If you have questions, join us on the kubernetes slack, channel #kubespray.Note: Upstart/SysV init based OS types are not supported.
kubernetes-cluster ansible kubernetes high-availability bare-metal gce aws kubespray kubernetes-management deploymentMolecule is designed to aid in the development and testing of Ansible roles. Molecule provides support for testing with multiple instances, operating systems and distributions, virtualization providers, test frameworks and testing scenarios. Molecule is opinionated in order to encourage an approach that results in consistently developed roles that are well-written, easily understood and maintained. Molecule uses Ansible playbooks to exercise the role and its associated tests. Molecule supports any provider [1] that Ansible supports.
python27 ansible testing testing-framework docker lxc lxd openstack vagrant testinfra goss ansible-lint ec2 yamllint gce azure python36 inspec rubocopprobably pointing on a task depending on a module present in requirements.txt (i.e. "unseal vault"). One way of solving this would be to uninstall the Ansible package and then, to install it via pip but it is not always possible. A workaround consists of setting ANSIBLE_LIBRARY and ANSIBLE_MODULE_UTILS environment variables respectively to the ansible/modules and ansible/module_utils subdirectories of pip packages installation location, which can be found in the Location field of the output of pip show [package] before executing ansible-playbook.
kubernetes-cluster ansible kubernetes high-availability bare-metal gce aws kubespray k8s-sig-cluster-lifecycleCreate HA K8s clusters on multiple clouds. Simplify K8s deployment and management, easily configure and deploy Helm releases, and view at-a-glance metrics for cluster usage. Want to skip the rest and install SG Control? Get started here.
containers docker kubernetes kubernetes-setup aws digitalocean gceEmpower developers and administrators through simplified deployment and management of Kubernetes. Supergiant facilitates clusters on multiple cloud providers, striving for agnostic infrastructure--with an autoscaling system that cares about efficiency. It asserts through autoscaling that every pod should have a home, but that underutilized infrastructure shouldn't be paid for (and, therefore, shouldn't be running). Note: This process is under review, and will be updated. However, most of it should still be valid. Before submitting a Pull Request, please see Community and Contributing above.
containers docker kubernetes kubernetes-setup aws digitalocean gceNever leave your terminal to use secrets while developing, testing, and building your apps. Instead of custom scripts, tokens in your .zshrc files, visible EXPORTs in your bash history, misplaced .env.production files and more around your workstation -- just use teller and connect it to any vault, key store, or cloud service you like (Teller support Hashicorp Vault, AWS Secrets Manager, Google Secret Manager, and many more).
heroku aws vault secret-management secrets hashicorp gce cyberark conjurOr, just get an access token.If you do not meet those, you must provide a keyFile or credentials object.
google authentication jwt service account googleapis gcloud cloud gce compute engine auth access tokenCloudflare can be optionally used to setup DNS records and SSL/TSL (HTTPS) encryption.
kubernetes-cluster openstack aws gce terraform helm kubeadm kubernetes kubernetes-management deploymentThis project is a collection of scripts that create an Arch Linux OS image that can run on Google Compute Engine.The image is configured close to the recommendations listed on Building an image from scratch.
gce arch-linux-image prebuilt-images compute-engine arch-linuxInstall bunyan and bunyan-stackdriver... If you are running on Google Cloud Platform, authentication will be taken care of automatically. If you're running elsewhere, or wish to provide alternative authentication, you can specify the keyFilename pointing to a service account JSON key.
google gce gcp stackdriver loggingThis module uses google-auto-auth to get the required access token. If you don't meet the requirements for automatic authentication, you will need to provide the same configuration object detailed in that readme. All accepted names may be suffixed with a version, e.g. ubuntu-1404.
gce google compute engine cloud images ubuntu redhat rhel opensuse suse debian coreos centosThe idea of this project is to make easy deployment of our infrastructure using the concept of Infrastructure as a Code.For this purpose,I have used 2 tier architecture setup consisting of two different tools, Terraform and Ansible.Terraform is used in order to provision the required instances on Cloud.Whereas, ansible is used to configure our application.
ansible gcloud terraform aws-ec2 gce kubernetes docker automation deployment azureManaged Certificates in GKE simplify user flow in managing HTTPS traffic. Instead of manually acquiring an SSL certificate from a Certificate Authority, configuring it on the load balancer and renewing it on time, now it is only necessary to create a Managed Certificate k8s Custom Resource object and provide a domain for which you want to obtain a certificate. The certificate will be auto-renewed when necessary. For that to work you need to run your cluster on a platform with Google Cloud Load Balancer, that is a cluster in GKE or your own cluster in GCP.
gke ssl-certificate managed gce certificateThis project provides an adapter for translating GCE node termination events to graceful pod terminations in Kubernetes. GCE VMs are typically live migratable. However, Preemptible VMs and VMs with Accelerators are not live migratable and are hence prone to VM terminations. Do not consume this project unless you are managing k8s clusters that run non migratable VM types. Note: This solution requires kubernetes versions >= 1.11 to work on Preemptible nodes.
kubernetes gce gke node terminationNode.js idiomatic client for Compute Engine. Compute Engine lets you create and run virtual machines on Google infrastructure. Compute Engine offers scale, performance, and value that allows you to easily launch large compute clusters on Google's infrastructure. There are no upfront investments and you can run thousands of virtual CPUs on a system that has been designed to be fast, and to offer strong consistency of performance.
nodejs gce compute compute-engine google-apis-client google-api-client google-apis google-api google google-cloud-platform google-cloud cloud google-compute-engineThis module uses google-auth-library to get the required access token. If you don't meet the requirements for automatic authentication, you will need to provide the same configuration object detailed in that readme. All accepted names may be suffixed with a version, e.g. ubuntu-1404.
gce google compute engine cloud images ubuntu redhat rhel opensuse suse debian coreos centosKubernetes state backup solution, designed to be run as Kubernetes Job. Use the Helm chart and deploy it to Kubernetes as CronJob which will ensure cluster backups of Kubernetes resource definitions to your S3/GCS/Azure cloud storage.
kubernetes backup-kubernetes-state backup aws azure gce google s3 gcs absFun fact - Groupcache was written by the same author as memcache (so yeah, he probably knows a thing or two about caching). It's also used within Google so you can be confident it works at scale. There is a lot to love about groupcache so, if you're using Go, it's really a no-brainer. There's just one issue ...
groupcache cluster gce autoscaling swim gossip gcpTry opnsense, build opnsense images or start development
opnsense development packer vagrant firewall aws gce virtualbox
We have large collection of open source products. Follow the tags from
Tag Cloud >>
Open source products are scattered around the web. Please provide information
about the open source projects you own / you use.
Add Projects.