pkg/manifests/fixtures/external_dns/short-sync-interval.yaml (396 lines of code) (raw):

apiVersion: v1 kind: Namespace metadata: creationTimestamp: null labels: openservicemesh.io/monitored-by: osm name: test-namespace spec: {} status: {} --- apiVersion: v1 kind: ServiceAccount metadata: creationTimestamp: null labels: app.kubernetes.io/managed-by: aks-app-routing-operator app.kubernetes.io/name: external-dns kubernetes.azure.com/managedby: aks name: external-dns namespace: test-namespace --- apiVersion: rbac.authorization.k8s.io/v1 kind: ClusterRole metadata: creationTimestamp: null labels: app.kubernetes.io/managed-by: aks-app-routing-operator app.kubernetes.io/name: external-dns kubernetes.azure.com/managedby: aks name: external-dns rules: - apiGroups: - "" resources: - endpoints - pods - services - configmaps verbs: - get - watch - list - apiGroups: - "" resources: - nodes verbs: - get - watch - list - apiGroups: - extensions - networking.k8s.io resources: - ingresses verbs: - get - watch - list --- apiVersion: rbac.authorization.k8s.io/v1 kind: ClusterRoleBinding metadata: creationTimestamp: null labels: app.kubernetes.io/managed-by: aks-app-routing-operator app.kubernetes.io/name: external-dns kubernetes.azure.com/managedby: aks name: external-dns roleRef: apiGroup: rbac.authorization.k8s.io kind: ClusterRole name: external-dns subjects: - kind: ServiceAccount name: external-dns namespace: test-namespace --- apiVersion: v1 data: azure.json: '{"cloud":"","location":"","resourceGroup":"test-resource-group-public","subscriptionId":"test-subscription-id","tenantId":"test-tenant-id","useManagedIdentityExtension":true,"userAssignedIdentityID":"test-client-id"}' kind: ConfigMap metadata: creationTimestamp: null labels: app.kubernetes.io/managed-by: aks-app-routing-operator app.kubernetes.io/name: external-dns kubernetes.azure.com/managedby: aks name: external-dns namespace: test-namespace --- apiVersion: apps/v1 kind: Deployment metadata: creationTimestamp: null labels: app.kubernetes.io/managed-by: aks-app-routing-operator app.kubernetes.io/name: external-dns kubernetes.azure.com/managedby: aks name: external-dns namespace: test-namespace spec: replicas: 1 revisionHistoryLimit: 2 selector: matchLabels: app: external-dns strategy: {} template: metadata: creationTimestamp: null labels: app: external-dns app.kubernetes.io/managed-by: aks-app-routing-operator checksum/configmap: 7a7768971308cadb kubernetes.azure.com/managedby: aks spec: affinity: nodeAffinity: preferredDuringSchedulingIgnoredDuringExecution: - preference: matchExpressions: - key: kubernetes.azure.com/mode operator: In values: - system weight: 100 requiredDuringSchedulingIgnoredDuringExecution: nodeSelectorTerms: - matchExpressions: - key: kubernetes.azure.com/cluster operator: Exists - key: type operator: NotIn values: - virtual-kubelet - key: kubernetes.io/os operator: In values: - linux containers: - args: - --provider=azure - --interval=10s - --txt-owner-id=test-cluster-uid - --txt-wildcard-replacement=approutingwildcard - --source=ingress - --domain-filter=test-one.com - --domain-filter=test-two.com image: /oss/v2/kubernetes/external-dns:v0.15.0 livenessProbe: failureThreshold: 3 httpGet: path: /healthz port: 7979 scheme: HTTP initialDelaySeconds: 10 periodSeconds: 5 successThreshold: 1 timeoutSeconds: 1 name: controller readinessProbe: failureThreshold: 3 httpGet: path: /healthz port: 7979 scheme: HTTP initialDelaySeconds: 10 periodSeconds: 5 successThreshold: 1 timeoutSeconds: 1 resources: limits: cpu: 100m memory: 250Mi requests: cpu: 100m memory: 250Mi securityContext: allowPrivilegeEscalation: false capabilities: drop: - ALL privileged: false readOnlyRootFilesystem: true runAsGroup: 65532 runAsNonRoot: true runAsUser: 65532 volumeMounts: - mountPath: /etc/kubernetes name: azure-config readOnly: true priorityClassName: system-cluster-critical serviceAccountName: external-dns tolerations: - key: CriticalAddonsOnly operator: Exists volumes: - configMap: name: external-dns name: azure-config status: {} --- apiVersion: v1 kind: ServiceAccount metadata: creationTimestamp: null labels: app.kubernetes.io/managed-by: aks-app-routing-operator app.kubernetes.io/name: external-dns-private kubernetes.azure.com/managedby: aks name: external-dns-private namespace: test-namespace --- apiVersion: rbac.authorization.k8s.io/v1 kind: ClusterRole metadata: creationTimestamp: null labels: app.kubernetes.io/managed-by: aks-app-routing-operator app.kubernetes.io/name: external-dns-private kubernetes.azure.com/managedby: aks name: external-dns-private rules: - apiGroups: - "" resources: - endpoints - pods - services - configmaps verbs: - get - watch - list - apiGroups: - "" resources: - nodes verbs: - get - watch - list - apiGroups: - extensions - networking.k8s.io resources: - ingresses verbs: - get - watch - list --- apiVersion: rbac.authorization.k8s.io/v1 kind: ClusterRoleBinding metadata: creationTimestamp: null labels: app.kubernetes.io/managed-by: aks-app-routing-operator app.kubernetes.io/name: external-dns-private kubernetes.azure.com/managedby: aks name: external-dns-private roleRef: apiGroup: rbac.authorization.k8s.io kind: ClusterRole name: external-dns-private subjects: - kind: ServiceAccount name: external-dns-private namespace: test-namespace --- apiVersion: v1 data: azure.json: '{"cloud":"","location":"","resourceGroup":"test-resource-group-private","subscriptionId":"test-subscription-id","tenantId":"test-tenant-id","useManagedIdentityExtension":true,"userAssignedIdentityID":"test-client-id"}' kind: ConfigMap metadata: creationTimestamp: null labels: app.kubernetes.io/managed-by: aks-app-routing-operator app.kubernetes.io/name: external-dns-private kubernetes.azure.com/managedby: aks name: external-dns-private namespace: test-namespace --- apiVersion: apps/v1 kind: Deployment metadata: creationTimestamp: null labels: app.kubernetes.io/managed-by: aks-app-routing-operator app.kubernetes.io/name: external-dns-private kubernetes.azure.com/managedby: aks name: external-dns-private namespace: test-namespace spec: replicas: 1 revisionHistoryLimit: 2 selector: matchLabels: app: external-dns-private strategy: {} template: metadata: creationTimestamp: null labels: app: external-dns-private app.kubernetes.io/managed-by: aks-app-routing-operator checksum/configmap: aa75575c57a3fa54 kubernetes.azure.com/managedby: aks spec: affinity: nodeAffinity: preferredDuringSchedulingIgnoredDuringExecution: - preference: matchExpressions: - key: kubernetes.azure.com/mode operator: In values: - system weight: 100 requiredDuringSchedulingIgnoredDuringExecution: nodeSelectorTerms: - matchExpressions: - key: kubernetes.azure.com/cluster operator: Exists - key: type operator: NotIn values: - virtual-kubelet - key: kubernetes.io/os operator: In values: - linux containers: - args: - --provider=azure-private-dns - --interval=10s - --txt-owner-id=test-cluster-uid - --txt-wildcard-replacement=approutingwildcard - --source=ingress - --domain-filter=test-three.com - --domain-filter=test-four.com image: /oss/v2/kubernetes/external-dns:v0.15.0 livenessProbe: failureThreshold: 3 httpGet: path: /healthz port: 7979 scheme: HTTP initialDelaySeconds: 10 periodSeconds: 5 successThreshold: 1 timeoutSeconds: 1 name: controller readinessProbe: failureThreshold: 3 httpGet: path: /healthz port: 7979 scheme: HTTP initialDelaySeconds: 10 periodSeconds: 5 successThreshold: 1 timeoutSeconds: 1 resources: limits: cpu: 100m memory: 250Mi requests: cpu: 100m memory: 250Mi securityContext: allowPrivilegeEscalation: false capabilities: drop: - ALL privileged: false readOnlyRootFilesystem: true runAsGroup: 65532 runAsNonRoot: true runAsUser: 65532 volumeMounts: - mountPath: /etc/kubernetes name: azure-config readOnly: true priorityClassName: system-cluster-critical serviceAccountName: external-dns-private tolerations: - key: CriticalAddonsOnly operator: Exists volumes: - configMap: name: external-dns-private name: azure-config status: {} ---