Compare commits
18 Commits
f8f5f27cb0
...
prd
| Author | SHA1 | Date | |
|---|---|---|---|
| d38a2d2840 | |||
| 2b88107a28 | |||
| d9be744f17 | |||
| b1a4779d96 | |||
| 54432a447f | |||
| 779d3448d5 | |||
| 7d9ddc574f | |||
| 0b4238217b | |||
| 39020882f4 | |||
| 39f53751ea | |||
| d686567857 | |||
| 74bca2946b | |||
| 1972f4a965 | |||
| b4f11ea722 | |||
| 004990a4ca | |||
|
|
1481dbe107 | ||
| 0414919e05 | |||
| d5ab5c4671 |
@@ -9,6 +9,6 @@ appVersion: "1.16.0"
|
|||||||
dependencies:
|
dependencies:
|
||||||
- name: argo-cd
|
- name: argo-cd
|
||||||
repository: https://argoproj.github.io/argo-helm
|
repository: https://argoproj.github.io/argo-helm
|
||||||
version: 6.11.1
|
version: 6.7.11
|
||||||
|
|
||||||
|
|
||||||
@@ -1,16 +1,16 @@
|
|||||||
apiVersion: argoproj.io/v1alpha1
|
apiVersion: argoproj.io/v1alpha1
|
||||||
kind: Application
|
kind: Application
|
||||||
metadata:
|
metadata:
|
||||||
name: vault
|
name: argocd
|
||||||
namespace: argocd
|
namespace: argocd
|
||||||
spec:
|
spec:
|
||||||
project: default
|
project: default
|
||||||
source:
|
source:
|
||||||
repoURL: https://gitlab.com/developerdurp/homelab.git
|
repoURL: https://gitlab.com/developerdurp/homelab.git
|
||||||
targetRevision: main
|
targetRevision: prd
|
||||||
path: infra/vault
|
path: argocd
|
||||||
destination:
|
destination:
|
||||||
namespace: vault
|
namespace: argocd
|
||||||
name: in-cluster
|
name: in-cluster
|
||||||
syncPolicy:
|
syncPolicy:
|
||||||
automated:
|
automated:
|
||||||
@@ -18,4 +18,3 @@ spec:
|
|||||||
selfHeal: true
|
selfHeal: true
|
||||||
syncOptions:
|
syncOptions:
|
||||||
- CreateNamespace=true
|
- CreateNamespace=true
|
||||||
|
|
||||||
@@ -7,8 +7,8 @@ spec:
|
|||||||
project: default
|
project: default
|
||||||
source:
|
source:
|
||||||
repoURL: https://gitlab.com/developerdurp/homelab.git
|
repoURL: https://gitlab.com/developerdurp/homelab.git
|
||||||
targetRevision: main
|
targetRevision: prd
|
||||||
path: master/authentik
|
path: authentik
|
||||||
destination:
|
destination:
|
||||||
namespace: authentik
|
namespace: authentik
|
||||||
name: in-cluster
|
name: in-cluster
|
||||||
@@ -7,8 +7,8 @@ spec:
|
|||||||
project: default
|
project: default
|
||||||
source:
|
source:
|
||||||
repoURL: https://gitlab.com/developerdurp/homelab.git
|
repoURL: https://gitlab.com/developerdurp/homelab.git
|
||||||
targetRevision: main
|
targetRevision: prd
|
||||||
path: master/bitwarden
|
path: bitwarden
|
||||||
directory:
|
directory:
|
||||||
recurse: true
|
recurse: true
|
||||||
destination:
|
destination:
|
||||||
@@ -7,8 +7,8 @@ spec:
|
|||||||
project: default
|
project: default
|
||||||
source:
|
source:
|
||||||
repoURL: https://gitlab.com/developerdurp/homelab.git
|
repoURL: https://gitlab.com/developerdurp/homelab.git
|
||||||
targetRevision: main
|
targetRevision: prd
|
||||||
path: master/cert-manager
|
path: cert-manager
|
||||||
destination:
|
destination:
|
||||||
namespace: cert-manager
|
namespace: cert-manager
|
||||||
name: in-cluster
|
name: in-cluster
|
||||||
@@ -7,8 +7,8 @@ spec:
|
|||||||
project: default
|
project: default
|
||||||
source:
|
source:
|
||||||
repoURL: https://gitlab.com/developerdurp/homelab.git
|
repoURL: https://gitlab.com/developerdurp/homelab.git
|
||||||
targetRevision: main
|
targetRevision: prd
|
||||||
path: master/crossplane
|
path: crossplane
|
||||||
destination:
|
destination:
|
||||||
namespace: crossplane
|
namespace: crossplane
|
||||||
name: in-cluster
|
name: in-cluster
|
||||||
@@ -7,8 +7,8 @@ spec:
|
|||||||
project: default
|
project: default
|
||||||
source:
|
source:
|
||||||
repoURL: https://gitlab.com/developerdurp/homelab.git
|
repoURL: https://gitlab.com/developerdurp/homelab.git
|
||||||
targetRevision: main
|
targetRevision: prd
|
||||||
path: master/durpapi
|
path: durpapi
|
||||||
destination:
|
destination:
|
||||||
namespace: durpapi
|
namespace: durpapi
|
||||||
name: in-cluster
|
name: in-cluster
|
||||||
@@ -7,8 +7,8 @@ spec:
|
|||||||
project: default
|
project: default
|
||||||
source:
|
source:
|
||||||
repoURL: https://gitlab.com/developerdurp/homelab.git
|
repoURL: https://gitlab.com/developerdurp/homelab.git
|
||||||
targetRevision: main
|
targetRevision: prd
|
||||||
path: master/durpot
|
path: durpot
|
||||||
destination:
|
destination:
|
||||||
namespace: durpot
|
namespace: durpot
|
||||||
name: in-cluster
|
name: in-cluster
|
||||||
@@ -7,8 +7,8 @@ spec:
|
|||||||
project: default
|
project: default
|
||||||
source:
|
source:
|
||||||
repoURL: https://gitlab.com/developerdurp/homelab.git
|
repoURL: https://gitlab.com/developerdurp/homelab.git
|
||||||
targetRevision: main
|
targetRevision: prd
|
||||||
path: master/external-dns
|
path: external-dns
|
||||||
destination:
|
destination:
|
||||||
namespace: external-dns
|
namespace: external-dns
|
||||||
name: in-cluster
|
name: in-cluster
|
||||||
@@ -7,8 +7,8 @@ spec:
|
|||||||
project: default
|
project: default
|
||||||
source:
|
source:
|
||||||
repoURL: https://gitlab.com/developerdurp/homelab.git
|
repoURL: https://gitlab.com/developerdurp/homelab.git
|
||||||
targetRevision: main
|
targetRevision: prd
|
||||||
path: master/external-secrets
|
path: external-secrets
|
||||||
destination:
|
destination:
|
||||||
namespace: external-secrets
|
namespace: external-secrets
|
||||||
name: in-cluster
|
name: in-cluster
|
||||||
@@ -7,8 +7,8 @@ spec:
|
|||||||
project: default
|
project: default
|
||||||
source:
|
source:
|
||||||
repoURL: https://gitlab.com/developerdurp/homelab.git
|
repoURL: https://gitlab.com/developerdurp/homelab.git
|
||||||
targetRevision: main
|
targetRevision: prd
|
||||||
path: master/gatekeeper
|
path: gatekeeper
|
||||||
destination:
|
destination:
|
||||||
namespace: gatekeeper
|
namespace: gatekeeper
|
||||||
name: in-cluster
|
name: in-cluster
|
||||||
@@ -7,8 +7,8 @@ spec:
|
|||||||
project: default
|
project: default
|
||||||
source:
|
source:
|
||||||
repoURL: https://gitlab.com/developerdurp/homelab.git
|
repoURL: https://gitlab.com/developerdurp/homelab.git
|
||||||
targetRevision: main
|
targetRevision: prd
|
||||||
path: master/gitlab-runner
|
path: gitlab-runner
|
||||||
destination:
|
destination:
|
||||||
namespace: gitlab-runner
|
namespace: gitlab-runner
|
||||||
name: in-cluster
|
name: in-cluster
|
||||||
@@ -7,8 +7,8 @@ spec:
|
|||||||
project: default
|
project: default
|
||||||
source:
|
source:
|
||||||
repoURL: https://gitlab.com/developerdurp/homelab.git
|
repoURL: https://gitlab.com/developerdurp/homelab.git
|
||||||
targetRevision: main
|
targetRevision: prd
|
||||||
path: master/heimdall
|
path: heimdall
|
||||||
destination:
|
destination:
|
||||||
namespace: heimdall
|
namespace: heimdall
|
||||||
name: in-cluster
|
name: in-cluster
|
||||||
36
argocd/templates/ingress.yaml
Normal file
36
argocd/templates/ingress.yaml
Normal file
@@ -0,0 +1,36 @@
|
|||||||
|
apiVersion: traefik.containo.us/v1alpha1
|
||||||
|
kind: IngressRoute
|
||||||
|
metadata:
|
||||||
|
name: argocd-ingress
|
||||||
|
annotations:
|
||||||
|
cert-manager.io/cluster-issuer: letsencrypt-production
|
||||||
|
spec:
|
||||||
|
entryPoints:
|
||||||
|
- websecure
|
||||||
|
routes:
|
||||||
|
- match: Host(`argocd.internal.prd.durp.info`)
|
||||||
|
middlewares:
|
||||||
|
- name: internal-only
|
||||||
|
namespace: traefik
|
||||||
|
kind: Rule
|
||||||
|
services:
|
||||||
|
- name: argocd-server
|
||||||
|
port: 443
|
||||||
|
scheme: https
|
||||||
|
tls:
|
||||||
|
secretName: argocd-tls
|
||||||
|
|
||||||
|
---
|
||||||
|
|
||||||
|
apiVersion: cert-manager.io/v1
|
||||||
|
kind: Certificate
|
||||||
|
metadata:
|
||||||
|
name: argocd-tls
|
||||||
|
spec:
|
||||||
|
secretName: argocd-tls
|
||||||
|
issuerRef:
|
||||||
|
name: letsencrypt-production
|
||||||
|
kind: ClusterIssuer
|
||||||
|
commonName: "argocd.internal.prd.durp.info"
|
||||||
|
dnsNames:
|
||||||
|
- "argocd.internal.prd.durp.info"
|
||||||
@@ -7,8 +7,8 @@ spec:
|
|||||||
project: default
|
project: default
|
||||||
source:
|
source:
|
||||||
repoURL: https://gitlab.com/developerdurp/homelab.git
|
repoURL: https://gitlab.com/developerdurp/homelab.git
|
||||||
targetRevision: main
|
targetRevision: prd
|
||||||
path: master/krakend
|
path: krakend
|
||||||
destination:
|
destination:
|
||||||
namespace: krakend
|
namespace: krakend
|
||||||
name: in-cluster
|
name: in-cluster
|
||||||
@@ -7,8 +7,8 @@ spec:
|
|||||||
project: default
|
project: default
|
||||||
source:
|
source:
|
||||||
repoURL: https://gitlab.com/developerdurp/homelab.git
|
repoURL: https://gitlab.com/developerdurp/homelab.git
|
||||||
targetRevision: main
|
targetRevision: prd
|
||||||
path: master/kube-prometheus-stack
|
path: kube-prometheus-stack
|
||||||
destination:
|
destination:
|
||||||
namespace: kube-prometheus-stack
|
namespace: kube-prometheus-stack
|
||||||
name: in-cluster
|
name: in-cluster
|
||||||
@@ -7,8 +7,8 @@ spec:
|
|||||||
project: default
|
project: default
|
||||||
source:
|
source:
|
||||||
repoURL: https://gitlab.com/developerdurp/homelab.git
|
repoURL: https://gitlab.com/developerdurp/homelab.git
|
||||||
targetRevision: main
|
targetRevision: prd
|
||||||
path: master/kubeclarity
|
path: kubeclarity
|
||||||
destination:
|
destination:
|
||||||
namespace: kubeclarity
|
namespace: kubeclarity
|
||||||
name: in-cluster
|
name: in-cluster
|
||||||
@@ -7,8 +7,8 @@ spec:
|
|||||||
project: default
|
project: default
|
||||||
source:
|
source:
|
||||||
repoURL: https://gitlab.com/developerdurp/homelab.git
|
repoURL: https://gitlab.com/developerdurp/homelab.git
|
||||||
targetRevision: main
|
targetRevision: prd
|
||||||
path: master/littlelink
|
path: littlelink
|
||||||
directory:
|
directory:
|
||||||
recurse: true
|
recurse: true
|
||||||
destination:
|
destination:
|
||||||
@@ -7,8 +7,8 @@ spec:
|
|||||||
project: default
|
project: default
|
||||||
source:
|
source:
|
||||||
repoURL: https://gitlab.com/developerdurp/homelab.git
|
repoURL: https://gitlab.com/developerdurp/homelab.git
|
||||||
targetRevision: main
|
targetRevision: prd
|
||||||
path: infra/longhorn
|
path: longhorn
|
||||||
destination:
|
destination:
|
||||||
namespace: longhorn-system
|
namespace: longhorn-system
|
||||||
name: in-cluster
|
name: in-cluster
|
||||||
@@ -7,8 +7,8 @@ spec:
|
|||||||
project: default
|
project: default
|
||||||
source:
|
source:
|
||||||
repoURL: https://gitlab.com/developerdurp/homelab.git
|
repoURL: https://gitlab.com/developerdurp/homelab.git
|
||||||
targetRevision: main
|
targetRevision: prd
|
||||||
path: infra/metallb-system
|
path: metallb-system
|
||||||
destination:
|
destination:
|
||||||
namespace: metallb-system
|
namespace: metallb-system
|
||||||
name: in-cluster
|
name: in-cluster
|
||||||
@@ -7,8 +7,8 @@ spec:
|
|||||||
project: default
|
project: default
|
||||||
source:
|
source:
|
||||||
repoURL: https://gitlab.com/developerdurp/homelab.git
|
repoURL: https://gitlab.com/developerdurp/homelab.git
|
||||||
targetRevision: main
|
targetRevision: prd
|
||||||
path: master/nfs-client
|
path: nfs-client
|
||||||
directory:
|
directory:
|
||||||
recurse: true
|
recurse: true
|
||||||
destination:
|
destination:
|
||||||
@@ -7,8 +7,8 @@ spec:
|
|||||||
project: default
|
project: default
|
||||||
source:
|
source:
|
||||||
repoURL: https://gitlab.com/developerdurp/homelab.git
|
repoURL: https://gitlab.com/developerdurp/homelab.git
|
||||||
targetRevision: main
|
targetRevision: prd
|
||||||
path: master/open-webui
|
path: open-webui
|
||||||
destination:
|
destination:
|
||||||
namespace: open-webui
|
namespace: open-webui
|
||||||
name: in-cluster
|
name: in-cluster
|
||||||
@@ -7,8 +7,8 @@ spec:
|
|||||||
project: default
|
project: default
|
||||||
source:
|
source:
|
||||||
repoURL: https://gitlab.com/developerdurp/homelab.git
|
repoURL: https://gitlab.com/developerdurp/homelab.git
|
||||||
targetRevision: main
|
targetRevision: prd
|
||||||
path: master/traefik
|
path: traefik
|
||||||
destination:
|
destination:
|
||||||
namespace: traefik
|
namespace: traefik
|
||||||
name: in-cluster
|
name: in-cluster
|
||||||
@@ -7,8 +7,8 @@ spec:
|
|||||||
project: default
|
project: default
|
||||||
source:
|
source:
|
||||||
repoURL: https://gitlab.com/developerdurp/homelab.git
|
repoURL: https://gitlab.com/developerdurp/homelab.git
|
||||||
targetRevision: main
|
targetRevision: prd
|
||||||
path: master/uptimekuma
|
path: uptimekuma
|
||||||
directory:
|
directory:
|
||||||
recurse: true
|
recurse: true
|
||||||
destination:
|
destination:
|
||||||
@@ -1,16 +1,16 @@
|
|||||||
apiVersion: argoproj.io/v1alpha1
|
apiVersion: argoproj.io/v1alpha1
|
||||||
kind: Application
|
kind: Application
|
||||||
metadata:
|
metadata:
|
||||||
name: traefik
|
name: vault
|
||||||
namespace: argocd
|
namespace: argocd
|
||||||
spec:
|
spec:
|
||||||
project: default
|
project: default
|
||||||
source:
|
source:
|
||||||
repoURL: https://gitlab.com/developerdurp/homelab.git
|
repoURL: https://gitlab.com/developerdurp/homelab.git
|
||||||
targetRevision: main
|
targetRevision: prd
|
||||||
path: infra/traefik
|
path: vault
|
||||||
destination:
|
destination:
|
||||||
namespace: traefik
|
namespace: vault
|
||||||
name: in-cluster
|
name: in-cluster
|
||||||
syncPolicy:
|
syncPolicy:
|
||||||
automated:
|
automated:
|
||||||
@@ -18,4 +18,8 @@ spec:
|
|||||||
selfHeal: true
|
selfHeal: true
|
||||||
syncOptions:
|
syncOptions:
|
||||||
- CreateNamespace=true
|
- CreateNamespace=true
|
||||||
|
ignoreDifferences:
|
||||||
|
- group: admissionregistration.k8s.io
|
||||||
|
kind: MutatingWebhookConfiguration
|
||||||
|
jqPathExpressions:
|
||||||
|
- .webhooks[]?.clientConfig.caBundle
|
||||||
@@ -33,13 +33,13 @@ argo-cd:
|
|||||||
cm:
|
cm:
|
||||||
create: true
|
create: true
|
||||||
annotations: {}
|
annotations: {}
|
||||||
url: https://argocd.internal.durp.info
|
url: https://argocd.internal.prd.durp.info
|
||||||
oidc.tls.insecure.skip.verify: "true"
|
oidc.tls.insecure.skip.verify: "true"
|
||||||
dex.config: |
|
dex.config: |
|
||||||
connectors:
|
connectors:
|
||||||
- config:
|
- config:
|
||||||
issuer: https://authentik.durp.info/application/o/argocd/
|
issuer: https://authentik.prd.durp.info/application/o/argocd/
|
||||||
clientID: dbb8ffc06104fb6e7fac3e4ae7fafb1d90437625
|
clientID: lKuMgyYaOlQMNAUSjsRVYgkwZG9UT6CeFWeTLAcl
|
||||||
clientSecret: $client-secret:clientSecret
|
clientSecret: $client-secret:clientSecret
|
||||||
insecureEnableGroups: true
|
insecureEnableGroups: true
|
||||||
scopes:
|
scopes:
|
||||||
@@ -9,4 +9,4 @@ appVersion: "1.16.0"
|
|||||||
dependencies:
|
dependencies:
|
||||||
- name: authentik
|
- name: authentik
|
||||||
repository: https://charts.goauthentik.io
|
repository: https://charts.goauthentik.io
|
||||||
version: 2024.8.3
|
version: 2024.4.1
|
||||||
@@ -6,7 +6,7 @@ spec:
|
|||||||
entryPoints:
|
entryPoints:
|
||||||
- websecure
|
- websecure
|
||||||
routes:
|
routes:
|
||||||
- match: Host(`authentik.durp.info`) && PathPrefix(`/`)
|
- match: Host(`authentik.prd.durp.info`) && PathPrefix(`/`)
|
||||||
kind: Rule
|
kind: Rule
|
||||||
services:
|
services:
|
||||||
- name: authentik-server
|
- name: authentik-server
|
||||||
@@ -25,9 +25,9 @@ spec:
|
|||||||
issuerRef:
|
issuerRef:
|
||||||
name: letsencrypt-production
|
name: letsencrypt-production
|
||||||
kind: ClusterIssuer
|
kind: ClusterIssuer
|
||||||
commonName: "authentik.durp.info"
|
commonName: "authentik.prd.durp.info"
|
||||||
dnsNames:
|
dnsNames:
|
||||||
- "authentik.durp.info"
|
- "authentik.prd.durp.info"
|
||||||
|
|
||||||
---
|
---
|
||||||
|
|
||||||
@@ -36,7 +36,7 @@ apiVersion: v1
|
|||||||
metadata:
|
metadata:
|
||||||
name: authentik-external-dns
|
name: authentik-external-dns
|
||||||
annotations:
|
annotations:
|
||||||
external-dns.alpha.kubernetes.io/hostname: authentik.durp.info
|
external-dns.alpha.kubernetes.io/hostname: authentik.prd.durp.info
|
||||||
spec:
|
spec:
|
||||||
type: ExternalName
|
type: ExternalName
|
||||||
externalName: durp.info
|
externalName:.prd.durp.info
|
||||||
@@ -1,6 +1,8 @@
|
|||||||
authentik:
|
authentik:
|
||||||
global:
|
global:
|
||||||
env:
|
env:
|
||||||
|
- name: AUTHENTIK_REDIS__DB
|
||||||
|
value: "1"
|
||||||
- name: AUTHENTIK_POSTGRESQL__PASSWORD
|
- name: AUTHENTIK_POSTGRESQL__PASSWORD
|
||||||
valueFrom:
|
valueFrom:
|
||||||
secretKeyRef:
|
secretKeyRef:
|
||||||
@@ -26,17 +28,22 @@ authentik:
|
|||||||
server:
|
server:
|
||||||
name: server
|
name: server
|
||||||
replicas: 3
|
replicas: 3
|
||||||
worker:
|
|
||||||
replicas: 3
|
|
||||||
postgresql:
|
postgresql:
|
||||||
enabled: true
|
enabled: true
|
||||||
image:
|
image:
|
||||||
registry: registry.internal.durp.info
|
registry: registry.internal.durp.info
|
||||||
repository: bitnami/postgresql
|
repository: bitnami/postgresql
|
||||||
pullPolicy: Always
|
pullPolicy: Always
|
||||||
postgresqlUsername: "authentik"
|
auth:
|
||||||
postgresqlDatabase: "authentik"
|
username: "authentik"
|
||||||
existingSecret: db-pass
|
existingSecret: db-pass
|
||||||
|
secretKeys:
|
||||||
|
adminPasswordKey: dbpass
|
||||||
|
userPasswordKey: dbpass
|
||||||
|
|
||||||
|
#postgresqlUsername: "authentik"
|
||||||
|
#postgresqlDatabase: "authentik"
|
||||||
|
#existingSecret: db-pass
|
||||||
persistence:
|
persistence:
|
||||||
enabled: true
|
enabled: true
|
||||||
storageClass: longhorn
|
storageClass: longhorn
|
||||||
@@ -44,9 +51,6 @@ authentik:
|
|||||||
- ReadWriteMany
|
- ReadWriteMany
|
||||||
redis:
|
redis:
|
||||||
enabled: true
|
enabled: true
|
||||||
master:
|
|
||||||
persistence:
|
|
||||||
enabled: false
|
|
||||||
image:
|
image:
|
||||||
registry: registry.internal.durp.info
|
registry: registry.internal.durp.info
|
||||||
repository: bitnami/redis
|
repository: bitnami/redis
|
||||||
@@ -17,7 +17,7 @@ spec:
|
|||||||
spec:
|
spec:
|
||||||
containers:
|
containers:
|
||||||
- name: bitwarden
|
- name: bitwarden
|
||||||
image: registry.internal.durp.info/vaultwarden/server:1.32.7
|
image: registry.internal.durp.info/vaultwarden/server:1.30.5
|
||||||
imagePullPolicy: Always
|
imagePullPolicy: Always
|
||||||
volumeMounts:
|
volumeMounts:
|
||||||
- name: bitwarden-pvc
|
- name: bitwarden-pvc
|
||||||
@@ -28,7 +28,7 @@ spec:
|
|||||||
containerPort: 80
|
containerPort: 80
|
||||||
env:
|
env:
|
||||||
- name: SIGNUPS_ALLOWED
|
- name: SIGNUPS_ALLOWED
|
||||||
value: "FALSE"
|
value: "TRUE"
|
||||||
- name: INVITATIONS_ALLOWED
|
- name: INVITATIONS_ALLOWED
|
||||||
value: "FALSE"
|
value: "FALSE"
|
||||||
- name: WEBSOCKET_ENABLED
|
- name: WEBSOCKET_ENABLED
|
||||||
@@ -39,7 +39,7 @@ spec:
|
|||||||
value: "80"
|
value: "80"
|
||||||
- name: ROCKET_WORKERS
|
- name: ROCKET_WORKERS
|
||||||
value: "10"
|
value: "10"
|
||||||
- name: SECRET_USERNAME
|
- name: ADMIN_TOKEN
|
||||||
valueFrom:
|
valueFrom:
|
||||||
secretKeyRef:
|
secretKeyRef:
|
||||||
name: bitwarden-secret
|
name: bitwarden-secret
|
||||||
63
bitwarden/templates/ingress.yaml
Normal file
63
bitwarden/templates/ingress.yaml
Normal file
@@ -0,0 +1,63 @@
|
|||||||
|
apiVersion: traefik.containo.us/v1alpha1
|
||||||
|
kind: IngressRoute
|
||||||
|
metadata:
|
||||||
|
name: bitwarden-ingress
|
||||||
|
spec:
|
||||||
|
entryPoints:
|
||||||
|
- websecure
|
||||||
|
routes:
|
||||||
|
- match: Host(`bitwarden.prd.durp.info`) && PathPrefix(`/`)
|
||||||
|
kind: Rule
|
||||||
|
services:
|
||||||
|
- name: bitwarden
|
||||||
|
port: 80
|
||||||
|
tls:
|
||||||
|
secretName: bitwarden-tls
|
||||||
|
|
||||||
|
---
|
||||||
|
|
||||||
|
apiVersion: cert-manager.io/v1
|
||||||
|
kind: Certificate
|
||||||
|
metadata:
|
||||||
|
name: bitwarden-tls
|
||||||
|
spec:
|
||||||
|
secretName: bitwarden-tls
|
||||||
|
issuerRef:
|
||||||
|
name: letsencrypt-production
|
||||||
|
kind: ClusterIssuer
|
||||||
|
commonName: "bitwarden.prd.durp.info"
|
||||||
|
dnsNames:
|
||||||
|
- "bitwarden.prd.durp.info"
|
||||||
|
|
||||||
|
---
|
||||||
|
|
||||||
|
kind: Service
|
||||||
|
apiVersion: v1
|
||||||
|
metadata:
|
||||||
|
name: bitwarden-external-dns
|
||||||
|
annotations:
|
||||||
|
external-dns.alpha.kubernetes.io/hostname: bitwarden.prd.durp.info
|
||||||
|
spec:
|
||||||
|
type: ExternalName
|
||||||
|
externalName:.prd.durp.info
|
||||||
|
|
||||||
|
---
|
||||||
|
|
||||||
|
apiVersion: traefik.containo.us/v1alpha1
|
||||||
|
kind: IngressRoute
|
||||||
|
metadata:
|
||||||
|
name: bitwarden-admin-ingress
|
||||||
|
spec:
|
||||||
|
entryPoints:
|
||||||
|
- websecure
|
||||||
|
routes:
|
||||||
|
- match: Host(`bitwarden.prd.durp.info`) && PathPrefix(`/admin`)
|
||||||
|
kind: Rule
|
||||||
|
middlewares:
|
||||||
|
- name: whitelist
|
||||||
|
namespace: traefik
|
||||||
|
services:
|
||||||
|
- name: bitwarden
|
||||||
|
port: 80
|
||||||
|
tls:
|
||||||
|
secretName: bitwarden-tls
|
||||||
@@ -8,4 +8,4 @@ appVersion: 0.0.1
|
|||||||
dependencies:
|
dependencies:
|
||||||
- name: cert-manager
|
- name: cert-manager
|
||||||
repository: https://charts.jetstack.io
|
repository: https://charts.jetstack.io
|
||||||
version: v1.15.3
|
version: 1.*.*
|
||||||
13
cert-manager/templates/self-signed.yaml
Normal file
13
cert-manager/templates/self-signed.yaml
Normal file
@@ -0,0 +1,13 @@
|
|||||||
|
apiVersion: cert-manager.io/v1
|
||||||
|
kind: Issuer
|
||||||
|
metadata:
|
||||||
|
name: selfsigned-issuer
|
||||||
|
spec:
|
||||||
|
selfSigned: {}
|
||||||
|
---
|
||||||
|
apiVersion: cert-manager.io/v1
|
||||||
|
kind: ClusterIssuer
|
||||||
|
metadata:
|
||||||
|
name: selfsigned-cluster-issuer
|
||||||
|
spec:
|
||||||
|
selfSigned: {}
|
||||||
@@ -9,4 +9,4 @@ appVersion: "1.16.0"
|
|||||||
dependencies:
|
dependencies:
|
||||||
- name: crossplane
|
- name: crossplane
|
||||||
repository: https://charts.crossplane.io/stable
|
repository: https://charts.crossplane.io/stable
|
||||||
version: 1.17.1
|
version: 1.16.0
|
||||||
@@ -3,7 +3,7 @@ kind: Provider
|
|||||||
metadata:
|
metadata:
|
||||||
name: provider-gitlab
|
name: provider-gitlab
|
||||||
spec:
|
spec:
|
||||||
package: xpkg.upbound.io/crossplane-contrib/provider-gitlab:v0.5.0
|
package: xpkg.upbound.io/crossplane-contrib/provider-gitlab:v0.7.0
|
||||||
---
|
---
|
||||||
|
|
||||||
apiVersion: external-secrets.io/v1beta1
|
apiVersion: external-secrets.io/v1beta1
|
||||||
186
crossplane/values.yaml
Normal file
186
crossplane/values.yaml
Normal file
@@ -0,0 +1,186 @@
|
|||||||
|
# helm-docs renders these comments into markdown. Use markdown formatting where
|
||||||
|
# appropiate.
|
||||||
|
#
|
||||||
|
# -- The number of Crossplane pod `replicas` to deploy.
|
||||||
|
replicas: 1
|
||||||
|
|
||||||
|
# -- The deployment strategy for the Crossplane and RBAC Manager pods.
|
||||||
|
deploymentStrategy: RollingUpdate
|
||||||
|
|
||||||
|
image:
|
||||||
|
# -- Repository for the Crossplane pod image.
|
||||||
|
repository: xpkg.upbound.io/crossplane/crossplane
|
||||||
|
# -- The Crossplane image tag. Defaults to the value of `appVersion` in `Chart.yaml`.
|
||||||
|
tag: ""
|
||||||
|
# -- The image pull policy used for Crossplane and RBAC Manager pods.
|
||||||
|
pullPolicy: IfNotPresent
|
||||||
|
|
||||||
|
# -- Add `nodeSelectors` to the Crossplane pod deployment.
|
||||||
|
nodeSelector: {}
|
||||||
|
# -- Add `tolerations` to the Crossplane pod deployment.
|
||||||
|
tolerations: []
|
||||||
|
# -- Add `affinities` to the Crossplane pod deployment.
|
||||||
|
affinity: {}
|
||||||
|
|
||||||
|
# -- Enable `hostNetwork` for the Crossplane deployment. Caution: enabling `hostNetwork` grants the Crossplane Pod access to the host network namespace. Consider setting `dnsPolicy` to `ClusterFirstWithHostNet`.
|
||||||
|
hostNetwork: false
|
||||||
|
|
||||||
|
# -- Specify the `dnsPolicy` to be used by the Crossplane pod.
|
||||||
|
dnsPolicy: ""
|
||||||
|
|
||||||
|
# -- Add custom `labels` to the Crossplane pod deployment.
|
||||||
|
customLabels: {}
|
||||||
|
|
||||||
|
# -- Add custom `annotations` to the Crossplane pod deployment.
|
||||||
|
customAnnotations: {}
|
||||||
|
|
||||||
|
serviceAccount:
|
||||||
|
# -- Add custom `annotations` to the Crossplane ServiceAccount.
|
||||||
|
customAnnotations: {}
|
||||||
|
|
||||||
|
# -- Enable [leader election](https://docs.crossplane.io/latest/concepts/pods/#leader-election) for the Crossplane pod.
|
||||||
|
leaderElection: true
|
||||||
|
# -- Add custom arguments to the Crossplane pod.
|
||||||
|
args: []
|
||||||
|
|
||||||
|
provider:
|
||||||
|
# -- A list of Provider packages to install.
|
||||||
|
packages: []
|
||||||
|
|
||||||
|
configuration:
|
||||||
|
# -- A list of Configuration packages to install.
|
||||||
|
packages: []
|
||||||
|
|
||||||
|
function:
|
||||||
|
# -- A list of Function packages to install
|
||||||
|
packages: []
|
||||||
|
|
||||||
|
# -- The imagePullSecret names to add to the Crossplane ServiceAccount.
|
||||||
|
imagePullSecrets: []
|
||||||
|
|
||||||
|
registryCaBundleConfig:
|
||||||
|
# -- The ConfigMap name containing a custom CA bundle to enable fetching packages from registries with unknown or untrusted certificates.
|
||||||
|
name: ""
|
||||||
|
# -- The ConfigMap key containing a custom CA bundle to enable fetching packages from registries with unknown or untrusted certificates.
|
||||||
|
key: ""
|
||||||
|
|
||||||
|
service:
|
||||||
|
# -- Configure annotations on the service object. Only enabled when webhooks.enabled = true
|
||||||
|
customAnnotations: {}
|
||||||
|
|
||||||
|
webhooks:
|
||||||
|
# -- Enable webhooks for Crossplane and installed Provider packages.
|
||||||
|
enabled: true
|
||||||
|
|
||||||
|
rbacManager:
|
||||||
|
# -- Deploy the RBAC Manager pod and its required roles.
|
||||||
|
deploy: true
|
||||||
|
# -- Don't install aggregated Crossplane ClusterRoles.
|
||||||
|
skipAggregatedClusterRoles: false
|
||||||
|
# -- The number of RBAC Manager pod `replicas` to deploy.
|
||||||
|
replicas: 1
|
||||||
|
# -- Enable [leader election](https://docs.crossplane.io/latest/concepts/pods/#leader-election) for the RBAC Manager pod.
|
||||||
|
leaderElection: true
|
||||||
|
# -- Add custom arguments to the RBAC Manager pod.
|
||||||
|
args: []
|
||||||
|
# -- Add `nodeSelectors` to the RBAC Manager pod deployment.
|
||||||
|
nodeSelector: {}
|
||||||
|
# -- Add `tolerations` to the RBAC Manager pod deployment.
|
||||||
|
tolerations: []
|
||||||
|
# -- Add `affinities` to the RBAC Manager pod deployment.
|
||||||
|
affinity: {}
|
||||||
|
|
||||||
|
# -- The PriorityClass name to apply to the Crossplane and RBAC Manager pods.
|
||||||
|
priorityClassName: ""
|
||||||
|
|
||||||
|
resourcesCrossplane:
|
||||||
|
limits:
|
||||||
|
# -- CPU resource limits for the Crossplane pod.
|
||||||
|
cpu: 500m
|
||||||
|
# -- Memory resource limits for the Crossplane pod.
|
||||||
|
memory: 1024Mi
|
||||||
|
requests:
|
||||||
|
# -- CPU resource requests for the Crossplane pod.
|
||||||
|
cpu: 100m
|
||||||
|
# -- Memory resource requests for the Crossplane pod.
|
||||||
|
memory: 256Mi
|
||||||
|
|
||||||
|
securityContextCrossplane:
|
||||||
|
# -- The user ID used by the Crossplane pod.
|
||||||
|
runAsUser: 65532
|
||||||
|
# -- The group ID used by the Crossplane pod.
|
||||||
|
runAsGroup: 65532
|
||||||
|
# -- Enable `allowPrivilegeEscalation` for the Crossplane pod.
|
||||||
|
allowPrivilegeEscalation: false
|
||||||
|
# -- Set the Crossplane pod root file system as read-only.
|
||||||
|
readOnlyRootFilesystem: true
|
||||||
|
|
||||||
|
packageCache:
|
||||||
|
# -- Set to `Memory` to hold the package cache in a RAM backed file system. Useful for Crossplane development.
|
||||||
|
medium: ""
|
||||||
|
# -- The size limit for the package cache. If medium is `Memory` the `sizeLimit` can't exceed Node memory.
|
||||||
|
sizeLimit: 20Mi
|
||||||
|
# -- The name of a PersistentVolumeClaim to use as the package cache. Disables the default package cache `emptyDir` Volume.
|
||||||
|
pvc: ""
|
||||||
|
# -- The name of a ConfigMap to use as the package cache. Disables the default package cache `emptyDir` Volume.
|
||||||
|
configMap: ""
|
||||||
|
|
||||||
|
resourcesRBACManager:
|
||||||
|
limits:
|
||||||
|
# -- CPU resource limits for the RBAC Manager pod.
|
||||||
|
cpu: 100m
|
||||||
|
# -- Memory resource limits for the RBAC Manager pod.
|
||||||
|
memory: 512Mi
|
||||||
|
requests:
|
||||||
|
# -- CPU resource requests for the RBAC Manager pod.
|
||||||
|
cpu: 100m
|
||||||
|
# -- Memory resource requests for the RBAC Manager pod.
|
||||||
|
memory: 256Mi
|
||||||
|
|
||||||
|
securityContextRBACManager:
|
||||||
|
# -- The user ID used by the RBAC Manager pod.
|
||||||
|
runAsUser: 65532
|
||||||
|
# -- The group ID used by the RBAC Manager pod.
|
||||||
|
runAsGroup: 65532
|
||||||
|
# -- Enable `allowPrivilegeEscalation` for the RBAC Manager pod.
|
||||||
|
allowPrivilegeEscalation: false
|
||||||
|
# -- Set the RBAC Manager pod root file system as read-only.
|
||||||
|
readOnlyRootFilesystem: true
|
||||||
|
|
||||||
|
metrics:
|
||||||
|
# -- Enable Prometheus path, port and scrape annotations and expose port 8080 for both the Crossplane and RBAC Manager pods.
|
||||||
|
enabled: false
|
||||||
|
|
||||||
|
# -- Add custom environmental variables to the Crossplane pod deployment.
|
||||||
|
# Replaces any `.` in a variable name with `_`. For example, `SAMPLE.KEY=value1` becomes `SAMPLE_KEY=value1`.
|
||||||
|
extraEnvVarsCrossplane: {}
|
||||||
|
|
||||||
|
# -- Add custom environmental variables to the RBAC Manager pod deployment.
|
||||||
|
# Replaces any `.` in a variable name with `_`. For example, `SAMPLE.KEY=value1` becomes `SAMPLE_KEY=value1`.
|
||||||
|
extraEnvVarsRBACManager: {}
|
||||||
|
|
||||||
|
# -- Add a custom `securityContext` to the Crossplane pod.
|
||||||
|
podSecurityContextCrossplane: {}
|
||||||
|
|
||||||
|
# -- Add a custom `securityContext` to the RBAC Manager pod.
|
||||||
|
podSecurityContextRBACManager: {}
|
||||||
|
|
||||||
|
# -- Add custom `volumes` to the Crossplane pod.
|
||||||
|
extraVolumesCrossplane: {}
|
||||||
|
|
||||||
|
# -- Add custom `volumeMounts` to the Crossplane pod.
|
||||||
|
extraVolumeMountsCrossplane: {}
|
||||||
|
|
||||||
|
# -- To add arbitrary Kubernetes Objects during a Helm Install
|
||||||
|
extraObjects: []
|
||||||
|
# - apiVersion: pkg.crossplane.io/v1alpha1
|
||||||
|
# kind: ControllerConfig
|
||||||
|
# metadata:
|
||||||
|
# name: aws-config
|
||||||
|
# annotations:
|
||||||
|
# eks.amazonaws.com/role-arn: arn:aws:iam::123456789101:role/example
|
||||||
|
# helm.sh/hook: post-install
|
||||||
|
# spec:
|
||||||
|
# podSecurityContext:
|
||||||
|
# fsGroup: 2000
|
||||||
|
|
||||||
@@ -1,101 +0,0 @@
|
|||||||
apiVersion: external-secrets.io/v1beta1
|
|
||||||
kind: ExternalSecret
|
|
||||||
metadata:
|
|
||||||
name: ollama-secret
|
|
||||||
spec:
|
|
||||||
secretStoreRef:
|
|
||||||
name: vault
|
|
||||||
kind: ClusterSecretStore
|
|
||||||
target:
|
|
||||||
name: ollama-secret
|
|
||||||
data:
|
|
||||||
- secretKey: users
|
|
||||||
remoteRef:
|
|
||||||
key: secrets/internalproxy/ollama
|
|
||||||
property: users
|
|
||||||
|
|
||||||
---
|
|
||||||
|
|
||||||
apiVersion: traefik.containo.us/v1alpha1
|
|
||||||
kind: Middleware
|
|
||||||
metadata:
|
|
||||||
name: ollama-basic-auth
|
|
||||||
spec:
|
|
||||||
basicAuth:
|
|
||||||
secret: ollama-secret
|
|
||||||
|
|
||||||
---
|
|
||||||
|
|
||||||
apiVersion: v1
|
|
||||||
kind: Service
|
|
||||||
metadata:
|
|
||||||
name: ollama
|
|
||||||
spec:
|
|
||||||
ports:
|
|
||||||
- name: app
|
|
||||||
port: 11435
|
|
||||||
protocol: TCP
|
|
||||||
targetPort: 11435
|
|
||||||
clusterIP: None
|
|
||||||
type: ClusterIP
|
|
||||||
|
|
||||||
---
|
|
||||||
|
|
||||||
apiVersion: v1
|
|
||||||
kind: Endpoints
|
|
||||||
metadata:
|
|
||||||
name: ollama
|
|
||||||
subsets:
|
|
||||||
- addresses:
|
|
||||||
- ip: 192.168.20.104
|
|
||||||
ports:
|
|
||||||
- name: app
|
|
||||||
port: 11435
|
|
||||||
protocol: TCP
|
|
||||||
|
|
||||||
---
|
|
||||||
|
|
||||||
apiVersion: traefik.containo.us/v1alpha1
|
|
||||||
kind: IngressRoute
|
|
||||||
metadata:
|
|
||||||
name: ollama-ingress
|
|
||||||
spec:
|
|
||||||
entryPoints:
|
|
||||||
- websecure
|
|
||||||
routes:
|
|
||||||
- match: Host(`ollama.durp.info`) && PathPrefix(`/`)
|
|
||||||
middlewares:
|
|
||||||
- name: ollama-basic-auth
|
|
||||||
kind: Rule
|
|
||||||
services:
|
|
||||||
- name: ollama
|
|
||||||
port: 11435
|
|
||||||
tls:
|
|
||||||
secretName: ollama-tls
|
|
||||||
|
|
||||||
---
|
|
||||||
|
|
||||||
apiVersion: cert-manager.io/v1
|
|
||||||
kind: Certificate
|
|
||||||
metadata:
|
|
||||||
name: ollama-tls
|
|
||||||
spec:
|
|
||||||
secretName: ollama-tls
|
|
||||||
issuerRef:
|
|
||||||
name: letsencrypt-production
|
|
||||||
kind: ClusterIssuer
|
|
||||||
commonName: "ollama.durp.info"
|
|
||||||
dnsNames:
|
|
||||||
- "ollama.durp.info"
|
|
||||||
|
|
||||||
---
|
|
||||||
|
|
||||||
kind: Service
|
|
||||||
apiVersion: v1
|
|
||||||
metadata:
|
|
||||||
name: ollama-external-dns
|
|
||||||
annotations:
|
|
||||||
external-dns.alpha.kubernetes.io/hostname: ollama.durp.info
|
|
||||||
spec:
|
|
||||||
type: ExternalName
|
|
||||||
externalName: durp.info
|
|
||||||
@@ -1,13 +1,11 @@
|
|||||||
apiVersion: v2
|
|
||||||
name: durpapi
|
|
||||||
description: A Helm chart for Kubernetes
|
description: A Helm chart for Kubernetes
|
||||||
type: application
|
name: durpapi
|
||||||
|
|
||||||
version: 0.1.0-dev0184
|
|
||||||
appVersion: 0.1.0
|
appVersion: 0.1.0
|
||||||
|
|
||||||
dependencies:
|
dependencies:
|
||||||
- condition: postgresql.enabled
|
- condition: postgresql.enabled
|
||||||
|
name: postgresql
|
||||||
version: 12.5.*
|
version: 12.5.*
|
||||||
repository: https://charts.bitnami.com/bitnami
|
repository: https://charts.bitnami.com/bitnami
|
||||||
name: postgresql
|
version: 0.1.0-dev0184
|
||||||
|
apiVersion: v2
|
||||||
|
type: application
|
||||||
@@ -6,7 +6,7 @@ spec:
|
|||||||
entryPoints:
|
entryPoints:
|
||||||
- websecure
|
- websecure
|
||||||
routes:
|
routes:
|
||||||
- match: Host("api.durp.info") && PathPrefix(`/api`)
|
- match: Host("api.prd.durp.info") && PathPrefix(`/api`)
|
||||||
kind: Rule
|
kind: Rule
|
||||||
middlewares:
|
middlewares:
|
||||||
- name: jwt
|
- name: jwt
|
||||||
@@ -24,7 +24,7 @@ spec:
|
|||||||
entryPoints:
|
entryPoints:
|
||||||
- websecure
|
- websecure
|
||||||
routes:
|
routes:
|
||||||
- match: Host("api.durp.info") && PathPrefix(`/swagger`)
|
- match: Host("api.prd.durp.info") && PathPrefix(`/swagger`)
|
||||||
kind: Rule
|
kind: Rule
|
||||||
services:
|
services:
|
||||||
- name: "durpapi-service"
|
- name: "durpapi-service"
|
||||||
@@ -41,4 +41,4 @@ spec:
|
|||||||
jwt:
|
jwt:
|
||||||
Required: true
|
Required: true
|
||||||
Keys:
|
Keys:
|
||||||
- https://authentik.durp.info/application/o/api/jwks
|
- https://authentik.prd.durp.info/application/o/api/jwks/
|
||||||
@@ -10,15 +10,15 @@ deployment:
|
|||||||
probe:
|
probe:
|
||||||
readiness:
|
readiness:
|
||||||
httpGet:
|
httpGet:
|
||||||
path: /health/gethealth
|
path: /api/health/gethealth
|
||||||
port: 8080
|
port: 8080
|
||||||
liveness:
|
liveness:
|
||||||
httpGet:
|
httpGet:
|
||||||
path: /health/gethealth
|
path: /api/health/gethealth
|
||||||
port: 8080
|
port: 8080
|
||||||
startup:
|
startup:
|
||||||
httpGet:
|
httpGet:
|
||||||
path: /health/gethealth
|
path: /api/health/gethealth
|
||||||
port: 8080
|
port: 8080
|
||||||
service:
|
service:
|
||||||
type: ClusterIP
|
type: ClusterIP
|
||||||
@@ -9,4 +9,4 @@ appVersion: 0.0.1
|
|||||||
dependencies:
|
dependencies:
|
||||||
- name: external-dns
|
- name: external-dns
|
||||||
repository: https://charts.bitnami.com/bitnami
|
repository: https://charts.bitnami.com/bitnami
|
||||||
version: 8.3.8
|
version: 6.20.3
|
||||||
@@ -4,7 +4,7 @@ external-dns:
|
|||||||
|
|
||||||
image:
|
image:
|
||||||
pullPolicy: Always
|
pullPolicy: Always
|
||||||
|
txtPrefix: "prd-"
|
||||||
sources:
|
sources:
|
||||||
- service
|
- service
|
||||||
|
|
||||||
@@ -8,5 +8,5 @@ appVersion: 0.0.1
|
|||||||
dependencies:
|
dependencies:
|
||||||
- name: external-secrets
|
- name: external-secrets
|
||||||
repository: https://charts.external-secrets.io
|
repository: https://charts.external-secrets.io
|
||||||
version: 0.10.4
|
version: 0.8.1
|
||||||
|
|
||||||
@@ -8,4 +8,4 @@ appVersion: 0.0.1
|
|||||||
dependencies:
|
dependencies:
|
||||||
- name: gatekeeper
|
- name: gatekeeper
|
||||||
repository: https://open-policy-agent.github.io/gatekeeper/charts
|
repository: https://open-policy-agent.github.io/gatekeeper/charts
|
||||||
version: 3.17.1
|
version: 3.14.0
|
||||||
277
gatekeeper/values.yaml
Normal file
277
gatekeeper/values.yaml
Normal file
@@ -0,0 +1,277 @@
|
|||||||
|
gatekeeper:
|
||||||
|
replicas: 3
|
||||||
|
revisionHistoryLimit: 10
|
||||||
|
auditInterval: 60
|
||||||
|
metricsBackends: ["prometheus"]
|
||||||
|
auditMatchKindOnly: false
|
||||||
|
constraintViolationsLimit: 20
|
||||||
|
auditFromCache: false
|
||||||
|
disableMutation: false
|
||||||
|
disableValidatingWebhook: false
|
||||||
|
validatingWebhookName: gatekeeper-validating-webhook-configuration
|
||||||
|
validatingWebhookTimeoutSeconds: 3
|
||||||
|
validatingWebhookFailurePolicy: Ignore
|
||||||
|
validatingWebhookAnnotations: {}
|
||||||
|
validatingWebhookExemptNamespacesLabels: {}
|
||||||
|
validatingWebhookObjectSelector: {}
|
||||||
|
validatingWebhookCheckIgnoreFailurePolicy: Fail
|
||||||
|
validatingWebhookCustomRules: {}
|
||||||
|
validatingWebhookURL: null
|
||||||
|
enableDeleteOperations: false
|
||||||
|
enableExternalData: true
|
||||||
|
enableGeneratorResourceExpansion: true
|
||||||
|
enableTLSHealthcheck: false
|
||||||
|
maxServingThreads: -1
|
||||||
|
mutatingWebhookName: gatekeeper-mutating-webhook-configuration
|
||||||
|
mutatingWebhookFailurePolicy: Ignore
|
||||||
|
mutatingWebhookReinvocationPolicy: Never
|
||||||
|
mutatingWebhookAnnotations: {}
|
||||||
|
mutatingWebhookExemptNamespacesLabels: {}
|
||||||
|
mutatingWebhookObjectSelector: {}
|
||||||
|
mutatingWebhookTimeoutSeconds: 1
|
||||||
|
mutatingWebhookCustomRules: {}
|
||||||
|
mutatingWebhookURL: null
|
||||||
|
mutationAnnotations: false
|
||||||
|
auditChunkSize: 500
|
||||||
|
logLevel: INFO
|
||||||
|
logDenies: false
|
||||||
|
logMutations: false
|
||||||
|
emitAdmissionEvents: false
|
||||||
|
emitAuditEvents: false
|
||||||
|
admissionEventsInvolvedNamespace: false
|
||||||
|
auditEventsInvolvedNamespace: false
|
||||||
|
resourceQuota: true
|
||||||
|
externaldataProviderResponseCacheTTL: 3m
|
||||||
|
image:
|
||||||
|
repository: openpolicyagent/gatekeeper
|
||||||
|
crdRepository: openpolicyagent/gatekeeper-crds
|
||||||
|
release: v3.15.0-beta.0
|
||||||
|
pullPolicy: Always
|
||||||
|
pullSecrets: []
|
||||||
|
preInstall:
|
||||||
|
crdRepository:
|
||||||
|
image:
|
||||||
|
repository: null
|
||||||
|
tag: v3.15.0-beta.0
|
||||||
|
postUpgrade:
|
||||||
|
labelNamespace:
|
||||||
|
enabled: false
|
||||||
|
image:
|
||||||
|
repository: openpolicyagent/gatekeeper-crds
|
||||||
|
tag: v3.15.0-beta.0
|
||||||
|
pullPolicy: IfNotPresent
|
||||||
|
pullSecrets: []
|
||||||
|
extraNamespaces: []
|
||||||
|
podSecurity: ["pod-security.kubernetes.io/audit=restricted",
|
||||||
|
"pod-security.kubernetes.io/audit-version=latest",
|
||||||
|
"pod-security.kubernetes.io/warn=restricted",
|
||||||
|
"pod-security.kubernetes.io/warn-version=latest",
|
||||||
|
"pod-security.kubernetes.io/enforce=restricted",
|
||||||
|
"pod-security.kubernetes.io/enforce-version=v1.24"]
|
||||||
|
extraAnnotations: {}
|
||||||
|
priorityClassName: ""
|
||||||
|
affinity: {}
|
||||||
|
tolerations: []
|
||||||
|
nodeSelector: {kubernetes.io/os: linux}
|
||||||
|
resources: {}
|
||||||
|
securityContext:
|
||||||
|
allowPrivilegeEscalation: false
|
||||||
|
capabilities:
|
||||||
|
drop:
|
||||||
|
- ALL
|
||||||
|
readOnlyRootFilesystem: true
|
||||||
|
runAsGroup: 999
|
||||||
|
runAsNonRoot: true
|
||||||
|
runAsUser: 1000
|
||||||
|
postInstall:
|
||||||
|
labelNamespace:
|
||||||
|
enabled: true
|
||||||
|
extraRules: []
|
||||||
|
image:
|
||||||
|
repository: openpolicyagent/gatekeeper-crds
|
||||||
|
tag: v3.15.0-beta.0
|
||||||
|
pullPolicy: IfNotPresent
|
||||||
|
pullSecrets: []
|
||||||
|
extraNamespaces: []
|
||||||
|
podSecurity: ["pod-security.kubernetes.io/audit=restricted",
|
||||||
|
"pod-security.kubernetes.io/audit-version=latest",
|
||||||
|
"pod-security.kubernetes.io/warn=restricted",
|
||||||
|
"pod-security.kubernetes.io/warn-version=latest",
|
||||||
|
"pod-security.kubernetes.io/enforce=restricted",
|
||||||
|
"pod-security.kubernetes.io/enforce-version=v1.24"]
|
||||||
|
extraAnnotations: {}
|
||||||
|
priorityClassName: ""
|
||||||
|
probeWebhook:
|
||||||
|
enabled: true
|
||||||
|
image:
|
||||||
|
repository: curlimages/curl
|
||||||
|
tag: 7.83.1
|
||||||
|
pullPolicy: IfNotPresent
|
||||||
|
pullSecrets: []
|
||||||
|
waitTimeout: 60
|
||||||
|
httpTimeout: 2
|
||||||
|
insecureHTTPS: false
|
||||||
|
priorityClassName: ""
|
||||||
|
affinity: {}
|
||||||
|
tolerations: []
|
||||||
|
nodeSelector: {kubernetes.io/os: linux}
|
||||||
|
securityContext:
|
||||||
|
allowPrivilegeEscalation: false
|
||||||
|
capabilities:
|
||||||
|
drop:
|
||||||
|
- ALL
|
||||||
|
readOnlyRootFilesystem: true
|
||||||
|
runAsGroup: 999
|
||||||
|
runAsNonRoot: true
|
||||||
|
runAsUser: 1000
|
||||||
|
preUninstall:
|
||||||
|
deleteWebhookConfigurations:
|
||||||
|
extraRules: []
|
||||||
|
enabled: false
|
||||||
|
image:
|
||||||
|
repository: openpolicyagent/gatekeeper-crds
|
||||||
|
tag: v3.15.0-beta.0
|
||||||
|
pullPolicy: IfNotPresent
|
||||||
|
pullSecrets: []
|
||||||
|
priorityClassName: ""
|
||||||
|
affinity: {}
|
||||||
|
tolerations: []
|
||||||
|
nodeSelector: {kubernetes.io/os: linux}
|
||||||
|
resources: {}
|
||||||
|
securityContext:
|
||||||
|
allowPrivilegeEscalation: false
|
||||||
|
capabilities:
|
||||||
|
drop:
|
||||||
|
- ALL
|
||||||
|
readOnlyRootFilesystem: true
|
||||||
|
runAsGroup: 999
|
||||||
|
runAsNonRoot: true
|
||||||
|
runAsUser: 1000
|
||||||
|
podAnnotations: {}
|
||||||
|
auditPodAnnotations: {}
|
||||||
|
podLabels: {}
|
||||||
|
podCountLimit: "100"
|
||||||
|
secretAnnotations: {}
|
||||||
|
enableRuntimeDefaultSeccompProfile: true
|
||||||
|
controllerManager:
|
||||||
|
exemptNamespaces: []
|
||||||
|
exemptNamespacePrefixes: []
|
||||||
|
hostNetwork: false
|
||||||
|
dnsPolicy: ClusterFirst
|
||||||
|
port: 8443
|
||||||
|
metricsPort: 8888
|
||||||
|
healthPort: 9090
|
||||||
|
readinessTimeout: 1
|
||||||
|
livenessTimeout: 1
|
||||||
|
priorityClassName: system-cluster-critical
|
||||||
|
disableCertRotation: false
|
||||||
|
tlsMinVersion: 1.3
|
||||||
|
clientCertName: ""
|
||||||
|
strategyType: RollingUpdate
|
||||||
|
affinity:
|
||||||
|
podAntiAffinity:
|
||||||
|
preferredDuringSchedulingIgnoredDuringExecution:
|
||||||
|
- podAffinityTerm:
|
||||||
|
labelSelector:
|
||||||
|
matchExpressions:
|
||||||
|
- key: gatekeeper.sh/operation
|
||||||
|
operator: In
|
||||||
|
values:
|
||||||
|
- webhook
|
||||||
|
topologyKey: kubernetes.io/hostname
|
||||||
|
weight: 100
|
||||||
|
topologySpreadConstraints: []
|
||||||
|
tolerations: []
|
||||||
|
nodeSelector: {kubernetes.io/os: linux}
|
||||||
|
resources:
|
||||||
|
limits:
|
||||||
|
memory: 512Mi
|
||||||
|
requests:
|
||||||
|
cpu: 100m
|
||||||
|
memory: 512Mi
|
||||||
|
securityContext:
|
||||||
|
allowPrivilegeEscalation: false
|
||||||
|
capabilities:
|
||||||
|
drop:
|
||||||
|
- ALL
|
||||||
|
readOnlyRootFilesystem: true
|
||||||
|
runAsGroup: 999
|
||||||
|
runAsNonRoot: true
|
||||||
|
runAsUser: 1000
|
||||||
|
podSecurityContext:
|
||||||
|
fsGroup: 999
|
||||||
|
supplementalGroups:
|
||||||
|
- 999
|
||||||
|
extraRules: []
|
||||||
|
networkPolicy:
|
||||||
|
enabled: false
|
||||||
|
ingress: { }
|
||||||
|
# - from:
|
||||||
|
# - ipBlock:
|
||||||
|
# cidr: 0.0.0.0/0
|
||||||
|
audit:
|
||||||
|
enablePubsub: false
|
||||||
|
connection: audit-connection
|
||||||
|
channel: audit-channel
|
||||||
|
hostNetwork: false
|
||||||
|
dnsPolicy: ClusterFirst
|
||||||
|
metricsPort: 8888
|
||||||
|
healthPort: 9090
|
||||||
|
readinessTimeout: 1
|
||||||
|
livenessTimeout: 1
|
||||||
|
priorityClassName: system-cluster-critical
|
||||||
|
disableCertRotation: false
|
||||||
|
affinity: {}
|
||||||
|
tolerations: []
|
||||||
|
nodeSelector: {kubernetes.io/os: linux}
|
||||||
|
resources:
|
||||||
|
limits:
|
||||||
|
memory: 512Mi
|
||||||
|
requests:
|
||||||
|
cpu: 100m
|
||||||
|
memory: 512Mi
|
||||||
|
securityContext:
|
||||||
|
allowPrivilegeEscalation: false
|
||||||
|
capabilities:
|
||||||
|
drop:
|
||||||
|
- ALL
|
||||||
|
readOnlyRootFilesystem: true
|
||||||
|
runAsGroup: 999
|
||||||
|
runAsNonRoot: true
|
||||||
|
runAsUser: 1000
|
||||||
|
podSecurityContext:
|
||||||
|
fsGroup: 999
|
||||||
|
supplementalGroups:
|
||||||
|
- 999
|
||||||
|
writeToRAMDisk: false
|
||||||
|
extraRules: []
|
||||||
|
crds:
|
||||||
|
affinity: {}
|
||||||
|
tolerations: []
|
||||||
|
nodeSelector: {kubernetes.io/os: linux}
|
||||||
|
resources: {}
|
||||||
|
securityContext:
|
||||||
|
allowPrivilegeEscalation: false
|
||||||
|
capabilities:
|
||||||
|
drop:
|
||||||
|
- ALL
|
||||||
|
readOnlyRootFilesystem: true
|
||||||
|
runAsGroup: 65532
|
||||||
|
runAsNonRoot: true
|
||||||
|
runAsUser: 65532
|
||||||
|
pdb:
|
||||||
|
controllerManager:
|
||||||
|
minAvailable: 1
|
||||||
|
service: {}
|
||||||
|
disabledBuiltins: ["{http.send}"]
|
||||||
|
psp:
|
||||||
|
enabled: true
|
||||||
|
upgradeCRDs:
|
||||||
|
enabled: true
|
||||||
|
extraRules: []
|
||||||
|
priorityClassName: ""
|
||||||
|
rbac:
|
||||||
|
create: true
|
||||||
|
externalCertInjection:
|
||||||
|
enabled: false
|
||||||
|
secretName: gatekeeper-webhook-server-cert
|
||||||
@@ -8,4 +8,4 @@ appVersion: 0.0.1
|
|||||||
dependencies:
|
dependencies:
|
||||||
- name: gitlab-runner
|
- name: gitlab-runner
|
||||||
repository: https://charts.gitlab.io/
|
repository: https://charts.gitlab.io/
|
||||||
version: 0.69.0
|
version: 0.43.0
|
||||||
@@ -8,4 +8,4 @@ appVersion: 0.0.1
|
|||||||
dependencies:
|
dependencies:
|
||||||
- name: heimdall
|
- name: heimdall
|
||||||
repository: https://djjudas21.github.io/charts/
|
repository: https://djjudas21.github.io/charts/
|
||||||
version: 8.5.4
|
version: 8.5.2
|
||||||
@@ -7,7 +7,7 @@ spec:
|
|||||||
entryPoints:
|
entryPoints:
|
||||||
- websecure
|
- websecure
|
||||||
routes:
|
routes:
|
||||||
- match: Host(`heimdall.durp.info`) && PathPrefix(`/`)
|
- match: Host(`heimdall.prd.durp.info`) && PathPrefix(`/`)
|
||||||
middlewares:
|
middlewares:
|
||||||
- name: authentik-proxy-provider
|
- name: authentik-proxy-provider
|
||||||
namespace: traefik
|
namespace: traefik
|
||||||
@@ -15,7 +15,7 @@ spec:
|
|||||||
services:
|
services:
|
||||||
- name: heimdall
|
- name: heimdall
|
||||||
port: 80
|
port: 80
|
||||||
- match: Host(`heimdall.durp.info`) && PathPrefix(`/outpost.goauthentik.io`)
|
- match: Host(`heimdall.prd.durp.info`) && PathPrefix(`/outpost.goauthentik.io`)
|
||||||
kind: Rule
|
kind: Rule
|
||||||
services:
|
services:
|
||||||
- name: ak-outpost-authentik-embedded-outpost
|
- name: ak-outpost-authentik-embedded-outpost
|
||||||
@@ -35,9 +35,9 @@ spec:
|
|||||||
issuerRef:
|
issuerRef:
|
||||||
name: letsencrypt-production
|
name: letsencrypt-production
|
||||||
kind: ClusterIssuer
|
kind: ClusterIssuer
|
||||||
commonName: "heimdall.durp.info"
|
commonName: "heimdall.prd.durp.info"
|
||||||
dnsNames:
|
dnsNames:
|
||||||
- "heimdall.durp.info"
|
- "heimdall.prd.durp.info"
|
||||||
|
|
||||||
---
|
---
|
||||||
|
|
||||||
@@ -46,7 +46,7 @@ apiVersion: v1
|
|||||||
metadata:
|
metadata:
|
||||||
name: heimdall-external-dns
|
name: heimdall-external-dns
|
||||||
annotations:
|
annotations:
|
||||||
external-dns.alpha.kubernetes.io/hostname: heimdall.durp.info
|
external-dns.alpha.kubernetes.io/hostname: heimdall.prd.durp.info
|
||||||
spec:
|
spec:
|
||||||
type: ExternalName
|
type: ExternalName
|
||||||
externalName: durp.info
|
externalName:.prd.durp.info
|
||||||
@@ -1,12 +0,0 @@
|
|||||||
apiVersion: v2
|
|
||||||
name: argocd
|
|
||||||
description: A Helm chart for Kubernetes
|
|
||||||
type: application
|
|
||||||
|
|
||||||
version: 0.1.0
|
|
||||||
appVersion: "1.16.0"
|
|
||||||
|
|
||||||
dependencies:
|
|
||||||
- name: argo-cd
|
|
||||||
repository: https://argoproj.github.io/argo-helm
|
|
||||||
version: 6.11.1
|
|
||||||
@@ -1,64 +0,0 @@
|
|||||||
apiVersion: argoproj.io/v1alpha1
|
|
||||||
kind: Application
|
|
||||||
metadata:
|
|
||||||
name: argocd
|
|
||||||
namespace: argocd
|
|
||||||
spec:
|
|
||||||
project: default
|
|
||||||
source:
|
|
||||||
repoURL: https://gitlab.com/developerdurp/homelab.git
|
|
||||||
targetRevision: main
|
|
||||||
path: infra/argocd
|
|
||||||
destination:
|
|
||||||
namespace: argocd
|
|
||||||
name: in-cluster
|
|
||||||
syncPolicy:
|
|
||||||
automated:
|
|
||||||
prune: true
|
|
||||||
selfHeal: true
|
|
||||||
syncOptions:
|
|
||||||
- CreateNamespace=true
|
|
||||||
|
|
||||||
---
|
|
||||||
|
|
||||||
#apiVersion: external-secrets.io/v1beta1
|
|
||||||
#kind: ExternalSecret
|
|
||||||
#metadata:
|
|
||||||
# name: vault-argocd
|
|
||||||
# labels:
|
|
||||||
# app.kubernetes.io/part-of: argocd
|
|
||||||
#spec:
|
|
||||||
# secretStoreRef:
|
|
||||||
# name: vault
|
|
||||||
# kind: ClusterSecretStore
|
|
||||||
# target:
|
|
||||||
# name: client-secret
|
|
||||||
# data:
|
|
||||||
# - secretKey: clientSecret
|
|
||||||
# remoteRef:
|
|
||||||
# key: secrets/argocd/authentik
|
|
||||||
# property: clientsecret
|
|
||||||
|
|
||||||
---
|
|
||||||
|
|
||||||
apiVersion: traefik.io/v1alpha1
|
|
||||||
kind: IngressRoute
|
|
||||||
metadata:
|
|
||||||
name: argocd-ingress
|
|
||||||
annotations:
|
|
||||||
cert-manager.io/cluster-issuer: letsencrypt-production
|
|
||||||
spec:
|
|
||||||
entryPoints:
|
|
||||||
- websecure
|
|
||||||
routes:
|
|
||||||
- match: Host(`argocd.infra.durp.info`)
|
|
||||||
middlewares:
|
|
||||||
- name: whitelist
|
|
||||||
namespace: traefik
|
|
||||||
kind: Rule
|
|
||||||
services:
|
|
||||||
- name: argocd-server
|
|
||||||
port: 443
|
|
||||||
scheme: https
|
|
||||||
tls:
|
|
||||||
secretName: argocd-tls
|
|
||||||
@@ -1,12 +0,0 @@
|
|||||||
apiVersion: v2
|
|
||||||
name: longhorn-system
|
|
||||||
description: A Helm chart for Kubernetes
|
|
||||||
type: application
|
|
||||||
|
|
||||||
version: 0.1.0
|
|
||||||
appVersion: "1.16.0"
|
|
||||||
|
|
||||||
dependencies:
|
|
||||||
- name: longhorn
|
|
||||||
repository: https://charts.longhorn.io
|
|
||||||
version: 1.7.2
|
|
||||||
@@ -1,41 +0,0 @@
|
|||||||
#apiVersion: traefik.containo.us/v1alpha1
|
|
||||||
#kind: IngressRoute
|
|
||||||
#metadata:
|
|
||||||
# name: longhorn-ingress
|
|
||||||
#spec:
|
|
||||||
# entryPoints:
|
|
||||||
# - websecure
|
|
||||||
# routes:
|
|
||||||
# - match: Host(`longhorn.internal.durp.info`) && PathPrefix(`/`)
|
|
||||||
# middlewares:
|
|
||||||
# - name: whitelist
|
|
||||||
# namespace: traefik
|
|
||||||
# - name: authentik-proxy-provider
|
|
||||||
# namespace: traefik
|
|
||||||
# kind: Rule
|
|
||||||
# services:
|
|
||||||
# - name: longhorn-frontend
|
|
||||||
# port: 80
|
|
||||||
# - match: Host(`longhorn.internal.durp.info`) && PathPrefix(`/outpost.goauthentik.io`)
|
|
||||||
# kind: Rule
|
|
||||||
# services:
|
|
||||||
# - name: ak-outpost-authentik-embedded-outpost
|
|
||||||
# namespace: authentik
|
|
||||||
# port: 9000
|
|
||||||
# tls:
|
|
||||||
# secretName: longhorn-tls
|
|
||||||
#
|
|
||||||
#---
|
|
||||||
#
|
|
||||||
#apiVersion: cert-manager.io/v1
|
|
||||||
#kind: Certificate
|
|
||||||
#metadata:
|
|
||||||
# name: longhorn-tls
|
|
||||||
#spec:
|
|
||||||
# secretName: longhorn-tls
|
|
||||||
# issuerRef:
|
|
||||||
# name: letsencrypt-production
|
|
||||||
# kind: ClusterIssuer
|
|
||||||
# commonName: "longhorn.internal.durp.info"
|
|
||||||
# dnsNames:
|
|
||||||
# - "longhorn.internal.durp.info"
|
|
||||||
@@ -1,23 +0,0 @@
|
|||||||
#apiVersion: external-secrets.io/v1beta1
|
|
||||||
#kind: ExternalSecret
|
|
||||||
#metadata:
|
|
||||||
# name: external-longhorn-backup-token-secret
|
|
||||||
#spec:
|
|
||||||
# secretStoreRef:
|
|
||||||
# name: vault
|
|
||||||
# kind: ClusterSecretStore
|
|
||||||
# target:
|
|
||||||
# name: longhorn-backup-token-secret
|
|
||||||
# data:
|
|
||||||
# - secretKey: AWS_ACCESS_KEY_ID
|
|
||||||
# remoteRef:
|
|
||||||
# key: secrets/longhorn/backup
|
|
||||||
# property: AWS_ACCESS_KEY_ID
|
|
||||||
# - secretKey: AWS_ENDPOINTS
|
|
||||||
# remoteRef:
|
|
||||||
# key: secrets/longhorn/backup
|
|
||||||
# property: AWS_ENDPOINTS
|
|
||||||
# - secretKey: AWS_SECRET_ACCESS_KEY
|
|
||||||
# remoteRef:
|
|
||||||
# key: secrets/longhorn/backup
|
|
||||||
# property: AWS_SECRET_ACCESS_KEY
|
|
||||||
@@ -1,192 +0,0 @@
|
|||||||
longhorn:
|
|
||||||
global:
|
|
||||||
cattle:
|
|
||||||
systemDefaultRegistry: ""
|
|
||||||
|
|
||||||
image:
|
|
||||||
longhorn:
|
|
||||||
engine:
|
|
||||||
repository: longhornio/longhorn-engine
|
|
||||||
manager:
|
|
||||||
repository: longhornio/longhorn-manager
|
|
||||||
ui:
|
|
||||||
repository: longhornio/longhorn-ui
|
|
||||||
instanceManager:
|
|
||||||
repository: longhornio/longhorn-instance-manager
|
|
||||||
shareManager:
|
|
||||||
repository: longhornio/longhorn-share-manager
|
|
||||||
backingImageManager:
|
|
||||||
repository: longhornio/backing-image-manager
|
|
||||||
csi:
|
|
||||||
attacher:
|
|
||||||
repository: longhornio/csi-attacher
|
|
||||||
provisioner:
|
|
||||||
repository: longhornio/csi-provisioner
|
|
||||||
nodeDriverRegistrar:
|
|
||||||
repository: longhornio/csi-node-driver-registrar
|
|
||||||
resizer:
|
|
||||||
repository: longhornio/csi-resizer
|
|
||||||
snapshotter:
|
|
||||||
repository: longhornio/csi-snapshotter
|
|
||||||
pullPolicy: Always
|
|
||||||
|
|
||||||
service:
|
|
||||||
ui:
|
|
||||||
type: ClusterIP
|
|
||||||
nodePort: null
|
|
||||||
manager:
|
|
||||||
type: ClusterIP
|
|
||||||
nodePort: ""
|
|
||||||
loadBalancerIP: ""
|
|
||||||
loadBalancerSourceRanges: ""
|
|
||||||
|
|
||||||
persistence:
|
|
||||||
defaultClass: true
|
|
||||||
defaultFsType: ext4
|
|
||||||
defaultClassReplicaCount: 3
|
|
||||||
defaultDataLocality: disabled # best-effort otherwise
|
|
||||||
reclaimPolicy: Retain
|
|
||||||
migratable: false
|
|
||||||
recurringJobSelector:
|
|
||||||
enable: true
|
|
||||||
jobList: '[
|
|
||||||
{
|
|
||||||
"name":"backup",
|
|
||||||
"task":"backup",
|
|
||||||
"cron":"0 0 * * ?",
|
|
||||||
"retain":24
|
|
||||||
}
|
|
||||||
]'
|
|
||||||
backingImage:
|
|
||||||
enable: false
|
|
||||||
name: ~
|
|
||||||
dataSourceType: ~
|
|
||||||
dataSourceParameters: ~
|
|
||||||
expectedChecksum: ~
|
|
||||||
|
|
||||||
csi:
|
|
||||||
kubeletRootDir: ~
|
|
||||||
attacherReplicaCount: ~
|
|
||||||
provisionerReplicaCount: ~
|
|
||||||
resizerReplicaCount: ~
|
|
||||||
snapshotterReplicaCount: ~
|
|
||||||
|
|
||||||
defaultSettings:
|
|
||||||
backupTarget: S3://longhorn-infra@us-east-1/
|
|
||||||
backupTargetCredentialSecret: longhorn-backup-token-secret
|
|
||||||
allowRecurringJobWhileVolumeDetached: ~
|
|
||||||
createDefaultDiskLabeledNodes: ~
|
|
||||||
defaultDataPath: ~
|
|
||||||
defaultDataLocality: ~
|
|
||||||
replicaSoftAntiAffinity: ~
|
|
||||||
replicaAutoBalance: ~
|
|
||||||
storageOverProvisioningPercentage: ~
|
|
||||||
storageMinimalAvailablePercentage: ~
|
|
||||||
upgradeChecker: ~
|
|
||||||
defaultReplicaCount: ~
|
|
||||||
defaultLonghornStaticStorageClass: longhorn
|
|
||||||
backupstorePollInterval: ~
|
|
||||||
taintToleration: ~
|
|
||||||
systemManagedComponentsNodeSelector: ~
|
|
||||||
priorityClass: ~
|
|
||||||
autoSalvage: ~
|
|
||||||
autoDeletePodWhenVolumeDetachedUnexpectedly: ~
|
|
||||||
disableSchedulingOnCordonedNode: ~
|
|
||||||
replicaZoneSoftAntiAffinity: ~
|
|
||||||
nodeDownPodDeletionPolicy: ~
|
|
||||||
allowNodeDrainWithLastHealthyReplica: ~
|
|
||||||
mkfsExt4Parameters: ~
|
|
||||||
disableReplicaRebuild: ~
|
|
||||||
replicaReplenishmentWaitInterval: ~
|
|
||||||
concurrentReplicaRebuildPerNodeLimit: ~
|
|
||||||
disableRevisionCounter: ~
|
|
||||||
systemManagedPodsImagePullPolicy: ~
|
|
||||||
allowVolumeCreationWithDegradedAvailability: ~
|
|
||||||
autoCleanupSystemGeneratedSnapshot: ~
|
|
||||||
concurrentAutomaticEngineUpgradePerNodeLimit: ~
|
|
||||||
backingImageCleanupWaitInterval: ~
|
|
||||||
backingImageRecoveryWaitInterval: ~
|
|
||||||
guaranteedEngineManagerCPU: ~
|
|
||||||
guaranteedReplicaManagerCPU: ~
|
|
||||||
kubernetesClusterAutoscalerEnabled: ~
|
|
||||||
orphanAutoDeletion: ~
|
|
||||||
storageNetwork: ~
|
|
||||||
privateRegistry:
|
|
||||||
createSecret: ~
|
|
||||||
registryUrl: ~
|
|
||||||
registryUser: ~
|
|
||||||
registryPasswd: ~
|
|
||||||
registrySecret: ~
|
|
||||||
|
|
||||||
longhornManager:
|
|
||||||
priorityClass: ~
|
|
||||||
tolerations: []
|
|
||||||
## If you want to set tolerations for Longhorn Manager DaemonSet, delete the `[]` in the line above
|
|
||||||
## and uncomment this example block
|
|
||||||
# - key: "key"
|
|
||||||
# operator: "Equal"
|
|
||||||
# value: "value"
|
|
||||||
# effect: "NoSchedule"
|
|
||||||
nodeSelector: {}
|
|
||||||
## If you want to set node selector for Longhorn Manager DaemonSet, delete the `{}` in the line above
|
|
||||||
## and uncomment this example block
|
|
||||||
# label-key1: "label-value1"
|
|
||||||
# label-key2: "label-value2"
|
|
||||||
|
|
||||||
longhornDriver:
|
|
||||||
priorityClass: ~
|
|
||||||
tolerations: []
|
|
||||||
## If you want to set tolerations for Longhorn Driver Deployer Deployment, delete the `[]` in the line above
|
|
||||||
## and uncomment this example block
|
|
||||||
# - key: "key"
|
|
||||||
# operator: "Equal"
|
|
||||||
# value: "value"
|
|
||||||
# effect: "NoSchedule"
|
|
||||||
nodeSelector: {}
|
|
||||||
## If you want to set node selector for Longhorn Driver Deployer Deployment, delete the `{}` in the line above
|
|
||||||
## and uncomment this example block
|
|
||||||
# label-key1: "label-value1"
|
|
||||||
# label-key2: "label-value2"
|
|
||||||
|
|
||||||
longhornUI:
|
|
||||||
priorityClass: ~
|
|
||||||
tolerations: []
|
|
||||||
## If you want to set tolerations for Longhorn UI Deployment, delete the `[]` in the line above
|
|
||||||
## and uncomment this example block
|
|
||||||
# - key: "key"
|
|
||||||
# operator: "Equal"
|
|
||||||
# value: "value"
|
|
||||||
# effect: "NoSchedule"
|
|
||||||
nodeSelector: {}
|
|
||||||
## If you want to set node selector for Longhorn UI Deployment, delete the `{}` in the line above
|
|
||||||
## and uncomment this example block
|
|
||||||
# label-key1: "label-value1"
|
|
||||||
# label-key2: "label-value2"
|
|
||||||
|
|
||||||
resources: {}
|
|
||||||
# We usually recommend not to specify default resources and to leave this as a conscious
|
|
||||||
# choice for the user. This also increases chances charts run on environments with little
|
|
||||||
# resources, such as Minikube. If you do want to specify resources, uncomment the following
|
|
||||||
# lines, adjust them as necessary, and remove the curly braces after 'resources:'.
|
|
||||||
# limits:
|
|
||||||
# cpu: 100m
|
|
||||||
# memory: 128Mi
|
|
||||||
# requests:
|
|
||||||
# cpu: 100m
|
|
||||||
# memory: 128Mi
|
|
||||||
#
|
|
||||||
|
|
||||||
ingress:
|
|
||||||
enabled: false
|
|
||||||
|
|
||||||
## Specify override namespace, specifically this is useful for using longhorn as sub-chart
|
|
||||||
## and its release namespace is not the `longhorn-system`
|
|
||||||
namespaceOverride: ""
|
|
||||||
|
|
||||||
# Annotations to add to the Longhorn Manager DaemonSet Pods. Optional.
|
|
||||||
annotations: {}
|
|
||||||
|
|
||||||
serviceAccount:
|
|
||||||
# Annotations to add to the service account
|
|
||||||
annotations: {}
|
|
||||||
|
|
||||||
@@ -1,17 +0,0 @@
|
|||||||
apiVersion: metallb.io/v1beta1
|
|
||||||
kind: IPAddressPool
|
|
||||||
metadata:
|
|
||||||
name: cheap
|
|
||||||
spec:
|
|
||||||
addresses:
|
|
||||||
- 192.168.12.130-192.168.12.140
|
|
||||||
---
|
|
||||||
apiVersion: metallb.io/v1beta1
|
|
||||||
kind: L2Advertisement
|
|
||||||
metadata:
|
|
||||||
name: pool
|
|
||||||
namespace: metallb-system
|
|
||||||
spec:
|
|
||||||
ipAddressPools:
|
|
||||||
- cheap
|
|
||||||
|
|
||||||
@@ -1,47 +0,0 @@
|
|||||||
traefik:
|
|
||||||
image:
|
|
||||||
registry: registry.durp.info
|
|
||||||
repository: traefik
|
|
||||||
pullPolicy: Always
|
|
||||||
|
|
||||||
deployment:
|
|
||||||
replicas: 3
|
|
||||||
revisionHistoryLimit: 1
|
|
||||||
|
|
||||||
ingressRoute:
|
|
||||||
dashboard:
|
|
||||||
enabled: true
|
|
||||||
|
|
||||||
additionalArguments:
|
|
||||||
- "--serversTransport.insecureSkipVerify=true"
|
|
||||||
- "--log.level=DEBUG"
|
|
||||||
- --experimental.plugins.jwt.moduleName=github.com/traefik-plugins/traefik-jwt-plugin
|
|
||||||
- --experimental.plugins.jwt.version=v0.7.0
|
|
||||||
|
|
||||||
autoscaling:
|
|
||||||
enabled: true
|
|
||||||
minReplicas: 3
|
|
||||||
maxReplicas: 10
|
|
||||||
metrics:
|
|
||||||
- type: Resource
|
|
||||||
resource:
|
|
||||||
name: cpu
|
|
||||||
target:
|
|
||||||
type: Utilization
|
|
||||||
averageUtilization: 80
|
|
||||||
behavior:
|
|
||||||
scaleDown:
|
|
||||||
stabilizationWindowSeconds: 300
|
|
||||||
policies:
|
|
||||||
- type: Pods
|
|
||||||
value: 1
|
|
||||||
periodSeconds: 60
|
|
||||||
|
|
||||||
|
|
||||||
# -- [Resources](https://kubernetes.io/docs/concepts/configuration/manage-resources-containers/) for `traefik` container.
|
|
||||||
resources:
|
|
||||||
requests:
|
|
||||||
cpu: "100m"
|
|
||||||
memory: "512Mi"
|
|
||||||
limits:
|
|
||||||
memory: "512Mi"
|
|
||||||
@@ -1,12 +0,0 @@
|
|||||||
apiVersion: v2
|
|
||||||
name: vault
|
|
||||||
description: A Helm chart for Kubernetes
|
|
||||||
type: application
|
|
||||||
version: 0.0.1
|
|
||||||
appVersion: 0.0.1
|
|
||||||
|
|
||||||
dependencies:
|
|
||||||
- name: vault
|
|
||||||
repository: https://helm.releases.hashicorp.com
|
|
||||||
version: 0.29.1
|
|
||||||
|
|
||||||
@@ -1,100 +0,0 @@
|
|||||||
vault:
|
|
||||||
global:
|
|
||||||
enabled: true
|
|
||||||
tlsDisable: false
|
|
||||||
resources:
|
|
||||||
requests:
|
|
||||||
memory: 256Mi
|
|
||||||
cpu: 250m
|
|
||||||
limits:
|
|
||||||
memory: 256Mi
|
|
||||||
cpu: 250m
|
|
||||||
|
|
||||||
server:
|
|
||||||
image:
|
|
||||||
repository: "hashicorp/vault"
|
|
||||||
# These Resource Limits are in line with node requirements in the
|
|
||||||
# Vault Reference Architecture for a Small Cluster
|
|
||||||
#resources:
|
|
||||||
# requests:
|
|
||||||
# memory: 8Gi
|
|
||||||
# cpu: 2000m
|
|
||||||
# limits:
|
|
||||||
# memory: 16Gi
|
|
||||||
# cpu: 2000m
|
|
||||||
|
|
||||||
# For HA configuration and because we need to manually init the vault,
|
|
||||||
# we need to define custom readiness/liveness Probe settings
|
|
||||||
readinessProbe:
|
|
||||||
enabled: true
|
|
||||||
path: "/v1/sys/health?standbyok=true&sealedcode=204&uninitcode=204"
|
|
||||||
livenessProbe:
|
|
||||||
enabled: true
|
|
||||||
path: "/v1/sys/health?standbyok=true"
|
|
||||||
initialDelaySeconds: 60
|
|
||||||
|
|
||||||
# extraEnvironmentVars is a list of extra environment variables to set with the stateful set. These could be
|
|
||||||
# used to include variables required for auto-unseal.
|
|
||||||
extraEnvironmentVars:
|
|
||||||
VAULT_CACERT: /vault/userconfig/vault-server-tls/vault.ca
|
|
||||||
|
|
||||||
volumes:
|
|
||||||
- name: userconfig-vault-server-tls
|
|
||||||
secret:
|
|
||||||
defaultMode: 420
|
|
||||||
secretName: vault-server-tls
|
|
||||||
|
|
||||||
volumeMounts:
|
|
||||||
- mountPath: /vault/userconfig/vault-server-tls
|
|
||||||
name: userconfig-vault-server-tls
|
|
||||||
readOnly: true
|
|
||||||
|
|
||||||
# This configures the Vault Statefulset to create a PVC for audit logs.
|
|
||||||
# See https://www.vaultproject.io/docs/audit/index.html to know more
|
|
||||||
auditStorage:
|
|
||||||
enabled: true
|
|
||||||
|
|
||||||
standalone:
|
|
||||||
enabled: false
|
|
||||||
|
|
||||||
# Run Vault in "HA" mode.
|
|
||||||
ha:
|
|
||||||
enabled: true
|
|
||||||
replicas: 3
|
|
||||||
raft:
|
|
||||||
enabled: true
|
|
||||||
setNodeId: true
|
|
||||||
|
|
||||||
config: |
|
|
||||||
ui = true
|
|
||||||
cluster_name = "vault-integrated-storage"
|
|
||||||
listener "tcp" {
|
|
||||||
address = "[::]:8200"
|
|
||||||
cluster_address = "[::]:8201"
|
|
||||||
tls_cert_file = "/vault/userconfig/vault-server-tls/vault.crt"
|
|
||||||
tls_key_file = "/vault/userconfig/vault-server-tls/vault.key"
|
|
||||||
tls_client_ca_file = "/vault/userconfig/vault-server-tls/vault.ca"
|
|
||||||
}
|
|
||||||
|
|
||||||
storage "raft" {
|
|
||||||
path = "/vault/data"
|
|
||||||
retry_join {
|
|
||||||
leader_api_addr = "https://vault-0.vault-internal:8200"
|
|
||||||
leader_ca_cert_file = "/vault/userconfig/vault-server-tls/vault.ca"
|
|
||||||
leader_client_cert_file = "/vault/userconfig/vault-server-tls/vault.crt"
|
|
||||||
leader_client_key_file = "/vault/userconfig/vault-server-tls/vault.ca"
|
|
||||||
}
|
|
||||||
retry_join {
|
|
||||||
leader_api_addr = "https://vault-1.vault-internal:8200"
|
|
||||||
leader_ca_cert_file = "/vault/userconfig/vault-server-tls/vault.ca"
|
|
||||||
leader_client_cert_file = "/vault/userconfig/vault-server-tls/vault.crt"
|
|
||||||
leader_client_key_file = "/vault/userconfig/vault-server-tls/vault.ca"
|
|
||||||
}
|
|
||||||
}
|
|
||||||
|
|
||||||
# Vault UI
|
|
||||||
ui:
|
|
||||||
enabled: true
|
|
||||||
serviceType: "LoadBalancer"
|
|
||||||
serviceNodePort: null
|
|
||||||
externalPort: 8200
|
|
||||||
@@ -7,9 +7,9 @@ spec:
|
|||||||
issuerRef:
|
issuerRef:
|
||||||
name: letsencrypt-production
|
name: letsencrypt-production
|
||||||
kind: ClusterIssuer
|
kind: ClusterIssuer
|
||||||
commonName: "api.durp.info"
|
commonName: "api.prd.durp.info"
|
||||||
dnsNames:
|
dnsNames:
|
||||||
- "api.durp.info"
|
- "api.prd.durp.info"
|
||||||
|
|
||||||
---
|
---
|
||||||
|
|
||||||
@@ -21,7 +21,7 @@ spec:
|
|||||||
entryPoints:
|
entryPoints:
|
||||||
- websecure
|
- websecure
|
||||||
routes:
|
routes:
|
||||||
- match: Host(`api.durp.info`) && PathPrefix(`/`)
|
- match: Host(`api.prd.durp.info`) && PathPrefix(`/`)
|
||||||
kind: Rule
|
kind: Rule
|
||||||
services:
|
services:
|
||||||
- name: krakend-service
|
- name: krakend-service
|
||||||
@@ -37,10 +37,10 @@ apiVersion: v1
|
|||||||
metadata:
|
metadata:
|
||||||
name: api-external-dns
|
name: api-external-dns
|
||||||
annotations:
|
annotations:
|
||||||
external-dns.alpha.kubernetes.io/hostname: api.durp.info
|
external-dns.alpha.kubernetes.io/hostname: api.prd.durp.info
|
||||||
spec:
|
spec:
|
||||||
type: ExternalName
|
type: ExternalName
|
||||||
externalName: durp.info
|
externalName:.prd.durp.info
|
||||||
|
|
||||||
---
|
---
|
||||||
|
|
||||||
@@ -49,7 +49,7 @@ apiVersion: v1
|
|||||||
metadata:
|
metadata:
|
||||||
name: api-developer-dns
|
name: api-developer-dns
|
||||||
annotations:
|
annotations:
|
||||||
external-dns.alpha.kubernetes.io/hostname: developer.durp.info
|
external-dns.alpha.kubernetes.io/hostname: developer.prd.durp.info
|
||||||
external-dns.alpha.kubernetes.io/cloudflare-proxied: "false"
|
external-dns.alpha.kubernetes.io/cloudflare-proxied: "false"
|
||||||
spec:
|
spec:
|
||||||
type: ExternalName
|
type: ExternalName
|
||||||
@@ -9,4 +9,4 @@ appVersion: "1.16.0"
|
|||||||
dependencies:
|
dependencies:
|
||||||
- name: kube-prometheus-stack
|
- name: kube-prometheus-stack
|
||||||
repository: https://prometheus-community.github.io/helm-charts
|
repository: https://prometheus-community.github.io/helm-charts
|
||||||
version: 63.1.0
|
version: 40.5.0
|
||||||
@@ -6,7 +6,7 @@ spec:
|
|||||||
entryPoints:
|
entryPoints:
|
||||||
- websecure
|
- websecure
|
||||||
routes:
|
routes:
|
||||||
- match: Host(`grafana.durp.info`) && PathPrefix(`/`)
|
- match: Host(`grafana.prd.durp.info`) && PathPrefix(`/`)
|
||||||
kind: Rule
|
kind: Rule
|
||||||
services:
|
services:
|
||||||
- name: grafana
|
- name: grafana
|
||||||
@@ -25,9 +25,9 @@ spec:
|
|||||||
issuerRef:
|
issuerRef:
|
||||||
name: letsencrypt-production
|
name: letsencrypt-production
|
||||||
kind: ClusterIssuer
|
kind: ClusterIssuer
|
||||||
commonName: "grafana.durp.info"
|
commonName: "grafana.prd.durp.info"
|
||||||
dnsNames:
|
dnsNames:
|
||||||
- "grafana.durp.info"
|
- "grafana.prd.durp.info"
|
||||||
|
|
||||||
---
|
---
|
||||||
|
|
||||||
@@ -39,7 +39,7 @@ spec:
|
|||||||
entryPoints:
|
entryPoints:
|
||||||
- websecure
|
- websecure
|
||||||
routes:
|
routes:
|
||||||
- match: Host(`alertmanager.durp.info`) && PathPrefix(`/`)
|
- match: Host(`alertmanager.prd.durp.info`) && PathPrefix(`/`)
|
||||||
middlewares:
|
middlewares:
|
||||||
- name: whitelist
|
- name: whitelist
|
||||||
namespace: traefik
|
namespace: traefik
|
||||||
@@ -63,9 +63,9 @@ spec:
|
|||||||
issuerRef:
|
issuerRef:
|
||||||
name: letsencrypt-production
|
name: letsencrypt-production
|
||||||
kind: ClusterIssuer
|
kind: ClusterIssuer
|
||||||
commonName: "alertmanager.durp.info"
|
commonName: "alertmanager.prd.durp.info"
|
||||||
dnsNames:
|
dnsNames:
|
||||||
- "alertmanager.durp.info"
|
- "alertmanager.prd.durp.info"
|
||||||
|
|
||||||
---
|
---
|
||||||
|
|
||||||
@@ -74,7 +74,7 @@ apiVersion: v1
|
|||||||
metadata:
|
metadata:
|
||||||
name: grafana-external-dns
|
name: grafana-external-dns
|
||||||
annotations:
|
annotations:
|
||||||
external-dns.alpha.kubernetes.io/hostname: grafana.durp.info
|
external-dns.alpha.kubernetes.io/hostname: grafana.prd.durp.info
|
||||||
spec:
|
spec:
|
||||||
type: ExternalName
|
type: ExternalName
|
||||||
externalName: durp.info
|
externalName:.prd.durp.info
|
||||||
@@ -8,4 +8,4 @@ appVersion: 0.0.1
|
|||||||
dependencies:
|
dependencies:
|
||||||
- name: kubeclarity
|
- name: kubeclarity
|
||||||
repository: https://openclarity.github.io/kubeclarity
|
repository: https://openclarity.github.io/kubeclarity
|
||||||
version: 2.23.3
|
version: 2.22.0
|
||||||
@@ -6,7 +6,7 @@ spec:
|
|||||||
entryPoints:
|
entryPoints:
|
||||||
- websecure
|
- websecure
|
||||||
routes:
|
routes:
|
||||||
- match: Host(`kubeclarity.durp.info`) && PathPrefix(`/`)
|
- match: Host(`kubeclarity.prd.durp.info`) && PathPrefix(`/`)
|
||||||
middlewares:
|
middlewares:
|
||||||
- name: whitelist
|
- name: whitelist
|
||||||
namespace: traefik
|
namespace: traefik
|
||||||
@@ -30,9 +30,9 @@ spec:
|
|||||||
issuerRef:
|
issuerRef:
|
||||||
name: letsencrypt-production
|
name: letsencrypt-production
|
||||||
kind: ClusterIssuer
|
kind: ClusterIssuer
|
||||||
commonName: "kubeclarity.durp.info"
|
commonName: "kubeclarity.prd.durp.info"
|
||||||
dnsNames:
|
dnsNames:
|
||||||
- "kubeclarity.durp.info"
|
- "kubeclarity.prd.durp.info"
|
||||||
|
|
||||||
---
|
---
|
||||||
|
|
||||||
@@ -41,7 +41,7 @@ apiVersion: v1
|
|||||||
metadata:
|
metadata:
|
||||||
name: kubeclarity-external-dns
|
name: kubeclarity-external-dns
|
||||||
annotations:
|
annotations:
|
||||||
external-dns.alpha.kubernetes.io/hostname: kubeclarity.durp.info
|
external-dns.alpha.kubernetes.io/hostname: kubeclarity.prd.durp.info
|
||||||
spec:
|
spec:
|
||||||
type: ExternalName
|
type: ExternalName
|
||||||
externalName: durp.info
|
externalName:.prd.durp.info
|
||||||
@@ -6,7 +6,7 @@ spec:
|
|||||||
entryPoints:
|
entryPoints:
|
||||||
- websecure
|
- websecure
|
||||||
routes:
|
routes:
|
||||||
- match: Host(`links.durp.info`) && PathPrefix(`/`)
|
- match: Host(`links.prd.durp.info`) && PathPrefix(`/`)
|
||||||
kind: Rule
|
kind: Rule
|
||||||
services:
|
services:
|
||||||
- name: littlelink
|
- name: littlelink
|
||||||
@@ -25,9 +25,9 @@ spec:
|
|||||||
issuerRef:
|
issuerRef:
|
||||||
name: letsencrypt-production
|
name: letsencrypt-production
|
||||||
kind: ClusterIssuer
|
kind: ClusterIssuer
|
||||||
commonName: "links.durp.info"
|
commonName: "links.prd.durp.info"
|
||||||
dnsNames:
|
dnsNames:
|
||||||
- "links.durp.info"
|
- "links.prd.durp.info"
|
||||||
|
|
||||||
---
|
---
|
||||||
|
|
||||||
@@ -36,7 +36,7 @@ apiVersion: v1
|
|||||||
metadata:
|
metadata:
|
||||||
name: links-external-dns
|
name: links-external-dns
|
||||||
annotations:
|
annotations:
|
||||||
external-dns.alpha.kubernetes.io/hostname: links.durp.info
|
external-dns.alpha.kubernetes.io/hostname: links.prd.durp.info
|
||||||
spec:
|
spec:
|
||||||
type: ExternalName
|
type: ExternalName
|
||||||
externalName: durp.info
|
externalName:.prd.durp.info
|
||||||
Some files were not shown because too many files have changed in this diff Show More
Reference in New Issue
Block a user