Skip to content

Instantly share code, notes, and snippets.

View papanito's full-sized avatar

Adrian Wyssmann papanito

View GitHub Profile
@papanito
papanito / ansible-galaxy-find-role-id.sh
Last active June 28, 2023 15:02 — forked from pavlov99/ansible-galaxy-find-role-id.sh
Find your role's id in ansible-galaxy
$ ansible-galaxy role info YourUser.RoleName | grep -E 'id: [0-9]' | awk {'print $2'}
@papanito
papanito / rancher-k3s-rke-rke2-max-pods.md
Created June 23, 2023 06:42 — forked from rosskirkpat/rancher-k3s-rke-rke2-max-pods.md
Configure max pods for RKE, RKE2, and k3s clusters

How to configure max pods for the SUSE Rancher Kubernetes distributions

Considerations when Increasing the Max Pod Count

Changing the max-pods on an active cluster with workloads is generally a safe procedure when target number of max-pods is <=250. When the goal number of max-pods is >250, the additional considerations mentioned above require a deletion of all currently running pods.

If increasing max-pods to >250, there are additional considerations and changes required. The in-cluster IP management configuration needs to be modified as the default is a /16 split into one /24 for each node in the cluster. This comes to a limit of about 256 nodes with roughly 253 pods per node.

--max-pods int32 Default: 110
# Cloudflare for Teams ECC Certificate Authority
-----BEGIN CERTIFICATE-----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@papanito
papanito / doomemacs.install.md
Last active October 14, 2022 14:29
Braindump some stuff

I currently have to use Windows hence [Cygwin]. In addition, I am sitting behine a corporate proxy. So gitconfig is configured to use the proxy for outoing connections. Plus, as we also have self-signe certificates which are in the credentials store of the Windows host, the sslBackend has to be configured accordingly. So my .gitconfig looks like this:

[http "https://github.com"]
    proxy = http://:@webproxy.intra:8888
[http "https://git.savannah.gnu.org"]
    proxy = http://:@webproxy.intra:8888
sslBackend = schannel
@papanito
papanito / kubernetes-node
Last active January 20, 2022 12:18
draw-io shapes as extension do office/servers
<shape aspect="variable" h="56.75" name="Database Server Blue" strokewidth="inherit" w="42.74">
<connections />
<foreground>
<image x="20" y="30" w="20" h="20" src="data:image/svg+xml;base64,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
Found the answer to getting copy/paste working in Windows 10 KVM here:
http://blogs.nologin.es/rickyepoderi/index.php?/archives/87-Copy-n-Paste-in-KVM.html
Solution was to run installer in this ISO (do not have url, sorry, I think Google can find it)
virtio-win-0.1.126.iso
Download latest spice tools from here: https://www.spice-space.org/download/binaries/spice-guest-tools/ and install it.
@papanito
papanito / ironfeed.json
Last active February 3, 2021 13:44
ttrss feediron config
{
"heise.de\/developer": {
"type": "xpath",
"xpath": "article[contains(@class, 'si-detail')]",
"cleanup": [
"p[contains(@class,'news_datum')]",
"div[contains(@class,'readspeakerr')]",
"h1[contains(@class,'clear')]",
"noscript",
"comment()",
@papanito
papanito / rancher-argocd.md
Created June 11, 2020 05:55 — forked from janeczku/rancher-argocd.md
How to register Rancher managed Kubernetes clusters in Argo CD

How to register Rancher managed Kubernetes clusters in Argo CD

Registering Rancher managed clusters in Argo CD doesn't work out of the box unless the Authorized Cluster Endpoint is used. Many users will prefer an integration of Argo CD via the central Rancher authentication proxy (which shares the network endpoint of the Rancher API/GUI). So let's find out why registering clusters via Rancher auth proxy fails and how to make it work.

Hint: If you are just looking for the solution scroll to the bottom of this page.

Why do i get an error when running argocd cluster add?

Service Account tokens and the Rancher authentication proxy

@papanito
papanito / k8s-metricbeat.values.yaml
Last active June 9, 2020 11:58
An example `values.yaml` for installing `helm install k8s-metricbeat stable/metricbeat --namespace kube-system -f k8s-metricbeat.values.yaml`. It does not yet include shipping secret
# The instances created by daemonset retrieve most metrics from the host
daemonset:
enabled: true
podAnnotations: []
priorityClassName: ""
tolerations:
- key: node-role.kubernetes.io/master
operator: Exists
effect: NoSchedule
nodeSelector: {}
@papanito
papanito / resume.json
Created December 22, 2019 19:41
resume.json
h