-
Updated
Oct 7, 2021 - Go
k8s
Here are 3,752 public repositories matching this topic...
-
Updated
Oct 17, 2021 - JavaScript
difference behavior of `{{= workflow.creationTimestamp }}` and `{{ workflow.creationTimestamp }}`
-
Updated
Oct 19, 2021 - Go
-
Updated
Aug 22, 2021 - Java
Local PV (device) provisioner leaves a stale BDC in the following case:
- On PVC request, creates a BDC
- If the system doesn't have a matching BD, then PVC request keeps retrying, and so does the NDM operator that keeps retrying
- Now if the user deletes the PVC, then Local PV (device) provisioner doesn't get the trigger to process delete, as there was no PVC.
This causes the stale BDC
What's it about?
Upgrade Ingress API to networking.k8s.io/v1.
What's the reason why we need it?
Ingress is the core component that is used by the KubeSphere Routes feature. KubeSphere is still using the old api "extensions/v1beta1" both Frontend and Backend. However "extensions/v1beta1" Ingress is deprecated in v1.14+, unavailable in v1.22+. So we need to upgrade it to the latest v
On contexts with many APIs and APIs calling other APIs in chains, having too many spans in the zipkin/jaeger dashboards may lead to a too complex usage of such dashboards and of not necessary big data volumes.
For Tyk's admin team, the steps representing the time spent in each Tyk middleware are much valuable.
But the upstream APIs teams just want to know the global time spent in Tyk interna
Version:
Using Ubuntu 20.04.3 LTS and microk8s 1.22 (stable) v1.22.2 installed via snap
Input: sudo microk8s enable dns
Part of output: Warning: spec.template.metadata.annotations[scheduler.alpha.kubernetes.io/critical-pod]: non-functional in v1.16+; use the "priorityClassName" field instead
Input: sudo microk8s enable dashboard
Part of output: Warning: spec.template.spec.nodeSelector[bet
-
Updated
Oct 18, 2021 - Go
Add a test sending (e.g. config map) patches through the same API using:
- JSON patch
- Strategic merge patch
make sure the API client is able to set the content type properly according to the request body, and the patches are applied successfully.
centos 8.x 支持计划
centos 8.2 已经发布了,想了解下对 centos 8.x 的支持计划大概是怎样的,谢谢。
This feature enables the ipsec backend for Flannel in the k3sup install command
Expected Behaviour
An additional flag to k3sup install should enable ipsec for Flannel as
Hi,
It seems like naming a remote is subject to certain limitations as groupadd is executed (potentially 32chars?).
Example
apiVersion: gitkube.sh/v1alpha1
kind: Remote
metadata:
name: app-remote
namespace: my-really-really-really-long-nsk logs po/gitkub-
Updated
Sep 29, 2021 - Shell
-
Updated
Sep 1, 2021 - Go
-
Updated
Oct 18, 2021 - Python
Hi,
This is a useful tool for any DevOps/SRE teams managing K8S clusters and apps.
One question though, will this be able to detect changes to Secrets stored in an external store like the GoDday one or the HashiCorp Vault.
thanks,
KK
Support Linux brew
Expected Behaviour
For users to be able to test out arkade for different platforms, and to be able to override the settings, we should have an optional --arch flag and a help
-
Updated
Apr 7, 2021
-
Updated
May 7, 2021 - Go
-
Updated
Oct 18, 2021 - Go
-
Updated
Oct 15, 2021 - Go
Improve this page
Add a description, image, and links to the k8s topic page so that developers can more easily learn about it.
Add this topic to your repo
To associate your repository with the k8s topic, visit your repo's landing page and select "manage topics."
I'm using Dracula skin, but the selected text is almost unreadable. Is it expected behavior for this skin? How can I change the color of the selected text?
OS: OSX 11.5
K9s Rev: v0.24.15
K8s Rev: v1.18.20-gke.901