hexsha
stringlengths 40
40
| size
int64 24
1.05M
| ext
stringclasses 2
values | lang
stringclasses 1
value | max_stars_repo_path
stringlengths 5
269
| max_stars_repo_name
stringlengths 7
107
| max_stars_repo_head_hexsha
stringlengths 40
78
| max_stars_repo_licenses
sequence | max_stars_count
int64 1
84.9k
⌀ | max_stars_repo_stars_event_min_datetime
stringlengths 24
24
⌀ | max_stars_repo_stars_event_max_datetime
stringlengths 24
24
⌀ | max_issues_repo_path
stringlengths 5
269
| max_issues_repo_name
stringlengths 7
107
| max_issues_repo_head_hexsha
stringlengths 40
78
| max_issues_repo_licenses
sequence | max_issues_count
int64 1
116k
⌀ | max_issues_repo_issues_event_min_datetime
stringlengths 24
24
⌀ | max_issues_repo_issues_event_max_datetime
stringlengths 24
24
⌀ | max_forks_repo_path
stringlengths 5
269
| max_forks_repo_name
stringlengths 7
107
| max_forks_repo_head_hexsha
stringlengths 40
78
| max_forks_repo_licenses
sequence | max_forks_count
int64 1
55.9k
⌀ | max_forks_repo_forks_event_min_datetime
stringlengths 24
24
⌀ | max_forks_repo_forks_event_max_datetime
stringlengths 24
24
⌀ | content
stringlengths 24
1.05M
| avg_line_length
float64 1
304k
| max_line_length
int64 14
1.03M
| alphanum_fraction
float64 0
1
|
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
f7a0483b7a89c6e7819b7c282e0b40214c75d03a | 306 | yml | YAML | blind/pod-high.yml | ariary/kube-podpreemption-DoS | 2c5cc1a466c2d4873d188a879737733a2d19946b | [
"Unlicense"
] | 2 | 2022-01-30T15:12:47.000Z | 2022-02-24T03:23:34.000Z | blind/pod-high.yml | ariary/kube-podpreemption-DoS | 2c5cc1a466c2d4873d188a879737733a2d19946b | [
"Unlicense"
] | null | null | null | blind/pod-high.yml | ariary/kube-podpreemption-DoS | 2c5cc1a466c2d4873d188a879737733a2d19946b | [
"Unlicense"
] | null | null | null | apiVersion: v1
kind: Pod
metadata:
name: pod-evictor
namespace: bad-tenant
spec:
containers:
- name: high-priority
image: nginxdemos/hello
resources:
requests:
cpu: 1
memory: 128Mi
limits:
cpu: 1
memory: 128Mi
priorityClassName: high-priority
| 16.105263 | 34 | 0.624183 |
f7a063ab2486e4ded8ea6bdc771f6f50b3e0d478 | 21,293 | yaml | YAML | infrastructure/rhacm/rhacm-secret.yaml | stefan-bergstein/manuela | 501a33bc62718e0a7c98428ab2bd5dc43b53b072 | [
"Apache-2.0"
] | 27 | 2019-11-28T12:05:02.000Z | 2022-01-28T10:24:15.000Z | infrastructure/rhacm/rhacm-secret.yaml | stefan-bergstein/manuela | 501a33bc62718e0a7c98428ab2bd5dc43b53b072 | [
"Apache-2.0"
] | 375 | 2019-11-28T12:06:09.000Z | 2021-05-27T20:14:11.000Z | infrastructure/rhacm/rhacm-secret.yaml | stefan-bergstein/manuela | 501a33bc62718e0a7c98428ab2bd5dc43b53b072 | [
"Apache-2.0"
] | 22 | 2020-04-10T09:10:01.000Z | 2022-02-14T15:53:40.000Z | kind: Secret
apiVersion: v1
metadata:
annotations:
certmanager.k8s.io/alt-names: www.redhat.com
certmanager.k8s.io/certificate-name: redhat-ca-cert
certmanager.k8s.io/common-name: www.redhat.com
certmanager.k8s.io/ip-sans: ''
certmanager.k8s.io/issuer-kind: Issuer
certmanager.k8s.io/issuer-name: cert-manager-rhacm-selfsign
name: redhat-ca-cert
labels:
certmanager.k8s.io/certificate-name: redhat-ca-cert
stringData:
tls.crt: |
-----BEGIN CERTIFICATE-----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-----END CERTIFICATE-----
-----BEGIN CERTIFICATE-----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-----END CERTIFICATE-----
-----BEGIN CERTIFICATE-----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-----END CERTIFICATE-----
-----BEGIN CERTIFICATE-----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-----END CERTIFICATE-----
data:
tls.key: >-
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
type: kubernetes.io/tls
# tls.crt: >-
# -----BEGIN CERTIFICATE-----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-----END CERTIFICATE-----
-----BEGIN CERTIFICATE-----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-----END CERTIFICATE-----
-----BEGIN CERTIFICATE-----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-----END CERTIFICATE-----
-----BEGIN CERTIFICATE-----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-----END CERTIFICATE-----

| 158.902985 | 9,141 | 0.957122 |
f7a07db4064bd62d38210a8fb9158eda27c53f22 | 22,208 | yaml | YAML | config/crd/bases/operator.victoriametrics.com_vmnodescrapes.yaml | umezawatakeshi/VictoriaMetrics-operator | 80ffc7dc5bbf5e883362f3976c759fd460a380db | [
"Apache-2.0"
] | null | null | null | config/crd/bases/operator.victoriametrics.com_vmnodescrapes.yaml | umezawatakeshi/VictoriaMetrics-operator | 80ffc7dc5bbf5e883362f3976c759fd460a380db | [
"Apache-2.0"
] | null | null | null | config/crd/bases/operator.victoriametrics.com_vmnodescrapes.yaml | umezawatakeshi/VictoriaMetrics-operator | 80ffc7dc5bbf5e883362f3976c759fd460a380db | [
"Apache-2.0"
] | null | null | null | apiVersion: apiextensions.k8s.io/v1
kind: CustomResourceDefinition
metadata:
annotations:
controller-gen.kubebuilder.io/version: v0.5.0
name: vmnodescrapes.operator.victoriametrics.com
spec:
group: operator.victoriametrics.com
names:
kind: VMNodeScrape
listKind: VMNodeScrapeList
plural: vmnodescrapes
singular: vmnodescrape
scope: Namespaced
versions:
- name: v1beta1
schema:
openAPIV3Schema:
description: VMNodeScrape defines discovery for targets placed on kubernetes
nodes, usually its node-exporters and other host services. InternalIP is
used as __address__ for scraping.
properties:
apiVersion:
description: 'APIVersion defines the versioned schema of this representation
of an object. Servers should convert recognized schemas to the latest
internal value, and may reject unrecognized values. More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#resources'
type: string
kind:
description: 'Kind is a string value representing the REST resource this
object represents. Servers may infer this from the endpoint the client
submits requests to. Cannot be updated. In CamelCase. More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#types-kinds'
type: string
metadata:
type: object
spec:
description: VMNodeScrapeSpec defines specification for VMNodeScrape.
properties:
basicAuth:
description: 'BasicAuth allow an endpoint to authenticate over basic
authentication More info: https://prometheus.io/docs/operating/configuration/#endpoints'
properties:
password:
description: The secret in the service scrape namespace that contains
the password for authentication.
properties:
key:
description: The key of the secret to select from. Must be
a valid secret key.
type: string
name:
description: 'Name of the referent. More info: https://kubernetes.io/docs/concepts/overview/working-with-objects/names/#names
TODO: Add other useful fields. apiVersion, kind, uid?'
type: string
optional:
description: Specify whether the Secret or its key must be
defined
type: boolean
required:
- key
type: object
username:
description: The secret in the service scrape namespace that contains
the username for authentication.
properties:
key:
description: The key of the secret to select from. Must be
a valid secret key.
type: string
name:
description: 'Name of the referent. More info: https://kubernetes.io/docs/concepts/overview/working-with-objects/names/#names
TODO: Add other useful fields. apiVersion, kind, uid?'
type: string
optional:
description: Specify whether the Secret or its key must be
defined
type: boolean
required:
- key
type: object
type: object
bearerTokenFile:
description: File to read bearer token for scraping targets.
type: string
bearerTokenSecret:
description: Secret to mount to read bearer token for scraping targets.
The secret needs to be accessible by the victoria-metrics operator.
properties:
key:
description: The key of the secret to select from. Must be a
valid secret key.
type: string
name:
description: 'Name of the referent. More info: https://kubernetes.io/docs/concepts/overview/working-with-objects/names/#names
TODO: Add other useful fields. apiVersion, kind, uid?'
type: string
optional:
description: Specify whether the Secret or its key must be defined
type: boolean
required:
- key
type: object
honorLabels:
description: HonorLabels chooses the metric's labels on collisions
with target labels.
type: boolean
honorTimestamps:
description: HonorTimestamps controls whether vmagent respects the
timestamps present in scraped data.
type: boolean
interval:
description: Interval at which metrics should be scraped
type: string
jobLabel:
description: The label to use to retrieve the job name from.
type: string
metricRelabelConfigs:
description: MetricRelabelConfigs to apply to samples before ingestion.
items:
description: 'RelabelConfig allows dynamic rewriting of the label
set, being applied to samples before ingestion. It defines `<metric_relabel_configs>`-section
of configuration. More info: https://prometheus.io/docs/prometheus/latest/configuration/configuration/#metric_relabel_configs'
properties:
action:
description: Action to perform based on regex matching. Default
is 'replace'
type: string
modulus:
description: Modulus to take of the hash of the source label
values.
format: int64
type: integer
regex:
description: Regular expression against which the extracted
value is matched. Default is '(.*)'
type: string
replacement:
description: Replacement value against which a regex replace
is performed if the regular expression matches. Regex capture
groups are available. Default is '$1'
type: string
separator:
description: Separator placed between concatenated source label
values. default is ';'.
type: string
source_labels:
description: UnderScoreSourceLabels - additional form of source
labels source_labels for compatibility with original relabel
config. if set both sourceLabels and source_labels, sourceLabels
has priority. for details https://github.com/VictoriaMetrics/operator/issues/131
items:
type: string
type: array
sourceLabels:
description: The source labels select values from existing labels.
Their content is concatenated using the configured separator
and matched against the configured regular expression for
the replace, keep, and drop actions.
items:
type: string
type: array
target_label:
description: UnderScoreTargetLabel - additional form of target
label - target_label for compatibility with original relabel
config. if set both targetLabel and target_label, targetLabel
has priority. for details https://github.com/VictoriaMetrics/operator/issues/131
type: string
targetLabel:
description: Label to which the resulting value is written in
a replace action. It is mandatory for replace actions. Regex
capture groups are available.
type: string
type: object
type: array
params:
additionalProperties:
items:
type: string
type: array
description: Optional HTTP URL parameters
type: object
path:
description: HTTP path to scrape for metrics.
type: string
port:
description: Name of the port exposed at Node.
type: string
proxyURL:
description: ProxyURL eg http://proxyserver:2195 Directs scrapes to
proxy through this endpoint.
type: string
relabelConfigs:
description: 'RelabelConfigs to apply to samples before scraping.
More info: https://prometheus.io/docs/prometheus/latest/configuration/configuration/#relabel_config'
items:
description: 'RelabelConfig allows dynamic rewriting of the label
set, being applied to samples before ingestion. It defines `<metric_relabel_configs>`-section
of configuration. More info: https://prometheus.io/docs/prometheus/latest/configuration/configuration/#metric_relabel_configs'
properties:
action:
description: Action to perform based on regex matching. Default
is 'replace'
type: string
modulus:
description: Modulus to take of the hash of the source label
values.
format: int64
type: integer
regex:
description: Regular expression against which the extracted
value is matched. Default is '(.*)'
type: string
replacement:
description: Replacement value against which a regex replace
is performed if the regular expression matches. Regex capture
groups are available. Default is '$1'
type: string
separator:
description: Separator placed between concatenated source label
values. default is ';'.
type: string
source_labels:
description: UnderScoreSourceLabels - additional form of source
labels source_labels for compatibility with original relabel
config. if set both sourceLabels and source_labels, sourceLabels
has priority. for details https://github.com/VictoriaMetrics/operator/issues/131
items:
type: string
type: array
sourceLabels:
description: The source labels select values from existing labels.
Their content is concatenated using the configured separator
and matched against the configured regular expression for
the replace, keep, and drop actions.
items:
type: string
type: array
target_label:
description: UnderScoreTargetLabel - additional form of target
label - target_label for compatibility with original relabel
config. if set both targetLabel and target_label, targetLabel
has priority. for details https://github.com/VictoriaMetrics/operator/issues/131
type: string
targetLabel:
description: Label to which the resulting value is written in
a replace action. It is mandatory for replace actions. Regex
capture groups are available.
type: string
type: object
type: array
sampleLimit:
description: SampleLimit defines per-scrape limit on number of scraped
samples that will be accepted.
format: int64
type: integer
scheme:
description: HTTP scheme to use for scraping.
type: string
scrapeTimeout:
description: Timeout after which the scrape is ended
type: string
selector:
description: Selector to select kubernetes Nodes.
properties:
matchExpressions:
description: matchExpressions is a list of label selector requirements.
The requirements are ANDed.
items:
description: A label selector requirement is a selector that
contains values, a key, and an operator that relates the key
and values.
properties:
key:
description: key is the label key that the selector applies
to.
type: string
operator:
description: operator represents a key's relationship to
a set of values. Valid operators are In, NotIn, Exists
and DoesNotExist.
type: string
values:
description: values is an array of string values. If the
operator is In or NotIn, the values array must be non-empty.
If the operator is Exists or DoesNotExist, the values
array must be empty. This array is replaced during a strategic
merge patch.
items:
type: string
type: array
required:
- key
- operator
type: object
type: array
matchLabels:
additionalProperties:
type: string
description: matchLabels is a map of {key,value} pairs. A single
{key,value} in the matchLabels map is equivalent to an element
of matchExpressions, whose key field is "key", the operator
is "In", and the values array contains only "value". The requirements
are ANDed.
type: object
type: object
targetLabels:
description: TargetLabels transfers labels on the Kubernetes Node
onto the target.
items:
type: string
type: array
tlsConfig:
description: TLSConfig configuration to use when scraping the node
properties:
ca:
description: Stuct containing the CA cert to use for the targets.
properties:
configMap:
description: ConfigMap containing data to use for the targets.
properties:
key:
description: The key to select.
type: string
name:
description: 'Name of the referent. More info: https://kubernetes.io/docs/concepts/overview/working-with-objects/names/#names
TODO: Add other useful fields. apiVersion, kind, uid?'
type: string
optional:
description: Specify whether the ConfigMap or its key
must be defined
type: boolean
required:
- key
type: object
secret:
description: Secret containing data to use for the targets.
properties:
key:
description: The key of the secret to select from. Must
be a valid secret key.
type: string
name:
description: 'Name of the referent. More info: https://kubernetes.io/docs/concepts/overview/working-with-objects/names/#names
TODO: Add other useful fields. apiVersion, kind, uid?'
type: string
optional:
description: Specify whether the Secret or its key must
be defined
type: boolean
required:
- key
type: object
type: object
caFile:
description: Path to the CA cert in the container to use for the
targets.
type: string
cert:
description: Struct containing the client cert file for the targets.
properties:
configMap:
description: ConfigMap containing data to use for the targets.
properties:
key:
description: The key to select.
type: string
name:
description: 'Name of the referent. More info: https://kubernetes.io/docs/concepts/overview/working-with-objects/names/#names
TODO: Add other useful fields. apiVersion, kind, uid?'
type: string
optional:
description: Specify whether the ConfigMap or its key
must be defined
type: boolean
required:
- key
type: object
secret:
description: Secret containing data to use for the targets.
properties:
key:
description: The key of the secret to select from. Must
be a valid secret key.
type: string
name:
description: 'Name of the referent. More info: https://kubernetes.io/docs/concepts/overview/working-with-objects/names/#names
TODO: Add other useful fields. apiVersion, kind, uid?'
type: string
optional:
description: Specify whether the Secret or its key must
be defined
type: boolean
required:
- key
type: object
type: object
certFile:
description: Path to the client cert file in the container for
the targets.
type: string
insecureSkipVerify:
description: Disable target certificate validation.
type: boolean
keyFile:
description: Path to the client key file in the container for
the targets.
type: string
keySecret:
description: Secret containing the client key file for the targets.
properties:
key:
description: The key of the secret to select from. Must be
a valid secret key.
type: string
name:
description: 'Name of the referent. More info: https://kubernetes.io/docs/concepts/overview/working-with-objects/names/#names
TODO: Add other useful fields. apiVersion, kind, uid?'
type: string
optional:
description: Specify whether the Secret or its key must be
defined
type: boolean
required:
- key
type: object
serverName:
description: Used to verify the hostname for the targets.
type: string
type: object
type: object
status:
description: VMNodeScrapeStatus defines the observed state of VMNodeScrape
type: object
type: object
served: true
storage: true
subresources:
status: {}
| 50.703196 | 175 | 0.489959 |
f7a0ae0b0b427352d627e46735854e04c7d0822c | 2,424 | yaml | YAML | common-services/etherpad/deployment.yaml | q616647005/infra-common | caed691b813f3b5c19a4336fc58e906858fa9966 | [
"Apache-2.0"
] | 1 | 2020-11-09T06:41:24.000Z | 2020-11-09T06:41:24.000Z | common-services/etherpad/deployment.yaml | q616647005/infra-common | caed691b813f3b5c19a4336fc58e906858fa9966 | [
"Apache-2.0"
] | null | null | null | common-services/etherpad/deployment.yaml | q616647005/infra-common | caed691b813f3b5c19a4336fc58e906858fa9966 | [
"Apache-2.0"
] | null | null | null | ---
apiVersion: apps/v1
kind: Deployment
metadata:
name: etherpad-lite
labels:
service: etherpad-lite
spec:
selector:
matchLabels:
service: etherpad-lite
template:
metadata:
labels:
service: etherpad-lite
spec:
containers:
- name: etherpad-lite
image: etherpad/etherpad:1.8.6
imagePullPolicy: IfNotPresent
env:
- name: SKIN_NAME
valueFrom:
configMapKeyRef:
name: ether-config
key: skin
- name: NODE_ENV
valueFrom:
configMapKeyRef:
name: ether-config
key: env
- name: DB_TYPE
valueFrom:
configMapKeyRef:
name: ether-config
key: db_type
- name: DB_HOST
valueFrom:
configMapKeyRef:
name: ether-config
key: db_host
- name: DB_PORT
valueFrom:
configMapKeyRef:
name: ether-config
key: db_port
- name: DB_NAME
valueFrom:
configMapKeyRef:
name: ether-config
key: db_name
- name: DB_USER
valueFrom:
configMapKeyRef:
name: ether-config
key: db_user
- name: DB_CHARSET
valueFrom:
configMapKeyRef:
name: ether-config
key: db_charset
- name: PORT
valueFrom:
configMapKeyRef:
name: ether-config
key: port
- name: DB_PASS
valueFrom:
secretKeyRef:
name: ether-secret
key: db_password
- name: ADMIN_PASSWORD
valueFrom:
secretKeyRef:
name: ether-secret
key: admin_password
ports:
- containerPort: 9001
name: https
protocol: TCP
volumeMounts:
- mountPath: /opt/etherpad-lite/var
name: data-volume
volumes:
- name: data-volume
persistentVolumeClaim:
claimName: ether-data-vol
| 27.545455 | 47 | 0.442244 |
f7a10117306ed1a68155bb8fa6a26923366be621 | 335 | yaml | YAML | deployment/k8s/ingress.yaml | jdxj/hello | 305f22c69bd928a9e0f352fdef22cab1201f6ff0 | [
"MIT"
] | null | null | null | deployment/k8s/ingress.yaml | jdxj/hello | 305f22c69bd928a9e0f352fdef22cab1201f6ff0 | [
"MIT"
] | null | null | null | deployment/k8s/ingress.yaml | jdxj/hello | 305f22c69bd928a9e0f352fdef22cab1201f6ff0 | [
"MIT"
] | null | null | null | apiVersion: networking.k8s.io/v1
kind: Ingress
metadata:
name: hello-ing
spec:
rules:
- host: hello.service.baldcamera.com
http:
paths:
- path: /
pathType: Prefix
backend:
service:
name: hello-svc
port:
number: 8080 | 20.9375 | 40 | 0.486567 |
f7a10d4319bb805eea16edaa7af1d43249e4faec | 101 | yaml | YAML | configs/dca-secret.yaml | DataDog/OutPost-Test-Plan | d630f196488acc366d03b1692e1259979e3c60d3 | [
"Apache-2.0"
] | null | null | null | configs/dca-secret.yaml | DataDog/OutPost-Test-Plan | d630f196488acc366d03b1692e1259979e3c60d3 | [
"Apache-2.0"
] | null | null | null | configs/dca-secret.yaml | DataDog/OutPost-Test-Plan | d630f196488acc366d03b1692e1259979e3c60d3 | [
"Apache-2.0"
] | 1 | 2021-02-21T12:29:49.000Z | 2021-02-21T12:29:49.000Z | apiVersion: v1
kind: Secret
metadata:
name: datadog-auth-token
type: Opaque
data:
token: <TOKEN>
| 12.625 | 26 | 0.732673 |
f7a1108d140902eab5acf75dc92ea18b9437ee5d | 495 | yaml | YAML | vendor/k8s.io/kubernetes/test/fixtures/doc-yaml/user-guide/secrets/secret-pod.yaml | BinaryTreeNode/KDS | 6220475814b42733c86ac0005e8548bb9a481c75 | [
"Apache-2.0"
] | 1 | 2020-07-02T14:53:18.000Z | 2020-07-02T14:53:18.000Z | vendor/k8s.io/kubernetes/test/fixtures/doc-yaml/user-guide/secrets/secret-pod.yaml | BinaryTreeNode/KDS | 6220475814b42733c86ac0005e8548bb9a481c75 | [
"Apache-2.0"
] | null | null | null | vendor/k8s.io/kubernetes/test/fixtures/doc-yaml/user-guide/secrets/secret-pod.yaml | BinaryTreeNode/KDS | 6220475814b42733c86ac0005e8548bb9a481c75 | [
"Apache-2.0"
] | null | null | null | apiVersion: v1
kind: Pod
metadata:
name: secret-test-pod
spec:
containers:
- name: test-container
image: gcr.io/google_containers/mounttest:0.8
command: [ "/mt", "--file_content=/etc/secret-volume/data-1" ]
volumeMounts:
# name must match the volume name below
- name: secret-volume
mountPath: /etc/secret-volume
volumes:
- name: secret-volume
secret:
secretName: test-secret
restartPolicy: Never
| 26.052632 | 69 | 0.614141 |
f7a139457ea4f7e1a4ff835731d237147356cb4b | 1,202 | yaml | YAML | deploy/kubernetes/manifests/catalogue-dep.yaml | yushiwho/microservices-demo | 033efceec299215fe884eeb03eddfda0a368f31e | [
"Apache-2.0"
] | null | null | null | deploy/kubernetes/manifests/catalogue-dep.yaml | yushiwho/microservices-demo | 033efceec299215fe884eeb03eddfda0a368f31e | [
"Apache-2.0"
] | null | null | null | deploy/kubernetes/manifests/catalogue-dep.yaml | yushiwho/microservices-demo | 033efceec299215fe884eeb03eddfda0a368f31e | [
"Apache-2.0"
] | null | null | null | ---
apiVersion: apps/v1
kind: Deployment
metadata:
name: catalogue
labels:
name: catalogue
namespace: sock-shop
spec:
replicas: 1
template:
metadata:
labels:
name: catalogue
spec:
containers:
- name: catalogue
image: weaveworksdemos/catalogue:0.3.5
command: ["/app"]
args:
- -port=80
resources:
limits:
cpu: 100m
memory: 100Mi
requests:
cpu: 100m
memory: 100Mi
ports:
- containerPort: 80
securityContext:
runAsNonRoot: true
runAsUser: 10001
capabilities:
drop:
- all
add:
- NET_BIND_SERVICE
readOnlyRootFilesystem: true
livenessProbe:
httpGet:
path: /health
port: 80
initialDelaySeconds: 300
periodSeconds: 3
readinessProbe:
httpGet:
path: /health
port: 80
initialDelaySeconds: 180
periodSeconds: 3
nodeSelector:
beta.kubernetes.io/os: linux
selector:
matchLabels:
name: catalogue | 21.464286 | 46 | 0.510815 |
f7a23ddd1a4414e3dd26e01117491cb7efaae576 | 548 | yaml | YAML | kustomize/overlays/stable/manager/patches/deploy-config.yaml | MichalCervenansky/sandbox | fd9f1454350d1b2a1c0c647c05229b5d6afa13df | [
"Apache-2.0"
] | null | null | null | kustomize/overlays/stable/manager/patches/deploy-config.yaml | MichalCervenansky/sandbox | fd9f1454350d1b2a1c0c647c05229b5d6afa13df | [
"Apache-2.0"
] | null | null | null | kustomize/overlays/stable/manager/patches/deploy-config.yaml | MichalCervenansky/sandbox | fd9f1454350d1b2a1c0c647c05229b5d6afa13df | [
"Apache-2.0"
] | null | null | null | apiVersion: v1
kind: ConfigMap
metadata:
name: event-bridge-manager-config
data:
EVENT_BRIDGE_DB_USERNAME: "postgres"
EVENT_BRIDGE_DB_PASSWORD: "postgres"
EVENT_BRIDGE_DB_HOST: "event-bridge-db"
EVENT_BRIDGE_DB_PORT: "5432"
EVENT_BRIDGE_DB_SCHEMA: "event-bridge"
EVENT_BRIDGE_SSO_URL: "https://keycloak-event-bridge-stable.apps.ob-stable.0b9l.p1.openshiftapps.com/auth/realms/event-bridge-fm"
EVENT_BRIDGE_SSO_CLIENT_ID: "event-bridge"
EVENT_BRIDGE_KAFKA_SECURITY_PROTOCOL: SASL_SSL
EVENT_BRIDGE_KAFKA_TOPIC_PREFIX: "ob-stable-" | 39.142857 | 131 | 0.813869 |
f7a24171708c9902e173e76ddf9bb0f9ce7bd6bb | 221 | yml | YAML | examples/update-secret.yml | thycotic/dsv-k8s | e1f9e21773f620509c20590d65723ec776ec2218 | [
"Apache-2.0"
] | 4 | 2020-04-29T17:25:05.000Z | 2022-03-07T11:28:54.000Z | examples/update-secret.yml | thycotic/dsv-k8s | e1f9e21773f620509c20590d65723ec776ec2218 | [
"Apache-2.0"
] | 4 | 2020-04-11T18:30:28.000Z | 2022-03-09T20:41:48.000Z | examples/update-secret.yml | thycotic/dsv-k8s | e1f9e21773f620509c20590d65723ec776ec2218 | [
"Apache-2.0"
] | 3 | 2020-04-11T17:41:46.000Z | 2020-05-11T17:40:59.000Z | ---
apiVersion: v1
kind: Secret
metadata:
name: pass-domain
annotations:
dsv.thycotic.com/update-secret: /test/secret
type: Opaque
data:
password: dW5tb2RpZmllZC1wYXNzd29yZA==
domain: dW5tb2RpZmllZC1kb21haW4=
| 18.416667 | 48 | 0.760181 |
f7a2ac75ea724b2c0a625f720fdaaf3281c04e7a | 862 | yaml | YAML | Grafana/grafana-deployment.yaml | gurpreet0610/mrsinghDevOps | 6b5d063c2f60e0618f0553c796ab41f54cc66fe1 | [
"Apache-2.0"
] | 1 | 2021-12-09T20:29:09.000Z | 2021-12-09T20:29:09.000Z | Grafana/grafana-deployment.yaml | gurpreet0610/mrsinghDevOps | 6b5d063c2f60e0618f0553c796ab41f54cc66fe1 | [
"Apache-2.0"
] | 1 | 2020-09-30T19:42:25.000Z | 2020-09-30T19:42:25.000Z | Grafana/grafana-deployment.yaml | gurpreet0610/mrsinghDevOps | 6b5d063c2f60e0618f0553c796ab41f54cc66fe1 | [
"Apache-2.0"
] | 2 | 2020-09-30T19:41:00.000Z | 2020-09-30T19:52:36.000Z | apiVersion: apps/v1
kind: Deployment
metadata:
name: grafana
namespace: monitoring
spec:
replicas: 1
selector:
matchLabels:
app: grafana
template:
metadata:
name: grafana
labels:
app: grafana
spec:
containers:
- name: grafana
image: grafana/grafana:latest
ports:
- name: grafana
containerPort: 3000
volumeMounts:
- mountPath: /var/lib/grafana
name: grafana-storage
- mountPath: /etc/grafana/provisioning/datasources
name: grafana-datasources
readOnly: false
volumes:
- name: grafana-storage
persistentVolumeClaim:
claimName: pvc-nfs-storage
- name: grafana-datasources
configMap:
defaultMode: 420
name: grafana-datasources | 23.944444 | 60 | 0.580046 |
f7a30eed806ebf40d3777f8ba9976516ab587160 | 189 | yaml | YAML | 24_rbac/clusterrole.yaml | ManuStoessel/kubernetes-from-zero-to-hero | 6b8a1fa049cda74b890d148a8ca067e2ac0768b7 | [
"Apache-2.0"
] | 2 | 2022-03-20T22:33:52.000Z | 2022-03-21T11:04:37.000Z | 24_rbac/clusterrole.yaml | ManuStoessel/kubernetes-from-zero-to-hero | 6b8a1fa049cda74b890d148a8ca067e2ac0768b7 | [
"Apache-2.0"
] | null | null | null | 24_rbac/clusterrole.yaml | ManuStoessel/kubernetes-from-zero-to-hero | 6b8a1fa049cda74b890d148a8ca067e2ac0768b7 | [
"Apache-2.0"
] | null | null | null | kind: ClusterRole
apiVersion: rbac.authorization.k8s.io/v1
metadata:
name: my-clusterrole
rules:
- apiGroups:
- ""
resources:
- pods
verbs:
- get
- list
| 14.538462 | 40 | 0.597884 |
f7a3e1c61165fa91d398f6d707c1ab6ad02aadd4 | 219 | yaml | YAML | cluster/apps/db/pgadmin/config-pvc.yaml | Diaoul/home-ops | cac9f625c006420db7effcf5e8801f95bdcf219b | [
"Unlicense"
] | 12 | 2021-11-08T00:05:22.000Z | 2022-03-16T17:10:18.000Z | cluster/apps/db/pgadmin/config-pvc.yaml | Diaoul/home-ops | cac9f625c006420db7effcf5e8801f95bdcf219b | [
"Unlicense"
] | 3 | 2021-05-07T19:01:06.000Z | 2021-09-20T11:59:45.000Z | cluster/apps/db/pgadmin/config-pvc.yaml | Diaoul/home-ops | cac9f625c006420db7effcf5e8801f95bdcf219b | [
"Unlicense"
] | 3 | 2021-05-16T21:33:40.000Z | 2021-10-21T15:07:38.000Z | ---
apiVersion: v1
kind: PersistentVolumeClaim
metadata:
name: pgadmin-config
namespace: db
spec:
accessModes:
- ReadWriteOnce
resources:
requests:
storage: 1Gi
storageClassName: rook-ceph-block
| 15.642857 | 35 | 0.716895 |
f7a41dc28237761d8795aaeb9e21d43a2c38f1e8 | 144 | yaml | YAML | built-in-references/Kubernetes/perf/violations/violation1210.yaml | sw47/azure-policy | 4a38e4cb4047b5364902653f0defe45f1b21bc61 | [
"MIT"
] | null | null | null | built-in-references/Kubernetes/perf/violations/violation1210.yaml | sw47/azure-policy | 4a38e4cb4047b5364902653f0defe45f1b21bc61 | [
"MIT"
] | null | null | null | built-in-references/Kubernetes/perf/violations/violation1210.yaml | sw47/azure-policy | 4a38e4cb4047b5364902653f0defe45f1b21bc61 | [
"MIT"
] | null | null | null | apiVersion: v1
kind: Pod
metadata:
name: image-demo-1210
spec:
containers:
- name: nginx
image: nginx #ritaacr.azurecr.io/nginx:latest | 18 | 49 | 0.722222 |
f7a4886e4ecf2daedf28806701eddaa68d798972 | 407 | yaml | YAML | content/ru/examples/application/deployment.yaml | rendiputra/website | 4b93c0608828e685881be1662e766d696f0b097b | [
"CC-BY-4.0"
] | 3,157 | 2017-10-18T13:28:53.000Z | 2022-03-31T06:41:57.000Z | content/ru/examples/application/deployment.yaml | rendiputra/website | 4b93c0608828e685881be1662e766d696f0b097b | [
"CC-BY-4.0"
] | 27,074 | 2017-10-18T09:53:11.000Z | 2022-03-31T23:57:19.000Z | content/ru/examples/application/deployment.yaml | rendiputra/website | 4b93c0608828e685881be1662e766d696f0b097b | [
"CC-BY-4.0"
] | 11,539 | 2017-10-18T15:54:11.000Z | 2022-03-31T12:51:54.000Z | apiVersion: apps/v1 # до версии 1.9.0 нужно использовать apps/v1beta2
kind: Deployment
metadata:
name: nginx-deployment
spec:
selector:
matchLabels:
app: nginx
replicas: 2 # запускает 2 пода, созданных по шаблону
template:
metadata:
labels:
app: nginx
spec:
containers:
- name: nginx
image: nginx:1.14.2
ports:
- containerPort: 80
| 20.35 | 69 | 0.626536 |
f7a4f0ae59d77ef46a687effd4e0334d38ef37d9 | 675 | yaml | YAML | openshift/wally-backend/wally-config.yaml | bcgov-c/wally | 264bc5d40f9b5cf293159f1bc0424cfd9ff8aa06 | [
"Apache-2.0"
] | null | null | null | openshift/wally-backend/wally-config.yaml | bcgov-c/wally | 264bc5d40f9b5cf293159f1bc0424cfd9ff8aa06 | [
"Apache-2.0"
] | null | null | null | openshift/wally-backend/wally-config.yaml | bcgov-c/wally | 264bc5d40f9b5cf293159f1bc0424cfd9ff8aa06 | [
"Apache-2.0"
] | null | null | null | apiVersion: v1
data:
prod.env: |
external_import=true
external_import_types=
wally_model=false
surface_water_design_v2=true
hydraulic_connectivity_custom_stream_points=false
efn_analysis=false
staging.env: |
external_import=true
external_import_types=
wally_model=true
surface_water_design_v2=true
hydraulic_connectivity_custom_stream_points=true
efn_analysis=true
dev.env: |
external_import=true
external_import_types=csv, kml, geojson
wally_model=true
surface_water_design_v2=true
hydraulic_connectivity_custom_stream_points=true
efn_analysis=true
kind: ConfigMap
metadata:
name: wally-config
| 25 | 53 | 0.779259 |
f7a50b9988d46890604ac83e6d347f2d38ebbd81 | 168 | yml | YAML | kubernetes/yamls/frontend/frontend-service.yml | ayushmansxn01/open-event-frontend | 4b516f43b854e231b6be07b8edcb008641b24793 | [
"Apache-2.0"
] | 1 | 2021-08-18T05:43:28.000Z | 2021-08-18T05:43:28.000Z | kubernetes/yamls/frontend/frontend-service.yml | ayushmansxn01/open-event-frontend | 4b516f43b854e231b6be07b8edcb008641b24793 | [
"Apache-2.0"
] | 3 | 2022-02-19T07:36:05.000Z | 2022-03-03T12:18:19.000Z | kubernetes/yamls/frontend/frontend-service.yml | k4ni5h/open-event-frontend | 363b980399aa8082091a7b104f6161ef279eed20 | [
"Apache-2.0"
] | 2 | 2021-06-16T04:01:38.000Z | 2021-08-11T16:57:05.000Z | kind: Service
apiVersion: v1
metadata:
name: frontend
namespace: web
spec:
ports:
- port: 80
protocol: TCP
targetPort: 80
selector:
app: frontend
| 12.923077 | 18 | 0.666667 |
f7a54855be472a83377db8381edacd704de20d99 | 1,068 | yaml | YAML | config/rbac/role_binding.yaml | LaudateCorpus1/solr-operator | 86107e4c3d2945a15d7f08bbb081eb1418bd6ead | [
"Apache-2.0"
] | 103 | 2019-06-14T20:36:28.000Z | 2021-01-12T23:47:54.000Z | config/rbac/role_binding.yaml | LaudateCorpus1/solr-operator | 86107e4c3d2945a15d7f08bbb081eb1418bd6ead | [
"Apache-2.0"
] | 138 | 2021-03-15T14:49:21.000Z | 2022-03-31T18:45:13.000Z | config/rbac/role_binding.yaml | LaudateCorpus1/solr-operator | 86107e4c3d2945a15d7f08bbb081eb1418bd6ead | [
"Apache-2.0"
] | 44 | 2019-06-19T23:12:46.000Z | 2021-01-06T12:11:41.000Z | # Licensed to the Apache Software Foundation (ASF) under one or more
# contributor license agreements. See the NOTICE file distributed with
# this work for additional information regarding copyright ownership.
# The ASF licenses this file to You under the Apache License, Version 2.0
# (the "License"); you may not use this file except in compliance with
# the License. You may obtain a copy of the License at
#
# http://www.apache.org/licenses/LICENSE-2.0
#
# Unless required by applicable law or agreed to in writing, software
# distributed under the License is distributed on an "AS IS" BASIS,
# WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
# See the License for the specific language governing permissions and
# limitations under the License.
apiVersion: rbac.authorization.k8s.io/v1
kind: ClusterRoleBinding
metadata:
name: solr-operator-rolebinding
roleRef:
apiGroup: rbac.authorization.k8s.io
kind: ClusterRole
name: solr-operator-role
subjects:
- kind: ServiceAccount
name: solr-operator
namespace: solr-operator
| 38.142857 | 74 | 0.779963 |
f7a5fa9bc8a324b6b807b5c3922add36a7281c18 | 1,342 | yaml | YAML | mock-data/large-cluster/k8s/v1:ConfigMap/gitlab-gitlab-unicorn-tests.yaml | kubevious/logic-processor | f3b502fdd851fc955ddb00b39da589bbf05566e3 | [
"Apache-2.0"
] | null | null | null | mock-data/large-cluster/k8s/v1:ConfigMap/gitlab-gitlab-unicorn-tests.yaml | kubevious/logic-processor | f3b502fdd851fc955ddb00b39da589bbf05566e3 | [
"Apache-2.0"
] | null | null | null | mock-data/large-cluster/k8s/v1:ConfigMap/gitlab-gitlab-unicorn-tests.yaml | kubevious/logic-processor | f3b502fdd851fc955ddb00b39da589bbf05566e3 | [
"Apache-2.0"
] | 1 | 2022-01-16T20:19:54.000Z | 2022-01-16T20:19:54.000Z | kind: ConfigMap
apiVersion: v1
metadata:
name: gitlab-unicorn-tests
namespace: gitlab
selfLink: /api/v1/namespaces/gitlab/configmaps/gitlab-unicorn-tests
uid: 98103e64-398b-11ea-b115-42010a8001d6
resourceVersion: '2016135'
creationTimestamp: '2020-01-18T00:43:50Z'
data:
test_login: >
set -e
echo 'Start Test'
endpoint="https://gitlab.example.com"
cookie_read="-c /tmp/test_login.cookie"
cookie_readwrite="$cookie_read -b /tmp/test_login.cookie"
signin_url="$endpoint/users/sign_in"
echo "Login to create a session: $signin_url"
csrf=$(curl $signin_url --fail -s $cookie_read | grep -Po
'<meta.*name="csrf-token".*content="\K[a-zA-Z0-9\+=\-\/]*')
curl --fail -X POST $signin_url -s $cookie_readwrite -F
"authenticity_token=$csrf" -F 'user[login]=root' -F
"user[password]=$(cat /initial_root_password)"
profile_url="$endpoint/profile"
echo "Confirm session valid: $profile_url"
profile_status=$(curl -s -o /tmp/profile_output -w "%{http_code}"
$cookie_readwrite $profile_url)
if [ "$profile_status" != "200" ]; then
echo "Error: Session Invalid"
cat /tmp/profile_output
exit 1
fi
echo 'Test Passed'
exit 0
| 24.851852 | 73 | 0.619225 |
f7a607b9205c79d95cb0b1df3fbb607a3b3d588d | 416 | yaml | YAML | config/rbac/mustgatherapiserver_viewer_role.yaml | MichaelWasher/must-gather-server-operator | bd9753f622755c18361be166ff841c85d3a1bfec | [
"Apache-2.0"
] | null | null | null | config/rbac/mustgatherapiserver_viewer_role.yaml | MichaelWasher/must-gather-server-operator | bd9753f622755c18361be166ff841c85d3a1bfec | [
"Apache-2.0"
] | null | null | null | config/rbac/mustgatherapiserver_viewer_role.yaml | MichaelWasher/must-gather-server-operator | bd9753f622755c18361be166ff841c85d3a1bfec | [
"Apache-2.0"
] | null | null | null | # permissions for end users to view mustgatherapiservers.
apiVersion: rbac.authorization.k8s.io/v1
kind: ClusterRole
metadata:
name: mustgatherapiserver-viewer-role
rules:
- apiGroups:
- mustgatherserver.michael-washer.com
resources:
- mustgatherapiservers
verbs:
- get
- list
- watch
- apiGroups:
- mustgatherserver.michael-washer.com
resources:
- mustgatherapiservers/status
verbs:
- get
| 19.809524 | 57 | 0.754808 |
f7a62aab8d9011d5fc347364cef8ef900439fc01 | 558 | yaml | YAML | kubernetes/deployment.yaml | thotheod/mslearn-aks-deployment-pipeline-github-actions | b5afbe4c18a580f5c86a309e3c5e162f5623dfbf | [
"CC-BY-4.0",
"MIT"
] | null | null | null | kubernetes/deployment.yaml | thotheod/mslearn-aks-deployment-pipeline-github-actions | b5afbe4c18a580f5c86a309e3c5e162f5623dfbf | [
"CC-BY-4.0",
"MIT"
] | null | null | null | kubernetes/deployment.yaml | thotheod/mslearn-aks-deployment-pipeline-github-actions | b5afbe4c18a580f5c86a309e3c5e162f5623dfbf | [
"CC-BY-4.0",
"MIT"
] | null | null | null | apiVersion: apps/v1
kind: Deployment
metadata:
name: contoso-website
spec:
selector:
matchLabels:
app: contoso-website
template:
metadata:
labels:
app: contoso-website
spec:
containers:
- image: acrgh12949.azurecr.io/contoso-website
name: contoso-website
resources:
requests:
cpu: 100m
memory: 128Mi
limits:
cpu: 250m
memory: 256Mi
ports:
- containerPort: 80
name: http
| 20.666667 | 54 | 0.523297 |
f7a6743868d4d0c1e00c6a2ee72ea744197a1d9d | 1,825 | yaml | YAML | config/prow/cluster/needs-rebase_deployment.yaml | omertuc/test-infra | 50edaeee283a7019ad85a9c42179bd4ebe82aad5 | [
"Apache-2.0"
] | null | null | null | config/prow/cluster/needs-rebase_deployment.yaml | omertuc/test-infra | 50edaeee283a7019ad85a9c42179bd4ebe82aad5 | [
"Apache-2.0"
] | null | null | null | config/prow/cluster/needs-rebase_deployment.yaml | omertuc/test-infra | 50edaeee283a7019ad85a9c42179bd4ebe82aad5 | [
"Apache-2.0"
] | null | null | null | # Copyright 2016 The Kubernetes Authors All rights reserved.
#
# Licensed under the Apache License, Version 2.0 (the "License");
# you may not use this file except in compliance with the License.
# You may obtain a copy of the License at
#
# http://www.apache.org/licenses/LICENSE-2.0
#
# Unless required by applicable law or agreed to in writing, software
# distributed under the License is distributed on an "AS IS" BASIS,
# WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
# See the License for the specific language governing permissions and
# limitations under the License.
apiVersion: apps/v1
kind: Deployment
metadata:
namespace: default
name: needs-rebase
labels:
app: needs-rebase
spec:
replicas: 1
selector:
matchLabels:
app: needs-rebase
template:
metadata:
labels:
app: needs-rebase
spec:
terminationGracePeriodSeconds: 180
containers:
- name: needs-rebase
image: gcr.io/k8s-prow/needs-rebase:v20210616-1938066492
imagePullPolicy: Always
args:
- --dry-run=false
- --github-endpoint=http://ghproxy
- --github-endpoint=https://api.github.com
- --github-token-path=/etc/github/oauth
- --update-period=6h
ports:
- name: http
containerPort: 8888
volumeMounts:
- name: hmac
mountPath: /etc/webhook
readOnly: true
- name: oauth
mountPath: /etc/github
readOnly: true
- name: plugins
mountPath: /etc/plugins
readOnly: true
volumes:
- name: hmac
secret:
secretName: hmac-token
- name: oauth
secret:
secretName: oauth-token
- name: plugins
configMap:
name: plugins
| 27.651515 | 74 | 0.629041 |
f7a6cb869fe6f1dedbfc86c8042dd17768bfa454 | 1,200 | yaml | YAML | dist/deployment.yaml | vicjicaman/microservice-blog-web-service | 642391f3990fb0724836dbaefd300c074871a068 | [
"MIT"
] | null | null | null | dist/deployment.yaml | vicjicaman/microservice-blog-web-service | 642391f3990fb0724836dbaefd300c074871a068 | [
"MIT"
] | null | null | null | dist/deployment.yaml | vicjicaman/microservice-blog-web-service | 642391f3990fb0724836dbaefd300c074871a068 | [
"MIT"
] | null | null | null | apiVersion: apps/v1
kind: Deployment
metadata:
name: blog-web-deployment
namespace: microservices-namespace
labels:
app: blog-web-deployment
moduleid: microservice-blog-web-service
version: 1.70.0-master
spec:
replicas: 2
selector:
matchLabels:
app: blog-web-deployment
template:
metadata:
labels:
app: blog-web-deployment
spec:
containers:
-
name: app
image: 'repoflow/microservice-blog-web-container:1.70.0-master'
env:
-
name: HOST
value: www.repoflow.com
-
name: BLOG_BASE_ROUTE_APP
value: /blog
-
name: BLOG_INTERNAL_PORT_APP
value: '3000'
-
name: BLOG_EXTERNAL_URL_GRAPH
value: 'http://www.repoflow.com/blog/backend/graphql'
-
name: BLOG_INTERNAL_URL_GRAPH
value: 'http://blog-graph-service.microservices-namespace:4000/blog/backend/graphql'
-
name: RESOURCES_BASE_ROUTE
value: /resources
ports:
-
containerPort: 3000
| 26.086957 | 98 | 0.545 |
f7a6eb4c42aef5562513b662960e65aead7dbab8 | 239 | yaml | YAML | examples/volume/pvc-share-01.yaml | jcsdatera/kubernetes-lab-tutorial | d7c82a5be75132f6a8dd5c8bae3e5ac35c322484 | [
"MIT"
] | null | null | null | examples/volume/pvc-share-01.yaml | jcsdatera/kubernetes-lab-tutorial | d7c82a5be75132f6a8dd5c8bae3e5ac35c322484 | [
"MIT"
] | null | null | null | examples/volume/pvc-share-01.yaml | jcsdatera/kubernetes-lab-tutorial | d7c82a5be75132f6a8dd5c8bae3e5ac35c322484 | [
"MIT"
] | null | null | null | ---
kind: PersistentVolumeClaim
apiVersion: v1
metadata:
name: pvc-share-01
spec:
storageClassName: ""
accessModes:
- ReadWriteMany
resources:
requests:
storage: 1Gi
selector:
matchLabels:
name: "share01"
| 14.9375 | 27 | 0.669456 |
f7a755d5eb4f2514748d9cb72bf1859f13c20bde | 212 | yaml | YAML | rook/pvc/jackett-config.yaml | Exikle/Artemis-Cluster | 6095e2539d81cc5b98ba39028c6918a36ca88923 | [
"MIT"
] | null | null | null | rook/pvc/jackett-config.yaml | Exikle/Artemis-Cluster | 6095e2539d81cc5b98ba39028c6918a36ca88923 | [
"MIT"
] | null | null | null | rook/pvc/jackett-config.yaml | Exikle/Artemis-Cluster | 6095e2539d81cc5b98ba39028c6918a36ca88923 | [
"MIT"
] | null | null | null | kind: PersistentVolumeClaim
apiVersion: v1
metadata:
name: jackett-config
namespace: default
spec:
storageClassName: ssd-sc
accessModes:
- ReadWriteOnce
resources:
requests:
storage: 2Gi
| 16.307692 | 27 | 0.726415 |
f7a76542f97b8fe39721346b647d42668a0b0940 | 633 | yaml | YAML | pod.yaml | tjkemper/jenkins-slave-docker | ae496cdadfc321d08f73641774c8cf2df9710d19 | [
"MIT"
] | null | null | null | pod.yaml | tjkemper/jenkins-slave-docker | ae496cdadfc321d08f73641774c8cf2df9710d19 | [
"MIT"
] | null | null | null | pod.yaml | tjkemper/jenkins-slave-docker | ae496cdadfc321d08f73641774c8cf2df9710d19 | [
"MIT"
] | null | null | null | apiVersion: "v1"
kind: "Pod"
metadata:
name: "jenkins-slave"
labels:
name: "jenkins-slave"
spec:
containers:
- name: "jenkins-slave"
image: "tjkemper/jnlp-slave:0.4"
env:
- name: "JENKINS_URL"
value: "http://100.68.13.101:80"
volumeMounts:
- name: docker-sock
mountPath: /var/run/docker.sock
- name: "config"
mountPath: "/home/jenkins/.kube/"
readOnly: true
volumes:
- name: docker-sock
hostPath:
path: /var/run/docker.sock
- name: "config"
secret:
secretName: "config"
| 23.444444 | 44 | 0.530806 |
f7a7a32ccb7b9b4e7477edbb21d598bc47c1c0e7 | 1,013 | yaml | YAML | example/rbac/prometheus-operator/prometheus-operator-cluster-role.yaml | kissmikijr/prometheus-operator | a24b27829d9181ef30ffdf648d2f4a9ff72f699d | [
"Apache-2.0"
] | null | null | null | example/rbac/prometheus-operator/prometheus-operator-cluster-role.yaml | kissmikijr/prometheus-operator | a24b27829d9181ef30ffdf648d2f4a9ff72f699d | [
"Apache-2.0"
] | null | null | null | example/rbac/prometheus-operator/prometheus-operator-cluster-role.yaml | kissmikijr/prometheus-operator | a24b27829d9181ef30ffdf648d2f4a9ff72f699d | [
"Apache-2.0"
] | null | null | null | apiVersion: rbac.authorization.k8s.io/v1
kind: ClusterRole
metadata:
labels:
app.kubernetes.io/component: controller
app.kubernetes.io/name: prometheus-operator
app.kubernetes.io/version: v0.40.0
name: prometheus-operator
rules:
- apiGroups:
- monitoring.coreos.com
resources:
- alertmanagers
- alertmanagers/finalizers
- prometheuses
- prometheuses/finalizers
- thanosrulers
- thanosrulers/finalizers
- servicemonitors
- podmonitors
- prometheusrules
verbs:
- '*'
- apiGroups:
- apps
resources:
- statefulsets
verbs:
- '*'
- apiGroups:
- ""
resources:
- configmaps
- secrets
verbs:
- '*'
- apiGroups:
- ""
resources:
- pods
verbs:
- list
- delete
- apiGroups:
- ""
resources:
- services
- services/finalizers
- endpoints
verbs:
- get
- create
- update
- delete
- apiGroups:
- ""
resources:
- nodes
verbs:
- list
- watch
- apiGroups:
- ""
resources:
- namespaces
verbs:
- get
- list
- watch
| 14.471429 | 47 | 0.643633 |
f7a7b606ed794fedf43f86a199e7549d77854ea1 | 1,936 | yaml | YAML | kustomize/oxshibboleth/base/statefulsets-patch.yaml | mohsameer/enterprise-edition | b806975c96522b598607f6b79873a0bf716355c7 | [
"Apache-2.0"
] | null | null | null | kustomize/oxshibboleth/base/statefulsets-patch.yaml | mohsameer/enterprise-edition | b806975c96522b598607f6b79873a0bf716355c7 | [
"Apache-2.0"
] | null | null | null | kustomize/oxshibboleth/base/statefulsets-patch.yaml | mohsameer/enterprise-edition | b806975c96522b598607f6b79873a0bf716355c7 | [
"Apache-2.0"
] | null | null | null | apiVersion: apps/v1
kind: StatefulSet
metadata:
name: oxshibboleth
spec:
serviceName: oxshibboleth
replicas: 1
selector:
matchLabels:
app: oxshibboleth
volumeClaimTemplates: []
template:
spec:
containers:
- name: oxshibboleth
imagePullPolicy: Always
image: gluufederation/oxshibboleth:4.0.0
command:
- /bin/sh
- -c
- |
/usr/bin/python /scripts/update-lb-ip.py &
/app/scripts/entrypoint.sh
volumeMounts:
# name must match the volume name below
- name: shared-shib
mountPath: "/opt/shared-shibboleth-idp"
- name: cb-pass
mountPath: "/etc/gluu/conf/couchbase_password"
subPath: couchbase_password
- name: cb-crt
mountPath: "/etc/certs/couchbase.crt"
subPath: couchbase.crt
- mountPath: /scripts
name: update-lb-ip
resources:
requests:
memory: "1500Mi"
cpu: "1000m"
limits:
memory: "2000Mi"
cpu: "1500m"
ports:
- containerPort: 8080
envFrom:
- configMapRef:
name: oxshibboleth-cm
livenessProbe:
httpGet:
path: /idp
port: 8080
initialDelaySeconds: 30
periodSeconds: 30
readinessProbe:
httpGet:
path: /idp
port: 8080
initialDelaySeconds: 25
periodSeconds: 25
hostAliases:
- ip: NGINX_IP
hostnames:
- FQDN
volumes:
- name: shared-shib
persistentVolumeClaim:
claimName: shared-shib-pvc
- name: cb-pass
secret:
secretName: cb-pass
- name: cb-crt
secret:
secretName: cb-crt
- name: update-lb-ip
configMap:
name: updatelbip | 25.473684 | 58 | 0.52376 |
f7a7d4cef966493e95632f90c1c7264845b19db8 | 597 | yaml | YAML | 03.cka/cka.labs/05.network.policy.labs/01.network-policy/4-network-policy-allow-outbound-pod-namespace.yaml | cnb0/learning-cka.ckad | da576edc5ab1014d1a652d4db99451bb49519aab | [
"MIT"
] | 1 | 2021-11-29T01:36:45.000Z | 2021-11-29T01:36:45.000Z | 03.cka/cka.labs/05.network.policy.labs/01.network-policy/4-network-policy-allow-outbound-pod-namespace.yaml | cnb0/learning-cka.ckad | da576edc5ab1014d1a652d4db99451bb49519aab | [
"MIT"
] | null | null | null | 03.cka/cka.labs/05.network.policy.labs/01.network-policy/4-network-policy-allow-outbound-pod-namespace.yaml | cnb0/learning-cka.ckad | da576edc5ab1014d1a652d4db99451bb49519aab | [
"MIT"
] | 3 | 2021-11-28T14:40:19.000Z | 2022-01-23T02:21:28.000Z | # 4-network-policy-allow-pod-namespace.yaml
kind: NetworkPolicy
apiVersion: networking.k8s.io/v1
metadata:
name: backend-policy
namespace: development
spec:
podSelector:
matchLabels:
app: webapp
role: backend
ingress:
- from:
- namespaceSelector:
matchLabels:
purpose: development
podSelector:
matchLabels:
app: webapp
role: frontend
egress:
- to:
- namespaceSelector:
matchLabels:
purpose: development
podSelector:
matchLabels:
app: webapp
role: database | 20.586207 | 43 | 0.61474 |
f7a7ee632dc7a64a1fa5e04bc78350a5a6a0beec | 64 | yaml | YAML | kubernetes/namespace.yaml | tandris/k8s-backup-mongodb | 36a4aaeb8764f14744ce30c8a17580bbae98ce1c | [
"MIT"
] | 15 | 2021-02-10T22:36:27.000Z | 2022-03-11T11:43:51.000Z | kubernetes/namespace.yaml | tandris/k8s-backup-mongodb | 36a4aaeb8764f14744ce30c8a17580bbae98ce1c | [
"MIT"
] | 3 | 2021-04-07T11:56:20.000Z | 2021-11-19T07:41:30.000Z | kubernetes/namespace.yaml | tandris/k8s-backup-mongodb | 36a4aaeb8764f14744ce30c8a17580bbae98ce1c | [
"MIT"
] | 16 | 2021-02-10T22:36:30.000Z | 2022-03-11T11:43:36.000Z | apiVersion: v1
kind: Namespace
metadata:
name: backup-mongodb
| 12.8 | 22 | 0.78125 |
f7a7f4eae769840cd3fa910868e09f0699124764 | 5,569 | yaml | YAML | basetemplates/manifests/etcd-client-tls.yaml | dbahadir/kubify | 8f8684175487427d6699043d730310552c80be0c | [
"Apache-2.0"
] | 150 | 2018-01-08T09:31:56.000Z | 2021-08-06T06:29:45.000Z | basetemplates/manifests/etcd-client-tls.yaml | dbahadir/kubify | 8f8684175487427d6699043d730310552c80be0c | [
"Apache-2.0"
] | 58 | 2018-01-09T11:19:40.000Z | 2022-02-09T08:22:35.000Z | basetemplates/manifests/etcd-client-tls.yaml | PTC-Global/kubify | 704291e103aaa5cadbe315cf008114b8601dda63 | [
"Apache-2.0"
] | 29 | 2018-01-08T09:41:41.000Z | 2022-02-16T12:34:51.000Z | apiVersion: v1
data:
etcd-client-ca.crt: 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
etcd-client.crt: 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
etcd-client.key: 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
kind: Secret
metadata:
name: etcd-client-tls
namespace: kube-system
type: Opaque
| 506.272727 | 2,259 | 0.990842 |
f7a85e42efa0727ac799f1c3a2ab893137bb7be5 | 1,105 | yml | YAML | ci/assets/verify-network.yml | cloudboss/keights | 43cdf760e45183964f5ea966fef3e32e39d7209f | [
"MIT"
] | 27 | 2018-04-13T03:14:14.000Z | 2021-06-23T03:57:51.000Z | ci/assets/verify-network.yml | cloudboss/keights | 43cdf760e45183964f5ea966fef3e32e39d7209f | [
"MIT"
] | 33 | 2019-06-07T03:30:26.000Z | 2021-11-01T01:22:13.000Z | ci/assets/verify-network.yml | cloudboss/keights | 43cdf760e45183964f5ea966fef3e32e39d7209f | [
"MIT"
] | 2 | 2019-10-18T19:44:40.000Z | 2019-12-11T01:15:42.000Z | # This job connects to the `kubernetes` service on port 443.
# A successful connection indicates that routing works, as
# well as in-cluster DNS resolution since it connects by
# hostname.
apiVersion: batch/v1
kind: Job
metadata:
name: verify-network
spec:
# Run multiple passes on each node. Combining the number
# of completions with pod anti-affinity ensures the job
# runs on every node multiple times.
completions: 24
parallelism: 6
backoffLimit: 1000
template:
spec:
containers:
- name: verify-network
image: busybox:1.30.1
command: ['nc']
args: ['-z', 'kubernetes', '443']
restartPolicy: OnFailure
tolerations:
- effect: NoSchedule
key: node-role.kubernetes.io/master
operator: Exists
affinity:
podAntiAffinity:
requiredDuringSchedulingIgnoredDuringExecution:
- labelSelector:
matchExpressions:
- key: job-name
operator: In
values:
- verify-network
topologyKey: kubernetes.io/hostname
| 28.333333 | 60 | 0.634389 |
f7a8a10eb2804e2e9aa0e13ce974a09a11dd3a49 | 629 | yaml | YAML | intermediate/201-daemonset-prod-label.yaml | shivampurwar1/kubernetes_gyan | ee9b629783e77738951abba316c3d28e0f608bea | [
"Apache-2.0"
] | null | null | null | intermediate/201-daemonset-prod-label.yaml | shivampurwar1/kubernetes_gyan | ee9b629783e77738951abba316c3d28e0f608bea | [
"Apache-2.0"
] | null | null | null | intermediate/201-daemonset-prod-label.yaml | shivampurwar1/kubernetes_gyan | ee9b629783e77738951abba316c3d28e0f608bea | [
"Apache-2.0"
] | null | null | null | apiVersion: apps/v1
kind: DaemonSet
metadata:
name: demo-daemonset-prod
namespace: default
labels:
app: demo-daemon-prod
spec:
selector:
matchLabels:
name: demo-daemon-prod
template:
metadata:
labels:
name: demo-daemon-prod
spec:
containers:
- name: demo-daemon-prod
image: busybox
args:
- /bin/sh
- -c
- date; sleep 500
resources:
limits:
memory: 200Mi
requests:
cpu: 100m
memory: 200Mi
terminationGracePeriodSeconds: 30
nodeSelector:
env: "prod" | 19.65625 | 39 | 0.550079 |
f7a8da86522662117fe685c931911ec48928aa7d | 2,213 | yaml | YAML | argo-workflow/workflow-controller-configmap-ConfigMap.yaml | 4mr0m3r0/argo-project-samples | 3c0d348159ebb252307df00edf2547c5bfa7eeac | [
"MIT"
] | 1 | 2021-01-31T23:36:41.000Z | 2021-01-31T23:36:41.000Z | argo-workflow/workflow-controller-configmap-ConfigMap.yaml | 4mr0m3r0/argo-workflow-samples | 3c0d348159ebb252307df00edf2547c5bfa7eeac | [
"MIT"
] | null | null | null | argo-workflow/workflow-controller-configmap-ConfigMap.yaml | 4mr0m3r0/argo-workflow-samples | 3c0d348159ebb252307df00edf2547c5bfa7eeac | [
"MIT"
] | null | null | null | ---
apiVersion: v1
data:
artifactRepository: |
archiveLogs: true
s3:
bucket: my-bucket
endpoint: minio:9000
insecure: true
accessKeySecret:
name: my-minio-cred
key: accesskey
secretKeySecret:
name: my-minio-cred
key: secretkey
containerRuntimeExecutor: docker
containerRuntimeExecutors: |
- name: k8sapi
selector:
matchLabels:
workflows.argoproj.io/container-runtime-executor: k8sapi
executor: |
resources:
requests:
cpu: 10m
memory: 64Mi
links: |
- name: Workflow Link
scope: workflow
url: http://logging-facility?namespace=${metadata.namespace}&workflowName=${metadata.name}&startedAt=${status.startedAt}&finishedAt=${status.finishedAt}
- name: Pod Link
scope: pod
url: http://logging-facility?namespace=${metadata.namespace}&podName=${metadata.name}&startedAt=${status.startedAt}&finishedAt=${status.finishedAt}
- name: Pod Logs Link
scope: pod-logs
url: http://logging-facility?namespace=${metadata.namespace}&podName=${metadata.name}&startedAt=${status.startedAt}&finishedAt=${status.finishedAt}
- name: Event Source Logs Link
scope: event-source-logs
url: http://logging-facility?namespace=${metadata.namespace}&podName=${metadata.name}&startedAt=${status.startedAt}&finishedAt=${status.finishedAt}
- name: Sensor Logs Link
scope: sensor-logs
url: http://logging-facility?namespace=${metadata.namespace}&podName=${metadata.name}&startedAt=${status.startedAt}&finishedAt=${status.finishedAt}
metricsConfig: |
disableLegacy: true
enabled: true
path: /metrics
port: 9090
persistence: |
connectionPool:
maxIdleConns: 100
maxOpenConns: 0
connMaxLifetime: 0s
nodeStatusOffLoad: true
archive: true
archiveTTL: 7d
postgresql:
host: postgres
port: 5432
database: postgres
tableName: argo_workflows
userNameSecret:
name: argo-postgres-config
key: username
passwordSecret:
name: argo-postgres-config
key: password
kind: ConfigMap
metadata:
name: workflow-controller-configmap
| 31.614286 | 158 | 0.671939 |
f7a8dfeb930d4b244177b914374d063ff332d1c8 | 224 | yml | YAML | postgres-pod.yml | tmatin100/Kubernetes-Example-Voting-App | adfd1682940f6a8f977b09ff4bfcd15c88050e76 | [
"MIT"
] | null | null | null | postgres-pod.yml | tmatin100/Kubernetes-Example-Voting-App | adfd1682940f6a8f977b09ff4bfcd15c88050e76 | [
"MIT"
] | null | null | null | postgres-pod.yml | tmatin100/Kubernetes-Example-Voting-App | adfd1682940f6a8f977b09ff4bfcd15c88050e76 | [
"MIT"
] | null | null | null | apiVersion: v1
kind: Pod
metadata:
name: postgress-pod
labels:
name: postress-pod
app: demo-voting-app
spec:
containers:
- name: postgres
image: postgres:9.4
ports:
- containerPort: 5492
| 16 | 26 | 0.638393 |
f7a8edc249d30ae25fa7b262b570e4ae264b5d35 | 1,882 | yaml | YAML | k8s/cloud/base/artifact_tracker_deployment.yaml | laozhudetui/pixie | eb6a73480c9f30a7c33cf2d77512740a5bc5caef | [
"Apache-2.0"
] | null | null | null | k8s/cloud/base/artifact_tracker_deployment.yaml | laozhudetui/pixie | eb6a73480c9f30a7c33cf2d77512740a5bc5caef | [
"Apache-2.0"
] | null | null | null | k8s/cloud/base/artifact_tracker_deployment.yaml | laozhudetui/pixie | eb6a73480c9f30a7c33cf2d77512740a5bc5caef | [
"Apache-2.0"
] | null | null | null | ---
apiVersion: apps/v1
kind: Deployment
metadata:
name: artifact-tracker-server
labels:
db: pgsql
spec:
selector:
matchLabels:
name: artifact-tracker-server
template:
metadata:
labels:
name: artifact-tracker-server
spec:
containers:
- name: artifact-tracker-server
image: gcr.io/pl-dev-infra/cloud/artifact_tracker_server_image
ports:
- containerPort: 50750
readinessProbe:
httpGet:
scheme: HTTPS
path: /healthz
port: 50750
livenessProbe:
httpGet:
scheme: HTTPS
path: /healthz
port: 50750
envFrom:
- configMapRef:
name: pl-db-config
- configMapRef:
name: pl-tls-config
- configMapRef:
name: pl-artifact-config
- configMapRef:
name: pl-domain-config
env:
- name: PL_JWT_SIGNING_KEY
valueFrom:
secretKeyRef:
name: cloud-auth-secrets
key: jwt-signing-key
- name: PL_POSTGRES_USERNAME
valueFrom:
secretKeyRef:
name: pl-db-secrets
key: PL_POSTGRES_USERNAME
- name: PL_POSTGRES_PASSWORD
valueFrom:
secretKeyRef:
name: pl-db-secrets
key: PL_POSTGRES_PASSWORD
- name: PL_VIZIER_VERSION
value: ""
- name: PL_CLI_VERSION
value: ""
volumeMounts:
- name: certs
mountPath: /certs
- name: artifact-access-sa
mountPath: /creds
readOnly: true
volumes:
- name: certs
secret:
secretName: service-tls-certs
- name: artifact-access-sa
secret:
secretName: artifact-access-sa
optional: true
| 25.093333 | 70 | 0.531881 |
f7a9010da2192e28017c955c1d5f8a1a13a3121a | 782 | yaml | YAML | manifests/prometheus-networkPolicy.yaml | yushanjin/kube-prometheus | 0c0643f984fd102075323d5388ed852a12fb453c | [
"Apache-2.0"
] | null | null | null | manifests/prometheus-networkPolicy.yaml | yushanjin/kube-prometheus | 0c0643f984fd102075323d5388ed852a12fb453c | [
"Apache-2.0"
] | null | null | null | manifests/prometheus-networkPolicy.yaml | yushanjin/kube-prometheus | 0c0643f984fd102075323d5388ed852a12fb453c | [
"Apache-2.0"
] | null | null | null | apiVersion: networking.k8s.io/v1
kind: NetworkPolicy
metadata:
labels:
app.kubernetes.io/component: prometheus
app.kubernetes.io/instance: k8s
app.kubernetes.io/name: prometheus
app.kubernetes.io/part-of: kube-prometheus
app.kubernetes.io/version: 2.34.0
name: prometheus-k8s
namespace: monitoring
spec:
egress:
- {}
ingress:
- from:
- podSelector:
matchLabels:
app.kubernetes.io/name: prometheus
ports:
- port: 9090
protocol: TCP
- port: 8080
protocol: TCP
podSelector:
matchLabels:
app.kubernetes.io/component: prometheus
app.kubernetes.io/instance: k8s
app.kubernetes.io/name: prometheus
app.kubernetes.io/part-of: kube-prometheus
policyTypes:
- Egress
- Ingress
| 23 | 48 | 0.676471 |
f7a914958245b46797841de40c9f61320a35917f | 359 | yaml | YAML | config/rbac/myapp_editor_role.yaml | anshubo-yun/opdemo | d18a5fb96c630b3338cf2bfd93bdb491acf7e5f3 | [
"Apache-2.0"
] | null | null | null | config/rbac/myapp_editor_role.yaml | anshubo-yun/opdemo | d18a5fb96c630b3338cf2bfd93bdb491acf7e5f3 | [
"Apache-2.0"
] | null | null | null | config/rbac/myapp_editor_role.yaml | anshubo-yun/opdemo | d18a5fb96c630b3338cf2bfd93bdb491acf7e5f3 | [
"Apache-2.0"
] | null | null | null | # permissions for end users to edit myapps.
apiVersion: rbac.authorization.k8s.io/v1
kind: ClusterRole
metadata:
name: myapp-editor-role
rules:
- apiGroups:
- app.qingcloud
resources:
- myapps
verbs:
- create
- delete
- get
- list
- patch
- update
- watch
- apiGroups:
- app.qingcloud
resources:
- myapps/status
verbs:
- get
| 14.36 | 43 | 0.671309 |
f7a91e790b23ed93f0e550604cb7179512283014 | 1,126 | yaml | YAML | manifests/base/eventsource-controller/eventsource-controller-deployment.yaml | tpiperatgod/argo-events | ce67b3858b91c48914d1a3ccc900d539cc31a66f | [
"Apache-2.0"
] | 1 | 2022-03-24T17:04:57.000Z | 2022-03-24T17:04:57.000Z | manifests/base/eventsource-controller/eventsource-controller-deployment.yaml | tpiperatgod/argo-events | ce67b3858b91c48914d1a3ccc900d539cc31a66f | [
"Apache-2.0"
] | 43 | 2022-02-04T12:49:23.000Z | 2022-03-31T12:31:15.000Z | manifests/base/eventsource-controller/eventsource-controller-deployment.yaml | tpiperatgod/argo-events | ce67b3858b91c48914d1a3ccc900d539cc31a66f | [
"Apache-2.0"
] | null | null | null | apiVersion: apps/v1
kind: Deployment
metadata:
name: eventsource-controller
spec:
replicas: 1
selector:
matchLabels:
app: eventsource-controller
template:
metadata:
labels:
app: eventsource-controller
spec:
serviceAccountName: argo-events-sa
securityContext:
runAsNonRoot: true
runAsUser: 9731
containers:
- name: eventsource-controller
image: quay.io/argoproj/argo-events:latest
imagePullPolicy: Always
args:
- eventsource-controller
env:
- name: NAMESPACE
valueFrom:
fieldRef:
fieldPath: metadata.namespace
- name: EVENTSOURCE_IMAGE
value: quay.io/argoproj/argo-events:latest
livenessProbe:
httpGet:
path: /healthz
port: 8081
initialDelaySeconds: 3
periodSeconds: 3
readinessProbe:
httpGet:
path: /readyz
port: 8081
initialDelaySeconds: 3
periodSeconds: 3
| 25.590909 | 56 | 0.550622 |
f7a92be31ca8caa122043185daff26b5b5f20379 | 691 | yaml | YAML | docker/sample-application/sample-app-deployment.yaml | mpeters/edge-security-demo | 696a4705e1f240b073846f104dbce6a1966699f9 | [
"Apache-2.0"
] | 2 | 2020-06-09T15:18:28.000Z | 2021-01-27T16:12:33.000Z | docker/sample-application/sample-app-deployment.yaml | mpeters/edge-security-demo | 696a4705e1f240b073846f104dbce6a1966699f9 | [
"Apache-2.0"
] | 17 | 2020-06-11T11:37:33.000Z | 2020-08-18T19:41:36.000Z | docker/sample-application/sample-app-deployment.yaml | mpeters/edge-security-demo | 696a4705e1f240b073846f104dbce6a1966699f9 | [
"Apache-2.0"
] | 7 | 2020-06-09T15:18:32.000Z | 2020-07-31T16:48:31.000Z | apiVersion: apps/v1
kind: Deployment
metadata:
labels:
app.kubernetes.io/name: sample-app
name: sample-app
spec:
replicas: 1
selector:
matchLabels:
app.kubernetes.io/name: sample-app
template:
metadata:
labels:
app.kubernetes.io/name: sample-app
spec:
containers:
- image: quay.io/mpeters/sample-app:latest
imagePullPolicy: Always
name: sample-app
ports:
- containerPort: 8080
env:
- name: NODE_IP
valueFrom:
fieldRef:
fieldPath: status.hostIP
- name: POD_IP
valueFrom:
fieldRef:
fieldPath: status.podIP
| 20.939394 | 48 | 0.57453 |
f7aab564f083a1736bf9a276afc891960801958a | 833 | yaml | YAML | adaptors/modbus/deploy/manifests/workload/daemonset.yaml | parchk/octopus | 5ec1dc6cdef8d4e68517e2f317ec8032e3327124 | [
"Apache-2.0"
] | 1 | 2021-07-27T07:03:30.000Z | 2021-07-27T07:03:30.000Z | adaptors/modbus/deploy/manifests/workload/daemonset.yaml | parchk/octopus | 5ec1dc6cdef8d4e68517e2f317ec8032e3327124 | [
"Apache-2.0"
] | null | null | null | adaptors/modbus/deploy/manifests/workload/daemonset.yaml | parchk/octopus | 5ec1dc6cdef8d4e68517e2f317ec8032e3327124 | [
"Apache-2.0"
] | null | null | null |
---
apiVersion: apps/v1
kind: DaemonSet
metadata:
labels:
app.kubernetes.io/component: "adaptor"
name: adaptor
namespace: system
spec:
selector:
matchLabels:
app.kubernetes.io/component: "adaptor"
template:
metadata:
labels:
app.kubernetes.io/component: "adaptor"
spec:
containers:
- name: octopus
image: cnrancher/octopus-adaptor-modbus:master
volumeMounts:
- mountPath: /var/lib/octopus/adaptors/
name: sockets
- mountPath: /dev
name: dev
securityContext:
privileged: true
volumes:
- name: sockets
hostPath:
path: /var/lib/octopus/adaptors/
type: DirectoryOrCreate
- name: dev
hostPath:
path: /dev
| 22.513514 | 56 | 0.560624 |
f7ab1bcd833413859fc9a3b6e95032d9fab2093d | 137 | yaml | YAML | assets/controller_sa.yaml | Elbehery/vmware-vsphere-csi-driver-operator | ea33ced05feb053169147338b1133fcf4b722872 | [
"Apache-2.0"
] | 4 | 2021-04-20T10:40:34.000Z | 2021-12-24T01:11:00.000Z | assets/controller_sa.yaml | Elbehery/vmware-vsphere-csi-driver-operator | ea33ced05feb053169147338b1133fcf4b722872 | [
"Apache-2.0"
] | 79 | 2021-03-16T10:44:31.000Z | 2022-03-28T13:44:35.000Z | assets/controller_sa.yaml | Elbehery/vmware-vsphere-csi-driver-operator | ea33ced05feb053169147338b1133fcf4b722872 | [
"Apache-2.0"
] | 16 | 2021-03-11T10:04:58.000Z | 2022-03-09T12:56:42.000Z | apiVersion: v1
kind: ServiceAccount
metadata:
name: vmware-vsphere-csi-driver-controller-sa
namespace: openshift-cluster-csi-drivers
| 22.833333 | 47 | 0.810219 |
f7ab36ab02eb54e60454a11044ca36fc5bbf3e51 | 1,469 | yaml | YAML | .dockworker/deployment/k8s/dev/cron.yaml | unb-libraries/composites.lib.unb.ca | 1ce0ca585296e765d58e586172f68d97c4a42708 | [
"MIT"
] | 1 | 2021-03-05T02:06:12.000Z | 2021-03-05T02:06:12.000Z | .dockworker/deployment/k8s/dev/cron.yaml | unb-libraries/composites.lib.unb.ca | 1ce0ca585296e765d58e586172f68d97c4a42708 | [
"MIT"
] | null | null | null | .dockworker/deployment/k8s/dev/cron.yaml | unb-libraries/composites.lib.unb.ca | 1ce0ca585296e765d58e586172f68d97c4a42708 | [
"MIT"
] | null | null | null | apiVersion: batch/v1beta1
kind: CronJob
metadata:
name: cron-composites-lib-unb-ca
namespace: dev
labels:
app: drupal
tier: cron
spec:
schedule: "00,15,30,45 * * * *"
startingDeadlineSeconds: 480
concurrencyPolicy: Forbid
jobTemplate:
metadata:
name: cron-composites-lib-unb-ca
labels:
app: drupal
tier: cron
spec:
template:
spec:
nodeSelector:
deployenv: dev
containers:
-
name: cron-composites-lib-unb-ca
command:
- /scripts/drupalCronEntry.sh
env:
-
name: DEPLOY_ENV
value: dev
-
name: MYSQL_HOSTNAME
value: drupal-mysql-lib-unb-ca
-
name: MYSQL_PORT
value: "3306"
image: "||DEPLOYMENTIMAGE||"
imagePullPolicy: Always
volumeMounts:
-
mountPath: /app/html/sites/default
name: drupal-persistent-storage
priorityClassName: cron-priority-services
imagePullSecrets:
-
name: github-container-registry-auth
restartPolicy: Never
volumes:
-
name: drupal-persistent-storage
persistentVolumeClaim:
claimName: composites-lib-unb-ca
| 26.709091 | 52 | 0.495575 |
f7ab3f09e67aadc91170604838483d77fc801e16 | 66 | yaml | YAML | cluster/core/namespaces/file-service.yaml | locoz666/k3s-cluster | 9b8506878b1d708fa07a5d69e5182c3147b0378c | [
"MIT"
] | null | null | null | cluster/core/namespaces/file-service.yaml | locoz666/k3s-cluster | 9b8506878b1d708fa07a5d69e5182c3147b0378c | [
"MIT"
] | 1 | 2021-07-18T07:24:03.000Z | 2021-07-18T07:24:03.000Z | cluster/core/namespaces/file-service.yaml | locoz666/k3s-cluster | 9b8506878b1d708fa07a5d69e5182c3147b0378c | [
"MIT"
] | null | null | null | ---
apiVersion: v1
kind: Namespace
metadata:
name: file-service
| 11 | 20 | 0.727273 |
f7abc0e36210ab57756006a0f094fef440d83309 | 185 | yaml | YAML | k8s-specifications/voting-app-service.yaml | devendradhoot/example-voting-app | 7366b4f43c426308f47355026ecaebd32a0df8cc | [
"Apache-2.0"
] | null | null | null | k8s-specifications/voting-app-service.yaml | devendradhoot/example-voting-app | 7366b4f43c426308f47355026ecaebd32a0df8cc | [
"Apache-2.0"
] | null | null | null | k8s-specifications/voting-app-service.yaml | devendradhoot/example-voting-app | 7366b4f43c426308f47355026ecaebd32a0df8cc | [
"Apache-2.0"
] | 2 | 2021-02-03T15:47:39.000Z | 2022-02-14T08:04:01.000Z | apiVersion: v1
kind: Service
metadata:
name: voting-service
labels:
app: demo-voting-app
spec:
ports:
- port: 80
targetPort: 80
selector:
app: demo-voting-app
| 14.230769 | 24 | 0.654054 |
f7abe4bdf65b0dc4b8dd46f784c3adf143932fb3 | 137 | yaml | YAML | namespaces/live-1.cloud-platform.service.justice.gov.uk/prison-to-nhs-update-prod/03-resourcequota.yaml | digitalronin/cloud-platform-environments | b617fa089ee2a7dafc53602808326ae7d56fd6d9 | [
"MIT"
] | 28 | 2018-07-13T15:02:24.000Z | 2022-03-17T09:23:54.000Z | namespaces/live-1.cloud-platform.service.justice.gov.uk/prison-to-nhs-update-prod/03-resourcequota.yaml | happygeneralist/recall-decisions-alpha | 09124f3994a878e9969e7b4326088b2ae7bfd170 | [
"MIT"
] | 963 | 2018-05-30T15:46:06.000Z | 2022-03-30T10:06:39.000Z | namespaces/live-1.cloud-platform.service.justice.gov.uk/prison-to-nhs-update-prod/03-resourcequota.yaml | happygeneralist/recall-decisions-alpha | 09124f3994a878e9969e7b4326088b2ae7bfd170 | [
"MIT"
] | 29 | 2018-12-04T09:37:36.000Z | 2022-02-25T10:35:34.000Z | apiVersion: v1
kind: ResourceQuota
metadata:
name: namespace-quota
namespace: prison-to-nhs-update-prod
spec:
hard:
pods: "50"
| 15.222222 | 38 | 0.722628 |
f7ac393db441cdc6201f5f91aaeadb5b79914d2b | 6,325 | yml | YAML | scripts/k8s/apply/baetyl-cloud-configmap.yml | chensheng0/baetyl-cloud | 2b4c077aab3505739b9573bb8becfa34ec2d64f3 | [
"Apache-2.0"
] | 75 | 2020-06-12T07:58:49.000Z | 2022-03-22T23:47:27.000Z | scripts/k8s/apply/baetyl-cloud-configmap.yml | chensheng0/baetyl-cloud | 2b4c077aab3505739b9573bb8becfa34ec2d64f3 | [
"Apache-2.0"
] | 201 | 2020-07-17T10:05:32.000Z | 2022-03-31T06:16:19.000Z | scripts/k8s/apply/baetyl-cloud-configmap.yml | chensheng0/baetyl-cloud | 2b4c077aab3505739b9573bb8becfa34ec2d64f3 | [
"Apache-2.0"
] | 49 | 2020-06-24T04:48:06.000Z | 2022-03-17T22:14:33.000Z | apiVersion: v1
kind: ConfigMap
metadata:
name: baetyl-cloud-config
namespace: default
data:
client_ca.crt: |-
-----BEGIN CERTIFICATE-----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-----END CERTIFICATE-----
client_ca.key: |-
-----BEGIN EC PRIVATE KEY-----
MHcCAQEEII0qZCQMJ3QD6FmhD5PExE5qndQNh1tV5fQy7JGpHbCHoAoGCCqGSM49
AwEHoUQDQgAE65gcljTzcB5dYBHjmVtFHMgJ0nOjKXTM4UgrpZbte4lYP8eFjEJ5
1g9q6aDBUjtFGw1v7rVWlL3loUwIwNbjKg==
-----END EC PRIVATE KEY-----
server.crt: |-
-----BEGIN CERTIFICATE-----
MIICsDCCAlegAwIBAgIDAYahMAoGCCqGSM49BAMCMIGsMQswCQYDVQQGEwJDTjEQ
MA4GA1UECBMHQmVpamluZzEZMBcGA1UEBxMQSGFpZGlhbiBEaXN0cmljdDEVMBMG
A1UECRMMQmFpZHUgQ2FtcHVzMQ8wDQYDVQQREwYxMDAwOTMxHjAcBgNVBAoTFUxp
bnV4IEZvdW5kYXRpb24gRWRnZTEPMA0GA1UECxMGQkFFVFlMMRcwFQYDVQQDEw5j
bGllbnQucm9vdC5jYTAgFw0yMDAzMjcwOTU1MzVaGA8yMDUwMDMyNzA5NTUzNVow
gaoxCzAJBgNVBAYTAkNOMRAwDgYDVQQIEwdCZWlqaW5nMRkwFwYDVQQHExBIYWlk
aWFuIERpc3RyaWN0MRUwEwYDVQQJEwxCYWlkdSBDYW1wdXMxDzANBgNVBBETBjEw
MDA5MzEeMBwGA1UEChMVTGludXggRm91bmRhdGlvbiBFZGdlMQ8wDQYDVQQLEwZC
QUVUWUwxFTATBgNVBAMTDGNsb3VkLnNlcnZlcjBZMBMGByqGSM49AgEGCCqGSM49
AwEHA0IABKx0tiiKiXS1VcTTK+caqmvYeRVSvyJr3gpZ+oUhCUAmMOTR1Fm2uIfm
P/fErAklhcZY1H8+J87EM5sG11qWcnqjZjBkMA4GA1UdDwEB/wQEAwIFoDATBgNV
HSUEDDAKBggrBgEFBQcDATAMBgNVHRMBAf8EAjAAMC8GA1UdEQQoMCaCJGd6aHh5
LXkzMi1zYW5kYm94MDMxLmd6aHh5LmJhaWR1LmNvbTAKBggqhkjOPQQDAgNHADBE
AiAm5dm4oKY5WFN2eD4xBJIWG/I4IRBH7yVxH3U5SkxaGAIgJIr3gyQEZxySIwPQ
fm56/vWqdMIBTOmtv8q+ixF3Ves=
-----END CERTIFICATE-----
server.key: |-
-----BEGIN EC PRIVATE KEY-----
MHcCAQEEIG/B4w19XHDyb78DLNKPD+sacQvIIjvoIihW6voRjNGQoAoGCCqGSM49
AwEHoUQDQgAErHS2KIqJdLVVxNMr5xqqa9h5FVK/ImveCln6hSEJQCYw5NHUWba4
h+Y/98SsCSWFxljUfz4nzsQzmwbXWpZyeg==
-----END EC PRIVATE KEY-----
server_ca.crt: |-
-----BEGIN CERTIFICATE-----
MIICcDCCAhagAwIBAgIDAYagMAoGCCqGSM49BAMCMIGsMQswCQYDVQQGEwJDTjEQ
MA4GA1UECBMHQmVpamluZzEZMBcGA1UEBxMQSGFpZGlhbiBEaXN0cmljdDEVMBMG
A1UECRMMQmFpZHUgQ2FtcHVzMQ8wDQYDVQQREwYxMDAwOTMxHjAcBgNVBAoTFUxp
bnV4IEZvdW5kYXRpb24gRWRnZTEPMA0GA1UECxMGQkFFVFlMMRcwFQYDVQQDEw5j
bGllbnQucm9vdC5jYTAgFw0yMDAzMjcwOTU1MzVaGA8yMDUwMDMyNzA5NTUzNVow
gawxCzAJBgNVBAYTAkNOMRAwDgYDVQQIEwdCZWlqaW5nMRkwFwYDVQQHExBIYWlk
aWFuIERpc3RyaWN0MRUwEwYDVQQJEwxCYWlkdSBDYW1wdXMxDzANBgNVBBETBjEw
MDA5MzEeMBwGA1UEChMVTGludXggRm91bmRhdGlvbiBFZGdlMQ8wDQYDVQQLEwZC
QUVUWUwxFzAVBgNVBAMTDmNsaWVudC5yb290LmNhMFkwEwYHKoZIzj0CAQYIKoZI
zj0DAQcDQgAE6FKiZEEPgkBbQwqd8vHX7+NPEa3j33WbTz0/xMcoAZTbg9yMZR/9
BfNjArw3rUHc4K9aMNnlFYXu1RCgdLiIxqMjMCEwDgYDVR0PAQH/BAQDAgGGMA8G
A1UdEwEB/wQFMAMBAf8wCgYIKoZIzj0EAwIDSAAwRQIhAKV27nEL++GfZoA8WGBw
q2MjYpZ2G6tvqQIa9oBI7z/dAiA3z47euYsWN2/rPjRoHTDAa9aZ6bBOXr8t0fKX
sgQJMw==
-----END CERTIFICATE-----
conf.yml: |-
adminServer:
port: ":9004"
initServer:
port: ":9003"
ca: "/etc/baetyl/server_ca.crt"
cert: "/etc/baetyl/server.crt"
key: "/etc/baetyl/server.key"
httplink:
port: ":9005"
ca: "/etc/baetyl/client_ca.crt"
cert: "/etc/baetyl/server.crt"
key: "/etc/baetyl/server.key"
database:
type: "mysql"
url: "root:secretpassword@(host.docker.internal:3306)/baetyl_cloud?charset=utf8&parseTime=true"
defaultpki:
rootCAFile: "/etc/baetyl/client_ca.crt"
rootCAKeyFile: "/etc/baetyl/client_ca.key"
rootCertId: "98ec3bc552f0478298aa1c6702a95427"
persistent: "database"
defaultauth:
namespace: "default"
keyFile: "/etc/baetyl/token.key"
logger:
level: debug
encoding: console
template:
path: "/etc/templates"
token.key: |-
-----BEGIN RSA PRIVATE KEY-----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-----END RSA PRIVATE KEY-----
| 46.851852 | 101 | 0.832253 |
f7ac9c9ef4548356f7cf9ff17463e294dfa4087b | 7,927 | yaml | YAML | kubernetes/config/west/graphql-server-deployment.yaml | Hongbo-Miao/hongbomiao.com | d1ae08e84cca3dec389b04db95737389078133f2 | [
"MIT"
] | 104 | 2019-08-09T21:27:48.000Z | 2022-03-29T11:58:36.000Z | kubernetes/config/west/graphql-server-deployment.yaml | Hongbo-Miao/hongbomiao.com | d1ae08e84cca3dec389b04db95737389078133f2 | [
"MIT"
] | 4,187 | 2019-08-04T08:19:36.000Z | 2022-03-31T22:43:20.000Z | kubernetes/config/west/graphql-server-deployment.yaml | Hongbo-Miao/hongbomiao.com | d1ae08e84cca3dec389b04db95737389078133f2 | [
"MIT"
] | 19 | 2019-08-06T00:53:05.000Z | 2022-01-04T05:55:48.000Z | apiVersion: apps/v1
kind: Deployment
metadata:
name: graphql-server-deployment
namespace: hm
spec:
replicas: 1
selector:
matchLabels:
component: graphql-server
template:
metadata:
labels:
component: graphql-server
spec:
containers:
- name: graphql-server
image: hongbomiao/hm-graphql-server:latest
env:
- name: APP_ENV
valueFrom:
configMapKeyRef:
name: graphql-server-configmap
key: app_env
- name: PORT
valueFrom:
configMapKeyRef:
name: graphql-server-configmap
key: port
- name: GRPC_SERVER_HOST
valueFrom:
configMapKeyRef:
name: graphql-server-configmap
key: grpc_server_host
- name: GRPC_SERVER_PORT
valueFrom:
configMapKeyRef:
name: graphql-server-configmap
key: grpc_server_port
- name: OPA_HOST
valueFrom:
configMapKeyRef:
name: graphql-server-configmap
key: opa_host
- name: OPA_PORT
valueFrom:
configMapKeyRef:
name: graphql-server-configmap
key: opa_port
- name: DGRAPH_HOST
valueFrom:
configMapKeyRef:
name: graphql-server-configmap
key: dgraph_host
- name: DGRAPH_GRPC_PORT
valueFrom:
configMapKeyRef:
name: graphql-server-configmap
key: dgraph_grpc_port
- name: REDIS_HOST
valueFrom:
configMapKeyRef:
name: graphql-server-configmap
key: redis_host
- name: REDIS_PORT
valueFrom:
configMapKeyRef:
name: graphql-server-configmap
key: redis_port
- name: REDIS_DB
valueFrom:
configMapKeyRef:
name: graphql-server-configmap
key: redis_db
- name: MINIO_ENDPOINT
valueFrom:
configMapKeyRef:
name: graphql-server-configmap
key: minio_endpoint
- name: MINIO_ACCESS_KEY_ID
valueFrom:
configMapKeyRef:
name: graphql-server-configmap
key: minio_access_key_id
- name: MINIO_SECRET_ACCESS_KEY
valueFrom:
configMapKeyRef:
name: graphql-server-configmap
key: minio_secret_access_key
- name: TORCH_SERVE_GRPC_HOST
valueFrom:
configMapKeyRef:
name: graphql-server-configmap
key: torch_serve_grpc_host
- name: TORCH_SERVE_GRPC_PORT
valueFrom:
configMapKeyRef:
name: graphql-server-configmap
key: torch_serve_grpc_port
- name: OPEN_CENSUS_AGENT_HOST
valueFrom:
configMapKeyRef:
name: graphql-server-configmap
key: open_census_agent_host
- name: OPEN_CENSUS_AGENT_PORT
valueFrom:
configMapKeyRef:
name: graphql-server-configmap
key: open_census_agent_port
- name: JAEGER_URL
valueFrom:
configMapKeyRef:
name: graphql-server-configmap
key: jaeger_url
- name: JWT_SECRET
valueFrom:
configMapKeyRef:
name: graphql-server-configmap
key: jwt_secret
# ---- ELASTIC APM BEGIN ----
- name: ELASTIC_APM_SERVICE_NAME
valueFrom:
configMapKeyRef:
name: graphql-server-configmap
key: elastic_apm_service_name
- name: ELASTIC_APM_SERVER_URL
valueFrom:
configMapKeyRef:
name: elastic-apm-configmap
key: elastic_apm_server_url
- name: ELASTIC_APM_ENVIRONMENT
valueFrom:
configMapKeyRef:
name: elastic-apm-configmap
key: elastic_apm_environment
- name: ELASTIC_APM_SECRET_TOKEN
valueFrom:
secretKeyRef:
name: hm-elastic-apm
key: token
- name: ELASTIC_APM_VERIFY_SERVER_CERT
valueFrom:
configMapKeyRef:
name: elastic-apm-configmap
key: elastic_apm_verify_server_cert
- name: ELASTIC_APM_SERVER_CERT
valueFrom:
configMapKeyRef:
name: elastic-apm-configmap
key: elastic_apm_server_cert
- name: ELASTIC_APM_LOG_LEVEL
valueFrom:
configMapKeyRef:
name: elastic-apm-configmap
key: elastic_apm_log_level
- name: ELASTIC_APM_LOG_FILE
valueFrom:
configMapKeyRef:
name: elastic-apm-configmap
key: elastic_apm_log_file
# ---- ELASTIC APM END ----
ports:
- name: graphql-server
protocol: TCP
containerPort: 31800
# ---- ELASTIC APM BEGIN ----
volumeMounts:
- mountPath: /data/elastic-apm
name: elastic-apm-volume
# ---- ELASTIC APM END ----
- name: opal-client
image: hongbomiao/hm-opal-client:latest
env:
- name: OPAL_CLIENT_TOKEN
valueFrom:
secretKeyRef:
name: hm-opal-client-secret
key: opal_client_token
- name: OPAL_SERVER_URL
valueFrom:
configMapKeyRef:
name: graphql-server-configmap
key: opal_server_url
- name: OPAL_FETCH_PROVIDER_MODULES
valueFrom:
configMapKeyRef:
name: graphql-server-configmap
key: opal_fetch_provider_modules
- name: OPAL_INLINE_OPA_CONFIG
valueFrom:
configMapKeyRef:
name: graphql-server-configmap
key: opal_inline_opa_config
- name: OPAL_INLINE_OPA_LOG_FORMAT
valueFrom:
configMapKeyRef:
name: graphql-server-configmap
key: opal_inline_opa_log_format
- name: OPAL_LOG_MODULE_EXCLUDE_LIST
valueFrom:
configMapKeyRef:
name: graphql-server-configmap
key: opal_log_module_exclude_list
- name: OPAL_LOG_COLORIZE
valueFrom:
configMapKeyRef:
name: graphql-server-configmap
key: opal_log_colorize
ports:
- name: opal-client
protocol: TCP
containerPort: 7000
- name: opa
protocol: TCP
containerPort: 8181
volumeMounts:
- mountPath: /data/opa
name: opa-volume
volumes:
# ---- ELASTIC APM BEGIN ----
- name: elastic-apm-volume
persistentVolumeClaim:
claimName: elastic-apm-pvc
# ---- ELASTIC APM END ----
- name: opa-volume
persistentVolumeClaim:
claimName: opa-pvc
| 33.876068 | 53 | 0.491232 |
f7acb84aa7bc1e7f131068fc4acfc0e1a456cdc7 | 68 | yaml | YAML | extras/external-etcd/kubernetes-yaml/etcd-serviceaccount.yaml | vnandha/trident | e51c74a358db4b000165d682eaff383cdb8f8fef | [
"Apache-2.0"
] | 3 | 2020-11-11T15:39:00.000Z | 2021-01-19T14:07:12.000Z | extras/external-etcd/kubernetes-yaml/etcd-serviceaccount.yaml | vnandha/trident | e51c74a358db4b000165d682eaff383cdb8f8fef | [
"Apache-2.0"
] | 25 | 2020-11-05T09:23:36.000Z | 2021-01-26T20:45:02.000Z | extras/external-etcd/kubernetes-yaml/etcd-serviceaccount.yaml | vnandha/trident | e51c74a358db4b000165d682eaff383cdb8f8fef | [
"Apache-2.0"
] | 6 | 2020-11-03T22:01:34.000Z | 2021-01-11T20:47:23.000Z | apiVersion: v1
kind: ServiceAccount
metadata:
name: etcd-operator
| 13.6 | 21 | 0.794118 |
f7ad5f6322d686f9e93558c8e0f4ba5032c15c32 | 361 | yaml | YAML | k8s-training-google/k8s/manifests/catalogue-db-pod.yaml | jujhars13/kubernetes-teaching | 2ecaaf1308c5590c02da41e6ed12a9247a0a62c8 | [
"MIT"
] | 3 | 2018-09-13T03:58:52.000Z | 2020-02-14T19:39:40.000Z | k8s-training-google/k8s/manifests/catalogue-db-pod.yaml | jujhars13/kubernetes-teaching | 2ecaaf1308c5590c02da41e6ed12a9247a0a62c8 | [
"MIT"
] | null | null | null | k8s-training-google/k8s/manifests/catalogue-db-pod.yaml | jujhars13/kubernetes-teaching | 2ecaaf1308c5590c02da41e6ed12a9247a0a62c8 | [
"MIT"
] | null | null | null | ---
apiVersion: v1
kind: Pod
metadata:
name: catalogue-db
labels:
name: catalogue-db
spec:
containers:
- name: catalogue-db
image: weaveworksdemos/catalogue-db:0.2.0
env:
- name: MYSQL_ROOT_PASSWORD
value: fake_password
- name: MYSQL_DATABASE
value: socksdb
ports:
- name: mysql
containerPort: 3306
| 18.05 | 45 | 0.639889 |
f7ada25959998a076b7ed15344dcb4a1cf5d10e6 | 186 | yaml | YAML | k8s/api-service.yaml | craftbyte/msi-k8s | 9b26c252a10035e7461002507f04a6570ed641d6 | [
"Unlicense"
] | null | null | null | k8s/api-service.yaml | craftbyte/msi-k8s | 9b26c252a10035e7461002507f04a6570ed641d6 | [
"Unlicense"
] | null | null | null | k8s/api-service.yaml | craftbyte/msi-k8s | 9b26c252a10035e7461002507f04a6570ed641d6 | [
"Unlicense"
] | null | null | null | apiVersion: v1
kind: Service
metadata:
labels:
app: api
name: api
spec:
ports:
- port: 8080
targetPort: 8080
protocol: TCP
selector:
app: api
type: ClusterIP
| 12.4 | 20 | 0.639785 |
f7adde679ab32c3fd3f2557e3d90047f59c2a2fa | 440 | yaml | YAML | k8s/quotesweb-deployment.yaml | DonSchenck/quotesweb | 669859e4eb383162deefe2afe7f1b6c2be4961e4 | [
"Apache-2.0"
] | null | null | null | k8s/quotesweb-deployment.yaml | DonSchenck/quotesweb | 669859e4eb383162deefe2afe7f1b6c2be4961e4 | [
"Apache-2.0"
] | null | null | null | k8s/quotesweb-deployment.yaml | DonSchenck/quotesweb | 669859e4eb383162deefe2afe7f1b6c2be4961e4 | [
"Apache-2.0"
] | 1 | 2022-03-26T21:40:34.000Z | 2022-03-26T21:40:34.000Z | kind: Deployment
apiVersion: apps/v1
metadata:
name: quotesweb
labels:
app: quotesweb
spec:
replicas: 1
selector:
matchLabels:
app: quotesweb
template:
metadata:
labels:
app: quotesweb
spec:
containers:
- name: quotes
image: quay.io/donschenck/quotesweb:v1
imagePullPolicy: Always
ports:
- containerPort: 3000
protocol: TCP
| 18.333333 | 48 | 0.584091 |
f7adef54bae3dd920770067b7bc7626a2f5961a0 | 499 | yaml | YAML | manifests/prometheus-podDisruptionBudget.yaml | Luis-TT/kube-prometheus | 43f726885366a74322abccc1f8de6203826d447e | [
"Apache-2.0"
] | null | null | null | manifests/prometheus-podDisruptionBudget.yaml | Luis-TT/kube-prometheus | 43f726885366a74322abccc1f8de6203826d447e | [
"Apache-2.0"
] | 2 | 2022-03-17T11:46:36.000Z | 2022-03-31T11:29:57.000Z | manifests/prometheus-podDisruptionBudget.yaml | getupio-undistro/kube-prometheus | bc82275a07ad7ed29f1b17720cd4bdff7078c8c8 | [
"Apache-2.0"
] | null | null | null | apiVersion: policy/v1beta1
kind: PodDisruptionBudget
metadata:
labels:
app.kubernetes.io/component: prometheus
app.kubernetes.io/name: prometheus
app.kubernetes.io/part-of: kube-prometheus
app.kubernetes.io/version: 2.29.2
name: prometheus-k8s
namespace: monitoring
spec:
minAvailable: 1
selector:
matchLabels:
app.kubernetes.io/component: prometheus
app.kubernetes.io/name: prometheus
app.kubernetes.io/part-of: kube-prometheus
prometheus: k8s
| 26.263158 | 48 | 0.735471 |
f7ae308f9fe2520af20697077baa0bdb7a196f8f | 350 | yaml | YAML | assets/prometheus-operator-user-workload/service-account.yaml | aliceh/cluster-monitoring-operator | 8eaa60227030c0ecf02df1aaf36a221932ad961d | [
"Apache-2.0"
] | null | null | null | assets/prometheus-operator-user-workload/service-account.yaml | aliceh/cluster-monitoring-operator | 8eaa60227030c0ecf02df1aaf36a221932ad961d | [
"Apache-2.0"
] | null | null | null | assets/prometheus-operator-user-workload/service-account.yaml | aliceh/cluster-monitoring-operator | 8eaa60227030c0ecf02df1aaf36a221932ad961d | [
"Apache-2.0"
] | null | null | null | apiVersion: v1
automountServiceAccountToken: false
kind: ServiceAccount
metadata:
labels:
app.kubernetes.io/component: controller
app.kubernetes.io/name: prometheus-operator
app.kubernetes.io/part-of: openshift-monitoring
app.kubernetes.io/version: 0.55.1
name: prometheus-operator
namespace: openshift-user-workload-monitoring
| 29.166667 | 51 | 0.788571 |
f7ae39c99ec88c854e0db19ac184d94deda3f10b | 118 | yaml | YAML | kubernetes_templates/configmap.yaml | berndonline/flan | 3d851d9aa0b73d4e32d8f311e2ddefafa15648a2 | [
"BSD-3-Clause"
] | null | null | null | kubernetes_templates/configmap.yaml | berndonline/flan | 3d851d9aa0b73d4e32d8f311e2ddefafa15648a2 | [
"BSD-3-Clause"
] | null | null | null | kubernetes_templates/configmap.yaml | berndonline/flan | 3d851d9aa0b73d4e32d8f311e2ddefafa15648a2 | [
"BSD-3-Clause"
] | null | null | null | ---
apiVersion: v1
data:
ips.txt: |
8.8.8.8/32
kind: ConfigMap
metadata:
name: shared-files
namespace: flan
| 11.8 | 20 | 0.652542 |
f7ae856572e58ef00bde2ec485226ce41afb2ef1 | 6,456 | yaml | YAML | v2/charts/azure-service-operator/crds/apiextensions.k8s.io_v1_customresourcedefinition_resourcegroups.resources.azure.com.yaml | anshulahuja98/azure-service-operator | 6b66a7b712c87011a539bd43fa0951d073364046 | [
"MIT"
] | null | null | null | v2/charts/azure-service-operator/crds/apiextensions.k8s.io_v1_customresourcedefinition_resourcegroups.resources.azure.com.yaml | anshulahuja98/azure-service-operator | 6b66a7b712c87011a539bd43fa0951d073364046 | [
"MIT"
] | null | null | null | v2/charts/azure-service-operator/crds/apiextensions.k8s.io_v1_customresourcedefinition_resourcegroups.resources.azure.com.yaml | anshulahuja98/azure-service-operator | 6b66a7b712c87011a539bd43fa0951d073364046 | [
"MIT"
] | null | null | null | apiVersion: apiextensions.k8s.io/v1
kind: CustomResourceDefinition
metadata:
annotations:
cert-manager.io/inject-ca-from: azureserviceoperator-system/azureserviceoperator-serving-cert
controller-gen.kubebuilder.io/version: (devel)
name: resourcegroups.resources.azure.com
spec:
conversion:
strategy: Webhook
webhook:
clientConfig:
service:
name: azureserviceoperator-webhook-service
namespace: azureserviceoperator-system
path: /convert
conversionReviewVersions:
- v1beta1
group: resources.azure.com
names:
kind: ResourceGroup
listKind: ResourceGroupList
plural: resourcegroups
singular: resourcegroup
preserveUnknownFields: false
scope: Namespaced
versions:
- additionalPrinterColumns:
- jsonPath: .status.conditions[?(@.type=='Ready')].status
name: Ready
type: string
- jsonPath: .status.conditions[?(@.type=='Ready')].reason
name: Reason
type: string
- jsonPath: .status.conditions[?(@.type=='Ready')].message
name: Message
type: string
name: v1alpha1api20200601
schema:
openAPIV3Schema:
properties:
apiVersion:
description: 'APIVersion defines the versioned schema of this representation
of an object. Servers should convert recognized schemas to the latest
internal value, and may reject unrecognized values. More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#resources'
type: string
kind:
description: 'Kind is a string value representing the REST resource this
object represents. Servers may infer this from the endpoint the client
submits requests to. Cannot be updated. In CamelCase. More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#types-kinds'
type: string
metadata:
type: object
spec:
properties:
azureName:
description: 'AzureName: The name of the resource in Azure. This is
often the same as the name of the resource in Kubernetes but it
doesn''t have to be.'
type: string
location:
description: Location is the Azure location for the group (eg westus2,
southcentralus, etc...)
type: string
managedBy:
description: ManagedBy is the management group responsible for managing
this group
type: string
tags:
additionalProperties:
type: string
description: Tags are user defined key value pairs
type: object
required:
- location
type: object
status:
properties:
conditions:
description: Conditions describe the observed state of the resource
items:
description: Condition defines an extension to status (an observation)
of a resource
properties:
lastTransitionTime:
description: LastTransitionTime is the last time the condition
transitioned from one status to another.
format: date-time
type: string
message:
description: Message is a human readable message indicating
details about the transition. This field may be empty.
type: string
observedGeneration:
description: ObservedGeneration is the .metadata.generation
that the condition was set based upon. For instance, if .metadata.generation
is currently 12, but the .status.condition[x].observedGeneration
is 9, the condition is out of date with respect to the current
state of the instance.
format: int64
type: integer
reason:
description: Reason for the condition's last transition. Reasons
are upper CamelCase (PascalCase) with no spaces. A reason
is always provided, this field will not be empty.
type: string
severity:
description: Severity with which to treat failures of this type
of condition. For conditions which have positive polarity
(Status == True is their normal/healthy state), this will
be omitted when Status == True For conditions which have negative
polarity (Status == False is their normal/healthy state),
this will be omitted when Status == False. This is omitted
in all cases when Status == Unknown
type: string
status:
description: Status of the condition, one of True, False, or
Unknown.
type: string
type:
description: Type of condition.
type: string
required:
- lastTransitionTime
- reason
- status
- type
type: object
type: array
id:
type: string
location:
type: string
managedBy:
description: ManagedBy is the management group responsible for managing
this group
type: string
name:
type: string
provisioningState:
type: string
tags:
additionalProperties:
type: string
description: Tags are user defined key value pairs
type: object
type: object
type: object
served: true
storage: true
subresources:
status: {}
status:
acceptedNames:
kind: ""
plural: ""
conditions: []
storedVersions: []
| 40.603774 | 175 | 0.545229 |
f7aec3f864de2f631d9a016d11b9e507c54259c9 | 144 | yaml | YAML | kubernetes-volumes/minio-secrets.yaml | otus-kuber-2020-07/viktoriya666_platform | 1cbcb6b56267382b3e87767ff3ff043d3341de76 | [
"MIT"
] | null | null | null | kubernetes-volumes/minio-secrets.yaml | otus-kuber-2020-07/viktoriya666_platform | 1cbcb6b56267382b3e87767ff3ff043d3341de76 | [
"MIT"
] | 2 | 2020-09-03T16:17:41.000Z | 2020-09-06T15:44:41.000Z | kubernetes-volumes/minio-secrets.yaml | otus-kuber-2020-07/viktoriya666_platform | 1cbcb6b56267382b3e87767ff3ff043d3341de76 | [
"MIT"
] | 1 | 2020-08-24T12:25:28.000Z | 2020-08-24T12:25:28.000Z | apiVersion: v1
kind: Secret
metadata:
name: minio-secret
type: Opaque
stringData:
MINIO_ACCESS_KEY: minio
MINIO_SECRET_KEY: minio123
| 14.4 | 30 | 0.763889 |
f7aec7ea9b5ee947691b049fb61cfd6f410e4a14 | 730 | yaml | YAML | demo/deployment.yaml | denisbulakh/ipc-2020-php-kubernetes-session | 643df048c31ccd8558a3f1ecd9cf15f85a9093d6 | [
"MIT"
] | null | null | null | demo/deployment.yaml | denisbulakh/ipc-2020-php-kubernetes-session | 643df048c31ccd8558a3f1ecd9cf15f85a9093d6 | [
"MIT"
] | null | null | null | demo/deployment.yaml | denisbulakh/ipc-2020-php-kubernetes-session | 643df048c31ccd8558a3f1ecd9cf15f85a9093d6 | [
"MIT"
] | null | null | null | apiVersion: apps/v1
kind: Deployment
metadata:
name: demo-php
labels:
app: demo
spec:
selector:
matchLabels:
app: demo
replicas: 3
template:
metadata:
labels:
app: demo
spec:
containers:
- name: demo-php
image: demo-php:latest
imagePullPolicy: Never
resources:
requests:
cpu: 100m
memory: 100Mi
ports:
- containerPort: 9000
- name: demo-nginx
image: demo-nginx:latest
imagePullPolicy: Never
ports:
- containerPort: 80
resources:
limits:
cpu: 150m
requests:
cpu: 50m
| 19.72973 | 34 | 0.491781 |
f7aecccc770aa802037cc02aed23d2ad5438aea8 | 521 | yaml | YAML | chapter10/aws-auth-cm2.yaml | PacktPublishing/DevOps-with-Kubernetes-Second-Edition | 16cd02936c2c0994da00ff5676242825a5922f77 | [
"MIT"
] | 30 | 2019-02-05T20:11:40.000Z | 2022-02-09T03:59:37.000Z | chapter10/aws-auth-cm2.yaml | PacktPublishing/DevOps-with-Kubernetes-Second-Edition | 16cd02936c2c0994da00ff5676242825a5922f77 | [
"MIT"
] | null | null | null | chapter10/aws-auth-cm2.yaml | PacktPublishing/DevOps-with-Kubernetes-Second-Edition | 16cd02936c2c0994da00ff5676242825a5922f77 | [
"MIT"
] | 39 | 2018-09-16T05:12:40.000Z | 2022-03-19T17:38:59.000Z | apiVersion: v1
kind: ConfigMap
metadata:
name: aws-auth
namespace: kube-system
data:
mapRoles: |
- rolearn: arn:aws:iam::516726565417:role/eks-chap10-v11-NodeInstanceRole-10YYF3AILTJOS
username: system:node:{{EC2PrivateDNSName}}
groups:
- system:bootstrappers
- system:nodes
- rolearn: arn:aws:iam::516726565417:role/chap10-worker-NodeInstanceRole-8AFV8TB4IOXA
username: system:node:{{EC2PrivateDNSName}}
groups:
- system:bootstrappers
- system:nodes
| 28.944444 | 91 | 0.694818 |
f7af1846979917c09c6d83a827a0f02ab5c62752 | 85 | yaml | YAML | deployments/x-ray/x-ray-ns.yaml | SQLHorizons/x-ray | 8d2de92a492e4a042e51196a6442749a3902145f | [
"MIT"
] | null | null | null | deployments/x-ray/x-ray-ns.yaml | SQLHorizons/x-ray | 8d2de92a492e4a042e51196a6442749a3902145f | [
"MIT"
] | null | null | null | deployments/x-ray/x-ray-ns.yaml | SQLHorizons/x-ray | 8d2de92a492e4a042e51196a6442749a3902145f | [
"MIT"
] | null | null | null | ---
apiVersion: v1
kind: Namespace
metadata:
name: x-ray
labels:
name: x-ray
| 10.625 | 15 | 0.647059 |
f7af2eaba0d6fc660c2620c8cf83bcc3db5d6a59 | 1,825 | yaml | YAML | config/prow/cluster/needs-rebase_deployment.yaml | linux-on-ibm-z/test-infra | 0d65bb41b3513ca581e24754ab8b700f3a879b63 | [
"Apache-2.0"
] | null | null | null | config/prow/cluster/needs-rebase_deployment.yaml | linux-on-ibm-z/test-infra | 0d65bb41b3513ca581e24754ab8b700f3a879b63 | [
"Apache-2.0"
] | null | null | null | config/prow/cluster/needs-rebase_deployment.yaml | linux-on-ibm-z/test-infra | 0d65bb41b3513ca581e24754ab8b700f3a879b63 | [
"Apache-2.0"
] | 1 | 2020-03-25T10:32:39.000Z | 2020-03-25T10:32:39.000Z | # Copyright 2016 The Kubernetes Authors All rights reserved.
#
# Licensed under the Apache License, Version 2.0 (the "License");
# you may not use this file except in compliance with the License.
# You may obtain a copy of the License at
#
# http://www.apache.org/licenses/LICENSE-2.0
#
# Unless required by applicable law or agreed to in writing, software
# distributed under the License is distributed on an "AS IS" BASIS,
# WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
# See the License for the specific language governing permissions and
# limitations under the License.
apiVersion: apps/v1
kind: Deployment
metadata:
namespace: default
name: needs-rebase
labels:
app: needs-rebase
spec:
replicas: 1
selector:
matchLabels:
app: needs-rebase
template:
metadata:
labels:
app: needs-rebase
spec:
terminationGracePeriodSeconds: 180
containers:
- name: needs-rebase
image: gcr.io/k8s-prow/needs-rebase:v20211216-b5865074c4
imagePullPolicy: Always
args:
- --dry-run=false
- --github-endpoint=http://ghproxy
- --github-endpoint=https://api.github.com
- --github-token-path=/etc/github/oauth
- --update-period=6h
ports:
- name: http
containerPort: 8888
volumeMounts:
- name: hmac
mountPath: /etc/webhook
readOnly: true
- name: oauth
mountPath: /etc/github
readOnly: true
- name: plugins
mountPath: /etc/plugins
readOnly: true
volumes:
- name: hmac
secret:
secretName: hmac-token
- name: oauth
secret:
secretName: oauth-token
- name: plugins
configMap:
name: plugins
| 27.651515 | 74 | 0.629041 |
f7af443c2e6df5f17bd43d46557b306e3f5fa0cb | 1,080 | yaml | YAML | yaml/onpremk8s/addbook-depl.yaml | pkarthick83/bookstoreonk8s | ec8cf62ad68ef20390245fc380b77f7d505c389e | [
"MIT"
] | null | null | null | yaml/onpremk8s/addbook-depl.yaml | pkarthick83/bookstoreonk8s | ec8cf62ad68ef20390245fc380b77f7d505c389e | [
"MIT"
] | null | null | null | yaml/onpremk8s/addbook-depl.yaml | pkarthick83/bookstoreonk8s | ec8cf62ad68ef20390245fc380b77f7d505c389e | [
"MIT"
] | null | null | null | apiVersion: apps/v1
kind: Deployment
metadata:
name: bookstore-addbook
labels:
app: add-book
spec:
replicas: 1
selector:
matchLabels:
app: add-book
template:
metadata:
labels:
app: add-book
spec:
containers:
- name: addbook
image: pkarthick83/appinframodwithgke:addbook-latest
imagePullPolicy: IfNotPresent
ports:
- containerPort: 8080
env:
- name: MYSQL_USERNAME
valueFrom:
secretKeyRef:
name: mysql-secret
key: username
- name: MYSQL_PASSWORD
valueFrom:
secretKeyRef:
name: mysql-secret
key: password
- name: DB_HOST
valueFrom:
secretKeyRef:
name: mysql-secret
key: dbhost
readinessProbe:
httpGet:
path: /actuator/health
port: 8080
initialDelaySeconds: 30
periodSeconds: 15
failureThreshold: 3
| 22.040816 | 60 | 0.516667 |
f7af866ccbda38cc5e5a61956e70da3160761a59 | 227 | yaml | YAML | FEB2019/mfpod.yaml | sreedhar-devops/kuberneteszone | 2fbf9a704c6988056e985c7c35cedbbc6461e093 | [
"Apache-2.0"
] | null | null | null | FEB2019/mfpod.yaml | sreedhar-devops/kuberneteszone | 2fbf9a704c6988056e985c7c35cedbbc6461e093 | [
"Apache-2.0"
] | null | null | null | FEB2019/mfpod.yaml | sreedhar-devops/kuberneteszone | 2fbf9a704c6988056e985c7c35cedbbc6461e093 | [
"Apache-2.0"
] | null | null | null | apiVersion : v1
kind : Pod
metadata :
name : mfpod
spec :
hostNetwork : true
containers :
- name : mynginxcon
image : nginx
ports :
- containerPort : 80
# check for diff ports ex 81,82 8085 etc | 18.916667 | 40 | 0.612335 |
f7afa549d6cf7405eca6c8583dbb63a8a7822af0 | 341 | yaml | YAML | helm-2019/deployment2.yaml | FairwindsOps/how-to-kube | fca09c0c89a014e8c2a1157986e2f9881af78e14 | [
"Apache-2.0"
] | 5 | 2020-03-17T06:01:41.000Z | 2021-04-08T03:22:59.000Z | helm-2019/deployment2.yaml | FairwindsOps/how-to-kube | fca09c0c89a014e8c2a1157986e2f9881af78e14 | [
"Apache-2.0"
] | null | null | null | helm-2019/deployment2.yaml | FairwindsOps/how-to-kube | fca09c0c89a014e8c2a1157986e2f9881af78e14 | [
"Apache-2.0"
] | 2 | 2020-08-14T15:55:56.000Z | 2020-10-15T17:50:44.000Z | apiVersion: apps/v1
kind: Deployment
metadata:
name: nginx-deployment
labels:
app: nginx
spec:
replicas: 3
selector:
matchLabels:
app: nginx
template:
metadata:
labels:
app: nginx
spec:
containers:
- name: nginx
image: nginx:1.17.4
ports:
- containerPort: 80
| 15.5 | 27 | 0.580645 |
f7afe14bf9d4a23dace2047626f166e63f3d7ad8 | 144 | yaml | YAML | built-in-references/Kubernetes/perf/violations/violation9591.yaml | sw47/azure-policy | 4a38e4cb4047b5364902653f0defe45f1b21bc61 | [
"MIT"
] | null | null | null | built-in-references/Kubernetes/perf/violations/violation9591.yaml | sw47/azure-policy | 4a38e4cb4047b5364902653f0defe45f1b21bc61 | [
"MIT"
] | null | null | null | built-in-references/Kubernetes/perf/violations/violation9591.yaml | sw47/azure-policy | 4a38e4cb4047b5364902653f0defe45f1b21bc61 | [
"MIT"
] | null | null | null | apiVersion: v1
kind: Pod
metadata:
name: image-demo-9591
spec:
containers:
- name: nginx
image: nginx #ritaacr.azurecr.io/nginx:latest | 18 | 49 | 0.722222 |
f7afeec4d9f00b9ba32480f1ca7db057db6dc4e3 | 260 | yaml | YAML | yamls/prometheus/serviceaccount_release-name-prometheus-pushgateway.yaml | kubeyaml/kubeyaml | aef2e2165d4324286408c0f4e6390264f6d1b48a | [
"Apache-2.0"
] | 1 | 2022-01-28T16:03:48.000Z | 2022-01-28T16:03:48.000Z | yamls/prometheus/serviceaccount_release-name-prometheus-pushgateway.yaml | kubeyaml/kubeyaml | aef2e2165d4324286408c0f4e6390264f6d1b48a | [
"Apache-2.0"
] | null | null | null | yamls/prometheus/serviceaccount_release-name-prometheus-pushgateway.yaml | kubeyaml/kubeyaml | aef2e2165d4324286408c0f4e6390264f6d1b48a | [
"Apache-2.0"
] | 1 | 2022-02-15T07:57:28.000Z | 2022-02-15T07:57:28.000Z | apiVersion: v1
kind: ServiceAccount
metadata:
annotations: {}
labels:
app: prometheus
chart: prometheus-15.8.5
component: pushgateway
heritage: Helm
release: RELEASE-NAME
name: RELEASE-NAME-prometheus-pushgateway
namespace: default
| 20 | 43 | 0.726923 |
f7aff9945618ddad7afa6bc4a251a28ad884be8d | 1,662 | yaml | YAML | kube/jobmanager-deployment.yaml | dzikosc/zep-flink-on-aws | 2b5c02a11118cf407dc67bac2f75e866becc1935 | [
"MIT-0"
] | 1 | 2020-10-01T20:22:15.000Z | 2020-10-01T20:22:15.000Z | kube/jobmanager-deployment.yaml | dzikosc/zep-flink-on-aws | 2b5c02a11118cf407dc67bac2f75e866becc1935 | [
"MIT-0"
] | null | null | null | kube/jobmanager-deployment.yaml | dzikosc/zep-flink-on-aws | 2b5c02a11118cf407dc67bac2f75e866becc1935 | [
"MIT-0"
] | 1 | 2020-07-20T11:01:49.000Z | 2020-07-20T11:01:49.000Z | apiVersion: apps/v1
kind: Deployment
metadata:
name: flink-jobmanager
spec:
progressDeadlineSeconds: 900
replicas: 1
selector:
matchLabels:
app: flink
component: jobmanager
template:
metadata:
labels:
app: flink
component: jobmanager
spec:
serviceAccountName: zep-flink-eks-kt-svcacct
containers:
- name: jobmanager
image: docker.io/kthyagar/ktflink
workingDir: /opt/flink
command: ["/bin/bash", "-c", "$FLINK_HOME/bin/jobmanager.sh start;\
while :;
do
if [[ -f $(find log -name '*jobmanager*.log' -print -quit) ]];
then tail -f -n +1 log/*jobmanager*.log;
fi;
done"]
env:
- name: blahblah
value: blahblah
- name: blahblah
value: blahblah
ports:
- containerPort: 6123
name: rpc
- containerPort: 6124
name: blob
- containerPort: 8081
hostPort: 8081
name: ui
livenessProbe:
tcpSocket:
port: 6123
initialDelaySeconds: 30
periodSeconds: 60
volumeMounts:
- name: flink-config-volume
mountPath: /opt/flink/conf
securityContext:
# runAsUser: 9999 # refers to user _flink_ from official flink image, change if necessary
runAsUser: 0
volumes:
- name: flink-config-volume
configMap:
name: flink-config
items:
- key: flink-conf.yaml
path: flink-conf.yaml
- key: log4j.properties
path: log4j.properties
| 26.380952 | 100 | 0.546931 |
f7b0177bfd89f6b36288ac6570282318806d9a13 | 529 | yaml | YAML | kube/config/gogs-configmap.yaml | hatmarch/fraud_detection | 1394bd6fd481d6d45d2cade0ed670c684de4f7e6 | [
"MIT"
] | null | null | null | kube/config/gogs-configmap.yaml | hatmarch/fraud_detection | 1394bd6fd481d6d45d2cade0ed670c684de4f7e6 | [
"MIT"
] | null | null | null | kube/config/gogs-configmap.yaml | hatmarch/fraud_detection | 1394bd6fd481d6d45d2cade0ed670c684de4f7e6 | [
"MIT"
] | null | null | null | kind: ConfigMap
apiVersion: v1
metadata:
name: gogs-config
labels:
app: gogs
data:
app.ini: |
RUN_MODE = prod
RUN_USER = gogs
[database]
DB_TYPE = postgres
HOST = gogs-postgresql:5432
NAME = gogs
USER = gogs
PASSWD = gogs
[repository]
ROOT = /opt/gogs/data/repositories
[server]
ROOT_URL=http://@HOSTNAME
SSH_DOMAIN=@HOSTNAME
[security]
INSTALL_LOCK = true
[service]
ENABLE_CAPTCHA = false
[webhook]
SKIP_TLS_VERIFY = true | 16.030303 | 38 | 0.608696 |
f7b04ebe8ac9620a517997fd22bb9c0be3afba72 | 1,647 | yaml | YAML | mbox-operator/config/crd/bases/apps.fedoraproject.org_mboxes.yaml | Zlopez/mbbox | bc7cbdb74fd9ec0071617bbcf15f32f0e44935ac | [
"MIT"
] | 12 | 2020-02-19T01:49:02.000Z | 2021-06-22T12:47:33.000Z | mbox-operator/config/crd/bases/apps.fedoraproject.org_mboxes.yaml | Zlopez/mbbox | bc7cbdb74fd9ec0071617bbcf15f32f0e44935ac | [
"MIT"
] | 146 | 2020-02-25T13:08:48.000Z | 2021-04-13T07:02:05.000Z | mbox-operator/config/crd/bases/apps.fedoraproject.org_mboxes.yaml | Zlopez/mbbox | bc7cbdb74fd9ec0071617bbcf15f32f0e44935ac | [
"MIT"
] | 7 | 2020-02-19T08:52:05.000Z | 2021-01-29T07:32:31.000Z | ---
apiVersion: apiextensions.k8s.io/v1
kind: CustomResourceDefinition
metadata:
name: mboxes.apps.fedoraproject.org
spec:
group: apps.fedoraproject.org
names:
kind: Mbox
listKind: MboxList
plural: mboxes
singular: mbox
scope: Namespaced
versions:
- name: v1alpha1
schema:
openAPIV3Schema:
description: Mbox is the Schema for the mboxes API
properties:
apiVersion:
description: 'APIVersion defines the versioned schema of this representation
of an object. Servers should convert recognized schemas to the latest
internal value, and may reject unrecognized values. More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#resources'
type: string
kind:
description: 'Kind is a string value representing the REST resource this
object represents. Servers may infer this from the endpoint the client
submits requests to. Cannot be updated. In CamelCase. More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#types-kinds'
type: string
metadata:
type: object
spec:
description: Spec defines the desired state of Mbox
type: object
x-kubernetes-preserve-unknown-fields: true
status:
description: Status defines the observed state of Mbox
type: object
x-kubernetes-preserve-unknown-fields: true
type: object
served: true
storage: true
subresources:
status: {}
| 36.6 | 175 | 0.656345 |
f7b050e20a7bb2a2bb0c76d5574958666d3aa83d | 180 | yaml | YAML | tools/minikube/templates/nginx-service.yaml | hsong-rh/pinakes | 2f08cb757ca64c866af3244686b92a3074fc7571 | [
"Apache-2.0"
] | 2 | 2022-03-17T18:53:58.000Z | 2022-03-17T22:04:22.000Z | tools/minikube/templates/nginx-service.yaml | hsong-rh/pinakes | 2f08cb757ca64c866af3244686b92a3074fc7571 | [
"Apache-2.0"
] | 9 | 2022-03-18T08:22:57.000Z | 2022-03-30T17:14:49.000Z | tools/minikube/templates/nginx-service.yaml | hsong-rh/pinakes | 2f08cb757ca64c866af3244686b92a3074fc7571 | [
"Apache-2.0"
] | 7 | 2022-03-17T22:03:08.000Z | 2022-03-28T21:28:34.000Z | apiVersion: v1
kind: Service
metadata:
name: nginx
spec:
selector:
app: nginx
ports:
- protocol: TCP
port: 443
targetPort: 443
status:
loadBalancer: {}
| 12.857143 | 21 | 0.633333 |
f7b06fbe59e2879e972339cf1e40652570ac99b9 | 144 | yaml | YAML | built-in-references/Kubernetes/perf/violations/violation6472.yaml | sw47/azure-policy | 4a38e4cb4047b5364902653f0defe45f1b21bc61 | [
"MIT"
] | null | null | null | built-in-references/Kubernetes/perf/violations/violation6472.yaml | sw47/azure-policy | 4a38e4cb4047b5364902653f0defe45f1b21bc61 | [
"MIT"
] | null | null | null | built-in-references/Kubernetes/perf/violations/violation6472.yaml | sw47/azure-policy | 4a38e4cb4047b5364902653f0defe45f1b21bc61 | [
"MIT"
] | null | null | null | apiVersion: v1
kind: Pod
metadata:
name: image-demo-6472
spec:
containers:
- name: nginx
image: nginx #ritaacr.azurecr.io/nginx:latest | 18 | 49 | 0.722222 |
f7b0760215421b15c2c3a5e85d23854e06ee28d1 | 1,401 | yaml | YAML | kubernetes-monitoring/manifests/prometheusOperator-clusterRole.yaml | otus-kuber-2022-03/68sergey68_platform | 175417e74411b32f72440bcd67b36e7e6b544e7c | [
"MIT"
] | null | null | null | kubernetes-monitoring/manifests/prometheusOperator-clusterRole.yaml | otus-kuber-2022-03/68sergey68_platform | 175417e74411b32f72440bcd67b36e7e6b544e7c | [
"MIT"
] | 1 | 2022-03-29T05:47:16.000Z | 2022-03-29T05:47:16.000Z | kubernetes-monitoring/manifests/prometheusOperator-clusterRole.yaml | otus-kuber-2022-03/68sergey68_platform | 175417e74411b32f72440bcd67b36e7e6b544e7c | [
"MIT"
] | null | null | null | apiVersion: rbac.authorization.k8s.io/v1
kind: ClusterRole
metadata:
labels:
app.kubernetes.io/component: controller
app.kubernetes.io/name: prometheus-operator
app.kubernetes.io/part-of: kube-prometheus
app.kubernetes.io/version: 0.56.0
name: prometheus-operator
rules:
- apiGroups:
- monitoring.coreos.com
resources:
- alertmanagers
- alertmanagers/finalizers
- alertmanagerconfigs
- prometheuses
- prometheuses/finalizers
- prometheuses/status
- thanosrulers
- thanosrulers/finalizers
- servicemonitors
- podmonitors
- probes
- prometheusrules
verbs:
- '*'
- apiGroups:
- apps
resources:
- statefulsets
verbs:
- '*'
- apiGroups:
- ""
resources:
- configmaps
- secrets
verbs:
- '*'
- apiGroups:
- ""
resources:
- pods
verbs:
- list
- delete
- apiGroups:
- ""
resources:
- services
- services/finalizers
- endpoints
verbs:
- get
- create
- update
- delete
- apiGroups:
- ""
resources:
- nodes
verbs:
- list
- watch
- apiGroups:
- ""
resources:
- namespaces
verbs:
- get
- list
- watch
- apiGroups:
- networking.k8s.io
resources:
- ingresses
verbs:
- get
- list
- watch
- apiGroups:
- authentication.k8s.io
resources:
- tokenreviews
verbs:
- create
- apiGroups:
- authorization.k8s.io
resources:
- subjectaccessreviews
verbs:
- create
| 14.904255 | 47 | 0.653105 |
f7b0af9294c36ba5b6ebd33de5c26d12cbf651ae | 260 | yaml | YAML | deployments/psp/privileged.yaml | jorgearteiro/windows-k8s-playground | c744727f6b0c4345cc961107565fd5c0054176c5 | [
"MIT"
] | 4 | 2018-04-04T22:02:46.000Z | 2020-02-14T19:37:24.000Z | deployments/psp/privileged.yaml | jorgearteiro/windows-k8s-playground | c744727f6b0c4345cc961107565fd5c0054176c5 | [
"MIT"
] | null | null | null | deployments/psp/privileged.yaml | jorgearteiro/windows-k8s-playground | c744727f6b0c4345cc961107565fd5c0054176c5 | [
"MIT"
] | 2 | 2021-03-26T06:26:30.000Z | 2021-04-25T14:20:17.000Z | apiVersion: v1
kind: Pod
metadata:
name: nginx-privileged
spec:
serviceAccountName: fake-user
containers:
- name: nginx-privileged
image: nginx:1.14.2
securityContext:
privileged: true
nodeSelector:
"kubernetes.io/os": linux | 20 | 31 | 0.688462 |
f7b0c66ead9c24b9360a2e6932c3e458aac7410e | 809 | yaml | YAML | kubernetes-model/vendor/k8s.io/kubernetes/hack/testdata/filter/pod-apply-selector.yaml | bdshadow/kubernetes-client-android | 4b32d7beadfd3147fe52a812c880d4d490d510bb | [
"Apache-2.0"
] | null | null | null | kubernetes-model/vendor/k8s.io/kubernetes/hack/testdata/filter/pod-apply-selector.yaml | bdshadow/kubernetes-client-android | 4b32d7beadfd3147fe52a812c880d4d490d510bb | [
"Apache-2.0"
] | null | null | null | kubernetes-model/vendor/k8s.io/kubernetes/hack/testdata/filter/pod-apply-selector.yaml | bdshadow/kubernetes-client-android | 4b32d7beadfd3147fe52a812c880d4d490d510bb | [
"Apache-2.0"
] | null | null | null | #
# Copyright (C) 2015 Red Hat, Inc.
#
# Licensed under the Apache License, Version 2.0 (the "License");
# you may not use this file except in compliance with the License.
# You may obtain a copy of the License at
#
# http://www.apache.org/licenses/LICENSE-2.0
#
# Unless required by applicable law or agreed to in writing, software
# distributed under the License is distributed on an "AS IS" BASIS,
# WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
# See the License for the specific language governing permissions and
# limitations under the License.
#
apiVersion: v1
kind: Pod
metadata:
name: selector-test-pod
labels:
name: selector-test-pod
unique-label: bingbang
spec:
containers:
- name: kubernetes-pause
image: gcr.io/google-containers/pause:2.0
| 28.892857 | 74 | 0.735476 |
f7b0d24de9f579d6a05f6b202f939641ce2403d9 | 532 | yaml | YAML | src/orchestrator/mock_files/mock_charts/testchart2/delete.yaml | BaudouinH/EMCO | 0748d156a86de06cd796ab13d4796d1b1d3a6133 | [
"Apache-2.0"
] | 9 | 2020-10-14T08:37:38.000Z | 2021-09-12T17:42:06.000Z | src/orchestrator/mock_files/mock_charts/testchart2/delete.yaml | BaudouinH/EMCO | 0748d156a86de06cd796ab13d4796d1b1d3a6133 | [
"Apache-2.0"
] | 14 | 2021-02-23T16:56:32.000Z | 2021-09-14T19:16:57.000Z | src/orchestrator/mock_files/mock_charts/testchart2/delete.yaml | BaudouinH/EMCO | 0748d156a86de06cd796ab13d4796d1b1d3a6133 | [
"Apache-2.0"
] | 6 | 2021-01-06T04:16:21.000Z | 2021-09-02T01:04:28.000Z | # SPDX-License-Identifier: Apache-2.0
# Copyright (c) 2020 Intel Corporation
apiVersion: v1
kind: Service
metadata:
name: testchart2
labels:
chart: "testchart2-0.1.0"
namespace: "testnamespace"
release-name: "testreleasename"
release-is-upgrade: "false"
release-is-install: "true"
kube-version/major: "1"
kube-version/minor: "14"
kube-version/gitversion: "v1.14.0"
spec:
type: ClusterIP
ports:
- port: 80
targetPort: 80
protocol: TCP
name: nginx
selector:
app: testchart2 | 21.28 | 38 | 0.674812 |
f7b100eed52e909cb402c11b32123726c607812f | 2,299 | yaml | YAML | deploy/free5gc-stage-3.0.4/ueransim/ueransim-configmap.yaml | free5gmano/free5gmano | 1c6873750319956f9a118980ad20b774308af7ca | [
"Apache-2.0"
] | 89 | 2020-02-26T09:07:06.000Z | 2022-03-28T19:53:38.000Z | deploy/free5gc-stage-3.0.4/ueransim/ueransim-configmap.yaml | ji3k54j062k7/free5gmano | 6dee9d90f2064a6d3be69b03dc87d397329104ec | [
"Apache-2.0"
] | 32 | 2020-01-14T03:54:44.000Z | 2022-02-10T14:14:14.000Z | deploy/free5gc-stage-3.0.4/ueransim/ueransim-configmap.yaml | free5gmano/free5gmano | 1c6873750319956f9a118980ad20b774308af7ca | [
"Apache-2.0"
] | 76 | 2020-01-14T03:48:21.000Z | 2022-02-07T13:28:30.000Z | apiVersion: v1
kind: ConfigMap
metadata:
name: ueransim-configmap
data:
free5gc-gnb.yaml: |
mcc: '208' # Mobile Country Code value
mnc: '93' # Mobile Network Code value (2 or 3 digits)
nci: '0x0000000100' # NR Cell Identity (36-bit)
idLength: 32 # NR gNB ID length in bits [22...32]
tac: 1 # Tracking Area Code
linkIp: 192.168.2.18 # gNB's local IP address for Radio Link Simulation (Usually same with local IP)
ngapIp: 192.168.2.18 # gNB's local IP address for N2 Interface (Usually same with local IP)
gtpIp: 192.168.2.18 # gNB's local IP address for N3 Interface (Usually same with local IP)
# List of AMF address information
amfConfigs:
- address: 192.168.2.162
port: 38412
# List of supported S-NSSAIs by this gNB
slices:
- sst: 0x1
sd: 0x010203
# Indicates whether or not SCTP stream number errors should be ignored.
ignoreStreamIds: true
free5gc-ue.yaml: |
# IMSI number of the UE. IMSI = [MCC|MNC|MSISDN] (In total 15 or 16 digits)
supi: 'imsi-208930000000003'
# Mobile Country Code value
mcc: '208'
# Mobile Network Code value (2 or 3 digits)
mnc: '93'
# Permanent subscription key
key: '8baf473f2f8fd09487cccbd7097c6862'
# Operator code (OP or OPC) of the UE
op: '8e27b6af0e692e750f32667a3b14605d'
# This value specifies the OP type and it can be either 'OP' or 'OPC'
opType: 'OP'
# Authentication Management Field (AMF) value
amf: '8000'
# IMEI number of the device. It is used if no SUPI is provided
imei: '356938035643803'
# IMEISV number of the device. It is used if no SUPI and IMEI is provided
imeiSv: '4370816125816151'
# List of gNB IP addresses for Radio Link Simulation
gnbSearchList:
- 192.168.2.18
# Initial PDU sessions to be established
sessions:
- type: 'IPv4'
apn: 'internet'
slice:
sst: 0x01
sd: 0x010203
# List of requested S-NSSAIs by this UE
slices:
- sst: 0x01
sd: 0x010203
# Supported encryption and integrity algorithms by this UE
integrity:
IA1: true
IA2: true
IA3: true
ciphering:
EA1: true
EA2: true
EA3: true
| 29.474359 | 105 | 0.633754 |
f7b169c433a918542c55d1cb2f798408c17708af | 540 | yaml | YAML | objects-install/manifests/helm-generated-files-istio/istio/charts/security/templates/service.yaml | lukasz-bielinski/istio-okd | b1fc5ddff146d46003607de0a01a2173d597a4f2 | [
"MIT"
] | null | null | null | objects-install/manifests/helm-generated-files-istio/istio/charts/security/templates/service.yaml | lukasz-bielinski/istio-okd | b1fc5ddff146d46003607de0a01a2173d597a4f2 | [
"MIT"
] | null | null | null | objects-install/manifests/helm-generated-files-istio/istio/charts/security/templates/service.yaml | lukasz-bielinski/istio-okd | b1fc5ddff146d46003607de0a01a2173d597a4f2 | [
"MIT"
] | null | null | null | ---
# Source: istio/charts/security/templates/service.yaml
apiVersion: v1
kind: Service
metadata:
# we use the normal name here (e.g. 'prometheus')
# as grafana is configured to use this as a data source
name: istio-citadel
namespace: istio-system
labels:
app: security
chart: security
heritage: Tiller
release: istio
istio: citadel
spec:
ports:
- name: grpc-citadel
port: 8060
targetPort: 8060
protocol: TCP
- name: http-monitoring
port: 15014
selector:
istio: citadel
| 20.769231 | 57 | 0.668519 |
f7b197c36c1256c395d40cdbb1909c7ca2321802 | 1,528 | yaml | YAML | config/200-clusterrole.yaml | mikeykhalil/pipeline | 44d059908886ea3b90d4158f83a5355fc89950ef | [
"Apache-2.0"
] | null | null | null | config/200-clusterrole.yaml | mikeykhalil/pipeline | 44d059908886ea3b90d4158f83a5355fc89950ef | [
"Apache-2.0"
] | null | null | null | config/200-clusterrole.yaml | mikeykhalil/pipeline | 44d059908886ea3b90d4158f83a5355fc89950ef | [
"Apache-2.0"
] | null | null | null | kind: ClusterRole
apiVersion: rbac.authorization.k8s.io/v1
metadata:
name: tekton-pipelines-admin
rules:
- apiGroups: [""]
resources: ["pods", "namespaces", "secrets", "events", "serviceaccounts", "configmaps", "persistentvolumeclaims"]
verbs: ["get", "list", "create", "update", "delete", "patch", "watch"]
- apiGroups: ["extensions"]
resources: ["deployments"]
verbs: ["get", "list", "create", "update", "delete", "patch", "watch"]
- apiGroups: ["extensions"]
resources: ["deployments/finalizers"]
verbs: ["get", "list", "create", "update", "delete", "patch", "watch"]
- apiGroups: ["admissionregistration.k8s.io"]
resources: ["mutatingwebhookconfigurations"]
verbs: ["get", "list", "create", "update", "delete", "patch", "watch"]
- apiGroups: ["tekton.dev"]
resources: ["tasks", "clustertasks", "taskruns", "pipelines", "pipelineruns", "pipelineresources"]
verbs: ["get", "list", "create", "update", "delete", "patch", "watch"]
- apiGroups: ["tekton.dev"]
resources: ["taskruns/finalizers", "pipelineruns/finalizers"]
verbs: ["get", "list", "create", "update", "delete", "patch", "watch"]
- apiGroups: ["tekton.dev"]
resources: ["tasks/status", "clustertasks/status", "taskruns/status", "pipelines/status", "pipelineruns/status", "pipelineresources/status"]
verbs: ["get", "list", "create", "update", "delete", "patch", "watch"]
- apiGroups: ["policy"]
resources: ["podsecuritypolicies"]
resourceNames: ["tekton-pipelines"]
verbs: ["use"]
| 49.290323 | 144 | 0.642016 |
f7b1c258a510aee0a85e74ea3e11cbc8034f859d | 265 | yaml | YAML | share-db/share-iiidevops/devopsapi-service.yaml | iii-org/rke2-deploy-devops | c2f63206b4b9bdc2e6594b24bb7bcb9ddb0cb359 | [
"MIT"
] | null | null | null | share-db/share-iiidevops/devopsapi-service.yaml | iii-org/rke2-deploy-devops | c2f63206b4b9bdc2e6594b24bb7bcb9ddb0cb359 | [
"MIT"
] | null | null | null | share-db/share-iiidevops/devopsapi-service.yaml | iii-org/rke2-deploy-devops | c2f63206b4b9bdc2e6594b24bb7bcb9ddb0cb359 | [
"MIT"
] | null | null | null | apiVersion: v1
kind: Service
metadata:
name: devopsapi-service
namespace: devops
labels:
app: devopsapi
spec:
type: NodePort
selector:
app: devopsapi
ports:
- name: devopsapi-port
protocol: TCP
port: 10009
nodePort: 31850
| 15.588235 | 26 | 0.660377 |
f7b1dffe0f45af1fc7394c30d49c010abc5b49f0 | 2,038 | yaml | YAML | prow/cluster/plank_deployment.yaml | rbmateescu/test-infra | 84ea2f031acbe1ec4f9f224796ce06a953c6145f | [
"Apache-2.0"
] | null | null | null | prow/cluster/plank_deployment.yaml | rbmateescu/test-infra | 84ea2f031acbe1ec4f9f224796ce06a953c6145f | [
"Apache-2.0"
] | 433 | 2019-09-26T06:52:31.000Z | 2022-03-24T21:18:01.000Z | prow/cluster/plank_deployment.yaml | rbmateescu/test-infra | 84ea2f031acbe1ec4f9f224796ce06a953c6145f | [
"Apache-2.0"
] | 49 | 2019-10-03T12:31:35.000Z | 2021-09-22T20:36:38.000Z | # Copyright 2017 The Kubernetes Authors All rights reserved.
#
# Licensed under the Apache License, Version 2.0 (the "License");
# you may not use this file except in compliance with the License.
# You may obtain a copy of the License at
#
# http://www.apache.org/licenses/LICENSE-2.0
#
# Unless required by applicable law or agreed to in writing, software
# distributed under the License is distributed on an "AS IS" BASIS,
# WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
# See the License for the specific language governing permissions and
# limitations under the License.
apiVersion: apps/v1
kind: Deployment
metadata:
namespace: default
name: plank
labels:
app: plank
spec:
replicas: 1 # Do not scale up.
strategy:
type: Recreate
selector:
matchLabels:
app: plank
template:
metadata:
labels:
app: plank
spec:
# serviceAccountName: "plank" # Uncomment for use with RBAC
containers:
- name: plank
image: gcr.io/k8s-prow/plank:v20190920-d724a578b
args:
- --build-cluster=/etc/cluster/cluster
- --dry-run=false
- --github-endpoint=http://ghproxy
- --github-endpoint=https://api.github.com
- --config-path=/etc/config/config.yaml
- --job-config-path=/etc/job-config
- --skip-report=true
volumeMounts:
- mountPath: /etc/cluster
name: cluster
readOnly: true
- name: oauth
mountPath: /etc/github
readOnly: true
- name: config
mountPath: /etc/config
readOnly: true
- name: job-config
mountPath: /etc/job-config
readOnly: true
volumes:
- name: cluster
secret:
defaultMode: 420
secretName: build-cluster
- name: oauth
secret:
secretName: oauth-token
- name: config
configMap:
name: config
- name: job-config
configMap:
name: job-config
| 27.917808 | 74 | 0.618253 |
f7b1fcb0a98f33215aee56b4fd71cf96295d3004 | 65 | yaml | YAML | kubernetes/databases/postgres/stolon-cluster/namespace.yaml | bygui86/kubernetes-tests | 3f85c9d2fd0dabea48e7d20b018c2323f1c6f4fa | [
"Apache-2.0"
] | 1 | 2021-08-25T14:58:48.000Z | 2021-08-25T14:58:48.000Z | kubernetes/databases/postgres/stolon-cluster/namespace.yaml | bygui86/kubernetes-tests | 3f85c9d2fd0dabea48e7d20b018c2323f1c6f4fa | [
"Apache-2.0"
] | null | null | null | kubernetes/databases/postgres/stolon-cluster/namespace.yaml | bygui86/kubernetes-tests | 3f85c9d2fd0dabea48e7d20b018c2323f1c6f4fa | [
"Apache-2.0"
] | 1 | 2019-08-21T14:39:32.000Z | 2019-08-21T14:39:32.000Z | apiVersion: v1
kind: Namespace
metadata:
name: stolon-postgres
| 13 | 23 | 0.784615 |
f7b33482db112644301dffc8fe8c6a386d088e2d | 1,249 | yaml | YAML | kubernetes/postgresql.yaml | niki130396/stock_market_platform | 598816d7ee50cc0bb71f4612945b4faa6b50d218 | [
"MIT"
] | null | null | null | kubernetes/postgresql.yaml | niki130396/stock_market_platform | 598816d7ee50cc0bb71f4612945b4faa6b50d218 | [
"MIT"
] | null | null | null | kubernetes/postgresql.yaml | niki130396/stock_market_platform | 598816d7ee50cc0bb71f4612945b4faa6b50d218 | [
"MIT"
] | 1 | 2022-02-14T20:14:40.000Z | 2022-02-14T20:14:40.000Z | apiVersion: apps/v1
kind: StatefulSet
metadata:
name: postgresql-db
spec:
serviceName: postgresql-db-service
selector:
matchLabels:
app: postgresql-db
replicas: 2
template:
metadata:
labels:
app: postgresql-db
spec:
securityContext:
fsGroup: 2000
initContainers:
- name: init-chmod-data
image: postgres
command: ['sh', '-c']
args: ['chown -R 1001:2000 /data']
volumeMounts:
- name: postgresql-db-disk
mountPath: /data
containers:
- name: postgresql-db
image: postgres
securityContext:
runAsUser: 1001
runAsGroup: 2000
volumeMounts:
- name: postgresql-db-disk
mountPath: /data
env:
- name: POSTGRES_PASSWORD
valueFrom:
secretKeyRef:
name: stock-market-secret
key: postgres-password
- name: PGDATA
value: /data/pgdata
volumeClaimTemplates:
- metadata:
name: postgresql-db-disk
spec:
accessModes: ["ReadWriteOnce"]
resources:
requests:
storage: 10Gi
| 24.490196 | 44 | 0.528423 |
f7b45306a25676e566b5c8b19dbd386abf351f50 | 170 | yaml | YAML | volume-claims/templates/rabbitmq-pvclaim.yaml | sapliedtke/openstack-helm | 0cac95984810c1f86f61db04615e701502f64487 | [
"Apache-2.0"
] | 1 | 2017-05-02T23:55:23.000Z | 2017-05-02T23:55:23.000Z | volume-claims/templates/rabbitmq-pvclaim.yaml | sapliedtke/openstack-helm | 0cac95984810c1f86f61db04615e701502f64487 | [
"Apache-2.0"
] | null | null | null | volume-claims/templates/rabbitmq-pvclaim.yaml | sapliedtke/openstack-helm | 0cac95984810c1f86f61db04615e701502f64487 | [
"Apache-2.0"
] | null | null | null | ---
apiVersion: v1
kind: PersistentVolumeClaim
metadata:
name: rabbitmq-pvclaim
spec:
accessModes:
- ReadWriteMany
resources:
requests:
storage: 10Gi
| 14.166667 | 27 | 0.705882 |
f7b48ef86700f04f16b42ac7429474d2d5369021 | 983 | yaml | YAML | test/integration/testdata/multinodes/multinode-pod-dns-test.yaml | clickyotomy/minikube | 22099c8a1448d6da672c5822f253ed74d9864447 | [
"Apache-2.0"
] | null | null | null | test/integration/testdata/multinodes/multinode-pod-dns-test.yaml | clickyotomy/minikube | 22099c8a1448d6da672c5822f253ed74d9864447 | [
"Apache-2.0"
] | 25 | 2021-05-03T08:52:58.000Z | 2022-03-28T18:07:47.000Z | test/integration/testdata/multinodes/multinode-pod-dns-test.yaml | clickyotomy/minikube | 22099c8a1448d6da672c5822f253ed74d9864447 | [
"Apache-2.0"
] | null | null | null | apiVersion: apps/v1
kind: Deployment
metadata:
name: busybox
labels:
app: busybox
spec:
replicas: 2
selector:
matchLabels:
app: busybox
template:
metadata:
labels:
app: busybox
spec:
containers:
- name: busybox
# flaky nslookup in busybox versions newer than 1.28:
# https://github.com/docker-library/busybox/issues/48
# note: gcr.io/kubernetes-e2e-test-images/dnsutils:1.3
# has similar issues (ie, resolves but returns exit 1)
image: busybox:1.28
command:
- sleep
- "3600"
imagePullPolicy: IfNotPresent
restartPolicy: Always
affinity:
# ⬇⬇⬇ This ensures pods will land on separate hosts
podAntiAffinity:
requiredDuringSchedulingIgnoredDuringExecution:
- labelSelector:
matchExpressions: [{ key: app, operator: In, values: [busybox] }]
topologyKey: "kubernetes.io/hostname"
| 27.305556 | 79 | 0.614446 |
f7b4ddf68d689ae0eee2f2470be5f021269735ac | 191 | yaml | YAML | k8s_fundamentals/12_persistence-dynamic/pvc.yaml | hboshnak/trainings | 49d02999cf6a7d92d852cef4a6d1522ee233657a | [
"Apache-2.0"
] | 24 | 2020-08-04T17:06:58.000Z | 2022-03-31T08:49:11.000Z | k8s_fundamentals/12_persistence-dynamic/pvc.yaml | hboshnak/trainings | 49d02999cf6a7d92d852cef4a6d1522ee233657a | [
"Apache-2.0"
] | 40 | 2020-12-04T10:25:04.000Z | 2021-12-23T11:09:36.000Z | k8s_fundamentals/12_persistence-dynamic/pvc.yaml | hboshnak/trainings | 49d02999cf6a7d92d852cef4a6d1522ee233657a | [
"Apache-2.0"
] | 19 | 2020-07-28T12:21:03.000Z | 2022-01-27T09:36:58.000Z | apiVersion: v1
kind: PersistentVolumeClaim
metadata:
name: my-pvc
spec:
accessModes:
- ReadWriteOnce
storageClassName: my-storageclass
resources:
requests:
storage: 1Gi
| 15.916667 | 35 | 0.727749 |
f7b50b549cb0e0bdf8b39fb2e7387195155bfa65 | 1,276 | yaml | YAML | operators/cass-operator-community/1.9.0/manifests/cass-operator-manager-config_v1_configmap.yaml | carlosthe19916/community-operators | 3e02351252d484ddd4cc737da043032e1cad9671 | [
"Apache-2.0"
] | 53 | 2021-07-18T09:23:52.000Z | 2022-03-24T18:48:37.000Z | operators/cass-operator-community/1.9.0/manifests/cass-operator-manager-config_v1_configmap.yaml | carlosthe19916/community-operators | 3e02351252d484ddd4cc737da043032e1cad9671 | [
"Apache-2.0"
] | 891 | 2021-07-15T09:21:22.000Z | 2022-03-31T22:52:36.000Z | operators/cass-operator-community/1.9.0/manifests/cass-operator-manager-config_v1_configmap.yaml | carlosthe19916/community-operators | 3e02351252d484ddd4cc737da043032e1cad9671 | [
"Apache-2.0"
] | 305 | 2021-07-15T09:04:42.000Z | 2022-03-30T08:20:29.000Z | apiVersion: v1
data:
controller_manager_config.yaml: |
apiVersion: config.k8ssandra.io/v1beta1
kind: OperatorConfig
metadata:
name: operator-config
health:
healthProbeBindAddress: :8081
metrics:
bindAddress: 127.0.0.1:8080
webhook:
port: 9443
leaderElection:
leaderElect: true
resourceName: b569adb7.cassandra.datastax.com
disableWebhooks: false
imageConfigFile: /configs/image_config.yaml
image_config.yaml: |
apiVersion: config.k8ssandra.io/v1beta1
kind: ImageConfig
metadata:
name: image-config
images:
system-logger: "k8ssandra/system-logger:v1.9.0"
config-builder: "datastax/cass-config-builder:1.0.4-ubi7"
# cassandra:
# "4.0.0": "k8ssandra/cassandra-ubi:latest"
# dse:
# "6.8.999": "datastax/dse-server-prototype:latest"
# imageRegistry: "localhost:5000"
# imagePullPolicy: Always
# imagePullSecret:
# name: my-secret-pull-registry
defaults:
# Note, postfix is ignored if repository is not set
cassandra:
repository: "k8ssandra/cass-management-api"
dse:
repository: "datastax/dse-server"
suffix: "-ubi7"
kind: ConfigMap
metadata:
name: cass-operator-manager-config
| 28.355556 | 63 | 0.665361 |
f7b5626b9fbd72629f34161896c482c55f581cb7 | 2,173 | yml | YAML | deploy/base/deployment.yml | isabella232/hawtio-online | 77c1c9f9b59aaf12084e282a72446c41291ed673 | [
"Apache-2.0"
] | null | null | null | deploy/base/deployment.yml | isabella232/hawtio-online | 77c1c9f9b59aaf12084e282a72446c41291ed673 | [
"Apache-2.0"
] | 1 | 2022-03-19T17:43:31.000Z | 2022-03-19T17:43:31.000Z | deploy/base/deployment.yml | isabella232/hawtio-online | 77c1c9f9b59aaf12084e282a72446c41291ed673 | [
"Apache-2.0"
] | null | null | null | apiVersion: apps/v1
kind: Deployment
metadata:
name: hawtio-online
labels:
app: hawtio
deployment: hawtio-online
spec:
replicas: 1
selector:
matchLabels:
app: hawtio
deployment: hawtio-online
strategy:
type: RollingUpdate
rollingUpdate:
maxSurge: 25%
maxUnavailable: 25%
template:
metadata:
labels:
app: hawtio
deployment: hawtio-online
spec:
containers:
- image: hawtio/online
imagePullPolicy: Always
name: hawtio-online
ports:
- name: nginx
containerPort: 8443
livenessProbe:
httpGet:
path: /online
port: nginx
scheme: HTTPS
periodSeconds: 10
timeoutSeconds: 1
readinessProbe:
httpGet:
path: /online
port: nginx
scheme: HTTPS
initialDelaySeconds: 5
periodSeconds: 5
timeoutSeconds: 1
env:
- name: HAWTIO_ONLINE_RBAC_ACL
value: /etc/hawtio/rbac/ACL.yaml
resources:
requests:
cpu: "0.2"
memory: 32Mi
limits:
cpu: "1.0"
memory: 100Mi
volumeMounts:
- name: hawtio-online
mountPath: /usr/share/nginx/html/online/hawtconfig.json
subPath: hawtconfig.json
- name: hawtio-integration
mountPath: /usr/share/nginx/html/integration/hawtconfig.json
subPath: hawtconfig.json
- name: hawtio-rbac
mountPath: /etc/hawtio/rbac
- name: hawtio-online-tls-serving
mountPath: /etc/tls/private/serving
volumes:
- name: hawtio-online
configMap:
name: hawtio-online
- name: hawtio-integration
configMap:
name: hawtio-integration
- name: hawtio-rbac
configMap:
name: hawtio-rbac
- name: hawtio-online-tls-serving
secret:
secretName: hawtio-online-tls-serving
| 26.82716 | 74 | 0.52324 |
f7b5c3cc88be903ff69c4092bd14b44dd7663c27 | 367 | yaml | YAML | config/rbac/traveller_editor_role.yaml | rhrazdil/hello-operator2 | 5ec7132a51f83cb620795bc5276c77e084f73343 | [
"MIT"
] | 5 | 2021-12-07T16:02:46.000Z | 2022-03-06T09:10:44.000Z | config/rbac/traveller_editor_role.yaml | rhrazdil/hello-operator2 | 5ec7132a51f83cb620795bc5276c77e084f73343 | [
"MIT"
] | 1 | 2021-12-09T17:17:35.000Z | 2022-02-02T13:22:24.000Z | config/rbac/traveller_editor_role.yaml | rhrazdil/hello-operator2 | 5ec7132a51f83cb620795bc5276c77e084f73343 | [
"MIT"
] | 1 | 2022-01-04T08:17:12.000Z | 2022-01-04T08:17:12.000Z | # permissions for end users to edit travellers.
apiVersion: rbac.authorization.k8s.io/v1
kind: ClusterRole
metadata:
name: traveller-editor-role
rules:
- apiGroups:
- my.domain
resources:
- travellers
verbs:
- create
- delete
- get
- list
- patch
- update
- watch
- apiGroups:
- my.domain
resources:
- travellers/status
verbs:
- get
| 14.68 | 47 | 0.678474 |
f7b5d50026c1e001f232aba7ead28a39d44b20ee | 1,728 | yaml | YAML | dist/manifests/kubernetes-cluster-manifests/ingress-nginx/04-ingress-svc.yaml | bossjones/bosslab-playbooks | 874e71fe3c46e333fdceedbdebd7f7c4641470d9 | [
"Apache-2.0"
] | 4 | 2019-05-03T21:21:21.000Z | 2020-09-22T20:02:06.000Z | dist/manifests/kubernetes-cluster-manifests/ingress-nginx/04-ingress-svc.yaml | bossjones/bosslab-playbooks | 874e71fe3c46e333fdceedbdebd7f7c4641470d9 | [
"Apache-2.0"
] | 21 | 2019-04-04T03:59:20.000Z | 2022-03-30T21:58:33.000Z | dist/manifests/kubernetes-cluster-manifests/ingress-nginx/04-ingress-svc.yaml | bossjones/bosslab-playbooks | 874e71fe3c46e333fdceedbdebd7f7c4641470d9 | [
"Apache-2.0"
] | null | null | null | # Copyright 2016 The Kubernetes Authors All rights reserved.
#
# Licensed under the Apache License, Version 2.0 (the "License");
# you may not use this file except in compliance with the License.
# You may obtain a copy of the License at
#
# http://www.apache.org/licenses/LICENSE-2.0
#
# Unless required by applicable law or agreed to in writing, software
# distributed under the License is distributed on an "AS IS" BASIS,
# WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
# See the License for the specific language governing permissions and
# limitations under the License.
apiVersion: v1
kind: Service
metadata:
name: default-http-backend
namespace: kube-system
labels:
app.kubernetes.io/name: default-http-backend
# app.kubernetes.io/part-of: kube-system
app.kubernetes.io/part-of: ingress-nginx
# kubernetes.io/minikube-addons: ingress
# kubernetes.io/minikube-addons-endpoint: ingress
addonmanager.kubernetes.io/mode: Reconcile
# annotations:
spec:
type: NodePort
ports:
- port: 80
# Assign 8080 to <POD-IP>:<targetPort>
targetPort: 8080
protocol: TCP
name: http
# nodePort: The Service created in the last section already used NodePort, so your nginx HTTPS replica is ready to serve traffic on the internet if your node has a public IP.
# curl https://<WORKER-NODE-IP>:<NODE-PORT> -k
# nodePort: 30001
# - name: http
# port: 80
# targetPort: 80
# protocol: TCP
# - name: https
# port: 443
# targetPort: 443
# protocol: TCP
selector:
app.kubernetes.io/name: default-http-backend
app.kubernetes.io/part-of: ingress-nginx
| 30.857143 | 180 | 0.689236 |
f7b62263bc1f3723d5ffd2c38d781c84b57248f3 | 303 | yaml | YAML | pkg/addons/data/StorageClass.storage.k8s.io/azure.yaml | sozercan/openshift-azure | 51070db75b1d02946ba33c644b911976d0734f3d | [
"Apache-2.0"
] | null | null | null | pkg/addons/data/StorageClass.storage.k8s.io/azure.yaml | sozercan/openshift-azure | 51070db75b1d02946ba33c644b911976d0734f3d | [
"Apache-2.0"
] | null | null | null | pkg/addons/data/StorageClass.storage.k8s.io/azure.yaml | sozercan/openshift-azure | 51070db75b1d02946ba33c644b911976d0734f3d | [
"Apache-2.0"
] | null | null | null | apiVersion: storage.k8s.io/v1
kind: StorageClass
metadata:
annotations:
storageclass.kubernetes.io/is-default-class: "true"
name: azure
parameters:
kind: managed
location: eastus
skuName: Premium_LRS
provisioner: kubernetes.io/azure-disk
reclaimPolicy: Delete
volumeBindingMode: Immediate
| 21.642857 | 55 | 0.792079 |
f7b6731d006715f0baf2b0899944b2415f321d80 | 85 | yaml | YAML | examples/remote-git-sub/01-namespace.yaml | dhaiducek/multicloud-operators-subscription-1 | 5d9e16954ee96b42067889f5e090b8c5a2737e9a | [
"Apache-2.0"
] | 32 | 2020-04-07T17:33:36.000Z | 2021-12-28T15:34:30.000Z | examples/remote-git-sub/01-namespace.yaml | dhaiducek/multicloud-operators-subscription-1 | 5d9e16954ee96b42067889f5e090b8c5a2737e9a | [
"Apache-2.0"
] | 512 | 2020-03-06T17:18:18.000Z | 2021-12-24T16:13:19.000Z | examples/remote-git-sub/01-namespace.yaml | dhaiducek/multicloud-operators-subscription-1 | 5d9e16954ee96b42067889f5e090b8c5a2737e9a | [
"Apache-2.0"
] | 41 | 2020-03-24T20:49:09.000Z | 2021-12-21T14:46:57.000Z | apiVersion: v1
kind: Namespace
metadata:
name: gitops-chn-ns | 21.25 | 36 | 0.564706 |
f7b698d0eabc234710b868ea9d792cfe1e96850e | 507 | yaml | YAML | test-infra/kfp/kfp-standalone-1/kustomize/upstream/base/pipeline/metadata-writer/metadata-writer-role.yaml | chensun/testing | 3e271f847861bdf099d6645295d7f8b8956b215b | [
"Apache-2.0"
] | null | null | null | test-infra/kfp/kfp-standalone-1/kustomize/upstream/base/pipeline/metadata-writer/metadata-writer-role.yaml | chensun/testing | 3e271f847861bdf099d6645295d7f8b8956b215b | [
"Apache-2.0"
] | null | null | null | test-infra/kfp/kfp-standalone-1/kustomize/upstream/base/pipeline/metadata-writer/metadata-writer-role.yaml | chensun/testing | 3e271f847861bdf099d6645295d7f8b8956b215b | [
"Apache-2.0"
] | null | null | null | apiVersion: rbac.authorization.k8s.io/v1
kind: Role
metadata: # kpt-merge: /kubeflow-pipelines-metadata-writer-role
labels:
app: kubeflow-pipelines-metadata-writer-role
name: kubeflow-pipelines-metadata-writer-role
rules:
- apiGroups:
- ""
resources:
- pods
verbs:
- get
- list
- watch
- update
- patch
- apiGroups:
- ""
resources:
- configmaps
verbs:
- get
- apiGroups:
- argoproj.io
resources:
- workflows
verbs:
- get
- list
- watch
- update
- patch
| 14.911765 | 63 | 0.654832 |
f7b7027c85daa8dec0d5c7b2c4825f81322b4d1d | 397 | yaml | YAML | operator/config/rbac/scaledobject_editor_role.yaml | devjoes/github-action-autoscaler | 5e88e43f569e6e8ce4419eb2684d9d8d6ec4ea58 | [
"MIT"
] | 6 | 2021-07-18T15:18:55.000Z | 2022-02-26T13:12:11.000Z | operator/config/rbac/scaledobject_editor_role.yaml | devjoes/github-action-autoscaler | 5e88e43f569e6e8ce4419eb2684d9d8d6ec4ea58 | [
"MIT"
] | 2 | 2021-05-04T20:40:40.000Z | 2021-09-09T16:49:53.000Z | operator/config/rbac/scaledobject_editor_role.yaml | devjoes/github-action-autoscaler | 5e88e43f569e6e8ce4419eb2684d9d8d6ec4ea58 | [
"MIT"
] | 1 | 2021-07-22T16:57:42.000Z | 2021-07-22T16:57:42.000Z | # permissions for end users to edit scaledobjects.
apiVersion: rbac.authorization.k8s.io/v1
kind: ClusterRole
metadata:
name: scaledobject-editor-role
rules:
- apiGroups:
- runner.devjoes.com
resources:
- scaledobjects
verbs:
- create
- delete
- get
- list
- patch
- update
- watch
- apiGroups:
- runner.devjoes.com
resources:
- scaledobjects/status
verbs:
- get
| 15.88 | 50 | 0.697733 |
f7b7280240593a43705c3b8ad5ab25b744ad6e7f | 6,511 | yml | YAML | admin/kubernetes/k8s_deployment_aws_singleton.yml | biosimulations/hsds | bd5b659c4fcc60c4a2791b2f39750faaa9098d09 | [
"Apache-2.0"
] | 76 | 2019-01-03T18:14:01.000Z | 2022-03-28T20:09:42.000Z | admin/kubernetes/k8s_deployment_aws_singleton.yml | biosimulations/hsds | bd5b659c4fcc60c4a2791b2f39750faaa9098d09 | [
"Apache-2.0"
] | 104 | 2019-01-01T17:09:52.000Z | 2022-03-31T17:53:48.000Z | admin/kubernetes/k8s_deployment_aws_singleton.yml | biosimulations/hsds | bd5b659c4fcc60c4a2791b2f39750faaa9098d09 | [
"Apache-2.0"
] | 41 | 2019-01-30T13:58:16.000Z | 2022-02-23T13:13:01.000Z | apiVersion: apps/v1
kind: Deployment
metadata:
labels:
app: hsds
name: hsds
spec:
replicas: 1
selector:
matchLabels:
app: hsds
template:
metadata:
labels:
app: hsds
spec:
containers:
-
name: head
image: "hdfgroup/hsds:v0.7.0beta6"
imagePullPolicy: IfNotPresent
resources:
requests:
memory: "512M"
limits:
memory: "512M"
volumeMounts:
- name: config
mountPath: "/config"
ports:
-
containerPort: 5100
env:
- name: NODE_TYPE
value: head_node
-
name: sn
image: "hdfgroup/hsds:v0.7.0beta6"
imagePullPolicy: IfNotPresent
resources:
requests:
memory: "1G"
limits:
memory: "1G"
volumeMounts:
- name: accounts
mountPath: "/config/passwd.txt"
subPath: passwd.txt
- name: config
mountPath: "/config"
ports:
-
containerPort: 5101
env:
- name: NODE_TYPE
value: sn
- name: PASSWORD_FILE
value: /config/passwd.txt
- name: AWS_ACCESS_KEY_ID
valueFrom:
secretKeyRef:
name: aws-auth-keys
key: aws_access_key_id
- name: AWS_SECRET_ACCESS_KEY
valueFrom:
secretKeyRef:
name: aws-auth-keys
key: aws_secret_access_key
-
name: dn1
image: "hdfgroup/hsds:v0.7.0beta6"
lifecycle:
preStop:
exec:
command: ["/usr/bin/curl", "-X", "DELETE", "http://127.0.0.1:6101/prestop"]
imagePullPolicy: IfNotPresent
resources:
requests:
memory: "2G"
limits:
memory: "2G"
volumeMounts:
- name: config
mountPath: "/config"
ports:
-
containerPort: 6101
env:
- name: NODE_TYPE
value: dn
- name: DN_PORT
value: "6101"
- name: AWS_ACCESS_KEY_ID
valueFrom:
secretKeyRef:
name: aws-auth-keys
key: aws_access_key_id
- name: AWS_SECRET_ACCESS_KEY
valueFrom:
secretKeyRef:
name: aws-auth-keys
key: aws_secret_access_key
-
name: dn2
image: "hdfgroup/hsds:v0.7.0beta6"
lifecycle:
preStop:
exec:
command: ["/usr/bin/curl", "-X", "DELETE", "http://127.0.0.1:6101/prestop"]
imagePullPolicy: IfNotPresent
resources:
requests:
memory: "2G"
limits:
memory: "2G"
volumeMounts:
- name: config
mountPath: "/config"
ports:
-
containerPort: 6102
env:
- name: NODE_TYPE
value: dn
- name: DN_PORT
value: "6102"
- name: AWS_ACCESS_KEY_ID
valueFrom:
secretKeyRef:
name: aws-auth-keys
key: aws_access_key_id
- name: AWS_SECRET_ACCESS_KEY
valueFrom:
secretKeyRef:
name: aws-auth-keys
key: aws_secret_access_key
-
name: dn3
image: "hdfgroup/hsds:v0.7.0beta6"
lifecycle:
preStop:
exec:
command: ["/usr/bin/curl", "-X", "DELETE", "http://127.0.0.1:6101/prestop"]
imagePullPolicy: IfNotPresent
resources:
requests:
memory: "2G"
limits:
memory: "2G"
volumeMounts:
- name: config
mountPath: "/config"
ports:
-
containerPort: 6103
env:
- name: NODE_TYPE
value: dn
- name: DN_PORT
value: "6103"
- name: AWS_ACCESS_KEY_ID
valueFrom:
secretKeyRef:
name: aws-auth-keys
key: aws_access_key_id
- name: AWS_SECRET_ACCESS_KEY
valueFrom:
secretKeyRef:
name: aws-auth-keys
key: aws_secret_access_key
-
name: dn4
image: "hdfgroup/hsds:v0.7.0beta6"
lifecycle:
preStop:
exec:
command: ["/usr/bin/curl", "-X", "DELETE", "http://127.0.0.1:6101/prestop"]
imagePullPolicy: IfNotPresent
resources:
requests:
memory: "2G"
limits:
memory: "2G"
volumeMounts:
- name: config
mountPath: "/config"
ports:
-
containerPort: 6104
env:
- name: NODE_TYPE
value: dn
- name: DN_PORT
value: "6104"
- name: AWS_ACCESS_KEY_ID
valueFrom:
secretKeyRef:
name: aws-auth-keys
key: aws_access_key_id
- name: AWS_SECRET_ACCESS_KEY
valueFrom:
secretKeyRef:
name: aws-auth-keys
key: aws_secret_access_key
-
name: rangeget
image: "hdfgroup/hsds:v0.7.0beta6"
imagePullPolicy: IfNotPresent
resources:
requests:
memory: "2G"
limits:
memory: "2G"
volumeMounts:
- name: config
mountPath: "/config"
ports:
-
containerPort: 6900
env:
- name: NODE_TYPE
value: rangeget
- name: AWS_ACCESS_KEY_ID
valueFrom:
secretKeyRef:
name: aws-auth-keys
key: aws_access_key_id
- name: AWS_SECRET_ACCESS_KEY
valueFrom:
secretKeyRef:
name: aws-auth-keys
key: aws_secret_access_key
volumes:
- name: accounts
secret:
secretName: user-password
- name: config
configMap:
name: hsds-config | 27.242678 | 91 | 0.44709 |
f7b74c7aa7acbffb66b4c0442a4e9f3494dd0f3e | 778 | yaml | YAML | deploy/test-cronjob.yaml | LuckySB/bank-vaults | c4c96c7e455828aa6a8f854a2807da2acd542ff9 | [
"Apache-2.0"
] | 1,667 | 2018-03-11T01:59:11.000Z | 2022-03-31T13:22:06.000Z | deploy/test-cronjob.yaml | LuckySB/bank-vaults | c4c96c7e455828aa6a8f854a2807da2acd542ff9 | [
"Apache-2.0"
] | 930 | 2018-04-16T11:54:26.000Z | 2022-03-31T22:23:02.000Z | deploy/test-cronjob.yaml | LuckySB/bank-vaults | c4c96c7e455828aa6a8f854a2807da2acd542ff9 | [
"Apache-2.0"
] | 452 | 2018-04-16T11:06:19.000Z | 2022-03-30T15:05:21.000Z | apiVersion: batch/v1beta1
kind: CronJob
metadata:
name: hello
spec:
schedule: "*/1 * * * *"
jobTemplate:
spec:
template:
metadata:
labels:
app.kubernetes.io/name: hello-secrets
annotations:
vault.security.banzaicloud.io/vault-addr: "https://vault:8200"
vault.security.banzaicloud.io/vault-tls-secret: vault-tls
spec:
containers:
- name: alpine
image: alpine
command: ["sh", "-c", "echo $AWS_SECRET_ACCESS_KEY"]
env:
- name: AWS_SECRET_ACCESS_KEY
value: vault:secret/data/accounts/aws#${.AWS_SECRET_ACCESS_KEY} # Go templates are also supported with ${} delimiters
restartPolicy: OnFailure | 32.416667 | 131 | 0.580977 |
f7b752ec4e1b6948547a2bec2e9434b46cf32b4a | 194 | yaml | YAML | baas-smoke-tests/src/test/resources/kubernetes/interactions-example-update-config-map.yaml | axbaretto/baker | 97aac7c4eee8f093b485b3d5defd71acd006875d | [
"MIT"
] | 1 | 2020-05-27T16:09:16.000Z | 2020-05-27T16:09:16.000Z | baas-smoke-tests/src/test/resources/kubernetes/interactions-example-update-config-map.yaml | axbaretto/baker | 97aac7c4eee8f093b485b3d5defd71acd006875d | [
"MIT"
] | null | null | null | baas-smoke-tests/src/test/resources/kubernetes/interactions-example-update-config-map.yaml | axbaretto/baker | 97aac7c4eee8f093b485b3d5defd71acd006875d | [
"MIT"
] | null | null | null | apiVersion: v1
kind: ConfigMap
metadata:
name: reserve-items
labels:
custom-resource-definition: interactions
data:
image: baas-interaction-example-reserve-items:local
replicas: "3"
| 19.4 | 53 | 0.762887 |
f7b77553d0a0672109f1b7e362016603d559695a | 743 | yaml | YAML | .tuber/review-app-reaper.yaml | inmanjo2021/tuber | d0ed88a46462a86eba65a9b82eee37bcb4b29fde | [
"MIT"
] | 6 | 2020-02-21T12:51:25.000Z | 2021-08-07T20:04:36.000Z | .tuber/review-app-reaper.yaml | inmanjo2021/tuber | d0ed88a46462a86eba65a9b82eee37bcb4b29fde | [
"MIT"
] | 67 | 2019-12-24T15:57:05.000Z | 2022-03-04T22:47:27.000Z | .tuber/review-app-reaper.yaml | inmanjo2021/tuber | d0ed88a46462a86eba65a9b82eee37bcb4b29fde | [
"MIT"
] | 2 | 2021-11-04T17:59:27.000Z | 2021-11-18T20:50:47.000Z | apiVersion: batch/v1beta1
kind: CronJob
metadata:
name: review-app-reaper
spec:
# 6AM EDT, Tuesday through Saturday.
schedule: "0 10 * * 2-6"
startingDeadlineSeconds: 20
concurrencyPolicy: Forbid
jobTemplate:
spec:
backoffLimit: 0
template:
metadata:
annotations:
sidecar.istio.io/inject: "false"
spec:
serviceAccountName: tuber
restartPolicy: Never
containers:
- name: review-app-reaper
image: "{{ .tuberImage }}"
command: [ "tuber", "review-app-reaper" ]
envFrom:
- secretRef:
name: tuber-env
terminationMessagePolicy: FallbackToLogsOnError
| 26.535714 | 61 | 0.567968 |
f7b78c42cea3f811c28177063c42593e105be4cc | 419 | yaml | YAML | hello-spring-framework-mvcboot/src/main/docker/simple-mvcboot-replicationcontroller.yaml | StepanMelnik/HelloSpringFramework | 7cf2c90388f63a34cccadc49c363a6a9bf935736 | [
"Apache-2.0"
] | null | null | null | hello-spring-framework-mvcboot/src/main/docker/simple-mvcboot-replicationcontroller.yaml | StepanMelnik/HelloSpringFramework | 7cf2c90388f63a34cccadc49c363a6a9bf935736 | [
"Apache-2.0"
] | null | null | null | hello-spring-framework-mvcboot/src/main/docker/simple-mvcboot-replicationcontroller.yaml | StepanMelnik/HelloSpringFramework | 7cf2c90388f63a34cccadc49c363a6a9bf935736 | [
"Apache-2.0"
] | null | null | null | apiVersion: v1
kind: ReplicationController
metadata:
labels:
app: simple-mvcboot
name: simple-mvcboot
namespace: default
spec:
replicas: 2
template:
metadata:
labels:
app: simple-mvcboot
spec:
containers:
-
image: sme/simple-mvc-boot:0.1
name: simple-mvcboot
ports:
-
containerPort: 8040
name: http
| 18.217391 | 40 | 0.560859 |
f7b7b3cd7ec55685df4258867160841977f99285 | 2,106 | yaml | YAML | config/prow/cluster/prow_controller_manager_deployment.yaml | PushkarJ/test-infra | af3a39ed9be5408d102aa049064308ea8e03f358 | [
"Apache-2.0"
] | null | null | null | config/prow/cluster/prow_controller_manager_deployment.yaml | PushkarJ/test-infra | af3a39ed9be5408d102aa049064308ea8e03f358 | [
"Apache-2.0"
] | null | null | null | config/prow/cluster/prow_controller_manager_deployment.yaml | PushkarJ/test-infra | af3a39ed9be5408d102aa049064308ea8e03f358 | [
"Apache-2.0"
] | null | null | null | # Copyright 2020 The Kubernetes Authors All rights reserved.
#
# Licensed under the Apache License, Version 2.0 (the "License");
# you may not use this file except in compliance with the License.
# You may obtain a copy of the License at
#
# http://www.apache.org/licenses/LICENSE-2.0
#
# Unless required by applicable law or agreed to in writing, software
# distributed under the License is distributed on an "AS IS" BASIS,
# WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
# See the License for the specific language governing permissions and
# limitations under the License.
apiVersion: apps/v1
kind: Deployment
metadata:
namespace: default
name: prow-controller-manager
labels:
app: prow-controller-manager
spec:
# Mutually exclusive with plank. Only one of them may have more than zero replicas.
replicas: 1
revisionHistoryLimit: 2
selector:
matchLabels:
app: prow-controller-manager
template:
metadata:
labels:
app: prow-controller-manager
spec:
serviceAccountName: prow-controller-manager
containers:
- name: prow-controller-manager
image: gcr.io/k8s-prow/prow-controller-manager:v20210707-32dc49e04b
args:
- --config-path=/etc/config/config.yaml
- --dry-run=false
- --enable-controller=plank
- --job-config-path=/etc/job-config
env:
# Use KUBECONFIG envvar rather than --kubeconfig flag in order to provide multiple configs to merge.
- name: KUBECONFIG
value: "/etc/kubeconfig/config"
volumeMounts:
- mountPath: /etc/kubeconfig
name: kubeconfig
readOnly: true
- name: config
mountPath: /etc/config
readOnly: true
- name: job-config
mountPath: /etc/job-config
readOnly: true
volumes:
- name: kubeconfig
secret:
defaultMode: 420
secretName: kubeconfig
- name: config
configMap:
name: config
- name: job-config
configMap:
name: job-config
| 30.970588 | 108 | 0.65622 |
f7b7bfb79989136c24bdc9d9f1241f0d9ab01ee2 | 533 | yaml | YAML | test/validatingwebhookconfiguration.yaml | felixkrohn/cert-utils-operator | dd39c149ba9d3855b4572a41a0d2be44cc2572af | [
"Apache-2.0"
] | 55 | 2019-05-01T13:44:44.000Z | 2022-03-09T07:56:51.000Z | test/validatingwebhookconfiguration.yaml | felixkrohn/cert-utils-operator | dd39c149ba9d3855b4572a41a0d2be44cc2572af | [
"Apache-2.0"
] | 79 | 2019-05-05T11:39:13.000Z | 2022-03-31T18:24:14.000Z | test/validatingwebhookconfiguration.yaml | felixkrohn/cert-utils-operator | dd39c149ba9d3855b4572a41a0d2be44cc2572af | [
"Apache-2.0"
] | 28 | 2019-04-20T17:25:22.000Z | 2022-02-23T23:42:30.000Z | ---
apiVersion: admissionregistration.k8s.io/v1
kind: ValidatingWebhookConfiguration
metadata:
name: vwc
annotations:
cert-utils-operator.redhat-cop.io/injectca-from-secret: test-cert-utils/test1
webhooks:
- name: validating.webhook.configuration
sideEffects: None
admissionReviewVersions:
- v1
rules:
- apiGroups:
- "ciao"
apiVersions:
- v1
operations:
- CREATE
resources:
- ciaos
scope: "Namespaced"
clientConfig:
service:
namespace: webhookns
name: webhook | 20.5 | 81 | 0.690432 |