mirror of
https://github.com/nold360/hive-apps
synced 2024-12-22 21:51:20 +00:00
add: projects/core
This commit is contained in:
parent
5787d3a88a
commit
c849edf0d3
8 changed files with 273 additions and 0 deletions
|
@ -86,8 +86,11 @@ spec:
|
|||
- heqet/values.yaml
|
||||
interval: 5m
|
||||
install:
|
||||
crds: CreateReplace
|
||||
remediation:
|
||||
retries: 3
|
||||
upgrade:
|
||||
crds: CreateReplace
|
||||
# We can overwrite some defaults here:
|
||||
values:
|
||||
server: https://kubernetes.default.svc
|
||||
|
|
62
projects/core/project.yml
Normal file
62
projects/core/project.yml
Normal file
|
@ -0,0 +1,62 @@
|
|||
config:
|
||||
description: Core Components for Kubernetes
|
||||
|
||||
apps:
|
||||
- name: cert-manager
|
||||
namespace: cert-manager
|
||||
repoURL: https://charts.jetstack.io
|
||||
chart: cert-manager
|
||||
targetRevision: v1.7.1
|
||||
parameters:
|
||||
- name: installCRDs
|
||||
value: 'true'
|
||||
secrets:
|
||||
- name: cert-manager-vault-approle
|
||||
keys:
|
||||
- secretId
|
||||
|
||||
- name: fast-storage
|
||||
namespace: fast-storage
|
||||
repoURL: https://github.com/rancher/local-path-provisioner
|
||||
path: deploy/chart
|
||||
syncWave: '0'
|
||||
parameters:
|
||||
- name: storageClass.name
|
||||
value: fast
|
||||
- name: nodePathMap[0].node
|
||||
value: DEFAULT_PATH_FOR_NON_LISTED_NODES
|
||||
- name: nodePathMap[0].paths[0]
|
||||
value: /var/lib/rancher/k3s/storage
|
||||
|
||||
- name: ssd-storage
|
||||
namespace: ssd-storage
|
||||
repoURL: https://github.com/rancher/local-path-provisioner
|
||||
path: deploy/chart
|
||||
syncWave: '0'
|
||||
parameters:
|
||||
- name: storageClass.name
|
||||
value: ssd
|
||||
- name: nodePathMap[0].node
|
||||
value: DEFAULT_PATH_FOR_NON_LISTED_NODES
|
||||
- name: nodePathMap[0].paths[0]
|
||||
value: /data/kubernetes/ssd
|
||||
|
||||
- name: metallb
|
||||
repoURL: https://charts.bitnami.com/bitnami
|
||||
chart: metallb
|
||||
namespace: metallb
|
||||
targetRevision: 2.5.16
|
||||
syncWave: '0'
|
||||
|
||||
- name: ingress-internal
|
||||
namespace: ingress-internal
|
||||
repoURL: https://helm.traefik.io/traefik
|
||||
chart: traefik
|
||||
targetRevision: 10.15.0
|
||||
syncWave: '0'
|
||||
|
||||
- name: cilium
|
||||
existingNamespace: kube-system
|
||||
repoURL: https://helm.cilium.io
|
||||
chart: cilium
|
||||
targetRevision: 1.11.2
|
41
projects/core/values/cilium.yaml
Normal file
41
projects/core/values/cilium.yaml
Normal file
|
@ -0,0 +1,41 @@
|
|||
---
|
||||
kubeProxyReplacement: strict
|
||||
hubble:
|
||||
relay:
|
||||
enabled: true
|
||||
|
||||
ui:
|
||||
enabled: true
|
||||
ingress:
|
||||
enabled: true
|
||||
className: ingress-internal-traefik
|
||||
annotations:
|
||||
cert-manager.io/cluster-issuer: vault-issuer
|
||||
traefik.ingress.kubernetes.io/router.tls: 'true'
|
||||
hosts:
|
||||
- cilium.dc
|
||||
tls:
|
||||
- secretName: cilium-dc-tls
|
||||
hosts:
|
||||
- cilium.dc
|
||||
|
||||
metrics:
|
||||
enabled:
|
||||
- dns:query;ignoreAAAA
|
||||
- drop
|
||||
- tcp
|
||||
- flow
|
||||
- icmp
|
||||
- http
|
||||
annotations:
|
||||
prometheus.io/scrape: "true"
|
||||
prometheus.io/port: "9091"
|
||||
|
||||
prometheus:
|
||||
enabled: true
|
||||
|
||||
operator:
|
||||
replicas: 1
|
||||
|
||||
hostServices:
|
||||
enabled: true
|
32
projects/core/values/ingress-internal.yaml
Normal file
32
projects/core/values/ingress-internal.yaml
Normal file
|
@ -0,0 +1,32 @@
|
|||
ingressClass:
|
||||
enabled: true
|
||||
isDefaultClass: true
|
||||
|
||||
providers:
|
||||
kubernetesCRD:
|
||||
ingressClass: traefik
|
||||
kubernetesIngress:
|
||||
publishedService:
|
||||
enabled: true
|
||||
|
||||
globalArguments: []
|
||||
|
||||
ports:
|
||||
web:
|
||||
redirectTo: websecure
|
||||
websecure:
|
||||
tls:
|
||||
enabled: true
|
||||
|
||||
service:
|
||||
enabled: true
|
||||
type: LoadBalancer
|
||||
annotations:
|
||||
metallb.universe.tf/address-pool: internal
|
||||
|
||||
externalIPs:
|
||||
- 192.168.1.11
|
||||
|
||||
logs:
|
||||
general:
|
||||
level: DEBUG
|
34
projects/core/values/metallb.yaml
Normal file
34
projects/core/values/metallb.yaml
Normal file
|
@ -0,0 +1,34 @@
|
|||
configInline:
|
||||
address-pools:
|
||||
- name: default
|
||||
protocol: layer2
|
||||
addresses:
|
||||
- 192.168.1.13/32
|
||||
- 192.168.1.14/32
|
||||
- 192.168.1.15/32
|
||||
- 192.168.1.16/32
|
||||
- 192.168.1.17/32
|
||||
- 192.168.1.18/32
|
||||
- 192.168.1.19/32
|
||||
- 192.168.1.20/32
|
||||
|
||||
- name: dns
|
||||
protocol: layer2
|
||||
addresses:
|
||||
- 192.168.1.53/32
|
||||
|
||||
- name: external
|
||||
protocol: layer2
|
||||
addresses:
|
||||
- 192.168.1.12/32
|
||||
|
||||
- name: internal
|
||||
protocol: layer2
|
||||
addresses:
|
||||
- 192.168.1.11/32
|
||||
|
||||
prometheus:
|
||||
serviceMonitor:
|
||||
enabled: true
|
||||
prometheusRule:
|
||||
enabled: true
|
14
projects/vault/project.yml
Normal file
14
projects/vault/project.yml
Normal file
|
@ -0,0 +1,14 @@
|
|||
config:
|
||||
description: Vault Secret Managemet
|
||||
apps:
|
||||
- name: vault
|
||||
repoURL: https://helm.releases.hashicorp.com
|
||||
chart: vault
|
||||
targetRevision: 0.19.0
|
||||
syncWave: '-3'
|
||||
- name: vault-secrets-operator
|
||||
namespace: vault-secrets-operator
|
||||
repoURL: https://ricoberger.github.io/helm-charts
|
||||
chart: vault-secrets-operator
|
||||
targetRevision: 1.16.5
|
||||
syncWave: '-2'
|
17
projects/vault/values/vault-secrets-operator.yaml
Normal file
17
projects/vault/values/vault-secrets-operator.yaml
Normal file
|
@ -0,0 +1,17 @@
|
|||
vault:
|
||||
address: "http://vault.vault.svc.cluster.local:8200"
|
||||
authMethod: kubernetes
|
||||
kubernetesRole: heqet-app
|
||||
namespaces: ""
|
||||
|
||||
crd:
|
||||
create: false
|
||||
|
||||
rbac:
|
||||
create: true
|
||||
createrole: true
|
||||
namespaced: false
|
||||
|
||||
serviceAccount:
|
||||
create: true
|
||||
name: vault-secrets-operator
|
70
projects/vault/values/vault.yaml
Normal file
70
projects/vault/values/vault.yaml
Normal file
|
@ -0,0 +1,70 @@
|
|||
global:
|
||||
enabled: true
|
||||
tlsDisable: true
|
||||
psp:
|
||||
enable: true
|
||||
|
||||
injector:
|
||||
enabled: false
|
||||
|
||||
server:
|
||||
enabled: true
|
||||
image:
|
||||
repository: "hashicorp/vault"
|
||||
tag: "1.9.4"
|
||||
auditStorage:
|
||||
accessMode: ReadWriteOnce
|
||||
annotations: {}
|
||||
enabled: false
|
||||
mountPath: /vault/audit
|
||||
size: 10Gi
|
||||
storageClass: null
|
||||
authDelegator:
|
||||
enabled: true
|
||||
dataStorage:
|
||||
accessMode: ReadWriteOnce
|
||||
annotations: {}
|
||||
enabled: true
|
||||
mountPath: /vault/data
|
||||
size: 10Gi
|
||||
storageClass: local-path
|
||||
dev:
|
||||
enabled: false
|
||||
ha:
|
||||
enabled: false
|
||||
|
||||
ingress:
|
||||
annotations:
|
||||
cert-manager.io/cluster-issuer: vault-issuer
|
||||
traefik.ingress.kubernetes.io/router.tls: 'true'
|
||||
enabled: true
|
||||
extraPaths: []
|
||||
hosts:
|
||||
- host: vault.dc
|
||||
paths: []
|
||||
labels: {}
|
||||
tls:
|
||||
- hosts:
|
||||
- vault.dc
|
||||
secretName: vault-tls
|
||||
|
||||
networkPolicy:
|
||||
egress: []
|
||||
enabled: true
|
||||
|
||||
standalone:
|
||||
enabled: true
|
||||
config: |
|
||||
ui = true
|
||||
|
||||
listener "tcp" {
|
||||
tls_disable = 1
|
||||
address = "[::]:8200"
|
||||
cluster_address = "[::]:8201"
|
||||
}
|
||||
storage "file" {
|
||||
path = "/vault/data"
|
||||
}
|
||||
|
||||
ui:
|
||||
enabled: true
|
Loading…
Reference in a new issue