hexsha
stringlengths 40
40
| size
int64 24
1.05M
| ext
stringclasses 2
values | lang
stringclasses 1
value | max_stars_repo_path
stringlengths 5
269
| max_stars_repo_name
stringlengths 7
107
| max_stars_repo_head_hexsha
stringlengths 40
78
| max_stars_repo_licenses
sequence | max_stars_count
int64 1
84.9k
⌀ | max_stars_repo_stars_event_min_datetime
stringlengths 24
24
⌀ | max_stars_repo_stars_event_max_datetime
stringlengths 24
24
⌀ | max_issues_repo_path
stringlengths 5
269
| max_issues_repo_name
stringlengths 7
107
| max_issues_repo_head_hexsha
stringlengths 40
78
| max_issues_repo_licenses
sequence | max_issues_count
int64 1
116k
⌀ | max_issues_repo_issues_event_min_datetime
stringlengths 24
24
⌀ | max_issues_repo_issues_event_max_datetime
stringlengths 24
24
⌀ | max_forks_repo_path
stringlengths 5
269
| max_forks_repo_name
stringlengths 7
107
| max_forks_repo_head_hexsha
stringlengths 40
78
| max_forks_repo_licenses
sequence | max_forks_count
int64 1
55.9k
⌀ | max_forks_repo_forks_event_min_datetime
stringlengths 24
24
⌀ | max_forks_repo_forks_event_max_datetime
stringlengths 24
24
⌀ | content
stringlengths 24
1.05M
| avg_line_length
float64 1
304k
| max_line_length
int64 14
1.03M
| alphanum_fraction
float64 0
1
|
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
73f8d037f5a8ee7bd619f498b432ff48d84482e5 | 159 | yaml | YAML | kustomize/base/service.yaml | k8s-labs-google/example-kustomize | fc40a34bddef59ac075b1f4cf5db28b33fa4e9ab | [
"Apache-2.0"
] | 1 | 2021-02-28T23:54:00.000Z | 2021-02-28T23:54:00.000Z | kustomize/base/service.yaml | k8s-labs-google/example-kustomize | fc40a34bddef59ac075b1f4cf5db28b33fa4e9ab | [
"Apache-2.0"
] | null | null | null | kustomize/base/service.yaml | k8s-labs-google/example-kustomize | fc40a34bddef59ac075b1f4cf5db28b33fa4e9ab | [
"Apache-2.0"
] | 1 | 2021-02-28T23:53:56.000Z | 2021-02-28T23:53:56.000Z | apiVersion: v1
kind: Service
metadata:
name: nginx
spec:
selector:
app: nginx
ports:
- protocol: TCP
port: 80
targetPort: nginx-port
| 13.25 | 28 | 0.63522 |
73f971d3297f1dd8ce81f06e6a3fb04a93e34982 | 219 | yaml | YAML | metallb/metallb-configmap.yaml | currycan/kube-addons | 4d5658cf88cb5c4cc888b51409d9ebec6a121617 | [
"Apache-2.0"
] | 1 | 2022-01-27T06:59:51.000Z | 2022-01-27T06:59:51.000Z | metallb/metallb-configmap.yaml | currycan/kube-addons | 4d5658cf88cb5c4cc888b51409d9ebec6a121617 | [
"Apache-2.0"
] | null | null | null | metallb/metallb-configmap.yaml | currycan/kube-addons | 4d5658cf88cb5c4cc888b51409d9ebec6a121617 | [
"Apache-2.0"
] | null | null | null | apiVersion: v1
kind: ConfigMap
metadata:
namespace: metallb-system
name: config
data:
config: |
address-pools:
- name: default
protocol: layer2
addresses:
- 172.16.240.150-172.16.240.210
| 16.846154 | 37 | 0.652968 |
73fa41579675c99739597c1c3cfacb715b1be6bd | 140 | yaml | YAML | redisservice.yaml | btwseeu78/cka | 223466a7eab94083ce1652a5120f27816c54ede3 | [
"Apache-2.0"
] | null | null | null | redisservice.yaml | btwseeu78/cka | 223466a7eab94083ce1652a5120f27816c54ede3 | [
"Apache-2.0"
] | null | null | null | redisservice.yaml | btwseeu78/cka | 223466a7eab94083ce1652a5120f27816c54ede3 | [
"Apache-2.0"
] | null | null | null | apiVersion: v1
kind: Service
metadata:
name: messaging-service
spec:
selector:
tier: msg
ports:
- port: 6379
name: http
| 12.727273 | 25 | 0.65 |
73fa8da04f3b670b2fcd84584b5f4ad1e2ca822a | 306 | yaml | YAML | deploy/operator/cluster-role-binding.yaml | churromechanic/churro | d0d005aa9375b9acfe6ce4a4a763194019926476 | [
"BSD-3-Clause",
"MIT"
] | 11 | 2021-09-21T10:43:27.000Z | 2022-03-10T23:13:39.000Z | deploy/operator/cluster-role-binding.yaml | churromechanic/churro | d0d005aa9375b9acfe6ce4a4a763194019926476 | [
"BSD-3-Clause",
"MIT"
] | null | null | null | deploy/operator/cluster-role-binding.yaml | churromechanic/churro | d0d005aa9375b9acfe6ce4a4a763194019926476 | [
"BSD-3-Clause",
"MIT"
] | 4 | 2021-09-14T21:12:22.000Z | 2021-10-04T20:16:45.000Z | kind: ClusterRoleBinding
apiVersion: rbac.authorization.k8s.io/v1
metadata:
name: churro-operator
roleRef:
apiGroup: rbac.authorization.k8s.io
kind: ClusterRole
name: churro-operator
subjects:
- apiGroup: rbac.authorization.k8s.io
kind: User
name: system:serviceaccount:churro:churro-operator
| 21.857143 | 52 | 0.79085 |
73faa72c6ff2d29361819d217c162be727689247 | 10,591 | yaml | YAML | modules/021-cni-cilium/crds/ciliumegressnatpolicies.yaml | kvaps/deckhouse | df5caacecb29ab69184559c45196b0d554eab1a5 | [
"Apache-2.0"
] | null | null | null | modules/021-cni-cilium/crds/ciliumegressnatpolicies.yaml | kvaps/deckhouse | df5caacecb29ab69184559c45196b0d554eab1a5 | [
"Apache-2.0"
] | 8 | 2022-03-13T23:35:39.000Z | 2022-03-22T22:33:07.000Z | modules/021-cni-cilium/crds/ciliumegressnatpolicies.yaml | kvaps/deckhouse | df5caacecb29ab69184559c45196b0d554eab1a5 | [
"Apache-2.0"
] | null | null | null |
---
apiVersion: apiextensions.k8s.io/v1
kind: CustomResourceDefinition
metadata:
annotations:
controller-gen.kubebuilder.io/version: v0.6.2
labels:
heritage: deckhouse
module: deckhouse
name: ciliumegressnatpolicies.cilium.io
spec:
group: cilium.io
names:
categories:
- cilium
- ciliumpolicy
kind: CiliumEgressNATPolicy
listKind: CiliumEgressNATPolicyList
plural: ciliumegressnatpolicies
singular: ciliumegressnatpolicy
scope: Cluster
versions:
- additionalPrinterColumns:
- jsonPath: .metadata.creationTimestamp
name: Age
type: date
name: v2alpha1
schema:
openAPIV3Schema:
properties:
apiVersion:
description: 'APIVersion defines the versioned schema of this representation
of an object. Servers should convert recognized schemas to the latest
internal value, and may reject unrecognized values. More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#resources'
type: string
kind:
description: 'Kind is a string value representing the REST resource this
object represents. Servers may infer this from the endpoint the client
submits requests to. Cannot be updated. In CamelCase. More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#types-kinds'
type: string
metadata:
type: object
spec:
properties:
destinationCIDRs:
description: DestinationCIDRs is a list of destination CIDRs for destination
IP addresses. If a destination IP matches any one CIDR, it will
be selected.
items:
pattern: ^(?:(?:25[0-5]|2[0-4][0-9]|[01]?[0-9][0-9]?)\.){3}(?:25[0-5]|2[0-4][0-9]|[01]?[0-9][0-9]?)\/([0-9]|[1-2][0-9]|3[0-2])$
type: string
type: array
egress:
description: Egress represents a list of rules by which egress traffic
is filtered from the source pods.
items:
properties:
namespaceSelector:
description: Selects Namespaces using cluster-scoped labels.
This field follows standard label selector semantics; if present
but empty, it selects all namespaces.
properties:
matchExpressions:
description: matchExpressions is a list of label selector
requirements. The requirements are ANDed.
items:
description: A label selector requirement is a selector
that contains values, a key, and an operator that relates
the key and values.
properties:
key:
description: key is the label key that the selector
applies to.
type: string
operator:
description: operator represents a key's relationship
to a set of values. Valid operators are In, NotIn,
Exists and DoesNotExist.
enum:
- In
- NotIn
- Exists
- DoesNotExist
type: string
values:
description: values is an array of string values.
If the operator is In or NotIn, the values array
must be non-empty. If the operator is Exists or
DoesNotExist, the values array must be empty. This
array is replaced during a strategic merge patch.
items:
type: string
type: array
required:
- key
- operator
type: object
type: array
matchLabels:
additionalProperties:
description: MatchLabelsValue represents the value from
the MatchLabels {key,value} pair.
maxLength: 63
pattern: ^(([A-Za-z0-9][-A-Za-z0-9_.]*)?[A-Za-z0-9])?$
type: string
description: matchLabels is a map of {key,value} pairs.
A single {key,value} in the matchLabels map is equivalent
to an element of matchExpressions, whose key field is
"key", the operator is "In", and the values array contains
only "value". The requirements are ANDed.
type: object
type: object
podSelector:
description: This is a label selector which selects Pods. This
field follows standard label selector semantics; if present
but empty, it selects all pods.
properties:
matchExpressions:
description: matchExpressions is a list of label selector
requirements. The requirements are ANDed.
items:
description: A label selector requirement is a selector
that contains values, a key, and an operator that relates
the key and values.
properties:
key:
description: key is the label key that the selector
applies to.
type: string
operator:
description: operator represents a key's relationship
to a set of values. Valid operators are In, NotIn,
Exists and DoesNotExist.
enum:
- In
- NotIn
- Exists
- DoesNotExist
type: string
values:
description: values is an array of string values.
If the operator is In or NotIn, the values array
must be non-empty. If the operator is Exists or
DoesNotExist, the values array must be empty. This
array is replaced during a strategic merge patch.
items:
type: string
type: array
required:
- key
- operator
type: object
type: array
matchLabels:
additionalProperties:
description: MatchLabelsValue represents the value from
the MatchLabels {key,value} pair.
maxLength: 63
pattern: ^(([A-Za-z0-9][-A-Za-z0-9_.]*)?[A-Za-z0-9])?$
type: string
description: matchLabels is a map of {key,value} pairs.
A single {key,value} in the matchLabels map is equivalent
to an element of matchExpressions, whose key field is
"key", the operator is "In", and the values array contains
only "value". The requirements are ANDed.
type: object
type: object
type: object
type: array
egressSourceIP:
description: "EgressSourceIP is a source ip address that the egress
traffic is redirected to and SNATed with. \n Example: When it is
set to \"192.168.1.100\", matched egress packets will be redirected
to node with ip 192.168.1.100 and SNAT’ed with IP address 192.168.1.100."
pattern: ((^\s*((([0-9]|[1-9][0-9]|1[0-9]{2}|2[0-4][0-9]|25[0-5])\.){3}([0-9]|[1-9][0-9]|1[0-9]{2}|2[0-4][0-9]|25[0-5]))\s*$)|(^\s*((([0-9A-Fa-f]{1,4}:){7}([0-9A-Fa-f]{1,4}|:))|(([0-9A-Fa-f]{1,4}:){6}(:[0-9A-Fa-f]{1,4}|((25[0-5]|2[0-4]\d|1\d\d|[1-9]?\d)(\.(25[0-5]|2[0-4]\d|1\d\d|[1-9]?\d)){3})|:))|(([0-9A-Fa-f]{1,4}:){5}(((:[0-9A-Fa-f]{1,4}){1,2})|:((25[0-5]|2[0-4]\d|1\d\d|[1-9]?\d)(\.(25[0-5]|2[0-4]\d|1\d\d|[1-9]?\d)){3})|:))|(([0-9A-Fa-f]{1,4}:){4}(((:[0-9A-Fa-f]{1,4}){1,3})|((:[0-9A-Fa-f]{1,4})?:((25[0-5]|2[0-4]\d|1\d\d|[1-9]?\d)(\.(25[0-5]|2[0-4]\d|1\d\d|[1-9]?\d)){3}))|:))|(([0-9A-Fa-f]{1,4}:){3}(((:[0-9A-Fa-f]{1,4}){1,4})|((:[0-9A-Fa-f]{1,4}){0,2}:((25[0-5]|2[0-4]\d|1\d\d|[1-9]?\d)(\.(25[0-5]|2[0-4]\d|1\d\d|[1-9]?\d)){3}))|:))|(([0-9A-Fa-f]{1,4}:){2}(((:[0-9A-Fa-f]{1,4}){1,5})|((:[0-9A-Fa-f]{1,4}){0,3}:((25[0-5]|2[0-4]\d|1\d\d|[1-9]?\d)(\.(25[0-5]|2[0-4]\d|1\d\d|[1-9]?\d)){3}))|:))|(([0-9A-Fa-f]{1,4}:){1}(((:[0-9A-Fa-f]{1,4}){1,6})|((:[0-9A-Fa-f]{1,4}){0,4}:((25[0-5]|2[0-4]\d|1\d\d|[1-9]?\d)(\.(25[0-5]|2[0-4]\d|1\d\d|[1-9]?\d)){3}))|:))|(:(((:[0-9A-Fa-f]{1,4}){1,7})|((:[0-9A-Fa-f]{1,4}){0,5}:((25[0-5]|2[0-4]\d|1\d\d|[1-9]?\d)(\.(25[0-5]|2[0-4]\d|1\d\d|[1-9]?\d)){3}))|:)))(%.+)?\s*$))
type: string
required:
- destinationCIDRs
- egress
- egressSourceIP
type: object
required:
- metadata
type: object
served: true
storage: true
subresources: {}
status:
acceptedNames:
kind: ""
plural: ""
conditions: []
storedVersions: []
| 54.312821 | 1,224 | 0.445567 |
73fab82f161841610f1d89dc15e7577eb4004d9c | 188 | yaml | YAML | k8s/tenants/base/guests/networkpolicy.yaml | ShirMon/k8s-gitops | 82363fea038bfae82d7d036760694d9c42fcc000 | [
"Apache-2.0"
] | 182 | 2021-01-25T02:21:29.000Z | 2022-03-31T06:02:08.000Z | k8s/tenants/base/guests/networkpolicy.yaml | Raspbernetes/k8s-cluster | 8bb455d5b94e0c0e31173ceb2f9f31156517e592 | [
"Apache-2.0"
] | 374 | 2021-01-25T02:02:21.000Z | 2022-03-15T03:16:54.000Z | k8s/tenants/base/guests/networkpolicy.yaml | Raspbernetes/k8s-cluster | 8bb455d5b94e0c0e31173ceb2f9f31156517e592 | [
"Apache-2.0"
] | 15 | 2020-05-17T09:17:17.000Z | 2021-01-17T14:10:25.000Z | ---
apiVersion: networking.k8s.io/v1
kind: NetworkPolicy
metadata:
name: default-deny-policy
spec:
podSelector: {}
policyTypes:
- Ingress
- Egress
ingress: []
egress: []
| 14.461538 | 32 | 0.664894 |
73fb774759f5551b6aff2575ffed45c01e983a45 | 278 | yaml | YAML | hack/testdata/null-propagation/deployment-l1.yaml | kamil-wydrzycki/kubernetes | d2f97bf90c1016947cad78822fe15ce2513e802f | [
"Apache-2.0"
] | 1 | 2019-03-27T13:52:48.000Z | 2019-03-27T13:52:48.000Z | hack/testdata/null-propagation/deployment-l1.yaml | kamil-wydrzycki/kubernetes | d2f97bf90c1016947cad78822fe15ce2513e802f | [
"Apache-2.0"
] | null | null | null | hack/testdata/null-propagation/deployment-l1.yaml | kamil-wydrzycki/kubernetes | d2f97bf90c1016947cad78822fe15ce2513e802f | [
"Apache-2.0"
] | null | null | null | apiVersion: apps/v1
kind: Deployment
metadata:
name: my-depl
labels:
l1: l1
spec:
selector:
matchLabels:
l1: l1
template:
metadata:
labels:
l1: l1
spec:
containers:
- name: nginx
image: registry.k8s.io/nginx:1.7.9
| 14.631579 | 42 | 0.57554 |
73fb7a3afabedadfdd6efccaf8fb88a72110f424 | 306 | yaml | YAML | config/rbac/role_binding.yaml | a2ush/kubebuilder-events-controller | fe905a620acd079dbaf7344b3c832d1e6e5ceecc | [
"Apache-2.0"
] | 1 | 2022-01-26T02:56:02.000Z | 2022-01-26T02:56:02.000Z | config/rbac/role_binding.yaml | a2ush/kubebuilder-events-controller | fe905a620acd079dbaf7344b3c832d1e6e5ceecc | [
"Apache-2.0"
] | 1 | 2022-03-24T23:43:05.000Z | 2022-03-24T23:43:05.000Z | config/rbac/role_binding.yaml | a2ush/kubebuilder-events-controller | fe905a620acd079dbaf7344b3c832d1e6e5ceecc | [
"Apache-2.0"
] | null | null | null | apiVersion: rbac.authorization.k8s.io/v1
kind: ClusterRoleBinding
metadata:
name: manager-rolebinding
roleRef:
apiGroup: rbac.authorization.k8s.io
kind: ClusterRole
name: manager-role
subjects:
- kind: ServiceAccount
name: kubebuilder-events-controller
namespace: kubebuilder-events-controller
| 23.538462 | 42 | 0.803922 |
73fbe85df309a4d31d674253d9ee5cbb55107e02 | 323 | yaml | YAML | namespaces/autoscaling.yaml | sroettger/35c3ctf_chals | 3d64486e6adddb3a3f3d2c041242b88b50abdb8d | [
"Apache-2.0"
] | 15 | 2019-07-10T16:50:17.000Z | 2022-01-23T14:28:17.000Z | namespaces/autoscaling.yaml | sroettger/35c3ctf_chals | 3d64486e6adddb3a3f3d2c041242b88b50abdb8d | [
"Apache-2.0"
] | 2 | 2020-01-18T11:19:04.000Z | 2021-04-27T13:30:33.000Z | namespaces/autoscaling.yaml | sroettger/35c3ctf_chals | 3d64486e6adddb3a3f3d2c041242b88b50abdb8d | [
"Apache-2.0"
] | 4 | 2020-01-09T20:14:30.000Z | 2021-04-23T07:47:27.000Z | apiVersion: "autoscaling/v1"
kind: "HorizontalPodAutoscaler"
metadata:
name: "namespaces-hpa"
namespace: "default"
labels:
app: "namespaces"
spec:
scaleTargetRef:
kind: "Deployment"
name: "namespaces"
apiVersion: "apps/v1beta1"
minReplicas: 1
maxReplicas: 5
targetCPUUtilizationPercentage: 80
| 20.1875 | 36 | 0.721362 |
73fbf95d4a98288dc3662d1646724142042cb7b2 | 343 | yaml | YAML | deploy/base/source/http/command-service.yaml | obabec/drogue-cloud | 16f8b5391624c7d5e2c3ecadc962fb0fe15707bd | [
"Apache-2.0"
] | null | null | null | deploy/base/source/http/command-service.yaml | obabec/drogue-cloud | 16f8b5391624c7d5e2c3ecadc962fb0fe15707bd | [
"Apache-2.0"
] | null | null | null | deploy/base/source/http/command-service.yaml | obabec/drogue-cloud | 16f8b5391624c7d5e2c3ecadc962fb0fe15707bd | [
"Apache-2.0"
] | null | null | null | kind: Service
apiVersion: v1
metadata:
name: http-command
labels:
app.kubernetes.io/name: http-command
app.kubernetes.io/part-of: endpoints
spec:
selector:
app.kubernetes.io/name: http-endpoint
app.kubernetes.io/part-of: endpoints
ports:
- name: command
protocol: TCP
port: 80
targetPort: command
| 20.176471 | 41 | 0.685131 |
73fc289ba9ece9e82ab2f525abca128748aff8b4 | 224 | yaml | YAML | cluster/apps/home/filebrowser/pvc-claim.yaml | kpfromer/home-cluster | 4d02f59b9e067833c8756334f3053d76e92feb1b | [
"MIT"
] | null | null | null | cluster/apps/home/filebrowser/pvc-claim.yaml | kpfromer/home-cluster | 4d02f59b9e067833c8756334f3053d76e92feb1b | [
"MIT"
] | 10 | 2021-08-12T21:46:13.000Z | 2021-12-10T11:40:22.000Z | cluster/apps/home/filebrowser/pvc-claim.yaml | kpfromer/home-cluster | 4d02f59b9e067833c8756334f3053d76e92feb1b | [
"MIT"
] | null | null | null | ---
apiVersion: v1
kind: PersistentVolumeClaim
metadata:
name: filebrowser-data
namespace: home
spec:
accessModes:
- ReadWriteOnce
storageClassName: longhorn-backup
resources:
requests:
storage: 50Gi
| 16 | 35 | 0.727679 |
73fc798f93eee9764d87fd5005349b691df3be7d | 1,802 | yaml | YAML | static/manifests/calico/CustomResourceDefinition/ipamhandles.crd.projectcalico.org.yaml | trawler/k0s | 457b41dd8603cf5f77cb427c5d34e1d75594d9ce | [
"Apache-2.0"
] | 4,604 | 2020-11-04T20:31:04.000Z | 2022-03-31T07:51:46.000Z | static/manifests/calico/CustomResourceDefinition/ipamhandles.crd.projectcalico.org.yaml | trawler/k0s | 457b41dd8603cf5f77cb427c5d34e1d75594d9ce | [
"Apache-2.0"
] | 763 | 2020-11-05T10:05:04.000Z | 2022-03-31T23:04:25.000Z | static/manifests/calico/CustomResourceDefinition/ipamhandles.crd.projectcalico.org.yaml | trawler/k0s | 457b41dd8603cf5f77cb427c5d34e1d75594d9ce | [
"Apache-2.0"
] | 264 | 2020-11-05T10:57:42.000Z | 2022-03-19T16:13:31.000Z | ---
apiVersion: apiextensions.k8s.io/v1
kind: CustomResourceDefinition
metadata:
name: ipamhandles.crd.projectcalico.org
spec:
group: crd.projectcalico.org
names:
kind: IPAMHandle
listKind: IPAMHandleList
plural: ipamhandles
singular: ipamhandle
scope: Cluster
versions:
- name: v1
schema:
openAPIV3Schema:
properties:
apiVersion:
description: 'APIVersion defines the versioned schema of this representation
of an object. Servers should convert recognized schemas to the latest
internal value, and may reject unrecognized values. More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#resources'
type: string
kind:
description: 'Kind is a string value representing the REST resource this
object represents. Servers may infer this from the endpoint the client
submits requests to. Cannot be updated. In CamelCase. More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#types-kinds'
type: string
metadata:
type: object
spec:
description: IPAMHandleSpec contains the specification for an IPAMHandle
resource.
properties:
block:
additionalProperties:
type: integer
type: object
deleted:
type: boolean
handleID:
type: string
required:
- block
- handleID
type: object
type: object
served: true
storage: true
status:
acceptedNames:
kind: ""
plural: ""
conditions: []
storedVersions: []
| 31.614035 | 175 | 0.610433 |
73fcb58f600615e2b6b8fc8cb2039e02aca36a26 | 503 | yaml | YAML | operators/flux/0.22.0/manifests/cluster-reconciler-flux-system.clusterrolebinding.yaml | davidesalerno/community-operators | 1a209358bc6a9931667181ef93896b25d5fda042 | [
"Apache-2.0"
] | 53 | 2021-07-18T09:23:52.000Z | 2022-03-24T18:48:37.000Z | operators/flux/0.22.0/manifests/cluster-reconciler-flux-system.clusterrolebinding.yaml | davidesalerno/community-operators | 1a209358bc6a9931667181ef93896b25d5fda042 | [
"Apache-2.0"
] | 974 | 2021-06-30T14:22:41.000Z | 2022-03-31T22:56:44.000Z | operators/flux/0.22.0/manifests/cluster-reconciler-flux-system.clusterrolebinding.yaml | davidesalerno/community-operators | 1a209358bc6a9931667181ef93896b25d5fda042 | [
"Apache-2.0"
] | 305 | 2021-07-15T09:04:42.000Z | 2022-03-30T08:20:29.000Z | apiVersion: rbac.authorization.k8s.io/v1
kind: ClusterRoleBinding
metadata:
labels:
app.kubernetes.io/instance: flux-system
app.kubernetes.io/part-of: flux
app.kubernetes.io/version: 0.22.0
name: cluster-reconciler-flux-system
roleRef:
apiGroup: rbac.authorization.k8s.io
kind: ClusterRole
name: cluster-admin
subjects:
- kind: ServiceAccount
name: kustomize-controller
namespace: flux-system
- kind: ServiceAccount
name: helm-controller
namespace: flux-system
| 25.15 | 43 | 0.747515 |
73fe27cc6f0fb191310c53a3a61811f8b6c05b7b | 1,247 | yaml | YAML | mock-data/large-cluster/k8s/rbac.authorization.k8s.io:ClusterRole/system:controller:pv-protection-controller.yaml | kubevious/logic-processor | f3b502fdd851fc955ddb00b39da589bbf05566e3 | [
"Apache-2.0"
] | null | null | null | mock-data/large-cluster/k8s/rbac.authorization.k8s.io:ClusterRole/system:controller:pv-protection-controller.yaml | kubevious/logic-processor | f3b502fdd851fc955ddb00b39da589bbf05566e3 | [
"Apache-2.0"
] | null | null | null | mock-data/large-cluster/k8s/rbac.authorization.k8s.io:ClusterRole/system:controller:pv-protection-controller.yaml | kubevious/logic-processor | f3b502fdd851fc955ddb00b39da589bbf05566e3 | [
"Apache-2.0"
] | 1 | 2022-01-16T20:19:54.000Z | 2022-01-16T20:19:54.000Z | kind: ClusterRole
apiVersion: rbac.authorization.k8s.io/v1
metadata:
name: 'system:controller:pv-protection-controller'
selfLink: >-
/apis/rbac.authorization.k8s.io/v1/clusterroles/system%3Acontroller%3Apv-protection-controller
uid: afa0bf33-3437-11ea-9cdc-42010a8001cf
resourceVersion: '61446118'
creationTimestamp: '2020-01-11T06:00:36Z'
labels:
kubernetes.io/bootstrapping: rbac-defaults
annotations:
rbac.authorization.kubernetes.io/autoupdate: 'true'
rules:
-
verbs:
- get
- list
- update
- watch
apiGroups:
- ''
resources:
- persistentvolumes
-
verbs:
- create
- patch
- update
apiGroups:
- ''
resources:
- events
-
verbs:
- create
apiGroups:
- events.k8s.io
resources:
- events
-
verbs:
- patch
apiGroups:
- events.k8s.io
resources:
- events
-
verbs:
- update
apiGroups:
- events.k8s.io
resources:
- events
| 22.267857 | 102 | 0.499599 |
73ff80058e8e394d13aad0b0d6321730f9cbf4fe | 233 | yaml | YAML | config/api/clusterrole_binding.yaml | CarlosRoGuerra/rpaas-operator | eb0fedc2a6f329828abdbe88275b9b01a0bf32cd | [
"BSD-3-Clause"
] | 25 | 2018-07-26T17:33:02.000Z | 2022-03-03T08:22:31.000Z | config/api/clusterrole_binding.yaml | CarlosRoGuerra/rpaas-operator | eb0fedc2a6f329828abdbe88275b9b01a0bf32cd | [
"BSD-3-Clause"
] | 18 | 2019-07-04T15:08:25.000Z | 2021-08-04T14:54:59.000Z | config/api/clusterrole_binding.yaml | CarlosRoGuerra/rpaas-operator | eb0fedc2a6f329828abdbe88275b9b01a0bf32cd | [
"BSD-3-Clause"
] | 20 | 2019-03-25T04:00:50.000Z | 2021-12-21T13:41:16.000Z | ---
apiVersion: rbac.authorization.k8s.io/v1
kind: ClusterRoleBinding
metadata:
name: api-rolebinding
roleRef:
apiGroup: rbac.authorization.k8s.io
kind: ClusterRole
name: api-role
subjects:
- kind: ServiceAccount
name: api
| 17.923077 | 40 | 0.763948 |
73ffd21644e57f3345618f6d5d0706f84258ada4 | 374 | yml | YAML | manifests/deployment-1.yml | suttisun/viya4-iac-azure-ori | 789019a99e1d3ab23725ac2b34857433bad6c55c | [
"Apache-2.0"
] | null | null | null | manifests/deployment-1.yml | suttisun/viya4-iac-azure-ori | 789019a99e1d3ab23725ac2b34857433bad6c55c | [
"Apache-2.0"
] | null | null | null | manifests/deployment-1.yml | suttisun/viya4-iac-azure-ori | 789019a99e1d3ab23725ac2b34857433bad6c55c | [
"Apache-2.0"
] | null | null | null | apiVersion : apps/v1
kind: Deployment
metadata:
name: "aks01-78f2"
spec:
replicas: 2
selector:
matchLabels:
app: "aks01-78f2"
template:
metadata:
labels:
app: "aks01-78f2"
spec:
containers:
- name: "aks01-78f2"
image: "aks01reg.azurecr.io/aks01"
ports:
- containerPort: 80 | 19.684211 | 45 | 0.542781 |
73ffd79ea3bc0495e9470cca341ef6b5031cff6a | 335 | yaml | YAML | wireguard-seed/wireguard-service.yaml | marwinski/vpn | 8cbf2187d2fc27834ec043aad6b18395f5fc8d68 | [
"Apache-2.0"
] | null | null | null | wireguard-seed/wireguard-service.yaml | marwinski/vpn | 8cbf2187d2fc27834ec043aad6b18395f5fc8d68 | [
"Apache-2.0"
] | null | null | null | wireguard-seed/wireguard-service.yaml | marwinski/vpn | 8cbf2187d2fc27834ec043aad6b18395f5fc8d68 | [
"Apache-2.0"
] | null | null | null | apiVersion: v1
kind: Service
metadata:
name: wireguard-vpn
namespace: wireguard
annotations:
service.beta.kubernetes.io/aws-load-balancer-type: "nlb"
spec:
ports:
- name: wireguard-port
port: 8777
protocol: UDP
targetPort: 10200
selector:
app: wireguard-vpn
sessionAffinity: None
type: LoadBalancer
| 18.611111 | 60 | 0.713433 |
73ffd8e908966c1aaaf374bbcb5469f0ebb94fc6 | 225 | yaml | YAML | archive/guestbook-network-policy.yaml | slmingol/kubernetes-networking | e66f0469fc55e9b9b034c5fec6f3813d245a1c7f | [
"Apache-2.0"
] | 21 | 2019-06-16T22:26:34.000Z | 2021-12-03T00:04:22.000Z | archive/guestbook-network-policy.yaml | slmingol/kubernetes-networking | e66f0469fc55e9b9b034c5fec6f3813d245a1c7f | [
"Apache-2.0"
] | 2 | 2020-08-24T19:14:56.000Z | 2021-01-20T17:08:10.000Z | archive/guestbook-network-policy.yaml | slmingol/kubernetes-networking | e66f0469fc55e9b9b034c5fec6f3813d245a1c7f | [
"Apache-2.0"
] | 33 | 2018-12-28T07:37:54.000Z | 2021-12-01T11:39:55.000Z | kind: NetworkPolicy
apiVersion: networking.k8s.io/v1
metadata:
name: redis-policy
spec:
podSelector:
matchLabels:
app: redis
ingress:
- from:
- podSelector:
matchLabels:
app: guestbook
| 16.071429 | 32 | 0.648889 |
73ffe6c89862d2415753641b431e3021a807e65a | 658 | yaml | YAML | manifests/grafana-dashboardSources.yaml | paulfantom/kube-prometheus | 6d013d4e4f980ba99cfdafa9432819d484e2f829 | [
"Apache-2.0"
] | null | null | null | manifests/grafana-dashboardSources.yaml | paulfantom/kube-prometheus | 6d013d4e4f980ba99cfdafa9432819d484e2f829 | [
"Apache-2.0"
] | 1 | 2021-12-08T09:44:42.000Z | 2021-12-14T15:04:52.000Z | manifests/grafana-dashboardSources.yaml | paulfantom/kube-prometheus | 6d013d4e4f980ba99cfdafa9432819d484e2f829 | [
"Apache-2.0"
] | null | null | null | apiVersion: v1
data:
dashboards.yaml: |-
{
"apiVersion": 1,
"providers": [
{
"folder": "Default",
"folderUid": "",
"name": "0",
"options": {
"path": "/grafana-dashboard-definitions/0"
},
"orgId": 1,
"type": "file"
}
]
}
kind: ConfigMap
metadata:
labels:
app.kubernetes.io/component: grafana
app.kubernetes.io/name: grafana
app.kubernetes.io/part-of: kube-prometheus
app.kubernetes.io/version: 8.2.6
name: grafana-dashboards
namespace: monitoring
| 23.5 | 62 | 0.477204 |
73fff33f930413bd01e6d24ed4e77c3441231a82 | 982 | yaml | YAML | deployment/smokeping-deployment.yaml | kubernetes-sl/smokeping-kubernetes | 2b8da7d0bc05b8fed7302f572614157b7562ec73 | [
"CC0-1.0"
] | 2 | 2021-12-03T03:09:47.000Z | 2022-01-15T06:53:06.000Z | deployment/smokeping-deployment.yaml | kubernetes-sl/smokeping-kubernetes | 2b8da7d0bc05b8fed7302f572614157b7562ec73 | [
"CC0-1.0"
] | null | null | null | deployment/smokeping-deployment.yaml | kubernetes-sl/smokeping-kubernetes | 2b8da7d0bc05b8fed7302f572614157b7562ec73 | [
"CC0-1.0"
] | 1 | 2022-01-15T06:27:30.000Z | 2022-01-15T06:27:30.000Z | apiVersion: apps/v1
kind: Deployment
metadata:
name: smokeping
namespace: smokeping
labels:
k8s-app: smokeping
spec:
strategy:
type: Recreate
replicas: 1
selector:
matchLabels:
k8s-app: smokeping
template:
metadata:
labels:
k8s-app: smokeping
spec:
containers:
- name: smokeping
image: linuxserver/smokeping:arm32v7-latest
imagePullPolicy: Always
ports:
- containerPort: 80
volumeMounts:
- mountPath: "/config"
name: config
- mountPath: "/data"
name: data
env:
- name: PUID
value: "1000"
- name: PGID
value: "1000"
- name: TZ
value: "Australia/Melbourne"
volumes:
- name: config
persistentVolumeClaim:
claimName: smokeping-config
- name: data
persistentVolumeClaim:
claimName: smokeping-data
| 21.822222 | 51 | 0.546843 |