diff --git a/kubernetes/servicemesh/linkerd/manifest/linkerd-edge-20.9.4.yaml b/kubernetes/servicemesh/linkerd/manifest/linkerd-edge-20.9.4.yaml new file mode 100644 index 0000000..000514c --- /dev/null +++ b/kubernetes/servicemesh/linkerd/manifest/linkerd-edge-20.9.4.yaml @@ -0,0 +1,3371 @@ +--- +### +### Linkerd Namespace +### +--- +kind: Namespace +apiVersion: v1 +metadata: + name: linkerd + annotations: + linkerd.io/inject: disabled + labels: + linkerd.io/is-control-plane: "true" + config.linkerd.io/admission-webhooks: disabled + linkerd.io/control-plane-ns: linkerd +--- +### +### Identity Controller Service RBAC +### +--- +kind: ClusterRole +apiVersion: rbac.authorization.k8s.io/v1 +metadata: + name: linkerd-linkerd-identity + labels: + linkerd.io/control-plane-component: identity + linkerd.io/control-plane-ns: linkerd +rules: +- apiGroups: ["authentication.k8s.io"] + resources: ["tokenreviews"] + verbs: ["create"] +- apiGroups: ["apps"] + resources: ["deployments"] + verbs: ["get"] +- apiGroups: [""] + resources: ["events"] + verbs: ["create", "patch"] +--- +kind: ClusterRoleBinding +apiVersion: rbac.authorization.k8s.io/v1 +metadata: + name: linkerd-linkerd-identity + labels: + linkerd.io/control-plane-component: identity + linkerd.io/control-plane-ns: linkerd +roleRef: + apiGroup: rbac.authorization.k8s.io + kind: ClusterRole + name: linkerd-linkerd-identity +subjects: +- kind: ServiceAccount + name: linkerd-identity + namespace: linkerd +--- +kind: ServiceAccount +apiVersion: v1 +metadata: + name: linkerd-identity + namespace: linkerd + labels: + linkerd.io/control-plane-component: identity + linkerd.io/control-plane-ns: linkerd +--- +### +### Controller RBAC +### +--- +kind: ClusterRole +apiVersion: rbac.authorization.k8s.io/v1 +metadata: + name: linkerd-linkerd-controller + labels: + linkerd.io/control-plane-component: controller + linkerd.io/control-plane-ns: linkerd +rules: +- apiGroups: ["extensions", "apps"] + resources: ["daemonsets", "deployments", "replicasets", "statefulsets"] + verbs: ["list", "get", "watch"] +- apiGroups: ["extensions", "batch"] + resources: ["cronjobs", "jobs"] + verbs: ["list" , "get", "watch"] +- apiGroups: [""] + resources: ["pods", "endpoints", "services", "replicationcontrollers", "namespaces"] + verbs: ["list", "get", "watch"] +- apiGroups: ["linkerd.io"] + resources: ["serviceprofiles"] + verbs: ["list", "get", "watch"] +- apiGroups: ["split.smi-spec.io"] + resources: ["trafficsplits"] + verbs: ["list", "get", "watch"] +--- +kind: ClusterRoleBinding +apiVersion: rbac.authorization.k8s.io/v1 +metadata: + name: linkerd-linkerd-controller + labels: + linkerd.io/control-plane-component: controller + linkerd.io/control-plane-ns: linkerd +roleRef: + apiGroup: rbac.authorization.k8s.io + kind: ClusterRole + name: linkerd-linkerd-controller +subjects: +- kind: ServiceAccount + name: linkerd-controller + namespace: linkerd +--- +kind: ServiceAccount +apiVersion: v1 +metadata: + name: linkerd-controller + namespace: linkerd + labels: + linkerd.io/control-plane-component: controller + linkerd.io/control-plane-ns: linkerd +--- +### +### Destination Controller Service +### +--- +kind: ClusterRole +apiVersion: rbac.authorization.k8s.io/v1 +metadata: + name: linkerd-linkerd-destination + labels: + linkerd.io/control-plane-component: destination + linkerd.io/control-plane-ns: linkerd +rules: +- apiGroups: ["apps"] + resources: ["replicasets"] + verbs: ["list", "get", "watch"] +- apiGroups: ["batch"] + resources: ["jobs"] + verbs: ["list", "get", "watch"] +- apiGroups: [""] + resources: ["pods", "endpoints", "services", "nodes"] + verbs: ["list", "get", "watch"] +- apiGroups: ["linkerd.io"] + resources: ["serviceprofiles"] + verbs: ["list", "get", "watch"] +- apiGroups: ["split.smi-spec.io"] + resources: ["trafficsplits"] + verbs: ["list", "get", "watch"] +--- +kind: ClusterRoleBinding +apiVersion: rbac.authorization.k8s.io/v1 +metadata: + name: linkerd-linkerd-destination + labels: + linkerd.io/control-plane-component: destination + linkerd.io/control-plane-ns: linkerd +roleRef: + apiGroup: rbac.authorization.k8s.io + kind: ClusterRole + name: linkerd-linkerd-destination +subjects: +- kind: ServiceAccount + name: linkerd-destination + namespace: linkerd +--- +kind: ServiceAccount +apiVersion: v1 +metadata: + name: linkerd-destination + namespace: linkerd + labels: + linkerd.io/control-plane-component: destination + linkerd.io/control-plane-ns: linkerd +--- +### +### Heartbeat RBAC +### +--- +apiVersion: rbac.authorization.k8s.io/v1 +kind: Role +metadata: + name: linkerd-heartbeat + namespace: linkerd + labels: + linkerd.io/control-plane-ns: linkerd +rules: +- apiGroups: [""] + resources: ["configmaps"] + verbs: ["get"] + resourceNames: ["linkerd-config"] +--- +apiVersion: rbac.authorization.k8s.io/v1 +kind: RoleBinding +metadata: + name: linkerd-heartbeat + namespace: linkerd + labels: + linkerd.io/control-plane-ns: linkerd +roleRef: + kind: Role + name: linkerd-heartbeat + apiGroup: rbac.authorization.k8s.io +subjects: +- kind: ServiceAccount + name: linkerd-heartbeat + namespace: linkerd +--- +kind: ServiceAccount +apiVersion: v1 +metadata: + name: linkerd-heartbeat + namespace: linkerd + labels: + linkerd.io/control-plane-component: heartbeat + linkerd.io/control-plane-ns: linkerd +--- +### +### Web RBAC +### +--- +apiVersion: rbac.authorization.k8s.io/v1 +kind: Role +metadata: + name: linkerd-web + namespace: linkerd + labels: + linkerd.io/control-plane-component: web + linkerd.io/control-plane-ns: linkerd +rules: +- apiGroups: [""] + resources: ["configmaps"] + verbs: ["get"] + resourceNames: ["linkerd-config"] +- apiGroups: [""] + resources: ["namespaces", "configmaps"] + verbs: ["get"] +- apiGroups: [""] + resources: ["serviceaccounts", "pods"] + verbs: ["list"] +- apiGroups: ["apps"] + resources: ["replicasets"] + verbs: ["list"] +--- +apiVersion: rbac.authorization.k8s.io/v1 +kind: RoleBinding +metadata: + name: linkerd-web + namespace: linkerd + labels: + linkerd.io/control-plane-component: web + linkerd.io/control-plane-ns: linkerd +roleRef: + kind: Role + name: linkerd-web + apiGroup: rbac.authorization.k8s.io +subjects: +- kind: ServiceAccount + name: linkerd-web + namespace: linkerd +--- +apiVersion: rbac.authorization.k8s.io/v1 +kind: ClusterRole +metadata: + name: linkerd-linkerd-web-check + labels: + linkerd.io/control-plane-component: web + linkerd.io/control-plane-ns: linkerd +rules: +- apiGroups: ["rbac.authorization.k8s.io"] + resources: ["clusterroles", "clusterrolebindings"] + verbs: ["list"] +- apiGroups: ["apiextensions.k8s.io"] + resources: ["customresourcedefinitions"] + verbs: ["list"] +- apiGroups: ["admissionregistration.k8s.io"] + resources: ["mutatingwebhookconfigurations", "validatingwebhookconfigurations"] + verbs: ["list"] +- apiGroups: ["policy"] + resources: ["podsecuritypolicies"] + verbs: ["list"] +- apiGroups: ["linkerd.io"] + resources: ["serviceprofiles"] + verbs: ["list"] +- apiGroups: ["apiregistration.k8s.io"] + resources: ["apiservices"] + verbs: ["get"] +--- +apiVersion: rbac.authorization.k8s.io/v1 +kind: ClusterRoleBinding +metadata: + name: linkerd-linkerd-web-check + labels: + linkerd.io/control-plane-component: web + linkerd.io/control-plane-ns: linkerd +roleRef: + kind: ClusterRole + name: linkerd-linkerd-web-check + apiGroup: rbac.authorization.k8s.io +subjects: +- kind: ServiceAccount + name: linkerd-web + namespace: linkerd +--- +kind: ClusterRoleBinding +apiVersion: rbac.authorization.k8s.io/v1 +metadata: + name: linkerd-linkerd-web-admin + labels: + linkerd.io/control-plane-component: web + linkerd.io/control-plane-ns: linkerd +roleRef: + apiGroup: rbac.authorization.k8s.io + kind: ClusterRole + name: linkerd-linkerd-tap-admin +subjects: +- kind: ServiceAccount + name: linkerd-web + namespace: linkerd +--- +kind: ServiceAccount +apiVersion: v1 +metadata: + name: linkerd-web + namespace: linkerd + labels: + linkerd.io/control-plane-component: web + linkerd.io/control-plane-ns: linkerd +--- +### +### Service Profile CRD +### +--- +apiVersion: apiextensions.k8s.io/v1beta1 +kind: CustomResourceDefinition +metadata: + name: serviceprofiles.linkerd.io + annotations: + linkerd.io/created-by: linkerd/cli edge-20.9.4 + labels: + linkerd.io/control-plane-ns: linkerd +spec: + group: linkerd.io + versions: + - name: v1alpha1 + served: true + storage: false + - name: v1alpha2 + served: true + storage: true + scope: Namespaced + names: + plural: serviceprofiles + singular: serviceprofile + kind: ServiceProfile + shortNames: + - sp +--- +### +### TrafficSplit CRD +### Copied from https://github.com/deislabs/smi-sdk-go/blob/cea7e1e9372304bbb6c74a3f6ca788d9eaa9cc58/crds/split.yaml +### +--- +apiVersion: apiextensions.k8s.io/v1beta1 +kind: CustomResourceDefinition +metadata: + name: trafficsplits.split.smi-spec.io + annotations: + linkerd.io/created-by: linkerd/cli edge-20.9.4 + labels: + linkerd.io/control-plane-ns: linkerd +spec: + group: split.smi-spec.io + version: v1alpha1 + scope: Namespaced + names: + kind: TrafficSplit + shortNames: + - ts + plural: trafficsplits + singular: trafficsplit + additionalPrinterColumns: + - name: Service + type: string + description: The apex service of this split. + JSONPath: .spec.service +--- +### +### Proxy Injector RBAC +### +--- +kind: ClusterRole +apiVersion: rbac.authorization.k8s.io/v1 +metadata: + name: linkerd-linkerd-proxy-injector + labels: + linkerd.io/control-plane-component: proxy-injector + linkerd.io/control-plane-ns: linkerd +rules: +- apiGroups: [""] + resources: ["events"] + verbs: ["create", "patch"] +- apiGroups: [""] + resources: ["namespaces", "replicationcontrollers"] + verbs: ["list", "get", "watch"] +- apiGroups: [""] + resources: ["pods"] + verbs: ["list", "watch"] +- apiGroups: ["extensions", "apps"] + resources: ["deployments", "replicasets", "daemonsets", "statefulsets"] + verbs: ["list", "get", "watch"] +- apiGroups: ["extensions", "batch"] + resources: ["cronjobs", "jobs"] + verbs: ["list", "get", "watch"] +--- +kind: ClusterRoleBinding +apiVersion: rbac.authorization.k8s.io/v1 +metadata: + name: linkerd-linkerd-proxy-injector + labels: + linkerd.io/control-plane-component: proxy-injector + linkerd.io/control-plane-ns: linkerd +subjects: +- kind: ServiceAccount + name: linkerd-proxy-injector + namespace: linkerd + apiGroup: "" +roleRef: + kind: ClusterRole + name: linkerd-linkerd-proxy-injector + apiGroup: rbac.authorization.k8s.io +--- +kind: ServiceAccount +apiVersion: v1 +metadata: + name: linkerd-proxy-injector + namespace: linkerd + labels: + linkerd.io/control-plane-component: proxy-injector + linkerd.io/control-plane-ns: linkerd +--- +kind: Secret +apiVersion: v1 +metadata: + name: linkerd-proxy-injector-tls + namespace: linkerd + labels: + linkerd.io/control-plane-component: proxy-injector + linkerd.io/control-plane-ns: linkerd + annotations: + linkerd.io/created-by: linkerd/cli edge-20.9.4 +type: Opaque +data: + crt.pem: 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 + key.pem: LS0tLS1CRUdJTiBSU0EgUFJJVkFURSBLRVktLS0tLQpNSUlFb3dJQkFBS0NBUUVBcXlSWmVPY0ttVlFjTmJ6eUZ0S29tN3FxZjBEdHFjVFRKb0xVQ3R0Szlidlcvd2cvCm94MHBFTHFqaGFIbG5HVGxCTkJzemVVUHVCQ2tsU0JnZmVnblNXNUYrRFFEbkx0Vk1TbVlmTmtZY0dOeGpCU3kKeHNCZGp0dGx6NDdVelloSjYxTWtEMmVaM0VPQ0xEU2dodjlyRnFZWkltSGVtOE5DMHlrZnFjMmpCdzV1WE1tOApvL3l2UlMvVHRKRUhLaXU4cXZsMmQ5RVo5ZmhodzIxY3Z6YmI4Mk9EWk9icDJ0UVZNUkx4VWRVQXhyZGRMb2d4CjdTMkhUUGw5UERXSms2VkJBajVXbG5XcHFpeEgveGFvV3prMUtNWXJNM2ltSlVabjN2TndBVHFlK1RwMGcyd2IKclpEV3BFVm5PZTZwNGRYMzBhelVRTG1YeXFSakpYN205WmU3U1FJREFRQUJBb0lCQUhkV1lubDNDaUgrejZqOQpOd2FKSUg5dSs2SytvTHNILzREVUs0M2llbk85NXQ1eFh3YWJ0OTN0ZDBjZ3JGNlEwRTI2RkpUQ0RHTDZYL21JCjJTQVN1UXB3TmFRc2lQUktnTTVHUmdtUXpJVGFJdnhlRm9lVzdlWkd3TWlwdldRUWpCTG5KN2NDTS95dXFsK3UKMXQwcnovMjhGcnl0NkM5UFNoSzZrMVN4aXVQSW5UWnQrTDREUkNTNExNY1VyM1k4Qi9KM2pHbFpxZEVNRUFLUQpTdjhGZjZuMjNwamloY0t6WFl0d2pwTFdIN2N2dlFLdVpkTm1nSmNtMFZYenhDeExDRDNHbS96a2MvUHRlTGd5Ck04TDFTR3FVRUdNd0xEemNtRjJKQWMrelgwNnZaajZsbHpTa09PZ1puaEpleEFJenRER1VhWCtkN1lBSDRRdTMKbHBVT2RJMENnWUVBMld0eEN2UC8xb2tZd3ZMK1lKQWxSbWtxM1pEU3ZYOEozNkZCSlFRZDJGdG1pT3FkV3ZVMApLaTR1T0Myam9yM1RVMlJyTXM3YWFYY1dUQ1R2NzcwSEk4RDhCYkFYTHAyVFBMVXBaTjZFTUxudFlHSU5mMTBQCmczb3NVK05OaUM4NmdpMWt6SzhCdlBQbW1Md3R5b1UzV09rV282dXZzSFJyaTFiVHVjTnJzeU1DZ1lFQXlZS3YKbjN5dmlNZCtaUkw0bUtMNjJTWlZLUm5Ibm1aMmZPWFlMazBYU09vTzZaaFM2OENiVndRNTQyN3QyeWFjblA1QQowc09TanN5WTV4QTlyMDNzMkhubjhUdmZvMmlZVXN4dHNVRkQ3NUVaZit0cDZUMWVDV3BzSUx3RzJodjMwWlpWClYrOEVXWjhPdjlCN2w0Nmlmcmxrb3BwQWE2R0E1TlFNYXZQNVpLTUNnWUVBbU9RTEhFNjFUQ0lnZllidkJ1eVcKcWNydXo5dzF0ZmdOODJxc0t1R1lNenNqQVlrcW1ubnY4dkdDb3hMRkRYNDdpMXNFWHpoRE13TUJkUTVNZytRRApqMHI0YnUrRGZjNWxhYjFqbklFMXFDWTNIUjRXcThlL1R3K3MrRmpSZnNEbmZmOTU4TTNvaFAxbTNXVUhObkV6Cm1KeGd4VHZJVW1lcjhOSmdGVE90R3MwQ2dZQkhqWDhkQzZJczJHR2FORVZQdGJlSytlQ05hcGtHTnUzbDVadUEKdldFQ1JCSXRnaWdYakZuY2FTVEJESGVyTktleDIxcGJQSlRDM2dXQkxyUW9sbXYrWmpNazVwUy9xbmxFRlZEeAordkhMbEdOUWwrQVFzUGkrTVNyWjZNb3FFbnBKMHE3VlBZcjI0OUxSNjQ2blB6K1Y3ZkM5Q0RiTndSaEtxTDBNCkVUdkNMd0tCZ0Z4OWljVzRCR2ljcWJnVGM1dC9OditkbXNrWGVYOE94MUZwampnTDlYNlFNSVhIdlVLb29SN0wKVjZ2dVhEcjYxQ1BacXJxMFFFMUtPKzlJOUdFUUdEN3VSWWx5V2NldStmSFkzbXFXTWd2M01nRVdXcGFQSUh0RgpqTmRCd09sMVhlOEhmMjhCb01hUmhvRjd1c0FBWUNodGNHY1RONUkxNERQZDg2L01nZ1BlCi0tLS0tRU5EIFJTQSBQUklWQVRFIEtFWS0tLS0t +--- +apiVersion: admissionregistration.k8s.io/v1beta1 +kind: MutatingWebhookConfiguration +metadata: + name: linkerd-proxy-injector-webhook-config + labels: + linkerd.io/control-plane-component: proxy-injector + linkerd.io/control-plane-ns: linkerd +webhooks: +- name: linkerd-proxy-injector.linkerd.io + namespaceSelector: + matchExpressions: + - key: config.linkerd.io/admission-webhooks + operator: NotIn + values: + - disabled + clientConfig: + service: + name: linkerd-proxy-injector + namespace: linkerd + path: "/" + caBundle: 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 + failurePolicy: Ignore + rules: + - operations: [ "CREATE" ] + apiGroups: [""] + apiVersions: ["v1"] + resources: ["pods"] + sideEffects: None +--- +### +### Service Profile Validator RBAC +### +--- +kind: ClusterRole +apiVersion: rbac.authorization.k8s.io/v1 +metadata: + name: linkerd-linkerd-sp-validator + labels: + linkerd.io/control-plane-component: sp-validator + linkerd.io/control-plane-ns: linkerd +rules: +- apiGroups: [""] + resources: ["pods"] + verbs: ["list"] +--- +kind: ClusterRoleBinding +apiVersion: rbac.authorization.k8s.io/v1 +metadata: + name: linkerd-linkerd-sp-validator + labels: + linkerd.io/control-plane-component: sp-validator + linkerd.io/control-plane-ns: linkerd +subjects: +- kind: ServiceAccount + name: linkerd-sp-validator + namespace: linkerd + apiGroup: "" +roleRef: + kind: ClusterRole + name: linkerd-linkerd-sp-validator + apiGroup: rbac.authorization.k8s.io +--- +kind: ServiceAccount +apiVersion: v1 +metadata: + name: linkerd-sp-validator + namespace: linkerd + labels: + linkerd.io/control-plane-component: sp-validator + linkerd.io/control-plane-ns: linkerd +--- +kind: Secret +apiVersion: v1 +metadata: + name: linkerd-sp-validator-tls + namespace: linkerd + labels: + linkerd.io/control-plane-component: sp-validator + linkerd.io/control-plane-ns: linkerd + annotations: + linkerd.io/created-by: linkerd/cli edge-20.9.4 +type: Opaque +data: + crt.pem: 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 + key.pem: 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 +--- +apiVersion: admissionregistration.k8s.io/v1beta1 +kind: ValidatingWebhookConfiguration +metadata: + name: linkerd-sp-validator-webhook-config + labels: + linkerd.io/control-plane-component: sp-validator + linkerd.io/control-plane-ns: linkerd +webhooks: +- name: linkerd-sp-validator.linkerd.io + namespaceSelector: + matchExpressions: + - key: config.linkerd.io/admission-webhooks + operator: NotIn + values: + - disabled + clientConfig: + service: + name: linkerd-sp-validator + namespace: linkerd + path: "/" + caBundle: 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 + failurePolicy: Ignore + rules: + - operations: [ "CREATE" , "UPDATE" ] + apiGroups: ["linkerd.io"] + apiVersions: ["v1alpha1", "v1alpha2"] + resources: ["serviceprofiles"] + sideEffects: None +--- +### +### Tap RBAC +### +--- +kind: ClusterRole +apiVersion: rbac.authorization.k8s.io/v1 +metadata: + name: linkerd-linkerd-tap + labels: + linkerd.io/control-plane-component: tap + linkerd.io/control-plane-ns: linkerd +rules: +- apiGroups: [""] + resources: ["pods", "services", "replicationcontrollers", "namespaces", "nodes"] + verbs: ["list", "get", "watch"] +- apiGroups: ["extensions", "apps"] + resources: ["daemonsets", "deployments", "replicasets", "statefulsets"] + verbs: ["list", "get", "watch"] +- apiGroups: ["extensions", "batch"] + resources: ["cronjobs", "jobs"] + verbs: ["list" , "get", "watch"] +--- +kind: ClusterRole +apiVersion: rbac.authorization.k8s.io/v1 +metadata: + name: linkerd-linkerd-tap-admin + labels: + linkerd.io/control-plane-component: tap + linkerd.io/control-plane-ns: linkerd +rules: +- apiGroups: ["tap.linkerd.io"] + resources: ["*"] + verbs: ["watch"] +--- +kind: ClusterRoleBinding +apiVersion: rbac.authorization.k8s.io/v1 +metadata: + name: linkerd-linkerd-tap + labels: + linkerd.io/control-plane-component: tap + linkerd.io/control-plane-ns: linkerd +roleRef: + apiGroup: rbac.authorization.k8s.io + kind: ClusterRole + name: linkerd-linkerd-tap +subjects: +- kind: ServiceAccount + name: linkerd-tap + namespace: linkerd +--- +apiVersion: rbac.authorization.k8s.io/v1 +kind: ClusterRoleBinding +metadata: + name: linkerd-linkerd-tap-auth-delegator + labels: + linkerd.io/control-plane-component: tap + linkerd.io/control-plane-ns: linkerd +roleRef: + apiGroup: rbac.authorization.k8s.io + kind: ClusterRole + name: system:auth-delegator +subjects: +- kind: ServiceAccount + name: linkerd-tap + namespace: linkerd +--- +kind: ServiceAccount +apiVersion: v1 +metadata: + name: linkerd-tap + namespace: linkerd + labels: + linkerd.io/control-plane-component: tap + linkerd.io/control-plane-ns: linkerd +--- +apiVersion: rbac.authorization.k8s.io/v1 +kind: RoleBinding +metadata: + name: linkerd-linkerd-tap-auth-reader + namespace: kube-system + labels: + linkerd.io/control-plane-component: tap + linkerd.io/control-plane-ns: linkerd +roleRef: + apiGroup: rbac.authorization.k8s.io + kind: Role + name: extension-apiserver-authentication-reader +subjects: +- kind: ServiceAccount + name: linkerd-tap + namespace: linkerd +--- +kind: Secret +apiVersion: v1 +metadata: + name: linkerd-tap-tls + namespace: linkerd + labels: + linkerd.io/control-plane-component: tap + linkerd.io/control-plane-ns: linkerd + annotations: + linkerd.io/created-by: linkerd/cli edge-20.9.4 +type: Opaque +data: + crt.pem: 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 + key.pem: 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 +--- +apiVersion: apiregistration.k8s.io/v1 +kind: APIService +metadata: + name: v1alpha1.tap.linkerd.io + labels: + linkerd.io/control-plane-component: tap + linkerd.io/control-plane-ns: linkerd +spec: + group: tap.linkerd.io + version: v1alpha1 + groupPriorityMinimum: 1000 + versionPriority: 100 + service: + name: linkerd-tap + namespace: linkerd + caBundle: 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 +--- +### +### Control Plane PSP +### +--- +apiVersion: policy/v1beta1 +kind: PodSecurityPolicy +metadata: + name: linkerd-linkerd-control-plane + labels: + linkerd.io/control-plane-ns: linkerd +spec: + allowPrivilegeEscalation: false + readOnlyRootFilesystem: true + allowedCapabilities: + - NET_ADMIN + - NET_RAW + requiredDropCapabilities: + - ALL + hostNetwork: false + hostIPC: false + hostPID: false + seLinux: + rule: RunAsAny + runAsUser: + rule: RunAsAny + supplementalGroups: + rule: MustRunAs + ranges: + - min: 1 + max: 65535 + fsGroup: + rule: MustRunAs + ranges: + - min: 1 + max: 65535 + volumes: + - configMap + - emptyDir + - secret + - projected + - downwardAPI + - persistentVolumeClaim +--- +apiVersion: rbac.authorization.k8s.io/v1 +kind: Role +metadata: + name: linkerd-psp + namespace: linkerd + labels: + linkerd.io/control-plane-ns: linkerd +rules: +- apiGroups: ['policy', 'extensions'] + resources: ['podsecuritypolicies'] + verbs: ['use'] + resourceNames: + - linkerd-linkerd-control-plane +--- +apiVersion: rbac.authorization.k8s.io/v1 +kind: RoleBinding +metadata: + name: linkerd-psp + namespace: linkerd + labels: + linkerd.io/control-plane-ns: linkerd +roleRef: + kind: Role + name: linkerd-psp + apiGroup: rbac.authorization.k8s.io +subjects: +- kind: ServiceAccount + name: linkerd-controller + namespace: linkerd +- kind: ServiceAccount + name: linkerd-destination + namespace: linkerd +- kind: ServiceAccount + name: linkerd-grafana + namespace: linkerd +- kind: ServiceAccount + name: linkerd-heartbeat + namespace: linkerd +- kind: ServiceAccount + name: linkerd-identity + namespace: linkerd +- kind: ServiceAccount + name: linkerd-prometheus + namespace: linkerd +- kind: ServiceAccount + name: linkerd-proxy-injector + namespace: linkerd +- kind: ServiceAccount + name: linkerd-sp-validator + namespace: linkerd +- kind: ServiceAccount + name: linkerd-tap + namespace: linkerd +- kind: ServiceAccount + name: linkerd-web + namespace: linkerd +--- +kind: ConfigMap +apiVersion: v1 +metadata: + name: linkerd-config + namespace: linkerd + labels: + linkerd.io/control-plane-component: controller + linkerd.io/control-plane-ns: linkerd + annotations: + linkerd.io/created-by: linkerd/cli edge-20.9.4 +data: + global: | + {"linkerdNamespace":"linkerd","cniEnabled":false,"version":"edge-20.9.4","identityContext":{"trustDomain":"cluster.local","trustAnchorsPem":"-----BEGIN CERTIFICATE-----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\nViat\n-----END CERTIFICATE-----\n","issuanceLifetime":"86400s","clockSkewAllowance":"20s","scheme":"linkerd.io/tls"},"autoInjectContext":null,"omitWebhookSideEffects":false,"clusterDomain":"cluster.local"} + proxy: | + {"proxyImage":{"imageName":"ghcr.io/linkerd/proxy","pullPolicy":"IfNotPresent"},"proxyInitImage":{"imageName":"ghcr.io/linkerd/proxy-init","pullPolicy":"IfNotPresent"},"controlPort":{"port":4190},"ignoreInboundPorts":[],"ignoreOutboundPorts":[],"inboundPort":{"port":4143},"adminPort":{"port":4191},"outboundPort":{"port":4140},"resource":{"requestCpu":"","requestMemory":"","limitCpu":"","limitMemory":""},"proxyUid":"2102","logLevel":{"level":"warn,linkerd=info"},"disableExternalProfiles":true,"proxyVersion":"edge-20.9.4","proxyInitImageVersion":"v1.3.6","debugImage":{"imageName":"ghcr.io/linkerd/debug","pullPolicy":"IfNotPresent"},"debugImageVersion":"edge-20.9.4","destinationGetNetworks":"10.0.0.0/8,172.16.0.0/12,192.168.0.0/16","logFormat":"plain","outboundConnectTimeout":"","inboundConnectTimeout":""} + install: | + {"cliVersion":"edge-20.9.4","flags":[]} +--- +### +### Identity Controller Service +### +--- +kind: Secret +apiVersion: v1 +metadata: + name: linkerd-identity-issuer + namespace: linkerd + labels: + linkerd.io/control-plane-component: identity + linkerd.io/control-plane-ns: linkerd + annotations: + linkerd.io/created-by: linkerd/cli edge-20.9.4 + linkerd.io/identity-issuer-expiry: 2021-09-25T11:04:11Z +data: + crt.pem: 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 + key.pem: LS0tLS1CRUdJTiBFQyBQUklWQVRFIEtFWS0tLS0tCk1IY0NBUUVFSVB4Sys4RU1keGFrUDk4OSt5TWx5UW53bkxnOEVYa3orOXRMTG5WUEo1dWNvQW9HQ0NxR1NNNDkKQXdFSG9VUURRZ0FFeWUrY0FBaEVlN01CQXhZWU9GcE5aTGxOcUYvMU1sMmp1M0R6MDVjaDJRYWpqK0RySkVYUQpGY2pQQzFKTmNabzBWcGIxZ2ZNR2JYSXo1L1VjN0diK0d3PT0KLS0tLS1FTkQgRUMgUFJJVkFURSBLRVktLS0tLQ== +--- +kind: Service +apiVersion: v1 +metadata: + name: linkerd-identity + namespace: linkerd + labels: + linkerd.io/control-plane-component: identity + linkerd.io/control-plane-ns: linkerd + annotations: + linkerd.io/created-by: linkerd/cli edge-20.9.4 +spec: + type: ClusterIP + selector: + linkerd.io/control-plane-component: identity + ports: + - name: grpc + port: 8080 + targetPort: 8080 +--- +kind: Service +apiVersion: v1 +metadata: + name: linkerd-identity-headless + namespace: linkerd + labels: + linkerd.io/control-plane-component: identity + linkerd.io/control-plane-ns: linkerd + annotations: + linkerd.io/created-by: linkerd/cli edge-20.9.4 +spec: + clusterIP: None + selector: + linkerd.io/control-plane-component: identity + ports: + - name: grpc + port: 8080 + targetPort: 8080 +--- +apiVersion: apps/v1 +kind: Deployment +metadata: + annotations: + linkerd.io/created-by: linkerd/cli edge-20.9.4 + labels: + app.kubernetes.io/name: identity + app.kubernetes.io/part-of: Linkerd + app.kubernetes.io/version: edge-20.9.4 + linkerd.io/control-plane-component: identity + linkerd.io/control-plane-ns: linkerd + name: linkerd-identity + namespace: linkerd +spec: + replicas: 1 + selector: + matchLabels: + linkerd.io/control-plane-component: identity + linkerd.io/control-plane-ns: linkerd + linkerd.io/proxy-deployment: linkerd-identity + template: + metadata: + annotations: + linkerd.io/created-by: linkerd/cli edge-20.9.4 + linkerd.io/identity-mode: default + linkerd.io/proxy-version: edge-20.9.4 + labels: + linkerd.io/control-plane-component: identity + linkerd.io/control-plane-ns: linkerd + linkerd.io/workload-ns: linkerd + linkerd.io/proxy-deployment: linkerd-identity + spec: + nodeSelector: + beta.kubernetes.io/os: linux + containers: + - args: + - identity + - -log-level=info + image: ghcr.io/linkerd/controller:edge-20.9.4 + imagePullPolicy: IfNotPresent + livenessProbe: + httpGet: + path: /ping + port: 9990 + initialDelaySeconds: 10 + name: identity + ports: + - containerPort: 8080 + name: grpc + - containerPort: 9990 + name: admin-http + readinessProbe: + failureThreshold: 7 + httpGet: + path: /ready + port: 9990 + securityContext: + runAsUser: 2103 + volumeMounts: + - mountPath: /var/run/linkerd/config + name: config + - mountPath: /var/run/linkerd/identity/issuer + name: identity-issuer + - env: + - name: LINKERD2_PROXY_LOG + value: warn,linkerd=info + - name: LINKERD2_PROXY_LOG_FORMAT + value: plain + - name: LINKERD2_PROXY_DESTINATION_SVC_ADDR + value: linkerd-dst-headless.linkerd.svc.cluster.local:8086 + - name: LINKERD2_PROXY_DESTINATION_GET_NETWORKS + value: "10.0.0.0/8,172.16.0.0/12,192.168.0.0/16" + - name: LINKERD2_PROXY_DESTINATION_PROFILE_NETWORKS + value: "10.0.0.0/8,172.16.0.0/12,192.168.0.0/16" + - name: LINKERD2_PROXY_INBOUND_CONNECT_TIMEOUT + value: "100ms" + - name: LINKERD2_PROXY_OUTBOUND_CONNECT_TIMEOUT + value: "1000ms" + - name: LINKERD2_PROXY_CONTROL_LISTEN_ADDR + value: 0.0.0.0:4190 + - name: LINKERD2_PROXY_ADMIN_LISTEN_ADDR + value: 0.0.0.0:4191 + - name: LINKERD2_PROXY_OUTBOUND_LISTEN_ADDR + value: 127.0.0.1:4140 + - name: LINKERD2_PROXY_INBOUND_LISTEN_ADDR + value: 0.0.0.0:4143 + - name: LINKERD2_PROXY_DESTINATION_GET_SUFFIXES + value: svc.cluster.local. + - name: LINKERD2_PROXY_DESTINATION_PROFILE_SUFFIXES + value: svc.cluster.local. + - name: LINKERD2_PROXY_INBOUND_ACCEPT_KEEPALIVE + value: 10000ms + - name: LINKERD2_PROXY_OUTBOUND_CONNECT_KEEPALIVE + value: 10000ms + - name: _pod_ns + valueFrom: + fieldRef: + fieldPath: metadata.namespace + - name: _pod_nodeName + valueFrom: + fieldRef: + fieldPath: spec.nodeName + - name: LINKERD2_PROXY_DESTINATION_CONTEXT + value: | + {"ns":"$(_pod_ns)", "nodeName":"$(_pod_nodeName)"} + - name: LINKERD2_PROXY_IDENTITY_DIR + value: /var/run/linkerd/identity/end-entity + - name: LINKERD2_PROXY_IDENTITY_TRUST_ANCHORS + value: | + -----BEGIN CERTIFICATE----- + MIIBrzCCAVSgAwIBAgIBATAKBggqhkjOPQQDAjApMScwJQYDVQQDEx5pZGVudGl0 + eS5saW5rZXJkLmNsdXN0ZXIubG9jYWwwHhcNMjAwOTI1MTEwMzUxWhcNMjEwOTI1 + MTEwNDExWjApMScwJQYDVQQDEx5pZGVudGl0eS5saW5rZXJkLmNsdXN0ZXIubG9j + YWwwWTATBgcqhkjOPQIBBggqhkjOPQMBBwNCAATJ75wACER7swEDFhg4Wk1kuU2o + X/UyXaO7cPPTlyHZBqOP4OskRdAVyM8LUk1xmjRWlvWB8wZtcjPn9RzsZv4bo20w + azAOBgNVHQ8BAf8EBAMCAQYwHQYDVR0lBBYwFAYIKwYBBQUHAwEGCCsGAQUFBwMC + MA8GA1UdEwEB/wQFMAMBAf8wKQYDVR0RBCIwIIIeaWRlbnRpdHkubGlua2VyZC5j + bHVzdGVyLmxvY2FsMAoGCCqGSM49BAMCA0kAMEYCIQDIwBEszQRPzYI0k2vACFV3 + 2Eu+jgPzsFxd9QVOBT3KTwIhALDyUFnDR7+JCeuYPNNiBNNloVwY6Zbs2dh1i3w6 + Viat + -----END CERTIFICATE----- + - name: LINKERD2_PROXY_IDENTITY_TOKEN_FILE + value: /var/run/secrets/kubernetes.io/serviceaccount/token + - name: LINKERD2_PROXY_IDENTITY_SVC_ADDR + value: localhost.:8080 + - name: _pod_sa + valueFrom: + fieldRef: + fieldPath: spec.serviceAccountName + - name: _l5d_ns + value: linkerd + - name: _l5d_trustdomain + value: cluster.local + - name: LINKERD2_PROXY_IDENTITY_LOCAL_NAME + value: $(_pod_sa).$(_pod_ns).serviceaccount.identity.$(_l5d_ns).$(_l5d_trustdomain) + - name: LINKERD2_PROXY_IDENTITY_SVC_NAME + value: linkerd-identity.$(_l5d_ns).serviceaccount.identity.$(_l5d_ns).$(_l5d_trustdomain) + - name: LINKERD2_PROXY_DESTINATION_SVC_NAME + value: linkerd-destination.$(_l5d_ns).serviceaccount.identity.$(_l5d_ns).$(_l5d_trustdomain) + - name: LINKERD2_PROXY_TAP_SVC_NAME + value: linkerd-tap.$(_l5d_ns).serviceaccount.identity.$(_l5d_ns).$(_l5d_trustdomain) + image: ghcr.io/linkerd/proxy:edge-20.9.4 + imagePullPolicy: IfNotPresent + livenessProbe: + httpGet: + path: /live + port: 4191 + initialDelaySeconds: 10 + name: linkerd-proxy + ports: + - containerPort: 4143 + name: linkerd-proxy + - containerPort: 4191 + name: linkerd-admin + readinessProbe: + httpGet: + path: /ready + port: 4191 + initialDelaySeconds: 2 + resources: + securityContext: + allowPrivilegeEscalation: false + readOnlyRootFilesystem: true + runAsUser: 2102 + terminationMessagePolicy: FallbackToLogsOnError + volumeMounts: + - mountPath: /var/run/linkerd/identity/end-entity + name: linkerd-identity-end-entity + initContainers: + - args: + - --incoming-proxy-port + - "4143" + - --outgoing-proxy-port + - "4140" + - --proxy-uid + - "2102" + - --inbound-ports-to-ignore + - 4190,4191 + - --outbound-ports-to-ignore + - "443" + image: ghcr.io/linkerd/proxy-init:v1.3.6 + imagePullPolicy: IfNotPresent + name: linkerd-init + resources: + limits: + cpu: "100m" + memory: "50Mi" + requests: + cpu: "10m" + memory: "10Mi" + securityContext: + allowPrivilegeEscalation: false + capabilities: + add: + - NET_ADMIN + - NET_RAW + privileged: false + readOnlyRootFilesystem: true + runAsNonRoot: false + runAsUser: 0 + terminationMessagePolicy: FallbackToLogsOnError + volumeMounts: + - mountPath: /run + name: linkerd-proxy-init-xtables-lock + serviceAccountName: linkerd-identity + volumes: + - configMap: + name: linkerd-config + name: config + - name: identity-issuer + secret: + secretName: linkerd-identity-issuer + - emptyDir: {} + name: linkerd-proxy-init-xtables-lock + - emptyDir: + medium: Memory + name: linkerd-identity-end-entity +--- +### +### Controller +### +--- +kind: Service +apiVersion: v1 +metadata: + name: linkerd-controller-api + namespace: linkerd + labels: + linkerd.io/control-plane-component: controller + linkerd.io/control-plane-ns: linkerd + annotations: + linkerd.io/created-by: linkerd/cli edge-20.9.4 +spec: + type: ClusterIP + selector: + linkerd.io/control-plane-component: controller + ports: + - name: http + port: 8085 + targetPort: 8085 +--- +apiVersion: apps/v1 +kind: Deployment +metadata: + annotations: + linkerd.io/created-by: linkerd/cli edge-20.9.4 + labels: + app.kubernetes.io/name: controller + app.kubernetes.io/part-of: Linkerd + app.kubernetes.io/version: edge-20.9.4 + linkerd.io/control-plane-component: controller + linkerd.io/control-plane-ns: linkerd + name: linkerd-controller + namespace: linkerd +spec: + replicas: 1 + selector: + matchLabels: + linkerd.io/control-plane-component: controller + linkerd.io/control-plane-ns: linkerd + linkerd.io/proxy-deployment: linkerd-controller + template: + metadata: + annotations: + linkerd.io/created-by: linkerd/cli edge-20.9.4 + linkerd.io/identity-mode: default + linkerd.io/proxy-version: edge-20.9.4 + labels: + linkerd.io/control-plane-component: controller + linkerd.io/control-plane-ns: linkerd + linkerd.io/workload-ns: linkerd + linkerd.io/proxy-deployment: linkerd-controller + spec: + nodeSelector: + beta.kubernetes.io/os: linux + containers: + - args: + - public-api + - -destination-addr=linkerd-dst.linkerd.svc.cluster.local:8086 + - -controller-namespace=linkerd + - -log-level=info + - -prometheus-url=http://linkerd-prometheus.linkerd.svc.cluster.local:9090 + image: ghcr.io/linkerd/controller:edge-20.9.4 + imagePullPolicy: IfNotPresent + livenessProbe: + httpGet: + path: /ping + port: 9995 + initialDelaySeconds: 10 + name: public-api + ports: + - containerPort: 8085 + name: http + - containerPort: 9995 + name: admin-http + readinessProbe: + failureThreshold: 7 + httpGet: + path: /ready + port: 9995 + securityContext: + runAsUser: 2103 + volumeMounts: + - mountPath: /var/run/linkerd/config + name: config + - env: + - name: LINKERD2_PROXY_LOG + value: warn,linkerd=info + - name: LINKERD2_PROXY_LOG_FORMAT + value: plain + - name: LINKERD2_PROXY_DESTINATION_SVC_ADDR + value: linkerd-dst-headless.linkerd.svc.cluster.local:8086 + - name: LINKERD2_PROXY_DESTINATION_GET_NETWORKS + value: "10.0.0.0/8,172.16.0.0/12,192.168.0.0/16" + - name: LINKERD2_PROXY_DESTINATION_PROFILE_NETWORKS + value: "10.0.0.0/8,172.16.0.0/12,192.168.0.0/16" + - name: LINKERD2_PROXY_INBOUND_CONNECT_TIMEOUT + value: "100ms" + - name: LINKERD2_PROXY_OUTBOUND_CONNECT_TIMEOUT + value: "1000ms" + - name: LINKERD2_PROXY_CONTROL_LISTEN_ADDR + value: 0.0.0.0:4190 + - name: LINKERD2_PROXY_ADMIN_LISTEN_ADDR + value: 0.0.0.0:4191 + - name: LINKERD2_PROXY_OUTBOUND_LISTEN_ADDR + value: 127.0.0.1:4140 + - name: LINKERD2_PROXY_INBOUND_LISTEN_ADDR + value: 0.0.0.0:4143 + - name: LINKERD2_PROXY_DESTINATION_GET_SUFFIXES + value: svc.cluster.local. + - name: LINKERD2_PROXY_DESTINATION_PROFILE_SUFFIXES + value: svc.cluster.local. + - name: LINKERD2_PROXY_INBOUND_ACCEPT_KEEPALIVE + value: 10000ms + - name: LINKERD2_PROXY_OUTBOUND_CONNECT_KEEPALIVE + value: 10000ms + - name: _pod_ns + valueFrom: + fieldRef: + fieldPath: metadata.namespace + - name: _pod_nodeName + valueFrom: + fieldRef: + fieldPath: spec.nodeName + - name: LINKERD2_PROXY_DESTINATION_CONTEXT + value: | + {"ns":"$(_pod_ns)", "nodeName":"$(_pod_nodeName)"} + - name: LINKERD2_PROXY_IDENTITY_DIR + value: /var/run/linkerd/identity/end-entity + - name: LINKERD2_PROXY_IDENTITY_TRUST_ANCHORS + value: | + -----BEGIN CERTIFICATE----- + MIIBrzCCAVSgAwIBAgIBATAKBggqhkjOPQQDAjApMScwJQYDVQQDEx5pZGVudGl0 + eS5saW5rZXJkLmNsdXN0ZXIubG9jYWwwHhcNMjAwOTI1MTEwMzUxWhcNMjEwOTI1 + MTEwNDExWjApMScwJQYDVQQDEx5pZGVudGl0eS5saW5rZXJkLmNsdXN0ZXIubG9j + YWwwWTATBgcqhkjOPQIBBggqhkjOPQMBBwNCAATJ75wACER7swEDFhg4Wk1kuU2o + X/UyXaO7cPPTlyHZBqOP4OskRdAVyM8LUk1xmjRWlvWB8wZtcjPn9RzsZv4bo20w + azAOBgNVHQ8BAf8EBAMCAQYwHQYDVR0lBBYwFAYIKwYBBQUHAwEGCCsGAQUFBwMC + MA8GA1UdEwEB/wQFMAMBAf8wKQYDVR0RBCIwIIIeaWRlbnRpdHkubGlua2VyZC5j + bHVzdGVyLmxvY2FsMAoGCCqGSM49BAMCA0kAMEYCIQDIwBEszQRPzYI0k2vACFV3 + 2Eu+jgPzsFxd9QVOBT3KTwIhALDyUFnDR7+JCeuYPNNiBNNloVwY6Zbs2dh1i3w6 + Viat + -----END CERTIFICATE----- + - name: LINKERD2_PROXY_IDENTITY_TOKEN_FILE + value: /var/run/secrets/kubernetes.io/serviceaccount/token + - name: LINKERD2_PROXY_IDENTITY_SVC_ADDR + value: linkerd-identity-headless.linkerd.svc.cluster.local:8080 + - name: _pod_sa + valueFrom: + fieldRef: + fieldPath: spec.serviceAccountName + - name: _l5d_ns + value: linkerd + - name: _l5d_trustdomain + value: cluster.local + - name: LINKERD2_PROXY_IDENTITY_LOCAL_NAME + value: $(_pod_sa).$(_pod_ns).serviceaccount.identity.$(_l5d_ns).$(_l5d_trustdomain) + - name: LINKERD2_PROXY_IDENTITY_SVC_NAME + value: linkerd-identity.$(_l5d_ns).serviceaccount.identity.$(_l5d_ns).$(_l5d_trustdomain) + - name: LINKERD2_PROXY_DESTINATION_SVC_NAME + value: linkerd-destination.$(_l5d_ns).serviceaccount.identity.$(_l5d_ns).$(_l5d_trustdomain) + - name: LINKERD2_PROXY_TAP_SVC_NAME + value: linkerd-tap.$(_l5d_ns).serviceaccount.identity.$(_l5d_ns).$(_l5d_trustdomain) + image: ghcr.io/linkerd/proxy:edge-20.9.4 + imagePullPolicy: IfNotPresent + livenessProbe: + httpGet: + path: /live + port: 4191 + initialDelaySeconds: 10 + name: linkerd-proxy + ports: + - containerPort: 4143 + name: linkerd-proxy + - containerPort: 4191 + name: linkerd-admin + readinessProbe: + httpGet: + path: /ready + port: 4191 + initialDelaySeconds: 2 + resources: + securityContext: + allowPrivilegeEscalation: false + readOnlyRootFilesystem: true + runAsUser: 2102 + terminationMessagePolicy: FallbackToLogsOnError + volumeMounts: + - mountPath: /var/run/linkerd/identity/end-entity + name: linkerd-identity-end-entity + initContainers: + - args: + - --incoming-proxy-port + - "4143" + - --outgoing-proxy-port + - "4140" + - --proxy-uid + - "2102" + - --inbound-ports-to-ignore + - 4190,4191 + - --outbound-ports-to-ignore + - "443" + image: ghcr.io/linkerd/proxy-init:v1.3.6 + imagePullPolicy: IfNotPresent + name: linkerd-init + resources: + limits: + cpu: "100m" + memory: "50Mi" + requests: + cpu: "10m" + memory: "10Mi" + securityContext: + allowPrivilegeEscalation: false + capabilities: + add: + - NET_ADMIN + - NET_RAW + privileged: false + readOnlyRootFilesystem: true + runAsNonRoot: false + runAsUser: 0 + terminationMessagePolicy: FallbackToLogsOnError + volumeMounts: + - mountPath: /run + name: linkerd-proxy-init-xtables-lock + serviceAccountName: linkerd-controller + volumes: + - configMap: + name: linkerd-config + name: config + - emptyDir: {} + name: linkerd-proxy-init-xtables-lock + - emptyDir: + medium: Memory + name: linkerd-identity-end-entity +--- +### +### Destination Controller Service +### +--- +kind: Service +apiVersion: v1 +metadata: + name: linkerd-dst + namespace: linkerd + labels: + linkerd.io/control-plane-component: destination + linkerd.io/control-plane-ns: linkerd + annotations: + linkerd.io/created-by: linkerd/cli edge-20.9.4 +spec: + type: ClusterIP + selector: + linkerd.io/control-plane-component: destination + ports: + - name: grpc + port: 8086 + targetPort: 8086 +--- +kind: Service +apiVersion: v1 +metadata: + name: linkerd-dst-headless + namespace: linkerd + labels: + linkerd.io/control-plane-component: destination + linkerd.io/control-plane-ns: linkerd + annotations: + linkerd.io/created-by: linkerd/cli edge-20.9.4 +spec: + clusterIP: None + selector: + linkerd.io/control-plane-component: destination + ports: + - name: grpc + port: 8086 + targetPort: 8086 +--- +apiVersion: apps/v1 +kind: Deployment +metadata: + annotations: + linkerd.io/created-by: linkerd/cli edge-20.9.4 + labels: + app.kubernetes.io/name: destination + app.kubernetes.io/part-of: Linkerd + app.kubernetes.io/version: edge-20.9.4 + linkerd.io/control-plane-component: destination + linkerd.io/control-plane-ns: linkerd + name: linkerd-destination + namespace: linkerd +spec: + replicas: 1 + selector: + matchLabels: + linkerd.io/control-plane-component: destination + linkerd.io/control-plane-ns: linkerd + linkerd.io/proxy-deployment: linkerd-destination + template: + metadata: + annotations: + linkerd.io/created-by: linkerd/cli edge-20.9.4 + linkerd.io/identity-mode: default + linkerd.io/proxy-version: edge-20.9.4 + labels: + linkerd.io/control-plane-component: destination + linkerd.io/control-plane-ns: linkerd + linkerd.io/workload-ns: linkerd + linkerd.io/proxy-deployment: linkerd-destination + spec: + nodeSelector: + beta.kubernetes.io/os: linux + containers: + - args: + - destination + - -addr=:8086 + - -controller-namespace=linkerd + - -enable-h2-upgrade=true + - -log-level=info + - -enable-endpoint-slices=false + image: ghcr.io/linkerd/controller:edge-20.9.4 + imagePullPolicy: IfNotPresent + livenessProbe: + httpGet: + path: /ping + port: 9996 + initialDelaySeconds: 10 + name: destination + ports: + - containerPort: 8086 + name: grpc + - containerPort: 9996 + name: admin-http + readinessProbe: + failureThreshold: 7 + httpGet: + path: /ready + port: 9996 + securityContext: + runAsUser: 2103 + volumeMounts: + - mountPath: /var/run/linkerd/config + name: config + - env: + - name: LINKERD2_PROXY_LOG + value: warn,linkerd=info + - name: LINKERD2_PROXY_LOG_FORMAT + value: plain + - name: LINKERD2_PROXY_DESTINATION_SVC_ADDR + value: localhost.:8086 + - name: LINKERD2_PROXY_DESTINATION_GET_NETWORKS + value: "10.0.0.0/8,172.16.0.0/12,192.168.0.0/16" + - name: LINKERD2_PROXY_DESTINATION_PROFILE_NETWORKS + value: "10.0.0.0/8,172.16.0.0/12,192.168.0.0/16" + - name: LINKERD2_PROXY_INBOUND_CONNECT_TIMEOUT + value: "100ms" + - name: LINKERD2_PROXY_OUTBOUND_CONNECT_TIMEOUT + value: "1000ms" + - name: LINKERD2_PROXY_CONTROL_LISTEN_ADDR + value: 0.0.0.0:4190 + - name: LINKERD2_PROXY_ADMIN_LISTEN_ADDR + value: 0.0.0.0:4191 + - name: LINKERD2_PROXY_OUTBOUND_LISTEN_ADDR + value: 127.0.0.1:4140 + - name: LINKERD2_PROXY_INBOUND_LISTEN_ADDR + value: 0.0.0.0:4143 + - name: LINKERD2_PROXY_DESTINATION_GET_SUFFIXES + value: svc.cluster.local. + - name: LINKERD2_PROXY_DESTINATION_PROFILE_SUFFIXES + value: svc.cluster.local. + - name: LINKERD2_PROXY_INBOUND_ACCEPT_KEEPALIVE + value: 10000ms + - name: LINKERD2_PROXY_OUTBOUND_CONNECT_KEEPALIVE + value: 10000ms + - name: _pod_ns + valueFrom: + fieldRef: + fieldPath: metadata.namespace + - name: _pod_nodeName + valueFrom: + fieldRef: + fieldPath: spec.nodeName + - name: LINKERD2_PROXY_DESTINATION_CONTEXT + value: | + {"ns":"$(_pod_ns)", "nodeName":"$(_pod_nodeName)"} + - name: LINKERD2_PROXY_IDENTITY_DIR + value: /var/run/linkerd/identity/end-entity + - name: LINKERD2_PROXY_IDENTITY_TRUST_ANCHORS + value: | + -----BEGIN CERTIFICATE----- + MIIBrzCCAVSgAwIBAgIBATAKBggqhkjOPQQDAjApMScwJQYDVQQDEx5pZGVudGl0 + eS5saW5rZXJkLmNsdXN0ZXIubG9jYWwwHhcNMjAwOTI1MTEwMzUxWhcNMjEwOTI1 + MTEwNDExWjApMScwJQYDVQQDEx5pZGVudGl0eS5saW5rZXJkLmNsdXN0ZXIubG9j + YWwwWTATBgcqhkjOPQIBBggqhkjOPQMBBwNCAATJ75wACER7swEDFhg4Wk1kuU2o + X/UyXaO7cPPTlyHZBqOP4OskRdAVyM8LUk1xmjRWlvWB8wZtcjPn9RzsZv4bo20w + azAOBgNVHQ8BAf8EBAMCAQYwHQYDVR0lBBYwFAYIKwYBBQUHAwEGCCsGAQUFBwMC + MA8GA1UdEwEB/wQFMAMBAf8wKQYDVR0RBCIwIIIeaWRlbnRpdHkubGlua2VyZC5j + bHVzdGVyLmxvY2FsMAoGCCqGSM49BAMCA0kAMEYCIQDIwBEszQRPzYI0k2vACFV3 + 2Eu+jgPzsFxd9QVOBT3KTwIhALDyUFnDR7+JCeuYPNNiBNNloVwY6Zbs2dh1i3w6 + Viat + -----END CERTIFICATE----- + - name: LINKERD2_PROXY_IDENTITY_TOKEN_FILE + value: /var/run/secrets/kubernetes.io/serviceaccount/token + - name: LINKERD2_PROXY_IDENTITY_SVC_ADDR + value: linkerd-identity-headless.linkerd.svc.cluster.local:8080 + - name: _pod_sa + valueFrom: + fieldRef: + fieldPath: spec.serviceAccountName + - name: _l5d_ns + value: linkerd + - name: _l5d_trustdomain + value: cluster.local + - name: LINKERD2_PROXY_IDENTITY_LOCAL_NAME + value: $(_pod_sa).$(_pod_ns).serviceaccount.identity.$(_l5d_ns).$(_l5d_trustdomain) + - name: LINKERD2_PROXY_IDENTITY_SVC_NAME + value: linkerd-identity.$(_l5d_ns).serviceaccount.identity.$(_l5d_ns).$(_l5d_trustdomain) + - name: LINKERD2_PROXY_DESTINATION_SVC_NAME + value: linkerd-destination.$(_l5d_ns).serviceaccount.identity.$(_l5d_ns).$(_l5d_trustdomain) + - name: LINKERD2_PROXY_TAP_SVC_NAME + value: linkerd-tap.$(_l5d_ns).serviceaccount.identity.$(_l5d_ns).$(_l5d_trustdomain) + image: ghcr.io/linkerd/proxy:edge-20.9.4 + imagePullPolicy: IfNotPresent + livenessProbe: + httpGet: + path: /live + port: 4191 + initialDelaySeconds: 10 + name: linkerd-proxy + ports: + - containerPort: 4143 + name: linkerd-proxy + - containerPort: 4191 + name: linkerd-admin + readinessProbe: + httpGet: + path: /ready + port: 4191 + initialDelaySeconds: 2 + resources: + securityContext: + allowPrivilegeEscalation: false + readOnlyRootFilesystem: true + runAsUser: 2102 + terminationMessagePolicy: FallbackToLogsOnError + volumeMounts: + - mountPath: /var/run/linkerd/identity/end-entity + name: linkerd-identity-end-entity + initContainers: + - args: + - --incoming-proxy-port + - "4143" + - --outgoing-proxy-port + - "4140" + - --proxy-uid + - "2102" + - --inbound-ports-to-ignore + - 4190,4191 + - --outbound-ports-to-ignore + - "443" + image: ghcr.io/linkerd/proxy-init:v1.3.6 + imagePullPolicy: IfNotPresent + name: linkerd-init + resources: + limits: + cpu: "100m" + memory: "50Mi" + requests: + cpu: "10m" + memory: "10Mi" + securityContext: + allowPrivilegeEscalation: false + capabilities: + add: + - NET_ADMIN + - NET_RAW + privileged: false + readOnlyRootFilesystem: true + runAsNonRoot: false + runAsUser: 0 + terminationMessagePolicy: FallbackToLogsOnError + volumeMounts: + - mountPath: /run + name: linkerd-proxy-init-xtables-lock + serviceAccountName: linkerd-destination + volumes: + - configMap: + name: linkerd-config + name: config + - emptyDir: {} + name: linkerd-proxy-init-xtables-lock + - emptyDir: + medium: Memory + name: linkerd-identity-end-entity +--- +### +### Heartbeat +### +--- +apiVersion: batch/v1beta1 +kind: CronJob +metadata: + name: linkerd-heartbeat + namespace: linkerd + labels: + app.kubernetes.io/name: heartbeat + app.kubernetes.io/part-of: Linkerd + app.kubernetes.io/version: edge-20.9.4 + linkerd.io/control-plane-component: heartbeat + linkerd.io/control-plane-ns: linkerd + annotations: + linkerd.io/created-by: linkerd/cli edge-20.9.4 +spec: + schedule: "14 11 * * * " + successfulJobsHistoryLimit: 0 + jobTemplate: + spec: + template: + metadata: + labels: + linkerd.io/control-plane-component: heartbeat + linkerd.io/workload-ns: linkerd + annotations: + linkerd.io/created-by: linkerd/cli edge-20.9.4 + spec: + nodeSelector: + beta.kubernetes.io/os: linux + serviceAccountName: linkerd-heartbeat + restartPolicy: Never + containers: + - name: heartbeat + image: ghcr.io/linkerd/controller:edge-20.9.4 + imagePullPolicy: IfNotPresent + args: + - "heartbeat" + - "-controller-namespace=linkerd" + - "-log-level=info" + - "-prometheus-url=http://linkerd-prometheus.linkerd.svc.cluster.local:9090" + securityContext: + runAsUser: 2103 +--- +### +### Web +### +--- +kind: Service +apiVersion: v1 +metadata: + name: linkerd-web + namespace: linkerd + labels: + linkerd.io/control-plane-component: web + linkerd.io/control-plane-ns: linkerd + annotations: + linkerd.io/created-by: linkerd/cli edge-20.9.4 +spec: + type: ClusterIP + selector: + linkerd.io/control-plane-component: web + ports: + - name: http + port: 8084 + targetPort: 8084 + - name: admin-http + port: 9994 + targetPort: 9994 +--- +apiVersion: apps/v1 +kind: Deployment +metadata: + annotations: + linkerd.io/created-by: linkerd/cli edge-20.9.4 + labels: + app.kubernetes.io/name: web + app.kubernetes.io/part-of: Linkerd + app.kubernetes.io/version: edge-20.9.4 + linkerd.io/control-plane-component: web + linkerd.io/control-plane-ns: linkerd + name: linkerd-web + namespace: linkerd +spec: + replicas: 1 + selector: + matchLabels: + linkerd.io/control-plane-component: web + linkerd.io/control-plane-ns: linkerd + linkerd.io/proxy-deployment: linkerd-web + template: + metadata: + annotations: + linkerd.io/created-by: linkerd/cli edge-20.9.4 + linkerd.io/identity-mode: default + linkerd.io/proxy-version: edge-20.9.4 + labels: + linkerd.io/control-plane-component: web + linkerd.io/control-plane-ns: linkerd + linkerd.io/workload-ns: linkerd + linkerd.io/proxy-deployment: linkerd-web + spec: + nodeSelector: + beta.kubernetes.io/os: linux + containers: + - args: + - -api-addr=linkerd-controller-api.linkerd.svc.cluster.local:8085 + - -grafana-addr=linkerd-grafana.linkerd.svc.cluster.local:3000 + - -controller-namespace=linkerd + - -log-level=info + - -enforced-host=^(localhost|127\.0\.0\.1|linkerd-web\.linkerd\.svc\.cluster\.local|linkerd-web\.linkerd\.svc|\[::1\])(:\d+)?$ + image: ghcr.io/linkerd/web:edge-20.9.4 + imagePullPolicy: IfNotPresent + livenessProbe: + httpGet: + path: /ping + port: 9994 + initialDelaySeconds: 10 + name: web + ports: + - containerPort: 8084 + name: http + - containerPort: 9994 + name: admin-http + readinessProbe: + failureThreshold: 7 + httpGet: + path: /ready + port: 9994 + securityContext: + runAsUser: 2103 + volumeMounts: + - mountPath: /var/run/linkerd/config + name: config + - env: + - name: LINKERD2_PROXY_LOG + value: warn,linkerd=info + - name: LINKERD2_PROXY_LOG_FORMAT + value: plain + - name: LINKERD2_PROXY_DESTINATION_SVC_ADDR + value: linkerd-dst-headless.linkerd.svc.cluster.local:8086 + - name: LINKERD2_PROXY_DESTINATION_GET_NETWORKS + value: "10.0.0.0/8,172.16.0.0/12,192.168.0.0/16" + - name: LINKERD2_PROXY_DESTINATION_PROFILE_NETWORKS + value: "10.0.0.0/8,172.16.0.0/12,192.168.0.0/16" + - name: LINKERD2_PROXY_INBOUND_CONNECT_TIMEOUT + value: "100ms" + - name: LINKERD2_PROXY_OUTBOUND_CONNECT_TIMEOUT + value: "1000ms" + - name: LINKERD2_PROXY_CONTROL_LISTEN_ADDR + value: 0.0.0.0:4190 + - name: LINKERD2_PROXY_ADMIN_LISTEN_ADDR + value: 0.0.0.0:4191 + - name: LINKERD2_PROXY_OUTBOUND_LISTEN_ADDR + value: 127.0.0.1:4140 + - name: LINKERD2_PROXY_INBOUND_LISTEN_ADDR + value: 0.0.0.0:4143 + - name: LINKERD2_PROXY_DESTINATION_GET_SUFFIXES + value: svc.cluster.local. + - name: LINKERD2_PROXY_DESTINATION_PROFILE_SUFFIXES + value: svc.cluster.local. + - name: LINKERD2_PROXY_INBOUND_ACCEPT_KEEPALIVE + value: 10000ms + - name: LINKERD2_PROXY_OUTBOUND_CONNECT_KEEPALIVE + value: 10000ms + - name: _pod_ns + valueFrom: + fieldRef: + fieldPath: metadata.namespace + - name: _pod_nodeName + valueFrom: + fieldRef: + fieldPath: spec.nodeName + - name: LINKERD2_PROXY_DESTINATION_CONTEXT + value: | + {"ns":"$(_pod_ns)", "nodeName":"$(_pod_nodeName)"} + - name: LINKERD2_PROXY_IDENTITY_DIR + value: /var/run/linkerd/identity/end-entity + - name: LINKERD2_PROXY_IDENTITY_TRUST_ANCHORS + value: | + -----BEGIN CERTIFICATE----- + MIIBrzCCAVSgAwIBAgIBATAKBggqhkjOPQQDAjApMScwJQYDVQQDEx5pZGVudGl0 + eS5saW5rZXJkLmNsdXN0ZXIubG9jYWwwHhcNMjAwOTI1MTEwMzUxWhcNMjEwOTI1 + MTEwNDExWjApMScwJQYDVQQDEx5pZGVudGl0eS5saW5rZXJkLmNsdXN0ZXIubG9j + YWwwWTATBgcqhkjOPQIBBggqhkjOPQMBBwNCAATJ75wACER7swEDFhg4Wk1kuU2o + X/UyXaO7cPPTlyHZBqOP4OskRdAVyM8LUk1xmjRWlvWB8wZtcjPn9RzsZv4bo20w + azAOBgNVHQ8BAf8EBAMCAQYwHQYDVR0lBBYwFAYIKwYBBQUHAwEGCCsGAQUFBwMC + MA8GA1UdEwEB/wQFMAMBAf8wKQYDVR0RBCIwIIIeaWRlbnRpdHkubGlua2VyZC5j + bHVzdGVyLmxvY2FsMAoGCCqGSM49BAMCA0kAMEYCIQDIwBEszQRPzYI0k2vACFV3 + 2Eu+jgPzsFxd9QVOBT3KTwIhALDyUFnDR7+JCeuYPNNiBNNloVwY6Zbs2dh1i3w6 + Viat + -----END CERTIFICATE----- + - name: LINKERD2_PROXY_IDENTITY_TOKEN_FILE + value: /var/run/secrets/kubernetes.io/serviceaccount/token + - name: LINKERD2_PROXY_IDENTITY_SVC_ADDR + value: linkerd-identity-headless.linkerd.svc.cluster.local:8080 + - name: _pod_sa + valueFrom: + fieldRef: + fieldPath: spec.serviceAccountName + - name: _l5d_ns + value: linkerd + - name: _l5d_trustdomain + value: cluster.local + - name: LINKERD2_PROXY_IDENTITY_LOCAL_NAME + value: $(_pod_sa).$(_pod_ns).serviceaccount.identity.$(_l5d_ns).$(_l5d_trustdomain) + - name: LINKERD2_PROXY_IDENTITY_SVC_NAME + value: linkerd-identity.$(_l5d_ns).serviceaccount.identity.$(_l5d_ns).$(_l5d_trustdomain) + - name: LINKERD2_PROXY_DESTINATION_SVC_NAME + value: linkerd-destination.$(_l5d_ns).serviceaccount.identity.$(_l5d_ns).$(_l5d_trustdomain) + - name: LINKERD2_PROXY_TAP_SVC_NAME + value: linkerd-tap.$(_l5d_ns).serviceaccount.identity.$(_l5d_ns).$(_l5d_trustdomain) + image: ghcr.io/linkerd/proxy:edge-20.9.4 + imagePullPolicy: IfNotPresent + livenessProbe: + httpGet: + path: /live + port: 4191 + initialDelaySeconds: 10 + name: linkerd-proxy + ports: + - containerPort: 4143 + name: linkerd-proxy + - containerPort: 4191 + name: linkerd-admin + readinessProbe: + httpGet: + path: /ready + port: 4191 + initialDelaySeconds: 2 + resources: + securityContext: + allowPrivilegeEscalation: false + readOnlyRootFilesystem: true + runAsUser: 2102 + terminationMessagePolicy: FallbackToLogsOnError + volumeMounts: + - mountPath: /var/run/linkerd/identity/end-entity + name: linkerd-identity-end-entity + initContainers: + - args: + - --incoming-proxy-port + - "4143" + - --outgoing-proxy-port + - "4140" + - --proxy-uid + - "2102" + - --inbound-ports-to-ignore + - 4190,4191 + - --outbound-ports-to-ignore + - "443" + image: ghcr.io/linkerd/proxy-init:v1.3.6 + imagePullPolicy: IfNotPresent + name: linkerd-init + resources: + limits: + cpu: "100m" + memory: "50Mi" + requests: + cpu: "10m" + memory: "10Mi" + securityContext: + allowPrivilegeEscalation: false + capabilities: + add: + - NET_ADMIN + - NET_RAW + privileged: false + readOnlyRootFilesystem: true + runAsNonRoot: false + runAsUser: 0 + terminationMessagePolicy: FallbackToLogsOnError + volumeMounts: + - mountPath: /run + name: linkerd-proxy-init-xtables-lock + serviceAccountName: linkerd-web + volumes: + - configMap: + name: linkerd-config + name: config + - emptyDir: {} + name: linkerd-proxy-init-xtables-lock + - emptyDir: + medium: Memory + name: linkerd-identity-end-entity +--- +### +### Proxy Injector +### +--- +apiVersion: apps/v1 +kind: Deployment +metadata: + annotations: + linkerd.io/created-by: linkerd/cli edge-20.9.4 + labels: + app.kubernetes.io/name: proxy-injector + app.kubernetes.io/part-of: Linkerd + app.kubernetes.io/version: edge-20.9.4 + linkerd.io/control-plane-component: proxy-injector + linkerd.io/control-plane-ns: linkerd + name: linkerd-proxy-injector + namespace: linkerd +spec: + replicas: 1 + selector: + matchLabels: + linkerd.io/control-plane-component: proxy-injector + template: + metadata: + annotations: + linkerd.io/created-by: linkerd/cli edge-20.9.4 + linkerd.io/identity-mode: default + linkerd.io/proxy-version: edge-20.9.4 + labels: + linkerd.io/control-plane-component: proxy-injector + linkerd.io/control-plane-ns: linkerd + linkerd.io/workload-ns: linkerd + linkerd.io/proxy-deployment: linkerd-proxy-injector + spec: + nodeSelector: + beta.kubernetes.io/os: linux + containers: + - args: + - proxy-injector + - -log-level=info + image: ghcr.io/linkerd/controller:edge-20.9.4 + imagePullPolicy: IfNotPresent + livenessProbe: + httpGet: + path: /ping + port: 9995 + initialDelaySeconds: 10 + name: proxy-injector + ports: + - containerPort: 8443 + name: proxy-injector + - containerPort: 9995 + name: admin-http + readinessProbe: + failureThreshold: 7 + httpGet: + path: /ready + port: 9995 + securityContext: + runAsUser: 2103 + volumeMounts: + - mountPath: /var/run/linkerd/config + name: config + - mountPath: /var/run/linkerd/tls + name: tls + readOnly: true + - env: + - name: LINKERD2_PROXY_LOG + value: warn,linkerd=info + - name: LINKERD2_PROXY_LOG_FORMAT + value: plain + - name: LINKERD2_PROXY_DESTINATION_SVC_ADDR + value: linkerd-dst-headless.linkerd.svc.cluster.local:8086 + - name: LINKERD2_PROXY_DESTINATION_GET_NETWORKS + value: "10.0.0.0/8,172.16.0.0/12,192.168.0.0/16" + - name: LINKERD2_PROXY_DESTINATION_PROFILE_NETWORKS + value: "10.0.0.0/8,172.16.0.0/12,192.168.0.0/16" + - name: LINKERD2_PROXY_INBOUND_CONNECT_TIMEOUT + value: "100ms" + - name: LINKERD2_PROXY_OUTBOUND_CONNECT_TIMEOUT + value: "1000ms" + - name: LINKERD2_PROXY_CONTROL_LISTEN_ADDR + value: 0.0.0.0:4190 + - name: LINKERD2_PROXY_ADMIN_LISTEN_ADDR + value: 0.0.0.0:4191 + - name: LINKERD2_PROXY_OUTBOUND_LISTEN_ADDR + value: 127.0.0.1:4140 + - name: LINKERD2_PROXY_INBOUND_LISTEN_ADDR + value: 0.0.0.0:4143 + - name: LINKERD2_PROXY_DESTINATION_GET_SUFFIXES + value: svc.cluster.local. + - name: LINKERD2_PROXY_DESTINATION_PROFILE_SUFFIXES + value: svc.cluster.local. + - name: LINKERD2_PROXY_INBOUND_ACCEPT_KEEPALIVE + value: 10000ms + - name: LINKERD2_PROXY_OUTBOUND_CONNECT_KEEPALIVE + value: 10000ms + - name: _pod_ns + valueFrom: + fieldRef: + fieldPath: metadata.namespace + - name: _pod_nodeName + valueFrom: + fieldRef: + fieldPath: spec.nodeName + - name: LINKERD2_PROXY_DESTINATION_CONTEXT + value: | + {"ns":"$(_pod_ns)", "nodeName":"$(_pod_nodeName)"} + - name: LINKERD2_PROXY_IDENTITY_DIR + value: /var/run/linkerd/identity/end-entity + - name: LINKERD2_PROXY_IDENTITY_TRUST_ANCHORS + value: | + -----BEGIN CERTIFICATE----- + MIIBrzCCAVSgAwIBAgIBATAKBggqhkjOPQQDAjApMScwJQYDVQQDEx5pZGVudGl0 + eS5saW5rZXJkLmNsdXN0ZXIubG9jYWwwHhcNMjAwOTI1MTEwMzUxWhcNMjEwOTI1 + MTEwNDExWjApMScwJQYDVQQDEx5pZGVudGl0eS5saW5rZXJkLmNsdXN0ZXIubG9j + YWwwWTATBgcqhkjOPQIBBggqhkjOPQMBBwNCAATJ75wACER7swEDFhg4Wk1kuU2o + X/UyXaO7cPPTlyHZBqOP4OskRdAVyM8LUk1xmjRWlvWB8wZtcjPn9RzsZv4bo20w + azAOBgNVHQ8BAf8EBAMCAQYwHQYDVR0lBBYwFAYIKwYBBQUHAwEGCCsGAQUFBwMC + MA8GA1UdEwEB/wQFMAMBAf8wKQYDVR0RBCIwIIIeaWRlbnRpdHkubGlua2VyZC5j + bHVzdGVyLmxvY2FsMAoGCCqGSM49BAMCA0kAMEYCIQDIwBEszQRPzYI0k2vACFV3 + 2Eu+jgPzsFxd9QVOBT3KTwIhALDyUFnDR7+JCeuYPNNiBNNloVwY6Zbs2dh1i3w6 + Viat + -----END CERTIFICATE----- + - name: LINKERD2_PROXY_IDENTITY_TOKEN_FILE + value: /var/run/secrets/kubernetes.io/serviceaccount/token + - name: LINKERD2_PROXY_IDENTITY_SVC_ADDR + value: linkerd-identity-headless.linkerd.svc.cluster.local:8080 + - name: _pod_sa + valueFrom: + fieldRef: + fieldPath: spec.serviceAccountName + - name: _l5d_ns + value: linkerd + - name: _l5d_trustdomain + value: cluster.local + - name: LINKERD2_PROXY_IDENTITY_LOCAL_NAME + value: $(_pod_sa).$(_pod_ns).serviceaccount.identity.$(_l5d_ns).$(_l5d_trustdomain) + - name: LINKERD2_PROXY_IDENTITY_SVC_NAME + value: linkerd-identity.$(_l5d_ns).serviceaccount.identity.$(_l5d_ns).$(_l5d_trustdomain) + - name: LINKERD2_PROXY_DESTINATION_SVC_NAME + value: linkerd-destination.$(_l5d_ns).serviceaccount.identity.$(_l5d_ns).$(_l5d_trustdomain) + - name: LINKERD2_PROXY_TAP_SVC_NAME + value: linkerd-tap.$(_l5d_ns).serviceaccount.identity.$(_l5d_ns).$(_l5d_trustdomain) + image: ghcr.io/linkerd/proxy:edge-20.9.4 + imagePullPolicy: IfNotPresent + livenessProbe: + httpGet: + path: /live + port: 4191 + initialDelaySeconds: 10 + name: linkerd-proxy + ports: + - containerPort: 4143 + name: linkerd-proxy + - containerPort: 4191 + name: linkerd-admin + readinessProbe: + httpGet: + path: /ready + port: 4191 + initialDelaySeconds: 2 + resources: + securityContext: + allowPrivilegeEscalation: false + readOnlyRootFilesystem: true + runAsUser: 2102 + terminationMessagePolicy: FallbackToLogsOnError + volumeMounts: + - mountPath: /var/run/linkerd/identity/end-entity + name: linkerd-identity-end-entity + initContainers: + - args: + - --incoming-proxy-port + - "4143" + - --outgoing-proxy-port + - "4140" + - --proxy-uid + - "2102" + - --inbound-ports-to-ignore + - 4190,4191 + - --outbound-ports-to-ignore + - "443" + image: ghcr.io/linkerd/proxy-init:v1.3.6 + imagePullPolicy: IfNotPresent + name: linkerd-init + resources: + limits: + cpu: "100m" + memory: "50Mi" + requests: + cpu: "10m" + memory: "10Mi" + securityContext: + allowPrivilegeEscalation: false + capabilities: + add: + - NET_ADMIN + - NET_RAW + privileged: false + readOnlyRootFilesystem: true + runAsNonRoot: false + runAsUser: 0 + terminationMessagePolicy: FallbackToLogsOnError + volumeMounts: + - mountPath: /run + name: linkerd-proxy-init-xtables-lock + serviceAccountName: linkerd-proxy-injector + volumes: + - configMap: + name: linkerd-config + name: config + - name: tls + secret: + secretName: linkerd-proxy-injector-tls + - emptyDir: {} + name: linkerd-proxy-init-xtables-lock + - emptyDir: + medium: Memory + name: linkerd-identity-end-entity +--- +kind: Service +apiVersion: v1 +metadata: + name: linkerd-proxy-injector + namespace: linkerd + labels: + linkerd.io/control-plane-component: proxy-injector + linkerd.io/control-plane-ns: linkerd + annotations: + linkerd.io/created-by: linkerd/cli edge-20.9.4 +spec: + type: ClusterIP + selector: + linkerd.io/control-plane-component: proxy-injector + ports: + - name: proxy-injector + port: 443 + targetPort: proxy-injector +--- +### +### Service Profile Validator +### +--- +kind: Service +apiVersion: v1 +metadata: + name: linkerd-sp-validator + namespace: linkerd + labels: + linkerd.io/control-plane-component: sp-validator + linkerd.io/control-plane-ns: linkerd + annotations: + linkerd.io/created-by: linkerd/cli edge-20.9.4 +spec: + type: ClusterIP + selector: + linkerd.io/control-plane-component: sp-validator + ports: + - name: sp-validator + port: 443 + targetPort: sp-validator +--- +apiVersion: apps/v1 +kind: Deployment +metadata: + annotations: + linkerd.io/created-by: linkerd/cli edge-20.9.4 + labels: + app.kubernetes.io/name: sp-validator + app.kubernetes.io/part-of: Linkerd + app.kubernetes.io/version: edge-20.9.4 + linkerd.io/control-plane-component: sp-validator + linkerd.io/control-plane-ns: linkerd + name: linkerd-sp-validator + namespace: linkerd +spec: + replicas: 1 + selector: + matchLabels: + linkerd.io/control-plane-component: sp-validator + template: + metadata: + annotations: + linkerd.io/created-by: linkerd/cli edge-20.9.4 + linkerd.io/identity-mode: default + linkerd.io/proxy-version: edge-20.9.4 + labels: + linkerd.io/control-plane-component: sp-validator + linkerd.io/control-plane-ns: linkerd + linkerd.io/workload-ns: linkerd + linkerd.io/proxy-deployment: linkerd-sp-validator + spec: + nodeSelector: + beta.kubernetes.io/os: linux + containers: + - args: + - sp-validator + - -log-level=info + image: ghcr.io/linkerd/controller:edge-20.9.4 + imagePullPolicy: IfNotPresent + livenessProbe: + httpGet: + path: /ping + port: 9997 + initialDelaySeconds: 10 + name: sp-validator + ports: + - containerPort: 8443 + name: sp-validator + - containerPort: 9997 + name: admin-http + readinessProbe: + failureThreshold: 7 + httpGet: + path: /ready + port: 9997 + securityContext: + runAsUser: 2103 + volumeMounts: + - mountPath: /var/run/linkerd/tls + name: tls + readOnly: true + - env: + - name: LINKERD2_PROXY_LOG + value: warn,linkerd=info + - name: LINKERD2_PROXY_LOG_FORMAT + value: plain + - name: LINKERD2_PROXY_DESTINATION_SVC_ADDR + value: linkerd-dst-headless.linkerd.svc.cluster.local:8086 + - name: LINKERD2_PROXY_DESTINATION_GET_NETWORKS + value: "10.0.0.0/8,172.16.0.0/12,192.168.0.0/16" + - name: LINKERD2_PROXY_DESTINATION_PROFILE_NETWORKS + value: "10.0.0.0/8,172.16.0.0/12,192.168.0.0/16" + - name: LINKERD2_PROXY_INBOUND_CONNECT_TIMEOUT + value: "100ms" + - name: LINKERD2_PROXY_OUTBOUND_CONNECT_TIMEOUT + value: "1000ms" + - name: LINKERD2_PROXY_CONTROL_LISTEN_ADDR + value: 0.0.0.0:4190 + - name: LINKERD2_PROXY_ADMIN_LISTEN_ADDR + value: 0.0.0.0:4191 + - name: LINKERD2_PROXY_OUTBOUND_LISTEN_ADDR + value: 127.0.0.1:4140 + - name: LINKERD2_PROXY_INBOUND_LISTEN_ADDR + value: 0.0.0.0:4143 + - name: LINKERD2_PROXY_DESTINATION_GET_SUFFIXES + value: svc.cluster.local. + - name: LINKERD2_PROXY_DESTINATION_PROFILE_SUFFIXES + value: svc.cluster.local. + - name: LINKERD2_PROXY_INBOUND_ACCEPT_KEEPALIVE + value: 10000ms + - name: LINKERD2_PROXY_OUTBOUND_CONNECT_KEEPALIVE + value: 10000ms + - name: _pod_ns + valueFrom: + fieldRef: + fieldPath: metadata.namespace + - name: _pod_nodeName + valueFrom: + fieldRef: + fieldPath: spec.nodeName + - name: LINKERD2_PROXY_DESTINATION_CONTEXT + value: | + {"ns":"$(_pod_ns)", "nodeName":"$(_pod_nodeName)"} + - name: LINKERD2_PROXY_IDENTITY_DIR + value: /var/run/linkerd/identity/end-entity + - name: LINKERD2_PROXY_IDENTITY_TRUST_ANCHORS + value: | + -----BEGIN CERTIFICATE----- + MIIBrzCCAVSgAwIBAgIBATAKBggqhkjOPQQDAjApMScwJQYDVQQDEx5pZGVudGl0 + eS5saW5rZXJkLmNsdXN0ZXIubG9jYWwwHhcNMjAwOTI1MTEwMzUxWhcNMjEwOTI1 + MTEwNDExWjApMScwJQYDVQQDEx5pZGVudGl0eS5saW5rZXJkLmNsdXN0ZXIubG9j + YWwwWTATBgcqhkjOPQIBBggqhkjOPQMBBwNCAATJ75wACER7swEDFhg4Wk1kuU2o + X/UyXaO7cPPTlyHZBqOP4OskRdAVyM8LUk1xmjRWlvWB8wZtcjPn9RzsZv4bo20w + azAOBgNVHQ8BAf8EBAMCAQYwHQYDVR0lBBYwFAYIKwYBBQUHAwEGCCsGAQUFBwMC + MA8GA1UdEwEB/wQFMAMBAf8wKQYDVR0RBCIwIIIeaWRlbnRpdHkubGlua2VyZC5j + bHVzdGVyLmxvY2FsMAoGCCqGSM49BAMCA0kAMEYCIQDIwBEszQRPzYI0k2vACFV3 + 2Eu+jgPzsFxd9QVOBT3KTwIhALDyUFnDR7+JCeuYPNNiBNNloVwY6Zbs2dh1i3w6 + Viat + -----END CERTIFICATE----- + - name: LINKERD2_PROXY_IDENTITY_TOKEN_FILE + value: /var/run/secrets/kubernetes.io/serviceaccount/token + - name: LINKERD2_PROXY_IDENTITY_SVC_ADDR + value: linkerd-identity-headless.linkerd.svc.cluster.local:8080 + - name: _pod_sa + valueFrom: + fieldRef: + fieldPath: spec.serviceAccountName + - name: _l5d_ns + value: linkerd + - name: _l5d_trustdomain + value: cluster.local + - name: LINKERD2_PROXY_IDENTITY_LOCAL_NAME + value: $(_pod_sa).$(_pod_ns).serviceaccount.identity.$(_l5d_ns).$(_l5d_trustdomain) + - name: LINKERD2_PROXY_IDENTITY_SVC_NAME + value: linkerd-identity.$(_l5d_ns).serviceaccount.identity.$(_l5d_ns).$(_l5d_trustdomain) + - name: LINKERD2_PROXY_DESTINATION_SVC_NAME + value: linkerd-destination.$(_l5d_ns).serviceaccount.identity.$(_l5d_ns).$(_l5d_trustdomain) + - name: LINKERD2_PROXY_TAP_SVC_NAME + value: linkerd-tap.$(_l5d_ns).serviceaccount.identity.$(_l5d_ns).$(_l5d_trustdomain) + image: ghcr.io/linkerd/proxy:edge-20.9.4 + imagePullPolicy: IfNotPresent + livenessProbe: + httpGet: + path: /live + port: 4191 + initialDelaySeconds: 10 + name: linkerd-proxy + ports: + - containerPort: 4143 + name: linkerd-proxy + - containerPort: 4191 + name: linkerd-admin + readinessProbe: + httpGet: + path: /ready + port: 4191 + initialDelaySeconds: 2 + resources: + securityContext: + allowPrivilegeEscalation: false + readOnlyRootFilesystem: true + runAsUser: 2102 + terminationMessagePolicy: FallbackToLogsOnError + volumeMounts: + - mountPath: /var/run/linkerd/identity/end-entity + name: linkerd-identity-end-entity + initContainers: + - args: + - --incoming-proxy-port + - "4143" + - --outgoing-proxy-port + - "4140" + - --proxy-uid + - "2102" + - --inbound-ports-to-ignore + - 4190,4191 + - --outbound-ports-to-ignore + - "443" + image: ghcr.io/linkerd/proxy-init:v1.3.6 + imagePullPolicy: IfNotPresent + name: linkerd-init + resources: + limits: + cpu: "100m" + memory: "50Mi" + requests: + cpu: "10m" + memory: "10Mi" + securityContext: + allowPrivilegeEscalation: false + capabilities: + add: + - NET_ADMIN + - NET_RAW + privileged: false + readOnlyRootFilesystem: true + runAsNonRoot: false + runAsUser: 0 + terminationMessagePolicy: FallbackToLogsOnError + volumeMounts: + - mountPath: /run + name: linkerd-proxy-init-xtables-lock + serviceAccountName: linkerd-sp-validator + volumes: + - name: tls + secret: + secretName: linkerd-sp-validator-tls + - emptyDir: {} + name: linkerd-proxy-init-xtables-lock + - emptyDir: + medium: Memory + name: linkerd-identity-end-entity +--- +### +### Tap +### +--- +kind: Service +apiVersion: v1 +metadata: + name: linkerd-tap + namespace: linkerd + labels: + linkerd.io/control-plane-component: tap + linkerd.io/control-plane-ns: linkerd + annotations: + linkerd.io/created-by: linkerd/cli edge-20.9.4 +spec: + type: ClusterIP + selector: + linkerd.io/control-plane-component: tap + ports: + - name: grpc + port: 8088 + targetPort: 8088 + - name: apiserver + port: 443 + targetPort: apiserver +--- +kind: Deployment +apiVersion: apps/v1 +metadata: + annotations: + linkerd.io/created-by: linkerd/cli edge-20.9.4 + labels: + app.kubernetes.io/name: tap + app.kubernetes.io/part-of: Linkerd + app.kubernetes.io/version: edge-20.9.4 + linkerd.io/control-plane-component: tap + linkerd.io/control-plane-ns: linkerd + name: linkerd-tap + namespace: linkerd +spec: + replicas: 1 + selector: + matchLabels: + linkerd.io/control-plane-component: tap + linkerd.io/control-plane-ns: linkerd + linkerd.io/proxy-deployment: linkerd-tap + template: + metadata: + annotations: + linkerd.io/created-by: linkerd/cli edge-20.9.4 + linkerd.io/identity-mode: default + linkerd.io/proxy-version: edge-20.9.4 + labels: + linkerd.io/control-plane-component: tap + linkerd.io/control-plane-ns: linkerd + linkerd.io/workload-ns: linkerd + linkerd.io/proxy-deployment: linkerd-tap + spec: + nodeSelector: + beta.kubernetes.io/os: linux + containers: + - args: + - tap + - -controller-namespace=linkerd + - -log-level=info + image: ghcr.io/linkerd/controller:edge-20.9.4 + imagePullPolicy: IfNotPresent + livenessProbe: + httpGet: + path: /ping + port: 9998 + initialDelaySeconds: 10 + name: tap + ports: + - containerPort: 8088 + name: grpc + - containerPort: 8089 + name: apiserver + - containerPort: 9998 + name: admin-http + readinessProbe: + failureThreshold: 7 + httpGet: + path: /ready + port: 9998 + securityContext: + runAsUser: 2103 + volumeMounts: + - mountPath: /var/run/linkerd/tls + name: tls + readOnly: true + - mountPath: /var/run/linkerd/config + name: config + - env: + - name: LINKERD2_PROXY_LOG + value: warn,linkerd=info + - name: LINKERD2_PROXY_LOG_FORMAT + value: plain + - name: LINKERD2_PROXY_DESTINATION_SVC_ADDR + value: linkerd-dst-headless.linkerd.svc.cluster.local:8086 + - name: LINKERD2_PROXY_DESTINATION_GET_NETWORKS + value: "10.0.0.0/8,172.16.0.0/12,192.168.0.0/16" + - name: LINKERD2_PROXY_DESTINATION_PROFILE_NETWORKS + value: "10.0.0.0/8,172.16.0.0/12,192.168.0.0/16" + - name: LINKERD2_PROXY_INBOUND_CONNECT_TIMEOUT + value: "100ms" + - name: LINKERD2_PROXY_OUTBOUND_CONNECT_TIMEOUT + value: "1000ms" + - name: LINKERD2_PROXY_CONTROL_LISTEN_ADDR + value: 0.0.0.0:4190 + - name: LINKERD2_PROXY_ADMIN_LISTEN_ADDR + value: 0.0.0.0:4191 + - name: LINKERD2_PROXY_OUTBOUND_LISTEN_ADDR + value: 127.0.0.1:4140 + - name: LINKERD2_PROXY_INBOUND_LISTEN_ADDR + value: 0.0.0.0:4143 + - name: LINKERD2_PROXY_DESTINATION_GET_SUFFIXES + value: svc.cluster.local. + - name: LINKERD2_PROXY_DESTINATION_PROFILE_SUFFIXES + value: svc.cluster.local. + - name: LINKERD2_PROXY_INBOUND_ACCEPT_KEEPALIVE + value: 10000ms + - name: LINKERD2_PROXY_OUTBOUND_CONNECT_KEEPALIVE + value: 10000ms + - name: _pod_ns + valueFrom: + fieldRef: + fieldPath: metadata.namespace + - name: _pod_nodeName + valueFrom: + fieldRef: + fieldPath: spec.nodeName + - name: LINKERD2_PROXY_DESTINATION_CONTEXT + value: | + {"ns":"$(_pod_ns)", "nodeName":"$(_pod_nodeName)"} + - name: LINKERD2_PROXY_IDENTITY_DIR + value: /var/run/linkerd/identity/end-entity + - name: LINKERD2_PROXY_IDENTITY_TRUST_ANCHORS + value: | + -----BEGIN CERTIFICATE----- + MIIBrzCCAVSgAwIBAgIBATAKBggqhkjOPQQDAjApMScwJQYDVQQDEx5pZGVudGl0 + eS5saW5rZXJkLmNsdXN0ZXIubG9jYWwwHhcNMjAwOTI1MTEwMzUxWhcNMjEwOTI1 + MTEwNDExWjApMScwJQYDVQQDEx5pZGVudGl0eS5saW5rZXJkLmNsdXN0ZXIubG9j + YWwwWTATBgcqhkjOPQIBBggqhkjOPQMBBwNCAATJ75wACER7swEDFhg4Wk1kuU2o + X/UyXaO7cPPTlyHZBqOP4OskRdAVyM8LUk1xmjRWlvWB8wZtcjPn9RzsZv4bo20w + azAOBgNVHQ8BAf8EBAMCAQYwHQYDVR0lBBYwFAYIKwYBBQUHAwEGCCsGAQUFBwMC + MA8GA1UdEwEB/wQFMAMBAf8wKQYDVR0RBCIwIIIeaWRlbnRpdHkubGlua2VyZC5j + bHVzdGVyLmxvY2FsMAoGCCqGSM49BAMCA0kAMEYCIQDIwBEszQRPzYI0k2vACFV3 + 2Eu+jgPzsFxd9QVOBT3KTwIhALDyUFnDR7+JCeuYPNNiBNNloVwY6Zbs2dh1i3w6 + Viat + -----END CERTIFICATE----- + - name: LINKERD2_PROXY_IDENTITY_TOKEN_FILE + value: /var/run/secrets/kubernetes.io/serviceaccount/token + - name: LINKERD2_PROXY_IDENTITY_SVC_ADDR + value: linkerd-identity-headless.linkerd.svc.cluster.local:8080 + - name: _pod_sa + valueFrom: + fieldRef: + fieldPath: spec.serviceAccountName + - name: _l5d_ns + value: linkerd + - name: _l5d_trustdomain + value: cluster.local + - name: LINKERD2_PROXY_IDENTITY_LOCAL_NAME + value: $(_pod_sa).$(_pod_ns).serviceaccount.identity.$(_l5d_ns).$(_l5d_trustdomain) + - name: LINKERD2_PROXY_IDENTITY_SVC_NAME + value: linkerd-identity.$(_l5d_ns).serviceaccount.identity.$(_l5d_ns).$(_l5d_trustdomain) + - name: LINKERD2_PROXY_DESTINATION_SVC_NAME + value: linkerd-destination.$(_l5d_ns).serviceaccount.identity.$(_l5d_ns).$(_l5d_trustdomain) + - name: LINKERD2_PROXY_TAP_SVC_NAME + value: linkerd-tap.$(_l5d_ns).serviceaccount.identity.$(_l5d_ns).$(_l5d_trustdomain) + image: ghcr.io/linkerd/proxy:edge-20.9.4 + imagePullPolicy: IfNotPresent + livenessProbe: + httpGet: + path: /live + port: 4191 + initialDelaySeconds: 10 + name: linkerd-proxy + ports: + - containerPort: 4143 + name: linkerd-proxy + - containerPort: 4191 + name: linkerd-admin + readinessProbe: + httpGet: + path: /ready + port: 4191 + initialDelaySeconds: 2 + resources: + securityContext: + allowPrivilegeEscalation: false + readOnlyRootFilesystem: true + runAsUser: 2102 + terminationMessagePolicy: FallbackToLogsOnError + volumeMounts: + - mountPath: /var/run/linkerd/identity/end-entity + name: linkerd-identity-end-entity + initContainers: + - args: + - --incoming-proxy-port + - "4143" + - --outgoing-proxy-port + - "4140" + - --proxy-uid + - "2102" + - --inbound-ports-to-ignore + - 4190,4191 + - --outbound-ports-to-ignore + - "443" + image: ghcr.io/linkerd/proxy-init:v1.3.6 + imagePullPolicy: IfNotPresent + name: linkerd-init + resources: + limits: + cpu: "100m" + memory: "50Mi" + requests: + cpu: "10m" + memory: "10Mi" + securityContext: + allowPrivilegeEscalation: false + capabilities: + add: + - NET_ADMIN + - NET_RAW + privileged: false + readOnlyRootFilesystem: true + runAsNonRoot: false + runAsUser: 0 + terminationMessagePolicy: FallbackToLogsOnError + volumeMounts: + - mountPath: /run + name: linkerd-proxy-init-xtables-lock + serviceAccountName: linkerd-tap + volumes: + - configMap: + name: linkerd-config + name: config + - emptyDir: {} + name: linkerd-proxy-init-xtables-lock + - emptyDir: + medium: Memory + name: linkerd-identity-end-entity + - name: tls + secret: + secretName: linkerd-tap-tls +--- +### +### linkerd add-ons configuration +### +--- +kind: ConfigMap +apiVersion: v1 +metadata: + name: linkerd-config-addons + namespace: linkerd + labels: + linkerd.io/control-plane-ns: linkerd + annotations: + linkerd.io/created-by: linkerd/cli edge-20.9.4 +data: + values: |- + global: + prometheusUrl: "" + grafanaUrl: "" + grafana: + enabled: true + prometheus: + enabled: true + tracing: + enabled: false +--- +### +### Grafana RBAC +### +--- +kind: ServiceAccount +apiVersion: v1 +metadata: + name: linkerd-grafana + namespace: linkerd + labels: + linkerd.io/control-plane-component: grafana + linkerd.io/control-plane-ns: linkerd +--- +### +### Grafana +### +--- +kind: ConfigMap +apiVersion: v1 +metadata: + name: linkerd-grafana-config + namespace: linkerd + labels: + linkerd.io/control-plane-component: grafana + linkerd.io/control-plane-ns: linkerd + annotations: + linkerd.io/created-by: linkerd/cli edge-20.9.4 +data: + grafana.ini: |- + instance_name = linkerd-grafana + + [server] + root_url = %(protocol)s://%(domain)s:/grafana/ + + [auth] + disable_login_form = true + + [auth.anonymous] + enabled = true + org_role = Editor + + [auth.basic] + enabled = false + + [analytics] + check_for_updates = false + + [panels] + disable_sanitize_html = true + + datasources.yaml: |- + apiVersion: 1 + datasources: + - name: prometheus + type: prometheus + access: proxy + orgId: 1 + url: http://linkerd-prometheus.linkerd.svc.cluster.local:9090 + isDefault: true + jsonData: + timeInterval: "5s" + version: 1 + editable: true + + dashboards.yaml: |- + apiVersion: 1 + providers: + - name: 'default' + orgId: 1 + folder: '' + type: file + disableDeletion: true + editable: true + options: + path: /var/lib/grafana/dashboards + homeDashboardId: linkerd-top-line +--- +kind: Service +apiVersion: v1 +metadata: + name: linkerd-grafana + namespace: linkerd + labels: + linkerd.io/control-plane-component: grafana + linkerd.io/control-plane-ns: linkerd + annotations: + linkerd.io/created-by: linkerd/cli edge-20.9.4 +spec: + type: ClusterIP + selector: + linkerd.io/control-plane-component: grafana + ports: + - name: http + port: 3000 + targetPort: 3000 +--- +apiVersion: apps/v1 +kind: Deployment +metadata: + annotations: + linkerd.io/created-by: linkerd/cli edge-20.9.4 + labels: + app.kubernetes.io/name: grafana + app.kubernetes.io/part-of: Linkerd + app.kubernetes.io/version: edge-20.9.4 + linkerd.io/control-plane-component: grafana + linkerd.io/control-plane-ns: linkerd + name: linkerd-grafana + namespace: linkerd +spec: + replicas: 1 + selector: + matchLabels: + linkerd.io/control-plane-component: grafana + linkerd.io/control-plane-ns: linkerd + linkerd.io/proxy-deployment: linkerd-grafana + template: + metadata: + annotations: + linkerd.io/created-by: linkerd/cli edge-20.9.4 + linkerd.io/identity-mode: default + linkerd.io/proxy-version: edge-20.9.4 + labels: + linkerd.io/control-plane-component: grafana + linkerd.io/control-plane-ns: linkerd + linkerd.io/workload-ns: linkerd + linkerd.io/proxy-deployment: linkerd-grafana + spec: + nodeSelector: + beta.kubernetes.io/os: linux + containers: + - env: + - name: GF_PATHS_DATA + value: /data + # Force using the go-based DNS resolver instead of the OS' to avoid failures in some environments + # see https://github.com/grafana/grafana/issues/20096 + - name: GODEBUG + value: netdns=go + image: ghcr.io/linkerd/grafana:edge-20.9.4 + imagePullPolicy: IfNotPresent + livenessProbe: + httpGet: + path: /api/health + port: 3000 + initialDelaySeconds: 30 + name: grafana + ports: + - containerPort: 3000 + name: http + readinessProbe: + httpGet: + path: /api/health + port: 3000 + securityContext: + runAsUser: 472 + volumeMounts: + - mountPath: /data + name: data + - mountPath: /etc/grafana + name: grafana-config + readOnly: true + - env: + - name: LINKERD2_PROXY_LOG + value: warn,linkerd=info + - name: LINKERD2_PROXY_LOG_FORMAT + value: plain + - name: LINKERD2_PROXY_DESTINATION_SVC_ADDR + value: linkerd-dst-headless.linkerd.svc.cluster.local:8086 + - name: LINKERD2_PROXY_DESTINATION_GET_NETWORKS + value: "10.0.0.0/8,172.16.0.0/12,192.168.0.0/16" + - name: LINKERD2_PROXY_DESTINATION_PROFILE_NETWORKS + value: "10.0.0.0/8,172.16.0.0/12,192.168.0.0/16" + - name: LINKERD2_PROXY_INBOUND_CONNECT_TIMEOUT + value: "100ms" + - name: LINKERD2_PROXY_OUTBOUND_CONNECT_TIMEOUT + value: "1000ms" + - name: LINKERD2_PROXY_CONTROL_LISTEN_ADDR + value: 0.0.0.0:4190 + - name: LINKERD2_PROXY_ADMIN_LISTEN_ADDR + value: 0.0.0.0:4191 + - name: LINKERD2_PROXY_OUTBOUND_LISTEN_ADDR + value: 127.0.0.1:4140 + - name: LINKERD2_PROXY_INBOUND_LISTEN_ADDR + value: 0.0.0.0:4143 + - name: LINKERD2_PROXY_DESTINATION_GET_SUFFIXES + value: svc.cluster.local. + - name: LINKERD2_PROXY_DESTINATION_PROFILE_SUFFIXES + value: svc.cluster.local. + - name: LINKERD2_PROXY_INBOUND_ACCEPT_KEEPALIVE + value: 10000ms + - name: LINKERD2_PROXY_OUTBOUND_CONNECT_KEEPALIVE + value: 10000ms + - name: _pod_ns + valueFrom: + fieldRef: + fieldPath: metadata.namespace + - name: _pod_nodeName + valueFrom: + fieldRef: + fieldPath: spec.nodeName + - name: LINKERD2_PROXY_DESTINATION_CONTEXT + value: | + {"ns":"$(_pod_ns)", "nodeName":"$(_pod_nodeName)"} + - name: LINKERD2_PROXY_IDENTITY_DIR + value: /var/run/linkerd/identity/end-entity + - name: LINKERD2_PROXY_IDENTITY_TRUST_ANCHORS + value: | + -----BEGIN CERTIFICATE----- + MIIBrzCCAVSgAwIBAgIBATAKBggqhkjOPQQDAjApMScwJQYDVQQDEx5pZGVudGl0 + eS5saW5rZXJkLmNsdXN0ZXIubG9jYWwwHhcNMjAwOTI1MTEwMzUxWhcNMjEwOTI1 + MTEwNDExWjApMScwJQYDVQQDEx5pZGVudGl0eS5saW5rZXJkLmNsdXN0ZXIubG9j + YWwwWTATBgcqhkjOPQIBBggqhkjOPQMBBwNCAATJ75wACER7swEDFhg4Wk1kuU2o + X/UyXaO7cPPTlyHZBqOP4OskRdAVyM8LUk1xmjRWlvWB8wZtcjPn9RzsZv4bo20w + azAOBgNVHQ8BAf8EBAMCAQYwHQYDVR0lBBYwFAYIKwYBBQUHAwEGCCsGAQUFBwMC + MA8GA1UdEwEB/wQFMAMBAf8wKQYDVR0RBCIwIIIeaWRlbnRpdHkubGlua2VyZC5j + bHVzdGVyLmxvY2FsMAoGCCqGSM49BAMCA0kAMEYCIQDIwBEszQRPzYI0k2vACFV3 + 2Eu+jgPzsFxd9QVOBT3KTwIhALDyUFnDR7+JCeuYPNNiBNNloVwY6Zbs2dh1i3w6 + Viat + -----END CERTIFICATE----- + - name: LINKERD2_PROXY_IDENTITY_TOKEN_FILE + value: /var/run/secrets/kubernetes.io/serviceaccount/token + - name: LINKERD2_PROXY_IDENTITY_SVC_ADDR + value: linkerd-identity-headless.linkerd.svc.cluster.local:8080 + - name: _pod_sa + valueFrom: + fieldRef: + fieldPath: spec.serviceAccountName + - name: _l5d_ns + value: linkerd + - name: _l5d_trustdomain + value: cluster.local + - name: LINKERD2_PROXY_IDENTITY_LOCAL_NAME + value: $(_pod_sa).$(_pod_ns).serviceaccount.identity.$(_l5d_ns).$(_l5d_trustdomain) + - name: LINKERD2_PROXY_IDENTITY_SVC_NAME + value: linkerd-identity.$(_l5d_ns).serviceaccount.identity.$(_l5d_ns).$(_l5d_trustdomain) + - name: LINKERD2_PROXY_DESTINATION_SVC_NAME + value: linkerd-destination.$(_l5d_ns).serviceaccount.identity.$(_l5d_ns).$(_l5d_trustdomain) + - name: LINKERD2_PROXY_TAP_SVC_NAME + value: linkerd-tap.$(_l5d_ns).serviceaccount.identity.$(_l5d_ns).$(_l5d_trustdomain) + image: ghcr.io/linkerd/proxy:edge-20.9.4 + imagePullPolicy: IfNotPresent + livenessProbe: + httpGet: + path: /live + port: 4191 + initialDelaySeconds: 10 + name: linkerd-proxy + ports: + - containerPort: 4143 + name: linkerd-proxy + - containerPort: 4191 + name: linkerd-admin + readinessProbe: + httpGet: + path: /ready + port: 4191 + initialDelaySeconds: 2 + resources: + securityContext: + allowPrivilegeEscalation: false + readOnlyRootFilesystem: true + runAsUser: 2102 + terminationMessagePolicy: FallbackToLogsOnError + volumeMounts: + - mountPath: /var/run/linkerd/identity/end-entity + name: linkerd-identity-end-entity + initContainers: + - args: + - --incoming-proxy-port + - "4143" + - --outgoing-proxy-port + - "4140" + - --proxy-uid + - "2102" + - --inbound-ports-to-ignore + - 4190,4191 + - --outbound-ports-to-ignore + - "443" + image: ghcr.io/linkerd/proxy-init:v1.3.6 + imagePullPolicy: IfNotPresent + name: linkerd-init + resources: + limits: + cpu: "100m" + memory: "50Mi" + requests: + cpu: "10m" + memory: "10Mi" + securityContext: + allowPrivilegeEscalation: false + capabilities: + add: + - NET_ADMIN + - NET_RAW + privileged: false + readOnlyRootFilesystem: true + runAsNonRoot: false + runAsUser: 0 + terminationMessagePolicy: FallbackToLogsOnError + volumeMounts: + - mountPath: /run + name: linkerd-proxy-init-xtables-lock + serviceAccountName: linkerd-grafana + volumes: + - emptyDir: {} + name: data + - configMap: + items: + - key: grafana.ini + path: grafana.ini + - key: datasources.yaml + path: provisioning/datasources/datasources.yaml + - key: dashboards.yaml + path: provisioning/dashboards/dashboards.yaml + name: linkerd-grafana-config + name: grafana-config + - emptyDir: {} + name: linkerd-proxy-init-xtables-lock + - emptyDir: + medium: Memory + name: linkerd-identity-end-entity +--- +### +### Prometheus RBAC +### +--- +kind: ClusterRole +apiVersion: rbac.authorization.k8s.io/v1 +metadata: + name: linkerd-linkerd-prometheus + labels: + linkerd.io/control-plane-component: prometheus + linkerd.io/control-plane-ns: linkerd +rules: +- apiGroups: [""] + resources: ["nodes", "nodes/proxy", "pods"] + verbs: ["get", "list", "watch"] +--- +kind: ClusterRoleBinding +apiVersion: rbac.authorization.k8s.io/v1 +metadata: + name: linkerd-linkerd-prometheus + labels: + linkerd.io/control-plane-component: prometheus + linkerd.io/control-plane-ns: linkerd +roleRef: + apiGroup: rbac.authorization.k8s.io + kind: ClusterRole + name: linkerd-linkerd-prometheus +subjects: +- kind: ServiceAccount + name: linkerd-prometheus + namespace: linkerd +--- +kind: ServiceAccount +apiVersion: v1 +metadata: + name: linkerd-prometheus + namespace: linkerd + labels: + linkerd.io/control-plane-component: prometheus + linkerd.io/control-plane-ns: linkerd +--- +### +### Prometheus +### +--- +kind: ConfigMap +apiVersion: v1 +metadata: + name: linkerd-prometheus-config + namespace: linkerd + labels: + linkerd.io/control-plane-component: prometheus + linkerd.io/control-plane-ns: linkerd + annotations: + linkerd.io/created-by: linkerd/cli edge-20.9.4 +data: + prometheus.yml: |- + global: + evaluation_interval: 10s + scrape_interval: 10s + scrape_timeout: 10s + + rule_files: + - /etc/prometheus/*_rules.yml + - /etc/prometheus/*_rules.yaml + + scrape_configs: + - job_name: 'prometheus' + static_configs: + - targets: ['localhost:9090'] + + - job_name: 'grafana' + kubernetes_sd_configs: + - role: pod + namespaces: + names: ['linkerd'] + relabel_configs: + - source_labels: + - __meta_kubernetes_pod_container_name + action: keep + regex: ^grafana$ + + # Required for: https://grafana.com/grafana/dashboards/315 + - job_name: 'kubernetes-nodes-cadvisor' + scheme: https + tls_config: + ca_file: /var/run/secrets/kubernetes.io/serviceaccount/ca.crt + insecure_skip_verify: true + bearer_token_file: /var/run/secrets/kubernetes.io/serviceaccount/token + kubernetes_sd_configs: + - role: node + relabel_configs: + - action: labelmap + regex: __meta_kubernetes_node_label_(.+) + - target_label: __address__ + replacement: kubernetes.default.svc:443 + - source_labels: [__meta_kubernetes_node_name] + regex: (.+) + target_label: __metrics_path__ + replacement: /api/v1/nodes/$1/proxy/metrics/cadvisor + metric_relabel_configs: + - source_labels: [__name__] + regex: '(container|machine)_(cpu|memory|network|fs)_(.+)' + action: keep + - source_labels: [__name__] + regex: 'container_memory_failures_total' # unneeded large metric + action: drop + + - job_name: 'linkerd-controller' + kubernetes_sd_configs: + - role: pod + namespaces: + names: ['linkerd'] + relabel_configs: + - source_labels: + - __meta_kubernetes_pod_label_linkerd_io_control_plane_component + - __meta_kubernetes_pod_container_port_name + action: keep + regex: (.*);admin-http$ + - source_labels: [__meta_kubernetes_pod_container_name] + action: replace + target_label: component + + - job_name: 'linkerd-service-mirror' + kubernetes_sd_configs: + - role: pod + relabel_configs: + - source_labels: + - __meta_kubernetes_pod_label_linkerd_io_control_plane_component + - __meta_kubernetes_pod_container_port_name + action: keep + regex: linkerd-service-mirror;admin-http$ + - source_labels: [__meta_kubernetes_pod_container_name] + action: replace + target_label: component + + - job_name: 'linkerd-proxy' + kubernetes_sd_configs: + - role: pod + relabel_configs: + - source_labels: + - __meta_kubernetes_pod_container_name + - __meta_kubernetes_pod_container_port_name + - __meta_kubernetes_pod_label_linkerd_io_control_plane_ns + action: keep + regex: ^linkerd-proxy;linkerd-admin;linkerd$ + - source_labels: [__meta_kubernetes_namespace] + action: replace + target_label: namespace + - source_labels: [__meta_kubernetes_pod_name] + action: replace + target_label: pod + # special case k8s' "job" label, to not interfere with prometheus' "job" + # label + # __meta_kubernetes_pod_label_linkerd_io_proxy_job=foo => + # k8s_job=foo + - source_labels: [__meta_kubernetes_pod_label_linkerd_io_proxy_job] + action: replace + target_label: k8s_job + # drop __meta_kubernetes_pod_label_linkerd_io_proxy_job + - action: labeldrop + regex: __meta_kubernetes_pod_label_linkerd_io_proxy_job + # __meta_kubernetes_pod_label_linkerd_io_proxy_deployment=foo => + # deployment=foo + - action: labelmap + regex: __meta_kubernetes_pod_label_linkerd_io_proxy_(.+) + # drop all labels that we just made copies of in the previous labelmap + - action: labeldrop + regex: __meta_kubernetes_pod_label_linkerd_io_proxy_(.+) + # __meta_kubernetes_pod_label_linkerd_io_foo=bar => + # foo=bar + - action: labelmap + regex: __meta_kubernetes_pod_label_linkerd_io_(.+) + # Copy all pod labels to tmp labels + - action: labelmap + regex: __meta_kubernetes_pod_label_(.+) + replacement: __tmp_pod_label_$1 + # Take `linkerd_io_` prefixed labels and copy them without the prefix + - action: labelmap + regex: __tmp_pod_label_linkerd_io_(.+) + replacement: __tmp_pod_label_$1 + # Drop the `linkerd_io_` originals + - action: labeldrop + regex: __tmp_pod_label_linkerd_io_(.+) + # Copy tmp labels into real labels + - action: labelmap + regex: __tmp_pod_label_(.+) +--- +kind: Service +apiVersion: v1 +metadata: + name: linkerd-prometheus + namespace: linkerd + labels: + linkerd.io/control-plane-component: prometheus + linkerd.io/control-plane-ns: linkerd + annotations: + linkerd.io/created-by: linkerd/cli edge-20.9.4 +spec: + type: ClusterIP + selector: + linkerd.io/control-plane-component: prometheus + ports: + - name: admin-http + port: 9090 + targetPort: 9090 +--- +apiVersion: apps/v1 +kind: Deployment +metadata: + annotations: + linkerd.io/created-by: linkerd/cli edge-20.9.4 + labels: + app.kubernetes.io/name: prometheus + app.kubernetes.io/part-of: Linkerd + app.kubernetes.io/version: edge-20.9.4 + linkerd.io/control-plane-component: prometheus + linkerd.io/control-plane-ns: linkerd + name: linkerd-prometheus + namespace: linkerd +spec: + replicas: 1 + selector: + matchLabels: + linkerd.io/control-plane-component: prometheus + linkerd.io/control-plane-ns: linkerd + linkerd.io/proxy-deployment: linkerd-prometheus + template: + metadata: + annotations: + linkerd.io/created-by: linkerd/cli edge-20.9.4 + linkerd.io/identity-mode: default + linkerd.io/proxy-version: edge-20.9.4 + labels: + linkerd.io/control-plane-component: prometheus + linkerd.io/control-plane-ns: linkerd + linkerd.io/workload-ns: linkerd + linkerd.io/proxy-deployment: linkerd-prometheus + spec: + nodeSelector: + beta.kubernetes.io/os: linux + securityContext: + fsGroup: 65534 + containers: + - args: + - --config.file=/etc/prometheus/prometheus.yml + - --log.level=info + - --storage.tsdb.path=/data + - --storage.tsdb.retention.time=6h + image: prom/prometheus:v2.19.3 + imagePullPolicy: IfNotPresent + livenessProbe: + httpGet: + path: /-/healthy + port: 9090 + initialDelaySeconds: 30 + timeoutSeconds: 30 + name: prometheus + ports: + - containerPort: 9090 + name: admin-http + readinessProbe: + httpGet: + path: /-/ready + port: 9090 + initialDelaySeconds: 30 + timeoutSeconds: 30 + securityContext: + runAsNonRoot: true + runAsUser: 65534 + runAsGroup: 65534 + volumeMounts: + - mountPath: /data + name: data + - mountPath: /etc/prometheus/prometheus.yml + name: prometheus-config + subPath: prometheus.yml + readOnly: true + - env: + - name: LINKERD2_PROXY_LOG + value: warn,linkerd=info + - name: LINKERD2_PROXY_LOG_FORMAT + value: plain + - name: LINKERD2_PROXY_DESTINATION_SVC_ADDR + value: linkerd-dst-headless.linkerd.svc.cluster.local:8086 + - name: LINKERD2_PROXY_DESTINATION_GET_NETWORKS + value: "10.0.0.0/8,172.16.0.0/12,192.168.0.0/16" + - name: LINKERD2_PROXY_DESTINATION_PROFILE_NETWORKS + value: "10.0.0.0/8,172.16.0.0/12,192.168.0.0/16" + - name: LINKERD2_PROXY_INBOUND_CONNECT_TIMEOUT + value: "100ms" + - name: LINKERD2_PROXY_OUTBOUND_CONNECT_TIMEOUT + value: "1000ms" + - name: LINKERD2_PROXY_CONTROL_LISTEN_ADDR + value: 0.0.0.0:4190 + - name: LINKERD2_PROXY_ADMIN_LISTEN_ADDR + value: 0.0.0.0:4191 + - name: LINKERD2_PROXY_OUTBOUND_LISTEN_ADDR + value: 127.0.0.1:4140 + - name: LINKERD2_PROXY_INBOUND_LISTEN_ADDR + value: 0.0.0.0:4143 + - name: LINKERD2_PROXY_DESTINATION_GET_SUFFIXES + value: svc.cluster.local. + - name: LINKERD2_PROXY_DESTINATION_PROFILE_SUFFIXES + value: svc.cluster.local. + - name: LINKERD2_PROXY_INBOUND_ACCEPT_KEEPALIVE + value: 10000ms + - name: LINKERD2_PROXY_OUTBOUND_CONNECT_KEEPALIVE + value: 10000ms + - name: _pod_ns + valueFrom: + fieldRef: + fieldPath: metadata.namespace + - name: _pod_nodeName + valueFrom: + fieldRef: + fieldPath: spec.nodeName + - name: LINKERD2_PROXY_DESTINATION_CONTEXT + value: | + {"ns":"$(_pod_ns)", "nodeName":"$(_pod_nodeName)"} + - name: LINKERD2_PROXY_OUTBOUND_ROUTER_CAPACITY + value: "10000" + - name: LINKERD2_PROXY_IDENTITY_DIR + value: /var/run/linkerd/identity/end-entity + - name: LINKERD2_PROXY_IDENTITY_TRUST_ANCHORS + value: | + -----BEGIN CERTIFICATE----- + MIIBrzCCAVSgAwIBAgIBATAKBggqhkjOPQQDAjApMScwJQYDVQQDEx5pZGVudGl0 + eS5saW5rZXJkLmNsdXN0ZXIubG9jYWwwHhcNMjAwOTI1MTEwMzUxWhcNMjEwOTI1 + MTEwNDExWjApMScwJQYDVQQDEx5pZGVudGl0eS5saW5rZXJkLmNsdXN0ZXIubG9j + YWwwWTATBgcqhkjOPQIBBggqhkjOPQMBBwNCAATJ75wACER7swEDFhg4Wk1kuU2o + X/UyXaO7cPPTlyHZBqOP4OskRdAVyM8LUk1xmjRWlvWB8wZtcjPn9RzsZv4bo20w + azAOBgNVHQ8BAf8EBAMCAQYwHQYDVR0lBBYwFAYIKwYBBQUHAwEGCCsGAQUFBwMC + MA8GA1UdEwEB/wQFMAMBAf8wKQYDVR0RBCIwIIIeaWRlbnRpdHkubGlua2VyZC5j + bHVzdGVyLmxvY2FsMAoGCCqGSM49BAMCA0kAMEYCIQDIwBEszQRPzYI0k2vACFV3 + 2Eu+jgPzsFxd9QVOBT3KTwIhALDyUFnDR7+JCeuYPNNiBNNloVwY6Zbs2dh1i3w6 + Viat + -----END CERTIFICATE----- + - name: LINKERD2_PROXY_IDENTITY_TOKEN_FILE + value: /var/run/secrets/kubernetes.io/serviceaccount/token + - name: LINKERD2_PROXY_IDENTITY_SVC_ADDR + value: linkerd-identity-headless.linkerd.svc.cluster.local:8080 + - name: _pod_sa + valueFrom: + fieldRef: + fieldPath: spec.serviceAccountName + - name: _l5d_ns + value: linkerd + - name: _l5d_trustdomain + value: cluster.local + - name: LINKERD2_PROXY_IDENTITY_LOCAL_NAME + value: $(_pod_sa).$(_pod_ns).serviceaccount.identity.$(_l5d_ns).$(_l5d_trustdomain) + - name: LINKERD2_PROXY_IDENTITY_SVC_NAME + value: linkerd-identity.$(_l5d_ns).serviceaccount.identity.$(_l5d_ns).$(_l5d_trustdomain) + - name: LINKERD2_PROXY_DESTINATION_SVC_NAME + value: linkerd-destination.$(_l5d_ns).serviceaccount.identity.$(_l5d_ns).$(_l5d_trustdomain) + - name: LINKERD2_PROXY_TAP_SVC_NAME + value: linkerd-tap.$(_l5d_ns).serviceaccount.identity.$(_l5d_ns).$(_l5d_trustdomain) + image: ghcr.io/linkerd/proxy:edge-20.9.4 + imagePullPolicy: IfNotPresent + livenessProbe: + httpGet: + path: /live + port: 4191 + initialDelaySeconds: 10 + name: linkerd-proxy + ports: + - containerPort: 4143 + name: linkerd-proxy + - containerPort: 4191 + name: linkerd-admin + readinessProbe: + httpGet: + path: /ready + port: 4191 + initialDelaySeconds: 2 + resources: + securityContext: + allowPrivilegeEscalation: false + readOnlyRootFilesystem: true + runAsUser: 2102 + terminationMessagePolicy: FallbackToLogsOnError + volumeMounts: + - mountPath: /var/run/linkerd/identity/end-entity + name: linkerd-identity-end-entity + initContainers: + - args: + - --incoming-proxy-port + - "4143" + - --outgoing-proxy-port + - "4140" + - --proxy-uid + - "2102" + - --inbound-ports-to-ignore + - 4190,4191 + - --outbound-ports-to-ignore + - "443" + image: ghcr.io/linkerd/proxy-init:v1.3.6 + imagePullPolicy: IfNotPresent + name: linkerd-init + resources: + limits: + cpu: "100m" + memory: "50Mi" + requests: + cpu: "10m" + memory: "10Mi" + securityContext: + allowPrivilegeEscalation: false + capabilities: + add: + - NET_ADMIN + - NET_RAW + privileged: false + readOnlyRootFilesystem: true + runAsNonRoot: false + runAsUser: 0 + terminationMessagePolicy: FallbackToLogsOnError + volumeMounts: + - mountPath: /run + name: linkerd-proxy-init-xtables-lock + serviceAccountName: linkerd-prometheus + volumes: + - name: data + emptyDir: {} + - configMap: + name: linkerd-prometheus-config + name: prometheus-config + - emptyDir: {} + name: linkerd-proxy-init-xtables-lock + - emptyDir: + medium: Memory + name: linkerd-identity-end-entity