This is an OpenPGP proof that connects my OpenPGP key to this Github account. For details check out https://keyoxide.org/guides/openpgp-proofs
[Verifying my OpenPGP key: openpgp4fpr:CFDC4B62611448B6B47CA8A8294EEE1A896A6F84]
This is an OpenPGP proof that connects my OpenPGP key to this Github account. For details check out https://keyoxide.org/guides/openpgp-proofs
[Verifying my OpenPGP key: openpgp4fpr:CFDC4B62611448B6B47CA8A8294EEE1A896A6F84]
| apiVersion: v1 | |
| items: | |
| - apiVersion: apiextensions.k8s.io/v1beta1 | |
| kind: CustomResourceDefinition | |
| metadata: | |
| annotations: | |
| kubectl.kubernetes.io/last-applied-configuration: | | |
| {"apiVersion":"apiextensions.k8s.io/v1beta1","kind":"CustomResourceDefinition","metadata":{"annotations":{},"name":"awsiamroles.zalando.org"},"spec":{"additionalPrinterColumns":[{"JSONPath":".status.roleARN","description":"Full RoleARN","name":"RoleARN","type":"string"},{"JSONPath":".status.expiration","description":"Expiration time of the current credentials provisioned for the role","name":"Expiration","type":"string"}],"group":"zalando.org","names":{"categories":["all"],"kind":"AWSIAMRole","plural":"awsiamroles","singular":"awsiamrole"},"scope":"Namespaced","subresources":{"status":{}},"validation":{"openAPIV3Schema":{"properties":{"spec":{"properties":{"roleReference":{"description":"Reference to an AWS IAM role which can either be a role name\nor a full IAM role ARN.\n","minLength":3,"type":"string"},"roleSessionDu |
| def check(): | |
| prometheus_url = "http://prometheus.kube-system.svc.cluster.local./api/v1/query" | |
| metrics = {"_use_scheduled_time": True} | |
| try: | |
| container_selector = """{{container_name="{container_name}", pod_name="{pod_name}", namespace="{pod_namespace}"}}""".format(**entity) | |
| def request_prometheus_metric(query): | |
| params={"query": query.format(container_selector=container_selector)} |
| kind: ClusterRole | |
| apiVersion: rbac.authorization.k8s.io/v1 | |
| metadata: | |
| name: system:aggregated-metrics-reader | |
| labels: | |
| rbac.authorization.k8s.io/aggregate-to-view: "true" | |
| rbac.authorization.k8s.io/aggregate-to-edit: "true" | |
| rbac.authorization.k8s.io/aggregate-to-admin: "true" | |
| rules: | |
| - apiGroups: ["metrics.k8s.io"] |
| #!/usr/bin/env python3 | |
| import sys | |
| from pygments import highlight | |
| from pygments.lexers import BashLexer | |
| from pygments.formatters import HtmlFormatter | |
| print(highlight(sys.stdin.read(), BashLexer(), HtmlFormatter(full=True))) |
This Gist is now deprecated and the list of organizations running Kubernetes on AWS is hosted on https://github.com/hjacobs/kubernetes-on-aws-users
| apiVersion: extensions/v1beta1 | |
| kind: DaemonSet | |
| metadata: | |
| name: add-my-ssh-key | |
| labels: | |
| application: add-my-ssh-key | |
| spec: | |
| template: | |
| metadata: | |
| name: add-my-ssh-key |
| apiVersion: v1 | |
| kind: Pod | |
| metadata: | |
| name: host-access | |
| spec: | |
| # use a node selector matching the desired target node | |
| nodeSelector: | |
| kubernetes.io/hostname: ip-172-31-1-2.eu-central-1.compute.internal | |
| containers: | |
| - name: shell |
I hereby claim:
To claim this, I am signing this object: