Created
December 3, 2019 13:28
-
-
Save nak3/01585690d6f8b524373cd30ef3c093c3 to your computer and use it in GitHub Desktop.
This file has been truncated, but you can view the full file.
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
------- | |
resource: NAME | |
------- | |
------- | |
resource: bindings | |
------- | |
apiVersion: v1 | |
items: [] | |
kind: List | |
metadata: | |
resourceVersion: "" | |
selfLink: "" | |
------- | |
resource: componentstatuses | |
------- | |
apiVersion: v1 | |
items: | |
- apiVersion: v1 | |
conditions: | |
- message: ok | |
status: "True" | |
type: Healthy | |
kind: ComponentStatus | |
metadata: | |
creationTimestamp: null | |
name: scheduler | |
selfLink: /api/v1/componentstatuses/scheduler | |
- apiVersion: v1 | |
conditions: | |
- message: ok | |
status: "True" | |
type: Healthy | |
kind: ComponentStatus | |
metadata: | |
creationTimestamp: null | |
name: controller-manager | |
selfLink: /api/v1/componentstatuses/controller-manager | |
- apiVersion: v1 | |
conditions: | |
- message: '{"health":"true"}' | |
status: "True" | |
type: Healthy | |
kind: ComponentStatus | |
metadata: | |
creationTimestamp: null | |
name: etcd-0 | |
selfLink: /api/v1/componentstatuses/etcd-0 | |
- apiVersion: v1 | |
conditions: | |
- message: '{"health":"true"}' | |
status: "True" | |
type: Healthy | |
kind: ComponentStatus | |
metadata: | |
creationTimestamp: null | |
name: etcd-1 | |
selfLink: /api/v1/componentstatuses/etcd-1 | |
kind: List | |
metadata: | |
resourceVersion: "" | |
selfLink: "" | |
------- | |
resource: configmaps | |
------- | |
apiVersion: v1 | |
items: | |
- apiVersion: v1 | |
data: | |
_example: | | |
################################ | |
# # | |
# EXAMPLE CONFIGURATION # | |
# # | |
################################ | |
# This block is not actually functional configuration, | |
# but serves to illustrate the available configuration | |
# options and document them in a way that is accessible | |
# to users that `kubectl edit` this config map. | |
# | |
# These sample configuration options may be copied out of | |
# this example block and unindented to be in the data block | |
# to actually change the configuration. | |
# The Revision ContainerConcurrency field specifies the maximum number | |
# of requests the Container can handle at once. Container concurrency | |
# target percentage is how much of that maximum to use in a stable | |
# state. E.g. if a Revision specifies ContainerConcurrency of 10, then | |
# the Autoscaler will try to maintain 7 concurrent connections per pod | |
# on average. | |
# Note: this limit will be applied to container concurrency set at every | |
# level (ConfigMap, Revision Spec or Annotation). | |
# For legacy and backwards compatibility reasons, this value also accepts | |
# fractional values in (0, 1] interval (i.e. 0.7 ⇒ 70%). | |
# Thus minimal percentage value must be greater than 1.0, or it will be | |
# treated as a fraction. | |
container-concurrency-target-percentage: "70" | |
# The container concurrency target default is what the Autoscaler will | |
# try to maintain when concurrency is used as the scaling metric for a | |
# Revision and the Revision specifies unlimited concurrency. | |
# Even when specifying unlimited concurrency, the autoscaler will | |
# horizontally scale the application based on this target concurrency. | |
# NOTE: Only one metric can be used for autoscaling a Revision. | |
container-concurrency-target-default: "100" | |
# The requests per second (RPS) target default is what the Autoscaler will | |
# try to maintain when RPS is used as the scaling metric for a Revision and | |
# the Revision specifies unlimited RPS. Even when specifying unlimited RPS, | |
# the autoscaler will horizontally scale the application based on this | |
# target RPS. | |
# Must be greater than 1.0. | |
# NOTE: Only one metric can be used for autoscaling a Revision. | |
requests-per-second-target-default: "200" | |
# The target burst capacity specifies the size of burst in concurrent | |
# requests that the system operator expects the system will receive. | |
# Autoscaler will try to protect the system from queueing by introducing | |
# Activator in the request path if the current spare capacity of the | |
# service is less than this setting. | |
# If this setting is 0, then Activator will be in the request path only | |
# when the revision is scaled to 0. | |
# If this setting is > 0 and container-concurrency-target-percentage is | |
# 100% or 1.0, then activator will always be in the request path. | |
# -1 denotes unlimited target-burst-capacity and activator will always | |
# be in the request path. | |
# Other negative values are invalid. | |
target-burst-capacity: "200" | |
# When operating in a stable mode, the autoscaler operates on the | |
# average concurrency over the stable window. | |
# Stable window must be in whole seconds. | |
stable-window: "60s" | |
# When observed average concurrency during the panic window reaches | |
# panic-threshold-percentage the target concurrency, the autoscaler | |
# enters panic mode. When operating in panic mode, the autoscaler | |
# scales on the average concurrency over the panic window which is | |
# panic-window-percentage of the stable-window. | |
# When computing the panic window it will be rounded to the closest | |
# whole second. | |
panic-window-percentage: "10.0" | |
# The percentage of the container concurrency target at which to | |
# enter panic mode when reached within the panic window. | |
panic-threshold-percentage: "200.0" | |
# Max scale up rate limits the rate at which the autoscaler will | |
# increase pod count. It is the maximum ratio of desired pods versus | |
# observed pods. | |
# Cannot less or equal to 1. | |
# I.e with value of 2.0 the number of pods can at most go N to 2N | |
# over single Autoscaler period (see tick-interval), but at least N to | |
# N+1, if Autoscaler needs to scale up. | |
max-scale-up-rate: "1000.0" | |
# Max scale down rate limits the rate at which the autoscaler will | |
# decrease pod count. It is the maximum ratio of observed pods versus | |
# desired pods. | |
# Cannot less or equal to 1. | |
# I.e. with value of 2.0 the number of pods can at most go N to N/2 | |
# over single Autoscaler evaluation period (see tick-interval), but at | |
# least N to N-1, if Autoscaler needs to scale down. | |
# Not yet used // TODO(vagababov) remove once other parts are ready. | |
max-scale-down-rate: "2.0" | |
# Scale to zero feature flag | |
enable-scale-to-zero: "true" | |
# Tick interval is the time between autoscaling calculations. | |
tick-interval: "2s" | |
# Dynamic parameters (take effect when config map is updated): | |
# Scale to zero grace period is the time an inactive revision is left | |
# running before it is scaled to zero (min: 30s). | |
scale-to-zero-grace-period: "30s" | |
kind: ConfigMap | |
metadata: | |
annotations: | |
kubectl.kubernetes.io/last-applied-configuration: | | |
{"apiVersion":"v1","data":{"_example":"################################\n# #\n# EXAMPLE CONFIGURATION #\n# #\n################################\n\n# This block is not actually functional configuration,\n# but serves to illustrate the available configuration\n# options and document them in a way that is accessible\n# to users that `kubectl edit` this config map.\n#\n# These sample configuration options may be copied out of\n# this example block and unindented to be in the data block\n# to actually change the configuration.\n\n# The Revision ContainerConcurrency field specifies the maximum number\n# of requests the Container can handle at once. Container concurrency\n# target percentage is how much of that maximum to use in a stable\n# state. E.g. if a Revision specifies ContainerConcurrency of 10, then\n# the Autoscaler will try to maintain 7 concurrent connections per pod\n# on average.\n# Note: this limit will be applied to container concurrency set at every\n# level (ConfigMap, Revision Spec or Annotation).\n# For legacy and backwards compatibility reasons, this value also accepts\n# fractional values in (0, 1] interval (i.e. 0.7 ⇒ 70%).\n# Thus minimal percentage value must be greater than 1.0, or it will be\n# treated as a fraction.\ncontainer-concurrency-target-percentage: \"70\"\n\n# The container concurrency target default is what the Autoscaler will\n# try to maintain when concurrency is used as the scaling metric for a\n# Revision and the Revision specifies unlimited concurrency.\n# Even when specifying unlimited concurrency, the autoscaler will\n# horizontally scale the application based on this target concurrency.\n# NOTE: Only one metric can be used for autoscaling a Revision.\ncontainer-concurrency-target-default: \"100\"\n\n# The requests per second (RPS) target default is what the Autoscaler will\n# try to maintain when RPS is used as the scaling metric for a Revision and\n# the Revision specifies unlimited RPS. Even when specifying unlimited RPS,\n# the autoscaler will horizontally scale the application based on this\n# target RPS.\n# Must be greater than 1.0.\n# NOTE: Only one metric can be used for autoscaling a Revision.\nrequests-per-second-target-default: \"200\"\n\n# The target burst capacity specifies the size of burst in concurrent\n# requests that the system operator expects the system will receive.\n# Autoscaler will try to protect the system from queueing by introducing\n# Activator in the request path if the current spare capacity of the\n# service is less than this setting.\n# If this setting is 0, then Activator will be in the request path only\n# when the revision is scaled to 0.\n# If this setting is \u003e 0 and container-concurrency-target-percentage is\n# 100% or 1.0, then activator will always be in the request path.\n# -1 denotes unlimited target-burst-capacity and activator will always\n# be in the request path.\n# Other negative values are invalid.\ntarget-burst-capacity: \"200\"\n\n# When operating in a stable mode, the autoscaler operates on the\n# average concurrency over the stable window.\n# Stable window must be in whole seconds.\nstable-window: \"60s\"\n\n# When observed average concurrency during the panic window reaches\n# panic-threshold-percentage the target concurrency, the autoscaler\n# enters panic mode. When operating in panic mode, the autoscaler\n# scales on the average concurrency over the panic window which is\n# panic-window-percentage of the stable-window.\n# When computing the panic window it will be rounded to the closest\n# whole second.\npanic-window-percentage: \"10.0\"\n\n# The percentage of the container concurrency target at which to\n# enter panic mode when reached within the panic window.\npanic-threshold-percentage: \"200.0\"\n\n# Max scale up rate limits the rate at which the autoscaler will\n# increase pod count. It is the maximum ratio of desired pods versus\n# observed pods.\n# Cannot less or equal to 1.\n# I.e with value of 2.0 the number of pods can at most go N to 2N\n# over single Autoscaler period (see tick-interval), but at least N to\n# N+1, if Autoscaler needs to scale up.\nmax-scale-up-rate: \"1000.0\"\n\n# Max scale down rate limits the rate at which the autoscaler will\n# decrease pod count. It is the maximum ratio of observed pods versus\n# desired pods.\n# Cannot less or equal to 1.\n# I.e. with value of 2.0 the number of pods can at most go N to N/2\n# over single Autoscaler evaluation period (see tick-interval), but at\n# least N to N-1, if Autoscaler needs to scale down.\n# Not yet used // TODO(vagababov) remove once other parts are ready.\nmax-scale-down-rate: \"2.0\"\n\n# Scale to zero feature flag\nenable-scale-to-zero: \"true\"\n\n# Tick interval is the time between autoscaling calculations.\ntick-interval: \"2s\"\n\n# Dynamic parameters (take effect when config map is updated):\n\n# Scale to zero grace period is the time an inactive revision is left\n# running before it is scaled to zero (min: 30s).\nscale-to-zero-grace-period: \"30s\"\n"},"kind":"ConfigMap","metadata":{"annotations":{},"labels":{"serving.knative.dev/release":"devel"},"name":"config-autoscaler","namespace":"knative-serving"}} | |
creationTimestamp: "2019-12-03T10:54:23Z" | |
labels: | |
serving.knative.dev/release: devel | |
name: config-autoscaler | |
namespace: knative-serving | |
resourceVersion: "43947" | |
selfLink: /api/v1/namespaces/knative-serving/configmaps/config-autoscaler | |
uid: 446ee393-15bb-11ea-b5af-027e0b84da98 | |
- apiVersion: v1 | |
data: | |
_example: | | |
################################ | |
# # | |
# EXAMPLE CONFIGURATION # | |
# # | |
################################ | |
# This block is not actually functional configuration, | |
# but serves to illustrate the available configuration | |
# options and document them in a way that is accessible | |
# to users that `kubectl edit` this config map. | |
# | |
# These sample configuration options may be copied out of | |
# this block and unindented to actually change the configuration. | |
# issuerKind is a type of issuer. | |
# Please refer to `Supported Issuer types` in https://docs.cert-manager.io/en/latest/reference/issuers.html#supported-issuer-types | |
# Currently supported values: acme, ca. | |
issuerKind: acme | |
# issuerRef is a reference to the issuer for this certificate. | |
# IssuerRef should be either `ClusterIssuer` or `Issuer`. | |
# Please refer `IssuerRef` in https://github.com/jetstack/cert-manager/blob/master/pkg/apis/certmanager/v1alpha1/types_certificate.go | |
# for more details about IssuerRef configuration. | |
issuerRef: | | |
kind: ClusterIssuer | |
name: letsencrypt-issuer | |
# solverConfig defines the configuration for the ACME certificate provider. | |
# The solverConfig should be either dns01 or http01. | |
# Please refer `SolverConfig` in https://github.com/jetstack/cert-manager/blob/master/pkg/apis/certmanager/v1alpha1/types_certificate.go | |
# for more details about ACME configuration. | |
solverConfig: | | |
dns01: | |
provider: cloud-dns-provider | |
kind: ConfigMap | |
metadata: | |
annotations: | |
kubectl.kubernetes.io/last-applied-configuration: | | |
{"apiVersion":"v1","data":{"_example":"################################\n# #\n# EXAMPLE CONFIGURATION #\n# #\n################################\n\n# This block is not actually functional configuration,\n# but serves to illustrate the available configuration\n# options and document them in a way that is accessible\n# to users that `kubectl edit` this config map.\n#\n# These sample configuration options may be copied out of\n# this block and unindented to actually change the configuration.\n\n# issuerKind is a type of issuer.\n# Please refer to `Supported Issuer types` in https://docs.cert-manager.io/en/latest/reference/issuers.html#supported-issuer-types\n# Currently supported values: acme, ca.\nissuerKind: acme\n\n# issuerRef is a reference to the issuer for this certificate.\n# IssuerRef should be either `ClusterIssuer` or `Issuer`.\n# Please refer `IssuerRef` in https://github.com/jetstack/cert-manager/blob/master/pkg/apis/certmanager/v1alpha1/types_certificate.go\n# for more details about IssuerRef configuration.\nissuerRef: |\n kind: ClusterIssuer\n name: letsencrypt-issuer\n\n# solverConfig defines the configuration for the ACME certificate provider.\n# The solverConfig should be either dns01 or http01.\n# Please refer `SolverConfig` in https://github.com/jetstack/cert-manager/blob/master/pkg/apis/certmanager/v1alpha1/types_certificate.go\n# for more details about ACME configuration.\nsolverConfig: |\n dns01:\n provider: cloud-dns-provider\n"},"kind":"ConfigMap","metadata":{"annotations":{},"labels":{"networking.knative.dev/certificate-provider":"cert-manager","serving.knative.dev/release":"devel"},"name":"config-certmanager","namespace":"knative-serving"}} | |
creationTimestamp: "2019-12-03T10:54:24Z" | |
labels: | |
networking.knative.dev/certificate-provider: cert-manager | |
serving.knative.dev/release: devel | |
name: config-certmanager | |
namespace: knative-serving | |
resourceVersion: "43949" | |
selfLink: /api/v1/namespaces/knative-serving/configmaps/config-certmanager | |
uid: 4495ce45-15bb-11ea-b5af-027e0b84da98 | |
- apiVersion: v1 | |
data: | |
_example: | | |
################################ | |
# # | |
# EXAMPLE CONFIGURATION # | |
# # | |
################################ | |
# This block is not actually functional configuration, | |
# but serves to illustrate the available configuration | |
# options and document them in a way that is accessible | |
# to users that `kubectl edit` this config map. | |
# | |
# These sample configuration options may be copied out of | |
# this example block and unindented to be in the data block | |
# to actually change the configuration. | |
# revision-timeout-seconds contains the default number of | |
# seconds to use for the revision's per-request timeout, if | |
# none is specified. | |
revision-timeout-seconds: "300" # 5 minutes | |
# max-revision-timeout-seconds contains the maximum number of | |
# seconds that can be used for revision-timeout-seconds. | |
# This value must be greater than or equal to revision-timeout-seconds. | |
# If omitted, the system default is used (600 seconds). | |
max-revision-timeout-seconds: "600" # 10 minutes | |
# revision-cpu-request contains the cpu allocation to assign | |
# to revisions by default. If omitted, no value is specified | |
# and the system default is used. | |
revision-cpu-request: "400m" # 0.4 of a CPU (aka 400 milli-CPU) | |
# revision-memory-request contains the memory allocation to assign | |
# to revisions by default. If omitted, no value is specified | |
# and the system default is used. | |
revision-memory-request: "100M" # 100 megabytes of memory | |
# revision-cpu-limit contains the cpu allocation to limit | |
# revisions to by default. If omitted, no value is specified | |
# and the system default is used. | |
revision-cpu-limit: "1000m" # 1 CPU (aka 1000 milli-CPU) | |
# revision-memory-limit contains the memory allocation to limit | |
# revisions to by default. If omitted, no value is specified | |
# and the system default is used. | |
revision-memory-limit: "200M" # 200 megabytes of memory | |
# container-name-template contains a template for the default | |
# container name, if none is specified. This field supports | |
# Go templating and is supplied with the ObjectMeta of the | |
# enclosing Service or Configuration, so values such as | |
# {{.Name}} are also valid. | |
container-name-template: "user-container" | |
# container-concurrency specifies the maximum number | |
# of requests the Container can handle at once, and requests | |
# above this threshold are queued. Setting a value of zero | |
# disables this throttling and lets through as many requests as | |
# the pod receives. | |
container-concurrency: "0" | |
kind: ConfigMap | |
metadata: | |
annotations: | |
kubectl.kubernetes.io/last-applied-configuration: | | |
{"apiVersion":"v1","data":{"_example":"################################\n# #\n# EXAMPLE CONFIGURATION #\n# #\n################################\n\n# This block is not actually functional configuration,\n# but serves to illustrate the available configuration\n# options and document them in a way that is accessible\n# to users that `kubectl edit` this config map.\n#\n# These sample configuration options may be copied out of\n# this example block and unindented to be in the data block\n# to actually change the configuration.\n\n# revision-timeout-seconds contains the default number of\n# seconds to use for the revision's per-request timeout, if\n# none is specified.\nrevision-timeout-seconds: \"300\" # 5 minutes\n\n# max-revision-timeout-seconds contains the maximum number of\n# seconds that can be used for revision-timeout-seconds.\n# This value must be greater than or equal to revision-timeout-seconds.\n# If omitted, the system default is used (600 seconds).\nmax-revision-timeout-seconds: \"600\" # 10 minutes\n\n# revision-cpu-request contains the cpu allocation to assign\n# to revisions by default. If omitted, no value is specified\n# and the system default is used.\nrevision-cpu-request: \"400m\" # 0.4 of a CPU (aka 400 milli-CPU)\n\n# revision-memory-request contains the memory allocation to assign\n# to revisions by default. If omitted, no value is specified\n# and the system default is used.\nrevision-memory-request: \"100M\" # 100 megabytes of memory\n\n# revision-cpu-limit contains the cpu allocation to limit\n# revisions to by default. If omitted, no value is specified\n# and the system default is used.\nrevision-cpu-limit: \"1000m\" # 1 CPU (aka 1000 milli-CPU)\n\n# revision-memory-limit contains the memory allocation to limit\n# revisions to by default. If omitted, no value is specified\n# and the system default is used.\nrevision-memory-limit: \"200M\" # 200 megabytes of memory\n\n# container-name-template contains a template for the default\n# container name, if none is specified. This field supports\n# Go templating and is supplied with the ObjectMeta of the\n# enclosing Service or Configuration, so values such as\n# {{.Name}} are also valid.\ncontainer-name-template: \"user-container\"\n\n# container-concurrency specifies the maximum number\n# of requests the Container can handle at once, and requests\n# above this threshold are queued. Setting a value of zero\n# disables this throttling and lets through as many requests as\n# the pod receives.\ncontainer-concurrency: \"0\"\n"},"kind":"ConfigMap","metadata":{"annotations":{},"labels":{"serving.knative.dev/release":"devel"},"name":"config-defaults","namespace":"knative-serving"}} | |
creationTimestamp: "2019-12-03T10:54:24Z" | |
labels: | |
serving.knative.dev/release: devel | |
name: config-defaults | |
namespace: knative-serving | |
resourceVersion: "43951" | |
selfLink: /api/v1/namespaces/knative-serving/configmaps/config-defaults | |
uid: 44ba5d9a-15bb-11ea-b5af-027e0b84da98 | |
- apiVersion: v1 | |
data: | |
_example: | | |
################################ | |
# # | |
# EXAMPLE CONFIGURATION # | |
# # | |
################################ | |
# This block is not actually functional configuration, | |
# but serves to illustrate the available configuration | |
# options and document them in a way that is accessible | |
# to users that `kubectl edit` this config map. | |
# | |
# These sample configuration options may be copied out of | |
# this example block and unindented to be in the data block | |
# to actually change the configuration. | |
# List of repositories for which tag to digest resolving should be skipped | |
registriesSkippingTagResolving: "ko.local,dev.local" | |
queueSidecarImage: gcr.io/gcp-compute-engine-223401/queue-39be6f1d08a095bd076a71d288d295b6@sha256:8adf8f990b4485e7ead4dc9e6f8ddb3a19142835de95386428deb9ffde8d20b2 | |
kind: ConfigMap | |
metadata: | |
annotations: | |
kubectl.kubernetes.io/last-applied-configuration: | | |
{"apiVersion":"v1","data":{"_example":"################################\n# #\n# EXAMPLE CONFIGURATION #\n# #\n################################\n\n# This block is not actually functional configuration,\n# but serves to illustrate the available configuration\n# options and document them in a way that is accessible\n# to users that `kubectl edit` this config map.\n#\n# These sample configuration options may be copied out of\n# this example block and unindented to be in the data block\n# to actually change the configuration.\n\n# List of repositories for which tag to digest resolving should be skipped\nregistriesSkippingTagResolving: \"ko.local,dev.local\"\n","queueSidecarImage":"gcr.io/gcp-compute-engine-223401/queue-39be6f1d08a095bd076a71d288d295b6@sha256:8adf8f990b4485e7ead4dc9e6f8ddb3a19142835de95386428deb9ffde8d20b2"},"kind":"ConfigMap","metadata":{"annotations":{},"labels":{"serving.knative.dev/release":"devel"},"name":"config-deployment","namespace":"knative-serving"}} | |
creationTimestamp: "2019-12-03T10:54:24Z" | |
labels: | |
serving.knative.dev/release: devel | |
name: config-deployment | |
namespace: knative-serving | |
resourceVersion: "43954" | |
selfLink: /api/v1/namespaces/knative-serving/configmaps/config-deployment | |
uid: 44def47c-15bb-11ea-b5af-027e0b84da98 | |
- apiVersion: v1 | |
data: | |
_example: | | |
################################ | |
# # | |
# EXAMPLE CONFIGURATION # | |
# # | |
################################ | |
# This block is not actually functional configuration, | |
# but serves to illustrate the available configuration | |
# options and document them in a way that is accessible | |
# to users that `kubectl edit` this config map. | |
# | |
# These sample configuration options may be copied out of | |
# this example block and unindented to be in the data block | |
# to actually change the configuration. | |
# Default value for domain. | |
# Although it will match all routes, it is the least-specific rule so it | |
# will only be used if no other domain matches. | |
example.com: | | |
# These are example settings of domain. | |
# example.org will be used for routes having app=nonprofit. | |
example.org: | | |
selector: | |
app: nonprofit | |
# Routes having domain suffix of 'svc.cluster.local' will not be exposed | |
# through Ingress. You can define your own label selector to assign that | |
# domain suffix to your Route here, or you can set the label | |
# "serving.knative.dev/visibility=cluster-local" | |
# to achieve the same effect. This shows how to make routes having | |
# the label app=secret only exposed to the local cluster. | |
svc.cluster.local: | | |
selector: | |
app: secret | |
13.228.147.127.xip.io: "" | |
kind: ConfigMap | |
metadata: | |
annotations: | |
kubectl.kubernetes.io/last-applied-configuration: | | |
{"apiVersion":"v1","data":{"_example":"################################\n# #\n# EXAMPLE CONFIGURATION #\n# #\n################################\n\n# This block is not actually functional configuration,\n# but serves to illustrate the available configuration\n# options and document them in a way that is accessible\n# to users that `kubectl edit` this config map.\n#\n# These sample configuration options may be copied out of\n# this example block and unindented to be in the data block\n# to actually change the configuration.\n\n# Default value for domain.\n# Although it will match all routes, it is the least-specific rule so it\n# will only be used if no other domain matches.\nexample.com: |\n\n# These are example settings of domain.\n# example.org will be used for routes having app=nonprofit.\nexample.org: |\n selector:\n app: nonprofit\n\n# Routes having domain suffix of 'svc.cluster.local' will not be exposed\n# through Ingress. You can define your own label selector to assign that\n# domain suffix to your Route here, or you can set the label\n# \"serving.knative.dev/visibility=cluster-local\"\n# to achieve the same effect. This shows how to make routes having\n# the label app=secret only exposed to the local cluster.\nsvc.cluster.local: |\n selector:\n app: secret\n"},"kind":"ConfigMap","metadata":{"annotations":{},"labels":{"serving.knative.dev/release":"devel"},"name":"config-domain","namespace":"knative-serving"}} | |
creationTimestamp: "2019-12-03T10:54:24Z" | |
labels: | |
serving.knative.dev/release: devel | |
name: config-domain | |
namespace: knative-serving | |
resourceVersion: "47908" | |
selfLink: /api/v1/namespaces/knative-serving/configmaps/config-domain | |
uid: 4502b630-15bb-11ea-b5af-027e0b84da98 | |
- apiVersion: v1 | |
data: | |
_example: | | |
################################ | |
# # | |
# EXAMPLE CONFIGURATION # | |
# # | |
################################ | |
# This block is not actually functional configuration, | |
# but serves to illustrate the available configuration | |
# options and document them in a way that is accessible | |
# to users that `kubectl edit` this config map. | |
# | |
# These sample configuration options may be copied out of | |
# this example block and unindented to be in the data block | |
# to actually change the configuration. | |
# Delay after revision creation before considering it for GC | |
stale-revision-create-delay: "24h" | |
# Duration since a route has been pointed at a revision before it should be GC'd | |
# This minus lastpinned-debounce be longer than the controller resync period (10 hours) | |
stale-revision-timeout: "15h" | |
# Minimum number of generations of revisions to keep before considering for GC | |
stale-revision-minimum-generations: "1" | |
# To avoid constant updates, we allow an existing annotation to be stale by this | |
# amount before we update the timestamp | |
stale-revision-lastpinned-debounce: "5h" | |
kind: ConfigMap | |
metadata: | |
annotations: | |
kubectl.kubernetes.io/last-applied-configuration: | | |
{"apiVersion":"v1","data":{"_example":"################################\n# #\n# EXAMPLE CONFIGURATION #\n# #\n################################\n\n# This block is not actually functional configuration,\n# but serves to illustrate the available configuration\n# options and document them in a way that is accessible\n# to users that `kubectl edit` this config map.\n#\n# These sample configuration options may be copied out of\n# this example block and unindented to be in the data block\n# to actually change the configuration.\n\n# Delay after revision creation before considering it for GC\nstale-revision-create-delay: \"24h\"\n\n# Duration since a route has been pointed at a revision before it should be GC'd\n# This minus lastpinned-debounce be longer than the controller resync period (10 hours)\nstale-revision-timeout: \"15h\"\n\n# Minimum number of generations of revisions to keep before considering for GC\nstale-revision-minimum-generations: \"1\"\n\n# To avoid constant updates, we allow an existing annotation to be stale by this\n# amount before we update the timestamp\nstale-revision-lastpinned-debounce: \"5h\"\n"},"kind":"ConfigMap","metadata":{"annotations":{},"labels":{"serving.knative.dev/release":"devel"},"name":"config-gc","namespace":"knative-serving"}} | |
creationTimestamp: "2019-12-03T10:54:25Z" | |
labels: | |
serving.knative.dev/release: devel | |
name: config-gc | |
namespace: knative-serving | |
resourceVersion: "43957" | |
selfLink: /api/v1/namespaces/knative-serving/configmaps/config-gc | |
uid: 45280a60-15bb-11ea-b5af-027e0b84da98 | |
- apiVersion: v1 | |
data: | |
_example: | | |
################################ | |
# # | |
# EXAMPLE CONFIGURATION # | |
# # | |
################################ | |
# This block is not actually functional configuration, | |
# but serves to illustrate the available configuration | |
# options and document them in a way that is accessible | |
# to users that `kubectl edit` this config map. | |
# | |
# These sample configuration options may be copied out of | |
# this example block and unindented to be in the data block | |
# to actually change the configuration. | |
# Default Knative Gateway after v0.3. It points to the Istio | |
# standard istio-ingressgateway, instead of a custom one that we | |
# used pre-0.3. The configuration format should be `gateway. | |
# {{gateway_namespace}}.{{gateway_name}}: "{{ingress_name}}. | |
# {{ingress_namespace}}.svc.cluster.local"`. The {{gateway_namespace}} | |
# is optional; when it is omitted, the system will search for | |
# the gateway in the serving system namespace `knative-serving` | |
gateway.knative-serving.knative-ingress-gateway: "istio-ingressgateway.istio-system.svc.cluster.local" | |
# A cluster local gateway to allow pods outside of the mesh to access | |
# Services and Routes not exposing through an ingress. If the users | |
# do have a service mesh setup, this isn't required and can be removed. | |
# | |
# An example use case is when users want to use Istio without any | |
# sidecar injection (like Knative's istio-lean.yaml). Since every pod | |
# is outside of the service mesh in that case, a cluster-local service | |
# will need to be exposed to a cluster-local gateway to be accessible. | |
# The configuration format should be `local-gateway.{{local_gateway_namespace}}. | |
# {{local_gateway_name}}: "{{cluster_local_gateway_name}}. | |
# {{cluster_local_gateway_namespace}}.svc.cluster.local"`. The | |
# {{local_gateway_namespace}} is optional; when it is omitted, the system | |
# will search for the local gateway in the serving system namespace | |
# `knative-serving` | |
local-gateway.knative-serving.cluster-local-gateway: "cluster-local-gateway.istio-system.svc.cluster.local" | |
# To use only Istio service mesh and no cluster-local-gateway, replace | |
# all local-gateway.* entries the following entry. | |
local-gateway.mesh: "mesh" | |
# Feature flag to enable reconciling external Istio Gateways. | |
# When auto TLS feature is turned on, reconcileExternalGateway will be automatically enforced. | |
# 1. true: enabling reconciling external gateways. | |
# 2. false: disabling reconciling external gateways. | |
reconcileExternalGateway: "false" | |
kind: ConfigMap | |
metadata: | |
annotations: | |
kubectl.kubernetes.io/last-applied-configuration: | | |
{"apiVersion":"v1","data":{"_example":"################################\n# #\n# EXAMPLE CONFIGURATION #\n# #\n################################\n\n# This block is not actually functional configuration,\n# but serves to illustrate the available configuration\n# options and document them in a way that is accessible\n# to users that `kubectl edit` this config map.\n#\n# These sample configuration options may be copied out of\n# this example block and unindented to be in the data block\n# to actually change the configuration.\n\n# Default Knative Gateway after v0.3. It points to the Istio\n# standard istio-ingressgateway, instead of a custom one that we\n# used pre-0.3. The configuration format should be `gateway.\n# {{gateway_namespace}}.{{gateway_name}}: \"{{ingress_name}}.\n# {{ingress_namespace}}.svc.cluster.local\"`. The {{gateway_namespace}}\n# is optional; when it is omitted, the system will search for\n# the gateway in the serving system namespace `knative-serving`\ngateway.knative-serving.knative-ingress-gateway: \"istio-ingressgateway.istio-system.svc.cluster.local\"\n\n# A cluster local gateway to allow pods outside of the mesh to access\n# Services and Routes not exposing through an ingress. If the users\n# do have a service mesh setup, this isn't required and can be removed.\n#\n# An example use case is when users want to use Istio without any\n# sidecar injection (like Knative's istio-lean.yaml). Since every pod\n# is outside of the service mesh in that case, a cluster-local service\n# will need to be exposed to a cluster-local gateway to be accessible.\n# The configuration format should be `local-gateway.{{local_gateway_namespace}}.\n# {{local_gateway_name}}: \"{{cluster_local_gateway_name}}.\n# {{cluster_local_gateway_namespace}}.svc.cluster.local\"`. The\n# {{local_gateway_namespace}} is optional; when it is omitted, the system\n# will search for the local gateway in the serving system namespace\n# `knative-serving`\nlocal-gateway.knative-serving.cluster-local-gateway: \"cluster-local-gateway.istio-system.svc.cluster.local\"\n\n# To use only Istio service mesh and no cluster-local-gateway, replace\n# all local-gateway.* entries the following entry.\nlocal-gateway.mesh: \"mesh\"\n\n# Feature flag to enable reconciling external Istio Gateways.\n# When auto TLS feature is turned on, reconcileExternalGateway will be automatically enforced.\n# 1. true: enabling reconciling external gateways.\n# 2. false: disabling reconciling external gateways.\nreconcileExternalGateway: \"false\"\n"},"kind":"ConfigMap","metadata":{"annotations":{},"labels":{"networking.knative.dev/ingress-provider":"istio","serving.knative.dev/release":"devel"},"name":"config-istio","namespace":"knative-serving"}} | |
creationTimestamp: "2019-12-03T10:54:25Z" | |
labels: | |
networking.knative.dev/ingress-provider: istio | |
serving.knative.dev/release: devel | |
name: config-istio | |
namespace: knative-serving | |
resourceVersion: "43958" | |
selfLink: /api/v1/namespaces/knative-serving/configmaps/config-istio | |
uid: 454be873-15bb-11ea-b5af-027e0b84da98 | |
- apiVersion: v1 | |
data: | |
_example: | | |
################################ | |
# # | |
# EXAMPLE CONFIGURATION # | |
# # | |
################################ | |
# This block is not actually functional configuration, | |
# but serves to illustrate the available configuration | |
# options and document them in a way that is accessible | |
# to users that `kubectl edit` this config map. | |
# | |
# These sample configuration options may be copied out of | |
# this example block and unindented to be in the data block | |
# to actually change the configuration. | |
# Common configuration for all Knative codebase | |
zap-logger-config: | | |
{ | |
"level": "info", | |
"development": false, | |
"outputPaths": ["stdout"], | |
"errorOutputPaths": ["stderr"], | |
"encoding": "json", | |
"encoderConfig": { | |
"timeKey": "ts", | |
"levelKey": "level", | |
"nameKey": "logger", | |
"callerKey": "caller", | |
"messageKey": "msg", | |
"stacktraceKey": "stacktrace", | |
"lineEnding": "", | |
"levelEncoder": "", | |
"timeEncoder": "iso8601", | |
"durationEncoder": "", | |
"callerEncoder": "" | |
} | |
} | |
# Log level overrides | |
# For all components except the autoscaler and queue proxy, | |
# changes are be picked up immediately. | |
# For autoscaler and queue proxy, changes require recreation of the pods. | |
loglevel.controller: "info" | |
loglevel.autoscaler: "info" | |
loglevel.queueproxy: "info" | |
loglevel.webhook: "info" | |
loglevel.activator: "info" | |
loglevel.activator: debug | |
loglevel.autoscaler: debug | |
loglevel.controller: debug | |
loglevel.queueproxy: debug | |
loglevel.webhook: debug | |
zap-logger-config: | | |
{ | |
"level": "debug", | |
"development": false, | |
"outputPaths": ["stdout"], | |
"errorOutputPaths": ["stderr"], | |
"encoding": "json", | |
"encoderConfig": { | |
"timeKey": "ts", | |
"levelKey": "level", | |
"nameKey": "logger", | |
"callerKey": "caller", | |
"messageKey": "msg", | |
"stacktraceKey": "stacktrace", | |
"lineEnding": "", | |
"levelEncoder": "", | |
"timeEncoder": "iso8601", | |
"durationEncoder": "", | |
"callerEncoder": "" | |
} | |
} | |
kind: ConfigMap | |
metadata: | |
annotations: | |
kubectl.kubernetes.io/last-applied-configuration: | | |
{"apiVersion":"v1","data":{"_example":"################################\n# #\n# EXAMPLE CONFIGURATION #\n# #\n################################\n\n# This block is not actually functional configuration,\n# but serves to illustrate the available configuration\n# options and document them in a way that is accessible\n# to users that `kubectl edit` this config map.\n#\n# These sample configuration options may be copied out of\n# this example block and unindented to be in the data block\n# to actually change the configuration.\n\n# Common configuration for all Knative codebase\nzap-logger-config: |\n {\n \"level\": \"info\",\n \"development\": false,\n \"outputPaths\": [\"stdout\"],\n \"errorOutputPaths\": [\"stderr\"],\n \"encoding\": \"json\",\n \"encoderConfig\": {\n \"timeKey\": \"ts\",\n \"levelKey\": \"level\",\n \"nameKey\": \"logger\",\n \"callerKey\": \"caller\",\n \"messageKey\": \"msg\",\n \"stacktraceKey\": \"stacktrace\",\n \"lineEnding\": \"\",\n \"levelEncoder\": \"\",\n \"timeEncoder\": \"iso8601\",\n \"durationEncoder\": \"\",\n \"callerEncoder\": \"\"\n }\n }\n\n# Log level overrides\n# For all components except the autoscaler and queue proxy,\n# changes are be picked up immediately.\n# For autoscaler and queue proxy, changes require recreation of the pods.\nloglevel.controller: \"info\"\nloglevel.autoscaler: \"info\"\nloglevel.queueproxy: \"info\"\nloglevel.webhook: \"info\"\nloglevel.activator: \"info\"\n","loglevel.activator":"debug","loglevel.autoscaler":"debug","loglevel.controller":"debug","loglevel.queueproxy":"debug","loglevel.webhook":"debug","zap-logger-config":"{\n \"level\": \"debug\",\n \"development\": false,\n \"outputPaths\": [\"stdout\"],\n \"errorOutputPaths\": [\"stderr\"],\n \"encoding\": \"json\",\n \"encoderConfig\": {\n \"timeKey\": \"ts\",\n \"levelKey\": \"level\",\n \"nameKey\": \"logger\",\n \"callerKey\": \"caller\",\n \"messageKey\": \"msg\",\n \"stacktraceKey\": \"stacktrace\",\n \"lineEnding\": \"\",\n \"levelEncoder\": \"\",\n \"timeEncoder\": \"iso8601\",\n \"durationEncoder\": \"\",\n \"callerEncoder\": \"\"\n }\n}\n"},"kind":"ConfigMap","metadata":{"annotations":{},"labels":{"serving.knative.dev/release":"devel"},"name":"config-logging","namespace":"knative-serving"}} | |
creationTimestamp: "2019-12-03T10:54:25Z" | |
labels: | |
serving.knative.dev/release: devel | |
name: config-logging | |
namespace: knative-serving | |
resourceVersion: "44475" | |
selfLink: /api/v1/namespaces/knative-serving/configmaps/config-logging | |
uid: 4570a258-15bb-11ea-b5af-027e0b84da98 | |
- apiVersion: v1 | |
data: | |
_example: | | |
################################ | |
# # | |
# EXAMPLE CONFIGURATION # | |
# # | |
################################ | |
# This block is not actually functional configuration, | |
# but serves to illustrate the available configuration | |
# options and document them in a way that is accessible | |
# to users that `kubectl edit` this config map. | |
# | |
# These sample configuration options may be copied out of | |
# this example block and unindented to be in the data block | |
# to actually change the configuration. | |
# istio.sidecar.includeOutboundIPRanges specifies the IP ranges that Istio sidecar | |
# will intercept. | |
# | |
# Replace this with the IP ranges of your cluster (see below for some examples). | |
# Separate multiple entries with a comma. | |
# Example: "10.4.0.0/14,10.7.240.0/20" | |
# | |
# If set to "*" Istio will intercept all traffic within | |
# the cluster as well as traffic that is going outside the cluster. | |
# Traffic going outside the cluster will be blocked unless | |
# necessary egress rules are created. | |
# | |
# If omitted or set to "", value of global.proxy.includeIPRanges | |
# provided at Istio deployment time is used. In default Knative serving | |
# deployment, global.proxy.includeIPRanges value is set to "*". | |
# | |
# If an invalid value is passed, "" is used instead. | |
# | |
# If valid set of IP address ranges are put into this value, | |
# Istio will no longer intercept traffic going to IP addresses | |
# outside the provided ranges and there is no need to specify | |
# egress rules. | |
# | |
# To determine the IP ranges of your cluster: | |
# IBM Cloud Private: cat cluster/config.yaml | grep service_cluster_ip_range | |
# IBM Cloud Kubernetes Service: "172.30.0.0/16,172.20.0.0/16,10.10.10.0/24" | |
# Google Container Engine (GKE): gcloud container clusters describe $CLUSTER_NAME --zone=$CLUSTER_ZONE | grep -e clusterIpv4Cidr -e servicesIpv4Cidr | |
# Azure Kubernetes Service (AKS): "10.0.0.0/16" | |
# Azure Container Service (ACS; deprecated): "10.244.0.0/16,10.240.0.0/16" | |
# Azure Container Service Engine (ACS-Engine; OSS): Configurable, but defaults to "10.0.0.0/16" | |
# Minikube: "10.0.0.1/24" | |
# | |
# For more information, visit | |
# https://istio.io/docs/tasks/traffic-management/egress/ | |
# | |
istio.sidecar.includeOutboundIPRanges: "*" | |
# clusteringress.class has been deprecated. Please use ingress.class instead. | |
clusteringress.class: "istio.ingress.networking.knative.dev" | |
# ingress.class specifies the default ingress class | |
# to use when not dictated by Route annotation. | |
# | |
# If not specified, will use the Istio ingress. | |
# | |
# Note that changing the Ingress class of an existing Route | |
# will result in undefined behavior. Therefore it is best to only | |
# update this value during the setup of Knative, to avoid getting | |
# undefined behavior. | |
ingress.class: "istio.ingress.networking.knative.dev" | |
# certificate.class specifies the default Certificate class | |
# to use when not dictated by Route annotation. | |
# | |
# If not specified, will use the Cert-Manager Certificate. | |
# | |
# Note that changing the Certificate class of an existing Route | |
# will result in undefined behavior. Therefore it is best to only | |
# update this value during the setup of Knative, to avoid getting | |
# undefined behavior. | |
certificate.class: "cert-manager.certificate.networking.internal.knative.dev" | |
# domainTemplate specifies the golang text template string to use | |
# when constructing the Knative service's DNS name. The default | |
# value is "{{.Name}}.{{.Namespace}}.{{.Domain}}". And those three | |
# values (Name, Namespace, Domain) are the only variables defined. | |
# | |
# Changing this value might be necessary when the extra levels in | |
# the domain name generated is problematic for wildcard certificates | |
# that only support a single level of domain name added to the | |
# certificate's domain. In those cases you might consider using a value | |
# of "{{.Name}}-{{.Namespace}}.{{.Domain}}", or removing the Namespace | |
# entirely from the template. When choosing a new value be thoughtful | |
# of the potential for conflicts - for example, when users choose to use | |
# characters such as `-` in their service, or namespace, names. | |
# {{.Annotations}} can be used for any customization in the go template if needed. | |
# We strongly recommend keeping namespace part of the template to avoid domain name clashes | |
# Example '{{.Name}}-{{.Namespace}}.{{ index .Annotations "sub"}}.{{.Domain}}' | |
# and you have an annotation {"sub":"foo"}, then the generated template would be {Name}-{Namespace}.foo.{Domain} | |
domainTemplate: "{{.Name}}.{{.Namespace}}.{{.Domain}}" | |
# tagTemplate specifies the golang text template string to use | |
# when constructing the DNS name for "tags" within the traffic blocks | |
# of Routes and Configuration. This is used in conjunction with the | |
# domainTemplate above to determine the full URL for the tag. | |
tagTemplate: "{{.Name}}-{{.Tag}}" | |
# Controls whether TLS certificates are automatically provisioned and | |
# installed in the Knative ingress to terminate external TLS connection. | |
# 1. Enabled: enabling auto-TLS feature. | |
# 2. Disabled: disabling auto-TLS feature. | |
autoTLS: "Disabled" | |
# Controls the behavior of the HTTP endpoint for the Knative ingress. | |
# It requires autoTLS to be enabled or reconcileExternalGateway in config-istio to be true. | |
# 1. Enabled: The Knative ingress will be able to serve HTTP connection. | |
# 2. Disabled: The Knative ingress will reject HTTP traffic. | |
# 3. Redirected: The Knative ingress will send a 302 redirect for all | |
# http connections, asking the clients to use HTTPS | |
httpProtocol: "Enabled" | |
kind: ConfigMap | |
metadata: | |
annotations: | |
kubectl.kubernetes.io/last-applied-configuration: | | |
{"apiVersion":"v1","data":{"_example":"################################\n# #\n# EXAMPLE CONFIGURATION #\n# #\n################################\n\n# This block is not actually functional configuration,\n# but serves to illustrate the available configuration\n# options and document them in a way that is accessible\n# to users that `kubectl edit` this config map.\n#\n# These sample configuration options may be copied out of\n# this example block and unindented to be in the data block\n# to actually change the configuration.\n\n# istio.sidecar.includeOutboundIPRanges specifies the IP ranges that Istio sidecar\n# will intercept.\n#\n# Replace this with the IP ranges of your cluster (see below for some examples).\n# Separate multiple entries with a comma.\n# Example: \"10.4.0.0/14,10.7.240.0/20\"\n#\n# If set to \"*\" Istio will intercept all traffic within\n# the cluster as well as traffic that is going outside the cluster.\n# Traffic going outside the cluster will be blocked unless\n# necessary egress rules are created.\n#\n# If omitted or set to \"\", value of global.proxy.includeIPRanges\n# provided at Istio deployment time is used. In default Knative serving\n# deployment, global.proxy.includeIPRanges value is set to \"*\".\n#\n# If an invalid value is passed, \"\" is used instead.\n#\n# If valid set of IP address ranges are put into this value,\n# Istio will no longer intercept traffic going to IP addresses\n# outside the provided ranges and there is no need to specify\n# egress rules.\n#\n# To determine the IP ranges of your cluster:\n# IBM Cloud Private: cat cluster/config.yaml | grep service_cluster_ip_range\n# IBM Cloud Kubernetes Service: \"172.30.0.0/16,172.20.0.0/16,10.10.10.0/24\"\n# Google Container Engine (GKE): gcloud container clusters describe $CLUSTER_NAME --zone=$CLUSTER_ZONE | grep -e clusterIpv4Cidr -e servicesIpv4Cidr\n# Azure Kubernetes Service (AKS): \"10.0.0.0/16\"\n# Azure Container Service (ACS; deprecated): \"10.244.0.0/16,10.240.0.0/16\"\n# Azure Container Service Engine (ACS-Engine; OSS): Configurable, but defaults to \"10.0.0.0/16\"\n# Minikube: \"10.0.0.1/24\"\n#\n# For more information, visit\n# https://istio.io/docs/tasks/traffic-management/egress/\n#\nistio.sidecar.includeOutboundIPRanges: \"*\"\n\n# clusteringress.class has been deprecated. Please use ingress.class instead.\nclusteringress.class: \"istio.ingress.networking.knative.dev\"\n\n# ingress.class specifies the default ingress class\n# to use when not dictated by Route annotation.\n#\n# If not specified, will use the Istio ingress.\n#\n# Note that changing the Ingress class of an existing Route\n# will result in undefined behavior. Therefore it is best to only\n# update this value during the setup of Knative, to avoid getting\n# undefined behavior.\ningress.class: \"istio.ingress.networking.knative.dev\"\n\n# certificate.class specifies the default Certificate class\n# to use when not dictated by Route annotation.\n#\n# If not specified, will use the Cert-Manager Certificate.\n#\n# Note that changing the Certificate class of an existing Route\n# will result in undefined behavior. Therefore it is best to only\n# update this value during the setup of Knative, to avoid getting\n# undefined behavior.\ncertificate.class: \"cert-manager.certificate.networking.internal.knative.dev\"\n\n# domainTemplate specifies the golang text template string to use\n# when constructing the Knative service's DNS name. The default\n# value is \"{{.Name}}.{{.Namespace}}.{{.Domain}}\". And those three\n# values (Name, Namespace, Domain) are the only variables defined.\n#\n# Changing this value might be necessary when the extra levels in\n# the domain name generated is problematic for wildcard certificates\n# that only support a single level of domain name added to the\n# certificate's domain. In those cases you might consider using a value\n# of \"{{.Name}}-{{.Namespace}}.{{.Domain}}\", or removing the Namespace\n# entirely from the template. When choosing a new value be thoughtful\n# of the potential for conflicts - for example, when users choose to use\n# characters such as `-` in their service, or namespace, names.\n# {{.Annotations}} can be used for any customization in the go template if needed.\n# We strongly recommend keeping namespace part of the template to avoid domain name clashes\n# Example '{{.Name}}-{{.Namespace}}.{{ index .Annotations \"sub\"}}.{{.Domain}}'\n# and you have an annotation {\"sub\":\"foo\"}, then the generated template would be {Name}-{Namespace}.foo.{Domain}\ndomainTemplate: \"{{.Name}}.{{.Namespace}}.{{.Domain}}\"\n\n# tagTemplate specifies the golang text template string to use\n# when constructing the DNS name for \"tags\" within the traffic blocks\n# of Routes and Configuration. This is used in conjunction with the\n# domainTemplate above to determine the full URL for the tag.\ntagTemplate: \"{{.Name}}-{{.Tag}}\"\n\n# Controls whether TLS certificates are automatically provisioned and\n# installed in the Knative ingress to terminate external TLS connection.\n# 1. Enabled: enabling auto-TLS feature.\n# 2. Disabled: disabling auto-TLS feature.\nautoTLS: \"Disabled\"\n\n# Controls the behavior of the HTTP endpoint for the Knative ingress.\n# It requires autoTLS to be enabled or reconcileExternalGateway in config-istio to be true.\n# 1. Enabled: The Knative ingress will be able to serve HTTP connection.\n# 2. Disabled: The Knative ingress will reject HTTP traffic.\n# 3. Redirected: The Knative ingress will send a 302 redirect for all\n# http connections, asking the clients to use HTTPS\nhttpProtocol: \"Enabled\"\n"},"kind":"ConfigMap","metadata":{"annotations":{},"labels":{"serving.knative.dev/release":"devel"},"name":"config-network","namespace":"knative-serving"}} | |
creationTimestamp: "2019-12-03T10:54:25Z" | |
labels: | |
serving.knative.dev/release: devel | |
name: config-network | |
namespace: knative-serving | |
resourceVersion: "43964" | |
selfLink: /api/v1/namespaces/knative-serving/configmaps/config-network | |
uid: 4597c5f7-15bb-11ea-b5af-027e0b84da98 | |
- apiVersion: v1 | |
data: | |
_example: | | |
################################ | |
# # | |
# EXAMPLE CONFIGURATION # | |
# # | |
################################ | |
# This block is not actually functional configuration, | |
# but serves to illustrate the available configuration | |
# options and document them in a way that is accessible | |
# to users that `kubectl edit` this config map. | |
# | |
# These sample configuration options may be copied out of | |
# this example block and unindented to be in the data block | |
# to actually change the configuration. | |
# logging.enable-var-log-collection defaults to false. | |
# The fluentd daemon set will be set up to collect /var/log if | |
# this flag is true. | |
logging.enable-var-log-collection: "false" | |
# logging.revision-url-template provides a template to use for producing the | |
# logging URL that is injected into the status of each Revision. | |
# This value is what you might use the the Knative monitoring bundle, and provides | |
# access to Kibana after setting up kubectl proxy. | |
logging.revision-url-template: | | |
http://localhost:8001/api/v1/namespaces/knative-monitoring/services/kibana-logging/proxy/app/kibana#/discover?_a=(query:(match:(kubernetes.labels.serving-knative-dev%2FrevisionUID:(query:'${REVISION_UID}',type:phrase)))) | |
# If non-empty, this enables queue proxy writing user request logs to stdout, excluding probe | |
# requests. | |
# The value determines the shape of the request logs and it must be a valid go text/template. | |
# It is important to keep this as a single line. Multiple lines are parsed as separate entities | |
# by most collection agents and will split the request logs into multiple records. | |
# | |
# The following fields and functions are available to the template: | |
# | |
# Request: An http.Request (see https://golang.org/pkg/net/http/#Request) | |
# representing an HTTP request received by the server. | |
# | |
# Response: | |
# struct { | |
# Code int // HTTP status code (see https://www.iana.org/assignments/http-status-codes/http-status-codes.xhtml) | |
# Size int // An int representing the size of the response. | |
# Latency float64 // A float64 representing the latency of the response in seconds. | |
# } | |
# | |
# Revision: | |
# struct { | |
# Name string // Knative revision name | |
# Namespace string // Knative revision namespace | |
# Service string // Knative service name | |
# Configuration string // Knative configuration name | |
# PodName string // Name of the pod hosting the revision | |
# PodIP string // IP of the pod hosting the revision | |
# } | |
# | |
logging.request-log-template: '{"httpRequest": {"requestMethod": "{{.Request.Method}}", "requestUrl": "{{js .Request.RequestURI}}", "requestSize": "{{.Request.ContentLength}}", "status": {{.Response.Code}}, "responseSize": "{{.Response.Size}}", "userAgent": "{{js .Request.UserAgent}}", "remoteIp": "{{js .Request.RemoteAddr}}", "serverIp": "{{.Revision.PodIP}}", "referer": "{{js .Request.Referer}}", "latency": "{{.Response.Latency}}s", "protocol": "{{.Request.Proto}}"}, "traceId": "{{index .Request.Header "X-B3-Traceid"}}"}' | |
# If true, this enables queue proxy writing request logs for probe requests to stdout. | |
# It uses the same template for user requests, i.e. logging.request-log-template. | |
logging.enable-probe-request-log: "false" | |
# metrics.backend-destination field specifies the system metrics destination. | |
# It supports either prometheus (the default) or stackdriver. | |
# Note: Using stackdriver will incur additional charges | |
metrics.backend-destination: prometheus | |
# metrics.request-metrics-backend-destination specifies the request metrics | |
# destination. It enables queue proxy to send request metrics. | |
# Currently supported values: prometheus (the default), stackdriver. | |
metrics.request-metrics-backend-destination: prometheus | |
# metrics.stackdriver-project-id field specifies the stackdriver project ID. This | |
# field is optional. When running on GCE, application default credentials will be | |
# used if this field is not provided. | |
metrics.stackdriver-project-id: "<your stackdriver project id>" | |
# metrics.allow-stackdriver-custom-metrics indicates whether it is allowed to send metrics to | |
# Stackdriver using "global" resource type and custom metric type if the | |
# metrics are not supported by "knative_revision" resource type. Setting this | |
# flag to "true" could cause extra Stackdriver charge. | |
# If metrics.backend-destination is not Stackdriver, this is ignored. | |
metrics.allow-stackdriver-custom-metrics: "false" | |
# profiling.enable indicates whether it is allowed to retrieve runtime profiling data from | |
# the pods via an HTTP server in the format expected by the pprof visualization tool. When | |
# enabled, the Knative Serving pods expose the profiling data on an alternate HTTP port 8008. | |
# The HTTP context root for profiling is then /debug/pprof/. | |
profiling.enable: "false" | |
kind: ConfigMap | |
metadata: | |
annotations: | |
kubectl.kubernetes.io/last-applied-configuration: | | |
{"apiVersion":"v1","data":{"_example":"################################\n# #\n# EXAMPLE CONFIGURATION #\n# #\n################################\n\n# This block is not actually functional configuration,\n# but serves to illustrate the available configuration\n# options and document them in a way that is accessible\n# to users that `kubectl edit` this config map.\n#\n# These sample configuration options may be copied out of\n# this example block and unindented to be in the data block\n# to actually change the configuration.\n\n# logging.enable-var-log-collection defaults to false.\n# The fluentd daemon set will be set up to collect /var/log if\n# this flag is true.\nlogging.enable-var-log-collection: \"false\"\n\n# logging.revision-url-template provides a template to use for producing the\n# logging URL that is injected into the status of each Revision.\n# This value is what you might use the the Knative monitoring bundle, and provides\n# access to Kibana after setting up kubectl proxy.\nlogging.revision-url-template: |\n http://localhost:8001/api/v1/namespaces/knative-monitoring/services/kibana-logging/proxy/app/kibana#/discover?_a=(query:(match:(kubernetes.labels.serving-knative-dev%2FrevisionUID:(query:'${REVISION_UID}',type:phrase))))\n\n# If non-empty, this enables queue proxy writing user request logs to stdout, excluding probe\n# requests.\n# The value determines the shape of the request logs and it must be a valid go text/template.\n# It is important to keep this as a single line. Multiple lines are parsed as separate entities\n# by most collection agents and will split the request logs into multiple records.\n#\n# The following fields and functions are available to the template:\n#\n# Request: An http.Request (see https://golang.org/pkg/net/http/#Request)\n# representing an HTTP request received by the server.\n#\n# Response:\n# struct {\n# Code int // HTTP status code (see https://www.iana.org/assignments/http-status-codes/http-status-codes.xhtml)\n# Size int // An int representing the size of the response.\n# Latency float64 // A float64 representing the latency of the response in seconds.\n# }\n#\n# Revision:\n# struct {\n# Name string // Knative revision name\n# Namespace string // Knative revision namespace\n# Service string // Knative service name\n# Configuration string // Knative configuration name\n# PodName string // Name of the pod hosting the revision\n# PodIP string // IP of the pod hosting the revision\n# }\n#\nlogging.request-log-template: '{\"httpRequest\": {\"requestMethod\": \"{{.Request.Method}}\", \"requestUrl\": \"{{js .Request.RequestURI}}\", \"requestSize\": \"{{.Request.ContentLength}}\", \"status\": {{.Response.Code}}, \"responseSize\": \"{{.Response.Size}}\", \"userAgent\": \"{{js .Request.UserAgent}}\", \"remoteIp\": \"{{js .Request.RemoteAddr}}\", \"serverIp\": \"{{.Revision.PodIP}}\", \"referer\": \"{{js .Request.Referer}}\", \"latency\": \"{{.Response.Latency}}s\", \"protocol\": \"{{.Request.Proto}}\"}, \"traceId\": \"{{index .Request.Header \"X-B3-Traceid\"}}\"}'\n\n# If true, this enables queue proxy writing request logs for probe requests to stdout.\n# It uses the same template for user requests, i.e. logging.request-log-template.\nlogging.enable-probe-request-log: \"false\"\n\n# metrics.backend-destination field specifies the system metrics destination.\n# It supports either prometheus (the default) or stackdriver.\n# Note: Using stackdriver will incur additional charges\nmetrics.backend-destination: prometheus\n\n# metrics.request-metrics-backend-destination specifies the request metrics\n# destination. It enables queue proxy to send request metrics.\n# Currently supported values: prometheus (the default), stackdriver.\nmetrics.request-metrics-backend-destination: prometheus\n\n# metrics.stackdriver-project-id field specifies the stackdriver project ID. This\n# field is optional. When running on GCE, application default credentials will be\n# used if this field is not provided.\nmetrics.stackdriver-project-id: \"\u003cyour stackdriver project id\u003e\"\n\n# metrics.allow-stackdriver-custom-metrics indicates whether it is allowed to send metrics to\n# Stackdriver using \"global\" resource type and custom metric type if the\n# metrics are not supported by \"knative_revision\" resource type. Setting this\n# flag to \"true\" could cause extra Stackdriver charge.\n# If metrics.backend-destination is not Stackdriver, this is ignored.\nmetrics.allow-stackdriver-custom-metrics: \"false\"\n\n# profiling.enable indicates whether it is allowed to retrieve runtime profiling data from\n# the pods via an HTTP server in the format expected by the pprof visualization tool. When\n# enabled, the Knative Serving pods expose the profiling data on an alternate HTTP port 8008.\n# The HTTP context root for profiling is then /debug/pprof/.\nprofiling.enable: \"false\"\n"},"kind":"ConfigMap","metadata":{"annotations":{},"labels":{"serving.knative.dev/release":"devel"},"name":"config-observability","namespace":"knative-serving"}} | |
creationTimestamp: "2019-12-03T10:54:26Z" | |
labels: | |
serving.knative.dev/release: devel | |
name: config-observability | |
namespace: knative-serving | |
resourceVersion: "43965" | |
selfLink: /api/v1/namespaces/knative-serving/configmaps/config-observability | |
uid: 45cbe8ea-15bb-11ea-b5af-027e0b84da98 | |
- apiVersion: v1 | |
data: | |
_example: | | |
################################ | |
# # | |
# EXAMPLE CONFIGURATION # | |
# # | |
################################ | |
# This block is not actually functional configuration, | |
# but serves to illustrate the available configuration | |
# options and document them in a way that is accessible | |
# to users that `kubectl edit` this config map. | |
# | |
# These sample configuration options may be copied out of | |
# this example block and unindented to be in the data block | |
# to actually change the configuration. | |
# | |
# This may be "zipkin" or "stackdriver", the default is "none" | |
backend: "none" | |
# URL to zipkin collector where traces are sent. | |
# This must be specified when backend is "zipkin" | |
zipkin-endpoint: "http://zipkin.istio-system.svc.cluster.local:9411/api/v2/spans" | |
# The GCP project into which stackdriver metrics will be written | |
# when backend is "stackdriver". If unspecified, the project-id | |
# is read from GCP metadata when running on GCP. | |
stackdriver-project-id: "my-project" | |
# Enable zipkin debug mode. This allows all spans to be sent to the server | |
# bypassing sampling. | |
debug: "false" | |
# Percentage (0-1) of requests to trace | |
sample-rate: "0.1" | |
kind: ConfigMap | |
metadata: | |
annotations: | |
kubectl.kubernetes.io/last-applied-configuration: | | |
{"apiVersion":"v1","data":{"_example":"################################\n# #\n# EXAMPLE CONFIGURATION #\n# #\n################################\n\n# This block is not actually functional configuration,\n# but serves to illustrate the available configuration\n# options and document them in a way that is accessible\n# to users that `kubectl edit` this config map.\n#\n# These sample configuration options may be copied out of\n# this example block and unindented to be in the data block\n# to actually change the configuration.\n#\n# This may be \"zipkin\" or \"stackdriver\", the default is \"none\"\nbackend: \"none\"\n\n# URL to zipkin collector where traces are sent.\n# This must be specified when backend is \"zipkin\"\nzipkin-endpoint: \"http://zipkin.istio-system.svc.cluster.local:9411/api/v2/spans\"\n\n# The GCP project into which stackdriver metrics will be written\n# when backend is \"stackdriver\". If unspecified, the project-id\n# is read from GCP metadata when running on GCP.\nstackdriver-project-id: \"my-project\"\n\n# Enable zipkin debug mode. This allows all spans to be sent to the server\n# bypassing sampling.\ndebug: \"false\"\n\n# Percentage (0-1) of requests to trace\nsample-rate: \"0.1\"\n"},"kind":"ConfigMap","metadata":{"annotations":{},"labels":{"serving.knative.dev/release":"devel"},"name":"config-tracing","namespace":"knative-serving"}} | |
creationTimestamp: "2019-12-03T10:54:26Z" | |
labels: | |
serving.knative.dev/release: devel | |
name: config-tracing | |
namespace: knative-serving | |
resourceVersion: "43968" | |
selfLink: /api/v1/namespaces/knative-serving/configmaps/config-tracing | |
uid: 45fca185-15bb-11ea-b5af-027e0b84da98 | |
kind: List | |
metadata: | |
resourceVersion: "" | |
selfLink: "" | |
------- | |
resource: endpoints | |
------- | |
apiVersion: v1 | |
items: | |
- apiVersion: v1 | |
kind: Endpoints | |
metadata: | |
annotations: | |
endpoints.kubernetes.io/last-change-trigger-time: "2019-12-03T12:24:09Z" | |
creationTimestamp: "2019-12-03T10:54:09Z" | |
labels: | |
app: activator | |
serving.knative.dev/release: devel | |
name: activator-service | |
namespace: knative-serving | |
resourceVersion: "55013" | |
selfLink: /api/v1/namespaces/knative-serving/endpoints/activator-service | |
uid: 3b8e7704-15bb-11ea-b5af-027e0b84da98 | |
subsets: | |
- addresses: | |
- ip: 172.20.46.102 | |
nodeName: ip-172-20-40-226.ap-southeast-1.compute.internal | |
targetRef: | |
kind: Pod | |
name: activator-6f94df488-qtnbp | |
namespace: knative-serving | |
resourceVersion: "55011" | |
uid: ab6353bf-15c7-11ea-b5af-027e0b84da98 | |
ports: | |
- name: http | |
port: 8012 | |
protocol: TCP | |
- name: http-metrics | |
port: 9090 | |
protocol: TCP | |
- name: http2 | |
port: 8013 | |
protocol: TCP | |
- apiVersion: v1 | |
kind: Endpoints | |
metadata: | |
annotations: | |
endpoints.kubernetes.io/last-change-trigger-time: "2019-12-03T12:23:43Z" | |
creationTimestamp: "2019-12-03T10:54:23Z" | |
labels: | |
app: autoscaler | |
serving.knative.dev/release: devel | |
name: autoscaler | |
namespace: knative-serving | |
resourceVersion: "54915" | |
selfLink: /api/v1/namespaces/knative-serving/endpoints/autoscaler | |
uid: 441b85ed-15bb-11ea-b5af-027e0b84da98 | |
subsets: | |
- addresses: | |
- ip: 172.20.81.64 | |
nodeName: ip-172-20-67-65.ap-southeast-1.compute.internal | |
targetRef: | |
kind: Pod | |
name: autoscaler-698bf65564-fkfwb | |
namespace: knative-serving | |
resourceVersion: "54913" | |
uid: ab70f95e-15c7-11ea-b5af-027e0b84da98 | |
ports: | |
- name: http-metrics | |
port: 9090 | |
protocol: TCP | |
- name: http | |
port: 8080 | |
protocol: TCP | |
- name: https-custom-metrics | |
port: 8443 | |
protocol: TCP | |
- apiVersion: v1 | |
kind: Endpoints | |
metadata: | |
annotations: | |
endpoints.kubernetes.io/last-change-trigger-time: "2019-12-03T12:23:12Z" | |
creationTimestamp: "2019-12-03T10:54:09Z" | |
labels: | |
app: controller | |
serving.knative.dev/release: devel | |
name: controller | |
namespace: knative-serving | |
resourceVersion: "54609" | |
selfLink: /api/v1/namespaces/knative-serving/endpoints/controller | |
uid: 3bb7b045-15bb-11ea-b5af-027e0b84da98 | |
subsets: | |
- addresses: | |
- ip: 172.20.84.222 | |
nodeName: ip-172-20-67-65.ap-southeast-1.compute.internal | |
targetRef: | |
kind: Pod | |
name: controller-7667dd8fcb-tdhhj | |
namespace: knative-serving | |
resourceVersion: "54607" | |
uid: ab89550a-15c7-11ea-b5af-027e0b84da98 | |
ports: | |
- name: http-metrics | |
port: 9090 | |
protocol: TCP | |
- apiVersion: v1 | |
kind: Endpoints | |
metadata: | |
annotations: | |
endpoints.kubernetes.io/last-change-trigger-time: "2019-12-03T12:23:15Z" | |
creationTimestamp: "2019-12-03T10:54:09Z" | |
labels: | |
role: webhook | |
serving.knative.dev/release: devel | |
name: webhook | |
namespace: knative-serving | |
resourceVersion: "54618" | |
selfLink: /api/v1/namespaces/knative-serving/endpoints/webhook | |
uid: 3bdcbeca-15bb-11ea-b5af-027e0b84da98 | |
subsets: | |
- addresses: | |
- ip: 172.20.43.115 | |
nodeName: ip-172-20-40-226.ap-southeast-1.compute.internal | |
targetRef: | |
kind: Pod | |
name: webhook-54c85dd7d9-q9852 | |
namespace: knative-serving | |
resourceVersion: "54616" | |
uid: abcae38b-15c7-11ea-b5af-027e0b84da98 | |
ports: | |
- name: https-webhook | |
port: 8443 | |
protocol: TCP | |
kind: List | |
metadata: | |
resourceVersion: "" | |
selfLink: "" | |
------- | |
resource: events | |
------- | |
apiVersion: v1 | |
items: | |
- apiVersion: v1 | |
count: 1 | |
eventTime: null | |
firstTimestamp: "2019-12-03T12:23:10Z" | |
involvedObject: | |
apiVersion: v1 | |
fieldPath: spec.containers{istio-proxy} | |
kind: Pod | |
name: activator-6f94df488-7wp6g | |
namespace: knative-serving | |
resourceVersion: "43914" | |
uid: 43852e05-15bb-11ea-b5af-027e0b84da98 | |
kind: Event | |
lastTimestamp: "2019-12-03T12:23:10Z" | |
message: Stopping container istio-proxy | |
metadata: | |
creationTimestamp: "2019-12-03T12:23:10Z" | |
name: activator-6f94df488-7wp6g.15dcdbef526c32b1 | |
namespace: knative-serving | |
resourceVersion: "3290" | |
selfLink: /api/v1/namespaces/knative-serving/events/activator-6f94df488-7wp6g.15dcdbef526c32b1 | |
uid: ab60829c-15c7-11ea-b5af-027e0b84da98 | |
reason: Killing | |
reportingComponent: "" | |
reportingInstance: "" | |
source: | |
component: kubelet | |
host: ip-172-20-40-226.ap-southeast-1.compute.internal | |
type: Normal | |
- apiVersion: v1 | |
count: 1 | |
eventTime: null | |
firstTimestamp: "2019-12-03T12:23:10Z" | |
involvedObject: | |
apiVersion: v1 | |
fieldPath: spec.containers{activator} | |
kind: Pod | |
name: activator-6f94df488-7wp6g | |
namespace: knative-serving | |
resourceVersion: "43914" | |
uid: 43852e05-15bb-11ea-b5af-027e0b84da98 | |
kind: Event | |
lastTimestamp: "2019-12-03T12:23:10Z" | |
message: Stopping container activator | |
metadata: | |
creationTimestamp: "2019-12-03T12:23:10Z" | |
name: activator-6f94df488-7wp6g.15dcdbef526f32f9 | |
namespace: knative-serving | |
resourceVersion: "3289" | |
selfLink: /api/v1/namespaces/knative-serving/events/activator-6f94df488-7wp6g.15dcdbef526f32f9 | |
uid: ab5f27f1-15c7-11ea-b5af-027e0b84da98 | |
reason: Killing | |
reportingComponent: "" | |
reportingInstance: "" | |
source: | |
component: kubelet | |
host: ip-172-20-40-226.ap-southeast-1.compute.internal | |
type: Normal | |
- apiVersion: v1 | |
count: 10 | |
eventTime: null | |
firstTimestamp: "2019-12-03T12:23:12Z" | |
involvedObject: | |
apiVersion: v1 | |
fieldPath: spec.containers{istio-proxy} | |
kind: Pod | |
name: activator-6f94df488-7wp6g | |
namespace: knative-serving | |
resourceVersion: "43914" | |
uid: 43852e05-15bb-11ea-b5af-027e0b84da98 | |
kind: Event | |
lastTimestamp: "2019-12-03T12:23:30Z" | |
message: 'Readiness probe failed: Get http://172.20.58.5:15020/healthz/ready: dial | |
tcp 172.20.58.5:15020: connect: connection refused' | |
metadata: | |
creationTimestamp: "2019-12-03T12:23:12Z" | |
name: activator-6f94df488-7wp6g.15dcdbefbfa21175 | |
namespace: knative-serving | |
resourceVersion: "3470" | |
selfLink: /api/v1/namespaces/knative-serving/events/activator-6f94df488-7wp6g.15dcdbefbfa21175 | |
uid: ac765100-15c7-11ea-b5af-027e0b84da98 | |
reason: Unhealthy | |
reportingComponent: "" | |
reportingInstance: "" | |
source: | |
component: kubelet | |
host: ip-172-20-40-226.ap-southeast-1.compute.internal | |
type: Warning | |
- apiVersion: v1 | |
count: 3 | |
eventTime: null | |
firstTimestamp: "2019-12-03T12:23:14Z" | |
involvedObject: | |
apiVersion: v1 | |
fieldPath: spec.containers{activator} | |
kind: Pod | |
name: activator-6f94df488-7wp6g | |
namespace: knative-serving | |
resourceVersion: "43914" | |
uid: 43852e05-15bb-11ea-b5af-027e0b84da98 | |
kind: Event | |
lastTimestamp: "2019-12-03T12:23:34Z" | |
message: 'Liveness probe failed: Get http://172.20.58.5:8012/healthz: dial tcp 172.20.58.5:8012: | |
connect: connection refused' | |
metadata: | |
creationTimestamp: "2019-12-03T12:23:14Z" | |
name: activator-6f94df488-7wp6g.15dcdbf02d55ac55 | |
namespace: knative-serving | |
resourceVersion: "3500" | |
selfLink: /api/v1/namespaces/knative-serving/events/activator-6f94df488-7wp6g.15dcdbf02d55ac55 | |
uid: ad8f2233-15c7-11ea-b5af-027e0b84da98 | |
reason: Unhealthy | |
reportingComponent: "" | |
reportingInstance: "" | |
source: | |
component: kubelet | |
host: ip-172-20-40-226.ap-southeast-1.compute.internal | |
type: Warning | |
- apiVersion: v1 | |
count: 3 | |
eventTime: null | |
firstTimestamp: "2019-12-03T12:23:15Z" | |
involvedObject: | |
apiVersion: v1 | |
fieldPath: spec.containers{activator} | |
kind: Pod | |
name: activator-6f94df488-7wp6g | |
namespace: knative-serving | |
resourceVersion: "43914" | |
uid: 43852e05-15bb-11ea-b5af-027e0b84da98 | |
kind: Event | |
lastTimestamp: "2019-12-03T12:23:35Z" | |
message: 'Readiness probe failed: Get http://172.20.58.5:8012/healthz: dial tcp | |
172.20.58.5:8012: connect: connection refused' | |
metadata: | |
creationTimestamp: "2019-12-03T12:23:15Z" | |
name: activator-6f94df488-7wp6g.15dcdbf05b730574 | |
namespace: knative-serving | |
resourceVersion: "3501" | |
selfLink: /api/v1/namespaces/knative-serving/events/activator-6f94df488-7wp6g.15dcdbf05b730574 | |
uid: ae053396-15c7-11ea-b5af-027e0b84da98 | |
reason: Unhealthy | |
reportingComponent: "" | |
reportingInstance: "" | |
source: | |
component: kubelet | |
host: ip-172-20-40-226.ap-southeast-1.compute.internal | |
type: Warning | |
- apiVersion: v1 | |
count: 1 | |
eventTime: null | |
firstTimestamp: "2019-12-03T12:23:10Z" | |
involvedObject: | |
apiVersion: v1 | |
kind: Pod | |
name: activator-6f94df488-qtnbp | |
namespace: knative-serving | |
resourceVersion: "54502" | |
uid: ab6353bf-15c7-11ea-b5af-027e0b84da98 | |
kind: Event | |
lastTimestamp: "2019-12-03T12:23:10Z" | |
message: Successfully assigned knative-serving/activator-6f94df488-qtnbp to ip-172-20-40-226.ap-southeast-1.compute.internal | |
metadata: | |
creationTimestamp: "2019-12-03T12:23:10Z" | |
name: activator-6f94df488-qtnbp.15dcdbef55794c44 | |
namespace: knative-serving | |
resourceVersion: "3292" | |
selfLink: /api/v1/namespaces/knative-serving/events/activator-6f94df488-qtnbp.15dcdbef55794c44 | |
uid: ab66ca0c-15c7-11ea-b5af-027e0b84da98 | |
reason: Scheduled | |
reportingComponent: "" | |
reportingInstance: "" | |
source: | |
component: default-scheduler | |
type: Normal | |
- apiVersion: v1 | |
count: 1 | |
eventTime: null | |
firstTimestamp: "2019-12-03T12:23:11Z" | |
involvedObject: | |
apiVersion: v1 | |
fieldPath: spec.initContainers{istio-init} | |
kind: Pod | |
name: activator-6f94df488-qtnbp | |
namespace: knative-serving | |
resourceVersion: "54503" | |
uid: ab6353bf-15c7-11ea-b5af-027e0b84da98 | |
kind: Event | |
lastTimestamp: "2019-12-03T12:23:11Z" | |
message: Container image "docker.io/istio/proxyv2:1.4.0" already present on machine | |
metadata: | |
creationTimestamp: "2019-12-03T12:23:11Z" | |
name: activator-6f94df488-qtnbp.15dcdbef7ac22487 | |
namespace: knative-serving | |
resourceVersion: "3314" | |
selfLink: /api/v1/namespaces/knative-serving/events/activator-6f94df488-qtnbp.15dcdbef7ac22487 | |
uid: abc60179-15c7-11ea-b5af-027e0b84da98 | |
reason: Pulled | |
reportingComponent: "" | |
reportingInstance: "" | |
source: | |
component: kubelet | |
host: ip-172-20-40-226.ap-southeast-1.compute.internal | |
type: Normal | |
- apiVersion: v1 | |
count: 1 | |
eventTime: null | |
firstTimestamp: "2019-12-03T12:23:11Z" | |
involvedObject: | |
apiVersion: v1 | |
fieldPath: spec.initContainers{istio-init} | |
kind: Pod | |
name: activator-6f94df488-qtnbp | |
namespace: knative-serving | |
resourceVersion: "54503" | |
uid: ab6353bf-15c7-11ea-b5af-027e0b84da98 | |
kind: Event | |
lastTimestamp: "2019-12-03T12:23:11Z" | |
message: Created container istio-init | |
metadata: | |
creationTimestamp: "2019-12-03T12:23:11Z" | |
name: activator-6f94df488-qtnbp.15dcdbef7e3eebc0 | |
namespace: knative-serving | |
resourceVersion: "3318" | |
selfLink: /api/v1/namespaces/knative-serving/events/activator-6f94df488-qtnbp.15dcdbef7e3eebc0 | |
uid: abcf1b00-15c7-11ea-b5af-027e0b84da98 | |
reason: Created | |
reportingComponent: "" | |
reportingInstance: "" | |
source: | |
component: kubelet | |
host: ip-172-20-40-226.ap-southeast-1.compute.internal | |
type: Normal | |
- apiVersion: v1 | |
count: 1 | |
eventTime: null | |
firstTimestamp: "2019-12-03T12:23:11Z" | |
involvedObject: | |
apiVersion: v1 | |
fieldPath: spec.initContainers{istio-init} | |
kind: Pod | |
name: activator-6f94df488-qtnbp | |
namespace: knative-serving | |
resourceVersion: "54503" | |
uid: ab6353bf-15c7-11ea-b5af-027e0b84da98 | |
kind: Event | |
lastTimestamp: "2019-12-03T12:23:11Z" | |
message: Started container istio-init | |
metadata: | |
creationTimestamp: "2019-12-03T12:23:11Z" | |
name: activator-6f94df488-qtnbp.15dcdbef865b856a | |
namespace: knative-serving | |
resourceVersion: "3319" | |
selfLink: /api/v1/namespaces/knative-serving/events/activator-6f94df488-qtnbp.15dcdbef865b856a | |
uid: abe3addf-15c7-11ea-b5af-027e0b84da98 | |
reason: Started | |
reportingComponent: "" | |
reportingInstance: "" | |
source: | |
component: kubelet | |
host: ip-172-20-40-226.ap-southeast-1.compute.internal | |
type: Normal | |
- apiVersion: v1 | |
count: 2 | |
eventTime: null | |
firstTimestamp: "2019-12-03T12:23:12Z" | |
involvedObject: | |
apiVersion: v1 | |
fieldPath: spec.containers{activator} | |
kind: Pod | |
name: activator-6f94df488-qtnbp | |
namespace: knative-serving | |
resourceVersion: "54503" | |
uid: ab6353bf-15c7-11ea-b5af-027e0b84da98 | |
kind: Event | |
lastTimestamp: "2019-12-03T12:24:08Z" | |
message: Container image "gcr.io/gcp-compute-engine-223401/activator-ecd51ca5034883acbe737fde417a3d86@sha256:b2257a5f6e2427a5a96f6ea9ca2b652ee648e131e9a699df6e20b4bcfa4ef940" | |
already present on machine | |
metadata: | |
creationTimestamp: "2019-12-03T12:23:12Z" | |
name: activator-6f94df488-qtnbp.15dcdbefc6e667a6 | |
namespace: knative-serving | |
resourceVersion: "3600" | |
selfLink: /api/v1/namespaces/knative-serving/events/activator-6f94df488-qtnbp.15dcdbefc6e667a6 | |
uid: ac88ea55-15c7-11ea-b5af-027e0b84da98 | |
reason: Pulled | |
reportingComponent: "" | |
reportingInstance: "" | |
source: | |
component: kubelet | |
host: ip-172-20-40-226.ap-southeast-1.compute.internal | |
type: Normal | |
- apiVersion: v1 | |
count: 2 | |
eventTime: null | |
firstTimestamp: "2019-12-03T12:23:12Z" | |
involvedObject: | |
apiVersion: v1 | |
fieldPath: spec.containers{activator} | |
kind: Pod | |
name: activator-6f94df488-qtnbp | |
namespace: knative-serving | |
resourceVersion: "54503" | |
uid: ab6353bf-15c7-11ea-b5af-027e0b84da98 | |
kind: Event | |
lastTimestamp: "2019-12-03T12:24:08Z" | |
message: Created container activator | |
metadata: | |
creationTimestamp: "2019-12-03T12:23:12Z" | |
name: activator-6f94df488-qtnbp.15dcdbefca469be0 | |
namespace: knative-serving | |
resourceVersion: "3601" | |
selfLink: /api/v1/namespaces/knative-serving/events/activator-6f94df488-qtnbp.15dcdbefca469be0 | |
uid: ac918f6e-15c7-11ea-b5af-027e0b84da98 | |
reason: Created | |
reportingComponent: "" | |
reportingInstance: "" | |
source: | |
component: kubelet | |
host: ip-172-20-40-226.ap-southeast-1.compute.internal | |
type: Normal | |
- apiVersion: v1 | |
count: 2 | |
eventTime: null | |
firstTimestamp: "2019-12-03T12:23:12Z" | |
involvedObject: | |
apiVersion: v1 | |
fieldPath: spec.containers{activator} | |
kind: Pod | |
name: activator-6f94df488-qtnbp | |
namespace: knative-serving | |
resourceVersion: "54503" | |
uid: ab6353bf-15c7-11ea-b5af-027e0b84da98 | |
kind: Event | |
lastTimestamp: "2019-12-03T12:24:09Z" | |
message: Started container activator | |
metadata: | |
creationTimestamp: "2019-12-03T12:23:12Z" | |
name: activator-6f94df488-qtnbp.15dcdbefd50ae173 | |
namespace: knative-serving | |
resourceVersion: "3602" | |
selfLink: /api/v1/namespaces/knative-serving/events/activator-6f94df488-qtnbp.15dcdbefd50ae173 | |
uid: acad2072-15c7-11ea-b5af-027e0b84da98 | |
reason: Started | |
reportingComponent: "" | |
reportingInstance: "" | |
source: | |
component: kubelet | |
host: ip-172-20-40-226.ap-southeast-1.compute.internal | |
type: Normal | |
- apiVersion: v1 | |
count: 1 | |
eventTime: null | |
firstTimestamp: "2019-12-03T12:23:12Z" | |
involvedObject: | |
apiVersion: v1 | |
fieldPath: spec.containers{istio-proxy} | |
kind: Pod | |
name: activator-6f94df488-qtnbp | |
namespace: knative-serving | |
resourceVersion: "54503" | |
uid: ab6353bf-15c7-11ea-b5af-027e0b84da98 | |
kind: Event | |
lastTimestamp: "2019-12-03T12:23:12Z" | |
message: Container image "docker.io/istio/proxyv2:1.4.0" already present on machine | |
metadata: | |
creationTimestamp: "2019-12-03T12:23:12Z" | |
name: activator-6f94df488-qtnbp.15dcdbefd53e7cab | |
namespace: knative-serving | |
resourceVersion: "3342" | |
selfLink: /api/v1/namespaces/knative-serving/events/activator-6f94df488-qtnbp.15dcdbefd53e7cab | |
uid: acad9cbb-15c7-11ea-b5af-027e0b84da98 | |
reason: Pulled | |
reportingComponent: "" | |
reportingInstance: "" | |
source: | |
component: kubelet | |
host: ip-172-20-40-226.ap-southeast-1.compute.internal | |
type: Normal | |
- apiVersion: v1 | |
count: 1 | |
eventTime: null | |
firstTimestamp: "2019-12-03T12:23:12Z" | |
involvedObject: | |
apiVersion: v1 | |
fieldPath: spec.containers{istio-proxy} | |
kind: Pod | |
name: activator-6f94df488-qtnbp | |
namespace: knative-serving | |
resourceVersion: "54503" | |
uid: ab6353bf-15c7-11ea-b5af-027e0b84da98 | |
kind: Event | |
lastTimestamp: "2019-12-03T12:23:12Z" | |
message: Created container istio-proxy | |
metadata: | |
creationTimestamp: "2019-12-03T12:23:12Z" | |
name: activator-6f94df488-qtnbp.15dcdbefd818605e | |
namespace: knative-serving | |
resourceVersion: "3344" | |
selfLink: /api/v1/namespaces/knative-serving/events/activator-6f94df488-qtnbp.15dcdbefd818605e | |
uid: acb4ea36-15c7-11ea-b5af-027e0b84da98 | |
reason: Created | |
reportingComponent: "" | |
reportingInstance: "" | |
source: | |
component: kubelet | |
host: ip-172-20-40-226.ap-southeast-1.compute.internal | |
type: Normal | |
- apiVersion: v1 | |
count: 1 | |
eventTime: null | |
firstTimestamp: "2019-12-03T12:23:12Z" | |
involvedObject: | |
apiVersion: v1 | |
fieldPath: spec.containers{istio-proxy} | |
kind: Pod | |
name: activator-6f94df488-qtnbp | |
namespace: knative-serving | |
resourceVersion: "54503" | |
uid: ab6353bf-15c7-11ea-b5af-027e0b84da98 | |
kind: Event | |
lastTimestamp: "2019-12-03T12:23:12Z" | |
message: Started container istio-proxy | |
metadata: | |
creationTimestamp: "2019-12-03T12:23:12Z" | |
name: activator-6f94df488-qtnbp.15dcdbefe057e3b9 | |
namespace: knative-serving | |
resourceVersion: "3345" | |
selfLink: /api/v1/namespaces/knative-serving/events/activator-6f94df488-qtnbp.15dcdbefe057e3b9 | |
uid: acca01da-15c7-11ea-b5af-027e0b84da98 | |
reason: Started | |
reportingComponent: "" | |
reportingInstance: "" | |
source: | |
component: kubelet | |
host: ip-172-20-40-226.ap-southeast-1.compute.internal | |
type: Normal | |
- apiVersion: v1 | |
count: 3 | |
eventTime: null | |
firstTimestamp: "2019-12-03T12:23:18Z" | |
involvedObject: | |
apiVersion: v1 | |
fieldPath: spec.containers{activator} | |
kind: Pod | |
name: activator-6f94df488-qtnbp | |
namespace: knative-serving | |
resourceVersion: "54503" | |
uid: ab6353bf-15c7-11ea-b5af-027e0b84da98 | |
kind: Event | |
lastTimestamp: "2019-12-03T12:23:38Z" | |
message: 'Liveness probe failed: HTTP probe failed with statuscode: 500' | |
metadata: | |
creationTimestamp: "2019-12-03T12:23:18Z" | |
name: activator-6f94df488-qtnbp.15dcdbf138336007 | |
namespace: knative-serving | |
resourceVersion: "3520" | |
selfLink: /api/v1/namespaces/knative-serving/events/activator-6f94df488-qtnbp.15dcdbf138336007 | |
uid: b03a52f9-15c7-11ea-b5af-027e0b84da98 | |
reason: Unhealthy | |
reportingComponent: "" | |
reportingInstance: "" | |
source: | |
component: kubelet | |
host: ip-172-20-40-226.ap-southeast-1.compute.internal | |
type: Warning | |
- apiVersion: v1 | |
count: 5 | |
eventTime: null | |
firstTimestamp: "2019-12-03T12:23:19Z" | |
involvedObject: | |
apiVersion: v1 | |
fieldPath: spec.containers{activator} | |
kind: Pod | |
name: activator-6f94df488-qtnbp | |
namespace: knative-serving | |
resourceVersion: "54503" | |
uid: ab6353bf-15c7-11ea-b5af-027e0b84da98 | |
kind: Event | |
lastTimestamp: "2019-12-03T12:23:59Z" | |
message: 'Readiness probe failed: HTTP probe failed with statuscode: 500' | |
metadata: | |
creationTimestamp: "2019-12-03T12:23:19Z" | |
name: activator-6f94df488-qtnbp.15dcdbf179c64e3b | |
namespace: knative-serving | |
resourceVersion: "3592" | |
selfLink: /api/v1/namespaces/knative-serving/events/activator-6f94df488-qtnbp.15dcdbf179c64e3b | |
uid: b0e231d7-15c7-11ea-b5af-027e0b84da98 | |
reason: Unhealthy | |
reportingComponent: "" | |
reportingInstance: "" | |
source: | |
component: kubelet | |
host: ip-172-20-40-226.ap-southeast-1.compute.internal | |
type: Warning | |
- apiVersion: v1 | |
count: 1 | |
eventTime: null | |
firstTimestamp: "2019-12-03T12:23:38Z" | |
involvedObject: | |
apiVersion: v1 | |
fieldPath: spec.containers{activator} | |
kind: Pod | |
name: activator-6f94df488-qtnbp | |
namespace: knative-serving | |
resourceVersion: "54503" | |
uid: ab6353bf-15c7-11ea-b5af-027e0b84da98 | |
kind: Event | |
lastTimestamp: "2019-12-03T12:23:38Z" | |
message: Container activator failed liveness probe, will be restarted | |
metadata: | |
creationTimestamp: "2019-12-03T12:23:38Z" | |
name: activator-6f94df488-qtnbp.15dcdbf5e05ca76f | |
namespace: knative-serving | |
resourceVersion: "3521" | |
selfLink: /api/v1/namespaces/knative-serving/events/activator-6f94df488-qtnbp.15dcdbf5e05ca76f | |
uid: bc270488-15c7-11ea-b5af-027e0b84da98 | |
reason: Killing | |
reportingComponent: "" | |
reportingInstance: "" | |
source: | |
component: kubelet | |
host: ip-172-20-40-226.ap-southeast-1.compute.internal | |
type: Normal | |
- apiVersion: v1 | |
count: 1 | |
eventTime: null | |
firstTimestamp: "2019-12-03T12:23:10Z" | |
involvedObject: | |
apiVersion: apps/v1 | |
kind: ReplicaSet | |
name: activator-6f94df488 | |
namespace: knative-serving | |
resourceVersion: "44158" | |
uid: 437fd7fa-15bb-11ea-b5af-027e0b84da98 | |
kind: Event | |
lastTimestamp: "2019-12-03T12:23:10Z" | |
message: 'Created pod: activator-6f94df488-qtnbp' | |
metadata: | |
creationTimestamp: "2019-12-03T12:23:10Z" | |
name: activator-6f94df488.15dcdbef54cd54fc | |
namespace: knative-serving | |
resourceVersion: "3291" | |
selfLink: /api/v1/namespaces/knative-serving/events/activator-6f94df488.15dcdbef54cd54fc | |
uid: ab65547e-15c7-11ea-b5af-027e0b84da98 | |
reason: SuccessfulCreate | |
reportingComponent: "" | |
reportingInstance: "" | |
source: | |
component: replicaset-controller | |
type: Normal | |
- apiVersion: v1 | |
count: 568 | |
eventTime: null | |
firstTimestamp: "2019-12-03T10:54:37Z" | |
involvedObject: | |
apiVersion: autoscaling/v2beta2 | |
kind: HorizontalPodAutoscaler | |
name: activator | |
namespace: knative-serving | |
resourceVersion: "43918" | |
uid: 43a3dab4-15bb-11ea-b5af-027e0b84da98 | |
kind: Event | |
lastTimestamp: "2019-12-03T13:19:43Z" | |
message: 'unable to get metrics for resource cpu: unable to fetch metrics from resource | |
metrics API: the server could not find the requested resource (get pods.metrics.k8s.io)' | |
metadata: | |
creationTimestamp: "2019-12-03T10:54:37Z" | |
name: activator.15dcd71a4c56908a | |
namespace: knative-serving | |
resourceVersion: "3753" | |
selfLink: /api/v1/namespaces/knative-serving/events/activator.15dcd71a4c56908a | |
uid: 4c96b96d-15bb-11ea-b5af-027e0b84da98 | |
reason: FailedGetResourceMetric | |
reportingComponent: "" | |
reportingInstance: "" | |
source: | |
component: horizontal-pod-autoscaler | |
type: Warning | |
- apiVersion: v1 | |
count: 1 | |
eventTime: null | |
firstTimestamp: "2019-12-03T12:23:10Z" | |
involvedObject: | |
apiVersion: v1 | |
kind: Pod | |
name: autoscaler-698bf65564-fkfwb | |
namespace: knative-serving | |
resourceVersion: "54512" | |
uid: ab70f95e-15c7-11ea-b5af-027e0b84da98 | |
kind: Event | |
lastTimestamp: "2019-12-03T12:23:10Z" | |
message: Successfully assigned knative-serving/autoscaler-698bf65564-fkfwb to ip-172-20-67-65.ap-southeast-1.compute.internal | |
metadata: | |
creationTimestamp: "2019-12-03T12:23:10Z" | |
name: autoscaler-698bf65564-fkfwb.15dcdbef5c4a1ae9 | |
namespace: knative-serving | |
resourceVersion: "3296" | |
selfLink: /api/v1/namespaces/knative-serving/events/autoscaler-698bf65564-fkfwb.15dcdbef5c4a1ae9 | |
uid: ab785d5e-15c7-11ea-b5af-027e0b84da98 | |
reason: Scheduled | |
reportingComponent: "" | |
reportingInstance: "" | |
source: | |
component: default-scheduler | |
type: Normal | |
- apiVersion: v1 | |
count: 1 | |
eventTime: null | |
firstTimestamp: "2019-12-03T12:23:11Z" | |
involvedObject: | |
apiVersion: v1 | |
fieldPath: spec.initContainers{istio-init} | |
kind: Pod | |
name: autoscaler-698bf65564-fkfwb | |
namespace: knative-serving | |
resourceVersion: "54514" | |
uid: ab70f95e-15c7-11ea-b5af-027e0b84da98 | |
kind: Event | |
lastTimestamp: "2019-12-03T12:23:11Z" | |
message: Container image "docker.io/istio/proxyv2:1.4.0" already present on machine | |
metadata: | |
creationTimestamp: "2019-12-03T12:23:11Z" | |
name: autoscaler-698bf65564-fkfwb.15dcdbef95545e0e | |
namespace: knative-serving | |
resourceVersion: "3323" | |
selfLink: /api/v1/namespaces/knative-serving/events/autoscaler-698bf65564-fkfwb.15dcdbef95545e0e | |
uid: ac09f6ee-15c7-11ea-b5af-027e0b84da98 | |
reason: Pulled | |
reportingComponent: "" | |
reportingInstance: "" | |
source: | |
component: kubelet | |
host: ip-172-20-67-65.ap-southeast-1.compute.internal | |
type: Normal | |
- apiVersion: v1 | |
count: 1 | |
eventTime: null | |
firstTimestamp: "2019-12-03T12:23:11Z" | |
involvedObject: | |
apiVersion: v1 | |
fieldPath: spec.initContainers{istio-init} | |
kind: Pod | |
name: autoscaler-698bf65564-fkfwb | |
namespace: knative-serving | |
resourceVersion: "54514" | |
uid: ab70f95e-15c7-11ea-b5af-027e0b84da98 | |
kind: Event | |
lastTimestamp: "2019-12-03T12:23:11Z" | |
message: Created container istio-init | |
metadata: | |
creationTimestamp: "2019-12-03T12:23:11Z" | |
name: autoscaler-698bf65564-fkfwb.15dcdbef98be6cf7 | |
namespace: knative-serving | |
resourceVersion: "3324" | |
selfLink: /api/v1/namespaces/knative-serving/events/autoscaler-698bf65564-fkfwb.15dcdbef98be6cf7 | |
uid: ac12b983-15c7-11ea-b5af-027e0b84da98 | |
reason: Created | |
reportingComponent: "" | |
reportingInstance: "" | |
source: | |
component: kubelet | |
host: ip-172-20-67-65.ap-southeast-1.compute.internal | |
type: Normal | |
- apiVersion: v1 | |
count: 1 | |
eventTime: null | |
firstTimestamp: "2019-12-03T12:23:12Z" | |
involvedObject: | |
apiVersion: v1 | |
fieldPath: spec.initContainers{istio-init} | |
kind: Pod | |
name: autoscaler-698bf65564-fkfwb | |
namespace: knative-serving | |
resourceVersion: "54514" | |
uid: ab70f95e-15c7-11ea-b5af-027e0b84da98 | |
kind: Event | |
lastTimestamp: "2019-12-03T12:23:12Z" | |
message: Started container istio-init | |
metadata: | |
creationTimestamp: "2019-12-03T12:23:12Z" | |
name: autoscaler-698bf65564-fkfwb.15dcdbefaa1a12e1 | |
namespace: knative-serving | |
resourceVersion: "3331" | |
selfLink: /api/v1/namespaces/knative-serving/events/autoscaler-698bf65564-fkfwb.15dcdbefaa1a12e1 | |
uid: ac3f2e0c-15c7-11ea-b5af-027e0b84da98 | |
reason: Started | |
reportingComponent: "" | |
reportingInstance: "" | |
source: | |
component: kubelet | |
host: ip-172-20-67-65.ap-southeast-1.compute.internal | |
type: Normal | |
- apiVersion: v1 | |
count: 1 | |
eventTime: null | |
firstTimestamp: "2019-12-03T12:23:12Z" | |
involvedObject: | |
apiVersion: v1 | |
fieldPath: spec.containers{autoscaler} | |
kind: Pod | |
name: autoscaler-698bf65564-fkfwb | |
namespace: knative-serving | |
resourceVersion: "54514" | |
uid: ab70f95e-15c7-11ea-b5af-027e0b84da98 | |
kind: Event | |
lastTimestamp: "2019-12-03T12:23:12Z" | |
message: Pulling image "gcr.io/gcp-compute-engine-223401/autoscaler-12c0fa24db31956a7cfa673210e4fa13@sha256:f74987342b3c7bcb8b95006f98a8efcfa19bd518430844df037cd5f29132c997" | |
metadata: | |
creationTimestamp: "2019-12-03T12:23:12Z" | |
name: autoscaler-698bf65564-fkfwb.15dcdbefd72bc238 | |
namespace: knative-serving | |
resourceVersion: "3343" | |
selfLink: /api/v1/namespaces/knative-serving/events/autoscaler-698bf65564-fkfwb.15dcdbefd72bc238 | |
uid: acb28b50-15c7-11ea-b5af-027e0b84da98 | |
reason: Pulling | |
reportingComponent: "" | |
reportingInstance: "" | |
source: | |
component: kubelet | |
host: ip-172-20-67-65.ap-southeast-1.compute.internal | |
type: Normal | |
- apiVersion: v1 | |
count: 1 | |
eventTime: null | |
firstTimestamp: "2019-12-03T12:23:17Z" | |
involvedObject: | |
apiVersion: v1 | |
fieldPath: spec.containers{autoscaler} | |
kind: Pod | |
name: autoscaler-698bf65564-fkfwb | |
namespace: knative-serving | |
resourceVersion: "54514" | |
uid: ab70f95e-15c7-11ea-b5af-027e0b84da98 | |
kind: Event | |
lastTimestamp: "2019-12-03T12:23:17Z" | |
message: Successfully pulled image "gcr.io/gcp-compute-engine-223401/autoscaler-12c0fa24db31956a7cfa673210e4fa13@sha256:f74987342b3c7bcb8b95006f98a8efcfa19bd518430844df037cd5f29132c997" | |
metadata: | |
creationTimestamp: "2019-12-03T12:23:17Z" | |
name: autoscaler-698bf65564-fkfwb.15dcdbf0de31b9a7 | |
namespace: knative-serving | |
resourceVersion: "3359" | |
selfLink: /api/v1/namespaces/knative-serving/events/autoscaler-698bf65564-fkfwb.15dcdbf0de31b9a7 | |
uid: af53e620-15c7-11ea-b5af-027e0b84da98 | |
reason: Pulled | |
reportingComponent: "" | |
reportingInstance: "" | |
source: | |
component: kubelet | |
host: ip-172-20-67-65.ap-southeast-1.compute.internal | |
type: Normal | |
- apiVersion: v1 | |
count: 3 | |
eventTime: null | |
firstTimestamp: "2019-12-03T12:23:17Z" | |
involvedObject: | |
apiVersion: v1 | |
fieldPath: spec.containers{autoscaler} | |
kind: Pod | |
name: autoscaler-698bf65564-fkfwb | |
namespace: knative-serving | |
resourceVersion: "54514" | |
uid: ab70f95e-15c7-11ea-b5af-027e0b84da98 | |
kind: Event | |
lastTimestamp: "2019-12-03T12:23:38Z" | |
message: Created container autoscaler | |
metadata: | |
creationTimestamp: "2019-12-03T12:23:17Z" | |
name: autoscaler-698bf65564-fkfwb.15dcdbf0e18bceb1 | |
namespace: knative-serving | |
resourceVersion: "3523" | |
selfLink: /api/v1/namespaces/knative-serving/events/autoscaler-698bf65564-fkfwb.15dcdbf0e18bceb1 | |
uid: af5c7a4a-15c7-11ea-b5af-027e0b84da98 | |
reason: Created | |
reportingComponent: "" | |
reportingInstance: "" | |
source: | |
component: kubelet | |
host: ip-172-20-67-65.ap-southeast-1.compute.internal | |
type: Normal | |
- apiVersion: v1 | |
count: 3 | |
eventTime: null | |
firstTimestamp: "2019-12-03T12:23:17Z" | |
involvedObject: | |
apiVersion: v1 | |
fieldPath: spec.containers{autoscaler} | |
kind: Pod | |
name: autoscaler-698bf65564-fkfwb | |
namespace: knative-serving | |
resourceVersion: "54514" | |
uid: ab70f95e-15c7-11ea-b5af-027e0b84da98 | |
kind: Event | |
lastTimestamp: "2019-12-03T12:23:39Z" | |
message: Started container autoscaler | |
metadata: | |
creationTimestamp: "2019-12-03T12:23:17Z" | |
name: autoscaler-698bf65564-fkfwb.15dcdbf0efda9543 | |
namespace: knative-serving | |
resourceVersion: "3524" | |
selfLink: /api/v1/namespaces/knative-serving/events/autoscaler-698bf65564-fkfwb.15dcdbf0efda9543 | |
uid: af811028-15c7-11ea-b5af-027e0b84da98 | |
reason: Started | |
reportingComponent: "" | |
reportingInstance: "" | |
source: | |
component: kubelet | |
host: ip-172-20-67-65.ap-southeast-1.compute.internal | |
type: Normal | |
- apiVersion: v1 | |
count: 1 | |
eventTime: null | |
firstTimestamp: "2019-12-03T12:23:17Z" | |
involvedObject: | |
apiVersion: v1 | |
fieldPath: spec.containers{istio-proxy} | |
kind: Pod | |
name: autoscaler-698bf65564-fkfwb | |
namespace: knative-serving | |
resourceVersion: "54514" | |
uid: ab70f95e-15c7-11ea-b5af-027e0b84da98 | |
kind: Event | |
lastTimestamp: "2019-12-03T12:23:17Z" | |
message: Container image "docker.io/istio/proxyv2:1.4.0" already present on machine | |
metadata: | |
creationTimestamp: "2019-12-03T12:23:17Z" | |
name: autoscaler-698bf65564-fkfwb.15dcdbf0f009a9a4 | |
namespace: knative-serving | |
resourceVersion: "3365" | |
selfLink: /api/v1/namespaces/knative-serving/events/autoscaler-698bf65564-fkfwb.15dcdbf0f009a9a4 | |
uid: af818d56-15c7-11ea-b5af-027e0b84da98 | |
reason: Pulled | |
reportingComponent: "" | |
reportingInstance: "" | |
source: | |
component: kubelet | |
host: ip-172-20-67-65.ap-southeast-1.compute.internal | |
type: Normal | |
- apiVersion: v1 | |
count: 1 | |
eventTime: null | |
firstTimestamp: "2019-12-03T12:23:17Z" | |
involvedObject: | |
apiVersion: v1 | |
fieldPath: spec.containers{istio-proxy} | |
kind: Pod | |
name: autoscaler-698bf65564-fkfwb | |
namespace: knative-serving | |
resourceVersion: "54514" | |
uid: ab70f95e-15c7-11ea-b5af-027e0b84da98 | |
kind: Event | |
lastTimestamp: "2019-12-03T12:23:17Z" | |
message: Created container istio-proxy | |
metadata: | |
creationTimestamp: "2019-12-03T12:23:17Z" | |
name: autoscaler-698bf65564-fkfwb.15dcdbf0f2724a2a | |
namespace: knative-serving | |
resourceVersion: "3366" | |
selfLink: /api/v1/namespaces/knative-serving/events/autoscaler-698bf65564-fkfwb.15dcdbf0f2724a2a | |
uid: af87cb40-15c7-11ea-b5af-027e0b84da98 | |
reason: Created | |
reportingComponent: "" | |
reportingInstance: "" | |
source: | |
component: kubelet | |
host: ip-172-20-67-65.ap-southeast-1.compute.internal | |
type: Normal | |
- apiVersion: v1 | |
count: 1 | |
eventTime: null | |
firstTimestamp: "2019-12-03T12:23:17Z" | |
involvedObject: | |
apiVersion: v1 | |
fieldPath: spec.containers{istio-proxy} | |
kind: Pod | |
name: autoscaler-698bf65564-fkfwb | |
namespace: knative-serving | |
resourceVersion: "54514" | |
uid: ab70f95e-15c7-11ea-b5af-027e0b84da98 | |
kind: Event | |
lastTimestamp: "2019-12-03T12:23:17Z" | |
message: Started container istio-proxy | |
metadata: | |
creationTimestamp: "2019-12-03T12:23:17Z" | |
name: autoscaler-698bf65564-fkfwb.15dcdbf0fae37338 | |
namespace: knative-serving | |
resourceVersion: "3367" | |
selfLink: /api/v1/namespaces/knative-serving/events/autoscaler-698bf65564-fkfwb.15dcdbf0fae37338 | |
uid: af9d587c-15c7-11ea-b5af-027e0b84da98 | |
reason: Started | |
reportingComponent: "" | |
reportingInstance: "" | |
source: | |
component: kubelet | |
host: ip-172-20-67-65.ap-southeast-1.compute.internal | |
type: Normal | |
- apiVersion: v1 | |
count: 2 | |
eventTime: null | |
firstTimestamp: "2019-12-03T12:23:17Z" | |
involvedObject: | |
apiVersion: v1 | |
fieldPath: spec.containers{autoscaler} | |
kind: Pod | |
name: autoscaler-698bf65564-fkfwb | |
namespace: knative-serving | |
resourceVersion: "54514" | |
uid: ab70f95e-15c7-11ea-b5af-027e0b84da98 | |
kind: Event | |
lastTimestamp: "2019-12-03T12:23:38Z" | |
message: Container image "gcr.io/gcp-compute-engine-223401/autoscaler-12c0fa24db31956a7cfa673210e4fa13@sha256:f74987342b3c7bcb8b95006f98a8efcfa19bd518430844df037cd5f29132c997" | |
already present on machine | |
metadata: | |
creationTimestamp: "2019-12-03T12:23:17Z" | |
name: autoscaler-698bf65564-fkfwb.15dcdbf10535d484 | |
namespace: knative-serving | |
resourceVersion: "3522" | |
selfLink: /api/v1/namespaces/knative-serving/events/autoscaler-698bf65564-fkfwb.15dcdbf10535d484 | |
uid: afb7bb3a-15c7-11ea-b5af-027e0b84da98 | |
reason: Pulled | |
reportingComponent: "" | |
reportingInstance: "" | |
source: | |
component: kubelet | |
host: ip-172-20-67-65.ap-southeast-1.compute.internal | |
type: Normal | |
- apiVersion: v1 | |
count: 3 | |
eventTime: null | |
firstTimestamp: "2019-12-03T12:23:18Z" | |
involvedObject: | |
apiVersion: v1 | |
fieldPath: spec.containers{autoscaler} | |
kind: Pod | |
name: autoscaler-698bf65564-fkfwb | |
namespace: knative-serving | |
resourceVersion: "54514" | |
uid: ab70f95e-15c7-11ea-b5af-027e0b84da98 | |
kind: Event | |
lastTimestamp: "2019-12-03T12:23:23Z" | |
message: Back-off restarting failed container | |
metadata: | |
creationTimestamp: "2019-12-03T12:23:18Z" | |
name: autoscaler-698bf65564-fkfwb.15dcdbf14216d3f1 | |
namespace: knative-serving | |
resourceVersion: "3387" | |
selfLink: /api/v1/namespaces/knative-serving/events/autoscaler-698bf65564-fkfwb.15dcdbf14216d3f1 | |
uid: b053a6bb-15c7-11ea-b5af-027e0b84da98 | |
reason: BackOff | |
reportingComponent: "" | |
reportingInstance: "" | |
source: | |
component: kubelet | |
host: ip-172-20-67-65.ap-southeast-1.compute.internal | |
type: Warning | |
- apiVersion: v1 | |
count: 1 | |
eventTime: null | |
firstTimestamp: "2019-12-03T12:23:10Z" | |
involvedObject: | |
apiVersion: v1 | |
fieldPath: spec.containers{istio-proxy} | |
kind: Pod | |
name: autoscaler-698bf65564-nsdc7 | |
namespace: knative-serving | |
resourceVersion: "43941" | |
uid: 4446c57f-15bb-11ea-b5af-027e0b84da98 | |
kind: Event | |
lastTimestamp: "2019-12-03T12:23:10Z" | |
message: Stopping container istio-proxy | |
metadata: | |
creationTimestamp: "2019-12-03T12:23:10Z" | |
name: autoscaler-698bf65564-nsdc7.15dcdbef581cc736 | |
namespace: knative-serving | |
resourceVersion: "3294" | |
selfLink: /api/v1/namespaces/knative-serving/events/autoscaler-698bf65564-nsdc7.15dcdbef581cc736 | |
uid: ab6efd69-15c7-11ea-b5af-027e0b84da98 | |
reason: Killing | |
reportingComponent: "" | |
reportingInstance: "" | |
source: | |
component: kubelet | |
host: ip-172-20-83-101.ap-southeast-1.compute.internal | |
type: Normal | |
- apiVersion: v1 | |
count: 1 | |
eventTime: null | |
firstTimestamp: "2019-12-03T12:23:10Z" | |
involvedObject: | |
apiVersion: v1 | |
fieldPath: spec.containers{autoscaler} | |
kind: Pod | |
name: autoscaler-698bf65564-nsdc7 | |
namespace: knative-serving | |
resourceVersion: "43941" | |
uid: 4446c57f-15bb-11ea-b5af-027e0b84da98 | |
kind: Event | |
lastTimestamp: "2019-12-03T12:23:10Z" | |
message: Stopping container autoscaler | |
metadata: | |
creationTimestamp: "2019-12-03T12:23:10Z" | |
name: autoscaler-698bf65564-nsdc7.15dcdbef5820cee7 | |
namespace: knative-serving | |
resourceVersion: "3293" | |
selfLink: /api/v1/namespaces/knative-serving/events/autoscaler-698bf65564-nsdc7.15dcdbef5820cee7 | |
uid: ab6d6575-15c7-11ea-b5af-027e0b84da98 | |
reason: Killing | |
reportingComponent: "" | |
reportingInstance: "" | |
source: | |
component: kubelet | |
host: ip-172-20-83-101.ap-southeast-1.compute.internal | |
type: Normal | |
- apiVersion: v1 | |
count: 10 | |
eventTime: null | |
firstTimestamp: "2019-12-03T12:23:11Z" | |
involvedObject: | |
apiVersion: v1 | |
fieldPath: spec.containers{istio-proxy} | |
kind: Pod | |
name: autoscaler-698bf65564-nsdc7 | |
namespace: knative-serving | |
resourceVersion: "43941" | |
uid: 4446c57f-15bb-11ea-b5af-027e0b84da98 | |
kind: Event | |
lastTimestamp: "2019-12-03T12:23:29Z" | |
message: 'Readiness probe failed: Get http://172.20.79.20:15020/healthz/ready: dial | |
tcp 172.20.79.20:15020: connect: connection refused' | |
metadata: | |
creationTimestamp: "2019-12-03T12:23:11Z" | |
name: autoscaler-698bf65564-nsdc7.15dcdbef89c4d377 | |
namespace: knative-serving | |
resourceVersion: "3466" | |
selfLink: /api/v1/namespaces/knative-serving/events/autoscaler-698bf65564-nsdc7.15dcdbef89c4d377 | |
uid: abec68ca-15c7-11ea-b5af-027e0b84da98 | |
reason: Unhealthy | |
reportingComponent: "" | |
reportingInstance: "" | |
source: | |
component: kubelet | |
host: ip-172-20-83-101.ap-southeast-1.compute.internal | |
type: Warning | |
- apiVersion: v1 | |
count: 1 | |
eventTime: null | |
firstTimestamp: "2019-12-03T12:23:10Z" | |
involvedObject: | |
apiVersion: apps/v1 | |
kind: ReplicaSet | |
name: autoscaler-698bf65564 | |
namespace: knative-serving | |
resourceVersion: "44043" | |
uid: 4443a853-15bb-11ea-b5af-027e0b84da98 | |
kind: Event | |
lastTimestamp: "2019-12-03T12:23:10Z" | |
message: 'Created pod: autoscaler-698bf65564-fkfwb' | |
metadata: | |
creationTimestamp: "2019-12-03T12:23:10Z" | |
name: autoscaler-698bf65564.15dcdbef5a5c27ed | |
namespace: knative-serving | |
resourceVersion: "3295" | |
selfLink: /api/v1/namespaces/knative-serving/events/autoscaler-698bf65564.15dcdbef5a5c27ed | |
uid: ab737244-15c7-11ea-b5af-027e0b84da98 | |
reason: SuccessfulCreate | |
reportingComponent: "" | |
reportingInstance: "" | |
source: | |
component: replicaset-controller | |
type: Normal | |
- apiVersion: v1 | |
count: 1 | |
eventTime: null | |
firstTimestamp: "2019-12-03T12:23:10Z" | |
involvedObject: | |
apiVersion: v1 | |
kind: Pod | |
name: autoscaler-hpa-555cf99b79-fc2j5 | |
namespace: knative-serving | |
resourceVersion: "54519" | |
uid: ab7b3a04-15c7-11ea-b5af-027e0b84da98 | |
kind: Event | |
lastTimestamp: "2019-12-03T12:23:10Z" | |
message: Successfully assigned knative-serving/autoscaler-hpa-555cf99b79-fc2j5 to | |
ip-172-20-83-101.ap-southeast-1.compute.internal | |
metadata: | |
creationTimestamp: "2019-12-03T12:23:10Z" | |
name: autoscaler-hpa-555cf99b79-fc2j5.15dcdbef603920fe | |
namespace: knative-serving | |
resourceVersion: "3299" | |
selfLink: /api/v1/namespaces/knative-serving/events/autoscaler-hpa-555cf99b79-fc2j5.15dcdbef603920fe | |
uid: ab823dbb-15c7-11ea-b5af-027e0b84da98 | |
reason: Scheduled | |
reportingComponent: "" | |
reportingInstance: "" | |
source: | |
component: default-scheduler | |
type: Normal | |
- apiVersion: v1 | |
count: 1 | |
eventTime: null | |
firstTimestamp: "2019-12-03T12:23:11Z" | |
involvedObject: | |
apiVersion: v1 | |
fieldPath: spec.containers{autoscaler-hpa} | |
kind: Pod | |
name: autoscaler-hpa-555cf99b79-fc2j5 | |
namespace: knative-serving | |
resourceVersion: "54523" | |
uid: ab7b3a04-15c7-11ea-b5af-027e0b84da98 | |
kind: Event | |
lastTimestamp: "2019-12-03T12:23:11Z" | |
message: Pulling image "gcr.io/gcp-compute-engine-223401/autoscaler-hpa-85c0b68178743d74ff7f663a72802ceb@sha256:24e81ede4cc223f0f70a1630fc4bed30308eb7b406715dbdd2280827f7565eec" | |
metadata: | |
creationTimestamp: "2019-12-03T12:23:11Z" | |
name: autoscaler-hpa-555cf99b79-fc2j5.15dcdbef8f9a99a1 | |
namespace: knative-serving | |
resourceVersion: "3321" | |
selfLink: /api/v1/namespaces/knative-serving/events/autoscaler-hpa-555cf99b79-fc2j5.15dcdbef8f9a99a1 | |
uid: abfb5dbe-15c7-11ea-b5af-027e0b84da98 | |
reason: Pulling | |
reportingComponent: "" | |
reportingInstance: "" | |
source: | |
component: kubelet | |
host: ip-172-20-83-101.ap-southeast-1.compute.internal | |
type: Normal | |
- apiVersion: v1 | |
count: 1 | |
eventTime: null | |
firstTimestamp: "2019-12-03T12:23:16Z" | |
involvedObject: | |
apiVersion: v1 | |
fieldPath: spec.containers{autoscaler-hpa} | |
kind: Pod | |
name: autoscaler-hpa-555cf99b79-fc2j5 | |
namespace: knative-serving | |
resourceVersion: "54523" | |
uid: ab7b3a04-15c7-11ea-b5af-027e0b84da98 | |
kind: Event | |
lastTimestamp: "2019-12-03T12:23:16Z" | |
message: Successfully pulled image "gcr.io/gcp-compute-engine-223401/autoscaler-hpa-85c0b68178743d74ff7f663a72802ceb@sha256:24e81ede4cc223f0f70a1630fc4bed30308eb7b406715dbdd2280827f7565eec" | |
metadata: | |
creationTimestamp: "2019-12-03T12:23:16Z" | |
name: autoscaler-hpa-555cf99b79-fc2j5.15dcdbf0a27aa8da | |
namespace: knative-serving | |
resourceVersion: "3355" | |
selfLink: /api/v1/namespaces/knative-serving/events/autoscaler-hpa-555cf99b79-fc2j5.15dcdbf0a27aa8da | |
uid: aebb18aa-15c7-11ea-b5af-027e0b84da98 | |
reason: Pulled | |
reportingComponent: "" | |
reportingInstance: "" | |
source: | |
component: kubelet | |
host: ip-172-20-83-101.ap-southeast-1.compute.internal | |
type: Normal | |
- apiVersion: v1 | |
count: 1 | |
eventTime: null | |
firstTimestamp: "2019-12-03T12:23:16Z" | |
involvedObject: | |
apiVersion: v1 | |
fieldPath: spec.containers{autoscaler-hpa} | |
kind: Pod | |
name: autoscaler-hpa-555cf99b79-fc2j5 | |
namespace: knative-serving | |
resourceVersion: "54523" | |
uid: ab7b3a04-15c7-11ea-b5af-027e0b84da98 | |
kind: Event | |
lastTimestamp: "2019-12-03T12:23:16Z" | |
message: Created container autoscaler-hpa | |
metadata: | |
creationTimestamp: "2019-12-03T12:23:16Z" | |
name: autoscaler-hpa-555cf99b79-fc2j5.15dcdbf0a518c8b3 | |
namespace: knative-serving | |
resourceVersion: "3356" | |
selfLink: /api/v1/namespaces/knative-serving/events/autoscaler-hpa-555cf99b79-fc2j5.15dcdbf0a518c8b3 | |
uid: aec1bb92-15c7-11ea-b5af-027e0b84da98 | |
reason: Created | |
reportingComponent: "" | |
reportingInstance: "" | |
source: | |
component: kubelet | |
host: ip-172-20-83-101.ap-southeast-1.compute.internal | |
type: Normal | |
- apiVersion: v1 | |
count: 1 | |
eventTime: null | |
firstTimestamp: "2019-12-03T12:23:16Z" | |
involvedObject: | |
apiVersion: v1 | |
fieldPath: spec.containers{autoscaler-hpa} | |
kind: Pod | |
name: autoscaler-hpa-555cf99b79-fc2j5 | |
namespace: knative-serving | |
resourceVersion: "54523" | |
uid: ab7b3a04-15c7-11ea-b5af-027e0b84da98 | |
kind: Event | |
lastTimestamp: "2019-12-03T12:23:16Z" | |
message: Started container autoscaler-hpa | |
metadata: | |
creationTimestamp: "2019-12-03T12:23:16Z" | |
name: autoscaler-hpa-555cf99b79-fc2j5.15dcdbf0aee62e59 | |
namespace: knative-serving | |
resourceVersion: "3358" | |
selfLink: /api/v1/namespaces/knative-serving/events/autoscaler-hpa-555cf99b79-fc2j5.15dcdbf0aee62e59 | |
uid: aedad0ed-15c7-11ea-b5af-027e0b84da98 | |
reason: Started | |
reportingComponent: "" | |
reportingInstance: "" | |
source: | |
component: kubelet | |
host: ip-172-20-83-101.ap-southeast-1.compute.internal | |
type: Normal | |
- apiVersion: v1 | |
count: 1 | |
eventTime: null | |
firstTimestamp: "2019-12-03T12:23:10Z" | |
involvedObject: | |
apiVersion: v1 | |
fieldPath: spec.containers{autoscaler-hpa} | |
kind: Pod | |
name: autoscaler-hpa-555cf99b79-qpvbj | |
namespace: knative-serving | |
resourceVersion: "43926" | |
uid: 43f7a4bf-15bb-11ea-b5af-027e0b84da98 | |
kind: Event | |
lastTimestamp: "2019-12-03T12:23:10Z" | |
message: Stopping container autoscaler-hpa | |
metadata: | |
creationTimestamp: "2019-12-03T12:23:10Z" | |
name: autoscaler-hpa-555cf99b79-qpvbj.15dcdbef5d7c51d8 | |
namespace: knative-serving | |
resourceVersion: "3297" | |
selfLink: /api/v1/namespaces/knative-serving/events/autoscaler-hpa-555cf99b79-qpvbj.15dcdbef5d7c51d8 | |
uid: ab7b0684-15c7-11ea-b5af-027e0b84da98 | |
reason: Killing | |
reportingComponent: "" | |
reportingInstance: "" | |
source: | |
component: kubelet | |
host: ip-172-20-67-65.ap-southeast-1.compute.internal | |
type: Normal | |
- apiVersion: v1 | |
count: 1 | |
eventTime: null | |
firstTimestamp: "2019-12-03T12:23:10Z" | |
involvedObject: | |
apiVersion: apps/v1 | |
kind: ReplicaSet | |
name: autoscaler-hpa-555cf99b79 | |
namespace: knative-serving | |
resourceVersion: "44034" | |
uid: 43f57444-15bb-11ea-b5af-027e0b84da98 | |
kind: Event | |
lastTimestamp: "2019-12-03T12:23:10Z" | |
message: 'Created pod: autoscaler-hpa-555cf99b79-fc2j5' | |
metadata: | |
creationTimestamp: "2019-12-03T12:23:10Z" | |
name: autoscaler-hpa-555cf99b79.15dcdbef5e081a5b | |
namespace: knative-serving | |
resourceVersion: "3298" | |
selfLink: /api/v1/namespaces/knative-serving/events/autoscaler-hpa-555cf99b79.15dcdbef5e081a5b | |
uid: ab7cf506-15c7-11ea-b5af-027e0b84da98 | |
reason: SuccessfulCreate | |
reportingComponent: "" | |
reportingInstance: "" | |
source: | |
component: replicaset-controller | |
type: Normal | |
- apiVersion: v1 | |
count: 1 | |
eventTime: null | |
firstTimestamp: "2019-12-03T12:23:36Z" | |
involvedObject: | |
apiVersion: v1 | |
kind: Endpoints | |
name: autoscaler | |
namespace: knative-serving | |
resourceVersion: "54816" | |
uid: 441b85ed-15bb-11ea-b5af-027e0b84da98 | |
kind: Event | |
lastTimestamp: "2019-12-03T12:23:36Z" | |
message: 'Failed to update endpoint knative-serving/autoscaler: Operation cannot | |
be fulfilled on endpoints "autoscaler": the object has been modified; please apply | |
your changes to the latest version and try again' | |
metadata: | |
creationTimestamp: "2019-12-03T12:23:36Z" | |
name: autoscaler.15dcdbf564984a25 | |
namespace: knative-serving | |
resourceVersion: "3509" | |
selfLink: /api/v1/namespaces/knative-serving/events/autoscaler.15dcdbf564984a25 | |
uid: bae9598f-15c7-11ea-b5af-027e0b84da98 | |
reason: FailedToUpdateEndpoint | |
reportingComponent: "" | |
reportingInstance: "" | |
source: | |
component: endpoint-controller | |
type: Warning | |
- apiVersion: v1 | |
count: 1 | |
eventTime: null | |
firstTimestamp: "2019-12-03T12:23:10Z" | |
involvedObject: | |
apiVersion: v1 | |
fieldPath: spec.containers{controller} | |
kind: Pod | |
name: controller-7667dd8fcb-flj6n | |
namespace: knative-serving | |
resourceVersion: "43975" | |
uid: 46239569-15bb-11ea-b5af-027e0b84da98 | |
kind: Event | |
lastTimestamp: "2019-12-03T12:23:10Z" | |
message: Stopping container controller | |
metadata: | |
creationTimestamp: "2019-12-03T12:23:10Z" | |
name: controller-7667dd8fcb-flj6n.15dcdbef632d7916 | |
namespace: knative-serving | |
resourceVersion: "3300" | |
selfLink: /api/v1/namespaces/knative-serving/events/controller-7667dd8fcb-flj6n.15dcdbef632d7916 | |
uid: ab89a54d-15c7-11ea-b5af-027e0b84da98 | |
reason: Killing | |
reportingComponent: "" | |
reportingInstance: "" | |
source: | |
component: kubelet | |
host: ip-172-20-67-65.ap-southeast-1.compute.internal | |
type: Normal | |
- apiVersion: v1 | |
count: 1 | |
eventTime: null | |
firstTimestamp: "2019-12-03T12:23:10Z" | |
involvedObject: | |
apiVersion: v1 | |
kind: Pod | |
name: controller-7667dd8fcb-tdhhj | |
namespace: knative-serving | |
resourceVersion: "54529" | |
uid: ab89550a-15c7-11ea-b5af-027e0b84da98 | |
kind: Event | |
lastTimestamp: "2019-12-03T12:23:10Z" | |
message: Successfully assigned knative-serving/controller-7667dd8fcb-tdhhj to ip-172-20-67-65.ap-southeast-1.compute.internal | |
metadata: | |
creationTimestamp: "2019-12-03T12:23:10Z" | |
name: controller-7667dd8fcb-tdhhj.15dcdbef64e3ce9e | |
namespace: knative-serving | |
resourceVersion: "3302" | |
selfLink: /api/v1/namespaces/knative-serving/events/controller-7667dd8fcb-tdhhj.15dcdbef64e3ce9e | |
uid: ab8e4bee-15c7-11ea-b5af-027e0b84da98 | |
reason: Scheduled | |
reportingComponent: "" | |
reportingInstance: "" | |
source: | |
component: default-scheduler | |
type: Normal | |
- apiVersion: v1 | |
count: 1 | |
eventTime: null | |
firstTimestamp: "2019-12-03T12:23:11Z" | |
involvedObject: | |
apiVersion: v1 | |
fieldPath: spec.containers{controller} | |
kind: Pod | |
name: controller-7667dd8fcb-tdhhj | |
namespace: knative-serving | |
resourceVersion: "54531" | |
uid: ab89550a-15c7-11ea-b5af-027e0b84da98 | |
kind: Event | |
lastTimestamp: "2019-12-03T12:23:11Z" | |
message: Container image "gcr.io/gcp-compute-engine-223401/controller-f6fdb41c6acbc726e29a3104ff2ef720@sha256:7cde59d7e5e3f7891b57fb51ade68929b5220df54b70dc027a62018c54fe23d3" | |
already present on machine | |
metadata: | |
creationTimestamp: "2019-12-03T12:23:11Z" | |
name: controller-7667dd8fcb-tdhhj.15dcdbef9b09fa2f | |
namespace: knative-serving | |
resourceVersion: "3325" | |
selfLink: /api/v1/namespaces/knative-serving/events/controller-7667dd8fcb-tdhhj.15dcdbef9b09fa2f | |
uid: ac18a2f4-15c7-11ea-b5af-027e0b84da98 | |
reason: Pulled | |
reportingComponent: "" | |
reportingInstance: "" | |
source: | |
component: kubelet | |
host: ip-172-20-67-65.ap-southeast-1.compute.internal | |
type: Normal | |
- apiVersion: v1 | |
count: 1 | |
eventTime: null | |
firstTimestamp: "2019-12-03T12:23:11Z" | |
involvedObject: | |
apiVersion: v1 | |
fieldPath: spec.containers{controller} | |
kind: Pod | |
name: controller-7667dd8fcb-tdhhj | |
namespace: knative-serving | |
resourceVersion: "54531" | |
uid: ab89550a-15c7-11ea-b5af-027e0b84da98 | |
kind: Event | |
lastTimestamp: "2019-12-03T12:23:11Z" | |
message: Created container controller | |
metadata: | |
creationTimestamp: "2019-12-03T12:23:11Z" | |
name: controller-7667dd8fcb-tdhhj.15dcdbef9df41071 | |
namespace: knative-serving | |
resourceVersion: "3326" | |
selfLink: /api/v1/namespaces/knative-serving/events/controller-7667dd8fcb-tdhhj.15dcdbef9df41071 | |
uid: ac200de7-15c7-11ea-b5af-027e0b84da98 | |
reason: Created | |
reportingComponent: "" | |
reportingInstance: "" | |
source: | |
component: kubelet | |
host: ip-172-20-67-65.ap-southeast-1.compute.internal | |
type: Normal | |
- apiVersion: v1 | |
count: 1 | |
eventTime: null | |
firstTimestamp: "2019-12-03T12:23:12Z" | |
involvedObject: | |
apiVersion: v1 | |
fieldPath: spec.containers{controller} | |
kind: Pod | |
name: controller-7667dd8fcb-tdhhj | |
namespace: knative-serving | |
resourceVersion: "54531" | |
uid: ab89550a-15c7-11ea-b5af-027e0b84da98 | |
kind: Event | |
lastTimestamp: "2019-12-03T12:23:12Z" | |
message: Started container controller | |
metadata: | |
creationTimestamp: "2019-12-03T12:23:12Z" | |
name: controller-7667dd8fcb-tdhhj.15dcdbefab7f69fe | |
namespace: knative-serving | |
resourceVersion: "3332" | |
selfLink: /api/v1/namespaces/knative-serving/events/controller-7667dd8fcb-tdhhj.15dcdbefab7f69fe | |
uid: ac42c022-15c7-11ea-b5af-027e0b84da98 | |
reason: Started | |
reportingComponent: "" | |
reportingInstance: "" | |
source: | |
component: kubelet | |
host: ip-172-20-67-65.ap-southeast-1.compute.internal | |
type: Normal | |
- apiVersion: v1 | |
count: 1 | |
eventTime: null | |
firstTimestamp: "2019-12-03T12:23:10Z" | |
involvedObject: | |
apiVersion: apps/v1 | |
kind: ReplicaSet | |
name: controller-7667dd8fcb | |
namespace: knative-serving | |
resourceVersion: "44030" | |
uid: 4622381c-15bb-11ea-b5af-027e0b84da98 | |
kind: Event | |
lastTimestamp: "2019-12-03T12:23:10Z" | |
message: 'Created pod: controller-7667dd8fcb-tdhhj' | |
metadata: | |
creationTimestamp: "2019-12-03T12:23:10Z" | |
name: controller-7667dd8fcb.15dcdbef63af6019 | |
namespace: knative-serving | |
resourceVersion: "3301" | |
selfLink: /api/v1/namespaces/knative-serving/events/controller-7667dd8fcb.15dcdbef63af6019 | |
uid: ab8b22e4-15c7-11ea-b5af-027e0b84da98 | |
reason: SuccessfulCreate | |
reportingComponent: "" | |
reportingInstance: "" | |
source: | |
component: replicaset-controller | |
type: Normal | |
- apiVersion: v1 | |
count: 375 | |
eventTime: null | |
firstTimestamp: "2019-12-03T10:57:09Z" | |
involvedObject: | |
apiVersion: v1 | |
fieldPath: spec.containers{default-domain} | |
kind: Pod | |
name: default-domain-fjxtb | |
namespace: knative-serving | |
resourceVersion: "44472" | |
uid: a60130b7-15bb-11ea-b5af-027e0b84da98 | |
kind: Event | |
lastTimestamp: "2019-12-03T12:22:18Z" | |
message: 'Error: ImagePullBackOff' | |
metadata: | |
creationTimestamp: "2019-12-03T10:57:09Z" | |
name: default-domain-fjxtb.15dcd73dbead1252 | |
namespace: knative-serving | |
resourceVersion: "3275" | |
selfLink: /api/v1/namespaces/knative-serving/events/default-domain-fjxtb.15dcd73dbead1252 | |
uid: a7567e17-15bb-11ea-b5af-027e0b84da98 | |
reason: Failed | |
reportingComponent: "" | |
reportingInstance: "" | |
source: | |
component: kubelet | |
host: ip-172-20-83-101.ap-southeast-1.compute.internal | |
type: Warning | |
- apiVersion: v1 | |
count: 1 | |
eventTime: null | |
firstTimestamp: "2019-12-03T12:23:10Z" | |
involvedObject: | |
apiVersion: v1 | |
kind: Pod | |
name: default-domain-kq9j8 | |
namespace: knative-serving | |
resourceVersion: "54538" | |
uid: ab991eec-15c7-11ea-b5af-027e0b84da98 | |
kind: Event | |
lastTimestamp: "2019-12-03T12:23:10Z" | |
message: Successfully assigned knative-serving/default-domain-kq9j8 to ip-172-20-83-101.ap-southeast-1.compute.internal | |
metadata: | |
creationTimestamp: "2019-12-03T12:23:11Z" | |
name: default-domain-kq9j8.15dcdbef6a36b6be | |
namespace: knative-serving | |
resourceVersion: "3304" | |
selfLink: /api/v1/namespaces/knative-serving/events/default-domain-kq9j8.15dcdbef6a36b6be | |
uid: ab9ba9f3-15c7-11ea-b5af-027e0b84da98 | |
reason: Scheduled | |
reportingComponent: "" | |
reportingInstance: "" | |
source: | |
component: default-scheduler | |
type: Normal | |
- apiVersion: v1 | |
count: 4 | |
eventTime: null | |
firstTimestamp: "2019-12-03T12:23:11Z" | |
involvedObject: | |
apiVersion: v1 | |
fieldPath: spec.containers{default-domain} | |
kind: Pod | |
name: default-domain-kq9j8 | |
namespace: knative-serving | |
resourceVersion: "54539" | |
uid: ab991eec-15c7-11ea-b5af-027e0b84da98 | |
kind: Event | |
lastTimestamp: "2019-12-03T12:24:53Z" | |
message: Pulling image "knative.dev/serving/cmd/default-domain" | |
metadata: | |
creationTimestamp: "2019-12-03T12:23:11Z" | |
name: default-domain-kq9j8.15dcdbef95168f5e | |
namespace: knative-serving | |
resourceVersion: "3611" | |
selfLink: /api/v1/namespaces/knative-serving/events/default-domain-kq9j8.15dcdbef95168f5e | |
uid: ac0958db-15c7-11ea-b5af-027e0b84da98 | |
reason: Pulling | |
reportingComponent: "" | |
reportingInstance: "" | |
source: | |
component: kubelet | |
host: ip-172-20-83-101.ap-southeast-1.compute.internal | |
type: Normal | |
- apiVersion: v1 | |
count: 4 | |
eventTime: null | |
firstTimestamp: "2019-12-03T12:23:17Z" | |
involvedObject: | |
apiVersion: v1 | |
fieldPath: spec.containers{default-domain} | |
kind: Pod | |
name: default-domain-kq9j8 | |
namespace: knative-serving | |
resourceVersion: "54539" | |
uid: ab991eec-15c7-11ea-b5af-027e0b84da98 | |
kind: Event | |
lastTimestamp: "2019-12-03T12:24:54Z" | |
message: 'Failed to pull image "knative.dev/serving/cmd/default-domain": rpc error: | |
code = Unknown desc = Error response from daemon: error parsing HTTP 404 response | |
body: invalid character ''<'' looking for beginning of value: "<!DOCTYPE html>\n<html>\n <head>\n <meta | |
charset=\"utf-8\">\n <meta name=\"viewport\" content=\"width=device-width, | |
initial-scale=1.0, maximum-scale=1.0, user-scalable=no\">\n\n <title>Page Not | |
Found</title>\n <link href=''https://fonts.googleapis.com/css?family=Roboto:400,700&subset=latin,latin-ext'' | |
rel=''stylesheet'' type=''text/css''>\n <style>\n body {\n font-family: | |
-apple-system, BlinkMacSystemFont, \"Segoe UI\", Roboto, Helvetica, Arial, sans-serif, | |
\"Apple Color Emoji\", \"Segoe UI Emoji\", \"Segoe UI Symbol\";\n background: | |
rgb(14, 30, 37);\n color: white;\n overflow: hidden;\n margin: | |
0;\n padding: 0;\n }\n\n h1 {\n margin: 0;\n font-size: 22px;\n line-height: | |
24px;\n }\n\n .main {\n position: relative;\n display: flex;\n flex-direction: | |
column;\n align-items: center;\n justify-content: center;\n height: | |
100vh;\n width: 100vw;\n }\n\n .card {\n position: relative;\n display: | |
flex;\n flex-direction: column;\n width: 75%;\n max-width: 364px;\n padding: | |
24px;\n background: white;\n color: rgb(14, 30, 37);\n border-radius: | |
8px;\n box-shadow: 0 2px 4px 0 rgba(14, 30, 37, .16);\n }\n\n a {\n margin: | |
0;\n text-decoration: none;\n font-weight: 600;\n line-height: | |
24px;\n color: #00ad9f;\n }\n\n a svg {\n position: relative;\n top: | |
2px;\n }\n\n a:hover,\n a:focus {\n text-decoration: underline;\n color: | |
#007A70;\n }\n\n a:hover svg path{\n fill: #007A70;\n }\n\n p:last-of-type | |
{\n margin: 0;\n }\n\n </style>\n </head>\n <body>\n <div class=\"main\">\n <div | |
class=\"card\">\n <div class=\"header\">\n <h1>Page Not Found</h1>\n </div>\n <div | |
class=\"body\">\n <p>Looks like you''ve followed a broken link or entered | |
a URL that doesn''t exist on this site.</p>\n <p>\n <a id=\"back-link\" | |
href=\"/\">\n <svg xmlns=\"http://www.w3.org/2000/svg\" width=\"16\" | |
height=\"16\" viewBox=\"0 0 16 16\">\n <path fill=\"#00ad9f\" d=\"M11.9998836,4.09370803 | |
L8.55809517,7.43294953 C8.23531459,7.74611298 8.23531459,8.25388736 8.55809517,8.56693769 | |
L12,11.9062921 L9.84187871,14 L4.24208544,8.56693751 C3.91930485,8.25388719 3.91930485,7.74611281 | |
4.24208544,7.43294936 L9.84199531,2 L11.9998836,4.09370803 Z\"/>\n </svg>\n Back | |
to our site\n </a>\n </p>\n </div>\n </div>\n </div>\n <script>\n (function() | |
{\n if (document.referrer && document.location.host && document.referrer.match(new | |
RegExp(\"^https?://\" + document.location.host))) {\n document.getElementById(\"back-link\").setAttribute(\"href\", | |
document.referrer);\n }\n })();\n </script>\n </body>\n</html>\n\n"' | |
metadata: | |
creationTimestamp: "2019-12-03T12:23:17Z" | |
name: default-domain-kq9j8.15dcdbf0efb7b393 | |
namespace: knative-serving | |
resourceVersion: "3613" | |
selfLink: /api/v1/namespaces/knative-serving/events/default-domain-kq9j8.15dcdbf0efb7b393 | |
uid: af80bba8-15c7-11ea-b5af-027e0b84da98 | |
reason: Failed | |
reportingComponent: "" | |
reportingInstance: "" | |
source: | |
component: kubelet | |
host: ip-172-20-83-101.ap-southeast-1.compute.internal | |
type: Warning | |
- apiVersion: v1 | |
count: 4 | |
eventTime: null | |
firstTimestamp: "2019-12-03T12:23:17Z" | |
involvedObject: | |
apiVersion: v1 | |
fieldPath: spec.containers{default-domain} | |
kind: Pod | |
name: default-domain-kq9j8 | |
namespace: knative-serving | |
resourceVersion: "54539" | |
uid: ab991eec-15c7-11ea-b5af-027e0b84da98 | |
kind: Event | |
lastTimestamp: "2019-12-03T12:24:54Z" | |
message: 'Error: ErrImagePull' | |
metadata: | |
creationTimestamp: "2019-12-03T12:23:17Z" | |
name: default-domain-kq9j8.15dcdbf0efb7f9af | |
namespace: knative-serving | |
resourceVersion: "3612" | |
selfLink: /api/v1/namespaces/knative-serving/events/default-domain-kq9j8.15dcdbf0efb7f9af | |
uid: af814f7c-15c7-11ea-b5af-027e0b84da98 | |
reason: Failed | |
reportingComponent: "" | |
reportingInstance: "" | |
source: | |
component: kubelet | |
host: ip-172-20-83-101.ap-southeast-1.compute.internal | |
type: Warning | |
- apiVersion: v1 | |
count: 42 | |
eventTime: null | |
firstTimestamp: "2019-12-03T12:23:17Z" | |
involvedObject: | |
apiVersion: v1 | |
fieldPath: spec.containers{default-domain} | |
kind: Pod | |
name: default-domain-kq9j8 | |
namespace: knative-serving | |
resourceVersion: "54539" | |
uid: ab991eec-15c7-11ea-b5af-027e0b84da98 | |
kind: Event | |
lastTimestamp: "2019-12-03T12:33:21Z" | |
message: Back-off pulling image "knative.dev/serving/cmd/default-domain" | |
metadata: | |
creationTimestamp: "2019-12-03T12:23:17Z" | |
name: default-domain-kq9j8.15dcdbf108893cf3 | |
namespace: knative-serving | |
resourceVersion: "3629" | |
selfLink: /api/v1/namespaces/knative-serving/events/default-domain-kq9j8.15dcdbf108893cf3 | |
uid: afc0c870-15c7-11ea-b5af-027e0b84da98 | |
reason: BackOff | |
reportingComponent: "" | |
reportingInstance: "" | |
source: | |
component: kubelet | |
host: ip-172-20-83-101.ap-southeast-1.compute.internal | |
type: Normal | |
- apiVersion: v1 | |
count: 240 | |
eventTime: null | |
firstTimestamp: "2019-12-03T12:23:17Z" | |
involvedObject: | |
apiVersion: v1 | |
fieldPath: spec.containers{default-domain} | |
kind: Pod | |
name: default-domain-kq9j8 | |
namespace: knative-serving | |
resourceVersion: "54539" | |
uid: ab991eec-15c7-11ea-b5af-027e0b84da98 | |
kind: Event | |
lastTimestamp: "2019-12-03T13:18:15Z" | |
message: 'Error: ImagePullBackOff' | |
metadata: | |
creationTimestamp: "2019-12-03T12:23:17Z" | |
name: default-domain-kq9j8.15dcdbf1088972a4 | |
namespace: knative-serving | |
resourceVersion: "3747" | |
selfLink: /api/v1/namespaces/knative-serving/events/default-domain-kq9j8.15dcdbf1088972a4 | |
uid: afc04b98-15c7-11ea-b5af-027e0b84da98 | |
reason: Failed | |
reportingComponent: "" | |
reportingInstance: "" | |
source: | |
component: kubelet | |
host: ip-172-20-83-101.ap-southeast-1.compute.internal | |
type: Warning | |
- apiVersion: v1 | |
count: 1 | |
eventTime: null | |
firstTimestamp: "2019-12-03T12:23:10Z" | |
involvedObject: | |
apiVersion: batch/v1 | |
kind: Job | |
name: default-domain | |
namespace: knative-serving | |
resourceVersion: "44473" | |
uid: a5ff6ccf-15bb-11ea-b5af-027e0b84da98 | |
kind: Event | |
lastTimestamp: "2019-12-03T12:23:10Z" | |
message: 'Created pod: default-domain-kq9j8' | |
metadata: | |
creationTimestamp: "2019-12-03T12:23:10Z" | |
name: default-domain.15dcdbef69f0facb | |
namespace: knative-serving | |
resourceVersion: "3303" | |
selfLink: /api/v1/namespaces/knative-serving/events/default-domain.15dcdbef69f0facb | |
uid: ab9b6316-15c7-11ea-b5af-027e0b84da98 | |
reason: SuccessfulCreate | |
reportingComponent: "" | |
reportingInstance: "" | |
source: | |
component: job-controller | |
type: Normal | |
- apiVersion: v1 | |
count: 1 | |
eventTime: null | |
firstTimestamp: "2019-12-03T12:23:11Z" | |
involvedObject: | |
apiVersion: v1 | |
kind: Pod | |
name: networking-certmanager-6794bcc848-rbkjk | |
namespace: knative-serving | |
resourceVersion: "54544" | |
uid: aba43145-15c7-11ea-b5af-027e0b84da98 | |
kind: Event | |
lastTimestamp: "2019-12-03T12:23:11Z" | |
message: Successfully assigned knative-serving/networking-certmanager-6794bcc848-rbkjk | |
to ip-172-20-44-180.ap-southeast-1.compute.internal | |
metadata: | |
creationTimestamp: "2019-12-03T12:23:11Z" | |
name: networking-certmanager-6794bcc848-rbkjk.15dcdbef6f641727 | |
namespace: knative-serving | |
resourceVersion: "3307" | |
selfLink: /api/v1/namespaces/knative-serving/events/networking-certmanager-6794bcc848-rbkjk.15dcdbef6f641727 | |
uid: aba8ce38-15c7-11ea-b5af-027e0b84da98 | |
reason: Scheduled | |
reportingComponent: "" | |
reportingInstance: "" | |
source: | |
component: default-scheduler | |
type: Normal | |
- apiVersion: v1 | |
count: 1 | |
eventTime: null | |
firstTimestamp: "2019-12-03T12:23:11Z" | |
involvedObject: | |
apiVersion: v1 | |
fieldPath: spec.containers{networking-certmanager} | |
kind: Pod | |
name: networking-certmanager-6794bcc848-rbkjk | |
namespace: knative-serving | |
resourceVersion: "54546" | |
uid: aba43145-15c7-11ea-b5af-027e0b84da98 | |
kind: Event | |
lastTimestamp: "2019-12-03T12:23:11Z" | |
message: Container image "gcr.io/gcp-compute-engine-223401/certmanager-f79b5bfeb092d099f0f3326024a30ebb@sha256:9f7622fd03d96c3262e71b4f6fb14455145041c81950b3efe10010c122974bed" | |
already present on machine | |
metadata: | |
creationTimestamp: "2019-12-03T12:23:11Z" | |
name: networking-certmanager-6794bcc848-rbkjk.15dcdbefa1886395 | |
namespace: knative-serving | |
resourceVersion: "3328" | |
selfLink: /api/v1/namespaces/knative-serving/events/networking-certmanager-6794bcc848-rbkjk.15dcdbefa1886395 | |
uid: ac29371d-15c7-11ea-b5af-027e0b84da98 | |
reason: Pulled | |
reportingComponent: "" | |
reportingInstance: "" | |
source: | |
component: kubelet | |
host: ip-172-20-44-180.ap-southeast-1.compute.internal | |
type: Normal | |
- apiVersion: v1 | |
count: 1 | |
eventTime: null | |
firstTimestamp: "2019-12-03T12:23:11Z" | |
involvedObject: | |
apiVersion: v1 | |
fieldPath: spec.containers{networking-certmanager} | |
kind: Pod | |
name: networking-certmanager-6794bcc848-rbkjk | |
namespace: knative-serving | |
resourceVersion: "54546" | |
uid: aba43145-15c7-11ea-b5af-027e0b84da98 | |
kind: Event | |
lastTimestamp: "2019-12-03T12:23:11Z" | |
message: Created container networking-certmanager | |
metadata: | |
creationTimestamp: "2019-12-03T12:23:11Z" | |
name: networking-certmanager-6794bcc848-rbkjk.15dcdbefa52b8959 | |
namespace: knative-serving | |
resourceVersion: "3330" | |
selfLink: /api/v1/namespaces/knative-serving/events/networking-certmanager-6794bcc848-rbkjk.15dcdbefa52b8959 | |
uid: ac327c02-15c7-11ea-b5af-027e0b84da98 | |
reason: Created | |
reportingComponent: "" | |
reportingInstance: "" | |
source: | |
component: kubelet | |
host: ip-172-20-44-180.ap-southeast-1.compute.internal | |
type: Normal | |
- apiVersion: v1 | |
count: 1 | |
eventTime: null | |
firstTimestamp: "2019-12-03T12:23:12Z" | |
involvedObject: | |
apiVersion: v1 | |
fieldPath: spec.containers{networking-certmanager} | |
kind: Pod | |
name: networking-certmanager-6794bcc848-rbkjk | |
namespace: knative-serving | |
resourceVersion: "54546" | |
uid: aba43145-15c7-11ea-b5af-027e0b84da98 | |
kind: Event | |
lastTimestamp: "2019-12-03T12:23:12Z" | |
message: Started container networking-certmanager | |
metadata: | |
creationTimestamp: "2019-12-03T12:23:12Z" | |
name: networking-certmanager-6794bcc848-rbkjk.15dcdbefb3131a9e | |
namespace: knative-serving | |
resourceVersion: "3334" | |
selfLink: /api/v1/namespaces/knative-serving/events/networking-certmanager-6794bcc848-rbkjk.15dcdbefb3131a9e | |
uid: ac5613af-15c7-11ea-b5af-027e0b84da98 | |
reason: Started | |
reportingComponent: "" | |
reportingInstance: "" | |
source: | |
component: kubelet | |
host: ip-172-20-44-180.ap-southeast-1.compute.internal | |
type: Normal | |
- apiVersion: v1 | |
count: 1 | |
eventTime: null | |
firstTimestamp: "2019-12-03T12:23:11Z" | |
involvedObject: | |
apiVersion: v1 | |
fieldPath: spec.containers{networking-certmanager} | |
kind: Pod | |
name: networking-certmanager-6794bcc848-svt29 | |
namespace: knative-serving | |
resourceVersion: "43988" | |
uid: 46697697-15bb-11ea-b5af-027e0b84da98 | |
kind: Event | |
lastTimestamp: "2019-12-03T12:23:11Z" | |
message: Stopping container networking-certmanager | |
metadata: | |
creationTimestamp: "2019-12-03T12:23:11Z" | |
name: networking-certmanager-6794bcc848-svt29.15dcdbef6d42c7f4 | |
namespace: knative-serving | |
resourceVersion: "3305" | |
selfLink: /api/v1/namespaces/knative-serving/events/networking-certmanager-6794bcc848-svt29.15dcdbef6d42c7f4 | |
uid: aba3bc5a-15c7-11ea-b5af-027e0b84da98 | |
reason: Killing | |
reportingComponent: "" | |
reportingInstance: "" | |
source: | |
component: kubelet | |
host: ip-172-20-44-180.ap-southeast-1.compute.internal | |
type: Normal | |
- apiVersion: v1 | |
count: 1 | |
eventTime: null | |
firstTimestamp: "2019-12-03T12:23:11Z" | |
involvedObject: | |
apiVersion: apps/v1 | |
kind: ReplicaSet | |
name: networking-certmanager-6794bcc848 | |
namespace: knative-serving | |
resourceVersion: "44060" | |
uid: 46666167-15bb-11ea-b5af-027e0b84da98 | |
kind: Event | |
lastTimestamp: "2019-12-03T12:23:11Z" | |
message: 'Created pod: networking-certmanager-6794bcc848-rbkjk' | |
metadata: | |
creationTimestamp: "2019-12-03T12:23:11Z" | |
name: networking-certmanager-6794bcc848.15dcdbef6de423a8 | |
namespace: knative-serving | |
resourceVersion: "3306" | |
selfLink: /api/v1/namespaces/knative-serving/events/networking-certmanager-6794bcc848.15dcdbef6de423a8 | |
uid: aba6405a-15c7-11ea-b5af-027e0b84da98 | |
reason: SuccessfulCreate | |
reportingComponent: "" | |
reportingInstance: "" | |
source: | |
component: replicaset-controller | |
type: Normal | |
- apiVersion: v1 | |
count: 1 | |
eventTime: null | |
firstTimestamp: "2019-12-03T12:23:11Z" | |
involvedObject: | |
apiVersion: v1 | |
fieldPath: spec.containers{networking-istio} | |
kind: Pod | |
name: networking-istio-6854cd95ff-9txxm | |
namespace: knative-serving | |
resourceVersion: "43998" | |
uid: 469118f4-15bb-11ea-b5af-027e0b84da98 | |
kind: Event | |
lastTimestamp: "2019-12-03T12:23:11Z" | |
message: Stopping container networking-istio | |
metadata: | |
creationTimestamp: "2019-12-03T12:23:11Z" | |
name: networking-istio-6854cd95ff-9txxm.15dcdbef7295cddb | |
namespace: knative-serving | |
resourceVersion: "3308" | |
selfLink: /api/v1/namespaces/knative-serving/events/networking-istio-6854cd95ff-9txxm.15dcdbef7295cddb | |
uid: abb13ec6-15c7-11ea-b5af-027e0b84da98 | |
reason: Killing | |
reportingComponent: "" | |
reportingInstance: "" | |
source: | |
component: kubelet | |
host: ip-172-20-44-180.ap-southeast-1.compute.internal | |
type: Normal | |
- apiVersion: v1 | |
count: 1 | |
eventTime: null | |
firstTimestamp: "2019-12-03T12:23:11Z" | |
involvedObject: | |
apiVersion: v1 | |
kind: Pod | |
name: networking-istio-6854cd95ff-zhdv2 | |
namespace: knative-serving | |
resourceVersion: "54552" | |
uid: abb15132-15c7-11ea-b5af-027e0b84da98 | |
kind: Event | |
lastTimestamp: "2019-12-03T12:23:11Z" | |
message: Successfully assigned knative-serving/networking-istio-6854cd95ff-zhdv2 | |
to ip-172-20-83-101.ap-southeast-1.compute.internal | |
metadata: | |
creationTimestamp: "2019-12-03T12:23:11Z" | |
name: networking-istio-6854cd95ff-zhdv2.15dcdbef736a8718 | |
namespace: knative-serving | |
resourceVersion: "3310" | |
selfLink: /api/v1/namespaces/knative-serving/events/networking-istio-6854cd95ff-zhdv2.15dcdbef736a8718 | |
uid: abb35fd8-15c7-11ea-b5af-027e0b84da98 | |
reason: Scheduled | |
reportingComponent: "" | |
reportingInstance: "" | |
source: | |
component: default-scheduler | |
type: Normal | |
- apiVersion: v1 | |
count: 1 | |
eventTime: null | |
firstTimestamp: "2019-12-03T12:23:11Z" | |
involvedObject: | |
apiVersion: v1 | |
fieldPath: spec.containers{networking-istio} | |
kind: Pod | |
name: networking-istio-6854cd95ff-zhdv2 | |
namespace: knative-serving | |
resourceVersion: "54553" | |
uid: abb15132-15c7-11ea-b5af-027e0b84da98 | |
kind: Event | |
lastTimestamp: "2019-12-03T12:23:11Z" | |
message: Pulling image "gcr.io/gcp-compute-engine-223401/istio-c58c0c8bb8ecc80f800bb788a425ae1d@sha256:ebdb4e8832e9574311494a31ea18dc63cf903e8dd7f0651d640eb2c7f252da2a" | |
metadata: | |
creationTimestamp: "2019-12-03T12:23:11Z" | |
name: networking-istio-6854cd95ff-zhdv2.15dcdbef9e74b505 | |
namespace: knative-serving | |
resourceVersion: "3327" | |
selfLink: /api/v1/namespaces/knative-serving/events/networking-istio-6854cd95ff-zhdv2.15dcdbef9e74b505 | |
uid: ac215e5b-15c7-11ea-b5af-027e0b84da98 | |
reason: Pulling | |
reportingComponent: "" | |
reportingInstance: "" | |
source: | |
component: kubelet | |
host: ip-172-20-83-101.ap-southeast-1.compute.internal | |
type: Normal | |
- apiVersion: v1 | |
count: 1 | |
eventTime: null | |
firstTimestamp: "2019-12-03T12:23:21Z" | |
involvedObject: | |
apiVersion: v1 | |
fieldPath: spec.containers{networking-istio} | |
kind: Pod | |
name: networking-istio-6854cd95ff-zhdv2 | |
namespace: knative-serving | |
resourceVersion: "54553" | |
uid: abb15132-15c7-11ea-b5af-027e0b84da98 | |
kind: Event | |
lastTimestamp: "2019-12-03T12:23:21Z" | |
message: Successfully pulled image "gcr.io/gcp-compute-engine-223401/istio-c58c0c8bb8ecc80f800bb788a425ae1d@sha256:ebdb4e8832e9574311494a31ea18dc63cf903e8dd7f0651d640eb2c7f252da2a" | |
metadata: | |
creationTimestamp: "2019-12-03T12:23:21Z" | |
name: networking-istio-6854cd95ff-zhdv2.15dcdbf1d29be619 | |
namespace: knative-serving | |
resourceVersion: "3380" | |
selfLink: /api/v1/namespaces/knative-serving/events/networking-istio-6854cd95ff-zhdv2.15dcdbf1d29be619 | |
uid: b1c59d12-15c7-11ea-b5af-027e0b84da98 | |
reason: Pulled | |
reportingComponent: "" | |
reportingInstance: "" | |
source: | |
component: kubelet | |
host: ip-172-20-83-101.ap-southeast-1.compute.internal | |
type: Normal | |
- apiVersion: v1 | |
count: 1 | |
eventTime: null | |
firstTimestamp: "2019-12-03T12:23:21Z" | |
involvedObject: | |
apiVersion: v1 | |
fieldPath: spec.containers{networking-istio} | |
kind: Pod | |
name: networking-istio-6854cd95ff-zhdv2 | |
namespace: knative-serving | |
resourceVersion: "54553" | |
uid: abb15132-15c7-11ea-b5af-027e0b84da98 | |
kind: Event | |
lastTimestamp: "2019-12-03T12:23:21Z" | |
message: Created container networking-istio | |
metadata: | |
creationTimestamp: "2019-12-03T12:23:21Z" | |
name: networking-istio-6854cd95ff-zhdv2.15dcdbf1d647d40f | |
namespace: knative-serving | |
resourceVersion: "3381" | |
selfLink: /api/v1/namespaces/knative-serving/events/networking-istio-6854cd95ff-zhdv2.15dcdbf1d647d40f | |
uid: b1cf0105-15c7-11ea-b5af-027e0b84da98 | |
reason: Created | |
reportingComponent: "" | |
reportingInstance: "" | |
source: | |
component: kubelet | |
host: ip-172-20-83-101.ap-southeast-1.compute.internal | |
type: Normal | |
- apiVersion: v1 | |
count: 1 | |
eventTime: null | |
firstTimestamp: "2019-12-03T12:23:21Z" | |
involvedObject: | |
apiVersion: v1 | |
fieldPath: spec.containers{networking-istio} | |
kind: Pod | |
name: networking-istio-6854cd95ff-zhdv2 | |
namespace: knative-serving | |
resourceVersion: "54553" | |
uid: abb15132-15c7-11ea-b5af-027e0b84da98 | |
kind: Event | |
lastTimestamp: "2019-12-03T12:23:21Z" | |
message: Started container networking-istio | |
metadata: | |
creationTimestamp: "2019-12-03T12:23:21Z" | |
name: networking-istio-6854cd95ff-zhdv2.15dcdbf1dedfaf1a | |
namespace: knative-serving | |
resourceVersion: "3383" | |
selfLink: /api/v1/namespaces/knative-serving/events/networking-istio-6854cd95ff-zhdv2.15dcdbf1dedfaf1a | |
uid: b1e4fd8c-15c7-11ea-b5af-027e0b84da98 | |
reason: Started | |
reportingComponent: "" | |
reportingInstance: "" | |
source: | |
component: kubelet | |
host: ip-172-20-83-101.ap-southeast-1.compute.internal | |
type: Normal | |
- apiVersion: v1 | |
count: 1 | |
eventTime: null | |
firstTimestamp: "2019-12-03T12:23:11Z" | |
involvedObject: | |
apiVersion: apps/v1 | |
kind: ReplicaSet | |
name: networking-istio-6854cd95ff | |
namespace: knative-serving | |
resourceVersion: "44037" | |
uid: 468ebdf0-15bb-11ea-b5af-027e0b84da98 | |
kind: Event | |
lastTimestamp: "2019-12-03T12:23:11Z" | |
message: 'Created pod: networking-istio-6854cd95ff-zhdv2' | |
metadata: | |
creationTimestamp: "2019-12-03T12:23:11Z" | |
name: networking-istio-6854cd95ff.15dcdbef7315c8d3 | |
namespace: knative-serving | |
resourceVersion: "3309" | |
selfLink: /api/v1/namespaces/knative-serving/events/networking-istio-6854cd95ff.15dcdbef7315c8d3 | |
uid: abb29827-15c7-11ea-b5af-027e0b84da98 | |
reason: SuccessfulCreate | |
reportingComponent: "" | |
reportingInstance: "" | |
source: | |
component: replicaset-controller | |
type: Normal | |
- apiVersion: v1 | |
count: 1 | |
eventTime: null | |
firstTimestamp: "2019-12-03T12:23:11Z" | |
involvedObject: | |
apiVersion: v1 | |
kind: Pod | |
name: networking-ns-cert-55d77c7656-6vfgb | |
namespace: knative-serving | |
resourceVersion: "54560" | |
uid: abbe4876-15c7-11ea-b5af-027e0b84da98 | |
kind: Event | |
lastTimestamp: "2019-12-03T12:23:11Z" | |
message: Successfully assigned knative-serving/networking-ns-cert-55d77c7656-6vfgb | |
to ip-172-20-67-65.ap-southeast-1.compute.internal | |
metadata: | |
creationTimestamp: "2019-12-03T12:23:11Z" | |
name: networking-ns-cert-55d77c7656-6vfgb.15dcdbef78916a37 | |
namespace: knative-serving | |
resourceVersion: "3313" | |
selfLink: /api/v1/namespaces/knative-serving/events/networking-ns-cert-55d77c7656-6vfgb.15dcdbef78916a37 | |
uid: abc08788-15c7-11ea-b5af-027e0b84da98 | |
reason: Scheduled | |
reportingComponent: "" | |
reportingInstance: "" | |
source: | |
component: default-scheduler | |
type: Normal | |
- apiVersion: v1 | |
count: 1 | |
eventTime: null | |
firstTimestamp: "2019-12-03T12:23:12Z" | |
involvedObject: | |
apiVersion: v1 | |
fieldPath: spec.containers{networking-nscert} | |
kind: Pod | |
name: networking-ns-cert-55d77c7656-6vfgb | |
namespace: knative-serving | |
resourceVersion: "54561" | |
uid: abbe4876-15c7-11ea-b5af-027e0b84da98 | |
kind: Event | |
lastTimestamp: "2019-12-03T12:23:12Z" | |
message: Container image "gcr.io/gcp-compute-engine-223401/nscert-e3625dd01dcb901439f4630ab9789e75@sha256:77da0645be1369d0e56a1daa204da6de6661488eef5858a60dee9a052f02150c" | |
already present on machine | |
metadata: | |
creationTimestamp: "2019-12-03T12:23:12Z" | |
name: networking-ns-cert-55d77c7656-6vfgb.15dcdbefb71ee806 | |
namespace: knative-serving | |
resourceVersion: "3335" | |
selfLink: /api/v1/namespaces/knative-serving/events/networking-ns-cert-55d77c7656-6vfgb.15dcdbefb71ee806 | |
uid: ac60828f-15c7-11ea-b5af-027e0b84da98 | |
reason: Pulled | |
reportingComponent: "" | |
reportingInstance: "" | |
source: | |
component: kubelet | |
host: ip-172-20-67-65.ap-southeast-1.compute.internal | |
type: Normal | |
- apiVersion: v1 | |
count: 1 | |
eventTime: null | |
firstTimestamp: "2019-12-03T12:23:12Z" | |
involvedObject: | |
apiVersion: v1 | |
fieldPath: spec.containers{networking-nscert} | |
kind: Pod | |
name: networking-ns-cert-55d77c7656-6vfgb | |
namespace: knative-serving | |
resourceVersion: "54561" | |
uid: abbe4876-15c7-11ea-b5af-027e0b84da98 | |
kind: Event | |
lastTimestamp: "2019-12-03T12:23:12Z" | |
message: Created container networking-nscert | |
metadata: | |
creationTimestamp: "2019-12-03T12:23:12Z" | |
name: networking-ns-cert-55d77c7656-6vfgb.15dcdbefbacd8f3c | |
namespace: knative-serving | |
resourceVersion: "3336" | |
selfLink: /api/v1/namespaces/knative-serving/events/networking-ns-cert-55d77c7656-6vfgb.15dcdbefbacd8f3c | |
uid: ac69eced-15c7-11ea-b5af-027e0b84da98 | |
reason: Created | |
reportingComponent: "" | |
reportingInstance: "" | |
source: | |
component: kubelet | |
host: ip-172-20-67-65.ap-southeast-1.compute.internal | |
type: Normal | |
- apiVersion: v1 | |
count: 1 | |
eventTime: null | |
firstTimestamp: "2019-12-03T12:23:12Z" | |
involvedObject: | |
apiVersion: v1 | |
fieldPath: spec.containers{networking-nscert} | |
kind: Pod | |
name: networking-ns-cert-55d77c7656-6vfgb | |
namespace: knative-serving | |
resourceVersion: "54561" | |
uid: abbe4876-15c7-11ea-b5af-027e0b84da98 | |
kind: Event | |
lastTimestamp: "2019-12-03T12:23:12Z" | |
message: Started container networking-nscert | |
metadata: | |
creationTimestamp: "2019-12-03T12:23:12Z" | |
name: networking-ns-cert-55d77c7656-6vfgb.15dcdbefc4b57f57 | |
namespace: knative-serving | |
resourceVersion: "3338" | |
selfLink: /api/v1/namespaces/knative-serving/events/networking-ns-cert-55d77c7656-6vfgb.15dcdbefc4b57f57 | |
uid: ac8350cb-15c7-11ea-b5af-027e0b84da98 | |
reason: Started | |
reportingComponent: "" | |
reportingInstance: "" | |
source: | |
component: kubelet | |
host: ip-172-20-67-65.ap-southeast-1.compute.internal | |
type: Normal | |
- apiVersion: v1 | |
count: 1 | |
eventTime: null | |
firstTimestamp: "2019-12-03T12:23:11Z" | |
involvedObject: | |
apiVersion: v1 | |
fieldPath: spec.containers{networking-nscert} | |
kind: Pod | |
name: networking-ns-cert-55d77c7656-xqmbt | |
namespace: knative-serving | |
resourceVersion: "44011" | |
uid: 46be9bf4-15bb-11ea-b5af-027e0b84da98 | |
kind: Event | |
lastTimestamp: "2019-12-03T12:23:11Z" | |
message: Stopping container networking-nscert | |
metadata: | |
creationTimestamp: "2019-12-03T12:23:11Z" | |
name: networking-ns-cert-55d77c7656-xqmbt.15dcdbef778fd76a | |
namespace: knative-serving | |
resourceVersion: "3311" | |
selfLink: /api/v1/namespaces/knative-serving/events/networking-ns-cert-55d77c7656-xqmbt.15dcdbef778fd76a | |
uid: abbdfa7d-15c7-11ea-b5af-027e0b84da98 | |
reason: Killing | |
reportingComponent: "" | |
reportingInstance: "" | |
source: | |
component: kubelet | |
host: ip-172-20-44-180.ap-southeast-1.compute.internal | |
type: Normal | |
- apiVersion: v1 | |
count: 1 | |
eventTime: null | |
firstTimestamp: "2019-12-03T12:23:11Z" | |
involvedObject: | |
apiVersion: apps/v1 | |
kind: ReplicaSet | |
name: networking-ns-cert-55d77c7656 | |
namespace: knative-serving | |
resourceVersion: "44080" | |
uid: 46bcdcda-15bb-11ea-b5af-027e0b84da98 | |
kind: Event | |
lastTimestamp: "2019-12-03T12:23:11Z" | |
message: 'Created pod: networking-ns-cert-55d77c7656-6vfgb' | |
metadata: | |
creationTimestamp: "2019-12-03T12:23:11Z" | |
name: networking-ns-cert-55d77c7656.15dcdbef7824d095 | |
namespace: knative-serving | |
resourceVersion: "3312" | |
selfLink: /api/v1/namespaces/knative-serving/events/networking-ns-cert-55d77c7656.15dcdbef7824d095 | |
uid: abbf541f-15c7-11ea-b5af-027e0b84da98 | |
reason: SuccessfulCreate | |
reportingComponent: "" | |
reportingInstance: "" | |
source: | |
component: replicaset-controller | |
type: Normal | |
- apiVersion: v1 | |
count: 1 | |
eventTime: null | |
firstTimestamp: "2019-12-03T12:23:11Z" | |
involvedObject: | |
apiVersion: v1 | |
kind: Pod | |
name: webhook-54c85dd7d9-q9852 | |
namespace: knative-serving | |
resourceVersion: "54570" | |
uid: abcae38b-15c7-11ea-b5af-027e0b84da98 | |
kind: Event | |
lastTimestamp: "2019-12-03T12:23:11Z" | |
message: Successfully assigned knative-serving/webhook-54c85dd7d9-q9852 to ip-172-20-40-226.ap-southeast-1.compute.internal | |
metadata: | |
creationTimestamp: "2019-12-03T12:23:11Z" | |
name: webhook-54c85dd7d9-q9852.15dcdbef7d6e607b | |
namespace: knative-serving | |
resourceVersion: "3317" | |
selfLink: /api/v1/namespaces/knative-serving/events/webhook-54c85dd7d9-q9852.15dcdbef7d6e607b | |
uid: abccbf35-15c7-11ea-b5af-027e0b84da98 | |
reason: Scheduled | |
reportingComponent: "" | |
reportingInstance: "" | |
source: | |
component: default-scheduler | |
type: Normal | |
- apiVersion: v1 | |
count: 1 | |
eventTime: null | |
firstTimestamp: "2019-12-03T12:23:11Z" | |
involvedObject: | |
apiVersion: v1 | |
fieldPath: spec.containers{webhook} | |
kind: Pod | |
name: webhook-54c85dd7d9-q9852 | |
namespace: knative-serving | |
resourceVersion: "54571" | |
uid: abcae38b-15c7-11ea-b5af-027e0b84da98 | |
kind: Event | |
lastTimestamp: "2019-12-03T12:23:11Z" | |
message: Pulling image "gcr.io/gcp-compute-engine-223401/webhook-261c6506fca17bc41be50b3461f98f1c@sha256:012be54c7866cb8458fe96061f5321e519da7a4803809d912c2a670fff904ac6" | |
metadata: | |
creationTimestamp: "2019-12-03T12:23:11Z" | |
name: webhook-54c85dd7d9-q9852.15dcdbefa4210cb7 | |
namespace: knative-serving | |
resourceVersion: "3329" | |
selfLink: /api/v1/namespaces/knative-serving/events/webhook-54c85dd7d9-q9852.15dcdbefa4210cb7 | |
uid: ac2ff478-15c7-11ea-b5af-027e0b84da98 | |
reason: Pulling | |
reportingComponent: "" | |
reportingInstance: "" | |
source: | |
component: kubelet | |
host: ip-172-20-40-226.ap-southeast-1.compute.internal | |
type: Normal | |
- apiVersion: v1 | |
count: 1 | |
eventTime: null | |
firstTimestamp: "2019-12-03T12:23:14Z" | |
involvedObject: | |
apiVersion: v1 | |
fieldPath: spec.containers{webhook} | |
kind: Pod | |
name: webhook-54c85dd7d9-q9852 | |
namespace: knative-serving | |
resourceVersion: "54571" | |
uid: abcae38b-15c7-11ea-b5af-027e0b84da98 | |
kind: Event | |
lastTimestamp: "2019-12-03T12:23:14Z" | |
message: Successfully pulled image "gcr.io/gcp-compute-engine-223401/webhook-261c6506fca17bc41be50b3461f98f1c@sha256:012be54c7866cb8458fe96061f5321e519da7a4803809d912c2a670fff904ac6" | |
metadata: | |
creationTimestamp: "2019-12-03T12:23:14Z" | |
name: webhook-54c85dd7d9-q9852.15dcdbf03761dbbb | |
namespace: knative-serving | |
resourceVersion: "3350" | |
selfLink: /api/v1/namespaces/knative-serving/events/webhook-54c85dd7d9-q9852.15dcdbf03761dbbb | |
uid: ada8d452-15c7-11ea-b5af-027e0b84da98 | |
reason: Pulled | |
reportingComponent: "" | |
reportingInstance: "" | |
source: | |
component: kubelet | |
host: ip-172-20-40-226.ap-southeast-1.compute.internal | |
type: Normal | |
- apiVersion: v1 | |
count: 1 | |
eventTime: null | |
firstTimestamp: "2019-12-03T12:23:14Z" | |
involvedObject: | |
apiVersion: v1 | |
fieldPath: spec.containers{webhook} | |
kind: Pod | |
name: webhook-54c85dd7d9-q9852 | |
namespace: knative-serving | |
resourceVersion: "54571" | |
uid: abcae38b-15c7-11ea-b5af-027e0b84da98 | |
kind: Event | |
lastTimestamp: "2019-12-03T12:23:14Z" | |
message: Created container webhook | |
metadata: | |
creationTimestamp: "2019-12-03T12:23:14Z" | |
name: webhook-54c85dd7d9-q9852.15dcdbf03a1929b1 | |
namespace: knative-serving | |
resourceVersion: "3351" | |
selfLink: /api/v1/namespaces/knative-serving/events/webhook-54c85dd7d9-q9852.15dcdbf03a1929b1 | |
uid: adafcf4d-15c7-11ea-b5af-027e0b84da98 | |
reason: Created | |
reportingComponent: "" | |
reportingInstance: "" | |
source: | |
component: kubelet | |
host: ip-172-20-40-226.ap-southeast-1.compute.internal | |
type: Normal | |
- apiVersion: v1 | |
count: 1 | |
eventTime: null | |
firstTimestamp: "2019-12-03T12:23:14Z" | |
involvedObject: | |
apiVersion: v1 | |
fieldPath: spec.containers{webhook} | |
kind: Pod | |
name: webhook-54c85dd7d9-q9852 | |
namespace: knative-serving | |
resourceVersion: "54571" | |
uid: abcae38b-15c7-11ea-b5af-027e0b84da98 | |
kind: Event | |
lastTimestamp: "2019-12-03T12:23:14Z" | |
message: Started container webhook | |
metadata: | |
creationTimestamp: "2019-12-03T12:23:14Z" | |
name: webhook-54c85dd7d9-q9852.15dcdbf04775ff3c | |
namespace: knative-serving | |
resourceVersion: "3352" | |
selfLink: /api/v1/namespaces/knative-serving/events/webhook-54c85dd7d9-q9852.15dcdbf04775ff3c | |
uid: add20a48-15c7-11ea-b5af-027e0b84da98 | |
reason: Started | |
reportingComponent: "" | |
reportingInstance: "" | |
source: | |
component: kubelet | |
host: ip-172-20-40-226.ap-southeast-1.compute.internal | |
type: Normal | |
- apiVersion: v1 | |
count: 1 | |
eventTime: null | |
firstTimestamp: "2019-12-03T12:23:11Z" | |
involvedObject: | |
apiVersion: v1 | |
fieldPath: spec.containers{webhook} | |
kind: Pod | |
name: webhook-54c85dd7d9-r9t5x | |
namespace: knative-serving | |
resourceVersion: "44022" | |
uid: 46e34c19-15bb-11ea-b5af-027e0b84da98 | |
kind: Event | |
lastTimestamp: "2019-12-03T12:23:11Z" | |
message: Stopping container webhook | |
metadata: | |
creationTimestamp: "2019-12-03T12:23:11Z" | |
name: webhook-54c85dd7d9-r9t5x.15dcdbef7c9eed36 | |
namespace: knative-serving | |
resourceVersion: "3315" | |
selfLink: /api/v1/namespaces/knative-serving/events/webhook-54c85dd7d9-r9t5x.15dcdbef7c9eed36 | |
uid: abcad3d6-15c7-11ea-b5af-027e0b84da98 | |
reason: Killing | |
reportingComponent: "" | |
reportingInstance: "" | |
source: | |
component: kubelet | |
host: ip-172-20-67-65.ap-southeast-1.compute.internal | |
type: Normal | |
- apiVersion: v1 | |
count: 1 | |
eventTime: null | |
firstTimestamp: "2019-12-03T12:23:11Z" | |
involvedObject: | |
apiVersion: apps/v1 | |
kind: ReplicaSet | |
name: webhook-54c85dd7d9 | |
namespace: knative-serving | |
resourceVersion: "44048" | |
uid: 46e1eccb-15bb-11ea-b5af-027e0b84da98 | |
kind: Event | |
lastTimestamp: "2019-12-03T12:23:11Z" | |
message: 'Created pod: webhook-54c85dd7d9-q9852' | |
metadata: | |
creationTimestamp: "2019-12-03T12:23:11Z" | |
name: webhook-54c85dd7d9.15dcdbef7d3e5fc7 | |
namespace: knative-serving | |
resourceVersion: "3316" | |
selfLink: /api/v1/namespaces/knative-serving/events/webhook-54c85dd7d9.15dcdbef7d3e5fc7 | |
uid: abcc67a5-15c7-11ea-b5af-027e0b84da98 | |
reason: SuccessfulCreate | |
reportingComponent: "" | |
reportingInstance: "" | |
source: | |
component: replicaset-controller | |
type: Normal | |
kind: List | |
metadata: | |
resourceVersion: "" | |
selfLink: "" | |
------- | |
resource: limitranges | |
------- | |
apiVersion: v1 | |
items: [] | |
kind: List | |
metadata: | |
resourceVersion: "" | |
selfLink: "" | |
------- | |
resource: namespaces | |
------- | |
apiVersion: v1 | |
items: | |
- apiVersion: v1 | |
kind: Namespace | |
metadata: | |
creationTimestamp: "2019-12-03T04:43:13Z" | |
name: default | |
resourceVersion: "158" | |
selfLink: /api/v1/namespaces/default | |
uid: 6a10d6e7-1587-11ea-b5af-027e0b84da98 | |
spec: | |
finalizers: | |
- kubernetes | |
status: | |
phase: Active | |
- apiVersion: v1 | |
kind: Namespace | |
metadata: | |
annotations: | |
kubectl.kubernetes.io/last-applied-configuration: | | |
{"apiVersion":"v1","kind":"Namespace","metadata":{"annotations":{},"labels":{"istio-injection":"disabled"},"name":"istio-system"}} | |
creationTimestamp: "2019-12-03T10:52:28Z" | |
labels: | |
istio-injection: disabled | |
name: istio-system | |
resourceVersion: "43255" | |
selfLink: /api/v1/namespaces/istio-system | |
uid: ffb3df9d-15ba-11ea-b5af-027e0b84da98 | |
spec: | |
finalizers: | |
- kubernetes | |
status: | |
phase: Active | |
- apiVersion: v1 | |
kind: Namespace | |
metadata: | |
annotations: | |
kubectl.kubernetes.io/last-applied-configuration: | | |
{"apiVersion":"v1","kind":"Namespace","metadata":{"annotations":{},"labels":{"istio-injection":"enabled","serving.knative.dev/release":"devel"},"name":"knative-serving"}} | |
creationTimestamp: "2019-12-03T10:54:03Z" | |
labels: | |
istio-injection: enabled | |
serving.knative.dev/release: devel | |
name: knative-serving | |
resourceVersion: "43770" | |
selfLink: /api/v1/namespaces/knative-serving | |
uid: 3870c561-15bb-11ea-b5af-027e0b84da98 | |
spec: | |
finalizers: | |
- kubernetes | |
status: | |
phase: Active | |
- apiVersion: v1 | |
kind: Namespace | |
metadata: | |
creationTimestamp: "2019-12-03T04:43:09Z" | |
name: kube-node-lease | |
resourceVersion: "7" | |
selfLink: /api/v1/namespaces/kube-node-lease | |
uid: 681a31ea-1587-11ea-b5af-027e0b84da98 | |
spec: | |
finalizers: | |
- kubernetes | |
status: | |
phase: Active | |
- apiVersion: v1 | |
kind: Namespace | |
metadata: | |
creationTimestamp: "2019-12-03T04:43:09Z" | |
name: kube-public | |
resourceVersion: "5" | |
selfLink: /api/v1/namespaces/kube-public | |
uid: 681974bf-1587-11ea-b5af-027e0b84da98 | |
spec: | |
finalizers: | |
- kubernetes | |
status: | |
phase: Active | |
- apiVersion: v1 | |
kind: Namespace | |
metadata: | |
annotations: | |
addons.k8s.io/core.addons.k8s.io: '{"version":"1.4.0","channel":"s3://nak3/example.cluster.k8s.local/addons/bootstrap-channel.yaml","manifestHash":"3ffe9ac576f9eec72e2bdfbd2ea17d56d9b17b90"}' | |
addons.k8s.io/dns-controller.addons.k8s.io: '{"version":"1.14.0-beta.2","channel":"s3://nak3/example.cluster.k8s.local/addons/bootstrap-channel.yaml","id":"k8s-1.12","manifestHash":"3a5efdd7920c96c09158ae60a67b28493b954d45"}' | |
addons.k8s.io/kube-dns.addons.k8s.io: '{"version":"1.14.13-kops.1","channel":"s3://nak3/example.cluster.k8s.local/addons/bootstrap-channel.yaml","id":"k8s-1.12","manifestHash":"0051963d9aa7cfc63509498f3ebd2a72fbb624f8"}' | |
addons.k8s.io/kubelet-api.rbac.addons.k8s.io: '{"version":"v0.0.1","channel":"s3://nak3/example.cluster.k8s.local/addons/bootstrap-channel.yaml","id":"k8s-1.9","manifestHash":"e1508d77cb4e527d7a2939babe36dc350dd83745"}' | |
addons.k8s.io/limit-range.addons.k8s.io: '{"version":"1.5.0","channel":"s3://nak3/example.cluster.k8s.local/addons/bootstrap-channel.yaml","manifestHash":"2ea50e23f1a5aa41df3724630ac25173738cc90c"}' | |
addons.k8s.io/networking.amazon-vpc-routed-eni: '{"version":"1.5.0-kops.1","channel":"s3://nak3/example.cluster.k8s.local/addons/bootstrap-channel.yaml","id":"k8s-1.12","manifestHash":"7c1540b3529e1260c41a9e90ac709c0f672ad47e"}' | |
addons.k8s.io/rbac.addons.k8s.io: '{"version":"1.8.0","channel":"s3://nak3/example.cluster.k8s.local/addons/bootstrap-channel.yaml","id":"k8s-1.8","manifestHash":"5d53ce7b920cd1e8d65d2306d80a041420711914"}' | |
addons.k8s.io/storage-aws.addons.k8s.io: '{"version":"1.7.0","channel":"s3://nak3/example.cluster.k8s.local/addons/bootstrap-channel.yaml","id":"v1.7.0","manifestHash":"62705a596142e6cc283280e8aa973e51536994c5"}' | |
kubectl.kubernetes.io/last-applied-configuration: | | |
{"apiVersion":"v1","kind":"Namespace","metadata":{"annotations":{},"name":"kube-system"}} | |
creationTimestamp: "2019-12-03T04:43:09Z" | |
name: kube-system | |
resourceVersion: "389" | |
selfLink: /api/v1/namespaces/kube-system | |
uid: 6818e75d-1587-11ea-b5af-027e0b84da98 | |
spec: | |
finalizers: | |
- kubernetes | |
status: | |
phase: Active | |
- apiVersion: v1 | |
kind: Namespace | |
metadata: | |
annotations: | |
kubectl.kubernetes.io/last-applied-configuration: | | |
{"apiVersion":"v1","kind":"Namespace","metadata":{"annotations":{},"name":"serving-tests"}} | |
creationTimestamp: "2019-12-03T06:51:16Z" | |
labels: | |
istio-injection: enabled | |
name: serving-tests | |
resourceVersion: "46981" | |
selfLink: /api/v1/namespaces/serving-tests | |
uid: 4d7f1fcb-1599-11ea-b5af-027e0b84da98 | |
spec: | |
finalizers: | |
- kubernetes | |
status: | |
phase: Active | |
- apiVersion: v1 | |
kind: Namespace | |
metadata: | |
annotations: | |
kubectl.kubernetes.io/last-applied-configuration: | | |
{"apiVersion":"v1","kind":"Namespace","metadata":{"annotations":{},"name":"serving-tests-alt"}} | |
creationTimestamp: "2019-12-03T06:51:16Z" | |
name: serving-tests-alt | |
resourceVersion: "15014" | |
selfLink: /api/v1/namespaces/serving-tests-alt | |
uid: 4da36e05-1599-11ea-b5af-027e0b84da98 | |
spec: | |
finalizers: | |
- kubernetes | |
status: | |
phase: Active | |
kind: List | |
metadata: | |
resourceVersion: "" | |
selfLink: "" | |
------- | |
resource: nodes | |
------- | |
apiVersion: v1 | |
items: | |
- apiVersion: v1 | |
kind: Node | |
metadata: | |
annotations: | |
node.alpha.kubernetes.io/ttl: "0" | |
volumes.kubernetes.io/controller-managed-attach-detach: "true" | |
creationTimestamp: "2019-12-03T04:44:19Z" | |
labels: | |
beta.kubernetes.io/arch: amd64 | |
beta.kubernetes.io/instance-type: t3.large | |
beta.kubernetes.io/os: linux | |
failure-domain.beta.kubernetes.io/region: ap-southeast-1 | |
failure-domain.beta.kubernetes.io/zone: ap-southeast-1a | |
kops.k8s.io/instancegroup: master-ap-southeast-1a | |
kubernetes.io/arch: amd64 | |
kubernetes.io/hostname: ip-172-20-37-73.ap-southeast-1.compute.internal | |
kubernetes.io/os: linux | |
kubernetes.io/role: master | |
node-role.kubernetes.io/master: "" | |
name: ip-172-20-37-73.ap-southeast-1.compute.internal | |
resourceVersion: "61081" | |
selfLink: /api/v1/nodes/ip-172-20-37-73.ap-southeast-1.compute.internal | |
uid: 91d88796-1587-11ea-b5af-027e0b84da98 | |
spec: | |
podCIDR: 172.20.128.0/24 | |
providerID: aws:///ap-southeast-1a/i-0299c3739afd98ba7 | |
taints: | |
- effect: NoSchedule | |
key: node-role.kubernetes.io/master | |
status: | |
addresses: | |
- address: 172.20.37.73 | |
type: InternalIP | |
- address: 18.141.24.94 | |
type: ExternalIP | |
- address: ip-172-20-37-73.ap-southeast-1.compute.internal | |
type: InternalDNS | |
- address: ec2-18-141-24-94.ap-southeast-1.compute.amazonaws.com | |
type: ExternalDNS | |
- address: ip-172-20-37-73.ap-southeast-1.compute.internal | |
type: Hostname | |
allocatable: | |
attachable-volumes-aws-ebs: "25" | |
cpu: "2" | |
ephemeral-storage: "57916492090" | |
hugepages-1Gi: "0" | |
hugepages-2Mi: "0" | |
memory: 7972780Ki | |
pods: "35" | |
capacity: | |
attachable-volumes-aws-ebs: "25" | |
cpu: "2" | |
ephemeral-storage: 62843416Ki | |
hugepages-1Gi: "0" | |
hugepages-2Mi: "0" | |
memory: 8075180Ki | |
pods: "35" | |
conditions: | |
- lastHeartbeatTime: "2019-12-03T13:19:21Z" | |
lastTransitionTime: "2019-12-03T04:44:19Z" | |
message: kubelet has sufficient memory available | |
reason: KubeletHasSufficientMemory | |
status: "False" | |
type: MemoryPressure | |
- lastHeartbeatTime: "2019-12-03T13:19:21Z" | |
lastTransitionTime: "2019-12-03T04:44:19Z" | |
message: kubelet has no disk pressure | |
reason: KubeletHasNoDiskPressure | |
status: "False" | |
type: DiskPressure | |
- lastHeartbeatTime: "2019-12-03T13:19:21Z" | |
lastTransitionTime: "2019-12-03T04:44:19Z" | |
message: kubelet has sufficient PID available | |
reason: KubeletHasSufficientPID | |
status: "False" | |
type: PIDPressure | |
- lastHeartbeatTime: "2019-12-03T13:19:21Z" | |
lastTransitionTime: "2019-12-03T04:44:40Z" | |
message: kubelet is posting ready status | |
reason: KubeletReady | |
status: "True" | |
type: Ready | |
daemonEndpoints: | |
kubeletEndpoint: | |
Port: 10250 | |
images: | |
- names: | |
- kopeio/etcd-manager@sha256:74b2866dd62eda22183ce06b8e6c1d2a499f1b281768a0fceee1890ea204fdef | |
- kopeio/etcd-manager:3.0.20190816 | |
sizeBytes: 656348569 | |
- names: | |
- protokube:1.14.0-beta.2 | |
sizeBytes: 287898685 | |
- names: | |
- 602401143452.dkr.ecr.us-west-2.amazonaws.com/amazon-k8s-cni@sha256:81cd8a9d7ce75b2f7190296d5f9c43188d7e43e438a8e6dd11d36238ee36b5de | |
- 602401143452.dkr.ecr.us-west-2.amazonaws.com/amazon-k8s-cni:v1.5.0 | |
sizeBytes: 247322214 | |
- names: | |
- k8s.gcr.io/kube-apiserver@sha256:8c43d27db9fc89f515ea35e6f7cd8cfe0429e9fc1a0cb7eda9ca9dced36675b0 | |
- k8s.gcr.io/kube-apiserver:v1.14.6 | |
sizeBytes: 209433406 | |
- names: | |
- k8s.gcr.io/kube-controller-manager@sha256:1809ab49da73332ca9f8e46cb0a7b799375a49ed50996c579352fc6e880add95 | |
- k8s.gcr.io/kube-controller-manager:v1.14.6 | |
sizeBytes: 157458462 | |
- names: | |
- kope/dns-controller@sha256:0ebcf793480436fac6ef9af42b465447c1e03b3fac9c258e8292c10063d3dee3 | |
- kope/dns-controller:1.14.0-beta.2 | |
sizeBytes: 122678800 | |
- names: | |
- k8s.gcr.io/kube-proxy@sha256:e5c364dc75d816132bebf2d84b35518f0661fdeae39c686d92f9e5f9a07e96b9 | |
- k8s.gcr.io/kube-proxy:v1.14.6 | |
sizeBytes: 82106236 | |
- names: | |
- k8s.gcr.io/kube-scheduler@sha256:0147e498f115390c6276014c5ac038e1128ba1cc0d15d28c380ba5a8cab34851 | |
- k8s.gcr.io/kube-scheduler:v1.14.6 | |
sizeBytes: 81579742 | |
- names: | |
- k8s.gcr.io/pause-amd64@sha256:163ac025575b775d1c0f9bf0bdd0f086883171eb475b5068e7defa4ca9e76516 | |
- k8s.gcr.io/pause-amd64:3.0 | |
sizeBytes: 746888 | |
nodeInfo: | |
architecture: amd64 | |
bootID: b7ad2dae-68bc-4bca-b9ad-d53ba6446cd0 | |
containerRuntimeVersion: docker://18.6.3 | |
kernelVersion: 4.9.0-11-amd64 | |
kubeProxyVersion: v1.14.6 | |
kubeletVersion: v1.14.6 | |
machineID: ec27af0a0426bb93177d40b41608d0de | |
operatingSystem: linux | |
osImage: Debian GNU/Linux 9 (stretch) | |
systemUUID: EC27AF0A-0426-BB93-177D-40B41608D0DE | |
- apiVersion: v1 | |
kind: Node | |
metadata: | |
annotations: | |
node.alpha.kubernetes.io/ttl: "0" | |
volumes.kubernetes.io/controller-managed-attach-detach: "true" | |
creationTimestamp: "2019-12-03T04:45:02Z" | |
labels: | |
beta.kubernetes.io/arch: amd64 | |
beta.kubernetes.io/instance-type: t3.large | |
beta.kubernetes.io/os: linux | |
failure-domain.beta.kubernetes.io/region: ap-southeast-1 | |
failure-domain.beta.kubernetes.io/zone: ap-southeast-1a | |
kops.k8s.io/instancegroup: nodes | |
kubernetes.io/arch: amd64 | |
kubernetes.io/hostname: ip-172-20-40-226.ap-southeast-1.compute.internal | |
kubernetes.io/os: linux | |
kubernetes.io/role: node | |
node-role.kubernetes.io/node: "" | |
name: ip-172-20-40-226.ap-southeast-1.compute.internal | |
resourceVersion: "61079" | |
selfLink: /api/v1/nodes/ip-172-20-40-226.ap-southeast-1.compute.internal | |
uid: ab2dc16f-1587-11ea-b5af-027e0b84da98 | |
spec: | |
podCIDR: 172.20.130.0/24 | |
providerID: aws:///ap-southeast-1a/i-07165c474a3a1fd98 | |
status: | |
addresses: | |
- address: 172.20.40.226 | |
type: InternalIP | |
- address: 13.229.102.237 | |
type: ExternalIP | |
- address: ip-172-20-40-226.ap-southeast-1.compute.internal | |
type: InternalDNS | |
- address: ec2-13-229-102-237.ap-southeast-1.compute.amazonaws.com | |
type: ExternalDNS | |
- address: ip-172-20-40-226.ap-southeast-1.compute.internal | |
type: Hostname | |
allocatable: | |
attachable-volumes-aws-ebs: "25" | |
cpu: "2" | |
ephemeral-storage: "115894266893" | |
hugepages-1Gi: "0" | |
hugepages-2Mi: "0" | |
memory: 7972780Ki | |
pods: "35" | |
capacity: | |
attachable-volumes-aws-ebs: "25" | |
cpu: "2" | |
ephemeral-storage: 125753328Ki | |
hugepages-1Gi: "0" | |
hugepages-2Mi: "0" | |
memory: 8075180Ki | |
pods: "35" | |
conditions: | |
- lastHeartbeatTime: "2019-12-03T13:19:20Z" | |
lastTransitionTime: "2019-12-03T04:45:02Z" | |
message: kubelet has sufficient memory available | |
reason: KubeletHasSufficientMemory | |
status: "False" | |
type: MemoryPressure | |
- lastHeartbeatTime: "2019-12-03T13:19:20Z" | |
lastTransitionTime: "2019-12-03T04:45:02Z" | |
message: kubelet has no disk pressure | |
reason: KubeletHasNoDiskPressure | |
status: "False" | |
type: DiskPressure | |
- lastHeartbeatTime: "2019-12-03T13:19:20Z" | |
lastTransitionTime: "2019-12-03T04:45:02Z" | |
message: kubelet has sufficient PID available | |
reason: KubeletHasSufficientPID | |
status: "False" | |
type: PIDPressure | |
- lastHeartbeatTime: "2019-12-03T13:19:20Z" | |
lastTransitionTime: "2019-12-03T04:45:22Z" | |
message: kubelet is posting ready status | |
reason: KubeletReady | |
status: "True" | |
type: Ready | |
daemonEndpoints: | |
kubeletEndpoint: | |
Port: 10250 | |
images: | |
- names: | |
- istio/proxyv2@sha256:245b1b40003654e9a9e3757196fa3cb506439cf8c98792c1552300528d8aea14 | |
- istio/proxyv2:1.3.5 | |
sizeBytes: 295628711 | |
- names: | |
- protokube:1.14.0-beta.2 | |
sizeBytes: 287898685 | |
- names: | |
- istio/kubectl@sha256:76c76dbed21c162dac9d6fa2337348eeaf5fb0f89a5c9857ff47f352cd6e82b4 | |
- istio/kubectl:1.3.5 | |
sizeBytes: 271562982 | |
- names: | |
- istio/pilot@sha256:17aefbe996d67e9fdf5dbba90bdcf030333a0832a34bc66469472ce61d2eed76 | |
- istio/pilot:1.3.5 | |
sizeBytes: 268531301 | |
- names: | |
- 602401143452.dkr.ecr.us-west-2.amazonaws.com/amazon-k8s-cni@sha256:81cd8a9d7ce75b2f7190296d5f9c43188d7e43e438a8e6dd11d36238ee36b5de | |
- 602401143452.dkr.ecr.us-west-2.amazonaws.com/amazon-k8s-cni:v1.5.0 | |
sizeBytes: 247322214 | |
- names: | |
- istio/citadel@sha256:8cd4eac4fb8f1f331b0a63bb628c560e9ac5509717c469a9f3f01dec61a2f825 | |
- istio/citadel:1.3.5 | |
sizeBytes: 241393987 | |
- names: | |
- istio/proxyv2@sha256:9ba9de87d660767a2147f786040a8fe29ebb3b335742d3c95257ab82a33b8415 | |
- istio/proxyv2:1.4.0 | |
sizeBytes: 236743155 | |
- names: | |
- istio/kubectl@sha256:d62512cc4b10228512c86f63501b828b80c20e238452c429cfd62a9b9388cc54 | |
- istio/kubectl:1.4.0 | |
sizeBytes: 218715390 | |
- names: | |
- istio/sidecar_injector@sha256:9f4aba5bb84a07e198b65bc7e4fc0067f876f66b51c7404816ae95e6b5ffa938 | |
- istio/sidecar_injector:1.4.0 | |
sizeBytes: 196252897 | |
- names: | |
- istio/proxy_init@sha256:8278995c58eef8cd4ba32cb8756e2b93a09708e39fc9c0381e90c8a4fb62a042 | |
- istio/proxy_init:1.3.5 | |
sizeBytes: 193060005 | |
- names: | |
- istio/node-agent-k8s@sha256:b3a169eb928e651bb0e9e40ed574d2c8cd1671a3b598c3c79458a63fd7cf398d | |
- istio/node-agent-k8s:1.4.0 | |
sizeBytes: 193009018 | |
- names: | |
- istio/mixer@sha256:8fa82c01ce621a4643600e4c54d4bfa41875c0030e0b41a819dd0e5e75349376 | |
- istio/mixer:1.3.5 | |
sizeBytes: 92658350 | |
- names: | |
- k8s.gcr.io/kube-proxy@sha256:e5c364dc75d816132bebf2d84b35518f0661fdeae39c686d92f9e5f9a07e96b9 | |
- k8s.gcr.io/kube-proxy:v1.14.6 | |
sizeBytes: 82106236 | |
- names: | |
- istio/mixer@sha256:b0b13e4311da022a1f67c85ffeb82d42567739c7156d2f644a66364b0c947fc4 | |
- istio/mixer:1.4.0 | |
sizeBytes: 80456256 | |
- names: | |
- gcr.io/gcp-compute-engine-223401/autoscaler-12c0fa24db31956a7cfa673210e4fa13@sha256:f74987342b3c7bcb8b95006f98a8efcfa19bd518430844df037cd5f29132c997 | |
sizeBytes: 65899235 | |
- names: | |
- gcr.io/gcp-compute-engine-223401/activator-ecd51ca5034883acbe737fde417a3d86@sha256:b2257a5f6e2427a5a96f6ea9ca2b652ee648e131e9a699df6e20b4bcfa4ef940 | |
sizeBytes: 59323763 | |
- names: | |
- gcr.io/gcp-compute-engine-223401/certmanager-f79b5bfeb092d099f0f3326024a30ebb@sha256:9f7622fd03d96c3262e71b4f6fb14455145041c81950b3efe10010c122974bed | |
sizeBytes: 58077460 | |
- names: | |
- gcr.io/gcp-compute-engine-223401/istio-c58c0c8bb8ecc80f800bb788a425ae1d@sha256:ebdb4e8832e9574311494a31ea18dc63cf903e8dd7f0651d640eb2c7f252da2a | |
sizeBytes: 57052872 | |
- names: | |
- gcr.io/gcp-compute-engine-223401/nscert-e3625dd01dcb901439f4630ab9789e75@sha256:77da0645be1369d0e56a1daa204da6de6661488eef5858a60dee9a052f02150c | |
sizeBytes: 56568040 | |
- names: | |
- gcr.io/gcp-compute-engine-223401/webhook-261c6506fca17bc41be50b3461f98f1c@sha256:012be54c7866cb8458fe96061f5321e519da7a4803809d912c2a670fff904ac6 | |
sizeBytes: 55354038 | |
- names: | |
- k8s.gcr.io/pause-amd64@sha256:163ac025575b775d1c0f9bf0bdd0f086883171eb475b5068e7defa4ca9e76516 | |
- k8s.gcr.io/pause-amd64:3.0 | |
sizeBytes: 746888 | |
nodeInfo: | |
architecture: amd64 | |
bootID: cf2549e6-50e0-4c1f-a09c-da8be985c8b8 | |
containerRuntimeVersion: docker://18.6.3 | |
kernelVersion: 4.9.0-11-amd64 | |
kubeProxyVersion: v1.14.6 | |
kubeletVersion: v1.14.6 | |
machineID: ec22f1bbd486f63ef1252035db817620 | |
operatingSystem: linux | |
osImage: Debian GNU/Linux 9 (stretch) | |
systemUUID: EC22F1BB-D486-F63E-F125-2035DB817620 | |
- apiVersion: v1 | |
kind: Node | |
metadata: | |
annotations: | |
node.alpha.kubernetes.io/ttl: "0" | |
volumes.kubernetes.io/controller-managed-attach-detach: "true" | |
creationTimestamp: "2019-12-03T04:45:02Z" | |
labels: | |
beta.kubernetes.io/arch: amd64 | |
beta.kubernetes.io/instance-type: t3.large | |
beta.kubernetes.io/os: linux | |
failure-domain.beta.kubernetes.io/region: ap-southeast-1 | |
failure-domain.beta.kubernetes.io/zone: ap-southeast-1a | |
kops.k8s.io/instancegroup: nodes | |
kubernetes.io/arch: amd64 | |
kubernetes.io/hostname: ip-172-20-44-18.ap-southeast-1.compute.internal | |
kubernetes.io/os: linux | |
kubernetes.io/role: node | |
node-role.kubernetes.io/node: "" | |
name: ip-172-20-44-18.ap-southeast-1.compute.internal | |
resourceVersion: "61141" | |
selfLink: /api/v1/nodes/ip-172-20-44-18.ap-southeast-1.compute.internal | |
uid: ab6ff308-1587-11ea-b5af-027e0b84da98 | |
spec: | |
podCIDR: 172.20.132.0/24 | |
providerID: aws:///ap-southeast-1a/i-08c20d344fa1fb6c5 | |
status: | |
addresses: | |
- address: 172.20.44.18 | |
type: InternalIP | |
- address: 54.179.175.206 | |
type: ExternalIP | |
- address: ip-172-20-44-18.ap-southeast-1.compute.internal | |
type: InternalDNS | |
- address: ec2-54-179-175-206.ap-southeast-1.compute.amazonaws.com | |
type: ExternalDNS | |
- address: ip-172-20-44-18.ap-southeast-1.compute.internal | |
type: Hostname | |
allocatable: | |
attachable-volumes-aws-ebs: "25" | |
cpu: "2" | |
ephemeral-storage: "115894266893" | |
hugepages-1Gi: "0" | |
hugepages-2Mi: "0" | |
memory: 7972788Ki | |
pods: "35" | |
capacity: | |
attachable-volumes-aws-ebs: "25" | |
cpu: "2" | |
ephemeral-storage: 125753328Ki | |
hugepages-1Gi: "0" | |
hugepages-2Mi: "0" | |
memory: 8075188Ki | |
pods: "35" | |
conditions: | |
- lastHeartbeatTime: "2019-12-03T13:19:54Z" | |
lastTransitionTime: "2019-12-03T04:45:02Z" | |
message: kubelet has sufficient memory available | |
reason: KubeletHasSufficientMemory | |
status: "False" | |
type: MemoryPressure | |
- lastHeartbeatTime: "2019-12-03T13:19:54Z" | |
lastTransitionTime: "2019-12-03T04:45:02Z" | |
message: kubelet has no disk pressure | |
reason: KubeletHasNoDiskPressure | |
status: "False" | |
type: DiskPressure | |
- lastHeartbeatTime: "2019-12-03T13:19:54Z" | |
lastTransitionTime: "2019-12-03T04:45:02Z" | |
message: kubelet has sufficient PID available | |
reason: KubeletHasSufficientPID | |
status: "False" | |
type: PIDPressure | |
- lastHeartbeatTime: "2019-12-03T13:19:54Z" | |
lastTransitionTime: "2019-12-03T04:45:22Z" | |
message: kubelet is posting ready status | |
reason: KubeletReady | |
status: "True" | |
type: Ready | |
daemonEndpoints: | |
kubeletEndpoint: | |
Port: 10250 | |
images: | |
- names: | |
- gcr.io/knative-samples/helloworld-go@sha256:5ea96ba4b872685ff4ddb5cd8d1a97ec18c18fae79ee8df0d29f446c5efe5f50 | |
sizeBytes: 780868439 | |
- names: | |
- istio/proxyv2@sha256:245b1b40003654e9a9e3757196fa3cb506439cf8c98792c1552300528d8aea14 | |
- istio/proxyv2:1.3.5 | |
sizeBytes: 295628711 | |
- names: | |
- protokube:1.14.0-beta.2 | |
sizeBytes: 287898685 | |
- names: | |
- istio/kubectl@sha256:76c76dbed21c162dac9d6fa2337348eeaf5fb0f89a5c9857ff47f352cd6e82b4 | |
- istio/kubectl:1.3.5 | |
sizeBytes: 271562982 | |
- names: | |
- istio/galley@sha256:de9c61c20d8e6b86b7761574789f1660d3b3fdff0463bfc24393e0d9c5985f53 | |
- istio/galley:1.3.5 | |
sizeBytes: 270017814 | |
- names: | |
- 602401143452.dkr.ecr.us-west-2.amazonaws.com/amazon-k8s-cni@sha256:81cd8a9d7ce75b2f7190296d5f9c43188d7e43e438a8e6dd11d36238ee36b5de | |
- 602401143452.dkr.ecr.us-west-2.amazonaws.com/amazon-k8s-cni:v1.5.0 | |
sizeBytes: 247322214 | |
- names: | |
- istio/proxyv2@sha256:9ba9de87d660767a2147f786040a8fe29ebb3b335742d3c95257ab82a33b8415 | |
- istio/proxyv2:1.4.0 | |
sizeBytes: 236743155 | |
- names: | |
- istio/kubectl@sha256:d62512cc4b10228512c86f63501b828b80c20e238452c429cfd62a9b9388cc54 | |
- istio/kubectl:1.4.0 | |
sizeBytes: 218715390 | |
- names: | |
- istio/galley@sha256:67f9f5321e6fefdf97e5406a047579a0fd04b576ad1c997e95a9db4dd2fbc6bc | |
- istio/galley:1.4.0 | |
sizeBytes: 212440743 | |
- names: | |
- istio/pilot@sha256:149357dc33f488eff0cc1edfb3329e72ea49614d52095770df543cbb8d60bcdb | |
- istio/pilot:1.4.0 | |
sizeBytes: 208430582 | |
- names: | |
- istio/sidecar_injector@sha256:9f4aba5bb84a07e198b65bc7e4fc0067f876f66b51c7404816ae95e6b5ffa938 | |
- istio/sidecar_injector:1.4.0 | |
sizeBytes: 196252897 | |
- names: | |
- istio/citadel@sha256:e168f97716efd0a16a65ad19bdf6be5858c31e0499023b3a3ef15e9f4fcd6ef5 | |
- istio/citadel:1.4.0 | |
sizeBytes: 187942039 | |
- names: | |
- istio/mixer@sha256:8fa82c01ce621a4643600e4c54d4bfa41875c0030e0b41a819dd0e5e75349376 | |
- istio/mixer:1.3.5 | |
sizeBytes: 92658350 | |
- names: | |
- k8s.gcr.io/kube-proxy@sha256:e5c364dc75d816132bebf2d84b35518f0661fdeae39c686d92f9e5f9a07e96b9 | |
- k8s.gcr.io/kube-proxy:v1.14.6 | |
sizeBytes: 82106236 | |
- names: | |
- istio/mixer@sha256:b0b13e4311da022a1f67c85ffeb82d42567739c7156d2f644a66364b0c947fc4 | |
- istio/mixer:1.4.0 | |
sizeBytes: 80456256 | |
- names: | |
- gcr.io/gcp-compute-engine-223401/activator-ecd51ca5034883acbe737fde417a3d86@sha256:b2257a5f6e2427a5a96f6ea9ca2b652ee648e131e9a699df6e20b4bcfa4ef940 | |
sizeBytes: 59323763 | |
- names: | |
- gcr.io/gcp-compute-engine-223401/autoscaler-hpa-85c0b68178743d74ff7f663a72802ceb@sha256:24e81ede4cc223f0f70a1630fc4bed30308eb7b406715dbdd2280827f7565eec | |
sizeBytes: 58181702 | |
- names: | |
- gcr.io/gcp-compute-engine-223401/queue-39be6f1d08a095bd076a71d288d295b6@sha256:8adf8f990b4485e7ead4dc9e6f8ddb3a19142835de95386428deb9ffde8d20b2 | |
sizeBytes: 48155143 | |
- names: | |
- k8s.gcr.io/pause-amd64@sha256:163ac025575b775d1c0f9bf0bdd0f086883171eb475b5068e7defa4ca9e76516 | |
- k8s.gcr.io/pause-amd64:3.0 | |
sizeBytes: 746888 | |
nodeInfo: | |
architecture: amd64 | |
bootID: 6101bb52-01d3-4bdf-9e12-51188ec1cd60 | |
containerRuntimeVersion: docker://18.6.3 | |
kernelVersion: 4.9.0-11-amd64 | |
kubeProxyVersion: v1.14.6 | |
kubeletVersion: v1.14.6 | |
machineID: ec2ed086b5b5c48fe013453c0596130e | |
operatingSystem: linux | |
osImage: Debian GNU/Linux 9 (stretch) | |
systemUUID: EC2ED086-B5B5-C48F-E013-453C0596130E | |
- apiVersion: v1 | |
kind: Node | |
metadata: | |
annotations: | |
node.alpha.kubernetes.io/ttl: "0" | |
volumes.kubernetes.io/controller-managed-attach-detach: "true" | |
creationTimestamp: "2019-12-03T04:45:02Z" | |
labels: | |
beta.kubernetes.io/arch: amd64 | |
beta.kubernetes.io/instance-type: t3.large | |
beta.kubernetes.io/os: linux | |
failure-domain.beta.kubernetes.io/region: ap-southeast-1 | |
failure-domain.beta.kubernetes.io/zone: ap-southeast-1a | |
kops.k8s.io/instancegroup: nodes | |
kubernetes.io/arch: amd64 | |
kubernetes.io/hostname: ip-172-20-44-180.ap-southeast-1.compute.internal | |
kubernetes.io/os: linux | |
kubernetes.io/role: node | |
node-role.kubernetes.io/node: "" | |
name: ip-172-20-44-180.ap-southeast-1.compute.internal | |
resourceVersion: "61137" | |
selfLink: /api/v1/nodes/ip-172-20-44-180.ap-southeast-1.compute.internal | |
uid: ab3fb0f5-1587-11ea-b5af-027e0b84da98 | |
spec: | |
podCIDR: 172.20.131.0/24 | |
providerID: aws:///ap-southeast-1a/i-0732cd8aeec90e874 | |
status: | |
addresses: | |
- address: 172.20.44.180 | |
type: InternalIP | |
- address: 54.179.147.153 | |
type: ExternalIP | |
- address: ip-172-20-44-180.ap-southeast-1.compute.internal | |
type: InternalDNS | |
- address: ec2-54-179-147-153.ap-southeast-1.compute.amazonaws.com | |
type: ExternalDNS | |
- address: ip-172-20-44-180.ap-southeast-1.compute.internal | |
type: Hostname | |
allocatable: | |
attachable-volumes-aws-ebs: "25" | |
cpu: "2" | |
ephemeral-storage: "115894266893" | |
hugepages-1Gi: "0" | |
hugepages-2Mi: "0" | |
memory: 7972788Ki | |
pods: "35" | |
capacity: | |
attachable-volumes-aws-ebs: "25" | |
cpu: "2" | |
ephemeral-storage: 125753328Ki | |
hugepages-1Gi: "0" | |
hugepages-2Mi: "0" | |
memory: 8075188Ki | |
pods: "35" | |
conditions: | |
- lastHeartbeatTime: "2019-12-03T13:19:52Z" | |
lastTransitionTime: "2019-12-03T04:45:02Z" | |
message: kubelet has sufficient memory available | |
reason: KubeletHasSufficientMemory | |
status: "False" | |
type: MemoryPressure | |
- lastHeartbeatTime: "2019-12-03T13:19:52Z" | |
lastTransitionTime: "2019-12-03T04:45:02Z" | |
message: kubelet has no disk pressure | |
reason: KubeletHasNoDiskPressure | |
status: "False" | |
type: DiskPressure | |
- lastHeartbeatTime: "2019-12-03T13:19:52Z" | |
lastTransitionTime: "2019-12-03T04:45:02Z" | |
message: kubelet has sufficient PID available | |
reason: KubeletHasSufficientPID | |
status: "False" | |
type: PIDPressure | |
- lastHeartbeatTime: "2019-12-03T13:19:52Z" | |
lastTransitionTime: "2019-12-03T04:45:22Z" | |
message: kubelet is posting ready status | |
reason: KubeletReady | |
status: "True" | |
type: Ready | |
daemonEndpoints: | |
kubeletEndpoint: | |
Port: 10250 | |
images: | |
- names: | |
- gcr.io/knative-samples/helloworld-go@sha256:5ea96ba4b872685ff4ddb5cd8d1a97ec18c18fae79ee8df0d29f446c5efe5f50 | |
sizeBytes: 780868439 | |
- names: | |
- istio/proxyv2@sha256:245b1b40003654e9a9e3757196fa3cb506439cf8c98792c1552300528d8aea14 | |
- istio/proxyv2:1.3.5 | |
sizeBytes: 295628711 | |
- names: | |
- protokube:1.14.0-beta.2 | |
sizeBytes: 287898685 | |
- names: | |
- istio/node-agent-k8s@sha256:0a18362538b10523fe2a302ca88e6edd206661658ee43b1bc9e7e671cd2dc0b9 | |
- istio/node-agent-k8s:1.3.5 | |
sizeBytes: 250162398 | |
- names: | |
- 602401143452.dkr.ecr.us-west-2.amazonaws.com/amazon-k8s-cni@sha256:81cd8a9d7ce75b2f7190296d5f9c43188d7e43e438a8e6dd11d36238ee36b5de | |
- 602401143452.dkr.ecr.us-west-2.amazonaws.com/amazon-k8s-cni:v1.5.0 | |
sizeBytes: 247322214 | |
- names: | |
- istio/proxyv2@sha256:9ba9de87d660767a2147f786040a8fe29ebb3b335742d3c95257ab82a33b8415 | |
- istio/proxyv2:1.4.0 | |
sizeBytes: 236743155 | |
- names: | |
- istio/galley@sha256:67f9f5321e6fefdf97e5406a047579a0fd04b576ad1c997e95a9db4dd2fbc6bc | |
- istio/galley:1.4.0 | |
sizeBytes: 212440743 | |
- names: | |
- istio/pilot@sha256:149357dc33f488eff0cc1edfb3329e72ea49614d52095770df543cbb8d60bcdb | |
- istio/pilot:1.4.0 | |
sizeBytes: 208430582 | |
- names: | |
- istio/sidecar_injector@sha256:9f4aba5bb84a07e198b65bc7e4fc0067f876f66b51c7404816ae95e6b5ffa938 | |
- istio/sidecar_injector:1.4.0 | |
sizeBytes: 196252897 | |
- names: | |
- istio/node-agent-k8s@sha256:b3a169eb928e651bb0e9e40ed574d2c8cd1671a3b598c3c79458a63fd7cf398d | |
- istio/node-agent-k8s:1.4.0 | |
sizeBytes: 193009018 | |
- names: | |
- istio/citadel@sha256:e168f97716efd0a16a65ad19bdf6be5858c31e0499023b3a3ef15e9f4fcd6ef5 | |
- istio/citadel:1.4.0 | |
sizeBytes: 187942039 | |
- names: | |
- k8s.gcr.io/kube-proxy@sha256:e5c364dc75d816132bebf2d84b35518f0661fdeae39c686d92f9e5f9a07e96b9 | |
- k8s.gcr.io/kube-proxy:v1.14.6 | |
sizeBytes: 82106236 | |
- names: | |
- gcr.io/gcp-compute-engine-223401/controller-f6fdb41c6acbc726e29a3104ff2ef720@sha256:7cde59d7e5e3f7891b57fb51ade68929b5220df54b70dc027a62018c54fe23d3 | |
sizeBytes: 59788477 | |
- names: | |
- gcr.io/gcp-compute-engine-223401/autoscaler-hpa-85c0b68178743d74ff7f663a72802ceb@sha256:24e81ede4cc223f0f70a1630fc4bed30308eb7b406715dbdd2280827f7565eec | |
sizeBytes: 58181702 | |
- names: | |
- gcr.io/gcp-compute-engine-223401/certmanager-f79b5bfeb092d099f0f3326024a30ebb@sha256:9f7622fd03d96c3262e71b4f6fb14455145041c81950b3efe10010c122974bed | |
sizeBytes: 58077460 | |
- names: | |
- gcr.io/gcp-compute-engine-223401/istio-c58c0c8bb8ecc80f800bb788a425ae1d@sha256:ebdb4e8832e9574311494a31ea18dc63cf903e8dd7f0651d640eb2c7f252da2a | |
sizeBytes: 57052872 | |
- names: | |
- gcr.io/gcp-compute-engine-223401/nscert-e3625dd01dcb901439f4630ab9789e75@sha256:77da0645be1369d0e56a1daa204da6de6661488eef5858a60dee9a052f02150c | |
sizeBytes: 56568040 | |
- names: | |
- gcr.io/gcp-compute-engine-223401/webhook-261c6506fca17bc41be50b3461f98f1c@sha256:012be54c7866cb8458fe96061f5321e519da7a4803809d912c2a670fff904ac6 | |
sizeBytes: 55354038 | |
- names: | |
- k8s.gcr.io/k8s-dns-kube-dns-amd64@sha256:618a82fa66cf0c75e4753369a6999032372be7308866fc9afb381789b1e5ad52 | |
- k8s.gcr.io/k8s-dns-kube-dns-amd64:1.14.13 | |
sizeBytes: 51157394 | |
- names: | |
- gcr.io/gcp-compute-engine-223401/queue-39be6f1d08a095bd076a71d288d295b6@sha256:8adf8f990b4485e7ead4dc9e6f8ddb3a19142835de95386428deb9ffde8d20b2 | |
sizeBytes: 48155143 | |
- names: | |
- k8s.gcr.io/k8s-dns-sidecar-amd64@sha256:cedc8fe2098dffc26d17f64061296b7aa54258a31513b6c52df271a98bb522b3 | |
- k8s.gcr.io/k8s-dns-sidecar-amd64:1.14.13 | |
sizeBytes: 42852039 | |
- names: | |
- k8s.gcr.io/k8s-dns-dnsmasq-nanny-amd64@sha256:45df3e8e0c551bd0c79cdba48ae6677f817971dcbd1eeed7fd1f9a35118410e4 | |
- k8s.gcr.io/k8s-dns-dnsmasq-nanny-amd64:1.14.13 | |
sizeBytes: 41372492 | |
- names: | |
- k8s.gcr.io/pause-amd64@sha256:163ac025575b775d1c0f9bf0bdd0f086883171eb475b5068e7defa4ca9e76516 | |
- k8s.gcr.io/pause-amd64:3.0 | |
sizeBytes: 746888 | |
nodeInfo: | |
architecture: amd64 | |
bootID: e6259c5a-c4b5-4882-a5cf-8b3021dc4550 | |
containerRuntimeVersion: docker://18.6.3 | |
kernelVersion: 4.9.0-11-amd64 | |
kubeProxyVersion: v1.14.6 | |
kubeletVersion: v1.14.6 | |
machineID: ec26f7e1ac86f9b0ec326d2a53038716 | |
operatingSystem: linux | |
osImage: Debian GNU/Linux 9 (stretch) | |
systemUUID: EC26F7E1-AC86-F9B0-EC32-6D2A53038716 | |
- apiVersion: v1 | |
kind: Node | |
metadata: | |
annotations: | |
node.alpha.kubernetes.io/ttl: "0" | |
volumes.kubernetes.io/controller-managed-attach-detach: "true" | |
creationTimestamp: "2019-12-03T04:45:04Z" | |
labels: | |
beta.kubernetes.io/arch: amd64 | |
beta.kubernetes.io/instance-type: t3.large | |
beta.kubernetes.io/os: linux | |
failure-domain.beta.kubernetes.io/region: ap-southeast-1 | |
failure-domain.beta.kubernetes.io/zone: ap-southeast-1b | |
kops.k8s.io/instancegroup: nodes | |
kubernetes.io/arch: amd64 | |
kubernetes.io/hostname: ip-172-20-67-65.ap-southeast-1.compute.internal | |
kubernetes.io/os: linux | |
kubernetes.io/role: node | |
node-role.kubernetes.io/node: "" | |
name: ip-172-20-67-65.ap-southeast-1.compute.internal | |
resourceVersion: "61128" | |
selfLink: /api/v1/nodes/ip-172-20-67-65.ap-southeast-1.compute.internal | |
uid: ac415e24-1587-11ea-b5af-027e0b84da98 | |
spec: | |
podCIDR: 172.20.133.0/24 | |
providerID: aws:///ap-southeast-1b/i-00c1a6378957ee8f4 | |
status: | |
addresses: | |
- address: 172.20.67.65 | |
type: InternalIP | |
- address: 13.250.22.240 | |
type: ExternalIP | |
- address: ip-172-20-67-65.ap-southeast-1.compute.internal | |
type: InternalDNS | |
- address: ec2-13-250-22-240.ap-southeast-1.compute.amazonaws.com | |
type: ExternalDNS | |
- address: ip-172-20-67-65.ap-southeast-1.compute.internal | |
type: Hostname | |
allocatable: | |
attachable-volumes-aws-ebs: "25" | |
cpu: "2" | |
ephemeral-storage: "115894266893" | |
hugepages-1Gi: "0" | |
hugepages-2Mi: "0" | |
memory: 7972788Ki | |
pods: "35" | |
capacity: | |
attachable-volumes-aws-ebs: "25" | |
cpu: "2" | |
ephemeral-storage: 125753328Ki | |
hugepages-1Gi: "0" | |
hugepages-2Mi: "0" | |
memory: 8075188Ki | |
pods: "35" | |
conditions: | |
- lastHeartbeatTime: "2019-12-03T13:19:47Z" | |
lastTransitionTime: "2019-12-03T04:45:04Z" | |
message: kubelet has sufficient memory available | |
reason: KubeletHasSufficientMemory | |
status: "False" | |
type: MemoryPressure | |
- lastHeartbeatTime: "2019-12-03T13:19:47Z" | |
lastTransitionTime: "2019-12-03T04:45:04Z" | |
message: kubelet has no disk pressure | |
reason: KubeletHasNoDiskPressure | |
status: "False" | |
type: DiskPressure | |
- lastHeartbeatTime: "2019-12-03T13:19:47Z" | |
lastTransitionTime: "2019-12-03T04:45:04Z" | |
message: kubelet has sufficient PID available | |
reason: KubeletHasSufficientPID | |
status: "False" | |
type: PIDPressure | |
- lastHeartbeatTime: "2019-12-03T13:19:47Z" | |
lastTransitionTime: "2019-12-03T04:45:24Z" | |
message: kubelet is posting ready status | |
reason: KubeletReady | |
status: "True" | |
type: Ready | |
daemonEndpoints: | |
kubeletEndpoint: | |
Port: 10250 | |
images: | |
- names: | |
- istio/proxyv2@sha256:245b1b40003654e9a9e3757196fa3cb506439cf8c98792c1552300528d8aea14 | |
- istio/proxyv2:1.3.5 | |
sizeBytes: 295628711 | |
- names: | |
- protokube:1.14.0-beta.2 | |
sizeBytes: 287898685 | |
- names: | |
- istio/kubectl@sha256:76c76dbed21c162dac9d6fa2337348eeaf5fb0f89a5c9857ff47f352cd6e82b4 | |
- istio/kubectl:1.3.5 | |
sizeBytes: 271562982 | |
- names: | |
- istio/pilot@sha256:17aefbe996d67e9fdf5dbba90bdcf030333a0832a34bc66469472ce61d2eed76 | |
- istio/pilot:1.3.5 | |
sizeBytes: 268531301 | |
- names: | |
- istio/sidecar_injector@sha256:484506534c3b1e7ef39575dbbc78b2a85457c5204e1d4a7e16e284c5a1cf0002 | |
- istio/sidecar_injector:1.3.5 | |
sizeBytes: 256818781 | |
- names: | |
- 602401143452.dkr.ecr.us-west-2.amazonaws.com/amazon-k8s-cni@sha256:81cd8a9d7ce75b2f7190296d5f9c43188d7e43e438a8e6dd11d36238ee36b5de | |
- 602401143452.dkr.ecr.us-west-2.amazonaws.com/amazon-k8s-cni:v1.5.0 | |
sizeBytes: 247322214 | |
- names: | |
- istio/proxyv2@sha256:9ba9de87d660767a2147f786040a8fe29ebb3b335742d3c95257ab82a33b8415 | |
- istio/proxyv2:1.4.0 | |
sizeBytes: 236743155 | |
- names: | |
- istio/kubectl@sha256:d62512cc4b10228512c86f63501b828b80c20e238452c429cfd62a9b9388cc54 | |
- istio/kubectl:1.4.0 | |
sizeBytes: 218715390 | |
- names: | |
- istio/galley@sha256:67f9f5321e6fefdf97e5406a047579a0fd04b576ad1c997e95a9db4dd2fbc6bc | |
- istio/galley:1.4.0 | |
sizeBytes: 212440743 | |
- names: | |
- istio/pilot@sha256:149357dc33f488eff0cc1edfb3329e72ea49614d52095770df543cbb8d60bcdb | |
- istio/pilot:1.4.0 | |
sizeBytes: 208430582 | |
- names: | |
- istio/node-agent-k8s@sha256:b3a169eb928e651bb0e9e40ed574d2c8cd1671a3b598c3c79458a63fd7cf398d | |
- istio/node-agent-k8s:1.4.0 | |
sizeBytes: 193009018 | |
- names: | |
- k8s.gcr.io/kube-proxy@sha256:e5c364dc75d816132bebf2d84b35518f0661fdeae39c686d92f9e5f9a07e96b9 | |
- k8s.gcr.io/kube-proxy:v1.14.6 | |
sizeBytes: 82106236 | |
- names: | |
- istio/mixer@sha256:b0b13e4311da022a1f67c85ffeb82d42567739c7156d2f644a66364b0c947fc4 | |
- istio/mixer:1.4.0 | |
sizeBytes: 80456256 | |
- names: | |
- gcr.io/gcp-compute-engine-223401/autoscaler-12c0fa24db31956a7cfa673210e4fa13@sha256:f74987342b3c7bcb8b95006f98a8efcfa19bd518430844df037cd5f29132c997 | |
sizeBytes: 65899235 | |
- names: | |
- gcr.io/gcp-compute-engine-223401/controller-f6fdb41c6acbc726e29a3104ff2ef720@sha256:7cde59d7e5e3f7891b57fb51ade68929b5220df54b70dc027a62018c54fe23d3 | |
sizeBytes: 59788477 | |
- names: | |
- gcr.io/gcp-compute-engine-223401/autoscaler-hpa-85c0b68178743d74ff7f663a72802ceb@sha256:24e81ede4cc223f0f70a1630fc4bed30308eb7b406715dbdd2280827f7565eec | |
sizeBytes: 58181702 | |
- names: | |
- gcr.io/gcp-compute-engine-223401/certmanager-f79b5bfeb092d099f0f3326024a30ebb@sha256:9f7622fd03d96c3262e71b4f6fb14455145041c81950b3efe10010c122974bed | |
sizeBytes: 58077460 | |
- names: | |
- gcr.io/gcp-compute-engine-223401/nscert-e3625dd01dcb901439f4630ab9789e75@sha256:77da0645be1369d0e56a1daa204da6de6661488eef5858a60dee9a052f02150c | |
sizeBytes: 56568040 | |
- names: | |
- gcr.io/gcp-compute-engine-223401/webhook-261c6506fca17bc41be50b3461f98f1c@sha256:012be54c7866cb8458fe96061f5321e519da7a4803809d912c2a670fff904ac6 | |
sizeBytes: 55354038 | |
- names: | |
- k8s.gcr.io/pause-amd64@sha256:163ac025575b775d1c0f9bf0bdd0f086883171eb475b5068e7defa4ca9e76516 | |
- k8s.gcr.io/pause-amd64:3.0 | |
sizeBytes: 746888 | |
nodeInfo: | |
architecture: amd64 | |
bootID: 5cc4af93-5a4d-4476-9e57-7413e83a0444 | |
containerRuntimeVersion: docker://18.6.3 | |
kernelVersion: 4.9.0-11-amd64 | |
kubeProxyVersion: v1.14.6 | |
kubeletVersion: v1.14.6 | |
machineID: ec21031918156b5eccab20d02c8221fe | |
operatingSystem: linux | |
osImage: Debian GNU/Linux 9 (stretch) | |
systemUUID: EC210319-1815-6B5E-CCAB-20D02C8221FE | |
- apiVersion: v1 | |
kind: Node | |
metadata: | |
annotations: | |
node.alpha.kubernetes.io/ttl: "0" | |
volumes.kubernetes.io/controller-managed-attach-detach: "true" | |
creationTimestamp: "2019-12-03T04:45:02Z" | |
labels: | |
beta.kubernetes.io/arch: amd64 | |
beta.kubernetes.io/instance-type: t3.large | |
beta.kubernetes.io/os: linux | |
failure-domain.beta.kubernetes.io/region: ap-southeast-1 | |
failure-domain.beta.kubernetes.io/zone: ap-southeast-1b | |
kops.k8s.io/instancegroup: nodes | |
kubernetes.io/arch: amd64 | |
kubernetes.io/hostname: ip-172-20-83-101.ap-southeast-1.compute.internal | |
kubernetes.io/os: linux | |
kubernetes.io/role: node | |
node-role.kubernetes.io/node: "" | |
name: ip-172-20-83-101.ap-southeast-1.compute.internal | |
resourceVersion: "61122" | |
selfLink: /api/v1/nodes/ip-172-20-83-101.ap-southeast-1.compute.internal | |
uid: aafe1a1b-1587-11ea-b5af-027e0b84da98 | |
spec: | |
podCIDR: 172.20.129.0/24 | |
providerID: aws:///ap-southeast-1b/i-0d393b2fa5cdc9ad4 | |
status: | |
addresses: | |
- address: 172.20.83.101 | |
type: InternalIP | |
- address: 13.229.237.26 | |
type: ExternalIP | |
- address: ip-172-20-83-101.ap-southeast-1.compute.internal | |
type: InternalDNS | |
- address: ec2-13-229-237-26.ap-southeast-1.compute.amazonaws.com | |
type: ExternalDNS | |
- address: ip-172-20-83-101.ap-southeast-1.compute.internal | |
type: Hostname | |
allocatable: | |
attachable-volumes-aws-ebs: "25" | |
cpu: "2" | |
ephemeral-storage: "115894266893" | |
hugepages-1Gi: "0" | |
hugepages-2Mi: "0" | |
memory: 7972780Ki | |
pods: "35" | |
capacity: | |
attachable-volumes-aws-ebs: "25" | |
cpu: "2" | |
ephemeral-storage: 125753328Ki | |
hugepages-1Gi: "0" | |
hugepages-2Mi: "0" | |
memory: 8075180Ki | |
pods: "35" | |
conditions: | |
- lastHeartbeatTime: "2019-12-03T13:19:44Z" | |
lastTransitionTime: "2019-12-03T04:45:02Z" | |
message: kubelet has sufficient memory available | |
reason: KubeletHasSufficientMemory | |
status: "False" | |
type: MemoryPressure | |
- lastHeartbeatTime: "2019-12-03T13:19:44Z" | |
lastTransitionTime: "2019-12-03T04:45:02Z" | |
message: kubelet has no disk pressure | |
reason: KubeletHasNoDiskPressure | |
status: "False" | |
type: DiskPressure | |
- lastHeartbeatTime: "2019-12-03T13:19:44Z" | |
lastTransitionTime: "2019-12-03T04:45:02Z" | |
message: kubelet has sufficient PID available | |
reason: KubeletHasSufficientPID | |
status: "False" | |
type: PIDPressure | |
- lastHeartbeatTime: "2019-12-03T13:19:44Z" | |
lastTransitionTime: "2019-12-03T04:45:22Z" | |
message: kubelet is posting ready status | |
reason: KubeletReady | |
status: "True" | |
type: Ready | |
daemonEndpoints: | |
kubeletEndpoint: | |
Port: 10250 | |
images: | |
- names: | |
- gcr.io/knative-samples/helloworld-go@sha256:5ea96ba4b872685ff4ddb5cd8d1a97ec18c18fae79ee8df0d29f446c5efe5f50 | |
sizeBytes: 780868439 | |
- names: | |
- istio/proxyv2@sha256:245b1b40003654e9a9e3757196fa3cb506439cf8c98792c1552300528d8aea14 | |
- istio/proxyv2:1.3.5 | |
sizeBytes: 295628711 | |
- names: | |
- protokube:1.14.0-beta.2 | |
sizeBytes: 287898685 | |
- names: | |
- istio/node-agent-k8s@sha256:0a18362538b10523fe2a302ca88e6edd206661658ee43b1bc9e7e671cd2dc0b9 | |
- istio/node-agent-k8s:1.3.5 | |
sizeBytes: 250162398 | |
- names: | |
- 602401143452.dkr.ecr.us-west-2.amazonaws.com/amazon-k8s-cni@sha256:81cd8a9d7ce75b2f7190296d5f9c43188d7e43e438a8e6dd11d36238ee36b5de | |
- 602401143452.dkr.ecr.us-west-2.amazonaws.com/amazon-k8s-cni:v1.5.0 | |
sizeBytes: 247322214 | |
- names: | |
- istio/proxyv2@sha256:9ba9de87d660767a2147f786040a8fe29ebb3b335742d3c95257ab82a33b8415 | |
- istio/proxyv2:1.4.0 | |
sizeBytes: 236743155 | |
- names: | |
- istio/pilot@sha256:149357dc33f488eff0cc1edfb3329e72ea49614d52095770df543cbb8d60bcdb | |
- istio/pilot:1.4.0 | |
sizeBytes: 208430582 | |
- names: | |
- istio/proxy_init@sha256:8278995c58eef8cd4ba32cb8756e2b93a09708e39fc9c0381e90c8a4fb62a042 | |
- istio/proxy_init:1.3.5 | |
sizeBytes: 193060005 | |
- names: | |
- istio/node-agent-k8s@sha256:b3a169eb928e651bb0e9e40ed574d2c8cd1671a3b598c3c79458a63fd7cf398d | |
- istio/node-agent-k8s:1.4.0 | |
sizeBytes: 193009018 | |
- names: | |
- k8s.gcr.io/kube-proxy@sha256:e5c364dc75d816132bebf2d84b35518f0661fdeae39c686d92f9e5f9a07e96b9 | |
- k8s.gcr.io/kube-proxy:v1.14.6 | |
sizeBytes: 82106236 | |
- names: | |
- istio/mixer@sha256:b0b13e4311da022a1f67c85ffeb82d42567739c7156d2f644a66364b0c947fc4 | |
- istio/mixer:1.4.0 | |
sizeBytes: 80456256 | |
- names: | |
- gcr.io/gcp-compute-engine-223401/autoscaler-12c0fa24db31956a7cfa673210e4fa13@sha256:f74987342b3c7bcb8b95006f98a8efcfa19bd518430844df037cd5f29132c997 | |
sizeBytes: 65899235 | |
- names: | |
- gcr.io/gcp-compute-engine-223401/autoscaler-hpa-85c0b68178743d74ff7f663a72802ceb@sha256:24e81ede4cc223f0f70a1630fc4bed30308eb7b406715dbdd2280827f7565eec | |
sizeBytes: 58181702 | |
- names: | |
- gcr.io/gcp-compute-engine-223401/istio-c58c0c8bb8ecc80f800bb788a425ae1d@sha256:ebdb4e8832e9574311494a31ea18dc63cf903e8dd7f0651d640eb2c7f252da2a | |
sizeBytes: 57052872 | |
- names: | |
- gcr.io/gcp-compute-engine-223401/webhook-261c6506fca17bc41be50b3461f98f1c@sha256:012be54c7866cb8458fe96061f5321e519da7a4803809d912c2a670fff904ac6 | |
sizeBytes: 55354038 | |
- names: | |
- k8s.gcr.io/k8s-dns-kube-dns-amd64@sha256:618a82fa66cf0c75e4753369a6999032372be7308866fc9afb381789b1e5ad52 | |
- k8s.gcr.io/k8s-dns-kube-dns-amd64:1.14.13 | |
sizeBytes: 51157394 | |
- names: | |
- gcr.io/gcp-compute-engine-223401/queue-39be6f1d08a095bd076a71d288d295b6@sha256:8adf8f990b4485e7ead4dc9e6f8ddb3a19142835de95386428deb9ffde8d20b2 | |
sizeBytes: 48155143 | |
- names: | |
- k8s.gcr.io/cluster-proportional-autoscaler-amd64@sha256:12370202895b621a2ac28226292e4578598f13c1502aa4d3ee90fff4325d9275 | |
- k8s.gcr.io/cluster-proportional-autoscaler-amd64:1.4.0 | |
sizeBytes: 45853555 | |
- names: | |
- k8s.gcr.io/k8s-dns-sidecar-amd64@sha256:cedc8fe2098dffc26d17f64061296b7aa54258a31513b6c52df271a98bb522b3 | |
- k8s.gcr.io/k8s-dns-sidecar-amd64:1.14.13 | |
sizeBytes: 42852039 | |
- names: | |
- k8s.gcr.io/k8s-dns-dnsmasq-nanny-amd64@sha256:45df3e8e0c551bd0c79cdba48ae6677f817971dcbd1eeed7fd1f9a35118410e4 | |
- k8s.gcr.io/k8s-dns-dnsmasq-nanny-amd64:1.14.13 | |
sizeBytes: 41372492 | |
- names: | |
- k8s.gcr.io/pause-amd64@sha256:163ac025575b775d1c0f9bf0bdd0f086883171eb475b5068e7defa4ca9e76516 | |
- k8s.gcr.io/pause-amd64:3.0 | |
sizeBytes: 746888 | |
nodeInfo: | |
architecture: amd64 | |
bootID: 76995eef-ea09-47f6-b7f6-55cf7da94ca8 | |
containerRuntimeVersion: docker://18.6.3 | |
kernelVersion: 4.9.0-11-amd64 | |
kubeProxyVersion: v1.14.6 | |
kubeletVersion: v1.14.6 | |
machineID: ec2f0a28f2ec7d60ccd651e152c481ad | |
operatingSystem: linux | |
osImage: Debian GNU/Linux 9 (stretch) | |
systemUUID: EC2F0A28-F2EC-7D60-CCD6-51E152C481AD | |
kind: List | |
metadata: | |
resourceVersion: "" | |
selfLink: "" | |
------- | |
resource: persistentvolumeclaims | |
------- | |
apiVersion: v1 | |
items: [] | |
kind: List | |
metadata: | |
resourceVersion: "" | |
selfLink: "" | |
------- | |
resource: persistentvolumes | |
------- | |
apiVersion: v1 | |
items: [] | |
kind: List | |
metadata: | |
resourceVersion: "" | |
selfLink: "" | |
------- | |
resource: pods | |
------- | |
apiVersion: v1 | |
items: | |
- apiVersion: v1 | |
kind: Pod | |
metadata: | |
annotations: | |
cluster-autoscaler.kubernetes.io/safe-to-evict: "false" | |
sidecar.istio.io/inject: "true" | |
sidecar.istio.io/status: '{"version":"d6d2e691ff879786254a5c797e939c32d5625625a3413203e0eb842ebf4ffbc3","initContainers":["istio-init"],"containers":["istio-proxy"],"volumes":["istio-envoy","istio-certs"],"imagePullSecrets":null}' | |
creationTimestamp: "2019-12-03T12:23:10Z" | |
generateName: activator-6f94df488- | |
labels: | |
app: activator | |
pod-template-hash: 6f94df488 | |
role: activator | |
security.istio.io/tlsMode: istio | |
serving.knative.dev/release: devel | |
name: activator-6f94df488-qtnbp | |
namespace: knative-serving | |
ownerReferences: | |
- apiVersion: apps/v1 | |
blockOwnerDeletion: true | |
controller: true | |
kind: ReplicaSet | |
name: activator-6f94df488 | |
uid: 437fd7fa-15bb-11ea-b5af-027e0b84da98 | |
resourceVersion: "55011" | |
selfLink: /api/v1/namespaces/knative-serving/pods/activator-6f94df488-qtnbp | |
uid: ab6353bf-15c7-11ea-b5af-027e0b84da98 | |
spec: | |
containers: | |
- env: | |
- name: POD_NAME | |
valueFrom: | |
fieldRef: | |
apiVersion: v1 | |
fieldPath: metadata.name | |
- name: POD_IP | |
valueFrom: | |
fieldRef: | |
apiVersion: v1 | |
fieldPath: status.podIP | |
- name: SYSTEM_NAMESPACE | |
valueFrom: | |
fieldRef: | |
apiVersion: v1 | |
fieldPath: metadata.namespace | |
- name: CONFIG_LOGGING_NAME | |
value: config-logging | |
- name: CONFIG_OBSERVABILITY_NAME | |
value: config-observability | |
- name: METRICS_DOMAIN | |
value: knative.dev/internal/serving | |
image: gcr.io/gcp-compute-engine-223401/activator-ecd51ca5034883acbe737fde417a3d86@sha256:b2257a5f6e2427a5a96f6ea9ca2b652ee648e131e9a699df6e20b4bcfa4ef940 | |
imagePullPolicy: IfNotPresent | |
livenessProbe: | |
failureThreshold: 3 | |
httpGet: | |
httpHeaders: | |
- name: k-kubelet-probe | |
value: activator | |
path: /healthz | |
port: 8012 | |
scheme: HTTP | |
periodSeconds: 10 | |
successThreshold: 1 | |
timeoutSeconds: 1 | |
name: activator | |
ports: | |
- containerPort: 8012 | |
name: http1 | |
protocol: TCP | |
- containerPort: 8013 | |
name: h2c | |
protocol: TCP | |
- containerPort: 9090 | |
name: metrics | |
protocol: TCP | |
- containerPort: 8008 | |
name: profiling | |
protocol: TCP | |
readinessProbe: | |
failureThreshold: 3 | |
httpGet: | |
httpHeaders: | |
- name: k-kubelet-probe | |
value: activator | |
path: /healthz | |
port: 8012 | |
scheme: HTTP | |
periodSeconds: 10 | |
successThreshold: 1 | |
timeoutSeconds: 1 | |
resources: | |
limits: | |
cpu: "1" | |
memory: 600Mi | |
requests: | |
cpu: 300m | |
memory: 60Mi | |
securityContext: | |
allowPrivilegeEscalation: false | |
terminationMessagePath: /dev/termination-log | |
terminationMessagePolicy: File | |
volumeMounts: | |
- mountPath: /var/run/secrets/kubernetes.io/serviceaccount | |
name: controller-token-6ldfw | |
readOnly: true | |
- args: | |
- proxy | |
- sidecar | |
- --domain | |
- $(POD_NAMESPACE).svc.cluster.local | |
- --configPath | |
- /etc/istio/proxy | |
- --binaryPath | |
- /usr/local/bin/envoy | |
- --serviceCluster | |
- activator.$(POD_NAMESPACE) | |
- --drainDuration | |
- 45s | |
- --parentShutdownDuration | |
- 1m0s | |
- --discoveryAddress | |
- istio-pilot.istio-system:15010 | |
- --zipkinAddress | |
- zipkin.istio-system:9411 | |
- --dnsRefreshRate | |
- 300s | |
- --connectTimeout | |
- 10s | |
- --proxyAdminPort | |
- "15000" | |
- --concurrency | |
- "2" | |
- --controlPlaneAuthPolicy | |
- NONE | |
- --statusPort | |
- "15020" | |
- --applicationPorts | |
- 8012,8013,9090,8008 | |
env: | |
- name: POD_NAME | |
valueFrom: | |
fieldRef: | |
apiVersion: v1 | |
fieldPath: metadata.name | |
- name: ISTIO_META_POD_PORTS | |
value: |- | |
[ | |
{"name":"http1","containerPort":8012,"protocol":"TCP"} | |
,{"name":"h2c","containerPort":8013,"protocol":"TCP"} | |
,{"name":"metrics","containerPort":9090,"protocol":"TCP"} | |
,{"name":"profiling","containerPort":8008,"protocol":"TCP"} | |
] | |
- name: ISTIO_META_CLUSTER_ID | |
value: Kubernetes | |
- name: POD_NAMESPACE | |
valueFrom: | |
fieldRef: | |
apiVersion: v1 | |
fieldPath: metadata.namespace | |
- name: INSTANCE_IP | |
valueFrom: | |
fieldRef: | |
apiVersion: v1 | |
fieldPath: status.podIP | |
- name: SERVICE_ACCOUNT | |
valueFrom: | |
fieldRef: | |
apiVersion: v1 | |
fieldPath: spec.serviceAccountName | |
- name: ISTIO_META_POD_NAME | |
valueFrom: | |
fieldRef: | |
apiVersion: v1 | |
fieldPath: metadata.name | |
- name: ISTIO_META_CONFIG_NAMESPACE | |
valueFrom: | |
fieldRef: | |
apiVersion: v1 | |
fieldPath: metadata.namespace | |
- name: SDS_ENABLED | |
value: "false" | |
- name: ISTIO_META_INTERCEPTION_MODE | |
value: REDIRECT | |
- name: ISTIO_META_INCLUDE_INBOUND_PORTS | |
value: 8012,8013,9090,8008 | |
- name: ISTIO_METAJSON_ANNOTATIONS | |
value: | | |
{"cluster-autoscaler.kubernetes.io/safe-to-evict":"false","sidecar.istio.io/inject":"true"} | |
- name: ISTIO_METAJSON_LABELS | |
value: | | |
{"app":"activator","pod-template-hash":"6f94df488","role":"activator","serving.knative.dev/release":"devel"} | |
- name: ISTIO_META_WORKLOAD_NAME | |
value: activator | |
- name: ISTIO_META_OWNER | |
value: kubernetes://apis/apps/v1/namespaces/knative-serving/deployments/activator | |
- name: TERMINATION_DRAIN_DURATION_SECONDS | |
value: "20" | |
image: docker.io/istio/proxyv2:1.4.0 | |
imagePullPolicy: IfNotPresent | |
name: istio-proxy | |
ports: | |
- containerPort: 15090 | |
name: http-envoy-prom | |
protocol: TCP | |
readinessProbe: | |
failureThreshold: 30 | |
httpGet: | |
path: /healthz/ready | |
port: 15020 | |
scheme: HTTP | |
initialDelaySeconds: 1 | |
periodSeconds: 2 | |
successThreshold: 1 | |
timeoutSeconds: 1 | |
resources: | |
limits: | |
cpu: "2" | |
memory: 1Gi | |
requests: | |
cpu: 100m | |
memory: 128Mi | |
securityContext: | |
readOnlyRootFilesystem: true | |
runAsUser: 1337 | |
terminationMessagePath: /dev/termination-log | |
terminationMessagePolicy: File | |
volumeMounts: | |
- mountPath: /etc/istio/proxy | |
name: istio-envoy | |
- mountPath: /etc/certs/ | |
name: istio-certs | |
readOnly: true | |
- mountPath: /var/run/secrets/kubernetes.io/serviceaccount | |
name: controller-token-6ldfw | |
readOnly: true | |
dnsPolicy: ClusterFirst | |
enableServiceLinks: true | |
initContainers: | |
- command: | |
- istio-iptables | |
- -p | |
- "15001" | |
- -z | |
- "15006" | |
- -u | |
- "1337" | |
- -m | |
- REDIRECT | |
- -i | |
- '*' | |
- -x | |
- "" | |
- -b | |
- '*' | |
- -d | |
- "15020" | |
image: docker.io/istio/proxyv2:1.4.0 | |
imagePullPolicy: IfNotPresent | |
name: istio-init | |
resources: | |
limits: | |
cpu: 100m | |
memory: 50Mi | |
requests: | |
cpu: 10m | |
memory: 10Mi | |
securityContext: | |
capabilities: | |
add: | |
- NET_ADMIN | |
runAsNonRoot: false | |
runAsUser: 0 | |
terminationMessagePath: /dev/termination-log | |
terminationMessagePolicy: File | |
nodeName: ip-172-20-40-226.ap-southeast-1.compute.internal | |
priority: 0 | |
restartPolicy: Always | |
schedulerName: default-scheduler | |
securityContext: {} | |
serviceAccount: controller | |
serviceAccountName: controller | |
terminationGracePeriodSeconds: 300 | |
tolerations: | |
- effect: NoExecute | |
key: node.kubernetes.io/not-ready | |
operator: Exists | |
tolerationSeconds: 300 | |
- effect: NoExecute | |
key: node.kubernetes.io/unreachable | |
operator: Exists | |
tolerationSeconds: 300 | |
volumes: | |
- name: controller-token-6ldfw | |
secret: | |
defaultMode: 420 | |
secretName: controller-token-6ldfw | |
- emptyDir: | |
medium: Memory | |
name: istio-envoy | |
- name: istio-certs | |
secret: | |
defaultMode: 420 | |
optional: true | |
secretName: istio.controller | |
status: | |
conditions: | |
- lastProbeTime: null | |
lastTransitionTime: "2019-12-03T12:23:12Z" | |
status: "True" | |
type: Initialized | |
- lastProbeTime: null | |
lastTransitionTime: "2019-12-03T12:24:09Z" | |
status: "True" | |
type: Ready | |
- lastProbeTime: null | |
lastTransitionTime: "2019-12-03T12:24:09Z" | |
status: "True" | |
type: ContainersReady | |
- lastProbeTime: null | |
lastTransitionTime: "2019-12-03T12:23:10Z" | |
status: "True" | |
type: PodScheduled | |
containerStatuses: | |
- containerID: docker://aba476d3165a455a66d79903d2d69bcbc22da7039dcd22f2bedec0cbada6e034 | |
image: sha256:b4574127ffce77ed7dbed16b7546d75edd1f9f3ed6ee1485e38f5fb8dcda242a | |
imageID: docker-pullable://gcr.io/gcp-compute-engine-223401/activator-ecd51ca5034883acbe737fde417a3d86@sha256:b2257a5f6e2427a5a96f6ea9ca2b652ee648e131e9a699df6e20b4bcfa4ef940 | |
lastState: | |
terminated: | |
containerID: docker://a0143e05121b8d22381efde842205eaf6d6b104653496cc3ad9ac04fa687cbed | |
exitCode: 0 | |
finishedAt: "2019-12-03T12:24:08Z" | |
reason: Completed | |
startedAt: "2019-12-03T12:23:12Z" | |
name: activator | |
ready: true | |
restartCount: 1 | |
state: | |
running: | |
startedAt: "2019-12-03T12:24:09Z" | |
- containerID: docker://3de36e92a6dd6adb093bd4e184c5904c4632611b36363c90f9b4f4c7fbe53694 | |
image: istio/proxyv2:1.4.0 | |
imageID: docker-pullable://istio/proxyv2@sha256:9ba9de87d660767a2147f786040a8fe29ebb3b335742d3c95257ab82a33b8415 | |
lastState: {} | |
name: istio-proxy | |
ready: true | |
restartCount: 0 | |
state: | |
running: | |
startedAt: "2019-12-03T12:23:12Z" | |
hostIP: 172.20.40.226 | |
initContainerStatuses: | |
- containerID: docker://bea44ccd48c9be93df6b58f5fb17a8cd22972c7940c238b9ecec3516136ebc16 | |
image: istio/proxyv2:1.4.0 | |
imageID: docker-pullable://istio/proxyv2@sha256:9ba9de87d660767a2147f786040a8fe29ebb3b335742d3c95257ab82a33b8415 | |
lastState: {} | |
name: istio-init | |
ready: true | |
restartCount: 0 | |
state: | |
terminated: | |
containerID: docker://bea44ccd48c9be93df6b58f5fb17a8cd22972c7940c238b9ecec3516136ebc16 | |
exitCode: 0 | |
finishedAt: "2019-12-03T12:23:11Z" | |
reason: Completed | |
startedAt: "2019-12-03T12:23:11Z" | |
phase: Running | |
podIP: 172.20.46.102 | |
qosClass: Burstable | |
startTime: "2019-12-03T12:23:10Z" | |
- apiVersion: v1 | |
kind: Pod | |
metadata: | |
annotations: | |
cluster-autoscaler.kubernetes.io/safe-to-evict: "false" | |
sidecar.istio.io/inject: "true" | |
sidecar.istio.io/status: '{"version":"d6d2e691ff879786254a5c797e939c32d5625625a3413203e0eb842ebf4ffbc3","initContainers":["istio-init"],"containers":["istio-proxy"],"volumes":["istio-envoy","istio-certs"],"imagePullSecrets":null}' | |
traffic.sidecar.istio.io/includeInboundPorts: 8080,9090 | |
creationTimestamp: "2019-12-03T12:23:10Z" | |
generateName: autoscaler-698bf65564- | |
labels: | |
app: autoscaler | |
pod-template-hash: 698bf65564 | |
security.istio.io/tlsMode: istio | |
serving.knative.dev/release: devel | |
name: autoscaler-698bf65564-fkfwb | |
namespace: knative-serving | |
ownerReferences: | |
- apiVersion: apps/v1 | |
blockOwnerDeletion: true | |
controller: true | |
kind: ReplicaSet | |
name: autoscaler-698bf65564 | |
uid: 4443a853-15bb-11ea-b5af-027e0b84da98 | |
resourceVersion: "54913" | |
selfLink: /api/v1/namespaces/knative-serving/pods/autoscaler-698bf65564-fkfwb | |
uid: ab70f95e-15c7-11ea-b5af-027e0b84da98 | |
spec: | |
containers: | |
- args: | |
- --secure-port=8443 | |
- --cert-dir=/tmp | |
env: | |
- name: SYSTEM_NAMESPACE | |
valueFrom: | |
fieldRef: | |
apiVersion: v1 | |
fieldPath: metadata.namespace | |
- name: CONFIG_LOGGING_NAME | |
value: config-logging | |
- name: CONFIG_OBSERVABILITY_NAME | |
value: config-observability | |
- name: METRICS_DOMAIN | |
value: knative.dev/serving | |
image: gcr.io/gcp-compute-engine-223401/autoscaler-12c0fa24db31956a7cfa673210e4fa13@sha256:f74987342b3c7bcb8b95006f98a8efcfa19bd518430844df037cd5f29132c997 | |
imagePullPolicy: IfNotPresent | |
livenessProbe: | |
failureThreshold: 3 | |
httpGet: | |
httpHeaders: | |
- name: k-kubelet-probe | |
value: autoscaler | |
path: /healthz | |
port: 8080 | |
scheme: HTTP | |
periodSeconds: 10 | |
successThreshold: 1 | |
timeoutSeconds: 1 | |
name: autoscaler | |
ports: | |
- containerPort: 8080 | |
name: websocket | |
protocol: TCP | |
- containerPort: 9090 | |
name: metrics | |
protocol: TCP | |
- containerPort: 8443 | |
name: custom-metrics | |
protocol: TCP | |
- containerPort: 8008 | |
name: profiling | |
protocol: TCP | |
readinessProbe: | |
failureThreshold: 3 | |
httpGet: | |
httpHeaders: | |
- name: k-kubelet-probe | |
value: autoscaler | |
path: /healthz | |
port: 8080 | |
scheme: HTTP | |
periodSeconds: 10 | |
successThreshold: 1 | |
timeoutSeconds: 1 | |
resources: | |
limits: | |
cpu: 300m | |
memory: 400Mi | |
requests: | |
cpu: 30m | |
memory: 40Mi | |
securityContext: | |
allowPrivilegeEscalation: false | |
terminationMessagePath: /dev/termination-log | |
terminationMessagePolicy: File | |
volumeMounts: | |
- mountPath: /var/run/secrets/kubernetes.io/serviceaccount | |
name: controller-token-6ldfw | |
readOnly: true | |
- args: | |
- proxy | |
- sidecar | |
- --domain | |
- $(POD_NAMESPACE).svc.cluster.local | |
- --configPath | |
- /etc/istio/proxy | |
- --binaryPath | |
- /usr/local/bin/envoy | |
- --serviceCluster | |
- autoscaler.$(POD_NAMESPACE) | |
- --drainDuration | |
- 45s | |
- --parentShutdownDuration | |
- 1m0s | |
- --discoveryAddress | |
- istio-pilot.istio-system:15010 | |
- --zipkinAddress | |
- zipkin.istio-system:9411 | |
- --dnsRefreshRate | |
- 300s | |
- --connectTimeout | |
- 10s | |
- --proxyAdminPort | |
- "15000" | |
- --concurrency | |
- "2" | |
- --controlPlaneAuthPolicy | |
- NONE | |
- --statusPort | |
- "15020" | |
- --applicationPorts | |
- 8080,9090,8443,8008 | |
env: | |
- name: POD_NAME | |
valueFrom: | |
fieldRef: | |
apiVersion: v1 | |
fieldPath: metadata.name | |
- name: ISTIO_META_POD_PORTS | |
value: |- | |
[ | |
{"name":"websocket","containerPort":8080,"protocol":"TCP"} | |
,{"name":"metrics","containerPort":9090,"protocol":"TCP"} | |
,{"name":"custom-metrics","containerPort":8443,"protocol":"TCP"} | |
,{"name":"profiling","containerPort":8008,"protocol":"TCP"} | |
] | |
- name: ISTIO_META_CLUSTER_ID | |
value: Kubernetes | |
- name: POD_NAMESPACE | |
valueFrom: | |
fieldRef: | |
apiVersion: v1 | |
fieldPath: metadata.namespace | |
- name: INSTANCE_IP | |
valueFrom: | |
fieldRef: | |
apiVersion: v1 | |
fieldPath: status.podIP | |
- name: SERVICE_ACCOUNT | |
valueFrom: | |
fieldRef: | |
apiVersion: v1 | |
fieldPath: spec.serviceAccountName | |
- name: ISTIO_META_POD_NAME | |
valueFrom: | |
fieldRef: | |
apiVersion: v1 | |
fieldPath: metadata.name | |
- name: ISTIO_META_CONFIG_NAMESPACE | |
valueFrom: | |
fieldRef: | |
apiVersion: v1 | |
fieldPath: metadata.namespace | |
- name: SDS_ENABLED | |
value: "false" | |
- name: ISTIO_META_INTERCEPTION_MODE | |
value: REDIRECT | |
- name: ISTIO_META_INCLUDE_INBOUND_PORTS | |
value: 8080,9090 | |
- name: ISTIO_METAJSON_ANNOTATIONS | |
value: | | |
{"cluster-autoscaler.kubernetes.io/safe-to-evict":"false","sidecar.istio.io/inject":"true","traffic.sidecar.istio.io/includeInboundPorts":"8080,9090"} | |
- name: ISTIO_METAJSON_LABELS | |
value: | | |
{"app":"autoscaler","pod-template-hash":"698bf65564","serving.knative.dev/release":"devel"} | |
- name: ISTIO_META_WORKLOAD_NAME | |
value: autoscaler | |
- name: ISTIO_META_OWNER | |
value: kubernetes://apis/apps/v1/namespaces/knative-serving/deployments/autoscaler | |
- name: TERMINATION_DRAIN_DURATION_SECONDS | |
value: "20" | |
image: docker.io/istio/proxyv2:1.4.0 | |
imagePullPolicy: IfNotPresent | |
name: istio-proxy | |
ports: | |
- containerPort: 15090 | |
name: http-envoy-prom | |
protocol: TCP | |
readinessProbe: | |
failureThreshold: 30 | |
httpGet: | |
path: /healthz/ready | |
port: 15020 | |
scheme: HTTP | |
initialDelaySeconds: 1 | |
periodSeconds: 2 | |
successThreshold: 1 | |
timeoutSeconds: 1 | |
resources: | |
limits: | |
cpu: "2" | |
memory: 1Gi | |
requests: | |
cpu: 100m | |
memory: 128Mi | |
securityContext: | |
readOnlyRootFilesystem: true | |
runAsUser: 1337 | |
terminationMessagePath: /dev/termination-log | |
terminationMessagePolicy: File | |
volumeMounts: | |
- mountPath: /etc/istio/proxy | |
name: istio-envoy | |
- mountPath: /etc/certs/ | |
name: istio-certs | |
readOnly: true | |
- mountPath: /var/run/secrets/kubernetes.io/serviceaccount | |
name: controller-token-6ldfw | |
readOnly: true | |
dnsPolicy: ClusterFirst | |
enableServiceLinks: true | |
initContainers: | |
- command: | |
- istio-iptables | |
- -p | |
- "15001" | |
- -z | |
- "15006" | |
- -u | |
- "1337" | |
- -m | |
- REDIRECT | |
- -i | |
- '*' | |
- -x | |
- "" | |
- -b | |
- 8080,9090 | |
- -d | |
- "15020" | |
image: docker.io/istio/proxyv2:1.4.0 | |
imagePullPolicy: IfNotPresent | |
name: istio-init | |
resources: | |
limits: | |
cpu: 100m | |
memory: 50Mi | |
requests: | |
cpu: 10m | |
memory: 10Mi | |
securityContext: | |
capabilities: | |
add: | |
- NET_ADMIN | |
runAsNonRoot: false | |
runAsUser: 0 | |
terminationMessagePath: /dev/termination-log | |
terminationMessagePolicy: File | |
nodeName: ip-172-20-67-65.ap-southeast-1.compute.internal | |
priority: 0 | |
restartPolicy: Always | |
schedulerName: default-scheduler | |
securityContext: {} | |
serviceAccount: controller | |
serviceAccountName: controller | |
terminationGracePeriodSeconds: 30 | |
tolerations: | |
- effect: NoExecute | |
key: node.kubernetes.io/not-ready | |
operator: Exists | |
tolerationSeconds: 300 | |
- effect: NoExecute | |
key: node.kubernetes.io/unreachable | |
operator: Exists | |
tolerationSeconds: 300 | |
volumes: | |
- name: controller-token-6ldfw | |
secret: | |
defaultMode: 420 | |
secretName: controller-token-6ldfw | |
- emptyDir: | |
medium: Memory | |
name: istio-envoy | |
- name: istio-certs | |
secret: | |
defaultMode: 420 | |
optional: true | |
secretName: istio.controller | |
status: | |
conditions: | |
- lastProbeTime: null | |
lastTransitionTime: "2019-12-03T12:23:12Z" | |
status: "True" | |
type: Initialized | |
- lastProbeTime: null | |
lastTransitionTime: "2019-12-03T12:23:43Z" | |
status: "True" | |
type: Ready | |
- lastProbeTime: null | |
lastTransitionTime: "2019-12-03T12:23:43Z" | |
status: "True" | |
type: ContainersReady | |
- lastProbeTime: null | |
lastTransitionTime: "2019-12-03T12:23:10Z" | |
status: "True" | |
type: PodScheduled | |
containerStatuses: | |
- containerID: docker://7dc16eff668b241e7cfe11aadf22846847651aa58abcf13361cc22bf7810b543 | |
image: sha256:14f7ffeac0bdfe097674441edab896de19c827aa7db11085d58e1808ecc0c439 | |
imageID: docker-pullable://gcr.io/gcp-compute-engine-223401/autoscaler-12c0fa24db31956a7cfa673210e4fa13@sha256:f74987342b3c7bcb8b95006f98a8efcfa19bd518430844df037cd5f29132c997 | |
lastState: | |
terminated: | |
containerID: docker://311c102253a3bb21733a18818638c0e8658629139c4ab0d1ad1997703bd68ab2 | |
exitCode: 1 | |
finishedAt: "2019-12-03T12:23:18Z" | |
reason: Error | |
startedAt: "2019-12-03T12:23:18Z" | |
name: autoscaler | |
ready: true | |
restartCount: 2 | |
state: | |
running: | |
startedAt: "2019-12-03T12:23:39Z" | |
- containerID: docker://c56cef68b866a1d4cb251735f8b9bfbf25643ac35469f8bc6274e3dfe8565c1c | |
image: istio/proxyv2:1.4.0 | |
imageID: docker-pullable://istio/proxyv2@sha256:9ba9de87d660767a2147f786040a8fe29ebb3b335742d3c95257ab82a33b8415 | |
lastState: {} | |
name: istio-proxy | |
ready: true | |
restartCount: 0 | |
state: | |
running: | |
startedAt: "2019-12-03T12:23:17Z" | |
hostIP: 172.20.67.65 | |
initContainerStatuses: | |
- containerID: docker://7843768503f05e42d6cead55a0005debb547ee7bf76b41c738697244eede08a1 | |
image: istio/proxyv2:1.4.0 | |
imageID: docker-pullable://istio/proxyv2@sha256:9ba9de87d660767a2147f786040a8fe29ebb3b335742d3c95257ab82a33b8415 | |
lastState: {} | |
name: istio-init | |
ready: true | |
restartCount: 0 | |
state: | |
terminated: | |
containerID: docker://7843768503f05e42d6cead55a0005debb547ee7bf76b41c738697244eede08a1 | |
exitCode: 0 | |
finishedAt: "2019-12-03T12:23:12Z" | |
reason: Completed | |
startedAt: "2019-12-03T12:23:12Z" | |
phase: Running | |
podIP: 172.20.81.64 | |
qosClass: Burstable | |
startTime: "2019-12-03T12:23:10Z" | |
- apiVersion: v1 | |
kind: Pod | |
metadata: | |
annotations: | |
sidecar.istio.io/inject: "false" | |
creationTimestamp: "2019-12-03T12:23:10Z" | |
generateName: autoscaler-hpa-555cf99b79- | |
labels: | |
app: autoscaler-hpa | |
pod-template-hash: 555cf99b79 | |
serving.knative.dev/release: devel | |
name: autoscaler-hpa-555cf99b79-fc2j5 | |
namespace: knative-serving | |
ownerReferences: | |
- apiVersion: apps/v1 | |
blockOwnerDeletion: true | |
controller: true | |
kind: ReplicaSet | |
name: autoscaler-hpa-555cf99b79 | |
uid: 43f57444-15bb-11ea-b5af-027e0b84da98 | |
resourceVersion: "54623" | |
selfLink: /api/v1/namespaces/knative-serving/pods/autoscaler-hpa-555cf99b79-fc2j5 | |
uid: ab7b3a04-15c7-11ea-b5af-027e0b84da98 | |
spec: | |
containers: | |
- env: | |
- name: SYSTEM_NAMESPACE | |
valueFrom: | |
fieldRef: | |
apiVersion: v1 | |
fieldPath: metadata.namespace | |
- name: CONFIG_LOGGING_NAME | |
value: config-logging | |
- name: CONFIG_OBSERVABILITY_NAME | |
value: config-observability | |
- name: METRICS_DOMAIN | |
value: knative.dev/serving | |
image: gcr.io/gcp-compute-engine-223401/autoscaler-hpa-85c0b68178743d74ff7f663a72802ceb@sha256:24e81ede4cc223f0f70a1630fc4bed30308eb7b406715dbdd2280827f7565eec | |
imagePullPolicy: IfNotPresent | |
name: autoscaler-hpa | |
ports: | |
- containerPort: 9090 | |
name: metrics | |
protocol: TCP | |
- containerPort: 8008 | |
name: profiling | |
protocol: TCP | |
resources: | |
limits: | |
cpu: "1" | |
memory: 1000Mi | |
requests: | |
cpu: 100m | |
memory: 100Mi | |
securityContext: | |
allowPrivilegeEscalation: false | |
terminationMessagePath: /dev/termination-log | |
terminationMessagePolicy: File | |
volumeMounts: | |
- mountPath: /var/run/secrets/kubernetes.io/serviceaccount | |
name: controller-token-6ldfw | |
readOnly: true | |
dnsPolicy: ClusterFirst | |
enableServiceLinks: true | |
nodeName: ip-172-20-83-101.ap-southeast-1.compute.internal | |
priority: 0 | |
restartPolicy: Always | |
schedulerName: default-scheduler | |
securityContext: {} | |
serviceAccount: controller | |
serviceAccountName: controller | |
terminationGracePeriodSeconds: 30 | |
tolerations: | |
- effect: NoExecute | |
key: node.kubernetes.io/not-ready | |
operator: Exists | |
tolerationSeconds: 300 | |
- effect: NoExecute | |
key: node.kubernetes.io/unreachable | |
operator: Exists | |
tolerationSeconds: 300 | |
volumes: | |
- name: controller-token-6ldfw | |
secret: | |
defaultMode: 420 | |
secretName: controller-token-6ldfw | |
status: | |
conditions: | |
- lastProbeTime: null | |
lastTransitionTime: "2019-12-03T12:23:10Z" | |
status: "True" | |
type: Initialized | |
- lastProbeTime: null | |
lastTransitionTime: "2019-12-03T12:23:16Z" | |
status: "True" | |
type: Ready | |
- lastProbeTime: null | |
lastTransitionTime: "2019-12-03T12:23:16Z" | |
status: "True" | |
type: ContainersReady | |
- lastProbeTime: null | |
lastTransitionTime: "2019-12-03T12:23:10Z" | |
status: "True" | |
type: PodScheduled | |
containerStatuses: | |
- containerID: docker://24aed521ae531a25b64ff6b82c2a3751e4cb959c870403363b80aedebc2e87b4 | |
image: gcr.io/gcp-compute-engine-223401/autoscaler-hpa-85c0b68178743d74ff7f663a72802ceb@sha256:24e81ede4cc223f0f70a1630fc4bed30308eb7b406715dbdd2280827f7565eec | |
imageID: docker-pullable://gcr.io/gcp-compute-engine-223401/autoscaler-hpa-85c0b68178743d74ff7f663a72802ceb@sha256:24e81ede4cc223f0f70a1630fc4bed30308eb7b406715dbdd2280827f7565eec | |
lastState: {} | |
name: autoscaler-hpa | |
ready: true | |
restartCount: 0 | |
state: | |
running: | |
startedAt: "2019-12-03T12:23:16Z" | |
hostIP: 172.20.83.101 | |
phase: Running | |
podIP: 172.20.64.107 | |
qosClass: Burstable | |
startTime: "2019-12-03T12:23:10Z" | |
- apiVersion: v1 | |
kind: Pod | |
metadata: | |
annotations: | |
sidecar.istio.io/inject: "false" | |
creationTimestamp: "2019-12-03T12:23:10Z" | |
generateName: controller-7667dd8fcb- | |
labels: | |
app: controller | |
pod-template-hash: 7667dd8fcb | |
serving.knative.dev/release: devel | |
name: controller-7667dd8fcb-tdhhj | |
namespace: knative-serving | |
ownerReferences: | |
- apiVersion: apps/v1 | |
blockOwnerDeletion: true | |
controller: true | |
kind: ReplicaSet | |
name: controller-7667dd8fcb | |
uid: 4622381c-15bb-11ea-b5af-027e0b84da98 | |
resourceVersion: "54607" | |
selfLink: /api/v1/namespaces/knative-serving/pods/controller-7667dd8fcb-tdhhj | |
uid: ab89550a-15c7-11ea-b5af-027e0b84da98 | |
spec: | |
containers: | |
- env: | |
- name: SYSTEM_NAMESPACE | |
valueFrom: | |
fieldRef: | |
apiVersion: v1 | |
fieldPath: metadata.namespace | |
- name: CONFIG_LOGGING_NAME | |
value: config-logging | |
- name: CONFIG_OBSERVABILITY_NAME | |
value: config-observability | |
- name: METRICS_DOMAIN | |
value: knative.dev/internal/serving | |
image: gcr.io/gcp-compute-engine-223401/controller-f6fdb41c6acbc726e29a3104ff2ef720@sha256:7cde59d7e5e3f7891b57fb51ade68929b5220df54b70dc027a62018c54fe23d3 | |
imagePullPolicy: IfNotPresent | |
name: controller | |
ports: | |
- containerPort: 9090 | |
name: metrics | |
protocol: TCP | |
- containerPort: 8008 | |
name: profiling | |
protocol: TCP | |
resources: | |
limits: | |
cpu: "1" | |
memory: 1000Mi | |
requests: | |
cpu: 100m | |
memory: 100Mi | |
securityContext: | |
allowPrivilegeEscalation: false | |
terminationMessagePath: /dev/termination-log | |
terminationMessagePolicy: File | |
volumeMounts: | |
- mountPath: /var/run/secrets/kubernetes.io/serviceaccount | |
name: controller-token-6ldfw | |
readOnly: true | |
dnsPolicy: ClusterFirst | |
enableServiceLinks: true | |
nodeName: ip-172-20-67-65.ap-southeast-1.compute.internal | |
priority: 0 | |
restartPolicy: Always | |
schedulerName: default-scheduler | |
securityContext: {} | |
serviceAccount: controller | |
serviceAccountName: controller | |
terminationGracePeriodSeconds: 30 | |
tolerations: | |
- effect: NoExecute | |
key: node.kubernetes.io/not-ready | |
operator: Exists | |
tolerationSeconds: 300 | |
- effect: NoExecute | |
key: node.kubernetes.io/unreachable | |
operator: Exists | |
tolerationSeconds: 300 | |
volumes: | |
- name: controller-token-6ldfw | |
secret: | |
defaultMode: 420 | |
secretName: controller-token-6ldfw | |
status: | |
conditions: | |
- lastProbeTime: null | |
lastTransitionTime: "2019-12-03T12:23:10Z" | |
status: "True" | |
type: Initialized | |
- lastProbeTime: null | |
lastTransitionTime: "2019-12-03T12:23:12Z" | |
status: "True" | |
type: Ready | |
- lastProbeTime: null | |
lastTransitionTime: "2019-12-03T12:23:12Z" | |
status: "True" | |
type: ContainersReady | |
- lastProbeTime: null | |
lastTransitionTime: "2019-12-03T12:23:10Z" | |
status: "True" | |
type: PodScheduled | |
containerStatuses: | |
- containerID: docker://753c308462d50446dadc36b85985ca0d2ba593fdc7ed8f2beac8996a39b90c80 | |
image: sha256:51761c5434c781a5eea6de3733822ed6a6f146d312e3d75ff0472c902e8421f1 | |
imageID: docker-pullable://gcr.io/gcp-compute-engine-223401/controller-f6fdb41c6acbc726e29a3104ff2ef720@sha256:7cde59d7e5e3f7891b57fb51ade68929b5220df54b70dc027a62018c54fe23d3 | |
lastState: {} | |
name: controller | |
ready: true | |
restartCount: 0 | |
state: | |
running: | |
startedAt: "2019-12-03T12:23:12Z" | |
hostIP: 172.20.67.65 | |
phase: Running | |
podIP: 172.20.84.222 | |
qosClass: Burstable | |
startTime: "2019-12-03T12:23:10Z" | |
- apiVersion: v1 | |
kind: Pod | |
metadata: | |
annotations: | |
sidecar.istio.io/inject: "false" | |
creationTimestamp: "2019-12-03T12:23:10Z" | |
generateName: default-domain- | |
labels: | |
controller-uid: a5ff6ccf-15bb-11ea-b5af-027e0b84da98 | |
job-name: default-domain | |
name: default-domain-kq9j8 | |
namespace: knative-serving | |
ownerReferences: | |
- apiVersion: batch/v1 | |
blockOwnerDeletion: true | |
controller: true | |
kind: Job | |
name: default-domain | |
uid: a5ff6ccf-15bb-11ea-b5af-027e0b84da98 | |
resourceVersion: "60692" | |
selfLink: /api/v1/namespaces/knative-serving/pods/default-domain-kq9j8 | |
uid: ab991eec-15c7-11ea-b5af-027e0b84da98 | |
spec: | |
containers: | |
- args: | |
- -magic-dns=xip.io | |
env: | |
- name: SYSTEM_NAMESPACE | |
valueFrom: | |
fieldRef: | |
apiVersion: v1 | |
fieldPath: metadata.namespace | |
image: knative.dev/serving/cmd/default-domain | |
imagePullPolicy: Always | |
name: default-domain | |
resources: {} | |
terminationMessagePath: /dev/termination-log | |
terminationMessagePolicy: File | |
volumeMounts: | |
- mountPath: /etc/config-domain | |
name: config-domain | |
- mountPath: /etc/config-istio | |
name: config-istio | |
- mountPath: /var/run/secrets/kubernetes.io/serviceaccount | |
name: controller-token-6ldfw | |
readOnly: true | |
dnsPolicy: ClusterFirst | |
enableServiceLinks: true | |
nodeName: ip-172-20-83-101.ap-southeast-1.compute.internal | |
priority: 0 | |
restartPolicy: Never | |
schedulerName: default-scheduler | |
securityContext: {} | |
serviceAccount: controller | |
serviceAccountName: controller | |
terminationGracePeriodSeconds: 30 | |
tolerations: | |
- effect: NoExecute | |
key: node.kubernetes.io/not-ready | |
operator: Exists | |
tolerationSeconds: 300 | |
- effect: NoExecute | |
key: node.kubernetes.io/unreachable | |
operator: Exists | |
tolerationSeconds: 300 | |
volumes: | |
- configMap: | |
defaultMode: 420 | |
name: config-domain | |
name: config-domain | |
- configMap: | |
defaultMode: 420 | |
name: config-istio | |
name: config-istio | |
- name: controller-token-6ldfw | |
secret: | |
defaultMode: 420 | |
secretName: controller-token-6ldfw | |
status: | |
conditions: | |
- lastProbeTime: null | |
lastTransitionTime: "2019-12-03T12:23:10Z" | |
status: "True" | |
type: Initialized | |
- lastProbeTime: null | |
lastTransitionTime: "2019-12-03T12:23:10Z" | |
message: 'containers with unready status: [default-domain]' | |
reason: ContainersNotReady | |
status: "False" | |
type: Ready | |
- lastProbeTime: null | |
lastTransitionTime: "2019-12-03T12:23:10Z" | |
message: 'containers with unready status: [default-domain]' | |
reason: ContainersNotReady | |
status: "False" | |
type: ContainersReady | |
- lastProbeTime: null | |
lastTransitionTime: "2019-12-03T12:23:10Z" | |
status: "True" | |
type: PodScheduled | |
containerStatuses: | |
- image: knative.dev/serving/cmd/default-domain | |
imageID: "" | |
lastState: {} | |
name: default-domain | |
ready: false | |
restartCount: 0 | |
state: | |
waiting: | |
message: Back-off pulling image "knative.dev/serving/cmd/default-domain" | |
reason: ImagePullBackOff | |
hostIP: 172.20.83.101 | |
phase: Pending | |
podIP: 172.20.94.190 | |
qosClass: BestEffort | |
startTime: "2019-12-03T12:23:10Z" | |
- apiVersion: v1 | |
kind: Pod | |
metadata: | |
annotations: | |
sidecar.istio.io/inject: "false" | |
creationTimestamp: "2019-12-03T12:23:11Z" | |
generateName: networking-certmanager-6794bcc848- | |
labels: | |
app: networking-certmanager | |
pod-template-hash: 6794bcc848 | |
serving.knative.dev/release: devel | |
name: networking-certmanager-6794bcc848-rbkjk | |
namespace: knative-serving | |
ownerReferences: | |
- apiVersion: apps/v1 | |
blockOwnerDeletion: true | |
controller: true | |
kind: ReplicaSet | |
name: networking-certmanager-6794bcc848 | |
uid: 46666167-15bb-11ea-b5af-027e0b84da98 | |
resourceVersion: "54591" | |
selfLink: /api/v1/namespaces/knative-serving/pods/networking-certmanager-6794bcc848-rbkjk | |
uid: aba43145-15c7-11ea-b5af-027e0b84da98 | |
spec: | |
containers: | |
- env: | |
- name: SYSTEM_NAMESPACE | |
valueFrom: | |
fieldRef: | |
apiVersion: v1 | |
fieldPath: metadata.namespace | |
- name: CONFIG_LOGGING_NAME | |
value: config-logging | |
- name: CONFIG_OBSERVABILITY_NAME | |
value: config-observability | |
- name: METRICS_DOMAIN | |
value: knative.dev/serving | |
image: gcr.io/gcp-compute-engine-223401/certmanager-f79b5bfeb092d099f0f3326024a30ebb@sha256:9f7622fd03d96c3262e71b4f6fb14455145041c81950b3efe10010c122974bed | |
imagePullPolicy: IfNotPresent | |
name: networking-certmanager | |
ports: | |
- containerPort: 9090 | |
name: metrics | |
protocol: TCP | |
- containerPort: 8008 | |
name: profiling | |
protocol: TCP | |
resources: | |
limits: | |
cpu: "1" | |
memory: 1000Mi | |
requests: | |
cpu: 100m | |
memory: 100Mi | |
securityContext: | |
allowPrivilegeEscalation: false | |
terminationMessagePath: /dev/termination-log | |
terminationMessagePolicy: File | |
volumeMounts: | |
- mountPath: /var/run/secrets/kubernetes.io/serviceaccount | |
name: controller-token-6ldfw | |
readOnly: true | |
dnsPolicy: ClusterFirst | |
enableServiceLinks: true | |
nodeName: ip-172-20-44-180.ap-southeast-1.compute.internal | |
priority: 0 | |
restartPolicy: Always | |
schedulerName: default-scheduler | |
securityContext: {} | |
serviceAccount: controller | |
serviceAccountName: controller | |
terminationGracePeriodSeconds: 30 | |
tolerations: | |
- effect: NoExecute | |
key: node.kubernetes.io/not-ready | |
operator: Exists | |
tolerationSeconds: 300 | |
- effect: NoExecute | |
key: node.kubernetes.io/unreachable | |
operator: Exists | |
tolerationSeconds: 300 | |
volumes: | |
- name: controller-token-6ldfw | |
secret: | |
defaultMode: 420 | |
secretName: controller-token-6ldfw | |
status: | |
conditions: | |
- lastProbeTime: null | |
lastTransitionTime: "2019-12-03T12:23:11Z" | |
status: "True" | |
type: Initialized | |
- lastProbeTime: null | |
lastTransitionTime: "2019-12-03T12:23:12Z" | |
status: "True" | |
type: Ready | |
- lastProbeTime: null | |
lastTransitionTime: "2019-12-03T12:23:12Z" | |
status: "True" | |
type: ContainersReady | |
- lastProbeTime: null | |
lastTransitionTime: "2019-12-03T12:23:11Z" | |
status: "True" | |
type: PodScheduled | |
containerStatuses: | |
- containerID: docker://67c500458f6bb3f2af76568baa1d0596e48a0587cda739ba8b4086d15aa44db3 | |
image: sha256:f8ece729bafb701ff374b8c1d83eb65130e9d62476c090413b780c7708595703 | |
imageID: docker-pullable://gcr.io/gcp-compute-engine-223401/certmanager-f79b5bfeb092d099f0f3326024a30ebb@sha256:9f7622fd03d96c3262e71b4f6fb14455145041c81950b3efe10010c122974bed | |
lastState: {} | |
name: networking-certmanager | |
ready: true | |
restartCount: 0 | |
state: | |
running: | |
startedAt: "2019-12-03T12:23:12Z" | |
hostIP: 172.20.44.180 | |
phase: Running | |
podIP: 172.20.48.30 | |
qosClass: Burstable | |
startTime: "2019-12-03T12:23:11Z" | |
- apiVersion: v1 | |
kind: Pod | |
metadata: | |
annotations: | |
sidecar.istio.io/inject: "false" | |
creationTimestamp: "2019-12-03T12:23:11Z" | |
generateName: networking-istio-6854cd95ff- | |
labels: | |
app: networking-istio | |
pod-template-hash: 6854cd95ff | |
serving.knative.dev/release: devel | |
name: networking-istio-6854cd95ff-zhdv2 | |
namespace: knative-serving | |
ownerReferences: | |
- apiVersion: apps/v1 | |
blockOwnerDeletion: true | |
controller: true | |
kind: ReplicaSet | |
name: networking-istio-6854cd95ff | |
uid: 468ebdf0-15bb-11ea-b5af-027e0b84da98 | |
resourceVersion: "54652" | |
selfLink: /api/v1/namespaces/knative-serving/pods/networking-istio-6854cd95ff-zhdv2 | |
uid: abb15132-15c7-11ea-b5af-027e0b84da98 | |
spec: | |
containers: | |
- env: | |
- name: SYSTEM_NAMESPACE | |
valueFrom: | |
fieldRef: | |
apiVersion: v1 | |
fieldPath: metadata.namespace | |
- name: CONFIG_LOGGING_NAME | |
value: config-logging | |
- name: CONFIG_OBSERVABILITY_NAME | |
value: config-observability | |
- name: METRICS_DOMAIN | |
value: knative.dev/serving | |
image: gcr.io/gcp-compute-engine-223401/istio-c58c0c8bb8ecc80f800bb788a425ae1d@sha256:ebdb4e8832e9574311494a31ea18dc63cf903e8dd7f0651d640eb2c7f252da2a | |
imagePullPolicy: IfNotPresent | |
name: networking-istio | |
ports: | |
- containerPort: 9090 | |
name: metrics | |
protocol: TCP | |
- containerPort: 8008 | |
name: profiling | |
protocol: TCP | |
resources: | |
limits: | |
cpu: "1" | |
memory: 1000Mi | |
requests: | |
cpu: 100m | |
memory: 100Mi | |
securityContext: | |
allowPrivilegeEscalation: false | |
terminationMessagePath: /dev/termination-log | |
terminationMessagePolicy: File | |
volumeMounts: | |
- mountPath: /var/run/secrets/kubernetes.io/serviceaccount | |
name: controller-token-6ldfw | |
readOnly: true | |
dnsPolicy: ClusterFirst | |
enableServiceLinks: true | |
nodeName: ip-172-20-83-101.ap-southeast-1.compute.internal | |
priority: 0 | |
restartPolicy: Always | |
schedulerName: default-scheduler | |
securityContext: {} | |
serviceAccount: controller | |
serviceAccountName: controller | |
terminationGracePeriodSeconds: 30 | |
tolerations: | |
- effect: NoExecute | |
key: node.kubernetes.io/not-ready | |
operator: Exists | |
tolerationSeconds: 300 | |
- effect: NoExecute | |
key: node.kubernetes.io/unreachable | |
operator: Exists | |
tolerationSeconds: 300 | |
volumes: | |
- name: controller-token-6ldfw | |
secret: | |
defaultMode: 420 | |
secretName: controller-token-6ldfw | |
status: | |
conditions: | |
- lastProbeTime: null | |
lastTransitionTime: "2019-12-03T12:23:11Z" | |
status: "True" | |
type: Initialized | |
- lastProbeTime: null | |
lastTransitionTime: "2019-12-03T12:23:21Z" | |
status: "True" | |
type: Ready | |
- lastProbeTime: null | |
lastTransitionTime: "2019-12-03T12:23:21Z" | |
status: "True" | |
type: ContainersReady | |
- lastProbeTime: null | |
lastTransitionTime: "2019-12-03T12:23:11Z" | |
status: "True" | |
type: PodScheduled | |
containerStatuses: | |
- containerID: docker://822b3ea090e85d0144a5165658fa514dfaee1c3cfc1e9bb92886f8007a2061eb | |
image: gcr.io/gcp-compute-engine-223401/istio-c58c0c8bb8ecc80f800bb788a425ae1d@sha256:ebdb4e8832e9574311494a31ea18dc63cf903e8dd7f0651d640eb2c7f252da2a | |
imageID: docker-pullable://gcr.io/gcp-compute-engine-223401/istio-c58c0c8bb8ecc80f800bb788a425ae1d@sha256:ebdb4e8832e9574311494a31ea18dc63cf903e8dd7f0651d640eb2c7f252da2a | |
lastState: {} | |
name: networking-istio | |
ready: true | |
restartCount: 0 | |
state: | |
running: | |
startedAt: "2019-12-03T12:23:21Z" | |
hostIP: 172.20.83.101 | |
phase: Running | |
podIP: 172.20.82.183 | |
qosClass: Burstable | |
startTime: "2019-12-03T12:23:11Z" | |
- apiVersion: v1 | |
kind: Pod | |
metadata: | |
annotations: | |
sidecar.istio.io/inject: "false" | |
creationTimestamp: "2019-12-03T12:23:11Z" | |
generateName: networking-ns-cert-55d77c7656- | |
labels: | |
app: networking-ns-cert | |
pod-template-hash: 55d77c7656 | |
name: networking-ns-cert-55d77c7656-6vfgb | |
namespace: knative-serving | |
ownerReferences: | |
- apiVersion: apps/v1 | |
blockOwnerDeletion: true | |
controller: true | |
kind: ReplicaSet | |
name: networking-ns-cert-55d77c7656 | |
uid: 46bcdcda-15bb-11ea-b5af-027e0b84da98 | |
resourceVersion: "54594" | |
selfLink: /api/v1/namespaces/knative-serving/pods/networking-ns-cert-55d77c7656-6vfgb | |
uid: abbe4876-15c7-11ea-b5af-027e0b84da98 | |
spec: | |
containers: | |
- env: | |
- name: SYSTEM_NAMESPACE | |
valueFrom: | |
fieldRef: | |
apiVersion: v1 | |
fieldPath: metadata.namespace | |
- name: CONFIG_LOGGING_NAME | |
value: config-logging | |
- name: CONFIG_OBSERVABILITY_NAME | |
value: config-observability | |
- name: METRICS_DOMAIN | |
value: knative.dev/serving | |
image: gcr.io/gcp-compute-engine-223401/nscert-e3625dd01dcb901439f4630ab9789e75@sha256:77da0645be1369d0e56a1daa204da6de6661488eef5858a60dee9a052f02150c | |
imagePullPolicy: IfNotPresent | |
name: networking-nscert | |
ports: | |
- containerPort: 9090 | |
name: metrics | |
protocol: TCP | |
resources: | |
limits: | |
cpu: "1" | |
memory: 1000Mi | |
requests: | |
cpu: 100m | |
memory: 100Mi | |
securityContext: | |
allowPrivilegeEscalation: false | |
terminationMessagePath: /dev/termination-log | |
terminationMessagePolicy: File | |
volumeMounts: | |
- mountPath: /var/run/secrets/kubernetes.io/serviceaccount | |
name: controller-token-6ldfw | |
readOnly: true | |
dnsPolicy: ClusterFirst | |
enableServiceLinks: true | |
nodeName: ip-172-20-67-65.ap-southeast-1.compute.internal | |
priority: 0 | |
restartPolicy: Always | |
schedulerName: default-scheduler | |
securityContext: {} | |
serviceAccount: controller | |
serviceAccountName: controller | |
terminationGracePeriodSeconds: 30 | |
tolerations: | |
- effect: NoExecute | |
key: node.kubernetes.io/not-ready | |
operator: Exists | |
tolerationSeconds: 300 | |
- effect: NoExecute | |
key: node.kubernetes.io/unreachable | |
operator: Exists | |
tolerationSeconds: 300 | |
volumes: | |
- name: controller-token-6ldfw | |
secret: | |
defaultMode: 420 | |
secretName: controller-token-6ldfw | |
status: | |
conditions: | |
- lastProbeTime: null | |
lastTransitionTime: "2019-12-03T12:23:11Z" | |
status: "True" | |
type: Initialized | |
- lastProbeTime: null | |
lastTransitionTime: "2019-12-03T12:23:12Z" | |
status: "True" | |
type: Ready | |
- lastProbeTime: null | |
lastTransitionTime: "2019-12-03T12:23:12Z" | |
status: "True" | |
type: ContainersReady | |
- lastProbeTime: null | |
lastTransitionTime: "2019-12-03T12:23:11Z" | |
status: "True" | |
type: PodScheduled | |
containerStatuses: | |
- containerID: docker://965c28a75414ea9f4e3e3781921f419725385277def20ad75d5d8fc42a6444aa | |
image: sha256:87558c626772a52dc8b1b4e86332616063a262fdcd971525a171c9f6b4e08fda | |
imageID: docker-pullable://gcr.io/gcp-compute-engine-223401/nscert-e3625dd01dcb901439f4630ab9789e75@sha256:77da0645be1369d0e56a1daa204da6de6661488eef5858a60dee9a052f02150c | |
lastState: {} | |
name: networking-nscert | |
ready: true | |
restartCount: 0 | |
state: | |
running: | |
startedAt: "2019-12-03T12:23:12Z" | |
hostIP: 172.20.67.65 | |
phase: Running | |
podIP: 172.20.84.73 | |
qosClass: Burstable | |
startTime: "2019-12-03T12:23:11Z" | |
- apiVersion: v1 | |
kind: Pod | |
metadata: | |
annotations: | |
cluster-autoscaler.kubernetes.io/safe-to-evict: "false" | |
sidecar.istio.io/inject: "false" | |
creationTimestamp: "2019-12-03T12:23:11Z" | |
generateName: webhook-54c85dd7d9- | |
labels: | |
app: webhook | |
pod-template-hash: 54c85dd7d9 | |
role: webhook | |
serving.knative.dev/release: devel | |
name: webhook-54c85dd7d9-q9852 | |
namespace: knative-serving | |
ownerReferences: | |
- apiVersion: apps/v1 | |
blockOwnerDeletion: true | |
controller: true | |
kind: ReplicaSet | |
name: webhook-54c85dd7d9 | |
uid: 46e1eccb-15bb-11ea-b5af-027e0b84da98 | |
resourceVersion: "54616" | |
selfLink: /api/v1/namespaces/knative-serving/pods/webhook-54c85dd7d9-q9852 | |
uid: abcae38b-15c7-11ea-b5af-027e0b84da98 | |
spec: | |
containers: | |
- env: | |
- name: SYSTEM_NAMESPACE | |
valueFrom: | |
fieldRef: | |
apiVersion: v1 | |
fieldPath: metadata.namespace | |
- name: CONFIG_LOGGING_NAME | |
value: config-logging | |
- name: CONFIG_OBSERVABILITY_NAME | |
value: config-observability | |
- name: METRICS_DOMAIN | |
value: knative.dev/serving | |
image: gcr.io/gcp-compute-engine-223401/webhook-261c6506fca17bc41be50b3461f98f1c@sha256:012be54c7866cb8458fe96061f5321e519da7a4803809d912c2a670fff904ac6 | |
imagePullPolicy: IfNotPresent | |
name: webhook | |
ports: | |
- containerPort: 9090 | |
name: metrics | |
protocol: TCP | |
- containerPort: 8008 | |
name: profiling | |
protocol: TCP | |
resources: | |
limits: | |
cpu: 200m | |
memory: 200Mi | |
requests: | |
cpu: 20m | |
memory: 20Mi | |
securityContext: | |
allowPrivilegeEscalation: false | |
terminationMessagePath: /dev/termination-log | |
terminationMessagePolicy: File | |
volumeMounts: | |
- mountPath: /var/run/secrets/kubernetes.io/serviceaccount | |
name: controller-token-6ldfw | |
readOnly: true | |
dnsPolicy: ClusterFirst | |
enableServiceLinks: true | |
nodeName: ip-172-20-40-226.ap-southeast-1.compute.internal | |
priority: 0 | |
restartPolicy: Always | |
schedulerName: default-scheduler | |
securityContext: {} | |
serviceAccount: controller | |
serviceAccountName: controller | |
terminationGracePeriodSeconds: 30 | |
tolerations: | |
- effect: NoExecute | |
key: node.kubernetes.io/not-ready | |
operator: Exists | |
tolerationSeconds: 300 | |
- effect: NoExecute | |
key: node.kubernetes.io/unreachable | |
operator: Exists | |
tolerationSeconds: 300 | |
volumes: | |
- name: controller-token-6ldfw | |
secret: | |
defaultMode: 420 | |
secretName: controller-token-6ldfw | |
status: | |
conditions: | |
- lastProbeTime: null | |
lastTransitionTime: "2019-12-03T12:23:11Z" | |
status: "True" | |
type: Initialized | |
- lastProbeTime: null | |
lastTransitionTime: "2019-12-03T12:23:15Z" | |
status: "True" | |
type: Ready | |
- lastProbeTime: null | |
lastTransitionTime: "2019-12-03T12:23:15Z" | |
status: "True" | |
type: ContainersReady | |
- lastProbeTime: null | |
lastTransitionTime: "2019-12-03T12:23:11Z" | |
status: "True" | |
type: PodScheduled | |
containerStatuses: | |
- containerID: docker://e2cf4a3c3a6a976e997224bdf31c058fd6180d98b9d2325c56d69a17df0c167c | |
image: gcr.io/gcp-compute-engine-223401/webhook-261c6506fca17bc41be50b3461f98f1c@sha256:012be54c7866cb8458fe96061f5321e519da7a4803809d912c2a670fff904ac6 | |
imageID: docker-pullable://gcr.io/gcp-compute-engine-223401/webhook-261c6506fca17bc41be50b3461f98f1c@sha256:012be54c7866cb8458fe96061f5321e519da7a4803809d912c2a670fff904ac6 | |
lastState: {} | |
name: webhook | |
ready: true | |
restartCount: 0 | |
state: | |
running: | |
startedAt: "2019-12-03T12:23:14Z" | |
hostIP: 172.20.40.226 | |
phase: Running | |
podIP: 172.20.43.115 | |
qosClass: Burstable | |
startTime: "2019-12-03T12:23:11Z" | |
kind: List | |
metadata: | |
resourceVersion: "" | |
selfLink: "" | |
------- | |
resource: podtemplates | |
------- | |
apiVersion: v1 | |
items: [] | |
kind: List | |
metadata: | |
resourceVersion: "" | |
selfLink: "" | |
------- | |
resource: replicationcontrollers | |
------- | |
apiVersion: v1 | |
items: [] | |
kind: List | |
metadata: | |
resourceVersion: "" | |
selfLink: "" | |
------- | |
resource: resourcequotas | |
------- | |
apiVersion: v1 | |
items: [] | |
kind: List | |
metadata: | |
resourceVersion: "" | |
selfLink: "" | |
------- | |
resource: secrets | |
------- | |
apiVersion: v1 | |
items: | |
- apiVersion: v1 | |
data: | |
ca.crt: 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 | |
namespace: a25hdGl2ZS1zZXJ2aW5n | |
token: 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 | |
kind: Secret | |
metadata: | |
annotations: | |
kubernetes.io/service-account.name: controller | |
kubernetes.io/service-account.uid: 39b51358-15bb-11ea-b5af-027e0b84da98 | |
creationTimestamp: "2019-12-03T10:54:05Z" | |
name: controller-token-6ldfw | |
namespace: knative-serving | |
resourceVersion: "43805" | |
selfLink: /api/v1/namespaces/knative-serving/secrets/controller-token-6ldfw | |
uid: 39b63041-15bb-11ea-b5af-027e0b84da98 | |
type: kubernetes.io/service-account-token | |
- apiVersion: v1 | |
data: | |
ca.crt: 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 | |
namespace: a25hdGl2ZS1zZXJ2aW5n | |
token: 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 | |
kind: Secret | |
metadata: | |
annotations: | |
kubernetes.io/service-account.name: default | |
kubernetes.io/service-account.uid: 387199ff-15bb-11ea-b5af-027e0b84da98 | |
creationTimestamp: "2019-12-03T10:54:03Z" | |
name: default-token-vckjr | |
namespace: knative-serving | |
resourceVersion: "43773" | |
selfLink: /api/v1/namespaces/knative-serving/secrets/default-token-vckjr | |
uid: 38738d21-15bb-11ea-b5af-027e0b84da98 | |
type: kubernetes.io/service-account-token | |
- apiVersion: v1 | |
data: | |
cert-chain.pem: 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 | |
key.pem: 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 | |
root-cert.pem: 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 | |
kind: Secret | |
metadata: | |
annotations: | |
istio.io/service-account.name: controller | |
creationTimestamp: "2019-12-03T10:54:06Z" | |
name: istio.controller | |
namespace: knative-serving | |
resourceVersion: "43807" | |
selfLink: /api/v1/namespaces/knative-serving/secrets/istio.controller | |
uid: 39c0b025-15bb-11ea-b5af-027e0b84da98 | |
type: istio.io/key-and-cert | |
- apiVersion: v1 | |
data: | |
cert-chain.pem: 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 | |
key.pem: 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 | |
root-cert.pem: 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 | |
kind: Secret | |
metadata: | |
annotations: | |
istio.io/service-account.name: default | |
creationTimestamp: "2019-12-03T10:54:04Z" | |
name: istio.default | |
namespace: knative-serving | |
resourceVersion: "43779" | |
selfLink: /api/v1/namespaces/knative-serving/secrets/istio.default | |
uid: 38b4bc18-15bb-11ea-b5af-027e0b84da98 | |
type: istio.io/key-and-cert | |
- apiVersion: v1 | |
data: | |
ca-cert.pem: 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 | |
server-cert.pem: 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 | |
server-key.pem: LS0tLS1CRUdJTiBSU0EgUFJJVkFURSBLRVktLS0tLQpNSUlFcFFJQkFBS0NBUUVBcEhUR0tXNkJSWWhQemhqVWxUQW5vbFR4ZmdaUDRFS0xVWFVXV05NQ1NNL0trT3E2CjRwSmJRVkQ5b1owSjFpSFRsemRzRjBCVnpvZjhWWkJ6QmtEZzJmMDk3bUV1Ym9lalRDWDl1aEM5RHlaRWJPUW8KNmpTK1JDL3NSaUFxM21JOFppY1BlL3F0NjUyekxpZng1UGd4dnFyNjFITDdVbC9xUytJOHJxeE9ORDBzR0l4OApnUlZWRnhIaTNVVWwya011SGZQMWRISmxMK1FHZ0FmVUxwNFRYL2wwd0tnTENPK0UweFZaR1JlTXI1UTVZS0RiCjZrNTlWSUFaTWcwRXNqNTdwaGU4TWxsVEhrZDEzUGNzWC9Lc1JaZTRQRnQ2ZVlvK2JJVitYRDFaL1Y2VDlrR0QKYkZKRE5NUm1US0MrTmNKdk5XaTNXa09lSy9wMmJKYXV1OWt3WVFJREFRQUJBb0lCQVFDQ2kydXVBZGsrRDhtQgp5WFllZ3g1REh2aWYySFRaaVJrOGJSeHpIL1VGUldVQUNrU1ZqQ1pDUC85RnBmbmo3L0FkYmxJd1Z0S0dZcTNzCllnRGNxdTJTUFJOSFFmOXduOTBCbW5yQmszM3dJNmxYWXZvVGlCQ3M0Zm5GWk0yQ3dDby8wS3ZhOTQvTm85NVQKT2tRclJOV0FEQXVXVHp1dkZSSlFjR05KS04vZldKWDJnZmd0RGNpQ3BZYXdCbmNFVmRtSERXbmxmYVFNTHFBbwpBTkErMEFoQm96Q2NWNnNUOWJFSHdzTklpeFlNcG5yd2V3THZJY2N0L0Z1MFp5RTEwSmxrNDE5VEd4c1hZQ0lYCjdPM01sSW8wREkxbkUwMUF2M295dnFxWjVQZHU0N2xpYnBFOU9NeCtvd2I5clNLYWw4RDQrQ1lJeVRFMFRRemwKVzQ3aHpnUE5Bb0dCQU5DbDA5bDZ1WmlkSG5CNit4WXdJRGplRmlmdXl0SzFZRnBFZ0JYVDlpNkpheXdNdlYreApocHpiRkpQNGcrem9LcUFCeFl6M3lWTk1obXMyTEc0dzRrRlFEaHluODFCcFhKVUdoc0s4TmJWU09penRjbjFHCk9tUmxhWE9VMVc0dXAwNTlhSmgzNkZUV0lnL3hzYm0vb21qbk9nM1hXV0ViQStzV1kxeksvNjByQW9HQkFNbkgKZUNVaUlkSERGeEtPZVNzejg3TEhSN0Rsem11SHorNG80QkZOZXpFdGV6YmJaQWxNUzJ1T2E5THhrZ1dkQlhEdApCRTFvQ2FEY3VsQ1JFeXYzMVBZTklERy9nTElWMFpvckZwek11UC9kU3B4NnBnWWFJMDdWaHZkMkxjT3Aya2hBCmFPWm9xMzBmY252QUpxcWdkbmVoVTBFQzc1OCs0amNQTXhGa1BzcWpBb0dBR0pUQXphbG92ak1jaC9IbExPc0UKa002Ulc2a0ZXaWVtTDF4TW5zVzNCaXFJWnNzbGNHV3d6ei84UDZhU25GR0ozQW41WlM4NEY4azNPT0JNQWJ0ZQpuSVU2OUdOUkJoTXpwaGI3djJ0L0JGcW9vZXhqaGFERmRsaUFRTzZ5Nm1VeXJzdVZqQWpzWlRwSkR3blJmMm0xClQ1aVdQVlUyb1hzV1RoYjRJOUdDcDdzQ2dZRUFwdzEvaUs2emRTaWhSM214RTNXVmd5TzlWTlZOaW5VTVRzNkUKZzQ2ME9VakFRL0JxNTgvRWVTMldVelF3Z25rM2NnQ29tVFZURTF6cTI1emdWSHlBVVowWVZGZUp3dWFSZTZQRQp1dGc3S1lvYUpXYmRZUnZ1czJ2UXE3dXBzOTVCbTZQSHRVcGUvOTR6T0FVamZnd1BTSWZGbDROSXczeWFhSjhxCjFuRTZFeVVDZ1lFQXJFRGIrWTIrUUxjc01BaUd6aWxQVCtYUjZ4UmVOc0ZEczFXUmFKbGRjTFkvWFpIamQvQVUKVTkxUVkvSkY1S2Z6WXB6Ukd0RXZxT0tSSVJId1FJWVBjZVhzM2dLbWRaOTNuL2d5aWs0bmlCeWhSRS9xUlZCQwp3azZWWkpLL0JyR0NOWGxIQ3JQNFlXcVBIYkxpTUt2RzhHVmVzS3FRZUx3TDNrSm0vcVdIUUZZPQotLS0tLUVORCBSU0EgUFJJVkFURSBLRVktLS0tLQo= | |
kind: Secret | |
metadata: | |
annotations: | |
kubectl.kubernetes.io/last-applied-configuration: | | |
{"apiVersion":"v1","kind":"Secret","metadata":{"annotations":{},"labels":{"serving.knative.dev/release":"devel"},"name":"webhook-certs","namespace":"knative-serving"}} | |
creationTimestamp: "2019-12-03T10:54:10Z" | |
labels: | |
serving.knative.dev/release: devel | |
name: webhook-certs | |
namespace: knative-serving | |
resourceVersion: "44066" | |
selfLink: /api/v1/namespaces/knative-serving/secrets/webhook-certs | |
uid: 3c5999dc-15bb-11ea-b5af-027e0b84da98 | |
type: Opaque | |
kind: List | |
metadata: | |
resourceVersion: "" | |
selfLink: "" | |
------- | |
resource: serviceaccounts | |
------- | |
apiVersion: v1 | |
items: | |
- apiVersion: v1 | |
kind: ServiceAccount | |
metadata: | |
annotations: | |
kubectl.kubernetes.io/last-applied-configuration: | | |
{"apiVersion":"v1","kind":"ServiceAccount","metadata":{"annotations":{},"labels":{"serving.knative.dev/release":"devel"},"name":"controller","namespace":"knative-serving"}} | |
creationTimestamp: "2019-12-03T10:54:05Z" | |
labels: | |
serving.knative.dev/release: devel | |
name: controller | |
namespace: knative-serving | |
resourceVersion: "43806" | |
selfLink: /api/v1/namespaces/knative-serving/serviceaccounts/controller | |
uid: 39b51358-15bb-11ea-b5af-027e0b84da98 | |
secrets: | |
- name: controller-token-6ldfw | |
- apiVersion: v1 | |
kind: ServiceAccount | |
metadata: | |
creationTimestamp: "2019-12-03T10:54:03Z" | |
name: default | |
namespace: knative-serving | |
resourceVersion: "43774" | |
selfLink: /api/v1/namespaces/knative-serving/serviceaccounts/default | |
uid: 387199ff-15bb-11ea-b5af-027e0b84da98 | |
secrets: | |
- name: default-token-vckjr | |
kind: List | |
metadata: | |
resourceVersion: "" | |
selfLink: "" | |
------- | |
resource: services | |
------- | |
apiVersion: v1 | |
items: | |
- apiVersion: v1 | |
kind: Service | |
metadata: | |
annotations: | |
kubectl.kubernetes.io/last-applied-configuration: | | |
{"apiVersion":"v1","kind":"Service","metadata":{"annotations":{},"labels":{"app":"activator","serving.knative.dev/release":"devel"},"name":"activator-service","namespace":"knative-serving"},"spec":{"ports":[{"name":"http","port":80,"protocol":"TCP","targetPort":8012},{"name":"http2","port":81,"protocol":"TCP","targetPort":8013},{"name":"http-metrics","port":9090,"protocol":"TCP","targetPort":9090}],"selector":{"app":"activator"},"type":"ClusterIP"}} | |
creationTimestamp: "2019-12-03T10:54:09Z" | |
labels: | |
app: activator | |
serving.knative.dev/release: devel | |
name: activator-service | |
namespace: knative-serving | |
resourceVersion: "43860" | |
selfLink: /api/v1/namespaces/knative-serving/services/activator-service | |
uid: 3b8d1462-15bb-11ea-b5af-027e0b84da98 | |
spec: | |
clusterIP: 172.20.6.32 | |
ports: | |
- name: http | |
port: 80 | |
protocol: TCP | |
targetPort: 8012 | |
- name: http2 | |
port: 81 | |
protocol: TCP | |
targetPort: 8013 | |
- name: http-metrics | |
port: 9090 | |
protocol: TCP | |
targetPort: 9090 | |
selector: | |
app: activator | |
sessionAffinity: None | |
type: ClusterIP | |
status: | |
loadBalancer: {} | |
- apiVersion: v1 | |
kind: Service | |
metadata: | |
annotations: | |
kubectl.kubernetes.io/last-applied-configuration: | | |
{"apiVersion":"v1","kind":"Service","metadata":{"annotations":{},"labels":{"app":"autoscaler","serving.knative.dev/release":"devel"},"name":"autoscaler","namespace":"knative-serving"},"spec":{"ports":[{"name":"http","port":8080,"protocol":"TCP","targetPort":8080},{"name":"http-metrics","port":9090,"protocol":"TCP","targetPort":9090},{"name":"https-custom-metrics","port":443,"protocol":"TCP","targetPort":8443}],"selector":{"app":"autoscaler"}}} | |
creationTimestamp: "2019-12-03T10:54:23Z" | |
labels: | |
app: autoscaler | |
serving.knative.dev/release: devel | |
name: autoscaler | |
namespace: knative-serving | |
resourceVersion: "43931" | |
selfLink: /api/v1/namespaces/knative-serving/services/autoscaler | |
uid: 441a8315-15bb-11ea-b5af-027e0b84da98 | |
spec: | |
clusterIP: 172.20.27.123 | |
ports: | |
- name: http | |
port: 8080 | |
protocol: TCP | |
targetPort: 8080 | |
- name: http-metrics | |
port: 9090 | |
protocol: TCP | |
targetPort: 9090 | |
- name: https-custom-metrics | |
port: 443 | |
protocol: TCP | |
targetPort: 8443 | |
selector: | |
app: autoscaler | |
sessionAffinity: None | |
type: ClusterIP | |
status: | |
loadBalancer: {} | |
- apiVersion: v1 | |
kind: Service | |
metadata: | |
annotations: | |
kubectl.kubernetes.io/last-applied-configuration: | | |
{"apiVersion":"v1","kind":"Service","metadata":{"annotations":{},"labels":{"app":"controller","serving.knative.dev/release":"devel"},"name":"controller","namespace":"knative-serving"},"spec":{"ports":[{"name":"http-metrics","port":9090,"protocol":"TCP","targetPort":9090}],"selector":{"app":"controller"}}} | |
creationTimestamp: "2019-12-03T10:54:09Z" | |
labels: | |
app: controller | |
serving.knative.dev/release: devel | |
name: controller | |
namespace: knative-serving | |
resourceVersion: "43863" | |
selfLink: /api/v1/namespaces/knative-serving/services/controller | |
uid: 3bb69e26-15bb-11ea-b5af-027e0b84da98 | |
spec: | |
clusterIP: 172.20.6.148 | |
ports: | |
- name: http-metrics | |
port: 9090 | |
protocol: TCP | |
targetPort: 9090 | |
selector: | |
app: controller | |
sessionAffinity: None | |
type: ClusterIP | |
status: | |
loadBalancer: {} | |
- apiVersion: v1 | |
kind: Service | |
metadata: | |
annotations: | |
kubectl.kubernetes.io/last-applied-configuration: | | |
{"apiVersion":"v1","kind":"Service","metadata":{"annotations":{},"labels":{"role":"webhook","serving.knative.dev/release":"devel"},"name":"webhook","namespace":"knative-serving"},"spec":{"ports":[{"name":"https-webhook","port":443,"targetPort":8443}],"selector":{"role":"webhook"}}} | |
creationTimestamp: "2019-12-03T10:54:09Z" | |
labels: | |
role: webhook | |
serving.knative.dev/release: devel | |
name: webhook | |
namespace: knative-serving | |
resourceVersion: "43866" | |
selfLink: /api/v1/namespaces/knative-serving/services/webhook | |
uid: 3bdc1dda-15bb-11ea-b5af-027e0b84da98 | |
spec: | |
clusterIP: 172.20.19.88 | |
ports: | |
- name: https-webhook | |
port: 443 | |
protocol: TCP | |
targetPort: 8443 | |
selector: | |
role: webhook | |
sessionAffinity: None | |
type: ClusterIP | |
status: | |
loadBalancer: {} | |
kind: List | |
metadata: | |
resourceVersion: "" | |
selfLink: "" | |
------- | |
resource: mutatingwebhookconfigurations | |
------- | |
apiVersion: v1 | |
items: | |
- apiVersion: admissionregistration.k8s.io/v1beta1 | |
kind: MutatingWebhookConfiguration | |
metadata: | |
annotations: | |
kubectl.kubernetes.io/last-applied-configuration: | | |
{"apiVersion":"admissionregistration.k8s.io/v1beta1","kind":"MutatingWebhookConfiguration","metadata":{"annotations":{},"labels":{"app":"sidecarInjectorWebhook","chart":"sidecarInjectorWebhook","heritage":"Tiller","release":"RELEASE-NAME"},"name":"istio-sidecar-injector"},"webhooks":[{"clientConfig":{"caBundle":"","service":{"name":"istio-sidecar-injector","namespace":"istio-system","path":"/inject"}},"failurePolicy":"Fail","name":"sidecar-injector.istio.io","namespaceSelector":{"matchExpressions":[{"key":"name","operator":"NotIn","values":["istio-system"]},{"key":"istio-injection","operator":"NotIn","values":["disabled"]}]},"rules":[{"apiGroups":[""],"apiVersions":["v1"],"operations":["CREATE"],"resources":["pods"]}]}]} | |
creationTimestamp: "2019-12-03T10:53:33Z" | |
generation: 2 | |
labels: | |
app: sidecarInjectorWebhook | |
chart: sidecarInjectorWebhook | |
heritage: Tiller | |
release: RELEASE-NAME | |
name: istio-sidecar-injector | |
resourceVersion: "43680" | |
selfLink: /apis/admissionregistration.k8s.io/v1beta1/mutatingwebhookconfigurations/istio-sidecar-injector | |
uid: 2656d828-15bb-11ea-b5af-027e0b84da98 | |
webhooks: | |
- admissionReviewVersions: | |
- v1beta1 | |
clientConfig: | |
caBundle: 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 | |
service: | |
name: istio-sidecar-injector | |
namespace: istio-system | |
path: /inject | |
failurePolicy: Fail | |
name: sidecar-injector.istio.io | |
namespaceSelector: | |
matchExpressions: | |
- key: name | |
operator: NotIn | |
values: | |
- istio-system | |
- key: istio-injection | |
operator: NotIn | |
values: | |
- disabled | |
rules: | |
- apiGroups: | |
- "" | |
apiVersions: | |
- v1 | |
operations: | |
- CREATE | |
resources: | |
- pods | |
scope: '*' | |
sideEffects: Unknown | |
timeoutSeconds: 30 | |
- apiVersion: admissionregistration.k8s.io/v1beta1 | |
kind: MutatingWebhookConfiguration | |
metadata: | |
annotations: | |
kubectl.kubernetes.io/last-applied-configuration: | | |
{"apiVersion":"admissionregistration.k8s.io/v1beta1","kind":"MutatingWebhookConfiguration","metadata":{"annotations":{},"labels":{"serving.knative.dev/release":"devel"},"name":"webhook.serving.knative.dev"},"webhooks":[{"admissionReviewVersions":["v1beta1"],"clientConfig":{"service":{"name":"webhook","namespace":"knative-serving"}},"failurePolicy":"Fail","name":"webhook.serving.knative.dev"}]} | |
creationTimestamp: "2019-12-03T10:54:09Z" | |
generation: 2 | |
labels: | |
serving.knative.dev/release: devel | |
name: webhook.serving.knative.dev | |
resourceVersion: "44067" | |
selfLink: /apis/admissionregistration.k8s.io/v1beta1/mutatingwebhookconfigurations/webhook.serving.knative.dev | |
uid: 3bf564cc-15bb-11ea-b5af-027e0b84da98 | |
webhooks: | |
- admissionReviewVersions: | |
- v1beta1 | |
clientConfig: | |
caBundle: LS0tLS1CRUdJTiBDRVJUSUZJQ0FURS0tLS0tCk1JSURjRENDQWxpZ0F3SUJBZ0lSQVBIR2dvTU53M2c5d1RlSU9vQ2JRcE13RFFZSktvWklodmNOQVFFTEJRQXcKRmpFVU1CSUdBMVVFQ2hNTGEyNWhkR2wyWlM1a1pYWXdIaGNOTVRreE1qQXpNVEExTkRNeldoY05NakF4TWpBegpNVEExTkRNeldqQVdNUlF3RWdZRFZRUUtFd3RyYm1GMGFYWmxMbVJsZGpDQ0FTSXdEUVlKS29aSWh2Y05BUUVCCkJRQURnZ0VQQURDQ0FRb0NnZ0VCQU9wVjYrR0VNOTRuUWNBRG1KOVVEdFVPekVQL3d0K0tYWVlTTStuOVdHbmoKdjVpRU00dzlxWTl0ODVJTjFwRlBqQ1JkdGVpT0pNY1Z6RWJXNXJobWZVMmlPRXExaVViczcrUzJ5aWNTdytVZgpBVGRlOVdxRkJDYkJzSVliQWc4WEdZMmVoZURUK2xoRmxmQ1dCUzBRMEJ0ZzQyMFZoRHRwL0w1OGlDMjUybVZoCldPRnBjem5DNlRNOEsxdk9lenhLam4ySVpBTFByR2M4bDROSUJiUGtaaHh0aVN4VEFGR1ZWUk5qNTMxYVhHOHkKN3M4SjEraTdib3hCVWh0R2JiS1B0bUJXSUJXb0Z1RmEwcGFRSDNPSnhBWlMreHQ2MzVpS2U5My96TFJuaDZLVgpBZ1Z0ZzA2MHRJazYyL0tGM2dRQklEWWE2UlErV2lvTG8wK2xZUTQya2gwQ0F3RUFBYU9CdURDQnRUQU9CZ05WCkhROEJBZjhFQkFNQ0FvUXdIUVlEVlIwbEJCWXdGQVlJS3dZQkJRVUhBd0VHQ0NzR0FRVUZCd01DTUE4R0ExVWQKRXdFQi93UUZNQU1CQWY4d2N3WURWUjBSQkd3d2FvSUhkMlZpYUc5dmE0SVhkMlZpYUc5dmF5NXJibUYwYVhabApMWE5sY25acGJtZUNHM2RsWW1odmIyc3VhMjVoZEdsMlpTMXpaWEoyYVc1bkxuTjJZNElwZDJWaWFHOXZheTVyCmJtRjBhWFpsTFhObGNuWnBibWN1YzNaakxtTnNkWE4wWlhJdWJHOWpZV3d3RFFZSktvWklodmNOQVFFTEJRQUQKZ2dFQkFFR2tHdDRlM3VRSFJnYTNGZnJDU1ErNGRzeEU5bHVFdTh4RjIyOHg1WkszeFZnRFBkWlNIQW04anFTKwp2NU5KY3FNMS81K2ljNFNsSTlYTktUQTNZcVJad2Q3MEdXWjZUaUJvS2ZwNjhTRGJHd1RibkdabzkwK0MrWlpKCjdCSE5heisyR3k2TXRpVkpQdTYvN0trNEFUY2U0ekNaZHZrZmk1N0EvZ0xRWlAra3h0WC9UYXlkSTFEelFQdUUKbEJUUUlsbWVPN21tZ2VIeWhveGppTmJ5ZkZ3YytkVWtkaUtVcUREUVhvUm5CTXZybUszZXpoQnZrTnFyZlZjTQpMc0w2ZWQvUDluS2tpTi9jb0NYaHJYamZPOExjQWNsS3U1YkFLeFF4MC93b2NEVVIxWkI0Mkc3OEZWcUUvZUhRCitWMElDSUdXakdKQlIwTUY2MjY4Q2ZnZmdwbz0KLS0tLS1FTkQgQ0VSVElGSUNBVEUtLS0tLQo= | |
service: | |
name: webhook | |
namespace: knative-serving | |
path: / | |
failurePolicy: Fail | |
name: webhook.serving.knative.dev | |
namespaceSelector: {} | |
rules: | |
- apiGroups: | |
- autoscaling.internal.knative.dev | |
apiVersions: | |
- v1alpha1 | |
operations: | |
- CREATE | |
- UPDATE | |
resources: | |
- metrics/* | |
scope: '*' | |
- apiGroups: | |
- autoscaling.internal.knative.dev | |
apiVersions: | |
- v1alpha1 | |
operations: | |
- CREATE | |
- UPDATE | |
resources: | |
- podautoscalers/* | |
scope: '*' | |
- apiGroups: | |
- networking.internal.knative.dev | |
apiVersions: | |
- v1alpha1 | |
operations: | |
- CREATE | |
- UPDATE | |
resources: | |
- certificates/* | |
scope: '*' | |
- apiGroups: | |
- networking.internal.knative.dev | |
apiVersions: | |
- v1alpha1 | |
operations: | |
- CREATE | |
- UPDATE | |
resources: | |
- ingresses/* | |
scope: '*' | |
- apiGroups: | |
- networking.internal.knative.dev | |
apiVersions: | |
- v1alpha1 | |
operations: | |
- CREATE | |
- UPDATE | |
resources: | |
- serverlessservices/* | |
scope: '*' | |
- apiGroups: | |
- serving.knative.dev | |
apiVersions: | |
- v1 | |
operations: | |
- CREATE | |
- UPDATE | |
resources: | |
- configurations/* | |
scope: '*' | |
- apiGroups: | |
- serving.knative.dev | |
apiVersions: | |
- v1 | |
operations: | |
- CREATE | |
- UPDATE | |
resources: | |
- revisions/* | |
scope: '*' | |
- apiGroups: | |
- serving.knative.dev | |
apiVersions: | |
- v1 | |
operations: | |
- CREATE | |
- UPDATE | |
resources: | |
- routes/* | |
scope: '*' | |
- apiGroups: | |
- serving.knative.dev | |
apiVersions: | |
- v1 | |
operations: | |
- CREATE | |
- UPDATE | |
resources: | |
- services/* | |
scope: '*' | |
- apiGroups: | |
- serving.knative.dev | |
apiVersions: | |
- v1alpha1 | |
operations: | |
- CREATE | |
- UPDATE | |
resources: | |
- configurations/* | |
scope: '*' | |
- apiGroups: | |
- serving.knative.dev | |
apiVersions: | |
- v1alpha1 | |
operations: | |
- CREATE | |
- UPDATE | |
resources: | |
- revisions/* | |
scope: '*' | |
- apiGroups: | |
- serving.knative.dev | |
apiVersions: | |
- v1alpha1 | |
operations: | |
- CREATE | |
- UPDATE | |
resources: | |
- routes/* | |
scope: '*' | |
- apiGroups: | |
- serving.knative.dev | |
apiVersions: | |
- v1alpha1 | |
operations: | |
- CREATE | |
- UPDATE | |
resources: | |
- services/* | |
scope: '*' | |
- apiGroups: | |
- serving.knative.dev | |
apiVersions: | |
- v1beta1 | |
operations: | |
- CREATE | |
- UPDATE | |
resources: | |
- configurations/* | |
scope: '*' | |
- apiGroups: | |
- serving.knative.dev | |
apiVersions: | |
- v1beta1 | |
operations: | |
- CREATE | |
- UPDATE | |
resources: | |
- revisions/* | |
scope: '*' | |
- apiGroups: | |
- serving.knative.dev | |
apiVersions: | |
- v1beta1 | |
operations: | |
- CREATE | |
- UPDATE | |
resources: | |
- routes/* | |
scope: '*' | |
- apiGroups: | |
- serving.knative.dev | |
apiVersions: | |
- v1beta1 | |
operations: | |
- CREATE | |
- UPDATE | |
resources: | |
- services/* | |
scope: '*' | |
sideEffects: Unknown | |
timeoutSeconds: 30 | |
kind: List | |
metadata: | |
resourceVersion: "" | |
selfLink: "" | |
------- | |
resource: validatingwebhookconfigurations | |
------- | |
apiVersion: v1 | |
items: | |
- apiVersion: admissionregistration.k8s.io/v1beta1 | |
kind: ValidatingWebhookConfiguration | |
metadata: | |
annotations: | |
kubectl.kubernetes.io/last-applied-configuration: | | |
{"apiVersion":"admissionregistration.k8s.io/v1beta1","kind":"ValidatingWebhookConfiguration","metadata":{"annotations":{},"labels":{"serving.knative.dev/release":"devel"},"name":"config.webhook.serving.knative.dev"},"webhooks":[{"admissionReviewVersions":["v1beta1"],"clientConfig":{"service":{"name":"webhook","namespace":"knative-serving"}},"failurePolicy":"Fail","name":"config.webhook.serving.knative.dev","namespaceSelector":{"matchExpressions":[{"key":"serving.knative.dev/release","operator":"Exists"}]}}]} | |
creationTimestamp: "2019-12-03T10:54:10Z" | |
generation: 2 | |
labels: | |
serving.knative.dev/release: devel | |
name: config.webhook.serving.knative.dev | |
resourceVersion: "44068" | |
selfLink: /apis/admissionregistration.k8s.io/v1beta1/validatingwebhookconfigurations/config.webhook.serving.knative.dev | |
uid: 3c2e217e-15bb-11ea-b5af-027e0b84da98 | |
webhooks: | |
- admissionReviewVersions: | |
- v1beta1 | |
clientConfig: | |
caBundle: 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 | |
service: | |
name: webhook | |
namespace: knative-serving | |
path: /config-validation | |
failurePolicy: Fail | |
name: config.webhook.serving.knative.dev | |
namespaceSelector: | |
matchExpressions: | |
- key: serving.knative.dev/release | |
operator: Exists | |
rules: | |
- apiGroups: | |
- "" | |
apiVersions: | |
- v1 | |
operations: | |
- CREATE | |
- UPDATE | |
resources: | |
- configmaps/* | |
scope: Namespaced | |
sideEffects: Unknown | |
timeoutSeconds: 30 | |
- apiVersion: admissionregistration.k8s.io/v1beta1 | |
kind: ValidatingWebhookConfiguration | |
metadata: | |
creationTimestamp: "2019-12-03T10:53:58Z" | |
generation: 1 | |
labels: | |
app: galley | |
chart: galley | |
heritage: Tiller | |
istio: galley | |
release: RELEASE-NAME | |
name: istio-galley | |
ownerReferences: | |
- apiVersion: v1 | |
blockOwnerDeletion: true | |
controller: true | |
kind: Namespace | |
name: istio-system | |
uid: ffb3df9d-15ba-11ea-b5af-027e0b84da98 | |
resourceVersion: "43760" | |
selfLink: /apis/admissionregistration.k8s.io/v1beta1/validatingwebhookconfigurations/istio-galley | |
uid: 354bc616-15bb-11ea-b5af-027e0b84da98 | |
webhooks: | |
- admissionReviewVersions: | |
- v1beta1 | |
clientConfig: | |
caBundle: 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 | |
service: | |
name: istio-galley | |
namespace: istio-system | |
path: /admitpilot | |
failurePolicy: Fail | |
name: pilot.validation.istio.io | |
namespaceSelector: {} | |
rules: | |
- apiGroups: | |
- config.istio.io | |
apiVersions: | |
- v1alpha2 | |
operations: | |
- CREATE | |
- UPDATE | |
resources: | |
- httpapispecs | |
- httpapispecbindings | |
- quotaspecs | |
- quotaspecbindings | |
scope: '*' | |
- apiGroups: | |
- rbac.istio.io | |
apiVersions: | |
- '*' | |
operations: | |
- CREATE | |
- UPDATE | |
resources: | |
- '*' | |
scope: '*' | |
- apiGroups: | |
- security.istio.io | |
apiVersions: | |
- '*' | |
operations: | |
- CREATE | |
- UPDATE | |
resources: | |
- '*' | |
scope: '*' | |
- apiGroups: | |
- authentication.istio.io | |
apiVersions: | |
- '*' | |
operations: | |
- CREATE | |
- UPDATE | |
resources: | |
- '*' | |
scope: '*' | |
- apiGroups: | |
- networking.istio.io | |
apiVersions: | |
- '*' | |
operations: | |
- CREATE | |
- UPDATE | |
resources: | |
- destinationrules | |
- envoyfilters | |
- gateways | |
- serviceentries | |
- sidecars | |
- virtualservices | |
scope: '*' | |
sideEffects: None | |
timeoutSeconds: 30 | |
- admissionReviewVersions: | |
- v1beta1 | |
clientConfig: | |
caBundle: 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 | |
service: | |
name: istio-galley | |
namespace: istio-system | |
path: /admitmixer | |
failurePolicy: Fail | |
name: mixer.validation.istio.io | |
namespaceSelector: {} | |
rules: | |
- apiGroups: | |
- config.istio.io | |
apiVersions: | |
- v1alpha2 | |
operations: | |
- CREATE | |
- UPDATE | |
resources: | |
- rules | |
- attributemanifests | |
- circonuses | |
- deniers | |
- fluentds | |
- kubernetesenvs | |
- listcheckers | |
- memquotas | |
- noops | |
- opas | |
- prometheuses | |
- rbacs | |
- solarwindses | |
- stackdrivers | |
- cloudwatches | |
- dogstatsds | |
- statsds | |
- stdios | |
- apikeys | |
- authorizations | |
- checknothings | |
- listentries | |
- logentries | |
- metrics | |
- quotas | |
- reportnothings | |
- tracespans | |
- adapters | |
- handlers | |
- instances | |
- templates | |
- zipkins | |
scope: '*' | |
sideEffects: None | |
timeoutSeconds: 30 | |
- apiVersion: admissionregistration.k8s.io/v1beta1 | |
kind: ValidatingWebhookConfiguration | |
metadata: | |
annotations: | |
kubectl.kubernetes.io/last-applied-configuration: | | |
{"apiVersion":"admissionregistration.k8s.io/v1beta1","kind":"ValidatingWebhookConfiguration","metadata":{"annotations":{},"labels":{"serving.knative.dev/release":"devel"},"name":"validation.webhook.serving.knative.dev"},"webhooks":[{"admissionReviewVersions":["v1beta1"],"clientConfig":{"service":{"name":"webhook","namespace":"knative-serving"}},"failurePolicy":"Fail","name":"validation.webhook.serving.knative.dev"}]} | |
creationTimestamp: "2019-12-03T10:54:09Z" | |
generation: 2 | |
labels: | |
serving.knative.dev/release: devel | |
name: validation.webhook.serving.knative.dev | |
resourceVersion: "44069" | |
selfLink: /apis/admissionregistration.k8s.io/v1beta1/validatingwebhookconfigurations/validation.webhook.serving.knative.dev | |
uid: 3c116a6c-15bb-11ea-b5af-027e0b84da98 | |
webhooks: | |
- admissionReviewVersions: | |
- v1beta1 | |
clientConfig: | |
caBundle: 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 | |
service: | |
name: webhook | |
namespace: knative-serving | |
path: / | |
failurePolicy: Fail | |
name: validation.webhook.serving.knative.dev | |
namespaceSelector: {} | |
rules: | |
- apiGroups: | |
- autoscaling.internal.knative.dev | |
apiVersions: | |
- v1alpha1 | |
operations: | |
- CREATE | |
- UPDATE | |
resources: | |
- metrics/* | |
scope: '*' | |
- apiGroups: | |
- autoscaling.internal.knative.dev | |
apiVersions: | |
- v1alpha1 | |
operations: | |
- CREATE | |
- UPDATE | |
resources: | |
- podautoscalers/* | |
scope: '*' | |
- apiGroups: | |
- networking.internal.knative.dev | |
apiVersions: | |
- v1alpha1 | |
operations: | |
- CREATE | |
- UPDATE | |
resources: | |
- certificates/* | |
scope: '*' | |
- apiGroups: | |
- networking.internal.knative.dev | |
apiVersions: | |
- v1alpha1 | |
operations: | |
- CREATE | |
- UPDATE | |
resources: | |
- ingresses/* | |
scope: '*' | |
- apiGroups: | |
- networking.internal.knative.dev | |
apiVersions: | |
- v1alpha1 | |
operations: | |
- CREATE | |
- UPDATE | |
resources: | |
- serverlessservices/* | |
scope: '*' | |
- apiGroups: | |
- serving.knative.dev | |
apiVersions: | |
- v1 | |
operations: | |
- CREATE | |
- UPDATE | |
resources: | |
- configurations/* | |
scope: '*' | |
- apiGroups: | |
- serving.knative.dev | |
apiVersions: | |
- v1 | |
operations: | |
- CREATE | |
- UPDATE | |
resources: | |
- revisions/* | |
scope: '*' | |
- apiGroups: | |
- serving.knative.dev | |
apiVersions: | |
- v1 | |
operations: | |
- CREATE | |
- UPDATE | |
resources: | |
- routes/* | |
scope: '*' | |
- apiGroups: | |
- serving.knative.dev | |
apiVersions: | |
- v1 | |
operations: | |
- CREATE | |
- UPDATE | |
resources: | |
- services/* | |
scope: '*' | |
- apiGroups: | |
- serving.knative.dev | |
apiVersions: | |
- v1alpha1 | |
operations: | |
- CREATE | |
- UPDATE | |
resources: | |
- configurations/* | |
scope: '*' | |
- apiGroups: | |
- serving.knative.dev | |
apiVersions: | |
- v1alpha1 | |
operations: | |
- CREATE | |
- UPDATE | |
resources: | |
- revisions/* | |
scope: '*' | |
- apiGroups: | |
- serving.knative.dev | |
apiVersions: | |
- v1alpha1 | |
operations: | |
- CREATE | |
- UPDATE | |
resources: | |
- routes/* | |
scope: '*' | |
- apiGroups: | |
- serving.knative.dev | |
apiVersions: | |
- v1alpha1 | |
operations: | |
- CREATE | |
- UPDATE | |
resources: | |
- services/* | |
scope: '*' | |
- apiGroups: | |
- serving.knative.dev | |
apiVersions: | |
- v1beta1 | |
operations: | |
- CREATE | |
- UPDATE | |
resources: | |
- configurations/* | |
scope: '*' | |
- apiGroups: | |
- serving.knative.dev | |
apiVersions: | |
- v1beta1 | |
operations: | |
- CREATE | |
- UPDATE | |
resources: | |
- revisions/* | |
scope: '*' | |
- apiGroups: | |
- serving.knative.dev | |
apiVersions: | |
- v1beta1 | |
operations: | |
- CREATE | |
- UPDATE | |
resources: | |
- routes/* | |
scope: '*' | |
- apiGroups: | |
- serving.knative.dev | |
apiVersions: | |
- v1beta1 | |
operations: | |
- CREATE | |
- UPDATE | |
resources: | |
- services/* | |
scope: '*' | |
sideEffects: Unknown | |
timeoutSeconds: 30 | |
kind: List | |
metadata: | |
resourceVersion: "" | |
selfLink: "" | |
------- | |
resource: customresourcedefinitions | |
------- | |
apiVersion: v1 | |
items: | |
- apiVersion: apiextensions.k8s.io/v1beta1 | |
kind: CustomResourceDefinition | |
metadata: | |
annotations: | |
helm.sh/resource-policy: keep | |
kubectl.kubernetes.io/last-applied-configuration: | | |
{"apiVersion":"apiextensions.k8s.io/v1beta1","kind":"CustomResourceDefinition","metadata":{"annotations":{"helm.sh/resource-policy":"keep"},"labels":{"app":"mixer","chart":"istio","heritage":"Tiller","istio":"mixer-adapter","package":"adapter","release":"istio"},"name":"adapters.config.istio.io"},"spec":{"group":"config.istio.io","names":{"categories":["istio-io","policy-istio-io"],"kind":"adapter","plural":"adapters","singular":"adapter"},"scope":"Namespaced","subresources":{"status":{}},"versions":[{"name":"v1alpha2","served":true,"storage":true}]}} | |
creationTimestamp: "2019-12-03T04:51:49Z" | |
generation: 3 | |
labels: | |
app: mixer | |
chart: istio | |
heritage: Tiller | |
istio: mixer-adapter | |
package: adapter | |
release: istio | |
name: adapters.config.istio.io | |
resourceVersion: "43322" | |
selfLink: /apis/apiextensions.k8s.io/v1beta1/customresourcedefinitions/adapters.config.istio.io | |
uid: 9dd1fa09-1588-11ea-b5af-027e0b84da98 | |
spec: | |
conversion: | |
strategy: None | |
group: config.istio.io | |
names: | |
categories: | |
- istio-io | |
- policy-istio-io | |
kind: adapter | |
listKind: adapterList | |
plural: adapters | |
singular: adapter | |
scope: Namespaced | |
subresources: | |
status: {} | |
version: v1alpha2 | |
versions: | |
- name: v1alpha2 | |
served: true | |
storage: true | |
status: | |
acceptedNames: | |
categories: | |
- istio-io | |
- policy-istio-io | |
kind: adapter | |
listKind: adapterList | |
plural: adapters | |
singular: adapter | |
conditions: | |
- lastTransitionTime: "2019-12-03T04:51:49Z" | |
message: no conflicts found | |
reason: NoConflicts | |
status: "True" | |
type: NamesAccepted | |
- lastTransitionTime: null | |
message: the initial names have been accepted | |
reason: InitialNamesAccepted | |
status: "True" | |
type: Established | |
storedVersions: | |
- v1alpha2 | |
- apiVersion: apiextensions.k8s.io/v1beta1 | |
kind: CustomResourceDefinition | |
metadata: | |
annotations: | |
helm.sh/resource-policy: keep | |
kubectl.kubernetes.io/last-applied-configuration: | | |
{"apiVersion":"apiextensions.k8s.io/v1beta1","kind":"CustomResourceDefinition","metadata":{"annotations":{"helm.sh/resource-policy":"keep"},"creationTimestamp":null,"labels":{"app":"mixer","chart":"istio","heritage":"Tiller","istio":"core","package":"istio.io.mixer","release":"istio"},"name":"attributemanifests.config.istio.io"},"spec":{"group":"config.istio.io","names":{"categories":["istio-io","policy-istio-io"],"kind":"attributemanifest","plural":"attributemanifests","singular":"attributemanifest"},"scope":"Namespaced","subresources":{"status":{}},"validation":{"openAPIV3Schema":{"properties":{"spec":{"description":"Describes the rules used to configure Mixer's policy and telemetry features. See more details at: https://istio.io/docs/reference/config/policy-and-telemetry/istio.policy.v1beta1.html","properties":{"attributes":{"additionalProperties":{"properties":{"description":{"description":"A human-readable description of the attribute's purpose.","format":"string","type":"string"},"valueType":{"description":"The type of data carried by this attribute.","enum":["VALUE_TYPE_UNSPECIFIED","STRING","INT64","DOUBLE","BOOL","TIMESTAMP","IP_ADDRESS","EMAIL_ADDRESS","URI","DNS_NAME","DURATION","STRING_MAP"],"type":"string"}},"type":"object"},"description":"The set of attributes this Istio component will be responsible for producing at runtime.","type":"object"},"name":{"description":"Name of the component producing these attributes.","format":"string","type":"string"},"revision":{"description":"The revision of this document.","format":"string","type":"string"}},"type":"object"}},"type":"object"}},"versions":[{"name":"v1alpha2","served":true,"storage":true}]},"status":{"acceptedNames":{"kind":"","plural":""},"conditions":[],"storedVersions":[]}} | |
creationTimestamp: "2019-12-03T04:51:48Z" | |
generation: 3 | |
labels: | |
app: mixer | |
chart: istio | |
heritage: Tiller | |
istio: core | |
package: istio.io.mixer | |
release: istio | |
name: attributemanifests.config.istio.io | |
resourceVersion: "43295" | |
selfLink: /apis/apiextensions.k8s.io/v1beta1/customresourcedefinitions/attributemanifests.config.istio.io | |
uid: 9d1f874d-1588-11ea-b5af-027e0b84da98 | |
spec: | |
conversion: | |
strategy: None | |
group: config.istio.io | |
names: | |
categories: | |
- istio-io | |
- policy-istio-io | |
kind: attributemanifest | |
listKind: attributemanifestList | |
plural: attributemanifests | |
singular: attributemanifest | |
scope: Namespaced | |
subresources: | |
status: {} | |
validation: | |
openAPIV3Schema: | |
properties: | |
spec: | |
description: 'Describes the rules used to configure Mixer''s policy and | |
telemetry features. See more details at: https://istio.io/docs/reference/config/policy-and-telemetry/istio.policy.v1beta1.html' | |
properties: | |
attributes: | |
additionalProperties: | |
properties: | |
description: | |
description: A human-readable description of the attribute's | |
purpose. | |
format: string | |
type: string | |
valueType: | |
description: The type of data carried by this attribute. | |
enum: | |
- VALUE_TYPE_UNSPECIFIED | |
- STRING | |
- INT64 | |
- DOUBLE | |
- BOOL | |
- TIMESTAMP | |
- IP_ADDRESS | |
- EMAIL_ADDRESS | |
- URI | |
- DNS_NAME | |
- DURATION | |
- STRING_MAP | |
type: string | |
type: object | |
description: The set of attributes this Istio component will be responsible | |
for producing at runtime. | |
type: object | |
name: | |
description: Name of the component producing these attributes. | |
format: string | |
type: string | |
revision: | |
description: The revision of this document. | |
format: string | |
type: string | |
type: object | |
type: object | |
version: v1alpha2 | |
versions: | |
- name: v1alpha2 | |
served: true | |
storage: true | |
status: | |
acceptedNames: | |
categories: | |
- istio-io | |
- policy-istio-io | |
kind: attributemanifest | |
listKind: attributemanifestList | |
plural: attributemanifests | |
singular: attributemanifest | |
conditions: | |
- lastTransitionTime: "2019-12-03T04:51:48Z" | |
message: no conflicts found | |
reason: NoConflicts | |
status: "True" | |
type: NamesAccepted | |
- lastTransitionTime: null | |
message: the initial names have been accepted | |
reason: InitialNamesAccepted | |
status: "True" | |
type: Established | |
storedVersions: | |
- v1alpha2 | |
- apiVersion: apiextensions.k8s.io/v1beta1 | |
kind: CustomResourceDefinition | |
metadata: | |
annotations: | |
kubectl.kubernetes.io/last-applied-configuration: | | |
{"apiVersion":"apiextensions.k8s.io/v1beta1","kind":"CustomResourceDefinition","metadata":{"annotations":{},"labels":{"app":"istio-pilot","heritage":"Tiller","istio":"rbac","release":"istio"},"name":"authorizationpolicies.rbac.istio.io"},"spec":{"group":"rbac.istio.io","names":{"categories":["istio-io","rbac-istio-io"],"kind":"AuthorizationPolicy","plural":"authorizationpolicies","singular":"authorizationpolicy"},"scope":"Namespaced","versions":[{"name":"v1alpha1","served":true,"storage":true}]}} | |
creationTimestamp: "2019-12-03T10:45:18Z" | |
generation: 1 | |
labels: | |
app: istio-pilot | |
heritage: Tiller | |
istio: rbac | |
release: istio | |
name: authorizationpolicies.rbac.istio.io | |
resourceVersion: "41414" | |
selfLink: /apis/apiextensions.k8s.io/v1beta1/customresourcedefinitions/authorizationpolicies.rbac.istio.io | |
uid: ff15f3f7-15b9-11ea-b5af-027e0b84da98 | |
spec: | |
conversion: | |
strategy: None | |
group: rbac.istio.io | |
names: | |
categories: | |
- istio-io | |
- rbac-istio-io | |
kind: AuthorizationPolicy | |
listKind: AuthorizationPolicyList | |
plural: authorizationpolicies | |
singular: authorizationpolicy | |
scope: Namespaced | |
version: v1alpha1 | |
versions: | |
- name: v1alpha1 | |
served: true | |
storage: true | |
status: | |
acceptedNames: | |
categories: | |
- istio-io | |
- rbac-istio-io | |
kind: AuthorizationPolicy | |
listKind: AuthorizationPolicyList | |
plural: authorizationpolicies | |
singular: authorizationpolicy | |
conditions: | |
- lastTransitionTime: "2019-12-03T10:45:18Z" | |
message: no conflicts found | |
reason: NoConflicts | |
status: "True" | |
type: NamesAccepted | |
- lastTransitionTime: null | |
message: the initial names have been accepted | |
reason: InitialNamesAccepted | |
status: "True" | |
type: Established | |
storedVersions: | |
- v1alpha1 | |
- apiVersion: apiextensions.k8s.io/v1beta1 | |
kind: CustomResourceDefinition | |
metadata: | |
annotations: | |
kubectl.kubernetes.io/last-applied-configuration: | | |
{"apiVersion":"apiextensions.k8s.io/v1beta1","kind":"CustomResourceDefinition","metadata":{"annotations":{},"creationTimestamp":null,"labels":{"app":"istio-pilot","heritage":"Tiller","istio":"security","release":"istio"},"name":"authorizationpolicies.security.istio.io"},"spec":{"group":"security.istio.io","names":{"categories":["istio-io","security-istio-io"],"kind":"AuthorizationPolicy","plural":"authorizationpolicies","singular":"authorizationpolicy"},"scope":"Namespaced","subresources":{"status":{}},"validation":{"openAPIV3Schema":{"properties":{"spec":{"description":"Configuration for access control on workloads. See more details at: https://istio.io/docs/reference/config/security/v1beta1/authorization-policy.html","properties":{"rules":{"description":"Optional.","items":{"properties":{"from":{"description":"Optional.","items":{"properties":{"source":{"description":"Source specifies the source of a request.","properties":{"ipBlocks":{"description":"Optional.","items":{"format":"string","type":"string"},"type":"array"},"namespaces":{"description":"Optional.","items":{"format":"string","type":"string"},"type":"array"},"principals":{"description":"Optional.","items":{"format":"string","type":"string"},"type":"array"},"requestPrincipals":{"description":"Optional.","items":{"format":"string","type":"string"},"type":"array"}},"type":"object"}},"type":"object"},"type":"array"},"to":{"description":"Optional.","items":{"properties":{"operation":{"description":"Operation specifies the operation of a request.","properties":{"hosts":{"description":"Optional.","items":{"format":"string","type":"string"},"type":"array"},"methods":{"description":"Optional.","items":{"format":"string","type":"string"},"type":"array"},"paths":{"description":"Optional.","items":{"format":"string","type":"string"},"type":"array"},"ports":{"description":"Optional.","items":{"format":"string","type":"string"},"type":"array"}},"type":"object"}},"type":"object"},"type":"array"},"when":{"description":"Optional.","items":{"properties":{"key":{"description":"The name of an Istio attribute.","format":"string","type":"string"},"values":{"description":"The allowed values for the attribute.","items":{"format":"string","type":"string"},"type":"array"}},"type":"object"},"type":"array"}},"type":"object"},"type":"array"},"selector":{"description":"Optional.","properties":{"matchLabels":{"additionalProperties":{"format":"string","type":"string"},"type":"object"}},"type":"object"}},"type":"object"}},"type":"object"}},"versions":[{"name":"v1beta1","served":true,"storage":true}]},"status":{"acceptedNames":{"kind":"","plural":""},"conditions":[],"storedVersions":[]}} | |
creationTimestamp: "2019-12-03T04:51:50Z" | |
generation: 1 | |
labels: | |
app: istio-pilot | |
heritage: Tiller | |
istio: security | |
release: istio | |
name: authorizationpolicies.security.istio.io | |
resourceVersion: "1425" | |
selfLink: /apis/apiextensions.k8s.io/v1beta1/customresourcedefinitions/authorizationpolicies.security.istio.io | |
uid: 9e21b843-1588-11ea-b5af-027e0b84da98 | |
spec: | |
conversion: | |
strategy: None | |
group: security.istio.io | |
names: | |
categories: | |
- istio-io | |
- security-istio-io | |
kind: AuthorizationPolicy | |
listKind: AuthorizationPolicyList | |
plural: authorizationpolicies | |
singular: authorizationpolicy | |
scope: Namespaced | |
subresources: | |
status: {} | |
validation: | |
openAPIV3Schema: | |
properties: | |
spec: | |
description: 'Configuration for access control on workloads. See more | |
details at: https://istio.io/docs/reference/config/security/v1beta1/authorization-policy.html' | |
properties: | |
rules: | |
description: Optional. | |
items: | |
properties: | |
from: | |
description: Optional. | |
items: | |
properties: | |
source: | |
description: Source specifies the source of a request. | |
properties: | |
ipBlocks: | |
description: Optional. | |
items: | |
format: string | |
type: string | |
type: array | |
namespaces: | |
description: Optional. | |
items: | |
format: string | |
type: string | |
type: array | |
principals: | |
description: Optional. | |
items: | |
format: string | |
type: string | |
type: array | |
requestPrincipals: | |
description: Optional. | |
items: | |
format: string | |
type: string | |
type: array | |
type: object | |
type: object | |
type: array | |
to: | |
description: Optional. | |
items: | |
properties: | |
operation: | |
description: Operation specifies the operation of a request. | |
properties: | |
hosts: | |
description: Optional. | |
items: | |
format: string | |
type: string | |
type: array | |
methods: | |
description: Optional. | |
items: | |
format: string | |
type: string | |
type: array | |
paths: | |
description: Optional. | |
items: | |
format: string | |
type: string | |
type: array | |
ports: | |
description: Optional. | |
items: | |
format: string | |
type: string | |
type: array | |
type: object | |
type: object | |
type: array | |
when: | |
description: Optional. | |
items: | |
properties: | |
key: | |
description: The name of an Istio attribute. | |
format: string | |
type: string | |
values: | |
description: The allowed values for the attribute. | |
items: | |
format: string | |
type: string | |
type: array | |
type: object | |
type: array | |
type: object | |
type: array | |
selector: | |
description: Optional. | |
properties: | |
matchLabels: | |
additionalProperties: | |
format: string | |
type: string | |
type: object | |
type: object | |
type: object | |
type: object | |
version: v1beta1 | |
versions: | |
- name: v1beta1 | |
served: true | |
storage: true | |
status: | |
acceptedNames: | |
categories: | |
- istio-io | |
- security-istio-io | |
kind: AuthorizationPolicy | |
listKind: AuthorizationPolicyList | |
plural: authorizationpolicies | |
singular: authorizationpolicy | |
conditions: | |
- lastTransitionTime: "2019-12-03T04:51:50Z" | |
message: no conflicts found | |
reason: NoConflicts | |
status: "True" | |
type: NamesAccepted | |
- lastTransitionTime: null | |
message: the initial names have been accepted | |
reason: InitialNamesAccepted | |
status: "True" | |
type: Established | |
storedVersions: | |
- v1beta1 | |
- apiVersion: apiextensions.k8s.io/v1beta1 | |
kind: CustomResourceDefinition | |
metadata: | |
annotations: | |
kubectl.kubernetes.io/last-applied-configuration: | | |
{"apiVersion":"apiextensions.k8s.io/v1beta1","kind":"CustomResourceDefinition","metadata":{"annotations":{},"labels":{"knative.dev/crd-install":"true","serving.knative.dev/release":"devel"},"name":"certificates.networking.internal.knative.dev"},"spec":{"additionalPrinterColumns":[{"JSONPath":".status.conditions[?(@.type==\"Ready\")].status","name":"Ready","type":"string"},{"JSONPath":".status.conditions[?(@.type==\"Ready\")].reason","name":"Reason","type":"string"}],"group":"networking.internal.knative.dev","names":{"categories":["knative-internal","networking"],"kind":"Certificate","plural":"certificates","shortNames":["kcert"],"singular":"certificate"},"scope":"Namespaced","subresources":{"status":{}},"version":"v1alpha1"}} | |
creationTimestamp: "2019-12-03T10:54:07Z" | |
generation: 1 | |
labels: | |
knative.dev/crd-install: "true" | |
serving.knative.dev/release: devel | |
name: certificates.networking.internal.knative.dev | |
resourceVersion: "43818" | |
selfLink: /apis/apiextensions.k8s.io/v1beta1/customresourcedefinitions/certificates.networking.internal.knative.dev | |
uid: 3a88e36b-15bb-11ea-b5af-027e0b84da98 | |
spec: | |
additionalPrinterColumns: | |
- JSONPath: .status.conditions[?(@.type=="Ready")].status | |
name: Ready | |
type: string | |
- JSONPath: .status.conditions[?(@.type=="Ready")].reason | |
name: Reason | |
type: string | |
conversion: | |
strategy: None | |
group: networking.internal.knative.dev | |
names: | |
categories: | |
- knative-internal | |
- networking | |
kind: Certificate | |
listKind: CertificateList | |
plural: certificates | |
shortNames: | |
- kcert | |
singular: certificate | |
scope: Namespaced | |
subresources: | |
status: {} | |
version: v1alpha1 | |
versions: | |
- name: v1alpha1 | |
served: true | |
storage: true | |
status: | |
acceptedNames: | |
categories: | |
- knative-internal | |
- networking | |
kind: Certificate | |
listKind: CertificateList | |
plural: certificates | |
shortNames: | |
- kcert | |
singular: certificate | |
conditions: | |
- lastTransitionTime: "2019-12-03T10:54:07Z" | |
message: no conflicts found | |
reason: NoConflicts | |
status: "True" | |
type: NamesAccepted | |
- lastTransitionTime: null | |
message: the initial names have been accepted | |
reason: InitialNamesAccepted | |
status: "True" | |
type: Established | |
storedVersions: | |
- v1alpha1 | |
- apiVersion: apiextensions.k8s.io/v1beta1 | |
kind: CustomResourceDefinition | |
metadata: | |
annotations: | |
helm.sh/resource-policy: keep | |
kubectl.kubernetes.io/last-applied-configuration: | | |
{"apiVersion":"apiextensions.k8s.io/v1beta1","kind":"CustomResourceDefinition","metadata":{"annotations":{"helm.sh/resource-policy":"keep"},"creationTimestamp":null,"labels":{"app":"istio-pilot","heritage":"Tiller","istio":"rbac","release":"istio"},"name":"clusterrbacconfigs.rbac.istio.io"},"spec":{"group":"rbac.istio.io","names":{"categories":["istio-io","rbac-istio-io"],"kind":"ClusterRbacConfig","plural":"clusterrbacconfigs","singular":"clusterrbacconfig"},"scope":"Cluster","subresources":{"status":{}},"validation":{"openAPIV3Schema":{"properties":{"spec":{"description":"Configuration for Role Based Access Control. See more details at: https://istio.io/docs/reference/config/authorization/istio.rbac.v1alpha1.html","properties":{"enforcementMode":{"enum":["ENFORCED","PERMISSIVE"],"type":"string"},"exclusion":{"description":"A list of services or namespaces that should not be enforced by Istio RBAC policies.","properties":{"namespaces":{"description":"A list of namespaces.","items":{"format":"string","type":"string"},"type":"array"},"services":{"description":"A list of services.","items":{"format":"string","type":"string"},"type":"array"}},"type":"object"},"inclusion":{"description":"A list of services or namespaces that should be enforced by Istio RBAC policies.","properties":{"namespaces":{"description":"A list of namespaces.","items":{"format":"string","type":"string"},"type":"array"},"services":{"description":"A list of services.","items":{"format":"string","type":"string"},"type":"array"}},"type":"object"},"mode":{"description":"Istio RBAC mode.","enum":["OFF","ON","ON_WITH_INCLUSION","ON_WITH_EXCLUSION"],"type":"string"}},"type":"object"}},"type":"object"}},"versions":[{"name":"v1alpha1","served":true,"storage":true}]},"status":{"acceptedNames":{"kind":"","plural":""},"conditions":[],"storedVersions":[]}} | |
creationTimestamp: "2019-12-03T04:51:48Z" | |
generation: 3 | |
labels: | |
app: istio-pilot | |
heritage: Tiller | |
istio: rbac | |
release: istio | |
name: clusterrbacconfigs.rbac.istio.io | |
resourceVersion: "43297" | |
selfLink: /apis/apiextensions.k8s.io/v1beta1/customresourcedefinitions/clusterrbacconfigs.rbac.istio.io | |
uid: 9d20a15b-1588-11ea-b5af-027e0b84da98 | |
spec: | |
conversion: | |
strategy: None | |
group: rbac.istio.io | |
names: | |
categories: | |
- istio-io | |
- rbac-istio-io | |
kind: ClusterRbacConfig | |
listKind: ClusterRbacConfigList | |
plural: clusterrbacconfigs | |
singular: clusterrbacconfig | |
scope: Cluster | |
subresources: | |
status: {} | |
validation: | |
openAPIV3Schema: | |
properties: | |
spec: | |
description: 'Configuration for Role Based Access Control. See more details | |
at: https://istio.io/docs/reference/config/authorization/istio.rbac.v1alpha1.html' | |
properties: | |
enforcementMode: | |
enum: | |
- ENFORCED | |
- PERMISSIVE | |
type: string | |
exclusion: | |
description: A list of services or namespaces that should not be enforced | |
by Istio RBAC policies. | |
properties: | |
namespaces: | |
description: A list of namespaces. | |
items: | |
format: string | |
type: string | |
type: array | |
services: | |
description: A list of services. | |
items: | |
format: string | |
type: string | |
type: array | |
type: object | |
inclusion: | |
description: A list of services or namespaces that should be enforced | |
by Istio RBAC policies. | |
properties: | |
namespaces: | |
description: A list of namespaces. | |
items: | |
format: string | |
type: string | |
type: array | |
services: | |
description: A list of services. | |
items: | |
format: string | |
type: string | |
type: array | |
type: object | |
mode: | |
description: Istio RBAC mode. | |
enum: | |
- "OFF" | |
- "ON" | |
- ON_WITH_INCLUSION | |
- ON_WITH_EXCLUSION | |
type: string | |
type: object | |
type: object | |
version: v1alpha1 | |
versions: | |
- name: v1alpha1 | |
served: true | |
storage: true | |
status: | |
acceptedNames: | |
categories: | |
- istio-io | |
- rbac-istio-io | |
kind: ClusterRbacConfig | |
listKind: ClusterRbacConfigList | |
plural: clusterrbacconfigs | |
singular: clusterrbacconfig | |
conditions: | |
- lastTransitionTime: "2019-12-03T04:51:48Z" | |
message: no conflicts found | |
reason: NoConflicts | |
status: "True" | |
type: NamesAccepted | |
- lastTransitionTime: null | |
message: the initial names have been accepted | |
reason: InitialNamesAccepted | |
status: "True" | |
type: Established | |
storedVersions: | |
- v1alpha1 | |
- apiVersion: apiextensions.k8s.io/v1beta1 | |
kind: CustomResourceDefinition | |
metadata: | |
annotations: | |
kubectl.kubernetes.io/last-applied-configuration: | | |
{"apiVersion":"apiextensions.k8s.io/v1beta1","kind":"CustomResourceDefinition","metadata":{"annotations":{},"labels":{"duck.knative.dev/podspecable":"true","knative.dev/crd-install":"true","serving.knative.dev/release":"devel"},"name":"configurations.serving.knative.dev"},"spec":{"additionalPrinterColumns":[{"JSONPath":".status.latestCreatedRevisionName","name":"LatestCreated","type":"string"},{"JSONPath":".status.latestReadyRevisionName","name":"LatestReady","type":"string"},{"JSONPath":".status.conditions[?(@.type=='Ready')].status","name":"Ready","type":"string"},{"JSONPath":".status.conditions[?(@.type=='Ready')].reason","name":"Reason","type":"string"}],"group":"serving.knative.dev","names":{"categories":["all","knative","serving"],"kind":"Configuration","plural":"configurations","shortNames":["config","cfg"],"singular":"configuration"},"scope":"Namespaced","subresources":{"status":{}},"versions":[{"name":"v1alpha1","served":true,"storage":true},{"name":"v1beta1","served":true,"storage":false},{"name":"v1","served":true,"storage":false}]}} | |
creationTimestamp: "2019-12-03T10:54:07Z" | |
generation: 1 | |
labels: | |
duck.knative.dev/podspecable: "true" | |
knative.dev/crd-install: "true" | |
serving.knative.dev/release: devel | |
name: configurations.serving.knative.dev | |
resourceVersion: "43825" | |
selfLink: /apis/apiextensions.k8s.io/v1beta1/customresourcedefinitions/configurations.serving.knative.dev | |
uid: 3aa2051b-15bb-11ea-b5af-027e0b84da98 | |
spec: | |
additionalPrinterColumns: | |
- JSONPath: .status.latestCreatedRevisionName | |
name: LatestCreated | |
type: string | |
- JSONPath: .status.latestReadyRevisionName | |
name: LatestReady | |
type: string | |
- JSONPath: .status.conditions[?(@.type=='Ready')].status | |
name: Ready | |
type: string | |
- JSONPath: .status.conditions[?(@.type=='Ready')].reason | |
name: Reason | |
type: string | |
conversion: | |
strategy: None | |
group: serving.knative.dev | |
names: | |
categories: | |
- all | |
- knative | |
- serving | |
kind: Configuration | |
listKind: ConfigurationList | |
plural: configurations | |
shortNames: | |
- config | |
- cfg | |
singular: configuration | |
scope: Namespaced | |
subresources: | |
status: {} | |
version: v1alpha1 | |
versions: | |
- name: v1alpha1 | |
served: true | |
storage: true | |
- name: v1beta1 | |
served: true | |
storage: false | |
- name: v1 | |
served: true | |
storage: false | |
status: | |
acceptedNames: | |
categories: | |
- all | |
- knative | |
- serving | |
kind: Configuration | |
listKind: ConfigurationList | |
plural: configurations | |
shortNames: | |
- config | |
- cfg | |
singular: configuration | |
conditions: | |
- lastTransitionTime: "2019-12-03T10:54:07Z" | |
message: no conflicts found | |
reason: NoConflicts | |
status: "True" | |
type: NamesAccepted | |
- lastTransitionTime: null | |
message: the initial names have been accepted | |
reason: InitialNamesAccepted | |
status: "True" | |
type: Established | |
storedVersions: | |
- v1alpha1 | |
- apiVersion: apiextensions.k8s.io/v1beta1 | |
kind: CustomResourceDefinition | |
metadata: | |
annotations: | |
helm.sh/resource-policy: keep | |
kubectl.kubernetes.io/last-applied-configuration: | | |
{"apiVersion":"apiextensions.k8s.io/v1beta1","kind":"CustomResourceDefinition","metadata":{"annotations":{"helm.sh/resource-policy":"keep"},"creationTimestamp":null,"labels":{"app":"istio-pilot","chart":"istio","heritage":"Tiller","release":"istio"},"name":"destinationrules.networking.istio.io"},"spec":{"additionalPrinterColumns":[{"JSONPath":".spec.host","description":"The name of a service from the service registry","name":"Host","type":"string"},{"JSONPath":".metadata.creationTimestamp","description":"CreationTimestamp is a timestamp representing the server time when this object was created. It is not guaranteed to be set in happens-before order across separate operations. Clients may not set this value. It is represented in RFC3339 form and is in UTC.\nPopulated by the system. Read-only. Null for lists. More info: https://git.k8s.io/community/contributors/devel/api-conventions.md#metadata","name":"Age","type":"date"}],"group":"networking.istio.io","names":{"categories":["istio-io","networking-istio-io"],"kind":"DestinationRule","listKind":"DestinationRuleList","plural":"destinationrules","shortNames":["dr"],"singular":"destinationrule"},"scope":"Namespaced","subresources":{"status":{}},"validation":{"openAPIV3Schema":{"properties":{"spec":{"description":"Configuration affecting load balancing, outlier detection, etc. See more details at: https://istio.io/docs/reference/config/networking/v1alpha3/destination-rule.html","properties":{"exportTo":{"description":"A list of namespaces to which this destination rule is exported.","items":{"format":"string","type":"string"},"type":"array"},"host":{"description":"The name of a service from the service registry.","format":"string","type":"string"},"subsets":{"items":{"properties":{"labels":{"additionalProperties":{"format":"string","type":"string"},"type":"object"},"name":{"description":"Name of the subset.","format":"string","type":"string"},"trafficPolicy":{"description":"Traffic policies that apply to this subset.","properties":{"connectionPool":{"properties":{"http":{"description":"HTTP connection pool settings.","properties":{"h2UpgradePolicy":{"description":"Specify if http1.1 connection should be upgraded to http2 for the associated destination.","enum":["DEFAULT","DO_NOT_UPGRADE","UPGRADE"],"type":"string"},"http1MaxPendingRequests":{"description":"Maximum number of pending HTTP requests to a destination.","format":"int32","type":"integer"},"http2MaxRequests":{"description":"Maximum number of requests to a backend.","format":"int32","type":"integer"},"idleTimeout":{"description":"The idle timeout for upstream connection pool connections.","type":"string"},"maxRequestsPerConnection":{"description":"Maximum number of requests per connection to a backend.","format":"int32","type":"integer"},"maxRetries":{"format":"int32","type":"integer"}},"type":"object"},"tcp":{"description":"Settings common to both HTTP and TCP upstream connections.","properties":{"connectTimeout":{"description":"TCP connection timeout.","type":"string"},"maxConnections":{"description":"Maximum number of HTTP1 /TCP connections to a destination host.","format":"int32","type":"integer"},"tcpKeepalive":{"description":"If set then set SO_KEEPALIVE on the socket to enable TCP Keepalives.","properties":{"interval":{"description":"The time duration between keep-alive probes.","type":"string"},"probes":{"type":"integer"},"time":{"type":"string"}},"type":"object"}},"type":"object"}},"type":"object"},"loadBalancer":{"description":"Settings controlling the load balancer algorithms.","oneOf":[{"required":["simple"]},{"properties":{"consistentHash":{"oneOf":[{"required":["httpHeaderName"]},{"required":["httpCookie"]},{"required":["useSourceIp"]}]}},"required":["consistentHash"]}],"properties":{"consistentHash":{"properties":{"httpCookie":{"description":"Hash based on HTTP cookie.","properties":{"name":{"description":"Name of the cookie.","format":"string","type":"string"},"path":{"description":"Path to set for the cookie.","format":"string","type":"string"},"ttl":{"description":"Lifetime of the cookie.","type":"string"}},"type":"object"},"httpHeaderName":{"description":"Hash based on a specific HTTP header.","format":"string","type":"string"},"minimumRingSize":{"type":"integer"},"useSourceIp":{"description":"Hash based on the source IP address.","type":"boolean"}},"type":"object"},"simple":{"enum":["ROUND_ROBIN","LEAST_CONN","RANDOM","PASSTHROUGH"],"type":"string"}},"type":"object"},"outlierDetection":{"properties":{"baseEjectionTime":{"description":"Minimum ejection duration.","type":"string"},"consecutiveErrors":{"format":"int32","type":"integer"},"interval":{"description":"Time interval between ejection sweep analysis.","type":"string"},"maxEjectionPercent":{"format":"int32","type":"integer"},"minHealthPercent":{"format":"int32","type":"integer"}},"type":"object"},"portLevelSettings":{"description":"Traffic policies specific to individual ports.","items":{"properties":{"connectionPool":{"properties":{"http":{"description":"HTTP connection pool settings.","properties":{"h2UpgradePolicy":{"description":"Specify if http1.1 connection should be upgraded to http2 for the associated destination.","enum":["DEFAULT","DO_NOT_UPGRADE","UPGRADE"],"type":"string"},"http1MaxPendingRequests":{"description":"Maximum number of pending HTTP requests to a destination.","format":"int32","type":"integer"},"http2MaxRequests":{"description":"Maximum number of requests to a backend.","format":"int32","type":"integer"},"idleTimeout":{"description":"The idle timeout for upstream connection pool connections.","type":"string"},"maxRequestsPerConnection":{"description":"Maximum number of requests per connection to a backend.","format":"int32","type":"integer"},"maxRetries":{"format":"int32","type":"integer"}},"type":"object"},"tcp":{"description":"Settings common to both HTTP and TCP upstream connections.","properties":{"connectTimeout":{"description":"TCP connection timeout.","type":"string"},"maxConnections":{"description":"Maximum number of HTTP1 /TCP connections to a destination host.","format":"int32","type":"integer"},"tcpKeepalive":{"description":"If set then set SO_KEEPALIVE on the socket to enable TCP Keepalives.","properties":{"interval":{"description":"The time duration between keep-alive probes.","type":"string"},"probes":{"type":"integer"},"time":{"type":"string"}},"type":"object"}},"type":"object"}},"type":"object"},"loadBalancer":{"description":"Settings controlling the load balancer algorithms.","oneOf":[{"required":["simple"]},{"properties":{"consistentHash":{"oneOf":[{"required":["httpHeaderName"]},{"required":["httpCookie"]},{"required":["useSourceIp"]}]}},"required":["consistentHash"]}],"properties":{"consistentHash":{"properties":{"httpCookie":{"description":"Hash based on HTTP cookie.","properties":{"name":{"description":"Name of the cookie.","format":"string","type":"string"},"path":{"description":"Path to set for the cookie.","format":"string","type":"string"},"ttl":{"description":"Lifetime of the cookie.","type":"string"}},"type":"object"},"httpHeaderName":{"description":"Hash based on a specific HTTP header.","format":"string","type":"string"},"minimumRingSize":{"type":"integer"},"useSourceIp":{"description":"Hash based on the source IP address.","type":"boolean"}},"type":"object"},"simple":{"enum":["ROUND_ROBIN","LEAST_CONN","RANDOM","PASSTHROUGH"],"type":"string"}},"type":"object"},"outlierDetection":{"properties":{"baseEjectionTime":{"description":"Minimum ejection duration.","type":"string"},"consecutiveErrors":{"format":"int32","type":"integer"},"interval":{"description":"Time interval between ejection sweep analysis.","type":"string"},"maxEjectionPercent":{"format":"int32","type":"integer"},"minHealthPercent":{"format":"int32","type":"integer"}},"type":"object"},"port":{"properties":{"number":{"type":"integer"}},"type":"object"},"tls":{"description":"TLS related settings for connections to the upstream service.","properties":{"caCertificates":{"format":"string","type":"string"},"clientCertificate":{"description":"REQUIRED if mode is `MUTUAL`.","format":"string","type":"string"},"mode":{"enum":["DISABLE","SIMPLE","MUTUAL","ISTIO_MUTUAL"],"type":"string"},"privateKey":{"description":"REQUIRED if mode is `MUTUAL`.","format":"string","type":"string"},"sni":{"description":"SNI string to present to the server during TLS handshake.","format":"string","type":"string"},"subjectAltNames":{"items":{"format":"string","type":"string"},"type":"array"}},"type":"object"}},"type":"object"},"type":"array"},"tls":{"description":"TLS related settings for connections to the upstream service.","properties":{"caCertificates":{"format":"string","type":"string"},"clientCertificate":{"description":"REQUIRED if mode is `MUTUAL`.","format":"string","type":"string"},"mode":{"enum":["DISABLE","SIMPLE","MUTUAL","ISTIO_MUTUAL"],"type":"string"},"privateKey":{"description":"REQUIRED if mode is `MUTUAL`.","format":"string","type":"string"},"sni":{"description":"SNI string to present to the server during TLS handshake.","format":"string","type":"string"},"subjectAltNames":{"items":{"format":"string","type":"string"},"type":"array"}},"type":"object"}},"type":"object"}},"type":"object"},"type":"array"},"trafficPolicy":{"properties":{"connectionPool":{"properties":{"http":{"description":"HTTP connection pool settings.","properties":{"h2UpgradePolicy":{"description":"Specify if http1.1 connection should be upgraded to http2 for the associated destination.","enum":["DEFAULT","DO_NOT_UPGRADE","UPGRADE"],"type":"string"},"http1MaxPendingRequests":{"description":"Maximum number of pending HTTP requests to a destination.","format":"int32","type":"integer"},"http2MaxRequests":{"description":"Maximum number of requests to a backend.","format":"int32","type":"integer"},"idleTimeout":{"description":"The idle timeout for upstream connection pool connections.","type":"string"},"maxRequestsPerConnection":{"description":"Maximum number of requests per connection to a backend.","format":"int32","type":"integer"},"maxRetries":{"format":"int32","type":"integer"}},"type":"object"},"tcp":{"description":"Settings common to both HTTP and TCP upstream connections.","properties":{"connectTimeout":{"description":"TCP connection timeout.","type":"string"},"maxConnections":{"description":"Maximum number of HTTP1 /TCP connections to a destination host.","format":"int32","type":"integer"},"tcpKeepalive":{"description":"If set then set SO_KEEPALIVE on the socket to enable TCP Keepalives.","properties":{"interval":{"description":"The time duration between keep-alive probes.","type":"string"},"probes":{"type":"integer"},"time":{"type":"string"}},"type":"object"}},"type":"object"}},"type":"object"},"loadBalancer":{"description":"Settings controlling the load balancer algorithms.","oneOf":[{"required":["simple"]},{"properties":{"consistentHash":{"oneOf":[{"required":["httpHeaderName"]},{"required":["httpCookie"]},{"required":["useSourceIp"]}]}},"required":["consistentHash"]}],"properties":{"consistentHash":{"properties":{"httpCookie":{"description":"Hash based on HTTP cookie.","properties":{"name":{"description":"Name of the cookie.","format":"string","type":"string"},"path":{"description":"Path to set for the cookie.","format":"string","type":"string"},"ttl":{"description":"Lifetime of the cookie.","type":"string"}},"type":"object"},"httpHeaderName":{"description":"Hash based on a specific HTTP header.","format":"string","type":"string"},"minimumRingSize":{"type":"integer"},"useSourceIp":{"description":"Hash based on the source IP address.","type":"boolean"}},"type":"object"},"simple":{"enum":["ROUND_ROBIN","LEAST_CONN","RANDOM","PASSTHROUGH"],"type":"string"}},"type":"object"},"outlierDetection":{"properties":{"baseEjectionTime":{"description":"Minimum ejection duration.","type":"string"},"consecutiveErrors":{"format":"int32","type":"integer"},"interval":{"description":"Time interval between ejection sweep analysis.","type":"string"},"maxEjectionPercent":{"format":"int32","type":"integer"},"minHealthPercent":{"format":"int32","type":"integer"}},"type":"object"},"portLevelSettings":{"description":"Traffic policies specific to individual ports.","items":{"properties":{"connectionPool":{"properties":{"http":{"description":"HTTP connection pool settings.","properties":{"h2UpgradePolicy":{"description":"Specify if http1.1 connection should be upgraded to http2 for the associated destination.","enum":["DEFAULT","DO_NOT_UPGRADE","UPGRADE"],"type":"string"},"http1MaxPendingRequests":{"description":"Maximum number of pending HTTP requests to a destination.","format":"int32","type":"integer"},"http2MaxRequests":{"description":"Maximum number of requests to a backend.","format":"int32","type":"integer"},"idleTimeout":{"description":"The idle timeout for upstream connection pool connections.","type":"string"},"maxRequestsPerConnection":{"description":"Maximum number of requests per connection to a backend.","format":"int32","type":"integer"},"maxRetries":{"format":"int32","type":"integer"}},"type":"object"},"tcp":{"description":"Settings common to both HTTP and TCP upstream connections.","properties":{"connectTimeout":{"description":"TCP connection timeout.","type":"string"},"maxConnections":{"description":"Maximum number of HTTP1 /TCP connections to a destination host.","format":"int32","type":"integer"},"tcpKeepalive":{"description":"If set then set SO_KEEPALIVE on the socket to enable TCP Keepalives.","properties":{"interval":{"description":"The time duration between keep-alive probes.","type":"string"},"probes":{"type":"integer"},"time":{"type":"string"}},"type":"object"}},"type":"object"}},"type":"object"},"loadBalancer":{"description":"Settings controlling the load balancer algorithms.","oneOf":[{"required":["simple"]},{"properties":{"consistentHash":{"oneOf":[{"required":["httpHeaderName"]},{"required":["httpCookie"]},{"required":["useSourceIp"]}]}},"required":["consistentHash"]}],"properties":{"consistentHash":{"properties":{"httpCookie":{"description":"Hash based on HTTP cookie.","properties":{"name":{"description":"Name of the cookie.","format":"string","type":"string"},"path":{"description":"Path to set for the cookie.","format":"string","type":"string"},"ttl":{"description":"Lifetime of the cookie.","type":"string"}},"type":"object"},"httpHeaderName":{"description":"Hash based on a specific HTTP header.","format":"string","type":"string"},"minimumRingSize":{"type":"integer"},"useSourceIp":{"description":"Hash based on the source IP address.","type":"boolean"}},"type":"object"},"simple":{"enum":["ROUND_ROBIN","LEAST_CONN","RANDOM","PASSTHROUGH"],"type":"string"}},"type":"object"},"outlierDetection":{"properties":{"baseEjectionTime":{"description":"Minimum ejection duration.","type":"string"},"consecutiveErrors":{"format":"int32","type":"integer"},"interval":{"description":"Time interval between ejection sweep analysis.","type":"string"},"maxEjectionPercent":{"format":"int32","type":"integer"},"minHealthPercent":{"format":"int32","type":"integer"}},"type":"object"},"port":{"properties":{"number":{"type":"integer"}},"type":"object"},"tls":{"description":"TLS related settings for connections to the upstream service.","properties":{"caCertificates":{"format":"string","type":"string"},"clientCertificate":{"description":"REQUIRED if mode is `MUTUAL`.","format":"string","type":"string"},"mode":{"enum":["DISABLE","SIMPLE","MUTUAL","ISTIO_MUTUAL"],"type":"string"},"privateKey":{"description":"REQUIRED if mode is `MUTUAL`.","format":"string","type":"string"},"sni":{"description":"SNI string to present to the server during TLS handshake.","format":"string","type":"string"},"subjectAltNames":{"items":{"format":"string","type":"string"},"type":"array"}},"type":"object"}},"type":"object"},"type":"array"},"tls":{"description":"TLS related settings for connections to the upstream service.","properties":{"caCertificates":{"format":"string","type":"string"},"clientCertificate":{"description":"REQUIRED if mode is `MUTUAL`.","format":"string","type":"string"},"mode":{"enum":["DISABLE","SIMPLE","MUTUAL","ISTIO_MUTUAL"],"type":"string"},"privateKey":{"description":"REQUIRED if mode is `MUTUAL`.","format":"string","type":"string"},"sni":{"description":"SNI string to present to the server during TLS handshake.","format":"string","type":"string"},"subjectAltNames":{"items":{"format":"string","type":"string"},"type":"array"}},"type":"object"}},"type":"object"}},"type":"object"}},"type":"object"}},"versions":[{"name":"v1alpha3","served":true,"storage":true}]},"status":{"acceptedNames":{"kind":"","plural":""},"conditions":[],"storedVersions":[]}} | |
creationTimestamp: "2019-12-03T04:51:48Z" | |
generation: 3 | |
labels: | |
app: istio-pilot | |
chart: istio | |
heritage: Tiller | |
release: istio | |
name: destinationrules.networking.istio.io | |
resourceVersion: "43300" | |
selfLink: /apis/apiextensions.k8s.io/v1beta1/customresourcedefinitions/destinationrules.networking.istio.io | |
uid: 9d3e5eb1-1588-11ea-b5af-027e0b84da98 | |
spec: | |
additionalPrinterColumns: | |
- JSONPath: .spec.host | |
description: The name of a service from the service registry | |
name: Host | |
type: string | |
- JSONPath: .metadata.creationTimestamp | |
description: |- | |
CreationTimestamp is a timestamp representing the server time when this object was created. It is not guaranteed to be set in happens-before order across separate operations. Clients may not set this value. It is represented in RFC3339 form and is in UTC. | |
Populated by the system. Read-only. Null for lists. More info: https://git.k8s.io/community/contributors/devel/api-conventions.md#metadata | |
name: Age | |
type: date | |
conversion: | |
strategy: None | |
group: networking.istio.io | |
names: | |
categories: | |
- istio-io | |
- networking-istio-io | |
kind: DestinationRule | |
listKind: DestinationRuleList | |
plural: destinationrules | |
shortNames: | |
- dr | |
singular: destinationrule | |
scope: Namespaced | |
subresources: | |
status: {} | |
validation: | |
openAPIV3Schema: | |
properties: | |
spec: | |
description: 'Configuration affecting load balancing, outlier detection, | |
etc. See more details at: https://istio.io/docs/reference/config/networking/v1alpha3/destination-rule.html' | |
properties: | |
exportTo: | |
description: A list of namespaces to which this destination rule is | |
exported. | |
items: | |
format: string | |
type: string | |
type: array | |
host: | |
description: The name of a service from the service registry. | |
format: string | |
type: string | |
subsets: | |
items: | |
properties: | |
labels: | |
additionalProperties: | |
format: string | |
type: string | |
type: object | |
name: | |
description: Name of the subset. | |
format: string | |
type: string | |
trafficPolicy: | |
description: Traffic policies that apply to this subset. | |
properties: | |
connectionPool: | |
properties: | |
http: | |
description: HTTP connection pool settings. | |
properties: | |
h2UpgradePolicy: | |
description: Specify if http1.1 connection should | |
be upgraded to http2 for the associated destination. | |
enum: | |
- DEFAULT | |
- DO_NOT_UPGRADE | |
- UPGRADE | |
type: string | |
http1MaxPendingRequests: | |
description: Maximum number of pending HTTP requests | |
to a destination. | |
format: int32 | |
type: integer | |
http2MaxRequests: | |
description: Maximum number of requests to a backend. | |
format: int32 | |
type: integer | |
idleTimeout: | |
description: The idle timeout for upstream connection | |
pool connections. | |
type: string | |
maxRequestsPerConnection: | |
description: Maximum number of requests per connection | |
to a backend. | |
format: int32 | |
type: integer | |
maxRetries: | |
format: int32 | |
type: integer | |
type: object | |
tcp: | |
description: Settings common to both HTTP and TCP upstream | |
connections. | |
properties: | |
connectTimeout: | |
description: TCP connection timeout. | |
type: string | |
maxConnections: | |
description: Maximum number of HTTP1 /TCP connections | |
to a destination host. | |
format: int32 | |
type: integer | |
tcpKeepalive: | |
description: If set then set SO_KEEPALIVE on the | |
socket to enable TCP Keepalives. | |
properties: | |
interval: | |
description: The time duration between keep-alive | |
probes. | |
type: string | |
probes: | |
type: integer | |
time: | |
type: string | |
type: object | |
type: object | |
type: object | |
loadBalancer: | |
description: Settings controlling the load balancer algorithms. | |
oneOf: | |
- required: | |
- simple | |
- properties: | |
consistentHash: | |
oneOf: | |
- required: | |
- httpHeaderName | |
- required: | |
- httpCookie | |
- required: | |
- useSourceIp | |
required: | |
- consistentHash | |
properties: | |
consistentHash: | |
properties: | |
httpCookie: | |
description: Hash based on HTTP cookie. | |
properties: | |
name: | |
description: Name of the cookie. | |
format: string | |
type: string | |
path: | |
description: Path to set for the cookie. | |
format: string | |
type: string | |
ttl: | |
description: Lifetime of the cookie. | |
type: string | |
type: object | |
httpHeaderName: | |
description: Hash based on a specific HTTP header. | |
format: string | |
type: string | |
minimumRingSize: | |
type: integer | |
useSourceIp: | |
description: Hash based on the source IP address. | |
type: boolean | |
type: object | |
simple: | |
enum: | |
- ROUND_ROBIN | |
- LEAST_CONN | |
- RANDOM | |
- PASSTHROUGH | |
type: string | |
type: object | |
outlierDetection: | |
properties: | |
baseEjectionTime: | |
description: Minimum ejection duration. | |
type: string | |
consecutiveErrors: | |
format: int32 | |
type: integer | |
interval: | |
description: Time interval between ejection sweep analysis. | |
type: string | |
maxEjectionPercent: | |
format: int32 | |
type: integer | |
minHealthPercent: | |
format: int32 | |
type: integer | |
type: object | |
portLevelSettings: | |
description: Traffic policies specific to individual ports. | |
items: | |
properties: | |
connectionPool: | |
properties: | |
http: | |
description: HTTP connection pool settings. | |
properties: | |
h2UpgradePolicy: | |
description: Specify if http1.1 connection | |
should be upgraded to http2 for the associated | |
destination. | |
enum: | |
- DEFAULT | |
- DO_NOT_UPGRADE | |
- UPGRADE | |
type: string | |
http1MaxPendingRequests: | |
description: Maximum number of pending HTTP | |
requests to a destination. | |
format: int32 | |
type: integer | |
http2MaxRequests: | |
description: Maximum number of requests to | |
a backend. | |
format: int32 | |
type: integer | |
idleTimeout: | |
description: The idle timeout for upstream | |
connection pool connections. | |
type: string | |
maxRequestsPerConnection: | |
description: Maximum number of requests per | |
connection to a backend. | |
format: int32 | |
type: integer | |
maxRetries: | |
format: int32 | |
type: integer | |
type: object | |
tcp: | |
description: Settings common to both HTTP and | |
TCP upstream connections. | |
properties: | |
connectTimeout: | |
description: TCP connection timeout. | |
type: string | |
maxConnections: | |
description: Maximum number of HTTP1 /TCP | |
connections to a destination host. | |
format: int32 | |
type: integer | |
tcpKeepalive: | |
description: If set then set SO_KEEPALIVE | |
on the socket to enable TCP Keepalives. | |
properties: | |
interval: | |
description: The time duration between | |
keep-alive probes. | |
type: string | |
probes: | |
type: integer | |
time: | |
type: string | |
type: object | |
type: object | |
type: object | |
loadBalancer: | |
description: Settings controlling the load balancer | |
algorithms. | |
oneOf: | |
- required: | |
- simple | |
- properties: | |
consistentHash: | |
oneOf: | |
- required: | |
- httpHeaderName | |
- required: | |
- httpCookie | |
- required: | |
- useSourceIp | |
required: | |
- consistentHash | |
properties: | |
consistentHash: | |
properties: | |
httpCookie: | |
description: Hash based on HTTP cookie. | |
properties: | |
name: | |
description: Name of the cookie. | |
format: string | |
type: string | |
path: | |
description: Path to set for the cookie. | |
format: string | |
type: string | |
ttl: | |
description: Lifetime of the cookie. | |
type: string | |
type: object | |
httpHeaderName: | |
description: Hash based on a specific HTTP | |
header. | |
format: string | |
type: string | |
minimumRingSize: | |
type: integer | |
useSourceIp: | |
description: Hash based on the source IP address. | |
type: boolean | |
type: object | |
simple: | |
enum: | |
- ROUND_ROBIN | |
- LEAST_CONN | |
- RANDOM | |
- PASSTHROUGH | |
type: string | |
type: object | |
outlierDetection: | |
properties: | |
baseEjectionTime: | |
description: Minimum ejection duration. | |
type: string | |
consecutiveErrors: | |
format: int32 | |
type: integer | |
interval: | |
description: Time interval between ejection sweep | |
analysis. | |
type: string | |
maxEjectionPercent: | |
format: int32 | |
type: integer | |
minHealthPercent: | |
format: int32 | |
type: integer | |
type: object | |
port: | |
properties: | |
number: | |
type: integer | |
type: object | |
tls: | |
description: TLS related settings for connections | |
to the upstream service. | |
properties: | |
caCertificates: | |
format: string | |
type: string | |
clientCertificate: | |
description: REQUIRED if mode is `MUTUAL`. | |
format: string | |
type: string | |
mode: | |
enum: | |
- DISABLE | |
- SIMPLE | |
- MUTUAL | |
- ISTIO_MUTUAL | |
type: string | |
privateKey: | |
description: REQUIRED if mode is `MUTUAL`. | |
format: string | |
type: string | |
sni: | |
description: SNI string to present to the server | |
during TLS handshake. | |
format: string | |
type: string | |
subjectAltNames: | |
items: | |
format: string | |
type: string | |
type: array | |
type: object | |
type: object | |
type: array | |
tls: | |
description: TLS related settings for connections to the | |
upstream service. | |
properties: | |
caCertificates: | |
format: string | |
type: string | |
clientCertificate: | |
description: REQUIRED if mode is `MUTUAL`. | |
format: string | |
type: string | |
mode: | |
enum: | |
- DISABLE | |
- SIMPLE | |
- MUTUAL | |
- ISTIO_MUTUAL | |
type: string | |
privateKey: | |
description: REQUIRED if mode is `MUTUAL`. | |
format: string | |
type: string | |
sni: | |
description: SNI string to present to the server during | |
TLS handshake. | |
format: string | |
type: string | |
subjectAltNames: | |
items: | |
format: string | |
type: string | |
type: array | |
type: object | |
type: object | |
type: object | |
type: array | |
trafficPolicy: | |
properties: | |
connectionPool: | |
properties: | |
http: | |
description: HTTP connection pool settings. | |
properties: | |
h2UpgradePolicy: | |
description: Specify if http1.1 connection should be upgraded | |
to http2 for the associated destination. | |
enum: | |
- DEFAULT | |
- DO_NOT_UPGRADE | |
- UPGRADE | |
type: string | |
http1MaxPendingRequests: | |
description: Maximum number of pending HTTP requests to | |
a destination. | |
format: int32 | |
type: integer | |
http2MaxRequests: | |
description: Maximum number of requests to a backend. | |
format: int32 | |
type: integer | |
idleTimeout: | |
description: The idle timeout for upstream connection | |
pool connections. | |
type: string | |
maxRequestsPerConnection: | |
description: Maximum number of requests per connection | |
to a backend. | |
format: int32 | |
type: integer | |
maxRetries: | |
format: int32 | |
type: integer | |
type: object | |
tcp: | |
description: Settings common to both HTTP and TCP upstream | |
connections. | |
properties: | |
connectTimeout: | |
description: TCP connection timeout. | |
type: string | |
maxConnections: | |
description: Maximum number of HTTP1 /TCP connections | |
to a destination host. | |
format: int32 | |
type: integer | |
tcpKeepalive: | |
description: If set then set SO_KEEPALIVE on the socket | |
to enable TCP Keepalives. | |
properties: | |
interval: | |
description: The time duration between keep-alive | |
probes. | |
type: string | |
probes: | |
type: integer | |
time: | |
type: string | |
type: object | |
type: object | |
type: object | |
loadBalancer: | |
description: Settings controlling the load balancer algorithms. | |
oneOf: | |
- required: | |
- simple | |
- properties: | |
consistentHash: | |
oneOf: | |
- required: | |
- httpHeaderName | |
- required: | |
- httpCookie | |
- required: | |
- useSourceIp | |
required: | |
- consistentHash | |
properties: | |
consistentHash: | |
properties: | |
httpCookie: | |
description: Hash based on HTTP cookie. | |
properties: | |
name: | |
description: Name of the cookie. | |
format: string | |
type: string | |
path: | |
description: Path to set for the cookie. | |
format: string | |
type: string | |
ttl: | |
description: Lifetime of the cookie. | |
type: string | |
type: object | |
httpHeaderName: | |
description: Hash based on a specific HTTP header. | |
format: string | |
type: string | |
minimumRingSize: | |
type: integer | |
useSourceIp: | |
description: Hash based on the source IP address. | |
type: boolean | |
type: object | |
simple: | |
enum: | |
- ROUND_ROBIN | |
- LEAST_CONN | |
- RANDOM | |
- PASSTHROUGH | |
type: string | |
type: object | |
outlierDetection: | |
properties: | |
baseEjectionTime: | |
description: Minimum ejection duration. | |
type: string | |
consecutiveErrors: | |
format: int32 | |
type: integer | |
interval: | |
description: Time interval between ejection sweep analysis. | |
type: string | |
maxEjectionPercent: | |
format: int32 | |
type: integer | |
minHealthPercent: | |
format: int32 | |
type: integer | |
type: object | |
portLevelSettings: | |
description: Traffic policies specific to individual ports. | |
items: | |
properties: | |
connectionPool: | |
properties: | |
http: | |
description: HTTP connection pool settings. | |
properties: | |
h2UpgradePolicy: | |
description: Specify if http1.1 connection should | |
be upgraded to http2 for the associated destination. | |
enum: | |
- DEFAULT | |
- DO_NOT_UPGRADE | |
- UPGRADE | |
type: string | |
http1MaxPendingRequests: | |
description: Maximum number of pending HTTP requests | |
to a destination. | |
format: int32 | |
type: integer | |
http2MaxRequests: | |
description: Maximum number of requests to a backend. | |
format: int32 | |
type: integer | |
idleTimeout: | |
description: The idle timeout for upstream connection | |
pool connections. | |
type: string | |
maxRequestsPerConnection: | |
description: Maximum number of requests per connection | |
to a backend. | |
format: int32 | |
type: integer | |
maxRetries: | |
format: int32 | |
type: integer | |
type: object | |
tcp: | |
description: Settings common to both HTTP and TCP upstream | |
connections. | |
properties: | |
connectTimeout: | |
description: TCP connection timeout. | |
type: string | |
maxConnections: | |
description: Maximum number of HTTP1 /TCP connections | |
to a destination host. | |
format: int32 | |
type: integer | |
tcpKeepalive: | |
description: If set then set SO_KEEPALIVE on the | |
socket to enable TCP Keepalives. | |
properties: | |
interval: | |
description: The time duration between keep-alive | |
probes. | |
type: string | |
probes: | |
type: integer | |
time: | |
type: string | |
type: object | |
type: object | |
type: object | |
loadBalancer: | |
description: Settings controlling the load balancer algorithms. | |
oneOf: | |
- required: | |
- simple | |
- properties: | |
consistentHash: | |
oneOf: | |
- required: | |
- httpHeaderName | |
- required: | |
- httpCookie | |
- required: | |
- useSourceIp | |
required: | |
- consistentHash | |
properties: | |
consistentHash: | |
properties: | |
httpCookie: | |
description: Hash based on HTTP cookie. | |
properties: | |
name: | |
description: Name of the cookie. | |
format: string | |
type: string | |
path: | |
description: Path to set for the cookie. | |
format: string | |
type: string | |
ttl: | |
description: Lifetime of the cookie. | |
type: string | |
type: object | |
httpHeaderName: | |
description: Hash based on a specific HTTP header. | |
format: string | |
type: string | |
minimumRingSize: | |
type: integer | |
useSourceIp: | |
description: Hash based on the source IP address. | |
type: boolean | |
type: object | |
simple: | |
enum: | |
- ROUND_ROBIN | |
- LEAST_CONN | |
- RANDOM | |
- PASSTHROUGH | |
type: string | |
type: object | |
outlierDetection: | |
properties: | |
baseEjectionTime: | |
description: Minimum ejection duration. | |
type: string | |
consecutiveErrors: | |
format: int32 | |
type: integer | |
interval: | |
description: Time interval between ejection sweep analysis. | |
type: string | |
maxEjectionPercent: | |
format: int32 | |
type: integer | |
minHealthPercent: | |
format: int32 | |
type: integer | |
type: object | |
port: | |
properties: | |
number: | |
type: integer | |
type: object | |
tls: | |
description: TLS related settings for connections to the | |
upstream service. | |
properties: | |
caCertificates: | |
format: string | |
type: string | |
clientCertificate: | |
description: REQUIRED if mode is `MUTUAL`. | |
format: string | |
type: string | |
mode: | |
enum: | |
- DISABLE | |
- SIMPLE | |
- MUTUAL | |
- ISTIO_MUTUAL | |
type: string | |
privateKey: | |
description: REQUIRED if mode is `MUTUAL`. | |
format: string | |
type: string | |
sni: | |
description: SNI string to present to the server during | |
TLS handshake. | |
format: string | |
type: string | |
subjectAltNames: | |
items: | |
format: string | |
type: string | |
type: array | |
type: object | |
type: object | |
type: array | |
tls: | |
description: TLS related settings for connections to the upstream | |
service. | |
properties: | |
caCertificates: | |
format: string | |
type: string | |
clientCertificate: | |
description: REQUIRED if mode is `MUTUAL`. | |
format: string | |
type: string | |
mode: | |
enum: | |
- DISABLE | |
- SIMPLE | |
- MUTUAL | |
- ISTIO_MUTUAL | |
type: string | |
privateKey: | |
description: REQUIRED if mode is `MUTUAL`. | |
format: string | |
type: string | |
sni: | |
description: SNI string to present to the server during TLS | |
handshake. | |
format: string | |
type: string | |
subjectAltNames: | |
items: | |
format: string | |
type: string | |
type: array | |
type: object | |
type: object | |
type: object | |
type: object | |
version: v1alpha3 | |
versions: | |
- name: v1alpha3 | |
served: true | |
storage: true | |
status: | |
acceptedNames: | |
categories: | |
- istio-io | |
- networking-istio-io | |
kind: DestinationRule | |
listKind: DestinationRuleList | |
plural: destinationrules | |
shortNames: | |
- dr | |
singular: destinationrule | |
conditions: | |
- lastTransitionTime: "2019-12-03T04:51:48Z" | |
message: no conflicts found | |
reason: NoConflicts | |
status: "True" | |
type: NamesAccepted | |
- lastTransitionTime: null | |
message: the initial names have been accepted | |
reason: InitialNamesAccepted | |
status: "True" | |
type: Established | |
storedVersions: | |
- v1alpha3 | |
- apiVersion: apiextensions.k8s.io/v1beta1 | |
kind: CustomResourceDefinition | |
metadata: | |
annotations: | |
kubectl.kubernetes.io/last-applied-configuration: | | |
{"apiVersion":"apiextensions.k8s.io/v1beta1","kind":"CustomResourceDefinition","metadata":{"annotations":{},"name":"eniconfigs.crd.k8s.amazonaws.com"},"spec":{"group":"crd.k8s.amazonaws.com","names":{"kind":"ENIConfig","plural":"eniconfigs","singular":"eniconfig"},"scope":"Cluster","versions":[{"name":"v1alpha1","served":true,"storage":true}]}} | |
creationTimestamp: "2019-12-03T04:44:14Z" | |
generation: 1 | |
name: eniconfigs.crd.k8s.amazonaws.com | |
resourceVersion: "379" | |
selfLink: /apis/apiextensions.k8s.io/v1beta1/customresourcedefinitions/eniconfigs.crd.k8s.amazonaws.com | |
uid: 8e5af533-1587-11ea-b5af-027e0b84da98 | |
spec: | |
conversion: | |
strategy: None | |
group: crd.k8s.amazonaws.com | |
names: | |
kind: ENIConfig | |
listKind: ENIConfigList | |
plural: eniconfigs | |
singular: eniconfig | |
scope: Cluster | |
version: v1alpha1 | |
versions: | |
- name: v1alpha1 | |
served: true | |
storage: true | |
status: | |
acceptedNames: | |
kind: ENIConfig | |
listKind: ENIConfigList | |
plural: eniconfigs | |
singular: eniconfig | |
conditions: | |
- lastTransitionTime: "2019-12-03T04:44:14Z" | |
message: no conflicts found | |
reason: NoConflicts | |
status: "True" | |
type: NamesAccepted | |
- lastTransitionTime: null | |
message: the initial names have been accepted | |
reason: InitialNamesAccepted | |
status: "True" | |
type: Established | |
storedVersions: | |
- v1alpha1 | |
- apiVersion: apiextensions.k8s.io/v1beta1 | |
kind: CustomResourceDefinition | |
metadata: | |
annotations: | |
helm.sh/resource-policy: keep | |
kubectl.kubernetes.io/last-applied-configuration: | | |
{"apiVersion":"apiextensions.k8s.io/v1beta1","kind":"CustomResourceDefinition","metadata":{"annotations":{"helm.sh/resource-policy":"keep"},"creationTimestamp":null,"labels":{"app":"istio-pilot","chart":"istio","heritage":"Tiller","release":"istio"},"name":"envoyfilters.networking.istio.io"},"spec":{"group":"networking.istio.io","names":{"categories":["istio-io","networking-istio-io"],"kind":"EnvoyFilter","plural":"envoyfilters","singular":"envoyfilter"},"scope":"Namespaced","subresources":{"status":{}},"validation":{"openAPIV3Schema":{"properties":{"spec":{"description":"Customizing Envoy configuration generated by Istio. See more details at: https://istio.io/docs/reference/config/networking/v1alpha3/envoy-filter.html","properties":{"configPatches":{"description":"One or more patches with match conditions.","items":{"properties":{"applyTo":{"enum":["INVALID","LISTENER","FILTER_CHAIN","NETWORK_FILTER","HTTP_FILTER","ROUTE_CONFIGURATION","VIRTUAL_HOST","HTTP_ROUTE","CLUSTER"],"type":"string"},"match":{"description":"Match on listener/route configuration/cluster.","oneOf":[{"required":["listener"]},{"required":["routeConfiguration"]},{"required":["cluster"]}],"properties":{"cluster":{"description":"Match on envoy cluster attributes.","properties":{"name":{"description":"The exact name of the cluster to match.","format":"string","type":"string"},"portNumber":{"description":"The service port for which this cluster was generated.","type":"integer"},"service":{"description":"The fully qualified service name for this cluster.","format":"string","type":"string"},"subset":{"description":"The subset associated with the service.","format":"string","type":"string"}},"type":"object"},"context":{"description":"The specific config generation context to match on.","enum":["ANY","SIDECAR_INBOUND","SIDECAR_OUTBOUND","GATEWAY"],"type":"string"},"listener":{"description":"Match on envoy listener attributes.","properties":{"filterChain":{"description":"Match a specific filter chain in a listener.","properties":{"applicationProtocols":{"description":"Applies only to sidecars.","format":"string","type":"string"},"filter":{"description":"The name of a specific filter to apply the patch to.","properties":{"name":{"description":"The filter name to match on.","format":"string","type":"string"},"subFilter":{"properties":{"name":{"description":"The filter name to match on.","format":"string","type":"string"}},"type":"object"}},"type":"object"},"name":{"description":"The name assigned to the filter chain.","format":"string","type":"string"},"sni":{"description":"The SNI value used by a filter chain's match condition.","format":"string","type":"string"},"transportProtocol":{"description":"Applies only to SIDECAR_INBOUND context.","format":"string","type":"string"}},"type":"object"},"name":{"description":"Match a specific listener by its name.","format":"string","type":"string"},"portName":{"format":"string","type":"string"},"portNumber":{"type":"integer"}},"type":"object"},"proxy":{"description":"Match on properties associated with a proxy.","properties":{"metadata":{"additionalProperties":{"format":"string","type":"string"},"type":"object"},"proxyVersion":{"format":"string","type":"string"}},"type":"object"},"routeConfiguration":{"description":"Match on envoy HTTP route configuration attributes.","properties":{"gateway":{"format":"string","type":"string"},"name":{"description":"Route configuration name to match on.","format":"string","type":"string"},"portName":{"description":"Applicable only for GATEWAY context.","format":"string","type":"string"},"portNumber":{"type":"integer"},"vhost":{"properties":{"name":{"format":"string","type":"string"},"route":{"description":"Match a specific route within the virtual host.","properties":{"action":{"description":"Match a route with specific action type.","enum":["ANY","ROUTE","REDIRECT","DIRECT_RESPONSE"],"type":"string"},"name":{"format":"string","type":"string"}},"type":"object"}},"type":"object"}},"type":"object"}},"type":"object"},"patch":{"description":"The patch to apply along with the operation.","properties":{"operation":{"description":"Determines how the patch should be applied.","enum":["INVALID","MERGE","ADD","REMOVE","INSERT_BEFORE","INSERT_AFTER"],"type":"string"},"value":{"description":"The JSON config of the object being patched.","type":"object"}},"type":"object"}},"type":"object"},"type":"array"},"filters":{"items":{"properties":{"filterConfig":{"type":"object"},"filterName":{"description":"The name of the filter to instantiate.","format":"string","type":"string"},"filterType":{"description":"The type of filter to instantiate.","enum":["INVALID","HTTP","NETWORK"],"type":"string"},"insertPosition":{"description":"Insert position in the filter chain.","properties":{"index":{"description":"Position of this filter in the filter chain.","enum":["FIRST","LAST","BEFORE","AFTER"],"type":"string"},"relativeTo":{"format":"string","type":"string"}},"type":"object"},"listenerMatch":{"properties":{"address":{"description":"One or more IP addresses to which the listener is bound.","items":{"format":"string","type":"string"},"type":"array"},"listenerProtocol":{"description":"Selects a class of listeners for the same protocol.","enum":["ALL","HTTP","TCP"],"type":"string"},"listenerType":{"description":"Inbound vs outbound sidecar listener or gateway listener.","enum":["ANY","SIDECAR_INBOUND","SIDECAR_OUTBOUND","GATEWAY"],"type":"string"},"portNamePrefix":{"format":"string","type":"string"},"portNumber":{"type":"integer"}},"type":"object"}},"type":"object"},"type":"array"},"workloadLabels":{"additionalProperties":{"format":"string","type":"string"},"description":"Deprecated.","type":"object"},"workloadSelector":{"properties":{"labels":{"additionalProperties":{"format":"string","type":"string"},"type":"object"}},"type":"object"}},"type":"object"}},"type":"object"}},"versions":[{"name":"v1alpha3","served":true,"storage":true}]},"status":{"acceptedNames":{"kind":"","plural":""},"conditions":[],"storedVersions":[]}} | |
creationTimestamp: "2019-12-03T04:51:48Z" | |
generation: 3 | |
labels: | |
app: istio-pilot | |
chart: istio | |
heritage: Tiller | |
release: istio | |
name: envoyfilters.networking.istio.io | |
resourceVersion: "43301" | |
selfLink: /apis/apiextensions.k8s.io/v1beta1/customresourcedefinitions/envoyfilters.networking.istio.io | |
uid: 9d4c674c-1588-11ea-b5af-027e0b84da98 | |
spec: | |
conversion: | |
strategy: None | |
group: networking.istio.io | |
names: | |
categories: | |
- istio-io | |
- networking-istio-io | |
kind: EnvoyFilter | |
listKind: EnvoyFilterList | |
plural: envoyfilters | |
singular: envoyfilter | |
scope: Namespaced | |
subresources: | |
status: {} | |
validation: | |
openAPIV3Schema: | |
properties: | |
spec: | |
description: 'Customizing Envoy configuration generated by Istio. See | |
more details at: https://istio.io/docs/reference/config/networking/v1alpha3/envoy-filter.html' | |
properties: | |
configPatches: | |
description: One or more patches with match conditions. | |
items: | |
properties: | |
applyTo: | |
enum: | |
- INVALID | |
- LISTENER | |
- FILTER_CHAIN | |
- NETWORK_FILTER | |
- HTTP_FILTER | |
- ROUTE_CONFIGURATION | |
- VIRTUAL_HOST | |
- HTTP_ROUTE | |
- CLUSTER | |
type: string | |
match: | |
description: Match on listener/route configuration/cluster. | |
oneOf: | |
- required: | |
- listener | |
- required: | |
- routeConfiguration | |
- required: | |
- cluster | |
properties: | |
cluster: | |
description: Match on envoy cluster attributes. | |
properties: | |
name: | |
description: The exact name of the cluster to match. | |
format: string | |
type: string | |
portNumber: | |
description: The service port for which this cluster | |
was generated. | |
type: integer | |
service: | |
description: The fully qualified service name for this | |
cluster. | |
format: string | |
type: string | |
subset: | |
description: The subset associated with the service. | |
format: string | |
type: string | |
type: object | |
context: | |
description: The specific config generation context to match | |
on. | |
enum: | |
- ANY | |
- SIDECAR_INBOUND | |
- SIDECAR_OUTBOUND | |
- GATEWAY | |
type: string | |
listener: | |
description: Match on envoy listener attributes. | |
properties: | |
filterChain: | |
description: Match a specific filter chain in a listener. | |
properties: | |
applicationProtocols: | |
description: Applies only to sidecars. | |
format: string | |
type: string | |
filter: | |
description: The name of a specific filter to apply | |
the patch to. | |
properties: | |
name: | |
description: The filter name to match on. | |
format: string | |
type: string | |
subFilter: | |
properties: | |
name: | |
description: The filter name to match on. | |
format: string | |
type: string | |
type: object | |
type: object | |
name: | |
description: The name assigned to the filter chain. | |
format: string | |
type: string | |
sni: | |
description: The SNI value used by a filter chain's | |
match condition. | |
format: string | |
type: string | |
transportProtocol: | |
description: Applies only to SIDECAR_INBOUND context. | |
format: string | |
type: string | |
type: object | |
name: | |
description: Match a specific listener by its name. | |
format: string | |
type: string | |
portName: | |
format: string | |
type: string | |
portNumber: | |
type: integer | |
type: object | |
proxy: | |
description: Match on properties associated with a proxy. | |
properties: | |
metadata: | |
additionalProperties: | |
format: string | |
type: string | |
type: object | |
proxyVersion: | |
format: string | |
type: string | |
type: object | |
routeConfiguration: | |
description: Match on envoy HTTP route configuration attributes. | |
properties: | |
gateway: | |
format: string | |
type: string | |
name: | |
description: Route configuration name to match on. | |
format: string | |
type: string | |
portName: | |
description: Applicable only for GATEWAY context. | |
format: string | |
type: string | |
portNumber: | |
type: integer | |
vhost: | |
properties: | |
name: | |
format: string | |
type: string | |
route: | |
description: Match a specific route within the virtual | |
host. | |
properties: | |
action: | |
description: Match a route with specific action | |
type. | |
enum: | |
- ANY | |
- ROUTE | |
- REDIRECT | |
- DIRECT_RESPONSE | |
type: string | |
name: | |
format: string | |
type: string | |
type: object | |
type: object | |
type: object | |
type: object | |
patch: | |
description: The patch to apply along with the operation. | |
properties: | |
operation: | |
description: Determines how the patch should be applied. | |
enum: | |
- INVALID | |
- MERGE | |
- ADD | |
- REMOVE | |
- INSERT_BEFORE | |
- INSERT_AFTER | |
type: string | |
value: | |
description: The JSON config of the object being patched. | |
type: object | |
type: object | |
type: object | |
type: array | |
filters: | |
items: | |
properties: | |
filterConfig: | |
type: object | |
filterName: | |
description: The name of the filter to instantiate. | |
format: string | |
type: string | |
filterType: | |
description: The type of filter to instantiate. | |
enum: | |
- INVALID | |
- HTTP | |
- NETWORK | |
type: string | |
insertPosition: | |
description: Insert position in the filter chain. | |
properties: | |
index: | |
description: Position of this filter in the filter chain. | |
enum: | |
- FIRST | |
- LAST | |
- BEFORE | |
- AFTER | |
type: string | |
relativeTo: | |
format: string | |
type: string | |
type: object | |
listenerMatch: | |
properties: | |
address: | |
description: One or more IP addresses to which the listener | |
is bound. | |
items: | |
format: string | |
type: string | |
type: array | |
listenerProtocol: | |
description: Selects a class of listeners for the same protocol. | |
enum: | |
- ALL | |
- HTTP | |
- TCP | |
type: string | |
listenerType: | |
description: Inbound vs outbound sidecar listener or gateway | |
listener. | |
enum: | |
- ANY | |
- SIDECAR_INBOUND | |
- SIDECAR_OUTBOUND | |
- GATEWAY | |
type: string | |
portNamePrefix: | |
format: string | |
type: string | |
portNumber: | |
type: integer | |
type: object | |
type: object | |
type: array | |
workloadLabels: | |
additionalProperties: | |
format: string | |
type: string | |
description: Deprecated. | |
type: object | |
workloadSelector: | |
properties: | |
labels: | |
additionalProperties: | |
format: string | |
type: string | |
type: object | |
type: object | |
type: object | |
type: object | |
version: v1alpha3 | |
versions: | |
- name: v1alpha3 | |
served: true | |
storage: true | |
status: | |
acceptedNames: | |
categories: | |
- istio-io | |
- networking-istio-io | |
kind: EnvoyFilter | |
listKind: EnvoyFilterList | |
plural: envoyfilters | |
singular: envoyfilter | |
conditions: | |
- lastTransitionTime: "2019-12-03T04:51:48Z" | |
message: no conflicts found | |
reason: NoConflicts | |
status: "True" | |
type: NamesAccepted | |
- lastTransitionTime: null | |
message: the initial names have been accepted | |
reason: InitialNamesAccepted | |
status: "True" | |
type: Established | |
storedVersions: | |
- v1alpha3 | |
- apiVersion: apiextensions.k8s.io/v1beta1 | |
kind: CustomResourceDefinition | |
metadata: | |
annotations: | |
helm.sh/resource-policy: keep | |
kubectl.kubernetes.io/last-applied-configuration: | | |
{"apiVersion":"apiextensions.k8s.io/v1beta1","kind":"CustomResourceDefinition","metadata":{"annotations":{"helm.sh/resource-policy":"keep"},"creationTimestamp":null,"labels":{"app":"istio-pilot","chart":"istio","heritage":"Tiller","release":"istio"},"name":"gateways.networking.istio.io"},"spec":{"group":"networking.istio.io","names":{"categories":["istio-io","networking-istio-io"],"kind":"Gateway","plural":"gateways","shortNames":["gw"],"singular":"gateway"},"scope":"Namespaced","subresources":{"status":{}},"validation":{"openAPIV3Schema":{"properties":{"spec":{"description":"Configuration affecting edge load balancer. See more details at: https://istio.io/docs/reference/config/networking/v1alpha3/gateway.html","properties":{"selector":{"additionalProperties":{"format":"string","type":"string"},"type":"object"},"servers":{"description":"A list of server specifications.","items":{"properties":{"bind":{"format":"string","type":"string"},"defaultEndpoint":{"format":"string","type":"string"},"hosts":{"description":"One or more hosts exposed by this gateway.","items":{"format":"string","type":"string"},"type":"array"},"port":{"properties":{"name":{"description":"Label assigned to the port.","format":"string","type":"string"},"number":{"description":"A valid non-negative integer port number.","type":"integer"},"protocol":{"description":"The protocol exposed on the port.","format":"string","type":"string"}},"type":"object"},"tls":{"description":"Set of TLS related options that govern the server's behavior.","properties":{"caCertificates":{"description":"REQUIRED if mode is `MUTUAL`.","format":"string","type":"string"},"cipherSuites":{"description":"Optional: If specified, only support the specified cipher list.","items":{"format":"string","type":"string"},"type":"array"},"credentialName":{"format":"string","type":"string"},"httpsRedirect":{"type":"boolean"},"maxProtocolVersion":{"description":"Optional: Maximum TLS protocol version.","enum":["TLS_AUTO","TLSV1_0","TLSV1_1","TLSV1_2","TLSV1_3"],"type":"string"},"minProtocolVersion":{"description":"Optional: Minimum TLS protocol version.","enum":["TLS_AUTO","TLSV1_0","TLSV1_1","TLSV1_2","TLSV1_3"],"type":"string"},"mode":{"enum":["PASSTHROUGH","SIMPLE","MUTUAL","AUTO_PASSTHROUGH","ISTIO_MUTUAL"],"type":"string"},"privateKey":{"description":"REQUIRED if mode is `SIMPLE` or `MUTUAL`.","format":"string","type":"string"},"serverCertificate":{"description":"REQUIRED if mode is `SIMPLE` or `MUTUAL`.","format":"string","type":"string"},"subjectAltNames":{"items":{"format":"string","type":"string"},"type":"array"},"verifyCertificateHash":{"items":{"format":"string","type":"string"},"type":"array"},"verifyCertificateSpki":{"items":{"format":"string","type":"string"},"type":"array"}},"type":"object"}},"type":"object"},"type":"array"}},"type":"object"}},"type":"object"}},"versions":[{"name":"v1alpha3","served":true,"storage":true}]},"status":{"acceptedNames":{"kind":"","plural":""},"conditions":[],"storedVersions":[]}} | |
creationTimestamp: "2019-12-03T04:51:48Z" | |
generation: 3 | |
labels: | |
app: istio-pilot | |
chart: istio | |
heritage: Tiller | |
release: istio | |
name: gateways.networking.istio.io | |
resourceVersion: "43302" | |
selfLink: /apis/apiextensions.k8s.io/v1beta1/customresourcedefinitions/gateways.networking.istio.io | |
uid: 9d4f997e-1588-11ea-b5af-027e0b84da98 | |
spec: | |
conversion: | |
strategy: None | |
group: networking.istio.io | |
names: | |
categories: | |
- istio-io | |
- networking-istio-io | |
kind: Gateway | |
listKind: GatewayList | |
plural: gateways | |
shortNames: | |
- gw | |
singular: gateway | |
scope: Namespaced | |
subresources: | |
status: {} | |
validation: | |
openAPIV3Schema: | |
properties: | |
spec: | |
description: 'Configuration affecting edge load balancer. See more details | |
at: https://istio.io/docs/reference/config/networking/v1alpha3/gateway.html' | |
properties: | |
selector: | |
additionalProperties: | |
format: string | |
type: string | |
type: object | |
servers: | |
description: A list of server specifications. | |
items: | |
properties: | |
bind: | |
format: string | |
type: string | |
defaultEndpoint: | |
format: string | |
type: string | |
hosts: | |
description: One or more hosts exposed by this gateway. | |
items: | |
format: string | |
type: string | |
type: array | |
port: | |
properties: | |
name: | |
description: Label assigned to the port. | |
format: string | |
type: string | |
number: | |
description: A valid non-negative integer port number. | |
type: integer | |
protocol: | |
description: The protocol exposed on the port. | |
format: string | |
type: string | |
type: object | |
tls: | |
description: Set of TLS related options that govern the server's | |
behavior. | |
properties: | |
caCertificates: | |
description: REQUIRED if mode is `MUTUAL`. | |
format: string | |
type: string | |
cipherSuites: | |
description: 'Optional: If specified, only support the specified | |
cipher list.' | |
items: | |
format: string | |
type: string | |
type: array | |
credentialName: | |
format: string | |
type: string | |
httpsRedirect: | |
type: boolean | |
maxProtocolVersion: | |
description: 'Optional: Maximum TLS protocol version.' | |
enum: | |
- TLS_AUTO | |
- TLSV1_0 | |
- TLSV1_1 | |
- TLSV1_2 | |
- TLSV1_3 | |
type: string | |
minProtocolVersion: | |
description: 'Optional: Minimum TLS protocol version.' | |
enum: | |
- TLS_AUTO | |
- TLSV1_0 | |
- TLSV1_1 | |
- TLSV1_2 | |
- TLSV1_3 | |
type: string | |
mode: | |
enum: | |
- PASSTHROUGH | |
- SIMPLE | |
- MUTUAL | |
- AUTO_PASSTHROUGH | |
- ISTIO_MUTUAL | |
type: string | |
privateKey: | |
description: REQUIRED if mode is `SIMPLE` or `MUTUAL`. | |
format: string | |
type: string | |
serverCertificate: | |
description: REQUIRED if mode is `SIMPLE` or `MUTUAL`. | |
format: string | |
type: string | |
subjectAltNames: | |
items: | |
format: string | |
type: string | |
type: array | |
verifyCertificateHash: | |
items: | |
format: string | |
type: string | |
type: array | |
verifyCertificateSpki: | |
items: | |
format: string | |
type: string | |
type: array | |
type: object | |
type: object | |
type: array | |
type: object | |
type: object | |
version: v1alpha3 | |
versions: | |
- name: v1alpha3 | |
served: true | |
storage: true | |
status: | |
acceptedNames: | |
categories: | |
- istio-io | |
- networking-istio-io | |
kind: Gateway | |
listKind: GatewayList | |
plural: gateways | |
shortNames: | |
- gw | |
singular: gateway | |
conditions: | |
- lastTransitionTime: "2019-12-03T04:51:48Z" | |
message: no conflicts found | |
reason: NoConflicts | |
status: "True" | |
type: NamesAccepted | |
- lastTransitionTime: null | |
message: the initial names have been accepted | |
reason: InitialNamesAccepted | |
status: "True" | |
type: Established | |
storedVersions: | |
- v1alpha3 | |
- apiVersion: apiextensions.k8s.io/v1beta1 | |
kind: CustomResourceDefinition | |
metadata: | |
annotations: | |
helm.sh/resource-policy: keep | |
kubectl.kubernetes.io/last-applied-configuration: | | |
{"apiVersion":"apiextensions.k8s.io/v1beta1","kind":"CustomResourceDefinition","metadata":{"annotations":{"helm.sh/resource-policy":"keep"},"labels":{"app":"mixer","chart":"istio","heritage":"Tiller","istio":"mixer-handler","package":"handler","release":"istio"},"name":"handlers.config.istio.io"},"spec":{"group":"config.istio.io","names":{"categories":["istio-io","policy-istio-io"],"kind":"handler","plural":"handlers","singular":"handler"},"scope":"Namespaced","subresources":{"status":{}},"versions":[{"name":"v1alpha2","served":true,"storage":true}]}} | |
creationTimestamp: "2019-12-03T04:51:49Z" | |
generation: 3 | |
labels: | |
app: mixer | |
chart: istio | |
heritage: Tiller | |
istio: mixer-handler | |
package: handler | |
release: istio | |
name: handlers.config.istio.io | |
resourceVersion: "43325" | |
selfLink: /apis/apiextensions.k8s.io/v1beta1/customresourcedefinitions/handlers.config.istio.io | |
uid: 9ddd748f-1588-11ea-b5af-027e0b84da98 | |
spec: | |
conversion: | |
strategy: None | |
group: config.istio.io | |
names: | |
categories: | |
- istio-io | |
- policy-istio-io | |
kind: handler | |
listKind: handlerList | |
plural: handlers | |
singular: handler | |
scope: Namespaced | |
subresources: | |
status: {} | |
version: v1alpha2 | |
versions: | |
- name: v1alpha2 | |
served: true | |
storage: true | |
status: | |
acceptedNames: | |
categories: | |
- istio-io | |
- policy-istio-io | |
kind: handler | |
listKind: handlerList | |
plural: handlers | |
singular: handler | |
conditions: | |
- lastTransitionTime: "2019-12-03T04:51:49Z" | |
message: no conflicts found | |
reason: NoConflicts | |
status: "True" | |
type: NamesAccepted | |
- lastTransitionTime: null | |
message: the initial names have been accepted | |
reason: InitialNamesAccepted | |
status: "True" | |
type: Established | |
storedVersions: | |
- v1alpha2 | |
- apiVersion: apiextensions.k8s.io/v1beta1 | |
kind: CustomResourceDefinition | |
metadata: | |
annotations: | |
helm.sh/resource-policy: keep | |
kubectl.kubernetes.io/last-applied-configuration: | | |
{"apiVersion":"apiextensions.k8s.io/v1beta1","kind":"CustomResourceDefinition","metadata":{"annotations":{"helm.sh/resource-policy":"keep"},"creationTimestamp":null,"labels":{"app":"istio-mixer","chart":"istio","heritage":"Tiller","release":"istio"},"name":"httpapispecbindings.config.istio.io"},"spec":{"group":"config.istio.io","names":{"categories":["istio-io","apim-istio-io"],"kind":"HTTPAPISpecBinding","plural":"httpapispecbindings","singular":"httpapispecbinding"},"scope":"Namespaced","subresources":{"status":{}},"validation":{"openAPIV3Schema":{"properties":{"spec":{"properties":{"apiSpecs":{"items":{"properties":{"name":{"description":"The short name of the HTTPAPISpec.","format":"string","type":"string"},"namespace":{"description":"Optional namespace of the HTTPAPISpec.","format":"string","type":"string"}},"type":"object"},"type":"array"},"api_specs":{"items":{"properties":{"name":{"description":"The short name of the HTTPAPISpec.","format":"string","type":"string"},"namespace":{"description":"Optional namespace of the HTTPAPISpec.","format":"string","type":"string"}},"type":"object"},"type":"array"},"services":{"description":"One or more services to map the listed HTTPAPISpec onto.","items":{"properties":{"domain":{"description":"Domain suffix used to construct the service FQDN in implementations that support such specification.","format":"string","type":"string"},"labels":{"additionalProperties":{"format":"string","type":"string"},"description":"Optional one or more labels that uniquely identify the service version.","type":"object"},"name":{"description":"The short name of the service such as \"foo\".","format":"string","type":"string"},"namespace":{"description":"Optional namespace of the service.","format":"string","type":"string"},"service":{"description":"The service FQDN.","format":"string","type":"string"}},"type":"object"},"type":"array"}},"type":"object"}},"type":"object"}},"versions":[{"name":"v1alpha2","served":true,"storage":true}]},"status":{"acceptedNames":{"kind":"","plural":""},"conditions":[],"storedVersions":[]}} | |
creationTimestamp: "2019-12-03T04:51:48Z" | |
generation: 3 | |
labels: | |
app: istio-mixer | |
chart: istio | |
heritage: Tiller | |
release: istio | |
name: httpapispecbindings.config.istio.io | |
resourceVersion: "43303" | |
selfLink: /apis/apiextensions.k8s.io/v1beta1/customresourcedefinitions/httpapispecbindings.config.istio.io | |
uid: 9d5280a0-1588-11ea-b5af-027e0b84da98 | |
spec: | |
conversion: | |
strategy: None | |
group: config.istio.io | |
names: | |
categories: | |
- istio-io | |
- apim-istio-io | |
kind: HTTPAPISpecBinding | |
listKind: HTTPAPISpecBindingList | |
plural: httpapispecbindings | |
singular: httpapispecbinding | |
scope: Namespaced | |
subresources: | |
status: {} | |
validation: | |
openAPIV3Schema: | |
properties: | |
spec: | |
properties: | |
api_specs: | |
items: | |
properties: | |
name: | |
description: The short name of the HTTPAPISpec. | |
format: string | |
type: string | |
namespace: | |
description: Optional namespace of the HTTPAPISpec. | |
format: string | |
type: string | |
type: object | |
type: array | |
apiSpecs: | |
items: | |
properties: | |
name: | |
description: The short name of the HTTPAPISpec. | |
format: string | |
type: string | |
namespace: | |
description: Optional namespace of the HTTPAPISpec. | |
format: string | |
type: string | |
type: object | |
type: array | |
services: | |
description: One or more services to map the listed HTTPAPISpec onto. | |
items: | |
properties: | |
domain: | |
description: Domain suffix used to construct the service FQDN | |
in implementations that support such specification. | |
format: string | |
type: string | |
labels: | |
additionalProperties: | |
format: string | |
type: string | |
description: Optional one or more labels that uniquely identify | |
the service version. | |
type: object | |
name: | |
description: The short name of the service such as "foo". | |
format: string | |
type: string | |
namespace: | |
description: Optional namespace of the service. | |
format: string | |
type: string | |
service: | |
description: The service FQDN. | |
format: string | |
type: string | |
type: object | |
type: array | |
type: object | |
type: object | |
version: v1alpha2 | |
versions: | |
- name: v1alpha2 | |
served: true | |
storage: true | |
status: | |
acceptedNames: | |
categories: | |
- istio-io | |
- apim-istio-io | |
kind: HTTPAPISpecBinding | |
listKind: HTTPAPISpecBindingList | |
plural: httpapispecbindings | |
singular: httpapispecbinding | |
conditions: | |
- lastTransitionTime: "2019-12-03T04:51:48Z" | |
message: no conflicts found | |
reason: NoConflicts | |
status: "True" | |
type: NamesAccepted | |
- lastTransitionTime: null | |
message: the initial names have been accepted | |
reason: InitialNamesAccepted | |
status: "True" | |
type: Established | |
storedVersions: | |
- v1alpha2 | |
- apiVersion: apiextensions.k8s.io/v1beta1 | |
kind: CustomResourceDefinition | |
metadata: | |
annotations: | |
helm.sh/resource-policy: keep | |
kubectl.kubernetes.io/last-applied-configuration: | | |
{"apiVersion":"apiextensions.k8s.io/v1beta1","kind":"CustomResourceDefinition","metadata":{"annotations":{"helm.sh/resource-policy":"keep"},"creationTimestamp":null,"labels":{"app":"istio-mixer","chart":"istio","heritage":"Tiller","release":"istio"},"name":"httpapispecs.config.istio.io"},"spec":{"group":"config.istio.io","names":{"categories":["istio-io","apim-istio-io"],"kind":"HTTPAPISpec","plural":"httpapispecs","singular":"httpapispec"},"scope":"Namespaced","subresources":{"status":{}},"validation":{"openAPIV3Schema":{"properties":{"spec":{"properties":{"apiKeys":{"items":{"oneOf":[{"required":["query"]},{"required":["header"]},{"required":["cookie"]}],"properties":{"cookie":{"format":"string","type":"string"},"header":{"description":"API key is sent in a request header.","format":"string","type":"string"},"query":{"description":"API Key is sent as a query parameter.","format":"string","type":"string"}},"type":"object"},"type":"array"},"api_keys":{"items":{"oneOf":[{"required":["query"]},{"required":["header"]},{"required":["cookie"]}],"properties":{"cookie":{"format":"string","type":"string"},"header":{"description":"API key is sent in a request header.","format":"string","type":"string"},"query":{"description":"API Key is sent as a query parameter.","format":"string","type":"string"}},"type":"object"},"type":"array"},"attributes":{"properties":{"attributes":{"additionalProperties":{"oneOf":[{"required":["stringValue"]},{"required":["int64Value"]},{"required":["doubleValue"]},{"required":["boolValue"]},{"required":["bytesValue"]},{"required":["timestampValue"]},{"required":["durationValue"]},{"required":["stringMapValue"]}],"properties":{"boolValue":{"type":"boolean"},"bytesValue":{"format":"binary","type":"string"},"doubleValue":{"format":"double","type":"number"},"durationValue":{"type":"string"},"int64Value":{"format":"int64","type":"integer"},"stringMapValue":{"properties":{"entries":{"additionalProperties":{"format":"string","type":"string"},"description":"Holds a set of name/value pairs.","type":"object"}},"type":"object"},"stringValue":{"format":"string","type":"string"},"timestampValue":{"format":"dateTime","type":"string"}},"type":"object"},"description":"A map of attribute name to its value.","type":"object"}},"type":"object"},"patterns":{"description":"List of HTTP patterns to match.","items":{"oneOf":[{"required":["uriTemplate"]},{"required":["regex"]}],"properties":{"attributes":{"properties":{"attributes":{"additionalProperties":{"oneOf":[{"required":["stringValue"]},{"required":["int64Value"]},{"required":["doubleValue"]},{"required":["boolValue"]},{"required":["bytesValue"]},{"required":["timestampValue"]},{"required":["durationValue"]},{"required":["stringMapValue"]}],"properties":{"boolValue":{"type":"boolean"},"bytesValue":{"format":"binary","type":"string"},"doubleValue":{"format":"double","type":"number"},"durationValue":{"type":"string"},"int64Value":{"format":"int64","type":"integer"},"stringMapValue":{"properties":{"entries":{"additionalProperties":{"format":"string","type":"string"},"description":"Holds a set of name/value pairs.","type":"object"}},"type":"object"},"stringValue":{"format":"string","type":"string"},"timestampValue":{"format":"dateTime","type":"string"}},"type":"object"},"description":"A map of attribute name to its value.","type":"object"}},"type":"object"},"httpMethod":{"format":"string","type":"string"},"regex":{"format":"string","type":"string"},"uriTemplate":{"format":"string","type":"string"}},"type":"object"},"type":"array"}},"type":"object"}},"type":"object"}},"versions":[{"name":"v1alpha2","served":true,"storage":true}]},"status":{"acceptedNames":{"kind":"","plural":""},"conditions":[],"storedVersions":[]}} | |
creationTimestamp: "2019-12-03T04:51:48Z" | |
generation: 3 | |
labels: | |
app: istio-mixer | |
chart: istio | |
heritage: Tiller | |
release: istio | |
name: httpapispecs.config.istio.io | |
resourceVersion: "43304" | |
selfLink: /apis/apiextensions.k8s.io/v1beta1/customresourcedefinitions/httpapispecs.config.istio.io | |
uid: 9d5b9713-1588-11ea-b5af-027e0b84da98 | |
spec: | |
conversion: | |
strategy: None | |
group: config.istio.io | |
names: | |
categories: | |
- istio-io | |
- apim-istio-io | |
kind: HTTPAPISpec | |
listKind: HTTPAPISpecList | |
plural: httpapispecs | |
singular: httpapispec | |
scope: Namespaced | |
subresources: | |
status: {} | |
validation: | |
openAPIV3Schema: | |
properties: | |
spec: | |
properties: | |
api_keys: | |
items: | |
oneOf: | |
- required: | |
- query | |
- required: | |
- header | |
- required: | |
- cookie | |
properties: | |
cookie: | |
format: string | |
type: string | |
header: | |
description: API key is sent in a request header. | |
format: string | |
type: string | |
query: | |
description: API Key is sent as a query parameter. | |
format: string | |
type: string | |
type: object | |
type: array | |
apiKeys: | |
items: | |
oneOf: | |
- required: | |
- query | |
- required: | |
- header | |
- required: | |
- cookie | |
properties: | |
cookie: | |
format: string | |
type: string | |
header: | |
description: API key is sent in a request header. | |
format: string | |
type: string | |
query: | |
description: API Key is sent as a query parameter. | |
format: string | |
type: string | |
type: object | |
type: array | |
attributes: | |
properties: | |
attributes: | |
additionalProperties: | |
oneOf: | |
- required: | |
- stringValue | |
- required: | |
- int64Value | |
- required: | |
- doubleValue | |
- required: | |
- boolValue | |
- required: | |
- bytesValue | |
- required: | |
- timestampValue | |
- required: | |
- durationValue | |
- required: | |
- stringMapValue | |
properties: | |
boolValue: | |
type: boolean | |
bytesValue: | |
format: binary | |
type: string | |
doubleValue: | |
format: double | |
type: number | |
durationValue: | |
type: string | |
int64Value: | |
format: int64 | |
type: integer | |
stringMapValue: | |
properties: | |
entries: | |
additionalProperties: | |
format: string | |
type: string | |
description: Holds a set of name/value pairs. | |
type: object | |
type: object | |
stringValue: | |
format: string | |
type: string | |
timestampValue: | |
format: dateTime | |
type: string | |
type: object | |
description: A map of attribute name to its value. | |
type: object | |
type: object | |
patterns: | |
description: List of HTTP patterns to match. | |
items: | |
oneOf: | |
- required: | |
- uriTemplate | |
- required: | |
- regex | |
properties: | |
attributes: | |
properties: | |
attributes: | |
additionalProperties: | |
oneOf: | |
- required: | |
- stringValue | |
- required: | |
- int64Value | |
- required: | |
- doubleValue | |
- required: | |
- boolValue | |
- required: | |
- bytesValue | |
- required: | |
- timestampValue | |
- required: | |
- durationValue | |
- required: | |
- stringMapValue | |
properties: | |
boolValue: | |
type: boolean | |
bytesValue: | |
format: binary | |
type: string | |
doubleValue: | |
format: double | |
type: number | |
durationValue: | |
type: string | |
int64Value: | |
format: int64 | |
type: integer | |
stringMapValue: | |
properties: | |
entries: | |
additionalProperties: | |
format: string | |
type: string | |
description: Holds a set of name/value pairs. | |
type: object | |
type: object | |
stringValue: | |
format: string | |
type: string | |
timestampValue: | |
format: dateTime | |
type: string | |
type: object | |
description: A map of attribute name to its value. | |
type: object | |
type: object | |
httpMethod: | |
format: string | |
type: string | |
regex: | |
format: string | |
type: string | |
uriTemplate: | |
format: string | |
type: string | |
type: object | |
type: array | |
type: object | |
type: object | |
version: v1alpha2 | |
versions: | |
- name: v1alpha2 | |
served: true | |
storage: true | |
status: | |
acceptedNames: | |
categories: | |
- istio-io | |
- apim-istio-io | |
kind: HTTPAPISpec | |
listKind: HTTPAPISpecList | |
plural: httpapispecs | |
singular: httpapispec | |
conditions: | |
- lastTransitionTime: "2019-12-03T04:51:48Z" | |
message: no conflicts found | |
reason: NoConflicts | |
status: "True" | |
type: NamesAccepted | |
- lastTransitionTime: null | |
message: the initial names have been accepted | |
reason: InitialNamesAccepted | |
status: "True" | |
type: Established | |
storedVersions: | |
- v1alpha2 | |
- apiVersion: apiextensions.k8s.io/v1beta1 | |
kind: CustomResourceDefinition | |
metadata: | |
annotations: | |
kubectl.kubernetes.io/last-applied-configuration: | | |
{"apiVersion":"apiextensions.k8s.io/v1beta1","kind":"CustomResourceDefinition","metadata":{"annotations":{},"labels":{"knative.dev/crd-install":"true"},"name":"images.caching.internal.knative.dev"},"spec":{"group":"caching.internal.knative.dev","names":{"categories":["knative-internal","caching"],"kind":"Image","plural":"images","shortNames":["img"],"singular":"image"},"scope":"Namespaced","subresources":{"status":{}},"version":"v1alpha1"}} | |
creationTimestamp: "2019-12-03T10:54:07Z" | |
generation: 1 | |
labels: | |
knative.dev/crd-install: "true" | |
name: images.caching.internal.knative.dev | |
resourceVersion: "43829" | |
selfLink: /apis/apiextensions.k8s.io/v1beta1/customresourcedefinitions/images.caching.internal.knative.dev | |
uid: 3ab9b444-15bb-11ea-b5af-027e0b84da98 | |
spec: | |
conversion: | |
strategy: None | |
group: caching.internal.knative.dev | |
names: | |
categories: | |
- knative-internal | |
- caching | |
kind: Image | |
listKind: ImageList | |
plural: images | |
shortNames: | |
- img | |
singular: image | |
scope: Namespaced | |
subresources: | |
status: {} | |
version: v1alpha1 | |
versions: | |
- name: v1alpha1 | |
served: true | |
storage: true | |
status: | |
acceptedNames: | |
categories: | |
- knative-internal | |
- caching | |
kind: Image | |
listKind: ImageList | |
plural: images | |
shortNames: | |
- img | |
singular: image | |
conditions: | |
- lastTransitionTime: "2019-12-03T10:54:07Z" | |
message: no conflicts found | |
reason: NoConflicts | |
status: "True" | |
type: NamesAccepted | |
- lastTransitionTime: null | |
message: the initial names have been accepted | |
reason: InitialNamesAccepted | |
status: "True" | |
type: Established | |
storedVersions: | |
- v1alpha1 | |
- apiVersion: apiextensions.k8s.io/v1beta1 | |
kind: CustomResourceDefinition | |
metadata: | |
annotations: | |
kubectl.kubernetes.io/last-applied-configuration: | | |
{"apiVersion":"apiextensions.k8s.io/v1beta1","kind":"CustomResourceDefinition","metadata":{"annotations":{},"labels":{"knative.dev/crd-install":"true","serving.knative.dev/release":"devel"},"name":"ingresses.networking.internal.knative.dev"},"spec":{"additionalPrinterColumns":[{"JSONPath":".status.conditions[?(@.type=='Ready')].status","name":"Ready","type":"string"},{"JSONPath":".status.conditions[?(@.type=='Ready')].reason","name":"Reason","type":"string"}],"group":"networking.internal.knative.dev","names":{"categories":["knative-internal","networking"],"kind":"Ingress","plural":"ingresses","shortNames":["ing"],"singular":"ingress"},"scope":"Namespaced","subresources":{"status":{}},"versions":[{"name":"v1alpha1","served":true,"storage":true}]}} | |
creationTimestamp: "2019-12-03T10:54:07Z" | |
generation: 1 | |
labels: | |
knative.dev/crd-install: "true" | |
serving.knative.dev/release: devel | |
name: ingresses.networking.internal.knative.dev | |
resourceVersion: "43833" | |
selfLink: /apis/apiextensions.k8s.io/v1beta1/customresourcedefinitions/ingresses.networking.internal.knative.dev | |
uid: 3ad21006-15bb-11ea-b5af-027e0b84da98 | |
spec: | |
additionalPrinterColumns: | |
- JSONPath: .status.conditions[?(@.type=='Ready')].status | |
name: Ready | |
type: string | |
- JSONPath: .status.conditions[?(@.type=='Ready')].reason | |
name: Reason | |
type: string | |
conversion: | |
strategy: None | |
group: networking.internal.knative.dev | |
names: | |
categories: | |
- knative-internal | |
- networking | |
kind: Ingress | |
listKind: IngressList | |
plural: ingresses | |
shortNames: | |
- ing | |
singular: ingress | |
scope: Namespaced | |
subresources: | |
status: {} | |
version: v1alpha1 | |
versions: | |
- name: v1alpha1 | |
served: true | |
storage: true | |
status: | |
acceptedNames: | |
categories: | |
- knative-internal | |
- networking | |
kind: Ingress | |
listKind: IngressList | |
plural: ingresses | |
shortNames: | |
- ing | |
singular: ingress | |
conditions: | |
- lastTransitionTime: "2019-12-03T10:54:07Z" | |
message: no conflicts found | |
reason: NoConflicts | |
status: "True" | |
type: NamesAccepted | |
- lastTransitionTime: null | |
message: the initial names have been accepted | |
reason: InitialNamesAccepted | |
status: "True" | |
type: Established | |
storedVersions: | |
- v1alpha1 | |
- apiVersion: apiextensions.k8s.io/v1beta1 | |
kind: CustomResourceDefinition | |
metadata: | |
annotations: | |
helm.sh/resource-policy: keep | |
kubectl.kubernetes.io/last-applied-configuration: | | |
{"apiVersion":"apiextensions.k8s.io/v1beta1","kind":"CustomResourceDefinition","metadata":{"annotations":{"helm.sh/resource-policy":"keep"},"labels":{"app":"mixer","chart":"istio","heritage":"Tiller","istio":"mixer-instance","package":"instance","release":"istio"},"name":"instances.config.istio.io"},"spec":{"group":"config.istio.io","names":{"categories":["istio-io","policy-istio-io"],"kind":"instance","plural":"instances","singular":"instance"},"scope":"Namespaced","subresources":{"status":{}},"versions":[{"name":"v1alpha2","served":true,"storage":true}]}} | |
creationTimestamp: "2019-12-03T04:51:49Z" | |
generation: 3 | |
labels: | |
app: mixer | |
chart: istio | |
heritage: Tiller | |
istio: mixer-instance | |
package: instance | |
release: istio | |
name: instances.config.istio.io | |
resourceVersion: "43323" | |
selfLink: /apis/apiextensions.k8s.io/v1beta1/customresourcedefinitions/instances.config.istio.io | |
uid: 9dd58616-1588-11ea-b5af-027e0b84da98 | |
spec: | |
conversion: | |
strategy: None | |
group: config.istio.io | |
names: | |
categories: | |
- istio-io | |
- policy-istio-io | |
kind: instance | |
listKind: instanceList | |
plural: instances | |
singular: instance | |
scope: Namespaced | |
subresources: | |
status: {} | |
version: v1alpha2 | |
versions: | |
- name: v1alpha2 | |
served: true | |
storage: true | |
status: | |
acceptedNames: | |
categories: | |
- istio-io | |
- policy-istio-io | |
kind: instance | |
listKind: instanceList | |
plural: instances | |
singular: instance | |
conditions: | |
- lastTransitionTime: "2019-12-03T04:51:49Z" | |
message: no conflicts found | |
reason: NoConflicts | |
status: "True" | |
type: NamesAccepted | |
- lastTransitionTime: null | |
message: the initial names have been accepted | |
reason: InitialNamesAccepted | |
status: "True" | |
type: Established | |
storedVersions: | |
- v1alpha2 | |
- apiVersion: apiextensions.k8s.io/v1beta1 | |
kind: CustomResourceDefinition | |
metadata: | |
annotations: | |
helm.sh/resource-policy: keep | |
kubectl.kubernetes.io/last-applied-configuration: | | |
{"apiVersion":"apiextensions.k8s.io/v1beta1","kind":"CustomResourceDefinition","metadata":{"annotations":{"helm.sh/resource-policy":"keep"},"creationTimestamp":null,"labels":{"app":"istio-citadel","chart":"istio","heritage":"Tiller","release":"istio"},"name":"meshpolicies.authentication.istio.io"},"spec":{"group":"authentication.istio.io","names":{"categories":["istio-io","authentication-istio-io"],"kind":"MeshPolicy","listKind":"MeshPolicyList","plural":"meshpolicies","singular":"meshpolicy"},"scope":"Cluster","subresources":{"status":{}},"validation":{"openAPIV3Schema":{"properties":{"spec":{"description":"Authentication policy for Istio services. See more details at: https://istio.io/docs/reference/config/istio.authentication.v1alpha1.html","properties":{"originIsOptional":{"type":"boolean"},"origins":{"description":"List of authentication methods that can be used for origin authentication.","items":{"properties":{"jwt":{"description":"Jwt params for the method.","properties":{"audiences":{"items":{"format":"string","type":"string"},"type":"array"},"issuer":{"description":"Identifies the issuer that issued the JWT.","format":"string","type":"string"},"jwks":{"description":"JSON Web Key Set of public keys to validate signature of the JWT.","format":"string","type":"string"},"jwksUri":{"format":"string","type":"string"},"jwks_uri":{"format":"string","type":"string"},"jwtHeaders":{"description":"JWT is sent in a request header.","items":{"format":"string","type":"string"},"type":"array"},"jwtParams":{"description":"JWT is sent in a query parameter.","items":{"format":"string","type":"string"},"type":"array"},"jwt_headers":{"description":"JWT is sent in a request header.","items":{"format":"string","type":"string"},"type":"array"},"triggerRules":{"items":{"properties":{"excludedPaths":{"description":"List of paths to be excluded from the request.","items":{"oneOf":[{"required":["exact"]},{"required":["prefix"]},{"required":["suffix"]},{"required":["regex"]}],"properties":{"exact":{"description":"exact string match.","format":"string","type":"string"},"prefix":{"description":"prefix-based match.","format":"string","type":"string"},"regex":{"description":"ECMAscript style regex-based match as defined by [EDCA-262](http://en.cppreference.com/w/cpp/regex/ecmascript).","format":"string","type":"string"},"suffix":{"description":"suffix-based match.","format":"string","type":"string"}},"type":"object"},"type":"array"},"excluded_paths":{"description":"List of paths to be excluded from the request.","items":{"oneOf":[{"required":["exact"]},{"required":["prefix"]},{"required":["suffix"]},{"required":["regex"]}],"properties":{"exact":{"description":"exact string match.","format":"string","type":"string"},"prefix":{"description":"prefix-based match.","format":"string","type":"string"},"regex":{"description":"ECMAscript style regex-based match as defined by [EDCA-262](http://en.cppreference.com/w/cpp/regex/ecmascript).","format":"string","type":"string"},"suffix":{"description":"suffix-based match.","format":"string","type":"string"}},"type":"object"},"type":"array"},"includedPaths":{"description":"List of paths that the request must include.","items":{"oneOf":[{"required":["exact"]},{"required":["prefix"]},{"required":["suffix"]},{"required":["regex"]}],"properties":{"exact":{"description":"exact string match.","format":"string","type":"string"},"prefix":{"description":"prefix-based match.","format":"string","type":"string"},"regex":{"description":"ECMAscript style regex-based match as defined by [EDCA-262](http://en.cppreference.com/w/cpp/regex/ecmascript).","format":"string","type":"string"},"suffix":{"description":"suffix-based match.","format":"string","type":"string"}},"type":"object"},"type":"array"},"included_paths":{"description":"List of paths that the request must include.","items":{"oneOf":[{"required":["exact"]},{"required":["prefix"]},{"required":["suffix"]},{"required":["regex"]}],"properties":{"exact":{"description":"exact string match.","format":"string","type":"string"},"prefix":{"description":"prefix-based match.","format":"string","type":"string"},"regex":{"description":"ECMAscript style regex-based match as defined by [EDCA-262](http://en.cppreference.com/w/cpp/regex/ecmascript).","format":"string","type":"string"},"suffix":{"description":"suffix-based match.","format":"string","type":"string"}},"type":"object"},"type":"array"}},"type":"object"},"type":"array"},"trigger_rules":{"items":{"properties":{"excludedPaths":{"description":"List of paths to be excluded from the request.","items":{"oneOf":[{"required":["exact"]},{"required":["prefix"]},{"required":["suffix"]},{"required":["regex"]}],"properties":{"exact":{"description":"exact string match.","format":"string","type":"string"},"prefix":{"description":"prefix-based match.","format":"string","type":"string"},"regex":{"description":"ECMAscript style regex-based match as defined by [EDCA-262](http://en.cppreference.com/w/cpp/regex/ecmascript).","format":"string","type":"string"},"suffix":{"description":"suffix-based match.","format":"string","type":"string"}},"type":"object"},"type":"array"},"excluded_paths":{"description":"List of paths to be excluded from the request.","items":{"oneOf":[{"required":["exact"]},{"required":["prefix"]},{"required":["suffix"]},{"required":["regex"]}],"properties":{"exact":{"description":"exact string match.","format":"string","type":"string"},"prefix":{"description":"prefix-based match.","format":"string","type":"string"},"regex":{"description":"ECMAscript style regex-based match as defined by [EDCA-262](http://en.cppreference.com/w/cpp/regex/ecmascript).","format":"string","type":"string"},"suffix":{"description":"suffix-based match.","format":"string","type":"string"}},"type":"object"},"type":"array"},"includedPaths":{"description":"List of paths that the request must include.","items":{"oneOf":[{"required":["exact"]},{"required":["prefix"]},{"required":["suffix"]},{"required":["regex"]}],"properties":{"exact":{"description":"exact string match.","format":"string","type":"string"},"prefix":{"description":"prefix-based match.","format":"string","type":"string"},"regex":{"description":"ECMAscript style regex-based match as defined by [EDCA-262](http://en.cppreference.com/w/cpp/regex/ecmascript).","format":"string","type":"string"},"suffix":{"description":"suffix-based match.","format":"string","type":"string"}},"type":"object"},"type":"array"},"included_paths":{"description":"List of paths that the request must include.","items":{"oneOf":[{"required":["exact"]},{"required":["prefix"]},{"required":["suffix"]},{"required":["regex"]}],"properties":{"exact":{"description":"exact string match.","format":"string","type":"string"},"prefix":{"description":"prefix-based match.","format":"string","type":"string"},"regex":{"description":"ECMAscript style regex-based match as defined by [EDCA-262](http://en.cppreference.com/w/cpp/regex/ecmascript).","format":"string","type":"string"},"suffix":{"description":"suffix-based match.","format":"string","type":"string"}},"type":"object"},"type":"array"}},"type":"object"},"type":"array"}},"type":"object"}},"type":"object"},"type":"array"},"peerIsOptional":{"type":"boolean"},"peers":{"description":"List of authentication methods that can be used for peer authentication.","items":{"oneOf":[{"required":["mtls"]},{"required":["jwt"]}],"properties":{"jwt":{"properties":{"audiences":{"items":{"format":"string","type":"string"},"type":"array"},"issuer":{"description":"Identifies the issuer that issued the JWT.","format":"string","type":"string"},"jwks":{"description":"JSON Web Key Set of public keys to validate signature of the JWT.","format":"string","type":"string"},"jwksUri":{"format":"string","type":"string"},"jwks_uri":{"format":"string","type":"string"},"jwtHeaders":{"description":"JWT is sent in a request header.","items":{"format":"string","type":"string"},"type":"array"},"jwtParams":{"description":"JWT is sent in a query parameter.","items":{"format":"string","type":"string"},"type":"array"},"jwt_headers":{"description":"JWT is sent in a request header.","items":{"format":"string","type":"string"},"type":"array"},"triggerRules":{"items":{"properties":{"excludedPaths":{"description":"List of paths to be excluded from the request.","items":{"oneOf":[{"required":["exact"]},{"required":["prefix"]},{"required":["suffix"]},{"required":["regex"]}],"properties":{"exact":{"description":"exact string match.","format":"string","type":"string"},"prefix":{"description":"prefix-based match.","format":"string","type":"string"},"regex":{"description":"ECMAscript style regex-based match as defined by [EDCA-262](http://en.cppreference.com/w/cpp/regex/ecmascript).","format":"string","type":"string"},"suffix":{"description":"suffix-based match.","format":"string","type":"string"}},"type":"object"},"type":"array"},"excluded_paths":{"description":"List of paths to be excluded from the request.","items":{"oneOf":[{"required":["exact"]},{"required":["prefix"]},{"required":["suffix"]},{"required":["regex"]}],"properties":{"exact":{"description":"exact string match.","format":"string","type":"string"},"prefix":{"description":"prefix-based match.","format":"string","type":"string"},"regex":{"description":"ECMAscript style regex-based match as defined by [EDCA-262](http://en.cppreference.com/w/cpp/regex/ecmascript).","format":"string","type":"string"},"suffix":{"description":"suffix-based match.","format":"string","type":"string"}},"type":"object"},"type":"array"},"includedPaths":{"description":"List of paths that the request must include.","items":{"oneOf":[{"required":["exact"]},{"required":["prefix"]},{"required":["suffix"]},{"required":["regex"]}],"properties":{"exact":{"description":"exact string match.","format":"string","type":"string"},"prefix":{"description":"prefix-based match.","format":"string","type":"string"},"regex":{"description":"ECMAscript style regex-based match as defined by [EDCA-262](http://en.cppreference.com/w/cpp/regex/ecmascript).","format":"string","type":"string"},"suffix":{"description":"suffix-based match.","format":"string","type":"string"}},"type":"object"},"type":"array"},"included_paths":{"description":"List of paths that the request must include.","items":{"oneOf":[{"required":["exact"]},{"required":["prefix"]},{"required":["suffix"]},{"required":["regex"]}],"properties":{"exact":{"description":"exact string match.","format":"string","type":"string"},"prefix":{"description":"prefix-based match.","format":"string","type":"string"},"regex":{"description":"ECMAscript style regex-based match as defined by [EDCA-262](http://en.cppreference.com/w/cpp/regex/ecmascript).","format":"string","type":"string"},"suffix":{"description":"suffix-based match.","format":"string","type":"string"}},"type":"object"},"type":"array"}},"type":"object"},"type":"array"},"trigger_rules":{"items":{"properties":{"excludedPaths":{"description":"List of paths to be excluded from the request.","items":{"oneOf":[{"required":["exact"]},{"required":["prefix"]},{"required":["suffix"]},{"required":["regex"]}],"properties":{"exact":{"description":"exact string match.","format":"string","type":"string"},"prefix":{"description":"prefix-based match.","format":"string","type":"string"},"regex":{"description":"ECMAscript style regex-based match as defined by [EDCA-262](http://en.cppreference.com/w/cpp/regex/ecmascript).","format":"string","type":"string"},"suffix":{"description":"suffix-based match.","format":"string","type":"string"}},"type":"object"},"type":"array"},"excluded_paths":{"description":"List of paths to be excluded from the request.","items":{"oneOf":[{"required":["exact"]},{"required":["prefix"]},{"required":["suffix"]},{"required":["regex"]}],"properties":{"exact":{"description":"exact string match.","format":"string","type":"string"},"prefix":{"description":"prefix-based match.","format":"string","type":"string"},"regex":{"description":"ECMAscript style regex-based match as defined by [EDCA-262](http://en.cppreference.com/w/cpp/regex/ecmascript).","format":"string","type":"string"},"suffix":{"description":"suffix-based match.","format":"string","type":"string"}},"type":"object"},"type":"array"},"includedPaths":{"description":"List of paths that the request must include.","items":{"oneOf":[{"required":["exact"]},{"required":["prefix"]},{"required":["suffix"]},{"required":["regex"]}],"properties":{"exact":{"description":"exact string match.","format":"string","type":"string"},"prefix":{"description":"prefix-based match.","format":"string","type":"string"},"regex":{"description":"ECMAscript style regex-based match as defined by [EDCA-262](http://en.cppreference.com/w/cpp/regex/ecmascript).","format":"string","type":"string"},"suffix":{"description":"suffix-based match.","format":"string","type":"string"}},"type":"object"},"type":"array"},"included_paths":{"description":"List of paths that the request must include.","items":{"oneOf":[{"required":["exact"]},{"required":["prefix"]},{"required":["suffix"]},{"required":["regex"]}],"properties":{"exact":{"description":"exact string match.","format":"string","type":"string"},"prefix":{"description":"prefix-based match.","format":"string","type":"string"},"regex":{"description":"ECMAscript style regex-based match as defined by [EDCA-262](http://en.cppreference.com/w/cpp/regex/ecmascript).","format":"string","type":"string"},"suffix":{"description":"suffix-based match.","format":"string","type":"string"}},"type":"object"},"type":"array"}},"type":"object"},"type":"array"}},"type":"object"},"mtls":{"description":"Set if mTLS is used.","properties":{"allowTls":{"description":"WILL BE DEPRECATED, if set, will translates to `TLS_PERMISSIVE` mode.","type":"boolean"},"mode":{"description":"Defines the mode of mTLS authentication.","enum":["STRICT","PERMISSIVE"],"type":"string"}},"type":"object"}},"type":"object"},"type":"array"},"principalBinding":{"description":"Define whether peer or origin identity should be use for principal.","enum":["USE_PEER","USE_ORIGIN"],"type":"string"},"targets":{"description":"List rules to select workloads that the policy should be applied on.","items":{"properties":{"labels":{"additionalProperties":{"format":"string","type":"string"},"type":"object"},"name":{"description":"The name must be a short name from the service registry.","format":"string","type":"string"},"ports":{"description":"Specifies the ports.","items":{"oneOf":[{"required":["number"]},{"required":["name"]}],"properties":{"name":{"format":"string","type":"string"},"number":{"type":"integer"}},"type":"object"},"type":"array"}},"type":"object"},"type":"array"}},"type":"object"}},"type":"object"}},"versions":[{"name":"v1alpha1","served":true,"storage":true}]},"status":{"acceptedNames":{"kind":"","plural":""},"conditions":[],"storedVersions":[]}} | |
creationTimestamp: "2019-12-03T04:51:49Z" | |
generation: 3 | |
labels: | |
app: istio-citadel | |
chart: istio | |
heritage: Tiller | |
release: istio | |
name: meshpolicies.authentication.istio.io | |
resourceVersion: "43305" | |
selfLink: /apis/apiextensions.k8s.io/v1beta1/customresourcedefinitions/meshpolicies.authentication.istio.io | |
uid: 9d7cde9b-1588-11ea-b5af-027e0b84da98 | |
spec: | |
conversion: | |
strategy: None | |
group: authentication.istio.io | |
names: | |
categories: | |
- istio-io | |
- authentication-istio-io | |
kind: MeshPolicy | |
listKind: MeshPolicyList | |
plural: meshpolicies | |
singular: meshpolicy | |
scope: Cluster | |
subresources: | |
status: {} | |
validation: | |
openAPIV3Schema: | |
properties: | |
spec: | |
description: 'Authentication policy for Istio services. See more details | |
at: https://istio.io/docs/reference/config/istio.authentication.v1alpha1.html' | |
properties: | |
originIsOptional: | |
type: boolean | |
origins: | |
description: List of authentication methods that can be used for origin | |
authentication. | |
items: | |
properties: | |
jwt: | |
description: Jwt params for the method. | |
properties: | |
audiences: | |
items: | |
format: string | |
type: string | |
type: array | |
issuer: | |
description: Identifies the issuer that issued the JWT. | |
format: string | |
type: string | |
jwks: | |
description: JSON Web Key Set of public keys to validate | |
signature of the JWT. | |
format: string | |
type: string | |
jwks_uri: | |
format: string | |
type: string | |
jwksUri: | |
format: string | |
type: string | |
jwt_headers: | |
description: JWT is sent in a request header. | |
items: | |
format: string | |
type: string | |
type: array | |
jwtHeaders: | |
description: JWT is sent in a request header. | |
items: | |
format: string | |
type: string | |
type: array | |
jwtParams: | |
description: JWT is sent in a query parameter. | |
items: | |
format: string | |
type: string | |
type: array | |
trigger_rules: | |
items: | |
properties: | |
excluded_paths: | |
description: List of paths to be excluded from the | |
request. | |
items: | |
oneOf: | |
- required: | |
- exact | |
- required: | |
- prefix | |
- required: | |
- suffix | |
- required: | |
- regex | |
properties: | |
exact: | |
description: exact string match. | |
format: string | |
type: string | |
prefix: | |
description: prefix-based match. | |
format: string | |
type: string | |
regex: | |
description: ECMAscript style regex-based match | |
as defined by [EDCA-262](http://en.cppreference.com/w/cpp/regex/ecmascript). | |
format: string | |
type: string | |
suffix: | |
description: suffix-based match. | |
format: string | |
type: string | |
type: object | |
type: array | |
excludedPaths: | |
description: List of paths to be excluded from the | |
request. | |
items: | |
oneOf: | |
- required: | |
- exact | |
- required: | |
- prefix | |
- required: | |
- suffix | |
- required: | |
- regex | |
properties: | |
exact: | |
description: exact string match. | |
format: string | |
type: string | |
prefix: | |
description: prefix-based match. | |
format: string | |
type: string | |
regex: | |
description: ECMAscript style regex-based match | |
as defined by [EDCA-262](http://en.cppreference.com/w/cpp/regex/ecmascript). | |
format: string | |
type: string | |
suffix: | |
description: suffix-based match. | |
format: string | |
type: string | |
type: object | |
type: array | |
included_paths: | |
description: List of paths that the request must include. | |
items: | |
oneOf: | |
- required: | |
- exact | |
- required: | |
- prefix | |
- required: | |
- suffix | |
- required: | |
- regex | |
properties: | |
exact: | |
description: exact string match. | |
format: string | |
type: string | |
prefix: | |
description: prefix-based match. | |
format: string | |
type: string | |
regex: | |
description: ECMAscript style regex-based match | |
as defined by [EDCA-262](http://en.cppreference.com/w/cpp/regex/ecmascript). | |
format: string | |
type: string | |
suffix: | |
description: suffix-based match. | |
format: string | |
type: string | |
type: object | |
type: array | |
includedPaths: | |
description: List of paths that the request must include. | |
items: | |
oneOf: | |
- required: | |
- exact | |
- required: | |
- prefix | |
- required: | |
- suffix | |
- required: | |
- regex | |
properties: | |
exact: | |
description: exact string match. | |
format: string | |
type: string | |
prefix: | |
description: prefix-based match. | |
format: string | |
type: string | |
regex: | |
description: ECMAscript style regex-based match | |
as defined by [EDCA-262](http://en.cppreference.com/w/cpp/regex/ecmascript). | |
format: string | |
type: string | |
suffix: | |
description: suffix-based match. | |
format: string | |
type: string | |
type: object | |
type: array | |
type: object | |
type: array | |
triggerRules: | |
items: | |
properties: | |
excluded_paths: | |
description: List of paths to be excluded from the | |
request. | |
items: | |
oneOf: | |
- required: | |
- exact | |
- required: | |
- prefix | |
- required: | |
- suffix | |
- required: | |
- regex | |
properties: | |
exact: | |
description: exact string match. | |
format: string | |
type: string | |
prefix: | |
description: prefix-based match. | |
format: string | |
type: string | |
regex: | |
description: ECMAscript style regex-based match | |
as defined by [EDCA-262](http://en.cppreference.com/w/cpp/regex/ecmascript). | |
format: string | |
type: string | |
suffix: | |
description: suffix-based match. | |
format: string | |
type: string | |
type: object | |
type: array | |
excludedPaths: | |
description: List of paths to be excluded from the | |
request. | |
items: | |
oneOf: | |
- required: | |
- exact | |
- required: | |
- prefix | |
- required: | |
- suffix | |
- required: | |
- regex | |
properties: | |
exact: | |
description: exact string match. | |
format: string | |
type: string | |
prefix: | |
description: prefix-based match. | |
format: string | |
type: string | |
regex: | |
description: ECMAscript style regex-based match | |
as defined by [EDCA-262](http://en.cppreference.com/w/cpp/regex/ecmascript). | |
format: string | |
type: string | |
suffix: | |
description: suffix-based match. | |
format: string | |
type: string | |
type: object | |
type: array | |
included_paths: | |
description: List of paths that the request must include. | |
items: | |
oneOf: | |
- required: | |
- exact | |
- required: | |
- prefix | |
- required: | |
- suffix | |
- required: | |
- regex | |
properties: | |
exact: | |
description: exact string match. | |
format: string | |
type: string | |
prefix: | |
description: prefix-based match. | |
format: string | |
type: string | |
regex: | |
description: ECMAscript style regex-based match | |
as defined by [EDCA-262](http://en.cppreference.com/w/cpp/regex/ecmascript). | |
format: string | |
type: string | |
suffix: | |
description: suffix-based match. | |
format: string | |
type: string | |
type: object | |
type: array | |
includedPaths: | |
description: List of paths that the request must include. | |
items: | |
oneOf: | |
- required: | |
- exact | |
- required: | |
- prefix | |
- required: | |
- suffix | |
- required: | |
- regex | |
properties: | |
exact: | |
description: exact string match. | |
format: string | |
type: string | |
prefix: | |
description: prefix-based match. | |
format: string | |
type: string | |
regex: | |
description: ECMAscript style regex-based match | |
as defined by [EDCA-262](http://en.cppreference.com/w/cpp/regex/ecmascript). | |
format: string | |
type: string | |
suffix: | |
description: suffix-based match. | |
format: string | |
type: string | |
type: object | |
type: array | |
type: object | |
type: array | |
type: object | |
type: object | |
type: array | |
peerIsOptional: | |
type: boolean | |
peers: | |
description: List of authentication methods that can be used for peer | |
authentication. | |
items: | |
oneOf: | |
- required: | |
- mtls | |
- required: | |
- jwt | |
properties: | |
jwt: | |
properties: | |
audiences: | |
items: | |
format: string | |
type: string | |
type: array | |
issuer: | |
description: Identifies the issuer that issued the JWT. | |
format: string | |
type: string | |
jwks: | |
description: JSON Web Key Set of public keys to validate | |
signature of the JWT. | |
format: string | |
type: string | |
jwks_uri: | |
format: string | |
type: string | |
jwksUri: | |
format: string | |
type: string | |
jwt_headers: | |
description: JWT is sent in a request header. | |
items: | |
format: string | |
type: string | |
type: array | |
jwtHeaders: | |
description: JWT is sent in a request header. | |
items: | |
format: string | |
type: string | |
type: array | |
jwtParams: | |
description: JWT is sent in a query parameter. | |
items: | |
format: string | |
type: string | |
type: array | |
trigger_rules: | |
items: | |
properties: | |
excluded_paths: | |
description: List of paths to be excluded from the | |
request. | |
items: | |
oneOf: | |
- required: | |
- exact | |
- required: | |
- prefix | |
- required: | |
- suffix | |
- required: | |
- regex | |
properties: | |
exact: | |
description: exact string match. | |
format: string | |
type: string | |
prefix: | |
description: prefix-based match. | |
format: string | |
type: string | |
regex: | |
description: ECMAscript style regex-based match | |
as defined by [EDCA-262](http://en.cppreference.com/w/cpp/regex/ecmascript). | |
format: string | |
type: string | |
suffix: | |
description: suffix-based match. | |
format: string | |
type: string | |
type: object | |
type: array | |
excludedPaths: | |
description: List of paths to be excluded from the | |
request. | |
items: | |
oneOf: | |
- required: | |
- exact | |
- required: | |
- prefix | |
- required: | |
- suffix | |
- required: | |
- regex | |
properties: | |
exact: | |
description: exact string match. | |
format: string | |
type: string | |
prefix: | |
description: prefix-based match. | |
format: string | |
type: string | |
regex: | |
description: ECMAscript style regex-based match | |
as defined by [EDCA-262](http://en.cppreference.com/w/cpp/regex/ecmascript). | |
format: string | |
type: string | |
suffix: | |
description: suffix-based match. | |
format: string | |
type: string | |
type: object | |
type: array | |
included_paths: | |
description: List of paths that the request must include. | |
items: | |
oneOf: | |
- required: | |
- exact | |
- required: | |
- prefix | |
- required: | |
- suffix | |
- required: | |
- regex | |
properties: | |
exact: | |
description: exact string match. | |
format: string | |
type: string | |
prefix: | |
description: prefix-based match. | |
format: string | |
type: string | |
regex: | |
description: ECMAscript style regex-based match | |
as defined by [EDCA-262](http://en.cppreference.com/w/cpp/regex/ecmascript). | |
format: string | |
type: string | |
suffix: | |
description: suffix-based match. | |
format: string | |
type: string | |
type: object | |
type: array | |
includedPaths: | |
description: List of paths that the request must include. | |
items: | |
oneOf: | |
- required: | |
- exact | |
- required: | |
- prefix | |
- required: | |
- suffix | |
- required: | |
- regex | |
properties: | |
exact: | |
description: exact string match. | |
format: string | |
type: string | |
prefix: | |
description: prefix-based match. | |
format: string | |
type: string | |
regex: | |
description: ECMAscript style regex-based match | |
as defined by [EDCA-262](http://en.cppreference.com/w/cpp/regex/ecmascript). | |
format: string | |
type: string | |
suffix: | |
description: suffix-based match. | |
format: string | |
type: string | |
type: object | |
type: array | |
type: object | |
type: array | |
triggerRules: | |
items: | |
properties: | |
excluded_paths: | |
description: List of paths to be excluded from the | |
request. | |
items: | |
oneOf: | |
- required: | |
- exact | |
- required: | |
- prefix | |
- required: | |
- suffix | |
- required: | |
- regex | |
properties: | |
exact: | |
description: exact string match. | |
format: string | |
type: string | |
prefix: | |
description: prefix-based match. | |
format: string | |
type: string | |
regex: | |
description: ECMAscript style regex-based match | |
as defined by [EDCA-262](http://en.cppreference.com/w/cpp/regex/ecmascript). | |
format: string | |
type: string | |
suffix: | |
description: suffix-based match. | |
format: string | |
type: string | |
type: object | |
type: array | |
excludedPaths: | |
description: List of paths to be excluded from the | |
request. | |
items: | |
oneOf: | |
- required: | |
- exact | |
- required: | |
- prefix | |
- required: | |
- suffix | |
- required: | |
- regex | |
properties: | |
exact: | |
description: exact string match. | |
format: string | |
type: string | |
prefix: | |
description: prefix-based match. | |
format: string | |
type: string | |
regex: | |
description: ECMAscript style regex-based match | |
as defined by [EDCA-262](http://en.cppreference.com/w/cpp/regex/ecmascript). | |
format: string | |
type: string | |
suffix: | |
description: suffix-based match. | |
format: string | |
type: string | |
type: object | |
type: array | |
included_paths: | |
description: List of paths that the request must include. | |
items: | |
oneOf: | |
- required: | |
- exact | |
- required: | |
- prefix | |
- required: | |
- suffix | |
- required: | |
- regex | |
properties: | |
exact: | |
description: exact string match. | |
format: string | |
type: string | |
prefix: | |
description: prefix-based match. | |
format: string | |
type: string | |
regex: | |
description: ECMAscript style regex-based match | |
as defined by [EDCA-262](http://en.cppreference.com/w/cpp/regex/ecmascript). | |
format: string | |
type: string | |
suffix: | |
description: suffix-based match. | |
format: string | |
type: string | |
type: object | |
type: array | |
includedPaths: | |
description: List of paths that the request must include. | |
items: | |
oneOf: | |
- required: | |
- exact | |
- required: | |
- prefix | |
- required: | |
- suffix | |
- required: | |
- regex | |
properties: | |
exact: | |
description: exact string match. | |
format: string | |
type: string | |
prefix: | |
description: prefix-based match. | |
format: string | |
type: string | |
regex: | |
description: ECMAscript style regex-based match | |
as defined by [EDCA-262](http://en.cppreference.com/w/cpp/regex/ecmascript). | |
format: string | |
type: string | |
suffix: | |
description: suffix-based match. | |
format: string | |
type: string | |
type: object | |
type: array | |
type: object | |
type: array | |
type: object | |
mtls: | |
description: Set if mTLS is used. | |
properties: | |
allowTls: | |
description: WILL BE DEPRECATED, if set, will translates | |
to `TLS_PERMISSIVE` mode. | |
type: boolean | |
mode: | |
description: Defines the mode of mTLS authentication. | |
enum: | |
- STRICT | |
- PERMISSIVE | |
type: string | |
type: object | |
type: object | |
type: array | |
principalBinding: | |
description: Define whether peer or origin identity should be use | |
for principal. | |
enum: | |
- USE_PEER | |
- USE_ORIGIN | |
type: string | |
targets: | |
description: List rules to select workloads that the policy should | |
be applied on. | |
items: | |
properties: | |
labels: | |
additionalProperties: | |
format: string | |
type: string | |
type: object | |
name: | |
description: The name must be a short name from the service | |
registry. | |
format: string | |
type: string | |
ports: | |
description: Specifies the ports. | |
items: | |
oneOf: | |
- required: | |
- number | |
- required: | |
- name | |
properties: | |
name: | |
format: string | |
type: string | |
number: | |
type: integer | |
type: object | |
type: array | |
type: object | |
type: array | |
type: object | |
type: object | |
version: v1alpha1 | |
versions: | |
- name: v1alpha1 | |
served: true | |
storage: true | |
status: | |
acceptedNames: | |
categories: | |
- istio-io | |
- authentication-istio-io | |
kind: MeshPolicy | |
listKind: MeshPolicyList | |
plural: meshpolicies | |
singular: meshpolicy | |
conditions: | |
- lastTransitionTime: "2019-12-03T04:51:49Z" | |
message: no conflicts found | |
reason: NoConflicts | |
status: "True" | |
type: NamesAccepted | |
- lastTransitionTime: null | |
message: the initial names have been accepted | |
reason: InitialNamesAccepted | |
status: "True" | |
type: Established | |
storedVersions: | |
- v1alpha1 | |
- apiVersion: apiextensions.k8s.io/v1beta1 | |
kind: CustomResourceDefinition | |
metadata: | |
annotations: | |
kubectl.kubernetes.io/last-applied-configuration: | | |
{"apiVersion":"apiextensions.k8s.io/v1beta1","kind":"CustomResourceDefinition","metadata":{"annotations":{},"labels":{"knative.dev/crd-install":"true","serving.knative.dev/release":"devel"},"name":"metrics.autoscaling.internal.knative.dev"},"spec":{"additionalPrinterColumns":[{"JSONPath":".status.conditions[?(@.type=='Ready')].status","name":"Ready","type":"string"},{"JSONPath":".status.conditions[?(@.type=='Ready')].reason","name":"Reason","type":"string"}],"group":"autoscaling.internal.knative.dev","names":{"categories":["knative-internal","autoscaling"],"kind":"Metric","plural":"metrics","singular":"metric"},"scope":"Namespaced","subresources":{"status":{}},"version":"v1alpha1"}} | |
creationTimestamp: "2019-12-03T10:54:07Z" | |
generation: 1 | |
labels: | |
knative.dev/crd-install: "true" | |
serving.knative.dev/release: devel | |
name: metrics.autoscaling.internal.knative.dev | |
resourceVersion: "43837" | |
selfLink: /apis/apiextensions.k8s.io/v1beta1/customresourcedefinitions/metrics.autoscaling.internal.knative.dev | |
uid: 3aea25c3-15bb-11ea-b5af-027e0b84da98 | |
spec: | |
additionalPrinterColumns: | |
- JSONPath: .status.conditions[?(@.type=='Ready')].status | |
name: Ready | |
type: string | |
- JSONPath: .status.conditions[?(@.type=='Ready')].reason | |
name: Reason | |
type: string | |
conversion: | |
strategy: None | |
group: autoscaling.internal.knative.dev | |
names: | |
categories: | |
- knative-internal | |
- autoscaling | |
kind: Metric | |
listKind: MetricList | |
plural: metrics | |
singular: metric | |
scope: Namespaced | |
subresources: | |
status: {} | |
version: v1alpha1 | |
versions: | |
- name: v1alpha1 | |
served: true | |
storage: true | |
status: | |
acceptedNames: | |
categories: | |
- knative-internal | |
- autoscaling | |
kind: Metric | |
listKind: MetricList | |
plural: metrics | |
singular: metric | |
conditions: | |
- lastTransitionTime: "2019-12-03T10:54:07Z" | |
message: no conflicts found | |
reason: NoConflicts | |
status: "True" | |
type: NamesAccepted | |
- lastTransitionTime: null | |
message: the initial names have been accepted | |
reason: InitialNamesAccepted | |
status: "True" | |
type: Established | |
storedVersions: | |
- v1alpha1 | |
- apiVersion: apiextensions.k8s.io/v1beta1 | |
kind: CustomResourceDefinition | |
metadata: | |
annotations: | |
kubectl.kubernetes.io/last-applied-configuration: | | |
{"apiVersion":"apiextensions.k8s.io/v1beta1","kind":"CustomResourceDefinition","metadata":{"annotations":{},"labels":{"knative.dev/crd-install":"true","serving.knative.dev/release":"devel"},"name":"podautoscalers.autoscaling.internal.knative.dev"},"spec":{"additionalPrinterColumns":[{"JSONPath":".status.desiredScale","name":"DesiredScale","type":"integer"},{"JSONPath":".status.actualScale","name":"ActualScale","type":"integer"},{"JSONPath":".status.conditions[?(@.type=='Ready')].status","name":"Ready","type":"string"},{"JSONPath":".status.conditions[?(@.type=='Ready')].reason","name":"Reason","type":"string"}],"group":"autoscaling.internal.knative.dev","names":{"categories":["knative-internal","autoscaling"],"kind":"PodAutoscaler","plural":"podautoscalers","shortNames":["kpa","pa"],"singular":"podautoscaler"},"scope":"Namespaced","subresources":{"status":{}},"versions":[{"name":"v1alpha1","served":true,"storage":true}]}} | |
creationTimestamp: "2019-12-03T10:54:08Z" | |
generation: 1 | |
labels: | |
knative.dev/crd-install: "true" | |
serving.knative.dev/release: devel | |
name: podautoscalers.autoscaling.internal.knative.dev | |
resourceVersion: "43840" | |
selfLink: /apis/apiextensions.k8s.io/v1beta1/customresourcedefinitions/podautoscalers.autoscaling.internal.knative.dev | |
uid: 3b0250a5-15bb-11ea-b5af-027e0b84da98 | |
spec: | |
additionalPrinterColumns: | |
- JSONPath: .status.desiredScale | |
name: DesiredScale | |
type: integer | |
- JSONPath: .status.actualScale | |
name: ActualScale | |
type: integer | |
- JSONPath: .status.conditions[?(@.type=='Ready')].status | |
name: Ready | |
type: string | |
- JSONPath: .status.conditions[?(@.type=='Ready')].reason | |
name: Reason | |
type: string | |
conversion: | |
strategy: None | |
group: autoscaling.internal.knative.dev | |
names: | |
categories: | |
- knative-internal | |
- autoscaling | |
kind: PodAutoscaler | |
listKind: PodAutoscalerList | |
plural: podautoscalers | |
shortNames: | |
- kpa | |
- pa | |
singular: podautoscaler | |
scope: Namespaced | |
subresources: | |
status: {} | |
version: v1alpha1 | |
versions: | |
- name: v1alpha1 | |
served: true | |
storage: true | |
status: | |
acceptedNames: | |
categories: | |
- knative-internal | |
- autoscaling | |
kind: PodAutoscaler | |
listKind: PodAutoscalerList | |
plural: podautoscalers | |
shortNames: | |
- kpa | |
- pa | |
singular: podautoscaler | |
conditions: | |
- lastTransitionTime: "2019-12-03T10:54:08Z" | |
message: no conflicts found | |
reason: NoConflicts | |
status: "True" | |
type: NamesAccepted | |
- lastTransitionTime: null | |
message: the initial names have been accepted | |
reason: InitialNamesAccepted | |
status: "True" | |
type: Established | |
storedVersions: | |
- v1alpha1 | |
- apiVersion: apiextensions.k8s.io/v1beta1 | |
kind: CustomResourceDefinition | |
metadata: | |
annotations: | |
helm.sh/resource-policy: keep | |
kubectl.kubernetes.io/last-applied-configuration: | | |
{"apiVersion":"apiextensions.k8s.io/v1beta1","kind":"CustomResourceDefinition","metadata":{"annotations":{"helm.sh/resource-policy":"keep"},"creationTimestamp":null,"labels":{"app":"istio-citadel","chart":"istio","heritage":"Tiller","release":"istio"},"name":"policies.authentication.istio.io"},"spec":{"group":"authentication.istio.io","names":{"categories":["istio-io","authentication-istio-io"],"kind":"Policy","plural":"policies","singular":"policy"},"scope":"Namespaced","subresources":{"status":{}},"validation":{"openAPIV3Schema":{"properties":{"spec":{"description":"Authentication policy for Istio services. See more details at: https://istio.io/docs/reference/config/istio.authentication.v1alpha1.html","properties":{"originIsOptional":{"type":"boolean"},"origins":{"description":"List of authentication methods that can be used for origin authentication.","items":{"properties":{"jwt":{"description":"Jwt params for the method.","properties":{"audiences":{"items":{"format":"string","type":"string"},"type":"array"},"issuer":{"description":"Identifies the issuer that issued the JWT.","format":"string","type":"string"},"jwks":{"description":"JSON Web Key Set of public keys to validate signature of the JWT.","format":"string","type":"string"},"jwksUri":{"format":"string","type":"string"},"jwks_uri":{"format":"string","type":"string"},"jwtHeaders":{"description":"JWT is sent in a request header.","items":{"format":"string","type":"string"},"type":"array"},"jwtParams":{"description":"JWT is sent in a query parameter.","items":{"format":"string","type":"string"},"type":"array"},"jwt_headers":{"description":"JWT is sent in a request header.","items":{"format":"string","type":"string"},"type":"array"},"triggerRules":{"items":{"properties":{"excludedPaths":{"description":"List of paths to be excluded from the request.","items":{"oneOf":[{"required":["exact"]},{"required":["prefix"]},{"required":["suffix"]},{"required":["regex"]}],"properties":{"exact":{"description":"exact string match.","format":"string","type":"string"},"prefix":{"description":"prefix-based match.","format":"string","type":"string"},"regex":{"description":"ECMAscript style regex-based match as defined by [EDCA-262](http://en.cppreference.com/w/cpp/regex/ecmascript).","format":"string","type":"string"},"suffix":{"description":"suffix-based match.","format":"string","type":"string"}},"type":"object"},"type":"array"},"excluded_paths":{"description":"List of paths to be excluded from the request.","items":{"oneOf":[{"required":["exact"]},{"required":["prefix"]},{"required":["suffix"]},{"required":["regex"]}],"properties":{"exact":{"description":"exact string match.","format":"string","type":"string"},"prefix":{"description":"prefix-based match.","format":"string","type":"string"},"regex":{"description":"ECMAscript style regex-based match as defined by [EDCA-262](http://en.cppreference.com/w/cpp/regex/ecmascript).","format":"string","type":"string"},"suffix":{"description":"suffix-based match.","format":"string","type":"string"}},"type":"object"},"type":"array"},"includedPaths":{"description":"List of paths that the request must include.","items":{"oneOf":[{"required":["exact"]},{"required":["prefix"]},{"required":["suffix"]},{"required":["regex"]}],"properties":{"exact":{"description":"exact string match.","format":"string","type":"string"},"prefix":{"description":"prefix-based match.","format":"string","type":"string"},"regex":{"description":"ECMAscript style regex-based match as defined by [EDCA-262](http://en.cppreference.com/w/cpp/regex/ecmascript).","format":"string","type":"string"},"suffix":{"description":"suffix-based match.","format":"string","type":"string"}},"type":"object"},"type":"array"},"included_paths":{"description":"List of paths that the request must include.","items":{"oneOf":[{"required":["exact"]},{"required":["prefix"]},{"required":["suffix"]},{"required":["regex"]}],"properties":{"exact":{"description":"exact string match.","format":"string","type":"string"},"prefix":{"description":"prefix-based match.","format":"string","type":"string"},"regex":{"description":"ECMAscript style regex-based match as defined by [EDCA-262](http://en.cppreference.com/w/cpp/regex/ecmascript).","format":"string","type":"string"},"suffix":{"description":"suffix-based match.","format":"string","type":"string"}},"type":"object"},"type":"array"}},"type":"object"},"type":"array"},"trigger_rules":{"items":{"properties":{"excludedPaths":{"description":"List of paths to be excluded from the request.","items":{"oneOf":[{"required":["exact"]},{"required":["prefix"]},{"required":["suffix"]},{"required":["regex"]}],"properties":{"exact":{"description":"exact string match.","format":"string","type":"string"},"prefix":{"description":"prefix-based match.","format":"string","type":"string"},"regex":{"description":"ECMAscript style regex-based match as defined by [EDCA-262](http://en.cppreference.com/w/cpp/regex/ecmascript).","format":"string","type":"string"},"suffix":{"description":"suffix-based match.","format":"string","type":"string"}},"type":"object"},"type":"array"},"excluded_paths":{"description":"List of paths to be excluded from the request.","items":{"oneOf":[{"required":["exact"]},{"required":["prefix"]},{"required":["suffix"]},{"required":["regex"]}],"properties":{"exact":{"description":"exact string match.","format":"string","type":"string"},"prefix":{"description":"prefix-based match.","format":"string","type":"string"},"regex":{"description":"ECMAscript style regex-based match as defined by [EDCA-262](http://en.cppreference.com/w/cpp/regex/ecmascript).","format":"string","type":"string"},"suffix":{"description":"suffix-based match.","format":"string","type":"string"}},"type":"object"},"type":"array"},"includedPaths":{"description":"List of paths that the request must include.","items":{"oneOf":[{"required":["exact"]},{"required":["prefix"]},{"required":["suffix"]},{"required":["regex"]}],"properties":{"exact":{"description":"exact string match.","format":"string","type":"string"},"prefix":{"description":"prefix-based match.","format":"string","type":"string"},"regex":{"description":"ECMAscript style regex-based match as defined by [EDCA-262](http://en.cppreference.com/w/cpp/regex/ecmascript).","format":"string","type":"string"},"suffix":{"description":"suffix-based match.","format":"string","type":"string"}},"type":"object"},"type":"array"},"included_paths":{"description":"List of paths that the request must include.","items":{"oneOf":[{"required":["exact"]},{"required":["prefix"]},{"required":["suffix"]},{"required":["regex"]}],"properties":{"exact":{"description":"exact string match.","format":"string","type":"string"},"prefix":{"description":"prefix-based match.","format":"string","type":"string"},"regex":{"description":"ECMAscript style regex-based match as defined by [EDCA-262](http://en.cppreference.com/w/cpp/regex/ecmascript).","format":"string","type":"string"},"suffix":{"description":"suffix-based match.","format":"string","type":"string"}},"type":"object"},"type":"array"}},"type":"object"},"type":"array"}},"type":"object"}},"type":"object"},"type":"array"},"peerIsOptional":{"type":"boolean"},"peers":{"description":"List of authentication methods that can be used for peer authentication.","items":{"oneOf":[{"required":["mtls"]},{"required":["jwt"]}],"properties":{"jwt":{"properties":{"audiences":{"items":{"format":"string","type":"string"},"type":"array"},"issuer":{"description":"Identifies the issuer that issued the JWT.","format":"string","type":"string"},"jwks":{"description":"JSON Web Key Set of public keys to validate signature of the JWT.","format":"string","type":"string"},"jwksUri":{"format":"string","type":"string"},"jwks_uri":{"format":"string","type":"string"},"jwtHeaders":{"description":"JWT is sent in a request header.","items":{"format":"string","type":"string"},"type":"array"},"jwtParams":{"description":"JWT is sent in a query parameter.","items":{"format":"string","type":"string"},"type":"array"},"jwt_headers":{"description":"JWT is sent in a request header.","items":{"format":"string","type":"string"},"type":"array"},"triggerRules":{"items":{"properties":{"excludedPaths":{"description":"List of paths to be excluded from the request.","items":{"oneOf":[{"required":["exact"]},{"required":["prefix"]},{"required":["suffix"]},{"required":["regex"]}],"properties":{"exact":{"description":"exact string match.","format":"string","type":"string"},"prefix":{"description":"prefix-based match.","format":"string","type":"string"},"regex":{"description":"ECMAscript style regex-based match as defined by [EDCA-262](http://en.cppreference.com/w/cpp/regex/ecmascript).","format":"string","type":"string"},"suffix":{"description":"suffix-based match.","format":"string","type":"string"}},"type":"object"},"type":"array"},"excluded_paths":{"description":"List of paths to be excluded from the request.","items":{"oneOf":[{"required":["exact"]},{"required":["prefix"]},{"required":["suffix"]},{"required":["regex"]}],"properties":{"exact":{"description":"exact string match.","format":"string","type":"string"},"prefix":{"description":"prefix-based match.","format":"string","type":"string"},"regex":{"description":"ECMAscript style regex-based match as defined by [EDCA-262](http://en.cppreference.com/w/cpp/regex/ecmascript).","format":"string","type":"string"},"suffix":{"description":"suffix-based match.","format":"string","type":"string"}},"type":"object"},"type":"array"},"includedPaths":{"description":"List of paths that the request must include.","items":{"oneOf":[{"required":["exact"]},{"required":["prefix"]},{"required":["suffix"]},{"required":["regex"]}],"properties":{"exact":{"description":"exact string match.","format":"string","type":"string"},"prefix":{"description":"prefix-based match.","format":"string","type":"string"},"regex":{"description":"ECMAscript style regex-based match as defined by [EDCA-262](http://en.cppreference.com/w/cpp/regex/ecmascript).","format":"string","type":"string"},"suffix":{"description":"suffix-based match.","format":"string","type":"string"}},"type":"object"},"type":"array"},"included_paths":{"description":"List of paths that the request must include.","items":{"oneOf":[{"required":["exact"]},{"required":["prefix"]},{"required":["suffix"]},{"required":["regex"]}],"properties":{"exact":{"description":"exact string match.","format":"string","type":"string"},"prefix":{"description":"prefix-based match.","format":"string","type":"string"},"regex":{"description":"ECMAscript style regex-based match as defined by [EDCA-262](http://en.cppreference.com/w/cpp/regex/ecmascript).","format":"string","type":"string"},"suffix":{"description":"suffix-based match.","format":"string","type":"string"}},"type":"object"},"type":"array"}},"type":"object"},"type":"array"},"trigger_rules":{"items":{"properties":{"excludedPaths":{"description":"List of paths to be excluded from the request.","items":{"oneOf":[{"required":["exact"]},{"required":["prefix"]},{"required":["suffix"]},{"required":["regex"]}],"properties":{"exact":{"description":"exact string match.","format":"string","type":"string"},"prefix":{"description":"prefix-based match.","format":"string","type":"string"},"regex":{"description":"ECMAscript style regex-based match as defined by [EDCA-262](http://en.cppreference.com/w/cpp/regex/ecmascript).","format":"string","type":"string"},"suffix":{"description":"suffix-based match.","format":"string","type":"string"}},"type":"object"},"type":"array"},"excluded_paths":{"description":"List of paths to be excluded from the request.","items":{"oneOf":[{"required":["exact"]},{"required":["prefix"]},{"required":["suffix"]},{"required":["regex"]}],"properties":{"exact":{"description":"exact string match.","format":"string","type":"string"},"prefix":{"description":"prefix-based match.","format":"string","type":"string"},"regex":{"description":"ECMAscript style regex-based match as defined by [EDCA-262](http://en.cppreference.com/w/cpp/regex/ecmascript).","format":"string","type":"string"},"suffix":{"description":"suffix-based match.","format":"string","type":"string"}},"type":"object"},"type":"array"},"includedPaths":{"description":"List of paths that the request must include.","items":{"oneOf":[{"required":["exact"]},{"required":["prefix"]},{"required":["suffix"]},{"required":["regex"]}],"properties":{"exact":{"description":"exact string match.","format":"string","type":"string"},"prefix":{"description":"prefix-based match.","format":"string","type":"string"},"regex":{"description":"ECMAscript style regex-based match as defined by [EDCA-262](http://en.cppreference.com/w/cpp/regex/ecmascript).","format":"string","type":"string"},"suffix":{"description":"suffix-based match.","format":"string","type":"string"}},"type":"object"},"type":"array"},"included_paths":{"description":"List of paths that the request must include.","items":{"oneOf":[{"required":["exact"]},{"required":["prefix"]},{"required":["suffix"]},{"required":["regex"]}],"properties":{"exact":{"description":"exact string match.","format":"string","type":"string"},"prefix":{"description":"prefix-based match.","format":"string","type":"string"},"regex":{"description":"ECMAscript style regex-based match as defined by [EDCA-262](http://en.cppreference.com/w/cpp/regex/ecmascript).","format":"string","type":"string"},"suffix":{"description":"suffix-based match.","format":"string","type":"string"}},"type":"object"},"type":"array"}},"type":"object"},"type":"array"}},"type":"object"},"mtls":{"description":"Set if mTLS is used.","properties":{"allowTls":{"description":"WILL BE DEPRECATED, if set, will translates to `TLS_PERMISSIVE` mode.","type":"boolean"},"mode":{"description":"Defines the mode of mTLS authentication.","enum":["STRICT","PERMISSIVE"],"type":"string"}},"type":"object"}},"type":"object"},"type":"array"},"principalBinding":{"description":"Define whether peer or origin identity should be use for principal.","enum":["USE_PEER","USE_ORIGIN"],"type":"string"},"targets":{"description":"List rules to select workloads that the policy should be applied on.","items":{"properties":{"labels":{"additionalProperties":{"format":"string","type":"string"},"type":"object"},"name":{"description":"The name must be a short name from the service registry.","format":"string","type":"string"},"ports":{"description":"Specifies the ports.","items":{"oneOf":[{"required":["number"]},{"required":["name"]}],"properties":{"name":{"format":"string","type":"string"},"number":{"type":"integer"}},"type":"object"},"type":"array"}},"type":"object"},"type":"array"}},"type":"object"}},"type":"object"}},"versions":[{"name":"v1alpha1","served":true,"storage":true}]},"status":{"acceptedNames":{"kind":"","plural":""},"conditions":[],"storedVersions":[]}} | |
creationTimestamp: "2019-12-03T04:51:49Z" | |
generation: 3 | |
labels: | |
app: istio-citadel | |
chart: istio | |
heritage: Tiller | |
release: istio | |
name: policies.authentication.istio.io | |
resourceVersion: "43308" | |
selfLink: /apis/apiextensions.k8s.io/v1beta1/customresourcedefinitions/policies.authentication.istio.io | |
uid: 9d8a038d-1588-11ea-b5af-027e0b84da98 | |
spec: | |
conversion: | |
strategy: None | |
group: authentication.istio.io | |
names: | |
categories: | |
- istio-io | |
- authentication-istio-io | |
kind: Policy | |
listKind: PolicyList | |
plural: policies | |
singular: policy | |
scope: Namespaced | |
subresources: | |
status: {} | |
validation: | |
openAPIV3Schema: | |
properties: | |
spec: | |
description: 'Authentication policy for Istio services. See more details | |
at: https://istio.io/docs/reference/config/istio.authentication.v1alpha1.html' | |
properties: | |
originIsOptional: | |
type: boolean | |
origins: | |
description: List of authentication methods that can be used for origin | |
authentication. | |
items: | |
properties: | |
jwt: | |
description: Jwt params for the method. | |
properties: | |
audiences: | |
items: | |
format: string | |
type: string | |
type: array | |
issuer: | |
description: Identifies the issuer that issued the JWT. | |
format: string | |
type: string | |
jwks: | |
description: JSON Web Key Set of public keys to validate | |
signature of the JWT. | |
format: string | |
type: string | |
jwks_uri: | |
format: string | |
type: string | |
jwksUri: | |
format: string | |
type: string | |
jwt_headers: | |
description: JWT is sent in a request header. | |
items: | |
format: string | |
type: string | |
type: array | |
jwtHeaders: | |
description: JWT is sent in a request header. | |
items: | |
format: string | |
type: string | |
type: array | |
jwtParams: | |
description: JWT is sent in a query parameter. | |
items: | |
format: string | |
type: string | |
type: array | |
trigger_rules: | |
items: | |
properties: | |
excluded_paths: | |
description: List of paths to be excluded from the | |
request. | |
items: | |
oneOf: | |
- required: | |
- exact | |
- required: | |
- prefix | |
- required: | |
- suffix | |
- required: | |
- regex | |
properties: | |
exact: | |
description: exact string match. | |
format: string | |
type: string | |
prefix: | |
description: prefix-based match. | |
format: string | |
type: string | |
regex: | |
description: ECMAscript style regex-based match | |
as defined by [EDCA-262](http://en.cppreference.com/w/cpp/regex/ecmascript). | |
format: string | |
type: string | |
suffix: | |
description: suffix-based match. | |
format: string | |
type: string | |
type: object | |
type: array | |
excludedPaths: | |
description: List of paths to be excluded from the | |
request. | |
items: | |
oneOf: | |
- required: | |
- exact | |
- required: | |
- prefix | |
- required: | |
- suffix | |
- required: | |
- regex | |
properties: | |
exact: | |
description: exact string match. | |
format: string | |
type: string | |
prefix: | |
description: prefix-based match. | |
format: string | |
type: string | |
regex: | |
description: ECMAscript style regex-based match | |
as defined by [EDCA-262](http://en.cppreference.com/w/cpp/regex/ecmascript). | |
format: string | |
type: string | |
suffix: | |
description: suffix-based match. | |
format: string | |
type: string | |
type: object | |
type: array | |
included_paths: | |
description: List of paths that the request must include. | |
items: | |
oneOf: | |
- required: | |
- exact | |
- required: | |
- prefix | |
- required: | |
- suffix | |
- required: | |
- regex | |
properties: | |
exact: | |
description: exact string match. | |
format: string | |
type: string | |
prefix: | |
description: prefix-based match. | |
format: string | |
type: string | |
regex: | |
description: ECMAscript style regex-based match | |
as defined by [EDCA-262](http://en.cppreference.com/w/cpp/regex/ecmascript). | |
format: string | |
type: string | |
suffix: | |
description: suffix-based match. | |
format: string | |
type: string | |
type: object | |
type: array | |
includedPaths: | |
description: List of paths that the request must include. | |
items: | |
oneOf: | |
- required: | |
- exact | |
- required: | |
- prefix | |
- required: | |
- suffix | |
- required: | |
- regex | |
properties: | |
exact: | |
description: exact string match. | |
format: string | |
type: string | |
prefix: | |
description: prefix-based match. | |
format: string | |
type: string | |
regex: | |
description: ECMAscript style regex-based match | |
as defined by [EDCA-262](http://en.cppreference.com/w/cpp/regex/ecmascript). | |
format: string | |
type: string | |
suffix: | |
description: suffix-based match. | |
format: string | |
type: string | |
type: object | |
type: array | |
type: object | |
type: array | |
triggerRules: | |
items: | |
properties: | |
excluded_paths: | |
description: List of paths to be excluded from the | |
request. | |
items: | |
oneOf: | |
- required: | |
- exact | |
- required: | |
- prefix | |
- required: | |
- suffix | |
- required: | |
- regex | |
properties: | |
exact: | |
description: exact string match. | |
format: string | |
type: string | |
prefix: | |
description: prefix-based match. | |
format: string | |
type: string | |
regex: | |
description: ECMAscript style regex-based match | |
as defined by [EDCA-262](http://en.cppreference.com/w/cpp/regex/ecmascript). | |
format: string | |
type: string | |
suffix: | |
description: suffix-based match. | |
format: string | |
type: string | |
type: object | |
type: array | |
excludedPaths: | |
description: List of paths to be excluded from the | |
request. | |
items: | |
oneOf: | |
- required: | |
- exact | |
- required: | |
- prefix | |
- required: | |
- suffix | |
- required: | |
- regex | |
properties: | |
exact: | |
description: exact string match. | |
format: string | |
type: string | |
prefix: | |
description: prefix-based match. | |
format: string | |
type: string | |
regex: | |
description: ECMAscript style regex-based match | |
as defined by [EDCA-262](http://en.cppreference.com/w/cpp/regex/ecmascript). | |
format: string | |
type: string | |
suffix: | |
description: suffix-based match. | |
format: string | |
type: string | |
type: object | |
type: array | |
included_paths: | |
description: List of paths that the request must include. | |
items: | |
oneOf: | |
- required: | |
- exact | |
- required: | |
- prefix | |
- required: | |
- suffix | |
- required: | |
- regex | |
properties: | |
exact: | |
description: exact string match. | |
format: string | |
type: string | |
prefix: | |
description: prefix-based match. | |
format: string | |
type: string | |
regex: | |
description: ECMAscript style regex-based match | |
as defined by [EDCA-262](http://en.cppreference.com/w/cpp/regex/ecmascript). | |
format: string | |
type: string | |
suffix: | |
description: suffix-based match. | |
format: string | |
type: string | |
type: object | |
type: array | |
includedPaths: | |
description: List of paths that the request must include. | |
items: | |
oneOf: | |
- required: | |
- exact | |
- required: | |
- prefix | |
- required: | |
- suffix | |
- required: | |
- regex | |
properties: | |
exact: | |
description: exact string match. | |
format: string | |
type: string | |
prefix: | |
description: prefix-based match. | |
format: string | |
type: string | |
regex: | |
description: ECMAscript style regex-based match | |
as defined by [EDCA-262](http://en.cppreference.com/w/cpp/regex/ecmascript). | |
format: string | |
type: string | |
suffix: | |
description: suffix-based match. | |
format: string | |
type: string | |
type: object | |
type: array | |
type: object | |
type: array | |
type: object | |
type: object | |
type: array | |
peerIsOptional: | |
type: boolean | |
peers: | |
description: List of authentication methods that can be used for peer | |
authentication. | |
items: | |
oneOf: | |
- required: | |
- mtls | |
- required: | |
- jwt | |
properties: | |
jwt: | |
properties: | |
audiences: | |
items: | |
format: string | |
type: string | |
type: array | |
issuer: | |
description: Identifies the issuer that issued the JWT. | |
format: string | |
type: string | |
jwks: | |
description: JSON Web Key Set of public keys to validate | |
signature of the JWT. | |
format: string | |
type: string | |
jwks_uri: | |
format: string | |
type: string | |
jwksUri: | |
format: string | |
type: string | |
jwt_headers: | |
description: JWT is sent in a request header. | |
items: | |
format: string | |
type: string | |
type: array | |
jwtHeaders: | |
description: JWT is sent in a request header. | |
items: | |
format: string | |
type: string | |
type: array | |
jwtParams: | |
description: JWT is sent in a query parameter. | |
items: | |
format: string | |
type: string | |
type: array | |
trigger_rules: | |
items: | |
properties: | |
excluded_paths: | |
description: List of paths to be excluded from the | |
request. | |
items: | |
oneOf: | |
- required: | |
- exact | |
- required: | |
- prefix | |
- required: | |
- suffix | |
- required: | |
- regex | |
properties: | |
exact: | |
description: exact string match. | |
format: string | |
type: string | |
prefix: | |
description: prefix-based match. | |
format: string | |
type: string | |
regex: | |
description: ECMAscript style regex-based match | |
as defined by [EDCA-262](http://en.cppreference.com/w/cpp/regex/ecmascript). | |
format: string | |
type: string | |
suffix: | |
description: suffix-based match. | |
format: string | |
type: string | |
type: object | |
type: array | |
excludedPaths: | |
description: List of paths to be excluded from the | |
request. | |
items: | |
oneOf: | |
- required: | |
- exact | |
- required: | |
- prefix | |
- required: | |
- suffix | |
- required: | |
- regex | |
properties: | |
exact: | |
description: exact string match. | |
format: string | |
type: string | |
prefix: | |
description: prefix-based match. | |
format: string | |
type: string | |
regex: | |
description: ECMAscript style regex-based match | |
as defined by [EDCA-262](http://en.cppreference.com/w/cpp/regex/ecmascript). | |
format: string | |
type: string | |
suffix: | |
description: suffix-based match. | |
format: string | |
type: string | |
type: object | |
type: array | |
included_paths: | |
description: List of paths that the request must include. | |
items: | |
oneOf: | |
- required: | |
- exact | |
- required: | |
- prefix | |
- required: | |
- suffix | |
- required: | |
- regex | |
properties: | |
exact: | |
description: exact string match. | |
format: string | |
type: string | |
prefix: | |
description: prefix-based match. | |
format: string | |
type: string | |
regex: | |
description: ECMAscript style regex-based match | |
as defined by [EDCA-262](http://en.cppreference.com/w/cpp/regex/ecmascript). | |
format: string | |
type: string | |
suffix: | |
description: suffix-based match. | |
format: string | |
type: string | |
type: object | |
type: array | |
includedPaths: | |
description: List of paths that the request must include. | |
items: | |
oneOf: | |
- required: | |
- exact | |
- required: | |
- prefix | |
- required: | |
- suffix | |
- required: | |
- regex | |
properties: | |
exact: | |
description: exact string match. | |
format: string | |
type: string | |
prefix: | |
description: prefix-based match. | |
format: string | |
type: string | |
regex: | |
description: ECMAscript style regex-based match | |
as defined by [EDCA-262](http://en.cppreference.com/w/cpp/regex/ecmascript). | |
format: string | |
type: string | |
suffix: | |
description: suffix-based match. | |
format: string | |
type: string | |
type: object | |
type: array | |
type: object | |
type: array | |
triggerRules: | |
items: | |
properties: | |
excluded_paths: | |
description: List of paths to be excluded from the | |
request. | |
items: | |
oneOf: | |
- required: | |
- exact | |
- required: | |
- prefix | |
- required: | |
- suffix | |
- required: | |
- regex | |
properties: | |
exact: | |
description: exact string match. | |
format: string | |
type: string | |
prefix: | |
description: prefix-based match. | |
format: string | |
type: string | |
regex: | |
description: ECMAscript style regex-based match | |
as defined by [EDCA-262](http://en.cppreference.com/w/cpp/regex/ecmascript). | |
format: string | |
type: string | |
suffix: | |
description: suffix-based match. | |
format: string | |
type: string | |
type: object | |
type: array | |
excludedPaths: | |
description: List of paths to be excluded from the | |
request. | |
items: | |
oneOf: | |
- required: | |
- exact | |
- required: | |
- prefix | |
- required: | |
- suffix | |
- required: | |
- regex | |
properties: | |
exact: | |
description: exact string match. | |
format: string | |
type: string | |
prefix: | |
description: prefix-based match. | |
format: string | |
type: string | |
regex: | |
description: ECMAscript style regex-based match | |
as defined by [EDCA-262](http://en.cppreference.com/w/cpp/regex/ecmascript). | |
format: string | |
type: string | |
suffix: | |
description: suffix-based match. | |
format: string | |
type: string | |
type: object | |
type: array | |
included_paths: | |
description: List of paths that the request must include. | |
items: | |
oneOf: | |
- required: | |
- exact | |
- required: | |
- prefix | |
- required: | |
- suffix | |
- required: | |
- regex | |
properties: | |
exact: | |
description: exact string match. | |
format: string | |
type: string | |
prefix: | |
description: prefix-based match. | |
format: string | |
type: string | |
regex: | |
description: ECMAscript style regex-based match | |
as defined by [EDCA-262](http://en.cppreference.com/w/cpp/regex/ecmascript). | |
format: string | |
type: string | |
suffix: | |
description: suffix-based match. | |
format: string | |
type: string | |
type: object | |
type: array | |
includedPaths: | |
description: List of paths that the request must include. | |
items: | |
oneOf: | |
- required: | |
- exact | |
- required: | |
- prefix | |
- required: | |
- suffix | |
- required: | |
- regex | |
properties: | |
exact: | |
description: exact string match. | |
format: string | |
type: string | |
prefix: | |
description: prefix-based match. | |
format: string | |
type: string | |
regex: | |
description: ECMAscript style regex-based match | |
as defined by [EDCA-262](http://en.cppreference.com/w/cpp/regex/ecmascript). | |
format: string | |
type: string | |
suffix: | |
description: suffix-based match. | |
format: string | |
type: string | |
type: object | |
type: array | |
type: object | |
type: array | |
type: object | |
mtls: | |
description: Set if mTLS is used. | |
properties: | |
allowTls: | |
description: WILL BE DEPRECATED, if set, will translates | |
to `TLS_PERMISSIVE` mode. | |
type: boolean | |
mode: | |
description: Defines the mode of mTLS authentication. | |
enum: | |
- STRICT | |
- PERMISSIVE | |
type: string | |
type: object | |
type: object | |
type: array | |
principalBinding: | |
description: Define whether peer or origin identity should be use | |
for principal. | |
enum: | |
- USE_PEER | |
- USE_ORIGIN | |
type: string | |
targets: | |
description: List rules to select workloads that the policy should | |
be applied on. | |
items: | |
properties: | |
labels: | |
additionalProperties: | |
format: string | |
type: string | |
type: object | |
name: | |
description: The name must be a short name from the service | |
registry. | |
format: string | |
type: string | |
ports: | |
description: Specifies the ports. | |
items: | |
oneOf: | |
- required: | |
- number | |
- required: | |
- name | |
properties: | |
name: | |
format: string | |
type: string | |
number: | |
type: integer | |
type: object | |
type: array | |
type: object | |
type: array | |
type: object | |
type: object | |
version: v1alpha1 | |
versions: | |
- name: v1alpha1 | |
served: true | |
storage: true | |
status: | |
acceptedNames: | |
categories: | |
- istio-io | |
- authentication-istio-io | |
kind: Policy | |
listKind: PolicyList | |
plural: policies | |
singular: policy | |
conditions: | |
- lastTransitionTime: "2019-12-03T04:51:49Z" | |
message: no conflicts found | |
reason: NoConflicts | |
status: "True" | |
type: NamesAccepted | |
- lastTransitionTime: null | |
message: the initial names have been accepted | |
reason: InitialNamesAccepted | |
status: "True" | |
type: Established | |
storedVersions: | |
- v1alpha1 | |
- apiVersion: apiextensions.k8s.io/v1beta1 | |
kind: CustomResourceDefinition | |
metadata: | |
annotations: | |
helm.sh/resource-policy: keep | |
kubectl.kubernetes.io/last-applied-configuration: | | |
{"apiVersion":"apiextensions.k8s.io/v1beta1","kind":"CustomResourceDefinition","metadata":{"annotations":{"helm.sh/resource-policy":"keep"},"creationTimestamp":null,"labels":{"app":"istio-mixer","chart":"istio","heritage":"Tiller","release":"istio"},"name":"quotaspecbindings.config.istio.io"},"spec":{"group":"config.istio.io","names":{"categories":["istio-io","apim-istio-io"],"kind":"QuotaSpecBinding","plural":"quotaspecbindings","singular":"quotaspecbinding"},"scope":"Namespaced","subresources":{"status":{}},"validation":{"openAPIV3Schema":{"properties":{"spec":{"properties":{"quotaSpecs":{"items":{"properties":{"name":{"description":"The short name of the QuotaSpec.","format":"string","type":"string"},"namespace":{"description":"Optional namespace of the QuotaSpec.","format":"string","type":"string"}},"type":"object"},"type":"array"},"services":{"description":"One or more services to map the listed QuotaSpec onto.","items":{"properties":{"domain":{"description":"Domain suffix used to construct the service FQDN in implementations that support such specification.","format":"string","type":"string"},"labels":{"additionalProperties":{"format":"string","type":"string"},"description":"Optional one or more labels that uniquely identify the service version.","type":"object"},"name":{"description":"The short name of the service such as \"foo\".","format":"string","type":"string"},"namespace":{"description":"Optional namespace of the service.","format":"string","type":"string"},"service":{"description":"The service FQDN.","format":"string","type":"string"}},"type":"object"},"type":"array"}},"type":"object"}},"type":"object"}},"versions":[{"name":"v1alpha2","served":true,"storage":true}]},"status":{"acceptedNames":{"kind":"","plural":""},"conditions":[],"storedVersions":[]}} | |
creationTimestamp: "2019-12-03T04:51:49Z" | |
generation: 3 | |
labels: | |
app: istio-mixer | |
chart: istio | |
heritage: Tiller | |
release: istio | |
name: quotaspecbindings.config.istio.io | |
resourceVersion: "43309" | |
selfLink: /apis/apiextensions.k8s.io/v1beta1/customresourcedefinitions/quotaspecbindings.config.istio.io | |
uid: 9d8e9fd0-1588-11ea-b5af-027e0b84da98 | |
spec: | |
conversion: | |
strategy: None | |
group: config.istio.io | |
names: | |
categories: | |
- istio-io | |
- apim-istio-io | |
kind: QuotaSpecBinding | |
listKind: QuotaSpecBindingList | |
plural: quotaspecbindings | |
singular: quotaspecbinding | |
scope: Namespaced | |
subresources: | |
status: {} | |
validation: | |
openAPIV3Schema: | |
properties: | |
spec: | |
properties: | |
quotaSpecs: | |
items: | |
properties: | |
name: | |
description: The short name of the QuotaSpec. | |
format: string | |
type: string | |
namespace: | |
description: Optional namespace of the QuotaSpec. | |
format: string | |
type: string | |
type: object | |
type: array | |
services: | |
description: One or more services to map the listed QuotaSpec onto. | |
items: | |
properties: | |
domain: | |
description: Domain suffix used to construct the service FQDN | |
in implementations that support such specification. | |
format: string | |
type: string | |
labels: | |
additionalProperties: | |
format: string | |
type: string | |
description: Optional one or more labels that uniquely identify | |
the service version. | |
type: object | |
name: | |
description: The short name of the service such as "foo". | |
format: string | |
type: string | |
namespace: | |
description: Optional namespace of the service. | |
format: string | |
type: string | |
service: | |
description: The service FQDN. | |
format: string | |
type: string | |
type: object | |
type: array | |
type: object | |
type: object | |
version: v1alpha2 | |
versions: | |
- name: v1alpha2 | |
served: true | |
storage: true | |
status: | |
acceptedNames: | |
categories: | |
- istio-io | |
- apim-istio-io | |
kind: QuotaSpecBinding | |
listKind: QuotaSpecBindingList | |
plural: quotaspecbindings | |
singular: quotaspecbinding | |
conditions: | |
- lastTransitionTime: "2019-12-03T04:51:49Z" | |
message: no conflicts found | |
reason: NoConflicts | |
status: "True" | |
type: NamesAccepted | |
- lastTransitionTime: null | |
message: the initial names have been accepted | |
reason: InitialNamesAccepted | |
status: "True" | |
type: Established | |
storedVersions: | |
- v1alpha2 | |
- apiVersion: apiextensions.k8s.io/v1beta1 | |
kind: CustomResourceDefinition | |
metadata: | |
annotations: | |
helm.sh/resource-policy: keep | |
kubectl.kubernetes.io/last-applied-configuration: | | |
{"apiVersion":"apiextensions.k8s.io/v1beta1","kind":"CustomResourceDefinition","metadata":{"annotations":{"helm.sh/resource-policy":"keep"},"creationTimestamp":null,"labels":{"app":"istio-mixer","chart":"istio","heritage":"Tiller","release":"istio"},"name":"quotaspecs.config.istio.io"},"spec":{"group":"config.istio.io","names":{"categories":["istio-io","apim-istio-io"],"kind":"QuotaSpec","plural":"quotaspecs","singular":"quotaspec"},"scope":"Namespaced","subresources":{"status":{}},"validation":{"openAPIV3Schema":{"properties":{"spec":{"description":"Determines the quotas used for individual requests.","properties":{"rules":{"description":"A list of Quota rules.","items":{"properties":{"match":{"description":"If empty, match all request.","items":{"properties":{"clause":{"additionalProperties":{"oneOf":[{"required":["exact"]},{"required":["prefix"]},{"required":["regex"]}],"properties":{"exact":{"format":"string","type":"string"},"prefix":{"format":"string","type":"string"},"regex":{"format":"string","type":"string"}},"type":"object"},"description":"Map of attribute names to StringMatch type.","type":"object"}},"type":"object"},"type":"array"},"quotas":{"description":"The list of quotas to charge.","items":{"properties":{"charge":{"format":"int32","type":"integer"},"quota":{"format":"string","type":"string"}},"type":"object"},"type":"array"}},"type":"object"},"type":"array"}},"type":"object"}},"type":"object"}},"versions":[{"name":"v1alpha2","served":true,"storage":true}]},"status":{"acceptedNames":{"kind":"","plural":""},"conditions":[],"storedVersions":[]}} | |
creationTimestamp: "2019-12-03T04:51:49Z" | |
generation: 3 | |
labels: | |
app: istio-mixer | |
chart: istio | |
heritage: Tiller | |
release: istio | |
name: quotaspecs.config.istio.io | |
resourceVersion: "43310" | |
selfLink: /apis/apiextensions.k8s.io/v1beta1/customresourcedefinitions/quotaspecs.config.istio.io | |
uid: 9d8ffb4f-1588-11ea-b5af-027e0b84da98 | |
spec: | |
conversion: | |
strategy: None | |
group: config.istio.io | |
names: | |
categories: | |
- istio-io | |
- apim-istio-io | |
kind: QuotaSpec | |
listKind: QuotaSpecList | |
plural: quotaspecs | |
singular: quotaspec | |
scope: Namespaced | |
subresources: | |
status: {} | |
validation: | |
openAPIV3Schema: | |
properties: | |
spec: | |
description: Determines the quotas used for individual requests. | |
properties: | |
rules: | |
description: A list of Quota rules. | |
items: | |
properties: | |
match: | |
description: If empty, match all request. | |
items: | |
properties: | |
clause: | |
additionalProperties: | |
oneOf: | |
- required: | |
- exact | |
- required: | |
- prefix | |
- required: | |
- regex | |
properties: | |
exact: | |
format: string | |
type: string | |
prefix: | |
format: string | |
type: string | |
regex: | |
format: string | |
type: string | |
type: object | |
description: Map of attribute names to StringMatch type. | |
type: object | |
type: object | |
type: array | |
quotas: | |
description: The list of quotas to charge. | |
items: | |
properties: | |
charge: | |
format: int32 | |
type: integer | |
quota: | |
format: string | |
type: string | |
type: object | |
type: array | |
type: object | |
type: array | |
type: object | |
type: object | |
version: v1alpha2 | |
versions: | |
- name: v1alpha2 | |
served: true | |
storage: true | |
status: | |
acceptedNames: | |
categories: | |
- istio-io | |
- apim-istio-io | |
kind: QuotaSpec | |
listKind: QuotaSpecList | |
plural: quotaspecs | |
singular: quotaspec | |
conditions: | |
- lastTransitionTime: "2019-12-03T04:51:49Z" | |
message: no conflicts found | |
reason: NoConflicts | |
status: "True" | |
type: NamesAccepted | |
- lastTransitionTime: null | |
message: the initial names have been accepted | |
reason: InitialNamesAccepted | |
status: "True" | |
type: Established | |
storedVersions: | |
- v1alpha2 | |
- apiVersion: apiextensions.k8s.io/v1beta1 | |
kind: CustomResourceDefinition | |
metadata: | |
annotations: | |
helm.sh/resource-policy: keep | |
kubectl.kubernetes.io/last-applied-configuration: | | |
{"apiVersion":"apiextensions.k8s.io/v1beta1","kind":"CustomResourceDefinition","metadata":{"annotations":{"helm.sh/resource-policy":"keep"},"creationTimestamp":null,"labels":{"app":"mixer","chart":"istio","heritage":"Tiller","istio":"rbac","package":"istio.io.mixer","release":"istio"},"name":"rbacconfigs.rbac.istio.io"},"spec":{"group":"rbac.istio.io","names":{"categories":["istio-io","rbac-istio-io"],"kind":"RbacConfig","plural":"rbacconfigs","singular":"rbacconfig"},"scope":"Namespaced","subresources":{"status":{}},"validation":{"openAPIV3Schema":{"properties":{"spec":{"description":"Configuration for Role Based Access Control. See more details at: https://istio.io/docs/reference/config/authorization/istio.rbac.v1alpha1.html","properties":{"enforcementMode":{"enum":["ENFORCED","PERMISSIVE"],"type":"string"},"exclusion":{"description":"A list of services or namespaces that should not be enforced by Istio RBAC policies.","properties":{"namespaces":{"description":"A list of namespaces.","items":{"format":"string","type":"string"},"type":"array"},"services":{"description":"A list of services.","items":{"format":"string","type":"string"},"type":"array"}},"type":"object"},"inclusion":{"description":"A list of services or namespaces that should be enforced by Istio RBAC policies.","properties":{"namespaces":{"description":"A list of namespaces.","items":{"format":"string","type":"string"},"type":"array"},"services":{"description":"A list of services.","items":{"format":"string","type":"string"},"type":"array"}},"type":"object"},"mode":{"description":"Istio RBAC mode.","enum":["OFF","ON","ON_WITH_INCLUSION","ON_WITH_EXCLUSION"],"type":"string"}},"type":"object"}},"type":"object"}},"versions":[{"name":"v1alpha1","served":true,"storage":true}]},"status":{"acceptedNames":{"kind":"","plural":""},"conditions":[],"storedVersions":[]}} | |
creationTimestamp: "2019-12-03T04:51:49Z" | |
generation: 3 | |
labels: | |
app: mixer | |
chart: istio | |
heritage: Tiller | |
istio: rbac | |
package: istio.io.mixer | |
release: istio | |
name: rbacconfigs.rbac.istio.io | |
resourceVersion: "43311" | |
selfLink: /apis/apiextensions.k8s.io/v1beta1/customresourcedefinitions/rbacconfigs.rbac.istio.io | |
uid: 9d98b622-1588-11ea-b5af-027e0b84da98 | |
spec: | |
conversion: | |
strategy: None | |
group: rbac.istio.io | |
names: | |
categories: | |
- istio-io | |
- rbac-istio-io | |
kind: RbacConfig | |
listKind: RbacConfigList | |
plural: rbacconfigs | |
singular: rbacconfig | |
scope: Namespaced | |
subresources: | |
status: {} | |
validation: | |
openAPIV3Schema: | |
properties: | |
spec: | |
description: 'Configuration for Role Based Access Control. See more details | |
at: https://istio.io/docs/reference/config/authorization/istio.rbac.v1alpha1.html' | |
properties: | |
enforcementMode: | |
enum: | |
- ENFORCED | |
- PERMISSIVE | |
type: string | |
exclusion: | |
description: A list of services or namespaces that should not be enforced | |
by Istio RBAC policies. | |
properties: | |
namespaces: | |
description: A list of namespaces. | |
items: | |
format: string | |
type: string | |
type: array | |
services: | |
description: A list of services. | |
items: | |
format: string | |
type: string | |
type: array | |
type: object | |
inclusion: | |
description: A list of services or namespaces that should be enforced | |
by Istio RBAC policies. | |
properties: | |
namespaces: | |
description: A list of namespaces. | |
items: | |
format: string | |
type: string | |
type: array | |
services: | |
description: A list of services. | |
items: | |
format: string | |
type: string | |
type: array | |
type: object | |
mode: | |
description: Istio RBAC mode. | |
enum: | |
- "OFF" | |
- "ON" | |
- ON_WITH_INCLUSION | |
- ON_WITH_EXCLUSION | |
type: string | |
type: object | |
type: object | |
version: v1alpha1 | |
versions: | |
- name: v1alpha1 | |
served: true | |
storage: true | |
status: | |
acceptedNames: | |
categories: | |
- istio-io | |
- rbac-istio-io | |
kind: RbacConfig | |
listKind: RbacConfigList | |
plural: rbacconfigs | |
singular: rbacconfig | |
conditions: | |
- lastTransitionTime: "2019-12-03T04:51:49Z" | |
message: no conflicts found | |
reason: NoConflicts | |
status: "True" | |
type: NamesAccepted | |
- lastTransitionTime: null | |
message: the initial names have been accepted | |
reason: InitialNamesAccepted | |
status: "True" | |
type: Established | |
storedVersions: | |
- v1alpha1 | |
- apiVersion: apiextensions.k8s.io/v1beta1 | |
kind: CustomResourceDefinition | |
metadata: | |
annotations: | |
kubectl.kubernetes.io/last-applied-configuration: | | |
{"apiVersion":"apiextensions.k8s.io/v1beta1","kind":"CustomResourceDefinition","metadata":{"annotations":{},"labels":{"knative.dev/crd-install":"true","serving.knative.dev/release":"devel"},"name":"revisions.serving.knative.dev"},"spec":{"additionalPrinterColumns":[{"JSONPath":".metadata.labels['serving\\.knative\\.dev/configuration']","name":"Config Name","type":"string"},{"JSONPath":".status.serviceName","name":"K8s Service Name","type":"string"},{"JSONPath":".metadata.labels['serving\\.knative\\.dev/configurationGeneration']","name":"Generation","type":"string"},{"JSONPath":".status.conditions[?(@.type=='Ready')].status","name":"Ready","type":"string"},{"JSONPath":".status.conditions[?(@.type=='Ready')].reason","name":"Reason","type":"string"}],"group":"serving.knative.dev","names":{"categories":["all","knative","serving"],"kind":"Revision","plural":"revisions","shortNames":["rev"],"singular":"revision"},"scope":"Namespaced","subresources":{"status":{}},"versions":[{"name":"v1alpha1","served":true,"storage":true},{"name":"v1beta1","served":true,"storage":false},{"name":"v1","served":true,"storage":false}]}} | |
creationTimestamp: "2019-12-03T10:54:08Z" | |
generation: 1 | |
labels: | |
knative.dev/crd-install: "true" | |
serving.knative.dev/release: devel | |
name: revisions.serving.knative.dev | |
resourceVersion: "43844" | |
selfLink: /apis/apiextensions.k8s.io/v1beta1/customresourcedefinitions/revisions.serving.knative.dev | |
uid: 3b1c7bd2-15bb-11ea-b5af-027e0b84da98 | |
spec: | |
additionalPrinterColumns: | |
- JSONPath: .metadata.labels['serving\.knative\.dev/configuration'] | |
name: Config Name | |
type: string | |
- JSONPath: .status.serviceName | |
name: K8s Service Name | |
type: string | |
- JSONPath: .metadata.labels['serving\.knative\.dev/configurationGeneration'] | |
name: Generation | |
type: string | |
- JSONPath: .status.conditions[?(@.type=='Ready')].status | |
name: Ready | |
type: string | |
- JSONPath: .status.conditions[?(@.type=='Ready')].reason | |
name: Reason | |
type: string | |
conversion: | |
strategy: None | |
group: serving.knative.dev | |
names: | |
categories: | |
- all | |
- knative | |
- serving | |
kind: Revision | |
listKind: RevisionList | |
plural: revisions | |
shortNames: | |
- rev | |
singular: revision | |
scope: Namespaced | |
subresources: | |
status: {} | |
version: v1alpha1 | |
versions: | |
- name: v1alpha1 | |
served: true | |
storage: true | |
- name: v1beta1 | |
served: true | |
storage: false | |
- name: v1 | |
served: true | |
storage: false | |
status: | |
acceptedNames: | |
categories: | |
- all | |
- knative | |
- serving | |
kind: Revision | |
listKind: RevisionList | |
plural: revisions | |
shortNames: | |
- rev | |
singular: revision | |
conditions: | |
- lastTransitionTime: "2019-12-03T10:54:08Z" | |
message: no conflicts found | |
reason: NoConflicts | |
status: "True" | |
type: NamesAccepted | |
- lastTransitionTime: null | |
message: the initial names have been accepted | |
reason: InitialNamesAccepted | |
status: "True" | |
type: Established | |
storedVersions: | |
- v1alpha1 | |
- apiVersion: apiextensions.k8s.io/v1beta1 | |
kind: CustomResourceDefinition | |
metadata: | |
annotations: | |
kubectl.kubernetes.io/last-applied-configuration: | | |
{"apiVersion":"apiextensions.k8s.io/v1beta1","kind":"CustomResourceDefinition","metadata":{"annotations":{},"labels":{"duck.knative.dev/addressable":"true","knative.dev/crd-install":"true","serving.knative.dev/release":"devel"},"name":"routes.serving.knative.dev"},"spec":{"additionalPrinterColumns":[{"JSONPath":".status.url","name":"URL","type":"string"},{"JSONPath":".status.conditions[?(@.type=='Ready')].status","name":"Ready","type":"string"},{"JSONPath":".status.conditions[?(@.type=='Ready')].reason","name":"Reason","type":"string"}],"group":"serving.knative.dev","names":{"categories":["all","knative","serving"],"kind":"Route","plural":"routes","shortNames":["rt"],"singular":"route"},"scope":"Namespaced","subresources":{"status":{}},"versions":[{"name":"v1alpha1","served":true,"storage":true},{"name":"v1beta1","served":true,"storage":false},{"name":"v1","served":true,"storage":false}]}} | |
creationTimestamp: "2019-12-03T10:54:08Z" | |
generation: 1 | |
labels: | |
duck.knative.dev/addressable: "true" | |
knative.dev/crd-install: "true" | |
serving.knative.dev/release: devel | |
name: routes.serving.knative.dev | |
resourceVersion: "43847" | |
selfLink: /apis/apiextensions.k8s.io/v1beta1/customresourcedefinitions/routes.serving.knative.dev | |
uid: 3b35bef7-15bb-11ea-b5af-027e0b84da98 | |
spec: | |
additionalPrinterColumns: | |
- JSONPath: .status.url | |
name: URL | |
type: string | |
- JSONPath: .status.conditions[?(@.type=='Ready')].status | |
name: Ready | |
type: string | |
- JSONPath: .status.conditions[?(@.type=='Ready')].reason | |
name: Reason | |
type: string | |
conversion: | |
strategy: None | |
group: serving.knative.dev | |
names: | |
categories: | |
- all | |
- knative | |
- serving | |
kind: Route | |
listKind: RouteList | |
plural: routes | |
shortNames: | |
- rt | |
singular: route | |
scope: Namespaced | |
subresources: | |
status: {} | |
version: v1alpha1 | |
versions: | |
- name: v1alpha1 | |
served: true | |
storage: true | |
- name: v1beta1 | |
served: true | |
storage: false | |
- name: v1 | |
served: true | |
storage: false | |
status: | |
acceptedNames: | |
categories: | |
- all | |
- knative | |
- serving | |
kind: Route | |
listKind: RouteList | |
plural: routes | |
shortNames: | |
- rt | |
singular: route | |
conditions: | |
- lastTransitionTime: "2019-12-03T10:54:08Z" | |
message: no conflicts found | |
reason: NoConflicts | |
status: "True" | |
type: NamesAccepted | |
- lastTransitionTime: null | |
message: the initial names have been accepted | |
reason: InitialNamesAccepted | |
status: "True" | |
type: Established | |
storedVersions: | |
- v1alpha1 | |
- apiVersion: apiextensions.k8s.io/v1beta1 | |
kind: CustomResourceDefinition | |
metadata: | |
annotations: | |
helm.sh/resource-policy: keep | |
kubectl.kubernetes.io/last-applied-configuration: | | |
{"apiVersion":"apiextensions.k8s.io/v1beta1","kind":"CustomResourceDefinition","metadata":{"annotations":{"helm.sh/resource-policy":"keep"},"creationTimestamp":null,"labels":{"app":"mixer","chart":"istio","heritage":"Tiller","istio":"core","package":"istio.io.mixer","release":"istio"},"name":"rules.config.istio.io"},"spec":{"group":"config.istio.io","names":{"categories":["istio-io","policy-istio-io"],"kind":"rule","plural":"rules","singular":"rule"},"scope":"Namespaced","subresources":{"status":{}},"validation":{"openAPIV3Schema":{"properties":{"spec":{"description":"Describes the rules used to configure Mixer's policy and telemetry features. See more details at: https://istio.io/docs/reference/config/policy-and-telemetry/istio.policy.v1beta1.html","properties":{"actions":{"description":"The actions that will be executed when match evaluates to `true`.","items":{"properties":{"handler":{"description":"Fully qualified name of the handler to invoke.","format":"string","type":"string"},"instances":{"items":{"format":"string","type":"string"},"type":"array"},"name":{"description":"A handle to refer to the results of the action.","format":"string","type":"string"}},"type":"object"},"type":"array"},"match":{"description":"Match is an attribute based predicate.","format":"string","type":"string"},"requestHeaderOperations":{"items":{"properties":{"name":{"description":"Header name literal value.","format":"string","type":"string"},"operation":{"description":"Header operation type.","enum":["REPLACE","REMOVE","APPEND"],"type":"string"},"values":{"description":"Header value expressions.","items":{"format":"string","type":"string"},"type":"array"}},"type":"object"},"type":"array"},"responseHeaderOperations":{"items":{"properties":{"name":{"description":"Header name literal value.","format":"string","type":"string"},"operation":{"description":"Header operation type.","enum":["REPLACE","REMOVE","APPEND"],"type":"string"},"values":{"description":"Header value expressions.","items":{"format":"string","type":"string"},"type":"array"}},"type":"object"},"type":"array"},"sampling":{"properties":{"random":{"description":"Provides filtering of actions based on random selection per request.","properties":{"attributeExpression":{"description":"Specifies an attribute expression to use to override the numerator in the `percent_sampled` field.","format":"string","type":"string"},"percentSampled":{"description":"The default sampling rate, expressed as a percentage.","properties":{"denominator":{"description":"Specifies the denominator.","enum":["HUNDRED","TEN_THOUSAND"],"type":"string"},"numerator":{"description":"Specifies the numerator.","type":"integer"}},"type":"object"},"useIndependentRandomness":{"description":"By default sampling will be based on the value of the request header `x-request-id`.","type":"boolean"}},"type":"object"},"rateLimit":{"properties":{"maxUnsampledEntries":{"description":"Number of entries to allow during the `sampling_duration` before sampling is enforced.","format":"int64","type":"integer"},"samplingDuration":{"description":"Window in which to enforce the sampling rate.","type":"string"},"samplingRate":{"description":"The rate at which to sample entries once the unsampled limit has been reached.","format":"int64","type":"integer"}},"type":"object"}},"type":"object"}},"type":"object"}},"type":"object"}},"versions":[{"name":"v1alpha2","served":true,"storage":true}]},"status":{"acceptedNames":{"kind":"","plural":""},"conditions":[],"storedVersions":[]}} | |
creationTimestamp: "2019-12-03T04:51:49Z" | |
generation: 3 | |
labels: | |
app: mixer | |
chart: istio | |
heritage: Tiller | |
istio: core | |
package: istio.io.mixer | |
release: istio | |
name: rules.config.istio.io | |
resourceVersion: "43312" | |
selfLink: /apis/apiextensions.k8s.io/v1beta1/customresourcedefinitions/rules.config.istio.io | |
uid: 9d9a6d7e-1588-11ea-b5af-027e0b84da98 | |
spec: | |
conversion: | |
strategy: None | |
group: config.istio.io | |
names: | |
categories: | |
- istio-io | |
- policy-istio-io | |
kind: rule | |
listKind: ruleList | |
plural: rules | |
singular: rule | |
scope: Namespaced | |
subresources: | |
status: {} | |
validation: | |
openAPIV3Schema: | |
properties: | |
spec: | |
description: 'Describes the rules used to configure Mixer''s policy and | |
telemetry features. See more details at: https://istio.io/docs/reference/config/policy-and-telemetry/istio.policy.v1beta1.html' | |
properties: | |
actions: | |
description: The actions that will be executed when match evaluates | |
to `true`. | |
items: | |
properties: | |
handler: | |
description: Fully qualified name of the handler to invoke. | |
format: string | |
type: string | |
instances: | |
items: | |
format: string | |
type: string | |
type: array | |
name: | |
description: A handle to refer to the results of the action. | |
format: string | |
type: string | |
type: object | |
type: array | |
match: | |
description: Match is an attribute based predicate. | |
format: string | |
type: string | |
requestHeaderOperations: | |
items: | |
properties: | |
name: | |
description: Header name literal value. | |
format: string | |
type: string | |
operation: | |
description: Header operation type. | |
enum: | |
- REPLACE | |
- REMOVE | |
- APPEND | |
type: string | |
values: | |
description: Header value expressions. | |
items: | |
format: string | |
type: string | |
type: array | |
type: object | |
type: array | |
responseHeaderOperations: | |
items: | |
properties: | |
name: | |
description: Header name literal value. | |
format: string | |
type: string | |
operation: | |
description: Header operation type. | |
enum: | |
- REPLACE | |
- REMOVE | |
- APPEND | |
type: string | |
values: | |
description: Header value expressions. | |
items: | |
format: string | |
type: string | |
type: array | |
type: object | |
type: array | |
sampling: | |
properties: | |
random: | |
description: Provides filtering of actions based on random selection | |
per request. | |
properties: | |
attributeExpression: | |
description: Specifies an attribute expression to use to override | |
the numerator in the `percent_sampled` field. | |
format: string | |
type: string | |
percentSampled: | |
description: The default sampling rate, expressed as a percentage. | |
properties: | |
denominator: | |
description: Specifies the denominator. | |
enum: | |
- HUNDRED | |
- TEN_THOUSAND | |
type: string | |
numerator: | |
description: Specifies the numerator. | |
type: integer | |
type: object | |
useIndependentRandomness: | |
description: By default sampling will be based on the value | |
of the request header `x-request-id`. | |
type: boolean | |
type: object | |
rateLimit: | |
properties: | |
maxUnsampledEntries: | |
description: Number of entries to allow during the `sampling_duration` | |
before sampling is enforced. | |
format: int64 | |
type: integer | |
samplingDuration: | |
description: Window in which to enforce the sampling rate. | |
type: string | |
samplingRate: | |
description: The rate at which to sample entries once the | |
unsampled limit has been reached. | |
format: int64 | |
type: integer | |
type: object | |
type: object | |
type: object | |
type: object | |
version: v1alpha2 | |
versions: | |
- name: v1alpha2 | |
served: true | |
storage: true | |
status: | |
acceptedNames: | |
categories: | |
- istio-io | |
- policy-istio-io | |
kind: rule | |
listKind: ruleList | |
plural: rules | |
singular: rule | |
conditions: | |
- lastTransitionTime: "2019-12-03T04:51:49Z" | |
message: no conflicts found | |
reason: NoConflicts | |
status: "True" | |
type: NamesAccepted | |
- lastTransitionTime: null | |
message: the initial names have been accepted | |
reason: InitialNamesAccepted | |
status: "True" | |
type: Established | |
storedVersions: | |
- v1alpha2 | |
- apiVersion: apiextensions.k8s.io/v1beta1 | |
kind: CustomResourceDefinition | |
metadata: | |
annotations: | |
kubectl.kubernetes.io/last-applied-configuration: | | |
{"apiVersion":"apiextensions.k8s.io/v1beta1","kind":"CustomResourceDefinition","metadata":{"annotations":{},"labels":{"knative.dev/crd-install":"true","serving.knative.dev/release":"devel"},"name":"serverlessservices.networking.internal.knative.dev"},"spec":{"additionalPrinterColumns":[{"JSONPath":".spec.mode","name":"Mode","type":"string"},{"JSONPath":".status.serviceName","name":"ServiceName","type":"string"},{"JSONPath":".status.privateServiceName","name":"PrivateServiceName","type":"string"},{"JSONPath":".status.conditions[?(@.type=='Ready')].status","name":"Ready","type":"string"},{"JSONPath":".status.conditions[?(@.type=='Ready')].reason","name":"Reason","type":"string"}],"group":"networking.internal.knative.dev","names":{"categories":["knative-internal","networking"],"kind":"ServerlessService","plural":"serverlessservices","shortNames":["sks"],"singular":"serverlessservice"},"scope":"Namespaced","subresources":{"status":{}},"versions":[{"name":"v1alpha1","served":true,"storage":true}]}} | |
creationTimestamp: "2019-12-03T10:54:08Z" | |
generation: 1 | |
labels: | |
knative.dev/crd-install: "true" | |
serving.knative.dev/release: devel | |
name: serverlessservices.networking.internal.knative.dev | |
resourceVersion: "43858" | |
selfLink: /apis/apiextensions.k8s.io/v1beta1/customresourcedefinitions/serverlessservices.networking.internal.knative.dev | |
uid: 3b67b06c-15bb-11ea-b5af-027e0b84da98 | |
spec: | |
additionalPrinterColumns: | |
- JSONPath: .spec.mode | |
name: Mode | |
type: string | |
- JSONPath: .status.serviceName | |
name: ServiceName | |
type: string | |
- JSONPath: .status.privateServiceName | |
name: PrivateServiceName | |
type: string | |
- JSONPath: .status.conditions[?(@.type=='Ready')].status | |
name: Ready | |
type: string | |
- JSONPath: .status.conditions[?(@.type=='Ready')].reason | |
name: Reason | |
type: string | |
conversion: | |
strategy: None | |
group: networking.internal.knative.dev | |
names: | |
categories: | |
- knative-internal | |
- networking | |
kind: ServerlessService | |
listKind: ServerlessServiceList | |
plural: serverlessservices | |
shortNames: | |
- sks | |
singular: serverlessservice | |
scope: Namespaced | |
subresources: | |
status: {} | |
version: v1alpha1 | |
versions: | |
- name: v1alpha1 | |
served: true | |
storage: true | |
status: | |
acceptedNames: | |
categories: | |
- knative-internal | |
- networking | |
kind: ServerlessService | |
listKind: ServerlessServiceList | |
plural: serverlessservices | |
shortNames: | |
- sks | |
singular: serverlessservice | |
conditions: | |
- lastTransitionTime: "2019-12-03T10:54:08Z" | |
message: no conflicts found | |
reason: NoConflicts | |
status: "True" | |
type: NamesAccepted | |
- lastTransitionTime: null | |
message: the initial names have been accepted | |
reason: InitialNamesAccepted | |
status: "True" | |
type: Established | |
storedVersions: | |
- v1alpha1 | |
- apiVersion: apiextensions.k8s.io/v1beta1 | |
kind: CustomResourceDefinition | |
metadata: | |
annotations: | |
helm.sh/resource-policy: keep | |
kubectl.kubernetes.io/last-applied-configuration: | | |
{"apiVersion":"apiextensions.k8s.io/v1beta1","kind":"CustomResourceDefinition","metadata":{"annotations":{"helm.sh/resource-policy":"keep"},"creationTimestamp":null,"labels":{"app":"istio-pilot","chart":"istio","heritage":"Tiller","release":"istio"},"name":"serviceentries.networking.istio.io"},"spec":{"additionalPrinterColumns":[{"JSONPath":".spec.hosts","description":"The hosts associated with the ServiceEntry","name":"Hosts","type":"string"},{"JSONPath":".spec.location","description":"Whether the service is external to the mesh or part of the mesh (MESH_EXTERNAL or MESH_INTERNAL)","name":"Location","type":"string"},{"JSONPath":".spec.resolution","description":"Service discovery mode for the hosts (NONE, STATIC, or DNS)","name":"Resolution","type":"string"},{"JSONPath":".metadata.creationTimestamp","description":"CreationTimestamp is a timestamp representing the server time when this object was created. It is not guaranteed to be set in happens-before order across separate operations. Clients may not set this value. It is represented in RFC3339 form and is in UTC.\nPopulated by the system. Read-only. Null for lists. More info: https://git.k8s.io/community/contributors/devel/api-conventions.md#metadata","name":"Age","type":"date"}],"group":"networking.istio.io","names":{"categories":["istio-io","networking-istio-io"],"kind":"ServiceEntry","listKind":"ServiceEntryList","plural":"serviceentries","shortNames":["se"],"singular":"serviceentry"},"scope":"Namespaced","subresources":{"status":{}},"validation":{"openAPIV3Schema":{"properties":{"spec":{"description":"Configuration affecting service registry. See more details at: https://istio.io/docs/reference/config/networking/v1alpha3/service-entry.html","properties":{"addresses":{"description":"The virtual IP addresses associated with the service.","items":{"format":"string","type":"string"},"type":"array"},"endpoints":{"description":"One or more endpoints associated with the service.","items":{"properties":{"address":{"format":"string","type":"string"},"labels":{"additionalProperties":{"format":"string","type":"string"},"description":"One or more labels associated with the endpoint.","type":"object"},"locality":{"description":"The locality associated with the endpoint.","format":"string","type":"string"},"network":{"format":"string","type":"string"},"ports":{"additionalProperties":{"type":"integer"},"description":"Set of ports associated with the endpoint.","type":"object"},"weight":{"description":"The load balancing weight associated with the endpoint.","type":"integer"}},"type":"object"},"type":"array"},"exportTo":{"description":"A list of namespaces to which this service is exported.","items":{"format":"string","type":"string"},"type":"array"},"hosts":{"description":"The hosts associated with the ServiceEntry.","items":{"format":"string","type":"string"},"type":"array"},"location":{"enum":["MESH_EXTERNAL","MESH_INTERNAL"],"type":"string"},"ports":{"description":"The ports associated with the external service.","items":{"properties":{"name":{"description":"Label assigned to the port.","format":"string","type":"string"},"number":{"description":"A valid non-negative integer port number.","type":"integer"},"protocol":{"description":"The protocol exposed on the port.","format":"string","type":"string"}},"type":"object"},"type":"array"},"resolution":{"description":"Service discovery mode for the hosts.","enum":["NONE","STATIC","DNS"],"type":"string"},"subjectAltNames":{"items":{"format":"string","type":"string"},"type":"array"}},"type":"object"}},"type":"object"}},"versions":[{"name":"v1alpha3","served":true,"storage":true}]},"status":{"acceptedNames":{"kind":"","plural":""},"conditions":[],"storedVersions":[]}} | |
creationTimestamp: "2019-12-03T04:51:49Z" | |
generation: 3 | |
labels: | |
app: istio-pilot | |
chart: istio | |
heritage: Tiller | |
release: istio | |
name: serviceentries.networking.istio.io | |
resourceVersion: "43313" | |
selfLink: /apis/apiextensions.k8s.io/v1beta1/customresourcedefinitions/serviceentries.networking.istio.io | |
uid: 9d9bd274-1588-11ea-b5af-027e0b84da98 | |
spec: | |
additionalPrinterColumns: | |
- JSONPath: .spec.hosts | |
description: The hosts associated with the ServiceEntry | |
name: Hosts | |
type: string | |
- JSONPath: .spec.location | |
description: Whether the service is external to the mesh or part of the mesh | |
(MESH_EXTERNAL or MESH_INTERNAL) | |
name: Location | |
type: string | |
- JSONPath: .spec.resolution | |
description: Service discovery mode for the hosts (NONE, STATIC, or DNS) | |
name: Resolution | |
type: string | |
- JSONPath: .metadata.creationTimestamp | |
description: |- | |
CreationTimestamp is a timestamp representing the server time when this object was created. It is not guaranteed to be set in happens-before order across separate operations. Clients may not set this value. It is represented in RFC3339 form and is in UTC. | |
Populated by the system. Read-only. Null for lists. More info: https://git.k8s.io/community/contributors/devel/api-conventions.md#metadata | |
name: Age | |
type: date | |
conversion: | |
strategy: None | |
group: networking.istio.io | |
names: | |
categories: | |
- istio-io | |
- networking-istio-io | |
kind: ServiceEntry | |
listKind: ServiceEntryList | |
plural: serviceentries | |
shortNames: | |
- se | |
singular: serviceentry | |
scope: Namespaced | |
subresources: | |
status: {} | |
validation: | |
openAPIV3Schema: | |
properties: | |
spec: | |
description: 'Configuration affecting service registry. See more details | |
at: https://istio.io/docs/reference/config/networking/v1alpha3/service-entry.html' | |
properties: | |
addresses: | |
description: The virtual IP addresses associated with the service. | |
items: | |
format: string | |
type: string | |
type: array | |
endpoints: | |
description: One or more endpoints associated with the service. | |
items: | |
properties: | |
address: | |
format: string | |
type: string | |
labels: | |
additionalProperties: | |
format: string | |
type: string | |
description: One or more labels associated with the endpoint. | |
type: object | |
locality: | |
description: The locality associated with the endpoint. | |
format: string | |
type: string | |
network: | |
format: string | |
type: string | |
ports: | |
additionalProperties: | |
type: integer | |
description: Set of ports associated with the endpoint. | |
type: object | |
weight: | |
description: The load balancing weight associated with the endpoint. | |
type: integer | |
type: object | |
type: array | |
exportTo: | |
description: A list of namespaces to which this service is exported. | |
items: | |
format: string | |
type: string | |
type: array | |
hosts: | |
description: The hosts associated with the ServiceEntry. | |
items: | |
format: string | |
type: string | |
type: array | |
location: | |
enum: | |
- MESH_EXTERNAL | |
- MESH_INTERNAL | |
type: string | |
ports: | |
description: The ports associated with the external service. | |
items: | |
properties: | |
name: | |
description: Label assigned to the port. | |
format: string | |
type: string | |
number: | |
description: A valid non-negative integer port number. | |
type: integer | |
protocol: | |
description: The protocol exposed on the port. | |
format: string | |
type: string | |
type: object | |
type: array | |
resolution: | |
description: Service discovery mode for the hosts. | |
enum: | |
- NONE | |
- STATIC | |
- DNS | |
type: string | |
subjectAltNames: | |
items: | |
format: string | |
type: string | |
type: array | |
type: object | |
type: object | |
version: v1alpha3 | |
versions: | |
- name: v1alpha3 | |
served: true | |
storage: true | |
status: | |
acceptedNames: | |
categories: | |
- istio-io | |
- networking-istio-io | |
kind: ServiceEntry | |
listKind: ServiceEntryList | |
plural: serviceentries | |
shortNames: | |
- se | |
singular: serviceentry | |
conditions: | |
- lastTransitionTime: "2019-12-03T04:51:49Z" | |
message: no conflicts found | |
reason: NoConflicts | |
status: "True" | |
type: NamesAccepted | |
- lastTransitionTime: null | |
message: the initial names have been accepted | |
reason: InitialNamesAccepted | |
status: "True" | |
type: Established | |
storedVersions: | |
- v1alpha3 | |
- apiVersion: apiextensions.k8s.io/v1beta1 | |
kind: CustomResourceDefinition | |
metadata: | |
annotations: | |
helm.sh/resource-policy: keep | |
kubectl.kubernetes.io/last-applied-configuration: | | |
{"apiVersion":"apiextensions.k8s.io/v1beta1","kind":"CustomResourceDefinition","metadata":{"annotations":{"helm.sh/resource-policy":"keep"},"creationTimestamp":null,"labels":{"app":"mixer","chart":"istio","heritage":"Tiller","istio":"rbac","package":"istio.io.mixer","release":"istio"},"name":"servicerolebindings.rbac.istio.io"},"spec":{"additionalPrinterColumns":[{"JSONPath":".spec.roleRef.name","description":"The name of the ServiceRole object being referenced","name":"Reference","type":"string"},{"JSONPath":".metadata.creationTimestamp","description":"CreationTimestamp is a timestamp representing the server time when this object was created. It is not guaranteed to be set in happens-before order across separate operations. Clients may not set this value. It is represented in RFC3339 form and is in UTC.\nPopulated by the system. Read-only. Null for lists. More info: https://git.k8s.io/community/contributors/devel/api-conventions.md#metadata","name":"Age","type":"date"}],"group":"rbac.istio.io","names":{"categories":["istio-io","rbac-istio-io"],"kind":"ServiceRoleBinding","plural":"servicerolebindings","singular":"servicerolebinding"},"scope":"Namespaced","subresources":{"status":{}},"validation":{"openAPIV3Schema":{"properties":{"spec":{"description":"Configuration for Role Based Access Control. See more details at: https://istio.io/docs/reference/config/authorization/istio.rbac.v1alpha1.html","properties":{"actions":{"items":{"properties":{"constraints":{"description":"Optional.","items":{"properties":{"key":{"description":"Key of the constraint.","format":"string","type":"string"},"values":{"description":"List of valid values for the constraint.","items":{"format":"string","type":"string"},"type":"array"}},"type":"object"},"type":"array"},"hosts":{"items":{"format":"string","type":"string"},"type":"array"},"methods":{"description":"Optional.","items":{"format":"string","type":"string"},"type":"array"},"notHosts":{"items":{"format":"string","type":"string"},"type":"array"},"notMethods":{"items":{"format":"string","type":"string"},"type":"array"},"notPaths":{"items":{"format":"string","type":"string"},"type":"array"},"notPorts":{"items":{"format":"int32","type":"integer"},"type":"array"},"paths":{"description":"Optional.","items":{"format":"string","type":"string"},"type":"array"},"ports":{"items":{"format":"int32","type":"integer"},"type":"array"},"services":{"description":"A list of service names.","items":{"format":"string","type":"string"},"type":"array"}},"type":"object"},"type":"array"},"mode":{"enum":["ENFORCED","PERMISSIVE"],"type":"string"},"role":{"format":"string","type":"string"},"roleRef":{"description":"Reference to the ServiceRole object.","properties":{"kind":{"description":"The type of the role being referenced.","format":"string","type":"string"},"name":{"description":"The name of the ServiceRole object being referenced.","format":"string","type":"string"}},"type":"object"},"subjects":{"description":"List of subjects that are assigned the ServiceRole object.","items":{"properties":{"group":{"format":"string","type":"string"},"groups":{"items":{"format":"string","type":"string"},"type":"array"},"ips":{"items":{"format":"string","type":"string"},"type":"array"},"names":{"items":{"format":"string","type":"string"},"type":"array"},"namespaces":{"items":{"format":"string","type":"string"},"type":"array"},"notGroups":{"items":{"format":"string","type":"string"},"type":"array"},"notIps":{"items":{"format":"string","type":"string"},"type":"array"},"notNames":{"items":{"format":"string","type":"string"},"type":"array"},"notNamespaces":{"items":{"format":"string","type":"string"},"type":"array"},"properties":{"additionalProperties":{"format":"string","type":"string"},"description":"Optional.","type":"object"},"user":{"description":"Optional.","format":"string","type":"string"}},"type":"object"},"type":"array"}},"type":"object"}},"type":"object"}},"versions":[{"name":"v1alpha1","served":true,"storage":true}]},"status":{"acceptedNames":{"kind":"","plural":""},"conditions":[],"storedVersions":[]}} | |
creationTimestamp: "2019-12-03T04:51:49Z" | |
generation: 3 | |
labels: | |
app: mixer | |
chart: istio | |
heritage: Tiller | |
istio: rbac | |
package: istio.io.mixer | |
release: istio | |
name: servicerolebindings.rbac.istio.io | |
resourceVersion: "43315" | |
selfLink: /apis/apiextensions.k8s.io/v1beta1/customresourcedefinitions/servicerolebindings.rbac.istio.io | |
uid: 9db78c7c-1588-11ea-b5af-027e0b84da98 | |
spec: | |
additionalPrinterColumns: | |
- JSONPath: .spec.roleRef.name | |
description: The name of the ServiceRole object being referenced | |
name: Reference | |
type: string | |
- JSONPath: .metadata.creationTimestamp | |
description: |- | |
CreationTimestamp is a timestamp representing the server time when this object was created. It is not guaranteed to be set in happens-before order across separate operations. Clients may not set this value. It is represented in RFC3339 form and is in UTC. | |
Populated by the system. Read-only. Null for lists. More info: https://git.k8s.io/community/contributors/devel/api-conventions.md#metadata | |
name: Age | |
type: date | |
conversion: | |
strategy: None | |
group: rbac.istio.io | |
names: | |
categories: | |
- istio-io | |
- rbac-istio-io | |
kind: ServiceRoleBinding | |
listKind: ServiceRoleBindingList | |
plural: servicerolebindings | |
singular: servicerolebinding | |
scope: Namespaced | |
subresources: | |
status: {} | |
validation: | |
openAPIV3Schema: | |
properties: | |
spec: | |
description: 'Configuration for Role Based Access Control. See more details | |
at: https://istio.io/docs/reference/config/authorization/istio.rbac.v1alpha1.html' | |
properties: | |
actions: | |
items: | |
properties: | |
constraints: | |
description: Optional. | |
items: | |
properties: | |
key: | |
description: Key of the constraint. | |
format: string | |
type: string | |
values: | |
description: List of valid values for the constraint. | |
items: | |
format: string | |
type: string | |
type: array | |
type: object | |
type: array | |
hosts: | |
items: | |
format: string | |
type: string | |
type: array | |
methods: | |
description: Optional. | |
items: | |
format: string | |
type: string | |
type: array | |
notHosts: | |
items: | |
format: string | |
type: string | |
type: array | |
notMethods: | |
items: | |
format: string | |
type: string | |
type: array | |
notPaths: | |
items: | |
format: string | |
type: string | |
type: array | |
notPorts: | |
items: | |
format: int32 | |
type: integer | |
type: array | |
paths: | |
description: Optional. | |
items: | |
format: string | |
type: string | |
type: array | |
ports: | |
items: | |
format: int32 | |
type: integer | |
type: array | |
services: | |
description: A list of service names. | |
items: | |
format: string | |
type: string | |
type: array | |
type: object | |
type: array | |
mode: | |
enum: | |
- ENFORCED | |
- PERMISSIVE | |
type: string | |
role: | |
format: string | |
type: string | |
roleRef: | |
description: Reference to the ServiceRole object. | |
properties: | |
kind: | |
description: The type of the role being referenced. | |
format: string | |
type: string | |
name: | |
description: The name of the ServiceRole object being referenced. | |
format: string | |
type: string | |
type: object | |
subjects: | |
description: List of subjects that are assigned the ServiceRole object. | |
items: | |
properties: | |
group: | |
format: string | |
type: string | |
groups: | |
items: | |
format: string | |
type: string | |
type: array | |
ips: | |
items: | |
format: string | |
type: string | |
type: array | |
names: | |
items: | |
format: string | |
type: string | |
type: array | |
namespaces: | |
items: | |
format: string | |
type: string | |
type: array | |
notGroups: | |
items: | |
format: string | |
type: string | |
type: array | |
notIps: | |
items: | |
format: string | |
type: string | |
type: array | |
notNames: | |
items: | |
format: string | |
type: string | |
type: array | |
notNamespaces: | |
items: | |
format: string | |
type: string | |
type: array | |
properties: | |
additionalProperties: | |
format: string | |
type: string | |
description: Optional. | |
type: object | |
user: | |
description: Optional. | |
format: string | |
type: string | |
type: object | |
type: array | |
type: object | |
type: object | |
version: v1alpha1 | |
versions: | |
- name: v1alpha1 | |
served: true | |
storage: true | |
status: | |
acceptedNames: | |
categories: | |
- istio-io | |
- rbac-istio-io | |
kind: ServiceRoleBinding | |
listKind: ServiceRoleBindingList | |
plural: servicerolebindings | |
singular: servicerolebinding | |
conditions: | |
- lastTransitionTime: "2019-12-03T04:51:49Z" | |
message: no conflicts found | |
reason: NoConflicts | |
status: "True" | |
type: NamesAccepted | |
- lastTransitionTime: null | |
message: the initial names have been accepted | |
reason: InitialNamesAccepted | |
status: "True" | |
type: Established | |
storedVersions: | |
- v1alpha1 | |
- apiVersion: apiextensions.k8s.io/v1beta1 | |
kind: CustomResourceDefinition | |
metadata: | |
annotations: | |
helm.sh/resource-policy: keep | |
kubectl.kubernetes.io/last-applied-configuration: | | |
{"apiVersion":"apiextensions.k8s.io/v1beta1","kind":"CustomResourceDefinition","metadata":{"annotations":{"helm.sh/resource-policy":"keep"},"creationTimestamp":null,"labels":{"app":"mixer","chart":"istio","heritage":"Tiller","istio":"rbac","package":"istio.io.mixer","release":"istio"},"name":"serviceroles.rbac.istio.io"},"spec":{"group":"rbac.istio.io","names":{"categories":["istio-io","rbac-istio-io"],"kind":"ServiceRole","plural":"serviceroles","singular":"servicerole"},"scope":"Namespaced","subresources":{"status":{}},"validation":{"openAPIV3Schema":{"properties":{"spec":{"description":"Configuration for Role Based Access Control. See more details at: https://istio.io/docs/reference/config/authorization/istio.rbac.v1alpha1.html","properties":{"rules":{"description":"The set of access rules (permissions) that the role has.","items":{"properties":{"constraints":{"description":"Optional.","items":{"properties":{"key":{"description":"Key of the constraint.","format":"string","type":"string"},"values":{"description":"List of valid values for the constraint.","items":{"format":"string","type":"string"},"type":"array"}},"type":"object"},"type":"array"},"hosts":{"items":{"format":"string","type":"string"},"type":"array"},"methods":{"description":"Optional.","items":{"format":"string","type":"string"},"type":"array"},"notHosts":{"items":{"format":"string","type":"string"},"type":"array"},"notMethods":{"items":{"format":"string","type":"string"},"type":"array"},"notPaths":{"items":{"format":"string","type":"string"},"type":"array"},"notPorts":{"items":{"format":"int32","type":"integer"},"type":"array"},"paths":{"description":"Optional.","items":{"format":"string","type":"string"},"type":"array"},"ports":{"items":{"format":"int32","type":"integer"},"type":"array"},"services":{"description":"A list of service names.","items":{"format":"string","type":"string"},"type":"array"}},"type":"object"},"type":"array"}},"type":"object"}},"type":"object"}},"versions":[{"name":"v1alpha1","served":true,"storage":true}]},"status":{"acceptedNames":{"kind":"","plural":""},"conditions":[],"storedVersions":[]}} | |
creationTimestamp: "2019-12-03T04:51:49Z" | |
generation: 3 | |
labels: | |
app: mixer | |
chart: istio | |
heritage: Tiller | |
istio: rbac | |
package: istio.io.mixer | |
release: istio | |
name: serviceroles.rbac.istio.io | |
resourceVersion: "43317" | |
selfLink: /apis/apiextensions.k8s.io/v1beta1/customresourcedefinitions/serviceroles.rbac.istio.io | |
uid: 9db98cf8-1588-11ea-b5af-027e0b84da98 | |
spec: | |
conversion: | |
strategy: None | |
group: rbac.istio.io | |
names: | |
categories: | |
- istio-io | |
- rbac-istio-io | |
kind: ServiceRole | |
listKind: ServiceRoleList | |
plural: serviceroles | |
singular: servicerole | |
scope: Namespaced | |
subresources: | |
status: {} | |
validation: | |
openAPIV3Schema: | |
properties: | |
spec: | |
description: 'Configuration for Role Based Access Control. See more details | |
at: https://istio.io/docs/reference/config/authorization/istio.rbac.v1alpha1.html' | |
properties: | |
rules: | |
description: The set of access rules (permissions) that the role has. | |
items: | |
properties: | |
constraints: | |
description: Optional. | |
items: | |
properties: | |
key: | |
description: Key of the constraint. | |
format: string | |
type: string | |
values: | |
description: List of valid values for the constraint. | |
items: | |
format: string | |
type: string | |
type: array | |
type: object | |
type: array | |
hosts: | |
items: | |
format: string | |
type: string | |
type: array | |
methods: | |
description: Optional. | |
items: | |
format: string | |
type: string | |
type: array | |
notHosts: | |
items: | |
format: string | |
type: string | |
type: array | |
notMethods: | |
items: | |
format: string | |
type: string | |
type: array | |
notPaths: | |
items: | |
format: string | |
type: string | |
type: array | |
notPorts: | |
items: | |
format: int32 | |
type: integer | |
type: array | |
paths: | |
description: Optional. | |
items: | |
format: string | |
type: string | |
type: array | |
ports: | |
items: | |
format: int32 | |
type: integer | |
type: array | |
services: | |
description: A list of service names. | |
items: | |
format: string | |
type: string | |
type: array | |
type: object | |
type: array | |
type: object | |
type: object | |
version: v1alpha1 | |
versions: | |
- name: v1alpha1 | |
served: true | |
storage: true | |
status: | |
acceptedNames: | |
categories: | |
- istio-io | |
- rbac-istio-io | |
kind: ServiceRole | |
listKind: ServiceRoleList | |
plural: serviceroles | |
singular: servicerole | |
conditions: | |
- lastTransitionTime: "2019-12-03T04:51:49Z" | |
message: no conflicts found | |
reason: NoConflicts | |
status: "True" | |
type: NamesAccepted | |
- lastTransitionTime: null | |
message: the initial names have been accepted | |
reason: InitialNamesAccepted | |
status: "True" | |
type: Established | |
storedVersions: | |
- v1alpha1 | |
- apiVersion: apiextensions.k8s.io/v1beta1 | |
kind: CustomResourceDefinition | |
metadata: | |
annotations: | |
kubectl.kubernetes.io/last-applied-configuration: | | |
{"apiVersion":"apiextensions.k8s.io/v1beta1","kind":"CustomResourceDefinition","metadata":{"annotations":{},"labels":{"duck.knative.dev/addressable":"true","duck.knative.dev/podspecable":"true","knative.dev/crd-install":"true","serving.knative.dev/release":"devel"},"name":"services.serving.knative.dev"},"spec":{"additionalPrinterColumns":[{"JSONPath":".status.url","name":"URL","type":"string"},{"JSONPath":".status.latestCreatedRevisionName","name":"LatestCreated","type":"string"},{"JSONPath":".status.latestReadyRevisionName","name":"LatestReady","type":"string"},{"JSONPath":".status.conditions[?(@.type=='Ready')].status","name":"Ready","type":"string"},{"JSONPath":".status.conditions[?(@.type=='Ready')].reason","name":"Reason","type":"string"}],"group":"serving.knative.dev","names":{"categories":["all","knative","serving"],"kind":"Service","plural":"services","shortNames":["kservice","ksvc"],"singular":"service"},"scope":"Namespaced","subresources":{"status":{}},"versions":[{"name":"v1alpha1","served":true,"storage":true},{"name":"v1beta1","served":true,"storage":false},{"name":"v1","served":true,"storage":false}]}} | |
creationTimestamp: "2019-12-03T10:54:08Z" | |
generation: 1 | |
labels: | |
duck.knative.dev/addressable: "true" | |
duck.knative.dev/podspecable: "true" | |
knative.dev/crd-install: "true" | |
serving.knative.dev/release: devel | |
name: services.serving.knative.dev | |
resourceVersion: "43855" | |
selfLink: /apis/apiextensions.k8s.io/v1beta1/customresourcedefinitions/services.serving.knative.dev | |
uid: 3b4ed608-15bb-11ea-b5af-027e0b84da98 | |
spec: | |
additionalPrinterColumns: | |
- JSONPath: .status.url | |
name: URL | |
type: string | |
- JSONPath: .status.latestCreatedRevisionName | |
name: LatestCreated | |
type: string | |
- JSONPath: .status.latestReadyRevisionName | |
name: LatestReady | |
type: string | |
- JSONPath: .status.conditions[?(@.type=='Ready')].status | |
name: Ready | |
type: string | |
- JSONPath: .status.conditions[?(@.type=='Ready')].reason | |
name: Reason | |
type: string | |
conversion: | |
strategy: None | |
group: serving.knative.dev | |
names: | |
categories: | |
- all | |
- knative | |
- serving | |
kind: Service | |
listKind: ServiceList | |
plural: services | |
shortNames: | |
- kservice | |
- ksvc | |
singular: service | |
scope: Namespaced | |
subresources: | |
status: {} | |
version: v1alpha1 | |
versions: | |
- name: v1alpha1 | |
served: true | |
storage: true | |
- name: v1beta1 | |
served: true | |
storage: false | |
- name: v1 | |
served: true | |
storage: false | |
status: | |
acceptedNames: | |
categories: | |
- all | |
- knative | |
- serving | |
kind: Service | |
listKind: ServiceList | |
plural: services | |
shortNames: | |
- kservice | |
- ksvc | |
singular: service | |
conditions: | |
- lastTransitionTime: "2019-12-03T10:54:08Z" | |
message: no conflicts found | |
reason: NoConflicts | |
status: "True" | |
type: NamesAccepted | |
- lastTransitionTime: null | |
message: the initial names have been accepted | |
reason: InitialNamesAccepted | |
status: "True" | |
type: Established | |
storedVersions: | |
- v1alpha1 | |
- apiVersion: apiextensions.k8s.io/v1beta1 | |
kind: CustomResourceDefinition | |
metadata: | |
annotations: | |
helm.sh/resource-policy: keep | |
kubectl.kubernetes.io/last-applied-configuration: | | |
{"apiVersion":"apiextensions.k8s.io/v1beta1","kind":"CustomResourceDefinition","metadata":{"annotations":{"helm.sh/resource-policy":"keep"},"creationTimestamp":null,"labels":{"app":"istio-pilot","chart":"istio","heritage":"Tiller","release":"istio"},"name":"sidecars.networking.istio.io"},"spec":{"group":"networking.istio.io","names":{"categories":["istio-io","networking-istio-io"],"kind":"Sidecar","plural":"sidecars","singular":"sidecar"},"scope":"Namespaced","subresources":{"status":{}},"validation":{"openAPIV3Schema":{"properties":{"spec":{"description":"Configuration affecting network reachability of a sidecar. See more details at: https://istio.io/docs/reference/config/networking/v1alpha3/sidecar.html","properties":{"egress":{"items":{"properties":{"bind":{"format":"string","type":"string"},"captureMode":{"enum":["DEFAULT","IPTABLES","NONE"],"type":"string"},"hosts":{"items":{"format":"string","type":"string"},"type":"array"},"port":{"description":"The port associated with the listener.","properties":{"name":{"description":"Label assigned to the port.","format":"string","type":"string"},"number":{"description":"A valid non-negative integer port number.","type":"integer"},"protocol":{"description":"The protocol exposed on the port.","format":"string","type":"string"}},"type":"object"}},"type":"object"},"type":"array"},"ingress":{"items":{"properties":{"bind":{"description":"The ip to which the listener should be bound.","format":"string","type":"string"},"captureMode":{"enum":["DEFAULT","IPTABLES","NONE"],"type":"string"},"defaultEndpoint":{"format":"string","type":"string"},"port":{"description":"The port associated with the listener.","properties":{"name":{"description":"Label assigned to the port.","format":"string","type":"string"},"number":{"description":"A valid non-negative integer port number.","type":"integer"},"protocol":{"description":"The protocol exposed on the port.","format":"string","type":"string"}},"type":"object"}},"type":"object"},"type":"array"},"outboundTrafficPolicy":{"description":"This allows to configure the outbound traffic policy.","properties":{"mode":{"enum":["REGISTRY_ONLY","ALLOW_ANY"],"type":"string"}},"type":"object"},"workloadSelector":{"properties":{"labels":{"additionalProperties":{"format":"string","type":"string"},"type":"object"}},"type":"object"}},"type":"object"}},"type":"object"}},"versions":[{"name":"v1alpha3","served":true,"storage":true}]},"status":{"acceptedNames":{"kind":"","plural":""},"conditions":[],"storedVersions":[]}} | |
creationTimestamp: "2019-12-03T04:51:49Z" | |
generation: 3 | |
labels: | |
app: istio-pilot | |
chart: istio | |
heritage: Tiller | |
release: istio | |
name: sidecars.networking.istio.io | |
resourceVersion: "43298" | |
selfLink: /apis/apiextensions.k8s.io/v1beta1/customresourcedefinitions/sidecars.networking.istio.io | |
uid: 9dac4087-1588-11ea-b5af-027e0b84da98 | |
spec: | |
conversion: | |
strategy: None | |
group: networking.istio.io | |
names: | |
categories: | |
- istio-io | |
- networking-istio-io | |
kind: Sidecar | |
listKind: SidecarList | |
plural: sidecars | |
singular: sidecar | |
scope: Namespaced | |
subresources: | |
status: {} | |
validation: | |
openAPIV3Schema: | |
properties: | |
spec: | |
description: 'Configuration affecting network reachability of a sidecar. | |
See more details at: https://istio.io/docs/reference/config/networking/v1alpha3/sidecar.html' | |
properties: | |
egress: | |
items: | |
properties: | |
bind: | |
format: string | |
type: string | |
captureMode: | |
enum: | |
- DEFAULT | |
- IPTABLES | |
- NONE | |
type: string | |
hosts: | |
items: | |
format: string | |
type: string | |
type: array | |
port: | |
description: The port associated with the listener. | |
properties: | |
name: | |
description: Label assigned to the port. | |
format: string | |
type: string | |
number: | |
description: A valid non-negative integer port number. | |
type: integer | |
protocol: | |
description: The protocol exposed on the port. | |
format: string | |
type: string | |
type: object | |
type: object | |
type: array | |
ingress: | |
items: | |
properties: | |
bind: | |
description: The ip to which the listener should be bound. | |
format: string | |
type: string | |
captureMode: | |
enum: | |
- DEFAULT | |
- IPTABLES | |
- NONE | |
type: string | |
defaultEndpoint: | |
format: string | |
type: string | |
port: | |
description: The port associated with the listener. | |
properties: | |
name: | |
description: Label assigned to the port. | |
format: string | |
type: string | |
number: | |
description: A valid non-negative integer port number. | |
type: integer | |
protocol: | |
description: The protocol exposed on the port. | |
format: string | |
type: string | |
type: object | |
type: object | |
type: array | |
outboundTrafficPolicy: | |
description: This allows to configure the outbound traffic policy. | |
properties: | |
mode: | |
enum: | |
- REGISTRY_ONLY | |
- ALLOW_ANY | |
type: string | |
type: object | |
workloadSelector: | |
properties: | |
labels: | |
additionalProperties: | |
format: string | |
type: string | |
type: object | |
type: object | |
type: object | |
type: object | |
version: v1alpha3 | |
versions: | |
- name: v1alpha3 | |
served: true | |
storage: true | |
status: | |
acceptedNames: | |
categories: | |
- istio-io | |
- networking-istio-io | |
kind: Sidecar | |
listKind: SidecarList | |
plural: sidecars | |
singular: sidecar | |
conditions: | |
- lastTransitionTime: "2019-12-03T04:51:49Z" | |
message: no conflicts found | |
reason: NoConflicts | |
status: "True" | |
type: NamesAccepted | |
- lastTransitionTime: null | |
message: the initial names have been accepted | |
reason: InitialNamesAccepted | |
status: "True" | |
type: Established | |
storedVersions: | |
- v1alpha3 | |
- apiVersion: apiextensions.k8s.io/v1beta1 | |
kind: CustomResourceDefinition | |
metadata: | |
annotations: | |
helm.sh/resource-policy: keep | |
kubectl.kubernetes.io/last-applied-configuration: | | |
{"apiVersion":"apiextensions.k8s.io/v1beta1","kind":"CustomResourceDefinition","metadata":{"annotations":{"helm.sh/resource-policy":"keep"},"labels":{"app":"mixer","chart":"istio","heritage":"Tiller","istio":"mixer-template","package":"template","release":"istio"},"name":"templates.config.istio.io"},"spec":{"group":"config.istio.io","names":{"categories":["istio-io","policy-istio-io"],"kind":"template","plural":"templates","singular":"template"},"scope":"Namespaced","subresources":{"status":{}},"versions":[{"name":"v1alpha2","served":true,"storage":true}]}} | |
creationTimestamp: "2019-12-03T04:51:49Z" | |
generation: 3 | |
labels: | |
app: mixer | |
chart: istio | |
heritage: Tiller | |
istio: mixer-template | |
package: template | |
release: istio | |
name: templates.config.istio.io | |
resourceVersion: "43324" | |
selfLink: /apis/apiextensions.k8s.io/v1beta1/customresourcedefinitions/templates.config.istio.io | |
uid: 9dd8f071-1588-11ea-b5af-027e0b84da98 | |
spec: | |
conversion: | |
strategy: None | |
group: config.istio.io | |
names: | |
categories: | |
- istio-io | |
- policy-istio-io | |
kind: template | |
listKind: templateList | |
plural: templates | |
singular: template | |
scope: Namespaced | |
subresources: | |
status: {} | |
version: v1alpha2 | |
versions: | |
- name: v1alpha2 | |
served: true | |
storage: true | |
status: | |
acceptedNames: | |
categories: | |
- istio-io | |
- policy-istio-io | |
kind: template | |
listKind: templateList | |
plural: templates | |
singular: template | |
conditions: | |
- lastTransitionTime: "2019-12-03T04:51:49Z" | |
message: no conflicts found | |
reason: NoConflicts | |
status: "True" | |
type: NamesAccepted | |
- lastTransitionTime: null | |
message: the initial names have been accepted | |
reason: InitialNamesAccepted | |
status: "True" | |
type: Established | |
storedVersions: | |
- v1alpha2 | |
- apiVersion: apiextensions.k8s.io/v1beta1 | |
kind: CustomResourceDefinition | |
metadata: | |
annotations: | |
helm.sh/resource-policy: keep | |
kubectl.kubernetes.io/last-applied-configuration: | | |
{"apiVersion":"apiextensions.k8s.io/v1beta1","kind":"CustomResourceDefinition","metadata":{"annotations":{"helm.sh/resource-policy":"keep"},"creationTimestamp":null,"labels":{"app":"istio-pilot","chart":"istio","heritage":"Tiller","release":"istio"},"name":"virtualservices.networking.istio.io"},"spec":{"additionalPrinterColumns":[{"JSONPath":".spec.gateways","description":"The names of gateways and sidecars that should apply these routes","name":"Gateways","type":"string"},{"JSONPath":".spec.hosts","description":"The destination hosts to which traffic is being sent","name":"Hosts","type":"string"},{"JSONPath":".metadata.creationTimestamp","description":"CreationTimestamp is a timestamp representing the server time when this object was created. It is not guaranteed to be set in happens-before order across separate operations. Clients may not set this value. It is represented in RFC3339 form and is in UTC.\nPopulated by the system. Read-only. Null for lists. More info: https://git.k8s.io/community/contributors/devel/api-conventions.md#metadata","name":"Age","type":"date"}],"group":"networking.istio.io","names":{"categories":["istio-io","networking-istio-io"],"kind":"VirtualService","listKind":"VirtualServiceList","plural":"virtualservices","shortNames":["vs"],"singular":"virtualservice"},"scope":"Namespaced","subresources":{"status":{}},"validation":{"openAPIV3Schema":{"properties":{"spec":{"description":"Configuration affecting label/content routing, sni routing, etc. See more details at: https://istio.io/docs/reference/config/networking/v1alpha3/virtual-service.html","properties":{"exportTo":{"description":"A list of namespaces to which this virtual service is exported.","items":{"format":"string","type":"string"},"type":"array"},"gateways":{"description":"The names of gateways and sidecars that should apply these routes.","items":{"format":"string","type":"string"},"type":"array"},"hosts":{"description":"The destination hosts to which traffic is being sent.","items":{"format":"string","type":"string"},"type":"array"},"http":{"description":"An ordered list of route rules for HTTP traffic.","items":{"properties":{"appendHeaders":{"additionalProperties":{"format":"string","type":"string"},"type":"object"},"appendRequestHeaders":{"additionalProperties":{"format":"string","type":"string"},"type":"object"},"appendResponseHeaders":{"additionalProperties":{"format":"string","type":"string"},"type":"object"},"corsPolicy":{"description":"Cross-Origin Resource Sharing policy (CORS).","properties":{"allowCredentials":{"nullable":true,"type":"boolean"},"allowHeaders":{"items":{"format":"string","type":"string"},"type":"array"},"allowMethods":{"description":"List of HTTP methods allowed to access the resource.","items":{"format":"string","type":"string"},"type":"array"},"allowOrigin":{"description":"The list of origins that are allowed to perform CORS requests.","items":{"format":"string","type":"string"},"type":"array"},"exposeHeaders":{"items":{"format":"string","type":"string"},"type":"array"},"maxAge":{"type":"string"}},"type":"object"},"fault":{"description":"Fault injection policy to apply on HTTP traffic at the client side.","properties":{"abort":{"oneOf":[{"properties":{"percent":{}},"required":["httpStatus"]},{"properties":{"percent":{}},"required":["grpcStatus"]},{"properties":{"percent":{}},"required":["http2Error"]}],"properties":{"grpcStatus":{"format":"string","type":"string"},"http2Error":{"format":"string","type":"string"},"httpStatus":{"description":"HTTP status code to use to abort the Http request.","format":"int32","type":"integer"},"percent":{"description":"Percentage of requests to be aborted with the error code provided (0-100).","format":"int32","type":"integer"},"percentage":{"description":"Percentage of requests to be aborted with the error code provided.","properties":{"value":{"format":"double","type":"number"}},"type":"object"}},"type":"object"},"delay":{"oneOf":[{"properties":{"percent":{}},"required":["fixedDelay"]},{"properties":{"percent":{}},"required":["exponentialDelay"]}],"properties":{"exponentialDelay":{"type":"string"},"fixedDelay":{"description":"Add a fixed delay before forwarding the request.","type":"string"},"percent":{"description":"Percentage of requests on which the delay will be injected (0-100).","format":"int32","type":"integer"},"percentage":{"description":"Percentage of requests on which the delay will be injected.","properties":{"value":{"format":"double","type":"number"}},"type":"object"}},"type":"object"}},"type":"object"},"headers":{"properties":{"request":{"properties":{"add":{"additionalProperties":{"format":"string","type":"string"},"type":"object"},"remove":{"items":{"format":"string","type":"string"},"type":"array"},"set":{"additionalProperties":{"format":"string","type":"string"},"type":"object"}},"type":"object"},"response":{"properties":{"add":{"additionalProperties":{"format":"string","type":"string"},"type":"object"},"remove":{"items":{"format":"string","type":"string"},"type":"array"},"set":{"additionalProperties":{"format":"string","type":"string"},"type":"object"}},"type":"object"}},"type":"object"},"match":{"items":{"properties":{"authority":{"oneOf":[{"required":["exact"]},{"required":["prefix"]},{"required":["regex"]}],"properties":{"exact":{"format":"string","type":"string"},"prefix":{"format":"string","type":"string"},"regex":{"format":"string","type":"string"}},"type":"object"},"gateways":{"items":{"format":"string","type":"string"},"type":"array"},"headers":{"additionalProperties":{"oneOf":[{"required":["exact"]},{"required":["prefix"]},{"required":["regex"]}],"properties":{"exact":{"format":"string","type":"string"},"prefix":{"format":"string","type":"string"},"regex":{"format":"string","type":"string"}},"type":"object"},"type":"object"},"ignoreUriCase":{"description":"Flag to specify whether the URI matching should be case-insensitive.","type":"boolean"},"method":{"oneOf":[{"required":["exact"]},{"required":["prefix"]},{"required":["regex"]}],"properties":{"exact":{"format":"string","type":"string"},"prefix":{"format":"string","type":"string"},"regex":{"format":"string","type":"string"}},"type":"object"},"name":{"description":"The name assigned to a match.","format":"string","type":"string"},"port":{"description":"Specifies the ports on the host that is being addressed.","type":"integer"},"queryParams":{"additionalProperties":{"oneOf":[{"required":["exact"]},{"required":["prefix"]},{"required":["regex"]}],"properties":{"exact":{"format":"string","type":"string"},"prefix":{"format":"string","type":"string"},"regex":{"format":"string","type":"string"}},"type":"object"},"description":"Query parameters for matching.","type":"object"},"scheme":{"oneOf":[{"required":["exact"]},{"required":["prefix"]},{"required":["regex"]}],"properties":{"exact":{"format":"string","type":"string"},"prefix":{"format":"string","type":"string"},"regex":{"format":"string","type":"string"}},"type":"object"},"sourceLabels":{"additionalProperties":{"format":"string","type":"string"},"type":"object"},"uri":{"oneOf":[{"required":["exact"]},{"required":["prefix"]},{"required":["regex"]}],"properties":{"exact":{"format":"string","type":"string"},"prefix":{"format":"string","type":"string"},"regex":{"format":"string","type":"string"}},"type":"object"}},"type":"object"},"type":"array"},"mirror":{"properties":{"host":{"description":"The name of a service from the service registry.","format":"string","type":"string"},"port":{"description":"Specifies the port on the host that is being addressed.","properties":{"number":{"type":"integer"}},"type":"object"},"subset":{"description":"The name of a subset within the service.","format":"string","type":"string"}},"type":"object"},"mirrorPercent":{"description":"Percentage of the traffic to be mirrored by the `mirror` field.","nullable":true,"type":"integer"},"mirror_percent":{"description":"Percentage of the traffic to be mirrored by the `mirror` field.","nullable":true,"type":"integer"},"name":{"description":"The name assigned to the route for debugging purposes.","format":"string","type":"string"},"redirect":{"description":"A http rule can either redirect or forward (default) traffic.","properties":{"authority":{"format":"string","type":"string"},"redirectCode":{"type":"integer"},"uri":{"format":"string","type":"string"}},"type":"object"},"removeRequestHeaders":{"items":{"format":"string","type":"string"},"type":"array"},"removeResponseHeaders":{"items":{"format":"string","type":"string"},"type":"array"},"retries":{"description":"Retry policy for HTTP requests.","properties":{"attempts":{"description":"Number of retries for a given request.","format":"int32","type":"integer"},"perTryTimeout":{"description":"Timeout per retry attempt for a given request.","type":"string"},"retryOn":{"description":"Specifies the conditions under which retry takes place.","format":"string","type":"string"}},"type":"object"},"rewrite":{"description":"Rewrite HTTP URIs and Authority headers.","properties":{"authority":{"description":"rewrite the Authority/Host header with this value.","format":"string","type":"string"},"uri":{"format":"string","type":"string"}},"type":"object"},"route":{"description":"A http rule can either redirect or forward (default) traffic.","items":{"properties":{"appendRequestHeaders":{"additionalProperties":{"format":"string","type":"string"},"description":"Use of `append_request_headers` is deprecated.","type":"object"},"appendResponseHeaders":{"additionalProperties":{"format":"string","type":"string"},"description":"Use of `append_response_headers` is deprecated.","type":"object"},"destination":{"properties":{"host":{"description":"The name of a service from the service registry.","format":"string","type":"string"},"port":{"description":"Specifies the port on the host that is being addressed.","properties":{"number":{"type":"integer"}},"type":"object"},"subset":{"description":"The name of a subset within the service.","format":"string","type":"string"}},"type":"object"},"headers":{"properties":{"request":{"properties":{"add":{"additionalProperties":{"format":"string","type":"string"},"type":"object"},"remove":{"items":{"format":"string","type":"string"},"type":"array"},"set":{"additionalProperties":{"format":"string","type":"string"},"type":"object"}},"type":"object"},"response":{"properties":{"add":{"additionalProperties":{"format":"string","type":"string"},"type":"object"},"remove":{"items":{"format":"string","type":"string"},"type":"array"},"set":{"additionalProperties":{"format":"string","type":"string"},"type":"object"}},"type":"object"}},"type":"object"},"removeRequestHeaders":{"description":"Use of `remove_request_headers` is deprecated.","items":{"format":"string","type":"string"},"type":"array"},"removeResponseHeaders":{"description":"Use of `remove_response_header` is deprecated.","items":{"format":"string","type":"string"},"type":"array"},"weight":{"format":"int32","type":"integer"}},"type":"object"},"type":"array"},"timeout":{"description":"Timeout for HTTP requests.","type":"string"},"websocketUpgrade":{"description":"Deprecated.","type":"boolean"}},"type":"object"},"type":"array"},"tcp":{"description":"An ordered list of route rules for opaque TCP traffic.","items":{"properties":{"match":{"items":{"properties":{"destinationSubnets":{"description":"IPv4 or IPv6 ip addresses of destination with optional subnet.","items":{"format":"string","type":"string"},"type":"array"},"gateways":{"description":"Names of gateways where the rule should be applied to.","items":{"format":"string","type":"string"},"type":"array"},"port":{"description":"Specifies the port on the host that is being addressed.","type":"integer"},"sourceLabels":{"additionalProperties":{"format":"string","type":"string"},"type":"object"},"sourceSubnet":{"description":"IPv4 or IPv6 ip address of source with optional subnet.","format":"string","type":"string"}},"type":"object"},"type":"array"},"route":{"description":"The destination to which the connection should be forwarded to.","items":{"properties":{"destination":{"properties":{"host":{"description":"The name of a service from the service registry.","format":"string","type":"string"},"port":{"description":"Specifies the port on the host that is being addressed.","properties":{"number":{"type":"integer"}},"type":"object"},"subset":{"description":"The name of a subset within the service.","format":"string","type":"string"}},"type":"object"},"weight":{"format":"int32","type":"integer"}},"type":"object"},"type":"array"}},"type":"object"},"type":"array"},"tls":{"items":{"properties":{"match":{"items":{"properties":{"destinationSubnets":{"description":"IPv4 or IPv6 ip addresses of destination with optional subnet.","items":{"format":"string","type":"string"},"type":"array"},"gateways":{"description":"Names of gateways where the rule should be applied to.","items":{"format":"string","type":"string"},"type":"array"},"port":{"description":"Specifies the port on the host that is being addressed.","type":"integer"},"sniHosts":{"description":"SNI (server name indicator) to match on.","items":{"format":"string","type":"string"},"type":"array"},"sourceLabels":{"additionalProperties":{"format":"string","type":"string"},"type":"object"},"sourceSubnet":{"description":"IPv4 or IPv6 ip address of source with optional subnet.","format":"string","type":"string"}},"type":"object"},"type":"array"},"route":{"description":"The destination to which the connection should be forwarded to.","items":{"properties":{"destination":{"properties":{"host":{"description":"The name of a service from the service registry.","format":"string","type":"string"},"port":{"description":"Specifies the port on the host that is being addressed.","properties":{"number":{"type":"integer"}},"type":"object"},"subset":{"description":"The name of a subset within the service.","format":"string","type":"string"}},"type":"object"},"weight":{"format":"int32","type":"integer"}},"type":"object"},"type":"array"}},"type":"object"},"type":"array"}},"type":"object"}},"type":"object"}},"versions":[{"name":"v1alpha3","served":true,"storage":true}]},"status":{"acceptedNames":{"kind":"","plural":""},"conditions":[],"storedVersions":[]}} | |
creationTimestamp: "2019-12-03T04:51:49Z" | |
generation: 3 | |
labels: | |
app: istio-pilot | |
chart: istio | |
heritage: Tiller | |
release: istio | |
name: virtualservices.networking.istio.io | |
resourceVersion: "43319" | |
selfLink: /apis/apiextensions.k8s.io/v1beta1/customresourcedefinitions/virtualservices.networking.istio.io | |
uid: 9dc7057b-1588-11ea-b5af-027e0b84da98 | |
spec: | |
additionalPrinterColumns: | |
- JSONPath: .spec.gateways | |
description: The names of gateways and sidecars that should apply these routes | |
name: Gateways | |
type: string | |
- JSONPath: .spec.hosts | |
description: The destination hosts to which traffic is being sent | |
name: Hosts | |
type: string | |
- JSONPath: .metadata.creationTimestamp | |
description: |- | |
CreationTimestamp is a timestamp representing the server time when this object was created. It is not guaranteed to be set in happens-before order across separate operations. Clients may not set this value. It is represented in RFC3339 form and is in UTC. | |
Populated by the system. Read-only. Null for lists. More info: https://git.k8s.io/community/contributors/devel/api-conventions.md#metadata | |
name: Age | |
type: date | |
conversion: | |
strategy: None | |
group: networking.istio.io | |
names: | |
categories: | |
- istio-io | |
- networking-istio-io | |
kind: VirtualService | |
listKind: VirtualServiceList | |
plural: virtualservices | |
shortNames: | |
- vs | |
singular: virtualservice | |
scope: Namespaced | |
subresources: | |
status: {} | |
validation: | |
openAPIV3Schema: | |
properties: | |
spec: | |
description: 'Configuration affecting label/content routing, sni routing, | |
etc. See more details at: https://istio.io/docs/reference/config/networking/v1alpha3/virtual-service.html' | |
properties: | |
exportTo: | |
description: A list of namespaces to which this virtual service is | |
exported. | |
items: | |
format: string | |
type: string | |
type: array | |
gateways: | |
description: The names of gateways and sidecars that should apply | |
these routes. | |
items: | |
format: string | |
type: string | |
type: array | |
hosts: | |
description: The destination hosts to which traffic is being sent. | |
items: | |
format: string | |
type: string | |
type: array | |
http: | |
description: An ordered list of route rules for HTTP traffic. | |
items: | |
properties: | |
appendHeaders: | |
additionalProperties: | |
format: string | |
type: string | |
type: object | |
appendRequestHeaders: | |
additionalProperties: | |
format: string | |
type: string | |
type: object | |
appendResponseHeaders: | |
additionalProperties: | |
format: string | |
type: string | |
type: object | |
corsPolicy: | |
description: Cross-Origin Resource Sharing policy (CORS). | |
properties: | |
allowCredentials: | |
nullable: true | |
type: boolean | |
allowHeaders: | |
items: | |
format: string | |
type: string | |
type: array | |
allowMethods: | |
description: List of HTTP methods allowed to access the | |
resource. | |
items: | |
format: string | |
type: string | |
type: array | |
allowOrigin: | |
description: The list of origins that are allowed to perform | |
CORS requests. | |
items: | |
format: string | |
type: string | |
type: array | |
exposeHeaders: | |
items: | |
format: string | |
type: string | |
type: array | |
maxAge: | |
type: string | |
type: object | |
fault: | |
description: Fault injection policy to apply on HTTP traffic | |
at the client side. | |
properties: | |
abort: | |
oneOf: | |
- properties: | |
percent: {} | |
required: | |
- httpStatus | |
- properties: | |
percent: {} | |
required: | |
- grpcStatus | |
- properties: | |
percent: {} | |
required: | |
- http2Error | |
properties: | |
grpcStatus: | |
format: string | |
type: string | |
http2Error: | |
format: string | |
type: string | |
httpStatus: | |
description: HTTP status code to use to abort the Http | |
request. | |
format: int32 | |
type: integer | |
percent: | |
description: Percentage of requests to be aborted with | |
the error code provided (0-100). | |
format: int32 | |
type: integer | |
percentage: | |
description: Percentage of requests to be aborted with | |
the error code provided. | |
properties: | |
value: | |
format: double | |
type: number | |
type: object | |
type: object | |
delay: | |
oneOf: | |
- properties: | |
percent: {} | |
required: | |
- fixedDelay | |
- properties: | |
percent: {} | |
required: | |
- exponentialDelay | |
properties: | |
exponentialDelay: | |
type: string | |
fixedDelay: | |
description: Add a fixed delay before forwarding the | |
request. | |
type: string | |
percent: | |
description: Percentage of requests on which the delay | |
will be injected (0-100). | |
format: int32 | |
type: integer | |
percentage: | |
description: Percentage of requests on which the delay | |
will be injected. | |
properties: | |
value: | |
format: double | |
type: number | |
type: object | |
type: object | |
type: object | |
headers: | |
properties: | |
request: | |
properties: | |
add: | |
additionalProperties: | |
format: string | |
type: string | |
type: object | |
remove: | |
items: | |
format: string | |
type: string | |
type: array | |
set: | |
additionalProperties: | |
format: string | |
type: string | |
type: object | |
type: object | |
response: | |
properties: | |
add: | |
additionalProperties: | |
format: string | |
type: string | |
type: object | |
remove: | |
items: | |
format: string | |
type: string | |
type: array | |
set: | |
additionalProperties: | |
format: string | |
type: string | |
type: object | |
type: object | |
type: object | |
match: | |
items: | |
properties: | |
authority: | |
oneOf: | |
- required: | |
- exact | |
- required: | |
- prefix | |
- required: | |
- regex | |
properties: | |
exact: | |
format: string | |
type: string | |
prefix: | |
format: string | |
type: string | |
regex: | |
format: string | |
type: string | |
type: object | |
gateways: | |
items: | |
format: string | |
type: string | |
type: array | |
headers: | |
additionalProperties: | |
oneOf: | |
- required: | |
- exact | |
- required: | |
- prefix | |
- required: | |
- regex | |
properties: | |
exact: | |
format: string | |
type: string | |
prefix: | |
format: string | |
type: string | |
regex: | |
format: string | |
type: string | |
type: object | |
type: object | |
ignoreUriCase: | |
description: Flag to specify whether the URI matching | |
should be case-insensitive. | |
type: boolean | |
method: | |
oneOf: | |
- required: | |
- exact | |
- required: | |
- prefix | |
- required: | |
- regex | |
properties: | |
exact: | |
format: string | |
type: string | |
prefix: | |
format: string | |
type: string | |
regex: | |
format: string | |
type: string | |
type: object | |
name: | |
description: The name assigned to a match. | |
format: string | |
type: string | |
port: | |
description: Specifies the ports on the host that is being | |
addressed. | |
type: integer | |
queryParams: | |
additionalProperties: | |
oneOf: | |
- required: | |
- exact | |
- required: | |
- prefix | |
- required: | |
- regex | |
properties: | |
exact: | |
format: string | |
type: string | |
prefix: | |
format: string | |
type: string | |
regex: | |
format: string | |
type: string | |
type: object | |
description: Query parameters for matching. | |
type: object | |
scheme: | |
oneOf: | |
- required: | |
- exact | |
- required: | |
- prefix | |
- required: | |
- regex | |
properties: | |
exact: | |
format: string | |
type: string | |
prefix: | |
format: string | |
type: string | |
regex: | |
format: string | |
type: string | |
type: object | |
sourceLabels: | |
additionalProperties: | |
format: string | |
type: string | |
type: object | |
uri: | |
oneOf: | |
- required: | |
- exact | |
- required: | |
- prefix | |
- required: | |
- regex | |
properties: | |
exact: | |
format: string | |
type: string | |
prefix: | |
format: string | |
type: string | |
regex: | |
format: string | |
type: string | |
type: object | |
type: object | |
type: array | |
mirror: | |
properties: | |
host: | |
description: The name of a service from the service registry. | |
format: string | |
type: string | |
port: | |
description: Specifies the port on the host that is being | |
addressed. | |
properties: | |
number: | |
type: integer | |
type: object | |
subset: | |
description: The name of a subset within the service. | |
format: string | |
type: string | |
type: object | |
mirror_percent: | |
description: Percentage of the traffic to be mirrored by the | |
`mirror` field. | |
nullable: true | |
type: integer | |
mirrorPercent: | |
description: Percentage of the traffic to be mirrored by the | |
`mirror` field. | |
nullable: true | |
type: integer | |
name: | |
description: The name assigned to the route for debugging purposes. | |
format: string | |
type: string | |
redirect: | |
description: A http rule can either redirect or forward (default) | |
traffic. | |
properties: | |
authority: | |
format: string | |
type: string | |
redirectCode: | |
type: integer | |
uri: | |
format: string | |
type: string | |
type: object | |
removeRequestHeaders: | |
items: | |
format: string | |
type: string | |
type: array | |
removeResponseHeaders: | |
items: | |
format: string | |
type: string | |
type: array | |
retries: | |
description: Retry policy for HTTP requests. | |
properties: | |
attempts: | |
description: Number of retries for a given request. | |
format: int32 | |
type: integer | |
perTryTimeout: | |
description: Timeout per retry attempt for a given request. | |
type: string | |
retryOn: | |
description: Specifies the conditions under which retry | |
takes place. | |
format: string | |
type: string | |
type: object | |
rewrite: | |
description: Rewrite HTTP URIs and Authority headers. | |
properties: | |
authority: | |
description: rewrite the Authority/Host header with this | |
value. | |
format: string | |
type: string | |
uri: | |
format: string | |
type: string | |
type: object | |
route: | |
description: A http rule can either redirect or forward (default) | |
traffic. | |
items: | |
properties: | |
appendRequestHeaders: | |
additionalProperties: | |
format: string | |
type: string | |
description: Use of `append_request_headers` is deprecated. | |
type: object | |
appendResponseHeaders: | |
additionalProperties: | |
format: string | |
type: string | |
description: Use of `append_response_headers` is deprecated. | |
type: object | |
destination: | |
properties: | |
host: | |
description: The name of a service from the service | |
registry. | |
format: string | |
type: string | |
port: | |
description: Specifies the port on the host that is | |
being addressed. | |
properties: | |
number: | |
type: integer | |
type: object | |
subset: | |
description: The name of a subset within the service. | |
format: string | |
type: string | |
type: object | |
headers: | |
properties: | |
request: | |
properties: | |
add: | |
additionalProperties: | |
format: string | |
type: string | |
type: object | |
remove: | |
items: | |
format: string | |
type: string | |
type: array | |
set: | |
additionalProperties: | |
format: string | |
type: string | |
type: object | |
type: object | |
response: | |
properties: | |
add: | |
additionalProperties: | |
format: string | |
type: string | |
type: object | |
remove: | |
items: | |
format: string | |
type: string | |
type: array | |
set: | |
additionalProperties: | |
format: string | |
type: string | |
type: object | |
type: object | |
type: object | |
removeRequestHeaders: | |
description: Use of `remove_request_headers` is deprecated. | |
items: | |
format: string | |
type: string | |
type: array | |
removeResponseHeaders: | |
description: Use of `remove_response_header` is deprecated. | |
items: | |
format: string | |
type: string | |
type: array | |
weight: | |
format: int32 | |
type: integer | |
type: object | |
type: array | |
timeout: | |
description: Timeout for HTTP requests. | |
type: string | |
websocketUpgrade: | |
description: Deprecated. | |
type: boolean | |
type: object | |
type: array | |
tcp: | |
description: An ordered list of route rules for opaque TCP traffic. | |
items: | |
properties: | |
match: | |
items: | |
properties: | |
destinationSubnets: | |
description: IPv4 or IPv6 ip addresses of destination | |
with optional subnet. | |
items: | |
format: string | |
type: string | |
type: array | |
gateways: | |
description: Names of gateways where the rule should be | |
applied to. | |
items: | |
format: string | |
type: string | |
type: array | |
port: | |
description: Specifies the port on the host that is being | |
addressed. | |
type: integer | |
sourceLabels: | |
additionalProperties: | |
format: string | |
type: string | |
type: object | |
sourceSubnet: | |
description: IPv4 or IPv6 ip address of source with optional | |
subnet. | |
format: string | |
type: string | |
type: object | |
type: array | |
route: | |
description: The destination to which the connection should | |
be forwarded to. | |
items: | |
properties: | |
destination: | |
properties: | |
host: | |
description: The name of a service from the service | |
registry. | |
format: string | |
type: string | |
port: | |
description: Specifies the port on the host that is | |
being addressed. | |
properties: | |
number: | |
type: integer | |
type: object | |
subset: | |
description: The name of a subset within the service. | |
format: string | |
type: string | |
type: object | |
weight: | |
format: int32 | |
type: integer | |
type: object | |
type: array | |
type: object | |
type: array | |
tls: | |
items: | |
properties: | |
match: | |
items: | |
properties: | |
destinationSubnets: | |
description: IPv4 or IPv6 ip addresses of destination | |
with optional subnet. | |
items: | |
format: string | |
type: string | |
type: array | |
gateways: | |
description: Names of gateways where the rule should be | |
applied to. | |
items: | |
format: string | |
type: string | |
type: array | |
port: | |
description: Specifies the port on the host that is being | |
addressed. | |
type: integer | |
sniHosts: | |
description: SNI (server name indicator) to match on. | |
items: | |
format: string | |
type: string | |
type: array | |
sourceLabels: | |
additionalProperties: | |
format: string | |
type: string | |
type: object | |
sourceSubnet: | |
description: IPv4 or IPv6 ip address of source with optional | |
subnet. | |
format: string | |
type: string | |
type: object | |
type: array | |
route: | |
description: The destination to which the connection should | |
be forwarded to. | |
items: | |
properties: | |
destination: | |
properties: | |
host: | |
description: The name of a service from the service | |
registry. | |
format: string | |
type: string | |
port: | |
description: Specifies the port on the host that is | |
being addressed. | |
properties: | |
number: | |
type: integer | |
type: object | |
subset: | |
description: The name of a subset within the service. | |
format: string | |
type: string | |
type: object | |
weight: | |
format: int32 | |
type: integer | |
type: object | |
type: array | |
type: object | |
type: array | |
type: object | |
type: object | |
version: v1alpha3 | |
versions: | |
- name: v1alpha3 | |
served: true | |
storage: true | |
status: | |
acceptedNames: | |
categories: | |
- istio-io | |
- networking-istio-io | |
kind: VirtualService | |
listKind: VirtualServiceList | |
plural: virtualservices | |
shortNames: | |
- vs | |
singular: virtualservice | |
conditions: | |
- lastTransitionTime: "2019-12-03T04:51:49Z" | |
message: no conflicts found | |
reason: NoConflicts | |
status: "True" | |
type: NamesAccepted | |
- lastTransitionTime: null | |
message: the initial names have been accepted | |
reason: InitialNamesAccepted | |
status: "True" | |
type: Established | |
storedVersions: | |
- v1alpha3 | |
kind: List | |
metadata: | |
resourceVersion: "" | |
selfLink: "" | |
------- | |
resource: apiservices | |
------- | |
apiVersion: v1 | |
items: | |
- apiVersion: apiregistration.k8s.io/v1 | |
kind: APIService | |
metadata: | |
creationTimestamp: "2019-12-03T04:43:09Z" | |
labels: | |
kube-aggregator.kubernetes.io/automanaged: onstart | |
name: v1. | |
resourceVersion: "10" | |
selfLink: /apis/apiregistration.k8s.io/v1/apiservices/v1. | |
uid: 681e646d-1587-11ea-b5af-027e0b84da98 | |
spec: | |
groupPriorityMinimum: 18000 | |
service: null | |
version: v1 | |
versionPriority: 1 | |
status: | |
conditions: | |
- lastTransitionTime: "2019-12-03T04:43:09Z" | |
message: Local APIServices are always available | |
reason: Local | |
status: "True" | |
type: Available | |
- apiVersion: apiregistration.k8s.io/v1 | |
kind: APIService | |
metadata: | |
creationTimestamp: "2019-12-03T04:43:09Z" | |
labels: | |
kube-aggregator.kubernetes.io/automanaged: onstart | |
name: v1.apps | |
resourceVersion: "11" | |
selfLink: /apis/apiregistration.k8s.io/v1/apiservices/v1.apps | |
uid: 681ef0c9-1587-11ea-b5af-027e0b84da98 | |
spec: | |
group: apps | |
groupPriorityMinimum: 17800 | |
service: null | |
version: v1 | |
versionPriority: 15 | |
status: | |
conditions: | |
- lastTransitionTime: "2019-12-03T04:43:09Z" | |
message: Local APIServices are always available | |
reason: Local | |
status: "True" | |
type: Available | |
- apiVersion: apiregistration.k8s.io/v1 | |
kind: APIService | |
metadata: | |
creationTimestamp: "2019-12-03T04:43:09Z" | |
labels: | |
kube-aggregator.kubernetes.io/automanaged: onstart | |
name: v1.authentication.k8s.io | |
resourceVersion: "16" | |
selfLink: /apis/apiregistration.k8s.io/v1/apiservices/v1.authentication.k8s.io | |
uid: 681ffb7e-1587-11ea-b5af-027e0b84da98 | |
spec: | |
group: authentication.k8s.io | |
groupPriorityMinimum: 17700 | |
service: null | |
version: v1 | |
versionPriority: 15 | |
status: | |
conditions: | |
- lastTransitionTime: "2019-12-03T04:43:09Z" | |
message: Local APIServices are always available | |
reason: Local | |
status: "True" | |
type: Available | |
- apiVersion: apiregistration.k8s.io/v1 | |
kind: APIService | |
metadata: | |
creationTimestamp: "2019-12-03T04:43:09Z" | |
labels: | |
kube-aggregator.kubernetes.io/automanaged: onstart | |
name: v1.authorization.k8s.io | |
resourceVersion: "17" | |
selfLink: /apis/apiregistration.k8s.io/v1/apiservices/v1.authorization.k8s.io | |
uid: 68200f3f-1587-11ea-b5af-027e0b84da98 | |
spec: | |
group: authorization.k8s.io | |
groupPriorityMinimum: 17600 | |
service: null | |
version: v1 | |
versionPriority: 15 | |
status: | |
conditions: | |
- lastTransitionTime: "2019-12-03T04:43:09Z" | |
message: Local APIServices are always available | |
reason: Local | |
status: "True" | |
type: Available | |
- apiVersion: apiregistration.k8s.io/v1 | |
kind: APIService | |
metadata: | |
creationTimestamp: "2019-12-03T04:43:09Z" | |
labels: | |
kube-aggregator.kubernetes.io/automanaged: onstart | |
name: v1.autoscaling | |
resourceVersion: "19" | |
selfLink: /apis/apiregistration.k8s.io/v1/apiservices/v1.autoscaling | |
uid: 682083fa-1587-11ea-b5af-027e0b84da98 | |
spec: | |
group: autoscaling | |
groupPriorityMinimum: 17500 | |
service: null | |
version: v1 | |
versionPriority: 15 | |
status: | |
conditions: | |
- lastTransitionTime: "2019-12-03T04:43:09Z" | |
message: Local APIServices are always available | |
reason: Local | |
status: "True" | |
type: Available | |
- apiVersion: apiregistration.k8s.io/v1 | |
kind: APIService | |
metadata: | |
creationTimestamp: "2019-12-03T04:43:10Z" | |
labels: | |
kube-aggregator.kubernetes.io/automanaged: onstart | |
name: v1.batch | |
resourceVersion: "23" | |
selfLink: /apis/apiregistration.k8s.io/v1/apiservices/v1.batch | |
uid: 68219c2c-1587-11ea-b5af-027e0b84da98 | |
spec: | |
group: batch | |
groupPriorityMinimum: 17400 | |
service: null | |
version: v1 | |
versionPriority: 15 | |
status: | |
conditions: | |
- lastTransitionTime: "2019-12-03T04:43:10Z" | |
message: Local APIServices are always available | |
reason: Local | |
status: "True" | |
type: Available | |
- apiVersion: apiregistration.k8s.io/v1 | |
kind: APIService | |
metadata: | |
creationTimestamp: "2019-12-03T04:43:10Z" | |
labels: | |
kube-aggregator.kubernetes.io/automanaged: onstart | |
name: v1.coordination.k8s.io | |
resourceVersion: "28" | |
selfLink: /apis/apiregistration.k8s.io/v1/apiservices/v1.coordination.k8s.io | |
uid: 6822436c-1587-11ea-b5af-027e0b84da98 | |
spec: | |
group: coordination.k8s.io | |
groupPriorityMinimum: 16500 | |
service: null | |
version: v1 | |
versionPriority: 15 | |
status: | |
conditions: | |
- lastTransitionTime: "2019-12-03T04:43:10Z" | |
message: Local APIServices are always available | |
reason: Local | |
status: "True" | |
type: Available | |
- apiVersion: apiregistration.k8s.io/v1 | |
kind: APIService | |
metadata: | |
creationTimestamp: "2019-12-03T04:43:10Z" | |
labels: | |
kube-aggregator.kubernetes.io/automanaged: onstart | |
name: v1.networking.k8s.io | |
resourceVersion: "30" | |
selfLink: /apis/apiregistration.k8s.io/v1/apiservices/v1.networking.k8s.io | |
uid: 68231596-1587-11ea-b5af-027e0b84da98 | |
spec: | |
group: networking.k8s.io | |
groupPriorityMinimum: 17200 | |
service: null | |
version: v1 | |
versionPriority: 15 | |
status: | |
conditions: | |
- lastTransitionTime: "2019-12-03T04:43:10Z" | |
message: Local APIServices are always available | |
reason: Local | |
status: "True" | |
type: Available | |
- apiVersion: apiregistration.k8s.io/v1 | |
kind: APIService | |
metadata: | |
creationTimestamp: "2019-12-03T04:43:10Z" | |
labels: | |
kube-aggregator.kubernetes.io/automanaged: onstart | |
name: v1.rbac.authorization.k8s.io | |
resourceVersion: "33" | |
selfLink: /apis/apiregistration.k8s.io/v1/apiservices/v1.rbac.authorization.k8s.io | |
uid: 68246c0c-1587-11ea-b5af-027e0b84da98 | |
spec: | |
group: rbac.authorization.k8s.io | |
groupPriorityMinimum: 17000 | |
service: null | |
version: v1 | |
versionPriority: 15 | |
status: | |
conditions: | |
- lastTransitionTime: "2019-12-03T04:43:10Z" | |
message: Local APIServices are always available | |
reason: Local | |
status: "True" | |
type: Available | |
- apiVersion: apiregistration.k8s.io/v1 | |
kind: APIService | |
metadata: | |
creationTimestamp: "2019-12-03T04:43:10Z" | |
labels: | |
kube-aggregator.kubernetes.io/automanaged: onstart | |
name: v1.scheduling.k8s.io | |
resourceVersion: "36" | |
selfLink: /apis/apiregistration.k8s.io/v1/apiservices/v1.scheduling.k8s.io | |
uid: 68264620-1587-11ea-b5af-027e0b84da98 | |
spec: | |
group: scheduling.k8s.io | |
groupPriorityMinimum: 16600 | |
service: null | |
version: v1 | |
versionPriority: 15 | |
status: | |
conditions: | |
- lastTransitionTime: "2019-12-03T04:43:10Z" | |
message: Local APIServices are always available | |
reason: Local | |
status: "True" | |
type: Available | |
- apiVersion: apiregistration.k8s.io/v1 | |
kind: APIService | |
metadata: | |
creationTimestamp: "2019-12-03T10:54:07Z" | |
labels: | |
kube-aggregator.kubernetes.io/automanaged: "true" | |
name: v1.serving.knative.dev | |
resourceVersion: "43824" | |
selfLink: /apis/apiregistration.k8s.io/v1/apiservices/v1.serving.knative.dev | |
uid: 3aa290e1-15bb-11ea-b5af-027e0b84da98 | |
spec: | |
group: serving.knative.dev | |
groupPriorityMinimum: 1000 | |
service: null | |
version: v1 | |
versionPriority: 100 | |
status: | |
conditions: | |
- lastTransitionTime: "2019-12-03T10:54:07Z" | |
message: Local APIServices are always available | |
reason: Local | |
status: "True" | |
type: Available | |
- apiVersion: apiregistration.k8s.io/v1 | |
kind: APIService | |
metadata: | |
creationTimestamp: "2019-12-03T04:43:10Z" | |
labels: | |
kube-aggregator.kubernetes.io/automanaged: onstart | |
name: v1.storage.k8s.io | |
resourceVersion: "37" | |
selfLink: /apis/apiregistration.k8s.io/v1/apiservices/v1.storage.k8s.io | |
uid: 6826654e-1587-11ea-b5af-027e0b84da98 | |
spec: | |
group: storage.k8s.io | |
groupPriorityMinimum: 16800 | |
service: null | |
version: v1 | |
versionPriority: 15 | |
status: | |
conditions: | |
- lastTransitionTime: "2019-12-03T04:43:10Z" | |
message: Local APIServices are always available | |
reason: Local | |
status: "True" | |
type: Available | |
- apiVersion: apiregistration.k8s.io/v1 | |
kind: APIService | |
metadata: | |
creationTimestamp: "2019-12-03T04:51:49Z" | |
labels: | |
kube-aggregator.kubernetes.io/automanaged: "true" | |
name: v1alpha1.authentication.istio.io | |
resourceVersion: "1375" | |
selfLink: /apis/apiregistration.k8s.io/v1/apiservices/v1alpha1.authentication.istio.io | |
uid: 9d7ef59b-1588-11ea-b5af-027e0b84da98 | |
spec: | |
group: authentication.istio.io | |
groupPriorityMinimum: 1000 | |
service: null | |
version: v1alpha1 | |
versionPriority: 100 | |
status: | |
conditions: | |
- lastTransitionTime: "2019-12-03T04:51:49Z" | |
message: Local APIServices are always available | |
reason: Local | |
status: "True" | |
type: Available | |
- apiVersion: apiregistration.k8s.io/v1 | |
kind: APIService | |
metadata: | |
creationTimestamp: "2019-12-03T10:54:07Z" | |
labels: | |
kube-aggregator.kubernetes.io/automanaged: "true" | |
name: v1alpha1.autoscaling.internal.knative.dev | |
resourceVersion: "43836" | |
selfLink: /apis/apiregistration.k8s.io/v1/apiservices/v1alpha1.autoscaling.internal.knative.dev | |
uid: 3aea9a4c-15bb-11ea-b5af-027e0b84da98 | |
spec: | |
group: autoscaling.internal.knative.dev | |
groupPriorityMinimum: 1000 | |
service: null | |
version: v1alpha1 | |
versionPriority: 100 | |
status: | |
conditions: | |
- lastTransitionTime: "2019-12-03T10:54:07Z" | |
message: Local APIServices are always available | |
reason: Local | |
status: "True" | |
type: Available | |
- apiVersion: apiregistration.k8s.io/v1 | |
kind: APIService | |
metadata: | |
creationTimestamp: "2019-12-03T10:54:07Z" | |
labels: | |
kube-aggregator.kubernetes.io/automanaged: "true" | |
name: v1alpha1.caching.internal.knative.dev | |
resourceVersion: "43827" | |
selfLink: /apis/apiregistration.k8s.io/v1/apiservices/v1alpha1.caching.internal.knative.dev | |
uid: 3aba3daa-15bb-11ea-b5af-027e0b84da98 | |
spec: | |
group: caching.internal.knative.dev | |
groupPriorityMinimum: 1000 | |
service: null | |
version: v1alpha1 | |
versionPriority: 100 | |
status: | |
conditions: | |
- lastTransitionTime: "2019-12-03T10:54:07Z" | |
message: Local APIServices are always available | |
reason: Local | |
status: "True" | |
type: Available | |
- apiVersion: apiregistration.k8s.io/v1 | |
kind: APIService | |
metadata: | |
creationTimestamp: "2019-12-03T04:44:14Z" | |
labels: | |
kube-aggregator.kubernetes.io/automanaged: "true" | |
name: v1alpha1.crd.k8s.amazonaws.com | |
resourceVersion: "378" | |
selfLink: /apis/apiregistration.k8s.io/v1/apiservices/v1alpha1.crd.k8s.amazonaws.com | |
uid: 8e5b9f7e-1587-11ea-b5af-027e0b84da98 | |
spec: | |
group: crd.k8s.amazonaws.com | |
groupPriorityMinimum: 1000 | |
service: null | |
version: v1alpha1 | |
versionPriority: 100 | |
status: | |
conditions: | |
- lastTransitionTime: "2019-12-03T04:44:14Z" | |
message: Local APIServices are always available | |
reason: Local | |
status: "True" | |
type: Available | |
- apiVersion: apiregistration.k8s.io/v1 | |
kind: APIService | |
metadata: | |
creationTimestamp: "2019-12-03T10:54:07Z" | |
labels: | |
kube-aggregator.kubernetes.io/automanaged: "true" | |
name: v1alpha1.networking.internal.knative.dev | |
resourceVersion: "43816" | |
selfLink: /apis/apiregistration.k8s.io/v1/apiservices/v1alpha1.networking.internal.knative.dev | |
uid: 3a89ae65-15bb-11ea-b5af-027e0b84da98 | |
spec: | |
group: networking.internal.knative.dev | |
groupPriorityMinimum: 1000 | |
service: null | |
version: v1alpha1 | |
versionPriority: 100 | |
status: | |
conditions: | |
- lastTransitionTime: "2019-12-03T10:54:07Z" | |
message: Local APIServices are always available | |
reason: Local | |
status: "True" | |
type: Available | |
- apiVersion: apiregistration.k8s.io/v1 | |
kind: APIService | |
metadata: | |
creationTimestamp: "2019-12-03T04:51:48Z" | |
labels: | |
kube-aggregator.kubernetes.io/automanaged: "true" | |
name: v1alpha1.rbac.istio.io | |
resourceVersion: "1353" | |
selfLink: /apis/apiregistration.k8s.io/v1/apiservices/v1alpha1.rbac.istio.io | |
uid: 9d21b2ab-1588-11ea-b5af-027e0b84da98 | |
spec: | |
group: rbac.istio.io | |
groupPriorityMinimum: 1000 | |
service: null | |
version: v1alpha1 | |
versionPriority: 100 | |
status: | |
conditions: | |
- lastTransitionTime: "2019-12-03T04:51:48Z" | |
message: Local APIServices are always available | |
reason: Local | |
status: "True" | |
type: Available | |
- apiVersion: apiregistration.k8s.io/v1 | |
kind: APIService | |
metadata: | |
creationTimestamp: "2019-12-03T10:54:07Z" | |
labels: | |
kube-aggregator.kubernetes.io/automanaged: "true" | |
name: v1alpha1.serving.knative.dev | |
resourceVersion: "43821" | |
selfLink: /apis/apiregistration.k8s.io/v1/apiservices/v1alpha1.serving.knative.dev | |
uid: 3aa26153-15bb-11ea-b5af-027e0b84da98 | |
spec: | |
group: serving.knative.dev | |
groupPriorityMinimum: 1000 | |
service: null | |
version: v1alpha1 | |
versionPriority: 100 | |
status: | |
conditions: | |
- lastTransitionTime: "2019-12-03T10:54:07Z" | |
message: Local APIServices are always available | |
reason: Local | |
status: "True" | |
type: Available | |
- apiVersion: apiregistration.k8s.io/v1 | |
kind: APIService | |
metadata: | |
creationTimestamp: "2019-12-03T04:51:48Z" | |
labels: | |
kube-aggregator.kubernetes.io/automanaged: "true" | |
name: v1alpha2.config.istio.io | |
resourceVersion: "1350" | |
selfLink: /apis/apiregistration.k8s.io/v1/apiservices/v1alpha2.config.istio.io | |
uid: 9d203a04-1588-11ea-b5af-027e0b84da98 | |
spec: | |
group: config.istio.io | |
groupPriorityMinimum: 1000 | |
service: null | |
version: v1alpha2 | |
versionPriority: 100 | |
status: | |
conditions: | |
- lastTransitionTime: "2019-12-03T04:51:48Z" | |
message: Local APIServices are always available | |
reason: Local | |
status: "True" | |
type: Available | |
- apiVersion: apiregistration.k8s.io/v1 | |
kind: APIService | |
metadata: | |
creationTimestamp: "2019-12-03T04:51:48Z" | |
labels: | |
kube-aggregator.kubernetes.io/automanaged: "true" | |
name: v1alpha3.networking.istio.io | |
resourceVersion: "1358" | |
selfLink: /apis/apiregistration.k8s.io/v1/apiservices/v1alpha3.networking.istio.io | |
uid: 9d4bb9f8-1588-11ea-b5af-027e0b84da98 | |
spec: | |
group: networking.istio.io | |
groupPriorityMinimum: 1000 | |
service: null | |
version: v1alpha3 | |
versionPriority: 100 | |
status: | |
conditions: | |
- lastTransitionTime: "2019-12-03T04:51:48Z" | |
message: Local APIServices are always available | |
reason: Local | |
status: "True" | |
type: Available | |
- apiVersion: apiregistration.k8s.io/v1 | |
kind: APIService | |
metadata: | |
creationTimestamp: "2019-12-03T04:43:09Z" | |
labels: | |
kube-aggregator.kubernetes.io/automanaged: onstart | |
name: v1beta1.admissionregistration.k8s.io | |
resourceVersion: "13" | |
selfLink: /apis/apiregistration.k8s.io/v1/apiservices/v1beta1.admissionregistration.k8s.io | |
uid: 681e8d1c-1587-11ea-b5af-027e0b84da98 | |
spec: | |
group: admissionregistration.k8s.io | |
groupPriorityMinimum: 16700 | |
service: null | |
version: v1beta1 | |
versionPriority: 12 | |
status: | |
conditions: | |
- lastTransitionTime: "2019-12-03T04:43:09Z" | |
message: Local APIServices are always available | |
reason: Local | |
status: "True" | |
type: Available | |
- apiVersion: apiregistration.k8s.io/v1 | |
kind: APIService | |
metadata: | |
creationTimestamp: "2019-12-03T04:43:09Z" | |
labels: | |
kube-aggregator.kubernetes.io/automanaged: onstart | |
name: v1beta1.apiextensions.k8s.io | |
resourceVersion: "14" | |
selfLink: /apis/apiregistration.k8s.io/v1/apiservices/v1beta1.apiextensions.k8s.io | |
uid: 681e9339-1587-11ea-b5af-027e0b84da98 | |
spec: | |
group: apiextensions.k8s.io | |
groupPriorityMinimum: 16700 | |
service: null | |
version: v1beta1 | |
versionPriority: 9 | |
status: | |
conditions: | |
- lastTransitionTime: "2019-12-03T04:43:09Z" | |
message: Local APIServices are always available | |
reason: Local | |
status: "True" | |
type: Available | |
- apiVersion: apiregistration.k8s.io/v1 | |
kind: APIService | |
metadata: | |
creationTimestamp: "2019-12-03T04:43:09Z" | |
labels: | |
kube-aggregator.kubernetes.io/automanaged: onstart | |
name: v1beta1.apps | |
resourceVersion: "12" | |
selfLink: /apis/apiregistration.k8s.io/v1/apiservices/v1beta1.apps | |
uid: 681e82e6-1587-11ea-b5af-027e0b84da98 | |
spec: | |
group: apps | |
groupPriorityMinimum: 17800 | |
service: null | |
version: v1beta1 | |
versionPriority: 1 | |
status: | |
conditions: | |
- lastTransitionTime: "2019-12-03T04:43:09Z" | |
message: Local APIServices are always available | |
reason: Local | |
status: "True" | |
type: Available | |
- apiVersion: apiregistration.k8s.io/v1 | |
kind: APIService | |
metadata: | |
creationTimestamp: "2019-12-03T04:43:09Z" | |
labels: | |
kube-aggregator.kubernetes.io/automanaged: onstart | |
name: v1beta1.authentication.k8s.io | |
resourceVersion: "18" | |
selfLink: /apis/apiregistration.k8s.io/v1/apiservices/v1beta1.authentication.k8s.io | |
uid: 68201869-1587-11ea-b5af-027e0b84da98 | |
spec: | |
group: authentication.k8s.io | |
groupPriorityMinimum: 17700 | |
service: null | |
version: v1beta1 | |
versionPriority: 9 | |
status: | |
conditions: | |
- lastTransitionTime: "2019-12-03T04:43:09Z" | |
message: Local APIServices are always available | |
reason: Local | |
status: "True" | |
type: Available | |
- apiVersion: apiregistration.k8s.io/v1 | |
kind: APIService | |
metadata: | |
creationTimestamp: "2019-12-03T04:43:09Z" | |
labels: | |
kube-aggregator.kubernetes.io/automanaged: onstart | |
name: v1beta1.authorization.k8s.io | |
resourceVersion: "20" | |
selfLink: /apis/apiregistration.k8s.io/v1/apiservices/v1beta1.authorization.k8s.io | |
uid: 68203d0b-1587-11ea-b5af-027e0b84da98 | |
spec: | |
group: authorization.k8s.io | |
groupPriorityMinimum: 17600 | |
service: null | |
version: v1beta1 | |
versionPriority: 9 | |
status: | |
conditions: | |
- lastTransitionTime: "2019-12-03T04:43:09Z" | |
message: Local APIServices are always available | |
reason: Local | |
status: "True" | |
type: Available | |
- apiVersion: apiregistration.k8s.io/v1 | |
kind: APIService | |
metadata: | |
creationTimestamp: "2019-12-03T04:43:10Z" | |
labels: | |
kube-aggregator.kubernetes.io/automanaged: onstart | |
name: v1beta1.batch | |
resourceVersion: "24" | |
selfLink: /apis/apiregistration.k8s.io/v1/apiservices/v1beta1.batch | |
uid: 6821a8b2-1587-11ea-b5af-027e0b84da98 | |
spec: | |
group: batch | |
groupPriorityMinimum: 17400 | |
service: null | |
version: v1beta1 | |
versionPriority: 9 | |
status: | |
conditions: | |
- lastTransitionTime: "2019-12-03T04:43:10Z" | |
message: Local APIServices are always available | |
reason: Local | |
status: "True" | |
type: Available | |
- apiVersion: apiregistration.k8s.io/v1 | |
kind: APIService | |
metadata: | |
creationTimestamp: "2019-12-03T04:43:10Z" | |
labels: | |
kube-aggregator.kubernetes.io/automanaged: onstart | |
name: v1beta1.certificates.k8s.io | |
resourceVersion: "25" | |
selfLink: /apis/apiregistration.k8s.io/v1/apiservices/v1beta1.certificates.k8s.io | |
uid: 6821b0ce-1587-11ea-b5af-027e0b84da98 | |
spec: | |
group: certificates.k8s.io | |
groupPriorityMinimum: 17300 | |
service: null | |
version: v1beta1 | |
versionPriority: 9 | |
status: | |
conditions: | |
- lastTransitionTime: "2019-12-03T04:43:10Z" | |
message: Local APIServices are always available | |
reason: Local | |
status: "True" | |
type: Available | |
- apiVersion: apiregistration.k8s.io/v1 | |
kind: APIService | |
metadata: | |
creationTimestamp: "2019-12-03T04:43:10Z" | |
labels: | |
kube-aggregator.kubernetes.io/automanaged: onstart | |
name: v1beta1.coordination.k8s.io | |
resourceVersion: "26" | |
selfLink: /apis/apiregistration.k8s.io/v1/apiservices/v1beta1.coordination.k8s.io | |
uid: 682252f1-1587-11ea-b5af-027e0b84da98 | |
spec: | |
group: coordination.k8s.io | |
groupPriorityMinimum: 16500 | |
service: null | |
version: v1beta1 | |
versionPriority: 9 | |
status: | |
conditions: | |
- lastTransitionTime: "2019-12-03T04:43:10Z" | |
message: Local APIServices are always available | |
reason: Local | |
status: "True" | |
type: Available | |
- apiVersion: apiregistration.k8s.io/v1 | |
kind: APIService | |
metadata: | |
annotations: | |
kubectl.kubernetes.io/last-applied-configuration: | | |
{"apiVersion":"apiregistration.k8s.io/v1beta1","kind":"APIService","metadata":{"annotations":{},"labels":{"autoscaling.knative.dev/metric-provider":"custom-metrics","serving.knative.dev/release":"devel"},"name":"v1beta1.custom.metrics.k8s.io"},"spec":{"group":"custom.metrics.k8s.io","groupPriorityMinimum":100,"insecureSkipTLSVerify":true,"service":{"name":"autoscaler","namespace":"knative-serving"},"version":"v1beta1","versionPriority":100}} | |
creationTimestamp: "2019-12-03T10:54:26Z" | |
labels: | |
autoscaling.knative.dev/metric-provider: custom-metrics | |
serving.knative.dev/release: devel | |
name: v1beta1.custom.metrics.k8s.io | |
resourceVersion: "54923" | |
selfLink: /apis/apiregistration.k8s.io/v1/apiservices/v1beta1.custom.metrics.k8s.io | |
uid: 463c3a3a-15bb-11ea-b5af-027e0b84da98 | |
spec: | |
group: custom.metrics.k8s.io | |
groupPriorityMinimum: 100 | |
insecureSkipTLSVerify: true | |
service: | |
name: autoscaler | |
namespace: knative-serving | |
version: v1beta1 | |
versionPriority: 100 | |
status: | |
conditions: | |
- lastTransitionTime: "2019-12-03T12:23:43Z" | |
message: all checks passed | |
reason: Passed | |
status: "True" | |
type: Available | |
- apiVersion: apiregistration.k8s.io/v1 | |
kind: APIService | |
metadata: | |
creationTimestamp: "2019-12-03T04:43:10Z" | |
labels: | |
kube-aggregator.kubernetes.io/automanaged: onstart | |
name: v1beta1.events.k8s.io | |
resourceVersion: "27" | |
selfLink: /apis/apiregistration.k8s.io/v1/apiservices/v1beta1.events.k8s.io | |
uid: 6822b973-1587-11ea-b5af-027e0b84da98 | |
spec: | |
group: events.k8s.io | |
groupPriorityMinimum: 17750 | |
service: null | |
version: v1beta1 | |
versionPriority: 5 | |
status: | |
conditions: | |
- lastTransitionTime: "2019-12-03T04:43:10Z" | |
message: Local APIServices are always available | |
reason: Local | |
status: "True" | |
type: Available | |
- apiVersion: apiregistration.k8s.io/v1 | |
kind: APIService | |
metadata: | |
creationTimestamp: "2019-12-03T04:43:10Z" | |
labels: | |
kube-aggregator.kubernetes.io/automanaged: onstart | |
name: v1beta1.extensions | |
resourceVersion: "29" | |
selfLink: /apis/apiregistration.k8s.io/v1/apiservices/v1beta1.extensions | |
uid: 68230893-1587-11ea-b5af-027e0b84da98 | |
spec: | |
group: extensions | |
groupPriorityMinimum: 17900 | |
service: null | |
version: v1beta1 | |
versionPriority: 1 | |
status: | |
conditions: | |
- lastTransitionTime: "2019-12-03T04:43:10Z" | |
message: Local APIServices are always available | |
reason: Local | |
status: "True" | |
type: Available | |
- apiVersion: apiregistration.k8s.io/v1 | |
kind: APIService | |
metadata: | |
creationTimestamp: "2019-12-03T04:43:10Z" | |
labels: | |
kube-aggregator.kubernetes.io/automanaged: onstart | |
name: v1beta1.networking.k8s.io | |
resourceVersion: "31" | |
selfLink: /apis/apiregistration.k8s.io/v1/apiservices/v1beta1.networking.k8s.io | |
uid: 6823fc41-1587-11ea-b5af-027e0b84da98 | |
spec: | |
group: networking.k8s.io | |
groupPriorityMinimum: 17200 | |
service: null | |
version: v1beta1 | |
versionPriority: 9 | |
status: | |
conditions: | |
- lastTransitionTime: "2019-12-03T04:43:10Z" | |
message: Local APIServices are always available | |
reason: Local | |
status: "True" | |
type: Available | |
- apiVersion: apiregistration.k8s.io/v1 | |
kind: APIService | |
metadata: | |
creationTimestamp: "2019-12-03T04:43:10Z" | |
labels: | |
kube-aggregator.kubernetes.io/automanaged: onstart | |
name: v1beta1.node.k8s.io | |
resourceVersion: "32" | |
selfLink: /apis/apiregistration.k8s.io/v1/apiservices/v1beta1.node.k8s.io | |
uid: 68245203-1587-11ea-b5af-027e0b84da98 | |
spec: | |
group: node.k8s.io | |
groupPriorityMinimum: 16300 | |
service: null | |
version: v1beta1 | |
versionPriority: 9 | |
status: | |
conditions: | |
- lastTransitionTime: "2019-12-03T04:43:10Z" | |
message: Local APIServices are always available | |
reason: Local | |
status: "True" | |
type: Available | |
- apiVersion: apiregistration.k8s.io/v1 | |
kind: APIService | |
metadata: | |
creationTimestamp: "2019-12-03T04:43:10Z" | |
labels: | |
kube-aggregator.kubernetes.io/automanaged: onstart | |
name: v1beta1.policy | |
resourceVersion: "35" | |
selfLink: /apis/apiregistration.k8s.io/v1/apiservices/v1beta1.policy | |
uid: 68247fda-1587-11ea-b5af-027e0b84da98 | |
spec: | |
group: policy | |
groupPriorityMinimum: 17100 | |
service: null | |
version: v1beta1 | |
versionPriority: 9 | |
status: | |
conditions: | |
- lastTransitionTime: "2019-12-03T04:43:10Z" | |
message: Local APIServices are always available | |
reason: Local | |
status: "True" | |
type: Available | |
- apiVersion: apiregistration.k8s.io/v1 | |
kind: APIService | |
metadata: | |
creationTimestamp: "2019-12-03T04:43:10Z" | |
labels: | |
kube-aggregator.kubernetes.io/automanaged: onstart | |
name: v1beta1.rbac.authorization.k8s.io | |
resourceVersion: "34" | |
selfLink: /apis/apiregistration.k8s.io/v1/apiservices/v1beta1.rbac.authorization.k8s.io | |
uid: 682476d0-1587-11ea-b5af-027e0b84da98 | |
spec: | |
group: rbac.authorization.k8s.io | |
groupPriorityMinimum: 17000 | |
service: null | |
version: v1beta1 | |
versionPriority: 12 | |
status: | |
conditions: | |
- lastTransitionTime: "2019-12-03T04:43:10Z" | |
message: Local APIServices are always available | |
reason: Local | |
status: "True" | |
type: Available | |
- apiVersion: apiregistration.k8s.io/v1 | |
kind: APIService | |
metadata: | |
creationTimestamp: "2019-12-03T04:43:10Z" | |
labels: | |
kube-aggregator.kubernetes.io/automanaged: onstart | |
name: v1beta1.scheduling.k8s.io | |
resourceVersion: "38" | |
selfLink: /apis/apiregistration.k8s.io/v1/apiservices/v1beta1.scheduling.k8s.io | |
uid: 682652eb-1587-11ea-b5af-027e0b84da98 | |
spec: | |
group: scheduling.k8s.io | |
groupPriorityMinimum: 16600 | |
service: null | |
version: v1beta1 | |
versionPriority: 12 | |
status: | |
conditions: | |
- lastTransitionTime: "2019-12-03T04:43:10Z" | |
message: Local APIServices are always available | |
reason: Local | |
status: "True" | |
type: Available | |
- apiVersion: apiregistration.k8s.io/v1 | |
kind: APIService | |
metadata: | |
creationTimestamp: "2019-12-03T04:51:50Z" | |
labels: | |
kube-aggregator.kubernetes.io/automanaged: "true" | |
name: v1beta1.security.istio.io | |
resourceVersion: "1424" | |
selfLink: /apis/apiregistration.k8s.io/v1/apiservices/v1beta1.security.istio.io | |
uid: 9e227df6-1588-11ea-b5af-027e0b84da98 | |
spec: | |
group: security.istio.io | |
groupPriorityMinimum: 1000 | |
service: null | |
version: v1beta1 | |
versionPriority: 100 | |
status: | |
conditions: | |
- lastTransitionTime: "2019-12-03T04:51:50Z" | |
message: Local APIServices are always available | |
reason: Local | |
status: "True" | |
type: Available | |
- apiVersion: apiregistration.k8s.io/v1 | |
kind: APIService | |
metadata: | |
creationTimestamp: "2019-12-03T10:54:07Z" | |
labels: | |
kube-aggregator.kubernetes.io/automanaged: "true" | |
name: v1beta1.serving.knative.dev | |
resourceVersion: "43823" | |
selfLink: /apis/apiregistration.k8s.io/v1/apiservices/v1beta1.serving.knative.dev | |
uid: 3aa286f1-15bb-11ea-b5af-027e0b84da98 | |
spec: | |
group: serving.knative.dev | |
groupPriorityMinimum: 1000 | |
service: null | |
version: v1beta1 | |
versionPriority: 100 | |
status: | |
conditions: | |
- lastTransitionTime: "2019-12-03T10:54:07Z" | |
message: Local APIServices are always available | |
reason: Local | |
status: "True" | |
type: Available | |
- apiVersion: apiregistration.k8s.io/v1 | |
kind: APIService | |
metadata: | |
creationTimestamp: "2019-12-03T04:43:10Z" | |
labels: | |
kube-aggregator.kubernetes.io/automanaged: onstart | |
name: v1beta1.storage.k8s.io | |
resourceVersion: "39" | |
selfLink: /apis/apiregistration.k8s.io/v1/apiservices/v1beta1.storage.k8s.io | |
uid: 68272926-1587-11ea-b5af-027e0b84da98 | |
spec: | |
group: storage.k8s.io | |
groupPriorityMinimum: 16800 | |
service: null | |
version: v1beta1 | |
versionPriority: 9 | |
status: | |
conditions: | |
- lastTransitionTime: "2019-12-03T04:43:10Z" | |
message: Local APIServices are always available | |
reason: Local | |
status: "True" | |
type: Available | |
- apiVersion: apiregistration.k8s.io/v1 | |
kind: APIService | |
metadata: | |
creationTimestamp: "2019-12-03T04:43:09Z" | |
labels: | |
kube-aggregator.kubernetes.io/automanaged: onstart | |
name: v1beta2.apps | |
resourceVersion: "15" | |
selfLink: /apis/apiregistration.k8s.io/v1/apiservices/v1beta2.apps | |
uid: 681fba23-1587-11ea-b5af-027e0b84da98 | |
spec: | |
group: apps | |
groupPriorityMinimum: 17800 | |
service: null | |
version: v1beta2 | |
versionPriority: 9 | |
status: | |
conditions: | |
- lastTransitionTime: "2019-12-03T04:43:09Z" | |
message: Local APIServices are always available | |
reason: Local | |
status: "True" | |
type: Available | |
- apiVersion: apiregistration.k8s.io/v1 | |
kind: APIService | |
metadata: | |
creationTimestamp: "2019-12-03T04:43:10Z" | |
labels: | |
kube-aggregator.kubernetes.io/automanaged: onstart | |
name: v2beta1.autoscaling | |
resourceVersion: "22" | |
selfLink: /apis/apiregistration.k8s.io/v1/apiservices/v2beta1.autoscaling | |
uid: 68217e87-1587-11ea-b5af-027e0b84da98 | |
spec: | |
group: autoscaling | |
groupPriorityMinimum: 17500 | |
service: null | |
version: v2beta1 | |
versionPriority: 9 | |
status: | |
conditions: | |
- lastTransitionTime: "2019-12-03T04:43:10Z" | |
message: Local APIServices are always available | |
reason: Local | |
status: "True" | |
type: Available | |
- apiVersion: apiregistration.k8s.io/v1 | |
kind: APIService | |
metadata: | |
creationTimestamp: "2019-12-03T04:43:10Z" | |
labels: | |
kube-aggregator.kubernetes.io/automanaged: onstart | |
name: v2beta2.autoscaling | |
resourceVersion: "21" | |
selfLink: /apis/apiregistration.k8s.io/v1/apiservices/v2beta2.autoscaling | |
uid: 68219048-1587-11ea-b5af-027e0b84da98 | |
spec: | |
group: autoscaling | |
groupPriorityMinimum: 17500 | |
service: null | |
version: v2beta2 | |
versionPriority: 1 | |
status: | |
conditions: | |
- lastTransitionTime: "2019-12-03T04:43:10Z" | |
message: Local APIServices are always available | |
reason: Local | |
status: "True" | |
type: Available | |
kind: List | |
metadata: | |
resourceVersion: "" | |
selfLink: "" | |
------- | |
resource: controllerrevisions | |
------- | |
apiVersion: v1 | |
items: [] | |
kind: List | |
metadata: | |
resourceVersion: "" | |
selfLink: "" | |
------- | |
resource: daemonsets | |
------- | |
apiVersion: v1 | |
items: [] | |
kind: List | |
metadata: | |
resourceVersion: "" | |
selfLink: "" | |
------- | |
resource: deployments | |
------- | |
apiVersion: v1 | |
items: | |
- apiVersion: extensions/v1beta1 | |
kind: Deployment | |
metadata: | |
annotations: | |
deployment.kubernetes.io/revision: "1" | |
kubectl.kubernetes.io/last-applied-configuration: | | |
{"apiVersion":"apps/v1","kind":"Deployment","metadata":{"annotations":{},"labels":{"serving.knative.dev/release":"devel"},"name":"activator","namespace":"knative-serving"},"spec":{"selector":{"matchLabels":{"app":"activator","role":"activator"}},"template":{"metadata":{"annotations":{"cluster-autoscaler.kubernetes.io/safe-to-evict":"false","sidecar.istio.io/inject":"true"},"labels":{"app":"activator","role":"activator","serving.knative.dev/release":"devel"}},"spec":{"containers":[{"env":[{"name":"POD_NAME","valueFrom":{"fieldRef":{"fieldPath":"metadata.name"}}},{"name":"POD_IP","valueFrom":{"fieldRef":{"fieldPath":"status.podIP"}}},{"name":"SYSTEM_NAMESPACE","valueFrom":{"fieldRef":{"fieldPath":"metadata.namespace"}}},{"name":"CONFIG_LOGGING_NAME","value":"config-logging"},{"name":"CONFIG_OBSERVABILITY_NAME","value":"config-observability"},{"name":"METRICS_DOMAIN","value":"knative.dev/internal/serving"}],"image":"gcr.io/gcp-compute-engine-223401/activator-ecd51ca5034883acbe737fde417a3d86@sha256:b2257a5f6e2427a5a96f6ea9ca2b652ee648e131e9a699df6e20b4bcfa4ef940","livenessProbe":{"httpGet":{"httpHeaders":[{"name":"k-kubelet-probe","value":"activator"}],"path":"/healthz","port":8012}},"name":"activator","ports":[{"containerPort":8012,"name":"http1"},{"containerPort":8013,"name":"h2c"},{"containerPort":9090,"name":"metrics"},{"containerPort":8008,"name":"profiling"}],"readinessProbe":{"httpGet":{"httpHeaders":[{"name":"k-kubelet-probe","value":"activator"}],"path":"/healthz","port":8012}},"resources":{"limits":{"cpu":"1000m","memory":"600Mi"},"requests":{"cpu":"300m","memory":"60Mi"}},"securityContext":{"allowPrivilegeEscalation":false}}],"serviceAccountName":"controller","terminationGracePeriodSeconds":300}}}} | |
creationTimestamp: "2019-12-03T10:54:22Z" | |
generation: 1 | |
labels: | |
serving.knative.dev/release: devel | |
name: activator | |
namespace: knative-serving | |
resourceVersion: "55014" | |
selfLink: /apis/extensions/v1beta1/namespaces/knative-serving/deployments/activator | |
uid: 437f3440-15bb-11ea-b5af-027e0b84da98 | |
spec: | |
progressDeadlineSeconds: 600 | |
replicas: 1 | |
revisionHistoryLimit: 10 | |
selector: | |
matchLabels: | |
app: activator | |
role: activator | |
strategy: | |
rollingUpdate: | |
maxSurge: 25% | |
maxUnavailable: 25% | |
type: RollingUpdate | |
template: | |
metadata: | |
annotations: | |
cluster-autoscaler.kubernetes.io/safe-to-evict: "false" | |
sidecar.istio.io/inject: "true" | |
creationTimestamp: null | |
labels: | |
app: activator | |
role: activator | |
serving.knative.dev/release: devel | |
spec: | |
containers: | |
- env: | |
- name: POD_NAME | |
valueFrom: | |
fieldRef: | |
apiVersion: v1 | |
fieldPath: metadata.name | |
- name: POD_IP | |
valueFrom: | |
fieldRef: | |
apiVersion: v1 | |
fieldPath: status.podIP | |
- name: SYSTEM_NAMESPACE | |
valueFrom: | |
fieldRef: | |
apiVersion: v1 | |
fieldPath: metadata.namespace | |
- name: CONFIG_LOGGING_NAME | |
value: config-logging | |
- name: CONFIG_OBSERVABILITY_NAME | |
value: config-observability | |
- name: METRICS_DOMAIN | |
value: knative.dev/internal/serving | |
image: gcr.io/gcp-compute-engine-223401/activator-ecd51ca5034883acbe737fde417a3d86@sha256:b2257a5f6e2427a5a96f6ea9ca2b652ee648e131e9a699df6e20b4bcfa4ef940 | |
imagePullPolicy: IfNotPresent | |
livenessProbe: | |
failureThreshold: 3 | |
httpGet: | |
httpHeaders: | |
- name: k-kubelet-probe | |
value: activator | |
path: /healthz | |
port: 8012 | |
scheme: HTTP | |
periodSeconds: 10 | |
successThreshold: 1 | |
timeoutSeconds: 1 | |
name: activator | |
ports: | |
- containerPort: 8012 | |
name: http1 | |
protocol: TCP | |
- containerPort: 8013 | |
name: h2c | |
protocol: TCP | |
- containerPort: 9090 | |
name: metrics | |
protocol: TCP | |
- containerPort: 8008 | |
name: profiling | |
protocol: TCP | |
readinessProbe: | |
failureThreshold: 3 | |
httpGet: | |
httpHeaders: | |
- name: k-kubelet-probe | |
value: activator | |
path: /healthz | |
port: 8012 | |
scheme: HTTP | |
periodSeconds: 10 | |
successThreshold: 1 | |
timeoutSeconds: 1 | |
resources: | |
limits: | |
cpu: "1" | |
memory: 600Mi | |
requests: | |
cpu: 300m | |
memory: 60Mi | |
securityContext: | |
allowPrivilegeEscalation: false | |
terminationMessagePath: /dev/termination-log | |
terminationMessagePolicy: File | |
dnsPolicy: ClusterFirst | |
restartPolicy: Always | |
schedulerName: default-scheduler | |
securityContext: {} | |
serviceAccount: controller | |
serviceAccountName: controller | |
terminationGracePeriodSeconds: 300 | |
status: | |
availableReplicas: 1 | |
conditions: | |
- lastTransitionTime: "2019-12-03T10:54:22Z" | |
lastUpdateTime: "2019-12-03T10:54:55Z" | |
message: ReplicaSet "activator-6f94df488" has successfully progressed. | |
reason: NewReplicaSetAvailable | |
status: "True" | |
type: Progressing | |
- lastTransitionTime: "2019-12-03T12:24:09Z" | |
lastUpdateTime: "2019-12-03T12:24:09Z" | |
message: Deployment has minimum availability. | |
reason: MinimumReplicasAvailable | |
status: "True" | |
type: Available | |
observedGeneration: 1 | |
readyReplicas: 1 | |
replicas: 1 | |
updatedReplicas: 1 | |
- apiVersion: extensions/v1beta1 | |
kind: Deployment | |
metadata: | |
annotations: | |
deployment.kubernetes.io/revision: "1" | |
kubectl.kubernetes.io/last-applied-configuration: | | |
{"apiVersion":"apps/v1","kind":"Deployment","metadata":{"annotations":{},"labels":{"serving.knative.dev/release":"devel"},"name":"autoscaler","namespace":"knative-serving"},"spec":{"replicas":1,"selector":{"matchLabels":{"app":"autoscaler"}},"template":{"metadata":{"annotations":{"cluster-autoscaler.kubernetes.io/safe-to-evict":"false","sidecar.istio.io/inject":"true","traffic.sidecar.istio.io/includeInboundPorts":"8080,9090"},"labels":{"app":"autoscaler","serving.knative.dev/release":"devel"}},"spec":{"containers":[{"args":["--secure-port=8443","--cert-dir=/tmp"],"env":[{"name":"SYSTEM_NAMESPACE","valueFrom":{"fieldRef":{"fieldPath":"metadata.namespace"}}},{"name":"CONFIG_LOGGING_NAME","value":"config-logging"},{"name":"CONFIG_OBSERVABILITY_NAME","value":"config-observability"},{"name":"METRICS_DOMAIN","value":"knative.dev/serving"}],"image":"gcr.io/gcp-compute-engine-223401/autoscaler-12c0fa24db31956a7cfa673210e4fa13@sha256:f74987342b3c7bcb8b95006f98a8efcfa19bd518430844df037cd5f29132c997","livenessProbe":{"httpGet":{"httpHeaders":[{"name":"k-kubelet-probe","value":"autoscaler"}],"path":"/healthz","port":8080}},"name":"autoscaler","ports":[{"containerPort":8080,"name":"websocket"},{"containerPort":9090,"name":"metrics"},{"containerPort":8443,"name":"custom-metrics"},{"containerPort":8008,"name":"profiling"}],"readinessProbe":{"httpGet":{"httpHeaders":[{"name":"k-kubelet-probe","value":"autoscaler"}],"path":"/healthz","port":8080}},"resources":{"limits":{"cpu":"300m","memory":"400Mi"},"requests":{"cpu":"30m","memory":"40Mi"}},"securityContext":{"allowPrivilegeEscalation":false}}],"serviceAccountName":"controller"}}}} | |
creationTimestamp: "2019-12-03T10:54:23Z" | |
generation: 1 | |
labels: | |
serving.knative.dev/release: devel | |
name: autoscaler | |
namespace: knative-serving | |
resourceVersion: "54916" | |
selfLink: /apis/extensions/v1beta1/namespaces/knative-serving/deployments/autoscaler | |
uid: 44426376-15bb-11ea-b5af-027e0b84da98 | |
spec: | |
progressDeadlineSeconds: 600 | |
replicas: 1 | |
revisionHistoryLimit: 10 | |
selector: | |
matchLabels: | |
app: autoscaler | |
strategy: | |
rollingUpdate: | |
maxSurge: 25% | |
maxUnavailable: 25% | |
type: RollingUpdate | |
template: | |
metadata: | |
annotations: | |
cluster-autoscaler.kubernetes.io/safe-to-evict: "false" | |
sidecar.istio.io/inject: "true" | |
traffic.sidecar.istio.io/includeInboundPorts: 8080,9090 | |
creationTimestamp: null | |
labels: | |
app: autoscaler | |
serving.knative.dev/release: devel | |
spec: | |
containers: | |
- args: | |
- --secure-port=8443 | |
- --cert-dir=/tmp | |
env: | |
- name: SYSTEM_NAMESPACE | |
valueFrom: | |
fieldRef: | |
apiVersion: v1 | |
fieldPath: metadata.namespace | |
- name: CONFIG_LOGGING_NAME | |
value: config-logging | |
- name: CONFIG_OBSERVABILITY_NAME | |
value: config-observability | |
- name: METRICS_DOMAIN | |
value: knative.dev/serving | |
image: gcr.io/gcp-compute-engine-223401/autoscaler-12c0fa24db31956a7cfa673210e4fa13@sha256:f74987342b3c7bcb8b95006f98a8efcfa19bd518430844df037cd5f29132c997 | |
imagePullPolicy: IfNotPresent | |
livenessProbe: | |
failureThreshold: 3 | |
httpGet: | |
httpHeaders: | |
- name: k-kubelet-probe | |
value: autoscaler | |
path: /healthz | |
port: 8080 | |
scheme: HTTP | |
periodSeconds: 10 | |
successThreshold: 1 | |
timeoutSeconds: 1 | |
name: autoscaler | |
ports: | |
- containerPort: 8080 | |
name: websocket | |
protocol: TCP | |
- containerPort: 9090 | |
name: metrics | |
protocol: TCP | |
- containerPort: 8443 | |
name: custom-metrics | |
protocol: TCP | |
- containerPort: 8008 | |
name: profiling | |
protocol: TCP | |
readinessProbe: | |
failureThreshold: 3 | |
httpGet: | |
httpHeaders: | |
- name: k-kubelet-probe | |
value: autoscaler | |
path: /healthz | |
port: 8080 | |
scheme: HTTP | |
periodSeconds: 10 | |
successThreshold: 1 | |
timeoutSeconds: 1 | |
resources: | |
limits: | |
cpu: 300m | |
memory: 400Mi | |
requests: | |
cpu: 30m | |
memory: 40Mi | |
securityContext: | |
allowPrivilegeEscalation: false | |
terminationMessagePath: /dev/termination-log | |
terminationMessagePolicy: File | |
dnsPolicy: ClusterFirst | |
restartPolicy: Always | |
schedulerName: default-scheduler | |
securityContext: {} | |
serviceAccount: controller | |
serviceAccountName: controller | |
terminationGracePeriodSeconds: 30 | |
status: | |
availableReplicas: 1 | |
conditions: | |
- lastTransitionTime: "2019-12-03T10:54:23Z" | |
lastUpdateTime: "2019-12-03T10:54:30Z" | |
message: ReplicaSet "autoscaler-698bf65564" has successfully progressed. | |
reason: NewReplicaSetAvailable | |
status: "True" | |
type: Progressing | |
- lastTransitionTime: "2019-12-03T12:23:43Z" | |
lastUpdateTime: "2019-12-03T12:23:43Z" | |
message: Deployment has minimum availability. | |
reason: MinimumReplicasAvailable | |
status: "True" | |
type: Available | |
observedGeneration: 1 | |
readyReplicas: 1 | |
replicas: 1 | |
updatedReplicas: 1 | |
- apiVersion: extensions/v1beta1 | |
kind: Deployment | |
metadata: | |
annotations: | |
deployment.kubernetes.io/revision: "1" | |
kubectl.kubernetes.io/last-applied-configuration: | | |
{"apiVersion":"apps/v1","kind":"Deployment","metadata":{"annotations":{},"labels":{"autoscaling.knative.dev/autoscaler-provider":"hpa","serving.knative.dev/release":"devel"},"name":"autoscaler-hpa","namespace":"knative-serving"},"spec":{"replicas":1,"selector":{"matchLabels":{"app":"autoscaler-hpa"}},"template":{"metadata":{"annotations":{"sidecar.istio.io/inject":"false"},"labels":{"app":"autoscaler-hpa","serving.knative.dev/release":"devel"}},"spec":{"containers":[{"env":[{"name":"SYSTEM_NAMESPACE","valueFrom":{"fieldRef":{"fieldPath":"metadata.namespace"}}},{"name":"CONFIG_LOGGING_NAME","value":"config-logging"},{"name":"CONFIG_OBSERVABILITY_NAME","value":"config-observability"},{"name":"METRICS_DOMAIN","value":"knative.dev/serving"}],"image":"gcr.io/gcp-compute-engine-223401/autoscaler-hpa-85c0b68178743d74ff7f663a72802ceb@sha256:24e81ede4cc223f0f70a1630fc4bed30308eb7b406715dbdd2280827f7565eec","name":"autoscaler-hpa","ports":[{"containerPort":9090,"name":"metrics"},{"containerPort":8008,"name":"profiling"}],"resources":{"limits":{"cpu":"1000m","memory":"1000Mi"},"requests":{"cpu":"100m","memory":"100Mi"}},"securityContext":{"allowPrivilegeEscalation":false}}],"serviceAccountName":"controller"}}}} | |
creationTimestamp: "2019-12-03T10:54:23Z" | |
generation: 1 | |
labels: | |
autoscaling.knative.dev/autoscaler-provider: hpa | |
serving.knative.dev/release: devel | |
name: autoscaler-hpa | |
namespace: knative-serving | |
resourceVersion: "54625" | |
selfLink: /apis/extensions/v1beta1/namespaces/knative-serving/deployments/autoscaler-hpa | |
uid: 43f4e7cf-15bb-11ea-b5af-027e0b84da98 | |
spec: | |
progressDeadlineSeconds: 600 | |
replicas: 1 | |
revisionHistoryLimit: 10 | |
selector: | |
matchLabels: | |
app: autoscaler-hpa | |
strategy: | |
rollingUpdate: | |
maxSurge: 25% | |
maxUnavailable: 25% | |
type: RollingUpdate | |
template: | |
metadata: | |
annotations: | |
sidecar.istio.io/inject: "false" | |
creationTimestamp: null | |
labels: | |
app: autoscaler-hpa | |
serving.knative.dev/release: devel | |
spec: | |
containers: | |
- env: | |
- name: SYSTEM_NAMESPACE | |
valueFrom: | |
fieldRef: | |
apiVersion: v1 | |
fieldPath: metadata.namespace | |
- name: CONFIG_LOGGING_NAME | |
value: config-logging | |
- name: CONFIG_OBSERVABILITY_NAME | |
value: config-observability | |
- name: METRICS_DOMAIN | |
value: knative.dev/serving | |
image: gcr.io/gcp-compute-engine-223401/autoscaler-hpa-85c0b68178743d74ff7f663a72802ceb@sha256:24e81ede4cc223f0f70a1630fc4bed30308eb7b406715dbdd2280827f7565eec | |
imagePullPolicy: IfNotPresent | |
name: autoscaler-hpa | |
ports: | |
- containerPort: 9090 | |
name: metrics | |
protocol: TCP | |
- containerPort: 8008 | |
name: profiling | |
protocol: TCP | |
resources: | |
limits: | |
cpu: "1" | |
memory: 1000Mi | |
requests: | |
cpu: 100m | |
memory: 100Mi | |
securityContext: | |
allowPrivilegeEscalation: false | |
terminationMessagePath: /dev/termination-log | |
terminationMessagePolicy: File | |
dnsPolicy: ClusterFirst | |
restartPolicy: Always | |
schedulerName: default-scheduler | |
securityContext: {} | |
serviceAccount: controller | |
serviceAccountName: controller | |
terminationGracePeriodSeconds: 30 | |
status: | |
availableReplicas: 1 | |
conditions: | |
- lastTransitionTime: "2019-12-03T10:54:23Z" | |
lastUpdateTime: "2019-12-03T10:54:28Z" | |
message: ReplicaSet "autoscaler-hpa-555cf99b79" has successfully progressed. | |
reason: NewReplicaSetAvailable | |
status: "True" | |
type: Progressing | |
- lastTransitionTime: "2019-12-03T12:23:16Z" | |
lastUpdateTime: "2019-12-03T12:23:16Z" | |
message: Deployment has minimum availability. | |
reason: MinimumReplicasAvailable | |
status: "True" | |
type: Available | |
observedGeneration: 1 | |
readyReplicas: 1 | |
replicas: 1 | |
updatedReplicas: 1 | |
- apiVersion: extensions/v1beta1 | |
kind: Deployment | |
metadata: | |
annotations: | |
deployment.kubernetes.io/revision: "1" | |
kubectl.kubernetes.io/last-applied-configuration: | | |
{"apiVersion":"apps/v1","kind":"Deployment","metadata":{"annotations":{},"labels":{"serving.knative.dev/release":"devel"},"name":"controller","namespace":"knative-serving"},"spec":{"replicas":1,"selector":{"matchLabels":{"app":"controller"}},"template":{"metadata":{"annotations":{"sidecar.istio.io/inject":"false"},"labels":{"app":"controller","serving.knative.dev/release":"devel"}},"spec":{"containers":[{"env":[{"name":"SYSTEM_NAMESPACE","valueFrom":{"fieldRef":{"fieldPath":"metadata.namespace"}}},{"name":"CONFIG_LOGGING_NAME","value":"config-logging"},{"name":"CONFIG_OBSERVABILITY_NAME","value":"config-observability"},{"name":"METRICS_DOMAIN","value":"knative.dev/internal/serving"}],"image":"gcr.io/gcp-compute-engine-223401/controller-f6fdb41c6acbc726e29a3104ff2ef720@sha256:7cde59d7e5e3f7891b57fb51ade68929b5220df54b70dc027a62018c54fe23d3","name":"controller","ports":[{"containerPort":9090,"name":"metrics"},{"containerPort":8008,"name":"profiling"}],"resources":{"limits":{"cpu":"1000m","memory":"1000Mi"},"requests":{"cpu":"100m","memory":"100Mi"}},"securityContext":{"allowPrivilegeEscalation":false}}],"serviceAccountName":"controller"}}}} | |
creationTimestamp: "2019-12-03T10:54:26Z" | |
generation: 1 | |
labels: | |
serving.knative.dev/release: devel | |
name: controller | |
namespace: knative-serving | |
resourceVersion: "54610" | |
selfLink: /apis/extensions/v1beta1/namespaces/knative-serving/deployments/controller | |
uid: 46218794-15bb-11ea-b5af-027e0b84da98 | |
spec: | |
progressDeadlineSeconds: 600 | |
replicas: 1 | |
revisionHistoryLimit: 10 | |
selector: | |
matchLabels: | |
app: controller | |
strategy: | |
rollingUpdate: | |
maxSurge: 25% | |
maxUnavailable: 25% | |
type: RollingUpdate | |
template: | |
metadata: | |
annotations: | |
sidecar.istio.io/inject: "false" | |
creationTimestamp: null | |
labels: | |
app: controller | |
serving.knative.dev/release: devel | |
spec: | |
containers: | |
- env: | |
- name: SYSTEM_NAMESPACE | |
valueFrom: | |
fieldRef: | |
apiVersion: v1 | |
fieldPath: metadata.namespace | |
- name: CONFIG_LOGGING_NAME | |
value: config-logging | |
- name: CONFIG_OBSERVABILITY_NAME | |
value: config-observability | |
- name: METRICS_DOMAIN | |
value: knative.dev/internal/serving | |
image: gcr.io/gcp-compute-engine-223401/controller-f6fdb41c6acbc726e29a3104ff2ef720@sha256:7cde59d7e5e3f7891b57fb51ade68929b5220df54b70dc027a62018c54fe23d3 | |
imagePullPolicy: IfNotPresent | |
name: controller | |
ports: | |
- containerPort: 9090 | |
name: metrics | |
protocol: TCP | |
- containerPort: 8008 | |
name: profiling | |
protocol: TCP | |
resources: | |
limits: | |
cpu: "1" | |
memory: 1000Mi | |
requests: | |
cpu: 100m | |
memory: 100Mi | |
securityContext: | |
allowPrivilegeEscalation: false | |
terminationMessagePath: /dev/termination-log | |
terminationMessagePolicy: File | |
dnsPolicy: ClusterFirst | |
restartPolicy: Always | |
schedulerName: default-scheduler | |
securityContext: {} | |
serviceAccount: controller | |
serviceAccountName: controller | |
terminationGracePeriodSeconds: 30 | |
status: | |
availableReplicas: 1 | |
conditions: | |
- lastTransitionTime: "2019-12-03T10:54:26Z" | |
lastUpdateTime: "2019-12-03T10:54:28Z" | |
message: ReplicaSet "controller-7667dd8fcb" has successfully progressed. | |
reason: NewReplicaSetAvailable | |
status: "True" | |
type: Progressing | |
- lastTransitionTime: "2019-12-03T12:23:14Z" | |
lastUpdateTime: "2019-12-03T12:23:14Z" | |
message: Deployment has minimum availability. | |
reason: MinimumReplicasAvailable | |
status: "True" | |
type: Available | |
observedGeneration: 1 | |
readyReplicas: 1 | |
replicas: 1 | |
updatedReplicas: 1 | |
- apiVersion: extensions/v1beta1 | |
kind: Deployment | |
metadata: | |
annotations: | |
deployment.kubernetes.io/revision: "1" | |
kubectl.kubernetes.io/last-applied-configuration: | | |
{"apiVersion":"apps/v1","kind":"Deployment","metadata":{"annotations":{},"labels":{"networking.knative.dev/certificate-provider":"cert-manager","serving.knative.dev/release":"devel"},"name":"networking-certmanager","namespace":"knative-serving"},"spec":{"replicas":1,"selector":{"matchLabels":{"app":"networking-certmanager"}},"template":{"metadata":{"annotations":{"sidecar.istio.io/inject":"false"},"labels":{"app":"networking-certmanager","serving.knative.dev/release":"devel"}},"spec":{"containers":[{"env":[{"name":"SYSTEM_NAMESPACE","valueFrom":{"fieldRef":{"fieldPath":"metadata.namespace"}}},{"name":"CONFIG_LOGGING_NAME","value":"config-logging"},{"name":"CONFIG_OBSERVABILITY_NAME","value":"config-observability"},{"name":"METRICS_DOMAIN","value":"knative.dev/serving"}],"image":"gcr.io/gcp-compute-engine-223401/certmanager-f79b5bfeb092d099f0f3326024a30ebb@sha256:9f7622fd03d96c3262e71b4f6fb14455145041c81950b3efe10010c122974bed","name":"networking-certmanager","ports":[{"containerPort":9090,"name":"metrics"},{"containerPort":8008,"name":"profiling"}],"resources":{"limits":{"cpu":"1000m","memory":"1000Mi"},"requests":{"cpu":"100m","memory":"100Mi"}},"securityContext":{"allowPrivilegeEscalation":false}}],"serviceAccountName":"controller"}}}} | |
creationTimestamp: "2019-12-03T10:54:27Z" | |
generation: 1 | |
labels: | |
networking.knative.dev/certificate-provider: cert-manager | |
serving.knative.dev/release: devel | |
name: networking-certmanager | |
namespace: knative-serving | |
resourceVersion: "54593" | |
selfLink: /apis/extensions/v1beta1/namespaces/knative-serving/deployments/networking-certmanager | |
uid: 46656e72-15bb-11ea-b5af-027e0b84da98 | |
spec: | |
progressDeadlineSeconds: 600 | |
replicas: 1 | |
revisionHistoryLimit: 10 | |
selector: | |
matchLabels: | |
app: networking-certmanager | |
strategy: | |
rollingUpdate: | |
maxSurge: 25% | |
maxUnavailable: 25% | |
type: RollingUpdate | |
template: | |
metadata: | |
annotations: | |
sidecar.istio.io/inject: "false" | |
creationTimestamp: null | |
labels: | |
app: networking-certmanager | |
serving.knative.dev/release: devel | |
spec: | |
containers: | |
- env: | |
- name: SYSTEM_NAMESPACE | |
valueFrom: | |
fieldRef: | |
apiVersion: v1 | |
fieldPath: metadata.namespace | |
- name: CONFIG_LOGGING_NAME | |
value: config-logging | |
- name: CONFIG_OBSERVABILITY_NAME | |
value: config-observability | |
- name: METRICS_DOMAIN | |
value: knative.dev/serving | |
image: gcr.io/gcp-compute-engine-223401/certmanager-f79b5bfeb092d099f0f3326024a30ebb@sha256:9f7622fd03d96c3262e71b4f6fb14455145041c81950b3efe10010c122974bed | |
imagePullPolicy: IfNotPresent | |
name: networking-certmanager | |
ports: | |
- containerPort: 9090 | |
name: metrics | |
protocol: TCP | |
- containerPort: 8008 | |
name: profiling | |
protocol: TCP | |
resources: | |
limits: | |
cpu: "1" | |
memory: 1000Mi | |
requests: | |
cpu: 100m | |
memory: 100Mi | |
securityContext: | |
allowPrivilegeEscalation: false | |
terminationMessagePath: /dev/termination-log | |
terminationMessagePolicy: File | |
dnsPolicy: ClusterFirst | |
restartPolicy: Always | |
schedulerName: default-scheduler | |
securityContext: {} | |
serviceAccount: controller | |
serviceAccountName: controller | |
terminationGracePeriodSeconds: 30 | |
status: | |
availableReplicas: 1 | |
conditions: | |
- lastTransitionTime: "2019-12-03T10:54:27Z" | |
lastUpdateTime: "2019-12-03T10:54:33Z" | |
message: ReplicaSet "networking-certmanager-6794bcc848" has successfully progressed. | |
reason: NewReplicaSetAvailable | |
status: "True" | |
type: Progressing | |
- lastTransitionTime: "2019-12-03T12:23:12Z" | |
lastUpdateTime: "2019-12-03T12:23:12Z" | |
message: Deployment has minimum availability. | |
reason: MinimumReplicasAvailable | |
status: "True" | |
type: Available | |
observedGeneration: 1 | |
readyReplicas: 1 | |
replicas: 1 | |
updatedReplicas: 1 | |
- apiVersion: extensions/v1beta1 | |
kind: Deployment | |
metadata: | |
annotations: | |
deployment.kubernetes.io/revision: "1" | |
kubectl.kubernetes.io/last-applied-configuration: | | |
{"apiVersion":"apps/v1","kind":"Deployment","metadata":{"annotations":{},"labels":{"networking.knative.dev/ingress-provider":"istio","serving.knative.dev/release":"devel"},"name":"networking-istio","namespace":"knative-serving"},"spec":{"replicas":1,"selector":{"matchLabels":{"app":"networking-istio"}},"template":{"metadata":{"annotations":{"sidecar.istio.io/inject":"false"},"labels":{"app":"networking-istio","serving.knative.dev/release":"devel"}},"spec":{"containers":[{"env":[{"name":"SYSTEM_NAMESPACE","valueFrom":{"fieldRef":{"fieldPath":"metadata.namespace"}}},{"name":"CONFIG_LOGGING_NAME","value":"config-logging"},{"name":"CONFIG_OBSERVABILITY_NAME","value":"config-observability"},{"name":"METRICS_DOMAIN","value":"knative.dev/serving"}],"image":"gcr.io/gcp-compute-engine-223401/istio-c58c0c8bb8ecc80f800bb788a425ae1d@sha256:ebdb4e8832e9574311494a31ea18dc63cf903e8dd7f0651d640eb2c7f252da2a","name":"networking-istio","ports":[{"containerPort":9090,"name":"metrics"},{"containerPort":8008,"name":"profiling"}],"resources":{"limits":{"cpu":"1000m","memory":"1000Mi"},"requests":{"cpu":"100m","memory":"100Mi"}},"securityContext":{"allowPrivilegeEscalation":false}}],"serviceAccountName":"controller"}}}} | |
creationTimestamp: "2019-12-03T10:54:27Z" | |
generation: 1 | |
labels: | |
networking.knative.dev/ingress-provider: istio | |
serving.knative.dev/release: devel | |
name: networking-istio | |
namespace: knative-serving | |
resourceVersion: "54655" | |
selfLink: /apis/extensions/v1beta1/namespaces/knative-serving/deployments/networking-istio | |
uid: 468dc8fb-15bb-11ea-b5af-027e0b84da98 | |
spec: | |
progressDeadlineSeconds: 600 | |
replicas: 1 | |
revisionHistoryLimit: 10 | |
selector: | |
matchLabels: | |
app: networking-istio | |
strategy: | |
rollingUpdate: | |
maxSurge: 25% | |
maxUnavailable: 25% | |
type: RollingUpdate | |
template: | |
metadata: | |
annotations: | |
sidecar.istio.io/inject: "false" | |
creationTimestamp: null | |
labels: | |
app: networking-istio | |
serving.knative.dev/release: devel | |
spec: | |
containers: | |
- env: | |
- name: SYSTEM_NAMESPACE | |
valueFrom: | |
fieldRef: | |
apiVersion: v1 | |
fieldPath: metadata.namespace | |
- name: CONFIG_LOGGING_NAME | |
value: config-logging | |
- name: CONFIG_OBSERVABILITY_NAME | |
value: config-observability | |
- name: METRICS_DOMAIN | |
value: knative.dev/serving | |
image: gcr.io/gcp-compute-engine-223401/istio-c58c0c8bb8ecc80f800bb788a425ae1d@sha256:ebdb4e8832e9574311494a31ea18dc63cf903e8dd7f0651d640eb2c7f252da2a | |
imagePullPolicy: IfNotPresent | |
name: networking-istio | |
ports: | |
- containerPort: 9090 | |
name: metrics | |
protocol: TCP | |
- containerPort: 8008 | |
name: profiling | |
protocol: TCP | |
resources: | |
limits: | |
cpu: "1" | |
memory: 1000Mi | |
requests: | |
cpu: 100m | |
memory: 100Mi | |
securityContext: | |
allowPrivilegeEscalation: false | |
terminationMessagePath: /dev/termination-log | |
terminationMessagePolicy: File | |
dnsPolicy: ClusterFirst | |
restartPolicy: Always | |
schedulerName: default-scheduler | |
securityContext: {} | |
serviceAccount: controller | |
serviceAccountName: controller | |
terminationGracePeriodSeconds: 30 | |
status: | |
availableReplicas: 1 | |
conditions: | |
- lastTransitionTime: "2019-12-03T10:54:27Z" | |
lastUpdateTime: "2019-12-03T10:54:29Z" | |
message: ReplicaSet "networking-istio-6854cd95ff" has successfully progressed. | |
reason: NewReplicaSetAvailable | |
status: "True" | |
type: Progressing | |
- lastTransitionTime: "2019-12-03T12:23:22Z" | |
lastUpdateTime: "2019-12-03T12:23:22Z" | |
message: Deployment has minimum availability. | |
reason: MinimumReplicasAvailable | |
status: "True" | |
type: Available | |
observedGeneration: 1 | |
readyReplicas: 1 | |
replicas: 1 | |
updatedReplicas: 1 | |
- apiVersion: extensions/v1beta1 | |
kind: Deployment | |
metadata: | |
annotations: | |
deployment.kubernetes.io/revision: "1" | |
kubectl.kubernetes.io/last-applied-configuration: | | |
{"apiVersion":"apps/v1","kind":"Deployment","metadata":{"annotations":{},"labels":{"networking.knative.dev/wildcard-certificate-provider":"nscert","serving.knative.dev/release":"devel"},"name":"networking-ns-cert","namespace":"knative-serving"},"spec":{"replicas":1,"selector":{"matchLabels":{"app":"networking-ns-cert"}},"template":{"metadata":{"annotations":{"sidecar.istio.io/inject":"false"},"labels":{"app":"networking-ns-cert"}},"spec":{"containers":[{"env":[{"name":"SYSTEM_NAMESPACE","valueFrom":{"fieldRef":{"fieldPath":"metadata.namespace"}}},{"name":"CONFIG_LOGGING_NAME","value":"config-logging"},{"name":"CONFIG_OBSERVABILITY_NAME","value":"config-observability"},{"name":"METRICS_DOMAIN","value":"knative.dev/serving"}],"image":"gcr.io/gcp-compute-engine-223401/nscert-e3625dd01dcb901439f4630ab9789e75@sha256:77da0645be1369d0e56a1daa204da6de6661488eef5858a60dee9a052f02150c","name":"networking-nscert","ports":[{"containerPort":9090,"name":"metrics"}],"resources":{"limits":{"cpu":"1000m","memory":"1000Mi"},"requests":{"cpu":"100m","memory":"100Mi"}},"securityContext":{"allowPrivilegeEscalation":false}}],"serviceAccountName":"controller"}}}} | |
creationTimestamp: "2019-12-03T10:54:27Z" | |
generation: 1 | |
labels: | |
networking.knative.dev/wildcard-certificate-provider: nscert | |
serving.knative.dev/release: devel | |
name: networking-ns-cert | |
namespace: knative-serving | |
resourceVersion: "54596" | |
selfLink: /apis/extensions/v1beta1/namespaces/knative-serving/deployments/networking-ns-cert | |
uid: 46bbfd69-15bb-11ea-b5af-027e0b84da98 | |
spec: | |
progressDeadlineSeconds: 600 | |
replicas: 1 | |
revisionHistoryLimit: 10 | |
selector: | |
matchLabels: | |
app: networking-ns-cert | |
strategy: | |
rollingUpdate: | |
maxSurge: 25% | |
maxUnavailable: 25% | |
type: RollingUpdate | |
template: | |
metadata: | |
annotations: | |
sidecar.istio.io/inject: "false" | |
creationTimestamp: null | |
labels: | |
app: networking-ns-cert | |
spec: | |
containers: | |
- env: | |
- name: SYSTEM_NAMESPACE | |
valueFrom: | |
fieldRef: | |
apiVersion: v1 | |
fieldPath: metadata.namespace | |
- name: CONFIG_LOGGING_NAME | |
value: config-logging | |
- name: CONFIG_OBSERVABILITY_NAME | |
value: config-observability | |
- name: METRICS_DOMAIN | |
value: knative.dev/serving | |
image: gcr.io/gcp-compute-engine-223401/nscert-e3625dd01dcb901439f4630ab9789e75@sha256:77da0645be1369d0e56a1daa204da6de6661488eef5858a60dee9a052f02150c | |
imagePullPolicy: IfNotPresent | |
name: networking-nscert | |
ports: | |
- containerPort: 9090 | |
name: metrics | |
protocol: TCP | |
resources: | |
limits: | |
cpu: "1" | |
memory: 1000Mi | |
requests: | |
cpu: 100m | |
memory: 100Mi | |
securityContext: | |
allowPrivilegeEscalation: false | |
terminationMessagePath: /dev/termination-log | |
terminationMessagePolicy: File | |
dnsPolicy: ClusterFirst | |
restartPolicy: Always | |
schedulerName: default-scheduler | |
securityContext: {} | |
serviceAccount: controller | |
serviceAccountName: controller | |
terminationGracePeriodSeconds: 30 | |
status: | |
availableReplicas: 1 | |
conditions: | |
- lastTransitionTime: "2019-12-03T10:54:27Z" | |
lastUpdateTime: "2019-12-03T10:54:36Z" | |
message: ReplicaSet "networking-ns-cert-55d77c7656" has successfully progressed. | |
reason: NewReplicaSetAvailable | |
status: "True" | |
type: Progressing | |
- lastTransitionTime: "2019-12-03T12:23:12Z" | |
lastUpdateTime: "2019-12-03T12:23:12Z" | |
message: Deployment has minimum availability. | |
reason: MinimumReplicasAvailable | |
status: "True" | |
type: Available | |
observedGeneration: 1 | |
readyReplicas: 1 | |
replicas: 1 | |
updatedReplicas: 1 | |
- apiVersion: extensions/v1beta1 | |
kind: Deployment | |
metadata: | |
annotations: | |
deployment.kubernetes.io/revision: "1" | |
kubectl.kubernetes.io/last-applied-configuration: | | |
{"apiVersion":"apps/v1","kind":"Deployment","metadata":{"annotations":{},"labels":{"serving.knative.dev/release":"devel"},"name":"webhook","namespace":"knative-serving"},"spec":{"replicas":1,"selector":{"matchLabels":{"app":"webhook","role":"webhook"}},"template":{"metadata":{"annotations":{"cluster-autoscaler.kubernetes.io/safe-to-evict":"false","sidecar.istio.io/inject":"false"},"labels":{"app":"webhook","role":"webhook","serving.knative.dev/release":"devel"}},"spec":{"containers":[{"env":[{"name":"SYSTEM_NAMESPACE","valueFrom":{"fieldRef":{"fieldPath":"metadata.namespace"}}},{"name":"CONFIG_LOGGING_NAME","value":"config-logging"},{"name":"CONFIG_OBSERVABILITY_NAME","value":"config-observability"},{"name":"METRICS_DOMAIN","value":"knative.dev/serving"}],"image":"gcr.io/gcp-compute-engine-223401/webhook-261c6506fca17bc41be50b3461f98f1c@sha256:012be54c7866cb8458fe96061f5321e519da7a4803809d912c2a670fff904ac6","name":"webhook","ports":[{"containerPort":9090,"name":"metrics"},{"containerPort":8008,"name":"profiling"}],"resources":{"limits":{"cpu":"200m","memory":"200Mi"},"requests":{"cpu":"20m","memory":"20Mi"}},"securityContext":{"allowPrivilegeEscalation":false}}],"serviceAccountName":"controller"}}}} | |
creationTimestamp: "2019-12-03T10:54:28Z" | |
generation: 1 | |
labels: | |
serving.knative.dev/release: devel | |
name: webhook | |
namespace: knative-serving | |
resourceVersion: "54619" | |
selfLink: /apis/extensions/v1beta1/namespaces/knative-serving/deployments/webhook | |
uid: 46e15f61-15bb-11ea-b5af-027e0b84da98 | |
spec: | |
progressDeadlineSeconds: 600 | |
replicas: 1 | |
revisionHistoryLimit: 10 | |
selector: | |
matchLabels: | |
app: webhook | |
role: webhook | |
strategy: | |
rollingUpdate: | |
maxSurge: 25% | |
maxUnavailable: 25% | |
type: RollingUpdate | |
template: | |
metadata: | |
annotations: | |
cluster-autoscaler.kubernetes.io/safe-to-evict: "false" | |
sidecar.istio.io/inject: "false" | |
creationTimestamp: null | |
labels: | |
app: webhook | |
role: webhook | |
serving.knative.dev/release: devel | |
spec: | |
containers: | |
- env: | |
- name: SYSTEM_NAMESPACE | |
valueFrom: | |
fieldRef: | |
apiVersion: v1 | |
fieldPath: metadata.namespace | |
- name: CONFIG_LOGGING_NAME | |
value: config-logging | |
- name: CONFIG_OBSERVABILITY_NAME | |
value: config-observability | |
- name: METRICS_DOMAIN | |
value: knative.dev/serving | |
image: gcr.io/gcp-compute-engine-223401/webhook-261c6506fca17bc41be50b3461f98f1c@sha256:012be54c7866cb8458fe96061f5321e519da7a4803809d912c2a670fff904ac6 | |
imagePullPolicy: IfNotPresent | |
name: webhook | |
ports: | |
- containerPort: 9090 | |
name: metrics | |
protocol: TCP | |
- containerPort: 8008 | |
name: profiling | |
protocol: TCP | |
resources: | |
limits: | |
cpu: 200m | |
memory: 200Mi | |
requests: | |
cpu: 20m | |
memory: 20Mi | |
securityContext: | |
allowPrivilegeEscalation: false | |
terminationMessagePath: /dev/termination-log | |
terminationMessagePolicy: File | |
dnsPolicy: ClusterFirst | |
restartPolicy: Always | |
schedulerName: default-scheduler | |
securityContext: {} | |
serviceAccount: controller | |
serviceAccountName: controller | |
terminationGracePeriodSeconds: 30 | |
status: | |
availableReplicas: 1 | |
conditions: | |
- lastTransitionTime: "2019-12-03T10:54:28Z" | |
lastUpdateTime: "2019-12-03T10:54:31Z" | |
message: ReplicaSet "webhook-54c85dd7d9" has successfully progressed. | |
reason: NewReplicaSetAvailable | |
status: "True" | |
type: Progressing | |
- lastTransitionTime: "2019-12-03T12:23:15Z" | |
lastUpdateTime: "2019-12-03T12:23:15Z" | |
message: Deployment has minimum availability. | |
reason: MinimumReplicasAvailable | |
status: "True" | |
type: Available | |
observedGeneration: 1 | |
readyReplicas: 1 | |
replicas: 1 | |
updatedReplicas: 1 | |
kind: List | |
metadata: | |
resourceVersion: "" | |
selfLink: "" | |
------- | |
resource: replicasets | |
------- | |
apiVersion: v1 | |
items: | |
- apiVersion: extensions/v1beta1 | |
kind: ReplicaSet | |
metadata: | |
annotations: | |
deployment.kubernetes.io/desired-replicas: "1" | |
deployment.kubernetes.io/max-replicas: "2" | |
deployment.kubernetes.io/revision: "1" | |
creationTimestamp: "2019-12-03T10:54:22Z" | |
generation: 1 | |
labels: | |
app: activator | |
pod-template-hash: 6f94df488 | |
role: activator | |
serving.knative.dev/release: devel | |
name: activator-6f94df488 | |
namespace: knative-serving | |
ownerReferences: | |
- apiVersion: apps/v1 | |
blockOwnerDeletion: true | |
controller: true | |
kind: Deployment | |
name: activator | |
uid: 437f3440-15bb-11ea-b5af-027e0b84da98 | |
resourceVersion: "55012" | |
selfLink: /apis/extensions/v1beta1/namespaces/knative-serving/replicasets/activator-6f94df488 | |
uid: 437fd7fa-15bb-11ea-b5af-027e0b84da98 | |
spec: | |
replicas: 1 | |
selector: | |
matchLabels: | |
app: activator | |
pod-template-hash: 6f94df488 | |
role: activator | |
template: | |
metadata: | |
annotations: | |
cluster-autoscaler.kubernetes.io/safe-to-evict: "false" | |
sidecar.istio.io/inject: "true" | |
creationTimestamp: null | |
labels: | |
app: activator | |
pod-template-hash: 6f94df488 | |
role: activator | |
serving.knative.dev/release: devel | |
spec: | |
containers: | |
- env: | |
- name: POD_NAME | |
valueFrom: | |
fieldRef: | |
apiVersion: v1 | |
fieldPath: metadata.name | |
- name: POD_IP | |
valueFrom: | |
fieldRef: | |
apiVersion: v1 | |
fieldPath: status.podIP | |
- name: SYSTEM_NAMESPACE | |
valueFrom: | |
fieldRef: | |
apiVersion: v1 | |
fieldPath: metadata.namespace | |
- name: CONFIG_LOGGING_NAME | |
value: config-logging | |
- name: CONFIG_OBSERVABILITY_NAME | |
value: config-observability | |
- name: METRICS_DOMAIN | |
value: knative.dev/internal/serving | |
image: gcr.io/gcp-compute-engine-223401/activator-ecd51ca5034883acbe737fde417a3d86@sha256:b2257a5f6e2427a5a96f6ea9ca2b652ee648e131e9a699df6e20b4bcfa4ef940 | |
imagePullPolicy: IfNotPresent | |
livenessProbe: | |
failureThreshold: 3 | |
httpGet: | |
httpHeaders: | |
- name: k-kubelet-probe | |
value: activator | |
path: /healthz | |
port: 8012 | |
scheme: HTTP | |
periodSeconds: 10 | |
successThreshold: 1 | |
timeoutSeconds: 1 | |
name: activator | |
ports: | |
- containerPort: 8012 | |
name: http1 | |
protocol: TCP | |
- containerPort: 8013 | |
name: h2c | |
protocol: TCP | |
- containerPort: 9090 | |
name: metrics | |
protocol: TCP | |
- containerPort: 8008 | |
name: profiling | |
protocol: TCP | |
readinessProbe: | |
failureThreshold: 3 | |
httpGet: | |
httpHeaders: | |
- name: k-kubelet-probe | |
value: activator | |
path: /healthz | |
port: 8012 | |
scheme: HTTP | |
periodSeconds: 10 | |
successThreshold: 1 | |
timeoutSeconds: 1 | |
resources: | |
limits: | |
cpu: "1" | |
memory: 600Mi | |
requests: | |
cpu: 300m | |
memory: 60Mi | |
securityContext: | |
allowPrivilegeEscalation: false | |
terminationMessagePath: /dev/termination-log | |
terminationMessagePolicy: File | |
dnsPolicy: ClusterFirst | |
restartPolicy: Always | |
schedulerName: default-scheduler | |
securityContext: {} | |
serviceAccount: controller | |
serviceAccountName: controller | |
terminationGracePeriodSeconds: 300 | |
status: | |
availableReplicas: 1 | |
fullyLabeledReplicas: 1 | |
observedGeneration: 1 | |
readyReplicas: 1 | |
replicas: 1 | |
- apiVersion: extensions/v1beta1 | |
kind: ReplicaSet | |
metadata: | |
annotations: | |
deployment.kubernetes.io/desired-replicas: "1" | |
deployment.kubernetes.io/max-replicas: "2" | |
deployment.kubernetes.io/revision: "1" | |
creationTimestamp: "2019-12-03T10:54:23Z" | |
generation: 1 | |
labels: | |
app: autoscaler | |
pod-template-hash: 698bf65564 | |
serving.knative.dev/release: devel | |
name: autoscaler-698bf65564 | |
namespace: knative-serving | |
ownerReferences: | |
- apiVersion: apps/v1 | |
blockOwnerDeletion: true | |
controller: true | |
kind: Deployment | |
name: autoscaler | |
uid: 44426376-15bb-11ea-b5af-027e0b84da98 | |
resourceVersion: "54914" | |
selfLink: /apis/extensions/v1beta1/namespaces/knative-serving/replicasets/autoscaler-698bf65564 | |
uid: 4443a853-15bb-11ea-b5af-027e0b84da98 | |
spec: | |
replicas: 1 | |
selector: | |
matchLabels: | |
app: autoscaler | |
pod-template-hash: 698bf65564 | |
template: | |
metadata: | |
annotations: | |
cluster-autoscaler.kubernetes.io/safe-to-evict: "false" | |
sidecar.istio.io/inject: "true" | |
traffic.sidecar.istio.io/includeInboundPorts: 8080,9090 | |
creationTimestamp: null | |
labels: | |
app: autoscaler | |
pod-template-hash: 698bf65564 | |
serving.knative.dev/release: devel | |
spec: | |
containers: | |
- args: | |
- --secure-port=8443 | |
- --cert-dir=/tmp | |
env: | |
- name: SYSTEM_NAMESPACE | |
valueFrom: | |
fieldRef: | |
apiVersion: v1 | |
fieldPath: metadata.namespace | |
- name: CONFIG_LOGGING_NAME | |
value: config-logging | |
- name: CONFIG_OBSERVABILITY_NAME | |
value: config-observability | |
- name: METRICS_DOMAIN | |
value: knative.dev/serving | |
image: gcr.io/gcp-compute-engine-223401/autoscaler-12c0fa24db31956a7cfa673210e4fa13@sha256:f74987342b3c7bcb8b95006f98a8efcfa19bd518430844df037cd5f29132c997 | |
imagePullPolicy: IfNotPresent | |
livenessProbe: | |
failureThreshold: 3 | |
httpGet: | |
httpHeaders: | |
- name: k-kubelet-probe | |
value: autoscaler | |
path: /healthz | |
port: 8080 | |
scheme: HTTP | |
periodSeconds: 10 | |
successThreshold: 1 | |
timeoutSeconds: 1 | |
name: autoscaler | |
ports: | |
- containerPort: 8080 | |
name: websocket | |
protocol: TCP | |
- containerPort: 9090 | |
name: metrics | |
protocol: TCP | |
- containerPort: 8443 | |
name: custom-metrics | |
protocol: TCP | |
- containerPort: 8008 | |
name: profiling | |
protocol: TCP | |
readinessProbe: | |
failureThreshold: 3 | |
httpGet: | |
httpHeaders: | |
- name: k-kubelet-probe | |
value: autoscaler | |
path: /healthz | |
port: 8080 | |
scheme: HTTP | |
periodSeconds: 10 | |
successThreshold: 1 | |
timeoutSeconds: 1 | |
resources: | |
limits: | |
cpu: 300m | |
memory: 400Mi | |
requests: | |
cpu: 30m | |
memory: 40Mi | |
securityContext: | |
allowPrivilegeEscalation: false | |
terminationMessagePath: /dev/termination-log | |
terminationMessagePolicy: File | |
dnsPolicy: ClusterFirst | |
restartPolicy: Always | |
schedulerName: default-scheduler | |
securityContext: {} | |
serviceAccount: controller | |
serviceAccountName: controller | |
terminationGracePeriodSeconds: 30 | |
status: | |
availableReplicas: 1 | |
fullyLabeledReplicas: 1 | |
observedGeneration: 1 | |
readyReplicas: 1 | |
replicas: 1 | |
- apiVersion: extensions/v1beta1 | |
kind: ReplicaSet | |
metadata: | |
annotations: | |
deployment.kubernetes.io/desired-replicas: "1" | |
deployment.kubernetes.io/max-replicas: "2" | |
deployment.kubernetes.io/revision: "1" | |
creationTimestamp: "2019-12-03T10:54:23Z" | |
generation: 1 | |
labels: | |
app: autoscaler-hpa | |
pod-template-hash: 555cf99b79 | |
serving.knative.dev/release: devel | |
name: autoscaler-hpa-555cf99b79 | |
namespace: knative-serving | |
ownerReferences: | |
- apiVersion: apps/v1 | |
blockOwnerDeletion: true | |
controller: true | |
kind: Deployment | |
name: autoscaler-hpa | |
uid: 43f4e7cf-15bb-11ea-b5af-027e0b84da98 | |
resourceVersion: "54624" | |
selfLink: /apis/extensions/v1beta1/namespaces/knative-serving/replicasets/autoscaler-hpa-555cf99b79 | |
uid: 43f57444-15bb-11ea-b5af-027e0b84da98 | |
spec: | |
replicas: 1 | |
selector: | |
matchLabels: | |
app: autoscaler-hpa | |
pod-template-hash: 555cf99b79 | |
template: | |
metadata: | |
annotations: | |
sidecar.istio.io/inject: "false" | |
creationTimestamp: null | |
labels: | |
app: autoscaler-hpa | |
pod-template-hash: 555cf99b79 | |
serving.knative.dev/release: devel | |
spec: | |
containers: | |
- env: | |
- name: SYSTEM_NAMESPACE | |
valueFrom: | |
fieldRef: | |
apiVersion: v1 | |
fieldPath: metadata.namespace | |
- name: CONFIG_LOGGING_NAME | |
value: config-logging | |
- name: CONFIG_OBSERVABILITY_NAME | |
value: config-observability | |
- name: METRICS_DOMAIN | |
value: knative.dev/serving | |
image: gcr.io/gcp-compute-engine-223401/autoscaler-hpa-85c0b68178743d74ff7f663a72802ceb@sha256:24e81ede4cc223f0f70a1630fc4bed30308eb7b406715dbdd2280827f7565eec | |
imagePullPolicy: IfNotPresent | |
name: autoscaler-hpa | |
ports: | |
- containerPort: 9090 | |
name: metrics | |
protocol: TCP | |
- containerPort: 8008 | |
name: profiling | |
protocol: TCP | |
resources: | |
limits: | |
cpu: "1" | |
memory: 1000Mi | |
requests: | |
cpu: 100m | |
memory: 100Mi | |
securityContext: | |
allowPrivilegeEscalation: false | |
terminationMessagePath: /dev/termination-log | |
terminationMessagePolicy: File | |
dnsPolicy: ClusterFirst | |
restartPolicy: Always | |
schedulerName: default-scheduler | |
securityContext: {} | |
serviceAccount: controller | |
serviceAccountName: controller | |
terminationGracePeriodSeconds: 30 | |
status: | |
availableReplicas: 1 | |
fullyLabeledReplicas: 1 | |
observedGeneration: 1 | |
readyReplicas: 1 | |
replicas: 1 | |
- apiVersion: extensions/v1beta1 | |
kind: ReplicaSet | |
metadata: | |
annotations: | |
deployment.kubernetes.io/desired-replicas: "1" | |
deployment.kubernetes.io/max-replicas: "2" | |
deployment.kubernetes.io/revision: "1" | |
creationTimestamp: "2019-12-03T10:54:26Z" | |
generation: 1 | |
labels: | |
app: controller | |
pod-template-hash: 7667dd8fcb | |
serving.knative.dev/release: devel | |
name: controller-7667dd8fcb | |
namespace: knative-serving | |
ownerReferences: | |
- apiVersion: apps/v1 | |
blockOwnerDeletion: true | |
controller: true | |
kind: Deployment | |
name: controller | |
uid: 46218794-15bb-11ea-b5af-027e0b84da98 | |
resourceVersion: "54608" | |
selfLink: /apis/extensions/v1beta1/namespaces/knative-serving/replicasets/controller-7667dd8fcb | |
uid: 4622381c-15bb-11ea-b5af-027e0b84da98 | |
spec: | |
replicas: 1 | |
selector: | |
matchLabels: | |
app: controller | |
pod-template-hash: 7667dd8fcb | |
template: | |
metadata: | |
annotations: | |
sidecar.istio.io/inject: "false" | |
creationTimestamp: null | |
labels: | |
app: controller | |
pod-template-hash: 7667dd8fcb | |
serving.knative.dev/release: devel | |
spec: | |
containers: | |
- env: | |
- name: SYSTEM_NAMESPACE | |
valueFrom: | |
fieldRef: | |
apiVersion: v1 | |
fieldPath: metadata.namespace | |
- name: CONFIG_LOGGING_NAME | |
value: config-logging | |
- name: CONFIG_OBSERVABILITY_NAME | |
value: config-observability | |
- name: METRICS_DOMAIN | |
value: knative.dev/internal/serving | |
image: gcr.io/gcp-compute-engine-223401/controller-f6fdb41c6acbc726e29a3104ff2ef720@sha256:7cde59d7e5e3f7891b57fb51ade68929b5220df54b70dc027a62018c54fe23d3 | |
imagePullPolicy: IfNotPresent | |
name: controller | |
ports: | |
- containerPort: 9090 | |
name: metrics | |
protocol: TCP | |
- containerPort: 8008 | |
name: profiling | |
protocol: TCP | |
resources: | |
limits: | |
cpu: "1" | |
memory: 1000Mi | |
requests: | |
cpu: 100m | |
memory: 100Mi | |
securityContext: | |
allowPrivilegeEscalation: false | |
terminationMessagePath: /dev/termination-log | |
terminationMessagePolicy: File | |
dnsPolicy: ClusterFirst | |
restartPolicy: Always | |
schedulerName: default-scheduler | |
securityContext: {} | |
serviceAccount: controller | |
serviceAccountName: controller | |
terminationGracePeriodSeconds: 30 | |
status: | |
availableReplicas: 1 | |
fullyLabeledReplicas: 1 | |
observedGeneration: 1 | |
readyReplicas: 1 | |
replicas: 1 | |
- apiVersion: extensions/v1beta1 | |
kind: ReplicaSet | |
metadata: | |
annotations: | |
deployment.kubernetes.io/desired-replicas: "1" | |
deployment.kubernetes.io/max-replicas: "2" | |
deployment.kubernetes.io/revision: "1" | |
creationTimestamp: "2019-12-03T10:54:27Z" | |
generation: 1 | |
labels: | |
app: networking-certmanager | |
pod-template-hash: 6794bcc848 | |
serving.knative.dev/release: devel | |
name: networking-certmanager-6794bcc848 | |
namespace: knative-serving | |
ownerReferences: | |
- apiVersion: apps/v1 | |
blockOwnerDeletion: true | |
controller: true | |
kind: Deployment | |
name: networking-certmanager | |
uid: 46656e72-15bb-11ea-b5af-027e0b84da98 | |
resourceVersion: "54592" | |
selfLink: /apis/extensions/v1beta1/namespaces/knative-serving/replicasets/networking-certmanager-6794bcc848 | |
uid: 46666167-15bb-11ea-b5af-027e0b84da98 | |
spec: | |
replicas: 1 | |
selector: | |
matchLabels: | |
app: networking-certmanager | |
pod-template-hash: 6794bcc848 | |
template: | |
metadata: | |
annotations: | |
sidecar.istio.io/inject: "false" | |
creationTimestamp: null | |
labels: | |
app: networking-certmanager | |
pod-template-hash: 6794bcc848 | |
serving.knative.dev/release: devel | |
spec: | |
containers: | |
- env: | |
- name: SYSTEM_NAMESPACE | |
valueFrom: | |
fieldRef: | |
apiVersion: v1 | |
fieldPath: metadata.namespace | |
- name: CONFIG_LOGGING_NAME | |
value: config-logging | |
- name: CONFIG_OBSERVABILITY_NAME | |
value: config-observability | |
- name: METRICS_DOMAIN | |
value: knative.dev/serving | |
image: gcr.io/gcp-compute-engine-223401/certmanager-f79b5bfeb092d099f0f3326024a30ebb@sha256:9f7622fd03d96c3262e71b4f6fb14455145041c81950b3efe10010c122974bed | |
imagePullPolicy: IfNotPresent | |
name: networking-certmanager | |
ports: | |
- containerPort: 9090 | |
name: metrics | |
protocol: TCP | |
- containerPort: 8008 | |
name: profiling | |
protocol: TCP | |
resources: | |
limits: | |
cpu: "1" | |
memory: 1000Mi | |
requests: | |
cpu: 100m | |
memory: 100Mi | |
securityContext: | |
allowPrivilegeEscalation: false | |
terminationMessagePath: /dev/termination-log | |
terminationMessagePolicy: File | |
dnsPolicy: ClusterFirst | |
restartPolicy: Always | |
schedulerName: default-scheduler | |
securityContext: {} | |
serviceAccount: controller | |
serviceAccountName: controller | |
terminationGracePeriodSeconds: 30 | |
status: | |
availableReplicas: 1 | |
fullyLabeledReplicas: 1 | |
observedGeneration: 1 | |
readyReplicas: 1 | |
replicas: 1 | |
- apiVersion: extensions/v1beta1 | |
kind: ReplicaSet | |
metadata: | |
annotations: | |
deployment.kubernetes.io/desired-replicas: "1" | |
deployment.kubernetes.io/max-replicas: "2" | |
deployment.kubernetes.io/revision: "1" | |
creationTimestamp: "2019-12-03T10:54:27Z" | |
generation: 1 | |
labels: | |
app: networking-istio | |
pod-template-hash: 6854cd95ff | |
serving.knative.dev/release: devel | |
name: networking-istio-6854cd95ff | |
namespace: knative-serving | |
ownerReferences: | |
- apiVersion: apps/v1 | |
blockOwnerDeletion: true | |
controller: true | |
kind: Deployment | |
name: networking-istio | |
uid: 468dc8fb-15bb-11ea-b5af-027e0b84da98 | |
resourceVersion: "54654" | |
selfLink: /apis/extensions/v1beta1/namespaces/knative-serving/replicasets/networking-istio-6854cd95ff | |
uid: 468ebdf0-15bb-11ea-b5af-027e0b84da98 | |
spec: | |
replicas: 1 | |
selector: | |
matchLabels: | |
app: networking-istio | |
pod-template-hash: 6854cd95ff | |
template: | |
metadata: | |
annotations: | |
sidecar.istio.io/inject: "false" | |
creationTimestamp: null | |
labels: | |
app: networking-istio | |
pod-template-hash: 6854cd95ff | |
serving.knative.dev/release: devel | |
spec: | |
containers: | |
- env: | |
- name: SYSTEM_NAMESPACE | |
valueFrom: | |
fieldRef: | |
apiVersion: v1 | |
fieldPath: metadata.namespace | |
- name: CONFIG_LOGGING_NAME | |
value: config-logging | |
- name: CONFIG_OBSERVABILITY_NAME | |
value: config-observability | |
- name: METRICS_DOMAIN | |
value: knative.dev/serving | |
image: gcr.io/gcp-compute-engine-223401/istio-c58c0c8bb8ecc80f800bb788a425ae1d@sha256:ebdb4e8832e9574311494a31ea18dc63cf903e8dd7f0651d640eb2c7f252da2a | |
imagePullPolicy: IfNotPresent | |
name: networking-istio | |
ports: | |
- containerPort: 9090 | |
name: metrics | |
protocol: TCP | |
- containerPort: 8008 | |
name: profiling | |
protocol: TCP | |
resources: | |
limits: | |
cpu: "1" | |
memory: 1000Mi | |
requests: | |
cpu: 100m | |
memory: 100Mi | |
securityContext: | |
allowPrivilegeEscalation: false | |
terminationMessagePath: /dev/termination-log | |
terminationMessagePolicy: File | |
dnsPolicy: ClusterFirst | |
restartPolicy: Always | |
schedulerName: default-scheduler | |
securityContext: {} | |
serviceAccount: controller | |
serviceAccountName: controller | |
terminationGracePeriodSeconds: 30 | |
status: | |
availableReplicas: 1 | |
fullyLabeledReplicas: 1 | |
observedGeneration: 1 | |
readyReplicas: 1 | |
replicas: 1 | |
- apiVersion: extensions/v1beta1 | |
kind: ReplicaSet | |
metadata: | |
annotations: | |
deployment.kubernetes.io/desired-replicas: "1" | |
deployment.kubernetes.io/max-replicas: "2" | |
deployment.kubernetes.io/revision: "1" | |
creationTimestamp: "2019-12-03T10:54:27Z" | |
generation: 1 | |
labels: | |
app: networking-ns-cert | |
pod-template-hash: 55d77c7656 | |
name: networking-ns-cert-55d77c7656 | |
namespace: knative-serving | |
ownerReferences: | |
- apiVersion: apps/v1 | |
blockOwnerDeletion: true | |
controller: true | |
kind: Deployment | |
name: networking-ns-cert | |
uid: 46bbfd69-15bb-11ea-b5af-027e0b84da98 | |
resourceVersion: "54595" | |
selfLink: /apis/extensions/v1beta1/namespaces/knative-serving/replicasets/networking-ns-cert-55d77c7656 | |
uid: 46bcdcda-15bb-11ea-b5af-027e0b84da98 | |
spec: | |
replicas: 1 | |
selector: | |
matchLabels: | |
app: networking-ns-cert | |
pod-template-hash: 55d77c7656 | |
template: | |
metadata: | |
annotations: | |
sidecar.istio.io/inject: "false" | |
creationTimestamp: null | |
labels: | |
app: networking-ns-cert | |
pod-template-hash: 55d77c7656 | |
spec: | |
containers: | |
- env: | |
- name: SYSTEM_NAMESPACE | |
valueFrom: | |
fieldRef: | |
apiVersion: v1 | |
fieldPath: metadata.namespace | |
- name: CONFIG_LOGGING_NAME | |
value: config-logging | |
- name: CONFIG_OBSERVABILITY_NAME | |
value: config-observability | |
- name: METRICS_DOMAIN | |
value: knative.dev/serving | |
image: gcr.io/gcp-compute-engine-223401/nscert-e3625dd01dcb901439f4630ab9789e75@sha256:77da0645be1369d0e56a1daa204da6de6661488eef5858a60dee9a052f02150c | |
imagePullPolicy: IfNotPresent | |
name: networking-nscert | |
ports: | |
- containerPort: 9090 | |
name: metrics | |
protocol: TCP | |
resources: | |
limits: | |
cpu: "1" | |
memory: 1000Mi | |
requests: | |
cpu: 100m | |
memory: 100Mi | |
securityContext: | |
allowPrivilegeEscalation: false | |
terminationMessagePath: /dev/termination-log | |
terminationMessagePolicy: File | |
dnsPolicy: ClusterFirst | |
restartPolicy: Always | |
schedulerName: default-scheduler | |
securityContext: {} | |
serviceAccount: controller | |
serviceAccountName: controller | |
terminationGracePeriodSeconds: 30 | |
status: | |
availableReplicas: 1 | |
fullyLabeledReplicas: 1 | |
observedGeneration: 1 | |
readyReplicas: 1 | |
replicas: 1 | |
- apiVersion: extensions/v1beta1 | |
kind: ReplicaSet | |
metadata: | |
annotations: | |
deployment.kubernetes.io/desired-replicas: "1" | |
deployment.kubernetes.io/max-replicas: "2" | |
deployment.kubernetes.io/revision: "1" | |
creationTimestamp: "2019-12-03T10:54:28Z" | |
generation: 1 | |
labels: | |
app: webhook | |
pod-template-hash: 54c85dd7d9 | |
role: webhook | |
serving.knative.dev/release: devel | |
name: webhook-54c85dd7d9 | |
namespace: knative-serving | |
ownerReferences: | |
- apiVersion: apps/v1 | |
blockOwnerDeletion: true | |
controller: true | |
kind: Deployment | |
name: webhook | |
uid: 46e15f61-15bb-11ea-b5af-027e0b84da98 | |
resourceVersion: "54617" | |
selfLink: /apis/extensions/v1beta1/namespaces/knative-serving/replicasets/webhook-54c85dd7d9 | |
uid: 46e1eccb-15bb-11ea-b5af-027e0b84da98 | |
spec: | |
replicas: 1 | |
selector: | |
matchLabels: | |
app: webhook | |
pod-template-hash: 54c85dd7d9 | |
role: webhook | |
template: | |
metadata: | |
annotations: | |
cluster-autoscaler.kubernetes.io/safe-to-evict: "false" | |
sidecar.istio.io/inject: "false" | |
creationTimestamp: null | |
labels: | |
app: webhook | |
pod-template-hash: 54c85dd7d9 | |
role: webhook | |
serving.knative.dev/release: devel | |
spec: | |
containers: | |
- env: | |
- name: SYSTEM_NAMESPACE | |
valueFrom: | |
fieldRef: | |
apiVersion: v1 | |
fieldPath: metadata.namespace | |
- name: CONFIG_LOGGING_NAME | |
value: config-logging | |
- name: CONFIG_OBSERVABILITY_NAME | |
value: config-observability | |
- name: METRICS_DOMAIN | |
value: knative.dev/serving | |
image: gcr.io/gcp-compute-engine-223401/webhook-261c6506fca17bc41be50b3461f98f1c@sha256:012be54c7866cb8458fe96061f5321e519da7a4803809d912c2a670fff904ac6 | |
imagePullPolicy: IfNotPresent | |
name: webhook | |
ports: | |
- containerPort: 9090 | |
name: metrics | |
protocol: TCP | |
- containerPort: 8008 | |
name: profiling | |
protocol: TCP | |
resources: | |
limits: | |
cpu: 200m | |
memory: 200Mi | |
requests: | |
cpu: 20m | |
memory: 20Mi | |
securityContext: | |
allowPrivilegeEscalation: false | |
terminationMessagePath: /dev/termination-log | |
terminationMessagePolicy: File | |
dnsPolicy: ClusterFirst | |
restartPolicy: Always | |
schedulerName: default-scheduler | |
securityContext: {} | |
serviceAccount: controller | |
serviceAccountName: controller | |
terminationGracePeriodSeconds: 30 | |
status: | |
availableReplicas: 1 | |
fullyLabeledReplicas: 1 | |
observedGeneration: 1 | |
readyReplicas: 1 | |
replicas: 1 | |
kind: List | |
metadata: | |
resourceVersion: "" | |
selfLink: "" | |
------- | |
resource: statefulsets | |
------- | |
apiVersion: v1 | |
items: [] | |
kind: List | |
metadata: | |
resourceVersion: "" | |
selfLink: "" | |
------- | |
resource: meshpolicies | |
------- | |
apiVersion: v1 | |
items: | |
- apiVersion: authentication.istio.io/v1alpha1 | |
kind: MeshPolicy | |
metadata: | |
annotations: | |
kubectl.kubernetes.io/last-applied-configuration: | | |
{"apiVersion":"authentication.istio.io/v1alpha1","kind":"MeshPolicy","metadata":{"annotations":{},"labels":{"app":"security","chart":"security","heritage":"Tiller","release":"RELEASE-NAME"},"name":"default"},"spec":{"peers":[{"mtls":{"mode":"PERMISSIVE"}}]}} | |
creationTimestamp: "2019-12-03T04:52:06Z" | |
generation: 1 | |
labels: | |
app: security | |
chart: security | |
heritage: Tiller | |
release: RELEASE-NAME | |
name: default | |
resourceVersion: "1536" | |
selfLink: /apis/authentication.istio.io/v1alpha1/meshpolicies/default | |
uid: a7a5b08f-1588-11ea-b5af-027e0b84da98 | |
spec: | |
peers: | |
- mtls: | |
mode: PERMISSIVE | |
kind: List | |
metadata: | |
resourceVersion: "" | |
selfLink: "" | |
------- | |
resource: policies | |
------- | |
apiVersion: v1 | |
items: | |
- apiVersion: authentication.istio.io/v1alpha1 | |
kind: Policy | |
metadata: | |
annotations: | |
kubectl.kubernetes.io/last-applied-configuration: | | |
{"apiVersion":"authentication.istio.io/v1alpha1","kind":"Policy","metadata":{"annotations":{},"name":"default","namespace":"knative-serving"},"spec":{"peers":[{"mtls":{"mode":"PERMISSIVE"}}]}} | |
creationTimestamp: "2019-12-03T11:19:24Z" | |
generation: 1 | |
name: default | |
namespace: knative-serving | |
resourceVersion: "46932" | |
selfLink: /apis/authentication.istio.io/v1alpha1/namespaces/knative-serving/policies/default | |
uid: c2e4bf6c-15be-11ea-b5af-027e0b84da98 | |
spec: | |
peers: | |
- mtls: | |
mode: PERMISSIVE | |
kind: List | |
metadata: | |
resourceVersion: "" | |
selfLink: "" | |
------- | |
resource: tokenreviews | |
------- | |
apiVersion: v1 | |
items: [] | |
kind: List | |
metadata: | |
resourceVersion: "" | |
selfLink: "" | |
------- | |
resource: localsubjectaccessreviews | |
------- | |
apiVersion: v1 | |
items: [] | |
kind: List | |
metadata: | |
resourceVersion: "" | |
selfLink: "" | |
------- | |
resource: selfsubjectaccessreviews | |
------- | |
apiVersion: v1 | |
items: [] | |
kind: List | |
metadata: | |
resourceVersion: "" | |
selfLink: "" | |
------- | |
resource: selfsubjectrulesreviews | |
------- | |
apiVersion: v1 | |
items: [] | |
kind: List | |
metadata: | |
resourceVersion: "" | |
selfLink: "" | |
------- | |
resource: subjectaccessreviews | |
------- | |
apiVersion: v1 | |
items: [] | |
kind: List | |
metadata: | |
resourceVersion: "" | |
selfLink: "" | |
------- | |
resource: horizontalpodautoscalers | |
------- | |
apiVersion: v1 | |
items: | |
- apiVersion: autoscaling/v1 | |
kind: HorizontalPodAutoscaler | |
metadata: | |
annotations: | |
autoscaling.alpha.kubernetes.io/conditions: '[{"type":"AbleToScale","status":"True","lastTransitionTime":"2019-12-03T10:54:37Z","reason":"SucceededGetScale","message":"the | |
HPA controller was able to get the target''s current scale"},{"type":"ScalingActive","status":"False","lastTransitionTime":"2019-12-03T10:54:37Z","reason":"FailedGetResourceMetric","message":"the | |
HPA was unable to compute the replica count: unable to get metrics for resource | |
cpu: unable to fetch metrics from resource metrics API: the server could not | |
find the requested resource (get pods.metrics.k8s.io)"}]' | |
kubectl.kubernetes.io/last-applied-configuration: | | |
{"apiVersion":"autoscaling/v2beta1","kind":"HorizontalPodAutoscaler","metadata":{"annotations":{},"labels":{"serving.knative.dev/release":"devel"},"name":"activator","namespace":"knative-serving"},"spec":{"maxReplicas":20,"metrics":[{"resource":{"name":"cpu","targetAverageUtilization":100},"type":"Resource"}],"minReplicas":1,"scaleTargetRef":{"apiVersion":"apps/v1","kind":"Deployment","name":"activator"}}} | |
creationTimestamp: "2019-12-03T10:54:22Z" | |
labels: | |
serving.knative.dev/release: devel | |
name: activator | |
namespace: knative-serving | |
resourceVersion: "44083" | |
selfLink: /apis/autoscaling/v1/namespaces/knative-serving/horizontalpodautoscalers/activator | |
uid: 43a3dab4-15bb-11ea-b5af-027e0b84da98 | |
spec: | |
maxReplicas: 20 | |
minReplicas: 1 | |
scaleTargetRef: | |
apiVersion: apps/v1 | |
kind: Deployment | |
name: activator | |
targetCPUUtilizationPercentage: 100 | |
status: | |
currentReplicas: 1 | |
desiredReplicas: 0 | |
kind: List | |
metadata: | |
resourceVersion: "" | |
selfLink: "" | |
------- | |
resource: metrics | |
------- | |
apiVersion: v1 | |
items: [] | |
kind: List | |
metadata: | |
resourceVersion: "" | |
selfLink: "" | |
------- | |
resource: podautoscalers | |
------- | |
apiVersion: v1 | |
items: [] | |
kind: List | |
metadata: | |
resourceVersion: "" | |
selfLink: "" | |
------- | |
resource: cronjobs | |
------- | |
apiVersion: v1 | |
items: [] | |
kind: List | |
metadata: | |
resourceVersion: "" | |
selfLink: "" | |
------- | |
resource: jobs | |
------- | |
apiVersion: v1 | |
items: | |
- apiVersion: batch/v1 | |
kind: Job | |
metadata: | |
annotations: | |
kubectl.kubernetes.io/last-applied-configuration: | | |
{"apiVersion":"batch/v1","kind":"Job","metadata":{"annotations":{},"labels":{"app":"default-domain","networking.knative.dev/ingress-provider":"istio","serving.knative.dev/release":"devel"},"name":"default-domain","namespace":"knative-serving"},"spec":{"backoffLimit":10,"template":{"metadata":{"annotations":{"sidecar.istio.io/inject":"false"}},"spec":{"containers":[{"args":["-magic-dns=xip.io"],"env":[{"name":"SYSTEM_NAMESPACE","valueFrom":{"fieldRef":{"fieldPath":"metadata.namespace"}}}],"image":"knative.dev/serving/cmd/default-domain","name":"default-domain","volumeMounts":[{"mountPath":"/etc/config-domain","name":"config-domain"},{"mountPath":"/etc/config-istio","name":"config-istio"}]}],"restartPolicy":"Never","serviceAccountName":"controller","volumes":[{"configMap":{"name":"config-domain"},"name":"config-domain"},{"configMap":{"name":"config-istio"},"name":"config-istio"}]}}}} | |
creationTimestamp: "2019-12-03T10:57:07Z" | |
labels: | |
app: default-domain | |
networking.knative.dev/ingress-provider: istio | |
serving.knative.dev/release: devel | |
name: default-domain | |
namespace: knative-serving | |
resourceVersion: "54542" | |
selfLink: /apis/batch/v1/namespaces/knative-serving/jobs/default-domain | |
uid: a5ff6ccf-15bb-11ea-b5af-027e0b84da98 | |
spec: | |
backoffLimit: 10 | |
completions: 1 | |
parallelism: 1 | |
selector: | |
matchLabels: | |
controller-uid: a5ff6ccf-15bb-11ea-b5af-027e0b84da98 | |
template: | |
metadata: | |
annotations: | |
sidecar.istio.io/inject: "false" | |
creationTimestamp: null | |
labels: | |
controller-uid: a5ff6ccf-15bb-11ea-b5af-027e0b84da98 | |
job-name: default-domain | |
spec: | |
containers: | |
- args: | |
- -magic-dns=xip.io | |
env: | |
- name: SYSTEM_NAMESPACE | |
valueFrom: | |
fieldRef: | |
apiVersion: v1 | |
fieldPath: metadata.namespace | |
image: knative.dev/serving/cmd/default-domain | |
imagePullPolicy: Always | |
name: default-domain | |
resources: {} | |
terminationMessagePath: /dev/termination-log | |
terminationMessagePolicy: File | |
volumeMounts: | |
- mountPath: /etc/config-domain | |
name: config-domain | |
- mountPath: /etc/config-istio | |
name: config-istio | |
dnsPolicy: ClusterFirst | |
restartPolicy: Never | |
schedulerName: default-scheduler | |
securityContext: {} | |
serviceAccount: controller | |
serviceAccountName: controller | |
terminationGracePeriodSeconds: 30 | |
volumes: | |
- configMap: | |
defaultMode: 420 | |
name: config-domain | |
name: config-domain | |
- configMap: | |
defaultMode: 420 | |
name: config-istio | |
name: config-istio | |
status: | |
active: 1 | |
startTime: "2019-12-03T10:57:07Z" | |
kind: List | |
metadata: | |
resourceVersion: "" | |
selfLink: "" | |
------- | |
resource: images | |
------- | |
apiVersion: v1 | |
items: | |
- apiVersion: caching.internal.knative.dev/v1alpha1 | |
kind: Image | |
metadata: | |
annotations: | |
kubectl.kubernetes.io/last-applied-configuration: | | |
{"apiVersion":"caching.internal.knative.dev/v1alpha1","kind":"Image","metadata":{"annotations":{},"labels":{"serving.knative.dev/release":"devel"},"name":"queue-proxy","namespace":"knative-serving"},"spec":{"image":"gcr.io/gcp-compute-engine-223401/queue-39be6f1d08a095bd076a71d288d295b6@sha256:8adf8f990b4485e7ead4dc9e6f8ddb3a19142835de95386428deb9ffde8d20b2"}} | |
creationTimestamp: "2019-12-03T10:54:21Z" | |
generation: 1 | |
labels: | |
serving.knative.dev/release: devel | |
name: queue-proxy | |
namespace: knative-serving | |
resourceVersion: "43905" | |
selfLink: /apis/caching.internal.knative.dev/v1alpha1/namespaces/knative-serving/images/queue-proxy | |
uid: 42ea46ae-15bb-11ea-b5af-027e0b84da98 | |
spec: | |
image: gcr.io/gcp-compute-engine-223401/queue-39be6f1d08a095bd076a71d288d295b6@sha256:8adf8f990b4485e7ead4dc9e6f8ddb3a19142835de95386428deb9ffde8d20b2 | |
kind: List | |
metadata: | |
resourceVersion: "" | |
selfLink: "" | |
------- | |
resource: certificatesigningrequests | |
------- | |
apiVersion: v1 | |
items: [] | |
kind: List | |
metadata: | |
resourceVersion: "" | |
selfLink: "" | |
------- | |
resource: adapters | |
------- | |
apiVersion: v1 | |
items: [] | |
kind: List | |
metadata: | |
resourceVersion: "" | |
selfLink: "" | |
------- | |
resource: attributemanifests | |
------- | |
apiVersion: v1 | |
items: [] | |
kind: List | |
metadata: | |
resourceVersion: "" | |
selfLink: "" | |
------- | |
resource: handlers | |
------- | |
apiVersion: v1 | |
items: [] | |
kind: List | |
metadata: | |
resourceVersion: "" | |
selfLink: "" | |
------- | |
resource: httpapispecbindings | |
------- | |
apiVersion: v1 | |
items: [] | |
kind: List | |
metadata: | |
resourceVersion: "" | |
selfLink: "" | |
------- | |
resource: httpapispecs | |
------- | |
apiVersion: v1 | |
items: [] | |
kind: List | |
metadata: | |
resourceVersion: "" | |
selfLink: "" | |
------- | |
resource: instances | |
------- | |
apiVersion: v1 | |
items: [] | |
kind: List | |
metadata: | |
resourceVersion: "" | |
selfLink: "" | |
------- | |
resource: quotaspecbindings | |
------- | |
apiVersion: v1 | |
items: [] | |
kind: List | |
metadata: | |
resourceVersion: "" | |
selfLink: "" | |
------- | |
resource: quotaspecs | |
------- | |
apiVersion: v1 | |
items: [] | |
kind: List | |
metadata: | |
resourceVersion: "" | |
selfLink: "" | |
------- | |
resource: rules | |
------- | |
apiVersion: v1 | |
items: [] | |
kind: List | |
metadata: | |
resourceVersion: "" | |
selfLink: "" | |
------- | |
resource: templates | |
------- | |
apiVersion: v1 | |
items: [] | |
kind: List | |
metadata: | |
resourceVersion: "" | |
selfLink: "" | |
------- | |
resource: leases | |
------- | |
apiVersion: v1 | |
items: [] | |
kind: List | |
metadata: | |
resourceVersion: "" | |
selfLink: "" | |
------- | |
resource: eniconfigs | |
------- | |
apiVersion: v1 | |
items: [] | |
kind: List | |
metadata: | |
resourceVersion: "" | |
selfLink: "" | |
------- | |
resource: events | |
------- | |
apiVersion: v1 | |
items: | |
- apiVersion: v1 | |
count: 1 | |
eventTime: null | |
firstTimestamp: "2019-12-03T12:23:10Z" | |
involvedObject: | |
apiVersion: v1 | |
fieldPath: spec.containers{istio-proxy} | |
kind: Pod | |
name: activator-6f94df488-7wp6g | |
namespace: knative-serving | |
resourceVersion: "43914" | |
uid: 43852e05-15bb-11ea-b5af-027e0b84da98 | |
kind: Event | |
lastTimestamp: "2019-12-03T12:23:10Z" | |
message: Stopping container istio-proxy | |
metadata: | |
creationTimestamp: "2019-12-03T12:23:10Z" | |
name: activator-6f94df488-7wp6g.15dcdbef526c32b1 | |
namespace: knative-serving | |
resourceVersion: "3290" | |
selfLink: /api/v1/namespaces/knative-serving/events/activator-6f94df488-7wp6g.15dcdbef526c32b1 | |
uid: ab60829c-15c7-11ea-b5af-027e0b84da98 | |
reason: Killing | |
reportingComponent: "" | |
reportingInstance: "" | |
source: | |
component: kubelet | |
host: ip-172-20-40-226.ap-southeast-1.compute.internal | |
type: Normal | |
- apiVersion: v1 | |
count: 1 | |
eventTime: null | |
firstTimestamp: "2019-12-03T12:23:10Z" | |
involvedObject: | |
apiVersion: v1 | |
fieldPath: spec.containers{activator} | |
kind: Pod | |
name: activator-6f94df488-7wp6g | |
namespace: knative-serving | |
resourceVersion: "43914" | |
uid: 43852e05-15bb-11ea-b5af-027e0b84da98 | |
kind: Event | |
lastTimestamp: "2019-12-03T12:23:10Z" | |
message: Stopping container activator | |
metadata: | |
creationTimestamp: "2019-12-03T12:23:10Z" | |
name: activator-6f94df488-7wp6g.15dcdbef526f32f9 | |
namespace: knative-serving | |
resourceVersion: "3289" | |
selfLink: /api/v1/namespaces/knative-serving/events/activator-6f94df488-7wp6g.15dcdbef526f32f9 | |
uid: ab5f27f1-15c7-11ea-b5af-027e0b84da98 | |
reason: Killing | |
reportingComponent: "" | |
reportingInstance: "" | |
source: | |
component: kubelet | |
host: ip-172-20-40-226.ap-southeast-1.compute.internal | |
type: Normal | |
- apiVersion: v1 | |
count: 10 | |
eventTime: null | |
firstTimestamp: "2019-12-03T12:23:12Z" | |
involvedObject: | |
apiVersion: v1 | |
fieldPath: spec.containers{istio-proxy} | |
kind: Pod | |
name: activator-6f94df488-7wp6g | |
namespace: knative-serving | |
resourceVersion: "43914" | |
uid: 43852e05-15bb-11ea-b5af-027e0b84da98 | |
kind: Event | |
lastTimestamp: "2019-12-03T12:23:30Z" | |
message: 'Readiness probe failed: Get http://172.20.58.5:15020/healthz/ready: dial | |
tcp 172.20.58.5:15020: connect: connection refused' | |
metadata: | |
creationTimestamp: "2019-12-03T12:23:12Z" | |
name: activator-6f94df488-7wp6g.15dcdbefbfa21175 | |
namespace: knative-serving | |
resourceVersion: "3470" | |
selfLink: /api/v1/namespaces/knative-serving/events/activator-6f94df488-7wp6g.15dcdbefbfa21175 | |
uid: ac765100-15c7-11ea-b5af-027e0b84da98 | |
reason: Unhealthy | |
reportingComponent: "" | |
reportingInstance: "" | |
source: | |
component: kubelet | |
host: ip-172-20-40-226.ap-southeast-1.compute.internal | |
type: Warning | |
- apiVersion: v1 | |
count: 3 | |
eventTime: null | |
firstTimestamp: "2019-12-03T12:23:14Z" | |
involvedObject: | |
apiVersion: v1 | |
fieldPath: spec.containers{activator} | |
kind: Pod | |
name: activator-6f94df488-7wp6g | |
namespace: knative-serving | |
resourceVersion: "43914" | |
uid: 43852e05-15bb-11ea-b5af-027e0b84da98 | |
kind: Event | |
lastTimestamp: "2019-12-03T12:23:34Z" | |
message: 'Liveness probe failed: Get http://172.20.58.5:8012/healthz: dial tcp 172.20.58.5:8012: | |
connect: connection refused' | |
metadata: | |
creationTimestamp: "2019-12-03T12:23:14Z" | |
name: activator-6f94df488-7wp6g.15dcdbf02d55ac55 | |
namespace: knative-serving | |
resourceVersion: "3500" | |
selfLink: /api/v1/namespaces/knative-serving/events/activator-6f94df488-7wp6g.15dcdbf02d55ac55 | |
uid: ad8f2233-15c7-11ea-b5af-027e0b84da98 | |
reason: Unhealthy | |
reportingComponent: "" | |
reportingInstance: "" | |
source: | |
component: kubelet | |
host: ip-172-20-40-226.ap-southeast-1.compute.internal | |
type: Warning | |
- apiVersion: v1 | |
count: 3 | |
eventTime: null | |
firstTimestamp: "2019-12-03T12:23:15Z" | |
involvedObject: | |
apiVersion: v1 | |
fieldPath: spec.containers{activator} | |
kind: Pod | |
name: activator-6f94df488-7wp6g | |
namespace: knative-serving | |
resourceVersion: "43914" | |
uid: 43852e05-15bb-11ea-b5af-027e0b84da98 | |
kind: Event | |
lastTimestamp: "2019-12-03T12:23:35Z" | |
message: 'Readiness probe failed: Get http://172.20.58.5:8012/healthz: dial tcp | |
172.20.58.5:8012: connect: connection refused' | |
metadata: | |
creationTimestamp: "2019-12-03T12:23:15Z" | |
name: activator-6f94df488-7wp6g.15dcdbf05b730574 | |
namespace: knative-serving | |
resourceVersion: "3501" | |
selfLink: /api/v1/namespaces/knative-serving/events/activator-6f94df488-7wp6g.15dcdbf05b730574 | |
uid: ae053396-15c7-11ea-b5af-027e0b84da98 | |
reason: Unhealthy | |
reportingComponent: "" | |
reportingInstance: "" | |
source: | |
component: kubelet | |
host: ip-172-20-40-226.ap-southeast-1.compute.internal | |
type: Warning | |
- apiVersion: v1 | |
count: 1 | |
eventTime: null | |
firstTimestamp: "2019-12-03T12:23:10Z" | |
involvedObject: | |
apiVersion: v1 | |
kind: Pod | |
name: activator-6f94df488-qtnbp | |
namespace: knative-serving | |
resourceVersion: "54502" | |
uid: ab6353bf-15c7-11ea-b5af-027e0b84da98 | |
kind: Event | |
lastTimestamp: "2019-12-03T12:23:10Z" | |
message: Successfully assigned knative-serving/activator-6f94df488-qtnbp to ip-172-20-40-226.ap-southeast-1.compute.internal | |
metadata: | |
creationTimestamp: "2019-12-03T12:23:10Z" | |
name: activator-6f94df488-qtnbp.15dcdbef55794c44 | |
namespace: knative-serving | |
resourceVersion: "3292" | |
selfLink: /api/v1/namespaces/knative-serving/events/activator-6f94df488-qtnbp.15dcdbef55794c44 | |
uid: ab66ca0c-15c7-11ea-b5af-027e0b84da98 | |
reason: Scheduled | |
reportingComponent: "" | |
reportingInstance: "" | |
source: | |
component: default-scheduler | |
type: Normal | |
- apiVersion: v1 | |
count: 1 | |
eventTime: null | |
firstTimestamp: "2019-12-03T12:23:11Z" | |
involvedObject: | |
apiVersion: v1 | |
fieldPath: spec.initContainers{istio-init} | |
kind: Pod | |
name: activator-6f94df488-qtnbp | |
namespace: knative-serving | |
resourceVersion: "54503" | |
uid: ab6353bf-15c7-11ea-b5af-027e0b84da98 | |
kind: Event | |
lastTimestamp: "2019-12-03T12:23:11Z" | |
message: Container image "docker.io/istio/proxyv2:1.4.0" already present on machine | |
metadata: | |
creationTimestamp: "2019-12-03T12:23:11Z" | |
name: activator-6f94df488-qtnbp.15dcdbef7ac22487 | |
namespace: knative-serving | |
resourceVersion: "3314" | |
selfLink: /api/v1/namespaces/knative-serving/events/activator-6f94df488-qtnbp.15dcdbef7ac22487 | |
uid: abc60179-15c7-11ea-b5af-027e0b84da98 | |
reason: Pulled | |
reportingComponent: "" | |
reportingInstance: "" | |
source: | |
component: kubelet | |
host: ip-172-20-40-226.ap-southeast-1.compute.internal | |
type: Normal | |
- apiVersion: v1 | |
count: 1 | |
eventTime: null | |
firstTimestamp: "2019-12-03T12:23:11Z" | |
involvedObject: | |
apiVersion: v1 | |
fieldPath: spec.initContainers{istio-init} | |
kind: Pod | |
name: activator-6f94df488-qtnbp | |
namespace: knative-serving | |
resourceVersion: "54503" | |
uid: ab6353bf-15c7-11ea-b5af-027e0b84da98 | |
kind: Event | |
lastTimestamp: "2019-12-03T12:23:11Z" | |
message: Created container istio-init | |
metadata: | |
creationTimestamp: "2019-12-03T12:23:11Z" | |
name: activator-6f94df488-qtnbp.15dcdbef7e3eebc0 | |
namespace: knative-serving | |
resourceVersion: "3318" | |
selfLink: /api/v1/namespaces/knative-serving/events/activator-6f94df488-qtnbp.15dcdbef7e3eebc0 | |
uid: abcf1b00-15c7-11ea-b5af-027e0b84da98 | |
reason: Created | |
reportingComponent: "" | |
reportingInstance: "" | |
source: | |
component: kubelet | |
host: ip-172-20-40-226.ap-southeast-1.compute.internal | |
type: Normal | |
- apiVersion: v1 | |
count: 1 | |
eventTime: null | |
firstTimestamp: "2019-12-03T12:23:11Z" | |
involvedObject: | |
apiVersion: v1 | |
fieldPath: spec.initContainers{istio-init} | |
kind: Pod | |
name: activator-6f94df488-qtnbp | |
namespace: knative-serving | |
resourceVersion: "54503" | |
uid: ab6353bf-15c7-11ea-b5af-027e0b84da98 | |
kind: Event | |
lastTimestamp: "2019-12-03T12:23:11Z" | |
message: Started container istio-init | |
metadata: | |
creationTimestamp: "2019-12-03T12:23:11Z" | |
name: activator-6f94df488-qtnbp.15dcdbef865b856a | |
namespace: knative-serving | |
resourceVersion: "3319" | |
selfLink: /api/v1/namespaces/knative-serving/events/activator-6f94df488-qtnbp.15dcdbef865b856a | |
uid: abe3addf-15c7-11ea-b5af-027e0b84da98 | |
reason: Started | |
reportingComponent: "" | |
reportingInstance: "" | |
source: | |
component: kubelet | |
host: ip-172-20-40-226.ap-southeast-1.compute.internal | |
type: Normal | |
- apiVersion: v1 | |
count: 2 | |
eventTime: null | |
firstTimestamp: "2019-12-03T12:23:12Z" | |
involvedObject: | |
apiVersion: v1 | |
fieldPath: spec.containers{activator} | |
kind: Pod | |
name: activator-6f94df488-qtnbp | |
namespace: knative-serving | |
resourceVersion: "54503" | |
uid: ab6353bf-15c7-11ea-b5af-027e0b84da98 | |
kind: Event | |
lastTimestamp: "2019-12-03T12:24:08Z" | |
message: Container image "gcr.io/gcp-compute-engine-223401/activator-ecd51ca5034883acbe737fde417a3d86@sha256:b2257a5f6e2427a5a96f6ea9ca2b652ee648e131e9a699df6e20b4bcfa4ef940" | |
already present on machine | |
metadata: | |
creationTimestamp: "2019-12-03T12:23:12Z" | |
name: activator-6f94df488-qtnbp.15dcdbefc6e667a6 | |
namespace: knative-serving | |
resourceVersion: "3600" | |
selfLink: /api/v1/namespaces/knative-serving/events/activator-6f94df488-qtnbp.15dcdbefc6e667a6 | |
uid: ac88ea55-15c7-11ea-b5af-027e0b84da98 | |
reason: Pulled | |
reportingComponent: "" | |
reportingInstance: "" | |
source: | |
component: kubelet | |
host: ip-172-20-40-226.ap-southeast-1.compute.internal | |
type: Normal | |
- apiVersion: v1 | |
count: 2 | |
eventTime: null | |
firstTimestamp: "2019-12-03T12:23:12Z" | |
involvedObject: | |
apiVersion: v1 | |
fieldPath: spec.containers{activator} | |
kind: Pod | |
name: activator-6f94df488-qtnbp | |
namespace: knative-serving | |
resourceVersion: "54503" | |
uid: ab6353bf-15c7-11ea-b5af-027e0b84da98 | |
kind: Event | |
lastTimestamp: "2019-12-03T12:24:08Z" | |
message: Created container activator | |
metadata: | |
creationTimestamp: "2019-12-03T12:23:12Z" | |
name: activator-6f94df488-qtnbp.15dcdbefca469be0 | |
namespace: knative-serving | |
resourceVersion: "3601" | |
selfLink: /api/v1/namespaces/knative-serving/events/activator-6f94df488-qtnbp.15dcdbefca469be0 | |
uid: ac918f6e-15c7-11ea-b5af-027e0b84da98 | |
reason: Created | |
reportingComponent: "" | |
reportingInstance: "" | |
source: | |
component: kubelet | |
host: ip-172-20-40-226.ap-southeast-1.compute.internal | |
type: Normal | |
- apiVersion: v1 | |
count: 2 | |
eventTime: null | |
firstTimestamp: "2019-12-03T12:23:12Z" | |
involvedObject: | |
apiVersion: v1 | |
fieldPath: spec.containers{activator} | |
kind: Pod | |
name: activator-6f94df488-qtnbp | |
namespace: knative-serving | |
resourceVersion: "54503" | |
uid: ab6353bf-15c7-11ea-b5af-027e0b84da98 | |
kind: Event | |
lastTimestamp: "2019-12-03T12:24:09Z" | |
message: Started container activator | |
metadata: | |
creationTimestamp: "2019-12-03T12:23:12Z" | |
name: activator-6f94df488-qtnbp.15dcdbefd50ae173 | |
namespace: knative-serving | |
resourceVersion: "3602" | |
selfLink: /api/v1/namespaces/knative-serving/events/activator-6f94df488-qtnbp.15dcdbefd50ae173 | |
uid: acad2072-15c7-11ea-b5af-027e0b84da98 | |
reason: Started | |
reportingComponent: "" | |
reportingInstance: "" | |
source: | |
component: kubelet | |
host: ip-172-20-40-226.ap-southeast-1.compute.internal | |
type: Normal | |
- apiVersion: v1 | |
count: 1 | |
eventTime: null | |
firstTimestamp: "2019-12-03T12:23:12Z" | |
involvedObject: | |
apiVersion: v1 | |
fieldPath: spec.containers{istio-proxy} | |
kind: Pod | |
name: activator-6f94df488-qtnbp | |
namespace: knative-serving | |
resourceVersion: "54503" | |
uid: ab6353bf-15c7-11ea-b5af-027e0b84da98 | |
kind: Event | |
lastTimestamp: "2019-12-03T12:23:12Z" | |
message: Container image "docker.io/istio/proxyv2:1.4.0" already present on machine | |
metadata: | |
creationTimestamp: "2019-12-03T12:23:12Z" | |
name: activator-6f94df488-qtnbp.15dcdbefd53e7cab | |
namespace: knative-serving | |
resourceVersion: "3342" | |
selfLink: /api/v1/namespaces/knative-serving/events/activator-6f94df488-qtnbp.15dcdbefd53e7cab | |
uid: acad9cbb-15c7-11ea-b5af-027e0b84da98 | |
reason: Pulled | |
reportingComponent: "" | |
reportingInstance: "" | |
source: | |
component: kubelet | |
host: ip-172-20-40-226.ap-southeast-1.compute.internal | |
type: Normal | |
- apiVersion: v1 | |
count: 1 | |
eventTime: null | |
firstTimestamp: "2019-12-03T12:23:12Z" | |
involvedObject: | |
apiVersion: v1 | |
fieldPath: spec.containers{istio-proxy} | |
kind: Pod | |
name: activator-6f94df488-qtnbp | |
namespace: knative-serving | |
resourceVersion: "54503" | |
uid: ab6353bf-15c7-11ea-b5af-027e0b84da98 | |
kind: Event | |
lastTimestamp: "2019-12-03T12:23:12Z" | |
message: Created container istio-proxy | |
metadata: | |
creationTimestamp: "2019-12-03T12:23:12Z" | |
name: activator-6f94df488-qtnbp.15dcdbefd818605e | |
namespace: knative-serving | |
resourceVersion: "3344" | |
selfLink: /api/v1/namespaces/knative-serving/events/activator-6f94df488-qtnbp.15dcdbefd818605e | |
uid: acb4ea36-15c7-11ea-b5af-027e0b84da98 | |
reason: Created | |
reportingComponent: "" | |
reportingInstance: "" | |
source: | |
component: kubelet | |
host: ip-172-20-40-226.ap-southeast-1.compute.internal | |
type: Normal | |
- apiVersion: v1 | |
count: 1 | |
eventTime: null | |
firstTimestamp: "2019-12-03T12:23:12Z" | |
involvedObject: | |
apiVersion: v1 | |
fieldPath: spec.containers{istio-proxy} | |
kind: Pod | |
name: activator-6f94df488-qtnbp | |
namespace: knative-serving | |
resourceVersion: "54503" | |
uid: ab6353bf-15c7-11ea-b5af-027e0b84da98 | |
kind: Event | |
lastTimestamp: "2019-12-03T12:23:12Z" | |
message: Started container istio-proxy | |
metadata: | |
creationTimestamp: "2019-12-03T12:23:12Z" | |
name: activator-6f94df488-qtnbp.15dcdbefe057e3b9 | |
namespace: knative-serving | |
resourceVersion: "3345" | |
selfLink: /api/v1/namespaces/knative-serving/events/activator-6f94df488-qtnbp.15dcdbefe057e3b9 | |
uid: acca01da-15c7-11ea-b5af-027e0b84da98 | |
reason: Started | |
reportingComponent: "" | |
reportingInstance: "" | |
source: | |
component: kubelet | |
host: ip-172-20-40-226.ap-southeast-1.compute.internal | |
type: Normal | |
- apiVersion: v1 | |
count: 3 | |
eventTime: null | |
firstTimestamp: "2019-12-03T12:23:18Z" | |
involvedObject: | |
apiVersion: v1 | |
fieldPath: spec.containers{activator} | |
kind: Pod | |
name: activator-6f94df488-qtnbp | |
namespace: knative-serving | |
resourceVersion: "54503" | |
uid: ab6353bf-15c7-11ea-b5af-027e0b84da98 | |
kind: Event | |
lastTimestamp: "2019-12-03T12:23:38Z" | |
message: 'Liveness probe failed: HTTP probe failed with statuscode: 500' | |
metadata: | |
creationTimestamp: "2019-12-03T12:23:18Z" | |
name: activator-6f94df488-qtnbp.15dcdbf138336007 | |
namespace: knative-serving | |
resourceVersion: "3520" | |
selfLink: /api/v1/namespaces/knative-serving/events/activator-6f94df488-qtnbp.15dcdbf138336007 | |
uid: b03a52f9-15c7-11ea-b5af-027e0b84da98 | |
reason: Unhealthy | |
reportingComponent: "" | |
reportingInstance: "" | |
source: | |
component: kubelet | |
host: ip-172-20-40-226.ap-southeast-1.compute.internal | |
type: Warning | |
- apiVersion: v1 | |
count: 5 | |
eventTime: null | |
firstTimestamp: "2019-12-03T12:23:19Z" | |
involvedObject: | |
apiVersion: v1 | |
fieldPath: spec.containers{activator} | |
kind: Pod | |
name: activator-6f94df488-qtnbp | |
namespace: knative-serving | |
resourceVersion: "54503" | |
uid: ab6353bf-15c7-11ea-b5af-027e0b84da98 | |
kind: Event | |
lastTimestamp: "2019-12-03T12:23:59Z" | |
message: 'Readiness probe failed: HTTP probe failed with statuscode: 500' | |
metadata: | |
creationTimestamp: "2019-12-03T12:23:19Z" | |
name: activator-6f94df488-qtnbp.15dcdbf179c64e3b | |
namespace: knative-serving | |
resourceVersion: "3592" | |
selfLink: /api/v1/namespaces/knative-serving/events/activator-6f94df488-qtnbp.15dcdbf179c64e3b | |
uid: b0e231d7-15c7-11ea-b5af-027e0b84da98 | |
reason: Unhealthy | |
reportingComponent: "" | |
reportingInstance: "" | |
source: | |
component: kubelet | |
host: ip-172-20-40-226.ap-southeast-1.compute.internal | |
type: Warning | |
- apiVersion: v1 | |
count: 1 | |
eventTime: null | |
firstTimestamp: "2019-12-03T12:23:38Z" | |
involvedObject: | |
apiVersion: v1 | |
fieldPath: spec.containers{activator} | |
kind: Pod | |
name: activator-6f94df488-qtnbp | |
namespace: knative-serving | |
resourceVersion: "54503" | |
uid: ab6353bf-15c7-11ea-b5af-027e0b84da98 | |
kind: Event | |
lastTimestamp: "2019-12-03T12:23:38Z" | |
message: Container activator failed liveness probe, will be restarted | |
metadata: | |
creationTimestamp: "2019-12-03T12:23:38Z" | |
name: activator-6f94df488-qtnbp.15dcdbf5e05ca76f | |
namespace: knative-serving | |
resourceVersion: "3521" | |
selfLink: /api/v1/namespaces/knative-serving/events/activator-6f94df488-qtnbp.15dcdbf5e05ca76f | |
uid: bc270488-15c7-11ea-b5af-027e0b84da98 | |
reason: Killing | |
reportingComponent: "" | |
reportingInstance: "" | |
source: | |
component: kubelet | |
host: ip-172-20-40-226.ap-southeast-1.compute.internal | |
type: Normal | |
- apiVersion: v1 | |
count: 1 | |
eventTime: null | |
firstTimestamp: "2019-12-03T12:23:10Z" | |
involvedObject: | |
apiVersion: apps/v1 | |
kind: ReplicaSet | |
name: activator-6f94df488 | |
namespace: knative-serving | |
resourceVersion: "44158" | |
uid: 437fd7fa-15bb-11ea-b5af-027e0b84da98 | |
kind: Event | |
lastTimestamp: "2019-12-03T12:23:10Z" | |
message: 'Created pod: activator-6f94df488-qtnbp' | |
metadata: | |
creationTimestamp: "2019-12-03T12:23:10Z" | |
name: activator-6f94df488.15dcdbef54cd54fc | |
namespace: knative-serving | |
resourceVersion: "3291" | |
selfLink: /api/v1/namespaces/knative-serving/events/activator-6f94df488.15dcdbef54cd54fc | |
uid: ab65547e-15c7-11ea-b5af-027e0b84da98 | |
reason: SuccessfulCreate | |
reportingComponent: "" | |
reportingInstance: "" | |
source: | |
component: replicaset-controller | |
type: Normal | |
- apiVersion: v1 | |
count: 568 | |
eventTime: null | |
firstTimestamp: "2019-12-03T10:54:37Z" | |
involvedObject: | |
apiVersion: autoscaling/v2beta2 | |
kind: HorizontalPodAutoscaler | |
name: activator | |
namespace: knative-serving | |
resourceVersion: "43918" | |
uid: 43a3dab4-15bb-11ea-b5af-027e0b84da98 | |
kind: Event | |
lastTimestamp: "2019-12-03T13:19:43Z" | |
message: 'unable to get metrics for resource cpu: unable to fetch metrics from resource | |
metrics API: the server could not find the requested resource (get pods.metrics.k8s.io)' | |
metadata: | |
creationTimestamp: "2019-12-03T10:54:37Z" | |
name: activator.15dcd71a4c56908a | |
namespace: knative-serving | |
resourceVersion: "3753" | |
selfLink: /api/v1/namespaces/knative-serving/events/activator.15dcd71a4c56908a | |
uid: 4c96b96d-15bb-11ea-b5af-027e0b84da98 | |
reason: FailedGetResourceMetric | |
reportingComponent: "" | |
reportingInstance: "" | |
source: | |
component: horizontal-pod-autoscaler | |
type: Warning | |
- apiVersion: v1 | |
count: 1 | |
eventTime: null | |
firstTimestamp: "2019-12-03T12:23:10Z" | |
involvedObject: | |
apiVersion: v1 | |
kind: Pod | |
name: autoscaler-698bf65564-fkfwb | |
namespace: knative-serving | |
resourceVersion: "54512" | |
uid: ab70f95e-15c7-11ea-b5af-027e0b84da98 | |
kind: Event | |
lastTimestamp: "2019-12-03T12:23:10Z" | |
message: Successfully assigned knative-serving/autoscaler-698bf65564-fkfwb to ip-172-20-67-65.ap-southeast-1.compute.internal | |
metadata: | |
creationTimestamp: "2019-12-03T12:23:10Z" | |
name: autoscaler-698bf65564-fkfwb.15dcdbef5c4a1ae9 | |
namespace: knative-serving | |
resourceVersion: "3296" | |
selfLink: /api/v1/namespaces/knative-serving/events/autoscaler-698bf65564-fkfwb.15dcdbef5c4a1ae9 | |
uid: ab785d5e-15c7-11ea-b5af-027e0b84da98 | |
reason: Scheduled | |
reportingComponent: "" | |
reportingInstance: "" | |
source: | |
component: default-scheduler | |
type: Normal | |
- apiVersion: v1 | |
count: 1 | |
eventTime: null | |
firstTimestamp: "2019-12-03T12:23:11Z" | |
involvedObject: | |
apiVersion: v1 | |
fieldPath: spec.initContainers{istio-init} | |
kind: Pod | |
name: autoscaler-698bf65564-fkfwb | |
namespace: knative-serving | |
resourceVersion: "54514" | |
uid: ab70f95e-15c7-11ea-b5af-027e0b84da98 | |
kind: Event | |
lastTimestamp: "2019-12-03T12:23:11Z" | |
message: Container image "docker.io/istio/proxyv2:1.4.0" already present on machine | |
metadata: | |
creationTimestamp: "2019-12-03T12:23:11Z" | |
name: autoscaler-698bf65564-fkfwb.15dcdbef95545e0e | |
namespace: knative-serving | |
resourceVersion: "3323" | |
selfLink: /api/v1/namespaces/knative-serving/events/autoscaler-698bf65564-fkfwb.15dcdbef95545e0e | |
uid: ac09f6ee-15c7-11ea-b5af-027e0b84da98 | |
reason: Pulled | |
reportingComponent: "" | |
reportingInstance: "" | |
source: | |
component: kubelet | |
host: ip-172-20-67-65.ap-southeast-1.compute.internal | |
type: Normal | |
- apiVersion: v1 | |
count: 1 | |
eventTime: null | |
firstTimestamp: "2019-12-03T12:23:11Z" | |
involvedObject: | |
apiVersion: v1 | |
fieldPath: spec.initContainers{istio-init} | |
kind: Pod | |
name: autoscaler-698bf65564-fkfwb | |
namespace: knative-serving | |
resourceVersion: "54514" | |
uid: ab70f95e-15c7-11ea-b5af-027e0b84da98 | |
kind: Event | |
lastTimestamp: "2019-12-03T12:23:11Z" | |
message: Created container istio-init | |
metadata: | |
creationTimestamp: "2019-12-03T12:23:11Z" | |
name: autoscaler-698bf65564-fkfwb.15dcdbef98be6cf7 | |
namespace: knative-serving | |
resourceVersion: "3324" | |
selfLink: /api/v1/namespaces/knative-serving/events/autoscaler-698bf65564-fkfwb.15dcdbef98be6cf7 | |
uid: ac12b983-15c7-11ea-b5af-027e0b84da98 | |
reason: Created | |
reportingComponent: "" | |
reportingInstance: "" | |
source: | |
component: kubelet | |
host: ip-172-20-67-65.ap-southeast-1.compute.internal | |
type: Normal | |
- apiVersion: v1 | |
count: 1 | |
eventTime: null | |
firstTimestamp: "2019-12-03T12:23:12Z" | |
involvedObject: | |
apiVersion: v1 | |
fieldPath: spec.initContainers{istio-init} | |
kind: Pod | |
name: autoscaler-698bf65564-fkfwb | |
namespace: knative-serving | |
resourceVersion: "54514" | |
uid: ab70f95e-15c7-11ea-b5af-027e0b84da98 | |
kind: Event | |
lastTimestamp: "2019-12-03T12:23:12Z" | |
message: Started container istio-init | |
metadata: | |
creationTimestamp: "2019-12-03T12:23:12Z" | |
name: autoscaler-698bf65564-fkfwb.15dcdbefaa1a12e1 | |
namespace: knative-serving | |
resourceVersion: "3331" | |
selfLink: /api/v1/namespaces/knative-serving/events/autoscaler-698bf65564-fkfwb.15dcdbefaa1a12e1 | |
uid: ac3f2e0c-15c7-11ea-b5af-027e0b84da98 | |
reason: Started | |
reportingComponent: "" | |
reportingInstance: "" | |
source: | |
component: kubelet | |
host: ip-172-20-67-65.ap-southeast-1.compute.internal | |
type: Normal | |
- apiVersion: v1 | |
count: 1 | |
eventTime: null | |
firstTimestamp: "2019-12-03T12:23:12Z" | |
involvedObject: | |
apiVersion: v1 | |
fieldPath: spec.containers{autoscaler} | |
kind: Pod | |
name: autoscaler-698bf65564-fkfwb | |
namespace: knative-serving | |
resourceVersion: "54514" | |
uid: ab70f95e-15c7-11ea-b5af-027e0b84da98 | |
kind: Event | |
lastTimestamp: "2019-12-03T12:23:12Z" | |
message: Pulling image "gcr.io/gcp-compute-engine-223401/autoscaler-12c0fa24db31956a7cfa673210e4fa13@sha256:f74987342b3c7bcb8b95006f98a8efcfa19bd518430844df037cd5f29132c997" | |
metadata: | |
creationTimestamp: "2019-12-03T12:23:12Z" | |
name: autoscaler-698bf65564-fkfwb.15dcdbefd72bc238 | |
namespace: knative-serving | |
resourceVersion: "3343" | |
selfLink: /api/v1/namespaces/knative-serving/events/autoscaler-698bf65564-fkfwb.15dcdbefd72bc238 | |
uid: acb28b50-15c7-11ea-b5af-027e0b84da98 | |
reason: Pulling | |
reportingComponent: "" | |
reportingInstance: "" | |
source: | |
component: kubelet | |
host: ip-172-20-67-65.ap-southeast-1.compute.internal | |
type: Normal | |
- apiVersion: v1 | |
count: 1 | |
eventTime: null | |
firstTimestamp: "2019-12-03T12:23:17Z" | |
involvedObject: | |
apiVersion: v1 | |
fieldPath: spec.containers{autoscaler} | |
kind: Pod | |
name: autoscaler-698bf65564-fkfwb | |
namespace: knative-serving | |
resourceVersion: "54514" | |
uid: ab70f95e-15c7-11ea-b5af-027e0b84da98 | |
kind: Event | |
lastTimestamp: "2019-12-03T12:23:17Z" | |
message: Successfully pulled image "gcr.io/gcp-compute-engine-223401/autoscaler-12c0fa24db31956a7cfa673210e4fa13@sha256:f74987342b3c7bcb8b95006f98a8efcfa19bd518430844df037cd5f29132c997" | |
metadata: | |
creationTimestamp: "2019-12-03T12:23:17Z" | |
name: autoscaler-698bf65564-fkfwb.15dcdbf0de31b9a7 | |
namespace: knative-serving | |
resourceVersion: "3359" | |
selfLink: /api/v1/namespaces/knative-serving/events/autoscaler-698bf65564-fkfwb.15dcdbf0de31b9a7 | |
uid: af53e620-15c7-11ea-b5af-027e0b84da98 | |
reason: Pulled | |
reportingComponent: "" | |
reportingInstance: "" | |
source: | |
component: kubelet | |
host: ip-172-20-67-65.ap-southeast-1.compute.internal | |
type: Normal | |
- apiVersion: v1 | |
count: 3 | |
eventTime: null | |
firstTimestamp: "2019-12-03T12:23:17Z" | |
involvedObject: | |
apiVersion: v1 | |
fieldPath: spec.containers{autoscaler} | |
kind: Pod | |
name: autoscaler-698bf65564-fkfwb | |
namespace: knative-serving | |
resourceVersion: "54514" | |
uid: ab70f95e-15c7-11ea-b5af-027e0b84da98 | |
kind: Event | |
lastTimestamp: "2019-12-03T12:23:38Z" | |
message: Created container autoscaler | |
metadata: | |
creationTimestamp: "2019-12-03T12:23:17Z" | |
name: autoscaler-698bf65564-fkfwb.15dcdbf0e18bceb1 | |
namespace: knative-serving | |
resourceVersion: "3523" | |
selfLink: /api/v1/namespaces/knative-serving/events/autoscaler-698bf65564-fkfwb.15dcdbf0e18bceb1 | |
uid: af5c7a4a-15c7-11ea-b5af-027e0b84da98 | |
reason: Created | |
reportingComponent: "" | |
reportingInstance: "" | |
source: | |
component: kubelet | |
host: ip-172-20-67-65.ap-southeast-1.compute.internal | |
type: Normal | |
- apiVersion: v1 | |
count: 3 | |
eventTime: null | |
firstTimestamp: "2019-12-03T12:23:17Z" | |
involvedObject: | |
apiVersion: v1 | |
fieldPath: spec.containers{autoscaler} | |
kind: Pod | |
name: autoscaler-698bf65564-fkfwb | |
namespace: knative-serving | |
resourceVersion: "54514" | |
uid: ab70f95e-15c7-11ea-b5af-027e0b84da98 | |
kind: Event | |
lastTimestamp: "2019-12-03T12:23:39Z" | |
message: Started container autoscaler | |
metadata: | |
creationTimestamp: "2019-12-03T12:23:17Z" | |
name: autoscaler-698bf65564-fkfwb.15dcdbf0efda9543 | |
namespace: knative-serving | |
resourceVersion: "3524" | |
selfLink: /api/v1/namespaces/knative-serving/events/autoscaler-698bf65564-fkfwb.15dcdbf0efda9543 | |
uid: af811028-15c7-11ea-b5af-027e0b84da98 | |
reason: Started | |
reportingComponent: "" | |
reportingInstance: "" | |
source: | |
component: kubelet | |
host: ip-172-20-67-65.ap-southeast-1.compute.internal | |
type: Normal | |
- apiVersion: v1 | |
count: 1 | |
eventTime: null | |
firstTimestamp: "2019-12-03T12:23:17Z" | |
involvedObject: | |
apiVersion: v1 | |
fieldPath: spec.containers{istio-proxy} | |
kind: Pod | |
name: autoscaler-698bf65564-fkfwb | |
namespace: knative-serving | |
resourceVersion: "54514" | |
uid: ab70f95e-15c7-11ea-b5af-027e0b84da98 | |
kind: Event | |
lastTimestamp: "2019-12-03T12:23:17Z" | |
message: Container image "docker.io/istio/proxyv2:1.4.0" already present on machine | |
metadata: | |
creationTimestamp: "2019-12-03T12:23:17Z" | |
name: autoscaler-698bf65564-fkfwb.15dcdbf0f009a9a4 | |
namespace: knative-serving | |
resourceVersion: "3365" | |
selfLink: /api/v1/namespaces/knative-serving/events/autoscaler-698bf65564-fkfwb.15dcdbf0f009a9a4 | |
uid: af818d56-15c7-11ea-b5af-027e0b84da98 | |
reason: Pulled | |
reportingComponent: "" | |
reportingInstance: "" | |
source: | |
component: kubelet | |
host: ip-172-20-67-65.ap-southeast-1.compute.internal | |
type: Normal | |
- apiVersion: v1 | |
count: 1 | |
eventTime: null | |
firstTimestamp: "2019-12-03T12:23:17Z" | |
involvedObject: | |
apiVersion: v1 | |
fieldPath: spec.containers{istio-proxy} | |
kind: Pod | |
name: autoscaler-698bf65564-fkfwb | |
namespace: knative-serving | |
resourceVersion: "54514" | |
uid: ab70f95e-15c7-11ea-b5af-027e0b84da98 | |
kind: Event | |
lastTimestamp: "2019-12-03T12:23:17Z" | |
message: Created container istio-proxy | |
metadata: | |
creationTimestamp: "2019-12-03T12:23:17Z" | |
name: autoscaler-698bf65564-fkfwb.15dcdbf0f2724a2a | |
namespace: knative-serving | |
resourceVersion: "3366" | |
selfLink: /api/v1/namespaces/knative-serving/events/autoscaler-698bf65564-fkfwb.15dcdbf0f2724a2a | |
uid: af87cb40-15c7-11ea-b5af-027e0b84da98 | |
reason: Created | |
reportingComponent: "" | |
reportingInstance: "" | |
source: | |
component: kubelet | |
host: ip-172-20-67-65.ap-southeast-1.compute.internal | |
type: Normal | |
- apiVersion: v1 | |
count: 1 | |
eventTime: null | |
firstTimestamp: "2019-12-03T12:23:17Z" | |
involvedObject: | |
apiVersion: v1 | |
fieldPath: spec.containers{istio-proxy} | |
kind: Pod | |
name: autoscaler-698bf65564-fkfwb | |
namespace: knative-serving | |
resourceVersion: "54514" | |
uid: ab70f95e-15c7-11ea-b5af-027e0b84da98 | |
kind: Event | |
lastTimestamp: "2019-12-03T12:23:17Z" | |
message: Started container istio-proxy | |
metadata: | |
creationTimestamp: "2019-12-03T12:23:17Z" | |
name: autoscaler-698bf65564-fkfwb.15dcdbf0fae37338 | |
namespace: knative-serving | |
resourceVersion: "3367" | |
selfLink: /api/v1/namespaces/knative-serving/events/autoscaler-698bf65564-fkfwb.15dcdbf0fae37338 | |
uid: af9d587c-15c7-11ea-b5af-027e0b84da98 | |
reason: Started | |
reportingComponent: "" | |
reportingInstance: "" | |
source: | |
component: kubelet | |
host: ip-172-20-67-65.ap-southeast-1.compute.internal | |
type: Normal | |
- apiVersion: v1 | |
count: 2 | |
eventTime: null | |
firstTimestamp: "2019-12-03T12:23:17Z" | |
involvedObject: | |
apiVersion: v1 | |
fieldPath: spec.containers{autoscaler} | |
kind: Pod | |
name: autoscaler-698bf65564-fkfwb | |
namespace: knative-serving | |
resourceVersion: "54514" | |
uid: ab70f95e-15c7-11ea-b5af-027e0b84da98 | |
kind: Event | |
lastTimestamp: "2019-12-03T12:23:38Z" | |
message: Container image "gcr.io/gcp-compute-engine-223401/autoscaler-12c0fa24db31956a7cfa673210e4fa13@sha256:f74987342b3c7bcb8b95006f98a8efcfa19bd518430844df037cd5f29132c997" | |
already present on machine | |
metadata: | |
creationTimestamp: "2019-12-03T12:23:17Z" | |
name: autoscaler-698bf65564-fkfwb.15dcdbf10535d484 | |
namespace: knative-serving | |
resourceVersion: "3522" | |
selfLink: /api/v1/namespaces/knative-serving/events/autoscaler-698bf65564-fkfwb.15dcdbf10535d484 | |
uid: afb7bb3a-15c7-11ea-b5af-027e0b84da98 | |
reason: Pulled | |
reportingComponent: "" | |
reportingInstance: "" | |
source: | |
component: kubelet | |
host: ip-172-20-67-65.ap-southeast-1.compute.internal | |
type: Normal | |
- apiVersion: v1 | |
count: 3 | |
eventTime: null | |
firstTimestamp: "2019-12-03T12:23:18Z" | |
involvedObject: | |
apiVersion: v1 | |
fieldPath: spec.containers{autoscaler} | |
kind: Pod | |
name: autoscaler-698bf65564-fkfwb | |
namespace: knative-serving | |
resourceVersion: "54514" | |
uid: ab70f95e-15c7-11ea-b5af-027e0b84da98 | |
kind: Event | |
lastTimestamp: "2019-12-03T12:23:23Z" | |
message: Back-off restarting failed container | |
metadata: | |
creationTimestamp: "2019-12-03T12:23:18Z" | |
name: autoscaler-698bf65564-fkfwb.15dcdbf14216d3f1 | |
namespace: knative-serving | |
resourceVersion: "3387" | |
selfLink: /api/v1/namespaces/knative-serving/events/autoscaler-698bf65564-fkfwb.15dcdbf14216d3f1 | |
uid: b053a6bb-15c7-11ea-b5af-027e0b84da98 | |
reason: BackOff | |
reportingComponent: "" | |
reportingInstance: "" | |
source: | |
component: kubelet | |
host: ip-172-20-67-65.ap-southeast-1.compute.internal | |
type: Warning | |
- apiVersion: v1 | |
count: 1 | |
eventTime: null | |
firstTimestamp: "2019-12-03T12:23:10Z" | |
involvedObject: | |
apiVersion: v1 | |
fieldPath: spec.containers{istio-proxy} | |
kind: Pod | |
name: autoscaler-698bf65564-nsdc7 | |
namespace: knative-serving | |
resourceVersion: "43941" | |
uid: 4446c57f-15bb-11ea-b5af-027e0b84da98 | |
kind: Event | |
lastTimestamp: "2019-12-03T12:23:10Z" | |
message: Stopping container istio-proxy | |
metadata: | |
creationTimestamp: "2019-12-03T12:23:10Z" | |
name: autoscaler-698bf65564-nsdc7.15dcdbef581cc736 | |
namespace: knative-serving | |
resourceVersion: "3294" | |
selfLink: /api/v1/namespaces/knative-serving/events/autoscaler-698bf65564-nsdc7.15dcdbef581cc736 | |
uid: ab6efd69-15c7-11ea-b5af-027e0b84da98 | |
reason: Killing | |
reportingComponent: "" | |
reportingInstance: "" | |
source: | |
component: kubelet | |
host: ip-172-20-83-101.ap-southeast-1.compute.internal | |
type: Normal | |
- apiVersion: v1 | |
count: 1 | |
eventTime: null | |
firstTimestamp: "2019-12-03T12:23:10Z" | |
involvedObject: | |
apiVersion: v1 | |
fieldPath: spec.containers{autoscaler} | |
kind: Pod | |
name: autoscaler-698bf65564-nsdc7 | |
namespace: knative-serving | |
resourceVersion: "43941" | |
uid: 4446c57f-15bb-11ea-b5af-027e0b84da98 | |
kind: Event | |
lastTimestamp: "2019-12-03T12:23:10Z" | |
message: Stopping container autoscaler | |
metadata: | |
creationTimestamp: "2019-12-03T12:23:10Z" | |
name: autoscaler-698bf65564-nsdc7.15dcdbef5820cee7 | |
namespace: knative-serving | |
resourceVersion: "3293" | |
selfLink: /api/v1/namespaces/knative-serving/events/autoscaler-698bf65564-nsdc7.15dcdbef5820cee7 | |
uid: ab6d6575-15c7-11ea-b5af-027e0b84da98 | |
reason: Killing | |
reportingComponent: "" | |
reportingInstance: "" | |
source: | |
component: kubelet | |
host: ip-172-20-83-101.ap-southeast-1.compute.internal | |
type: Normal | |
- apiVersion: v1 | |
count: 10 | |
eventTime: null | |
firstTimestamp: "2019-12-03T12:23:11Z" | |
involvedObject: | |
apiVersion: v1 | |
fieldPath: spec.containers{istio-proxy} | |
kind: Pod | |
name: autoscaler-698bf65564-nsdc7 | |
namespace: knative-serving | |
resourceVersion: "43941" | |
uid: 4446c57f-15bb-11ea-b5af-027e0b84da98 | |
kind: Event | |
lastTimestamp: "2019-12-03T12:23:29Z" | |
message: 'Readiness probe failed: Get http://172.20.79.20:15020/healthz/ready: dial | |
tcp 172.20.79.20:15020: connect: connection refused' | |
metadata: | |
creationTimestamp: "2019-12-03T12:23:11Z" | |
name: autoscaler-698bf65564-nsdc7.15dcdbef89c4d377 | |
namespace: knative-serving | |
resourceVersion: "3466" | |
selfLink: /api/v1/namespaces/knative-serving/events/autoscaler-698bf65564-nsdc7.15dcdbef89c4d377 | |
uid: abec68ca-15c7-11ea-b5af-027e0b84da98 | |
reason: Unhealthy | |
reportingComponent: "" | |
reportingInstance: "" | |
source: | |
component: kubelet | |
host: ip-172-20-83-101.ap-southeast-1.compute.internal | |
type: Warning | |
- apiVersion: v1 | |
count: 1 | |
eventTime: null | |
firstTimestamp: "2019-12-03T12:23:10Z" | |
involvedObject: | |
apiVersion: apps/v1 | |
kind: ReplicaSet | |
name: autoscaler-698bf65564 | |
namespace: knative-serving | |
resourceVersion: "44043" | |
uid: 4443a853-15bb-11ea-b5af-027e0b84da98 | |
kind: Event | |
lastTimestamp: "2019-12-03T12:23:10Z" | |
message: 'Created pod: autoscaler-698bf65564-fkfwb' | |
metadata: | |
creationTimestamp: "2019-12-03T12:23:10Z" | |
name: autoscaler-698bf65564.15dcdbef5a5c27ed | |
namespace: knative-serving | |
resourceVersion: "3295" | |
selfLink: /api/v1/namespaces/knative-serving/events/autoscaler-698bf65564.15dcdbef5a5c27ed | |
uid: ab737244-15c7-11ea-b5af-027e0b84da98 | |
reason: SuccessfulCreate | |
reportingComponent: "" | |
reportingInstance: "" | |
source: | |
component: replicaset-controller | |
type: Normal | |
- apiVersion: v1 | |
count: 1 | |
eventTime: null | |
firstTimestamp: "2019-12-03T12:23:10Z" | |
involvedObject: | |
apiVersion: v1 | |
kind: Pod | |
name: autoscaler-hpa-555cf99b79-fc2j5 | |
namespace: knative-serving | |
resourceVersion: "54519" | |
uid: ab7b3a04-15c7-11ea-b5af-027e0b84da98 | |
kind: Event | |
lastTimestamp: "2019-12-03T12:23:10Z" | |
message: Successfully assigned knative-serving/autoscaler-hpa-555cf99b79-fc2j5 to | |
ip-172-20-83-101.ap-southeast-1.compute.internal | |
metadata: | |
creationTimestamp: "2019-12-03T12:23:10Z" | |
name: autoscaler-hpa-555cf99b79-fc2j5.15dcdbef603920fe | |
namespace: knative-serving | |
resourceVersion: "3299" | |
selfLink: /api/v1/namespaces/knative-serving/events/autoscaler-hpa-555cf99b79-fc2j5.15dcdbef603920fe | |
uid: ab823dbb-15c7-11ea-b5af-027e0b84da98 | |
reason: Scheduled | |
reportingComponent: "" | |
reportingInstance: "" | |
source: | |
component: default-scheduler | |
type: Normal | |
- apiVersion: v1 | |
count: 1 | |
eventTime: null | |
firstTimestamp: "2019-12-03T12:23:11Z" | |
involvedObject: | |
apiVersion: v1 | |
fieldPath: spec.containers{autoscaler-hpa} | |
kind: Pod | |
name: autoscaler-hpa-555cf99b79-fc2j5 | |
namespace: knative-serving | |
resourceVersion: "54523" | |
uid: ab7b3a04-15c7-11ea-b5af-027e0b84da98 | |
kind: Event | |
lastTimestamp: "2019-12-03T12:23:11Z" | |
message: Pulling image "gcr.io/gcp-compute-engine-223401/autoscaler-hpa-85c0b68178743d74ff7f663a72802ceb@sha256:24e81ede4cc223f0f70a1630fc4bed30308eb7b406715dbdd2280827f7565eec" | |
metadata: | |
creationTimestamp: "2019-12-03T12:23:11Z" | |
name: autoscaler-hpa-555cf99b79-fc2j5.15dcdbef8f9a99a1 | |
namespace: knative-serving | |
resourceVersion: "3321" | |
selfLink: /api/v1/namespaces/knative-serving/events/autoscaler-hpa-555cf99b79-fc2j5.15dcdbef8f9a99a1 | |
uid: abfb5dbe-15c7-11ea-b5af-027e0b84da98 | |
reason: Pulling | |
reportingComponent: "" | |
reportingInstance: "" | |
source: | |
component: kubelet | |
host: ip-172-20-83-101.ap-southeast-1.compute.internal | |
type: Normal | |
- apiVersion: v1 | |
count: 1 | |
eventTime: null | |
firstTimestamp: "2019-12-03T12:23:16Z" | |
involvedObject: | |
apiVersion: v1 | |
fieldPath: spec.containers{autoscaler-hpa} | |
kind: Pod | |
name: autoscaler-hpa-555cf99b79-fc2j5 | |
namespace: knative-serving | |
resourceVersion: "54523" | |
uid: ab7b3a04-15c7-11ea-b5af-027e0b84da98 | |
kind: Event | |
lastTimestamp: "2019-12-03T12:23:16Z" | |
message: Successfully pulled image "gcr.io/gcp-compute-engine-223401/autoscaler-hpa-85c0b68178743d74ff7f663a72802ceb@sha256:24e81ede4cc223f0f70a1630fc4bed30308eb7b406715dbdd2280827f7565eec" | |
metadata: | |
creationTimestamp: "2019-12-03T12:23:16Z" | |
name: autoscaler-hpa-555cf99b79-fc2j5.15dcdbf0a27aa8da | |
namespace: knative-serving | |
resourceVersion: "3355" | |
selfLink: /api/v1/namespaces/knative-serving/events/autoscaler-hpa-555cf99b79-fc2j5.15dcdbf0a27aa8da | |
uid: aebb18aa-15c7-11ea-b5af-027e0b84da98 | |
reason: Pulled | |
reportingComponent: "" | |
reportingInstance: "" | |
source: | |
component: kubelet | |
host: ip-172-20-83-101.ap-southeast-1.compute.internal | |
type: Normal | |
- apiVersion: v1 | |
count: 1 | |
eventTime: null | |
firstTimestamp: "2019-12-03T12:23:16Z" | |
involvedObject: | |
apiVersion: v1 | |
fieldPath: spec.containers{autoscaler-hpa} | |
kind: Pod | |
name: autoscaler-hpa-555cf99b79-fc2j5 | |
namespace: knative-serving | |
resourceVersion: "54523" | |
uid: ab7b3a04-15c7-11ea-b5af-027e0b84da98 | |
kind: Event | |
lastTimestamp: "2019-12-03T12:23:16Z" | |
message: Created container autoscaler-hpa | |
metadata: | |
creationTimestamp: "2019-12-03T12:23:16Z" | |
name: autoscaler-hpa-555cf99b79-fc2j5.15dcdbf0a518c8b3 | |
namespace: knative-serving | |
resourceVersion: "3356" | |
selfLink: /api/v1/namespaces/knative-serving/events/autoscaler-hpa-555cf99b79-fc2j5.15dcdbf0a518c8b3 | |
uid: aec1bb92-15c7-11ea-b5af-027e0b84da98 | |
reason: Created | |
reportingComponent: "" | |
reportingInstance: "" | |
source: | |
component: kubelet | |
host: ip-172-20-83-101.ap-southeast-1.compute.internal | |
type: Normal | |
- apiVersion: v1 | |
count: 1 | |
eventTime: null | |
firstTimestamp: "2019-12-03T12:23:16Z" | |
involvedObject: | |
apiVersion: v1 | |
fieldPath: spec.containers{autoscaler-hpa} | |
kind: Pod | |
name: autoscaler-hpa-555cf99b79-fc2j5 | |
namespace: knative-serving | |
resourceVersion: "54523" | |
uid: ab7b3a04-15c7-11ea-b5af-027e0b84da98 | |
kind: Event | |
lastTimestamp: "2019-12-03T12:23:16Z" | |
message: Started container autoscaler-hpa | |
metadata: | |
creationTimestamp: "2019-12-03T12:23:16Z" | |
name: autoscaler-hpa-555cf99b79-fc2j5.15dcdbf0aee62e59 | |
namespace: knative-serving | |
resourceVersion: "3358" | |
selfLink: /api/v1/namespaces/knative-serving/events/autoscaler-hpa-555cf99b79-fc2j5.15dcdbf0aee62e59 | |
uid: aedad0ed-15c7-11ea-b5af-027e0b84da98 | |
reason: Started | |
reportingComponent: "" | |
reportingInstance: "" | |
source: | |
component: kubelet | |
host: ip-172-20-83-101.ap-southeast-1.compute.internal | |
type: Normal | |
- apiVersion: v1 | |
count: 1 | |
eventTime: null | |
firstTimestamp: "2019-12-03T12:23:10Z" | |
involvedObject: | |
apiVersion: v1 | |
fieldPath: spec.containers{autoscaler-hpa} | |
kind: Pod | |
name: autoscaler-hpa-555cf99b79-qpvbj | |
namespace: knative-serving | |
resourceVersion: "43926" | |
uid: 43f7a4bf-15bb-11ea-b5af-027e0b84da98 | |
kind: Event | |
lastTimestamp: "2019-12-03T12:23:10Z" | |
message: Stopping container autoscaler-hpa | |
metadata: | |
creationTimestamp: "2019-12-03T12:23:10Z" | |
name: autoscaler-hpa-555cf99b79-qpvbj.15dcdbef5d7c51d8 | |
namespace: knative-serving | |
resourceVersion: "3297" | |
selfLink: /api/v1/namespaces/knative-serving/events/autoscaler-hpa-555cf99b79-qpvbj.15dcdbef5d7c51d8 | |
uid: ab7b0684-15c7-11ea-b5af-027e0b84da98 | |
reason: Killing | |
reportingComponent: "" | |
reportingInstance: "" | |
source: | |
component: kubelet | |
host: ip-172-20-67-65.ap-southeast-1.compute.internal | |
type: Normal | |
- apiVersion: v1 | |
count: 1 | |
eventTime: null | |
firstTimestamp: "2019-12-03T12:23:10Z" | |
involvedObject: | |
apiVersion: apps/v1 | |
kind: ReplicaSet | |
name: autoscaler-hpa-555cf99b79 | |
namespace: knative-serving | |
resourceVersion: "44034" | |
uid: 43f57444-15bb-11ea-b5af-027e0b84da98 | |
kind: Event | |
lastTimestamp: "2019-12-03T12:23:10Z" | |
message: 'Created pod: autoscaler-hpa-555cf99b79-fc2j5' | |
metadata: | |
creationTimestamp: "2019-12-03T12:23:10Z" | |
name: autoscaler-hpa-555cf99b79.15dcdbef5e081a5b | |
namespace: knative-serving | |
resourceVersion: "3298" | |
selfLink: /api/v1/namespaces/knative-serving/events/autoscaler-hpa-555cf99b79.15dcdbef5e081a5b | |
uid: ab7cf506-15c7-11ea-b5af-027e0b84da98 | |
reason: SuccessfulCreate | |
reportingComponent: "" | |
reportingInstance: "" | |
source: | |
component: replicaset-controller | |
type: Normal | |
- apiVersion: v1 | |
count: 1 | |
eventTime: null | |
firstTimestamp: "2019-12-03T12:23:36Z" | |
involvedObject: | |
apiVersion: v1 | |
kind: Endpoints | |
name: autoscaler | |
namespace: knative-serving | |
resourceVersion: "54816" | |
uid: 441b85ed-15bb-11ea-b5af-027e0b84da98 | |
kind: Event | |
lastTimestamp: "2019-12-03T12:23:36Z" | |
message: 'Failed to update endpoint knative-serving/autoscaler: Operation cannot | |
be fulfilled on endpoints "autoscaler": the object has been modified; please apply | |
your changes to the latest version and try again' | |
metadata: | |
creationTimestamp: "2019-12-03T12:23:36Z" | |
name: autoscaler.15dcdbf564984a25 | |
namespace: knative-serving | |
resourceVersion: "3509" | |
selfLink: /api/v1/namespaces/knative-serving/events/autoscaler.15dcdbf564984a25 | |
uid: bae9598f-15c7-11ea-b5af-027e0b84da98 | |
reason: FailedToUpdateEndpoint | |
reportingComponent: "" | |
reportingInstance: "" | |
source: | |
component: endpoint-controller | |
type: Warning | |
- apiVersion: v1 | |
count: 1 | |
eventTime: null | |
firstTimestamp: "2019-12-03T12:23:10Z" | |
involvedObject: | |
apiVersion: v1 | |
fieldPath: spec.containers{controller} | |
kind: Pod | |
name: controller-7667dd8fcb-flj6n | |
namespace: knative-serving | |
resourceVersion: "43975" | |
uid: 46239569-15bb-11ea-b5af-027e0b84da98 | |
kind: Event | |
lastTimestamp: "2019-12-03T12:23:10Z" | |
message: Stopping container controller | |
metadata: | |
creationTimestamp: "2019-12-03T12:23:10Z" | |
name: controller-7667dd8fcb-flj6n.15dcdbef632d7916 | |
namespace: knative-serving | |
resourceVersion: "3300" | |
selfLink: /api/v1/namespaces/knative-serving/events/controller-7667dd8fcb-flj6n.15dcdbef632d7916 | |
uid: ab89a54d-15c7-11ea-b5af-027e0b84da98 | |
reason: Killing | |
reportingComponent: "" | |
reportingInstance: "" | |
source: | |
component: kubelet | |
host: ip-172-20-67-65.ap-southeast-1.compute.internal | |
type: Normal | |
- apiVersion: v1 | |
count: 1 | |
eventTime: null | |
firstTimestamp: "2019-12-03T12:23:10Z" | |
involvedObject: | |
apiVersion: v1 | |
kind: Pod | |
name: controller-7667dd8fcb-tdhhj | |
namespace: knative-serving | |
resourceVersion: "54529" | |
uid: ab89550a-15c7-11ea-b5af-027e0b84da98 | |
kind: Event | |
lastTimestamp: "2019-12-03T12:23:10Z" | |
message: Successfully assigned knative-serving/controller-7667dd8fcb-tdhhj to ip-172-20-67-65.ap-southeast-1.compute.internal | |
metadata: | |
creationTimestamp: "2019-12-03T12:23:10Z" | |
name: controller-7667dd8fcb-tdhhj.15dcdbef64e3ce9e | |
namespace: knative-serving | |
resourceVersion: "3302" | |
selfLink: /api/v1/namespaces/knative-serving/events/controller-7667dd8fcb-tdhhj.15dcdbef64e3ce9e | |
uid: ab8e4bee-15c7-11ea-b5af-027e0b84da98 | |
reason: Scheduled | |
reportingComponent: "" | |
reportingInstance: "" | |
source: | |
component: default-scheduler | |
type: Normal | |
- apiVersion: v1 | |
count: 1 | |
eventTime: null | |
firstTimestamp: "2019-12-03T12:23:11Z" | |
involvedObject: | |
apiVersion: v1 | |
fieldPath: spec.containers{controller} | |
kind: Pod | |
name: controller-7667dd8fcb-tdhhj | |
namespace: knative-serving | |
resourceVersion: "54531" | |
uid: ab89550a-15c7-11ea-b5af-027e0b84da98 | |
kind: Event | |
lastTimestamp: "2019-12-03T12:23:11Z" | |
message: Container image "gcr.io/gcp-compute-engine-223401/controller-f6fdb41c6acbc726e29a3104ff2ef720@sha256:7cde59d7e5e3f7891b57fb51ade68929b5220df54b70dc027a62018c54fe23d3" | |
already present on machine | |
metadata: | |
creationTimestamp: "2019-12-03T12:23:11Z" | |
name: controller-7667dd8fcb-tdhhj.15dcdbef9b09fa2f | |
namespace: knative-serving | |
resourceVersion: "3325" | |
selfLink: /api/v1/namespaces/knative-serving/events/controller-7667dd8fcb-tdhhj.15dcdbef9b09fa2f | |
uid: ac18a2f4-15c7-11ea-b5af-027e0b84da98 | |
reason: Pulled | |
reportingComponent: "" | |
reportingInstance: "" | |
source: | |
component: kubelet | |
host: ip-172-20-67-65.ap-southeast-1.compute.internal | |
type: Normal | |
- apiVersion: v1 | |
count: 1 | |
eventTime: null | |
firstTimestamp: "2019-12-03T12:23:11Z" | |
involvedObject: | |
apiVersion: v1 | |
fieldPath: spec.containers{controller} | |
kind: Pod | |
name: controller-7667dd8fcb-tdhhj | |
namespace: knative-serving | |
resourceVersion: "54531" | |
uid: ab89550a-15c7-11ea-b5af-027e0b84da98 | |
kind: Event | |
lastTimestamp: "2019-12-03T12:23:11Z" | |
message: Created container controller | |
metadata: | |
creationTimestamp: "2019-12-03T12:23:11Z" | |
name: controller-7667dd8fcb-tdhhj.15dcdbef9df41071 | |
namespace: knative-serving | |
resourceVersion: "3326" | |
selfLink: /api/v1/namespaces/knative-serving/events/controller-7667dd8fcb-tdhhj.15dcdbef9df41071 | |
uid: ac200de7-15c7-11ea-b5af-027e0b84da98 | |
reason: Created | |
reportingComponent: "" | |
reportingInstance: "" | |
source: | |
component: kubelet | |
host: ip-172-20-67-65.ap-southeast-1.compute.internal | |
type: Normal | |
- apiVersion: v1 | |
count: 1 | |
eventTime: null | |
firstTimestamp: "2019-12-03T12:23:12Z" | |
involvedObject: | |
apiVersion: v1 | |
fieldPath: spec.containers{controller} | |
kind: Pod | |
name: controller-7667dd8fcb-tdhhj | |
namespace: knative-serving | |
resourceVersion: "54531" | |
uid: ab89550a-15c7-11ea-b5af-027e0b84da98 | |
kind: Event | |
lastTimestamp: "2019-12-03T12:23:12Z" | |
message: Started container controller | |
metadata: | |
creationTimestamp: "2019-12-03T12:23:12Z" | |
name: controller-7667dd8fcb-tdhhj.15dcdbefab7f69fe | |
namespace: knative-serving | |
resourceVersion: "3332" | |
selfLink: /api/v1/namespaces/knative-serving/events/controller-7667dd8fcb-tdhhj.15dcdbefab7f69fe | |
uid: ac42c022-15c7-11ea-b5af-027e0b84da98 | |
reason: Started | |
reportingComponent: "" | |
reportingInstance: "" | |
source: | |
component: kubelet | |
host: ip-172-20-67-65.ap-southeast-1.compute.internal | |
type: Normal | |
- apiVersion: v1 | |
count: 1 | |
eventTime: null | |
firstTimestamp: "2019-12-03T12:23:10Z" | |
involvedObject: | |
apiVersion: apps/v1 | |
kind: ReplicaSet | |
name: controller-7667dd8fcb | |
namespace: knative-serving | |
resourceVersion: "44030" | |
uid: 4622381c-15bb-11ea-b5af-027e0b84da98 | |
kind: Event | |
lastTimestamp: "2019-12-03T12:23:10Z" | |
message: 'Created pod: controller-7667dd8fcb-tdhhj' | |
metadata: | |
creationTimestamp: "2019-12-03T12:23:10Z" | |
name: controller-7667dd8fcb.15dcdbef63af6019 | |
namespace: knative-serving | |
resourceVersion: "3301" | |
selfLink: /api/v1/namespaces/knative-serving/events/controller-7667dd8fcb.15dcdbef63af6019 | |
uid: ab8b22e4-15c7-11ea-b5af-027e0b84da98 | |
reason: SuccessfulCreate | |
reportingComponent: "" | |
reportingInstance: "" | |
source: | |
component: replicaset-controller | |
type: Normal | |
- apiVersion: v1 | |
count: 375 | |
eventTime: null | |
firstTimestamp: "2019-12-03T10:57:09Z" | |
involvedObject: | |
apiVersion: v1 | |
fieldPath: spec.containers{default-domain} | |
kind: Pod | |
name: default-domain-fjxtb | |
namespace: knative-serving | |
resourceVersion: "44472" | |
uid: a60130b7-15bb-11ea-b5af-027e0b84da98 | |
kind: Event | |
lastTimestamp: "2019-12-03T12:22:18Z" | |
message: 'Error: ImagePullBackOff' | |
metadata: | |
creationTimestamp: "2019-12-03T10:57:09Z" | |
name: default-domain-fjxtb.15dcd73dbead1252 | |
namespace: knative-serving | |
resourceVersion: "3275" | |
selfLink: /api/v1/namespaces/knative-serving/events/default-domain-fjxtb.15dcd73dbead1252 | |
uid: a7567e17-15bb-11ea-b5af-027e0b84da98 | |
reason: Failed | |
reportingComponent: "" | |
reportingInstance: "" | |
source: | |
component: kubelet | |
host: ip-172-20-83-101.ap-southeast-1.compute.internal | |
type: Warning | |
- apiVersion: v1 | |
count: 1 | |
eventTime: null | |
firstTimestamp: "2019-12-03T12:23:10Z" | |
involvedObject: | |
apiVersion: v1 | |
kind: Pod | |
name: default-domain-kq9j8 | |
namespace: knative-serving | |
resourceVersion: "54538" | |
uid: ab991eec-15c7-11ea-b5af-027e0b84da98 | |
kind: Event | |
lastTimestamp: "2019-12-03T12:23:10Z" | |
message: Successfully assigned knative-serving/default-domain-kq9j8 to ip-172-20-83-101.ap-southeast-1.compute.internal | |
metadata: | |
creationTimestamp: "2019-12-03T12:23:11Z" | |
name: default-domain-kq9j8.15dcdbef6a36b6be | |
namespace: knative-serving | |
resourceVersion: "3304" | |
selfLink: /api/v1/namespaces/knative-serving/events/default-domain-kq9j8.15dcdbef6a36b6be | |
uid: ab9ba9f3-15c7-11ea-b5af-027e0b84da98 | |
reason: Scheduled | |
reportingComponent: "" | |
reportingInstance: "" | |
source: | |
component: default-scheduler | |
type: Normal | |
- apiVersion: v1 | |
count: 4 | |
eventTime: null | |
firstTimestamp: "2019-12-03T12:23:11Z" | |
involvedObject: | |
apiVersion: v1 | |
fieldPath: spec.containers{default-domain} | |
kind: Pod | |
name: default-domain-kq9j8 | |
namespace: knative-serving | |
resourceVersion: "54539" | |
uid: ab991eec-15c7-11ea-b5af-027e0b84da98 | |
kind: Event | |
lastTimestamp: "2019-12-03T12:24:53Z" | |
message: Pulling image "knative.dev/serving/cmd/default-domain" | |
metadata: | |
creationTimestamp: "2019-12-03T12:23:11Z" | |
name: default-domain-kq9j8.15dcdbef95168f5e | |
namespace: knative-serving | |
resourceVersion: "3611" | |
selfLink: /api/v1/namespaces/knative-serving/events/default-domain-kq9j8.15dcdbef95168f5e | |
uid: ac0958db-15c7-11ea-b5af-027e0b84da98 | |
reason: Pulling | |
reportingComponent: "" | |
reportingInstance: "" | |
source: | |
component: kubelet | |
host: ip-172-20-83-101.ap-southeast-1.compute.internal | |
type: Normal | |
- apiVersion: v1 | |
count: 4 | |
eventTime: null | |
firstTimestamp: "2019-12-03T12:23:17Z" | |
involvedObject: | |
apiVersion: v1 | |
fieldPath: spec.containers{default-domain} | |
kind: Pod | |
name: default-domain-kq9j8 | |
namespace: knative-serving | |
resourceVersion: "54539" | |
uid: ab991eec-15c7-11ea-b5af-027e0b84da98 | |
kind: Event | |
lastTimestamp: "2019-12-03T12:24:54Z" | |
message: 'Failed to pull image "knative.dev/serving/cmd/default-domain": rpc error: | |
code = Unknown desc = Error response from daemon: error parsing HTTP 404 response | |
body: invalid character ''<'' looking for beginning of value: "<!DOCTYPE html>\n<html>\n <head>\n <meta | |
charset=\"utf-8\">\n <meta name=\"viewport\" content=\"width=device-width, | |
initial-scale=1.0, maximum-scale=1.0, user-scalable=no\">\n\n <title>Page Not | |
Found</title>\n <link href=''https://fonts.googleapis.com/css?family=Roboto:400,700&subset=latin,latin-ext'' | |
rel=''stylesheet'' type=''text/css''>\n <style>\n body {\n font-family: | |
-apple-system, BlinkMacSystemFont, \"Segoe UI\", Roboto, Helvetica, Arial, sans-serif, | |
\"Apple Color Emoji\", \"Segoe UI Emoji\", \"Segoe UI Symbol\";\n background: | |
rgb(14, 30, 37);\n color: white;\n overflow: hidden;\n margin: | |
0;\n padding: 0;\n }\n\n h1 {\n margin: 0;\n font-size: 22px;\n line-height: | |
24px;\n }\n\n .main {\n position: relative;\n display: flex;\n flex-direction: | |
column;\n align-items: center;\n justify-content: center;\n height: | |
100vh;\n width: 100vw;\n }\n\n .card {\n position: relative;\n display: | |
flex;\n flex-direction: column;\n width: 75%;\n max-width: 364px;\n padding: | |
24px;\n background: white;\n color: rgb(14, 30, 37);\n border-radius: | |
8px;\n box-shadow: 0 2px 4px 0 rgba(14, 30, 37, .16);\n }\n\n a {\n margin: | |
0;\n text-decoration: none;\n font-weight: 600;\n line-height: | |
24px;\n color: #00ad9f;\n }\n\n a svg {\n position: relative;\n top: | |
2px;\n }\n\n a:hover,\n a:focus {\n text-decoration: underline;\n color: | |
#007A70;\n }\n\n a:hover svg path{\n fill: #007A70;\n }\n\n p:last-of-type | |
{\n margin: 0;\n }\n\n </style>\n </head>\n <body>\n <div class=\"main\">\n <div | |
class=\"card\">\n <div class=\"header\">\n <h1>Page Not Found</h1>\n </div>\n <div | |
class=\"body\">\n <p>Looks like you''ve followed a broken link or entered | |
a URL that doesn''t exist on this site.</p>\n <p>\n <a id=\"back-link\" | |
href=\"/\">\n <svg xmlns=\"http://www.w3.org/2000/svg\" width=\"16\" | |
height=\"16\" viewBox=\"0 0 16 16\">\n <path fill=\"#00ad9f\" d=\"M11.9998836,4.09370803 | |
L8.55809517,7.43294953 C8.23531459,7.74611298 8.23531459,8.25388736 8.55809517,8.56693769 | |
L12,11.9062921 L9.84187871,14 L4.24208544,8.56693751 C3.91930485,8.25388719 3.91930485,7.74611281 | |
4.24208544,7.43294936 L9.84199531,2 L11.9998836,4.09370803 Z\"/>\n </svg>\n Back | |
to our site\n </a>\n </p>\n </div>\n </div>\n </div>\n <script>\n (function() | |
{\n if (document.referrer && document.location.host && document.referrer.match(new | |
RegExp(\"^https?://\" + document.location.host))) {\n document.getElementById(\"back-link\").setAttribute(\"href\", | |
document.referrer);\n }\n })();\n </script>\n </body>\n</html>\n\n"' | |
metadata: | |
creationTimestamp: "2019-12-03T12:23:17Z" | |
name: default-domain-kq9j8.15dcdbf0efb7b393 | |
namespace: knative-serving | |
resourceVersion: "3613" | |
selfLink: /api/v1/namespaces/knative-serving/events/default-domain-kq9j8.15dcdbf0efb7b393 | |
uid: af80bba8-15c7-11ea-b5af-027e0b84da98 | |
reason: Failed | |
reportingComponent: "" | |
reportingInstance: "" | |
source: | |
component: kubelet | |
host: ip-172-20-83-101.ap-southeast-1.compute.internal | |
type: Warning | |
- apiVersion: v1 | |
count: 4 | |
eventTime: null | |
firstTimestamp: "2019-12-03T12:23:17Z" | |
involvedObject: | |
apiVersion: v1 | |
fieldPath: spec.containers{default-domain} | |
kind: Pod | |
name: default-domain-kq9j8 | |
namespace: knative-serving | |
resourceVersion: "54539" | |
uid: ab991eec-15c7-11ea-b5af-027e0b84da98 | |
kind: Event | |
lastTimestamp: "2019-12-03T12:24:54Z" | |
message: 'Error: ErrImagePull' | |
metadata: | |
creationTimestamp: "2019-12-03T12:23:17Z" | |
name: default-domain-kq9j8.15dcdbf0efb7f9af | |
namespace: knative-serving | |
resourceVersion: "3612" | |
selfLink: /api/v1/namespaces/knative-serving/events/default-domain-kq9j8.15dcdbf0efb7f9af | |
uid: af814f7c-15c7-11ea-b5af-027e0b84da98 | |
reason: Failed | |
reportingComponent: "" | |
reportingInstance: "" | |
source: | |
component: kubelet | |
host: ip-172-20-83-101.ap-southeast-1.compute.internal | |
type: Warning | |
- apiVersion: v1 | |
count: 42 | |
eventTime: null | |
firstTimestamp: "2019-12-03T12:23:17Z" | |
involvedObject: | |
apiVersion: v1 | |
fieldPath: spec.containers{default-domain} | |
kind: Pod | |
name: default-domain-kq9j8 | |
namespace: knative-serving | |
resourceVersion: "54539" | |
uid: ab991eec-15c7-11ea-b5af-027e0b84da98 | |
kind: Event | |
lastTimestamp: "2019-12-03T12:33:21Z" | |
message: Back-off pulling image "knative.dev/serving/cmd/default-domain" | |
metadata: | |
creationTimestamp: "2019-12-03T12:23:17Z" | |
name: default-domain-kq9j8.15dcdbf108893cf3 | |
namespace: knative-serving | |
resourceVersion: "3629" | |
selfLink: /api/v1/namespaces/knative-serving/events/default-domain-kq9j8.15dcdbf108893cf3 | |
uid: afc0c870-15c7-11ea-b5af-027e0b84da98 | |
reason: BackOff | |
reportingComponent: "" | |
reportingInstance: "" | |
source: | |
component: kubelet | |
host: ip-172-20-83-101.ap-southeast-1.compute.internal | |
type: Normal | |
- apiVersion: v1 | |
count: 240 | |
eventTime: null | |
firstTimestamp: "2019-12-03T12:23:17Z" | |
involvedObject: | |
apiVersion: v1 | |
fieldPath: spec.containers{default-domain} | |
kind: Pod | |
name: default-domain-kq9j8 | |
namespace: knative-serving | |
resourceVersion: "54539" | |
uid: ab991eec-15c7-11ea-b5af-027e0b84da98 | |
kind: Event | |
lastTimestamp: "2019-12-03T13:18:15Z" | |
message: 'Error: ImagePullBackOff' | |
metadata: | |
creationTimestamp: "2019-12-03T12:23:17Z" | |
name: default-domain-kq9j8.15dcdbf1088972a4 | |
namespace: knative-serving | |
resourceVersion: "3747" | |
selfLink: /api/v1/namespaces/knative-serving/events/default-domain-kq9j8.15dcdbf1088972a4 | |
uid: afc04b98-15c7-11ea-b5af-027e0b84da98 | |
reason: Failed | |
reportingComponent: "" | |
reportingInstance: "" | |
source: | |
component: kubelet | |
host: ip-172-20-83-101.ap-southeast-1.compute.internal | |
type: Warning | |
- apiVersion: v1 | |
count: 1 | |
eventTime: null | |
firstTimestamp: "2019-12-03T12:23:10Z" | |
involvedObject: | |
apiVersion: batch/v1 | |
kind: Job | |
name: default-domain | |
namespace: knative-serving | |
resourceVersion: "44473" | |
uid: a5ff6ccf-15bb-11ea-b5af-027e0b84da98 | |
kind: Event | |
lastTimestamp: "2019-12-03T12:23:10Z" | |
message: 'Created pod: default-domain-kq9j8' | |
metadata: | |
creationTimestamp: "2019-12-03T12:23:10Z" | |
name: default-domain.15dcdbef69f0facb | |
namespace: knative-serving | |
resourceVersion: "3303" | |
selfLink: /api/v1/namespaces/knative-serving/events/default-domain.15dcdbef69f0facb | |
uid: ab9b6316-15c7-11ea-b5af-027e0b84da98 | |
reason: SuccessfulCreate | |
reportingComponent: "" | |
reportingInstance: "" | |
source: | |
component: job-controller | |
type: Normal | |
- apiVersion: v1 | |
count: 1 | |
eventTime: null | |
firstTimestamp: "2019-12-03T12:23:11Z" | |
involvedObject: | |
apiVersion: v1 | |
kind: Pod | |
name: networking-certmanager-6794bcc848-rbkjk | |
namespace: knative-serving | |
resourceVersion: "54544" | |
uid: aba43145-15c7-11ea-b5af-027e0b84da98 | |
kind: Event | |
lastTimestamp: "2019-12-03T12:23:11Z" | |
message: Successfully assigned knative-serving/networking-certmanager-6794bcc848-rbkjk | |
to ip-172-20-44-180.ap-southeast-1.compute.internal | |
metadata: | |
creationTimestamp: "2019-12-03T12:23:11Z" | |
name: networking-certmanager-6794bcc848-rbkjk.15dcdbef6f641727 | |
namespace: knative-serving | |
resourceVersion: "3307" | |
selfLink: /api/v1/namespaces/knative-serving/events/networking-certmanager-6794bcc848-rbkjk.15dcdbef6f641727 | |
uid: aba8ce38-15c7-11ea-b5af-027e0b84da98 | |
reason: Scheduled | |
reportingComponent: "" | |
reportingInstance: "" | |
source: | |
component: default-scheduler | |
type: Normal | |
- apiVersion: v1 | |
count: 1 | |
eventTime: null | |
firstTimestamp: "2019-12-03T12:23:11Z" | |
involvedObject: | |
apiVersion: v1 | |
fieldPath: spec.containers{networking-certmanager} | |
kind: Pod | |
name: networking-certmanager-6794bcc848-rbkjk | |
namespace: knative-serving | |
resourceVersion: "54546" | |
uid: aba43145-15c7-11ea-b5af-027e0b84da98 | |
kind: Event | |
lastTimestamp: "2019-12-03T12:23:11Z" | |
message: Container image "gcr.io/gcp-compute-engine-223401/certmanager-f79b5bfeb092d099f0f3326024a30ebb@sha256:9f7622fd03d96c3262e71b4f6fb14455145041c81950b3efe10010c122974bed" | |
already present on machine | |
metadata: | |
creationTimestamp: "2019-12-03T12:23:11Z" | |
name: networking-certmanager-6794bcc848-rbkjk.15dcdbefa1886395 | |
namespace: knative-serving | |
resourceVersion: "3328" | |
selfLink: /api/v1/namespaces/knative-serving/events/networking-certmanager-6794bcc848-rbkjk.15dcdbefa1886395 | |
uid: ac29371d-15c7-11ea-b5af-027e0b84da98 | |
reason: Pulled | |
reportingComponent: "" | |
reportingInstance: "" | |
source: | |
component: kubelet | |
host: ip-172-20-44-180.ap-southeast-1.compute.internal | |
type: Normal | |
- apiVersion: v1 | |
count: 1 | |
eventTime: null | |
firstTimestamp: "2019-12-03T12:23:11Z" | |
involvedObject: | |
apiVersion: v1 | |
fieldPath: spec.containers{networking-certmanager} | |
kind: Pod | |
name: networking-certmanager-6794bcc848-rbkjk | |
namespace: knative-serving | |
resourceVersion: "54546" | |
uid: aba43145-15c7-11ea-b5af-027e0b84da98 | |
kind: Event | |
lastTimestamp: "2019-12-03T12:23:11Z" | |
message: Created container networking-certmanager | |
metadata: | |
creationTimestamp: "2019-12-03T12:23:11Z" | |
name: networking-certmanager-6794bcc848-rbkjk.15dcdbefa52b8959 | |
namespace: knative-serving | |
resourceVersion: "3330" | |
selfLink: /api/v1/namespaces/knative-serving/events/networking-certmanager-6794bcc848-rbkjk.15dcdbefa52b8959 | |
uid: ac327c02-15c7-11ea-b5af-027e0b84da98 | |
reason: Created | |
reportingComponent: "" | |
reportingInstance: "" | |
source: | |
component: kubelet | |
host: ip-172-20-44-180.ap-southeast-1.compute.internal | |
type: Normal | |
- apiVersion: v1 | |
count: 1 | |
eventTime: null | |
firstTimestamp: "2019-12-03T12:23:12Z" | |
involvedObject: | |
apiVersion: v1 | |
fieldPath: spec.containers{networking-certmanager} | |
kind: Pod | |
name: networking-certmanager-6794bcc848-rbkjk | |
namespace: knative-serving | |
resourceVersion: "54546" | |
uid: aba43145-15c7-11ea-b5af-027e0b84da98 | |
kind: Event | |
lastTimestamp: "2019-12-03T12:23:12Z" | |
message: Started container networking-certmanager | |
metadata: | |
creationTimestamp: "2019-12-03T12:23:12Z" | |
name: networking-certmanager-6794bcc848-rbkjk.15dcdbefb3131a9e | |
namespace: knative-serving | |
resourceVersion: "3334" | |
selfLink: /api/v1/namespaces/knative-serving/events/networking-certmanager-6794bcc848-rbkjk.15dcdbefb3131a9e | |
uid: ac5613af-15c7-11ea-b5af-027e0b84da98 | |
reason: Started | |
reportingComponent: "" | |
reportingInstance: "" | |
source: | |
component: kubelet | |
host: ip-172-20-44-180.ap-southeast-1.compute.internal | |
type: Normal | |
- apiVersion: v1 | |
count: 1 | |
eventTime: null | |
firstTimestamp: "2019-12-03T12:23:11Z" | |
involvedObject: | |
apiVersion: v1 | |
fieldPath: spec.containers{networking-certmanager} | |
kind: Pod | |
name: networking-certmanager-6794bcc848-svt29 | |
namespace: knative-serving | |
resourceVersion: "43988" | |
uid: 46697697-15bb-11ea-b5af-027e0b84da98 | |
kind: Event | |
lastTimestamp: "2019-12-03T12:23:11Z" | |
message: Stopping container networking-certmanager | |
metadata: | |
creationTimestamp: "2019-12-03T12:23:11Z" | |
name: networking-certmanager-6794bcc848-svt29.15dcdbef6d42c7f4 | |
namespace: knative-serving | |
resourceVersion: "3305" | |
selfLink: /api/v1/namespaces/knative-serving/events/networking-certmanager-6794bcc848-svt29.15dcdbef6d42c7f4 | |
uid: aba3bc5a-15c7-11ea-b5af-027e0b84da98 | |
reason: Killing | |
reportingComponent: "" | |
reportingInstance: "" | |
source: | |
component: kubelet | |
host: ip-172-20-44-180.ap-southeast-1.compute.internal | |
type: Normal | |
- apiVersion: v1 | |
count: 1 | |
eventTime: null | |
firstTimestamp: "2019-12-03T12:23:11Z" | |
involvedObject: | |
apiVersion: apps/v1 | |
kind: ReplicaSet | |
name: networking-certmanager-6794bcc848 | |
namespace: knative-serving | |
resourceVersion: "44060" | |
uid: 46666167-15bb-11ea-b5af-027e0b84da98 | |
kind: Event | |
lastTimestamp: "2019-12-03T12:23:11Z" | |
message: 'Created pod: networking-certmanager-6794bcc848-rbkjk' | |
metadata: | |
creationTimestamp: "2019-12-03T12:23:11Z" | |
name: networking-certmanager-6794bcc848.15dcdbef6de423a8 | |
namespace: knative-serving | |
resourceVersion: "3306" | |
selfLink: /api/v1/namespaces/knative-serving/events/networking-certmanager-6794bcc848.15dcdbef6de423a8 | |
uid: aba6405a-15c7-11ea-b5af-027e0b84da98 | |
reason: SuccessfulCreate | |
reportingComponent: "" | |
reportingInstance: "" | |
source: | |
component: replicaset-controller | |
type: Normal | |
- apiVersion: v1 | |
count: 1 | |
eventTime: null | |
firstTimestamp: "2019-12-03T12:23:11Z" | |
involvedObject: | |
apiVersion: v1 | |
fieldPath: spec.containers{networking-istio} | |
kind: Pod | |
name: networking-istio-6854cd95ff-9txxm | |
namespace: knative-serving | |
resourceVersion: "43998" | |
uid: 469118f4-15bb-11ea-b5af-027e0b84da98 | |
kind: Event | |
lastTimestamp: "2019-12-03T12:23:11Z" | |
message: Stopping container networking-istio | |
metadata: | |
creationTimestamp: "2019-12-03T12:23:11Z" | |
name: networking-istio-6854cd95ff-9txxm.15dcdbef7295cddb | |
namespace: knative-serving | |
resourceVersion: "3308" | |
selfLink: /api/v1/namespaces/knative-serving/events/networking-istio-6854cd95ff-9txxm.15dcdbef7295cddb | |
uid: abb13ec6-15c7-11ea-b5af-027e0b84da98 | |
reason: Killing | |
reportingComponent: "" | |
reportingInstance: "" | |
source: | |
component: kubelet | |
host: ip-172-20-44-180.ap-southeast-1.compute.internal | |
type: Normal | |
- apiVersion: v1 | |
count: 1 | |
eventTime: null | |
firstTimestamp: "2019-12-03T12:23:11Z" | |
involvedObject: | |
apiVersion: v1 | |
kind: Pod | |
name: networking-istio-6854cd95ff-zhdv2 | |
namespace: knative-serving | |
resourceVersion: "54552" | |
uid: abb15132-15c7-11ea-b5af-027e0b84da98 | |
kind: Event | |
lastTimestamp: "2019-12-03T12:23:11Z" | |
message: Successfully assigned knative-serving/networking-istio-6854cd95ff-zhdv2 | |
to ip-172-20-83-101.ap-southeast-1.compute.internal | |
metadata: | |
creationTimestamp: "2019-12-03T12:23:11Z" | |
name: networking-istio-6854cd95ff-zhdv2.15dcdbef736a8718 | |
namespace: knative-serving | |
resourceVersion: "3310" | |
selfLink: /api/v1/namespaces/knative-serving/events/networking-istio-6854cd95ff-zhdv2.15dcdbef736a8718 | |
uid: abb35fd8-15c7-11ea-b5af-027e0b84da98 | |
reason: Scheduled | |
reportingComponent: "" | |
reportingInstance: "" | |
source: | |
component: default-scheduler | |
type: Normal | |
- apiVersion: v1 | |
count: 1 | |
eventTime: null | |
firstTimestamp: "2019-12-03T12:23:11Z" | |
involvedObject: | |
apiVersion: v1 | |
fieldPath: spec.containers{networking-istio} | |
kind: Pod | |
name: networking-istio-6854cd95ff-zhdv2 | |
namespace: knative-serving | |
resourceVersion: "54553" | |
uid: abb15132-15c7-11ea-b5af-027e0b84da98 | |
kind: Event | |
lastTimestamp: "2019-12-03T12:23:11Z" | |
message: Pulling image "gcr.io/gcp-compute-engine-223401/istio-c58c0c8bb8ecc80f800bb788a425ae1d@sha256:ebdb4e8832e9574311494a31ea18dc63cf903e8dd7f0651d640eb2c7f252da2a" | |
metadata: | |
creationTimestamp: "2019-12-03T12:23:11Z" | |
name: networking-istio-6854cd95ff-zhdv2.15dcdbef9e74b505 | |
namespace: knative-serving | |
resourceVersion: "3327" | |
selfLink: /api/v1/namespaces/knative-serving/events/networking-istio-6854cd95ff-zhdv2.15dcdbef9e74b505 | |
uid: ac215e5b-15c7-11ea-b5af-027e0b84da98 | |
reason: Pulling | |
reportingComponent: "" | |
reportingInstance: "" | |
source: | |
component: kubelet | |
host: ip-172-20-83-101.ap-southeast-1.compute.internal | |
type: Normal | |
- apiVersion: v1 | |
count: 1 | |
eventTime: null | |
firstTimestamp: "2019-12-03T12:23:21Z" | |
involvedObject: | |
apiVersion: v1 | |
fieldPath: spec.containers{networking-istio} | |
kind: Pod | |
name: networking-istio-6854cd95ff-zhdv2 | |
namespace: knative-serving | |
resourceVersion: "54553" | |
uid: abb15132-15c7-11ea-b5af-027e0b84da98 | |
kind: Event | |
lastTimestamp: "2019-12-03T12:23:21Z" | |
message: Successfully pulled image "gcr.io/gcp-compute-engine-223401/istio-c58c0c8bb8ecc80f800bb788a425ae1d@sha256:ebdb4e8832e9574311494a31ea18dc63cf903e8dd7f0651d640eb2c7f252da2a" | |
metadata: | |
creationTimestamp: "2019-12-03T12:23:21Z" | |
name: networking-istio-6854cd95ff-zhdv2.15dcdbf1d29be619 | |
namespace: knative-serving | |
resourceVersion: "3380" | |
selfLink: /api/v1/namespaces/knative-serving/events/networking-istio-6854cd95ff-zhdv2.15dcdbf1d29be619 | |
uid: b1c59d12-15c7-11ea-b5af-027e0b84da98 | |
reason: Pulled | |
reportingComponent: "" | |
reportingInstance: "" | |
source: | |
component: kubelet | |
host: ip-172-20-83-101.ap-southeast-1.compute.internal | |
type: Normal | |
- apiVersion: v1 | |
count: 1 | |
eventTime: null | |
firstTimestamp: "2019-12-03T12:23:21Z" | |
involvedObject: | |
apiVersion: v1 | |
fieldPath: spec.containers{networking-istio} | |
kind: Pod | |
name: networking-istio-6854cd95ff-zhdv2 | |
namespace: knative-serving | |
resourceVersion: "54553" | |
uid: abb15132-15c7-11ea-b5af-027e0b84da98 | |
kind: Event | |
lastTimestamp: "2019-12-03T12:23:21Z" | |
message: Created container networking-istio | |
metadata: | |
creationTimestamp: "2019-12-03T12:23:21Z" | |
name: networking-istio-6854cd95ff-zhdv2.15dcdbf1d647d40f | |
namespace: knative-serving | |
resourceVersion: "3381" | |
selfLink: /api/v1/namespaces/knative-serving/events/networking-istio-6854cd95ff-zhdv2.15dcdbf1d647d40f | |
uid: b1cf0105-15c7-11ea-b5af-027e0b84da98 | |
reason: Created | |
reportingComponent: "" | |
reportingInstance: "" | |
source: | |
component: kubelet | |
host: ip-172-20-83-101.ap-southeast-1.compute.internal | |
type: Normal | |
- apiVersion: v1 | |
count: 1 | |
eventTime: null | |
firstTimestamp: "2019-12-03T12:23:21Z" | |
involvedObject: | |
apiVersion: v1 | |
fieldPath: spec.containers{networking-istio} | |
kind: Pod | |
name: networking-istio-6854cd95ff-zhdv2 | |
namespace: knative-serving | |
resourceVersion: "54553" | |
uid: abb15132-15c7-11ea-b5af-027e0b84da98 | |
kind: Event | |
lastTimestamp: "2019-12-03T12:23:21Z" | |
message: Started container networking-istio | |
metadata: | |
creationTimestamp: "2019-12-03T12:23:21Z" | |
name: networking-istio-6854cd95ff-zhdv2.15dcdbf1dedfaf1a | |
namespace: knative-serving | |
resourceVersion: "3383" | |
selfLink: /api/v1/namespaces/knative-serving/events/networking-istio-6854cd95ff-zhdv2.15dcdbf1dedfaf1a | |
uid: b1e4fd8c-15c7-11ea-b5af-027e0b84da98 | |
reason: Started | |
reportingComponent: "" | |
reportingInstance: "" | |
source: | |
component: kubelet | |
host: ip-172-20-83-101.ap-southeast-1.compute.internal | |
type: Normal | |
- apiVersion: v1 | |
count: 1 | |
eventTime: null | |
firstTimestamp: "2019-12-03T12:23:11Z" | |
involvedObject: | |
apiVersion: apps/v1 | |
kind: ReplicaSet | |
name: networking-istio-6854cd95ff | |
namespace: knative-serving | |
resourceVersion: "44037" | |
uid: 468ebdf0-15bb-11ea-b5af-027e0b84da98 | |
kind: Event | |
lastTimestamp: "2019-12-03T12:23:11Z" | |
message: 'Created pod: networking-istio-6854cd95ff-zhdv2' | |
metadata: | |
creationTimestamp: "2019-12-03T12:23:11Z" | |
name: networking-istio-6854cd95ff.15dcdbef7315c8d3 | |
namespace: knative-serving | |
resourceVersion: "3309" | |
selfLink: /api/v1/namespaces/knative-serving/events/networking-istio-6854cd95ff.15dcdbef7315c8d3 | |
uid: abb29827-15c7-11ea-b5af-027e0b84da98 | |
reason: SuccessfulCreate | |
reportingComponent: "" | |
reportingInstance: "" | |
source: | |
component: replicaset-controller | |
type: Normal | |
- apiVersion: v1 | |
count: 1 | |
eventTime: null | |
firstTimestamp: "2019-12-03T12:23:11Z" | |
involvedObject: | |
apiVersion: v1 | |
kind: Pod | |
name: networking-ns-cert-55d77c7656-6vfgb | |
namespace: knative-serving | |
resourceVersion: "54560" | |
uid: abbe4876-15c7-11ea-b5af-027e0b84da98 | |
kind: Event | |
lastTimestamp: "2019-12-03T12:23:11Z" | |
message: Successfully assigned knative-serving/networking-ns-cert-55d77c7656-6vfgb | |
to ip-172-20-67-65.ap-southeast-1.compute.internal | |
metadata: | |
creationTimestamp: "2019-12-03T12:23:11Z" | |
name: networking-ns-cert-55d77c7656-6vfgb.15dcdbef78916a37 | |
namespace: knative-serving | |
resourceVersion: "3313" | |
selfLink: /api/v1/namespaces/knative-serving/events/networking-ns-cert-55d77c7656-6vfgb.15dcdbef78916a37 | |
uid: abc08788-15c7-11ea-b5af-027e0b84da98 | |
reason: Scheduled | |
reportingComponent: "" | |
reportingInstance: "" | |
source: | |
component: default-scheduler | |
type: Normal | |
- apiVersion: v1 | |
count: 1 | |
eventTime: null | |
firstTimestamp: "2019-12-03T12:23:12Z" | |
involvedObject: | |
apiVersion: v1 | |
fieldPath: spec.containers{networking-nscert} | |
kind: Pod | |
name: networking-ns-cert-55d77c7656-6vfgb | |
namespace: knative-serving | |
resourceVersion: "54561" | |
uid: abbe4876-15c7-11ea-b5af-027e0b84da98 | |
kind: Event | |
lastTimestamp: "2019-12-03T12:23:12Z" | |
message: Container image "gcr.io/gcp-compute-engine-223401/nscert-e3625dd01dcb901439f4630ab9789e75@sha256:77da0645be1369d0e56a1daa204da6de6661488eef5858a60dee9a052f02150c" | |
already present on machine | |
metadata: | |
creationTimestamp: "2019-12-03T12:23:12Z" | |
name: networking-ns-cert-55d77c7656-6vfgb.15dcdbefb71ee806 | |
namespace: knative-serving | |
resourceVersion: "3335" | |
selfLink: /api/v1/namespaces/knative-serving/events/networking-ns-cert-55d77c7656-6vfgb.15dcdbefb71ee806 | |
uid: ac60828f-15c7-11ea-b5af-027e0b84da98 | |
reason: Pulled | |
reportingComponent: "" | |
reportingInstance: "" | |
source: | |
component: kubelet | |
host: ip-172-20-67-65.ap-southeast-1.compute.internal | |
type: Normal | |
- apiVersion: v1 | |
count: 1 | |
eventTime: null | |
firstTimestamp: "2019-12-03T12:23:12Z" | |
involvedObject: | |
apiVersion: v1 | |
fieldPath: spec.containers{networking-nscert} | |
kind: Pod | |
name: networking-ns-cert-55d77c7656-6vfgb | |
namespace: knative-serving | |
resourceVersion: "54561" | |
uid: abbe4876-15c7-11ea-b5af-027e0b84da98 | |
kind: Event | |
lastTimestamp: "2019-12-03T12:23:12Z" | |
message: Created container networking-nscert | |
metadata: | |
creationTimestamp: "2019-12-03T12:23:12Z" | |
name: networking-ns-cert-55d77c7656-6vfgb.15dcdbefbacd8f3c | |
namespace: knative-serving | |
resourceVersion: "3336" | |
selfLink: /api/v1/namespaces/knative-serving/events/networking-ns-cert-55d77c7656-6vfgb.15dcdbefbacd8f3c | |
uid: ac69eced-15c7-11ea-b5af-027e0b84da98 | |
reason: Created | |
reportingComponent: "" | |
reportingInstance: "" | |
source: | |
component: kubelet | |
host: ip-172-20-67-65.ap-southeast-1.compute.internal | |
type: Normal | |
- apiVersion: v1 | |
count: 1 | |
eventTime: null | |
firstTimestamp: "2019-12-03T12:23:12Z" | |
involvedObject: | |
apiVersion: v1 | |
fieldPath: spec.containers{networking-nscert} | |
kind: Pod | |
name: networking-ns-cert-55d77c7656-6vfgb | |
namespace: knative-serving | |
resourceVersion: "54561" | |
uid: abbe4876-15c7-11ea-b5af-027e0b84da98 | |
kind: Event | |
lastTimestamp: "2019-12-03T12:23:12Z" | |
message: Started container networking-nscert | |
metadata: | |
creationTimestamp: "2019-12-03T12:23:12Z" | |
name: networking-ns-cert-55d77c7656-6vfgb.15dcdbefc4b57f57 | |
namespace: knative-serving | |
resourceVersion: "3338" | |
selfLink: /api/v1/namespaces/knative-serving/events/networking-ns-cert-55d77c7656-6vfgb.15dcdbefc4b57f57 | |
uid: ac8350cb-15c7-11ea-b5af-027e0b84da98 | |
reason: Started | |
reportingComponent: "" | |
reportingInstance: "" | |
source: | |
component: kubelet | |
host: ip-172-20-67-65.ap-southeast-1.compute.internal | |
type: Normal | |
- apiVersion: v1 | |
count: 1 | |
eventTime: null | |
firstTimestamp: "2019-12-03T12:23:11Z" | |
involvedObject: | |
apiVersion: v1 | |
fieldPath: spec.containers{networking-nscert} | |
kind: Pod | |
name: networking-ns-cert-55d77c7656-xqmbt | |
namespace: knative-serving | |
resourceVersion: "44011" | |
uid: 46be9bf4-15bb-11ea-b5af-027e0b84da98 | |
kind: Event | |
lastTimestamp: "2019-12-03T12:23:11Z" | |
message: Stopping container networking-nscert | |
metadata: | |
creationTimestamp: "2019-12-03T12:23:11Z" | |
name: networking-ns-cert-55d77c7656-xqmbt.15dcdbef778fd76a | |
namespace: knative-serving | |
resourceVersion: "3311" | |
selfLink: /api/v1/namespaces/knative-serving/events/networking-ns-cert-55d77c7656-xqmbt.15dcdbef778fd76a | |
uid: abbdfa7d-15c7-11ea-b5af-027e0b84da98 | |
reason: Killing | |
reportingComponent: "" | |
reportingInstance: "" | |
source: | |
component: kubelet | |
host: ip-172-20-44-180.ap-southeast-1.compute.internal | |
type: Normal | |
- apiVersion: v1 | |
count: 1 | |
eventTime: null | |
firstTimestamp: "2019-12-03T12:23:11Z" | |
involvedObject: | |
apiVersion: apps/v1 | |
kind: ReplicaSet | |
name: networking-ns-cert-55d77c7656 | |
namespace: knative-serving | |
resourceVersion: "44080" | |
uid: 46bcdcda-15bb-11ea-b5af-027e0b84da98 | |
kind: Event | |
lastTimestamp: "2019-12-03T12:23:11Z" | |
message: 'Created pod: networking-ns-cert-55d77c7656-6vfgb' | |
metadata: | |
creationTimestamp: "2019-12-03T12:23:11Z" | |
name: networking-ns-cert-55d77c7656.15dcdbef7824d095 | |
namespace: knative-serving | |
resourceVersion: "3312" | |
selfLink: /api/v1/namespaces/knative-serving/events/networking-ns-cert-55d77c7656.15dcdbef7824d095 | |
uid: abbf541f-15c7-11ea-b5af-027e0b84da98 | |
reason: SuccessfulCreate | |
reportingComponent: "" | |
reportingInstance: "" | |
source: | |
component: replicaset-controller | |
type: Normal | |
- apiVersion: v1 | |
count: 1 | |
eventTime: null | |
firstTimestamp: "2019-12-03T12:23:11Z" | |
involvedObject: | |
apiVersion: v1 | |
kind: Pod | |
name: webhook-54c85dd7d9-q9852 | |
namespace: knative-serving | |
resourceVersion: "54570" | |
uid: abcae38b-15c7-11ea-b5af-027e0b84da98 | |
kind: Event | |
lastTimestamp: "2019-12-03T12:23:11Z" | |
message: Successfully assigned knative-serving/webhook-54c85dd7d9-q9852 to ip-172-20-40-226.ap-southeast-1.compute.internal | |
metadata: | |
creationTimestamp: "2019-12-03T12:23:11Z" | |
name: webhook-54c85dd7d9-q9852.15dcdbef7d6e607b | |
namespace: knative-serving | |
resourceVersion: "3317" | |
selfLink: /api/v1/namespaces/knative-serving/events/webhook-54c85dd7d9-q9852.15dcdbef7d6e607b | |
uid: abccbf35-15c7-11ea-b5af-027e0b84da98 | |
reason: Scheduled | |
reportingComponent: "" | |
reportingInstance: "" | |
source: | |
component: default-scheduler | |
type: Normal | |
- apiVersion: v1 | |
count: 1 | |
eventTime: null | |
firstTimestamp: "2019-12-03T12:23:11Z" | |
involvedObject: | |
apiVersion: v1 | |
fieldPath: spec.containers{webhook} | |
kind: Pod | |
name: webhook-54c85dd7d9-q9852 | |
namespace: knative-serving | |
resourceVersion: "54571" | |
uid: abcae38b-15c7-11ea-b5af-027e0b84da98 | |
kind: Event | |
lastTimestamp: "2019-12-03T12:23:11Z" | |
message: Pulling image "gcr.io/gcp-compute-engine-223401/webhook-261c6506fca17bc41be50b3461f98f1c@sha256:012be54c7866cb8458fe96061f5321e519da7a4803809d912c2a670fff904ac6" | |
metadata: | |
creationTimestamp: "2019-12-03T12:23:11Z" | |
name: webhook-54c85dd7d9-q9852.15dcdbefa4210cb7 | |
namespace: knative-serving | |
resourceVersion: "3329" | |
selfLink: /api/v1/namespaces/knative-serving/events/webhook-54c85dd7d9-q9852.15dcdbefa4210cb7 | |
uid: ac2ff478-15c7-11ea-b5af-027e0b84da98 | |
reason: Pulling | |
reportingComponent: "" | |
reportingInstance: "" | |
source: | |
component: kubelet | |
host: ip-172-20-40-226.ap-southeast-1.compute.internal | |
type: Normal | |
- apiVersion: v1 | |
count: 1 | |
eventTime: null | |
firstTimestamp: "2019-12-03T12:23:14Z" | |
involvedObject: | |
apiVersion: v1 | |
fieldPath: spec.containers{webhook} | |
kind: Pod | |
name: webhook-54c85dd7d9-q9852 | |
namespace: knative-serving | |
resourceVersion: "54571" | |
uid: abcae38b-15c7-11ea-b5af-027e0b84da98 | |
kind: Event | |
lastTimestamp: "2019-12-03T12:23:14Z" | |
message: Successfully pulled image "gcr.io/gcp-compute-engine-223401/webhook-261c6506fca17bc41be50b3461f98f1c@sha256:012be54c7866cb8458fe96061f5321e519da7a4803809d912c2a670fff904ac6" | |
metadata: | |
creationTimestamp: "2019-12-03T12:23:14Z" | |
name: webhook-54c85dd7d9-q9852.15dcdbf03761dbbb | |
namespace: knative-serving | |
resourceVersion: "3350" | |
selfLink: /api/v1/namespaces/knative-serving/events/webhook-54c85dd7d9-q9852.15dcdbf03761dbbb | |
uid: ada8d452-15c7-11ea-b5af-027e0b84da98 | |
reason: Pulled | |
reportingComponent: "" | |
reportingInstance: "" | |
source: | |
component: kubelet | |
host: ip-172-20-40-226.ap-southeast-1.compute.internal | |
type: Normal | |
- apiVersion: v1 | |
count: 1 | |
eventTime: null | |
firstTimestamp: "2019-12-03T12:23:14Z" | |
involvedObject: | |
apiVersion: v1 | |
fieldPath: spec.containers{webhook} | |
kind: Pod | |
name: webhook-54c85dd7d9-q9852 | |
namespace: knative-serving | |
resourceVersion: "54571" | |
uid: abcae38b-15c7-11ea-b5af-027e0b84da98 | |
kind: Event | |
lastTimestamp: "2019-12-03T12:23:14Z" | |
message: Created container webhook | |
metadata: | |
creationTimestamp: "2019-12-03T12:23:14Z" | |
name: webhook-54c85dd7d9-q9852.15dcdbf03a1929b1 | |
namespace: knative-serving | |
resourceVersion: "3351" | |
selfLink: /api/v1/namespaces/knative-serving/events/webhook-54c85dd7d9-q9852.15dcdbf03a1929b1 | |
uid: adafcf4d-15c7-11ea-b5af-027e0b84da98 | |
reason: Created | |
reportingComponent: "" | |
reportingInstance: "" | |
source: | |
component: kubelet | |
host: ip-172-20-40-226.ap-southeast-1.compute.internal | |
type: Normal | |
- apiVersion: v1 | |
count: 1 | |
eventTime: null | |
firstTimestamp: "2019-12-03T12:23:14Z" | |
involvedObject: | |
apiVersion: v1 | |
fieldPath: spec.containers{webhook} | |
kind: Pod | |
name: webhook-54c85dd7d9-q9852 | |
namespace: knative-serving | |
resourceVersion: "54571" | |
uid: abcae38b-15c7-11ea-b5af-027e0b84da98 | |
kind: Event | |
lastTimestamp: "2019-12-03T12:23:14Z" | |
message: Started container webhook | |
metadata: | |
creationTimestamp: "2019-12-03T12:23:14Z" | |
name: webhook-54c85dd7d9-q9852.15dcdbf04775ff3c | |
namespace: knative-serving | |
resourceVersion: "3352" | |
selfLink: /api/v1/namespaces/knative-serving/events/webhook-54c85dd7d9-q9852.15dcdbf04775ff3c | |
uid: add20a48-15c7-11ea-b5af-027e0b84da98 | |
reason: Started | |
reportingComponent: "" | |
reportingInstance: "" | |
source: | |
component: kubelet | |
host: ip-172-20-40-226.ap-southeast-1.compute.internal | |
type: Normal | |
- apiVersion: v1 | |
count: 1 | |
eventTime: null | |
firstTimestamp: "2019-12-03T12:23:11Z" | |
involvedObject: | |
apiVersion: v1 | |
fieldPath: spec.containers{webhook} | |
kind: Pod | |
name: webhook-54c85dd7d9-r9t5x | |
namespace: knative-serving | |
resourceVersion: "44022" | |
uid: 46e34c19-15bb-11ea-b5af-027e0b84da98 | |
kind: Event | |
lastTimestamp: "2019-12-03T12:23:11Z" | |
message: Stopping container webhook | |
metadata: | |
creationTimestamp: "2019-12-03T12:23:11Z" | |
name: webhook-54c85dd7d9-r9t5x.15dcdbef7c9eed36 | |
namespace: knative-serving | |
resourceVersion: "3315" | |
selfLink: /api/v1/namespaces/knative-serving/events/webhook-54c85dd7d9-r9t5x.15dcdbef7c9eed36 | |
uid: abcad3d6-15c7-11ea-b5af-027e0b84da98 | |
reason: Killing | |
reportingComponent: "" | |
reportingInstance: "" | |
source: | |
component: kubelet | |
host: ip-172-20-67-65.ap-southeast-1.compute.internal | |
type: Normal | |
- apiVersion: v1 | |
count: 1 | |
eventTime: null | |
firstTimestamp: "2019-12-03T12:23:11Z" | |
involvedObject: | |
apiVersion: apps/v1 | |
kind: ReplicaSet | |
name: webhook-54c85dd7d9 | |
namespace: knative-serving | |
resourceVersion: "44048" | |
uid: 46e1eccb-15bb-11ea-b5af-027e0b84da98 | |
kind: Event | |
lastTimestamp: "2019-12-03T12:23:11Z" | |
message: 'Created pod: webhook-54c85dd7d9-q9852' | |
metadata: | |
creationTimestamp: "2019-12-03T12:23:11Z" | |
name: webhook-54c85dd7d9.15dcdbef7d3e5fc7 | |
namespace: knative-serving | |
resourceVersion: "3316" | |
selfLink: /api/v1/namespaces/knative-serving/events/webhook-54c85dd7d9.15dcdbef7d3e5fc7 | |
uid: abcc67a5-15c7-11ea-b5af-027e0b84da98 | |
reason: SuccessfulCreate | |
reportingComponent: "" | |
reportingInstance: "" | |
source: | |
component: replicaset-controller | |
type: Normal | |
kind: List | |
metadata: | |
resourceVersion: "" | |
selfLink: "" | |
------- | |
resource: daemonsets | |
------- | |
apiVersion: v1 | |
items: [] | |
kind: List | |
metadata: | |
resourceVersion: "" | |
selfLink: "" | |
------- | |
resource: deployments | |
------- | |
apiVersion: v1 | |
items: | |
- apiVersion: extensions/v1beta1 | |
kind: Deployment | |
metadata: | |
annotations: | |
deployment.kubernetes.io/revision: "1" | |
kubectl.kubernetes.io/last-applied-configuration: | | |
{"apiVersion":"apps/v1","kind":"Deployment","metadata":{"annotations":{},"labels":{"serving.knative.dev/release":"devel"},"name":"activator","namespace":"knative-serving"},"spec":{"selector":{"matchLabels":{"app":"activator","role":"activator"}},"template":{"metadata":{"annotations":{"cluster-autoscaler.kubernetes.io/safe-to-evict":"false","sidecar.istio.io/inject":"true"},"labels":{"app":"activator","role":"activator","serving.knative.dev/release":"devel"}},"spec":{"containers":[{"env":[{"name":"POD_NAME","valueFrom":{"fieldRef":{"fieldPath":"metadata.name"}}},{"name":"POD_IP","valueFrom":{"fieldRef":{"fieldPath":"status.podIP"}}},{"name":"SYSTEM_NAMESPACE","valueFrom":{"fieldRef":{"fieldPath":"metadata.namespace"}}},{"name":"CONFIG_LOGGING_NAME","value":"config-logging"},{"name":"CONFIG_OBSERVABILITY_NAME","value":"config-observability"},{"name":"METRICS_DOMAIN","value":"knative.dev/internal/serving"}],"image":"gcr.io/gcp-compute-engine-223401/activator-ecd51ca5034883acbe737fde417a3d86@sha256:b2257a5f6e2427a5a96f6ea9ca2b652ee648e131e9a699df6e20b4bcfa4ef940","livenessProbe":{"httpGet":{"httpHeaders":[{"name":"k-kubelet-probe","value":"activator"}],"path":"/healthz","port":8012}},"name":"activator","ports":[{"containerPort":8012,"name":"http1"},{"containerPort":8013,"name":"h2c"},{"containerPort":9090,"name":"metrics"},{"containerPort":8008,"name":"profiling"}],"readinessProbe":{"httpGet":{"httpHeaders":[{"name":"k-kubelet-probe","value":"activator"}],"path":"/healthz","port":8012}},"resources":{"limits":{"cpu":"1000m","memory":"600Mi"},"requests":{"cpu":"300m","memory":"60Mi"}},"securityContext":{"allowPrivilegeEscalation":false}}],"serviceAccountName":"controller","terminationGracePeriodSeconds":300}}}} | |
creationTimestamp: "2019-12-03T10:54:22Z" | |
generation: 1 | |
labels: | |
serving.knative.dev/release: devel | |
name: activator | |
namespace: knative-serving | |
resourceVersion: "55014" | |
selfLink: /apis/extensions/v1beta1/namespaces/knative-serving/deployments/activator | |
uid: 437f3440-15bb-11ea-b5af-027e0b84da98 | |
spec: | |
progressDeadlineSeconds: 600 | |
replicas: 1 | |
revisionHistoryLimit: 10 | |
selector: | |
matchLabels: | |
app: activator | |
role: activator | |
strategy: | |
rollingUpdate: | |
maxSurge: 25% | |
maxUnavailable: 25% | |
type: RollingUpdate | |
template: | |
metadata: | |
annotations: | |
cluster-autoscaler.kubernetes.io/safe-to-evict: "false" | |
sidecar.istio.io/inject: "true" | |
creationTimestamp: null | |
labels: | |
app: activator | |
role: activator | |
serving.knative.dev/release: devel | |
spec: | |
containers: | |
- env: | |
- name: POD_NAME | |
valueFrom: | |
fieldRef: | |
apiVersion: v1 | |
fieldPath: metadata.name | |
- name: POD_IP | |
valueFrom: | |
fieldRef: | |
apiVersion: v1 | |
fieldPath: status.podIP | |
- name: SYSTEM_NAMESPACE | |
valueFrom: | |
fieldRef: | |
apiVersion: v1 | |
fieldPath: metadata.namespace | |
- name: CONFIG_LOGGING_NAME | |
value: config-logging | |
- name: CONFIG_OBSERVABILITY_NAME | |
value: config-observability | |
- name: METRICS_DOMAIN | |
value: knative.dev/internal/serving | |
image: gcr.io/gcp-compute-engine-223401/activator-ecd51ca5034883acbe737fde417a3d86@sha256:b2257a5f6e2427a5a96f6ea9ca2b652ee648e131e9a699df6e20b4bcfa4ef940 | |
imagePullPolicy: IfNotPresent | |
livenessProbe: | |
failureThreshold: 3 | |
httpGet: | |
httpHeaders: | |
- name: k-kubelet-probe | |
value: activator | |
path: /healthz | |
port: 8012 | |
scheme: HTTP | |
periodSeconds: 10 | |
successThreshold: 1 | |
timeoutSeconds: 1 | |
name: activator | |
ports: | |
- containerPort: 8012 | |
name: http1 | |
protocol: TCP | |
- containerPort: 8013 | |
name: h2c | |
protocol: TCP | |
- containerPort: 9090 | |
name: metrics | |
protocol: TCP | |
- containerPort: 8008 | |
name: profiling | |
protocol: TCP | |
readinessProbe: | |
failureThreshold: 3 | |
httpGet: | |
httpHeaders: | |
- name: k-kubelet-probe | |
value: activator | |
path: /healthz | |
port: 8012 | |
scheme: HTTP | |
periodSeconds: 10 | |
successThreshold: 1 | |
timeoutSeconds: 1 | |
resources: | |
limits: | |
cpu: "1" | |
memory: 600Mi | |
requests: | |
cpu: 300m | |
memory: 60Mi | |
securityContext: | |
allowPrivilegeEscalation: false | |
terminationMessagePath: /dev/termination-log | |
terminationMessagePolicy: File | |
dnsPolicy: ClusterFirst | |
restartPolicy: Always | |
schedulerName: default-scheduler | |
securityContext: {} | |
serviceAccount: controller | |
serviceAccountName: controller | |
terminationGracePeriodSeconds: 300 | |
status: | |
availableReplicas: 1 | |
conditions: | |
- lastTransitionTime: "2019-12-03T10:54:22Z" | |
lastUpdateTime: "2019-12-03T10:54:55Z" | |
message: ReplicaSet "activator-6f94df488" has successfully progressed. | |
reason: NewReplicaSetAvailable | |
status: "True" | |
type: Progressing | |
- lastTransitionTime: "2019-12-03T12:24:09Z" | |
lastUpdateTime: "2019-12-03T12:24:09Z" | |
message: Deployment has minimum availability. | |
reason: MinimumReplicasAvailable | |
status: "True" | |
type: Available | |
observedGeneration: 1 | |
readyReplicas: 1 | |
replicas: 1 | |
updatedReplicas: 1 | |
- apiVersion: extensions/v1beta1 | |
kind: Deployment | |
metadata: | |
annotations: | |
deployment.kubernetes.io/revision: "1" | |
kubectl.kubernetes.io/last-applied-configuration: | | |
{"apiVersion":"apps/v1","kind":"Deployment","metadata":{"annotations":{},"labels":{"serving.knative.dev/release":"devel"},"name":"autoscaler","namespace":"knative-serving"},"spec":{"replicas":1,"selector":{"matchLabels":{"app":"autoscaler"}},"template":{"metadata":{"annotations":{"cluster-autoscaler.kubernetes.io/safe-to-evict":"false","sidecar.istio.io/inject":"true","traffic.sidecar.istio.io/includeInboundPorts":"8080,9090"},"labels":{"app":"autoscaler","serving.knative.dev/release":"devel"}},"spec":{"containers":[{"args":["--secure-port=8443","--cert-dir=/tmp"],"env":[{"name":"SYSTEM_NAMESPACE","valueFrom":{"fieldRef":{"fieldPath":"metadata.namespace"}}},{"name":"CONFIG_LOGGING_NAME","value":"config-logging"},{"name":"CONFIG_OBSERVABILITY_NAME","value":"config-observability"},{"name":"METRICS_DOMAIN","value":"knative.dev/serving"}],"image":"gcr.io/gcp-compute-engine-223401/autoscaler-12c0fa24db31956a7cfa673210e4fa13@sha256:f74987342b3c7bcb8b95006f98a8efcfa19bd518430844df037cd5f29132c997","livenessProbe":{"httpGet":{"httpHeaders":[{"name":"k-kubelet-probe","value":"autoscaler"}],"path":"/healthz","port":8080}},"name":"autoscaler","ports":[{"containerPort":8080,"name":"websocket"},{"containerPort":9090,"name":"metrics"},{"containerPort":8443,"name":"custom-metrics"},{"containerPort":8008,"name":"profiling"}],"readinessProbe":{"httpGet":{"httpHeaders":[{"name":"k-kubelet-probe","value":"autoscaler"}],"path":"/healthz","port":8080}},"resources":{"limits":{"cpu":"300m","memory":"400Mi"},"requests":{"cpu":"30m","memory":"40Mi"}},"securityContext":{"allowPrivilegeEscalation":false}}],"serviceAccountName":"controller"}}}} | |
creationTimestamp: "2019-12-03T10:54:23Z" | |
generation: 1 | |
labels: | |
serving.knative.dev/release: devel | |
name: autoscaler | |
namespace: knative-serving | |
resourceVersion: "54916" | |
selfLink: /apis/extensions/v1beta1/namespaces/knative-serving/deployments/autoscaler | |
uid: 44426376-15bb-11ea-b5af-027e0b84da98 | |
spec: | |
progressDeadlineSeconds: 600 | |
replicas: 1 | |
revisionHistoryLimit: 10 | |
selector: | |
matchLabels: | |
app: autoscaler | |
strategy: | |
rollingUpdate: | |
maxSurge: 25% | |
maxUnavailable: 25% | |
type: RollingUpdate | |
template: | |
metadata: | |
annotations: | |
cluster-autoscaler.kubernetes.io/safe-to-evict: "false" | |
sidecar.istio.io/inject: "true" | |
traffic.sidecar.istio.io/includeInboundPorts: 8080,9090 | |
creationTimestamp: null | |
labels: | |
app: autoscaler | |
serving.knative.dev/release: devel | |
spec: | |
containers: | |
- args: | |
- --secure-port=8443 | |
- --cert-dir=/tmp | |
env: | |
- name: SYSTEM_NAMESPACE | |
valueFrom: | |
fieldRef: | |
apiVersion: v1 | |
fieldPath: metadata.namespace | |
- name: CONFIG_LOGGING_NAME | |
value: config-logging | |
- name: CONFIG_OBSERVABILITY_NAME | |
value: config-observability | |
- name: METRICS_DOMAIN | |
value: knative.dev/serving | |
image: gcr.io/gcp-compute-engine-223401/autoscaler-12c0fa24db31956a7cfa673210e4fa13@sha256:f74987342b3c7bcb8b95006f98a8efcfa19bd518430844df037cd5f29132c997 | |
imagePullPolicy: IfNotPresent | |
livenessProbe: | |
failureThreshold: 3 | |
httpGet: | |
httpHeaders: | |
- name: k-kubelet-probe | |
value: autoscaler | |
path: /healthz | |
port: 8080 | |
scheme: HTTP | |
periodSeconds: 10 | |
successThreshold: 1 | |
timeoutSeconds: 1 | |
name: autoscaler | |
ports: | |
- containerPort: 8080 | |
name: websocket | |
protocol: TCP | |
- containerPort: 9090 | |
name: metrics | |
protocol: TCP | |
- containerPort: 8443 | |
name: custom-metrics | |
protocol: TCP | |
- containerPort: 8008 | |
name: profiling | |
protocol: TCP | |
readinessProbe: | |
failureThreshold: 3 | |
httpGet: | |
httpHeaders: | |
- name: k-kubelet-probe | |
value: autoscaler | |
path: /healthz | |
port: 8080 | |
scheme: HTTP | |
periodSeconds: 10 | |
successThreshold: 1 | |
timeoutSeconds: 1 | |
resources: | |
limits: | |
cpu: 300m | |
memory: 400Mi | |
requests: | |
cpu: 30m | |
memory: 40Mi | |
securityContext: | |
allowPrivilegeEscalation: false | |
terminationMessagePath: /dev/termination-log | |
terminationMessagePolicy: File | |
dnsPolicy: ClusterFirst | |
restartPolicy: Always | |
schedulerName: default-scheduler | |
securityContext: {} | |
serviceAccount: controller | |
serviceAccountName: controller | |
terminationGracePeriodSeconds: 30 | |
status: | |
availableReplicas: 1 | |
conditions: | |
- lastTransitionTime: "2019-12-03T10:54:23Z" | |
lastUpdateTime: "2019-12-03T10:54:30Z" | |
message: ReplicaSet "autoscaler-698bf65564" has successfully progressed. | |
reason: NewReplicaSetAvailable | |
status: "True" | |
type: Progressing | |
- lastTransitionTime: "2019-12-03T12:23:43Z" | |
lastUpdateTime: "2019-12-03T12:23:43Z" | |
message: Deployment has minimum availability. | |
reason: MinimumReplicasAvailable | |
status: "True" | |
type: Available | |
observedGeneration: 1 | |
readyReplicas: 1 | |
replicas: 1 | |
updatedReplicas: 1 | |
- apiVersion: extensions/v1beta1 | |
kind: Deployment | |
metadata: | |
annotations: | |
deployment.kubernetes.io/revision: "1" | |
kubectl.kubernetes.io/last-applied-configuration: | | |
{"apiVersion":"apps/v1","kind":"Deployment","metadata":{"annotations":{},"labels":{"autoscaling.knative.dev/autoscaler-provider":"hpa","serving.knative.dev/release":"devel"},"name":"autoscaler-hpa","namespace":"knative-serving"},"spec":{"replicas":1,"selector":{"matchLabels":{"app":"autoscaler-hpa"}},"template":{"metadata":{"annotations":{"sidecar.istio.io/inject":"false"},"labels":{"app":"autoscaler-hpa","serving.knative.dev/release":"devel"}},"spec":{"containers":[{"env":[{"name":"SYSTEM_NAMESPACE","valueFrom":{"fieldRef":{"fieldPath":"metadata.namespace"}}},{"name":"CONFIG_LOGGING_NAME","value":"config-logging"},{"name":"CONFIG_OBSERVABILITY_NAME","value":"config-observability"},{"name":"METRICS_DOMAIN","value":"knative.dev/serving"}],"image":"gcr.io/gcp-compute-engine-223401/autoscaler-hpa-85c0b68178743d74ff7f663a72802ceb@sha256:24e81ede4cc223f0f70a1630fc4bed30308eb7b406715dbdd2280827f7565eec","name":"autoscaler-hpa","ports":[{"containerPort":9090,"name":"metrics"},{"containerPort":8008,"name":"profiling"}],"resources":{"limits":{"cpu":"1000m","memory":"1000Mi"},"requests":{"cpu":"100m","memory":"100Mi"}},"securityContext":{"allowPrivilegeEscalation":false}}],"serviceAccountName":"controller"}}}} | |
creationTimestamp: "2019-12-03T10:54:23Z" | |
generation: 1 | |
labels: | |
autoscaling.knative.dev/autoscaler-provider: hpa | |
serving.knative.dev/release: devel | |
name: autoscaler-hpa | |
namespace: knative-serving | |
resourceVersion: "54625" | |
selfLink: /apis/extensions/v1beta1/namespaces/knative-serving/deployments/autoscaler-hpa | |
uid: 43f4e7cf-15bb-11ea-b5af-027e0b84da98 | |
spec: | |
progressDeadlineSeconds: 600 | |
replicas: 1 | |
revisionHistoryLimit: 10 | |
selector: | |
matchLabels: | |
app: autoscaler-hpa | |
strategy: | |
rollingUpdate: | |
maxSurge: 25% | |
maxUnavailable: 25% | |
type: RollingUpdate | |
template: | |
metadata: | |
annotations: | |
sidecar.istio.io/inject: "false" | |
creationTimestamp: null | |
labels: | |
app: autoscaler-hpa | |
serving.knative.dev/release: devel | |
spec: | |
containers: | |
- env: | |
- name: SYSTEM_NAMESPACE | |
valueFrom: | |
fieldRef: | |
apiVersion: v1 | |
fieldPath: metadata.namespace | |
- name: CONFIG_LOGGING_NAME | |
value: config-logging | |
- name: CONFIG_OBSERVABILITY_NAME | |
value: config-observability | |
- name: METRICS_DOMAIN | |
value: knative.dev/serving | |
image: gcr.io/gcp-compute-engine-223401/autoscaler-hpa-85c0b68178743d74ff7f663a72802ceb@sha256:24e81ede4cc223f0f70a1630fc4bed30308eb7b406715dbdd2280827f7565eec | |
imagePullPolicy: IfNotPresent | |
name: autoscaler-hpa | |
ports: | |
- containerPort: 9090 | |
name: metrics | |
protocol: TCP | |
- containerPort: 8008 | |
name: profiling | |
protocol: TCP | |
resources: | |
limits: | |
cpu: "1" | |
memory: 1000Mi | |
requests: | |
cpu: 100m | |
memory: 100Mi | |
securityContext: | |
allowPrivilegeEscalation: false | |
terminationMessagePath: /dev/termination-log | |
terminationMessagePolicy: File | |
dnsPolicy: ClusterFirst | |
restartPolicy: Always | |
schedulerName: default-scheduler | |
securityContext: {} | |
serviceAccount: controller | |
serviceAccountName: controller | |
terminationGracePeriodSeconds: 30 | |
status: | |
availableReplicas: 1 | |
conditions: | |
- lastTransitionTime: "2019-12-03T10:54:23Z" | |
lastUpdateTime: "2019-12-03T10:54:28Z" | |
message: ReplicaSet "autoscaler-hpa-555cf99b79" has successfully progressed. | |
reason: NewReplicaSetAvailable | |
status: "True" | |
type: Progressing | |
- lastTransitionTime: "2019-12-03T12:23:16Z" | |
lastUpdateTime: "2019-12-03T12:23:16Z" | |
message: Deployment has minimum availability. | |
reason: MinimumReplicasAvailable | |
status: "True" | |
type: Available | |
observedGeneration: 1 | |
readyReplicas: 1 | |
replicas: 1 | |
updatedReplicas: 1 | |
- apiVersion: extensions/v1beta1 | |
kind: Deployment | |
metadata: | |
annotations: | |
deployment.kubernetes.io/revision: "1" | |
kubectl.kubernetes.io/last-applied-configuration: | | |
{"apiVersion":"apps/v1","kind":"Deployment","metadata":{"annotations":{},"labels":{"serving.knative.dev/release":"devel"},"name":"controller","namespace":"knative-serving"},"spec":{"replicas":1,"selector":{"matchLabels":{"app":"controller"}},"template":{"metadata":{"annotations":{"sidecar.istio.io/inject":"false"},"labels":{"app":"controller","serving.knative.dev/release":"devel"}},"spec":{"containers":[{"env":[{"name":"SYSTEM_NAMESPACE","valueFrom":{"fieldRef":{"fieldPath":"metadata.namespace"}}},{"name":"CONFIG_LOGGING_NAME","value":"config-logging"},{"name":"CONFIG_OBSERVABILITY_NAME","value":"config-observability"},{"name":"METRICS_DOMAIN","value":"knative.dev/internal/serving"}],"image":"gcr.io/gcp-compute-engine-223401/controller-f6fdb41c6acbc726e29a3104ff2ef720@sha256:7cde59d7e5e3f7891b57fb51ade68929b5220df54b70dc027a62018c54fe23d3","name":"controller","ports":[{"containerPort":9090,"name":"metrics"},{"containerPort":8008,"name":"profiling"}],"resources":{"limits":{"cpu":"1000m","memory":"1000Mi"},"requests":{"cpu":"100m","memory":"100Mi"}},"securityContext":{"allowPrivilegeEscalation":false}}],"serviceAccountName":"controller"}}}} | |
creationTimestamp: "2019-12-03T10:54:26Z" | |
generation: 1 | |
labels: | |
serving.knative.dev/release: devel | |
name: controller | |
namespace: knative-serving | |
resourceVersion: "54610" | |
selfLink: /apis/extensions/v1beta1/namespaces/knative-serving/deployments/controller | |
uid: 46218794-15bb-11ea-b5af-027e0b84da98 | |
spec: | |
progressDeadlineSeconds: 600 | |
replicas: 1 | |
revisionHistoryLimit: 10 | |
selector: | |
matchLabels: | |
app: controller | |
strategy: | |
rollingUpdate: | |
maxSurge: 25% | |
maxUnavailable: 25% | |
type: RollingUpdate | |
template: | |
metadata: | |
annotations: | |
sidecar.istio.io/inject: "false" | |
creationTimestamp: null | |
labels: | |
app: controller | |
serving.knative.dev/release: devel | |
spec: | |
containers: | |
- env: | |
- name: SYSTEM_NAMESPACE | |
valueFrom: | |
fieldRef: | |
apiVersion: v1 | |
fieldPath: metadata.namespace | |
- name: CONFIG_LOGGING_NAME | |
value: config-logging | |
- name: CONFIG_OBSERVABILITY_NAME | |
value: config-observability | |
- name: METRICS_DOMAIN | |
value: knative.dev/internal/serving | |
image: gcr.io/gcp-compute-engine-223401/controller-f6fdb41c6acbc726e29a3104ff2ef720@sha256:7cde59d7e5e3f7891b57fb51ade68929b5220df54b70dc027a62018c54fe23d3 | |
imagePullPolicy: IfNotPresent | |
name: controller | |
ports: | |
- containerPort: 9090 | |
name: metrics | |
protocol: TCP | |
- containerPort: 8008 | |
name: profiling | |
protocol: TCP | |
resources: | |
limits: | |
cpu: "1" | |
memory: 1000Mi | |
requests: | |
cpu: 100m | |
memory: 100Mi | |
securityContext: | |
allowPrivilegeEscalation: false | |
terminationMessagePath: /dev/termination-log | |
terminationMessagePolicy: File | |
dnsPolicy: ClusterFirst | |
restartPolicy: Always | |
schedulerName: default-scheduler | |
securityContext: {} | |
serviceAccount: controller | |
serviceAccountName: controller | |
terminationGracePeriodSeconds: 30 | |
status: | |
availableReplicas: 1 | |
conditions: | |
- lastTransitionTime: "2019-12-03T10:54:26Z" | |
lastUpdateTime: "2019-12-03T10:54:28Z" | |
message: ReplicaSet "controller-7667dd8fcb" has successfully progressed. | |
reason: NewReplicaSetAvailable | |
status: "True" | |
type: Progressing | |
- lastTransitionTime: "2019-12-03T12:23:14Z" | |
lastUpdateTime: "2019-12-03T12:23:14Z" | |
message: Deployment has minimum availability. | |
reason: MinimumReplicasAvailable | |
status: "True" | |
type: Available | |
observedGeneration: 1 | |
readyReplicas: 1 | |
replicas: 1 | |
updatedReplicas: 1 | |
- apiVersion: extensions/v1beta1 | |
kind: Deployment | |
metadata: | |
annotations: | |
deployment.kubernetes.io/revision: "1" | |
kubectl.kubernetes.io/last-applied-configuration: | | |
{"apiVersion":"apps/v1","kind":"Deployment","metadata":{"annotations":{},"labels":{"networking.knative.dev/certificate-provider":"cert-manager","serving.knative.dev/release":"devel"},"name":"networking-certmanager","namespace":"knative-serving"},"spec":{"replicas":1,"selector":{"matchLabels":{"app":"networking-certmanager"}},"template":{"metadata":{"annotations":{"sidecar.istio.io/inject":"false"},"labels":{"app":"networking-certmanager","serving.knative.dev/release":"devel"}},"spec":{"containers":[{"env":[{"name":"SYSTEM_NAMESPACE","valueFrom":{"fieldRef":{"fieldPath":"metadata.namespace"}}},{"name":"CONFIG_LOGGING_NAME","value":"config-logging"},{"name":"CONFIG_OBSERVABILITY_NAME","value":"config-observability"},{"name":"METRICS_DOMAIN","value":"knative.dev/serving"}],"image":"gcr.io/gcp-compute-engine-223401/certmanager-f79b5bfeb092d099f0f3326024a30ebb@sha256:9f7622fd03d96c3262e71b4f6fb14455145041c81950b3efe10010c122974bed","name":"networking-certmanager","ports":[{"containerPort":9090,"name":"metrics"},{"containerPort":8008,"name":"profiling"}],"resources":{"limits":{"cpu":"1000m","memory":"1000Mi"},"requests":{"cpu":"100m","memory":"100Mi"}},"securityContext":{"allowPrivilegeEscalation":false}}],"serviceAccountName":"controller"}}}} | |
creationTimestamp: "2019-12-03T10:54:27Z" | |
generation: 1 | |
labels: | |
networking.knative.dev/certificate-provider: cert-manager | |
serving.knative.dev/release: devel | |
name: networking-certmanager | |
namespace: knative-serving | |
resourceVersion: "54593" | |
selfLink: /apis/extensions/v1beta1/namespaces/knative-serving/deployments/networking-certmanager | |
uid: 46656e72-15bb-11ea-b5af-027e0b84da98 | |
spec: | |
progressDeadlineSeconds: 600 | |
replicas: 1 | |
revisionHistoryLimit: 10 | |
selector: | |
matchLabels: | |
app: networking-certmanager | |
strategy: | |
rollingUpdate: | |
maxSurge: 25% | |
maxUnavailable: 25% | |
type: RollingUpdate | |
template: | |
metadata: | |
annotations: | |
sidecar.istio.io/inject: "false" | |
creationTimestamp: null | |
labels: | |
app: networking-certmanager | |
serving.knative.dev/release: devel | |
spec: | |
containers: | |
- env: | |
- name: SYSTEM_NAMESPACE | |
valueFrom: | |
fieldRef: | |
apiVersion: v1 | |
fieldPath: metadata.namespace | |
- name: CONFIG_LOGGING_NAME | |
value: config-logging | |
- name: CONFIG_OBSERVABILITY_NAME | |
value: config-observability | |
- name: METRICS_DOMAIN | |
value: knative.dev/serving | |
image: gcr.io/gcp-compute-engine-223401/certmanager-f79b5bfeb092d099f0f3326024a30ebb@sha256:9f7622fd03d96c3262e71b4f6fb14455145041c81950b3efe10010c122974bed | |
imagePullPolicy: IfNotPresent | |
name: networking-certmanager | |
ports: | |
- containerPort: 9090 | |
name: metrics | |
protocol: TCP | |
- containerPort: 8008 | |
name: profiling | |
protocol: TCP | |
resources: | |
limits: | |
cpu: "1" | |
memory: 1000Mi | |
requests: | |
cpu: 100m | |
memory: 100Mi | |
securityContext: | |
allowPrivilegeEscalation: false | |
terminationMessagePath: /dev/termination-log | |
terminationMessagePolicy: File | |
dnsPolicy: ClusterFirst | |
restartPolicy: Always | |
schedulerName: default-scheduler | |
securityContext: {} | |
serviceAccount: controller | |
serviceAccountName: controller | |
terminationGracePeriodSeconds: 30 | |
status: | |
availableReplicas: 1 | |
conditions: | |
- lastTransitionTime: "2019-12-03T10:54:27Z" | |
lastUpdateTime: "2019-12-03T10:54:33Z" | |
message: ReplicaSet "networking-certmanager-6794bcc848" has successfully progressed. | |
reason: NewReplicaSetAvailable | |
status: "True" | |
type: Progressing | |
- lastTransitionTime: "2019-12-03T12:23:12Z" | |
lastUpdateTime: "2019-12-03T12:23:12Z" | |
message: Deployment has minimum availability. | |
reason: MinimumReplicasAvailable | |
status: "True" | |
type: Available | |
observedGeneration: 1 | |
readyReplicas: 1 | |
replicas: 1 | |
updatedReplicas: 1 | |
- apiVersion: extensions/v1beta1 | |
kind: Deployment | |
metadata: | |
annotations: | |
deployment.kubernetes.io/revision: "1" | |
kubectl.kubernetes.io/last-applied-configuration: | | |
{"apiVersion":"apps/v1","kind":"Deployment","metadata":{"annotations":{},"labels":{"networking.knative.dev/ingress-provider":"istio","serving.knative.dev/release":"devel"},"name":"networking-istio","namespace":"knative-serving"},"spec":{"replicas":1,"selector":{"matchLabels":{"app":"networking-istio"}},"template":{"metadata":{"annotations":{"sidecar.istio.io/inject":"false"},"labels":{"app":"networking-istio","serving.knative.dev/release":"devel"}},"spec":{"containers":[{"env":[{"name":"SYSTEM_NAMESPACE","valueFrom":{"fieldRef":{"fieldPath":"metadata.namespace"}}},{"name":"CONFIG_LOGGING_NAME","value":"config-logging"},{"name":"CONFIG_OBSERVABILITY_NAME","value":"config-observability"},{"name":"METRICS_DOMAIN","value":"knative.dev/serving"}],"image":"gcr.io/gcp-compute-engine-223401/istio-c58c0c8bb8ecc80f800bb788a425ae1d@sha256:ebdb4e8832e9574311494a31ea18dc63cf903e8dd7f0651d640eb2c7f252da2a","name":"networking-istio","ports":[{"containerPort":9090,"name":"metrics"},{"containerPort":8008,"name":"profiling"}],"resources":{"limits":{"cpu":"1000m","memory":"1000Mi"},"requests":{"cpu":"100m","memory":"100Mi"}},"securityContext":{"allowPrivilegeEscalation":false}}],"serviceAccountName":"controller"}}}} | |
creationTimestamp: "2019-12-03T10:54:27Z" | |
generation: 1 | |
labels: | |
networking.knative.dev/ingress-provider: istio | |
serving.knative.dev/release: devel | |
name: networking-istio | |
namespace: knative-serving | |
resourceVersion: "54655" | |
selfLink: /apis/extensions/v1beta1/namespaces/knative-serving/deployments/networking-istio | |
uid: 468dc8fb-15bb-11ea-b5af-027e0b84da98 | |
spec: | |
progressDeadlineSeconds: 600 | |
replicas: 1 | |
revisionHistoryLimit: 10 | |
selector: | |
matchLabels: | |
app: networking-istio | |
strategy: | |
rollingUpdate: | |
maxSurge: 25% | |
maxUnavailable: 25% | |
type: RollingUpdate | |
template: | |
metadata: | |
annotations: | |
sidecar.istio.io/inject: "false" | |
creationTimestamp: null | |
labels: | |
app: networking-istio | |
serving.knative.dev/release: devel | |
spec: | |
containers: | |
- env: | |
- name: SYSTEM_NAMESPACE | |
valueFrom: | |
fieldRef: | |
apiVersion: v1 | |
fieldPath: metadata.namespace | |
- name: CONFIG_LOGGING_NAME | |
value: config-logging | |
- name: CONFIG_OBSERVABILITY_NAME | |
value: config-observability | |
- name: METRICS_DOMAIN | |
value: knative.dev/serving | |
image: gcr.io/gcp-compute-engine-223401/istio-c58c0c8bb8ecc80f800bb788a425ae1d@sha256:ebdb4e8832e9574311494a31ea18dc63cf903e8dd7f0651d640eb2c7f252da2a | |
imagePullPolicy: IfNotPresent | |
name: networking-istio | |
ports: | |
- containerPort: 9090 | |
name: metrics | |
protocol: TCP | |
- containerPort: 8008 | |
name: profiling | |
protocol: TCP | |
resources: | |
limits: | |
cpu: "1" | |
memory: 1000Mi | |
requests: | |
cpu: 100m | |
memory: 100Mi | |
securityContext: | |
allowPrivilegeEscalation: false | |
terminationMessagePath: /dev/termination-log | |
terminationMessagePolicy: File | |
dnsPolicy: ClusterFirst | |
restartPolicy: Always | |
schedulerName: default-scheduler | |
securityContext: {} | |
serviceAccount: controller | |
serviceAccountName: controller | |
terminationGracePeriodSeconds: 30 | |
status: | |
availableReplicas: 1 | |
conditions: | |
- lastTransitionTime: "2019-12-03T10:54:27Z" | |
lastUpdateTime: "2019-12-03T10:54:29Z" | |
message: ReplicaSet "networking-istio-6854cd95ff" has successfully progressed. | |
reason: NewReplicaSetAvailable | |
status: "True" | |
type: Progressing | |
- lastTransitionTime: "2019-12-03T12:23:22Z" | |
lastUpdateTime: "2019-12-03T12:23:22Z" | |
message: Deployment has minimum availability. | |
reason: MinimumReplicasAvailable | |
status: "True" | |
type: Available | |
observedGeneration: 1 | |
readyReplicas: 1 | |
replicas: 1 | |
updatedReplicas: 1 | |
- apiVersion: extensions/v1beta1 | |
kind: Deployment | |
metadata: | |
annotations: | |
deployment.kubernetes.io/revision: "1" | |
kubectl.kubernetes.io/last-applied-configuration: | | |
{"apiVersion":"apps/v1","kind":"Deployment","metadata":{"annotations":{},"labels":{"networking.knative.dev/wildcard-certificate-provider":"nscert","serving.knative.dev/release":"devel"},"name":"networking-ns-cert","namespace":"knative-serving"},"spec":{"replicas":1,"selector":{"matchLabels":{"app":"networking-ns-cert"}},"template":{"metadata":{"annotations":{"sidecar.istio.io/inject":"false"},"labels":{"app":"networking-ns-cert"}},"spec":{"containers":[{"env":[{"name":"SYSTEM_NAMESPACE","valueFrom":{"fieldRef":{"fieldPath":"metadata.namespace"}}},{"name":"CONFIG_LOGGING_NAME","value":"config-logging"},{"name":"CONFIG_OBSERVABILITY_NAME","value":"config-observability"},{"name":"METRICS_DOMAIN","value":"knative.dev/serving"}],"image":"gcr.io/gcp-compute-engine-223401/nscert-e3625dd01dcb901439f4630ab9789e75@sha256:77da0645be1369d0e56a1daa204da6de6661488eef5858a60dee9a052f02150c","name":"networking-nscert","ports":[{"containerPort":9090,"name":"metrics"}],"resources":{"limits":{"cpu":"1000m","memory":"1000Mi"},"requests":{"cpu":"100m","memory":"100Mi"}},"securityContext":{"allowPrivilegeEscalation":false}}],"serviceAccountName":"controller"}}}} | |
creationTimestamp: "2019-12-03T10:54:27Z" | |
generation: 1 | |
labels: | |
networking.knative.dev/wildcard-certificate-provider: nscert | |
serving.knative.dev/release: devel | |
name: networking-ns-cert | |
namespace: knative-serving | |
resourceVersion: "54596" | |
selfLink: /apis/extensions/v1beta1/namespaces/knative-serving/deployments/networking-ns-cert | |
uid: 46bbfd69-15bb-11ea-b5af-027e0b84da98 | |
spec: | |
progressDeadlineSeconds: 600 | |
replicas: 1 | |
revisionHistoryLimit: 10 | |
selector: | |
matchLabels: | |
app: networking-ns-cert | |
strategy: | |
rollingUpdate: | |
maxSurge: 25% | |
maxUnavailable: 25% | |
type: RollingUpdate | |
template: | |
metadata: | |
annotations: | |
sidecar.istio.io/inject: "false" | |
creationTimestamp: null | |
labels: | |
app: networking-ns-cert | |
spec: | |
containers: | |
- env: | |
- name: SYSTEM_NAMESPACE | |
valueFrom: | |
fieldRef: | |
apiVersion: v1 | |
fieldPath: metadata.namespace | |
- name: CONFIG_LOGGING_NAME | |
value: config-logging | |
- name: CONFIG_OBSERVABILITY_NAME | |
value: config-observability | |
- name: METRICS_DOMAIN | |
value: knative.dev/serving | |
image: gcr.io/gcp-compute-engine-223401/nscert-e3625dd01dcb901439f4630ab9789e75@sha256:77da0645be1369d0e56a1daa204da6de6661488eef5858a60dee9a052f02150c | |
imagePullPolicy: IfNotPresent | |
name: networking-nscert | |
ports: | |
- containerPort: 9090 | |
name: metrics | |
protocol: TCP | |
resources: | |
limits: | |
cpu: "1" | |
memory: 1000Mi | |
requests: | |
cpu: 100m | |
memory: 100Mi | |
securityContext: | |
allowPrivilegeEscalation: false | |
terminationMessagePath: /dev/termination-log | |
terminationMessagePolicy: File | |
dnsPolicy: ClusterFirst | |
restartPolicy: Always | |
schedulerName: default-scheduler | |
securityContext: {} | |
serviceAccount: controller | |
serviceAccountName: controller | |
terminationGracePeriodSeconds: 30 | |
status: | |
availableReplicas: 1 | |
conditions: | |
- lastTransitionTime: "2019-12-03T10:54:27Z" | |
lastUpdateTime: "2019-12-03T10:54:36Z" | |
message: ReplicaSet "networking-ns-cert-55d77c7656" has successfully progressed. | |
reason: NewReplicaSetAvailable | |
status: "True" | |
type: Progressing | |
- lastTransitionTime: "2019-12-03T12:23:12Z" | |
lastUpdateTime: "2019-12-03T12:23:12Z" | |
message: Deployment has minimum availability. | |
reason: MinimumReplicasAvailable | |
status: "True" | |
type: Available | |
observedGeneration: 1 | |
readyReplicas: 1 | |
replicas: 1 | |
updatedReplicas: 1 | |
- apiVersion: extensions/v1beta1 | |
kind: Deployment | |
metadata: | |
annotations: | |
deployment.kubernetes.io/revision: "1" | |
kubectl.kubernetes.io/last-applied-configuration: | | |
{"apiVersion":"apps/v1","kind":"Deployment","metadata":{"annotations":{},"labels":{"serving.knative.dev/release":"devel"},"name":"webhook","namespace":"knative-serving"},"spec":{"replicas":1,"selector":{"matchLabels":{"app":"webhook","role":"webhook"}},"template":{"metadata":{"annotations":{"cluster-autoscaler.kubernetes.io/safe-to-evict":"false","sidecar.istio.io/inject":"false"},"labels":{"app":"webhook","role":"webhook","serving.knative.dev/release":"devel"}},"spec":{"containers":[{"env":[{"name":"SYSTEM_NAMESPACE","valueFrom":{"fieldRef":{"fieldPath":"metadata.namespace"}}},{"name":"CONFIG_LOGGING_NAME","value":"config-logging"},{"name":"CONFIG_OBSERVABILITY_NAME","value":"config-observability"},{"name":"METRICS_DOMAIN","value":"knative.dev/serving"}],"image":"gcr.io/gcp-compute-engine-223401/webhook-261c6506fca17bc41be50b3461f98f1c@sha256:012be54c7866cb8458fe96061f5321e519da7a4803809d912c2a670fff904ac6","name":"webhook","ports":[{"containerPort":9090,"name":"metrics"},{"containerPort":8008,"name":"profiling"}],"resources":{"limits":{"cpu":"200m","memory":"200Mi"},"requests":{"cpu":"20m","memory":"20Mi"}},"securityContext":{"allowPrivilegeEscalation":false}}],"serviceAccountName":"controller"}}}} | |
creationTimestamp: "2019-12-03T10:54:28Z" | |
generation: 1 | |
labels: | |
serving.knative.dev/release: devel | |
name: webhook | |
namespace: knative-serving | |
resourceVersion: "54619" | |
selfLink: /apis/extensions/v1beta1/namespaces/knative-serving/deployments/webhook | |
uid: 46e15f61-15bb-11ea-b5af-027e0b84da98 | |
spec: | |
progressDeadlineSeconds: 600 | |
replicas: 1 | |
revisionHistoryLimit: 10 | |
selector: | |
matchLabels: | |
app: webhook | |
role: webhook | |
strategy: | |
rollingUpdate: | |
maxSurge: 25% | |
maxUnavailable: 25% | |
type: RollingUpdate | |
template: | |
metadata: | |
annotations: | |
cluster-autoscaler.kubernetes.io/safe-to-evict: "false" | |
sidecar.istio.io/inject: "false" | |
creationTimestamp: null | |
labels: | |
app: webhook | |
role: webhook | |
serving.knative.dev/release: devel | |
spec: | |
containers: | |
- env: | |
- name: SYSTEM_NAMESPACE | |
valueFrom: | |
fieldRef: | |
apiVersion: v1 | |
fieldPath: metadata.namespace | |
- name: CONFIG_LOGGING_NAME | |
value: config-logging | |
- name: CONFIG_OBSERVABILITY_NAME | |
value: config-observability | |
- name: METRICS_DOMAIN | |
value: knative.dev/serving | |
image: gcr.io/gcp-compute-engine-223401/webhook-261c6506fca17bc41be50b3461f98f1c@sha256:012be54c7866cb8458fe96061f5321e519da7a4803809d912c2a670fff904ac6 | |
imagePullPolicy: IfNotPresent | |
name: webhook | |
ports: | |
- containerPort: 9090 | |
name: metrics | |
protocol: TCP | |
- containerPort: 8008 | |
name: profiling | |
protocol: TCP | |
resources: | |
limits: | |
cpu: 200m | |
memory: 200Mi | |
requests: | |
cpu: 20m | |
memory: 20Mi | |
securityContext: | |
allowPrivilegeEscalation: false | |
terminationMessagePath: /dev/termination-log | |
terminationMessagePolicy: File | |
dnsPolicy: ClusterFirst | |
restartPolicy: Always | |
schedulerName: default-scheduler | |
securityContext: {} | |
serviceAccount: controller | |
serviceAccountName: controller | |
terminationGracePeriodSeconds: 30 | |
status: | |
availableReplicas: 1 | |
conditions: | |
- lastTransitionTime: "2019-12-03T10:54:28Z" | |
lastUpdateTime: "2019-12-03T10:54:31Z" | |
message: ReplicaSet "webhook-54c85dd7d9" has successfully progressed. | |
reason: NewReplicaSetAvailable | |
status: "True" | |
type: Progressing | |
- lastTransitionTime: "2019-12-03T12:23:15Z" | |
lastUpdateTime: "2019-12-03T12:23:15Z" | |
message: Deployment has minimum availability. | |
reason: MinimumReplicasAvailable | |
status: "True" | |
type: Available | |
observedGeneration: 1 | |
readyReplicas: 1 | |
replicas: 1 | |
updatedReplicas: 1 | |
kind: List | |
metadata: | |
resourceVersion: "" | |
selfLink: "" | |
------- | |
resource: ingresses | |
------- | |
apiVersion: v1 | |
items: [] | |
kind: List | |
metadata: | |
resourceVersion: "" | |
selfLink: "" | |
------- | |
resource: networkpolicies | |
------- | |
apiVersion: v1 | |
items: [] | |
kind: List | |
metadata: | |
resourceVersion: "" | |
selfLink: "" | |
------- | |
resource: podsecuritypolicies | |
------- | |
apiVersion: v1 | |
items: [] | |
kind: List | |
metadata: | |
resourceVersion: "" | |
selfLink: "" | |
------- | |
resource: replicasets | |
------- | |
apiVersion: v1 | |
items: | |
- apiVersion: extensions/v1beta1 | |
kind: ReplicaSet | |
metadata: | |
annotations: | |
deployment.kubernetes.io/desired-replicas: "1" | |
deployment.kubernetes.io/max-replicas: "2" | |
deployment.kubernetes.io/revision: "1" | |
creationTimestamp: "2019-12-03T10:54:22Z" | |
generation: 1 | |
labels: | |
app: activator | |
pod-template-hash: 6f94df488 | |
role: activator | |
serving.knative.dev/release: devel | |
name: activator-6f94df488 | |
namespace: knative-serving | |
ownerReferences: | |
- apiVersion: apps/v1 | |
blockOwnerDeletion: true | |
controller: true | |
kind: Deployment | |
name: activator | |
uid: 437f3440-15bb-11ea-b5af-027e0b84da98 | |
resourceVersion: "55012" | |
selfLink: /apis/extensions/v1beta1/namespaces/knative-serving/replicasets/activator-6f94df488 | |
uid: 437fd7fa-15bb-11ea-b5af-027e0b84da98 | |
spec: | |
replicas: 1 | |
selector: | |
matchLabels: | |
app: activator | |
pod-template-hash: 6f94df488 | |
role: activator | |
template: | |
metadata: | |
annotations: | |
cluster-autoscaler.kubernetes.io/safe-to-evict: "false" | |
sidecar.istio.io/inject: "true" | |
creationTimestamp: null | |
labels: | |
app: activator | |
pod-template-hash: 6f94df488 | |
role: activator | |
serving.knative.dev/release: devel | |
spec: | |
containers: | |
- env: | |
- name: POD_NAME | |
valueFrom: | |
fieldRef: | |
apiVersion: v1 | |
fieldPath: metadata.name | |
- name: POD_IP | |
valueFrom: | |
fieldRef: | |
apiVersion: v1 | |
fieldPath: status.podIP | |
- name: SYSTEM_NAMESPACE | |
valueFrom: | |
fieldRef: | |
apiVersion: v1 | |
fieldPath: metadata.namespace | |
- name: CONFIG_LOGGING_NAME | |
value: config-logging | |
- name: CONFIG_OBSERVABILITY_NAME | |
value: config-observability | |
- name: METRICS_DOMAIN | |
value: knative.dev/internal/serving | |
image: gcr.io/gcp-compute-engine-223401/activator-ecd51ca5034883acbe737fde417a3d86@sha256:b2257a5f6e2427a5a96f6ea9ca2b652ee648e131e9a699df6e20b4bcfa4ef940 | |
imagePullPolicy: IfNotPresent | |
livenessProbe: | |
failureThreshold: 3 | |
httpGet: | |
httpHeaders: | |
- name: k-kubelet-probe | |
value: activator | |
path: /healthz | |
port: 8012 | |
scheme: HTTP | |
periodSeconds: 10 | |
successThreshold: 1 | |
timeoutSeconds: 1 | |
name: activator | |
ports: | |
- containerPort: 8012 | |
name: http1 | |
protocol: TCP | |
- containerPort: 8013 | |
name: h2c | |
protocol: TCP | |
- containerPort: 9090 | |
name: metrics | |
protocol: TCP | |
- containerPort: 8008 | |
name: profiling | |
protocol: TCP | |
readinessProbe: | |
failureThreshold: 3 | |
httpGet: | |
httpHeaders: | |
- name: k-kubelet-probe | |
value: activator | |
path: /healthz | |
port: 8012 | |
scheme: HTTP | |
periodSeconds: 10 | |
successThreshold: 1 | |
timeoutSeconds: 1 | |
resources: | |
limits: | |
cpu: "1" | |
memory: 600Mi | |
requests: | |
cpu: 300m | |
memory: 60Mi | |
securityContext: | |
allowPrivilegeEscalation: false | |
terminationMessagePath: /dev/termination-log | |
terminationMessagePolicy: File | |
dnsPolicy: ClusterFirst | |
restartPolicy: Always | |
schedulerName: default-scheduler | |
securityContext: {} | |
serviceAccount: controller | |
serviceAccountName: controller | |
terminationGracePeriodSeconds: 300 | |
status: | |
availableReplicas: 1 | |
fullyLabeledReplicas: 1 | |
observedGeneration: 1 | |
readyReplicas: 1 | |
replicas: 1 | |
- apiVersion: extensions/v1beta1 | |
kind: ReplicaSet | |
metadata: | |
annotations: | |
deployment.kubernetes.io/desired-replicas: "1" | |
deployment.kubernetes.io/max-replicas: "2" | |
deployment.kubernetes.io/revision: "1" | |
creationTimestamp: "2019-12-03T10:54:23Z" | |
generation: 1 | |
labels: | |
app: autoscaler | |
pod-template-hash: 698bf65564 | |
serving.knative.dev/release: devel | |
name: autoscaler-698bf65564 | |
namespace: knative-serving | |
ownerReferences: | |
- apiVersion: apps/v1 | |
blockOwnerDeletion: true | |
controller: true | |
kind: Deployment | |
name: autoscaler | |
uid: 44426376-15bb-11ea-b5af-027e0b84da98 | |
resourceVersion: "54914" | |
selfLink: /apis/extensions/v1beta1/namespaces/knative-serving/replicasets/autoscaler-698bf65564 | |
uid: 4443a853-15bb-11ea-b5af-027e0b84da98 | |
spec: | |
replicas: 1 | |
selector: | |
matchLabels: | |
app: autoscaler | |
pod-template-hash: 698bf65564 | |
template: | |
metadata: | |
annotations: | |
cluster-autoscaler.kubernetes.io/safe-to-evict: "false" | |
sidecar.istio.io/inject: "true" | |
traffic.sidecar.istio.io/includeInboundPorts: 8080,9090 | |
creationTimestamp: null | |
labels: | |
app: autoscaler | |
pod-template-hash: 698bf65564 | |
serving.knative.dev/release: devel | |
spec: | |
containers: | |
- args: | |
- --secure-port=8443 | |
- --cert-dir=/tmp | |
env: | |
- name: SYSTEM_NAMESPACE | |
valueFrom: | |
fieldRef: | |
apiVersion: v1 | |
fieldPath: metadata.namespace | |
- name: CONFIG_LOGGING_NAME | |
value: config-logging | |
- name: CONFIG_OBSERVABILITY_NAME | |
value: config-observability | |
- name: METRICS_DOMAIN | |
value: knative.dev/serving | |
image: gcr.io/gcp-compute-engine-223401/autoscaler-12c0fa24db31956a7cfa673210e4fa13@sha256:f74987342b3c7bcb8b95006f98a8efcfa19bd518430844df037cd5f29132c997 | |
imagePullPolicy: IfNotPresent | |
livenessProbe: | |
failureThreshold: 3 | |
httpGet: | |
httpHeaders: | |
- name: k-kubelet-probe | |
value: autoscaler | |
path: /healthz | |
port: 8080 | |
scheme: HTTP | |
periodSeconds: 10 | |
successThreshold: 1 | |
timeoutSeconds: 1 | |
name: autoscaler | |
ports: | |
- containerPort: 8080 | |
name: websocket | |
protocol: TCP | |
- containerPort: 9090 | |
name: metrics | |
protocol: TCP | |
- containerPort: 8443 | |
name: custom-metrics | |
protocol: TCP | |
- containerPort: 8008 | |
name: profiling | |
protocol: TCP | |
readinessProbe: | |
failureThreshold: 3 | |
httpGet: | |
httpHeaders: | |
- name: k-kubelet-probe | |
value: autoscaler | |
path: /healthz | |
port: 8080 | |
scheme: HTTP | |
periodSeconds: 10 | |
successThreshold: 1 | |
timeoutSeconds: 1 | |
resources: | |
limits: | |
cpu: 300m | |
memory: 400Mi | |
requests: | |
cpu: 30m | |
memory: 40Mi | |
securityContext: | |
allowPrivilegeEscalation: false | |
terminationMessagePath: /dev/termination-log | |
terminationMessagePolicy: File | |
dnsPolicy: ClusterFirst | |
restartPolicy: Always | |
schedulerName: default-scheduler | |
securityContext: {} | |
serviceAccount: controller | |
serviceAccountName: controller | |
terminationGracePeriodSeconds: 30 | |
status: | |
availableReplicas: 1 | |
fullyLabeledReplicas: 1 | |
observedGeneration: 1 | |
readyReplicas: 1 | |
replicas: 1 | |
- apiVersion: extensions/v1beta1 | |
kind: ReplicaSet | |
metadata: | |
annotations: | |
deployment.kubernetes.io/desired-replicas: "1" | |
deployment.kubernetes.io/max-replicas: "2" | |
deployment.kubernetes.io/revision: "1" | |
creationTimestamp: "2019-12-03T10:54:23Z" | |
generation: 1 | |
labels: | |
app: autoscaler-hpa | |
pod-template-hash: 555cf99b79 | |
serving.knative.dev/release: devel | |
name: autoscaler-hpa-555cf99b79 | |
namespace: knative-serving | |
ownerReferences: | |
- apiVersion: apps/v1 | |
blockOwnerDeletion: true | |
controller: true | |
kind: Deployment | |
name: autoscaler-hpa | |
uid: 43f4e7cf-15bb-11ea-b5af-027e0b84da98 | |
resourceVersion: "54624" | |
selfLink: /apis/extensions/v1beta1/namespaces/knative-serving/replicasets/autoscaler-hpa-555cf99b79 | |
uid: 43f57444-15bb-11ea-b5af-027e0b84da98 | |
spec: | |
replicas: 1 | |
selector: | |
matchLabels: | |
app: autoscaler-hpa | |
pod-template-hash: 555cf99b79 | |
template: | |
metadata: | |
annotations: | |
sidecar.istio.io/inject: "false" | |
creationTimestamp: null | |
labels: | |
app: autoscaler-hpa | |
pod-template-hash: 555cf99b79 | |
serving.knative.dev/release: devel | |
spec: | |
containers: | |
- env: | |
- name: SYSTEM_NAMESPACE | |
valueFrom: | |
fieldRef: | |
apiVersion: v1 | |
fieldPath: metadata.namespace | |
- name: CONFIG_LOGGING_NAME | |
value: config-logging | |
- name: CONFIG_OBSERVABILITY_NAME | |
value: config-observability | |
- name: METRICS_DOMAIN | |
value: knative.dev/serving | |
image: gcr.io/gcp-compute-engine-223401/autoscaler-hpa-85c0b68178743d74ff7f663a72802ceb@sha256:24e81ede4cc223f0f70a1630fc4bed30308eb7b406715dbdd2280827f7565eec | |
imagePullPolicy: IfNotPresent | |
name: autoscaler-hpa | |
ports: | |
- containerPort: 9090 | |
name: metrics | |
protocol: TCP | |
- containerPort: 8008 | |
name: profiling | |
protocol: TCP | |
resources: | |
limits: | |
cpu: "1" | |
memory: 1000Mi | |
requests: | |
cpu: 100m | |
memory: 100Mi | |
securityContext: | |
allowPrivilegeEscalation: false | |
terminationMessagePath: /dev/termination-log | |
terminationMessagePolicy: File | |
dnsPolicy: ClusterFirst | |
restartPolicy: Always | |
schedulerName: default-scheduler | |
securityContext: {} | |
serviceAccount: controller | |
serviceAccountName: controller | |
terminationGracePeriodSeconds: 30 | |
status: | |
availableReplicas: 1 | |
fullyLabeledReplicas: 1 | |
observedGeneration: 1 | |
readyReplicas: 1 | |
replicas: 1 | |
- apiVersion: extensions/v1beta1 | |
kind: ReplicaSet | |
metadata: | |
annotations: | |
deployment.kubernetes.io/desired-replicas: "1" | |
deployment.kubernetes.io/max-replicas: "2" | |
deployment.kubernetes.io/revision: "1" | |
creationTimestamp: "2019-12-03T10:54:26Z" | |
generation: 1 | |
labels: | |
app: controller | |
pod-template-hash: 7667dd8fcb | |
serving.knative.dev/release: devel | |
name: controller-7667dd8fcb | |
namespace: knative-serving | |
ownerReferences: | |
- apiVersion: apps/v1 | |
blockOwnerDeletion: true | |
controller: true | |
kind: Deployment | |
name: controller | |
uid: 46218794-15bb-11ea-b5af-027e0b84da98 | |
resourceVersion: "54608" | |
selfLink: /apis/extensions/v1beta1/namespaces/knative-serving/replicasets/controller-7667dd8fcb | |
uid: 4622381c-15bb-11ea-b5af-027e0b84da98 | |
spec: | |
replicas: 1 | |
selector: | |
matchLabels: | |
app: controller | |
pod-template-hash: 7667dd8fcb | |
template: | |
metadata: | |
annotations: | |
sidecar.istio.io/inject: "false" | |
creationTimestamp: null | |
labels: | |
app: controller | |
pod-template-hash: 7667dd8fcb | |
serving.knative.dev/release: devel | |
spec: | |
containers: | |
- env: | |
- name: SYSTEM_NAMESPACE | |
valueFrom: | |
fieldRef: | |
apiVersion: v1 | |
fieldPath: metadata.namespace | |
- name: CONFIG_LOGGING_NAME | |
value: config-logging | |
- name: CONFIG_OBSERVABILITY_NAME | |
value: config-observability | |
- name: METRICS_DOMAIN | |
value: knative.dev/internal/serving | |
image: gcr.io/gcp-compute-engine-223401/controller-f6fdb41c6acbc726e29a3104ff2ef720@sha256:7cde59d7e5e3f7891b57fb51ade68929b5220df54b70dc027a62018c54fe23d3 | |
imagePullPolicy: IfNotPresent | |
name: controller | |
ports: | |
- containerPort: 9090 | |
name: metrics | |
protocol: TCP | |
- containerPort: 8008 | |
name: profiling | |
protocol: TCP | |
resources: | |
limits: | |
cpu: "1" | |
memory: 1000Mi | |
requests: | |
cpu: 100m | |
memory: 100Mi | |
securityContext: | |
allowPrivilegeEscalation: false | |
terminationMessagePath: /dev/termination-log | |
terminationMessagePolicy: File | |
dnsPolicy: ClusterFirst | |
restartPolicy: Always | |
schedulerName: default-scheduler | |
securityContext: {} | |
serviceAccount: controller | |
serviceAccountName: controller | |
terminationGracePeriodSeconds: 30 | |
status: | |
availableReplicas: 1 | |
fullyLabeledReplicas: 1 | |
observedGeneration: 1 | |
readyReplicas: 1 | |
replicas: 1 | |
- apiVersion: extensions/v1beta1 | |
kind: ReplicaSet | |
metadata: | |
annotations: | |
deployment.kubernetes.io/desired-replicas: "1" | |
deployment.kubernetes.io/max-replicas: "2" | |
deployment.kubernetes.io/revision: "1" | |
creationTimestamp: "2019-12-03T10:54:27Z" | |
generation: 1 | |
labels: | |
app: networking-certmanager | |
pod-template-hash: 6794bcc848 | |
serving.knative.dev/release: devel | |
name: networking-certmanager-6794bcc848 | |
namespace: knative-serving | |
ownerReferences: | |
- apiVersion: apps/v1 | |
blockOwnerDeletion: true | |
controller: true | |
kind: Deployment | |
name: networking-certmanager | |
uid: 46656e72-15bb-11ea-b5af-027e0b84da98 | |
resourceVersion: "54592" | |
selfLink: /apis/extensions/v1beta1/namespaces/knative-serving/replicasets/networking-certmanager-6794bcc848 | |
uid: 46666167-15bb-11ea-b5af-027e0b84da98 | |
spec: | |
replicas: 1 | |
selector: | |
matchLabels: | |
app: networking-certmanager | |
pod-template-hash: 6794bcc848 | |
template: | |
metadata: | |
annotations: | |
sidecar.istio.io/inject: "false" | |
creationTimestamp: null | |
labels: | |
app: networking-certmanager | |
pod-template-hash: 6794bcc848 | |
serving.knative.dev/release: devel | |
spec: | |
containers: | |
- env: | |
- name: SYSTEM_NAMESPACE | |
valueFrom: | |
fieldRef: | |
apiVersion: v1 | |
fieldPath: metadata.namespace | |
- name: CONFIG_LOGGING_NAME | |
value: config-logging | |
- name: CONFIG_OBSERVABILITY_NAME | |
value: config-observability | |
- name: METRICS_DOMAIN | |
value: knative.dev/serving | |
image: gcr.io/gcp-compute-engine-223401/certmanager-f79b5bfeb092d099f0f3326024a30ebb@sha256:9f7622fd03d96c3262e71b4f6fb14455145041c81950b3efe10010c122974bed | |
imagePullPolicy: IfNotPresent | |
name: networking-c |
Sign up for free
to join this conversation on GitHub.
Already have an account?
Sign in to comment