mirror of
https://github.com/michaelthomson0797/fleet-infra.git
synced 2026-02-04 13:09:53 +00:00
weave gitops
This commit is contained in:
@@ -0,0 +1,9 @@
|
||||
apiVersion: source.toolkit.fluxcd.io/v1beta2
|
||||
kind: HelmRepository
|
||||
metadata:
|
||||
name: weave-gitops
|
||||
namespace: flux-system
|
||||
spec:
|
||||
interval: 15m
|
||||
type: oci
|
||||
url: oci://ghcr.io/weaveworks/charts
|
||||
18
bootstrap/kustomizations/kustomization-weave-gitops.yaml
Normal file
18
bootstrap/kustomizations/kustomization-weave-gitops.yaml
Normal file
@@ -0,0 +1,18 @@
|
||||
apiVersion: kustomize.toolkit.fluxcd.io/v1
|
||||
kind: Kustomization
|
||||
metadata:
|
||||
name: weave-gitops
|
||||
namespace: flux-system
|
||||
spec:
|
||||
interval: 15m
|
||||
path: ./weave-gitops
|
||||
prune: true # remove any elements later removed from the above path
|
||||
timeout: 2m # if not set, this defaults to interval duration, which is 1h
|
||||
sourceRef:
|
||||
kind: GitRepository
|
||||
name: flux-system
|
||||
healthChecks:
|
||||
- apiVersion: helm.toolkit.fluxcd.io/v2beta1
|
||||
kind: HelmRelease
|
||||
name: weave-gitops
|
||||
namespace: weave-gitops
|
||||
4
bootstrap/namespaces/namespace-weave-gitops.yaml
Normal file
4
bootstrap/namespaces/namespace-weave-gitops.yaml
Normal file
@@ -0,0 +1,4 @@
|
||||
apiVersion: v1
|
||||
kind: Namespace
|
||||
metadata:
|
||||
name: weave-gitops
|
||||
36
weave-gitops-dashboard.yaml
Normal file
36
weave-gitops-dashboard.yaml
Normal file
@@ -0,0 +1,36 @@
|
||||
---
|
||||
apiVersion: source.toolkit.fluxcd.io/v1beta2
|
||||
kind: HelmRepository
|
||||
metadata:
|
||||
annotations:
|
||||
metadata.weave.works/description: This is the source location for the Weave GitOps
|
||||
Dashboard's helm chart.
|
||||
labels:
|
||||
app.kubernetes.io/component: ui
|
||||
app.kubernetes.io/created-by: weave-gitops-cli
|
||||
app.kubernetes.io/name: weave-gitops-dashboard
|
||||
app.kubernetes.io/part-of: weave-gitops
|
||||
name: ww-gitops
|
||||
namespace: flux-system
|
||||
spec:
|
||||
interval: 1h0m0s
|
||||
type: oci
|
||||
url: oci://ghcr.io/weaveworks/charts
|
||||
---
|
||||
apiVersion: helm.toolkit.fluxcd.io/v2beta1
|
||||
kind: HelmRelease
|
||||
metadata:
|
||||
annotations:
|
||||
metadata.weave.works/description: This is the Weave GitOps Dashboard. It provides
|
||||
a simple way to get insights into your GitOps workloads.
|
||||
name: ww-gitops
|
||||
namespace: flux-system
|
||||
spec:
|
||||
chart:
|
||||
spec:
|
||||
chart: weave-gitops
|
||||
sourceRef:
|
||||
kind: HelmRepository
|
||||
name: ww-gitops
|
||||
interval: 1h0m0s
|
||||
|
||||
12
weave-gitops/dns-endpoint-weave-gitops.yaml
Normal file
12
weave-gitops/dns-endpoint-weave-gitops.yaml
Normal file
@@ -0,0 +1,12 @@
|
||||
apiVersion: externaldns.k8s.io/v1alpha1
|
||||
kind: DNSEndpoint
|
||||
metadata:
|
||||
name: weave-gitops.michaelthomson.dev
|
||||
namespace: weave-gitops
|
||||
spec:
|
||||
endpoints:
|
||||
- dnsName: weave-gitops.michaelthomson.dev
|
||||
recordTTL: 180
|
||||
recordType: CNAME
|
||||
targets:
|
||||
- server.michaelthomson.dev
|
||||
219
weave-gitops/helmrelease-weave-gitops.yaml
Normal file
219
weave-gitops/helmrelease-weave-gitops.yaml
Normal file
@@ -0,0 +1,219 @@
|
||||
apiVersion: helm.toolkit.fluxcd.io/v2beta1
|
||||
kind: HelmRelease
|
||||
metadata:
|
||||
name: weave-gitops
|
||||
namespace: weave-gitops
|
||||
spec:
|
||||
chart:
|
||||
spec:
|
||||
chart: weave-gitops
|
||||
version: 4.x
|
||||
sourceRef:
|
||||
kind: HelmRepository
|
||||
name: weave-gitops
|
||||
namespace: flux-system
|
||||
interval: 15m
|
||||
timeout: 5m
|
||||
releaseName: weave-gitops
|
||||
values:
|
||||
# Default values for chart.
|
||||
# This is a YAML-formatted file.
|
||||
# Declare variables to be passed into your templates.
|
||||
|
||||
# Note: paragraphs starting with `# --` will end up in our manual -
|
||||
# see https://github.com/norwoodj/helm-docs
|
||||
replicaCount: 1
|
||||
image:
|
||||
# FIXME check the app name
|
||||
repository: ghcr.io/weaveworks/wego-app
|
||||
pullPolicy: IfNotPresent
|
||||
# Overrides the image tag whose default is the chart appVersion.
|
||||
tag: "v0.37.0"
|
||||
imagePullSecrets: []
|
||||
nameOverride: ""
|
||||
fullnameOverride: ""
|
||||
# -- What log level to output. Valid levels are 'debug', 'info', 'warn' and 'error'
|
||||
logLevel: info
|
||||
# -- Additional arguments to pass in to the gitops-server
|
||||
additionalArgs: []
|
||||
# Any other environment variables:
|
||||
envVars:
|
||||
- name: WEAVE_GITOPS_FEATURE_TENANCY
|
||||
value: "true"
|
||||
- name: WEAVE_GITOPS_FEATURE_CLUSTER
|
||||
value: "false"
|
||||
# -- Annotations to add to the deployment
|
||||
annotations: {}
|
||||
# Should the 'oidc-auth' secret be created. For a detailed
|
||||
# explanation of these attributes please see our documentation:
|
||||
# https://docs.gitops.weave.works/docs/configuration/securing-access-to-the-dashboard/#login-via-an-oidc-provider
|
||||
oidcSecret:
|
||||
create: false
|
||||
# clientID:
|
||||
# clientSecret:
|
||||
# issuerURL:
|
||||
# redirectURL:
|
||||
# -- If non empty, additional keys can be added to the OIDC secret
|
||||
additionalKeys: {}
|
||||
# additionalKeys:
|
||||
# claimUsername: "email"
|
||||
# claimGroups: "groups"
|
||||
# customScopes: "openid,offline_access,email,groups"
|
||||
serviceAccount:
|
||||
# -- Specifies whether a service account should be created
|
||||
create: true
|
||||
# -- Annotations to add to the service account
|
||||
annotations: {}
|
||||
# -- The name of the service account to use.
|
||||
# If not set and create is true, a name is generated using the fullname template
|
||||
name: ""
|
||||
rbac:
|
||||
# -- Specifies whether the clusterRole & binding to the service account should be created
|
||||
create: true
|
||||
# -- If non-empty, this limits the resources that the service
|
||||
# account can impersonate. This applies to both users and groups, e.g.
|
||||
# `['user1@corporation.com', 'user2@corporation.com', 'operations']`
|
||||
impersonationResourceNames: []
|
||||
# -- Limit the type of principal that can be impersonated
|
||||
impersonationResources: ["users", "groups"]
|
||||
# -- If non-empty, this limits the secrets that can be accessed by
|
||||
# the service account to the specified ones, e.g. `['weave-gitops-enterprise-credentials']`
|
||||
viewSecretsResourceNames: ["cluster-user-auth", "oidc-auth"]
|
||||
# -- If non-empty, these additional rules will be appended to the RBAC role and the cluster role.
|
||||
# for example,
|
||||
# additionalRules:
|
||||
# - apiGroups: ["infra.contrib.fluxcd.io"]
|
||||
# resources: ["terraforms"]
|
||||
# verbs: [ "get", "list", "patch" ]
|
||||
additionalRules: []
|
||||
adminUser:
|
||||
# -- Whether the local admin user should be created.
|
||||
# If you use this make sure you add it to `rbac.impersonationResourceNames`.
|
||||
create: false
|
||||
# -- Specifies whether the clusterRole & binding to the admin user should be created.
|
||||
# Will be created only if `adminUser.create` is enabled. Without this,
|
||||
# the adminUser will only be able to see resources in the target namespace.
|
||||
createClusterRole: true
|
||||
# -- Whether we should create the secret for the local
|
||||
# adminUser. Will be created only if `adminUser.create` is
|
||||
# enabled. Without this, we'll still set up the roles and
|
||||
# permissions, but the secret with username and password has to be
|
||||
# provided separately.
|
||||
createSecret: true
|
||||
# -- Set username for local admin user, this should match the value in the secret `cluster-user-auth`
|
||||
# which can be created with `adminUser.createSecret`. Requires `adminUser.create`.
|
||||
username: gitops-test-user
|
||||
# -- (string) Set the password for local admin user. Requires `adminUser.create` and `adminUser.createSecret`
|
||||
# This needs to have been hashed using bcrypt.
|
||||
# You can do this via our CLI with `gitops get bcrypt-hash`.
|
||||
passwordHash:
|
||||
podAnnotations: {}
|
||||
podLabels: {}
|
||||
# aadpodidbinding: identity
|
||||
podSecurityContext: {}
|
||||
# fsGroup: 2000
|
||||
|
||||
securityContext:
|
||||
runAsNonRoot: true
|
||||
allowPrivilegeEscalation: false
|
||||
capabilities:
|
||||
drop:
|
||||
- ALL
|
||||
seccompProfile:
|
||||
type: RuntimeDefault
|
||||
runAsUser: 1000
|
||||
readOnlyRootFilesystem: true
|
||||
service:
|
||||
create: true
|
||||
type: ClusterIP
|
||||
port: 9001
|
||||
# nodePort:
|
||||
annotations: {}
|
||||
ingress:
|
||||
enabled: true
|
||||
className: ""
|
||||
annotations: {}
|
||||
# kubernetes.io/ingress.class: nginx
|
||||
# kubernetes.io/tls-acme: "true"
|
||||
hosts:
|
||||
- host: weave-gitops.michaelthomson.dev
|
||||
paths:
|
||||
- path: /
|
||||
pathType: ImplementationSpecific
|
||||
tls:
|
||||
- secretName: letsencrypt-wildcard-cert-michaelthomson.dev
|
||||
hosts:
|
||||
- weave-gitops.michaelthomson.dev
|
||||
extraVolumes: []
|
||||
extraVolumeMounts: []
|
||||
# Example using extraVolumes and extraVolumeMounts to load 'oidc-auth' secret
|
||||
# with a secrets store CSI driver. Specify the secretName 'oidc-auth' in the
|
||||
# secretProviderClass so this will be created by the secrets store CSI driver.
|
||||
# See https://secrets-store-csi-driver.sigs.k8s.io/topics/sync-as-kubernetes-secret.html
|
||||
# extraVolumeMounts:
|
||||
# - name: ww-gitops-oauth-volume
|
||||
# mountPath: /mnt/secrets
|
||||
# readOnly: true
|
||||
# extraVolumes:
|
||||
# - name: ww-gitops-oauth-volume
|
||||
# csi:
|
||||
# driver: secrets-store.csi.k8s.io
|
||||
# readOnly: true
|
||||
# volumeAttributes:
|
||||
# secretProviderClass: ww-gitops-oauth-provider
|
||||
resources: {}
|
||||
# We usually recommend not to specify default resources and to leave this as a conscious
|
||||
# choice for the user. This also increases chances charts run on environments with little
|
||||
# resources, such as Minikube. If you do want to specify resources, uncomment the following
|
||||
# lines, adjust them as necessary, and remove the curly braces after 'resources:'.
|
||||
# limits:
|
||||
# cpu: 100m
|
||||
# memory: 128Mi
|
||||
# requests:
|
||||
# cpu: 100m
|
||||
# memory: 128Mi
|
||||
|
||||
networkPolicy:
|
||||
# -- Specifies whether default network policies should be created.
|
||||
create: true
|
||||
nodeSelector: {}
|
||||
tolerations: []
|
||||
affinity: {}
|
||||
serverTLS:
|
||||
# -- Enable TLS termination in gitops itself. If you enable this,
|
||||
# you need to create a secret, and specify the secretName. Another
|
||||
# option is to create an ingress.
|
||||
enable: false
|
||||
# -- Specify the tls secret name. This type of secrets have a key called `tls.crt` and `tls.key` containing their corresponding values in base64 format.
|
||||
# See
|
||||
# https://kubernetes.io/docs/concepts/configuration/secret/#tls-secrets for more details and examples
|
||||
secretName: "my-secret-tls"
|
||||
# Example of tls secret
|
||||
#
|
||||
# apiVersion: v1
|
||||
# kind: Secret
|
||||
# metadata:
|
||||
# name: my-secret-tls
|
||||
# type: kubernetes.io/tls
|
||||
# data:
|
||||
# # the data is abbreviated in this example
|
||||
# tls.crt: |
|
||||
# MIIC2DCCAcCgAwIBAgIBATANBgkqh ...
|
||||
# tls.key: |
|
||||
# MIIEpgIBAAKCAQEA7yn3bRHQ5FHMQ ...
|
||||
#
|
||||
# You can also create a tls secre t from files whith this k8s command:
|
||||
# kubectl create secret tls my-tls-secret \
|
||||
# --cert=path/to/cert/file \
|
||||
# --key=path/to/key/file
|
||||
metrics:
|
||||
# -- Start the metrics exporter
|
||||
enabled: false
|
||||
service:
|
||||
# -- Port to start the metrics exporter on
|
||||
port: 2112
|
||||
# -- Annotations to set on the service
|
||||
annotations:
|
||||
prometheus.io/scrape: "true"
|
||||
prometheus.io/path: "/metrics"
|
||||
prometheus.io/port: "{{ .Values.metrics.service.port }}"
|
||||
Reference in New Issue
Block a user