ahmetb/cloud-run-faq 1495
Unofficial FAQ and everything you've been wondering for Google Cloud Run ✨
Mount Microsoft Azure Blob Storage as local filesystem in Linux (inactive)
ahmetb/cloud-run-multi-region-terraform 38
Deploy a Cloud Run app to all available regions using Terraform.
Allow your GitHub repos to deploy to Google Cloud Run in a single click
Watches your application’s Microsoft Azure Blob Storage requests and keeps record of your blobs on Redis.
azure-sdk-for-go
Sample Cloud Run application
ahmetb/cloud-run-release-operator 2
[WIP] Automated canary deployment rollout tool for Cloud Run.
A curated list of resources about all things Cloud Run
startedahmetb/kubectx
started time in 23 minutes
push eventahmetb/twitter-audit-log
commit sha f0857fc6c4a16012f37a85167573f659698b502b
Periodic update: 2021-03-08 21:52:51+00:00
push time in 3 hours
startedahmetb/kubectx
started time in 3 hours
startedahmetb/kubectl-tree
started time in 5 hours
fork caetanogdp95/kubernetes-network-policy-recipes
Example recipes for Kubernetes Network Policies that you can just copy paste
fork in 6 hours
startedahmetb/cloud-run-faq
started time in 6 hours
fork AshwinShankarananda/kubectl-aliases
Programmatically generated handy kubectl aliases.
https://ahmet.im/blog/kubectl-aliases/
fork in 7 hours
startedahmetb/kubernetes-network-policy-recipes
started time in 8 hours
startedahmetb/kubectx
started time in 9 hours
startedahmetb/kubernetes-network-policy-recipes
started time in 10 hours
startedahmetb/kubectx
started time in 10 hours
startedahmetb/kubernetes-network-policy-recipes
started time in 10 hours
startedahmetb/cloud-run-faq
started time in 11 hours
issue openedahmetb/kubectl-tree
"kubectl tree" not working for Kubeflow profiles (not namespaced)
Maybe I am doing something horrrably wrong here (please correct me if so), or there seems to be a problem for getting the graph from a Kubeflow profiles CRD.
❯ kubectl tree profiles my-kubeflow-user
No resources are owned by this object through ownerReferences.
This resoruce look slike as follows (removed not necessary parts):
❯ kubectl get profiles my-kubeflow-user -o yaml
apiVersion: kubeflow.org/v1
kind: Profile
metadata:
name: my-kubeflow-user
spec:
owner:
kind: User
name: myuser@domain.com
This resource then creates e.g. a namespace:
❯ kubectl get ns my-kubeflow-user -o yaml
apiVersion: v1
kind: Namespace
metadata:
annotations:
owner: myuser@domain.com
labels:
app.kubernetes.io/part-of: kubeflow-profile
istio-injection: enabled
name: my-kubeflow-user
ownerReferences:
- apiVersion: kubeflow.org/v1
blockOwnerDeletion: true
controller: true
kind: Profile
name: my-kubeflow-user
uid: c39a1fbe-7805-4696-85a6-1234f902cc2b
status:
phase: Active
Maybe it is because it is a CRD, or because it is not namespaced?
created time in 12 hours
startedahmetb/kubectx
started time in 15 hours
startedahmetb/kubectx
started time in 15 hours
startedahmetb/kubectx
started time in 15 hours
startedahmetb/kubectx
started time in 15 hours
push eventkubernetes-sigs/krew-index
commit sha b6408176ca87856471bc72a55ae43cb7eae19306
[minio/direct-csi] Update version to v1.2.8 (#1091)
push time in 15 hours
PR merged kubernetes-sigs/krew-index
<!--
PLUGIN DEVELOPERS: If you are submitting a new plugin
- Make sure you read the Plugin Naming Guide: https://krew.sigs.k8s.io/docs/developer-guide/develop/naming-guide/
- Verify you can install your plugin locally: kubectl krew install --manifest=[...] --archive=[...]
-->
pr closed time in 15 hours
pull request commentkubernetes-sigs/krew-index
[minio/direct-csi] Update version to v1.2.8
[APPROVALNOTIFIER] This PR is APPROVED
This pull-request has been approved by: <a href="https://github.com/kubernetes-sigs/krew-index/pull/1091#issuecomment-792595699" title="Approved">ahmetb</a>, <a href="https://github.com/kubernetes-sigs/krew-index/pull/1091#" title="Author self-approved">Praveenrajmani</a>
The full list of commands accepted by this bot can be found here.
The pull request process is described here
<details > Needs approval from an approver in each of these files:
OWNERS[ahmetb]
Approvers can indicate their approval by writing /approve
in a comment
Approvers can cancel approval by writing /approve cancel
in a comment
</details>
<!-- META={"approvers":[]} -->
comment created time in 15 hours
pull request commentkubernetes-sigs/krew-index
[minio/direct-csi] Update version to v1.2.8
[APPROVALNOTIFIER] This PR is APPROVED
This pull-request has been approved by: <a href="https://github.com/kubernetes-sigs/krew-index/pull/1091#issuecomment-792595699" title="Approved">ahmetb</a>, <a href="https://github.com/kubernetes-sigs/krew-index/pull/1091#" title="Author self-approved">Praveenrajmani</a>
The full list of commands accepted by this bot can be found here.
The pull request process is described here
<details > Needs approval from an approver in each of these files:
OWNERS[ahmetb]
Approvers can indicate their approval by writing /approve
in a comment
Approvers can cancel approval by writing /approve cancel
in a comment
</details>
<!-- META={"approvers":[]} -->
comment created time in 15 hours
PR opened kubernetes-sigs/krew-index
<!--
PLUGIN DEVELOPERS: If you are submitting a new plugin
- Make sure you read the Plugin Naming Guide: https://krew.sigs.k8s.io/docs/developer-guide/develop/naming-guide/
- Verify you can install your plugin locally: kubectl krew install --manifest=[...] --archive=[...]
-->
pr created time in 15 hours
startedahmetb/kubectx
started time in 16 hours
startedahmetb/kubernetes-network-policy-recipes
started time in 17 hours
Faster way to switch between clusters and namespaces in kubectl
fork in 18 hours
fork sbulman/go-linq
.NET LINQ capabilities in Go
https://godoc.org/github.com/ahmetb/go-linq
fork in 18 hours
startedahmetb/kubernetes-network-policy-recipes
started time in 21 hours
startedahmetb/go-linq
started time in a day
Pull request review commentkubernetes-sigs/krew-index
+apiVersion: krew.googlecontainertools.github.com/v1alpha2+kind: Plugin+metadata:+ name: sniffer+spec:+ version: "v0.0.1"+ platforms:+ - selector:+ matchLabels:+ os: linux+ arch: amd64+ uri: https://github.com/sunny0826/kubectl-sniffer/releases/download/v0.0.1/sniffer_linux_amd64.tar.gz+ sha256: "13499ebe08ff7880ce2c6a83ae3981086a782e785c71c20a725b99256fa3578a"+ files:+ - from: "./sniffer"+ to: "."+ - from: LICENSE+ to: "."+ bin: "sniffer"+ - selector:+ matchLabels:+ os: darwin+ arch: amd64+ uri: https://github.com/sunny0826/kubectl-sniffer/releases/download/v0.0.1/sniffer_darwin_amd64.tar.gz+ sha256: "f9ec5b523612e82bb944c216b0d55a78a9657cbb42526bada7ea642280f30caf"+ files:+ - from: "./sniffer"+ to: "."+ - from: LICENSE+ to: "."+ bin: "sniffer"+ - selector:+ matchLabels:+ os: windows+ arch: amd64+ uri: https://github.com/sunny0826/kubectl-sniffer/releases/download/v0.0.1/sniffer_windows_amd64.zip+ sha256: "100c6c058cc041b41cbaec728ddc303511366ef5474a0549a98b809c7ee2b8ca"+ files:+ - from: "/sniffer.exe"+ to: "."+ - from: LICENSE+ to: "."+ bin: "sniffer.exe"+ shortDescription: Sniffing pod-related resources+ homepage: https://github.com/sunny0826/kubectl-sniffer+ description: |+ Find related workloads, namespace, node, service, configmap, secret,
Information about the pod's own dependent resources: namespace, node, container, and its mounted configmap and secret, as well as resources that have the same label
as the pod and serve it: servie, ingress, HPA, etc.
just like:
k pod-lens all-logs-fluentd-6
└─┬ [Namespace] kube-system
└─┬ [statefulset] all-logs-fluentd Replica: 8/8
├─┬ [Node] ip-172-31-49-23.cn-north-1.compute.internal [Ready] Node IP: 172.31.49.23
│ └─┬ [Pod] all-logs-fluentd-6 [Running] Pod IP: 100.99.78.33
│ ├── [Container] config-reloader [Running] Restart: 0
│ └── [Container] fluentd [Running] Restart: 0
├── [PVC] all-logs-fluentd-buffer-all-logs-fluentd-6
├── [Secret] all-logs-fluentd
├── [Secret] all-logs-fluentd-app
├── [Secret] all-logs-fluentd-output
└── [Secret] all-logs-fluentd-token-g9d82
Related Resources
Kind: StatefulSet
Name: all-logs-fluentd
Replicas: 8
--- ---
Kind: Service
Name: all-logs-fluentd
Cluster IP: 100.69.216.134
Ports
---
Name: tcp-fluentd
Port: 24240
TargetPort: 24240
---
Name: udp-fluentd
Port: 24240
TargetPort: 24240
--- ---
Kind: PVC
Name: all-logs-fluentd-buffer-all-logs-fluentd-0
Storage Class: gp2
Access Modes: ReadWriteOnce
Size: 20Gi
PV Name: pvc-1db4d98a-cec7-4c87-b949-2848a2eb79f7
--- ---
Kind: PVC
Name: all-logs-fluentd-buffer-all-logs-fluentd-1
Storage Class: gp2
Access Modes: ReadWriteOnce
Size: 20Gi
PV Name: pvc-83ee3807-20e8-4080-bd5d-4bd703835f8c
--- ---
Kind: PVC
Name: all-logs-fluentd-buffer-all-logs-fluentd-2
Storage Class: gp2
Access Modes: ReadWriteOnce
Size: 20Gi
PV Name: pvc-3404ff1d-bbee-47ab-81b4-31f10368eef2
--- ---
Kind: PVC
Name: all-logs-fluentd-buffer-all-logs-fluentd-3
Storage Class: gp2
Access Modes: ReadWriteOnce
Size: 20Gi
PV Name: pvc-f9d1ad7e-5d52-4fc2-90ae-bbf44f34ee76
--- ---
Kind: PVC
Name: all-logs-fluentd-buffer-all-logs-fluentd-4
Storage Class: gp2
Access Modes: ReadWriteOnce
Size: 20Gi
PV Name: pvc-495e41be-73b7-4a5d-b8c9-81e2aeef379a
--- ---
Kind: PVC
Name: all-logs-fluentd-buffer-all-logs-fluentd-5
Storage Class: gp2
Access Modes: ReadWriteOnce
Size: 20Gi
PV Name: pvc-70a6da49-a9ca-4e9a-8964-c76d8ffa30e5
--- ---
Kind: PVC
Name: all-logs-fluentd-buffer-all-logs-fluentd-6
Storage Class: gp2
Access Modes: ReadWriteOnce
Size: 20Gi
PV Name: pvc-6f5b7577-f09a-413f-9fab-54e84ad2b638
--- ---
Kind: PVC
Name: all-logs-fluentd-buffer-all-logs-fluentd-7
Storage Class: gp2
Access Modes: ReadWriteOnce
Size: 20Gi
PV Name: pvc-fe8cbe07-39d7-4593-b075-f70c7099c4c6
--- ---
Kind: Secrets
Name: all-logs-fluentd
--- ---
Kind: Secrets
Name: all-logs-fluentd-app
--- ---
Kind: Secrets
Name: all-logs-fluentd-configcheck-47774f7d
--- ---
Kind: Secrets
Name: all-logs-fluentd-configcheck-a23682d8
--- ---
Kind: Secrets
Name: all-logs-fluentd-configcheck-output-47774f7d
--- ---
Kind: Secrets
Name: all-logs-fluentd-configcheck-output-a23682d8
--- ---
comment created time in a day