This is for troubleshooting/fixing redis that is already running or failing to start.
This is necessary because the PVC is RW once
affinity:
podAffinity:
requiredDuringSchedulingIgnoredDuringExecution:
This is from https://stackoverflow.com/a/67700916/93940
Original author: https://stackoverflow.com/users/362377/conrado
repos: | |
- repo: local | |
hooks: | |
- id: prevent-commits-to-default-branch | |
name: prevent commits to default branch | |
entry: prevent-commits-to-default-branch.sh | |
language: script | |
require_serial: true |
<Project Sdk="Microsoft.NET.Sdk"> | |
<PropertyGroup> | |
<TargetFramework>netstandard2.0</TargetFramework> | |
<RootNamespace>Demos.OAS.Client</RootNamespace> | |
<GenerateAssemblyInfo>true</GenerateAssemblyInfo> | |
<FileVersion>0.1.0.0</FileVersion> | |
<LangVersion>latest</LangVersion> | |
<GeneratePackageOnBuild>true</GeneratePackageOnBuild> | |
<Version>0.1.0</Version> |
kubectl get REPLACE_WITH_KIND -o name | xargs -n1 kubectl patch --type merge --patch '{"metadata":{"finalizers":null}}' |
The username/networks/ip
under spec.configuration.users was the key to getting things to work.
It seems that "10.0.0.0/16" isn't enough.
Allowing all networks solved the problem.
Secrets can be mounted to environment variables under the extraEnvs
key.
{{- if empty .Values.manualSecretName }} | |
apiVersion: v1 | |
kind: Secret | |
metadata: | |
name: "jwt-secret" | |
annotations: | |
"helm.sh/resource-policy": "keep" | |
type: Opaque | |
data: | |
# retrieve the secret data using lookup function and when not exists, return an empty dictionary / map as result |
### Keybase proof | |
I hereby claim: | |
* I am stand-sure on github. | |
* I am stand_sure (https://keybase.io/stand_sure) on keybase. | |
* I have a public key ASCyW_dmVCsEDjWTcomieNrIhS2NJrkfRyww-S2qFc7K2Ao | |
To claim this, I am signing this object: |