-
-
Save zlepper/0279b25b3f411b7b3b0380d8340dc088 to your computer and use it in GitHub Desktop.
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
~ pulumi:providers:cloudflare cloudflare-provider refreshing (0s) | |
~ pulumi:pulumi:Stack cluster_environments-cluster_d4bbb119-72df-40d6-ba8b-0e02df0140a2_northeurope refreshing (0s) | |
~ pulumi:providers:azure-native azure-provider refreshing (0s) | |
pulumi:providers:cloudflare cloudflare-provider | |
~ pulumi:providers:grafana grafana-cloud-provider refreshing (0s) | |
pulumi:providers:grafana grafana-cloud-provider | |
~ dgz:dgz:KubernetesCluster k8s refreshing (0s) | |
dgz:dgz:KubernetesCluster k8s | |
pulumi:pulumi:Stack cluster_environments-cluster_d4bbb119-72df-40d6-ba8b-0e02df0140a2_northeurope running | |
~ dgz:cloudflare:clusterdns cloudflare-dns refreshing (0s) | |
~ dgz:dgz:sftpgo sftpgo refreshing (0s) | |
pulumi:providers:azure-native azure-provider | |
dgz:cloudflare:clusterdns cloudflare-dns | |
dgz:dgz:sftpgo sftpgo | |
~ azure-native:resources:ResourceGroup resource-group refreshing (0s) | |
~ dgz:dgz:elastic-pool sql-server-pool-1d216d43-10f6-4a20-b706-6db215a81f13 refreshing (0s) | |
~ pulumi:providers:ec ec refreshing (0s) | |
~ dgz:dgz:elasticsearch elastic-stack-7dc0fc68-7d96-47c5-a5eb-5d185a302f2c refreshing (0s) | |
dgz:dgz:elasticsearch elastic-stack-7dc0fc68-7d96-47c5-a5eb-5d185a302f2c | |
dgz:dgz:elastic-pool sql-server-pool-1d216d43-10f6-4a20-b706-6db215a81f13 | |
pulumi:providers:ec ec | |
~ azure-native:sql:Server sql-server-pool-1d216d43-10f6-4a20-b706-6db215a81f13-server refreshing (0s) | |
~ azure-native:sql:ElasticPool sql-server-pool-1d216d43-10f6-4a20-b706-6db215a81f13-pool refreshing (0s) | |
~ ec:index:Deployment elastic-stack-7dc0fc68-7d96-47c5-a5eb-5d185a302f2c-elastic-stack refreshing (0s) | |
~ azure-native:network:Subnet cluster_main_subnet refreshing (0s) | |
~ azure-native:dbforpostgresql/v20221201:Server sftpgo-postgresql refreshing (0s) | |
~ azure-native:dbforpostgresql/v20221201:FirewallRule azure-internal-firewall refreshing (0s) | |
~ azure-native:dbforpostgresql/v20221201:Database sftpgo-database refreshing (0s) | |
~ azure-native:dbforpostgresql/v20221201:FirewallRule office-firewall refreshing (0s) | |
~ dgz:dgz:traefik traefik refreshing (0s) | |
dgz:dgz:traefik traefik | |
~ dgz:monitoring:kubernetes k8s-monitoring refreshing (0s) | |
dgz:monitoring:kubernetes k8s-monitoring | |
~ dgz:dgz:cluster-components cluster-components refreshing (0s) | |
~ dgz:dgz:Nats nats-cluster refreshing (0s) | |
dgz:dgz:cluster-components cluster-components | |
dgz:dgz:Nats nats-cluster | |
~ dgz:k8s:keda keda refreshing (0s) | |
~ dgz:dgz:RabbitMqCluster rabbitmq-cluster refreshing (0s) | |
dgz:dgz:RabbitMqCluster rabbitmq-cluster | |
~ dgz:monitoring:base basics refreshing (0s) | |
~ dgz:monitoring:metrics metrics refreshing (0s) | |
~ dgz:monitoring:grafana_cloud grafana-cloud refreshing (0s) | |
dgz:k8s:keda keda | |
dgz:monitoring:base basics | |
dgz:monitoring:metrics metrics | |
dgz:monitoring:grafana_cloud grafana-cloud | |
~ azure-native:containerservice:AgentPool third_party_pool refreshing (0s) | |
~ pulumi:providers:kubernetes k8s refreshing (0s) | |
~ azure-native:containerservice:AgentPool digibatch_pool refreshing (0s) | |
~ azure-native:containerservice:AgentPool windows_pool refreshing (0s) | |
pulumi:providers:kubernetes k8s | |
~ grafana:index:CloudAccessPolicy grafana-cloud_push_policy refreshing (0s) | |
~ azure-native:containerservice:ManagedCluster cluster refreshing (0s) | |
~ azure-native:network:Subnet digibatch_pool_subnet refreshing (0s) | |
~ azure-native:network:Subnet digizuite_core_pool_subnet refreshing (0s) | |
~ azure-native:containerservice:AgentPool digizuite_core_pool refreshing (0s) | |
~ dgz:monitoring:logs logs refreshing (0s) | |
dgz:monitoring:logs logs | |
~ kubernetes:core/v1:Namespace keda-namespace refreshing (0s) | |
~ azure-native:sql:VirtualNetworkRule sql-server-pool-1d216d43-10f6-4a20-b706-6db215a81f13-windows-pool-access refreshing (0s) | |
~ azure-native:network:Subnet third_party_pool_subnet refreshing (0s) | |
~ azure-native:sql:VirtualNetworkRule sql-server-pool-1d216d43-10f6-4a20-b706-6db215a81f13-digizuite-core-pool-access refreshing (0s) | |
~ kubernetes:core/v1:Namespace traefik refreshing (0s) | |
~ kubernetes:core/v1:Namespace basics_grafana refreshing (0s) | |
~ kubernetes:core/v1:Namespace rabbitmq-namespace refreshing (0s) | |
~ kubernetes:storage.k8s.io/v1:StorageClass traefik-certificate-storage refreshing (0s) | |
~ grafana:index:CloudAccessPolicyToken grafana-cloud_push_token refreshing (0s) | |
~ kubernetes:core/v1:Namespace nats-namespace refreshing (0s) | |
~ kubernetes:storage.k8s.io/v1:StorageClass digi-rabbitmq-cluster refreshing (0s) | |
~ kubernetes:core/v1:ConfigMap logs_grafana_agent_logs refreshing (0s) | |
~ kubernetes:core/v1:Secret logs_registry-credentials refreshing (0s) | |
~ kubernetes:core/v1:ServiceAccount basics_grafana_agent refreshing (0s) | |
~ kubernetes:core/v1:ConfigMap logs_grafana_agent_logs_windows refreshing (0s) | |
~ kubernetes:helm.sh/v3:Release sftpgo-chart refreshing (0s) | |
~ kubernetes:helm.sh/v3:Release digi-nats refreshing (0s) | |
~ kubernetes:rbac.authorization.k8s.io/v1:ClusterRole basics_grafana_agent refreshing (0s) | |
~ kubernetes:core/v1:Namespace sftpgo refreshing (0s) | |
~ kubernetes:rabbitmq.com/v1beta1:RabbitmqCluster digi-rabbitmq-cluster refreshing (0s) | |
~ kubernetes:sftpgo.digizuite.com/v1alpha1:SftpgoAdmin admin refreshing (0s) | |
~ kubernetes:helm.sh/v3:Release keda refreshing (0s) | |
~ kubernetes:traefik.containo.us/v1alpha1:IngressRouteTCP sftpgo-sftp-ingress refreshing (0s) | |
~ kubernetes:core/v1:Service metrics_grafana_agent refreshing (0s) | |
~ kubernetes:helm.sh/v3:Release traefik refreshing (0s) | |
~ kubernetes:rbac.authorization.k8s.io/v1:ClusterRoleBinding basics_grafana_agent refreshing (0s) | |
~ kubernetes:helm.sh/v3:Release metrics-kube-state-metrics refreshing (0s) | |
~ cloudflare:index:Record cloudflare-dns-cluster-dns refreshing (0s) | |
~ kubernetes:helm.sh/v3:Release digi-rabbitmq-cluster-operator refreshing (0s) | |
~ kubernetes:traefik.containo.us/v1alpha1:Middleware dgzcore-middleware refreshing (0s) | |
~ kubernetes:apps/v1:DaemonSet logs_grafana_agent_windows refreshing (0s) | |
~ kubernetes:core/v1:Service metrics_grafana_agent_traces refreshing (0s) | |
~ kubernetes:core/v1:ConfigMap metrics_grafana_agent refreshing (0s) | |
~ azure-native:network:Subnet windows_pool_subnet refreshing (0s) | |
~ kubernetes:networking.k8s.io/v1:Ingress sftpgo-web-ingress refreshing (0s) | |
~ kubernetes:sftpgo.digizuite.com/v1alpha1:SftpgoServer sftpgo refreshing (0s) | |
~ kubernetes:apps/v1:StatefulSet metrics_grafana_agent refreshing (0s) | |
~ kubernetes:apps/v1:DaemonSet logs_grafana_agent refreshing (0s) | |
@ Refreshing.... ~ kubernetes:core/v1:Service traefikLoadbalancer refreshing (0s) | |
~ azure-native:network:VirtualNetwork cluster_vnet refreshing (0s) | |
grafana:index:CloudAccessPolicy grafana-cloud_push_policy | |
grafana:index:CloudAccessPolicyToken grafana-cloud_push_token | |
azure-native:resources:ResourceGroup resource-group | |
kubernetes:helm.sh/v3:Release metrics-kube-state-metrics | |
kubernetes:helm.sh/v3:Release digi-nats | |
kubernetes:helm.sh/v3:Release sftpgo-chart | |
kubernetes:helm.sh/v3:Release digi-rabbitmq-cluster-operator | |
azure-native:sql:VirtualNetworkRule sql-server-pool-1d216d43-10f6-4a20-b706-6db215a81f13-windows-pool-access | |
kubernetes:helm.sh/v3:Release traefik | |
azure-native:sql:Server sql-server-pool-1d216d43-10f6-4a20-b706-6db215a81f13-server | |
azure-native:network:Subnet windows_pool_subnet | |
kubernetes:core/v1:ConfigMap logs_grafana_agent_logs | |
kubernetes:core/v1:Namespace basics_grafana | |
kubernetes:core/v1:Namespace sftpgo | |
kubernetes:core/v1:ServiceAccount basics_grafana_agent | |
kubernetes:core/v1:Namespace nats-namespace | |
kubernetes:core/v1:Namespace traefik | |
kubernetes:core/v1:Namespace keda-namespace | |
kubernetes:core/v1:Namespace rabbitmq-namespace | |
kubernetes:helm.sh/v3:Release keda | |
kubernetes:rbac.authorization.k8s.io/v1:ClusterRole basics_grafana_agent | |
kubernetes:sftpgo.digizuite.com/v1alpha1:SftpgoAdmin admin | |
kubernetes:rbac.authorization.k8s.io/v1:ClusterRoleBinding basics_grafana_agent | |
kubernetes:core/v1:ConfigMap logs_grafana_agent_logs_windows | |
kubernetes:traefik.containo.us/v1alpha1:IngressRouteTCP sftpgo-sftp-ingress | |
kubernetes:sftpgo.digizuite.com/v1alpha1:SftpgoServer sftpgo | |
kubernetes:storage.k8s.io/v1:StorageClass traefik-certificate-storage | |
kubernetes:core/v1:Secret logs_registry-credentials | |
kubernetes:traefik.containo.us/v1alpha1:Middleware dgzcore-middleware | |
kubernetes:storage.k8s.io/v1:StorageClass digi-rabbitmq-cluster | |
kubernetes:core/v1:ConfigMap metrics_grafana_agent | |
kubernetes:rabbitmq.com/v1beta1:RabbitmqCluster digi-rabbitmq-cluster | |
kubernetes:apps/v1:DaemonSet logs_grafana_agent_windows | |
kubernetes:apps/v1:DaemonSet logs_grafana_agent | |
azure-native:sql:ElasticPool sql-server-pool-1d216d43-10f6-4a20-b706-6db215a81f13-pool | |
azure-native:network:Subnet third_party_pool_subnet | |
azure-native:sql:VirtualNetworkRule sql-server-pool-1d216d43-10f6-4a20-b706-6db215a81f13-digizuite-core-pool-access | |
~ kubernetes:apps/v1:StatefulSet metrics_grafana_agent refreshing (0s) StatefulSet initialization complete | |
~ kubernetes:core/v1:Service traefikLoadbalancer refreshing (0s) Service initialization complete | |
~ kubernetes:core/v1:Service metrics_grafana_agent_traces refreshing (0s) Service initialization complete | |
~ kubernetes:core/v1:Service metrics_grafana_agent refreshing (0s) Service initialization complete | |
~ kubernetes:networking.k8s.io/v1:Ingress sftpgo-web-ingress refreshing (0s) Ingress initialization complete | |
kubernetes:apps/v1:StatefulSet metrics_grafana_agent StatefulSet initialization complete | |
azure-native:dbforpostgresql/v20221201:Database sftpgo-database | |
azure-native:dbforpostgresql/v20221201:Server sftpgo-postgresql | |
kubernetes:core/v1:Service traefikLoadbalancer Service initialization complete | |
kubernetes:core/v1:Service metrics_grafana_agent_traces Service initialization complete | |
kubernetes:core/v1:Service metrics_grafana_agent Service initialization complete | |
kubernetes:networking.k8s.io/v1:Ingress sftpgo-web-ingress Ingress initialization complete | |
azure-native:network:Subnet cluster_main_subnet | |
azure-native:network:Subnet digibatch_pool_subnet | |
cloudflare:index:Record cloudflare-dns-cluster-dns | |
azure-native:network:Subnet digizuite_core_pool_subnet | |
azure-native:network:VirtualNetwork cluster_vnet | |
@ Refreshing.... | |
azure-native:containerservice:AgentPool digibatch_pool | |
azure-native:containerservice:ManagedCluster cluster | |
azure-native:containerservice:AgentPool windows_pool | |
azure-native:containerservice:AgentPool digizuite_core_pool | |
azure-native:containerservice:AgentPool third_party_pool | |
azure-native:dbforpostgresql/v20221201:FirewallRule office-firewall | |
azure-native:dbforpostgresql/v20221201:FirewallRule azure-internal-firewall | |
ec:index:Deployment elastic-stack-7dc0fc68-7d96-47c5-a5eb-5d185a302f2c-elastic-stack | |
pulumi:pulumi:Stack cluster_environments-cluster_d4bbb119-72df-40d6-ba8b-0e02df0140a2_northeurope | |
Outputs: | |
DigizuiteCorePoolDigizuiteProductLabel: "digizuite-core" | |
DigizuiteCorePoolSubnetId : "/subscriptions/44eeb119-3e69-49bb-a61d-c476cd7e0de9/resourceGroups/dgz_k8s_d4bbb1/providers/Microsoft.Network/virtualNetworks/dgz-d4bbb11972df40d6ba8b0e02df0140a2/subnets/digizuite_core_pool_subnet" | |
ElasticSearchClusters : [secret] | |
ExternalDns : "digizuite-northeurope-d4bbb11972df40d6ba8b0e02df0140a2.rhdh.dk" | |
KubeConfig : [secret] | |
Location : "northeurope" | |
RabbitMqClusterName : "digi-rabbitmq-cluster" | |
RabbitMqClusterNamespace : "rabbitmq" | |
ResourceGroupName : "dgz_k8s_d4bbb1" | |
SqlElasticPools : { | |
1d216d43-10f6-4a20-b706-6db215a81f13: { | |
AzureId : "/subscriptions/44eeb119-3e69-49bb-a61d-c476cd7e0de9/resourceGroups/dgz_k8s_d4bbb1/providers/Microsoft.Sql/servers/pool-1d216d43-10f6-4a20-b706-6db215a81f13/elasticPools/pool-1d216d43-10f6-4a20-b706-6db215a81f13" | |
PoolId : "1d216d43-10f6-4a20-b706-6db215a81f13" | |
ServerFullyQualifiedDomainName: "pool-1d216d43-10f6-4a20-b706-6db215a81f13.database.windows.net" | |
ServerName : "pool-1d216d43-10f6-4a20-b706-6db215a81f13" | |
} | |
} | |
ThirdPartyPoolDigizuiteProductLabel : "third-party" | |
WindowsPoolSubnetId : "/subscriptions/44eeb119-3e69-49bb-a61d-c476cd7e0de9/resourceGroups/dgz_k8s_d4bbb1/providers/Microsoft.Network/virtualNetworks/dgz-d4bbb11972df40d6ba8b0e02df0140a2/subnets/windows_pool_subnet" | |
Resources: | |
78 unchanged | |
Duration: 2s | |
Previewing stack... | |
Previewing update (cluster_d4bbb119-72df-40d6-ba8b-0e02df0140a2_northeurope) | |
View Live: <redacted> | |
pulumi:pulumi:Stack: (same) | |
[urn=urn:pulumi:cluster_d4bbb119-72df-40d6-ba8b-0e02df0140a2_northeurope::cluster_environments::pulumi:pulumi:Stack::cluster_environments-cluster_d4bbb119-72df-40d6-ba8b-0e02df0140a2_northeurope] | |
+ azure-native:containerservice/v20230102preview:ManagedCluster: (create) 🔒 | |
[urn=urn:pulumi:cluster_d4bbb119-72df-40d6-ba8b-0e02df0140a2_northeurope::cluster_environments::dgz:dgz:KubernetesCluster$azure-native:containerservice/v20230102preview:ManagedCluster::cluster] | |
[provider=urn:pulumi:cluster_d4bbb119-72df-40d6-ba8b-0e02df0140a2_northeurope::cluster_environments::pulumi:providers:azure-native::azure-provider::5df398d3-ed0f-4f97-a8a1-4312993e162e] | |
agentPoolProfiles : [ | |
[0]: { | |
count : 1 | |
mode : "System" | |
name : "system" | |
vmSize : "Standard_B4ms" | |
vnetSubnetID: "/subscriptions/44eeb119-3e69-49bb-a61d-c476cd7e0de9/resourceGroups/dgz_k8s_d4bbb1/providers/Microsoft.Network/virtualNetworks/dgz-d4bbb11972df40d6ba8b0e02df0140a2/subnets/cluster_main_subnet" | |
} | |
] | |
autoScalerProfile : { | |
scaleDownDelayAfterAdd: "1m" | |
scaleDownUnneededTime : "1m" | |
} | |
autoUpgradeProfile: { | |
upgradeChannel: "stable" | |
} | |
dnsPrefix : "dgz-k8s-northeurope-d4bbb1" | |
enableRBAC : true | |
identity : { | |
type: "SystemAssigned" | |
} | |
kubernetesVersion : "1.25.5" | |
location : "northeurope" | |
networkProfile : { | |
dnsServiceIP : "10.0.0.10" | |
dockerBridgeCidr: "172.17.0.1/16" | |
networkPlugin : "azure" | |
outboundType : "loadBalancer" | |
podCidr : "10.244.0.0/16" | |
serviceCidr : "10.0.0.0/16" | |
} | |
resourceGroupName : "dgz_k8s_d4bbb1" | |
resourceName : "dgz_k8s_d4bbb1_cluster" | |
tags : { | |
CreatedBy : "local-rhdh" | |
RegionId : "d4bbb119-72df-40d6-ba8b-0e02df0140a2" | |
RegionName : "rhdh local cluster" | |
SubscriptionName: "Azure dev" | |
} | |
+-pulumi:providers:kubernetes: (replace) | |
[id=037b697f-66aa-4ee8-aa6f-8a8550f5d071] | |
[urn=urn:pulumi:cluster_d4bbb119-72df-40d6-ba8b-0e02df0140a2_northeurope::cluster_environments::pulumi:providers:kubernetes::k8s] | |
deleteUnreachable : "true" | |
enableServerSideApply: "true" | |
~ kubeconfig : [secret] => output<string> | |
version : "3.29.0" | |
+-azure-native:containerservice:AgentPool: (replace) | |
[id=/subscriptions/44eeb119-3e69-49bb-a61d-c476cd7e0de9/resourcegroups/dgz_k8s_d4bbb1/providers/Microsoft.ContainerService/managedClusters/dgz_k8s_d4bbb1_cluster/agentPools/digibatch] | |
[urn=urn:pulumi:cluster_d4bbb119-72df-40d6-ba8b-0e02df0140a2_northeurope::cluster_environments::dgz:dgz:KubernetesCluster$azure-native:containerservice:AgentPool::digibatch_pool] | |
[provider=urn:pulumi:cluster_d4bbb119-72df-40d6-ba8b-0e02df0140a2_northeurope::cluster_environments::pulumi:providers:azure-native::azure-provider::5df398d3-ed0f-4f97-a8a1-4312993e162e] | |
~ resourceName: "dgz_k8s_d4bbb1_cluster" => output<string> | |
+-azure-native:containerservice:AgentPool: (replace) | |
[id=/subscriptions/44eeb119-3e69-49bb-a61d-c476cd7e0de9/resourcegroups/dgz_k8s_d4bbb1/providers/Microsoft.ContainerService/managedClusters/dgz_k8s_d4bbb1_cluster/agentPools/digicore] | |
[urn=urn:pulumi:cluster_d4bbb119-72df-40d6-ba8b-0e02df0140a2_northeurope::cluster_environments::dgz:dgz:KubernetesCluster$azure-native:containerservice:AgentPool::digizuite_core_pool] | |
[provider=urn:pulumi:cluster_d4bbb119-72df-40d6-ba8b-0e02df0140a2_northeurope::cluster_environments::pulumi:providers:azure-native::azure-provider::5df398d3-ed0f-4f97-a8a1-4312993e162e] | |
~ resourceName: "dgz_k8s_d4bbb1_cluster" => output<string> | |
+-azure-native:containerservice:AgentPool: (replace) | |
[id=/subscriptions/44eeb119-3e69-49bb-a61d-c476cd7e0de9/resourcegroups/dgz_k8s_d4bbb1/providers/Microsoft.ContainerService/managedClusters/dgz_k8s_d4bbb1_cluster/agentPools/thirdparty] | |
[urn=urn:pulumi:cluster_d4bbb119-72df-40d6-ba8b-0e02df0140a2_northeurope::cluster_environments::dgz:dgz:KubernetesCluster$azure-native:containerservice:AgentPool::third_party_pool] | |
[provider=urn:pulumi:cluster_d4bbb119-72df-40d6-ba8b-0e02df0140a2_northeurope::cluster_environments::pulumi:providers:azure-native::azure-provider::5df398d3-ed0f-4f97-a8a1-4312993e162e] | |
~ resourceName: "dgz_k8s_d4bbb1_cluster" => output<string> | |
+-azure-native:containerservice:AgentPool: (replace) | |
[id=/subscriptions/44eeb119-3e69-49bb-a61d-c476cd7e0de9/resourcegroups/dgz_k8s_d4bbb1/providers/Microsoft.ContainerService/managedClusters/dgz_k8s_d4bbb1_cluster/agentPools/window] | |
[urn=urn:pulumi:cluster_d4bbb119-72df-40d6-ba8b-0e02df0140a2_northeurope::cluster_environments::dgz:dgz:KubernetesCluster$azure-native:containerservice:AgentPool::windows_pool] | |
[provider=urn:pulumi:cluster_d4bbb119-72df-40d6-ba8b-0e02df0140a2_northeurope::cluster_environments::pulumi:providers:azure-native::azure-provider::5df398d3-ed0f-4f97-a8a1-4312993e162e] | |
~ resourceName: "dgz_k8s_d4bbb1_cluster" => output<string> | |
+-kubernetes:core/v1:Namespace: (replace) | |
[id=grafana] | |
[urn=urn:pulumi:cluster_d4bbb119-72df-40d6-ba8b-0e02df0140a2_northeurope::cluster_environments::dgz:dgz:cluster-components$dgz:monitoring:kubernetes$dgz:monitoring:base$kubernetes:core/v1:Namespace::basics_grafana] | |
[provider: urn:pulumi:cluster_d4bbb119-72df-40d6-ba8b-0e02df0140a2_northeurope::cluster_environments::pulumi:providers:kubernetes::k8s::037b697f-66aa-4ee8-aa6f-8a8550f5d071 => urn:pulumi:cluster_d4bbb119-72df-40d6-ba8b-0e02df0140a2_northeurope::cluster_environments::pulumi:providers:kubernetes::k8s::output<string>] | |
apiVersion: "v1" | |
kind : "Namespace" | |
metadata : { | |
name: "grafana" | |
} | |
+-kubernetes:core/v1:Namespace: (replace) | |
[id=rabbitmq] | |
[urn=urn:pulumi:cluster_d4bbb119-72df-40d6-ba8b-0e02df0140a2_northeurope::cluster_environments::dgz:dgz:cluster-components$dgz:dgz:RabbitMqCluster$kubernetes:core/v1:Namespace::rabbitmq-namespace] | |
[provider: urn:pulumi:cluster_d4bbb119-72df-40d6-ba8b-0e02df0140a2_northeurope::cluster_environments::pulumi:providers:kubernetes::k8s::037b697f-66aa-4ee8-aa6f-8a8550f5d071 => urn:pulumi:cluster_d4bbb119-72df-40d6-ba8b-0e02df0140a2_northeurope::cluster_environments::pulumi:providers:kubernetes::k8s::output<string>] | |
apiVersion: "v1" | |
kind : "Namespace" | |
metadata : { | |
name: "rabbitmq" | |
} | |
+-kubernetes:core/v1:Namespace: (replace) | |
[id=traefik] | |
[urn=urn:pulumi:cluster_d4bbb119-72df-40d6-ba8b-0e02df0140a2_northeurope::cluster_environments::dgz:dgz:cluster-components$dgz:dgz:traefik$kubernetes:core/v1:Namespace::traefik] | |
[provider: urn:pulumi:cluster_d4bbb119-72df-40d6-ba8b-0e02df0140a2_northeurope::cluster_environments::pulumi:providers:kubernetes::k8s::037b697f-66aa-4ee8-aa6f-8a8550f5d071 => urn:pulumi:cluster_d4bbb119-72df-40d6-ba8b-0e02df0140a2_northeurope::cluster_environments::pulumi:providers:kubernetes::k8s::output<string>] | |
apiVersion: "v1" | |
kind : "Namespace" | |
metadata : { | |
name: "traefik" | |
} | |
+-kubernetes:core/v1:Namespace: (replace) | |
[id=keda] | |
[urn=urn:pulumi:cluster_d4bbb119-72df-40d6-ba8b-0e02df0140a2_northeurope::cluster_environments::dgz:dgz:cluster-components$dgz:k8s:keda$kubernetes:core/v1:Namespace::keda-namespace] | |
[provider: urn:pulumi:cluster_d4bbb119-72df-40d6-ba8b-0e02df0140a2_northeurope::cluster_environments::pulumi:providers:kubernetes::k8s::037b697f-66aa-4ee8-aa6f-8a8550f5d071 => urn:pulumi:cluster_d4bbb119-72df-40d6-ba8b-0e02df0140a2_northeurope::cluster_environments::pulumi:providers:kubernetes::k8s::output<string>] | |
apiVersion: "v1" | |
kind : "Namespace" | |
metadata : { | |
name: "keda" | |
} | |
+-kubernetes:core/v1:Namespace: (replace) | |
[id=nats] | |
[urn=urn:pulumi:cluster_d4bbb119-72df-40d6-ba8b-0e02df0140a2_northeurope::cluster_environments::dgz:dgz:cluster-components$dgz:dgz:Nats$kubernetes:core/v1:Namespace::nats-namespace] | |
[provider: urn:pulumi:cluster_d4bbb119-72df-40d6-ba8b-0e02df0140a2_northeurope::cluster_environments::pulumi:providers:kubernetes::k8s::037b697f-66aa-4ee8-aa6f-8a8550f5d071 => urn:pulumi:cluster_d4bbb119-72df-40d6-ba8b-0e02df0140a2_northeurope::cluster_environments::pulumi:providers:kubernetes::k8s::output<string>] | |
apiVersion: "v1" | |
kind : "Namespace" | |
metadata : { | |
name: "nats" | |
} | |
+-kubernetes:storage.k8s.io/v1:StorageClass: (replace) | |
[id=traefik-certificate-storage-362247d4] | |
[urn=urn:pulumi:cluster_d4bbb119-72df-40d6-ba8b-0e02df0140a2_northeurope::cluster_environments::dgz:dgz:cluster-components$dgz:dgz:traefik$kubernetes:storage.k8s.io/v1:StorageClass::traefik-certificate-storage] | |
[provider: urn:pulumi:cluster_d4bbb119-72df-40d6-ba8b-0e02df0140a2_northeurope::cluster_environments::pulumi:providers:kubernetes::k8s::037b697f-66aa-4ee8-aa6f-8a8550f5d071 => urn:pulumi:cluster_d4bbb119-72df-40d6-ba8b-0e02df0140a2_northeurope::cluster_environments::pulumi:providers:kubernetes::k8s::output<string>] | |
allowVolumeExpansion: true | |
apiVersion : "storage.k8s.io/v1" | |
kind : "StorageClass" | |
- metadata : { | |
- annotations: { | |
- pulumi.com/autonamed: "true" | |
} | |
- name : "traefik-certificate-storage-362247d4" | |
} | |
parameters : { | |
skuname: "Premium_LRS" | |
} | |
provisioner : "disk.csi.azure.com" | |
reclaimPolicy : "Delete" | |
volumeBindingMode : "WaitForFirstConsumer" | |
+-kubernetes:storage.k8s.io/v1:StorageClass: (replace) | |
[id=digi-rabbitmq-cluster-ff37de80] | |
[urn=urn:pulumi:cluster_d4bbb119-72df-40d6-ba8b-0e02df0140a2_northeurope::cluster_environments::dgz:dgz:cluster-components$dgz:dgz:RabbitMqCluster$kubernetes:storage.k8s.io/v1:StorageClass::digi-rabbitmq-cluster] | |
[provider: urn:pulumi:cluster_d4bbb119-72df-40d6-ba8b-0e02df0140a2_northeurope::cluster_environments::pulumi:providers:kubernetes::k8s::037b697f-66aa-4ee8-aa6f-8a8550f5d071 => urn:pulumi:cluster_d4bbb119-72df-40d6-ba8b-0e02df0140a2_northeurope::cluster_environments::pulumi:providers:kubernetes::k8s::output<string>] | |
allowVolumeExpansion: true | |
apiVersion : "storage.k8s.io/v1" | |
kind : "StorageClass" | |
- metadata : { | |
- annotations: { | |
- pulumi.com/autonamed: "true" | |
} | |
- name : "digi-rabbitmq-cluster-ff37de80" | |
} | |
parameters : { | |
skuname: "Premium_LRS" | |
} | |
provisioner : "disk.csi.azure.com" | |
reclaimPolicy : "Delete" | |
volumeBindingMode : "WaitForFirstConsumer" | |
+-kubernetes:rbac.authorization.k8s.io/v1:ClusterRole: (replace) | |
[id=grafana] | |
[urn=urn:pulumi:cluster_d4bbb119-72df-40d6-ba8b-0e02df0140a2_northeurope::cluster_environments::dgz:dgz:cluster-components$dgz:monitoring:kubernetes$dgz:monitoring:base$kubernetes:rbac.authorization.k8s.io/v1:ClusterRole::basics_grafana_agent] | |
[provider: urn:pulumi:cluster_d4bbb119-72df-40d6-ba8b-0e02df0140a2_northeurope::cluster_environments::pulumi:providers:kubernetes::k8s::037b697f-66aa-4ee8-aa6f-8a8550f5d071 => urn:pulumi:cluster_d4bbb119-72df-40d6-ba8b-0e02df0140a2_northeurope::cluster_environments::pulumi:providers:kubernetes::k8s::output<string>] | |
apiVersion: "rbac.authorization.k8s.io/v1" | |
kind : "ClusterRole" | |
metadata : { | |
name: "grafana" | |
} | |
rules : [ | |
[0]: { | |
apiGroups: [ | |
[0]: "" | |
] | |
resources: [ | |
[0]: "nodes" | |
[1]: "nodes/proxy" | |
[2]: "services" | |
[3]: "endpoints" | |
[4]: "pods" | |
[5]: "events" | |
] | |
verbs : [ | |
[0]: "get" | |
[1]: "list" | |
[2]: "watch" | |
] | |
} | |
[1]: { | |
nonResourceURLs: [ | |
[0]: "/metrics" | |
] | |
verbs : [ | |
[0]: "get" | |
] | |
} | |
] | |
+-kubernetes:core/v1:Namespace: (replace) | |
[id=sftpgo] | |
[urn=urn:pulumi:cluster_d4bbb119-72df-40d6-ba8b-0e02df0140a2_northeurope::cluster_environments::dgz:dgz:sftpgo$kubernetes:core/v1:Namespace::sftpgo] | |
[provider: urn:pulumi:cluster_d4bbb119-72df-40d6-ba8b-0e02df0140a2_northeurope::cluster_environments::pulumi:providers:kubernetes::k8s::037b697f-66aa-4ee8-aa6f-8a8550f5d071 => urn:pulumi:cluster_d4bbb119-72df-40d6-ba8b-0e02df0140a2_northeurope::cluster_environments::pulumi:providers:kubernetes::k8s::output<string>] | |
apiVersion: "v1" | |
kind : "Namespace" | |
metadata : { | |
name: "sftpgo" | |
} | |
+-kubernetes:core/v1:ServiceAccount: (replace) | |
[id=grafana/grafana] | |
[urn=urn:pulumi:cluster_d4bbb119-72df-40d6-ba8b-0e02df0140a2_northeurope::cluster_environments::dgz:dgz:cluster-components$dgz:monitoring:kubernetes$dgz:monitoring:base$kubernetes:core/v1:ServiceAccount::basics_grafana_agent] | |
[provider: urn:pulumi:cluster_d4bbb119-72df-40d6-ba8b-0e02df0140a2_northeurope::cluster_environments::pulumi:providers:kubernetes::k8s::037b697f-66aa-4ee8-aa6f-8a8550f5d071 => urn:pulumi:cluster_d4bbb119-72df-40d6-ba8b-0e02df0140a2_northeurope::cluster_environments::pulumi:providers:kubernetes::k8s::output<string>] | |
apiVersion: "v1" | |
kind : "ServiceAccount" | |
~ metadata : { | |
name : "grafana" | |
~ namespace: "grafana" => output<string> | |
} | |
+-kubernetes:core/v1:Secret: (replace) | |
[id=grafana/regcreds] | |
[urn=urn:pulumi:cluster_d4bbb119-72df-40d6-ba8b-0e02df0140a2_northeurope::cluster_environments::dgz:dgz:cluster-components$dgz:monitoring:kubernetes$dgz:monitoring:logs$kubernetes:core/v1:Secret::logs_registry-credentials] | |
[provider: urn:pulumi:cluster_d4bbb119-72df-40d6-ba8b-0e02df0140a2_northeurope::cluster_environments::pulumi:providers:kubernetes::k8s::037b697f-66aa-4ee8-aa6f-8a8550f5d071 => urn:pulumi:cluster_d4bbb119-72df-40d6-ba8b-0e02df0140a2_northeurope::cluster_environments::pulumi:providers:kubernetes::k8s::output<string>] | |
apiVersion: "v1" | |
- data : [secret] | |
+ data : { | |
+ .dockerconfigjson: "eyJhdXRocyI6eyJkaWdpenVpdGUuYXp1cmVjci5pbyI6eyJ1c2VybmFtZSI6InJoZGh0ZXN0IiwicGFzc3dvcmQiOiJMejBhcVB6MWJxbXo4RWRwZlZ5d1F1REZtZ1hZT015Q3p2ZGZoS1VEamxcdTAwMkJBQ1JBbmV6STAiLCJhdXRoIjoiY21oa2FIUmxjM1E2VEhvd1lYRlFlakZpY1cxNk9FVmtjR1pXZVhkUmRVUkdiV2RZV1U5TmVVTjZkbVJtYUV0VlJHcHNLMEZEVWtGdVpYcEpNQT09In19fQ==" | |
} | |
kind : "Secret" | |
~ metadata : { | |
name : "regcreds" | |
~ namespace: "grafana" => output<string> | |
} | |
type : "kubernetes.io/dockerconfigjson" | |
+-kubernetes:core/v1:ConfigMap: (replace) | |
[id=grafana/promtail] | |
[urn=urn:pulumi:cluster_d4bbb119-72df-40d6-ba8b-0e02df0140a2_northeurope::cluster_environments::dgz:dgz:cluster-components$dgz:monitoring:kubernetes$dgz:monitoring:logs$kubernetes:core/v1:ConfigMap::logs_grafana_agent_logs] | |
[provider: urn:pulumi:cluster_d4bbb119-72df-40d6-ba8b-0e02df0140a2_northeurope::cluster_environments::pulumi:providers:kubernetes::k8s::037b697f-66aa-4ee8-aa6f-8a8550f5d071 => urn:pulumi:cluster_d4bbb119-72df-40d6-ba8b-0e02df0140a2_northeurope::cluster_environments::pulumi:providers:kubernetes::k8s::output<string>] | |
apiVersion: "v1" | |
data : { | |
agent.yaml: (yaml) { | |
integrations: { | |
eventhandler: { | |
cache_path : "/var/lib/agent/eventhandler.cache" | |
logs_instance: "application-logs" | |
} | |
} | |
logs : { | |
configs: [ | |
[0]: { | |
clients : [ | |
[0]: { | |
basic_auth : { | |
password: "${LOGS_PASSWORD}" | |
username: "${LOGS_USERNAME}" | |
} | |
external_labels: { | |
cluster : "${DIGIZUITE_CLUSTER_NAME}" | |
clusterId: "${DIGIZUITE_CLUSTER_ID}" | |
job : "integrations/kubernetes/eventhandler" | |
} | |
url : "${LOGS_URL}/loki/api/v1/push" | |
} | |
] | |
name : "application-logs" | |
positions : { | |
filename: "/tmp/positions.yaml" | |
} | |
scrape_configs: [ | |
[0]: { | |
job_name : "pod-logs" | |
kubernetes_sd_configs: [ | |
[0]: { | |
role: "pod" | |
} | |
] | |
pipeline_stages : [ | |
[0]: { | |
cri: {} | |
} | |
[1]: { | |
match: { | |
selector: "{scrapeTarget=\"digizuite\"}" | |
stages : [ | |
[0]: { | |
json: { | |
expressions: { | |
level : "LogLevel" | |
serviceName: "ServiceName" | |
time : "Time" | |
} | |
} | |
} | |
[1]: { | |
labels: { | |
level : <null> | |
serviceName: <null> | |
} | |
} | |
[2]: { | |
timestamp: { | |
format: "2006-01-02T15:04:05.9999999-07:00" | |
source: "time" | |
} | |
} | |
] | |
} | |
} | |
] | |
relabel_configs : [ | |
[0]: { | |
source_labels: [ | |
[0]: "__meta_kubernetes_pod_node_name" | |
] | |
target_label : "__host__" | |
} | |
[1]: { | |
action: "labelmap" | |
regex : "__meta_kubernetes_pod_label_(.+)" | |
} | |
[2]: { | |
action : "replace" | |
replacement : "$1" | |
separator : "/" | |
source_labels: [ | |
[0]: "__meta_kubernetes_namespace" | |
[1]: "__meta_kubernetes_pod_name" | |
] | |
target_label : "job" | |
} | |
[3]: { | |
action : "replace" | |
source_labels: [ | |
[0]: "__meta_kubernetes_namespace" | |
] | |
target_label : "namespace" | |
} | |
[4]: { | |
action : "replace" | |
source_labels: [ | |
[0]: "__meta_kubernetes_pod_name" | |
] | |
target_label : "pod" | |
} | |
[5]: { | |
action : "replace" | |
source_labels: [ | |
[0]: "__meta_kubernetes_pod_container_name" | |
] | |
target_label : "container" | |
} | |
[6]: { | |
replacement : "/var/log/pods/*$1/*.log" | |
separator : "/" | |
source_labels: [ | |
[0]: "__meta_kubernetes_pod_uid" | |
[1]: "__meta_kubernetes_pod_container_name" | |
] | |
target_label : "__path__" | |
} | |
[7]: { | |
action: "labeldrop" | |
regex : "pod_template_hash|app" | |
} | |
] | |
} | |
] | |
target_config : { | |
sync_period: "10s" | |
} | |
} | |
] | |
} | |
} | |
} | |
kind : "ConfigMap" | |
~ metadata : { | |
name : "promtail" | |
~ namespace: "grafana" => output<string> | |
} | |
+-kubernetes:helm.sh/v3:Release: (replace) | |
[id=sftpgo/sftpgo-operator] | |
[urn=urn:pulumi:cluster_d4bbb119-72df-40d6-ba8b-0e02df0140a2_northeurope::cluster_environments::dgz:dgz:sftpgo$kubernetes:helm.sh/v3:Release::sftpgo-chart] | |
[provider: urn:pulumi:cluster_d4bbb119-72df-40d6-ba8b-0e02df0140a2_northeurope::cluster_environments::pulumi:providers:kubernetes::k8s::037b697f-66aa-4ee8-aa6f-8a8550f5d071 => urn:pulumi:cluster_d4bbb119-72df-40d6-ba8b-0e02df0140a2_northeurope::cluster_environments::pulumi:providers:kubernetes::k8s::output<string>] | |
- allowNullValues : false | |
atomic : false | |
chart : "sftpgo-operator" | |
cleanupOnFail : false | |
+ compat : "true" | |
- createNamespace : false | |
- dependencyUpdate : false | |
- description : "" | |
- devel : false | |
- disableCRDHooks : false | |
- disableOpenapiValidation: false | |
- disableWebhooks : false | |
forceUpdate : true | |
- keyring : "" | |
- lint : false | |
name : "sftpgo-operator" | |
~ namespace : "sftpgo" => output<string> | |
- postrender : "" | |
- recreatePods : false | |
- renderSubchartNotes : false | |
- replace : false | |
~ repositoryOpts : { | |
- caFile : "" | |
- certFile: "" | |
- keyFile : "" | |
- password: "" | |
repo : "https://digizuite.github.io/sftpgo-k8s-operator" | |
- username: "" | |
} | |
- resetValues : false | |
- resourceNames : { | |
- ClusterRole.rbac.authorization.k8s.io/rbac.authorization.k8s.io/v1 : [ | |
- [0]: "sftpgo-operator-role" | |
- [1]: "sftpgo/sftpgo-service-binding-role" | |
] | |
- ClusterRoleBinding.rbac.authorization.k8s.io/rbac.authorization.k8s.io/v1: [ | |
- [0]: "sftpgo-operator-rolebinding" | |
] | |
- CustomResourceDefinition.apiextensions.k8s.io/apiextensions.k8s.io/v1 : [ | |
- [0]: "sftpgoadmins.sftpgo.digizuite.com" | |
- [1]: "sftpgofolders.sftpgo.digizuite.com" | |
- [2]: "sftpgoservers.sftpgo.digizuite.com" | |
- [3]: "sftpgousers.sftpgo.digizuite.com" | |
] | |
- Deployment.apps/apps/v1 : [ | |
- [0]: "sftpgo/sftpgo-operator" | |
] | |
- ServiceAccount/v1 : [ | |
- [0]: "sftpgo/sftpgo-operator" | |
] | |
} | |
- reuseValues : false | |
- skipAwait : false | |
- skipCrds : false | |
- timeout : 300 | |
values : { | |
operator: { | |
nodeSelector: { | |
digizuite/product: "third-party" | |
} | |
} | |
} | |
- verify : false | |
version : "0.1.7" | |
- waitForJobs : false | |
+-kubernetes:core/v1:ConfigMap: (replace) | |
[id=grafana/promtail-windows] | |
[urn=urn:pulumi:cluster_d4bbb119-72df-40d6-ba8b-0e02df0140a2_northeurope::cluster_environments::dgz:dgz:cluster-components$dgz:monitoring:kubernetes$dgz:monitoring:logs$kubernetes:core/v1:ConfigMap::logs_grafana_agent_logs_windows] | |
[provider: urn:pulumi:cluster_d4bbb119-72df-40d6-ba8b-0e02df0140a2_northeurope::cluster_environments::pulumi:providers:kubernetes::k8s::037b697f-66aa-4ee8-aa6f-8a8550f5d071 => urn:pulumi:cluster_d4bbb119-72df-40d6-ba8b-0e02df0140a2_northeurope::cluster_environments::pulumi:providers:kubernetes::k8s::output<string>] | |
apiVersion: "v1" | |
data : { | |
agent.yaml: (yaml) { | |
integrations: { | |
eventhandler: { | |
logs_instance: "application-logs" | |
} | |
} | |
logs : { | |
configs: [ | |
[0]: { | |
clients : [ | |
[0]: { | |
basic_auth : { | |
password: "${LOGS_PASSWORD}" | |
username: "${LOGS_USERNAME}" | |
} | |
external_labels: { | |
cluster : "${DIGIZUITE_CLUSTER_NAME}" | |
clusterId: "${DIGIZUITE_CLUSTER_ID}" | |
job : "integrations/kubernetes/eventhandler" | |
} | |
url : "${LOGS_URL}/loki/api/v1/push" | |
} | |
] | |
name : "application-logs" | |
positions : { | |
filename: "C:/tmp/positions.yaml" | |
} | |
scrape_configs: [ | |
[0]: { | |
job_name : "pod-logs" | |
kubernetes_sd_configs: [ | |
[0]: { | |
role: "pod" | |
} | |
] | |
pipeline_stages : [ | |
[0]: { | |
cri: {} | |
} | |
[1]: { | |
match: { | |
selector: "{scrapeTarget=\"digizuite\"}" | |
stages : [ | |
[0]: { | |
json: { | |
expressions: { | |
level : "LogLevel" | |
serviceName: "ServiceName" | |
time : "Time" | |
} | |
} | |
} | |
[1]: { | |
labels: { | |
level : <null> | |
serviceName: <null> | |
} | |
} | |
[2]: { | |
timestamp: { | |
format: "2006-01-02T15:04:05.9999999-07:00" | |
source: "time" | |
} | |
} | |
] | |
} | |
} | |
] | |
relabel_configs : [ | |
[0]: { | |
source_labels: [ | |
[0]: "__meta_kubernetes_pod_node_name" | |
] | |
target_label : "__host__" | |
} | |
[1]: { | |
action: "labelmap" | |
regex : "__meta_kubernetes_pod_label_(.+)" | |
} | |
[2]: { | |
action : "replace" | |
replacement : "$1" | |
separator : "/" | |
source_labels: [ | |
[0]: "__meta_kubernetes_namespace" | |
[1]: "__meta_kubernetes_pod_name" | |
] | |
target_label : "job" | |
} | |
[3]: { | |
action : "replace" | |
source_labels: [ | |
[0]: "__meta_kubernetes_namespace" | |
] | |
target_label : "namespace" | |
} | |
[4]: { | |
action : "replace" | |
source_labels: [ | |
[0]: "__meta_kubernetes_pod_name" | |
] | |
target_label : "pod" | |
} | |
[5]: { | |
action : "replace" | |
source_labels: [ | |
[0]: "__meta_kubernetes_pod_container_name" | |
] | |
target_label : "container" | |
} | |
[6]: { | |
replacement : "C:/var/log/pods/*$1/*.log" | |
separator : "/" | |
source_labels: [ | |
[0]: "__meta_kubernetes_pod_uid" | |
[1]: "__meta_kubernetes_pod_container_name" | |
] | |
target_label : "__path__" | |
} | |
[7]: { | |
action: "labeldrop" | |
regex : "pod_template_hash|app" | |
} | |
] | |
} | |
] | |
target_config : { | |
sync_period: "10s" | |
} | |
} | |
] | |
} | |
} | |
} | |
kind : "ConfigMap" | |
~ metadata : { | |
name : "promtail-windows" | |
~ namespace: "grafana" => output<string> | |
} | |
+-kubernetes:helm.sh/v3:Release: (replace) | |
[id=grafana/ksm] | |
[urn=urn:pulumi:cluster_d4bbb119-72df-40d6-ba8b-0e02df0140a2_northeurope::cluster_environments::dgz:dgz:cluster-components$dgz:monitoring:kubernetes$dgz:monitoring:metrics$kubernetes:helm.sh/v3:Release::metrics-kube-state-metrics] | |
[provider: urn:pulumi:cluster_d4bbb119-72df-40d6-ba8b-0e02df0140a2_northeurope::cluster_environments::pulumi:providers:kubernetes::k8s::037b697f-66aa-4ee8-aa6f-8a8550f5d071 => urn:pulumi:cluster_d4bbb119-72df-40d6-ba8b-0e02df0140a2_northeurope::cluster_environments::pulumi:providers:kubernetes::k8s::output<string>] | |
- allowNullValues : false | |
atomic : true | |
chart : "kube-state-metrics" | |
cleanupOnFail : true | |
+ compat : "true" | |
- createNamespace : false | |
dependencyUpdate : true | |
- description : "" | |
- devel : false | |
- disableCRDHooks : false | |
- disableOpenapiValidation: false | |
- disableWebhooks : false | |
forceUpdate : true | |
- keyring : "" | |
- lint : false | |
name : "ksm" | |
~ namespace : "grafana" => output<string> | |
- postrender : "" | |
- recreatePods : false | |
- renderSubchartNotes : false | |
replace : true | |
~ repositoryOpts : { | |
- caFile : "" | |
- certFile: "" | |
- keyFile : "" | |
- password: "" | |
repo : "https://prometheus-community.github.io/helm-charts" | |
- username: "" | |
} | |
- resetValues : false | |
- resourceNames : { | |
- ClusterRole.rbac.authorization.k8s.io/rbac.authorization.k8s.io/v1 : [ | |
- [0]: "ksm-kube-state-metrics" | |
] | |
- ClusterRoleBinding.rbac.authorization.k8s.io/rbac.authorization.k8s.io/v1: [ | |
- [0]: "ksm-kube-state-metrics" | |
] | |
- Deployment.apps/apps/v1 : [ | |
- [0]: "grafana/ksm-kube-state-metrics" | |
] | |
- Service/v1 : [ | |
- [0]: "grafana/ksm-kube-state-metrics" | |
] | |
- ServiceAccount/v1 : [ | |
- [0]: "grafana/ksm-kube-state-metrics" | |
] | |
} | |
- reuseValues : false | |
- skipAwait : false | |
- skipCrds : false | |
- timeout : 300 | |
values : { | |
image : { | |
tag: "v2.4.2" | |
} | |
nodeSelector: { | |
digizuite/product: "third-party" | |
} | |
} | |
- verify : false | |
- version : "5.7.0" | |
- waitForJobs : false | |
+-kubernetes:helm.sh/v3:Release: (replace) | |
[id=rabbitmq/digi-rabbitmq-cluster-operator] | |
[urn=urn:pulumi:cluster_d4bbb119-72df-40d6-ba8b-0e02df0140a2_northeurope::cluster_environments::dgz:dgz:cluster-components$dgz:dgz:RabbitMqCluster$kubernetes:helm.sh/v3:Release::digi-rabbitmq-cluster-operator] | |
[provider: urn:pulumi:cluster_d4bbb119-72df-40d6-ba8b-0e02df0140a2_northeurope::cluster_environments::pulumi:providers:kubernetes::k8s::037b697f-66aa-4ee8-aa6f-8a8550f5d071 => urn:pulumi:cluster_d4bbb119-72df-40d6-ba8b-0e02df0140a2_northeurope::cluster_environments::pulumi:providers:kubernetes::k8s::output<string>] | |
- allowNullValues : false | |
atomic : false | |
chart : "rabbitmq-cluster-operator" | |
cleanupOnFail : false | |
+ compat : "true" | |
- createNamespace : false | |
- dependencyUpdate : false | |
- description : "" | |
- devel : false | |
- disableCRDHooks : false | |
- disableOpenapiValidation: false | |
- disableWebhooks : false | |
forceUpdate : true | |
- keyring : "" | |
- lint : false | |
name : "digi-rabbitmq-cluster-operator" | |
~ namespace : "rabbitmq" => output<string> | |
- postrender : "" | |
- recreatePods : false | |
- renderSubchartNotes : false | |
- replace : false | |
~ repositoryOpts : { | |
- caFile : "" | |
- certFile: "" | |
- keyFile : "" | |
- password: "" | |
repo : "https://charts.bitnami.com/bitnami" | |
- username: "" | |
} | |
- resetValues : false | |
- resourceNames : { | |
- ClusterRole.rbac.authorization.k8s.io/rbac.authorization.k8s.io/v1 : [ | |
- [0]: "digi-rabbitmq-cluster-operator-rabbitmq" | |
- [1]: "digi-rabbitmq-cluster-operator-rabbitmq-messaging-topology-oper" | |
] | |
- ClusterRoleBinding.rbac.authorization.k8s.io/rbac.authorization.k8s.io/v1 : [ | |
- [0]: "digi-rabbitmq-cluster-operator-rabbitmq" | |
- [1]: "digi-rabbitmq-cluster-operator-rabbitmq-messaging-topology-oper" | |
] | |
- Deployment.apps/apps/v1 : [ | |
- [0]: "rabbitmq/digi-rabbitmq-cluster-operator" | |
- [1]: "rabbitmq/digi-rabbitmq-cluster-operator-rabbitmq-messaging-topology-oper" | |
] | |
- Role.rbac.authorization.k8s.io/rbac.authorization.k8s.io/v1 : [ | |
- [0]: "rabbitmq/digi-rabbitmq-cluster-operator" | |
- [1]: "rabbitmq/digi-rabbitmq-cluster-operator-rabbitmq-messaging-topology-oper" | |
] | |
- RoleBinding.rbac.authorization.k8s.io/rbac.authorization.k8s.io/v1 : [ | |
- [0]: "rabbitmq/digi-rabbitmq-cluster-operator" | |
- [1]: "rabbitmq/digi-rabbitmq-cluster-operator-rabbitmq-messaging-topology-oper" | |
] | |
- Secret/v1 : [ | |
- [0]: "rabbitmq/digi-rabbitmq-cluster-operator-rabbitmq-messaging-topology-oper" | |
] | |
- Service/v1 : [ | |
- [0]: "rabbitmq/digi-rabbitmq-cluster-operator-rabbitmq-messaging-topology-oper" | |
] | |
- ServiceAccount/v1 : [ | |
- [0]: "rabbitmq/digi-rabbitmq-cluster-operator" | |
- [1]: "rabbitmq/digi-rabbitmq-cluster-operator-rabbitmq-messaging-topology-oper" | |
] | |
- ValidatingWebhookConfiguration.admissionregistration.k8s.io/admissionregistration.k8s.io/v1: [ | |
- [0]: "digi-rabbitmq-cluster-operator-rabbitmq-messaging-topology-oper" | |
] | |
} | |
- reuseValues : false | |
- skipAwait : false | |
- skipCrds : false | |
- timeout : 300 | |
values : { | |
clusterOperator : { | |
nodeSelector: { | |
digizuite/product: "third-party" | |
} | |
} | |
msgTopologyOperator: { | |
nodeSelector: { | |
digizuite/product: "third-party" | |
} | |
} | |
} | |
- verify : false | |
version : "3.1.2" | |
- waitForJobs : false | |
+-kubernetes:helm.sh/v3:Release: (replace) | |
[id=keda/keda] | |
[urn=urn:pulumi:cluster_d4bbb119-72df-40d6-ba8b-0e02df0140a2_northeurope::cluster_environments::dgz:dgz:cluster-components$dgz:k8s:keda$kubernetes:helm.sh/v3:Release::keda] | |
[provider: urn:pulumi:cluster_d4bbb119-72df-40d6-ba8b-0e02df0140a2_northeurope::cluster_environments::pulumi:providers:kubernetes::k8s::037b697f-66aa-4ee8-aa6f-8a8550f5d071 => urn:pulumi:cluster_d4bbb119-72df-40d6-ba8b-0e02df0140a2_northeurope::cluster_environments::pulumi:providers:kubernetes::k8s::output<string>] | |
- allowNullValues : false | |
- atomic : false | |
chart : "keda" | |
- cleanupOnFail : false | |
+ compat : "true" | |
- createNamespace : false | |
- dependencyUpdate : false | |
- description : "" | |
- devel : false | |
- disableCRDHooks : false | |
- disableOpenapiValidation: false | |
- disableWebhooks : false | |
forceUpdate : true | |
- keyring : "" | |
- lint : false | |
name : "keda" | |
~ namespace : "keda" => output<string> | |
- postrender : "" | |
- recreatePods : false | |
- renderSubchartNotes : false | |
- replace : false | |
~ repositoryOpts : { | |
- caFile : "" | |
- certFile: "" | |
- keyFile : "" | |
- password: "" | |
repo : "https://kedacore.github.io/charts" | |
- username: "" | |
} | |
- resetValues : false | |
- resourceNames : { | |
- APIService.apiregistration.k8s.io/apiregistration.k8s.io/v1 : [ | |
- [0]: "v1beta1.external.metrics.k8s.io" | |
] | |
- ClusterRole.rbac.authorization.k8s.io/rbac.authorization.k8s.io/v1 : [ | |
- [0]: "keda-operator" | |
- [1]: "keda-operator-external-metrics-reader" | |
] | |
- ClusterRoleBinding.rbac.authorization.k8s.io/rbac.authorization.k8s.io/v1 : [ | |
- [0]: "keda-operator" | |
- [1]: "keda-operator-hpa-controller-external-metrics" | |
- [2]: "keda-operator-system-auth-delegator" | |
] | |
- CustomResourceDefinition.apiextensions.k8s.io/apiextensions.k8s.io/v1 : [ | |
- [0]: "clustertriggerauthentications.keda.sh" | |
- [1]: "scaledjobs.keda.sh" | |
- [2]: "scaledobjects.keda.sh" | |
- [3]: "triggerauthentications.keda.sh" | |
] | |
- Deployment.apps/apps/v1 : [ | |
- [0]: "keda/keda-admission-webhooks" | |
- [1]: "keda/keda-operator" | |
- [2]: "keda/keda-operator-metrics-apiserver" | |
] | |
- Role.rbac.authorization.k8s.io/rbac.authorization.k8s.io/v1 : [ | |
- [0]: "keda/keda-operator" | |
] | |
- RoleBinding.rbac.authorization.k8s.io/rbac.authorization.k8s.io/v1 : [ | |
- [0]: "keda/keda-operator" | |
- [1]: "kube-system/keda-operator-auth-reader" | |
] | |
- Service/v1 : [ | |
- [0]: "keda/keda-admission-webhooks" | |
- [1]: "keda/keda-operator" | |
- [2]: "keda/keda-operator-metrics-apiserver" | |
] | |
- ServiceAccount/v1 : [ | |
- [0]: "keda/keda-operator" | |
] | |
- ValidatingWebhookConfiguration.admissionregistration.k8s.io/admissionregistration.k8s.io/v1: [ | |
- [0]: "keda/keda-admission" | |
] | |
} | |
- reuseValues : false | |
- skipAwait : false | |
- skipCrds : false | |
- timeout : 300 | |
values : { | |
affinity: { | |
nodeAffinity: { | |
requiredDuringSchedulingIgnoredDuringExecution: { | |
nodeSelectorTerms: [ | |
[0]: { | |
matchExpressions: [ | |
[0]: { | |
key : "digizuite/product" | |
operator: "In" | |
values : [ | |
[0]: "third-party" | |
] | |
} | |
] | |
} | |
] | |
} | |
} | |
} | |
} | |
- verify : false | |
- version : "2.10.2" | |
- waitForJobs : false | |
+-kubernetes:helm.sh/v3:Release: (replace) | |
[id=nats/nats] | |
[urn=urn:pulumi:cluster_d4bbb119-72df-40d6-ba8b-0e02df0140a2_northeurope::cluster_environments::dgz:dgz:cluster-components$dgz:dgz:Nats$kubernetes:helm.sh/v3:Release::digi-nats] | |
[provider: urn:pulumi:cluster_d4bbb119-72df-40d6-ba8b-0e02df0140a2_northeurope::cluster_environments::pulumi:providers:kubernetes::k8s::037b697f-66aa-4ee8-aa6f-8a8550f5d071 => urn:pulumi:cluster_d4bbb119-72df-40d6-ba8b-0e02df0140a2_northeurope::cluster_environments::pulumi:providers:kubernetes::k8s::output<string>] | |
- allowNullValues : false | |
- atomic : false | |
chart : "nats" | |
- cleanupOnFail : false | |
+ compat : "true" | |
- createNamespace : false | |
- dependencyUpdate : false | |
- description : "" | |
- devel : false | |
- disableCRDHooks : false | |
- disableOpenapiValidation: false | |
- disableWebhooks : false | |
forceUpdate : true | |
- keyring : "" | |
- lint : false | |
name : "nats" | |
~ namespace : "nats" => output<string> | |
- postrender : "" | |
- recreatePods : false | |
- renderSubchartNotes : false | |
- replace : false | |
~ repositoryOpts : { | |
- caFile : "" | |
- certFile: "" | |
- keyFile : "" | |
- password: "" | |
repo : "https://nats-io.github.io/k8s/helm/charts/" | |
- username: "" | |
} | |
- resetValues : false | |
- resourceNames : { | |
- ConfigMap/v1 : [ | |
- [0]: "nats/nats-config" | |
] | |
- Deployment.apps/apps/v1 : [ | |
- [0]: "nats/nats-box" | |
] | |
- PodDisruptionBudget.policy/policy/v1: [ | |
- [0]: "nats/nats" | |
] | |
- Service/v1 : [ | |
- [0]: "nats/nats" | |
] | |
- ServiceAccount/v1 : [ | |
- [0]: "nats/nats" | |
] | |
- StatefulSet.apps/apps/v1 : [ | |
- [0]: "nats/nats" | |
] | |
} | |
- reuseValues : false | |
- skipAwait : false | |
- skipCrds : false | |
- timeout : 300 | |
values : { | |
auth : { | |
basic : { | |
accounts: { | |
js: { | |
jetstream: true | |
users : [ | |
[0]: { | |
pass: "system" | |
user: "system" | |
} | |
] | |
} | |
} | |
} | |
enabled: true | |
} | |
nats : { | |
image : { | |
tag: "2.8.4-alpine" | |
} | |
jetstream: { | |
enabled : true | |
filestorage: { | |
storageDirectory: "/etc/jetstream" | |
} | |
} | |
} | |
natsbox : { | |
nodeSelector: { | |
digizuite/product: "third-party" | |
} | |
} | |
nodeSelector: { | |
digizuite/product: "third-party" | |
} | |
} | |
- verify : false | |
- version : "0.19.14" | |
- waitForJobs : false | |
+-kubernetes:helm.sh/v3:Release: (replace) | |
[id=traefik/traefik] | |
[urn=urn:pulumi:cluster_d4bbb119-72df-40d6-ba8b-0e02df0140a2_northeurope::cluster_environments::dgz:dgz:cluster-components$dgz:dgz:traefik$kubernetes:helm.sh/v3:Release::traefik] | |
[provider: urn:pulumi:cluster_d4bbb119-72df-40d6-ba8b-0e02df0140a2_northeurope::cluster_environments::pulumi:providers:kubernetes::k8s::037b697f-66aa-4ee8-aa6f-8a8550f5d071 => urn:pulumi:cluster_d4bbb119-72df-40d6-ba8b-0e02df0140a2_northeurope::cluster_environments::pulumi:providers:kubernetes::k8s::output<string>] | |
- allowNullValues : false | |
- atomic : false | |
chart : "traefik" | |
- cleanupOnFail : false | |
+ compat : "true" | |
- createNamespace : false | |
dependencyUpdate : true | |
- description : "" | |
- devel : false | |
- disableCRDHooks : false | |
- disableOpenapiValidation: false | |
- disableWebhooks : false | |
forceUpdate : false | |
- keyring : "" | |
- lint : false | |
name : "traefik" | |
~ namespace : "traefik" => output<string> | |
- postrender : "" | |
- recreatePods : false | |
- renderSubchartNotes : false | |
- replace : false | |
~ repositoryOpts : { | |
- caFile : "" | |
- certFile: "" | |
- keyFile : "" | |
- password: "" | |
repo : "https://helm.traefik.io/traefik" | |
- username: "" | |
} | |
- resetValues : false | |
- resourceNames : { | |
- ClusterRole.rbac.authorization.k8s.io/rbac.authorization.k8s.io/v1 : [ | |
- [0]: "traefik-traefik" | |
] | |
- ClusterRoleBinding.rbac.authorization.k8s.io/rbac.authorization.k8s.io/v1: [ | |
- [0]: "traefik-traefik" | |
] | |
- Deployment.apps/apps/v1 : [ | |
- [0]: "traefik" | |
] | |
- PersistentVolumeClaim/v1 : [ | |
- [0]: "traefik" | |
] | |
- Service/v1 : [ | |
- [0]: "traefik" | |
] | |
- ServiceAccount/v1 : [ | |
- [0]: "traefik" | |
] | |
} | |
- reuseValues : false | |
- skipAwait : false | |
- skipCrds : false | |
- timeout : 300 | |
~ values : { | |
additionalArguments: [ | |
[0]: "--providers.kubernetesingress.ingressendpoint.hostname=example.net" | |
[1]: "--log.level=DEBUG" | |
] | |
certResolvers : { | |
letsencrypt: { | |
caServer : "https://acme-v02.api.letsencrypt.org/directory" | |
dnsChallenge: { | |
provider: "cloudflare" | |
} | |
email : "rnd@digizuite.com" | |
storage : "/data/acme.json" | |
} | |
} | |
deployment : { | |
initContainers: [ | |
[0]: { | |
command : [ | |
[0]: "sh" | |
[1]: "-c" | |
[2]: "touch /data/acme.json && chmod -Rv 600 /data/* && chown 65532:65532 /data/acme.json" | |
] | |
image : "busybox:1.35" | |
name : "volume-permissions" | |
volumeMounts: [ | |
[0]: { | |
mountPath: "/data" | |
name : "data" | |
} | |
] | |
} | |
] | |
} | |
env : [ | |
[0]: { | |
name : "CF_DNS_API_TOKEN" | |
value: "tH4X1Ole6A5ZKnIhfM_BYxWNqoayBFNrdVQU2JmP" | |
} | |
] | |
nodeSelector : { | |
digizuite/product: "third-party" | |
} | |
~ persistence : { | |
enabled : true | |
~ storageClass: "traefik-certificate-storage-362247d4" => output<string> | |
} | |
ports : { | |
sftp: { | |
expose : true | |
exposedPort: 2222 | |
port : 2222 | |
protocol : "TCP" | |
} | |
} | |
} | |
- verify : false | |
version : "17.0.5" | |
- waitForJobs : false | |
+-kubernetes:core/v1:ConfigMap: (replace) | |
[id=grafana/grafana] | |
[urn=urn:pulumi:cluster_d4bbb119-72df-40d6-ba8b-0e02df0140a2_northeurope::cluster_environments::dgz:dgz:cluster-components$dgz:monitoring:kubernetes$dgz:monitoring:metrics$kubernetes:core/v1:ConfigMap::metrics_grafana_agent] | |
[provider: urn:pulumi:cluster_d4bbb119-72df-40d6-ba8b-0e02df0140a2_northeurope::cluster_environments::pulumi:providers:kubernetes::k8s::037b697f-66aa-4ee8-aa6f-8a8550f5d071 => urn:pulumi:cluster_d4bbb119-72df-40d6-ba8b-0e02df0140a2_northeurope::cluster_environments::pulumi:providers:kubernetes::k8s::output<string>] | |
apiVersion: "v1" | |
data : { | |
agent.yaml: (yaml) { | |
integrations: { | |
eventhandler: { | |
cache_path: "/var/lib/agent/eventhandler.cache" | |
} | |
} | |
metrics : { | |
configs : [ | |
[0]: { | |
name : "integrations" | |
remote_write : [ | |
[0]: { | |
basic_auth: { | |
password: "${PROMETHEUS_PASSWORD}" | |
username: "${PROMETHEUS_USERNAME}" | |
} | |
url : "${PROMETHEUS_URL}/api/prom/push" | |
} | |
] | |
scrape_configs: [ | |
[0]: { | |
bearer_token_file : "/var/run/secrets/kubernetes.io/serviceaccount/token" | |
job_name : "integrations/kubernetes/cadvisor" | |
kubernetes_sd_configs : [ | |
[0]: { | |
role: "node" | |
} | |
] | |
metric_relabel_configs: [ | |
[0]: { | |
action : "keep" | |
regex : "kubelet_running_pods|container_fs_reads_total|kubelet_runtime_operations_errors_total|kube_horizontalpodautoscaler_spec_max_replicas|kube_horizontalpodautoscaler_status_desired_replicas|kube_daemonset_status_current_number_scheduled|container_memory_working_set_bytes|kubelet_node_name|kube_job_failed|kube_statefulset_status_replicas|kube_resourcequota|kubelet_volume_stats_available_bytes|container_memory_rss|kube_statefulset_metadata_generation|kube_statefulset_status_replicas_ready|kube_replicaset_owner|kubelet_running_container_count|kubelet_pleg_relist_duration_seconds_count|container_memory_cache|kube_daemonset_status_desired_number_scheduled|kube_statefulset_status_current_revision|node_quantile:kubelet_pleg_relist_duration_seconds:histogram_quantile|kube_pod_container_resource_requests|namespace_memory:kube_pod_container_resource_limits:sum|machine_memory_bytes|storage_operation_errors_total|kubelet_pleg_relist_duration_seconds_bucket|container_fs_writes_bytes_total|kube_horizontalpodautoscaler_spec_min_replicas|kube_daemonset_status_updated_number_scheduled|volume_manager_total_volumes|kubelet_pod_worker_duration_seconds_count|kubelet_volume_stats_inodes_used|cluster:namespace:pod_memory:active:kube_pod_container_resource_requests|kube_pod_status_phase|storage_operation_duration_seconds_count|container_fs_writes_total|container_cpu_cfs_periods_total|kube_deployment_status_replicas_available|kube_pod_container_resource_limits|namespace_workload_pod|rest_client_requests_total|kubelet_volume_stats_inodes|container_memory_swap|kubelet_runtime_operations_total|process_resident_memory_bytes|kubelet_pod_start_duration_seconds_count|cluster:namespace:pod_cpu:active:kube_pod_container_resource_requests|namespace_workload_pod:kube_pod_owner:relabel|kubelet_running_pod_count|kubelet_volume_stats_capacity_bytes|kube_node_status_capacity|kube_statefulset_replicas|cluster:namespace:pod_memory:active:kube_pod_container_resource_limits|kubelet_server_expiration_renew_errors|container_fs_reads_bytes_total|kube_job_status_start_time|cluster:namespace:pod_cpu:active:kube_pod_container_resource_limits|node_namespace_pod_container:container_memory_working_set_bytes|kubernetes_build_info|kube_pod_info|process_cpu_seconds_total|kube_statefulset_status_update_revision|kube_horizontalpodautoscaler_status_current_replicas|namespace_memory:kube_pod_container_resource_requests:sum|kubelet_certificate_manager_server_ttl_seconds|kubelet_pod_worker_duration_seconds_bucket|kube_node_status_allocatable|container_cpu_cfs_throttled_periods_total|kube_daemonset_status_number_misscheduled|kubelet_cgroup_manager_duration_seconds_count|kube_node_info|kube_deployment_status_observed_generation|namespace_cpu:kube_pod_container_resource_requests:sum|kube_statefulset_status_observed_generation|kube_statefulset_status_replicas_updated|kube_job_status_active|kubelet_pleg_relist_interval_seconds_bucket|node_namespace_pod_container:container_memory_rss|node_namespace_pod_container:container_cpu_usage_seconds_total:sum_irate|kube_deployment_metadata_generation|kubelet_running_containers|kube_pod_container_status_waiting_reason|kube_node_spec_taint|kube_namespace_status_phase|kube_deployment_status_replicas_updated|node_namespace_pod_container:container_memory_swap|kubelet_certificate_manager_client_expiration_renew_errors|kube_node_status_condition|kubelet_node_config_error|node_namespace_pod_container:container_memory_cache|kube_pod_owner|container_cpu_usage_seconds_total|kubelet_cgroup_manager_duration_seconds_bucket|kube_deployment_spec_replicas|kube_daemonset_status_number_available|kubelet_certificate_manager_client_ttl_seconds|go_goroutines|namespace_cpu:kube_pod_container_resource_limits:sum|kube_namespace_status_phase|container_cpu_usage_seconds_total|kube_pod_status_phase|kube_pod_start_time|kube_pod_container_status_restarts_total|kube_pod_container_info|kube_pod_container_status_waiting_reason|kube_daemonset.*|kube_statefulset.*|kube_job.*|kube_node_status_capacity|node_namespace_pod_container:container_cpu_usage_seconds_total:sum_irate|cluster:namespace:pod_cpu:active:kube_pod_container_resource_requests|namespace_cpu:kube_pod_container_resource_requests:sum" | |
source_labels: [ | |
[0]: "__name__" | |
] | |
} | |
] | |
relabel_configs : [ | |
[0]: { | |
replacement : "kubernetes.default.svc.cluster.local:443" | |
target_label: "__address__" | |
} | |
[1]: { | |
regex : "(.+)" | |
replacement : "/api/v1/nodes/${1}/proxy/metrics/cadvisor" | |
source_labels: [ | |
[0]: "__meta_kubernetes_node_name" | |
] | |
target_label : "__metrics_path__" | |
} | |
] | |
scheme : "https" | |
tls_config : { | |
ca_file : "/var/run/secrets/kubernetes.io/serviceaccount/ca.crt" | |
insecure_skip_verify: false | |
server_name : "kubernetes" | |
} | |
} | |
[1]: { | |
bearer_token_file : "/var/run/secrets/kubernetes.io/serviceaccount/token" | |
job_name : "integrations/kubernetes/kubelet" | |
kubernetes_sd_configs : [ | |
[0]: { | |
role: "node" | |
} | |
] | |
metric_relabel_configs: [ | |
[0]: { | |
action : "keep" | |
regex : "kubelet_running_pods|container_fs_reads_total|kubelet_runtime_operations_errors_total|kube_horizontalpodautoscaler_spec_max_replicas|kube_horizontalpodautoscaler_status_desired_replicas|kube_daemonset_status_current_number_scheduled|container_memory_working_set_bytes|kubelet_node_name|kube_job_failed|kube_statefulset_status_replicas|kube_resourcequota|kubelet_volume_stats_available_bytes|container_memory_rss|kube_statefulset_metadata_generation|kube_statefulset_status_replicas_ready|kube_replicaset_owner|kubelet_running_container_count|kubelet_pleg_relist_duration_seconds_count|container_memory_cache|kube_daemonset_status_desired_number_scheduled|kube_statefulset_status_current_revision|node_quantile:kubelet_pleg_relist_duration_seconds:histogram_quantile|kube_pod_container_resource_requests|namespace_memory:kube_pod_container_resource_limits:sum|machine_memory_bytes|storage_operation_errors_total|kubelet_pleg_relist_duration_seconds_bucket|container_fs_writes_bytes_total|kube_horizontalpodautoscaler_spec_min_replicas|kube_daemonset_status_updated_number_scheduled|volume_manager_total_volumes|kubelet_pod_worker_duration_seconds_count|kubelet_volume_stats_inodes_used|cluster:namespace:pod_memory:active:kube_pod_container_resource_requests|kube_pod_status_phase|storage_operation_duration_seconds_count|container_fs_writes_total|container_cpu_cfs_periods_total|kube_deployment_status_replicas_available|kube_pod_container_resource_limits|namespace_workload_pod|rest_client_requests_total|kubelet_volume_stats_inodes|container_memory_swap|kubelet_runtime_operations_total|process_resident_memory_bytes|kubelet_pod_start_duration_seconds_count|cluster:namespace:pod_cpu:active:kube_pod_container_resource_requests|namespace_workload_pod:kube_pod_owner:relabel|kubelet_running_pod_count|kubelet_volume_stats_capacity_bytes|kube_node_status_capacity|kube_statefulset_replicas|cluster:namespace:pod_memory:active:kube_pod_container_resource_limits|kubelet_server_expiration_renew_errors|container_fs_reads_bytes_total|kube_job_status_start_time|cluster:namespace:pod_cpu:active:kube_pod_container_resource_limits|node_namespace_pod_container:container_memory_working_set_bytes|kubernetes_build_info|kube_pod_info|process_cpu_seconds_total|kube_statefulset_status_update_revision|kube_horizontalpodautoscaler_status_current_replicas|namespace_memory:kube_pod_container_resource_requests:sum|kubelet_certificate_manager_server_ttl_seconds|kubelet_pod_worker_duration_seconds_bucket|kube_node_status_allocatable|container_cpu_cfs_throttled_periods_total|kube_daemonset_status_number_misscheduled|kubelet_cgroup_manager_duration_seconds_count|kube_node_info|kube_deployment_status_observed_generation|namespace_cpu:kube_pod_container_resource_requests:sum|kube_statefulset_status_observed_generation|kube_statefulset_status_replicas_updated|kube_job_status_active|kubelet_pleg_relist_interval_seconds_bucket|node_namespace_pod_container:container_memory_rss|node_namespace_pod_container:container_cpu_usage_seconds_total:sum_irate|kube_deployment_metadata_generation|kubelet_running_containers|kube_pod_container_status_waiting_reason|kube_node_spec_taint|kube_namespace_status_phase|kube_deployment_status_replicas_updated|node_namespace_pod_container:container_memory_swap|kubelet_certificate_manager_client_expiration_renew_errors|kube_node_status_condition|kubelet_node_config_error|node_namespace_pod_container:container_memory_cache|kube_pod_owner|container_cpu_usage_seconds_total|kubelet_cgroup_manager_duration_seconds_bucket|kube_deployment_spec_replicas|kube_daemonset_status_number_available|kubelet_certificate_manager_client_ttl_seconds|go_goroutines|namespace_cpu:kube_pod_container_resource_limits:sum|kube_namespace_status_phase|container_cpu_usage_seconds_total|kube_pod_status_phase|kube_pod_start_time|kube_pod_container_status_restarts_total|kube_pod_container_info|kube_pod_container_status_waiting_reason|kube_daemonset.*|kube_statefulset.*|kube_job.*|kube_node_status_capacity|node_namespace_pod_container:container_cpu_usage_seconds_total:sum_irate|cluster:namespace:pod_cpu:active:kube_pod_container_resource_requests|namespace_cpu:kube_pod_container_resource_requests:sum" | |
source_labels: [ | |
[0]: "__name__" | |
] | |
} | |
] | |
relabel_configs : [ | |
[0]: { | |
replacement : "kubernetes.default.svc.cluster.local:443" | |
target_label: "__address__" | |
} | |
[1]: { | |
regex : "(.+)" | |
replacement : "/api/v1/nodes/${1}/proxy/metrics" | |
source_labels: [ | |
[0]: "__meta_kubernetes_node_name" | |
] | |
target_label : "__metrics_path__" | |
} | |
] | |
scheme : "https" | |
tls_config : { | |
ca_file : "/var/run/secrets/kubernetes.io/serviceaccount/ca.crt" | |
insecure_skip_verify: false | |
server_name : "kubernetes" | |
} | |
} | |
[2]: { | |
job_name : "integrations/kubernetes/kube-state-metrics" | |
kubernetes_sd_configs : [ | |
[0]: { | |
role: "pod" | |
} | |
] | |
metric_relabel_configs: [ | |
[0]: { | |
action : "keep" | |
regex : "kubelet_running_pods|container_fs_reads_total|kubelet_runtime_operations_errors_total|kube_horizontalpodautoscaler_spec_max_replicas|kube_horizontalpodautoscaler_status_desired_replicas|kube_daemonset_status_current_number_scheduled|container_memory_working_set_bytes|kubelet_node_name|kube_job_failed|kube_statefulset_status_replicas|kube_resourcequota|kubelet_volume_stats_available_bytes|container_memory_rss|kube_statefulset_metadata_generation|kube_statefulset_status_replicas_ready|kube_replicaset_owner|kubelet_running_container_count|kubelet_pleg_relist_duration_seconds_count|container_memory_cache|kube_daemonset_status_desired_number_scheduled|kube_statefulset_status_current_revision|node_quantile:kubelet_pleg_relist_duration_seconds:histogram_quantile|kube_pod_container_resource_requests|namespace_memory:kube_pod_container_resource_limits:sum|machine_memory_bytes|storage_operation_errors_total|kubelet_pleg_relist_duration_seconds_bucket|container_fs_writes_bytes_total|kube_horizontalpodautoscaler_spec_min_replicas|kube_daemonset_status_updated_number_scheduled|volume_manager_total_volumes|kubelet_pod_worker_duration_seconds_count|kubelet_volume_stats_inodes_used|cluster:namespace:pod_memory:active:kube_pod_container_resource_requests|kube_pod_status_phase|storage_operation_duration_seconds_count|container_fs_writes_total|container_cpu_cfs_periods_total|kube_deployment_status_replicas_available|kube_pod_container_resource_limits|namespace_workload_pod|rest_client_requests_total|kubelet_volume_stats_inodes|container_memory_swap|kubelet_runtime_operations_total|process_resident_memory_bytes|kubelet_pod_start_duration_seconds_count|cluster:namespace:pod_cpu:active:kube_pod_container_resource_requests|namespace_workload_pod:kube_pod_owner:relabel|kubelet_running_pod_count|kubelet_volume_stats_capacity_bytes|kube_node_status_capacity|kube_statefulset_replicas|cluster:namespace:pod_memory:active:kube_pod_container_resource_limits|kubelet_server_expiration_renew_errors|container_fs_reads_bytes_total|kube_job_status_start_time|cluster:namespace:pod_cpu:active:kube_pod_container_resource_limits|node_namespace_pod_container:container_memory_working_set_bytes|kubernetes_build_info|kube_pod_info|process_cpu_seconds_total|kube_statefulset_status_update_revision|kube_horizontalpodautoscaler_status_current_replicas|namespace_memory:kube_pod_container_resource_requests:sum|kubelet_certificate_manager_server_ttl_seconds|kubelet_pod_worker_duration_seconds_bucket|kube_node_status_allocatable|container_cpu_cfs_throttled_periods_total|kube_daemonset_status_number_misscheduled|kubelet_cgroup_manager_duration_seconds_count|kube_node_info|kube_deployment_status_observed_generation|namespace_cpu:kube_pod_container_resource_requests:sum|kube_statefulset_status_observed_generation|kube_statefulset_status_replicas_updated|kube_job_status_active|kubelet_pleg_relist_interval_seconds_bucket|node_namespace_pod_container:container_memory_rss|node_namespace_pod_container:container_cpu_usage_seconds_total:sum_irate|kube_deployment_metadata_generation|kubelet_running_containers|kube_pod_container_status_waiting_reason|kube_node_spec_taint|kube_namespace_status_phase|kube_deployment_status_replicas_updated|node_namespace_pod_container:container_memory_swap|kubelet_certificate_manager_client_expiration_renew_errors|kube_node_status_condition|kubelet_node_config_error|node_namespace_pod_container:container_memory_cache|kube_pod_owner|container_cpu_usage_seconds_total|kubelet_cgroup_manager_duration_seconds_bucket|kube_deployment_spec_replicas|kube_daemonset_status_number_available|kubelet_certificate_manager_client_ttl_seconds|go_goroutines|namespace_cpu:kube_pod_container_resource_limits:sum|kube_namespace_status_phase|container_cpu_usage_seconds_total|kube_pod_status_phase|kube_pod_start_time|kube_pod_container_status_restarts_total|kube_pod_container_info|kube_pod_container_status_waiting_reason|kube_daemonset.*|kube_statefulset.*|kube_job.*|kube_node_status_capacity|node_namespace_pod_container:container_cpu_usage_seconds_total:sum_irate|cluster:namespace:pod_cpu:active:kube_pod_container_resource_requests|namespace_cpu:kube_pod_container_resource_requests:sum" | |
source_labels: [ | |
[0]: "__name__" | |
] | |
} | |
] | |
relabel_configs : [ | |
[0]: { | |
action : "keep" | |
regex : "kube-state-metrics" | |
source_labels: [ | |
[0]: "__meta_kubernetes_pod_label_app_kubernetes_io_name" | |
] | |
} | |
] | |
} | |
[3]: { | |
job_name : "digizuite" | |
kubernetes_sd_configs : [ | |
[0]: { | |
role : "pod" | |
selectors: [ | |
[0]: { | |
label: "scrapeTarget=digizuite" | |
role : "pod" | |
} | |
] | |
} | |
] | |
metric_relabel_configs: [ | |
[0]: { | |
action : "drop" | |
regex : "http_request_duration_seconds_bucket|digizuite_messaging_incoming_logical_message_handling_duration_seconds_bucket" | |
source_labels: [ | |
[0]: "__name__" | |
] | |
} | |
[1]: { | |
action : "drop" | |
regex : "prometheus_net_.*" | |
source_labels: [ | |
[0]: "__name__" | |
] | |
} | |
] | |
metrics_path : "/metrics" | |
} | |
[4]: { | |
job_name : "rabbitmq" | |
kubernetes_sd_configs : [ | |
[0]: { | |
namespaces: { | |
names: [ | |
[0]: "rabbitmq" | |
] | |
} | |
role : "pod" | |
} | |
] | |
metric_relabel_configs: [ | |
[0]: { | |
action : "drop" | |
regex : "erlang_vm_allocators" | |
source_labels: [ | |
[0]: "__name__" | |
] | |
} | |
] | |
metrics_path : "/metrics/per-object" | |
} | |
[5]: { | |
job_name : "nats" | |
kubernetes_sd_configs : [ | |
[0]: { | |
namespaces: { | |
names: [ | |
[0]: "nats" | |
] | |
} | |
role : "pod" | |
} | |
] | |
metric_relabel_configs: [ | |
[0]: { | |
action : "drop" | |
regex : "nats_consumer.*" | |
source_labels: [ | |
[0]: "__name__" | |
] | |
} | |
] | |
metrics_path : "/metrics" | |
} | |
[6]: { | |
job_name : "traefik" | |
kubernetes_sd_configs : [ | |
[0]: { | |
namespaces: { | |
names: [ | |
[0]: "traefik" | |
] | |
} | |
role : "pod" | |
} | |
] | |
metric_relabel_configs: [ | |
[0]: { | |
action : "drop" | |
regex : "traefik_service_request_duration_seconds.*" | |
source_labels: [ | |
[0]: "__name__" | |
] | |
} | |
] | |
metrics_path : "/metrics" | |
} | |
] | |
} | |
] | |
global : { | |
external_labels: { | |
cluster : "${DIGIZUITE_CLUSTER_NAME}" | |
clusterId: "${DIGIZUITE_CLUSTER_ID}" | |
} | |
scrape_interval: "1m" | |
} | |
wal_directory: "/var/lib/agent/wal" | |
} | |
traces : { | |
configs: [ | |
[0]: { | |
name : "integrations" | |
receivers : { | |
jaeger: { | |
protocols: { | |
thrift_compact: <null> | |
} | |
} | |
} | |
remote_write: [ | |
[0]: { | |
basic_auth: { | |
password: "${TRACING_PASSWORD}" | |
username: "${TRACING_USERNAME}" | |
} | |
endpoint : "${TRACING_URL}" | |
} | |
] | |
} | |
] | |
} | |
} | |
} | |
kind : "ConfigMap" | |
~ metadata : { | |
name : "grafana" | |
~ namespace: "grafana" => output<string> | |
} | |
+-kubernetes:core/v1:Service: (replace) | |
[id=traefik/traefik] | |
[urn=urn:pulumi:cluster_d4bbb119-72df-40d6-ba8b-0e02df0140a2_northeurope::cluster_environments::dgz:dgz:cluster-components$dgz:dgz:traefik$kubernetes:core/v1:Service::traefikLoadbalancer] | |
[provider: urn:pulumi:cluster_d4bbb119-72df-40d6-ba8b-0e02df0140a2_northeurope::cluster_environments::pulumi:providers:kubernetes::k8s::037b697f-66aa-4ee8-aa6f-8a8550f5d071 => urn:pulumi:cluster_d4bbb119-72df-40d6-ba8b-0e02df0140a2_northeurope::cluster_environments::pulumi:providers:kubernetes::k8s::output<string>] | |
- apiVersion: "v1" | |
- kind : "Service" | |
- metadata : { | |
- annotations: { | |
- meta.helm.sh/release-name : "traefik" | |
- meta.helm.sh/release-namespace: "traefik" | |
} | |
- finalizers : [ | |
- [0]: "service.kubernetes.io/load-balancer-cleanup" | |
] | |
- labels : { | |
- app.kubernetes.io/instance : "traefik-traefik" | |
- app.kubernetes.io/managed-by: "Helm" | |
- app.kubernetes.io/name : "traefik" | |
- helm.sh/chart : "traefik-17.0.5" | |
} | |
- name : "traefik" | |
- namespace : "traefik" | |
} | |
- spec : { | |
- allocateLoadBalancerNodePorts: true | |
- clusterIP : "10.0.127.130" | |
- clusterIPs : [ | |
- [0]: "10.0.127.130" | |
] | |
- externalTrafficPolicy : "Cluster" | |
- internalTrafficPolicy : "Cluster" | |
- ipFamilies : [ | |
- [0]: "IPv4" | |
] | |
- ipFamilyPolicy : "SingleStack" | |
- ports : [ | |
- [0]: { | |
- name : "sftp" | |
- nodePort : 30437 | |
- port : 2222 | |
- protocol : "TCP" | |
- targetPort: "sftp" | |
} | |
- [1]: { | |
- name : "web" | |
- nodePort : 30275 | |
- port : 80 | |
- protocol : "TCP" | |
- targetPort: "web" | |
} | |
- [2]: { | |
- name : "websecure" | |
- nodePort : 32115 | |
- port : 443 | |
- protocol : "TCP" | |
- targetPort: "websecure" | |
} | |
] | |
- selector : { | |
- app.kubernetes.io/instance: "traefik-traefik" | |
- app.kubernetes.io/name : "traefik" | |
} | |
- sessionAffinity : "None" | |
- type : "LoadBalancer" | |
} | |
~ cloudflare:index/record:Record: (update) | |
[id=ab573e7951569a653f1f1c054cf02c3c] | |
[urn=urn:pulumi:cluster_d4bbb119-72df-40d6-ba8b-0e02df0140a2_northeurope::cluster_environments::dgz:cloudflare:clusterdns$cloudflare:index/record:Record::cloudflare-dns-cluster-dns] | |
[provider=urn:pulumi:cluster_d4bbb119-72df-40d6-ba8b-0e02df0140a2_northeurope::cluster_environments::pulumi:providers:cloudflare::cloudflare-provider::1ea65a07-d262-4e37-8665-aee93a097db7] | |
~ value: "20.93.9.48" => output<string> | |
+-kubernetes:rbac.authorization.k8s.io/v1:ClusterRoleBinding: (replace) | |
[id=grafana] | |
[urn=urn:pulumi:cluster_d4bbb119-72df-40d6-ba8b-0e02df0140a2_northeurope::cluster_environments::dgz:dgz:cluster-components$dgz:monitoring:kubernetes$dgz:monitoring:base$kubernetes:rbac.authorization.k8s.io/v1:ClusterRoleBinding::basics_grafana_agent] | |
[provider: urn:pulumi:cluster_d4bbb119-72df-40d6-ba8b-0e02df0140a2_northeurope::cluster_environments::pulumi:providers:kubernetes::k8s::037b697f-66aa-4ee8-aa6f-8a8550f5d071 => urn:pulumi:cluster_d4bbb119-72df-40d6-ba8b-0e02df0140a2_northeurope::cluster_environments::pulumi:providers:kubernetes::k8s::output<string>] | |
apiVersion: "rbac.authorization.k8s.io/v1" | |
kind : "ClusterRoleBinding" | |
metadata : { | |
name: "grafana" | |
} | |
~ roleRef : { | |
apiGroup: "rbac.authorization.k8s.io" | |
kind : "ClusterRole" | |
~ name : "grafana" => output<string> | |
} | |
~ subjects : [ | |
~ [0]: { | |
kind : "ServiceAccount" | |
~ name : "grafana" => output<string> | |
~ namespace: "grafana" => output<string> | |
} | |
] | |
+-kubernetes:traefik.containo.us/v1alpha1:Middleware: (replace) | |
[id=traefik/dgzcore-middleware] | |
[urn=urn:pulumi:cluster_d4bbb119-72df-40d6-ba8b-0e02df0140a2_northeurope::cluster_environments::dgz:dgz:cluster-components$dgz:dgz:traefik$kubernetes:traefik.containo.us/v1alpha1:Middleware::dgzcore-middleware] | |
[provider: urn:pulumi:cluster_d4bbb119-72df-40d6-ba8b-0e02df0140a2_northeurope::cluster_environments::pulumi:providers:kubernetes::k8s::037b697f-66aa-4ee8-aa6f-8a8550f5d071 => urn:pulumi:cluster_d4bbb119-72df-40d6-ba8b-0e02df0140a2_northeurope::cluster_environments::pulumi:providers:kubernetes::k8s::output<string>] | |
apiVersion: "traefik.containo.us/v1alpha1" | |
kind : "Middleware" | |
~ metadata : { | |
name : "dgzcore-middleware" | |
~ namespace: "traefik" => output<string> | |
} | |
spec : { | |
stripPrefixRegex: { | |
regex: [ | |
[0]: "/(?i:digizuitecore)/[^\\/]+/" | |
] | |
} | |
} | |
+-kubernetes:rabbitmq.com/v1beta1:RabbitmqCluster: (replace) | |
[id=rabbitmq/digi-rabbitmq-cluster] | |
[urn=urn:pulumi:cluster_d4bbb119-72df-40d6-ba8b-0e02df0140a2_northeurope::cluster_environments::dgz:dgz:cluster-components$dgz:dgz:RabbitMqCluster$kubernetes:rabbitmq.com/v1beta1:RabbitmqCluster::digi-rabbitmq-cluster] | |
[provider: urn:pulumi:cluster_d4bbb119-72df-40d6-ba8b-0e02df0140a2_northeurope::cluster_environments::pulumi:providers:kubernetes::k8s::037b697f-66aa-4ee8-aa6f-8a8550f5d071 => urn:pulumi:cluster_d4bbb119-72df-40d6-ba8b-0e02df0140a2_northeurope::cluster_environments::pulumi:providers:kubernetes::k8s::output<string>] | |
apiVersion: "rabbitmq.com/v1beta1" | |
kind : "RabbitmqCluster" | |
~ metadata : { | |
annotations: { | |
pulumi.com/patchForce : "true" | |
rabbitmq.com/topology-allowed-namespaces: "*" | |
} | |
name : "digi-rabbitmq-cluster" | |
~ namespace : "rabbitmq" => output<string> | |
} | |
~ spec : { | |
affinity : { | |
nodeAffinity: { | |
requiredDuringSchedulingIgnoredDuringExecution: { | |
nodeSelectorTerms: [ | |
[0]: { | |
matchExpressions: [ | |
[0]: { | |
key : "digizuite/product" | |
operator: "In" | |
values : [ | |
[0]: "third-party" | |
] | |
} | |
] | |
} | |
] | |
} | |
} | |
} | |
~ persistence : { | |
storage : "100Gi" | |
~ storageClassName: "digi-rabbitmq-cluster-ff37de80" => output<string> | |
} | |
replicas : 1 | |
resources : { | |
limits : { | |
cpu : "1" | |
memory: "2Gi" | |
} | |
requests: { | |
cpu : "1" | |
memory: "2Gi" | |
} | |
} | |
service : { | |
type: "ClusterIP" | |
} | |
terminationGracePeriodSeconds: 604800 | |
} | |
+-kubernetes:sftpgo.digizuite.com/v1alpha1:SftpgoServer: (replace) | |
[id=sftpgo/sftpgo] | |
[urn=urn:pulumi:cluster_d4bbb119-72df-40d6-ba8b-0e02df0140a2_northeurope::cluster_environments::dgz:dgz:sftpgo$kubernetes:sftpgo.digizuite.com/v1alpha1:SftpgoServer::sftpgo] | |
[provider: urn:pulumi:cluster_d4bbb119-72df-40d6-ba8b-0e02df0140a2_northeurope::cluster_environments::pulumi:providers:kubernetes::k8s::037b697f-66aa-4ee8-aa6f-8a8550f5d071 => urn:pulumi:cluster_d4bbb119-72df-40d6-ba8b-0e02df0140a2_northeurope::cluster_environments::pulumi:providers:kubernetes::k8s::output<string>] | |
apiVersion: "sftpgo.digizuite.com/v1alpha1" | |
kind : "SftpgoServer" | |
~ metadata : { | |
name : "sftpgo" | |
~ namespace: "sftpgo" => output<string> | |
} | |
spec : { | |
configuration: { | |
common : { | |
proxy_protocol: 1 | |
} | |
data_provider: { | |
driver : "postgresql" | |
host : "sftpgo-d4bbb11972df40d6ba8b0e02df0140a2.postgres.database.azure.com" | |
name : "sftpgo" | |
password: "OZkRa+?HJ(Oc8yXU67Ez45A94hsoaA63fR0ihP0f4(+P3.drrP#9)0E8" | |
port : 5432 | |
sslmode : 1 | |
username: "digiadmin" | |
} | |
httpd : { | |
bindings: [ | |
[0]: { | |
port: 3333 | |
} | |
] | |
} | |
sftpd : { | |
bindings: [ | |
[0]: { | |
port: 1111 | |
} | |
] | |
} | |
} | |
nodeSelector : { | |
digizuite/product: "third-party" | |
} | |
} | |
+-kubernetes:apps/v1:StatefulSet: (replace) | |
[id=grafana/grafana] | |
[urn=urn:pulumi:cluster_d4bbb119-72df-40d6-ba8b-0e02df0140a2_northeurope::cluster_environments::dgz:dgz:cluster-components$dgz:monitoring:kubernetes$dgz:monitoring:metrics$kubernetes:apps/v1:StatefulSet::metrics_grafana_agent] | |
[provider: urn:pulumi:cluster_d4bbb119-72df-40d6-ba8b-0e02df0140a2_northeurope::cluster_environments::pulumi:providers:kubernetes::k8s::037b697f-66aa-4ee8-aa6f-8a8550f5d071 => urn:pulumi:cluster_d4bbb119-72df-40d6-ba8b-0e02df0140a2_northeurope::cluster_environments::pulumi:providers:kubernetes::k8s::output<string>] | |
apiVersion: "apps/v1" | |
kind : "StatefulSet" | |
~ metadata : { | |
name : "grafana" | |
~ namespace: "grafana" => output<string> | |
} | |
~ spec : { | |
replicas : 1 | |
selector : { | |
matchLabels: { | |
name: "grafana" | |
} | |
} | |
serviceName : "grafana" | |
~ template : { | |
metadata: { | |
labels: { | |
name: "grafana" | |
} | |
} | |
~ spec : { | |
- containers : [secret] | |
+ containers : [ | |
+ [0]: { | |
+ args : [ | |
+ [0]: "-config.file=/etc/agent/agent.yaml" | |
+ [1]: "-enable-features=integrations-next" | |
+ [2]: "-server.http.address=0.0.0.0:80" | |
+ [3]: "-config.expand-env" | |
] | |
+ env : [ | |
+ [0]: { | |
+ name : "DIGIZUITE_CLUSTER_NAME" | |
+ value: "rhdh local cluster" | |
} | |
+ [1]: { | |
+ name : "DIGIZUITE_CLUSTER_ID" | |
+ value: "d4bbb119-72df-40d6-ba8b-0e02df0140a2" | |
} | |
+ [2]: { | |
+ name : "PROMETHEUS_URL" | |
+ value: "https://prometheus-us-central1.grafana.net" | |
} | |
+ [3]: { | |
+ name : "PROMETHEUS_USERNAME" | |
+ value: "58973" | |
} | |
+ [4]: { | |
+ name : "PROMETHEUS_PASSWORD" | |
+ value: [secret] | |
} | |
+ [5]: { | |
+ name : "TRACING_URL" | |
+ value: "https://tempo-us-central1.grafana.net:443" | |
} | |
+ [6]: { | |
+ name : "TRACING_USERNAME" | |
+ value: "24977" | |
} | |
+ [7]: { | |
+ name : "TRACING_PASSWORD" | |
+ value: [secret] | |
} | |
] | |
+ image : "grafana/agent:v0.32.1" | |
+ imagePullPolicy: "IfNotPresent" | |
+ name : "grafana" | |
+ ports : [ | |
+ [0]: { | |
+ containerPort: 80 | |
+ name : "http-metrics" | |
} | |
] | |
+ volumeMounts : [ | |
+ [0]: { | |
+ mountPath: "/var/lib/agent" | |
+ name : "agent-wal" | |
} | |
+ [1]: { | |
+ mountPath: "/etc/agent" | |
+ name : "grafana" | |
} | |
] | |
} | |
] | |
nodeSelector : { | |
digizuite/product: "third-party" | |
} | |
~ serviceAccountName: "grafana" => output<string> | |
~ volumes : [ | |
~ [0]: { | |
~ configMap: { | |
~ name: "grafana" => output<string> | |
} | |
name : "grafana" | |
} | |
] | |
} | |
} | |
updateStrategy : { | |
type: "RollingUpdate" | |
} | |
~ volumeClaimTemplates: [ | |
~ [0]: { | |
~ metadata: { | |
name : "agent-wal" | |
~ namespace: "grafana" => output<string> | |
} | |
spec : { | |
accessModes: [ | |
[0]: "ReadWriteOnce" | |
] | |
resources : { | |
requests: { | |
storage: "5Gi" | |
} | |
} | |
} | |
} | |
] | |
} | |
+-kubernetes:apps/v1:DaemonSet: (replace) | |
[id=grafana/promtail-windows] | |
[urn=urn:pulumi:cluster_d4bbb119-72df-40d6-ba8b-0e02df0140a2_northeurope::cluster_environments::dgz:dgz:cluster-components$dgz:monitoring:kubernetes$dgz:monitoring:logs$kubernetes:apps/v1:DaemonSet::logs_grafana_agent_windows] | |
[provider: urn:pulumi:cluster_d4bbb119-72df-40d6-ba8b-0e02df0140a2_northeurope::cluster_environments::pulumi:providers:kubernetes::k8s::037b697f-66aa-4ee8-aa6f-8a8550f5d071 => urn:pulumi:cluster_d4bbb119-72df-40d6-ba8b-0e02df0140a2_northeurope::cluster_environments::pulumi:providers:kubernetes::k8s::output<string>] | |
apiVersion: "apps/v1" | |
kind : "DaemonSet" | |
~ metadata : { | |
name : "promtail-windows" | |
~ namespace: "grafana" => output<string> | |
} | |
~ spec : { | |
minReadySeconds: 10 | |
selector : { | |
matchLabels: { | |
name: "promtail-windows" | |
} | |
} | |
~ template : { | |
metadata: { | |
labels: { | |
name: "promtail-windows" | |
} | |
} | |
~ spec : { | |
- containers : [secret] | |
+ containers : [ | |
+ [0]: { | |
+ args : [ | |
+ [0]: "-config.file=C:/etc/agent/agent.yaml" | |
+ [1]: "-enable-features=integrations-next" | |
+ [2]: "-server.http.address=0.0.0.0:80" | |
+ [3]: "-config.expand-env" | |
] | |
+ env : [ | |
+ [0]: { | |
+ name : "DIGIZUITE_CLUSTER_NAME" | |
+ value: "rhdh local cluster" | |
} | |
+ [1]: { | |
+ name : "DIGIZUITE_CLUSTER_ID" | |
+ value: "d4bbb119-72df-40d6-ba8b-0e02df0140a2" | |
} | |
+ [2]: { | |
+ name : "LOGS_URL" | |
+ value: "https://logs-prod-us-central1.grafana.net" | |
} | |
+ [3]: { | |
+ name : "LOGS_USERNAME" | |
+ value: "28465" | |
} | |
+ [4]: { | |
+ name : "LOGS_PASSWORD" | |
+ value: [secret] | |
} | |
+ [5]: { | |
+ name : "HOSTNAME" | |
+ valueFrom: { | |
+ fieldRef: { | |
+ fieldPath: "spec.nodeName" | |
} | |
} | |
} | |
] | |
+ image : "digizuite.azurecr.io/grafana-agent/windows:5.8.0-task-DAM-6078-logs-1" | |
+ imagePullPolicy: "IfNotPresent" | |
+ name : "grafana" | |
+ ports : [ | |
+ [0]: { | |
+ containerPort: 80 | |
+ name : "http-metrics" | |
} | |
] | |
+ resources : { | |
+ limits : { | |
+ cpu : "500m" | |
+ memory: "300Mi" | |
} | |
+ requests: { | |
+ cpu : "100m" | |
+ memory: "100Mi" | |
} | |
} | |
+ volumeMounts : [ | |
+ [0]: { | |
+ mountPath: "C:/etc/agent" | |
+ name : "grafana" | |
} | |
+ [1]: { | |
+ mountPath: "C:/var/log" | |
+ name : "varlog" | |
} | |
] | |
} | |
] | |
~ imagePullSecrets: [ | |
~ [0]: { | |
~ name: "regcreds" => output<string> | |
} | |
] | |
nodeSelector : { | |
kubernetes.io/os: "windows" | |
} | |
~ serviceAccount : "grafana" => output<string> | |
tolerations : [ | |
[0]: { | |
effect : "NoSchedule" | |
operator: "Exists" | |
} | |
] | |
~ volumes : [ | |
~ [0]: { | |
~ configMap: { | |
~ name: "promtail-windows" => output<string> | |
} | |
name : "grafana" | |
} | |
[1]: { | |
hostPath: { | |
path: "C:/var/log" | |
} | |
name : "varlog" | |
} | |
] | |
} | |
} | |
updateStrategy : { | |
type: "RollingUpdate" | |
} | |
} | |
+-kubernetes:core/v1:Service: (replace) | |
[id=grafana/grafana] | |
[urn=urn:pulumi:cluster_d4bbb119-72df-40d6-ba8b-0e02df0140a2_northeurope::cluster_environments::dgz:dgz:cluster-components$dgz:monitoring:kubernetes$dgz:monitoring:metrics$kubernetes:core/v1:Service::metrics_grafana_agent] | |
[provider: urn:pulumi:cluster_d4bbb119-72df-40d6-ba8b-0e02df0140a2_northeurope::cluster_environments::pulumi:providers:kubernetes::k8s::037b697f-66aa-4ee8-aa6f-8a8550f5d071 => urn:pulumi:cluster_d4bbb119-72df-40d6-ba8b-0e02df0140a2_northeurope::cluster_environments::pulumi:providers:kubernetes::k8s::output<string>] | |
apiVersion: "v1" | |
kind : "Service" | |
~ metadata : { | |
labels : { | |
name: "grafana" | |
} | |
name : "grafana" | |
~ namespace: "grafana" => output<string> | |
} | |
~ spec : { | |
clusterIP: "None" | |
ports : [ | |
[0]: { | |
name : "grafana-agent-http-metrics" | |
port : 80 | |
targetPort: 80 | |
} | |
] | |
~ selector : [secret] => output<string> | |
} | |
+-kubernetes:core/v1:Service: (replace) | |
[id=grafana/grafana-traces] | |
[urn=urn:pulumi:cluster_d4bbb119-72df-40d6-ba8b-0e02df0140a2_northeurope::cluster_environments::dgz:dgz:cluster-components$dgz:monitoring:kubernetes$dgz:monitoring:metrics$kubernetes:core/v1:Service::metrics_grafana_agent_traces] | |
[provider: urn:pulumi:cluster_d4bbb119-72df-40d6-ba8b-0e02df0140a2_northeurope::cluster_environments::pulumi:providers:kubernetes::k8s::037b697f-66aa-4ee8-aa6f-8a8550f5d071 => urn:pulumi:cluster_d4bbb119-72df-40d6-ba8b-0e02df0140a2_northeurope::cluster_environments::pulumi:providers:kubernetes::k8s::output<string>] | |
apiVersion: "v1" | |
kind : "Service" | |
~ metadata : { | |
labels : { | |
name: "grafana" | |
} | |
name : "grafana-traces" | |
~ namespace: "grafana" => output<string> | |
} | |
~ spec : { | |
ports : [ | |
[0]: { | |
name : "grafana-agent-traces-thrift-compact" | |
port : 6831 | |
protocol : "UDP" | |
targetPort: 6831 | |
} | |
] | |
~ selector: [secret] => output<string> | |
} | |
--outputs:-- | |
~ KubeConfig : [secret] => output<string> | |
~ RabbitMqClusterName : "digi-rabbitmq-cluster" => output<string> | |
~ RabbitMqClusterNamespace : "rabbitmq" => output<string> | |
+-kubernetes:sftpgo.digizuite.com/v1alpha1:SftpgoAdmin: (replace) | |
[id=sftpgo/digizuite-admin] | |
[urn=urn:pulumi:cluster_d4bbb119-72df-40d6-ba8b-0e02df0140a2_northeurope::cluster_environments::dgz:dgz:sftpgo$kubernetes:sftpgo.digizuite.com/v1alpha1:SftpgoAdmin::admin] | |
[provider: urn:pulumi:cluster_d4bbb119-72df-40d6-ba8b-0e02df0140a2_northeurope::cluster_environments::pulumi:providers:kubernetes::k8s::037b697f-66aa-4ee8-aa6f-8a8550f5d071 => urn:pulumi:cluster_d4bbb119-72df-40d6-ba8b-0e02df0140a2_northeurope::cluster_environments::pulumi:providers:kubernetes::k8s::output<string>] | |
apiVersion: "sftpgo.digizuite.com/v1alpha1" | |
kind : "SftpgoAdmin" | |
~ metadata : { | |
name : "digizuite-admin" | |
~ namespace: "sftpgo" => output<string> | |
} | |
~ spec : { | |
configuration : { | |
description: "The main administrator account used by Digizuite" | |
password : "$sI&198DTvM8" | |
permissions: [ | |
[0]: "all" | |
] | |
username : "digiadmin" | |
} | |
~ sftpgoServerReference: { | |
~ name : "sftpgo" => output<string> | |
~ namespace: "sftpgo" => output<string> | |
} | |
} | |
+-kubernetes:apps/v1:DaemonSet: (replace) | |
[id=grafana/promtail] | |
[urn=urn:pulumi:cluster_d4bbb119-72df-40d6-ba8b-0e02df0140a2_northeurope::cluster_environments::dgz:dgz:cluster-components$dgz:monitoring:kubernetes$dgz:monitoring:logs$kubernetes:apps/v1:DaemonSet::logs_grafana_agent] | |
[provider: urn:pulumi:cluster_d4bbb119-72df-40d6-ba8b-0e02df0140a2_northeurope::cluster_environments::pulumi:providers:kubernetes::k8s::037b697f-66aa-4ee8-aa6f-8a8550f5d071 => urn:pulumi:cluster_d4bbb119-72df-40d6-ba8b-0e02df0140a2_northeurope::cluster_environments::pulumi:providers:kubernetes::k8s::output<string>] | |
apiVersion: "apps/v1" | |
kind : "DaemonSet" | |
~ metadata : { | |
name : "promtail" | |
~ namespace: "grafana" => output<string> | |
} | |
~ spec : { | |
minReadySeconds: 10 | |
selector : { | |
matchLabels: { | |
name: "promtail" | |
} | |
} | |
~ template : { | |
metadata: { | |
labels: { | |
name: "promtail" | |
} | |
} | |
~ spec : { | |
- containers : [secret] | |
+ containers : [ | |
+ [0]: { | |
+ args : [ | |
+ [0]: "-config.file=/etc/agent/agent.yaml" | |
+ [1]: "-enable-features=integrations-next" | |
+ [2]: "-server.http.address=0.0.0.0:80" | |
+ [3]: "-config.expand-env" | |
] | |
+ env : [ | |
+ [0]: { | |
+ name : "DIGIZUITE_CLUSTER_NAME" | |
+ value: "rhdh local cluster" | |
} | |
+ [1]: { | |
+ name : "DIGIZUITE_CLUSTER_ID" | |
+ value: "d4bbb119-72df-40d6-ba8b-0e02df0140a2" | |
} | |
+ [2]: { | |
+ name : "LOGS_URL" | |
+ value: "https://logs-prod-us-central1.grafana.net" | |
} | |
+ [3]: { | |
+ name : "LOGS_USERNAME" | |
+ value: "28465" | |
} | |
+ [4]: { | |
+ name : "LOGS_PASSWORD" | |
+ value: [secret] | |
} | |
+ [5]: { | |
+ name : "HOSTNAME" | |
+ valueFrom: { | |
+ fieldRef: { | |
+ fieldPath: "spec.nodeName" | |
} | |
} | |
} | |
] | |
+ image : "grafana/agent:v0.32.1" | |
+ imagePullPolicy: "IfNotPresent" | |
+ name : "grafana" | |
+ ports : [ | |
+ [0]: { | |
+ containerPort: 80 | |
+ name : "http-metrics" | |
} | |
] | |
+ resources : { | |
+ limits : { | |
+ cpu : "500m" | |
+ memory: "300Mi" | |
} | |
+ requests: { | |
+ cpu : "100m" | |
+ memory: "100Mi" | |
} | |
} | |
+ securityContext: { | |
+ privileged: true | |
+ runAsUser : 0 | |
} | |
+ volumeMounts : [ | |
+ [0]: { | |
+ mountPath: "/etc/agent" | |
+ name : "grafana" | |
} | |
+ [1]: { | |
+ mountPath: "/var/log" | |
+ name : "varlog" | |
} | |
+ [2]: { | |
+ mountPath: "/var/lib/docker/containers" | |
+ name : "varlibdockercontainers" | |
+ readOnly : true | |
} | |
] | |
} | |
] | |
nodeSelector : { | |
kubernetes.io/os: "linux" | |
} | |
~ serviceAccount: "grafana" => output<string> | |
tolerations : [ | |
[0]: { | |
effect : "NoSchedule" | |
operator: "Exists" | |
} | |
] | |
~ volumes : [ | |
~ [0]: { | |
~ configMap: { | |
~ name: "promtail" => output<string> | |
} | |
name : "grafana" | |
} | |
[1]: { | |
hostPath: { | |
path: "/var/log" | |
} | |
name : "varlog" | |
} | |
[2]: { | |
hostPath: { | |
path: "/var/lib/docker/containers" | |
} | |
name : "varlibdockercontainers" | |
} | |
] | |
} | |
} | |
updateStrategy : { | |
type: "RollingUpdate" | |
} | |
} | |
+-kubernetes:traefik.containo.us/v1alpha1:IngressRouteTCP: (replace) | |
[id=sftpgo/sftpgosftpingress] | |
[urn=urn:pulumi:cluster_d4bbb119-72df-40d6-ba8b-0e02df0140a2_northeurope::cluster_environments::dgz:dgz:sftpgo$kubernetes:traefik.containo.us/v1alpha1:IngressRouteTCP::sftpgo-sftp-ingress] | |
[provider: urn:pulumi:cluster_d4bbb119-72df-40d6-ba8b-0e02df0140a2_northeurope::cluster_environments::pulumi:providers:kubernetes::k8s::037b697f-66aa-4ee8-aa6f-8a8550f5d071 => urn:pulumi:cluster_d4bbb119-72df-40d6-ba8b-0e02df0140a2_northeurope::cluster_environments::pulumi:providers:kubernetes::k8s::output<string>] | |
apiVersion: "traefik.containo.us/v1alpha1" | |
kind : "IngressRouteTCP" | |
~ metadata : { | |
name : "sftpgosftpingress" | |
~ namespace: "sftpgo" => output<string> | |
} | |
~ spec : { | |
entryPoints: [ | |
[0]: "sftp" | |
] | |
~ routes : [ | |
~ [0]: { | |
match : "HostSNI(`*`)" | |
~ services: [ | |
~ [0]: { | |
~ name : "sftpgo" => output<string> | |
~ port : 1111 => output<string> | |
proxyProtocol: { | |
version: 2 | |
} | |
} | |
] | |
} | |
] | |
} | |
+-kubernetes:networking.k8s.io/v1:Ingress: (replace) | |
[id=sftpgo/sftpgodashboardingress] | |
[urn=urn:pulumi:cluster_d4bbb119-72df-40d6-ba8b-0e02df0140a2_northeurope::cluster_environments::dgz:dgz:sftpgo$kubernetes:networking.k8s.io/v1:Ingress::sftpgo-web-ingress] | |
[provider: urn:pulumi:cluster_d4bbb119-72df-40d6-ba8b-0e02df0140a2_northeurope::cluster_environments::pulumi:providers:kubernetes::k8s::037b697f-66aa-4ee8-aa6f-8a8550f5d071 => urn:pulumi:cluster_d4bbb119-72df-40d6-ba8b-0e02df0140a2_northeurope::cluster_environments::pulumi:providers:kubernetes::k8s::output<string>] | |
apiVersion: "networking.k8s.io/v1" | |
kind : "Ingress" | |
~ metadata : { | |
annotations: { | |
traefik.ingress.kubernetes.io/router.entrypoints : "web" | |
traefik.ingress.kubernetes.io/router.tls : "false" | |
traefik.ingress.kubernetes.io/router.tls.certresolver : "letsencrypt" | |
traefik.ingress.kubernetes.io/router.tls.domains.0.main: "*.rhdh.dk" | |
} | |
name : "sftpgodashboardingress" | |
~ namespace : "sftpgo" => output<string> | |
} | |
~ spec : { | |
~ rules: [ | |
~ [0]: { | |
host: "digizuite-northeurope-d4bbb11972df40d6ba8b0e02df0140a2.rhdh.dk" | |
~ http: { | |
~ paths: [ | |
~ [0]: { | |
~ backend : { | |
~ service: { | |
~ name: "sftpgo" => output<string> | |
~ port: { | |
~ number: 3333 => output<string> | |
} | |
} | |
} | |
path : "/web" | |
pathType: "Prefix" | |
} | |
~ [1]: { | |
~ backend : { | |
~ service: { | |
~ name: "sftpgo" => output<string> | |
~ port: { | |
~ number: 3333 => output<string> | |
} | |
} | |
} | |
path : "/static" | |
pathType: "Prefix" | |
} | |
] | |
} | |
} | |
] | |
} | |
- azure-native:containerservice:ManagedCluster: (delete) 🔒 | |
error: Preview failed: resource "urn:pulumi:cluster_d4bbb119-72df-40d6-ba8b-0e02df0140a2_northeurope::cluster_environments::dgz:dgz:KubernetesCluster$azure-native:containerservice:ManagedCluster::cluster" cannot be deleted | |
because it is protected. To unprotect the resource, either remove the `protect` flag from the resource in your Pulumi program and run `pulumi up`, or use the command: | |
`pulumi state unprotect 'urn:pulumi:cluster_d4bbb119-72df-40d6-ba8b-0e02df0140a2_northeurope::cluster_environments::dgz:dgz:KubernetesCluster$azure-native:containerservice:ManagedCluster::cluster'` | |
[id=/subscriptions/44eeb119-3e69-49bb-a61d-c476cd7e0de9/resourcegroups/dgz_k8s_d4bbb1/providers/Microsoft.ContainerService/managedClusters/dgz_k8s_d4bbb1_cluster] | |
error: preview failed | |
[urn=urn:pulumi:cluster_d4bbb119-72df-40d6-ba8b-0e02df0140a2_northeurope::cluster_environments::dgz:dgz:KubernetesCluster$azure-native:containerservice:ManagedCluster::cluster] | |
[provider=urn:pulumi:cluster_d4bbb119-72df-40d6-ba8b-0e02df0140a2_northeurope::cluster_environments::pulumi:providers:azure-native::azure-provider::5df398d3-ed0f-4f97-a8a1-4312993e162e] | |
agentPoolProfiles : [ | |
[0]: { | |
count : 1 | |
enableAutoScaling : true | |
maxCount : 1 | |
maxPods : 250 | |
minCount : 1 | |
mode : "User" | |
name : "digibatch" | |
nodeLabels : { | |
digizuite/product: "digibatch" | |
} | |
orchestratorVersion: "1.25.6" | |
vmSize : "Standard_B8ms" | |
vnetSubnetID : "/subscriptions/44eeb119-3e69-49bb-a61d-c476cd7e0de9/resourceGroups/dgz_k8s_d4bbb1/providers/Microsoft.Network/virtualNetworks/dgz-d4bbb11972df40d6ba8b0e02df0140a2/subnets/digibatch_pool_subnet" | |
} | |
[1]: { | |
count : 1 | |
enableAutoScaling : true | |
enableFIPS : false | |
kubeletDiskType : "OS" | |
maxCount : 1 | |
maxPods : 250 | |
minCount : 1 | |
mode : "User" | |
name : "digicore" | |
nodeLabels : { | |
digizuite/product: "digizuite-core" | |
} | |
orchestratorVersion: "1.25.6" | |
osDiskSizeGB : 128 | |
osDiskType : "Managed" | |
osSKU : "Ubuntu" | |
osType : "Linux" | |
type : "VirtualMachineScaleSets" | |
vmSize : "Standard_B4ms" | |
vnetSubnetID : "/subscriptions/44eeb119-3e69-49bb-a61d-c476cd7e0de9/resourceGroups/dgz_k8s_d4bbb1/providers/Microsoft.Network/virtualNetworks/dgz-d4bbb11972df40d6ba8b0e02df0140a2/subnets/digizuite_core_pool_subnet" | |
} | |
[2]: { | |
count : 1 | |
enableFIPS : false | |
kubeletDiskType : "OS" | |
maxPods : 30 | |
mode : "System" | |
name : "system" | |
orchestratorVersion: "1.25.6" | |
osDiskSizeGB : 128 | |
osDiskType : "Managed" | |
osSKU : "Ubuntu" | |
osType : "Linux" | |
type : "VirtualMachineScaleSets" | |
vmSize : "Standard_B4ms" | |
vnetSubnetID : "/subscriptions/44eeb119-3e69-49bb-a61d-c476cd7e0de9/resourceGroups/dgz_k8s_d4bbb1/providers/Microsoft.Network/virtualNetworks/dgz-d4bbb11972df40d6ba8b0e02df0140a2/subnets/cluster_main_subnet" | |
} | |
[3]: { | |
count : 1 | |
enableAutoScaling : true | |
enableFIPS : false | |
kubeletDiskType : "OS" | |
maxCount : 1 | |
maxPods : 250 | |
minCount : 1 | |
mode : "User" | |
name : "thirdparty" | |
nodeLabels : { | |
digizuite/product: "third-party" | |
} | |
orchestratorVersion: "1.25.6" | |
osDiskSizeGB : 128 | |
osDiskType : "Managed" | |
osSKU : "Ubuntu" | |
osType : "Linux" | |
type : "VirtualMachineScaleSets" | |
vmSize : "Standard_B4ms" | |
vnetSubnetID : "/subscriptions/44eeb119-3e69-49bb-a61d-c476cd7e0de9/resourceGroups/dgz_k8s_d4bbb1/providers/Microsoft.Network/virtualNetworks/dgz-d4bbb11972df40d6ba8b0e02df0140a2/subnets/third_party_pool_subnet" | |
} | |
[4]: { | |
count : 1 | |
enableAutoScaling : true | |
enableFIPS : false | |
kubeletDiskType : "OS" | |
maxCount : 1 | |
maxPods : 250 | |
minCount : 1 | |
mode : "User" | |
name : "window" | |
nodeLabels : { | |
digizuite/product: "windows" | |
} | |
orchestratorVersion: "1.25.6" | |
osDiskSizeGB : 128 | |
osDiskType : "Managed" | |
osSKU : "Windows2022" | |
osType : "Windows" | |
type : "VirtualMachineScaleSets" | |
vmSize : "Standard_B4ms" | |
vnetSubnetID : "/subscriptions/44eeb119-3e69-49bb-a61d-c476cd7e0de9/resourceGroups/dgz_k8s_d4bbb1/providers/Microsoft.Network/virtualNetworks/dgz-d4bbb11972df40d6ba8b0e02df0140a2/subnets/windows_pool_subnet" | |
} | |
] | |
autoScalerProfile : { | |
scaleDownDelayAfterAdd: "1m" | |
scaleDownUnneededTime : "1m" | |
} | |
autoUpgradeProfile: { | |
upgradeChannel: "stable" | |
} | |
dnsPrefix : "dgz-k8s-northeurope-d4bbb1" | |
identity : { | |
type: "SystemAssigned" | |
} | |
kubernetesVersion : "1.25.6" | |
location : "northeurope" | |
networkProfile : { | |
dnsServiceIP : "10.0.0.10" | |
dockerBridgeCidr: "172.17.0.1/16" | |
networkPlugin : "azure" | |
outboundType : "loadBalancer" | |
podCidr : "10.244.0.0/16" | |
serviceCidr : "10.0.0.0/16" | |
} | |
resourceGroupName : "dgz_k8s_d4bbb1" | |
resourceName : "dgz_k8s_d4bbb1_cluster" | |
tags : { | |
CreatedBy : "local-rhdh" | |
RegionId : "d4bbb119-72df-40d6-ba8b-0e02df0140a2" | |
RegionName : "rhdh local cluster" | |
SubscriptionName: "Azure dev" | |
} | |
Resources: | |
+ 1 to create | |
~ 1 to update | |
+-38 to replace | |
40 changes. 38 unchanged | |
Pulumi.Automation.Commands.Exceptions.CommandException: code: -1 | |
stdout: Previewing update (cluster_d4bbb119-72df-40d6-ba8b-0e02df0140a2_northeurope) | |
View Live: https://app.pulumi.com/rnd_digizuite/cluster_environments/cluster_d4bbb119-72df-40d6-ba8b-0e02df0140a2_northeurope/previews/8ec71aa9-a2d1-42a5-ac15-74cd0c245448 | |
pulumi:pulumi:Stack: (same) | |
[urn=urn:pulumi:cluster_d4bbb119-72df-40d6-ba8b-0e02df0140a2_northeurope::cluster_environments::pulumi:pulumi:Stack::cluster_environments-cluster_d4bbb119-72df-40d6-ba8b-0e02df0140a2_northeurope] | |
+ azure-native:containerservice/v20230102preview:ManagedCluster: (create) 🔒 | |
[urn=urn:pulumi:cluster_d4bbb119-72df-40d6-ba8b-0e02df0140a2_northeurope::cluster_environments::dgz:dgz:KubernetesCluster$azure-native:containerservice/v20230102preview:ManagedCluster::cluster] | |
[provider=urn:pulumi:cluster_d4bbb119-72df-40d6-ba8b-0e02df0140a2_northeurope::cluster_environments::pulumi:providers:azure-native::azure-provider::5df398d3-ed0f-4f97-a8a1-4312993e162e] | |
agentPoolProfiles : [ | |
[0]: { | |
count : 1 | |
mode : "System" | |
name : "system" | |
vmSize : "Standard_B4ms" | |
vnetSubnetID: "/subscriptions/44eeb119-3e69-49bb-a61d-c476cd7e0de9/resourceGroups/dgz_k8s_d4bbb1/providers/Microsoft.Network/virtualNetworks/dgz-d4bbb11972df40d6ba8b0e02df0140a2/subnets/cluster_main_subnet" | |
} | |
] | |
autoScalerProfile : { | |
scaleDownDelayAfterAdd: "1m" | |
scaleDownUnneededTime : "1m" | |
} | |
autoUpgradeProfile: { | |
upgradeChannel: "stable" | |
} | |
dnsPrefix : "dgz-k8s-northeurope-d4bbb1" | |
enableRBAC : true | |
identity : { | |
type: "SystemAssigned" | |
} | |
kubernetesVersion : "1.25.5" | |
location : "northeurope" | |
networkProfile : { | |
dnsServiceIP : "10.0.0.10" | |
dockerBridgeCidr: "172.17.0.1/16" | |
networkPlugin : "azure" | |
outboundType : "loadBalancer" | |
podCidr : "10.244.0.0/16" | |
serviceCidr : "10.0.0.0/16" | |
} | |
resourceGroupName : "dgz_k8s_d4bbb1" | |
resourceName : "dgz_k8s_d4bbb1_cluster" | |
tags : { | |
CreatedBy : "local-rhdh" | |
RegionId : "d4bbb119-72df-40d6-ba8b-0e02df0140a2" | |
RegionName : "rhdh local cluster" | |
SubscriptionName: "Azure dev" | |
} | |
+-pulumi:providers:kubernetes: (replace) | |
[id=037b697f-66aa-4ee8-aa6f-8a8550f5d071] | |
[urn=urn:pulumi:cluster_d4bbb119-72df-40d6-ba8b-0e02df0140a2_northeurope::cluster_environments::pulumi:providers:kubernetes::k8s] | |
deleteUnreachable : "true" | |
enableServerSideApply: "true" | |
~ kubeconfig : [secret] => output<string> | |
version : "3.29.0" | |
+-azure-native:containerservice:AgentPool: (replace) | |
[id=/subscriptions/44eeb119-3e69-49bb-a61d-c476cd7e0de9/resourcegroups/dgz_k8s_d4bbb1/providers/Microsoft.ContainerService/managedClusters/dgz_k8s_d4bbb1_cluster/agentPools/digibatch] | |
[urn=urn:pulumi:cluster_d4bbb119-72df-40d6-ba8b-0e02df0140a2_northeurope::cluster_environments::dgz:dgz:KubernetesCluster$azure-native:containerservice:AgentPool::digibatch_pool] | |
[provider=urn:pulumi:cluster_d4bbb119-72df-40d6-ba8b-0e02df0140a2_northeurope::cluster_environments::pulumi:providers:azure-native::azure-provider::5df398d3-ed0f-4f97-a8a1-4312993e162e] | |
~ resourceName: "dgz_k8s_d4bbb1_cluster" => output<string> | |
+-azure-native:containerservice:AgentPool: (replace) | |
[id=/subscriptions/44eeb119-3e69-49bb-a61d-c476cd7e0de9/resourcegroups/dgz_k8s_d4bbb1/providers/Microsoft.ContainerService/managedClusters/dgz_k8s_d4bbb1_cluster/agentPools/digicore] | |
[urn=urn:pulumi:cluster_d4bbb119-72df-40d6-ba8b-0e02df0140a2_northeurope::cluster_environments::dgz:dgz:KubernetesCluster$azure-native:containerservice:AgentPool::digizuite_core_pool] | |
[provider=urn:pulumi:cluster_d4bbb119-72df-40d6-ba8b-0e02df0140a2_northeurope::cluster_environments::pulumi:providers:azure-native::azure-provider::5df398d3-ed0f-4f97-a8a1-4312993e162e] | |
~ resourceName: "dgz_k8s_d4bbb1_cluster" => output<string> | |
+-azure-native:containerservice:AgentPool: (replace) | |
[id=/subscriptions/44eeb119-3e69-49bb-a61d-c476cd7e0de9/resourcegroups/dgz_k8s_d4bbb1/providers/Microsoft.ContainerService/managedClusters/dgz_k8s_d4bbb1_cluster/agentPools/thirdparty] | |
[urn=urn:pulumi:cluster_d4bbb119-72df-40d6-ba8b-0e02df0140a2_northeurope::cluster_environments::dgz:dgz:KubernetesCluster$azure-native:containerservice:AgentPool::third_party_pool] | |
[provider=urn:pulumi:cluster_d4bbb119-72df-40d6-ba8b-0e02df0140a2_northeurope::cluster_environments::pulumi:providers:azure-native::azure-provider::5df398d3-ed0f-4f97-a8a1-4312993e162e] | |
~ resourceName: "dgz_k8s_d4bbb1_cluster" => output<string> | |
+-azure-native:containerservice:AgentPool: (replace) | |
[id=/subscriptions/44eeb119-3e69-49bb-a61d-c476cd7e0de9/resourcegroups/dgz_k8s_d4bbb1/providers/Microsoft.ContainerService/managedClusters/dgz_k8s_d4bbb1_cluster/agentPools/window] | |
[urn=urn:pulumi:cluster_d4bbb119-72df-40d6-ba8b-0e02df0140a2_northeurope::cluster_environments::dgz:dgz:KubernetesCluster$azure-native:containerservice:AgentPool::windows_pool] | |
[provider=urn:pulumi:cluster_d4bbb119-72df-40d6-ba8b-0e02df0140a2_northeurope::cluster_environments::pulumi:providers:azure-native::azure-provider::5df398d3-ed0f-4f97-a8a1-4312993e162e] | |
~ resourceName: "dgz_k8s_d4bbb1_cluster" => output<string> | |
+-kubernetes:core/v1:Namespace: (replace) | |
[id=grafana] | |
[urn=urn:pulumi:cluster_d4bbb119-72df-40d6-ba8b-0e02df0140a2_northeurope::cluster_environments::dgz:dgz:cluster-components$dgz:monitoring:kubernetes$dgz:monitoring:base$kubernetes:core/v1:Namespace::basics_grafana] | |
[provider: urn:pulumi:cluster_d4bbb119-72df-40d6-ba8b-0e02df0140a2_northeurope::cluster_environments::pulumi:providers:kubernetes::k8s::037b697f-66aa-4ee8-aa6f-8a8550f5d071 => urn:pulumi:cluster_d4bbb119-72df-40d6-ba8b-0e02df0140a2_northeurope::cluster_environments::pulumi:providers:kubernetes::k8s::output<string>] | |
apiVersion: "v1" | |
kind : "Namespace" | |
metadata : { | |
name: "grafana" | |
} | |
+-kubernetes:core/v1:Namespace: (replace) | |
[id=rabbitmq] | |
[urn=urn:pulumi:cluster_d4bbb119-72df-40d6-ba8b-0e02df0140a2_northeurope::cluster_environments::dgz:dgz:cluster-components$dgz:dgz:RabbitMqCluster$kubernetes:core/v1:Namespace::rabbitmq-namespace] | |
[provider: urn:pulumi:cluster_d4bbb119-72df-40d6-ba8b-0e02df0140a2_northeurope::cluster_environments::pulumi:providers:kubernetes::k8s::037b697f-66aa-4ee8-aa6f-8a8550f5d071 => urn:pulumi:cluster_d4bbb119-72df-40d6-ba8b-0e02df0140a2_northeurope::cluster_environments::pulumi:providers:kubernetes::k8s::output<string>] | |
apiVersion: "v1" | |
kind : "Namespace" | |
metadata : { | |
name: "rabbitmq" | |
} | |
+-kubernetes:core/v1:Namespace: (replace) | |
[id=traefik] | |
[urn=urn:pulumi:cluster_d4bbb119-72df-40d6-ba8b-0e02df0140a2_northeurope::cluster_environments::dgz:dgz:cluster-components$dgz:dgz:traefik$kubernetes:core/v1:Namespace::traefik] | |
[provider: urn:pulumi:cluster_d4bbb119-72df-40d6-ba8b-0e02df0140a2_northeurope::cluster_environments::pulumi:providers:kubernetes::k8s::037b697f-66aa-4ee8-aa6f-8a8550f5d071 => urn:pulumi:cluster_d4bbb119-72df-40d6-ba8b-0e02df0140a2_northeurope::cluster_environments::pulumi:providers:kubernetes::k8s::output<string>] | |
apiVersion: "v1" | |
kind : "Namespace" | |
metadata : { | |
name: "traefik" | |
} | |
+-kubernetes:core/v1:Namespace: (replace) | |
[id=keda] | |
[urn=urn:pulumi:cluster_d4bbb119-72df-40d6-ba8b-0e02df0140a2_northeurope::cluster_environments::dgz:dgz:cluster-components$dgz:k8s:keda$kubernetes:core/v1:Namespace::keda-namespace] | |
[provider: urn:pulumi:cluster_d4bbb119-72df-40d6-ba8b-0e02df0140a2_northeurope::cluster_environments::pulumi:providers:kubernetes::k8s::037b697f-66aa-4ee8-aa6f-8a8550f5d071 => urn:pulumi:cluster_d4bbb119-72df-40d6-ba8b-0e02df0140a2_northeurope::cluster_environments::pulumi:providers:kubernetes::k8s::output<string>] | |
apiVersion: "v1" | |
kind : "Namespace" | |
metadata : { | |
name: "keda" | |
} | |
+-kubernetes:core/v1:Namespace: (replace) | |
[id=nats] | |
[urn=urn:pulumi:cluster_d4bbb119-72df-40d6-ba8b-0e02df0140a2_northeurope::cluster_environments::dgz:dgz:cluster-components$dgz:dgz:Nats$kubernetes:core/v1:Namespace::nats-namespace] | |
[provider: urn:pulumi:cluster_d4bbb119-72df-40d6-ba8b-0e02df0140a2_northeurope::cluster_environments::pulumi:providers:kubernetes::k8s::037b697f-66aa-4ee8-aa6f-8a8550f5d071 => urn:pulumi:cluster_d4bbb119-72df-40d6-ba8b-0e02df0140a2_northeurope::cluster_environments::pulumi:providers:kubernetes::k8s::output<string>] | |
apiVersion: "v1" | |
kind : "Namespace" | |
metadata : { | |
name: "nats" | |
} | |
+-kubernetes:storage.k8s.io/v1:StorageClass: (replace) | |
[id=traefik-certificate-storage-362247d4] | |
[urn=urn:pulumi:cluster_d4bbb119-72df-40d6-ba8b-0e02df0140a2_northeurope::cluster_environments::dgz:dgz:cluster-components$dgz:dgz:traefik$kubernetes:storage.k8s.io/v1:StorageClass::traefik-certificate-storage] | |
[provider: urn:pulumi:cluster_d4bbb119-72df-40d6-ba8b-0e02df0140a2_northeurope::cluster_environments::pulumi:providers:kubernetes::k8s::037b697f-66aa-4ee8-aa6f-8a8550f5d071 => urn:pulumi:cluster_d4bbb119-72df-40d6-ba8b-0e02df0140a2_northeurope::cluster_environments::pulumi:providers:kubernetes::k8s::output<string>] | |
allowVolumeExpansion: true | |
apiVersion : "storage.k8s.io/v1" | |
kind : "StorageClass" | |
- metadata : { | |
- annotations: { | |
- pulumi.com/autonamed: "true" | |
} | |
- name : "traefik-certificate-storage-362247d4" | |
} | |
parameters : { | |
skuname: "Premium_LRS" | |
} | |
provisioner : "disk.csi.azure.com" | |
reclaimPolicy : "Delete" | |
volumeBindingMode : "WaitForFirstConsumer" | |
+-kubernetes:storage.k8s.io/v1:StorageClass: (replace) | |
[id=digi-rabbitmq-cluster-ff37de80] | |
[urn=urn:pulumi:cluster_d4bbb119-72df-40d6-ba8b-0e02df0140a2_northeurope::cluster_environments::dgz:dgz:cluster-components$dgz:dgz:RabbitMqCluster$kubernetes:storage.k8s.io/v1:StorageClass::digi-rabbitmq-cluster] | |
[provider: urn:pulumi:cluster_d4bbb119-72df-40d6-ba8b-0e02df0140a2_northeurope::cluster_environments::pulumi:providers:kubernetes::k8s::037b697f-66aa-4ee8-aa6f-8a8550f5d071 => urn:pulumi:cluster_d4bbb119-72df-40d6-ba8b-0e02df0140a2_northeurope::cluster_environments::pulumi:providers:kubernetes::k8s::output<string>] | |
allowVolumeExpansion: true | |
apiVersion : "storage.k8s.io/v1" | |
kind : "StorageClass" | |
- metadata : { | |
- annotations: { | |
- pulumi.com/autonamed: "true" | |
} | |
- name : "digi-rabbitmq-cluster-ff37de80" | |
} | |
parameters : { | |
skuname: "Premium_LRS" | |
} | |
provisioner : "disk.csi.azure.com" | |
reclaimPolicy : "Delete" | |
volumeBindingMode : "WaitForFirstConsumer" | |
+-kubernetes:rbac.authorization.k8s.io/v1:ClusterRole: (replace) | |
[id=grafana] | |
[urn=urn:pulumi:cluster_d4bbb119-72df-40d6-ba8b-0e02df0140a2_northeurope::cluster_environments::dgz:dgz:cluster-components$dgz:monitoring:kubernetes$dgz:monitoring:base$kubernetes:rbac.authorization.k8s.io/v1:ClusterRole::basics_grafana_agent] | |
[provider: urn:pulumi:cluster_d4bbb119-72df-40d6-ba8b-0e02df0140a2_northeurope::cluster_environments::pulumi:providers:kubernetes::k8s::037b697f-66aa-4ee8-aa6f-8a8550f5d071 => urn:pulumi:cluster_d4bbb119-72df-40d6-ba8b-0e02df0140a2_northeurope::cluster_environments::pulumi:providers:kubernetes::k8s::output<string>] | |
apiVersion: "rbac.authorization.k8s.io/v1" | |
kind : "ClusterRole" | |
metadata : { | |
name: "grafana" | |
} | |
rules : [ | |
[0]: { | |
apiGroups: [ | |
[0]: "" | |
] | |
resources: [ | |
[0]: "nodes" | |
[1]: "nodes/proxy" | |
[2]: "services" | |
[3]: "endpoints" | |
[4]: "pods" | |
[5]: "events" | |
] | |
verbs : [ | |
[0]: "get" | |
[1]: "list" | |
[2]: "watch" | |
] | |
} | |
[1]: { | |
nonResourceURLs: [ | |
[0]: "/metrics" | |
] | |
verbs : [ | |
[0]: "get" | |
] | |
} | |
] | |
+-kubernetes:core/v1:Namespace: (replace) | |
[id=sftpgo] | |
[urn=urn:pulumi:cluster_d4bbb119-72df-40d6-ba8b-0e02df0140a2_northeurope::cluster_environments::dgz:dgz:sftpgo$kubernetes:core/v1:Namespace::sftpgo] | |
[provider: urn:pulumi:cluster_d4bbb119-72df-40d6-ba8b-0e02df0140a2_northeurope::cluster_environments::pulumi:providers:kubernetes::k8s::037b697f-66aa-4ee8-aa6f-8a8550f5d071 => urn:pulumi:cluster_d4bbb119-72df-40d6-ba8b-0e02df0140a2_northeurope::cluster_environments::pulumi:providers:kubernetes::k8s::output<string>] | |
apiVersion: "v1" | |
kind : "Namespace" | |
metadata : { | |
name: "sftpgo" | |
} | |
+-kubernetes:core/v1:ServiceAccount: (replace) | |
[id=grafana/grafana] | |
[urn=urn:pulumi:cluster_d4bbb119-72df-40d6-ba8b-0e02df0140a2_northeurope::cluster_environments::dgz:dgz:cluster-components$dgz:monitoring:kubernetes$dgz:monitoring:base$kubernetes:core/v1:ServiceAccount::basics_grafana_agent] | |
[provider: urn:pulumi:cluster_d4bbb119-72df-40d6-ba8b-0e02df0140a2_northeurope::cluster_environments::pulumi:providers:kubernetes::k8s::037b697f-66aa-4ee8-aa6f-8a8550f5d071 => urn:pulumi:cluster_d4bbb119-72df-40d6-ba8b-0e02df0140a2_northeurope::cluster_environments::pulumi:providers:kubernetes::k8s::output<string>] | |
apiVersion: "v1" | |
kind : "ServiceAccount" | |
~ metadata : { | |
name : "grafana" | |
~ namespace: "grafana" => output<string> | |
} | |
+-kubernetes:core/v1:Secret: (replace) | |
[id=grafana/regcreds] | |
[urn=urn:pulumi:cluster_d4bbb119-72df-40d6-ba8b-0e02df0140a2_northeurope::cluster_environments::dgz:dgz:cluster-components$dgz:monitoring:kubernetes$dgz:monitoring:logs$kubernetes:core/v1:Secret::logs_registry-credentials] | |
[provider: urn:pulumi:cluster_d4bbb119-72df-40d6-ba8b-0e02df0140a2_northeurope::cluster_environments::pulumi:providers:kubernetes::k8s::037b697f-66aa-4ee8-aa6f-8a8550f5d071 => urn:pulumi:cluster_d4bbb119-72df-40d6-ba8b-0e02df0140a2_northeurope::cluster_environments::pulumi:providers:kubernetes::k8s::output<string>] | |
apiVersion: "v1" | |
- data : [secret] | |
+ data : { | |
+ .dockerconfigjson: "eyJhdXRocyI6eyJkaWdpenVpdGUuYXp1cmVjci5pbyI6eyJ1c2VybmFtZSI6InJoZGh0ZXN0IiwicGFzc3dvcmQiOiJMejBhcVB6MWJxbXo4RWRwZlZ5d1F1REZtZ1hZT015Q3p2ZGZoS1VEamxcdTAwMkJBQ1JBbmV6STAiLCJhdXRoIjoiY21oa2FIUmxjM1E2VEhvd1lYRlFlakZpY1cxNk9FVmtjR1pXZVhkUmRVUkdiV2RZV1U5TmVVTjZkbVJtYUV0VlJHcHNLMEZEVWtGdVpYcEpNQT09In19fQ==" | |
} | |
kind : "Secret" | |
~ metadata : { | |
name : "regcreds" | |
~ namespace: "grafana" => output<string> | |
} | |
type : "kubernetes.io/dockerconfigjson" | |
+-kubernetes:core/v1:ConfigMap: (replace) | |
[id=grafana/promtail] | |
[urn=urn:pulumi:cluster_d4bbb119-72df-40d6-ba8b-0e02df0140a2_northeurope::cluster_environments::dgz:dgz:cluster-components$dgz:monitoring:kubernetes$dgz:monitoring:logs$kubernetes:core/v1:ConfigMap::logs_grafana_agent_logs] | |
[provider: urn:pulumi:cluster_d4bbb119-72df-40d6-ba8b-0e02df0140a2_northeurope::cluster_environments::pulumi:providers:kubernetes::k8s::037b697f-66aa-4ee8-aa6f-8a8550f5d071 => urn:pulumi:cluster_d4bbb119-72df-40d6-ba8b-0e02df0140a2_northeurope::cluster_environments::pulumi:providers:kubernetes::k8s::output<string>] | |
apiVersion: "v1" | |
data : { | |
agent.yaml: (yaml) { | |
integrations: { | |
eventhandler: { | |
cache_path : "/var/lib/agent/eventhandler.cache" | |
logs_instance: "application-logs" | |
} | |
} | |
logs : { | |
configs: [ | |
[0]: { | |
clients : [ | |
[0]: { | |
basic_auth : { | |
password: "${LOGS_PASSWORD}" | |
username: "${LOGS_USERNAME}" | |
} | |
external_labels: { | |
cluster : "${DIGIZUITE_CLUSTER_NAME}" | |
clusterId: "${DIGIZUITE_CLUSTER_ID}" | |
job : "integrations/kubernetes/eventhandler" | |
} | |
url : "${LOGS_URL}/loki/api/v1/push" | |
} | |
] | |
name : "application-logs" | |
positions : { | |
filename: "/tmp/positions.yaml" | |
} | |
scrape_configs: [ | |
[0]: { | |
job_name : "pod-logs" | |
kubernetes_sd_configs: [ | |
[0]: { | |
role: "pod" | |
} | |
] | |
pipeline_stages : [ | |
[0]: { | |
cri: {} | |
} | |
[1]: { | |
match: { | |
selector: "{scrapeTarget=\"digizuite\"}" | |
stages : [ | |
[0]: { | |
json: { | |
expressions: { | |
level : "LogLevel" | |
serviceName: "ServiceName" | |
time : "Time" | |
} | |
} | |
} | |
[1]: { | |
labels: { | |
level : <null> | |
serviceName: <null> | |
} | |
} | |
[2]: { | |
timestamp: { | |
format: "2006-01-02T15:04:05.9999999-07:00" | |
source: "time" | |
} | |
} | |
] | |
} | |
} | |
] | |
relabel_configs : [ | |
[0]: { | |
source_labels: [ | |
[0]: "__meta_kubernetes_pod_node_name" | |
] | |
target_label : "__host__" | |
} | |
[1]: { | |
action: "labelmap" | |
regex : "__meta_kubernetes_pod_label_(.+)" | |
} | |
[2]: { | |
action : "replace" | |
replacement : "$1" | |
separator : "/" | |
source_labels: [ | |
[0]: "__meta_kubernetes_namespace" | |
[1]: "__meta_kubernetes_pod_name" | |
] | |
target_label : "job" | |
} | |
[3]: { | |
action : "replace" | |
source_labels: [ | |
[0]: "__meta_kubernetes_namespace" | |
] | |
target_label : "namespace" | |
} | |
[4]: { | |
action : "replace" | |
source_labels: [ | |
[0]: "__meta_kubernetes_pod_name" | |
] | |
target_label : "pod" | |
} | |
[5]: { | |
action : "replace" | |
source_labels: [ | |
[0]: "__meta_kubernetes_pod_container_name" | |
] | |
target_label : "container" | |
} | |
[6]: { | |
replacement : "/var/log/pods/*$1/*.log" | |
separator : "/" | |
source_labels: [ | |
[0]: "__meta_kubernetes_pod_uid" | |
[1]: "__meta_kubernetes_pod_container_name" | |
] | |
target_label : "__path__" | |
} | |
[7]: { | |
action: "labeldrop" | |
regex : "pod_template_hash|app" | |
} | |
] | |
} | |
] | |
target_config : { | |
sync_period: "10s" | |
} | |
} | |
] | |
} | |
} | |
} | |
kind : "ConfigMap" | |
~ metadata : { | |
name : "promtail" | |
~ namespace: "grafana" => output<string> | |
} | |
+-kubernetes:helm.sh/v3:Release: (replace) | |
[id=sftpgo/sftpgo-operator] | |
[urn=urn:pulumi:cluster_d4bbb119-72df-40d6-ba8b-0e02df0140a2_northeurope::cluster_environments::dgz:dgz:sftpgo$kubernetes:helm.sh/v3:Release::sftpgo-chart] | |
[provider: urn:pulumi:cluster_d4bbb119-72df-40d6-ba8b-0e02df0140a2_northeurope::cluster_environments::pulumi:providers:kubernetes::k8s::037b697f-66aa-4ee8-aa6f-8a8550f5d071 => urn:pulumi:cluster_d4bbb119-72df-40d6-ba8b-0e02df0140a2_northeurope::cluster_environments::pulumi:providers:kubernetes::k8s::output<string>] | |
- allowNullValues : false | |
atomic : false | |
chart : "sftpgo-operator" | |
cleanupOnFail : false | |
+ compat : "true" | |
- createNamespace : false | |
- dependencyUpdate : false | |
- description : "" | |
- devel : false | |
- disableCRDHooks : false | |
- disableOpenapiValidation: false | |
- disableWebhooks : false | |
forceUpdate : true | |
- keyring : "" | |
- lint : false | |
name : "sftpgo-operator" | |
~ namespace : "sftpgo" => output<string> | |
- postrender : "" | |
- recreatePods : false | |
- renderSubchartNotes : false | |
- replace : false | |
~ repositoryOpts : { | |
- caFile : "" | |
- certFile: "" | |
- keyFile : "" | |
- password: "" | |
repo : "https://digizuite.github.io/sftpgo-k8s-operator" | |
- username: "" | |
} | |
- resetValues : false | |
- resourceNames : { | |
- ClusterRole.rbac.authorization.k8s.io/rbac.authorization.k8s.io/v1 : [ | |
- [0]: "sftpgo-operator-role" | |
- [1]: "sftpgo/sftpgo-service-binding-role" | |
] | |
- ClusterRoleBinding.rbac.authorization.k8s.io/rbac.authorization.k8s.io/v1: [ | |
- [0]: "sftpgo-operator-rolebinding" | |
] | |
- CustomResourceDefinition.apiextensions.k8s.io/apiextensions.k8s.io/v1 : [ | |
- [0]: "sftpgoadmins.sftpgo.digizuite.com" | |
- [1]: "sftpgofolders.sftpgo.digizuite.com" | |
- [2]: "sftpgoservers.sftpgo.digizuite.com" | |
- [3]: "sftpgousers.sftpgo.digizuite.com" | |
] | |
- Deployment.apps/apps/v1 : [ | |
- [0]: "sftpgo/sftpgo-operator" | |
] | |
- ServiceAccount/v1 : [ | |
- [0]: "sftpgo/sftpgo-operator" | |
] | |
} | |
- reuseValues : false | |
- skipAwait : false | |
- skipCrds : false | |
- timeout : 300 | |
values : { | |
operator: { | |
nodeSelector: { | |
digizuite/product: "third-party" | |
} | |
} | |
} | |
- verify : false | |
version : "0.1.7" | |
- waitForJobs : false | |
+-kubernetes:core/v1:ConfigMap: (replace) | |
[id=grafana/promtail-windows] | |
[urn=urn:pulumi:cluster_d4bbb119-72df-40d6-ba8b-0e02df0140a2_northeurope::cluster_environments::dgz:dgz:cluster-components$dgz:monitoring:kubernetes$dgz:monitoring:logs$kubernetes:core/v1:ConfigMap::logs_grafana_agent_logs_windows] | |
[provider: urn:pulumi:cluster_d4bbb119-72df-40d6-ba8b-0e02df0140a2_northeurope::cluster_environments::pulumi:providers:kubernetes::k8s::037b697f-66aa-4ee8-aa6f-8a8550f5d071 => urn:pulumi:cluster_d4bbb119-72df-40d6-ba8b-0e02df0140a2_northeurope::cluster_environments::pulumi:providers:kubernetes::k8s::output<string>] | |
apiVersion: "v1" | |
data : { | |
agent.yaml: (yaml) { | |
integrations: { | |
eventhandler: { | |
logs_instance: "application-logs" | |
} | |
} | |
logs : { | |
configs: [ | |
[0]: { | |
clients : [ | |
[0]: { | |
basic_auth : { | |
password: "${LOGS_PASSWORD}" | |
username: "${LOGS_USERNAME}" | |
} | |
external_labels: { | |
cluster : "${DIGIZUITE_CLUSTER_NAME}" | |
clusterId: "${DIGIZUITE_CLUSTER_ID}" | |
job : "integrations/kubernetes/eventhandler" | |
} | |
url : "${LOGS_URL}/loki/api/v1/push" | |
} | |
] | |
name : "application-logs" | |
positions : { | |
filename: "C:/tmp/positions.yaml" | |
} | |
scrape_configs: [ | |
[0]: { | |
job_name : "pod-logs" | |
kubernetes_sd_configs: [ | |
[0]: { | |
role: "pod" | |
} | |
] | |
pipeline_stages : [ | |
[0]: { | |
cri: {} | |
} | |
[1]: { | |
match: { | |
selector: "{scrapeTarget=\"digizuite\"}" | |
stages : [ | |
[0]: { | |
json: { | |
expressions: { | |
level : "LogLevel" | |
serviceName: "ServiceName" | |
time : "Time" | |
} | |
} | |
} | |
[1]: { | |
labels: { | |
level : <null> | |
serviceName: <null> | |
} | |
} | |
[2]: { | |
timestamp: { | |
format: "2006-01-02T15:04:05.9999999-07:00" | |
source: "time" | |
} | |
} | |
] | |
} | |
} | |
] | |
relabel_configs : [ | |
[0]: { | |
source_labels: [ | |
[0]: "__meta_kubernetes_pod_node_name" | |
] | |
target_label : "__host__" | |
} | |
[1]: { | |
action: "labelmap" | |
regex : "__meta_kubernetes_pod_label_(.+)" | |
} | |
[2]: { | |
action : "replace" | |
replacement : "$1" | |
separator : "/" | |
source_labels: [ | |
[0]: "__meta_kubernetes_namespace" | |
[1]: "__meta_kubernetes_pod_name" | |
] | |
target_label : "job" | |
} | |
[3]: { | |
action : "replace" | |
source_labels: [ | |
[0]: "__meta_kubernetes_namespace" | |
] | |
target_label : "namespace" | |
} | |
[4]: { | |
action : "replace" | |
source_labels: [ | |
[0]: "__meta_kubernetes_pod_name" | |
] | |
target_label : "pod" | |
} | |
[5]: { | |
action : "replace" | |
source_labels: [ | |
[0]: "__meta_kubernetes_pod_container_name" | |
] | |
target_label : "container" | |
} | |
[6]: { | |
replacement : "C:/var/log/pods/*$1/*.log" | |
separator : "/" | |
source_labels: [ | |
[0]: "__meta_kubernetes_pod_uid" | |
[1]: "__meta_kubernetes_pod_container_name" | |
] | |
target_label : "__path__" | |
} | |
[7]: { | |
action: "labeldrop" | |
regex : "pod_template_hash|app" | |
} | |
] | |
} | |
] | |
target_config : { | |
sync_period: "10s" | |
} | |
} | |
] | |
} | |
} | |
} | |
kind : "ConfigMap" | |
~ metadata : { | |
name : "promtail-windows" | |
~ namespace: "grafana" => output<string> | |
} | |
+-kubernetes:helm.sh/v3:Release: (replace) | |
[id=grafana/ksm] | |
[urn=urn:pulumi:cluster_d4bbb119-72df-40d6-ba8b-0e02df0140a2_northeurope::cluster_environments::dgz:dgz:cluster-components$dgz:monitoring:kubernetes$dgz:monitoring:metrics$kubernetes:helm.sh/v3:Release::metrics-kube-state-metrics] | |
[provider: urn:pulumi:cluster_d4bbb119-72df-40d6-ba8b-0e02df0140a2_northeurope::cluster_environments::pulumi:providers:kubernetes::k8s::037b697f-66aa-4ee8-aa6f-8a8550f5d071 => urn:pulumi:cluster_d4bbb119-72df-40d6-ba8b-0e02df0140a2_northeurope::cluster_environments::pulumi:providers:kubernetes::k8s::output<string>] | |
- allowNullValues : false | |
atomic : true | |
chart : "kube-state-metrics" | |
cleanupOnFail : true | |
+ compat : "true" | |
- createNamespace : false | |
dependencyUpdate : true | |
- description : "" | |
- devel : false | |
- disableCRDHooks : false | |
- disableOpenapiValidation: false | |
- disableWebhooks : false | |
forceUpdate : true | |
- keyring : "" | |
- lint : false | |
name : "ksm" | |
~ namespace : "grafana" => output<string> | |
- postrender : "" | |
- recreatePods : false | |
- renderSubchartNotes : false | |
replace : true | |
~ repositoryOpts : { | |
- caFile : "" | |
- certFile: "" | |
- keyFile : "" | |
- password: "" | |
repo : "https://prometheus-community.github.io/helm-charts" | |
- username: "" | |
} | |
- resetValues : false | |
- resourceNames : { | |
- ClusterRole.rbac.authorization.k8s.io/rbac.authorization.k8s.io/v1 : [ | |
- [0]: "ksm-kube-state-metrics" | |
] | |
- ClusterRoleBinding.rbac.authorization.k8s.io/rbac.authorization.k8s.io/v1: [ | |
- [0]: "ksm-kube-state-metrics" | |
] | |
- Deployment.apps/apps/v1 : [ | |
- [0]: "grafana/ksm-kube-state-metrics" | |
] | |
- Service/v1 : [ | |
- [0]: "grafana/ksm-kube-state-metrics" | |
] | |
- ServiceAccount/v1 : [ | |
- [0]: "grafana/ksm-kube-state-metrics" | |
] | |
} | |
- reuseValues : false | |
- skipAwait : false | |
- skipCrds : false | |
- timeout : 300 | |
values : { | |
image : { | |
tag: "v2.4.2" | |
} | |
nodeSelector: { | |
digizuite/product: "third-party" | |
} | |
} | |
- verify : false | |
- version : "5.7.0" | |
- waitForJobs : false | |
+-kubernetes:helm.sh/v3:Release: (replace) | |
[id=rabbitmq/digi-rabbitmq-cluster-operator] | |
[urn=urn:pulumi:cluster_d4bbb119-72df-40d6-ba8b-0e02df0140a2_northeurope::cluster_environments::dgz:dgz:cluster-components$dgz:dgz:RabbitMqCluster$kubernetes:helm.sh/v3:Release::digi-rabbitmq-cluster-operator] | |
[provider: urn:pulumi:cluster_d4bbb119-72df-40d6-ba8b-0e02df0140a2_northeurope::cluster_environments::pulumi:providers:kubernetes::k8s::037b697f-66aa-4ee8-aa6f-8a8550f5d071 => urn:pulumi:cluster_d4bbb119-72df-40d6-ba8b-0e02df0140a2_northeurope::cluster_environments::pulumi:providers:kubernetes::k8s::output<string>] | |
- allowNullValues : false | |
atomic : false | |
chart : "rabbitmq-cluster-operator" | |
cleanupOnFail : false | |
+ compat : "true" | |
- createNamespace : false | |
- dependencyUpdate : false | |
- description : "" | |
- devel : false | |
- disableCRDHooks : false | |
- disableOpenapiValidation: false | |
- disableWebhooks : false | |
forceUpdate : true | |
- keyring : "" | |
- lint : false | |
name : "digi-rabbitmq-cluster-operator" | |
~ namespace : "rabbitmq" => output<string> | |
- postrender : "" | |
- recreatePods : false | |
- renderSubchartNotes : false | |
- replace : false | |
~ repositoryOpts : { | |
- caFile : "" | |
- certFile: "" | |
- keyFile : "" | |
- password: "" | |
repo : "https://charts.bitnami.com/bitnami" | |
- username: "" | |
} | |
- resetValues : false | |
- resourceNames : { | |
- ClusterRole.rbac.authorization.k8s.io/rbac.authorization.k8s.io/v1 : [ | |
- [0]: "digi-rabbitmq-cluster-operator-rabbitmq" | |
- [1]: "digi-rabbitmq-cluster-operator-rabbitmq-messaging-topology-oper" | |
] | |
- ClusterRoleBinding.rbac.authorization.k8s.io/rbac.authorization.k8s.io/v1 : [ | |
- [0]: "digi-rabbitmq-cluster-operator-rabbitmq" | |
- [1]: "digi-rabbitmq-cluster-operator-rabbitmq-messaging-topology-oper" | |
] | |
- Deployment.apps/apps/v1 : [ | |
- [0]: "rabbitmq/digi-rabbitmq-cluster-operator" | |
- [1]: "rabbitmq/digi-rabbitmq-cluster-operator-rabbitmq-messaging-topology-oper" | |
] | |
- Role.rbac.authorization.k8s.io/rbac.authorization.k8s.io/v1 : [ | |
- [0]: "rabbitmq/digi-rabbitmq-cluster-operator" | |
- [1]: "rabbitmq/digi-rabbitmq-cluster-operator-rabbitmq-messaging-topology-oper" | |
] | |
- RoleBinding.rbac.authorization.k8s.io/rbac.authorization.k8s.io/v1 : [ | |
- [0]: "rabbitmq/digi-rabbitmq-cluster-operator" | |
- [1]: "rabbitmq/digi-rabbitmq-cluster-operator-rabbitmq-messaging-topology-oper" | |
] | |
- Secret/v1 : [ | |
- [0]: "rabbitmq/digi-rabbitmq-cluster-operator-rabbitmq-messaging-topology-oper" | |
] | |
- Service/v1 : [ | |
- [0]: "rabbitmq/digi-rabbitmq-cluster-operator-rabbitmq-messaging-topology-oper" | |
] | |
- ServiceAccount/v1 : [ | |
- [0]: "rabbitmq/digi-rabbitmq-cluster-operator" | |
- [1]: "rabbitmq/digi-rabbitmq-cluster-operator-rabbitmq-messaging-topology-oper" | |
] | |
- ValidatingWebhookConfiguration.admissionregistration.k8s.io/admissionregistration.k8s.io/v1: [ | |
- [0]: "digi-rabbitmq-cluster-operator-rabbitmq-messaging-topology-oper" | |
] | |
} | |
- reuseValues : false | |
- skipAwait : false | |
- skipCrds : false | |
- timeout : 300 | |
values : { | |
clusterOperator : { | |
nodeSelector: { | |
digizuite/product: "third-party" | |
} | |
} | |
msgTopologyOperator: { | |
nodeSelector: { | |
digizuite/product: "third-party" | |
} | |
} | |
} | |
- verify : false | |
version : "3.1.2" | |
- waitForJobs : false | |
+-kubernetes:helm.sh/v3:Release: (replace) | |
[id=keda/keda] | |
[urn=urn:pulumi:cluster_d4bbb119-72df-40d6-ba8b-0e02df0140a2_northeurope::cluster_environments::dgz:dgz:cluster-components$dgz:k8s:keda$kubernetes:helm.sh/v3:Release::keda] | |
[provider: urn:pulumi:cluster_d4bbb119-72df-40d6-ba8b-0e02df0140a2_northeurope::cluster_environments::pulumi:providers:kubernetes::k8s::037b697f-66aa-4ee8-aa6f-8a8550f5d071 => urn:pulumi:cluster_d4bbb119-72df-40d6-ba8b-0e02df0140a2_northeurope::cluster_environments::pulumi:providers:kubernetes::k8s::output<string>] | |
- allowNullValues : false | |
- atomic : false | |
chart : "keda" | |
- cleanupOnFail : false | |
+ compat : "true" | |
- createNamespace : false | |
- dependencyUpdate : false | |
- description : "" | |
- devel : false | |
- disableCRDHooks : false | |
- disableOpenapiValidation: false | |
- disableWebhooks : false | |
forceUpdate : true | |
- keyring : "" | |
- lint : false | |
name : "keda" | |
~ namespace : "keda" => output<string> | |
- postrender : "" | |
- recreatePods : false | |
- renderSubchartNotes : false | |
- replace : false | |
~ repositoryOpts : { | |
- caFile : "" | |
- certFile: "" | |
- keyFile : "" | |
- password: "" | |
repo : "https://kedacore.github.io/charts" | |
- username: "" | |
} | |
- resetValues : false | |
- resourceNames : { | |
- APIService.apiregistration.k8s.io/apiregistration.k8s.io/v1 : [ | |
- [0]: "v1beta1.external.metrics.k8s.io" | |
] | |
- ClusterRole.rbac.authorization.k8s.io/rbac.authorization.k8s.io/v1 : [ | |
- [0]: "keda-operator" | |
- [1]: "keda-operator-external-metrics-reader" | |
] | |
- ClusterRoleBinding.rbac.authorization.k8s.io/rbac.authorization.k8s.io/v1 : [ | |
- [0]: "keda-operator" | |
- [1]: "keda-operator-hpa-controller-external-metrics" | |
- [2]: "keda-operator-system-auth-delegator" | |
] | |
- CustomResourceDefinition.apiextensions.k8s.io/apiextensions.k8s.io/v1 : [ | |
- [0]: "clustertriggerauthentications.keda.sh" | |
- [1]: "scaledjobs.keda.sh" | |
- [2]: "scaledobjects.keda.sh" | |
- [3]: "triggerauthentications.keda.sh" | |
] | |
- Deployment.apps/apps/v1 : [ | |
- [0]: "keda/keda-admission-webhooks" | |
- [1]: "keda/keda-operator" | |
- [2]: "keda/keda-operator-metrics-apiserver" | |
] | |
- Role.rbac.authorization.k8s.io/rbac.authorization.k8s.io/v1 : [ | |
- [0]: "keda/keda-operator" | |
] | |
- RoleBinding.rbac.authorization.k8s.io/rbac.authorization.k8s.io/v1 : [ | |
- [0]: "keda/keda-operator" | |
- [1]: "kube-system/keda-operator-auth-reader" | |
] | |
- Service/v1 : [ | |
- [0]: "keda/keda-admission-webhooks" | |
- [1]: "keda/keda-operator" | |
- [2]: "keda/keda-operator-metrics-apiserver" | |
] | |
- ServiceAccount/v1 : [ | |
- [0]: "keda/keda-operator" | |
] | |
- ValidatingWebhookConfiguration.admissionregistration.k8s.io/admissionregistration.k8s.io/v1: [ | |
- [0]: "keda/keda-admission" | |
] | |
} | |
- reuseValues : false | |
- skipAwait : false | |
- skipCrds : false | |
- timeout : 300 | |
values : { | |
affinity: { | |
nodeAffinity: { | |
requiredDuringSchedulingIgnoredDuringExecution: { | |
nodeSelectorTerms: [ | |
[0]: { | |
matchExpressions: [ | |
[0]: { | |
key : "digizuite/product" | |
operator: "In" | |
values : [ | |
[0]: "third-party" | |
] | |
} | |
] | |
} | |
] | |
} | |
} | |
} | |
} | |
- verify : false | |
- version : "2.10.2" | |
- waitForJobs : false | |
+-kubernetes:helm.sh/v3:Release: (replace) | |
[id=nats/nats] | |
[urn=urn:pulumi:cluster_d4bbb119-72df-40d6-ba8b-0e02df0140a2_northeurope::cluster_environments::dgz:dgz:cluster-components$dgz:dgz:Nats$kubernetes:helm.sh/v3:Release::digi-nats] | |
[provider: urn:pulumi:cluster_d4bbb119-72df-40d6-ba8b-0e02df0140a2_northeurope::cluster_environments::pulumi:providers:kubernetes::k8s::037b697f-66aa-4ee8-aa6f-8a8550f5d071 => urn:pulumi:cluster_d4bbb119-72df-40d6-ba8b-0e02df0140a2_northeurope::cluster_environments::pulumi:providers:kubernetes::k8s::output<string>] | |
- allowNullValues : false | |
- atomic : false | |
chart : "nats" | |
- cleanupOnFail : false | |
+ compat : "true" | |
- createNamespace : false | |
- dependencyUpdate : false | |
- description : "" | |
- devel : false | |
- disableCRDHooks : false | |
- disableOpenapiValidation: false | |
- disableWebhooks : false | |
forceUpdate : true | |
- keyring : "" | |
- lint : false | |
name : "nats" | |
~ namespace : "nats" => output<string> | |
- postrender : "" | |
- recreatePods : false | |
- renderSubchartNotes : false | |
- replace : false | |
~ repositoryOpts : { | |
- caFile : "" | |
- certFile: "" | |
- keyFile : "" | |
- password: "" | |
repo : "https://nats-io.github.io/k8s/helm/charts/" | |
- username: "" | |
} | |
- resetValues : false | |
- resourceNames : { | |
- ConfigMap/v1 : [ | |
- [0]: "nats/nats-config" | |
] | |
- Deployment.apps/apps/v1 : [ | |
- [0]: "nats/nats-box" | |
] | |
- PodDisruptionBudget.policy/policy/v1: [ | |
- [0]: "nats/nats" | |
] | |
- Service/v1 : [ | |
- [0]: "nats/nats" | |
] | |
- ServiceAccount/v1 : [ | |
- [0]: "nats/nats" | |
] | |
- StatefulSet.apps/apps/v1 : [ | |
- [0]: "nats/nats" | |
] | |
} | |
- reuseValues : false | |
- skipAwait : false | |
- skipCrds : false | |
- timeout : 300 | |
values : { | |
auth : { | |
basic : { | |
accounts: { | |
js: { | |
jetstream: true | |
users : [ | |
[0]: { | |
pass: "system" | |
user: "system" | |
} | |
] | |
} | |
} | |
} | |
enabled: true | |
} | |
nats : { | |
image : { | |
tag: "2.8.4-alpine" | |
} | |
jetstream: { | |
enabled : true | |
filestorage: { | |
storageDirectory: "/etc/jetstream" | |
} | |
} | |
} | |
natsbox : { | |
nodeSelector: { | |
digizuite/product: "third-party" | |
} | |
} | |
nodeSelector: { | |
digizuite/product: "third-party" | |
} | |
} | |
- verify : false | |
- version : "0.19.14" | |
- waitForJobs : false | |
+-kubernetes:helm.sh/v3:Release: (replace) | |
[id=traefik/traefik] | |
[urn=urn:pulumi:cluster_d4bbb119-72df-40d6-ba8b-0e02df0140a2_northeurope::cluster_environments::dgz:dgz:cluster-components$dgz:dgz:traefik$kubernetes:helm.sh/v3:Release::traefik] | |
[provider: urn:pulumi:cluster_d4bbb119-72df-40d6-ba8b-0e02df0140a2_northeurope::cluster_environments::pulumi:providers:kubernetes::k8s::037b697f-66aa-4ee8-aa6f-8a8550f5d071 => urn:pulumi:cluster_d4bbb119-72df-40d6-ba8b-0e02df0140a2_northeurope::cluster_environments::pulumi:providers:kubernetes::k8s::output<string>] | |
- allowNullValues : false | |
- atomic : false | |
chart : "traefik" | |
- cleanupOnFail : false | |
+ compat : "true" | |
- createNamespace : false | |
dependencyUpdate : true | |
- description : "" | |
- devel : false | |
- disableCRDHooks : false | |
- disableOpenapiValidation: false | |
- disableWebhooks : false | |
forceUpdate : false | |
- keyring : "" | |
- lint : false | |
name : "traefik" | |
~ namespace : "traefik" => output<string> | |
- postrender : "" | |
- recreatePods : false | |
- renderSubchartNotes : false | |
- replace : false | |
~ repositoryOpts : { | |
- caFile : "" | |
- certFile: "" | |
- keyFile : "" | |
- password: "" | |
repo : "https://helm.traefik.io/traefik" | |
- username: "" | |
} | |
- resetValues : false | |
- resourceNames : { | |
- ClusterRole.rbac.authorization.k8s.io/rbac.authorization.k8s.io/v1 : [ | |
- [0]: "traefik-traefik" | |
] | |
- ClusterRoleBinding.rbac.authorization.k8s.io/rbac.authorization.k8s.io/v1: [ | |
- [0]: "traefik-traefik" | |
] | |
- Deployment.apps/apps/v1 : [ | |
- [0]: "traefik" | |
] | |
- PersistentVolumeClaim/v1 : [ | |
- [0]: "traefik" | |
] | |
- Service/v1 : [ | |
- [0]: "traefik" | |
] | |
- ServiceAccount/v1 : [ | |
- [0]: "traefik" | |
] | |
} | |
- reuseValues : false | |
- skipAwait : false | |
- skipCrds : false | |
- timeout : 300 | |
~ values : { | |
additionalArguments: [ | |
[0]: "--providers.kubernetesingress.ingressendpoint.hostname=example.net" | |
[1]: "--log.level=DEBUG" | |
] | |
certResolvers : { | |
letsencrypt: { | |
caServer : "https://acme-v02.api.letsencrypt.org/directory" | |
dnsChallenge: { | |
provider: "cloudflare" | |
} | |
email : "rnd@digizuite.com" | |
storage : "/data/acme.json" | |
} | |
} | |
deployment : { | |
initContainers: [ | |
[0]: { | |
command : [ | |
[0]: "sh" | |
[1]: "-c" | |
[2]: "touch /data/acme.json && chmod -Rv 600 /data/* && chown 65532:65532 /data/acme.json" | |
] | |
image : "busybox:1.35" | |
name : "volume-permissions" | |
volumeMounts: [ | |
[0]: { | |
mountPath: "/data" | |
name : "data" | |
} | |
] | |
} | |
] | |
} | |
env : [ | |
[0]: { | |
name : "CF_DNS_API_TOKEN" | |
value: "tH4X1Ole6A5ZKnIhfM_BYxWNqoayBFNrdVQU2JmP" | |
} | |
] | |
nodeSelector : { | |
digizuite/product: "third-party" | |
} | |
~ persistence : { | |
enabled : true | |
~ storageClass: "traefik-certificate-storage-362247d4" => output<string> | |
} | |
ports : { | |
sftp: { | |
expose : true | |
exposedPort: 2222 | |
port : 2222 | |
protocol : "TCP" | |
} | |
} | |
} | |
- verify : false | |
version : "17.0.5" | |
- waitForJobs : false | |
+-kubernetes:core/v1:ConfigMap: (replace) | |
[id=grafana/grafana] | |
[urn=urn:pulumi:cluster_d4bbb119-72df-40d6-ba8b-0e02df0140a2_northeurope::cluster_environments::dgz:dgz:cluster-components$dgz:monitoring:kubernetes$dgz:monitoring:metrics$kubernetes:core/v1:ConfigMap::metrics_grafana_agent] | |
[provider: urn:pulumi:cluster_d4bbb119-72df-40d6-ba8b-0e02df0140a2_northeurope::cluster_environments::pulumi:providers:kubernetes::k8s::037b697f-66aa-4ee8-aa6f-8a8550f5d071 => urn:pulumi:cluster_d4bbb119-72df-40d6-ba8b-0e02df0140a2_northeurope::cluster_environments::pulumi:providers:kubernetes::k8s::output<string>] | |
apiVersion: "v1" | |
data : { | |
agent.yaml: (yaml) { | |
integrations: { | |
eventhandler: { | |
cache_path: "/var/lib/agent/eventhandler.cache" | |
} | |
} | |
metrics : { | |
configs : [ | |
[0]: { | |
name : "integrations" | |
remote_write : [ | |
[0]: { | |
basic_auth: { | |
password: "${PROMETHEUS_PASSWORD}" | |
username: "${PROMETHEUS_USERNAME}" | |
} | |
url : "${PROMETHEUS_URL}/api/prom/push" | |
} | |
] | |
scrape_configs: [ | |
[0]: { | |
bearer_token_file : "/var/run/secrets/kubernetes.io/serviceaccount/token" | |
job_name : "integrations/kubernetes/cadvisor" | |
kubernetes_sd_configs : [ | |
[0]: { | |
role: "node" | |
} | |
] | |
metric_relabel_configs: [ | |
[0]: { | |
action : "keep" | |
regex : "kubelet_running_pods|container_fs_reads_total|kubelet_runtime_operations_errors_total|kube_horizontalpodautoscaler_spec_max_replicas|kube_horizontalpodautoscaler_status_desired_replicas|kube_daemonset_status_current_number_scheduled|container_memory_working_set_bytes|kubelet_node_name|kube_job_failed|kube_statefulset_status_replicas|kube_resourcequota|kubelet_volume_stats_available_bytes|container_memory_rss|kube_statefulset_metadata_generation|kube_statefulset_status_replicas_ready|kube_replicaset_owner|kubelet_running_container_count|kubelet_pleg_relist_duration_seconds_count|container_memory_cache|kube_daemonset_status_desired_number_scheduled|kube_statefulset_status_current_revision|node_quantile:kubelet_pleg_relist_duration_seconds:histogram_quantile|kube_pod_container_resource_requests|namespace_memory:kube_pod_container_resource_limits:sum|machine_memory_bytes|storage_operation_errors_total|kubelet_pleg_relist_duration_seconds_bucket|container_fs_writes_bytes_total|kube_horizontalpodautoscaler_spec_min_replicas|kube_daemonset_status_updated_number_scheduled|volume_manager_total_volumes|kubelet_pod_worker_duration_seconds_count|kubelet_volume_stats_inodes_used|cluster:namespace:pod_memory:active:kube_pod_container_resource_requests|kube_pod_status_phase|storage_operation_duration_seconds_count|container_fs_writes_total|container_cpu_cfs_periods_total|kube_deployment_status_replicas_available|kube_pod_container_resource_limits|namespace_workload_pod|rest_client_requests_total|kubelet_volume_stats_inodes|container_memory_swap|kubelet_runtime_operations_total|process_resident_memory_bytes|kubelet_pod_start_duration_seconds_count|cluster:namespace:pod_cpu:active:kube_pod_container_resource_requests|namespace_workload_pod:kube_pod_owner:relabel|kubelet_running_pod_count|kubelet_volume_stats_capacity_bytes|kube_node_status_capacity|kube_statefulset_replicas|cluster:namespace:pod_memory:active:kube_pod_container_resource_limits|kubelet_server_expiration_renew_errors|container_fs_reads_bytes_total|kube_job_status_start_time|cluster:namespace:pod_cpu:active:kube_pod_container_resource_limits|node_namespace_pod_container:container_memory_working_set_bytes|kubernetes_build_info|kube_pod_info|process_cpu_seconds_total|kube_statefulset_status_update_revision|kube_horizontalpodautoscaler_status_current_replicas|namespace_memory:kube_pod_container_resource_requests:sum|kubelet_certificate_manager_server_ttl_seconds|kubelet_pod_worker_duration_seconds_bucket|kube_node_status_allocatable|container_cpu_cfs_throttled_periods_total|kube_daemonset_status_number_misscheduled|kubelet_cgroup_manager_duration_seconds_count|kube_node_info|kube_deployment_status_observed_generation|namespace_cpu:kube_pod_container_resource_requests:sum|kube_statefulset_status_observed_generation|kube_statefulset_status_replicas_updated|kube_job_status_active|kubelet_pleg_relist_interval_seconds_bucket|node_namespace_pod_container:container_memory_rss|node_namespace_pod_container:container_cpu_usage_seconds_total:sum_irate|kube_deployment_metadata_generation|kubelet_running_containers|kube_pod_container_status_waiting_reason|kube_node_spec_taint|kube_namespace_status_phase|kube_deployment_status_replicas_updated|node_namespace_pod_container:container_memory_swap|kubelet_certificate_manager_client_expiration_renew_errors|kube_node_status_condition|kubelet_node_config_error|node_namespace_pod_container:container_memory_cache|kube_pod_owner|container_cpu_usage_seconds_total|kubelet_cgroup_manager_duration_seconds_bucket|kube_deployment_spec_replicas|kube_daemonset_status_number_available|kubelet_certificate_manager_client_ttl_seconds|go_goroutines|namespace_cpu:kube_pod_container_resource_limits:sum|kube_namespace_status_phase|container_cpu_usage_seconds_total|kube_pod_status_phase|kube_pod_start_time|kube_pod_container_status_restarts_total|kube_pod_container_info|kube_pod_container_status_waiting_reason|kube_daemonset.*|kube_statefulset.*|kube_job.*|kube_node_status_capacity|node_namespace_pod_container:container_cpu_usage_seconds_total:sum_irate|cluster:namespace:pod_cpu:active:kube_pod_container_resource_requests|namespace_cpu:kube_pod_container_resource_requests:sum" | |
source_labels: [ | |
[0]: "__name__" | |
] | |
} | |
] | |
relabel_configs : [ | |
[0]: { | |
replacement : "kubernetes.default.svc.cluster.local:443" | |
target_label: "__address__" | |
} | |
[1]: { | |
regex : "(.+)" | |
replacement : "/api/v1/nodes/${1}/proxy/metrics/cadvisor" | |
source_labels: [ | |
[0]: "__meta_kubernetes_node_name" | |
] | |
target_label : "__metrics_path__" | |
} | |
] | |
scheme : "https" | |
tls_config : { | |
ca_file : "/var/run/secrets/kubernetes.io/serviceaccount/ca.crt" | |
insecure_skip_verify: false | |
server_name : "kubernetes" | |
} | |
} | |
[1]: { | |
bearer_token_file : "/var/run/secrets/kubernetes.io/serviceaccount/token" | |
job_name : "integrations/kubernetes/kubelet" | |
kubernetes_sd_configs : [ | |
[0]: { | |
role: "node" | |
} | |
] | |
metric_relabel_configs: [ | |
[0]: { | |
action : "keep" | |
regex : "kubelet_running_pods|container_fs_reads_total|kubelet_runtime_operations_errors_total|kube_horizontalpodautoscaler_spec_max_replicas|kube_horizontalpodautoscaler_status_desired_replicas|kube_daemonset_status_current_number_scheduled|container_memory_working_set_bytes|kubelet_node_name|kube_job_failed|kube_statefulset_status_replicas|kube_resourcequota|kubelet_volume_stats_available_bytes|container_memory_rss|kube_statefulset_metadata_generation|kube_statefulset_status_replicas_ready|kube_replicaset_owner|kubelet_running_container_count|kubelet_pleg_relist_duration_seconds_count|container_memory_cache|kube_daemonset_status_desired_number_scheduled|kube_statefulset_status_current_revision|node_quantile:kubelet_pleg_relist_duration_seconds:histogram_quantile|kube_pod_container_resource_requests|namespace_memory:kube_pod_container_resource_limits:sum|machine_memory_bytes|storage_operation_errors_total|kubelet_pleg_relist_duration_seconds_bucket|container_fs_writes_bytes_total|kube_horizontalpodautoscaler_spec_min_replicas|kube_daemonset_status_updated_number_scheduled|volume_manager_total_volumes|kubelet_pod_worker_duration_seconds_count|kubelet_volume_stats_inodes_used|cluster:namespace:pod_memory:active:kube_pod_container_resource_requests|kube_pod_status_phase|storage_operation_duration_seconds_count|container_fs_writes_total|container_cpu_cfs_periods_total|kube_deployment_status_replicas_available|kube_pod_container_resource_limits|namespace_workload_pod|rest_client_requests_total|kubelet_volume_stats_inodes|container_memory_swap|kubelet_runtime_operations_total|process_resident_memory_bytes|kubelet_pod_start_duration_seconds_count|cluster:namespace:pod_cpu:active:kube_pod_container_resource_requests|namespace_workload_pod:kube_pod_owner:relabel|kubelet_running_pod_count|kubelet_volume_stats_capacity_bytes|kube_node_status_capacity|kube_statefulset_replicas|cluster:namespace:pod_memory:active:kube_pod_container_resource_limits|kubelet_server_expiration_renew_errors|container_fs_reads_bytes_total|kube_job_status_start_time|cluster:namespace:pod_cpu:active:kube_pod_container_resource_limits|node_namespace_pod_container:container_memory_working_set_bytes|kubernetes_build_info|kube_pod_info|process_cpu_seconds_total|kube_statefulset_status_update_revision|kube_horizontalpodautoscaler_status_current_replicas|namespace_memory:kube_pod_container_resource_requests:sum|kubelet_certificate_manager_server_ttl_seconds|kubelet_pod_worker_duration_seconds_bucket|kube_node_status_allocatable|container_cpu_cfs_throttled_periods_total|kube_daemonset_status_number_misscheduled|kubelet_cgroup_manager_duration_seconds_count|kube_node_info|kube_deployment_status_observed_generation|namespace_cpu:kube_pod_container_resource_requests:sum|kube_statefulset_status_observed_generation|kube_statefulset_status_replicas_updated|kube_job_status_active|kubelet_pleg_relist_interval_seconds_bucket|node_namespace_pod_container:container_memory_rss|node_namespace_pod_container:container_cpu_usage_seconds_total:sum_irate|kube_deployment_metadata_generation|kubelet_running_containers|kube_pod_container_status_waiting_reason|kube_node_spec_taint|kube_namespace_status_phase|kube_deployment_status_replicas_updated|node_namespace_pod_container:container_memory_swap|kubelet_certificate_manager_client_expiration_renew_errors|kube_node_status_condition|kubelet_node_config_error|node_namespace_pod_container:container_memory_cache|kube_pod_owner|container_cpu_usage_seconds_total|kubelet_cgroup_manager_duration_seconds_bucket|kube_deployment_spec_replicas|kube_daemonset_status_number_available|kubelet_certificate_manager_client_ttl_seconds|go_goroutines|namespace_cpu:kube_pod_container_resource_limits:sum|kube_namespace_status_phase|container_cpu_usage_seconds_total|kube_pod_status_phase|kube_pod_start_time|kube_pod_container_status_restarts_total|kube_pod_container_info|kube_pod_container_status_waiting_reason|kube_daemonset.*|kube_statefulset.*|kube_job.*|kube_node_status_capacity|node_namespace_pod_container:container_cpu_usage_seconds_total:sum_irate|cluster:namespace:pod_cpu:active:kube_pod_container_resource_requests|namespace_cpu:kube_pod_container_resource_requests:sum" | |
source_labels: [ | |
[0]: "__name__" | |
] | |
} | |
] | |
relabel_configs : [ | |
[0]: { | |
replacement : "kubernetes.default.svc.cluster.local:443" | |
target_label: "__address__" | |
} | |
[1]: { | |
regex : "(.+)" | |
replacement : "/api/v1/nodes/${1}/proxy/metrics" | |
source_labels: [ | |
[0]: "__meta_kubernetes_node_name" | |
] | |
target_label : "__metrics_path__" | |
} | |
] | |
scheme : "https" | |
tls_config : { | |
ca_file : "/var/run/secrets/kubernetes.io/serviceaccount/ca.crt" | |
insecure_skip_verify: false | |
server_name : "kubernetes" | |
} | |
} | |
[2]: { | |
job_name : "integrations/kubernetes/kube-state-metrics" | |
kubernetes_sd_configs : [ | |
[0]: { | |
role: "pod" | |
} | |
] | |
metric_relabel_configs: [ | |
[0]: { | |
action : "keep" | |
regex : "kubelet_running_pods|container_fs_reads_total|kubelet_runtime_operations_errors_total|kube_horizontalpodautoscaler_spec_max_replicas|kube_horizontalpodautoscaler_status_desired_replicas|kube_daemonset_status_current_number_scheduled|container_memory_working_set_bytes|kubelet_node_name|kube_job_failed|kube_statefulset_status_replicas|kube_resourcequota|kubelet_volume_stats_available_bytes|container_memory_rss|kube_statefulset_metadata_generation|kube_statefulset_status_replicas_ready|kube_replicaset_owner|kubelet_running_container_count|kubelet_pleg_relist_duration_seconds_count|container_memory_cache|kube_daemonset_status_desired_number_scheduled|kube_statefulset_status_current_revision|node_quantile:kubelet_pleg_relist_duration_seconds:histogram_quantile|kube_pod_container_resource_requests|namespace_memory:kube_pod_container_resource_limits:sum|machine_memory_bytes|storage_operation_errors_total|kubelet_pleg_relist_duration_seconds_bucket|container_fs_writes_bytes_total|kube_horizontalpodautoscaler_spec_min_replicas|kube_daemonset_status_updated_number_scheduled|volume_manager_total_volumes|kubelet_pod_worker_duration_seconds_count|kubelet_volume_stats_inodes_used|cluster:namespace:pod_memory:active:kube_pod_container_resource_requests|kube_pod_status_phase|storage_operation_duration_seconds_count|container_fs_writes_total|container_cpu_cfs_periods_total|kube_deployment_status_replicas_available|kube_pod_container_resource_limits|namespace_workload_pod|rest_client_requests_total|kubelet_volume_stats_inodes|container_memory_swap|kubelet_runtime_operations_total|process_resident_memory_bytes|kubelet_pod_start_duration_seconds_count|cluster:namespace:pod_cpu:active:kube_pod_container_resource_requests|namespace_workload_pod:kube_pod_owner:relabel|kubelet_running_pod_count|kubelet_volume_stats_capacity_bytes|kube_node_status_capacity|kube_statefulset_replicas|cluster:namespace:pod_memory:active:kube_pod_container_resource_limits|kubelet_server_expiration_renew_errors|container_fs_reads_bytes_total|kube_job_status_start_time|cluster:namespace:pod_cpu:active:kube_pod_container_resource_limits|node_namespace_pod_container:container_memory_working_set_bytes|kubernetes_build_info|kube_pod_info|process_cpu_seconds_total|kube_statefulset_status_update_revision|kube_horizontalpodautoscaler_status_current_replicas|namespace_memory:kube_pod_container_resource_requests:sum|kubelet_certificate_manager_server_ttl_seconds|kubelet_pod_worker_duration_seconds_bucket|kube_node_status_allocatable|container_cpu_cfs_throttled_periods_total|kube_daemonset_status_number_misscheduled|kubelet_cgroup_manager_duration_seconds_count|kube_node_info|kube_deployment_status_observed_generation|namespace_cpu:kube_pod_container_resource_requests:sum|kube_statefulset_status_observed_generation|kube_statefulset_status_replicas_updated|kube_job_status_active|kubelet_pleg_relist_interval_seconds_bucket|node_namespace_pod_container:container_memory_rss|node_namespace_pod_container:container_cpu_usage_seconds_total:sum_irate|kube_deployment_metadata_generation|kubelet_running_containers|kube_pod_container_status_waiting_reason|kube_node_spec_taint|kube_namespace_status_phase|kube_deployment_status_replicas_updated|node_namespace_pod_container:container_memory_swap|kubelet_certificate_manager_client_expiration_renew_errors|kube_node_status_condition|kubelet_node_config_error|node_namespace_pod_container:container_memory_cache|kube_pod_owner|container_cpu_usage_seconds_total|kubelet_cgroup_manager_duration_seconds_bucket|kube_deployment_spec_replicas|kube_daemonset_status_number_available|kubelet_certificate_manager_client_ttl_seconds|go_goroutines|namespace_cpu:kube_pod_container_resource_limits:sum|kube_namespace_status_phase|container_cpu_usage_seconds_total|kube_pod_status_phase|kube_pod_start_time|kube_pod_container_status_restarts_total|kube_pod_container_info|kube_pod_container_status_waiting_reason|kube_daemonset.*|kube_statefulset.*|kube_job.*|kube_node_status_capacity|node_namespace_pod_container:container_cpu_usage_seconds_total:sum_irate|cluster:namespace:pod_cpu:active:kube_pod_container_resource_requests|namespace_cpu:kube_pod_container_resource_requests:sum" | |
source_labels: [ | |
[0]: "__name__" | |
] | |
} | |
] | |
relabel_configs : [ | |
[0]: { | |
action : "keep" | |
regex : "kube-state-metrics" | |
source_labels: [ | |
[0]: "__meta_kubernetes_pod_label_app_kubernetes_io_name" | |
] | |
} | |
] | |
} | |
[3]: { | |
job_name : "digizuite" | |
kubernetes_sd_configs : [ | |
[0]: { | |
role : "pod" | |
selectors: [ | |
[0]: { | |
label: "scrapeTarget=digizuite" | |
role : "pod" | |
} | |
] | |
} | |
] | |
metric_relabel_configs: [ | |
[0]: { | |
action : "drop" | |
regex : "http_request_duration_seconds_bucket|digizuite_messaging_incoming_logical_message_handling_duration_seconds_bucket" | |
source_labels: [ | |
[0]: "__name__" | |
] | |
} | |
[1]: { | |
action : "drop" | |
regex : "prometheus_net_.*" | |
source_labels: [ | |
[0]: "__name__" | |
] | |
} | |
] | |
metrics_path : "/metrics" | |
} | |
[4]: { | |
job_name : "rabbitmq" | |
kubernetes_sd_configs : [ | |
[0]: { | |
namespaces: { | |
names: [ | |
[0]: "rabbitmq" | |
] | |
} | |
role : "pod" | |
} | |
] | |
metric_relabel_configs: [ | |
[0]: { | |
action : "drop" | |
regex : "erlang_vm_allocators" | |
source_labels: [ | |
[0]: "__name__" | |
] | |
} | |
] | |
metrics_path : "/metrics/per-object" | |
} | |
[5]: { | |
job_name : "nats" | |
kubernetes_sd_configs : [ | |
[0]: { | |
namespaces: { | |
names: [ | |
[0]: "nats" | |
] | |
} | |
role : "pod" | |
} | |
] | |
metric_relabel_configs: [ | |
[0]: { | |
action : "drop" | |
regex : "nats_consumer.*" | |
source_labels: [ | |
[0]: "__name__" | |
] | |
} | |
] | |
metrics_path : "/metrics" | |
} | |
[6]: { | |
job_name : "traefik" | |
kubernetes_sd_configs : [ | |
[0]: { | |
namespaces: { | |
names: [ | |
[0]: "traefik" | |
] | |
} | |
role : "pod" | |
} | |
] | |
metric_relabel_configs: [ | |
[0]: { | |
action : "drop" | |
regex : "traefik_service_request_duration_seconds.*" | |
source_labels: [ | |
[0]: "__name__" | |
] | |
} | |
] | |
metrics_path : "/metrics" | |
} | |
] | |
} | |
] | |
global : { | |
external_labels: { | |
cluster : "${DIGIZUITE_CLUSTER_NAME}" | |
clusterId: "${DIGIZUITE_CLUSTER_ID}" | |
} | |
scrape_interval: "1m" | |
} | |
wal_directory: "/var/lib/agent/wal" | |
} | |
traces : { | |
configs: [ | |
[0]: { | |
name : "integrations" | |
receivers : { | |
jaeger: { | |
protocols: { | |
thrift_compact: <null> | |
} | |
} | |
} | |
remote_write: [ | |
[0]: { | |
basic_auth: { | |
password: "${TRACING_PASSWORD}" | |
username: "${TRACING_USERNAME}" | |
} | |
endpoint : "${TRACING_URL}" | |
} | |
] | |
} | |
] | |
} | |
} | |
} | |
kind : "ConfigMap" | |
~ metadata : { | |
name : "grafana" | |
~ namespace: "grafana" => output<string> | |
} | |
+-kubernetes:core/v1:Service: (replace) | |
[id=traefik/traefik] | |
[urn=urn:pulumi:cluster_d4bbb119-72df-40d6-ba8b-0e02df0140a2_northeurope::cluster_environments::dgz:dgz:cluster-components$dgz:dgz:traefik$kubernetes:core/v1:Service::traefikLoadbalancer] | |
[provider: urn:pulumi:cluster_d4bbb119-72df-40d6-ba8b-0e02df0140a2_northeurope::cluster_environments::pulumi:providers:kubernetes::k8s::037b697f-66aa-4ee8-aa6f-8a8550f5d071 => urn:pulumi:cluster_d4bbb119-72df-40d6-ba8b-0e02df0140a2_northeurope::cluster_environments::pulumi:providers:kubernetes::k8s::output<string>] | |
- apiVersion: "v1" | |
- kind : "Service" | |
- metadata : { | |
- annotations: { | |
- meta.helm.sh/release-name : "traefik" | |
- meta.helm.sh/release-namespace: "traefik" | |
} | |
- finalizers : [ | |
- [0]: "service.kubernetes.io/load-balancer-cleanup" | |
] | |
- labels : { | |
- app.kubernetes.io/instance : "traefik-traefik" | |
- app.kubernetes.io/managed-by: "Helm" | |
- app.kubernetes.io/name : "traefik" | |
- helm.sh/chart : "traefik-17.0.5" | |
} | |
- name : "traefik" | |
- namespace : "traefik" | |
} | |
- spec : { | |
- allocateLoadBalancerNodePorts: true | |
- clusterIP : "10.0.127.130" | |
- clusterIPs : [ | |
- [0]: "10.0.127.130" | |
] | |
- externalTrafficPolicy : "Cluster" | |
- internalTrafficPolicy : "Cluster" | |
- ipFamilies : [ | |
- [0]: "IPv4" | |
] | |
- ipFamilyPolicy : "SingleStack" | |
- ports : [ | |
- [0]: { | |
- name : "sftp" | |
- nodePort : 30437 | |
- port : 2222 | |
- protocol : "TCP" | |
- targetPort: "sftp" | |
} | |
- [1]: { | |
- name : "web" | |
- nodePort : 30275 | |
- port : 80 | |
- protocol : "TCP" | |
- targetPort: "web" | |
} | |
- [2]: { | |
- name : "websecure" | |
- nodePort : 32115 | |
- port : 443 | |
- protocol : "TCP" | |
- targetPort: "websecure" | |
} | |
] | |
- selector : { | |
- app.kubernetes.io/instance: "traefik-traefik" | |
- app.kubernetes.io/name : "traefik" | |
} | |
- sessionAffinity : "None" | |
- type : "LoadBalancer" | |
} | |
~ cloudflare:index/record:Record: (update) | |
[id=ab573e7951569a653f1f1c054cf02c3c] | |
[urn=urn:pulumi:cluster_d4bbb119-72df-40d6-ba8b-0e02df0140a2_northeurope::cluster_environments::dgz:cloudflare:clusterdns$cloudflare:index/record:Record::cloudflare-dns-cluster-dns] | |
[provider=urn:pulumi:cluster_d4bbb119-72df-40d6-ba8b-0e02df0140a2_northeurope::cluster_environments::pulumi:providers:cloudflare::cloudflare-provider::1ea65a07-d262-4e37-8665-aee93a097db7] | |
~ value: "20.93.9.48" => output<string> | |
+-kubernetes:rbac.authorization.k8s.io/v1:ClusterRoleBinding: (replace) | |
[id=grafana] | |
[urn=urn:pulumi:cluster_d4bbb119-72df-40d6-ba8b-0e02df0140a2_northeurope::cluster_environments::dgz:dgz:cluster-components$dgz:monitoring:kubernetes$dgz:monitoring:base$kubernetes:rbac.authorization.k8s.io/v1:ClusterRoleBinding::basics_grafana_agent] | |
[provider: urn:pulumi:cluster_d4bbb119-72df-40d6-ba8b-0e02df0140a2_northeurope::cluster_environments::pulumi:providers:kubernetes::k8s::037b697f-66aa-4ee8-aa6f-8a8550f5d071 => urn:pulumi:cluster_d4bbb119-72df-40d6-ba8b-0e02df0140a2_northeurope::cluster_environments::pulumi:providers:kubernetes::k8s::output<string>] | |
apiVersion: "rbac.authorization.k8s.io/v1" | |
kind : "ClusterRoleBinding" | |
metadata : { | |
name: "grafana" | |
} | |
~ roleRef : { | |
apiGroup: "rbac.authorization.k8s.io" | |
kind : "ClusterRole" | |
~ name : "grafana" => output<string> | |
} | |
~ subjects : [ | |
~ [0]: { | |
kind : "ServiceAccount" | |
~ name : "grafana" => output<string> | |
~ namespace: "grafana" => output<string> | |
} | |
] | |
+-kubernetes:traefik.containo.us/v1alpha1:Middleware: (replace) | |
[id=traefik/dgzcore-middleware] | |
[urn=urn:pulumi:cluster_d4bbb119-72df-40d6-ba8b-0e02df0140a2_northeurope::cluster_environments::dgz:dgz:cluster-components$dgz:dgz:traefik$kubernetes:traefik.containo.us/v1alpha1:Middleware::dgzcore-middleware] | |
[provider: urn:pulumi:cluster_d4bbb119-72df-40d6-ba8b-0e02df0140a2_northeurope::cluster_environments::pulumi:providers:kubernetes::k8s::037b697f-66aa-4ee8-aa6f-8a8550f5d071 => urn:pulumi:cluster_d4bbb119-72df-40d6-ba8b-0e02df0140a2_northeurope::cluster_environments::pulumi:providers:kubernetes::k8s::output<string>] | |
apiVersion: "traefik.containo.us/v1alpha1" | |
kind : "Middleware" | |
~ metadata : { | |
name : "dgzcore-middleware" | |
~ namespace: "traefik" => output<string> | |
} | |
spec : { | |
stripPrefixRegex: { | |
regex: [ | |
[0]: "/(?i:digizuitecore)/[^\\/]+/" | |
] | |
} | |
} | |
+-kubernetes:rabbitmq.com/v1beta1:RabbitmqCluster: (replace) | |
[id=rabbitmq/digi-rabbitmq-cluster] | |
[urn=urn:pulumi:cluster_d4bbb119-72df-40d6-ba8b-0e02df0140a2_northeurope::cluster_environments::dgz:dgz:cluster-components$dgz:dgz:RabbitMqCluster$kubernetes:rabbitmq.com/v1beta1:RabbitmqCluster::digi-rabbitmq-cluster] | |
[provider: urn:pulumi:cluster_d4bbb119-72df-40d6-ba8b-0e02df0140a2_northeurope::cluster_environments::pulumi:providers:kubernetes::k8s::037b697f-66aa-4ee8-aa6f-8a8550f5d071 => urn:pulumi:cluster_d4bbb119-72df-40d6-ba8b-0e02df0140a2_northeurope::cluster_environments::pulumi:providers:kubernetes::k8s::output<string>] | |
apiVersion: "rabbitmq.com/v1beta1" | |
kind : "RabbitmqCluster" | |
~ metadata : { | |
annotations: { | |
pulumi.com/patchForce : "true" | |
rabbitmq.com/topology-allowed-namespaces: "*" | |
} | |
name : "digi-rabbitmq-cluster" | |
~ namespace : "rabbitmq" => output<string> | |
} | |
~ spec : { | |
affinity : { | |
nodeAffinity: { | |
requiredDuringSchedulingIgnoredDuringExecution: { | |
nodeSelectorTerms: [ | |
[0]: { | |
matchExpressions: [ | |
[0]: { | |
key : "digizuite/product" | |
operator: "In" | |
values : [ | |
[0]: "third-party" | |
] | |
} | |
] | |
} | |
] | |
} | |
} | |
} | |
~ persistence : { | |
storage : "100Gi" | |
~ storageClassName: "digi-rabbitmq-cluster-ff37de80" => output<string> | |
} | |
replicas : 1 | |
resources : { | |
limits : { | |
cpu : "1" | |
memory: "2Gi" | |
} | |
requests: { | |
cpu : "1" | |
memory: "2Gi" | |
} | |
} | |
service : { | |
type: "ClusterIP" | |
} | |
terminationGracePeriodSeconds: 604800 | |
} | |
+-kubernetes:sftpgo.digizuite.com/v1alpha1:SftpgoServer: (replace) | |
[id=sftpgo/sftpgo] | |
[urn=urn:pulumi:cluster_d4bbb119-72df-40d6-ba8b-0e02df0140a2_northeurope::cluster_environments::dgz:dgz:sftpgo$kubernetes:sftpgo.digizuite.com/v1alpha1:SftpgoServer::sftpgo] | |
[provider: urn:pulumi:cluster_d4bbb119-72df-40d6-ba8b-0e02df0140a2_northeurope::cluster_environments::pulumi:providers:kubernetes::k8s::037b697f-66aa-4ee8-aa6f-8a8550f5d071 => urn:pulumi:cluster_d4bbb119-72df-40d6-ba8b-0e02df0140a2_northeurope::cluster_environments::pulumi:providers:kubernetes::k8s::output<string>] | |
apiVersion: "sftpgo.digizuite.com/v1alpha1" | |
kind : "SftpgoServer" | |
~ metadata : { | |
name : "sftpgo" | |
~ namespace: "sftpgo" => output<string> | |
} | |
spec : { | |
configuration: { | |
common : { | |
proxy_protocol: 1 | |
} | |
data_provider: { | |
driver : "postgresql" | |
host : "sftpgo-d4bbb11972df40d6ba8b0e02df0140a2.postgres.database.azure.com" | |
name : "sftpgo" | |
password: "OZkRa+?HJ(Oc8yXU67Ez45A94hsoaA63fR0ihP0f4(+P3.drrP#9)0E8" | |
port : 5432 | |
sslmode : 1 | |
username: "digiadmin" | |
} | |
httpd : { | |
bindings: [ | |
[0]: { | |
port: 3333 | |
} | |
] | |
} | |
sftpd : { | |
bindings: [ | |
[0]: { | |
port: 1111 | |
} | |
] | |
} | |
} | |
nodeSelector : { | |
digizuite/product: "third-party" | |
} | |
} | |
+-kubernetes:apps/v1:StatefulSet: (replace) | |
[id=grafana/grafana] | |
[urn=urn:pulumi:cluster_d4bbb119-72df-40d6-ba8b-0e02df0140a2_northeurope::cluster_environments::dgz:dgz:cluster-components$dgz:monitoring:kubernetes$dgz:monitoring:metrics$kubernetes:apps/v1:StatefulSet::metrics_grafana_agent] | |
[provider: urn:pulumi:cluster_d4bbb119-72df-40d6-ba8b-0e02df0140a2_northeurope::cluster_environments::pulumi:providers:kubernetes::k8s::037b697f-66aa-4ee8-aa6f-8a8550f5d071 => urn:pulumi:cluster_d4bbb119-72df-40d6-ba8b-0e02df0140a2_northeurope::cluster_environments::pulumi:providers:kubernetes::k8s::output<string>] | |
apiVersion: "apps/v1" | |
kind : "StatefulSet" | |
~ metadata : { | |
name : "grafana" | |
~ namespace: "grafana" => output<string> | |
} | |
~ spec : { | |
replicas : 1 | |
selector : { | |
matchLabels: { | |
name: "grafana" | |
} | |
} | |
serviceName : "grafana" | |
~ template : { | |
metadata: { | |
labels: { | |
name: "grafana" | |
} | |
} | |
~ spec : { | |
- containers : [secret] | |
+ containers : [ | |
+ [0]: { | |
+ args : [ | |
+ [0]: "-config.file=/etc/agent/agent.yaml" | |
+ [1]: "-enable-features=integrations-next" | |
+ [2]: "-server.http.address=0.0.0.0:80" | |
+ [3]: "-config.expand-env" | |
] | |
+ env : [ | |
+ [0]: { | |
+ name : "DIGIZUITE_CLUSTER_NAME" | |
+ value: "rhdh local cluster" | |
} | |
+ [1]: { | |
+ name : "DIGIZUITE_CLUSTER_ID" | |
+ value: "d4bbb119-72df-40d6-ba8b-0e02df0140a2" | |
} | |
+ [2]: { | |
+ name : "PROMETHEUS_URL" | |
+ value: "https://prometheus-us-central1.grafana.net" | |
} | |
+ [3]: { | |
+ name : "PROMETHEUS_USERNAME" | |
+ value: "58973" | |
} | |
+ [4]: { | |
+ name : "PROMETHEUS_PASSWORD" | |
+ value: [secret] | |
} | |
+ [5]: { | |
+ name : "TRACING_URL" | |
+ value: "https://tempo-us-central1.grafana.net:443" | |
} | |
+ [6]: { | |
+ name : "TRACING_USERNAME" | |
+ value: "24977" | |
} | |
+ [7]: { | |
+ name : "TRACING_PASSWORD" | |
+ value: [secret] | |
} | |
] | |
+ image : "grafana/agent:v0.32.1" | |
+ imagePullPolicy: "IfNotPresent" | |
+ name : "grafana" | |
+ ports : [ | |
+ [0]: { | |
+ containerPort: 80 | |
+ name : "http-metrics" | |
} | |
] | |
+ volumeMounts : [ | |
+ [0]: { | |
+ mountPath: "/var/lib/agent" | |
+ name : "agent-wal" | |
} | |
+ [1]: { | |
+ mountPath: "/etc/agent" | |
+ name : "grafana" | |
} | |
] | |
} | |
] | |
nodeSelector : { | |
digizuite/product: "third-party" | |
} | |
~ serviceAccountName: "grafana" => output<string> | |
~ volumes : [ | |
~ [0]: { | |
~ configMap: { | |
~ name: "grafana" => output<string> | |
} | |
name : "grafana" | |
} | |
] | |
} | |
} | |
updateStrategy : { | |
type: "RollingUpdate" | |
} | |
~ volumeClaimTemplates: [ | |
~ [0]: { | |
~ metadata: { | |
name : "agent-wal" | |
~ namespace: "grafana" => output<string> | |
} | |
spec : { | |
accessModes: [ | |
[0]: "ReadWriteOnce" | |
] | |
resources : { | |
requests: { | |
storage: "5Gi" | |
} | |
} | |
} | |
} | |
] | |
} | |
+-kubernetes:apps/v1:DaemonSet: (replace) | |
[id=grafana/promtail-windows] | |
[urn=urn:pulumi:cluster_d4bbb119-72df-40d6-ba8b-0e02df0140a2_northeurope::cluster_environments::dgz:dgz:cluster-components$dgz:monitoring:kubernetes$dgz:monitoring:logs$kubernetes:apps/v1:DaemonSet::logs_grafana_agent_windows] | |
[provider: urn:pulumi:cluster_d4bbb119-72df-40d6-ba8b-0e02df0140a2_northeurope::cluster_environments::pulumi:providers:kubernetes::k8s::037b697f-66aa-4ee8-aa6f-8a8550f5d071 => urn:pulumi:cluster_d4bbb119-72df-40d6-ba8b-0e02df0140a2_northeurope::cluster_environments::pulumi:providers:kubernetes::k8s::output<string>] | |
apiVersion: "apps/v1" | |
kind : "DaemonSet" | |
~ metadata : { | |
name : "promtail-windows" | |
~ namespace: "grafana" => output<string> | |
} | |
~ spec : { | |
minReadySeconds: 10 | |
selector : { | |
matchLabels: { | |
name: "promtail-windows" | |
} | |
} | |
~ template : { | |
metadata: { | |
labels: { | |
name: "promtail-windows" | |
} | |
} | |
~ spec : { | |
- containers : [secret] | |
+ containers : [ | |
+ [0]: { | |
+ args : [ | |
+ [0]: "-config.file=C:/etc/agent/agent.yaml" | |
+ [1]: "-enable-features=integrations-next" | |
+ [2]: "-server.http.address=0.0.0.0:80" | |
+ [3]: "-config.expand-env" | |
] | |
+ env : [ | |
+ [0]: { | |
+ name : "DIGIZUITE_CLUSTER_NAME" | |
+ value: "rhdh local cluster" | |
} | |
+ [1]: { | |
+ name : "DIGIZUITE_CLUSTER_ID" | |
+ value: "d4bbb119-72df-40d6-ba8b-0e02df0140a2" | |
} | |
+ [2]: { | |
+ name : "LOGS_URL" | |
+ value: "https://logs-prod-us-central1.grafana.net" | |
} | |
+ [3]: { | |
+ name : "LOGS_USERNAME" | |
+ value: "28465" | |
} | |
+ [4]: { | |
+ name : "LOGS_PASSWORD" | |
+ value: [secret] | |
} | |
+ [5]: { | |
+ name : "HOSTNAME" | |
+ valueFrom: { | |
+ fieldRef: { | |
+ fieldPath: "spec.nodeName" | |
} | |
} | |
} | |
] | |
+ image : "digizuite.azurecr.io/grafana-agent/windows:5.8.0-task-DAM-6078-logs-1" | |
+ imagePullPolicy: "IfNotPresent" | |
+ name : "grafana" | |
+ ports : [ | |
+ [0]: { | |
+ containerPort: 80 | |
+ name : "http-metrics" | |
} | |
] | |
+ resources : { | |
+ limits : { | |
+ cpu : "500m" | |
+ memory: "300Mi" | |
} | |
+ requests: { | |
+ cpu : "100m" | |
+ memory: "100Mi" | |
} | |
} | |
+ volumeMounts : [ | |
+ [0]: { | |
+ mountPath: "C:/etc/agent" | |
+ name : "grafana" | |
} | |
+ [1]: { | |
+ mountPath: "C:/var/log" | |
+ name : "varlog" | |
} | |
] | |
} | |
] | |
~ imagePullSecrets: [ | |
~ [0]: { | |
~ name: "regcreds" => output<string> | |
} | |
] | |
nodeSelector : { | |
kubernetes.io/os: "windows" | |
} | |
~ serviceAccount : "grafana" => output<string> | |
tolerations : [ | |
[0]: { | |
effect : "NoSchedule" | |
operator: "Exists" | |
} | |
] | |
~ volumes : [ | |
~ [0]: { | |
~ configMap: { | |
~ name: "promtail-windows" => output<string> | |
} | |
name : "grafana" | |
} | |
[1]: { | |
hostPath: { | |
path: "C:/var/log" | |
} | |
name : "varlog" | |
} | |
] | |
} | |
} | |
updateStrategy : { | |
type: "RollingUpdate" | |
} | |
} | |
+-kubernetes:core/v1:Service: (replace) | |
[id=grafana/grafana] | |
[urn=urn:pulumi:cluster_d4bbb119-72df-40d6-ba8b-0e02df0140a2_northeurope::cluster_environments::dgz:dgz:cluster-components$dgz:monitoring:kubernetes$dgz:monitoring:metrics$kubernetes:core/v1:Service::metrics_grafana_agent] | |
[provider: urn:pulumi:cluster_d4bbb119-72df-40d6-ba8b-0e02df0140a2_northeurope::cluster_environments::pulumi:providers:kubernetes::k8s::037b697f-66aa-4ee8-aa6f-8a8550f5d071 => urn:pulumi:cluster_d4bbb119-72df-40d6-ba8b-0e02df0140a2_northeurope::cluster_environments::pulumi:providers:kubernetes::k8s::output<string>] | |
apiVersion: "v1" | |
kind : "Service" | |
~ metadata : { | |
labels : { | |
name: "grafana" | |
} | |
name : "grafana" | |
~ namespace: "grafana" => output<string> | |
} | |
~ spec : { | |
clusterIP: "None" | |
ports : [ | |
[0]: { | |
name : "grafana-agent-http-metrics" | |
port : 80 | |
targetPort: 80 | |
} | |
] | |
~ selector : [secret] => output<string> | |
} | |
+-kubernetes:core/v1:Service: (replace) | |
[id=grafana/grafana-traces] | |
[urn=urn:pulumi:cluster_d4bbb119-72df-40d6-ba8b-0e02df0140a2_northeurope::cluster_environments::dgz:dgz:cluster-components$dgz:monitoring:kubernetes$dgz:monitoring:metrics$kubernetes:core/v1:Service::metrics_grafana_agent_traces] | |
[provider: urn:pulumi:cluster_d4bbb119-72df-40d6-ba8b-0e02df0140a2_northeurope::cluster_environments::pulumi:providers:kubernetes::k8s::037b697f-66aa-4ee8-aa6f-8a8550f5d071 => urn:pulumi:cluster_d4bbb119-72df-40d6-ba8b-0e02df0140a2_northeurope::cluster_environments::pulumi:providers:kubernetes::k8s::output<string>] | |
apiVersion: "v1" | |
kind : "Service" | |
~ metadata : { | |
labels : { | |
name: "grafana" | |
} | |
name : "grafana-traces" | |
~ namespace: "grafana" => output<string> | |
} | |
~ spec : { | |
ports : [ | |
[0]: { | |
name : "grafana-agent-traces-thrift-compact" | |
port : 6831 | |
protocol : "UDP" | |
targetPort: 6831 | |
} | |
] | |
~ selector: [secret] => output<string> | |
} | |
--outputs:-- | |
~ KubeConfig : [secret] => output<string> | |
~ RabbitMqClusterName : "digi-rabbitmq-cluster" => output<string> | |
~ RabbitMqClusterNamespace : "rabbitmq" => output<string> | |
+-kubernetes:sftpgo.digizuite.com/v1alpha1:SftpgoAdmin: (replace) | |
[id=sftpgo/digizuite-admin] | |
[urn=urn:pulumi:cluster_d4bbb119-72df-40d6-ba8b-0e02df0140a2_northeurope::cluster_environments::dgz:dgz:sftpgo$kubernetes:sftpgo.digizuite.com/v1alpha1:SftpgoAdmin::admin] | |
[provider: urn:pulumi:cluster_d4bbb119-72df-40d6-ba8b-0e02df0140a2_northeurope::cluster_environments::pulumi:providers:kubernetes::k8s::037b697f-66aa-4ee8-aa6f-8a8550f5d071 => urn:pulumi:cluster_d4bbb119-72df-40d6-ba8b-0e02df0140a2_northeurope::cluster_environments::pulumi:providers:kubernetes::k8s::output<string>] | |
apiVersion: "sftpgo.digizuite.com/v1alpha1" | |
kind : "SftpgoAdmin" | |
~ metadata : { | |
name : "digizuite-admin" | |
~ namespace: "sftpgo" => output<string> | |
} | |
~ spec : { | |
configuration : { | |
description: "The main administrator account used by Digizuite" | |
password : "$sI&198DTvM8" | |
permissions: [ | |
[0]: "all" | |
] | |
username : "digiadmin" | |
} | |
~ sftpgoServerReference: { | |
~ name : "sftpgo" => output<string> | |
~ namespace: "sftpgo" => output<string> | |
} | |
} | |
+-kubernetes:apps/v1:DaemonSet: (replace) | |
[id=grafana/promtail] | |
[urn=urn:pulumi:cluster_d4bbb119-72df-40d6-ba8b-0e02df0140a2_northeurope::cluster_environments::dgz:dgz:cluster-components$dgz:monitoring:kubernetes$dgz:monitoring:logs$kubernetes:apps/v1:DaemonSet::logs_grafana_agent] | |
[provider: urn:pulumi:cluster_d4bbb119-72df-40d6-ba8b-0e02df0140a2_northeurope::cluster_environments::pulumi:providers:kubernetes::k8s::037b697f-66aa-4ee8-aa6f-8a8550f5d071 => urn:pulumi:cluster_d4bbb119-72df-40d6-ba8b-0e02df0140a2_northeurope::cluster_environments::pulumi:providers:kubernetes::k8s::output<string>] | |
apiVersion: "apps/v1" | |
kind : "DaemonSet" | |
~ metadata : { | |
name : "promtail" | |
~ namespace: "grafana" => output<string> | |
} | |
~ spec : { | |
minReadySeconds: 10 | |
selector : { | |
matchLabels: { | |
name: "promtail" | |
} | |
} | |
~ template : { | |
metadata: { | |
labels: { | |
name: "promtail" | |
} | |
} | |
~ spec : { | |
- containers : [secret] | |
+ containers : [ | |
+ [0]: { | |
+ args : [ | |
+ [0]: "-config.file=/etc/agent/agent.yaml" | |
+ [1]: "-enable-features=integrations-next" | |
+ [2]: "-server.http.address=0.0.0.0:80" | |
+ [3]: "-config.expand-env" | |
] | |
+ env : [ | |
+ [0]: { | |
+ name : "DIGIZUITE_CLUSTER_NAME" | |
+ value: "rhdh local cluster" | |
} | |
+ [1]: { | |
+ name : "DIGIZUITE_CLUSTER_ID" | |
+ value: "d4bbb119-72df-40d6-ba8b-0e02df0140a2" | |
} | |
+ [2]: { | |
+ name : "LOGS_URL" | |
+ value: "https://logs-prod-us-central1.grafana.net" | |
} | |
+ [3]: { | |
+ name : "LOGS_USERNAME" | |
+ value: "28465" | |
} | |
+ [4]: { | |
+ name : "LOGS_PASSWORD" | |
+ value: [secret] | |
} | |
+ [5]: { | |
+ name : "HOSTNAME" | |
+ valueFrom: { | |
+ fieldRef: { | |
+ fieldPath: "spec.nodeName" | |
} | |
} | |
} | |
] | |
+ image : "grafana/agent:v0.32.1" | |
+ imagePullPolicy: "IfNotPresent" | |
+ name : "grafana" | |
+ ports : [ | |
+ [0]: { | |
+ containerPort: 80 | |
+ name : "http-metrics" | |
} | |
] | |
+ resources : { | |
+ limits : { | |
+ cpu : "500m" | |
+ memory: "300Mi" | |
} | |
+ requests: { | |
+ cpu : "100m" | |
+ memory: "100Mi" | |
} | |
} | |
+ securityContext: { | |
+ privileged: true | |
+ runAsUser : 0 | |
} | |
+ volumeMounts : [ | |
+ [0]: { | |
+ mountPath: "/etc/agent" | |
+ name : "grafana" | |
} | |
+ [1]: { | |
+ mountPath: "/var/log" | |
+ name : "varlog" | |
} | |
+ [2]: { | |
+ mountPath: "/var/lib/docker/containers" | |
+ name : "varlibdockercontainers" | |
+ readOnly : true | |
} | |
] | |
} | |
] | |
nodeSelector : { | |
kubernetes.io/os: "linux" | |
} | |
~ serviceAccount: "grafana" => output<string> | |
tolerations : [ | |
[0]: { | |
effect : "NoSchedule" | |
operator: "Exists" | |
} | |
] | |
~ volumes : [ | |
~ [0]: { | |
~ configMap: { | |
~ name: "promtail" => output<string> | |
} | |
name : "grafana" | |
} | |
[1]: { | |
hostPath: { | |
path: "/var/log" | |
} | |
name : "varlog" | |
} | |
[2]: { | |
hostPath: { | |
path: "/var/lib/docker/containers" | |
} | |
name : "varlibdockercontainers" | |
} | |
] | |
} | |
} | |
updateStrategy : { | |
type: "RollingUpdate" | |
} | |
} | |
+-kubernetes:traefik.containo.us/v1alpha1:IngressRouteTCP: (replace) | |
[id=sftpgo/sftpgosftpingress] | |
[urn=urn:pulumi:cluster_d4bbb119-72df-40d6-ba8b-0e02df0140a2_northeurope::cluster_environments::dgz:dgz:sftpgo$kubernetes:traefik.containo.us/v1alpha1:IngressRouteTCP::sftpgo-sftp-ingress] | |
[provider: urn:pulumi:cluster_d4bbb119-72df-40d6-ba8b-0e02df0140a2_northeurope::cluster_environments::pulumi:providers:kubernetes::k8s::037b697f-66aa-4ee8-aa6f-8a8550f5d071 => urn:pulumi:cluster_d4bbb119-72df-40d6-ba8b-0e02df0140a2_northeurope::cluster_environments::pulumi:providers:kubernetes::k8s::output<string>] | |
apiVersion: "traefik.containo.us/v1alpha1" | |
kind : "IngressRouteTCP" | |
~ metadata : { | |
name : "sftpgosftpingress" | |
~ namespace: "sftpgo" => output<string> | |
} | |
~ spec : { | |
entryPoints: [ | |
[0]: "sftp" | |
] | |
~ routes : [ | |
~ [0]: { | |
match : "HostSNI(`*`)" | |
~ services: [ | |
~ [0]: { | |
~ name : "sftpgo" => output<string> | |
~ port : 1111 => output<string> | |
proxyProtocol: { | |
version: 2 | |
} | |
} | |
] | |
} | |
] | |
} | |
+-kubernetes:networking.k8s.io/v1:Ingress: (replace) | |
[id=sftpgo/sftpgodashboardingress] | |
[urn=urn:pulumi:cluster_d4bbb119-72df-40d6-ba8b-0e02df0140a2_northeurope::cluster_environments::dgz:dgz:sftpgo$kubernetes:networking.k8s.io/v1:Ingress::sftpgo-web-ingress] | |
[provider: urn:pulumi:cluster_d4bbb119-72df-40d6-ba8b-0e02df0140a2_northeurope::cluster_environments::pulumi:providers:kubernetes::k8s::037b697f-66aa-4ee8-aa6f-8a8550f5d071 => urn:pulumi:cluster_d4bbb119-72df-40d6-ba8b-0e02df0140a2_northeurope::cluster_environments::pulumi:providers:kubernetes::k8s::output<string>] | |
apiVersion: "networking.k8s.io/v1" | |
kind : "Ingress" | |
~ metadata : { | |
annotations: { | |
traefik.ingress.kubernetes.io/router.entrypoints : "web" | |
traefik.ingress.kubernetes.io/router.tls : "false" | |
traefik.ingress.kubernetes.io/router.tls.certresolver : "letsencrypt" | |
traefik.ingress.kubernetes.io/router.tls.domains.0.main: "*.rhdh.dk" | |
} | |
name : "sftpgodashboardingress" | |
~ namespace : "sftpgo" => output<string> | |
} | |
~ spec : { | |
~ rules: [ | |
~ [0]: { | |
host: "digizuite-northeurope-d4bbb11972df40d6ba8b0e02df0140a2.rhdh.dk" | |
~ http: { | |
~ paths: [ | |
~ [0]: { | |
~ backend : { | |
~ service: { | |
~ name: "sftpgo" => output<string> | |
~ port: { | |
~ number: 3333 => output<string> | |
} | |
} | |
} | |
path : "/web" | |
pathType: "Prefix" | |
} | |
~ [1]: { | |
~ backend : { | |
~ service: { | |
~ name: "sftpgo" => output<string> | |
~ port: { | |
~ number: 3333 => output<string> | |
} | |
} | |
} | |
path : "/static" | |
pathType: "Prefix" | |
} | |
] | |
} | |
} | |
] | |
} | |
- azure-native:containerservice:ManagedCluster: (delete) 🔒 | |
[id=/subscriptions/44eeb119-3e69-49bb-a61d-c476cd7e0de9/resourcegroups/dgz_k8s_d4bbb1/providers/Microsoft.ContainerService/managedClusters/dgz_k8s_d4bbb1_cluster] | |
[urn=urn:pulumi:cluster_d4bbb119-72df-40d6-ba8b-0e02df0140a2_northeurope::cluster_environments::dgz:dgz:KubernetesCluster$azure-native:containerservice:ManagedCluster::cluster] | |
[provider=urn:pulumi:cluster_d4bbb119-72df-40d6-ba8b-0e02df0140a2_northeurope::cluster_environments::pulumi:providers:azure-native::azure-provider::5df398d3-ed0f-4f97-a8a1-4312993e162e] | |
agentPoolProfiles : [ | |
[0]: { | |
count : 1 | |
enableAutoScaling : true | |
maxCount : 1 | |
maxPods : 250 | |
minCount : 1 | |
mode : "User" | |
name : "digibatch" | |
nodeLabels : { | |
digizuite/product: "digibatch" | |
} | |
orchestratorVersion: "1.25.6" | |
vmSize : "Standard_B8ms" | |
vnetSubnetID : "/subscriptions/44eeb119-3e69-49bb-a61d-c476cd7e0de9/resourceGroups/dgz_k8s_d4bbb1/providers/Microsoft.Network/virtualNetworks/dgz-d4bbb11972df40d6ba8b0e02df0140a2/subnets/digibatch_pool_subnet" | |
} | |
[1]: { | |
count : 1 | |
enableAutoScaling : true | |
enableFIPS : false | |
kubeletDiskType : "OS" | |
maxCount : 1 | |
maxPods : 250 | |
minCount : 1 | |
mode : "User" | |
name : "digicore" | |
nodeLabels : { | |
digizuite/product: "digizuite-core" | |
} | |
orchestratorVersion: "1.25.6" | |
osDiskSizeGB : 128 | |
osDiskType : "Managed" | |
osSKU : "Ubuntu" | |
osType : "Linux" | |
type : "VirtualMachineScaleSets" | |
vmSize : "Standard_B4ms" | |
vnetSubnetID : "/subscriptions/44eeb119-3e69-49bb-a61d-c476cd7e0de9/resourceGroups/dgz_k8s_d4bbb1/providers/Microsoft.Network/virtualNetworks/dgz-d4bbb11972df40d6ba8b0e02df0140a2/subnets/digizuite_core_pool_subnet" | |
} | |
[2]: { | |
count : 1 | |
enableFIPS : false | |
kubeletDiskType : "OS" | |
maxPods : 30 | |
mode : "System" | |
name : "system" | |
orchestratorVersion: "1.25.6" | |
osDiskSizeGB : 128 | |
osDiskType : "Managed" | |
osSKU : "Ubuntu" | |
osType : "Linux" | |
type : "VirtualMachineScaleSets" | |
vmSize : "Standard_B4ms" | |
vnetSubnetID : "/subscriptions/44eeb119-3e69-49bb-a61d-c476cd7e0de9/resourceGroups/dgz_k8s_d4bbb1/providers/Microsoft.Network/virtualNetworks/dgz-d4bbb11972df40d6ba8b0e02df0140a2/subnets/cluster_main_subnet" | |
} | |
[3]: { | |
count : 1 | |
enableAutoScaling : true | |
enableFIPS : false | |
kubeletDiskType : "OS" | |
maxCount : 1 | |
maxPods : 250 | |
minCount : 1 | |
mode : "User" | |
name : "thirdparty" | |
nodeLabels : { | |
digizuite/product: "third-party" | |
} | |
orchestratorVersion: "1.25.6" | |
osDiskSizeGB : 128 | |
osDiskType : "Managed" | |
osSKU : "Ubuntu" | |
osType : "Linux" | |
type : "VirtualMachineScaleSets" | |
vmSize : "Standard_B4ms" | |
vnetSubnetID : "/subscriptions/44eeb119-3e69-49bb-a61d-c476cd7e0de9/resourceGroups/dgz_k8s_d4bbb1/providers/Microsoft.Network/virtualNetworks/dgz-d4bbb11972df40d6ba8b0e02df0140a2/subnets/third_party_pool_subnet" | |
} | |
[4]: { | |
count : 1 | |
enableAutoScaling : true | |
enableFIPS : false | |
kubeletDiskType : "OS" | |
maxCount : 1 | |
maxPods : 250 | |
minCount : 1 | |
mode : "User" | |
name : "window" | |
nodeLabels : { | |
digizuite/product: "windows" | |
} | |
orchestratorVersion: "1.25.6" | |
osDiskSizeGB : 128 | |
osDiskType : "Managed" | |
osSKU : "Windows2022" | |
osType : "Windows" | |
type : "VirtualMachineScaleSets" | |
vmSize : "Standard_B4ms" | |
vnetSubnetID : "/subscriptions/44eeb119-3e69-49bb-a61d-c476cd7e0de9/resourceGroups/dgz_k8s_d4bbb1/providers/Microsoft.Network/virtualNetworks/dgz-d4bbb11972df40d6ba8b0e02df0140a2/subnets/windows_pool_subnet" | |
} | |
] | |
autoScalerProfile : { | |
scaleDownDelayAfterAdd: "1m" | |
scaleDownUnneededTime : "1m" | |
} | |
autoUpgradeProfile: { | |
upgradeChannel: "stable" | |
} | |
dnsPrefix : "dgz-k8s-northeurope-d4bbb1" | |
identity : { | |
type: "SystemAssigned" | |
} | |
kubernetesVersion : "1.25.6" | |
location : "northeurope" | |
networkProfile : { | |
dnsServiceIP : "10.0.0.10" | |
dockerBridgeCidr: "172.17.0.1/16" | |
networkPlugin : "azure" | |
outboundType : "loadBalancer" | |
podCidr : "10.244.0.0/16" | |
serviceCidr : "10.0.0.0/16" | |
} | |
resourceGroupName : "dgz_k8s_d4bbb1" | |
resourceName : "dgz_k8s_d4bbb1_cluster" | |
tags : { | |
CreatedBy : "local-rhdh" | |
RegionId : "d4bbb119-72df-40d6-ba8b-0e02df0140a2" | |
RegionName : "rhdh local cluster" | |
SubscriptionName: "Azure dev" | |
} | |
Resources: | |
+ 1 to create | |
~ 1 to update | |
+-38 to replace | |
40 changes. 38 unchanged | |
stderr: error: Preview failed: resource "urn:pulumi:cluster_d4bbb119-72df-40d6-ba8b-0e02df0140a2_northeurope::cluster_environments::dgz:dgz:KubernetesCluster$azure-native:containerservice:ManagedCluster::cluster" cannot be deleted | |
because it is protected. To unprotect the resource, either remove the `protect` flag from the resource in your Pulumi program and run `pulumi up`, or use the command: | |
`pulumi state unprotect 'urn:pulumi:cluster_d4bbb119-72df-40d6-ba8b-0e02df0140a2_northeurope::cluster_environments::dgz:dgz:KubernetesCluster$azure-native:containerservice:ManagedCluster::cluster'` | |
error: preview failed | |
at Pulumi.Automation.Commands.LocalPulumiCmd.RunAsyncInner(IList`1 args, String workingDir, IDictionary`2 additionalEnv, Action`1 onStandardOutput, Action`1 onStandardError, EventLogFile eventLogFile, CancellationToken cancellationToken) | |
at Pulumi.Automation.Commands.LocalPulumiCmd.RunAsync(IList`1 args, String workingDir, IDictionary`2 additionalEnv, Action`1 onStandardOutput, Action`1 onStandardError, Action`1 onEngineEvent, CancellationToken cancellationToken) | |
at Pulumi.Automation.Commands.LocalPulumiCmd.RunAsync(IList`1 args, String workingDir, IDictionary`2 additionalEnv, Action`1 onStandardOutput, Action`1 onStandardError, Action`1 onEngineEvent, CancellationToken cancellationToken) | |
at Pulumi.Automation.Workspace.RunStackCommandAsync(String stackName, IList`1 args, Action`1 onStandardOutput, Action`1 onStandardError, Action`1 onEngineEvent, CancellationToken cancellationToken) | |
at Pulumi.Automation.WorkspaceStack.RunCommandAsync(IList`1 args, Action`1 onStandardOutput, Action`1 onStandardError, Action`1 onEngineEvent, CancellationToken cancellationToken) | |
at Pulumi.Automation.WorkspaceStack.PreviewAsync(PreviewOptions options, CancellationToken cancellationToken) | |
at Pulumi.Automation.WorkspaceStack.PreviewAsync(PreviewOptions options, CancellationToken cancellationToken) | |
at DeploymentManager.Api.Extensions.StackExtensions.RefreshAndPreview(WorkspaceStack stack, Action`1 onPulumiOutput, ILogger logger, CancellationToken cancellationToken) in C:\dev\TailscaleManager\DeploymentManager.Api\Extensions\StackExtensions.cs:line 26 | |
at DeploymentManager.Api.Services.RegionManagerService.GetDiff(AzureSubscription subscription, DeploymentRegion region, Action`1 onPulumiOutput) in C:\dev\TailscaleManager\DeploymentManager.Api\Services\RegionManagerService.cs:line 99 | |
at DeploymentManager.Api.Controllers.DeploymentHub.GetRegionDiff(Guid regionId) in C:\dev\TailscaleManager\DeploymentManager.Api\Controllers\DeploymentHub_Regions.cs:line 51 | |
Failed to GetRegionDiff: Error: An unexpected error occurred invoking 'GetRegionDiff' on the server. |
Sign up for free
to join this conversation on GitHub.
Already have an account?
Sign in to comment