Skip to content

Instantly share code, notes, and snippets.

View timfpark's full-sized avatar
😀

Tim Park timfpark

😀
  • Microsoft Corporation
  • Aptos, California
View GitHub Profile
@timfpark
timfpark / backup.yaml
Created May 2, 2019 16:40
Velero daily backup
apiVersion: velero.io/v1
kind: Schedule
metadata:
name: daily-backup
namespace: velero
spec:
schedule: 0 1 * * *
template:
excludedNamespaces:
- pipeline
---
apiVersion: v1
data:
elasticsearch.yml: |-
cluster.name: elasticsearch
node.data: ${NODE_DATA:true}
node.master: ${NODE_MASTER:true}
node.ingest: ${NODE_INGEST:true}
node.name: ${HOSTNAME}
apiVersion: apps/v1beta1
kind: StatefulSet
metadata:
labels:
app: elasticsearch
chart: elasticsearch-1.17.0
component: master
heritage: Tiller
release: elasticsearch
name: elasticsearch-master
@timfpark
timfpark / pod-ip-mapping.log
Created December 5, 2018 23:06
Pod IP mapping
NAMESPACE NAME READY STATUS RESTARTS AGE IP NODE NOMINATED NODE
default jaeger-agent-daemonset-7lzwq 1/1 Running 1 7h 10.5.0.98 k8s-agents-18763741-1 <none>
default jaeger-agent-daemonset-7m9bp 1/1 Running 1 7h 10.5.0.23 k8s-agents-18763741-2 <none>
default jaeger-agent-daemonset-96bvj 1/1 Running 1 7h 10.5.0.86 k8s-agents-18763741-0 <none>
default jaeger-agent-daemonset-bgj58 1/1 Running 1 7h 10.5.0.37 k8s-agents-18763741-3 <none>
default jaeger-collector-6947f6cf6d-xhk8x 1/1 Running 3 5h 10.5.0.13 k8s-agents-18763741-2 <none>
default jaeger-operator-7786674d48-rj45q 1/1 Running 0 6h 10.5.0.117 k8s-agents-18763741-1 <
@timfpark
timfpark / linkerd2 logs
Created December 5, 2018 23:03
linkerd-proxy logs
This file has been truncated, but you can view the full file.
INFO linkerd2_proxy::app::main using controller at Some(Name(NameAddr { name: DnsName(DNSName("proxy-api.linkerd.svc.cluster.local")), port: 8086 }))
INFO linkerd2_proxy::app::main routing on V4(127.0.0.1:4140)
INFO linkerd2_proxy::app::main proxying on V4(0.0.0.0:4143) to None
INFO linkerd2_proxy::app::main serving Prometheus metrics on V4(0.0.0.0:4191)
INFO linkerd2_proxy::app::main protocol detection disabled for inbound ports {25, 3306}
INFO linkerd2_proxy::app::main protocol detection disabled for outbound ports {25, 3306}
TRCE linkerd2_proxy::dns DNS config: ResolverConfig { domain: None, search: [Name { is_fqdn: false, labels: [rhom, svc, cluster, local] }, Name { is_fqdn: false, labels: [svc, cluster, local] }, Name { is_fqdn: false, labels: [cluster, local] }, Name { is_fqdn: false, labels: [rlybng2oq25uhbf2psjmkrgyad, cx, internal, cloudapp, net] }], name_servers: NameServerConfigGroup([NameServerConfig { socket_addr: V4(10.0.0.10:53), protocol: Udp, tls_dns_name: None }, NameServerConfig { socket_a
@timfpark
timfpark / traefik3.log
Created December 5, 2018 23:02
Traefik ingress
This file has been truncated, but you can view the full file.
{"Request":"{\"Method\":\"GET\",\"URL\":{\"Scheme\":\"http\",\"Opaque\":\"\",\"User\":null,\"Host\":\"10.5.0.19:80\",\"Path\":\"\",\"RawPath\":\"\",\"ForceQuery\":false,\"RawQuery\":\"\",\"Fragment\":\"\"},\"Proto\":\"HTTP/1.1\",\"ProtoMajor\":1,\"ProtoMinor\":1,\"Header\":{\"Accept\":[\"application/json\"],\"Connection\":[\"close\"],\"Uber-Trace-Id\":[\"59e3f749b3824c29:7287df85f00a90e7:4b4693176dfad09f:1\"]},\"ContentLength\":0,\"TransferEncoding\":null,\"Host\":\"features.rhom.io\",\"Form\":null,\"PostForm\":null,\"MultipartForm\":null,\"Trailer\":null,\"RemoteAddr\":\"10.5.0.97:34728\",\"RequestURI\":\"/features/bbox/37.02338753714754/-121.904296875/37.02229110771148/-121.90292358398438\",\"TLS\":null}","level":"debug","msg":"vulcand/oxy/forward: completed ServeHttp on request","time":"2018-12-05T22:50:57Z"}
{"level":"debug","msg":"Reporting span 59e3f749b3824c29:7287df85f00a90e7:4b4693176dfad09f:1","time":"2018-12-05T22:50:57Z"}
{"Request":"{\"Method\":\"GET\",\"URL\":{\"Scheme\":\"\",\"Opaque\":\"\",\"U
@timfpark
timfpark / traefik.logs
Created December 5, 2018 21:54
traefik debug level logs
This file has been truncated, but you can view the full file.
{"Request":"{\"Method\":\"POST\",\"URL\":{\"Scheme\":\"\",\"Opaque\":\"\",\"User\":null,\"Host\":\"\",\"Path\":\"/activities\",\"RawPath\":\"\",\"ForceQuery\":false,\"RawQuery\":\"\",\"Fragment\":\"\"},\"Proto\":\"HTTP/1.1\",\"ProtoMajor\":1,\"ProtoMinor\":1,\"Header\":{\"Accept\":[\"application/json\"],\"Accept-Encoding\":[\"gzip,deflate\"],\"Authorization\":[\"Bearer eyJ0eXAiOiJKV1QiLCJhbGciOiJIUzI1NiJ9.eyJpc3MiOiIxMzQ2NzIxODAyMzk2ODYiLCJpYXQiOjE0NzAyNDIwNjYsImV4cCI6NDMzNDcwMjQyMDY2fQ.i6XhZWCysI3UUnU_GPm3Sw7ETc9lVBl4A9T1rNRaN8Y\"],\"Connection\":[\"close\"],\"Content-Length\":[\"784\"],\"Content-Type\":[\"application/json\"],\"User-Agent\":[\"node-fetch/1.0 (+https://github.com/bitinn/node-fetch)\"]},\"ContentLength\":784,\"TransferEncoding\":null,\"Host\":\"location.rhom.io\",\"Form\":null,\"PostForm\":null,\"MultipartForm\":null,\"Trailer\":null,\"RemoteAddr\":\"10.5.0.97:45152\",\"RequestURI\":\"/activities\",\"TLS\":null}","level":"debug","msg":"vulcand/oxy/roundrobin/rr: begin ServeHttp on request","ti
@timfpark
timfpark / linkerd-proxy.log
Created December 5, 2018 21:50
linkerd-proxy trace level logs
This file has been truncated, but you can view the full file.
INFO linkerd2_proxy::app::main using controller at Some(Name(NameAddr { name: DnsName(DNSName("proxy-api.linkerd.svc.cluster.local")), port: 8086 }))
INFO linkerd2_proxy::app::main routing on V4(127.0.0.1:4140)
INFO linkerd2_proxy::app::main proxying on V4(0.0.0.0:4143) to None
INFO linkerd2_proxy::app::main serving Prometheus metrics on V4(0.0.0.0:4191)
INFO linkerd2_proxy::app::main protocol detection disabled for inbound ports {25, 3306}
INFO linkerd2_proxy::app::main protocol detection disabled for outbound ports {25, 3306}
TRCE linkerd2_proxy::dns DNS config: ResolverConfig { domain: None, search: [Name { is_fqdn: false, labels: [rhom, svc, cluster, local] }, Name { is_fqdn: false, labels: [svc, cluster, local] }, Name { is_fqdn: false, labels: [cluster, local] }, Name { is_fqdn: false, labels: [rlybng2oq25uhbf2psjmkrgyad, cx, internal, cloudapp, net] }], name_servers: NameServerConfigGroup([NameServerConfig { socket_addr: V4(10.0.0.10:53), protocol: Udp, tls_dns_name: None }, NameServerConfig { socket_a
> mapService@ start /app
> node server.js
INFO: server: map server listening on port: 80
::ffff:127.0.0.1 - - [18/Nov/2018:15:40:09 +0000] "GET /metrics HTTP/1.1" 200 - "-" "Prometheus/2.4.3"
::ffff:127.0.0.1 - - [18/Nov/2018:15:41:09 +0000] "GET /metrics HTTP/1.1" 200 - "-" "Prometheus/2.4.3"
::ffff:127.0.0.1 - - [18/Nov/2018:15:42:09 +0000] "GET /metrics HTTP/1.1" 200 - "-" "Prometheus/2.4.3"
::ffff:127.0.0.1 - - [18/Nov/2018:15:42:20 +0000] "GET /tile/16/34116/23608 HTTP/1.1" 200 - "https://rhom.io/search/44.85754199147864/7.370753288269044/16?who=all&what=activities" "Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_0) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/69.0.3497.100 Safari/537.36"
::ffff:127.0.0.1 - - [18/Nov/2018:15:42:20 +0000] "GET /tile/16/34116/23611 HTTP/1.1" 200 - "https://rhom.io/search/44.85754199147864/7.370753288269044/16?who=all&what=activities" "Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_0) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/69.0.3497.100 Safari/537.36"
This file has been truncated, but you can view the full file.
INFO linkerd2_proxy::app::main using controller at Some(Name(NameAddr { name: DnsName(DNSName("proxy-api.linkerd.svc.cluster.local")), port: 8086 }))
INFO linkerd2_proxy::app::main routing on V4(127.0.0.1:4140)
INFO linkerd2_proxy::app::main proxying on V4(0.0.0.0:4143) to None
INFO linkerd2_proxy::app::main serving Prometheus metrics on V4(0.0.0.0:4191)
INFO linkerd2_proxy::app::main protocol detection disabled for inbound ports {25, 3306}
INFO linkerd2_proxy::app::main protocol detection disabled for outbound ports {25, 3306}
TRCE linkerd2_proxy::dns DNS config: ResolverConfig { domain: None, search: [Name { is_fqdn: false, labels: [rhom, svc, cluster, local] }, Name { is_fqdn: false, labels: [svc, cluster, local] }, Name { is_fqdn: false, labels: [cluster, local] }, Name { is_fqdn: false, labels: [xzj02thcrv2etctmeyepkvx35e, cx, internal, cloudapp, net] }], name_servers: NameServerConfigGroup([NameServerConfig { socket_addr: V4(10.0.0.10:53), protocol: Udp, tls_dns_name: None }, NameServerConfig { socket_a