Created
December 3, 2019 13:29
-
-
Save nak3/14f895e5f93f58b3497a2eac8ed8cbb3 to your computer and use it in GitHub Desktop.
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
------- | |
resource: NAME | |
------- | |
------- | |
resource: bindings | |
------- | |
apiVersion: v1 | |
items: [] | |
kind: List | |
metadata: | |
resourceVersion: "" | |
selfLink: "" | |
------- | |
resource: componentstatuses | |
------- | |
apiVersion: v1 | |
items: | |
- apiVersion: v1 | |
conditions: | |
- message: ok | |
status: "True" | |
type: Healthy | |
kind: ComponentStatus | |
metadata: | |
creationTimestamp: null | |
name: controller-manager | |
selfLink: /api/v1/componentstatuses/controller-manager | |
- apiVersion: v1 | |
conditions: | |
- message: ok | |
status: "True" | |
type: Healthy | |
kind: ComponentStatus | |
metadata: | |
creationTimestamp: null | |
name: scheduler | |
selfLink: /api/v1/componentstatuses/scheduler | |
- apiVersion: v1 | |
conditions: | |
- message: '{"health":"true"}' | |
status: "True" | |
type: Healthy | |
kind: ComponentStatus | |
metadata: | |
creationTimestamp: null | |
name: etcd-1 | |
selfLink: /api/v1/componentstatuses/etcd-1 | |
- apiVersion: v1 | |
conditions: | |
- message: '{"health":"true"}' | |
status: "True" | |
type: Healthy | |
kind: ComponentStatus | |
metadata: | |
creationTimestamp: null | |
name: etcd-0 | |
selfLink: /api/v1/componentstatuses/etcd-0 | |
kind: List | |
metadata: | |
resourceVersion: "" | |
selfLink: "" | |
------- | |
resource: configmaps | |
------- | |
apiVersion: v1 | |
items: | |
- apiVersion: v1 | |
data: | |
testKey: testValue | |
kind: ConfigMap | |
metadata: | |
annotations: | |
kubectl.kubernetes.io/last-applied-configuration: | | |
{"apiVersion":"v1","data":{"testKey":"testValue"},"kind":"ConfigMap","metadata":{"annotations":{},"name":"conformance-test-configmap","namespace":"serving-tests"}} | |
creationTimestamp: "2019-12-03T06:51:16Z" | |
name: conformance-test-configmap | |
namespace: serving-tests | |
resourceVersion: "15018" | |
selfLink: /api/v1/namespaces/serving-tests/configmaps/conformance-test-configmap | |
uid: 4dd492b6-1599-11ea-b5af-027e0b84da98 | |
kind: List | |
metadata: | |
resourceVersion: "" | |
selfLink: "" | |
------- | |
resource: endpoints | |
------- | |
apiVersion: v1 | |
items: | |
- apiVersion: v1 | |
kind: Endpoints | |
metadata: | |
annotations: | |
autoscaling.knative.dev/class: kpa.autoscaling.knative.dev | |
serving.knative.dev/creator: admin | |
sidecar.istio.io/inject: "true" | |
creationTimestamp: "2019-12-03T12:44:54Z" | |
labels: | |
app: hello-example-1 | |
networking.internal.knative.dev/serverlessservice: hello-example-1 | |
networking.internal.knative.dev/serviceType: Public | |
serving.knative.dev/configuration: hello-example | |
serving.knative.dev/configurationGeneration: "1" | |
serving.knative.dev/revision: hello-example-1 | |
serving.knative.dev/revisionUID: b40e6e6d-15ca-11ea-b5af-027e0b84da98 | |
serving.knative.dev/service: hello-example | |
name: hello-example-1 | |
namespace: serving-tests | |
ownerReferences: | |
- apiVersion: networking.internal.knative.dev/v1alpha1 | |
blockOwnerDeletion: true | |
controller: true | |
kind: ServerlessService | |
name: hello-example-1 | |
uid: b49e9147-15ca-11ea-b5af-027e0b84da98 | |
resourceVersion: "57359" | |
selfLink: /api/v1/namespaces/serving-tests/endpoints/hello-example-1 | |
uid: b4bc3d71-15ca-11ea-b5af-027e0b84da98 | |
subsets: | |
- addresses: | |
- ip: 172.20.46.102 | |
nodeName: ip-172-20-40-226.ap-southeast-1.compute.internal | |
targetRef: | |
kind: Pod | |
name: activator-6f94df488-qtnbp | |
namespace: knative-serving | |
resourceVersion: "55011" | |
uid: ab6353bf-15c7-11ea-b5af-027e0b84da98 | |
ports: | |
- name: http | |
port: 8012 | |
protocol: TCP | |
- apiVersion: v1 | |
kind: Endpoints | |
metadata: | |
annotations: | |
endpoints.kubernetes.io/last-change-trigger-time: "2019-12-03T12:44:59Z" | |
creationTimestamp: "2019-12-03T12:44:54Z" | |
labels: | |
app: hello-example-1 | |
networking.internal.knative.dev/serverlessservice: hello-example-1 | |
networking.internal.knative.dev/serviceType: Private | |
serving.knative.dev/configuration: hello-example | |
serving.knative.dev/configurationGeneration: "1" | |
serving.knative.dev/revision: hello-example-1 | |
serving.knative.dev/revisionUID: b40e6e6d-15ca-11ea-b5af-027e0b84da98 | |
serving.knative.dev/service: hello-example | |
name: hello-example-1-private | |
namespace: serving-tests | |
resourceVersion: "57329" | |
selfLink: /api/v1/namespaces/serving-tests/endpoints/hello-example-1-private | |
uid: b4b97a9e-15ca-11ea-b5af-027e0b84da98 | |
subsets: | |
- addresses: | |
- ip: 172.20.37.5 | |
nodeName: ip-172-20-44-18.ap-southeast-1.compute.internal | |
targetRef: | |
kind: Pod | |
name: hello-example-1-deployment-77cf969dd8-wkn87 | |
namespace: serving-tests | |
resourceVersion: "57328" | |
uid: b497b9e0-15ca-11ea-b5af-027e0b84da98 | |
ports: | |
- name: http-queueadm | |
port: 8022 | |
protocol: TCP | |
- name: http | |
port: 8012 | |
protocol: TCP | |
- name: http-usermetric | |
port: 9091 | |
protocol: TCP | |
- name: queue-metrics | |
port: 9090 | |
protocol: TCP | |
kind: List | |
metadata: | |
resourceVersion: "" | |
selfLink: "" | |
------- | |
resource: events | |
------- | |
apiVersion: v1 | |
items: | |
- apiVersion: v1 | |
count: 1 | |
eventTime: null | |
firstTimestamp: "2019-12-03T12:44:54Z" | |
involvedObject: | |
apiVersion: v1 | |
kind: Pod | |
name: hello-example-1-deployment-77cf969dd8-wkn87 | |
namespace: serving-tests | |
resourceVersion: "57290" | |
uid: b497b9e0-15ca-11ea-b5af-027e0b84da98 | |
kind: Event | |
lastTimestamp: "2019-12-03T12:44:54Z" | |
message: Successfully assigned serving-tests/hello-example-1-deployment-77cf969dd8-wkn87 | |
to ip-172-20-44-18.ap-southeast-1.compute.internal | |
metadata: | |
creationTimestamp: "2019-12-03T12:44:54Z" | |
name: hello-example-1-deployment-77cf969dd8-wkn87.15dcdd1eee7ea004 | |
namespace: serving-tests | |
resourceVersion: "3662" | |
selfLink: /api/v1/namespaces/serving-tests/events/hello-example-1-deployment-77cf969dd8-wkn87.15dcdd1eee7ea004 | |
uid: b49c444d-15ca-11ea-b5af-027e0b84da98 | |
reason: Scheduled | |
reportingComponent: "" | |
reportingInstance: "" | |
source: | |
component: default-scheduler | |
type: Normal | |
- apiVersion: v1 | |
count: 1 | |
eventTime: null | |
firstTimestamp: "2019-12-03T12:44:55Z" | |
involvedObject: | |
apiVersion: v1 | |
fieldPath: spec.initContainers{istio-init} | |
kind: Pod | |
name: hello-example-1-deployment-77cf969dd8-wkn87 | |
namespace: serving-tests | |
resourceVersion: "57292" | |
uid: b497b9e0-15ca-11ea-b5af-027e0b84da98 | |
kind: Event | |
lastTimestamp: "2019-12-03T12:44:55Z" | |
message: Container image "docker.io/istio/proxyv2:1.4.0" already present on machine | |
metadata: | |
creationTimestamp: "2019-12-03T12:44:55Z" | |
name: hello-example-1-deployment-77cf969dd8-wkn87.15dcdd1f1713e14f | |
namespace: serving-tests | |
resourceVersion: "3666" | |
selfLink: /api/v1/namespaces/serving-tests/events/hello-example-1-deployment-77cf969dd8-wkn87.15dcdd1f1713e14f | |
uid: b5043ed7-15ca-11ea-b5af-027e0b84da98 | |
reason: Pulled | |
reportingComponent: "" | |
reportingInstance: "" | |
source: | |
component: kubelet | |
host: ip-172-20-44-18.ap-southeast-1.compute.internal | |
type: Normal | |
- apiVersion: v1 | |
count: 1 | |
eventTime: null | |
firstTimestamp: "2019-12-03T12:44:55Z" | |
involvedObject: | |
apiVersion: v1 | |
fieldPath: spec.initContainers{istio-init} | |
kind: Pod | |
name: hello-example-1-deployment-77cf969dd8-wkn87 | |
namespace: serving-tests | |
resourceVersion: "57292" | |
uid: b497b9e0-15ca-11ea-b5af-027e0b84da98 | |
kind: Event | |
lastTimestamp: "2019-12-03T12:44:55Z" | |
message: Created container istio-init | |
metadata: | |
creationTimestamp: "2019-12-03T12:44:55Z" | |
name: hello-example-1-deployment-77cf969dd8-wkn87.15dcdd1f1a510dbd | |
namespace: serving-tests | |
resourceVersion: "3667" | |
selfLink: /api/v1/namespaces/serving-tests/events/hello-example-1-deployment-77cf969dd8-wkn87.15dcdd1f1a510dbd | |
uid: b50c805c-15ca-11ea-b5af-027e0b84da98 | |
reason: Created | |
reportingComponent: "" | |
reportingInstance: "" | |
source: | |
component: kubelet | |
host: ip-172-20-44-18.ap-southeast-1.compute.internal | |
type: Normal | |
- apiVersion: v1 | |
count: 1 | |
eventTime: null | |
firstTimestamp: "2019-12-03T12:44:55Z" | |
involvedObject: | |
apiVersion: v1 | |
fieldPath: spec.initContainers{istio-init} | |
kind: Pod | |
name: hello-example-1-deployment-77cf969dd8-wkn87 | |
namespace: serving-tests | |
resourceVersion: "57292" | |
uid: b497b9e0-15ca-11ea-b5af-027e0b84da98 | |
kind: Event | |
lastTimestamp: "2019-12-03T12:44:55Z" | |
message: Started container istio-init | |
metadata: | |
creationTimestamp: "2019-12-03T12:44:55Z" | |
name: hello-example-1-deployment-77cf969dd8-wkn87.15dcdd1f228a5329 | |
namespace: serving-tests | |
resourceVersion: "3668" | |
selfLink: /api/v1/namespaces/serving-tests/events/hello-example-1-deployment-77cf969dd8-wkn87.15dcdd1f228a5329 | |
uid: b521ab1a-15ca-11ea-b5af-027e0b84da98 | |
reason: Started | |
reportingComponent: "" | |
reportingInstance: "" | |
source: | |
component: kubelet | |
host: ip-172-20-44-18.ap-southeast-1.compute.internal | |
type: Normal | |
- apiVersion: v1 | |
count: 1 | |
eventTime: null | |
firstTimestamp: "2019-12-03T12:44:56Z" | |
involvedObject: | |
apiVersion: v1 | |
fieldPath: spec.containers{user-container} | |
kind: Pod | |
name: hello-example-1-deployment-77cf969dd8-wkn87 | |
namespace: serving-tests | |
resourceVersion: "57292" | |
uid: b497b9e0-15ca-11ea-b5af-027e0b84da98 | |
kind: Event | |
lastTimestamp: "2019-12-03T12:44:56Z" | |
message: Container image "gcr.io/knative-samples/helloworld-go@sha256:5ea96ba4b872685ff4ddb5cd8d1a97ec18c18fae79ee8df0d29f446c5efe5f50" | |
already present on machine | |
metadata: | |
creationTimestamp: "2019-12-03T12:44:56Z" | |
name: hello-example-1-deployment-77cf969dd8-wkn87.15dcdd1f51ad4ee9 | |
namespace: serving-tests | |
resourceVersion: "3669" | |
selfLink: /api/v1/namespaces/serving-tests/events/hello-example-1-deployment-77cf969dd8-wkn87.15dcdd1f51ad4ee9 | |
uid: b59a47ff-15ca-11ea-b5af-027e0b84da98 | |
reason: Pulled | |
reportingComponent: "" | |
reportingInstance: "" | |
source: | |
component: kubelet | |
host: ip-172-20-44-18.ap-southeast-1.compute.internal | |
type: Normal | |
- apiVersion: v1 | |
count: 1 | |
eventTime: null | |
firstTimestamp: "2019-12-03T12:44:56Z" | |
involvedObject: | |
apiVersion: v1 | |
fieldPath: spec.containers{user-container} | |
kind: Pod | |
name: hello-example-1-deployment-77cf969dd8-wkn87 | |
namespace: serving-tests | |
resourceVersion: "57292" | |
uid: b497b9e0-15ca-11ea-b5af-027e0b84da98 | |
kind: Event | |
lastTimestamp: "2019-12-03T12:44:56Z" | |
message: Created container user-container | |
metadata: | |
creationTimestamp: "2019-12-03T12:44:56Z" | |
name: hello-example-1-deployment-77cf969dd8-wkn87.15dcdd1f5509e9c4 | |
namespace: serving-tests | |
resourceVersion: "3670" | |
selfLink: /api/v1/namespaces/serving-tests/events/hello-example-1-deployment-77cf969dd8-wkn87.15dcdd1f5509e9c4 | |
uid: b5a2d0c1-15ca-11ea-b5af-027e0b84da98 | |
reason: Created | |
reportingComponent: "" | |
reportingInstance: "" | |
source: | |
component: kubelet | |
host: ip-172-20-44-18.ap-southeast-1.compute.internal | |
type: Normal | |
- apiVersion: v1 | |
count: 1 | |
eventTime: null | |
firstTimestamp: "2019-12-03T12:44:56Z" | |
involvedObject: | |
apiVersion: v1 | |
fieldPath: spec.containers{user-container} | |
kind: Pod | |
name: hello-example-1-deployment-77cf969dd8-wkn87 | |
namespace: serving-tests | |
resourceVersion: "57292" | |
uid: b497b9e0-15ca-11ea-b5af-027e0b84da98 | |
kind: Event | |
lastTimestamp: "2019-12-03T12:44:56Z" | |
message: Started container user-container | |
metadata: | |
creationTimestamp: "2019-12-03T12:44:56Z" | |
name: hello-example-1-deployment-77cf969dd8-wkn87.15dcdd1f5dda4f60 | |
namespace: serving-tests | |
resourceVersion: "3671" | |
selfLink: /api/v1/namespaces/serving-tests/events/hello-example-1-deployment-77cf969dd8-wkn87.15dcdd1f5dda4f60 | |
uid: b5b96b58-15ca-11ea-b5af-027e0b84da98 | |
reason: Started | |
reportingComponent: "" | |
reportingInstance: "" | |
source: | |
component: kubelet | |
host: ip-172-20-44-18.ap-southeast-1.compute.internal | |
type: Normal | |
- apiVersion: v1 | |
count: 1 | |
eventTime: null | |
firstTimestamp: "2019-12-03T12:44:56Z" | |
involvedObject: | |
apiVersion: v1 | |
fieldPath: spec.containers{queue-proxy} | |
kind: Pod | |
name: hello-example-1-deployment-77cf969dd8-wkn87 | |
namespace: serving-tests | |
resourceVersion: "57292" | |
uid: b497b9e0-15ca-11ea-b5af-027e0b84da98 | |
kind: Event | |
lastTimestamp: "2019-12-03T12:44:56Z" | |
message: Container image "gcr.io/gcp-compute-engine-223401/queue-39be6f1d08a095bd076a71d288d295b6@sha256:8adf8f990b4485e7ead4dc9e6f8ddb3a19142835de95386428deb9ffde8d20b2" | |
already present on machine | |
metadata: | |
creationTimestamp: "2019-12-03T12:44:56Z" | |
name: hello-example-1-deployment-77cf969dd8-wkn87.15dcdd1f5dfd8790 | |
namespace: serving-tests | |
resourceVersion: "3672" | |
selfLink: /api/v1/namespaces/serving-tests/events/hello-example-1-deployment-77cf969dd8-wkn87.15dcdd1f5dfd8790 | |
uid: b5b9ef75-15ca-11ea-b5af-027e0b84da98 | |
reason: Pulled | |
reportingComponent: "" | |
reportingInstance: "" | |
source: | |
component: kubelet | |
host: ip-172-20-44-18.ap-southeast-1.compute.internal | |
type: Normal | |
- apiVersion: v1 | |
count: 1 | |
eventTime: null | |
firstTimestamp: "2019-12-03T12:44:56Z" | |
involvedObject: | |
apiVersion: v1 | |
fieldPath: spec.containers{queue-proxy} | |
kind: Pod | |
name: hello-example-1-deployment-77cf969dd8-wkn87 | |
namespace: serving-tests | |
resourceVersion: "57292" | |
uid: b497b9e0-15ca-11ea-b5af-027e0b84da98 | |
kind: Event | |
lastTimestamp: "2019-12-03T12:44:56Z" | |
message: Created container queue-proxy | |
metadata: | |
creationTimestamp: "2019-12-03T12:44:56Z" | |
name: hello-example-1-deployment-77cf969dd8-wkn87.15dcdd1f60af649d | |
namespace: serving-tests | |
resourceVersion: "3673" | |
selfLink: /api/v1/namespaces/serving-tests/events/hello-example-1-deployment-77cf969dd8-wkn87.15dcdd1f60af649d | |
uid: b5c0a3d9-15ca-11ea-b5af-027e0b84da98 | |
reason: Created | |
reportingComponent: "" | |
reportingInstance: "" | |
source: | |
component: kubelet | |
host: ip-172-20-44-18.ap-southeast-1.compute.internal | |
type: Normal | |
- apiVersion: v1 | |
count: 1 | |
eventTime: null | |
firstTimestamp: "2019-12-03T12:44:56Z" | |
involvedObject: | |
apiVersion: v1 | |
fieldPath: spec.containers{queue-proxy} | |
kind: Pod | |
name: hello-example-1-deployment-77cf969dd8-wkn87 | |
namespace: serving-tests | |
resourceVersion: "57292" | |
uid: b497b9e0-15ca-11ea-b5af-027e0b84da98 | |
kind: Event | |
lastTimestamp: "2019-12-03T12:44:56Z" | |
message: Started container queue-proxy | |
metadata: | |
creationTimestamp: "2019-12-03T12:44:56Z" | |
name: hello-example-1-deployment-77cf969dd8-wkn87.15dcdd1f6a4ae44a | |
namespace: serving-tests | |
resourceVersion: "3674" | |
selfLink: /api/v1/namespaces/serving-tests/events/hello-example-1-deployment-77cf969dd8-wkn87.15dcdd1f6a4ae44a | |
uid: b5d96c65-15ca-11ea-b5af-027e0b84da98 | |
reason: Started | |
reportingComponent: "" | |
reportingInstance: "" | |
source: | |
component: kubelet | |
host: ip-172-20-44-18.ap-southeast-1.compute.internal | |
type: Normal | |
- apiVersion: v1 | |
count: 1 | |
eventTime: null | |
firstTimestamp: "2019-12-03T12:44:56Z" | |
involvedObject: | |
apiVersion: v1 | |
fieldPath: spec.containers{istio-proxy} | |
kind: Pod | |
name: hello-example-1-deployment-77cf969dd8-wkn87 | |
namespace: serving-tests | |
resourceVersion: "57292" | |
uid: b497b9e0-15ca-11ea-b5af-027e0b84da98 | |
kind: Event | |
lastTimestamp: "2019-12-03T12:44:56Z" | |
message: Container image "docker.io/istio/proxyv2:1.4.0" already present on machine | |
metadata: | |
creationTimestamp: "2019-12-03T12:44:56Z" | |
name: hello-example-1-deployment-77cf969dd8-wkn87.15dcdd1f6a6df4ae | |
namespace: serving-tests | |
resourceVersion: "3675" | |
selfLink: /api/v1/namespaces/serving-tests/events/hello-example-1-deployment-77cf969dd8-wkn87.15dcdd1f6a6df4ae | |
uid: b5da0732-15ca-11ea-b5af-027e0b84da98 | |
reason: Pulled | |
reportingComponent: "" | |
reportingInstance: "" | |
source: | |
component: kubelet | |
host: ip-172-20-44-18.ap-southeast-1.compute.internal | |
type: Normal | |
- apiVersion: v1 | |
count: 1 | |
eventTime: null | |
firstTimestamp: "2019-12-03T12:44:56Z" | |
involvedObject: | |
apiVersion: v1 | |
fieldPath: spec.containers{istio-proxy} | |
kind: Pod | |
name: hello-example-1-deployment-77cf969dd8-wkn87 | |
namespace: serving-tests | |
resourceVersion: "57292" | |
uid: b497b9e0-15ca-11ea-b5af-027e0b84da98 | |
kind: Event | |
lastTimestamp: "2019-12-03T12:44:56Z" | |
message: Created container istio-proxy | |
metadata: | |
creationTimestamp: "2019-12-03T12:44:56Z" | |
name: hello-example-1-deployment-77cf969dd8-wkn87.15dcdd1f6d57b2f3 | |
namespace: serving-tests | |
resourceVersion: "3676" | |
selfLink: /api/v1/namespaces/serving-tests/events/hello-example-1-deployment-77cf969dd8-wkn87.15dcdd1f6d57b2f3 | |
uid: b5e10a79-15ca-11ea-b5af-027e0b84da98 | |
reason: Created | |
reportingComponent: "" | |
reportingInstance: "" | |
source: | |
component: kubelet | |
host: ip-172-20-44-18.ap-southeast-1.compute.internal | |
type: Normal | |
- apiVersion: v1 | |
count: 1 | |
eventTime: null | |
firstTimestamp: "2019-12-03T12:44:56Z" | |
involvedObject: | |
apiVersion: v1 | |
fieldPath: spec.containers{istio-proxy} | |
kind: Pod | |
name: hello-example-1-deployment-77cf969dd8-wkn87 | |
namespace: serving-tests | |
resourceVersion: "57292" | |
uid: b497b9e0-15ca-11ea-b5af-027e0b84da98 | |
kind: Event | |
lastTimestamp: "2019-12-03T12:44:56Z" | |
message: Started container istio-proxy | |
metadata: | |
creationTimestamp: "2019-12-03T12:44:56Z" | |
name: hello-example-1-deployment-77cf969dd8-wkn87.15dcdd1f75ac2273 | |
namespace: serving-tests | |
resourceVersion: "3677" | |
selfLink: /api/v1/namespaces/serving-tests/events/hello-example-1-deployment-77cf969dd8-wkn87.15dcdd1f75ac2273 | |
uid: b5f66360-15ca-11ea-b5af-027e0b84da98 | |
reason: Started | |
reportingComponent: "" | |
reportingInstance: "" | |
source: | |
component: kubelet | |
host: ip-172-20-44-18.ap-southeast-1.compute.internal | |
type: Normal | |
- apiVersion: v1 | |
count: 1 | |
eventTime: null | |
firstTimestamp: "2019-12-03T12:44:57Z" | |
involvedObject: | |
apiVersion: v1 | |
fieldPath: spec.containers{istio-proxy} | |
kind: Pod | |
name: hello-example-1-deployment-77cf969dd8-wkn87 | |
namespace: serving-tests | |
resourceVersion: "57292" | |
uid: b497b9e0-15ca-11ea-b5af-027e0b84da98 | |
kind: Event | |
lastTimestamp: "2019-12-03T12:44:57Z" | |
message: 'Readiness probe failed: HTTP probe failed with statuscode: 503' | |
metadata: | |
creationTimestamp: "2019-12-03T12:44:57Z" | |
name: hello-example-1-deployment-77cf969dd8-wkn87.15dcdd1f9610a94e | |
namespace: serving-tests | |
resourceVersion: "3678" | |
selfLink: /api/v1/namespaces/serving-tests/events/hello-example-1-deployment-77cf969dd8-wkn87.15dcdd1f9610a94e | |
uid: b64976a7-15ca-11ea-b5af-027e0b84da98 | |
reason: Unhealthy | |
reportingComponent: "" | |
reportingInstance: "" | |
source: | |
component: kubelet | |
host: ip-172-20-44-18.ap-southeast-1.compute.internal | |
type: Warning | |
- apiVersion: v1 | |
count: 1 | |
eventTime: null | |
firstTimestamp: "2019-12-03T12:44:54Z" | |
involvedObject: | |
apiVersion: apps/v1 | |
kind: ReplicaSet | |
name: hello-example-1-deployment-77cf969dd8 | |
namespace: serving-tests | |
resourceVersion: "57286" | |
uid: b49122af-15ca-11ea-b5af-027e0b84da98 | |
kind: Event | |
lastTimestamp: "2019-12-03T12:44:54Z" | |
message: 'Created pod: hello-example-1-deployment-77cf969dd8-wkn87' | |
metadata: | |
creationTimestamp: "2019-12-03T12:44:54Z" | |
name: hello-example-1-deployment-77cf969dd8.15dcdd1eed30c7fe | |
namespace: serving-tests | |
resourceVersion: "3661" | |
selfLink: /api/v1/namespaces/serving-tests/events/hello-example-1-deployment-77cf969dd8.15dcdd1eed30c7fe | |
uid: b4996820-15ca-11ea-b5af-027e0b84da98 | |
reason: SuccessfulCreate | |
reportingComponent: "" | |
reportingInstance: "" | |
source: | |
component: replicaset-controller | |
type: Normal | |
- apiVersion: v1 | |
count: 1 | |
eventTime: null | |
firstTimestamp: "2019-12-03T12:22:57Z" | |
involvedObject: | |
apiVersion: v1 | |
fieldPath: spec.containers{user-container} | |
kind: Pod | |
name: hello-example-1-deployment-c698d5bfb-wbw8x | |
namespace: serving-tests | |
resourceVersion: "53500" | |
uid: 7e4ac08b-15c6-11ea-b5af-027e0b84da98 | |
kind: Event | |
lastTimestamp: "2019-12-03T12:22:57Z" | |
message: Stopping container user-container | |
metadata: | |
creationTimestamp: "2019-12-03T12:22:57Z" | |
name: hello-example-1-deployment-c698d5bfb-wbw8x.15dcdbec56d20325 | |
namespace: serving-tests | |
resourceVersion: "3278" | |
selfLink: /api/v1/namespaces/serving-tests/events/hello-example-1-deployment-c698d5bfb-wbw8x.15dcdbec56d20325 | |
uid: a3bcdaec-15c7-11ea-b5af-027e0b84da98 | |
reason: Killing | |
reportingComponent: "" | |
reportingInstance: "" | |
source: | |
component: kubelet | |
host: ip-172-20-44-180.ap-southeast-1.compute.internal | |
type: Normal | |
- apiVersion: v1 | |
count: 1 | |
eventTime: null | |
firstTimestamp: "2019-12-03T12:22:57Z" | |
involvedObject: | |
apiVersion: v1 | |
fieldPath: spec.containers{istio-proxy} | |
kind: Pod | |
name: hello-example-1-deployment-c698d5bfb-wbw8x | |
namespace: serving-tests | |
resourceVersion: "53500" | |
uid: 7e4ac08b-15c6-11ea-b5af-027e0b84da98 | |
kind: Event | |
lastTimestamp: "2019-12-03T12:22:57Z" | |
message: Stopping container istio-proxy | |
metadata: | |
creationTimestamp: "2019-12-03T12:22:57Z" | |
name: hello-example-1-deployment-c698d5bfb-wbw8x.15dcdbec56d63a30 | |
namespace: serving-tests | |
resourceVersion: "3276" | |
selfLink: /api/v1/namespaces/serving-tests/events/hello-example-1-deployment-c698d5bfb-wbw8x.15dcdbec56d63a30 | |
uid: a3bbe151-15c7-11ea-b5af-027e0b84da98 | |
reason: Killing | |
reportingComponent: "" | |
reportingInstance: "" | |
source: | |
component: kubelet | |
host: ip-172-20-44-180.ap-southeast-1.compute.internal | |
type: Normal | |
- apiVersion: v1 | |
count: 1 | |
eventTime: null | |
firstTimestamp: "2019-12-03T12:22:57Z" | |
involvedObject: | |
apiVersion: v1 | |
fieldPath: spec.containers{queue-proxy} | |
kind: Pod | |
name: hello-example-1-deployment-c698d5bfb-wbw8x | |
namespace: serving-tests | |
resourceVersion: "53500" | |
uid: 7e4ac08b-15c6-11ea-b5af-027e0b84da98 | |
kind: Event | |
lastTimestamp: "2019-12-03T12:22:57Z" | |
message: Stopping container queue-proxy | |
metadata: | |
creationTimestamp: "2019-12-03T12:22:57Z" | |
name: hello-example-1-deployment-c698d5bfb-wbw8x.15dcdbec56ddb43e | |
namespace: serving-tests | |
resourceVersion: "3277" | |
selfLink: /api/v1/namespaces/serving-tests/events/hello-example-1-deployment-c698d5bfb-wbw8x.15dcdbec56ddb43e | |
uid: a3bc51a0-15c7-11ea-b5af-027e0b84da98 | |
reason: Killing | |
reportingComponent: "" | |
reportingInstance: "" | |
source: | |
component: kubelet | |
host: ip-172-20-44-180.ap-southeast-1.compute.internal | |
type: Normal | |
- apiVersion: v1 | |
count: 1 | |
eventTime: null | |
firstTimestamp: "2019-12-03T12:22:57Z" | |
involvedObject: | |
apiVersion: v1 | |
fieldPath: spec.containers{user-container} | |
kind: Pod | |
name: hello-example-1-deployment-c698d5bfb-wbw8x | |
namespace: serving-tests | |
resourceVersion: "53500" | |
uid: 7e4ac08b-15c6-11ea-b5af-027e0b84da98 | |
kind: Event | |
lastTimestamp: "2019-12-03T12:22:57Z" | |
message: 'Http lifecycle hook (/wait-for-drain) for Container "user-container" in | |
Pod "hello-example-1-deployment-c698d5bfb-wbw8x_serving-tests(7e4ac08b-15c6-11ea-b5af-027e0b84da98)" | |
failed - error: Get http://172.20.37.106:8022//wait-for-drain: dial tcp 172.20.37.106:8022: | |
connect: connection refused, message: ""' | |
metadata: | |
creationTimestamp: "2019-12-03T12:22:57Z" | |
name: hello-example-1-deployment-c698d5bfb-wbw8x.15dcdbec59378e73 | |
namespace: serving-tests | |
resourceVersion: "3279" | |
selfLink: /api/v1/namespaces/serving-tests/events/hello-example-1-deployment-c698d5bfb-wbw8x.15dcdbec59378e73 | |
uid: a3c1fd35-15c7-11ea-b5af-027e0b84da98 | |
reason: FailedPreStopHook | |
reportingComponent: "" | |
reportingInstance: "" | |
source: | |
component: kubelet | |
host: ip-172-20-44-180.ap-southeast-1.compute.internal | |
type: Warning | |
- apiVersion: v1 | |
count: 9 | |
eventTime: null | |
firstTimestamp: "2019-12-03T12:22:58Z" | |
involvedObject: | |
apiVersion: v1 | |
fieldPath: spec.containers{istio-proxy} | |
kind: Pod | |
name: hello-example-1-deployment-c698d5bfb-wbw8x | |
namespace: serving-tests | |
resourceVersion: "53500" | |
uid: 7e4ac08b-15c6-11ea-b5af-027e0b84da98 | |
kind: Event | |
lastTimestamp: "2019-12-03T12:23:14Z" | |
message: 'Readiness probe failed: Get http://172.20.37.106:15020/healthz/ready: | |
dial tcp 172.20.37.106:15020: connect: connection refused' | |
metadata: | |
creationTimestamp: "2019-12-03T12:22:58Z" | |
name: hello-example-1-deployment-c698d5bfb-wbw8x.15dcdbec6dd9a165 | |
namespace: serving-tests | |
resourceVersion: "3347" | |
selfLink: /api/v1/namespaces/serving-tests/events/hello-example-1-deployment-c698d5bfb-wbw8x.15dcdbec6dd9a165 | |
uid: a3f6c820-15c7-11ea-b5af-027e0b84da98 | |
reason: Unhealthy | |
reportingComponent: "" | |
reportingInstance: "" | |
source: | |
component: kubelet | |
host: ip-172-20-44-180.ap-southeast-1.compute.internal | |
type: Warning | |
- apiVersion: v1 | |
count: 1 | |
eventTime: null | |
firstTimestamp: "2019-12-03T12:23:08Z" | |
involvedObject: | |
apiVersion: v1 | |
fieldPath: spec.containers{queue-proxy} | |
kind: Pod | |
name: hello-example-1-deployment-c698d5bfb-wbw8x | |
namespace: serving-tests | |
resourceVersion: "53500" | |
uid: 7e4ac08b-15c6-11ea-b5af-027e0b84da98 | |
kind: Event | |
lastTimestamp: "2019-12-03T12:23:08Z" | |
message: | | |
Readiness probe failed: probe returned not ready | |
metadata: | |
creationTimestamp: "2019-12-03T12:23:08Z" | |
name: hello-example-1-deployment-c698d5bfb-wbw8x.15dcdbeed1132878 | |
namespace: serving-tests | |
resourceVersion: "3287" | |
selfLink: /api/v1/namespaces/serving-tests/events/hello-example-1-deployment-c698d5bfb-wbw8x.15dcdbeed1132878 | |
uid: aa1389fa-15c7-11ea-b5af-027e0b84da98 | |
reason: Unhealthy | |
reportingComponent: "" | |
reportingInstance: "" | |
source: | |
component: kubelet | |
host: ip-172-20-44-180.ap-southeast-1.compute.internal | |
type: Warning | |
- apiVersion: v1 | |
count: 1 | |
eventTime: null | |
firstTimestamp: "2019-12-03T12:44:54Z" | |
involvedObject: | |
apiVersion: apps/v1 | |
kind: Deployment | |
name: hello-example-1-deployment | |
namespace: serving-tests | |
resourceVersion: "57285" | |
uid: b48fd382-15ca-11ea-b5af-027e0b84da98 | |
kind: Event | |
lastTimestamp: "2019-12-03T12:44:54Z" | |
message: Scaled up replica set hello-example-1-deployment-77cf969dd8 to 1 | |
metadata: | |
creationTimestamp: "2019-12-03T12:44:54Z" | |
name: hello-example-1-deployment.15dcdd1eea654d89 | |
namespace: serving-tests | |
resourceVersion: "3660" | |
selfLink: /api/v1/namespaces/serving-tests/events/hello-example-1-deployment.15dcdd1eea654d89 | |
uid: b491d870-15ca-11ea-b5af-027e0b84da98 | |
reason: ScalingReplicaSet | |
reportingComponent: "" | |
reportingInstance: "" | |
source: | |
component: deployment-controller | |
type: Normal | |
- apiVersion: v1 | |
count: 1 | |
eventTime: null | |
firstTimestamp: "2019-12-03T12:44:54Z" | |
involvedObject: | |
apiVersion: serving.knative.dev/v1alpha1 | |
kind: Revision | |
name: hello-example-1 | |
namespace: serving-tests | |
resourceVersion: "57298" | |
uid: b40e6e6d-15ca-11ea-b5af-027e0b84da98 | |
kind: Event | |
lastTimestamp: "2019-12-03T12:44:54Z" | |
message: 'failed to update PA "hello-example-1": Operation cannot be fulfilled on | |
podautoscalers.autoscaling.internal.knative.dev "hello-example-1": the object | |
has been modified; please apply your changes to the latest version and try again' | |
metadata: | |
creationTimestamp: "2019-12-03T12:44:54Z" | |
name: hello-example-1.15dcdd1ef2a75f4f | |
namespace: serving-tests | |
resourceVersion: "3663" | |
selfLink: /api/v1/namespaces/serving-tests/events/hello-example-1.15dcdd1ef2a75f4f | |
uid: b4a7723b-15ca-11ea-b5af-027e0b84da98 | |
reason: InternalError | |
reportingComponent: "" | |
reportingInstance: "" | |
source: | |
component: revision-controller | |
type: Warning | |
- apiVersion: v1 | |
count: 4 | |
eventTime: null | |
firstTimestamp: "2019-12-03T12:44:54Z" | |
involvedObject: | |
apiVersion: networking.internal.knative.dev/v1alpha1 | |
kind: ServerlessService | |
name: hello-example-1 | |
namespace: serving-tests | |
resourceVersion: "57297" | |
uid: b49e9147-15ca-11ea-b5af-027e0b84da98 | |
kind: Event | |
lastTimestamp: "2019-12-03T12:45:01Z" | |
message: Successfully updated ServerlessService "serving-tests/hello-example-1" | |
metadata: | |
creationTimestamp: "2019-12-03T12:44:54Z" | |
name: hello-example-1.15dcdd1efc4ebdcd | |
namespace: serving-tests | |
resourceVersion: "3695" | |
selfLink: /api/v1/namespaces/serving-tests/events/hello-example-1.15dcdd1efc4ebdcd | |
uid: b4c033cb-15ca-11ea-b5af-027e0b84da98 | |
reason: Updated | |
reportingComponent: "" | |
reportingInstance: "" | |
source: | |
component: serverlessservice-controller | |
type: Normal | |
- apiVersion: v1 | |
count: 1 | |
eventTime: null | |
firstTimestamp: "2019-12-03T12:44:54Z" | |
involvedObject: | |
apiVersion: autoscaling.internal.knative.dev/v1alpha1 | |
kind: Metric | |
name: hello-example-1 | |
namespace: serving-tests | |
resourceVersion: "57310" | |
uid: b4c059f0-15ca-11ea-b5af-027e0b84da98 | |
kind: Event | |
lastTimestamp: "2019-12-03T12:44:54Z" | |
message: Successfully updated metric status serving-tests/hello-example-1 | |
metadata: | |
creationTimestamp: "2019-12-03T12:44:54Z" | |
name: hello-example-1.15dcdd1efe1cbcd1 | |
namespace: serving-tests | |
resourceVersion: "3665" | |
selfLink: /api/v1/namespaces/serving-tests/events/hello-example-1.15dcdd1efe1cbcd1 | |
uid: b4c473f3-15ca-11ea-b5af-027e0b84da98 | |
reason: Updated | |
reportingComponent: "" | |
reportingInstance: "" | |
source: | |
component: metric-controller | |
type: Normal | |
- apiVersion: v1 | |
count: 1 | |
eventTime: null | |
firstTimestamp: "2019-12-03T12:44:59Z" | |
involvedObject: | |
apiVersion: serving.knative.dev/v1alpha1 | |
kind: Revision | |
name: hello-example-1 | |
namespace: serving-tests | |
resourceVersion: "57313" | |
uid: b40e6e6d-15ca-11ea-b5af-027e0b84da98 | |
kind: Event | |
lastTimestamp: "2019-12-03T12:44:59Z" | |
message: Revision becomes ready upon all resources being ready | |
metadata: | |
creationTimestamp: "2019-12-03T12:44:59Z" | |
name: hello-example-1.15dcdd201ba98230 | |
namespace: serving-tests | |
resourceVersion: "3681" | |
selfLink: /api/v1/namespaces/serving-tests/events/hello-example-1.15dcdd201ba98230 | |
uid: b79f5132-15ca-11ea-b5af-027e0b84da98 | |
reason: RevisionReady | |
reportingComponent: "" | |
reportingInstance: "" | |
source: | |
component: revision-controller | |
type: Normal | |
- apiVersion: v1 | |
count: 1 | |
eventTime: null | |
firstTimestamp: "2019-12-03T12:44:53Z" | |
involvedObject: | |
apiVersion: serving.knative.dev/v1alpha1 | |
kind: Service | |
name: hello-example | |
namespace: serving-tests | |
resourceVersion: "57270" | |
uid: b40342c9-15ca-11ea-b5af-027e0b84da98 | |
kind: Event | |
lastTimestamp: "2019-12-03T12:44:53Z" | |
message: Created Configuration "hello-example" | |
metadata: | |
creationTimestamp: "2019-12-03T12:44:53Z" | |
name: hello-example.15dcdd1eb6007a9e | |
namespace: serving-tests | |
resourceVersion: "3653" | |
selfLink: /api/v1/namespaces/serving-tests/events/hello-example.15dcdd1eb6007a9e | |
uid: b40ce853-15ca-11ea-b5af-027e0b84da98 | |
reason: Created | |
reportingComponent: "" | |
reportingInstance: "" | |
source: | |
component: service-controller | |
type: Normal | |
- apiVersion: v1 | |
count: 6 | |
eventTime: null | |
firstTimestamp: "2019-12-03T12:44:53Z" | |
involvedObject: | |
apiVersion: serving.knative.dev/v1alpha1 | |
kind: Service | |
name: hello-example | |
namespace: serving-tests | |
resourceVersion: "57270" | |
uid: b40342c9-15ca-11ea-b5af-027e0b84da98 | |
kind: Event | |
lastTimestamp: "2019-12-03T12:45:00Z" | |
message: Updated Service "hello-example" | |
metadata: | |
creationTimestamp: "2019-12-03T12:44:53Z" | |
name: hello-example.15dcdd1eb770c845 | |
namespace: serving-tests | |
resourceVersion: "3694" | |
selfLink: /api/v1/namespaces/serving-tests/events/hello-example.15dcdd1eb770c845 | |
uid: b4105ea9-15ca-11ea-b5af-027e0b84da98 | |
reason: Updated | |
reportingComponent: "" | |
reportingInstance: "" | |
source: | |
component: service-controller | |
type: Normal | |
- apiVersion: v1 | |
count: 1 | |
eventTime: null | |
firstTimestamp: "2019-12-03T12:44:53Z" | |
involvedObject: | |
apiVersion: serving.knative.dev/v1alpha1 | |
kind: Configuration | |
name: hello-example | |
namespace: serving-tests | |
resourceVersion: "57271" | |
uid: b4085dc9-15ca-11ea-b5af-027e0b84da98 | |
kind: Event | |
lastTimestamp: "2019-12-03T12:44:53Z" | |
message: Created Revision "hello-example-1" | |
metadata: | |
creationTimestamp: "2019-12-03T12:44:53Z" | |
name: hello-example.15dcdd1eb7e21b66 | |
namespace: serving-tests | |
resourceVersion: "3655" | |
selfLink: /api/v1/namespaces/serving-tests/events/hello-example.15dcdd1eb7e21b66 | |
uid: b41111f4-15ca-11ea-b5af-027e0b84da98 | |
reason: Created | |
reportingComponent: "" | |
reportingInstance: "" | |
source: | |
component: configuration-controller | |
type: Normal | |
- apiVersion: v1 | |
count: 1 | |
eventTime: null | |
firstTimestamp: "2019-12-03T12:44:53Z" | |
involvedObject: | |
apiVersion: serving.knative.dev/v1alpha1 | |
kind: Service | |
name: hello-example | |
namespace: serving-tests | |
resourceVersion: "57272" | |
uid: b40342c9-15ca-11ea-b5af-027e0b84da98 | |
kind: Event | |
lastTimestamp: "2019-12-03T12:44:53Z" | |
message: Created Route "hello-example" | |
metadata: | |
creationTimestamp: "2019-12-03T12:44:53Z" | |
name: hello-example.15dcdd1eb9f2aad8 | |
namespace: serving-tests | |
resourceVersion: "3656" | |
selfLink: /api/v1/namespaces/serving-tests/events/hello-example.15dcdd1eb9f2aad8 | |
uid: b415f0ab-15ca-11ea-b5af-027e0b84da98 | |
reason: Created | |
reportingComponent: "" | |
reportingInstance: "" | |
source: | |
component: service-controller | |
type: Normal | |
- apiVersion: v1 | |
count: 1 | |
eventTime: null | |
firstTimestamp: "2019-12-03T12:44:53Z" | |
involvedObject: | |
apiVersion: serving.knative.dev/v1alpha1 | |
kind: Route | |
name: hello-example | |
namespace: serving-tests | |
resourceVersion: "57275" | |
uid: b413f714-15ca-11ea-b5af-027e0b84da98 | |
kind: Event | |
lastTimestamp: "2019-12-03T12:44:53Z" | |
message: 'Failed to update status for Route "hello-example": Operation cannot be | |
fulfilled on routes.serving.knative.dev "hello-example": the object has been modified; | |
please apply your changes to the latest version and try again' | |
metadata: | |
creationTimestamp: "2019-12-03T12:44:53Z" | |
name: hello-example.15dcdd1ebb618470 | |
namespace: serving-tests | |
resourceVersion: "3658" | |
selfLink: /api/v1/namespaces/serving-tests/events/hello-example.15dcdd1ebb618470 | |
uid: b419a3b8-15ca-11ea-b5af-027e0b84da98 | |
reason: UpdateFailed | |
reportingComponent: "" | |
reportingInstance: "" | |
source: | |
component: route-controller | |
type: Warning | |
- apiVersion: v1 | |
count: 1 | |
eventTime: null | |
firstTimestamp: "2019-12-03T12:44:59Z" | |
involvedObject: | |
apiVersion: serving.knative.dev/v1alpha1 | |
kind: Configuration | |
name: hello-example | |
namespace: serving-tests | |
resourceVersion: "57280" | |
uid: b4085dc9-15ca-11ea-b5af-027e0b84da98 | |
kind: Event | |
lastTimestamp: "2019-12-03T12:44:59Z" | |
message: Configuration becomes ready | |
metadata: | |
creationTimestamp: "2019-12-03T12:44:59Z" | |
name: hello-example.15dcdd201c4a80d5 | |
namespace: serving-tests | |
resourceVersion: "3682" | |
selfLink: /api/v1/namespaces/serving-tests/events/hello-example.15dcdd201c4a80d5 | |
uid: b7a11e19-15ca-11ea-b5af-027e0b84da98 | |
reason: ConfigurationReady | |
reportingComponent: "" | |
reportingInstance: "" | |
source: | |
component: configuration-controller | |
type: Normal | |
- apiVersion: v1 | |
count: 1 | |
eventTime: null | |
firstTimestamp: "2019-12-03T12:44:59Z" | |
involvedObject: | |
apiVersion: serving.knative.dev/v1alpha1 | |
kind: Configuration | |
name: hello-example | |
namespace: serving-tests | |
resourceVersion: "57280" | |
uid: b4085dc9-15ca-11ea-b5af-027e0b84da98 | |
kind: Event | |
lastTimestamp: "2019-12-03T12:44:59Z" | |
message: LatestReadyRevisionName updated to "hello-example-1" | |
metadata: | |
creationTimestamp: "2019-12-03T12:44:59Z" | |
name: hello-example.15dcdd201c4b89c4 | |
namespace: serving-tests | |
resourceVersion: "3683" | |
selfLink: /api/v1/namespaces/serving-tests/events/hello-example.15dcdd201c4b89c4 | |
uid: b7a32e67-15ca-11ea-b5af-027e0b84da98 | |
reason: LatestReadyUpdate | |
reportingComponent: "" | |
reportingInstance: "" | |
source: | |
component: configuration-controller | |
type: Normal | |
- apiVersion: v1 | |
count: 1 | |
eventTime: null | |
firstTimestamp: "2019-12-03T12:44:59Z" | |
involvedObject: | |
apiVersion: serving.knative.dev/v1alpha1 | |
kind: Route | |
name: hello-example | |
namespace: serving-tests | |
resourceVersion: "57278" | |
uid: b413f714-15ca-11ea-b5af-027e0b84da98 | |
kind: Event | |
lastTimestamp: "2019-12-03T12:44:59Z" | |
message: Created placeholder service "hello-example" | |
metadata: | |
creationTimestamp: "2019-12-03T12:44:59Z" | |
name: hello-example.15dcdd201fe22afd | |
namespace: serving-tests | |
resourceVersion: "3685" | |
selfLink: /api/v1/namespaces/serving-tests/events/hello-example.15dcdd201fe22afd | |
uid: b7aa5ef1-15ca-11ea-b5af-027e0b84da98 | |
reason: Created | |
reportingComponent: "" | |
reportingInstance: "" | |
source: | |
component: route-controller | |
type: Normal | |
- apiVersion: v1 | |
count: 1 | |
eventTime: null | |
firstTimestamp: "2019-12-03T12:44:59Z" | |
involvedObject: | |
apiVersion: serving.knative.dev/v1alpha1 | |
kind: Route | |
name: hello-example | |
namespace: serving-tests | |
resourceVersion: "57278" | |
uid: b413f714-15ca-11ea-b5af-027e0b84da98 | |
kind: Event | |
lastTimestamp: "2019-12-03T12:44:59Z" | |
message: Created Ingress "hello-example" | |
metadata: | |
creationTimestamp: "2019-12-03T12:44:59Z" | |
name: hello-example.15dcdd20212d9ab3 | |
namespace: serving-tests | |
resourceVersion: "3686" | |
selfLink: /api/v1/namespaces/serving-tests/events/hello-example.15dcdd20212d9ab3 | |
uid: b7ad78ff-15ca-11ea-b5af-027e0b84da98 | |
reason: Created | |
reportingComponent: "" | |
reportingInstance: "" | |
source: | |
component: route-controller | |
type: Normal | |
- apiVersion: v1 | |
count: 1 | |
eventTime: null | |
firstTimestamp: "2019-12-03T12:44:59Z" | |
involvedObject: | |
apiVersion: networking.internal.knative.dev/v1alpha1 | |
kind: Ingress | |
name: hello-example | |
namespace: serving-tests | |
resourceVersion: "57341" | |
uid: b7aac98e-15ca-11ea-b5af-027e0b84da98 | |
kind: Event | |
lastTimestamp: "2019-12-03T12:44:59Z" | |
message: Created VirtualService "hello-example-mesh" | |
metadata: | |
creationTimestamp: "2019-12-03T12:44:59Z" | |
name: hello-example.15dcdd2021e1e344 | |
namespace: serving-tests | |
resourceVersion: "3687" | |
selfLink: /api/v1/namespaces/serving-tests/events/hello-example.15dcdd2021e1e344 | |
uid: b7af5838-15ca-11ea-b5af-027e0b84da98 | |
reason: Created | |
reportingComponent: "" | |
reportingInstance: "" | |
source: | |
component: ingress-controller | |
type: Normal | |
- apiVersion: v1 | |
count: 1 | |
eventTime: null | |
firstTimestamp: "2019-12-03T12:44:59Z" | |
involvedObject: | |
apiVersion: networking.internal.knative.dev/v1alpha1 | |
kind: Ingress | |
name: hello-example | |
namespace: serving-tests | |
resourceVersion: "57341" | |
uid: b7aac98e-15ca-11ea-b5af-027e0b84da98 | |
kind: Event | |
lastTimestamp: "2019-12-03T12:44:59Z" | |
message: Created VirtualService "hello-example" | |
metadata: | |
creationTimestamp: "2019-12-03T12:44:59Z" | |
name: hello-example.15dcdd202261fd4c | |
namespace: serving-tests | |
resourceVersion: "3688" | |
selfLink: /api/v1/namespaces/serving-tests/events/hello-example.15dcdd202261fd4c | |
uid: b7b08b55-15ca-11ea-b5af-027e0b84da98 | |
reason: Created | |
reportingComponent: "" | |
reportingInstance: "" | |
source: | |
component: ingress-controller | |
type: Normal | |
- apiVersion: v1 | |
count: 2 | |
eventTime: null | |
firstTimestamp: "2019-12-03T12:44:59Z" | |
involvedObject: | |
apiVersion: networking.internal.knative.dev/v1alpha1 | |
kind: Ingress | |
name: hello-example | |
namespace: serving-tests | |
resourceVersion: "57341" | |
uid: b7aac98e-15ca-11ea-b5af-027e0b84da98 | |
kind: Event | |
lastTimestamp: "2019-12-03T12:45:00Z" | |
message: Updated status for Ingress "hello-example" | |
metadata: | |
creationTimestamp: "2019-12-03T12:44:59Z" | |
name: hello-example.15dcdd20254ea1e7 | |
namespace: serving-tests | |
resourceVersion: "3693" | |
selfLink: /api/v1/namespaces/serving-tests/events/hello-example.15dcdd20254ea1e7 | |
uid: b7b83d64-15ca-11ea-b5af-027e0b84da98 | |
reason: Updated | |
reportingComponent: "" | |
reportingInstance: "" | |
source: | |
component: ingress-controller | |
type: Normal | |
- apiVersion: v1 | |
count: 1 | |
eventTime: null | |
firstTimestamp: "2019-12-03T12:44:59Z" | |
involvedObject: | |
apiVersion: serving.knative.dev/v1alpha1 | |
kind: Route | |
name: hello-example | |
namespace: serving-tests | |
resourceVersion: "57345" | |
uid: b413f714-15ca-11ea-b5af-027e0b84da98 | |
kind: Event | |
lastTimestamp: "2019-12-03T12:44:59Z" | |
message: 'failed to update Ingress: Operation cannot be fulfilled on ingresses.networking.internal.knative.dev | |
"hello-example": the object has been modified; please apply your changes to the | |
latest version and try again' | |
metadata: | |
creationTimestamp: "2019-12-03T12:44:59Z" | |
name: hello-example.15dcdd2026260e31 | |
namespace: serving-tests | |
resourceVersion: "3690" | |
selfLink: /api/v1/namespaces/serving-tests/events/hello-example.15dcdd2026260e31 | |
uid: b7ba2ae6-15ca-11ea-b5af-027e0b84da98 | |
reason: InternalError | |
reportingComponent: "" | |
reportingInstance: "" | |
source: | |
component: route-controller | |
type: Warning | |
kind: List | |
metadata: | |
resourceVersion: "" | |
selfLink: "" | |
------- | |
resource: limitranges | |
------- | |
apiVersion: v1 | |
items: [] | |
kind: List | |
metadata: | |
resourceVersion: "" | |
selfLink: "" | |
------- | |
resource: namespaces | |
------- | |
apiVersion: v1 | |
items: | |
- apiVersion: v1 | |
kind: Namespace | |
metadata: | |
creationTimestamp: "2019-12-03T04:43:13Z" | |
name: default | |
resourceVersion: "158" | |
selfLink: /api/v1/namespaces/default | |
uid: 6a10d6e7-1587-11ea-b5af-027e0b84da98 | |
spec: | |
finalizers: | |
- kubernetes | |
status: | |
phase: Active | |
- apiVersion: v1 | |
kind: Namespace | |
metadata: | |
annotations: | |
kubectl.kubernetes.io/last-applied-configuration: | | |
{"apiVersion":"v1","kind":"Namespace","metadata":{"annotations":{},"labels":{"istio-injection":"disabled"},"name":"istio-system"}} | |
creationTimestamp: "2019-12-03T10:52:28Z" | |
labels: | |
istio-injection: disabled | |
name: istio-system | |
resourceVersion: "43255" | |
selfLink: /api/v1/namespaces/istio-system | |
uid: ffb3df9d-15ba-11ea-b5af-027e0b84da98 | |
spec: | |
finalizers: | |
- kubernetes | |
status: | |
phase: Active | |
- apiVersion: v1 | |
kind: Namespace | |
metadata: | |
annotations: | |
kubectl.kubernetes.io/last-applied-configuration: | | |
{"apiVersion":"v1","kind":"Namespace","metadata":{"annotations":{},"labels":{"istio-injection":"enabled","serving.knative.dev/release":"devel"},"name":"knative-serving"}} | |
creationTimestamp: "2019-12-03T10:54:03Z" | |
labels: | |
istio-injection: enabled | |
serving.knative.dev/release: devel | |
name: knative-serving | |
resourceVersion: "43770" | |
selfLink: /api/v1/namespaces/knative-serving | |
uid: 3870c561-15bb-11ea-b5af-027e0b84da98 | |
spec: | |
finalizers: | |
- kubernetes | |
status: | |
phase: Active | |
- apiVersion: v1 | |
kind: Namespace | |
metadata: | |
creationTimestamp: "2019-12-03T04:43:09Z" | |
name: kube-node-lease | |
resourceVersion: "7" | |
selfLink: /api/v1/namespaces/kube-node-lease | |
uid: 681a31ea-1587-11ea-b5af-027e0b84da98 | |
spec: | |
finalizers: | |
- kubernetes | |
status: | |
phase: Active | |
- apiVersion: v1 | |
kind: Namespace | |
metadata: | |
creationTimestamp: "2019-12-03T04:43:09Z" | |
name: kube-public | |
resourceVersion: "5" | |
selfLink: /api/v1/namespaces/kube-public | |
uid: 681974bf-1587-11ea-b5af-027e0b84da98 | |
spec: | |
finalizers: | |
- kubernetes | |
status: | |
phase: Active | |
- apiVersion: v1 | |
kind: Namespace | |
metadata: | |
annotations: | |
addons.k8s.io/core.addons.k8s.io: '{"version":"1.4.0","channel":"s3://nak3/example.cluster.k8s.local/addons/bootstrap-channel.yaml","manifestHash":"3ffe9ac576f9eec72e2bdfbd2ea17d56d9b17b90"}' | |
addons.k8s.io/dns-controller.addons.k8s.io: '{"version":"1.14.0-beta.2","channel":"s3://nak3/example.cluster.k8s.local/addons/bootstrap-channel.yaml","id":"k8s-1.12","manifestHash":"3a5efdd7920c96c09158ae60a67b28493b954d45"}' | |
addons.k8s.io/kube-dns.addons.k8s.io: '{"version":"1.14.13-kops.1","channel":"s3://nak3/example.cluster.k8s.local/addons/bootstrap-channel.yaml","id":"k8s-1.12","manifestHash":"0051963d9aa7cfc63509498f3ebd2a72fbb624f8"}' | |
addons.k8s.io/kubelet-api.rbac.addons.k8s.io: '{"version":"v0.0.1","channel":"s3://nak3/example.cluster.k8s.local/addons/bootstrap-channel.yaml","id":"k8s-1.9","manifestHash":"e1508d77cb4e527d7a2939babe36dc350dd83745"}' | |
addons.k8s.io/limit-range.addons.k8s.io: '{"version":"1.5.0","channel":"s3://nak3/example.cluster.k8s.local/addons/bootstrap-channel.yaml","manifestHash":"2ea50e23f1a5aa41df3724630ac25173738cc90c"}' | |
addons.k8s.io/networking.amazon-vpc-routed-eni: '{"version":"1.5.0-kops.1","channel":"s3://nak3/example.cluster.k8s.local/addons/bootstrap-channel.yaml","id":"k8s-1.12","manifestHash":"7c1540b3529e1260c41a9e90ac709c0f672ad47e"}' | |
addons.k8s.io/rbac.addons.k8s.io: '{"version":"1.8.0","channel":"s3://nak3/example.cluster.k8s.local/addons/bootstrap-channel.yaml","id":"k8s-1.8","manifestHash":"5d53ce7b920cd1e8d65d2306d80a041420711914"}' | |
addons.k8s.io/storage-aws.addons.k8s.io: '{"version":"1.7.0","channel":"s3://nak3/example.cluster.k8s.local/addons/bootstrap-channel.yaml","id":"v1.7.0","manifestHash":"62705a596142e6cc283280e8aa973e51536994c5"}' | |
kubectl.kubernetes.io/last-applied-configuration: | | |
{"apiVersion":"v1","kind":"Namespace","metadata":{"annotations":{},"name":"kube-system"}} | |
creationTimestamp: "2019-12-03T04:43:09Z" | |
name: kube-system | |
resourceVersion: "389" | |
selfLink: /api/v1/namespaces/kube-system | |
uid: 6818e75d-1587-11ea-b5af-027e0b84da98 | |
spec: | |
finalizers: | |
- kubernetes | |
status: | |
phase: Active | |
- apiVersion: v1 | |
kind: Namespace | |
metadata: | |
annotations: | |
kubectl.kubernetes.io/last-applied-configuration: | | |
{"apiVersion":"v1","kind":"Namespace","metadata":{"annotations":{},"name":"serving-tests"}} | |
creationTimestamp: "2019-12-03T06:51:16Z" | |
labels: | |
istio-injection: enabled | |
name: serving-tests | |
resourceVersion: "46981" | |
selfLink: /api/v1/namespaces/serving-tests | |
uid: 4d7f1fcb-1599-11ea-b5af-027e0b84da98 | |
spec: | |
finalizers: | |
- kubernetes | |
status: | |
phase: Active | |
- apiVersion: v1 | |
kind: Namespace | |
metadata: | |
annotations: | |
kubectl.kubernetes.io/last-applied-configuration: | | |
{"apiVersion":"v1","kind":"Namespace","metadata":{"annotations":{},"name":"serving-tests-alt"}} | |
creationTimestamp: "2019-12-03T06:51:16Z" | |
name: serving-tests-alt | |
resourceVersion: "15014" | |
selfLink: /api/v1/namespaces/serving-tests-alt | |
uid: 4da36e05-1599-11ea-b5af-027e0b84da98 | |
spec: | |
finalizers: | |
- kubernetes | |
status: | |
phase: Active | |
kind: List | |
metadata: | |
resourceVersion: "" | |
selfLink: "" | |
------- | |
resource: nodes | |
------- | |
apiVersion: v1 | |
items: | |
- apiVersion: v1 | |
kind: Node | |
metadata: | |
annotations: | |
node.alpha.kubernetes.io/ttl: "0" | |
volumes.kubernetes.io/controller-managed-attach-detach: "true" | |
creationTimestamp: "2019-12-03T04:44:19Z" | |
labels: | |
beta.kubernetes.io/arch: amd64 | |
beta.kubernetes.io/instance-type: t3.large | |
beta.kubernetes.io/os: linux | |
failure-domain.beta.kubernetes.io/region: ap-southeast-1 | |
failure-domain.beta.kubernetes.io/zone: ap-southeast-1a | |
kops.k8s.io/instancegroup: master-ap-southeast-1a | |
kubernetes.io/arch: amd64 | |
kubernetes.io/hostname: ip-172-20-37-73.ap-southeast-1.compute.internal | |
kubernetes.io/os: linux | |
kubernetes.io/role: master | |
node-role.kubernetes.io/master: "" | |
name: ip-172-20-37-73.ap-southeast-1.compute.internal | |
resourceVersion: "61189" | |
selfLink: /api/v1/nodes/ip-172-20-37-73.ap-southeast-1.compute.internal | |
uid: 91d88796-1587-11ea-b5af-027e0b84da98 | |
spec: | |
podCIDR: 172.20.128.0/24 | |
providerID: aws:///ap-southeast-1a/i-0299c3739afd98ba7 | |
taints: | |
- effect: NoSchedule | |
key: node-role.kubernetes.io/master | |
status: | |
addresses: | |
- address: 172.20.37.73 | |
type: InternalIP | |
- address: 18.141.24.94 | |
type: ExternalIP | |
- address: ip-172-20-37-73.ap-southeast-1.compute.internal | |
type: InternalDNS | |
- address: ec2-18-141-24-94.ap-southeast-1.compute.amazonaws.com | |
type: ExternalDNS | |
- address: ip-172-20-37-73.ap-southeast-1.compute.internal | |
type: Hostname | |
allocatable: | |
attachable-volumes-aws-ebs: "25" | |
cpu: "2" | |
ephemeral-storage: "57916492090" | |
hugepages-1Gi: "0" | |
hugepages-2Mi: "0" | |
memory: 7972780Ki | |
pods: "35" | |
capacity: | |
attachable-volumes-aws-ebs: "25" | |
cpu: "2" | |
ephemeral-storage: 62843416Ki | |
hugepages-1Gi: "0" | |
hugepages-2Mi: "0" | |
memory: 8075180Ki | |
pods: "35" | |
conditions: | |
- lastHeartbeatTime: "2019-12-03T13:20:21Z" | |
lastTransitionTime: "2019-12-03T04:44:19Z" | |
message: kubelet has sufficient memory available | |
reason: KubeletHasSufficientMemory | |
status: "False" | |
type: MemoryPressure | |
- lastHeartbeatTime: "2019-12-03T13:20:21Z" | |
lastTransitionTime: "2019-12-03T04:44:19Z" | |
message: kubelet has no disk pressure | |
reason: KubeletHasNoDiskPressure | |
status: "False" | |
type: DiskPressure | |
- lastHeartbeatTime: "2019-12-03T13:20:21Z" | |
lastTransitionTime: "2019-12-03T04:44:19Z" | |
message: kubelet has sufficient PID available | |
reason: KubeletHasSufficientPID | |
status: "False" | |
type: PIDPressure | |
- lastHeartbeatTime: "2019-12-03T13:20:21Z" | |
lastTransitionTime: "2019-12-03T04:44:40Z" | |
message: kubelet is posting ready status | |
reason: KubeletReady | |
status: "True" | |
type: Ready | |
daemonEndpoints: | |
kubeletEndpoint: | |
Port: 10250 | |
images: | |
- names: | |
- kopeio/etcd-manager@sha256:74b2866dd62eda22183ce06b8e6c1d2a499f1b281768a0fceee1890ea204fdef | |
- kopeio/etcd-manager:3.0.20190816 | |
sizeBytes: 656348569 | |
- names: | |
- protokube:1.14.0-beta.2 | |
sizeBytes: 287898685 | |
- names: | |
- 602401143452.dkr.ecr.us-west-2.amazonaws.com/amazon-k8s-cni@sha256:81cd8a9d7ce75b2f7190296d5f9c43188d7e43e438a8e6dd11d36238ee36b5de | |
- 602401143452.dkr.ecr.us-west-2.amazonaws.com/amazon-k8s-cni:v1.5.0 | |
sizeBytes: 247322214 | |
- names: | |
- k8s.gcr.io/kube-apiserver@sha256:8c43d27db9fc89f515ea35e6f7cd8cfe0429e9fc1a0cb7eda9ca9dced36675b0 | |
- k8s.gcr.io/kube-apiserver:v1.14.6 | |
sizeBytes: 209433406 | |
- names: | |
- k8s.gcr.io/kube-controller-manager@sha256:1809ab49da73332ca9f8e46cb0a7b799375a49ed50996c579352fc6e880add95 | |
- k8s.gcr.io/kube-controller-manager:v1.14.6 | |
sizeBytes: 157458462 | |
- names: | |
- kope/dns-controller@sha256:0ebcf793480436fac6ef9af42b465447c1e03b3fac9c258e8292c10063d3dee3 | |
- kope/dns-controller:1.14.0-beta.2 | |
sizeBytes: 122678800 | |
- names: | |
- k8s.gcr.io/kube-proxy@sha256:e5c364dc75d816132bebf2d84b35518f0661fdeae39c686d92f9e5f9a07e96b9 | |
- k8s.gcr.io/kube-proxy:v1.14.6 | |
sizeBytes: 82106236 | |
- names: | |
- k8s.gcr.io/kube-scheduler@sha256:0147e498f115390c6276014c5ac038e1128ba1cc0d15d28c380ba5a8cab34851 | |
- k8s.gcr.io/kube-scheduler:v1.14.6 | |
sizeBytes: 81579742 | |
- names: | |
- k8s.gcr.io/pause-amd64@sha256:163ac025575b775d1c0f9bf0bdd0f086883171eb475b5068e7defa4ca9e76516 | |
- k8s.gcr.io/pause-amd64:3.0 | |
sizeBytes: 746888 | |
nodeInfo: | |
architecture: amd64 | |
bootID: b7ad2dae-68bc-4bca-b9ad-d53ba6446cd0 | |
containerRuntimeVersion: docker://18.6.3 | |
kernelVersion: 4.9.0-11-amd64 | |
kubeProxyVersion: v1.14.6 | |
kubeletVersion: v1.14.6 | |
machineID: ec27af0a0426bb93177d40b41608d0de | |
operatingSystem: linux | |
osImage: Debian GNU/Linux 9 (stretch) | |
systemUUID: EC27AF0A-0426-BB93-177D-40B41608D0DE | |
- apiVersion: v1 | |
kind: Node | |
metadata: | |
annotations: | |
node.alpha.kubernetes.io/ttl: "0" | |
volumes.kubernetes.io/controller-managed-attach-detach: "true" | |
creationTimestamp: "2019-12-03T04:45:02Z" | |
labels: | |
beta.kubernetes.io/arch: amd64 | |
beta.kubernetes.io/instance-type: t3.large | |
beta.kubernetes.io/os: linux | |
failure-domain.beta.kubernetes.io/region: ap-southeast-1 | |
failure-domain.beta.kubernetes.io/zone: ap-southeast-1a | |
kops.k8s.io/instancegroup: nodes | |
kubernetes.io/arch: amd64 | |
kubernetes.io/hostname: ip-172-20-40-226.ap-southeast-1.compute.internal | |
kubernetes.io/os: linux | |
kubernetes.io/role: node | |
node-role.kubernetes.io/node: "" | |
name: ip-172-20-40-226.ap-southeast-1.compute.internal | |
resourceVersion: "61187" | |
selfLink: /api/v1/nodes/ip-172-20-40-226.ap-southeast-1.compute.internal | |
uid: ab2dc16f-1587-11ea-b5af-027e0b84da98 | |
spec: | |
podCIDR: 172.20.130.0/24 | |
providerID: aws:///ap-southeast-1a/i-07165c474a3a1fd98 | |
status: | |
addresses: | |
- address: 172.20.40.226 | |
type: InternalIP | |
- address: 13.229.102.237 | |
type: ExternalIP | |
- address: ip-172-20-40-226.ap-southeast-1.compute.internal | |
type: InternalDNS | |
- address: ec2-13-229-102-237.ap-southeast-1.compute.amazonaws.com | |
type: ExternalDNS | |
- address: ip-172-20-40-226.ap-southeast-1.compute.internal | |
type: Hostname | |
allocatable: | |
attachable-volumes-aws-ebs: "25" | |
cpu: "2" | |
ephemeral-storage: "115894266893" | |
hugepages-1Gi: "0" | |
hugepages-2Mi: "0" | |
memory: 7972780Ki | |
pods: "35" | |
capacity: | |
attachable-volumes-aws-ebs: "25" | |
cpu: "2" | |
ephemeral-storage: 125753328Ki | |
hugepages-1Gi: "0" | |
hugepages-2Mi: "0" | |
memory: 8075180Ki | |
pods: "35" | |
conditions: | |
- lastHeartbeatTime: "2019-12-03T13:20:20Z" | |
lastTransitionTime: "2019-12-03T04:45:02Z" | |
message: kubelet has sufficient memory available | |
reason: KubeletHasSufficientMemory | |
status: "False" | |
type: MemoryPressure | |
- lastHeartbeatTime: "2019-12-03T13:20:20Z" | |
lastTransitionTime: "2019-12-03T04:45:02Z" | |
message: kubelet has no disk pressure | |
reason: KubeletHasNoDiskPressure | |
status: "False" | |
type: DiskPressure | |
- lastHeartbeatTime: "2019-12-03T13:20:20Z" | |
lastTransitionTime: "2019-12-03T04:45:02Z" | |
message: kubelet has sufficient PID available | |
reason: KubeletHasSufficientPID | |
status: "False" | |
type: PIDPressure | |
- lastHeartbeatTime: "2019-12-03T13:20:20Z" | |
lastTransitionTime: "2019-12-03T04:45:22Z" | |
message: kubelet is posting ready status | |
reason: KubeletReady | |
status: "True" | |
type: Ready | |
daemonEndpoints: | |
kubeletEndpoint: | |
Port: 10250 | |
images: | |
- names: | |
- istio/proxyv2@sha256:245b1b40003654e9a9e3757196fa3cb506439cf8c98792c1552300528d8aea14 | |
- istio/proxyv2:1.3.5 | |
sizeBytes: 295628711 | |
- names: | |
- protokube:1.14.0-beta.2 | |
sizeBytes: 287898685 | |
- names: | |
- istio/kubectl@sha256:76c76dbed21c162dac9d6fa2337348eeaf5fb0f89a5c9857ff47f352cd6e82b4 | |
- istio/kubectl:1.3.5 | |
sizeBytes: 271562982 | |
- names: | |
- istio/pilot@sha256:17aefbe996d67e9fdf5dbba90bdcf030333a0832a34bc66469472ce61d2eed76 | |
- istio/pilot:1.3.5 | |
sizeBytes: 268531301 | |
- names: | |
- 602401143452.dkr.ecr.us-west-2.amazonaws.com/amazon-k8s-cni@sha256:81cd8a9d7ce75b2f7190296d5f9c43188d7e43e438a8e6dd11d36238ee36b5de | |
- 602401143452.dkr.ecr.us-west-2.amazonaws.com/amazon-k8s-cni:v1.5.0 | |
sizeBytes: 247322214 | |
- names: | |
- istio/citadel@sha256:8cd4eac4fb8f1f331b0a63bb628c560e9ac5509717c469a9f3f01dec61a2f825 | |
- istio/citadel:1.3.5 | |
sizeBytes: 241393987 | |
- names: | |
- istio/proxyv2@sha256:9ba9de87d660767a2147f786040a8fe29ebb3b335742d3c95257ab82a33b8415 | |
- istio/proxyv2:1.4.0 | |
sizeBytes: 236743155 | |
- names: | |
- istio/kubectl@sha256:d62512cc4b10228512c86f63501b828b80c20e238452c429cfd62a9b9388cc54 | |
- istio/kubectl:1.4.0 | |
sizeBytes: 218715390 | |
- names: | |
- istio/sidecar_injector@sha256:9f4aba5bb84a07e198b65bc7e4fc0067f876f66b51c7404816ae95e6b5ffa938 | |
- istio/sidecar_injector:1.4.0 | |
sizeBytes: 196252897 | |
- names: | |
- istio/proxy_init@sha256:8278995c58eef8cd4ba32cb8756e2b93a09708e39fc9c0381e90c8a4fb62a042 | |
- istio/proxy_init:1.3.5 | |
sizeBytes: 193060005 | |
- names: | |
- istio/node-agent-k8s@sha256:b3a169eb928e651bb0e9e40ed574d2c8cd1671a3b598c3c79458a63fd7cf398d | |
- istio/node-agent-k8s:1.4.0 | |
sizeBytes: 193009018 | |
- names: | |
- istio/mixer@sha256:8fa82c01ce621a4643600e4c54d4bfa41875c0030e0b41a819dd0e5e75349376 | |
- istio/mixer:1.3.5 | |
sizeBytes: 92658350 | |
- names: | |
- k8s.gcr.io/kube-proxy@sha256:e5c364dc75d816132bebf2d84b35518f0661fdeae39c686d92f9e5f9a07e96b9 | |
- k8s.gcr.io/kube-proxy:v1.14.6 | |
sizeBytes: 82106236 | |
- names: | |
- istio/mixer@sha256:b0b13e4311da022a1f67c85ffeb82d42567739c7156d2f644a66364b0c947fc4 | |
- istio/mixer:1.4.0 | |
sizeBytes: 80456256 | |
- names: | |
- gcr.io/gcp-compute-engine-223401/autoscaler-12c0fa24db31956a7cfa673210e4fa13@sha256:f74987342b3c7bcb8b95006f98a8efcfa19bd518430844df037cd5f29132c997 | |
sizeBytes: 65899235 | |
- names: | |
- gcr.io/gcp-compute-engine-223401/activator-ecd51ca5034883acbe737fde417a3d86@sha256:b2257a5f6e2427a5a96f6ea9ca2b652ee648e131e9a699df6e20b4bcfa4ef940 | |
sizeBytes: 59323763 | |
- names: | |
- gcr.io/gcp-compute-engine-223401/certmanager-f79b5bfeb092d099f0f3326024a30ebb@sha256:9f7622fd03d96c3262e71b4f6fb14455145041c81950b3efe10010c122974bed | |
sizeBytes: 58077460 | |
- names: | |
- gcr.io/gcp-compute-engine-223401/istio-c58c0c8bb8ecc80f800bb788a425ae1d@sha256:ebdb4e8832e9574311494a31ea18dc63cf903e8dd7f0651d640eb2c7f252da2a | |
sizeBytes: 57052872 | |
- names: | |
- gcr.io/gcp-compute-engine-223401/nscert-e3625dd01dcb901439f4630ab9789e75@sha256:77da0645be1369d0e56a1daa204da6de6661488eef5858a60dee9a052f02150c | |
sizeBytes: 56568040 | |
- names: | |
- gcr.io/gcp-compute-engine-223401/webhook-261c6506fca17bc41be50b3461f98f1c@sha256:012be54c7866cb8458fe96061f5321e519da7a4803809d912c2a670fff904ac6 | |
sizeBytes: 55354038 | |
- names: | |
- k8s.gcr.io/pause-amd64@sha256:163ac025575b775d1c0f9bf0bdd0f086883171eb475b5068e7defa4ca9e76516 | |
- k8s.gcr.io/pause-amd64:3.0 | |
sizeBytes: 746888 | |
nodeInfo: | |
architecture: amd64 | |
bootID: cf2549e6-50e0-4c1f-a09c-da8be985c8b8 | |
containerRuntimeVersion: docker://18.6.3 | |
kernelVersion: 4.9.0-11-amd64 | |
kubeProxyVersion: v1.14.6 | |
kubeletVersion: v1.14.6 | |
machineID: ec22f1bbd486f63ef1252035db817620 | |
operatingSystem: linux | |
osImage: Debian GNU/Linux 9 (stretch) | |
systemUUID: EC22F1BB-D486-F63E-F125-2035DB817620 | |
- apiVersion: v1 | |
kind: Node | |
metadata: | |
annotations: | |
node.alpha.kubernetes.io/ttl: "0" | |
volumes.kubernetes.io/controller-managed-attach-detach: "true" | |
creationTimestamp: "2019-12-03T04:45:02Z" | |
labels: | |
beta.kubernetes.io/arch: amd64 | |
beta.kubernetes.io/instance-type: t3.large | |
beta.kubernetes.io/os: linux | |
failure-domain.beta.kubernetes.io/region: ap-southeast-1 | |
failure-domain.beta.kubernetes.io/zone: ap-southeast-1a | |
kops.k8s.io/instancegroup: nodes | |
kubernetes.io/arch: amd64 | |
kubernetes.io/hostname: ip-172-20-44-18.ap-southeast-1.compute.internal | |
kubernetes.io/os: linux | |
kubernetes.io/role: node | |
node-role.kubernetes.io/node: "" | |
name: ip-172-20-44-18.ap-southeast-1.compute.internal | |
resourceVersion: "61141" | |
selfLink: /api/v1/nodes/ip-172-20-44-18.ap-southeast-1.compute.internal | |
uid: ab6ff308-1587-11ea-b5af-027e0b84da98 | |
spec: | |
podCIDR: 172.20.132.0/24 | |
providerID: aws:///ap-southeast-1a/i-08c20d344fa1fb6c5 | |
status: | |
addresses: | |
- address: 172.20.44.18 | |
type: InternalIP | |
- address: 54.179.175.206 | |
type: ExternalIP | |
- address: ip-172-20-44-18.ap-southeast-1.compute.internal | |
type: InternalDNS | |
- address: ec2-54-179-175-206.ap-southeast-1.compute.amazonaws.com | |
type: ExternalDNS | |
- address: ip-172-20-44-18.ap-southeast-1.compute.internal | |
type: Hostname | |
allocatable: | |
attachable-volumes-aws-ebs: "25" | |
cpu: "2" | |
ephemeral-storage: "115894266893" | |
hugepages-1Gi: "0" | |
hugepages-2Mi: "0" | |
memory: 7972788Ki | |
pods: "35" | |
capacity: | |
attachable-volumes-aws-ebs: "25" | |
cpu: "2" | |
ephemeral-storage: 125753328Ki | |
hugepages-1Gi: "0" | |
hugepages-2Mi: "0" | |
memory: 8075188Ki | |
pods: "35" | |
conditions: | |
- lastHeartbeatTime: "2019-12-03T13:19:54Z" | |
lastTransitionTime: "2019-12-03T04:45:02Z" | |
message: kubelet has sufficient memory available | |
reason: KubeletHasSufficientMemory | |
status: "False" | |
type: MemoryPressure | |
- lastHeartbeatTime: "2019-12-03T13:19:54Z" | |
lastTransitionTime: "2019-12-03T04:45:02Z" | |
message: kubelet has no disk pressure | |
reason: KubeletHasNoDiskPressure | |
status: "False" | |
type: DiskPressure | |
- lastHeartbeatTime: "2019-12-03T13:19:54Z" | |
lastTransitionTime: "2019-12-03T04:45:02Z" | |
message: kubelet has sufficient PID available | |
reason: KubeletHasSufficientPID | |
status: "False" | |
type: PIDPressure | |
- lastHeartbeatTime: "2019-12-03T13:19:54Z" | |
lastTransitionTime: "2019-12-03T04:45:22Z" | |
message: kubelet is posting ready status | |
reason: KubeletReady | |
status: "True" | |
type: Ready | |
daemonEndpoints: | |
kubeletEndpoint: | |
Port: 10250 | |
images: | |
- names: | |
- gcr.io/knative-samples/helloworld-go@sha256:5ea96ba4b872685ff4ddb5cd8d1a97ec18c18fae79ee8df0d29f446c5efe5f50 | |
sizeBytes: 780868439 | |
- names: | |
- istio/proxyv2@sha256:245b1b40003654e9a9e3757196fa3cb506439cf8c98792c1552300528d8aea14 | |
- istio/proxyv2:1.3.5 | |
sizeBytes: 295628711 | |
- names: | |
- protokube:1.14.0-beta.2 | |
sizeBytes: 287898685 | |
- names: | |
- istio/kubectl@sha256:76c76dbed21c162dac9d6fa2337348eeaf5fb0f89a5c9857ff47f352cd6e82b4 | |
- istio/kubectl:1.3.5 | |
sizeBytes: 271562982 | |
- names: | |
- istio/galley@sha256:de9c61c20d8e6b86b7761574789f1660d3b3fdff0463bfc24393e0d9c5985f53 | |
- istio/galley:1.3.5 | |
sizeBytes: 270017814 | |
- names: | |
- 602401143452.dkr.ecr.us-west-2.amazonaws.com/amazon-k8s-cni@sha256:81cd8a9d7ce75b2f7190296d5f9c43188d7e43e438a8e6dd11d36238ee36b5de | |
- 602401143452.dkr.ecr.us-west-2.amazonaws.com/amazon-k8s-cni:v1.5.0 | |
sizeBytes: 247322214 | |
- names: | |
- istio/proxyv2@sha256:9ba9de87d660767a2147f786040a8fe29ebb3b335742d3c95257ab82a33b8415 | |
- istio/proxyv2:1.4.0 | |
sizeBytes: 236743155 | |
- names: | |
- istio/kubectl@sha256:d62512cc4b10228512c86f63501b828b80c20e238452c429cfd62a9b9388cc54 | |
- istio/kubectl:1.4.0 | |
sizeBytes: 218715390 | |
- names: | |
- istio/galley@sha256:67f9f5321e6fefdf97e5406a047579a0fd04b576ad1c997e95a9db4dd2fbc6bc | |
- istio/galley:1.4.0 | |
sizeBytes: 212440743 | |
- names: | |
- istio/pilot@sha256:149357dc33f488eff0cc1edfb3329e72ea49614d52095770df543cbb8d60bcdb | |
- istio/pilot:1.4.0 | |
sizeBytes: 208430582 | |
- names: | |
- istio/sidecar_injector@sha256:9f4aba5bb84a07e198b65bc7e4fc0067f876f66b51c7404816ae95e6b5ffa938 | |
- istio/sidecar_injector:1.4.0 | |
sizeBytes: 196252897 | |
- names: | |
- istio/citadel@sha256:e168f97716efd0a16a65ad19bdf6be5858c31e0499023b3a3ef15e9f4fcd6ef5 | |
- istio/citadel:1.4.0 | |
sizeBytes: 187942039 | |
- names: | |
- istio/mixer@sha256:8fa82c01ce621a4643600e4c54d4bfa41875c0030e0b41a819dd0e5e75349376 | |
- istio/mixer:1.3.5 | |
sizeBytes: 92658350 | |
- names: | |
- k8s.gcr.io/kube-proxy@sha256:e5c364dc75d816132bebf2d84b35518f0661fdeae39c686d92f9e5f9a07e96b9 | |
- k8s.gcr.io/kube-proxy:v1.14.6 | |
sizeBytes: 82106236 | |
- names: | |
- istio/mixer@sha256:b0b13e4311da022a1f67c85ffeb82d42567739c7156d2f644a66364b0c947fc4 | |
- istio/mixer:1.4.0 | |
sizeBytes: 80456256 | |
- names: | |
- gcr.io/gcp-compute-engine-223401/activator-ecd51ca5034883acbe737fde417a3d86@sha256:b2257a5f6e2427a5a96f6ea9ca2b652ee648e131e9a699df6e20b4bcfa4ef940 | |
sizeBytes: 59323763 | |
- names: | |
- gcr.io/gcp-compute-engine-223401/autoscaler-hpa-85c0b68178743d74ff7f663a72802ceb@sha256:24e81ede4cc223f0f70a1630fc4bed30308eb7b406715dbdd2280827f7565eec | |
sizeBytes: 58181702 | |
- names: | |
- gcr.io/gcp-compute-engine-223401/queue-39be6f1d08a095bd076a71d288d295b6@sha256:8adf8f990b4485e7ead4dc9e6f8ddb3a19142835de95386428deb9ffde8d20b2 | |
sizeBytes: 48155143 | |
- names: | |
- k8s.gcr.io/pause-amd64@sha256:163ac025575b775d1c0f9bf0bdd0f086883171eb475b5068e7defa4ca9e76516 | |
- k8s.gcr.io/pause-amd64:3.0 | |
sizeBytes: 746888 | |
nodeInfo: | |
architecture: amd64 | |
bootID: 6101bb52-01d3-4bdf-9e12-51188ec1cd60 | |
containerRuntimeVersion: docker://18.6.3 | |
kernelVersion: 4.9.0-11-amd64 | |
kubeProxyVersion: v1.14.6 | |
kubeletVersion: v1.14.6 | |
machineID: ec2ed086b5b5c48fe013453c0596130e | |
operatingSystem: linux | |
osImage: Debian GNU/Linux 9 (stretch) | |
systemUUID: EC2ED086-B5B5-C48F-E013-453C0596130E | |
- apiVersion: v1 | |
kind: Node | |
metadata: | |
annotations: | |
node.alpha.kubernetes.io/ttl: "0" | |
volumes.kubernetes.io/controller-managed-attach-detach: "true" | |
creationTimestamp: "2019-12-03T04:45:02Z" | |
labels: | |
beta.kubernetes.io/arch: amd64 | |
beta.kubernetes.io/instance-type: t3.large | |
beta.kubernetes.io/os: linux | |
failure-domain.beta.kubernetes.io/region: ap-southeast-1 | |
failure-domain.beta.kubernetes.io/zone: ap-southeast-1a | |
kops.k8s.io/instancegroup: nodes | |
kubernetes.io/arch: amd64 | |
kubernetes.io/hostname: ip-172-20-44-180.ap-southeast-1.compute.internal | |
kubernetes.io/os: linux | |
kubernetes.io/role: node | |
node-role.kubernetes.io/node: "" | |
name: ip-172-20-44-180.ap-southeast-1.compute.internal | |
resourceVersion: "61137" | |
selfLink: /api/v1/nodes/ip-172-20-44-180.ap-southeast-1.compute.internal | |
uid: ab3fb0f5-1587-11ea-b5af-027e0b84da98 | |
spec: | |
podCIDR: 172.20.131.0/24 | |
providerID: aws:///ap-southeast-1a/i-0732cd8aeec90e874 | |
status: | |
addresses: | |
- address: 172.20.44.180 | |
type: InternalIP | |
- address: 54.179.147.153 | |
type: ExternalIP | |
- address: ip-172-20-44-180.ap-southeast-1.compute.internal | |
type: InternalDNS | |
- address: ec2-54-179-147-153.ap-southeast-1.compute.amazonaws.com | |
type: ExternalDNS | |
- address: ip-172-20-44-180.ap-southeast-1.compute.internal | |
type: Hostname | |
allocatable: | |
attachable-volumes-aws-ebs: "25" | |
cpu: "2" | |
ephemeral-storage: "115894266893" | |
hugepages-1Gi: "0" | |
hugepages-2Mi: "0" | |
memory: 7972788Ki | |
pods: "35" | |
capacity: | |
attachable-volumes-aws-ebs: "25" | |
cpu: "2" | |
ephemeral-storage: 125753328Ki | |
hugepages-1Gi: "0" | |
hugepages-2Mi: "0" | |
memory: 8075188Ki | |
pods: "35" | |
conditions: | |
- lastHeartbeatTime: "2019-12-03T13:19:52Z" | |
lastTransitionTime: "2019-12-03T04:45:02Z" | |
message: kubelet has sufficient memory available | |
reason: KubeletHasSufficientMemory | |
status: "False" | |
type: MemoryPressure | |
- lastHeartbeatTime: "2019-12-03T13:19:52Z" | |
lastTransitionTime: "2019-12-03T04:45:02Z" | |
message: kubelet has no disk pressure | |
reason: KubeletHasNoDiskPressure | |
status: "False" | |
type: DiskPressure | |
- lastHeartbeatTime: "2019-12-03T13:19:52Z" | |
lastTransitionTime: "2019-12-03T04:45:02Z" | |
message: kubelet has sufficient PID available | |
reason: KubeletHasSufficientPID | |
status: "False" | |
type: PIDPressure | |
- lastHeartbeatTime: "2019-12-03T13:19:52Z" | |
lastTransitionTime: "2019-12-03T04:45:22Z" | |
message: kubelet is posting ready status | |
reason: KubeletReady | |
status: "True" | |
type: Ready | |
daemonEndpoints: | |
kubeletEndpoint: | |
Port: 10250 | |
images: | |
- names: | |
- gcr.io/knative-samples/helloworld-go@sha256:5ea96ba4b872685ff4ddb5cd8d1a97ec18c18fae79ee8df0d29f446c5efe5f50 | |
sizeBytes: 780868439 | |
- names: | |
- istio/proxyv2@sha256:245b1b40003654e9a9e3757196fa3cb506439cf8c98792c1552300528d8aea14 | |
- istio/proxyv2:1.3.5 | |
sizeBytes: 295628711 | |
- names: | |
- protokube:1.14.0-beta.2 | |
sizeBytes: 287898685 | |
- names: | |
- istio/node-agent-k8s@sha256:0a18362538b10523fe2a302ca88e6edd206661658ee43b1bc9e7e671cd2dc0b9 | |
- istio/node-agent-k8s:1.3.5 | |
sizeBytes: 250162398 | |
- names: | |
- 602401143452.dkr.ecr.us-west-2.amazonaws.com/amazon-k8s-cni@sha256:81cd8a9d7ce75b2f7190296d5f9c43188d7e43e438a8e6dd11d36238ee36b5de | |
- 602401143452.dkr.ecr.us-west-2.amazonaws.com/amazon-k8s-cni:v1.5.0 | |
sizeBytes: 247322214 | |
- names: | |
- istio/proxyv2@sha256:9ba9de87d660767a2147f786040a8fe29ebb3b335742d3c95257ab82a33b8415 | |
- istio/proxyv2:1.4.0 | |
sizeBytes: 236743155 | |
- names: | |
- istio/galley@sha256:67f9f5321e6fefdf97e5406a047579a0fd04b576ad1c997e95a9db4dd2fbc6bc | |
- istio/galley:1.4.0 | |
sizeBytes: 212440743 | |
- names: | |
- istio/pilot@sha256:149357dc33f488eff0cc1edfb3329e72ea49614d52095770df543cbb8d60bcdb | |
- istio/pilot:1.4.0 | |
sizeBytes: 208430582 | |
- names: | |
- istio/sidecar_injector@sha256:9f4aba5bb84a07e198b65bc7e4fc0067f876f66b51c7404816ae95e6b5ffa938 | |
- istio/sidecar_injector:1.4.0 | |
sizeBytes: 196252897 | |
- names: | |
- istio/node-agent-k8s@sha256:b3a169eb928e651bb0e9e40ed574d2c8cd1671a3b598c3c79458a63fd7cf398d | |
- istio/node-agent-k8s:1.4.0 | |
sizeBytes: 193009018 | |
- names: | |
- istio/citadel@sha256:e168f97716efd0a16a65ad19bdf6be5858c31e0499023b3a3ef15e9f4fcd6ef5 | |
- istio/citadel:1.4.0 | |
sizeBytes: 187942039 | |
- names: | |
- k8s.gcr.io/kube-proxy@sha256:e5c364dc75d816132bebf2d84b35518f0661fdeae39c686d92f9e5f9a07e96b9 | |
- k8s.gcr.io/kube-proxy:v1.14.6 | |
sizeBytes: 82106236 | |
- names: | |
- gcr.io/gcp-compute-engine-223401/controller-f6fdb41c6acbc726e29a3104ff2ef720@sha256:7cde59d7e5e3f7891b57fb51ade68929b5220df54b70dc027a62018c54fe23d3 | |
sizeBytes: 59788477 | |
- names: | |
- gcr.io/gcp-compute-engine-223401/autoscaler-hpa-85c0b68178743d74ff7f663a72802ceb@sha256:24e81ede4cc223f0f70a1630fc4bed30308eb7b406715dbdd2280827f7565eec | |
sizeBytes: 58181702 | |
- names: | |
- gcr.io/gcp-compute-engine-223401/certmanager-f79b5bfeb092d099f0f3326024a30ebb@sha256:9f7622fd03d96c3262e71b4f6fb14455145041c81950b3efe10010c122974bed | |
sizeBytes: 58077460 | |
- names: | |
- gcr.io/gcp-compute-engine-223401/istio-c58c0c8bb8ecc80f800bb788a425ae1d@sha256:ebdb4e8832e9574311494a31ea18dc63cf903e8dd7f0651d640eb2c7f252da2a | |
sizeBytes: 57052872 | |
- names: | |
- gcr.io/gcp-compute-engine-223401/nscert-e3625dd01dcb901439f4630ab9789e75@sha256:77da0645be1369d0e56a1daa204da6de6661488eef5858a60dee9a052f02150c | |
sizeBytes: 56568040 | |
- names: | |
- gcr.io/gcp-compute-engine-223401/webhook-261c6506fca17bc41be50b3461f98f1c@sha256:012be54c7866cb8458fe96061f5321e519da7a4803809d912c2a670fff904ac6 | |
sizeBytes: 55354038 | |
- names: | |
- k8s.gcr.io/k8s-dns-kube-dns-amd64@sha256:618a82fa66cf0c75e4753369a6999032372be7308866fc9afb381789b1e5ad52 | |
- k8s.gcr.io/k8s-dns-kube-dns-amd64:1.14.13 | |
sizeBytes: 51157394 | |
- names: | |
- gcr.io/gcp-compute-engine-223401/queue-39be6f1d08a095bd076a71d288d295b6@sha256:8adf8f990b4485e7ead4dc9e6f8ddb3a19142835de95386428deb9ffde8d20b2 | |
sizeBytes: 48155143 | |
- names: | |
- k8s.gcr.io/k8s-dns-sidecar-amd64@sha256:cedc8fe2098dffc26d17f64061296b7aa54258a31513b6c52df271a98bb522b3 | |
- k8s.gcr.io/k8s-dns-sidecar-amd64:1.14.13 | |
sizeBytes: 42852039 | |
- names: | |
- k8s.gcr.io/k8s-dns-dnsmasq-nanny-amd64@sha256:45df3e8e0c551bd0c79cdba48ae6677f817971dcbd1eeed7fd1f9a35118410e4 | |
- k8s.gcr.io/k8s-dns-dnsmasq-nanny-amd64:1.14.13 | |
sizeBytes: 41372492 | |
- names: | |
- k8s.gcr.io/pause-amd64@sha256:163ac025575b775d1c0f9bf0bdd0f086883171eb475b5068e7defa4ca9e76516 | |
- k8s.gcr.io/pause-amd64:3.0 | |
sizeBytes: 746888 | |
nodeInfo: | |
architecture: amd64 | |
bootID: e6259c5a-c4b5-4882-a5cf-8b3021dc4550 | |
containerRuntimeVersion: docker://18.6.3 | |
kernelVersion: 4.9.0-11-amd64 | |
kubeProxyVersion: v1.14.6 | |
kubeletVersion: v1.14.6 | |
machineID: ec26f7e1ac86f9b0ec326d2a53038716 | |
operatingSystem: linux | |
osImage: Debian GNU/Linux 9 (stretch) | |
systemUUID: EC26F7E1-AC86-F9B0-EC32-6D2A53038716 | |
- apiVersion: v1 | |
kind: Node | |
metadata: | |
annotations: | |
node.alpha.kubernetes.io/ttl: "0" | |
volumes.kubernetes.io/controller-managed-attach-detach: "true" | |
creationTimestamp: "2019-12-03T04:45:04Z" | |
labels: | |
beta.kubernetes.io/arch: amd64 | |
beta.kubernetes.io/instance-type: t3.large | |
beta.kubernetes.io/os: linux | |
failure-domain.beta.kubernetes.io/region: ap-southeast-1 | |
failure-domain.beta.kubernetes.io/zone: ap-southeast-1b | |
kops.k8s.io/instancegroup: nodes | |
kubernetes.io/arch: amd64 | |
kubernetes.io/hostname: ip-172-20-67-65.ap-southeast-1.compute.internal | |
kubernetes.io/os: linux | |
kubernetes.io/role: node | |
node-role.kubernetes.io/node: "" | |
name: ip-172-20-67-65.ap-southeast-1.compute.internal | |
resourceVersion: "61128" | |
selfLink: /api/v1/nodes/ip-172-20-67-65.ap-southeast-1.compute.internal | |
uid: ac415e24-1587-11ea-b5af-027e0b84da98 | |
spec: | |
podCIDR: 172.20.133.0/24 | |
providerID: aws:///ap-southeast-1b/i-00c1a6378957ee8f4 | |
status: | |
addresses: | |
- address: 172.20.67.65 | |
type: InternalIP | |
- address: 13.250.22.240 | |
type: ExternalIP | |
- address: ip-172-20-67-65.ap-southeast-1.compute.internal | |
type: InternalDNS | |
- address: ec2-13-250-22-240.ap-southeast-1.compute.amazonaws.com | |
type: ExternalDNS | |
- address: ip-172-20-67-65.ap-southeast-1.compute.internal | |
type: Hostname | |
allocatable: | |
attachable-volumes-aws-ebs: "25" | |
cpu: "2" | |
ephemeral-storage: "115894266893" | |
hugepages-1Gi: "0" | |
hugepages-2Mi: "0" | |
memory: 7972788Ki | |
pods: "35" | |
capacity: | |
attachable-volumes-aws-ebs: "25" | |
cpu: "2" | |
ephemeral-storage: 125753328Ki | |
hugepages-1Gi: "0" | |
hugepages-2Mi: "0" | |
memory: 8075188Ki | |
pods: "35" | |
conditions: | |
- lastHeartbeatTime: "2019-12-03T13:19:47Z" | |
lastTransitionTime: "2019-12-03T04:45:04Z" | |
message: kubelet has sufficient memory available | |
reason: KubeletHasSufficientMemory | |
status: "False" | |
type: MemoryPressure | |
- lastHeartbeatTime: "2019-12-03T13:19:47Z" | |
lastTransitionTime: "2019-12-03T04:45:04Z" | |
message: kubelet has no disk pressure | |
reason: KubeletHasNoDiskPressure | |
status: "False" | |
type: DiskPressure | |
- lastHeartbeatTime: "2019-12-03T13:19:47Z" | |
lastTransitionTime: "2019-12-03T04:45:04Z" | |
message: kubelet has sufficient PID available | |
reason: KubeletHasSufficientPID | |
status: "False" | |
type: PIDPressure | |
- lastHeartbeatTime: "2019-12-03T13:19:47Z" | |
lastTransitionTime: "2019-12-03T04:45:24Z" | |
message: kubelet is posting ready status | |
reason: KubeletReady | |
status: "True" | |
type: Ready | |
daemonEndpoints: | |
kubeletEndpoint: | |
Port: 10250 | |
images: | |
- names: | |
- istio/proxyv2@sha256:245b1b40003654e9a9e3757196fa3cb506439cf8c98792c1552300528d8aea14 | |
- istio/proxyv2:1.3.5 | |
sizeBytes: 295628711 | |
- names: | |
- protokube:1.14.0-beta.2 | |
sizeBytes: 287898685 | |
- names: | |
- istio/kubectl@sha256:76c76dbed21c162dac9d6fa2337348eeaf5fb0f89a5c9857ff47f352cd6e82b4 | |
- istio/kubectl:1.3.5 | |
sizeBytes: 271562982 | |
- names: | |
- istio/pilot@sha256:17aefbe996d67e9fdf5dbba90bdcf030333a0832a34bc66469472ce61d2eed76 | |
- istio/pilot:1.3.5 | |
sizeBytes: 268531301 | |
- names: | |
- istio/sidecar_injector@sha256:484506534c3b1e7ef39575dbbc78b2a85457c5204e1d4a7e16e284c5a1cf0002 | |
- istio/sidecar_injector:1.3.5 | |
sizeBytes: 256818781 | |
- names: | |
- 602401143452.dkr.ecr.us-west-2.amazonaws.com/amazon-k8s-cni@sha256:81cd8a9d7ce75b2f7190296d5f9c43188d7e43e438a8e6dd11d36238ee36b5de | |
- 602401143452.dkr.ecr.us-west-2.amazonaws.com/amazon-k8s-cni:v1.5.0 | |
sizeBytes: 247322214 | |
- names: | |
- istio/proxyv2@sha256:9ba9de87d660767a2147f786040a8fe29ebb3b335742d3c95257ab82a33b8415 | |
- istio/proxyv2:1.4.0 | |
sizeBytes: 236743155 | |
- names: | |
- istio/kubectl@sha256:d62512cc4b10228512c86f63501b828b80c20e238452c429cfd62a9b9388cc54 | |
- istio/kubectl:1.4.0 | |
sizeBytes: 218715390 | |
- names: | |
- istio/galley@sha256:67f9f5321e6fefdf97e5406a047579a0fd04b576ad1c997e95a9db4dd2fbc6bc | |
- istio/galley:1.4.0 | |
sizeBytes: 212440743 | |
- names: | |
- istio/pilot@sha256:149357dc33f488eff0cc1edfb3329e72ea49614d52095770df543cbb8d60bcdb | |
- istio/pilot:1.4.0 | |
sizeBytes: 208430582 | |
- names: | |
- istio/node-agent-k8s@sha256:b3a169eb928e651bb0e9e40ed574d2c8cd1671a3b598c3c79458a63fd7cf398d | |
- istio/node-agent-k8s:1.4.0 | |
sizeBytes: 193009018 | |
- names: | |
- k8s.gcr.io/kube-proxy@sha256:e5c364dc75d816132bebf2d84b35518f0661fdeae39c686d92f9e5f9a07e96b9 | |
- k8s.gcr.io/kube-proxy:v1.14.6 | |
sizeBytes: 82106236 | |
- names: | |
- istio/mixer@sha256:b0b13e4311da022a1f67c85ffeb82d42567739c7156d2f644a66364b0c947fc4 | |
- istio/mixer:1.4.0 | |
sizeBytes: 80456256 | |
- names: | |
- gcr.io/gcp-compute-engine-223401/autoscaler-12c0fa24db31956a7cfa673210e4fa13@sha256:f74987342b3c7bcb8b95006f98a8efcfa19bd518430844df037cd5f29132c997 | |
sizeBytes: 65899235 | |
- names: | |
- gcr.io/gcp-compute-engine-223401/controller-f6fdb41c6acbc726e29a3104ff2ef720@sha256:7cde59d7e5e3f7891b57fb51ade68929b5220df54b70dc027a62018c54fe23d3 | |
sizeBytes: 59788477 | |
- names: | |
- gcr.io/gcp-compute-engine-223401/autoscaler-hpa-85c0b68178743d74ff7f663a72802ceb@sha256:24e81ede4cc223f0f70a1630fc4bed30308eb7b406715dbdd2280827f7565eec | |
sizeBytes: 58181702 | |
- names: | |
- gcr.io/gcp-compute-engine-223401/certmanager-f79b5bfeb092d099f0f3326024a30ebb@sha256:9f7622fd03d96c3262e71b4f6fb14455145041c81950b3efe10010c122974bed | |
sizeBytes: 58077460 | |
- names: | |
- gcr.io/gcp-compute-engine-223401/nscert-e3625dd01dcb901439f4630ab9789e75@sha256:77da0645be1369d0e56a1daa204da6de6661488eef5858a60dee9a052f02150c | |
sizeBytes: 56568040 | |
- names: | |
- gcr.io/gcp-compute-engine-223401/webhook-261c6506fca17bc41be50b3461f98f1c@sha256:012be54c7866cb8458fe96061f5321e519da7a4803809d912c2a670fff904ac6 | |
sizeBytes: 55354038 | |
- names: | |
- k8s.gcr.io/pause-amd64@sha256:163ac025575b775d1c0f9bf0bdd0f086883171eb475b5068e7defa4ca9e76516 | |
- k8s.gcr.io/pause-amd64:3.0 | |
sizeBytes: 746888 | |
nodeInfo: | |
architecture: amd64 | |
bootID: 5cc4af93-5a4d-4476-9e57-7413e83a0444 | |
containerRuntimeVersion: docker://18.6.3 | |
kernelVersion: 4.9.0-11-amd64 | |
kubeProxyVersion: v1.14.6 | |
kubeletVersion: v1.14.6 | |
machineID: ec21031918156b5eccab20d02c8221fe | |
operatingSystem: linux | |
osImage: Debian GNU/Linux 9 (stretch) | |
systemUUID: EC210319-1815-6B5E-CCAB-20D02C8221FE | |
- apiVersion: v1 | |
kind: Node | |
metadata: | |
annotations: | |
node.alpha.kubernetes.io/ttl: "0" | |
volumes.kubernetes.io/controller-managed-attach-detach: "true" | |
creationTimestamp: "2019-12-03T04:45:02Z" | |
labels: | |
beta.kubernetes.io/arch: amd64 | |
beta.kubernetes.io/instance-type: t3.large | |
beta.kubernetes.io/os: linux | |
failure-domain.beta.kubernetes.io/region: ap-southeast-1 | |
failure-domain.beta.kubernetes.io/zone: ap-southeast-1b | |
kops.k8s.io/instancegroup: nodes | |
kubernetes.io/arch: amd64 | |
kubernetes.io/hostname: ip-172-20-83-101.ap-southeast-1.compute.internal | |
kubernetes.io/os: linux | |
kubernetes.io/role: node | |
node-role.kubernetes.io/node: "" | |
name: ip-172-20-83-101.ap-southeast-1.compute.internal | |
resourceVersion: "61122" | |
selfLink: /api/v1/nodes/ip-172-20-83-101.ap-southeast-1.compute.internal | |
uid: aafe1a1b-1587-11ea-b5af-027e0b84da98 | |
spec: | |
podCIDR: 172.20.129.0/24 | |
providerID: aws:///ap-southeast-1b/i-0d393b2fa5cdc9ad4 | |
status: | |
addresses: | |
- address: 172.20.83.101 | |
type: InternalIP | |
- address: 13.229.237.26 | |
type: ExternalIP | |
- address: ip-172-20-83-101.ap-southeast-1.compute.internal | |
type: InternalDNS | |
- address: ec2-13-229-237-26.ap-southeast-1.compute.amazonaws.com | |
type: ExternalDNS | |
- address: ip-172-20-83-101.ap-southeast-1.compute.internal | |
type: Hostname | |
allocatable: | |
attachable-volumes-aws-ebs: "25" | |
cpu: "2" | |
ephemeral-storage: "115894266893" | |
hugepages-1Gi: "0" | |
hugepages-2Mi: "0" | |
memory: 7972780Ki | |
pods: "35" | |
capacity: | |
attachable-volumes-aws-ebs: "25" | |
cpu: "2" | |
ephemeral-storage: 125753328Ki | |
hugepages-1Gi: "0" | |
hugepages-2Mi: "0" | |
memory: 8075180Ki | |
pods: "35" | |
conditions: | |
- lastHeartbeatTime: "2019-12-03T13:19:44Z" | |
lastTransitionTime: "2019-12-03T04:45:02Z" | |
message: kubelet has sufficient memory available | |
reason: KubeletHasSufficientMemory | |
status: "False" | |
type: MemoryPressure | |
- lastHeartbeatTime: "2019-12-03T13:19:44Z" | |
lastTransitionTime: "2019-12-03T04:45:02Z" | |
message: kubelet has no disk pressure | |
reason: KubeletHasNoDiskPressure | |
status: "False" | |
type: DiskPressure | |
- lastHeartbeatTime: "2019-12-03T13:19:44Z" | |
lastTransitionTime: "2019-12-03T04:45:02Z" | |
message: kubelet has sufficient PID available | |
reason: KubeletHasSufficientPID | |
status: "False" | |
type: PIDPressure | |
- lastHeartbeatTime: "2019-12-03T13:19:44Z" | |
lastTransitionTime: "2019-12-03T04:45:22Z" | |
message: kubelet is posting ready status | |
reason: KubeletReady | |
status: "True" | |
type: Ready | |
daemonEndpoints: | |
kubeletEndpoint: | |
Port: 10250 | |
images: | |
- names: | |
- gcr.io/knative-samples/helloworld-go@sha256:5ea96ba4b872685ff4ddb5cd8d1a97ec18c18fae79ee8df0d29f446c5efe5f50 | |
sizeBytes: 780868439 | |
- names: | |
- istio/proxyv2@sha256:245b1b40003654e9a9e3757196fa3cb506439cf8c98792c1552300528d8aea14 | |
- istio/proxyv2:1.3.5 | |
sizeBytes: 295628711 | |
- names: | |
- protokube:1.14.0-beta.2 | |
sizeBytes: 287898685 | |
- names: | |
- istio/node-agent-k8s@sha256:0a18362538b10523fe2a302ca88e6edd206661658ee43b1bc9e7e671cd2dc0b9 | |
- istio/node-agent-k8s:1.3.5 | |
sizeBytes: 250162398 | |
- names: | |
- 602401143452.dkr.ecr.us-west-2.amazonaws.com/amazon-k8s-cni@sha256:81cd8a9d7ce75b2f7190296d5f9c43188d7e43e438a8e6dd11d36238ee36b5de | |
- 602401143452.dkr.ecr.us-west-2.amazonaws.com/amazon-k8s-cni:v1.5.0 | |
sizeBytes: 247322214 | |
- names: | |
- istio/proxyv2@sha256:9ba9de87d660767a2147f786040a8fe29ebb3b335742d3c95257ab82a33b8415 | |
- istio/proxyv2:1.4.0 | |
sizeBytes: 236743155 | |
- names: | |
- istio/pilot@sha256:149357dc33f488eff0cc1edfb3329e72ea49614d52095770df543cbb8d60bcdb | |
- istio/pilot:1.4.0 | |
sizeBytes: 208430582 | |
- names: | |
- istio/proxy_init@sha256:8278995c58eef8cd4ba32cb8756e2b93a09708e39fc9c0381e90c8a4fb62a042 | |
- istio/proxy_init:1.3.5 | |
sizeBytes: 193060005 | |
- names: | |
- istio/node-agent-k8s@sha256:b3a169eb928e651bb0e9e40ed574d2c8cd1671a3b598c3c79458a63fd7cf398d | |
- istio/node-agent-k8s:1.4.0 | |
sizeBytes: 193009018 | |
- names: | |
- k8s.gcr.io/kube-proxy@sha256:e5c364dc75d816132bebf2d84b35518f0661fdeae39c686d92f9e5f9a07e96b9 | |
- k8s.gcr.io/kube-proxy:v1.14.6 | |
sizeBytes: 82106236 | |
- names: | |
- istio/mixer@sha256:b0b13e4311da022a1f67c85ffeb82d42567739c7156d2f644a66364b0c947fc4 | |
- istio/mixer:1.4.0 | |
sizeBytes: 80456256 | |
- names: | |
- gcr.io/gcp-compute-engine-223401/autoscaler-12c0fa24db31956a7cfa673210e4fa13@sha256:f74987342b3c7bcb8b95006f98a8efcfa19bd518430844df037cd5f29132c997 | |
sizeBytes: 65899235 | |
- names: | |
- gcr.io/gcp-compute-engine-223401/autoscaler-hpa-85c0b68178743d74ff7f663a72802ceb@sha256:24e81ede4cc223f0f70a1630fc4bed30308eb7b406715dbdd2280827f7565eec | |
sizeBytes: 58181702 | |
- names: | |
- gcr.io/gcp-compute-engine-223401/istio-c58c0c8bb8ecc80f800bb788a425ae1d@sha256:ebdb4e8832e9574311494a31ea18dc63cf903e8dd7f0651d640eb2c7f252da2a | |
sizeBytes: 57052872 | |
- names: | |
- gcr.io/gcp-compute-engine-223401/webhook-261c6506fca17bc41be50b3461f98f1c@sha256:012be54c7866cb8458fe96061f5321e519da7a4803809d912c2a670fff904ac6 | |
sizeBytes: 55354038 | |
- names: | |
- k8s.gcr.io/k8s-dns-kube-dns-amd64@sha256:618a82fa66cf0c75e4753369a6999032372be7308866fc9afb381789b1e5ad52 | |
- k8s.gcr.io/k8s-dns-kube-dns-amd64:1.14.13 | |
sizeBytes: 51157394 | |
- names: | |
- gcr.io/gcp-compute-engine-223401/queue-39be6f1d08a095bd076a71d288d295b6@sha256:8adf8f990b4485e7ead4dc9e6f8ddb3a19142835de95386428deb9ffde8d20b2 | |
sizeBytes: 48155143 | |
- names: | |
- k8s.gcr.io/cluster-proportional-autoscaler-amd64@sha256:12370202895b621a2ac28226292e4578598f13c1502aa4d3ee90fff4325d9275 | |
- k8s.gcr.io/cluster-proportional-autoscaler-amd64:1.4.0 | |
sizeBytes: 45853555 | |
- names: | |
- k8s.gcr.io/k8s-dns-sidecar-amd64@sha256:cedc8fe2098dffc26d17f64061296b7aa54258a31513b6c52df271a98bb522b3 | |
- k8s.gcr.io/k8s-dns-sidecar-amd64:1.14.13 | |
sizeBytes: 42852039 | |
- names: | |
- k8s.gcr.io/k8s-dns-dnsmasq-nanny-amd64@sha256:45df3e8e0c551bd0c79cdba48ae6677f817971dcbd1eeed7fd1f9a35118410e4 | |
- k8s.gcr.io/k8s-dns-dnsmasq-nanny-amd64:1.14.13 | |
sizeBytes: 41372492 | |
- names: | |
- k8s.gcr.io/pause-amd64@sha256:163ac025575b775d1c0f9bf0bdd0f086883171eb475b5068e7defa4ca9e76516 | |
- k8s.gcr.io/pause-amd64:3.0 | |
sizeBytes: 746888 | |
nodeInfo: | |
architecture: amd64 | |
bootID: 76995eef-ea09-47f6-b7f6-55cf7da94ca8 | |
containerRuntimeVersion: docker://18.6.3 | |
kernelVersion: 4.9.0-11-amd64 | |
kubeProxyVersion: v1.14.6 | |
kubeletVersion: v1.14.6 | |
machineID: ec2f0a28f2ec7d60ccd651e152c481ad | |
operatingSystem: linux | |
osImage: Debian GNU/Linux 9 (stretch) | |
systemUUID: EC2F0A28-F2EC-7D60-CCD6-51E152C481AD | |
kind: List | |
metadata: | |
resourceVersion: "" | |
selfLink: "" | |
------- | |
resource: persistentvolumeclaims | |
------- | |
apiVersion: v1 | |
items: [] | |
kind: List | |
metadata: | |
resourceVersion: "" | |
selfLink: "" | |
------- | |
resource: persistentvolumes | |
------- | |
apiVersion: v1 | |
items: [] | |
kind: List | |
metadata: | |
resourceVersion: "" | |
selfLink: "" | |
------- | |
resource: pods | |
------- | |
apiVersion: v1 | |
items: | |
- apiVersion: v1 | |
kind: Pod | |
metadata: | |
annotations: | |
serving.knative.dev/creator: admin | |
sidecar.istio.io/inject: "true" | |
sidecar.istio.io/status: '{"version":"d6d2e691ff879786254a5c797e939c32d5625625a3413203e0eb842ebf4ffbc3","initContainers":["istio-init"],"containers":["istio-proxy"],"volumes":["istio-envoy","istio-certs"],"imagePullSecrets":null}' | |
traffic.sidecar.istio.io/includeOutboundIPRanges: '*' | |
creationTimestamp: "2019-12-03T12:44:54Z" | |
generateName: hello-example-1-deployment-77cf969dd8- | |
labels: | |
app: hello-example-1 | |
pod-template-hash: 77cf969dd8 | |
security.istio.io/tlsMode: istio | |
serving.knative.dev/configuration: hello-example | |
serving.knative.dev/configurationGeneration: "1" | |
serving.knative.dev/revision: hello-example-1 | |
serving.knative.dev/revisionUID: b40e6e6d-15ca-11ea-b5af-027e0b84da98 | |
serving.knative.dev/service: hello-example | |
name: hello-example-1-deployment-77cf969dd8-wkn87 | |
namespace: serving-tests | |
ownerReferences: | |
- apiVersion: apps/v1 | |
blockOwnerDeletion: true | |
controller: true | |
kind: ReplicaSet | |
name: hello-example-1-deployment-77cf969dd8 | |
uid: b49122af-15ca-11ea-b5af-027e0b84da98 | |
resourceVersion: "57328" | |
selfLink: /api/v1/namespaces/serving-tests/pods/hello-example-1-deployment-77cf969dd8-wkn87 | |
uid: b497b9e0-15ca-11ea-b5af-027e0b84da98 | |
spec: | |
containers: | |
- env: | |
- name: TARGET | |
value: OpenShift Meetup! | |
- name: PORT | |
value: "8080" | |
- name: K_REVISION | |
value: hello-example-1 | |
- name: K_CONFIGURATION | |
value: hello-example | |
- name: K_SERVICE | |
value: hello-example | |
image: gcr.io/knative-samples/helloworld-go@sha256:5ea96ba4b872685ff4ddb5cd8d1a97ec18c18fae79ee8df0d29f446c5efe5f50 | |
imagePullPolicy: IfNotPresent | |
lifecycle: | |
preStop: | |
httpGet: | |
path: /wait-for-drain | |
port: 8022 | |
scheme: HTTP | |
name: user-container | |
ports: | |
- containerPort: 8080 | |
name: user-port | |
protocol: TCP | |
resources: {} | |
terminationMessagePath: /dev/termination-log | |
terminationMessagePolicy: FallbackToLogsOnError | |
volumeMounts: | |
- mountPath: /var/log | |
name: knative-var-log | |
- mountPath: /var/run/secrets/kubernetes.io/serviceaccount | |
name: default-token-4cqx9 | |
readOnly: true | |
- env: | |
- name: SERVING_NAMESPACE | |
value: serving-tests | |
- name: SERVING_SERVICE | |
value: hello-example | |
- name: SERVING_CONFIGURATION | |
value: hello-example | |
- name: SERVING_REVISION | |
value: hello-example-1 | |
- name: QUEUE_SERVING_PORT | |
value: "8012" | |
- name: CONTAINER_CONCURRENCY | |
value: "0" | |
- name: REVISION_TIMEOUT_SECONDS | |
value: "300" | |
- name: SERVING_POD | |
valueFrom: | |
fieldRef: | |
apiVersion: v1 | |
fieldPath: metadata.name | |
- name: SERVING_POD_IP | |
valueFrom: | |
fieldRef: | |
apiVersion: v1 | |
fieldPath: status.podIP | |
- name: SERVING_LOGGING_CONFIG | |
value: | | |
{ | |
"level": "debug", | |
"development": false, | |
"outputPaths": ["stdout"], | |
"errorOutputPaths": ["stderr"], | |
"encoding": "json", | |
"encoderConfig": { | |
"timeKey": "ts", | |
"levelKey": "level", | |
"nameKey": "logger", | |
"callerKey": "caller", | |
"messageKey": "msg", | |
"stacktraceKey": "stacktrace", | |
"lineEnding": "", | |
"levelEncoder": "", | |
"timeEncoder": "iso8601", | |
"durationEncoder": "", | |
"callerEncoder": "" | |
} | |
} | |
- name: SERVING_LOGGING_LEVEL | |
value: debug | |
- name: SERVING_REQUEST_LOG_TEMPLATE | |
- name: SERVING_REQUEST_METRICS_BACKEND | |
value: prometheus | |
- name: TRACING_CONFIG_BACKEND | |
value: none | |
- name: TRACING_CONFIG_ZIPKIN_ENDPOINT | |
- name: TRACING_CONFIG_STACKDRIVER_PROJECT_ID | |
- name: TRACING_CONFIG_DEBUG | |
value: "false" | |
- name: TRACING_CONFIG_SAMPLE_RATE | |
value: "0.100000" | |
- name: USER_PORT | |
value: "8080" | |
- name: SYSTEM_NAMESPACE | |
value: knative-serving | |
- name: METRICS_DOMAIN | |
value: knative.dev/internal/serving | |
- name: USER_CONTAINER_NAME | |
value: user-container | |
- name: ENABLE_VAR_LOG_COLLECTION | |
value: "false" | |
- name: VAR_LOG_VOLUME_NAME | |
value: knative-var-log | |
- name: INTERNAL_VOLUME_PATH | |
value: /var/knative-internal | |
- name: SERVING_READINESS_PROBE | |
value: '{"tcpSocket":{"port":8080,"host":"127.0.0.1"},"successThreshold":1}' | |
- name: ENABLE_PROFILING | |
value: "false" | |
- name: SERVING_ENABLE_PROBE_REQUEST_LOG | |
value: "false" | |
image: gcr.io/gcp-compute-engine-223401/queue-39be6f1d08a095bd076a71d288d295b6@sha256:8adf8f990b4485e7ead4dc9e6f8ddb3a19142835de95386428deb9ffde8d20b2 | |
imagePullPolicy: IfNotPresent | |
name: queue-proxy | |
ports: | |
- containerPort: 8022 | |
name: http-queueadm | |
protocol: TCP | |
- containerPort: 9090 | |
name: queue-metrics | |
protocol: TCP | |
- containerPort: 9091 | |
name: http-usermetric | |
protocol: TCP | |
- containerPort: 8012 | |
name: queue-port | |
protocol: TCP | |
readinessProbe: | |
exec: | |
command: | |
- /ko-app/queue | |
- -probe-period | |
- "0" | |
failureThreshold: 3 | |
periodSeconds: 1 | |
successThreshold: 1 | |
timeoutSeconds: 10 | |
resources: | |
requests: | |
cpu: 25m | |
securityContext: | |
allowPrivilegeEscalation: false | |
terminationMessagePath: /dev/termination-log | |
terminationMessagePolicy: File | |
volumeMounts: | |
- mountPath: /var/run/secrets/kubernetes.io/serviceaccount | |
name: default-token-4cqx9 | |
readOnly: true | |
- args: | |
- proxy | |
- sidecar | |
- --domain | |
- $(POD_NAMESPACE).svc.cluster.local | |
- --configPath | |
- /etc/istio/proxy | |
- --binaryPath | |
- /usr/local/bin/envoy | |
- --serviceCluster | |
- hello-example-1.$(POD_NAMESPACE) | |
- --drainDuration | |
- 45s | |
- --parentShutdownDuration | |
- 1m0s | |
- --discoveryAddress | |
- istio-pilot.istio-system:15010 | |
- --zipkinAddress | |
- zipkin.istio-system:9411 | |
- --dnsRefreshRate | |
- 300s | |
- --connectTimeout | |
- 10s | |
- --proxyAdminPort | |
- "15000" | |
- --concurrency | |
- "2" | |
- --controlPlaneAuthPolicy | |
- NONE | |
- --statusPort | |
- "15020" | |
- --applicationPorts | |
- 8080,8022,9090,9091,8012 | |
env: | |
- name: POD_NAME | |
valueFrom: | |
fieldRef: | |
apiVersion: v1 | |
fieldPath: metadata.name | |
- name: ISTIO_META_POD_PORTS | |
value: |- | |
[ | |
{"name":"user-port","containerPort":8080,"protocol":"TCP"} | |
,{"name":"http-queueadm","containerPort":8022,"protocol":"TCP"} | |
,{"name":"queue-metrics","containerPort":9090,"protocol":"TCP"} | |
,{"name":"http-usermetric","containerPort":9091,"protocol":"TCP"} | |
,{"name":"queue-port","containerPort":8012,"protocol":"TCP"} | |
] | |
- name: ISTIO_META_CLUSTER_ID | |
value: Kubernetes | |
- name: POD_NAMESPACE | |
valueFrom: | |
fieldRef: | |
apiVersion: v1 | |
fieldPath: metadata.namespace | |
- name: INSTANCE_IP | |
valueFrom: | |
fieldRef: | |
apiVersion: v1 | |
fieldPath: status.podIP | |
- name: SERVICE_ACCOUNT | |
valueFrom: | |
fieldRef: | |
apiVersion: v1 | |
fieldPath: spec.serviceAccountName | |
- name: ISTIO_META_POD_NAME | |
valueFrom: | |
fieldRef: | |
apiVersion: v1 | |
fieldPath: metadata.name | |
- name: ISTIO_META_CONFIG_NAMESPACE | |
valueFrom: | |
fieldRef: | |
apiVersion: v1 | |
fieldPath: metadata.namespace | |
- name: SDS_ENABLED | |
value: "false" | |
- name: ISTIO_META_INTERCEPTION_MODE | |
value: REDIRECT | |
- name: ISTIO_META_INCLUDE_INBOUND_PORTS | |
value: 8080,8022,9090,9091,8012 | |
- name: ISTIO_METAJSON_ANNOTATIONS | |
value: | | |
{"serving.knative.dev/creator":"admin","sidecar.istio.io/inject":"true","traffic.sidecar.istio.io/includeOutboundIPRanges":"*"} | |
- name: ISTIO_METAJSON_LABELS | |
value: | | |
{"app":"hello-example-1","pod-template-hash":"77cf969dd8","serving.knative.dev/configuration":"hello-example","serving.knative.dev/configurationGeneration":"1","serving.knative.dev/revision":"hello-example-1","serving.knative.dev/revisionUID":"b40e6e6d-15ca-11ea-b5af-027e0b84da98","serving.knative.dev/service":"hello-example"} | |
- name: ISTIO_META_WORKLOAD_NAME | |
value: hello-example-1-deployment | |
- name: ISTIO_META_OWNER | |
value: kubernetes://apis/apps/v1/namespaces/serving-tests/deployments/hello-example-1-deployment | |
- name: TERMINATION_DRAIN_DURATION_SECONDS | |
value: "20" | |
image: docker.io/istio/proxyv2:1.4.0 | |
imagePullPolicy: IfNotPresent | |
name: istio-proxy | |
ports: | |
- containerPort: 15090 | |
name: http-envoy-prom | |
protocol: TCP | |
readinessProbe: | |
failureThreshold: 30 | |
httpGet: | |
path: /healthz/ready | |
port: 15020 | |
scheme: HTTP | |
initialDelaySeconds: 1 | |
periodSeconds: 2 | |
successThreshold: 1 | |
timeoutSeconds: 1 | |
resources: | |
limits: | |
cpu: "2" | |
memory: 1Gi | |
requests: | |
cpu: 100m | |
memory: 128Mi | |
securityContext: | |
readOnlyRootFilesystem: true | |
runAsUser: 1337 | |
terminationMessagePath: /dev/termination-log | |
terminationMessagePolicy: File | |
volumeMounts: | |
- mountPath: /etc/istio/proxy | |
name: istio-envoy | |
- mountPath: /etc/certs/ | |
name: istio-certs | |
readOnly: true | |
- mountPath: /var/run/secrets/kubernetes.io/serviceaccount | |
name: default-token-4cqx9 | |
readOnly: true | |
dnsPolicy: ClusterFirst | |
enableServiceLinks: true | |
initContainers: | |
- command: | |
- istio-iptables | |
- -p | |
- "15001" | |
- -z | |
- "15006" | |
- -u | |
- "1337" | |
- -m | |
- REDIRECT | |
- -i | |
- '*' | |
- -x | |
- "" | |
- -b | |
- '*' | |
- -d | |
- "15020" | |
image: docker.io/istio/proxyv2:1.4.0 | |
imagePullPolicy: IfNotPresent | |
name: istio-init | |
resources: | |
limits: | |
cpu: 100m | |
memory: 50Mi | |
requests: | |
cpu: 10m | |
memory: 10Mi | |
securityContext: | |
capabilities: | |
add: | |
- NET_ADMIN | |
runAsNonRoot: false | |
runAsUser: 0 | |
terminationMessagePath: /dev/termination-log | |
terminationMessagePolicy: File | |
nodeName: ip-172-20-44-18.ap-southeast-1.compute.internal | |
priority: 0 | |
restartPolicy: Always | |
schedulerName: default-scheduler | |
securityContext: {} | |
serviceAccount: default | |
serviceAccountName: default | |
terminationGracePeriodSeconds: 300 | |
tolerations: | |
- effect: NoExecute | |
key: node.kubernetes.io/not-ready | |
operator: Exists | |
tolerationSeconds: 300 | |
- effect: NoExecute | |
key: node.kubernetes.io/unreachable | |
operator: Exists | |
tolerationSeconds: 300 | |
volumes: | |
- emptyDir: {} | |
name: knative-var-log | |
- name: default-token-4cqx9 | |
secret: | |
defaultMode: 420 | |
secretName: default-token-4cqx9 | |
- emptyDir: | |
medium: Memory | |
name: istio-envoy | |
- name: istio-certs | |
secret: | |
defaultMode: 420 | |
optional: true | |
secretName: istio.default | |
status: | |
conditions: | |
- lastProbeTime: null | |
lastTransitionTime: "2019-12-03T12:44:56Z" | |
status: "True" | |
type: Initialized | |
- lastProbeTime: null | |
lastTransitionTime: "2019-12-03T12:44:59Z" | |
status: "True" | |
type: Ready | |
- lastProbeTime: null | |
lastTransitionTime: "2019-12-03T12:44:59Z" | |
status: "True" | |
type: ContainersReady | |
- lastProbeTime: null | |
lastTransitionTime: "2019-12-03T12:44:54Z" | |
status: "True" | |
type: PodScheduled | |
containerStatuses: | |
- containerID: docker://f2e28ca09185a1a42a44f2010683c6449be42d2d55bac4d7038460726a40a711 | |
image: istio/proxyv2:1.4.0 | |
imageID: docker-pullable://istio/proxyv2@sha256:9ba9de87d660767a2147f786040a8fe29ebb3b335742d3c95257ab82a33b8415 | |
lastState: {} | |
name: istio-proxy | |
ready: true | |
restartCount: 0 | |
state: | |
running: | |
startedAt: "2019-12-03T12:44:56Z" | |
- containerID: docker://3f66854c93362b6a4e9b0db00a9dd117afd4e50ac3c1fbeba68d64a5d104a831 | |
image: sha256:364e184fdcb4e11fa4a5acfb9cd8ac2228356c6ed4f4dd36c4001ac13db4f200 | |
imageID: docker-pullable://gcr.io/gcp-compute-engine-223401/queue-39be6f1d08a095bd076a71d288d295b6@sha256:8adf8f990b4485e7ead4dc9e6f8ddb3a19142835de95386428deb9ffde8d20b2 | |
lastState: {} | |
name: queue-proxy | |
ready: true | |
restartCount: 0 | |
state: | |
running: | |
startedAt: "2019-12-03T12:44:56Z" | |
- containerID: docker://f64213d255aafed703c99514a906d1f8562ab04e30add7bf418d9d9c401e0fee | |
image: sha256:7de72db4aca729a7cc88116e5f8324942c3da2e54135860b421111c6f9a09540 | |
imageID: docker-pullable://gcr.io/knative-samples/helloworld-go@sha256:5ea96ba4b872685ff4ddb5cd8d1a97ec18c18fae79ee8df0d29f446c5efe5f50 | |
lastState: {} | |
name: user-container | |
ready: true | |
restartCount: 0 | |
state: | |
running: | |
startedAt: "2019-12-03T12:44:56Z" | |
hostIP: 172.20.44.18 | |
initContainerStatuses: | |
- containerID: docker://7f7bab0aa8f87c583af5e62f92b11cda6ee5373f8039bc93d81fdc322175d91a | |
image: istio/proxyv2:1.4.0 | |
imageID: docker-pullable://istio/proxyv2@sha256:9ba9de87d660767a2147f786040a8fe29ebb3b335742d3c95257ab82a33b8415 | |
lastState: {} | |
name: istio-init | |
ready: true | |
restartCount: 0 | |
state: | |
terminated: | |
containerID: docker://7f7bab0aa8f87c583af5e62f92b11cda6ee5373f8039bc93d81fdc322175d91a | |
exitCode: 0 | |
finishedAt: "2019-12-03T12:44:55Z" | |
reason: Completed | |
startedAt: "2019-12-03T12:44:55Z" | |
phase: Running | |
podIP: 172.20.37.5 | |
qosClass: Burstable | |
startTime: "2019-12-03T12:44:54Z" | |
kind: List | |
metadata: | |
resourceVersion: "" | |
selfLink: "" | |
------- | |
resource: podtemplates | |
------- | |
apiVersion: v1 | |
items: [] | |
kind: List | |
metadata: | |
resourceVersion: "" | |
selfLink: "" | |
------- | |
resource: replicationcontrollers | |
------- | |
apiVersion: v1 | |
items: [] | |
kind: List | |
metadata: | |
resourceVersion: "" | |
selfLink: "" | |
------- | |
resource: resourcequotas | |
------- | |
apiVersion: v1 | |
items: [] | |
kind: List | |
metadata: | |
resourceVersion: "" | |
selfLink: "" | |
------- | |
resource: secrets | |
------- | |
apiVersion: v1 | |
items: | |
- apiVersion: v1 | |
data: | |
testKey: dGVzdFZhbHVl | |
kind: Secret | |
metadata: | |
annotations: | |
kubectl.kubernetes.io/last-applied-configuration: | | |
{"apiVersion":"v1","data":{"testKey":"dGVzdFZhbHVl"},"kind":"Secret","metadata":{"annotations":{},"name":"conformance-test-secret","namespace":"serving-tests"},"type":"Opaque"} | |
creationTimestamp: "2019-12-03T06:51:17Z" | |
name: conformance-test-secret | |
namespace: serving-tests | |
resourceVersion: "15022" | |
selfLink: /api/v1/namespaces/serving-tests/secrets/conformance-test-secret | |
uid: 4e0824fa-1599-11ea-b5af-027e0b84da98 | |
type: Opaque | |
- apiVersion: v1 | |
data: | |
ca.crt: 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 | |
namespace: c2VydmluZy10ZXN0cw== | |
token: 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 | |
kind: Secret | |
metadata: | |
annotations: | |
kubernetes.io/service-account.name: default | |
kubernetes.io/service-account.uid: 4d7fa7b8-1599-11ea-b5af-027e0b84da98 | |
creationTimestamp: "2019-12-03T06:51:16Z" | |
name: default-token-4cqx9 | |
namespace: serving-tests | |
resourceVersion: "15012" | |
selfLink: /api/v1/namespaces/serving-tests/secrets/default-token-4cqx9 | |
uid: 4d824ee3-1599-11ea-b5af-027e0b84da98 | |
type: kubernetes.io/service-account-token | |
- apiVersion: v1 | |
data: | |
cert-chain.pem: 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 | |
key.pem: LS0tLS1CRUdJTiBSU0EgUFJJVkFURSBLRVktLS0tLQpNSUlFcGdJQkFBS0NBUUVBd1hGalZ0SG1VQU5vdTRNY2oySm84eTdIVTdPYUZGQ2pKVXk2eHBjRk5rdzlyblZuCndJS0NWdHZ2Z1FlY3E0NE00NkxKcGR2azZEWkNva204U0dLZUIwZURWdlJqSlJNTzNvM0lQV2FnWG56ZHNEc0IKUjZVeSszZmU0WUFHY2kycmh0NENxMFY0aFdjcjZ4U3dGcS9LWjFnZklmbXUxTFMwelFqbjV2V2gyaXVJTUJBVgptTWhxYzdCWXZmVG1leFllS2FrbVZmKzJMSGhSYzNlOThvZ3owcE5nZGJJYzB0N0pZVUdJSDJ2emhNU2dSOXZXCjF0NHJlYWc0SnVMTDNzMndWc0c4eGZkZG5abDhpeXlhTzhCajZiMTVybUlCcWZHMk5IaFRDODMrY25XSThySUwKNGhWbjlNU1AvOGtmTWhuNXIwZmlxU3RaWWNyU2tnOWhIVmZuN3dJREFRQUJBb0lCQVFDQmhOSG1oNU9WYnpMbwptZGk5aUQ2TTFIMVJaYWQ4Z3FFNWtDNWVXUzk4TTMvNUYxTG9hbm1xZm9mVjlLckprc3ErZjNoVVBPNy9LNVZoCjQ4elZDbktVblNVclMyWTJwSlFJSHhZN1JrT0tBRURPaGpOTkxTYjlpRDBLN3hWaHpZSlRRc0sydWtUL3pSeHkKd2Q5RTBWN0w0d3kxU3Qvc096SHpOa3RQTUplMTR0VXBnNWVqQ2lnOHJoLy90dFQ2NXFpL2xlaEF2WVBSdGZDKwpld3MvdEdYRmNWUnphVEtIK1g0cHlENDBCY0YxUGtvdnh2OHVaREtxSitlT29oVmsybk0yUmVSdVFKTFdoZm5hCjNFVVlYbHUxVEFxQ3d0dWsxcUlhY29NbDUxZk1idzl5dSs0K3VBRWZXcGdlaUcreWpPV3BWQ25SNUhzckZOaGMKQUJpR0hQZUJBb0dCQU5ERUI2TFprdFFySVdXcG1KRmNMS1Z2MVFPMTRUYjdwTm1FZDNxRTVPQmhSU2VXbmxGNApEb3dHYlRuVGxzRlp3ekpjWWlOM1NPS0VHSG5BS2Y3YVRFRFFXL1NVMk5LbUM3NjRKZENzUHJYTksydFFDK1cyCmZPS3RvZmJnYkFHNGpyWUZ4Q0tsT1JlTkNvQ1VmMHF3WmR4dlFwUDRCZ2twdG9LSVJKSmszSDZKQW9HQkFPMDEKMTI5ayt2NWUxTEt2Q256Z05aTFRnYXBia2VSVng5VW84a3hUcExHMTkyWlpnMzZHU2ZrWm93VCt3TVNjREdhYQpmY1JzbGNyUCtaWnBSNENxelM5a2RjWms1WmlCNHc2Y0pucDRTa0Y3bVFMd3o0K2JtdDdvbHY0VEpTT3RCdEdiCnN2VXJwZ2pjRDIyQk9LbzBKMEV5elR3c211WXVYdy96bnJqWGNOUzNBb0dCQUxXM3pNWE9DV2F4WEZLM3UxdmMKRmVpelhZSHJVV3lnd3Erc0JLd2EvWGJxZEYydlY0T21zMUxqVFRRbW4zVVNBenpVK1gvUmx4bkV6ZUU4aWRHUwpod2xyMUg4akNWRGl4QnB4QkVtTmhOQ1BGSnBHaFBTaFVqZWwxL09qQ2FDOTIwdEozWjRpbjMyR2dYdkd4cjVtCnFXT2xYUmlicmZWUDM5UGpkWHpRV3JXeEFvR0JBTVZkQnVLb0lpMkN1WFh5TGNlNHhOcGxJSDJkc3NWSW1mdkIKRmRocnY1d2N5cnRkdndxR3NRV1JUeEhZNUlxeFM2QVM2cEdEeHgzMzdMSTQ1a1VuMTVDWEJXY01pL3RZRnBNUgpXUEtOSXp0WW12YlhaZHNXbk1UYXdNYWxKMEdIdFNTeFp6U1dISTlDaVpPUzhKS3MwZnh0U0ZYSXh4aTlmRnJKCldFWnkrbTRCQW9HQkFKWk9BU2lBWktMd1VaSUxwVDZnazBXMEZHaXFpbXhISElrM0ttSEQ2YlFKdnN2U28rY2UKeVYrT2JFd0JRdnUxOEs4dVdSeUlZVjNVTFlXNkZkUUJhbmF2eWR1amExUkpaeXRyU0hFK2lYaTlDZWRmT2FTMwp5WGRzdUFKY2x4YkVLcE5kZWt1UXZQZTNzODZTSzk2VTE1Ym9XemVBUTl0bEUyYkhJcmNIZ2JKYgotLS0tLUVORCBSU0EgUFJJVkFURSBLRVktLS0tLQo= | |
root-cert.pem: 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 | |
kind: Secret | |
metadata: | |
annotations: | |
istio.io/service-account.name: default | |
creationTimestamp: "2019-12-03T06:51:16Z" | |
name: istio.default | |
namespace: serving-tests | |
resourceVersion: "44123" | |
selfLink: /api/v1/namespaces/serving-tests/secrets/istio.default | |
uid: 4dd6beb4-1599-11ea-b5af-027e0b84da98 | |
type: istio.io/key-and-cert | |
kind: List | |
metadata: | |
resourceVersion: "" | |
selfLink: "" | |
------- | |
resource: serviceaccounts | |
------- | |
apiVersion: v1 | |
items: | |
- apiVersion: v1 | |
kind: ServiceAccount | |
metadata: | |
creationTimestamp: "2019-12-03T06:51:16Z" | |
name: default | |
namespace: serving-tests | |
resourceVersion: "15013" | |
selfLink: /api/v1/namespaces/serving-tests/serviceaccounts/default | |
uid: 4d7fa7b8-1599-11ea-b5af-027e0b84da98 | |
secrets: | |
- name: default-token-4cqx9 | |
kind: List | |
metadata: | |
resourceVersion: "" | |
selfLink: "" | |
------- | |
resource: services | |
------- | |
apiVersion: v1 | |
items: | |
- apiVersion: v1 | |
kind: Service | |
metadata: | |
creationTimestamp: "2019-12-03T12:44:59Z" | |
labels: | |
serving.knative.dev/route: hello-example | |
name: hello-example | |
namespace: serving-tests | |
ownerReferences: | |
- apiVersion: serving.knative.dev/v1alpha1 | |
blockOwnerDeletion: true | |
controller: true | |
kind: Route | |
name: hello-example | |
uid: b413f714-15ca-11ea-b5af-027e0b84da98 | |
resourceVersion: "57354" | |
selfLink: /api/v1/namespaces/serving-tests/services/hello-example | |
uid: b7a8aeea-15ca-11ea-b5af-027e0b84da98 | |
spec: | |
externalName: cluster-local-gateway.istio-system.svc.cluster.local | |
sessionAffinity: None | |
type: ExternalName | |
status: | |
loadBalancer: {} | |
- apiVersion: v1 | |
kind: Service | |
metadata: | |
annotations: | |
autoscaling.knative.dev/class: kpa.autoscaling.knative.dev | |
serving.knative.dev/creator: admin | |
sidecar.istio.io/inject: "true" | |
creationTimestamp: "2019-12-03T12:44:54Z" | |
labels: | |
app: hello-example-1 | |
networking.internal.knative.dev/serverlessservice: hello-example-1 | |
networking.internal.knative.dev/serviceType: Public | |
serving.knative.dev/configuration: hello-example | |
serving.knative.dev/configurationGeneration: "1" | |
serving.knative.dev/revision: hello-example-1 | |
serving.knative.dev/revisionUID: b40e6e6d-15ca-11ea-b5af-027e0b84da98 | |
serving.knative.dev/service: hello-example | |
name: hello-example-1 | |
namespace: serving-tests | |
ownerReferences: | |
- apiVersion: networking.internal.knative.dev/v1alpha1 | |
blockOwnerDeletion: true | |
controller: true | |
kind: ServerlessService | |
name: hello-example-1 | |
uid: b49e9147-15ca-11ea-b5af-027e0b84da98 | |
resourceVersion: "57307" | |
selfLink: /api/v1/namespaces/serving-tests/services/hello-example-1 | |
uid: b4ba4af1-15ca-11ea-b5af-027e0b84da98 | |
spec: | |
clusterIP: 172.20.3.163 | |
ports: | |
- name: http | |
port: 80 | |
protocol: TCP | |
targetPort: 8012 | |
sessionAffinity: None | |
type: ClusterIP | |
status: | |
loadBalancer: {} | |
- apiVersion: v1 | |
kind: Service | |
metadata: | |
annotations: | |
autoscaling.knative.dev/class: kpa.autoscaling.knative.dev | |
serving.knative.dev/creator: admin | |
sidecar.istio.io/inject: "true" | |
creationTimestamp: "2019-12-03T12:44:54Z" | |
labels: | |
app: hello-example-1 | |
networking.internal.knative.dev/serverlessservice: hello-example-1 | |
networking.internal.knative.dev/serviceType: Private | |
serving.knative.dev/configuration: hello-example | |
serving.knative.dev/configurationGeneration: "1" | |
serving.knative.dev/revision: hello-example-1 | |
serving.knative.dev/revisionUID: b40e6e6d-15ca-11ea-b5af-027e0b84da98 | |
serving.knative.dev/service: hello-example | |
name: hello-example-1-private | |
namespace: serving-tests | |
ownerReferences: | |
- apiVersion: networking.internal.knative.dev/v1alpha1 | |
blockOwnerDeletion: true | |
controller: true | |
kind: ServerlessService | |
name: hello-example-1 | |
uid: b49e9147-15ca-11ea-b5af-027e0b84da98 | |
resourceVersion: "57304" | |
selfLink: /api/v1/namespaces/serving-tests/services/hello-example-1-private | |
uid: b4b80021-15ca-11ea-b5af-027e0b84da98 | |
spec: | |
clusterIP: 172.20.26.67 | |
ports: | |
- name: http | |
port: 80 | |
protocol: TCP | |
targetPort: 8012 | |
- name: queue-metrics | |
port: 9090 | |
protocol: TCP | |
targetPort: queue-metrics | |
- name: http-usermetric | |
port: 9091 | |
protocol: TCP | |
targetPort: http-usermetric | |
- name: http-queueadm | |
port: 8022 | |
protocol: TCP | |
targetPort: 8022 | |
selector: | |
serving.knative.dev/revisionUID: b40e6e6d-15ca-11ea-b5af-027e0b84da98 | |
sessionAffinity: None | |
type: ClusterIP | |
status: | |
loadBalancer: {} | |
kind: List | |
metadata: | |
resourceVersion: "" | |
selfLink: "" | |
------- | |
resource: mutatingwebhookconfigurations | |
------- | |
apiVersion: v1 | |
items: | |
- apiVersion: admissionregistration.k8s.io/v1beta1 | |
kind: MutatingWebhookConfiguration | |
metadata: | |
annotations: | |
kubectl.kubernetes.io/last-applied-configuration: | | |
{"apiVersion":"admissionregistration.k8s.io/v1beta1","kind":"MutatingWebhookConfiguration","metadata":{"annotations":{},"labels":{"app":"sidecarInjectorWebhook","chart":"sidecarInjectorWebhook","heritage":"Tiller","release":"RELEASE-NAME"},"name":"istio-sidecar-injector"},"webhooks":[{"clientConfig":{"caBundle":"","service":{"name":"istio-sidecar-injector","namespace":"istio-system","path":"/inject"}},"failurePolicy":"Fail","name":"sidecar-injector.istio.io","namespaceSelector":{"matchExpressions":[{"key":"name","operator":"NotIn","values":["istio-system"]},{"key":"istio-injection","operator":"NotIn","values":["disabled"]}]},"rules":[{"apiGroups":[""],"apiVersions":["v1"],"operations":["CREATE"],"resources":["pods"]}]}]} | |
creationTimestamp: "2019-12-03T10:53:33Z" | |
generation: 2 | |
labels: | |
app: sidecarInjectorWebhook | |
chart: sidecarInjectorWebhook | |
heritage: Tiller | |
release: RELEASE-NAME | |
name: istio-sidecar-injector | |
resourceVersion: "43680" | |
selfLink: /apis/admissionregistration.k8s.io/v1beta1/mutatingwebhookconfigurations/istio-sidecar-injector | |
uid: 2656d828-15bb-11ea-b5af-027e0b84da98 | |
webhooks: | |
- admissionReviewVersions: | |
- v1beta1 | |
clientConfig: | |
caBundle: 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 | |
service: | |
name: istio-sidecar-injector | |
namespace: istio-system | |
path: /inject | |
failurePolicy: Fail | |
name: sidecar-injector.istio.io | |
namespaceSelector: | |
matchExpressions: | |
- key: name | |
operator: NotIn | |
values: | |
- istio-system | |
- key: istio-injection | |
operator: NotIn | |
values: | |
- disabled | |
rules: | |
- apiGroups: | |
- "" | |
apiVersions: | |
- v1 | |
operations: | |
- CREATE | |
resources: | |
- pods | |
scope: '*' | |
sideEffects: Unknown | |
timeoutSeconds: 30 | |
- apiVersion: admissionregistration.k8s.io/v1beta1 | |
kind: MutatingWebhookConfiguration | |
metadata: | |
annotations: | |
kubectl.kubernetes.io/last-applied-configuration: | | |
{"apiVersion":"admissionregistration.k8s.io/v1beta1","kind":"MutatingWebhookConfiguration","metadata":{"annotations":{},"labels":{"serving.knative.dev/release":"devel"},"name":"webhook.serving.knative.dev"},"webhooks":[{"admissionReviewVersions":["v1beta1"],"clientConfig":{"service":{"name":"webhook","namespace":"knative-serving"}},"failurePolicy":"Fail","name":"webhook.serving.knative.dev"}]} | |
creationTimestamp: "2019-12-03T10:54:09Z" | |
generation: 2 | |
labels: | |
serving.knative.dev/release: devel | |
name: webhook.serving.knative.dev | |
resourceVersion: "44067" | |
selfLink: /apis/admissionregistration.k8s.io/v1beta1/mutatingwebhookconfigurations/webhook.serving.knative.dev | |
uid: 3bf564cc-15bb-11ea-b5af-027e0b84da98 | |
webhooks: | |
- admissionReviewVersions: | |
- v1beta1 | |
clientConfig: | |
caBundle: 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 | |
service: | |
name: webhook | |
namespace: knative-serving | |
path: / | |
failurePolicy: Fail | |
name: webhook.serving.knative.dev | |
namespaceSelector: {} | |
rules: | |
- apiGroups: | |
- autoscaling.internal.knative.dev | |
apiVersions: | |
- v1alpha1 | |
operations: | |
- CREATE | |
- UPDATE | |
resources: | |
- metrics/* | |
scope: '*' | |
- apiGroups: | |
- autoscaling.internal.knative.dev | |
apiVersions: | |
- v1alpha1 | |
operations: | |
- CREATE | |
- UPDATE | |
resources: | |
- podautoscalers/* | |
scope: '*' | |
- apiGroups: | |
- networking.internal.knative.dev | |
apiVersions: | |
- v1alpha1 | |
operations: | |
- CREATE | |
- UPDATE | |
resources: | |
- certificates/* | |
scope: '*' | |
- apiGroups: | |
- networking.internal.knative.dev | |
apiVersions: | |
- v1alpha1 | |
operations: | |
- CREATE | |
- UPDATE | |
resources: | |
- ingresses/* | |
scope: '*' | |
- apiGroups: | |
- networking.internal.knative.dev | |
apiVersions: | |
- v1alpha1 | |
operations: | |
- CREATE | |
- UPDATE | |
resources: | |
- serverlessservices/* | |
scope: '*' | |
- apiGroups: | |
- serving.knative.dev | |
apiVersions: | |
- v1 | |
operations: | |
- CREATE | |
- UPDATE | |
resources: | |
- configurations/* | |
scope: '*' | |
- apiGroups: | |
- serving.knative.dev | |
apiVersions: | |
- v1 | |
operations: | |
- CREATE | |
- UPDATE | |
resources: | |
- revisions/* | |
scope: '*' | |
- apiGroups: | |
- serving.knative.dev | |
apiVersions: | |
- v1 | |
operations: | |
- CREATE | |
- UPDATE | |
resources: | |
- routes/* | |
scope: '*' | |
- apiGroups: | |
- serving.knative.dev | |
apiVersions: | |
- v1 | |
operations: | |
- CREATE | |
- UPDATE | |
resources: | |
- services/* | |
scope: '*' | |
- apiGroups: | |
- serving.knative.dev | |
apiVersions: | |
- v1alpha1 | |
operations: | |
- CREATE | |
- UPDATE | |
resources: | |
- configurations/* | |
scope: '*' | |
- apiGroups: | |
- serving.knative.dev | |
apiVersions: | |
- v1alpha1 | |
operations: | |
- CREATE | |
- UPDATE | |
resources: | |
- revisions/* | |
scope: '*' | |
- apiGroups: | |
- serving.knative.dev | |
apiVersions: | |
- v1alpha1 | |
operations: | |
- CREATE | |
- UPDATE | |
resources: | |
- routes/* | |
scope: '*' | |
- apiGroups: | |
- serving.knative.dev | |
apiVersions: | |
- v1alpha1 | |
operations: | |
- CREATE | |
- UPDATE | |
resources: | |
- services/* | |
scope: '*' | |
- apiGroups: | |
- serving.knative.dev | |
apiVersions: | |
- v1beta1 | |
operations: | |
- CREATE | |
- UPDATE | |
resources: | |
- configurations/* | |
scope: '*' | |
- apiGroups: | |
- serving.knative.dev | |
apiVersions: | |
- v1beta1 | |
operations: | |
- CREATE | |
- UPDATE | |
resources: | |
- revisions/* | |
scope: '*' | |
- apiGroups: | |
- serving.knative.dev | |
apiVersions: | |
- v1beta1 | |
operations: | |
- CREATE | |
- UPDATE | |
resources: | |
- routes/* | |
scope: '*' | |
- apiGroups: | |
- serving.knative.dev | |
apiVersions: | |
- v1beta1 | |
operations: | |
- CREATE | |
- UPDATE | |
resources: | |
- services/* | |
scope: '*' | |
sideEffects: Unknown | |
timeoutSeconds: 30 | |
kind: List | |
metadata: | |
resourceVersion: "" | |
selfLink: "" | |
------- | |
resource: validatingwebhookconfigurations | |
------- | |
apiVersion: v1 | |
items: | |
- apiVersion: admissionregistration.k8s.io/v1beta1 | |
kind: ValidatingWebhookConfiguration | |
metadata: | |
annotations: | |
kubectl.kubernetes.io/last-applied-configuration: | | |
{"apiVersion":"admissionregistration.k8s.io/v1beta1","kind":"ValidatingWebhookConfiguration","metadata":{"annotations":{},"labels":{"serving.knative.dev/release":"devel"},"name":"config.webhook.serving.knative.dev"},"webhooks":[{"admissionReviewVersions":["v1beta1"],"clientConfig":{"service":{"name":"webhook","namespace":"knative-serving"}},"failurePolicy":"Fail","name":"config.webhook.serving.knative.dev","namespaceSelector":{"matchExpressions":[{"key":"serving.knative.dev/release","operator":"Exists"}]}}]} | |
creationTimestamp: "2019-12-03T10:54:10Z" | |
generation: 2 | |
labels: | |
serving.knative.dev/release: devel | |
name: config.webhook.serving.knative.dev | |
resourceVersion: "44068" | |
selfLink: /apis/admissionregistration.k8s.io/v1beta1/validatingwebhookconfigurations/config.webhook.serving.knative.dev | |
uid: 3c2e217e-15bb-11ea-b5af-027e0b84da98 | |
webhooks: | |
- admissionReviewVersions: | |
- v1beta1 | |
clientConfig: | |
caBundle: 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 | |
service: | |
name: webhook | |
namespace: knative-serving | |
path: /config-validation | |
failurePolicy: Fail | |
name: config.webhook.serving.knative.dev | |
namespaceSelector: | |
matchExpressions: | |
- key: serving.knative.dev/release | |
operator: Exists | |
rules: | |
- apiGroups: | |
- "" | |
apiVersions: | |
- v1 | |
operations: | |
- CREATE | |
- UPDATE | |
resources: | |
- configmaps/* | |
scope: Namespaced | |
sideEffects: Unknown | |
timeoutSeconds: 30 | |
- apiVersion: admissionregistration.k8s.io/v1beta1 | |
kind: ValidatingWebhookConfiguration | |
metadata: | |
creationTimestamp: "2019-12-03T10:53:58Z" | |
generation: 1 | |
labels: | |
app: galley | |
chart: galley | |
heritage: Tiller | |
istio: galley | |
release: RELEASE-NAME | |
name: istio-galley | |
ownerReferences: | |
- apiVersion: v1 | |
blockOwnerDeletion: true | |
controller: true | |
kind: Namespace | |
name: istio-system | |
uid: ffb3df9d-15ba-11ea-b5af-027e0b84da98 | |
resourceVersion: "43760" | |
selfLink: /apis/admissionregistration.k8s.io/v1beta1/validatingwebhookconfigurations/istio-galley | |
uid: 354bc616-15bb-11ea-b5af-027e0b84da98 | |
webhooks: | |
- admissionReviewVersions: | |
- v1beta1 | |
clientConfig: | |
caBundle: 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 | |
service: | |
name: istio-galley | |
namespace: istio-system | |
path: /admitpilot | |
failurePolicy: Fail | |
name: pilot.validation.istio.io | |
namespaceSelector: {} | |
rules: | |
- apiGroups: | |
- config.istio.io | |
apiVersions: | |
- v1alpha2 | |
operations: | |
- CREATE | |
- UPDATE | |
resources: | |
- httpapispecs | |
- httpapispecbindings | |
- quotaspecs | |
- quotaspecbindings | |
scope: '*' | |
- apiGroups: | |
- rbac.istio.io | |
apiVersions: | |
- '*' | |
operations: | |
- CREATE | |
- UPDATE | |
resources: | |
- '*' | |
scope: '*' | |
- apiGroups: | |
- security.istio.io | |
apiVersions: | |
- '*' | |
operations: | |
- CREATE | |
- UPDATE | |
resources: | |
- '*' | |
scope: '*' | |
- apiGroups: | |
- authentication.istio.io | |
apiVersions: | |
- '*' | |
operations: | |
- CREATE | |
- UPDATE | |
resources: | |
- '*' | |
scope: '*' | |
- apiGroups: | |
- networking.istio.io | |
apiVersions: | |
- '*' | |
operations: | |
- CREATE | |
- UPDATE | |
resources: | |
- destinationrules | |
- envoyfilters | |
- gateways | |
- serviceentries | |
- sidecars | |
- virtualservices | |
scope: '*' | |
sideEffects: None | |
timeoutSeconds: 30 | |
- admissionReviewVersions: | |
- v1beta1 | |
clientConfig: | |
caBundle: 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 | |
service: | |
name: istio-galley | |
namespace: istio-system | |
path: /admitmixer | |
failurePolicy: Fail | |
name: mixer.validation.istio.io | |
namespaceSelector: {} | |
rules: | |
- apiGroups: | |
- config.istio.io | |
apiVersions: | |
- v1alpha2 | |
operations: | |
- CREATE | |
- UPDATE | |
resources: | |
- rules | |
- attributemanifests | |
- circonuses | |
- deniers | |
- fluentds | |
- kubernetesenvs | |
- listcheckers | |
- memquotas | |
- noops | |
- opas | |
- prometheuses | |
- rbacs | |
- solarwindses | |
- stackdrivers | |
- cloudwatches | |
- dogstatsds | |
- statsds | |
- stdios | |
- apikeys | |
- authorizations | |
- checknothings | |
- listentries | |
- logentries | |
- metrics | |
- quotas | |
- reportnothings | |
- tracespans | |
- adapters | |
- handlers | |
- instances | |
- templates | |
- zipkins | |
scope: '*' | |
sideEffects: None | |
timeoutSeconds: 30 | |
- apiVersion: admissionregistration.k8s.io/v1beta1 | |
kind: ValidatingWebhookConfiguration | |
metadata: | |
annotations: | |
kubectl.kubernetes.io/last-applied-configuration: | | |
{"apiVersion":"admissionregistration.k8s.io/v1beta1","kind":"ValidatingWebhookConfiguration","metadata":{"annotations":{},"labels":{"serving.knative.dev/release":"devel"},"name":"validation.webhook.serving.knative.dev"},"webhooks":[{"admissionReviewVersions":["v1beta1"],"clientConfig":{"service":{"name":"webhook","namespace":"knative-serving"}},"failurePolicy":"Fail","name":"validation.webhook.serving.knative.dev"}]} | |
creationTimestamp: "2019-12-03T10:54:09Z" | |
generation: 2 | |
labels: | |
serving.knative.dev/release: devel | |
name: validation.webhook.serving.knative.dev | |
resourceVersion: "44069" | |
selfLink: /apis/admissionregistration.k8s.io/v1beta1/validatingwebhookconfigurations/validation.webhook.serving.knative.dev | |
uid: 3c116a6c-15bb-11ea-b5af-027e0b84da98 | |
webhooks: | |
- admissionReviewVersions: | |
- v1beta1 | |
clientConfig: | |
caBundle: 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 | |
service: | |
name: webhook | |
namespace: knative-serving | |
path: / | |
failurePolicy: Fail | |
name: validation.webhook.serving.knative.dev | |
namespaceSelector: {} | |
rules: | |
- apiGroups: | |
- autoscaling.internal.knative.dev | |
apiVersions: | |
- v1alpha1 | |
operations: | |
- CREATE | |
- UPDATE | |
resources: | |
- metrics/* | |
scope: '*' | |
- apiGroups: | |
- autoscaling.internal.knative.dev | |
apiVersions: | |
- v1alpha1 | |
operations: | |
- CREATE | |
- UPDATE | |
resources: | |
- podautoscalers/* | |
scope: '*' | |
- apiGroups: | |
- networking.internal.knative.dev | |
apiVersions: | |
- v1alpha1 | |
operations: | |
- CREATE | |
- UPDATE | |
resources: | |
- certificates/* | |
scope: '*' | |
- apiGroups: | |
- networking.internal.knative.dev | |
apiVersions: | |
- v1alpha1 | |
operations: | |
- CREATE | |
- UPDATE | |
resources: | |
- ingresses/* | |
scope: '*' | |
- apiGroups: | |
- networking.internal.knative.dev | |
apiVersions: | |
- v1alpha1 | |
operations: | |
- CREATE | |
- UPDATE | |
resources: | |
- serverlessservices/* | |
scope: '*' | |
- apiGroups: | |
- serving.knative.dev | |
apiVersions: | |
- v1 | |
operations: | |
- CREATE | |
- UPDATE | |
resources: | |
- configurations/* | |
scope: '*' | |
- apiGroups: | |
- serving.knative.dev | |
apiVersions: | |
- v1 | |
operations: | |
- CREATE | |
- UPDATE | |
resources: | |
- revisions/* | |
scope: '*' | |
- apiGroups: | |
- serving.knative.dev | |
apiVersions: | |
- v1 | |
operations: | |
- CREATE | |
- UPDATE | |
resources: | |
- routes/* | |
scope: '*' | |
- apiGroups: | |
- serving.knative.dev | |
apiVersions: | |
- v1 | |
operations: | |
- CREATE | |
- UPDATE | |
resources: | |
- services/* | |
scope: '*' | |
- apiGroups: | |
- serving.knative.dev | |
apiVersions: | |
- v1alpha1 | |
operations: | |
- CREATE | |
- UPDATE | |
resources: | |
- configurations/* | |
scope: '*' | |
- apiGroups: | |
- serving.knative.dev | |
apiVersions: | |
- v1alpha1 | |
operations: | |
- CREATE | |
- UPDATE | |
resources: | |
- revisions/* | |
scope: '*' | |
- apiGroups: | |
- serving.knative.dev | |
apiVersions: | |
- v1alpha1 | |
operations: | |
- CREATE | |
- UPDATE | |
resources: | |
- routes/* | |
scope: '*' | |
- apiGroups: | |
- serving.knative.dev | |
apiVersions: | |
- v1alpha1 | |
operations: | |
- CREATE | |
- UPDATE | |
resources: | |
- services/* | |
scope: '*' | |
- apiGroups: | |
- serving.knative.dev | |
apiVersions: | |
- v1beta1 | |
operations: | |
- CREATE | |
- UPDATE | |
resources: | |
- configurations/* | |
scope: '*' | |
- apiGroups: | |
- serving.knative.dev | |
apiVersions: | |
- v1beta1 | |
operations: | |
- CREATE | |
- UPDATE | |
resources: | |
- revisions/* | |
scope: '*' | |
- apiGroups: | |
- serving.knative.dev | |
apiVersions: | |
- v1beta1 | |
operations: | |
- CREATE | |
- UPDATE | |
resources: | |
- routes/* | |
scope: '*' | |
- apiGroups: | |
- serving.knative.dev | |
apiVersions: | |
- v1beta1 | |
operations: | |
- CREATE | |
- UPDATE | |
resources: | |
- services/* | |
scope: '*' | |
sideEffects: Unknown | |
timeoutSeconds: 30 | |
kind: List | |
metadata: | |
resourceVersion: "" | |
selfLink: "" | |
------- | |
resource: customresourcedefinitions | |
------- | |
apiVersion: v1 | |
items: | |
- apiVersion: apiextensions.k8s.io/v1beta1 | |
kind: CustomResourceDefinition | |
metadata: | |
annotations: | |
helm.sh/resource-policy: keep | |
kubectl.kubernetes.io/last-applied-configuration: | | |
{"apiVersion":"apiextensions.k8s.io/v1beta1","kind":"CustomResourceDefinition","metadata":{"annotations":{"helm.sh/resource-policy":"keep"},"labels":{"app":"mixer","chart":"istio","heritage":"Tiller","istio":"mixer-adapter","package":"adapter","release":"istio"},"name":"adapters.config.istio.io"},"spec":{"group":"config.istio.io","names":{"categories":["istio-io","policy-istio-io"],"kind":"adapter","plural":"adapters","singular":"adapter"},"scope":"Namespaced","subresources":{"status":{}},"versions":[{"name":"v1alpha2","served":true,"storage":true}]}} | |
creationTimestamp: "2019-12-03T04:51:49Z" | |
generation: 3 | |
labels: | |
app: mixer | |
chart: istio | |
heritage: Tiller | |
istio: mixer-adapter | |
package: adapter | |
release: istio | |
name: adapters.config.istio.io | |
resourceVersion: "43322" | |
selfLink: /apis/apiextensions.k8s.io/v1beta1/customresourcedefinitions/adapters.config.istio.io | |
uid: 9dd1fa09-1588-11ea-b5af-027e0b84da98 | |
spec: | |
conversion: | |
strategy: None | |
group: config.istio.io | |
names: | |
categories: | |
- istio-io | |
- policy-istio-io | |
kind: adapter | |
listKind: adapterList | |
plural: adapters | |
singular: adapter | |
scope: Namespaced | |
subresources: | |
status: {} | |
version: v1alpha2 | |
versions: | |
- name: v1alpha2 | |
served: true | |
storage: true | |
status: | |
acceptedNames: | |
categories: | |
- istio-io | |
- policy-istio-io | |
kind: adapter | |
listKind: adapterList | |
plural: adapters | |
singular: adapter | |
conditions: | |
- lastTransitionTime: "2019-12-03T04:51:49Z" | |
message: no conflicts found | |
reason: NoConflicts | |
status: "True" | |
type: NamesAccepted | |
- lastTransitionTime: null | |
message: the initial names have been accepted | |
reason: InitialNamesAccepted | |
status: "True" | |
type: Established | |
storedVersions: | |
- v1alpha2 | |
- apiVersion: apiextensions.k8s.io/v1beta1 | |
kind: CustomResourceDefinition | |
metadata: | |
annotations: | |
helm.sh/resource-policy: keep | |
kubectl.kubernetes.io/last-applied-configuration: | | |
{"apiVersion":"apiextensions.k8s.io/v1beta1","kind":"CustomResourceDefinition","metadata":{"annotations":{"helm.sh/resource-policy":"keep"},"creationTimestamp":null,"labels":{"app":"mixer","chart":"istio","heritage":"Tiller","istio":"core","package":"istio.io.mixer","release":"istio"},"name":"attributemanifests.config.istio.io"},"spec":{"group":"config.istio.io","names":{"categories":["istio-io","policy-istio-io"],"kind":"attributemanifest","plural":"attributemanifests","singular":"attributemanifest"},"scope":"Namespaced","subresources":{"status":{}},"validation":{"openAPIV3Schema":{"properties":{"spec":{"description":"Describes the rules used to configure Mixer's policy and telemetry features. See more details at: https://istio.io/docs/reference/config/policy-and-telemetry/istio.policy.v1beta1.html","properties":{"attributes":{"additionalProperties":{"properties":{"description":{"description":"A human-readable description of the attribute's purpose.","format":"string","type":"string"},"valueType":{"description":"The type of data carried by this attribute.","enum":["VALUE_TYPE_UNSPECIFIED","STRING","INT64","DOUBLE","BOOL","TIMESTAMP","IP_ADDRESS","EMAIL_ADDRESS","URI","DNS_NAME","DURATION","STRING_MAP"],"type":"string"}},"type":"object"},"description":"The set of attributes this Istio component will be responsible for producing at runtime.","type":"object"},"name":{"description":"Name of the component producing these attributes.","format":"string","type":"string"},"revision":{"description":"The revision of this document.","format":"string","type":"string"}},"type":"object"}},"type":"object"}},"versions":[{"name":"v1alpha2","served":true,"storage":true}]},"status":{"acceptedNames":{"kind":"","plural":""},"conditions":[],"storedVersions":[]}} | |
creationTimestamp: "2019-12-03T04:51:48Z" | |
generation: 3 | |
labels: | |
app: mixer | |
chart: istio | |
heritage: Tiller | |
istio: core | |
package: istio.io.mixer | |
release: istio | |
name: attributemanifests.config.istio.io | |
resourceVersion: "43295" | |
selfLink: /apis/apiextensions.k8s.io/v1beta1/customresourcedefinitions/attributemanifests.config.istio.io | |
uid: 9d1f874d-1588-11ea-b5af-027e0b84da98 | |
spec: | |
conversion: | |
strategy: None | |
group: config.istio.io | |
names: | |
categories: | |
- istio-io | |
- policy-istio-io | |
kind: attributemanifest | |
listKind: attributemanifestList | |
plural: attributemanifests | |
singular: attributemanifest | |
scope: Namespaced | |
subresources: | |
status: {} | |
validation: | |
openAPIV3Schema: | |
properties: | |
spec: | |
description: 'Describes the rules used to configure Mixer''s policy and | |
telemetry features. See more details at: https://istio.io/docs/reference/config/policy-and-telemetry/istio.policy.v1beta1.html' | |
properties: | |
attributes: | |
additionalProperties: | |
properties: | |
description: | |
description: A human-readable description of the attribute's | |
purpose. | |
format: string | |
type: string | |
valueType: | |
description: The type of data carried by this attribute. | |
enum: | |
- VALUE_TYPE_UNSPECIFIED | |
- STRING | |
- INT64 | |
- DOUBLE | |
- BOOL | |
- TIMESTAMP | |
- IP_ADDRESS | |
- EMAIL_ADDRESS | |
- URI | |
- DNS_NAME | |
- DURATION | |
- STRING_MAP | |
type: string | |
type: object | |
description: The set of attributes this Istio component will be responsible | |
for producing at runtime. | |
type: object | |
name: | |
description: Name of the component producing these attributes. | |
format: string | |
type: string | |
revision: | |
description: The revision of this document. | |
format: string | |
type: string | |
type: object | |
type: object | |
version: v1alpha2 | |
versions: | |
- name: v1alpha2 | |
served: true | |
storage: true | |
status: | |
acceptedNames: | |
categories: | |
- istio-io | |
- policy-istio-io | |
kind: attributemanifest | |
listKind: attributemanifestList | |
plural: attributemanifests | |
singular: attributemanifest | |
conditions: | |
- lastTransitionTime: "2019-12-03T04:51:48Z" | |
message: no conflicts found | |
reason: NoConflicts | |
status: "True" | |
type: NamesAccepted | |
- lastTransitionTime: null | |
message: the initial names have been accepted | |
reason: InitialNamesAccepted | |
status: "True" | |
type: Established | |
storedVersions: | |
- v1alpha2 | |
- apiVersion: apiextensions.k8s.io/v1beta1 | |
kind: CustomResourceDefinition | |
metadata: | |
annotations: | |
kubectl.kubernetes.io/last-applied-configuration: | | |
{"apiVersion":"apiextensions.k8s.io/v1beta1","kind":"CustomResourceDefinition","metadata":{"annotations":{},"labels":{"app":"istio-pilot","heritage":"Tiller","istio":"rbac","release":"istio"},"name":"authorizationpolicies.rbac.istio.io"},"spec":{"group":"rbac.istio.io","names":{"categories":["istio-io","rbac-istio-io"],"kind":"AuthorizationPolicy","plural":"authorizationpolicies","singular":"authorizationpolicy"},"scope":"Namespaced","versions":[{"name":"v1alpha1","served":true,"storage":true}]}} | |
creationTimestamp: "2019-12-03T10:45:18Z" | |
generation: 1 | |
labels: | |
app: istio-pilot | |
heritage: Tiller | |
istio: rbac | |
release: istio | |
name: authorizationpolicies.rbac.istio.io | |
resourceVersion: "41414" | |
selfLink: /apis/apiextensions.k8s.io/v1beta1/customresourcedefinitions/authorizationpolicies.rbac.istio.io | |
uid: ff15f3f7-15b9-11ea-b5af-027e0b84da98 | |
spec: | |
conversion: | |
strategy: None | |
group: rbac.istio.io | |
names: | |
categories: | |
- istio-io | |
- rbac-istio-io | |
kind: AuthorizationPolicy | |
listKind: AuthorizationPolicyList | |
plural: authorizationpolicies | |
singular: authorizationpolicy | |
scope: Namespaced | |
version: v1alpha1 | |
versions: | |
- name: v1alpha1 | |
served: true | |
storage: true | |
status: | |
acceptedNames: | |
categories: | |
- istio-io | |
- rbac-istio-io | |
kind: AuthorizationPolicy | |
listKind: AuthorizationPolicyList | |
plural: authorizationpolicies | |
singular: authorizationpolicy | |
conditions: | |
- lastTransitionTime: "2019-12-03T10:45:18Z" | |
message: no conflicts found | |
reason: NoConflicts | |
status: "True" | |
type: NamesAccepted | |
- lastTransitionTime: null | |
message: the initial names have been accepted | |
reason: InitialNamesAccepted | |
status: "True" | |
type: Established | |
storedVersions: | |
- v1alpha1 | |
- apiVersion: apiextensions.k8s.io/v1beta1 | |
kind: CustomResourceDefinition | |
metadata: | |
annotations: | |
kubectl.kubernetes.io/last-applied-configuration: | | |
{"apiVersion":"apiextensions.k8s.io/v1beta1","kind":"CustomResourceDefinition","metadata":{"annotations":{},"creationTimestamp":null,"labels":{"app":"istio-pilot","heritage":"Tiller","istio":"security","release":"istio"},"name":"authorizationpolicies.security.istio.io"},"spec":{"group":"security.istio.io","names":{"categories":["istio-io","security-istio-io"],"kind":"AuthorizationPolicy","plural":"authorizationpolicies","singular":"authorizationpolicy"},"scope":"Namespaced","subresources":{"status":{}},"validation":{"openAPIV3Schema":{"properties":{"spec":{"description":"Configuration for access control on workloads. See more details at: https://istio.io/docs/reference/config/security/v1beta1/authorization-policy.html","properties":{"rules":{"description":"Optional.","items":{"properties":{"from":{"description":"Optional.","items":{"properties":{"source":{"description":"Source specifies the source of a request.","properties":{"ipBlocks":{"description":"Optional.","items":{"format":"string","type":"string"},"type":"array"},"namespaces":{"description":"Optional.","items":{"format":"string","type":"string"},"type":"array"},"principals":{"description":"Optional.","items":{"format":"string","type":"string"},"type":"array"},"requestPrincipals":{"description":"Optional.","items":{"format":"string","type":"string"},"type":"array"}},"type":"object"}},"type":"object"},"type":"array"},"to":{"description":"Optional.","items":{"properties":{"operation":{"description":"Operation specifies the operation of a request.","properties":{"hosts":{"description":"Optional.","items":{"format":"string","type":"string"},"type":"array"},"methods":{"description":"Optional.","items":{"format":"string","type":"string"},"type":"array"},"paths":{"description":"Optional.","items":{"format":"string","type":"string"},"type":"array"},"ports":{"description":"Optional.","items":{"format":"string","type":"string"},"type":"array"}},"type":"object"}},"type":"object"},"type":"array"},"when":{"description":"Optional.","items":{"properties":{"key":{"description":"The name of an Istio attribute.","format":"string","type":"string"},"values":{"description":"The allowed values for the attribute.","items":{"format":"string","type":"string"},"type":"array"}},"type":"object"},"type":"array"}},"type":"object"},"type":"array"},"selector":{"description":"Optional.","properties":{"matchLabels":{"additionalProperties":{"format":"string","type":"string"},"type":"object"}},"type":"object"}},"type":"object"}},"type":"object"}},"versions":[{"name":"v1beta1","served":true,"storage":true}]},"status":{"acceptedNames":{"kind":"","plural":""},"conditions":[],"storedVersions":[]}} | |
creationTimestamp: "2019-12-03T04:51:50Z" | |
generation: 1 | |
labels: | |
app: istio-pilot | |
heritage: Tiller | |
istio: security | |
release: istio | |
name: authorizationpolicies.security.istio.io | |
resourceVersion: "1425" | |
selfLink: /apis/apiextensions.k8s.io/v1beta1/customresourcedefinitions/authorizationpolicies.security.istio.io | |
uid: 9e21b843-1588-11ea-b5af-027e0b84da98 | |
spec: | |
conversion: | |
strategy: None | |
group: security.istio.io | |
names: | |
categories: | |
- istio-io | |
- security-istio-io | |
kind: AuthorizationPolicy | |
listKind: AuthorizationPolicyList | |
plural: authorizationpolicies | |
singular: authorizationpolicy | |
scope: Namespaced | |
subresources: | |
status: {} | |
validation: | |
openAPIV3Schema: | |
properties: | |
spec: | |
description: 'Configuration for access control on workloads. See more | |
details at: https://istio.io/docs/reference/config/security/v1beta1/authorization-policy.html' | |
properties: | |
rules: | |
description: Optional. | |
items: | |
properties: | |
from: | |
description: Optional. | |
items: | |
properties: | |
source: | |
description: Source specifies the source of a request. | |
properties: | |
ipBlocks: | |
description: Optional. | |
items: | |
format: string | |
type: string | |
type: array | |
namespaces: | |
description: Optional. | |
items: | |
format: string | |
type: string | |
type: array | |
principals: | |
description: Optional. | |
items: | |
format: string | |
type: string | |
type: array | |
requestPrincipals: | |
description: Optional. | |
items: | |
format: string | |
type: string | |
type: array | |
type: object | |
type: object | |
type: array | |
to: | |
description: Optional. | |
items: | |
properties: | |
operation: | |
description: Operation specifies the operation of a request. | |
properties: | |
hosts: | |
description: Optional. | |
items: | |
format: string | |
type: string | |
type: array | |
methods: | |
description: Optional. | |
items: | |
format: string | |
type: string | |
type: array | |
paths: | |
description: Optional. | |
items: | |
format: string | |
type: string | |
type: array | |
ports: | |
description: Optional. | |
items: | |
format: string | |
type: string | |
type: array | |
type: object | |
type: object | |
type: array | |
when: | |
description: Optional. | |
items: | |
properties: | |
key: | |
description: The name of an Istio attribute. | |
format: string | |
type: string | |
values: | |
description: The allowed values for the attribute. | |
items: | |
format: string | |
type: string | |
type: array | |
type: object | |
type: array | |
type: object | |
type: array | |
selector: | |
description: Optional. | |
properties: | |
matchLabels: | |
additionalProperties: | |
format: string | |
type: string | |
type: object | |
type: object | |
type: object | |
type: object | |
version: v1beta1 | |
versions: | |
- name: v1beta1 | |
served: true | |
storage: true | |
status: | |
acceptedNames: | |
categories: | |
- istio-io | |
- security-istio-io | |
kind: AuthorizationPolicy | |
listKind: AuthorizationPolicyList | |
plural: authorizationpolicies | |
singular: authorizationpolicy | |
conditions: | |
- lastTransitionTime: "2019-12-03T04:51:50Z" | |
message: no conflicts found | |
reason: NoConflicts | |
status: "True" | |
type: NamesAccepted | |
- lastTransitionTime: null | |
message: the initial names have been accepted | |
reason: InitialNamesAccepted | |
status: "True" | |
type: Established | |
storedVersions: | |
- v1beta1 | |
- apiVersion: apiextensions.k8s.io/v1beta1 | |
kind: CustomResourceDefinition | |
metadata: | |
annotations: | |
kubectl.kubernetes.io/last-applied-configuration: | | |
{"apiVersion":"apiextensions.k8s.io/v1beta1","kind":"CustomResourceDefinition","metadata":{"annotations":{},"labels":{"knative.dev/crd-install":"true","serving.knative.dev/release":"devel"},"name":"certificates.networking.internal.knative.dev"},"spec":{"additionalPrinterColumns":[{"JSONPath":".status.conditions[?(@.type==\"Ready\")].status","name":"Ready","type":"string"},{"JSONPath":".status.conditions[?(@.type==\"Ready\")].reason","name":"Reason","type":"string"}],"group":"networking.internal.knative.dev","names":{"categories":["knative-internal","networking"],"kind":"Certificate","plural":"certificates","shortNames":["kcert"],"singular":"certificate"},"scope":"Namespaced","subresources":{"status":{}},"version":"v1alpha1"}} | |
creationTimestamp: "2019-12-03T10:54:07Z" | |
generation: 1 | |
labels: | |
knative.dev/crd-install: "true" | |
serving.knative.dev/release: devel | |
name: certificates.networking.internal.knative.dev | |
resourceVersion: "43818" | |
selfLink: /apis/apiextensions.k8s.io/v1beta1/customresourcedefinitions/certificates.networking.internal.knative.dev | |
uid: 3a88e36b-15bb-11ea-b5af-027e0b84da98 | |
spec: | |
additionalPrinterColumns: | |
- JSONPath: .status.conditions[?(@.type=="Ready")].status | |
name: Ready | |
type: string | |
- JSONPath: .status.conditions[?(@.type=="Ready")].reason | |
name: Reason | |
type: string | |
conversion: | |
strategy: None | |
group: networking.internal.knative.dev | |
names: | |
categories: | |
- knative-internal | |
- networking | |
kind: Certificate | |
listKind: CertificateList | |
plural: certificates | |
shortNames: | |
- kcert | |
singular: certificate | |
scope: Namespaced | |
subresources: | |
status: {} | |
version: v1alpha1 | |
versions: | |
- name: v1alpha1 | |
served: true | |
storage: true | |
status: | |
acceptedNames: | |
categories: | |
- knative-internal | |
- networking | |
kind: Certificate | |
listKind: CertificateList | |
plural: certificates | |
shortNames: | |
- kcert | |
singular: certificate | |
conditions: | |
- lastTransitionTime: "2019-12-03T10:54:07Z" | |
message: no conflicts found | |
reason: NoConflicts | |
status: "True" | |
type: NamesAccepted | |
- lastTransitionTime: null | |
message: the initial names have been accepted | |
reason: InitialNamesAccepted | |
status: "True" | |
type: Established | |
storedVersions: | |
- v1alpha1 | |
- apiVersion: apiextensions.k8s.io/v1beta1 | |
kind: CustomResourceDefinition | |
metadata: | |
annotations: | |
helm.sh/resource-policy: keep | |
kubectl.kubernetes.io/last-applied-configuration: | | |
{"apiVersion":"apiextensions.k8s.io/v1beta1","kind":"CustomResourceDefinition","metadata":{"annotations":{"helm.sh/resource-policy":"keep"},"creationTimestamp":null,"labels":{"app":"istio-pilot","heritage":"Tiller","istio":"rbac","release":"istio"},"name":"clusterrbacconfigs.rbac.istio.io"},"spec":{"group":"rbac.istio.io","names":{"categories":["istio-io","rbac-istio-io"],"kind":"ClusterRbacConfig","plural":"clusterrbacconfigs","singular":"clusterrbacconfig"},"scope":"Cluster","subresources":{"status":{}},"validation":{"openAPIV3Schema":{"properties":{"spec":{"description":"Configuration for Role Based Access Control. See more details at: https://istio.io/docs/reference/config/authorization/istio.rbac.v1alpha1.html","properties":{"enforcementMode":{"enum":["ENFORCED","PERMISSIVE"],"type":"string"},"exclusion":{"description":"A list of services or namespaces that should not be enforced by Istio RBAC policies.","properties":{"namespaces":{"description":"A list of namespaces.","items":{"format":"string","type":"string"},"type":"array"},"services":{"description":"A list of services.","items":{"format":"string","type":"string"},"type":"array"}},"type":"object"},"inclusion":{"description":"A list of services or namespaces that should be enforced by Istio RBAC policies.","properties":{"namespaces":{"description":"A list of namespaces.","items":{"format":"string","type":"string"},"type":"array"},"services":{"description":"A list of services.","items":{"format":"string","type":"string"},"type":"array"}},"type":"object"},"mode":{"description":"Istio RBAC mode.","enum":["OFF","ON","ON_WITH_INCLUSION","ON_WITH_EXCLUSION"],"type":"string"}},"type":"object"}},"type":"object"}},"versions":[{"name":"v1alpha1","served":true,"storage":true}]},"status":{"acceptedNames":{"kind":"","plural":""},"conditions":[],"storedVersions":[]}} | |
creationTimestamp: "2019-12-03T04:51:48Z" | |
generation: 3 | |
labels: | |
app: istio-pilot | |
heritage: Tiller | |
istio: rbac | |
release: istio | |
name: clusterrbacconfigs.rbac.istio.io | |
resourceVersion: "43297" | |
selfLink: /apis/apiextensions.k8s.io/v1beta1/customresourcedefinitions/clusterrbacconfigs.rbac.istio.io | |
uid: 9d20a15b-1588-11ea-b5af-027e0b84da98 | |
spec: | |
conversion: | |
strategy: None | |
group: rbac.istio.io | |
names: | |
categories: | |
- istio-io | |
- rbac-istio-io | |
kind: ClusterRbacConfig | |
listKind: ClusterRbacConfigList | |
plural: clusterrbacconfigs | |
singular: clusterrbacconfig | |
scope: Cluster | |
subresources: | |
status: {} | |
validation: | |
openAPIV3Schema: | |
properties: | |
spec: | |
description: 'Configuration for Role Based Access Control. See more details | |
at: https://istio.io/docs/reference/config/authorization/istio.rbac.v1alpha1.html' | |
properties: | |
enforcementMode: | |
enum: | |
- ENFORCED | |
- PERMISSIVE | |
type: string | |
exclusion: | |
description: A list of services or namespaces that should not be enforced | |
by Istio RBAC policies. | |
properties: | |
namespaces: | |
description: A list of namespaces. | |
items: | |
format: string | |
type: string | |
type: array | |
services: | |
description: A list of services. | |
items: | |
format: string | |
type: string | |
type: array | |
type: object | |
inclusion: | |
description: A list of services or namespaces that should be enforced | |
by Istio RBAC policies. | |
properties: | |
namespaces: | |
description: A list of namespaces. | |
items: | |
format: string | |
type: string | |
type: array | |
services: | |
description: A list of services. | |
items: | |
format: string | |
type: string | |
type: array | |
type: object | |
mode: | |
description: Istio RBAC mode. | |
enum: | |
- "OFF" | |
- "ON" | |
- ON_WITH_INCLUSION | |
- ON_WITH_EXCLUSION | |
type: string | |
type: object | |
type: object | |
version: v1alpha1 | |
versions: | |
- name: v1alpha1 | |
served: true | |
storage: true | |
status: | |
acceptedNames: | |
categories: | |
- istio-io | |
- rbac-istio-io | |
kind: ClusterRbacConfig | |
listKind: ClusterRbacConfigList | |
plural: clusterrbacconfigs | |
singular: clusterrbacconfig | |
conditions: | |
- lastTransitionTime: "2019-12-03T04:51:48Z" | |
message: no conflicts found | |
reason: NoConflicts | |
status: "True" | |
type: NamesAccepted | |
- lastTransitionTime: null | |
message: the initial names have been accepted | |
reason: InitialNamesAccepted | |
status: "True" | |
type: Established | |
storedVersions: | |
- v1alpha1 | |
- apiVersion: apiextensions.k8s.io/v1beta1 | |
kind: CustomResourceDefinition | |
metadata: | |
annotations: | |
kubectl.kubernetes.io/last-applied-configuration: | | |
{"apiVersion":"apiextensions.k8s.io/v1beta1","kind":"CustomResourceDefinition","metadata":{"annotations":{},"labels":{"duck.knative.dev/podspecable":"true","knative.dev/crd-install":"true","serving.knative.dev/release":"devel"},"name":"configurations.serving.knative.dev"},"spec":{"additionalPrinterColumns":[{"JSONPath":".status.latestCreatedRevisionName","name":"LatestCreated","type":"string"},{"JSONPath":".status.latestReadyRevisionName","name":"LatestReady","type":"string"},{"JSONPath":".status.conditions[?(@.type=='Ready')].status","name":"Ready","type":"string"},{"JSONPath":".status.conditions[?(@.type=='Ready')].reason","name":"Reason","type":"string"}],"group":"serving.knative.dev","names":{"categories":["all","knative","serving"],"kind":"Configuration","plural":"configurations","shortNames":["config","cfg"],"singular":"configuration"},"scope":"Namespaced","subresources":{"status":{}},"versions":[{"name":"v1alpha1","served":true,"storage":true},{"name":"v1beta1","served":true,"storage":false},{"name":"v1","served":true,"storage":false}]}} | |
creationTimestamp: "2019-12-03T10:54:07Z" | |
generation: 1 | |
labels: | |
duck.knative.dev/podspecable: "true" | |
knative.dev/crd-install: "true" | |
serving.knative.dev/release: devel | |
name: configurations.serving.knative.dev | |
resourceVersion: "43825" | |
selfLink: /apis/apiextensions.k8s.io/v1beta1/customresourcedefinitions/configurations.serving.knative.dev | |
uid: 3aa2051b-15bb-11ea-b5af-027e0b84da98 | |
spec: | |
additionalPrinterColumns: | |
- JSONPath: .status.latestCreatedRevisionName | |
name: LatestCreated | |
type: string | |
- JSONPath: .status.latestReadyRevisionName | |
name: LatestReady | |
type: string | |
- JSONPath: .status.conditions[?(@.type=='Ready')].status | |
name: Ready | |
type: string | |
- JSONPath: .status.conditions[?(@.type=='Ready')].reason | |
name: Reason | |
type: string | |
conversion: | |
strategy: None | |
group: serving.knative.dev | |
names: | |
categories: | |
- all | |
- knative | |
- serving | |
kind: Configuration | |
listKind: ConfigurationList | |
plural: configurations | |
shortNames: | |
- config | |
- cfg | |
singular: configuration | |
scope: Namespaced | |
subresources: | |
status: {} | |
version: v1alpha1 | |
versions: | |
- name: v1alpha1 | |
served: true | |
storage: true | |
- name: v1beta1 | |
served: true | |
storage: false | |
- name: v1 | |
served: true | |
storage: false | |
status: | |
acceptedNames: | |
categories: | |
- all | |
- knative | |
- serving | |
kind: Configuration | |
listKind: ConfigurationList | |
plural: configurations | |
shortNames: | |
- config | |
- cfg | |
singular: configuration | |
conditions: | |
- lastTransitionTime: "2019-12-03T10:54:07Z" | |
message: no conflicts found | |
reason: NoConflicts | |
status: "True" | |
type: NamesAccepted | |
- lastTransitionTime: null | |
message: the initial names have been accepted | |
reason: InitialNamesAccepted | |
status: "True" | |
type: Established | |
storedVersions: | |
- v1alpha1 | |
- apiVersion: apiextensions.k8s.io/v1beta1 | |
kind: CustomResourceDefinition | |
metadata: | |
annotations: | |
helm.sh/resource-policy: keep | |
kubectl.kubernetes.io/last-applied-configuration: | | |
{"apiVersion":"apiextensions.k8s.io/v1beta1","kind":"CustomResourceDefinition","metadata":{"annotations":{"helm.sh/resource-policy":"keep"},"creationTimestamp":null,"labels":{"app":"istio-pilot","chart":"istio","heritage":"Tiller","release":"istio"},"name":"destinationrules.networking.istio.io"},"spec":{"additionalPrinterColumns":[{"JSONPath":".spec.host","description":"The name of a service from the service registry","name":"Host","type":"string"},{"JSONPath":".metadata.creationTimestamp","description":"CreationTimestamp is a timestamp representing the server time when this object was created. It is not guaranteed to be set in happens-before order across separate operations. Clients may not set this value. It is represented in RFC3339 form and is in UTC.\nPopulated by the system. Read-only. Null for lists. More info: https://git.k8s.io/community/contributors/devel/api-conventions.md#metadata","name":"Age","type":"date"}],"group":"networking.istio.io","names":{"categories":["istio-io","networking-istio-io"],"kind":"DestinationRule","listKind":"DestinationRuleList","plural":"destinationrules","shortNames":["dr"],"singular":"destinationrule"},"scope":"Namespaced","subresources":{"status":{}},"validation":{"openAPIV3Schema":{"properties":{"spec":{"description":"Configuration affecting load balancing, outlier detection, etc. See more details at: https://istio.io/docs/reference/config/networking/v1alpha3/destination-rule.html","properties":{"exportTo":{"description":"A list of namespaces to which this destination rule is exported.","items":{"format":"string","type":"string"},"type":"array"},"host":{"description":"The name of a service from the service registry.","format":"string","type":"string"},"subsets":{"items":{"properties":{"labels":{"additionalProperties":{"format":"string","type":"string"},"type":"object"},"name":{"description":"Name of the subset.","format":"string","type":"string"},"trafficPolicy":{"description":"Traffic policies that apply to this subset.","properties":{"connectionPool":{"properties":{"http":{"description":"HTTP connection pool settings.","properties":{"h2UpgradePolicy":{"description":"Specify if http1.1 connection should be upgraded to http2 for the associated destination.","enum":["DEFAULT","DO_NOT_UPGRADE","UPGRADE"],"type":"string"},"http1MaxPendingRequests":{"description":"Maximum number of pending HTTP requests to a destination.","format":"int32","type":"integer"},"http2MaxRequests":{"description":"Maximum number of requests to a backend.","format":"int32","type":"integer"},"idleTimeout":{"description":"The idle timeout for upstream connection pool connections.","type":"string"},"maxRequestsPerConnection":{"description":"Maximum number of requests per connection to a backend.","format":"int32","type":"integer"},"maxRetries":{"format":"int32","type":"integer"}},"type":"object"},"tcp":{"description":"Settings common to both HTTP and TCP upstream connections.","properties":{"connectTimeout":{"description":"TCP connection timeout.","type":"string"},"maxConnections":{"description":"Maximum number of HTTP1 /TCP connections to a destination host.","format":"int32","type":"integer"},"tcpKeepalive":{"description":"If set then set SO_KEEPALIVE on the socket to enable TCP Keepalives.","properties":{"interval":{"description":"The time duration between keep-alive probes.","type":"string"},"probes":{"type":"integer"},"time":{"type":"string"}},"type":"object"}},"type":"object"}},"type":"object"},"loadBalancer":{"description":"Settings controlling the load balancer algorithms.","oneOf":[{"required":["simple"]},{"properties":{"consistentHash":{"oneOf":[{"required":["httpHeaderName"]},{"required":["httpCookie"]},{"required":["useSourceIp"]}]}},"required":["consistentHash"]}],"properties":{"consistentHash":{"properties":{"httpCookie":{"description":"Hash based on HTTP cookie.","properties":{"name":{"description":"Name of the cookie.","format":"string","type":"string"},"path":{"description":"Path to set for the cookie.","format":"string","type":"string"},"ttl":{"description":"Lifetime of the cookie.","type":"string"}},"type":"object"},"httpHeaderName":{"description":"Hash based on a specific HTTP header.","format":"string","type":"string"},"minimumRingSize":{"type":"integer"},"useSourceIp":{"description":"Hash based on the source IP address.","type":"boolean"}},"type":"object"},"simple":{"enum":["ROUND_ROBIN","LEAST_CONN","RANDOM","PASSTHROUGH"],"type":"string"}},"type":"object"},"outlierDetection":{"properties":{"baseEjectionTime":{"description":"Minimum ejection duration.","type":"string"},"consecutiveErrors":{"format":"int32","type":"integer"},"interval":{"description":"Time interval between ejection sweep analysis.","type":"string"},"maxEjectionPercent":{"format":"int32","type":"integer"},"minHealthPercent":{"format":"int32","type":"integer"}},"type":"object"},"portLevelSettings":{"description":"Traffic policies specific to individual ports.","items":{"properties":{"connectionPool":{"properties":{"http":{"description":"HTTP connection pool settings.","properties":{"h2UpgradePolicy":{"description":"Specify if http1.1 connection should be upgraded to http2 for the associated destination.","enum":["DEFAULT","DO_NOT_UPGRADE","UPGRADE"],"type":"string"},"http1MaxPendingRequests":{"description":"Maximum number of pending HTTP requests to a destination.","format":"int32","type":"integer"},"http2MaxRequests":{"description":"Maximum number of requests to a backend.","format":"int32","type":"integer"},"idleTimeout":{"description":"The idle timeout for upstream connection pool connections.","type":"string"},"maxRequestsPerConnection":{"description":"Maximum number of requests per connection to a backend.","format":"int32","type":"integer"},"maxRetries":{"format":"int32","type":"integer"}},"type":"object"},"tcp":{"description":"Settings common to both HTTP and TCP upstream connections.","properties":{"connectTimeout":{"description":"TCP connection timeout.","type":"string"},"maxConnections":{"description":"Maximum number of HTTP1 /TCP connections to a destination host.","format":"int32","type":"integer"},"tcpKeepalive":{"description":"If set then set SO_KEEPALIVE on the socket to enable TCP Keepalives.","properties":{"interval":{"description":"The time duration between keep-alive probes.","type":"string"},"probes":{"type":"integer"},"time":{"type":"string"}},"type":"object"}},"type":"object"}},"type":"object"},"loadBalancer":{"description":"Settings controlling the load balancer algorithms.","oneOf":[{"required":["simple"]},{"properties":{"consistentHash":{"oneOf":[{"required":["httpHeaderName"]},{"required":["httpCookie"]},{"required":["useSourceIp"]}]}},"required":["consistentHash"]}],"properties":{"consistentHash":{"properties":{"httpCookie":{"description":"Hash based on HTTP cookie.","properties":{"name":{"description":"Name of the cookie.","format":"string","type":"string"},"path":{"description":"Path to set for the cookie.","format":"string","type":"string"},"ttl":{"description":"Lifetime of the cookie.","type":"string"}},"type":"object"},"httpHeaderName":{"description":"Hash based on a specific HTTP header.","format":"string","type":"string"},"minimumRingSize":{"type":"integer"},"useSourceIp":{"description":"Hash based on the source IP address.","type":"boolean"}},"type":"object"},"simple":{"enum":["ROUND_ROBIN","LEAST_CONN","RANDOM","PASSTHROUGH"],"type":"string"}},"type":"object"},"outlierDetection":{"properties":{"baseEjectionTime":{"description":"Minimum ejection duration.","type":"string"},"consecutiveErrors":{"format":"int32","type":"integer"},"interval":{"description":"Time interval between ejection sweep analysis.","type":"string"},"maxEjectionPercent":{"format":"int32","type":"integer"},"minHealthPercent":{"format":"int32","type":"integer"}},"type":"object"},"port":{"properties":{"number":{"type":"integer"}},"type":"object"},"tls":{"description":"TLS related settings for connections to the upstream service.","properties":{"caCertificates":{"format":"string","type":"string"},"clientCertificate":{"description":"REQUIRED if mode is `MUTUAL`.","format":"string","type":"string"},"mode":{"enum":["DISABLE","SIMPLE","MUTUAL","ISTIO_MUTUAL"],"type":"string"},"privateKey":{"description":"REQUIRED if mode is `MUTUAL`.","format":"string","type":"string"},"sni":{"description":"SNI string to present to the server during TLS handshake.","format":"string","type":"string"},"subjectAltNames":{"items":{"format":"string","type":"string"},"type":"array"}},"type":"object"}},"type":"object"},"type":"array"},"tls":{"description":"TLS related settings for connections to the upstream service.","properties":{"caCertificates":{"format":"string","type":"string"},"clientCertificate":{"description":"REQUIRED if mode is `MUTUAL`.","format":"string","type":"string"},"mode":{"enum":["DISABLE","SIMPLE","MUTUAL","ISTIO_MUTUAL"],"type":"string"},"privateKey":{"description":"REQUIRED if mode is `MUTUAL`.","format":"string","type":"string"},"sni":{"description":"SNI string to present to the server during TLS handshake.","format":"string","type":"string"},"subjectAltNames":{"items":{"format":"string","type":"string"},"type":"array"}},"type":"object"}},"type":"object"}},"type":"object"},"type":"array"},"trafficPolicy":{"properties":{"connectionPool":{"properties":{"http":{"description":"HTTP connection pool settings.","properties":{"h2UpgradePolicy":{"description":"Specify if http1.1 connection should be upgraded to http2 for the associated destination.","enum":["DEFAULT","DO_NOT_UPGRADE","UPGRADE"],"type":"string"},"http1MaxPendingRequests":{"description":"Maximum number of pending HTTP requests to a destination.","format":"int32","type":"integer"},"http2MaxRequests":{"description":"Maximum number of requests to a backend.","format":"int32","type":"integer"},"idleTimeout":{"description":"The idle timeout for upstream connection pool connections.","type":"string"},"maxRequestsPerConnection":{"description":"Maximum number of requests per connection to a backend.","format":"int32","type":"integer"},"maxRetries":{"format":"int32","type":"integer"}},"type":"object"},"tcp":{"description":"Settings common to both HTTP and TCP upstream connections.","properties":{"connectTimeout":{"description":"TCP connection timeout.","type":"string"},"maxConnections":{"description":"Maximum number of HTTP1 /TCP connections to a destination host.","format":"int32","type":"integer"},"tcpKeepalive":{"description":"If set then set SO_KEEPALIVE on the socket to enable TCP Keepalives.","properties":{"interval":{"description":"The time duration between keep-alive probes.","type":"string"},"probes":{"type":"integer"},"time":{"type":"string"}},"type":"object"}},"type":"object"}},"type":"object"},"loadBalancer":{"description":"Settings controlling the load balancer algorithms.","oneOf":[{"required":["simple"]},{"properties":{"consistentHash":{"oneOf":[{"required":["httpHeaderName"]},{"required":["httpCookie"]},{"required":["useSourceIp"]}]}},"required":["consistentHash"]}],"properties":{"consistentHash":{"properties":{"httpCookie":{"description":"Hash based on HTTP cookie.","properties":{"name":{"description":"Name of the cookie.","format":"string","type":"string"},"path":{"description":"Path to set for the cookie.","format":"string","type":"string"},"ttl":{"description":"Lifetime of the cookie.","type":"string"}},"type":"object"},"httpHeaderName":{"description":"Hash based on a specific HTTP header.","format":"string","type":"string"},"minimumRingSize":{"type":"integer"},"useSourceIp":{"description":"Hash based on the source IP address.","type":"boolean"}},"type":"object"},"simple":{"enum":["ROUND_ROBIN","LEAST_CONN","RANDOM","PASSTHROUGH"],"type":"string"}},"type":"object"},"outlierDetection":{"properties":{"baseEjectionTime":{"description":"Minimum ejection duration.","type":"string"},"consecutiveErrors":{"format":"int32","type":"integer"},"interval":{"description":"Time interval between ejection sweep analysis.","type":"string"},"maxEjectionPercent":{"format":"int32","type":"integer"},"minHealthPercent":{"format":"int32","type":"integer"}},"type":"object"},"portLevelSettings":{"description":"Traffic policies specific to individual ports.","items":{"properties":{"connectionPool":{"properties":{"http":{"description":"HTTP connection pool settings.","properties":{"h2UpgradePolicy":{"description":"Specify if http1.1 connection should be upgraded to http2 for the associated destination.","enum":["DEFAULT","DO_NOT_UPGRADE","UPGRADE"],"type":"string"},"http1MaxPendingRequests":{"description":"Maximum number of pending HTTP requests to a destination.","format":"int32","type":"integer"},"http2MaxRequests":{"description":"Maximum number of requests to a backend.","format":"int32","type":"integer"},"idleTimeout":{"description":"The idle timeout for upstream connection pool connections.","type":"string"},"maxRequestsPerConnection":{"description":"Maximum number of requests per connection to a backend.","format":"int32","type":"integer"},"maxRetries":{"format":"int32","type":"integer"}},"type":"object"},"tcp":{"description":"Settings common to both HTTP and TCP upstream connections.","properties":{"connectTimeout":{"description":"TCP connection timeout.","type":"string"},"maxConnections":{"description":"Maximum number of HTTP1 /TCP connections to a destination host.","format":"int32","type":"integer"},"tcpKeepalive":{"description":"If set then set SO_KEEPALIVE on the socket to enable TCP Keepalives.","properties":{"interval":{"description":"The time duration between keep-alive probes.","type":"string"},"probes":{"type":"integer"},"time":{"type":"string"}},"type":"object"}},"type":"object"}},"type":"object"},"loadBalancer":{"description":"Settings controlling the load balancer algorithms.","oneOf":[{"required":["simple"]},{"properties":{"consistentHash":{"oneOf":[{"required":["httpHeaderName"]},{"required":["httpCookie"]},{"required":["useSourceIp"]}]}},"required":["consistentHash"]}],"properties":{"consistentHash":{"properties":{"httpCookie":{"description":"Hash based on HTTP cookie.","properties":{"name":{"description":"Name of the cookie.","format":"string","type":"string"},"path":{"description":"Path to set for the cookie.","format":"string","type":"string"},"ttl":{"description":"Lifetime of the cookie.","type":"string"}},"type":"object"},"httpHeaderName":{"description":"Hash based on a specific HTTP header.","format":"string","type":"string"},"minimumRingSize":{"type":"integer"},"useSourceIp":{"description":"Hash based on the source IP address.","type":"boolean"}},"type":"object"},"simple":{"enum":["ROUND_ROBIN","LEAST_CONN","RANDOM","PASSTHROUGH"],"type":"string"}},"type":"object"},"outlierDetection":{"properties":{"baseEjectionTime":{"description":"Minimum ejection duration.","type":"string"},"consecutiveErrors":{"format":"int32","type":"integer"},"interval":{"description":"Time interval between ejection sweep analysis.","type":"string"},"maxEjectionPercent":{"format":"int32","type":"integer"},"minHealthPercent":{"format":"int32","type":"integer"}},"type":"object"},"port":{"properties":{"number":{"type":"integer"}},"type":"object"},"tls":{"description":"TLS related settings for connections to the upstream service.","properties":{"caCertificates":{"format":"string","type":"string"},"clientCertificate":{"description":"REQUIRED if mode is `MUTUAL`.","format":"string","type":"string"},"mode":{"enum":["DISABLE","SIMPLE","MUTUAL","ISTIO_MUTUAL"],"type":"string"},"privateKey":{"description":"REQUIRED if mode is `MUTUAL`.","format":"string","type":"string"},"sni":{"description":"SNI string to present to the server during TLS handshake.","format":"string","type":"string"},"subjectAltNames":{"items":{"format":"string","type":"string"},"type":"array"}},"type":"object"}},"type":"object"},"type":"array"},"tls":{"description":"TLS related settings for connections to the upstream service.","properties":{"caCertificates":{"format":"string","type":"string"},"clientCertificate":{"description":"REQUIRED if mode is `MUTUAL`.","format":"string","type":"string"},"mode":{"enum":["DISABLE","SIMPLE","MUTUAL","ISTIO_MUTUAL"],"type":"string"},"privateKey":{"description":"REQUIRED if mode is `MUTUAL`.","format":"string","type":"string"},"sni":{"description":"SNI string to present to the server during TLS handshake.","format":"string","type":"string"},"subjectAltNames":{"items":{"format":"string","type":"string"},"type":"array"}},"type":"object"}},"type":"object"}},"type":"object"}},"type":"object"}},"versions":[{"name":"v1alpha3","served":true,"storage":true}]},"status":{"acceptedNames":{"kind":"","plural":""},"conditions":[],"storedVersions":[]}} | |
creationTimestamp: "2019-12-03T04:51:48Z" | |
generation: 3 | |
labels: | |
app: istio-pilot | |
chart: istio | |
heritage: Tiller | |
release: istio | |
name: destinationrules.networking.istio.io | |
resourceVersion: "43300" | |
selfLink: /apis/apiextensions.k8s.io/v1beta1/customresourcedefinitions/destinationrules.networking.istio.io | |
uid: 9d3e5eb1-1588-11ea-b5af-027e0b84da98 | |
spec: | |
additionalPrinterColumns: | |
- JSONPath: .spec.host | |
description: The name of a service from the service registry | |
name: Host | |
type: string | |
- JSONPath: .metadata.creationTimestamp | |
description: |- | |
CreationTimestamp is a timestamp representing the server time when this object was created. It is not guaranteed to be set in happens-before order across separate operations. Clients may not set this value. It is represented in RFC3339 form and is in UTC. | |
Populated by the system. Read-only. Null for lists. More info: https://git.k8s.io/community/contributors/devel/api-conventions.md#metadata | |
name: Age | |
type: date | |
conversion: | |
strategy: None | |
group: networking.istio.io | |
names: | |
categories: | |
- istio-io | |
- networking-istio-io | |
kind: DestinationRule | |
listKind: DestinationRuleList | |
plural: destinationrules | |
shortNames: | |
- dr | |
singular: destinationrule | |
scope: Namespaced | |
subresources: | |
status: {} | |
validation: | |
openAPIV3Schema: | |
properties: | |
spec: | |
description: 'Configuration affecting load balancing, outlier detection, | |
etc. See more details at: https://istio.io/docs/reference/config/networking/v1alpha3/destination-rule.html' | |
properties: | |
exportTo: | |
description: A list of namespaces to which this destination rule is | |
exported. | |
items: | |
format: string | |
type: string | |
type: array | |
host: | |
description: The name of a service from the service registry. | |
format: string | |
type: string | |
subsets: | |
items: | |
properties: | |
labels: | |
additionalProperties: | |
format: string | |
type: string | |
type: object | |
name: | |
description: Name of the subset. | |
format: string | |
type: string | |
trafficPolicy: | |
description: Traffic policies that apply to this subset. | |
properties: | |
connectionPool: | |
properties: | |
http: | |
description: HTTP connection pool settings. | |
properties: | |
h2UpgradePolicy: | |
description: Specify if http1.1 connection should | |
be upgraded to http2 for the associated destination. | |
enum: | |
- DEFAULT | |
- DO_NOT_UPGRADE | |
- UPGRADE | |
type: string | |
http1MaxPendingRequests: | |
description: Maximum number of pending HTTP requests | |
to a destination. | |
format: int32 | |
type: integer | |
http2MaxRequests: | |
description: Maximum number of requests to a backend. | |
format: int32 | |
type: integer | |
idleTimeout: | |
description: The idle timeout for upstream connection | |
pool connections. | |
type: string | |
maxRequestsPerConnection: | |
description: Maximum number of requests per connection | |
to a backend. | |
format: int32 | |
type: integer | |
maxRetries: | |
format: int32 | |
type: integer | |
type: object | |
tcp: | |
description: Settings common to both HTTP and TCP upstream | |
connections. | |
properties: | |
connectTimeout: | |
description: TCP connection timeout. | |
type: string | |
maxConnections: | |
description: Maximum number of HTTP1 /TCP connections | |
to a destination host. | |
format: int32 | |
type: integer | |
tcpKeepalive: | |
description: If set then set SO_KEEPALIVE on the | |
socket to enable TCP Keepalives. | |
properties: | |
interval: | |
description: The time duration between keep-alive | |
probes. | |
type: string | |
probes: | |
type: integer | |
time: | |
type: string | |
type: object | |
type: object | |
type: object | |
loadBalancer: | |
description: Settings controlling the load balancer algorithms. | |
oneOf: | |
- required: | |
- simple | |
- properties: | |
consistentHash: | |
oneOf: | |
- required: | |
- httpHeaderName | |
- required: | |
- httpCookie | |
- required: | |
- useSourceIp | |
required: | |
- consistentHash | |
properties: | |
consistentHash: | |
properties: | |
httpCookie: | |
description: Hash based on HTTP cookie. | |
properties: | |
name: | |
description: Name of the cookie. | |
format: string | |
type: string | |
path: | |
description: Path to set for the cookie. | |
format: string | |
type: string | |
ttl: | |
description: Lifetime of the cookie. | |
type: string | |
type: object | |
httpHeaderName: | |
description: Hash based on a specific HTTP header. | |
format: string | |
type: string | |
minimumRingSize: | |
type: integer | |
useSourceIp: | |
description: Hash based on the source IP address. | |
type: boolean | |
type: object | |
simple: | |
enum: | |
- ROUND_ROBIN | |
- LEAST_CONN | |
- RANDOM | |
- PASSTHROUGH | |
type: string | |
type: object | |
outlierDetection: | |
properties: | |
baseEjectionTime: | |
description: Minimum ejection duration. | |
type: string | |
consecutiveErrors: | |
format: int32 | |
type: integer | |
interval: | |
description: Time interval between ejection sweep analysis. | |
type: string | |
maxEjectionPercent: | |
format: int32 | |
type: integer | |
minHealthPercent: | |
format: int32 | |
type: integer | |
type: object | |
portLevelSettings: | |
description: Traffic policies specific to individual ports. | |
items: | |
properties: | |
connectionPool: | |
properties: | |
http: | |
description: HTTP connection pool settings. | |
properties: | |
h2UpgradePolicy: | |
description: Specify if http1.1 connection | |
should be upgraded to http2 for the associated | |
destination. | |
enum: | |
- DEFAULT | |
- DO_NOT_UPGRADE | |
- UPGRADE | |
type: string | |
http1MaxPendingRequests: | |
description: Maximum number of pending HTTP | |
requests to a destination. | |
format: int32 | |
type: integer | |
http2MaxRequests: | |
description: Maximum number of requests to | |
a backend. | |
format: int32 | |
type: integer | |
idleTimeout: | |
description: The idle timeout for upstream | |
connection pool connections. | |
type: string | |
maxRequestsPerConnection: | |
description: Maximum number of requests per | |
connection to a backend. | |
format: int32 | |
type: integer | |
maxRetries: | |
format: int32 | |
type: integer | |
type: object | |
tcp: | |
description: Settings common to both HTTP and | |
TCP upstream connections. | |
properties: | |
connectTimeout: | |
description: TCP connection timeout. | |
type: string | |
maxConnections: | |
description: Maximum number of HTTP1 /TCP | |
connections to a destination host. | |
format: int32 | |
type: integer | |
tcpKeepalive: | |
description: If set then set SO_KEEPALIVE | |
on the socket to enable TCP Keepalives. | |
properties: | |
interval: | |
description: The time duration between | |
keep-alive probes. | |
type: string | |
probes: | |
type: integer | |
time: | |
type: string | |
type: object | |
type: object | |
type: object | |
loadBalancer: | |
description: Settings controlling the load balancer | |
algorithms. | |
oneOf: | |
- required: | |
- simple | |
- properties: | |
consistentHash: | |
oneOf: | |
- required: | |
- httpHeaderName | |
- required: | |
- httpCookie | |
- required: | |
- useSourceIp | |
required: | |
- consistentHash | |
properties: | |
consistentHash: | |
properties: | |
httpCookie: | |
description: Hash based on HTTP cookie. | |
properties: | |
name: | |
description: Name of the cookie. | |
format: string | |
type: string | |
path: | |
description: Path to set for the cookie. | |
format: string | |
type: string | |
ttl: | |
description: Lifetime of the cookie. | |
type: string | |
type: object | |
httpHeaderName: | |
description: Hash based on a specific HTTP | |
header. | |
format: string | |
type: string | |
minimumRingSize: | |
type: integer | |
useSourceIp: | |
description: Hash based on the source IP address. | |
type: boolean | |
type: object | |
simple: | |
enum: | |
- ROUND_ROBIN | |
- LEAST_CONN | |
- RANDOM | |
- PASSTHROUGH | |
type: string | |
type: object | |
outlierDetection: | |
properties: | |
baseEjectionTime: | |
description: Minimum ejection duration. | |
type: string | |
consecutiveErrors: | |
format: int32 | |
type: integer | |
interval: | |
description: Time interval between ejection sweep | |
analysis. | |
type: string | |
maxEjectionPercent: | |
format: int32 | |
type: integer | |
minHealthPercent: | |
format: int32 | |
type: integer | |
type: object | |
port: | |
properties: | |
number: | |
type: integer | |
type: object | |
tls: | |
description: TLS related settings for connections | |
to the upstream service. | |
properties: | |
caCertificates: | |
format: string | |
type: string | |
clientCertificate: | |
description: REQUIRED if mode is `MUTUAL`. | |
format: string | |
type: string | |
mode: | |
enum: | |
- DISABLE | |
- SIMPLE | |
- MUTUAL | |
- ISTIO_MUTUAL | |
type: string | |
privateKey: | |
description: REQUIRED if mode is `MUTUAL`. | |
format: string | |
type: string | |
sni: | |
description: SNI string to present to the server | |
during TLS handshake. | |
format: string | |
type: string | |
subjectAltNames: | |
items: | |
format: string | |
type: string | |
type: array | |
type: object | |
type: object | |
type: array | |
tls: | |
description: TLS related settings for connections to the | |
upstream service. | |
properties: | |
caCertificates: | |
format: string | |
type: string | |
clientCertificate: | |
description: REQUIRED if mode is `MUTUAL`. | |
format: string | |
type: string | |
mode: | |
enum: | |
- DISABLE | |
- SIMPLE | |
- MUTUAL | |
- ISTIO_MUTUAL | |
type: string | |
privateKey: | |
description: REQUIRED if mode is `MUTUAL`. | |
format: string | |
type: string | |
sni: | |
description: SNI string to present to the server during | |
TLS handshake. | |
format: string | |
type: string | |
subjectAltNames: | |
items: | |
format: string | |
type: string | |
type: array | |
type: object | |
type: object | |
type: object | |
type: array | |
trafficPolicy: | |
properties: | |
connectionPool: | |
properties: | |
http: | |
description: HTTP connection pool settings. | |
properties: | |
h2UpgradePolicy: | |
description: Specify if http1.1 connection should be upgraded | |
to http2 for the associated destination. | |
enum: | |
- DEFAULT | |
- DO_NOT_UPGRADE | |
- UPGRADE | |
type: string | |
http1MaxPendingRequests: | |
description: Maximum number of pending HTTP requests to | |
a destination. | |
format: int32 | |
type: integer | |
http2MaxRequests: | |
description: Maximum number of requests to a backend. | |
format: int32 | |
type: integer | |
idleTimeout: | |
description: The idle timeout for upstream connection | |
pool connections. | |
type: string | |
maxRequestsPerConnection: | |
description: Maximum number of requests per connection | |
to a backend. | |
format: int32 | |
type: integer | |
maxRetries: | |
format: int32 | |
type: integer | |
type: object | |
tcp: | |
description: Settings common to both HTTP and TCP upstream | |
connections. | |
properties: | |
connectTimeout: | |
description: TCP connection timeout. | |
type: string | |
maxConnections: | |
description: Maximum number of HTTP1 /TCP connections | |
to a destination host. | |
format: int32 | |
type: integer | |
tcpKeepalive: | |
description: If set then set SO_KEEPALIVE on the socket | |
to enable TCP Keepalives. | |
properties: | |
interval: | |
description: The time duration between keep-alive | |
probes. | |
type: string | |
probes: | |
type: integer | |
time: | |
type: string | |
type: object | |
type: object | |
type: object | |
loadBalancer: | |
description: Settings controlling the load balancer algorithms. | |
oneOf: | |
- required: | |
- simple | |
- properties: | |
consistentHash: | |
oneOf: | |
- required: | |
- httpHeaderName | |
- required: | |
- httpCookie | |
- required: | |
- useSourceIp | |
required: | |
- consistentHash | |
properties: | |
consistentHash: | |
properties: | |
httpCookie: | |
description: Hash based on HTTP cookie. | |
properties: | |
name: | |
description: Name of the cookie. | |
format: string | |
type: string | |
path: | |
description: Path to set for the cookie. | |
format: string | |
type: string | |
ttl: | |
description: Lifetime of the cookie. | |
type: string | |
type: object | |
httpHeaderName: | |
description: Hash based on a specific HTTP header. | |
format: string | |
type: string | |
minimumRingSize: | |
type: integer | |
useSourceIp: | |
description: Hash based on the source IP address. | |
type: boolean | |
type: object | |
simple: | |
enum: | |
- ROUND_ROBIN | |
- LEAST_CONN | |
- RANDOM | |
- PASSTHROUGH | |
type: string | |
type: object | |
outlierDetection: | |
properties: | |
baseEjectionTime: | |
description: Minimum ejection duration. | |
type: string | |
consecutiveErrors: | |
format: int32 | |
type: integer | |
interval: | |
description: Time interval between ejection sweep analysis. | |
type: string | |
maxEjectionPercent: | |
format: int32 | |
type: integer | |
minHealthPercent: | |
format: int32 | |
type: integer | |
type: object | |
portLevelSettings: | |
description: Traffic policies specific to individual ports. | |
items: | |
properties: | |
connectionPool: | |
properties: | |
http: | |
description: HTTP connection pool settings. | |
properties: | |
h2UpgradePolicy: | |
description: Specify if http1.1 connection should | |
be upgraded to http2 for the associated destination. | |
enum: | |
- DEFAULT | |
- DO_NOT_UPGRADE | |
- UPGRADE | |
type: string | |
http1MaxPendingRequests: | |
description: Maximum number of pending HTTP requests | |
to a destination. | |
format: int32 | |
type: integer | |
http2MaxRequests: | |
description: Maximum number of requests to a backend. | |
format: int32 | |
type: integer | |
idleTimeout: | |
description: The idle timeout for upstream connection | |
pool connections. | |
type: string | |
maxRequestsPerConnection: | |
description: Maximum number of requests per connection | |
to a backend. | |
format: int32 | |
type: integer | |
maxRetries: | |
format: int32 | |
type: integer | |
type: object | |
tcp: | |
description: Settings common to both HTTP and TCP upstream | |
connections. | |
properties: | |
connectTimeout: | |
description: TCP connection timeout. | |
type: string | |
maxConnections: | |
description: Maximum number of HTTP1 /TCP connections | |
to a destination host. | |
format: int32 | |
type: integer | |
tcpKeepalive: | |
description: If set then set SO_KEEPALIVE on the | |
socket to enable TCP Keepalives. | |
properties: | |
interval: | |
description: The time duration between keep-alive | |
probes. | |
type: string | |
probes: | |
type: integer | |
time: | |
type: string | |
type: object | |
type: object | |
type: object | |
loadBalancer: | |
description: Settings controlling the load balancer algorithms. | |
oneOf: | |
- required: | |
- simple | |
- properties: | |
consistentHash: | |
oneOf: | |
- required: | |
- httpHeaderName | |
- required: | |
- httpCookie | |
- required: | |
- useSourceIp | |
required: | |
- consistentHash | |
properties: | |
consistentHash: | |
properties: | |
httpCookie: | |
description: Hash based on HTTP cookie. | |
properties: | |
name: | |
description: Name of the cookie. | |
format: string | |
type: string | |
path: | |
description: Path to set for the cookie. | |
format: string | |
type: string | |
ttl: | |
description: Lifetime of the cookie. | |
type: string | |
type: object | |
httpHeaderName: | |
description: Hash based on a specific HTTP header. | |
format: string | |
type: string | |
minimumRingSize: | |
type: integer | |
useSourceIp: | |
description: Hash based on the source IP address. | |
type: boolean | |
type: object | |
simple: | |
enum: | |
- ROUND_ROBIN | |
- LEAST_CONN | |
- RANDOM | |
- PASSTHROUGH | |
type: string | |
type: object | |
outlierDetection: | |
properties: | |
baseEjectionTime: | |
description: Minimum ejection duration. | |
type: string | |
consecutiveErrors: | |
format: int32 | |
type: integer | |
interval: | |
description: Time interval between ejection sweep analysis. | |
type: string | |
maxEjectionPercent: | |
format: int32 | |
type: integer | |
minHealthPercent: | |
format: int32 | |
type: integer | |
type: object | |
port: | |
properties: | |
number: | |
type: integer | |
type: object | |
tls: | |
description: TLS related settings for connections to the | |
upstream service. | |
properties: | |
caCertificates: | |
format: string | |
type: string | |
clientCertificate: | |
description: REQUIRED if mode is `MUTUAL`. | |
format: string | |
type: string | |
mode: | |
enum: | |
- DISABLE | |
- SIMPLE | |
- MUTUAL | |
- ISTIO_MUTUAL | |
type: string | |
privateKey: | |
description: REQUIRED if mode is `MUTUAL`. | |
format: string | |
type: string | |
sni: | |
description: SNI string to present to the server during | |
TLS handshake. | |
format: string | |
type: string | |
subjectAltNames: | |
items: | |
format: string | |
type: string | |
type: array | |
type: object | |
type: object | |
type: array | |
tls: | |
description: TLS related settings for connections to the upstream | |
service. | |
properties: | |
caCertificates: | |
format: string | |
type: string | |
clientCertificate: | |
description: REQUIRED if mode is `MUTUAL`. | |
format: string | |
type: string | |
mode: | |
enum: | |
- DISABLE | |
- SIMPLE | |
- MUTUAL | |
- ISTIO_MUTUAL | |
type: string | |
privateKey: | |
description: REQUIRED if mode is `MUTUAL`. | |
format: string | |
type: string | |
sni: | |
description: SNI string to present to the server during TLS | |
handshake. | |
format: string | |
type: string | |
subjectAltNames: | |
items: | |
format: string | |
type: string | |
type: array | |
type: object | |
type: object | |
type: object | |
type: object | |
version: v1alpha3 | |
versions: | |
- name: v1alpha3 | |
served: true | |
storage: true | |
status: | |
acceptedNames: | |
categories: | |
- istio-io | |
- networking-istio-io | |
kind: DestinationRule | |
listKind: DestinationRuleList | |
plural: destinationrules | |
shortNames: | |
- dr | |
singular: destinationrule | |
conditions: | |
- lastTransitionTime: "2019-12-03T04:51:48Z" | |
message: no conflicts found | |
reason: NoConflicts | |
status: "True" | |
type: NamesAccepted | |
- lastTransitionTime: null | |
message: the initial names have been accepted | |
reason: InitialNamesAccepted | |
status: "True" | |
type: Established | |
storedVersions: | |
- v1alpha3 | |
- apiVersion: apiextensions.k8s.io/v1beta1 | |
kind: CustomResourceDefinition | |
metadata: | |
annotations: | |
kubectl.kubernetes.io/last-applied-configuration: | | |
{"apiVersion":"apiextensions.k8s.io/v1beta1","kind":"CustomResourceDefinition","metadata":{"annotations":{},"name":"eniconfigs.crd.k8s.amazonaws.com"},"spec":{"group":"crd.k8s.amazonaws.com","names":{"kind":"ENIConfig","plural":"eniconfigs","singular":"eniconfig"},"scope":"Cluster","versions":[{"name":"v1alpha1","served":true,"storage":true}]}} | |
creationTimestamp: "2019-12-03T04:44:14Z" | |
generation: 1 | |
name: eniconfigs.crd.k8s.amazonaws.com | |
resourceVersion: "379" | |
selfLink: /apis/apiextensions.k8s.io/v1beta1/customresourcedefinitions/eniconfigs.crd.k8s.amazonaws.com | |
uid: 8e5af533-1587-11ea-b5af-027e0b84da98 | |
spec: | |
conversion: | |
strategy: None | |
group: crd.k8s.amazonaws.com | |
names: | |
kind: ENIConfig | |
listKind: ENIConfigList | |
plural: eniconfigs | |
singular: eniconfig | |
scope: Cluster | |
version: v1alpha1 | |
versions: | |
- name: v1alpha1 | |
served: true | |
storage: true | |
status: | |
acceptedNames: | |
kind: ENIConfig | |
listKind: ENIConfigList | |
plural: eniconfigs | |
singular: eniconfig | |
conditions: | |
- lastTransitionTime: "2019-12-03T04:44:14Z" | |
message: no conflicts found | |
reason: NoConflicts | |
status: "True" | |
type: NamesAccepted | |
- lastTransitionTime: null | |
message: the initial names have been accepted | |
reason: InitialNamesAccepted | |
status: "True" | |
type: Established | |
storedVersions: | |
- v1alpha1 | |
- apiVersion: apiextensions.k8s.io/v1beta1 | |
kind: CustomResourceDefinition | |
metadata: | |
annotations: | |
helm.sh/resource-policy: keep | |
kubectl.kubernetes.io/last-applied-configuration: | | |
{"apiVersion":"apiextensions.k8s.io/v1beta1","kind":"CustomResourceDefinition","metadata":{"annotations":{"helm.sh/resource-policy":"keep"},"creationTimestamp":null,"labels":{"app":"istio-pilot","chart":"istio","heritage":"Tiller","release":"istio"},"name":"envoyfilters.networking.istio.io"},"spec":{"group":"networking.istio.io","names":{"categories":["istio-io","networking-istio-io"],"kind":"EnvoyFilter","plural":"envoyfilters","singular":"envoyfilter"},"scope":"Namespaced","subresources":{"status":{}},"validation":{"openAPIV3Schema":{"properties":{"spec":{"description":"Customizing Envoy configuration generated by Istio. See more details at: https://istio.io/docs/reference/config/networking/v1alpha3/envoy-filter.html","properties":{"configPatches":{"description":"One or more patches with match conditions.","items":{"properties":{"applyTo":{"enum":["INVALID","LISTENER","FILTER_CHAIN","NETWORK_FILTER","HTTP_FILTER","ROUTE_CONFIGURATION","VIRTUAL_HOST","HTTP_ROUTE","CLUSTER"],"type":"string"},"match":{"description":"Match on listener/route configuration/cluster.","oneOf":[{"required":["listener"]},{"required":["routeConfiguration"]},{"required":["cluster"]}],"properties":{"cluster":{"description":"Match on envoy cluster attributes.","properties":{"name":{"description":"The exact name of the cluster to match.","format":"string","type":"string"},"portNumber":{"description":"The service port for which this cluster was generated.","type":"integer"},"service":{"description":"The fully qualified service name for this cluster.","format":"string","type":"string"},"subset":{"description":"The subset associated with the service.","format":"string","type":"string"}},"type":"object"},"context":{"description":"The specific config generation context to match on.","enum":["ANY","SIDECAR_INBOUND","SIDECAR_OUTBOUND","GATEWAY"],"type":"string"},"listener":{"description":"Match on envoy listener attributes.","properties":{"filterChain":{"description":"Match a specific filter chain in a listener.","properties":{"applicationProtocols":{"description":"Applies only to sidecars.","format":"string","type":"string"},"filter":{"description":"The name of a specific filter to apply the patch to.","properties":{"name":{"description":"The filter name to match on.","format":"string","type":"string"},"subFilter":{"properties":{"name":{"description":"The filter name to match on.","format":"string","type":"string"}},"type":"object"}},"type":"object"},"name":{"description":"The name assigned to the filter chain.","format":"string","type":"string"},"sni":{"description":"The SNI value used by a filter chain's match condition.","format":"string","type":"string"},"transportProtocol":{"description":"Applies only to SIDECAR_INBOUND context.","format":"string","type":"string"}},"type":"object"},"name":{"description":"Match a specific listener by its name.","format":"string","type":"string"},"portName":{"format":"string","type":"string"},"portNumber":{"type":"integer"}},"type":"object"},"proxy":{"description":"Match on properties associated with a proxy.","properties":{"metadata":{"additionalProperties":{"format":"string","type":"string"},"type":"object"},"proxyVersion":{"format":"string","type":"string"}},"type":"object"},"routeConfiguration":{"description":"Match on envoy HTTP route configuration attributes.","properties":{"gateway":{"format":"string","type":"string"},"name":{"description":"Route configuration name to match on.","format":"string","type":"string"},"portName":{"description":"Applicable only for GATEWAY context.","format":"string","type":"string"},"portNumber":{"type":"integer"},"vhost":{"properties":{"name":{"format":"string","type":"string"},"route":{"description":"Match a specific route within the virtual host.","properties":{"action":{"description":"Match a route with specific action type.","enum":["ANY","ROUTE","REDIRECT","DIRECT_RESPONSE"],"type":"string"},"name":{"format":"string","type":"string"}},"type":"object"}},"type":"object"}},"type":"object"}},"type":"object"},"patch":{"description":"The patch to apply along with the operation.","properties":{"operation":{"description":"Determines how the patch should be applied.","enum":["INVALID","MERGE","ADD","REMOVE","INSERT_BEFORE","INSERT_AFTER"],"type":"string"},"value":{"description":"The JSON config of the object being patched.","type":"object"}},"type":"object"}},"type":"object"},"type":"array"},"filters":{"items":{"properties":{"filterConfig":{"type":"object"},"filterName":{"description":"The name of the filter to instantiate.","format":"string","type":"string"},"filterType":{"description":"The type of filter to instantiate.","enum":["INVALID","HTTP","NETWORK"],"type":"string"},"insertPosition":{"description":"Insert position in the filter chain.","properties":{"index":{"description":"Position of this filter in the filter chain.","enum":["FIRST","LAST","BEFORE","AFTER"],"type":"string"},"relativeTo":{"format":"string","type":"string"}},"type":"object"},"listenerMatch":{"properties":{"address":{"description":"One or more IP addresses to which the listener is bound.","items":{"format":"string","type":"string"},"type":"array"},"listenerProtocol":{"description":"Selects a class of listeners for the same protocol.","enum":["ALL","HTTP","TCP"],"type":"string"},"listenerType":{"description":"Inbound vs outbound sidecar listener or gateway listener.","enum":["ANY","SIDECAR_INBOUND","SIDECAR_OUTBOUND","GATEWAY"],"type":"string"},"portNamePrefix":{"format":"string","type":"string"},"portNumber":{"type":"integer"}},"type":"object"}},"type":"object"},"type":"array"},"workloadLabels":{"additionalProperties":{"format":"string","type":"string"},"description":"Deprecated.","type":"object"},"workloadSelector":{"properties":{"labels":{"additionalProperties":{"format":"string","type":"string"},"type":"object"}},"type":"object"}},"type":"object"}},"type":"object"}},"versions":[{"name":"v1alpha3","served":true,"storage":true}]},"status":{"acceptedNames":{"kind":"","plural":""},"conditions":[],"storedVersions":[]}} | |
creationTimestamp: "2019-12-03T04:51:48Z" | |
generation: 3 | |
labels: | |
app: istio-pilot | |
chart: istio | |
heritage: Tiller | |
release: istio | |
name: envoyfilters.networking.istio.io | |
resourceVersion: "43301" | |
selfLink: /apis/apiextensions.k8s.io/v1beta1/customresourcedefinitions/envoyfilters.networking.istio.io | |
uid: 9d4c674c-1588-11ea-b5af-027e0b84da98 | |
spec: | |
conversion: | |
strategy: None | |
group: networking.istio.io | |
names: | |
categories: | |
- istio-io | |
- networking-istio-io | |
kind: EnvoyFilter | |
listKind: EnvoyFilterList | |
plural: envoyfilters | |
singular: envoyfilter | |
scope: Namespaced | |
subresources: | |
status: {} | |
validation: | |
openAPIV3Schema: | |
properties: | |
spec: | |
description: 'Customizing Envoy configuration generated by Istio. See | |
more details at: https://istio.io/docs/reference/config/networking/v1alpha3/envoy-filter.html' | |
properties: | |
configPatches: | |
description: One or more patches with match conditions. | |
items: | |
properties: | |
applyTo: | |
enum: | |
- INVALID | |
- LISTENER | |
- FILTER_CHAIN | |
- NETWORK_FILTER | |
- HTTP_FILTER | |
- ROUTE_CONFIGURATION | |
- VIRTUAL_HOST | |
- HTTP_ROUTE | |
- CLUSTER | |
type: string | |
match: | |
description: Match on listener/route configuration/cluster. | |
oneOf: | |
- required: | |
- listener | |
- required: | |
- routeConfiguration | |
- required: | |
- cluster | |
properties: | |
cluster: | |
description: Match on envoy cluster attributes. | |
properties: | |
name: | |
description: The exact name of the cluster to match. | |
format: string | |
type: string | |
portNumber: | |
description: The service port for which this cluster | |
was generated. | |
type: integer | |
service: | |
description: The fully qualified service name for this | |
cluster. | |
format: string | |
type: string | |
subset: | |
description: The subset associated with the service. | |
format: string | |
type: string | |
type: object | |
context: | |
description: The specific config generation context to match | |
on. | |
enum: | |
- ANY | |
- SIDECAR_INBOUND | |
- SIDECAR_OUTBOUND | |
- GATEWAY | |
type: string | |
listener: | |
description: Match on envoy listener attributes. | |
properties: | |
filterChain: | |
description: Match a specific filter chain in a listener. | |
properties: | |
applicationProtocols: | |
description: Applies only to sidecars. | |
format: string | |
type: string | |
filter: | |
description: The name of a specific filter to apply | |
the patch to. | |
properties: | |
name: | |
description: The filter name to match on. | |
format: string | |
type: string | |
subFilter: | |
properties: | |
name: | |
description: The filter name to match on. | |
format: string | |
type: string | |
type: object | |
type: object | |
name: | |
description: The name assigned to the filter chain. | |
format: string | |
type: string | |
sni: | |
description: The SNI value used by a filter chain's | |
match condition. | |
format: string | |
type: string | |
transportProtocol: | |
description: Applies only to SIDECAR_INBOUND context. | |
format: string | |
type: string | |
type: object | |
name: | |
description: Match a specific listener by its name. | |
format: string | |
type: string | |
portName: | |
format: string | |
type: string | |
portNumber: | |
type: integer | |
type: object | |
proxy: | |
description: Match on properties associated with a proxy. | |
properties: | |
metadata: | |
additionalProperties: | |
format: string | |
type: string | |
type: object | |
proxyVersion: | |
format: string | |
type: string | |
type: object | |
routeConfiguration: | |
description: Match on envoy HTTP route configuration attributes. | |
properties: | |
gateway: | |
format: string | |
type: string | |
name: | |
description: Route configuration name to match on. | |
format: string | |
type: string | |
portName: | |
description: Applicable only for GATEWAY context. | |
format: string | |
type: string | |
portNumber: | |
type: integer | |
vhost: | |
properties: | |
name: | |
format: string | |
type: string | |
route: | |
description: Match a specific route within the virtual | |
host. | |
properties: | |
action: | |
description: Match a route with specific action | |
type. | |
enum: | |
- ANY | |
- ROUTE | |
- REDIRECT | |
- DIRECT_RESPONSE | |
type: string | |
name: | |
format: string | |
type: string | |
type: object | |
type: object | |
type: object | |
type: object | |
patch: | |
description: The patch to apply along with the operation. | |
properties: | |
operation: | |
description: Determines how the patch should be applied. | |
enum: | |
- INVALID | |
- MERGE | |
- ADD | |
- REMOVE | |
- INSERT_BEFORE | |
- INSERT_AFTER | |
type: string | |
value: | |
description: The JSON config of the object being patched. | |
type: object | |
type: object | |
type: object | |
type: array | |
filters: | |
items: | |
properties: | |
filterConfig: | |
type: object | |
filterName: | |
description: The name of the filter to instantiate. | |
format: string | |
type: string | |
filterType: | |
description: The type of filter to instantiate. | |
enum: | |
- INVALID | |
- HTTP | |
- NETWORK | |
type: string | |
insertPosition: | |
description: Insert position in the filter chain. | |
properties: | |
index: | |
description: Position of this filter in the filter chain. | |
enum: | |
- FIRST | |
- LAST | |
- BEFORE | |
- AFTER | |
type: string | |
relativeTo: | |
format: string | |
type: string | |
type: object | |
listenerMatch: | |
properties: | |
address: | |
description: One or more IP addresses to which the listener | |
is bound. | |
items: | |
format: string | |
type: string | |
type: array | |
listenerProtocol: | |
description: Selects a class of listeners for the same protocol. | |
enum: | |
- ALL | |
- HTTP | |
- TCP | |
type: string | |
listenerType: | |
description: Inbound vs outbound sidecar listener or gateway | |
listener. | |
enum: | |
- ANY | |
- SIDECAR_INBOUND | |
- SIDECAR_OUTBOUND | |
- GATEWAY | |
type: string | |
portNamePrefix: | |
format: string | |
type: string | |
portNumber: | |
type: integer | |
type: object | |
type: object | |
type: array | |
workloadLabels: | |
additionalProperties: | |
format: string | |
type: string | |
description: Deprecated. | |
type: object | |
workloadSelector: | |
properties: | |
labels: | |
additionalProperties: | |
format: string | |
type: string | |
type: object | |
type: object | |
type: object | |
type: object | |
version: v1alpha3 | |
versions: | |
- name: v1alpha3 | |
served: true | |
storage: true | |
status: | |
acceptedNames: | |
categories: | |
- istio-io | |
- networking-istio-io | |
kind: EnvoyFilter | |
listKind: EnvoyFilterList | |
plural: envoyfilters | |
singular: envoyfilter | |
conditions: | |
- lastTransitionTime: "2019-12-03T04:51:48Z" | |
message: no conflicts found | |
reason: NoConflicts | |
status: "True" | |
type: NamesAccepted | |
- lastTransitionTime: null | |
message: the initial names have been accepted | |
reason: InitialNamesAccepted | |
status: "True" | |
type: Established | |
storedVersions: | |
- v1alpha3 | |
- apiVersion: apiextensions.k8s.io/v1beta1 | |
kind: CustomResourceDefinition | |
metadata: | |
annotations: | |
helm.sh/resource-policy: keep | |
kubectl.kubernetes.io/last-applied-configuration: | | |
{"apiVersion":"apiextensions.k8s.io/v1beta1","kind":"CustomResourceDefinition","metadata":{"annotations":{"helm.sh/resource-policy":"keep"},"creationTimestamp":null,"labels":{"app":"istio-pilot","chart":"istio","heritage":"Tiller","release":"istio"},"name":"gateways.networking.istio.io"},"spec":{"group":"networking.istio.io","names":{"categories":["istio-io","networking-istio-io"],"kind":"Gateway","plural":"gateways","shortNames":["gw"],"singular":"gateway"},"scope":"Namespaced","subresources":{"status":{}},"validation":{"openAPIV3Schema":{"properties":{"spec":{"description":"Configuration affecting edge load balancer. See more details at: https://istio.io/docs/reference/config/networking/v1alpha3/gateway.html","properties":{"selector":{"additionalProperties":{"format":"string","type":"string"},"type":"object"},"servers":{"description":"A list of server specifications.","items":{"properties":{"bind":{"format":"string","type":"string"},"defaultEndpoint":{"format":"string","type":"string"},"hosts":{"description":"One or more hosts exposed by this gateway.","items":{"format":"string","type":"string"},"type":"array"},"port":{"properties":{"name":{"description":"Label assigned to the port.","format":"string","type":"string"},"number":{"description":"A valid non-negative integer port number.","type":"integer"},"protocol":{"description":"The protocol exposed on the port.","format":"string","type":"string"}},"type":"object"},"tls":{"description":"Set of TLS related options that govern the server's behavior.","properties":{"caCertificates":{"description":"REQUIRED if mode is `MUTUAL`.","format":"string","type":"string"},"cipherSuites":{"description":"Optional: If specified, only support the specified cipher list.","items":{"format":"string","type":"string"},"type":"array"},"credentialName":{"format":"string","type":"string"},"httpsRedirect":{"type":"boolean"},"maxProtocolVersion":{"description":"Optional: Maximum TLS protocol version.","enum":["TLS_AUTO","TLSV1_0","TLSV1_1","TLSV1_2","TLSV1_3"],"type":"string"},"minProtocolVersion":{"description":"Optional: Minimum TLS protocol version.","enum":["TLS_AUTO","TLSV1_0","TLSV1_1","TLSV1_2","TLSV1_3"],"type":"string"},"mode":{"enum":["PASSTHROUGH","SIMPLE","MUTUAL","AUTO_PASSTHROUGH","ISTIO_MUTUAL"],"type":"string"},"privateKey":{"description":"REQUIRED if mode is `SIMPLE` or `MUTUAL`.","format":"string","type":"string"},"serverCertificate":{"description":"REQUIRED if mode is `SIMPLE` or `MUTUAL`.","format":"string","type":"string"},"subjectAltNames":{"items":{"format":"string","type":"string"},"type":"array"},"verifyCertificateHash":{"items":{"format":"string","type":"string"},"type":"array"},"verifyCertificateSpki":{"items":{"format":"string","type":"string"},"type":"array"}},"type":"object"}},"type":"object"},"type":"array"}},"type":"object"}},"type":"object"}},"versions":[{"name":"v1alpha3","served":true,"storage":true}]},"status":{"acceptedNames":{"kind":"","plural":""},"conditions":[],"storedVersions":[]}} | |
creationTimestamp: "2019-12-03T04:51:48Z" | |
generation: 3 | |
labels: | |
app: istio-pilot | |
chart: istio | |
heritage: Tiller | |
release: istio | |
name: gateways.networking.istio.io | |
resourceVersion: "43302" | |
selfLink: /apis/apiextensions.k8s.io/v1beta1/customresourcedefinitions/gateways.networking.istio.io | |
uid: 9d4f997e-1588-11ea-b5af-027e0b84da98 | |
spec: | |
conversion: | |
strategy: None | |
group: networking.istio.io | |
names: | |
categories: | |
- istio-io | |
- networking-istio-io | |
kind: Gateway | |
listKind: GatewayList | |
plural: gateways | |
shortNames: | |
- gw | |
singular: gateway | |
scope: Namespaced | |
subresources: | |
status: {} | |
validation: | |
openAPIV3Schema: | |
properties: | |
spec: | |
description: 'Configuration affecting edge load balancer. See more details | |
at: https://istio.io/docs/reference/config/networking/v1alpha3/gateway.html' | |
properties: | |
selector: | |
additionalProperties: | |
format: string | |
type: string | |
type: object | |
servers: | |
description: A list of server specifications. | |
items: | |
properties: | |
bind: | |
format: string | |
type: string | |
defaultEndpoint: | |
format: string | |
type: string | |
hosts: | |
description: One or more hosts exposed by this gateway. | |
items: | |
format: string | |
type: string | |
type: array | |
port: | |
properties: | |
name: | |
description: Label assigned to the port. | |
format: string | |
type: string | |
number: | |
description: A valid non-negative integer port number. | |
type: integer | |
protocol: | |
description: The protocol exposed on the port. | |
format: string | |
type: string | |
type: object | |
tls: | |
description: Set of TLS related options that govern the server's | |
behavior. | |
properties: | |
caCertificates: | |
description: REQUIRED if mode is `MUTUAL`. | |
format: string | |
type: string | |
cipherSuites: | |
description: 'Optional: If specified, only support the specified | |
cipher list.' | |
items: | |
format: string | |
type: string | |
type: array | |
credentialName: | |
format: string | |
type: string | |
httpsRedirect: | |
type: boolean | |
maxProtocolVersion: | |
description: 'Optional: Maximum TLS protocol version.' | |
enum: | |
- TLS_AUTO | |
- TLSV1_0 | |
- TLSV1_1 | |
- TLSV1_2 | |
- TLSV1_3 | |
type: string | |
minProtocolVersion: | |
description: 'Optional: Minimum TLS protocol version.' | |
enum: | |
- TLS_AUTO | |
- TLSV1_0 | |
- TLSV1_1 | |
- TLSV1_2 | |
- TLSV1_3 | |
type: string | |
mode: | |
enum: | |
- PASSTHROUGH | |
- SIMPLE | |
- MUTUAL | |
- AUTO_PASSTHROUGH | |
- ISTIO_MUTUAL | |
type: string | |
privateKey: | |
description: REQUIRED if mode is `SIMPLE` or `MUTUAL`. | |
format: string | |
type: string | |
serverCertificate: | |
description: REQUIRED if mode is `SIMPLE` or `MUTUAL`. | |
format: string | |
type: string | |
subjectAltNames: | |
items: | |
format: string | |
type: string | |
type: array | |
verifyCertificateHash: | |
items: | |
format: string | |
type: string | |
type: array | |
verifyCertificateSpki: | |
items: | |
format: string | |
type: string | |
type: array | |
type: object | |
type: object | |
type: array | |
type: object | |
type: object | |
version: v1alpha3 | |
versions: | |
- name: v1alpha3 | |
served: true | |
storage: true | |
status: | |
acceptedNames: | |
categories: | |
- istio-io | |
- networking-istio-io | |
kind: Gateway | |
listKind: GatewayList | |
plural: gateways | |
shortNames: | |
- gw | |
singular: gateway | |
conditions: | |
- lastTransitionTime: "2019-12-03T04:51:48Z" | |
message: no conflicts found | |
reason: NoConflicts | |
status: "True" | |
type: NamesAccepted | |
- lastTransitionTime: null | |
message: the initial names have been accepted | |
reason: InitialNamesAccepted | |
status: "True" | |
type: Established | |
storedVersions: | |
- v1alpha3 | |
- apiVersion: apiextensions.k8s.io/v1beta1 | |
kind: CustomResourceDefinition | |
metadata: | |
annotations: | |
helm.sh/resource-policy: keep | |
kubectl.kubernetes.io/last-applied-configuration: | | |
{"apiVersion":"apiextensions.k8s.io/v1beta1","kind":"CustomResourceDefinition","metadata":{"annotations":{"helm.sh/resource-policy":"keep"},"labels":{"app":"mixer","chart":"istio","heritage":"Tiller","istio":"mixer-handler","package":"handler","release":"istio"},"name":"handlers.config.istio.io"},"spec":{"group":"config.istio.io","names":{"categories":["istio-io","policy-istio-io"],"kind":"handler","plural":"handlers","singular":"handler"},"scope":"Namespaced","subresources":{"status":{}},"versions":[{"name":"v1alpha2","served":true,"storage":true}]}} | |
creationTimestamp: "2019-12-03T04:51:49Z" | |
generation: 3 | |
labels: | |
app: mixer | |
chart: istio | |
heritage: Tiller | |
istio: mixer-handler | |
package: handler | |
release: istio | |
name: handlers.config.istio.io | |
resourceVersion: "43325" | |
selfLink: /apis/apiextensions.k8s.io/v1beta1/customresourcedefinitions/handlers.config.istio.io | |
uid: 9ddd748f-1588-11ea-b5af-027e0b84da98 | |
spec: | |
conversion: | |
strategy: None | |
group: config.istio.io | |
names: | |
categories: | |
- istio-io | |
- policy-istio-io | |
kind: handler | |
listKind: handlerList | |
plural: handlers | |
singular: handler | |
scope: Namespaced | |
subresources: | |
status: {} | |
version: v1alpha2 | |
versions: | |
- name: v1alpha2 | |
served: true | |
storage: true | |
status: | |
acceptedNames: | |
categories: | |
- istio-io | |
- policy-istio-io | |
kind: handler | |
listKind: handlerList | |
plural: handlers | |
singular: handler | |
conditions: | |
- lastTransitionTime: "2019-12-03T04:51:49Z" | |
message: no conflicts found | |
reason: NoConflicts | |
status: "True" | |
type: NamesAccepted | |
- lastTransitionTime: null | |
message: the initial names have been accepted | |
reason: InitialNamesAccepted | |
status: "True" | |
type: Established | |
storedVersions: | |
- v1alpha2 | |
- apiVersion: apiextensions.k8s.io/v1beta1 | |
kind: CustomResourceDefinition | |
metadata: | |
annotations: | |
helm.sh/resource-policy: keep | |
kubectl.kubernetes.io/last-applied-configuration: | | |
{"apiVersion":"apiextensions.k8s.io/v1beta1","kind":"CustomResourceDefinition","metadata":{"annotations":{"helm.sh/resource-policy":"keep"},"creationTimestamp":null,"labels":{"app":"istio-mixer","chart":"istio","heritage":"Tiller","release":"istio"},"name":"httpapispecbindings.config.istio.io"},"spec":{"group":"config.istio.io","names":{"categories":["istio-io","apim-istio-io"],"kind":"HTTPAPISpecBinding","plural":"httpapispecbindings","singular":"httpapispecbinding"},"scope":"Namespaced","subresources":{"status":{}},"validation":{"openAPIV3Schema":{"properties":{"spec":{"properties":{"apiSpecs":{"items":{"properties":{"name":{"description":"The short name of the HTTPAPISpec.","format":"string","type":"string"},"namespace":{"description":"Optional namespace of the HTTPAPISpec.","format":"string","type":"string"}},"type":"object"},"type":"array"},"api_specs":{"items":{"properties":{"name":{"description":"The short name of the HTTPAPISpec.","format":"string","type":"string"},"namespace":{"description":"Optional namespace of the HTTPAPISpec.","format":"string","type":"string"}},"type":"object"},"type":"array"},"services":{"description":"One or more services to map the listed HTTPAPISpec onto.","items":{"properties":{"domain":{"description":"Domain suffix used to construct the service FQDN in implementations that support such specification.","format":"string","type":"string"},"labels":{"additionalProperties":{"format":"string","type":"string"},"description":"Optional one or more labels that uniquely identify the service version.","type":"object"},"name":{"description":"The short name of the service such as \"foo\".","format":"string","type":"string"},"namespace":{"description":"Optional namespace of the service.","format":"string","type":"string"},"service":{"description":"The service FQDN.","format":"string","type":"string"}},"type":"object"},"type":"array"}},"type":"object"}},"type":"object"}},"versions":[{"name":"v1alpha2","served":true,"storage":true}]},"status":{"acceptedNames":{"kind":"","plural":""},"conditions":[],"storedVersions":[]}} | |
creationTimestamp: "2019-12-03T04:51:48Z" | |
generation: 3 | |
labels: | |
app: istio-mixer | |
chart: istio | |
heritage: Tiller | |
release: istio | |
name: httpapispecbindings.config.istio.io | |
resourceVersion: "43303" | |
selfLink: /apis/apiextensions.k8s.io/v1beta1/customresourcedefinitions/httpapispecbindings.config.istio.io | |
uid: 9d5280a0-1588-11ea-b5af-027e0b84da98 | |
spec: | |
conversion: | |
strategy: None | |
group: config.istio.io | |
names: | |
categories: | |
- istio-io | |
- apim-istio-io | |
kind: HTTPAPISpecBinding | |
listKind: HTTPAPISpecBindingList | |
plural: httpapispecbindings | |
singular: httpapispecbinding | |
scope: Namespaced | |
subresources: | |
status: {} | |
validation: | |
openAPIV3Schema: | |
properties: | |
spec: | |
properties: | |
api_specs: | |
items: | |
properties: | |
name: | |
description: The short name of the HTTPAPISpec. | |
format: string | |
type: string | |
namespace: | |
description: Optional namespace of the HTTPAPISpec. | |
format: string | |
type: string | |
type: object | |
type: array | |
apiSpecs: | |
items: | |
properties: | |
name: | |
description: The short name of the HTTPAPISpec. | |
format: string | |
type: string | |
namespace: | |
description: Optional namespace of the HTTPAPISpec. | |
format: string | |
type: string | |
type: object | |
type: array | |
services: | |
description: One or more services to map the listed HTTPAPISpec onto. | |
items: | |
properties: | |
domain: | |
description: Domain suffix used to construct the service FQDN | |
in implementations that support such specification. | |
format: string | |
type: string | |
labels: | |
additionalProperties: | |
format: string | |
type: string | |
description: Optional one or more labels that uniquely identify | |
the service version. | |
type: object | |
name: | |
description: The short name of the service such as "foo". | |
format: string | |
type: string | |
namespace: | |
description: Optional namespace of the service. | |
format: string | |
type: string | |
service: | |
description: The service FQDN. | |
format: string | |
type: string | |
type: object | |
type: array | |
type: object | |
type: object | |
version: v1alpha2 | |
versions: | |
- name: v1alpha2 | |
served: true | |
storage: true | |
status: | |
acceptedNames: | |
categories: | |
- istio-io | |
- apim-istio-io | |
kind: HTTPAPISpecBinding | |
listKind: HTTPAPISpecBindingList | |
plural: httpapispecbindings | |
singular: httpapispecbinding | |
conditions: | |
- lastTransitionTime: "2019-12-03T04:51:48Z" | |
message: no conflicts found | |
reason: NoConflicts | |
status: "True" | |
type: NamesAccepted | |
- lastTransitionTime: null | |
message: the initial names have been accepted | |
reason: InitialNamesAccepted | |
status: "True" | |
type: Established | |
storedVersions: | |
- v1alpha2 | |
- apiVersion: apiextensions.k8s.io/v1beta1 | |
kind: CustomResourceDefinition | |
metadata: | |
annotations: | |
helm.sh/resource-policy: keep | |
kubectl.kubernetes.io/last-applied-configuration: | | |
{"apiVersion":"apiextensions.k8s.io/v1beta1","kind":"CustomResourceDefinition","metadata":{"annotations":{"helm.sh/resource-policy":"keep"},"creationTimestamp":null,"labels":{"app":"istio-mixer","chart":"istio","heritage":"Tiller","release":"istio"},"name":"httpapispecs.config.istio.io"},"spec":{"group":"config.istio.io","names":{"categories":["istio-io","apim-istio-io"],"kind":"HTTPAPISpec","plural":"httpapispecs","singular":"httpapispec"},"scope":"Namespaced","subresources":{"status":{}},"validation":{"openAPIV3Schema":{"properties":{"spec":{"properties":{"apiKeys":{"items":{"oneOf":[{"required":["query"]},{"required":["header"]},{"required":["cookie"]}],"properties":{"cookie":{"format":"string","type":"string"},"header":{"description":"API key is sent in a request header.","format":"string","type":"string"},"query":{"description":"API Key is sent as a query parameter.","format":"string","type":"string"}},"type":"object"},"type":"array"},"api_keys":{"items":{"oneOf":[{"required":["query"]},{"required":["header"]},{"required":["cookie"]}],"properties":{"cookie":{"format":"string","type":"string"},"header":{"description":"API key is sent in a request header.","format":"string","type":"string"},"query":{"description":"API Key is sent as a query parameter.","format":"string","type":"string"}},"type":"object"},"type":"array"},"attributes":{"properties":{"attributes":{"additionalProperties":{"oneOf":[{"required":["stringValue"]},{"required":["int64Value"]},{"required":["doubleValue"]},{"required":["boolValue"]},{"required":["bytesValue"]},{"required":["timestampValue"]},{"required":["durationValue"]},{"required":["stringMapValue"]}],"properties":{"boolValue":{"type":"boolean"},"bytesValue":{"format":"binary","type":"string"},"doubleValue":{"format":"double","type":"number"},"durationValue":{"type":"string"},"int64Value":{"format":"int64","type":"integer"},"stringMapValue":{"properties":{"entries":{"additionalProperties":{"format":"string","type":"string"},"description":"Holds a set of name/value pairs.","type":"object"}},"type":"object"},"stringValue":{"format":"string","type":"string"},"timestampValue":{"format":"dateTime","type":"string"}},"type":"object"},"description":"A map of attribute name to its value.","type":"object"}},"type":"object"},"patterns":{"description":"List of HTTP patterns to match.","items":{"oneOf":[{"required":["uriTemplate"]},{"required":["regex"]}],"properties":{"attributes":{"properties":{"attributes":{"additionalProperties":{"oneOf":[{"required":["stringValue"]},{"required":["int64Value"]},{"required":["doubleValue"]},{"required":["boolValue"]},{"required":["bytesValue"]},{"required":["timestampValue"]},{"required":["durationValue"]},{"required":["stringMapValue"]}],"properties":{"boolValue":{"type":"boolean"},"bytesValue":{"format":"binary","type":"string"},"doubleValue":{"format":"double","type":"number"},"durationValue":{"type":"string"},"int64Value":{"format":"int64","type":"integer"},"stringMapValue":{"properties":{"entries":{"additionalProperties":{"format":"string","type":"string"},"description":"Holds a set of name/value pairs.","type":"object"}},"type":"object"},"stringValue":{"format":"string","type":"string"},"timestampValue":{"format":"dateTime","type":"string"}},"type":"object"},"description":"A map of attribute name to its value.","type":"object"}},"type":"object"},"httpMethod":{"format":"string","type":"string"},"regex":{"format":"string","type":"string"},"uriTemplate":{"format":"string","type":"string"}},"type":"object"},"type":"array"}},"type":"object"}},"type":"object"}},"versions":[{"name":"v1alpha2","served":true,"storage":true}]},"status":{"acceptedNames":{"kind":"","plural":""},"conditions":[],"storedVersions":[]}} | |
creationTimestamp: "2019-12-03T04:51:48Z" | |
generation: 3 | |
labels: | |
app: istio-mixer | |
chart: istio | |
heritage: Tiller | |
release: istio | |
name: httpapispecs.config.istio.io | |
resourceVersion: "43304" | |
selfLink: /apis/apiextensions.k8s.io/v1beta1/customresourcedefinitions/httpapispecs.config.istio.io | |
uid: 9d5b9713-1588-11ea-b5af-027e0b84da98 | |
spec: | |
conversion: | |
strategy: None | |
group: config.istio.io | |
names: | |
categories: | |
- istio-io | |
- apim-istio-io | |
kind: HTTPAPISpec | |
listKind: HTTPAPISpecList | |
plural: httpapispecs | |
singular: httpapispec | |
scope: Namespaced | |
subresources: | |
status: {} | |
validation: | |
openAPIV3Schema: | |
properties: | |
spec: | |
properties: | |
api_keys: | |
items: | |
oneOf: | |
- required: | |
- query | |
- required: | |
- header | |
- required: | |
- cookie | |
properties: | |
cookie: | |
format: string | |
type: string | |
header: | |
description: API key is sent in a request header. | |
format: string | |
type: string | |
query: | |
description: API Key is sent as a query parameter. | |
format: string | |
type: string | |
type: object | |
type: array | |
apiKeys: | |
items: | |
oneOf: | |
- required: | |
- query | |
- required: | |
- header | |
- required: | |
- cookie | |
properties: | |
cookie: | |
format: string | |
type: string | |
header: | |
description: API key is sent in a request header. | |
format: string | |
type: string | |
query: | |
description: API Key is sent as a query parameter. | |
format: string | |
type: string | |
type: object | |
type: array | |
attributes: | |
properties: | |
attributes: | |
additionalProperties: | |
oneOf: | |
- required: | |
- stringValue | |
- required: | |
- int64Value | |
- required: | |
- doubleValue | |
- required: | |
- boolValue | |
- required: | |
- bytesValue | |
- required: | |
- timestampValue | |
- required: | |
- durationValue | |
- required: | |
- stringMapValue | |
properties: | |
boolValue: | |
type: boolean | |
bytesValue: | |
format: binary | |
type: string | |
doubleValue: | |
format: double | |
type: number | |
durationValue: | |
type: string | |
int64Value: | |
format: int64 | |
type: integer | |
stringMapValue: | |
properties: | |
entries: | |
additionalProperties: | |
format: string | |
type: string | |
description: Holds a set of name/value pairs. | |
type: object | |
type: object | |
stringValue: | |
format: string | |
type: string | |
timestampValue: | |
format: dateTime | |
type: string | |
type: object | |
description: A map of attribute name to its value. | |
type: object | |
type: object | |
patterns: | |
description: List of HTTP patterns to match. | |
items: | |
oneOf: | |
- required: | |
- uriTemplate | |
- required: | |
- regex | |
properties: | |
attributes: | |
properties: | |
attributes: | |
additionalProperties: | |
oneOf: | |
- required: | |
- stringValue | |
- required: | |
- int64Value | |
- required: | |
- doubleValue | |
- required: | |
- boolValue | |
- required: | |
- bytesValue | |
- required: | |
- timestampValue | |
- required: | |
- durationValue | |
- required: | |
- stringMapValue | |
properties: | |
boolValue: | |
type: boolean | |
bytesValue: | |
format: binary | |
type: string | |
doubleValue: | |
format: double | |
type: number | |
durationValue: | |
type: string | |
int64Value: | |
format: int64 | |
type: integer | |
stringMapValue: | |
properties: | |
entries: | |
additionalProperties: | |
format: string | |
type: string | |
description: Holds a set of name/value pairs. | |
type: object | |
type: object | |
stringValue: | |
format: string | |
type: string | |
timestampValue: | |
format: dateTime | |
type: string | |
type: object | |
description: A map of attribute name to its value. | |
type: object | |
type: object | |
httpMethod: | |
format: string | |
type: string | |
regex: | |
format: string | |
type: string | |
uriTemplate: | |
format: string | |
type: string | |
type: object | |
type: array | |
type: object | |
type: object | |
version: v1alpha2 | |
versions: | |
- name: v1alpha2 | |
served: true | |
storage: true | |
status: | |
acceptedNames: | |
categories: | |
- istio-io | |
- apim-istio-io | |
kind: HTTPAPISpec | |
listKind: HTTPAPISpecList | |
plural: httpapispecs | |
singular: httpapispec | |
conditions: | |
- lastTransitionTime: "2019-12-03T04:51:48Z" | |
message: no conflicts found | |
reason: NoConflicts | |
status: "True" | |
type: NamesAccepted | |
- lastTransitionTime: null | |
message: the initial names have been accepted | |
reason: InitialNamesAccepted | |
status: "True" | |
type: Established | |
storedVersions: | |
- v1alpha2 | |
- apiVersion: apiextensions.k8s.io/v1beta1 | |
kind: CustomResourceDefinition | |
metadata: | |
annotations: | |
kubectl.kubernetes.io/last-applied-configuration: | | |
{"apiVersion":"apiextensions.k8s.io/v1beta1","kind":"CustomResourceDefinition","metadata":{"annotations":{},"labels":{"knative.dev/crd-install":"true"},"name":"images.caching.internal.knative.dev"},"spec":{"group":"caching.internal.knative.dev","names":{"categories":["knative-internal","caching"],"kind":"Image","plural":"images","shortNames":["img"],"singular":"image"},"scope":"Namespaced","subresources":{"status":{}},"version":"v1alpha1"}} | |
creationTimestamp: "2019-12-03T10:54:07Z" | |
generation: 1 | |
labels: | |
knative.dev/crd-install: "true" | |
name: images.caching.internal.knative.dev | |
resourceVersion: "43829" | |
selfLink: /apis/apiextensions.k8s.io/v1beta1/customresourcedefinitions/images.caching.internal.knative.dev | |
uid: 3ab9b444-15bb-11ea-b5af-027e0b84da98 | |
spec: | |
conversion: | |
strategy: None | |
group: caching.internal.knative.dev | |
names: | |
categories: | |
- knative-internal | |
- caching | |
kind: Image | |
listKind: ImageList | |
plural: images | |
shortNames: | |
- img | |
singular: image | |
scope: Namespaced | |
subresources: | |
status: {} | |
version: v1alpha1 | |
versions: | |
- name: v1alpha1 | |
served: true | |
storage: true | |
status: | |
acceptedNames: | |
categories: | |
- knative-internal | |
- caching | |
kind: Image | |
listKind: ImageList | |
plural: images | |
shortNames: | |
- img | |
singular: image | |
conditions: | |
- lastTransitionTime: "2019-12-03T10:54:07Z" | |
message: no conflicts found | |
reason: NoConflicts | |
status: "True" | |
type: NamesAccepted | |
- lastTransitionTime: null | |
message: the initial names have been accepted | |
reason: InitialNamesAccepted | |
status: "True" | |
type: Established | |
storedVersions: | |
- v1alpha1 | |
- apiVersion: apiextensions.k8s.io/v1beta1 | |
kind: CustomResourceDefinition | |
metadata: | |
annotations: | |
kubectl.kubernetes.io/last-applied-configuration: | | |
{"apiVersion":"apiextensions.k8s.io/v1beta1","kind":"CustomResourceDefinition","metadata":{"annotations":{},"labels":{"knative.dev/crd-install":"true","serving.knative.dev/release":"devel"},"name":"ingresses.networking.internal.knative.dev"},"spec":{"additionalPrinterColumns":[{"JSONPath":".status.conditions[?(@.type=='Ready')].status","name":"Ready","type":"string"},{"JSONPath":".status.conditions[?(@.type=='Ready')].reason","name":"Reason","type":"string"}],"group":"networking.internal.knative.dev","names":{"categories":["knative-internal","networking"],"kind":"Ingress","plural":"ingresses","shortNames":["ing"],"singular":"ingress"},"scope":"Namespaced","subresources":{"status":{}},"versions":[{"name":"v1alpha1","served":true,"storage":true}]}} | |
creationTimestamp: "2019-12-03T10:54:07Z" | |
generation: 1 | |
labels: | |
knative.dev/crd-install: "true" | |
serving.knative.dev/release: devel | |
name: ingresses.networking.internal.knative.dev | |
resourceVersion: "43833" | |
selfLink: /apis/apiextensions.k8s.io/v1beta1/customresourcedefinitions/ingresses.networking.internal.knative.dev | |
uid: 3ad21006-15bb-11ea-b5af-027e0b84da98 | |
spec: | |
additionalPrinterColumns: | |
- JSONPath: .status.conditions[?(@.type=='Ready')].status | |
name: Ready | |
type: string | |
- JSONPath: .status.conditions[?(@.type=='Ready')].reason | |
name: Reason | |
type: string | |
conversion: | |
strategy: None | |
group: networking.internal.knative.dev | |
names: | |
categories: | |
- knative-internal | |
- networking | |
kind: Ingress | |
listKind: IngressList | |
plural: ingresses | |
shortNames: | |
- ing | |
singular: ingress | |
scope: Namespaced | |
subresources: | |
status: {} | |
version: v1alpha1 | |
versions: | |
- name: v1alpha1 | |
served: true | |
storage: true | |
status: | |
acceptedNames: | |
categories: | |
- knative-internal | |
- networking | |
kind: Ingress | |
listKind: IngressList | |
plural: ingresses | |
shortNames: | |
- ing | |
singular: ingress | |
conditions: | |
- lastTransitionTime: "2019-12-03T10:54:07Z" | |
message: no conflicts found | |
reason: NoConflicts | |
status: "True" | |
type: NamesAccepted | |
- lastTransitionTime: null | |
message: the initial names have been accepted | |
reason: InitialNamesAccepted | |
status: "True" | |
type: Established | |
storedVersions: | |
- v1alpha1 | |
- apiVersion: apiextensions.k8s.io/v1beta1 | |
kind: CustomResourceDefinition | |
metadata: | |
annotations: | |
helm.sh/resource-policy: keep | |
kubectl.kubernetes.io/last-applied-configuration: | | |
{"apiVersion":"apiextensions.k8s.io/v1beta1","kind":"CustomResourceDefinition","metadata":{"annotations":{"helm.sh/resource-policy":"keep"},"labels":{"app":"mixer","chart":"istio","heritage":"Tiller","istio":"mixer-instance","package":"instance","release":"istio"},"name":"instances.config.istio.io"},"spec":{"group":"config.istio.io","names":{"categories":["istio-io","policy-istio-io"],"kind":"instance","plural":"instances","singular":"instance"},"scope":"Namespaced","subresources":{"status":{}},"versions":[{"name":"v1alpha2","served":true,"storage":true}]}} | |
creationTimestamp: "2019-12-03T04:51:49Z" | |
generation: 3 | |
labels: | |
app: mixer | |
chart: istio | |
heritage: Tiller | |
istio: mixer-instance | |
package: instance | |
release: istio | |
name: instances.config.istio.io | |
resourceVersion: "43323" | |
selfLink: /apis/apiextensions.k8s.io/v1beta1/customresourcedefinitions/instances.config.istio.io | |
uid: 9dd58616-1588-11ea-b5af-027e0b84da98 | |
spec: | |
conversion: | |
strategy: None | |
group: config.istio.io | |
names: | |
categories: | |
- istio-io | |
- policy-istio-io | |
kind: instance | |
listKind: instanceList | |
plural: instances | |
singular: instance | |
scope: Namespaced | |
subresources: | |
status: {} | |
version: v1alpha2 | |
versions: | |
- name: v1alpha2 | |
served: true | |
storage: true | |
status: | |
acceptedNames: | |
categories: | |
- istio-io | |
- policy-istio-io | |
kind: instance | |
listKind: instanceList | |
plural: instances | |
singular: instance | |
conditions: | |
- lastTransitionTime: "2019-12-03T04:51:49Z" | |
message: no conflicts found | |
reason: NoConflicts | |
status: "True" | |
type: NamesAccepted | |
- lastTransitionTime: null | |
message: the initial names have been accepted | |
reason: InitialNamesAccepted | |
status: "True" | |
type: Established | |
storedVersions: | |
- v1alpha2 | |
- apiVersion: apiextensions.k8s.io/v1beta1 | |
kind: CustomResourceDefinition | |
metadata: | |
annotations: | |
helm.sh/resource-policy: keep | |
kubectl.kubernetes.io/last-applied-configuration: | | |
{"apiVersion":"apiextensions.k8s.io/v1beta1","kind":"CustomResourceDefinition","metadata":{"annotations":{"helm.sh/resource-policy":"keep"},"creationTimestamp":null,"labels":{"app":"istio-citadel","chart":"istio","heritage":"Tiller","release":"istio"},"name":"meshpolicies.authentication.istio.io"},"spec":{"group":"authentication.istio.io","names":{"categories":["istio-io","authentication-istio-io"],"kind":"MeshPolicy","listKind":"MeshPolicyList","plural":"meshpolicies","singular":"meshpolicy"},"scope":"Cluster","subresources":{"status":{}},"validation":{"openAPIV3Schema":{"properties":{"spec":{"description":"Authentication policy for Istio services. See more details at: https://istio.io/docs/reference/config/istio.authentication.v1alpha1.html","properties":{"originIsOptional":{"type":"boolean"},"origins":{"description":"List of authentication methods that can be used for origin authentication.","items":{"properties":{"jwt":{"description":"Jwt params for the method.","properties":{"audiences":{"items":{"format":"string","type":"string"},"type":"array"},"issuer":{"description":"Identifies the issuer that issued the JWT.","format":"string","type":"string"},"jwks":{"description":"JSON Web Key Set of public keys to validate signature of the JWT.","format":"string","type":"string"},"jwksUri":{"format":"string","type":"string"},"jwks_uri":{"format":"string","type":"string"},"jwtHeaders":{"description":"JWT is sent in a request header.","items":{"format":"string","type":"string"},"type":"array"},"jwtParams":{"description":"JWT is sent in a query parameter.","items":{"format":"string","type":"string"},"type":"array"},"jwt_headers":{"description":"JWT is sent in a request header.","items":{"format":"string","type":"string"},"type":"array"},"triggerRules":{"items":{"properties":{"excludedPaths":{"description":"List of paths to be excluded from the request.","items":{"oneOf":[{"required":["exact"]},{"required":["prefix"]},{"required":["suffix"]},{"required":["regex"]}],"properties":{"exact":{"description":"exact string match.","format":"string","type":"string"},"prefix":{"description":"prefix-based match.","format":"string","type":"string"},"regex":{"description":"ECMAscript style regex-based match as defined by [EDCA-262](http://en.cppreference.com/w/cpp/regex/ecmascript).","format":"string","type":"string"},"suffix":{"description":"suffix-based match.","format":"string","type":"string"}},"type":"object"},"type":"array"},"excluded_paths":{"description":"List of paths to be excluded from the request.","items":{"oneOf":[{"required":["exact"]},{"required":["prefix"]},{"required":["suffix"]},{"required":["regex"]}],"properties":{"exact":{"description":"exact string match.","format":"string","type":"string"},"prefix":{"description":"prefix-based match.","format":"string","type":"string"},"regex":{"description":"ECMAscript style regex-based match as defined by [EDCA-262](http://en.cppreference.com/w/cpp/regex/ecmascript).","format":"string","type":"string"},"suffix":{"description":"suffix-based match.","format":"string","type":"string"}},"type":"object"},"type":"array"},"includedPaths":{"description":"List of paths that the request must include.","items":{"oneOf":[{"required":["exact"]},{"required":["prefix"]},{"required":["suffix"]},{"required":["regex"]}],"properties":{"exact":{"description":"exact string match.","format":"string","type":"string"},"prefix":{"description":"prefix-based match.","format":"string","type":"string"},"regex":{"description":"ECMAscript style regex-based match as defined by [EDCA-262](http://en.cppreference.com/w/cpp/regex/ecmascript).","format":"string","type":"string"},"suffix":{"description":"suffix-based match.","format":"string","type":"string"}},"type":"object"},"type":"array"},"included_paths":{"description":"List of paths that the request must include.","items":{"oneOf":[{"required":["exact"]},{"required":["prefix"]},{"required":["suffix"]},{"required":["regex"]}],"properties":{"exact":{"description":"exact string match.","format":"string","type":"string"},"prefix":{"description":"prefix-based match.","format":"string","type":"string"},"regex":{"description":"ECMAscript style regex-based match as defined by [EDCA-262](http://en.cppreference.com/w/cpp/regex/ecmascript).","format":"string","type":"string"},"suffix":{"description":"suffix-based match.","format":"string","type":"string"}},"type":"object"},"type":"array"}},"type":"object"},"type":"array"},"trigger_rules":{"items":{"properties":{"excludedPaths":{"description":"List of paths to be excluded from the request.","items":{"oneOf":[{"required":["exact"]},{"required":["prefix"]},{"required":["suffix"]},{"required":["regex"]}],"properties":{"exact":{"description":"exact string match.","format":"string","type":"string"},"prefix":{"description":"prefix-based match.","format":"string","type":"string"},"regex":{"description":"ECMAscript style regex-based match as defined by [EDCA-262](http://en.cppreference.com/w/cpp/regex/ecmascript).","format":"string","type":"string"},"suffix":{"description":"suffix-based match.","format":"string","type":"string"}},"type":"object"},"type":"array"},"excluded_paths":{"description":"List of paths to be excluded from the request.","items":{"oneOf":[{"required":["exact"]},{"required":["prefix"]},{"required":["suffix"]},{"required":["regex"]}],"properties":{"exact":{"description":"exact string match.","format":"string","type":"string"},"prefix":{"description":"prefix-based match.","format":"string","type":"string"},"regex":{"description":"ECMAscript style regex-based match as defined by [EDCA-262](http://en.cppreference.com/w/cpp/regex/ecmascript).","format":"string","type":"string"},"suffix":{"description":"suffix-based match.","format":"string","type":"string"}},"type":"object"},"type":"array"},"includedPaths":{"description":"List of paths that the request must include.","items":{"oneOf":[{"required":["exact"]},{"required":["prefix"]},{"required":["suffix"]},{"required":["regex"]}],"properties":{"exact":{"description":"exact string match.","format":"string","type":"string"},"prefix":{"description":"prefix-based match.","format":"string","type":"string"},"regex":{"description":"ECMAscript style regex-based match as defined by [EDCA-262](http://en.cppreference.com/w/cpp/regex/ecmascript).","format":"string","type":"string"},"suffix":{"description":"suffix-based match.","format":"string","type":"string"}},"type":"object"},"type":"array"},"included_paths":{"description":"List of paths that the request must include.","items":{"oneOf":[{"required":["exact"]},{"required":["prefix"]},{"required":["suffix"]},{"required":["regex"]}],"properties":{"exact":{"description":"exact string match.","format":"string","type":"string"},"prefix":{"description":"prefix-based match.","format":"string","type":"string"},"regex":{"description":"ECMAscript style regex-based match as defined by [EDCA-262](http://en.cppreference.com/w/cpp/regex/ecmascript).","format":"string","type":"string"},"suffix":{"description":"suffix-based match.","format":"string","type":"string"}},"type":"object"},"type":"array"}},"type":"object"},"type":"array"}},"type":"object"}},"type":"object"},"type":"array"},"peerIsOptional":{"type":"boolean"},"peers":{"description":"List of authentication methods that can be used for peer authentication.","items":{"oneOf":[{"required":["mtls"]},{"required":["jwt"]}],"properties":{"jwt":{"properties":{"audiences":{"items":{"format":"string","type":"string"},"type":"array"},"issuer":{"description":"Identifies the issuer that issued the JWT.","format":"string","type":"string"},"jwks":{"description":"JSON Web Key Set of public keys to validate signature of the JWT.","format":"string","type":"string"},"jwksUri":{"format":"string","type":"string"},"jwks_uri":{"format":"string","type":"string"},"jwtHeaders":{"description":"JWT is sent in a request header.","items":{"format":"string","type":"string"},"type":"array"},"jwtParams":{"description":"JWT is sent in a query parameter.","items":{"format":"string","type":"string"},"type":"array"},"jwt_headers":{"description":"JWT is sent in a request header.","items":{"format":"string","type":"string"},"type":"array"},"triggerRules":{"items":{"properties":{"excludedPaths":{"description":"List of paths to be excluded from the request.","items":{"oneOf":[{"required":["exact"]},{"required":["prefix"]},{"required":["suffix"]},{"required":["regex"]}],"properties":{"exact":{"description":"exact string match.","format":"string","type":"string"},"prefix":{"description":"prefix-based match.","format":"string","type":"string"},"regex":{"description":"ECMAscript style regex-based match as defined by [EDCA-262](http://en.cppreference.com/w/cpp/regex/ecmascript).","format":"string","type":"string"},"suffix":{"description":"suffix-based match.","format":"string","type":"string"}},"type":"object"},"type":"array"},"excluded_paths":{"description":"List of paths to be excluded from the request.","items":{"oneOf":[{"required":["exact"]},{"required":["prefix"]},{"required":["suffix"]},{"required":["regex"]}],"properties":{"exact":{"description":"exact string match.","format":"string","type":"string"},"prefix":{"description":"prefix-based match.","format":"string","type":"string"},"regex":{"description":"ECMAscript style regex-based match as defined by [EDCA-262](http://en.cppreference.com/w/cpp/regex/ecmascript).","format":"string","type":"string"},"suffix":{"description":"suffix-based match.","format":"string","type":"string"}},"type":"object"},"type":"array"},"includedPaths":{"description":"List of paths that the request must include.","items":{"oneOf":[{"required":["exact"]},{"required":["prefix"]},{"required":["suffix"]},{"required":["regex"]}],"properties":{"exact":{"description":"exact string match.","format":"string","type":"string"},"prefix":{"description":"prefix-based match.","format":"string","type":"string"},"regex":{"description":"ECMAscript style regex-based match as defined by [EDCA-262](http://en.cppreference.com/w/cpp/regex/ecmascript).","format":"string","type":"string"},"suffix":{"description":"suffix-based match.","format":"string","type":"string"}},"type":"object"},"type":"array"},"included_paths":{"description":"List of paths that the request must include.","items":{"oneOf":[{"required":["exact"]},{"required":["prefix"]},{"required":["suffix"]},{"required":["regex"]}],"properties":{"exact":{"description":"exact string match.","format":"string","type":"string"},"prefix":{"description":"prefix-based match.","format":"string","type":"string"},"regex":{"description":"ECMAscript style regex-based match as defined by [EDCA-262](http://en.cppreference.com/w/cpp/regex/ecmascript).","format":"string","type":"string"},"suffix":{"description":"suffix-based match.","format":"string","type":"string"}},"type":"object"},"type":"array"}},"type":"object"},"type":"array"},"trigger_rules":{"items":{"properties":{"excludedPaths":{"description":"List of paths to be excluded from the request.","items":{"oneOf":[{"required":["exact"]},{"required":["prefix"]},{"required":["suffix"]},{"required":["regex"]}],"properties":{"exact":{"description":"exact string match.","format":"string","type":"string"},"prefix":{"description":"prefix-based match.","format":"string","type":"string"},"regex":{"description":"ECMAscript style regex-based match as defined by [EDCA-262](http://en.cppreference.com/w/cpp/regex/ecmascript).","format":"string","type":"string"},"suffix":{"description":"suffix-based match.","format":"string","type":"string"}},"type":"object"},"type":"array"},"excluded_paths":{"description":"List of paths to be excluded from the request.","items":{"oneOf":[{"required":["exact"]},{"required":["prefix"]},{"required":["suffix"]},{"required":["regex"]}],"properties":{"exact":{"description":"exact string match.","format":"string","type":"string"},"prefix":{"description":"prefix-based match.","format":"string","type":"string"},"regex":{"description":"ECMAscript style regex-based match as defined by [EDCA-262](http://en.cppreference.com/w/cpp/regex/ecmascript).","format":"string","type":"string"},"suffix":{"description":"suffix-based match.","format":"string","type":"string"}},"type":"object"},"type":"array"},"includedPaths":{"description":"List of paths that the request must include.","items":{"oneOf":[{"required":["exact"]},{"required":["prefix"]},{"required":["suffix"]},{"required":["regex"]}],"properties":{"exact":{"description":"exact string match.","format":"string","type":"string"},"prefix":{"description":"prefix-based match.","format":"string","type":"string"},"regex":{"description":"ECMAscript style regex-based match as defined by [EDCA-262](http://en.cppreference.com/w/cpp/regex/ecmascript).","format":"string","type":"string"},"suffix":{"description":"suffix-based match.","format":"string","type":"string"}},"type":"object"},"type":"array"},"included_paths":{"description":"List of paths that the request must include.","items":{"oneOf":[{"required":["exact"]},{"required":["prefix"]},{"required":["suffix"]},{"required":["regex"]}],"properties":{"exact":{"description":"exact string match.","format":"string","type":"string"},"prefix":{"description":"prefix-based match.","format":"string","type":"string"},"regex":{"description":"ECMAscript style regex-based match as defined by [EDCA-262](http://en.cppreference.com/w/cpp/regex/ecmascript).","format":"string","type":"string"},"suffix":{"description":"suffix-based match.","format":"string","type":"string"}},"type":"object"},"type":"array"}},"type":"object"},"type":"array"}},"type":"object"},"mtls":{"description":"Set if mTLS is used.","properties":{"allowTls":{"description":"WILL BE DEPRECATED, if set, will translates to `TLS_PERMISSIVE` mode.","type":"boolean"},"mode":{"description":"Defines the mode of mTLS authentication.","enum":["STRICT","PERMISSIVE"],"type":"string"}},"type":"object"}},"type":"object"},"type":"array"},"principalBinding":{"description":"Define whether peer or origin identity should be use for principal.","enum":["USE_PEER","USE_ORIGIN"],"type":"string"},"targets":{"description":"List rules to select workloads that the policy should be applied on.","items":{"properties":{"labels":{"additionalProperties":{"format":"string","type":"string"},"type":"object"},"name":{"description":"The name must be a short name from the service registry.","format":"string","type":"string"},"ports":{"description":"Specifies the ports.","items":{"oneOf":[{"required":["number"]},{"required":["name"]}],"properties":{"name":{"format":"string","type":"string"},"number":{"type":"integer"}},"type":"object"},"type":"array"}},"type":"object"},"type":"array"}},"type":"object"}},"type":"object"}},"versions":[{"name":"v1alpha1","served":true,"storage":true}]},"status":{"acceptedNames":{"kind":"","plural":""},"conditions":[],"storedVersions":[]}} | |
creationTimestamp: "2019-12-03T04:51:49Z" | |
generation: 3 | |
labels: | |
app: istio-citadel | |
chart: istio | |
heritage: Tiller | |
release: istio | |
name: meshpolicies.authentication.istio.io | |
resourceVersion: "43305" | |
selfLink: /apis/apiextensions.k8s.io/v1beta1/customresourcedefinitions/meshpolicies.authentication.istio.io | |
uid: 9d7cde9b-1588-11ea-b5af-027e0b84da98 | |
spec: | |
conversion: | |
strategy: None | |
group: authentication.istio.io | |
names: | |
categories: | |
- istio-io | |
- authentication-istio-io | |
kind: MeshPolicy | |
listKind: MeshPolicyList | |
plural: meshpolicies | |
singular: meshpolicy | |
scope: Cluster | |
subresources: | |
status: {} | |
validation: | |
openAPIV3Schema: | |
properties: | |
spec: | |
description: 'Authentication policy for Istio services. See more details | |
at: https://istio.io/docs/reference/config/istio.authentication.v1alpha1.html' | |
properties: | |
originIsOptional: | |
type: boolean | |
origins: | |
description: List of authentication methods that can be used for origin | |
authentication. | |
items: | |
properties: | |
jwt: | |
description: Jwt params for the method. | |
properties: | |
audiences: | |
items: | |
format: string | |
type: string | |
type: array | |
issuer: | |
description: Identifies the issuer that issued the JWT. | |
format: string | |
type: string | |
jwks: | |
description: JSON Web Key Set of public keys to validate | |
signature of the JWT. | |
format: string | |
type: string | |
jwks_uri: | |
format: string | |
type: string | |
jwksUri: | |
format: string | |
type: string | |
jwt_headers: | |
description: JWT is sent in a request header. | |
items: | |
format: string | |
type: string | |
type: array | |
jwtHeaders: | |
description: JWT is sent in a request header. | |
items: | |
format: string | |
type: string | |
type: array | |
jwtParams: | |
description: JWT is sent in a query parameter. | |
items: | |
format: string | |
type: string | |
type: array | |
trigger_rules: | |
items: | |
properties: | |
excluded_paths: | |
description: List of paths to be excluded from the | |
request. | |
items: | |
oneOf: | |
- required: | |
- exact | |
- required: | |
- prefix | |
- required: | |
- suffix | |
- required: | |
- regex | |
properties: | |
exact: | |
description: exact string match. | |
format: string | |
type: string | |
prefix: | |
description: prefix-based match. | |
format: string | |
type: string | |
regex: | |
description: ECMAscript style regex-based match | |
as defined by [EDCA-262](http://en.cppreference.com/w/cpp/regex/ecmascript). | |
format: string | |
type: string | |
suffix: | |
description: suffix-based match. | |
format: string | |
type: string | |
type: object | |
type: array | |
excludedPaths: | |
description: List of paths to be excluded from the | |
request. | |
items: | |
oneOf: | |
- required: | |
- exact | |
- required: | |
- prefix | |
- required: | |
- suffix | |
- required: | |
- regex | |
properties: | |
exact: | |
description: exact string match. | |
format: string | |
type: string | |
prefix: | |
description: prefix-based match. | |
format: string | |
type: string | |
regex: | |
description: ECMAscript style regex-based match | |
as defined by [EDCA-262](http://en.cppreference.com/w/cpp/regex/ecmascript). | |
format: string | |
type: string | |
suffix: | |
description: suffix-based match. | |
format: string | |
type: string | |
type: object | |
type: array | |
included_paths: | |
description: List of paths that the request must include. | |
items: | |
oneOf: | |
- required: | |
- exact | |
- required: | |
- prefix | |
- required: | |
- suffix | |
- required: | |
- regex | |
properties: | |
exact: | |
description: exact string match. | |
format: string | |
type: string | |
prefix: | |
description: prefix-based match. | |
format: string | |
type: string | |
regex: | |
description: ECMAscript style regex-based match | |
as defined by [EDCA-262](http://en.cppreference.com/w/cpp/regex/ecmascript). | |
format: string | |
type: string | |
suffix: | |
description: suffix-based match. | |
format: string | |
type: string | |
type: object | |
type: array | |
includedPaths: | |
description: List of paths that the request must include. | |
items: | |
oneOf: | |
- required: | |
- exact | |
- required: | |
- prefix | |
- required: | |
- suffix | |
- required: | |
- regex | |
properties: | |
exact: | |
description: exact string match. | |
format: string | |
type: string | |
prefix: | |
description: prefix-based match. | |
format: string | |
type: string | |
regex: | |
description: ECMAscript style regex-based match | |
as defined by [EDCA-262](http://en.cppreference.com/w/cpp/regex/ecmascript). | |
format: string | |
type: string | |
suffix: | |
description: suffix-based match. | |
format: string | |
type: string | |
type: object | |
type: array | |
type: object | |
type: array | |
triggerRules: | |
items: | |
properties: | |
excluded_paths: | |
description: List of paths to be excluded from the | |
request. | |
items: | |
oneOf: | |
- required: | |
- exact | |
- required: | |
- prefix | |
- required: | |
- suffix | |
- required: | |
- regex | |
properties: | |
exact: | |
description: exact string match. | |
format: string | |
type: string | |
prefix: | |
description: prefix-based match. | |
format: string | |
type: string | |
regex: | |
description: ECMAscript style regex-based match | |
as defined by [EDCA-262](http://en.cppreference.com/w/cpp/regex/ecmascript). | |
format: string | |
type: string | |
suffix: | |
description: suffix-based match. | |
format: string | |
type: string | |
type: object | |
type: array | |
excludedPaths: | |
description: List of paths to be excluded from the | |
request. | |
items: | |
oneOf: | |
- required: | |
- exact | |
- required: | |
- prefix | |
- required: | |
- suffix | |
- required: | |
- regex | |
properties: | |
exact: | |
description: exact string match. | |
format: string | |
type: string | |
prefix: | |
description: prefix-based match. | |
format: string | |
type: string | |
regex: | |
description: ECMAscript style regex-based match | |
as defined by [EDCA-262](http://en.cppreference.com/w/cpp/regex/ecmascript). | |
format: string | |
type: string | |
suffix: | |
description: suffix-based match. | |
format: string | |
type: string | |
type: object | |
type: array | |
included_paths: | |
description: List of paths that the request must include. | |
items: | |
oneOf: | |
- required: | |
- exact | |
- required: | |
- prefix | |
- required: | |
- suffix | |
- required: | |
- regex | |
properties: | |
exact: | |
description: exact string match. | |
format: string | |
type: string | |
prefix: | |
description: prefix-based match. | |
format: string | |
type: string | |
regex: | |
description: ECMAscript style regex-based match | |
as defined by [EDCA-262](http://en.cppreference.com/w/cpp/regex/ecmascript). | |
format: string | |
type: string | |
suffix: | |
description: suffix-based match. | |
format: string | |
type: string | |
type: object | |
type: array | |
includedPaths: | |
description: List of paths that the request must include. | |
items: | |
oneOf: | |
- required: | |
- exact | |
- required: | |
- prefix | |
- required: | |
- suffix | |
- required: | |
- regex | |
properties: | |
exact: | |
description: exact string match. | |
format: string | |
type: string | |
prefix: | |
description: prefix-based match. | |
format: string | |
type: string | |
regex: | |
description: ECMAscript style regex-based match | |
as defined by [EDCA-262](http://en.cppreference.com/w/cpp/regex/ecmascript). | |
format: string | |
type: string | |
suffix: | |
description: suffix-based match. | |
format: string | |
type: string | |
type: object | |
type: array | |
type: object | |
type: array | |
type: object | |
type: object | |
type: array | |
peerIsOptional: | |
type: boolean | |
peers: | |
description: List of authentication methods that can be used for peer | |
authentication. | |
items: | |
oneOf: | |
- required: | |
- mtls | |
- required: | |
- jwt | |
properties: | |
jwt: | |
properties: | |
audiences: | |
items: | |
format: string | |
type: string | |
type: array | |
issuer: | |
description: Identifies the issuer that issued the JWT. | |
format: string | |
type: string | |
jwks: | |
description: JSON Web Key Set of public keys to validate | |
signature of the JWT. | |
format: string | |
type: string | |
jwks_uri: | |
format: string | |
type: string | |
jwksUri: | |
format: string | |
type: string | |
jwt_headers: | |
description: JWT is sent in a request header. | |
items: | |
format: string | |
type: string | |
type: array | |
jwtHeaders: | |
description: JWT is sent in a request header. | |
items: | |
format: string | |
type: string | |
type: array | |
jwtParams: | |
description: JWT is sent in a query parameter. | |
items: | |
format: string | |
type: string | |
type: array | |
trigger_rules: | |
items: | |
properties: | |
excluded_paths: | |
description: List of paths to be excluded from the | |
request. | |
items: | |
oneOf: | |
- required: | |
- exact | |
- required: | |
- prefix | |
- required: | |
- suffix | |
- required: | |
- regex | |
properties: | |
exact: | |
description: exact string match. | |
format: string | |
type: string | |
prefix: | |
description: prefix-based match. | |
format: string | |
type: string | |
regex: | |
description: ECMAscript style regex-based match | |
as defined by [EDCA-262](http://en.cppreference.com/w/cpp/regex/ecmascript). | |
format: string | |
type: string | |
suffix: | |
description: suffix-based match. | |
format: string | |
type: string | |
type: object | |
type: array | |
excludedPaths: | |
description: List of paths to be excluded from the | |
request. | |
items: | |
oneOf: | |
- required: | |
- exact | |
- required: | |
- prefix | |
- required: | |
- suffix | |
- required: | |
- regex | |
properties: | |
exact: | |
description: exact string match. | |
format: string | |
type: string | |
prefix: | |
description: prefix-based match. | |
format: string | |
type: string | |
regex: | |
description: ECMAscript style regex-based match | |
as defined by [EDCA-262](http://en.cppreference.com/w/cpp/regex/ecmascript). | |
format: string | |
type: string | |
suffix: | |
description: suffix-based match. | |
format: string | |
type: string | |
type: object | |
type: array | |
included_paths: | |
description: List of paths that the request must include. | |
items: | |
oneOf: | |
- required: | |
- exact | |
- required: | |
- prefix | |
- required: | |
- suffix | |
- required: | |
- regex | |
properties: | |
exact: | |
description: exact string match. | |
format: string | |
type: string | |
prefix: | |
description: prefix-based match. | |
format: string | |
type: string | |
regex: | |
description: ECMAscript style regex-based match | |
as defined by [EDCA-262](http://en.cppreference.com/w/cpp/regex/ecmascript). | |
format: string | |
type: string | |
suffix: | |
description: suffix-based match. | |
format: string | |
type: string | |
type: object | |
type: array | |
includedPaths: | |
description: List of paths that the request must include. | |
items: | |
oneOf: | |
- required: | |
- exact | |
- required: | |
- prefix | |
- required: | |
- suffix | |
- required: | |
- regex | |
properties: | |
exact: | |
description: exact string match. | |
format: string | |
type: string | |
prefix: | |
description: prefix-based match. | |
format: string | |
type: string | |
regex: | |
description: ECMAscript style regex-based match | |
as defined by [EDCA-262](http://en.cppreference.com/w/cpp/regex/ecmascript). | |
format: string | |
type: string | |
suffix: | |
description: suffix-based match. | |
format: string | |
type: string | |
type: object | |
type: array | |
type: object | |
type: array | |
triggerRules: | |
items: | |
properties: | |
excluded_paths: | |
description: List of paths to be excluded from the | |
request. | |
items: | |
oneOf: | |
- required: | |
- exact | |
- required: | |
- prefix | |
- required: | |
- suffix | |
- required: | |
- regex | |
properties: | |
exact: | |
description: exact string match. | |
format: string | |
type: string | |
prefix: | |
description: prefix-based match. | |
format: string | |
type: string | |
regex: | |
description: ECMAscript style regex-based match | |
as defined by [EDCA-262](http://en.cppreference.com/w/cpp/regex/ecmascript). | |
format: string | |
type: string | |
suffix: | |
description: suffix-based match. | |
format: string | |
type: string | |
type: object | |
type: array | |
excludedPaths: | |
description: List of paths to be excluded from the | |
request. | |
items: | |
oneOf: | |
- required: | |
- exact | |
- required: | |
- prefix | |
- required: | |
- suffix | |
- required: | |
- regex | |
properties: | |
exact: | |
description: exact string match. | |
format: string | |
type: string | |
prefix: | |
description: prefix-based match. | |
format: string | |
type: string | |
regex: | |
description: ECMAscript style regex-based match | |
as defined by [EDCA-262](http://en.cppreference.com/w/cpp/regex/ecmascript). | |
format: string | |
type: string | |
suffix: | |
description: suffix-based match. | |
format: string | |
type: string | |
type: object | |
type: array | |
included_paths: | |
description: List of paths that the request must include. | |
items: | |
oneOf: | |
- required: | |
- exact | |
- required: | |
- prefix | |
- required: | |
- suffix | |
- required: | |
- regex | |
properties: | |
exact: | |
description: exact string match. | |
format: string | |
type: string | |
prefix: | |
description: prefix-based match. | |
format: string | |
type: string | |
regex: | |
description: ECMAscript style regex-based match | |
as defined by [EDCA-262](http://en.cppreference.com/w/cpp/regex/ecmascript). | |
format: string | |
type: string | |
suffix: | |
description: suffix-based match. | |
format: string | |
type: string | |
type: object | |
type: array | |
includedPaths: | |
description: List of paths that the request must include. | |
items: | |
oneOf: | |
- required: | |
- exact | |
- required: | |
- prefix | |
- required: | |
- suffix | |
- required: | |
- regex | |
properties: | |
exact: | |
description: exact string match. | |
format: string | |
type: string | |
prefix: | |
description: prefix-based match. | |
format: string | |
type: string | |
regex: | |
description: ECMAscript style regex-based match | |
as defined by [EDCA-262](http://en.cppreference.com/w/cpp/regex/ecmascript). | |
format: string | |
type: string | |
suffix: | |
description: suffix-based match. | |
format: string | |
type: string | |
type: object | |
type: array | |
type: object | |
type: array | |
type: object | |
mtls: | |
description: Set if mTLS is used. | |
properties: | |
allowTls: | |
description: WILL BE DEPRECATED, if set, will translates | |
to `TLS_PERMISSIVE` mode. | |
type: boolean | |
mode: | |
description: Defines the mode of mTLS authentication. | |
enum: | |
- STRICT | |
- PERMISSIVE | |
type: string | |
type: object | |
type: object | |
type: array | |
principalBinding: | |
description: Define whether peer or origin identity should be use | |
for principal. | |
enum: | |
- USE_PEER | |
- USE_ORIGIN | |
type: string | |
targets: | |
description: List rules to select workloads that the policy should | |
be applied on. | |
items: | |
properties: | |
labels: | |
additionalProperties: | |
format: string | |
type: string | |
type: object | |
name: | |
description: The name must be a short name from the service | |
registry. | |
format: string | |
type: string | |
ports: | |
description: Specifies the ports. | |
items: | |
oneOf: | |
- required: | |
- number | |
- required: | |
- name | |
properties: | |
name: | |
format: string | |
type: string | |
number: | |
type: integer | |
type: object | |
type: array | |
type: object | |
type: array | |
type: object | |
type: object | |
version: v1alpha1 | |
versions: | |
- name: v1alpha1 | |
served: true | |
storage: true | |
status: | |
acceptedNames: | |
categories: | |
- istio-io | |
- authentication-istio-io | |
kind: MeshPolicy | |
listKind: MeshPolicyList | |
plural: meshpolicies | |
singular: meshpolicy | |
conditions: | |
- lastTransitionTime: "2019-12-03T04:51:49Z" | |
message: no conflicts found | |
reason: NoConflicts | |
status: "True" | |
type: NamesAccepted | |
- lastTransitionTime: null | |
message: the initial names have been accepted | |
reason: InitialNamesAccepted | |
status: "True" | |
type: Established | |
storedVersions: | |
- v1alpha1 | |
- apiVersion: apiextensions.k8s.io/v1beta1 | |
kind: CustomResourceDefinition | |
metadata: | |
annotations: | |
kubectl.kubernetes.io/last-applied-configuration: | | |
{"apiVersion":"apiextensions.k8s.io/v1beta1","kind":"CustomResourceDefinition","metadata":{"annotations":{},"labels":{"knative.dev/crd-install":"true","serving.knative.dev/release":"devel"},"name":"metrics.autoscaling.internal.knative.dev"},"spec":{"additionalPrinterColumns":[{"JSONPath":".status.conditions[?(@.type=='Ready')].status","name":"Ready","type":"string"},{"JSONPath":".status.conditions[?(@.type=='Ready')].reason","name":"Reason","type":"string"}],"group":"autoscaling.internal.knative.dev","names":{"categories":["knative-internal","autoscaling"],"kind":"Metric","plural":"metrics","singular":"metric"},"scope":"Namespaced","subresources":{"status":{}},"version":"v1alpha1"}} | |
creationTimestamp: "2019-12-03T10:54:07Z" | |
generation: 1 | |
labels: | |
knative.dev/crd-install: "true" | |
serving.knative.dev/release: devel | |
name: metrics.autoscaling.internal.knative.dev | |
resourceVersion: "43837" | |
selfLink: /apis/apiextensions.k8s.io/v1beta1/customresourcedefinitions/metrics.autoscaling.internal.knative.dev | |
uid: 3aea25c3-15bb-11ea-b5af-027e0b84da98 | |
spec: | |
additionalPrinterColumns: | |
- JSONPath: .status.conditions[?(@.type=='Ready')].status | |
name: Ready | |
type: string | |
- JSONPath: .status.conditions[?(@.type=='Ready')].reason | |
name: Reason | |
type: string | |
conversion: | |
strategy: None | |
group: autoscaling.internal.knative.dev | |
names: | |
categories: | |
- knative-internal | |
- autoscaling | |
kind: Metric | |
listKind: MetricList | |
plural: metrics | |
singular: metric | |
scope: Namespaced | |
subresources: | |
status: {} | |
version: v1alpha1 | |
versions: | |
- name: v1alpha1 | |
served: true | |
storage: true | |
status: | |
acceptedNames: | |
categories: | |
- knative-internal | |
- autoscaling | |
kind: Metric | |
listKind: MetricList | |
plural: metrics | |
singular: metric | |
conditions: | |
- lastTransitionTime: "2019-12-03T10:54:07Z" | |
message: no conflicts found | |
reason: NoConflicts | |
status: "True" | |
type: NamesAccepted | |
- lastTransitionTime: null | |
message: the initial names have been accepted | |
reason: InitialNamesAccepted | |
status: "True" | |
type: Established | |
storedVersions: | |
- v1alpha1 | |
- apiVersion: apiextensions.k8s.io/v1beta1 | |
kind: CustomResourceDefinition | |
metadata: | |
annotations: | |
kubectl.kubernetes.io/last-applied-configuration: | | |
{"apiVersion":"apiextensions.k8s.io/v1beta1","kind":"CustomResourceDefinition","metadata":{"annotations":{},"labels":{"knative.dev/crd-install":"true","serving.knative.dev/release":"devel"},"name":"podautoscalers.autoscaling.internal.knative.dev"},"spec":{"additionalPrinterColumns":[{"JSONPath":".status.desiredScale","name":"DesiredScale","type":"integer"},{"JSONPath":".status.actualScale","name":"ActualScale","type":"integer"},{"JSONPath":".status.conditions[?(@.type=='Ready')].status","name":"Ready","type":"string"},{"JSONPath":".status.conditions[?(@.type=='Ready')].reason","name":"Reason","type":"string"}],"group":"autoscaling.internal.knative.dev","names":{"categories":["knative-internal","autoscaling"],"kind":"PodAutoscaler","plural":"podautoscalers","shortNames":["kpa","pa"],"singular":"podautoscaler"},"scope":"Namespaced","subresources":{"status":{}},"versions":[{"name":"v1alpha1","served":true,"storage":true}]}} | |
creationTimestamp: "2019-12-03T10:54:08Z" | |
generation: 1 | |
labels: | |
knative.dev/crd-install: "true" | |
serving.knative.dev/release: devel | |
name: podautoscalers.autoscaling.internal.knative.dev | |
resourceVersion: "43840" | |
selfLink: /apis/apiextensions.k8s.io/v1beta1/customresourcedefinitions/podautoscalers.autoscaling.internal.knative.dev | |
uid: 3b0250a5-15bb-11ea-b5af-027e0b84da98 | |
spec: | |
additionalPrinterColumns: | |
- JSONPath: .status.desiredScale | |
name: DesiredScale | |
type: integer | |
- JSONPath: .status.actualScale | |
name: ActualScale | |
type: integer | |
- JSONPath: .status.conditions[?(@.type=='Ready')].status | |
name: Ready | |
type: string | |
- JSONPath: .status.conditions[?(@.type=='Ready')].reason | |
name: Reason | |
type: string | |
conversion: | |
strategy: None | |
group: autoscaling.internal.knative.dev | |
names: | |
categories: | |
- knative-internal | |
- autoscaling | |
kind: PodAutoscaler | |
listKind: PodAutoscalerList | |
plural: podautoscalers | |
shortNames: | |
- kpa | |
- pa | |
singular: podautoscaler | |
scope: Namespaced | |
subresources: | |
status: {} | |
version: v1alpha1 | |
versions: | |
- name: v1alpha1 | |
served: true | |
storage: true | |
status: | |
acceptedNames: | |
categories: | |
- knative-internal | |
- autoscaling | |
kind: PodAutoscaler | |
listKind: PodAutoscalerList | |
plural: podautoscalers | |
shortNames: | |
- kpa | |
- pa | |
singular: podautoscaler | |
conditions: | |
- lastTransitionTime: "2019-12-03T10:54:08Z" | |
message: no conflicts found | |
reason: NoConflicts | |
status: "True" | |
type: NamesAccepted | |
- lastTransitionTime: null | |
message: the initial names have been accepted | |
reason: InitialNamesAccepted | |
status: "True" | |
type: Established | |
storedVersions: | |
- v1alpha1 | |
- apiVersion: apiextensions.k8s.io/v1beta1 | |
kind: CustomResourceDefinition | |
metadata: | |
annotations: | |
helm.sh/resource-policy: keep | |
kubectl.kubernetes.io/last-applied-configuration: | | |
{"apiVersion":"apiextensions.k8s.io/v1beta1","kind":"CustomResourceDefinition","metadata":{"annotations":{"helm.sh/resource-policy":"keep"},"creationTimestamp":null,"labels":{"app":"istio-citadel","chart":"istio","heritage":"Tiller","release":"istio"},"name":"policies.authentication.istio.io"},"spec":{"group":"authentication.istio.io","names":{"categories":["istio-io","authentication-istio-io"],"kind":"Policy","plural":"policies","singular":"policy"},"scope":"Namespaced","subresources":{"status":{}},"validation":{"openAPIV3Schema":{"properties":{"spec":{"description":"Authentication policy for Istio services. See more details at: https://istio.io/docs/reference/config/istio.authentication.v1alpha1.html","properties":{"originIsOptional":{"type":"boolean"},"origins":{"description":"List of authentication methods that can be used for origin authentication.","items":{"properties":{"jwt":{"description":"Jwt params for the method.","properties":{"audiences":{"items":{"format":"string","type":"string"},"type":"array"},"issuer":{"description":"Identifies the issuer that issued the JWT.","format":"string","type":"string"},"jwks":{"description":"JSON Web Key Set of public keys to validate signature of the JWT.","format":"string","type":"string"},"jwksUri":{"format":"string","type":"string"},"jwks_uri":{"format":"string","type":"string"},"jwtHeaders":{"description":"JWT is sent in a request header.","items":{"format":"string","type":"string"},"type":"array"},"jwtParams":{"description":"JWT is sent in a query parameter.","items":{"format":"string","type":"string"},"type":"array"},"jwt_headers":{"description":"JWT is sent in a request header.","items":{"format":"string","type":"string"},"type":"array"},"triggerRules":{"items":{"properties":{"excludedPaths":{"description":"List of paths to be excluded from the request.","items":{"oneOf":[{"required":["exact"]},{"required":["prefix"]},{"required":["suffix"]},{"required":["regex"]}],"properties":{"exact":{"description":"exact string match.","format":"string","type":"string"},"prefix":{"description":"prefix-based match.","format":"string","type":"string"},"regex":{"description":"ECMAscript style regex-based match as defined by [EDCA-262](http://en.cppreference.com/w/cpp/regex/ecmascript).","format":"string","type":"string"},"suffix":{"description":"suffix-based match.","format":"string","type":"string"}},"type":"object"},"type":"array"},"excluded_paths":{"description":"List of paths to be excluded from the request.","items":{"oneOf":[{"required":["exact"]},{"required":["prefix"]},{"required":["suffix"]},{"required":["regex"]}],"properties":{"exact":{"description":"exact string match.","format":"string","type":"string"},"prefix":{"description":"prefix-based match.","format":"string","type":"string"},"regex":{"description":"ECMAscript style regex-based match as defined by [EDCA-262](http://en.cppreference.com/w/cpp/regex/ecmascript).","format":"string","type":"string"},"suffix":{"description":"suffix-based match.","format":"string","type":"string"}},"type":"object"},"type":"array"},"includedPaths":{"description":"List of paths that the request must include.","items":{"oneOf":[{"required":["exact"]},{"required":["prefix"]},{"required":["suffix"]},{"required":["regex"]}],"properties":{"exact":{"description":"exact string match.","format":"string","type":"string"},"prefix":{"description":"prefix-based match.","format":"string","type":"string"},"regex":{"description":"ECMAscript style regex-based match as defined by [EDCA-262](http://en.cppreference.com/w/cpp/regex/ecmascript).","format":"string","type":"string"},"suffix":{"description":"suffix-based match.","format":"string","type":"string"}},"type":"object"},"type":"array"},"included_paths":{"description":"List of paths that the request must include.","items":{"oneOf":[{"required":["exact"]},{"required":["prefix"]},{"required":["suffix"]},{"required":["regex"]}],"properties":{"exact":{"description":"exact string match.","format":"string","type":"string"},"prefix":{"description":"prefix-based match.","format":"string","type":"string"},"regex":{"description":"ECMAscript style regex-based match as defined by [EDCA-262](http://en.cppreference.com/w/cpp/regex/ecmascript).","format":"string","type":"string"},"suffix":{"description":"suffix-based match.","format":"string","type":"string"}},"type":"object"},"type":"array"}},"type":"object"},"type":"array"},"trigger_rules":{"items":{"properties":{"excludedPaths":{"description":"List of paths to be excluded from the request.","items":{"oneOf":[{"required":["exact"]},{"required":["prefix"]},{"required":["suffix"]},{"required":["regex"]}],"properties":{"exact":{"description":"exact string match.","format":"string","type":"string"},"prefix":{"description":"prefix-based match.","format":"string","type":"string"},"regex":{"description":"ECMAscript style regex-based match as defined by [EDCA-262](http://en.cppreference.com/w/cpp/regex/ecmascript).","format":"string","type":"string"},"suffix":{"description":"suffix-based match.","format":"string","type":"string"}},"type":"object"},"type":"array"},"excluded_paths":{"description":"List of paths to be excluded from the request.","items":{"oneOf":[{"required":["exact"]},{"required":["prefix"]},{"required":["suffix"]},{"required":["regex"]}],"properties":{"exact":{"description":"exact string match.","format":"string","type":"string"},"prefix":{"description":"prefix-based match.","format":"string","type":"string"},"regex":{"description":"ECMAscript style regex-based match as defined by [EDCA-262](http://en.cppreference.com/w/cpp/regex/ecmascript).","format":"string","type":"string"},"suffix":{"description":"suffix-based match.","format":"string","type":"string"}},"type":"object"},"type":"array"},"includedPaths":{"description":"List of paths that the request must include.","items":{"oneOf":[{"required":["exact"]},{"required":["prefix"]},{"required":["suffix"]},{"required":["regex"]}],"properties":{"exact":{"description":"exact string match.","format":"string","type":"string"},"prefix":{"description":"prefix-based match.","format":"string","type":"string"},"regex":{"description":"ECMAscript style regex-based match as defined by [EDCA-262](http://en.cppreference.com/w/cpp/regex/ecmascript).","format":"string","type":"string"},"suffix":{"description":"suffix-based match.","format":"string","type":"string"}},"type":"object"},"type":"array"},"included_paths":{"description":"List of paths that the request must include.","items":{"oneOf":[{"required":["exact"]},{"required":["prefix"]},{"required":["suffix"]},{"required":["regex"]}],"properties":{"exact":{"description":"exact string match.","format":"string","type":"string"},"prefix":{"description":"prefix-based match.","format":"string","type":"string"},"regex":{"description":"ECMAscript style regex-based match as defined by [EDCA-262](http://en.cppreference.com/w/cpp/regex/ecmascript).","format":"string","type":"string"},"suffix":{"description":"suffix-based match.","format":"string","type":"string"}},"type":"object"},"type":"array"}},"type":"object"},"type":"array"}},"type":"object"}},"type":"object"},"type":"array"},"peerIsOptional":{"type":"boolean"},"peers":{"description":"List of authentication methods that can be used for peer authentication.","items":{"oneOf":[{"required":["mtls"]},{"required":["jwt"]}],"properties":{"jwt":{"properties":{"audiences":{"items":{"format":"string","type":"string"},"type":"array"},"issuer":{"description":"Identifies the issuer that issued the JWT.","format":"string","type":"string"},"jwks":{"description":"JSON Web Key Set of public keys to validate signature of the JWT.","format":"string","type":"string"},"jwksUri":{"format":"string","type":"string"},"jwks_uri":{"format":"string","type":"string"},"jwtHeaders":{"description":"JWT is sent in a request header.","items":{"format":"string","type":"string"},"type":"array"},"jwtParams":{"description":"JWT is sent in a query parameter.","items":{"format":"string","type":"string"},"type":"array"},"jwt_headers":{"description":"JWT is sent in a request header.","items":{"format":"string","type":"string"},"type":"array"},"triggerRules":{"items":{"properties":{"excludedPaths":{"description":"List of paths to be excluded from the request.","items":{"oneOf":[{"required":["exact"]},{"required":["prefix"]},{"required":["suffix"]},{"required":["regex"]}],"properties":{"exact":{"description":"exact string match.","format":"string","type":"string"},"prefix":{"description":"prefix-based match.","format":"string","type":"string"},"regex":{"description":"ECMAscript style regex-based match as defined by [EDCA-262](http://en.cppreference.com/w/cpp/regex/ecmascript).","format":"string","type":"string"},"suffix":{"description":"suffix-based match.","format":"string","type":"string"}},"type":"object"},"type":"array"},"excluded_paths":{"description":"List of paths to be excluded from the request.","items":{"oneOf":[{"required":["exact"]},{"required":["prefix"]},{"required":["suffix"]},{"required":["regex"]}],"properties":{"exact":{"description":"exact string match.","format":"string","type":"string"},"prefix":{"description":"prefix-based match.","format":"string","type":"string"},"regex":{"description":"ECMAscript style regex-based match as defined by [EDCA-262](http://en.cppreference.com/w/cpp/regex/ecmascript).","format":"string","type":"string"},"suffix":{"description":"suffix-based match.","format":"string","type":"string"}},"type":"object"},"type":"array"},"includedPaths":{"description":"List of paths that the request must include.","items":{"oneOf":[{"required":["exact"]},{"required":["prefix"]},{"required":["suffix"]},{"required":["regex"]}],"properties":{"exact":{"description":"exact string match.","format":"string","type":"string"},"prefix":{"description":"prefix-based match.","format":"string","type":"string"},"regex":{"description":"ECMAscript style regex-based match as defined by [EDCA-262](http://en.cppreference.com/w/cpp/regex/ecmascript).","format":"string","type":"string"},"suffix":{"description":"suffix-based match.","format":"string","type":"string"}},"type":"object"},"type":"array"},"included_paths":{"description":"List of paths that the request must include.","items":{"oneOf":[{"required":["exact"]},{"required":["prefix"]},{"required":["suffix"]},{"required":["regex"]}],"properties":{"exact":{"description":"exact string match.","format":"string","type":"string"},"prefix":{"description":"prefix-based match.","format":"string","type":"string"},"regex":{"description":"ECMAscript style regex-based match as defined by [EDCA-262](http://en.cppreference.com/w/cpp/regex/ecmascript).","format":"string","type":"string"},"suffix":{"description":"suffix-based match.","format":"string","type":"string"}},"type":"object"},"type":"array"}},"type":"object"},"type":"array"},"trigger_rules":{"items":{"properties":{"excludedPaths":{"description":"List of paths to be excluded from the request.","items":{"oneOf":[{"required":["exact"]},{"required":["prefix"]},{"required":["suffix"]},{"required":["regex"]}],"properties":{"exact":{"description":"exact string match.","format":"string","type":"string"},"prefix":{"description":"prefix-based match.","format":"string","type":"string"},"regex":{"description":"ECMAscript style regex-based match as defined by [EDCA-262](http://en.cppreference.com/w/cpp/regex/ecmascript).","format":"string","type":"string"},"suffix":{"description":"suffix-based match.","format":"string","type":"string"}},"type":"object"},"type":"array"},"excluded_paths":{"description":"List of paths to be excluded from the request.","items":{"oneOf":[{"required":["exact"]},{"required":["prefix"]},{"required":["suffix"]},{"required":["regex"]}],"properties":{"exact":{"description":"exact string match.","format":"string","type":"string"},"prefix":{"description":"prefix-based match.","format":"string","type":"string"},"regex":{"description":"ECMAscript style regex-based match as defined by [EDCA-262](http://en.cppreference.com/w/cpp/regex/ecmascript).","format":"string","type":"string"},"suffix":{"description":"suffix-based match.","format":"string","type":"string"}},"type":"object"},"type":"array"},"includedPaths":{"description":"List of paths that the request must include.","items":{"oneOf":[{"required":["exact"]},{"required":["prefix"]},{"required":["suffix"]},{"required":["regex"]}],"properties":{"exact":{"description":"exact string match.","format":"string","type":"string"},"prefix":{"description":"prefix-based match.","format":"string","type":"string"},"regex":{"description":"ECMAscript style regex-based match as defined by [EDCA-262](http://en.cppreference.com/w/cpp/regex/ecmascript).","format":"string","type":"string"},"suffix":{"description":"suffix-based match.","format":"string","type":"string"}},"type":"object"},"type":"array"},"included_paths":{"description":"List of paths that the request must include.","items":{"oneOf":[{"required":["exact"]},{"required":["prefix"]},{"required":["suffix"]},{"required":["regex"]}],"properties":{"exact":{"description":"exact string match.","format":"string","type":"string"},"prefix":{"description":"prefix-based match.","format":"string","type":"string"},"regex":{"description":"ECMAscript style regex-based match as defined by [EDCA-262](http://en.cppreference.com/w/cpp/regex/ecmascript).","format":"string","type":"string"},"suffix":{"description":"suffix-based match.","format":"string","type":"string"}},"type":"object"},"type":"array"}},"type":"object"},"type":"array"}},"type":"object"},"mtls":{"description":"Set if mTLS is used.","properties":{"allowTls":{"description":"WILL BE DEPRECATED, if set, will translates to `TLS_PERMISSIVE` mode.","type":"boolean"},"mode":{"description":"Defines the mode of mTLS authentication.","enum":["STRICT","PERMISSIVE"],"type":"string"}},"type":"object"}},"type":"object"},"type":"array"},"principalBinding":{"description":"Define whether peer or origin identity should be use for principal.","enum":["USE_PEER","USE_ORIGIN"],"type":"string"},"targets":{"description":"List rules to select workloads that the policy should be applied on.","items":{"properties":{"labels":{"additionalProperties":{"format":"string","type":"string"},"type":"object"},"name":{"description":"The name must be a short name from the service registry.","format":"string","type":"string"},"ports":{"description":"Specifies the ports.","items":{"oneOf":[{"required":["number"]},{"required":["name"]}],"properties":{"name":{"format":"string","type":"string"},"number":{"type":"integer"}},"type":"object"},"type":"array"}},"type":"object"},"type":"array"}},"type":"object"}},"type":"object"}},"versions":[{"name":"v1alpha1","served":true,"storage":true}]},"status":{"acceptedNames":{"kind":"","plural":""},"conditions":[],"storedVersions":[]}} | |
creationTimestamp: "2019-12-03T04:51:49Z" | |
generation: 3 | |
labels: | |
app: istio-citadel | |
chart: istio | |
heritage: Tiller | |
release: istio | |
name: policies.authentication.istio.io | |
resourceVersion: "43308" | |
selfLink: /apis/apiextensions.k8s.io/v1beta1/customresourcedefinitions/policies.authentication.istio.io | |
uid: 9d8a038d-1588-11ea-b5af-027e0b84da98 | |
spec: | |
conversion: | |
strategy: None | |
group: authentication.istio.io | |
names: | |
categories: | |
- istio-io | |
- authentication-istio-io | |
kind: Policy | |
listKind: PolicyList | |
plural: policies | |
singular: policy | |
scope: Namespaced | |
subresources: | |
status: {} | |
validation: | |
openAPIV3Schema: | |
properties: | |
spec: | |
description: 'Authentication policy for Istio services. See more details | |
at: https://istio.io/docs/reference/config/istio.authentication.v1alpha1.html' | |
properties: | |
originIsOptional: | |
type: boolean | |
origins: | |
description: List of authentication methods that can be used for origin | |
authentication. | |
items: | |
properties: | |
jwt: | |
description: Jwt params for the method. | |
properties: | |
audiences: | |
items: | |
format: string | |
type: string | |
type: array | |
issuer: | |
description: Identifies the issuer that issued the JWT. | |
format: string | |
type: string | |
jwks: | |
description: JSON Web Key Set of public keys to validate | |
signature of the JWT. | |
format: string | |
type: string | |
jwks_uri: | |
format: string | |
type: string | |
jwksUri: | |
format: string | |
type: string | |
jwt_headers: | |
description: JWT is sent in a request header. | |
items: | |
format: string | |
type: string | |
type: array | |
jwtHeaders: | |
description: JWT is sent in a request header. | |
items: | |
format: string | |
type: string | |
type: array | |
jwtParams: | |
description: JWT is sent in a query parameter. | |
items: | |
format: string | |
type: string | |
type: array | |
trigger_rules: | |
items: | |
properties: | |
excluded_paths: | |
description: List of paths to be excluded from the | |
request. | |
items: | |
oneOf: | |
- required: | |
- exact | |
- required: | |
- prefix | |
- required: | |
- suffix | |
- required: | |
- regex | |
properties: | |
exact: | |
description: exact string match. | |
format: string | |
type: string | |
prefix: | |
description: prefix-based match. | |
format: string | |
type: string | |
regex: | |
description: ECMAscript style regex-based match | |
as defined by [EDCA-262](http://en.cppreference.com/w/cpp/regex/ecmascript). | |
format: string | |
type: string | |
suffix: | |
description: suffix-based match. | |
format: string | |
type: string | |
type: object | |
type: array | |
excludedPaths: | |
description: List of paths to be excluded from the | |
request. | |
items: | |
oneOf: | |
- required: | |
- exact | |
- required: | |
- prefix | |
- required: | |
- suffix | |
- required: | |
- regex | |
properties: | |
exact: | |
description: exact string match. | |
format: string | |
type: string | |
prefix: | |
description: prefix-based match. | |
format: string | |
type: string | |
regex: | |
description: ECMAscript style regex-based match | |
as defined by [EDCA-262](http://en.cppreference.com/w/cpp/regex/ecmascript). | |
format: string | |
type: string | |
suffix: | |
description: suffix-based match. | |
format: string | |
type: string | |
type: object | |
type: array | |
included_paths: | |
description: List of paths that the request must include. | |
items: | |
oneOf: | |
- required: | |
- exact | |
- required: | |
- prefix | |
- required: | |
- suffix | |
- required: | |
- regex | |
properties: | |
exact: | |
description: exact string match. | |
format: string | |
type: string | |
prefix: | |
description: prefix-based match. | |
format: string | |
type: string | |
regex: | |
description: ECMAscript style regex-based match | |
as defined by [EDCA-262](http://en.cppreference.com/w/cpp/regex/ecmascript). | |
format: string | |
type: string | |
suffix: | |
description: suffix-based match. | |
format: string | |
type: string | |
type: object | |
type: array | |
includedPaths: | |
description: List of paths that the request must include. | |
items: | |
oneOf: | |
- required: | |
- exact | |
- required: | |
- prefix | |
- required: | |
- suffix | |
- required: | |
- regex | |
properties: | |
exact: | |
description: exact string match. | |
format: string | |
type: string | |
prefix: | |
description: prefix-based match. | |
format: string | |
type: string | |
regex: | |
description: ECMAscript style regex-based match | |
as defined by [EDCA-262](http://en.cppreference.com/w/cpp/regex/ecmascript). | |
format: string | |
type: string | |
suffix: | |
description: suffix-based match. | |
format: string | |
type: string | |
type: object | |
type: array | |
type: object | |
type: array | |
triggerRules: | |
items: | |
properties: | |
excluded_paths: | |
description: List of paths to be excluded from the | |
request. | |
items: | |
oneOf: | |
- required: | |
- exact | |
- required: | |
- prefix | |
- required: | |
- suffix | |
- required: | |
- regex | |
properties: | |
exact: | |
description: exact string match. | |
format: string | |
type: string | |
prefix: | |
description: prefix-based match. | |
format: string | |
type: string | |
regex: | |
description: ECMAscript style regex-based match | |
as defined by [EDCA-262](http://en.cppreference.com/w/cpp/regex/ecmascript). | |
format: string | |
type: string | |
suffix: | |
description: suffix-based match. | |
format: string | |
type: string | |
type: object | |
type: array | |
excludedPaths: | |
description: List of paths to be excluded from the | |
request. | |
items: | |
oneOf: | |
- required: | |
- exact | |
- required: | |
- prefix | |
- required: | |
- suffix | |
- required: | |
- regex | |
properties: | |
exact: | |
description: exact string match. | |
format: string | |
type: string | |
prefix: | |
description: prefix-based match. | |
format: string | |
type: string | |
regex: | |
description: ECMAscript style regex-based match | |
as defined by [EDCA-262](http://en.cppreference.com/w/cpp/regex/ecmascript). | |
format: string | |
type: string | |
suffix: | |
description: suffix-based match. | |
format: string | |
type: string | |
type: object | |
type: array | |
included_paths: | |
description: List of paths that the request must include. | |
items: | |
oneOf: | |
- required: | |
- exact | |
- required: | |
- prefix | |
- required: | |
- suffix | |
- required: | |
- regex | |
properties: | |
exact: | |
description: exact string match. | |
format: string | |
type: string | |
prefix: | |
description: prefix-based match. | |
format: string | |
type: string | |
regex: | |
description: ECMAscript style regex-based match | |
as defined by [EDCA-262](http://en.cppreference.com/w/cpp/regex/ecmascript). | |
format: string | |
type: string | |
suffix: | |
description: suffix-based match. | |
format: string | |
type: string | |
type: object | |
type: array | |
includedPaths: | |
description: List of paths that the request must include. | |
items: | |
oneOf: | |
- required: | |
- exact | |
- required: | |
- prefix | |
- required: | |
- suffix | |
- required: | |
- regex | |
properties: | |
exact: | |
description: exact string match. | |
format: string | |
type: string | |
prefix: | |
description: prefix-based match. | |
format: string | |
type: string | |
regex: | |
description: ECMAscript style regex-based match | |
as defined by [EDCA-262](http://en.cppreference.com/w/cpp/regex/ecmascript). | |
format: string | |
type: string | |
suffix: | |
description: suffix-based match. | |
format: string | |
type: string | |
type: object | |
type: array | |
type: object | |
type: array | |
type: object | |
type: object | |
type: array | |
peerIsOptional: | |
type: boolean | |
peers: | |
description: List of authentication methods that can be used for peer | |
authentication. | |
items: | |
oneOf: | |
- required: | |
- mtls | |
- required: | |
- jwt | |
properties: | |
jwt: | |
properties: | |
audiences: | |
items: | |
format: string | |
type: string | |
type: array | |
issuer: | |
description: Identifies the issuer that issued the JWT. | |
format: string | |
type: string | |
jwks: | |
description: JSON Web Key Set of public keys to validate | |
signature of the JWT. | |
format: string | |
type: string | |
jwks_uri: | |
format: string | |
type: string | |
jwksUri: | |
format: string | |
type: string | |
jwt_headers: | |
description: JWT is sent in a request header. | |
items: | |
format: string | |
type: string | |
type: array | |
jwtHeaders: | |
description: JWT is sent in a request header. | |
items: | |
format: string | |
type: string | |
type: array | |
jwtParams: | |
description: JWT is sent in a query parameter. | |
items: | |
format: string | |
type: string | |
type: array | |
trigger_rules: | |
items: | |
properties: | |
excluded_paths: | |
description: List of paths to be excluded from the | |
request. | |
items: | |
oneOf: | |
- required: | |
- exact | |
- required: | |
- prefix | |
- required: | |
- suffix | |
- required: | |
- regex | |
properties: | |
exact: | |
description: exact string match. | |
format: string | |
type: string | |
prefix: | |
description: prefix-based match. | |
format: string | |
type: string | |
regex: | |
description: ECMAscript style regex-based match | |
as defined by [EDCA-262](http://en.cppreference.com/w/cpp/regex/ecmascript). | |
format: string | |
type: string | |
suffix: | |
description: suffix-based match. | |
format: string | |
type: string | |
type: object | |
type: array | |
excludedPaths: | |
description: List of paths to be excluded from the | |
request. | |
items: | |
oneOf: | |
- required: | |
- exact | |
- required: | |
- prefix | |
- required: | |
- suffix | |
- required: | |
- regex | |
properties: | |
exact: | |
description: exact string match. | |
format: string | |
type: string | |
prefix: | |
description: prefix-based match. | |
format: string | |
type: string | |
regex: | |
description: ECMAscript style regex-based match | |
as defined by [EDCA-262](http://en.cppreference.com/w/cpp/regex/ecmascript). | |
format: string | |
type: string | |
suffix: | |
description: suffix-based match. | |
format: string | |
type: string | |
type: object | |
type: array | |
included_paths: | |
description: List of paths that the request must include. | |
items: | |
oneOf: | |
- required: | |
- exact | |
- required: | |
- prefix | |
- required: | |
- suffix | |
- required: | |
- regex | |
properties: | |
exact: | |
description: exact string match. | |
format: string | |
type: string | |
prefix: | |
description: prefix-based match. | |
format: string | |
type: string | |
regex: | |
description: ECMAscript style regex-based match | |
as defined by [EDCA-262](http://en.cppreference.com/w/cpp/regex/ecmascript). | |
format: string | |
type: string | |
suffix: | |
description: suffix-based match. | |
format: string | |
type: string | |
type: object | |
type: array | |
includedPaths: | |
description: List of paths that the request must include. | |
items: | |
oneOf: | |
- required: | |
- exact | |
- required: | |
- prefix | |
- required: | |
- suffix | |
- required: | |
- regex | |
properties: | |
exact: | |
description: exact string match. | |
format: string | |
type: string | |
prefix: | |
description: prefix-based match. | |
format: string | |
type: string | |
regex: | |
description: ECMAscript style regex-based match | |
as defined by [EDCA-262](http://en.cppreference.com/w/cpp/regex/ecmascript). | |
format: string | |
type: string | |
suffix: | |
description: suffix-based match. | |
format: string | |
type: string | |
type: object | |
type: array | |
type: object | |
type: array | |
triggerRules: | |
items: | |
properties: | |
excluded_paths: | |
description: List of paths to be excluded from the | |
request. | |
items: | |
oneOf: | |
- required: | |
- exact | |
- required: | |
- prefix | |
- required: | |
- suffix | |
- required: | |
- regex | |
properties: | |
exact: | |
description: exact string match. | |
format: string | |
type: string | |
prefix: | |
description: prefix-based match. | |
format: string | |
type: string | |
regex: | |
description: ECMAscript style regex-based match | |
as defined by [EDCA-262](http://en.cppreference.com/w/cpp/regex/ecmascript). | |
format: string | |
type: string | |
suffix: | |
description: suffix-based match. | |
format: string | |
type: string | |
type: object | |
type: array | |
excludedPaths: | |
description: List of paths to be excluded from the | |
request. | |
items: | |
oneOf: | |
- required: | |
- exact | |
- required: | |
- prefix | |
- required: | |
- suffix | |
- required: | |
- regex | |
properties: | |
exact: | |
description: exact string match. | |
format: string | |
type: string | |
prefix: | |
description: prefix-based match. | |
format: string | |
type: string | |
regex: | |
description: ECMAscript style regex-based match | |
as defined by [EDCA-262](http://en.cppreference.com/w/cpp/regex/ecmascript). | |
format: string | |
type: string | |
suffix: | |
description: suffix-based match. | |
format: string | |
type: string | |
type: object | |
type: array | |
included_paths: | |
description: List of paths that the request must include. | |
items: | |
oneOf: | |
- required: | |
- exact | |
- required: | |
- prefix | |
- required: | |
- suffix | |
- required: | |
- regex | |
properties: | |
exact: | |
description: exact string match. | |
format: string | |
type: string | |
prefix: | |
description: prefix-based match. | |
format: string | |
type: string | |
regex: | |
description: ECMAscript style regex-based match | |
as defined by [EDCA-262](http://en.cppreference.com/w/cpp/regex/ecmascript). | |
format: string | |
type: string | |
suffix: | |
description: suffix-based match. | |
format: string | |
type: string | |
type: object | |
type: array | |
includedPaths: | |
description: List of paths that the request must include. | |
items: | |
oneOf: | |
- required: | |
- exact | |
- required: | |
- prefix | |
- required: | |
- suffix | |
- required: | |
- regex | |
properties: | |
exact: | |
description: exact string match. | |
format: string | |
type: string | |
prefix: | |
description: prefix-based match. | |
format: string | |
type: string | |
regex: | |
description: ECMAscript style regex-based match | |
as defined by [EDCA-262](http://en.cppreference.com/w/cpp/regex/ecmascript). | |
format: string | |
type: string | |
suffix: | |
description: suffix-based match. | |
format: string | |
type: string | |
type: object | |
type: array | |
type: object | |
type: array | |
type: object | |
mtls: | |
description: Set if mTLS is used. | |
properties: | |
allowTls: | |
description: WILL BE DEPRECATED, if set, will translates | |
to `TLS_PERMISSIVE` mode. | |
type: boolean | |
mode: | |
description: Defines the mode of mTLS authentication. | |
enum: | |
- STRICT | |
- PERMISSIVE | |
type: string | |
type: object | |
type: object | |
type: array | |
principalBinding: | |
description: Define whether peer or origin identity should be use | |
for principal. | |
enum: | |
- USE_PEER | |
- USE_ORIGIN | |
type: string | |
targets: | |
description: List rules to select workloads that the policy should | |
be applied on. | |
items: | |
properties: | |
labels: | |
additionalProperties: | |
format: string | |
type: string | |
type: object | |
name: | |
description: The name must be a short name from the service | |
registry. | |
format: string | |
type: string | |
ports: | |
description: Specifies the ports. | |
items: | |
oneOf: | |
- required: | |
- number | |
- required: | |
- name | |
properties: | |
name: | |
format: string | |
type: string | |
number: | |
type: integer | |
type: object | |
type: array | |
type: object | |
type: array | |
type: object | |
type: object | |
version: v1alpha1 | |
versions: | |
- name: v1alpha1 | |
served: true | |
storage: true | |
status: | |
acceptedNames: | |
categories: | |
- istio-io | |
- authentication-istio-io | |
kind: Policy | |
listKind: PolicyList | |
plural: policies | |
singular: policy | |
conditions: | |
- lastTransitionTime: "2019-12-03T04:51:49Z" | |
message: no conflicts found | |
reason: NoConflicts | |
status: "True" | |
type: NamesAccepted | |
- lastTransitionTime: null | |
message: the initial names have been accepted | |
reason: InitialNamesAccepted | |
status: "True" | |
type: Established | |
storedVersions: | |
- v1alpha1 | |
- apiVersion: apiextensions.k8s.io/v1beta1 | |
kind: CustomResourceDefinition | |
metadata: | |
annotations: | |
helm.sh/resource-policy: keep | |
kubectl.kubernetes.io/last-applied-configuration: | | |
{"apiVersion":"apiextensions.k8s.io/v1beta1","kind":"CustomResourceDefinition","metadata":{"annotations":{"helm.sh/resource-policy":"keep"},"creationTimestamp":null,"labels":{"app":"istio-mixer","chart":"istio","heritage":"Tiller","release":"istio"},"name":"quotaspecbindings.config.istio.io"},"spec":{"group":"config.istio.io","names":{"categories":["istio-io","apim-istio-io"],"kind":"QuotaSpecBinding","plural":"quotaspecbindings","singular":"quotaspecbinding"},"scope":"Namespaced","subresources":{"status":{}},"validation":{"openAPIV3Schema":{"properties":{"spec":{"properties":{"quotaSpecs":{"items":{"properties":{"name":{"description":"The short name of the QuotaSpec.","format":"string","type":"string"},"namespace":{"description":"Optional namespace of the QuotaSpec.","format":"string","type":"string"}},"type":"object"},"type":"array"},"services":{"description":"One or more services to map the listed QuotaSpec onto.","items":{"properties":{"domain":{"description":"Domain suffix used to construct the service FQDN in implementations that support such specification.","format":"string","type":"string"},"labels":{"additionalProperties":{"format":"string","type":"string"},"description":"Optional one or more labels that uniquely identify the service version.","type":"object"},"name":{"description":"The short name of the service such as \"foo\".","format":"string","type":"string"},"namespace":{"description":"Optional namespace of the service.","format":"string","type":"string"},"service":{"description":"The service FQDN.","format":"string","type":"string"}},"type":"object"},"type":"array"}},"type":"object"}},"type":"object"}},"versions":[{"name":"v1alpha2","served":true,"storage":true}]},"status":{"acceptedNames":{"kind":"","plural":""},"conditions":[],"storedVersions":[]}} | |
creationTimestamp: "2019-12-03T04:51:49Z" | |
generation: 3 | |
labels: | |
app: istio-mixer | |
chart: istio | |
heritage: Tiller | |
release: istio | |
name: quotaspecbindings.config.istio.io | |
resourceVersion: "43309" | |
selfLink: /apis/apiextensions.k8s.io/v1beta1/customresourcedefinitions/quotaspecbindings.config.istio.io | |
uid: 9d8e9fd0-1588-11ea-b5af-027e0b84da98 | |
spec: | |
conversion: | |
strategy: None | |
group: config.istio.io | |
names: | |
categories: | |
- istio-io | |
- apim-istio-io | |
kind: QuotaSpecBinding | |
listKind: QuotaSpecBindingList | |
plural: quotaspecbindings | |
singular: quotaspecbinding | |
scope: Namespaced | |
subresources: | |
status: {} | |
validation: | |
openAPIV3Schema: | |
properties: | |
spec: | |
properties: | |
quotaSpecs: | |
items: | |
properties: | |
name: | |
description: The short name of the QuotaSpec. | |
format: string | |
type: string | |
namespace: | |
description: Optional namespace of the QuotaSpec. | |
format: string | |
type: string | |
type: object | |
type: array | |
services: | |
description: One or more services to map the listed QuotaSpec onto. | |
items: | |
properties: | |
domain: | |
description: Domain suffix used to construct the service FQDN | |
in implementations that support such specification. | |
format: string | |
type: string | |
labels: | |
additionalProperties: | |
format: string | |
type: string | |
description: Optional one or more labels that uniquely identify | |
the service version. | |
type: object | |
name: | |
description: The short name of the service such as "foo". | |
format: string | |
type: string | |
namespace: | |
description: Optional namespace of the service. | |
format: string | |
type: string | |
service: | |
description: The service FQDN. | |
format: string | |
type: string | |
type: object | |
type: array | |
type: object | |
type: object | |
version: v1alpha2 | |
versions: | |
- name: v1alpha2 | |
served: true | |
storage: true | |
status: | |
acceptedNames: | |
categories: | |
- istio-io | |
- apim-istio-io | |
kind: QuotaSpecBinding | |
listKind: QuotaSpecBindingList | |
plural: quotaspecbindings | |
singular: quotaspecbinding | |
conditions: | |
- lastTransitionTime: "2019-12-03T04:51:49Z" | |
message: no conflicts found | |
reason: NoConflicts | |
status: "True" | |
type: NamesAccepted | |
- lastTransitionTime: null | |
message: the initial names have been accepted | |
reason: InitialNamesAccepted | |
status: "True" | |
type: Established | |
storedVersions: | |
- v1alpha2 | |
- apiVersion: apiextensions.k8s.io/v1beta1 | |
kind: CustomResourceDefinition | |
metadata: | |
annotations: | |
helm.sh/resource-policy: keep | |
kubectl.kubernetes.io/last-applied-configuration: | | |
{"apiVersion":"apiextensions.k8s.io/v1beta1","kind":"CustomResourceDefinition","metadata":{"annotations":{"helm.sh/resource-policy":"keep"},"creationTimestamp":null,"labels":{"app":"istio-mixer","chart":"istio","heritage":"Tiller","release":"istio"},"name":"quotaspecs.config.istio.io"},"spec":{"group":"config.istio.io","names":{"categories":["istio-io","apim-istio-io"],"kind":"QuotaSpec","plural":"quotaspecs","singular":"quotaspec"},"scope":"Namespaced","subresources":{"status":{}},"validation":{"openAPIV3Schema":{"properties":{"spec":{"description":"Determines the quotas used for individual requests.","properties":{"rules":{"description":"A list of Quota rules.","items":{"properties":{"match":{"description":"If empty, match all request.","items":{"properties":{"clause":{"additionalProperties":{"oneOf":[{"required":["exact"]},{"required":["prefix"]},{"required":["regex"]}],"properties":{"exact":{"format":"string","type":"string"},"prefix":{"format":"string","type":"string"},"regex":{"format":"string","type":"string"}},"type":"object"},"description":"Map of attribute names to StringMatch type.","type":"object"}},"type":"object"},"type":"array"},"quotas":{"description":"The list of quotas to charge.","items":{"properties":{"charge":{"format":"int32","type":"integer"},"quota":{"format":"string","type":"string"}},"type":"object"},"type":"array"}},"type":"object"},"type":"array"}},"type":"object"}},"type":"object"}},"versions":[{"name":"v1alpha2","served":true,"storage":true}]},"status":{"acceptedNames":{"kind":"","plural":""},"conditions":[],"storedVersions":[]}} | |
creationTimestamp: "2019-12-03T04:51:49Z" | |
generation: 3 | |
labels: | |
app: istio-mixer | |
chart: istio | |
heritage: Tiller | |
release: istio | |
name: quotaspecs.config.istio.io | |
resourceVersion: "43310" | |
selfLink: /apis/apiextensions.k8s.io/v1beta1/customresourcedefinitions/quotaspecs.config.istio.io | |
uid: 9d8ffb4f-1588-11ea-b5af-027e0b84da98 | |
spec: | |
conversion: | |
strategy: None | |
group: config.istio.io | |
names: | |
categories: | |
- istio-io | |
- apim-istio-io | |
kind: QuotaSpec | |
listKind: QuotaSpecList | |
plural: quotaspecs | |
singular: quotaspec | |
scope: Namespaced | |
subresources: | |
status: {} | |
validation: | |
openAPIV3Schema: | |
properties: | |
spec: | |
description: Determines the quotas used for individual requests. | |
properties: | |
rules: | |
description: A list of Quota rules. | |
items: | |
properties: | |
match: | |
description: If empty, match all request. | |
items: | |
properties: | |
clause: | |
additionalProperties: | |
oneOf: | |
- required: | |
- exact | |
- required: | |
- prefix | |
- required: | |
- regex | |
properties: | |
exact: | |
format: string | |
type: string | |
prefix: | |
format: string | |
type: string | |
regex: | |
format: string | |
type: string | |
type: object | |
description: Map of attribute names to StringMatch type. | |
type: object | |
type: object | |
type: array | |
quotas: | |
description: The list of quotas to charge. | |
items: | |
properties: | |
charge: | |
format: int32 | |
type: integer | |
quota: | |
format: string | |
type: string | |
type: object | |
type: array | |
type: object | |
type: array | |
type: object | |
type: object | |
version: v1alpha2 | |
versions: | |
- name: v1alpha2 | |
served: true | |
storage: true | |
status: | |
acceptedNames: | |
categories: | |
- istio-io | |
- apim-istio-io | |
kind: QuotaSpec | |
listKind: QuotaSpecList | |
plural: quotaspecs | |
singular: quotaspec | |
conditions: | |
- lastTransitionTime: "2019-12-03T04:51:49Z" | |
message: no conflicts found | |
reason: NoConflicts | |
status: "True" | |
type: NamesAccepted | |
- lastTransitionTime: null | |
message: the initial names have been accepted | |
reason: InitialNamesAccepted | |
status: "True" | |
type: Established | |
storedVersions: | |
- v1alpha2 | |
- apiVersion: apiextensions.k8s.io/v1beta1 | |
kind: CustomResourceDefinition | |
metadata: | |
annotations: | |
helm.sh/resource-policy: keep | |
kubectl.kubernetes.io/last-applied-configuration: | | |
{"apiVersion":"apiextensions.k8s.io/v1beta1","kind":"CustomResourceDefinition","metadata":{"annotations":{"helm.sh/resource-policy":"keep"},"creationTimestamp":null,"labels":{"app":"mixer","chart":"istio","heritage":"Tiller","istio":"rbac","package":"istio.io.mixer","release":"istio"},"name":"rbacconfigs.rbac.istio.io"},"spec":{"group":"rbac.istio.io","names":{"categories":["istio-io","rbac-istio-io"],"kind":"RbacConfig","plural":"rbacconfigs","singular":"rbacconfig"},"scope":"Namespaced","subresources":{"status":{}},"validation":{"openAPIV3Schema":{"properties":{"spec":{"description":"Configuration for Role Based Access Control. See more details at: https://istio.io/docs/reference/config/authorization/istio.rbac.v1alpha1.html","properties":{"enforcementMode":{"enum":["ENFORCED","PERMISSIVE"],"type":"string"},"exclusion":{"description":"A list of services or namespaces that should not be enforced by Istio RBAC policies.","properties":{"namespaces":{"description":"A list of namespaces.","items":{"format":"string","type":"string"},"type":"array"},"services":{"description":"A list of services.","items":{"format":"string","type":"string"},"type":"array"}},"type":"object"},"inclusion":{"description":"A list of services or namespaces that should be enforced by Istio RBAC policies.","properties":{"namespaces":{"description":"A list of namespaces.","items":{"format":"string","type":"string"},"type":"array"},"services":{"description":"A list of services.","items":{"format":"string","type":"string"},"type":"array"}},"type":"object"},"mode":{"description":"Istio RBAC mode.","enum":["OFF","ON","ON_WITH_INCLUSION","ON_WITH_EXCLUSION"],"type":"string"}},"type":"object"}},"type":"object"}},"versions":[{"name":"v1alpha1","served":true,"storage":true}]},"status":{"acceptedNames":{"kind":"","plural":""},"conditions":[],"storedVersions":[]}} | |
creationTimestamp: "2019-12-03T04:51:49Z" | |
generation: 3 | |
labels: | |
app: mixer | |
chart: istio | |
heritage: Tiller | |
istio: rbac | |
package: istio.io.mixer | |
release: istio | |
name: rbacconfigs.rbac.istio.io | |
resourceVersion: "43311" | |
selfLink: /apis/apiextensions.k8s.io/v1beta1/customresourcedefinitions/rbacconfigs.rbac.istio.io | |
uid: 9d98b622-1588-11ea-b5af-027e0b84da98 | |
spec: | |
conversion: | |
strategy: None | |
group: rbac.istio.io | |
names: | |
categories: | |
- istio-io | |
- rbac-istio-io | |
kind: RbacConfig | |
listKind: RbacConfigList | |
plural: rbacconfigs | |
singular: rbacconfig | |
scope: Namespaced | |
subresources: | |
status: {} | |
validation: | |
openAPIV3Schema: | |
properties: | |
spec: | |
description: 'Configuration for Role Based Access Control. See more details | |
at: https://istio.io/docs/reference/config/authorization/istio.rbac.v1alpha1.html' | |
properties: | |
enforcementMode: | |
enum: | |
- ENFORCED | |
- PERMISSIVE | |
type: string | |
exclusion: | |
description: A list of services or namespaces that should not be enforced | |
by Istio RBAC policies. | |
properties: | |
namespaces: | |
description: A list of namespaces. | |
items: | |
format: string | |
type: string | |
type: array | |
services: | |
description: A list of services. | |
items: | |
format: string | |
type: string | |
type: array | |
type: object | |
inclusion: | |
description: A list of services or namespaces that should be enforced | |
by Istio RBAC policies. | |
properties: | |
namespaces: | |
description: A list of namespaces. | |
items: | |
format: string | |
type: string | |
type: array | |
services: | |
description: A list of services. | |
items: | |
format: string | |
type: string | |
type: array | |
type: object | |
mode: | |
description: Istio RBAC mode. | |
enum: | |
- "OFF" | |
- "ON" | |
- ON_WITH_INCLUSION | |
- ON_WITH_EXCLUSION | |
type: string | |
type: object | |
type: object | |
version: v1alpha1 | |
versions: | |
- name: v1alpha1 | |
served: true | |
storage: true | |
status: | |
acceptedNames: | |
categories: | |
- istio-io | |
- rbac-istio-io | |
kind: RbacConfig | |
listKind: RbacConfigList | |
plural: rbacconfigs | |
singular: rbacconfig | |
conditions: | |
- lastTransitionTime: "2019-12-03T04:51:49Z" | |
message: no conflicts found | |
reason: NoConflicts | |
status: "True" | |
type: NamesAccepted | |
- lastTransitionTime: null | |
message: the initial names have been accepted | |
reason: InitialNamesAccepted | |
status: "True" | |
type: Established | |
storedVersions: | |
- v1alpha1 | |
- apiVersion: apiextensions.k8s.io/v1beta1 | |
kind: CustomResourceDefinition | |
metadata: | |
annotations: | |
kubectl.kubernetes.io/last-applied-configuration: | | |
{"apiVersion":"apiextensions.k8s.io/v1beta1","kind":"CustomResourceDefinition","metadata":{"annotations":{},"labels":{"knative.dev/crd-install":"true","serving.knative.dev/release":"devel"},"name":"revisions.serving.knative.dev"},"spec":{"additionalPrinterColumns":[{"JSONPath":".metadata.labels['serving\\.knative\\.dev/configuration']","name":"Config Name","type":"string"},{"JSONPath":".status.serviceName","name":"K8s Service Name","type":"string"},{"JSONPath":".metadata.labels['serving\\.knative\\.dev/configurationGeneration']","name":"Generation","type":"string"},{"JSONPath":".status.conditions[?(@.type=='Ready')].status","name":"Ready","type":"string"},{"JSONPath":".status.conditions[?(@.type=='Ready')].reason","name":"Reason","type":"string"}],"group":"serving.knative.dev","names":{"categories":["all","knative","serving"],"kind":"Revision","plural":"revisions","shortNames":["rev"],"singular":"revision"},"scope":"Namespaced","subresources":{"status":{}},"versions":[{"name":"v1alpha1","served":true,"storage":true},{"name":"v1beta1","served":true,"storage":false},{"name":"v1","served":true,"storage":false}]}} | |
creationTimestamp: "2019-12-03T10:54:08Z" | |
generation: 1 | |
labels: | |
knative.dev/crd-install: "true" | |
serving.knative.dev/release: devel | |
name: revisions.serving.knative.dev | |
resourceVersion: "43844" | |
selfLink: /apis/apiextensions.k8s.io/v1beta1/customresourcedefinitions/revisions.serving.knative.dev | |
uid: 3b1c7bd2-15bb-11ea-b5af-027e0b84da98 | |
spec: | |
additionalPrinterColumns: | |
- JSONPath: .metadata.labels['serving\.knative\.dev/configuration'] | |
name: Config Name | |
type: string | |
- JSONPath: .status.serviceName | |
name: K8s Service Name | |
type: string | |
- JSONPath: .metadata.labels['serving\.knative\.dev/configurationGeneration'] | |
name: Generation | |
type: string | |
- JSONPath: .status.conditions[?(@.type=='Ready')].status | |
name: Ready | |
type: string | |
- JSONPath: .status.conditions[?(@.type=='Ready')].reason | |
name: Reason | |
type: string | |
conversion: | |
strategy: None | |
group: serving.knative.dev | |
names: | |
categories: | |
- all | |
- knative | |
- serving | |
kind: Revision | |
listKind: RevisionList | |
plural: revisions | |
shortNames: | |
- rev | |
singular: revision | |
scope: Namespaced | |
subresources: | |
status: {} | |
version: v1alpha1 | |
versions: | |
- name: v1alpha1 | |
served: true | |
storage: true | |
- name: v1beta1 | |
served: true | |
storage: false | |
- name: v1 | |
served: true | |
storage: false | |
status: | |
acceptedNames: | |
categories: | |
- all | |
- knative | |
- serving | |
kind: Revision | |
listKind: RevisionList | |
plural: revisions | |
shortNames: | |
- rev | |
singular: revision | |
conditions: | |
- lastTransitionTime: "2019-12-03T10:54:08Z" | |
message: no conflicts found | |
reason: NoConflicts | |
status: "True" | |
type: NamesAccepted | |
- lastTransitionTime: null | |
message: the initial names have been accepted | |
reason: InitialNamesAccepted | |
status: "True" | |
type: Established | |
storedVersions: | |
- v1alpha1 | |
- apiVersion: apiextensions.k8s.io/v1beta1 | |
kind: CustomResourceDefinition | |
metadata: | |
annotations: | |
kubectl.kubernetes.io/last-applied-configuration: | | |
{"apiVersion":"apiextensions.k8s.io/v1beta1","kind":"CustomResourceDefinition","metadata":{"annotations":{},"labels":{"duck.knative.dev/addressable":"true","knative.dev/crd-install":"true","serving.knative.dev/release":"devel"},"name":"routes.serving.knative.dev"},"spec":{"additionalPrinterColumns":[{"JSONPath":".status.url","name":"URL","type":"string"},{"JSONPath":".status.conditions[?(@.type=='Ready')].status","name":"Ready","type":"string"},{"JSONPath":".status.conditions[?(@.type=='Ready')].reason","name":"Reason","type":"string"}],"group":"serving.knative.dev","names":{"categories":["all","knative","serving"],"kind":"Route","plural":"routes","shortNames":["rt"],"singular":"route"},"scope":"Namespaced","subresources":{"status":{}},"versions":[{"name":"v1alpha1","served":true,"storage":true},{"name":"v1beta1","served":true,"storage":false},{"name":"v1","served":true,"storage":false}]}} | |
creationTimestamp: "2019-12-03T10:54:08Z" | |
generation: 1 | |
labels: | |
duck.knative.dev/addressable: "true" | |
knative.dev/crd-install: "true" | |
serving.knative.dev/release: devel | |
name: routes.serving.knative.dev | |
resourceVersion: "43847" | |
selfLink: /apis/apiextensions.k8s.io/v1beta1/customresourcedefinitions/routes.serving.knative.dev | |
uid: 3b35bef7-15bb-11ea-b5af-027e0b84da98 | |
spec: | |
additionalPrinterColumns: | |
- JSONPath: .status.url | |
name: URL | |
type: string | |
- JSONPath: .status.conditions[?(@.type=='Ready')].status | |
name: Ready | |
type: string | |
- JSONPath: .status.conditions[?(@.type=='Ready')].reason | |
name: Reason | |
type: string | |
conversion: | |
strategy: None | |
group: serving.knative.dev | |
names: | |
categories: | |
- all | |
- knative | |
- serving | |
kind: Route | |
listKind: RouteList | |
plural: routes | |
shortNames: | |
- rt | |
singular: route | |
scope: Namespaced | |
subresources: | |
status: {} | |
version: v1alpha1 | |
versions: | |
- name: v1alpha1 | |
served: true | |
storage: true | |
- name: v1beta1 | |
served: true | |
storage: false | |
- name: v1 | |
served: true | |
storage: false | |
status: | |
acceptedNames: | |
categories: | |
- all | |
- knative | |
- serving | |
kind: Route | |
listKind: RouteList | |
plural: routes | |
shortNames: | |
- rt | |
singular: route | |
conditions: | |
- lastTransitionTime: "2019-12-03T10:54:08Z" | |
message: no conflicts found | |
reason: NoConflicts | |
status: "True" | |
type: NamesAccepted | |
- lastTransitionTime: null | |
message: the initial names have been accepted | |
reason: InitialNamesAccepted | |
status: "True" | |
type: Established | |
storedVersions: | |
- v1alpha1 | |
- apiVersion: apiextensions.k8s.io/v1beta1 | |
kind: CustomResourceDefinition | |
metadata: | |
annotations: | |
helm.sh/resource-policy: keep | |
kubectl.kubernetes.io/last-applied-configuration: | | |
{"apiVersion":"apiextensions.k8s.io/v1beta1","kind":"CustomResourceDefinition","metadata":{"annotations":{"helm.sh/resource-policy":"keep"},"creationTimestamp":null,"labels":{"app":"mixer","chart":"istio","heritage":"Tiller","istio":"core","package":"istio.io.mixer","release":"istio"},"name":"rules.config.istio.io"},"spec":{"group":"config.istio.io","names":{"categories":["istio-io","policy-istio-io"],"kind":"rule","plural":"rules","singular":"rule"},"scope":"Namespaced","subresources":{"status":{}},"validation":{"openAPIV3Schema":{"properties":{"spec":{"description":"Describes the rules used to configure Mixer's policy and telemetry features. See more details at: https://istio.io/docs/reference/config/policy-and-telemetry/istio.policy.v1beta1.html","properties":{"actions":{"description":"The actions that will be executed when match evaluates to `true`.","items":{"properties":{"handler":{"description":"Fully qualified name of the handler to invoke.","format":"string","type":"string"},"instances":{"items":{"format":"string","type":"string"},"type":"array"},"name":{"description":"A handle to refer to the results of the action.","format":"string","type":"string"}},"type":"object"},"type":"array"},"match":{"description":"Match is an attribute based predicate.","format":"string","type":"string"},"requestHeaderOperations":{"items":{"properties":{"name":{"description":"Header name literal value.","format":"string","type":"string"},"operation":{"description":"Header operation type.","enum":["REPLACE","REMOVE","APPEND"],"type":"string"},"values":{"description":"Header value expressions.","items":{"format":"string","type":"string"},"type":"array"}},"type":"object"},"type":"array"},"responseHeaderOperations":{"items":{"properties":{"name":{"description":"Header name literal value.","format":"string","type":"string"},"operation":{"description":"Header operation type.","enum":["REPLACE","REMOVE","APPEND"],"type":"string"},"values":{"description":"Header value expressions.","items":{"format":"string","type":"string"},"type":"array"}},"type":"object"},"type":"array"},"sampling":{"properties":{"random":{"description":"Provides filtering of actions based on random selection per request.","properties":{"attributeExpression":{"description":"Specifies an attribute expression to use to override the numerator in the `percent_sampled` field.","format":"string","type":"string"},"percentSampled":{"description":"The default sampling rate, expressed as a percentage.","properties":{"denominator":{"description":"Specifies the denominator.","enum":["HUNDRED","TEN_THOUSAND"],"type":"string"},"numerator":{"description":"Specifies the numerator.","type":"integer"}},"type":"object"},"useIndependentRandomness":{"description":"By default sampling will be based on the value of the request header `x-request-id`.","type":"boolean"}},"type":"object"},"rateLimit":{"properties":{"maxUnsampledEntries":{"description":"Number of entries to allow during the `sampling_duration` before sampling is enforced.","format":"int64","type":"integer"},"samplingDuration":{"description":"Window in which to enforce the sampling rate.","type":"string"},"samplingRate":{"description":"The rate at which to sample entries once the unsampled limit has been reached.","format":"int64","type":"integer"}},"type":"object"}},"type":"object"}},"type":"object"}},"type":"object"}},"versions":[{"name":"v1alpha2","served":true,"storage":true}]},"status":{"acceptedNames":{"kind":"","plural":""},"conditions":[],"storedVersions":[]}} | |
creationTimestamp: "2019-12-03T04:51:49Z" | |
generation: 3 | |
labels: | |
app: mixer | |
chart: istio | |
heritage: Tiller | |
istio: core | |
package: istio.io.mixer | |
release: istio | |
name: rules.config.istio.io | |
resourceVersion: "43312" | |
selfLink: /apis/apiextensions.k8s.io/v1beta1/customresourcedefinitions/rules.config.istio.io | |
uid: 9d9a6d7e-1588-11ea-b5af-027e0b84da98 | |
spec: | |
conversion: | |
strategy: None | |
group: config.istio.io | |
names: | |
categories: | |
- istio-io | |
- policy-istio-io | |
kind: rule | |
listKind: ruleList | |
plural: rules | |
singular: rule | |
scope: Namespaced | |
subresources: | |
status: {} | |
validation: | |
openAPIV3Schema: | |
properties: | |
spec: | |
description: 'Describes the rules used to configure Mixer''s policy and | |
telemetry features. See more details at: https://istio.io/docs/reference/config/policy-and-telemetry/istio.policy.v1beta1.html' | |
properties: | |
actions: | |
description: The actions that will be executed when match evaluates | |
to `true`. | |
items: | |
properties: | |
handler: | |
description: Fully qualified name of the handler to invoke. | |
format: string | |
type: string | |
instances: | |
items: | |
format: string | |
type: string | |
type: array | |
name: | |
description: A handle to refer to the results of the action. | |
format: string | |
type: string | |
type: object | |
type: array | |
match: | |
description: Match is an attribute based predicate. | |
format: string | |
type: string | |
requestHeaderOperations: | |
items: | |
properties: | |
name: | |
description: Header name literal value. | |
format: string | |
type: string | |
operation: | |
description: Header operation type. | |
enum: | |
- REPLACE | |
- REMOVE | |
- APPEND | |
type: string | |
values: | |
description: Header value expressions. | |
items: | |
format: string | |
type: string | |
type: array | |
type: object | |
type: array | |
responseHeaderOperations: | |
items: | |
properties: | |
name: | |
description: Header name literal value. | |
format: string | |
type: string | |
operation: | |
description: Header operation type. | |
enum: | |
- REPLACE | |
- REMOVE | |
- APPEND | |
type: string | |
values: | |
description: Header value expressions. | |
items: | |
format: string | |
type: string | |
type: array | |
type: object | |
type: array | |
sampling: | |
properties: | |
random: | |
description: Provides filtering of actions based on random selection | |
per request. | |
properties: | |
attributeExpression: | |
description: Specifies an attribute expression to use to override | |
the numerator in the `percent_sampled` field. | |
format: string | |
type: string | |
percentSampled: | |
description: The default sampling rate, expressed as a percentage. | |
properties: | |
denominator: | |
description: Specifies the denominator. | |
enum: | |
- HUNDRED | |
- TEN_THOUSAND | |
type: string | |
numerator: | |
description: Specifies the numerator. | |
type: integer | |
type: object | |
useIndependentRandomness: | |
description: By default sampling will be based on the value | |
of the request header `x-request-id`. | |
type: boolean | |
type: object | |
rateLimit: | |
properties: | |
maxUnsampledEntries: | |
description: Number of entries to allow during the `sampling_duration` | |
before sampling is enforced. | |
format: int64 | |
type: integer | |
samplingDuration: | |
description: Window in which to enforce the sampling rate. | |
type: string | |
samplingRate: | |
description: The rate at which to sample entries once the | |
unsampled limit has been reached. | |
format: int64 | |
type: integer | |
type: object | |
type: object | |
type: object | |
type: object | |
version: v1alpha2 | |
versions: | |
- name: v1alpha2 | |
served: true | |
storage: true | |
status: | |
acceptedNames: | |
categories: | |
- istio-io | |
- policy-istio-io | |
kind: rule | |
listKind: ruleList | |
plural: rules | |
singular: rule | |
conditions: | |
- lastTransitionTime: "2019-12-03T04:51:49Z" | |
message: no conflicts found | |
reason: NoConflicts | |
status: "True" | |
type: NamesAccepted | |
- lastTransitionTime: null | |
message: the initial names have been accepted | |
reason: InitialNamesAccepted | |
status: "True" | |
type: Established | |
storedVersions: | |
- v1alpha2 | |
- apiVersion: apiextensions.k8s.io/v1beta1 | |
kind: CustomResourceDefinition | |
metadata: | |
annotations: | |
kubectl.kubernetes.io/last-applied-configuration: | | |
{"apiVersion":"apiextensions.k8s.io/v1beta1","kind":"CustomResourceDefinition","metadata":{"annotations":{},"labels":{"knative.dev/crd-install":"true","serving.knative.dev/release":"devel"},"name":"serverlessservices.networking.internal.knative.dev"},"spec":{"additionalPrinterColumns":[{"JSONPath":".spec.mode","name":"Mode","type":"string"},{"JSONPath":".status.serviceName","name":"ServiceName","type":"string"},{"JSONPath":".status.privateServiceName","name":"PrivateServiceName","type":"string"},{"JSONPath":".status.conditions[?(@.type=='Ready')].status","name":"Ready","type":"string"},{"JSONPath":".status.conditions[?(@.type=='Ready')].reason","name":"Reason","type":"string"}],"group":"networking.internal.knative.dev","names":{"categories":["knative-internal","networking"],"kind":"ServerlessService","plural":"serverlessservices","shortNames":["sks"],"singular":"serverlessservice"},"scope":"Namespaced","subresources":{"status":{}},"versions":[{"name":"v1alpha1","served":true,"storage":true}]}} | |
creationTimestamp: "2019-12-03T10:54:08Z" | |
generation: 1 | |
labels: | |
knative.dev/crd-install: "true" | |
serving.knative.dev/release: devel | |
name: serverlessservices.networking.internal.knative.dev | |
resourceVersion: "43858" | |
selfLink: /apis/apiextensions.k8s.io/v1beta1/customresourcedefinitions/serverlessservices.networking.internal.knative.dev | |
uid: 3b67b06c-15bb-11ea-b5af-027e0b84da98 | |
spec: | |
additionalPrinterColumns: | |
- JSONPath: .spec.mode | |
name: Mode | |
type: string | |
- JSONPath: .status.serviceName | |
name: ServiceName | |
type: string | |
- JSONPath: .status.privateServiceName | |
name: PrivateServiceName | |
type: string | |
- JSONPath: .status.conditions[?(@.type=='Ready')].status | |
name: Ready | |
type: string | |
- JSONPath: .status.conditions[?(@.type=='Ready')].reason | |
name: Reason | |
type: string | |
conversion: | |
strategy: None | |
group: networking.internal.knative.dev | |
names: | |
categories: | |
- knative-internal | |
- networking | |
kind: ServerlessService | |
listKind: ServerlessServiceList | |
plural: serverlessservices | |
shortNames: | |
- sks | |
singular: serverlessservice | |
scope: Namespaced | |
subresources: | |
status: {} | |
version: v1alpha1 | |
versions: | |
- name: v1alpha1 | |
served: true | |
storage: true | |
status: | |
acceptedNames: | |
categories: | |
- knative-internal | |
- networking | |
kind: ServerlessService | |
listKind: ServerlessServiceList | |
plural: serverlessservices | |
shortNames: | |
- sks | |
singular: serverlessservice | |
conditions: | |
- lastTransitionTime: "2019-12-03T10:54:08Z" | |
message: no conflicts found | |
reason: NoConflicts | |
status: "True" | |
type: NamesAccepted | |
- lastTransitionTime: null | |
message: the initial names have been accepted | |
reason: InitialNamesAccepted | |
status: "True" | |
type: Established | |
storedVersions: | |
- v1alpha1 | |
- apiVersion: apiextensions.k8s.io/v1beta1 | |
kind: CustomResourceDefinition | |
metadata: | |
annotations: | |
helm.sh/resource-policy: keep | |
kubectl.kubernetes.io/last-applied-configuration: | | |
{"apiVersion":"apiextensions.k8s.io/v1beta1","kind":"CustomResourceDefinition","metadata":{"annotations":{"helm.sh/resource-policy":"keep"},"creationTimestamp":null,"labels":{"app":"istio-pilot","chart":"istio","heritage":"Tiller","release":"istio"},"name":"serviceentries.networking.istio.io"},"spec":{"additionalPrinterColumns":[{"JSONPath":".spec.hosts","description":"The hosts associated with the ServiceEntry","name":"Hosts","type":"string"},{"JSONPath":".spec.location","description":"Whether the service is external to the mesh or part of the mesh (MESH_EXTERNAL or MESH_INTERNAL)","name":"Location","type":"string"},{"JSONPath":".spec.resolution","description":"Service discovery mode for the hosts (NONE, STATIC, or DNS)","name":"Resolution","type":"string"},{"JSONPath":".metadata.creationTimestamp","description":"CreationTimestamp is a timestamp representing the server time when this object was created. It is not guaranteed to be set in happens-before order across separate operations. Clients may not set this value. It is represented in RFC3339 form and is in UTC.\nPopulated by the system. Read-only. Null for lists. More info: https://git.k8s.io/community/contributors/devel/api-conventions.md#metadata","name":"Age","type":"date"}],"group":"networking.istio.io","names":{"categories":["istio-io","networking-istio-io"],"kind":"ServiceEntry","listKind":"ServiceEntryList","plural":"serviceentries","shortNames":["se"],"singular":"serviceentry"},"scope":"Namespaced","subresources":{"status":{}},"validation":{"openAPIV3Schema":{"properties":{"spec":{"description":"Configuration affecting service registry. See more details at: https://istio.io/docs/reference/config/networking/v1alpha3/service-entry.html","properties":{"addresses":{"description":"The virtual IP addresses associated with the service.","items":{"format":"string","type":"string"},"type":"array"},"endpoints":{"description":"One or more endpoints associated with the service.","items":{"properties":{"address":{"format":"string","type":"string"},"labels":{"additionalProperties":{"format":"string","type":"string"},"description":"One or more labels associated with the endpoint.","type":"object"},"locality":{"description":"The locality associated with the endpoint.","format":"string","type":"string"},"network":{"format":"string","type":"string"},"ports":{"additionalProperties":{"type":"integer"},"description":"Set of ports associated with the endpoint.","type":"object"},"weight":{"description":"The load balancing weight associated with the endpoint.","type":"integer"}},"type":"object"},"type":"array"},"exportTo":{"description":"A list of namespaces to which this service is exported.","items":{"format":"string","type":"string"},"type":"array"},"hosts":{"description":"The hosts associated with the ServiceEntry.","items":{"format":"string","type":"string"},"type":"array"},"location":{"enum":["MESH_EXTERNAL","MESH_INTERNAL"],"type":"string"},"ports":{"description":"The ports associated with the external service.","items":{"properties":{"name":{"description":"Label assigned to the port.","format":"string","type":"string"},"number":{"description":"A valid non-negative integer port number.","type":"integer"},"protocol":{"description":"The protocol exposed on the port.","format":"string","type":"string"}},"type":"object"},"type":"array"},"resolution":{"description":"Service discovery mode for the hosts.","enum":["NONE","STATIC","DNS"],"type":"string"},"subjectAltNames":{"items":{"format":"string","type":"string"},"type":"array"}},"type":"object"}},"type":"object"}},"versions":[{"name":"v1alpha3","served":true,"storage":true}]},"status":{"acceptedNames":{"kind":"","plural":""},"conditions":[],"storedVersions":[]}} | |
creationTimestamp: "2019-12-03T04:51:49Z" | |
generation: 3 | |
labels: | |
app: istio-pilot | |
chart: istio | |
heritage: Tiller | |
release: istio | |
name: serviceentries.networking.istio.io | |
resourceVersion: "43313" | |
selfLink: /apis/apiextensions.k8s.io/v1beta1/customresourcedefinitions/serviceentries.networking.istio.io | |
uid: 9d9bd274-1588-11ea-b5af-027e0b84da98 | |
spec: | |
additionalPrinterColumns: | |
- JSONPath: .spec.hosts | |
description: The hosts associated with the ServiceEntry | |
name: Hosts | |
type: string | |
- JSONPath: .spec.location | |
description: Whether the service is external to the mesh or part of the mesh | |
(MESH_EXTERNAL or MESH_INTERNAL) | |
name: Location | |
type: string | |
- JSONPath: .spec.resolution | |
description: Service discovery mode for the hosts (NONE, STATIC, or DNS) | |
name: Resolution | |
type: string | |
- JSONPath: .metadata.creationTimestamp | |
description: |- | |
CreationTimestamp is a timestamp representing the server time when this object was created. It is not guaranteed to be set in happens-before order across separate operations. Clients may not set this value. It is represented in RFC3339 form and is in UTC. | |
Populated by the system. Read-only. Null for lists. More info: https://git.k8s.io/community/contributors/devel/api-conventions.md#metadata | |
name: Age | |
type: date | |
conversion: | |
strategy: None | |
group: networking.istio.io | |
names: | |
categories: | |
- istio-io | |
- networking-istio-io | |
kind: ServiceEntry | |
listKind: ServiceEntryList | |
plural: serviceentries | |
shortNames: | |
- se | |
singular: serviceentry | |
scope: Namespaced | |
subresources: | |
status: {} | |
validation: | |
openAPIV3Schema: | |
properties: | |
spec: | |
description: 'Configuration affecting service registry. See more details | |
at: https://istio.io/docs/reference/config/networking/v1alpha3/service-entry.html' | |
properties: | |
addresses: | |
description: The virtual IP addresses associated with the service. | |
items: | |
format: string | |
type: string | |
type: array | |
endpoints: | |
description: One or more endpoints associated with the service. | |
items: | |
properties: | |
address: | |
format: string | |
type: string | |
labels: | |
additionalProperties: | |
format: string | |
type: string | |
description: One or more labels associated with the endpoint. | |
type: object | |
locality: | |
description: The locality associated with the endpoint. | |
format: string | |
type: string | |
network: | |
format: string | |
type: string | |
ports: | |
additionalProperties: | |
type: integer | |
description: Set of ports associated with the endpoint. | |
type: object | |
weight: | |
description: The load balancing weight associated with the endpoint. | |
type: integer | |
type: object | |
type: array | |
exportTo: | |
description: A list of namespaces to which this service is exported. | |
items: | |
format: string | |
type: string | |
type: array | |
hosts: | |
description: The hosts associated with the ServiceEntry. | |
items: | |
format: string | |
type: string | |
type: array | |
location: | |
enum: | |
- MESH_EXTERNAL | |
- MESH_INTERNAL | |
type: string | |
ports: | |
description: The ports associated with the external service. | |
items: | |
properties: | |
name: | |
description: Label assigned to the port. | |
format: string | |
type: string | |
number: | |
description: A valid non-negative integer port number. | |
type: integer | |
protocol: | |
description: The protocol exposed on the port. | |
format: string | |
type: string | |
type: object | |
type: array | |
resolution: | |
description: Service discovery mode for the hosts. | |
enum: | |
- NONE | |
- STATIC | |
- DNS | |
type: string | |
subjectAltNames: | |
items: | |
format: string | |
type: string | |
type: array | |
type: object | |
type: object | |
version: v1alpha3 | |
versions: | |
- name: v1alpha3 | |
served: true | |
storage: true | |
status: | |
acceptedNames: | |
categories: | |
- istio-io | |
- networking-istio-io | |
kind: ServiceEntry | |
listKind: ServiceEntryList | |
plural: serviceentries | |
shortNames: | |
- se | |
singular: serviceentry | |
conditions: | |
- lastTransitionTime: "2019-12-03T04:51:49Z" | |
message: no conflicts found | |
reason: NoConflicts | |
status: "True" | |
type: NamesAccepted | |
- lastTransitionTime: null | |
message: the initial names have been accepted | |
reason: InitialNamesAccepted | |
status: "True" | |
type: Established | |
storedVersions: | |
- v1alpha3 | |
- apiVersion: apiextensions.k8s.io/v1beta1 | |
kind: CustomResourceDefinition | |
metadata: | |
annotations: | |
helm.sh/resource-policy: keep | |
kubectl.kubernetes.io/last-applied-configuration: | | |
{"apiVersion":"apiextensions.k8s.io/v1beta1","kind":"CustomResourceDefinition","metadata":{"annotations":{"helm.sh/resource-policy":"keep"},"creationTimestamp":null,"labels":{"app":"mixer","chart":"istio","heritage":"Tiller","istio":"rbac","package":"istio.io.mixer","release":"istio"},"name":"servicerolebindings.rbac.istio.io"},"spec":{"additionalPrinterColumns":[{"JSONPath":".spec.roleRef.name","description":"The name of the ServiceRole object being referenced","name":"Reference","type":"string"},{"JSONPath":".metadata.creationTimestamp","description":"CreationTimestamp is a timestamp representing the server time when this object was created. It is not guaranteed to be set in happens-before order across separate operations. Clients may not set this value. It is represented in RFC3339 form and is in UTC.\nPopulated by the system. Read-only. Null for lists. More info: https://git.k8s.io/community/contributors/devel/api-conventions.md#metadata","name":"Age","type":"date"}],"group":"rbac.istio.io","names":{"categories":["istio-io","rbac-istio-io"],"kind":"ServiceRoleBinding","plural":"servicerolebindings","singular":"servicerolebinding"},"scope":"Namespaced","subresources":{"status":{}},"validation":{"openAPIV3Schema":{"properties":{"spec":{"description":"Configuration for Role Based Access Control. See more details at: https://istio.io/docs/reference/config/authorization/istio.rbac.v1alpha1.html","properties":{"actions":{"items":{"properties":{"constraints":{"description":"Optional.","items":{"properties":{"key":{"description":"Key of the constraint.","format":"string","type":"string"},"values":{"description":"List of valid values for the constraint.","items":{"format":"string","type":"string"},"type":"array"}},"type":"object"},"type":"array"},"hosts":{"items":{"format":"string","type":"string"},"type":"array"},"methods":{"description":"Optional.","items":{"format":"string","type":"string"},"type":"array"},"notHosts":{"items":{"format":"string","type":"string"},"type":"array"},"notMethods":{"items":{"format":"string","type":"string"},"type":"array"},"notPaths":{"items":{"format":"string","type":"string"},"type":"array"},"notPorts":{"items":{"format":"int32","type":"integer"},"type":"array"},"paths":{"description":"Optional.","items":{"format":"string","type":"string"},"type":"array"},"ports":{"items":{"format":"int32","type":"integer"},"type":"array"},"services":{"description":"A list of service names.","items":{"format":"string","type":"string"},"type":"array"}},"type":"object"},"type":"array"},"mode":{"enum":["ENFORCED","PERMISSIVE"],"type":"string"},"role":{"format":"string","type":"string"},"roleRef":{"description":"Reference to the ServiceRole object.","properties":{"kind":{"description":"The type of the role being referenced.","format":"string","type":"string"},"name":{"description":"The name of the ServiceRole object being referenced.","format":"string","type":"string"}},"type":"object"},"subjects":{"description":"List of subjects that are assigned the ServiceRole object.","items":{"properties":{"group":{"format":"string","type":"string"},"groups":{"items":{"format":"string","type":"string"},"type":"array"},"ips":{"items":{"format":"string","type":"string"},"type":"array"},"names":{"items":{"format":"string","type":"string"},"type":"array"},"namespaces":{"items":{"format":"string","type":"string"},"type":"array"},"notGroups":{"items":{"format":"string","type":"string"},"type":"array"},"notIps":{"items":{"format":"string","type":"string"},"type":"array"},"notNames":{"items":{"format":"string","type":"string"},"type":"array"},"notNamespaces":{"items":{"format":"string","type":"string"},"type":"array"},"properties":{"additionalProperties":{"format":"string","type":"string"},"description":"Optional.","type":"object"},"user":{"description":"Optional.","format":"string","type":"string"}},"type":"object"},"type":"array"}},"type":"object"}},"type":"object"}},"versions":[{"name":"v1alpha1","served":true,"storage":true}]},"status":{"acceptedNames":{"kind":"","plural":""},"conditions":[],"storedVersions":[]}} | |
creationTimestamp: "2019-12-03T04:51:49Z" | |
generation: 3 | |
labels: | |
app: mixer | |
chart: istio | |
heritage: Tiller | |
istio: rbac | |
package: istio.io.mixer | |
release: istio | |
name: servicerolebindings.rbac.istio.io | |
resourceVersion: "43315" | |
selfLink: /apis/apiextensions.k8s.io/v1beta1/customresourcedefinitions/servicerolebindings.rbac.istio.io | |
uid: 9db78c7c-1588-11ea-b5af-027e0b84da98 | |
spec: | |
additionalPrinterColumns: | |
- JSONPath: .spec.roleRef.name | |
description: The name of the ServiceRole object being referenced | |
name: Reference | |
type: string | |
- JSONPath: .metadata.creationTimestamp | |
description: |- | |
CreationTimestamp is a timestamp representing the server time when this object was created. It is not guaranteed to be set in happens-before order across separate operations. Clients may not set this value. It is represented in RFC3339 form and is in UTC. | |
Populated by the system. Read-only. Null for lists. More info: https://git.k8s.io/community/contributors/devel/api-conventions.md#metadata | |
name: Age | |
type: date | |
conversion: | |
strategy: None | |
group: rbac.istio.io | |
names: | |
categories: | |
- istio-io | |
- rbac-istio-io | |
kind: ServiceRoleBinding | |
listKind: ServiceRoleBindingList | |
plural: servicerolebindings | |
singular: servicerolebinding | |
scope: Namespaced | |
subresources: | |
status: {} | |
validation: | |
openAPIV3Schema: | |
properties: | |
spec: | |
description: 'Configuration for Role Based Access Control. See more details | |
at: https://istio.io/docs/reference/config/authorization/istio.rbac.v1alpha1.html' | |
properties: | |
actions: | |
items: | |
properties: | |
constraints: | |
description: Optional. | |
items: | |
properties: | |
key: | |
description: Key of the constraint. | |
format: string | |
type: string | |
values: | |
description: List of valid values for the constraint. | |
items: | |
format: string | |
type: string | |
type: array | |
type: object | |
type: array | |
hosts: | |
items: | |
format: string | |
type: string | |
type: array | |
methods: | |
description: Optional. | |
items: | |
format: string | |
type: string | |
type: array | |
notHosts: | |
items: | |
format: string | |
type: string | |
type: array | |
notMethods: | |
items: | |
format: string | |
type: string | |
type: array | |
notPaths: | |
items: | |
format: string | |
type: string | |
type: array | |
notPorts: | |
items: | |
format: int32 | |
type: integer | |
type: array | |
paths: | |
description: Optional. | |
items: | |
format: string | |
type: string | |
type: array | |
ports: | |
items: | |
format: int32 | |
type: integer | |
type: array | |
services: | |
description: A list of service names. | |
items: | |
format: string | |
type: string | |
type: array | |
type: object | |
type: array | |
mode: | |
enum: | |
- ENFORCED | |
- PERMISSIVE | |
type: string | |
role: | |
format: string | |
type: string | |
roleRef: | |
description: Reference to the ServiceRole object. | |
properties: | |
kind: | |
description: The type of the role being referenced. | |
format: string | |
type: string | |
name: | |
description: The name of the ServiceRole object being referenced. | |
format: string | |
type: string | |
type: object | |
subjects: | |
description: List of subjects that are assigned the ServiceRole object. | |
items: | |
properties: | |
group: | |
format: string | |
type: string | |
groups: | |
items: | |
format: string | |
type: string | |
type: array | |
ips: | |
items: | |
format: string | |
type: string | |
type: array | |
names: | |
items: | |
format: string | |
type: string | |
type: array | |
namespaces: | |
items: | |
format: string | |
type: string | |
type: array | |
notGroups: | |
items: | |
format: string | |
type: string | |
type: array | |
notIps: | |
items: | |
format: string | |
type: string | |
type: array | |
notNames: | |
items: | |
format: string | |
type: string | |
type: array | |
notNamespaces: | |
items: | |
format: string | |
type: string | |
type: array | |
properties: | |
additionalProperties: | |
format: string | |
type: string | |
description: Optional. | |
type: object | |
user: | |
description: Optional. | |
format: string | |
type: string | |
type: object | |
type: array | |
type: object | |
type: object | |
version: v1alpha1 | |
versions: | |
- name: v1alpha1 | |
served: true | |
storage: true | |
status: | |
acceptedNames: | |
categories: | |
- istio-io | |
- rbac-istio-io | |
kind: ServiceRoleBinding | |
listKind: ServiceRoleBindingList | |
plural: servicerolebindings | |
singular: servicerolebinding | |
conditions: | |
- lastTransitionTime: "2019-12-03T04:51:49Z" | |
message: no conflicts found | |
reason: NoConflicts | |
status: "True" | |
type: NamesAccepted | |
- lastTransitionTime: null | |
message: the initial names have been accepted | |
reason: InitialNamesAccepted | |
status: "True" | |
type: Established | |
storedVersions: | |
- v1alpha1 | |
- apiVersion: apiextensions.k8s.io/v1beta1 | |
kind: CustomResourceDefinition | |
metadata: | |
annotations: | |
helm.sh/resource-policy: keep | |
kubectl.kubernetes.io/last-applied-configuration: | | |
{"apiVersion":"apiextensions.k8s.io/v1beta1","kind":"CustomResourceDefinition","metadata":{"annotations":{"helm.sh/resource-policy":"keep"},"creationTimestamp":null,"labels":{"app":"mixer","chart":"istio","heritage":"Tiller","istio":"rbac","package":"istio.io.mixer","release":"istio"},"name":"serviceroles.rbac.istio.io"},"spec":{"group":"rbac.istio.io","names":{"categories":["istio-io","rbac-istio-io"],"kind":"ServiceRole","plural":"serviceroles","singular":"servicerole"},"scope":"Namespaced","subresources":{"status":{}},"validation":{"openAPIV3Schema":{"properties":{"spec":{"description":"Configuration for Role Based Access Control. See more details at: https://istio.io/docs/reference/config/authorization/istio.rbac.v1alpha1.html","properties":{"rules":{"description":"The set of access rules (permissions) that the role has.","items":{"properties":{"constraints":{"description":"Optional.","items":{"properties":{"key":{"description":"Key of the constraint.","format":"string","type":"string"},"values":{"description":"List of valid values for the constraint.","items":{"format":"string","type":"string"},"type":"array"}},"type":"object"},"type":"array"},"hosts":{"items":{"format":"string","type":"string"},"type":"array"},"methods":{"description":"Optional.","items":{"format":"string","type":"string"},"type":"array"},"notHosts":{"items":{"format":"string","type":"string"},"type":"array"},"notMethods":{"items":{"format":"string","type":"string"},"type":"array"},"notPaths":{"items":{"format":"string","type":"string"},"type":"array"},"notPorts":{"items":{"format":"int32","type":"integer"},"type":"array"},"paths":{"description":"Optional.","items":{"format":"string","type":"string"},"type":"array"},"ports":{"items":{"format":"int32","type":"integer"},"type":"array"},"services":{"description":"A list of service names.","items":{"format":"string","type":"string"},"type":"array"}},"type":"object"},"type":"array"}},"type":"object"}},"type":"object"}},"versions":[{"name":"v1alpha1","served":true,"storage":true}]},"status":{"acceptedNames":{"kind":"","plural":""},"conditions":[],"storedVersions":[]}} | |
creationTimestamp: "2019-12-03T04:51:49Z" | |
generation: 3 | |
labels: | |
app: mixer | |
chart: istio | |
heritage: Tiller | |
istio: rbac | |
package: istio.io.mixer | |
release: istio | |
name: serviceroles.rbac.istio.io | |
resourceVersion: "43317" | |
selfLink: /apis/apiextensions.k8s.io/v1beta1/customresourcedefinitions/serviceroles.rbac.istio.io | |
uid: 9db98cf8-1588-11ea-b5af-027e0b84da98 | |
spec: | |
conversion: | |
strategy: None | |
group: rbac.istio.io | |
names: | |
categories: | |
- istio-io | |
- rbac-istio-io | |
kind: ServiceRole | |
listKind: ServiceRoleList | |
plural: serviceroles | |
singular: servicerole | |
scope: Namespaced | |
subresources: | |
status: {} | |
validation: | |
openAPIV3Schema: | |
properties: | |
spec: | |
description: 'Configuration for Role Based Access Control. See more details | |
at: https://istio.io/docs/reference/config/authorization/istio.rbac.v1alpha1.html' | |
properties: | |
rules: | |
description: The set of access rules (permissions) that the role has. | |
items: | |
properties: | |
constraints: | |
description: Optional. | |
items: | |
properties: | |
key: | |
description: Key of the constraint. | |
format: string | |
type: string | |
values: | |
description: List of valid values for the constraint. | |
items: | |
format: string | |
type: string | |
type: array | |
type: object | |
type: array | |
hosts: | |
items: | |
format: string | |
type: string | |
type: array | |
methods: | |
description: Optional. | |
items: | |
format: string | |
type: string | |
type: array | |
notHosts: | |
items: | |
format: string | |
type: string | |
type: array | |
notMethods: | |
items: | |
format: string | |
type: string | |
type: array | |
notPaths: | |
items: | |
format: string | |
type: string | |
type: array | |
notPorts: | |
items: | |
format: int32 | |
type: integer | |
type: array | |
paths: | |
description: Optional. | |
items: | |
format: string | |
type: string | |
type: array | |
ports: | |
items: | |
format: int32 | |
type: integer | |
type: array | |
services: | |
description: A list of service names. | |
items: | |
format: string | |
type: string | |
type: array | |
type: object | |
type: array | |
type: object | |
type: object | |
version: v1alpha1 | |
versions: | |
- name: v1alpha1 | |
served: true | |
storage: true | |
status: | |
acceptedNames: | |
categories: | |
- istio-io | |
- rbac-istio-io | |
kind: ServiceRole | |
listKind: ServiceRoleList | |
plural: serviceroles | |
singular: servicerole | |
conditions: | |
- lastTransitionTime: "2019-12-03T04:51:49Z" | |
message: no conflicts found | |
reason: NoConflicts | |
status: "True" | |
type: NamesAccepted | |
- lastTransitionTime: null | |
message: the initial names have been accepted | |
reason: InitialNamesAccepted | |
status: "True" | |
type: Established | |
storedVersions: | |
- v1alpha1 | |
- apiVersion: apiextensions.k8s.io/v1beta1 | |
kind: CustomResourceDefinition | |
metadata: | |
annotations: | |
kubectl.kubernetes.io/last-applied-configuration: | | |
{"apiVersion":"apiextensions.k8s.io/v1beta1","kind":"CustomResourceDefinition","metadata":{"annotations":{},"labels":{"duck.knative.dev/addressable":"true","duck.knative.dev/podspecable":"true","knative.dev/crd-install":"true","serving.knative.dev/release":"devel"},"name":"services.serving.knative.dev"},"spec":{"additionalPrinterColumns":[{"JSONPath":".status.url","name":"URL","type":"string"},{"JSONPath":".status.latestCreatedRevisionName","name":"LatestCreated","type":"string"},{"JSONPath":".status.latestReadyRevisionName","name":"LatestReady","type":"string"},{"JSONPath":".status.conditions[?(@.type=='Ready')].status","name":"Ready","type":"string"},{"JSONPath":".status.conditions[?(@.type=='Ready')].reason","name":"Reason","type":"string"}],"group":"serving.knative.dev","names":{"categories":["all","knative","serving"],"kind":"Service","plural":"services","shortNames":["kservice","ksvc"],"singular":"service"},"scope":"Namespaced","subresources":{"status":{}},"versions":[{"name":"v1alpha1","served":true,"storage":true},{"name":"v1beta1","served":true,"storage":false},{"name":"v1","served":true,"storage":false}]}} | |
creationTimestamp: "2019-12-03T10:54:08Z" | |
generation: 1 | |
labels: | |
duck.knative.dev/addressable: "true" | |
duck.knative.dev/podspecable: "true" | |
knative.dev/crd-install: "true" | |
serving.knative.dev/release: devel | |
name: services.serving.knative.dev | |
resourceVersion: "43855" | |
selfLink: /apis/apiextensions.k8s.io/v1beta1/customresourcedefinitions/services.serving.knative.dev | |
uid: 3b4ed608-15bb-11ea-b5af-027e0b84da98 | |
spec: | |
additionalPrinterColumns: | |
- JSONPath: .status.url | |
name: URL | |
type: string | |
- JSONPath: .status.latestCreatedRevisionName | |
name: LatestCreated | |
type: string | |
- JSONPath: .status.latestReadyRevisionName | |
name: LatestReady | |
type: string | |
- JSONPath: .status.conditions[?(@.type=='Ready')].status | |
name: Ready | |
type: string | |
- JSONPath: .status.conditions[?(@.type=='Ready')].reason | |
name: Reason | |
type: string | |
conversion: | |
strategy: None | |
group: serving.knative.dev | |
names: | |
categories: | |
- all | |
- knative | |
- serving | |
kind: Service | |
listKind: ServiceList | |
plural: services | |
shortNames: | |
- kservice | |
- ksvc | |
singular: service | |
scope: Namespaced | |
subresources: | |
status: {} | |
version: v1alpha1 | |
versions: | |
- name: v1alpha1 | |
served: true | |
storage: true | |
- name: v1beta1 | |
served: true | |
storage: false | |
- name: v1 | |
served: true | |
storage: false | |
status: | |
acceptedNames: | |
categories: | |
- all | |
- knative | |
- serving | |
kind: Service | |
listKind: ServiceList | |
plural: services | |
shortNames: | |
- kservice | |
- ksvc | |
singular: service | |
conditions: | |
- lastTransitionTime: "2019-12-03T10:54:08Z" | |
message: no conflicts found | |
reason: NoConflicts | |
status: "True" | |
type: NamesAccepted | |
- lastTransitionTime: null | |
message: the initial names have been accepted | |
reason: InitialNamesAccepted | |
status: "True" | |
type: Established | |
storedVersions: | |
- v1alpha1 | |
- apiVersion: apiextensions.k8s.io/v1beta1 | |
kind: CustomResourceDefinition | |
metadata: | |
annotations: | |
helm.sh/resource-policy: keep | |
kubectl.kubernetes.io/last-applied-configuration: | | |
{"apiVersion":"apiextensions.k8s.io/v1beta1","kind":"CustomResourceDefinition","metadata":{"annotations":{"helm.sh/resource-policy":"keep"},"creationTimestamp":null,"labels":{"app":"istio-pilot","chart":"istio","heritage":"Tiller","release":"istio"},"name":"sidecars.networking.istio.io"},"spec":{"group":"networking.istio.io","names":{"categories":["istio-io","networking-istio-io"],"kind":"Sidecar","plural":"sidecars","singular":"sidecar"},"scope":"Namespaced","subresources":{"status":{}},"validation":{"openAPIV3Schema":{"properties":{"spec":{"description":"Configuration affecting network reachability of a sidecar. See more details at: https://istio.io/docs/reference/config/networking/v1alpha3/sidecar.html","properties":{"egress":{"items":{"properties":{"bind":{"format":"string","type":"string"},"captureMode":{"enum":["DEFAULT","IPTABLES","NONE"],"type":"string"},"hosts":{"items":{"format":"string","type":"string"},"type":"array"},"port":{"description":"The port associated with the listener.","properties":{"name":{"description":"Label assigned to the port.","format":"string","type":"string"},"number":{"description":"A valid non-negative integer port number.","type":"integer"},"protocol":{"description":"The protocol exposed on the port.","format":"string","type":"string"}},"type":"object"}},"type":"object"},"type":"array"},"ingress":{"items":{"properties":{"bind":{"description":"The ip to which the listener should be bound.","format":"string","type":"string"},"captureMode":{"enum":["DEFAULT","IPTABLES","NONE"],"type":"string"},"defaultEndpoint":{"format":"string","type":"string"},"port":{"description":"The port associated with the listener.","properties":{"name":{"description":"Label assigned to the port.","format":"string","type":"string"},"number":{"description":"A valid non-negative integer port number.","type":"integer"},"protocol":{"description":"The protocol exposed on the port.","format":"string","type":"string"}},"type":"object"}},"type":"object"},"type":"array"},"outboundTrafficPolicy":{"description":"This allows to configure the outbound traffic policy.","properties":{"mode":{"enum":["REGISTRY_ONLY","ALLOW_ANY"],"type":"string"}},"type":"object"},"workloadSelector":{"properties":{"labels":{"additionalProperties":{"format":"string","type":"string"},"type":"object"}},"type":"object"}},"type":"object"}},"type":"object"}},"versions":[{"name":"v1alpha3","served":true,"storage":true}]},"status":{"acceptedNames":{"kind":"","plural":""},"conditions":[],"storedVersions":[]}} | |
creationTimestamp: "2019-12-03T04:51:49Z" | |
generation: 3 | |
labels: | |
app: istio-pilot | |
chart: istio | |
heritage: Tiller | |
release: istio | |
name: sidecars.networking.istio.io | |
resourceVersion: "43298" | |
selfLink: /apis/apiextensions.k8s.io/v1beta1/customresourcedefinitions/sidecars.networking.istio.io | |
uid: 9dac4087-1588-11ea-b5af-027e0b84da98 | |
spec: | |
conversion: | |
strategy: None | |
group: networking.istio.io | |
names: | |
categories: | |
- istio-io | |
- networking-istio-io | |
kind: Sidecar | |
listKind: SidecarList | |
plural: sidecars | |
singular: sidecar | |
scope: Namespaced | |
subresources: | |
status: {} | |
validation: | |
openAPIV3Schema: | |
properties: | |
spec: | |
description: 'Configuration affecting network reachability of a sidecar. | |
See more details at: https://istio.io/docs/reference/config/networking/v1alpha3/sidecar.html' | |
properties: | |
egress: | |
items: | |
properties: | |
bind: | |
format: string | |
type: string | |
captureMode: | |
enum: | |
- DEFAULT | |
- IPTABLES | |
- NONE | |
type: string | |
hosts: | |
items: | |
format: string | |
type: string | |
type: array | |
port: | |
description: The port associated with the listener. | |
properties: | |
name: | |
description: Label assigned to the port. | |
format: string | |
type: string | |
number: | |
description: A valid non-negative integer port number. | |
type: integer | |
protocol: | |
description: The protocol exposed on the port. | |
format: string | |
type: string | |
type: object | |
type: object | |
type: array | |
ingress: | |
items: | |
properties: | |
bind: | |
description: The ip to which the listener should be bound. | |
format: string | |
type: string | |
captureMode: | |
enum: | |
- DEFAULT | |
- IPTABLES | |
- NONE | |
type: string | |
defaultEndpoint: | |
format: string | |
type: string | |
port: | |
description: The port associated with the listener. | |
properties: | |
name: | |
description: Label assigned to the port. | |
format: string | |
type: string | |
number: | |
description: A valid non-negative integer port number. | |
type: integer | |
protocol: | |
description: The protocol exposed on the port. | |
format: string | |
type: string | |
type: object | |
type: object | |
type: array | |
outboundTrafficPolicy: | |
description: This allows to configure the outbound traffic policy. | |
properties: | |
mode: | |
enum: | |
- REGISTRY_ONLY | |
- ALLOW_ANY | |
type: string | |
type: object | |
workloadSelector: | |
properties: | |
labels: | |
additionalProperties: | |
format: string | |
type: string | |
type: object | |
type: object | |
type: object | |
type: object | |
version: v1alpha3 | |
versions: | |
- name: v1alpha3 | |
served: true | |
storage: true | |
status: | |
acceptedNames: | |
categories: | |
- istio-io | |
- networking-istio-io | |
kind: Sidecar | |
listKind: SidecarList | |
plural: sidecars | |
singular: sidecar | |
conditions: | |
- lastTransitionTime: "2019-12-03T04:51:49Z" | |
message: no conflicts found | |
reason: NoConflicts | |
status: "True" | |
type: NamesAccepted | |
- lastTransitionTime: null | |
message: the initial names have been accepted | |
reason: InitialNamesAccepted | |
status: "True" | |
type: Established | |
storedVersions: | |
- v1alpha3 | |
- apiVersion: apiextensions.k8s.io/v1beta1 | |
kind: CustomResourceDefinition | |
metadata: | |
annotations: | |
helm.sh/resource-policy: keep | |
kubectl.kubernetes.io/last-applied-configuration: | | |
{"apiVersion":"apiextensions.k8s.io/v1beta1","kind":"CustomResourceDefinition","metadata":{"annotations":{"helm.sh/resource-policy":"keep"},"labels":{"app":"mixer","chart":"istio","heritage":"Tiller","istio":"mixer-template","package":"template","release":"istio"},"name":"templates.config.istio.io"},"spec":{"group":"config.istio.io","names":{"categories":["istio-io","policy-istio-io"],"kind":"template","plural":"templates","singular":"template"},"scope":"Namespaced","subresources":{"status":{}},"versions":[{"name":"v1alpha2","served":true,"storage":true}]}} | |
creationTimestamp: "2019-12-03T04:51:49Z" | |
generation: 3 | |
labels: | |
app: mixer | |
chart: istio | |
heritage: Tiller | |
istio: mixer-template | |
package: template | |
release: istio | |
name: templates.config.istio.io | |
resourceVersion: "43324" | |
selfLink: /apis/apiextensions.k8s.io/v1beta1/customresourcedefinitions/templates.config.istio.io | |
uid: 9dd8f071-1588-11ea-b5af-027e0b84da98 | |
spec: | |
conversion: | |
strategy: None | |
group: config.istio.io | |
names: | |
categories: | |
- istio-io | |
- policy-istio-io | |
kind: template | |
listKind: templateList | |
plural: templates | |
singular: template | |
scope: Namespaced | |
subresources: | |
status: {} | |
version: v1alpha2 | |
versions: | |
- name: v1alpha2 | |
served: true | |
storage: true | |
status: | |
acceptedNames: | |
categories: | |
- istio-io | |
- policy-istio-io | |
kind: template | |
listKind: templateList | |
plural: templates | |
singular: template | |
conditions: | |
- lastTransitionTime: "2019-12-03T04:51:49Z" | |
message: no conflicts found | |
reason: NoConflicts | |
status: "True" | |
type: NamesAccepted | |
- lastTransitionTime: null | |
message: the initial names have been accepted | |
reason: InitialNamesAccepted | |
status: "True" | |
type: Established | |
storedVersions: | |
- v1alpha2 | |
- apiVersion: apiextensions.k8s.io/v1beta1 | |
kind: CustomResourceDefinition | |
metadata: | |
annotations: | |
helm.sh/resource-policy: keep | |
kubectl.kubernetes.io/last-applied-configuration: | | |
{"apiVersion":"apiextensions.k8s.io/v1beta1","kind":"CustomResourceDefinition","metadata":{"annotations":{"helm.sh/resource-policy":"keep"},"creationTimestamp":null,"labels":{"app":"istio-pilot","chart":"istio","heritage":"Tiller","release":"istio"},"name":"virtualservices.networking.istio.io"},"spec":{"additionalPrinterColumns":[{"JSONPath":".spec.gateways","description":"The names of gateways and sidecars that should apply these routes","name":"Gateways","type":"string"},{"JSONPath":".spec.hosts","description":"The destination hosts to which traffic is being sent","name":"Hosts","type":"string"},{"JSONPath":".metadata.creationTimestamp","description":"CreationTimestamp is a timestamp representing the server time when this object was created. It is not guaranteed to be set in happens-before order across separate operations. Clients may not set this value. It is represented in RFC3339 form and is in UTC.\nPopulated by the system. Read-only. Null for lists. More info: https://git.k8s.io/community/contributors/devel/api-conventions.md#metadata","name":"Age","type":"date"}],"group":"networking.istio.io","names":{"categories":["istio-io","networking-istio-io"],"kind":"VirtualService","listKind":"VirtualServiceList","plural":"virtualservices","shortNames":["vs"],"singular":"virtualservice"},"scope":"Namespaced","subresources":{"status":{}},"validation":{"openAPIV3Schema":{"properties":{"spec":{"description":"Configuration affecting label/content routing, sni routing, etc. See more details at: https://istio.io/docs/reference/config/networking/v1alpha3/virtual-service.html","properties":{"exportTo":{"description":"A list of namespaces to which this virtual service is exported.","items":{"format":"string","type":"string"},"type":"array"},"gateways":{"description":"The names of gateways and sidecars that should apply these routes.","items":{"format":"string","type":"string"},"type":"array"},"hosts":{"description":"The destination hosts to which traffic is being sent.","items":{"format":"string","type":"string"},"type":"array"},"http":{"description":"An ordered list of route rules for HTTP traffic.","items":{"properties":{"appendHeaders":{"additionalProperties":{"format":"string","type":"string"},"type":"object"},"appendRequestHeaders":{"additionalProperties":{"format":"string","type":"string"},"type":"object"},"appendResponseHeaders":{"additionalProperties":{"format":"string","type":"string"},"type":"object"},"corsPolicy":{"description":"Cross-Origin Resource Sharing policy (CORS).","properties":{"allowCredentials":{"nullable":true,"type":"boolean"},"allowHeaders":{"items":{"format":"string","type":"string"},"type":"array"},"allowMethods":{"description":"List of HTTP methods allowed to access the resource.","items":{"format":"string","type":"string"},"type":"array"},"allowOrigin":{"description":"The list of origins that are allowed to perform CORS requests.","items":{"format":"string","type":"string"},"type":"array"},"exposeHeaders":{"items":{"format":"string","type":"string"},"type":"array"},"maxAge":{"type":"string"}},"type":"object"},"fault":{"description":"Fault injection policy to apply on HTTP traffic at the client side.","properties":{"abort":{"oneOf":[{"properties":{"percent":{}},"required":["httpStatus"]},{"properties":{"percent":{}},"required":["grpcStatus"]},{"properties":{"percent":{}},"required":["http2Error"]}],"properties":{"grpcStatus":{"format":"string","type":"string"},"http2Error":{"format":"string","type":"string"},"httpStatus":{"description":"HTTP status code to use to abort the Http request.","format":"int32","type":"integer"},"percent":{"description":"Percentage of requests to be aborted with the error code provided (0-100).","format":"int32","type":"integer"},"percentage":{"description":"Percentage of requests to be aborted with the error code provided.","properties":{"value":{"format":"double","type":"number"}},"type":"object"}},"type":"object"},"delay":{"oneOf":[{"properties":{"percent":{}},"required":["fixedDelay"]},{"properties":{"percent":{}},"required":["exponentialDelay"]}],"properties":{"exponentialDelay":{"type":"string"},"fixedDelay":{"description":"Add a fixed delay before forwarding the request.","type":"string"},"percent":{"description":"Percentage of requests on which the delay will be injected (0-100).","format":"int32","type":"integer"},"percentage":{"description":"Percentage of requests on which the delay will be injected.","properties":{"value":{"format":"double","type":"number"}},"type":"object"}},"type":"object"}},"type":"object"},"headers":{"properties":{"request":{"properties":{"add":{"additionalProperties":{"format":"string","type":"string"},"type":"object"},"remove":{"items":{"format":"string","type":"string"},"type":"array"},"set":{"additionalProperties":{"format":"string","type":"string"},"type":"object"}},"type":"object"},"response":{"properties":{"add":{"additionalProperties":{"format":"string","type":"string"},"type":"object"},"remove":{"items":{"format":"string","type":"string"},"type":"array"},"set":{"additionalProperties":{"format":"string","type":"string"},"type":"object"}},"type":"object"}},"type":"object"},"match":{"items":{"properties":{"authority":{"oneOf":[{"required":["exact"]},{"required":["prefix"]},{"required":["regex"]}],"properties":{"exact":{"format":"string","type":"string"},"prefix":{"format":"string","type":"string"},"regex":{"format":"string","type":"string"}},"type":"object"},"gateways":{"items":{"format":"string","type":"string"},"type":"array"},"headers":{"additionalProperties":{"oneOf":[{"required":["exact"]},{"required":["prefix"]},{"required":["regex"]}],"properties":{"exact":{"format":"string","type":"string"},"prefix":{"format":"string","type":"string"},"regex":{"format":"string","type":"string"}},"type":"object"},"type":"object"},"ignoreUriCase":{"description":"Flag to specify whether the URI matching should be case-insensitive.","type":"boolean"},"method":{"oneOf":[{"required":["exact"]},{"required":["prefix"]},{"required":["regex"]}],"properties":{"exact":{"format":"string","type":"string"},"prefix":{"format":"string","type":"string"},"regex":{"format":"string","type":"string"}},"type":"object"},"name":{"description":"The name assigned to a match.","format":"string","type":"string"},"port":{"description":"Specifies the ports on the host that is being addressed.","type":"integer"},"queryParams":{"additionalProperties":{"oneOf":[{"required":["exact"]},{"required":["prefix"]},{"required":["regex"]}],"properties":{"exact":{"format":"string","type":"string"},"prefix":{"format":"string","type":"string"},"regex":{"format":"string","type":"string"}},"type":"object"},"description":"Query parameters for matching.","type":"object"},"scheme":{"oneOf":[{"required":["exact"]},{"required":["prefix"]},{"required":["regex"]}],"properties":{"exact":{"format":"string","type":"string"},"prefix":{"format":"string","type":"string"},"regex":{"format":"string","type":"string"}},"type":"object"},"sourceLabels":{"additionalProperties":{"format":"string","type":"string"},"type":"object"},"uri":{"oneOf":[{"required":["exact"]},{"required":["prefix"]},{"required":["regex"]}],"properties":{"exact":{"format":"string","type":"string"},"prefix":{"format":"string","type":"string"},"regex":{"format":"string","type":"string"}},"type":"object"}},"type":"object"},"type":"array"},"mirror":{"properties":{"host":{"description":"The name of a service from the service registry.","format":"string","type":"string"},"port":{"description":"Specifies the port on the host that is being addressed.","properties":{"number":{"type":"integer"}},"type":"object"},"subset":{"description":"The name of a subset within the service.","format":"string","type":"string"}},"type":"object"},"mirrorPercent":{"description":"Percentage of the traffic to be mirrored by the `mirror` field.","nullable":true,"type":"integer"},"mirror_percent":{"description":"Percentage of the traffic to be mirrored by the `mirror` field.","nullable":true,"type":"integer"},"name":{"description":"The name assigned to the route for debugging purposes.","format":"string","type":"string"},"redirect":{"description":"A http rule can either redirect or forward (default) traffic.","properties":{"authority":{"format":"string","type":"string"},"redirectCode":{"type":"integer"},"uri":{"format":"string","type":"string"}},"type":"object"},"removeRequestHeaders":{"items":{"format":"string","type":"string"},"type":"array"},"removeResponseHeaders":{"items":{"format":"string","type":"string"},"type":"array"},"retries":{"description":"Retry policy for HTTP requests.","properties":{"attempts":{"description":"Number of retries for a given request.","format":"int32","type":"integer"},"perTryTimeout":{"description":"Timeout per retry attempt for a given request.","type":"string"},"retryOn":{"description":"Specifies the conditions under which retry takes place.","format":"string","type":"string"}},"type":"object"},"rewrite":{"description":"Rewrite HTTP URIs and Authority headers.","properties":{"authority":{"description":"rewrite the Authority/Host header with this value.","format":"string","type":"string"},"uri":{"format":"string","type":"string"}},"type":"object"},"route":{"description":"A http rule can either redirect or forward (default) traffic.","items":{"properties":{"appendRequestHeaders":{"additionalProperties":{"format":"string","type":"string"},"description":"Use of `append_request_headers` is deprecated.","type":"object"},"appendResponseHeaders":{"additionalProperties":{"format":"string","type":"string"},"description":"Use of `append_response_headers` is deprecated.","type":"object"},"destination":{"properties":{"host":{"description":"The name of a service from the service registry.","format":"string","type":"string"},"port":{"description":"Specifies the port on the host that is being addressed.","properties":{"number":{"type":"integer"}},"type":"object"},"subset":{"description":"The name of a subset within the service.","format":"string","type":"string"}},"type":"object"},"headers":{"properties":{"request":{"properties":{"add":{"additionalProperties":{"format":"string","type":"string"},"type":"object"},"remove":{"items":{"format":"string","type":"string"},"type":"array"},"set":{"additionalProperties":{"format":"string","type":"string"},"type":"object"}},"type":"object"},"response":{"properties":{"add":{"additionalProperties":{"format":"string","type":"string"},"type":"object"},"remove":{"items":{"format":"string","type":"string"},"type":"array"},"set":{"additionalProperties":{"format":"string","type":"string"},"type":"object"}},"type":"object"}},"type":"object"},"removeRequestHeaders":{"description":"Use of `remove_request_headers` is deprecated.","items":{"format":"string","type":"string"},"type":"array"},"removeResponseHeaders":{"description":"Use of `remove_response_header` is deprecated.","items":{"format":"string","type":"string"},"type":"array"},"weight":{"format":"int32","type":"integer"}},"type":"object"},"type":"array"},"timeout":{"description":"Timeout for HTTP requests.","type":"string"},"websocketUpgrade":{"description":"Deprecated.","type":"boolean"}},"type":"object"},"type":"array"},"tcp":{"description":"An ordered list of route rules for opaque TCP traffic.","items":{"properties":{"match":{"items":{"properties":{"destinationSubnets":{"description":"IPv4 or IPv6 ip addresses of destination with optional subnet.","items":{"format":"string","type":"string"},"type":"array"},"gateways":{"description":"Names of gateways where the rule should be applied to.","items":{"format":"string","type":"string"},"type":"array"},"port":{"description":"Specifies the port on the host that is being addressed.","type":"integer"},"sourceLabels":{"additionalProperties":{"format":"string","type":"string"},"type":"object"},"sourceSubnet":{"description":"IPv4 or IPv6 ip address of source with optional subnet.","format":"string","type":"string"}},"type":"object"},"type":"array"},"route":{"description":"The destination to which the connection should be forwarded to.","items":{"properties":{"destination":{"properties":{"host":{"description":"The name of a service from the service registry.","format":"string","type":"string"},"port":{"description":"Specifies the port on the host that is being addressed.","properties":{"number":{"type":"integer"}},"type":"object"},"subset":{"description":"The name of a subset within the service.","format":"string","type":"string"}},"type":"object"},"weight":{"format":"int32","type":"integer"}},"type":"object"},"type":"array"}},"type":"object"},"type":"array"},"tls":{"items":{"properties":{"match":{"items":{"properties":{"destinationSubnets":{"description":"IPv4 or IPv6 ip addresses of destination with optional subnet.","items":{"format":"string","type":"string"},"type":"array"},"gateways":{"description":"Names of gateways where the rule should be applied to.","items":{"format":"string","type":"string"},"type":"array"},"port":{"description":"Specifies the port on the host that is being addressed.","type":"integer"},"sniHosts":{"description":"SNI (server name indicator) to match on.","items":{"format":"string","type":"string"},"type":"array"},"sourceLabels":{"additionalProperties":{"format":"string","type":"string"},"type":"object"},"sourceSubnet":{"description":"IPv4 or IPv6 ip address of source with optional subnet.","format":"string","type":"string"}},"type":"object"},"type":"array"},"route":{"description":"The destination to which the connection should be forwarded to.","items":{"properties":{"destination":{"properties":{"host":{"description":"The name of a service from the service registry.","format":"string","type":"string"},"port":{"description":"Specifies the port on the host that is being addressed.","properties":{"number":{"type":"integer"}},"type":"object"},"subset":{"description":"The name of a subset within the service.","format":"string","type":"string"}},"type":"object"},"weight":{"format":"int32","type":"integer"}},"type":"object"},"type":"array"}},"type":"object"},"type":"array"}},"type":"object"}},"type":"object"}},"versions":[{"name":"v1alpha3","served":true,"storage":true}]},"status":{"acceptedNames":{"kind":"","plural":""},"conditions":[],"storedVersions":[]}} | |
creationTimestamp: "2019-12-03T04:51:49Z" | |
generation: 3 | |
labels: | |
app: istio-pilot | |
chart: istio | |
heritage: Tiller | |
release: istio | |
name: virtualservices.networking.istio.io | |
resourceVersion: "43319" | |
selfLink: /apis/apiextensions.k8s.io/v1beta1/customresourcedefinitions/virtualservices.networking.istio.io | |
uid: 9dc7057b-1588-11ea-b5af-027e0b84da98 | |
spec: | |
additionalPrinterColumns: | |
- JSONPath: .spec.gateways | |
description: The names of gateways and sidecars that should apply these routes | |
name: Gateways | |
type: string | |
- JSONPath: .spec.hosts | |
description: The destination hosts to which traffic is being sent | |
name: Hosts | |
type: string | |
- JSONPath: .metadata.creationTimestamp | |
description: |- | |
CreationTimestamp is a timestamp representing the server time when this object was created. It is not guaranteed to be set in happens-before order across separate operations. Clients may not set this value. It is represented in RFC3339 form and is in UTC. | |
Populated by the system. Read-only. Null for lists. More info: https://git.k8s.io/community/contributors/devel/api-conventions.md#metadata | |
name: Age | |
type: date | |
conversion: | |
strategy: None | |
group: networking.istio.io | |
names: | |
categories: | |
- istio-io | |
- networking-istio-io | |
kind: VirtualService | |
listKind: VirtualServiceList | |
plural: virtualservices | |
shortNames: | |
- vs | |
singular: virtualservice | |
scope: Namespaced | |
subresources: | |
status: {} | |
validation: | |
openAPIV3Schema: | |
properties: | |
spec: | |
description: 'Configuration affecting label/content routing, sni routing, | |
etc. See more details at: https://istio.io/docs/reference/config/networking/v1alpha3/virtual-service.html' | |
properties: | |
exportTo: | |
description: A list of namespaces to which this virtual service is | |
exported. | |
items: | |
format: string | |
type: string | |
type: array | |
gateways: | |
description: The names of gateways and sidecars that should apply | |
these routes. | |
items: | |
format: string | |
type: string | |
type: array | |
hosts: | |
description: The destination hosts to which traffic is being sent. | |
items: | |
format: string | |
type: string | |
type: array | |
http: | |
description: An ordered list of route rules for HTTP traffic. | |
items: | |
properties: | |
appendHeaders: | |
additionalProperties: | |
format: string | |
type: string | |
type: object | |
appendRequestHeaders: | |
additionalProperties: | |
format: string | |
type: string | |
type: object | |
appendResponseHeaders: | |
additionalProperties: | |
format: string | |
type: string | |
type: object | |
corsPolicy: | |
description: Cross-Origin Resource Sharing policy (CORS). | |
properties: | |
allowCredentials: | |
nullable: true | |
type: boolean | |
allowHeaders: | |
items: | |
format: string | |
type: string | |
type: array | |
allowMethods: | |
description: List of HTTP methods allowed to access the | |
resource. | |
items: | |
format: string | |
type: string | |
type: array | |
allowOrigin: | |
description: The list of origins that are allowed to perform | |
CORS requests. | |
items: | |
format: string | |
type: string | |
type: array | |
exposeHeaders: | |
items: | |
format: string | |
type: string | |
type: array | |
maxAge: | |
type: string | |
type: object | |
fault: | |
description: Fault injection policy to apply on HTTP traffic | |
at the client side. | |
properties: | |
abort: | |
oneOf: | |
- properties: | |
percent: {} | |
required: | |
- httpStatus | |
- properties: | |
percent: {} | |
required: | |
- grpcStatus | |
- properties: | |
percent: {} | |
required: | |
- http2Error | |
properties: | |
grpcStatus: | |
format: string | |
type: string | |
http2Error: | |
format: string | |
type: string | |
httpStatus: | |
description: HTTP status code to use to abort the Http | |
request. | |
format: int32 | |
type: integer | |
percent: | |
description: Percentage of requests to be aborted with | |
the error code provided (0-100). | |
format: int32 | |
type: integer | |
percentage: | |
description: Percentage of requests to be aborted with | |
the error code provided. | |
properties: | |
value: | |
format: double | |
type: number | |
type: object | |
type: object | |
delay: | |
oneOf: | |
- properties: | |
percent: {} | |
required: | |
- fixedDelay | |
- properties: | |
percent: {} | |
required: | |
- exponentialDelay | |
properties: | |
exponentialDelay: | |
type: string | |
fixedDelay: | |
description: Add a fixed delay before forwarding the | |
request. | |
type: string | |
percent: | |
description: Percentage of requests on which the delay | |
will be injected (0-100). | |
format: int32 | |
type: integer | |
percentage: | |
description: Percentage of requests on which the delay | |
will be injected. | |
properties: | |
value: | |
format: double | |
type: number | |
type: object | |
type: object | |
type: object | |
headers: | |
properties: | |
request: | |
properties: | |
add: | |
additionalProperties: | |
format: string | |
type: string | |
type: object | |
remove: | |
items: | |
format: string | |
type: string | |
type: array | |
set: | |
additionalProperties: | |
format: string | |
type: string | |
type: object | |
type: object | |
response: | |
properties: | |
add: | |
additionalProperties: | |
format: string | |
type: string | |
type: object | |
remove: | |
items: | |
format: string | |
type: string | |
type: array | |
set: | |
additionalProperties: | |
format: string | |
type: string | |
type: object | |
type: object | |
type: object | |
match: | |
items: | |
properties: | |
authority: | |
oneOf: | |
- required: | |
- exact | |
- required: | |
- prefix | |
- required: | |
- regex | |
properties: | |
exact: | |
format: string | |
type: string | |
prefix: | |
format: string | |
type: string | |
regex: | |
format: string | |
type: string | |
type: object | |
gateways: | |
items: | |
format: string | |
type: string | |
type: array | |
headers: | |
additionalProperties: | |
oneOf: | |
- required: | |
- exact | |
- required: | |
- prefix | |
- required: | |
- regex | |
properties: | |
exact: | |
format: string | |
type: string | |
prefix: | |
format: string | |
type: string | |
regex: | |
format: string | |
type: string | |
type: object | |
type: object | |
ignoreUriCase: | |
description: Flag to specify whether the URI matching | |
should be case-insensitive. | |
type: boolean | |
method: | |
oneOf: | |
- required: | |
- exact | |
- required: | |
- prefix | |
- required: | |
- regex | |
properties: | |
exact: | |
format: string | |
type: string | |
prefix: | |
format: string | |
type: string | |
regex: | |
format: string | |
type: string | |
type: object | |
name: | |
description: The name assigned to a match. | |
format: string | |
type: string | |
port: | |
description: Specifies the ports on the host that is being | |
addressed. | |
type: integer | |
queryParams: | |
additionalProperties: | |
oneOf: | |
- required: | |
- exact | |
- required: | |
- prefix | |
- required: | |
- regex | |
properties: | |
exact: | |
format: string | |
type: string | |
prefix: | |
format: string | |
type: string | |
regex: | |
format: string | |
type: string | |
type: object | |
description: Query parameters for matching. | |
type: object | |
scheme: | |
oneOf: | |
- required: | |
- exact | |
- required: | |
- prefix | |
- required: | |
- regex | |
properties: | |
exact: | |
format: string | |
type: string | |
prefix: | |
format: string | |
type: string | |
regex: | |
format: string | |
type: string | |
type: object | |
sourceLabels: | |
additionalProperties: | |
format: string | |
type: string | |
type: object | |
uri: | |
oneOf: | |
- required: | |
- exact | |
- required: | |
- prefix | |
- required: | |
- regex | |
properties: | |
exact: | |
format: string | |
type: string | |
prefix: | |
format: string | |
type: string | |
regex: | |
format: string | |
type: string | |
type: object | |
type: object | |
type: array | |
mirror: | |
properties: | |
host: | |
description: The name of a service from the service registry. | |
format: string | |
type: string | |
port: | |
description: Specifies the port on the host that is being | |
addressed. | |
properties: | |
number: | |
type: integer | |
type: object | |
subset: | |
description: The name of a subset within the service. | |
format: string | |
type: string | |
type: object | |
mirror_percent: | |
description: Percentage of the traffic to be mirrored by the | |
`mirror` field. | |
nullable: true | |
type: integer | |
mirrorPercent: | |
description: Percentage of the traffic to be mirrored by the | |
`mirror` field. | |
nullable: true | |
type: integer | |
name: | |
description: The name assigned to the route for debugging purposes. | |
format: string | |
type: string | |
redirect: | |
description: A http rule can either redirect or forward (default) | |
traffic. | |
properties: | |
authority: | |
format: string | |
type: string | |
redirectCode: | |
type: integer | |
uri: | |
format: string | |
type: string | |
type: object | |
removeRequestHeaders: | |
items: | |
format: string | |
type: string | |
type: array | |
removeResponseHeaders: | |
items: | |
format: string | |
type: string | |
type: array | |
retries: | |
description: Retry policy for HTTP requests. | |
properties: | |
attempts: | |
description: Number of retries for a given request. | |
format: int32 | |
type: integer | |
perTryTimeout: | |
description: Timeout per retry attempt for a given request. | |
type: string | |
retryOn: | |
description: Specifies the conditions under which retry | |
takes place. | |
format: string | |
type: string | |
type: object | |
rewrite: | |
description: Rewrite HTTP URIs and Authority headers. | |
properties: | |
authority: | |
description: rewrite the Authority/Host header with this | |
value. | |
format: string | |
type: string | |
uri: | |
format: string | |
type: string | |
type: object | |
route: | |
description: A http rule can either redirect or forward (default) | |
traffic. | |
items: | |
properties: | |
appendRequestHeaders: | |
additionalProperties: | |
format: string | |
type: string | |
description: Use of `append_request_headers` is deprecated. | |
type: object | |
appendResponseHeaders: | |
additionalProperties: | |
format: string | |
type: string | |
description: Use of `append_response_headers` is deprecated. | |
type: object | |
destination: | |
properties: | |
host: | |
description: The name of a service from the service | |
registry. | |
format: string | |
type: string | |
port: | |
description: Specifies the port on the host that is | |
being addressed. | |
properties: | |
number: | |
type: integer | |
type: object | |
subset: | |
description: The name of a subset within the service. | |
format: string | |
type: string | |
type: object | |
headers: | |
properties: | |
request: | |
properties: | |
add: | |
additionalProperties: | |
format: string | |
type: string | |
type: object | |
remove: | |
items: | |
format: string | |
type: string | |
type: array | |
set: | |
additionalProperties: | |
format: string | |
type: string | |
type: object | |
type: object | |
response: | |
properties: | |
add: | |
additionalProperties: | |
format: string | |
type: string | |
type: object | |
remove: | |
items: | |
format: string | |
type: string | |
type: array | |
set: | |
additionalProperties: | |
format: string | |
type: string | |
type: object | |
type: object | |
type: object | |
removeRequestHeaders: | |
description: Use of `remove_request_headers` is deprecated. | |
items: | |
format: string | |
type: string | |
type: array | |
removeResponseHeaders: | |
description: Use of `remove_response_header` is deprecated. | |
items: | |
format: string | |
type: string | |
type: array | |
weight: | |
format: int32 | |
type: integer | |
type: object | |
type: array | |
timeout: | |
description: Timeout for HTTP requests. | |
type: string | |
websocketUpgrade: | |
description: Deprecated. | |
type: boolean | |
type: object | |
type: array | |
tcp: | |
description: An ordered list of route rules for opaque TCP traffic. | |
items: | |
properties: | |
match: | |
items: | |
properties: | |
destinationSubnets: | |
description: IPv4 or IPv6 ip addresses of destination | |
with optional subnet. | |
items: | |
format: string | |
type: string | |
type: array | |
gateways: | |
description: Names of gateways where the rule should be | |
applied to. | |
items: | |
format: string | |
type: string | |
type: array | |
port: | |
description: Specifies the port on the host that is being | |
addressed. | |
type: integer | |
sourceLabels: | |
additionalProperties: | |
format: string | |
type: string | |
type: object | |
sourceSubnet: | |
description: IPv4 or IPv6 ip address of source with optional | |
subnet. | |
format: string | |
type: string | |
type: object | |
type: array | |
route: | |
description: The destination to which the connection should | |
be forwarded to. | |
items: | |
properties: | |
destination: | |
properties: | |
host: | |
description: The name of a service from the service | |
registry. | |
format: string | |
type: string | |
port: | |
description: Specifies the port on the host that is | |
being addressed. | |
properties: | |
number: | |
type: integer | |
type: object | |
subset: | |
description: The name of a subset within the service. | |
format: string | |
type: string | |
type: object | |
weight: | |
format: int32 | |
type: integer | |
type: object | |
type: array | |
type: object | |
type: array | |
tls: | |
items: | |
properties: | |
match: | |
items: | |
properties: | |
destinationSubnets: | |
description: IPv4 or IPv6 ip addresses of destination | |
with optional subnet. | |
items: | |
format: string | |
type: string | |
type: array | |
gateways: | |
description: Names of gateways where the rule should be | |
applied to. | |
items: | |
format: string | |
type: string | |
type: array | |
port: | |
description: Specifies the port on the host that is being | |
addressed. | |
type: integer | |
sniHosts: | |
description: SNI (server name indicator) to match on. | |
items: | |
format: string | |
type: string | |
type: array | |
sourceLabels: | |
additionalProperties: | |
format: string | |
type: string | |
type: object | |
sourceSubnet: | |
description: IPv4 or IPv6 ip address of source with optional | |
subnet. | |
format: string | |
type: string | |
type: object | |
type: array | |
route: | |
description: The destination to which the connection should | |
be forwarded to. | |
items: | |
properties: | |
destination: | |
properties: | |
host: | |
description: The name of a service from the service | |
registry. | |
format: string | |
type: string | |
port: | |
description: Specifies the port on the host that is | |
being addressed. | |
properties: | |
number: | |
type: integer | |
type: object | |
subset: | |
description: The name of a subset within the service. | |
format: string | |
type: string | |
type: object | |
weight: | |
format: int32 | |
type: integer | |
type: object | |
type: array | |
type: object | |
type: array | |
type: object | |
type: object | |
version: v1alpha3 | |
versions: | |
- name: v1alpha3 | |
served: true | |
storage: true | |
status: | |
acceptedNames: | |
categories: | |
- istio-io | |
- networking-istio-io | |
kind: VirtualService | |
listKind: VirtualServiceList | |
plural: virtualservices | |
shortNames: | |
- vs | |
singular: virtualservice | |
conditions: | |
- lastTransitionTime: "2019-12-03T04:51:49Z" | |
message: no conflicts found | |
reason: NoConflicts | |
status: "True" | |
type: NamesAccepted | |
- lastTransitionTime: null | |
message: the initial names have been accepted | |
reason: InitialNamesAccepted | |
status: "True" | |
type: Established | |
storedVersions: | |
- v1alpha3 | |
kind: List | |
metadata: | |
resourceVersion: "" | |
selfLink: "" | |
------- | |
resource: apiservices | |
------- | |
apiVersion: v1 | |
items: | |
- apiVersion: apiregistration.k8s.io/v1 | |
kind: APIService | |
metadata: | |
creationTimestamp: "2019-12-03T04:43:09Z" | |
labels: | |
kube-aggregator.kubernetes.io/automanaged: onstart | |
name: v1. | |
resourceVersion: "10" | |
selfLink: /apis/apiregistration.k8s.io/v1/apiservices/v1. | |
uid: 681e646d-1587-11ea-b5af-027e0b84da98 | |
spec: | |
groupPriorityMinimum: 18000 | |
service: null | |
version: v1 | |
versionPriority: 1 | |
status: | |
conditions: | |
- lastTransitionTime: "2019-12-03T04:43:09Z" | |
message: Local APIServices are always available | |
reason: Local | |
status: "True" | |
type: Available | |
- apiVersion: apiregistration.k8s.io/v1 | |
kind: APIService | |
metadata: | |
creationTimestamp: "2019-12-03T04:43:09Z" | |
labels: | |
kube-aggregator.kubernetes.io/automanaged: onstart | |
name: v1.apps | |
resourceVersion: "11" | |
selfLink: /apis/apiregistration.k8s.io/v1/apiservices/v1.apps | |
uid: 681ef0c9-1587-11ea-b5af-027e0b84da98 | |
spec: | |
group: apps | |
groupPriorityMinimum: 17800 | |
service: null | |
version: v1 | |
versionPriority: 15 | |
status: | |
conditions: | |
- lastTransitionTime: "2019-12-03T04:43:09Z" | |
message: Local APIServices are always available | |
reason: Local | |
status: "True" | |
type: Available | |
- apiVersion: apiregistration.k8s.io/v1 | |
kind: APIService | |
metadata: | |
creationTimestamp: "2019-12-03T04:43:09Z" | |
labels: | |
kube-aggregator.kubernetes.io/automanaged: onstart | |
name: v1.authentication.k8s.io | |
resourceVersion: "16" | |
selfLink: /apis/apiregistration.k8s.io/v1/apiservices/v1.authentication.k8s.io | |
uid: 681ffb7e-1587-11ea-b5af-027e0b84da98 | |
spec: | |
group: authentication.k8s.io | |
groupPriorityMinimum: 17700 | |
service: null | |
version: v1 | |
versionPriority: 15 | |
status: | |
conditions: | |
- lastTransitionTime: "2019-12-03T04:43:09Z" | |
message: Local APIServices are always available | |
reason: Local | |
status: "True" | |
type: Available | |
- apiVersion: apiregistration.k8s.io/v1 | |
kind: APIService | |
metadata: | |
creationTimestamp: "2019-12-03T04:43:09Z" | |
labels: | |
kube-aggregator.kubernetes.io/automanaged: onstart | |
name: v1.authorization.k8s.io | |
resourceVersion: "17" | |
selfLink: /apis/apiregistration.k8s.io/v1/apiservices/v1.authorization.k8s.io | |
uid: 68200f3f-1587-11ea-b5af-027e0b84da98 | |
spec: | |
group: authorization.k8s.io | |
groupPriorityMinimum: 17600 | |
service: null | |
version: v1 | |
versionPriority: 15 | |
status: | |
conditions: | |
- lastTransitionTime: "2019-12-03T04:43:09Z" | |
message: Local APIServices are always available | |
reason: Local | |
status: "True" | |
type: Available | |
- apiVersion: apiregistration.k8s.io/v1 | |
kind: APIService | |
metadata: | |
creationTimestamp: "2019-12-03T04:43:09Z" | |
labels: | |
kube-aggregator.kubernetes.io/automanaged: onstart | |
name: v1.autoscaling | |
resourceVersion: "19" | |
selfLink: /apis/apiregistration.k8s.io/v1/apiservices/v1.autoscaling | |
uid: 682083fa-1587-11ea-b5af-027e0b84da98 | |
spec: | |
group: autoscaling | |
groupPriorityMinimum: 17500 | |
service: null | |
version: v1 | |
versionPriority: 15 | |
status: | |
conditions: | |
- lastTransitionTime: "2019-12-03T04:43:09Z" | |
message: Local APIServices are always available | |
reason: Local | |
status: "True" | |
type: Available | |
- apiVersion: apiregistration.k8s.io/v1 | |
kind: APIService | |
metadata: | |
creationTimestamp: "2019-12-03T04:43:10Z" | |
labels: | |
kube-aggregator.kubernetes.io/automanaged: onstart | |
name: v1.batch | |
resourceVersion: "23" | |
selfLink: /apis/apiregistration.k8s.io/v1/apiservices/v1.batch | |
uid: 68219c2c-1587-11ea-b5af-027e0b84da98 | |
spec: | |
group: batch | |
groupPriorityMinimum: 17400 | |
service: null | |
version: v1 | |
versionPriority: 15 | |
status: | |
conditions: | |
- lastTransitionTime: "2019-12-03T04:43:10Z" | |
message: Local APIServices are always available | |
reason: Local | |
status: "True" | |
type: Available | |
- apiVersion: apiregistration.k8s.io/v1 | |
kind: APIService | |
metadata: | |
creationTimestamp: "2019-12-03T04:43:10Z" | |
labels: | |
kube-aggregator.kubernetes.io/automanaged: onstart | |
name: v1.coordination.k8s.io | |
resourceVersion: "28" | |
selfLink: /apis/apiregistration.k8s.io/v1/apiservices/v1.coordination.k8s.io | |
uid: 6822436c-1587-11ea-b5af-027e0b84da98 | |
spec: | |
group: coordination.k8s.io | |
groupPriorityMinimum: 16500 | |
service: null | |
version: v1 | |
versionPriority: 15 | |
status: | |
conditions: | |
- lastTransitionTime: "2019-12-03T04:43:10Z" | |
message: Local APIServices are always available | |
reason: Local | |
status: "True" | |
type: Available | |
- apiVersion: apiregistration.k8s.io/v1 | |
kind: APIService | |
metadata: | |
creationTimestamp: "2019-12-03T04:43:10Z" | |
labels: | |
kube-aggregator.kubernetes.io/automanaged: onstart | |
name: v1.networking.k8s.io | |
resourceVersion: "30" | |
selfLink: /apis/apiregistration.k8s.io/v1/apiservices/v1.networking.k8s.io | |
uid: 68231596-1587-11ea-b5af-027e0b84da98 | |
spec: | |
group: networking.k8s.io | |
groupPriorityMinimum: 17200 | |
service: null | |
version: v1 | |
versionPriority: 15 | |
status: | |
conditions: | |
- lastTransitionTime: "2019-12-03T04:43:10Z" | |
message: Local APIServices are always available | |
reason: Local | |
status: "True" | |
type: Available | |
- apiVersion: apiregistration.k8s.io/v1 | |
kind: APIService | |
metadata: | |
creationTimestamp: "2019-12-03T04:43:10Z" | |
labels: | |
kube-aggregator.kubernetes.io/automanaged: onstart | |
name: v1.rbac.authorization.k8s.io | |
resourceVersion: "33" | |
selfLink: /apis/apiregistration.k8s.io/v1/apiservices/v1.rbac.authorization.k8s.io | |
uid: 68246c0c-1587-11ea-b5af-027e0b84da98 | |
spec: | |
group: rbac.authorization.k8s.io | |
groupPriorityMinimum: 17000 | |
service: null | |
version: v1 | |
versionPriority: 15 | |
status: | |
conditions: | |
- lastTransitionTime: "2019-12-03T04:43:10Z" | |
message: Local APIServices are always available | |
reason: Local | |
status: "True" | |
type: Available | |
- apiVersion: apiregistration.k8s.io/v1 | |
kind: APIService | |
metadata: | |
creationTimestamp: "2019-12-03T04:43:10Z" | |
labels: | |
kube-aggregator.kubernetes.io/automanaged: onstart | |
name: v1.scheduling.k8s.io | |
resourceVersion: "36" | |
selfLink: /apis/apiregistration.k8s.io/v1/apiservices/v1.scheduling.k8s.io | |
uid: 68264620-1587-11ea-b5af-027e0b84da98 | |
spec: | |
group: scheduling.k8s.io | |
groupPriorityMinimum: 16600 | |
service: null | |
version: v1 | |
versionPriority: 15 | |
status: | |
conditions: | |
- lastTransitionTime: "2019-12-03T04:43:10Z" | |
message: Local APIServices are always available | |
reason: Local | |
status: "True" | |
type: Available | |
- apiVersion: apiregistration.k8s.io/v1 | |
kind: APIService | |
metadata: | |
creationTimestamp: "2019-12-03T10:54:07Z" | |
labels: | |
kube-aggregator.kubernetes.io/automanaged: "true" | |
name: v1.serving.knative.dev | |
resourceVersion: "43824" | |
selfLink: /apis/apiregistration.k8s.io/v1/apiservices/v1.serving.knative.dev | |
uid: 3aa290e1-15bb-11ea-b5af-027e0b84da98 | |
spec: | |
group: serving.knative.dev | |
groupPriorityMinimum: 1000 | |
service: null | |
version: v1 | |
versionPriority: 100 | |
status: | |
conditions: | |
- lastTransitionTime: "2019-12-03T10:54:07Z" | |
message: Local APIServices are always available | |
reason: Local | |
status: "True" | |
type: Available | |
- apiVersion: apiregistration.k8s.io/v1 | |
kind: APIService | |
metadata: | |
creationTimestamp: "2019-12-03T04:43:10Z" | |
labels: | |
kube-aggregator.kubernetes.io/automanaged: onstart | |
name: v1.storage.k8s.io | |
resourceVersion: "37" | |
selfLink: /apis/apiregistration.k8s.io/v1/apiservices/v1.storage.k8s.io | |
uid: 6826654e-1587-11ea-b5af-027e0b84da98 | |
spec: | |
group: storage.k8s.io | |
groupPriorityMinimum: 16800 | |
service: null | |
version: v1 | |
versionPriority: 15 | |
status: | |
conditions: | |
- lastTransitionTime: "2019-12-03T04:43:10Z" | |
message: Local APIServices are always available | |
reason: Local | |
status: "True" | |
type: Available | |
- apiVersion: apiregistration.k8s.io/v1 | |
kind: APIService | |
metadata: | |
creationTimestamp: "2019-12-03T04:51:49Z" | |
labels: | |
kube-aggregator.kubernetes.io/automanaged: "true" | |
name: v1alpha1.authentication.istio.io | |
resourceVersion: "1375" | |
selfLink: /apis/apiregistration.k8s.io/v1/apiservices/v1alpha1.authentication.istio.io | |
uid: 9d7ef59b-1588-11ea-b5af-027e0b84da98 | |
spec: | |
group: authentication.istio.io | |
groupPriorityMinimum: 1000 | |
service: null | |
version: v1alpha1 | |
versionPriority: 100 | |
status: | |
conditions: | |
- lastTransitionTime: "2019-12-03T04:51:49Z" | |
message: Local APIServices are always available | |
reason: Local | |
status: "True" | |
type: Available | |
- apiVersion: apiregistration.k8s.io/v1 | |
kind: APIService | |
metadata: | |
creationTimestamp: "2019-12-03T10:54:07Z" | |
labels: | |
kube-aggregator.kubernetes.io/automanaged: "true" | |
name: v1alpha1.autoscaling.internal.knative.dev | |
resourceVersion: "43836" | |
selfLink: /apis/apiregistration.k8s.io/v1/apiservices/v1alpha1.autoscaling.internal.knative.dev | |
uid: 3aea9a4c-15bb-11ea-b5af-027e0b84da98 | |
spec: | |
group: autoscaling.internal.knative.dev | |
groupPriorityMinimum: 1000 | |
service: null | |
version: v1alpha1 | |
versionPriority: 100 | |
status: | |
conditions: | |
- lastTransitionTime: "2019-12-03T10:54:07Z" | |
message: Local APIServices are always available | |
reason: Local | |
status: "True" | |
type: Available | |
- apiVersion: apiregistration.k8s.io/v1 | |
kind: APIService | |
metadata: | |
creationTimestamp: "2019-12-03T10:54:07Z" | |
labels: | |
kube-aggregator.kubernetes.io/automanaged: "true" | |
name: v1alpha1.caching.internal.knative.dev | |
resourceVersion: "43827" | |
selfLink: /apis/apiregistration.k8s.io/v1/apiservices/v1alpha1.caching.internal.knative.dev | |
uid: 3aba3daa-15bb-11ea-b5af-027e0b84da98 | |
spec: | |
group: caching.internal.knative.dev | |
groupPriorityMinimum: 1000 | |
service: null | |
version: v1alpha1 | |
versionPriority: 100 | |
status: | |
conditions: | |
- lastTransitionTime: "2019-12-03T10:54:07Z" | |
message: Local APIServices are always available | |
reason: Local | |
status: "True" | |
type: Available | |
- apiVersion: apiregistration.k8s.io/v1 | |
kind: APIService | |
metadata: | |
creationTimestamp: "2019-12-03T04:44:14Z" | |
labels: | |
kube-aggregator.kubernetes.io/automanaged: "true" | |
name: v1alpha1.crd.k8s.amazonaws.com | |
resourceVersion: "378" | |
selfLink: /apis/apiregistration.k8s.io/v1/apiservices/v1alpha1.crd.k8s.amazonaws.com | |
uid: 8e5b9f7e-1587-11ea-b5af-027e0b84da98 | |
spec: | |
group: crd.k8s.amazonaws.com | |
groupPriorityMinimum: 1000 | |
service: null | |
version: v1alpha1 | |
versionPriority: 100 | |
status: | |
conditions: | |
- lastTransitionTime: "2019-12-03T04:44:14Z" | |
message: Local APIServices are always available | |
reason: Local | |
status: "True" | |
type: Available | |
- apiVersion: apiregistration.k8s.io/v1 | |
kind: APIService | |
metadata: | |
creationTimestamp: "2019-12-03T10:54:07Z" | |
labels: | |
kube-aggregator.kubernetes.io/automanaged: "true" | |
name: v1alpha1.networking.internal.knative.dev | |
resourceVersion: "43816" | |
selfLink: /apis/apiregistration.k8s.io/v1/apiservices/v1alpha1.networking.internal.knative.dev | |
uid: 3a89ae65-15bb-11ea-b5af-027e0b84da98 | |
spec: | |
group: networking.internal.knative.dev | |
groupPriorityMinimum: 1000 | |
service: null | |
version: v1alpha1 | |
versionPriority: 100 | |
status: | |
conditions: | |
- lastTransitionTime: "2019-12-03T10:54:07Z" | |
message: Local APIServices are always available | |
reason: Local | |
status: "True" | |
type: Available | |
- apiVersion: apiregistration.k8s.io/v1 | |
kind: APIService | |
metadata: | |
creationTimestamp: "2019-12-03T04:51:48Z" | |
labels: | |
kube-aggregator.kubernetes.io/automanaged: "true" | |
name: v1alpha1.rbac.istio.io | |
resourceVersion: "1353" | |
selfLink: /apis/apiregistration.k8s.io/v1/apiservices/v1alpha1.rbac.istio.io | |
uid: 9d21b2ab-1588-11ea-b5af-027e0b84da98 | |
spec: | |
group: rbac.istio.io | |
groupPriorityMinimum: 1000 | |
service: null | |
version: v1alpha1 | |
versionPriority: 100 | |
status: | |
conditions: | |
- lastTransitionTime: "2019-12-03T04:51:48Z" | |
message: Local APIServices are always available | |
reason: Local | |
status: "True" | |
type: Available | |
- apiVersion: apiregistration.k8s.io/v1 | |
kind: APIService | |
metadata: | |
creationTimestamp: "2019-12-03T10:54:07Z" | |
labels: | |
kube-aggregator.kubernetes.io/automanaged: "true" | |
name: v1alpha1.serving.knative.dev | |
resourceVersion: "43821" | |
selfLink: /apis/apiregistration.k8s.io/v1/apiservices/v1alpha1.serving.knative.dev | |
uid: 3aa26153-15bb-11ea-b5af-027e0b84da98 | |
spec: | |
group: serving.knative.dev | |
groupPriorityMinimum: 1000 | |
service: null | |
version: v1alpha1 | |
versionPriority: 100 | |
status: | |
conditions: | |
- lastTransitionTime: "2019-12-03T10:54:07Z" | |
message: Local APIServices are always available | |
reason: Local | |
status: "True" | |
type: Available | |
- apiVersion: apiregistration.k8s.io/v1 | |
kind: APIService | |
metadata: | |
creationTimestamp: "2019-12-03T04:51:48Z" | |
labels: | |
kube-aggregator.kubernetes.io/automanaged: "true" | |
name: v1alpha2.config.istio.io | |
resourceVersion: "1350" | |
selfLink: /apis/apiregistration.k8s.io/v1/apiservices/v1alpha2.config.istio.io | |
uid: 9d203a04-1588-11ea-b5af-027e0b84da98 | |
spec: | |
group: config.istio.io | |
groupPriorityMinimum: 1000 | |
service: null | |
version: v1alpha2 | |
versionPriority: 100 | |
status: | |
conditions: | |
- lastTransitionTime: "2019-12-03T04:51:48Z" | |
message: Local APIServices are always available | |
reason: Local | |
status: "True" | |
type: Available | |
- apiVersion: apiregistration.k8s.io/v1 | |
kind: APIService | |
metadata: | |
creationTimestamp: "2019-12-03T04:51:48Z" | |
labels: | |
kube-aggregator.kubernetes.io/automanaged: "true" | |
name: v1alpha3.networking.istio.io | |
resourceVersion: "1358" | |
selfLink: /apis/apiregistration.k8s.io/v1/apiservices/v1alpha3.networking.istio.io | |
uid: 9d4bb9f8-1588-11ea-b5af-027e0b84da98 | |
spec: | |
group: networking.istio.io | |
groupPriorityMinimum: 1000 | |
service: null | |
version: v1alpha3 | |
versionPriority: 100 | |
status: | |
conditions: | |
- lastTransitionTime: "2019-12-03T04:51:48Z" | |
message: Local APIServices are always available | |
reason: Local | |
status: "True" | |
type: Available | |
- apiVersion: apiregistration.k8s.io/v1 | |
kind: APIService | |
metadata: | |
creationTimestamp: "2019-12-03T04:43:09Z" | |
labels: | |
kube-aggregator.kubernetes.io/automanaged: onstart | |
name: v1beta1.admissionregistration.k8s.io | |
resourceVersion: "13" | |
selfLink: /apis/apiregistration.k8s.io/v1/apiservices/v1beta1.admissionregistration.k8s.io | |
uid: 681e8d1c-1587-11ea-b5af-027e0b84da98 | |
spec: | |
group: admissionregistration.k8s.io | |
groupPriorityMinimum: 16700 | |
service: null | |
version: v1beta1 | |
versionPriority: 12 | |
status: | |
conditions: | |
- lastTransitionTime: "2019-12-03T04:43:09Z" | |
message: Local APIServices are always available | |
reason: Local | |
status: "True" | |
type: Available | |
- apiVersion: apiregistration.k8s.io/v1 | |
kind: APIService | |
metadata: | |
creationTimestamp: "2019-12-03T04:43:09Z" | |
labels: | |
kube-aggregator.kubernetes.io/automanaged: onstart | |
name: v1beta1.apiextensions.k8s.io | |
resourceVersion: "14" | |
selfLink: /apis/apiregistration.k8s.io/v1/apiservices/v1beta1.apiextensions.k8s.io | |
uid: 681e9339-1587-11ea-b5af-027e0b84da98 | |
spec: | |
group: apiextensions.k8s.io | |
groupPriorityMinimum: 16700 | |
service: null | |
version: v1beta1 | |
versionPriority: 9 | |
status: | |
conditions: | |
- lastTransitionTime: "2019-12-03T04:43:09Z" | |
message: Local APIServices are always available | |
reason: Local | |
status: "True" | |
type: Available | |
- apiVersion: apiregistration.k8s.io/v1 | |
kind: APIService | |
metadata: | |
creationTimestamp: "2019-12-03T04:43:09Z" | |
labels: | |
kube-aggregator.kubernetes.io/automanaged: onstart | |
name: v1beta1.apps | |
resourceVersion: "12" | |
selfLink: /apis/apiregistration.k8s.io/v1/apiservices/v1beta1.apps | |
uid: 681e82e6-1587-11ea-b5af-027e0b84da98 | |
spec: | |
group: apps | |
groupPriorityMinimum: 17800 | |
service: null | |
version: v1beta1 | |
versionPriority: 1 | |
status: | |
conditions: | |
- lastTransitionTime: "2019-12-03T04:43:09Z" | |
message: Local APIServices are always available | |
reason: Local | |
status: "True" | |
type: Available | |
- apiVersion: apiregistration.k8s.io/v1 | |
kind: APIService | |
metadata: | |
creationTimestamp: "2019-12-03T04:43:09Z" | |
labels: | |
kube-aggregator.kubernetes.io/automanaged: onstart | |
name: v1beta1.authentication.k8s.io | |
resourceVersion: "18" | |
selfLink: /apis/apiregistration.k8s.io/v1/apiservices/v1beta1.authentication.k8s.io | |
uid: 68201869-1587-11ea-b5af-027e0b84da98 | |
spec: | |
group: authentication.k8s.io | |
groupPriorityMinimum: 17700 | |
service: null | |
version: v1beta1 | |
versionPriority: 9 | |
status: | |
conditions: | |
- lastTransitionTime: "2019-12-03T04:43:09Z" | |
message: Local APIServices are always available | |
reason: Local | |
status: "True" | |
type: Available | |
- apiVersion: apiregistration.k8s.io/v1 | |
kind: APIService | |
metadata: | |
creationTimestamp: "2019-12-03T04:43:09Z" | |
labels: | |
kube-aggregator.kubernetes.io/automanaged: onstart | |
name: v1beta1.authorization.k8s.io | |
resourceVersion: "20" | |
selfLink: /apis/apiregistration.k8s.io/v1/apiservices/v1beta1.authorization.k8s.io | |
uid: 68203d0b-1587-11ea-b5af-027e0b84da98 | |
spec: | |
group: authorization.k8s.io | |
groupPriorityMinimum: 17600 | |
service: null | |
version: v1beta1 | |
versionPriority: 9 | |
status: | |
conditions: | |
- lastTransitionTime: "2019-12-03T04:43:09Z" | |
message: Local APIServices are always available | |
reason: Local | |
status: "True" | |
type: Available | |
- apiVersion: apiregistration.k8s.io/v1 | |
kind: APIService | |
metadata: | |
creationTimestamp: "2019-12-03T04:43:10Z" | |
labels: | |
kube-aggregator.kubernetes.io/automanaged: onstart | |
name: v1beta1.batch | |
resourceVersion: "24" | |
selfLink: /apis/apiregistration.k8s.io/v1/apiservices/v1beta1.batch | |
uid: 6821a8b2-1587-11ea-b5af-027e0b84da98 | |
spec: | |
group: batch | |
groupPriorityMinimum: 17400 | |
service: null | |
version: v1beta1 | |
versionPriority: 9 | |
status: | |
conditions: | |
- lastTransitionTime: "2019-12-03T04:43:10Z" | |
message: Local APIServices are always available | |
reason: Local | |
status: "True" | |
type: Available | |
- apiVersion: apiregistration.k8s.io/v1 | |
kind: APIService | |
metadata: | |
creationTimestamp: "2019-12-03T04:43:10Z" | |
labels: | |
kube-aggregator.kubernetes.io/automanaged: onstart | |
name: v1beta1.certificates.k8s.io | |
resourceVersion: "25" | |
selfLink: /apis/apiregistration.k8s.io/v1/apiservices/v1beta1.certificates.k8s.io | |
uid: 6821b0ce-1587-11ea-b5af-027e0b84da98 | |
spec: | |
group: certificates.k8s.io | |
groupPriorityMinimum: 17300 | |
service: null | |
version: v1beta1 | |
versionPriority: 9 | |
status: | |
conditions: | |
- lastTransitionTime: "2019-12-03T04:43:10Z" | |
message: Local APIServices are always available | |
reason: Local | |
status: "True" | |
type: Available | |
- apiVersion: apiregistration.k8s.io/v1 | |
kind: APIService | |
metadata: | |
creationTimestamp: "2019-12-03T04:43:10Z" | |
labels: | |
kube-aggregator.kubernetes.io/automanaged: onstart | |
name: v1beta1.coordination.k8s.io | |
resourceVersion: "26" | |
selfLink: /apis/apiregistration.k8s.io/v1/apiservices/v1beta1.coordination.k8s.io | |
uid: 682252f1-1587-11ea-b5af-027e0b84da98 | |
spec: | |
group: coordination.k8s.io | |
groupPriorityMinimum: 16500 | |
service: null | |
version: v1beta1 | |
versionPriority: 9 | |
status: | |
conditions: | |
- lastTransitionTime: "2019-12-03T04:43:10Z" | |
message: Local APIServices are always available | |
reason: Local | |
status: "True" | |
type: Available | |
- apiVersion: apiregistration.k8s.io/v1 | |
kind: APIService | |
metadata: | |
annotations: | |
kubectl.kubernetes.io/last-applied-configuration: | | |
{"apiVersion":"apiregistration.k8s.io/v1beta1","kind":"APIService","metadata":{"annotations":{},"labels":{"autoscaling.knative.dev/metric-provider":"custom-metrics","serving.knative.dev/release":"devel"},"name":"v1beta1.custom.metrics.k8s.io"},"spec":{"group":"custom.metrics.k8s.io","groupPriorityMinimum":100,"insecureSkipTLSVerify":true,"service":{"name":"autoscaler","namespace":"knative-serving"},"version":"v1beta1","versionPriority":100}} | |
creationTimestamp: "2019-12-03T10:54:26Z" | |
labels: | |
autoscaling.knative.dev/metric-provider: custom-metrics | |
serving.knative.dev/release: devel | |
name: v1beta1.custom.metrics.k8s.io | |
resourceVersion: "54923" | |
selfLink: /apis/apiregistration.k8s.io/v1/apiservices/v1beta1.custom.metrics.k8s.io | |
uid: 463c3a3a-15bb-11ea-b5af-027e0b84da98 | |
spec: | |
group: custom.metrics.k8s.io | |
groupPriorityMinimum: 100 | |
insecureSkipTLSVerify: true | |
service: | |
name: autoscaler | |
namespace: knative-serving | |
version: v1beta1 | |
versionPriority: 100 | |
status: | |
conditions: | |
- lastTransitionTime: "2019-12-03T12:23:43Z" | |
message: all checks passed | |
reason: Passed | |
status: "True" | |
type: Available | |
- apiVersion: apiregistration.k8s.io/v1 | |
kind: APIService | |
metadata: | |
creationTimestamp: "2019-12-03T04:43:10Z" | |
labels: | |
kube-aggregator.kubernetes.io/automanaged: onstart | |
name: v1beta1.events.k8s.io | |
resourceVersion: "27" | |
selfLink: /apis/apiregistration.k8s.io/v1/apiservices/v1beta1.events.k8s.io | |
uid: 6822b973-1587-11ea-b5af-027e0b84da98 | |
spec: | |
group: events.k8s.io | |
groupPriorityMinimum: 17750 | |
service: null | |
version: v1beta1 | |
versionPriority: 5 | |
status: | |
conditions: | |
- lastTransitionTime: "2019-12-03T04:43:10Z" | |
message: Local APIServices are always available | |
reason: Local | |
status: "True" | |
type: Available | |
- apiVersion: apiregistration.k8s.io/v1 | |
kind: APIService | |
metadata: | |
creationTimestamp: "2019-12-03T04:43:10Z" | |
labels: | |
kube-aggregator.kubernetes.io/automanaged: onstart | |
name: v1beta1.extensions | |
resourceVersion: "29" | |
selfLink: /apis/apiregistration.k8s.io/v1/apiservices/v1beta1.extensions | |
uid: 68230893-1587-11ea-b5af-027e0b84da98 | |
spec: | |
group: extensions | |
groupPriorityMinimum: 17900 | |
service: null | |
version: v1beta1 | |
versionPriority: 1 | |
status: | |
conditions: | |
- lastTransitionTime: "2019-12-03T04:43:10Z" | |
message: Local APIServices are always available | |
reason: Local | |
status: "True" | |
type: Available | |
- apiVersion: apiregistration.k8s.io/v1 | |
kind: APIService | |
metadata: | |
creationTimestamp: "2019-12-03T04:43:10Z" | |
labels: | |
kube-aggregator.kubernetes.io/automanaged: onstart | |
name: v1beta1.networking.k8s.io | |
resourceVersion: "31" | |
selfLink: /apis/apiregistration.k8s.io/v1/apiservices/v1beta1.networking.k8s.io | |
uid: 6823fc41-1587-11ea-b5af-027e0b84da98 | |
spec: | |
group: networking.k8s.io | |
groupPriorityMinimum: 17200 | |
service: null | |
version: v1beta1 | |
versionPriority: 9 | |
status: | |
conditions: | |
- lastTransitionTime: "2019-12-03T04:43:10Z" | |
message: Local APIServices are always available | |
reason: Local | |
status: "True" | |
type: Available | |
- apiVersion: apiregistration.k8s.io/v1 | |
kind: APIService | |
metadata: | |
creationTimestamp: "2019-12-03T04:43:10Z" | |
labels: | |
kube-aggregator.kubernetes.io/automanaged: onstart | |
name: v1beta1.node.k8s.io | |
resourceVersion: "32" | |
selfLink: /apis/apiregistration.k8s.io/v1/apiservices/v1beta1.node.k8s.io | |
uid: 68245203-1587-11ea-b5af-027e0b84da98 | |
spec: | |
group: node.k8s.io | |
groupPriorityMinimum: 16300 | |
service: null | |
version: v1beta1 | |
versionPriority: 9 | |
status: | |
conditions: | |
- lastTransitionTime: "2019-12-03T04:43:10Z" | |
message: Local APIServices are always available | |
reason: Local | |
status: "True" | |
type: Available | |
- apiVersion: apiregistration.k8s.io/v1 | |
kind: APIService | |
metadata: | |
creationTimestamp: "2019-12-03T04:43:10Z" | |
labels: | |
kube-aggregator.kubernetes.io/automanaged: onstart | |
name: v1beta1.policy | |
resourceVersion: "35" | |
selfLink: /apis/apiregistration.k8s.io/v1/apiservices/v1beta1.policy | |
uid: 68247fda-1587-11ea-b5af-027e0b84da98 | |
spec: | |
group: policy | |
groupPriorityMinimum: 17100 | |
service: null | |
version: v1beta1 | |
versionPriority: 9 | |
status: | |
conditions: | |
- lastTransitionTime: "2019-12-03T04:43:10Z" | |
message: Local APIServices are always available | |
reason: Local | |
status: "True" | |
type: Available | |
- apiVersion: apiregistration.k8s.io/v1 | |
kind: APIService | |
metadata: | |
creationTimestamp: "2019-12-03T04:43:10Z" | |
labels: | |
kube-aggregator.kubernetes.io/automanaged: onstart | |
name: v1beta1.rbac.authorization.k8s.io | |
resourceVersion: "34" | |
selfLink: /apis/apiregistration.k8s.io/v1/apiservices/v1beta1.rbac.authorization.k8s.io | |
uid: 682476d0-1587-11ea-b5af-027e0b84da98 | |
spec: | |
group: rbac.authorization.k8s.io | |
groupPriorityMinimum: 17000 | |
service: null | |
version: v1beta1 | |
versionPriority: 12 | |
status: | |
conditions: | |
- lastTransitionTime: "2019-12-03T04:43:10Z" | |
message: Local APIServices are always available | |
reason: Local | |
status: "True" | |
type: Available | |
- apiVersion: apiregistration.k8s.io/v1 | |
kind: APIService | |
metadata: | |
creationTimestamp: "2019-12-03T04:43:10Z" | |
labels: | |
kube-aggregator.kubernetes.io/automanaged: onstart | |
name: v1beta1.scheduling.k8s.io | |
resourceVersion: "38" | |
selfLink: /apis/apiregistration.k8s.io/v1/apiservices/v1beta1.scheduling.k8s.io | |
uid: 682652eb-1587-11ea-b5af-027e0b84da98 | |
spec: | |
group: scheduling.k8s.io | |
groupPriorityMinimum: 16600 | |
service: null | |
version: v1beta1 | |
versionPriority: 12 | |
status: | |
conditions: | |
- lastTransitionTime: "2019-12-03T04:43:10Z" | |
message: Local APIServices are always available | |
reason: Local | |
status: "True" | |
type: Available | |
- apiVersion: apiregistration.k8s.io/v1 | |
kind: APIService | |
metadata: | |
creationTimestamp: "2019-12-03T04:51:50Z" | |
labels: | |
kube-aggregator.kubernetes.io/automanaged: "true" | |
name: v1beta1.security.istio.io | |
resourceVersion: "1424" | |
selfLink: /apis/apiregistration.k8s.io/v1/apiservices/v1beta1.security.istio.io | |
uid: 9e227df6-1588-11ea-b5af-027e0b84da98 | |
spec: | |
group: security.istio.io | |
groupPriorityMinimum: 1000 | |
service: null | |
version: v1beta1 | |
versionPriority: 100 | |
status: | |
conditions: | |
- lastTransitionTime: "2019-12-03T04:51:50Z" | |
message: Local APIServices are always available | |
reason: Local | |
status: "True" | |
type: Available | |
- apiVersion: apiregistration.k8s.io/v1 | |
kind: APIService | |
metadata: | |
creationTimestamp: "2019-12-03T10:54:07Z" | |
labels: | |
kube-aggregator.kubernetes.io/automanaged: "true" | |
name: v1beta1.serving.knative.dev | |
resourceVersion: "43823" | |
selfLink: /apis/apiregistration.k8s.io/v1/apiservices/v1beta1.serving.knative.dev | |
uid: 3aa286f1-15bb-11ea-b5af-027e0b84da98 | |
spec: | |
group: serving.knative.dev | |
groupPriorityMinimum: 1000 | |
service: null | |
version: v1beta1 | |
versionPriority: 100 | |
status: | |
conditions: | |
- lastTransitionTime: "2019-12-03T10:54:07Z" | |
message: Local APIServices are always available | |
reason: Local | |
status: "True" | |
type: Available | |
- apiVersion: apiregistration.k8s.io/v1 | |
kind: APIService | |
metadata: | |
creationTimestamp: "2019-12-03T04:43:10Z" | |
labels: | |
kube-aggregator.kubernetes.io/automanaged: onstart | |
name: v1beta1.storage.k8s.io | |
resourceVersion: "39" | |
selfLink: /apis/apiregistration.k8s.io/v1/apiservices/v1beta1.storage.k8s.io | |
uid: 68272926-1587-11ea-b5af-027e0b84da98 | |
spec: | |
group: storage.k8s.io | |
groupPriorityMinimum: 16800 | |
service: null | |
version: v1beta1 | |
versionPriority: 9 | |
status: | |
conditions: | |
- lastTransitionTime: "2019-12-03T04:43:10Z" | |
message: Local APIServices are always available | |
reason: Local | |
status: "True" | |
type: Available | |
- apiVersion: apiregistration.k8s.io/v1 | |
kind: APIService | |
metadata: | |
creationTimestamp: "2019-12-03T04:43:09Z" | |
labels: | |
kube-aggregator.kubernetes.io/automanaged: onstart | |
name: v1beta2.apps | |
resourceVersion: "15" | |
selfLink: /apis/apiregistration.k8s.io/v1/apiservices/v1beta2.apps | |
uid: 681fba23-1587-11ea-b5af-027e0b84da98 | |
spec: | |
group: apps | |
groupPriorityMinimum: 17800 | |
service: null | |
version: v1beta2 | |
versionPriority: 9 | |
status: | |
conditions: | |
- lastTransitionTime: "2019-12-03T04:43:09Z" | |
message: Local APIServices are always available | |
reason: Local | |
status: "True" | |
type: Available | |
- apiVersion: apiregistration.k8s.io/v1 | |
kind: APIService | |
metadata: | |
creationTimestamp: "2019-12-03T04:43:10Z" | |
labels: | |
kube-aggregator.kubernetes.io/automanaged: onstart | |
name: v2beta1.autoscaling | |
resourceVersion: "22" | |
selfLink: /apis/apiregistration.k8s.io/v1/apiservices/v2beta1.autoscaling | |
uid: 68217e87-1587-11ea-b5af-027e0b84da98 | |
spec: | |
group: autoscaling | |
groupPriorityMinimum: 17500 | |
service: null | |
version: v2beta1 | |
versionPriority: 9 | |
status: | |
conditions: | |
- lastTransitionTime: "2019-12-03T04:43:10Z" | |
message: Local APIServices are always available | |
reason: Local | |
status: "True" | |
type: Available | |
- apiVersion: apiregistration.k8s.io/v1 | |
kind: APIService | |
metadata: | |
creationTimestamp: "2019-12-03T04:43:10Z" | |
labels: | |
kube-aggregator.kubernetes.io/automanaged: onstart | |
name: v2beta2.autoscaling | |
resourceVersion: "21" | |
selfLink: /apis/apiregistration.k8s.io/v1/apiservices/v2beta2.autoscaling | |
uid: 68219048-1587-11ea-b5af-027e0b84da98 | |
spec: | |
group: autoscaling | |
groupPriorityMinimum: 17500 | |
service: null | |
version: v2beta2 | |
versionPriority: 1 | |
status: | |
conditions: | |
- lastTransitionTime: "2019-12-03T04:43:10Z" | |
message: Local APIServices are always available | |
reason: Local | |
status: "True" | |
type: Available | |
kind: List | |
metadata: | |
resourceVersion: "" | |
selfLink: "" | |
------- | |
resource: controllerrevisions | |
------- | |
apiVersion: v1 | |
items: [] | |
kind: List | |
metadata: | |
resourceVersion: "" | |
selfLink: "" | |
------- | |
resource: daemonsets | |
------- | |
apiVersion: v1 | |
items: [] | |
kind: List | |
metadata: | |
resourceVersion: "" | |
selfLink: "" | |
------- | |
resource: deployments | |
------- | |
apiVersion: v1 | |
items: | |
- apiVersion: extensions/v1beta1 | |
kind: Deployment | |
metadata: | |
annotations: | |
deployment.kubernetes.io/revision: "1" | |
serving.knative.dev/creator: admin | |
sidecar.istio.io/inject: "true" | |
creationTimestamp: "2019-12-03T12:44:54Z" | |
generation: 1 | |
labels: | |
app: hello-example-1 | |
serving.knative.dev/configuration: hello-example | |
serving.knative.dev/configurationGeneration: "1" | |
serving.knative.dev/revision: hello-example-1 | |
serving.knative.dev/revisionUID: b40e6e6d-15ca-11ea-b5af-027e0b84da98 | |
serving.knative.dev/service: hello-example | |
name: hello-example-1-deployment | |
namespace: serving-tests | |
ownerReferences: | |
- apiVersion: serving.knative.dev/v1alpha1 | |
blockOwnerDeletion: true | |
controller: true | |
kind: Revision | |
name: hello-example-1 | |
uid: b40e6e6d-15ca-11ea-b5af-027e0b84da98 | |
resourceVersion: "57332" | |
selfLink: /apis/extensions/v1beta1/namespaces/serving-tests/deployments/hello-example-1-deployment | |
uid: b48fd382-15ca-11ea-b5af-027e0b84da98 | |
spec: | |
progressDeadlineSeconds: 120 | |
replicas: 1 | |
revisionHistoryLimit: 10 | |
selector: | |
matchLabels: | |
serving.knative.dev/revisionUID: b40e6e6d-15ca-11ea-b5af-027e0b84da98 | |
strategy: | |
rollingUpdate: | |
maxSurge: 25% | |
maxUnavailable: 25% | |
type: RollingUpdate | |
template: | |
metadata: | |
annotations: | |
serving.knative.dev/creator: admin | |
sidecar.istio.io/inject: "true" | |
traffic.sidecar.istio.io/includeOutboundIPRanges: '*' | |
creationTimestamp: null | |
labels: | |
app: hello-example-1 | |
serving.knative.dev/configuration: hello-example | |
serving.knative.dev/configurationGeneration: "1" | |
serving.knative.dev/revision: hello-example-1 | |
serving.knative.dev/revisionUID: b40e6e6d-15ca-11ea-b5af-027e0b84da98 | |
serving.knative.dev/service: hello-example | |
spec: | |
containers: | |
- env: | |
- name: TARGET | |
value: OpenShift Meetup! | |
- name: PORT | |
value: "8080" | |
- name: K_REVISION | |
value: hello-example-1 | |
- name: K_CONFIGURATION | |
value: hello-example | |
- name: K_SERVICE | |
value: hello-example | |
image: gcr.io/knative-samples/helloworld-go@sha256:5ea96ba4b872685ff4ddb5cd8d1a97ec18c18fae79ee8df0d29f446c5efe5f50 | |
imagePullPolicy: IfNotPresent | |
lifecycle: | |
preStop: | |
httpGet: | |
path: /wait-for-drain | |
port: 8022 | |
scheme: HTTP | |
name: user-container | |
ports: | |
- containerPort: 8080 | |
name: user-port | |
protocol: TCP | |
resources: {} | |
terminationMessagePath: /dev/termination-log | |
terminationMessagePolicy: FallbackToLogsOnError | |
volumeMounts: | |
- mountPath: /var/log | |
name: knative-var-log | |
- env: | |
- name: SERVING_NAMESPACE | |
value: serving-tests | |
- name: SERVING_SERVICE | |
value: hello-example | |
- name: SERVING_CONFIGURATION | |
value: hello-example | |
- name: SERVING_REVISION | |
value: hello-example-1 | |
- name: QUEUE_SERVING_PORT | |
value: "8012" | |
- name: CONTAINER_CONCURRENCY | |
value: "0" | |
- name: REVISION_TIMEOUT_SECONDS | |
value: "300" | |
- name: SERVING_POD | |
valueFrom: | |
fieldRef: | |
apiVersion: v1 | |
fieldPath: metadata.name | |
- name: SERVING_POD_IP | |
valueFrom: | |
fieldRef: | |
apiVersion: v1 | |
fieldPath: status.podIP | |
- name: SERVING_LOGGING_CONFIG | |
value: | | |
{ | |
"level": "debug", | |
"development": false, | |
"outputPaths": ["stdout"], | |
"errorOutputPaths": ["stderr"], | |
"encoding": "json", | |
"encoderConfig": { | |
"timeKey": "ts", | |
"levelKey": "level", | |
"nameKey": "logger", | |
"callerKey": "caller", | |
"messageKey": "msg", | |
"stacktraceKey": "stacktrace", | |
"lineEnding": "", | |
"levelEncoder": "", | |
"timeEncoder": "iso8601", | |
"durationEncoder": "", | |
"callerEncoder": "" | |
} | |
} | |
- name: SERVING_LOGGING_LEVEL | |
value: debug | |
- name: SERVING_REQUEST_LOG_TEMPLATE | |
- name: SERVING_REQUEST_METRICS_BACKEND | |
value: prometheus | |
- name: TRACING_CONFIG_BACKEND | |
value: none | |
- name: TRACING_CONFIG_ZIPKIN_ENDPOINT | |
- name: TRACING_CONFIG_STACKDRIVER_PROJECT_ID | |
- name: TRACING_CONFIG_DEBUG | |
value: "false" | |
- name: TRACING_CONFIG_SAMPLE_RATE | |
value: "0.100000" | |
- name: USER_PORT | |
value: "8080" | |
- name: SYSTEM_NAMESPACE | |
value: knative-serving | |
- name: METRICS_DOMAIN | |
value: knative.dev/internal/serving | |
- name: USER_CONTAINER_NAME | |
value: user-container | |
- name: ENABLE_VAR_LOG_COLLECTION | |
value: "false" | |
- name: VAR_LOG_VOLUME_NAME | |
value: knative-var-log | |
- name: INTERNAL_VOLUME_PATH | |
value: /var/knative-internal | |
- name: SERVING_READINESS_PROBE | |
value: '{"tcpSocket":{"port":8080,"host":"127.0.0.1"},"successThreshold":1}' | |
- name: ENABLE_PROFILING | |
value: "false" | |
- name: SERVING_ENABLE_PROBE_REQUEST_LOG | |
value: "false" | |
image: gcr.io/gcp-compute-engine-223401/queue-39be6f1d08a095bd076a71d288d295b6@sha256:8adf8f990b4485e7ead4dc9e6f8ddb3a19142835de95386428deb9ffde8d20b2 | |
imagePullPolicy: IfNotPresent | |
name: queue-proxy | |
ports: | |
- containerPort: 8022 | |
name: http-queueadm | |
protocol: TCP | |
- containerPort: 9090 | |
name: queue-metrics | |
protocol: TCP | |
- containerPort: 9091 | |
name: http-usermetric | |
protocol: TCP | |
- containerPort: 8012 | |
name: queue-port | |
protocol: TCP | |
readinessProbe: | |
exec: | |
command: | |
- /ko-app/queue | |
- -probe-period | |
- "0" | |
failureThreshold: 3 | |
periodSeconds: 1 | |
successThreshold: 1 | |
timeoutSeconds: 10 | |
resources: | |
requests: | |
cpu: 25m | |
securityContext: | |
allowPrivilegeEscalation: false | |
terminationMessagePath: /dev/termination-log | |
terminationMessagePolicy: File | |
dnsPolicy: ClusterFirst | |
restartPolicy: Always | |
schedulerName: default-scheduler | |
securityContext: {} | |
terminationGracePeriodSeconds: 300 | |
volumes: | |
- emptyDir: {} | |
name: knative-var-log | |
status: | |
availableReplicas: 1 | |
conditions: | |
- lastTransitionTime: "2019-12-03T12:44:59Z" | |
lastUpdateTime: "2019-12-03T12:44:59Z" | |
message: Deployment has minimum availability. | |
reason: MinimumReplicasAvailable | |
status: "True" | |
type: Available | |
- lastTransitionTime: "2019-12-03T12:44:54Z" | |
lastUpdateTime: "2019-12-03T12:44:59Z" | |
message: ReplicaSet "hello-example-1-deployment-77cf969dd8" has successfully | |
progressed. | |
reason: NewReplicaSetAvailable | |
status: "True" | |
type: Progressing | |
observedGeneration: 1 | |
readyReplicas: 1 | |
replicas: 1 | |
updatedReplicas: 1 | |
kind: List | |
metadata: | |
resourceVersion: "" | |
selfLink: "" | |
------- | |
resource: replicasets | |
------- | |
apiVersion: v1 | |
items: | |
- apiVersion: extensions/v1beta1 | |
kind: ReplicaSet | |
metadata: | |
annotations: | |
deployment.kubernetes.io/desired-replicas: "1" | |
deployment.kubernetes.io/max-replicas: "2" | |
deployment.kubernetes.io/revision: "1" | |
serving.knative.dev/creator: admin | |
sidecar.istio.io/inject: "true" | |
creationTimestamp: "2019-12-03T12:44:54Z" | |
generation: 1 | |
labels: | |
app: hello-example-1 | |
pod-template-hash: 77cf969dd8 | |
serving.knative.dev/configuration: hello-example | |
serving.knative.dev/configurationGeneration: "1" | |
serving.knative.dev/revision: hello-example-1 | |
serving.knative.dev/revisionUID: b40e6e6d-15ca-11ea-b5af-027e0b84da98 | |
serving.knative.dev/service: hello-example | |
name: hello-example-1-deployment-77cf969dd8 | |
namespace: serving-tests | |
ownerReferences: | |
- apiVersion: apps/v1 | |
blockOwnerDeletion: true | |
controller: true | |
kind: Deployment | |
name: hello-example-1-deployment | |
uid: b48fd382-15ca-11ea-b5af-027e0b84da98 | |
resourceVersion: "57330" | |
selfLink: /apis/extensions/v1beta1/namespaces/serving-tests/replicasets/hello-example-1-deployment-77cf969dd8 | |
uid: b49122af-15ca-11ea-b5af-027e0b84da98 | |
spec: | |
replicas: 1 | |
selector: | |
matchLabels: | |
pod-template-hash: 77cf969dd8 | |
serving.knative.dev/revisionUID: b40e6e6d-15ca-11ea-b5af-027e0b84da98 | |
template: | |
metadata: | |
annotations: | |
serving.knative.dev/creator: admin | |
sidecar.istio.io/inject: "true" | |
traffic.sidecar.istio.io/includeOutboundIPRanges: '*' | |
creationTimestamp: null | |
labels: | |
app: hello-example-1 | |
pod-template-hash: 77cf969dd8 | |
serving.knative.dev/configuration: hello-example | |
serving.knative.dev/configurationGeneration: "1" | |
serving.knative.dev/revision: hello-example-1 | |
serving.knative.dev/revisionUID: b40e6e6d-15ca-11ea-b5af-027e0b84da98 | |
serving.knative.dev/service: hello-example | |
spec: | |
containers: | |
- env: | |
- name: TARGET | |
value: OpenShift Meetup! | |
- name: PORT | |
value: "8080" | |
- name: K_REVISION | |
value: hello-example-1 | |
- name: K_CONFIGURATION | |
value: hello-example | |
- name: K_SERVICE | |
value: hello-example | |
image: gcr.io/knative-samples/helloworld-go@sha256:5ea96ba4b872685ff4ddb5cd8d1a97ec18c18fae79ee8df0d29f446c5efe5f50 | |
imagePullPolicy: IfNotPresent | |
lifecycle: | |
preStop: | |
httpGet: | |
path: /wait-for-drain | |
port: 8022 | |
scheme: HTTP | |
name: user-container | |
ports: | |
- containerPort: 8080 | |
name: user-port | |
protocol: TCP | |
resources: {} | |
terminationMessagePath: /dev/termination-log | |
terminationMessagePolicy: FallbackToLogsOnError | |
volumeMounts: | |
- mountPath: /var/log | |
name: knative-var-log | |
- env: | |
- name: SERVING_NAMESPACE | |
value: serving-tests | |
- name: SERVING_SERVICE | |
value: hello-example | |
- name: SERVING_CONFIGURATION | |
value: hello-example | |
- name: SERVING_REVISION | |
value: hello-example-1 | |
- name: QUEUE_SERVING_PORT | |
value: "8012" | |
- name: CONTAINER_CONCURRENCY | |
value: "0" | |
- name: REVISION_TIMEOUT_SECONDS | |
value: "300" | |
- name: SERVING_POD | |
valueFrom: | |
fieldRef: | |
apiVersion: v1 | |
fieldPath: metadata.name | |
- name: SERVING_POD_IP | |
valueFrom: | |
fieldRef: | |
apiVersion: v1 | |
fieldPath: status.podIP | |
- name: SERVING_LOGGING_CONFIG | |
value: | | |
{ | |
"level": "debug", | |
"development": false, | |
"outputPaths": ["stdout"], | |
"errorOutputPaths": ["stderr"], | |
"encoding": "json", | |
"encoderConfig": { | |
"timeKey": "ts", | |
"levelKey": "level", | |
"nameKey": "logger", | |
"callerKey": "caller", | |
"messageKey": "msg", | |
"stacktraceKey": "stacktrace", | |
"lineEnding": "", | |
"levelEncoder": "", | |
"timeEncoder": "iso8601", | |
"durationEncoder": "", | |
"callerEncoder": "" | |
} | |
} | |
- name: SERVING_LOGGING_LEVEL | |
value: debug | |
- name: SERVING_REQUEST_LOG_TEMPLATE | |
- name: SERVING_REQUEST_METRICS_BACKEND | |
value: prometheus | |
- name: TRACING_CONFIG_BACKEND | |
value: none | |
- name: TRACING_CONFIG_ZIPKIN_ENDPOINT | |
- name: TRACING_CONFIG_STACKDRIVER_PROJECT_ID | |
- name: TRACING_CONFIG_DEBUG | |
value: "false" | |
- name: TRACING_CONFIG_SAMPLE_RATE | |
value: "0.100000" | |
- name: USER_PORT | |
value: "8080" | |
- name: SYSTEM_NAMESPACE | |
value: knative-serving | |
- name: METRICS_DOMAIN | |
value: knative.dev/internal/serving | |
- name: USER_CONTAINER_NAME | |
value: user-container | |
- name: ENABLE_VAR_LOG_COLLECTION | |
value: "false" | |
- name: VAR_LOG_VOLUME_NAME | |
value: knative-var-log | |
- name: INTERNAL_VOLUME_PATH | |
value: /var/knative-internal | |
- name: SERVING_READINESS_PROBE | |
value: '{"tcpSocket":{"port":8080,"host":"127.0.0.1"},"successThreshold":1}' | |
- name: ENABLE_PROFILING | |
value: "false" | |
- name: SERVING_ENABLE_PROBE_REQUEST_LOG | |
value: "false" | |
image: gcr.io/gcp-compute-engine-223401/queue-39be6f1d08a095bd076a71d288d295b6@sha256:8adf8f990b4485e7ead4dc9e6f8ddb3a19142835de95386428deb9ffde8d20b2 | |
imagePullPolicy: IfNotPresent | |
name: queue-proxy | |
ports: | |
- containerPort: 8022 | |
name: http-queueadm | |
protocol: TCP | |
- containerPort: 9090 | |
name: queue-metrics | |
protocol: TCP | |
- containerPort: 9091 | |
name: http-usermetric | |
protocol: TCP | |
- containerPort: 8012 | |
name: queue-port | |
protocol: TCP | |
readinessProbe: | |
exec: | |
command: | |
- /ko-app/queue | |
- -probe-period | |
- "0" | |
failureThreshold: 3 | |
periodSeconds: 1 | |
successThreshold: 1 | |
timeoutSeconds: 10 | |
resources: | |
requests: | |
cpu: 25m | |
securityContext: | |
allowPrivilegeEscalation: false | |
terminationMessagePath: /dev/termination-log | |
terminationMessagePolicy: File | |
dnsPolicy: ClusterFirst | |
restartPolicy: Always | |
schedulerName: default-scheduler | |
securityContext: {} | |
terminationGracePeriodSeconds: 300 | |
volumes: | |
- emptyDir: {} | |
name: knative-var-log | |
status: | |
availableReplicas: 1 | |
fullyLabeledReplicas: 1 | |
observedGeneration: 1 | |
readyReplicas: 1 | |
replicas: 1 | |
kind: List | |
metadata: | |
resourceVersion: "" | |
selfLink: "" | |
------- | |
resource: statefulsets | |
------- | |
apiVersion: v1 | |
items: [] | |
kind: List | |
metadata: | |
resourceVersion: "" | |
selfLink: "" | |
------- | |
resource: meshpolicies | |
------- | |
apiVersion: v1 | |
items: | |
- apiVersion: authentication.istio.io/v1alpha1 | |
kind: MeshPolicy | |
metadata: | |
annotations: | |
kubectl.kubernetes.io/last-applied-configuration: | | |
{"apiVersion":"authentication.istio.io/v1alpha1","kind":"MeshPolicy","metadata":{"annotations":{},"labels":{"app":"security","chart":"security","heritage":"Tiller","release":"RELEASE-NAME"},"name":"default"},"spec":{"peers":[{"mtls":{"mode":"PERMISSIVE"}}]}} | |
creationTimestamp: "2019-12-03T04:52:06Z" | |
generation: 1 | |
labels: | |
app: security | |
chart: security | |
heritage: Tiller | |
release: RELEASE-NAME | |
name: default | |
resourceVersion: "1536" | |
selfLink: /apis/authentication.istio.io/v1alpha1/meshpolicies/default | |
uid: a7a5b08f-1588-11ea-b5af-027e0b84da98 | |
spec: | |
peers: | |
- mtls: | |
mode: PERMISSIVE | |
kind: List | |
metadata: | |
resourceVersion: "" | |
selfLink: "" | |
------- | |
resource: policies | |
------- | |
apiVersion: v1 | |
items: | |
- apiVersion: authentication.istio.io/v1alpha1 | |
kind: Policy | |
metadata: | |
annotations: | |
kubectl.kubernetes.io/last-applied-configuration: | | |
{"apiVersion":"authentication.istio.io/v1alpha1","kind":"Policy","metadata":{"annotations":{},"name":"default","namespace":"serving-tests"},"spec":{"peers":[{"mtls":{"mode":"STRICT"}}]}} | |
creationTimestamp: "2019-12-03T06:51:32Z" | |
generation: 1 | |
name: default | |
namespace: serving-tests | |
resourceVersion: "15052" | |
selfLink: /apis/authentication.istio.io/v1alpha1/namespaces/serving-tests/policies/default | |
uid: 570ba184-1599-11ea-b5af-027e0b84da98 | |
spec: | |
peers: | |
- mtls: | |
mode: STRICT | |
kind: List | |
metadata: | |
resourceVersion: "" | |
selfLink: "" | |
------- | |
resource: tokenreviews | |
------- | |
apiVersion: v1 | |
items: [] | |
kind: List | |
metadata: | |
resourceVersion: "" | |
selfLink: "" | |
------- | |
resource: localsubjectaccessreviews | |
------- | |
apiVersion: v1 | |
items: [] | |
kind: List | |
metadata: | |
resourceVersion: "" | |
selfLink: "" | |
------- | |
resource: selfsubjectaccessreviews | |
------- | |
apiVersion: v1 | |
items: [] | |
kind: List | |
metadata: | |
resourceVersion: "" | |
selfLink: "" | |
------- | |
resource: selfsubjectrulesreviews | |
------- | |
apiVersion: v1 | |
items: [] | |
kind: List | |
metadata: | |
resourceVersion: "" | |
selfLink: "" | |
------- | |
resource: subjectaccessreviews | |
------- | |
apiVersion: v1 | |
items: [] | |
kind: List | |
metadata: | |
resourceVersion: "" | |
selfLink: "" | |
------- | |
resource: horizontalpodautoscalers | |
------- | |
apiVersion: v1 | |
items: [] | |
kind: List | |
metadata: | |
resourceVersion: "" | |
selfLink: "" | |
------- | |
resource: metrics | |
------- | |
apiVersion: v1 | |
items: | |
- apiVersion: autoscaling.internal.knative.dev/v1alpha1 | |
kind: Metric | |
metadata: | |
annotations: | |
autoscaling.knative.dev/class: kpa.autoscaling.knative.dev | |
autoscaling.knative.dev/metric: concurrency | |
serving.knative.dev/creator: admin | |
sidecar.istio.io/inject: "true" | |
creationTimestamp: "2019-12-03T12:44:54Z" | |
generation: 1 | |
labels: | |
app: hello-example-1 | |
serving.knative.dev/configuration: hello-example | |
serving.knative.dev/configurationGeneration: "1" | |
serving.knative.dev/revision: hello-example-1 | |
serving.knative.dev/revisionUID: b40e6e6d-15ca-11ea-b5af-027e0b84da98 | |
serving.knative.dev/service: hello-example | |
name: hello-example-1 | |
namespace: serving-tests | |
ownerReferences: | |
- apiVersion: autoscaling.internal.knative.dev/v1alpha1 | |
blockOwnerDeletion: true | |
controller: true | |
kind: PodAutoscaler | |
name: hello-example-1 | |
uid: b495b7cf-15ca-11ea-b5af-027e0b84da98 | |
resourceVersion: "57312" | |
selfLink: /apis/autoscaling.internal.knative.dev/v1alpha1/namespaces/serving-tests/metrics/hello-example-1 | |
uid: b4c059f0-15ca-11ea-b5af-027e0b84da98 | |
spec: | |
panicWindow: 6000000000 | |
scrapeTarget: hello-example-1-private | |
stableWindow: 60000000000 | |
status: | |
conditions: | |
- lastTransitionTime: "2019-12-03T12:44:54Z" | |
status: "True" | |
type: Ready | |
kind: List | |
metadata: | |
resourceVersion: "" | |
selfLink: "" | |
------- | |
resource: podautoscalers | |
------- | |
apiVersion: v1 | |
items: | |
- apiVersion: autoscaling.internal.knative.dev/v1alpha1 | |
kind: PodAutoscaler | |
metadata: | |
annotations: | |
autoscaling.knative.dev/class: kpa.autoscaling.knative.dev | |
autoscaling.knative.dev/metric: concurrency | |
serving.knative.dev/creator: admin | |
sidecar.istio.io/inject: "true" | |
creationTimestamp: "2019-12-03T12:44:54Z" | |
generation: 4 | |
labels: | |
app: hello-example-1 | |
serving.knative.dev/configuration: hello-example | |
serving.knative.dev/configurationGeneration: "1" | |
serving.knative.dev/revision: hello-example-1 | |
serving.knative.dev/revisionUID: b40e6e6d-15ca-11ea-b5af-027e0b84da98 | |
serving.knative.dev/service: hello-example | |
name: hello-example-1 | |
namespace: serving-tests | |
ownerReferences: | |
- apiVersion: serving.knative.dev/v1alpha1 | |
blockOwnerDeletion: true | |
controller: true | |
kind: Revision | |
name: hello-example-1 | |
uid: b40e6e6d-15ca-11ea-b5af-027e0b84da98 | |
resourceVersion: "57466" | |
selfLink: /apis/autoscaling.internal.knative.dev/v1alpha1/namespaces/serving-tests/podautoscalers/hello-example-1 | |
uid: b495b7cf-15ca-11ea-b5af-027e0b84da98 | |
spec: | |
protocolType: http1 | |
reachability: Reachable | |
scaleTargetRef: | |
apiVersion: apps/v1 | |
kind: Deployment | |
name: hello-example-1-deployment | |
status: | |
actualScale: 1 | |
conditions: | |
- lastTransitionTime: "2019-12-03T12:45:59Z" | |
message: The target is not receiving traffic. | |
reason: NoTraffic | |
status: "False" | |
type: Active | |
- lastTransitionTime: "2019-12-03T12:45:59Z" | |
message: The target is not receiving traffic. | |
reason: NoTraffic | |
status: "False" | |
type: Ready | |
desiredScale: 0 | |
metricsServiceName: hello-example-1-private | |
observedGeneration: 4 | |
serviceName: hello-example-1 | |
kind: List | |
metadata: | |
resourceVersion: "" | |
selfLink: "" | |
------- | |
resource: cronjobs | |
------- | |
apiVersion: v1 | |
items: [] | |
kind: List | |
metadata: | |
resourceVersion: "" | |
selfLink: "" | |
------- | |
resource: jobs | |
------- | |
apiVersion: v1 | |
items: [] | |
kind: List | |
metadata: | |
resourceVersion: "" | |
selfLink: "" | |
------- | |
resource: images | |
------- | |
apiVersion: v1 | |
items: | |
- apiVersion: caching.internal.knative.dev/v1alpha1 | |
kind: Image | |
metadata: | |
annotations: | |
serving.knative.dev/creator: admin | |
sidecar.istio.io/inject: "true" | |
creationTimestamp: "2019-12-03T12:44:54Z" | |
generation: 1 | |
labels: | |
app: hello-example-1 | |
serving.knative.dev/configuration: hello-example | |
serving.knative.dev/configurationGeneration: "1" | |
serving.knative.dev/revision: hello-example-1 | |
serving.knative.dev/revisionUID: b40e6e6d-15ca-11ea-b5af-027e0b84da98 | |
serving.knative.dev/service: hello-example | |
name: hello-example-1-cache | |
namespace: serving-tests | |
ownerReferences: | |
- apiVersion: serving.knative.dev/v1alpha1 | |
blockOwnerDeletion: true | |
controller: true | |
kind: Revision | |
name: hello-example-1 | |
uid: b40e6e6d-15ca-11ea-b5af-027e0b84da98 | |
resourceVersion: "57288" | |
selfLink: /apis/caching.internal.knative.dev/v1alpha1/namespaces/serving-tests/images/hello-example-1-cache | |
uid: b492fd9b-15ca-11ea-b5af-027e0b84da98 | |
spec: | |
image: gcr.io/knative-samples/helloworld-go@sha256:5ea96ba4b872685ff4ddb5cd8d1a97ec18c18fae79ee8df0d29f446c5efe5f50 | |
kind: List | |
metadata: | |
resourceVersion: "" | |
selfLink: "" | |
------- | |
resource: certificatesigningrequests | |
------- | |
apiVersion: v1 | |
items: [] | |
kind: List | |
metadata: | |
resourceVersion: "" | |
selfLink: "" | |
------- | |
resource: adapters | |
------- | |
apiVersion: v1 | |
items: [] | |
kind: List | |
metadata: | |
resourceVersion: "" | |
selfLink: "" | |
------- | |
resource: attributemanifests | |
------- | |
apiVersion: v1 | |
items: [] | |
kind: List | |
metadata: | |
resourceVersion: "" | |
selfLink: "" | |
------- | |
resource: handlers | |
------- | |
apiVersion: v1 | |
items: [] | |
kind: List | |
metadata: | |
resourceVersion: "" | |
selfLink: "" | |
------- | |
resource: httpapispecbindings | |
------- | |
apiVersion: v1 | |
items: [] | |
kind: List | |
metadata: | |
resourceVersion: "" | |
selfLink: "" | |
------- | |
resource: httpapispecs | |
------- | |
apiVersion: v1 | |
items: [] | |
kind: List | |
metadata: | |
resourceVersion: "" | |
selfLink: "" | |
------- | |
resource: instances | |
------- | |
apiVersion: v1 | |
items: [] | |
kind: List | |
metadata: | |
resourceVersion: "" | |
selfLink: "" | |
------- | |
resource: quotaspecbindings | |
------- | |
apiVersion: v1 | |
items: [] | |
kind: List | |
metadata: | |
resourceVersion: "" | |
selfLink: "" | |
------- | |
resource: quotaspecs | |
------- | |
apiVersion: v1 | |
items: [] | |
kind: List | |
metadata: | |
resourceVersion: "" | |
selfLink: "" | |
------- | |
resource: rules | |
------- | |
apiVersion: v1 | |
items: [] | |
kind: List | |
metadata: | |
resourceVersion: "" | |
selfLink: "" | |
------- | |
resource: templates | |
------- | |
apiVersion: v1 | |
items: [] | |
kind: List | |
metadata: | |
resourceVersion: "" | |
selfLink: "" | |
------- | |
resource: leases | |
------- | |
apiVersion: v1 | |
items: [] | |
kind: List | |
metadata: | |
resourceVersion: "" | |
selfLink: "" | |
------- | |
resource: eniconfigs | |
------- | |
apiVersion: v1 | |
items: [] | |
kind: List | |
metadata: | |
resourceVersion: "" | |
selfLink: "" | |
------- | |
resource: events | |
------- | |
apiVersion: v1 | |
items: | |
- apiVersion: v1 | |
count: 1 | |
eventTime: null | |
firstTimestamp: "2019-12-03T12:44:54Z" | |
involvedObject: | |
apiVersion: v1 | |
kind: Pod | |
name: hello-example-1-deployment-77cf969dd8-wkn87 | |
namespace: serving-tests | |
resourceVersion: "57290" | |
uid: b497b9e0-15ca-11ea-b5af-027e0b84da98 | |
kind: Event | |
lastTimestamp: "2019-12-03T12:44:54Z" | |
message: Successfully assigned serving-tests/hello-example-1-deployment-77cf969dd8-wkn87 | |
to ip-172-20-44-18.ap-southeast-1.compute.internal | |
metadata: | |
creationTimestamp: "2019-12-03T12:44:54Z" | |
name: hello-example-1-deployment-77cf969dd8-wkn87.15dcdd1eee7ea004 | |
namespace: serving-tests | |
resourceVersion: "3662" | |
selfLink: /api/v1/namespaces/serving-tests/events/hello-example-1-deployment-77cf969dd8-wkn87.15dcdd1eee7ea004 | |
uid: b49c444d-15ca-11ea-b5af-027e0b84da98 | |
reason: Scheduled | |
reportingComponent: "" | |
reportingInstance: "" | |
source: | |
component: default-scheduler | |
type: Normal | |
- apiVersion: v1 | |
count: 1 | |
eventTime: null | |
firstTimestamp: "2019-12-03T12:44:55Z" | |
involvedObject: | |
apiVersion: v1 | |
fieldPath: spec.initContainers{istio-init} | |
kind: Pod | |
name: hello-example-1-deployment-77cf969dd8-wkn87 | |
namespace: serving-tests | |
resourceVersion: "57292" | |
uid: b497b9e0-15ca-11ea-b5af-027e0b84da98 | |
kind: Event | |
lastTimestamp: "2019-12-03T12:44:55Z" | |
message: Container image "docker.io/istio/proxyv2:1.4.0" already present on machine | |
metadata: | |
creationTimestamp: "2019-12-03T12:44:55Z" | |
name: hello-example-1-deployment-77cf969dd8-wkn87.15dcdd1f1713e14f | |
namespace: serving-tests | |
resourceVersion: "3666" | |
selfLink: /api/v1/namespaces/serving-tests/events/hello-example-1-deployment-77cf969dd8-wkn87.15dcdd1f1713e14f | |
uid: b5043ed7-15ca-11ea-b5af-027e0b84da98 | |
reason: Pulled | |
reportingComponent: "" | |
reportingInstance: "" | |
source: | |
component: kubelet | |
host: ip-172-20-44-18.ap-southeast-1.compute.internal | |
type: Normal | |
- apiVersion: v1 | |
count: 1 | |
eventTime: null | |
firstTimestamp: "2019-12-03T12:44:55Z" | |
involvedObject: | |
apiVersion: v1 | |
fieldPath: spec.initContainers{istio-init} | |
kind: Pod | |
name: hello-example-1-deployment-77cf969dd8-wkn87 | |
namespace: serving-tests | |
resourceVersion: "57292" | |
uid: b497b9e0-15ca-11ea-b5af-027e0b84da98 | |
kind: Event | |
lastTimestamp: "2019-12-03T12:44:55Z" | |
message: Created container istio-init | |
metadata: | |
creationTimestamp: "2019-12-03T12:44:55Z" | |
name: hello-example-1-deployment-77cf969dd8-wkn87.15dcdd1f1a510dbd | |
namespace: serving-tests | |
resourceVersion: "3667" | |
selfLink: /api/v1/namespaces/serving-tests/events/hello-example-1-deployment-77cf969dd8-wkn87.15dcdd1f1a510dbd | |
uid: b50c805c-15ca-11ea-b5af-027e0b84da98 | |
reason: Created | |
reportingComponent: "" | |
reportingInstance: "" | |
source: | |
component: kubelet | |
host: ip-172-20-44-18.ap-southeast-1.compute.internal | |
type: Normal | |
- apiVersion: v1 | |
count: 1 | |
eventTime: null | |
firstTimestamp: "2019-12-03T12:44:55Z" | |
involvedObject: | |
apiVersion: v1 | |
fieldPath: spec.initContainers{istio-init} | |
kind: Pod | |
name: hello-example-1-deployment-77cf969dd8-wkn87 | |
namespace: serving-tests | |
resourceVersion: "57292" | |
uid: b497b9e0-15ca-11ea-b5af-027e0b84da98 | |
kind: Event | |
lastTimestamp: "2019-12-03T12:44:55Z" | |
message: Started container istio-init | |
metadata: | |
creationTimestamp: "2019-12-03T12:44:55Z" | |
name: hello-example-1-deployment-77cf969dd8-wkn87.15dcdd1f228a5329 | |
namespace: serving-tests | |
resourceVersion: "3668" | |
selfLink: /api/v1/namespaces/serving-tests/events/hello-example-1-deployment-77cf969dd8-wkn87.15dcdd1f228a5329 | |
uid: b521ab1a-15ca-11ea-b5af-027e0b84da98 | |
reason: Started | |
reportingComponent: "" | |
reportingInstance: "" | |
source: | |
component: kubelet | |
host: ip-172-20-44-18.ap-southeast-1.compute.internal | |
type: Normal | |
- apiVersion: v1 | |
count: 1 | |
eventTime: null | |
firstTimestamp: "2019-12-03T12:44:56Z" | |
involvedObject: | |
apiVersion: v1 | |
fieldPath: spec.containers{user-container} | |
kind: Pod | |
name: hello-example-1-deployment-77cf969dd8-wkn87 | |
namespace: serving-tests | |
resourceVersion: "57292" | |
uid: b497b9e0-15ca-11ea-b5af-027e0b84da98 | |
kind: Event | |
lastTimestamp: "2019-12-03T12:44:56Z" | |
message: Container image "gcr.io/knative-samples/helloworld-go@sha256:5ea96ba4b872685ff4ddb5cd8d1a97ec18c18fae79ee8df0d29f446c5efe5f50" | |
already present on machine | |
metadata: | |
creationTimestamp: "2019-12-03T12:44:56Z" | |
name: hello-example-1-deployment-77cf969dd8-wkn87.15dcdd1f51ad4ee9 | |
namespace: serving-tests | |
resourceVersion: "3669" | |
selfLink: /api/v1/namespaces/serving-tests/events/hello-example-1-deployment-77cf969dd8-wkn87.15dcdd1f51ad4ee9 | |
uid: b59a47ff-15ca-11ea-b5af-027e0b84da98 | |
reason: Pulled | |
reportingComponent: "" | |
reportingInstance: "" | |
source: | |
component: kubelet | |
host: ip-172-20-44-18.ap-southeast-1.compute.internal | |
type: Normal | |
- apiVersion: v1 | |
count: 1 | |
eventTime: null | |
firstTimestamp: "2019-12-03T12:44:56Z" | |
involvedObject: | |
apiVersion: v1 | |
fieldPath: spec.containers{user-container} | |
kind: Pod | |
name: hello-example-1-deployment-77cf969dd8-wkn87 | |
namespace: serving-tests | |
resourceVersion: "57292" | |
uid: b497b9e0-15ca-11ea-b5af-027e0b84da98 | |
kind: Event | |
lastTimestamp: "2019-12-03T12:44:56Z" | |
message: Created container user-container | |
metadata: | |
creationTimestamp: "2019-12-03T12:44:56Z" | |
name: hello-example-1-deployment-77cf969dd8-wkn87.15dcdd1f5509e9c4 | |
namespace: serving-tests | |
resourceVersion: "3670" | |
selfLink: /api/v1/namespaces/serving-tests/events/hello-example-1-deployment-77cf969dd8-wkn87.15dcdd1f5509e9c4 | |
uid: b5a2d0c1-15ca-11ea-b5af-027e0b84da98 | |
reason: Created | |
reportingComponent: "" | |
reportingInstance: "" | |
source: | |
component: kubelet | |
host: ip-172-20-44-18.ap-southeast-1.compute.internal | |
type: Normal | |
- apiVersion: v1 | |
count: 1 | |
eventTime: null | |
firstTimestamp: "2019-12-03T12:44:56Z" | |
involvedObject: | |
apiVersion: v1 | |
fieldPath: spec.containers{user-container} | |
kind: Pod | |
name: hello-example-1-deployment-77cf969dd8-wkn87 | |
namespace: serving-tests | |
resourceVersion: "57292" | |
uid: b497b9e0-15ca-11ea-b5af-027e0b84da98 | |
kind: Event | |
lastTimestamp: "2019-12-03T12:44:56Z" | |
message: Started container user-container | |
metadata: | |
creationTimestamp: "2019-12-03T12:44:56Z" | |
name: hello-example-1-deployment-77cf969dd8-wkn87.15dcdd1f5dda4f60 | |
namespace: serving-tests | |
resourceVersion: "3671" | |
selfLink: /api/v1/namespaces/serving-tests/events/hello-example-1-deployment-77cf969dd8-wkn87.15dcdd1f5dda4f60 | |
uid: b5b96b58-15ca-11ea-b5af-027e0b84da98 | |
reason: Started | |
reportingComponent: "" | |
reportingInstance: "" | |
source: | |
component: kubelet | |
host: ip-172-20-44-18.ap-southeast-1.compute.internal | |
type: Normal | |
- apiVersion: v1 | |
count: 1 | |
eventTime: null | |
firstTimestamp: "2019-12-03T12:44:56Z" | |
involvedObject: | |
apiVersion: v1 | |
fieldPath: spec.containers{queue-proxy} | |
kind: Pod | |
name: hello-example-1-deployment-77cf969dd8-wkn87 | |
namespace: serving-tests | |
resourceVersion: "57292" | |
uid: b497b9e0-15ca-11ea-b5af-027e0b84da98 | |
kind: Event | |
lastTimestamp: "2019-12-03T12:44:56Z" | |
message: Container image "gcr.io/gcp-compute-engine-223401/queue-39be6f1d08a095bd076a71d288d295b6@sha256:8adf8f990b4485e7ead4dc9e6f8ddb3a19142835de95386428deb9ffde8d20b2" | |
already present on machine | |
metadata: | |
creationTimestamp: "2019-12-03T12:44:56Z" | |
name: hello-example-1-deployment-77cf969dd8-wkn87.15dcdd1f5dfd8790 | |
namespace: serving-tests | |
resourceVersion: "3672" | |
selfLink: /api/v1/namespaces/serving-tests/events/hello-example-1-deployment-77cf969dd8-wkn87.15dcdd1f5dfd8790 | |
uid: b5b9ef75-15ca-11ea-b5af-027e0b84da98 | |
reason: Pulled | |
reportingComponent: "" | |
reportingInstance: "" | |
source: | |
component: kubelet | |
host: ip-172-20-44-18.ap-southeast-1.compute.internal | |
type: Normal | |
- apiVersion: v1 | |
count: 1 | |
eventTime: null | |
firstTimestamp: "2019-12-03T12:44:56Z" | |
involvedObject: | |
apiVersion: v1 | |
fieldPath: spec.containers{queue-proxy} | |
kind: Pod | |
name: hello-example-1-deployment-77cf969dd8-wkn87 | |
namespace: serving-tests | |
resourceVersion: "57292" | |
uid: b497b9e0-15ca-11ea-b5af-027e0b84da98 | |
kind: Event | |
lastTimestamp: "2019-12-03T12:44:56Z" | |
message: Created container queue-proxy | |
metadata: | |
creationTimestamp: "2019-12-03T12:44:56Z" | |
name: hello-example-1-deployment-77cf969dd8-wkn87.15dcdd1f60af649d | |
namespace: serving-tests | |
resourceVersion: "3673" | |
selfLink: /api/v1/namespaces/serving-tests/events/hello-example-1-deployment-77cf969dd8-wkn87.15dcdd1f60af649d | |
uid: b5c0a3d9-15ca-11ea-b5af-027e0b84da98 | |
reason: Created | |
reportingComponent: "" | |
reportingInstance: "" | |
source: | |
component: kubelet | |
host: ip-172-20-44-18.ap-southeast-1.compute.internal | |
type: Normal | |
- apiVersion: v1 | |
count: 1 | |
eventTime: null | |
firstTimestamp: "2019-12-03T12:44:56Z" | |
involvedObject: | |
apiVersion: v1 | |
fieldPath: spec.containers{queue-proxy} | |
kind: Pod | |
name: hello-example-1-deployment-77cf969dd8-wkn87 | |
namespace: serving-tests | |
resourceVersion: "57292" | |
uid: b497b9e0-15ca-11ea-b5af-027e0b84da98 | |
kind: Event | |
lastTimestamp: "2019-12-03T12:44:56Z" | |
message: Started container queue-proxy | |
metadata: | |
creationTimestamp: "2019-12-03T12:44:56Z" | |
name: hello-example-1-deployment-77cf969dd8-wkn87.15dcdd1f6a4ae44a | |
namespace: serving-tests | |
resourceVersion: "3674" | |
selfLink: /api/v1/namespaces/serving-tests/events/hello-example-1-deployment-77cf969dd8-wkn87.15dcdd1f6a4ae44a | |
uid: b5d96c65-15ca-11ea-b5af-027e0b84da98 | |
reason: Started | |
reportingComponent: "" | |
reportingInstance: "" | |
source: | |
component: kubelet | |
host: ip-172-20-44-18.ap-southeast-1.compute.internal | |
type: Normal | |
- apiVersion: v1 | |
count: 1 | |
eventTime: null | |
firstTimestamp: "2019-12-03T12:44:56Z" | |
involvedObject: | |
apiVersion: v1 | |
fieldPath: spec.containers{istio-proxy} | |
kind: Pod | |
name: hello-example-1-deployment-77cf969dd8-wkn87 | |
namespace: serving-tests | |
resourceVersion: "57292" | |
uid: b497b9e0-15ca-11ea-b5af-027e0b84da98 | |
kind: Event | |
lastTimestamp: "2019-12-03T12:44:56Z" | |
message: Container image "docker.io/istio/proxyv2:1.4.0" already present on machine | |
metadata: | |
creationTimestamp: "2019-12-03T12:44:56Z" | |
name: hello-example-1-deployment-77cf969dd8-wkn87.15dcdd1f6a6df4ae | |
namespace: serving-tests | |
resourceVersion: "3675" | |
selfLink: /api/v1/namespaces/serving-tests/events/hello-example-1-deployment-77cf969dd8-wkn87.15dcdd1f6a6df4ae | |
uid: b5da0732-15ca-11ea-b5af-027e0b84da98 | |
reason: Pulled | |
reportingComponent: "" | |
reportingInstance: "" | |
source: | |
component: kubelet | |
host: ip-172-20-44-18.ap-southeast-1.compute.internal | |
type: Normal | |
- apiVersion: v1 | |
count: 1 | |
eventTime: null | |
firstTimestamp: "2019-12-03T12:44:56Z" | |
involvedObject: | |
apiVersion: v1 | |
fieldPath: spec.containers{istio-proxy} | |
kind: Pod | |
name: hello-example-1-deployment-77cf969dd8-wkn87 | |
namespace: serving-tests | |
resourceVersion: "57292" | |
uid: b497b9e0-15ca-11ea-b5af-027e0b84da98 | |
kind: Event | |
lastTimestamp: "2019-12-03T12:44:56Z" | |
message: Created container istio-proxy | |
metadata: | |
creationTimestamp: "2019-12-03T12:44:56Z" | |
name: hello-example-1-deployment-77cf969dd8-wkn87.15dcdd1f6d57b2f3 | |
namespace: serving-tests | |
resourceVersion: "3676" | |
selfLink: /api/v1/namespaces/serving-tests/events/hello-example-1-deployment-77cf969dd8-wkn87.15dcdd1f6d57b2f3 | |
uid: b5e10a79-15ca-11ea-b5af-027e0b84da98 | |
reason: Created | |
reportingComponent: "" | |
reportingInstance: "" | |
source: | |
component: kubelet | |
host: ip-172-20-44-18.ap-southeast-1.compute.internal | |
type: Normal | |
- apiVersion: v1 | |
count: 1 | |
eventTime: null | |
firstTimestamp: "2019-12-03T12:44:56Z" | |
involvedObject: | |
apiVersion: v1 | |
fieldPath: spec.containers{istio-proxy} | |
kind: Pod | |
name: hello-example-1-deployment-77cf969dd8-wkn87 | |
namespace: serving-tests | |
resourceVersion: "57292" | |
uid: b497b9e0-15ca-11ea-b5af-027e0b84da98 | |
kind: Event | |
lastTimestamp: "2019-12-03T12:44:56Z" | |
message: Started container istio-proxy | |
metadata: | |
creationTimestamp: "2019-12-03T12:44:56Z" | |
name: hello-example-1-deployment-77cf969dd8-wkn87.15dcdd1f75ac2273 | |
namespace: serving-tests | |
resourceVersion: "3677" | |
selfLink: /api/v1/namespaces/serving-tests/events/hello-example-1-deployment-77cf969dd8-wkn87.15dcdd1f75ac2273 | |
uid: b5f66360-15ca-11ea-b5af-027e0b84da98 | |
reason: Started | |
reportingComponent: "" | |
reportingInstance: "" | |
source: | |
component: kubelet | |
host: ip-172-20-44-18.ap-southeast-1.compute.internal | |
type: Normal | |
- apiVersion: v1 | |
count: 1 | |
eventTime: null | |
firstTimestamp: "2019-12-03T12:44:57Z" | |
involvedObject: | |
apiVersion: v1 | |
fieldPath: spec.containers{istio-proxy} | |
kind: Pod | |
name: hello-example-1-deployment-77cf969dd8-wkn87 | |
namespace: serving-tests | |
resourceVersion: "57292" | |
uid: b497b9e0-15ca-11ea-b5af-027e0b84da98 | |
kind: Event | |
lastTimestamp: "2019-12-03T12:44:57Z" | |
message: 'Readiness probe failed: HTTP probe failed with statuscode: 503' | |
metadata: | |
creationTimestamp: "2019-12-03T12:44:57Z" | |
name: hello-example-1-deployment-77cf969dd8-wkn87.15dcdd1f9610a94e | |
namespace: serving-tests | |
resourceVersion: "3678" | |
selfLink: /api/v1/namespaces/serving-tests/events/hello-example-1-deployment-77cf969dd8-wkn87.15dcdd1f9610a94e | |
uid: b64976a7-15ca-11ea-b5af-027e0b84da98 | |
reason: Unhealthy | |
reportingComponent: "" | |
reportingInstance: "" | |
source: | |
component: kubelet | |
host: ip-172-20-44-18.ap-southeast-1.compute.internal | |
type: Warning | |
- apiVersion: v1 | |
count: 1 | |
eventTime: null | |
firstTimestamp: "2019-12-03T12:44:54Z" | |
involvedObject: | |
apiVersion: apps/v1 | |
kind: ReplicaSet | |
name: hello-example-1-deployment-77cf969dd8 | |
namespace: serving-tests | |
resourceVersion: "57286" | |
uid: b49122af-15ca-11ea-b5af-027e0b84da98 | |
kind: Event | |
lastTimestamp: "2019-12-03T12:44:54Z" | |
message: 'Created pod: hello-example-1-deployment-77cf969dd8-wkn87' | |
metadata: | |
creationTimestamp: "2019-12-03T12:44:54Z" | |
name: hello-example-1-deployment-77cf969dd8.15dcdd1eed30c7fe | |
namespace: serving-tests | |
resourceVersion: "3661" | |
selfLink: /api/v1/namespaces/serving-tests/events/hello-example-1-deployment-77cf969dd8.15dcdd1eed30c7fe | |
uid: b4996820-15ca-11ea-b5af-027e0b84da98 | |
reason: SuccessfulCreate | |
reportingComponent: "" | |
reportingInstance: "" | |
source: | |
component: replicaset-controller | |
type: Normal | |
- apiVersion: v1 | |
count: 1 | |
eventTime: null | |
firstTimestamp: "2019-12-03T12:22:57Z" | |
involvedObject: | |
apiVersion: v1 | |
fieldPath: spec.containers{user-container} | |
kind: Pod | |
name: hello-example-1-deployment-c698d5bfb-wbw8x | |
namespace: serving-tests | |
resourceVersion: "53500" | |
uid: 7e4ac08b-15c6-11ea-b5af-027e0b84da98 | |
kind: Event | |
lastTimestamp: "2019-12-03T12:22:57Z" | |
message: Stopping container user-container | |
metadata: | |
creationTimestamp: "2019-12-03T12:22:57Z" | |
name: hello-example-1-deployment-c698d5bfb-wbw8x.15dcdbec56d20325 | |
namespace: serving-tests | |
resourceVersion: "3278" | |
selfLink: /api/v1/namespaces/serving-tests/events/hello-example-1-deployment-c698d5bfb-wbw8x.15dcdbec56d20325 | |
uid: a3bcdaec-15c7-11ea-b5af-027e0b84da98 | |
reason: Killing | |
reportingComponent: "" | |
reportingInstance: "" | |
source: | |
component: kubelet | |
host: ip-172-20-44-180.ap-southeast-1.compute.internal | |
type: Normal | |
- apiVersion: v1 | |
count: 1 | |
eventTime: null | |
firstTimestamp: "2019-12-03T12:22:57Z" | |
involvedObject: | |
apiVersion: v1 | |
fieldPath: spec.containers{istio-proxy} | |
kind: Pod | |
name: hello-example-1-deployment-c698d5bfb-wbw8x | |
namespace: serving-tests | |
resourceVersion: "53500" | |
uid: 7e4ac08b-15c6-11ea-b5af-027e0b84da98 | |
kind: Event | |
lastTimestamp: "2019-12-03T12:22:57Z" | |
message: Stopping container istio-proxy | |
metadata: | |
creationTimestamp: "2019-12-03T12:22:57Z" | |
name: hello-example-1-deployment-c698d5bfb-wbw8x.15dcdbec56d63a30 | |
namespace: serving-tests | |
resourceVersion: "3276" | |
selfLink: /api/v1/namespaces/serving-tests/events/hello-example-1-deployment-c698d5bfb-wbw8x.15dcdbec56d63a30 | |
uid: a3bbe151-15c7-11ea-b5af-027e0b84da98 | |
reason: Killing | |
reportingComponent: "" | |
reportingInstance: "" | |
source: | |
component: kubelet | |
host: ip-172-20-44-180.ap-southeast-1.compute.internal | |
type: Normal | |
- apiVersion: v1 | |
count: 1 | |
eventTime: null | |
firstTimestamp: "2019-12-03T12:22:57Z" | |
involvedObject: | |
apiVersion: v1 | |
fieldPath: spec.containers{queue-proxy} | |
kind: Pod | |
name: hello-example-1-deployment-c698d5bfb-wbw8x | |
namespace: serving-tests | |
resourceVersion: "53500" | |
uid: 7e4ac08b-15c6-11ea-b5af-027e0b84da98 | |
kind: Event | |
lastTimestamp: "2019-12-03T12:22:57Z" | |
message: Stopping container queue-proxy | |
metadata: | |
creationTimestamp: "2019-12-03T12:22:57Z" | |
name: hello-example-1-deployment-c698d5bfb-wbw8x.15dcdbec56ddb43e | |
namespace: serving-tests | |
resourceVersion: "3277" | |
selfLink: /api/v1/namespaces/serving-tests/events/hello-example-1-deployment-c698d5bfb-wbw8x.15dcdbec56ddb43e | |
uid: a3bc51a0-15c7-11ea-b5af-027e0b84da98 | |
reason: Killing | |
reportingComponent: "" | |
reportingInstance: "" | |
source: | |
component: kubelet | |
host: ip-172-20-44-180.ap-southeast-1.compute.internal | |
type: Normal | |
- apiVersion: v1 | |
count: 1 | |
eventTime: null | |
firstTimestamp: "2019-12-03T12:22:57Z" | |
involvedObject: | |
apiVersion: v1 | |
fieldPath: spec.containers{user-container} | |
kind: Pod | |
name: hello-example-1-deployment-c698d5bfb-wbw8x | |
namespace: serving-tests | |
resourceVersion: "53500" | |
uid: 7e4ac08b-15c6-11ea-b5af-027e0b84da98 | |
kind: Event | |
lastTimestamp: "2019-12-03T12:22:57Z" | |
message: 'Http lifecycle hook (/wait-for-drain) for Container "user-container" in | |
Pod "hello-example-1-deployment-c698d5bfb-wbw8x_serving-tests(7e4ac08b-15c6-11ea-b5af-027e0b84da98)" | |
failed - error: Get http://172.20.37.106:8022//wait-for-drain: dial tcp 172.20.37.106:8022: | |
connect: connection refused, message: ""' | |
metadata: | |
creationTimestamp: "2019-12-03T12:22:57Z" | |
name: hello-example-1-deployment-c698d5bfb-wbw8x.15dcdbec59378e73 | |
namespace: serving-tests | |
resourceVersion: "3279" | |
selfLink: /api/v1/namespaces/serving-tests/events/hello-example-1-deployment-c698d5bfb-wbw8x.15dcdbec59378e73 | |
uid: a3c1fd35-15c7-11ea-b5af-027e0b84da98 | |
reason: FailedPreStopHook | |
reportingComponent: "" | |
reportingInstance: "" | |
source: | |
component: kubelet | |
host: ip-172-20-44-180.ap-southeast-1.compute.internal | |
type: Warning | |
- apiVersion: v1 | |
count: 9 | |
eventTime: null | |
firstTimestamp: "2019-12-03T12:22:58Z" | |
involvedObject: | |
apiVersion: v1 | |
fieldPath: spec.containers{istio-proxy} | |
kind: Pod | |
name: hello-example-1-deployment-c698d5bfb-wbw8x | |
namespace: serving-tests | |
resourceVersion: "53500" | |
uid: 7e4ac08b-15c6-11ea-b5af-027e0b84da98 | |
kind: Event | |
lastTimestamp: "2019-12-03T12:23:14Z" | |
message: 'Readiness probe failed: Get http://172.20.37.106:15020/healthz/ready: | |
dial tcp 172.20.37.106:15020: connect: connection refused' | |
metadata: | |
creationTimestamp: "2019-12-03T12:22:58Z" | |
name: hello-example-1-deployment-c698d5bfb-wbw8x.15dcdbec6dd9a165 | |
namespace: serving-tests | |
resourceVersion: "3347" | |
selfLink: /api/v1/namespaces/serving-tests/events/hello-example-1-deployment-c698d5bfb-wbw8x.15dcdbec6dd9a165 | |
uid: a3f6c820-15c7-11ea-b5af-027e0b84da98 | |
reason: Unhealthy | |
reportingComponent: "" | |
reportingInstance: "" | |
source: | |
component: kubelet | |
host: ip-172-20-44-180.ap-southeast-1.compute.internal | |
type: Warning | |
- apiVersion: v1 | |
count: 1 | |
eventTime: null | |
firstTimestamp: "2019-12-03T12:23:08Z" | |
involvedObject: | |
apiVersion: v1 | |
fieldPath: spec.containers{queue-proxy} | |
kind: Pod | |
name: hello-example-1-deployment-c698d5bfb-wbw8x | |
namespace: serving-tests | |
resourceVersion: "53500" | |
uid: 7e4ac08b-15c6-11ea-b5af-027e0b84da98 | |
kind: Event | |
lastTimestamp: "2019-12-03T12:23:08Z" | |
message: | | |
Readiness probe failed: probe returned not ready | |
metadata: | |
creationTimestamp: "2019-12-03T12:23:08Z" | |
name: hello-example-1-deployment-c698d5bfb-wbw8x.15dcdbeed1132878 | |
namespace: serving-tests | |
resourceVersion: "3287" | |
selfLink: /api/v1/namespaces/serving-tests/events/hello-example-1-deployment-c698d5bfb-wbw8x.15dcdbeed1132878 | |
uid: aa1389fa-15c7-11ea-b5af-027e0b84da98 | |
reason: Unhealthy | |
reportingComponent: "" | |
reportingInstance: "" | |
source: | |
component: kubelet | |
host: ip-172-20-44-180.ap-southeast-1.compute.internal | |
type: Warning | |
- apiVersion: v1 | |
count: 1 | |
eventTime: null | |
firstTimestamp: "2019-12-03T12:44:54Z" | |
involvedObject: | |
apiVersion: apps/v1 | |
kind: Deployment | |
name: hello-example-1-deployment | |
namespace: serving-tests | |
resourceVersion: "57285" | |
uid: b48fd382-15ca-11ea-b5af-027e0b84da98 | |
kind: Event | |
lastTimestamp: "2019-12-03T12:44:54Z" | |
message: Scaled up replica set hello-example-1-deployment-77cf969dd8 to 1 | |
metadata: | |
creationTimestamp: "2019-12-03T12:44:54Z" | |
name: hello-example-1-deployment.15dcdd1eea654d89 | |
namespace: serving-tests | |
resourceVersion: "3660" | |
selfLink: /api/v1/namespaces/serving-tests/events/hello-example-1-deployment.15dcdd1eea654d89 | |
uid: b491d870-15ca-11ea-b5af-027e0b84da98 | |
reason: ScalingReplicaSet | |
reportingComponent: "" | |
reportingInstance: "" | |
source: | |
component: deployment-controller | |
type: Normal | |
- apiVersion: v1 | |
count: 1 | |
eventTime: null | |
firstTimestamp: "2019-12-03T12:44:54Z" | |
involvedObject: | |
apiVersion: serving.knative.dev/v1alpha1 | |
kind: Revision | |
name: hello-example-1 | |
namespace: serving-tests | |
resourceVersion: "57298" | |
uid: b40e6e6d-15ca-11ea-b5af-027e0b84da98 | |
kind: Event | |
lastTimestamp: "2019-12-03T12:44:54Z" | |
message: 'failed to update PA "hello-example-1": Operation cannot be fulfilled on | |
podautoscalers.autoscaling.internal.knative.dev "hello-example-1": the object | |
has been modified; please apply your changes to the latest version and try again' | |
metadata: | |
creationTimestamp: "2019-12-03T12:44:54Z" | |
name: hello-example-1.15dcdd1ef2a75f4f | |
namespace: serving-tests | |
resourceVersion: "3663" | |
selfLink: /api/v1/namespaces/serving-tests/events/hello-example-1.15dcdd1ef2a75f4f | |
uid: b4a7723b-15ca-11ea-b5af-027e0b84da98 | |
reason: InternalError | |
reportingComponent: "" | |
reportingInstance: "" | |
source: | |
component: revision-controller | |
type: Warning | |
- apiVersion: v1 | |
count: 4 | |
eventTime: null | |
firstTimestamp: "2019-12-03T12:44:54Z" | |
involvedObject: | |
apiVersion: networking.internal.knative.dev/v1alpha1 | |
kind: ServerlessService | |
name: hello-example-1 | |
namespace: serving-tests | |
resourceVersion: "57297" | |
uid: b49e9147-15ca-11ea-b5af-027e0b84da98 | |
kind: Event | |
lastTimestamp: "2019-12-03T12:45:01Z" | |
message: Successfully updated ServerlessService "serving-tests/hello-example-1" | |
metadata: | |
creationTimestamp: "2019-12-03T12:44:54Z" | |
name: hello-example-1.15dcdd1efc4ebdcd | |
namespace: serving-tests | |
resourceVersion: "3695" | |
selfLink: /api/v1/namespaces/serving-tests/events/hello-example-1.15dcdd1efc4ebdcd | |
uid: b4c033cb-15ca-11ea-b5af-027e0b84da98 | |
reason: Updated | |
reportingComponent: "" | |
reportingInstance: "" | |
source: | |
component: serverlessservice-controller | |
type: Normal | |
- apiVersion: v1 | |
count: 1 | |
eventTime: null | |
firstTimestamp: "2019-12-03T12:44:54Z" | |
involvedObject: | |
apiVersion: autoscaling.internal.knative.dev/v1alpha1 | |
kind: Metric | |
name: hello-example-1 | |
namespace: serving-tests | |
resourceVersion: "57310" | |
uid: b4c059f0-15ca-11ea-b5af-027e0b84da98 | |
kind: Event | |
lastTimestamp: "2019-12-03T12:44:54Z" | |
message: Successfully updated metric status serving-tests/hello-example-1 | |
metadata: | |
creationTimestamp: "2019-12-03T12:44:54Z" | |
name: hello-example-1.15dcdd1efe1cbcd1 | |
namespace: serving-tests | |
resourceVersion: "3665" | |
selfLink: /api/v1/namespaces/serving-tests/events/hello-example-1.15dcdd1efe1cbcd1 | |
uid: b4c473f3-15ca-11ea-b5af-027e0b84da98 | |
reason: Updated | |
reportingComponent: "" | |
reportingInstance: "" | |
source: | |
component: metric-controller | |
type: Normal | |
- apiVersion: v1 | |
count: 1 | |
eventTime: null | |
firstTimestamp: "2019-12-03T12:44:59Z" | |
involvedObject: | |
apiVersion: serving.knative.dev/v1alpha1 | |
kind: Revision | |
name: hello-example-1 | |
namespace: serving-tests | |
resourceVersion: "57313" | |
uid: b40e6e6d-15ca-11ea-b5af-027e0b84da98 | |
kind: Event | |
lastTimestamp: "2019-12-03T12:44:59Z" | |
message: Revision becomes ready upon all resources being ready | |
metadata: | |
creationTimestamp: "2019-12-03T12:44:59Z" | |
name: hello-example-1.15dcdd201ba98230 | |
namespace: serving-tests | |
resourceVersion: "3681" | |
selfLink: /api/v1/namespaces/serving-tests/events/hello-example-1.15dcdd201ba98230 | |
uid: b79f5132-15ca-11ea-b5af-027e0b84da98 | |
reason: RevisionReady | |
reportingComponent: "" | |
reportingInstance: "" | |
source: | |
component: revision-controller | |
type: Normal | |
- apiVersion: v1 | |
count: 1 | |
eventTime: null | |
firstTimestamp: "2019-12-03T12:44:53Z" | |
involvedObject: | |
apiVersion: serving.knative.dev/v1alpha1 | |
kind: Service | |
name: hello-example | |
namespace: serving-tests | |
resourceVersion: "57270" | |
uid: b40342c9-15ca-11ea-b5af-027e0b84da98 | |
kind: Event | |
lastTimestamp: "2019-12-03T12:44:53Z" | |
message: Created Configuration "hello-example" | |
metadata: | |
creationTimestamp: "2019-12-03T12:44:53Z" | |
name: hello-example.15dcdd1eb6007a9e | |
namespace: serving-tests | |
resourceVersion: "3653" | |
selfLink: /api/v1/namespaces/serving-tests/events/hello-example.15dcdd1eb6007a9e | |
uid: b40ce853-15ca-11ea-b5af-027e0b84da98 | |
reason: Created | |
reportingComponent: "" | |
reportingInstance: "" | |
source: | |
component: service-controller | |
type: Normal | |
- apiVersion: v1 | |
count: 6 | |
eventTime: null | |
firstTimestamp: "2019-12-03T12:44:53Z" | |
involvedObject: | |
apiVersion: serving.knative.dev/v1alpha1 | |
kind: Service | |
name: hello-example | |
namespace: serving-tests | |
resourceVersion: "57270" | |
uid: b40342c9-15ca-11ea-b5af-027e0b84da98 | |
kind: Event | |
lastTimestamp: "2019-12-03T12:45:00Z" | |
message: Updated Service "hello-example" | |
metadata: | |
creationTimestamp: "2019-12-03T12:44:53Z" | |
name: hello-example.15dcdd1eb770c845 | |
namespace: serving-tests | |
resourceVersion: "3694" | |
selfLink: /api/v1/namespaces/serving-tests/events/hello-example.15dcdd1eb770c845 | |
uid: b4105ea9-15ca-11ea-b5af-027e0b84da98 | |
reason: Updated | |
reportingComponent: "" | |
reportingInstance: "" | |
source: | |
component: service-controller | |
type: Normal | |
- apiVersion: v1 | |
count: 1 | |
eventTime: null | |
firstTimestamp: "2019-12-03T12:44:53Z" | |
involvedObject: | |
apiVersion: serving.knative.dev/v1alpha1 | |
kind: Configuration | |
name: hello-example | |
namespace: serving-tests | |
resourceVersion: "57271" | |
uid: b4085dc9-15ca-11ea-b5af-027e0b84da98 | |
kind: Event | |
lastTimestamp: "2019-12-03T12:44:53Z" | |
message: Created Revision "hello-example-1" | |
metadata: | |
creationTimestamp: "2019-12-03T12:44:53Z" | |
name: hello-example.15dcdd1eb7e21b66 | |
namespace: serving-tests | |
resourceVersion: "3655" | |
selfLink: /api/v1/namespaces/serving-tests/events/hello-example.15dcdd1eb7e21b66 | |
uid: b41111f4-15ca-11ea-b5af-027e0b84da98 | |
reason: Created | |
reportingComponent: "" | |
reportingInstance: "" | |
source: | |
component: configuration-controller | |
type: Normal | |
- apiVersion: v1 | |
count: 1 | |
eventTime: null | |
firstTimestamp: "2019-12-03T12:44:53Z" | |
involvedObject: | |
apiVersion: serving.knative.dev/v1alpha1 | |
kind: Service | |
name: hello-example | |
namespace: serving-tests | |
resourceVersion: "57272" | |
uid: b40342c9-15ca-11ea-b5af-027e0b84da98 | |
kind: Event | |
lastTimestamp: "2019-12-03T12:44:53Z" | |
message: Created Route "hello-example" | |
metadata: | |
creationTimestamp: "2019-12-03T12:44:53Z" | |
name: hello-example.15dcdd1eb9f2aad8 | |
namespace: serving-tests | |
resourceVersion: "3656" | |
selfLink: /api/v1/namespaces/serving-tests/events/hello-example.15dcdd1eb9f2aad8 | |
uid: b415f0ab-15ca-11ea-b5af-027e0b84da98 | |
reason: Created | |
reportingComponent: "" | |
reportingInstance: "" | |
source: | |
component: service-controller | |
type: Normal | |
- apiVersion: v1 | |
count: 1 | |
eventTime: null | |
firstTimestamp: "2019-12-03T12:44:53Z" | |
involvedObject: | |
apiVersion: serving.knative.dev/v1alpha1 | |
kind: Route | |
name: hello-example | |
namespace: serving-tests | |
resourceVersion: "57275" | |
uid: b413f714-15ca-11ea-b5af-027e0b84da98 | |
kind: Event | |
lastTimestamp: "2019-12-03T12:44:53Z" | |
message: 'Failed to update status for Route "hello-example": Operation cannot be | |
fulfilled on routes.serving.knative.dev "hello-example": the object has been modified; | |
please apply your changes to the latest version and try again' | |
metadata: | |
creationTimestamp: "2019-12-03T12:44:53Z" | |
name: hello-example.15dcdd1ebb618470 | |
namespace: serving-tests | |
resourceVersion: "3658" | |
selfLink: /api/v1/namespaces/serving-tests/events/hello-example.15dcdd1ebb618470 | |
uid: b419a3b8-15ca-11ea-b5af-027e0b84da98 | |
reason: UpdateFailed | |
reportingComponent: "" | |
reportingInstance: "" | |
source: | |
component: route-controller | |
type: Warning | |
- apiVersion: v1 | |
count: 1 | |
eventTime: null | |
firstTimestamp: "2019-12-03T12:44:59Z" | |
involvedObject: | |
apiVersion: serving.knative.dev/v1alpha1 | |
kind: Configuration | |
name: hello-example | |
namespace: serving-tests | |
resourceVersion: "57280" | |
uid: b4085dc9-15ca-11ea-b5af-027e0b84da98 | |
kind: Event | |
lastTimestamp: "2019-12-03T12:44:59Z" | |
message: Configuration becomes ready | |
metadata: | |
creationTimestamp: "2019-12-03T12:44:59Z" | |
name: hello-example.15dcdd201c4a80d5 | |
namespace: serving-tests | |
resourceVersion: "3682" | |
selfLink: /api/v1/namespaces/serving-tests/events/hello-example.15dcdd201c4a80d5 | |
uid: b7a11e19-15ca-11ea-b5af-027e0b84da98 | |
reason: ConfigurationReady | |
reportingComponent: "" | |
reportingInstance: "" | |
source: | |
component: configuration-controller | |
type: Normal | |
- apiVersion: v1 | |
count: 1 | |
eventTime: null | |
firstTimestamp: "2019-12-03T12:44:59Z" | |
involvedObject: | |
apiVersion: serving.knative.dev/v1alpha1 | |
kind: Configuration | |
name: hello-example | |
namespace: serving-tests | |
resourceVersion: "57280" | |
uid: b4085dc9-15ca-11ea-b5af-027e0b84da98 | |
kind: Event | |
lastTimestamp: "2019-12-03T12:44:59Z" | |
message: LatestReadyRevisionName updated to "hello-example-1" | |
metadata: | |
creationTimestamp: "2019-12-03T12:44:59Z" | |
name: hello-example.15dcdd201c4b89c4 | |
namespace: serving-tests | |
resourceVersion: "3683" | |
selfLink: /api/v1/namespaces/serving-tests/events/hello-example.15dcdd201c4b89c4 | |
uid: b7a32e67-15ca-11ea-b5af-027e0b84da98 | |
reason: LatestReadyUpdate | |
reportingComponent: "" | |
reportingInstance: "" | |
source: | |
component: configuration-controller | |
type: Normal | |
- apiVersion: v1 | |
count: 1 | |
eventTime: null | |
firstTimestamp: "2019-12-03T12:44:59Z" | |
involvedObject: | |
apiVersion: serving.knative.dev/v1alpha1 | |
kind: Route | |
name: hello-example | |
namespace: serving-tests | |
resourceVersion: "57278" | |
uid: b413f714-15ca-11ea-b5af-027e0b84da98 | |
kind: Event | |
lastTimestamp: "2019-12-03T12:44:59Z" | |
message: Created placeholder service "hello-example" | |
metadata: | |
creationTimestamp: "2019-12-03T12:44:59Z" | |
name: hello-example.15dcdd201fe22afd | |
namespace: serving-tests | |
resourceVersion: "3685" | |
selfLink: /api/v1/namespaces/serving-tests/events/hello-example.15dcdd201fe22afd | |
uid: b7aa5ef1-15ca-11ea-b5af-027e0b84da98 | |
reason: Created | |
reportingComponent: "" | |
reportingInstance: "" | |
source: | |
component: route-controller | |
type: Normal | |
- apiVersion: v1 | |
count: 1 | |
eventTime: null | |
firstTimestamp: "2019-12-03T12:44:59Z" | |
involvedObject: | |
apiVersion: serving.knative.dev/v1alpha1 | |
kind: Route | |
name: hello-example | |
namespace: serving-tests | |
resourceVersion: "57278" | |
uid: b413f714-15ca-11ea-b5af-027e0b84da98 | |
kind: Event | |
lastTimestamp: "2019-12-03T12:44:59Z" | |
message: Created Ingress "hello-example" | |
metadata: | |
creationTimestamp: "2019-12-03T12:44:59Z" | |
name: hello-example.15dcdd20212d9ab3 | |
namespace: serving-tests | |
resourceVersion: "3686" | |
selfLink: /api/v1/namespaces/serving-tests/events/hello-example.15dcdd20212d9ab3 | |
uid: b7ad78ff-15ca-11ea-b5af-027e0b84da98 | |
reason: Created | |
reportingComponent: "" | |
reportingInstance: "" | |
source: | |
component: route-controller | |
type: Normal | |
- apiVersion: v1 | |
count: 1 | |
eventTime: null | |
firstTimestamp: "2019-12-03T12:44:59Z" | |
involvedObject: | |
apiVersion: networking.internal.knative.dev/v1alpha1 | |
kind: Ingress | |
name: hello-example | |
namespace: serving-tests | |
resourceVersion: "57341" | |
uid: b7aac98e-15ca-11ea-b5af-027e0b84da98 | |
kind: Event | |
lastTimestamp: "2019-12-03T12:44:59Z" | |
message: Created VirtualService "hello-example-mesh" | |
metadata: | |
creationTimestamp: "2019-12-03T12:44:59Z" | |
name: hello-example.15dcdd2021e1e344 | |
namespace: serving-tests | |
resourceVersion: "3687" | |
selfLink: /api/v1/namespaces/serving-tests/events/hello-example.15dcdd2021e1e344 | |
uid: b7af5838-15ca-11ea-b5af-027e0b84da98 | |
reason: Created | |
reportingComponent: "" | |
reportingInstance: "" | |
source: | |
component: ingress-controller | |
type: Normal | |
- apiVersion: v1 | |
count: 1 | |
eventTime: null | |
firstTimestamp: "2019-12-03T12:44:59Z" | |
involvedObject: | |
apiVersion: networking.internal.knative.dev/v1alpha1 | |
kind: Ingress | |
name: hello-example | |
namespace: serving-tests | |
resourceVersion: "57341" | |
uid: b7aac98e-15ca-11ea-b5af-027e0b84da98 | |
kind: Event | |
lastTimestamp: "2019-12-03T12:44:59Z" | |
message: Created VirtualService "hello-example" | |
metadata: | |
creationTimestamp: "2019-12-03T12:44:59Z" | |
name: hello-example.15dcdd202261fd4c | |
namespace: serving-tests | |
resourceVersion: "3688" | |
selfLink: /api/v1/namespaces/serving-tests/events/hello-example.15dcdd202261fd4c | |
uid: b7b08b55-15ca-11ea-b5af-027e0b84da98 | |
reason: Created | |
reportingComponent: "" | |
reportingInstance: "" | |
source: | |
component: ingress-controller | |
type: Normal | |
- apiVersion: v1 | |
count: 2 | |
eventTime: null | |
firstTimestamp: "2019-12-03T12:44:59Z" | |
involvedObject: | |
apiVersion: networking.internal.knative.dev/v1alpha1 | |
kind: Ingress | |
name: hello-example | |
namespace: serving-tests | |
resourceVersion: "57341" | |
uid: b7aac98e-15ca-11ea-b5af-027e0b84da98 | |
kind: Event | |
lastTimestamp: "2019-12-03T12:45:00Z" | |
message: Updated status for Ingress "hello-example" | |
metadata: | |
creationTimestamp: "2019-12-03T12:44:59Z" | |
name: hello-example.15dcdd20254ea1e7 | |
namespace: serving-tests | |
resourceVersion: "3693" | |
selfLink: /api/v1/namespaces/serving-tests/events/hello-example.15dcdd20254ea1e7 | |
uid: b7b83d64-15ca-11ea-b5af-027e0b84da98 | |
reason: Updated | |
reportingComponent: "" | |
reportingInstance: "" | |
source: | |
component: ingress-controller | |
type: Normal | |
- apiVersion: v1 | |
count: 1 | |
eventTime: null | |
firstTimestamp: "2019-12-03T12:44:59Z" | |
involvedObject: | |
apiVersion: serving.knative.dev/v1alpha1 | |
kind: Route | |
name: hello-example | |
namespace: serving-tests | |
resourceVersion: "57345" | |
uid: b413f714-15ca-11ea-b5af-027e0b84da98 | |
kind: Event | |
lastTimestamp: "2019-12-03T12:44:59Z" | |
message: 'failed to update Ingress: Operation cannot be fulfilled on ingresses.networking.internal.knative.dev | |
"hello-example": the object has been modified; please apply your changes to the | |
latest version and try again' | |
metadata: | |
creationTimestamp: "2019-12-03T12:44:59Z" | |
name: hello-example.15dcdd2026260e31 | |
namespace: serving-tests | |
resourceVersion: "3690" | |
selfLink: /api/v1/namespaces/serving-tests/events/hello-example.15dcdd2026260e31 | |
uid: b7ba2ae6-15ca-11ea-b5af-027e0b84da98 | |
reason: InternalError | |
reportingComponent: "" | |
reportingInstance: "" | |
source: | |
component: route-controller | |
type: Warning | |
kind: List | |
metadata: | |
resourceVersion: "" | |
selfLink: "" | |
------- | |
resource: daemonsets | |
------- | |
apiVersion: v1 | |
items: [] | |
kind: List | |
metadata: | |
resourceVersion: "" | |
selfLink: "" | |
------- | |
resource: deployments | |
------- | |
apiVersion: v1 | |
items: | |
- apiVersion: extensions/v1beta1 | |
kind: Deployment | |
metadata: | |
annotations: | |
deployment.kubernetes.io/revision: "1" | |
serving.knative.dev/creator: admin | |
sidecar.istio.io/inject: "true" | |
creationTimestamp: "2019-12-03T12:44:54Z" | |
generation: 1 | |
labels: | |
app: hello-example-1 | |
serving.knative.dev/configuration: hello-example | |
serving.knative.dev/configurationGeneration: "1" | |
serving.knative.dev/revision: hello-example-1 | |
serving.knative.dev/revisionUID: b40e6e6d-15ca-11ea-b5af-027e0b84da98 | |
serving.knative.dev/service: hello-example | |
name: hello-example-1-deployment | |
namespace: serving-tests | |
ownerReferences: | |
- apiVersion: serving.knative.dev/v1alpha1 | |
blockOwnerDeletion: true | |
controller: true | |
kind: Revision | |
name: hello-example-1 | |
uid: b40e6e6d-15ca-11ea-b5af-027e0b84da98 | |
resourceVersion: "57332" | |
selfLink: /apis/extensions/v1beta1/namespaces/serving-tests/deployments/hello-example-1-deployment | |
uid: b48fd382-15ca-11ea-b5af-027e0b84da98 | |
spec: | |
progressDeadlineSeconds: 120 | |
replicas: 1 | |
revisionHistoryLimit: 10 | |
selector: | |
matchLabels: | |
serving.knative.dev/revisionUID: b40e6e6d-15ca-11ea-b5af-027e0b84da98 | |
strategy: | |
rollingUpdate: | |
maxSurge: 25% | |
maxUnavailable: 25% | |
type: RollingUpdate | |
template: | |
metadata: | |
annotations: | |
serving.knative.dev/creator: admin | |
sidecar.istio.io/inject: "true" | |
traffic.sidecar.istio.io/includeOutboundIPRanges: '*' | |
creationTimestamp: null | |
labels: | |
app: hello-example-1 | |
serving.knative.dev/configuration: hello-example | |
serving.knative.dev/configurationGeneration: "1" | |
serving.knative.dev/revision: hello-example-1 | |
serving.knative.dev/revisionUID: b40e6e6d-15ca-11ea-b5af-027e0b84da98 | |
serving.knative.dev/service: hello-example | |
spec: | |
containers: | |
- env: | |
- name: TARGET | |
value: OpenShift Meetup! | |
- name: PORT | |
value: "8080" | |
- name: K_REVISION | |
value: hello-example-1 | |
- name: K_CONFIGURATION | |
value: hello-example | |
- name: K_SERVICE | |
value: hello-example | |
image: gcr.io/knative-samples/helloworld-go@sha256:5ea96ba4b872685ff4ddb5cd8d1a97ec18c18fae79ee8df0d29f446c5efe5f50 | |
imagePullPolicy: IfNotPresent | |
lifecycle: | |
preStop: | |
httpGet: | |
path: /wait-for-drain | |
port: 8022 | |
scheme: HTTP | |
name: user-container | |
ports: | |
- containerPort: 8080 | |
name: user-port | |
protocol: TCP | |
resources: {} | |
terminationMessagePath: /dev/termination-log | |
terminationMessagePolicy: FallbackToLogsOnError | |
volumeMounts: | |
- mountPath: /var/log | |
name: knative-var-log | |
- env: | |
- name: SERVING_NAMESPACE | |
value: serving-tests | |
- name: SERVING_SERVICE | |
value: hello-example | |
- name: SERVING_CONFIGURATION | |
value: hello-example | |
- name: SERVING_REVISION | |
value: hello-example-1 | |
- name: QUEUE_SERVING_PORT | |
value: "8012" | |
- name: CONTAINER_CONCURRENCY | |
value: "0" | |
- name: REVISION_TIMEOUT_SECONDS | |
value: "300" | |
- name: SERVING_POD | |
valueFrom: | |
fieldRef: | |
apiVersion: v1 | |
fieldPath: metadata.name | |
- name: SERVING_POD_IP | |
valueFrom: | |
fieldRef: | |
apiVersion: v1 | |
fieldPath: status.podIP | |
- name: SERVING_LOGGING_CONFIG | |
value: | | |
{ | |
"level": "debug", | |
"development": false, | |
"outputPaths": ["stdout"], | |
"errorOutputPaths": ["stderr"], | |
"encoding": "json", | |
"encoderConfig": { | |
"timeKey": "ts", | |
"levelKey": "level", | |
"nameKey": "logger", | |
"callerKey": "caller", | |
"messageKey": "msg", | |
"stacktraceKey": "stacktrace", | |
"lineEnding": "", | |
"levelEncoder": "", | |
"timeEncoder": "iso8601", | |
"durationEncoder": "", | |
"callerEncoder": "" | |
} | |
} | |
- name: SERVING_LOGGING_LEVEL | |
value: debug | |
- name: SERVING_REQUEST_LOG_TEMPLATE | |
- name: SERVING_REQUEST_METRICS_BACKEND | |
value: prometheus | |
- name: TRACING_CONFIG_BACKEND | |
value: none | |
- name: TRACING_CONFIG_ZIPKIN_ENDPOINT | |
- name: TRACING_CONFIG_STACKDRIVER_PROJECT_ID | |
- name: TRACING_CONFIG_DEBUG | |
value: "false" | |
- name: TRACING_CONFIG_SAMPLE_RATE | |
value: "0.100000" | |
- name: USER_PORT | |
value: "8080" | |
- name: SYSTEM_NAMESPACE | |
value: knative-serving | |
- name: METRICS_DOMAIN | |
value: knative.dev/internal/serving | |
- name: USER_CONTAINER_NAME | |
value: user-container | |
- name: ENABLE_VAR_LOG_COLLECTION | |
value: "false" | |
- name: VAR_LOG_VOLUME_NAME | |
value: knative-var-log | |
- name: INTERNAL_VOLUME_PATH | |
value: /var/knative-internal | |
- name: SERVING_READINESS_PROBE | |
value: '{"tcpSocket":{"port":8080,"host":"127.0.0.1"},"successThreshold":1}' | |
- name: ENABLE_PROFILING | |
value: "false" | |
- name: SERVING_ENABLE_PROBE_REQUEST_LOG | |
value: "false" | |
image: gcr.io/gcp-compute-engine-223401/queue-39be6f1d08a095bd076a71d288d295b6@sha256:8adf8f990b4485e7ead4dc9e6f8ddb3a19142835de95386428deb9ffde8d20b2 | |
imagePullPolicy: IfNotPresent | |
name: queue-proxy | |
ports: | |
- containerPort: 8022 | |
name: http-queueadm | |
protocol: TCP | |
- containerPort: 9090 | |
name: queue-metrics | |
protocol: TCP | |
- containerPort: 9091 | |
name: http-usermetric | |
protocol: TCP | |
- containerPort: 8012 | |
name: queue-port | |
protocol: TCP | |
readinessProbe: | |
exec: | |
command: | |
- /ko-app/queue | |
- -probe-period | |
- "0" | |
failureThreshold: 3 | |
periodSeconds: 1 | |
successThreshold: 1 | |
timeoutSeconds: 10 | |
resources: | |
requests: | |
cpu: 25m | |
securityContext: | |
allowPrivilegeEscalation: false | |
terminationMessagePath: /dev/termination-log | |
terminationMessagePolicy: File | |
dnsPolicy: ClusterFirst | |
restartPolicy: Always | |
schedulerName: default-scheduler | |
securityContext: {} | |
terminationGracePeriodSeconds: 300 | |
volumes: | |
- emptyDir: {} | |
name: knative-var-log | |
status: | |
availableReplicas: 1 | |
conditions: | |
- lastTransitionTime: "2019-12-03T12:44:59Z" | |
lastUpdateTime: "2019-12-03T12:44:59Z" | |
message: Deployment has minimum availability. | |
reason: MinimumReplicasAvailable | |
status: "True" | |
type: Available | |
- lastTransitionTime: "2019-12-03T12:44:54Z" | |
lastUpdateTime: "2019-12-03T12:44:59Z" | |
message: ReplicaSet "hello-example-1-deployment-77cf969dd8" has successfully | |
progressed. | |
reason: NewReplicaSetAvailable | |
status: "True" | |
type: Progressing | |
observedGeneration: 1 | |
readyReplicas: 1 | |
replicas: 1 | |
updatedReplicas: 1 | |
kind: List | |
metadata: | |
resourceVersion: "" | |
selfLink: "" | |
------- | |
resource: ingresses | |
------- | |
apiVersion: v1 | |
items: [] | |
kind: List | |
metadata: | |
resourceVersion: "" | |
selfLink: "" | |
------- | |
resource: networkpolicies | |
------- | |
apiVersion: v1 | |
items: [] | |
kind: List | |
metadata: | |
resourceVersion: "" | |
selfLink: "" | |
------- | |
resource: podsecuritypolicies | |
------- | |
apiVersion: v1 | |
items: [] | |
kind: List | |
metadata: | |
resourceVersion: "" | |
selfLink: "" | |
------- | |
resource: replicasets | |
------- | |
apiVersion: v1 | |
items: | |
- apiVersion: extensions/v1beta1 | |
kind: ReplicaSet | |
metadata: | |
annotations: | |
deployment.kubernetes.io/desired-replicas: "1" | |
deployment.kubernetes.io/max-replicas: "2" | |
deployment.kubernetes.io/revision: "1" | |
serving.knative.dev/creator: admin | |
sidecar.istio.io/inject: "true" | |
creationTimestamp: "2019-12-03T12:44:54Z" | |
generation: 1 | |
labels: | |
app: hello-example-1 | |
pod-template-hash: 77cf969dd8 | |
serving.knative.dev/configuration: hello-example | |
serving.knative.dev/configurationGeneration: "1" | |
serving.knative.dev/revision: hello-example-1 | |
serving.knative.dev/revisionUID: b40e6e6d-15ca-11ea-b5af-027e0b84da98 | |
serving.knative.dev/service: hello-example | |
name: hello-example-1-deployment-77cf969dd8 | |
namespace: serving-tests | |
ownerReferences: | |
- apiVersion: apps/v1 | |
blockOwnerDeletion: true | |
controller: true | |
kind: Deployment | |
name: hello-example-1-deployment | |
uid: b48fd382-15ca-11ea-b5af-027e0b84da98 | |
resourceVersion: "57330" | |
selfLink: /apis/extensions/v1beta1/namespaces/serving-tests/replicasets/hello-example-1-deployment-77cf969dd8 | |
uid: b49122af-15ca-11ea-b5af-027e0b84da98 | |
spec: | |
replicas: 1 | |
selector: | |
matchLabels: | |
pod-template-hash: 77cf969dd8 | |
serving.knative.dev/revisionUID: b40e6e6d-15ca-11ea-b5af-027e0b84da98 | |
template: | |
metadata: | |
annotations: | |
serving.knative.dev/creator: admin | |
sidecar.istio.io/inject: "true" | |
traffic.sidecar.istio.io/includeOutboundIPRanges: '*' | |
creationTimestamp: null | |
labels: | |
app: hello-example-1 | |
pod-template-hash: 77cf969dd8 | |
serving.knative.dev/configuration: hello-example | |
serving.knative.dev/configurationGeneration: "1" | |
serving.knative.dev/revision: hello-example-1 | |
serving.knative.dev/revisionUID: b40e6e6d-15ca-11ea-b5af-027e0b84da98 | |
serving.knative.dev/service: hello-example | |
spec: | |
containers: | |
- env: | |
- name: TARGET | |
value: OpenShift Meetup! | |
- name: PORT | |
value: "8080" | |
- name: K_REVISION | |
value: hello-example-1 | |
- name: K_CONFIGURATION | |
value: hello-example | |
- name: K_SERVICE | |
value: hello-example | |
image: gcr.io/knative-samples/helloworld-go@sha256:5ea96ba4b872685ff4ddb5cd8d1a97ec18c18fae79ee8df0d29f446c5efe5f50 | |
imagePullPolicy: IfNotPresent | |
lifecycle: | |
preStop: | |
httpGet: | |
path: /wait-for-drain | |
port: 8022 | |
scheme: HTTP | |
name: user-container | |
ports: | |
- containerPort: 8080 | |
name: user-port | |
protocol: TCP | |
resources: {} | |
terminationMessagePath: /dev/termination-log | |
terminationMessagePolicy: FallbackToLogsOnError | |
volumeMounts: | |
- mountPath: /var/log | |
name: knative-var-log | |
- env: | |
- name: SERVING_NAMESPACE | |
value: serving-tests | |
- name: SERVING_SERVICE | |
value: hello-example | |
- name: SERVING_CONFIGURATION | |
value: hello-example | |
- name: SERVING_REVISION | |
value: hello-example-1 | |
- name: QUEUE_SERVING_PORT | |
value: "8012" | |
- name: CONTAINER_CONCURRENCY | |
value: "0" | |
- name: REVISION_TIMEOUT_SECONDS | |
value: "300" | |
- name: SERVING_POD | |
valueFrom: | |
fieldRef: | |
apiVersion: v1 | |
fieldPath: metadata.name | |
- name: SERVING_POD_IP | |
valueFrom: | |
fieldRef: | |
apiVersion: v1 | |
fieldPath: status.podIP | |
- name: SERVING_LOGGING_CONFIG | |
value: | | |
{ | |
"level": "debug", | |
"development": false, | |
"outputPaths": ["stdout"], | |
"errorOutputPaths": ["stderr"], | |
"encoding": "json", | |
"encoderConfig": { | |
"timeKey": "ts", | |
"levelKey": "level", | |
"nameKey": "logger", | |
"callerKey": "caller", | |
"messageKey": "msg", | |
"stacktraceKey": "stacktrace", | |
"lineEnding": "", | |
"levelEncoder": "", | |
"timeEncoder": "iso8601", | |
"durationEncoder": "", | |
"callerEncoder": "" | |
} | |
} | |
- name: SERVING_LOGGING_LEVEL | |
value: debug | |
- name: SERVING_REQUEST_LOG_TEMPLATE | |
- name: SERVING_REQUEST_METRICS_BACKEND | |
value: prometheus | |
- name: TRACING_CONFIG_BACKEND | |
value: none | |
- name: TRACING_CONFIG_ZIPKIN_ENDPOINT | |
- name: TRACING_CONFIG_STACKDRIVER_PROJECT_ID | |
- name: TRACING_CONFIG_DEBUG | |
value: "false" | |
- name: TRACING_CONFIG_SAMPLE_RATE | |
value: "0.100000" | |
- name: USER_PORT | |
value: "8080" | |
- name: SYSTEM_NAMESPACE | |
value: knative-serving | |
- name: METRICS_DOMAIN | |
value: knative.dev/internal/serving | |
- name: USER_CONTAINER_NAME | |
value: user-container | |
- name: ENABLE_VAR_LOG_COLLECTION | |
value: "false" | |
- name: VAR_LOG_VOLUME_NAME | |
value: knative-var-log | |
- name: INTERNAL_VOLUME_PATH | |
value: /var/knative-internal | |
- name: SERVING_READINESS_PROBE | |
value: '{"tcpSocket":{"port":8080,"host":"127.0.0.1"},"successThreshold":1}' | |
- name: ENABLE_PROFILING | |
value: "false" | |
- name: SERVING_ENABLE_PROBE_REQUEST_LOG | |
value: "false" | |
image: gcr.io/gcp-compute-engine-223401/queue-39be6f1d08a095bd076a71d288d295b6@sha256:8adf8f990b4485e7ead4dc9e6f8ddb3a19142835de95386428deb9ffde8d20b2 | |
imagePullPolicy: IfNotPresent | |
name: queue-proxy | |
ports: | |
- containerPort: 8022 | |
name: http-queueadm | |
protocol: TCP | |
- containerPort: 9090 | |
name: queue-metrics | |
protocol: TCP | |
- containerPort: 9091 | |
name: http-usermetric | |
protocol: TCP | |
- containerPort: 8012 | |
name: queue-port | |
protocol: TCP | |
readinessProbe: | |
exec: | |
command: | |
- /ko-app/queue | |
- -probe-period | |
- "0" | |
failureThreshold: 3 | |
periodSeconds: 1 | |
successThreshold: 1 | |
timeoutSeconds: 10 | |
resources: | |
requests: | |
cpu: 25m | |
securityContext: | |
allowPrivilegeEscalation: false | |
terminationMessagePath: /dev/termination-log | |
terminationMessagePolicy: File | |
dnsPolicy: ClusterFirst | |
restartPolicy: Always | |
schedulerName: default-scheduler | |
securityContext: {} | |
terminationGracePeriodSeconds: 300 | |
volumes: | |
- emptyDir: {} | |
name: knative-var-log | |
status: | |
availableReplicas: 1 | |
fullyLabeledReplicas: 1 | |
observedGeneration: 1 | |
readyReplicas: 1 | |
replicas: 1 | |
kind: List | |
metadata: | |
resourceVersion: "" | |
selfLink: "" | |
------- | |
resource: certificates | |
------- | |
apiVersion: v1 | |
items: [] | |
kind: List | |
metadata: | |
resourceVersion: "" | |
selfLink: "" | |
------- | |
resource: ingresses | |
------- | |
apiVersion: v1 | |
items: [] | |
kind: List | |
metadata: | |
resourceVersion: "" | |
selfLink: "" | |
------- | |
resource: serverlessservices | |
------- | |
apiVersion: v1 | |
items: | |
- apiVersion: networking.internal.knative.dev/v1alpha1 | |
kind: ServerlessService | |
metadata: | |
annotations: | |
autoscaling.knative.dev/class: kpa.autoscaling.knative.dev | |
serving.knative.dev/creator: admin | |
sidecar.istio.io/inject: "true" | |
creationTimestamp: "2019-12-03T12:44:54Z" | |
generation: 2 | |
labels: | |
app: hello-example-1 | |
serving.knative.dev/configuration: hello-example | |
serving.knative.dev/configurationGeneration: "1" | |
serving.knative.dev/revision: hello-example-1 | |
serving.knative.dev/revisionUID: b40e6e6d-15ca-11ea-b5af-027e0b84da98 | |
serving.knative.dev/service: hello-example | |
name: hello-example-1 | |
namespace: serving-tests | |
ownerReferences: | |
- apiVersion: autoscaling.internal.knative.dev/v1alpha1 | |
blockOwnerDeletion: true | |
controller: true | |
kind: PodAutoscaler | |
name: hello-example-1 | |
uid: b495b7cf-15ca-11ea-b5af-027e0b84da98 | |
resourceVersion: "57360" | |
selfLink: /apis/networking.internal.knative.dev/v1alpha1/namespaces/serving-tests/serverlessservices/hello-example-1 | |
uid: b49e9147-15ca-11ea-b5af-027e0b84da98 | |
spec: | |
ProtocolType: http1 | |
mode: Proxy | |
objectRef: | |
apiVersion: apps/v1 | |
kind: Deployment | |
name: hello-example-1-deployment | |
status: | |
conditions: | |
- lastTransitionTime: "2019-12-03T12:45:01Z" | |
message: Revision is backed by Activator | |
reason: ActivatorEndpointsPopulated | |
severity: Info | |
status: "True" | |
type: ActivatorEndpointsPopulated | |
- lastTransitionTime: "2019-12-03T12:44:59Z" | |
status: "True" | |
type: EndpointsPopulated | |
- lastTransitionTime: "2019-12-03T12:44:59Z" | |
status: "True" | |
type: Ready | |
observedGeneration: 2 | |
privateServiceName: hello-example-1-private | |
serviceName: hello-example-1 | |
kind: List | |
metadata: | |
resourceVersion: "" | |
selfLink: "" | |
------- | |
resource: destinationrules | |
------- | |
apiVersion: v1 | |
items: | |
- apiVersion: networking.istio.io/v1alpha3 | |
kind: DestinationRule | |
metadata: | |
annotations: | |
kubectl.kubernetes.io/last-applied-configuration: | | |
{"apiVersion":"networking.istio.io/v1alpha3","kind":"DestinationRule","metadata":{"annotations":{},"name":"mtls-services","namespace":"serving-tests"},"spec":{"host":"*.local","trafficPolicy":{"tls":{"mode":"ISTIO_MUTUAL"}}}} | |
creationTimestamp: "2019-12-03T06:51:21Z" | |
generation: 1 | |
name: mtls-services | |
namespace: serving-tests | |
resourceVersion: "15033" | |
selfLink: /apis/networking.istio.io/v1alpha3/namespaces/serving-tests/destinationrules/mtls-services | |
uid: 50d57022-1599-11ea-b5af-027e0b84da98 | |
spec: | |
host: '*.local' | |
trafficPolicy: | |
tls: | |
mode: ISTIO_MUTUAL | |
kind: List | |
metadata: | |
resourceVersion: "" | |
selfLink: "" | |
------- | |
resource: envoyfilters | |
------- | |
apiVersion: v1 | |
items: [] | |
kind: List | |
metadata: | |
resourceVersion: "" | |
selfLink: "" | |
------- | |
resource: gateways | |
------- | |
apiVersion: v1 | |
items: [] | |
kind: List | |
metadata: | |
resourceVersion: "" | |
selfLink: "" | |
------- | |
resource: serviceentries | |
------- | |
apiVersion: v1 | |
items: [] | |
kind: List | |
metadata: | |
resourceVersion: "" | |
selfLink: "" | |
------- | |
resource: sidecars | |
------- | |
apiVersion: v1 | |
items: [] | |
kind: List | |
metadata: | |
resourceVersion: "" | |
selfLink: "" | |
------- | |
resource: virtualservices | |
------- | |
apiVersion: v1 | |
items: | |
- apiVersion: networking.istio.io/v1alpha3 | |
kind: VirtualService | |
metadata: | |
annotations: | |
networking.knative.dev/ingress.class: istio.ingress.networking.knative.dev | |
serving.knative.dev/creator: admin | |
serving.knative.dev/lastModifier: admin | |
creationTimestamp: "2019-12-03T12:44:59Z" | |
generation: 1 | |
labels: | |
serving.knative.dev/route: hello-example | |
serving.knative.dev/routeNamespace: serving-tests | |
name: hello-example | |
namespace: serving-tests | |
ownerReferences: | |
- apiVersion: networking.internal.knative.dev/v1alpha1 | |
blockOwnerDeletion: true | |
controller: true | |
kind: Ingress | |
name: hello-example | |
uid: b7aac98e-15ca-11ea-b5af-027e0b84da98 | |
resourceVersion: "57344" | |
selfLink: /apis/networking.istio.io/v1alpha3/namespaces/serving-tests/virtualservices/hello-example | |
uid: b7af5187-15ca-11ea-b5af-027e0b84da98 | |
spec: | |
gateways: | |
- knative-serving/cluster-local-gateway | |
- knative-serving/knative-ingress-gateway | |
hosts: | |
- hello-example.serving-tests | |
- hello-example.serving-tests.13.228.147.127.xip.io | |
- hello-example.serving-tests.svc | |
- hello-example.serving-tests.svc.cluster.local | |
http: | |
- headers: | |
request: | |
add: | |
K-Network-Hash: 712328ae819d77d0b7613f8f1b0b5b64 | |
match: | |
- authority: | |
prefix: hello-example.serving-tests.13.228.147.127.xip.io | |
gateways: | |
- knative-serving/knative-ingress-gateway | |
- authority: | |
prefix: hello-example.serving-tests | |
gateways: | |
- knative-serving/cluster-local-gateway | |
retries: | |
attempts: 3 | |
perTryTimeout: 600s | |
route: | |
- destination: | |
host: hello-example-1.serving-tests.svc.cluster.local | |
port: | |
number: 80 | |
headers: | |
request: | |
add: | |
Knative-Serving-Namespace: serving-tests | |
Knative-Serving-Revision: hello-example-1 | |
weight: 100 | |
timeout: 600s | |
websocketUpgrade: true | |
- apiVersion: networking.istio.io/v1alpha3 | |
kind: VirtualService | |
metadata: | |
annotations: | |
networking.knative.dev/ingress.class: istio.ingress.networking.knative.dev | |
serving.knative.dev/creator: admin | |
serving.knative.dev/lastModifier: admin | |
creationTimestamp: "2019-12-03T12:44:59Z" | |
generation: 1 | |
labels: | |
serving.knative.dev/route: hello-example | |
serving.knative.dev/routeNamespace: serving-tests | |
name: hello-example-mesh | |
namespace: serving-tests | |
ownerReferences: | |
- apiVersion: networking.internal.knative.dev/v1alpha1 | |
blockOwnerDeletion: true | |
controller: true | |
kind: Ingress | |
name: hello-example | |
uid: b7aac98e-15ca-11ea-b5af-027e0b84da98 | |
resourceVersion: "57343" | |
selfLink: /apis/networking.istio.io/v1alpha3/namespaces/serving-tests/virtualservices/hello-example-mesh | |
uid: b7ad54f3-15ca-11ea-b5af-027e0b84da98 | |
spec: | |
gateways: | |
- mesh | |
hosts: | |
- hello-example.serving-tests | |
- hello-example.serving-tests.svc | |
- hello-example.serving-tests.svc.cluster.local | |
http: | |
- headers: | |
request: | |
add: | |
K-Network-Hash: 712328ae819d77d0b7613f8f1b0b5b64 | |
match: | |
- authority: | |
prefix: hello-example.serving-tests | |
gateways: | |
- mesh | |
retries: | |
attempts: 3 | |
perTryTimeout: 600s | |
route: | |
- destination: | |
host: hello-example-1.serving-tests.svc.cluster.local | |
port: | |
number: 80 | |
headers: | |
request: | |
add: | |
Knative-Serving-Namespace: serving-tests | |
Knative-Serving-Revision: hello-example-1 | |
weight: 100 | |
timeout: 600s | |
websocketUpgrade: true | |
kind: List | |
metadata: | |
resourceVersion: "" | |
selfLink: "" | |
------- | |
resource: ingresses | |
------- | |
apiVersion: v1 | |
items: [] | |
kind: List | |
metadata: | |
resourceVersion: "" | |
selfLink: "" | |
------- | |
resource: networkpolicies | |
------- | |
apiVersion: v1 | |
items: [] | |
kind: List | |
metadata: | |
resourceVersion: "" | |
selfLink: "" | |
------- | |
resource: runtimeclasses | |
------- | |
apiVersion: v1 | |
items: [] | |
kind: List | |
metadata: | |
resourceVersion: "" | |
selfLink: "" | |
------- | |
resource: poddisruptionbudgets | |
------- | |
apiVersion: v1 | |
items: [] | |
kind: List | |
metadata: | |
resourceVersion: "" | |
selfLink: "" | |
------- | |
resource: podsecuritypolicies | |
------- | |
apiVersion: v1 | |
items: [] | |
kind: List | |
metadata: | |
resourceVersion: "" | |
selfLink: "" | |
------- | |
resource: clusterrolebindings | |
------- | |
apiVersion: v1 | |
items: | |
- apiVersion: rbac.authorization.k8s.io/v1 | |
kind: ClusterRoleBinding | |
metadata: | |
annotations: | |
kubectl.kubernetes.io/last-applied-configuration: | | |
{"apiVersion":"rbac.authorization.k8s.io/v1","kind":"ClusterRoleBinding","metadata":{"annotations":{},"name":"aws-node"},"roleRef":{"apiGroup":"rbac.authorization.k8s.io","kind":"ClusterRole","name":"aws-node"},"subjects":[{"kind":"ServiceAccount","name":"aws-node","namespace":"kube-system"}]} | |
creationTimestamp: "2019-12-03T04:44:14Z" | |
name: aws-node | |
resourceVersion: "371" | |
selfLink: /apis/rbac.authorization.k8s.io/v1/clusterrolebindings/aws-node | |
uid: 8e56fe94-1587-11ea-b5af-027e0b84da98 | |
roleRef: | |
apiGroup: rbac.authorization.k8s.io | |
kind: ClusterRole | |
name: aws-node | |
subjects: | |
- kind: ServiceAccount | |
name: aws-node | |
namespace: kube-system | |
- apiVersion: rbac.authorization.k8s.io/v1 | |
kind: ClusterRoleBinding | |
metadata: | |
annotations: | |
rbac.authorization.kubernetes.io/autoupdate: "true" | |
creationTimestamp: "2019-12-03T04:43:11Z" | |
labels: | |
kubernetes.io/bootstrapping: rbac-defaults | |
name: cluster-admin | |
resourceVersion: "97" | |
selfLink: /apis/rbac.authorization.k8s.io/v1/clusterrolebindings/cluster-admin | |
uid: 68d7b9b8-1587-11ea-b5af-027e0b84da98 | |
roleRef: | |
apiGroup: rbac.authorization.k8s.io | |
kind: ClusterRole | |
name: cluster-admin | |
subjects: | |
- apiGroup: rbac.authorization.k8s.io | |
kind: Group | |
name: system:masters | |
- apiVersion: rbac.authorization.k8s.io/v1 | |
kind: ClusterRoleBinding | |
metadata: | |
annotations: | |
kubectl.kubernetes.io/last-applied-configuration: | | |
{"apiVersion":"rbac.authorization.k8s.io/v1","kind":"ClusterRoleBinding","metadata":{"annotations":{},"labels":{"autoscaling.knative.dev/metric-provider":"custom-metrics","serving.knative.dev/release":"devel"},"name":"custom-metrics:system:auth-delegator"},"roleRef":{"apiGroup":"rbac.authorization.k8s.io","kind":"ClusterRole","name":"system:auth-delegator"},"subjects":[{"kind":"ServiceAccount","name":"controller","namespace":"knative-serving"}]} | |
creationTimestamp: "2019-12-03T10:54:06Z" | |
labels: | |
autoscaling.knative.dev/metric-provider: custom-metrics | |
serving.knative.dev/release: devel | |
name: custom-metrics:system:auth-delegator | |
resourceVersion: "43808" | |
selfLink: /apis/rbac.authorization.k8s.io/v1/clusterrolebindings/custom-metrics%3Asystem%3Aauth-delegator | |
uid: 39cf0b2a-15bb-11ea-b5af-027e0b84da98 | |
roleRef: | |
apiGroup: rbac.authorization.k8s.io | |
kind: ClusterRole | |
name: system:auth-delegator | |
subjects: | |
- kind: ServiceAccount | |
name: controller | |
namespace: knative-serving | |
- apiVersion: rbac.authorization.k8s.io/v1 | |
kind: ClusterRoleBinding | |
metadata: | |
annotations: | |
kubectl.kubernetes.io/last-applied-configuration: | | |
{"apiVersion":"rbac.authorization.k8s.io/v1","kind":"ClusterRoleBinding","metadata":{"annotations":{},"labels":{"autoscaling.knative.dev/metric-provider":"custom-metrics","serving.knative.dev/release":"devel"},"name":"hpa-controller-custom-metrics"},"roleRef":{"apiGroup":"rbac.authorization.k8s.io","kind":"ClusterRole","name":"custom-metrics-server-resources"},"subjects":[{"kind":"ServiceAccount","name":"horizontal-pod-autoscaler","namespace":"kube-system"}]} | |
creationTimestamp: "2019-12-03T10:54:06Z" | |
labels: | |
autoscaling.knative.dev/metric-provider: custom-metrics | |
serving.knative.dev/release: devel | |
name: hpa-controller-custom-metrics | |
resourceVersion: "43810" | |
selfLink: /apis/rbac.authorization.k8s.io/v1/clusterrolebindings/hpa-controller-custom-metrics | |
uid: 39e7e550-15bb-11ea-b5af-027e0b84da98 | |
roleRef: | |
apiGroup: rbac.authorization.k8s.io | |
kind: ClusterRole | |
name: custom-metrics-server-resources | |
subjects: | |
- kind: ServiceAccount | |
name: horizontal-pod-autoscaler | |
namespace: kube-system | |
- apiVersion: rbac.authorization.k8s.io/v1 | |
kind: ClusterRoleBinding | |
metadata: | |
annotations: | |
kubectl.kubernetes.io/last-applied-configuration: | | |
{"apiVersion":"rbac.authorization.k8s.io/v1","kind":"ClusterRoleBinding","metadata":{"annotations":{},"labels":{"app":"security","chart":"security","heritage":"Tiller","release":"RELEASE-NAME"},"name":"istio-citadel-istio-system"},"roleRef":{"apiGroup":"rbac.authorization.k8s.io","kind":"ClusterRole","name":"istio-citadel-istio-system"},"subjects":[{"kind":"ServiceAccount","name":"istio-citadel-service-account","namespace":"istio-system"}]} | |
creationTimestamp: "2019-12-03T10:53:26Z" | |
labels: | |
app: security | |
chart: security | |
heritage: Tiller | |
release: RELEASE-NAME | |
name: istio-citadel-istio-system | |
resourceVersion: "43467" | |
selfLink: /apis/rbac.authorization.k8s.io/v1/clusterrolebindings/istio-citadel-istio-system | |
uid: 2252fde7-15bb-11ea-b5af-027e0b84da98 | |
roleRef: | |
apiGroup: rbac.authorization.k8s.io | |
kind: ClusterRole | |
name: istio-citadel-istio-system | |
subjects: | |
- kind: ServiceAccount | |
name: istio-citadel-service-account | |
namespace: istio-system | |
- apiVersion: rbac.authorization.k8s.io/v1 | |
kind: ClusterRoleBinding | |
metadata: | |
annotations: | |
kubectl.kubernetes.io/last-applied-configuration: | | |
{"apiVersion":"rbac.authorization.k8s.io/v1","kind":"ClusterRoleBinding","metadata":{"annotations":{},"labels":{"app":"galley","chart":"galley","heritage":"Tiller","release":"RELEASE-NAME"},"name":"istio-galley-admin-role-binding-istio-system"},"roleRef":{"apiGroup":"rbac.authorization.k8s.io","kind":"ClusterRole","name":"istio-galley-istio-system"},"subjects":[{"kind":"ServiceAccount","name":"istio-galley-service-account","namespace":"istio-system"}]} | |
creationTimestamp: "2019-12-03T10:53:26Z" | |
labels: | |
app: galley | |
chart: galley | |
heritage: Tiller | |
release: RELEASE-NAME | |
name: istio-galley-admin-role-binding-istio-system | |
resourceVersion: "43464" | |
selfLink: /apis/rbac.authorization.k8s.io/v1/clusterrolebindings/istio-galley-admin-role-binding-istio-system | |
uid: 2200fe62-15bb-11ea-b5af-027e0b84da98 | |
roleRef: | |
apiGroup: rbac.authorization.k8s.io | |
kind: ClusterRole | |
name: istio-galley-istio-system | |
subjects: | |
- kind: ServiceAccount | |
name: istio-galley-service-account | |
namespace: istio-system | |
- apiVersion: rbac.authorization.k8s.io/v1 | |
kind: ClusterRoleBinding | |
metadata: | |
annotations: | |
kubectl.kubernetes.io/last-applied-configuration: | | |
{"apiVersion":"rbac.authorization.k8s.io/v1","kind":"ClusterRoleBinding","metadata":{"annotations":{},"labels":{"app":"istio-init","istio":"init"},"name":"istio-init-admin-role-binding-istio-system"},"roleRef":{"apiGroup":"rbac.authorization.k8s.io","kind":"ClusterRole","name":"istio-init-istio-system"},"subjects":[{"kind":"ServiceAccount","name":"istio-init-service-account","namespace":"istio-system"}]} | |
creationTimestamp: "2019-12-03T10:51:42Z" | |
labels: | |
app: istio-init | |
istio: init | |
name: istio-init-admin-role-binding-istio-system | |
resourceVersion: "43163" | |
selfLink: /apis/rbac.authorization.k8s.io/v1/clusterrolebindings/istio-init-admin-role-binding-istio-system | |
uid: e463f023-15ba-11ea-b5af-027e0b84da98 | |
roleRef: | |
apiGroup: rbac.authorization.k8s.io | |
kind: ClusterRole | |
name: istio-init-istio-system | |
subjects: | |
- kind: ServiceAccount | |
name: istio-init-service-account | |
namespace: istio-system | |
- apiVersion: rbac.authorization.k8s.io/v1 | |
kind: ClusterRoleBinding | |
metadata: | |
annotations: | |
kubectl.kubernetes.io/last-applied-configuration: | | |
{"apiVersion":"rbac.authorization.k8s.io/v1","kind":"ClusterRoleBinding","metadata":{"annotations":{},"labels":{"app":"mixer","chart":"mixer","heritage":"Tiller","release":"RELEASE-NAME"},"name":"istio-mixer-admin-role-binding-istio-system"},"roleRef":{"apiGroup":"rbac.authorization.k8s.io","kind":"ClusterRole","name":"istio-mixer-istio-system"},"subjects":[{"kind":"ServiceAccount","name":"istio-mixer-service-account","namespace":"istio-system"}]} | |
creationTimestamp: "2019-12-03T10:53:26Z" | |
labels: | |
app: mixer | |
chart: mixer | |
heritage: Tiller | |
release: RELEASE-NAME | |
name: istio-mixer-admin-role-binding-istio-system | |
resourceVersion: "43465" | |
selfLink: /apis/rbac.authorization.k8s.io/v1/clusterrolebindings/istio-mixer-admin-role-binding-istio-system | |
uid: 221d25d5-15bb-11ea-b5af-027e0b84da98 | |
roleRef: | |
apiGroup: rbac.authorization.k8s.io | |
kind: ClusterRole | |
name: istio-mixer-istio-system | |
subjects: | |
- kind: ServiceAccount | |
name: istio-mixer-service-account | |
namespace: istio-system | |
- apiVersion: rbac.authorization.k8s.io/v1 | |
kind: ClusterRoleBinding | |
metadata: | |
annotations: | |
kubectl.kubernetes.io/last-applied-configuration: | | |
{"apiVersion":"rbac.authorization.k8s.io/v1","kind":"ClusterRoleBinding","metadata":{"annotations":{},"labels":{"chart":"istio-1.4.0"},"name":"istio-multi"},"roleRef":{"apiGroup":"rbac.authorization.k8s.io","kind":"ClusterRole","name":"istio-reader"},"subjects":[{"kind":"ServiceAccount","name":"istio-multi","namespace":"istio-system"}]} | |
creationTimestamp: "2019-12-03T10:53:27Z" | |
labels: | |
chart: istio-1.4.0 | |
name: istio-multi | |
resourceVersion: "43469" | |
selfLink: /apis/rbac.authorization.k8s.io/v1/clusterrolebindings/istio-multi | |
uid: 2287fc24-15bb-11ea-b5af-027e0b84da98 | |
roleRef: | |
apiGroup: rbac.authorization.k8s.io | |
kind: ClusterRole | |
name: istio-reader | |
subjects: | |
- kind: ServiceAccount | |
name: istio-multi | |
namespace: istio-system | |
- apiVersion: rbac.authorization.k8s.io/v1 | |
kind: ClusterRoleBinding | |
metadata: | |
annotations: | |
kubectl.kubernetes.io/last-applied-configuration: | | |
{"apiVersion":"rbac.authorization.k8s.io/v1","kind":"ClusterRoleBinding","metadata":{"annotations":{},"labels":{"app":"pilot","chart":"pilot","heritage":"Tiller","release":"RELEASE-NAME"},"name":"istio-pilot-istio-system"},"roleRef":{"apiGroup":"rbac.authorization.k8s.io","kind":"ClusterRole","name":"istio-pilot-istio-system"},"subjects":[{"kind":"ServiceAccount","name":"istio-pilot-service-account","namespace":"istio-system"}]} | |
creationTimestamp: "2019-12-03T10:53:26Z" | |
labels: | |
app: pilot | |
chart: pilot | |
heritage: Tiller | |
release: RELEASE-NAME | |
name: istio-pilot-istio-system | |
resourceVersion: "43466" | |
selfLink: /apis/rbac.authorization.k8s.io/v1/clusterrolebindings/istio-pilot-istio-system | |
uid: 22370198-15bb-11ea-b5af-027e0b84da98 | |
roleRef: | |
apiGroup: rbac.authorization.k8s.io | |
kind: ClusterRole | |
name: istio-pilot-istio-system | |
subjects: | |
- kind: ServiceAccount | |
name: istio-pilot-service-account | |
namespace: istio-system | |
- apiVersion: rbac.authorization.k8s.io/v1 | |
kind: ClusterRoleBinding | |
metadata: | |
annotations: | |
kubectl.kubernetes.io/last-applied-configuration: | | |
{"apiVersion":"rbac.authorization.k8s.io/v1","kind":"ClusterRoleBinding","metadata":{"annotations":{},"labels":{"app":"security","chart":"security","heritage":"Tiller","release":"RELEASE-NAME"},"name":"istio-security-post-install-role-binding-istio-system"},"roleRef":{"apiGroup":"rbac.authorization.k8s.io","kind":"ClusterRole","name":"istio-security-post-install-istio-system"},"subjects":[{"kind":"ServiceAccount","name":"istio-security-post-install-account","namespace":"istio-system"}]} | |
creationTimestamp: "2019-12-03T10:53:23Z" | |
labels: | |
app: security | |
chart: security | |
heritage: Tiller | |
release: RELEASE-NAME | |
name: istio-security-post-install-role-binding-istio-system | |
resourceVersion: "43435" | |
selfLink: /apis/rbac.authorization.k8s.io/v1/clusterrolebindings/istio-security-post-install-role-binding-istio-system | |
uid: 2096be7a-15bb-11ea-b5af-027e0b84da98 | |
roleRef: | |
apiGroup: rbac.authorization.k8s.io | |
kind: ClusterRole | |
name: istio-security-post-install-istio-system | |
subjects: | |
- kind: ServiceAccount | |
name: istio-security-post-install-account | |
namespace: istio-system | |
- apiVersion: rbac.authorization.k8s.io/v1 | |
kind: ClusterRoleBinding | |
metadata: | |
annotations: | |
kubectl.kubernetes.io/last-applied-configuration: | | |
{"apiVersion":"rbac.authorization.k8s.io/v1","kind":"ClusterRoleBinding","metadata":{"annotations":{},"labels":{"app":"sidecarInjectorWebhook","chart":"sidecarInjectorWebhook","heritage":"Tiller","istio":"sidecar-injector","release":"RELEASE-NAME"},"name":"istio-sidecar-injector-admin-role-binding-istio-system"},"roleRef":{"apiGroup":"rbac.authorization.k8s.io","kind":"ClusterRole","name":"istio-sidecar-injector-istio-system"},"subjects":[{"kind":"ServiceAccount","name":"istio-sidecar-injector-service-account","namespace":"istio-system"}]} | |
creationTimestamp: "2019-12-03T10:53:26Z" | |
labels: | |
app: sidecarInjectorWebhook | |
chart: sidecarInjectorWebhook | |
heritage: Tiller | |
istio: sidecar-injector | |
release: RELEASE-NAME | |
name: istio-sidecar-injector-admin-role-binding-istio-system | |
resourceVersion: "43468" | |
selfLink: /apis/rbac.authorization.k8s.io/v1/clusterrolebindings/istio-sidecar-injector-admin-role-binding-istio-system | |
uid: 226cbc8c-15bb-11ea-b5af-027e0b84da98 | |
roleRef: | |
apiGroup: rbac.authorization.k8s.io | |
kind: ClusterRole | |
name: istio-sidecar-injector-istio-system | |
subjects: | |
- kind: ServiceAccount | |
name: istio-sidecar-injector-service-account | |
namespace: istio-system | |
- apiVersion: rbac.authorization.k8s.io/v1 | |
kind: ClusterRoleBinding | |
metadata: | |
annotations: | |
kubectl.kubernetes.io/last-applied-configuration: | | |
{"apiVersion":"rbac.authorization.k8s.io/v1","kind":"ClusterRoleBinding","metadata":{"annotations":{},"labels":{"serving.knative.dev/release":"devel"},"name":"knative-serving-controller-admin"},"roleRef":{"apiGroup":"rbac.authorization.k8s.io","kind":"ClusterRole","name":"knative-serving-admin"},"subjects":[{"kind":"ServiceAccount","name":"controller","namespace":"knative-serving"}]} | |
creationTimestamp: "2019-12-03T10:54:06Z" | |
labels: | |
serving.knative.dev/release: devel | |
name: knative-serving-controller-admin | |
resourceVersion: "43811" | |
selfLink: /apis/rbac.authorization.k8s.io/v1/clusterrolebindings/knative-serving-controller-admin | |
uid: 39fff8e2-15bb-11ea-b5af-027e0b84da98 | |
roleRef: | |
apiGroup: rbac.authorization.k8s.io | |
kind: ClusterRole | |
name: knative-serving-admin | |
subjects: | |
- kind: ServiceAccount | |
name: controller | |
namespace: knative-serving | |
- apiVersion: rbac.authorization.k8s.io/v1 | |
kind: ClusterRoleBinding | |
metadata: | |
annotations: | |
kubectl.kubernetes.io/last-applied-configuration: | | |
{"apiVersion":"rbac.authorization.k8s.io/v1","kind":"ClusterRoleBinding","metadata":{"annotations":{},"labels":{"k8s-addon":"dns-controller.addons.k8s.io"},"name":"kops:dns-controller"},"roleRef":{"apiGroup":"rbac.authorization.k8s.io","kind":"ClusterRole","name":"kops:dns-controller"},"subjects":[{"apiGroup":"rbac.authorization.k8s.io","kind":"User","name":"system:serviceaccount:kube-system:dns-controller"}]} | |
creationTimestamp: "2019-12-03T04:44:12Z" | |
labels: | |
k8s-addon: dns-controller.addons.k8s.io | |
name: kops:dns-controller | |
resourceVersion: "355" | |
selfLink: /apis/rbac.authorization.k8s.io/v1/clusterrolebindings/kops%3Adns-controller | |
uid: 8da0fbf2-1587-11ea-b5af-027e0b84da98 | |
roleRef: | |
apiGroup: rbac.authorization.k8s.io | |
kind: ClusterRole | |
name: kops:dns-controller | |
subjects: | |
- apiGroup: rbac.authorization.k8s.io | |
kind: User | |
name: system:serviceaccount:kube-system:dns-controller | |
- apiVersion: rbac.authorization.k8s.io/v1 | |
kind: ClusterRoleBinding | |
metadata: | |
annotations: | |
kubectl.kubernetes.io/last-applied-configuration: | | |
{"apiVersion":"rbac.authorization.k8s.io/v1","kind":"ClusterRoleBinding","metadata":{"annotations":{},"name":"kops:system:kubelet-api-admin"},"roleRef":{"apiGroup":"rbac.authorization.k8s.io","kind":"ClusterRole","name":"system:kubelet-api-admin"},"subjects":[{"apiGroup":"rbac.authorization.k8s.io","kind":"User","name":"kubelet-api"}]} | |
creationTimestamp: "2019-12-03T04:44:15Z" | |
name: kops:system:kubelet-api-admin | |
resourceVersion: "388" | |
selfLink: /apis/rbac.authorization.k8s.io/v1/clusterrolebindings/kops%3Asystem%3Akubelet-api-admin | |
uid: 8f67b84c-1587-11ea-b5af-027e0b84da98 | |
roleRef: | |
apiGroup: rbac.authorization.k8s.io | |
kind: ClusterRole | |
name: system:kubelet-api-admin | |
subjects: | |
- apiGroup: rbac.authorization.k8s.io | |
kind: User | |
name: kubelet-api | |
- apiVersion: rbac.authorization.k8s.io/v1 | |
kind: ClusterRoleBinding | |
metadata: | |
annotations: | |
kubectl.kubernetes.io/last-applied-configuration: | | |
{"apiVersion":"rbac.authorization.k8s.io/v1","kind":"ClusterRoleBinding","metadata":{"annotations":{},"labels":{"k8s-addon":"kube-dns.addons.k8s.io"},"name":"kube-dns-autoscaler"},"roleRef":{"apiGroup":"rbac.authorization.k8s.io","kind":"ClusterRole","name":"kube-dns-autoscaler"},"subjects":[{"kind":"ServiceAccount","name":"kube-dns-autoscaler","namespace":"kube-system"}]} | |
creationTimestamp: "2019-12-03T04:43:11Z" | |
labels: | |
k8s-addon: kube-dns.addons.k8s.io | |
name: kube-dns-autoscaler | |
resourceVersion: "118" | |
selfLink: /apis/rbac.authorization.k8s.io/v1/clusterrolebindings/kube-dns-autoscaler | |
uid: 692176ba-1587-11ea-b5af-027e0b84da98 | |
roleRef: | |
apiGroup: rbac.authorization.k8s.io | |
kind: ClusterRole | |
name: kube-dns-autoscaler | |
subjects: | |
- kind: ServiceAccount | |
name: kube-dns-autoscaler | |
namespace: kube-system | |
- apiVersion: rbac.authorization.k8s.io/v1 | |
kind: ClusterRoleBinding | |
metadata: | |
creationTimestamp: "2019-12-03T04:43:09Z" | |
name: kubeadm:node-proxier | |
resourceVersion: "9" | |
selfLink: /apis/rbac.authorization.k8s.io/v1/clusterrolebindings/kubeadm%3Anode-proxier | |
uid: 681ae435-1587-11ea-b5af-027e0b84da98 | |
roleRef: | |
apiGroup: rbac.authorization.k8s.io | |
kind: ClusterRole | |
name: system:node-proxier | |
subjects: | |
- kind: ServiceAccount | |
name: kube-proxy | |
namespace: kube-system | |
- apiVersion: rbac.authorization.k8s.io/v1 | |
kind: ClusterRoleBinding | |
metadata: | |
annotations: | |
kubectl.kubernetes.io/last-applied-configuration: | | |
{"apiVersion":"rbac.authorization.k8s.io/v1","kind":"ClusterRoleBinding","metadata":{"annotations":{},"labels":{"addonmanager.kubernetes.io/mode":"Reconcile","k8s-addon":"rbac.addons.k8s.io","kubernetes.io/cluster-service":"true"},"name":"kubelet-cluster-admin"},"roleRef":{"apiGroup":"rbac.authorization.k8s.io","kind":"ClusterRole","name":"system:node"},"subjects":[{"apiGroup":"rbac.authorization.k8s.io","kind":"User","name":"kubelet"}]} | |
creationTimestamp: "2019-12-03T04:44:15Z" | |
labels: | |
addonmanager.kubernetes.io/mode: Reconcile | |
k8s-addon: rbac.addons.k8s.io | |
kubernetes.io/cluster-service: "true" | |
name: kubelet-cluster-admin | |
resourceVersion: "386" | |
selfLink: /apis/rbac.authorization.k8s.io/v1/clusterrolebindings/kubelet-cluster-admin | |
uid: 8f0a6aa9-1587-11ea-b5af-027e0b84da98 | |
roleRef: | |
apiGroup: rbac.authorization.k8s.io | |
kind: ClusterRole | |
name: system:node | |
subjects: | |
- apiGroup: rbac.authorization.k8s.io | |
kind: User | |
name: kubelet | |
- apiVersion: rbac.authorization.k8s.io/v1 | |
kind: ClusterRoleBinding | |
metadata: | |
annotations: | |
rbac.authorization.kubernetes.io/autoupdate: "true" | |
creationTimestamp: "2019-12-03T04:43:11Z" | |
labels: | |
kubernetes.io/bootstrapping: rbac-defaults | |
name: system:aws-cloud-provider | |
resourceVersion: "107" | |
selfLink: /apis/rbac.authorization.k8s.io/v1/clusterrolebindings/system%3Aaws-cloud-provider | |
uid: 6905399d-1587-11ea-b5af-027e0b84da98 | |
roleRef: | |
apiGroup: rbac.authorization.k8s.io | |
kind: ClusterRole | |
name: system:aws-cloud-provider | |
subjects: | |
- kind: ServiceAccount | |
name: aws-cloud-provider | |
namespace: kube-system | |
- apiVersion: rbac.authorization.k8s.io/v1 | |
kind: ClusterRoleBinding | |
metadata: | |
annotations: | |
rbac.authorization.kubernetes.io/autoupdate: "true" | |
creationTimestamp: "2019-12-03T04:43:11Z" | |
labels: | |
kubernetes.io/bootstrapping: rbac-defaults | |
name: system:basic-user | |
resourceVersion: "99" | |
selfLink: /apis/rbac.authorization.k8s.io/v1/clusterrolebindings/system%3Abasic-user | |
uid: 68e098fa-1587-11ea-b5af-027e0b84da98 | |
roleRef: | |
apiGroup: rbac.authorization.k8s.io | |
kind: ClusterRole | |
name: system:basic-user | |
subjects: | |
- apiGroup: rbac.authorization.k8s.io | |
kind: Group | |
name: system:authenticated | |
- apiVersion: rbac.authorization.k8s.io/v1 | |
kind: ClusterRoleBinding | |
metadata: | |
annotations: | |
rbac.authorization.kubernetes.io/autoupdate: "true" | |
creationTimestamp: "2019-12-03T04:43:11Z" | |
labels: | |
kubernetes.io/bootstrapping: rbac-defaults | |
name: system:controller:attachdetach-controller | |
resourceVersion: "110" | |
selfLink: /apis/rbac.authorization.k8s.io/v1/clusterrolebindings/system%3Acontroller%3Aattachdetach-controller | |
uid: 691793f8-1587-11ea-b5af-027e0b84da98 | |
roleRef: | |
apiGroup: rbac.authorization.k8s.io | |
kind: ClusterRole | |
name: system:controller:attachdetach-controller | |
subjects: | |
- kind: ServiceAccount | |
name: attachdetach-controller | |
namespace: kube-system | |
- apiVersion: rbac.authorization.k8s.io/v1 | |
kind: ClusterRoleBinding | |
metadata: | |
annotations: | |
rbac.authorization.kubernetes.io/autoupdate: "true" | |
creationTimestamp: "2019-12-03T04:43:12Z" | |
labels: | |
kubernetes.io/bootstrapping: rbac-defaults | |
name: system:controller:certificate-controller | |
resourceVersion: "140" | |
selfLink: /apis/rbac.authorization.k8s.io/v1/clusterrolebindings/system%3Acontroller%3Acertificate-controller | |
uid: 69a3e583-1587-11ea-b5af-027e0b84da98 | |
roleRef: | |
apiGroup: rbac.authorization.k8s.io | |
kind: ClusterRole | |
name: system:controller:certificate-controller | |
subjects: | |
- kind: ServiceAccount | |
name: certificate-controller | |
namespace: kube-system | |
- apiVersion: rbac.authorization.k8s.io/v1 | |
kind: ClusterRoleBinding | |
metadata: | |
annotations: | |
rbac.authorization.kubernetes.io/autoupdate: "true" | |
creationTimestamp: "2019-12-03T04:43:11Z" | |
labels: | |
kubernetes.io/bootstrapping: rbac-defaults | |
name: system:controller:clusterrole-aggregation-controller | |
resourceVersion: "113" | |
selfLink: /apis/rbac.authorization.k8s.io/v1/clusterrolebindings/system%3Acontroller%3Aclusterrole-aggregation-controller | |
uid: 691dc60d-1587-11ea-b5af-027e0b84da98 | |
roleRef: | |
apiGroup: rbac.authorization.k8s.io | |
kind: ClusterRole | |
name: system:controller:clusterrole-aggregation-controller | |
subjects: | |
- kind: ServiceAccount | |
name: clusterrole-aggregation-controller | |
namespace: kube-system | |
- apiVersion: rbac.authorization.k8s.io/v1 | |
kind: ClusterRoleBinding | |
metadata: | |
annotations: | |
rbac.authorization.kubernetes.io/autoupdate: "true" | |
creationTimestamp: "2019-12-03T04:43:11Z" | |
labels: | |
kubernetes.io/bootstrapping: rbac-defaults | |
name: system:controller:cronjob-controller | |
resourceVersion: "119" | |
selfLink: /apis/rbac.authorization.k8s.io/v1/clusterrolebindings/system%3Acontroller%3Acronjob-controller | |
uid: 6923b0c6-1587-11ea-b5af-027e0b84da98 | |
roleRef: | |
apiGroup: rbac.authorization.k8s.io | |
kind: ClusterRole | |
name: system:controller:cronjob-controller | |
subjects: | |
- kind: ServiceAccount | |
name: cronjob-controller | |
namespace: kube-system | |
- apiVersion: rbac.authorization.k8s.io/v1 | |
kind: ClusterRoleBinding | |
metadata: | |
annotations: | |
rbac.authorization.kubernetes.io/autoupdate: "true" | |
creationTimestamp: "2019-12-03T04:43:11Z" | |
labels: | |
kubernetes.io/bootstrapping: rbac-defaults | |
name: system:controller:daemon-set-controller | |
resourceVersion: "120" | |
selfLink: /apis/rbac.authorization.k8s.io/v1/clusterrolebindings/system%3Acontroller%3Adaemon-set-controller | |
uid: 6929d0d6-1587-11ea-b5af-027e0b84da98 | |
roleRef: | |
apiGroup: rbac.authorization.k8s.io | |
kind: ClusterRole | |
name: system:controller:daemon-set-controller | |
subjects: | |
- kind: ServiceAccount | |
name: daemon-set-controller | |
namespace: kube-system | |
- apiVersion: rbac.authorization.k8s.io/v1 | |
kind: ClusterRoleBinding | |
metadata: | |
annotations: | |
rbac.authorization.kubernetes.io/autoupdate: "true" | |
creationTimestamp: "2019-12-03T04:43:11Z" | |
labels: | |
kubernetes.io/bootstrapping: rbac-defaults | |
name: system:controller:deployment-controller | |
resourceVersion: "121" | |
selfLink: /apis/rbac.authorization.k8s.io/v1/clusterrolebindings/system%3Acontroller%3Adeployment-controller | |
uid: 692ffd26-1587-11ea-b5af-027e0b84da98 | |
roleRef: | |
apiGroup: rbac.authorization.k8s.io | |
kind: ClusterRole | |
name: system:controller:deployment-controller | |
subjects: | |
- kind: ServiceAccount | |
name: deployment-controller | |
namespace: kube-system | |
- apiVersion: rbac.authorization.k8s.io/v1 | |
kind: ClusterRoleBinding | |
metadata: | |
annotations: | |
rbac.authorization.kubernetes.io/autoupdate: "true" | |
creationTimestamp: "2019-12-03T04:43:11Z" | |
labels: | |
kubernetes.io/bootstrapping: rbac-defaults | |
name: system:controller:disruption-controller | |
resourceVersion: "122" | |
selfLink: /apis/rbac.authorization.k8s.io/v1/clusterrolebindings/system%3Acontroller%3Adisruption-controller | |
uid: 693604bb-1587-11ea-b5af-027e0b84da98 | |
roleRef: | |
apiGroup: rbac.authorization.k8s.io | |
kind: ClusterRole | |
name: system:controller:disruption-controller | |
subjects: | |
- kind: ServiceAccount | |
name: disruption-controller | |
namespace: kube-system | |
- apiVersion: rbac.authorization.k8s.io/v1 | |
kind: ClusterRoleBinding | |
metadata: | |
annotations: | |
rbac.authorization.kubernetes.io/autoupdate: "true" | |
creationTimestamp: "2019-12-03T04:43:11Z" | |
labels: | |
kubernetes.io/bootstrapping: rbac-defaults | |
name: system:controller:endpoint-controller | |
resourceVersion: "123" | |
selfLink: /apis/rbac.authorization.k8s.io/v1/clusterrolebindings/system%3Acontroller%3Aendpoint-controller | |
uid: 693c1f75-1587-11ea-b5af-027e0b84da98 | |
roleRef: | |
apiGroup: rbac.authorization.k8s.io | |
kind: ClusterRole | |
name: system:controller:endpoint-controller | |
subjects: | |
- kind: ServiceAccount | |
name: endpoint-controller | |
namespace: kube-system | |
- apiVersion: rbac.authorization.k8s.io/v1 | |
kind: ClusterRoleBinding | |
metadata: | |
annotations: | |
rbac.authorization.kubernetes.io/autoupdate: "true" | |
creationTimestamp: "2019-12-03T04:43:11Z" | |
labels: | |
kubernetes.io/bootstrapping: rbac-defaults | |
name: system:controller:expand-controller | |
resourceVersion: "124" | |
selfLink: /apis/rbac.authorization.k8s.io/v1/clusterrolebindings/system%3Acontroller%3Aexpand-controller | |
uid: 69423ab7-1587-11ea-b5af-027e0b84da98 | |
roleRef: | |
apiGroup: rbac.authorization.k8s.io | |
kind: ClusterRole | |
name: system:controller:expand-controller | |
subjects: | |
- kind: ServiceAccount | |
name: expand-controller | |
namespace: kube-system | |
- apiVersion: rbac.authorization.k8s.io/v1 | |
kind: ClusterRoleBinding | |
metadata: | |
annotations: | |
rbac.authorization.kubernetes.io/autoupdate: "true" | |
creationTimestamp: "2019-12-03T04:43:11Z" | |
labels: | |
kubernetes.io/bootstrapping: rbac-defaults | |
name: system:controller:generic-garbage-collector | |
resourceVersion: "125" | |
selfLink: /apis/rbac.authorization.k8s.io/v1/clusterrolebindings/system%3Acontroller%3Ageneric-garbage-collector | |
uid: 694850e4-1587-11ea-b5af-027e0b84da98 | |
roleRef: | |
apiGroup: rbac.authorization.k8s.io | |
kind: ClusterRole | |
name: system:controller:generic-garbage-collector | |
subjects: | |
- kind: ServiceAccount | |
name: generic-garbage-collector | |
namespace: kube-system | |
- apiVersion: rbac.authorization.k8s.io/v1 | |
kind: ClusterRoleBinding | |
metadata: | |
annotations: | |
rbac.authorization.kubernetes.io/autoupdate: "true" | |
creationTimestamp: "2019-12-03T04:43:11Z" | |
labels: | |
kubernetes.io/bootstrapping: rbac-defaults | |
name: system:controller:horizontal-pod-autoscaler | |
resourceVersion: "126" | |
selfLink: /apis/rbac.authorization.k8s.io/v1/clusterrolebindings/system%3Acontroller%3Ahorizontal-pod-autoscaler | |
uid: 694e7262-1587-11ea-b5af-027e0b84da98 | |
roleRef: | |
apiGroup: rbac.authorization.k8s.io | |
kind: ClusterRole | |
name: system:controller:horizontal-pod-autoscaler | |
subjects: | |
- kind: ServiceAccount | |
name: horizontal-pod-autoscaler | |
namespace: kube-system | |
- apiVersion: rbac.authorization.k8s.io/v1 | |
kind: ClusterRoleBinding | |
metadata: | |
annotations: | |
rbac.authorization.kubernetes.io/autoupdate: "true" | |
creationTimestamp: "2019-12-03T04:43:12Z" | |
labels: | |
kubernetes.io/bootstrapping: rbac-defaults | |
name: system:controller:job-controller | |
resourceVersion: "127" | |
selfLink: /apis/rbac.authorization.k8s.io/v1/clusterrolebindings/system%3Acontroller%3Ajob-controller | |
uid: 69548ad1-1587-11ea-b5af-027e0b84da98 | |
roleRef: | |
apiGroup: rbac.authorization.k8s.io | |
kind: ClusterRole | |
name: system:controller:job-controller | |
subjects: | |
- kind: ServiceAccount | |
name: job-controller | |
namespace: kube-system | |
- apiVersion: rbac.authorization.k8s.io/v1 | |
kind: ClusterRoleBinding | |
metadata: | |
annotations: | |
rbac.authorization.kubernetes.io/autoupdate: "true" | |
creationTimestamp: "2019-12-03T04:43:12Z" | |
labels: | |
kubernetes.io/bootstrapping: rbac-defaults | |
name: system:controller:namespace-controller | |
resourceVersion: "128" | |
selfLink: /apis/rbac.authorization.k8s.io/v1/clusterrolebindings/system%3Acontroller%3Anamespace-controller | |
uid: 695aa461-1587-11ea-b5af-027e0b84da98 | |
roleRef: | |
apiGroup: rbac.authorization.k8s.io | |
kind: ClusterRole | |
name: system:controller:namespace-controller | |
subjects: | |
- kind: ServiceAccount | |
name: namespace-controller | |
namespace: kube-system | |
- apiVersion: rbac.authorization.k8s.io/v1 | |
kind: ClusterRoleBinding | |
metadata: | |
annotations: | |
rbac.authorization.kubernetes.io/autoupdate: "true" | |
creationTimestamp: "2019-12-03T04:43:12Z" | |
labels: | |
kubernetes.io/bootstrapping: rbac-defaults | |
name: system:controller:node-controller | |
resourceVersion: "129" | |
selfLink: /apis/rbac.authorization.k8s.io/v1/clusterrolebindings/system%3Acontroller%3Anode-controller | |
uid: 6960c158-1587-11ea-b5af-027e0b84da98 | |
roleRef: | |
apiGroup: rbac.authorization.k8s.io | |
kind: ClusterRole | |
name: system:controller:node-controller | |
subjects: | |
- kind: ServiceAccount | |
name: node-controller | |
namespace: kube-system | |
- apiVersion: rbac.authorization.k8s.io/v1 | |
kind: ClusterRoleBinding | |
metadata: | |
annotations: | |
rbac.authorization.kubernetes.io/autoupdate: "true" | |
creationTimestamp: "2019-12-03T04:43:12Z" | |
labels: | |
kubernetes.io/bootstrapping: rbac-defaults | |
name: system:controller:persistent-volume-binder | |
resourceVersion: "130" | |
selfLink: /apis/rbac.authorization.k8s.io/v1/clusterrolebindings/system%3Acontroller%3Apersistent-volume-binder | |
uid: 6966e11c-1587-11ea-b5af-027e0b84da98 | |
roleRef: | |
apiGroup: rbac.authorization.k8s.io | |
kind: ClusterRole | |
name: system:controller:persistent-volume-binder | |
subjects: | |
- kind: ServiceAccount | |
name: persistent-volume-binder | |
namespace: kube-system | |
- apiVersion: rbac.authorization.k8s.io/v1 | |
kind: ClusterRoleBinding | |
metadata: | |
annotations: | |
rbac.authorization.kubernetes.io/autoupdate: "true" | |
creationTimestamp: "2019-12-03T04:43:12Z" | |
labels: | |
kubernetes.io/bootstrapping: rbac-defaults | |
name: system:controller:pod-garbage-collector | |
resourceVersion: "131" | |
selfLink: /apis/rbac.authorization.k8s.io/v1/clusterrolebindings/system%3Acontroller%3Apod-garbage-collector | |
uid: 696cf321-1587-11ea-b5af-027e0b84da98 | |
roleRef: | |
apiGroup: rbac.authorization.k8s.io | |
kind: ClusterRole | |
name: system:controller:pod-garbage-collector | |
subjects: | |
- kind: ServiceAccount | |
name: pod-garbage-collector | |
namespace: kube-system | |
- apiVersion: rbac.authorization.k8s.io/v1 | |
kind: ClusterRoleBinding | |
metadata: | |
annotations: | |
rbac.authorization.kubernetes.io/autoupdate: "true" | |
creationTimestamp: "2019-12-03T04:43:12Z" | |
labels: | |
kubernetes.io/bootstrapping: rbac-defaults | |
name: system:controller:pv-protection-controller | |
resourceVersion: "142" | |
selfLink: /apis/rbac.authorization.k8s.io/v1/clusterrolebindings/system%3Acontroller%3Apv-protection-controller | |
uid: 69b02275-1587-11ea-b5af-027e0b84da98 | |
roleRef: | |
apiGroup: rbac.authorization.k8s.io | |
kind: ClusterRole | |
name: system:controller:pv-protection-controller | |
subjects: | |
- kind: ServiceAccount | |
name: pv-protection-controller | |
namespace: kube-system | |
- apiVersion: rbac.authorization.k8s.io/v1 | |
kind: ClusterRoleBinding | |
metadata: | |
annotations: | |
rbac.authorization.kubernetes.io/autoupdate: "true" | |
creationTimestamp: "2019-12-03T04:43:12Z" | |
labels: | |
kubernetes.io/bootstrapping: rbac-defaults | |
name: system:controller:pvc-protection-controller | |
resourceVersion: "141" | |
selfLink: /apis/rbac.authorization.k8s.io/v1/clusterrolebindings/system%3Acontroller%3Apvc-protection-controller | |
uid: 69a9fca5-1587-11ea-b5af-027e0b84da98 | |
roleRef: | |
apiGroup: rbac.authorization.k8s.io | |
kind: ClusterRole | |
name: system:controller:pvc-protection-controller | |
subjects: | |
- kind: ServiceAccount | |
name: pvc-protection-controller | |
namespace: kube-system | |
- apiVersion: rbac.authorization.k8s.io/v1 | |
kind: ClusterRoleBinding | |
metadata: | |
annotations: | |
rbac.authorization.kubernetes.io/autoupdate: "true" | |
creationTimestamp: "2019-12-03T04:43:12Z" | |
labels: | |
kubernetes.io/bootstrapping: rbac-defaults | |
name: system:controller:replicaset-controller | |
resourceVersion: "132" | |
selfLink: /apis/rbac.authorization.k8s.io/v1/clusterrolebindings/system%3Acontroller%3Areplicaset-controller | |
uid: 69730e21-1587-11ea-b5af-027e0b84da98 | |
roleRef: | |
apiGroup: rbac.authorization.k8s.io | |
kind: ClusterRole | |
name: system:controller:replicaset-controller | |
subjects: | |
- kind: ServiceAccount | |
name: replicaset-controller | |
namespace: kube-system | |
- apiVersion: rbac.authorization.k8s.io/v1 | |
kind: ClusterRoleBinding | |
metadata: | |
annotations: | |
rbac.authorization.kubernetes.io/autoupdate: "true" | |
creationTimestamp: "2019-12-03T04:43:12Z" | |
labels: | |
kubernetes.io/bootstrapping: rbac-defaults | |
name: system:controller:replication-controller | |
resourceVersion: "133" | |
selfLink: /apis/rbac.authorization.k8s.io/v1/clusterrolebindings/system%3Acontroller%3Areplication-controller | |
uid: 6979379f-1587-11ea-b5af-027e0b84da98 | |
roleRef: | |
apiGroup: rbac.authorization.k8s.io | |
kind: ClusterRole | |
name: system:controller:replication-controller | |
subjects: | |
- kind: ServiceAccount | |
name: replication-controller | |
namespace: kube-system | |
- apiVersion: rbac.authorization.k8s.io/v1 | |
kind: ClusterRoleBinding | |
metadata: | |
annotations: | |
rbac.authorization.kubernetes.io/autoupdate: "true" | |
creationTimestamp: "2019-12-03T04:43:12Z" | |
labels: | |
kubernetes.io/bootstrapping: rbac-defaults | |
name: system:controller:resourcequota-controller | |
resourceVersion: "134" | |
selfLink: /apis/rbac.authorization.k8s.io/v1/clusterrolebindings/system%3Acontroller%3Aresourcequota-controller | |
uid: 697f4644-1587-11ea-b5af-027e0b84da98 | |
roleRef: | |
apiGroup: rbac.authorization.k8s.io | |
kind: ClusterRole | |
name: system:controller:resourcequota-controller | |
subjects: | |
- kind: ServiceAccount | |
name: resourcequota-controller | |
namespace: kube-system | |
- apiVersion: rbac.authorization.k8s.io/v1 | |
kind: ClusterRoleBinding | |
metadata: | |
annotations: | |
rbac.authorization.kubernetes.io/autoupdate: "true" | |
creationTimestamp: "2019-12-03T04:43:12Z" | |
labels: | |
kubernetes.io/bootstrapping: rbac-defaults | |
name: system:controller:route-controller | |
resourceVersion: "135" | |
selfLink: /apis/rbac.authorization.k8s.io/v1/clusterrolebindings/system%3Acontroller%3Aroute-controller | |
uid: 69856149-1587-11ea-b5af-027e0b84da98 | |
roleRef: | |
apiGroup: rbac.authorization.k8s.io | |
kind: ClusterRole | |
name: system:controller:route-controller | |
subjects: | |
- kind: ServiceAccount | |
name: route-controller | |
namespace: kube-system | |
- apiVersion: rbac.authorization.k8s.io/v1 | |
kind: ClusterRoleBinding | |
metadata: | |
annotations: | |
rbac.authorization.kubernetes.io/autoupdate: "true" | |
creationTimestamp: "2019-12-03T04:43:12Z" | |
labels: | |
kubernetes.io/bootstrapping: rbac-defaults | |
name: system:controller:service-account-controller | |
resourceVersion: "136" | |
selfLink: /apis/rbac.authorization.k8s.io/v1/clusterrolebindings/system%3Acontroller%3Aservice-account-controller | |
uid: 698b7b24-1587-11ea-b5af-027e0b84da98 | |
roleRef: | |
apiGroup: rbac.authorization.k8s.io | |
kind: ClusterRole | |
name: system:controller:service-account-controller | |
subjects: | |
- kind: ServiceAccount | |
name: service-account-controller | |
namespace: kube-system | |
- apiVersion: rbac.authorization.k8s.io/v1 | |
kind: ClusterRoleBinding | |
metadata: | |
annotations: | |
rbac.authorization.kubernetes.io/autoupdate: "true" | |
creationTimestamp: "2019-12-03T04:43:12Z" | |
labels: | |
kubernetes.io/bootstrapping: rbac-defaults | |
name: system:controller:service-controller | |
resourceVersion: "137" | |
selfLink: /apis/rbac.authorization.k8s.io/v1/clusterrolebindings/system%3Acontroller%3Aservice-controller | |
uid: 69919c8f-1587-11ea-b5af-027e0b84da98 | |
roleRef: | |
apiGroup: rbac.authorization.k8s.io | |
kind: ClusterRole | |
name: system:controller:service-controller | |
subjects: | |
- kind: ServiceAccount | |
name: service-controller | |
namespace: kube-system | |
- apiVersion: rbac.authorization.k8s.io/v1 | |
kind: ClusterRoleBinding | |
metadata: | |
annotations: | |
rbac.authorization.kubernetes.io/autoupdate: "true" | |
creationTimestamp: "2019-12-03T04:43:12Z" | |
labels: | |
kubernetes.io/bootstrapping: rbac-defaults | |
name: system:controller:statefulset-controller | |
resourceVersion: "138" | |
selfLink: /apis/rbac.authorization.k8s.io/v1/clusterrolebindings/system%3Acontroller%3Astatefulset-controller | |
uid: 6997aa2c-1587-11ea-b5af-027e0b84da98 | |
roleRef: | |
apiGroup: rbac.authorization.k8s.io | |
kind: ClusterRole | |
name: system:controller:statefulset-controller | |
subjects: | |
- kind: ServiceAccount | |
name: statefulset-controller | |
namespace: kube-system | |
- apiVersion: rbac.authorization.k8s.io/v1 | |
kind: ClusterRoleBinding | |
metadata: | |
annotations: | |
rbac.authorization.kubernetes.io/autoupdate: "true" | |
creationTimestamp: "2019-12-03T04:43:12Z" | |
labels: | |
kubernetes.io/bootstrapping: rbac-defaults | |
name: system:controller:ttl-controller | |
resourceVersion: "139" | |
selfLink: /apis/rbac.authorization.k8s.io/v1/clusterrolebindings/system%3Acontroller%3Attl-controller | |
uid: 699dc92c-1587-11ea-b5af-027e0b84da98 | |
roleRef: | |
apiGroup: rbac.authorization.k8s.io | |
kind: ClusterRole | |
name: system:controller:ttl-controller | |
subjects: | |
- kind: ServiceAccount | |
name: ttl-controller | |
namespace: kube-system | |
- apiVersion: rbac.authorization.k8s.io/v1 | |
kind: ClusterRoleBinding | |
metadata: | |
annotations: | |
rbac.authorization.kubernetes.io/autoupdate: "true" | |
creationTimestamp: "2019-12-03T04:43:11Z" | |
labels: | |
kubernetes.io/bootstrapping: rbac-defaults | |
name: system:discovery | |
resourceVersion: "98" | |
selfLink: /apis/rbac.authorization.k8s.io/v1/clusterrolebindings/system%3Adiscovery | |
uid: 68da78d3-1587-11ea-b5af-027e0b84da98 | |
roleRef: | |
apiGroup: rbac.authorization.k8s.io | |
kind: ClusterRole | |
name: system:discovery | |
subjects: | |
- apiGroup: rbac.authorization.k8s.io | |
kind: Group | |
name: system:authenticated | |
- apiVersion: rbac.authorization.k8s.io/v1 | |
kind: ClusterRoleBinding | |
metadata: | |
annotations: | |
rbac.authorization.kubernetes.io/autoupdate: "true" | |
creationTimestamp: "2019-12-03T04:43:11Z" | |
labels: | |
kubernetes.io/bootstrapping: rbac-defaults | |
name: system:kube-controller-manager | |
resourceVersion: "104" | |
selfLink: /apis/rbac.authorization.k8s.io/v1/clusterrolebindings/system%3Akube-controller-manager | |
uid: 68f2de8c-1587-11ea-b5af-027e0b84da98 | |
roleRef: | |
apiGroup: rbac.authorization.k8s.io | |
kind: ClusterRole | |
name: system:kube-controller-manager | |
subjects: | |
- apiGroup: rbac.authorization.k8s.io | |
kind: User | |
name: system:kube-controller-manager | |
- apiVersion: rbac.authorization.k8s.io/v1 | |
kind: ClusterRoleBinding | |
metadata: | |
annotations: | |
rbac.authorization.kubernetes.io/autoupdate: "true" | |
creationTimestamp: "2019-12-03T04:43:11Z" | |
labels: | |
kubernetes.io/bootstrapping: rbac-defaults | |
name: system:kube-dns | |
resourceVersion: "105" | |
selfLink: /apis/rbac.authorization.k8s.io/v1/clusterrolebindings/system%3Akube-dns | |
uid: 68f8fff0-1587-11ea-b5af-027e0b84da98 | |
roleRef: | |
apiGroup: rbac.authorization.k8s.io | |
kind: ClusterRole | |
name: system:kube-dns | |
subjects: | |
- kind: ServiceAccount | |
name: kube-dns | |
namespace: kube-system | |
- apiVersion: rbac.authorization.k8s.io/v1 | |
kind: ClusterRoleBinding | |
metadata: | |
annotations: | |
rbac.authorization.kubernetes.io/autoupdate: "true" | |
creationTimestamp: "2019-12-03T04:43:11Z" | |
labels: | |
kubernetes.io/bootstrapping: rbac-defaults | |
name: system:kube-scheduler | |
resourceVersion: "106" | |
selfLink: /apis/rbac.authorization.k8s.io/v1/clusterrolebindings/system%3Akube-scheduler | |
uid: 68ff21fe-1587-11ea-b5af-027e0b84da98 | |
roleRef: | |
apiGroup: rbac.authorization.k8s.io | |
kind: ClusterRole | |
name: system:kube-scheduler | |
subjects: | |
- apiGroup: rbac.authorization.k8s.io | |
kind: User | |
name: system:kube-scheduler | |
- apiVersion: rbac.authorization.k8s.io/v1 | |
kind: ClusterRoleBinding | |
metadata: | |
annotations: | |
rbac.authorization.kubernetes.io/autoupdate: "true" | |
creationTimestamp: "2019-12-03T04:43:11Z" | |
labels: | |
kubernetes.io/bootstrapping: rbac-defaults | |
name: system:node | |
resourceVersion: "109" | |
selfLink: /apis/rbac.authorization.k8s.io/v1/clusterrolebindings/system%3Anode | |
uid: 69117c58-1587-11ea-b5af-027e0b84da98 | |
roleRef: | |
apiGroup: rbac.authorization.k8s.io | |
kind: ClusterRole | |
name: system:node | |
- apiVersion: rbac.authorization.k8s.io/v1 | |
kind: ClusterRoleBinding | |
metadata: | |
annotations: | |
rbac.authorization.kubernetes.io/autoupdate: "true" | |
creationTimestamp: "2019-12-03T04:43:11Z" | |
labels: | |
kubernetes.io/bootstrapping: rbac-defaults | |
name: system:node-proxier | |
resourceVersion: "101" | |
selfLink: /apis/rbac.authorization.k8s.io/v1/clusterrolebindings/system%3Anode-proxier | |
uid: 68eccec8-1587-11ea-b5af-027e0b84da98 | |
roleRef: | |
apiGroup: rbac.authorization.k8s.io | |
kind: ClusterRole | |
name: system:node-proxier | |
subjects: | |
- apiGroup: rbac.authorization.k8s.io | |
kind: User | |
name: system:kube-proxy | |
- apiVersion: rbac.authorization.k8s.io/v1 | |
kind: ClusterRoleBinding | |
metadata: | |
annotations: | |
rbac.authorization.kubernetes.io/autoupdate: "true" | |
creationTimestamp: "2019-12-03T04:43:11Z" | |
labels: | |
kubernetes.io/bootstrapping: rbac-defaults | |
name: system:public-info-viewer | |
resourceVersion: "100" | |
selfLink: /apis/rbac.authorization.k8s.io/v1/clusterrolebindings/system%3Apublic-info-viewer | |
uid: 68e6add4-1587-11ea-b5af-027e0b84da98 | |
roleRef: | |
apiGroup: rbac.authorization.k8s.io | |
kind: ClusterRole | |
name: system:public-info-viewer | |
subjects: | |
- apiGroup: rbac.authorization.k8s.io | |
kind: Group | |
name: system:authenticated | |
- apiGroup: rbac.authorization.k8s.io | |
kind: Group | |
name: system:unauthenticated | |
- apiVersion: rbac.authorization.k8s.io/v1 | |
kind: ClusterRoleBinding | |
metadata: | |
annotations: | |
rbac.authorization.kubernetes.io/autoupdate: "true" | |
creationTimestamp: "2019-12-03T04:43:11Z" | |
labels: | |
kubernetes.io/bootstrapping: rbac-defaults | |
name: system:volume-scheduler | |
resourceVersion: "108" | |
selfLink: /apis/rbac.authorization.k8s.io/v1/clusterrolebindings/system%3Avolume-scheduler | |
uid: 690b5960-1587-11ea-b5af-027e0b84da98 | |
roleRef: | |
apiGroup: rbac.authorization.k8s.io | |
kind: ClusterRole | |
name: system:volume-scheduler | |
subjects: | |
- apiGroup: rbac.authorization.k8s.io | |
kind: User | |
name: system:kube-scheduler | |
kind: List | |
metadata: | |
resourceVersion: "" | |
selfLink: "" | |
------- | |
resource: clusterroles | |
------- | |
apiVersion: v1 | |
items: | |
- aggregationRule: | |
clusterRoleSelectors: | |
- matchLabels: | |
rbac.authorization.k8s.io/aggregate-to-admin: "true" | |
apiVersion: rbac.authorization.k8s.io/v1 | |
kind: ClusterRole | |
metadata: | |
annotations: | |
rbac.authorization.kubernetes.io/autoupdate: "true" | |
creationTimestamp: "2019-12-03T04:43:10Z" | |
labels: | |
kubernetes.io/bootstrapping: rbac-defaults | |
name: admin | |
resourceVersion: "43797" | |
selfLink: /apis/rbac.authorization.k8s.io/v1/clusterroles/admin | |
uid: 68a00a71-1587-11ea-b5af-027e0b84da98 | |
rules: | |
- apiGroups: | |
- serving.knative.dev | |
- networking.internal.knative.dev | |
- autoscaling.internal.knative.dev | |
- caching.internal.knative.dev | |
resources: | |
- '*' | |
verbs: | |
- create | |
- update | |
- patch | |
- delete | |
- apiGroups: | |
- "" | |
resources: | |
- pods/attach | |
- pods/exec | |
- pods/portforward | |
- pods/proxy | |
- secrets | |
- services/proxy | |
verbs: | |
- get | |
- list | |
- watch | |
- apiGroups: | |
- "" | |
resources: | |
- serviceaccounts | |
verbs: | |
- impersonate | |
- apiGroups: | |
- "" | |
resources: | |
- pods | |
- pods/attach | |
- pods/exec | |
- pods/portforward | |
- pods/proxy | |
verbs: | |
- create | |
- delete | |
- deletecollection | |
- patch | |
- update | |
- apiGroups: | |
- "" | |
resources: | |
- configmaps | |
- endpoints | |
- persistentvolumeclaims | |
- replicationcontrollers | |
- replicationcontrollers/scale | |
- secrets | |
- serviceaccounts | |
- services | |
- services/proxy | |
verbs: | |
- create | |
- delete | |
- deletecollection | |
- patch | |
- update | |
- apiGroups: | |
- apps | |
resources: | |
- daemonsets | |
- deployments | |
- deployments/rollback | |
- deployments/scale | |
- replicasets | |
- replicasets/scale | |
- statefulsets | |
- statefulsets/scale | |
verbs: | |
- create | |
- delete | |
- deletecollection | |
- patch | |
- update | |
- apiGroups: | |
- autoscaling | |
resources: | |
- horizontalpodautoscalers | |
verbs: | |
- create | |
- delete | |
- deletecollection | |
- patch | |
- update | |
- apiGroups: | |
- batch | |
resources: | |
- cronjobs | |
- jobs | |
verbs: | |
- create | |
- delete | |
- deletecollection | |
- patch | |
- update | |
- apiGroups: | |
- extensions | |
resources: | |
- daemonsets | |
- deployments | |
- deployments/rollback | |
- deployments/scale | |
- ingresses | |
- networkpolicies | |
- replicasets | |
- replicasets/scale | |
- replicationcontrollers/scale | |
verbs: | |
- create | |
- delete | |
- deletecollection | |
- patch | |
- update | |
- apiGroups: | |
- policy | |
resources: | |
- poddisruptionbudgets | |
verbs: | |
- create | |
- delete | |
- deletecollection | |
- patch | |
- update | |
- apiGroups: | |
- networking.k8s.io | |
resources: | |
- ingresses | |
- networkpolicies | |
verbs: | |
- create | |
- delete | |
- deletecollection | |
- patch | |
- update | |
- apiGroups: | |
- serving.knative.dev | |
- networking.internal.knative.dev | |
- autoscaling.internal.knative.dev | |
- caching.internal.knative.dev | |
resources: | |
- '*' | |
verbs: | |
- get | |
- list | |
- watch | |
- apiGroups: | |
- "" | |
resources: | |
- configmaps | |
- endpoints | |
- persistentvolumeclaims | |
- pods | |
- replicationcontrollers | |
- replicationcontrollers/scale | |
- serviceaccounts | |
- services | |
verbs: | |
- get | |
- list | |
- watch | |
- apiGroups: | |
- "" | |
resources: | |
- bindings | |
- events | |
- limitranges | |
- namespaces/status | |
- pods/log | |
- pods/status | |
- replicationcontrollers/status | |
- resourcequotas | |
- resourcequotas/status | |
verbs: | |
- get | |
- list | |
- watch | |
- apiGroups: | |
- "" | |
resources: | |
- namespaces | |
verbs: | |
- get | |
- list | |
- watch | |
- apiGroups: | |
- apps | |
resources: | |
- controllerrevisions | |
- daemonsets | |
- deployments | |
- deployments/scale | |
- replicasets | |
- replicasets/scale | |
- statefulsets | |
- statefulsets/scale | |
verbs: | |
- get | |
- list | |
- watch | |
- apiGroups: | |
- autoscaling | |
resources: | |
- horizontalpodautoscalers | |
verbs: | |
- get | |
- list | |
- watch | |
- apiGroups: | |
- batch | |
resources: | |
- cronjobs | |
- jobs | |
verbs: | |
- get | |
- list | |
- watch | |
- apiGroups: | |
- extensions | |
resources: | |
- daemonsets | |
- deployments | |
- deployments/scale | |
- ingresses | |
- networkpolicies | |
- replicasets | |
- replicasets/scale | |
- replicationcontrollers/scale | |
verbs: | |
- get | |
- list | |
- watch | |
- apiGroups: | |
- policy | |
resources: | |
- poddisruptionbudgets | |
verbs: | |
- get | |
- list | |
- watch | |
- apiGroups: | |
- networking.k8s.io | |
resources: | |
- ingresses | |
- networkpolicies | |
verbs: | |
- get | |
- list | |
- watch | |
- apiGroups: | |
- serving.knative.dev | |
- networking.internal.knative.dev | |
- autoscaling.internal.knative.dev | |
- caching.internal.knative.dev | |
resources: | |
- '*' | |
verbs: | |
- '*' | |
- apiGroups: | |
- authorization.k8s.io | |
resources: | |
- localsubjectaccessreviews | |
verbs: | |
- create | |
- apiGroups: | |
- rbac.authorization.k8s.io | |
resources: | |
- rolebindings | |
- roles | |
verbs: | |
- create | |
- delete | |
- deletecollection | |
- get | |
- list | |
- patch | |
- update | |
- watch | |
- apiVersion: rbac.authorization.k8s.io/v1 | |
kind: ClusterRole | |
metadata: | |
annotations: | |
kubectl.kubernetes.io/last-applied-configuration: | | |
{"apiVersion":"rbac.authorization.k8s.io/v1","kind":"ClusterRole","metadata":{"annotations":{},"name":"aws-node"},"rules":[{"apiGroups":["crd.k8s.amazonaws.com"],"resources":["*","namespaces"],"verbs":["*"]},{"apiGroups":[""],"resources":["pods","nodes","namespaces"],"verbs":["list","watch","get"]},{"apiGroups":["extensions"],"resources":["daemonsets"],"verbs":["list","watch"]}]} | |
creationTimestamp: "2019-12-03T04:44:14Z" | |
name: aws-node | |
resourceVersion: "368" | |
selfLink: /apis/rbac.authorization.k8s.io/v1/clusterroles/aws-node | |
uid: 8e54df72-1587-11ea-b5af-027e0b84da98 | |
rules: | |
- apiGroups: | |
- crd.k8s.amazonaws.com | |
resources: | |
- '*' | |
- namespaces | |
verbs: | |
- '*' | |
- apiGroups: | |
- "" | |
resources: | |
- pods | |
- nodes | |
- namespaces | |
verbs: | |
- list | |
- watch | |
- get | |
- apiGroups: | |
- extensions | |
resources: | |
- daemonsets | |
verbs: | |
- list | |
- watch | |
- apiVersion: rbac.authorization.k8s.io/v1 | |
kind: ClusterRole | |
metadata: | |
annotations: | |
rbac.authorization.kubernetes.io/autoupdate: "true" | |
creationTimestamp: "2019-12-03T04:43:10Z" | |
labels: | |
kubernetes.io/bootstrapping: rbac-defaults | |
name: cluster-admin | |
resourceVersion: "43" | |
selfLink: /apis/rbac.authorization.k8s.io/v1/clusterroles/cluster-admin | |
uid: 689c5e71-1587-11ea-b5af-027e0b84da98 | |
rules: | |
- apiGroups: | |
- '*' | |
resources: | |
- '*' | |
verbs: | |
- '*' | |
- nonResourceURLs: | |
- '*' | |
verbs: | |
- '*' | |
- apiVersion: rbac.authorization.k8s.io/v1 | |
kind: ClusterRole | |
metadata: | |
annotations: | |
kubectl.kubernetes.io/last-applied-configuration: | | |
{"apiVersion":"rbac.authorization.k8s.io/v1","kind":"ClusterRole","metadata":{"annotations":{},"labels":{"autoscaling.knative.dev/metric-provider":"custom-metrics","serving.knative.dev/release":"devel"},"name":"custom-metrics-server-resources"},"rules":[{"apiGroups":["custom.metrics.k8s.io"],"resources":["*"],"verbs":["*"]}]} | |
creationTimestamp: "2019-12-03T10:54:04Z" | |
labels: | |
autoscaling.knative.dev/metric-provider: custom-metrics | |
serving.knative.dev/release: devel | |
name: custom-metrics-server-resources | |
resourceVersion: "43782" | |
selfLink: /apis/rbac.authorization.k8s.io/v1/clusterroles/custom-metrics-server-resources | |
uid: 38d96d9e-15bb-11ea-b5af-027e0b84da98 | |
rules: | |
- apiGroups: | |
- custom.metrics.k8s.io | |
resources: | |
- '*' | |
verbs: | |
- '*' | |
- aggregationRule: | |
clusterRoleSelectors: | |
- matchLabels: | |
rbac.authorization.k8s.io/aggregate-to-edit: "true" | |
apiVersion: rbac.authorization.k8s.io/v1 | |
kind: ClusterRole | |
metadata: | |
annotations: | |
rbac.authorization.kubernetes.io/autoupdate: "true" | |
creationTimestamp: "2019-12-03T04:43:10Z" | |
labels: | |
kubernetes.io/bootstrapping: rbac-defaults | |
rbac.authorization.k8s.io/aggregate-to-admin: "true" | |
name: edit | |
resourceVersion: "43796" | |
selfLink: /apis/rbac.authorization.k8s.io/v1/clusterroles/edit | |
uid: 68a09d91-1587-11ea-b5af-027e0b84da98 | |
rules: | |
- apiGroups: | |
- serving.knative.dev | |
- networking.internal.knative.dev | |
- autoscaling.internal.knative.dev | |
- caching.internal.knative.dev | |
resources: | |
- '*' | |
verbs: | |
- create | |
- update | |
- patch | |
- delete | |
- apiGroups: | |
- "" | |
resources: | |
- pods/attach | |
- pods/exec | |
- pods/portforward | |
- pods/proxy | |
- secrets | |
- services/proxy | |
verbs: | |
- get | |
- list | |
- watch | |
- apiGroups: | |
- "" | |
resources: | |
- serviceaccounts | |
verbs: | |
- impersonate | |
- apiGroups: | |
- "" | |
resources: | |
- pods | |
- pods/attach | |
- pods/exec | |
- pods/portforward | |
- pods/proxy | |
verbs: | |
- create | |
- delete | |
- deletecollection | |
- patch | |
- update | |
- apiGroups: | |
- "" | |
resources: | |
- configmaps | |
- endpoints | |
- persistentvolumeclaims | |
- replicationcontrollers | |
- replicationcontrollers/scale | |
- secrets | |
- serviceaccounts | |
- services | |
- services/proxy | |
verbs: | |
- create | |
- delete | |
- deletecollection | |
- patch | |
- update | |
- apiGroups: | |
- apps | |
resources: | |
- daemonsets | |
- deployments | |
- deployments/rollback | |
- deployments/scale | |
- replicasets | |
- replicasets/scale | |
- statefulsets | |
- statefulsets/scale | |
verbs: | |
- create | |
- delete | |
- deletecollection | |
- patch | |
- update | |
- apiGroups: | |
- autoscaling | |
resources: | |
- horizontalpodautoscalers | |
verbs: | |
- create | |
- delete | |
- deletecollection | |
- patch | |
- update | |
- apiGroups: | |
- batch | |
resources: | |
- cronjobs | |
- jobs | |
verbs: | |
- create | |
- delete | |
- deletecollection | |
- patch | |
- update | |
- apiGroups: | |
- extensions | |
resources: | |
- daemonsets | |
- deployments | |
- deployments/rollback | |
- deployments/scale | |
- ingresses | |
- networkpolicies | |
- replicasets | |
- replicasets/scale | |
- replicationcontrollers/scale | |
verbs: | |
- create | |
- delete | |
- deletecollection | |
- patch | |
- update | |
- apiGroups: | |
- policy | |
resources: | |
- poddisruptionbudgets | |
verbs: | |
- create | |
- delete | |
- deletecollection | |
- patch | |
- update | |
- apiGroups: | |
- networking.k8s.io | |
resources: | |
- ingresses | |
- networkpolicies | |
verbs: | |
- create | |
- delete | |
- deletecollection | |
- patch | |
- update | |
- apiGroups: | |
- serving.knative.dev | |
- networking.internal.knative.dev | |
- autoscaling.internal.knative.dev | |
- caching.internal.knative.dev | |
resources: | |
- '*' | |
verbs: | |
- get | |
- list | |
- watch | |
- apiGroups: | |
- "" | |
resources: | |
- configmaps | |
- endpoints | |
- persistentvolumeclaims | |
- pods | |
- replicationcontrollers | |
- replicationcontrollers/scale | |
- serviceaccounts | |
- services | |
verbs: | |
- get | |
- list | |
- watch | |
- apiGroups: | |
- "" | |
resources: | |
- bindings | |
- events | |
- limitranges | |
- namespaces/status | |
- pods/log | |
- pods/status | |
- replicationcontrollers/status | |
- resourcequotas | |
- resourcequotas/status | |
verbs: | |
- get | |
- list | |
- watch | |
- apiGroups: | |
- "" | |
resources: | |
- namespaces | |
verbs: | |
- get | |
- list | |
- watch | |
- apiGroups: | |
- apps | |
resources: | |
- controllerrevisions | |
- daemonsets | |
- deployments | |
- deployments/scale | |
- replicasets | |
- replicasets/scale | |
- statefulsets | |
- statefulsets/scale | |
verbs: | |
- get | |
- list | |
- watch | |
- apiGroups: | |
- autoscaling | |
resources: | |
- horizontalpodautoscalers | |
verbs: | |
- get | |
- list | |
- watch | |
- apiGroups: | |
- batch | |
resources: | |
- cronjobs | |
- jobs | |
verbs: | |
- get | |
- list | |
- watch | |
- apiGroups: | |
- extensions | |
resources: | |
- daemonsets | |
- deployments | |
- deployments/scale | |
- ingresses | |
- networkpolicies | |
- replicasets | |
- replicasets/scale | |
- replicationcontrollers/scale | |
verbs: | |
- get | |
- list | |
- watch | |
- apiGroups: | |
- policy | |
resources: | |
- poddisruptionbudgets | |
verbs: | |
- get | |
- list | |
- watch | |
- apiGroups: | |
- networking.k8s.io | |
resources: | |
- ingresses | |
- networkpolicies | |
verbs: | |
- get | |
- list | |
- watch | |
- apiVersion: rbac.authorization.k8s.io/v1 | |
kind: ClusterRole | |
metadata: | |
annotations: | |
kubectl.kubernetes.io/last-applied-configuration: | | |
{"apiVersion":"rbac.authorization.k8s.io/v1","kind":"ClusterRole","metadata":{"annotations":{},"labels":{"app":"security","chart":"security","heritage":"Tiller","release":"RELEASE-NAME"},"name":"istio-citadel-istio-system"},"rules":[{"apiGroups":[""],"resources":["configmaps"],"verbs":["create","get","update"]},{"apiGroups":[""],"resources":["secrets"],"verbs":["create","get","watch","list","update","delete"]},{"apiGroups":[""],"resources":["serviceaccounts","services","namespaces"],"verbs":["get","watch","list"]},{"apiGroups":["authentication.k8s.io"],"resources":["tokenreviews"],"verbs":["create"]}]} | |
creationTimestamp: "2019-12-03T10:53:25Z" | |
labels: | |
app: security | |
chart: security | |
heritage: Tiller | |
release: RELEASE-NAME | |
name: istio-citadel-istio-system | |
resourceVersion: "43459" | |
selfLink: /apis/rbac.authorization.k8s.io/v1/clusterroles/istio-citadel-istio-system | |
uid: 21ab7e98-15bb-11ea-b5af-027e0b84da98 | |
rules: | |
- apiGroups: | |
- "" | |
resources: | |
- configmaps | |
verbs: | |
- create | |
- get | |
- update | |
- apiGroups: | |
- "" | |
resources: | |
- secrets | |
verbs: | |
- create | |
- get | |
- watch | |
- list | |
- update | |
- delete | |
- apiGroups: | |
- "" | |
resources: | |
- serviceaccounts | |
- services | |
- namespaces | |
verbs: | |
- get | |
- watch | |
- list | |
- apiGroups: | |
- authentication.k8s.io | |
resources: | |
- tokenreviews | |
verbs: | |
- create | |
- apiVersion: rbac.authorization.k8s.io/v1 | |
kind: ClusterRole | |
metadata: | |
annotations: | |
kubectl.kubernetes.io/last-applied-configuration: | | |
{"apiVersion":"rbac.authorization.k8s.io/v1","kind":"ClusterRole","metadata":{"annotations":{},"labels":{"app":"galley","chart":"galley","heritage":"Tiller","release":"RELEASE-NAME"},"name":"istio-galley-istio-system"},"rules":[{"apiGroups":["authentication.istio.io","config.istio.io","networking.istio.io","rbac.istio.io","security.istio.io"],"resources":["*"],"verbs":["get","list","watch"]},{"apiGroups":["authentication.istio.io","config.istio.io","networking.istio.io","rbac.istio.io","security.istio.io"],"resources":["*/status"],"verbs":["update"]},{"apiGroups":["admissionregistration.k8s.io"],"resources":["validatingwebhookconfigurations"],"verbs":["*"]},{"apiGroups":["extensions","apps"],"resourceNames":["istio-galley"],"resources":["deployments"],"verbs":["get"]},{"apiGroups":[""],"resources":["pods","nodes","services","endpoints","namespaces"],"verbs":["get","list","watch"]},{"apiGroups":["extensions"],"resources":["ingresses"],"verbs":["get","list","watch"]},{"apiGroups":["extensions"],"resourceNames":["istio-galley"],"resources":["deployments/finalizers"],"verbs":["update"]},{"apiGroups":["apiextensions.k8s.io"],"resources":["customresourcedefinitions"],"verbs":["get","list","watch"]}]} | |
creationTimestamp: "2019-12-03T10:53:25Z" | |
labels: | |
app: galley | |
chart: galley | |
heritage: Tiller | |
release: RELEASE-NAME | |
name: istio-galley-istio-system | |
resourceVersion: "43455" | |
selfLink: /apis/rbac.authorization.k8s.io/v1/clusterroles/istio-galley-istio-system | |
uid: 21557db2-15bb-11ea-b5af-027e0b84da98 | |
rules: | |
- apiGroups: | |
- authentication.istio.io | |
- config.istio.io | |
- networking.istio.io | |
- rbac.istio.io | |
- security.istio.io | |
resources: | |
- '*' | |
verbs: | |
- get | |
- list | |
- watch | |
- apiGroups: | |
- authentication.istio.io | |
- config.istio.io | |
- networking.istio.io | |
- rbac.istio.io | |
- security.istio.io | |
resources: | |
- '*/status' | |
verbs: | |
- update | |
- apiGroups: | |
- admissionregistration.k8s.io | |
resources: | |
- validatingwebhookconfigurations | |
verbs: | |
- '*' | |
- apiGroups: | |
- extensions | |
- apps | |
resourceNames: | |
- istio-galley | |
resources: | |
- deployments | |
verbs: | |
- get | |
- apiGroups: | |
- "" | |
resources: | |
- pods | |
- nodes | |
- services | |
- endpoints | |
- namespaces | |
verbs: | |
- get | |
- list | |
- watch | |
- apiGroups: | |
- extensions | |
resources: | |
- ingresses | |
verbs: | |
- get | |
- list | |
- watch | |
- apiGroups: | |
- extensions | |
resourceNames: | |
- istio-galley | |
resources: | |
- deployments/finalizers | |
verbs: | |
- update | |
- apiGroups: | |
- apiextensions.k8s.io | |
resources: | |
- customresourcedefinitions | |
verbs: | |
- get | |
- list | |
- watch | |
- apiVersion: rbac.authorization.k8s.io/v1 | |
kind: ClusterRole | |
metadata: | |
annotations: | |
kubectl.kubernetes.io/last-applied-configuration: | | |
{"apiVersion":"rbac.authorization.k8s.io/v1","kind":"ClusterRole","metadata":{"annotations":{},"labels":{"app":"istio-init","istio":"init"},"name":"istio-init-istio-system"},"rules":[{"apiGroups":["apiextensions.k8s.io"],"resources":["customresourcedefinitions"],"verbs":["create","get","list","watch","patch"]}]} | |
creationTimestamp: "2019-12-03T10:51:42Z" | |
labels: | |
app: istio-init | |
istio: init | |
name: istio-init-istio-system | |
resourceVersion: "43162" | |
selfLink: /apis/rbac.authorization.k8s.io/v1/clusterroles/istio-init-istio-system | |
uid: e44a67cd-15ba-11ea-b5af-027e0b84da98 | |
rules: | |
- apiGroups: | |
- apiextensions.k8s.io | |
resources: | |
- customresourcedefinitions | |
verbs: | |
- create | |
- get | |
- list | |
- watch | |
- patch | |
- apiVersion: rbac.authorization.k8s.io/v1 | |
kind: ClusterRole | |
metadata: | |
annotations: | |
kubectl.kubernetes.io/last-applied-configuration: | | |
{"apiVersion":"rbac.authorization.k8s.io/v1","kind":"ClusterRole","metadata":{"annotations":{},"labels":{"app":"mixer","chart":"mixer","heritage":"Tiller","release":"RELEASE-NAME"},"name":"istio-mixer-istio-system"},"rules":[{"apiGroups":["config.istio.io"],"resources":["*"],"verbs":["create","get","list","watch","patch"]},{"apiGroups":["apiextensions.k8s.io"],"resources":["customresourcedefinitions"],"verbs":["get","list","watch"]},{"apiGroups":[""],"resources":["configmaps","endpoints","pods","services","namespaces","secrets","replicationcontrollers"],"verbs":["get","list","watch"]},{"apiGroups":["extensions","apps"],"resources":["replicasets"],"verbs":["get","list","watch"]}]} | |
creationTimestamp: "2019-12-03T10:53:25Z" | |
labels: | |
app: mixer | |
chart: mixer | |
heritage: Tiller | |
release: RELEASE-NAME | |
name: istio-mixer-istio-system | |
resourceVersion: "43456" | |
selfLink: /apis/rbac.authorization.k8s.io/v1/clusterroles/istio-mixer-istio-system | |
uid: 2172fd9f-15bb-11ea-b5af-027e0b84da98 | |
rules: | |
- apiGroups: | |
- config.istio.io | |
resources: | |
- '*' | |
verbs: | |
- create | |
- get | |
- list | |
- watch | |
- patch | |
- apiGroups: | |
- apiextensions.k8s.io | |
resources: | |
- customresourcedefinitions | |
verbs: | |
- get | |
- list | |
- watch | |
- apiGroups: | |
- "" | |
resources: | |
- configmaps | |
- endpoints | |
- pods | |
- services | |
- namespaces | |
- secrets | |
- replicationcontrollers | |
verbs: | |
- get | |
- list | |
- watch | |
- apiGroups: | |
- extensions | |
- apps | |
resources: | |
- replicasets | |
verbs: | |
- get | |
- list | |
- watch | |
- apiVersion: rbac.authorization.k8s.io/v1 | |
kind: ClusterRole | |
metadata: | |
annotations: | |
kubectl.kubernetes.io/last-applied-configuration: | | |
{"apiVersion":"rbac.authorization.k8s.io/v1","kind":"ClusterRole","metadata":{"annotations":{},"labels":{"app":"pilot","chart":"pilot","heritage":"Tiller","release":"RELEASE-NAME"},"name":"istio-pilot-istio-system"},"rules":[{"apiGroups":["config.istio.io"],"resources":["*"],"verbs":["*"]},{"apiGroups":["rbac.istio.io"],"resources":["*"],"verbs":["get","watch","list"]},{"apiGroups":["security.istio.io"],"resources":["*"],"verbs":["get","watch","list"]},{"apiGroups":["networking.istio.io"],"resources":["*"],"verbs":["*"]},{"apiGroups":["authentication.istio.io"],"resources":["*"],"verbs":["*"]},{"apiGroups":["apiextensions.k8s.io"],"resources":["customresourcedefinitions"],"verbs":["*"]},{"apiGroups":["extensions"],"resources":["ingresses","ingresses/status"],"verbs":["*"]},{"apiGroups":[""],"resources":["configmaps"],"verbs":["create","get","list","watch","update"]},{"apiGroups":[""],"resources":["endpoints","pods","services","namespaces","nodes","secrets"],"verbs":["get","list","watch"]},{"apiGroups":[""],"resources":["secrets"],"verbs":["create","get","watch","list","update","delete"]},{"apiGroups":["certificates.k8s.io"],"resources":["certificatesigningrequests","certificatesigningrequests/approval","certificatesigningrequests/status"],"verbs":["update","create","get","delete"]}]} | |
creationTimestamp: "2019-12-03T10:53:25Z" | |
labels: | |
app: pilot | |
chart: pilot | |
heritage: Tiller | |
release: RELEASE-NAME | |
name: istio-pilot-istio-system | |
resourceVersion: "43458" | |
selfLink: /apis/rbac.authorization.k8s.io/v1/clusterroles/istio-pilot-istio-system | |
uid: 218fa4ca-15bb-11ea-b5af-027e0b84da98 | |
rules: | |
- apiGroups: | |
- config.istio.io | |
resources: | |
- '*' | |
verbs: | |
- '*' | |
- apiGroups: | |
- rbac.istio.io | |
resources: | |
- '*' | |
verbs: | |
- get | |
- watch | |
- list | |
- apiGroups: | |
- security.istio.io | |
resources: | |
- '*' | |
verbs: | |
- get | |
- watch | |
- list | |
- apiGroups: | |
- networking.istio.io | |
resources: | |
- '*' | |
verbs: | |
- '*' | |
- apiGroups: | |
- authentication.istio.io | |
resources: | |
- '*' | |
verbs: | |
- '*' | |
- apiGroups: | |
- apiextensions.k8s.io | |
resources: | |
- customresourcedefinitions | |
verbs: | |
- '*' | |
- apiGroups: | |
- extensions | |
resources: | |
- ingresses | |
- ingresses/status | |
verbs: | |
- '*' | |
- apiGroups: | |
- "" | |
resources: | |
- configmaps | |
verbs: | |
- create | |
- get | |
- list | |
- watch | |
- update | |
- apiGroups: | |
- "" | |
resources: | |
- endpoints | |
- pods | |
- services | |
- namespaces | |
- nodes | |
- secrets | |
verbs: | |
- get | |
- list | |
- watch | |
- apiGroups: | |
- "" | |
resources: | |
- secrets | |
verbs: | |
- create | |
- get | |
- watch | |
- list | |
- update | |
- delete | |
- apiGroups: | |
- certificates.k8s.io | |
resources: | |
- certificatesigningrequests | |
- certificatesigningrequests/approval | |
- certificatesigningrequests/status | |
verbs: | |
- update | |
- create | |
- get | |
- delete | |
- apiVersion: rbac.authorization.k8s.io/v1 | |
kind: ClusterRole | |
metadata: | |
annotations: | |
kubectl.kubernetes.io/last-applied-configuration: | | |
{"apiVersion":"rbac.authorization.k8s.io/v1","kind":"ClusterRole","metadata":{"annotations":{},"name":"istio-reader"},"rules":[{"apiGroups":[""],"resources":["nodes","pods","services","endpoints","replicationcontrollers"],"verbs":["get","watch","list"]},{"apiGroups":["extensions","apps"],"resources":["replicasets"],"verbs":["get","list","watch"]}]} | |
creationTimestamp: "2019-12-03T10:53:25Z" | |
name: istio-reader | |
resourceVersion: "43463" | |
selfLink: /apis/rbac.authorization.k8s.io/v1/clusterroles/istio-reader | |
uid: 21e2214d-15bb-11ea-b5af-027e0b84da98 | |
rules: | |
- apiGroups: | |
- "" | |
resources: | |
- nodes | |
- pods | |
- services | |
- endpoints | |
- replicationcontrollers | |
verbs: | |
- get | |
- watch | |
- list | |
- apiGroups: | |
- extensions | |
- apps | |
resources: | |
- replicasets | |
verbs: | |
- get | |
- list | |
- watch | |
- apiVersion: rbac.authorization.k8s.io/v1 | |
kind: ClusterRole | |
metadata: | |
annotations: | |
kubectl.kubernetes.io/last-applied-configuration: | | |
{"apiVersion":"rbac.authorization.k8s.io/v1","kind":"ClusterRole","metadata":{"annotations":{},"labels":{"app":"security","chart":"security","heritage":"Tiller","release":"RELEASE-NAME"},"name":"istio-security-post-install-istio-system"},"rules":[{"apiGroups":["authentication.istio.io"],"resources":["*"],"verbs":["*"]},{"apiGroups":["networking.istio.io"],"resources":["*"],"verbs":["*"]},{"apiGroups":["admissionregistration.k8s.io"],"resources":["validatingwebhookconfigurations"],"verbs":["get"]},{"apiGroups":["extensions","apps"],"resources":["deployments","replicasets"],"verbs":["get","list","watch"]}]} | |
creationTimestamp: "2019-12-03T10:53:23Z" | |
labels: | |
app: security | |
chart: security | |
heritage: Tiller | |
release: RELEASE-NAME | |
name: istio-security-post-install-istio-system | |
resourceVersion: "43433" | |
selfLink: /apis/rbac.authorization.k8s.io/v1/clusterroles/istio-security-post-install-istio-system | |
uid: 20776862-15bb-11ea-b5af-027e0b84da98 | |
rules: | |
- apiGroups: | |
- authentication.istio.io | |
resources: | |
- '*' | |
verbs: | |
- '*' | |
- apiGroups: | |
- networking.istio.io | |
resources: | |
- '*' | |
verbs: | |
- '*' | |
- apiGroups: | |
- admissionregistration.k8s.io | |
resources: | |
- validatingwebhookconfigurations | |
verbs: | |
- get | |
- apiGroups: | |
- extensions | |
- apps | |
resources: | |
- deployments | |
- replicasets | |
verbs: | |
- get | |
- list | |
- watch | |
- apiVersion: rbac.authorization.k8s.io/v1 | |
kind: ClusterRole | |
metadata: | |
annotations: | |
kubectl.kubernetes.io/last-applied-configuration: | | |
{"apiVersion":"rbac.authorization.k8s.io/v1","kind":"ClusterRole","metadata":{"annotations":{},"labels":{"app":"sidecarInjectorWebhook","chart":"sidecarInjectorWebhook","heritage":"Tiller","istio":"sidecar-injector","release":"RELEASE-NAME"},"name":"istio-sidecar-injector-istio-system"},"rules":[{"apiGroups":[""],"resources":["configmaps"],"verbs":["get","list","watch"]},{"apiGroups":["admissionregistration.k8s.io"],"resources":["mutatingwebhookconfigurations"],"verbs":["get","list","watch","patch"]}]} | |
creationTimestamp: "2019-12-03T10:53:25Z" | |
labels: | |
app: sidecarInjectorWebhook | |
chart: sidecarInjectorWebhook | |
heritage: Tiller | |
istio: sidecar-injector | |
release: RELEASE-NAME | |
name: istio-sidecar-injector-istio-system | |
resourceVersion: "43461" | |
selfLink: /apis/rbac.authorization.k8s.io/v1/clusterroles/istio-sidecar-injector-istio-system | |
uid: 21c6bfa5-15bb-11ea-b5af-027e0b84da98 | |
rules: | |
- apiGroups: | |
- "" | |
resources: | |
- configmaps | |
verbs: | |
- get | |
- list | |
- watch | |
- apiGroups: | |
- admissionregistration.k8s.io | |
resources: | |
- mutatingwebhookconfigurations | |
verbs: | |
- get | |
- list | |
- watch | |
- patch | |
- apiVersion: rbac.authorization.k8s.io/v1 | |
kind: ClusterRole | |
metadata: | |
annotations: | |
kubectl.kubernetes.io/last-applied-configuration: | | |
{"apiVersion":"rbac.authorization.k8s.io/v1","kind":"ClusterRole","metadata":{"annotations":{},"labels":{"duck.knative.dev/addressable":"true","serving.knative.dev/release":"devel"},"name":"knative-serving-addressable-resolver"},"rules":[{"apiGroups":["serving.knative.dev"],"resources":["routes","routes/status","services","services/status"],"verbs":["get","list","watch"]}]} | |
creationTimestamp: "2019-12-03T10:54:03Z" | |
labels: | |
duck.knative.dev/addressable: "true" | |
serving.knative.dev/release: devel | |
name: knative-serving-addressable-resolver | |
resourceVersion: "43776" | |
selfLink: /apis/rbac.authorization.k8s.io/v1/clusterroles/knative-serving-addressable-resolver | |
uid: 388a11b0-15bb-11ea-b5af-027e0b84da98 | |
rules: | |
- apiGroups: | |
- serving.knative.dev | |
resources: | |
- routes | |
- routes/status | |
- services | |
- services/status | |
verbs: | |
- get | |
- list | |
- watch | |
- aggregationRule: | |
clusterRoleSelectors: | |
- matchLabels: | |
serving.knative.dev/controller: "true" | |
apiVersion: rbac.authorization.k8s.io/v1 | |
kind: ClusterRole | |
metadata: | |
annotations: | |
kubectl.kubernetes.io/last-applied-configuration: | | |
{"aggregationRule":{"clusterRoleSelectors":[{"matchLabels":{"serving.knative.dev/controller":"true"}}]},"apiVersion":"rbac.authorization.k8s.io/v1","kind":"ClusterRole","metadata":{"annotations":{},"labels":{"serving.knative.dev/release":"devel"},"name":"knative-serving-admin"},"rules":[]} | |
creationTimestamp: "2019-12-03T10:54:05Z" | |
labels: | |
serving.knative.dev/release: devel | |
name: knative-serving-admin | |
resourceVersion: "43801" | |
selfLink: /apis/rbac.authorization.k8s.io/v1/clusterroles/knative-serving-admin | |
uid: 395c0bd5-15bb-11ea-b5af-027e0b84da98 | |
rules: | |
- apiGroups: | |
- certmanager.k8s.io | |
resources: | |
- certificates | |
verbs: | |
- get | |
- list | |
- create | |
- update | |
- delete | |
- patch | |
- watch | |
- apiGroups: | |
- "" | |
resources: | |
- pods | |
- namespaces | |
- secrets | |
- configmaps | |
- endpoints | |
- services | |
- events | |
- serviceaccounts | |
verbs: | |
- get | |
- list | |
- create | |
- update | |
- delete | |
- patch | |
- watch | |
- apiGroups: | |
- "" | |
resources: | |
- endpoints/restricted | |
verbs: | |
- create | |
- apiGroups: | |
- apps | |
resources: | |
- deployments | |
- deployments/finalizers | |
verbs: | |
- get | |
- list | |
- create | |
- update | |
- delete | |
- patch | |
- watch | |
- apiGroups: | |
- admissionregistration.k8s.io | |
resources: | |
- mutatingwebhookconfigurations | |
- validatingwebhookconfigurations | |
verbs: | |
- get | |
- list | |
- create | |
- update | |
- delete | |
- patch | |
- watch | |
- apiGroups: | |
- apiextensions.k8s.io | |
resources: | |
- customresourcedefinitions | |
verbs: | |
- get | |
- list | |
- create | |
- update | |
- delete | |
- patch | |
- watch | |
- apiGroups: | |
- autoscaling | |
resources: | |
- horizontalpodautoscalers | |
verbs: | |
- get | |
- list | |
- create | |
- update | |
- delete | |
- patch | |
- watch | |
- apiGroups: | |
- serving.knative.dev | |
- autoscaling.internal.knative.dev | |
- networking.internal.knative.dev | |
resources: | |
- '*' | |
- '*/status' | |
- '*/finalizers' | |
verbs: | |
- get | |
- list | |
- create | |
- update | |
- delete | |
- deletecollection | |
- patch | |
- watch | |
- apiGroups: | |
- caching.internal.knative.dev | |
resources: | |
- images | |
verbs: | |
- get | |
- list | |
- create | |
- update | |
- delete | |
- patch | |
- watch | |
- apiGroups: | |
- networking.istio.io | |
resources: | |
- virtualservices | |
- gateways | |
verbs: | |
- get | |
- list | |
- create | |
- update | |
- delete | |
- patch | |
- watch | |
- apiVersion: rbac.authorization.k8s.io/v1 | |
kind: ClusterRole | |
metadata: | |
annotations: | |
kubectl.kubernetes.io/last-applied-configuration: | | |
{"apiVersion":"rbac.authorization.k8s.io/v1","kind":"ClusterRole","metadata":{"annotations":{},"labels":{"networking.knative.dev/certificate-provider":"cert-manager","serving.knative.dev/controller":"true","serving.knative.dev/release":"devel"},"name":"knative-serving-certmanager"},"rules":[{"apiGroups":["certmanager.k8s.io"],"resources":["certificates"],"verbs":["get","list","create","update","delete","patch","watch"]}]} | |
creationTimestamp: "2019-12-03T10:54:04Z" | |
labels: | |
networking.knative.dev/certificate-provider: cert-manager | |
serving.knative.dev/controller: "true" | |
serving.knative.dev/release: devel | |
name: knative-serving-certmanager | |
resourceVersion: "43778" | |
selfLink: /apis/rbac.authorization.k8s.io/v1/clusterroles/knative-serving-certmanager | |
uid: 38a5d7bd-15bb-11ea-b5af-027e0b84da98 | |
rules: | |
- apiGroups: | |
- certmanager.k8s.io | |
resources: | |
- certificates | |
verbs: | |
- get | |
- list | |
- create | |
- update | |
- delete | |
- patch | |
- watch | |
- apiVersion: rbac.authorization.k8s.io/v1 | |
kind: ClusterRole | |
metadata: | |
annotations: | |
kubectl.kubernetes.io/last-applied-configuration: | | |
{"apiVersion":"rbac.authorization.k8s.io/v1","kind":"ClusterRole","metadata":{"annotations":{},"labels":{"serving.knative.dev/controller":"true","serving.knative.dev/release":"devel"},"name":"knative-serving-core"},"rules":[{"apiGroups":[""],"resources":["pods","namespaces","secrets","configmaps","endpoints","services","events","serviceaccounts"],"verbs":["get","list","create","update","delete","patch","watch"]},{"apiGroups":[""],"resources":["endpoints/restricted"],"verbs":["create"]},{"apiGroups":["apps"],"resources":["deployments","deployments/finalizers"],"verbs":["get","list","create","update","delete","patch","watch"]},{"apiGroups":["admissionregistration.k8s.io"],"resources":["mutatingwebhookconfigurations","validatingwebhookconfigurations"],"verbs":["get","list","create","update","delete","patch","watch"]},{"apiGroups":["apiextensions.k8s.io"],"resources":["customresourcedefinitions"],"verbs":["get","list","create","update","delete","patch","watch"]},{"apiGroups":["autoscaling"],"resources":["horizontalpodautoscalers"],"verbs":["get","list","create","update","delete","patch","watch"]},{"apiGroups":["serving.knative.dev","autoscaling.internal.knative.dev","networking.internal.knative.dev"],"resources":["*","*/status","*/finalizers"],"verbs":["get","list","create","update","delete","deletecollection","patch","watch"]},{"apiGroups":["caching.internal.knative.dev"],"resources":["images"],"verbs":["get","list","create","update","delete","patch","watch"]}]} | |
creationTimestamp: "2019-12-03T10:54:05Z" | |
labels: | |
serving.knative.dev/controller: "true" | |
serving.knative.dev/release: devel | |
name: knative-serving-core | |
resourceVersion: "43800" | |
selfLink: /apis/rbac.authorization.k8s.io/v1/clusterroles/knative-serving-core | |
uid: 39759f4f-15bb-11ea-b5af-027e0b84da98 | |
rules: | |
- apiGroups: | |
- "" | |
resources: | |
- pods | |
- namespaces | |
- secrets | |
- configmaps | |
- endpoints | |
- services | |
- events | |
- serviceaccounts | |
verbs: | |
- get | |
- list | |
- create | |
- update | |
- delete | |
- patch | |
- watch | |
- apiGroups: | |
- "" | |
resources: | |
- endpoints/restricted | |
verbs: | |
- create | |
- apiGroups: | |
- apps | |
resources: | |
- deployments | |
- deployments/finalizers | |
verbs: | |
- get | |
- list | |
- create | |
- update | |
- delete | |
- patch | |
- watch | |
- apiGroups: | |
- admissionregistration.k8s.io | |
resources: | |
- mutatingwebhookconfigurations | |
- validatingwebhookconfigurations | |
verbs: | |
- get | |
- list | |
- create | |
- update | |
- delete | |
- patch | |
- watch | |
- apiGroups: | |
- apiextensions.k8s.io | |
resources: | |
- customresourcedefinitions | |
verbs: | |
- get | |
- list | |
- create | |
- update | |
- delete | |
- patch | |
- watch | |
- apiGroups: | |
- autoscaling | |
resources: | |
- horizontalpodautoscalers | |
verbs: | |
- get | |
- list | |
- create | |
- update | |
- delete | |
- patch | |
- watch | |
- apiGroups: | |
- serving.knative.dev | |
- autoscaling.internal.knative.dev | |
- networking.internal.knative.dev | |
resources: | |
- '*' | |
- '*/status' | |
- '*/finalizers' | |
verbs: | |
- get | |
- list | |
- create | |
- update | |
- delete | |
- deletecollection | |
- patch | |
- watch | |
- apiGroups: | |
- caching.internal.knative.dev | |
resources: | |
- images | |
verbs: | |
- get | |
- list | |
- create | |
- update | |
- delete | |
- patch | |
- watch | |
- apiVersion: rbac.authorization.k8s.io/v1 | |
kind: ClusterRole | |
metadata: | |
annotations: | |
kubectl.kubernetes.io/last-applied-configuration: | | |
{"apiVersion":"rbac.authorization.k8s.io/v1","kind":"ClusterRole","metadata":{"annotations":{},"labels":{"networking.knative.dev/ingress-provider":"istio","serving.knative.dev/controller":"true","serving.knative.dev/release":"devel"},"name":"knative-serving-istio"},"rules":[{"apiGroups":["networking.istio.io"],"resources":["virtualservices","gateways"],"verbs":["get","list","create","update","delete","patch","watch"]}]} | |
creationTimestamp: "2019-12-03T10:54:04Z" | |
labels: | |
networking.knative.dev/ingress-provider: istio | |
serving.knative.dev/controller: "true" | |
serving.knative.dev/release: devel | |
name: knative-serving-istio | |
resourceVersion: "43780" | |
selfLink: /apis/rbac.authorization.k8s.io/v1/clusterroles/knative-serving-istio | |
uid: 38bfd7fa-15bb-11ea-b5af-027e0b84da98 | |
rules: | |
- apiGroups: | |
- networking.istio.io | |
resources: | |
- virtualservices | |
- gateways | |
verbs: | |
- get | |
- list | |
- create | |
- update | |
- delete | |
- patch | |
- watch | |
- apiVersion: rbac.authorization.k8s.io/v1 | |
kind: ClusterRole | |
metadata: | |
annotations: | |
kubectl.kubernetes.io/last-applied-configuration: | | |
{"apiVersion":"rbac.authorization.k8s.io/v1","kind":"ClusterRole","metadata":{"annotations":{},"labels":{"rbac.authorization.k8s.io/aggregate-to-admin":"true","serving.knative.dev/release":"devel"},"name":"knative-serving-namespaced-admin"},"rules":[{"apiGroups":["serving.knative.dev","networking.internal.knative.dev","autoscaling.internal.knative.dev","caching.internal.knative.dev"],"resources":["*"],"verbs":["*"]}]} | |
creationTimestamp: "2019-12-03T10:54:04Z" | |
labels: | |
rbac.authorization.k8s.io/aggregate-to-admin: "true" | |
serving.knative.dev/release: devel | |
name: knative-serving-namespaced-admin | |
resourceVersion: "43783" | |
selfLink: /apis/rbac.authorization.k8s.io/v1/clusterroles/knative-serving-namespaced-admin | |
uid: 38f3e734-15bb-11ea-b5af-027e0b84da98 | |
rules: | |
- apiGroups: | |
- serving.knative.dev | |
- networking.internal.knative.dev | |
- autoscaling.internal.knative.dev | |
- caching.internal.knative.dev | |
resources: | |
- '*' | |
verbs: | |
- '*' | |
- apiVersion: rbac.authorization.k8s.io/v1 | |
kind: ClusterRole | |
metadata: | |
annotations: | |
kubectl.kubernetes.io/last-applied-configuration: | | |
{"apiVersion":"rbac.authorization.k8s.io/v1","kind":"ClusterRole","metadata":{"annotations":{},"labels":{"rbac.authorization.k8s.io/aggregate-to-edit":"true","serving.knative.dev/release":"devel"},"name":"knative-serving-namespaced-edit"},"rules":[{"apiGroups":["serving.knative.dev","networking.internal.knative.dev","autoscaling.internal.knative.dev","caching.internal.knative.dev"],"resources":["*"],"verbs":["create","update","patch","delete"]}]} | |
creationTimestamp: "2019-12-03T10:54:04Z" | |
labels: | |
rbac.authorization.k8s.io/aggregate-to-edit: "true" | |
serving.knative.dev/release: devel | |
name: knative-serving-namespaced-edit | |
resourceVersion: "43791" | |
selfLink: /apis/rbac.authorization.k8s.io/v1/clusterroles/knative-serving-namespaced-edit | |
uid: 3910247b-15bb-11ea-b5af-027e0b84da98 | |
rules: | |
- apiGroups: | |
- serving.knative.dev | |
- networking.internal.knative.dev | |
- autoscaling.internal.knative.dev | |
- caching.internal.knative.dev | |
resources: | |
- '*' | |
verbs: | |
- create | |
- update | |
- patch | |
- delete | |
- apiVersion: rbac.authorization.k8s.io/v1 | |
kind: ClusterRole | |
metadata: | |
annotations: | |
kubectl.kubernetes.io/last-applied-configuration: | | |
{"apiVersion":"rbac.authorization.k8s.io/v1","kind":"ClusterRole","metadata":{"annotations":{},"labels":{"rbac.authorization.k8s.io/aggregate-to-view":"true","serving.knative.dev/release":"devel"},"name":"knative-serving-namespaced-view"},"rules":[{"apiGroups":["serving.knative.dev","networking.internal.knative.dev","autoscaling.internal.knative.dev","caching.internal.knative.dev"],"resources":["*"],"verbs":["get","list","watch"]}]} | |
creationTimestamp: "2019-12-03T10:54:05Z" | |
labels: | |
rbac.authorization.k8s.io/aggregate-to-view: "true" | |
serving.knative.dev/release: devel | |
name: knative-serving-namespaced-view | |
resourceVersion: "43794" | |
selfLink: /apis/rbac.authorization.k8s.io/v1/clusterroles/knative-serving-namespaced-view | |
uid: 39421909-15bb-11ea-b5af-027e0b84da98 | |
rules: | |
- apiGroups: | |
- serving.knative.dev | |
- networking.internal.knative.dev | |
- autoscaling.internal.knative.dev | |
- caching.internal.knative.dev | |
resources: | |
- '*' | |
verbs: | |
- get | |
- list | |
- watch | |
- apiVersion: rbac.authorization.k8s.io/v1 | |
kind: ClusterRole | |
metadata: | |
annotations: | |
kubectl.kubernetes.io/last-applied-configuration: | | |
{"apiVersion":"rbac.authorization.k8s.io/v1","kind":"ClusterRole","metadata":{"annotations":{},"labels":{"duck.knative.dev/podspecable":"true","serving.knative.dev/release":"devel"},"name":"knative-serving-podspecable-binding"},"rules":[{"apiGroups":["serving.knative.dev"],"resources":["configurations","services"],"verbs":["list","watch","patch"]}]} | |
creationTimestamp: "2019-12-03T10:54:05Z" | |
labels: | |
duck.knative.dev/podspecable: "true" | |
serving.knative.dev/release: devel | |
name: knative-serving-podspecable-binding | |
resourceVersion: "43802" | |
selfLink: /apis/rbac.authorization.k8s.io/v1/clusterroles/knative-serving-podspecable-binding | |
uid: 39913cf8-15bb-11ea-b5af-027e0b84da98 | |
rules: | |
- apiGroups: | |
- serving.knative.dev | |
resources: | |
- configurations | |
- services | |
verbs: | |
- list | |
- watch | |
- patch | |
- apiVersion: rbac.authorization.k8s.io/v1 | |
kind: ClusterRole | |
metadata: | |
annotations: | |
kubectl.kubernetes.io/last-applied-configuration: | | |
{"apiVersion":"rbac.authorization.k8s.io/v1","kind":"ClusterRole","metadata":{"annotations":{},"labels":{"k8s-addon":"dns-controller.addons.k8s.io"},"name":"kops:dns-controller"},"rules":[{"apiGroups":[""],"resources":["endpoints","services","pods","ingress","nodes"],"verbs":["get","list","watch"]},{"apiGroups":["extensions"],"resources":["ingresses"],"verbs":["get","list","watch"]}]} | |
creationTimestamp: "2019-12-03T04:44:12Z" | |
labels: | |
k8s-addon: dns-controller.addons.k8s.io | |
name: kops:dns-controller | |
resourceVersion: "353" | |
selfLink: /apis/rbac.authorization.k8s.io/v1/clusterroles/kops%3Adns-controller | |
uid: 8d9fa85e-1587-11ea-b5af-027e0b84da98 | |
rules: | |
- apiGroups: | |
- "" | |
resources: | |
- endpoints | |
- services | |
- pods | |
- ingress | |
- nodes | |
verbs: | |
- get | |
- list | |
- watch | |
- apiGroups: | |
- extensions | |
resources: | |
- ingresses | |
verbs: | |
- get | |
- list | |
- watch | |
- apiVersion: rbac.authorization.k8s.io/v1 | |
kind: ClusterRole | |
metadata: | |
annotations: | |
kubectl.kubernetes.io/last-applied-configuration: | | |
{"apiVersion":"rbac.authorization.k8s.io/v1","kind":"ClusterRole","metadata":{"annotations":{},"labels":{"k8s-addon":"kube-dns.addons.k8s.io"},"name":"kube-dns-autoscaler"},"rules":[{"apiGroups":[""],"resources":["nodes"],"verbs":["list","watch"]},{"apiGroups":[""],"resources":["replicationcontrollers/scale"],"verbs":["get","update"]},{"apiGroups":["extensions","apps"],"resources":["deployments/scale","replicasets/scale"],"verbs":["get","update"]},{"apiGroups":[""],"resources":["configmaps"],"verbs":["get","create"]}]} | |
creationTimestamp: "2019-12-03T04:43:11Z" | |
labels: | |
k8s-addon: kube-dns.addons.k8s.io | |
name: kube-dns-autoscaler | |
resourceVersion: "117" | |
selfLink: /apis/rbac.authorization.k8s.io/v1/clusterroles/kube-dns-autoscaler | |
uid: 6920a9e6-1587-11ea-b5af-027e0b84da98 | |
rules: | |
- apiGroups: | |
- "" | |
resources: | |
- nodes | |
verbs: | |
- list | |
- watch | |
- apiGroups: | |
- "" | |
resources: | |
- replicationcontrollers/scale | |
verbs: | |
- get | |
- update | |
- apiGroups: | |
- extensions | |
- apps | |
resources: | |
- deployments/scale | |
- replicasets/scale | |
verbs: | |
- get | |
- update | |
- apiGroups: | |
- "" | |
resources: | |
- configmaps | |
verbs: | |
- get | |
- create | |
- apiVersion: rbac.authorization.k8s.io/v1 | |
kind: ClusterRole | |
metadata: | |
annotations: | |
rbac.authorization.kubernetes.io/autoupdate: "true" | |
creationTimestamp: "2019-12-03T04:43:10Z" | |
labels: | |
kubernetes.io/bootstrapping: rbac-defaults | |
rbac.authorization.k8s.io/aggregate-to-admin: "true" | |
name: system:aggregate-to-admin | |
resourceVersion: "50" | |
selfLink: /apis/rbac.authorization.k8s.io/v1/clusterroles/system%3Aaggregate-to-admin | |
uid: 68a1da71-1587-11ea-b5af-027e0b84da98 | |
rules: | |
- apiGroups: | |
- authorization.k8s.io | |
resources: | |
- localsubjectaccessreviews | |
verbs: | |
- create | |
- apiGroups: | |
- rbac.authorization.k8s.io | |
resources: | |
- rolebindings | |
- roles | |
verbs: | |
- create | |
- delete | |
- deletecollection | |
- get | |
- list | |
- patch | |
- update | |
- watch | |
- apiVersion: rbac.authorization.k8s.io/v1 | |
kind: ClusterRole | |
metadata: | |
annotations: | |
rbac.authorization.kubernetes.io/autoupdate: "true" | |
creationTimestamp: "2019-12-03T04:43:10Z" | |
labels: | |
kubernetes.io/bootstrapping: rbac-defaults | |
rbac.authorization.k8s.io/aggregate-to-edit: "true" | |
name: system:aggregate-to-edit | |
resourceVersion: "51" | |
selfLink: /apis/rbac.authorization.k8s.io/v1/clusterroles/system%3Aaggregate-to-edit | |
uid: 68a29aa8-1587-11ea-b5af-027e0b84da98 | |
rules: | |
- apiGroups: | |
- "" | |
resources: | |
- pods/attach | |
- pods/exec | |
- pods/portforward | |
- pods/proxy | |
- secrets | |
- services/proxy | |
verbs: | |
- get | |
- list | |
- watch | |
- apiGroups: | |
- "" | |
resources: | |
- serviceaccounts | |
verbs: | |
- impersonate | |
- apiGroups: | |
- "" | |
resources: | |
- pods | |
- pods/attach | |
- pods/exec | |
- pods/portforward | |
- pods/proxy | |
verbs: | |
- create | |
- delete | |
- deletecollection | |
- patch | |
- update | |
- apiGroups: | |
- "" | |
resources: | |
- configmaps | |
- endpoints | |
- persistentvolumeclaims | |
- replicationcontrollers | |
- replicationcontrollers/scale | |
- secrets | |
- serviceaccounts | |
- services | |
- services/proxy | |
verbs: | |
- create | |
- delete | |
- deletecollection | |
- patch | |
- update | |
- apiGroups: | |
- apps | |
resources: | |
- daemonsets | |
- deployments | |
- deployments/rollback | |
- deployments/scale | |
- replicasets | |
- replicasets/scale | |
- statefulsets | |
- statefulsets/scale | |
verbs: | |
- create | |
- delete | |
- deletecollection | |
- patch | |
- update | |
- apiGroups: | |
- autoscaling | |
resources: | |
- horizontalpodautoscalers | |
verbs: | |
- create | |
- delete | |
- deletecollection | |
- patch | |
- update | |
- apiGroups: | |
- batch | |
resources: | |
- cronjobs | |
- jobs | |
verbs: | |
- create | |
- delete | |
- deletecollection | |
- patch | |
- update | |
- apiGroups: | |
- extensions | |
resources: | |
- daemonsets | |
- deployments | |
- deployments/rollback | |
- deployments/scale | |
- ingresses | |
- networkpolicies | |
- replicasets | |
- replicasets/scale | |
- replicationcontrollers/scale | |
verbs: | |
- create | |
- delete | |
- deletecollection | |
- patch | |
- update | |
- apiGroups: | |
- policy | |
resources: | |
- poddisruptionbudgets | |
verbs: | |
- create | |
- delete | |
- deletecollection | |
- patch | |
- update | |
- apiGroups: | |
- networking.k8s.io | |
resources: | |
- ingresses | |
- networkpolicies | |
verbs: | |
- create | |
- delete | |
- deletecollection | |
- patch | |
- update | |
- apiVersion: rbac.authorization.k8s.io/v1 | |
kind: ClusterRole | |
metadata: | |
annotations: | |
rbac.authorization.kubernetes.io/autoupdate: "true" | |
creationTimestamp: "2019-12-03T04:43:10Z" | |
labels: | |
kubernetes.io/bootstrapping: rbac-defaults | |
rbac.authorization.k8s.io/aggregate-to-view: "true" | |
name: system:aggregate-to-view | |
resourceVersion: "52" | |
selfLink: /apis/rbac.authorization.k8s.io/v1/clusterroles/system%3Aaggregate-to-view | |
uid: 68a353fe-1587-11ea-b5af-027e0b84da98 | |
rules: | |
- apiGroups: | |
- "" | |
resources: | |
- configmaps | |
- endpoints | |
- persistentvolumeclaims | |
- pods | |
- replicationcontrollers | |
- replicationcontrollers/scale | |
- serviceaccounts | |
- services | |
verbs: | |
- get | |
- list | |
- watch | |
- apiGroups: | |
- "" | |
resources: | |
- bindings | |
- events | |
- limitranges | |
- namespaces/status | |
- pods/log | |
- pods/status | |
- replicationcontrollers/status | |
- resourcequotas | |
- resourcequotas/status | |
verbs: | |
- get | |
- list | |
- watch | |
- apiGroups: | |
- "" | |
resources: | |
- namespaces | |
verbs: | |
- get | |
- list | |
- watch | |
- apiGroups: | |
- apps | |
resources: | |
- controllerrevisions | |
- daemonsets | |
- deployments | |
- deployments/scale | |
- replicasets | |
- replicasets/scale | |
- statefulsets | |
- statefulsets/scale | |
verbs: | |
- get | |
- list | |
- watch | |
- apiGroups: | |
- autoscaling | |
resources: | |
- horizontalpodautoscalers | |
verbs: | |
- get | |
- list | |
- watch | |
- apiGroups: | |
- batch | |
resources: | |
- cronjobs | |
- jobs | |
verbs: | |
- get | |
- list | |
- watch | |
- apiGroups: | |
- extensions | |
resources: | |
- daemonsets | |
- deployments | |
- deployments/scale | |
- ingresses | |
- networkpolicies | |
- replicasets | |
- replicasets/scale | |
- replicationcontrollers/scale | |
verbs: | |
- get | |
- list | |
- watch | |
- apiGroups: | |
- policy | |
resources: | |
- poddisruptionbudgets | |
verbs: | |
- get | |
- list | |
- watch | |
- apiGroups: | |
- networking.k8s.io | |
resources: | |
- ingresses | |
- networkpolicies | |
verbs: | |
- get | |
- list | |
- watch | |
- apiVersion: rbac.authorization.k8s.io/v1 | |
kind: ClusterRole | |
metadata: | |
annotations: | |
rbac.authorization.kubernetes.io/autoupdate: "true" | |
creationTimestamp: "2019-12-03T04:43:10Z" | |
labels: | |
kubernetes.io/bootstrapping: rbac-defaults | |
name: system:auth-delegator | |
resourceVersion: "59" | |
selfLink: /apis/rbac.authorization.k8s.io/v1/clusterroles/system%3Aauth-delegator | |
uid: 68a8b025-1587-11ea-b5af-027e0b84da98 | |
rules: | |
- apiGroups: | |
- authentication.k8s.io | |
resources: | |
- tokenreviews | |
verbs: | |
- create | |
- apiGroups: | |
- authorization.k8s.io | |
resources: | |
- subjectaccessreviews | |
verbs: | |
- create | |
- apiVersion: rbac.authorization.k8s.io/v1 | |
kind: ClusterRole | |
metadata: | |
annotations: | |
rbac.authorization.kubernetes.io/autoupdate: "true" | |
creationTimestamp: "2019-12-03T04:43:10Z" | |
labels: | |
kubernetes.io/bootstrapping: rbac-defaults | |
name: system:aws-cloud-provider | |
resourceVersion: "66" | |
selfLink: /apis/rbac.authorization.k8s.io/v1/clusterroles/system%3Aaws-cloud-provider | |
uid: 68ad42ac-1587-11ea-b5af-027e0b84da98 | |
rules: | |
- apiGroups: | |
- "" | |
resources: | |
- nodes | |
verbs: | |
- get | |
- patch | |
- apiGroups: | |
- "" | |
resources: | |
- events | |
verbs: | |
- create | |
- patch | |
- update | |
- apiVersion: rbac.authorization.k8s.io/v1 | |
kind: ClusterRole | |
metadata: | |
annotations: | |
rbac.authorization.kubernetes.io/autoupdate: "true" | |
creationTimestamp: "2019-12-03T04:43:10Z" | |
labels: | |
kubernetes.io/bootstrapping: rbac-defaults | |
name: system:basic-user | |
resourceVersion: "45" | |
selfLink: /apis/rbac.authorization.k8s.io/v1/clusterroles/system%3Abasic-user | |
uid: 689ea0ad-1587-11ea-b5af-027e0b84da98 | |
rules: | |
- apiGroups: | |
- authorization.k8s.io | |
resources: | |
- selfsubjectaccessreviews | |
- selfsubjectrulesreviews | |
verbs: | |
- create | |
- apiVersion: rbac.authorization.k8s.io/v1 | |
kind: ClusterRole | |
metadata: | |
annotations: | |
rbac.authorization.kubernetes.io/autoupdate: "true" | |
creationTimestamp: "2019-12-03T04:43:10Z" | |
labels: | |
kubernetes.io/bootstrapping: rbac-defaults | |
name: system:certificates.k8s.io:certificatesigningrequests:nodeclient | |
resourceVersion: "67" | |
selfLink: /apis/rbac.authorization.k8s.io/v1/clusterroles/system%3Acertificates.k8s.io%3Acertificatesigningrequests%3Anodeclient | |
uid: 68ada48a-1587-11ea-b5af-027e0b84da98 | |
rules: | |
- apiGroups: | |
- certificates.k8s.io | |
resources: | |
- certificatesigningrequests/nodeclient | |
verbs: | |
- create | |
- apiVersion: rbac.authorization.k8s.io/v1 | |
kind: ClusterRole | |
metadata: | |
annotations: | |
rbac.authorization.kubernetes.io/autoupdate: "true" | |
creationTimestamp: "2019-12-03T04:43:10Z" | |
labels: | |
kubernetes.io/bootstrapping: rbac-defaults | |
name: system:certificates.k8s.io:certificatesigningrequests:selfnodeclient | |
resourceVersion: "68" | |
selfLink: /apis/rbac.authorization.k8s.io/v1/clusterroles/system%3Acertificates.k8s.io%3Acertificatesigningrequests%3Aselfnodeclient | |
uid: 68b423cf-1587-11ea-b5af-027e0b84da98 | |
rules: | |
- apiGroups: | |
- certificates.k8s.io | |
resources: | |
- certificatesigningrequests/selfnodeclient | |
verbs: | |
- create | |
- apiVersion: rbac.authorization.k8s.io/v1 | |
kind: ClusterRole | |
metadata: | |
annotations: | |
rbac.authorization.kubernetes.io/autoupdate: "true" | |
creationTimestamp: "2019-12-03T04:43:10Z" | |
labels: | |
kubernetes.io/bootstrapping: rbac-defaults | |
name: system:controller:attachdetach-controller | |
resourceVersion: "71" | |
selfLink: /apis/rbac.authorization.k8s.io/v1/clusterroles/system%3Acontroller%3Aattachdetach-controller | |
uid: 68b59a5a-1587-11ea-b5af-027e0b84da98 | |
rules: | |
- apiGroups: | |
- "" | |
resources: | |
- persistentvolumeclaims | |
- persistentvolumes | |
verbs: | |
- list | |
- watch | |
- apiGroups: | |
- "" | |
resources: | |
- nodes | |
verbs: | |
- get | |
- list | |
- watch | |
- apiGroups: | |
- "" | |
resources: | |
- nodes/status | |
verbs: | |
- patch | |
- update | |
- apiGroups: | |
- "" | |
resources: | |
- pods | |
verbs: | |
- list | |
- watch | |
- apiGroups: | |
- "" | |
resources: | |
- events | |
verbs: | |
- create | |
- patch | |
- update | |
- apiGroups: | |
- storage.k8s.io | |
resources: | |
- volumeattachments | |
verbs: | |
- create | |
- delete | |
- get | |
- list | |
- watch | |
- apiGroups: | |
- storage.k8s.io | |
resources: | |
- csidrivers | |
verbs: | |
- get | |
- list | |
- watch | |
- apiVersion: rbac.authorization.k8s.io/v1 | |
kind: ClusterRole | |
metadata: | |
annotations: | |
rbac.authorization.kubernetes.io/autoupdate: "true" | |
creationTimestamp: "2019-12-03T04:43:11Z" | |
labels: | |
kubernetes.io/bootstrapping: rbac-defaults | |
name: system:controller:certificate-controller | |
resourceVersion: "94" | |
selfLink: /apis/rbac.authorization.k8s.io/v1/clusterroles/system%3Acontroller%3Acertificate-controller | |
uid: 68c20cb0-1587-11ea-b5af-027e0b84da98 | |
rules: | |
- apiGroups: | |
- certificates.k8s.io | |
resources: | |
- certificatesigningrequests | |
verbs: | |
- delete | |
- get | |
- list | |
- watch | |
- apiGroups: | |
- certificates.k8s.io | |
resources: | |
- certificatesigningrequests/approval | |
- certificatesigningrequests/status | |
verbs: | |
- update | |
- apiGroups: | |
- authorization.k8s.io | |
resources: | |
- subjectaccessreviews | |
verbs: | |
- create | |
- apiGroups: | |
- "" | |
resources: | |
- events | |
verbs: | |
- create | |
- patch | |
- update | |
- apiVersion: rbac.authorization.k8s.io/v1 | |
kind: ClusterRole | |
metadata: | |
annotations: | |
rbac.authorization.kubernetes.io/autoupdate: "true" | |
creationTimestamp: "2019-12-03T04:43:10Z" | |
labels: | |
kubernetes.io/bootstrapping: rbac-defaults | |
name: system:controller:clusterrole-aggregation-controller | |
resourceVersion: "72" | |
selfLink: /apis/rbac.authorization.k8s.io/v1/clusterroles/system%3Acontroller%3Aclusterrole-aggregation-controller | |
uid: 68b60c88-1587-11ea-b5af-027e0b84da98 | |
rules: | |
- apiGroups: | |
- '*' | |
resources: | |
- '*' | |
verbs: | |
- '*' | |
- nonResourceURLs: | |
- '*' | |
verbs: | |
- '*' | |
- apiVersion: rbac.authorization.k8s.io/v1 | |
kind: ClusterRole | |
metadata: | |
annotations: | |
rbac.authorization.kubernetes.io/autoupdate: "true" | |
creationTimestamp: "2019-12-03T04:43:10Z" | |
labels: | |
kubernetes.io/bootstrapping: rbac-defaults | |
name: system:controller:cronjob-controller | |
resourceVersion: "73" | |
selfLink: /apis/rbac.authorization.k8s.io/v1/clusterroles/system%3Acontroller%3Acronjob-controller | |
uid: 68b67b5f-1587-11ea-b5af-027e0b84da98 | |
rules: | |
- apiGroups: | |
- batch | |
resources: | |
- cronjobs | |
verbs: | |
- get | |
- list | |
- update | |
- watch | |
- apiGroups: | |
- batch | |
resources: | |
- jobs | |
verbs: | |
- create | |
- delete | |
- get | |
- list | |
- patch | |
- update | |
- watch | |
- apiGroups: | |
- batch | |
resources: | |
- cronjobs/status | |
verbs: | |
- update | |
- apiGroups: | |
- batch | |
resources: | |
- cronjobs/finalizers | |
verbs: | |
- update | |
- apiGroups: | |
- "" | |
resources: | |
- pods | |
verbs: | |
- delete | |
- list | |
- apiGroups: | |
- "" | |
resources: | |
- events | |
verbs: | |
- create | |
- patch | |
- update | |
- apiVersion: rbac.authorization.k8s.io/v1 | |
kind: ClusterRole | |
metadata: | |
annotations: | |
rbac.authorization.kubernetes.io/autoupdate: "true" | |
creationTimestamp: "2019-12-03T04:43:10Z" | |
labels: | |
kubernetes.io/bootstrapping: rbac-defaults | |
name: system:controller:daemon-set-controller | |
resourceVersion: "74" | |
selfLink: /apis/rbac.authorization.k8s.io/v1/clusterroles/system%3Acontroller%3Adaemon-set-controller | |
uid: 68b6e7c2-1587-11ea-b5af-027e0b84da98 | |
rules: | |
- apiGroups: | |
- apps | |
- extensions | |
resources: | |
- daemonsets | |
verbs: | |
- get | |
- list | |
- watch | |
- apiGroups: | |
- apps | |
- extensions | |
resources: | |
- daemonsets/status | |
verbs: | |
- update | |
- apiGroups: | |
- apps | |
- extensions | |
resources: | |
- daemonsets/finalizers | |
verbs: | |
- update | |
- apiGroups: | |
- "" | |
resources: | |
- nodes | |
verbs: | |
- list | |
- watch | |
- apiGroups: | |
- "" | |
resources: | |
- pods | |
verbs: | |
- create | |
- delete | |
- list | |
- patch | |
- watch | |
- apiGroups: | |
- "" | |
resources: | |
- pods/binding | |
verbs: | |
- create | |
- apiGroups: | |
- apps | |
resources: | |
- controllerrevisions | |
verbs: | |
- create | |
- delete | |
- get | |
- list | |
- patch | |
- update | |
- watch | |
- apiGroups: | |
- "" | |
resources: | |
- events | |
verbs: | |
- create | |
- patch | |
- update | |
- apiVersion: rbac.authorization.k8s.io/v1 | |
kind: ClusterRole | |
metadata: | |
annotations: | |
rbac.authorization.kubernetes.io/autoupdate: "true" | |
creationTimestamp: "2019-12-03T04:43:10Z" | |
labels: | |
kubernetes.io/bootstrapping: rbac-defaults | |
name: system:controller:deployment-controller | |
resourceVersion: "75" | |
selfLink: /apis/rbac.authorization.k8s.io/v1/clusterroles/system%3Acontroller%3Adeployment-controller | |
uid: 68b75e54-1587-11ea-b5af-027e0b84da98 | |
rules: | |
- apiGroups: | |
- apps | |
- extensions | |
resources: | |
- deployments | |
verbs: | |
- get | |
- list | |
- update | |
- watch | |
- apiGroups: | |
- apps | |
- extensions | |
resources: | |
- deployments/status | |
verbs: | |
- update | |
- apiGroups: | |
- apps | |
- extensions | |
resources: | |
- deployments/finalizers | |
verbs: | |
- update | |
- apiGroups: | |
- apps | |
- extensions | |
resources: | |
- replicasets | |
verbs: | |
- create | |
- delete | |
- get | |
- list | |
- patch | |
- update | |
- watch | |
- apiGroups: | |
- "" | |
resources: | |
- pods | |
verbs: | |
- get | |
- list | |
- update | |
- watch | |
- apiGroups: | |
- "" | |
resources: | |
- events | |
verbs: | |
- create | |
- patch | |
- update | |
- apiVersion: rbac.authorization.k8s.io/v1 | |
kind: ClusterRole | |
metadata: | |
annotations: | |
rbac.authorization.kubernetes.io/autoupdate: "true" | |
creationTimestamp: "2019-12-03T04:43:10Z" | |
labels: | |
kubernetes.io/bootstrapping: rbac-defaults | |
name: system:controller:disruption-controller | |
resourceVersion: "76" | |
selfLink: /apis/rbac.authorization.k8s.io/v1/clusterroles/system%3Acontroller%3Adisruption-controller | |
uid: 68b82542-1587-11ea-b5af-027e0b84da98 | |
rules: | |
- apiGroups: | |
- apps | |
- extensions | |
resources: | |
- deployments | |
verbs: | |
- get | |
- list | |
- watch | |
- apiGroups: | |
- apps | |
- extensions | |
resources: | |
- replicasets | |
verbs: | |
- get | |
- list | |
- watch | |
- apiGroups: | |
- "" | |
resources: | |
- replicationcontrollers | |
verbs: | |
- get | |
- list | |
- watch | |
- apiGroups: | |
- policy | |
resources: | |
- poddisruptionbudgets | |
verbs: | |
- get | |
- list | |
- watch | |
- apiGroups: | |
- apps | |
resources: | |
- statefulsets | |
verbs: | |
- get | |
- list | |
- watch | |
- apiGroups: | |
- policy | |
resources: | |
- poddisruptionbudgets/status | |
verbs: | |
- update | |
- apiGroups: | |
- "" | |
resources: | |
- events | |
verbs: | |
- create | |
- patch | |
- update | |
- apiVersion: rbac.authorization.k8s.io/v1 | |
kind: ClusterRole | |
metadata: | |
annotations: | |
rbac.authorization.kubernetes.io/autoupdate: "true" | |
creationTimestamp: "2019-12-03T04:43:10Z" | |
labels: | |
kubernetes.io/bootstrapping: rbac-defaults | |
name: system:controller:endpoint-controller | |
resourceVersion: "77" | |
selfLink: /apis/rbac.authorization.k8s.io/v1/clusterroles/system%3Acontroller%3Aendpoint-controller | |
uid: 68b8ad4f-1587-11ea-b5af-027e0b84da98 | |
rules: | |
- apiGroups: | |
- "" | |
resources: | |
- pods | |
- services | |
verbs: | |
- get | |
- list | |
- watch | |
- apiGroups: | |
- "" | |
resources: | |
- endpoints | |
verbs: | |
- create | |
- delete | |
- get | |
- list | |
- update | |
- apiGroups: | |
- "" | |
resources: | |
- endpoints/restricted | |
verbs: | |
- create | |
- apiGroups: | |
- "" | |
resources: | |
- events | |
verbs: | |
- create | |
- patch | |
- update | |
- apiVersion: rbac.authorization.k8s.io/v1 | |
kind: ClusterRole | |
metadata: | |
annotations: | |
rbac.authorization.kubernetes.io/autoupdate: "true" | |
creationTimestamp: "2019-12-03T04:43:10Z" | |
labels: | |
kubernetes.io/bootstrapping: rbac-defaults | |
name: system:controller:expand-controller | |
resourceVersion: "78" | |
selfLink: /apis/rbac.authorization.k8s.io/v1/clusterroles/system%3Acontroller%3Aexpand-controller | |
uid: 68b90fdf-1587-11ea-b5af-027e0b84da98 | |
rules: | |
- apiGroups: | |
- "" | |
resources: | |
- persistentvolumes | |
verbs: | |
- get | |
- list | |
- patch | |
- update | |
- watch | |
- apiGroups: | |
- "" | |
resources: | |
- persistentvolumeclaims/status | |
verbs: | |
- patch | |
- update | |
- apiGroups: | |
- "" | |
resources: | |
- persistentvolumeclaims | |
verbs: | |
- get | |
- list | |
- watch | |
- apiGroups: | |
- storage.k8s.io | |
resources: | |
- storageclasses | |
verbs: | |
- get | |
- list | |
- watch | |
- apiGroups: | |
- "" | |
resources: | |
- endpoints | |
- services | |
verbs: | |
- get | |
- apiGroups: | |
- "" | |
resources: | |
- secrets | |
verbs: | |
- get | |
- apiGroups: | |
- "" | |
resources: | |
- events | |
verbs: | |
- create | |
- patch | |
- update | |
- apiVersion: rbac.authorization.k8s.io/v1 | |
kind: ClusterRole | |
metadata: | |
annotations: | |
rbac.authorization.kubernetes.io/autoupdate: "true" | |
creationTimestamp: "2019-12-03T04:43:10Z" | |
labels: | |
kubernetes.io/bootstrapping: rbac-defaults | |
name: system:controller:generic-garbage-collector | |
resourceVersion: "79" | |
selfLink: /apis/rbac.authorization.k8s.io/v1/clusterroles/system%3Acontroller%3Ageneric-garbage-collector | |
uid: 68b979b6-1587-11ea-b5af-027e0b84da98 | |
rules: | |
- apiGroups: | |
- '*' | |
resources: | |
- '*' | |
verbs: | |
- delete | |
- get | |
- list | |
- patch | |
- update | |
- watch | |
- apiGroups: | |
- "" | |
resources: | |
- events | |
verbs: | |
- create | |
- patch | |
- update | |
- apiVersion: rbac.authorization.k8s.io/v1 | |
kind: ClusterRole | |
metadata: | |
annotations: | |
rbac.authorization.kubernetes.io/autoupdate: "true" | |
creationTimestamp: "2019-12-03T04:43:11Z" | |
labels: | |
kubernetes.io/bootstrapping: rbac-defaults | |
name: system:controller:horizontal-pod-autoscaler | |
resourceVersion: "80" | |
selfLink: /apis/rbac.authorization.k8s.io/v1/clusterroles/system%3Acontroller%3Ahorizontal-pod-autoscaler | |
uid: 68b9e561-1587-11ea-b5af-027e0b84da98 | |
rules: | |
- apiGroups: | |
- autoscaling | |
resources: | |
- horizontalpodautoscalers | |
verbs: | |
- get | |
- list | |
- watch | |
- apiGroups: | |
- autoscaling | |
resources: | |
- horizontalpodautoscalers/status | |
verbs: | |
- update | |
- apiGroups: | |
- '*' | |
resources: | |
- '*/scale' | |
verbs: | |
- get | |
- update | |
- apiGroups: | |
- "" | |
resources: | |
- pods | |
verbs: | |
- list | |
- apiGroups: | |
- "" | |
resourceNames: | |
- 'http:heapster:' | |
- 'https:heapster:' | |
resources: | |
- services/proxy | |
verbs: | |
- get | |
- apiGroups: | |
- metrics.k8s.io | |
resources: | |
- pods | |
verbs: | |
- list | |
- apiGroups: | |
- custom.metrics.k8s.io | |
resources: | |
- '*' | |
verbs: | |
- get | |
- list | |
- apiGroups: | |
- "" | |
resources: | |
- events | |
verbs: | |
- create | |
- patch | |
- update | |
- apiVersion: rbac.authorization.k8s.io/v1 | |
kind: ClusterRole | |
metadata: | |
annotations: | |
rbac.authorization.kubernetes.io/autoupdate: "true" | |
creationTimestamp: "2019-12-03T04:43:11Z" | |
labels: | |
kubernetes.io/bootstrapping: rbac-defaults | |
name: system:controller:job-controller | |
resourceVersion: "81" | |
selfLink: /apis/rbac.authorization.k8s.io/v1/clusterroles/system%3Acontroller%3Ajob-controller | |
uid: 68ba4e28-1587-11ea-b5af-027e0b84da98 | |
rules: | |
- apiGroups: | |
- batch | |
resources: | |
- jobs | |
verbs: | |
- get | |
- list | |
- update | |
- watch | |
- apiGroups: | |
- batch | |
resources: | |
- jobs/status | |
verbs: | |
- update | |
- apiGroups: | |
- batch | |
resources: | |
- jobs/finalizers | |
verbs: | |
- update | |
- apiGroups: | |
- "" | |
resources: | |
- pods | |
verbs: | |
- create | |
- delete | |
- list | |
- patch | |
- watch | |
- apiGroups: | |
- "" | |
resources: | |
- events | |
verbs: | |
- create | |
- patch | |
- update | |
- apiVersion: rbac.authorization.k8s.io/v1 | |
kind: ClusterRole | |
metadata: | |
annotations: | |
rbac.authorization.kubernetes.io/autoupdate: "true" | |
creationTimestamp: "2019-12-03T04:43:11Z" | |
labels: | |
kubernetes.io/bootstrapping: rbac-defaults | |
name: system:controller:namespace-controller | |
resourceVersion: "82" | |
selfLink: /apis/rbac.authorization.k8s.io/v1/clusterroles/system%3Acontroller%3Anamespace-controller | |
uid: 68babe19-1587-11ea-b5af-027e0b84da98 | |
rules: | |
- apiGroups: | |
- "" | |
resources: | |
- namespaces | |
verbs: | |
- delete | |
- get | |
- list | |
- watch | |
- apiGroups: | |
- "" | |
resources: | |
- namespaces/finalize | |
- namespaces/status | |
verbs: | |
- update | |
- apiGroups: | |
- '*' | |
resources: | |
- '*' | |
verbs: | |
- delete | |
- deletecollection | |
- get | |
- list | |
- apiVersion: rbac.authorization.k8s.io/v1 | |
kind: ClusterRole | |
metadata: | |
annotations: | |
rbac.authorization.kubernetes.io/autoupdate: "true" | |
creationTimestamp: "2019-12-03T04:43:11Z" | |
labels: | |
kubernetes.io/bootstrapping: rbac-defaults | |
name: system:controller:node-controller | |
resourceVersion: "83" | |
selfLink: /apis/rbac.authorization.k8s.io/v1/clusterroles/system%3Acontroller%3Anode-controller | |
uid: 68bb444e-1587-11ea-b5af-027e0b84da98 | |
rules: | |
- apiGroups: | |
- "" | |
resources: | |
- nodes | |
verbs: | |
- delete | |
- get | |
- list | |
- patch | |
- update | |
- apiGroups: | |
- "" | |
resources: | |
- nodes/status | |
verbs: | |
- patch | |
- update | |
- apiGroups: | |
- "" | |
resources: | |
- pods/status | |
verbs: | |
- update | |
- apiGroups: | |
- "" | |
resources: | |
- pods | |
verbs: | |
- delete | |
- list | |
- apiGroups: | |
- "" | |
resources: | |
- events | |
verbs: | |
- create | |
- patch | |
- update | |
- apiVersion: rbac.authorization.k8s.io/v1 | |
kind: ClusterRole | |
metadata: | |
annotations: | |
rbac.authorization.kubernetes.io/autoupdate: "true" | |
creationTimestamp: "2019-12-03T04:43:11Z" | |
labels: | |
kubernetes.io/bootstrapping: rbac-defaults | |
name: system:controller:persistent-volume-binder | |
resourceVersion: "84" | |
selfLink: /apis/rbac.authorization.k8s.io/v1/clusterroles/system%3Acontroller%3Apersistent-volume-binder | |
uid: 68bbb274-1587-11ea-b5af-027e0b84da98 | |
rules: | |
- apiGroups: | |
- "" | |
resources: | |
- persistentvolumes | |
verbs: | |
- create | |
- delete | |
- get | |
- list | |
- update | |
- watch | |
- apiGroups: | |
- "" | |
resources: | |
- persistentvolumes/status | |
verbs: | |
- update | |
- apiGroups: | |
- "" | |
resources: | |
- persistentvolumeclaims | |
verbs: | |
- get | |
- list | |
- update | |
- watch | |
- apiGroups: | |
- "" | |
resources: | |
- persistentvolumeclaims/status | |
verbs: | |
- update | |
- apiGroups: | |
- "" | |
resources: | |
- pods | |
verbs: | |
- create | |
- delete | |
- get | |
- list | |
- watch | |
- apiGroups: | |
- storage.k8s.io | |
resources: | |
- storageclasses | |
verbs: | |
- get | |
- list | |
- watch | |
- apiGroups: | |
- "" | |
resources: | |
- endpoints | |
- services | |
verbs: | |
- create | |
- delete | |
- get | |
- apiGroups: | |
- "" | |
resources: | |
- secrets | |
verbs: | |
- get | |
- apiGroups: | |
- "" | |
resources: | |
- nodes | |
verbs: | |
- get | |
- list | |
- apiGroups: | |
- "" | |
resources: | |
- events | |
verbs: | |
- watch | |
- apiGroups: | |
- "" | |
resources: | |
- events | |
verbs: | |
- create | |
- patch | |
- update | |
- apiVersion: rbac.authorization.k8s.io/v1 | |
kind: ClusterRole | |
metadata: | |
annotations: | |
rbac.authorization.kubernetes.io/autoupdate: "true" | |
creationTimestamp: "2019-12-03T04:43:11Z" | |
labels: | |
kubernetes.io/bootstrapping: rbac-defaults | |
name: system:controller:pod-garbage-collector | |
resourceVersion: "85" | |
selfLink: /apis/rbac.authorization.k8s.io/v1/clusterroles/system%3Acontroller%3Apod-garbage-collector | |
uid: 68bc27dc-1587-11ea-b5af-027e0b84da98 | |
rules: | |
- apiGroups: | |
- "" | |
resources: | |
- pods | |
verbs: | |
- delete | |
- list | |
- watch | |
- apiGroups: | |
- "" | |
resources: | |
- nodes | |
verbs: | |
- list | |
- apiVersion: rbac.authorization.k8s.io/v1 | |
kind: ClusterRole | |
metadata: | |
annotations: | |
rbac.authorization.kubernetes.io/autoupdate: "true" | |
creationTimestamp: "2019-12-03T04:43:11Z" | |
labels: | |
kubernetes.io/bootstrapping: rbac-defaults | |
name: system:controller:pv-protection-controller | |
resourceVersion: "96" | |
selfLink: /apis/rbac.authorization.k8s.io/v1/clusterroles/system%3Acontroller%3Apv-protection-controller | |
uid: 68ce42d7-1587-11ea-b5af-027e0b84da98 | |
rules: | |
- apiGroups: | |
- "" | |
resources: | |
- persistentvolumes | |
verbs: | |
- get | |
- list | |
- update | |
- watch | |
- apiGroups: | |
- "" | |
resources: | |
- events | |
verbs: | |
- create | |
- patch | |
- update | |
- apiVersion: rbac.authorization.k8s.io/v1 | |
kind: ClusterRole | |
metadata: | |
annotations: | |
rbac.authorization.kubernetes.io/autoupdate: "true" | |
creationTimestamp: "2019-12-03T04:43:11Z" | |
labels: | |
kubernetes.io/bootstrapping: rbac-defaults | |
name: system:controller:pvc-protection-controller | |
resourceVersion: "95" | |
selfLink: /apis/rbac.authorization.k8s.io/v1/clusterroles/system%3Acontroller%3Apvc-protection-controller | |
uid: 68c82a3a-1587-11ea-b5af-027e0b84da98 | |
rules: | |
- apiGroups: | |
- "" | |
resources: | |
- persistentvolumeclaims | |
verbs: | |
- get | |
- list | |
- update | |
- watch | |
- apiGroups: | |
- "" | |
resources: | |
- pods | |
verbs: | |
- get | |
- list | |
- watch | |
- apiGroups: | |
- "" | |
resources: | |
- events | |
verbs: | |
- create | |
- patch | |
- update | |
- apiVersion: rbac.authorization.k8s.io/v1 | |
kind: ClusterRole | |
metadata: | |
annotations: | |
rbac.authorization.kubernetes.io/autoupdate: "true" | |
creationTimestamp: "2019-12-03T04:43:11Z" | |
labels: | |
kubernetes.io/bootstrapping: rbac-defaults | |
name: system:controller:replicaset-controller | |
resourceVersion: "86" | |
selfLink: /apis/rbac.authorization.k8s.io/v1/clusterroles/system%3Acontroller%3Areplicaset-controller | |
uid: 68bcac64-1587-11ea-b5af-027e0b84da98 | |
rules: | |
- apiGroups: | |
- apps | |
- extensions | |
resources: | |
- replicasets | |
verbs: | |
- get | |
- list | |
- update | |
- watch | |
- apiGroups: | |
- apps | |
- extensions | |
resources: | |
- replicasets/status | |
verbs: | |
- update | |
- apiGroups: | |
- apps | |
- extensions | |
resources: | |
- replicasets/finalizers | |
verbs: | |
- update | |
- apiGroups: | |
- "" | |
resources: | |
- pods | |
verbs: | |
- create | |
- delete | |
- list | |
- patch | |
- watch | |
- apiGroups: | |
- "" | |
resources: | |
- events | |
verbs: | |
- create | |
- patch | |
- update | |
- apiVersion: rbac.authorization.k8s.io/v1 | |
kind: ClusterRole | |
metadata: | |
annotations: | |
rbac.authorization.kubernetes.io/autoupdate: "true" | |
creationTimestamp: "2019-12-03T04:43:11Z" | |
labels: | |
kubernetes.io/bootstrapping: rbac-defaults | |
name: system:controller:replication-controller | |
resourceVersion: "87" | |
selfLink: /apis/rbac.authorization.k8s.io/v1/clusterroles/system%3Acontroller%3Areplication-controller | |
uid: 68bd3659-1587-11ea-b5af-027e0b84da98 | |
rules: | |
- apiGroups: | |
- "" | |
resources: | |
- replicationcontrollers | |
verbs: | |
- get | |
- list | |
- update | |
- watch | |
- apiGroups: | |
- "" | |
resources: | |
- replicationcontrollers/status | |
verbs: | |
- update | |
- apiGroups: | |
- "" | |
resources: | |
- replicationcontrollers/finalizers | |
verbs: | |
- update | |
- apiGroups: | |
- "" | |
resources: | |
- pods | |
verbs: | |
- create | |
- delete | |
- list | |
- patch | |
- watch | |
- apiGroups: | |
- "" | |
resources: | |
- events | |
verbs: | |
- create | |
- patch | |
- update | |
- apiVersion: rbac.authorization.k8s.io/v1 | |
kind: ClusterRole | |
metadata: | |
annotations: | |
rbac.authorization.kubernetes.io/autoupdate: "true" | |
creationTimestamp: "2019-12-03T04:43:11Z" | |
labels: | |
kubernetes.io/bootstrapping: rbac-defaults | |
name: system:controller:resourcequota-controller | |
resourceVersion: "88" | |
selfLink: /apis/rbac.authorization.k8s.io/v1/clusterroles/system%3Acontroller%3Aresourcequota-controller | |
uid: 68be0827-1587-11ea-b5af-027e0b84da98 | |
rules: | |
- apiGroups: | |
- '*' | |
resources: | |
- '*' | |
verbs: | |
- list | |
- watch | |
- apiGroups: | |
- "" | |
resources: | |
- resourcequotas/status | |
verbs: | |
- update | |
- apiGroups: | |
- "" | |
resources: | |
- events | |
verbs: | |
- create | |
- patch | |
- update | |
- apiVersion: rbac.authorization.k8s.io/v1 | |
kind: ClusterRole | |
metadata: | |
annotations: | |
rbac.authorization.kubernetes.io/autoupdate: "true" | |
creationTimestamp: "2019-12-03T04:43:11Z" | |
labels: | |
kubernetes.io/bootstrapping: rbac-defaults | |
name: system:controller:route-controller | |
resourceVersion: "89" | |
selfLink: /apis/rbac.authorization.k8s.io/v1/clusterroles/system%3Acontroller%3Aroute-controller | |
uid: 68be83a8-1587-11ea-b5af-027e0b84da98 | |
rules: | |
- apiGroups: | |
- "" | |
resources: | |
- nodes | |
verbs: | |
- list | |
- watch | |
- apiGroups: | |
- "" | |
resources: | |
- nodes/status | |
verbs: | |
- patch | |
- apiGroups: | |
- "" | |
resources: | |
- events | |
verbs: | |
- create | |
- patch | |
- update | |
- apiVersion: rbac.authorization.k8s.io/v1 | |
kind: ClusterRole | |
metadata: | |
annotations: | |
rbac.authorization.kubernetes.io/autoupdate: "true" | |
creationTimestamp: "2019-12-03T04:43:11Z" | |
labels: | |
kubernetes.io/bootstrapping: rbac-defaults | |
name: system:controller:service-account-controller | |
resourceVersion: "90" | |
selfLink: /apis/rbac.authorization.k8s.io/v1/clusterroles/system%3Acontroller%3Aservice-account-controller | |
uid: 68bef138-1587-11ea-b5af-027e0b84da98 | |
rules: | |
- apiGroups: | |
- "" | |
resources: | |
- serviceaccounts | |
verbs: | |
- create | |
- apiGroups: | |
- "" | |
resources: | |
- events | |
verbs: | |
- create | |
- patch | |
- update | |
- apiVersion: rbac.authorization.k8s.io/v1 | |
kind: ClusterRole | |
metadata: | |
annotations: | |
rbac.authorization.kubernetes.io/autoupdate: "true" | |
creationTimestamp: "2019-12-03T04:43:11Z" | |
labels: | |
kubernetes.io/bootstrapping: rbac-defaults | |
name: system:controller:service-controller | |
resourceVersion: "91" | |
selfLink: /apis/rbac.authorization.k8s.io/v1/clusterroles/system%3Acontroller%3Aservice-controller | |
uid: 68bf5a9d-1587-11ea-b5af-027e0b84da98 | |
rules: | |
- apiGroups: | |
- "" | |
resources: | |
- services | |
verbs: | |
- get | |
- list | |
- watch | |
- apiGroups: | |
- "" | |
resources: | |
- services/status | |
verbs: | |
- update | |
- apiGroups: | |
- "" | |
resources: | |
- nodes | |
verbs: | |
- list | |
- watch | |
- apiGroups: | |
- "" | |
resources: | |
- events | |
verbs: | |
- create | |
- patch | |
- update | |
- apiVersion: rbac.authorization.k8s.io/v1 | |
kind: ClusterRole | |
metadata: | |
annotations: | |
rbac.authorization.kubernetes.io/autoupdate: "true" | |
creationTimestamp: "2019-12-03T04:43:11Z" | |
labels: | |
kubernetes.io/bootstrapping: rbac-defaults | |
name: system:controller:statefulset-controller | |
resourceVersion: "92" | |
selfLink: /apis/rbac.authorization.k8s.io/v1/clusterroles/system%3Acontroller%3Astatefulset-controller | |
uid: 68bfd0d2-1587-11ea-b5af-027e0b84da98 | |
rules: | |
- apiGroups: | |
- "" | |
resources: | |
- pods | |
verbs: | |
- list | |
- watch | |
- apiGroups: | |
- apps | |
resources: | |
- statefulsets | |
verbs: | |
- get | |
- list | |
- watch | |
- apiGroups: | |
- apps | |
resources: | |
- statefulsets/status | |
verbs: | |
- update | |
- apiGroups: | |
- apps | |
resources: | |
- statefulsets/finalizers | |
verbs: | |
- update | |
- apiGroups: | |
- "" | |
resources: | |
- pods | |
verbs: | |
- create | |
- delete | |
- get | |
- patch | |
- update | |
- apiGroups: | |
- apps | |
resources: | |
- controllerrevisions | |
verbs: | |
- create | |
- delete | |
- get | |
- list | |
- patch | |
- update | |
- watch | |
- apiGroups: | |
- "" | |
resources: | |
- persistentvolumeclaims | |
verbs: | |
- create | |
- get | |
- apiGroups: | |
- "" | |
resources: | |
- events | |
verbs: | |
- create | |
- patch | |
- update | |
- apiVersion: rbac.authorization.k8s.io/v1 | |
kind: ClusterRole | |
metadata: | |
annotations: | |
rbac.authorization.kubernetes.io/autoupdate: "true" | |
creationTimestamp: "2019-12-03T04:43:11Z" | |
labels: | |
kubernetes.io/bootstrapping: rbac-defaults | |
name: system:controller:ttl-controller | |
resourceVersion: "93" | |
selfLink: /apis/rbac.authorization.k8s.io/v1/clusterroles/system%3Acontroller%3Attl-controller | |
uid: 68c03b11-1587-11ea-b5af-027e0b84da98 | |
rules: | |
- apiGroups: | |
- "" | |
resources: | |
- nodes | |
verbs: | |
- list | |
- patch | |
- update | |
- watch | |
- apiGroups: | |
- "" | |
resources: | |
- events | |
verbs: | |
- create | |
- patch | |
- update | |
- apiVersion: rbac.authorization.k8s.io/v1 | |
kind: ClusterRole | |
metadata: | |
annotations: | |
rbac.authorization.kubernetes.io/autoupdate: "true" | |
creationTimestamp: "2019-12-03T04:43:10Z" | |
labels: | |
kubernetes.io/bootstrapping: rbac-defaults | |
name: system:csi-external-attacher | |
resourceVersion: "65" | |
selfLink: /apis/rbac.authorization.k8s.io/v1/clusterroles/system%3Acsi-external-attacher | |
uid: 68accbd3-1587-11ea-b5af-027e0b84da98 | |
rules: | |
- apiGroups: | |
- "" | |
resources: | |
- persistentvolumes | |
verbs: | |
- get | |
- list | |
- patch | |
- update | |
- watch | |
- apiGroups: | |
- "" | |
resources: | |
- nodes | |
verbs: | |
- get | |
- list | |
- watch | |
- apiGroups: | |
- storage.k8s.io | |
resources: | |
- volumeattachments | |
verbs: | |
- get | |
- list | |
- patch | |
- update | |
- watch | |
- apiGroups: | |
- "" | |
resources: | |
- events | |
verbs: | |
- create | |
- get | |
- list | |
- patch | |
- update | |
- watch | |
- apiVersion: rbac.authorization.k8s.io/v1 | |
kind: ClusterRole | |
metadata: | |
annotations: | |
rbac.authorization.kubernetes.io/autoupdate: "true" | |
creationTimestamp: "2019-12-03T04:43:10Z" | |
labels: | |
kubernetes.io/bootstrapping: rbac-defaults | |
name: system:csi-external-provisioner | |
resourceVersion: "70" | |
selfLink: /apis/rbac.authorization.k8s.io/v1/clusterroles/system%3Acsi-external-provisioner | |
uid: 68b52e19-1587-11ea-b5af-027e0b84da98 | |
rules: | |
- apiGroups: | |
- "" | |
resources: | |
- persistentvolumes | |
verbs: | |
- create | |
- delete | |
- get | |
- list | |
- watch | |
- apiGroups: | |
- "" | |
resources: | |
- persistentvolumeclaims | |
verbs: | |
- get | |
- list | |
- patch | |
- update | |
- watch | |
- apiGroups: | |
- storage.k8s.io | |
resources: | |
- storageclasses | |
verbs: | |
- list | |
- watch | |
- apiGroups: | |
- "" | |
resources: | |
- events | |
verbs: | |
- create | |
- get | |
- list | |
- patch | |
- update | |
- watch | |
- apiGroups: | |
- "" | |
resources: | |
- nodes | |
verbs: | |
- get | |
- list | |
- watch | |
- apiGroups: | |
- storage.k8s.io | |
resources: | |
- csinodes | |
verbs: | |
- get | |
- list | |
- watch | |
- apiVersion: rbac.authorization.k8s.io/v1 | |
kind: ClusterRole | |
metadata: | |
annotations: | |
rbac.authorization.kubernetes.io/autoupdate: "true" | |
creationTimestamp: "2019-12-03T04:43:10Z" | |
labels: | |
kubernetes.io/bootstrapping: rbac-defaults | |
name: system:discovery | |
resourceVersion: "44" | |
selfLink: /apis/rbac.authorization.k8s.io/v1/clusterroles/system%3Adiscovery | |
uid: 689db59c-1587-11ea-b5af-027e0b84da98 | |
rules: | |
- nonResourceURLs: | |
- /api | |
- /api/* | |
- /apis | |
- /apis/* | |
- /healthz | |
- /openapi | |
- /openapi/* | |
- /version | |
- /version/ | |
verbs: | |
- get | |
- apiVersion: rbac.authorization.k8s.io/v1 | |
kind: ClusterRole | |
metadata: | |
annotations: | |
rbac.authorization.kubernetes.io/autoupdate: "true" | |
creationTimestamp: "2019-12-03T04:43:10Z" | |
labels: | |
kubernetes.io/bootstrapping: rbac-defaults | |
name: system:heapster | |
resourceVersion: "53" | |
selfLink: /apis/rbac.authorization.k8s.io/v1/clusterroles/system%3Aheapster | |
uid: 68a420d6-1587-11ea-b5af-027e0b84da98 | |
rules: | |
- apiGroups: | |
- "" | |
resources: | |
- events | |
- namespaces | |
- nodes | |
- pods | |
verbs: | |
- get | |
- list | |
- watch | |
- apiGroups: | |
- extensions | |
resources: | |
- deployments | |
verbs: | |
- get | |
- list | |
- watch | |
- apiVersion: rbac.authorization.k8s.io/v1 | |
kind: ClusterRole | |
metadata: | |
annotations: | |
rbac.authorization.kubernetes.io/autoupdate: "true" | |
creationTimestamp: "2019-12-03T04:43:10Z" | |
labels: | |
kubernetes.io/bootstrapping: rbac-defaults | |
name: system:kube-aggregator | |
resourceVersion: "60" | |
selfLink: /apis/rbac.authorization.k8s.io/v1/clusterroles/system%3Akube-aggregator | |
uid: 68a930ce-1587-11ea-b5af-027e0b84da98 | |
rules: | |
- apiGroups: | |
- "" | |
resources: | |
- endpoints | |
- services | |
verbs: | |
- get | |
- list | |
- watch | |
- apiVersion: rbac.authorization.k8s.io/v1 | |
kind: ClusterRole | |
metadata: | |
annotations: | |
rbac.authorization.kubernetes.io/autoupdate: "true" | |
creationTimestamp: "2019-12-03T04:43:10Z" | |
labels: | |
kubernetes.io/bootstrapping: rbac-defaults | |
name: system:kube-controller-manager | |
resourceVersion: "61" | |
selfLink: /apis/rbac.authorization.k8s.io/v1/clusterroles/system%3Akube-controller-manager | |
uid: 68a9a34d-1587-11ea-b5af-027e0b84da98 | |
rules: | |
- apiGroups: | |
- "" | |
resources: | |
- events | |
verbs: | |
- create | |
- patch | |
- update | |
- apiGroups: | |
- "" | |
resources: | |
- endpoints | |
- secrets | |
- serviceaccounts | |
verbs: | |
- create | |
- apiGroups: | |
- "" | |
resources: | |
- secrets | |
verbs: | |
- delete | |
- apiGroups: | |
- "" | |
resources: | |
- configmaps | |
- endpoints | |
- namespaces | |
- secrets | |
- serviceaccounts | |
verbs: | |
- get | |
- apiGroups: | |
- "" | |
resources: | |
- endpoints | |
- secrets | |
- serviceaccounts | |
verbs: | |
- update | |
- apiGroups: | |
- authentication.k8s.io | |
resources: | |
- tokenreviews | |
verbs: | |
- create | |
- apiGroups: | |
- authorization.k8s.io | |
resources: | |
- subjectaccessreviews | |
verbs: | |
- create | |
- apiGroups: | |
- '*' | |
resources: | |
- '*' | |
verbs: | |
- list | |
- watch | |
- apiVersion: rbac.authorization.k8s.io/v1 | |
kind: ClusterRole | |
metadata: | |
annotations: | |
rbac.authorization.kubernetes.io/autoupdate: "true" | |
creationTimestamp: "2019-12-03T04:43:10Z" | |
labels: | |
kubernetes.io/bootstrapping: rbac-defaults | |
name: system:kube-dns | |
resourceVersion: "63" | |
selfLink: /apis/rbac.authorization.k8s.io/v1/clusterroles/system%3Akube-dns | |
uid: 68abee34-1587-11ea-b5af-027e0b84da98 | |
rules: | |
- apiGroups: | |
- "" | |
resources: | |
- endpoints | |
- services | |
verbs: | |
- list | |
- watch | |
- apiVersion: rbac.authorization.k8s.io/v1 | |
kind: ClusterRole | |
metadata: | |
annotations: | |
rbac.authorization.kubernetes.io/autoupdate: "true" | |
creationTimestamp: "2019-12-03T04:43:10Z" | |
labels: | |
kubernetes.io/bootstrapping: rbac-defaults | |
name: system:kube-scheduler | |
resourceVersion: "62" | |
selfLink: /apis/rbac.authorization.k8s.io/v1/clusterroles/system%3Akube-scheduler | |
uid: 68ab6483-1587-11ea-b5af-027e0b84da98 | |
rules: | |
- apiGroups: | |
- "" | |
resources: | |
- events | |
verbs: | |
- create | |
- patch | |
- update | |
- apiGroups: | |
- "" | |
resources: | |
- endpoints | |
verbs: | |
- create | |
- apiGroups: | |
- "" | |
resourceNames: | |
- kube-scheduler | |
resources: | |
- endpoints | |
verbs: | |
- delete | |
- get | |
- patch | |
- update | |
- apiGroups: | |
- "" | |
resources: | |
- nodes | |
verbs: | |
- get | |
- list | |
- watch | |
- apiGroups: | |
- "" | |
resources: | |
- pods | |
verbs: | |
- delete | |
- get | |
- list | |
- watch | |
- apiGroups: | |
- "" | |
resources: | |
- bindings | |
- pods/binding | |
verbs: | |
- create | |
- apiGroups: | |
- "" | |
resources: | |
- pods/status | |
verbs: | |
- patch | |
- update | |
- apiGroups: | |
- "" | |
resources: | |
- replicationcontrollers | |
- services | |
verbs: | |
- get | |
- list | |
- watch | |
- apiGroups: | |
- apps | |
- extensions | |
resources: | |
- replicasets | |
verbs: | |
- get | |
- list | |
- watch | |
- apiGroups: | |
- apps | |
resources: | |
- statefulsets | |
verbs: | |
- get | |
- list | |
- watch | |
- apiGroups: | |
- policy | |
resources: | |
- poddisruptionbudgets | |
verbs: | |
- get | |
- list | |
- watch | |
- apiGroups: | |
- "" | |
resources: | |
- persistentvolumeclaims | |
- persistentvolumes | |
verbs: | |
- get | |
- list | |
- watch | |
- apiGroups: | |
- authentication.k8s.io | |
resources: | |
- tokenreviews | |
verbs: | |
- create | |
- apiGroups: | |
- authorization.k8s.io | |
resources: | |
- subjectaccessreviews | |
verbs: | |
- create | |
- apiVersion: rbac.authorization.k8s.io/v1 | |
kind: ClusterRole | |
metadata: | |
annotations: | |
rbac.authorization.kubernetes.io/autoupdate: "true" | |
creationTimestamp: "2019-12-03T04:43:10Z" | |
labels: | |
kubernetes.io/bootstrapping: rbac-defaults | |
name: system:kubelet-api-admin | |
resourceVersion: "57" | |
selfLink: /apis/rbac.authorization.k8s.io/v1/clusterroles/system%3Akubelet-api-admin | |
uid: 68a7ad5c-1587-11ea-b5af-027e0b84da98 | |
rules: | |
- apiGroups: | |
- "" | |
resources: | |
- nodes | |
verbs: | |
- get | |
- list | |
- watch | |
- apiGroups: | |
- "" | |
resources: | |
- nodes | |
verbs: | |
- proxy | |
- apiGroups: | |
- "" | |
resources: | |
- nodes/log | |
- nodes/metrics | |
- nodes/proxy | |
- nodes/spec | |
- nodes/stats | |
verbs: | |
- '*' | |
- apiVersion: rbac.authorization.k8s.io/v1 | |
kind: ClusterRole | |
metadata: | |
annotations: | |
rbac.authorization.kubernetes.io/autoupdate: "true" | |
creationTimestamp: "2019-12-03T04:43:10Z" | |
labels: | |
kubernetes.io/bootstrapping: rbac-defaults | |
name: system:node | |
resourceVersion: "54" | |
selfLink: /apis/rbac.authorization.k8s.io/v1/clusterroles/system%3Anode | |
uid: 68a51616-1587-11ea-b5af-027e0b84da98 | |
rules: | |
- apiGroups: | |
- authentication.k8s.io | |
resources: | |
- tokenreviews | |
verbs: | |
- create | |
- apiGroups: | |
- authorization.k8s.io | |
resources: | |
- localsubjectaccessreviews | |
- subjectaccessreviews | |
verbs: | |
- create | |
- apiGroups: | |
- "" | |
resources: | |
- services | |
verbs: | |
- get | |
- list | |
- watch | |
- apiGroups: | |
- "" | |
resources: | |
- nodes | |
verbs: | |
- create | |
- get | |
- list | |
- watch | |
- apiGroups: | |
- "" | |
resources: | |
- nodes/status | |
verbs: | |
- patch | |
- update | |
- apiGroups: | |
- "" | |
resources: | |
- nodes | |
verbs: | |
- patch | |
- update | |
- apiGroups: | |
- "" | |
resources: | |
- events | |
verbs: | |
- create | |
- patch | |
- update | |
- apiGroups: | |
- "" | |
resources: | |
- pods | |
verbs: | |
- get | |
- list | |
- watch | |
- apiGroups: | |
- "" | |
resources: | |
- pods | |
verbs: | |
- create | |
- delete | |
- apiGroups: | |
- "" | |
resources: | |
- pods/status | |
verbs: | |
- patch | |
- update | |
- apiGroups: | |
- "" | |
resources: | |
- pods/eviction | |
verbs: | |
- create | |
- apiGroups: | |
- "" | |
resources: | |
- configmaps | |
- secrets | |
verbs: | |
- get | |
- list | |
- watch | |
- apiGroups: | |
- "" | |
resources: | |
- persistentvolumeclaims | |
- persistentvolumes | |
verbs: | |
- get | |
- apiGroups: | |
- "" | |
resources: | |
- endpoints | |
verbs: | |
- get | |
- apiGroups: | |
- certificates.k8s.io | |
resources: | |
- certificatesigningrequests | |
verbs: | |
- create | |
- get | |
- list | |
- watch | |
- apiGroups: | |
- "" | |
resources: | |
- persistentvolumeclaims/status | |
verbs: | |
- get | |
- patch | |
- update | |
- apiGroups: | |
- "" | |
resources: | |
- serviceaccounts/token | |
verbs: | |
- create | |
- apiGroups: | |
- storage.k8s.io | |
resources: | |
- volumeattachments | |
verbs: | |
- get | |
- apiGroups: | |
- storage.k8s.io | |
resources: | |
- csidrivers | |
verbs: | |
- get | |
- list | |
- watch | |
- apiGroups: | |
- storage.k8s.io | |
resources: | |
- csinodes | |
verbs: | |
- create | |
- delete | |
- get | |
- patch | |
- update | |
- apiGroups: | |
- coordination.k8s.io | |
resources: | |
- leases | |
verbs: | |
- create | |
- delete | |
- get | |
- patch | |
- update | |
- apiGroups: | |
- node.k8s.io | |
resources: | |
- runtimeclasses | |
verbs: | |
- get | |
- list | |
- watch | |
- apiVersion: rbac.authorization.k8s.io/v1 | |
kind: ClusterRole | |
metadata: | |
annotations: | |
rbac.authorization.kubernetes.io/autoupdate: "true" | |
creationTimestamp: "2019-12-03T04:43:10Z" | |
labels: | |
kubernetes.io/bootstrapping: rbac-defaults | |
name: system:node-bootstrapper | |
resourceVersion: "58" | |
selfLink: /apis/rbac.authorization.k8s.io/v1/clusterroles/system%3Anode-bootstrapper | |
uid: 68a84a13-1587-11ea-b5af-027e0b84da98 | |
rules: | |
- apiGroups: | |
- certificates.k8s.io | |
resources: | |
- certificatesigningrequests | |
verbs: | |
- create | |
- get | |
- list | |
- watch | |
- apiVersion: rbac.authorization.k8s.io/v1 | |
kind: ClusterRole | |
metadata: | |
annotations: | |
rbac.authorization.kubernetes.io/autoupdate: "true" | |
creationTimestamp: "2019-12-03T04:43:10Z" | |
labels: | |
kubernetes.io/bootstrapping: rbac-defaults | |
name: system:node-problem-detector | |
resourceVersion: "55" | |
selfLink: /apis/rbac.authorization.k8s.io/v1/clusterroles/system%3Anode-problem-detector | |
uid: 68a5d5de-1587-11ea-b5af-027e0b84da98 | |
rules: | |
- apiGroups: | |
- "" | |
resources: | |
- nodes | |
verbs: | |
- get | |
- apiGroups: | |
- "" | |
resources: | |
- nodes/status | |
verbs: | |
- patch | |
- apiGroups: | |
- "" | |
resources: | |
- events | |
verbs: | |
- create | |
- patch | |
- update | |
- apiVersion: rbac.authorization.k8s.io/v1 | |
kind: ClusterRole | |
metadata: | |
annotations: | |
rbac.authorization.kubernetes.io/autoupdate: "true" | |
creationTimestamp: "2019-12-03T04:43:10Z" | |
labels: | |
kubernetes.io/bootstrapping: rbac-defaults | |
name: system:node-proxier | |
resourceVersion: "56" | |
selfLink: /apis/rbac.authorization.k8s.io/v1/clusterroles/system%3Anode-proxier | |
uid: 68a64ffd-1587-11ea-b5af-027e0b84da98 | |
rules: | |
- apiGroups: | |
- "" | |
resources: | |
- endpoints | |
- services | |
verbs: | |
- list | |
- watch | |
- apiGroups: | |
- "" | |
resources: | |
- nodes | |
verbs: | |
- get | |
- apiGroups: | |
- "" | |
resources: | |
- events | |
verbs: | |
- create | |
- patch | |
- update | |
- apiVersion: rbac.authorization.k8s.io/v1 | |
kind: ClusterRole | |
metadata: | |
annotations: | |
rbac.authorization.kubernetes.io/autoupdate: "true" | |
creationTimestamp: "2019-12-03T04:43:10Z" | |
labels: | |
kubernetes.io/bootstrapping: rbac-defaults | |
name: system:persistent-volume-provisioner | |
resourceVersion: "64" | |
selfLink: /apis/rbac.authorization.k8s.io/v1/clusterroles/system%3Apersistent-volume-provisioner | |
uid: 68ac5d5e-1587-11ea-b5af-027e0b84da98 | |
rules: | |
- apiGroups: | |
- "" | |
resources: | |
- persistentvolumes | |
verbs: | |
- create | |
- delete | |
- get | |
- list | |
- watch | |
- apiGroups: | |
- "" | |
resources: | |
- persistentvolumeclaims | |
verbs: | |
- get | |
- list | |
- update | |
- watch | |
- apiGroups: | |
- storage.k8s.io | |
resources: | |
- storageclasses | |
verbs: | |
- get | |
- list | |
- watch | |
- apiGroups: | |
- "" | |
resources: | |
- events | |
verbs: | |
- watch | |
- apiGroups: | |
- "" | |
resources: | |
- events | |
verbs: | |
- create | |
- patch | |
- update | |
- apiVersion: rbac.authorization.k8s.io/v1 | |
kind: ClusterRole | |
metadata: | |
annotations: | |
rbac.authorization.kubernetes.io/autoupdate: "true" | |
creationTimestamp: "2019-12-03T04:43:10Z" | |
labels: | |
kubernetes.io/bootstrapping: rbac-defaults | |
name: system:public-info-viewer | |
resourceVersion: "46" | |
selfLink: /apis/rbac.authorization.k8s.io/v1/clusterroles/system%3Apublic-info-viewer | |
uid: 689f4273-1587-11ea-b5af-027e0b84da98 | |
rules: | |
- nonResourceURLs: | |
- /healthz | |
- /version | |
- /version/ | |
verbs: | |
- get | |
- apiVersion: rbac.authorization.k8s.io/v1 | |
kind: ClusterRole | |
metadata: | |
annotations: | |
rbac.authorization.kubernetes.io/autoupdate: "true" | |
creationTimestamp: "2019-12-03T04:43:10Z" | |
labels: | |
kubernetes.io/bootstrapping: rbac-defaults | |
name: system:volume-scheduler | |
resourceVersion: "69" | |
selfLink: /apis/rbac.authorization.k8s.io/v1/clusterroles/system%3Avolume-scheduler | |
uid: 68b4bd63-1587-11ea-b5af-027e0b84da98 | |
rules: | |
- apiGroups: | |
- "" | |
resources: | |
- persistentvolumes | |
verbs: | |
- get | |
- list | |
- patch | |
- update | |
- watch | |
- apiGroups: | |
- storage.k8s.io | |
resources: | |
- storageclasses | |
verbs: | |
- get | |
- list | |
- watch | |
- apiGroups: | |
- "" | |
resources: | |
- persistentvolumeclaims | |
verbs: | |
- get | |
- list | |
- patch | |
- update | |
- watch | |
- aggregationRule: | |
clusterRoleSelectors: | |
- matchLabels: | |
rbac.authorization.k8s.io/aggregate-to-view: "true" | |
apiVersion: rbac.authorization.k8s.io/v1 | |
kind: ClusterRole | |
metadata: | |
annotations: | |
rbac.authorization.kubernetes.io/autoupdate: "true" | |
creationTimestamp: "2019-12-03T04:43:10Z" | |
labels: | |
kubernetes.io/bootstrapping: rbac-defaults | |
rbac.authorization.k8s.io/aggregate-to-edit: "true" | |
name: view | |
resourceVersion: "43795" | |
selfLink: /apis/rbac.authorization.k8s.io/v1/clusterroles/view | |
uid: 68a13a31-1587-11ea-b5af-027e0b84da98 | |
rules: | |
- apiGroups: | |
- serving.knative.dev | |
- networking.internal.knative.dev | |
- autoscaling.internal.knative.dev | |
- caching.internal.knative.dev | |
resources: | |
- '*' | |
verbs: | |
- get | |
- list | |
- watch | |
- apiGroups: | |
- "" | |
resources: | |
- configmaps | |
- endpoints | |
- persistentvolumeclaims | |
- pods | |
- replicationcontrollers | |
- replicationcontrollers/scale | |
- serviceaccounts | |
- services | |
verbs: | |
- get | |
- list | |
- watch | |
- apiGroups: | |
- "" | |
resources: | |
- bindings | |
- events | |
- limitranges | |
- namespaces/status | |
- pods/log | |
- pods/status | |
- replicationcontrollers/status | |
- resourcequotas | |
- resourcequotas/status | |
verbs: | |
- get | |
- list | |
- watch | |
- apiGroups: | |
- "" | |
resources: | |
- namespaces | |
verbs: | |
- get | |
- list | |
- watch | |
- apiGroups: | |
- apps | |
resources: | |
- controllerrevisions | |
- daemonsets | |
- deployments | |
- deployments/scale | |
- replicasets | |
- replicasets/scale | |
- statefulsets | |
- statefulsets/scale | |
verbs: | |
- get | |
- list | |
- watch | |
- apiGroups: | |
- autoscaling | |
resources: | |
- horizontalpodautoscalers | |
verbs: | |
- get | |
- list | |
- watch | |
- apiGroups: | |
- batch | |
resources: | |
- cronjobs | |
- jobs | |
verbs: | |
- get | |
- list | |
- watch | |
- apiGroups: | |
- extensions | |
resources: | |
- daemonsets | |
- deployments | |
- deployments/scale | |
- ingresses | |
- networkpolicies | |
- replicasets | |
- replicasets/scale | |
- replicationcontrollers/scale | |
verbs: | |
- get | |
- list | |
- watch | |
- apiGroups: | |
- policy | |
resources: | |
- poddisruptionbudgets | |
verbs: | |
- get | |
- list | |
- watch | |
- apiGroups: | |
- networking.k8s.io | |
resources: | |
- ingresses | |
- networkpolicies | |
verbs: | |
- get | |
- list | |
- watch | |
kind: List | |
metadata: | |
resourceVersion: "" | |
selfLink: "" | |
------- | |
resource: rolebindings | |
------- | |
apiVersion: v1 | |
items: [] | |
kind: List | |
metadata: | |
resourceVersion: "" | |
selfLink: "" | |
------- | |
resource: roles | |
------- | |
apiVersion: v1 | |
items: [] | |
kind: List | |
metadata: | |
resourceVersion: "" | |
selfLink: "" | |
------- | |
resource: authorizationpolicies | |
------- | |
apiVersion: v1 | |
items: [] | |
kind: List | |
metadata: | |
resourceVersion: "" | |
selfLink: "" | |
------- | |
resource: clusterrbacconfigs | |
------- | |
apiVersion: v1 | |
items: [] | |
kind: List | |
metadata: | |
resourceVersion: "" | |
selfLink: "" | |
------- | |
resource: rbacconfigs | |
------- | |
apiVersion: v1 | |
items: [] | |
kind: List | |
metadata: | |
resourceVersion: "" | |
selfLink: "" | |
------- | |
resource: servicerolebindings | |
------- | |
apiVersion: v1 | |
items: [] | |
kind: List | |
metadata: | |
resourceVersion: "" | |
selfLink: "" | |
------- | |
resource: serviceroles | |
------- | |
apiVersion: v1 | |
items: [] | |
kind: List | |
metadata: | |
resourceVersion: "" | |
selfLink: "" | |
------- | |
resource: priorityclasses | |
------- | |
apiVersion: v1 | |
items: | |
- apiVersion: scheduling.k8s.io/v1 | |
description: Used for system critical pods that must run in the cluster, but can | |
be moved to another node if necessary. | |
kind: PriorityClass | |
metadata: | |
creationTimestamp: "2019-12-03T04:43:10Z" | |
generation: 1 | |
name: system-cluster-critical | |
resourceVersion: "42" | |
selfLink: /apis/scheduling.k8s.io/v1/priorityclasses/system-cluster-critical | |
uid: 6899223c-1587-11ea-b5af-027e0b84da98 | |
value: 2000000000 | |
- apiVersion: scheduling.k8s.io/v1 | |
description: Used for system critical pods that must not be moved from their current | |
node. | |
kind: PriorityClass | |
metadata: | |
creationTimestamp: "2019-12-03T04:43:10Z" | |
generation: 1 | |
name: system-node-critical | |
resourceVersion: "41" | |
selfLink: /apis/scheduling.k8s.io/v1/priorityclasses/system-node-critical | |
uid: 68987a87-1587-11ea-b5af-027e0b84da98 | |
value: 2000001000 | |
kind: List | |
metadata: | |
resourceVersion: "" | |
selfLink: "" | |
------- | |
resource: authorizationpolicies | |
------- | |
apiVersion: v1 | |
items: [] | |
kind: List | |
metadata: | |
resourceVersion: "" | |
selfLink: "" | |
------- | |
resource: configurations | |
------- | |
apiVersion: v1 | |
items: | |
- apiVersion: serving.knative.dev/v1 | |
kind: Configuration | |
metadata: | |
annotations: | |
serving.knative.dev/creator: admin | |
serving.knative.dev/lastModifier: admin | |
creationTimestamp: "2019-12-03T12:44:53Z" | |
generation: 1 | |
labels: | |
serving.knative.dev/route: hello-example | |
serving.knative.dev/service: hello-example | |
name: hello-example | |
namespace: serving-tests | |
ownerReferences: | |
- apiVersion: serving.knative.dev/v1alpha1 | |
blockOwnerDeletion: true | |
controller: true | |
kind: Service | |
name: hello-example | |
uid: b40342c9-15ca-11ea-b5af-027e0b84da98 | |
resourceVersion: "57336" | |
selfLink: /apis/serving.knative.dev/v1/namespaces/serving-tests/configurations/hello-example | |
uid: b4085dc9-15ca-11ea-b5af-027e0b84da98 | |
spec: | |
template: | |
metadata: | |
annotations: | |
sidecar.istio.io/inject: "true" | |
creationTimestamp: null | |
name: hello-example-1 | |
spec: | |
containerConcurrency: 0 | |
containers: | |
- env: | |
- name: TARGET | |
value: OpenShift Meetup! | |
image: gcr.io/knative-samples/helloworld-go | |
name: user-container | |
readinessProbe: | |
successThreshold: 1 | |
tcpSocket: | |
port: 0 | |
resources: {} | |
timeoutSeconds: 300 | |
status: | |
conditions: | |
- lastTransitionTime: "2019-12-03T12:44:59Z" | |
status: "True" | |
type: Ready | |
latestCreatedRevisionName: hello-example-1 | |
latestReadyRevisionName: hello-example-1 | |
observedGeneration: 1 | |
kind: List | |
metadata: | |
resourceVersion: "" | |
selfLink: "" | |
------- | |
resource: revisions | |
------- | |
apiVersion: v1 | |
items: | |
- apiVersion: serving.knative.dev/v1 | |
kind: Revision | |
metadata: | |
annotations: | |
serving.knative.dev/creator: admin | |
serving.knative.dev/lastPinned: "1575377099" | |
sidecar.istio.io/inject: "true" | |
creationTimestamp: "2019-12-03T12:44:53Z" | |
generation: 1 | |
labels: | |
serving.knative.dev/configuration: hello-example | |
serving.knative.dev/configurationGeneration: "1" | |
serving.knative.dev/route: hello-example | |
serving.knative.dev/service: hello-example | |
name: hello-example-1 | |
namespace: serving-tests | |
ownerReferences: | |
- apiVersion: serving.knative.dev/v1alpha1 | |
blockOwnerDeletion: true | |
controller: true | |
kind: Configuration | |
name: hello-example | |
uid: b4085dc9-15ca-11ea-b5af-027e0b84da98 | |
resourceVersion: "57467" | |
selfLink: /apis/serving.knative.dev/v1/namespaces/serving-tests/revisions/hello-example-1 | |
uid: b40e6e6d-15ca-11ea-b5af-027e0b84da98 | |
spec: | |
containerConcurrency: 0 | |
containers: | |
- env: | |
- name: TARGET | |
value: OpenShift Meetup! | |
image: gcr.io/knative-samples/helloworld-go | |
name: user-container | |
readinessProbe: | |
successThreshold: 1 | |
tcpSocket: | |
port: 0 | |
resources: {} | |
timeoutSeconds: 300 | |
status: | |
conditions: | |
- lastTransitionTime: "2019-12-03T12:45:59Z" | |
message: The target is not receiving traffic. | |
reason: NoTraffic | |
severity: Info | |
status: "False" | |
type: Active | |
- lastTransitionTime: "2019-12-03T12:44:59Z" | |
status: "True" | |
type: ContainerHealthy | |
- lastTransitionTime: "2019-12-03T12:44:59Z" | |
status: "True" | |
type: Ready | |
- lastTransitionTime: "2019-12-03T12:44:59Z" | |
status: "True" | |
type: ResourcesAvailable | |
imageDigest: gcr.io/knative-samples/helloworld-go@sha256:5ea96ba4b872685ff4ddb5cd8d1a97ec18c18fae79ee8df0d29f446c5efe5f50 | |
logUrl: http://localhost:8001/api/v1/namespaces/knative-monitoring/services/kibana-logging/proxy/app/kibana#/discover?_a=(query:(match:(kubernetes.labels.knative-dev%2FrevisionUID:(query:'b40e6e6d-15ca-11ea-b5af-027e0b84da98',type:phrase)))) | |
observedGeneration: 1 | |
serviceName: hello-example-1 | |
kind: List | |
metadata: | |
resourceVersion: "" | |
selfLink: "" | |
------- | |
resource: routes | |
------- | |
apiVersion: v1 | |
items: | |
- apiVersion: serving.knative.dev/v1 | |
kind: Route | |
metadata: | |
annotations: | |
serving.knative.dev/creator: admin | |
serving.knative.dev/lastModifier: admin | |
creationTimestamp: "2019-12-03T12:44:53Z" | |
generation: 1 | |
labels: | |
serving.knative.dev/service: hello-example | |
name: hello-example | |
namespace: serving-tests | |
ownerReferences: | |
- apiVersion: serving.knative.dev/v1alpha1 | |
blockOwnerDeletion: true | |
controller: true | |
kind: Service | |
name: hello-example | |
uid: b40342c9-15ca-11ea-b5af-027e0b84da98 | |
resourceVersion: "57355" | |
selfLink: /apis/serving.knative.dev/v1/namespaces/serving-tests/routes/hello-example | |
uid: b413f714-15ca-11ea-b5af-027e0b84da98 | |
spec: | |
traffic: | |
- configurationName: hello-example | |
latestRevision: true | |
percent: 100 | |
status: | |
address: | |
url: http://hello-example.serving-tests.svc.cluster.local | |
conditions: | |
- lastTransitionTime: "2019-12-03T12:44:59Z" | |
status: "True" | |
type: AllTrafficAssigned | |
- lastTransitionTime: "2019-12-03T12:45:00Z" | |
status: "True" | |
type: IngressReady | |
- lastTransitionTime: "2019-12-03T12:45:00Z" | |
status: "True" | |
type: Ready | |
observedGeneration: 1 | |
traffic: | |
- latestRevision: true | |
percent: 100 | |
revisionName: hello-example-1 | |
url: http://hello-example.serving-tests.13.228.147.127.xip.io | |
kind: List | |
metadata: | |
resourceVersion: "" | |
selfLink: "" | |
------- | |
resource: services | |
------- | |
apiVersion: v1 | |
items: | |
- apiVersion: v1 | |
kind: Service | |
metadata: | |
creationTimestamp: "2019-12-03T12:44:59Z" | |
labels: | |
serving.knative.dev/route: hello-example | |
name: hello-example | |
namespace: serving-tests | |
ownerReferences: | |
- apiVersion: serving.knative.dev/v1alpha1 | |
blockOwnerDeletion: true | |
controller: true | |
kind: Route | |
name: hello-example | |
uid: b413f714-15ca-11ea-b5af-027e0b84da98 | |
resourceVersion: "57354" | |
selfLink: /api/v1/namespaces/serving-tests/services/hello-example | |
uid: b7a8aeea-15ca-11ea-b5af-027e0b84da98 | |
spec: | |
externalName: cluster-local-gateway.istio-system.svc.cluster.local | |
sessionAffinity: None | |
type: ExternalName | |
status: | |
loadBalancer: {} | |
- apiVersion: v1 | |
kind: Service | |
metadata: | |
annotations: | |
autoscaling.knative.dev/class: kpa.autoscaling.knative.dev | |
serving.knative.dev/creator: admin | |
sidecar.istio.io/inject: "true" | |
creationTimestamp: "2019-12-03T12:44:54Z" | |
labels: | |
app: hello-example-1 | |
networking.internal.knative.dev/serverlessservice: hello-example-1 | |
networking.internal.knative.dev/serviceType: Public | |
serving.knative.dev/configuration: hello-example | |
serving.knative.dev/configurationGeneration: "1" | |
serving.knative.dev/revision: hello-example-1 | |
serving.knative.dev/revisionUID: b40e6e6d-15ca-11ea-b5af-027e0b84da98 | |
serving.knative.dev/service: hello-example | |
name: hello-example-1 | |
namespace: serving-tests | |
ownerReferences: | |
- apiVersion: networking.internal.knative.dev/v1alpha1 | |
blockOwnerDeletion: true | |
controller: true | |
kind: ServerlessService | |
name: hello-example-1 | |
uid: b49e9147-15ca-11ea-b5af-027e0b84da98 | |
resourceVersion: "57307" | |
selfLink: /api/v1/namespaces/serving-tests/services/hello-example-1 | |
uid: b4ba4af1-15ca-11ea-b5af-027e0b84da98 | |
spec: | |
clusterIP: 172.20.3.163 | |
ports: | |
- name: http | |
port: 80 | |
protocol: TCP | |
targetPort: 8012 | |
sessionAffinity: None | |
type: ClusterIP | |
status: | |
loadBalancer: {} | |
- apiVersion: v1 | |
kind: Service | |
metadata: | |
annotations: | |
autoscaling.knative.dev/class: kpa.autoscaling.knative.dev | |
serving.knative.dev/creator: admin | |
sidecar.istio.io/inject: "true" | |
creationTimestamp: "2019-12-03T12:44:54Z" | |
labels: | |
app: hello-example-1 | |
networking.internal.knative.dev/serverlessservice: hello-example-1 | |
networking.internal.knative.dev/serviceType: Private | |
serving.knative.dev/configuration: hello-example | |
serving.knative.dev/configurationGeneration: "1" | |
serving.knative.dev/revision: hello-example-1 | |
serving.knative.dev/revisionUID: b40e6e6d-15ca-11ea-b5af-027e0b84da98 | |
serving.knative.dev/service: hello-example | |
name: hello-example-1-private | |
namespace: serving-tests | |
ownerReferences: | |
- apiVersion: networking.internal.knative.dev/v1alpha1 | |
blockOwnerDeletion: true | |
controller: true | |
kind: ServerlessService | |
name: hello-example-1 | |
uid: b49e9147-15ca-11ea-b5af-027e0b84da98 | |
resourceVersion: "57304" | |
selfLink: /api/v1/namespaces/serving-tests/services/hello-example-1-private | |
uid: b4b80021-15ca-11ea-b5af-027e0b84da98 | |
spec: | |
clusterIP: 172.20.26.67 | |
ports: | |
- name: http | |
port: 80 | |
protocol: TCP | |
targetPort: 8012 | |
- name: queue-metrics | |
port: 9090 | |
protocol: TCP | |
targetPort: queue-metrics | |
- name: http-usermetric | |
port: 9091 | |
protocol: TCP | |
targetPort: http-usermetric | |
- name: http-queueadm | |
port: 8022 | |
protocol: TCP | |
targetPort: 8022 | |
selector: | |
serving.knative.dev/revisionUID: b40e6e6d-15ca-11ea-b5af-027e0b84da98 | |
sessionAffinity: None | |
type: ClusterIP | |
status: | |
loadBalancer: {} | |
kind: List | |
metadata: | |
resourceVersion: "" | |
selfLink: "" | |
------- | |
resource: csidrivers | |
------- | |
apiVersion: v1 | |
items: [] | |
kind: List | |
metadata: | |
resourceVersion: "" | |
selfLink: "" | |
------- | |
resource: csinodes | |
------- | |
apiVersion: v1 | |
items: [] | |
kind: List | |
metadata: | |
resourceVersion: "" | |
selfLink: "" | |
------- | |
resource: storageclasses | |
------- | |
apiVersion: v1 | |
items: | |
- apiVersion: storage.k8s.io/v1 | |
kind: StorageClass | |
metadata: | |
annotations: | |
kubectl.kubernetes.io/last-applied-configuration: | | |
{"apiVersion":"storage.k8s.io/v1","kind":"StorageClass","metadata":{"annotations":{},"labels":{"k8s-addon":"storage-aws.addons.k8s.io"},"name":"default"},"parameters":{"type":"gp2"},"provisioner":"kubernetes.io/aws-ebs"} | |
creationTimestamp: "2019-12-03T04:44:13Z" | |
labels: | |
k8s-addon: storage-aws.addons.k8s.io | |
name: default | |
resourceVersion: "360" | |
selfLink: /apis/storage.k8s.io/v1/storageclasses/default | |
uid: 8df6df94-1587-11ea-b5af-027e0b84da98 | |
parameters: | |
type: gp2 | |
provisioner: kubernetes.io/aws-ebs | |
reclaimPolicy: Delete | |
volumeBindingMode: Immediate | |
- apiVersion: storage.k8s.io/v1 | |
kind: StorageClass | |
metadata: | |
annotations: | |
kubectl.kubernetes.io/last-applied-configuration: | | |
{"apiVersion":"storage.k8s.io/v1","kind":"StorageClass","metadata":{"annotations":{"storageclass.beta.kubernetes.io/is-default-class":"true"},"labels":{"k8s-addon":"storage-aws.addons.k8s.io"},"name":"gp2"},"parameters":{"type":"gp2"},"provisioner":"kubernetes.io/aws-ebs"} | |
storageclass.beta.kubernetes.io/is-default-class: "true" | |
creationTimestamp: "2019-12-03T04:44:13Z" | |
labels: | |
k8s-addon: storage-aws.addons.k8s.io | |
name: gp2 | |
resourceVersion: "361" | |
selfLink: /apis/storage.k8s.io/v1/storageclasses/gp2 | |
uid: 8df79f28-1587-11ea-b5af-027e0b84da98 | |
parameters: | |
type: gp2 | |
provisioner: kubernetes.io/aws-ebs | |
reclaimPolicy: Delete | |
volumeBindingMode: Immediate | |
kind: List | |
metadata: | |
resourceVersion: "" | |
selfLink: "" | |
------- | |
resource: volumeattachments | |
------- | |
apiVersion: v1 | |
items: [] | |
kind: List | |
metadata: | |
resourceVersion: "" | |
selfLink: "" |
Sign up for free
to join this conversation on GitHub.
Already have an account?
Sign in to comment