content large_stringlengths 3 20.5k | url large_stringlengths 54 193 | branch large_stringclasses 4
values | source large_stringclasses 42
values | embeddings listlengths 384 384 | score float64 -0.21 0.65 |
|---|---|---|---|---|---|
# NS1 This tutorial describes how to setup ExternalDNS for use within a Kubernetes cluster using NS1 DNS. Make sure to use \*\*>=0.5\*\* version of ExternalDNS for this tutorial. ## Creating a zone with NS1 DNS If you are new to NS1, we recommend you first read the following instructions for creating a zone. [Creating ... | https://github.com/kubernetes-sigs/external-dns/blob/master//docs/tutorials/ns1.md | master | external-dns | [
-0.024233805015683174,
-0.10778140276670456,
-0.004086249973624945,
-0.03464582562446594,
-0.10321560502052307,
-0.022214459255337715,
-0.03725677728652954,
0.010549508966505527,
0.03997785598039627,
0.037066493183374405,
-0.06350488215684891,
-0.10256411135196686,
0.016776585951447487,
0.... | 0.144032 |
external-dns spec: serviceAccountName: external-dns containers: - name: external-dns image: registry.k8s.io/external-dns/external-dns:v0.21.0 args: - --source=service # ingress is also possible - --domain-filter=example.com # (optional) limit to only example.com domains; change to match the zone created above. - --prov... | https://github.com/kubernetes-sigs/external-dns/blob/master//docs/tutorials/ns1.md | master | external-dns | [
-0.08281774818897247,
-0.00847453624010086,
0.010934881865978241,
-0.08929726481437683,
-0.02859044075012207,
-0.0890936404466629,
0.02022157423198223,
-0.011498954147100449,
0.055463701486587524,
0.05586909502744675,
-0.05109705775976181,
-0.06952717900276184,
-0.02441967837512493,
0.0335... | 0.071737 |
# TransIP This tutorial describes how to setup ExternalDNS for usage within a Kubernetes cluster using TransIP. Make sure to use \*\*>=0.5.14\*\* version of ExternalDNS for this tutorial, have at least 1 domain registered at TransIP and enabled the API. ## Enable TransIP API and prepare your API key To use the TransIP ... | https://github.com/kubernetes-sigs/external-dns/blob/master//docs/tutorials/transip.md | master | external-dns | [
-0.06560070067644119,
-0.07450928539037704,
-0.003623279510065913,
-0.014745152555406094,
-0.10365869849920273,
0.013088579289615154,
-0.00038431293796747923,
0.04909837618470192,
0.10813027620315552,
0.01378741767257452,
-0.010924337431788445,
-0.08487271517515182,
-0.003435970051214099,
... | 0.16038 |
Check your [TransIP Control Panel](https://transip.eu/cp) to view the records for your TransIP DNS zone. Click on the zone for the one created above if a different domain was used. This should show the external IP address of the service as the A record for your domain. | https://github.com/kubernetes-sigs/external-dns/blob/master//docs/tutorials/transip.md | master | external-dns | [
-0.03442399203777313,
-0.10297912359237671,
0.021055003628134727,
-0.0805925652384758,
-0.06355328857898712,
-0.07515133172273636,
-0.014906669966876507,
0.0034608705900609493,
0.10833635181188583,
-0.04128383472561836,
-0.019767839461565018,
0.02096414566040039,
-0.018427234143018723,
0.0... | 0.015099 |
# IONOS Cloud This tutorial describes how to set up ExternalDNS for use within a Kubernetes cluster using IONOS Cloud DNS. For more details, visit the [IONOS external-dns webhook repository](https://github.com/ionos-cloud/external-dns-ionos-webhook). You can also find the [external-dns-ionos-webhook container image](ht... | https://github.com/kubernetes-sigs/external-dns/blob/master//docs/tutorials/ionoscloud.md | master | external-dns | [
-0.04902897775173187,
0.021769361570477486,
0.004530435428023338,
-0.028378715738654137,
-0.10133009403944016,
-0.025165759027004242,
0.00008694807911524549,
0.011838721111416817,
0.06212111562490463,
0.051187850534915924,
-0.04309816285967827,
-0.09519757330417633,
0.025218617171049118,
-... | 0.134999 |
the `echoserver` application within the cluster. The service will also include an annotation for ExternalDNS to create a DNS record for the specified hostname. Save the following content in a file named `echoserver-service.yaml`: ```yaml apiVersion: v1 kind: Service metadata: name: echoserver annotations: external-dns.... | https://github.com/kubernetes-sigs/external-dns/blob/master//docs/tutorials/ionoscloud.md | master | external-dns | [
-0.0023279781453311443,
-0.015674520283937454,
-0.011912652291357517,
-0.0674833133816719,
-0.0743781104683876,
-0.044134318828582764,
-0.01960456185042858,
-0.03975408151745796,
0.08531172573566437,
0.04620631784200668,
-0.04289594665169716,
-0.06930620223283768,
-0.007446270436048508,
-0... | 0.150553 |
resources created during this tutorial: ```bash kubectl delete -f echoserver-deployment.yaml kubectl delete -f echoserver-service.yaml kubectl delete -f echoserver-ingress.yaml ``` ## Summary In this tutorial, you successfully deployed ExternalDNS webhook with IONOS Cloud DNS as the provider. You created a Kubernetes d... | https://github.com/kubernetes-sigs/external-dns/blob/master//docs/tutorials/ionoscloud.md | master | external-dns | [
-0.06383408606052399,
0.045320961624383926,
0.014143482781946659,
-0.06870417296886444,
-0.059586308896541595,
-0.06729315966367722,
-0.0021677440963685513,
-0.05067439004778862,
0.08364793658256531,
0.03816660866141319,
0.010272917337715626,
-0.06537741422653198,
0.00939264614135027,
-0.0... | 0.145767 |
# kube-ingress-aws-controller This tutorial describes how to use ExternalDNS with the [kube-ingress-aws-controller][1]. [1]: https://github.com/zalando-incubator/kube-ingress-aws-controller ## Setting up ExternalDNS and kube-ingress-aws-controller Follow the [AWS tutorial](aws.md) to setup ExternalDNS for use in Kubern... | https://github.com/kubernetes-sigs/external-dns/blob/master//docs/tutorials/kube-ingress-aws.md | master | external-dns | [
-0.05736041069030762,
-0.01387520506978035,
-0.03479532524943352,
0.005116582848131657,
-0.021441612392663956,
0.0008144849562086165,
0.046553097665309906,
-0.035516802221536636,
0.0809934064745903,
0.08086403459310532,
-0.017719093710184097,
-0.14516562223434448,
0.058831483125686646,
-0.... | 0.11862 |
no effect. If you would like ExternalDNS to not create AAAA records at all, you can add the following command line parameter: `--exclude-record-types=AAAA`. Please be aware, this will disable AAAA record creation even for dualstack enabled load balancers. Note that the above example makes use of the YAML anchor feature... | https://github.com/kubernetes-sigs/external-dns/blob/master//docs/tutorials/kube-ingress-aws.md | master | external-dns | [
-0.10588832199573517,
0.026498742401599884,
0.0021014977246522903,
-0.004383507650345564,
-0.07652387768030167,
-0.04996350780129433,
-0.050749797374010086,
-0.05782163888216019,
0.06965503841638565,
0.03193371742963791,
-0.005721414927393198,
-0.04892529919743538,
-0.004025592934340239,
-... | 0.091782 |
# Cloudflare DNS This tutorial describes how to setup ExternalDNS for usage within a Kubernetes cluster using Cloudflare DNS. Make sure to use \*\*>=0.4.2\*\* version of ExternalDNS for this tutorial. ## Creating a Cloudflare DNS zone We highly recommend to read this tutorial if you haven't used Cloudflare before: [Cre... | https://github.com/kubernetes-sigs/external-dns/blob/master//docs/tutorials/cloudflare.md | master | external-dns | [
-0.016550373286008835,
-0.1167871356010437,
0.0045396569184958935,
-0.0450991615653038,
-0.08994413167238235,
0.00707201799377799,
-0.03435175493359566,
0.002460324903950095,
0.10373479127883911,
0.02748306281864643,
-0.025658555328845978,
-0.07412982732057571,
0.02605404704809189,
-0.0341... | 0.064878 |
deploy ExternalDNS. ### Using Helm Create a values.yaml file to configure ExternalDNS to use CloudFlare as the DNS provider. This file should include the necessary environment variables: ```yaml provider: name: cloudflare env: - name: CF\_API\_KEY valueFrom: secretKeyRef: name: cloudflare-api-key key: apiKey - name: CF... | https://github.com/kubernetes-sigs/external-dns/blob/master//docs/tutorials/cloudflare.md | master | external-dns | [
-0.0288663599640131,
-0.06485900282859802,
0.004547577816992998,
-0.07886958122253418,
-0.005121589172631502,
-0.020268600434064865,
-0.029782146215438843,
0.04642173647880554,
0.1316043883562088,
0.06815589964389801,
0.003827076405286789,
-0.07646965235471725,
-0.0021682654041796923,
-0.0... | 0.003281 |
image: nginx name: nginx ports: - containerPort: 80 --- apiVersion: v1 kind: Service metadata: name: nginx annotations: external-dns.alpha.kubernetes.io/hostname: example.com external-dns.alpha.kubernetes.io/ttl: "120" #optional spec: selector: app: nginx type: LoadBalancer ports: - protocol: TCP port: 80 targetPort: 8... | https://github.com/kubernetes-sigs/external-dns/blob/master//docs/tutorials/cloudflare.md | master | external-dns | [
-0.03873846307396889,
-0.01601353846490383,
0.030511949211359024,
-0.12128208577632904,
-0.043321579694747925,
-0.026055816560983658,
0.013977326452732086,
-0.057587601244449615,
0.12412317097187042,
0.017992302775382996,
-0.05002880096435547,
-0.03816912695765495,
-0.03432011231780052,
0.... | 0.052812 |
to `none`, which explicitly means no Certificate Authority (CA) is set when using the Cloudflare API. Specifying a custom CA is only possible for enterprise accounts. The custom hostname DNS must resolve to the Cloudflare DNS record (`external-dns.alpha.kubernetes.io/hostname`) for automatic certificate validation via ... | https://github.com/kubernetes-sigs/external-dns/blob/master//docs/tutorials/cloudflare.md | master | external-dns | [
-0.008666589856147766,
-0.06576080620288849,
-0.07787305861711502,
-0.046136412769556046,
0.0010987457353621721,
-0.06126682460308075,
-0.007289033383131027,
0.002250917488709092,
0.1389055997133255,
-0.02195967175066471,
0.008966107852756977,
-0.09729206562042236,
0.04451272264122963,
0.0... | 0.028249 |
# Myra ExternalDNS Webhook This guide provides quick instructions for setting up and testing the [Myra ExternalDNS Webhook](https://github.com/Myra-Security-GmbH/external-dns-myrasec-webhook) in a Kubernetes environment. ## Prerequisites - Kubernetes cluster (v1.19+) - `kubectl` configured to access your cluster - Dock... | https://github.com/kubernetes-sigs/external-dns/blob/master//docs/tutorials/myra.md | master | external-dns | [
-0.07268770039081573,
0.005253379233181477,
-0.0486544594168663,
-0.04508887231349945,
0.013608140870928764,
-0.027791593223810196,
-0.04270098730921745,
0.0011332855792716146,
0.05990484356880188,
0.018521560356020927,
-0.0259210467338562,
-0.07970431447029114,
0.006863909773528576,
-0.03... | 0.12639 |
the webhook logs kubectl logs -l app=myra-externaldns -c myra-webhook | grep "Deleted DNS record" ``` ## Configuration Options The webhook can be configured through the ConfigMap: | Parameter | Description | Default | | ------------------------ | ------------------------------------------------- | --------- | | `disabl... | https://github.com/kubernetes-sigs/external-dns/blob/master//docs/tutorials/myra.md | master | external-dns | [
-0.0446196049451828,
0.03091765008866787,
-0.03349562734365463,
-0.026189714670181274,
0.0043647149577736855,
-0.09109114110469818,
-0.04575162008404732,
-0.053308092057704926,
0.03626350313425064,
0.05320332199335098,
0.01893826760351658,
-0.11467168480157852,
-0.00918335560709238,
-0.083... | 0.11084 |
# AWS This tutorial describes how to setup ExternalDNS for usage within a Kubernetes cluster on AWS. Make sure to use \*\*>=0.15.0\*\* version of ExternalDNS for this tutorial ## IAM Policy The following IAM Policy document allows ExternalDNS to update Route53 Resource Record Sets and Hosted Zones. You'll want to creat... | https://github.com/kubernetes-sigs/external-dns/blob/master//docs/tutorials/aws.md | master | external-dns | [
-0.043152354657649994,
-0.014956813305616379,
0.009933159686625004,
0.027010396122932434,
-0.024832919239997864,
0.002428838750347495,
-0.04102826490998268,
-0.05913063511252403,
0.0719492956995964,
0.11632555723190308,
-0.03690467029809952,
-0.07416534423828125,
0.007223552092909813,
-0.0... | 0.114186 |
Role. This will allow nodes in the Kubernetes cluster to access Route53 zones, which allows ExternalDNS to update DNS records. Given that this allows all containers to access Route53, not just ExternalDNS, running on the node with these privileges, this method is not recommended, and is only suitable for limited test e... | https://github.com/kubernetes-sigs/external-dns/blob/master//docs/tutorials/aws.md | master | external-dns | [
-0.027510790154337883,
-0.00005684960342478007,
0.009487421251833439,
0.027613045647740364,
-0.03735421970486641,
-0.005184660665690899,
-0.009242778643965721,
-0.04760909825563431,
0.08440213650465012,
0.07564784586429596,
-0.04748566821217537,
-0.08099553734064102,
0.03422848880290985,
-... | 0.164165 |
]]; then ROLE\_NAME=$ROLE; fi done fi done echo $ROLE\_NAME } NODE\_ROLE\_NAME=$(findRoleName $INSTANCE\_ID) ``` Using the role name, you can associate the policy that was created earlier: ```bash # attach policy arn created earlier to node IAM role aws iam attach-role-policy --role-name $NODE\_ROLE\_NAME --policy-arn ... | https://github.com/kubernetes-sigs/external-dns/blob/master//docs/tutorials/aws.md | master | external-dns | [
0.013312912546098232,
-0.053985048085451126,
0.02693883888423443,
0.020908581092953682,
0.017801558598876,
0.01049763523042202,
0.07002009451389313,
-0.04810543358325958,
0.03418021649122238,
0.08102981001138687,
0.021829470992088318,
-0.043846018612384796,
0.061437226831912994,
-0.0000108... | 0.166963 |
ExternalDNS. > [!NOTE] > Similar methods to IRSA on AWS are [kiam](https://github.com/uswitch/kiam), which is in maintenence mode, and has [instructions](https://github.com/uswitch/kiam/blob/HEAD/docs/IAM.md) for creating an IAM role, and also [kube2iam](https://github.com/jtblin/kube2iam). > IRSA is the officially sup... | https://github.com/kubernetes-sigs/external-dns/blob/master//docs/tutorials/aws.md | master | external-dns | [
-0.057910993695259094,
-0.025716371834278107,
-0.07538708299398422,
0.06858502328395844,
-0.011512494646012783,
-0.02171798050403595,
0.017794402316212654,
-0.0020325102377682924,
0.06446204334497452,
0.046980295330286026,
0.010287727229297161,
-0.08504161238670349,
0.013977041468024254,
-... | 0.183307 |
error with `failed to list hosted zones: AccessDenied: User`. You can delete the current running ExternalDNS pod(s) after updating the annotation, so that new pods scheduled will have appropriate configuration to access Route53. ### EKS Pod Identity Associations Alternatively to [IRSA](#iam-roles-for-service-accounts) ... | https://github.com/kubernetes-sigs/external-dns/blob/master//docs/tutorials/aws.md | master | external-dns | [
-0.004687483422458172,
0.0023703628685325384,
-0.0012106784852221608,
0.0351511649787426,
0.029173966497182846,
-0.008546009659767151,
0.020371176302433014,
-0.05677376687526703,
0.054479487240314484,
0.10236074030399323,
-0.03260599821805954,
-0.08787086606025696,
-0.011996151879429817,
-... | 0.192083 |
"example.com." --query HostedZones[0].Id --out text) aws route53 list-resource-record-sets --output text \ --hosted-zone-id $ZONE\_ID --query \ "ResourceRecordSets[?Type == 'NS'].ResourceRecords[\*].Value | []" | tr '\t' '\n' ``` This should yield something similar this: ```sh ns-695.awsdns-22.net. ns-1313.awsdns-36.or... | https://github.com/kubernetes-sigs/external-dns/blob/master//docs/tutorials/aws.md | master | external-dns | [
0.00007180373359005898,
-0.009056883864104748,
-0.06848873198032379,
0.026284608989953995,
-0.008143558166921139,
-0.05930505692958832,
-0.007764234207570553,
-0.05336611717939377,
0.08756393194198608,
0.04731159284710884,
-0.04727674275636673,
-0.11598233133554459,
0.026401953771710396,
-... | 0.056973 |
the full list, but a few arguments that where chosen. ### aws-zone-type `aws-zone-type` allows filtering for private and public zones ## Annotations Annotations which are specific to AWS. ### alias `external-dns.alpha.kubernetes.io/alias` if set to `true` on an ingress, it will create two ALIAS records (one 'A' for IPv... | https://github.com/kubernetes-sigs/external-dns/blob/master//docs/tutorials/aws.md | master | external-dns | [
-0.04532620310783386,
0.06767605990171432,
0.049034733325242996,
-0.040083032101392746,
0.019375212490558624,
-0.06554651260375977,
0.056358978152275085,
-0.010653478093445301,
0.08390595763921738,
0.07023851573467255,
-0.0455370657145977,
-0.11319222301244736,
0.027103763073682785,
-0.046... | 0.092146 |
"TXT", "TTL": 300, "ResourceRecords": [ { "Value": "\"heritage=external-dns,external-dns/owner=external-dns,external-dns/resource=service/default/nginx\"" } ] } ] ``` Note created TXT record alongside ALIAS records. TXT record signifies that the corresponding ALIAS records are managed by ExternalDNS. This makes Externa... | https://github.com/kubernetes-sigs/external-dns/blob/master//docs/tutorials/aws.md | master | external-dns | [
-0.09536384046077728,
0.02524212747812271,
-0.02648485265672207,
-0.006785941310226917,
0.017578190192580223,
-0.04289453476667404,
-0.024670781567692757,
0.016839388757944107,
0.07136498391628265,
0.030858544632792473,
-0.04646163806319237,
-0.05234277620911598,
0.04340135306119919,
-0.06... | -0.000899 |
for a record can be controlled with the following annotations: - `external-dns.alpha.kubernetes.io/set-identifier`: this \*\*needs\*\* to be set to use any of the following routing policies For any given DNS name, only \*\*one\*\* of the following routing policies can be used: - Weighted records: `external-dns.alpha.ku... | https://github.com/kubernetes-sigs/external-dns/blob/master//docs/tutorials/aws.md | master | external-dns | [
-0.019790824502706528,
-0.016058186069130898,
-0.013107789680361748,
-0.009581646881997585,
-0.07053487002849579,
-0.012170695699751377,
-0.007379836402833462,
-0.022434379905462265,
0.06232428923249245,
0.039628177881240845,
-0.08935803174972534,
-0.08946216851472855,
0.012653406709432602,
... | 0.089431 |
If services and ingresses need to make Route 53 entries to an public zone in a commercial account, you will have set env variables of `AWS\_ACCESS\_KEY\_ID` and `AWS\_SECRET\_ACCESS\_KEY` with a key and secret to the commercial account that has the sufficient rights. ```yaml env: - name: AWS\_ACCESS\_KEY\_ID value: XXX... | https://github.com/kubernetes-sigs/external-dns/blob/master//docs/tutorials/aws.md | master | external-dns | [
-0.0638306513428688,
-0.01579633168876171,
-0.060031235218048096,
-0.015393434092402458,
-0.051094137132167816,
-0.0004551675810944289,
-0.011668932624161243,
-0.037539638578891754,
0.08817551285028458,
0.023243015632033348,
-0.04421946406364441,
-0.054249390959739685,
0.11534232646226883,
... | -0.057987 |
`--domain-filter=example.com` by domain suffix - specify multiple times if needed - `--regex-domain-filter=example\*` by domain suffix but as a regex - overrides domain-filter - `--exclude-domains=ignore.this.example.com` to exclude a domain or subdomain - `--regex-domain-exclusion=ignore\*` subtracts it's matches from... | https://github.com/kubernetes-sigs/external-dns/blob/master//docs/tutorials/aws.md | master | external-dns | [
-0.003215715754777193,
0.010315838269889355,
0.019207406789064407,
-0.029939284548163414,
0.0330340713262558,
-0.10450181365013123,
0.0026009867433458567,
-0.10077673941850662,
0.06720804423093796,
0.012138152495026588,
-0.020901786163449287,
-0.06551303714513779,
0.0330057293176651,
-0.04... | -0.022761 |
# RFC2136 provider This tutorial describes how to use the RFC2136 with either BIND or Windows DNS. ## Deploying BIND9 on Kubernetes with Kind This section walks through deploying BIND9 and ExternalDNS inside a local Kubernetes cluster using [Kind](https://kind.sigs.k8s.io/). It provides a self-contained lab environment... | https://github.com/kubernetes-sigs/external-dns/blob/master//docs/tutorials/rfc2136.md | master | external-dns | [
-0.0645352452993393,
-0.026052381843328476,
0.05469303950667381,
-0.023781877011060715,
-0.11594680696725845,
0.017540110275149345,
-0.04208465293049812,
0.03985193744301796,
0.03310094401240349,
0.026308268308639526,
-0.05182640999555588,
-0.052883509546518326,
-0.02235753834247589,
-0.04... | 0.118567 |
Verify DNS records Query the forward zone for A records: ```sh dig @127.0.0.1 -p 5354 +tcp app.example.local A +short ❯❯ 192.168.49.10 dig @127.0.0.1 -p 5354 +tcp api.example.local A +short ❯❯ 192.168.49.20 dig @127.0.0.1 -p 5354 +tcp svc.example.local A +short ❯❯ 192.168.49.50 ``` Query the reverse zone for PTR record... | https://github.com/kubernetes-sigs/external-dns/blob/master//docs/tutorials/rfc2136.md | master | external-dns | [
-0.05173759534955025,
0.03403256833553314,
0.033356085419654846,
-0.05309449881315231,
-0.015434975735843182,
-0.07937350124120712,
-0.02042889967560768,
-0.01354944333434105,
0.006471527740359306,
0.09490235149860382,
0.003998676780611277,
-0.036949239671230316,
-0.02563568390905857,
-0.0... | 0.004563 |
AXFR and the sync policy When using the `sync` policy, ExternalDNS requires AXFR (zone transfer) to be explicitly enabled via the `--rfc2136-tsig-axfr` flag. This is necessary for ExternalDNS to list all existing DNS records and determine which ones should be lifecycled. Without `--rfc2136-tsig-axfr`, ExternalDNS canno... | https://github.com/kubernetes-sigs/external-dns/blob/master//docs/tutorials/rfc2136.md | master | external-dns | [
-0.13318192958831787,
-0.07873782515525818,
-0.009878784418106079,
-0.034410830587148666,
0.02468074858188629,
-0.07202883064746857,
-0.015683025121688843,
-0.07404354959726334,
0.053799569606781006,
0.04741084203124046,
-0.024932267144322395,
-0.04683034494519234,
-0.016492385417222977,
-... | 0.083891 |
apiGroup: rbac.authorization.k8s.io kind: ClusterRole name: external-dns subjects: - kind: ServiceAccount name: external-dns namespace: external-dns --- apiVersion: apps/v1 kind: Deployment metadata: name: external-dns namespace: external-dns spec: selector: matchLabels: app: external-dns template: metadata: labels: ap... | https://github.com/kubernetes-sigs/external-dns/blob/master//docs/tutorials/rfc2136.md | master | external-dns | [
-0.05602233484387398,
-0.02810659445822239,
-0.03573589771986008,
-0.016167495399713516,
-0.05152135342359543,
-0.037523962557315826,
-0.034708403050899506,
-0.017311790958046913,
0.034718528389930725,
0.04389467090368271,
-0.02681851200759411,
-0.062236983329057693,
0.01044224388897419,
0... | 0.112854 |
to the host's domain name or IP address. However, it also determines the name of the Kerberos principal which is used during authentication. This means that Active Directory might only work if this is set to a specific domain name, possibly leading to errors like this: `KDC\_ERR\_S\_PRINCIPAL\_UNKNOWN Server not found ... | https://github.com/kubernetes-sigs/external-dns/blob/master//docs/tutorials/rfc2136.md | master | external-dns | [
0.006632522214204073,
-0.056922245770692825,
-0.059919893741607666,
-0.05077939108014107,
-0.06066375970840454,
-0.06778500974178314,
-0.033409636467695236,
-0.023369427770376205,
0.008600790053606033,
0.11460448056459427,
-0.03632932901382446,
-0.07987236231565475,
0.04595771059393883,
0.... | -0.042063 |
# Civo DNS This tutorial describes how to setup ExternalDNS for usage within a Kubernetes cluster using Civo DNS Manager. Make sure to use \*\*>0.13.5\*\* version of ExternalDNS for this tutorial. ## Managing DNS with Civo If you want to learn about how to use Civo DNS Manager read the following tutorials: [An Introduc... | https://github.com/kubernetes-sigs/external-dns/blob/master//docs/tutorials/civo.md | master | external-dns | [
-0.06795655936002731,
-0.0811602920293808,
0.009000957012176514,
-0.04085438326001167,
-0.15125524997711182,
-0.009585508145391941,
-0.06926655024290085,
0.06590970605611801,
0.08163672685623169,
0.035509977489709854,
-0.05085911601781845,
-0.12378723919391632,
-0.0060220449231565,
-0.0338... | 0.156169 |
can delete the tutorial's example: ```sh kubectl delete service -f nginx.yaml kubectl delete service -f externaldns.yaml ``` | https://github.com/kubernetes-sigs/external-dns/blob/master//docs/tutorials/civo.md | master | external-dns | [
-0.07472976297140121,
0.010448737069964409,
0.009906075894832611,
-0.0749872624874115,
-0.0005186315975151956,
-0.030191974714398384,
-0.04107847809791565,
-0.08368413895368576,
0.08259883522987366,
0.026878926903009415,
0.011446680873632431,
-0.012670999392867088,
-0.02300228737294674,
-0... | 0.096051 |
# OVHcloud This tutorial describes how to setup ExternalDNS for use within a Kubernetes cluster using OVHcloud DNS. Make sure to use \*\*>=0.6\*\* version of ExternalDNS for this tutorial. ## Creating a zone with OVHcloud DNS If you are new to OVHcloud, we recommend you first read the following instructions for creatin... | https://github.com/kubernetes-sigs/external-dns/blob/master//docs/tutorials/ovh.md | master | external-dns | [
-0.030982472002506256,
-0.04367360100150108,
-0.008549627847969532,
0.019359789788722992,
-0.06980907171964645,
-0.017291568219661713,
-0.048953402787446976,
0.01849295012652874,
0.10468719154596329,
-0.03365733474493027,
-0.0295877568423748,
-0.10823462158441544,
-0.025705037638545036,
-0... | 0.036666 |
targetPort: 80 ``` \*\*A note about annotations\*\* Verify that the annotation on the service uses the same hostname as the OVHcloud DNS zone created above. The annotation may also be a subdomain of the DNS zone (e.g. 'www.example.com'). The TTL annotation can be used to configure the TTL on DNS records managed by Exte... | https://github.com/kubernetes-sigs/external-dns/blob/master//docs/tutorials/ovh.md | master | external-dns | [
-0.05451257899403572,
-0.0019100751960650086,
0.02040311135351658,
-0.07372672110795975,
-0.027038967236876488,
-0.06793749332427979,
-0.01114181149750948,
-0.051193658262491226,
0.13974444568157196,
-0.03204789385199547,
-0.0027131757233291864,
-0.03998696804046631,
-0.000619149359408766,
... | 0.074789 |
# CoreDNS with etcd backend ## Overview This tutorial describes how to deploy CoreDNS backed by etcd as a dynamic DNS provider for external-dns. It shows how to configure external-dns to write DNS records into etcd, which CoreDNS will then serve. ### TL;DR After completing this lab, you will have a Kubernetes environme... | https://github.com/kubernetes-sigs/external-dns/blob/master//docs/tutorials/coredns-etcd.md | master | external-dns | [
-0.04215347766876221,
0.003607065649703145,
0.05541224032640457,
-0.06668926775455475,
-0.09104957431554794,
0.0015294599579647183,
-0.0863996148109436,
-0.014144591987133026,
0.05168167129158974,
0.012205898761749268,
-0.04227776080369949,
-0.06499559432268143,
0.011178995482623577,
-0.03... | 0.039008 |
-n default ❯❯ Release "external-dns" does not exist. Installing it now. ``` Validate pod status and view logs ```sh kubectl get pods -l app.kubernetes.io/name=external-dns kubectl logs deploy/external-dns ``` Or run it on the host from sources ```sh export ETCD\_URLS="http://127.0.0.1:32379" # port mapping configured o... | https://github.com/kubernetes-sigs/external-dns/blob/master//docs/tutorials/coredns-etcd.md | master | external-dns | [
-0.01690567098557949,
-0.0233599916100502,
0.02263478934764862,
-0.042447663843631744,
-0.0389777235686779,
-0.004916059318929911,
-0.0885888934135437,
-0.0028425822965800762,
0.08113294094800949,
0.055051110684871674,
-0.0204493198543787,
-0.06570375710725784,
-0.09206528961658478,
0.0158... | 0.11953 |
# Azure Private DNS This tutorial describes how to set up ExternalDNS for managing records in Azure Private DNS. It comprises of the following steps: 1) Provision Azure Private DNS 2) Configure service principal for managing the zone 3) Deploy ExternalDNS 4) Expose an NGINX service with a LoadBalancer and annotate it w... | https://github.com/kubernetes-sigs/external-dns/blob/master//docs/tutorials/azure-private-dns.md | master | external-dns | [
-0.10079936683177948,
-0.030812367796897888,
0.022517533972859383,
-0.0240409467369318,
-0.07589550316333771,
0.012337319552898407,
0.00017511491023469716,
-0.07913696765899658,
0.1045999750494957,
0.09397765249013901,
-0.025304866954684258,
-0.05768571421504021,
0.04164924845099449,
0.015... | 0.060919 |
with a value of 0s. Also, one can leverage the built-in retry policies of the Azure SDK. The flag --azure-maxretries-count can be specified in the manifest yaml to configure behavior. The default value of Azure SDK retry is 3. ## Deploy ExternalDNS Configure `kubectl` to be able to communicate and authenticate with you... | https://github.com/kubernetes-sigs/external-dns/blob/master//docs/tutorials/azure-private-dns.md | master | external-dns | [
-0.03745012730360031,
0.009315445087850094,
0.0014520365511998534,
0.04620395973324776,
-0.08839721232652664,
0.034494027495384216,
0.02901601977646351,
-0.09002187103033066,
0.10225003957748413,
0.11588624864816666,
-0.04374024271965027,
-0.02997840754687786,
0.06874745339155197,
0.005495... | 0.087888 |
kubectl create -f externaldns.yaml ``` ## Create an nginx deployment This step creates a demo workload in your cluster. Apply the following manifest to create a deployment that we are going to expose later in this tutorial in multiple ways: ```yaml --- apiVersion: apps/v1 kind: Deployment metadata: name: nginx spec: se... | https://github.com/kubernetes-sigs/external-dns/blob/master//docs/tutorials/azure-private-dns.md | master | external-dns | [
-0.03320265933871269,
-0.02254830300807953,
-0.014387032948434353,
-0.002999890362843871,
-0.08539813756942749,
-0.0026106885634362698,
-0.03201775625348091,
-0.03306661918759346,
0.059985753148794174,
0.09740355610847473,
-0.05295763909816742,
-0.08193856477737427,
0.0019242173293605447,
... | 0.122688 |
use `--domain-filter` together with `--zone-name-filter`, the behavior changes: `--domain-filter` then filters Ingress domains, not the Azure Private DNS zone name. When those hostnames are removed or renamed the corresponding DNS records are also altered. Create the deployment, service and ingress object: ```sh kubect... | https://github.com/kubernetes-sigs/external-dns/blob/master//docs/tutorials/azure-private-dns.md | master | external-dns | [
-0.0575370118021965,
0.006506786681711674,
0.0367518775165081,
-0.020247681066393852,
-0.057003919035196304,
-0.05645480751991272,
0.031530123203992844,
-0.09831695258617401,
0.10134901851415634,
0.09996403753757477,
-0.03705984354019165,
-0.048906922340393066,
0.06466114521026611,
0.02963... | 0.010068 |
# Scaleway This tutorial describes how to setup ExternalDNS for usage within a Kubernetes cluster using Scaleway DNS. Make sure to use \*\*>=0.7.4\*\* version of ExternalDNS for this tutorial. \*\*Warning\*\*: Scaleway DNS is currently in Public Beta and may not be suited for production usage. ## Importing a Domain int... | https://github.com/kubernetes-sigs/external-dns/blob/master//docs/tutorials/scaleway.md | master | external-dns | [
-0.023999473080039024,
-0.08356863260269165,
0.007268446031957865,
-0.031202418729662895,
-0.10656353086233139,
-0.025395970791578293,
-0.07765030860900879,
0.042937520891427994,
0.04652418568730354,
0.01765384152531624,
-0.06334931403398514,
-0.08761019259691238,
0.019919509068131447,
0.0... | 0.075484 |
- --source=service # ingress is also possible - --domain-filter=example.com # (optional) limit to only example.com domains; change to match the zone created above. - --provider=scaleway env: - name: SCW\_ACCESS\_KEY value: "" - name: SCW\_SECRET\_KEY value: "" ### Set if configuring using a config file. Make sure to cr... | https://github.com/kubernetes-sigs/external-dns/blob/master//docs/tutorials/scaleway.md | master | external-dns | [
-0.03007383458316326,
-0.021049566566944122,
-0.061540063470602036,
-0.024564972147345543,
0.018869472667574883,
-0.028256766498088837,
-0.026987221091985703,
-0.04701756685972214,
-0.022565217688679695,
0.05644349381327629,
-0.030968843027949333,
-0.06343904882669449,
0.037330519407987595,
... | -0.01208 |
# Linode This tutorial describes how to setup ExternalDNS for usage within a Kubernetes cluster using Linode DNS Manager. Make sure to use \*\*>=0.5.5\*\* version of ExternalDNS for this tutorial. ## Managing DNS with Linode If you want to learn about how to use Linode DNS Manager read the following tutorials: [An Intr... | https://github.com/kubernetes-sigs/external-dns/blob/master//docs/tutorials/linode.md | master | external-dns | [
-0.062344811856746674,
-0.05921038240194321,
0.035840243101119995,
-0.05629558488726616,
-0.06517287343740463,
-0.004363169427961111,
-0.03850186988711357,
0.027565669268369675,
0.08265931904315948,
0.01502007432281971,
-0.039708059281110764,
-0.08427821099758148,
-0.0003536632575560361,
-... | 0.112004 |
Linode DNS records, we can delete the tutorial's example: ```sh kubectl delete service -f nginx.yaml kubectl delete service -f externaldns.yaml ``` | https://github.com/kubernetes-sigs/external-dns/blob/master//docs/tutorials/linode.md | master | external-dns | [
-0.10981239378452301,
-0.0030336950439959764,
0.03173080086708069,
-0.09025678038597107,
0.0019438614835962653,
-0.03844249248504639,
-0.04712555557489395,
-0.10664597898721695,
0.07982655614614487,
0.02778616175055504,
0.0039812372997403145,
-0.005824644584208727,
-0.03698119521141052,
-0... | 0.092667 |
# PowerDNS ## Prerequisites The provider has been written for and tested against [PowerDNS](https://github.com/PowerDNS/pdns) v4.1.x and thus requires \*\*PowerDNS Auth Server >= 4.1.x\*\* PowerDNS provider support was added via [this PR](https://github.com/kubernetes-sigs/external-dns/pull/373), thus you need to use e... | https://github.com/kubernetes-sigs/external-dns/blob/master//docs/tutorials/pdns.md | master | external-dns | [
-0.06352634727954865,
-0.03190551698207855,
0.05377955362200737,
-0.04650268331170082,
-0.08451028168201447,
-0.020052853971719742,
-0.0585491880774498,
-0.03429066017270088,
0.0798368826508522,
0.04071233049035072,
-0.006037023384124041,
-0.07508465647697449,
-0.02597387507557869,
-0.0165... | -0.006416 |
``` \*\*Important!\*\*: Don't run dig, nslookup or similar immediately (until you've confirmed the record exists). You'll get hit by [negative DNS caching](https://tools.ietf.org/html/rfc2308), which is hard to flush. Run the following to make sure everything is in order: ```bash kubectl get services echo kubectl get e... | https://github.com/kubernetes-sigs/external-dns/blob/master//docs/tutorials/pdns.md | master | external-dns | [
-0.002328828675672412,
0.010060195811092854,
0.025257831439375877,
-0.06263880431652069,
-0.06011297553777695,
-0.07349161058664322,
-0.08773337304592133,
-0.0849515050649643,
0.10286544263362885,
0.038696158677339554,
-0.04019862040877342,
-0.062294382601976395,
-0.04630899056792259,
-0.0... | 0.077984 |
# Gandi This tutorial describes how to setup ExternalDNS for usage within a Kubernetes cluster using Gandi. Make sure to use \*\*>=0.7.7\*\* version of ExternalDNS for this tutorial. ## Creating a Gandi DNS zone (domain) Create a new DNS zone where you want to create your records in. Let's use `example.com` as an examp... | https://github.com/kubernetes-sigs/external-dns/blob/master//docs/tutorials/gandi.md | master | external-dns | [
-0.07478202879428864,
-0.11773049086332321,
-0.030679713934659958,
-0.02620704658329487,
-0.11123286187648773,
-0.031120702624320984,
-0.07062304764986038,
0.0244299229234457,
0.05519678816199303,
-0.007357679773122072,
-0.01678280346095562,
-0.11034968495368958,
0.0037644205149263144,
-0.... | 0.11112 |
created above if a different domain was used. This should show the external IP address of the service as the A record for your domain. ## Cleanup Now that we have verified that ExternalDNS will automatically manage Gandi DNS records, we can delete the tutorial's example: ```sh kubectl delete service -f nginx.yaml kubec... | https://github.com/kubernetes-sigs/external-dns/blob/master//docs/tutorials/gandi.md | master | external-dns | [
-0.11324077099561691,
-0.03465957194566727,
-0.025782793760299683,
-0.08012537658214569,
-0.04022650420665741,
-0.04992954432964325,
-0.046221498399972916,
-0.05784178525209427,
0.053153738379478455,
-0.028093399479985237,
-0.03509141877293587,
-0.04422386363148689,
-0.009810234420001507,
... | 0.063841 |
# Azure DNS This tutorial describes how to setup ExternalDNS for [Azure DNS](https://azure.microsoft.com/services/dns/) with [Azure Kubernetes Service](https://docs.microsoft.com/azure/aks/). Make sure to use \*\*>=0.11.0\*\* version of ExternalDNS for this tutorial. This tutorial uses [Azure CLI 2.0](https://docs.micr... | https://github.com/kubernetes-sigs/external-dns/blob/master//docs/tutorials/azure.md | master | external-dns | [
-0.07093078643083572,
-0.049041152000427246,
-0.011958316899836063,
-0.02140321023762226,
-0.08116182684898376,
0.022864248603582382,
0.01501158531755209,
-0.08919564634561539,
0.16219237446784973,
0.08670227229595184,
-0.04927746579051018,
-0.0804491862654686,
0.05555974692106247,
0.02866... | 0.053753 |
`ResourceManagerEndpoint` - this specifies the endpoint URL for the Azure Resource Manager service when using Azure Stack Cloud. This is required for Azure Stack Cloud deployments to point to the correct Resource Manager instance. The Azure DNS provider expects, by default, that the configuration file is at `/etc/kuber... | https://github.com/kubernetes-sigs/external-dns/blob/master//docs/tutorials/azure.md | master | external-dns | [
-0.06864628940820694,
-0.028654612600803375,
0.04283052682876587,
-0.009772226214408875,
-0.05744929984211922,
-0.0034170481376349926,
0.02071518450975418,
-0.028223225846886635,
0.1144658625125885,
0.0946844294667244,
-0.03896510228514671,
-0.04870883747935295,
-0.017909841611981392,
0.07... | 0.052605 |
running inside the Kubernetes cluster, not just the ExternalDNS container(s). For the managed identity, the contents of `azure.json` should be similar to this: ```json { "tenantId": "01234abc-de56-ff78-abc1-234567890def", "subscriptionId": "01234abc-de56-ff78-abc1-234567890def", "resourceGroup": "MyDnsResourceGroup", "... | https://github.com/kubernetes-sigs/external-dns/blob/master//docs/tutorials/azure.md | master | external-dns | [
0.005941769108176231,
0.039379678666591644,
-0.029808299615979195,
0.038996901363134384,
-0.02059735544025898,
0.031736116856336594,
0.06729400902986526,
-0.04944414272904396,
0.14174063503742218,
0.06826119124889374,
0.006766617763787508,
-0.1328078955411911,
0.03627806156873703,
0.059755... | 0.079862 |
az role assignment create --role "DNS Zone Contributor" \ --assignee "${IDENTITY\_CLIENT\_ID}" --scope "${DNS\_ID}" ``` #### Creating a configuration file for the managed identity Create the file `azure.json` with the values from previous steps: ```bash cat <<-EOF > /local/path/to/azure.json { "tenantId": "$(az account... | https://github.com/kubernetes-sigs/external-dns/blob/master//docs/tutorials/azure.md | master | external-dns | [
0.013366716913878918,
0.022750675678253174,
-0.0632859542965889,
0.024795684963464737,
-0.06579273194074631,
0.04436669498682022,
0.08137769997119904,
-0.0578315332531929,
0.07918671518564224,
0.12077570706605911,
0.007327631115913391,
-0.12496696412563324,
0.07941676676273346,
0.056834459... | 0.032389 |
service account needs to be setup by creating a federated identity resource: ```bash OIDC\_ISSUER\_URL="$(az aks show -n myAKSCluster -g myResourceGroup --query "oidcIssuerProfile.issuerUrl" -otsv)" az identity federated-credential create --name ${IDENTITY\_NAME} --identity-name ${IDENTITY\_NAME} --resource-group $AZUR... | https://github.com/kubernetes-sigs/external-dns/blob/master//docs/tutorials/azure.md | master | external-dns | [
-0.028827235102653503,
-0.02158278413116932,
-0.02048294059932232,
-0.005447498057037592,
-0.002154735615476966,
-0.0016813044203445315,
0.04496699571609497,
-0.01866430602967739,
0.10902535170316696,
0.09484492242336273,
0.013676721602678299,
-0.08970212191343307,
0.08159752190113068,
0.0... | -0.029299 |
DNS records using annotations on Kubernetes resources. ### Usage with Ingress ```yaml apiVersion: networking.k8s.io/v1 kind: Ingress metadata: name: my-ingress annotations: external-dns.alpha.kubernetes.io/azure-tags: "cost-center=12345,owner=backend-team" spec: rules: - host: app.example.com http: paths: - path: / pat... | https://github.com/kubernetes-sigs/external-dns/blob/master//docs/tutorials/azure.md | master | external-dns | [
-0.04769990220665932,
0.029483327642083168,
0.021454937756061554,
-0.012925282120704651,
-0.04416576772928238,
-0.033987514674663544,
-0.0012965198839083314,
-0.05097690969705582,
0.13940085470676422,
0.11039639264345169,
-0.05244068428874016,
-0.05919671058654785,
-0.013012472540140152,
0... | 0.106741 |
name: external-dns subjects: - kind: ServiceAccount name: external-dns --- apiVersion: apps/v1 kind: Deployment metadata: name: external-dns spec: strategy: type: Recreate selector: matchLabels: app: external-dns template: metadata: labels: app: external-dns spec: serviceAccountName: external-dns containers: - name: ex... | https://github.com/kubernetes-sigs/external-dns/blob/master//docs/tutorials/azure.md | master | external-dns | [
-0.05856885015964508,
-0.0035098351072520018,
0.022686904296278954,
-0.022875584661960602,
-0.051494210958480835,
-0.04139123111963272,
0.011245427653193474,
-0.029098128899931908,
0.07221189141273499,
0.07090966403484344,
-0.029941687360405922,
-0.0783756747841835,
0.04332375153899193,
0.... | 0.02915 |
``` ## More tutorials A video explanation is available here: https://www.youtube.com/watch?v=VSn6DPKIhM8&list=PLpbcUe4chE79sB7Jg7B4z3HytqUUEwcNE  | https://github.com/kubernetes-sigs/external-dns/blob/master//docs/tutorials/azure.md | master | external-dns | [
-0.07875417172908783,
0.016209691762924194,
-0.06060782074928284,
-0.01961345784366131,
0.032176945358514786,
-0.005215142387896776,
0.053524620831012726,
0.015355730429291725,
0.03882785513997078,
0.0029818087350577116,
0.06067180633544922,
0.02535839192569256,
-0.009453389793634415,
-0.0... | 0.168562 |
# CKAD Exercises Practice materials and exercises are needed to prepare for the Certified Kubernetes Application Developer (CKAD) exam. These resources are designed to help individuals gain the necessary knowledge and skills to complete the CKAD exam and earn their certification successfully. \*\*\*\*Note\*\*\*: Contin... | https://github.com/ibrahimatay/CKAD-Exercises/blob/master//README.md | master | ckad-exercises-2 | [
-0.06401006132364273,
0.06293933838605881,
0.10376882553100586,
-0.06275365501642227,
-0.023135636001825333,
0.06281240284442902,
0.029960554093122482,
-0.017334435135126114,
-0.007380208000540733,
0.045842062681913376,
-0.0002728882245719433,
-0.03956601768732071,
0.04151616618037224,
0.0... | 0.173134 |
# Exercise - 4 Anytime a team needs to run a container on Kubernetes they will need to define a pod within which to run the container. - Create a YAML formatted pod manifest pod.yml to create a pod named app1 that runs a container named app1cont using image ifccncf/arg-output with these command line arguments: -lines 5... | https://github.com/ibrahimatay/CKAD-Exercises/blob/master//exercise-4/README.md | master | ckad-exercises-2 | [
0.05725027993321419,
0.009823580272495747,
0.005792928393930197,
-0.020185185596346855,
0.02263452298939228,
-0.002968561602756381,
-0.04703523963689804,
0.060159072279930115,
0.06497568637132645,
0.02939106710255146,
-0.010748249478638172,
-0.11032124608755112,
-0.021827038377523422,
-0.0... | 0.055766 |
# Exercise - 3 You are tasked to create a secret and consume the secret in a pod using environment variables as follow; - Create a secret named another-secret with a key/value pair; key1/value4 - Start an nginx pod named nginx-secret using container image nginx, and add an environment variable exposing the value of the... | https://github.com/ibrahimatay/CKAD-Exercises/blob/master//exercise-3/README.md | master | ckad-exercises-2 | [
-0.007901203818619251,
0.0545644536614418,
0.04748980328440666,
0.009963246993720531,
-0.023269249126315117,
-0.0069443779066205025,
0.017919404432177544,
0.012258943170309067,
0.05156881362199783,
0.02371552400290966,
-0.028973689302802086,
-0.09571933001279831,
0.027398940175771713,
-0.0... | 0.034941 |
# Exercise - 2 You sometimes need to observe a pod's logs and write those logs to a file for further analysis. - Deploy the counter pod to the cluster using the provided YAML spec file at counter.yaml - Retrieve all currently available application logs from the running pod and store them in the file log\_Output.txt, wh... | https://github.com/ibrahimatay/CKAD-Exercises/blob/master//exercise-2/README.md | master | ckad-exercises-2 | [
0.08674465119838715,
-0.029886487871408463,
0.011713153682649136,
0.035389743745326996,
0.014991394244134426,
-0.017150968313217163,
-0.03015182353556156,
-0.019161252304911613,
0.09344533830881119,
0.057970840483903885,
-0.0008613294339738786,
-0.07590503245592117,
-0.019825739786028862,
... | 0.148453 |
# Exercise - 5 A project that you are working on has a requirement for persistent data to be available. - Create a file on node sk8s-node-0 at index.html with the content Acct=Finance - Create a PersistentVolume named task-pv-volume using hostPath and allocate 1Gi to it, specifying that the volume is at /opt/KDSP00101/... | https://github.com/ibrahimatay/CKAD-Exercises/blob/master//exercise-5/README.md | master | ckad-exercises-2 | [
-0.03329365327954292,
0.007681618444621563,
-0.04983356222510338,
0.05362687632441521,
-0.039010316133499146,
-0.028688060119748116,
-0.032703887671232224,
0.0433051660656929,
0.011080445721745491,
0.05409540981054306,
-0.049294084310531616,
-0.017663467675447464,
0.027157580479979515,
0.0... | 0.09053 |
# Exercise - 7 A web application requires a specific version of redis to be used as a cache. Create a pod with the following characteristics, and leave it running when complete: - The pod must run in the web namespace. - The namespace has already been created - The name of the pod should be cache. - Use the lfccncf/red... | https://github.com/ibrahimatay/CKAD-Exercises/blob/master//exercise-7/README.md | master | ckad-exercises-2 | [
0.028789661824703217,
-0.06002190336585045,
-0.07025808840990067,
-0.03131603077054024,
0.00843128003180027,
-0.07273726910352707,
0.008222018368542194,
-0.004973778035491705,
0.007975081913173199,
0.07053264230489731,
0.027404604479670525,
-0.08863077312707901,
-0.05169609561562538,
-0.08... | 0.121835 |
# Exercise - 9 Developers occasionally need to submit pods that run periodically. Follow the steps below to create a pod that will start at a predetermined time and which runs to completion only once each time it is started: - Create a YAML formatted k8s manifest /opt/KDPD00301/peridic.yaml that runs the following shel... | https://github.com/ibrahimatay/CKAD-Exercises/blob/master//exercise-9/README.md | master | ckad-exercises-2 | [
0.0074623688124120235,
0.030100805684924126,
0.04485159367322922,
-0.003298812545835972,
-0.050980277359485626,
-0.007748826406896114,
-0.027933139353990555,
-0.03432655707001686,
0.034515101462602615,
0.026052089408040047,
-0.037658125162124634,
-0.09976520389318466,
-0.020229412242770195,
... | 0.127906 |
# Exercise - 8 You are required to create a pod that requests a certain amount of CPU and memory, so it gets scheduled to-a node that has those resources available. - Create a pod named nginx-resources in the pod-resources namespace that requests a minimum of 200m CPU and 1Gi memory for its container - The pod should u... | https://github.com/ibrahimatay/CKAD-Exercises/blob/master//exercise-8/README.md | master | ckad-exercises-2 | [
0.04110310599207878,
0.03662215545773506,
0.03172825649380684,
0.045709576457738876,
-0.056941013783216476,
-0.017621146515011787,
-0.005322897341102362,
-0.0004843045026063919,
0.04740259423851967,
0.05878088250756264,
-0.07226836681365967,
-0.05959300324320793,
-0.03678972274065018,
-0.0... | 0.096512 |
# Exercise - 6 You are tasked to create a ConfigMap and consume the ConfigMap in a pod using a volume mount. - Create a ConfigMap namedanother-config containing the key/value pair: key4/value3 - start a pod named nginx-configmap containing a single container using the nginx image, and mount the key you just created int... | https://github.com/ibrahimatay/CKAD-Exercises/blob/master//exercise-6/README.md | master | ckad-exercises-2 | [
0.010973849333822727,
0.012818609364330769,
0.023271020501852036,
-0.006462411489337683,
-0.045117978006601334,
-0.03887443244457245,
0.005895706359297037,
0.04322998225688934,
0.007508543320000172,
0.03419441357254982,
-0.01209012046456337,
-0.12158389389514923,
0.012663450092077255,
-0.0... | 0.107389 |
# Exercise - 1 Create a new deployment for running.nginx with the following parameters; - Create a namespace, the name is kdpd00201. - Run the deployment in the kdpd00201 namespace. - Name the deployment frontend and configure with 4 replicas - Configure the pod with a container image of lfccncf/nginx:1.13.7 - Set an e... | https://github.com/ibrahimatay/CKAD-Exercises/blob/master//exercise-1/README.md | master | ckad-exercises-2 | [
0.02175438031554222,
-0.0056112236343324184,
0.03098786063492298,
-0.09619962424039841,
-0.04450874403119087,
0.014438451267778873,
-0.07448038458824158,
-0.04028501361608505,
0.002165558747947216,
0.06279002130031586,
-0.027654418721795082,
-0.11256258934736252,
-0.02480895444750786,
-0.0... | -0.012846 |
# Exercise - 11 You have rolled out a new pod to your infrastructure and now you need to allow it to communicate with the web and storage pods but nothing else. Given the running pod kdsn00201 -newpod edit it to use a network policy that will allow it to send and receive traffic only to and from the web and storage pod... | https://github.com/ibrahimatay/CKAD-Exercises/blob/master//exercise-11/README.md | master | ckad-exercises-2 | [
-0.003137429943308234,
0.016043812036514282,
0.07323367148637772,
0.00012050786608597264,
-0.047139257192611694,
-0.0006895150290802121,
-0.0009702267125248909,
-0.029909776523709297,
-0.013751336373388767,
0.1031700000166893,
0.002552979625761509,
-0.05112216994166374,
-0.005719759035855532... | 0.094292 |
# Exercise - 10 A pod is running on the cluster but it is not responding. The desired behavior is to have k8s reset the pod when an endpoint returns an HTTP 500 on the /healthz endpoint. The service probe-pod, should never send traffic to the pod while it is failing. Please complete the following: - The application has... | https://github.com/ibrahimatay/CKAD-Exercises/blob/master//exercise-10/README.md | master | ckad-exercises-2 | [
0.032259080559015274,
0.041677068918943405,
0.025243928655982018,
0.007568770088255405,
-0.0287356898188591,
-0.04432430490851402,
-0.04109620675444603,
-0.040056146681308746,
-0.011325596831738949,
0.08727763593196869,
-0.040142159909009933,
-0.019450334832072258,
-0.0485706627368927,
0.0... | 0.104509 |
# [GCP GKE Google Kubernetes Engine DevOps 75 Real-World Demos](https://links.stacksimplify.com/gcp-google-kubernetes-engine-gke-with-devops) [](https://links.stacksimplify.com/gcp-google-kubernetes-engine-gke-with-devops) #... | https://github.com/stacksimplify/google-kubernetes-engine/blob/main//README.md | main | google-kubernetes-engine | [
-0.03316611051559448,
-0.036089375615119934,
0.08353999257087708,
-0.07859813421964645,
-0.007214605808258057,
-0.034673985093832016,
-0.02368776872754097,
-0.054520197212696075,
0.0078062862157821655,
0.04572253301739693,
0.04971270635724068,
-0.08260044455528259,
-0.012557212263345718,
-... | 0.075873 |
18. Kubernetes Service of Type NodePort 19. Kubernetes Service of Type Headless 20. Kubernetes ReplicaSets ## Google Services Covered 01. Google GKE Standard Cluster 02. Google GKE Autopilot Cluster 03. Compute Engine - Virtual Machines 04. Compute Engine - Storage Disks 05. Compute Engine - Storage Snapshots 06. Compu... | https://github.com/stacksimplify/google-kubernetes-engine/blob/main//README.md | main | google-kubernetes-engine | [
-0.04505820944905281,
0.008320759981870651,
0.046563345938920975,
-0.05536649748682976,
0.013568202033638954,
0.023729588836431503,
-0.0076643330976367,
-0.07964717596769333,
0.036771006882190704,
0.060730867087841034,
0.0028205099515616894,
-0.07379838079214096,
0.011013696901500225,
-0.0... | 0.153535 |
or Developers who are planning to master Kubernetes from Real-World perspective on Google Cloud Platform (GCP) - Any beginner who is interested in learning Kubernetes with Google Cloud Platform (GCP) - Any beginner who is planning their career in DevOps ## Github Repositories used for this course - [Terraform on AWS EK... | https://github.com/stacksimplify/google-kubernetes-engine/blob/main//README.md | main | google-kubernetes-engine | [
-0.0803629606962204,
-0.05134376510977745,
0.08286498486995697,
-0.035045184195041656,
0.0007033679285086691,
-0.06092335656285286,
0.005666268058121204,
-0.03270642086863518,
-0.0003123399510513991,
0.07823111861944199,
-0.007909058593213558,
-0.037941694259643555,
-0.007007057778537273,
... | 0.110992 |
## Step-00: Pre-requisites 1. Verify if GKE Cluster is created 2. Verify if kubeconfig for kubectl is configured in your local terminal ```t # Configure kubeconfig for kubectl gcloud container clusters get-credentials --region --project # Replace Values CLUSTER-NAME, REGION, PROJECT gcloud container clusters get-creden... | https://github.com/stacksimplify/google-kubernetes-engine/blob/main//45-GKE-Ingress-NameBasedVhost-Routing/README.md | main | google-kubernetes-engine | [
-0.030577080324292183,
-0.036075104027986526,
-0.007099037058651447,
-0.07715956121683121,
-0.08860418200492859,
-0.08090807497501373,
-0.04512478783726692,
-0.024976126849651337,
0.04551486298441887,
0.04454309493303299,
-0.05698588117957115,
-0.11697268486022949,
-0.0063996827229857445,
... | 0.088359 |
SSL-POLICY ## References - [Ingress Features](https://cloud.google.com/kubernetes-engine/docs/how-to/ingress-features) | https://github.com/stacksimplify/google-kubernetes-engine/blob/main//45-GKE-Ingress-NameBasedVhost-Routing/README.md | main | google-kubernetes-engine | [
-0.018204933032393456,
0.037730004638433456,
0.06886107474565506,
0.012649732641875744,
-0.007836025208234787,
-0.014538388699293137,
0.05526496842503548,
-0.09815599024295807,
0.09263772517442703,
-0.006965077482163906,
-0.029155027121305466,
-0.04780479520559311,
0.05320052430033684,
0.0... | 0.101661 |
## Step-01: Introduction - Create GKE Autopilot Cluster - Understand in detail about GKE Autopilot cluster ## Step-02: Pre-requisite: Verify if Cloud NAT Gateway created - Verify if Cloud NAT Gateway created in `Region:us-central1` where you are planning to create GKE Autopilot Private Cluster - This is required for Wo... | https://github.com/stacksimplify/google-kubernetes-engine/blob/main//68-GKE-AutoPilot-Cluster/README.md | main | google-kubernetes-engine | [
0.02784912846982479,
0.03353332728147507,
0.01157021801918745,
-0.03292885795235634,
-0.0006044500623829663,
0.0014420670922845602,
-0.012919750064611435,
0.002414798829704523,
-0.004823146387934685,
0.06055960804224014,
-0.015696315094828606,
-0.14348386228084564,
-0.0037932938430458307,
... | 0.089561 |
## Step-00: Pre-requisites 1. Verify if GKE Cluster is created 2. Verify if kubeconfig for kubectl is configured in your local terminal ```t # Configure kubeconfig for kubectl gcloud container clusters get-credentials --region --project # Replace Values CLUSTER-NAME, REGION, PROJECT gcloud container clusters get-creden... | https://github.com/stacksimplify/google-kubernetes-engine/blob/main//44-GKE-ExternalDNS-Service-Demo/README.md | main | google-kubernetes-engine | [
-0.0807647630572319,
-0.020700305700302124,
0.02784465253353119,
-0.052404940128326416,
-0.08570005744695663,
-0.032367266714572906,
-0.02774863876402378,
-0.022004667669534683,
0.06938553601503372,
0.035246822983026505,
-0.04502576217055321,
-0.10041701048612595,
-0.002939272439107299,
-0... | 0.067866 |
## Step-00: Pre-requisites 1. Verify if GKE Cluster is created 2. Verify if kubeconfig for kubectl is configured in your local terminal ```t # Configure kubeconfig for kubectl gcloud container clusters get-credentials --region --project # Replace Values CLUSTER-NAME, REGION, PROJECT gcloud container clusters get-creden... | https://github.com/stacksimplify/google-kubernetes-engine/blob/main//49-GKE-Ingress-Preshared-SSL/README.md | main | google-kubernetes-engine | [
-0.030892806127667427,
-0.007546772714704275,
0.023205459117889404,
-0.05549754947423935,
-0.06650922447443008,
-0.03452213853597641,
-0.043486837297677994,
-0.03294306993484497,
0.02831379510462284,
0.038351330906152725,
0.007066411431878805,
-0.13429921865463257,
0.03695068508386612,
-0.... | 0.047432 |
URLS should work as expected. In your case, replace YOUR\_DOMAIN name for testing 2. HTTP to HTTPS redirect should work 3. You will get a warning "The certificate is not trusted because it is self-signed.". Click on "Accept the risk and continue" ``` ## Step-07: Clean-Up ```t # Delete Kubernetes Resources kubectl delet... | https://github.com/stacksimplify/google-kubernetes-engine/blob/main//49-GKE-Ingress-Preshared-SSL/README.md | main | google-kubernetes-engine | [
-0.04275616258382797,
0.038048841059207916,
0.05025402456521988,
-0.049266450107097626,
-0.06375805288553238,
-0.08583013713359833,
-0.024061890318989754,
-0.08314114809036255,
0.07099355012178421,
-0.0014441742096096277,
-0.021900491788983345,
-0.11232422292232513,
0.08714526891708374,
-0... | -0.067346 |
## Step-00: Pre-requisites 1. Verify if GKE Cluster is created 2. Verify if kubeconfig for kubectl is configured in your local terminal ```t # Configure kubeconfig for kubectl gcloud container clusters get-credentials --region --project # Replace Values CLUSTER-NAME, ZONE, PROJECT gcloud container clusters get-credenti... | https://github.com/stacksimplify/google-kubernetes-engine/blob/main//33-GKE-FileStore-Backup-and-Restore/README.md | main | google-kubernetes-engine | [
0.000017423553799744695,
-0.021491525694727898,
0.04328570514917374,
-0.06373447179794312,
-0.030621735379099846,
-0.0188260730355978,
-0.03374975919723511,
0.02796199545264244,
0.023457517847418785,
0.03684649616479874,
0.023905599489808083,
-0.11159408092498779,
0.05774366483092308,
-0.0... | 0.019484 |
03-volume-restore-myapp2-kube-manifests ```yaml apiVersion: v1 kind: Service metadata: name: myapp2-lb-service spec: type: LoadBalancer # ClusterIp, # NodePort selector: app: myapp2 ports: - name: http port: 80 # Service Port targetPort: 80 # Container Port ``` ## Step-13: Volume Restore: Deploy 03-volume-restore-myapp... | https://github.com/stacksimplify/google-kubernetes-engine/blob/main//33-GKE-FileStore-Backup-and-Restore/README.md | main | google-kubernetes-engine | [
0.0015680139185860753,
-0.060448065400123596,
0.021845664829015732,
-0.04616411402821541,
0.014812958426773548,
-0.02091299556195736,
-0.031830381602048874,
0.013679331168532372,
0.03809823840856552,
0.02779417298734188,
0.058448806405067444,
-0.08501298725605011,
0.02719426155090332,
-0.0... | 0.081984 |
## Step-01: Introduction to Services - \*\*Service Types\*\* 1. ClusterIp 2. NodePort 3. LoadBalancer 4. ExternalName 5. Ingress - We are going to look in to ClusterIP and LoadBalancer Service in this section with a detailed example. - LoadBalancer Type is primarily for cloud providers and it will differ cloud to cloud... | https://github.com/stacksimplify/google-kubernetes-engine/blob/main//12-kubectl-imperative-k8s-services/README.md | main | google-kubernetes-engine | [
-0.07470329850912094,
-0.05646241456270218,
0.02022828347980976,
-0.061684589833021164,
-0.04774985834956169,
-0.012457368895411491,
-0.039562251418828964,
0.0012054240796715021,
0.061316508799791336,
0.026224052533507347,
0.020845694467425346,
-0.06346432864665985,
0.05244643613696098,
-0... | 0.104521 |
## Step-00: Pre-requisites 1. Verify if GKE Cluster is created 2. Verify if kubeconfig for kubectl is configured in your local terminal. ```t # Configure kubeconfig for kubectl gcloud container clusters get-credentials --region --project # Replace Values CLUSTER-NAME, REGION, PROJECT gcloud container clusters get-crede... | https://github.com/stacksimplify/google-kubernetes-engine/blob/main//56-GKE-Artifact-Registry/README.md | main | google-kubernetes-engine | [
-0.022118639200925827,
0.022134022787213326,
0.034010544419288635,
-0.05495429411530495,
-0.02352118119597435,
-0.038869138807058334,
-0.06516830623149872,
-0.06683378666639328,
-0.012047629803419113,
0.0375494547188282,
-0.03762171417474747,
-0.1346392184495926,
0.03325783833861351,
-0.01... | 0.004427 |
## Step-00: Pre-requisites 1. Verify if GKE Cluster is created 2. Verify if kubeconfig for kubectl is configured in your local terminal ```t # Configure kubeconfig for kubectl gcloud container clusters get-credentials --region --project # Replace Values CLUSTER-NAME, REGION, PROJECT gcloud container clusters get-creden... | https://github.com/stacksimplify/google-kubernetes-engine/blob/main//53-GKE-Ingress-HealthCheck-with-backendConfig/README.md | main | google-kubernetes-engine | [
0.014435148797929287,
0.0238095261156559,
0.02012849971652031,
-0.04221680387854576,
0.010798093862831593,
-0.037946220487356186,
-0.03125334158539772,
-0.03786931931972504,
0.022552235051989555,
0.0961122065782547,
-0.01551803108304739,
-0.1311904937028885,
0.011018641293048859,
-0.052514... | 0.125291 |
## Step-00: Pre-requisites 1. Verify if GKE Cluster is created 2. Verify if kubeconfig for kubectl is configured in your local terminal ```t # Configure kubeconfig for kubectl gcloud container clusters get-credentials --region --project # Replace Values CLUSTER-NAME, REGION, PROJECT gcloud container clusters get-creden... | https://github.com/stacksimplify/google-kubernetes-engine/blob/main//52-GKE-Ingress-Cookie-Affinity/README.md | main | google-kubernetes-engine | [
-0.03016013465821743,
-0.03460796922445297,
0.0046085696667432785,
-0.05529770255088806,
-0.06105663627386093,
-0.019766561686992645,
-0.02954714559018612,
0.0015361773548647761,
0.03506668284535408,
0.0701553076505661,
-0.0039612180553376675,
-0.14285995066165924,
-0.008206578902900219,
-... | 0.141715 |
## Step-00: Pre-requisites 1. Verify if GKE Cluster is created 2. Verify if kubeconfig for kubectl is configured in your local terminal ```t # Configure kubeconfig for kubectl gcloud container clusters get-credentials --region --project # Replace Values CLUSTER-NAME, REGION, PROJECT gcloud container clusters get-creden... | https://github.com/stacksimplify/google-kubernetes-engine/blob/main//67-GKE-Horizontal-Pod-Autoscaler/README.md | main | google-kubernetes-engine | [
0.015214088372886181,
0.013779295608401299,
0.02701280079782009,
-0.040235571563243866,
-0.03510383144021034,
-0.046324167400598526,
-0.05398903414607048,
0.004360603634268045,
-0.020871061831712723,
0.05219193920493126,
0.0036046262830495834,
-0.1057191789150238,
-0.014148914255201817,
-0... | 0.06618 |
## Step-00: Pre-requisites 1. Verify if GKE Cluster is created 2. Verify if kubeconfig for kubectl is configured in your local terminal ```t # Configure kubeconfig for kubectl gcloud container clusters get-credentials --region --project # Replace Values CLUSTER-NAME, REGION, PROJECT gcloud container clusters get-creden... | https://github.com/stacksimplify/google-kubernetes-engine/blob/main//50-GKE-Ingress-Cloud-CDN/README.md | main | google-kubernetes-engine | [
-0.015016025863587856,
-0.02007310651242733,
0.017803778871893883,
-0.057640332728624344,
-0.057620227336883545,
-0.0061110579408705235,
-0.057423923164606094,
-0.015321288257837296,
0.038544654846191406,
0.07742291688919067,
-0.00609068525955081,
-0.12228182703256607,
-0.014761978760361671,... | 0.12313 |
23 Jun 2022 04:47:42 GMT < Content-Type: text/plain; charset=utf-8 < Age: 1625 < Cache-Control: max-age=3600,public < Hello, world! Version: 1.0.0 Hostname: cdn-demo-deployment-6f4c8f655d-htpsn \* Connection #0 to host ingress-cdn-demo.kalyanreddydaida.com left intact Kalyans-Mac-mini:46-GKE-Ingress-Cloud-CDN kalyanred... | https://github.com/stacksimplify/google-kubernetes-engine/blob/main//50-GKE-Ingress-Cloud-CDN/README.md | main | google-kubernetes-engine | [
-0.04335828498005867,
0.03780809044837952,
-0.01794627495110035,
-0.02322399616241455,
0.013505926355719566,
-0.07426414638757706,
-0.02034546621143818,
-0.05418258532881737,
0.031120525673031807,
0.14375045895576477,
0.05963103473186493,
-0.020903581753373146,
-0.036069467663764954,
-0.05... | 0.080953 |
## Step-00: Pre-requisites 1. Verify if GKE Cluster is created 2. Verify if kubeconfig for kubectl is configured in your local terminal ```t # Configure kubeconfig for kubectl gcloud container clusters get-credentials --region --project # Replace Values CLUSTER-NAME, ZONE, PROJECT gcloud container clusters get-credenti... | https://github.com/stacksimplify/google-kubernetes-engine/blob/main//38-GKE-Ingress-ExternalIP/README.md | main | google-kubernetes-engine | [
-0.02307414636015892,
-0.006767085287719965,
0.026315759867429733,
-0.07334799319505692,
-0.03238216042518616,
-0.05084722116589546,
-0.02146933414041996,
-0.03602892532944679,
0.018277697265148163,
0.053549885749816895,
-0.012386768124997616,
-0.13274435698986053,
0.0628536120057106,
-0.0... | 0.070102 |
## Step-00: Pre-requisites 1. Verify if GKE Cluster is created 2. Verify if kubeconfig for kubectl is configured in your local terminal ```t # Configure kubeconfig for kubectl gcloud container clusters get-credentials --region --project # Replace Values CLUSTER-NAME, ZONE, PROJECT gcloud container clusters get-credenti... | https://github.com/stacksimplify/google-kubernetes-engine/blob/main//18-GKE-NodePort-Service/README.md | main | google-kubernetes-engine | [
0.021778829395771027,
0.003723339643329382,
0.035039134323596954,
-0.04459711164236069,
0.007817425765097141,
-0.03917182981967926,
-0.04068547487258911,
-0.05516185238957405,
-0.010770601220428944,
0.04773467034101486,
0.014644350856542587,
-0.11968249827623367,
0.006277283653616905,
-0.0... | 0.100151 |
## Step-00: Pre-requisites 1. Verify if GKE Cluster is created 2. Verify if kubeconfig for kubectl is configured in your local terminal ```t # Configure kubeconfig for kubectl gcloud container clusters get-credentials --region --project # Replace Values CLUSTER-NAME, ZONE, PROJECT gcloud container clusters get-credenti... | https://github.com/stacksimplify/google-kubernetes-engine/blob/main//22-GKE-PD-existing-SC-premium-rwo/README.md | main | google-kubernetes-engine | [
0.009254109114408493,
0.003006843151524663,
0.021367741748690605,
-0.05868680775165558,
-0.011796127073466778,
-0.003338245674967766,
-0.03768543899059296,
-0.06438297778367996,
0.010130563750863075,
0.010653246194124222,
-0.007212820462882519,
-0.1488312929868698,
0.026028191670775414,
-0... | 0.055257 |
## Step-00: Introduction - We can update deployments using two options - Set Image - Edit Deployment ## Step-01: Updating Application version V1 to V2 using "Set Image" Option ### Update Deployment - \*\*Observation:\*\* Please Check the container name in `spec.container.name` yaml output and make a note of it and repl... | https://github.com/stacksimplify/google-kubernetes-engine/blob/main//09-kubectl-imperative-k8s-deployment-UPDATE/README.md | main | google-kubernetes-engine | [
0.013274643570184708,
-0.02008681930601597,
0.06077808886766434,
-0.03662184625864029,
-0.04861375316977501,
-0.06553779542446136,
-0.03350668400526047,
0.017863743007183075,
0.009966484270989895,
0.05495438352227211,
0.06208344176411629,
-0.0841386616230011,
0.0074801333248615265,
-0.0614... | 0.022745 |
## Step-00: Pre-requisites 1. Verify if GKE Cluster is created 2. Verify if kubeconfig for kubectl is configured in your local terminal ```t # Configure kubeconfig for kubectl gcloud container clusters get-credentials --region --project # Replace Values CLUSTER-NAME, ZONE, PROJECT gcloud container clusters get-credenti... | https://github.com/stacksimplify/google-kubernetes-engine/blob/main//32-GKE-FileStore-custom-StorageClass/README.md | main | google-kubernetes-engine | [
0.030769355595111847,
0.016402384266257286,
0.01666967384517193,
-0.043171390891075134,
-0.02427639067173004,
0.015040712431073189,
-0.03808487206697464,
-0.0060717384330928326,
0.05798228085041046,
0.053815457969903946,
0.018696477636694908,
-0.08303456753492355,
0.014044900424778461,
-0.... | 0.042329 |
``` | https://github.com/stacksimplify/google-kubernetes-engine/blob/main//32-GKE-FileStore-custom-StorageClass/README.md | main | google-kubernetes-engine | [
-0.06038856506347656,
0.06076087802648544,
-0.002756512723863125,
0.021401479840278625,
-0.09806859493255615,
-0.007924962788820267,
0.15262596309185028,
0.04638220742344856,
0.05033664405345917,
-0.017706485465168953,
0.06520553678274155,
-0.0016593437176197767,
0.03209460899233818,
0.004... | 0.176588 |
## Step-00: Pre-requisites 1. Verify if GKE Cluster is created 2. Verify if kubeconfig for kubectl is configured in your local terminal ```t # Configure kubeconfig for kubectl gcloud container clusters get-credentials --region --project # Replace Values CLUSTER-NAME, REGION, PROJECT gcloud container clusters get-creden... | https://github.com/stacksimplify/google-kubernetes-engine/blob/main//63-GKE-Cluster-Autoscaling/README.md | main | google-kubernetes-engine | [
0.06659107655286789,
0.009708452969789505,
0.013387593440711498,
-0.023822782561182976,
-0.01835286058485508,
-0.02482408471405506,
-0.05147077515721321,
-0.05814637988805771,
-0.03158344328403473,
0.0240706168115139,
-0.011840895749628544,
-0.17176954448223114,
-0.02323629893362522,
-0.03... | 0.042409 |
## Step-00: Pre-requisites 1. Verify if GKE Cluster is created 2. Verify if kubeconfig for kubectl is configured in your local terminal ```t # Configure kubeconfig for kubectl gcloud container clusters get-credentials --region --project # Replace Values CLUSTER-NAME, ZONE, PROJECT gcloud container clusters get-credenti... | https://github.com/stacksimplify/google-kubernetes-engine/blob/main//31-GKE-FileStore-default-StorageClass/README.md | main | google-kubernetes-engine | [
0.03769533708691597,
0.009227747097611427,
0.018756195902824402,
-0.0530761294066906,
-0.011784539557993412,
0.0185705553740263,
-0.04286716878414154,
-0.027355331927537918,
0.05486323684453964,
0.0514829084277153,
0.020220419391989708,
-0.09286165237426758,
0.011969082057476044,
-0.030061... | 0.04279 |
myapp1 Kubernetes pods and Verify ```t # List Pods kubectl get pods # myapp1 POD1 - Connect to Kubernetes Pod kubectl exec --stdin --tty -- /bin/sh kubectl exec --stdin --tty myapp1-deployment-5d469f6478-2kp97 -- /bin/sh cd /usr/share/nginx/html/filestore ls tail -f myapp1.txt exit # myapp1 POD2 - Connect to Kubernetes... | https://github.com/stacksimplify/google-kubernetes-engine/blob/main//31-GKE-FileStore-default-StorageClass/README.md | main | google-kubernetes-engine | [
-0.007973195984959602,
0.007512579206377268,
-0.016657954081892967,
-0.0670982152223587,
0.02778596803545952,
-0.06940009444952011,
0.03286170959472656,
0.08167488873004913,
0.1007642075419426,
0.05102932080626488,
0.05583469569683075,
-0.0644846186041832,
-0.002079782309010625,
-0.0111437... | 0.087049 |
## Step-01: Comments & Key Value Pairs - Space after colon is mandatory to differentiate key and value ```yml # Defining simple key value pairs name: kalyan age: 23 city: Hyderabad ``` ## Step-02: Dictionary / Map - Set of properties grouped together after an item - Equal amount of blank space required for all the item... | https://github.com/stacksimplify/google-kubernetes-engine/blob/main//13-YAML-Basics/README.md | main | google-kubernetes-engine | [
0.03176593407988548,
0.07608415186405182,
0.007768415380269289,
-0.017752617597579956,
0.0015071593225002289,
-0.03311556950211525,
0.09858637303113937,
-0.042521797120571136,
-0.05570206418633461,
-0.01578254997730255,
0.08091816306114197,
-0.013903895393013954,
0.030043406412005424,
0.00... | 0.021606 |
## Step-00: Pre-requisites 1. Verify if GKE Cluster is created 2. Verify if kubeconfig for kubectl is configured in your local terminal ```t # Configure kubeconfig for kubectl gcloud container clusters get-credentials --region --project # Replace Values CLUSTER-NAME, REGION, PROJECT gcloud container clusters get-creden... | https://github.com/stacksimplify/google-kubernetes-engine/blob/main//54-GKE-Ingress-InternalLB/README.md | main | google-kubernetes-engine | [
-0.022739723324775696,
0.02347007393836975,
0.025818930938839912,
-0.03989584743976593,
-0.014036674983799458,
-0.050982147455215454,
-0.05077200010418892,
-0.023978525772690773,
0.02646840363740921,
0.06314787268638611,
-0.04070049151778221,
-0.13256199657917023,
0.021487122401595116,
-0.... | 0.096849 |
## Kubernetes Deployment - Topics 1. Create Deployment 2. Scale the Deployment 3. Expose Deployment as a Service 4. Update Deployment 5. Rollback Deployment 6. Rolling Restarts 7. Pause & Resume Deployments 8. Canary Deployments (Will be covered at Declarative section of Deployments) ## Step-01: Introduction to Deploym... | https://github.com/stacksimplify/google-kubernetes-engine/blob/main//08-kubectl-imperative-k8s-deployment-CREATE/README.md | main | google-kubernetes-engine | [
0.003510240465402603,
-0.04328208044171333,
0.028654661029577255,
-0.02002359740436077,
-0.07230526208877563,
-0.018069643527269363,
-0.06621204316616058,
-0.024918584153056145,
0.0027827497106045485,
0.06225353851914406,
0.02567111700773239,
-0.047891952097415924,
0.03487633168697357,
-0.... | 0.07411 |
## Step-00: Pre-requisites 1. Verify if GKE Cluster is created 2. Verify if kubeconfig for kubectl is configured in your local terminal ```t # Configure kubeconfig for kubectl gcloud container clusters get-credentials --region --project # Replace Values CLUSTER-NAME, REGION, PROJECT gcloud container clusters get-creden... | https://github.com/stacksimplify/google-kubernetes-engine/blob/main//62-Kubernetes-Requests-and-Limits/README.md | main | google-kubernetes-engine | [
0.03520410880446434,
0.04670703411102295,
0.0004327622300479561,
-0.006506620440632105,
-0.020086169242858887,
-0.02999003976583481,
-0.012110955081880093,
-0.0546143501996994,
0.0487784743309021,
0.006257147062569857,
-0.058777421712875366,
-0.10553490370512009,
0.00767145212739706,
-0.08... | 0.127485 |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.