorageClass
apiVersion: storage.k8s.io/v1
metadata:
name: openebs-csi-cstor-sparse
provisioner: cstor.csi.openebs.io
allowVolumeExpansion: true
parameters:
cas-type: cstor
replicaCount: "1"
cstorPoolCluster: cstor-sparse-cspc
| 21.909091 | 37 | 0.792531 |
f74abfb50386cee0e7774dc139c4bd7353411edb | 2,120 | yaml | YAML | config/webhook.yaml | ssmall/knative-serving | 9e483da903afe255f7e1f9cdc5a002618cc84a02 | [
"Apache-2.0"
] | 1 | 2020-04-28T09:30:29.000Z | 2020-04-28T09:30:29.000Z | config/webhook.yaml | alokkulkarni/serving | 87478692aefc65c761102e6d640967f5d876c04d | [
"Apache-2.0"
] | null | null | null | config/webhook.yaml | alokkulkarni/serving | 87478692aefc65c761102e6d640967f5d876c04d | [
"Apache-2.0"
] | null | null | null | # Copyright 2018 The Knative Authors
#
# Licensed under the Apache License, Version 2.0 (the "License");
# you may not use this file except in compliance with the License.
# You may obtain a copy of the License at
#
# https://www.apache.org/licenses/LICENSE-2.0
#
# Unless required by applicable law or agreed to in writing, software
# distributed under the License is distributed on an "AS IS" BASIS,
# WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
# See the License for the specific language governing permissions and
# limitations under the License.
apiVersion: apps/v1
kind: Deployment
metadata:
name: webhook
namespace: knative-serving
labels:
serving.knative.dev/release: devel
spec:
replicas: 1
selector:
matchLabels:
app: webhook
role: webhook
template:
metadata:
annotations:
cluster-autoscaler.kubernetes.io/safe-to-evict: "false"
sidecar.istio.io/inject: "false"
labels:
app: webhook
role: webhook
serving.knative.dev/release: devel
spec:
serviceAccountName: controller
containers:
- name: webhook
# This is the Go import path for the binary that is containerized
# and substituted here.
image: knative.dev/serving/cmd/webhook
ports:
- name: metrics-port
containerPort: 9090
- name: profiling
containerPort: 8008
resources:
# Request 2x what we saw running e2e
requests:
cpu: 20m
memory: 20Mi
# Limit to 10x the request (20x the observed peak during e2e)
limits:
cpu: 200m
memory: 200Mi
env:
- name: SYSTEM_NAMESPACE
valueFrom:
fieldRef:
fieldPath: metadata.namespace
- name: CONFIG_LOGGING_NAME
value: config-logging
- name: CONFIG_OBSERVABILITY_NAME
value: config-observability
- name: METRICS_DOMAIN
value: knative.dev/serving
securityContext:
allowPrivilegeEscalation: false
| 29.859155 | 74 | 0.640566 |
f74ae94a125c7d92f6c6b1853d41cf6d27ce7e91 | 617 | yaml | YAML | kubernetes-controllers/paymentservice-deployment.yaml | otus-kuber-2022-03/BorisLuchnikov_platform | 25440d1f97fda730175fe969da891bacfba78438 | [
"MIT"
] | null | null | null | kubernetes-controllers/paymentservice-deployment.yaml | otus-kuber-2022-03/BorisLuchnikov_platform | 25440d1f97fda730175fe969da891bacfba78438 | [
"MIT"
] | 1 | 2022-03-29T05:54:47.000Z | 2022-03-30T18:52:51.000Z | kubernetes-controllers/paymentservice-deployment.yaml | otus-kuber-2022-03/BorisLuchnikov_platform | 25440d1f97fda730175fe969da891bacfba78438 | [
"MIT"
] | null | null | null | apiVersion: apps/v1
kind: Deployment
metadata:
name: paymentservice
labels:
app: paymentservice
spec:
replicas: 3
selector:
matchLabels:
app: paymentservice
template:
metadata:
labels:
app: paymentservice
spec:
containers:
- name: server
image: borisluchnikov/hs-paymentservice:v0.0.2
ports:
- containerPort: 50051
env:
- name: PORT
value: "50051"
- name: DISABLE_TRACING
value: "1"
- name: DISABLE_PROFILER
value: "1"
- name: DISABLE_DEBUGGER
value: "1"
| 19.903226 | 54 | 0.568882 |
f74aefd32e7c21cc1be9632d628253e88eaaf0bc | 3,492 | yaml | YAML | config/prow/cluster/hook_deployment.yaml | tylerferrara/test-infra | 27c2f2c5d2407835134677b72d7cf050e2e8bdd2 | [
"Apache-2.0"
] | null | null | null | config/prow/cluster/hook_deployment.yaml | tylerferrara/test-infra | 27c2f2c5d2407835134677b72d7cf050e2e8bdd2 | [
"Apache-2.0"
] | null | null | null | config/prow/cluster/hook_deployment.yaml | tylerferrara/test-infra | 27c2f2c5d2407835134677b72d7cf050e2e8bdd2 | [
"Apache-2.0"
] | null | null | null | # Copyright 2016 The Kubernetes Authors All rights reserved.
#
# Licensed under the Apache License, Version 2.0 (the "License");
# you may not use this file except in compliance with the License.
# You may obtain a copy of the License at
#
# http://www.apache.org/licenses/LICENSE-2.0
#
# Unless required by applicable law or agreed to in writing, software
# distributed under the License is distributed on an "AS IS" BASIS,
# WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
# See the License for the specific language governing permissions and
# limitations under the License.
apiVersion: apps/v1
kind: Deployment
metadata:
namespace: default
name: hook
labels:
app: hook
spec:
replicas: 4
strategy:
type: RollingUpdate
rollingUpdate:
maxSurge: 1
maxUnavailable: 1
selector:
matchLabels:
app: hook
template:
metadata:
labels:
app: hook
spec:
serviceAccountName: hook
terminationGracePeriodSeconds: 180
containers:
- name: hook
image: gcr.io/k8s-prow/hook:v20210615-c3915f8ad7
imagePullPolicy: Always
args:
- --dry-run=false
- --slack-token-file=/etc/slack/token
- --github-endpoint=http://ghproxy
- --github-endpoint=https://api.github.com
- --github-token-path=/etc/github/oauth
- --config-path=/etc/config/config.yaml
- --job-config-path=/etc/job-config
env:
# Use KUBECONFIG envvar rather than --kubeconfig flag in order to provide multiple configs to merge.
- name: KUBECONFIG
value: "/etc/kubeconfig/config"
ports:
- name: http
containerPort: 8888
volumeMounts:
- name: slack
mountPath: /etc/slack
- name: hmac
mountPath: /etc/webhook
readOnly: true
- name: oauth
mountPath: /etc/github
readOnly: true
- name: config
mountPath: /etc/config
readOnly: true
- name: job-config
mountPath: /etc/job-config
readOnly: true
- name: plugins
mountPath: /etc/plugins
readOnly: true
- name: cat-api
mountPath: /etc/cat-api
readOnly: true
- name: unsplash-api
mountPath: /etc/unsplash-api
readOnly: true
- name: kubeconfig
mountPath: /etc/kubeconfig
readOnly: true
livenessProbe:
httpGet:
path: /healthz
port: 8081
initialDelaySeconds: 3
periodSeconds: 3
readinessProbe:
httpGet:
path: /healthz/ready
port: 8081
initialDelaySeconds: 10
periodSeconds: 3
timeoutSeconds: 600
volumes:
- name: slack
secret:
secretName: slack-token
- name: hmac
secret:
secretName: hmac-token
- name: oauth
secret:
secretName: oauth-token
- name: config
configMap:
name: config
- name: job-config
configMap:
name: job-config
- name: plugins
configMap:
name: plugins
- name: cat-api
configMap:
name: cat-api-key
- name: unsplash-api
secret:
secretName: unsplash-api-key
- name: kubeconfig
secret:
defaultMode: 420
secretName: kubeconfig
| 27.496063 | 108 | 0.581042 |
f74b5b0b0ce6b6b180dedc07b24ce97c67b65375 | 429 | yaml | YAML | manifests/07_configmap.yaml | multi-arch/operator-marketplace | d973051f6cc7a24168f0463c95f4f9a1785f8907 | [
"Apache-2.0"
] | null | null | null | manifests/07_configmap.yaml | multi-arch/operator-marketplace | d973051f6cc7a24168f0463c95f4f9a1785f8907 | [
"Apache-2.0"
] | null | null | null | manifests/07_configmap.yaml | multi-arch/operator-marketplace | d973051f6cc7a24168f0463c95f4f9a1785f8907 | [
"Apache-2.0"
] | null | null | null | apiVersion: v1
kind: ConfigMap
metadata:
labels:
# This label ensures that the OpenShift Certificate Authority bundle
# is added to the ConfigMap.
config.openshift.io/inject-trusted-cabundle: "true"
name: marketplace-trusted-ca
namespace: openshift-marketplace
annotations:
include.release.openshift.io/self-managed-high-availability: "true"
include.release.openshift.io/single-node-developer: "true"
| 33 | 72 | 0.764569 |
f74bd05b87bc3d3074b6781ec68a80c36c5c69fc | 292 | yaml | YAML | yamls/knative/clusterrole_istio-init-istio-system.yaml | jmnote/kubeyaml | 675b07a90d2295f697e89294dd31030943836a0d | [
"Apache-2.0"
] | 1 | 2022-01-28T16:03:48.000Z | 2022-01-28T16:03:48.000Z | yamls/knative/clusterrole_istio-init-istio-system.yaml | jmnote/kubeyaml | 675b07a90d2295f697e89294dd31030943836a0d | [
"Apache-2.0"
] | null | null | null | yamls/knative/clusterrole_istio-init-istio-system.yaml | jmnote/kubeyaml | 675b07a90d2295f697e89294dd31030943836a0d | [
"Apache-2.0"
] | 1 | 2022-02-15T07:57:28.000Z | 2022-02-15T07:57:28.000Z | apiVersion: rbac.authorization.k8s.io/v1
kind: ClusterRole
metadata:
labels:
app: istio-init
istio: init
name: istio-init-istio-system
rules:
- apiGroups:
- apiextensions.k8s.io
resources:
- customresourcedefinitions
verbs:
- create
- get
- list
- watch
- patch
| 15.368421 | 40 | 0.691781 |
f74c3b8c11fda476584aea72d88e0b6efb92e078 | 2,134 | yaml | YAML | gatekeeper/tests/11-dep-reg-allow.yaml | jimmyraywv/opa | 8a7a674bed5e6874512d8b2f6865aba95f7da8e2 | [
"Apache-2.0"
] | null | null | null | gatekeeper/tests/11-dep-reg-allow.yaml | jimmyraywv/opa | 8a7a674bed5e6874512d8b2f6865aba95f7da8e2 | [
"Apache-2.0"
] | null | null | null | gatekeeper/tests/11-dep-reg-allow.yaml | jimmyraywv/opa | 8a7a674bed5e6874512d8b2f6865aba95f7da8e2 | [
"Apache-2.0"
] | null | null | null | apiVersion: apps/v1
kind: Deployment
metadata:
name: test
namespace: opa-test
labels:
app: test
owner: jimmy
spec:
selector:
matchLabels:
app: test
replicas: 1
strategy:
type: RollingUpdate
rollingUpdate:
maxSurge: 5
maxUnavailable: 1
template:
metadata:
labels:
app: test
owner: jimmy
env: dev
annotations:
iam.amazonaws.com/role: arn:aws:iam::123456789012:role/test
spec:
containers:
- name: bad-test
image: BAD_REGISTRY/read-only-container:v0.0.1
imagePullPolicy: Always
securityContext:
allowPrivilegeEscalation: false
runAsUser: 1000
readOnlyRootFilesystem: true
ports:
- containerPort: 8080
resources:
limits:
cpu: 200m
memory: 20Mi
requests:
cpu: 100m
memory: 10Mi
readinessProbe:
tcpSocket:
port: 8080
initialDelaySeconds: 5
periodSeconds: 10
livenessProbe:
tcpSocket:
port: 8080
initialDelaySeconds: 15
periodSeconds: 20
volumeMounts:
- mountPath: /tmp
name: tmp
- name: good-test
image: GOOD_REGISTRY/read-only-container:v0.0.1
imagePullPolicy: Always
securityContext:
allowPrivilegeEscalation: false
runAsUser: 1000
readOnlyRootFilesystem: true
ports:
- containerPort: 8080
resources:
limits:
cpu: 200m
memory: 20Mi
requests:
cpu: 100m
memory: 10Mi
readinessProbe:
tcpSocket:
port: 8080
initialDelaySeconds: 5
periodSeconds: 10
livenessProbe:
tcpSocket:
port: 8080
initialDelaySeconds: 15
periodSeconds: 20
volumeMounts:
- mountPath: /tmp
name: tmp
volumes:
- name: tmp
emptyDir: {}
| 23.450549 | 67 | 0.523899 |
f74c525e5f195a8643d20bfe4068ec00cf3e5ecf | 370 | yaml | YAML | component/nodejs/dependence/npm/component-nodejs-dependence-npm.yaml | armohamm/containerops | 8cd22168d64869902cd91968599373f8eab60ca3 | [
"Apache-2.0"
] | 355 | 2016-10-19T08:46:24.000Z | 2022-03-16T06:01:14.000Z | component/nodejs/dependence/npm/component-nodejs-dependence-npm.yaml | armohamm/containerops | 8cd22168d64869902cd91968599373f8eab60ca3 | [
"Apache-2.0"
] | 66 | 2016-10-26T04:00:39.000Z | 2018-09-25T11:44:32.000Z | component/nodejs/dependence/npm/component-nodejs-dependence-npm.yaml | armohamm/containerops | 8cd22168d64869902cd91968599373f8eab60ca3 | [
"Apache-2.0"
] | 118 | 2016-10-18T11:50:37.000Z | 2021-09-14T06:39:56.000Z | apiVersion: v1
kind: Pod
metadata:
name: component-nodejs-dependence-npm
spec:
containers:
- name: npm
image: hub.opshub.sh/containerops/dependence-nodejs-npm:latest
env:
- name: CO_DATA
value: "git_url=https://github.com/WildDogTeam/demo-js-wildchat.git"
resources:
requests:
cpu: 2
memory: 4G
restartPolicy: Never | 23.125 | 74 | 0.67027 |
f74c621e34099b96dc75ab863ea87d1ff2e4dd0a | 222 | yml | YAML | manifests/service.yml | alexandermill3r/pipelines-javascript-docker | d3880469d9f6af61904480ebbb254b6212d1ce33 | [
"CC-BY-4.0",
"MIT"
] | null | null | null | manifests/service.yml | alexandermill3r/pipelines-javascript-docker | d3880469d9f6af61904480ebbb254b6212d1ce33 | [
"CC-BY-4.0",
"MIT"
] | null | null | null | manifests/service.yml | alexandermill3r/pipelines-javascript-docker | d3880469d9f6af61904480ebbb254b6212d1ce33 | [
"CC-BY-4.0",
"MIT"
] | null | null | null | apiVersion: v1
kind: Service
metadata:
name: alexandermillrpipelinesjavascriptdocker
spec:
type: LoadBalancer
ports:
- port: 8080
selector:
app: alexandermillrpipelinesjavascriptdocker | 22.2 | 52 | 0.707207 |
f74c65ee337c76706294e1fb02b30ba1723182d2 | 429 | yaml | YAML | staging/src/k8s.io/pod-security-admission/test/testdata/restricted/v1.9/fail/restrictedvolumes10.yaml | 767829413/kubernetes | e3982ce472af31efe0cfb5165271c84f1ace0b0f | [
"Apache-2.0"
] | 84,910 | 2015-08-12T17:45:55.000Z | 2022-03-31T23:39:40.000Z | staging/src/k8s.io/pod-security-admission/test/testdata/restricted/v1.9/fail/restrictedvolumes10.yaml | 767829413/kubernetes | e3982ce472af31efe0cfb5165271c84f1ace0b0f | [
"Apache-2.0"
] | 98,305 | 2015-08-12T17:35:13.000Z | 2022-03-31T23:46:47.000Z | staging/src/k8s.io/pod-security-admission/test/testdata/restricted/v1.9/fail/restrictedvolumes10.yaml | 767829413/kubernetes | e3982ce472af31efe0cfb5165271c84f1ace0b0f | [
"Apache-2.0"
] | 36,592 | 2015-08-12T18:36:13.000Z | 2022-03-31T16:22:17.000Z | apiVersion: v1
kind: Pod
metadata:
name: restrictedvolumes10
spec:
containers:
- image: k8s.gcr.io/pause
name: container1
securityContext:
allowPrivilegeEscalation: false
initContainers:
- image: k8s.gcr.io/pause
name: initcontainer1
securityContext:
allowPrivilegeEscalation: false
securityContext:
runAsNonRoot: true
volumes:
- flocker:
datasetName: test
name: volume1
| 19.5 | 37 | 0.710956 |
f74cc67197eb0154d15f6eebe8dba032cb4ede35 | 763 | yaml | YAML | namespaces/live.cloud-platform.service.justice.gov.uk/cloud-platform-migration/00-namespace.yaml | rossjones/cloud-platform-environments | 85a4e19cf012d97d885c6ea91379ca3f7b59a49a | [
"MIT"
] | 28 | 2018-07-13T15:02:24.000Z | 2022-03-17T09:23:54.000Z | namespaces/live.cloud-platform.service.justice.gov.uk/cloud-platform-migration/00-namespace.yaml | happygeneralist/recall-decisions-alpha | 09124f3994a878e9969e7b4326088b2ae7bfd170 | [
"MIT"
] | 963 | 2018-05-30T15:46:06.000Z | 2022-03-30T10:06:39.000Z | namespaces/live.cloud-platform.service.justice.gov.uk/cloud-platform-migration/00-namespace.yaml | happygeneralist/recall-decisions-alpha | 09124f3994a878e9969e7b4326088b2ae7bfd170 | [
"MIT"
] | 29 | 2018-12-04T09:37:36.000Z | 2022-02-25T10:35:34.000Z | apiVersion: v1
kind: Namespace
metadata:
name: cloud-platform-migration
labels:
cloud-platform.justice.gov.uk/is-production: "false"
cloud-platform.justice.gov.uk/environment-name: "development"
annotations:
cloud-platform.justice.gov.uk/business-unit: "Platforms"
cloud-platform.justice.gov.uk/slack-channel: "cloud-platform-low-priority"
cloud-platform.justice.gov.uk/application: "Cloud Platform migration test"
cloud-platform.justice.gov.uk/owner: "cloud-platform: platforms@digital.justice.gov.uk"
cloud-platform.justice.gov.uk/source-code: "https://github.com/ministryofjustice/cloud-platform-reference-app"
cloud-platform.justice.gov.uk/team-name: "webops"
cloud-platform.justice.gov.uk/review-after: "2021-09-23"
| 47.6875 | 114 | 0.764089 |
f74d77d3e47c1d86bdab1f65722aebf7ee1b9aa8 | 186 | yaml | YAML | frontend-ui5-mssql/k8s/configmap.yaml | oksanazubchenko/kyma-runtime-extension-samples | c368e92cf2ed3c4a827ae139fc33e2640a223b41 | [
"Apache-2.0"
] | 91 | 2020-07-06T19:38:37.000Z | 2022-03-14T14:44:52.000Z | frontend-ui5-mssql/k8s/configmap.yaml | oksanazubchenko/kyma-runtime-extension-samples | c368e92cf2ed3c4a827ae139fc33e2640a223b41 | [
"Apache-2.0"
] | 48 | 2020-09-09T08:32:38.000Z | 2022-03-14T11:01:09.000Z | frontend-ui5-mssql/k8s/configmap.yaml | oksanazubchenko/kyma-runtime-extension-samples | c368e92cf2ed3c4a827ae139fc33e2640a223b41 | [
"Apache-2.0"
] | 49 | 2020-07-15T12:39:52.000Z | 2022-03-10T10:40:18.000Z | kind: ConfigMap
apiVersion: v1
metadata:
name: fe-ui5-mssql
labels:
app: fe-ui5-mssql
data:
config.json: |-
{
"API_URL": "https://api-mssql-go.<cluster domain>"
} | 16.909091 | 56 | 0.61828 |
f74d90160f2dd9b4d59857aadf1b8bd50dca21ac | 88 | yaml | YAML | kitchensink/tekton/link-sa-pipeline.yaml | franktp1/jboss-eap-quickstarts | f42cbda22d49a9468d7b2853c64e3704e031f592 | [
"Apache-2.0"
] | null | null | null | kitchensink/tekton/link-sa-pipeline.yaml | franktp1/jboss-eap-quickstarts | f42cbda22d49a9468d7b2853c64e3704e031f592 | [
"Apache-2.0"
] | null | null | null | kitchensink/tekton/link-sa-pipeline.yaml | franktp1/jboss-eap-quickstarts | f42cbda22d49a9468d7b2853c64e3704e031f592 | [
"Apache-2.0"
] | 1 | 2020-09-30T09:09:59.000Z | 2020-09-30T09:09:59.000Z | apiVersion: v1
kind: ServiceAccount
metadata:
name: pipeline
secrets:
- name: regcred
| 12.571429 | 20 | 0.772727 |
f74da88260d69f63e1e73443b18ef24e0565e250 | 257 | yaml | YAML | Chapter01/nginx-hpa.yaml | Noctoweb/Hands-On-Microservices-with-Kubernetes | cfdf3fc5a7a3745790b7d7376808eff1152ad101 | [
"MIT"
] | 81 | 2019-07-21T00:37:43.000Z | 2022-03-04T20:28:40.000Z | Chapter01/nginx-hpa.yaml | Noctoweb/Hands-On-Microservices-with-Kubernetes | cfdf3fc5a7a3745790b7d7376808eff1152ad101 | [
"MIT"
] | 1 | 2021-11-01T23:28:31.000Z | 2021-11-18T07:24:53.000Z | Chapter01/nginx-hpa.yaml | Noctoweb/Hands-On-Microservices-with-Kubernetes | cfdf3fc5a7a3745790b7d7376808eff1152ad101 | [
"MIT"
] | 74 | 2019-06-19T19:22:53.000Z | 2022-03-24T15:14:48.000Z | apiVersion: autoscaling/v1
kind: HorizontalPodAutoscaler
metadata:
name: nginx
namespace: default
spec:
maxReplicas: 4
minReplicas: 2
targetCPUUtilizationPercentage: 90
scaleTargetRef:
apiVersion: apps/v1
kind: Deployment
name: nginx | 19.769231 | 36 | 0.762646 |
f74dfc83029b5b64aa0090b1a95ca44c53bb4a8e | 1,288 | yaml | YAML | addons/kotsadm/1.38.0/kurl-proxy/tmpl-deployment.yaml | Sharpie/kURL | b930200dec4d26de25b8de12213a80572d12094c | [
"Apache-2.0"
] | 405 | 2020-01-27T05:25:11.000Z | 2022-03-30T18:08:37.000Z | addons/kotsadm/1.38.0/kurl-proxy/tmpl-deployment.yaml | Sharpie/kURL | b930200dec4d26de25b8de12213a80572d12094c | [
"Apache-2.0"
] | 1,073 | 2020-01-29T20:00:33.000Z | 2022-03-31T04:26:06.000Z | addons/kotsadm/1.38.0/kurl-proxy/tmpl-deployment.yaml | Sharpie/kURL | b930200dec4d26de25b8de12213a80572d12094c | [
"Apache-2.0"
] | 42 | 2020-02-14T20:56:37.000Z | 2022-03-30T07:11:58.000Z | apiVersion: apps/v1
kind: Deployment
metadata:
name: kurl-proxy-kotsadm
labels:
app: kurl-proxy-kotsadm
kots.io/kotsadm: \"true\"
kots.io/backup: velero
spec:
selector:
matchLabels:
app: kurl-proxy-kotsadm
template:
metadata:
labels:
app: kurl-proxy-kotsadm
kots.io/kotsadm: \"true\"
kots.io/backup: velero
spec:
containers:
- name: proxy
image: kotsadm/kurl-proxy:v1.38.0
imagePullPolicy: IfNotPresent
env:
- name: NODE_PORT
value: \"8800\"
- name: UPSTREAM_ORIGIN
value: http://kotsadm:3000
- name: DEX_UPSTREAM_ORIGIN
value: http://kotsadm-dex:5556
- name: TLS_SECRET_NAME
value: kotsadm-tls
- name: NAMESPACE
valueFrom:
fieldRef:
fieldPath: metadata.namespace
volumeMounts:
- name: kotsadm-config
mountPath: /etc/kotsadm
resources:
limits:
cpu: 200m
memory: 200Mi
requests:
cpu: 50m
memory: 50Mi
serviceAccount: kurl-proxy
volumes:
- name: kotsadm-config
configMap:
name: kotsadm-application-metadata
optional: true
| 24.301887 | 44 | 0.555124 |
f74e027e18328e5fc4142481d6dc7426a1605266 | 1,059 | yaml | YAML | config-root/namespaces/jx/jx-pipelines-visualizer/jx-pipelines-visualizer-ingress.yaml | klau2005/jx3-minikube-test | d1dde47aef4784a5badb8c960a5bb407f8f06f68 | [
"Apache-2.0"
] | null | null | null | config-root/namespaces/jx/jx-pipelines-visualizer/jx-pipelines-visualizer-ingress.yaml | klau2005/jx3-minikube-test | d1dde47aef4784a5badb8c960a5bb407f8f06f68 | [
"Apache-2.0"
] | null | null | null | config-root/namespaces/jx/jx-pipelines-visualizer/jx-pipelines-visualizer-ingress.yaml | klau2005/jx3-minikube-test | d1dde47aef4784a5badb8c960a5bb407f8f06f68 | [
"Apache-2.0"
] | null | null | null | # Source: jx-pipelines-visualizer/templates/ingress.yaml
apiVersion: networking.k8s.io/v1
kind: Ingress
metadata:
name: jx-pipelines-visualizer
labels:
app.kubernetes.io/name: jx-pipelines-visualizer
app.kubernetes.io/instance: "jx-pipelines-visualizer"
helm.sh/chart: jx-pipelines-visualizer-1.7.2
app.kubernetes.io/version: "1.7.2"
app.kubernetes.io/managed-by: "Helm"
gitops.jenkins-x.io/pipeline: 'namespaces'
annotations:
kubernetes.io/ingress.class: nginx
nginx.ingress.kubernetes.io/auth-realm: Authentication Required - Jenkins X Pipeline Dashboard
nginx.ingress.kubernetes.io/auth-secret: jx-basic-auth-htpasswd
nginx.ingress.kubernetes.io/auth-type: basic
meta.helm.sh/release-name: 'jx-pipelines-visualizer'
namespace: jx
spec:
rules:
- host: dashboard-jx.192.168.39.23.nip.io
http:
paths:
- pathType: ImplementationSpecific
backend:
service:
name: jx-pipelines-visualizer
port:
name: http
| 34.16129 | 98 | 0.681775 |
f74e5e06dd7bf8b704a038c927331ca4ccdc9093 | 2,270 | yaml | YAML | deploy/fb-user-datastore-chart/templates/deployment.yaml | uk-gov-mirror/ministryofjustice.fb-user-datastore | a0fdc84a17659726724c6507ec05ac6747e6ae25 | [
"MIT"
] | null | null | null | deploy/fb-user-datastore-chart/templates/deployment.yaml | uk-gov-mirror/ministryofjustice.fb-user-datastore | a0fdc84a17659726724c6507ec05ac6747e6ae25 | [
"MIT"
] | null | null | null | deploy/fb-user-datastore-chart/templates/deployment.yaml | uk-gov-mirror/ministryofjustice.fb-user-datastore | a0fdc84a17659726724c6507ec05ac6747e6ae25 | [
"MIT"
] | null | null | null | ---
# web front-end
apiVersion: apps/v1
kind: Deployment
metadata:
name: "fb-user-datastore-api-{{ .Values.environmentName }}"
spec:
replicas: 10
selector:
matchLabels:
app: "fb-user-datastore-api-{{ .Values.environmentName }}"
template:
metadata:
labels:
app: "fb-user-datastore-api-{{ .Values.environmentName }}"
appGroup: "fb-user-datastore"
fb-service-token-cache-access: "true"
tier: "frontend"
spec:
serviceAccountName: "formbuilder-user-datastore-{{ .Values.environmentName }}"
containers:
- name: "fb-user-datastore-api-{{ .Values.environmentName }}"
image: "754256621582.dkr.ecr.eu-west-2.amazonaws.com/formbuilder/fb-user-datastore-api:{{ .Values.circleSha1 }}"
securityContext:
runAsUser: 1001
imagePullPolicy: Always
ports:
- containerPort: 3000
readinessProbe:
httpGet:
path: /health
port: 3000
initialDelaySeconds: 5
periodSeconds: 5
successThreshold: 1
# non-secret env vars
# defined in config_map.yaml
envFrom:
- configMapRef:
name: fb-user-datastore-api-env-{{ .Values.environmentName }}
env:
- name: DATABASE_URL
valueFrom:
secretKeyRef:
name: rds-instance-formbuilder-user-datastore-{{ .Values.environmentName }}
key: url
- name: SECRET_KEY_BASE
valueFrom:
secretKeyRef:
name: fb-user-datastore-api-secrets-{{ .Values.environmentName }}
key: secret_key_base
- name: SERVICE_TOKEN
valueFrom:
secretKeyRef:
name: fb-platform-datastore-token-{{ .Values.environmentName }}
key: token
- name: SENTRY_DSN
valueFrom:
secretKeyRef:
name: fb-user-datastore-api-secrets-{{ .Values.environmentName }}
key: sentry_dsn
- name: METRICS_ACCESS_KEY
valueFrom:
secretKeyRef:
name: fb-user-datastore-api-secrets-{{ .Values.environmentName }}
key: metrics_access_key
| 33.880597 | 120 | 0.567401 |
f74ea36e591b5fade142e8571a5131e17ccf4a74 | 503 | yaml | YAML | deployment-echo.yaml | tricky42/k3d-nfs | aef7475a58c956675ea89ed3dab976b4c8d7ce80 | [
"Apache-2.0"
] | null | null | null | deployment-echo.yaml | tricky42/k3d-nfs | aef7475a58c956675ea89ed3dab976b4c8d7ce80 | [
"Apache-2.0"
] | null | null | null | deployment-echo.yaml | tricky42/k3d-nfs | aef7475a58c956675ea89ed3dab976b4c8d7ce80 | [
"Apache-2.0"
] | null | null | null | ---
apiVersion: apps/v1
kind: Deployment
metadata:
name: echo
spec:
selector:
matchLabels:
app: echo
strategy:
type: Recreate
template:
metadata:
labels:
app: echo
spec:
volumes:
- name: nfs-mount
persistentVolumeClaim:
claimName: nfs-for-pods
containers:
- image: busybox
name: echo
volumeMounts:
- mountPath: "/data"
name: nfs-mount
command: ["ping", "127.0.0.1"] | 18.62963 | 38 | 0.540755 |
f74eccbdac84c88159719886efe8a48cdd899011 | 1,527 | yml | YAML | e2e-tests/experiments/upgrade-device-localpv/run_e2e_test.yml | mheler/device-localpv | 7aa0f3896563e676891df337114cf3952a9a0f65 | [
"Apache-2.0"
] | 10 | 2021-03-24T01:44:57.000Z | 2022-03-07T05:17:39.000Z | e2e-tests/experiments/upgrade-device-localpv/run_e2e_test.yml | mheler/device-localpv | 7aa0f3896563e676891df337114cf3952a9a0f65 | [
"Apache-2.0"
] | 22 | 2021-03-12T14:31:25.000Z | 2022-03-23T17:00:43.000Z | e2e-tests/experiments/upgrade-device-localpv/run_e2e_test.yml | mheler/device-localpv | 7aa0f3896563e676891df337114cf3952a9a0f65 | [
"Apache-2.0"
] | 13 | 2021-03-11T16:55:46.000Z | 2022-01-07T07:21:33.000Z | ---
apiVersion: batch/v1
kind: Job
metadata:
generateName: upgrade-device-localpv-
namespace: e2e
spec:
template:
metadata:
labels:
test: device-localpv-upgrade
spec:
serviceAccountName: e2e
restartPolicy: Never
containers:
- name: ansibletest
image: openebs/device-localpv-e2e:ci
imagePullPolicy: IfNotPresent
env:
- name: ANSIBLE_STDOUT_CALLBACK
value: default
## Give the versioned branch name for device_localpv provisioner from openebs/device-localpv repo
## for e.g. (v1.4.x , v1.5.x OR master)
- name: TO_VERSION_DEVICE_BRANCH
value: ''
## Provide DEVICE_DRIVER image to which upgrade is to done. To use ci images use ci tag.
## Give full image name (for e.g. openebs/device-driver:<tag>)
- name: TO_VERSION_DEVICE_DRIVER_IMAGE
value: ''
# This is the namespace where the device driver will create all its resources.
# By default it is in openebs namespace. If you have been using some different namespace
# provide that value. We should never attempt to modify this namespace as old resources will
# not be available under the new namespace.
- name: DEVICE_OPERATOR_NAMESPACE
value: 'openebs'
command: ["/bin/bash"]
args: ["-c", "ansible-playbook ./e2e-tests/experiments/upgrade-device-localpv/test.yml -i /etc/ansible/hosts -v; exit 0"] | 37.243902 | 129 | 0.632613 |
f74f97eb427f00cc0330de6ce10ba028de09ee35 | 722 | yaml | YAML | aws/ingress-service.yaml | MaayanLab/CFTools | f567e9464cfc9c8372e5c7d6cb1fe456b1756951 | [
"MIT"
] | null | null | null | aws/ingress-service.yaml | MaayanLab/CFTools | f567e9464cfc9c8372e5c7d6cb1fe456b1756951 | [
"MIT"
] | 2 | 2020-03-10T16:54:37.000Z | 2020-03-10T20:49:48.000Z | aws/ingress-service.yaml | MaayanLab/CFTools | f567e9464cfc9c8372e5c7d6cb1fe456b1756951 | [
"MIT"
] | null | null | null | kind: Service
apiVersion: v1
metadata:
name: ingress-nginx
namespace: ingress-nginx
labels:
app.kubernetes.io/name: ingress-nginx
app.kubernetes.io/part-of: ingress-nginx
annotations:
# by default the type is elb (classic load balancer).
service.beta.kubernetes.io/aws-load-balancer-type: nlb
spec:
# this setting is to make sure the source IP address is preserved.
externalTrafficPolicy: Local
type: NodePort
selector:
app.kubernetes.io/name: ingress-nginx
app.kubernetes.io/part-of: ingress-nginx
ports:
- name: http
port: 80
nodePort: 30080
targetPort: 80
- name: https
protocol: TCP
port: 443
nodePort: 30443
targetPort: 443
| 24.066667 | 68 | 0.688366 |
f74f9b3a8caed483b1649a6a8e68102fc95da4fc | 268 | yaml | YAML | config_and_storage/persitentVolumeClaim.yaml | hwakabh/ckad-manifests | 395b8a883d0b7387281c6a751b651abd65c28e47 | [
"MIT"
] | null | null | null | config_and_storage/persitentVolumeClaim.yaml | hwakabh/ckad-manifests | 395b8a883d0b7387281c6a751b651abd65c28e47 | [
"MIT"
] | 9 | 2020-02-09T14:26:39.000Z | 2020-03-15T08:06:31.000Z | config_and_storage/persitentVolumeClaim.yaml | hwakabh/k8s-manifests | 395b8a883d0b7387281c6a751b651abd65c28e47 | [
"MIT"
] | null | null | null | ---
apiVersion: v1
kind: PersistentVolumeClaim
metadata:
name: testpvc01
spec:
accessModes:
- ReadWriteOnce
volumeMode: Filesystem
resources:
requests:
storage: 5Gi
storageClassName: standard
selector:
matchLabels:
volume: test_pvs
| 15.764706 | 28 | 0.708955 |
f74fb8fbb33945c28d12636bbd205a7ff06d7ee6 | 318 | yaml | YAML | config/rbac/api_viewer_role.yaml | eguzki/cautious-giggle | cbcb39d899a771c11aa4980b44e454c74192e88b | [
"Apache-2.0"
] | null | null | null | config/rbac/api_viewer_role.yaml | eguzki/cautious-giggle | cbcb39d899a771c11aa4980b44e454c74192e88b | [
"Apache-2.0"
] | null | null | null | config/rbac/api_viewer_role.yaml | eguzki/cautious-giggle | cbcb39d899a771c11aa4980b44e454c74192e88b | [
"Apache-2.0"
] | null | null | null | # permissions for end users to view apis.
apiVersion: rbac.authorization.k8s.io/v1
kind: ClusterRole
metadata:
name: api-viewer-role
rules:
- apiGroups:
- giggle.kuadrant.io
resources:
- apis
verbs:
- get
- list
- watch
- apiGroups:
- giggle.kuadrant.io
resources:
- apis/status
verbs:
- get
| 15.142857 | 41 | 0.685535 |
f74fd7b7f6f277dbd0d2d8b445c0a51dc71a1a70 | 2,572 | yaml | YAML | manifests/0000_50_olm_07-olm-operator.deployment.yaml | ankitathomas/operator-lifecycle-manager-upstream | 05d2c33232798988eed7370a7cb167bee1b4ba82 | [
"Apache-2.0"
] | 1 | 2021-09-01T08:18:08.000Z | 2021-09-01T08:18:08.000Z | manifests/0000_50_olm_07-olm-operator.deployment.yaml | ankitathomas/operator-lifecycle-manager-upstream | 05d2c33232798988eed7370a7cb167bee1b4ba82 | [
"Apache-2.0"
] | null | null | null | manifests/0000_50_olm_07-olm-operator.deployment.yaml | ankitathomas/operator-lifecycle-manager-upstream | 05d2c33232798988eed7370a7cb167bee1b4ba82 | [
"Apache-2.0"
] | null | null | null | apiVersion: apps/v1
kind: Deployment
metadata:
name: olm-operator
namespace: openshift-operator-lifecycle-manager
labels:
app: olm-operator
spec:
strategy:
type: RollingUpdate
replicas: 1
selector:
matchLabels:
app: olm-operator
template:
metadata:
labels:
app: olm-operator
spec:
serviceAccountName: olm-operator-serviceaccount
priorityClassName: "system-cluster-critical"
containers:
- name: olm-operator
command:
- /bin/olm
args:
- --namespace
- $(OPERATOR_NAMESPACE)
- --writeStatusName
- operator-lifecycle-manager
- --writePackageServerStatusName
- operator-lifecycle-manager-packageserver
- --tls-cert
- /var/run/secrets/serving-cert/tls.crt
- --tls-key
- /var/run/secrets/serving-cert/tls.key
image: quay.io/operator-framework/olm@sha256:b9d011c0fbfb65b387904f8fafc47ee1a9479d28d395473341288ee126ed993b
imagePullPolicy: IfNotPresent
ports:
- containerPort: 8080
- containerPort: 8081
name: metrics
protocol: TCP
livenessProbe:
httpGet:
path: /healthz
port: 8080
readinessProbe:
httpGet:
path: /healthz
port: 8080
terminationMessagePolicy: FallbackToLogsOnError
env:
- name: RELEASE_VERSION
value: "0.0.1-snapshot"
- name: OPERATOR_NAMESPACE
valueFrom:
fieldRef:
fieldPath: metadata.namespace
- name: OPERATOR_NAME
value: olm-operator
resources:
requests:
cpu: 10m
memory: 160Mi
volumeMounts:
- mountPath: /var/run/secrets/serving-cert
name: serving-cert
volumes:
- name: serving-cert
secret:
secretName: olm-operator-serving-cert
nodeSelector:
kubernetes.io/os: linux
node-role.kubernetes.io/master: ""
tolerations:
- effect: NoSchedule
key: node-role.kubernetes.io/master
operator: Exists
- effect: NoExecute
key: node.kubernetes.io/unreachable
operator: Exists
tolerationSeconds: 120
- effect: NoExecute
key: node.kubernetes.io/not-ready
operator: Exists
tolerationSeconds: 120
| 27.361702 | 119 | 0.559098 |
f7509f04eae1b12473825caf5f089748abe57480 | 4,410 | yaml | YAML | manifest_staging/deploy/secrets-store-csi-driver-windows.yaml | nccurry/secrets-store-csi-driver | 33d79b29cd967b295e57e1c6539da0e51e5eeff8 | [
"Apache-2.0"
] | null | null | null | manifest_staging/deploy/secrets-store-csi-driver-windows.yaml | nccurry/secrets-store-csi-driver | 33d79b29cd967b295e57e1c6539da0e51e5eeff8 | [
"Apache-2.0"
] | null | null | null | manifest_staging/deploy/secrets-store-csi-driver-windows.yaml | nccurry/secrets-store-csi-driver | 33d79b29cd967b295e57e1c6539da0e51e5eeff8 | [
"Apache-2.0"
] | null | null | null | kind: DaemonSet
apiVersion: apps/v1
metadata:
name: csi-secrets-store-windows
namespace: kube-system
spec:
selector:
matchLabels:
app: csi-secrets-store
template:
metadata:
labels:
app: csi-secrets-store
annotations:
kubectl.kubernetes.io/default-container: secrets-store
spec:
serviceAccountName: secrets-store-csi-driver
containers:
- name: node-driver-registrar
image: k8s.gcr.io/sig-storage/csi-node-driver-registrar:v2.4.0
args:
- --v=5
- "--csi-address=unix://C:\\csi\\csi.sock"
- "--kubelet-registration-path=C:\\var\\lib\\kubelet\\plugins\\csi-secrets-store\\csi.sock"
livenessProbe:
exec:
command:
- /csi-node-driver-registrar.exe
- --kubelet-registration-path=C:\var\lib\kubelet\plugins\csi-secrets-store\csi.sock
- --mode=kubelet-registration-probe
initialDelaySeconds: 30
timeoutSeconds: 15
env:
- name: KUBE_NODE_NAME
valueFrom:
fieldRef:
apiVersion: v1
fieldPath: spec.nodeName
imagePullPolicy: IfNotPresent
volumeMounts:
- name: plugin-dir
mountPath: C:\csi
- name: registration-dir
mountPath: C:\registration
resources:
limits:
cpu: 200m
memory: 200Mi
requests:
cpu: 100m
memory: 100Mi
- name: secrets-store
image: k8s.gcr.io/csi-secrets-store/driver:v1.0.0
args:
- "--endpoint=$(CSI_ENDPOINT)"
- "--nodeid=$(KUBE_NODE_NAME)"
- "--provider-volume=C:\\k\\secrets-store-csi-providers"
- "--metrics-addr=:8095"
- "--enable-secret-rotation=false"
- "--rotation-poll-interval=2m"
- "--provider-health-check=false"
- "--provider-health-check-interval=2m"
env:
- name: CSI_ENDPOINT
value: unix://C:\\csi\\csi.sock
- name: KUBE_NODE_NAME
valueFrom:
fieldRef:
apiVersion: v1
fieldPath: spec.nodeName
imagePullPolicy: IfNotPresent
ports:
- containerPort: 9808
name: healthz
protocol: TCP
- containerPort: 8095
name: metrics
protocol: TCP
livenessProbe:
failureThreshold: 5
httpGet:
path: /healthz
port: healthz
initialDelaySeconds: 30
timeoutSeconds: 10
periodSeconds: 15
resources:
limits:
cpu: 400m
memory: 400Mi
requests:
cpu: 100m
memory: 100Mi
volumeMounts:
- name: plugin-dir
mountPath: C:\csi
- name: mountpoint-dir
mountPath: "C:\\var\\lib\\kubelet\\pods"
- name: providers-dir
mountPath: C:\k\secrets-store-csi-providers
- name: liveness-probe
image: k8s.gcr.io/sig-storage/livenessprobe:v2.5.0
imagePullPolicy: IfNotPresent
args:
- "--csi-address=unix://C:\\csi\\csi.sock"
- --probe-timeout=3s
- --http-endpoint=0.0.0.0:9808
- -v=2
volumeMounts:
- name: plugin-dir
mountPath: C:\csi
resources:
limits:
cpu: 200m
memory: 200Mi
requests:
cpu: 100m
memory: 100Mi
volumes:
- name: mountpoint-dir
hostPath:
path: C:\var\lib\kubelet\pods\
type: DirectoryOrCreate
- name: registration-dir
hostPath:
path: C:\var\lib\kubelet\plugins_registry\
type: Directory
- name: plugin-dir
hostPath:
path: C:\var\lib\kubelet\plugins\csi-secrets-store\
type: DirectoryOrCreate
- name: providers-dir
hostPath:
path: C:\k\secrets-store-csi-providers\
type: DirectoryOrCreate
nodeSelector:
kubernetes.io/os: windows
| 31.956522 | 103 | 0.502721 |
f7513f1901bcadd120e10ad0d29258f914d4eec0 | 391 | yaml | YAML | config/rbac/rolemapping_editor_role.yaml | codemug/argocd-rbac-controller | 2472f49d540a3828ccd5d17c6f9fe893297313b3 | [
"Apache-2.0"
] | 2 | 2021-01-16T17:39:49.000Z | 2021-11-02T03:13:06.000Z | config/rbac/rolemapping_editor_role.yaml | codemug/argocd-rbac-controller | 2472f49d540a3828ccd5d17c6f9fe893297313b3 | [
"Apache-2.0"
] | null | null | null | config/rbac/rolemapping_editor_role.yaml | codemug/argocd-rbac-controller | 2472f49d540a3828ccd5d17c6f9fe893297313b3 | [
"Apache-2.0"
] | null | null | null | # permissions for end users to edit rolemappings.
apiVersion: rbac.authorization.k8s.io/v1
kind: ClusterRole
metadata:
name: rolemapping-editor-role
rules:
- apiGroups:
- argocd.codemug.io
resources:
- rolemappings
verbs:
- create
- delete
- get
- list
- patch
- update
- watch
- apiGroups:
- argocd.codemug.io
resources:
- rolemappings/status
verbs:
- get
| 15.64 | 49 | 0.693095 |
f7515cdb5a3adbddc570dffb75f37127ac8af6db | 755 | yaml | YAML | pkg/helmt/testdata/prometheus-operator/charts/grafana/templates/tests/test-podsecuritypolicy.yaml | AlexRogalskiy/helmt | a6658ebc9ab132da2b06b90af223dfbbdfa6d9fb | [
"Apache-2.0"
] | 10 | 2020-06-30T12:53:32.000Z | 2021-12-11T17:39:38.000Z | pkg/helmt/testdata/prometheus-operator/charts/grafana/templates/tests/test-podsecuritypolicy.yaml | syncier/helmt | a6658ebc9ab132da2b06b90af223dfbbdfa6d9fb | [
"Apache-2.0"
] | 18 | 2020-06-30T08:40:19.000Z | 2022-03-14T00:40:55.000Z | pkg/helmt/testdata/prometheus-operator/charts/grafana/templates/tests/test-podsecuritypolicy.yaml | AlexRogalskiy/helmt | a6658ebc9ab132da2b06b90af223dfbbdfa6d9fb | [
"Apache-2.0"
] | 2 | 2022-01-06T00:57:54.000Z | 2022-01-10T08:55:27.000Z | ---
# Source: prometheus-operator/charts/grafana/templates/tests/test-podsecuritypolicy.yaml
apiVersion: policy/v1beta1
kind: PodSecurityPolicy
metadata:
name: agent-prometheus-grafana-test
namespace: infra-monitoring
labels:
helm.sh/chart: grafana-5.0.12
app.kubernetes.io/name: grafana
app.kubernetes.io/instance: agent-prometheus
app.kubernetes.io/version: "6.7.1"
app.kubernetes.io/managed-by: Helm
spec:
allowPrivilegeEscalation: true
privileged: false
hostNetwork: false
hostIPC: false
hostPID: false
fsGroup:
rule: RunAsAny
seLinux:
rule: RunAsAny
supplementalGroups:
rule: RunAsAny
runAsUser:
rule: RunAsAny
volumes:
- configMap
- downwardAPI
- emptyDir
- projected
- secret
| 22.205882 | 88 | 0.73245 |
f75192f61f68f2b5dda7ec617604b3251b90587a | 771 | yaml | YAML | config/100-namespace.yaml | toVersus/sample-bindings | c92f74675cd1e4053aea2b93b184589850c49a2c | [
"Apache-2.0"
] | null | null | null | config/100-namespace.yaml | toVersus/sample-bindings | c92f74675cd1e4053aea2b93b184589850c49a2c | [
"Apache-2.0"
] | null | null | null | config/100-namespace.yaml | toVersus/sample-bindings | c92f74675cd1e4053aea2b93b184589850c49a2c | [
"Apache-2.0"
] | null | null | null | # Copyright 2019 The Knative Authors
#
# Licensed under the Apache License, Version 2.0 (the "License");
# you may not use this file except in compliance with the License.
# You may obtain a copy of the License at
#
# https://www.apache.org/licenses/LICENSE-2.0
#
# Unless required by applicable law or agreed to in writing, software
# distributed under the License is distributed on an "AS IS" BASIS,
# WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
# See the License for the specific language governing permissions and
# limitations under the License.
apiVersion: v1
kind: Namespace
metadata:
name: binding-system
labels:
istio-injection: enabled
bindings.toversus.dev/release: devel
bindings.mattmoor.dev/exclude: "true"
| 33.521739 | 74 | 0.758755 |
f75283f85a2fd581d90d6a0f2fda0b50ebceca2f | 844 | yml | YAML | k8s/freeradius-config.yml | sathishms77/test | bf8df6fc16c41720c7d99ed1ff17a64b543e9672 | [
"Apache-2.0"
] | 72 | 2017-01-18T02:36:34.000Z | 2022-02-12T15:28:30.000Z | k8s/freeradius-config.yml | sathishms77/test | bf8df6fc16c41720c7d99ed1ff17a64b543e9672 | [
"Apache-2.0"
] | 11 | 2017-03-03T17:56:09.000Z | 2022-02-11T03:38:03.000Z | k8s/freeradius-config.yml | sathishms77/test | bf8df6fc16c41720c7d99ed1ff17a64b543e9672 | [
"Apache-2.0"
] | 120 | 2017-02-02T23:26:11.000Z | 2022-03-13T05:30:23.000Z | # Copyright 2017-present Open Networking Foundation
#
# Licensed under the Apache License, Version 2.0 (the "License");
# you may not use this file except in compliance with the License.
# You may obtain a copy of the License at
#
# http://www.apache.org/licenses/LICENSE-2.0
#
# Unless required by applicable law or agreed to in writing, software
# distributed under the License is distributed on an "AS IS" BASIS,
# WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
# See the License for the specific language governing permissions and
# limitations under the License.
apiVersion: v1
data:
clients.conf: |
client 192.168.64.0/18 {
secret = SECRET
}
users: |
user Cleartext-Password := "password", MS-CHAP-Use-NTLM-Auth := 0
kind: ConfigMap
metadata:
name: freeradius-config
namespace: voltha
| 31.259259 | 74 | 0.739336 |
f7529aa726c968935a09a7cdc74027e681afcadd | 259 | yml | YAML | manifests/service-7f1d.yml | ashwinsangem/acr-build-helloworld-node | 4f4a48179ee36b369156b81d8c2d04ee5eb135e0 | [
"MIT"
] | null | null | null | manifests/service-7f1d.yml | ashwinsangem/acr-build-helloworld-node | 4f4a48179ee36b369156b81d8c2d04ee5eb135e0 | [
"MIT"
] | null | null | null | manifests/service-7f1d.yml | ashwinsangem/acr-build-helloworld-node | 4f4a48179ee36b369156b81d8c2d04ee5eb135e0 | [
"MIT"
] | 5 | 2020-06-19T08:35:16.000Z | 2020-06-21T16:10:23.000Z | apiVersion: v1
kind: Service
metadata:
name: "divman-7f1d"
labels:
app: "divman-7f1d"
spec:
type: LoadBalancer
ports:
- port: 8080
targetPort: 8080
protocol: TCP
name: http
selector:
app: "divman-7f1d" | 17.266667 | 26 | 0.583012 |
f752c61434193c9a60737c33ce1b11ebce4a6e62 | 265 | yaml | YAML | redis-sentinel/redis-slave-service.yaml | luohuazju/sillycat-k8s | 923c7be11a716252aad5a5c29511b7b00e5dced2 | [
"MIT"
] | null | null | null | redis-sentinel/redis-slave-service.yaml | luohuazju/sillycat-k8s | 923c7be11a716252aad5a5c29511b7b00e5dced2 | [
"MIT"
] | null | null | null | redis-sentinel/redis-slave-service.yaml | luohuazju/sillycat-k8s | 923c7be11a716252aad5a5c29511b7b00e5dced2 | [
"MIT"
] | null | null | null | kind: Service
apiVersion: v1
metadata:
labels:
app: redis-sentinel-slave-ss
name: redis-sentinel-slave-ss
namespace: default
spec:
clusterIP: None
ports:
- name: redis
port: 6379
targetPort: 6379
selector:
app: redis-sentinel-slave-ss
| 16.5625 | 32 | 0.69434 |
f752f6be72474214346eae05f6450f96a2ffbfb9 | 1,388 | yml | YAML | bookstore-kubernetes-manifests/gateway-configmap.yml | zackzhangkai/microservice_arch_kubernetes | 4344c542642c54b7293bf2067b6c4c2b44ad2803 | [
"Apache-2.0"
] | 97 | 2020-05-25T15:08:16.000Z | 2022-03-22T02:08:13.000Z | bookstore-kubernetes-manifests/gateway-configmap.yml | zackzhangkai/microservice_arch_kubernetes | 4344c542642c54b7293bf2067b6c4c2b44ad2803 | [
"Apache-2.0"
] | 3 | 2021-06-01T07:38:59.000Z | 2021-07-28T05:38:03.000Z | bookstore-kubernetes-manifests/gateway-configmap.yml | zackzhangkai/microservice_arch_kubernetes | 4344c542642c54b7293bf2067b6c4c2b44ad2803 | [
"Apache-2.0"
] | 52 | 2021-02-24T02:41:34.000Z | 2022-03-14T11:37:14.000Z | kind: ConfigMap
apiVersion: v1
metadata:
name: gateway
namespace: bookstore-microservices
data:
application.yaml: |-
hystrix:
command:
default:
execution:
isolation:
thread:
timeoutInMilliseconds: 20000
zuul:
ignoredServices: '*'
host:
connect-timeout-millis: 20000
socket-timeout-millis: 20000
routes:
account:
path: /restful/accounts/**
url: http://account
stripPrefix: false
sensitiveHeaders: "*"
payment:
path: /restful/pay/**
url: http://payment
stripPrefix: false
sensitiveHeaders: "*"
settlement:
path: /restful/settlements/**
url: http://payment
stripPrefix: false
sensitiveHeaders: "*"
advertisements:
path: /restful/advertisements/**
url: http://warehouse
stripPrefix: false
sensitiveHeaders: "*"
products:
path: /restful/products/**
url: http://warehouse
stripPrefix: false
sensitiveHeaders: "*"
security:
path: /oauth/**
url: http://security
stripPrefix: false
sensitiveHeaders: "*"
server:
port: ${PORT:8080}
logging:
level:
root: INFO
| 21.353846 | 44 | 0.521614 |
f753160aa1017948058626538edd158fd24cd45a | 194 | yml | YAML | modules/03-production/02-labels-and-namespaces/solution/wordpress-service.yml | shay-berman/k8s-training | e0c3330ff359cd4434ebc6fe7018cd21ebf45987 | [
"WTFPL"
] | 3 | 2017-11-28T23:07:16.000Z | 2018-10-23T14:40:39.000Z | modules/03-production/02-labels-and-namespaces/solution/wordpress-service.yml | pashok2398/k8s-training | ea0b7099970868ec83acc46c8950209b216ffd5d | [
"WTFPL"
] | null | null | null | modules/03-production/02-labels-and-namespaces/solution/wordpress-service.yml | pashok2398/k8s-training | ea0b7099970868ec83acc46c8950209b216ffd5d | [
"WTFPL"
] | 4 | 2018-02-01T08:24:34.000Z | 2020-07-13T11:29:25.000Z | ---
kind: Service
apiVersion: v1
metadata:
name: wp-http
namespace: frontend
spec:
type: NodePort
selector:
app: wp
ports:
- protocol: TCP
port: 80
targetPort: 80
| 12.125 | 21 | 0.623711 |
f75334b9266ebd544846df45038f95c25f079db7 | 297 | yaml | YAML | tests/tests/legacy_kustomizations/knative-eventing-install/test_data/expected/~g_v1_serviceaccount_eventing-webhook.yaml | zawadimario/deployment-rflow | c3a51a4ec931bd3be0dc9b7fcf2ecb99aefe6df2 | [
"Apache-2.0"
] | 376 | 2019-02-27T01:32:34.000Z | 2022-03-29T14:02:39.000Z | tests/tests/legacy_kustomizations/knative-eventing-install/test_data/expected/~g_v1_serviceaccount_eventing-webhook.yaml | zawadimario/deployment-rflow | c3a51a4ec931bd3be0dc9b7fcf2ecb99aefe6df2 | [
"Apache-2.0"
] | 2,171 | 2019-02-27T17:37:34.000Z | 2022-03-31T18:16:26.000Z | tests/tests/legacy_kustomizations/knative-eventing-install/test_data/expected/~g_v1_serviceaccount_eventing-webhook.yaml | zawadimario/deployment-rflow | c3a51a4ec931bd3be0dc9b7fcf2ecb99aefe6df2 | [
"Apache-2.0"
] | 643 | 2019-02-27T01:49:11.000Z | 2022-03-31T06:31:15.000Z | apiVersion: v1
kind: ServiceAccount
metadata:
labels:
app.kubernetes.io/component: knative-eventing-install
app.kubernetes.io/name: knative-eventing-install
eventing.knative.dev/release: v0.14.2
kustomize.component: knative
name: eventing-webhook
namespace: knative-eventing
| 27 | 57 | 0.771044 |
f7533d47223e8793ed8737485bb5000fe9df4fdf | 1,565 | yaml | YAML | install_openmcp/master.back/openmcp-analytic-engine/operator.yaml | openmcp/Public_OpenMCP-Release | 95da3aeb0a184a70ed682a9851b2dbd945173837 | [
"Unlicense"
] | null | null | null | install_openmcp/master.back/openmcp-analytic-engine/operator.yaml | openmcp/Public_OpenMCP-Release | 95da3aeb0a184a70ed682a9851b2dbd945173837 | [
"Unlicense"
] | null | null | null | install_openmcp/master.back/openmcp-analytic-engine/operator.yaml | openmcp/Public_OpenMCP-Release | 95da3aeb0a184a70ed682a9851b2dbd945173837 | [
"Unlicense"
] | null | null | null | apiVersion: apps/v1
kind: Deployment
metadata:
name: openmcp-analytic-engine
namespace: openmcp
spec:
replicas: 1
selector:
matchLabels:
name: openmcp-analytic-engine
template:
metadata:
labels:
name: openmcp-analytic-engine
spec:
serviceAccountName: openmcp-analytic-engine
imagePullSecrets:
- name: REPLACE_DOCKERSECRETNAME
containers:
- name: openmcp-analytic-engine
# Replace this with the built image name
image: REPLACE_DOCKER_REPO_NAME/openmcp-analytic-engine:v0.0.1
command:
- openmcp-analytic-engine
imagePullPolicy: REPLACE_DOCKERIMAGEPULLPOLICY
env:
- name: WATCH_NAMESPACE
value: ""
#valueFrom:
# fieldRef:
# fieldPath: metadata.namespace
- name: POD_NAME
valueFrom:
fieldRef:
fieldPath: metadata.name
- name: INFLUX_IP
value: REPLACE_INFLUXDBIP
- name: INFLUX_PORT
value: REPLACE_INFLUXDBPORT
- name: INFLUX_USERNAME
value: "root"
- name: INFLUX_PASSWORD
value: "root"
- name: OPERATOR_NAME
value: "openmcp-analytic-engine"
tolerations:
- key: node.kubernetes.io/not-ready
effect: NoExecute
tolerationSeconds: 0
- key: node.kubernetes.io/unreachable
effect: NoExecute
tolerationSeconds: 0
| 27.946429 | 72 | 0.569968 |
f7534c066816fb1a7161ffb6769ad6d1b6768eb6 | 15,146 | yaml | YAML | vendor/github.com/openshift/api/config/v1/0000_10_config-operator_01_apiserver.crd.yaml | akhil-rane/image-registry | f4b30a3f0754e0b2f0da9cfa3a5c130230d36897 | [
"Apache-2.0"
] | null | null | null | vendor/github.com/openshift/api/config/v1/0000_10_config-operator_01_apiserver.crd.yaml | akhil-rane/image-registry | f4b30a3f0754e0b2f0da9cfa3a5c130230d36897 | [
"Apache-2.0"
] | null | null | null | vendor/github.com/openshift/api/config/v1/0000_10_config-operator_01_apiserver.crd.yaml | akhil-rane/image-registry | f4b30a3f0754e0b2f0da9cfa3a5c130230d36897 | [
"Apache-2.0"
] | null | null | null | apiVersion: apiextensions.k8s.io/v1
kind: CustomResourceDefinition
metadata:
annotations:
api-approved.openshift.io: https://github.com/openshift/api/pull/470
include.release.openshift.io/ibm-cloud-managed: "true"
include.release.openshift.io/self-managed-high-availability: "true"
include.release.openshift.io/single-node-developer: "true"
name: apiservers.config.openshift.io
spec:
group: config.openshift.io
names:
kind: APIServer
listKind: APIServerList
plural: apiservers
singular: apiserver
scope: Cluster
versions:
- name: v1
schema:
openAPIV3Schema:
description: APIServer holds configuration (like serving certificates, client
CA and CORS domains) shared by all API servers in the system, among them
especially kube-apiserver and openshift-apiserver. The canonical name of
an instance is 'cluster'.
type: object
required:
- spec
properties:
apiVersion:
description: 'APIVersion defines the versioned schema of this representation
of an object. Servers should convert recognized schemas to the latest
internal value, and may reject unrecognized values. More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#resources'
type: string
kind:
description: 'Kind is a string value representing the REST resource this
object represents. Servers may infer this from the endpoint the client
submits requests to. Cannot be updated. In CamelCase. More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#types-kinds'
type: string
metadata:
type: object
spec:
description: spec holds user settable values for configuration
type: object
properties:
additionalCORSAllowedOrigins:
description: additionalCORSAllowedOrigins lists additional, user-defined
regular expressions describing hosts for which the API server allows
access using the CORS headers. This may be needed to access the
API and the integrated OAuth server from JavaScript applications.
The values are regular expressions that correspond to the Golang
regular expression language.
type: array
items:
type: string
audit:
description: audit specifies the settings for audit configuration
to be applied to all OpenShift-provided API servers in the cluster.
type: object
default:
profile: Default
properties:
profile:
description: "profile specifies the name of the desired audit
policy configuration to be deployed to all OpenShift-provided
API servers in the cluster. \n The following profiles are provided:
- Default: the existing default policy. - WriteRequestBodies:
like 'Default', but logs request and response HTTP payloads
for write requests (create, update, patch). - AllRequestBodies:
like 'WriteRequestBodies', but also logs request and response
HTTP payloads for read requests (get, list). \n If unset, the
'Default' profile is used as the default."
type: string
default: Default
enum:
- Default
- WriteRequestBodies
- AllRequestBodies
clientCA:
description: 'clientCA references a ConfigMap containing a certificate
bundle for the signers that will be recognized for incoming client
certificates in addition to the operator managed signers. If this
is empty, then only operator managed signers are valid. You usually
only have to set this if you have your own PKI you wish to honor
client certificates from. The ConfigMap must exist in the openshift-config
namespace and contain the following required fields: - ConfigMap.Data["ca-bundle.crt"]
- CA bundle.'
type: object
required:
- name
properties:
name:
description: name is the metadata.name of the referenced config
map
type: string
encryption:
description: encryption allows the configuration of encryption of
resources at the datastore layer.
type: object
properties:
type:
description: "type defines what encryption type should be used
to encrypt resources at the datastore layer. When this field
is unset (i.e. when it is set to the empty string), identity
is implied. The behavior of unset can and will change over time.
\ Even if encryption is enabled by default, the meaning of unset
may change to a different encryption type based on changes in
best practices. \n When encryption is enabled, all sensitive
resources shipped with the platform are encrypted. This list
of sensitive resources can and will change over time. The current
authoritative list is: \n 1. secrets 2. configmaps 3.
routes.route.openshift.io 4. oauthaccesstokens.oauth.openshift.io
\ 5. oauthauthorizetokens.oauth.openshift.io"
type: string
enum:
- ""
- identity
- aescbc
servingCerts:
description: servingCert is the TLS cert info for serving secure traffic.
If not specified, operator managed certificates will be used for
serving secure traffic.
type: object
properties:
namedCertificates:
description: namedCertificates references secrets containing the
TLS cert info for serving secure traffic to specific hostnames.
If no named certificates are provided, or no named certificates
match the server name as understood by a client, the defaultServingCertificate
will be used.
type: array
items:
description: APIServerNamedServingCert maps a server DNS name,
as understood by a client, to a certificate.
type: object
properties:
names:
description: names is a optional list of explicit DNS names
(leading wildcards allowed) that should use this certificate
to serve secure traffic. If no names are provided, the
implicit names will be extracted from the certificates.
Exact names trump over wildcard names. Explicit names
defined here trump over extracted implicit names.
type: array
items:
type: string
servingCertificate:
description: 'servingCertificate references a kubernetes.io/tls
type secret containing the TLS cert info for serving secure
traffic. The secret must exist in the openshift-config
namespace and contain the following required fields: -
Secret.Data["tls.key"] - TLS private key. - Secret.Data["tls.crt"]
- TLS certificate.'
type: object
required:
- name
properties:
name:
description: name is the metadata.name of the referenced
secret
type: string
tlsSecurityProfile:
description: "tlsSecurityProfile specifies settings for TLS connections
for externally exposed servers. \n If unset, a default (which may
change between releases) is chosen. Note that only Old and Intermediate
profiles are currently supported, and the maximum available MinTLSVersions
is VersionTLS12."
type: object
properties:
custom:
description: "custom is a user-defined TLS security profile. Be
extremely careful using a custom profile as invalid configurations
can be catastrophic. An example custom profile looks like this:
\n ciphers: - ECDHE-ECDSA-CHACHA20-POLY1305 - ECDHE-RSA-CHACHA20-POLY1305
\ - ECDHE-RSA-AES128-GCM-SHA256 - ECDHE-ECDSA-AES128-GCM-SHA256
\ minTLSVersion: TLSv1.1"
type: object
properties:
ciphers:
description: "ciphers is used to specify the cipher algorithms
that are negotiated during the TLS handshake. Operators
may remove entries their operands do not support. For example,
to use DES-CBC3-SHA (yaml): \n ciphers: - DES-CBC3-SHA"
type: array
items:
type: string
minTLSVersion:
description: "minTLSVersion is used to specify the minimal
version of the TLS protocol that is negotiated during the
TLS handshake. For example, to use TLS versions 1.1, 1.2
and 1.3 (yaml): \n minTLSVersion: TLSv1.1 \n NOTE: currently
the highest minTLSVersion allowed is VersionTLS12"
type: string
enum:
- VersionTLS10
- VersionTLS11
- VersionTLS12
- VersionTLS13
nullable: true
intermediate:
description: "intermediate is a TLS security profile based on:
\n https://wiki.mozilla.org/Security/Server_Side_TLS#Intermediate_compatibility_.28recommended.29
\n and looks like this (yaml): \n ciphers: - TLS_AES_128_GCM_SHA256
\ - TLS_AES_256_GCM_SHA384 - TLS_CHACHA20_POLY1305_SHA256
\ - ECDHE-ECDSA-AES128-GCM-SHA256 - ECDHE-RSA-AES128-GCM-SHA256
\ - ECDHE-ECDSA-AES256-GCM-SHA384 - ECDHE-RSA-AES256-GCM-SHA384
\ - ECDHE-ECDSA-CHACHA20-POLY1305 - ECDHE-RSA-CHACHA20-POLY1305
\ - DHE-RSA-AES128-GCM-SHA256 - DHE-RSA-AES256-GCM-SHA384
\ minTLSVersion: TLSv1.2"
type: object
nullable: true
modern:
description: "modern is a TLS security profile based on: \n https://wiki.mozilla.org/Security/Server_Side_TLS#Modern_compatibility
\n and looks like this (yaml): \n ciphers: - TLS_AES_128_GCM_SHA256
\ - TLS_AES_256_GCM_SHA384 - TLS_CHACHA20_POLY1305_SHA256
\ minTLSVersion: TLSv1.3 \n NOTE: Currently unsupported."
type: object
nullable: true
old:
description: "old is a TLS security profile based on: \n https://wiki.mozilla.org/Security/Server_Side_TLS#Old_backward_compatibility
\n and looks like this (yaml): \n ciphers: - TLS_AES_128_GCM_SHA256
\ - TLS_AES_256_GCM_SHA384 - TLS_CHACHA20_POLY1305_SHA256
\ - ECDHE-ECDSA-AES128-GCM-SHA256 - ECDHE-RSA-AES128-GCM-SHA256
\ - ECDHE-ECDSA-AES256-GCM-SHA384 - ECDHE-RSA-AES256-GCM-SHA384
\ - ECDHE-ECDSA-CHACHA20-POLY1305 - ECDHE-RSA-CHACHA20-POLY1305
\ - DHE-RSA-AES128-GCM-SHA256 - DHE-RSA-AES256-GCM-SHA384
\ - DHE-RSA-CHACHA20-POLY1305 - ECDHE-ECDSA-AES128-SHA256
\ - ECDHE-RSA-AES128-SHA256 - ECDHE-ECDSA-AES128-SHA
\ - ECDHE-RSA-AES128-SHA - ECDHE-ECDSA-AES256-SHA384
\ - ECDHE-RSA-AES256-SHA384 - ECDHE-ECDSA-AES256-SHA
\ - ECDHE-RSA-AES256-SHA - DHE-RSA-AES128-SHA256 -
DHE-RSA-AES256-SHA256 - AES128-GCM-SHA256 - AES256-GCM-SHA384
\ - AES128-SHA256 - AES256-SHA256 - AES128-SHA -
AES256-SHA - DES-CBC3-SHA minTLSVersion: TLSv1.0"
type: object
nullable: true
type:
description: "type is one of Old, Intermediate, Modern or Custom.
Custom provides the ability to specify individual TLS security
profile parameters. Old, Intermediate and Modern are TLS security
profiles based on: \n https://wiki.mozilla.org/Security/Server_Side_TLS#Recommended_configurations
\n The profiles are intent based, so they may change over time
as new ciphers are developed and existing ciphers are found
to be insecure. Depending on precisely which ciphers are available
to a process, the list may be reduced. \n Note that the Modern
profile is currently not supported because it is not yet well
adopted by common software libraries."
type: string
enum:
- Old
- Intermediate
- Modern
- Custom
status:
description: status holds observed values from the cluster. They may not
be overridden.
type: object
served: true
storage: true
subresources:
status: {}
| 57.80916 | 175 | 0.53968 |
f7534f5074d32aa88df6b28a3a65b8c994118e33 | 14,486 | yaml | YAML | examples/secure/ozone-dashboard-configmap.yaml | flokkr/docker-ozone | 51358e9981f1eccbea7a0ab74675db1bd8d4e080 | [
"Apache-2.0"
] | 1 | 2020-08-29T21:12:43.000Z | 2020-08-29T21:12:43.000Z | examples/secure/ozone-dashboard-configmap.yaml | flokkr/docker-ozone | 51358e9981f1eccbea7a0ab74675db1bd8d4e080 | [
"Apache-2.0"
] | null | null | null | examples/secure/ozone-dashboard-configmap.yaml | flokkr/docker-ozone | 51358e9981f1eccbea7a0ab74675db1bd8d4e080 | [
"Apache-2.0"
] | null | null | null |
apiVersion: v1
kind: ConfigMap
metadata:
name: ozone-dashboard
data:
overview.json: |-
{
"annotations": {
"list": [
{
"builtIn": 1,
"datasource": "-- Grafana --",
"enable": true,
"hide": true,
"iconColor": "rgba(0, 211, 255, 1)",
"name": "Annotations & Alerts",
"type": "dashboard"
}
]
},
"editable": true,
"gnetId": null,
"graphTooltip": 0,
"links": [],
"panels": [
{
"aliasColors": {},
"bars": false,
"dashLength": 10,
"dashes": false,
"datasource": "prometheus",
"fill": 1,
"gridPos": {
"h": 8,
"w": 6,
"x": 0,
"y": 0
},
"id": 12,
"legend": {
"avg": false,
"current": false,
"max": false,
"min": false,
"show": true,
"total": false,
"values": false
},
"lines": true,
"linewidth": 1,
"links": [],
"nullPointMode": "null",
"options": {},
"percentage": false,
"pointradius": 2,
"points": false,
"renderer": "flot",
"seriesOverrides": [],
"spaceLength": 10,
"stack": false,
"steppedLine": false,
"targets": [
{
"expr": "om_metrics_num_key_allocate",
"format": "time_series",
"intervalFactor": 1,
"refId": "A"
}
],
"thresholds": [],
"timeFrom": null,
"timeRegions": [],
"timeShift": null,
"title": "Key allocation #",
"tooltip": {
"shared": true,
"sort": 0,
"value_type": "individual"
},
"type": "graph",
"xaxis": {
"buckets": null,
"mode": "time",
"name": null,
"show": true,
"values": []
},
"yaxes": [
{
"format": "short",
"label": null,
"logBase": 1,
"max": null,
"min": null,
"show": true
},
{
"format": "short",
"label": null,
"logBase": 1,
"max": null,
"min": null,
"show": true
}
],
"yaxis": {
"align": false,
"alignLevel": null
}
},
{
"aliasColors": {},
"bars": false,
"dashLength": 10,
"dashes": false,
"datasource": "prometheus",
"fill": 1,
"gridPos": {
"h": 8,
"w": 12,
"x": 6,
"y": 0
},
"id": 4,
"legend": {
"avg": false,
"current": false,
"max": false,
"min": false,
"show": true,
"total": false,
"values": false
},
"lines": true,
"linewidth": 1,
"links": [],
"nullPointMode": "null",
"options": {},
"percentage": false,
"pointradius": 2,
"points": false,
"renderer": "flot",
"seriesOverrides": [],
"spaceLength": 10,
"stack": false,
"steppedLine": false,
"targets": [
{
"expr": "rate(om_metrics_num_key_allocate[1m])",
"format": "time_series",
"intervalFactor": 1,
"refId": "A"
}
],
"thresholds": [],
"timeFrom": null,
"timeRegions": [],
"timeShift": null,
"title": "Key Allocation rate",
"tooltip": {
"shared": true,
"sort": 0,
"value_type": "individual"
},
"type": "graph",
"xaxis": {
"buckets": null,
"mode": "time",
"name": null,
"show": true,
"values": []
},
"yaxes": [
{
"format": "short",
"label": null,
"logBase": 1,
"max": null,
"min": null,
"show": true
},
{
"format": "short",
"label": null,
"logBase": 1,
"max": null,
"min": null,
"show": true
}
],
"yaxis": {
"align": false,
"alignLevel": null
}
},
{
"aliasColors": {},
"bars": false,
"dashLength": 10,
"dashes": false,
"datasource": "prometheus",
"fill": 1,
"gridPos": {
"h": 8,
"w": 6,
"x": 18,
"y": 0
},
"id": 2,
"legend": {
"avg": false,
"current": false,
"max": false,
"min": false,
"show": true,
"total": false,
"values": false
},
"lines": true,
"linewidth": 1,
"links": [],
"nullPointMode": "null",
"options": {},
"percentage": false,
"pointradius": 2,
"points": false,
"renderer": "flot",
"seriesOverrides": [],
"spaceLength": 10,
"stack": false,
"steppedLine": false,
"targets": [
{
"expr": "rate(om_metrics_num_key_allocate_fails[1m])",
"format": "time_series",
"intervalFactor": 1,
"refId": "A"
}
],
"thresholds": [],
"timeFrom": null,
"timeRegions": [],
"timeShift": null,
"title": "Key Allcation (failure)",
"tooltip": {
"shared": true,
"sort": 0,
"value_type": "individual"
},
"type": "graph",
"xaxis": {
"buckets": null,
"mode": "time",
"name": null,
"show": true,
"values": []
},
"yaxes": [
{
"format": "short",
"label": null,
"logBase": 1,
"max": null,
"min": null,
"show": true
},
{
"format": "short",
"label": null,
"logBase": 1,
"max": null,
"min": null,
"show": true
}
],
"yaxis": {
"align": false,
"alignLevel": null
}
},
{
"aliasColors": {},
"bars": false,
"dashLength": 10,
"dashes": false,
"datasource": "prometheus",
"fill": 1,
"gridPos": {
"h": 5,
"w": 24,
"x": 0,
"y": 8
},
"id": 6,
"legend": {
"avg": false,
"current": false,
"max": false,
"min": false,
"show": true,
"total": false,
"values": false
},
"lines": true,
"linewidth": 1,
"links": [],
"nullPointMode": "null",
"options": {},
"percentage": false,
"pointradius": 2,
"points": false,
"renderer": "flot",
"seriesOverrides": [],
"spaceLength": 10,
"stack": false,
"steppedLine": false,
"targets": [
{
"expr": "scm_node_manager_healthy_nodes",
"format": "time_series",
"intervalFactor": 1,
"legendFormat": "Healthy nodes",
"refId": "A"
},
{
"expr": "scm_node_manager_dead_nodes",
"format": "time_series",
"intervalFactor": 1,
"legendFormat": "Dead nodes",
"refId": "B"
}
],
"thresholds": [],
"timeFrom": null,
"timeRegions": [],
"timeShift": null,
"title": "Ozone datandoes",
"tooltip": {
"shared": true,
"sort": 0,
"value_type": "individual"
},
"type": "graph",
"xaxis": {
"buckets": null,
"mode": "time",
"name": null,
"show": true,
"values": []
},
"yaxes": [
{
"format": "short",
"label": null,
"logBase": 1,
"max": null,
"min": null,
"show": true
},
{
"format": "short",
"label": null,
"logBase": 1,
"max": null,
"min": null,
"show": true
}
],
"yaxis": {
"align": false,
"alignLevel": null
}
},
{
"aliasColors": {},
"bars": false,
"dashLength": 10,
"dashes": false,
"datasource": "prometheus",
"fill": 1,
"gridPos": {
"h": 8,
"w": 12,
"x": 0,
"y": 13
},
"id": 10,
"legend": {
"avg": false,
"current": false,
"max": false,
"min": false,
"show": true,
"total": false,
"values": false
},
"lines": true,
"linewidth": 1,
"links": [],
"nullPointMode": "null",
"options": {},
"percentage": false,
"pointradius": 2,
"points": false,
"renderer": "flot",
"seriesOverrides": [],
"spaceLength": 10,
"stack": false,
"steppedLine": false,
"targets": [
{
"expr": "sum(rate(storage_container_metrics_num_write_chunk[1m]))",
"format": "time_series",
"intervalFactor": 1,
"refId": "A"
}
],
"thresholds": [],
"timeFrom": null,
"timeRegions": [],
"timeShift": null,
"title": "Chunk write / second (cluster wide)",
"tooltip": {
"shared": true,
"sort": 0,
"value_type": "individual"
},
"type": "graph",
"xaxis": {
"buckets": null,
"mode": "time",
"name": null,
"show": true,
"values": []
},
"yaxes": [
{
"format": "short",
"label": null,
"logBase": 1,
"max": null,
"min": null,
"show": true
},
{
"format": "short",
"label": null,
"logBase": 1,
"max": null,
"min": null,
"show": true
}
],
"yaxis": {
"align": false,
"alignLevel": null
}
},
{
"aliasColors": {},
"bars": false,
"dashLength": 10,
"dashes": false,
"datasource": "prometheus",
"fill": 1,
"gridPos": {
"h": 8,
"w": 12,
"x": 12,
"y": 13
},
"id": 8,
"legend": {
"avg": false,
"current": false,
"max": false,
"min": false,
"show": true,
"total": false,
"values": false
},
"lines": true,
"linewidth": 1,
"links": [],
"nullPointMode": "null",
"options": {},
"percentage": false,
"pointradius": 2,
"points": false,
"renderer": "flot",
"seriesOverrides": [],
"spaceLength": 10,
"stack": true,
"steppedLine": false,
"targets": [
{
"expr": "rate(storage_container_metrics_num_write_chunk[1m])",
"format": "time_series",
"intervalFactor": 1,
"refId": "A"
}
],
"thresholds": [],
"timeFrom": null,
"timeRegions": [],
"timeShift": null,
"title": "Write chunk # (per node)",
"tooltip": {
"shared": true,
"sort": 0,
"value_type": "individual"
},
"type": "graph",
"xaxis": {
"buckets": null,
"mode": "time",
"name": null,
"show": true,
"values": []
},
"yaxes": [
{
"format": "short",
"label": null,
"logBase": 1,
"max": null,
"min": null,
"show": true
},
{
"format": "short",
"label": null,
"logBase": 1,
"max": null,
"min": null,
"show": true
}
],
"yaxis": {
"align": false,
"alignLevel": null
}
}
],
"refresh": false,
"schemaVersion": 18,
"style": "dark",
"tags": [],
"templating": {
"list": []
},
"time": {
"from": "now-1h",
"to": "now"
},
"timepicker": {
"refresh_intervals": [
"5s",
"10s",
"30s",
"1m",
"5m",
"15m",
"30m",
"1h",
"2h",
"1d"
],
"time_options": [
"5m",
"15m",
"1h",
"6h",
"12h",
"24h",
"2d",
"7d",
"30d"
]
},
"timezone": "",
"title": "Ozone",
"uid": "2rcVHE7Wz",
"version": 1
}
| 24.678024 | 81 | 0.325625 |
f7535db84bd716ce11f693746d8fc83a0a718518 | 2,509 | yaml | YAML | manifests/0013_deployment_special-resource-controller-manager.yaml | multi-arch/special-resource-operator | 7634e9a1773f0327220363e18cdbd25947da68f3 | [
"Apache-2.0"
] | null | null | null | manifests/0013_deployment_special-resource-controller-manager.yaml | multi-arch/special-resource-operator | 7634e9a1773f0327220363e18cdbd25947da68f3 | [
"Apache-2.0"
] | null | null | null | manifests/0013_deployment_special-resource-controller-manager.yaml | multi-arch/special-resource-operator | 7634e9a1773f0327220363e18cdbd25947da68f3 | [
"Apache-2.0"
] | null | null | null | apiVersion: apps/v1
kind: Deployment
metadata:
labels:
control-plane: controller-manager
name: special-resource-controller-manager
namespace: openshift-special-resource-operator
spec:
replicas: 1
selector:
matchLabels:
control-plane: controller-manager
template:
metadata:
labels:
control-plane: controller-manager
spec:
containers:
- args:
- --secure-listen-address=0.0.0.0:8443
- --upstream=http://127.0.0.1:8080/
- --logtostderr=true
- --v=10
- --tls-cert-file=/etc/secrets/tls.crt
- --tls-private-key-file=/etc/secrets/tls.key
- --tls-cipher-suites=TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256,TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256,TLS_RSA_WITH_AES_128_CBC_SHA256,TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256,TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256
image: registry.redhat.io/openshift4/ose-kube-rbac-proxy
name: kube-rbac-proxy
ports:
- containerPort: 8443
name: https
resources:
limits:
cpu: 500m
memory: 128Mi
requests:
cpu: 250m
memory: 64Mi
securityContext:
readOnlyRootFilesystem: true
volumeMounts:
- mountPath: /etc/secrets
name: special-resource-operator-tls
- args:
- --metrics-addr=127.0.0.1:8080
- --enable-leader-election
command:
- /manager
env:
- name: OPERATOR_NAMESPACE
valueFrom:
fieldRef:
fieldPath: metadata.namespace
- name: RELEASE_VERSION
value: 0.0.1-snapshot
- name: SSL_CERT_DIR
value: /etc/pki/tls/certs
image: quay.io/openshift-psap/special-resource-operator:chart-as-asset
imagePullPolicy: Always
name: manager
resources:
limits:
cpu: 300m
memory: 500Mi
requests:
cpu: 300m
memory: 500Mi
securityContext:
allowPrivilegeEscalation: false
readOnlyRootFilesystem: true
volumeMounts:
- mountPath: /cache
name: cache-volume
securityContext:
runAsGroup: 499
runAsNonRoot: true
runAsUser: 499
terminationGracePeriodSeconds: 10
volumes:
- name: special-resource-operator-tls
secret:
secretName: special-resource-operator-tls
- emptyDir: {}
name: cache-volume
| 29.517647 | 217 | 0.600638 |
f753aace6fea55efd238a24df8909dfe38f595d6 | 1,737 | yaml | YAML | workloads/podinfo-dep.yaml | sk9/flux-get-started | fab8aebda0d3248f9d8cea29f25ac4f8f4958000 | [
"Apache-2.0"
] | null | null | null | workloads/podinfo-dep.yaml | sk9/flux-get-started | fab8aebda0d3248f9d8cea29f25ac4f8f4958000 | [
"Apache-2.0"
] | null | null | null | workloads/podinfo-dep.yaml | sk9/flux-get-started | fab8aebda0d3248f9d8cea29f25ac4f8f4958000 | [
"Apache-2.0"
] | null | null | null | ---
apiVersion: apps/v1
kind: Deployment
metadata:
name: podinfo
namespace: demo
labels:
app: podinfo
annotations:
fluxcd.io/automated: "true"
fluxcd.io/tag.init: regex:^3.10.*
fluxcd.io/tag.podinfod: semver:~3.1
spec:
strategy:
rollingUpdate:
maxUnavailable: 0
type: RollingUpdate
selector:
matchLabels:
app: podinfo
template:
metadata:
annotations:
prometheus.io/scrape: "true"
prometheus.io/port: "9797"
labels:
app: podinfo
spec:
initContainers:
- name: init
image: alpine:3.10
command:
- sleep
- "1"
containers:
- name: podinfod
image: stefanprodan/podinfo:3.1.5
imagePullPolicy: IfNotPresent
ports:
- name: http
containerPort: 9898
protocol: TCP
- name: http-metrics
containerPort: 9797
protocol: TCP
- name: grpc
containerPort: 9999
protocol: TCP
command:
- ./podinfo
- --port=9898
- --port-metrics=9797
- --grpc-port=9999
- --grpc-service-name=podinfo
- --level=info
- --random-delay=false
- --random-error=false
env:
- name: PODINFO_UI_COLOR
value: "#34577c"
- name: PODINFO_UI_MESSAGE
value: "Hello from the pod"
livenessProbe:
httpGet:
path: /healthz
port: 9898
readinessProbe:
httpGet:
path: /readyz
port: 9898
resources:
limits:
cpu: 1000m
memory: 128Mi
requests:
cpu: 10m
memory: 64Mi
| 22.269231 | 41 | 0.520438 |
f753bb417ebff7e0237676b930850c80c8a70a9d | 1,963 | yaml | YAML | kubernetes-manifests/loadgenerator.yaml | fty4/gcp-microservices-demo | 72d390cd7acc20f122a1c47fe2fa4294aa640a90 | [
"Apache-2.0"
] | null | null | null | kubernetes-manifests/loadgenerator.yaml | fty4/gcp-microservices-demo | 72d390cd7acc20f122a1c47fe2fa4294aa640a90 | [
"Apache-2.0"
] | null | null | null | kubernetes-manifests/loadgenerator.yaml | fty4/gcp-microservices-demo | 72d390cd7acc20f122a1c47fe2fa4294aa640a90 | [
"Apache-2.0"
] | null | null | null | # Copyright 2018 Google LLC
#
# Licensed under the Apache License, Version 2.0 (the "License");
# you may not use this file except in compliance with the License.
# You may obtain a copy of the License at
#
# http://www.apache.org/licenses/LICENSE-2.0
#
# Unless required by applicable law or agreed to in writing, software
# distributed under the License is distributed on an "AS IS" BASIS,
# WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
# See the License for the specific language governing permissions and
# limitations under the License.
apiVersion: apps/v1
kind: Deployment
metadata:
name: loadgenerator
spec:
selector:
matchLabels:
app: loadgenerator
replicas: 1
template:
metadata:
labels:
app: loadgenerator
annotations:
sidecar.istio.io/rewriteAppHTTPProbers: "true"
spec:
serviceAccountName: default
terminationGracePeriodSeconds: 5
restartPolicy: Always
initContainers:
- command:
- /bin/sh
- -exc
- |
echo "Init container pinging frontend: ${FRONTEND_ADDR}..."
STATUSCODE=$(wget --server-response http://${FRONTEND_ADDR} 2>&1 | awk '/^ HTTP/{print $2}')
if test $STATUSCODE -ne 200; then
echo "Error: Could not reach frontend - Status code: ${STATUSCODE}"
exit 1
fi
name: frontend-check
image: busybox:latest
securityContext:
# user: nobody
runAsUser: 65534
runAsGroup: 65534
env:
- name: FRONTEND_ADDR
value: "frontend:80"
containers:
- name: main
image: loadgenerator
env:
- name: FRONTEND_ADDR
value: "frontend:80"
- name: USERS
value: "10"
resources:
requests:
cpu: 300m
memory: 256Mi
limits:
cpu: 500m
memory: 512Mi
| 28.867647 | 103 | 0.607743 |
f753be78e32995818aa63d45496022b05251cc60 | 1,243 | yaml | YAML | k8s-ingress/f5-cis/as3/hubmode/cm-duplicated-label.yaml | mongocn/mongocn.github.io | 23c84624af4e605871fc244dafcc320f52183164 | [
"Apache-2.0"
] | 3 | 2020-09-07T03:05:05.000Z | 2022-01-01T06:50:34.000Z | k8s-ingress/f5-cis/as3/hubmode/cm-duplicated-label.yaml | mongocn/mongocn.github.io | 23c84624af4e605871fc244dafcc320f52183164 | [
"Apache-2.0"
] | null | null | null | k8s-ingress/f5-cis/as3/hubmode/cm-duplicated-label.yaml | mongocn/mongocn.github.io | 23c84624af4e605871fc244dafcc320f52183164 | [
"Apache-2.0"
] | 2 | 2020-09-04T04:49:39.000Z | 2022-01-01T07:14:53.000Z | kind: ConfigMap
apiVersion: v1
metadata:
name: cm-hub-1
namespace: control-hub-1
labels:
f5type: virtual-server
as3: "true"
hubMode: "true"
data:
template: |
{
"class": "AS3",
"action": "deploy",
"persist": true,
"declaration": {
"class": "ADC",
"schemaVersion": "3.25.0",
"id": "hubtest00",
"hubtest01": {
"class": "Tenant",
"hubtest01": {
"class": "Application",
"template": "generic",
"app_svc_vs": {
"class": "Service_HTTP",
"persistenceMethods": [ "cookie" ],
"virtualAddresses": [
"192.168.200.41"
],
"snat": "self",
"virtualPort": 80,
"pool": "hubtest01_app_svc_pool"
},
"hubtest01_app_svc_pool": {
"class": "Pool",
"monitors": [
"tcp"
],
"loadBalancingMode": "least-connections-member",
"members": [
{
"servicePort": 8080,
"serverAddresses": [ ]
}
]
}
}
}
}
}
| 23.903846 | 62 | 0.401448 |
f753c587905734d418a07fd8fb7311bcc1548fd5 | 2,610 | yaml | YAML | config-root/namespaces/jx/lighthouse/lighthouse-foghorn-deploy.yaml | PaulGiant/jx3-kubernetes | 06713ae53231d53041b55406b81b36dd7ab922c2 | [
"Apache-2.0"
] | null | null | null | config-root/namespaces/jx/lighthouse/lighthouse-foghorn-deploy.yaml | PaulGiant/jx3-kubernetes | 06713ae53231d53041b55406b81b36dd7ab922c2 | [
"Apache-2.0"
] | 2 | 2021-11-30T14:16:33.000Z | 2021-11-30T14:23:41.000Z | config-root/namespaces/jx/lighthouse/lighthouse-foghorn-deploy.yaml | PaulGiant/jx3-kubernetes | 06713ae53231d53041b55406b81b36dd7ab922c2 | [
"Apache-2.0"
] | null | null | null | # Source: lighthouse/templates/foghorn-deployment.yaml
apiVersion: apps/v1
kind: Deployment
metadata:
name: lighthouse-foghorn
labels:
chart: "lighthouse-1.3.1"
app: lighthouse-foghorn
gitops.jenkins-x.io/pipeline: 'namespaces'
annotations:
meta.helm.sh/release-name: 'lighthouse'
wave.pusher.com/update-on-config-change: 'true'
namespace: jx
spec:
replicas: 1
selector:
matchLabels:
app: lighthouse-foghorn
template:
metadata:
labels:
app: lighthouse-foghorn
annotations:
jenkins-x.io/hash: '4680350d90b15cd48f3a8504bff0c968752ad64ad3080e746113158aa5eb44b3'
spec:
serviceAccountName: lighthouse-foghorn
containers:
- name: lighthouse-foghorn
image: ghcr.io/jenkins-x/lighthouse-foghorn:1.3.1
imagePullPolicy: IfNotPresent
args:
- "--namespace=jx"
env:
- name: "GIT_KIND"
value: "github"
- name: "GIT_SERVER"
value: "https://github.com"
- name: "GIT_USER"
value: pa.gigante
- name: "GIT_TOKEN"
valueFrom:
secretKeyRef:
name: lighthouse-oauth-token
key: oauth
- name: "HMAC_TOKEN"
valueFrom:
secretKeyRef:
name: "lighthouse-hmac-token"
key: hmac
optional: false
- name: "JX_LOG_FORMAT"
value: "json"
- name: "LOGRUS_FORMAT"
value: "json"
- name: LOGRUS_SERVICE
value: "lighthouse"
- name: LOGRUS_SERVICE_VERSION
value: "1.3.1"
- name: LOGRUS_STACK_SKIP
value: ""
- name: DEFAULT_PIPELINE_RUN_SERVICE_ACCOUNT
value: "tekton-bot"
- name: DEFAULT_PIPELINE_RUN_TIMEOUT
value: "2h0m0s"
- name: FILE_BROWSER
value: "git"
- name: JX_DEFAULT_IMAGE
value: "ghcr.io/jenkins-x/builder-maven:2.1.149-768"
- name: LIGHTHOUSE_DASHBOARD_TEMPLATE
value: "namespaces/{{ .Namespace }}/pipelineruns/{{ .PipelineRun }}"
- name: LIGHTHOUSE_VERSIONSTREAM_JENKINS_X_JX3_PIPELINE_CATALOG
value: "60d2f020b3003672ecbc8c9abd2f3cf20344fee2"
resources:
limits:
cpu: 100m
memory: 256Mi
requests:
cpu: 80m
memory: 128Mi
terminationGracePeriodSeconds: 180
| 32.222222 | 93 | 0.549808 |
f753e6e64833deb55a21640f42d808b9dd536c8c | 1,511 | yaml | YAML | manifests/deployment.yaml | ericxnhu/azch-captureorder | 799b36ba2f2838a2f39303742ae7c86cb032e910 | [
"MIT"
] | null | null | null | manifests/deployment.yaml | ericxnhu/azch-captureorder | 799b36ba2f2838a2f39303742ae7c86cb032e910 | [
"MIT"
] | null | null | null | manifests/deployment.yaml | ericxnhu/azch-captureorder | 799b36ba2f2838a2f39303742ae7c86cb032e910 | [
"MIT"
] | null | null | null | apiVersion: apps/v1
kind: Deployment
metadata:
name: captureorder
spec:
selector:
matchLabels:
app: captureorder
replicas: 2
template:
metadata:
labels:
app: captureorder
spec:
containers:
- name: captureorder
image: newacrname.azurecr.io/captureorder:placeholdertag # replace with your own repository. Due to a bug, leave the :placeholdertag tag in there to allow the pipeline to replace it
imagePullPolicy: Always
readinessProbe:
httpGet:
port: 8080
path: /healthz
livenessProbe:
httpGet:
port: 8080
path: /healthz
resources:
requests:
memory: "64Mi"
cpu: "100m"
limits:
memory: "128Mi"
cpu: "500m"
env:
- name: TEAMNAME
value: 'team-azch' # will be patched at deployment time by value of 'teamName' in the variable group
- name: MONGOHOST
valueFrom:
secretKeyRef:
name: mongodb
key: mongoHost
- name: MONGOUSER
valueFrom:
secretKeyRef:
name: mongodb
key: mongoUser
- name: MONGOPASSWORD
valueFrom:
secretKeyRef:
name: mongodb
key: mongoPassword
ports:
- containerPort: 80
| 27.981481 | 191 | 0.506287 |
f75439150df467f35af1af1463e8ed6192d8d94e | 144 | yaml | YAML | built-in-references/Kubernetes/perf/violations/violation7722.yaml | sw47/azure-policy | 4a38e4cb4047b5364902653f0defe45f1b21bc61 | [
"MIT"
] | null | null | null | built-in-references/Kubernetes/perf/violations/violation7722.yaml | sw47/azure-policy | 4a38e4cb4047b5364902653f0defe45f1b21bc61 | [
"MIT"
] | null | null | null | built-in-references/Kubernetes/perf/violations/violation7722.yaml | sw47/azure-policy | 4a38e4cb4047b5364902653f0defe45f1b21bc61 | [
"MIT"
] | null | null | null | apiVersion: v1
kind: Pod
metadata:
name: image-demo-7722
spec:
containers:
- name: nginx
image: nginx #ritaacr.azurecr.io/nginx:latest | 18 | 49 | 0.722222 |
f7546faa7ff73abb84c6630b706cbfdd029b07d0 | 423 | yaml | YAML | score/testdata/cronjob-batchv1beta1-restartpolicy-valid.yaml | ryo-yamaoka/kube-score | 6e098da24bca875d760e7b522332118f27e17b69 | [
"MIT"
] | null | null | null | score/testdata/cronjob-batchv1beta1-restartpolicy-valid.yaml | ryo-yamaoka/kube-score | 6e098da24bca875d760e7b522332118f27e17b69 | [
"MIT"
] | 1 | 2022-02-03T15:35:05.000Z | 2022-02-03T15:35:05.000Z | score/testdata/cronjob-batchv1beta1-restartpolicy-valid.yaml | ryo-yamaoka/kube-score | 6e098da24bca875d760e7b522332118f27e17b69 | [
"MIT"
] | null | null | null | apiVersion: batch/v1beta1
kind: CronJob
metadata:
name: hello
spec:
schedule: "* * * * *"
jobTemplate:
spec:
template:
spec:
containers:
- name: hello
image: busybox:1.28
imagePullPolicy: IfNotPresent
command:
- /bin/sh
- -c
- date; echo Hello from the Kubernetes cluster
restartPolicy: OnFailure
| 21.15 | 58 | 0.524823 |
f754879735275eb5c7b84b3aa8dc28fd5b167120 | 97 | yaml | YAML | app-a/ch04/object-management/manifests/configmap.yaml | jzj/cka-study-guide | 7b764e1b9ae67853d7ad6f3c1c725f0744f19bd6 | [
"Apache-2.0"
] | 18 | 2021-08-13T19:23:33.000Z | 2022-03-28T15:09:10.000Z | app-a/ch04/object-management/manifests/configmap.yaml | jzj/cka-study-guide | 7b764e1b9ae67853d7ad6f3c1c725f0744f19bd6 | [
"Apache-2.0"
] | 1 | 2022-03-16T15:18:10.000Z | 2022-03-17T20:03:50.000Z | app-a/ch04/object-management/manifests/configmap.yaml | jzj/cka-study-guide | 7b764e1b9ae67853d7ad6f3c1c725f0744f19bd6 | [
"Apache-2.0"
] | 20 | 2021-07-28T16:11:22.000Z | 2022-03-29T18:09:21.000Z | apiVersion: v1
kind: ConfigMap
metadata:
name: logs-config
data:
dir: "/etc/logs/traffic.log" | 16.166667 | 30 | 0.731959 |
f754a1c2cfd8941ad36d62c202e66c4abb656f77 | 456 | yaml | YAML | deploy/fio.yaml | epowell101/Mayastor | ba1872f5e5a5ed9883a60bef45abf1c1c0d41430 | [
"Apache-2.0"
] | null | null | null | deploy/fio.yaml | epowell101/Mayastor | ba1872f5e5a5ed9883a60bef45abf1c1c0d41430 | [
"Apache-2.0"
] | null | null | null | deploy/fio.yaml | epowell101/Mayastor | ba1872f5e5a5ed9883a60bef45abf1c1c0d41430 | [
"Apache-2.0"
] | null | null | null | kind: Pod
apiVersion: v1
metadata:
name: fio
spec:
volumes:
- name: ms-volume
persistentVolumeClaim:
claimName: ms-volume-claim
containers:
- name: fio
image: nixery.dev/shell/fio/tini
command: [ "tini", "--" ]
args:
- sleep
- "1000000"
volumeMounts:
- mountPath: "/volume"
name: ms-volume
#volumeDevices:
# - devicePath: /dev/xvda
# name: ms-volume | 20.727273 | 38 | 0.550439 |
f754ae23a4c84f7ec4b513d5756d7397be028ce8 | 462 | yaml | YAML | pipeline/deploy/src/main/resources/featurehub/charts/mr-service/templates/configmap.yaml | enixdark/featurehub | da78bae9e7507aa7bf596e2a1f3a062c48c83529 | [
"Apache-2.0"
] | null | null | null | pipeline/deploy/src/main/resources/featurehub/charts/mr-service/templates/configmap.yaml | enixdark/featurehub | da78bae9e7507aa7bf596e2a1f3a062c48c83529 | [
"Apache-2.0"
] | null | null | null | pipeline/deploy/src/main/resources/featurehub/charts/mr-service/templates/configmap.yaml | enixdark/featurehub | da78bae9e7507aa7bf596e2a1f3a062c48c83529 | [
"Apache-2.0"
] | null | null | null | apiVersion: v1
kind: ConfigMap
metadata:
name: mr-service-config
data:
application.properties: |-
app.name=mr
server.port=8080
server.gracePeriodInSeconds=20
db.url=jdbc:h2:mem:tests
db.password=
db.username=sa
db.driver=org.h2.Driver
db.connections=3
register.url=http://localhost:8903/#register-url?token=%s
jersey.cors.headers=X-Requested-With,Authorization,Content-type,Accept-Version,Content-MD5,CSRF-Token,x-ijt
| 27.176471 | 111 | 0.731602 |
f7555f0f35ca767b567472f4f04aba23fdd04e97 | 203 | yaml | YAML | tests/stacks/kubernetes/test_data/expected/~g_v1_serviceaccount_kubeflow-pipelines-cache.yaml | pathologywatch/manifests | 622a1974ef841406b45bd3ae51ba507cbaf4bf89 | [
"Apache-2.0"
] | 376 | 2019-02-27T01:32:34.000Z | 2022-03-29T14:02:39.000Z | tests/stacks/kubernetes/test_data/expected/~g_v1_serviceaccount_kubeflow-pipelines-cache.yaml | pathologywatch/manifests | 622a1974ef841406b45bd3ae51ba507cbaf4bf89 | [
"Apache-2.0"
] | 2,171 | 2019-02-27T17:37:34.000Z | 2022-03-31T18:16:26.000Z | tests/stacks/kubernetes/test_data/expected/~g_v1_serviceaccount_kubeflow-pipelines-cache.yaml | pathologywatch/manifests | 622a1974ef841406b45bd3ae51ba507cbaf4bf89 | [
"Apache-2.0"
] | 643 | 2019-02-27T01:49:11.000Z | 2022-03-31T06:31:15.000Z | apiVersion: v1
kind: ServiceAccount
metadata:
labels:
app.kubernetes.io/component: ml-pipeline
app.kubernetes.io/name: kubeflow-pipelines
name: kubeflow-pipelines-cache
namespace: kubeflow
| 22.555556 | 46 | 0.773399 |
f7559e44a37f85ffff946cb6d4155bb78665041b | 512 | yaml | YAML | k8s_scripts/svc_backend_deleteticket.yaml | mani-sh-reddy/QA-Help-Queue-App | 02ff842d86ca378b5f01c9711819ba7e95b0b035 | [
"MIT"
] | 1 | 2021-04-27T18:28:06.000Z | 2021-04-27T18:28:06.000Z | k8s_scripts/svc_backend_deleteticket.yaml | mani-sh-reddy/QA-Help-Queue-App | 02ff842d86ca378b5f01c9711819ba7e95b0b035 | [
"MIT"
] | null | null | null | k8s_scripts/svc_backend_deleteticket.yaml | mani-sh-reddy/QA-Help-Queue-App | 02ff842d86ca378b5f01c9711819ba7e95b0b035 | [
"MIT"
] | 2 | 2021-05-10T09:30:32.000Z | 2021-05-12T10:32:19.000Z | apiVersion: v1
kind: Pod
metadata:
name: svc-delete-backend
labels:
app: svc-delete-backend
spec:
containers:
- name: deleteticket
image: manishreddy1/hq-backend-deleteticket:latest
ports:
- containerPort: 5004
imagePullSecrets:
- name: ticketkey
apiVersion: v1
kind: Service
metadata:
name: svc-delete-backend
labels:
app : svc-delete-backend
spec:
selector:
app: svc-delete-backend
ports:
- protocol: TCP
port: 5004
targetPort: 5004
type: ClusterIP | 17.655172 | 54 | 0.693359 |
f7563cff3c5b71a921998125ff5f3d4eab474aad | 215 | yaml | YAML | example/service.yaml | footprintmediaits/kube-annotate | 729193748c2494643efc1707d421218cc9c9d9ae | [
"MIT"
] | 9 | 2018-12-13T07:10:58.000Z | 2021-12-28T14:02:17.000Z | example/service.yaml | footprintmediaits/kube-annotate | 729193748c2494643efc1707d421218cc9c9d9ae | [
"MIT"
] | 2 | 2021-01-27T12:20:27.000Z | 2021-04-09T18:52:03.000Z | example/service.yaml | footprintmediaits/kube-annotate | 729193748c2494643efc1707d421218cc9c9d9ae | [
"MIT"
] | 1 | 2021-01-27T09:20:19.000Z | 2021-01-27T09:20:19.000Z | apiVersion: v1
kind: Service
metadata:
labels:
app: kube-annotate
name: kube-annotate
spec:
type: ClusterIP
ports:
- name: https
port: 443
targetPort: https
selector:
app: kube-annotate
| 13.4375 | 22 | 0.669767 |
f75654d135cc8d38851a098165b7eaa1a0caab10 | 1,288 | yaml | YAML | deployment/k8s/crvd.yaml | denist-huma/cos | 5198868b652fd0692a3d0650ac349286dc869fc1 | [
"MIT"
] | 1 | 2019-02-26T18:39:53.000Z | 2019-02-26T18:39:53.000Z | deployment/k8s/crvd.yaml | denist-huma/cos | 5198868b652fd0692a3d0650ac349286dc869fc1 | [
"MIT"
] | 15 | 2019-01-11T01:48:36.000Z | 2019-03-05T19:06:37.000Z | deployment/k8s/crvd.yaml | dmolesUC3/cos | 7904d119d87677095d88158f91d6e47c51929df5 | [
"MIT"
] | 1 | 2021-09-24T13:23:00.000Z | 2021-09-24T13:23:00.000Z | apiVersion: apps/v1
kind: Deployment
metadata:
name: cos
labels:
app.kubernetes.io/component: cos
app.kubernetes.io/instance: cos
app.kubernetes.io/name: cos
app.kubernetes.io/part-of: cos
spec:
selector:
matchLabels:
app.kubernetes.io/component: cos
app.kubernetes.io/instance: cos
app.kubernetes.io/name: cos
template:
metadata:
labels:
app.kubernetes.io/component: cos
app.kubernetes.io/instance: cos
app.kubernetes.io/name: cos
spec:
containers:
- image: nginx:1.20-alpine
name: cos
ports:
- containerPort: 80
protocol: TCP
resources:
limits:
cpu: 100m
memory: 256Mi
requests:
cpu: 100m
memory: 256Mi
readinessProbe:
httpGet:
path: /index.html
port: 80
failureThreshold: 30
periodSeconds: 5
initialDelaySeconds: 10
livenessProbe:
httpGet:
path: /index.html
port: 80
failureThreshold: 30
periodSeconds: 5
initialDelaySeconds: 10
status:
readyReplicas: 1
availableReplicas: 1
| 24.301887 | 40 | 0.541925 |
f7568ca95897de9bbbf19fb46ad9d83ec2c7a0a7 | 116 | yaml | YAML | environments/dba-qa/env/base/service-account.yaml | ibm-cloud-architecture/dba-infra-gitops | 566102920d5dcbaef651f4c7b4c2ab50a1a269f7 | [
"MIT"
] | 1 | 2022-02-09T19:36:01.000Z | 2022-02-09T19:36:01.000Z | environments/cp4ba/env/base/service-account.yaml | ibm-cloud-architecture/dba-infra-gitops | 566102920d5dcbaef651f4c7b4c2ab50a1a269f7 | [
"MIT"
] | null | null | null | environments/cp4ba/env/base/service-account.yaml | ibm-cloud-architecture/dba-infra-gitops | 566102920d5dcbaef651f4c7b4c2ab50a1a269f7 | [
"MIT"
] | 1 | 2022-03-19T07:13:30.000Z | 2022-03-19T07:13:30.000Z | apiVersion: v1
kind: ServiceAccount
metadata:
name: ibm-cp4ba-anyuid
imagePullSecrets:
- name: "admin.registrykey" | 19.333333 | 27 | 0.793103 |
f75743062cd49ca1c58a4b911786df250872176e | 955 | yaml | YAML | config/crds/201-rolebinding.yaml | salaboy/knative-serving-events-controller | 4b790d4dcbdfb2f1e54f8df3bdd372eabdec2c6d | [
"Apache-2.0"
] | null | null | null | config/crds/201-rolebinding.yaml | salaboy/knative-serving-events-controller | 4b790d4dcbdfb2f1e54f8df3bdd372eabdec2c6d | [
"Apache-2.0"
] | null | null | null | config/crds/201-rolebinding.yaml | salaboy/knative-serving-events-controller | 4b790d4dcbdfb2f1e54f8df3bdd372eabdec2c6d | [
"Apache-2.0"
] | null | null | null | # Copyright 2021 The Knative Authors
#
# Licensed under the Apache License, Version 2.0 (the "License");
# you may not use this file except in compliance with the License.
# You may obtain a copy of the License at
#
# https://www.apache.org/licenses/LICENSE-2.0
#
# Unless required by applicable law or agreed to in writing, software
# distributed under the License is distributed on an "AS IS" BASIS,
# WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
# See the License for the specific language governing permissions and
# limitations under the License.
apiVersion: rbac.authorization.k8s.io/v1
kind: RoleBinding
metadata:
name: knative-serving-events-namespace-rbac
namespace: default
labels:
samples.knative.dev/release: devel
subjects:
- kind: ServiceAccount
name: controller
namespace: default
roleRef:
kind: Role
name: knative-serving-events-namespace-rbac
apiGroup: rbac.authorization.k8s.io
| 31.833333 | 74 | 0.764398 |
f7577e17809cf19d985af8d83af228805f4a79e3 | 333 | yaml | YAML | cluster/apps/networking/external-services/unifi/service.yaml | fatheadl/home-ops | 7ec97be98465ff253ea44d19db69f051d7cf6921 | [
"WTFPL"
] | 143 | 2021-12-05T13:06:17.000Z | 2022-03-31T10:58:14.000Z | cluster/apps/networking/external-services/unifi/service.yaml | fatheadl/home-ops | 7ec97be98465ff253ea44d19db69f051d7cf6921 | [
"WTFPL"
] | 489 | 2021-12-04T17:56:16.000Z | 2022-03-31T22:05:16.000Z | cluster/apps/networking/external-services/unifi/service.yaml | fatheadl/home-ops | 7ec97be98465ff253ea44d19db69f051d7cf6921 | [
"WTFPL"
] | 34 | 2021-12-12T15:05:03.000Z | 2022-03-31T17:45:17.000Z | ---
apiVersion: v1
kind: Service
metadata:
name: &app unifi
namespace: networking
labels:
app.kubernetes.io/name: *app
app.kubernetes.io/instance: *app
spec:
type: ExternalName
externalName: unifi.${SECRET_PRIVATE_DOMAIN}.
ports:
- name: http
port: &port 443
protocol: TCP
targetPort: *port
| 18.5 | 47 | 0.66967 |
f7583d68f382131ba02b4225f77fc143aae7e846 | 265 | yaml | YAML | socialNetwork/yamlfiles/user-memcached/templates/service.yaml | SuvigyaJain1/DeathStarBench | 1888b29a45521cd32c99baadafdacffe2a42508d | [
"Apache-2.0"
] | null | null | null | socialNetwork/yamlfiles/user-memcached/templates/service.yaml | SuvigyaJain1/DeathStarBench | 1888b29a45521cd32c99baadafdacffe2a42508d | [
"Apache-2.0"
] | null | null | null | socialNetwork/yamlfiles/user-memcached/templates/service.yaml | SuvigyaJain1/DeathStarBench | 1888b29a45521cd32c99baadafdacffe2a42508d | [
"Apache-2.0"
] | null | null | null | ---
# Source: social-network/charts/user-memcached/templates/service.yaml
apiVersion: v1
kind: Service
metadata:
name: user-memcached
spec:
type: ClusterIP
ports:
- name: "11211"
port: 11211
targetPort: 11211
selector:
service: user-memcached
| 17.666667 | 69 | 0.713208 |
f758550c1705d9965c496beda63cbbad8a438965 | 240 | yaml | YAML | example/restplus-kubernetes/kubernetes/service-nodeport.yaml | dmilan77/kubernetes-guide | ecfff7c10787caa7914dc10274a70dccc874388e | [
"Apache-2.0"
] | null | null | null | example/restplus-kubernetes/kubernetes/service-nodeport.yaml | dmilan77/kubernetes-guide | ecfff7c10787caa7914dc10274a70dccc874388e | [
"Apache-2.0"
] | null | null | null | example/restplus-kubernetes/kubernetes/service-nodeport.yaml | dmilan77/kubernetes-guide | ecfff7c10787caa7914dc10274a70dccc874388e | [
"Apache-2.0"
] | null | null | null | apiVersion: v1
kind: Service
metadata:
name: restplus-kubernetes-service
spec:
selector:
app: restplus-kubernetes
type: NodePort
ports:
- protocol: TCP
port: 80
targetPort: 8080
# nodePort: 30036
protocol: TCP
| 16 | 35 | 0.6875 |
f758f3157235cc7428507ecd29a62b5b94b3b418 | 400 | yaml | YAML | chp13-pod-security-policies/set1335-diff-users-groups/clusterrolebinding-bob.yaml | gbih/learning-k8s-in-action-study-notes | 73fd7d6e0a5296ee7c5843f2cf765bf15e81002d | [
"MIT"
] | 1 | 2021-01-10T13:13:24.000Z | 2021-01-10T13:13:24.000Z | chp13-pod-security-policies/set1335-diff-users-groups/clusterrolebinding-bob.yaml | gbih/learning-k8s-in-action-study-notes | 73fd7d6e0a5296ee7c5843f2cf765bf15e81002d | [
"MIT"
] | null | null | null | chp13-pod-security-policies/set1335-diff-users-groups/clusterrolebinding-bob.yaml | gbih/learning-k8s-in-action-study-notes | 73fd7d6e0a5296ee7c5843f2cf765bf15e81002d | [
"MIT"
] | null | null | null | apiVersion: rbac.authorization.k8s.io/v1
kind: ClusterRoleBinding
metadata:
name: psp-bob
namespace: chp13-set1335
subjects:
- kind: User
name: bob
apiGroup: rbac.authorization.k8s.io
roleRef:
apiGroup: rbac.authorization.k8s.io
kind: ClusterRole
name: psp-privileged # match name of Role or ClusterRole to bind to
# allows bob to operate on resources in the chp13-set1335 namespace
| 22.222222 | 69 | 0.77 |
f75948e820abd1171047a52810195b0a0c0d3659 | 263 | yaml | YAML | addons/prometheus/21_kube_roleBinding.yaml | noris-network/koris | a9c471435a016e2369df43829433d3681e12abc6 | [
"Apache-2.0"
] | 18 | 2019-04-01T12:57:16.000Z | 2021-09-28T18:24:13.000Z | addons/prometheus/21_kube_roleBinding.yaml | noris-network/koris | a9c471435a016e2369df43829433d3681e12abc6 | [
"Apache-2.0"
] | 2 | 2020-03-24T18:17:56.000Z | 2020-03-31T09:47:42.000Z | addons/prometheus/21_kube_roleBinding.yaml | noris-network/koris | a9c471435a016e2369df43829433d3681e12abc6 | [
"Apache-2.0"
] | 2 | 2020-09-11T16:13:59.000Z | 2020-09-15T05:56:35.000Z | apiVersion: rbac.authorization.k8s.io/v1
kind: RoleBinding
metadata:
name: kube-state-metrics
namespace: nn-mon
roleRef:
apiGroup: rbac.authorization.k8s.io
kind: Role
name: kube-state-metrics
subjects:
- kind: ServiceAccount
name: kube-state-metrics
| 20.230769 | 40 | 0.768061 |
f75a34fc60fff1ceb257bd6841d04088fbc53c1e | 324 | yaml | YAML | examples/services/job.yaml | Akiros001/k8s-AppController | c55ce0588dbd96679637ab0c07f3889c6c29be2c | [
"Apache-2.0"
] | 233 | 2016-08-02T13:29:31.000Z | 2022-03-25T13:51:52.000Z | examples/services/job.yaml | Akiros001/k8s-AppController | c55ce0588dbd96679637ab0c07f3889c6c29be2c | [
"Apache-2.0"
] | 233 | 2016-08-05T12:50:44.000Z | 2018-10-17T13:31:42.000Z | examples/services/job.yaml | Akiros001/k8s-AppController | c55ce0588dbd96679637ab0c07f3889c6c29be2c | [
"Apache-2.0"
] | 41 | 2016-08-16T10:11:56.000Z | 2021-11-27T17:54:25.000Z | apiVersion: batch/v1
kind: Job
metadata:
name: test-job
labels:
app: service1
spec:
template:
metadata:
name: test-job
spec:
containers:
- name: test-container
image: gcr.io/google_containers/busybox
command: [ "/bin/sh", "-c", "sleep 10; env"]
restartPolicy: Never
| 19.058824 | 52 | 0.608025 |
f75a9205f94eb137cbabd2166151fc12df607540 | 72 | yaml | YAML | k8s/00-namespace.yaml | sm43/news-demo | 6c9501a405fd90526f26c60a319e6634f4578102 | [
"MIT"
] | null | null | null | k8s/00-namespace.yaml | sm43/news-demo | 6c9501a405fd90526f26c60a319e6634f4578102 | [
"MIT"
] | null | null | null | k8s/00-namespace.yaml | sm43/news-demo | 6c9501a405fd90526f26c60a319e6634f4578102 | [
"MIT"
] | null | null | null | ---
apiVersion: v1
kind: Namespace
metadata:
name: news-demo
spec: {}
| 10.285714 | 17 | 0.680556 |
f75a99b3724622a16ae8d5b09561d577802a0973 | 1,231 | yaml | YAML | config/prow/cluster/sinker_deployment.yaml | zoran15/test-infra | 03b195cd40e858fb606cd186ea86ddc38ef52f0c | [
"Apache-2.0"
] | null | null | null | config/prow/cluster/sinker_deployment.yaml | zoran15/test-infra | 03b195cd40e858fb606cd186ea86ddc38ef52f0c | [
"Apache-2.0"
] | null | null | null | config/prow/cluster/sinker_deployment.yaml | zoran15/test-infra | 03b195cd40e858fb606cd186ea86ddc38ef52f0c | [
"Apache-2.0"
] | null | null | null | apiVersion: apps/v1
kind: Deployment
metadata:
namespace: default
name: sinker
labels:
app: sinker
spec:
replicas: 1
selector:
matchLabels:
app: sinker
template:
metadata:
labels:
app: sinker
spec:
serviceAccountName: sinker
containers:
- name: sinker
args:
- --config-path=/etc/config/config.yaml
- --job-config-path=/etc/job-config
- --dry-run=false
image: gcr.io/k8s-prow/sinker:v20210427-e4ab4d8c8f
env:
# Use KUBECONFIG envvar rather than --kubeconfig flag in order to provide multiple configs to merge.
- name: KUBECONFIG
value: "/etc/kubeconfig/config"
volumeMounts:
- mountPath: /etc/kubeconfig
name: kubeconfig
readOnly: true
- name: config
mountPath: /etc/config
readOnly: true
- name: job-config
mountPath: /etc/job-config
readOnly: true
volumes:
- name: kubeconfig
secret:
defaultMode: 420
secretName: kubeconfig
- name: config
configMap:
name: config
- name: job-config
configMap:
name: job-config
| 24.137255 | 108 | 0.57108 |
f75abca1b01df081bb6ee600fb6e8152b5164bd4 | 242 | yaml | YAML | Modul_6/Cw1_deploy/replicaset_add_pod.yaml | arkedzierski/poznajk8s | d0c7588ca31cbc2c472f789f5ba8a0437e6e5c88 | [
"Unlicense"
] | null | null | null | Modul_6/Cw1_deploy/replicaset_add_pod.yaml | arkedzierski/poznajk8s | d0c7588ca31cbc2c472f789f5ba8a0437e6e5c88 | [
"Unlicense"
] | null | null | null | Modul_6/Cw1_deploy/replicaset_add_pod.yaml | arkedzierski/poznajk8s | d0c7588ca31cbc2c472f789f5ba8a0437e6e5c88 | [
"Unlicense"
] | null | null | null | apiVersion: v1
kind: Pod
metadata:
name: additional-pod
labels:
tier: pkad-rs
spec:
containers:
- name: additional-pkad
image: poznajkubernetes/pkad:blue
resources:
limits:
memory: "128Mi"
cpu: "500m" | 17.285714 | 37 | 0.636364 |
f75ae22f58aacd5c786472848b24b3fdb2e85796 | 468 | yaml | YAML | deploy/kubernetes/helm/sloth/tests/testdata/output/cluster_role_binding_default.yaml | xairos/sloth | 257b964c817275f2d555bb21be754fd45c767395 | [
"Apache-2.0"
] | null | null | null | deploy/kubernetes/helm/sloth/tests/testdata/output/cluster_role_binding_default.yaml | xairos/sloth | 257b964c817275f2d555bb21be754fd45c767395 | [
"Apache-2.0"
] | null | null | null | deploy/kubernetes/helm/sloth/tests/testdata/output/cluster_role_binding_default.yaml | xairos/sloth | 257b964c817275f2d555bb21be754fd45c767395 | [
"Apache-2.0"
] | null | null | null | ---
# Source: sloth/templates/cluster-role-binding.yaml
apiVersion: rbac.authorization.k8s.io/v1
kind: ClusterRoleBinding
metadata:
name: sloth
labels:
helm.sh/chart: sloth-0.4.2
app.kubernetes.io/managed-by: Helm
app: sloth
app.kubernetes.io/name: sloth
app.kubernetes.io/instance: sloth
roleRef:
apiGroup: rbac.authorization.k8s.io
kind: ClusterRole
name: sloth
subjects:
- kind: ServiceAccount
name: sloth
namespace: default
| 22.285714 | 51 | 0.726496 |
f75ae718cedac458c30bde94f300819c1ac60938 | 806 | yaml | YAML | deployment/ubuntu.yaml | mchirico/admission-controller-k8s-go | fd9f331ad540f6dcde65a33c020cdd8cecc3bf0b | [
"Apache-2.0"
] | null | null | null | deployment/ubuntu.yaml | mchirico/admission-controller-k8s-go | fd9f331ad540f6dcde65a33c020cdd8cecc3bf0b | [
"Apache-2.0"
] | 1 | 2020-10-30T15:50:37.000Z | 2020-10-30T15:50:40.000Z | deployment/ubuntu.yaml | mchirico/admission-controller-k8s-go | fd9f331ad540f6dcde65a33c020cdd8cecc3bf0b | [
"Apache-2.0"
] | null | null | null | apiVersion: apps/v1
kind: Deployment
metadata:
name: ubt
namespace: webhook-demo
labels:
app: ubt
spec:
replicas: 1
selector:
matchLabels:
app: ubt
template:
metadata:
labels:
app: ubt
spec:
securityContext:
runAsNonRoot: false
runAsUser: 0
containers:
- name: server
image: ubuntu:latest
command: [ "/bin/bash","-c","--" ]
args: [ "while true; do sleep 30; done;"]
imagePullPolicy: IfNotPresent
ports:
- containerPort: 8443
name: webhook-api
volumeMounts:
- name: webhook-tls-certs
mountPath: /run/secrets/tls
readOnly: true
volumes:
- name: webhook-tls-certs
secret:
secretName: webhook-server-tls
| 21.210526 | 49 | 0.562035 |