hexsha
stringlengths
40
40
size
int64
24
1.05M
ext
stringclasses
2 values
lang
stringclasses
1 value
max_stars_repo_path
stringlengths
5
269
max_stars_repo_name
stringlengths
7
107
max_stars_repo_head_hexsha
stringlengths
40
78
max_stars_repo_licenses
sequence
max_stars_count
int64
1
84.9k
max_stars_repo_stars_event_min_datetime
stringlengths
24
24
max_stars_repo_stars_event_max_datetime
stringlengths
24
24
max_issues_repo_path
stringlengths
5
269
max_issues_repo_name
stringlengths
7
107
max_issues_repo_head_hexsha
stringlengths
40
78
max_issues_repo_licenses
sequence
max_issues_count
int64
1
116k
max_issues_repo_issues_event_min_datetime
stringlengths
24
24
max_issues_repo_issues_event_max_datetime
stringlengths
24
24
max_forks_repo_path
stringlengths
5
269
max_forks_repo_name
stringlengths
7
107
max_forks_repo_head_hexsha
stringlengths
40
78
max_forks_repo_licenses
sequence
max_forks_count
int64
1
55.9k
max_forks_repo_forks_event_min_datetime
stringlengths
24
24
max_forks_repo_forks_event_max_datetime
stringlengths
24
24
content
stringlengths
24
1.05M
avg_line_length
float64
1
304k
max_line_length
int64
14
1.03M
alphanum_fraction
float64
0
1
f74108a0bff0536e7fbdc6690e829272375abbfe
154,954
yaml
YAML
manifests/crds/cluster-analysis-template-crd.yaml
ekmixon/argo-rollouts
75cdde7606cc5fdcd4254ba44960f1d61ff7c67a
[ "Apache-2.0" ]
null
null
null
manifests/crds/cluster-analysis-template-crd.yaml
ekmixon/argo-rollouts
75cdde7606cc5fdcd4254ba44960f1d61ff7c67a
[ "Apache-2.0" ]
null
null
null
manifests/crds/cluster-analysis-template-crd.yaml
ekmixon/argo-rollouts
75cdde7606cc5fdcd4254ba44960f1d61ff7c67a
[ "Apache-2.0" ]
null
null
null
apiVersion: apiextensions.k8s.io/v1 kind: CustomResourceDefinition metadata: annotations: controller-gen.kubebuilder.io/version: v0.5.0 name: clusteranalysistemplates.argoproj.io spec: group: argoproj.io names: kind: ClusterAnalysisTemplate listKind: ClusterAnalysisTemplateList plural: clusteranalysistemplates shortNames: - cat singular: clusteranalysistemplate preserveUnknownFields: false scope: Cluster versions: - name: v1alpha1 schema: openAPIV3Schema: properties: apiVersion: type: string kind: type: string metadata: type: object spec: properties: args: items: properties: name: type: string value: type: string valueFrom: properties: fieldRef: properties: fieldPath: type: string required: - fieldPath type: object secretKeyRef: properties: key: type: string name: type: string required: - key - name type: object type: object required: - name type: object type: array metrics: items: properties: consecutiveErrorLimit: anyOf: - type: integer - type: string x-kubernetes-int-or-string: true count: anyOf: - type: integer - type: string x-kubernetes-int-or-string: true failureCondition: type: string failureLimit: anyOf: - type: integer - type: string x-kubernetes-int-or-string: true inconclusiveLimit: anyOf: - type: integer - type: string x-kubernetes-int-or-string: true initialDelay: type: string interval: type: string name: type: string provider: properties: cloudWatch: properties: interval: type: string metricDataQueries: items: properties: expression: type: string id: type: string label: type: string metricStat: properties: metric: properties: dimensions: items: properties: name: type: string value: type: string type: object type: array metricName: type: string namespace: type: string type: object period: anyOf: - type: integer - type: string x-kubernetes-int-or-string: true stat: type: string unit: type: string type: object period: anyOf: - type: integer - type: string x-kubernetes-int-or-string: true returnData: type: boolean type: object type: array required: - metricDataQueries type: object datadog: properties: interval: type: string query: type: string required: - query type: object graphite: properties: address: type: string query: type: string type: object job: properties: metadata: properties: annotations: additionalProperties: type: string type: object labels: additionalProperties: type: string type: object type: object spec: properties: activeDeadlineSeconds: format: int64 type: integer backoffLimit: format: int32 type: integer completions: format: int32 type: integer manualSelector: type: boolean parallelism: format: int32 type: integer selector: properties: matchExpressions: items: properties: key: type: string operator: type: string values: items: type: string type: array required: - key - operator type: object type: array matchLabels: additionalProperties: type: string type: object type: object template: properties: metadata: properties: annotations: additionalProperties: type: string type: object labels: additionalProperties: type: string type: object type: object spec: properties: activeDeadlineSeconds: format: int64 type: integer affinity: properties: nodeAffinity: properties: preferredDuringSchedulingIgnoredDuringExecution: items: properties: preference: properties: matchExpressions: items: properties: key: type: string operator: type: string values: items: type: string type: array required: - key - operator type: object type: array matchFields: items: properties: key: type: string operator: type: string values: items: type: string type: array required: - key - operator type: object type: array type: object weight: format: int32 type: integer required: - preference - weight type: object type: array requiredDuringSchedulingIgnoredDuringExecution: properties: nodeSelectorTerms: items: properties: matchExpressions: items: properties: key: type: string operator: type: string values: items: type: string type: array required: - key - operator type: object type: array matchFields: items: properties: key: type: string operator: type: string values: items: type: string type: array required: - key - operator type: object type: array type: object type: array required: - nodeSelectorTerms type: object type: object podAffinity: properties: preferredDuringSchedulingIgnoredDuringExecution: items: properties: podAffinityTerm: properties: labelSelector: properties: matchExpressions: items: properties: key: type: string operator: type: string values: items: type: string type: array required: - key - operator type: object type: array matchLabels: additionalProperties: type: string type: object type: object namespaces: items: type: string type: array topologyKey: type: string required: - topologyKey type: object weight: format: int32 type: integer required: - podAffinityTerm - weight type: object type: array requiredDuringSchedulingIgnoredDuringExecution: items: properties: labelSelector: properties: matchExpressions: items: properties: key: type: string operator: type: string values: items: type: string type: array required: - key - operator type: object type: array matchLabels: additionalProperties: type: string type: object type: object namespaces: items: type: string type: array topologyKey: type: string required: - topologyKey type: object type: array type: object podAntiAffinity: properties: preferredDuringSchedulingIgnoredDuringExecution: items: properties: podAffinityTerm: properties: labelSelector: properties: matchExpressions: items: properties: key: type: string operator: type: string values: items: type: string type: array required: - key - operator type: object type: array matchLabels: additionalProperties: type: string type: object type: object namespaces: items: type: string type: array topologyKey: type: string required: - topologyKey type: object weight: format: int32 type: integer required: - podAffinityTerm - weight type: object type: array requiredDuringSchedulingIgnoredDuringExecution: items: properties: labelSelector: properties: matchExpressions: items: properties: key: type: string operator: type: string values: items: type: string type: array required: - key - operator type: object type: array matchLabels: additionalProperties: type: string type: object type: object namespaces: items: type: string type: array topologyKey: type: string required: - topologyKey type: object type: array type: object type: object automountServiceAccountToken: type: boolean containers: items: properties: args: items: type: string type: array command: items: type: string type: array env: items: properties: name: type: string value: type: string valueFrom: properties: configMapKeyRef: properties: key: type: string name: type: string optional: type: boolean required: - key type: object fieldRef: properties: apiVersion: type: string fieldPath: type: string required: - fieldPath type: object resourceFieldRef: properties: containerName: type: string divisor: anyOf: - type: integer - type: string pattern: ^(\+|-)?(([0-9]+(\.[0-9]*)?)|(\.[0-9]+))(([KMGTPE]i)|[numkMGTPE]|([eE](\+|-)?(([0-9]+(\.[0-9]*)?)|(\.[0-9]+))))?$ x-kubernetes-int-or-string: true resource: type: string required: - resource type: object secretKeyRef: properties: key: type: string name: type: string optional: type: boolean required: - key type: object type: object required: - name type: object type: array envFrom: items: properties: configMapRef: properties: name: type: string optional: type: boolean type: object prefix: type: string secretRef: properties: name: type: string optional: type: boolean type: object type: object type: array image: type: string imagePullPolicy: type: string lifecycle: properties: postStart: properties: exec: properties: command: items: type: string type: array type: object httpGet: properties: host: type: string httpHeaders: items: properties: name: type: string value: type: string required: - name - value type: object type: array path: type: string port: anyOf: - type: integer - type: string x-kubernetes-int-or-string: true scheme: type: string required: - port type: object tcpSocket: properties: host: type: string port: anyOf: - type: integer - type: string x-kubernetes-int-or-string: true required: - port type: object type: object preStop: properties: exec: properties: command: items: type: string type: array type: object httpGet: properties: host: type: string httpHeaders: items: properties: name: type: string value: type: string required: - name - value type: object type: array path: type: string port: anyOf: - type: integer - type: string x-kubernetes-int-or-string: true scheme: type: string required: - port type: object tcpSocket: properties: host: type: string port: anyOf: - type: integer - type: string x-kubernetes-int-or-string: true required: - port type: object type: object type: object livenessProbe: properties: exec: properties: command: items: type: string type: array type: object failureThreshold: format: int32 type: integer httpGet: properties: host: type: string httpHeaders: items: properties: name: type: string value: type: string required: - name - value type: object type: array path: type: string port: anyOf: - type: integer - type: string x-kubernetes-int-or-string: true scheme: type: string required: - port type: object initialDelaySeconds: format: int32 type: integer periodSeconds: format: int32 type: integer successThreshold: format: int32 type: integer tcpSocket: properties: host: type: string port: anyOf: - type: integer - type: string x-kubernetes-int-or-string: true required: - port type: object timeoutSeconds: format: int32 type: integer type: object name: type: string ports: items: properties: containerPort: format: int32 type: integer hostIP: type: string hostPort: format: int32 type: integer name: type: string protocol: default: TCP type: string required: - containerPort type: object type: array x-kubernetes-list-map-keys: - containerPort - protocol x-kubernetes-list-type: map readinessProbe: properties: exec: properties: command: items: type: string type: array type: object failureThreshold: format: int32 type: integer httpGet: properties: host: type: string httpHeaders: items: properties: name: type: string value: type: string required: - name - value type: object type: array path: type: string port: anyOf: - type: integer - type: string x-kubernetes-int-or-string: true scheme: type: string required: - port type: object initialDelaySeconds: format: int32 type: integer periodSeconds: format: int32 type: integer successThreshold: format: int32 type: integer tcpSocket: properties: host: type: string port: anyOf: - type: integer - type: string x-kubernetes-int-or-string: true required: - port type: object timeoutSeconds: format: int32 type: integer type: object resources: properties: limits: x-kubernetes-preserve-unknown-fields: true requests: x-kubernetes-preserve-unknown-fields: true type: object securityContext: properties: allowPrivilegeEscalation: type: boolean capabilities: properties: add: items: type: string type: array drop: items: type: string type: array type: object privileged: type: boolean procMount: type: string readOnlyRootFilesystem: type: boolean runAsGroup: format: int64 type: integer runAsNonRoot: type: boolean runAsUser: format: int64 type: integer seLinuxOptions: properties: level: type: string role: type: string type: type: string user: type: string type: object seccompProfile: properties: localhostProfile: type: string type: type: string required: - type type: object windowsOptions: properties: gmsaCredentialSpec: type: string gmsaCredentialSpecName: type: string runAsUserName: type: string type: object type: object startupProbe: properties: exec: properties: command: items: type: string type: array type: object failureThreshold: format: int32 type: integer httpGet: properties: host: type: string httpHeaders: items: properties: name: type: string value: type: string required: - name - value type: object type: array path: type: string port: anyOf: - type: integer - type: string x-kubernetes-int-or-string: true scheme: type: string required: - port type: object initialDelaySeconds: format: int32 type: integer periodSeconds: format: int32 type: integer successThreshold: format: int32 type: integer tcpSocket: properties: host: type: string port: anyOf: - type: integer - type: string x-kubernetes-int-or-string: true required: - port type: object timeoutSeconds: format: int32 type: integer type: object stdin: type: boolean stdinOnce: type: boolean terminationMessagePath: type: string terminationMessagePolicy: type: string tty: type: boolean volumeDevices: items: properties: devicePath: type: string name: type: string required: - devicePath - name type: object type: array volumeMounts: items: properties: mountPath: type: string mountPropagation: type: string name: type: string readOnly: type: boolean subPath: type: string subPathExpr: type: string required: - mountPath - name type: object type: array workingDir: type: string required: - name type: object type: array dnsConfig: properties: nameservers: items: type: string type: array options: items: properties: name: type: string value: type: string type: object type: array searches: items: type: string type: array type: object dnsPolicy: type: string enableServiceLinks: type: boolean ephemeralContainers: items: properties: args: items: type: string type: array command: items: type: string type: array env: items: properties: name: type: string value: type: string valueFrom: properties: configMapKeyRef: properties: key: type: string name: type: string optional: type: boolean required: - key type: object fieldRef: properties: apiVersion: type: string fieldPath: type: string required: - fieldPath type: object resourceFieldRef: properties: containerName: type: string divisor: anyOf: - type: integer - type: string pattern: ^(\+|-)?(([0-9]+(\.[0-9]*)?)|(\.[0-9]+))(([KMGTPE]i)|[numkMGTPE]|([eE](\+|-)?(([0-9]+(\.[0-9]*)?)|(\.[0-9]+))))?$ x-kubernetes-int-or-string: true resource: type: string required: - resource type: object secretKeyRef: properties: key: type: string name: type: string optional: type: boolean required: - key type: object type: object required: - name type: object type: array envFrom: items: properties: configMapRef: properties: name: type: string optional: type: boolean type: object prefix: type: string secretRef: properties: name: type: string optional: type: boolean type: object type: object type: array image: type: string imagePullPolicy: type: string lifecycle: properties: postStart: properties: exec: properties: command: items: type: string type: array type: object httpGet: properties: host: type: string httpHeaders: items: properties: name: type: string value: type: string required: - name - value type: object type: array path: type: string port: anyOf: - type: integer - type: string x-kubernetes-int-or-string: true scheme: type: string required: - port type: object tcpSocket: properties: host: type: string port: anyOf: - type: integer - type: string x-kubernetes-int-or-string: true required: - port type: object type: object preStop: properties: exec: properties: command: items: type: string type: array type: object httpGet: properties: host: type: string httpHeaders: items: properties: name: type: string value: type: string required: - name - value type: object type: array path: type: string port: anyOf: - type: integer - type: string x-kubernetes-int-or-string: true scheme: type: string required: - port type: object tcpSocket: properties: host: type: string port: anyOf: - type: integer - type: string x-kubernetes-int-or-string: true required: - port type: object type: object type: object livenessProbe: properties: exec: properties: command: items: type: string type: array type: object failureThreshold: format: int32 type: integer httpGet: properties: host: type: string httpHeaders: items: properties: name: type: string value: type: string required: - name - value type: object type: array path: type: string port: anyOf: - type: integer - type: string x-kubernetes-int-or-string: true scheme: type: string required: - port type: object initialDelaySeconds: format: int32 type: integer periodSeconds: format: int32 type: integer successThreshold: format: int32 type: integer tcpSocket: properties: host: type: string port: anyOf: - type: integer - type: string x-kubernetes-int-or-string: true required: - port type: object timeoutSeconds: format: int32 type: integer type: object name: type: string ports: items: properties: containerPort: format: int32 type: integer hostIP: type: string hostPort: format: int32 type: integer name: type: string protocol: default: TCP type: string required: - containerPort type: object type: array readinessProbe: properties: exec: properties: command: items: type: string type: array type: object failureThreshold: format: int32 type: integer httpGet: properties: host: type: string httpHeaders: items: properties: name: type: string value: type: string required: - name - value type: object type: array path: type: string port: anyOf: - type: integer - type: string x-kubernetes-int-or-string: true scheme: type: string required: - port type: object initialDelaySeconds: format: int32 type: integer periodSeconds: format: int32 type: integer successThreshold: format: int32 type: integer tcpSocket: properties: host: type: string port: anyOf: - type: integer - type: string x-kubernetes-int-or-string: true required: - port type: object timeoutSeconds: format: int32 type: integer type: object resources: properties: limits: x-kubernetes-preserve-unknown-fields: true requests: x-kubernetes-preserve-unknown-fields: true type: object securityContext: properties: allowPrivilegeEscalation: type: boolean capabilities: properties: add: items: type: string type: array drop: items: type: string type: array type: object privileged: type: boolean procMount: type: string readOnlyRootFilesystem: type: boolean runAsGroup: format: int64 type: integer runAsNonRoot: type: boolean runAsUser: format: int64 type: integer seLinuxOptions: properties: level: type: string role: type: string type: type: string user: type: string type: object seccompProfile: properties: localhostProfile: type: string type: type: string required: - type type: object windowsOptions: properties: gmsaCredentialSpec: type: string gmsaCredentialSpecName: type: string runAsUserName: type: string type: object type: object startupProbe: properties: exec: properties: command: items: type: string type: array type: object failureThreshold: format: int32 type: integer httpGet: properties: host: type: string httpHeaders: items: properties: name: type: string value: type: string required: - name - value type: object type: array path: type: string port: anyOf: - type: integer - type: string x-kubernetes-int-or-string: true scheme: type: string required: - port type: object initialDelaySeconds: format: int32 type: integer periodSeconds: format: int32 type: integer successThreshold: format: int32 type: integer tcpSocket: properties: host: type: string port: anyOf: - type: integer - type: string x-kubernetes-int-or-string: true required: - port type: object timeoutSeconds: format: int32 type: integer type: object stdin: type: boolean stdinOnce: type: boolean targetContainerName: type: string terminationMessagePath: type: string terminationMessagePolicy: type: string tty: type: boolean volumeDevices: items: properties: devicePath: type: string name: type: string required: - devicePath - name type: object type: array volumeMounts: items: properties: mountPath: type: string mountPropagation: type: string name: type: string readOnly: type: boolean subPath: type: string subPathExpr: type: string required: - mountPath - name type: object type: array workingDir: type: string required: - name type: object type: array hostAliases: items: properties: hostnames: items: type: string type: array ip: type: string type: object type: array hostIPC: type: boolean hostNetwork: type: boolean hostPID: type: boolean hostname: type: string imagePullSecrets: items: properties: name: type: string type: object type: array initContainers: items: properties: args: items: type: string type: array command: items: type: string type: array env: items: properties: name: type: string value: type: string valueFrom: properties: configMapKeyRef: properties: key: type: string name: type: string optional: type: boolean required: - key type: object fieldRef: properties: apiVersion: type: string fieldPath: type: string required: - fieldPath type: object resourceFieldRef: properties: containerName: type: string divisor: anyOf: - type: integer - type: string pattern: ^(\+|-)?(([0-9]+(\.[0-9]*)?)|(\.[0-9]+))(([KMGTPE]i)|[numkMGTPE]|([eE](\+|-)?(([0-9]+(\.[0-9]*)?)|(\.[0-9]+))))?$ x-kubernetes-int-or-string: true resource: type: string required: - resource type: object secretKeyRef: properties: key: type: string name: type: string optional: type: boolean required: - key type: object type: object required: - name type: object type: array envFrom: items: properties: configMapRef: properties: name: type: string optional: type: boolean type: object prefix: type: string secretRef: properties: name: type: string optional: type: boolean type: object type: object type: array image: type: string imagePullPolicy: type: string lifecycle: properties: postStart: properties: exec: properties: command: items: type: string type: array type: object httpGet: properties: host: type: string httpHeaders: items: properties: name: type: string value: type: string required: - name - value type: object type: array path: type: string port: anyOf: - type: integer - type: string x-kubernetes-int-or-string: true scheme: type: string required: - port type: object tcpSocket: properties: host: type: string port: anyOf: - type: integer - type: string x-kubernetes-int-or-string: true required: - port type: object type: object preStop: properties: exec: properties: command: items: type: string type: array type: object httpGet: properties: host: type: string httpHeaders: items: properties: name: type: string value: type: string required: - name - value type: object type: array path: type: string port: anyOf: - type: integer - type: string x-kubernetes-int-or-string: true scheme: type: string required: - port type: object tcpSocket: properties: host: type: string port: anyOf: - type: integer - type: string x-kubernetes-int-or-string: true required: - port type: object type: object type: object livenessProbe: properties: exec: properties: command: items: type: string type: array type: object failureThreshold: format: int32 type: integer httpGet: properties: host: type: string httpHeaders: items: properties: name: type: string value: type: string required: - name - value type: object type: array path: type: string port: anyOf: - type: integer - type: string x-kubernetes-int-or-string: true scheme: type: string required: - port type: object initialDelaySeconds: format: int32 type: integer periodSeconds: format: int32 type: integer successThreshold: format: int32 type: integer tcpSocket: properties: host: type: string port: anyOf: - type: integer - type: string x-kubernetes-int-or-string: true required: - port type: object timeoutSeconds: format: int32 type: integer type: object name: type: string ports: items: properties: containerPort: format: int32 type: integer hostIP: type: string hostPort: format: int32 type: integer name: type: string protocol: default: TCP type: string required: - containerPort type: object type: array x-kubernetes-list-map-keys: - containerPort - protocol x-kubernetes-list-type: map readinessProbe: properties: exec: properties: command: items: type: string type: array type: object failureThreshold: format: int32 type: integer httpGet: properties: host: type: string httpHeaders: items: properties: name: type: string value: type: string required: - name - value type: object type: array path: type: string port: anyOf: - type: integer - type: string x-kubernetes-int-or-string: true scheme: type: string required: - port type: object initialDelaySeconds: format: int32 type: integer periodSeconds: format: int32 type: integer successThreshold: format: int32 type: integer tcpSocket: properties: host: type: string port: anyOf: - type: integer - type: string x-kubernetes-int-or-string: true required: - port type: object timeoutSeconds: format: int32 type: integer type: object resources: properties: limits: x-kubernetes-preserve-unknown-fields: true requests: x-kubernetes-preserve-unknown-fields: true type: object securityContext: properties: allowPrivilegeEscalation: type: boolean capabilities: properties: add: items: type: string type: array drop: items: type: string type: array type: object privileged: type: boolean procMount: type: string readOnlyRootFilesystem: type: boolean runAsGroup: format: int64 type: integer runAsNonRoot: type: boolean runAsUser: format: int64 type: integer seLinuxOptions: properties: level: type: string role: type: string type: type: string user: type: string type: object seccompProfile: properties: localhostProfile: type: string type: type: string required: - type type: object windowsOptions: properties: gmsaCredentialSpec: type: string gmsaCredentialSpecName: type: string runAsUserName: type: string type: object type: object startupProbe: properties: exec: properties: command: items: type: string type: array type: object failureThreshold: format: int32 type: integer httpGet: properties: host: type: string httpHeaders: items: properties: name: type: string value: type: string required: - name - value type: object type: array path: type: string port: anyOf: - type: integer - type: string x-kubernetes-int-or-string: true scheme: type: string required: - port type: object initialDelaySeconds: format: int32 type: integer periodSeconds: format: int32 type: integer successThreshold: format: int32 type: integer tcpSocket: properties: host: type: string port: anyOf: - type: integer - type: string x-kubernetes-int-or-string: true required: - port type: object timeoutSeconds: format: int32 type: integer type: object stdin: type: boolean stdinOnce: type: boolean terminationMessagePath: type: string terminationMessagePolicy: type: string tty: type: boolean volumeDevices: items: properties: devicePath: type: string name: type: string required: - devicePath - name type: object type: array volumeMounts: items: properties: mountPath: type: string mountPropagation: type: string name: type: string readOnly: type: boolean subPath: type: string subPathExpr: type: string required: - mountPath - name type: object type: array workingDir: type: string required: - name type: object type: array nodeName: type: string nodeSelector: additionalProperties: type: string type: object overhead: additionalProperties: anyOf: - type: integer - type: string pattern: ^(\+|-)?(([0-9]+(\.[0-9]*)?)|(\.[0-9]+))(([KMGTPE]i)|[numkMGTPE]|([eE](\+|-)?(([0-9]+(\.[0-9]*)?)|(\.[0-9]+))))?$ x-kubernetes-int-or-string: true type: object preemptionPolicy: type: string priority: format: int32 type: integer priorityClassName: type: string readinessGates: items: properties: conditionType: type: string required: - conditionType type: object type: array restartPolicy: type: string runtimeClassName: type: string schedulerName: type: string securityContext: properties: fsGroup: format: int64 type: integer fsGroupChangePolicy: type: string runAsGroup: format: int64 type: integer runAsNonRoot: type: boolean runAsUser: format: int64 type: integer seLinuxOptions: properties: level: type: string role: type: string type: type: string user: type: string type: object seccompProfile: properties: localhostProfile: type: string type: type: string required: - type type: object supplementalGroups: items: format: int64 type: integer type: array sysctls: items: properties: name: type: string value: type: string required: - name - value type: object type: array windowsOptions: properties: gmsaCredentialSpec: type: string gmsaCredentialSpecName: type: string runAsUserName: type: string type: object type: object serviceAccount: type: string serviceAccountName: type: string setHostnameAsFQDN: type: boolean shareProcessNamespace: type: boolean subdomain: type: string terminationGracePeriodSeconds: format: int64 type: integer tolerations: items: properties: effect: type: string key: type: string operator: type: string tolerationSeconds: format: int64 type: integer value: type: string type: object type: array topologySpreadConstraints: items: properties: labelSelector: properties: matchExpressions: items: properties: key: type: string operator: type: string values: items: type: string type: array required: - key - operator type: object type: array matchLabels: additionalProperties: type: string type: object type: object maxSkew: format: int32 type: integer topologyKey: type: string whenUnsatisfiable: type: string required: - maxSkew - topologyKey - whenUnsatisfiable type: object type: array x-kubernetes-list-map-keys: - topologyKey - whenUnsatisfiable x-kubernetes-list-type: map volumes: x-kubernetes-preserve-unknown-fields: true required: - containers type: object type: object ttlSecondsAfterFinished: format: int32 type: integer required: - template type: object required: - spec type: object kayenta: properties: address: type: string application: type: string canaryConfigName: type: string configurationAccountName: type: string metricsAccountName: type: string scopes: items: properties: controlScope: properties: end: type: string region: type: string scope: type: string start: type: string step: format: int64 type: integer required: - end - region - scope - start - step type: object experimentScope: properties: end: type: string region: type: string scope: type: string start: type: string step: format: int64 type: integer required: - end - region - scope - start - step type: object name: type: string required: - controlScope - experimentScope - name type: object type: array storageAccountName: type: string threshold: properties: marginal: format: int64 type: integer pass: format: int64 type: integer required: - marginal - pass type: object required: - address - application - canaryConfigName - configurationAccountName - metricsAccountName - scopes - storageAccountName - threshold type: object newRelic: properties: profile: type: string query: type: string required: - query type: object prometheus: properties: address: type: string query: type: string type: object wavefront: properties: address: type: string query: type: string type: object web: properties: body: type: string headers: items: properties: key: type: string value: type: string required: - key - value type: object type: array insecure: type: boolean jsonPath: type: string method: type: string timeoutSeconds: format: int64 type: integer url: type: string required: - url type: object type: object successCondition: type: string required: - name - provider type: object type: array required: - metrics type: object required: - spec type: object served: true storage: true
62.255524
184
0.155052
f74111f3b0fc2cd931e01568bda15fbbc5b1d3e4
316
yaml
YAML
app-helm/templates/deployment-api.yaml
theindiangeek/exercises
5acca0a900e080e152cde78be4fd6911457a68ae
[ "MIT" ]
null
null
null
app-helm/templates/deployment-api.yaml
theindiangeek/exercises
5acca0a900e080e152cde78be4fd6911457a68ae
[ "MIT" ]
null
null
null
app-helm/templates/deployment-api.yaml
theindiangeek/exercises
5acca0a900e080e152cde78be4fd6911457a68ae
[ "MIT" ]
null
null
null
apiVersion: apps/v1 kind: Deployment metadata: name: api spec: replicas: 3 selector: matchLabels: app: api template: metadata: labels: app: api spec: containers: - name: api image: theindiangeek/edjx-api:latest ports: - containerPort: 8081
15.8
44
0.585443
f74128ebf3768f9f3b758ce137df4a7fb6b863c6
235,252
yaml
YAML
apps/cluster-api/capo/manifests/03-cni.yaml
Jeremy-Boyle/asi-project
a17e563ded830993c2b73ada035b6039b11e15d8
[ "MIT" ]
null
null
null
apps/cluster-api/capo/manifests/03-cni.yaml
Jeremy-Boyle/asi-project
a17e563ded830993c2b73ada035b6039b11e15d8
[ "MIT" ]
null
null
null
apps/cluster-api/capo/manifests/03-cni.yaml
Jeremy-Boyle/asi-project
a17e563ded830993c2b73ada035b6039b11e15d8
[ "MIT" ]
null
null
null
--- apiVersion: v1 data: calico-3-21.yaml: |+ --- # Source: calico/templates/calico-config.yaml # This ConfigMap is used to configure a self-hosted Calico installation. kind: ConfigMap apiVersion: v1 metadata: name: calico-config namespace: kube-system data: # Typha is disabled. typha_service_name: "none" # Configure the backend to use. calico_backend: "bird" # Configure the MTU to use for workload interfaces and tunnels. # By default, MTU is auto-detected, and explicitly setting this field should not be required. # You can override auto-detection by providing a non-zero value. veth_mtu: "0" # The CNI network configuration to install on each node. The special # values in this config will be automatically populated. cni_network_config: |- { "name": "k8s-pod-network", "cniVersion": "0.3.1", "plugins": [ { "type": "calico", "log_level": "info", "log_file_path": "/var/log/calico/cni/cni.log", "datastore_type": "kubernetes", "nodename": "__KUBERNETES_NODE_NAME__", "mtu": __CNI_MTU__, "ipam": { "type": "calico-ipam" }, "policy": { "type": "k8s" }, "kubernetes": { "kubeconfig": "__KUBECONFIG_FILEPATH__" } }, { "type": "portmap", "snat": true, "capabilities": {"portMappings": true} }, { "type": "bandwidth", "capabilities": {"bandwidth": true} } ] } --- # Source: calico/templates/kdd-crds.yaml apiVersion: apiextensions.k8s.io/v1 kind: CustomResourceDefinition metadata: name: bgpconfigurations.crd.projectcalico.org spec: group: crd.projectcalico.org names: kind: BGPConfiguration listKind: BGPConfigurationList plural: bgpconfigurations singular: bgpconfiguration scope: Cluster versions: - name: v1 schema: openAPIV3Schema: description: BGPConfiguration contains the configuration for any BGP routing. properties: apiVersion: description: 'APIVersion defines the versioned schema of this representation of an object. Servers should convert recognized schemas to the latest internal value, and may reject unrecognized values. More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#resources' type: string kind: description: 'Kind is a string value representing the REST resource this object represents. Servers may infer this from the endpoint the client submits requests to. Cannot be updated. In CamelCase. More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#types-kinds' type: string metadata: type: object spec: description: BGPConfigurationSpec contains the values of the BGP configuration. properties: asNumber: description: 'ASNumber is the default AS number used by a node. [Default: 64512]' format: int32 type: integer communities: description: Communities is a list of BGP community values and their arbitrary names for tagging routes. items: description: Community contains standard or large community value and its name. properties: name: description: Name given to community value. type: string value: description: Value must be of format `aa:nn` or `aa:nn:mm`. For standard community use `aa:nn` format, where `aa` and `nn` are 16 bit number. For large community use `aa:nn:mm` format, where `aa`, `nn` and `mm` are 32 bit number. Where, `aa` is an AS Number, `nn` and `mm` are per-AS identifier. pattern: ^(\d+):(\d+)$|^(\d+):(\d+):(\d+)$ type: string type: object type: array listenPort: description: ListenPort is the port where BGP protocol should listen. Defaults to 179 maximum: 65535 minimum: 1 type: integer logSeverityScreen: description: 'LogSeverityScreen is the log severity above which logs are sent to the stdout. [Default: INFO]' type: string nodeToNodeMeshEnabled: description: 'NodeToNodeMeshEnabled sets whether full node to node BGP mesh is enabled. [Default: true]' type: boolean prefixAdvertisements: description: PrefixAdvertisements contains per-prefix advertisement configuration. items: description: PrefixAdvertisement configures advertisement properties for the specified CIDR. properties: cidr: description: CIDR for which properties should be advertised. type: string communities: description: Communities can be list of either community names already defined in `Specs.Communities` or community value of format `aa:nn` or `aa:nn:mm`. For standard community use `aa:nn` format, where `aa` and `nn` are 16 bit number. For large community use `aa:nn:mm` format, where `aa`, `nn` and `mm` are 32 bit number. Where,`aa` is an AS Number, `nn` and `mm` are per-AS identifier. items: type: string type: array type: object type: array serviceClusterIPs: description: ServiceClusterIPs are the CIDR blocks from which service cluster IPs are allocated. If specified, Calico will advertise these blocks, as well as any cluster IPs within them. items: description: ServiceClusterIPBlock represents a single allowed ClusterIP CIDR block. properties: cidr: type: string type: object type: array serviceExternalIPs: description: ServiceExternalIPs are the CIDR blocks for Kubernetes Service External IPs. Kubernetes Service ExternalIPs will only be advertised if they are within one of these blocks. items: description: ServiceExternalIPBlock represents a single allowed External IP CIDR block. properties: cidr: type: string type: object type: array serviceLoadBalancerIPs: description: ServiceLoadBalancerIPs are the CIDR blocks for Kubernetes Service LoadBalancer IPs. Kubernetes Service status.LoadBalancer.Ingress IPs will only be advertised if they are within one of these blocks. items: description: ServiceLoadBalancerIPBlock represents a single allowed LoadBalancer IP CIDR block. properties: cidr: type: string type: object type: array type: object type: object served: true storage: true status: acceptedNames: kind: "" plural: "" conditions: [] storedVersions: [] --- apiVersion: apiextensions.k8s.io/v1 kind: CustomResourceDefinition metadata: name: bgppeers.crd.projectcalico.org spec: group: crd.projectcalico.org names: kind: BGPPeer listKind: BGPPeerList plural: bgppeers singular: bgppeer scope: Cluster versions: - name: v1 schema: openAPIV3Schema: properties: apiVersion: description: 'APIVersion defines the versioned schema of this representation of an object. Servers should convert recognized schemas to the latest internal value, and may reject unrecognized values. More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#resources' type: string kind: description: 'Kind is a string value representing the REST resource this object represents. Servers may infer this from the endpoint the client submits requests to. Cannot be updated. In CamelCase. More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#types-kinds' type: string metadata: type: object spec: description: BGPPeerSpec contains the specification for a BGPPeer resource. properties: asNumber: description: The AS Number of the peer. format: int32 type: integer keepOriginalNextHop: description: Option to keep the original nexthop field when routes are sent to a BGP Peer. Setting "true" configures the selected BGP Peers node to use the "next hop keep;" instead of "next hop self;"(default) in the specific branch of the Node on "bird.cfg". type: boolean maxRestartTime: description: Time to allow for software restart. When specified, this is configured as the graceful restart timeout. When not specified, the BIRD default of 120s is used. type: string node: description: The node name identifying the Calico node instance that is targeted by this peer. If this is not set, and no nodeSelector is specified, then this BGP peer selects all nodes in the cluster. type: string nodeSelector: description: Selector for the nodes that should have this peering. When this is set, the Node field must be empty. type: string password: description: Optional BGP password for the peerings generated by this BGPPeer resource. properties: secretKeyRef: description: Selects a key of a secret in the node pod's namespace. properties: key: description: The key of the secret to select from. Must be a valid secret key. type: string name: description: 'Name of the referent. More info: https://kubernetes.io/docs/concepts/overview/working-with-objects/names/#names TODO: Add other useful fields. apiVersion, kind, uid?' type: string optional: description: Specify whether the Secret or its key must be defined type: boolean required: - key type: object type: object peerIP: description: The IP address of the peer followed by an optional port number to peer with. If port number is given, format should be `[<IPv6>]:port` or `<IPv4>:<port>` for IPv4. If optional port number is not set, and this peer IP and ASNumber belongs to a calico/node with ListenPort set in BGPConfiguration, then we use that port to peer. type: string peerSelector: description: Selector for the remote nodes to peer with. When this is set, the PeerIP and ASNumber fields must be empty. For each peering between the local node and selected remote nodes, we configure an IPv4 peering if both ends have NodeBGPSpec.IPv4Address specified, and an IPv6 peering if both ends have NodeBGPSpec.IPv6Address specified. The remote AS number comes from the remote node's NodeBGPSpec.ASNumber, or the global default if that is not set. type: string sourceAddress: description: Specifies whether and how to configure a source address for the peerings generated by this BGPPeer resource. Default value "UseNodeIP" means to configure the node IP as the source address. "None" means not to configure a source address. type: string type: object type: object served: true storage: true status: acceptedNames: kind: "" plural: "" conditions: [] storedVersions: [] --- apiVersion: apiextensions.k8s.io/v1 kind: CustomResourceDefinition metadata: name: blockaffinities.crd.projectcalico.org spec: group: crd.projectcalico.org names: kind: BlockAffinity listKind: BlockAffinityList plural: blockaffinities singular: blockaffinity scope: Cluster versions: - name: v1 schema: openAPIV3Schema: properties: apiVersion: description: 'APIVersion defines the versioned schema of this representation of an object. Servers should convert recognized schemas to the latest internal value, and may reject unrecognized values. More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#resources' type: string kind: description: 'Kind is a string value representing the REST resource this object represents. Servers may infer this from the endpoint the client submits requests to. Cannot be updated. In CamelCase. More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#types-kinds' type: string metadata: type: object spec: description: BlockAffinitySpec contains the specification for a BlockAffinity resource. properties: cidr: type: string deleted: description: Deleted indicates that this block affinity is being deleted. This field is a string for compatibility with older releases that mistakenly treat this field as a string. type: string node: type: string state: type: string required: - cidr - deleted - node - state type: object type: object served: true storage: true status: acceptedNames: kind: "" plural: "" conditions: [] storedVersions: [] --- --- apiVersion: apiextensions.k8s.io/v1 kind: CustomResourceDefinition metadata: annotations: controller-gen.kubebuilder.io/version: (devel) creationTimestamp: null name: caliconodestatuses.crd.projectcalico.org spec: group: crd.projectcalico.org names: kind: CalicoNodeStatus listKind: CalicoNodeStatusList plural: caliconodestatuses singular: caliconodestatus scope: Cluster versions: - name: v1 schema: openAPIV3Schema: properties: apiVersion: description: 'APIVersion defines the versioned schema of this representation of an object. Servers should convert recognized schemas to the latest internal value, and may reject unrecognized values. More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#resources' type: string kind: description: 'Kind is a string value representing the REST resource this object represents. Servers may infer this from the endpoint the client submits requests to. Cannot be updated. In CamelCase. More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#types-kinds' type: string metadata: type: object spec: description: CalicoNodeStatusSpec contains the specification for a CalicoNodeStatus resource. properties: classes: description: Classes declares the types of information to monitor for this calico/node, and allows for selective status reporting about certain subsets of information. items: type: string type: array node: description: The node name identifies the Calico node instance for node status. type: string updatePeriodSeconds: description: UpdatePeriodSeconds is the period at which CalicoNodeStatus should be updated. Set to 0 to disable CalicoNodeStatus refresh. Maximum update period is one day. format: int32 type: integer type: object status: description: CalicoNodeStatusStatus defines the observed state of CalicoNodeStatus. No validation needed for status since it is updated by Calico. properties: agent: description: Agent holds agent status on the node. properties: birdV4: description: BIRDV4 represents the latest observed status of bird4. properties: lastBootTime: description: LastBootTime holds the value of lastBootTime from bird.ctl output. type: string lastReconfigurationTime: description: LastReconfigurationTime holds the value of lastReconfigTime from bird.ctl output. type: string routerID: description: Router ID used by bird. type: string state: description: The state of the BGP Daemon. type: string version: description: Version of the BGP daemon type: string type: object birdV6: description: BIRDV6 represents the latest observed status of bird6. properties: lastBootTime: description: LastBootTime holds the value of lastBootTime from bird.ctl output. type: string lastReconfigurationTime: description: LastReconfigurationTime holds the value of lastReconfigTime from bird.ctl output. type: string routerID: description: Router ID used by bird. type: string state: description: The state of the BGP Daemon. type: string version: description: Version of the BGP daemon type: string type: object type: object bgp: description: BGP holds node BGP status. properties: numberEstablishedV4: description: The total number of IPv4 established bgp sessions. type: integer numberEstablishedV6: description: The total number of IPv6 established bgp sessions. type: integer numberNotEstablishedV4: description: The total number of IPv4 non-established bgp sessions. type: integer numberNotEstablishedV6: description: The total number of IPv6 non-established bgp sessions. type: integer peersV4: description: PeersV4 represents IPv4 BGP peers status on the node. items: description: CalicoNodePeer contains the status of BGP peers on the node. properties: peerIP: description: IP address of the peer whose condition we are reporting. type: string since: description: Since the state or reason last changed. type: string state: description: State is the BGP session state. type: string type: description: Type indicates whether this peer is configured via the node-to-node mesh, or via en explicit global or per-node BGPPeer object. type: string type: object type: array peersV6: description: PeersV6 represents IPv6 BGP peers status on the node. items: description: CalicoNodePeer contains the status of BGP peers on the node. properties: peerIP: description: IP address of the peer whose condition we are reporting. type: string since: description: Since the state or reason last changed. type: string state: description: State is the BGP session state. type: string type: description: Type indicates whether this peer is configured via the node-to-node mesh, or via en explicit global or per-node BGPPeer object. type: string type: object type: array required: - numberEstablishedV4 - numberEstablishedV6 - numberNotEstablishedV4 - numberNotEstablishedV6 type: object lastUpdated: description: LastUpdated is a timestamp representing the server time when CalicoNodeStatus object last updated. It is represented in RFC3339 form and is in UTC. format: date-time nullable: true type: string routes: description: Routes reports routes known to the Calico BGP daemon on the node. properties: routesV4: description: RoutesV4 represents IPv4 routes on the node. items: description: CalicoNodeRoute contains the status of BGP routes on the node. properties: destination: description: Destination of the route. type: string gateway: description: Gateway for the destination. type: string interface: description: Interface for the destination type: string learnedFrom: description: LearnedFrom contains information regarding where this route originated. properties: peerIP: description: If sourceType is NodeMesh or BGPPeer, IP address of the router that sent us this route. type: string sourceType: description: Type of the source where a route is learned from. type: string type: object type: description: Type indicates if the route is being used for forwarding or not. type: string type: object type: array routesV6: description: RoutesV6 represents IPv6 routes on the node. items: description: CalicoNodeRoute contains the status of BGP routes on the node. properties: destination: description: Destination of the route. type: string gateway: description: Gateway for the destination. type: string interface: description: Interface for the destination type: string learnedFrom: description: LearnedFrom contains information regarding where this route originated. properties: peerIP: description: If sourceType is NodeMesh or BGPPeer, IP address of the router that sent us this route. type: string sourceType: description: Type of the source where a route is learned from. type: string type: object type: description: Type indicates if the route is being used for forwarding or not. type: string type: object type: array type: object type: object type: object served: true storage: true status: acceptedNames: kind: "" plural: "" conditions: [] storedVersions: [] --- apiVersion: apiextensions.k8s.io/v1 kind: CustomResourceDefinition metadata: name: clusterinformations.crd.projectcalico.org spec: group: crd.projectcalico.org names: kind: ClusterInformation listKind: ClusterInformationList plural: clusterinformations singular: clusterinformation scope: Cluster versions: - name: v1 schema: openAPIV3Schema: description: ClusterInformation contains the cluster specific information. properties: apiVersion: description: 'APIVersion defines the versioned schema of this representation of an object. Servers should convert recognized schemas to the latest internal value, and may reject unrecognized values. More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#resources' type: string kind: description: 'Kind is a string value representing the REST resource this object represents. Servers may infer this from the endpoint the client submits requests to. Cannot be updated. In CamelCase. More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#types-kinds' type: string metadata: type: object spec: description: ClusterInformationSpec contains the values of describing the cluster. properties: calicoVersion: description: CalicoVersion is the version of Calico that the cluster is running type: string clusterGUID: description: ClusterGUID is the GUID of the cluster type: string clusterType: description: ClusterType describes the type of the cluster type: string datastoreReady: description: DatastoreReady is used during significant datastore migrations to signal to components such as Felix that it should wait before accessing the datastore. type: boolean variant: description: Variant declares which variant of Calico should be active. type: string type: object type: object served: true storage: true status: acceptedNames: kind: "" plural: "" conditions: [] storedVersions: [] --- apiVersion: apiextensions.k8s.io/v1 kind: CustomResourceDefinition metadata: name: felixconfigurations.crd.projectcalico.org spec: group: crd.projectcalico.org names: kind: FelixConfiguration listKind: FelixConfigurationList plural: felixconfigurations singular: felixconfiguration scope: Cluster versions: - name: v1 schema: openAPIV3Schema: description: Felix Configuration contains the configuration for Felix. properties: apiVersion: description: 'APIVersion defines the versioned schema of this representation of an object. Servers should convert recognized schemas to the latest internal value, and may reject unrecognized values. More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#resources' type: string kind: description: 'Kind is a string value representing the REST resource this object represents. Servers may infer this from the endpoint the client submits requests to. Cannot be updated. In CamelCase. More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#types-kinds' type: string metadata: type: object spec: description: FelixConfigurationSpec contains the values of the Felix configuration. properties: allowIPIPPacketsFromWorkloads: description: 'AllowIPIPPacketsFromWorkloads controls whether Felix will add a rule to drop IPIP encapsulated traffic from workloads [Default: false]' type: boolean allowVXLANPacketsFromWorkloads: description: 'AllowVXLANPacketsFromWorkloads controls whether Felix will add a rule to drop VXLAN encapsulated traffic from workloads [Default: false]' type: boolean awsSrcDstCheck: description: 'Set source-destination-check on AWS EC2 instances. Accepted value must be one of "DoNothing", "Enable" or "Disable". [Default: DoNothing]' enum: - DoNothing - Enable - Disable type: string bpfConnectTimeLoadBalancingEnabled: description: 'BPFConnectTimeLoadBalancingEnabled when in BPF mode, controls whether Felix installs the connection-time load balancer. The connect-time load balancer is required for the host to be able to reach Kubernetes services and it improves the performance of pod-to-service connections. The only reason to disable it is for debugging purposes. [Default: true]' type: boolean bpfDataIfacePattern: description: BPFDataIfacePattern is a regular expression that controls which interfaces Felix should attach BPF programs to in order to catch traffic to/from the network. This needs to match the interfaces that Calico workload traffic flows over as well as any interfaces that handle incoming traffic to nodeports and services from outside the cluster. It should not match the workload interfaces (usually named cali...). type: string bpfDisableUnprivileged: description: 'BPFDisableUnprivileged, if enabled, Felix sets the kernel.unprivileged_bpf_disabled sysctl to disable unprivileged use of BPF. This ensures that unprivileged users cannot access Calico''s BPF maps and cannot insert their own BPF programs to interfere with Calico''s. [Default: true]' type: boolean bpfEnabled: description: 'BPFEnabled, if enabled Felix will use the BPF dataplane. [Default: false]' type: boolean bpfExtToServiceConnmark: description: 'BPFExtToServiceConnmark in BPF mode, control a 32bit mark that is set on connections from an external client to a local service. This mark allows us to control how packets of that connection are routed within the host and how is routing intepreted by RPF check. [Default: 0]' type: integer bpfExternalServiceMode: description: 'BPFExternalServiceMode in BPF mode, controls how connections from outside the cluster to services (node ports and cluster IPs) are forwarded to remote workloads. If set to "Tunnel" then both request and response traffic is tunneled to the remote node. If set to "DSR", the request traffic is tunneled but the response traffic is sent directly from the remote node. In "DSR" mode, the remote node appears to use the IP of the ingress node; this requires a permissive L2 network. [Default: Tunnel]' type: string bpfKubeProxyEndpointSlicesEnabled: description: BPFKubeProxyEndpointSlicesEnabled in BPF mode, controls whether Felix's embedded kube-proxy accepts EndpointSlices or not. type: boolean bpfKubeProxyIptablesCleanupEnabled: description: 'BPFKubeProxyIptablesCleanupEnabled, if enabled in BPF mode, Felix will proactively clean up the upstream Kubernetes kube-proxy''s iptables chains. Should only be enabled if kube-proxy is not running. [Default: true]' type: boolean bpfKubeProxyMinSyncPeriod: description: 'BPFKubeProxyMinSyncPeriod, in BPF mode, controls the minimum time between updates to the dataplane for Felix''s embedded kube-proxy. Lower values give reduced set-up latency. Higher values reduce Felix CPU usage by batching up more work. [Default: 1s]' type: string bpfLogLevel: description: 'BPFLogLevel controls the log level of the BPF programs when in BPF dataplane mode. One of "Off", "Info", or "Debug". The logs are emitted to the BPF trace pipe, accessible with the command `tc exec bpf debug`. [Default: Off].' type: string chainInsertMode: description: 'ChainInsertMode controls whether Felix hooks the kernel''s top-level iptables chains by inserting a rule at the top of the chain or by appending a rule at the bottom. insert is the safe default since it prevents Calico''s rules from being bypassed. If you switch to append mode, be sure that the other rules in the chains signal acceptance by falling through to the Calico rules, otherwise the Calico policy will be bypassed. [Default: insert]' type: string dataplaneDriver: type: string debugDisableLogDropping: type: boolean debugMemoryProfilePath: type: string debugSimulateCalcGraphHangAfter: type: string debugSimulateDataplaneHangAfter: type: string defaultEndpointToHostAction: description: 'DefaultEndpointToHostAction controls what happens to traffic that goes from a workload endpoint to the host itself (after the traffic hits the endpoint egress policy). By default Calico blocks traffic from workload endpoints to the host itself with an iptables "DROP" action. If you want to allow some or all traffic from endpoint to host, set this parameter to RETURN or ACCEPT. Use RETURN if you have your own rules in the iptables "INPUT" chain; Calico will insert its rules at the top of that chain, then "RETURN" packets to the "INPUT" chain once it has completed processing workload endpoint egress policy. Use ACCEPT to unconditionally accept packets from workloads after processing workload endpoint egress policy. [Default: Drop]' type: string deviceRouteProtocol: description: This defines the route protocol added to programmed device routes, by default this will be RTPROT_BOOT when left blank. type: integer deviceRouteSourceAddress: description: This is the source address to use on programmed device routes. By default the source address is left blank, leaving the kernel to choose the source address used. type: string disableConntrackInvalidCheck: type: boolean endpointReportingDelay: type: string endpointReportingEnabled: type: boolean externalNodesList: description: ExternalNodesCIDRList is a list of CIDR's of external-non-calico-nodes which may source tunnel traffic and have the tunneled traffic be accepted at calico nodes. items: type: string type: array failsafeInboundHostPorts: description: 'FailsafeInboundHostPorts is a list of UDP/TCP ports and CIDRs that Felix will allow incoming traffic to host endpoints on irrespective of the security policy. This is useful to avoid accidentally cutting off a host with incorrect configuration. For back-compatibility, if the protocol is not specified, it defaults to "tcp". If a CIDR is not specified, it will allow traffic from all addresses. To disable all inbound host ports, use the value none. The default value allows ssh access and DHCP. [Default: tcp:22, udp:68, tcp:179, tcp:2379, tcp:2380, tcp:6443, tcp:6666, tcp:6667]' items: description: ProtoPort is combination of protocol, port, and CIDR. Protocol and port must be specified. properties: net: type: string port: type: integer protocol: type: string required: - port - protocol type: object type: array failsafeOutboundHostPorts: description: 'FailsafeOutboundHostPorts is a list of UDP/TCP ports and CIDRs that Felix will allow outgoing traffic from host endpoints to irrespective of the security policy. This is useful to avoid accidentally cutting off a host with incorrect configuration. For back-compatibility, if the protocol is not specified, it defaults to "tcp". If a CIDR is not specified, it will allow traffic from all addresses. To disable all outbound host ports, use the value none. The default value opens etcd''s standard ports to ensure that Felix does not get cut off from etcd as well as allowing DHCP and DNS. [Default: tcp:179, tcp:2379, tcp:2380, tcp:6443, tcp:6666, tcp:6667, udp:53, udp:67]' items: description: ProtoPort is combination of protocol, port, and CIDR. Protocol and port must be specified. properties: net: type: string port: type: integer protocol: type: string required: - port - protocol type: object type: array featureDetectOverride: description: FeatureDetectOverride is used to override the feature detection. Values are specified in a comma separated list with no spaces, example; "SNATFullyRandom=true,MASQFullyRandom=false,RestoreSupportsLock=". "true" or "false" will force the feature, empty or omitted values are auto-detected. type: string genericXDPEnabled: description: 'GenericXDPEnabled enables Generic XDP so network cards that don''t support XDP offload or driver modes can use XDP. This is not recommended since it doesn''t provide better performance than iptables. [Default: false]' type: boolean healthEnabled: type: boolean healthHost: type: string healthPort: type: integer interfaceExclude: description: 'InterfaceExclude is a comma-separated list of interfaces that Felix should exclude when monitoring for host endpoints. The default value ensures that Felix ignores Kubernetes'' IPVS dummy interface, which is used internally by kube-proxy. If you want to exclude multiple interface names using a single value, the list supports regular expressions. For regular expressions you must wrap the value with ''/''. For example having values ''/^kube/,veth1'' will exclude all interfaces that begin with ''kube'' and also the interface ''veth1''. [Default: kube-ipvs0]' type: string interfacePrefix: description: 'InterfacePrefix is the interface name prefix that identifies workload endpoints and so distinguishes them from host endpoint interfaces. Note: in environments other than bare metal, the orchestrators configure this appropriately. For example our Kubernetes and Docker integrations set the ''cali'' value, and our OpenStack integration sets the ''tap'' value. [Default: cali]' type: string interfaceRefreshInterval: description: InterfaceRefreshInterval is the period at which Felix rescans local interfaces to verify their state. The rescan can be disabled by setting the interval to 0. type: string ipipEnabled: type: boolean ipipMTU: description: 'IPIPMTU is the MTU to set on the tunnel device. See Configuring MTU [Default: 1440]' type: integer ipsetsRefreshInterval: description: 'IpsetsRefreshInterval is the period at which Felix re-checks all iptables state to ensure that no other process has accidentally broken Calico''s rules. Set to 0 to disable iptables refresh. [Default: 90s]' type: string iptablesBackend: description: IptablesBackend specifies which backend of iptables will be used. The default is legacy. type: string iptablesFilterAllowAction: type: string iptablesLockFilePath: description: 'IptablesLockFilePath is the location of the iptables lock file. You may need to change this if the lock file is not in its standard location (for example if you have mapped it into Felix''s container at a different path). [Default: /run/xtables.lock]' type: string iptablesLockProbeInterval: description: 'IptablesLockProbeInterval is the time that Felix will wait between attempts to acquire the iptables lock if it is not available. Lower values make Felix more responsive when the lock is contended, but use more CPU. [Default: 50ms]' type: string iptablesLockTimeout: description: 'IptablesLockTimeout is the time that Felix will wait for the iptables lock, or 0, to disable. To use this feature, Felix must share the iptables lock file with all other processes that also take the lock. When running Felix inside a container, this requires the /run directory of the host to be mounted into the calico/node or calico/felix container. [Default: 0s disabled]' type: string iptablesMangleAllowAction: type: string iptablesMarkMask: description: 'IptablesMarkMask is the mask that Felix selects its IPTables Mark bits from. Should be a 32 bit hexadecimal number with at least 8 bits set, none of which clash with any other mark bits in use on the system. [Default: 0xff000000]' format: int32 type: integer iptablesNATOutgoingInterfaceFilter: type: string iptablesPostWriteCheckInterval: description: 'IptablesPostWriteCheckInterval is the period after Felix has done a write to the dataplane that it schedules an extra read back in order to check the write was not clobbered by another process. This should only occur if another application on the system doesn''t respect the iptables lock. [Default: 1s]' type: string iptablesRefreshInterval: description: 'IptablesRefreshInterval is the period at which Felix re-checks the IP sets in the dataplane to ensure that no other process has accidentally broken Calico''s rules. Set to 0 to disable IP sets refresh. Note: the default for this value is lower than the other refresh intervals as a workaround for a Linux kernel bug that was fixed in kernel version 4.11. If you are using v4.11 or greater you may want to set this to, a higher value to reduce Felix CPU usage. [Default: 10s]' type: string ipv6Support: type: boolean kubeNodePortRanges: description: 'KubeNodePortRanges holds list of port ranges used for service node ports. Only used if felix detects kube-proxy running in ipvs mode. Felix uses these ranges to separate host and workload traffic. [Default: 30000:32767].' items: anyOf: - type: integer - type: string pattern: ^.* x-kubernetes-int-or-string: true type: array logFilePath: description: 'LogFilePath is the full path to the Felix log. Set to none to disable file logging. [Default: /var/log/calico/felix.log]' type: string logPrefix: description: 'LogPrefix is the log prefix that Felix uses when rendering LOG rules. [Default: calico-packet]' type: string logSeverityFile: description: 'LogSeverityFile is the log severity above which logs are sent to the log file. [Default: Info]' type: string logSeverityScreen: description: 'LogSeverityScreen is the log severity above which logs are sent to the stdout. [Default: Info]' type: string logSeveritySys: description: 'LogSeveritySys is the log severity above which logs are sent to the syslog. Set to None for no logging to syslog. [Default: Info]' type: string maxIpsetSize: type: integer metadataAddr: description: 'MetadataAddr is the IP address or domain name of the server that can answer VM queries for cloud-init metadata. In OpenStack, this corresponds to the machine running nova-api (or in Ubuntu, nova-api-metadata). A value of none (case insensitive) means that Felix should not set up any NAT rule for the metadata path. [Default: 127.0.0.1]' type: string metadataPort: description: 'MetadataPort is the port of the metadata server. This, combined with global.MetadataAddr (if not ''None''), is used to set up a NAT rule, from 169.254.169.254:80 to MetadataAddr:MetadataPort. In most cases this should not need to be changed [Default: 8775].' type: integer mtuIfacePattern: description: MTUIfacePattern is a regular expression that controls which interfaces Felix should scan in order to calculate the host's MTU. This should not match workload interfaces (usually named cali...). type: string natOutgoingAddress: description: NATOutgoingAddress specifies an address to use when performing source NAT for traffic in a natOutgoing pool that is leaving the network. By default the address used is an address on the interface the traffic is leaving on (ie it uses the iptables MASQUERADE target) type: string natPortRange: anyOf: - type: integer - type: string description: NATPortRange specifies the range of ports that is used for port mapping when doing outgoing NAT. When unset the default behavior of the network stack is used. pattern: ^.* x-kubernetes-int-or-string: true netlinkTimeout: type: string openstackRegion: description: 'OpenstackRegion is the name of the region that a particular Felix belongs to. In a multi-region Calico/OpenStack deployment, this must be configured somehow for each Felix (here in the datamodel, or in felix.cfg or the environment on each compute node), and must match the [calico] openstack_region value configured in neutron.conf on each node. [Default: Empty]' type: string policySyncPathPrefix: description: 'PolicySyncPathPrefix is used to by Felix to communicate policy changes to external services, like Application layer policy. [Default: Empty]' type: string prometheusGoMetricsEnabled: description: 'PrometheusGoMetricsEnabled disables Go runtime metrics collection, which the Prometheus client does by default, when set to false. This reduces the number of metrics reported, reducing Prometheus load. [Default: true]' type: boolean prometheusMetricsEnabled: description: 'PrometheusMetricsEnabled enables the Prometheus metrics server in Felix if set to true. [Default: false]' type: boolean prometheusMetricsHost: description: 'PrometheusMetricsHost is the host that the Prometheus metrics server should bind to. [Default: empty]' type: string prometheusMetricsPort: description: 'PrometheusMetricsPort is the TCP port that the Prometheus metrics server should bind to. [Default: 9091]' type: integer prometheusProcessMetricsEnabled: description: 'PrometheusProcessMetricsEnabled disables process metrics collection, which the Prometheus client does by default, when set to false. This reduces the number of metrics reported, reducing Prometheus load. [Default: true]' type: boolean prometheusWireGuardMetricsEnabled: description: 'PrometheusWireGuardMetricsEnabled disables wireguard metrics collection, which the Prometheus client does by default, when set to false. This reduces the number of metrics reported, reducing Prometheus load. [Default: true]' type: boolean removeExternalRoutes: description: Whether or not to remove device routes that have not been programmed by Felix. Disabling this will allow external applications to also add device routes. This is enabled by default which means we will remove externally added routes. type: boolean reportingInterval: description: 'ReportingInterval is the interval at which Felix reports its status into the datastore or 0 to disable. Must be non-zero in OpenStack deployments. [Default: 30s]' type: string reportingTTL: description: 'ReportingTTL is the time-to-live setting for process-wide status reports. [Default: 90s]' type: string routeRefreshInterval: description: 'RouteRefreshInterval is the period at which Felix re-checks the routes in the dataplane to ensure that no other process has accidentally broken Calico''s rules. Set to 0 to disable route refresh. [Default: 90s]' type: string routeSource: description: 'RouteSource configures where Felix gets its routing information. - WorkloadIPs: use workload endpoints to construct routes. - CalicoIPAM: the default - use IPAM data to construct routes.' type: string routeTableRange: description: Calico programs additional Linux route tables for various purposes. RouteTableRange specifies the indices of the route tables that Calico should use. properties: max: type: integer min: type: integer required: - max - min type: object serviceLoopPrevention: description: 'When service IP advertisement is enabled, prevent routing loops to service IPs that are not in use, by dropping or rejecting packets that do not get DNAT''d by kube-proxy. Unless set to "Disabled", in which case such routing loops continue to be allowed. [Default: Drop]' type: string sidecarAccelerationEnabled: description: 'SidecarAccelerationEnabled enables experimental sidecar acceleration [Default: false]' type: boolean usageReportingEnabled: description: 'UsageReportingEnabled reports anonymous Calico version number and cluster size to projectcalico.org. Logs warnings returned by the usage server. For example, if a significant security vulnerability has been discovered in the version of Calico being used. [Default: true]' type: boolean usageReportingInitialDelay: description: 'UsageReportingInitialDelay controls the minimum delay before Felix makes a report. [Default: 300s]' type: string usageReportingInterval: description: 'UsageReportingInterval controls the interval at which Felix makes reports. [Default: 86400s]' type: string useInternalDataplaneDriver: type: boolean vxlanEnabled: type: boolean vxlanMTU: description: 'VXLANMTU is the MTU to set on the tunnel device. See Configuring MTU [Default: 1440]' type: integer vxlanPort: type: integer vxlanVNI: type: integer wireguardEnabled: description: 'WireguardEnabled controls whether Wireguard is enabled. [Default: false]' type: boolean wireguardHostEncryptionEnabled: description: 'WireguardHostEncryptionEnabled controls whether Wireguard host-to-host encryption is enabled. [Default: false]' type: boolean wireguardInterfaceName: description: 'WireguardInterfaceName specifies the name to use for the Wireguard interface. [Default: wg.calico]' type: string wireguardListeningPort: description: 'WireguardListeningPort controls the listening port used by Wireguard. [Default: 51820]' type: integer wireguardMTU: description: 'WireguardMTU controls the MTU on the Wireguard interface. See Configuring MTU [Default: 1420]' type: integer wireguardRoutingRulePriority: description: 'WireguardRoutingRulePriority controls the priority value to use for the Wireguard routing rule. [Default: 99]' type: integer xdpEnabled: description: 'XDPEnabled enables XDP acceleration for suitable untracked incoming deny rules. [Default: true]' type: boolean xdpRefreshInterval: description: 'XDPRefreshInterval is the period at which Felix re-checks all XDP state to ensure that no other process has accidentally broken Calico''s BPF maps or attached programs. Set to 0 to disable XDP refresh. [Default: 90s]' type: string type: object type: object served: true storage: true status: acceptedNames: kind: "" plural: "" conditions: [] storedVersions: [] --- apiVersion: apiextensions.k8s.io/v1 kind: CustomResourceDefinition metadata: name: globalnetworkpolicies.crd.projectcalico.org spec: group: crd.projectcalico.org names: kind: GlobalNetworkPolicy listKind: GlobalNetworkPolicyList plural: globalnetworkpolicies singular: globalnetworkpolicy scope: Cluster versions: - name: v1 schema: openAPIV3Schema: properties: apiVersion: description: 'APIVersion defines the versioned schema of this representation of an object. Servers should convert recognized schemas to the latest internal value, and may reject unrecognized values. More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#resources' type: string kind: description: 'Kind is a string value representing the REST resource this object represents. Servers may infer this from the endpoint the client submits requests to. Cannot be updated. In CamelCase. More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#types-kinds' type: string metadata: type: object spec: properties: applyOnForward: description: ApplyOnForward indicates to apply the rules in this policy on forward traffic. type: boolean doNotTrack: description: DoNotTrack indicates whether packets matched by the rules in this policy should go through the data plane's connection tracking, such as Linux conntrack. If True, the rules in this policy are applied before any data plane connection tracking, and packets allowed by this policy are marked as not to be tracked. type: boolean egress: description: The ordered set of egress rules. Each rule contains a set of packet match criteria and a corresponding action to apply. items: description: "A Rule encapsulates a set of match criteria and an action. Both selector-based security Policy and security Profiles reference rules - separated out as a list of rules for both ingress and egress packet matching. \n Each positive match criteria has a negated version, prefixed with \"Not\". All the match criteria within a rule must be satisfied for a packet to match. A single rule can contain the positive and negative version of a match and both must be satisfied for the rule to match." properties: action: type: string destination: description: Destination contains the match criteria that apply to destination entity. properties: namespaceSelector: description: "NamespaceSelector is an optional field that contains a selector expression. Only traffic that originates from (or terminates at) endpoints within the selected namespaces will be matched. When both NamespaceSelector and another selector are defined on the same rule, then only workload endpoints that are matched by both selectors will be selected by the rule. \n For NetworkPolicy, an empty NamespaceSelector implies that the Selector is limited to selecting only workload endpoints in the same namespace as the NetworkPolicy. \n For NetworkPolicy, `global()` NamespaceSelector implies that the Selector is limited to selecting only GlobalNetworkSet or HostEndpoint. \n For GlobalNetworkPolicy, an empty NamespaceSelector implies the Selector applies to workload endpoints across all namespaces." type: string nets: description: Nets is an optional field that restricts the rule to only apply to traffic that originates from (or terminates at) IP addresses in any of the given subnets. items: type: string type: array notNets: description: NotNets is the negated version of the Nets field. items: type: string type: array notPorts: description: NotPorts is the negated version of the Ports field. Since only some protocols have ports, if any ports are specified it requires the Protocol match in the Rule to be set to "TCP" or "UDP". items: anyOf: - type: integer - type: string pattern: ^.* x-kubernetes-int-or-string: true type: array notSelector: description: NotSelector is the negated version of the Selector field. See Selector field for subtleties with negated selectors. type: string ports: description: "Ports is an optional field that restricts the rule to only apply to traffic that has a source (destination) port that matches one of these ranges/values. This value is a list of integers or strings that represent ranges of ports. \n Since only some protocols have ports, if any ports are specified it requires the Protocol match in the Rule to be set to \"TCP\" or \"UDP\"." items: anyOf: - type: integer - type: string pattern: ^.* x-kubernetes-int-or-string: true type: array selector: description: "Selector is an optional field that contains a selector expression (see Policy for sample syntax). \ Only traffic that originates from (terminates at) endpoints matching the selector will be matched. \n Note that: in addition to the negated version of the Selector (see NotSelector below), the selector expression syntax itself supports negation. The two types of negation are subtly different. One negates the set of matched endpoints, the other negates the whole match: \n \tSelector = \"!has(my_label)\" matches packets that are from other Calico-controlled \tendpoints that do not have the label \"my_label\". \n \tNotSelector = \"has(my_label)\" matches packets that are not from Calico-controlled \tendpoints that do have the label \"my_label\". \n The effect is that the latter will accept packets from non-Calico sources whereas the former is limited to packets from Calico-controlled endpoints." type: string serviceAccounts: description: ServiceAccounts is an optional field that restricts the rule to only apply to traffic that originates from (or terminates at) a pod running as a matching service account. properties: names: description: Names is an optional field that restricts the rule to only apply to traffic that originates from (or terminates at) a pod running as a service account whose name is in the list. items: type: string type: array selector: description: Selector is an optional field that restricts the rule to only apply to traffic that originates from (or terminates at) a pod running as a service account that matches the given label selector. If both Names and Selector are specified then they are AND'ed. type: string type: object services: description: "Services is an optional field that contains options for matching Kubernetes Services. If specified, only traffic that originates from or terminates at endpoints within the selected service(s) will be matched, and only to/from each endpoint's port. \n Services cannot be specified on the same rule as Selector, NotSelector, NamespaceSelector, Nets, NotNets or ServiceAccounts. \n Ports and NotPorts can only be specified with Services on ingress rules." properties: name: description: Name specifies the name of a Kubernetes Service to match. type: string namespace: description: Namespace specifies the namespace of the given Service. If left empty, the rule will match within this policy's namespace. type: string type: object type: object http: description: HTTP contains match criteria that apply to HTTP requests. properties: methods: description: Methods is an optional field that restricts the rule to apply only to HTTP requests that use one of the listed HTTP Methods (e.g. GET, PUT, etc.) Multiple methods are OR'd together. items: type: string type: array paths: description: 'Paths is an optional field that restricts the rule to apply to HTTP requests that use one of the listed HTTP Paths. Multiple paths are OR''d together. e.g: - exact: /foo - prefix: /bar NOTE: Each entry may ONLY specify either a `exact` or a `prefix` match. The validator will check for it.' items: description: 'HTTPPath specifies an HTTP path to match. It may be either of the form: exact: <path>: which matches the path exactly or prefix: <path-prefix>: which matches the path prefix' properties: exact: type: string prefix: type: string type: object type: array type: object icmp: description: ICMP is an optional field that restricts the rule to apply to a specific type and code of ICMP traffic. This should only be specified if the Protocol field is set to "ICMP" or "ICMPv6". properties: code: description: Match on a specific ICMP code. If specified, the Type value must also be specified. This is a technical limitation imposed by the kernel's iptables firewall, which Calico uses to enforce the rule. type: integer type: description: Match on a specific ICMP type. For example a value of 8 refers to ICMP Echo Request (i.e. pings). type: integer type: object ipVersion: description: IPVersion is an optional field that restricts the rule to only match a specific IP version. type: integer metadata: description: Metadata contains additional information for this rule properties: annotations: additionalProperties: type: string description: Annotations is a set of key value pairs that give extra information about the rule type: object type: object notICMP: description: NotICMP is the negated version of the ICMP field. properties: code: description: Match on a specific ICMP code. If specified, the Type value must also be specified. This is a technical limitation imposed by the kernel's iptables firewall, which Calico uses to enforce the rule. type: integer type: description: Match on a specific ICMP type. For example a value of 8 refers to ICMP Echo Request (i.e. pings). type: integer type: object notProtocol: anyOf: - type: integer - type: string description: NotProtocol is the negated version of the Protocol field. pattern: ^.* x-kubernetes-int-or-string: true protocol: anyOf: - type: integer - type: string description: "Protocol is an optional field that restricts the rule to only apply to traffic of a specific IP protocol. Required if any of the EntityRules contain Ports (because ports only apply to certain protocols). \n Must be one of these string values: \"TCP\", \"UDP\", \"ICMP\", \"ICMPv6\", \"SCTP\", \"UDPLite\" or an integer in the range 1-255." pattern: ^.* x-kubernetes-int-or-string: true source: description: Source contains the match criteria that apply to source entity. properties: namespaceSelector: description: "NamespaceSelector is an optional field that contains a selector expression. Only traffic that originates from (or terminates at) endpoints within the selected namespaces will be matched. When both NamespaceSelector and another selector are defined on the same rule, then only workload endpoints that are matched by both selectors will be selected by the rule. \n For NetworkPolicy, an empty NamespaceSelector implies that the Selector is limited to selecting only workload endpoints in the same namespace as the NetworkPolicy. \n For NetworkPolicy, `global()` NamespaceSelector implies that the Selector is limited to selecting only GlobalNetworkSet or HostEndpoint. \n For GlobalNetworkPolicy, an empty NamespaceSelector implies the Selector applies to workload endpoints across all namespaces." type: string nets: description: Nets is an optional field that restricts the rule to only apply to traffic that originates from (or terminates at) IP addresses in any of the given subnets. items: type: string type: array notNets: description: NotNets is the negated version of the Nets field. items: type: string type: array notPorts: description: NotPorts is the negated version of the Ports field. Since only some protocols have ports, if any ports are specified it requires the Protocol match in the Rule to be set to "TCP" or "UDP". items: anyOf: - type: integer - type: string pattern: ^.* x-kubernetes-int-or-string: true type: array notSelector: description: NotSelector is the negated version of the Selector field. See Selector field for subtleties with negated selectors. type: string ports: description: "Ports is an optional field that restricts the rule to only apply to traffic that has a source (destination) port that matches one of these ranges/values. This value is a list of integers or strings that represent ranges of ports. \n Since only some protocols have ports, if any ports are specified it requires the Protocol match in the Rule to be set to \"TCP\" or \"UDP\"." items: anyOf: - type: integer - type: string pattern: ^.* x-kubernetes-int-or-string: true type: array selector: description: "Selector is an optional field that contains a selector expression (see Policy for sample syntax). \ Only traffic that originates from (terminates at) endpoints matching the selector will be matched. \n Note that: in addition to the negated version of the Selector (see NotSelector below), the selector expression syntax itself supports negation. The two types of negation are subtly different. One negates the set of matched endpoints, the other negates the whole match: \n \tSelector = \"!has(my_label)\" matches packets that are from other Calico-controlled \tendpoints that do not have the label \"my_label\". \n \tNotSelector = \"has(my_label)\" matches packets that are not from Calico-controlled \tendpoints that do have the label \"my_label\". \n The effect is that the latter will accept packets from non-Calico sources whereas the former is limited to packets from Calico-controlled endpoints." type: string serviceAccounts: description: ServiceAccounts is an optional field that restricts the rule to only apply to traffic that originates from (or terminates at) a pod running as a matching service account. properties: names: description: Names is an optional field that restricts the rule to only apply to traffic that originates from (or terminates at) a pod running as a service account whose name is in the list. items: type: string type: array selector: description: Selector is an optional field that restricts the rule to only apply to traffic that originates from (or terminates at) a pod running as a service account that matches the given label selector. If both Names and Selector are specified then they are AND'ed. type: string type: object services: description: "Services is an optional field that contains options for matching Kubernetes Services. If specified, only traffic that originates from or terminates at endpoints within the selected service(s) will be matched, and only to/from each endpoint's port. \n Services cannot be specified on the same rule as Selector, NotSelector, NamespaceSelector, Nets, NotNets or ServiceAccounts. \n Ports and NotPorts can only be specified with Services on ingress rules." properties: name: description: Name specifies the name of a Kubernetes Service to match. type: string namespace: description: Namespace specifies the namespace of the given Service. If left empty, the rule will match within this policy's namespace. type: string type: object type: object required: - action type: object type: array ingress: description: The ordered set of ingress rules. Each rule contains a set of packet match criteria and a corresponding action to apply. items: description: "A Rule encapsulates a set of match criteria and an action. Both selector-based security Policy and security Profiles reference rules - separated out as a list of rules for both ingress and egress packet matching. \n Each positive match criteria has a negated version, prefixed with \"Not\". All the match criteria within a rule must be satisfied for a packet to match. A single rule can contain the positive and negative version of a match and both must be satisfied for the rule to match." properties: action: type: string destination: description: Destination contains the match criteria that apply to destination entity. properties: namespaceSelector: description: "NamespaceSelector is an optional field that contains a selector expression. Only traffic that originates from (or terminates at) endpoints within the selected namespaces will be matched. When both NamespaceSelector and another selector are defined on the same rule, then only workload endpoints that are matched by both selectors will be selected by the rule. \n For NetworkPolicy, an empty NamespaceSelector implies that the Selector is limited to selecting only workload endpoints in the same namespace as the NetworkPolicy. \n For NetworkPolicy, `global()` NamespaceSelector implies that the Selector is limited to selecting only GlobalNetworkSet or HostEndpoint. \n For GlobalNetworkPolicy, an empty NamespaceSelector implies the Selector applies to workload endpoints across all namespaces." type: string nets: description: Nets is an optional field that restricts the rule to only apply to traffic that originates from (or terminates at) IP addresses in any of the given subnets. items: type: string type: array notNets: description: NotNets is the negated version of the Nets field. items: type: string type: array notPorts: description: NotPorts is the negated version of the Ports field. Since only some protocols have ports, if any ports are specified it requires the Protocol match in the Rule to be set to "TCP" or "UDP". items: anyOf: - type: integer - type: string pattern: ^.* x-kubernetes-int-or-string: true type: array notSelector: description: NotSelector is the negated version of the Selector field. See Selector field for subtleties with negated selectors. type: string ports: description: "Ports is an optional field that restricts the rule to only apply to traffic that has a source (destination) port that matches one of these ranges/values. This value is a list of integers or strings that represent ranges of ports. \n Since only some protocols have ports, if any ports are specified it requires the Protocol match in the Rule to be set to \"TCP\" or \"UDP\"." items: anyOf: - type: integer - type: string pattern: ^.* x-kubernetes-int-or-string: true type: array selector: description: "Selector is an optional field that contains a selector expression (see Policy for sample syntax). \ Only traffic that originates from (terminates at) endpoints matching the selector will be matched. \n Note that: in addition to the negated version of the Selector (see NotSelector below), the selector expression syntax itself supports negation. The two types of negation are subtly different. One negates the set of matched endpoints, the other negates the whole match: \n \tSelector = \"!has(my_label)\" matches packets that are from other Calico-controlled \tendpoints that do not have the label \"my_label\". \n \tNotSelector = \"has(my_label)\" matches packets that are not from Calico-controlled \tendpoints that do have the label \"my_label\". \n The effect is that the latter will accept packets from non-Calico sources whereas the former is limited to packets from Calico-controlled endpoints." type: string serviceAccounts: description: ServiceAccounts is an optional field that restricts the rule to only apply to traffic that originates from (or terminates at) a pod running as a matching service account. properties: names: description: Names is an optional field that restricts the rule to only apply to traffic that originates from (or terminates at) a pod running as a service account whose name is in the list. items: type: string type: array selector: description: Selector is an optional field that restricts the rule to only apply to traffic that originates from (or terminates at) a pod running as a service account that matches the given label selector. If both Names and Selector are specified then they are AND'ed. type: string type: object services: description: "Services is an optional field that contains options for matching Kubernetes Services. If specified, only traffic that originates from or terminates at endpoints within the selected service(s) will be matched, and only to/from each endpoint's port. \n Services cannot be specified on the same rule as Selector, NotSelector, NamespaceSelector, Nets, NotNets or ServiceAccounts. \n Ports and NotPorts can only be specified with Services on ingress rules." properties: name: description: Name specifies the name of a Kubernetes Service to match. type: string namespace: description: Namespace specifies the namespace of the given Service. If left empty, the rule will match within this policy's namespace. type: string type: object type: object http: description: HTTP contains match criteria that apply to HTTP requests. properties: methods: description: Methods is an optional field that restricts the rule to apply only to HTTP requests that use one of the listed HTTP Methods (e.g. GET, PUT, etc.) Multiple methods are OR'd together. items: type: string type: array paths: description: 'Paths is an optional field that restricts the rule to apply to HTTP requests that use one of the listed HTTP Paths. Multiple paths are OR''d together. e.g: - exact: /foo - prefix: /bar NOTE: Each entry may ONLY specify either a `exact` or a `prefix` match. The validator will check for it.' items: description: 'HTTPPath specifies an HTTP path to match. It may be either of the form: exact: <path>: which matches the path exactly or prefix: <path-prefix>: which matches the path prefix' properties: exact: type: string prefix: type: string type: object type: array type: object icmp: description: ICMP is an optional field that restricts the rule to apply to a specific type and code of ICMP traffic. This should only be specified if the Protocol field is set to "ICMP" or "ICMPv6". properties: code: description: Match on a specific ICMP code. If specified, the Type value must also be specified. This is a technical limitation imposed by the kernel's iptables firewall, which Calico uses to enforce the rule. type: integer type: description: Match on a specific ICMP type. For example a value of 8 refers to ICMP Echo Request (i.e. pings). type: integer type: object ipVersion: description: IPVersion is an optional field that restricts the rule to only match a specific IP version. type: integer metadata: description: Metadata contains additional information for this rule properties: annotations: additionalProperties: type: string description: Annotations is a set of key value pairs that give extra information about the rule type: object type: object notICMP: description: NotICMP is the negated version of the ICMP field. properties: code: description: Match on a specific ICMP code. If specified, the Type value must also be specified. This is a technical limitation imposed by the kernel's iptables firewall, which Calico uses to enforce the rule. type: integer type: description: Match on a specific ICMP type. For example a value of 8 refers to ICMP Echo Request (i.e. pings). type: integer type: object notProtocol: anyOf: - type: integer - type: string description: NotProtocol is the negated version of the Protocol field. pattern: ^.* x-kubernetes-int-or-string: true protocol: anyOf: - type: integer - type: string description: "Protocol is an optional field that restricts the rule to only apply to traffic of a specific IP protocol. Required if any of the EntityRules contain Ports (because ports only apply to certain protocols). \n Must be one of these string values: \"TCP\", \"UDP\", \"ICMP\", \"ICMPv6\", \"SCTP\", \"UDPLite\" or an integer in the range 1-255." pattern: ^.* x-kubernetes-int-or-string: true source: description: Source contains the match criteria that apply to source entity. properties: namespaceSelector: description: "NamespaceSelector is an optional field that contains a selector expression. Only traffic that originates from (or terminates at) endpoints within the selected namespaces will be matched. When both NamespaceSelector and another selector are defined on the same rule, then only workload endpoints that are matched by both selectors will be selected by the rule. \n For NetworkPolicy, an empty NamespaceSelector implies that the Selector is limited to selecting only workload endpoints in the same namespace as the NetworkPolicy. \n For NetworkPolicy, `global()` NamespaceSelector implies that the Selector is limited to selecting only GlobalNetworkSet or HostEndpoint. \n For GlobalNetworkPolicy, an empty NamespaceSelector implies the Selector applies to workload endpoints across all namespaces." type: string nets: description: Nets is an optional field that restricts the rule to only apply to traffic that originates from (or terminates at) IP addresses in any of the given subnets. items: type: string type: array notNets: description: NotNets is the negated version of the Nets field. items: type: string type: array notPorts: description: NotPorts is the negated version of the Ports field. Since only some protocols have ports, if any ports are specified it requires the Protocol match in the Rule to be set to "TCP" or "UDP". items: anyOf: - type: integer - type: string pattern: ^.* x-kubernetes-int-or-string: true type: array notSelector: description: NotSelector is the negated version of the Selector field. See Selector field for subtleties with negated selectors. type: string ports: description: "Ports is an optional field that restricts the rule to only apply to traffic that has a source (destination) port that matches one of these ranges/values. This value is a list of integers or strings that represent ranges of ports. \n Since only some protocols have ports, if any ports are specified it requires the Protocol match in the Rule to be set to \"TCP\" or \"UDP\"." items: anyOf: - type: integer - type: string pattern: ^.* x-kubernetes-int-or-string: true type: array selector: description: "Selector is an optional field that contains a selector expression (see Policy for sample syntax). \ Only traffic that originates from (terminates at) endpoints matching the selector will be matched. \n Note that: in addition to the negated version of the Selector (see NotSelector below), the selector expression syntax itself supports negation. The two types of negation are subtly different. One negates the set of matched endpoints, the other negates the whole match: \n \tSelector = \"!has(my_label)\" matches packets that are from other Calico-controlled \tendpoints that do not have the label \"my_label\". \n \tNotSelector = \"has(my_label)\" matches packets that are not from Calico-controlled \tendpoints that do have the label \"my_label\". \n The effect is that the latter will accept packets from non-Calico sources whereas the former is limited to packets from Calico-controlled endpoints." type: string serviceAccounts: description: ServiceAccounts is an optional field that restricts the rule to only apply to traffic that originates from (or terminates at) a pod running as a matching service account. properties: names: description: Names is an optional field that restricts the rule to only apply to traffic that originates from (or terminates at) a pod running as a service account whose name is in the list. items: type: string type: array selector: description: Selector is an optional field that restricts the rule to only apply to traffic that originates from (or terminates at) a pod running as a service account that matches the given label selector. If both Names and Selector are specified then they are AND'ed. type: string type: object services: description: "Services is an optional field that contains options for matching Kubernetes Services. If specified, only traffic that originates from or terminates at endpoints within the selected service(s) will be matched, and only to/from each endpoint's port. \n Services cannot be specified on the same rule as Selector, NotSelector, NamespaceSelector, Nets, NotNets or ServiceAccounts. \n Ports and NotPorts can only be specified with Services on ingress rules." properties: name: description: Name specifies the name of a Kubernetes Service to match. type: string namespace: description: Namespace specifies the namespace of the given Service. If left empty, the rule will match within this policy's namespace. type: string type: object type: object required: - action type: object type: array namespaceSelector: description: NamespaceSelector is an optional field for an expression used to select a pod based on namespaces. type: string order: description: Order is an optional field that specifies the order in which the policy is applied. Policies with higher "order" are applied after those with lower order. If the order is omitted, it may be considered to be "infinite" - i.e. the policy will be applied last. Policies with identical order will be applied in alphanumerical order based on the Policy "Name". type: number preDNAT: description: PreDNAT indicates to apply the rules in this policy before any DNAT. type: boolean selector: description: "The selector is an expression used to pick pick out the endpoints that the policy should be applied to. \n Selector expressions follow this syntax: \n \tlabel == \"string_literal\" \ -> comparison, e.g. my_label == \"foo bar\" \tlabel != \"string_literal\" \ -> not equal; also matches if label is not present \tlabel in { \"a\", \"b\", \"c\", ... } -> true if the value of label X is one of \"a\", \"b\", \"c\" \tlabel not in { \"a\", \"b\", \"c\", ... } -> true if the value of label X is not one of \"a\", \"b\", \"c\" \thas(label_name) -> True if that label is present \t! expr -> negation of expr \texpr && expr -> Short-circuit and \texpr || expr -> Short-circuit or \t( expr ) -> parens for grouping \tall() or the empty selector -> matches all endpoints. \n Label names are allowed to contain alphanumerics, -, _ and /. String literals are more permissive but they do not support escape characters. \n Examples (with made-up labels): \n \ttype == \"webserver\" && deployment == \"prod\" \ttype in {\"frontend\", \"backend\"} \tdeployment != \"dev\" \t! has(label_name)" type: string serviceAccountSelector: description: ServiceAccountSelector is an optional field for an expression used to select a pod based on service accounts. type: string types: description: "Types indicates whether this policy applies to ingress, or to egress, or to both. When not explicitly specified (and so the value on creation is empty or nil), Calico defaults Types according to what Ingress and Egress rules are present in the policy. The default is: \n - [ PolicyTypeIngress ], if there are no Egress rules (including the case where there are also no Ingress rules) \n - [ PolicyTypeEgress ], if there are Egress rules but no Ingress rules \n - [ PolicyTypeIngress, PolicyTypeEgress ], if there are both Ingress and Egress rules. \n When the policy is read back again, Types will always be one of these values, never empty or nil." items: description: PolicyType enumerates the possible values of the PolicySpec Types field. type: string type: array type: object type: object served: true storage: true status: acceptedNames: kind: "" plural: "" conditions: [] storedVersions: [] --- apiVersion: apiextensions.k8s.io/v1 kind: CustomResourceDefinition metadata: name: globalnetworksets.crd.projectcalico.org spec: group: crd.projectcalico.org names: kind: GlobalNetworkSet listKind: GlobalNetworkSetList plural: globalnetworksets singular: globalnetworkset scope: Cluster versions: - name: v1 schema: openAPIV3Schema: description: GlobalNetworkSet contains a set of arbitrary IP sub-networks/CIDRs that share labels to allow rules to refer to them via selectors. The labels of GlobalNetworkSet are not namespaced. properties: apiVersion: description: 'APIVersion defines the versioned schema of this representation of an object. Servers should convert recognized schemas to the latest internal value, and may reject unrecognized values. More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#resources' type: string kind: description: 'Kind is a string value representing the REST resource this object represents. Servers may infer this from the endpoint the client submits requests to. Cannot be updated. In CamelCase. More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#types-kinds' type: string metadata: type: object spec: description: GlobalNetworkSetSpec contains the specification for a NetworkSet resource. properties: nets: description: The list of IP networks that belong to this set. items: type: string type: array type: object type: object served: true storage: true status: acceptedNames: kind: "" plural: "" conditions: [] storedVersions: [] --- apiVersion: apiextensions.k8s.io/v1 kind: CustomResourceDefinition metadata: name: hostendpoints.crd.projectcalico.org spec: group: crd.projectcalico.org names: kind: HostEndpoint listKind: HostEndpointList plural: hostendpoints singular: hostendpoint scope: Cluster versions: - name: v1 schema: openAPIV3Schema: properties: apiVersion: description: 'APIVersion defines the versioned schema of this representation of an object. Servers should convert recognized schemas to the latest internal value, and may reject unrecognized values. More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#resources' type: string kind: description: 'Kind is a string value representing the REST resource this object represents. Servers may infer this from the endpoint the client submits requests to. Cannot be updated. In CamelCase. More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#types-kinds' type: string metadata: type: object spec: description: HostEndpointSpec contains the specification for a HostEndpoint resource. properties: expectedIPs: description: "The expected IP addresses (IPv4 and IPv6) of the endpoint. If \"InterfaceName\" is not present, Calico will look for an interface matching any of the IPs in the list and apply policy to that. Note: \tWhen using the selector match criteria in an ingress or egress security Policy \tor Profile, Calico converts the selector into a set of IP addresses. For host \tendpoints, the ExpectedIPs field is used for that purpose. (If only the interface \tname is specified, Calico does not learn the IPs of the interface for use in match \tcriteria.)" items: type: string type: array interfaceName: description: "Either \"*\", or the name of a specific Linux interface to apply policy to; or empty. \"*\" indicates that this HostEndpoint governs all traffic to, from or through the default network namespace of the host named by the \"Node\" field; entering and leaving that namespace via any interface, including those from/to non-host-networked local workloads. \n If InterfaceName is not \"*\", this HostEndpoint only governs traffic that enters or leaves the host through the specific interface named by InterfaceName, or - when InterfaceName is empty - through the specific interface that has one of the IPs in ExpectedIPs. Therefore, when InterfaceName is empty, at least one expected IP must be specified. Only external interfaces (such as \"eth0\") are supported here; it isn't possible for a HostEndpoint to protect traffic through a specific local workload interface. \n Note: Only some kinds of policy are implemented for \"*\" HostEndpoints; initially just pre-DNAT policy. Please check Calico documentation for the latest position." type: string node: description: The node name identifying the Calico node instance. type: string ports: description: Ports contains the endpoint's named ports, which may be referenced in security policy rules. items: properties: name: type: string port: type: integer protocol: anyOf: - type: integer - type: string pattern: ^.* x-kubernetes-int-or-string: true required: - name - port - protocol type: object type: array profiles: description: A list of identifiers of security Profile objects that apply to this endpoint. Each profile is applied in the order that they appear in this list. Profile rules are applied after the selector-based security policy. items: type: string type: array type: object type: object served: true storage: true status: acceptedNames: kind: "" plural: "" conditions: [] storedVersions: [] --- apiVersion: apiextensions.k8s.io/v1 kind: CustomResourceDefinition metadata: name: ipamblocks.crd.projectcalico.org spec: group: crd.projectcalico.org names: kind: IPAMBlock listKind: IPAMBlockList plural: ipamblocks singular: ipamblock scope: Cluster versions: - name: v1 schema: openAPIV3Schema: properties: apiVersion: description: 'APIVersion defines the versioned schema of this representation of an object. Servers should convert recognized schemas to the latest internal value, and may reject unrecognized values. More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#resources' type: string kind: description: 'Kind is a string value representing the REST resource this object represents. Servers may infer this from the endpoint the client submits requests to. Cannot be updated. In CamelCase. More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#types-kinds' type: string metadata: type: object spec: description: IPAMBlockSpec contains the specification for an IPAMBlock resource. properties: affinity: type: string allocations: items: type: integer # TODO: This nullable is manually added in. We should update controller-gen # to handle []*int properly itself. nullable: true type: array attributes: items: properties: handle_id: type: string secondary: additionalProperties: type: string type: object type: object type: array cidr: type: string deleted: type: boolean strictAffinity: type: boolean unallocated: items: type: integer type: array required: - allocations - attributes - cidr - strictAffinity - unallocated type: object type: object served: true storage: true status: acceptedNames: kind: "" plural: "" conditions: [] storedVersions: [] --- apiVersion: apiextensions.k8s.io/v1 kind: CustomResourceDefinition metadata: name: ipamconfigs.crd.projectcalico.org spec: group: crd.projectcalico.org names: kind: IPAMConfig listKind: IPAMConfigList plural: ipamconfigs singular: ipamconfig scope: Cluster versions: - name: v1 schema: openAPIV3Schema: properties: apiVersion: description: 'APIVersion defines the versioned schema of this representation of an object. Servers should convert recognized schemas to the latest internal value, and may reject unrecognized values. More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#resources' type: string kind: description: 'Kind is a string value representing the REST resource this object represents. Servers may infer this from the endpoint the client submits requests to. Cannot be updated. In CamelCase. More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#types-kinds' type: string metadata: type: object spec: description: IPAMConfigSpec contains the specification for an IPAMConfig resource. properties: autoAllocateBlocks: type: boolean maxBlocksPerHost: description: MaxBlocksPerHost, if non-zero, is the max number of blocks that can be affine to each host. type: integer strictAffinity: type: boolean required: - autoAllocateBlocks - strictAffinity type: object type: object served: true storage: true status: acceptedNames: kind: "" plural: "" conditions: [] storedVersions: [] --- apiVersion: apiextensions.k8s.io/v1 kind: CustomResourceDefinition metadata: name: ipamhandles.crd.projectcalico.org spec: group: crd.projectcalico.org names: kind: IPAMHandle listKind: IPAMHandleList plural: ipamhandles singular: ipamhandle scope: Cluster versions: - name: v1 schema: openAPIV3Schema: properties: apiVersion: description: 'APIVersion defines the versioned schema of this representation of an object. Servers should convert recognized schemas to the latest internal value, and may reject unrecognized values. More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#resources' type: string kind: description: 'Kind is a string value representing the REST resource this object represents. Servers may infer this from the endpoint the client submits requests to. Cannot be updated. In CamelCase. More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#types-kinds' type: string metadata: type: object spec: description: IPAMHandleSpec contains the specification for an IPAMHandle resource. properties: block: additionalProperties: type: integer type: object deleted: type: boolean handleID: type: string required: - block - handleID type: object type: object served: true storage: true status: acceptedNames: kind: "" plural: "" conditions: [] storedVersions: [] --- apiVersion: apiextensions.k8s.io/v1 kind: CustomResourceDefinition metadata: name: ippools.crd.projectcalico.org spec: group: crd.projectcalico.org names: kind: IPPool listKind: IPPoolList plural: ippools singular: ippool scope: Cluster versions: - name: v1 schema: openAPIV3Schema: properties: apiVersion: description: 'APIVersion defines the versioned schema of this representation of an object. Servers should convert recognized schemas to the latest internal value, and may reject unrecognized values. More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#resources' type: string kind: description: 'Kind is a string value representing the REST resource this object represents. Servers may infer this from the endpoint the client submits requests to. Cannot be updated. In CamelCase. More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#types-kinds' type: string metadata: type: object spec: description: IPPoolSpec contains the specification for an IPPool resource. properties: allowedUses: description: AllowedUse controls what the IP pool will be used for. If not specified or empty, defaults to ["Tunnel", "Workload"] for back-compatibility items: type: string type: array blockSize: description: The block size to use for IP address assignments from this pool. Defaults to 26 for IPv4 and 112 for IPv6. type: integer cidr: description: The pool CIDR. type: string disabled: description: When disabled is true, Calico IPAM will not assign addresses from this pool. type: boolean disableBGPExport: description: 'Disable exporting routes from this IP Pool’s CIDR over BGP. [Default: false]' type: boolean ipip: description: 'Deprecated: this field is only used for APIv1 backwards compatibility. Setting this field is not allowed, this field is for internal use only.' properties: enabled: description: When enabled is true, ipip tunneling will be used to deliver packets to destinations within this pool. type: boolean mode: description: The IPIP mode. This can be one of "always" or "cross-subnet". A mode of "always" will also use IPIP tunneling for routing to destination IP addresses within this pool. A mode of "cross-subnet" will only use IPIP tunneling when the destination node is on a different subnet to the originating node. The default value (if not specified) is "always". type: string type: object ipipMode: description: Contains configuration for IPIP tunneling for this pool. If not specified, then this is defaulted to "Never" (i.e. IPIP tunneling is disabled). type: string nat-outgoing: description: 'Deprecated: this field is only used for APIv1 backwards compatibility. Setting this field is not allowed, this field is for internal use only.' type: boolean natOutgoing: description: When nat-outgoing is true, packets sent from Calico networked containers in this pool to destinations outside of this pool will be masqueraded. type: boolean nodeSelector: description: Allows IPPool to allocate for a specific node by label selector. type: string vxlanMode: description: Contains configuration for VXLAN tunneling for this pool. If not specified, then this is defaulted to "Never" (i.e. VXLAN tunneling is disabled). type: string required: - cidr type: object type: object served: true storage: true status: acceptedNames: kind: "" plural: "" conditions: [] storedVersions: [] --- apiVersion: apiextensions.k8s.io/v1 kind: CustomResourceDefinition metadata: name: ipreservations.crd.projectcalico.org spec: group: crd.projectcalico.org names: kind: IPReservation listKind: IPReservationList plural: ipreservations singular: ipreservation scope: Cluster versions: - name: v1 schema: openAPIV3Schema: properties: apiVersion: description: 'APIVersion defines the versioned schema of this representation of an object. Servers should convert recognized schemas to the latest internal value, and may reject unrecognized values. More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#resources' type: string kind: description: 'Kind is a string value representing the REST resource this object represents. Servers may infer this from the endpoint the client submits requests to. Cannot be updated. In CamelCase. More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#types-kinds' type: string metadata: type: object spec: description: IPReservationSpec contains the specification for an IPReservation resource. properties: reservedCIDRs: description: ReservedCIDRs is a list of CIDRs and/or IP addresses that Calico IPAM will exclude from new allocations. items: type: string type: array type: object type: object served: true storage: true status: acceptedNames: kind: "" plural: "" conditions: [] storedVersions: [] --- apiVersion: apiextensions.k8s.io/v1 kind: CustomResourceDefinition metadata: name: kubecontrollersconfigurations.crd.projectcalico.org spec: group: crd.projectcalico.org names: kind: KubeControllersConfiguration listKind: KubeControllersConfigurationList plural: kubecontrollersconfigurations singular: kubecontrollersconfiguration scope: Cluster versions: - name: v1 schema: openAPIV3Schema: properties: apiVersion: description: 'APIVersion defines the versioned schema of this representation of an object. Servers should convert recognized schemas to the latest internal value, and may reject unrecognized values. More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#resources' type: string kind: description: 'Kind is a string value representing the REST resource this object represents. Servers may infer this from the endpoint the client submits requests to. Cannot be updated. In CamelCase. More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#types-kinds' type: string metadata: type: object spec: description: KubeControllersConfigurationSpec contains the values of the Kubernetes controllers configuration. properties: controllers: description: Controllers enables and configures individual Kubernetes controllers properties: namespace: description: Namespace enables and configures the namespace controller. Enabled by default, set to nil to disable. properties: reconcilerPeriod: description: 'ReconcilerPeriod is the period to perform reconciliation with the Calico datastore. [Default: 5m]' type: string type: object node: description: Node enables and configures the node controller. Enabled by default, set to nil to disable. properties: hostEndpoint: description: HostEndpoint controls syncing nodes to host endpoints. Disabled by default, set to nil to disable. properties: autoCreate: description: 'AutoCreate enables automatic creation of host endpoints for every node. [Default: Disabled]' type: string type: object leakGracePeriod: description: 'LeakGracePeriod is the period used by the controller to determine if an IP address has been leaked. Set to 0 to disable IP garbage collection. [Default: 15m]' type: string reconcilerPeriod: description: 'ReconcilerPeriod is the period to perform reconciliation with the Calico datastore. [Default: 5m]' type: string syncLabels: description: 'SyncLabels controls whether to copy Kubernetes node labels to Calico nodes. [Default: Enabled]' type: string type: object policy: description: Policy enables and configures the policy controller. Enabled by default, set to nil to disable. properties: reconcilerPeriod: description: 'ReconcilerPeriod is the period to perform reconciliation with the Calico datastore. [Default: 5m]' type: string type: object serviceAccount: description: ServiceAccount enables and configures the service account controller. Enabled by default, set to nil to disable. properties: reconcilerPeriod: description: 'ReconcilerPeriod is the period to perform reconciliation with the Calico datastore. [Default: 5m]' type: string type: object workloadEndpoint: description: WorkloadEndpoint enables and configures the workload endpoint controller. Enabled by default, set to nil to disable. properties: reconcilerPeriod: description: 'ReconcilerPeriod is the period to perform reconciliation with the Calico datastore. [Default: 5m]' type: string type: object type: object etcdV3CompactionPeriod: description: 'EtcdV3CompactionPeriod is the period between etcdv3 compaction requests. Set to 0 to disable. [Default: 10m]' type: string healthChecks: description: 'HealthChecks enables or disables support for health checks [Default: Enabled]' type: string logSeverityScreen: description: 'LogSeverityScreen is the log severity above which logs are sent to the stdout. [Default: Info]' type: string prometheusMetricsPort: description: 'PrometheusMetricsPort is the TCP port that the Prometheus metrics server should bind to. Set to 0 to disable. [Default: 9094]' type: integer required: - controllers type: object status: description: KubeControllersConfigurationStatus represents the status of the configuration. It's useful for admins to be able to see the actual config that was applied, which can be modified by environment variables on the kube-controllers process. properties: environmentVars: additionalProperties: type: string description: EnvironmentVars contains the environment variables on the kube-controllers that influenced the RunningConfig. type: object runningConfig: description: RunningConfig contains the effective config that is running in the kube-controllers pod, after merging the API resource with any environment variables. properties: controllers: description: Controllers enables and configures individual Kubernetes controllers properties: namespace: description: Namespace enables and configures the namespace controller. Enabled by default, set to nil to disable. properties: reconcilerPeriod: description: 'ReconcilerPeriod is the period to perform reconciliation with the Calico datastore. [Default: 5m]' type: string type: object node: description: Node enables and configures the node controller. Enabled by default, set to nil to disable. properties: hostEndpoint: description: HostEndpoint controls syncing nodes to host endpoints. Disabled by default, set to nil to disable. properties: autoCreate: description: 'AutoCreate enables automatic creation of host endpoints for every node. [Default: Disabled]' type: string type: object leakGracePeriod: description: 'LeakGracePeriod is the period used by the controller to determine if an IP address has been leaked. Set to 0 to disable IP garbage collection. [Default: 15m]' type: string reconcilerPeriod: description: 'ReconcilerPeriod is the period to perform reconciliation with the Calico datastore. [Default: 5m]' type: string syncLabels: description: 'SyncLabels controls whether to copy Kubernetes node labels to Calico nodes. [Default: Enabled]' type: string type: object policy: description: Policy enables and configures the policy controller. Enabled by default, set to nil to disable. properties: reconcilerPeriod: description: 'ReconcilerPeriod is the period to perform reconciliation with the Calico datastore. [Default: 5m]' type: string type: object serviceAccount: description: ServiceAccount enables and configures the service account controller. Enabled by default, set to nil to disable. properties: reconcilerPeriod: description: 'ReconcilerPeriod is the period to perform reconciliation with the Calico datastore. [Default: 5m]' type: string type: object workloadEndpoint: description: WorkloadEndpoint enables and configures the workload endpoint controller. Enabled by default, set to nil to disable. properties: reconcilerPeriod: description: 'ReconcilerPeriod is the period to perform reconciliation with the Calico datastore. [Default: 5m]' type: string type: object type: object etcdV3CompactionPeriod: description: 'EtcdV3CompactionPeriod is the period between etcdv3 compaction requests. Set to 0 to disable. [Default: 10m]' type: string healthChecks: description: 'HealthChecks enables or disables support for health checks [Default: Enabled]' type: string logSeverityScreen: description: 'LogSeverityScreen is the log severity above which logs are sent to the stdout. [Default: Info]' type: string prometheusMetricsPort: description: 'PrometheusMetricsPort is the TCP port that the Prometheus metrics server should bind to. Set to 0 to disable. [Default: 9094]' type: integer required: - controllers type: object type: object type: object served: true storage: true status: acceptedNames: kind: "" plural: "" conditions: [] storedVersions: [] --- apiVersion: apiextensions.k8s.io/v1 kind: CustomResourceDefinition metadata: name: networkpolicies.crd.projectcalico.org spec: group: crd.projectcalico.org names: kind: NetworkPolicy listKind: NetworkPolicyList plural: networkpolicies singular: networkpolicy scope: Namespaced versions: - name: v1 schema: openAPIV3Schema: properties: apiVersion: description: 'APIVersion defines the versioned schema of this representation of an object. Servers should convert recognized schemas to the latest internal value, and may reject unrecognized values. More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#resources' type: string kind: description: 'Kind is a string value representing the REST resource this object represents. Servers may infer this from the endpoint the client submits requests to. Cannot be updated. In CamelCase. More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#types-kinds' type: string metadata: type: object spec: properties: egress: description: The ordered set of egress rules. Each rule contains a set of packet match criteria and a corresponding action to apply. items: description: "A Rule encapsulates a set of match criteria and an action. Both selector-based security Policy and security Profiles reference rules - separated out as a list of rules for both ingress and egress packet matching. \n Each positive match criteria has a negated version, prefixed with \"Not\". All the match criteria within a rule must be satisfied for a packet to match. A single rule can contain the positive and negative version of a match and both must be satisfied for the rule to match." properties: action: type: string destination: description: Destination contains the match criteria that apply to destination entity. properties: namespaceSelector: description: "NamespaceSelector is an optional field that contains a selector expression. Only traffic that originates from (or terminates at) endpoints within the selected namespaces will be matched. When both NamespaceSelector and another selector are defined on the same rule, then only workload endpoints that are matched by both selectors will be selected by the rule. \n For NetworkPolicy, an empty NamespaceSelector implies that the Selector is limited to selecting only workload endpoints in the same namespace as the NetworkPolicy. \n For NetworkPolicy, `global()` NamespaceSelector implies that the Selector is limited to selecting only GlobalNetworkSet or HostEndpoint. \n For GlobalNetworkPolicy, an empty NamespaceSelector implies the Selector applies to workload endpoints across all namespaces." type: string nets: description: Nets is an optional field that restricts the rule to only apply to traffic that originates from (or terminates at) IP addresses in any of the given subnets. items: type: string type: array notNets: description: NotNets is the negated version of the Nets field. items: type: string type: array notPorts: description: NotPorts is the negated version of the Ports field. Since only some protocols have ports, if any ports are specified it requires the Protocol match in the Rule to be set to "TCP" or "UDP". items: anyOf: - type: integer - type: string pattern: ^.* x-kubernetes-int-or-string: true type: array notSelector: description: NotSelector is the negated version of the Selector field. See Selector field for subtleties with negated selectors. type: string ports: description: "Ports is an optional field that restricts the rule to only apply to traffic that has a source (destination) port that matches one of these ranges/values. This value is a list of integers or strings that represent ranges of ports. \n Since only some protocols have ports, if any ports are specified it requires the Protocol match in the Rule to be set to \"TCP\" or \"UDP\"." items: anyOf: - type: integer - type: string pattern: ^.* x-kubernetes-int-or-string: true type: array selector: description: "Selector is an optional field that contains a selector expression (see Policy for sample syntax). \ Only traffic that originates from (terminates at) endpoints matching the selector will be matched. \n Note that: in addition to the negated version of the Selector (see NotSelector below), the selector expression syntax itself supports negation. The two types of negation are subtly different. One negates the set of matched endpoints, the other negates the whole match: \n \tSelector = \"!has(my_label)\" matches packets that are from other Calico-controlled \tendpoints that do not have the label \"my_label\". \n \tNotSelector = \"has(my_label)\" matches packets that are not from Calico-controlled \tendpoints that do have the label \"my_label\". \n The effect is that the latter will accept packets from non-Calico sources whereas the former is limited to packets from Calico-controlled endpoints." type: string serviceAccounts: description: ServiceAccounts is an optional field that restricts the rule to only apply to traffic that originates from (or terminates at) a pod running as a matching service account. properties: names: description: Names is an optional field that restricts the rule to only apply to traffic that originates from (or terminates at) a pod running as a service account whose name is in the list. items: type: string type: array selector: description: Selector is an optional field that restricts the rule to only apply to traffic that originates from (or terminates at) a pod running as a service account that matches the given label selector. If both Names and Selector are specified then they are AND'ed. type: string type: object services: description: "Services is an optional field that contains options for matching Kubernetes Services. If specified, only traffic that originates from or terminates at endpoints within the selected service(s) will be matched, and only to/from each endpoint's port. \n Services cannot be specified on the same rule as Selector, NotSelector, NamespaceSelector, Nets, NotNets or ServiceAccounts. \n Ports and NotPorts can only be specified with Services on ingress rules." properties: name: description: Name specifies the name of a Kubernetes Service to match. type: string namespace: description: Namespace specifies the namespace of the given Service. If left empty, the rule will match within this policy's namespace. type: string type: object type: object http: description: HTTP contains match criteria that apply to HTTP requests. properties: methods: description: Methods is an optional field that restricts the rule to apply only to HTTP requests that use one of the listed HTTP Methods (e.g. GET, PUT, etc.) Multiple methods are OR'd together. items: type: string type: array paths: description: 'Paths is an optional field that restricts the rule to apply to HTTP requests that use one of the listed HTTP Paths. Multiple paths are OR''d together. e.g: - exact: /foo - prefix: /bar NOTE: Each entry may ONLY specify either a `exact` or a `prefix` match. The validator will check for it.' items: description: 'HTTPPath specifies an HTTP path to match. It may be either of the form: exact: <path>: which matches the path exactly or prefix: <path-prefix>: which matches the path prefix' properties: exact: type: string prefix: type: string type: object type: array type: object icmp: description: ICMP is an optional field that restricts the rule to apply to a specific type and code of ICMP traffic. This should only be specified if the Protocol field is set to "ICMP" or "ICMPv6". properties: code: description: Match on a specific ICMP code. If specified, the Type value must also be specified. This is a technical limitation imposed by the kernel's iptables firewall, which Calico uses to enforce the rule. type: integer type: description: Match on a specific ICMP type. For example a value of 8 refers to ICMP Echo Request (i.e. pings). type: integer type: object ipVersion: description: IPVersion is an optional field that restricts the rule to only match a specific IP version. type: integer metadata: description: Metadata contains additional information for this rule properties: annotations: additionalProperties: type: string description: Annotations is a set of key value pairs that give extra information about the rule type: object type: object notICMP: description: NotICMP is the negated version of the ICMP field. properties: code: description: Match on a specific ICMP code. If specified, the Type value must also be specified. This is a technical limitation imposed by the kernel's iptables firewall, which Calico uses to enforce the rule. type: integer type: description: Match on a specific ICMP type. For example a value of 8 refers to ICMP Echo Request (i.e. pings). type: integer type: object notProtocol: anyOf: - type: integer - type: string description: NotProtocol is the negated version of the Protocol field. pattern: ^.* x-kubernetes-int-or-string: true protocol: anyOf: - type: integer - type: string description: "Protocol is an optional field that restricts the rule to only apply to traffic of a specific IP protocol. Required if any of the EntityRules contain Ports (because ports only apply to certain protocols). \n Must be one of these string values: \"TCP\", \"UDP\", \"ICMP\", \"ICMPv6\", \"SCTP\", \"UDPLite\" or an integer in the range 1-255." pattern: ^.* x-kubernetes-int-or-string: true source: description: Source contains the match criteria that apply to source entity. properties: namespaceSelector: description: "NamespaceSelector is an optional field that contains a selector expression. Only traffic that originates from (or terminates at) endpoints within the selected namespaces will be matched. When both NamespaceSelector and another selector are defined on the same rule, then only workload endpoints that are matched by both selectors will be selected by the rule. \n For NetworkPolicy, an empty NamespaceSelector implies that the Selector is limited to selecting only workload endpoints in the same namespace as the NetworkPolicy. \n For NetworkPolicy, `global()` NamespaceSelector implies that the Selector is limited to selecting only GlobalNetworkSet or HostEndpoint. \n For GlobalNetworkPolicy, an empty NamespaceSelector implies the Selector applies to workload endpoints across all namespaces." type: string nets: description: Nets is an optional field that restricts the rule to only apply to traffic that originates from (or terminates at) IP addresses in any of the given subnets. items: type: string type: array notNets: description: NotNets is the negated version of the Nets field. items: type: string type: array notPorts: description: NotPorts is the negated version of the Ports field. Since only some protocols have ports, if any ports are specified it requires the Protocol match in the Rule to be set to "TCP" or "UDP". items: anyOf: - type: integer - type: string pattern: ^.* x-kubernetes-int-or-string: true type: array notSelector: description: NotSelector is the negated version of the Selector field. See Selector field for subtleties with negated selectors. type: string ports: description: "Ports is an optional field that restricts the rule to only apply to traffic that has a source (destination) port that matches one of these ranges/values. This value is a list of integers or strings that represent ranges of ports. \n Since only some protocols have ports, if any ports are specified it requires the Protocol match in the Rule to be set to \"TCP\" or \"UDP\"." items: anyOf: - type: integer - type: string pattern: ^.* x-kubernetes-int-or-string: true type: array selector: description: "Selector is an optional field that contains a selector expression (see Policy for sample syntax). \ Only traffic that originates from (terminates at) endpoints matching the selector will be matched. \n Note that: in addition to the negated version of the Selector (see NotSelector below), the selector expression syntax itself supports negation. The two types of negation are subtly different. One negates the set of matched endpoints, the other negates the whole match: \n \tSelector = \"!has(my_label)\" matches packets that are from other Calico-controlled \tendpoints that do not have the label \"my_label\". \n \tNotSelector = \"has(my_label)\" matches packets that are not from Calico-controlled \tendpoints that do have the label \"my_label\". \n The effect is that the latter will accept packets from non-Calico sources whereas the former is limited to packets from Calico-controlled endpoints." type: string serviceAccounts: description: ServiceAccounts is an optional field that restricts the rule to only apply to traffic that originates from (or terminates at) a pod running as a matching service account. properties: names: description: Names is an optional field that restricts the rule to only apply to traffic that originates from (or terminates at) a pod running as a service account whose name is in the list. items: type: string type: array selector: description: Selector is an optional field that restricts the rule to only apply to traffic that originates from (or terminates at) a pod running as a service account that matches the given label selector. If both Names and Selector are specified then they are AND'ed. type: string type: object services: description: "Services is an optional field that contains options for matching Kubernetes Services. If specified, only traffic that originates from or terminates at endpoints within the selected service(s) will be matched, and only to/from each endpoint's port. \n Services cannot be specified on the same rule as Selector, NotSelector, NamespaceSelector, Nets, NotNets or ServiceAccounts. \n Ports and NotPorts can only be specified with Services on ingress rules." properties: name: description: Name specifies the name of a Kubernetes Service to match. type: string namespace: description: Namespace specifies the namespace of the given Service. If left empty, the rule will match within this policy's namespace. type: string type: object type: object required: - action type: object type: array ingress: description: The ordered set of ingress rules. Each rule contains a set of packet match criteria and a corresponding action to apply. items: description: "A Rule encapsulates a set of match criteria and an action. Both selector-based security Policy and security Profiles reference rules - separated out as a list of rules for both ingress and egress packet matching. \n Each positive match criteria has a negated version, prefixed with \"Not\". All the match criteria within a rule must be satisfied for a packet to match. A single rule can contain the positive and negative version of a match and both must be satisfied for the rule to match." properties: action: type: string destination: description: Destination contains the match criteria that apply to destination entity. properties: namespaceSelector: description: "NamespaceSelector is an optional field that contains a selector expression. Only traffic that originates from (or terminates at) endpoints within the selected namespaces will be matched. When both NamespaceSelector and another selector are defined on the same rule, then only workload endpoints that are matched by both selectors will be selected by the rule. \n For NetworkPolicy, an empty NamespaceSelector implies that the Selector is limited to selecting only workload endpoints in the same namespace as the NetworkPolicy. \n For NetworkPolicy, `global()` NamespaceSelector implies that the Selector is limited to selecting only GlobalNetworkSet or HostEndpoint. \n For GlobalNetworkPolicy, an empty NamespaceSelector implies the Selector applies to workload endpoints across all namespaces." type: string nets: description: Nets is an optional field that restricts the rule to only apply to traffic that originates from (or terminates at) IP addresses in any of the given subnets. items: type: string type: array notNets: description: NotNets is the negated version of the Nets field. items: type: string type: array notPorts: description: NotPorts is the negated version of the Ports field. Since only some protocols have ports, if any ports are specified it requires the Protocol match in the Rule to be set to "TCP" or "UDP". items: anyOf: - type: integer - type: string pattern: ^.* x-kubernetes-int-or-string: true type: array notSelector: description: NotSelector is the negated version of the Selector field. See Selector field for subtleties with negated selectors. type: string ports: description: "Ports is an optional field that restricts the rule to only apply to traffic that has a source (destination) port that matches one of these ranges/values. This value is a list of integers or strings that represent ranges of ports. \n Since only some protocols have ports, if any ports are specified it requires the Protocol match in the Rule to be set to \"TCP\" or \"UDP\"." items: anyOf: - type: integer - type: string pattern: ^.* x-kubernetes-int-or-string: true type: array selector: description: "Selector is an optional field that contains a selector expression (see Policy for sample syntax). \ Only traffic that originates from (terminates at) endpoints matching the selector will be matched. \n Note that: in addition to the negated version of the Selector (see NotSelector below), the selector expression syntax itself supports negation. The two types of negation are subtly different. One negates the set of matched endpoints, the other negates the whole match: \n \tSelector = \"!has(my_label)\" matches packets that are from other Calico-controlled \tendpoints that do not have the label \"my_label\". \n \tNotSelector = \"has(my_label)\" matches packets that are not from Calico-controlled \tendpoints that do have the label \"my_label\". \n The effect is that the latter will accept packets from non-Calico sources whereas the former is limited to packets from Calico-controlled endpoints." type: string serviceAccounts: description: ServiceAccounts is an optional field that restricts the rule to only apply to traffic that originates from (or terminates at) a pod running as a matching service account. properties: names: description: Names is an optional field that restricts the rule to only apply to traffic that originates from (or terminates at) a pod running as a service account whose name is in the list. items: type: string type: array selector: description: Selector is an optional field that restricts the rule to only apply to traffic that originates from (or terminates at) a pod running as a service account that matches the given label selector. If both Names and Selector are specified then they are AND'ed. type: string type: object services: description: "Services is an optional field that contains options for matching Kubernetes Services. If specified, only traffic that originates from or terminates at endpoints within the selected service(s) will be matched, and only to/from each endpoint's port. \n Services cannot be specified on the same rule as Selector, NotSelector, NamespaceSelector, Nets, NotNets or ServiceAccounts. \n Ports and NotPorts can only be specified with Services on ingress rules." properties: name: description: Name specifies the name of a Kubernetes Service to match. type: string namespace: description: Namespace specifies the namespace of the given Service. If left empty, the rule will match within this policy's namespace. type: string type: object type: object http: description: HTTP contains match criteria that apply to HTTP requests. properties: methods: description: Methods is an optional field that restricts the rule to apply only to HTTP requests that use one of the listed HTTP Methods (e.g. GET, PUT, etc.) Multiple methods are OR'd together. items: type: string type: array paths: description: 'Paths is an optional field that restricts the rule to apply to HTTP requests that use one of the listed HTTP Paths. Multiple paths are OR''d together. e.g: - exact: /foo - prefix: /bar NOTE: Each entry may ONLY specify either a `exact` or a `prefix` match. The validator will check for it.' items: description: 'HTTPPath specifies an HTTP path to match. It may be either of the form: exact: <path>: which matches the path exactly or prefix: <path-prefix>: which matches the path prefix' properties: exact: type: string prefix: type: string type: object type: array type: object icmp: description: ICMP is an optional field that restricts the rule to apply to a specific type and code of ICMP traffic. This should only be specified if the Protocol field is set to "ICMP" or "ICMPv6". properties: code: description: Match on a specific ICMP code. If specified, the Type value must also be specified. This is a technical limitation imposed by the kernel's iptables firewall, which Calico uses to enforce the rule. type: integer type: description: Match on a specific ICMP type. For example a value of 8 refers to ICMP Echo Request (i.e. pings). type: integer type: object ipVersion: description: IPVersion is an optional field that restricts the rule to only match a specific IP version. type: integer metadata: description: Metadata contains additional information for this rule properties: annotations: additionalProperties: type: string description: Annotations is a set of key value pairs that give extra information about the rule type: object type: object notICMP: description: NotICMP is the negated version of the ICMP field. properties: code: description: Match on a specific ICMP code. If specified, the Type value must also be specified. This is a technical limitation imposed by the kernel's iptables firewall, which Calico uses to enforce the rule. type: integer type: description: Match on a specific ICMP type. For example a value of 8 refers to ICMP Echo Request (i.e. pings). type: integer type: object notProtocol: anyOf: - type: integer - type: string description: NotProtocol is the negated version of the Protocol field. pattern: ^.* x-kubernetes-int-or-string: true protocol: anyOf: - type: integer - type: string description: "Protocol is an optional field that restricts the rule to only apply to traffic of a specific IP protocol. Required if any of the EntityRules contain Ports (because ports only apply to certain protocols). \n Must be one of these string values: \"TCP\", \"UDP\", \"ICMP\", \"ICMPv6\", \"SCTP\", \"UDPLite\" or an integer in the range 1-255." pattern: ^.* x-kubernetes-int-or-string: true source: description: Source contains the match criteria that apply to source entity. properties: namespaceSelector: description: "NamespaceSelector is an optional field that contains a selector expression. Only traffic that originates from (or terminates at) endpoints within the selected namespaces will be matched. When both NamespaceSelector and another selector are defined on the same rule, then only workload endpoints that are matched by both selectors will be selected by the rule. \n For NetworkPolicy, an empty NamespaceSelector implies that the Selector is limited to selecting only workload endpoints in the same namespace as the NetworkPolicy. \n For NetworkPolicy, `global()` NamespaceSelector implies that the Selector is limited to selecting only GlobalNetworkSet or HostEndpoint. \n For GlobalNetworkPolicy, an empty NamespaceSelector implies the Selector applies to workload endpoints across all namespaces." type: string nets: description: Nets is an optional field that restricts the rule to only apply to traffic that originates from (or terminates at) IP addresses in any of the given subnets. items: type: string type: array notNets: description: NotNets is the negated version of the Nets field. items: type: string type: array notPorts: description: NotPorts is the negated version of the Ports field. Since only some protocols have ports, if any ports are specified it requires the Protocol match in the Rule to be set to "TCP" or "UDP". items: anyOf: - type: integer - type: string pattern: ^.* x-kubernetes-int-or-string: true type: array notSelector: description: NotSelector is the negated version of the Selector field. See Selector field for subtleties with negated selectors. type: string ports: description: "Ports is an optional field that restricts the rule to only apply to traffic that has a source (destination) port that matches one of these ranges/values. This value is a list of integers or strings that represent ranges of ports. \n Since only some protocols have ports, if any ports are specified it requires the Protocol match in the Rule to be set to \"TCP\" or \"UDP\"." items: anyOf: - type: integer - type: string pattern: ^.* x-kubernetes-int-or-string: true type: array selector: description: "Selector is an optional field that contains a selector expression (see Policy for sample syntax). \ Only traffic that originates from (terminates at) endpoints matching the selector will be matched. \n Note that: in addition to the negated version of the Selector (see NotSelector below), the selector expression syntax itself supports negation. The two types of negation are subtly different. One negates the set of matched endpoints, the other negates the whole match: \n \tSelector = \"!has(my_label)\" matches packets that are from other Calico-controlled \tendpoints that do not have the label \"my_label\". \n \tNotSelector = \"has(my_label)\" matches packets that are not from Calico-controlled \tendpoints that do have the label \"my_label\". \n The effect is that the latter will accept packets from non-Calico sources whereas the former is limited to packets from Calico-controlled endpoints." type: string serviceAccounts: description: ServiceAccounts is an optional field that restricts the rule to only apply to traffic that originates from (or terminates at) a pod running as a matching service account. properties: names: description: Names is an optional field that restricts the rule to only apply to traffic that originates from (or terminates at) a pod running as a service account whose name is in the list. items: type: string type: array selector: description: Selector is an optional field that restricts the rule to only apply to traffic that originates from (or terminates at) a pod running as a service account that matches the given label selector. If both Names and Selector are specified then they are AND'ed. type: string type: object services: description: "Services is an optional field that contains options for matching Kubernetes Services. If specified, only traffic that originates from or terminates at endpoints within the selected service(s) will be matched, and only to/from each endpoint's port. \n Services cannot be specified on the same rule as Selector, NotSelector, NamespaceSelector, Nets, NotNets or ServiceAccounts. \n Ports and NotPorts can only be specified with Services on ingress rules." properties: name: description: Name specifies the name of a Kubernetes Service to match. type: string namespace: description: Namespace specifies the namespace of the given Service. If left empty, the rule will match within this policy's namespace. type: string type: object type: object required: - action type: object type: array order: description: Order is an optional field that specifies the order in which the policy is applied. Policies with higher "order" are applied after those with lower order. If the order is omitted, it may be considered to be "infinite" - i.e. the policy will be applied last. Policies with identical order will be applied in alphanumerical order based on the Policy "Name". type: number selector: description: "The selector is an expression used to pick pick out the endpoints that the policy should be applied to. \n Selector expressions follow this syntax: \n \tlabel == \"string_literal\" \ -> comparison, e.g. my_label == \"foo bar\" \tlabel != \"string_literal\" \ -> not equal; also matches if label is not present \tlabel in { \"a\", \"b\", \"c\", ... } -> true if the value of label X is one of \"a\", \"b\", \"c\" \tlabel not in { \"a\", \"b\", \"c\", ... } -> true if the value of label X is not one of \"a\", \"b\", \"c\" \thas(label_name) -> True if that label is present \t! expr -> negation of expr \texpr && expr -> Short-circuit and \texpr || expr -> Short-circuit or \t( expr ) -> parens for grouping \tall() or the empty selector -> matches all endpoints. \n Label names are allowed to contain alphanumerics, -, _ and /. String literals are more permissive but they do not support escape characters. \n Examples (with made-up labels): \n \ttype == \"webserver\" && deployment == \"prod\" \ttype in {\"frontend\", \"backend\"} \tdeployment != \"dev\" \t! has(label_name)" type: string serviceAccountSelector: description: ServiceAccountSelector is an optional field for an expression used to select a pod based on service accounts. type: string types: description: "Types indicates whether this policy applies to ingress, or to egress, or to both. When not explicitly specified (and so the value on creation is empty or nil), Calico defaults Types according to what Ingress and Egress are present in the policy. The default is: \n - [ PolicyTypeIngress ], if there are no Egress rules (including the case where there are also no Ingress rules) \n - [ PolicyTypeEgress ], if there are Egress rules but no Ingress rules \n - [ PolicyTypeIngress, PolicyTypeEgress ], if there are both Ingress and Egress rules. \n When the policy is read back again, Types will always be one of these values, never empty or nil." items: description: PolicyType enumerates the possible values of the PolicySpec Types field. type: string type: array type: object type: object served: true storage: true status: acceptedNames: kind: "" plural: "" conditions: [] storedVersions: [] --- apiVersion: apiextensions.k8s.io/v1 kind: CustomResourceDefinition metadata: name: networksets.crd.projectcalico.org spec: group: crd.projectcalico.org names: kind: NetworkSet listKind: NetworkSetList plural: networksets singular: networkset scope: Namespaced versions: - name: v1 schema: openAPIV3Schema: description: NetworkSet is the Namespaced-equivalent of the GlobalNetworkSet. properties: apiVersion: description: 'APIVersion defines the versioned schema of this representation of an object. Servers should convert recognized schemas to the latest internal value, and may reject unrecognized values. More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#resources' type: string kind: description: 'Kind is a string value representing the REST resource this object represents. Servers may infer this from the endpoint the client submits requests to. Cannot be updated. In CamelCase. More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#types-kinds' type: string metadata: type: object spec: description: NetworkSetSpec contains the specification for a NetworkSet resource. properties: nets: description: The list of IP networks that belong to this set. items: type: string type: array type: object type: object served: true storage: true status: acceptedNames: kind: "" plural: "" conditions: [] storedVersions: [] --- --- # Source: calico/templates/calico-kube-controllers-rbac.yaml # Include a clusterrole for the kube-controllers component, # and bind it to the calico-kube-controllers serviceaccount. kind: ClusterRole apiVersion: rbac.authorization.k8s.io/v1 metadata: name: calico-kube-controllers rules: # Nodes are watched to monitor for deletions. - apiGroups: [""] resources: - nodes verbs: - watch - list - get # Pods are watched to check for existence as part of IPAM controller. - apiGroups: [""] resources: - pods verbs: - get - list - watch # IPAM resources are manipulated when nodes are deleted. - apiGroups: ["crd.projectcalico.org"] resources: - ippools - ipreservations verbs: - list - apiGroups: ["crd.projectcalico.org"] resources: - blockaffinities - ipamblocks - ipamhandles verbs: - get - list - create - update - delete - watch # kube-controllers manages hostendpoints. - apiGroups: ["crd.projectcalico.org"] resources: - hostendpoints verbs: - get - list - create - update - delete # Needs access to update clusterinformations. - apiGroups: ["crd.projectcalico.org"] resources: - clusterinformations verbs: - get - create - update # KubeControllersConfiguration is where it gets its config - apiGroups: ["crd.projectcalico.org"] resources: - kubecontrollersconfigurations verbs: # read its own config - get # create a default if none exists - create # update status - update # watch for changes - watch --- kind: ClusterRoleBinding apiVersion: rbac.authorization.k8s.io/v1 metadata: name: calico-kube-controllers roleRef: apiGroup: rbac.authorization.k8s.io kind: ClusterRole name: calico-kube-controllers subjects: - kind: ServiceAccount name: calico-kube-controllers namespace: kube-system --- --- # Source: calico/templates/calico-node-rbac.yaml # Include a clusterrole for the calico-node DaemonSet, # and bind it to the calico-node serviceaccount. kind: ClusterRole apiVersion: rbac.authorization.k8s.io/v1 metadata: name: calico-node rules: # The CNI plugin needs to get pods, nodes, and namespaces. - apiGroups: [""] resources: - pods - nodes - namespaces verbs: - get # EndpointSlices are used for Service-based network policy rule # enforcement. - apiGroups: ["discovery.k8s.io"] resources: - endpointslices verbs: - watch - list - apiGroups: [""] resources: - endpoints - services verbs: # Used to discover service IPs for advertisement. - watch - list # Used to discover Typhas. - get # Pod CIDR auto-detection on kubeadm needs access to config maps. - apiGroups: [""] resources: - configmaps verbs: - get - apiGroups: [""] resources: - nodes/status verbs: # Needed for clearing NodeNetworkUnavailable flag. - patch # Calico stores some configuration information in node annotations. - update # Watch for changes to Kubernetes NetworkPolicies. - apiGroups: ["networking.k8s.io"] resources: - networkpolicies verbs: - watch - list # Used by Calico for policy information. - apiGroups: [""] resources: - pods - namespaces - serviceaccounts verbs: - list - watch # The CNI plugin patches pods/status. - apiGroups: [""] resources: - pods/status verbs: - patch # Calico monitors various CRDs for config. - apiGroups: ["crd.projectcalico.org"] resources: - globalfelixconfigs - felixconfigurations - bgppeers - globalbgpconfigs - bgpconfigurations - ippools - ipreservations - ipamblocks - globalnetworkpolicies - globalnetworksets - networkpolicies - networksets - clusterinformations - hostendpoints - blockaffinities - caliconodestatuses verbs: - get - list - watch # Calico must create and update some CRDs on startup. - apiGroups: ["crd.projectcalico.org"] resources: - ippools - felixconfigurations - clusterinformations verbs: - create - update # Calico must update some CRDs. - apiGroups: [ "crd.projectcalico.org" ] resources: - caliconodestatuses verbs: - update # Calico stores some configuration information on the node. - apiGroups: [""] resources: - nodes verbs: - get - list - watch # These permissions are only required for upgrade from v2.6, and can # be removed after upgrade or on fresh installations. - apiGroups: ["crd.projectcalico.org"] resources: - bgpconfigurations - bgppeers verbs: - create - update # These permissions are required for Calico CNI to perform IPAM allocations. - apiGroups: ["crd.projectcalico.org"] resources: - blockaffinities - ipamblocks - ipamhandles verbs: - get - list - create - update - delete - apiGroups: ["crd.projectcalico.org"] resources: - ipamconfigs verbs: - get # Block affinities must also be watchable by confd for route aggregation. - apiGroups: ["crd.projectcalico.org"] resources: - blockaffinities verbs: - watch # The Calico IPAM migration needs to get daemonsets. These permissions can be # removed if not upgrading from an installation using host-local IPAM. - apiGroups: ["apps"] resources: - daemonsets verbs: - get --- apiVersion: rbac.authorization.k8s.io/v1 kind: ClusterRoleBinding metadata: name: calico-node roleRef: apiGroup: rbac.authorization.k8s.io kind: ClusterRole name: calico-node subjects: - kind: ServiceAccount name: calico-node namespace: kube-system --- # Source: calico/templates/calico-node.yaml # This manifest installs the calico-node container, as well # as the CNI plugins and network config on # each master and worker node in a Kubernetes cluster. kind: DaemonSet apiVersion: apps/v1 metadata: name: calico-node namespace: kube-system labels: k8s-app: calico-node spec: selector: matchLabels: k8s-app: calico-node updateStrategy: type: RollingUpdate rollingUpdate: maxUnavailable: 1 template: metadata: labels: k8s-app: calico-node spec: nodeSelector: kubernetes.io/os: linux hostNetwork: true tolerations: # Make sure calico-node gets scheduled on all nodes. - effect: NoSchedule operator: Exists # Mark the pod as a critical add-on for rescheduling. - key: CriticalAddonsOnly operator: Exists - effect: NoExecute operator: Exists serviceAccountName: calico-node # Minimize downtime during a rolling upgrade or deletion; tell Kubernetes to do a "force # deletion": https://kubernetes.io/docs/concepts/workloads/pods/pod/#termination-of-pods. terminationGracePeriodSeconds: 0 priorityClassName: system-node-critical initContainers: # This container performs upgrade from host-local IPAM to calico-ipam. # It can be deleted if this is a fresh installation, or if you have already # upgraded to use calico-ipam. - name: upgrade-ipam image: docker.io/calico/cni:v3.21.2 command: ["/opt/cni/bin/calico-ipam", "-upgrade"] envFrom: - configMapRef: # Allow KUBERNETES_SERVICE_HOST and KUBERNETES_SERVICE_PORT to be overridden for eBPF mode. name: kubernetes-services-endpoint optional: true env: - name: KUBERNETES_NODE_NAME valueFrom: fieldRef: fieldPath: spec.nodeName - name: CALICO_NETWORKING_BACKEND valueFrom: configMapKeyRef: name: calico-config key: calico_backend volumeMounts: - mountPath: /var/lib/cni/networks name: host-local-net-dir - mountPath: /host/opt/cni/bin name: cni-bin-dir securityContext: privileged: true # This container installs the CNI binaries # and CNI network config file on each node. - name: install-cni image: docker.io/calico/cni:v3.21.2 command: ["/opt/cni/bin/install"] envFrom: - configMapRef: # Allow KUBERNETES_SERVICE_HOST and KUBERNETES_SERVICE_PORT to be overridden for eBPF mode. name: kubernetes-services-endpoint optional: true env: # Name of the CNI config file to create. - name: CNI_CONF_NAME value: "10-calico.conflist" # The CNI network config to install on each node. - name: CNI_NETWORK_CONFIG valueFrom: configMapKeyRef: name: calico-config key: cni_network_config # Set the hostname based on the k8s node name. - name: KUBERNETES_NODE_NAME valueFrom: fieldRef: fieldPath: spec.nodeName # CNI MTU Config variable - name: CNI_MTU valueFrom: configMapKeyRef: name: calico-config key: veth_mtu # Prevents the container from sleeping forever. - name: SLEEP value: "false" volumeMounts: - mountPath: /host/opt/cni/bin name: cni-bin-dir - mountPath: /host/etc/cni/net.d name: cni-net-dir securityContext: privileged: true # Adds a Flex Volume Driver that creates a per-pod Unix Domain Socket to allow Dikastes # to communicate with Felix over the Policy Sync API. - name: flexvol-driver image: docker.io/calico/pod2daemon-flexvol:v3.21.2 volumeMounts: - name: flexvol-driver-host mountPath: /host/driver securityContext: privileged: true containers: # Runs calico-node container on each Kubernetes node. This # container programs network policy and routes on each # host. - name: calico-node image: docker.io/calico/node:v3.21.2 envFrom: - configMapRef: # Allow KUBERNETES_SERVICE_HOST and KUBERNETES_SERVICE_PORT to be overridden for eBPF mode. name: kubernetes-services-endpoint optional: true env: # Use Kubernetes API as the backing datastore. - name: DATASTORE_TYPE value: "kubernetes" # Wait for the datastore. - name: WAIT_FOR_DATASTORE value: "true" # Set based on the k8s node name. - name: NODENAME valueFrom: fieldRef: fieldPath: spec.nodeName # Choose the backend to use. - name: CALICO_NETWORKING_BACKEND valueFrom: configMapKeyRef: name: calico-config key: calico_backend # Cluster type to identify the deployment type - name: CLUSTER_TYPE value: "k8s,bgp" # Auto-detect the BGP IP address. - name: IP value: "autodetect" # Enable IPIP - name: CALICO_IPV4POOL_IPIP value: "Always" # Enable or Disable VXLAN on the default IP pool. - name: CALICO_IPV4POOL_VXLAN value: "Never" # Set MTU for tunnel device used if ipip is enabled - name: FELIX_IPINIPMTU valueFrom: configMapKeyRef: name: calico-config key: veth_mtu # Set MTU for the VXLAN tunnel device. - name: FELIX_VXLANMTU valueFrom: configMapKeyRef: name: calico-config key: veth_mtu # Set MTU for the Wireguard tunnel device. - name: FELIX_WIREGUARDMTU valueFrom: configMapKeyRef: name: calico-config key: veth_mtu # The default IPv4 pool to create on startup if none exists. Pod IPs will be # chosen from this range. Changing this value after installation will have # no effect. This should fall within `--cluster-cidr`. - name: CALICO_IPV4POOL_CIDR value: "10.244.0.0/16" # Disable file logging so `kubectl logs` works. - name: CALICO_DISABLE_FILE_LOGGING value: "true" # Set Felix endpoint to host default action to ACCEPT. - name: FELIX_DEFAULTENDPOINTTOHOSTACTION value: "ACCEPT" # Disable IPv6 on Kubernetes. - name: FELIX_IPV6SUPPORT value: "false" - name: FELIX_HEALTHENABLED value: "true" securityContext: privileged: true resources: requests: cpu: 250m lifecycle: preStop: exec: command: - /bin/calico-node - -shutdown livenessProbe: exec: command: - /bin/calico-node - -felix-live - -bird-live periodSeconds: 10 initialDelaySeconds: 10 failureThreshold: 6 timeoutSeconds: 10 readinessProbe: exec: command: - /bin/calico-node - -felix-ready - -bird-ready periodSeconds: 10 timeoutSeconds: 10 volumeMounts: # For maintaining CNI plugin API credentials. - mountPath: /host/etc/cni/net.d name: cni-net-dir readOnly: false - mountPath: /lib/modules name: lib-modules readOnly: true - mountPath: /run/xtables.lock name: xtables-lock readOnly: false - mountPath: /var/run/calico name: var-run-calico readOnly: false - mountPath: /var/lib/calico name: var-lib-calico readOnly: false - name: policysync mountPath: /var/run/nodeagent # For eBPF mode, we need to be able to mount the BPF filesystem at /sys/fs/bpf so we mount in the # parent directory. - name: sysfs mountPath: /sys/fs/ # Bidirectional means that, if we mount the BPF filesystem at /sys/fs/bpf it will propagate to the host. # If the host is known to mount that filesystem already then Bidirectional can be omitted. mountPropagation: Bidirectional - name: cni-log-dir mountPath: /var/log/calico/cni readOnly: true volumes: # Used by calico-node. - name: lib-modules hostPath: path: /lib/modules - name: var-run-calico hostPath: path: /var/run/calico - name: var-lib-calico hostPath: path: /var/lib/calico - name: xtables-lock hostPath: path: /run/xtables.lock type: FileOrCreate - name: sysfs hostPath: path: /sys/fs/ type: DirectoryOrCreate # Used to install CNI. - name: cni-bin-dir hostPath: path: /opt/cni/bin - name: cni-net-dir hostPath: path: /etc/cni/net.d # Used to access CNI logs. - name: cni-log-dir hostPath: path: /var/log/calico/cni # Mount in the directory for host-local IPAM allocations. This is # used when upgrading from host-local to calico-ipam, and can be removed # if not using the upgrade-ipam init container. - name: host-local-net-dir hostPath: path: /var/lib/cni/networks # Used to create per-pod Unix Domain Sockets - name: policysync hostPath: type: DirectoryOrCreate path: /var/run/nodeagent # Used to install Flex Volume Driver - name: flexvol-driver-host hostPath: type: DirectoryOrCreate path: /usr/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds --- apiVersion: v1 kind: ServiceAccount metadata: name: calico-node namespace: kube-system --- # Source: calico/templates/calico-kube-controllers.yaml # See https://github.com/projectcalico/kube-controllers apiVersion: apps/v1 kind: Deployment metadata: name: calico-kube-controllers namespace: kube-system labels: k8s-app: calico-kube-controllers spec: # The controllers can only have a single active instance. replicas: 1 selector: matchLabels: k8s-app: calico-kube-controllers strategy: type: Recreate template: metadata: name: calico-kube-controllers namespace: kube-system labels: k8s-app: calico-kube-controllers spec: nodeSelector: kubernetes.io/os: linux tolerations: # Mark the pod as a critical add-on for rescheduling. - key: CriticalAddonsOnly operator: Exists - key: node-role.kubernetes.io/master effect: NoSchedule serviceAccountName: calico-kube-controllers priorityClassName: system-cluster-critical containers: - name: calico-kube-controllers image: docker.io/calico/kube-controllers:v3.21.2 env: # Choose which controllers to run. - name: ENABLED_CONTROLLERS value: node - name: DATASTORE_TYPE value: kubernetes livenessProbe: exec: command: - /usr/bin/check-status - -l periodSeconds: 10 initialDelaySeconds: 10 failureThreshold: 6 timeoutSeconds: 10 readinessProbe: exec: command: - /usr/bin/check-status - -r periodSeconds: 10 --- apiVersion: v1 kind: ServiceAccount metadata: name: calico-kube-controllers namespace: kube-system --- # This manifest creates a Pod Disruption Budget for Controller to allow K8s Cluster Autoscaler to evict apiVersion: policy/v1beta1 kind: PodDisruptionBudget metadata: name: calico-kube-controllers namespace: kube-system labels: k8s-app: calico-kube-controllers spec: maxUnavailable: 1 selector: matchLabels: k8s-app: calico-kube-controllers --- # Source: calico/templates/calico-etcd-secrets.yaml --- # Source: calico/templates/calico-typha.yaml --- # Source: calico/templates/configure-canal.yaml kind: ConfigMap metadata: name: calico-cni-openstack namespace: openstack
52.901282
179
0.479256
f74130694a0ce3616ff518a77d06d364fa9adfa0
646
yml
YAML
Chapter08/08-begin/config-service/k8s/deployment.yml
npalm/cloud-native-spring-in-action
7cb7acabd47b14a522e39eac65989c08dd2cc9c0
[ "Apache-2.0" ]
1
2022-01-07T22:07:44.000Z
2022-01-07T22:07:44.000Z
Chapter08/08-begin/config-service/k8s/deployment.yml
email2dhiren/cloud-native-spring-in-action
7cb7acabd47b14a522e39eac65989c08dd2cc9c0
[ "Apache-2.0" ]
null
null
null
Chapter08/08-begin/config-service/k8s/deployment.yml
email2dhiren/cloud-native-spring-in-action
7cb7acabd47b14a522e39eac65989c08dd2cc9c0
[ "Apache-2.0" ]
null
null
null
apiVersion: apps/v1 kind: Deployment metadata: name: config-service labels: app: config-service spec: replicas: 1 selector: matchLabels: app: config-service template: metadata: labels: app: config-service spec: containers: - name: config-service image: polarbookshop/config-service:0.0.1-SNAPSHOT imagePullPolicy: Always lifecycle: preStop: exec: command: [ "sh", "-c", "sleep 5" ] ports: - containerPort: 8888 env: - name: BPL_JVM_THREAD_COUNT value: "50"
22.275862
60
0.540248
f741fc4cd59af3dfe7fb5af969f1d60dbd828bd8
202
yaml
YAML
test/e2e/test_data/rollout/service.yaml
FillZpp/rollouts
6c1ae60f9c3b5aea1a8d853fa48ed5cbd3326bc1
[ "Apache-2.0" ]
8
2022-01-14T10:37:04.000Z
2022-03-27T11:02:56.000Z
test/e2e/test_data/rollout/service.yaml
FillZpp/rollouts
6c1ae60f9c3b5aea1a8d853fa48ed5cbd3326bc1
[ "Apache-2.0" ]
25
2022-01-14T05:37:52.000Z
2022-03-31T07:08:39.000Z
test/e2e/test_data/rollout/service.yaml
FillZpp/rollouts
6c1ae60f9c3b5aea1a8d853fa48ed5cbd3326bc1
[ "Apache-2.0" ]
4
2022-01-14T10:37:07.000Z
2022-03-22T04:22:59.000Z
apiVersion: v1 kind: Service metadata: name: echoserver labels: app: echoserver spec: ports: - port: 80 targetPort: 8080 protocol: TCP name: http selector: app: echoserver
13.466667
20
0.658416
f7420b5b14bff1f0719924f2ee820b22748bdcb0
1,538
yaml
YAML
deploy/3_deployment.yaml
schlapzz/rbac-manager
560ebda763c91458b5cc157038d13afe1c496667
[ "Apache-2.0" ]
728
2019-07-12T19:40:21.000Z
2022-03-31T08:31:29.000Z
deploy/3_deployment.yaml
schlapzz/rbac-manager
560ebda763c91458b5cc157038d13afe1c496667
[ "Apache-2.0" ]
202
2019-07-11T07:42:51.000Z
2022-03-28T13:22:27.000Z
deploy/3_deployment.yaml
schlapzz/rbac-manager
560ebda763c91458b5cc157038d13afe1c496667
[ "Apache-2.0" ]
81
2019-07-17T09:43:32.000Z
2022-03-21T17:24:54.000Z
apiVersion: apps/v1 kind: Deployment metadata: name: rbac-manager namespace: rbac-manager labels: app: rbac-manager spec: replicas: 1 selector: matchLabels: app: rbac-manager release: rbac-manager template: metadata: labels: app: rbac-manager release: rbac-manager spec: serviceAccountName: rbac-manager containers: - name: rbac-manager image: "quay.io/reactiveops/rbac-manager:v1" imagePullPolicy: Always # these liveness probes use the metrics endpoint readinessProbe: httpGet: scheme: HTTP path: /metrics port: 8042 initialDelaySeconds: 5 timeoutSeconds: 3 periodSeconds: 3 failureThreshold: 3 livenessProbe: httpGet: scheme: HTTP path: /metrics port: 8042 initialDelaySeconds: 5 timeoutSeconds: 3 periodSeconds: 10 failureThreshold: 3 securityContext: allowPrivilegeEscalation: false privileged: false readOnlyRootFilesystem: true runAsNonRoot: true capabilities: drop: - ALL resources: limits: cpu: 100m memory: 128Mi requests: cpu: 100m memory: 128Mi ports: # metrics port - name: http-metrics containerPort: 8042 protocol: TCP
24.03125
56
0.542913
f74214a5639e42005eac47c04aae07bdd94959aa
945
yaml
YAML
kubernetes-networks/canary/web-canary-deploy.yaml
otus-kuber-2021-03/AleksandrZooLZakharov_platform
82f60003d7bb21c14915788d445675a8eccc846c
[ "MIT" ]
null
null
null
kubernetes-networks/canary/web-canary-deploy.yaml
otus-kuber-2021-03/AleksandrZooLZakharov_platform
82f60003d7bb21c14915788d445675a8eccc846c
[ "MIT" ]
1
2021-02-08T20:17:55.000Z
2021-02-08T20:17:55.000Z
kubernetes-networks/canary/web-canary-deploy.yaml
otus-kuber-2021-03/AleksandrZooLZakharov_platform
82f60003d7bb21c14915788d445675a8eccc846c
[ "MIT" ]
3
2021-01-15T15:45:24.000Z
2021-01-20T19:44:26.000Z
apiVersion: apps/v1 kind: Deployment metadata: name: web-canary namespace: canary spec: replicas: 2 strategy: type: RollingUpdate rollingUpdate: maxUnavailable: 0 maxSurge: 100% selector: matchLabels: app: web template: metadata: name: web labels: app: web spec: containers: - name: web image: zoolgle/web:1.0 readinessProbe: httpGet: path: /index.html port: 8000 livenessProbe: tcpSocket: port: 8000 volumeMounts: - name: web-app-volume mountPath: /app initContainers: - name: webinit image: busybox:1.31.0 command: ['sh', '-c', 'wget -O- https://tinyurl.com/otus-k8s-intro | sh'] volumeMounts: - name: web-app-volume mountPath: /app volumes: - name: web-app-volume emptyDir: {}
21
81
0.538624
f7426667b3ff644f5df0efd89c5f341562efee04
5,699
yaml
YAML
deploy/v1.14.0/csi-azuredisk-controller.yaml
csi-driver/azuredisk-csi-driver
3bccad414accffa605d524c047a398b43ae7313e
[ "Apache-2.0" ]
null
null
null
deploy/v1.14.0/csi-azuredisk-controller.yaml
csi-driver/azuredisk-csi-driver
3bccad414accffa605d524c047a398b43ae7313e
[ "Apache-2.0" ]
34
2019-02-15T13:44:02.000Z
2019-03-04T03:02:56.000Z
deploy/v1.14.0/csi-azuredisk-controller.yaml
csi-driver/azuredisk-csi-driver
3bccad414accffa605d524c047a398b43ae7313e
[ "Apache-2.0" ]
null
null
null
--- kind: Deployment apiVersion: apps/v1 metadata: name: csi-azuredisk-controller namespace: kube-system spec: replicas: 2 selector: matchLabels: app: csi-azuredisk-controller template: metadata: labels: app: csi-azuredisk-controller spec: hostNetwork: true serviceAccountName: csi-azuredisk-controller-sa nodeSelector: kubernetes.io/os: linux # add "kubernetes.io/role: master" to run controller on master node priorityClassName: system-cluster-critical tolerations: - key: "node-role.kubernetes.io/master" operator: "Exists" effect: "NoSchedule" - key: "node-role.kubernetes.io/controlplane" operator: "Exists" effect: "NoSchedule" - key: "node-role.kubernetes.io/control-plane" operator: "Exists" effect: "NoSchedule" containers: - name: csi-provisioner image: mcr.microsoft.com/oss/kubernetes-csi/csi-provisioner:v3.1.0 args: - "--feature-gates=Topology=true" - "--csi-address=$(ADDRESS)" - "--v=2" - "--timeout=15s" - "--leader-election" - "--leader-election-namespace=kube-system" - "--worker-threads=40" - "--extra-create-metadata=true" - "--strict-topology=true" env: - name: ADDRESS value: /csi/csi.sock volumeMounts: - mountPath: /csi name: socket-dir resources: limits: memory: 500Mi requests: cpu: 10m memory: 20Mi - name: csi-attacher image: mcr.microsoft.com/oss/kubernetes-csi/csi-attacher:v3.4.0 args: - "-v=2" - "-csi-address=$(ADDRESS)" - "-timeout=600s" - "-leader-election" - "--leader-election-namespace=kube-system" - "-worker-threads=500" env: - name: ADDRESS value: /csi/csi.sock volumeMounts: - mountPath: /csi name: socket-dir resources: limits: memory: 500Mi requests: cpu: 10m memory: 20Mi - name: csi-snapshotter image: mcr.microsoft.com/oss/kubernetes-csi/csi-snapshotter:v5.0.1 args: - "-csi-address=$(ADDRESS)" - "-leader-election" - "--leader-election-namespace=kube-system" - "--v=2" env: - name: ADDRESS value: /csi/csi.sock volumeMounts: - name: socket-dir mountPath: /csi resources: limits: memory: 100Mi requests: cpu: 10m memory: 20Mi - name: csi-resizer image: mcr.microsoft.com/oss/kubernetes-csi/csi-resizer:v1.4.0 args: - "-csi-address=$(ADDRESS)" - "-v=2" - "-leader-election" - "--leader-election-namespace=kube-system" - '-handle-volume-inuse-error=false' - '-feature-gates=RecoverVolumeExpansionFailure=true' - "-timeout=240s" env: - name: ADDRESS value: /csi/csi.sock volumeMounts: - name: socket-dir mountPath: /csi resources: limits: memory: 500Mi requests: cpu: 10m memory: 20Mi - name: liveness-probe image: mcr.microsoft.com/oss/kubernetes-csi/livenessprobe:v2.5.0 args: - --csi-address=/csi/csi.sock - --probe-timeout=3s - --health-port=29602 - --v=2 volumeMounts: - name: socket-dir mountPath: /csi resources: limits: memory: 100Mi requests: cpu: 10m memory: 20Mi - name: azuredisk image: mcr.microsoft.com/k8s/csi/azuredisk-csi:v1.14.0 imagePullPolicy: IfNotPresent args: - "--v=5" - "--endpoint=$(CSI_ENDPOINT)" - "--metrics-address=0.0.0.0:29604" - "--user-agent-suffix=OSS-kubectl" - "--disable-avset-nodes=false" - "--allow-empty-cloud-config=false" ports: - containerPort: 29602 name: healthz protocol: TCP - containerPort: 29604 name: metrics protocol: TCP livenessProbe: failureThreshold: 5 httpGet: path: /healthz port: healthz initialDelaySeconds: 30 timeoutSeconds: 10 periodSeconds: 30 env: - name: AZURE_CREDENTIAL_FILE valueFrom: configMapKeyRef: name: azure-cred-file key: path optional: true - name: CSI_ENDPOINT value: unix:///csi/csi.sock volumeMounts: - mountPath: /csi name: socket-dir - mountPath: /etc/kubernetes/ name: azure-cred resources: limits: memory: 500Mi requests: cpu: 10m memory: 20Mi volumes: - name: socket-dir emptyDir: {} - name: azure-cred hostPath: path: /etc/kubernetes/ type: DirectoryOrCreate
30.475936
100
0.481137
f7427c5d07482821863a4321f388dd8d30390aa5
219
yaml
YAML
cluster/apps/media/bazarr/config-pvc.yaml
wojcik91/k3s-gitops
783a6dbb33fc8f7ab85235226cbe57fc9a85f4ad
[ "MIT" ]
null
null
null
cluster/apps/media/bazarr/config-pvc.yaml
wojcik91/k3s-gitops
783a6dbb33fc8f7ab85235226cbe57fc9a85f4ad
[ "MIT" ]
1
2021-08-19T20:38:43.000Z
2021-08-19T20:38:43.000Z
cluster/apps/media/bazarr/config-pvc.yaml
wojcik91/k3s-gitops
783a6dbb33fc8f7ab85235226cbe57fc9a85f4ad
[ "MIT" ]
null
null
null
--- apiVersion: v1 kind: PersistentVolumeClaim metadata: name: bazarr-config-v1 namespace: media spec: accessModes: - ReadWriteOnce resources: requests: storage: 1Gi storageClassName: nfs-client
15.642857
30
0.716895
f742e4f56c4b25e77fbfca8a7ff3e3991568f4e6
6,025
yaml
YAML
k8s/us-central1/gen/tf-nightly-retinanet-func-v3-8.yaml
michaelbanfield/ml-testing-accelerators
c88001b4b2a205d5fa193cfbe5af6728dd602ee1
[ "Apache-2.0" ]
1
2020-05-09T18:59:09.000Z
2020-05-09T18:59:09.000Z
k8s/us-central1/gen/tf-nightly-retinanet-func-v3-8.yaml
michaelbanfield/ml-testing-accelerators
c88001b4b2a205d5fa193cfbe5af6728dd602ee1
[ "Apache-2.0" ]
null
null
null
k8s/us-central1/gen/tf-nightly-retinanet-func-v3-8.yaml
michaelbanfield/ml-testing-accelerators
c88001b4b2a205d5fa193cfbe5af6728dd602ee1
[ "Apache-2.0" ]
null
null
null
# Copyright 2020 Google LLC # # Licensed under the Apache License, Version 2.0 (the "License"); # you may not use this file except in compliance with the License. # You may obtain a copy of the License at # # https://www.apache.org/licenses/LICENSE-2.0 # # Unless required by applicable law or agreed to in writing, software # distributed under the License is distributed on an "AS IS" BASIS, # WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. # See the License for the specific language governing permissions and # limitations under the License. "apiVersion": "batch/v1beta1" "kind": "CronJob" "metadata": "name": "tf-nightly-retinanet-func-v3-8" "namespace": "automated" "spec": "concurrencyPolicy": "Forbid" "jobTemplate": "spec": "activeDeadlineSeconds": 3600 "backoffLimit": 1 "template": "metadata": "annotations": "tf-version.cloud-tpus.google.com": "nightly" "spec": "containers": - "env": - "name": "POD_NAME" "valueFrom": "fieldRef": "fieldPath": "metadata.name" - "name": "POD_NAMESPACE" "valueFrom": "fieldRef": "fieldPath": "metadata.namespace" "image": "gcr.io/xl-ml-test/health-monitor:stable" "imagePullPolicy": "Always" "name": "monitor" - "args": - "python3" - "official/vision/detection/main.py" - | --params_override="architecture": "use_bfloat16": true "eval": "batch_size": 64 "eval_file_pattern": "$(COCO_DIR)/val*" "val_json_file": "$(COCO_DIR)/instances_val2017.json" "predict": "batch_size": 64 "train": "batch_size": 64 "checkpoint": "path": "$(RESNET_PRETRAIN_DIR)/resnet50-checkpoint-2018-02-07" "prefix": "resnet50/" "total_steps": 1000 "train_file_pattern": "$(COCO_DIR)/train*" - "--model_dir=$(MODEL_DIR)" - "--mode=train" - "--tpu=$(KUBE_GOOGLE_CLOUD_TPU_ENDPOINTS)" - "--strategy_type=tpu" "env": - "name": "POD_NAME" "valueFrom": "fieldRef": "fieldPath": "metadata.name" - "name": "POD_UID" "valueFrom": "fieldRef": "fieldPath": "metadata.uid" - "name": "POD_NAMESPACE" "valueFrom": "fieldRef": "fieldPath": "metadata.namespace" - "name": "JOB_NAME" "valueFrom": "fieldRef": "fieldPath": "metadata.labels['job-name']" - "name": "MODEL_DIR" "value": "$(OUTPUT_BUCKET)/tf-nightly/retinanet/func/v3-8/$(JOB_NAME)" "envFrom": - "configMapRef": "name": "gcs-buckets" "image": "gcr.io/xl-ml-test/tensorflow:nightly" "imagePullPolicy": "Always" "name": "train" "resources": "limits": "cloud-tpus.google.com/preemptible-v3": 8 "requests": "cpu": 2 "memory": "20G" "volumeMounts": - "mountPath": "/dev/shm" "name": "dshm" "readOnly": false "initContainers": - "env": - "name": "POD_NAME" "valueFrom": "fieldRef": "fieldPath": "metadata.name" - "name": "POD_UID" "valueFrom": "fieldRef": "fieldPath": "metadata.uid" - "name": "POD_NAMESPACE" "valueFrom": "fieldRef": "fieldPath": "metadata.namespace" - "name": "JOB_NAME" "valueFrom": "fieldRef": "fieldPath": "metadata.labels['job-name']" - "name": "MODEL_DIR" "value": "$(OUTPUT_BUCKET)/tf-nightly/retinanet/func/v3-8/$(JOB_NAME)" - "name": "METRIC_CONFIG" "value": | { "metric_collection_config": { "default_aggregation_strategies": [ "final" ], "metric_to_aggregation_strategies": { "examples_per_second": [ "average" ] }, "use_run_name_prefix": true, "write_to_bigquery": true }, "regression_test_config": { "metric_success_conditions": { "examples_per_second_average": { "comparison": "greater_or_equal", "success_threshold": { "stddevs_from_mean": 4 } }, "total_wall_time": { "comparison": "less", "success_threshold": { "stddevs_from_mean": 5 }, "wait_for_n_points_of_history": 10 } } }, "test_name": "tf-nightly-retinanet-func-v3-8" } "envFrom": - "configMapRef": "name": "gcs-buckets" "image": "gcr.io/xl-ml-test/publisher:stable" "imagePullPolicy": "Always" "name": "publisher" "nodeSelector": "tpu-available": "true" "restartPolicy": "Never" "volumes": - "emptyDir": "medium": "Memory" "name": "dshm" "schedule": "0 8 * * *" "successfulJobsHistoryLimit": 1 "suspend": true
35.233918
84
0.454108
f742f4b91a4d44cb8259fa8f7f4f902200c229f7
3,257
yaml
YAML
vendor/github.com/openshift/api/console/v1/0000_10_consoleclidownload.crd.yaml
frobware/origin
4439d905af8ea7ca58b9edf79d668188780df057
[ "Apache-2.0" ]
9
2021-07-20T08:51:09.000Z
2022-01-26T14:43:22.000Z
vendor/github.com/openshift/api/console/v1/0000_10_consoleclidownload.crd.yaml
frobware/origin
4439d905af8ea7ca58b9edf79d668188780df057
[ "Apache-2.0" ]
148
2021-07-23T17:36:17.000Z
2022-03-29T07:22:17.000Z
vendor/github.com/openshift/api/console/v1/0000_10_consoleclidownload.crd.yaml
frobware/origin
4439d905af8ea7ca58b9edf79d668188780df057
[ "Apache-2.0" ]
27
2021-07-16T10:16:42.000Z
2022-03-30T06:27:53.000Z
apiVersion: apiextensions.k8s.io/v1 kind: CustomResourceDefinition metadata: name: consoleclidownloads.console.openshift.io annotations: description: Extension for configuring openshift web console command line interface (CLI) downloads. displayName: ConsoleCLIDownload include.release.openshift.io/ibm-cloud-managed: "true" include.release.openshift.io/self-managed-high-availability: "true" include.release.openshift.io/single-node-developer: "true" spec: scope: Cluster group: console.openshift.io names: plural: consoleclidownloads singular: consoleclidownload kind: ConsoleCLIDownload listKind: ConsoleCLIDownloadList versions: - name: v1 served: true storage: true additionalPrinterColumns: - name: Display name type: string jsonPath: .spec.displayName - name: Age type: string jsonPath: .metadata.creationTimestamp subresources: status: {} schema: openAPIV3Schema: description: ConsoleCLIDownload is an extension for configuring openshift web console command line interface (CLI) downloads. type: object required: - spec properties: apiVersion: description: 'APIVersion defines the versioned schema of this representation of an object. Servers should convert recognized schemas to the latest internal value, and may reject unrecognized values. More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#resources' type: string kind: description: 'Kind is a string value representing the REST resource this object represents. Servers may infer this from the endpoint the client submits requests to. Cannot be updated. In CamelCase. More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#types-kinds' type: string metadata: type: object spec: description: ConsoleCLIDownloadSpec is the desired cli download configuration. type: object required: - description - displayName - links properties: description: description: description is the description of the CLI download (can include markdown). type: string displayName: description: displayName is the display name of the CLI download. type: string links: description: links is a list of objects that provide CLI download link details. type: array items: type: object required: - href properties: href: description: href is the absolute secure URL for the link (must use https) type: string pattern: ^https:// text: description: text is the display text for the link type: string
38.317647
175
0.604851
f742f60af243a4000bcf0f139cfea496f8a14190
3,425
yaml
YAML
k8s/cloud/base/api_deployment.yaml
laozhudetui/pixie
eb6a73480c9f30a7c33cf2d77512740a5bc5caef
[ "Apache-2.0" ]
null
null
null
k8s/cloud/base/api_deployment.yaml
laozhudetui/pixie
eb6a73480c9f30a7c33cf2d77512740a5bc5caef
[ "Apache-2.0" ]
null
null
null
k8s/cloud/base/api_deployment.yaml
laozhudetui/pixie
eb6a73480c9f30a7c33cf2d77512740a5bc5caef
[ "Apache-2.0" ]
null
null
null
--- apiVersion: apps/v1 kind: Deployment metadata: name: api-server spec: selector: matchLabels: name: api-server template: metadata: labels: name: api-server spec: containers: - name: api-server image: gcr.io/pl-dev-infra/cloud/api_server_image ports: - containerPort: 51200 readinessProbe: httpGet: scheme: HTTPS path: /healthz port: 51200 livenessProbe: httpGet: scheme: HTTPS path: /healthz port: 51200 envFrom: - configMapRef: name: pl-tls-config - configMapRef: name: pl-domain-config env: - name: PL_JWT_SIGNING_KEY valueFrom: secretKeyRef: name: cloud-auth-secrets key: jwt-signing-key - name: PL_SESSION_KEY valueFrom: secretKeyRef: name: cloud-session-secrets key: session-key - name: PL_VZMGR_SERVICE valueFrom: configMapKeyRef: name: pl-service-config key: PL_VZMGR_SERVICE - name: PL_AUTH_SERVICE valueFrom: configMapKeyRef: name: pl-service-config key: PL_AUTH_SERVICE - name: PL_PROJECT_MANAGER_SERVICE valueFrom: configMapKeyRef: name: pl-service-config key: PL_PROJECT_MANAGER_SERVICE - name: PL_PROFILE_SERVICE valueFrom: configMapKeyRef: name: pl-service-config key: PL_PROFILE_SERVICE - name: PL_ARTIFACT_TRACKER_SERVICE valueFrom: configMapKeyRef: name: pl-service-config key: PL_ARTIFACT_TRACKER_SERVICE - name: PL_ELASTIC_SERVICE valueFrom: configMapKeyRef: name: pl-service-config key: PL_ELASTIC_SERVICE - name: PL_SEGMENT_WRITE_KEY valueFrom: configMapKeyRef: name: segment-config key: write-key - name: PL_VIZIER_IMAGE_SECRET_PATH value: /vizier-image-secret - name: PL_VIZIER_IMAGE_SECRET_FILE value: vizier_image_secret.json - name: PL_ELASTIC_USERNAME value: elastic - name: PL_ELASTIC_PASSWORD valueFrom: secretKeyRef: name: pl-elastic-es-elastic-user key: elastic - name: PL_ELASTIC_CA_CERT value: /elastic-certs-pub/tls.crt - name: PL_WORK_DOMAIN value: work.$(PL_DOMAIN_NAME) - name: PL_KRATOS_BROWSER_URL value: https://$(PL_WORK_DOMAIN)/oauth/kratos volumeMounts: - name: certs mountPath: /certs - name: vizier-image-secret mountPath: /vizier-image-secret - name: elastic-certs-pub mountPath: /elastic-certs-pub volumes: - name: certs secret: secretName: service-tls-certs - name: vizier-image-secret secret: secretName: vizier-image-secret optional: true - name: envoy-yaml configMap: name: proxy-envoy-config - name: elastic-certs-pub secret: secretName: pl-elastic-es-http-certs-public
28.781513
57
0.545985
f74398d54dbfaa833d3d75b016e60ab06e2905e9
577
yaml
YAML
k8s/manifests/frontend-deployment.yaml
RGPosadas/Mull
09a10107181721433792de277395b72ef7b52f5f
[ "MIT" ]
6
2020-09-08T23:42:47.000Z
2021-09-18T08:36:57.000Z
k8s/manifests/frontend-deployment.yaml
RGPosadas/Mull
09a10107181721433792de277395b72ef7b52f5f
[ "MIT" ]
257
2020-09-09T20:16:08.000Z
2021-04-12T13:09:53.000Z
k8s/manifests/frontend-deployment.yaml
RGPosadas/LitterRally
09a10107181721433792de277395b72ef7b52f5f
[ "MIT" ]
2
2021-08-29T00:47:11.000Z
2021-11-02T21:28:05.000Z
# This manifest is reponsible for deploying our frontend. apiVersion: apps/v1 kind: Deployment metadata: name: mull-frontend namespace: mull spec: replicas: 1 selector: matchLabels: app.kubernetes.io/name: mull-frontend template: metadata: labels: app.kubernetes.io/name: mull-frontend spec: containers: - name: mull-frontend image: 'ritchellegmp/mull-frontend:latest' imagePullPolicy: Always ports: - name: frontend containerPort: 4200 protocol: TCP
23.08
57
0.62565
f743eff6bead1b6a58f9e51b693d874e4017c65e
28,797
yaml
YAML
operator/v1/0000_70_dns-operator_00.crd.yaml
njhale/openshift-api
8f38b76486205b59403b60592f30b3736ef90d3d
[ "Apache-2.0" ]
null
null
null
operator/v1/0000_70_dns-operator_00.crd.yaml
njhale/openshift-api
8f38b76486205b59403b60592f30b3736ef90d3d
[ "Apache-2.0" ]
27
2018-12-05T04:05:29.000Z
2019-01-17T14:42:10.000Z
vendor/github.com/openshift/api/operator/v1/0000_70_dns-operator_00.crd.yaml
thunderboltsid/installer
d907e1459681cc4a2f5ce141318d40260bd14500
[ "Apache-2.0" ]
6
2018-12-04T21:41:16.000Z
2019-01-08T12:33:16.000Z
apiVersion: apiextensions.k8s.io/v1 kind: CustomResourceDefinition metadata: annotations: api-approved.openshift.io: https://github.com/openshift/api/pull/475 include.release.openshift.io/ibm-cloud-managed: "true" include.release.openshift.io/self-managed-high-availability: "true" include.release.openshift.io/single-node-developer: "true" name: dnses.operator.openshift.io spec: group: operator.openshift.io names: kind: DNS listKind: DNSList plural: dnses singular: dns scope: Cluster versions: - name: v1 schema: openAPIV3Schema: description: "DNS manages the CoreDNS component to provide a name resolution service for pods and services in the cluster. \n This supports the DNS-based service discovery specification: https://github.com/kubernetes/dns/blob/master/docs/specification.md \n More details: https://kubernetes.io/docs/tasks/administer-cluster/coredns \n Compatibility level 1: Stable within a major release for a minimum of 12 months or 3 minor releases (whichever is longer)." properties: apiVersion: description: 'APIVersion defines the versioned schema of this representation of an object. Servers should convert recognized schemas to the latest internal value, and may reject unrecognized values. More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#resources' type: string kind: description: 'Kind is a string value representing the REST resource this object represents. Servers may infer this from the endpoint the client submits requests to. Cannot be updated. In CamelCase. More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#types-kinds' type: string metadata: type: object spec: description: spec is the specification of the desired behavior of the DNS. properties: logLevel: default: Normal description: 'logLevel describes the desired logging verbosity for CoreDNS. Any one of the following values may be specified: * Normal logs errors from upstream resolvers. * Debug logs errors, NXDOMAIN responses, and NODATA responses. * Trace logs errors and all responses. Setting logLevel: Trace will produce extremely verbose logs. Valid values are: "Normal", "Debug", "Trace". Defaults to "Normal".' enum: - Normal - Debug - Trace type: string managementState: description: managementState indicates whether the DNS operator should manage cluster DNS pattern: ^(Managed|Unmanaged|Force|Removed)$ type: string nodePlacement: description: "nodePlacement provides explicit control over the scheduling of DNS pods. \n Generally, it is useful to run a DNS pod on every node so that DNS queries are always handled by a local DNS pod instead of going over the network to a DNS pod on another node. However, security policies may require restricting the placement of DNS pods to specific nodes. For example, if a security policy prohibits pods on arbitrary nodes from communicating with the API, a node selector can be specified to restrict DNS pods to nodes that are permitted to communicate with the API. Conversely, if running DNS pods on nodes with a particular taint is desired, a toleration can be specified for that taint. \n If unset, defaults are used. See nodePlacement for more details." properties: nodeSelector: additionalProperties: type: string description: "nodeSelector is the node selector applied to DNS pods. \n If empty, the default is used, which is currently the following: \n kubernetes.io/os: linux \n This default is subject to change. \n If set, the specified selector is used and replaces the default." type: object tolerations: description: "tolerations is a list of tolerations applied to DNS pods. \n If empty, the DNS operator sets a toleration for the \"node-role.kubernetes.io/master\" taint. This default is subject to change. Specifying tolerations without including a toleration for the \"node-role.kubernetes.io/master\" taint may be risky as it could lead to an outage if all worker nodes become unavailable. \n Note that the daemon controller adds some tolerations as well. See https://kubernetes.io/docs/concepts/scheduling-eviction/taint-and-toleration/" items: description: The pod this Toleration is attached to tolerates any taint that matches the triple <key,value,effect> using the matching operator <operator>. properties: effect: description: Effect indicates the taint effect to match. Empty means match all taint effects. When specified, allowed values are NoSchedule, PreferNoSchedule and NoExecute. type: string key: description: Key is the taint key that the toleration applies to. Empty means match all taint keys. If the key is empty, operator must be Exists; this combination means to match all values and all keys. type: string operator: description: Operator represents a key's relationship to the value. Valid operators are Exists and Equal. Defaults to Equal. Exists is equivalent to wildcard for value, so that a pod can tolerate all taints of a particular category. type: string tolerationSeconds: description: TolerationSeconds represents the period of time the toleration (which must be of effect NoExecute, otherwise this field is ignored) tolerates the taint. By default, it is not set, which means tolerate the taint forever (do not evict). Zero and negative values will be treated as 0 (evict immediately) by the system. format: int64 type: integer value: description: Value is the taint value the toleration matches to. If the operator is Exists, the value should be empty, otherwise just a regular string. type: string type: object type: array type: object operatorLogLevel: default: Normal description: 'operatorLogLevel controls the logging level of the DNS Operator. Valid values are: "Normal", "Debug", "Trace". Defaults to "Normal". setting operatorLogLevel: Trace will produce extremely verbose logs.' enum: - Normal - Debug - Trace type: string servers: description: "servers is a list of DNS resolvers that provide name query delegation for one or more subdomains outside the scope of the cluster domain. If servers consists of more than one Server, longest suffix match will be used to determine the Server. \n For example, if there are two Servers, one for \"foo.com\" and another for \"a.foo.com\", and the name query is for \"www.a.foo.com\", it will be routed to the Server with Zone \"a.foo.com\". \n If this field is nil, no servers are created." items: description: Server defines the schema for a server that runs per instance of CoreDNS. properties: forwardPlugin: description: forwardPlugin defines a schema for configuring CoreDNS to proxy DNS messages to upstream resolvers. properties: policy: default: Random description: "policy is used to determine the order in which upstream servers are selected for querying. Any one of the following values may be specified: \n * \"Random\" picks a random upstream server for each query. * \"RoundRobin\" picks upstream servers in a round-robin order, moving to the next server for each new query. * \"Sequential\" tries querying upstream servers in a sequential order until one responds, starting with the first server for each new query. \n The default value is \"Random\"" enum: - Random - RoundRobin - Sequential type: string transportConfig: description: "transportConfig is used to configure the transport type, server name, and optional custom CA or CA bundle to use when forwarding DNS requests to an upstream resolver. \n The default value is \"\" (empty) which results in a standard cleartext connection being used when forwarding DNS requests to an upstream resolver." properties: tls: description: tls contains the additional configuration options to use when Transport is set to "TLS". properties: caBundle: description: "caBundle references a ConfigMap that must contain either a single CA Certificate or a CA Bundle (in the case of multiple upstreams signed by different CAs). This allows cluster administrators to provide their own CA or CA bundle for validating the certificate of upstream resolvers. \n 1. The configmap must contain a `ca-bundle.crt` key. 2. The value must be a PEM encoded CA certificate or CA bundle. 3. The administrator must create this configmap in the openshift-config namespace." properties: name: description: name is the metadata.name of the referenced config map type: string required: - name type: object serverName: description: serverName is the upstream server to connect to when forwarding DNS queries. This is required when Transport is set to "TLS". ServerName will be validated against the DNS naming conventions in RFC 1123 and should match the TLS certificate installed in the upstream resolver(s). maxLength: 253 pattern: ^([a-zA-Z0-9]|[a-zA-Z0-9][a-zA-Z0-9\-]{0,61}[a-zA-Z0-9])(\.([a-zA-Z0-9]|[a-zA-Z0-9][a-zA-Z0-9\-]{0,61}[a-zA-Z0-9]))*$ type: string required: - serverName type: object transport: description: "transport allows cluster administrators to opt-in to using a DNS-over-TLS connection between cluster DNS and an upstream resolver(s). Configuring TLS as the transport at this level without configuring a CABundle will result in the system certificates being used to verify the serving certificate of the upstream resolver(s). \n Possible values: \"\" (empty) - This means no explicit choice has been made and the platform chooses the default which is subject to change over time. The current default is \"Cleartext\". \"Cleartext\" - Cluster admin specified cleartext option. This results in the same functionality as an empty value but may be useful when a cluster admin wants to be more explicit about the transport, or wants to switch from \"TLS\" to \"Cleartext\" explicitly. \"TLS\" - This indicates that DNS queries should be sent over a TLS connection. If Transport is set to TLS, you MUST also set ServerName." enum: - TLS - Cleartext - "" type: string type: object upstreams: description: "upstreams is a list of resolvers to forward name queries for subdomains of Zones. Each instance of CoreDNS performs health checking of Upstreams. When a healthy upstream returns an error during the exchange, another resolver is tried from Upstreams. The Upstreams are selected in the order specified in Policy. Each upstream is represented by an IP address or IP:port if the upstream listens on a port other than 53. \n A maximum of 15 upstreams is allowed per ForwardPlugin." items: type: string maxItems: 15 type: array type: object name: description: name is required and specifies a unique name for the server. Name must comply with the Service Name Syntax of rfc6335. type: string zones: description: zones is required and specifies the subdomains that Server is authoritative for. Zones must conform to the rfc1123 definition of a subdomain. Specifying the cluster domain (i.e., "cluster.local") is invalid. items: type: string type: array type: object type: array upstreamResolvers: default: {} description: "upstreamResolvers defines a schema for configuring CoreDNS to proxy DNS messages to upstream resolvers for the case of the default (\".\") server \n If this field is not specified, the upstream used will default to /etc/resolv.conf, with policy \"sequential\"" properties: policy: default: Sequential description: "Policy is used to determine the order in which upstream servers are selected for querying. Any one of the following values may be specified: \n * \"Random\" picks a random upstream server for each query. * \"RoundRobin\" picks upstream servers in a round-robin order, moving to the next server for each new query. * \"Sequential\" tries querying upstream servers in a sequential order until one responds, starting with the first server for each new query. \n The default value is \"Sequential\"" enum: - Random - RoundRobin - Sequential type: string transportConfig: description: "transportConfig is used to configure the transport type, server name, and optional custom CA or CA bundle to use when forwarding DNS requests to an upstream resolver. \n The default value is \"\" (empty) which results in a standard cleartext connection being used when forwarding DNS requests to an upstream resolver." properties: tls: description: tls contains the additional configuration options to use when Transport is set to "TLS". properties: caBundle: description: "caBundle references a ConfigMap that must contain either a single CA Certificate or a CA Bundle (in the case of multiple upstreams signed by different CAs). This allows cluster administrators to provide their own CA or CA bundle for validating the certificate of upstream resolvers. \n 1. The configmap must contain a `ca-bundle.crt` key. 2. The value must be a PEM encoded CA certificate or CA bundle. 3. The administrator must create this configmap in the openshift-config namespace." properties: name: description: name is the metadata.name of the referenced config map type: string required: - name type: object serverName: description: serverName is the upstream server to connect to when forwarding DNS queries. This is required when Transport is set to "TLS". ServerName will be validated against the DNS naming conventions in RFC 1123 and should match the TLS certificate installed in the upstream resolver(s). maxLength: 253 pattern: ^([a-zA-Z0-9]|[a-zA-Z0-9][a-zA-Z0-9\-]{0,61}[a-zA-Z0-9])(\.([a-zA-Z0-9]|[a-zA-Z0-9][a-zA-Z0-9\-]{0,61}[a-zA-Z0-9]))*$ type: string required: - serverName type: object transport: description: "transport allows cluster administrators to opt-in to using a DNS-over-TLS connection between cluster DNS and an upstream resolver(s). Configuring TLS as the transport at this level without configuring a CABundle will result in the system certificates being used to verify the serving certificate of the upstream resolver(s). \n Possible values: \"\" (empty) - This means no explicit choice has been made and the platform chooses the default which is subject to change over time. The current default is \"Cleartext\". \"Cleartext\" - Cluster admin specified cleartext option. This results in the same functionality as an empty value but may be useful when a cluster admin wants to be more explicit about the transport, or wants to switch from \"TLS\" to \"Cleartext\" explicitly. \"TLS\" - This indicates that DNS queries should be sent over a TLS connection. If Transport is set to TLS, you MUST also set ServerName." enum: - TLS - Cleartext - "" type: string type: object upstreams: default: - type: SystemResolvConf description: "Upstreams is a list of resolvers to forward name queries for the \".\" domain. Each instance of CoreDNS performs health checking of Upstreams. When a healthy upstream returns an error during the exchange, another resolver is tried from Upstreams. The Upstreams are selected in the order specified in Policy. \n A maximum of 15 upstreams is allowed per ForwardPlugin. If no Upstreams are specified, /etc/resolv.conf is used by default" items: anyOf: - not: required: - address - port properties: type: enum: - "" - SystemResolvConf - optional: - port properties: type: enum: - Network required: - address description: "Upstream can either be of type SystemResolvConf, or of type Network. \n * For an Upstream of type SystemResolvConf, no further fields are necessary: The upstream will be configured to use /etc/resolv.conf. * For an Upstream of type Network, a NetworkResolver field needs to be defined with an IP address or IP:port if the upstream listens on a port other than 53." properties: address: anyOf: - format: ipv4 - format: ipv6 description: Address must be defined when Type is set to Network. It will be ignored otherwise. It must be a valid ipv4 or ipv6 address. type: string port: default: 53 description: Port may be defined when Type is set to Network. It will be ignored otherwise. Port must be between 65535 format: int32 maximum: 65535 minimum: 1 type: integer type: description: "Type defines whether this upstream contains an IP/IP:port resolver or the local /etc/resolv.conf. Type accepts 2 possible values: SystemResolvConf or Network. \n * When SystemResolvConf is used, the Upstream structure does not require any further fields to be defined: /etc/resolv.conf will be used * When Network is used, the Upstream structure must contain at least an Address" enum: - SystemResolvConf - Network - "" type: string required: - type type: object maxItems: 15 type: array type: object type: object status: description: status is the most recently observed status of the DNS. properties: clusterDomain: description: "clusterDomain is the local cluster DNS domain suffix for DNS services. This will be a subdomain as defined in RFC 1034, section 3.5: https://tools.ietf.org/html/rfc1034#section-3.5 Example: \"cluster.local\" \n More info: https://kubernetes.io/docs/concepts/services-networking/dns-pod-service" type: string clusterIP: description: "clusterIP is the service IP through which this DNS is made available. \n In the case of the default DNS, this will be a well known IP that is used as the default nameserver for pods that are using the default ClusterFirst DNS policy. \n In general, this IP can be specified in a pod's spec.dnsConfig.nameservers list or used explicitly when performing name resolution from within the cluster. Example: dig foo.com @<service IP> \n More info: https://kubernetes.io/docs/concepts/services-networking/service/#virtual-ips-and-service-proxies" type: string conditions: description: "conditions provide information about the state of the DNS on the cluster. \n These are the supported DNS conditions: \n \ * Available - True if the following conditions are met: * DNS controller daemonset is available. - False if any of those conditions are unsatisfied." items: description: OperatorCondition is just the standard condition fields. properties: lastTransitionTime: format: date-time type: string message: type: string reason: type: string status: type: string type: type: string type: object type: array required: - clusterDomain - clusterIP type: object type: object served: true storage: true subresources: status: {}
59.131417
175
0.491787
f744c51e01e48e71962d6fd1dcf9f86c149ef4e0
205
yaml
YAML
deployments/kubernetes/helm/rancher-saas-ops/templates/service-update-api.yaml
onzack/rancher-saas-chart
46259859923d86726ab6153f1176ca0abea4b0c7
[ "Apache-2.0" ]
5
2020-12-08T17:04:17.000Z
2022-03-08T09:32:06.000Z
deployments/kubernetes/helm/rancher-saas-ops/templates/service-update-api.yaml
onzack/rancher-saas-chart
46259859923d86726ab6153f1176ca0abea4b0c7
[ "Apache-2.0" ]
4
2021-01-29T14:46:08.000Z
2021-03-11T16:15:14.000Z
deployments/kubernetes/helm/rancher-saas-ops/templates/service-update-api.yaml
onzack/rancher-saas-chart
46259859923d86726ab6153f1176ca0abea4b0c7
[ "Apache-2.0" ]
1
2020-12-17T16:11:11.000Z
2020-12-17T16:11:11.000Z
--- apiVersion: v1 kind: Service metadata: name: update-api spec: selector: app: rancher-saas-ops role: update-api ports: - name: hattp protocol: TCP port: 9000 targetPort: 9000
14.642857
25
0.64878
f744d2831a81da9d16491956d5245862a5d657a0
853
yaml
YAML
kube/replay-controller.yaml
paralin/dota-replay-app
f141188d47cb1aad5cdfcf80002dee5fbe7c9455
[ "MIT" ]
null
null
null
kube/replay-controller.yaml
paralin/dota-replay-app
f141188d47cb1aad5cdfcf80002dee5fbe7c9455
[ "MIT" ]
null
null
null
kube/replay-controller.yaml
paralin/dota-replay-app
f141188d47cb1aad5cdfcf80002dee5fbe7c9455
[ "MIT" ]
null
null
null
apiVersion: v1 kind: ReplicationController metadata: labels: app: replay name: replay spec: replicas: 1 selector: app: replay template: metadata: labels: app: replay spec: containers: - command: - bash - -c - source /etc/kube-replay/config && node main.js image: paralin/dota-replay:latest imagePullPolicy: Always name: replay ports: - containerPort: 80 name: web - containerPort: 10304 name: desktop volumeMounts: - mountPath: /etc/kube-replay name: replay-config readOnly: true dnsPolicy: ClusterFirst restartPolicy: Always terminationGracePeriodSeconds: 30 volumes: - name: replay-config secret: secretName: replay-config
21.325
56
0.575615
f744db7aded18b29cd4c4526ab63eb92a4315d91
930
yaml
YAML
deploy/03-deployment.yaml
tanelmae/private-dns
1bf9b515802c9aed4cb80a781804024bd7253668
[ "MIT" ]
3
2020-03-09T12:18:27.000Z
2021-12-12T13:37:44.000Z
deploy/03-deployment.yaml
tanelmae/private-dns
1bf9b515802c9aed4cb80a781804024bd7253668
[ "MIT" ]
null
null
null
deploy/03-deployment.yaml
tanelmae/private-dns
1bf9b515802c9aed4cb80a781804024bd7253668
[ "MIT" ]
null
null
null
--- apiVersion: apps/v1 kind: Deployment metadata: name: pdns namespace: default labels: app: pdns spec: # There can be only one or there will be constant race # Later there could be multiple with leadership selection replicas: 1 selector: matchLabels: app: pdns template: metadata: labels: app: pdns spec: volumes: - name: service-account secret: secretName: dns-account defaultMode: 256 serviceAccountName: pdns restartPolicy: Always containers: - name: service image: tanelmae/private-dns:latest imagePullPolicy: Always args: - "-gcp-zone=k8s-dns" - "-gcp-reverse-zone=k8s-reverse-dns" - "-gcp-cred=/account/dns.json" - "-v=4" volumeMounts: - name: service-account mountPath: "/account"
23.25
59
0.566667
f74519c6b267fac6ac9edded468c5269ddc771e0
1,825
yaml
YAML
config/prow/cluster/needs-rebase_deployment.yaml
zvonkok/test-infra
deabdd6688295244ce3870818108b1f7a825368e
[ "Apache-2.0" ]
null
null
null
config/prow/cluster/needs-rebase_deployment.yaml
zvonkok/test-infra
deabdd6688295244ce3870818108b1f7a825368e
[ "Apache-2.0" ]
null
null
null
config/prow/cluster/needs-rebase_deployment.yaml
zvonkok/test-infra
deabdd6688295244ce3870818108b1f7a825368e
[ "Apache-2.0" ]
null
null
null
# Copyright 2016 The Kubernetes Authors All rights reserved. # # Licensed under the Apache License, Version 2.0 (the "License"); # you may not use this file except in compliance with the License. # You may obtain a copy of the License at # # http://www.apache.org/licenses/LICENSE-2.0 # # Unless required by applicable law or agreed to in writing, software # distributed under the License is distributed on an "AS IS" BASIS, # WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. # See the License for the specific language governing permissions and # limitations under the License. apiVersion: apps/v1 kind: Deployment metadata: namespace: default name: needs-rebase labels: app: needs-rebase spec: replicas: 1 selector: matchLabels: app: needs-rebase template: metadata: labels: app: needs-rebase spec: terminationGracePeriodSeconds: 180 containers: - name: needs-rebase image: gcr.io/k8s-prow/needs-rebase:v20220120-e267164240 imagePullPolicy: Always args: - --dry-run=false - --github-endpoint=http://ghproxy - --github-endpoint=https://api.github.com - --github-token-path=/etc/github/oauth - --update-period=6h ports: - name: http containerPort: 8888 volumeMounts: - name: hmac mountPath: /etc/webhook readOnly: true - name: oauth mountPath: /etc/github readOnly: true - name: plugins mountPath: /etc/plugins readOnly: true volumes: - name: hmac secret: secretName: hmac-token - name: oauth secret: secretName: oauth-token - name: plugins configMap: name: plugins
27.651515
74
0.629041
f745524703753629ff890d2e17471d30c5498373
1,082
yaml
YAML
kubernetes-networks/web-deploy.yaml
otus-kuber-2020-11/wabat_platform
e55c8d35afbcb789f17bc28a6bfd5bd0bb344216
[ "MIT" ]
null
null
null
kubernetes-networks/web-deploy.yaml
otus-kuber-2020-11/wabat_platform
e55c8d35afbcb789f17bc28a6bfd5bd0bb344216
[ "MIT" ]
null
null
null
kubernetes-networks/web-deploy.yaml
otus-kuber-2020-11/wabat_platform
e55c8d35afbcb789f17bc28a6bfd5bd0bb344216
[ "MIT" ]
1
2021-01-04T14:29:42.000Z
2021-01-04T14:29:42.000Z
--- apiVersion: apps/v1 kind: Deployment metadata: name: web spec: strategy: type: RollingUpdate rollingUpdate: maxSurge: 100% # how many pods we can add at a time maxUnavailable: 0 # maxUnavailable define how many pods can be# unavailable during the rolling update replicas: 1 selector: matchLabels: app: web template: metadata: labels: app: web spec: containers: - name: web image: 3davinci/tinyweb:0.1 imagePullPolicy: Always livenessProbe: tcpSocket: port: 8000 readinessProbe: httpGet: path: /index.html port: 8000 volumeMounts: - name: app mountPath: /var/www/localhost/app initContainers: - name: init image: busybox:1.31.0 command: ['sh', '-c', 'wget -O- https://tinyurl.com/otus-k8s-intro | sh'] volumeMounts: - name: app mountPath: /app volumes: - name: app emptyDir: {}
24.044444
107
0.542514
f74686e03a4ba896e187d04f278907c84e58c3fb
77
yaml
YAML
deploy/service_account.yaml
YuriHeupa/cassandra-k8s-operator
32e19526f79e2db31429f670b13e0472743a3684
[ "Apache-2.0" ]
2
2020-02-15T07:07:02.000Z
2020-04-04T18:35:23.000Z
deploy/service_account.yaml
YuriHeupa/cassandra-k8s-operator
32e19526f79e2db31429f670b13e0472743a3684
[ "Apache-2.0" ]
null
null
null
deploy/service_account.yaml
YuriHeupa/cassandra-k8s-operator
32e19526f79e2db31429f670b13e0472743a3684
[ "Apache-2.0" ]
2
2020-02-07T04:40:37.000Z
2021-05-20T20:31:02.000Z
apiVersion: v1 kind: ServiceAccount metadata: name: cassandra-k8s-operator
15.4
30
0.805195
f746d6594a6290fdcb798a09e4689e142a832e91
401
yaml
YAML
namespaces/live-1.cloud-platform.service.justice.gov.uk/dps-management-prod/01-rbac.yaml
rossjones/cloud-platform-environments
85a4e19cf012d97d885c6ea91379ca3f7b59a49a
[ "MIT" ]
28
2018-07-13T15:02:24.000Z
2022-03-17T09:23:54.000Z
namespaces/live-1.cloud-platform.service.justice.gov.uk/dps-management-prod/01-rbac.yaml
happygeneralist/recall-decisions-alpha
09124f3994a878e9969e7b4326088b2ae7bfd170
[ "MIT" ]
963
2018-05-30T15:46:06.000Z
2022-03-30T10:06:39.000Z
namespaces/live-1.cloud-platform.service.justice.gov.uk/dps-management-prod/01-rbac.yaml
happygeneralist/recall-decisions-alpha
09124f3994a878e9969e7b4326088b2ae7bfd170
[ "MIT" ]
29
2018-12-04T09:37:36.000Z
2022-02-25T10:35:34.000Z
--- kind: RoleBinding apiVersion: rbac.authorization.k8s.io/v1 metadata: name: dps-management-prod-admin namespace: dps-management-prod subjects: - kind: Group name: "github:dps-shared" apiGroup: rbac.authorization.k8s.io - kind: Group name: "github:dps-tech" apiGroup: rbac.authorization.k8s.io roleRef: kind: ClusterRole name: admin apiGroup: rbac.authorization.k8s.io
22.277778
40
0.72818
f746f45824fe1ae348a901dd67a99d0c71685f12
944
yml
YAML
k3s/postgres/deployment.yml
virtool/virtool-workflow
7c0ec9f7fade66c4682e0783bdc6f9ba247e0a1f
[ "MIT" ]
5
2020-09-24T20:29:08.000Z
2022-03-17T14:50:56.000Z
k3s/postgres/deployment.yml
virtool/virtool-workflow
7c0ec9f7fade66c4682e0783bdc6f9ba247e0a1f
[ "MIT" ]
126
2020-10-01T23:38:34.000Z
2022-03-31T08:26:28.000Z
k3s/postgres/deployment.yml
virtool/virtool-workflow
7c0ec9f7fade66c4682e0783bdc6f9ba247e0a1f
[ "MIT" ]
5
2020-09-29T21:29:46.000Z
2021-07-27T20:34:58.000Z
apiVersion: apps/v1 kind: Deployment metadata: name: postgres labels: app: postgres group: db spec: replicas: 1 selector: matchLabels: app: postgres template: metadata: labels: app: postgres type: db spec: volumes: # indicates which PVC are available for this Deployment - name: postgres-storage persistentVolumeClaim: claimName: postgres-pvc containers: - name: postgres image: postgres:9.6-alpine ports: - containerPort: 5432 envFrom: - configMapRef: name: postgres-config volumeMounts: # indicates which Volume (from spec.template.spec.volumes) should be used - name: postgres-storage # name of the Volume mountPath: /var/lib/postgresql/data # path inside the container
27.764706
113
0.5625
f74770e9fa061f216763f0b6cd7aaf3ebe4af04a
247
yaml
YAML
docs/crds/pullsecret.yaml
ravidbro/assisted-service
846f2dc89d10b74ed95cb99a6a8888902fb11497
[ "Apache-2.0" ]
null
null
null
docs/crds/pullsecret.yaml
ravidbro/assisted-service
846f2dc89d10b74ed95cb99a6a8888902fb11497
[ "Apache-2.0" ]
1
2021-04-16T10:23:39.000Z
2021-04-16T10:23:39.000Z
docs/crds/pullsecret.yaml
ravidbro/assisted-service
846f2dc89d10b74ed95cb99a6a8888902fb11497
[ "Apache-2.0" ]
null
null
null
apiVersion: v1 kind: Secret type: kubernetes.io/dockerconfigjson metadata: name: pull-secret namespace: assisted-installer stringData: .dockerconfigjson: '{"auths":{"cloud.openshift.com":{"auth":"dXNlcjpwYXNzd29yZAo=","email":"r@rr.com"}}}'
27.444444
107
0.744939
f747c9079fdf750273482dce722c5efc5c18308e
422
yaml
YAML
Devops/KUBERNETES/k8s/exemplo2/explo4-deployment-and-replicaset/nginx-deployment.yaml
FranciscoWallison/Desenvolvimento-aplicacoes-com-micros-servicos
98cef123aa0bd413285ec5dcce747881d43ebdc5
[ "BSD-2-Clause" ]
8
2021-09-14T16:08:41.000Z
2022-02-14T17:59:55.000Z
Devops/KUBERNETES/k8s/exemplo2/explo4-deployment-and-replicaset/nginx-deployment.yaml
FranciscoWallison/Desenvolvimento-aplicacoes-com-micros-servicos
98cef123aa0bd413285ec5dcce747881d43ebdc5
[ "BSD-2-Clause" ]
null
null
null
Devops/KUBERNETES/k8s/exemplo2/explo4-deployment-and-replicaset/nginx-deployment.yaml
FranciscoWallison/Desenvolvimento-aplicacoes-com-micros-servicos
98cef123aa0bd413285ec5dcce747881d43ebdc5
[ "BSD-2-Clause" ]
1
2021-09-14T16:08:31.000Z
2021-09-14T16:08:31.000Z
apiVersion: apps/v1 kind: Deployment metadata: name: nginx-deployment spec: replicas: 3 selector: matchLabels: app: nginx-pod template: # iniciando configurações do POD metadata: name: nginx-pod labels: app: nginx-pod spec: containers: - name: nginx-container image: nginx:stable ports: - containerPort: 80
19.181818
35
0.56872
f7483473fe4fe2c8acb52f677594d2e482d32f2b
293
yaml
YAML
services/component-repository/k8s/deployment/service.yaml
workloadco/workload
ad664c8f6935d4946732f2092d96cf4ecbbc6a6c
[ "Apache-2.0" ]
123
2018-08-17T21:39:49.000Z
2022-02-26T00:13:54.000Z
services/component-repository/k8s/deployment/service.yaml
workloadco/workload
ad664c8f6935d4946732f2092d96cf4ecbbc6a6c
[ "Apache-2.0" ]
714
2017-09-29T09:48:41.000Z
2022-03-11T09:24:12.000Z
services/component-repository/k8s/deployment/service.yaml
workloadco/workload
ad664c8f6935d4946732f2092d96cf4ecbbc6a6c
[ "Apache-2.0" ]
39
2017-09-29T09:43:33.000Z
2021-11-02T08:56:02.000Z
apiVersion: v1 kind: Service metadata: name: component-repository-service namespace: oih-dev-ns labels: app: component-repository-service spec: type: NodePort selector: app: component-repository ports: - name: "1234" protocol: TCP port: 1234 targetPort: 1234
17.235294
37
0.699659
f7485dbdad025070180c73c9dcebafbe105bbc61
180
yaml
YAML
manifests/leader/diago-secret.yaml
t-bfame/diago
6e2cd59205482168643dfa981df3e094b31f2621
[ "Apache-2.0" ]
4
2020-08-17T15:48:54.000Z
2021-04-16T01:56:23.000Z
manifests/leader/diago-secret.yaml
t-bfame/diago
6e2cd59205482168643dfa981df3e094b31f2621
[ "Apache-2.0" ]
6
2021-01-01T04:20:57.000Z
2021-04-16T02:17:29.000Z
manifests/leader/diago-secret.yaml
t-bfame/diago
6e2cd59205482168643dfa981df3e094b31f2621
[ "Apache-2.0" ]
1
2021-05-19T18:57:05.000Z
2021-05-19T18:57:05.000Z
apiVersion: v1 kind: Secret metadata: name: diago-secret labels: app.kubernetes.io/name: diago app.kubernetes.io/part-of: diago stringData: DIAGO_GRAFANA_API_KEY: ""
18
36
0.733333
f7486b862bb5fb37daed755783a7b8fbfa526e7a
3,707
yaml
YAML
examples/operator/flekszible-operator-tls-configmap.yaml
elek/flekszible
2bd3dd8d53e2698fc317a567c16c9f9ac27aa13e
[ "Apache-2.0" ]
37
2019-01-12T10:36:58.000Z
2021-11-15T06:56:47.000Z
examples/operator/flekszible-operator-tls-configmap.yaml
elek/flekszible
2bd3dd8d53e2698fc317a567c16c9f9ac27aa13e
[ "Apache-2.0" ]
1
2021-08-01T19:15:46.000Z
2021-08-01T19:15:46.000Z
examples/operator/flekszible-operator-tls-configmap.yaml
elek/flekszible
2bd3dd8d53e2698fc317a567c16c9f9ac27aa13e
[ "Apache-2.0" ]
2
2020-10-22T07:03:39.000Z
2021-08-19T04:52:55.000Z
apiVersion: v1 kind: ConfigMap metadata: name: flekszible-operator-tls data: server.key: | -----BEGIN RSA PRIVATE KEY----- MIIEowIBAAKCAQEAxot6/FHepqpjRIERf+Y7d48LZzNfDsrIqUDVNuRMVTHT+BHO PRSFzwIw/kobd7kquZADu7GgcIUS+Ij2mM7FMP7tVagYJD4Mm0N4kXo36PlbHGYm GVObeV4H2dzAYCsuS/o7deUz+914cM5jh3GHMyZqD5ZtksAwLqOI0IFhIqiH71qp XLpejoGHQoDBoATS3BpR7JBF+f6O4mLqWBo3AoQQ0lvlw+sx1iF1T+rRTC/qduoj 1uvDfQ0yZfI+BzAZmkJkUvS2DzT/FA2ubd/8+onH/aEGvMFWGT1T/hopM6j8gTQY DRj4D39EhgtdTrtBwEHKXqv2giY/3oYJMJrw/wIDAQABAoIBAQCr7j0iIwNb8FDm EZ7F0unMLuMBC0tV0+TQLIR2dFxlqjCUsVaXLh5xlMQ4cJQ4qPCGoF+bOcZlqdcz wedJjETWmOuNMXM2b0UbbuIJmHyyEr0DarGzXONVxkemMbOlk78TrC2xejn58V9K 0G7/6x/Y+3r85Jceba9Ls/HWHTOwfhjbVk4SF89KvsUg8/Zxag8vLC9eYtRIUcX3 OgMSHoKRusN58GvmwT8JUnvVKFPFY50PKff8X3WkZu3K026dntvNJlHoiKyvmdUV 9xH2tB6apE8juRuKf2izd2EhfsxLzkSvsJSbin397rWxHq8EpuM9cIrZYB6U5+w1 mw31QYOBAoGBAM8ioNi+W2OcG8VkZLFut75S7rVEmrEqcom/OdTekBpIea1ASZit v8xEEGSCEW/3JABq+1cZNdxVwG1rXAsZryKrVBT7BEmKPZ3olk8g6Myxv0DuZznZ 2XTqh96pM4CeGIcASDsYpi32TV/tR9INhVne0M2KgkU8o2XegF+tmvKVAoGBAPVi DpOYELzdsUBjqX2C7WAPXLJVKotzNaLL1JggZdwhVUgfliLVJ2atfF1YjFSj064O yb4PqpAFwSz5I0GAiG2a1skbDIxPh0XRH0jdW47o2/MRNZ4Z/z/cgK27PlwIRdRG 3rVG3/H48rmCg73n1TrJ5UtPGOmLWI2B1GxzjqRDAoGAOgM1z16JE/3d3Uv/053x wlFR39zmAmakC6ZOGSt4apQP2BEgS62mARyzBqNTJOuv3poX6M37wskVis+9yLIZ 1fjsJLAlBD++gCJrLqBF80Z5DUN4D8DO4arqANecwBIHRpAyqrJ9oHPSOeKn8dGt nn0EN/zp/WA9V0OY6rMhqX0CgYBy+Q3hY+e7xpgNlmTM1TLJxojlWfhEPKgN7jlf ShbP7KJb18jt6ze56WGTDzE5W0WMkYs/TXHaZ4favaUiRMonqNwogE8B0yWLte9V oboLnNmp6w9XU9EAKB32yPvv/URSsR4ai+nUI5P/DcMSkPScxgp0ncwLaWoFa6aP ZhmYpwKBgGGme22Dx9Lm5ZN1U09yNpNcaaQ1WcSKbte9/XX3HJdPP00I6kp8Pjku x/R5WfypLmeykIFhBKLXdJ3NzBd3LnNeZAIZNPvrZJrOFTbCoCkkUfDZgkg3p4HI fvzwEPNprG3boRcXC/jGth4Ik6K1cSSicJz+AzvOuKMyAbfg4N8t -----END RSA PRIVATE KEY----- server.crt: | -----BEGIN CERTIFICATE----- MIIEuTCCAqGgAwIBAgIQEohgj/1XI/2c32y1J70zyTANBgkqhkiG9w0BAQsFADAN MQswCQYDVQQDEwJjYTAeFw0yMDA2MjEwOTM5NDVaFw0yMTEyMjEwOTM3NTFaMB4x HDAaBgNVBAMTE2ZsZWtzemlibGUtb3BlcmF0b3IwggEiMA0GCSqGSIb3DQEBAQUA A4IBDwAwggEKAoIBAQDGi3r8Ud6mqmNEgRF/5jt3jwtnM18OysipQNU25ExVMdP4 Ec49FIXPAjD+Sht3uSq5kAO7saBwhRL4iPaYzsUw/u1VqBgkPgybQ3iRejfo+Vsc ZiYZU5t5XgfZ3MBgKy5L+jt15TP73XhwzmOHcYczJmoPlm2SwDAuo4jQgWEiqIfv Wqlcul6OgYdCgMGgBNLcGlHskEX5/o7iYupYGjcChBDSW+XD6zHWIXVP6tFML+p2 6iPW68N9DTJl8j4HMBmaQmRS9LYPNP8UDa5t3/z6icf9oQa8wVYZPVP+GikzqPyB NBgNGPgPf0SGC11Ou0HAQcpeq/aCJj/ehgkwmvD/AgMBAAGjggECMIH/MA4GA1Ud DwEB/wQEAwIDuDAdBgNVHSUEFjAUBggrBgEFBQcDAQYIKwYBBQUHAwIwHQYDVR0O BBYEFK+0C1U9M5NMQXnbUE7PQ1gex4FbMB8GA1UdIwQYMBaAFN8OHkfuomJsTDlj Dt/CzpOWM+WAMIGNBgNVHREEgYUwgYKCE2ZsZWtzemlibGUtb3BlcmF0b3KCG2Zs ZWtzemlibGUtb3BlcmF0b3IuZGVmYXVsdIIfZmxla3N6aWJsZS1vcGVyYXRvci5k ZWZhdWx0LnN2Y4ItZmxla3N6aWJsZS1vcGVyYXRvci5kZWZhdWx0LnN2Yy5jbHVz dGVyLmxvY2FsMA0GCSqGSIb3DQEBCwUAA4ICAQAwrPYSRyOfZtvoGvwUxc3vSNRB cLA15ud934dt0YtPeX/FxwSoV9glaSl68D/KO6STVTPvr8jUAlzB1KOFYnmIUicD rldy9WfUpYi7ZdELW8+3YnISv+G+es6YlAXexKdfW55u3MgNl1YfAMgjCmO4pqxb skxKOIREIdmc+IA1F4Lp7r6hbMMIKvbNgD/7HZJuFcFv7lmiS+pZ2wpCLk6EfA3l aVRD11sP4+38LzuavRzVfE+GPEs2Dr5ZHusk8LOBEozWN0hIO68us5xBwvxqSqlO aLnXg8Xsv2Vhcygt4v/4ffwQ4xqavzXAM70PxjwSLryr2xPfj91VCe3U3EBApxck aAsHN0O41VwxkO6+dRUEJ+U1qtkeC27TGaLzlsY8XFBWVYk6z/60yLOyTfr6GRuy ha/CDUcidLB5jRvMSakLP9NPEAnkThW4m0A0mH+IUfGbskElydMvIORx/XKWCveA H2Hn8TLBmyA71K767096lB0GTAijAy/+8rrwQCsXVncQG0DXi9T23unqTzoeF88B 82YMshWe7fDnaXZNxZs6f2tb8dvOA/epXOt6/DiFxyR/v0Bf3nv9drWOf6Y74rEx XBKXHq30/dQvoAFnW0fnXiZOaWXoFi+t8Jn7I2znghJmSr4e+eZtTDkFrzwp4IRG o3JJfAZ2XCVgwAIKvg== -----END CERTIFICATE-----
57.921875
68
0.876989
f74929d0af4e54bce3d3bb9570572b61724c8653
127
yaml
YAML
operators-examples/qiskit-dev-operator/operator/deploy/sectret.yaml
renier/glowing-quantum
2d554e69b023db5e7cff5ac7c2d714bd570e3b47
[ "Apache-2.0" ]
null
null
null
operators-examples/qiskit-dev-operator/operator/deploy/sectret.yaml
renier/glowing-quantum
2d554e69b023db5e7cff5ac7c2d714bd570e3b47
[ "Apache-2.0" ]
2
2020-07-13T20:59:15.000Z
2020-08-18T13:26:40.000Z
operators-examples/qiskit-dev-operator/operator/deploy/sectret.yaml
renier/glowing-quantum
2d554e69b023db5e7cff5ac7c2d714bd570e3b47
[ "Apache-2.0" ]
2
2020-07-13T20:53:55.000Z
2020-08-09T18:26:01.000Z
apiVersion: v1 kind: Secret metadata: name: qiskit-secret type: Opaque data: qiskit-secret.cfg: <base64 encoded secret.cfg>
18.142857
48
0.76378
f74953ce5d2dce139329e653a93d70b438882cd0
177
yaml
YAML
k8s-manifests/kiali-secret.yaml
allanhung/istio-fleetman
6779573a68f92d86a45c6ce6ecc8884137363218
[ "MIT" ]
241
2019-06-13T20:37:08.000Z
2022-03-14T09:07:25.000Z
k8s-manifests/kiali-secret.yaml
allanhung/istio-fleetman
6779573a68f92d86a45c6ce6ecc8884137363218
[ "MIT" ]
42
2019-06-13T16:20:31.000Z
2020-11-26T16:14:53.000Z
k8s-manifests/kiali-secret.yaml
allanhung/istio-fleetman
6779573a68f92d86a45c6ce6ecc8884137363218
[ "MIT" ]
444
2019-09-04T14:59:38.000Z
2022-03-25T01:03:55.000Z
apiVersion: v1 kind: Secret type: Opaque metadata: name: kiali namespace: istio-system labels: app: kiali data: username: YWRtaW4= passphrase: YWRtaW4=
14.75
26
0.672316
f7495b7924506c5c0af4d4a2ce2132e12184b5b2
338
yml
YAML
.k8s/pod1.yml
marcinkaw/CiDotNetTest2
c8b53d6f5543ba1f15f6ff52e456edbcaf63e026
[ "MIT" ]
null
null
null
.k8s/pod1.yml
marcinkaw/CiDotNetTest2
c8b53d6f5543ba1f15f6ff52e456edbcaf63e026
[ "MIT" ]
null
null
null
.k8s/pod1.yml
marcinkaw/CiDotNetTest2
c8b53d6f5543ba1f15f6ff52e456edbcaf63e026
[ "MIT" ]
null
null
null
apiVersion: v1 kind: ReplicationController metadata: name: cidotnet-rc spec: replicas: 1 selector: app: cidotnet-app template: metadata: labels: app: cidotnet-app spec: containers: - name: cidotnet-pod image: markaw/cidotnet-app ports: - containerPort: 80
16.9
36
0.594675
f74970b0aa27dcab558b3ce2f1822332848e5502
1,034
yaml
YAML
Initialize/yaml/upstream/upstream.yaml
Azure/azure-signalr-bench
5155f68defd76d85c87f677fba957d69bfd7dfb3
[ "MIT" ]
32
2018-07-30T02:17:48.000Z
2020-12-12T17:26:45.000Z
Initialize/yaml/upstream/upstream.yaml
Azure/azure-signalr-bench
5155f68defd76d85c87f677fba957d69bfd7dfb3
[ "MIT" ]
7
2018-07-30T07:35:52.000Z
2021-08-30T03:18:25.000Z
Initialize/yaml/upstream/upstream.yaml
Azure/azure-signalr-bench
5155f68defd76d85c87f677fba957d69bfd7dfb3
[ "MIT" ]
8
2018-09-29T02:41:25.000Z
2021-07-27T04:04:39.000Z
apiVersion: apps/v1 # for versions before 1.9.0 use apps/v1beta2 kind: Deployment metadata: name: upstream spec: selector: matchLabels: app: upstream replicas: 1 # tells deployment to run 2 pods matching the template template: metadata: labels: app: upstream spec: nodeSelector: agentpool: captain containers: - name: upstream image: signalrbenchmark/perf:1.4.4 resources: requests: cpu: 100m memory: 1024Mi limits: cpu: 150m memory: 1024Mi volumeMounts: - mountPath: "/mnt/perf" name: volume command: ["/bin/sh", "-c"] args: ["cp /mnt/perf/manifest/SignalRUpstream/SignalRUpstream.zip /home ; cd /home ; unzip SignalRUpstream.zip ; exec ./SignalRUpstream"] volumes: - name: volume azureFile: secretName: azure-secret shareName: perf readOnly: false
27.210526
147
0.558027
f74992e7321b4198ca2eb07f10b7e87460da9912
496
yaml
YAML
06.pod.network.config/k8s/local-redis-deployment.yaml
press-any-key-tech/001.docker-k8s-demo
8469aadc5d17781751e0c98b802a422542db58b3
[ "MIT" ]
null
null
null
06.pod.network.config/k8s/local-redis-deployment.yaml
press-any-key-tech/001.docker-k8s-demo
8469aadc5d17781751e0c98b802a422542db58b3
[ "MIT" ]
null
null
null
06.pod.network.config/k8s/local-redis-deployment.yaml
press-any-key-tech/001.docker-k8s-demo
8469aadc5d17781751e0c98b802a422542db58b3
[ "MIT" ]
null
null
null
apiVersion: apps/v1 kind: Deployment metadata: name: local-redis labels: deployment: local-redis spec: replicas: 1 selector: matchLabels: pod: local-redis template: metadata: labels: pod: local-redis spec: containers: - name: redis image: redis:alpine imagePullPolicy: IfNotPresent resources: requests: cpu: 100m memory: 100Mi ports: - containerPort: 6379
18.37037
45
0.566532
f749f21a04895f81e00ccb6822f3b082803a9eb8
763
yaml
YAML
k8s/clusters/sidero-control/integrations/dhcp-server/deployment.yaml
raspbernetes/k8s-cluster
f8eaae22efca5a6f87351990dde1238bfbdd3cd2
[ "Apache-2.0" ]
4
2020-02-24T09:47:31.000Z
2020-03-11T04:06:12.000Z
k8s/clusters/sidero-control/integrations/dhcp-server/deployment.yaml
Raspbernetes/k8s-cluster
8bb455d5b94e0c0e31173ceb2f9f31156517e592
[ "Apache-2.0" ]
null
null
null
k8s/clusters/sidero-control/integrations/dhcp-server/deployment.yaml
Raspbernetes/k8s-cluster
8bb455d5b94e0c0e31173ceb2f9f31156517e592
[ "Apache-2.0" ]
1
2020-03-17T10:28:35.000Z
2020-03-17T10:28:35.000Z
--- apiVersion: apps/v1 kind: Deployment metadata: name: dhcp-server namespace: kube-system spec: selector: matchLabels: app: dhcp-server template: metadata: labels: app: dhcp-server spec: containers: - args: - sleep 1000000000; command: - /bin/sh - -c - -- image: xunholy/dhcp-server:latest imagePullPolicy: Always name: dhcp-server resources: {} securityContext: {} terminationMessagePath: /dev/termination-log terminationMessagePolicy: File volumeMounts: - mountPath: /etc/dhcp name: server-config hostNetwork: true volumes: - emptyDir: {} name: server-config
20.621622
52
0.566186
f749f8e573d733cbaa8b65c0c1264e9edbcbf7ef
574
yml
YAML
jobs/cron.job.yml
siimp/kubernetes-samples
69f37858ee4aa382d6952aaeb6e0e04e903109f1
[ "MIT" ]
null
null
null
jobs/cron.job.yml
siimp/kubernetes-samples
69f37858ee4aa382d6952aaeb6e0e04e903109f1
[ "MIT" ]
null
null
null
jobs/cron.job.yml
siimp/kubernetes-samples
69f37858ee4aa382d6952aaeb6e0e04e903109f1
[ "MIT" ]
null
null
null
apiVersion: batch/v1 kind: CronJob metadata: name: my-cron-job spec: concurrencyPolicy: Allow schedule: "*/1 * * * *" jobTemplate: spec: template: metadata: name: my-cron-job labels: job: my-cron-job spec: restartPolicy: OnFailure containers: - name: my-cron-job image: alpine:3.15.0 resources: limits: memory: "16Mi" cpu: "10m" command: ["sh", "-c", 'echo "doing my job $(date)"']
23.916667
66
0.468641
f74a581ed3bb31d45ba2d37f6217c901924f5f24
546
yaml
YAML
manifests/namespace-install/02b_workflow-controller-role.yaml
elikatsis/argo
f92284d7108ebf92907008d8f12a0696ee467a43
[ "Apache-2.0" ]
2
2020-03-10T02:37:00.000Z
2020-08-29T15:42:15.000Z
manifests/namespace-install/02b_workflow-controller-role.yaml
elikatsis/argo
f92284d7108ebf92907008d8f12a0696ee467a43
[ "Apache-2.0" ]
1
2019-08-19T13:08:11.000Z
2019-08-19T13:08:11.000Z
manifests/namespace-install/02b_workflow-controller-role.yaml
elikatsis/argo
f92284d7108ebf92907008d8f12a0696ee467a43
[ "Apache-2.0" ]
3
2020-09-26T15:49:43.000Z
2020-11-18T19:13:30.000Z
apiVersion: rbac.authorization.k8s.io/v1 kind: Role metadata: name: argo-role rules: - apiGroups: - "" resources: - pods - pods/exec verbs: - create - get - list - watch - update - patch - delete - apiGroups: - "" resources: - configmaps verbs: - get - watch - list - apiGroups: - "" resources: - persistentvolumeclaims verbs: - create - delete - apiGroups: - argoproj.io resources: - workflows - workflows/finalizers verbs: - get - list - watch - update - patch - delete
11.869565
40
0.602564
f74a5df6130a94c8887236c4a24d894db726c1a9
1,840
yaml
YAML
apps/prow/cluster/horologium_deployment.yaml
xmudrii/k8s.io
a8ec49c1a6517200b580e302c809f3a908d4a366
[ "Apache-2.0" ]
null
null
null
apps/prow/cluster/horologium_deployment.yaml
xmudrii/k8s.io
a8ec49c1a6517200b580e302c809f3a908d4a366
[ "Apache-2.0" ]
null
null
null
apps/prow/cluster/horologium_deployment.yaml
xmudrii/k8s.io
a8ec49c1a6517200b580e302c809f3a908d4a366
[ "Apache-2.0" ]
null
null
null
# Copyright 2021 The Kubernetes Authors All rights reserved. # # Licensed under the Apache License, Version 2.0 (the "License"); # you may not use this file except in compliance with the License. # You may obtain a copy of the License at # # http://www.apache.org/licenses/LICENSE-2.0 # # Unless required by applicable law or agreed to in writing, software # distributed under the License is distributed on an "AS IS" BASIS, # WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. # See the License for the specific language governing permissions and # limitations under the License. apiVersion: apps/v1 kind: Deployment metadata: namespace: prow name: horologium labels: app: horologium spec: replicas: 1 # Do not scale up. strategy: type: Recreate selector: matchLabels: app: horologium template: metadata: labels: app: horologium spec: serviceAccountName: horologium terminationGracePeriodSeconds: 30 containers: - name: horologium image: gcr.io/k8s-prow/horologium:v20211108-892eb8add1 args: - --config-path=/etc/config/config.yaml - --dry-run=false - --job-config-path=/etc/job-config ports: - name: metrics containerPort: 9090 volumeMounts: - name: config mountPath: /etc/config readOnly: true - name: job-config mountPath: /etc/job-config readOnly: true securityContext: allowPrivilegeEscalation: false capabilities: drop: - "ALL" privileged: false readOnlyRootFilesystem: true volumes: - name: config configMap: name: config - name: job-config configMap: name: job-config
27.462687
74
0.63587
f74ab7f0fb2d400c6a2730c2e7c39c1e9a787a27
241
yaml
YAML
examples/csi-storageclass.yaml
princerachit/cstor-csi
31f93abf7963084ba7167d1fd99a30d5bcdb1414
[ "Apache-2.0" ]
18
2019-12-06T14:15:44.000Z
2022-03-31T14:53:17.000Z
examples/csi-storageclass.yaml
princerachit/cstor-csi
31f93abf7963084ba7167d1fd99a30d5bcdb1414
[ "Apache-2.0" ]
94
2019-10-31T06:13:23.000Z
2022-03-01T06:45:04.000Z
examples/csi-storageclass.yaml
princerachit/cstor-csi
31f93abf7963084ba7167d1fd99a30d5bcdb1414
[ "Apache-2.0" ]
18
2019-11-06T14:37:30.000Z
2022-03-31T12:10:08.000Z
kind: StorageClass apiVersion: storage.k8s.io/v1 metadata: name: openebs-csi-cstor-sparse provisioner: cstor.csi.openebs.io allowVolumeExpansion: true parameters: cas-type: cstor replicaCount: "1" cstorPoolCluster: cstor-sparse-cspc
21.909091
37
0.792531
f74abfb50386cee0e7774dc139c4bd7353411edb
2,120
yaml
YAML
config/webhook.yaml
ssmall/knative-serving
9e483da903afe255f7e1f9cdc5a002618cc84a02
[ "Apache-2.0" ]
1
2020-04-28T09:30:29.000Z
2020-04-28T09:30:29.000Z
config/webhook.yaml
alokkulkarni/serving
87478692aefc65c761102e6d640967f5d876c04d
[ "Apache-2.0" ]
null
null
null
config/webhook.yaml
alokkulkarni/serving
87478692aefc65c761102e6d640967f5d876c04d
[ "Apache-2.0" ]
null
null
null
# Copyright 2018 The Knative Authors # # Licensed under the Apache License, Version 2.0 (the "License"); # you may not use this file except in compliance with the License. # You may obtain a copy of the License at # # https://www.apache.org/licenses/LICENSE-2.0 # # Unless required by applicable law or agreed to in writing, software # distributed under the License is distributed on an "AS IS" BASIS, # WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. # See the License for the specific language governing permissions and # limitations under the License. apiVersion: apps/v1 kind: Deployment metadata: name: webhook namespace: knative-serving labels: serving.knative.dev/release: devel spec: replicas: 1 selector: matchLabels: app: webhook role: webhook template: metadata: annotations: cluster-autoscaler.kubernetes.io/safe-to-evict: "false" sidecar.istio.io/inject: "false" labels: app: webhook role: webhook serving.knative.dev/release: devel spec: serviceAccountName: controller containers: - name: webhook # This is the Go import path for the binary that is containerized # and substituted here. image: knative.dev/serving/cmd/webhook ports: - name: metrics-port containerPort: 9090 - name: profiling containerPort: 8008 resources: # Request 2x what we saw running e2e requests: cpu: 20m memory: 20Mi # Limit to 10x the request (20x the observed peak during e2e) limits: cpu: 200m memory: 200Mi env: - name: SYSTEM_NAMESPACE valueFrom: fieldRef: fieldPath: metadata.namespace - name: CONFIG_LOGGING_NAME value: config-logging - name: CONFIG_OBSERVABILITY_NAME value: config-observability - name: METRICS_DOMAIN value: knative.dev/serving securityContext: allowPrivilegeEscalation: false
29.859155
74
0.640566
f74ae94a125c7d92f6c6b1853d41cf6d27ce7e91
617
yaml
YAML
kubernetes-controllers/paymentservice-deployment.yaml
otus-kuber-2022-03/BorisLuchnikov_platform
25440d1f97fda730175fe969da891bacfba78438
[ "MIT" ]
null
null
null
kubernetes-controllers/paymentservice-deployment.yaml
otus-kuber-2022-03/BorisLuchnikov_platform
25440d1f97fda730175fe969da891bacfba78438
[ "MIT" ]
1
2022-03-29T05:54:47.000Z
2022-03-30T18:52:51.000Z
kubernetes-controllers/paymentservice-deployment.yaml
otus-kuber-2022-03/BorisLuchnikov_platform
25440d1f97fda730175fe969da891bacfba78438
[ "MIT" ]
null
null
null
apiVersion: apps/v1 kind: Deployment metadata: name: paymentservice labels: app: paymentservice spec: replicas: 3 selector: matchLabels: app: paymentservice template: metadata: labels: app: paymentservice spec: containers: - name: server image: borisluchnikov/hs-paymentservice:v0.0.2 ports: - containerPort: 50051 env: - name: PORT value: "50051" - name: DISABLE_TRACING value: "1" - name: DISABLE_PROFILER value: "1" - name: DISABLE_DEBUGGER value: "1"
19.903226
54
0.568882
f74aefd32e7c21cc1be9632d628253e88eaaf0bc
3,492
yaml
YAML
config/prow/cluster/hook_deployment.yaml
tylerferrara/test-infra
27c2f2c5d2407835134677b72d7cf050e2e8bdd2
[ "Apache-2.0" ]
null
null
null
config/prow/cluster/hook_deployment.yaml
tylerferrara/test-infra
27c2f2c5d2407835134677b72d7cf050e2e8bdd2
[ "Apache-2.0" ]
null
null
null
config/prow/cluster/hook_deployment.yaml
tylerferrara/test-infra
27c2f2c5d2407835134677b72d7cf050e2e8bdd2
[ "Apache-2.0" ]
null
null
null
# Copyright 2016 The Kubernetes Authors All rights reserved. # # Licensed under the Apache License, Version 2.0 (the "License"); # you may not use this file except in compliance with the License. # You may obtain a copy of the License at # # http://www.apache.org/licenses/LICENSE-2.0 # # Unless required by applicable law or agreed to in writing, software # distributed under the License is distributed on an "AS IS" BASIS, # WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. # See the License for the specific language governing permissions and # limitations under the License. apiVersion: apps/v1 kind: Deployment metadata: namespace: default name: hook labels: app: hook spec: replicas: 4 strategy: type: RollingUpdate rollingUpdate: maxSurge: 1 maxUnavailable: 1 selector: matchLabels: app: hook template: metadata: labels: app: hook spec: serviceAccountName: hook terminationGracePeriodSeconds: 180 containers: - name: hook image: gcr.io/k8s-prow/hook:v20210615-c3915f8ad7 imagePullPolicy: Always args: - --dry-run=false - --slack-token-file=/etc/slack/token - --github-endpoint=http://ghproxy - --github-endpoint=https://api.github.com - --github-token-path=/etc/github/oauth - --config-path=/etc/config/config.yaml - --job-config-path=/etc/job-config env: # Use KUBECONFIG envvar rather than --kubeconfig flag in order to provide multiple configs to merge. - name: KUBECONFIG value: "/etc/kubeconfig/config" ports: - name: http containerPort: 8888 volumeMounts: - name: slack mountPath: /etc/slack - name: hmac mountPath: /etc/webhook readOnly: true - name: oauth mountPath: /etc/github readOnly: true - name: config mountPath: /etc/config readOnly: true - name: job-config mountPath: /etc/job-config readOnly: true - name: plugins mountPath: /etc/plugins readOnly: true - name: cat-api mountPath: /etc/cat-api readOnly: true - name: unsplash-api mountPath: /etc/unsplash-api readOnly: true - name: kubeconfig mountPath: /etc/kubeconfig readOnly: true livenessProbe: httpGet: path: /healthz port: 8081 initialDelaySeconds: 3 periodSeconds: 3 readinessProbe: httpGet: path: /healthz/ready port: 8081 initialDelaySeconds: 10 periodSeconds: 3 timeoutSeconds: 600 volumes: - name: slack secret: secretName: slack-token - name: hmac secret: secretName: hmac-token - name: oauth secret: secretName: oauth-token - name: config configMap: name: config - name: job-config configMap: name: job-config - name: plugins configMap: name: plugins - name: cat-api configMap: name: cat-api-key - name: unsplash-api secret: secretName: unsplash-api-key - name: kubeconfig secret: defaultMode: 420 secretName: kubeconfig
27.496063
108
0.581042
f74b5b0b0ce6b6b180dedc07b24ce97c67b65375
429
yaml
YAML
manifests/07_configmap.yaml
multi-arch/operator-marketplace
d973051f6cc7a24168f0463c95f4f9a1785f8907
[ "Apache-2.0" ]
null
null
null
manifests/07_configmap.yaml
multi-arch/operator-marketplace
d973051f6cc7a24168f0463c95f4f9a1785f8907
[ "Apache-2.0" ]
null
null
null
manifests/07_configmap.yaml
multi-arch/operator-marketplace
d973051f6cc7a24168f0463c95f4f9a1785f8907
[ "Apache-2.0" ]
null
null
null
apiVersion: v1 kind: ConfigMap metadata: labels: # This label ensures that the OpenShift Certificate Authority bundle # is added to the ConfigMap. config.openshift.io/inject-trusted-cabundle: "true" name: marketplace-trusted-ca namespace: openshift-marketplace annotations: include.release.openshift.io/self-managed-high-availability: "true" include.release.openshift.io/single-node-developer: "true"
33
72
0.764569
f74bd05b87bc3d3074b6781ec68a80c36c5c69fc
292
yaml
YAML
yamls/knative/clusterrole_istio-init-istio-system.yaml
jmnote/kubeyaml
675b07a90d2295f697e89294dd31030943836a0d
[ "Apache-2.0" ]
1
2022-01-28T16:03:48.000Z
2022-01-28T16:03:48.000Z
yamls/knative/clusterrole_istio-init-istio-system.yaml
jmnote/kubeyaml
675b07a90d2295f697e89294dd31030943836a0d
[ "Apache-2.0" ]
null
null
null
yamls/knative/clusterrole_istio-init-istio-system.yaml
jmnote/kubeyaml
675b07a90d2295f697e89294dd31030943836a0d
[ "Apache-2.0" ]
1
2022-02-15T07:57:28.000Z
2022-02-15T07:57:28.000Z
apiVersion: rbac.authorization.k8s.io/v1 kind: ClusterRole metadata: labels: app: istio-init istio: init name: istio-init-istio-system rules: - apiGroups: - apiextensions.k8s.io resources: - customresourcedefinitions verbs: - create - get - list - watch - patch
15.368421
40
0.691781
f74c3b8c11fda476584aea72d88e0b6efb92e078
2,134
yaml
YAML
gatekeeper/tests/11-dep-reg-allow.yaml
jimmyraywv/opa
8a7a674bed5e6874512d8b2f6865aba95f7da8e2
[ "Apache-2.0" ]
null
null
null
gatekeeper/tests/11-dep-reg-allow.yaml
jimmyraywv/opa
8a7a674bed5e6874512d8b2f6865aba95f7da8e2
[ "Apache-2.0" ]
null
null
null
gatekeeper/tests/11-dep-reg-allow.yaml
jimmyraywv/opa
8a7a674bed5e6874512d8b2f6865aba95f7da8e2
[ "Apache-2.0" ]
null
null
null
apiVersion: apps/v1 kind: Deployment metadata: name: test namespace: opa-test labels: app: test owner: jimmy spec: selector: matchLabels: app: test replicas: 1 strategy: type: RollingUpdate rollingUpdate: maxSurge: 5 maxUnavailable: 1 template: metadata: labels: app: test owner: jimmy env: dev annotations: iam.amazonaws.com/role: arn:aws:iam::123456789012:role/test spec: containers: - name: bad-test image: BAD_REGISTRY/read-only-container:v0.0.1 imagePullPolicy: Always securityContext: allowPrivilegeEscalation: false runAsUser: 1000 readOnlyRootFilesystem: true ports: - containerPort: 8080 resources: limits: cpu: 200m memory: 20Mi requests: cpu: 100m memory: 10Mi readinessProbe: tcpSocket: port: 8080 initialDelaySeconds: 5 periodSeconds: 10 livenessProbe: tcpSocket: port: 8080 initialDelaySeconds: 15 periodSeconds: 20 volumeMounts: - mountPath: /tmp name: tmp - name: good-test image: GOOD_REGISTRY/read-only-container:v0.0.1 imagePullPolicy: Always securityContext: allowPrivilegeEscalation: false runAsUser: 1000 readOnlyRootFilesystem: true ports: - containerPort: 8080 resources: limits: cpu: 200m memory: 20Mi requests: cpu: 100m memory: 10Mi readinessProbe: tcpSocket: port: 8080 initialDelaySeconds: 5 periodSeconds: 10 livenessProbe: tcpSocket: port: 8080 initialDelaySeconds: 15 periodSeconds: 20 volumeMounts: - mountPath: /tmp name: tmp volumes: - name: tmp emptyDir: {}
23.450549
67
0.523899
f74c525e5f195a8643d20bfe4068ec00cf3e5ecf
370
yaml
YAML
component/nodejs/dependence/npm/component-nodejs-dependence-npm.yaml
armohamm/containerops
8cd22168d64869902cd91968599373f8eab60ca3
[ "Apache-2.0" ]
355
2016-10-19T08:46:24.000Z
2022-03-16T06:01:14.000Z
component/nodejs/dependence/npm/component-nodejs-dependence-npm.yaml
armohamm/containerops
8cd22168d64869902cd91968599373f8eab60ca3
[ "Apache-2.0" ]
66
2016-10-26T04:00:39.000Z
2018-09-25T11:44:32.000Z
component/nodejs/dependence/npm/component-nodejs-dependence-npm.yaml
armohamm/containerops
8cd22168d64869902cd91968599373f8eab60ca3
[ "Apache-2.0" ]
118
2016-10-18T11:50:37.000Z
2021-09-14T06:39:56.000Z
apiVersion: v1 kind: Pod metadata: name: component-nodejs-dependence-npm spec: containers: - name: npm image: hub.opshub.sh/containerops/dependence-nodejs-npm:latest env: - name: CO_DATA value: "git_url=https://github.com/WildDogTeam/demo-js-wildchat.git" resources: requests: cpu: 2 memory: 4G restartPolicy: Never
23.125
74
0.67027
f74c621e34099b96dc75ab863ea87d1ff2e4dd0a
222
yml
YAML
manifests/service.yml
alexandermill3r/pipelines-javascript-docker
d3880469d9f6af61904480ebbb254b6212d1ce33
[ "CC-BY-4.0", "MIT" ]
null
null
null
manifests/service.yml
alexandermill3r/pipelines-javascript-docker
d3880469d9f6af61904480ebbb254b6212d1ce33
[ "CC-BY-4.0", "MIT" ]
null
null
null
manifests/service.yml
alexandermill3r/pipelines-javascript-docker
d3880469d9f6af61904480ebbb254b6212d1ce33
[ "CC-BY-4.0", "MIT" ]
null
null
null
apiVersion: v1 kind: Service metadata: name: alexandermillrpipelinesjavascriptdocker spec: type: LoadBalancer ports: - port: 8080 selector: app: alexandermillrpipelinesjavascriptdocker
22.2
52
0.707207
f74c65ee337c76706294e1fb02b30ba1723182d2
429
yaml
YAML
staging/src/k8s.io/pod-security-admission/test/testdata/restricted/v1.9/fail/restrictedvolumes10.yaml
767829413/kubernetes
e3982ce472af31efe0cfb5165271c84f1ace0b0f
[ "Apache-2.0" ]
84,910
2015-08-12T17:45:55.000Z
2022-03-31T23:39:40.000Z
staging/src/k8s.io/pod-security-admission/test/testdata/restricted/v1.9/fail/restrictedvolumes10.yaml
767829413/kubernetes
e3982ce472af31efe0cfb5165271c84f1ace0b0f
[ "Apache-2.0" ]
98,305
2015-08-12T17:35:13.000Z
2022-03-31T23:46:47.000Z
staging/src/k8s.io/pod-security-admission/test/testdata/restricted/v1.9/fail/restrictedvolumes10.yaml
767829413/kubernetes
e3982ce472af31efe0cfb5165271c84f1ace0b0f
[ "Apache-2.0" ]
36,592
2015-08-12T18:36:13.000Z
2022-03-31T16:22:17.000Z
apiVersion: v1 kind: Pod metadata: name: restrictedvolumes10 spec: containers: - image: k8s.gcr.io/pause name: container1 securityContext: allowPrivilegeEscalation: false initContainers: - image: k8s.gcr.io/pause name: initcontainer1 securityContext: allowPrivilegeEscalation: false securityContext: runAsNonRoot: true volumes: - flocker: datasetName: test name: volume1
19.5
37
0.710956
f74cc67197eb0154d15f6eebe8dba032cb4ede35
763
yaml
YAML
namespaces/live.cloud-platform.service.justice.gov.uk/cloud-platform-migration/00-namespace.yaml
rossjones/cloud-platform-environments
85a4e19cf012d97d885c6ea91379ca3f7b59a49a
[ "MIT" ]
28
2018-07-13T15:02:24.000Z
2022-03-17T09:23:54.000Z
namespaces/live.cloud-platform.service.justice.gov.uk/cloud-platform-migration/00-namespace.yaml
happygeneralist/recall-decisions-alpha
09124f3994a878e9969e7b4326088b2ae7bfd170
[ "MIT" ]
963
2018-05-30T15:46:06.000Z
2022-03-30T10:06:39.000Z
namespaces/live.cloud-platform.service.justice.gov.uk/cloud-platform-migration/00-namespace.yaml
happygeneralist/recall-decisions-alpha
09124f3994a878e9969e7b4326088b2ae7bfd170
[ "MIT" ]
29
2018-12-04T09:37:36.000Z
2022-02-25T10:35:34.000Z
apiVersion: v1 kind: Namespace metadata: name: cloud-platform-migration labels: cloud-platform.justice.gov.uk/is-production: "false" cloud-platform.justice.gov.uk/environment-name: "development" annotations: cloud-platform.justice.gov.uk/business-unit: "Platforms" cloud-platform.justice.gov.uk/slack-channel: "cloud-platform-low-priority" cloud-platform.justice.gov.uk/application: "Cloud Platform migration test" cloud-platform.justice.gov.uk/owner: "cloud-platform: platforms@digital.justice.gov.uk" cloud-platform.justice.gov.uk/source-code: "https://github.com/ministryofjustice/cloud-platform-reference-app" cloud-platform.justice.gov.uk/team-name: "webops" cloud-platform.justice.gov.uk/review-after: "2021-09-23"
47.6875
114
0.764089
f74d77d3e47c1d86bdab1f65722aebf7ee1b9aa8
186
yaml
YAML
frontend-ui5-mssql/k8s/configmap.yaml
oksanazubchenko/kyma-runtime-extension-samples
c368e92cf2ed3c4a827ae139fc33e2640a223b41
[ "Apache-2.0" ]
91
2020-07-06T19:38:37.000Z
2022-03-14T14:44:52.000Z
frontend-ui5-mssql/k8s/configmap.yaml
oksanazubchenko/kyma-runtime-extension-samples
c368e92cf2ed3c4a827ae139fc33e2640a223b41
[ "Apache-2.0" ]
48
2020-09-09T08:32:38.000Z
2022-03-14T11:01:09.000Z
frontend-ui5-mssql/k8s/configmap.yaml
oksanazubchenko/kyma-runtime-extension-samples
c368e92cf2ed3c4a827ae139fc33e2640a223b41
[ "Apache-2.0" ]
49
2020-07-15T12:39:52.000Z
2022-03-10T10:40:18.000Z
kind: ConfigMap apiVersion: v1 metadata: name: fe-ui5-mssql labels: app: fe-ui5-mssql data: config.json: |- { "API_URL": "https://api-mssql-go.<cluster domain>" }
16.909091
56
0.61828
f74d90160f2dd9b4d59857aadf1b8bd50dca21ac
88
yaml
YAML
kitchensink/tekton/link-sa-pipeline.yaml
franktp1/jboss-eap-quickstarts
f42cbda22d49a9468d7b2853c64e3704e031f592
[ "Apache-2.0" ]
null
null
null
kitchensink/tekton/link-sa-pipeline.yaml
franktp1/jboss-eap-quickstarts
f42cbda22d49a9468d7b2853c64e3704e031f592
[ "Apache-2.0" ]
null
null
null
kitchensink/tekton/link-sa-pipeline.yaml
franktp1/jboss-eap-quickstarts
f42cbda22d49a9468d7b2853c64e3704e031f592
[ "Apache-2.0" ]
1
2020-09-30T09:09:59.000Z
2020-09-30T09:09:59.000Z
apiVersion: v1 kind: ServiceAccount metadata: name: pipeline secrets: - name: regcred
12.571429
20
0.772727
f74da88260d69f63e1e73443b18ef24e0565e250
257
yaml
YAML
Chapter01/nginx-hpa.yaml
Noctoweb/Hands-On-Microservices-with-Kubernetes
cfdf3fc5a7a3745790b7d7376808eff1152ad101
[ "MIT" ]
81
2019-07-21T00:37:43.000Z
2022-03-04T20:28:40.000Z
Chapter01/nginx-hpa.yaml
Noctoweb/Hands-On-Microservices-with-Kubernetes
cfdf3fc5a7a3745790b7d7376808eff1152ad101
[ "MIT" ]
1
2021-11-01T23:28:31.000Z
2021-11-18T07:24:53.000Z
Chapter01/nginx-hpa.yaml
Noctoweb/Hands-On-Microservices-with-Kubernetes
cfdf3fc5a7a3745790b7d7376808eff1152ad101
[ "MIT" ]
74
2019-06-19T19:22:53.000Z
2022-03-24T15:14:48.000Z
apiVersion: autoscaling/v1 kind: HorizontalPodAutoscaler metadata: name: nginx namespace: default spec: maxReplicas: 4 minReplicas: 2 targetCPUUtilizationPercentage: 90 scaleTargetRef: apiVersion: apps/v1 kind: Deployment name: nginx
19.769231
36
0.762646
f74dfc83029b5b64aa0090b1a95ca44c53bb4a8e
1,288
yaml
YAML
addons/kotsadm/1.38.0/kurl-proxy/tmpl-deployment.yaml
Sharpie/kURL
b930200dec4d26de25b8de12213a80572d12094c
[ "Apache-2.0" ]
405
2020-01-27T05:25:11.000Z
2022-03-30T18:08:37.000Z
addons/kotsadm/1.38.0/kurl-proxy/tmpl-deployment.yaml
Sharpie/kURL
b930200dec4d26de25b8de12213a80572d12094c
[ "Apache-2.0" ]
1,073
2020-01-29T20:00:33.000Z
2022-03-31T04:26:06.000Z
addons/kotsadm/1.38.0/kurl-proxy/tmpl-deployment.yaml
Sharpie/kURL
b930200dec4d26de25b8de12213a80572d12094c
[ "Apache-2.0" ]
42
2020-02-14T20:56:37.000Z
2022-03-30T07:11:58.000Z
apiVersion: apps/v1 kind: Deployment metadata: name: kurl-proxy-kotsadm labels: app: kurl-proxy-kotsadm kots.io/kotsadm: \"true\" kots.io/backup: velero spec: selector: matchLabels: app: kurl-proxy-kotsadm template: metadata: labels: app: kurl-proxy-kotsadm kots.io/kotsadm: \"true\" kots.io/backup: velero spec: containers: - name: proxy image: kotsadm/kurl-proxy:v1.38.0 imagePullPolicy: IfNotPresent env: - name: NODE_PORT value: \"8800\" - name: UPSTREAM_ORIGIN value: http://kotsadm:3000 - name: DEX_UPSTREAM_ORIGIN value: http://kotsadm-dex:5556 - name: TLS_SECRET_NAME value: kotsadm-tls - name: NAMESPACE valueFrom: fieldRef: fieldPath: metadata.namespace volumeMounts: - name: kotsadm-config mountPath: /etc/kotsadm resources: limits: cpu: 200m memory: 200Mi requests: cpu: 50m memory: 50Mi serviceAccount: kurl-proxy volumes: - name: kotsadm-config configMap: name: kotsadm-application-metadata optional: true
24.301887
44
0.555124
f74e027e18328e5fc4142481d6dc7426a1605266
1,059
yaml
YAML
config-root/namespaces/jx/jx-pipelines-visualizer/jx-pipelines-visualizer-ingress.yaml
klau2005/jx3-minikube-test
d1dde47aef4784a5badb8c960a5bb407f8f06f68
[ "Apache-2.0" ]
null
null
null
config-root/namespaces/jx/jx-pipelines-visualizer/jx-pipelines-visualizer-ingress.yaml
klau2005/jx3-minikube-test
d1dde47aef4784a5badb8c960a5bb407f8f06f68
[ "Apache-2.0" ]
null
null
null
config-root/namespaces/jx/jx-pipelines-visualizer/jx-pipelines-visualizer-ingress.yaml
klau2005/jx3-minikube-test
d1dde47aef4784a5badb8c960a5bb407f8f06f68
[ "Apache-2.0" ]
null
null
null
# Source: jx-pipelines-visualizer/templates/ingress.yaml apiVersion: networking.k8s.io/v1 kind: Ingress metadata: name: jx-pipelines-visualizer labels: app.kubernetes.io/name: jx-pipelines-visualizer app.kubernetes.io/instance: "jx-pipelines-visualizer" helm.sh/chart: jx-pipelines-visualizer-1.7.2 app.kubernetes.io/version: "1.7.2" app.kubernetes.io/managed-by: "Helm" gitops.jenkins-x.io/pipeline: 'namespaces' annotations: kubernetes.io/ingress.class: nginx nginx.ingress.kubernetes.io/auth-realm: Authentication Required - Jenkins X Pipeline Dashboard nginx.ingress.kubernetes.io/auth-secret: jx-basic-auth-htpasswd nginx.ingress.kubernetes.io/auth-type: basic meta.helm.sh/release-name: 'jx-pipelines-visualizer' namespace: jx spec: rules: - host: dashboard-jx.192.168.39.23.nip.io http: paths: - pathType: ImplementationSpecific backend: service: name: jx-pipelines-visualizer port: name: http
34.16129
98
0.681775
f74e5e06dd7bf8b704a038c927331ca4ccdc9093
2,270
yaml
YAML
deploy/fb-user-datastore-chart/templates/deployment.yaml
uk-gov-mirror/ministryofjustice.fb-user-datastore
a0fdc84a17659726724c6507ec05ac6747e6ae25
[ "MIT" ]
null
null
null
deploy/fb-user-datastore-chart/templates/deployment.yaml
uk-gov-mirror/ministryofjustice.fb-user-datastore
a0fdc84a17659726724c6507ec05ac6747e6ae25
[ "MIT" ]
null
null
null
deploy/fb-user-datastore-chart/templates/deployment.yaml
uk-gov-mirror/ministryofjustice.fb-user-datastore
a0fdc84a17659726724c6507ec05ac6747e6ae25
[ "MIT" ]
null
null
null
--- # web front-end apiVersion: apps/v1 kind: Deployment metadata: name: "fb-user-datastore-api-{{ .Values.environmentName }}" spec: replicas: 10 selector: matchLabels: app: "fb-user-datastore-api-{{ .Values.environmentName }}" template: metadata: labels: app: "fb-user-datastore-api-{{ .Values.environmentName }}" appGroup: "fb-user-datastore" fb-service-token-cache-access: "true" tier: "frontend" spec: serviceAccountName: "formbuilder-user-datastore-{{ .Values.environmentName }}" containers: - name: "fb-user-datastore-api-{{ .Values.environmentName }}" image: "754256621582.dkr.ecr.eu-west-2.amazonaws.com/formbuilder/fb-user-datastore-api:{{ .Values.circleSha1 }}" securityContext: runAsUser: 1001 imagePullPolicy: Always ports: - containerPort: 3000 readinessProbe: httpGet: path: /health port: 3000 initialDelaySeconds: 5 periodSeconds: 5 successThreshold: 1 # non-secret env vars # defined in config_map.yaml envFrom: - configMapRef: name: fb-user-datastore-api-env-{{ .Values.environmentName }} env: - name: DATABASE_URL valueFrom: secretKeyRef: name: rds-instance-formbuilder-user-datastore-{{ .Values.environmentName }} key: url - name: SECRET_KEY_BASE valueFrom: secretKeyRef: name: fb-user-datastore-api-secrets-{{ .Values.environmentName }} key: secret_key_base - name: SERVICE_TOKEN valueFrom: secretKeyRef: name: fb-platform-datastore-token-{{ .Values.environmentName }} key: token - name: SENTRY_DSN valueFrom: secretKeyRef: name: fb-user-datastore-api-secrets-{{ .Values.environmentName }} key: sentry_dsn - name: METRICS_ACCESS_KEY valueFrom: secretKeyRef: name: fb-user-datastore-api-secrets-{{ .Values.environmentName }} key: metrics_access_key
33.880597
120
0.567401
f74ea36e591b5fade142e8571a5131e17ccf4a74
503
yaml
YAML
deployment-echo.yaml
tricky42/k3d-nfs
aef7475a58c956675ea89ed3dab976b4c8d7ce80
[ "Apache-2.0" ]
null
null
null
deployment-echo.yaml
tricky42/k3d-nfs
aef7475a58c956675ea89ed3dab976b4c8d7ce80
[ "Apache-2.0" ]
null
null
null
deployment-echo.yaml
tricky42/k3d-nfs
aef7475a58c956675ea89ed3dab976b4c8d7ce80
[ "Apache-2.0" ]
null
null
null
--- apiVersion: apps/v1 kind: Deployment metadata: name: echo spec: selector: matchLabels: app: echo strategy: type: Recreate template: metadata: labels: app: echo spec: volumes: - name: nfs-mount persistentVolumeClaim: claimName: nfs-for-pods containers: - image: busybox name: echo volumeMounts: - mountPath: "/data" name: nfs-mount command: ["ping", "127.0.0.1"]
18.62963
38
0.540755
f74eccbdac84c88159719886efe8a48cdd899011
1,527
yml
YAML
e2e-tests/experiments/upgrade-device-localpv/run_e2e_test.yml
mheler/device-localpv
7aa0f3896563e676891df337114cf3952a9a0f65
[ "Apache-2.0" ]
10
2021-03-24T01:44:57.000Z
2022-03-07T05:17:39.000Z
e2e-tests/experiments/upgrade-device-localpv/run_e2e_test.yml
mheler/device-localpv
7aa0f3896563e676891df337114cf3952a9a0f65
[ "Apache-2.0" ]
22
2021-03-12T14:31:25.000Z
2022-03-23T17:00:43.000Z
e2e-tests/experiments/upgrade-device-localpv/run_e2e_test.yml
mheler/device-localpv
7aa0f3896563e676891df337114cf3952a9a0f65
[ "Apache-2.0" ]
13
2021-03-11T16:55:46.000Z
2022-01-07T07:21:33.000Z
--- apiVersion: batch/v1 kind: Job metadata: generateName: upgrade-device-localpv- namespace: e2e spec: template: metadata: labels: test: device-localpv-upgrade spec: serviceAccountName: e2e restartPolicy: Never containers: - name: ansibletest image: openebs/device-localpv-e2e:ci imagePullPolicy: IfNotPresent env: - name: ANSIBLE_STDOUT_CALLBACK value: default ## Give the versioned branch name for device_localpv provisioner from openebs/device-localpv repo ## for e.g. (v1.4.x , v1.5.x OR master) - name: TO_VERSION_DEVICE_BRANCH value: '' ## Provide DEVICE_DRIVER image to which upgrade is to done. To use ci images use ci tag. ## Give full image name (for e.g. openebs/device-driver:<tag>) - name: TO_VERSION_DEVICE_DRIVER_IMAGE value: '' # This is the namespace where the device driver will create all its resources. # By default it is in openebs namespace. If you have been using some different namespace # provide that value. We should never attempt to modify this namespace as old resources will # not be available under the new namespace. - name: DEVICE_OPERATOR_NAMESPACE value: 'openebs' command: ["/bin/bash"] args: ["-c", "ansible-playbook ./e2e-tests/experiments/upgrade-device-localpv/test.yml -i /etc/ansible/hosts -v; exit 0"]
37.243902
129
0.632613
f74f97eb427f00cc0330de6ce10ba028de09ee35
722
yaml
YAML
aws/ingress-service.yaml
MaayanLab/CFTools
f567e9464cfc9c8372e5c7d6cb1fe456b1756951
[ "MIT" ]
null
null
null
aws/ingress-service.yaml
MaayanLab/CFTools
f567e9464cfc9c8372e5c7d6cb1fe456b1756951
[ "MIT" ]
2
2020-03-10T16:54:37.000Z
2020-03-10T20:49:48.000Z
aws/ingress-service.yaml
MaayanLab/CFTools
f567e9464cfc9c8372e5c7d6cb1fe456b1756951
[ "MIT" ]
null
null
null
kind: Service apiVersion: v1 metadata: name: ingress-nginx namespace: ingress-nginx labels: app.kubernetes.io/name: ingress-nginx app.kubernetes.io/part-of: ingress-nginx annotations: # by default the type is elb (classic load balancer). service.beta.kubernetes.io/aws-load-balancer-type: nlb spec: # this setting is to make sure the source IP address is preserved. externalTrafficPolicy: Local type: NodePort selector: app.kubernetes.io/name: ingress-nginx app.kubernetes.io/part-of: ingress-nginx ports: - name: http port: 80 nodePort: 30080 targetPort: 80 - name: https protocol: TCP port: 443 nodePort: 30443 targetPort: 443
24.066667
68
0.688366
f74f9b3a8caed483b1649a6a8e68102fc95da4fc
268
yaml
YAML
config_and_storage/persitentVolumeClaim.yaml
hwakabh/ckad-manifests
395b8a883d0b7387281c6a751b651abd65c28e47
[ "MIT" ]
null
null
null
config_and_storage/persitentVolumeClaim.yaml
hwakabh/ckad-manifests
395b8a883d0b7387281c6a751b651abd65c28e47
[ "MIT" ]
9
2020-02-09T14:26:39.000Z
2020-03-15T08:06:31.000Z
config_and_storage/persitentVolumeClaim.yaml
hwakabh/k8s-manifests
395b8a883d0b7387281c6a751b651abd65c28e47
[ "MIT" ]
null
null
null
--- apiVersion: v1 kind: PersistentVolumeClaim metadata: name: testpvc01 spec: accessModes: - ReadWriteOnce volumeMode: Filesystem resources: requests: storage: 5Gi storageClassName: standard selector: matchLabels: volume: test_pvs
15.764706
28
0.708955
f74fb8fbb33945c28d12636bbd205a7ff06d7ee6
318
yaml
YAML
config/rbac/api_viewer_role.yaml
eguzki/cautious-giggle
cbcb39d899a771c11aa4980b44e454c74192e88b
[ "Apache-2.0" ]
null
null
null
config/rbac/api_viewer_role.yaml
eguzki/cautious-giggle
cbcb39d899a771c11aa4980b44e454c74192e88b
[ "Apache-2.0" ]
null
null
null
config/rbac/api_viewer_role.yaml
eguzki/cautious-giggle
cbcb39d899a771c11aa4980b44e454c74192e88b
[ "Apache-2.0" ]
null
null
null
# permissions for end users to view apis. apiVersion: rbac.authorization.k8s.io/v1 kind: ClusterRole metadata: name: api-viewer-role rules: - apiGroups: - giggle.kuadrant.io resources: - apis verbs: - get - list - watch - apiGroups: - giggle.kuadrant.io resources: - apis/status verbs: - get
15.142857
41
0.685535
f74fd7b7f6f277dbd0d2d8b445c0a51dc71a1a70
2,572
yaml
YAML
manifests/0000_50_olm_07-olm-operator.deployment.yaml
ankitathomas/operator-lifecycle-manager-upstream
05d2c33232798988eed7370a7cb167bee1b4ba82
[ "Apache-2.0" ]
1
2021-09-01T08:18:08.000Z
2021-09-01T08:18:08.000Z
manifests/0000_50_olm_07-olm-operator.deployment.yaml
ankitathomas/operator-lifecycle-manager-upstream
05d2c33232798988eed7370a7cb167bee1b4ba82
[ "Apache-2.0" ]
null
null
null
manifests/0000_50_olm_07-olm-operator.deployment.yaml
ankitathomas/operator-lifecycle-manager-upstream
05d2c33232798988eed7370a7cb167bee1b4ba82
[ "Apache-2.0" ]
null
null
null
apiVersion: apps/v1 kind: Deployment metadata: name: olm-operator namespace: openshift-operator-lifecycle-manager labels: app: olm-operator spec: strategy: type: RollingUpdate replicas: 1 selector: matchLabels: app: olm-operator template: metadata: labels: app: olm-operator spec: serviceAccountName: olm-operator-serviceaccount priorityClassName: "system-cluster-critical" containers: - name: olm-operator command: - /bin/olm args: - --namespace - $(OPERATOR_NAMESPACE) - --writeStatusName - operator-lifecycle-manager - --writePackageServerStatusName - operator-lifecycle-manager-packageserver - --tls-cert - /var/run/secrets/serving-cert/tls.crt - --tls-key - /var/run/secrets/serving-cert/tls.key image: quay.io/operator-framework/olm@sha256:b9d011c0fbfb65b387904f8fafc47ee1a9479d28d395473341288ee126ed993b imagePullPolicy: IfNotPresent ports: - containerPort: 8080 - containerPort: 8081 name: metrics protocol: TCP livenessProbe: httpGet: path: /healthz port: 8080 readinessProbe: httpGet: path: /healthz port: 8080 terminationMessagePolicy: FallbackToLogsOnError env: - name: RELEASE_VERSION value: "0.0.1-snapshot" - name: OPERATOR_NAMESPACE valueFrom: fieldRef: fieldPath: metadata.namespace - name: OPERATOR_NAME value: olm-operator resources: requests: cpu: 10m memory: 160Mi volumeMounts: - mountPath: /var/run/secrets/serving-cert name: serving-cert volumes: - name: serving-cert secret: secretName: olm-operator-serving-cert nodeSelector: kubernetes.io/os: linux node-role.kubernetes.io/master: "" tolerations: - effect: NoSchedule key: node-role.kubernetes.io/master operator: Exists - effect: NoExecute key: node.kubernetes.io/unreachable operator: Exists tolerationSeconds: 120 - effect: NoExecute key: node.kubernetes.io/not-ready operator: Exists tolerationSeconds: 120
27.361702
119
0.559098
f7509f04eae1b12473825caf5f089748abe57480
4,410
yaml
YAML
manifest_staging/deploy/secrets-store-csi-driver-windows.yaml
nccurry/secrets-store-csi-driver
33d79b29cd967b295e57e1c6539da0e51e5eeff8
[ "Apache-2.0" ]
null
null
null
manifest_staging/deploy/secrets-store-csi-driver-windows.yaml
nccurry/secrets-store-csi-driver
33d79b29cd967b295e57e1c6539da0e51e5eeff8
[ "Apache-2.0" ]
null
null
null
manifest_staging/deploy/secrets-store-csi-driver-windows.yaml
nccurry/secrets-store-csi-driver
33d79b29cd967b295e57e1c6539da0e51e5eeff8
[ "Apache-2.0" ]
null
null
null
kind: DaemonSet apiVersion: apps/v1 metadata: name: csi-secrets-store-windows namespace: kube-system spec: selector: matchLabels: app: csi-secrets-store template: metadata: labels: app: csi-secrets-store annotations: kubectl.kubernetes.io/default-container: secrets-store spec: serviceAccountName: secrets-store-csi-driver containers: - name: node-driver-registrar image: k8s.gcr.io/sig-storage/csi-node-driver-registrar:v2.4.0 args: - --v=5 - "--csi-address=unix://C:\\csi\\csi.sock" - "--kubelet-registration-path=C:\\var\\lib\\kubelet\\plugins\\csi-secrets-store\\csi.sock" livenessProbe: exec: command: - /csi-node-driver-registrar.exe - --kubelet-registration-path=C:\var\lib\kubelet\plugins\csi-secrets-store\csi.sock - --mode=kubelet-registration-probe initialDelaySeconds: 30 timeoutSeconds: 15 env: - name: KUBE_NODE_NAME valueFrom: fieldRef: apiVersion: v1 fieldPath: spec.nodeName imagePullPolicy: IfNotPresent volumeMounts: - name: plugin-dir mountPath: C:\csi - name: registration-dir mountPath: C:\registration resources: limits: cpu: 200m memory: 200Mi requests: cpu: 100m memory: 100Mi - name: secrets-store image: k8s.gcr.io/csi-secrets-store/driver:v1.0.0 args: - "--endpoint=$(CSI_ENDPOINT)" - "--nodeid=$(KUBE_NODE_NAME)" - "--provider-volume=C:\\k\\secrets-store-csi-providers" - "--metrics-addr=:8095" - "--enable-secret-rotation=false" - "--rotation-poll-interval=2m" - "--provider-health-check=false" - "--provider-health-check-interval=2m" env: - name: CSI_ENDPOINT value: unix://C:\\csi\\csi.sock - name: KUBE_NODE_NAME valueFrom: fieldRef: apiVersion: v1 fieldPath: spec.nodeName imagePullPolicy: IfNotPresent ports: - containerPort: 9808 name: healthz protocol: TCP - containerPort: 8095 name: metrics protocol: TCP livenessProbe: failureThreshold: 5 httpGet: path: /healthz port: healthz initialDelaySeconds: 30 timeoutSeconds: 10 periodSeconds: 15 resources: limits: cpu: 400m memory: 400Mi requests: cpu: 100m memory: 100Mi volumeMounts: - name: plugin-dir mountPath: C:\csi - name: mountpoint-dir mountPath: "C:\\var\\lib\\kubelet\\pods" - name: providers-dir mountPath: C:\k\secrets-store-csi-providers - name: liveness-probe image: k8s.gcr.io/sig-storage/livenessprobe:v2.5.0 imagePullPolicy: IfNotPresent args: - "--csi-address=unix://C:\\csi\\csi.sock" - --probe-timeout=3s - --http-endpoint=0.0.0.0:9808 - -v=2 volumeMounts: - name: plugin-dir mountPath: C:\csi resources: limits: cpu: 200m memory: 200Mi requests: cpu: 100m memory: 100Mi volumes: - name: mountpoint-dir hostPath: path: C:\var\lib\kubelet\pods\ type: DirectoryOrCreate - name: registration-dir hostPath: path: C:\var\lib\kubelet\plugins_registry\ type: Directory - name: plugin-dir hostPath: path: C:\var\lib\kubelet\plugins\csi-secrets-store\ type: DirectoryOrCreate - name: providers-dir hostPath: path: C:\k\secrets-store-csi-providers\ type: DirectoryOrCreate nodeSelector: kubernetes.io/os: windows
31.956522
103
0.502721
f7513f1901bcadd120e10ad0d29258f914d4eec0
391
yaml
YAML
config/rbac/rolemapping_editor_role.yaml
codemug/argocd-rbac-controller
2472f49d540a3828ccd5d17c6f9fe893297313b3
[ "Apache-2.0" ]
2
2021-01-16T17:39:49.000Z
2021-11-02T03:13:06.000Z
config/rbac/rolemapping_editor_role.yaml
codemug/argocd-rbac-controller
2472f49d540a3828ccd5d17c6f9fe893297313b3
[ "Apache-2.0" ]
null
null
null
config/rbac/rolemapping_editor_role.yaml
codemug/argocd-rbac-controller
2472f49d540a3828ccd5d17c6f9fe893297313b3
[ "Apache-2.0" ]
null
null
null
# permissions for end users to edit rolemappings. apiVersion: rbac.authorization.k8s.io/v1 kind: ClusterRole metadata: name: rolemapping-editor-role rules: - apiGroups: - argocd.codemug.io resources: - rolemappings verbs: - create - delete - get - list - patch - update - watch - apiGroups: - argocd.codemug.io resources: - rolemappings/status verbs: - get
15.64
49
0.693095
f7515cdb5a3adbddc570dffb75f37127ac8af6db
755
yaml
YAML
pkg/helmt/testdata/prometheus-operator/charts/grafana/templates/tests/test-podsecuritypolicy.yaml
AlexRogalskiy/helmt
a6658ebc9ab132da2b06b90af223dfbbdfa6d9fb
[ "Apache-2.0" ]
10
2020-06-30T12:53:32.000Z
2021-12-11T17:39:38.000Z
pkg/helmt/testdata/prometheus-operator/charts/grafana/templates/tests/test-podsecuritypolicy.yaml
syncier/helmt
a6658ebc9ab132da2b06b90af223dfbbdfa6d9fb
[ "Apache-2.0" ]
18
2020-06-30T08:40:19.000Z
2022-03-14T00:40:55.000Z
pkg/helmt/testdata/prometheus-operator/charts/grafana/templates/tests/test-podsecuritypolicy.yaml
AlexRogalskiy/helmt
a6658ebc9ab132da2b06b90af223dfbbdfa6d9fb
[ "Apache-2.0" ]
2
2022-01-06T00:57:54.000Z
2022-01-10T08:55:27.000Z
--- # Source: prometheus-operator/charts/grafana/templates/tests/test-podsecuritypolicy.yaml apiVersion: policy/v1beta1 kind: PodSecurityPolicy metadata: name: agent-prometheus-grafana-test namespace: infra-monitoring labels: helm.sh/chart: grafana-5.0.12 app.kubernetes.io/name: grafana app.kubernetes.io/instance: agent-prometheus app.kubernetes.io/version: "6.7.1" app.kubernetes.io/managed-by: Helm spec: allowPrivilegeEscalation: true privileged: false hostNetwork: false hostIPC: false hostPID: false fsGroup: rule: RunAsAny seLinux: rule: RunAsAny supplementalGroups: rule: RunAsAny runAsUser: rule: RunAsAny volumes: - configMap - downwardAPI - emptyDir - projected - secret
22.205882
88
0.73245
f75192f61f68f2b5dda7ec617604b3251b90587a
771
yaml
YAML
config/100-namespace.yaml
toVersus/sample-bindings
c92f74675cd1e4053aea2b93b184589850c49a2c
[ "Apache-2.0" ]
null
null
null
config/100-namespace.yaml
toVersus/sample-bindings
c92f74675cd1e4053aea2b93b184589850c49a2c
[ "Apache-2.0" ]
null
null
null
config/100-namespace.yaml
toVersus/sample-bindings
c92f74675cd1e4053aea2b93b184589850c49a2c
[ "Apache-2.0" ]
null
null
null
# Copyright 2019 The Knative Authors # # Licensed under the Apache License, Version 2.0 (the "License"); # you may not use this file except in compliance with the License. # You may obtain a copy of the License at # # https://www.apache.org/licenses/LICENSE-2.0 # # Unless required by applicable law or agreed to in writing, software # distributed under the License is distributed on an "AS IS" BASIS, # WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. # See the License for the specific language governing permissions and # limitations under the License. apiVersion: v1 kind: Namespace metadata: name: binding-system labels: istio-injection: enabled bindings.toversus.dev/release: devel bindings.mattmoor.dev/exclude: "true"
33.521739
74
0.758755
f75283f85a2fd581d90d6a0f2fda0b50ebceca2f
844
yml
YAML
k8s/freeradius-config.yml
sathishms77/test
bf8df6fc16c41720c7d99ed1ff17a64b543e9672
[ "Apache-2.0" ]
72
2017-01-18T02:36:34.000Z
2022-02-12T15:28:30.000Z
k8s/freeradius-config.yml
sathishms77/test
bf8df6fc16c41720c7d99ed1ff17a64b543e9672
[ "Apache-2.0" ]
11
2017-03-03T17:56:09.000Z
2022-02-11T03:38:03.000Z
k8s/freeradius-config.yml
sathishms77/test
bf8df6fc16c41720c7d99ed1ff17a64b543e9672
[ "Apache-2.0" ]
120
2017-02-02T23:26:11.000Z
2022-03-13T05:30:23.000Z
# Copyright 2017-present Open Networking Foundation # # Licensed under the Apache License, Version 2.0 (the "License"); # you may not use this file except in compliance with the License. # You may obtain a copy of the License at # # http://www.apache.org/licenses/LICENSE-2.0 # # Unless required by applicable law or agreed to in writing, software # distributed under the License is distributed on an "AS IS" BASIS, # WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. # See the License for the specific language governing permissions and # limitations under the License. apiVersion: v1 data: clients.conf: | client 192.168.64.0/18 { secret = SECRET } users: | user Cleartext-Password := "password", MS-CHAP-Use-NTLM-Auth := 0 kind: ConfigMap metadata: name: freeradius-config namespace: voltha
31.259259
74
0.739336
f7529aa726c968935a09a7cdc74027e681afcadd
259
yml
YAML
manifests/service-7f1d.yml
ashwinsangem/acr-build-helloworld-node
4f4a48179ee36b369156b81d8c2d04ee5eb135e0
[ "MIT" ]
null
null
null
manifests/service-7f1d.yml
ashwinsangem/acr-build-helloworld-node
4f4a48179ee36b369156b81d8c2d04ee5eb135e0
[ "MIT" ]
null
null
null
manifests/service-7f1d.yml
ashwinsangem/acr-build-helloworld-node
4f4a48179ee36b369156b81d8c2d04ee5eb135e0
[ "MIT" ]
5
2020-06-19T08:35:16.000Z
2020-06-21T16:10:23.000Z
apiVersion: v1 kind: Service metadata: name: "divman-7f1d" labels: app: "divman-7f1d" spec: type: LoadBalancer ports: - port: 8080 targetPort: 8080 protocol: TCP name: http selector: app: "divman-7f1d"
17.266667
26
0.583012
f752c61434193c9a60737c33ce1b11ebce4a6e62
265
yaml
YAML
redis-sentinel/redis-slave-service.yaml
luohuazju/sillycat-k8s
923c7be11a716252aad5a5c29511b7b00e5dced2
[ "MIT" ]
null
null
null
redis-sentinel/redis-slave-service.yaml
luohuazju/sillycat-k8s
923c7be11a716252aad5a5c29511b7b00e5dced2
[ "MIT" ]
null
null
null
redis-sentinel/redis-slave-service.yaml
luohuazju/sillycat-k8s
923c7be11a716252aad5a5c29511b7b00e5dced2
[ "MIT" ]
null
null
null
kind: Service apiVersion: v1 metadata: labels: app: redis-sentinel-slave-ss name: redis-sentinel-slave-ss namespace: default spec: clusterIP: None ports: - name: redis port: 6379 targetPort: 6379 selector: app: redis-sentinel-slave-ss
16.5625
32
0.69434
f752f6be72474214346eae05f6450f96a2ffbfb9
1,388
yml
YAML
bookstore-kubernetes-manifests/gateway-configmap.yml
zackzhangkai/microservice_arch_kubernetes
4344c542642c54b7293bf2067b6c4c2b44ad2803
[ "Apache-2.0" ]
97
2020-05-25T15:08:16.000Z
2022-03-22T02:08:13.000Z
bookstore-kubernetes-manifests/gateway-configmap.yml
zackzhangkai/microservice_arch_kubernetes
4344c542642c54b7293bf2067b6c4c2b44ad2803
[ "Apache-2.0" ]
3
2021-06-01T07:38:59.000Z
2021-07-28T05:38:03.000Z
bookstore-kubernetes-manifests/gateway-configmap.yml
zackzhangkai/microservice_arch_kubernetes
4344c542642c54b7293bf2067b6c4c2b44ad2803
[ "Apache-2.0" ]
52
2021-02-24T02:41:34.000Z
2022-03-14T11:37:14.000Z
kind: ConfigMap apiVersion: v1 metadata: name: gateway namespace: bookstore-microservices data: application.yaml: |- hystrix: command: default: execution: isolation: thread: timeoutInMilliseconds: 20000 zuul: ignoredServices: '*' host: connect-timeout-millis: 20000 socket-timeout-millis: 20000 routes: account: path: /restful/accounts/** url: http://account stripPrefix: false sensitiveHeaders: "*" payment: path: /restful/pay/** url: http://payment stripPrefix: false sensitiveHeaders: "*" settlement: path: /restful/settlements/** url: http://payment stripPrefix: false sensitiveHeaders: "*" advertisements: path: /restful/advertisements/** url: http://warehouse stripPrefix: false sensitiveHeaders: "*" products: path: /restful/products/** url: http://warehouse stripPrefix: false sensitiveHeaders: "*" security: path: /oauth/** url: http://security stripPrefix: false sensitiveHeaders: "*" server: port: ${PORT:8080} logging: level: root: INFO
21.353846
44
0.521614
f753160aa1017948058626538edd158fd24cd45a
194
yml
YAML
modules/03-production/02-labels-and-namespaces/solution/wordpress-service.yml
shay-berman/k8s-training
e0c3330ff359cd4434ebc6fe7018cd21ebf45987
[ "WTFPL" ]
3
2017-11-28T23:07:16.000Z
2018-10-23T14:40:39.000Z
modules/03-production/02-labels-and-namespaces/solution/wordpress-service.yml
pashok2398/k8s-training
ea0b7099970868ec83acc46c8950209b216ffd5d
[ "WTFPL" ]
null
null
null
modules/03-production/02-labels-and-namespaces/solution/wordpress-service.yml
pashok2398/k8s-training
ea0b7099970868ec83acc46c8950209b216ffd5d
[ "WTFPL" ]
4
2018-02-01T08:24:34.000Z
2020-07-13T11:29:25.000Z
--- kind: Service apiVersion: v1 metadata: name: wp-http namespace: frontend spec: type: NodePort selector: app: wp ports: - protocol: TCP port: 80 targetPort: 80
12.125
21
0.623711
f75334b9266ebd544846df45038f95c25f079db7
297
yaml
YAML
tests/tests/legacy_kustomizations/knative-eventing-install/test_data/expected/~g_v1_serviceaccount_eventing-webhook.yaml
zawadimario/deployment-rflow
c3a51a4ec931bd3be0dc9b7fcf2ecb99aefe6df2
[ "Apache-2.0" ]
376
2019-02-27T01:32:34.000Z
2022-03-29T14:02:39.000Z
tests/tests/legacy_kustomizations/knative-eventing-install/test_data/expected/~g_v1_serviceaccount_eventing-webhook.yaml
zawadimario/deployment-rflow
c3a51a4ec931bd3be0dc9b7fcf2ecb99aefe6df2
[ "Apache-2.0" ]
2,171
2019-02-27T17:37:34.000Z
2022-03-31T18:16:26.000Z
tests/tests/legacy_kustomizations/knative-eventing-install/test_data/expected/~g_v1_serviceaccount_eventing-webhook.yaml
zawadimario/deployment-rflow
c3a51a4ec931bd3be0dc9b7fcf2ecb99aefe6df2
[ "Apache-2.0" ]
643
2019-02-27T01:49:11.000Z
2022-03-31T06:31:15.000Z
apiVersion: v1 kind: ServiceAccount metadata: labels: app.kubernetes.io/component: knative-eventing-install app.kubernetes.io/name: knative-eventing-install eventing.knative.dev/release: v0.14.2 kustomize.component: knative name: eventing-webhook namespace: knative-eventing
27
57
0.771044
f7533d47223e8793ed8737485bb5000fe9df4fdf
1,565
yaml
YAML
install_openmcp/master.back/openmcp-analytic-engine/operator.yaml
openmcp/Public_OpenMCP-Release
95da3aeb0a184a70ed682a9851b2dbd945173837
[ "Unlicense" ]
null
null
null
install_openmcp/master.back/openmcp-analytic-engine/operator.yaml
openmcp/Public_OpenMCP-Release
95da3aeb0a184a70ed682a9851b2dbd945173837
[ "Unlicense" ]
null
null
null
install_openmcp/master.back/openmcp-analytic-engine/operator.yaml
openmcp/Public_OpenMCP-Release
95da3aeb0a184a70ed682a9851b2dbd945173837
[ "Unlicense" ]
null
null
null
apiVersion: apps/v1 kind: Deployment metadata: name: openmcp-analytic-engine namespace: openmcp spec: replicas: 1 selector: matchLabels: name: openmcp-analytic-engine template: metadata: labels: name: openmcp-analytic-engine spec: serviceAccountName: openmcp-analytic-engine imagePullSecrets: - name: REPLACE_DOCKERSECRETNAME containers: - name: openmcp-analytic-engine # Replace this with the built image name image: REPLACE_DOCKER_REPO_NAME/openmcp-analytic-engine:v0.0.1 command: - openmcp-analytic-engine imagePullPolicy: REPLACE_DOCKERIMAGEPULLPOLICY env: - name: WATCH_NAMESPACE value: "" #valueFrom: # fieldRef: # fieldPath: metadata.namespace - name: POD_NAME valueFrom: fieldRef: fieldPath: metadata.name - name: INFLUX_IP value: REPLACE_INFLUXDBIP - name: INFLUX_PORT value: REPLACE_INFLUXDBPORT - name: INFLUX_USERNAME value: "root" - name: INFLUX_PASSWORD value: "root" - name: OPERATOR_NAME value: "openmcp-analytic-engine" tolerations: - key: node.kubernetes.io/not-ready effect: NoExecute tolerationSeconds: 0 - key: node.kubernetes.io/unreachable effect: NoExecute tolerationSeconds: 0
27.946429
72
0.569968
f7534c066816fb1a7161ffb6769ad6d1b6768eb6
15,146
yaml
YAML
vendor/github.com/openshift/api/config/v1/0000_10_config-operator_01_apiserver.crd.yaml
akhil-rane/image-registry
f4b30a3f0754e0b2f0da9cfa3a5c130230d36897
[ "Apache-2.0" ]
null
null
null
vendor/github.com/openshift/api/config/v1/0000_10_config-operator_01_apiserver.crd.yaml
akhil-rane/image-registry
f4b30a3f0754e0b2f0da9cfa3a5c130230d36897
[ "Apache-2.0" ]
null
null
null
vendor/github.com/openshift/api/config/v1/0000_10_config-operator_01_apiserver.crd.yaml
akhil-rane/image-registry
f4b30a3f0754e0b2f0da9cfa3a5c130230d36897
[ "Apache-2.0" ]
null
null
null
apiVersion: apiextensions.k8s.io/v1 kind: CustomResourceDefinition metadata: annotations: api-approved.openshift.io: https://github.com/openshift/api/pull/470 include.release.openshift.io/ibm-cloud-managed: "true" include.release.openshift.io/self-managed-high-availability: "true" include.release.openshift.io/single-node-developer: "true" name: apiservers.config.openshift.io spec: group: config.openshift.io names: kind: APIServer listKind: APIServerList plural: apiservers singular: apiserver scope: Cluster versions: - name: v1 schema: openAPIV3Schema: description: APIServer holds configuration (like serving certificates, client CA and CORS domains) shared by all API servers in the system, among them especially kube-apiserver and openshift-apiserver. The canonical name of an instance is 'cluster'. type: object required: - spec properties: apiVersion: description: 'APIVersion defines the versioned schema of this representation of an object. Servers should convert recognized schemas to the latest internal value, and may reject unrecognized values. More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#resources' type: string kind: description: 'Kind is a string value representing the REST resource this object represents. Servers may infer this from the endpoint the client submits requests to. Cannot be updated. In CamelCase. More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#types-kinds' type: string metadata: type: object spec: description: spec holds user settable values for configuration type: object properties: additionalCORSAllowedOrigins: description: additionalCORSAllowedOrigins lists additional, user-defined regular expressions describing hosts for which the API server allows access using the CORS headers. This may be needed to access the API and the integrated OAuth server from JavaScript applications. The values are regular expressions that correspond to the Golang regular expression language. type: array items: type: string audit: description: audit specifies the settings for audit configuration to be applied to all OpenShift-provided API servers in the cluster. type: object default: profile: Default properties: profile: description: "profile specifies the name of the desired audit policy configuration to be deployed to all OpenShift-provided API servers in the cluster. \n The following profiles are provided: - Default: the existing default policy. - WriteRequestBodies: like 'Default', but logs request and response HTTP payloads for write requests (create, update, patch). - AllRequestBodies: like 'WriteRequestBodies', but also logs request and response HTTP payloads for read requests (get, list). \n If unset, the 'Default' profile is used as the default." type: string default: Default enum: - Default - WriteRequestBodies - AllRequestBodies clientCA: description: 'clientCA references a ConfigMap containing a certificate bundle for the signers that will be recognized for incoming client certificates in addition to the operator managed signers. If this is empty, then only operator managed signers are valid. You usually only have to set this if you have your own PKI you wish to honor client certificates from. The ConfigMap must exist in the openshift-config namespace and contain the following required fields: - ConfigMap.Data["ca-bundle.crt"] - CA bundle.' type: object required: - name properties: name: description: name is the metadata.name of the referenced config map type: string encryption: description: encryption allows the configuration of encryption of resources at the datastore layer. type: object properties: type: description: "type defines what encryption type should be used to encrypt resources at the datastore layer. When this field is unset (i.e. when it is set to the empty string), identity is implied. The behavior of unset can and will change over time. \ Even if encryption is enabled by default, the meaning of unset may change to a different encryption type based on changes in best practices. \n When encryption is enabled, all sensitive resources shipped with the platform are encrypted. This list of sensitive resources can and will change over time. The current authoritative list is: \n 1. secrets 2. configmaps 3. routes.route.openshift.io 4. oauthaccesstokens.oauth.openshift.io \ 5. oauthauthorizetokens.oauth.openshift.io" type: string enum: - "" - identity - aescbc servingCerts: description: servingCert is the TLS cert info for serving secure traffic. If not specified, operator managed certificates will be used for serving secure traffic. type: object properties: namedCertificates: description: namedCertificates references secrets containing the TLS cert info for serving secure traffic to specific hostnames. If no named certificates are provided, or no named certificates match the server name as understood by a client, the defaultServingCertificate will be used. type: array items: description: APIServerNamedServingCert maps a server DNS name, as understood by a client, to a certificate. type: object properties: names: description: names is a optional list of explicit DNS names (leading wildcards allowed) that should use this certificate to serve secure traffic. If no names are provided, the implicit names will be extracted from the certificates. Exact names trump over wildcard names. Explicit names defined here trump over extracted implicit names. type: array items: type: string servingCertificate: description: 'servingCertificate references a kubernetes.io/tls type secret containing the TLS cert info for serving secure traffic. The secret must exist in the openshift-config namespace and contain the following required fields: - Secret.Data["tls.key"] - TLS private key. - Secret.Data["tls.crt"] - TLS certificate.' type: object required: - name properties: name: description: name is the metadata.name of the referenced secret type: string tlsSecurityProfile: description: "tlsSecurityProfile specifies settings for TLS connections for externally exposed servers. \n If unset, a default (which may change between releases) is chosen. Note that only Old and Intermediate profiles are currently supported, and the maximum available MinTLSVersions is VersionTLS12." type: object properties: custom: description: "custom is a user-defined TLS security profile. Be extremely careful using a custom profile as invalid configurations can be catastrophic. An example custom profile looks like this: \n ciphers: - ECDHE-ECDSA-CHACHA20-POLY1305 - ECDHE-RSA-CHACHA20-POLY1305 \ - ECDHE-RSA-AES128-GCM-SHA256 - ECDHE-ECDSA-AES128-GCM-SHA256 \ minTLSVersion: TLSv1.1" type: object properties: ciphers: description: "ciphers is used to specify the cipher algorithms that are negotiated during the TLS handshake. Operators may remove entries their operands do not support. For example, to use DES-CBC3-SHA (yaml): \n ciphers: - DES-CBC3-SHA" type: array items: type: string minTLSVersion: description: "minTLSVersion is used to specify the minimal version of the TLS protocol that is negotiated during the TLS handshake. For example, to use TLS versions 1.1, 1.2 and 1.3 (yaml): \n minTLSVersion: TLSv1.1 \n NOTE: currently the highest minTLSVersion allowed is VersionTLS12" type: string enum: - VersionTLS10 - VersionTLS11 - VersionTLS12 - VersionTLS13 nullable: true intermediate: description: "intermediate is a TLS security profile based on: \n https://wiki.mozilla.org/Security/Server_Side_TLS#Intermediate_compatibility_.28recommended.29 \n and looks like this (yaml): \n ciphers: - TLS_AES_128_GCM_SHA256 \ - TLS_AES_256_GCM_SHA384 - TLS_CHACHA20_POLY1305_SHA256 \ - ECDHE-ECDSA-AES128-GCM-SHA256 - ECDHE-RSA-AES128-GCM-SHA256 \ - ECDHE-ECDSA-AES256-GCM-SHA384 - ECDHE-RSA-AES256-GCM-SHA384 \ - ECDHE-ECDSA-CHACHA20-POLY1305 - ECDHE-RSA-CHACHA20-POLY1305 \ - DHE-RSA-AES128-GCM-SHA256 - DHE-RSA-AES256-GCM-SHA384 \ minTLSVersion: TLSv1.2" type: object nullable: true modern: description: "modern is a TLS security profile based on: \n https://wiki.mozilla.org/Security/Server_Side_TLS#Modern_compatibility \n and looks like this (yaml): \n ciphers: - TLS_AES_128_GCM_SHA256 \ - TLS_AES_256_GCM_SHA384 - TLS_CHACHA20_POLY1305_SHA256 \ minTLSVersion: TLSv1.3 \n NOTE: Currently unsupported." type: object nullable: true old: description: "old is a TLS security profile based on: \n https://wiki.mozilla.org/Security/Server_Side_TLS#Old_backward_compatibility \n and looks like this (yaml): \n ciphers: - TLS_AES_128_GCM_SHA256 \ - TLS_AES_256_GCM_SHA384 - TLS_CHACHA20_POLY1305_SHA256 \ - ECDHE-ECDSA-AES128-GCM-SHA256 - ECDHE-RSA-AES128-GCM-SHA256 \ - ECDHE-ECDSA-AES256-GCM-SHA384 - ECDHE-RSA-AES256-GCM-SHA384 \ - ECDHE-ECDSA-CHACHA20-POLY1305 - ECDHE-RSA-CHACHA20-POLY1305 \ - DHE-RSA-AES128-GCM-SHA256 - DHE-RSA-AES256-GCM-SHA384 \ - DHE-RSA-CHACHA20-POLY1305 - ECDHE-ECDSA-AES128-SHA256 \ - ECDHE-RSA-AES128-SHA256 - ECDHE-ECDSA-AES128-SHA \ - ECDHE-RSA-AES128-SHA - ECDHE-ECDSA-AES256-SHA384 \ - ECDHE-RSA-AES256-SHA384 - ECDHE-ECDSA-AES256-SHA \ - ECDHE-RSA-AES256-SHA - DHE-RSA-AES128-SHA256 - DHE-RSA-AES256-SHA256 - AES128-GCM-SHA256 - AES256-GCM-SHA384 \ - AES128-SHA256 - AES256-SHA256 - AES128-SHA - AES256-SHA - DES-CBC3-SHA minTLSVersion: TLSv1.0" type: object nullable: true type: description: "type is one of Old, Intermediate, Modern or Custom. Custom provides the ability to specify individual TLS security profile parameters. Old, Intermediate and Modern are TLS security profiles based on: \n https://wiki.mozilla.org/Security/Server_Side_TLS#Recommended_configurations \n The profiles are intent based, so they may change over time as new ciphers are developed and existing ciphers are found to be insecure. Depending on precisely which ciphers are available to a process, the list may be reduced. \n Note that the Modern profile is currently not supported because it is not yet well adopted by common software libraries." type: string enum: - Old - Intermediate - Modern - Custom status: description: status holds observed values from the cluster. They may not be overridden. type: object served: true storage: true subresources: status: {}
57.80916
175
0.53968
f7534f5074d32aa88df6b28a3a65b8c994118e33
14,486
yaml
YAML
examples/secure/ozone-dashboard-configmap.yaml
flokkr/docker-ozone
51358e9981f1eccbea7a0ab74675db1bd8d4e080
[ "Apache-2.0" ]
1
2020-08-29T21:12:43.000Z
2020-08-29T21:12:43.000Z
examples/secure/ozone-dashboard-configmap.yaml
flokkr/docker-ozone
51358e9981f1eccbea7a0ab74675db1bd8d4e080
[ "Apache-2.0" ]
null
null
null
examples/secure/ozone-dashboard-configmap.yaml
flokkr/docker-ozone
51358e9981f1eccbea7a0ab74675db1bd8d4e080
[ "Apache-2.0" ]
null
null
null
apiVersion: v1 kind: ConfigMap metadata: name: ozone-dashboard data: overview.json: |- { "annotations": { "list": [ { "builtIn": 1, "datasource": "-- Grafana --", "enable": true, "hide": true, "iconColor": "rgba(0, 211, 255, 1)", "name": "Annotations & Alerts", "type": "dashboard" } ] }, "editable": true, "gnetId": null, "graphTooltip": 0, "links": [], "panels": [ { "aliasColors": {}, "bars": false, "dashLength": 10, "dashes": false, "datasource": "prometheus", "fill": 1, "gridPos": { "h": 8, "w": 6, "x": 0, "y": 0 }, "id": 12, "legend": { "avg": false, "current": false, "max": false, "min": false, "show": true, "total": false, "values": false }, "lines": true, "linewidth": 1, "links": [], "nullPointMode": "null", "options": {}, "percentage": false, "pointradius": 2, "points": false, "renderer": "flot", "seriesOverrides": [], "spaceLength": 10, "stack": false, "steppedLine": false, "targets": [ { "expr": "om_metrics_num_key_allocate", "format": "time_series", "intervalFactor": 1, "refId": "A" } ], "thresholds": [], "timeFrom": null, "timeRegions": [], "timeShift": null, "title": "Key allocation #", "tooltip": { "shared": true, "sort": 0, "value_type": "individual" }, "type": "graph", "xaxis": { "buckets": null, "mode": "time", "name": null, "show": true, "values": [] }, "yaxes": [ { "format": "short", "label": null, "logBase": 1, "max": null, "min": null, "show": true }, { "format": "short", "label": null, "logBase": 1, "max": null, "min": null, "show": true } ], "yaxis": { "align": false, "alignLevel": null } }, { "aliasColors": {}, "bars": false, "dashLength": 10, "dashes": false, "datasource": "prometheus", "fill": 1, "gridPos": { "h": 8, "w": 12, "x": 6, "y": 0 }, "id": 4, "legend": { "avg": false, "current": false, "max": false, "min": false, "show": true, "total": false, "values": false }, "lines": true, "linewidth": 1, "links": [], "nullPointMode": "null", "options": {}, "percentage": false, "pointradius": 2, "points": false, "renderer": "flot", "seriesOverrides": [], "spaceLength": 10, "stack": false, "steppedLine": false, "targets": [ { "expr": "rate(om_metrics_num_key_allocate[1m])", "format": "time_series", "intervalFactor": 1, "refId": "A" } ], "thresholds": [], "timeFrom": null, "timeRegions": [], "timeShift": null, "title": "Key Allocation rate", "tooltip": { "shared": true, "sort": 0, "value_type": "individual" }, "type": "graph", "xaxis": { "buckets": null, "mode": "time", "name": null, "show": true, "values": [] }, "yaxes": [ { "format": "short", "label": null, "logBase": 1, "max": null, "min": null, "show": true }, { "format": "short", "label": null, "logBase": 1, "max": null, "min": null, "show": true } ], "yaxis": { "align": false, "alignLevel": null } }, { "aliasColors": {}, "bars": false, "dashLength": 10, "dashes": false, "datasource": "prometheus", "fill": 1, "gridPos": { "h": 8, "w": 6, "x": 18, "y": 0 }, "id": 2, "legend": { "avg": false, "current": false, "max": false, "min": false, "show": true, "total": false, "values": false }, "lines": true, "linewidth": 1, "links": [], "nullPointMode": "null", "options": {}, "percentage": false, "pointradius": 2, "points": false, "renderer": "flot", "seriesOverrides": [], "spaceLength": 10, "stack": false, "steppedLine": false, "targets": [ { "expr": "rate(om_metrics_num_key_allocate_fails[1m])", "format": "time_series", "intervalFactor": 1, "refId": "A" } ], "thresholds": [], "timeFrom": null, "timeRegions": [], "timeShift": null, "title": "Key Allcation (failure)", "tooltip": { "shared": true, "sort": 0, "value_type": "individual" }, "type": "graph", "xaxis": { "buckets": null, "mode": "time", "name": null, "show": true, "values": [] }, "yaxes": [ { "format": "short", "label": null, "logBase": 1, "max": null, "min": null, "show": true }, { "format": "short", "label": null, "logBase": 1, "max": null, "min": null, "show": true } ], "yaxis": { "align": false, "alignLevel": null } }, { "aliasColors": {}, "bars": false, "dashLength": 10, "dashes": false, "datasource": "prometheus", "fill": 1, "gridPos": { "h": 5, "w": 24, "x": 0, "y": 8 }, "id": 6, "legend": { "avg": false, "current": false, "max": false, "min": false, "show": true, "total": false, "values": false }, "lines": true, "linewidth": 1, "links": [], "nullPointMode": "null", "options": {}, "percentage": false, "pointradius": 2, "points": false, "renderer": "flot", "seriesOverrides": [], "spaceLength": 10, "stack": false, "steppedLine": false, "targets": [ { "expr": "scm_node_manager_healthy_nodes", "format": "time_series", "intervalFactor": 1, "legendFormat": "Healthy nodes", "refId": "A" }, { "expr": "scm_node_manager_dead_nodes", "format": "time_series", "intervalFactor": 1, "legendFormat": "Dead nodes", "refId": "B" } ], "thresholds": [], "timeFrom": null, "timeRegions": [], "timeShift": null, "title": "Ozone datandoes", "tooltip": { "shared": true, "sort": 0, "value_type": "individual" }, "type": "graph", "xaxis": { "buckets": null, "mode": "time", "name": null, "show": true, "values": [] }, "yaxes": [ { "format": "short", "label": null, "logBase": 1, "max": null, "min": null, "show": true }, { "format": "short", "label": null, "logBase": 1, "max": null, "min": null, "show": true } ], "yaxis": { "align": false, "alignLevel": null } }, { "aliasColors": {}, "bars": false, "dashLength": 10, "dashes": false, "datasource": "prometheus", "fill": 1, "gridPos": { "h": 8, "w": 12, "x": 0, "y": 13 }, "id": 10, "legend": { "avg": false, "current": false, "max": false, "min": false, "show": true, "total": false, "values": false }, "lines": true, "linewidth": 1, "links": [], "nullPointMode": "null", "options": {}, "percentage": false, "pointradius": 2, "points": false, "renderer": "flot", "seriesOverrides": [], "spaceLength": 10, "stack": false, "steppedLine": false, "targets": [ { "expr": "sum(rate(storage_container_metrics_num_write_chunk[1m]))", "format": "time_series", "intervalFactor": 1, "refId": "A" } ], "thresholds": [], "timeFrom": null, "timeRegions": [], "timeShift": null, "title": "Chunk write / second (cluster wide)", "tooltip": { "shared": true, "sort": 0, "value_type": "individual" }, "type": "graph", "xaxis": { "buckets": null, "mode": "time", "name": null, "show": true, "values": [] }, "yaxes": [ { "format": "short", "label": null, "logBase": 1, "max": null, "min": null, "show": true }, { "format": "short", "label": null, "logBase": 1, "max": null, "min": null, "show": true } ], "yaxis": { "align": false, "alignLevel": null } }, { "aliasColors": {}, "bars": false, "dashLength": 10, "dashes": false, "datasource": "prometheus", "fill": 1, "gridPos": { "h": 8, "w": 12, "x": 12, "y": 13 }, "id": 8, "legend": { "avg": false, "current": false, "max": false, "min": false, "show": true, "total": false, "values": false }, "lines": true, "linewidth": 1, "links": [], "nullPointMode": "null", "options": {}, "percentage": false, "pointradius": 2, "points": false, "renderer": "flot", "seriesOverrides": [], "spaceLength": 10, "stack": true, "steppedLine": false, "targets": [ { "expr": "rate(storage_container_metrics_num_write_chunk[1m])", "format": "time_series", "intervalFactor": 1, "refId": "A" } ], "thresholds": [], "timeFrom": null, "timeRegions": [], "timeShift": null, "title": "Write chunk # (per node)", "tooltip": { "shared": true, "sort": 0, "value_type": "individual" }, "type": "graph", "xaxis": { "buckets": null, "mode": "time", "name": null, "show": true, "values": [] }, "yaxes": [ { "format": "short", "label": null, "logBase": 1, "max": null, "min": null, "show": true }, { "format": "short", "label": null, "logBase": 1, "max": null, "min": null, "show": true } ], "yaxis": { "align": false, "alignLevel": null } } ], "refresh": false, "schemaVersion": 18, "style": "dark", "tags": [], "templating": { "list": [] }, "time": { "from": "now-1h", "to": "now" }, "timepicker": { "refresh_intervals": [ "5s", "10s", "30s", "1m", "5m", "15m", "30m", "1h", "2h", "1d" ], "time_options": [ "5m", "15m", "1h", "6h", "12h", "24h", "2d", "7d", "30d" ] }, "timezone": "", "title": "Ozone", "uid": "2rcVHE7Wz", "version": 1 }
24.678024
81
0.325625
f7535db84bd716ce11f693746d8fc83a0a718518
2,509
yaml
YAML
manifests/0013_deployment_special-resource-controller-manager.yaml
multi-arch/special-resource-operator
7634e9a1773f0327220363e18cdbd25947da68f3
[ "Apache-2.0" ]
null
null
null
manifests/0013_deployment_special-resource-controller-manager.yaml
multi-arch/special-resource-operator
7634e9a1773f0327220363e18cdbd25947da68f3
[ "Apache-2.0" ]
null
null
null
manifests/0013_deployment_special-resource-controller-manager.yaml
multi-arch/special-resource-operator
7634e9a1773f0327220363e18cdbd25947da68f3
[ "Apache-2.0" ]
null
null
null
apiVersion: apps/v1 kind: Deployment metadata: labels: control-plane: controller-manager name: special-resource-controller-manager namespace: openshift-special-resource-operator spec: replicas: 1 selector: matchLabels: control-plane: controller-manager template: metadata: labels: control-plane: controller-manager spec: containers: - args: - --secure-listen-address=0.0.0.0:8443 - --upstream=http://127.0.0.1:8080/ - --logtostderr=true - --v=10 - --tls-cert-file=/etc/secrets/tls.crt - --tls-private-key-file=/etc/secrets/tls.key - --tls-cipher-suites=TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256,TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256,TLS_RSA_WITH_AES_128_CBC_SHA256,TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256,TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 image: registry.redhat.io/openshift4/ose-kube-rbac-proxy name: kube-rbac-proxy ports: - containerPort: 8443 name: https resources: limits: cpu: 500m memory: 128Mi requests: cpu: 250m memory: 64Mi securityContext: readOnlyRootFilesystem: true volumeMounts: - mountPath: /etc/secrets name: special-resource-operator-tls - args: - --metrics-addr=127.0.0.1:8080 - --enable-leader-election command: - /manager env: - name: OPERATOR_NAMESPACE valueFrom: fieldRef: fieldPath: metadata.namespace - name: RELEASE_VERSION value: 0.0.1-snapshot - name: SSL_CERT_DIR value: /etc/pki/tls/certs image: quay.io/openshift-psap/special-resource-operator:chart-as-asset imagePullPolicy: Always name: manager resources: limits: cpu: 300m memory: 500Mi requests: cpu: 300m memory: 500Mi securityContext: allowPrivilegeEscalation: false readOnlyRootFilesystem: true volumeMounts: - mountPath: /cache name: cache-volume securityContext: runAsGroup: 499 runAsNonRoot: true runAsUser: 499 terminationGracePeriodSeconds: 10 volumes: - name: special-resource-operator-tls secret: secretName: special-resource-operator-tls - emptyDir: {} name: cache-volume
29.517647
217
0.600638
f753aace6fea55efd238a24df8909dfe38f595d6
1,737
yaml
YAML
workloads/podinfo-dep.yaml
sk9/flux-get-started
fab8aebda0d3248f9d8cea29f25ac4f8f4958000
[ "Apache-2.0" ]
null
null
null
workloads/podinfo-dep.yaml
sk9/flux-get-started
fab8aebda0d3248f9d8cea29f25ac4f8f4958000
[ "Apache-2.0" ]
null
null
null
workloads/podinfo-dep.yaml
sk9/flux-get-started
fab8aebda0d3248f9d8cea29f25ac4f8f4958000
[ "Apache-2.0" ]
null
null
null
--- apiVersion: apps/v1 kind: Deployment metadata: name: podinfo namespace: demo labels: app: podinfo annotations: fluxcd.io/automated: "true" fluxcd.io/tag.init: regex:^3.10.* fluxcd.io/tag.podinfod: semver:~3.1 spec: strategy: rollingUpdate: maxUnavailable: 0 type: RollingUpdate selector: matchLabels: app: podinfo template: metadata: annotations: prometheus.io/scrape: "true" prometheus.io/port: "9797" labels: app: podinfo spec: initContainers: - name: init image: alpine:3.10 command: - sleep - "1" containers: - name: podinfod image: stefanprodan/podinfo:3.1.5 imagePullPolicy: IfNotPresent ports: - name: http containerPort: 9898 protocol: TCP - name: http-metrics containerPort: 9797 protocol: TCP - name: grpc containerPort: 9999 protocol: TCP command: - ./podinfo - --port=9898 - --port-metrics=9797 - --grpc-port=9999 - --grpc-service-name=podinfo - --level=info - --random-delay=false - --random-error=false env: - name: PODINFO_UI_COLOR value: "#34577c" - name: PODINFO_UI_MESSAGE value: "Hello from the pod" livenessProbe: httpGet: path: /healthz port: 9898 readinessProbe: httpGet: path: /readyz port: 9898 resources: limits: cpu: 1000m memory: 128Mi requests: cpu: 10m memory: 64Mi
22.269231
41
0.520438
f753bb417ebff7e0237676b930850c80c8a70a9d
1,963
yaml
YAML
kubernetes-manifests/loadgenerator.yaml
fty4/gcp-microservices-demo
72d390cd7acc20f122a1c47fe2fa4294aa640a90
[ "Apache-2.0" ]
null
null
null
kubernetes-manifests/loadgenerator.yaml
fty4/gcp-microservices-demo
72d390cd7acc20f122a1c47fe2fa4294aa640a90
[ "Apache-2.0" ]
null
null
null
kubernetes-manifests/loadgenerator.yaml
fty4/gcp-microservices-demo
72d390cd7acc20f122a1c47fe2fa4294aa640a90
[ "Apache-2.0" ]
null
null
null
# Copyright 2018 Google LLC # # Licensed under the Apache License, Version 2.0 (the "License"); # you may not use this file except in compliance with the License. # You may obtain a copy of the License at # # http://www.apache.org/licenses/LICENSE-2.0 # # Unless required by applicable law or agreed to in writing, software # distributed under the License is distributed on an "AS IS" BASIS, # WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. # See the License for the specific language governing permissions and # limitations under the License. apiVersion: apps/v1 kind: Deployment metadata: name: loadgenerator spec: selector: matchLabels: app: loadgenerator replicas: 1 template: metadata: labels: app: loadgenerator annotations: sidecar.istio.io/rewriteAppHTTPProbers: "true" spec: serviceAccountName: default terminationGracePeriodSeconds: 5 restartPolicy: Always initContainers: - command: - /bin/sh - -exc - | echo "Init container pinging frontend: ${FRONTEND_ADDR}..." STATUSCODE=$(wget --server-response http://${FRONTEND_ADDR} 2>&1 | awk '/^ HTTP/{print $2}') if test $STATUSCODE -ne 200; then echo "Error: Could not reach frontend - Status code: ${STATUSCODE}" exit 1 fi name: frontend-check image: busybox:latest securityContext: # user: nobody runAsUser: 65534 runAsGroup: 65534 env: - name: FRONTEND_ADDR value: "frontend:80" containers: - name: main image: loadgenerator env: - name: FRONTEND_ADDR value: "frontend:80" - name: USERS value: "10" resources: requests: cpu: 300m memory: 256Mi limits: cpu: 500m memory: 512Mi
28.867647
103
0.607743
f753be78e32995818aa63d45496022b05251cc60
1,243
yaml
YAML
k8s-ingress/f5-cis/as3/hubmode/cm-duplicated-label.yaml
mongocn/mongocn.github.io
23c84624af4e605871fc244dafcc320f52183164
[ "Apache-2.0" ]
3
2020-09-07T03:05:05.000Z
2022-01-01T06:50:34.000Z
k8s-ingress/f5-cis/as3/hubmode/cm-duplicated-label.yaml
mongocn/mongocn.github.io
23c84624af4e605871fc244dafcc320f52183164
[ "Apache-2.0" ]
null
null
null
k8s-ingress/f5-cis/as3/hubmode/cm-duplicated-label.yaml
mongocn/mongocn.github.io
23c84624af4e605871fc244dafcc320f52183164
[ "Apache-2.0" ]
2
2020-09-04T04:49:39.000Z
2022-01-01T07:14:53.000Z
kind: ConfigMap apiVersion: v1 metadata: name: cm-hub-1 namespace: control-hub-1 labels: f5type: virtual-server as3: "true" hubMode: "true" data: template: | { "class": "AS3", "action": "deploy", "persist": true, "declaration": { "class": "ADC", "schemaVersion": "3.25.0", "id": "hubtest00", "hubtest01": { "class": "Tenant", "hubtest01": { "class": "Application", "template": "generic", "app_svc_vs": { "class": "Service_HTTP", "persistenceMethods": [ "cookie" ], "virtualAddresses": [ "192.168.200.41" ], "snat": "self", "virtualPort": 80, "pool": "hubtest01_app_svc_pool" }, "hubtest01_app_svc_pool": { "class": "Pool", "monitors": [ "tcp" ], "loadBalancingMode": "least-connections-member", "members": [ { "servicePort": 8080, "serverAddresses": [ ] } ] } } } } }
23.903846
62
0.401448
f753c587905734d418a07fd8fb7311bcc1548fd5
2,610
yaml
YAML
config-root/namespaces/jx/lighthouse/lighthouse-foghorn-deploy.yaml
PaulGiant/jx3-kubernetes
06713ae53231d53041b55406b81b36dd7ab922c2
[ "Apache-2.0" ]
null
null
null
config-root/namespaces/jx/lighthouse/lighthouse-foghorn-deploy.yaml
PaulGiant/jx3-kubernetes
06713ae53231d53041b55406b81b36dd7ab922c2
[ "Apache-2.0" ]
2
2021-11-30T14:16:33.000Z
2021-11-30T14:23:41.000Z
config-root/namespaces/jx/lighthouse/lighthouse-foghorn-deploy.yaml
PaulGiant/jx3-kubernetes
06713ae53231d53041b55406b81b36dd7ab922c2
[ "Apache-2.0" ]
null
null
null
# Source: lighthouse/templates/foghorn-deployment.yaml apiVersion: apps/v1 kind: Deployment metadata: name: lighthouse-foghorn labels: chart: "lighthouse-1.3.1" app: lighthouse-foghorn gitops.jenkins-x.io/pipeline: 'namespaces' annotations: meta.helm.sh/release-name: 'lighthouse' wave.pusher.com/update-on-config-change: 'true' namespace: jx spec: replicas: 1 selector: matchLabels: app: lighthouse-foghorn template: metadata: labels: app: lighthouse-foghorn annotations: jenkins-x.io/hash: '4680350d90b15cd48f3a8504bff0c968752ad64ad3080e746113158aa5eb44b3' spec: serviceAccountName: lighthouse-foghorn containers: - name: lighthouse-foghorn image: ghcr.io/jenkins-x/lighthouse-foghorn:1.3.1 imagePullPolicy: IfNotPresent args: - "--namespace=jx" env: - name: "GIT_KIND" value: "github" - name: "GIT_SERVER" value: "https://github.com" - name: "GIT_USER" value: pa.gigante - name: "GIT_TOKEN" valueFrom: secretKeyRef: name: lighthouse-oauth-token key: oauth - name: "HMAC_TOKEN" valueFrom: secretKeyRef: name: "lighthouse-hmac-token" key: hmac optional: false - name: "JX_LOG_FORMAT" value: "json" - name: "LOGRUS_FORMAT" value: "json" - name: LOGRUS_SERVICE value: "lighthouse" - name: LOGRUS_SERVICE_VERSION value: "1.3.1" - name: LOGRUS_STACK_SKIP value: "" - name: DEFAULT_PIPELINE_RUN_SERVICE_ACCOUNT value: "tekton-bot" - name: DEFAULT_PIPELINE_RUN_TIMEOUT value: "2h0m0s" - name: FILE_BROWSER value: "git" - name: JX_DEFAULT_IMAGE value: "ghcr.io/jenkins-x/builder-maven:2.1.149-768" - name: LIGHTHOUSE_DASHBOARD_TEMPLATE value: "namespaces/{{ .Namespace }}/pipelineruns/{{ .PipelineRun }}" - name: LIGHTHOUSE_VERSIONSTREAM_JENKINS_X_JX3_PIPELINE_CATALOG value: "60d2f020b3003672ecbc8c9abd2f3cf20344fee2" resources: limits: cpu: 100m memory: 256Mi requests: cpu: 80m memory: 128Mi terminationGracePeriodSeconds: 180
32.222222
93
0.549808
f753e6e64833deb55a21640f42d808b9dd536c8c
1,511
yaml
YAML
manifests/deployment.yaml
ericxnhu/azch-captureorder
799b36ba2f2838a2f39303742ae7c86cb032e910
[ "MIT" ]
null
null
null
manifests/deployment.yaml
ericxnhu/azch-captureorder
799b36ba2f2838a2f39303742ae7c86cb032e910
[ "MIT" ]
null
null
null
manifests/deployment.yaml
ericxnhu/azch-captureorder
799b36ba2f2838a2f39303742ae7c86cb032e910
[ "MIT" ]
null
null
null
apiVersion: apps/v1 kind: Deployment metadata: name: captureorder spec: selector: matchLabels: app: captureorder replicas: 2 template: metadata: labels: app: captureorder spec: containers: - name: captureorder image: newacrname.azurecr.io/captureorder:placeholdertag # replace with your own repository. Due to a bug, leave the :placeholdertag tag in there to allow the pipeline to replace it imagePullPolicy: Always readinessProbe: httpGet: port: 8080 path: /healthz livenessProbe: httpGet: port: 8080 path: /healthz resources: requests: memory: "64Mi" cpu: "100m" limits: memory: "128Mi" cpu: "500m" env: - name: TEAMNAME value: 'team-azch' # will be patched at deployment time by value of 'teamName' in the variable group - name: MONGOHOST valueFrom: secretKeyRef: name: mongodb key: mongoHost - name: MONGOUSER valueFrom: secretKeyRef: name: mongodb key: mongoUser - name: MONGOPASSWORD valueFrom: secretKeyRef: name: mongodb key: mongoPassword ports: - containerPort: 80
27.981481
191
0.506287
f75439150df467f35af1af1463e8ed6192d8d94e
144
yaml
YAML
built-in-references/Kubernetes/perf/violations/violation7722.yaml
sw47/azure-policy
4a38e4cb4047b5364902653f0defe45f1b21bc61
[ "MIT" ]
null
null
null
built-in-references/Kubernetes/perf/violations/violation7722.yaml
sw47/azure-policy
4a38e4cb4047b5364902653f0defe45f1b21bc61
[ "MIT" ]
null
null
null
built-in-references/Kubernetes/perf/violations/violation7722.yaml
sw47/azure-policy
4a38e4cb4047b5364902653f0defe45f1b21bc61
[ "MIT" ]
null
null
null
apiVersion: v1 kind: Pod metadata: name: image-demo-7722 spec: containers: - name: nginx image: nginx #ritaacr.azurecr.io/nginx:latest
18
49
0.722222
f7546faa7ff73abb84c6630b706cbfdd029b07d0
423
yaml
YAML
score/testdata/cronjob-batchv1beta1-restartpolicy-valid.yaml
ryo-yamaoka/kube-score
6e098da24bca875d760e7b522332118f27e17b69
[ "MIT" ]
null
null
null
score/testdata/cronjob-batchv1beta1-restartpolicy-valid.yaml
ryo-yamaoka/kube-score
6e098da24bca875d760e7b522332118f27e17b69
[ "MIT" ]
1
2022-02-03T15:35:05.000Z
2022-02-03T15:35:05.000Z
score/testdata/cronjob-batchv1beta1-restartpolicy-valid.yaml
ryo-yamaoka/kube-score
6e098da24bca875d760e7b522332118f27e17b69
[ "MIT" ]
null
null
null
apiVersion: batch/v1beta1 kind: CronJob metadata: name: hello spec: schedule: "* * * * *" jobTemplate: spec: template: spec: containers: - name: hello image: busybox:1.28 imagePullPolicy: IfNotPresent command: - /bin/sh - -c - date; echo Hello from the Kubernetes cluster restartPolicy: OnFailure
21.15
58
0.524823
f754879735275eb5c7b84b3aa8dc28fd5b167120
97
yaml
YAML
app-a/ch04/object-management/manifests/configmap.yaml
jzj/cka-study-guide
7b764e1b9ae67853d7ad6f3c1c725f0744f19bd6
[ "Apache-2.0" ]
18
2021-08-13T19:23:33.000Z
2022-03-28T15:09:10.000Z
app-a/ch04/object-management/manifests/configmap.yaml
jzj/cka-study-guide
7b764e1b9ae67853d7ad6f3c1c725f0744f19bd6
[ "Apache-2.0" ]
1
2022-03-16T15:18:10.000Z
2022-03-17T20:03:50.000Z
app-a/ch04/object-management/manifests/configmap.yaml
jzj/cka-study-guide
7b764e1b9ae67853d7ad6f3c1c725f0744f19bd6
[ "Apache-2.0" ]
20
2021-07-28T16:11:22.000Z
2022-03-29T18:09:21.000Z
apiVersion: v1 kind: ConfigMap metadata: name: logs-config data: dir: "/etc/logs/traffic.log"
16.166667
30
0.731959
f754a1c2cfd8941ad36d62c202e66c4abb656f77
456
yaml
YAML
deploy/fio.yaml
epowell101/Mayastor
ba1872f5e5a5ed9883a60bef45abf1c1c0d41430
[ "Apache-2.0" ]
null
null
null
deploy/fio.yaml
epowell101/Mayastor
ba1872f5e5a5ed9883a60bef45abf1c1c0d41430
[ "Apache-2.0" ]
null
null
null
deploy/fio.yaml
epowell101/Mayastor
ba1872f5e5a5ed9883a60bef45abf1c1c0d41430
[ "Apache-2.0" ]
null
null
null
kind: Pod apiVersion: v1 metadata: name: fio spec: volumes: - name: ms-volume persistentVolumeClaim: claimName: ms-volume-claim containers: - name: fio image: nixery.dev/shell/fio/tini command: [ "tini", "--" ] args: - sleep - "1000000" volumeMounts: - mountPath: "/volume" name: ms-volume #volumeDevices: # - devicePath: /dev/xvda # name: ms-volume
20.727273
38
0.550439
f754ae23a4c84f7ec4b513d5756d7397be028ce8
462
yaml
YAML
pipeline/deploy/src/main/resources/featurehub/charts/mr-service/templates/configmap.yaml
enixdark/featurehub
da78bae9e7507aa7bf596e2a1f3a062c48c83529
[ "Apache-2.0" ]
null
null
null
pipeline/deploy/src/main/resources/featurehub/charts/mr-service/templates/configmap.yaml
enixdark/featurehub
da78bae9e7507aa7bf596e2a1f3a062c48c83529
[ "Apache-2.0" ]
null
null
null
pipeline/deploy/src/main/resources/featurehub/charts/mr-service/templates/configmap.yaml
enixdark/featurehub
da78bae9e7507aa7bf596e2a1f3a062c48c83529
[ "Apache-2.0" ]
null
null
null
apiVersion: v1 kind: ConfigMap metadata: name: mr-service-config data: application.properties: |- app.name=mr server.port=8080 server.gracePeriodInSeconds=20 db.url=jdbc:h2:mem:tests db.password= db.username=sa db.driver=org.h2.Driver db.connections=3 register.url=http://localhost:8903/#register-url?token=%s jersey.cors.headers=X-Requested-With,Authorization,Content-type,Accept-Version,Content-MD5,CSRF-Token,x-ijt
27.176471
111
0.731602
f7555f0f35ca767b567472f4f04aba23fdd04e97
203
yaml
YAML
tests/stacks/kubernetes/test_data/expected/~g_v1_serviceaccount_kubeflow-pipelines-cache.yaml
pathologywatch/manifests
622a1974ef841406b45bd3ae51ba507cbaf4bf89
[ "Apache-2.0" ]
376
2019-02-27T01:32:34.000Z
2022-03-29T14:02:39.000Z
tests/stacks/kubernetes/test_data/expected/~g_v1_serviceaccount_kubeflow-pipelines-cache.yaml
pathologywatch/manifests
622a1974ef841406b45bd3ae51ba507cbaf4bf89
[ "Apache-2.0" ]
2,171
2019-02-27T17:37:34.000Z
2022-03-31T18:16:26.000Z
tests/stacks/kubernetes/test_data/expected/~g_v1_serviceaccount_kubeflow-pipelines-cache.yaml
pathologywatch/manifests
622a1974ef841406b45bd3ae51ba507cbaf4bf89
[ "Apache-2.0" ]
643
2019-02-27T01:49:11.000Z
2022-03-31T06:31:15.000Z
apiVersion: v1 kind: ServiceAccount metadata: labels: app.kubernetes.io/component: ml-pipeline app.kubernetes.io/name: kubeflow-pipelines name: kubeflow-pipelines-cache namespace: kubeflow
22.555556
46
0.773399
f7559e44a37f85ffff946cb6d4155bb78665041b
512
yaml
YAML
k8s_scripts/svc_backend_deleteticket.yaml
mani-sh-reddy/QA-Help-Queue-App
02ff842d86ca378b5f01c9711819ba7e95b0b035
[ "MIT" ]
1
2021-04-27T18:28:06.000Z
2021-04-27T18:28:06.000Z
k8s_scripts/svc_backend_deleteticket.yaml
mani-sh-reddy/QA-Help-Queue-App
02ff842d86ca378b5f01c9711819ba7e95b0b035
[ "MIT" ]
null
null
null
k8s_scripts/svc_backend_deleteticket.yaml
mani-sh-reddy/QA-Help-Queue-App
02ff842d86ca378b5f01c9711819ba7e95b0b035
[ "MIT" ]
2
2021-05-10T09:30:32.000Z
2021-05-12T10:32:19.000Z
apiVersion: v1 kind: Pod metadata: name: svc-delete-backend labels: app: svc-delete-backend spec: containers: - name: deleteticket image: manishreddy1/hq-backend-deleteticket:latest ports: - containerPort: 5004 imagePullSecrets: - name: ticketkey apiVersion: v1 kind: Service metadata: name: svc-delete-backend labels: app : svc-delete-backend spec: selector: app: svc-delete-backend ports: - protocol: TCP port: 5004 targetPort: 5004 type: ClusterIP
17.655172
54
0.693359
f7563cff3c5b71a921998125ff5f3d4eab474aad
215
yaml
YAML
example/service.yaml
footprintmediaits/kube-annotate
729193748c2494643efc1707d421218cc9c9d9ae
[ "MIT" ]
9
2018-12-13T07:10:58.000Z
2021-12-28T14:02:17.000Z
example/service.yaml
footprintmediaits/kube-annotate
729193748c2494643efc1707d421218cc9c9d9ae
[ "MIT" ]
2
2021-01-27T12:20:27.000Z
2021-04-09T18:52:03.000Z
example/service.yaml
footprintmediaits/kube-annotate
729193748c2494643efc1707d421218cc9c9d9ae
[ "MIT" ]
1
2021-01-27T09:20:19.000Z
2021-01-27T09:20:19.000Z
apiVersion: v1 kind: Service metadata: labels: app: kube-annotate name: kube-annotate spec: type: ClusterIP ports: - name: https port: 443 targetPort: https selector: app: kube-annotate
13.4375
22
0.669767
f75654d135cc8d38851a098165b7eaa1a0caab10
1,288
yaml
YAML
deployment/k8s/crvd.yaml
denist-huma/cos
5198868b652fd0692a3d0650ac349286dc869fc1
[ "MIT" ]
1
2019-02-26T18:39:53.000Z
2019-02-26T18:39:53.000Z
deployment/k8s/crvd.yaml
denist-huma/cos
5198868b652fd0692a3d0650ac349286dc869fc1
[ "MIT" ]
15
2019-01-11T01:48:36.000Z
2019-03-05T19:06:37.000Z
deployment/k8s/crvd.yaml
dmolesUC3/cos
7904d119d87677095d88158f91d6e47c51929df5
[ "MIT" ]
1
2021-09-24T13:23:00.000Z
2021-09-24T13:23:00.000Z
apiVersion: apps/v1 kind: Deployment metadata: name: cos labels: app.kubernetes.io/component: cos app.kubernetes.io/instance: cos app.kubernetes.io/name: cos app.kubernetes.io/part-of: cos spec: selector: matchLabels: app.kubernetes.io/component: cos app.kubernetes.io/instance: cos app.kubernetes.io/name: cos template: metadata: labels: app.kubernetes.io/component: cos app.kubernetes.io/instance: cos app.kubernetes.io/name: cos spec: containers: - image: nginx:1.20-alpine name: cos ports: - containerPort: 80 protocol: TCP resources: limits: cpu: 100m memory: 256Mi requests: cpu: 100m memory: 256Mi readinessProbe: httpGet: path: /index.html port: 80 failureThreshold: 30 periodSeconds: 5 initialDelaySeconds: 10 livenessProbe: httpGet: path: /index.html port: 80 failureThreshold: 30 periodSeconds: 5 initialDelaySeconds: 10 status: readyReplicas: 1 availableReplicas: 1
24.301887
40
0.541925
f7568ca95897de9bbbf19fb46ad9d83ec2c7a0a7
116
yaml
YAML
environments/dba-qa/env/base/service-account.yaml
ibm-cloud-architecture/dba-infra-gitops
566102920d5dcbaef651f4c7b4c2ab50a1a269f7
[ "MIT" ]
1
2022-02-09T19:36:01.000Z
2022-02-09T19:36:01.000Z
environments/cp4ba/env/base/service-account.yaml
ibm-cloud-architecture/dba-infra-gitops
566102920d5dcbaef651f4c7b4c2ab50a1a269f7
[ "MIT" ]
null
null
null
environments/cp4ba/env/base/service-account.yaml
ibm-cloud-architecture/dba-infra-gitops
566102920d5dcbaef651f4c7b4c2ab50a1a269f7
[ "MIT" ]
1
2022-03-19T07:13:30.000Z
2022-03-19T07:13:30.000Z
apiVersion: v1 kind: ServiceAccount metadata: name: ibm-cp4ba-anyuid imagePullSecrets: - name: "admin.registrykey"
19.333333
27
0.793103
f75743062cd49ca1c58a4b911786df250872176e
955
yaml
YAML
config/crds/201-rolebinding.yaml
salaboy/knative-serving-events-controller
4b790d4dcbdfb2f1e54f8df3bdd372eabdec2c6d
[ "Apache-2.0" ]
null
null
null
config/crds/201-rolebinding.yaml
salaboy/knative-serving-events-controller
4b790d4dcbdfb2f1e54f8df3bdd372eabdec2c6d
[ "Apache-2.0" ]
null
null
null
config/crds/201-rolebinding.yaml
salaboy/knative-serving-events-controller
4b790d4dcbdfb2f1e54f8df3bdd372eabdec2c6d
[ "Apache-2.0" ]
null
null
null
# Copyright 2021 The Knative Authors # # Licensed under the Apache License, Version 2.0 (the "License"); # you may not use this file except in compliance with the License. # You may obtain a copy of the License at # # https://www.apache.org/licenses/LICENSE-2.0 # # Unless required by applicable law or agreed to in writing, software # distributed under the License is distributed on an "AS IS" BASIS, # WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. # See the License for the specific language governing permissions and # limitations under the License. apiVersion: rbac.authorization.k8s.io/v1 kind: RoleBinding metadata: name: knative-serving-events-namespace-rbac namespace: default labels: samples.knative.dev/release: devel subjects: - kind: ServiceAccount name: controller namespace: default roleRef: kind: Role name: knative-serving-events-namespace-rbac apiGroup: rbac.authorization.k8s.io
31.833333
74
0.764398
f7577e17809cf19d985af8d83af228805f4a79e3
333
yaml
YAML
cluster/apps/networking/external-services/unifi/service.yaml
fatheadl/home-ops
7ec97be98465ff253ea44d19db69f051d7cf6921
[ "WTFPL" ]
143
2021-12-05T13:06:17.000Z
2022-03-31T10:58:14.000Z
cluster/apps/networking/external-services/unifi/service.yaml
fatheadl/home-ops
7ec97be98465ff253ea44d19db69f051d7cf6921
[ "WTFPL" ]
489
2021-12-04T17:56:16.000Z
2022-03-31T22:05:16.000Z
cluster/apps/networking/external-services/unifi/service.yaml
fatheadl/home-ops
7ec97be98465ff253ea44d19db69f051d7cf6921
[ "WTFPL" ]
34
2021-12-12T15:05:03.000Z
2022-03-31T17:45:17.000Z
--- apiVersion: v1 kind: Service metadata: name: &app unifi namespace: networking labels: app.kubernetes.io/name: *app app.kubernetes.io/instance: *app spec: type: ExternalName externalName: unifi.${SECRET_PRIVATE_DOMAIN}. ports: - name: http port: &port 443 protocol: TCP targetPort: *port
18.5
47
0.66967
f7583d68f382131ba02b4225f77fc143aae7e846
265
yaml
YAML
socialNetwork/yamlfiles/user-memcached/templates/service.yaml
SuvigyaJain1/DeathStarBench
1888b29a45521cd32c99baadafdacffe2a42508d
[ "Apache-2.0" ]
null
null
null
socialNetwork/yamlfiles/user-memcached/templates/service.yaml
SuvigyaJain1/DeathStarBench
1888b29a45521cd32c99baadafdacffe2a42508d
[ "Apache-2.0" ]
null
null
null
socialNetwork/yamlfiles/user-memcached/templates/service.yaml
SuvigyaJain1/DeathStarBench
1888b29a45521cd32c99baadafdacffe2a42508d
[ "Apache-2.0" ]
null
null
null
--- # Source: social-network/charts/user-memcached/templates/service.yaml apiVersion: v1 kind: Service metadata: name: user-memcached spec: type: ClusterIP ports: - name: "11211" port: 11211 targetPort: 11211 selector: service: user-memcached
17.666667
69
0.713208
f758550c1705d9965c496beda63cbbad8a438965
240
yaml
YAML
example/restplus-kubernetes/kubernetes/service-nodeport.yaml
dmilan77/kubernetes-guide
ecfff7c10787caa7914dc10274a70dccc874388e
[ "Apache-2.0" ]
null
null
null
example/restplus-kubernetes/kubernetes/service-nodeport.yaml
dmilan77/kubernetes-guide
ecfff7c10787caa7914dc10274a70dccc874388e
[ "Apache-2.0" ]
null
null
null
example/restplus-kubernetes/kubernetes/service-nodeport.yaml
dmilan77/kubernetes-guide
ecfff7c10787caa7914dc10274a70dccc874388e
[ "Apache-2.0" ]
null
null
null
apiVersion: v1 kind: Service metadata: name: restplus-kubernetes-service spec: selector: app: restplus-kubernetes type: NodePort ports: - protocol: TCP port: 80 targetPort: 8080 # nodePort: 30036 protocol: TCP
16
35
0.6875
f758f3157235cc7428507ecd29a62b5b94b3b418
400
yaml
YAML
chp13-pod-security-policies/set1335-diff-users-groups/clusterrolebinding-bob.yaml
gbih/learning-k8s-in-action-study-notes
73fd7d6e0a5296ee7c5843f2cf765bf15e81002d
[ "MIT" ]
1
2021-01-10T13:13:24.000Z
2021-01-10T13:13:24.000Z
chp13-pod-security-policies/set1335-diff-users-groups/clusterrolebinding-bob.yaml
gbih/learning-k8s-in-action-study-notes
73fd7d6e0a5296ee7c5843f2cf765bf15e81002d
[ "MIT" ]
null
null
null
chp13-pod-security-policies/set1335-diff-users-groups/clusterrolebinding-bob.yaml
gbih/learning-k8s-in-action-study-notes
73fd7d6e0a5296ee7c5843f2cf765bf15e81002d
[ "MIT" ]
null
null
null
apiVersion: rbac.authorization.k8s.io/v1 kind: ClusterRoleBinding metadata: name: psp-bob namespace: chp13-set1335 subjects: - kind: User name: bob apiGroup: rbac.authorization.k8s.io roleRef: apiGroup: rbac.authorization.k8s.io kind: ClusterRole name: psp-privileged # match name of Role or ClusterRole to bind to # allows bob to operate on resources in the chp13-set1335 namespace
22.222222
69
0.77
f75948e820abd1171047a52810195b0a0c0d3659
263
yaml
YAML
addons/prometheus/21_kube_roleBinding.yaml
noris-network/koris
a9c471435a016e2369df43829433d3681e12abc6
[ "Apache-2.0" ]
18
2019-04-01T12:57:16.000Z
2021-09-28T18:24:13.000Z
addons/prometheus/21_kube_roleBinding.yaml
noris-network/koris
a9c471435a016e2369df43829433d3681e12abc6
[ "Apache-2.0" ]
2
2020-03-24T18:17:56.000Z
2020-03-31T09:47:42.000Z
addons/prometheus/21_kube_roleBinding.yaml
noris-network/koris
a9c471435a016e2369df43829433d3681e12abc6
[ "Apache-2.0" ]
2
2020-09-11T16:13:59.000Z
2020-09-15T05:56:35.000Z
apiVersion: rbac.authorization.k8s.io/v1 kind: RoleBinding metadata: name: kube-state-metrics namespace: nn-mon roleRef: apiGroup: rbac.authorization.k8s.io kind: Role name: kube-state-metrics subjects: - kind: ServiceAccount name: kube-state-metrics
20.230769
40
0.768061
f75a34fc60fff1ceb257bd6841d04088fbc53c1e
324
yaml
YAML
examples/services/job.yaml
Akiros001/k8s-AppController
c55ce0588dbd96679637ab0c07f3889c6c29be2c
[ "Apache-2.0" ]
233
2016-08-02T13:29:31.000Z
2022-03-25T13:51:52.000Z
examples/services/job.yaml
Akiros001/k8s-AppController
c55ce0588dbd96679637ab0c07f3889c6c29be2c
[ "Apache-2.0" ]
233
2016-08-05T12:50:44.000Z
2018-10-17T13:31:42.000Z
examples/services/job.yaml
Akiros001/k8s-AppController
c55ce0588dbd96679637ab0c07f3889c6c29be2c
[ "Apache-2.0" ]
41
2016-08-16T10:11:56.000Z
2021-11-27T17:54:25.000Z
apiVersion: batch/v1 kind: Job metadata: name: test-job labels: app: service1 spec: template: metadata: name: test-job spec: containers: - name: test-container image: gcr.io/google_containers/busybox command: [ "/bin/sh", "-c", "sleep 10; env"] restartPolicy: Never
19.058824
52
0.608025
f75a9205f94eb137cbabd2166151fc12df607540
72
yaml
YAML
k8s/00-namespace.yaml
sm43/news-demo
6c9501a405fd90526f26c60a319e6634f4578102
[ "MIT" ]
null
null
null
k8s/00-namespace.yaml
sm43/news-demo
6c9501a405fd90526f26c60a319e6634f4578102
[ "MIT" ]
null
null
null
k8s/00-namespace.yaml
sm43/news-demo
6c9501a405fd90526f26c60a319e6634f4578102
[ "MIT" ]
null
null
null
--- apiVersion: v1 kind: Namespace metadata: name: news-demo spec: {}
10.285714
17
0.680556
f75a99b3724622a16ae8d5b09561d577802a0973
1,231
yaml
YAML
config/prow/cluster/sinker_deployment.yaml
zoran15/test-infra
03b195cd40e858fb606cd186ea86ddc38ef52f0c
[ "Apache-2.0" ]
null
null
null
config/prow/cluster/sinker_deployment.yaml
zoran15/test-infra
03b195cd40e858fb606cd186ea86ddc38ef52f0c
[ "Apache-2.0" ]
null
null
null
config/prow/cluster/sinker_deployment.yaml
zoran15/test-infra
03b195cd40e858fb606cd186ea86ddc38ef52f0c
[ "Apache-2.0" ]
null
null
null
apiVersion: apps/v1 kind: Deployment metadata: namespace: default name: sinker labels: app: sinker spec: replicas: 1 selector: matchLabels: app: sinker template: metadata: labels: app: sinker spec: serviceAccountName: sinker containers: - name: sinker args: - --config-path=/etc/config/config.yaml - --job-config-path=/etc/job-config - --dry-run=false image: gcr.io/k8s-prow/sinker:v20210427-e4ab4d8c8f env: # Use KUBECONFIG envvar rather than --kubeconfig flag in order to provide multiple configs to merge. - name: KUBECONFIG value: "/etc/kubeconfig/config" volumeMounts: - mountPath: /etc/kubeconfig name: kubeconfig readOnly: true - name: config mountPath: /etc/config readOnly: true - name: job-config mountPath: /etc/job-config readOnly: true volumes: - name: kubeconfig secret: defaultMode: 420 secretName: kubeconfig - name: config configMap: name: config - name: job-config configMap: name: job-config
24.137255
108
0.57108
f75abca1b01df081bb6ee600fb6e8152b5164bd4
242
yaml
YAML
Modul_6/Cw1_deploy/replicaset_add_pod.yaml
arkedzierski/poznajk8s
d0c7588ca31cbc2c472f789f5ba8a0437e6e5c88
[ "Unlicense" ]
null
null
null
Modul_6/Cw1_deploy/replicaset_add_pod.yaml
arkedzierski/poznajk8s
d0c7588ca31cbc2c472f789f5ba8a0437e6e5c88
[ "Unlicense" ]
null
null
null
Modul_6/Cw1_deploy/replicaset_add_pod.yaml
arkedzierski/poznajk8s
d0c7588ca31cbc2c472f789f5ba8a0437e6e5c88
[ "Unlicense" ]
null
null
null
apiVersion: v1 kind: Pod metadata: name: additional-pod labels: tier: pkad-rs spec: containers: - name: additional-pkad image: poznajkubernetes/pkad:blue resources: limits: memory: "128Mi" cpu: "500m"
17.285714
37
0.636364
f75ae22f58aacd5c786472848b24b3fdb2e85796
468
yaml
YAML
deploy/kubernetes/helm/sloth/tests/testdata/output/cluster_role_binding_default.yaml
xairos/sloth
257b964c817275f2d555bb21be754fd45c767395
[ "Apache-2.0" ]
null
null
null
deploy/kubernetes/helm/sloth/tests/testdata/output/cluster_role_binding_default.yaml
xairos/sloth
257b964c817275f2d555bb21be754fd45c767395
[ "Apache-2.0" ]
null
null
null
deploy/kubernetes/helm/sloth/tests/testdata/output/cluster_role_binding_default.yaml
xairos/sloth
257b964c817275f2d555bb21be754fd45c767395
[ "Apache-2.0" ]
null
null
null
--- # Source: sloth/templates/cluster-role-binding.yaml apiVersion: rbac.authorization.k8s.io/v1 kind: ClusterRoleBinding metadata: name: sloth labels: helm.sh/chart: sloth-0.4.2 app.kubernetes.io/managed-by: Helm app: sloth app.kubernetes.io/name: sloth app.kubernetes.io/instance: sloth roleRef: apiGroup: rbac.authorization.k8s.io kind: ClusterRole name: sloth subjects: - kind: ServiceAccount name: sloth namespace: default
22.285714
51
0.726496
f75ae718cedac458c30bde94f300819c1ac60938
806
yaml
YAML
deployment/ubuntu.yaml
mchirico/admission-controller-k8s-go
fd9f331ad540f6dcde65a33c020cdd8cecc3bf0b
[ "Apache-2.0" ]
null
null
null
deployment/ubuntu.yaml
mchirico/admission-controller-k8s-go
fd9f331ad540f6dcde65a33c020cdd8cecc3bf0b
[ "Apache-2.0" ]
1
2020-10-30T15:50:37.000Z
2020-10-30T15:50:40.000Z
deployment/ubuntu.yaml
mchirico/admission-controller-k8s-go
fd9f331ad540f6dcde65a33c020cdd8cecc3bf0b
[ "Apache-2.0" ]
null
null
null
apiVersion: apps/v1 kind: Deployment metadata: name: ubt namespace: webhook-demo labels: app: ubt spec: replicas: 1 selector: matchLabels: app: ubt template: metadata: labels: app: ubt spec: securityContext: runAsNonRoot: false runAsUser: 0 containers: - name: server image: ubuntu:latest command: [ "/bin/bash","-c","--" ] args: [ "while true; do sleep 30; done;"] imagePullPolicy: IfNotPresent ports: - containerPort: 8443 name: webhook-api volumeMounts: - name: webhook-tls-certs mountPath: /run/secrets/tls readOnly: true volumes: - name: webhook-tls-certs secret: secretName: webhook-server-tls
21.210526
49
0.562035