Skip to content

Instantly share code, notes, and snippets.

View jseiser's full-sized avatar

Justin Seiser jseiser

  • Ohio
View GitHub Profile
enablePodDisruptionBudget: true
commonLabels: # This is a hack for Pod Monitor Until
release: kube-prometheus-stack
deploymentStrategy:
rollingUpdate:
maxUnavailable: 1
maxSurge: 25%
enablePodAntiAffinity: true
proxy:
logFormat: json
apiVersion: cert-manager.io/v1
kind: Issuer
metadata:
name: linkerd-webhook-trust-root-issuer
namespace: cert-manager
spec:
selfSigned: {}
---
apiVersion: cert-manager.io/v1
kind: Certificate
@jseiser
jseiser / control-plane.yaml
Created June 20, 2025 15:45
Control Plane
apiVersion: cert-manager.io/v1
kind: Issuer
metadata:
name: linkerd-trust-root-issuer
namespace: cert-manager
spec:
selfSigned: {}
---
apiVersion: cert-manager.io/v1
kind: Certificate
➜ ~ docker logs iptvboss
Setting iptvboss user and group id to 1000 and 1000...
Installing cronitor...
Cronitor installed successfully.
Starting the cron daemon
The cron daemon started successfully.
CRON_SCHEDULE set for 0 0 * * * as defined. Updated the cron job schedule.
Creating a new monitor named 'BOSS'.
Created monitor with key: 5iVG3Y
Updated crontab with monitor ID: 5iVG3Y
logging {
level = "info"
format = "json"
}
otelcol.receiver.otlp "default" {
debug_metrics {
disable_high_cardinality_metrics = true
}
grpc {
{"name":"renovate","hostname":"runner-equgucjxw-project-360-concurrent-0-nh53ldde","pid":36,"level":20,"logContext":"4f_fQV0iowxru7jDe3NZ1","msg":"Using RE2 regex engine","time":"2025-03-10T19:15:44.527Z","v":0}
{"name":"renovate","hostname":"runner-equgucjxw-project-360-concurrent-0-nh53ldde","pid":36,"level":20,"logContext":"4f_fQV0iowxru7jDe3NZ1","msg":"Parsing configs","time":"2025-03-10T19:15:44.534Z","v":0}
{"name":"renovate","hostname":"runner-equgucjxw-project-360-concurrent-0-nh53ldde","pid":36,"level":20,"logContext":"4f_fQV0iowxru7jDe3NZ1","msg":"No config file found on disk - skipping","time":"2025-03-10T19:15:44.538Z","v":0}
{"name":"renovate","hostname":"runner-equgucjxw-project-360-concurrent-0-nh53ldde","pid":36,"level":20,"logContext":"4f_fQV0iowxru7jDe3NZ1","msg":"Converting GITHUB_COM_TOKEN into a global host rule","time":"2025-03-10T19:15:44.552Z","v":0}
{"name":"renovate","hostname":"runner-equgucjxw-project-360-concurrent-0-nh53ldde","pid":36,"level":20,"logContext":"4f_fQV0iowxru7jDe3NZ
{"level":"info","ts":1733949964.5190644,"msg":"Copyright 2020-2023 the Vouch Proxy Authors"}
{"level":"warn","ts":1733949964.5190883,"msg":"Vouch Proxy is free software with ABSOLUTELY NO WARRANTY."}
{"level":"info","ts":1733949964.5198016,"msg":"Vouch Proxy configuration set from Environmental Variables"}
{"level":"warn","ts":1733949964.5198212,"msg":"generating random session.key"}
{"level":"info","ts":1733949964.5198524,"msg":"setting LogLevel to info"}
{"level":"info","ts":1733949964.5198584,"msg":"configuring oidc OAuth with Endpoint https://auth.my.tld/oauth2/v1/authorize"}
{"level":"info","ts":1733949964.5198927,"msg":"jwtcache: the returned headers for a valid jwt will be cached for 20 minutes"}
{"level":"info","ts":1733949964.5201967,"msg":"starting Vouch Proxy","version":"012b2fd","buildtime":"2024-10-01T22:02:54Z","uname":"Linux","buildhost":"buildkitsandbox","branch":"HEAD","semver":"v0.41.0","listen":"http://0.0.0.0:9090","tls":false,"document_root":"","oauth.provider":"oidc"}
{"level":"info","ts
nginx.ingress.kubernetes.io/auth-response-headers: X-Vouch-User
nginx.ingress.kubernetes.io/auth-signin: https://vouch-ops-dev.my.tld/login?url=$scheme://$http_host$request_uri&vouch-failcount=$auth_resp_failcount&X-Vouch-Token=$auth_resp_jwt&error=$auth_resp_err
nginx.ingress.kubernetes.io/auth-snippet: |
auth_request_set $auth_resp_jwt $upstream_http_x_vouch_jwt;
auth_request_set $auth_resp_err $upstream_http_x_vouch_err;
auth_request_set $auth_resp_failcount $upstream_http_x_vouch_failcount;
nginx.ingress.kubernetes.io/auth-url: https://vouch-ops-dev.my.tld/validate
# Configuration checksum: 5462546966217761004
# setup custom paths that do not require root access
pid /tmp/nginx/nginx.pid;
load_module /etc/nginx/modules/ngx_http_modsecurity_module.so;
daemon off;
```
Environment:
VOUCH_PORT: 9090
VOUCH_LOGLEVEL: info
VOUCH_TESTING: false
VOUCH_ALLOWALLUSERS: true