Automated Manifest Update (#2179)

This PR contains newly rendered Kubernetes manifests automatically generated by the CI workflow.

Reviewed-on: #2179
Co-authored-by: gitea-bot <gitea-bot@alexlebens.net>
Co-committed-by: gitea-bot <gitea-bot@alexlebens.net>
This commit was merged in pull request #2179.
This commit is contained in:
2025-12-02 05:19:15 +00:00
committed by Alex Lebens
parent d9d069228a
commit 84c4d2f809
2 changed files with 724 additions and 4 deletions

View File

@@ -0,0 +1,720 @@
---
# Source: democratic-csi-synology-iscsi/templates/namespace.yaml
apiVersion: v1
kind: Namespace
metadata:
name: democratic-csi-synology-iscsi
labels:
app.kubernetes.io/name: democratic-csi-synology-iscsi
app.kubernetes.io/instance: democratic-csi-synology-iscsi
app.kubernetes.io/part-of: democratic-csi-synology-iscsi
pod-security.kubernetes.io/audit: privileged
pod-security.kubernetes.io/enforce: privileged
pod-security.kubernetes.io/warn: privileged
---
# Source: democratic-csi-synology-iscsi/charts/democratic-csi/templates/controller-rbac.yaml
apiVersion: v1
kind: ServiceAccount
metadata:
name: democratic-csi-synology-iscsi-controller-sa
namespace: democratic-csi-synology-iscsi
labels:
app.kubernetes.io/name: democratic-csi
helm.sh/chart: democratic-csi-0.15.0
app.kubernetes.io/instance: democratic-csi-synology-iscsi
app.kubernetes.io/managed-by: Helm
---
# Source: democratic-csi-synology-iscsi/charts/democratic-csi/templates/node-rbac.yaml
apiVersion: v1
kind: ServiceAccount
metadata:
name: democratic-csi-synology-iscsi-node-sa
namespace: democratic-csi-synology-iscsi
labels:
app.kubernetes.io/name: democratic-csi
helm.sh/chart: democratic-csi-0.15.0
app.kubernetes.io/instance: democratic-csi-synology-iscsi
app.kubernetes.io/managed-by: Helm
---
# Source: democratic-csi-synology-iscsi/charts/democratic-csi/templates/configmap.yaml
apiVersion: v1
kind: ConfigMap
metadata:
name: democratic-csi-synology-iscsi
namespace: democratic-csi-synology-iscsi
labels:
app.kubernetes.io/name: democratic-csi
helm.sh/chart: democratic-csi-0.15.0
app.kubernetes.io/instance: democratic-csi-synology-iscsi
app.kubernetes.io/managed-by: Helm
data:
extra-ca-certs: ""
---
# Source: democratic-csi-synology-iscsi/charts/democratic-csi/templates/storage-classes.yaml
apiVersion: storage.k8s.io/v1
kind: StorageClass
metadata:
name: synology-iscsi-delete
labels:
app.kubernetes.io/name: democratic-csi
helm.sh/chart: democratic-csi-0.15.0
app.kubernetes.io/instance: democratic-csi-synology-iscsi
app.kubernetes.io/managed-by: Helm
provisioner: org.democratic-csi.iscsi-synology
reclaimPolicy: Delete
allowVolumeExpansion: true
volumeBindingMode: Immediate
parameters:
fsType: "ext4"
# this loop is deeply connected to the loop for Secret creation below
---
# Source: democratic-csi-synology-iscsi/charts/democratic-csi/templates/storage-classes.yaml
apiVersion: storage.k8s.io/v1
kind: StorageClass
metadata:
name: synology-iscsi-retain
labels:
app.kubernetes.io/name: democratic-csi
helm.sh/chart: democratic-csi-0.15.0
app.kubernetes.io/instance: democratic-csi-synology-iscsi
app.kubernetes.io/managed-by: Helm
provisioner: org.democratic-csi.iscsi-synology
reclaimPolicy: Retain
allowVolumeExpansion: true
volumeBindingMode: Immediate
parameters:
fsType: "ext4"
# this loop is deeply connected to the loop for Secret creation below
# this loop is deeply connected to the loop for secret parameter settings above
---
# Source: democratic-csi-synology-iscsi/charts/democratic-csi/templates/controller-rbac.yaml
kind: ClusterRole
apiVersion: rbac.authorization.k8s.io/v1
metadata:
name: democratic-csi-synology-iscsi-controller-cr
labels:
app.kubernetes.io/name: democratic-csi
helm.sh/chart: democratic-csi-0.15.0
app.kubernetes.io/instance: democratic-csi-synology-iscsi
app.kubernetes.io/managed-by: Helm
rules:
# Allow listing and creating CRDs
- apiGroups: ['apiextensions.k8s.io']
resources: ['customresourcedefinitions']
verbs: ['list', 'create']
- apiGroups: ['']
resources: ['persistentvolumes']
verbs: ['create', 'delete', 'get', 'list', 'watch', 'update', 'patch']
- apiGroups: ['']
resources: ['secrets']
verbs: ['get', 'list']
- apiGroups: ['']
resources: ['pods']
verbs: ['get', 'list', 'watch']
- apiGroups: ['']
resources: ['persistentvolumeclaims']
verbs: ['get', 'list', 'watch', 'update', 'patch']
- apiGroups: ['']
resources: ['persistentvolumeclaims/status']
verbs: ['get', 'list', 'watch', 'update', 'patch']
- apiGroups: ['']
resources: ['nodes']
verbs: ['get', 'list', 'watch']
- apiGroups: ['storage.k8s.io']
resources: ['volumeattachments']
verbs: ['get', 'list', 'watch', 'update', 'patch']
- apiGroups: ["storage.k8s.io"]
resources: ["volumeattachments/status"]
verbs: ["patch"]
- apiGroups: ['storage.k8s.io']
resources: ['storageclasses']
verbs: ['get', 'list', 'watch']
- apiGroups: ['csi.storage.k8s.io']
resources: ['csidrivers']
verbs: ['get', 'list', 'watch', 'update', 'create']
- apiGroups: ['']
resources: ['events']
verbs: ['list', 'watch', 'create', 'update', 'patch']
- apiGroups: ["snapshot.storage.k8s.io"]
resources: ["volumesnapshotclasses"]
verbs: ["get", "list", "watch"]
- apiGroups: ['snapshot.storage.k8s.io']
resources: ['volumesnapshots/status']
verbs: ["create", "get", "list", "watch", "update", "patch", "delete"]
- apiGroups: ["snapshot.storage.k8s.io"]
resources: ["volumesnapshotcontents"]
verbs: ["create", "get", "list", "watch", "update", "patch", "delete"]
- apiGroups: ["snapshot.storage.k8s.io"]
resources: ["volumesnapshotcontents/status"]
verbs: ["create", "get", "list", "watch", "update", "patch", "delete"]
- apiGroups: ["snapshot.storage.k8s.io"]
resources: ["volumesnapshots"]
verbs: ["create", "get", "list", "watch", "update", "patch", "delete"]
- apiGroups: ["storage.k8s.io"]
resources: ["csinodes"]
verbs: ["get", "list", "watch"]
- apiGroups: ["csi.storage.k8s.io"]
resources: ["csinodeinfos"]
verbs: ["get", "list", "watch"]
- apiGroups: ["coordination.k8s.io"]
resources: ["leases"]
verbs: ["get", "watch", "list", "delete", "update", "create"]
# capacity rbac
- apiGroups: ["storage.k8s.io"]
resources: ["csistoragecapacities"]
verbs: ["get", "list", "watch", "create", "update", "patch", "delete"]
- apiGroups: [""]
resources: ["pods"]
verbs: ["get"]
- apiGroups: ["apps"]
resources: ["daemonsets", "deployments", "replicasets", "statefulsets"]
verbs: ["get"]
---
# Source: democratic-csi-synology-iscsi/charts/democratic-csi/templates/node-rbac.yaml
kind: ClusterRole
apiVersion: rbac.authorization.k8s.io/v1
metadata:
name: democratic-csi-synology-iscsi-node-cr
labels:
app.kubernetes.io/name: democratic-csi
helm.sh/chart: democratic-csi-0.15.0
app.kubernetes.io/instance: democratic-csi-synology-iscsi
app.kubernetes.io/managed-by: Helm
rules:
# Allow listing and creating CRDs
- apiGroups: ['apiextensions.k8s.io']
resources: ['customresourcedefinitions']
verbs: ['list', 'create']
- apiGroups: [""]
resources: ["nodes"]
verbs: ["get", "list", "watch", "update"]
- apiGroups: [""]
resources: ["persistentvolumes"]
verbs: ["get", "list", "watch", "update"]
- apiGroups: ["storage.k8s.io"]
resources: ["volumeattachments"]
verbs: ["get", "list", "watch", "update"]
---
# Source: democratic-csi-synology-iscsi/charts/democratic-csi/templates/controller-rbac.yaml
kind: ClusterRoleBinding
apiVersion: rbac.authorization.k8s.io/v1
metadata:
name: democratic-csi-synology-iscsi-controller-rb
labels:
app.kubernetes.io/name: democratic-csi
helm.sh/chart: democratic-csi-0.15.0
app.kubernetes.io/instance: democratic-csi-synology-iscsi
app.kubernetes.io/managed-by: Helm
roleRef:
kind: ClusterRole
apiGroup: rbac.authorization.k8s.io
name: democratic-csi-synology-iscsi-controller-cr
subjects:
- kind: ServiceAccount
name: democratic-csi-synology-iscsi-controller-sa
namespace: democratic-csi-synology-iscsi
---
# Source: democratic-csi-synology-iscsi/charts/democratic-csi/templates/node-rbac.yaml
kind: ClusterRoleBinding
apiVersion: rbac.authorization.k8s.io/v1
metadata:
name: democratic-csi-synology-iscsi-node-rb
labels:
app.kubernetes.io/name: democratic-csi
helm.sh/chart: democratic-csi-0.15.0
app.kubernetes.io/instance: democratic-csi-synology-iscsi
app.kubernetes.io/managed-by: Helm
roleRef:
kind: ClusterRole
apiGroup: rbac.authorization.k8s.io
name: democratic-csi-synology-iscsi-node-cr
subjects:
- kind: ServiceAccount
name: democratic-csi-synology-iscsi-node-sa
namespace: democratic-csi-synology-iscsi
---
# Source: democratic-csi-synology-iscsi/charts/democratic-csi/templates/node.yaml
kind: DaemonSet
apiVersion: apps/v1
metadata:
name: democratic-csi-synology-iscsi-node
namespace: democratic-csi-synology-iscsi
labels:
app.kubernetes.io/name: democratic-csi
helm.sh/chart: democratic-csi-0.15.0
app.kubernetes.io/instance: democratic-csi-synology-iscsi
app.kubernetes.io/managed-by: Helm
app.kubernetes.io/csi-role: "node"
app.kubernetes.io/component: "node-linux"
spec:
selector:
matchLabels:
app.kubernetes.io/name: democratic-csi
app.kubernetes.io/instance: democratic-csi-synology-iscsi
app.kubernetes.io/managed-by: Helm
app.kubernetes.io/csi-role: "node"
app.kubernetes.io/component: "node-linux"
template:
metadata:
annotations:
checksum/configmap: 263840c3436d67b6e25f68fabb84f358c3df828bc15d9ec327e733b38cabd1d7
labels:
app.kubernetes.io/name: democratic-csi
app.kubernetes.io/instance: democratic-csi-synology-iscsi
app.kubernetes.io/managed-by: Helm
app.kubernetes.io/csi-role: "node"
app.kubernetes.io/component: "node-linux"
spec:
serviceAccount: democratic-csi-synology-iscsi-node-sa
priorityClassName: "system-node-critical"
# Required by iSCSI
hostNetwork: true
dnsPolicy: ClusterFirstWithHostNet
hostAliases: []
# Required by multipath detach
hostIPC: true
hostPID: true
containers:
- name: csi-driver
image: "docker.io/democraticcsi/democratic-csi:latest"
args:
- --csi-version=1.5.0
- --csi-name=org.democratic-csi.iscsi-synology
- --driver-config-file=/config/driver-config-file.yaml
- --log-level=info
- --csi-mode=node
- --server-socket=/csi-data/csi.sock.internal
securityContext:
allowPrivilegeEscalation: true
capabilities:
add:
- SYS_ADMIN
privileged: true
env:
- name: CSI_NODE_ID
valueFrom:
fieldRef:
apiVersion: v1
fieldPath: spec.nodeName
- name: NODE_EXTRA_CA_CERTS
value: "/tmp/certs/extra-ca-certs.crt"
- name: ISCSIADM_HOST_STRATEGY
value: nsenter
- name: ISCSIADM_HOST_PATH
value: /usr/local/sbin/iscsiadm
# prevent crazy error messages due to the /dev host mount
terminationMessagePath: /tmp/termination-log
terminationMessagePolicy: File
livenessProbe:
failureThreshold: 3
exec:
command:
- bin/liveness-probe
- --csi-version=1.5.0
- --csi-address=/csi-data/csi.sock.internal
initialDelaySeconds: 10
timeoutSeconds: 15
periodSeconds: 60
volumeMounts:
- name: socket-dir
mountPath: /csi-data
- name: kubelet-dir
mountPath: /var/lib/kubelet
mountPropagation: Bidirectional
- name: iscsi-dir
mountPath: /var/iscsi
mountPropagation: Bidirectional
- name: iscsi-info
mountPath: /var/lib/iscsi
mountPropagation: Bidirectional
- name: modules-dir
mountPath: /lib/modules
readOnly: true
- name: localtime
mountPath: /etc/localtime
readOnly: true
- name: udev-data
mountPath: /run/udev
- name: host-dir
mountPath: /host
mountPropagation: Bidirectional
- mountPath: /sys
name: sys-dir
- name: dev-dir
mountPath: /dev
- name: config
mountPath: /config
- name: extra-ca-certs
mountPath: /tmp/certs
- name: csi-proxy
image: "docker.io/democraticcsi/csi-grpc-proxy:v0.5.6"
env:
- name: BIND_TO
value: "unix:///csi-data/csi.sock"
- name: PROXY_TO
value: "unix:///csi-data/csi.sock.internal"
volumeMounts:
- mountPath: /csi-data
name: socket-dir
- name: driver-registrar
image: "registry.k8s.io/sig-storage/csi-node-driver-registrar:v2.9.0"
args:
- --v=5
- --csi-address=/csi-data/csi.sock
- --kubelet-registration-path=/var/lib/kubelet/plugins/org.democratic-csi.iscsi-synology/csi.sock
env:
- name: KUBE_NODE_NAME
valueFrom:
fieldRef:
apiVersion: v1
fieldPath: spec.nodeName
livenessProbe:
exec:
command:
- /csi-node-driver-registrar
- --kubelet-registration-path=/var/lib/kubelet/plugins/org.democratic-csi.iscsi-synology/csi.sock
- --mode=kubelet-registration-probe
volumeMounts:
- mountPath: /csi-data
name: socket-dir
- name: registration-dir
mountPath: /registration
- name: kubelet-dir
mountPath: /var/lib/kubelet
- name: cleanup
image: "docker.io/busybox:1.37.0"
command:
- "/bin/sh"
- "-c"
- "--"
args: [ "while true; do sleep 2; done;" ]
lifecycle:
# note this runs *before* other containers are terminated
preStop:
exec:
command: ["/bin/sh", "-c", "rm -rf /plugins/org.democratic-csi.iscsi-synology /registration/org.democratic-csi.iscsi-synology-reg.sock"]
volumeMounts:
- name: plugins-dir
mountPath: /plugins
- name: registration-dir
mountPath: /registration
volumes:
- name: socket-dir
hostPath:
path: /var/lib/kubelet/plugins/org.democratic-csi.iscsi-synology
type: DirectoryOrCreate
- name: plugins-dir
hostPath:
path: /var/lib/kubelet/plugins
type: Directory
- name: registration-dir
hostPath:
path: /var/lib/kubelet/plugins_registry
type: Directory
- name: kubelet-dir
hostPath:
path: /var/lib/kubelet
type: Directory
- name: iscsi-dir
hostPath:
path: /var/iscsi
type:
- name: iscsi-info
hostPath:
path: /var/lib/iscsi
- name: dev-dir
hostPath:
path: /dev
type: Directory
- name: modules-dir
hostPath:
path: /lib/modules
- name: localtime
hostPath:
path: /etc/localtime
- name: udev-data
hostPath:
path: /run/udev
- name: sys-dir
hostPath:
path: /sys
type: Directory
- name: host-dir
hostPath:
path: /
type: Directory
- name: config
secret:
secretName: synology-iscsi-config-secret
- name: extra-ca-certs
configMap:
name: democratic-csi-synology-iscsi
items:
- key: extra-ca-certs
path: extra-ca-certs.crt
nodeSelector:
kubernetes.io/os: linux
---
# Source: democratic-csi-synology-iscsi/charts/democratic-csi/templates/controller.yaml
kind: Deployment
apiVersion: apps/v1
metadata:
name: democratic-csi-synology-iscsi-controller
namespace: democratic-csi-synology-iscsi
labels:
app.kubernetes.io/name: democratic-csi
helm.sh/chart: democratic-csi-0.15.0
app.kubernetes.io/instance: democratic-csi-synology-iscsi
app.kubernetes.io/managed-by: Helm
app.kubernetes.io/csi-role: "controller"
app.kubernetes.io/component: "controller-linux"
spec:
replicas: 2
selector:
matchLabels:
app.kubernetes.io/name: democratic-csi
app.kubernetes.io/instance: democratic-csi-synology-iscsi
app.kubernetes.io/managed-by: Helm
app.kubernetes.io/csi-role: "controller"
app.kubernetes.io/component: "controller-linux"
template:
metadata:
annotations:
checksum/configmap: 263840c3436d67b6e25f68fabb84f358c3df828bc15d9ec327e733b38cabd1d7
labels:
app.kubernetes.io/name: democratic-csi
app.kubernetes.io/instance: democratic-csi-synology-iscsi
app.kubernetes.io/managed-by: Helm
app.kubernetes.io/csi-role: "controller"
app.kubernetes.io/component: "controller-linux"
spec:
serviceAccount: democratic-csi-synology-iscsi-controller-sa
priorityClassName: "system-cluster-critical"
hostNetwork: false
dnsPolicy: ClusterFirst
hostAliases: []
hostIPC: false
containers:
# https://github.com/kubernetes-csi/external-attacher
- name: external-attacher
image: "registry.k8s.io/sig-storage/csi-attacher:v4.4.0"
args:
- --v=5
- --leader-election
- --leader-election-namespace=democratic-csi-synology-iscsi
- --timeout=90s
- --worker-threads=10
- --csi-address=/csi-data/csi.sock
volumeMounts:
- mountPath: /csi-data
name: socket-dir
# https://github.com/kubernetes-csi/external-provisioner
- name: external-provisioner
image: "registry.k8s.io/sig-storage/csi-provisioner:v3.6.0"
args:
- --v=5
- --leader-election
- --leader-election-namespace=democratic-csi-synology-iscsi
- --timeout=90s
- --worker-threads=10
- --extra-create-metadata
- --csi-address=/csi-data/csi.sock
volumeMounts:
- mountPath: /csi-data
name: socket-dir
env:
- name: NODE_NAME
valueFrom:
fieldRef:
apiVersion: v1
fieldPath: spec.nodeName
- name: NAMESPACE
valueFrom:
fieldRef:
apiVersion: v1
fieldPath: metadata.namespace
- name: POD_NAME
valueFrom:
fieldRef:
apiVersion: v1
fieldPath: metadata.name
# https://github.com/kubernetes-csi/external-resizer
- name: external-resizer
image: "registry.k8s.io/sig-storage/csi-resizer:v1.9.0"
args:
- --v=5
- --leader-election
- --leader-election-namespace=democratic-csi-synology-iscsi
- --timeout=90s
- --workers=10
- --csi-address=/csi-data/csi.sock
volumeMounts:
- mountPath: /csi-data
name: socket-dir
env:
- name: NODE_NAME
valueFrom:
fieldRef:
apiVersion: v1
fieldPath: spec.nodeName
- name: NAMESPACE
valueFrom:
fieldRef:
apiVersion: v1
fieldPath: metadata.namespace
- name: POD_NAME
valueFrom:
fieldRef:
apiVersion: v1
fieldPath: metadata.name
# https://github.com/kubernetes-csi/external-snapshotter
# beware upgrading version:
# - https://github.com/rook/rook/issues/4178
# - https://github.com/kubernetes-csi/external-snapshotter/issues/147#issuecomment-513664310
- name: external-snapshotter
image: "registry.k8s.io/sig-storage/csi-snapshotter:v8.2.1"
args:
- --v=5
- --leader-election
- --leader-election-namespace=democratic-csi-synology-iscsi
- --timeout=90s
- --worker-threads=10
- --csi-address=/csi-data/csi.sock
volumeMounts:
- mountPath: /csi-data
name: socket-dir
env:
- name: NODE_NAME
valueFrom:
fieldRef:
apiVersion: v1
fieldPath: spec.nodeName
- name: NAMESPACE
valueFrom:
fieldRef:
apiVersion: v1
fieldPath: metadata.namespace
- name: POD_NAME
valueFrom:
fieldRef:
apiVersion: v1
fieldPath: metadata.name
- name: csi-driver
image: "docker.io/democraticcsi/democratic-csi:latest"
args:
- --csi-version=1.5.0
- --csi-name=org.democratic-csi.iscsi-synology
- --driver-config-file=/config/driver-config-file.yaml
- --log-level=info
- --csi-mode=controller
- --server-socket=/csi-data/csi.sock.internal
env:
- name: NODE_EXTRA_CA_CERTS
value: "/tmp/certs/extra-ca-certs.crt"
livenessProbe:
failureThreshold: 3
exec:
command:
- bin/liveness-probe
- --csi-version=1.5.0
- --csi-address=/csi-data/csi.sock.internal
initialDelaySeconds: 10
timeoutSeconds: 15
periodSeconds: 60
volumeMounts:
- name: socket-dir
mountPath: /csi-data
- name: config
mountPath: /config
- name: extra-ca-certs
mountPath: /tmp/certs
- name: csi-proxy
image: "docker.io/democraticcsi/csi-grpc-proxy:v0.5.6"
env:
- name: BIND_TO
value: "unix:///csi-data/csi.sock"
- name: PROXY_TO
value: "unix:///csi-data/csi.sock.internal"
volumeMounts:
- mountPath: /csi-data
name: socket-dir
volumes:
- name: socket-dir
emptyDir: {}
- name: config
secret:
secretName: synology-iscsi-config-secret
- name: extra-ca-certs
configMap:
name: democratic-csi-synology-iscsi
items:
- key: extra-ca-certs
path: extra-ca-certs.crt
nodeSelector:
kubernetes.io/os: linux
---
# Source: democratic-csi-synology-iscsi/charts/democratic-csi/templates/required.yaml
# 199b143b7f9f4df4dc97d9410c2fbe7aadb38e42729f08d92d12db1af0863fdf
# 1f4dc096d58f7d21e3875671aee6f29b120ab84218fa47db2cb53bc9eb5b4dac
# 9d8b3506156467be4bcf723a74d85e92d6ff851508e112fadfae94fd3a57e699
---
# Source: democratic-csi-synology-iscsi/charts/democratic-csi/templates/snapshot-classes.yaml
# this loop is deeply connected to the loop for secret parameter settings above
---
# Source: democratic-csi-synology-iscsi/charts/democratic-csi/templates/driver.yaml
apiVersion: storage.k8s.io/v1
kind: CSIDriver
metadata:
name: org.democratic-csi.iscsi-synology
labels:
app.kubernetes.io/name: democratic-csi
helm.sh/chart: democratic-csi-0.15.0
app.kubernetes.io/instance: democratic-csi-synology-iscsi
app.kubernetes.io/managed-by: Helm
spec:
attachRequired: true
podInfoOnMount: true
# https://kubernetes.io/blog/2020/12/14/kubernetes-release-1.20-fsgroupchangepolicy-fsgrouppolicy/
# added in Kubernetes 1.16
# volumeLifecycleModes:
# - Persistent
# - Ephemeral
---
# Source: democratic-csi-synology-iscsi/templates/external-secret.yaml
apiVersion: external-secrets.io/v1
kind: ExternalSecret
metadata:
name: synology-iscsi-config-secret
namespace: democratic-csi-synology-iscsi
labels:
app.kubernetes.io/name: synology-iscsi-config-secret
app.kubernetes.io/instance: democratic-csi-synology-iscsi
app.kubernetes.io/part-of: democratic-csi-synology-iscsi
spec:
secretStoreRef:
kind: ClusterSecretStore
name: vault
data:
- secretKey: driver-config-file.yaml
remoteRef:
conversionStrategy: Default
decodingStrategy: None
key: /cl01tl/democratic-csi-synology-iscsi/config
metadataPolicy: None
property: driver-config-file.yaml

View File

@@ -5,7 +5,7 @@ kind: ServiceAccount
metadata:
name: speedtest-exporter
labels:
helm.sh/chart: speedtest-exporter-0.1.1
helm.sh/chart: speedtest-exporter-0.1.2
app.kubernetes.io/name: speedtest-exporter
app.kubernetes.io/instance: speedtest-exporter
app.kubernetes.io/version: "v3.5.4"
@@ -17,7 +17,7 @@ kind: Service
metadata:
name: speedtest-exporter
labels:
helm.sh/chart: speedtest-exporter-0.1.1
helm.sh/chart: speedtest-exporter-0.1.2
app.kubernetes.io/name: speedtest-exporter
app.kubernetes.io/instance: speedtest-exporter
app.kubernetes.io/version: "v3.5.4"
@@ -39,7 +39,7 @@ kind: Deployment
metadata:
name: speedtest-exporter
labels:
helm.sh/chart: speedtest-exporter-0.1.1
helm.sh/chart: speedtest-exporter-0.1.2
app.kubernetes.io/name: speedtest-exporter
app.kubernetes.io/instance: speedtest-exporter
app.kubernetes.io/version: "v3.5.4"
@@ -84,7 +84,7 @@ metadata:
name: speedtest-exporter
namespace: speedtest-exporter
labels:
helm.sh/chart: speedtest-exporter-0.1.1
helm.sh/chart: speedtest-exporter-0.1.2
app.kubernetes.io/name: speedtest-exporter
app.kubernetes.io/instance: speedtest-exporter
app.kubernetes.io/version: "v3.5.4"