Skip to content

Instantly share code, notes, and snippets.

View radikaled's full-sized avatar

radikaled

  • Issaquah, WA
  • 10:53 (UTC -08:00)
View GitHub Profile

Keybase proof

I hereby claim:

  • I am radikaled on github.
  • I am nkim (https://keybase.io/nkim) on keybase.
  • I have a public key whose fingerprint is 3591 1E48 935C F499 BAD3 B3E8 A1F5 CC29 F13F DF74

To claim this, I am signing this object:

@radikaled
radikaled / aap-ac-example.yaml
Created February 13, 2024 19:40
AutomationController with custom rhsm.conf
apiVersion: automationcontroller.ansible.com/v1beta1
kind: AutomationController
metadata:
name: example
namespace: aap
spec:
postgres_keepalives_count: 5
postgres_keepalives_idle: 5
create_preload_data: true
route_tls_termination_mechanism: Edge
@radikaled
radikaled / kc.java.security
Last active January 17, 2024 16:23
Sample custom java.security for strict FIPS Keycloak
# BountyCastle will not start without this
securerandom.strongAlgorithms=PKCS11:SunPKCS11-NSS-FIPS
# https://www.keycloak.org/server/fips#_other_restrictions
fips.provider.8=SunJGSS
@radikaled
radikaled / keycloak.yaml
Created January 17, 2024 15:40
Example Keycloak CR utilizing strict FIPS custom image
apiVersion: k8s.keycloak.org/v2alpha1
kind: Keycloak
metadata:
name: example-keycloak
namespace: $(NAMESPACE)
spec:
additionalOptions:
- name: spi-truststore-file-file
value: /opt/keycloak/conf/server.keystore
- name: spi-truststore-file-password
@radikaled
radikaled / Containerfile
Last active January 17, 2024 15:12
Containerfile for Keycloak server in strict FIPS mode (OCP4)
FROM registry.redhat.io/rhbk/keycloak-rhel9:22-6 as builder
# What these environment variables mean:
# https://www.keycloak.org/server/all-config?f=build
# Set to appropriate database provider
ENV KC_DB=postgres
ENV KC_CACHE_STACK=kubernetes
ENV KC_FEATURES=fips,kerberos
@radikaled
radikaled / pod.yaml
Created May 13, 2022 04:46
Azure Files NFS Pod Volume
apiVersion: v1
kind: Pod
metadata:
name: example
labels:
app: httpd
namespace: nfs
spec:
volumes:
- name: nfs
@radikaled
radikaled / pvc.yaml
Created May 13, 2022 04:44
Azure Files NFS PVC
apiVersion: v1
kind: PersistentVolumeClaim
metadata:
name: nfs-claim
spec:
accessModes:
- ReadWriteOnce
resources:
requests:
storage: 100Gi
@radikaled
radikaled / pv.yaml
Created May 13, 2022 04:43
Azure Files NFS PV
apiVersion: v1
kind: PersistentVolume
metadata:
name: pv0001
spec:
capacity:
storage: 100Gi
accessModes:
- ReadWriteOnce
nfs:
@radikaled
radikaled / Dockerfile
Last active May 10, 2022 05:53
Simple azcopy container build
FROM registry.redhat.io/openshift4/ose-cli AS builder
WORKDIR /tmp
RUN wget -O azcopy_v10.tar.gz "https://aka.ms/downloadazcopy-v10-linux" && tar -xf azcopy_v10.tar.gz --strip-components=1
FROM registry.redhat.io/openshift4/ose-cli
COPY --from=builder --chown=root:root --chmod=755 /tmp/azcopy /usr/bin
@radikaled
radikaled / policy-acs-operator-clusters.yaml
Last active September 24, 2021 04:44
policy-advanced-managed-cluster-security (dynamic centralEndpoint and clusterName)
# This policy deploys the Red Hat Advanced Cluster Security Secure Cluster
# Services to all OpenShift managed clusters. Note that it is set to
# enforce by default and it requires RHACM 2.3 template support.
#
# Prior to applying this policy you must visit
# https://github.com/open-cluster-management/advanced-cluster-security
# and follow the instructions there to deploy prerequisite bundles
# needed by the Secure Cluster Services for communicating with the
# Central server.
#