fix: hccm and skooner
All checks were successful
continuous-integration/drone/push Build is passing

This commit is contained in:
Peter 2023-07-19 21:29:43 +02:00
parent 831a85436f
commit 965d3abf53
Signed by: prskr
GPG key ID: C1DB5D2E8DB512F9
8 changed files with 55 additions and 16 deletions

View file

@ -1,15 +1,15 @@
- name: Configure cluster - name: Configure cluster
hosts: localhost hosts: localhost
roles: roles:
# - role: cifs-csi - role: cifs-csi
# - role: skooner - role: skooner
# - role: coder - role: coder
# - role: codimd - role: codimd
# - role: prometheus - role: prometheus
# - role: postgres - role: postgres
- role: hcloud - role: hcloud
# - role: minio - role: minio
# - role: gitea - role: gitea
# - role: drone - role: drone
# - role: fider - role: fider
# - role: nextcloud - role: nextcloud

View file

@ -46,7 +46,8 @@ codimd:
username: preferred_username username: preferred_username
displayName: name displayName: name
email: email email: email
nodeSelector:
kubernetes.io/arch: amd64
postgresql: postgresql:

View file

@ -1,6 +1,8 @@
image: image:
tag: 1.8.3 tag: 1.8.3
replicaCount: 4
extraSecretNamesForEnvFrom: extraSecretNamesForEnvFrom:
- drone-runner-secrets - drone-runner-secrets

View file

@ -1,3 +1,7 @@
monitoring: monitoring:
podMonitor: podMonitor:
enabled: true enabled: true
networking:
enabled: true
clusterCIDR: 10.42.0.0/24

View file

@ -10,5 +10,7 @@ commonLabels:
resources: resources:
- "resources/deployment.yaml" - "resources/deployment.yaml"
- "resources/service.yaml" - "resources/service.yaml"
- "resources/ingress.yaml"
- "resources/rbac/service_account.yaml" - "resources/rbac/service_account.yaml"
- "resources/rbac/sa_token_secret.yaml" - "resources/rbac/sa_token_secret.yaml"
- "resources/rbac/cluster_role_binding.yaml"

View file

@ -0,0 +1,17 @@
---
apiVersion: networking.k8s.io/v1
kind: Ingress
metadata:
name: skooner
spec:
rules:
- host: skooner.icb4dc0.de
http:
paths:
- path: /
backend:
service:
name: skooner
port:
number: 8000
pathType: Prefix

View file

@ -0,0 +1,13 @@
---
apiVersion: rbac.authorization.k8s.io/v1
kind: ClusterRoleBinding
metadata:
name: prskr-cluster-admin
subjects:
- kind: ServiceAccount
name: prskr
namespace: kube-system
roleRef:
kind: ClusterRole
name: cluster-admin
apiGroup: rbac.authorization.k8s.io