I hereby claim:
- I am abatilo on github.
- I am abatilo (https://keybase.io/abatilo) on keybase.
- I have a public key ASBj4Bn3TezS05hHpJOC9GEht3EPE2hH8UCfVnGGI-YacQo
To claim this, I am signing this object:
export ZSH="$HOME/.oh-my-zsh" | |
ZSH_THEME="pygmalion" | |
plugins=( | |
mise | |
fzf | |
git | |
kubectl | |
) |
package gogptindex | |
import ( | |
"context" | |
_ "embed" | |
"encoding/json" | |
"fmt" | |
"net/http" | |
"os" | |
"os/signal" |
apiVersion: apps.kruise.io/v1alpha1 | |
kind: ImagePullJob | |
metadata: | |
name: sudokurace | |
namespace: kruise-system | |
spec: | |
image: '911907402684.dkr.ecr.us-west-2.amazonaws.com/sudokurace:' # Tag set by kustomization.yaml | |
pullSecrets: | |
# Must match https://gist.github.com/abatilo/6b287265d541d06da567893c1522999f#file-imagepulljob-tf-L3 | |
- kruise-ecr-token |
locals { | |
kruise_ecr_token_updater_service_account = "kruise-ecr-token-updater" | |
kruise_ecr_token_secret_name = "kruise-ecr-token" | |
kruise_ecr_token_updater_script = <<EOF | |
ECR_TOKEN=`aws ecr get-login-password --region $${AWS_REGION}` | |
NAMESPACE_NAME=${kubernetes_namespace.kruise_system.metadata[0].name} | |
kubectl delete secret --ignore-not-found $DOCKER_SECRET_NAME -n $NAMESPACE_NAME | |
kubectl create secret docker-registry $DOCKER_SECRET_NAME \ |
locals { | |
kruise_ecr_token_updater_service_account = "kruise-ecr-token-updater" | |
kruise_ecr_token_secret_name = "kruise-ecr-token" | |
kruise_ecr_token_updater_script = <<EOF | |
ECR_TOKEN=`aws ecr get-login-password --region $${AWS_REGION}` | |
NAMESPACE_NAME=${kubernetes_namespace.kruise_system.metadata[0].name} | |
kubectl delete secret --ignore-not-found $DOCKER_SECRET_NAME -n $NAMESPACE_NAME | |
kubectl create secret docker-registry $DOCKER_SECRET_NAME \ |
name: Print rate limits | |
on: | |
push: | |
jobs: | |
rate-limit: | |
runs-on: ubuntu-latest | |
steps: | |
- name: Generate token | |
id: generate_token |
DROP TABLE IF EXISTS sent; | |
DROP TABLE IF EXISTS message; | |
DROP TABLE IF EXISTS recipient; | |
CREATE TABLE IF NOT EXISTS recipient ( | |
id serial primary key | |
); | |
CREATE TABLE IF NOT EXISTS message ( | |
id serial primary key |
I hereby claim:
To claim this, I am signing this object:
time="2020-10-13T12:08:28Z" level=info msg="Started syncing rollout at (2020-10-13 12:08:28.976596472 +0000 UTC m=+0.127703923)" namespace=default rollout=nginx | |
time="2020-10-13T12:08:28Z" level=warning msg="Assuming 7b54fb9677 for new replicaset pod hash" namespace=default rollout=nginx | |
time="2020-10-13T12:08:28Z" level=info msg="Patched: {\"status\":{\"conditions\":[{\"lastTransitionTime\":\"2020-10-13T12:08:28Z\",\"lastUpdateTime\":\"2020-10-13T12:08:28Z\",\"message\":\"Rollout \\\"nginx\\\" is progressing.\",\"reason\":\"ReplicaSetUpdated\",\"status\":\"True\",\"type\":\"Progressing\"},{\"lastTransitionTime\":\"2020-10-13T12:08:28Z\",\"lastUpdateTime\":\"2020-10-13T12:08:28Z\",\"message\":\"Rollout does not have minimum availability\",\"reason\":\"AvailableReason\",\"status\":\"False\",\"type\":\"Available\"}],\"currentPodHash\":\"7b54fb9677\",\"currentStepHash\":\"8cd479c8f\",\"currentStepIndex\":0,\"observedGeneration\":\"58c975674b\",\"selector\":\"app=nginx\"}}" namespace=default rollout=nginx | |
time="2 |
time="2020-10-13T12:08:28Z" level=info msg="Creating event broadcaster" | |
time="2020-10-13T12:08:28Z" level=info msg="Setting up event handlers" | |
time="2020-10-13T12:08:28Z" level=info msg="Setting up experiments event handlers" | |
time="2020-10-13T12:08:28Z" level=info msg="Setting up analysis event handlers" | |
time="2020-10-13T12:08:28Z" level=info msg="Waiting for controller's informer caches to sync" | |
time="2020-10-13T12:08:28Z" level=info msg="Starting Controllers" | |
time="2020-10-13T12:08:28Z" level=info msg="Started controller" | |
time="2020-10-13T12:08:28Z" level=info msg="Starting Metric Server at 0.0.0.0:8090" | |
time="2020-10-13T12:08:28Z" level=info msg="Starting Rollout workers" | |
time="2020-10-13T12:08:28Z" level=info msg="Starting Experiment workers" |