muchlearning / kubernetes-haproxy
auto-updating configuration for HAProxy proxying Kubernetes pods
☆27Updated 7 years ago
Related projects ⓘ
Alternatives and complementary repositories for kubernetes-haproxy
- Logstash container for pulling logs from Kubernetes☆32Updated 4 years ago
- ☆49Updated 8 years ago
- Kubernetes applications tuning☆28Updated 8 years ago
- Kubernetes controller for Sensu checks☆42Updated 5 years ago
- Rules loading sidecar for Prometheus deployed in Kubernetes☆44Updated 4 years ago
- ☆42Updated 7 years ago
- Nginx based Kubernetes ingress controller for AWS☆58Updated 10 months ago
- Example Kubernetes controller that manages deployments using Jira☆19Updated 8 years ago
- Pam based webhook authentication for Kubernetes☆77Updated 4 years ago
- No longer maintained. Use Terraform EKS module instead.☆60Updated 6 years ago
- A bridge between Kubernetes and Consul☆58Updated 8 years ago
- Kubernetes Utility / Helper Scripts☆40Updated 2 years ago
- Terraform a HA etcd Cluster with KMS server-side encrypted SSL certs stored in S3☆31Updated 7 years ago
- Await tool to check resource status.☆56Updated 5 years ago
- A repo value store for Helm☆73Updated 3 years ago
- Slackbot to send important alerts from the Kubernetes event stream API to a slack channel☆73Updated 6 years ago
- consul-snapshot is a backup and restore utility for Consul (https://www.consul.io). This is slightly different than some other utilities …☆116Updated 2 years ago
- Do something based on leadership status☆57Updated last year
- Drone plugin to deploy artifacts to Kubernetes☆33Updated 8 years ago
- Manage and use a Hashicorp Vault installation within Saltstack.☆22Updated 7 years ago
- Terraform module for provisioning AWS resources to run a Kubernetes cluster☆61Updated 7 years ago
- Simple go stress test for docker☆107Updated 6 years ago
- CI Tool for deploying with kubernetes☆45Updated 8 years ago
- Concourse resource to allow interaction with (simple) HTTP API's.☆25Updated 3 years ago
- conf2kube can read and create Kubernetes secrets based on the contents of configuration files.☆64Updated 8 years ago