fix: hccm and skooner
All checks were successful
continuous-integration/drone/push Build is passing

This commit is contained in:
Peter 2023-07-19 21:29:43 +02:00
parent 831a85436f
commit 965d3abf53
Signed by: prskr
GPG key ID: C1DB5D2E8DB512F9
8 changed files with 55 additions and 16 deletions

View file

@ -1,15 +1,15 @@
- name: Configure cluster
hosts: localhost
roles:
# - role: cifs-csi
# - role: skooner
# - role: coder
# - role: codimd
# - role: prometheus
# - role: postgres
- role: cifs-csi
- role: skooner
- role: coder
- role: codimd
- role: prometheus
- role: postgres
- role: hcloud
# - role: minio
# - role: gitea
# - role: drone
# - role: fider
# - role: nextcloud
- role: minio
- role: gitea
- role: drone
- role: fider
- role: nextcloud

View file

@ -53,5 +53,5 @@ coder:
name: coder-secrets
key: OIDC_CLIENT_SECRET
service:
type: ClusterIP
service:
type: ClusterIP

View file

@ -46,7 +46,8 @@ codimd:
username: preferred_username
displayName: name
email: email
nodeSelector:
kubernetes.io/arch: amd64
postgresql:

View file

@ -1,6 +1,8 @@
image:
tag: 1.8.3
replicaCount: 4
extraSecretNamesForEnvFrom:
- drone-runner-secrets

View file

@ -1,3 +1,7 @@
monitoring:
podMonitor:
enabled: true
enabled: true
networking:
enabled: true
clusterCIDR: 10.42.0.0/24

View file

@ -10,5 +10,7 @@ commonLabels:
resources:
- "resources/deployment.yaml"
- "resources/service.yaml"
- "resources/ingress.yaml"
- "resources/rbac/service_account.yaml"
- "resources/rbac/sa_token_secret.yaml"
- "resources/rbac/sa_token_secret.yaml"
- "resources/rbac/cluster_role_binding.yaml"

View file

@ -0,0 +1,17 @@
---
apiVersion: networking.k8s.io/v1
kind: Ingress
metadata:
name: skooner
spec:
rules:
- host: skooner.icb4dc0.de
http:
paths:
- path: /
backend:
service:
name: skooner
port:
number: 8000
pathType: Prefix

View file

@ -0,0 +1,13 @@
---
apiVersion: rbac.authorization.k8s.io/v1
kind: ClusterRoleBinding
metadata:
name: prskr-cluster-admin
subjects:
- kind: ServiceAccount
name: prskr
namespace: kube-system
roleRef:
kind: ClusterRole
name: cluster-admin
apiGroup: rbac.authorization.k8s.io