This is an OpenPGP proof that connects my OpenPGP key to this Github account. For details check out https://keyoxide.org/guides/openpgp-proofs
[Verifying my OpenPGP key: openpgp4fpr:CFDC4B62611448B6B47CA8A8294EEE1A896A6F84]
This is an OpenPGP proof that connects my OpenPGP key to this Github account. For details check out https://keyoxide.org/guides/openpgp-proofs
[Verifying my OpenPGP key: openpgp4fpr:CFDC4B62611448B6B47CA8A8294EEE1A896A6F84]
apiVersion: v1 | |
items: | |
- apiVersion: apiextensions.k8s.io/v1beta1 | |
kind: CustomResourceDefinition | |
metadata: | |
annotations: | |
kubectl.kubernetes.io/last-applied-configuration: | | |
{"apiVersion":"apiextensions.k8s.io/v1beta1","kind":"CustomResourceDefinition","metadata":{"annotations":{},"name":"awsiamroles.zalando.org"},"spec":{"additionalPrinterColumns":[{"JSONPath":".status.roleARN","description":"Full RoleARN","name":"RoleARN","type":"string"},{"JSONPath":".status.expiration","description":"Expiration time of the current credentials provisioned for the role","name":"Expiration","type":"string"}],"group":"zalando.org","names":{"categories":["all"],"kind":"AWSIAMRole","plural":"awsiamroles","singular":"awsiamrole"},"scope":"Namespaced","subresources":{"status":{}},"validation":{"openAPIV3Schema":{"properties":{"spec":{"properties":{"roleReference":{"description":"Reference to an AWS IAM role which can either be a role name\nor a full IAM role ARN.\n","minLength":3,"type":"string"},"roleSessionDu |
def check(): | |
prometheus_url = "http://prometheus.kube-system.svc.cluster.local./api/v1/query" | |
metrics = {"_use_scheduled_time": True} | |
try: | |
container_selector = """{{container_name="{container_name}", pod_name="{pod_name}", namespace="{pod_namespace}"}}""".format(**entity) | |
def request_prometheus_metric(query): | |
params={"query": query.format(container_selector=container_selector)} |
kind: ClusterRole | |
apiVersion: rbac.authorization.k8s.io/v1 | |
metadata: | |
name: system:aggregated-metrics-reader | |
labels: | |
rbac.authorization.k8s.io/aggregate-to-view: "true" | |
rbac.authorization.k8s.io/aggregate-to-edit: "true" | |
rbac.authorization.k8s.io/aggregate-to-admin: "true" | |
rules: | |
- apiGroups: ["metrics.k8s.io"] |
#!/usr/bin/env python3 | |
import sys | |
from pygments import highlight | |
from pygments.lexers import BashLexer | |
from pygments.formatters import HtmlFormatter | |
print(highlight(sys.stdin.read(), BashLexer(), HtmlFormatter(full=True))) |
This Gist is now deprecated and the list of organizations running Kubernetes on AWS is hosted on https://github.com/hjacobs/kubernetes-on-aws-users
apiVersion: extensions/v1beta1 | |
kind: DaemonSet | |
metadata: | |
name: add-my-ssh-key | |
labels: | |
application: add-my-ssh-key | |
spec: | |
template: | |
metadata: | |
name: add-my-ssh-key |
apiVersion: v1 | |
kind: Pod | |
metadata: | |
name: host-access | |
spec: | |
# use a node selector matching the desired target node | |
nodeSelector: | |
kubernetes.io/hostname: ip-172-31-1-2.eu-central-1.compute.internal | |
containers: | |
- name: shell |
I hereby claim:
To claim this, I am signing this object: