./konveyor-analyzer --rules rule-example.yaml --provider-settings provider_settings.json --output-file /tmp/report
./konveyor-analyzer-dep --provider-settings provider_settings.json
apiVersion: v1 | |
kind: List | |
items: | |
- kind: Namespace | |
apiVersion: v1 | |
metadata: | |
name: mysql-persistent | |
labels: | |
app: mysql | |
- apiVersion: v1 |
#!/usr/bin/python | |
from re import search | |
from json import dumps | |
from sys import exit, argv | |
from yaml import safe_load | |
def _pprint(d: dict): | |
print(dumps(d, sort_keys=True, indent=4)) | |
def _violations_stats(): |
This ansible playbook helps create non-admin users on OpenShift using htpasswd
. It creates htpasswd users in a file, creates a secret in OpenShift with the htpasswd user data and creates a HTPasswd provider that uses that Secret.
Make sure you have python-kubernetes
and python-passlib
modules installed in your system
Copy default.yaml
and htpasswd-users.yaml
in a directory.
Configure following variables in default.yaml
file:
# users to add
apiVersion: tekton.dev/v1beta1 | |
kind: PipelineRun | |
metadata: | |
name: cutover-pipeline-xz565q | |
namespace: rocket-chat | |
spec: | |
params: | |
- name: source-cluster-secret | |
value: source-cluster-tnh75 | |
- name: source-namespace |
Both of these scripts require oc login
to the source cluster.
dvmRetryEnvUp.sh
script takes a list of comma-separated namespaces as an argument and deploys a test app which can be used to test DVM retry mechanism.
To deploy the test app in dvm-retry-test
namespace:
- apiVersion: extensions/v1beta1 | |
kind: NetworkPolicy | |
metadata: | |
name: nw-policy-0 | |
namespace: dvm-retry-test | |
spec: | |
podSelector: {} | |
policyTypes: | |
- Egress | |
- Ingress |
To deploy the test app on your source cluster, login to the cluster and run:
./pvResizeEnvUp.sh
The app will be deployed in pv-resize-test
namespace.