I hereby claim:
- I am lwolf on github.
 - I am lwolf (https://keybase.io/lwolf) on keybase.
 - I have a public key whose fingerprint is E57E 72C7 E772 3858 8B8E 6C10 9ABA E27A C00C 66EE
 
To claim this, I am signing this object:
| kubectl exec -it agola-gateway-pod /bin/bash | |
| # add gitea | |
| root$ agola remotesource create \ | |
| --name gitea \ | |
| --type gitea \ | |
| --api-url https://gitea.yourdomain.com \ | |
| --auth-type oauth2 \ | |
| --clientid $GITEA_APP_CLIENTID \ | |
| --secret $GITEA_APP_CLIENTSECRET \ | |
| --token $ADMIN_TOKEN \ | 
I hereby claim:
To claim this, I am signing this object:
| apiVersion: networking.istio.io/v1alpha3 | |
| kind: Gateway | |
| metadata: | |
| name: service-gw | |
| namespace: istio-system | |
| spec: | |
| selector: | |
| istio: ingressgateway | |
| servers: | |
| - port: | 
| istio-ingressgateway: | |
| secretVolumes: | |
| ... | |
| - name: example-com-certs | |
| secretName: example-com-certs | |
| mountPath: /etc/istio/example-com-certs | |
| ... | 
| apiVersion: certmanager.k8s.io/v1alpha1 | |
| kind: Certificate | |
| metadata: | |
| name: example-com | |
| spec: | |
| secretName: example-com-certs | |
| issuerRef: | |
| name: letsencrypt-live | |
| kind: ClusterIssuer | |
| commonName: '*.example.com' | 
| apiVersion: networking.istio.io/v1alpha3 | |
| kind: VirtualService | |
| metadata: | |
| name: grafana | |
| spec: | |
| hosts: | |
| - grafana.example.com | |
| gateways: | |
| - service-gw.default | |
| http: | 
| apiVersion: networking.istio.io/v1alpha3 | |
| kind: Gateway | |
| metadata: | |
| name: service-gw | |
| namespace: default | |
| spec: | |
| selector: | |
| istio: ingressgateway | |
| servers: | |
| - port: | 
| apiVersion: extensions/v1beta1 | |
| kind: Ingress | |
| metadata: | |
| annotations: | |
| kubernetes.io/ingress.class: nginx | 
NAME                     TYPE           CLUSTER-IP      EXTERNAL-IP     PORT(S)                                                      AGE
grafana                  ClusterIP      10.233.47.239   <none>          3000/TCP                                                      1h
istio-citadel            ClusterIP      10.233.52.66    <none>          8060/TCP,15014/TCP                                           1h
istio-egressgateway      ClusterIP      10.233.39.186   <none>          80/TCP,443/TCP,15443/TCP                                     1h
istio-galley             ClusterIP      10.233.6.227    <none>          443/TCP,15014/TCP,9901/TCP                                   1h
istio-ingress            LoadBalancer   10.233.29.116   192.168.11.122   80:32000/TCP,443:32256/TCP                                   1h
istio-ingressgateway     LoadBalancer   10.233.37.74    192.168.11.121   80:31380/TCP,443:31390/TCP                                   1h
istio-pilot ClusterIP
$ kubectl get pods -n istio-system
grafana-d5d58cb7-fchjq                    1/1       Running     0          20h
istio-citadel-c4489d577-wlwdh             1/1       Running     0          20h
istio-egressgateway-5d4dd5f974-84btz      1/1       Running     0          20h
istio-galley-57586fbc4-wgp55              1/1       Running     0          20h
istio-ingress-6bf7fd96bd-v4s28            1/1       Running     0          20h
istio-ingressgateway-6469b49cf-75pnb      1/1       Running     0          20h
istio-pilot-5d76999bfc-lthr5              2/2       Running     0          20h
istio-policy-5684c685cb-5qphq             2/2       Running     4          20h
istio-sidecar-injector-58dff7458d-cqbhd 1/1 Running 0 20h