Compare commits
41 Commits
f902f2c105
...
main
Author | SHA1 | Date | |
---|---|---|---|
aa6a14979d
|
|||
8b644bb4fc
|
|||
d53ae8082c | |||
d2e4b3dc6e | |||
e0743f2a68
|
|||
82d8eb59dc
|
|||
e6ebdfde7b
|
|||
16042a068d
|
|||
e150c253cc
|
|||
709a880973
|
|||
e93a85e4c6
|
|||
ce67724c52
|
|||
a246e3c4e9
|
|||
7b8f81b9f0
|
|||
6a7a733518
|
|||
39278c0d2d
|
|||
033d78746c
|
|||
40738f47c7
|
|||
f903ad4b70
|
|||
6cee062b6a
|
|||
77188e577d
|
|||
0037c7b06a
|
|||
452b589d26
|
|||
e980ab1860
|
|||
456eecace2
|
|||
e12c431362
|
|||
416f09fccf
|
|||
41912f685b
|
|||
03e8312568
|
|||
109ff161b6
|
|||
9f54cfcdfd
|
|||
7b715677c7
|
|||
213e9c0a25
|
|||
70bb994037
|
|||
7b61f80d34
|
|||
e45c1c547d
|
|||
c674d236c5
|
|||
e6614f80c9
|
|||
52346483e4
|
|||
b34fbd0b6f
|
|||
83bd27e4ae
|
@ -1,5 +0,0 @@
|
||||
---
|
||||
apiVersion: kustomize.config.k8s.io/v1beta1
|
||||
kind: Kustomization
|
||||
resources:
|
||||
- https://git.kill0.net/ryanc/kipunji/raw/branch/main/kustomize/kustomization.yaml
|
19
apps/kubernaut/ingress.yaml
Normal file
19
apps/kubernaut/ingress.yaml
Normal file
@ -0,0 +1,19 @@
|
||||
---
|
||||
apiVersion: networking.k8s.io/v1
|
||||
kind: Ingress
|
||||
metadata:
|
||||
annotations:
|
||||
kubernetes.io/ingress.class: traefik
|
||||
name: kubernaut-ingress
|
||||
namespace: kubernaut
|
||||
spec:
|
||||
rules:
|
||||
- http:
|
||||
paths:
|
||||
- path: /
|
||||
pathType: Prefix
|
||||
backend:
|
||||
service:
|
||||
name: kubernaut
|
||||
port:
|
||||
name: web
|
8
apps/kubernaut/kustomization.yaml
Normal file
8
apps/kubernaut/kustomization.yaml
Normal file
@ -0,0 +1,8 @@
|
||||
---
|
||||
apiVersion: kustomize.config.k8s.io/v1beta1
|
||||
kind: Kustomization
|
||||
namespace: kubernaut
|
||||
resources:
|
||||
- secrets.yaml
|
||||
- https://git.kill0.net/ryanc/kubernaut/kustomize?ref=v0.2.2
|
||||
- ingress.yaml
|
16
apps/kubernaut/secrets.yaml
Normal file
16
apps/kubernaut/secrets.yaml
Normal file
@ -0,0 +1,16 @@
|
||||
---
|
||||
apiVersion: bitnami.com/v1alpha1
|
||||
kind: SealedSecret
|
||||
metadata:
|
||||
creationTimestamp: null
|
||||
name: kubernaut
|
||||
namespace: kubernaut
|
||||
spec:
|
||||
encryptedData:
|
||||
jwt_secret: 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
|
||||
session_secret: AgB3+WGGt7x9Rn3ZcyP9z7xr1572aR1dLROI3815kj/98kJpvhIAjisWSfVQaaJRnLWaLBeWQgwIVQSFN7zcm7n4pYxVO4BqCwb/k3ZYJsUI5maR/meNnOvXrpp1+yKxmJXSHlh7/2WzzKUK9OwDT4qmoT2oJnjrKJNRoXvIbR42NTiO8CDtzHiJ6MNEY6oH+dra4GamJ/KjNXC7NUdSZSeq1HpOBudrsrYoCZ6MZxZfMsDG7ROHvIakcSN1ibfQwOjjucDJdZWm/L41cxgW3glvTql6cJtqa9yZpije2Wja1HUHGalnwaWyXFp/5jVpPgFGYZ4SHtyQOy5Hy275Gmee8qSQjvW8iLSor4/pXiEBArWRX0iPDqVudO9onMaYtQz+hz/MEXkhMvopfokrAyrSvUogrTq/1XfRABe1nAMXVrYo74w/27RiiBDEcoRzEra1f5UxrXHJ1B1LZ+iqTSRLrBw1iqPpOG7HDSSv80+m5OKai+ppptY3OcERF9HUA/BWeRHo7h2SbMfPRqVXXihtbgArCZoU570FryGfcHjwEffQIvKYKq/KjTcpRP0dTO/99mfY/Uw7VmdmYiQC4kG/kcxQ8yPgypQNl1YSfLnSBNZH1SRgXQAsY3hETZ74jbCyaPTvpoL/IVzTDo1YrBgTVjUcZoqYW+gwwj5bt9kQZFRL4FMsCNQ7V+wAtT9GmRNkf2cxbNawHknKYx4arGpWP0y6jorebaGzSpWPl8hY1jCipU2MZw2g7f9QVw+10Tik9FlzfkK457fR1pjBNRXlAe5e0MNfNNiuJtKfHZfbj32CNEEK7JZUumqkkUl1J+Lsa8vL3HvANxYgvhohNfJSY9D2G+DD8xbD2jk7P52150Y=
|
||||
template:
|
||||
metadata:
|
||||
creationTimestamp: null
|
||||
name: kubernaut
|
||||
namespace: kubernaut
|
@ -13,6 +13,65 @@ metadata:
|
||||
pod-security.kubernetes.io/warn-version: latest
|
||||
name: flux-system
|
||||
---
|
||||
apiVersion: networking.k8s.io/v1
|
||||
kind: NetworkPolicy
|
||||
metadata:
|
||||
labels:
|
||||
app.kubernetes.io/instance: flux-system
|
||||
app.kubernetes.io/part-of: flux
|
||||
app.kubernetes.io/version: v2.4.0
|
||||
name: allow-egress
|
||||
namespace: flux-system
|
||||
spec:
|
||||
egress:
|
||||
- {}
|
||||
ingress:
|
||||
- from:
|
||||
- podSelector: {}
|
||||
podSelector: {}
|
||||
policyTypes:
|
||||
- Ingress
|
||||
- Egress
|
||||
---
|
||||
apiVersion: networking.k8s.io/v1
|
||||
kind: NetworkPolicy
|
||||
metadata:
|
||||
labels:
|
||||
app.kubernetes.io/instance: flux-system
|
||||
app.kubernetes.io/part-of: flux
|
||||
app.kubernetes.io/version: v2.4.0
|
||||
name: allow-scraping
|
||||
namespace: flux-system
|
||||
spec:
|
||||
ingress:
|
||||
- from:
|
||||
- namespaceSelector: {}
|
||||
ports:
|
||||
- port: 8080
|
||||
protocol: TCP
|
||||
podSelector: {}
|
||||
policyTypes:
|
||||
- Ingress
|
||||
---
|
||||
apiVersion: networking.k8s.io/v1
|
||||
kind: NetworkPolicy
|
||||
metadata:
|
||||
labels:
|
||||
app.kubernetes.io/instance: flux-system
|
||||
app.kubernetes.io/part-of: flux
|
||||
app.kubernetes.io/version: v2.4.0
|
||||
name: allow-webhooks
|
||||
namespace: flux-system
|
||||
spec:
|
||||
ingress:
|
||||
- from:
|
||||
- namespaceSelector: {}
|
||||
podSelector:
|
||||
matchLabels:
|
||||
app: notification-controller
|
||||
policyTypes:
|
||||
- Ingress
|
||||
---
|
||||
apiVersion: v1
|
||||
kind: ResourceQuota
|
||||
metadata:
|
@ -20,7 +20,7 @@ metadata:
|
||||
namespace: flux-system
|
||||
spec:
|
||||
interval: 10m0s
|
||||
path: ./clusters/my-cluster
|
||||
path: ./clusters/k3s-cluster
|
||||
prune: true
|
||||
sourceRef:
|
||||
kind: GitRepository
|
@ -17,7 +17,7 @@ patches:
|
||||
- name: manager
|
||||
env:
|
||||
- name: "HTTPS_PROXY"
|
||||
value: "http://proxy-lb.lab.kill0.net:3128"
|
||||
value: "http://proxy-lb.lab.kill0.net.:3128"
|
||||
- name: "NO_PROXY"
|
||||
value: ".cluster.local.,.cluster.local,.svc,10.0.0.0/8,172.16.0.0/12,192.168.0.0/16"
|
||||
target:
|
@ -17,9 +17,9 @@ patches:
|
||||
- name: manager
|
||||
env:
|
||||
- name: "https_proxy"
|
||||
value: "http://proxy-lb.lab.kill0.net:3128"
|
||||
value: "http://proxy-lb.lab.kill0.net.:3128"
|
||||
- name: "no_proxy"
|
||||
value: ".svc, 10.0.0.0/8, 127.0.0.0/8, 172.16.0.0/12, 192.168.0.0/16, k8s-ctrl-lb.lab.kill0.net, localhost, registry.lab.kill0.net"
|
||||
value: ".cluster.local., .cluster.local, .svc, 10.0.0.0/8, 127.0.0.0/8, 172.16.0.0/12, 192.168.0.0/16, k8s-ctrl-lb.lab.kill0.net, localhost, registry.lab.kill0.net"
|
||||
target:
|
||||
kind: Deployment
|
||||
labelSelector: app.kubernetes.io/part-of=flux
|
||||
|
@ -1,37 +1,10 @@
|
||||
---
|
||||
apiVersion: kustomize.toolkit.fluxcd.io/v1
|
||||
kind: Kustomization
|
||||
metadata:
|
||||
name: infra-loadbalancer
|
||||
namespace: flux-system
|
||||
spec:
|
||||
interval: 1h
|
||||
retryInterval: 1m
|
||||
timeout: 5m
|
||||
sourceRef:
|
||||
kind: GitRepository
|
||||
name: flux-system
|
||||
path: ./infrastructure/loadbalancer
|
||||
prune: true
|
||||
wait: true
|
||||
patches:
|
||||
- patch: |
|
||||
- op: replace
|
||||
path: /spec/addresses
|
||||
value:
|
||||
- 10.100.101.0/28
|
||||
target:
|
||||
kind: IPAddressPool
|
||||
name: first-pool
|
||||
---
|
||||
apiVersion: kustomize.toolkit.fluxcd.io/v1
|
||||
kind: Kustomization
|
||||
metadata:
|
||||
name: infra-controllers
|
||||
namespace: flux-system
|
||||
spec:
|
||||
dependsOn:
|
||||
- name: infra-loadbalancer
|
||||
interval: 1h
|
||||
retryInterval: 1m
|
||||
timeout: 5m
|
||||
|
@ -0,0 +1,7 @@
|
||||
apiVersion: v1
|
||||
kind: ConfigMap
|
||||
metadata:
|
||||
name: kubevip
|
||||
namespace: kube-system
|
||||
data:
|
||||
cidr-global: 10.99.99.10-10.99.99.254
|
@ -0,0 +1,88 @@
|
||||
apiVersion: v1
|
||||
kind: ServiceAccount
|
||||
metadata:
|
||||
name: kube-vip-cloud-controller
|
||||
namespace: kube-system
|
||||
---
|
||||
apiVersion: rbac.authorization.k8s.io/v1
|
||||
kind: ClusterRole
|
||||
metadata:
|
||||
annotations:
|
||||
rbac.authorization.kubernetes.io/autoupdate: "true"
|
||||
name: system:kube-vip-cloud-controller-role
|
||||
rules:
|
||||
- apiGroups: ["coordination.k8s.io"]
|
||||
resources: ["leases"]
|
||||
verbs: ["get", "create", "update", "list", "put"]
|
||||
- apiGroups: [""]
|
||||
resources: ["configmaps", "endpoints","events","services/status", "leases"]
|
||||
verbs: ["*"]
|
||||
- apiGroups: [""]
|
||||
resources: ["nodes", "services"]
|
||||
verbs: ["list","get","watch","update"]
|
||||
---
|
||||
kind: ClusterRoleBinding
|
||||
apiVersion: rbac.authorization.k8s.io/v1
|
||||
metadata:
|
||||
name: system:kube-vip-cloud-controller-binding
|
||||
roleRef:
|
||||
apiGroup: rbac.authorization.k8s.io
|
||||
kind: ClusterRole
|
||||
name: system:kube-vip-cloud-controller-role
|
||||
subjects:
|
||||
- kind: ServiceAccount
|
||||
name: kube-vip-cloud-controller
|
||||
namespace: kube-system
|
||||
---
|
||||
apiVersion: apps/v1
|
||||
kind: Deployment
|
||||
metadata:
|
||||
name: kube-vip-cloud-provider
|
||||
namespace: kube-system
|
||||
spec:
|
||||
replicas: 1
|
||||
revisionHistoryLimit: 10
|
||||
selector:
|
||||
matchLabels:
|
||||
app: kube-vip
|
||||
component: kube-vip-cloud-provider
|
||||
strategy:
|
||||
rollingUpdate:
|
||||
maxSurge: 25%
|
||||
maxUnavailable: 25%
|
||||
type: RollingUpdate
|
||||
template:
|
||||
metadata:
|
||||
labels:
|
||||
app: kube-vip
|
||||
component: kube-vip-cloud-provider
|
||||
spec:
|
||||
containers:
|
||||
- command:
|
||||
- /kube-vip-cloud-provider
|
||||
- --leader-elect-resource-name=kube-vip-cloud-controller
|
||||
image: ghcr.io/kube-vip/kube-vip-cloud-provider:v0.0.11
|
||||
name: kube-vip-cloud-provider
|
||||
imagePullPolicy: Always
|
||||
dnsPolicy: ClusterFirst
|
||||
restartPolicy: Always
|
||||
terminationGracePeriodSeconds: 30
|
||||
serviceAccountName: kube-vip-cloud-controller
|
||||
tolerations:
|
||||
- key: node-role.kubernetes.io/master
|
||||
effect: NoSchedule
|
||||
- key: node-role.kubernetes.io/control-plane
|
||||
effect: NoSchedule
|
||||
affinity:
|
||||
nodeAffinity:
|
||||
preferredDuringSchedulingIgnoredDuringExecution:
|
||||
- weight: 10
|
||||
preference:
|
||||
matchExpressions:
|
||||
- key: node-role.kubernetes.io/control-plane
|
||||
operator: Exists
|
||||
- weight: 10
|
||||
preference:
|
||||
matchExpressions:
|
||||
- key: node-role.kubernetes.io/master
|
||||
operator: Exists
|
@ -1,7 +1,6 @@
|
||||
---
|
||||
apiVersion: kustomize.config.k8s.io/v1beta1
|
||||
kind: Kustomization
|
||||
namespace: kube-system
|
||||
resources:
|
||||
- repository.yaml
|
||||
- release.yaml
|
||||
- kube-vip-cloud-controller.yaml
|
||||
- configmap.yaml
|
71
clusters/k8s-cluster/kube-vip/daemonset.yaml
Normal file
71
clusters/k8s-cluster/kube-vip/daemonset.yaml
Normal file
@ -0,0 +1,71 @@
|
||||
apiVersion: apps/v1
|
||||
kind: DaemonSet
|
||||
metadata:
|
||||
creationTimestamp: null
|
||||
labels:
|
||||
app.kubernetes.io/name: kube-vip-ds
|
||||
app.kubernetes.io/version: v0.8.9
|
||||
name: kube-vip-ds
|
||||
namespace: kube-system
|
||||
spec:
|
||||
selector:
|
||||
matchLabels:
|
||||
app.kubernetes.io/name: kube-vip-ds
|
||||
template:
|
||||
metadata:
|
||||
creationTimestamp: null
|
||||
labels:
|
||||
app.kubernetes.io/name: kube-vip-ds
|
||||
app.kubernetes.io/version: v0.8.9
|
||||
spec:
|
||||
containers:
|
||||
- args:
|
||||
- manager
|
||||
env:
|
||||
- name: vip_arp
|
||||
value: "false"
|
||||
- name: port
|
||||
value: "6443"
|
||||
- name: vip_nodename
|
||||
valueFrom:
|
||||
fieldRef:
|
||||
fieldPath: spec.nodeName
|
||||
- name: vip_interface
|
||||
value: lo
|
||||
- name: bgp_routerinterface
|
||||
value: "eth0"
|
||||
- name: dns_mode
|
||||
value: first
|
||||
- name: svc_enable
|
||||
value: "true"
|
||||
- name: svc_leasename
|
||||
value: plndr-svcs-lock
|
||||
- name: bgp_enable
|
||||
value: "true"
|
||||
- name: bgp_routerid
|
||||
- name: bgp_as
|
||||
value: "4206942069"
|
||||
- name: bgp_peeraddress
|
||||
- name: bgp_peerpass
|
||||
- name: bgp_peeras
|
||||
value: "65000"
|
||||
- name: bgp_peers
|
||||
value: 10.100.100.1:4206942069::false
|
||||
- name: vip_address
|
||||
- name: vip_cidr
|
||||
value: "32"
|
||||
- name: prometheus_server
|
||||
value: :2112
|
||||
image: ghcr.io/kube-vip/kube-vip:v0.8.9
|
||||
imagePullPolicy: IfNotPresent
|
||||
name: kube-vip
|
||||
resources: {}
|
||||
securityContext:
|
||||
capabilities:
|
||||
add:
|
||||
- NET_ADMIN
|
||||
- NET_RAW
|
||||
hostNetwork: true
|
||||
serviceAccountName: kube-vip
|
||||
updateStrategy: {}
|
||||
|
6
clusters/k8s-cluster/kube-vip/kustomization.yaml
Normal file
6
clusters/k8s-cluster/kube-vip/kustomization.yaml
Normal file
@ -0,0 +1,6 @@
|
||||
---
|
||||
apiVersion: kustomize.config.k8s.io/v1beta1
|
||||
kind: Kustomization
|
||||
resources:
|
||||
- rbac.yaml
|
||||
- daemonset.yaml
|
45
clusters/k8s-cluster/kube-vip/rbac.yaml
Normal file
45
clusters/k8s-cluster/kube-vip/rbac.yaml
Normal file
@ -0,0 +1,45 @@
|
||||
apiVersion: v1
|
||||
kind: ServiceAccount
|
||||
metadata:
|
||||
name: kube-vip
|
||||
namespace: kube-system
|
||||
---
|
||||
apiVersion: rbac.authorization.k8s.io/v1
|
||||
kind: ClusterRole
|
||||
metadata:
|
||||
annotations:
|
||||
rbac.authorization.kubernetes.io/autoupdate: "true"
|
||||
name: system:kube-vip-role
|
||||
rules:
|
||||
- apiGroups: [""]
|
||||
resources: ["services/status"]
|
||||
verbs: ["update"]
|
||||
- apiGroups: [""]
|
||||
resources: ["services", "endpoints"]
|
||||
verbs: ["list","get","watch", "update"]
|
||||
- apiGroups: [""]
|
||||
resources: ["nodes"]
|
||||
verbs: ["list","get","watch", "update", "patch"]
|
||||
- apiGroups: ["coordination.k8s.io"]
|
||||
resources: ["leases"]
|
||||
verbs: ["list", "get", "watch", "update", "create"]
|
||||
- apiGroups: ["discovery.k8s.io"]
|
||||
resources: ["endpointslices"]
|
||||
verbs: ["list","get","watch", "update"]
|
||||
- apiGroups: [""]
|
||||
resources: ["pods"]
|
||||
verbs: ["list"]
|
||||
|
||||
---
|
||||
kind: ClusterRoleBinding
|
||||
apiVersion: rbac.authorization.k8s.io/v1
|
||||
metadata:
|
||||
name: system:kube-vip-binding
|
||||
roleRef:
|
||||
apiGroup: rbac.authorization.k8s.io
|
||||
kind: ClusterRole
|
||||
name: system:kube-vip-role
|
||||
subjects:
|
||||
- kind: ServiceAccount
|
||||
name: kube-vip
|
||||
namespace: kube-system
|
@ -1,7 +1,7 @@
|
||||
---
|
||||
apiVersion: kustomize.config.k8s.io/v1beta1
|
||||
kind: Kustomization
|
||||
namespace: goldpinger
|
||||
namespace: spegel
|
||||
resources:
|
||||
- namespace.yaml
|
||||
- repository.yaml
|
@ -2,4 +2,4 @@
|
||||
apiVersion: v1
|
||||
kind: Namespace
|
||||
metadata:
|
||||
name: goldpinger
|
||||
name: spegel
|
16
clusters/k8s-cluster/spegel/release.yaml
Normal file
16
clusters/k8s-cluster/spegel/release.yaml
Normal file
@ -0,0 +1,16 @@
|
||||
---
|
||||
apiVersion: helm.toolkit.fluxcd.io/v2beta1
|
||||
kind: HelmRelease
|
||||
metadata:
|
||||
name: spegel
|
||||
namespace: spegel
|
||||
spec:
|
||||
interval: 1m
|
||||
chart:
|
||||
spec:
|
||||
chart: spegel
|
||||
version: v0.0.30
|
||||
interval: 5m
|
||||
sourceRef:
|
||||
kind: HelmRepository
|
||||
name: spegel
|
10
clusters/k8s-cluster/spegel/repository.yaml
Normal file
10
clusters/k8s-cluster/spegel/repository.yaml
Normal file
@ -0,0 +1,10 @@
|
||||
---
|
||||
apiVersion: source.toolkit.fluxcd.io/v1beta2
|
||||
kind: HelmRepository
|
||||
metadata:
|
||||
name: spegel
|
||||
namespace: spegel
|
||||
spec:
|
||||
type: "oci"
|
||||
interval: 5m0s
|
||||
url: oci://ghcr.io/spegel-org/helm-charts
|
@ -1,21 +0,0 @@
|
||||
---
|
||||
apiVersion: helm.toolkit.fluxcd.io/v2
|
||||
kind: HelmRelease
|
||||
metadata:
|
||||
name: goldpinger
|
||||
namespace: goldpinger
|
||||
spec:
|
||||
chart:
|
||||
spec:
|
||||
chart: goldpinger
|
||||
sourceRef:
|
||||
kind: HelmRepository
|
||||
name: goldpinger
|
||||
interval: 50m
|
||||
install:
|
||||
remediation:
|
||||
retries: 3
|
||||
values:
|
||||
goldpinger:
|
||||
isArgoRollouts: true
|
||||
reloadStrategy: annotations
|
@ -1,9 +0,0 @@
|
||||
---
|
||||
apiVersion: source.toolkit.fluxcd.io/v1
|
||||
kind: HelmRepository
|
||||
metadata:
|
||||
name: goldpinger
|
||||
namespace: goldpinger
|
||||
spec:
|
||||
interval: 5m
|
||||
url: https://bloomberg.github.io/goldpinger
|
5
infrastructure/controllers/envoy-gateway/namespace.yaml
Normal file
5
infrastructure/controllers/envoy-gateway/namespace.yaml
Normal file
@ -0,0 +1,5 @@
|
||||
---
|
||||
apiVersion: v1
|
||||
kind: Namespace
|
||||
metadata:
|
||||
name: envoy-gateway-system
|
12
infrastructure/controllers/envoy-gateway/release.yaml
Normal file
12
infrastructure/controllers/envoy-gateway/release.yaml
Normal file
@ -0,0 +1,12 @@
|
||||
---
|
||||
apiVersion: helm.toolkit.fluxcd.io/v2
|
||||
kind: HelmRelease
|
||||
metadata:
|
||||
name: eg
|
||||
namespace: envoy-gateway-system
|
||||
spec:
|
||||
interval: 10m
|
||||
releaseName: eg
|
||||
chartRef:
|
||||
kind: OCIRepository
|
||||
name: envoy-gateway
|
11
infrastructure/controllers/envoy-gateway/repository.yaml
Normal file
11
infrastructure/controllers/envoy-gateway/repository.yaml
Normal file
@ -0,0 +1,11 @@
|
||||
---
|
||||
apiVersion: source.toolkit.fluxcd.io/v1beta2
|
||||
kind: OCIRepository
|
||||
metadata:
|
||||
name: envoy-gateway
|
||||
namespace: envoy-gateway-system
|
||||
spec:
|
||||
interval: 10m
|
||||
url: oci://docker.io/envoyproxy/gateway-helm
|
||||
ref:
|
||||
semver: ">=1.3.2"
|
@ -5,6 +5,5 @@ metadata:
|
||||
namespace: flagger-system
|
||||
spec:
|
||||
interval: 1h
|
||||
url: oci://registry.lab.kill0.net:5004/fluxcd/charts
|
||||
url: oci://ghcr.io/fluxcd/charts
|
||||
type: oci
|
||||
insecure: true
|
||||
|
@ -0,0 +1,5 @@
|
||||
---
|
||||
apiVersion: kustomize.config.k8s.io/v1beta1
|
||||
kind: Kustomization
|
||||
resources:
|
||||
- https://github.com/kubernetes-sigs/gateway-api/releases/download/v1.2.0/standard-install.yaml
|
@ -1,20 +0,0 @@
|
||||
---
|
||||
apiVersion: helm.toolkit.fluxcd.io/v2
|
||||
kind: HelmRelease
|
||||
metadata:
|
||||
name: kubelet-csr-approver
|
||||
namespace: kube-system
|
||||
spec:
|
||||
releaseName: kubelet-csr-approver
|
||||
chart:
|
||||
spec:
|
||||
chart: kubelet-csr-approver
|
||||
sourceRef:
|
||||
kind: HelmRepository
|
||||
name: kubelet-csr-approver
|
||||
values:
|
||||
providerRegex: ^(?:(?:kube|k[038]s))\d+$
|
||||
providerIpPrefixes: 10.100.100.0/24
|
||||
maxExpirationSeconds: 86400
|
||||
bypassDnsResolution: false
|
||||
interval: 1m
|
@ -1,9 +0,0 @@
|
||||
---
|
||||
apiVersion: source.toolkit.fluxcd.io/v1
|
||||
kind: HelmRepository
|
||||
metadata:
|
||||
name: kubelet-csr-approver
|
||||
namespace: kube-system
|
||||
spec:
|
||||
interval: 5m
|
||||
url: https://postfinance.github.io/kubelet-csr-approver
|
@ -2,4 +2,4 @@
|
||||
apiVersion: kustomize.config.k8s.io/v1beta1
|
||||
kind: Kustomization
|
||||
resources:
|
||||
- https://github.com/bitnami-labs/sealed-secrets/releases/download/v0.28.0/controller.yaml
|
||||
- https://github.com/bitnami-labs/sealed-secrets/releases/download/v0.29.0/controller.yaml
|
||||
|
@ -17,9 +17,6 @@ spec:
|
||||
remediation:
|
||||
retries: 3
|
||||
values:
|
||||
providers.kubernetesIngress.publishedService.enabled: true
|
||||
additionalArguments:
|
||||
- --providers.kubernetesingress.ingressendpoint.publishedservice=traefik/traefik
|
||||
service:
|
||||
spec:
|
||||
externalTrafficPolicy: Local
|
||||
ingressClass:
|
||||
enabled: true
|
||||
isDefaultClass: false
|
||||
|
Reference in New Issue
Block a user