I hereby claim:
- I am lwolf on github.
- I am lwolf (https://keybase.io/lwolf) on keybase.
- I have a public key whose fingerprint is E57E 72C7 E772 3858 8B8E 6C10 9ABA E27A C00C 66EE
To claim this, I am signing this object:
| kubectl exec -it agola-gateway-pod /bin/bash | |
| # add gitea | |
| root$ agola remotesource create \ | |
| --name gitea \ | |
| --type gitea \ | |
| --api-url https://gitea.yourdomain.com \ | |
| --auth-type oauth2 \ | |
| --clientid $GITEA_APP_CLIENTID \ | |
| --secret $GITEA_APP_CLIENTSECRET \ | |
| --token $ADMIN_TOKEN \ |
I hereby claim:
To claim this, I am signing this object:
| apiVersion: networking.istio.io/v1alpha3 | |
| kind: Gateway | |
| metadata: | |
| name: service-gw | |
| namespace: istio-system | |
| spec: | |
| selector: | |
| istio: ingressgateway | |
| servers: | |
| - port: |
| istio-ingressgateway: | |
| secretVolumes: | |
| ... | |
| - name: example-com-certs | |
| secretName: example-com-certs | |
| mountPath: /etc/istio/example-com-certs | |
| ... |
| apiVersion: certmanager.k8s.io/v1alpha1 | |
| kind: Certificate | |
| metadata: | |
| name: example-com | |
| spec: | |
| secretName: example-com-certs | |
| issuerRef: | |
| name: letsencrypt-live | |
| kind: ClusterIssuer | |
| commonName: '*.example.com' |
| apiVersion: networking.istio.io/v1alpha3 | |
| kind: VirtualService | |
| metadata: | |
| name: grafana | |
| spec: | |
| hosts: | |
| - grafana.example.com | |
| gateways: | |
| - service-gw.default | |
| http: |
| apiVersion: networking.istio.io/v1alpha3 | |
| kind: Gateway | |
| metadata: | |
| name: service-gw | |
| namespace: default | |
| spec: | |
| selector: | |
| istio: ingressgateway | |
| servers: | |
| - port: |
| apiVersion: extensions/v1beta1 | |
| kind: Ingress | |
| metadata: | |
| annotations: | |
| kubernetes.io/ingress.class: nginx |
NAME TYPE CLUSTER-IP EXTERNAL-IP PORT(S) AGE
grafana ClusterIP 10.233.47.239 <none> 3000/TCP 1h
istio-citadel ClusterIP 10.233.52.66 <none> 8060/TCP,15014/TCP 1h
istio-egressgateway ClusterIP 10.233.39.186 <none> 80/TCP,443/TCP,15443/TCP 1h
istio-galley ClusterIP 10.233.6.227 <none> 443/TCP,15014/TCP,9901/TCP 1h
istio-ingress LoadBalancer 10.233.29.116 192.168.11.122 80:32000/TCP,443:32256/TCP 1h
istio-ingressgateway LoadBalancer 10.233.37.74 192.168.11.121 80:31380/TCP,443:31390/TCP 1h
istio-pilot ClusterIP
$ kubectl get pods -n istio-system
grafana-d5d58cb7-fchjq 1/1 Running 0 20h
istio-citadel-c4489d577-wlwdh 1/1 Running 0 20h
istio-egressgateway-5d4dd5f974-84btz 1/1 Running 0 20h
istio-galley-57586fbc4-wgp55 1/1 Running 0 20h
istio-ingress-6bf7fd96bd-v4s28 1/1 Running 0 20h
istio-ingressgateway-6469b49cf-75pnb 1/1 Running 0 20h
istio-pilot-5d76999bfc-lthr5 2/2 Running 0 20h
istio-policy-5684c685cb-5qphq 2/2 Running 4 20h
istio-sidecar-injector-58dff7458d-cqbhd 1/1 Running 0 20h