Files
argocd
asterisk
bind
camtiler
cert-manager
cnpg-system
dragonfly-operator-system
elastic-system
etherpad
freescout
gitea
grafana
hackerspace
harbor
kube-system
kubernetes-dashboard
local-path-storage
logging
logmower
longhorn-system
metallb-system
minio-clusters
mongodb-operator
monitoring
mysql-clusters
nextcloud
nyancat
oidc-gateway
openebs
opensearch-operator
passmower
playground
postgres-clusters
prometheus-operator
redis-clusters
reloader
ripe87
rosdump
shared
README.md
backup-service.yml
mariadb.yml
memcached.yml
minio-support.yml
minio.yml
mongo.yml
mongoexpress.yml
networkpolicy-base.yml
signs
tigera-operator
traefik
whoami
whoami-oidc
wiki
wildduck
woodpecker
.gitignore
.yamllint
CLUSTER.md
CONTRIBUTORS.md
LICENSE.md
README.md
SLACK.md
cluster-role-bindings.yml
storage-class.yaml
kube/shared
2024-02-22 12:43:20 +02:00
..
2022-08-25 11:22:50 +03:00
2022-08-25 11:22:50 +03:00
2022-08-25 11:22:50 +03:00
2022-08-25 11:22:50 +03:00
2022-08-25 11:22:50 +03:00
2022-08-25 11:22:50 +03:00
2024-02-22 12:43:20 +02:00
2022-08-25 11:22:50 +03:00
2022-08-25 11:22:50 +03:00

KeyDB

KeyDB can be instantiated by symlinking the generated keydb.yml, in future this could be handled by an operator.

helm template keydb enapter/keydb --set persistentVolume.enabled=false > keydb.yml

To regenerate base network policies

It's quite odd there is no better way to generate these.

cat << EOF > networkpolicy-base.yml

apiVersion: networking.k8s.io/v1 kind: NetworkPolicy metadata: name: kubedns spec: podSelector: {} policyTypes:

  • Egress egress:
  • to:
    • namespaceSelector: matchLabels: kubernetes.io/metadata.name: kube-system ports:
    • protocol: UDP port: 53

apiVersion: networking.k8s.io/v1 kind: NetworkPolicy metadata: name: kubeprobe spec: podSelector: {} policyTypes:

  • Ingress ingress: EOF for j in $(kubectl get nodes -o json | jq '.items[] | .spec.podCIDR' -r | cut -d "/" -f 1 | sed -e 's/.0$/.1/32/' | xargs); do cat << EOF >> networkpolicy-base.yml
  • from:
    • ipBlock: cidr: $j EOF done

cat << EOF >> networkpolicy-base.yml

apiVersion: networking.k8s.io/v1 kind: NetworkPolicy metadata: name: kubeapi spec: podSelector: {} policyTypes:

  • Egress egress:
  • ports:
    • port: 6443 to: EOF for j in $(kubectl get ep -n default kubernetes -o json | jq '.subsets[].addresses[].ip' -r | xargs); do cat << EOF >> networkpolicy-base.yml
    • ipBlock: cidr: $j/32 EOF done