|
|
hace 3 años | |
|---|---|---|
| blog-kaisers-info | hace 3 años | |
| cloud-kaisers-info | hace 3 años | |
| docs | hace 3 años | |
| gitops-kaisers-info | hace 3 años | |
| longhorn-kaisers-info | hace 3 años | |
| services-kaisers-info | hace 3 años | |
| .DS_Store | hace 3 años | |
| .gitignore | hace 3 años | |
| README.md | hace 3 años | |
| application-blog-kaisers-info.yaml | hace 3 años | |
| application-cloud-kaisers-info.yaml | hace 3 años | |
| application-gitops-kaisers-info.yaml | hace 3 años | |
| application-longhorn-kaisers-info.yaml | hace 3 años | |
| application-services-kaisers-info.yaml | hace 3 años | |
| secret-authentik-kaisers-info-secrets.yaml | hace 3 años |
All services deployed for kaisers.info as GitOps-capable k8s deployment
curl -sfL https://get.k3s.io | sh -s - server --disable-local-storage
kubectl apply -f https://github.com/cert-manager/cert-manager/releases/download/v1.8.0/cert-manager.yaml
helm install -n argocd argo-cd argo/argo-cd --create-namespace
kubectl apply -n argocd -f https://raw.githubusercontent.com/argoproj-labs/applicationset/v0.3.0/manifests/install.yaml
// version must fit cert-manager in gitops-kaisers-info
kubectl -n argocd get secret argocd-initial-admin-secret -o jsonpath="{.data.password}" | base64 -d
kubectl apply -f application-longhorn-kaisers-info.yaml
kubectl apply -f application-gitops-kaisers-info.yaml
https://github.com/bitnami-labs/sealed-secrets/blob/main/docs/bring-your-own-certificates.md
export PRIVATEKEY="k8-kaisers-info-sealedsecret.key"
export PUBLICKEY="k8-kaisers-info-sealedsecret.crt"
export NAMESPACE="sealed-secrets"
export SECRETNAME="k8-kaisers-info-sealedsecret"
openssl req -x509 -nodes -newkey rsa:4096 -keyout "$PRIVATEKEY" -out "$PUBLICKEY" -subj "/CN=sealed-secret/O=sealed-secret"
kubectl -n "$NAMESPACE" create secret tls "$SECRETNAME" --cert="$PUBLICKEY" --key="$PRIVATEKEY"
kubectl -n "$NAMESPACE" label secret "$SECRETNAME" sealedsecrets.bitnami.com/sealed-secrets-key=active
kubectl -n "$NAMESPACE" delete pod -l name=app.kubernetes.io/name=sealed-secrets
echo -n "PASSWORD" \
| kubectl create secret generic xxx --dry-run=client --from-file=KEY=/dev/stdin -o yaml \
| kubeseal --controller-namespace=sealed-secrets --controller-name=sealed-secrets --format yaml --merge-into ./secrets/authentik-kaisers-info-automated-install-sealed.yaml
kubectl apply -f sealed-secret.yaml
kubectl apply -f application-services-kaisers-info.yaml
kubectl apply -f application-cloud-kaisers-info.yaml
kubectl apply -f application-blog-kaisers-info.yaml
https://artifacthub.io/packages/helm/gitea/gitea helm repo add gitea https://dl.gitea.io/charts helm install -n gitea --create-namespace gitea gitea/gitea -f gitea/values.ymal
https://artifacthub.io/packages/helm/argo/argo-cd helm repo add argo https://argoproj.github.io/argo-helm helm install -n argocd --create-namespace argo-cd argo/argo-cd -f argo-cd/values.yaml
https://artifacthub.io/packages/helm/crossplane/crossplane helm repo add crossplane-stable https://charts.crossplane.io/stable helm install -n crossplane --create-namespace crossplane crossplane/crossplane -f crossplane/values.yaml
https://artifacthub.io/packages/helm/goauthentik/authentik helm repo add goauthentik https://charts.goauthentik.io/ helm install -n authentik --create-namespace authentik goauthentik/authentik -f authentik/values.yaml