Lifeguard integration with Kubernetes
Project description
Lifeguard K8S
Integration with Kubernetes
Validations
- pods_validation: check if all pods are running
Important: To use Kubernetes APIs into the valiations, you need to create a service account and a cluster role binding. Example of a valid manifest:
---
apiVersion: v1
kind: ServiceAccount
metadata:
name: lifeguard-sa
---
kind: ClusterRole
apiVersion: rbac.authorization.k8s.io/v1
metadata:
name: lifeguard-roles
rules:
- apiGroups: [""]
resources: ["nodes"]
verbs: ["get", "list"]
- apiGroups: [""]
resources: ["pods", "pods/exec"]
verbs: ["get", "list"]
---
apiVersion: rbac.authorization.k8s.io/v1
kind: ClusterRoleBinding
metadata:
name: lifeguard-rolebinding
subjects:
- kind: ServiceAccount
name: lifeguard-sa
namespace: namespace
roleRef:
kind: ClusterRole
name: lifeguard-roles
apiGroup: rbac.authorization.k8s.io
Project details
Download files
Download the file for your platform. If you're not sure which to choose, learn more about installing packages.
Source Distribution
lifeguard-k8s-1.1.0.tar.gz
(5.0 kB
view hashes)
Built Distribution
Close
Hashes for lifeguard_k8s-1.1.0-py3-none-any.whl
Algorithm | Hash digest | |
---|---|---|
SHA256 | 9ee8e91fd77f30af57473a469188da5090fa09276bf5b2dc0750c7298267d0db |
|
MD5 | f219688c23e24a46c5644f07e10622c8 |
|
BLAKE2b-256 | abfaea923251df7b2f0a639dcf90a55b0979a3f060a765669c09240823a53570 |