Skip to content

Instantly share code, notes, and snippets.

View lwolf's full-sized avatar

Sergii Nuzhdin lwolf

View GitHub Profile
kubectl exec -it agola-gateway-pod /bin/bash
# add gitea
root$ agola remotesource create \
--name gitea \
--type gitea \
--api-url https://gitea.yourdomain.com \
--auth-type oauth2 \
--clientid $GITEA_APP_CLIENTID \
--secret $GITEA_APP_CLIENTSECRET \
--token $ADMIN_TOKEN \
@lwolf
lwolf / keybase.md
Last active September 19, 2019 18:53

Keybase proof

I hereby claim:

  • I am lwolf on github.
  • I am lwolf (https://keybase.io/lwolf) on keybase.
  • I have a public key whose fingerprint is E57E 72C7 E772 3858 8B8E 6C10 9ABA E27A C00C 66EE

To claim this, I am signing this object:

apiVersion: networking.istio.io/v1alpha3
kind: Gateway
metadata:
name: service-gw
namespace: istio-system
spec:
selector:
istio: ingressgateway
servers:
- port:
istio-ingressgateway:
secretVolumes:
...
- name: example-com-certs
secretName: example-com-certs
mountPath: /etc/istio/example-com-certs
...
apiVersion: certmanager.k8s.io/v1alpha1
kind: Certificate
metadata:
name: example-com
spec:
secretName: example-com-certs
issuerRef:
name: letsencrypt-live
kind: ClusterIssuer
commonName: '*.example.com'
apiVersion: networking.istio.io/v1alpha3
kind: VirtualService
metadata:
name: grafana
spec:
hosts:
- grafana.example.com
gateways:
- service-gw.default
http:
apiVersion: networking.istio.io/v1alpha3
kind: Gateway
metadata:
name: service-gw
namespace: default
spec:
selector:
istio: ingressgateway
servers:
- port:
apiVersion: extensions/v1beta1
kind: Ingress
metadata:
annotations:
kubernetes.io/ingress.class: nginx
NAME                     TYPE           CLUSTER-IP      EXTERNAL-IP     PORT(S)                                                      AGE
grafana                  ClusterIP      10.233.47.239   <none>          3000/TCP                                                      1h
istio-citadel            ClusterIP      10.233.52.66    <none>          8060/TCP,15014/TCP                                           1h
istio-egressgateway      ClusterIP      10.233.39.186   <none>          80/TCP,443/TCP,15443/TCP                                     1h
istio-galley             ClusterIP      10.233.6.227    <none>          443/TCP,15014/TCP,9901/TCP                                   1h
istio-ingress            LoadBalancer   10.233.29.116   192.168.11.122   80:32000/TCP,443:32256/TCP                                   1h
istio-ingressgateway     LoadBalancer   10.233.37.74    192.168.11.121   80:31380/TCP,443:31390/TCP                                   1h

istio-pilot ClusterIP

$ kubectl get pods -n istio-system
grafana-d5d58cb7-fchjq                    1/1       Running     0          20h
istio-citadel-c4489d577-wlwdh             1/1       Running     0          20h
istio-egressgateway-5d4dd5f974-84btz      1/1       Running     0          20h
istio-galley-57586fbc4-wgp55              1/1       Running     0          20h
istio-ingress-6bf7fd96bd-v4s28            1/1       Running     0          20h
istio-ingressgateway-6469b49cf-75pnb      1/1       Running     0          20h
istio-pilot-5d76999bfc-lthr5              2/2       Running     0          20h
istio-policy-5684c685cb-5qphq             2/2       Running     4          20h

istio-sidecar-injector-58dff7458d-cqbhd 1/1 Running 0 20h