clean up
diff --git "a/archive/argo/\043argo-events-crds-install.yaml\043" "b/archive/argo/\043argo-events-crds-install.yaml\043"
new file mode 100644
index 0000000..92b812a
--- /dev/null
+++ "b/archive/argo/\043argo-events-crds-install.yaml\043"
@@ -0,0 +1,221 @@
+oapiVersion: apiextensions.k8s.io/v1beta1
+kind: CustomResourceDefinition
+metadata:
+ name: gateways.argoproj.io
+spec:
+ group: argoproj.io
+ names:
+ kind: Gateway
+ listKind: GatewayList
+ plural: gateways
+ singular: gateway
+ shortNames:
+ - gw
+ scope: Namespaced
+ version: "v1alpha1"
+---
+apiVersion: apiextensions.k8s.io/v1beta1
+kind: CustomResourceDefinition
+metadata:
+ name: sensors.argoproj.io
+spec:
+ group: argoproj.io
+ names:
+ kind: Sensor
+ listKind: SensorList
+ plural: sensors
+ singular: sensor
+ shortNames:
+ - sn
+ scope: Namespaced
+ version: "v1alpha1"
+---
+apiVersion: apiextensions.k8s.io/v1beta1
+kind: CustomResourceDefinition
+metadata:
+ name: eventsources.argoproj.io
+spec:
+ group: argoproj.io
+ scope: Namespaced
+ names:
+ kind: EventSource
+ plural: eventsources
+ singular: eventsource
+ listKind: EventSourceList
+ shortNames:
+ - es
+ version: "v1alpha1"
+---
+# apiVersion: v1
+# kind: Namespace
+# metadata:
+# name: argo-events
+---
+apiVersion: v1
+kind: ServiceAccount
+metadata:
+ name: argo-events-sa
+ namespace: kube-system
+---
+apiVersion: rbac.authorization.k8s.io/v1
+kind: RoleBinding
+metadata:
+ name: argo-events-role-binding
+roleRef:
+ apiGroup: rbac.authorization.k8s.io
+ kind: Role
+ name: argo-events-role
+subjects:
+ - kind: ServiceAccount
+ name: argo-events-sa
+ namespace: kube-system
+---
+apiVersion: rbac.authorization.k8s.io/v1
+kind: Role
+metadata:
+ name: argo-events-role
+rules:
+ - apiGroups:
+ - argoproj.io
+ verbs:
+ - create
+ - delete
+ - deletecollection
+ - get
+ - list
+ - patch
+ - update
+ - watch
+ resources:
+ - workflows
+ - workflows/finalizers
+ - workflowtemplates
+ - workflowtemplates/finalizers
+ - gateways
+ - gateways/finalizers
+ - sensors
+ - sensors/finalizers
+ - eventsources
+ - eventsources/finalizers
+ - apiGroups:
+ - ""
+ resources:
+ - pods
+ - pods/exec
+ - configmaps
+ - secrets
+ - services
+ - events
+ - persistentvolumeclaims
+ verbs:
+ - create
+ - get
+ - list
+ - watch
+ - update
+ - patch
+ - delete
+ - apiGroups:
+ - "batch"
+ resources:
+ - jobs
+ verbs:
+ - create
+ - get
+ - list
+ - watch
+ - update
+ - patch
+ - delete
+ - apiGroups:
+ - "apps"
+ resources:
+ - deployments
+ verbs:
+ - create
+ - get
+ - list
+ - watch
+ - update
+ - patch
+ - delete
+---
+apiVersion: v1
+kind: ConfigMap
+metadata:
+ name: gateway-controller-configmap
+ namespace: kube-system
+data:
+ config: |
+ instanceID: argo-events
+ namespace: kube-system
+---
+# The gateway-controller listens for changes on the gateway CRD and creates gateway
+apiVersion: apps/v1
+kind: Deployment
+metadata:
+ name: gateway-controller
+ namespace: kube-system
+spec:
+ replicas: 1
+ selector:
+ matchLabels:
+ app: gateway-controller
+ template:
+ metadata:
+ labels:
+ app: gateway-controller
+ spec:
+ serviceAccountName: argo-events-sa
+ containers:
+ - name: gateway-controller
+ image: argoproj/gateway-controller:v0.13.0
+ imagePullPolicy: Always
+ env:
+ - name: NAMESPACE
+ valueFrom:
+ fieldRef:
+ fieldPath: metadata.namespace
+ - name: CONTROLLER_CONFIG_MAP
+ value: gateway-controller-configmap
+---
+# The sensor-controller configmap includes configuration information for the sensor-controller
+# To watch sensors created in different namespace than the controller is deployed in, remove the namespace: kube-system.
+# Similarly to watch sensors created in specific namespace, change to namespace: <your_namespace>
+apiVersion: v1
+kind: ConfigMap
+metadata:
+ name: sensor-controller-configmap
+ namespace: kube-system
+data:
+ config: |
+ instanceID: argo-events
+ namespace: kube-system
+---
+apiVersion: apps/v1
+kind: Deployment
+metadata:
+ name: sensor-controller
+ namespace: kube-system
+spec:
+ replicas: 1
+ selector:
+ matchLabels:
+ app: sensor-controller
+ template:
+ metadata:
+ labels:
+ app: sensor-controller
+ spec:
+ serviceAccountName: argo-events-sa
+ containers:
+ - name: sensor-controller
+ image: argoproj/sensor-controller:v0.13.0
+ imagePullPolicy: Always
+ env:
+ - name: NAMESPACE
+ valueFrom:
+ fieldRef:
+ fieldPath: metadata.namespace
+ - name: CONTROLLER_CONFIG_MAP
+ value: sensor-controller-configmap
diff --git a/archive/argo/argo-events-crds-install.yaml b/archive/argo/argo-events-crds-install.yaml
new file mode 100644
index 0000000..c746479
--- /dev/null
+++ b/archive/argo/argo-events-crds-install.yaml
@@ -0,0 +1,221 @@
+apiVersion: apiextensions.k8s.io/v1beta1
+kind: CustomResourceDefinition
+metadata:
+ name: gateways.argoproj.io
+spec:
+ group: argoproj.io
+ names:
+ kind: Gateway
+ listKind: GatewayList
+ plural: gateways
+ singular: gateway
+ shortNames:
+ - gw
+ scope: Namespaced
+ version: "v1alpha1"
+---
+apiVersion: apiextensions.k8s.io/v1beta1
+kind: CustomResourceDefinition
+metadata:
+ name: sensors.argoproj.io
+spec:
+ group: argoproj.io
+ names:
+ kind: Sensor
+ listKind: SensorList
+ plural: sensors
+ singular: sensor
+ shortNames:
+ - sn
+ scope: Namespaced
+ version: "v1alpha1"
+---
+apiVersion: apiextensions.k8s.io/v1beta1
+kind: CustomResourceDefinition
+metadata:
+ name: eventsources.argoproj.io
+spec:
+ group: argoproj.io
+ scope: Namespaced
+ names:
+ kind: EventSource
+ plural: eventsources
+ singular: eventsource
+ listKind: EventSourceList
+ shortNames:
+ - es
+ version: "v1alpha1"
+---
+# apiVersion: v1
+# kind: Namespace
+# metadata:
+# name: argo-events
+---
+apiVersion: v1
+kind: ServiceAccount
+metadata:
+ name: argo-events-sa
+ namespace: kube-system
+---
+apiVersion: rbac.authorization.k8s.io/v1
+kind: RoleBinding
+metadata:
+ name: argo-events-role-binding
+roleRef:
+ apiGroup: rbac.authorization.k8s.io
+ kind: Role
+ name: argo-events-role
+subjects:
+ - kind: ServiceAccount
+ name: argo-events-sa
+ namespace: kube-system
+---
+apiVersion: rbac.authorization.k8s.io/v1
+kind: Role
+metadata:
+ name: argo-events-role
+rules:
+ - apiGroups:
+ - argoproj.io
+ verbs:
+ - create
+ - delete
+ - deletecollection
+ - get
+ - list
+ - patch
+ - update
+ - watch
+ resources:
+ - workflows
+ - workflows/finalizers
+ - workflowtemplates
+ - workflowtemplates/finalizers
+ - gateways
+ - gateways/finalizers
+ - sensors
+ - sensors/finalizers
+ - eventsources
+ - eventsources/finalizers
+ - apiGroups:
+ - ""
+ resources:
+ - pods
+ - pods/exec
+ - configmaps
+ - secrets
+ - services
+ - events
+ - persistentvolumeclaims
+ verbs:
+ - create
+ - get
+ - list
+ - watch
+ - update
+ - patch
+ - delete
+ - apiGroups:
+ - "batch"
+ resources:
+ - jobs
+ verbs:
+ - create
+ - get
+ - list
+ - watch
+ - update
+ - patch
+ - delete
+ - apiGroups:
+ - "apps"
+ resources:
+ - deployments
+ verbs:
+ - create
+ - get
+ - list
+ - watch
+ - update
+ - patch
+ - delete
+---
+apiVersion: v1
+kind: ConfigMap
+metadata:
+ name: gateway-controller-configmap
+ namespace: kube-system
+data:
+ config: |
+ instanceID: argo-events
+ namespace: kube-system
+---
+# The gateway-controller listens for changes on the gateway CRD and creates gateway
+apiVersion: apps/v1
+kind: Deployment
+metadata:
+ name: gateway-controller
+ namespace: kube-system
+spec:
+ replicas: 1
+ selector:
+ matchLabels:
+ app: gateway-controller
+ template:
+ metadata:
+ labels:
+ app: gateway-controller
+ spec:
+ serviceAccountName: argo-events-sa
+ containers:
+ - name: gateway-controller
+ image: argoproj/gateway-controller:v0.13.0
+ imagePullPolicy: Always
+ env:
+ - name: NAMESPACE
+ valueFrom:
+ fieldRef:
+ fieldPath: metadata.namespace
+ - name: CONTROLLER_CONFIG_MAP
+ value: gateway-controller-configmap
+---
+# The sensor-controller configmap includes configuration information for the sensor-controller
+# To watch sensors created in different namespace than the controller is deployed in, remove the namespace: kube-system.
+# Similarly to watch sensors created in specific namespace, change to namespace: <your_namespace>
+apiVersion: v1
+kind: ConfigMap
+metadata:
+ name: sensor-controller-configmap
+ namespace: kube-system
+data:
+ config: |
+ instanceID: argo-events
+ namespace: kube-system
+---
+apiVersion: apps/v1
+kind: Deployment
+metadata:
+ name: sensor-controller
+ namespace: kube-system
+spec:
+ replicas: 1
+ selector:
+ matchLabels:
+ app: sensor-controller
+ template:
+ metadata:
+ labels:
+ app: sensor-controller
+ spec:
+ serviceAccountName: argo-events-sa
+ containers:
+ - name: sensor-controller
+ image: argoproj/sensor-controller:v0.13.0
+ imagePullPolicy: Always
+ env:
+ - name: NAMESPACE
+ valueFrom:
+ fieldRef:
+ fieldPath: metadata.namespace
+ - name: CONTROLLER_CONFIG_MAP
+ value: sensor-controller-configmap
diff --git a/archive/argo/event-source.yaml b/archive/argo/event-source.yaml
new file mode 100644
index 0000000..23ec5ed
--- /dev/null
+++ b/archive/argo/event-source.yaml
@@ -0,0 +1,48 @@
+apiVersion: argoproj.io/v1alpha1
+kind: EventSource
+metadata:
+ name: nats-event-source
+spec:
+ type: nats
+ nats:
+ example:
+ # url of the nats service
+ url: nats://nats.svc:4222
+ # jsonBody specifies that all event body payload coming from this
+ # source will be JSON
+ jsonBody: true
+ # subject name
+ subject: input-objects
+ # optional backoff time for connection retries.
+ # if not provided, default connection backoff time will be used.
+ connectionBackoff:
+ # duration in nanoseconds. following value is 10 seconds
+ duration: 10000000000
+ # how many backoffs
+ steps: 5
+ # factor to increase on each step.
+ # setting factor > 1 makes backoff exponential.
+ factor: 2
+ jitter: 0.2
+
+# apiVersion: argoproj.io/v1alpha1
+# kind: EventSource
+# metadata:
+# name: minio-event-source
+# spec:
+# type: "minio"
+# minio:
+# example:
+# bucket:
+# name: input
+# endpoint: mio-minio.default.svc:9000
+# events:
+# - s3:ObjectCreated:Put
+# - s3:ObjectRemoved:Delete
+# insecure: true
+# accessKey:
+# key: accesskey
+# name: artifacts-minio
+# secretKey:
+# key: secretkey
+# name: artifacts-minio
\ No newline at end of file
diff --git a/archive/argo/gateway.yaml b/archive/argo/gateway.yaml
new file mode 100644
index 0000000..b98baf4
--- /dev/null
+++ b/archive/argo/gateway.yaml
@@ -0,0 +1,61 @@
+apiVersion: argoproj.io/v1alpha1
+kind: Gateway
+metadata:
+ name: nats-gateway
+ labels:
+ # gateway controller with instanceId "argo-events" will process this gateway
+ gateways.argoproj.io/gateway-controller-instanceid: argo-events
+spec:
+ type: nats
+ eventSourceRef:
+ name: nats-event-source
+ template:
+ metadata:
+ name: nats-gateway
+ labels:
+ gateway-name: nats-gateway
+ spec:
+ containers:
+ - name: gateway-client
+ image: argoproj/gateway-client:v0.14.0
+ imagePullPolicy: IfNotPresent
+ command: ["/bin/gateway-client"]
+ - name: nats-events
+ image: argoproj/nats-gateway:v0.14.0
+ imagePullPolicy: IfNotPresent
+ command: ["/bin/nats-gateway"]
+ serviceAccountName: argo-events-sa
+ subscribers:
+ http:
+ - "http://nats-sensor.svc:9300/"
+
+
+# apiVersion: argoproj.io/v1alpha1
+# kind: Gateway
+# metadata:
+# name: minio-gateway
+# labels:
+# # gateway controller with instanceId "argo-events" will process this gateway
+# gateways.argoproj.io/gateway-controller-instanceid: argo-events
+# spec:
+# type: minio
+# eventSourceRef:
+# name: minio-event-source
+# template:
+# metadata:
+# name: minio-gateway
+# labels:
+# gateway-name: minio-gateway
+# spec:
+# containers:
+# - name: gateway-client
+# image: argoproj/gateway-client:v0.13.0
+# imagePullPolicy: Always
+# command: ["/bin/gateway-client"]
+# - name: minio-events
+# image: argoproj/artifact-gateway:v0.13.0
+# imagePullPolicy: Always
+# serviceAccountName: argo-events-sa
+# subscribers:
+# http:
+# - "http://minio-sensor.kube-system.svc:9300/"
diff --git a/archive/argo/install.yaml b/archive/argo/install.yaml
new file mode 100644
index 0000000..c800f6a
--- /dev/null
+++ b/archive/argo/install.yaml
@@ -0,0 +1,408 @@
+# This is an auto-generated file. DO NOT EDIT
+apiVersion: apiextensions.k8s.io/v1beta1
+kind: CustomResourceDefinition
+metadata:
+ name: cronworkflows.argoproj.io
+spec:
+ group: argoproj.io
+ names:
+ kind: CronWorkflow
+ plural: cronworkflows
+ shortNames:
+ - cronwf
+ - cwf
+ scope: Namespaced
+ version: v1alpha1
+---
+apiVersion: apiextensions.k8s.io/v1beta1
+kind: CustomResourceDefinition
+metadata:
+ name: workflows.argoproj.io
+spec:
+ additionalPrinterColumns:
+ - JSONPath: .status.phase
+ description: Status of the workflow
+ name: Status
+ type: string
+ - JSONPath: .status.startedAt
+ description: When the workflow was started
+ format: date-time
+ name: Age
+ type: date
+ group: argoproj.io
+ names:
+ kind: Workflow
+ plural: workflows
+ shortNames:
+ - wf
+ scope: Namespaced
+ version: v1alpha1
+---
+apiVersion: apiextensions.k8s.io/v1beta1
+kind: CustomResourceDefinition
+metadata:
+ name: workflowtemplates.argoproj.io
+spec:
+ group: argoproj.io
+ names:
+ kind: WorkflowTemplate
+ plural: workflowtemplates
+ shortNames:
+ - wftmpl
+ scope: Namespaced
+ version: v1alpha1
+# ---
+# apiVersion: v1
+# kind: ServiceAccount
+# metadata:
+# name: argo
+# ---
+# apiVersion: v1
+# kind: ServiceAccount
+# metadata:
+# name: argo-server
+---
+apiVersion: rbac.authorization.k8s.io/v1
+kind: Role
+metadata:
+ name: argo-role
+rules:
+- apiGroups:
+ - ""
+ resources:
+ - secrets
+ verbs:
+ - get
+---
+apiVersion: rbac.authorization.k8s.io/v1
+kind: ClusterRole
+metadata:
+ labels:
+ rbac.authorization.k8s.io/aggregate-to-admin: "true"
+ name: argo-aggregate-to-admin
+rules:
+- apiGroups:
+ - argoproj.io
+ resources:
+ - workflows
+ - workflows/finalizers
+ - workflowtemplates
+ - workflowtemplates/finalizers
+ - cronworkflows
+ - cronworkflows/finalizers
+ verbs:
+ - create
+ - delete
+ - deletecollection
+ - get
+ - list
+ - patch
+ - update
+ - watch
+---
+apiVersion: rbac.authorization.k8s.io/v1
+kind: ClusterRole
+metadata:
+ labels:
+ rbac.authorization.k8s.io/aggregate-to-edit: "true"
+ name: argo-aggregate-to-edit
+rules:
+- apiGroups:
+ - argoproj.io
+ resources:
+ - workflows
+ - workflows/finalizers
+ - workflowtemplates
+ - workflowtemplates/finalizers
+ - cronworkflows
+ - cronworkflows/finalizers
+ verbs:
+ - create
+ - delete
+ - deletecollection
+ - get
+ - list
+ - patch
+ - update
+ - watch
+---
+apiVersion: rbac.authorization.k8s.io/v1
+kind: ClusterRole
+metadata:
+ labels:
+ rbac.authorization.k8s.io/aggregate-to-view: "true"
+ name: argo-aggregate-to-view
+rules:
+- apiGroups:
+ - argoproj.io
+ resources:
+ - workflows
+ - workflows/finalizers
+ - workflowtemplates
+ - workflowtemplates/finalizers
+ - cronworkflows
+ - cronworkflows/finalizers
+ verbs:
+ - get
+ - list
+ - watch
+---
+apiVersion: rbac.authorization.k8s.io/v1
+kind: ClusterRole
+metadata:
+ name: argo-cluster-role
+rules:
+- apiGroups:
+ - ""
+ resources:
+ - pods
+ - pods/exec
+ verbs:
+ - create
+ - get
+ - list
+ - watch
+ - update
+ - patch
+ - delete
+- apiGroups:
+ - ""
+ resources:
+ - configmaps
+ verbs:
+ - get
+ - watch
+ - list
+- apiGroups:
+ - ""
+ resources:
+ - persistentvolumeclaims
+ verbs:
+ - create
+ - delete
+- apiGroups:
+ - argoproj.io
+ resources:
+ - workflows
+ - workflows/finalizers
+ verbs:
+ - get
+ - list
+ - watch
+ - update
+ - patch
+ - delete
+ - create
+- apiGroups:
+ - argoproj.io
+ resources:
+ - workflowtemplates
+ - workflowtemplates/finalizers
+ verbs:
+ - get
+ - list
+ - watch
+- apiGroups:
+ - ""
+ resources:
+ - serviceaccounts
+ verbs:
+ - get
+ - list
+- apiGroups:
+ - argoproj.io
+ resources:
+ - cronworkflows
+ - cronworkflows/finalizers
+ verbs:
+ - get
+ - list
+ - watch
+ - update
+ - patch
+ - delete
+- apiGroups:
+ - ""
+ resources:
+ - events
+ verbs:
+ - create
+- apiGroups:
+ - policy
+ resources:
+ - poddisruptionbudgets
+ verbs:
+ - create
+ - get
+ - delete
+---
+apiVersion: rbac.authorization.k8s.io/v1
+kind: ClusterRole
+metadata:
+ name: argo-server-cluster-role
+rules:
+- apiGroups:
+ - ""
+ resources:
+ - configmaps
+ verbs:
+ - get
+ - watch
+ - list
+- apiGroups:
+ - ""
+ resources:
+ - secrets
+ verbs:
+ - get
+- apiGroups:
+ - ""
+ resources:
+ - pods
+ - pods/exec
+ - pods/log
+ verbs:
+ - get
+ - list
+ - watch
+ - delete
+- apiGroups:
+ - ""
+ resources:
+ - secrets
+ verbs:
+ - get
+- apiGroups:
+ - argoproj.io
+ resources:
+ - workflows
+ - workflowtemplates
+ - cronworkflows
+ verbs:
+ - create
+ - get
+ - list
+ - watch
+ - update
+ - patch
+ - delete
+---
+apiVersion: rbac.authorization.k8s.io/v1
+kind: RoleBinding
+metadata:
+ name: argo-binding
+roleRef:
+ apiGroup: rbac.authorization.k8s.io
+ kind: Role
+ name: argo-role
+subjects:
+- kind: ServiceAccount
+ name: default
+---
+apiVersion: rbac.authorization.k8s.io/v1
+kind: ClusterRoleBinding
+metadata:
+ name: argo-binding
+roleRef:
+ apiGroup: rbac.authorization.k8s.io
+ kind: ClusterRole
+ name: argo-cluster-role
+subjects:
+- kind: ServiceAccount
+ name: default
+ namespace: pcloud
+---
+apiVersion: rbac.authorization.k8s.io/v1
+kind: ClusterRoleBinding
+metadata:
+ name: argo-server-binding
+roleRef:
+ apiGroup: rbac.authorization.k8s.io
+ kind: ClusterRole
+ name: argo-server-cluster-role
+subjects:
+- kind: ServiceAccount
+ name: default
+ namespace: pcloud
+---
+apiVersion: v1
+kind: ConfigMap
+metadata:
+ name: workflow-controller-configmap
+---
+apiVersion: v1
+kind: Service
+metadata:
+ name: argo-server
+spec:
+ ports:
+ - port: 2746
+ targetPort: 2746
+ selector:
+ app: argo-server
+---
+apiVersion: v1
+kind: Service
+metadata:
+ name: workflow-controller-metrics
+spec:
+ ports:
+ - port: 9090
+ protocol: TCP
+ targetPort: 9090
+ selector:
+ app: workflow-controller
+---
+apiVersion: apps/v1
+kind: Deployment
+metadata:
+ name: argo-server
+spec:
+ selector:
+ matchLabels:
+ app: argo-server
+ template:
+ metadata:
+ labels:
+ app: argo-server
+ spec:
+ containers:
+ - args:
+ - server
+ image: argoproj/argocli:v2.7.4
+ name: argo-server
+ ports:
+ - containerPort: 2746
+ readinessProbe:
+ httpGet:
+ path: /
+ port: 2746
+ scheme: HTTP
+ initialDelaySeconds: 10
+ periodSeconds: 20
+ serviceAccountName: default
+---
+apiVersion: apps/v1
+kind: Deployment
+metadata:
+ name: workflow-controller
+spec:
+ selector:
+ matchLabels:
+ app: workflow-controller
+ template:
+ metadata:
+ labels:
+ app: workflow-controller
+ spec:
+ containers:
+ - args:
+ - --configmap
+ - workflow-controller-configmap
+ - --executor-image
+ - argoproj/argoexec:v2.7.4
+ command:
+ - workflow-controller
+ image: argoproj/workflow-controller:v2.7.4
+ name: workflow-controller
+ serviceAccountName: default
\ No newline at end of file
diff --git a/archive/argo/mio-minio-secrets.yaml b/archive/argo/mio-minio-secrets.yaml
new file mode 100644
index 0000000..c48d5ef
--- /dev/null
+++ b/archive/argo/mio-minio-secrets.yaml
@@ -0,0 +1,9 @@
+apiVersion: v1
+kind: Secret
+metadata:
+ name: minio-credentials
+data:
+ # base64 of minio
+ accesskey: bWluaW8K
+ # base64 of minio123
+ secretkey: bWluaW8xMjMK
diff --git a/archive/argo/sensor.yaml b/archive/argo/sensor.yaml
new file mode 100644
index 0000000..6918bd5
--- /dev/null
+++ b/archive/argo/sensor.yaml
@@ -0,0 +1,138 @@
+apiVersion: argoproj.io/v1alpha1
+kind: Sensor
+metadata:
+ name: nats-sensor
+ labels:
+ sensors.argoproj.io/sensor-controller-instanceid: argo-events
+spec:
+ template:
+ spec:
+ containers:
+ - name: sensor
+ image: argoproj/sensor:v0.14.0
+ imagePullPolicy: IfNotPresent
+ serviceAccountName: argo-events-sa
+ subscription:
+ http:
+ port: 9300
+ dependencies:
+ - name: test-dep
+ gatewayName: nats-gateway
+ eventName: example
+ triggers:
+ - template:
+ name: nats-workflow-trigger
+ k8s:
+ group: argoproj.io
+ version: v1alpha1
+ resource: workflows
+ operation: create
+ source:
+ resource:
+ apiVersion: argoproj.io/v1alpha1
+ kind: Workflow
+ metadata:
+ generateName: nats-workflow-
+ spec:
+ entrypoint: whalesay
+ arguments:
+ parameters:
+ - name: message
+ value: WILL_BE_REPLACED
+ templates:
+ - name: whalesay
+ inputs:
+ parameters:
+ - name: message
+ container:
+ image: docker/whalesay:latest
+ imagePyllPolicy: IfNotPresent
+ command: [cowsay]
+ args: ["{{inputs.parameters.message}}"]
+ parameters:
+ - src:
+ dependencyName: test-dep
+ dest: spec.arguments.parameters.0.value
+
+
+# apiVersion: argoproj.io/v1alpha1
+# kind: Sensor
+# metadata:
+# name: minio-sensor
+# labels:
+# # sensor controller with instanceId "argo-events" will process this sensor
+# sensors.argoproj.io/sensor-controller-instanceid: argo-events
+# spec:
+# template:
+# spec:
+# containers:
+# - name: sensor
+# image: argoproj/sensor:v0.13.0
+# imagePullPolicy: Always
+# serviceAccountName: argo-events-sa
+# subscription:
+# http:
+# port: 9300
+# dependencies:
+# - name: test-dep
+# gatewayName: minio-gateway
+# eventName: example
+# triggers:
+# - template:
+# name: minio-workflow-trigger
+# k8s:
+# group: argoproj.io
+# version: v1alpha1
+# resource: workflows
+# operation: create
+# source:
+# resource:
+# apiVersion: argoproj.io/v1alpha1
+# kind: Workflow
+# metadata:
+# generateName: artifact-workflow-2-
+# spec:
+# entrypoint: detect
+# templates:
+# - name: detect
+# inputs:
+# artifacts:
+# - name: input-image
+# path: /input
+# s3:
+# # endpoint: mio-minio.default.svc:9000
+# # bucket: input # change
+# key: harry.jpg
+# # insecure: true
+# # accessKeySecret:
+# # key: accessKey
+# # name: artifacts-minio
+# # secretKeySecret:
+# # key: secretKey
+# # name: artifacts-minio
+# # useSDKCreds: true
+# # outputs:
+# # artifacts:
+# # - name: output-image
+# # path: /output
+# # s3:
+# # endpoint: mio-minio.default.svc:9000
+# # bucket: output # change
+# # key: PARAMETER
+# # insecure: true
+# # accessKeySecret:
+# # key: accessKey
+# # name: artifacts-minio
+# # secretKeySecret:
+# # key: secretKey
+# # name: artifacts-minio
+# # useSDKCreds: true
+# container:
+# image: face:latest
+# command: [python face.py]
+# args: ["/input", "/output"]
+# # parameters:
+# # - src:
+# # dependencyName: test-dep
+# # dataKey: notification.0.s3.object.key
+# # dest: spec.templates.0.inputs.artifacts.0.s3.key
diff --git a/archive/argo/setup.sh b/archive/argo/setup.sh
new file mode 100644
index 0000000..7d6cc53
--- /dev/null
+++ b/archive/argo/setup.sh
@@ -0,0 +1,21 @@
+#!/bin/sh
+
+# kubectl create namespace argo
+kubectl apply -n pcloud -f install.yaml
+
+# kubectl apply -n kube-system -f mio-minio-secrets.yaml
+
+
+# helm repo add argo https://argoproj.github.io/argo-helm
+# helm install my-argo --namespace kube-system argo/argo
+# read -s
+# kubectl -n kube-system port-forward deployment/my-argo-server 2746 &
+# read -s
+
+#kubectl apply -n kube-system -f argo-events-crds-install.yaml
+#read -s
+
+
+#kubectl apply -n kube-system -f event-source.yaml
+#kubectl apply -n kube-system -f gateway.yaml
+#kubectl apply -n kube-system -f sensor.yaml