kpt
kubeconform
Our great sponsors
kpt | kubeconform | |
---|---|---|
7 | 4 | |
1,632 | 1,923 | |
1.6% | - | |
8.4 | 6.0 | |
3 days ago | 29 days ago | |
Go | Go | |
Apache License 2.0 | Apache License 2.0 |
Stars - the number of stars that a project has on GitHub. Growth - month over month growth in stars.
Activity is a relative number indicating how actively a project is being developed. Recent commits have higher weight than older ones.
For example, an activity of 9.0 indicates that a project is amongst the top 10% of the most actively developed projects that we are tracking.
kpt
-
Introduce KPT KCL SDK - Kubernetes manifests editing with one line of KCL code.
For the kpt tool and kpt kcl SDK, all mutations performed by KCL in place will be checked into git. In reality, KCL is not limited to mutating Kubernetes manifests on the client side. It is also suitable for use in the admission controller (mainly with certain advantages in language features and performance). We also have plans to support the use of KCL by operators in clusters to edit or validate Kubernetes manifests just like Kubevela and CUE language.
-
Is it possible to use a conditional in the values.yaml file?
Why are you using a conditional in a declaration? There is https://github.com/GoogleContainerTools/kpt
- Kpt
-
Who's using GKE Config Connector?
Here is link number 1 - Previous text "kpt"
- Tools to Run Kubernetes Locally
kubeconform
-
Dealing with Yaml files
If you want to validate your resources against the schema of the resources (mind you also crds) you can use kubeconform.
-
[Show] Detecting YAML Issues Early
How is it different from https://github.com/yannh/kubeconform?
-
Securing Kubernetes Deployments
wget https://github.com/yannh/kubeconform/releases/download/v0.4.12/kubeconform-linux-amd64.tar.gz tar xf kubeconform-linux-amd64.tar.gz sudo cp kubeconform /usr/local/bin checkout kubeconform --summary deployment.yml
-
A Deep Dive Into Kubernetes Schema Validation
Kubeval and kubeconform are command-line tools that were developed with the intent to validate Kubernetes manifests without the requirement of having a running Kubernetes environment. Because kubeconform is based on kubeval, they operate similarly — verification is performed against pre-generated JSON schemas that are created from the OpenAPI specifications (swagger.json) for each particular Kubernetes version. All that remains to run the schema validation tests is to point the tool executable to a single manifest, directory or pattern.
What are some alternatives?
kustomize - Customization of kubernetes YAML configurations
kubeval - Validate your Kubernetes configuration files, supports multiple Kubernetes versions
kubevela - The Modern Application Platform.
kubernetes-schema-validation - resources for the blog post about Kubernetes schema validation
tanka - Flexible, reusable and concise configuration for Kubernetes
kube-score - Kubernetes object analysis with recommendations for improved reliability and security. kube-score actively prevents downtime and bugs in your Kubernetes YAML and Charts. Static code analysis for Kubernetes.
build-a-platform-with-krm - Build a platform with the Kubernetes resource model!
enhancements - Enhancements tracking repo for Kubernetes
helmfile - Declaratively deploy your Kubernetes manifests, Kustomize configs, and Charts as Helm releases. Generate all-in-one manifests for use with ArgoCD.
kubernetes-json-schema - Schemas for every version of every object in every version of Kubernetes
kcp - Kubernetes-like control planes for form-factors and use-cases beyond Kubernetes and container workloads.
hyperfine - A command-line benchmarking tool