Add argocd here

This commit is contained in:
Micke Nordin 2023-03-31 07:53:00 +02:00
parent 2de3113840
commit cb466b7317
Signed by untrusted user: Micke
GPG key ID: 0DA0A7A5708FE257
21 changed files with 405 additions and 0 deletions

View file

@ -0,0 +1,31 @@
apiVersion: networking.k8s.io/v1
kind: Ingress
metadata:
name: argocd-ingress
namespace: argocd
annotations:
kubernetes.io/ingress.class: traefik
traefik.ingress.kubernetes.io/router.entrypoints: websecure
traefik.ingress.kubernetes.io/router.tls: "true"
spec:
defaultBackend:
service:
name: argocd-server
port:
number: 8443
tls:
- hosts:
- argocd.drive.sunet.se
secretName: tls-secret
rules:
- host: argocd.drive.sunet.se
http:
paths:
- path: /
pathType: Prefix
backend:
service:
name: argocd-server
port:
number: 80

View file

@ -0,0 +1,6 @@
apiVersion: 'kustomize.config.k8s.io/v1beta1'
kind: Kustomization
bases:
- ../../base
patchesStrategicMerge:
- argocd-ingress.yaml

View file

@ -0,0 +1,7 @@
apiVersion: v1
kind: Namespace
metadata:
name: argocd
spec:
finalizers:
- kubernetes

View file

@ -0,0 +1,6 @@
apiVersion: kustomize.config.k8s.io/v1beta1
kind: Kustomization
namespace: argocd
resources:
- https://raw.githubusercontent.com/argoproj/argo-cd/v2.5.10/manifests/ha/install.yaml

View file

@ -0,0 +1,16 @@
apiVersion: v1
kind: ConfigMap
metadata:
labels:
app.kubernetes.io/instance: argocd
app.kubernetes.io/name: argocd-cm
app.kubernetes.io/part-of: argocd
name: argocd-cm
namespace: argocd
data:
resource.customizations: |
networking.k8s.io/Ingress:
health.lua: |
hs = {}
hs.status = "Healthy"
return hs

View file

@ -0,0 +1,22 @@
apiVersion: apps/v1
kind: Deployment
metadata:
labels:
app.kubernetes.io/component: server
app.kubernetes.io/name: argocd-server
app.kubernetes.io/part-of: argocd
name: argocd-server
namespace: argocd
spec:
template:
metadata:
labels:
app.kubernetes.io/name: argocd-server
spec:
containers:
- name: argocd-server
command:
- argocd-server
- --insecure
- --redis
- "argocd-redis-ha-haproxy:6379"

View file

@ -0,0 +1,8 @@
apiVersion: 'kustomize.config.k8s.io/v1beta1'
kind: Kustomization
bases:
- ../../base
patchesStrategicMerge:
- argocd-server-deployment.yaml
- argocd-cm.yaml
- argocd-ingress.yaml

View file

@ -0,0 +1,16 @@
apiVersion: v1
kind: ConfigMap
metadata:
labels:
app.kubernetes.io/instance: argocd
app.kubernetes.io/name: argocd-cm
app.kubernetes.io/part-of: argocd
name: argocd-cm
namespace: argocd
data:
resource.customizations: |
networking.k8s.io/Ingress:
health.lua: |
hs = {}
hs.status = "Healthy"
return hs

View file

@ -0,0 +1,21 @@
apiVersion: apps/v1
kind: Deployment
metadata:
labels:
app.kubernetes.io/component: repo-server
app.kubernetes.io/name: argocd-repo-server
app.kubernetes.io/part-of: argocd
name: argocd-repo-server
namespace: argocd
spec:
template:
metadata:
labels:
app.kubernetes.io/name: argocd-repo-server
spec:
containers:
- name: argocd-repo-server
env:
- name: ARGOCD_EXEC_TIMEOUT
value: "300s"

View file

@ -0,0 +1,23 @@
apiVersion: apps/v1
kind: Deployment
metadata:
labels:
app.kubernetes.io/component: server
app.kubernetes.io/name: argocd-server
app.kubernetes.io/part-of: argocd
name: argocd-server
namespace: argocd
spec:
template:
metadata:
labels:
app.kubernetes.io/name: argocd-server
spec:
containers:
- name: argocd-server
command:
- argocd-server
- --insecure
- --redis
- "argocd-redis-ha-haproxy:6379"

View file

@ -0,0 +1,8 @@
apiVersion: 'kustomize.config.k8s.io/v1beta1'
kind: Kustomization
bases:
- ../../base
patchesStrategicMerge:
- argocd-server-deployment.yaml
- argocd-repo-server-deployment.yaml
- argocd-cm.yaml

View file

@ -0,0 +1,32 @@
---
apiVersion: networking.k8s.io/v1
kind: Ingress
metadata:
name: describo-ingress
namespace: rds
annotations:
kubernetes.io/ingress.class: traefik
traefik.ingress.kubernetes.io/router.entrypoints: websecure
traefik.ingress.kubernetes.io/router.tls: "true"
spec:
defaultBackend:
service:
name: layer0-describo
port:
number: 80
tls:
- hosts:
- describo.drive.test.sunet.se
secretName: tls-secret
rules:
- host: describo.drive.test.sunet.se
http:
paths:
- path: /
pathType: Prefix
backend:
service:
name: layer0-describo
port:
number: 80

View file

@ -0,0 +1,53 @@
---
kind: Deployment
apiVersion: apps/v1
metadata:
name: layer1-port-doris
namespace: rds
labels:
app: layer1-port-doris
spec:
replicas: 1
selector:
matchLabels:
app: layer1-port-doris
template:
metadata:
creationTimestamp:
labels:
app: layer1-port-doris
spec:
containers:
- name: doris
image: docker.sunet.se/rds/doris-rds:ci-RDS-Connectors-13
env:
- name: ASPNETCORE_ENVIRONMENT
value: Development
- name: ASPNETCORE_URLS
value: http://+:80
- name: Domain
value: sunet.se
- name: ScieboRds__TokenStorageUrl
value: http://layer3-token-storage
- name: S3__Url
value: dummy
- name: ManifestIndex__Url
value: https://snd-storage-metadata-index-test-snd-dev.apps.k8s.gu.se
- name: ManifestIndex__ApiKey
valueFrom:
secretKeyRef:
name: doris-api-key
key: "api-key"
- name: S3__AccessKey
valueFrom:
secretKeyRef:
name: doris-s3-key
key: "s3-key"
- name: S3__SecretKey
valueFrom:
secretKeyRef:
name: doris-s3-secret
key: "s3-secret"
resources: {}
strategy: {}
status: {}

View file

@ -0,0 +1,25 @@
---
apiVersion: v1
items:
- apiVersion: v1
kind: Service
metadata:
labels:
app: layer1-port-doris
name: layer1-port-doris
namespace: rds
spec:
ports:
- port: 80
protocol: TCP
targetPort: 80
selector:
app: layer1-port-doris
sessionAffinity: None
type: ClusterIP
status:
loadBalancer: {}
kind: List
metadata:
resourceVersion: ""
selfLink: ""

View file

@ -0,0 +1,5 @@
resources:
- describo-ingress.yml
- doris-deployment.yml
- rds-ingress.yml
- sunet-service.yml

View file

@ -0,0 +1,32 @@
---
apiVersion: networking.k8s.io/v1
kind: Ingress
metadata:
name: rds-ingress
namespace: rds
annotations:
kubernetes.io/ingress.class: traefik
traefik.ingress.kubernetes.io/router.entrypoints: websecure
traefik.ingress.kubernetes.io/router.tls: "true"
spec:
defaultBackend:
service:
name: layer0-web
port:
number: 80
tls:
- hosts:
- rds.drive.test.sunet.se
secretName: tls-secret
rules:
- host: rds.drive.test.sunet.se
http:
paths:
- path: /
pathType: Prefix
backend:
service:
name: layer0-web
port:
number: 80

View file

@ -0,0 +1,11 @@
---
apiVersion: v1
kind: Service
metadata:
name: sunet-drive
namespace: sunetrds
spec:
type: ExternalName
externalName: sunet.drive.test.sunet.se
ports:
- port: 443

View file

@ -0,0 +1,32 @@
---
apiVersion: networking.k8s.io/v1
kind: Ingress
metadata:
name: describo-ingress
namespace: rds
annotations:
kubernetes.io/ingress.class: traefik
traefik.ingress.kubernetes.io/router.entrypoints: websecure
traefik.ingress.kubernetes.io/router.tls: "true"
spec:
defaultBackend:
service:
name: layer0-describo
port:
number: 80
tls:
- hosts:
- describo.drive.test.sunet.se
secretName: tls-secret
rules:
- host: describo.drive.test.sunet.se
http:
paths:
- path: /
pathType: Prefix
backend:
service:
name: layer0-describo
port:
number: 80

View file

@ -0,0 +1,8 @@
apiVersion: 'kustomize.config.k8s.io/v1beta1'
kind: Kustomization
bases:
- ../../base
patchesStrategicMerge:
- describo-ingress.yml
- rds-ingress.yml
- sunet-service.yml

View file

@ -0,0 +1,32 @@
---
apiVersion: networking.k8s.io/v1
kind: Ingress
metadata:
name: rds-ingress
namespace: rds
annotations:
kubernetes.io/ingress.class: traefik
traefik.ingress.kubernetes.io/router.entrypoints: websecure
traefik.ingress.kubernetes.io/router.tls: "true"
spec:
defaultBackend:
service:
name: layer0-web
port:
number: 80
tls:
- hosts:
- rds.drive.test.sunet.se
secretName: tls-secret
rules:
- host: rds.drive.test.sunet.se
http:
paths:
- path: /
pathType: Prefix
backend:
service:
name: layer0-web
port:
number: 80

View file

@ -0,0 +1,11 @@
---
apiVersion: v1
kind: Service
metadata:
name: sunet-drive
namespace: sunetrds
spec:
type: ExternalName
externalName: sunet.drive.test.sunet.se
ports:
- port: 443