--- ### ### Linkerd Namespace ### --- kind: Namespace apiVersion: v1 metadata: name: linkerd annotations: linkerd.io/inject: disabled labels: linkerd.io/is-control-plane: "true" config.linkerd.io/admission-webhooks: disabled linkerd.io/control-plane-ns: linkerd --- ### ### Identity Controller Service RBAC ### --- kind: ClusterRole apiVersion: rbac.authorization.k8s.io/v1 metadata: name: linkerd-linkerd-identity labels: linkerd.io/control-plane-component: identity linkerd.io/control-plane-ns: linkerd rules: - apiGroups: ["authentication.k8s.io"] resources: ["tokenreviews"] verbs: ["create"] - apiGroups: ["apps"] resources: ["deployments"] verbs: ["get"] - apiGroups: [""] resources: ["events"] verbs: ["create", "patch"] --- kind: ClusterRoleBinding apiVersion: rbac.authorization.k8s.io/v1 metadata: name: linkerd-linkerd-identity labels: linkerd.io/control-plane-component: identity linkerd.io/control-plane-ns: linkerd roleRef: apiGroup: rbac.authorization.k8s.io kind: ClusterRole name: linkerd-linkerd-identity subjects: - kind: ServiceAccount name: linkerd-identity namespace: linkerd --- kind: ServiceAccount apiVersion: v1 metadata: name: linkerd-identity namespace: linkerd labels: linkerd.io/control-plane-component: identity linkerd.io/control-plane-ns: linkerd --- ### ### Controller RBAC ### --- kind: ClusterRole apiVersion: rbac.authorization.k8s.io/v1 metadata: name: linkerd-linkerd-controller labels: linkerd.io/control-plane-component: controller linkerd.io/control-plane-ns: linkerd rules: - apiGroups: ["extensions", "apps"] resources: ["daemonsets", "deployments", "replicasets", "statefulsets"] verbs: ["list", "get", "watch"] - apiGroups: ["extensions", "batch"] resources: ["cronjobs", "jobs"] verbs: ["list" , "get", "watch"] - apiGroups: [""] resources: ["pods", "endpoints", "services", "replicationcontrollers", "namespaces"] verbs: ["list", "get", "watch"] - apiGroups: ["linkerd.io"] resources: ["serviceprofiles"] verbs: ["list", "get", "watch"] - apiGroups: ["split.smi-spec.io"] resources: ["trafficsplits"] verbs: ["list", "get", "watch"] --- kind: ClusterRoleBinding apiVersion: rbac.authorization.k8s.io/v1 metadata: name: linkerd-linkerd-controller labels: linkerd.io/control-plane-component: controller linkerd.io/control-plane-ns: linkerd roleRef: apiGroup: rbac.authorization.k8s.io kind: ClusterRole name: linkerd-linkerd-controller subjects: - kind: ServiceAccount name: linkerd-controller namespace: linkerd --- kind: ServiceAccount apiVersion: v1 metadata: name: linkerd-controller namespace: linkerd labels: linkerd.io/control-plane-component: controller linkerd.io/control-plane-ns: linkerd --- ### ### Destination Controller Service ### --- kind: ClusterRole apiVersion: rbac.authorization.k8s.io/v1 metadata: name: linkerd-linkerd-destination labels: linkerd.io/control-plane-component: destination linkerd.io/control-plane-ns: linkerd rules: - apiGroups: ["apps"] resources: ["replicasets"] verbs: ["list", "get", "watch"] - apiGroups: ["batch"] resources: ["jobs"] verbs: ["list", "get", "watch"] - apiGroups: [""] resources: ["pods", "endpoints", "services", "nodes"] verbs: ["list", "get", "watch"] - apiGroups: ["linkerd.io"] resources: ["serviceprofiles"] verbs: ["list", "get", "watch"] - apiGroups: ["split.smi-spec.io"] resources: ["trafficsplits"] verbs: ["list", "get", "watch"] --- kind: ClusterRoleBinding apiVersion: rbac.authorization.k8s.io/v1 metadata: name: linkerd-linkerd-destination labels: linkerd.io/control-plane-component: destination linkerd.io/control-plane-ns: linkerd roleRef: apiGroup: rbac.authorization.k8s.io kind: ClusterRole name: linkerd-linkerd-destination subjects: - kind: ServiceAccount name: linkerd-destination namespace: linkerd --- kind: ServiceAccount apiVersion: v1 metadata: name: linkerd-destination namespace: linkerd labels: linkerd.io/control-plane-component: destination linkerd.io/control-plane-ns: linkerd --- ### ### Heartbeat RBAC ### --- apiVersion: rbac.authorization.k8s.io/v1 kind: Role metadata: name: linkerd-heartbeat namespace: linkerd labels: linkerd.io/control-plane-ns: linkerd rules: - apiGroups: [""] resources: ["configmaps"] verbs: ["get"] resourceNames: ["linkerd-config"] --- apiVersion: rbac.authorization.k8s.io/v1 kind: RoleBinding metadata: name: linkerd-heartbeat namespace: linkerd labels: linkerd.io/control-plane-ns: linkerd roleRef: kind: Role name: linkerd-heartbeat apiGroup: rbac.authorization.k8s.io subjects: - kind: ServiceAccount name: linkerd-heartbeat namespace: linkerd --- kind: ServiceAccount apiVersion: v1 metadata: name: linkerd-heartbeat namespace: linkerd labels: linkerd.io/control-plane-component: heartbeat linkerd.io/control-plane-ns: linkerd --- ### ### Web RBAC ### --- apiVersion: rbac.authorization.k8s.io/v1 kind: Role metadata: name: linkerd-web namespace: linkerd labels: linkerd.io/control-plane-component: web linkerd.io/control-plane-ns: linkerd rules: - apiGroups: [""] resources: ["configmaps"] verbs: ["get"] resourceNames: ["linkerd-config"] - apiGroups: [""] resources: ["namespaces", "configmaps"] verbs: ["get"] - apiGroups: [""] resources: ["serviceaccounts", "pods"] verbs: ["list"] - apiGroups: ["apps"] resources: ["replicasets"] verbs: ["list"] --- apiVersion: rbac.authorization.k8s.io/v1 kind: RoleBinding metadata: name: linkerd-web namespace: linkerd labels: linkerd.io/control-plane-component: web linkerd.io/control-plane-ns: linkerd roleRef: kind: Role name: linkerd-web apiGroup: rbac.authorization.k8s.io subjects: - kind: ServiceAccount name: linkerd-web namespace: linkerd --- apiVersion: rbac.authorization.k8s.io/v1 kind: ClusterRole metadata: name: linkerd-linkerd-web-check labels: linkerd.io/control-plane-component: web linkerd.io/control-plane-ns: linkerd rules: - apiGroups: ["rbac.authorization.k8s.io"] resources: ["clusterroles", "clusterrolebindings"] verbs: ["list"] - apiGroups: ["apiextensions.k8s.io"] resources: ["customresourcedefinitions"] verbs: ["list"] - apiGroups: ["admissionregistration.k8s.io"] resources: ["mutatingwebhookconfigurations", "validatingwebhookconfigurations"] verbs: ["list"] - apiGroups: ["policy"] resources: ["podsecuritypolicies"] verbs: ["list"] - apiGroups: ["linkerd.io"] resources: ["serviceprofiles"] verbs: ["list"] - apiGroups: ["apiregistration.k8s.io"] resources: ["apiservices"] verbs: ["get"] --- apiVersion: rbac.authorization.k8s.io/v1 kind: ClusterRoleBinding metadata: name: linkerd-linkerd-web-check labels: linkerd.io/control-plane-component: web linkerd.io/control-plane-ns: linkerd roleRef: kind: ClusterRole name: linkerd-linkerd-web-check apiGroup: rbac.authorization.k8s.io subjects: - kind: ServiceAccount name: linkerd-web namespace: linkerd --- kind: ClusterRoleBinding apiVersion: rbac.authorization.k8s.io/v1 metadata: name: linkerd-linkerd-web-admin labels: linkerd.io/control-plane-component: web linkerd.io/control-plane-ns: linkerd roleRef: apiGroup: rbac.authorization.k8s.io kind: ClusterRole name: linkerd-linkerd-tap-admin subjects: - kind: ServiceAccount name: linkerd-web namespace: linkerd --- kind: ServiceAccount apiVersion: v1 metadata: name: linkerd-web namespace: linkerd labels: linkerd.io/control-plane-component: web linkerd.io/control-plane-ns: linkerd --- ### ### Service Profile CRD ### --- apiVersion: apiextensions.k8s.io/v1beta1 kind: CustomResourceDefinition metadata: name: serviceprofiles.linkerd.io annotations: linkerd.io/created-by: linkerd/cli edge-20.10.1 labels: linkerd.io/control-plane-ns: linkerd spec: group: linkerd.io versions: - name: v1alpha1 served: true storage: false - name: v1alpha2 served: true storage: true scope: Namespaced names: plural: serviceprofiles singular: serviceprofile kind: ServiceProfile shortNames: - sp --- ### ### TrafficSplit CRD ### Copied from https://github.com/deislabs/smi-sdk-go/blob/cea7e1e9372304bbb6c74a3f6ca788d9eaa9cc58/crds/split.yaml ### --- apiVersion: apiextensions.k8s.io/v1beta1 kind: CustomResourceDefinition metadata: name: trafficsplits.split.smi-spec.io annotations: linkerd.io/created-by: linkerd/cli edge-20.10.1 labels: linkerd.io/control-plane-ns: linkerd spec: group: split.smi-spec.io version: v1alpha1 scope: Namespaced names: kind: TrafficSplit shortNames: - ts plural: trafficsplits singular: trafficsplit additionalPrinterColumns: - name: Service type: string description: The apex service of this split. JSONPath: .spec.service --- ### ### Proxy Injector RBAC ### --- kind: ClusterRole apiVersion: rbac.authorization.k8s.io/v1 metadata: name: linkerd-linkerd-proxy-injector labels: linkerd.io/control-plane-component: proxy-injector linkerd.io/control-plane-ns: linkerd rules: - apiGroups: [""] resources: ["events"] verbs: ["create", "patch"] - apiGroups: [""] resources: ["namespaces", "replicationcontrollers"] verbs: ["list", "get", "watch"] - apiGroups: [""] resources: ["pods"] verbs: ["list", "watch"] - apiGroups: ["extensions", "apps"] resources: ["deployments", "replicasets", "daemonsets", "statefulsets"] verbs: ["list", "get", "watch"] - apiGroups: ["extensions", "batch"] resources: ["cronjobs", "jobs"] verbs: ["list", "get", "watch"] --- kind: ClusterRoleBinding apiVersion: rbac.authorization.k8s.io/v1 metadata: name: linkerd-linkerd-proxy-injector labels: linkerd.io/control-plane-component: proxy-injector linkerd.io/control-plane-ns: linkerd subjects: - kind: ServiceAccount name: linkerd-proxy-injector namespace: linkerd apiGroup: "" roleRef: kind: ClusterRole name: linkerd-linkerd-proxy-injector apiGroup: rbac.authorization.k8s.io --- kind: ServiceAccount apiVersion: v1 metadata: name: linkerd-proxy-injector namespace: linkerd labels: linkerd.io/control-plane-component: proxy-injector linkerd.io/control-plane-ns: linkerd --- kind: Secret apiVersion: v1 metadata: name: linkerd-proxy-injector-k8s-tls namespace: linkerd labels: linkerd.io/control-plane-component: proxy-injector linkerd.io/control-plane-ns: linkerd annotations: linkerd.io/created-by: linkerd/cli edge-20.10.1 type: kubernetes.io/tls data: tls.crt: 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 tls.key: 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 --- apiVersion: admissionregistration.k8s.io/v1beta1 kind: MutatingWebhookConfiguration metadata: name: linkerd-proxy-injector-webhook-config labels: linkerd.io/control-plane-component: proxy-injector linkerd.io/control-plane-ns: linkerd webhooks: - name: linkerd-proxy-injector.linkerd.io namespaceSelector: matchExpressions: - key: config.linkerd.io/admission-webhooks operator: NotIn values: - disabled clientConfig: service: name: linkerd-proxy-injector namespace: linkerd path: "/" caBundle: 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 failurePolicy: Ignore rules: - operations: [ "CREATE" ] apiGroups: [""] apiVersions: ["v1"] resources: ["pods"] sideEffects: None --- ### ### Service Profile Validator RBAC ### --- kind: ClusterRole apiVersion: rbac.authorization.k8s.io/v1 metadata: name: linkerd-linkerd-sp-validator labels: linkerd.io/control-plane-component: sp-validator linkerd.io/control-plane-ns: linkerd rules: - apiGroups: [""] resources: ["pods"] verbs: ["list"] --- kind: ClusterRoleBinding apiVersion: rbac.authorization.k8s.io/v1 metadata: name: linkerd-linkerd-sp-validator labels: linkerd.io/control-plane-component: sp-validator linkerd.io/control-plane-ns: linkerd subjects: - kind: ServiceAccount name: linkerd-sp-validator namespace: linkerd apiGroup: "" roleRef: kind: ClusterRole name: linkerd-linkerd-sp-validator apiGroup: rbac.authorization.k8s.io --- kind: ServiceAccount apiVersion: v1 metadata: name: linkerd-sp-validator namespace: linkerd labels: linkerd.io/control-plane-component: sp-validator linkerd.io/control-plane-ns: linkerd --- kind: Secret apiVersion: v1 metadata: name: linkerd-sp-validator-k8s-tls namespace: linkerd labels: linkerd.io/control-plane-component: sp-validator linkerd.io/control-plane-ns: linkerd annotations: linkerd.io/created-by: linkerd/cli edge-20.10.1 type: kubernetes.io/tls data: tls.crt: LS0tLS1CRUdJTiBDRVJUSUZJQ0FURS0tLS0tCk1JSURUVENDQWpXZ0F3SUJBZ0lSQUoxcW5qOGluaUNuVm1oMUtpdVZRZTh3RFFZSktvWklodmNOQVFFTEJRQXcKS3pFcE1DY0dBMVVFQXhNZ2JHbHVhMlZ5WkMxemNDMTJZV3hwWkdGMGIzSXViR2x1YTJWeVpDNXpkbU13SGhjTgpNakF4TURBME1ESTBPRFV4V2hjTk1qRXhNREEwTURJME9EVXhXakFyTVNrd0p3WURWUVFERXlCc2FXNXJaWEprCkxYTndMWFpoYkdsa1lYUnZjaTVzYVc1clpYSmtMbk4yWXpDQ0FTSXdEUVlKS29aSWh2Y05BUUVCQlFBRGdnRVAKQURDQ0FRb0NnZ0VCQUxMUGpCbk1qdTJuelJ2UDY0TkYySVl4a1RWQ2dPNzltV3dHcS9qM2FsUktzYXdrZUk0QQpIZmFFdGNWSTJBZ1pJenNNNGU1aEs5SUhPWHNxanUrVGJPaEdmK0NHYXBmNWE5b241WmRJQ21lYmkrVExOeW5xCnowVlI0Z2drM3hSWHpOSU1rSVNGV3NTUlA3bFF4ZGZRSXUrd3lva3RaVlNVTTRjM24zbVhsTThKaXkrMDNSNGQKWVNNL2w3eWw0WVdINjFUaEhxcnB2R3dKU2FmZ0lCT2l2VkM5Uk95Tlg4NDdRT3JhTS8yOWJablVRcWZCWlJYbQpRejcrSlVsWU0zM2M2NDFSMUcvMllqd2Z1dm9nNHFyc0tKdzRScDdScU5qZEJ4aGJoMEtyNG9DaDZxV3dGN1BTCjVETThQUDdTclRQSmk2ZGFDWVVVQWQ2MnhNa2FBRlJWZkxFQ0F3RUFBYU5zTUdvd0RnWURWUjBQQVFIL0JBUUQKQWdXZ01CMEdBMVVkSlFRV01CUUdDQ3NHQVFVRkJ3TUJCZ2dyQmdFRkJRY0RBakFNQmdOVkhSTUJBZjhFQWpBQQpNQ3NHQTFVZEVRUWtNQ0tDSUd4cGJtdGxjbVF0YzNBdGRtRnNhV1JoZEc5eUxteHBibXRsY21RdWMzWmpNQTBHCkNTcUdTSWIzRFFFQkN3VUFBNElCQVFCTmkxTnl0Rk5ndWJHNWhhVDNmalZTU1AxSzAyWFJBa2kyb2taQU9tb1oKbVQ4ZXVjc0ZwVDNJbjZvN3EwQlZBMkpoVWN2VC91VURYSW1sTUdZZmZUWk5wemZWWHZoYm11ZXZSc3Q5VFBMdwo1OGpGYi9kbzNiNmZMVkgxMmc3eDdLelNlcVIrSGlYZjFvM0I0YmNHRnNKSkpDTUJMODVhSzBnRDVvSjdKODFFCjlzM0NYZU1DdHFWb2k3YmNzTWJ4NU1DZVFzSWdGc2dPUXg3dXhrUk9VVUpHbFpiVmdPRlB2UGF6aWZ4VUFHNVIKZ0JhMHhmNmIvSTZHb29GUU5PVTJDUHJvS09oZ3hEM1p6ejN5RnQ1T1lza2VxSlV5MFA3YXVpVXJQWDQ2SXdKaQovZG9FdVVmOFFLOWppUlRGVU13WllvaUxzZDhvMjZmNVRQL0ZQTExEcUxxawotLS0tLUVORCBDRVJUSUZJQ0FURS0tLS0t tls.key: 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 --- apiVersion: admissionregistration.k8s.io/v1beta1 kind: ValidatingWebhookConfiguration metadata: name: linkerd-sp-validator-webhook-config labels: linkerd.io/control-plane-component: sp-validator linkerd.io/control-plane-ns: linkerd webhooks: - name: linkerd-sp-validator.linkerd.io namespaceSelector: matchExpressions: - key: config.linkerd.io/admission-webhooks operator: NotIn values: - disabled clientConfig: service: name: linkerd-sp-validator namespace: linkerd path: "/" caBundle: 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 failurePolicy: Ignore rules: - operations: [ "CREATE" , "UPDATE" ] apiGroups: ["linkerd.io"] apiVersions: ["v1alpha1", "v1alpha2"] resources: ["serviceprofiles"] sideEffects: None --- ### ### Tap RBAC ### --- kind: ClusterRole apiVersion: rbac.authorization.k8s.io/v1 metadata: name: linkerd-linkerd-tap labels: linkerd.io/control-plane-component: tap linkerd.io/control-plane-ns: linkerd rules: - apiGroups: [""] resources: ["pods", "services", "replicationcontrollers", "namespaces", "nodes"] verbs: ["list", "get", "watch"] - apiGroups: ["extensions", "apps"] resources: ["daemonsets", "deployments", "replicasets", "statefulsets"] verbs: ["list", "get", "watch"] - apiGroups: ["extensions", "batch"] resources: ["cronjobs", "jobs"] verbs: ["list" , "get", "watch"] --- kind: ClusterRole apiVersion: rbac.authorization.k8s.io/v1 metadata: name: linkerd-linkerd-tap-admin labels: linkerd.io/control-plane-component: tap linkerd.io/control-plane-ns: linkerd rules: - apiGroups: ["tap.linkerd.io"] resources: ["*"] verbs: ["watch"] --- kind: ClusterRoleBinding apiVersion: rbac.authorization.k8s.io/v1 metadata: name: linkerd-linkerd-tap labels: linkerd.io/control-plane-component: tap linkerd.io/control-plane-ns: linkerd roleRef: apiGroup: rbac.authorization.k8s.io kind: ClusterRole name: linkerd-linkerd-tap subjects: - kind: ServiceAccount name: linkerd-tap namespace: linkerd --- apiVersion: rbac.authorization.k8s.io/v1 kind: ClusterRoleBinding metadata: name: linkerd-linkerd-tap-auth-delegator labels: linkerd.io/control-plane-component: tap linkerd.io/control-plane-ns: linkerd roleRef: apiGroup: rbac.authorization.k8s.io kind: ClusterRole name: system:auth-delegator subjects: - kind: ServiceAccount name: linkerd-tap namespace: linkerd --- kind: ServiceAccount apiVersion: v1 metadata: name: linkerd-tap namespace: linkerd labels: linkerd.io/control-plane-component: tap linkerd.io/control-plane-ns: linkerd --- apiVersion: rbac.authorization.k8s.io/v1 kind: RoleBinding metadata: name: linkerd-linkerd-tap-auth-reader namespace: kube-system labels: linkerd.io/control-plane-component: tap linkerd.io/control-plane-ns: linkerd roleRef: apiGroup: rbac.authorization.k8s.io kind: Role name: extension-apiserver-authentication-reader subjects: - kind: ServiceAccount name: linkerd-tap namespace: linkerd --- kind: Secret apiVersion: v1 metadata: name: linkerd-tap-k8s-tls namespace: linkerd labels: linkerd.io/control-plane-component: tap linkerd.io/control-plane-ns: linkerd annotations: linkerd.io/created-by: linkerd/cli edge-20.10.1 type: kubernetes.io/tls data: tls.crt: LS0tLS1CRUdJTiBDRVJUSUZJQ0FURS0tLS0tCk1JSURNVENDQWhtZ0F3SUJBZ0lRRlVBRVBtVStUbW1nK3N2T3MxMkd6ekFOQmdrcWhraUc5dzBCQVFzRkFEQWkKTVNBd0hnWURWUVFERXhkc2FXNXJaWEprTFhSaGNDNXNhVzVyWlhKa0xuTjJZekFlRncweU1ERXdNRFF3TWpRNApOVEJhRncweU1URXdNRFF3TWpRNE5UQmFNQ0l4SURBZUJnTlZCQU1URjJ4cGJtdGxjbVF0ZEdGd0xteHBibXRsCmNtUXVjM1pqTUlJQklqQU5CZ2txaGtpRzl3MEJBUUVGQUFPQ0FROEFNSUlCQ2dLQ0FRRUF6cHUrd2czU3Z4QUYKdHA0MHlTbVg4YmVycjBIRWQrK2tPMVJEUzZNeURQRExqci9zSlo1RWV5Mm9KNUd6emJyK2k3a2hzNTlxdEsxYQo1dnBhV0xTVHY1T01MSkplQXVadXFmZFZOYklwejdERHJBblFjL0dRc1JkSm1yTXMzU3h4V0lzbU50bzh4RjFNCjNxZkFVUW5JY05jMGxjVloxZk5VcVFvYVZJRUN5bnpQRUE4THlSS0d4TXZpL0tNVHhJYTlLMlpLZEFrZndoRVkKRDVTZnFGR09mVGJBM2N2UGRKayt0ZjJwaWZHNEVsVVlzTWh4MHE5VlkvUUFYZFA5RzZtYmQ0SUhMbGtOWHVaVQpPaCtwektSTE54ZFB0dm44ZkJrbkdtcWZORHhldlBhUERveXBGdThMNmdNdXRaeGd5Yjg5K1lhM0h5bEdNREhsCnR3dGRCZVgySFFJREFRQUJvMk13WVRBT0JnTlZIUThCQWY4RUJBTUNCYUF3SFFZRFZSMGxCQll3RkFZSUt3WUIKQlFVSEF3RUdDQ3NHQVFVRkJ3TUNNQXdHQTFVZEV3RUIvd1FDTUFBd0lnWURWUjBSQkJzd0dZSVhiR2x1YTJWeQpaQzEwWVhBdWJHbHVhMlZ5WkM1emRtTXdEUVlKS29aSWh2Y05BUUVMQlFBRGdnRUJBS3BaSG5vNytvckpERVcxCkg1clp3ZWFycG4yYUNQd1NETFhJblBiL3pIVSsyR2h2U1VuZ05OZHRJL3RuTmVCcEZwVCt6OG5PSUxyS3dicGkKRFdWeGJPY01VMUpRTmhzYnlpUkZNYkt3U1FUUXdkcnRCN2hUdDA0ZDYzVVJlTFdHUk8ySVJwRnRHTGZzcWt3ZQo1RGQvYldnRTA3QTloeVNmV3BIUWVTd29JWlhMaEJTbUc3bWxRLzM0M3p3ZGJ3bzVNbExxVG5NTTh0RGtINk9mCkpQWG91Z2ZwaWNjVVdJMUFlYVFEVTgvaitHSXJGVVlnbVJIMkEvVmUrdVhRd3ZmV0wyWUNIc09vQUpQTGN3TTMKbkhoNkFXQjB1NE0vOGRzaHVEZW1nYWRYU3NMR2pEcFlmNTh1Q2V1RkxIK3RQTEJxNmVidk5Cd0QzazNxRWV3VwpvZmoxYW9RPQotLS0tLUVORCBDRVJUSUZJQ0FURS0tLS0t tls.key: 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 --- apiVersion: apiregistration.k8s.io/v1 kind: APIService metadata: name: v1alpha1.tap.linkerd.io labels: linkerd.io/control-plane-component: tap linkerd.io/control-plane-ns: linkerd spec: group: tap.linkerd.io version: v1alpha1 groupPriorityMinimum: 1000 versionPriority: 100 service: name: linkerd-tap namespace: linkerd caBundle: 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 --- ### ### Control Plane PSP ### --- apiVersion: policy/v1beta1 kind: PodSecurityPolicy metadata: name: linkerd-linkerd-control-plane labels: linkerd.io/control-plane-ns: linkerd spec: allowPrivilegeEscalation: false readOnlyRootFilesystem: true allowedCapabilities: - NET_ADMIN - NET_RAW requiredDropCapabilities: - ALL hostNetwork: false hostIPC: false hostPID: false seLinux: rule: RunAsAny runAsUser: rule: RunAsAny supplementalGroups: rule: MustRunAs ranges: - min: 1 max: 65535 fsGroup: rule: MustRunAs ranges: - min: 1 max: 65535 volumes: - configMap - emptyDir - secret - projected - downwardAPI - persistentVolumeClaim --- apiVersion: rbac.authorization.k8s.io/v1 kind: Role metadata: name: linkerd-psp namespace: linkerd labels: linkerd.io/control-plane-ns: linkerd rules: - apiGroups: ['policy', 'extensions'] resources: ['podsecuritypolicies'] verbs: ['use'] resourceNames: - linkerd-linkerd-control-plane --- apiVersion: rbac.authorization.k8s.io/v1 kind: RoleBinding metadata: name: linkerd-psp namespace: linkerd labels: linkerd.io/control-plane-ns: linkerd roleRef: kind: Role name: linkerd-psp apiGroup: rbac.authorization.k8s.io subjects: - kind: ServiceAccount name: linkerd-controller namespace: linkerd - kind: ServiceAccount name: linkerd-destination namespace: linkerd - kind: ServiceAccount name: linkerd-grafana namespace: linkerd - kind: ServiceAccount name: linkerd-heartbeat namespace: linkerd - kind: ServiceAccount name: linkerd-identity namespace: linkerd - kind: ServiceAccount name: linkerd-prometheus namespace: linkerd - kind: ServiceAccount name: linkerd-proxy-injector namespace: linkerd - kind: ServiceAccount name: linkerd-sp-validator namespace: linkerd - kind: ServiceAccount name: linkerd-tap namespace: linkerd - kind: ServiceAccount name: linkerd-web namespace: linkerd --- kind: ConfigMap apiVersion: v1 metadata: name: linkerd-config namespace: linkerd labels: linkerd.io/control-plane-component: controller linkerd.io/control-plane-ns: linkerd annotations: linkerd.io/created-by: linkerd/cli edge-20.10.1 data: global: | {"linkerdNamespace":"linkerd","cniEnabled":false,"version":"edge-20.10.1","identityContext":{"trustDomain":"cluster.local","trustAnchorsPem":"-----BEGIN CERTIFICATE-----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\nKg==\n-----END CERTIFICATE-----\n","issuanceLifetime":"86400s","clockSkewAllowance":"20s","scheme":"linkerd.io/tls"},"autoInjectContext":null,"omitWebhookSideEffects":false,"clusterDomain":"cluster.local"} proxy: | {"proxyImage":{"imageName":"ghcr.io/linkerd/proxy","pullPolicy":"IfNotPresent"},"proxyInitImage":{"imageName":"ghcr.io/linkerd/proxy-init","pullPolicy":"IfNotPresent"},"controlPort":{"port":4190},"ignoreInboundPorts":[],"ignoreOutboundPorts":[],"inboundPort":{"port":4143},"adminPort":{"port":4191},"outboundPort":{"port":4140},"resource":{"requestCpu":"","requestMemory":"","limitCpu":"","limitMemory":""},"proxyUid":"2102","logLevel":{"level":"warn,linkerd=info"},"disableExternalProfiles":true,"proxyVersion":"edge-20.10.1","proxyInitImageVersion":"v1.3.6","debugImage":{"imageName":"ghcr.io/linkerd/debug","pullPolicy":"IfNotPresent"},"debugImageVersion":"edge-20.10.1","destinationGetNetworks":"10.0.0.0/8,172.16.0.0/12,192.168.0.0/16","logFormat":"plain","outboundConnectTimeout":"","inboundConnectTimeout":""} install: | {"cliVersion":"edge-20.10.1","flags":[]} values: | controllerImage: ghcr.io/linkerd/controller controllerImageVersion: "" controllerReplicas: 1 controllerUID: 2103 dashboard: replicas: 1 debugContainer: image: name: ghcr.io/linkerd/debug pullPolicy: IfNotPresent version: edge-20.10.1 destinationProxyResources: null destinationResources: null disableHeartBeat: false enableH2Upgrade: true enablePodAntiAffinity: false global: cliVersion: linkerd/cli edge-20.10.1 clusterDomain: cluster.local cniEnabled: false controlPlaneTracing: false controllerComponentLabel: linkerd.io/control-plane-component controllerImageVersion: "" controllerLogLevel: info controllerNamespaceLabel: linkerd.io/control-plane-ns createdByAnnotation: linkerd.io/created-by enableEndpointSlices: false grafanaUrl: "" highAvailability: false identityTrustAnchorsPEM: | -----BEGIN CERTIFICATE----- MIIBrTCCAVSgAwIBAgIBATAKBggqhkjOPQQDAjApMScwJQYDVQQDEx5pZGVudGl0 eS5saW5rZXJkLmNsdXN0ZXIubG9jYWwwHhcNMjAxMDA0MDI0ODQwWhcNMjExMDA0 MDI0OTAwWjApMScwJQYDVQQDEx5pZGVudGl0eS5saW5rZXJkLmNsdXN0ZXIubG9j YWwwWTATBgcqhkjOPQIBBggqhkjOPQMBBwNCAASZmf4G3Gv0uLIghidK7hi8JQBy 2SpE0SvMdkxcq5jWnkCcqaIla55PgsTrDE5kFQ0INslrJaKxzGnDE22uvI9xo20w azAOBgNVHQ8BAf8EBAMCAQYwHQYDVR0lBBYwFAYIKwYBBQUHAwEGCCsGAQUFBwMC MA8GA1UdEwEB/wQFMAMBAf8wKQYDVR0RBCIwIIIeaWRlbnRpdHkubGlua2VyZC5j bHVzdGVyLmxvY2FsMAoGCCqGSM49BAMCA0cAMEQCIEI5jVjmF2WPdtqvBI+uGqUh 40GgD/83Y6iOCDULHpBqAiAOfBx0sOwo2rvaiG7DQfrj2n6UQrQIHcxmiTD+9Lb0 Kg== -----END CERTIFICATE----- identityTrustDomain: cluster.local imagePullPolicy: IfNotPresent imagePullSecrets: [] linkerdNamespaceLabel: linkerd.io/is-control-plane linkerdVersion: edge-20.10.1 namespace: linkerd prometheusUrl: "" proxy: capabilities: null component: linkerd-controller destinationGetNetworks: 10.0.0.0/8,172.16.0.0/12,192.168.0.0/16 disableIdentity: false disableTap: false enableExternalProfiles: false image: name: ghcr.io/linkerd/proxy pullPolicy: IfNotPresent version: edge-20.10.1 inboundConnectTimeout: 100ms isGateway: false logFormat: plain logLevel: warn,linkerd=info opaquePorts: "" outboundConnectTimeout: 1000ms ports: admin: 4191 control: 4190 inbound: 4143 outbound: 4140 requireIdentityOnInboundPorts: "" resources: cpu: limit: "" request: "" memory: limit: "" request: "" saMountPath: null trace: collectorSvcAccount: default collectorSvcAddr: "" uid: 2102 waitBeforeExitSeconds: 0 workloadKind: deployment proxyContainerName: linkerd-proxy proxyInit: capabilities: null closeWaitTimeoutSecs: 0 ignoreInboundPorts: "" ignoreOutboundPorts: "" image: name: ghcr.io/linkerd/proxy-init pullPolicy: IfNotPresent version: v1.3.6 resources: cpu: limit: 100m request: 10m memory: limit: 50Mi request: 10Mi saMountPath: null xtMountPath: mountPath: /run name: linkerd-proxy-init-xtables-lock readOnly: false proxyInjectAnnotation: linkerd.io/inject proxyInjectDisabled: disabled workloadNamespaceLabel: linkerd.io/workload-ns grafana: enabled: true heartbeatResources: null heartbeatSchedule: '58 2 * * * ' identity: issuer: clockSkewAllowance: 20s crtExpiry: "2021-10-04T02:49:00Z" crtExpiryAnnotation: linkerd.io/identity-issuer-expiry issuanceLifetime: 24h0m0s scheme: linkerd.io/tls tls: crtPEM: | -----BEGIN CERTIFICATE----- MIIBrTCCAVSgAwIBAgIBATAKBggqhkjOPQQDAjApMScwJQYDVQQDEx5pZGVudGl0 eS5saW5rZXJkLmNsdXN0ZXIubG9jYWwwHhcNMjAxMDA0MDI0ODQwWhcNMjExMDA0 MDI0OTAwWjApMScwJQYDVQQDEx5pZGVudGl0eS5saW5rZXJkLmNsdXN0ZXIubG9j YWwwWTATBgcqhkjOPQIBBggqhkjOPQMBBwNCAASZmf4G3Gv0uLIghidK7hi8JQBy 2SpE0SvMdkxcq5jWnkCcqaIla55PgsTrDE5kFQ0INslrJaKxzGnDE22uvI9xo20w azAOBgNVHQ8BAf8EBAMCAQYwHQYDVR0lBBYwFAYIKwYBBQUHAwEGCCsGAQUFBwMC MA8GA1UdEwEB/wQFMAMBAf8wKQYDVR0RBCIwIIIeaWRlbnRpdHkubGlua2VyZC5j bHVzdGVyLmxvY2FsMAoGCCqGSM49BAMCA0cAMEQCIEI5jVjmF2WPdtqvBI+uGqUh 40GgD/83Y6iOCDULHpBqAiAOfBx0sOwo2rvaiG7DQfrj2n6UQrQIHcxmiTD+9Lb0 Kg== -----END CERTIFICATE----- identityProxyResources: null identityResources: null installNamespace: true nodeSelector: beta.kubernetes.io/os: linux omitWebhookSideEffects: false profileValidator: caBundle: "" crtPEM: "" externalSecret: false prometheus: enabled: true proxyInjector: caBundle: "" crtPEM: "" externalSecret: false proxyInjectorProxyResources: null proxyInjectorResources: null publicAPIProxyResources: null publicAPIResources: null restrictDashboardPrivileges: false spValidatorProxyResources: null spValidatorResources: null stage: "" tap: caBundle: "" crtPEM: "" externalSecret: false tapProxyResources: null tapResources: null tolerations: null tracing: enabled: false webImage: ghcr.io/linkerd/web webProxyResources: null webResources: null webhookFailurePolicy: Ignore --- ### ### Identity Controller Service ### --- kind: Secret apiVersion: v1 metadata: name: linkerd-identity-issuer namespace: linkerd labels: linkerd.io/control-plane-component: identity linkerd.io/control-plane-ns: linkerd annotations: linkerd.io/created-by: linkerd/cli edge-20.10.1 linkerd.io/identity-issuer-expiry: 2021-10-04T02:49:00Z data: crt.pem: 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 key.pem: LS0tLS1CRUdJTiBFQyBQUklWQVRFIEtFWS0tLS0tCk1IY0NBUUVFSUQxSWsvVm9ranp2bmV5d25OZ3FUN3NZSE9sUEl5bDcxZHh2OXRqc0hRQjRvQW9HQ0NxR1NNNDkKQXdFSG9VUURRZ0FFbVpuK0J0eHI5TGl5SUlZblN1NFl2Q1VBY3RrcVJORXJ6SFpNWEt1WTFwNUFuS21pSld1ZQpUNExFNnd4T1pCVU5DRGJKYXlXaXNjeHB3eE50cnJ5UGNRPT0KLS0tLS1FTkQgRUMgUFJJVkFURSBLRVktLS0tLQ== --- kind: Service apiVersion: v1 metadata: name: linkerd-identity namespace: linkerd labels: linkerd.io/control-plane-component: identity linkerd.io/control-plane-ns: linkerd annotations: linkerd.io/created-by: linkerd/cli edge-20.10.1 spec: type: ClusterIP selector: linkerd.io/control-plane-component: identity ports: - name: grpc port: 8080 targetPort: 8080 --- kind: Service apiVersion: v1 metadata: name: linkerd-identity-headless namespace: linkerd labels: linkerd.io/control-plane-component: identity linkerd.io/control-plane-ns: linkerd annotations: linkerd.io/created-by: linkerd/cli edge-20.10.1 spec: clusterIP: None selector: linkerd.io/control-plane-component: identity ports: - name: grpc port: 8080 targetPort: 8080 --- apiVersion: apps/v1 kind: Deployment metadata: annotations: linkerd.io/created-by: linkerd/cli edge-20.10.1 labels: app.kubernetes.io/name: identity app.kubernetes.io/part-of: Linkerd app.kubernetes.io/version: edge-20.10.1 linkerd.io/control-plane-component: identity linkerd.io/control-plane-ns: linkerd name: linkerd-identity namespace: linkerd spec: replicas: 1 selector: matchLabels: linkerd.io/control-plane-component: identity linkerd.io/control-plane-ns: linkerd linkerd.io/proxy-deployment: linkerd-identity template: metadata: annotations: linkerd.io/created-by: linkerd/cli edge-20.10.1 linkerd.io/identity-mode: default linkerd.io/proxy-version: edge-20.10.1 labels: linkerd.io/control-plane-component: identity linkerd.io/control-plane-ns: linkerd linkerd.io/workload-ns: linkerd linkerd.io/proxy-deployment: linkerd-identity spec: nodeSelector: beta.kubernetes.io/os: linux containers: - args: - identity - -log-level=info image: ghcr.io/linkerd/controller:edge-20.10.1 imagePullPolicy: IfNotPresent livenessProbe: httpGet: path: /ping port: 9990 initialDelaySeconds: 10 name: identity ports: - containerPort: 8080 name: grpc - containerPort: 9990 name: admin-http readinessProbe: failureThreshold: 7 httpGet: path: /ready port: 9990 securityContext: runAsUser: 2103 volumeMounts: - mountPath: /var/run/linkerd/config name: config - mountPath: /var/run/linkerd/identity/issuer name: identity-issuer - env: - name: LINKERD2_PROXY_LOG value: warn,linkerd=info - name: LINKERD2_PROXY_LOG_FORMAT value: plain - name: LINKERD2_PROXY_DESTINATION_SVC_ADDR value: linkerd-dst-headless.linkerd.svc.cluster.local:8086 - name: LINKERD2_PROXY_DESTINATION_GET_NETWORKS value: "10.0.0.0/8,172.16.0.0/12,192.168.0.0/16" - name: LINKERD2_PROXY_DESTINATION_PROFILE_NETWORKS value: "10.0.0.0/8,172.16.0.0/12,192.168.0.0/16" - name: LINKERD2_PROXY_INBOUND_CONNECT_TIMEOUT value: "100ms" - name: LINKERD2_PROXY_OUTBOUND_CONNECT_TIMEOUT value: "1000ms" - name: LINKERD2_PROXY_CONTROL_LISTEN_ADDR value: 0.0.0.0:4190 - name: LINKERD2_PROXY_ADMIN_LISTEN_ADDR value: 0.0.0.0:4191 - name: LINKERD2_PROXY_OUTBOUND_LISTEN_ADDR value: 127.0.0.1:4140 - name: LINKERD2_PROXY_INBOUND_LISTEN_ADDR value: 0.0.0.0:4143 - name: LINKERD2_PROXY_DESTINATION_GET_SUFFIXES value: svc.cluster.local. - name: LINKERD2_PROXY_DESTINATION_PROFILE_SUFFIXES value: svc.cluster.local. - name: LINKERD2_PROXY_INBOUND_ACCEPT_KEEPALIVE value: 10000ms - name: LINKERD2_PROXY_OUTBOUND_CONNECT_KEEPALIVE value: 10000ms - name: _pod_ns valueFrom: fieldRef: fieldPath: metadata.namespace - name: _pod_nodeName valueFrom: fieldRef: fieldPath: spec.nodeName - name: LINKERD2_PROXY_DESTINATION_CONTEXT value: | {"ns":"$(_pod_ns)", "nodeName":"$(_pod_nodeName)"} - name: LINKERD2_PROXY_IDENTITY_DIR value: /var/run/linkerd/identity/end-entity - name: LINKERD2_PROXY_IDENTITY_TRUST_ANCHORS value: | -----BEGIN CERTIFICATE----- MIIBrTCCAVSgAwIBAgIBATAKBggqhkjOPQQDAjApMScwJQYDVQQDEx5pZGVudGl0 eS5saW5rZXJkLmNsdXN0ZXIubG9jYWwwHhcNMjAxMDA0MDI0ODQwWhcNMjExMDA0 MDI0OTAwWjApMScwJQYDVQQDEx5pZGVudGl0eS5saW5rZXJkLmNsdXN0ZXIubG9j YWwwWTATBgcqhkjOPQIBBggqhkjOPQMBBwNCAASZmf4G3Gv0uLIghidK7hi8JQBy 2SpE0SvMdkxcq5jWnkCcqaIla55PgsTrDE5kFQ0INslrJaKxzGnDE22uvI9xo20w azAOBgNVHQ8BAf8EBAMCAQYwHQYDVR0lBBYwFAYIKwYBBQUHAwEGCCsGAQUFBwMC MA8GA1UdEwEB/wQFMAMBAf8wKQYDVR0RBCIwIIIeaWRlbnRpdHkubGlua2VyZC5j bHVzdGVyLmxvY2FsMAoGCCqGSM49BAMCA0cAMEQCIEI5jVjmF2WPdtqvBI+uGqUh 40GgD/83Y6iOCDULHpBqAiAOfBx0sOwo2rvaiG7DQfrj2n6UQrQIHcxmiTD+9Lb0 Kg== -----END CERTIFICATE----- - name: LINKERD2_PROXY_IDENTITY_TOKEN_FILE value: /var/run/secrets/kubernetes.io/serviceaccount/token - name: LINKERD2_PROXY_IDENTITY_SVC_ADDR value: localhost.:8080 - name: _pod_sa valueFrom: fieldRef: fieldPath: spec.serviceAccountName - name: _l5d_ns value: linkerd - name: _l5d_trustdomain value: cluster.local - name: LINKERD2_PROXY_IDENTITY_LOCAL_NAME value: $(_pod_sa).$(_pod_ns).serviceaccount.identity.$(_l5d_ns).$(_l5d_trustdomain) - name: LINKERD2_PROXY_IDENTITY_SVC_NAME value: linkerd-identity.$(_l5d_ns).serviceaccount.identity.$(_l5d_ns).$(_l5d_trustdomain) - name: LINKERD2_PROXY_DESTINATION_SVC_NAME value: linkerd-destination.$(_l5d_ns).serviceaccount.identity.$(_l5d_ns).$(_l5d_trustdomain) - name: LINKERD2_PROXY_TAP_SVC_NAME value: linkerd-tap.$(_l5d_ns).serviceaccount.identity.$(_l5d_ns).$(_l5d_trustdomain) image: ghcr.io/linkerd/proxy:edge-20.10.1 imagePullPolicy: IfNotPresent livenessProbe: httpGet: path: /live port: 4191 initialDelaySeconds: 10 name: linkerd-proxy ports: - containerPort: 4143 name: linkerd-proxy - containerPort: 4191 name: linkerd-admin readinessProbe: httpGet: path: /ready port: 4191 initialDelaySeconds: 2 resources: securityContext: allowPrivilegeEscalation: false readOnlyRootFilesystem: true runAsUser: 2102 terminationMessagePolicy: FallbackToLogsOnError volumeMounts: - mountPath: /var/run/linkerd/identity/end-entity name: linkerd-identity-end-entity initContainers: - args: - --incoming-proxy-port - "4143" - --outgoing-proxy-port - "4140" - --proxy-uid - "2102" - --inbound-ports-to-ignore - 4190,4191 - --outbound-ports-to-ignore - "443" image: ghcr.io/linkerd/proxy-init:v1.3.6 imagePullPolicy: IfNotPresent name: linkerd-init resources: limits: cpu: "100m" memory: "50Mi" requests: cpu: "10m" memory: "10Mi" securityContext: allowPrivilegeEscalation: false capabilities: add: - NET_ADMIN - NET_RAW privileged: false readOnlyRootFilesystem: true runAsNonRoot: false runAsUser: 0 terminationMessagePolicy: FallbackToLogsOnError volumeMounts: - mountPath: /run name: linkerd-proxy-init-xtables-lock serviceAccountName: linkerd-identity volumes: - configMap: name: linkerd-config name: config - name: identity-issuer secret: secretName: linkerd-identity-issuer - emptyDir: {} name: linkerd-proxy-init-xtables-lock - emptyDir: medium: Memory name: linkerd-identity-end-entity --- ### ### Controller ### --- kind: Service apiVersion: v1 metadata: name: linkerd-controller-api namespace: linkerd labels: linkerd.io/control-plane-component: controller linkerd.io/control-plane-ns: linkerd annotations: linkerd.io/created-by: linkerd/cli edge-20.10.1 spec: type: ClusterIP selector: linkerd.io/control-plane-component: controller ports: - name: http port: 8085 targetPort: 8085 --- apiVersion: apps/v1 kind: Deployment metadata: annotations: linkerd.io/created-by: linkerd/cli edge-20.10.1 labels: app.kubernetes.io/name: controller app.kubernetes.io/part-of: Linkerd app.kubernetes.io/version: edge-20.10.1 linkerd.io/control-plane-component: controller linkerd.io/control-plane-ns: linkerd name: linkerd-controller namespace: linkerd spec: replicas: 1 selector: matchLabels: linkerd.io/control-plane-component: controller linkerd.io/control-plane-ns: linkerd linkerd.io/proxy-deployment: linkerd-controller template: metadata: annotations: linkerd.io/created-by: linkerd/cli edge-20.10.1 linkerd.io/identity-mode: default linkerd.io/proxy-version: edge-20.10.1 labels: linkerd.io/control-plane-component: controller linkerd.io/control-plane-ns: linkerd linkerd.io/workload-ns: linkerd linkerd.io/proxy-deployment: linkerd-controller spec: nodeSelector: beta.kubernetes.io/os: linux containers: - args: - public-api - -destination-addr=linkerd-dst.linkerd.svc.cluster.local:8086 - -controller-namespace=linkerd - -log-level=info - -prometheus-url=http://linkerd-prometheus.linkerd.svc.cluster.local:9090 image: ghcr.io/linkerd/controller:edge-20.10.1 imagePullPolicy: IfNotPresent livenessProbe: httpGet: path: /ping port: 9995 initialDelaySeconds: 10 name: public-api ports: - containerPort: 8085 name: http - containerPort: 9995 name: admin-http readinessProbe: failureThreshold: 7 httpGet: path: /ready port: 9995 securityContext: runAsUser: 2103 volumeMounts: - mountPath: /var/run/linkerd/config name: config - env: - name: LINKERD2_PROXY_LOG value: warn,linkerd=info - name: LINKERD2_PROXY_LOG_FORMAT value: plain - name: LINKERD2_PROXY_DESTINATION_SVC_ADDR value: linkerd-dst-headless.linkerd.svc.cluster.local:8086 - name: LINKERD2_PROXY_DESTINATION_GET_NETWORKS value: "10.0.0.0/8,172.16.0.0/12,192.168.0.0/16" - name: LINKERD2_PROXY_DESTINATION_PROFILE_NETWORKS value: "10.0.0.0/8,172.16.0.0/12,192.168.0.0/16" - name: LINKERD2_PROXY_INBOUND_CONNECT_TIMEOUT value: "100ms" - name: LINKERD2_PROXY_OUTBOUND_CONNECT_TIMEOUT value: "1000ms" - name: LINKERD2_PROXY_CONTROL_LISTEN_ADDR value: 0.0.0.0:4190 - name: LINKERD2_PROXY_ADMIN_LISTEN_ADDR value: 0.0.0.0:4191 - name: LINKERD2_PROXY_OUTBOUND_LISTEN_ADDR value: 127.0.0.1:4140 - name: LINKERD2_PROXY_INBOUND_LISTEN_ADDR value: 0.0.0.0:4143 - name: LINKERD2_PROXY_DESTINATION_GET_SUFFIXES value: svc.cluster.local. - name: LINKERD2_PROXY_DESTINATION_PROFILE_SUFFIXES value: svc.cluster.local. - name: LINKERD2_PROXY_INBOUND_ACCEPT_KEEPALIVE value: 10000ms - name: LINKERD2_PROXY_OUTBOUND_CONNECT_KEEPALIVE value: 10000ms - name: _pod_ns valueFrom: fieldRef: fieldPath: metadata.namespace - name: _pod_nodeName valueFrom: fieldRef: fieldPath: spec.nodeName - name: LINKERD2_PROXY_DESTINATION_CONTEXT value: | {"ns":"$(_pod_ns)", "nodeName":"$(_pod_nodeName)"} - name: LINKERD2_PROXY_IDENTITY_DIR value: /var/run/linkerd/identity/end-entity - name: LINKERD2_PROXY_IDENTITY_TRUST_ANCHORS value: | -----BEGIN CERTIFICATE----- MIIBrTCCAVSgAwIBAgIBATAKBggqhkjOPQQDAjApMScwJQYDVQQDEx5pZGVudGl0 eS5saW5rZXJkLmNsdXN0ZXIubG9jYWwwHhcNMjAxMDA0MDI0ODQwWhcNMjExMDA0 MDI0OTAwWjApMScwJQYDVQQDEx5pZGVudGl0eS5saW5rZXJkLmNsdXN0ZXIubG9j YWwwWTATBgcqhkjOPQIBBggqhkjOPQMBBwNCAASZmf4G3Gv0uLIghidK7hi8JQBy 2SpE0SvMdkxcq5jWnkCcqaIla55PgsTrDE5kFQ0INslrJaKxzGnDE22uvI9xo20w azAOBgNVHQ8BAf8EBAMCAQYwHQYDVR0lBBYwFAYIKwYBBQUHAwEGCCsGAQUFBwMC MA8GA1UdEwEB/wQFMAMBAf8wKQYDVR0RBCIwIIIeaWRlbnRpdHkubGlua2VyZC5j bHVzdGVyLmxvY2FsMAoGCCqGSM49BAMCA0cAMEQCIEI5jVjmF2WPdtqvBI+uGqUh 40GgD/83Y6iOCDULHpBqAiAOfBx0sOwo2rvaiG7DQfrj2n6UQrQIHcxmiTD+9Lb0 Kg== -----END CERTIFICATE----- - name: LINKERD2_PROXY_IDENTITY_TOKEN_FILE value: /var/run/secrets/kubernetes.io/serviceaccount/token - name: LINKERD2_PROXY_IDENTITY_SVC_ADDR value: linkerd-identity-headless.linkerd.svc.cluster.local:8080 - name: _pod_sa valueFrom: fieldRef: fieldPath: spec.serviceAccountName - name: _l5d_ns value: linkerd - name: _l5d_trustdomain value: cluster.local - name: LINKERD2_PROXY_IDENTITY_LOCAL_NAME value: $(_pod_sa).$(_pod_ns).serviceaccount.identity.$(_l5d_ns).$(_l5d_trustdomain) - name: LINKERD2_PROXY_IDENTITY_SVC_NAME value: linkerd-identity.$(_l5d_ns).serviceaccount.identity.$(_l5d_ns).$(_l5d_trustdomain) - name: LINKERD2_PROXY_DESTINATION_SVC_NAME value: linkerd-destination.$(_l5d_ns).serviceaccount.identity.$(_l5d_ns).$(_l5d_trustdomain) - name: LINKERD2_PROXY_TAP_SVC_NAME value: linkerd-tap.$(_l5d_ns).serviceaccount.identity.$(_l5d_ns).$(_l5d_trustdomain) image: ghcr.io/linkerd/proxy:edge-20.10.1 imagePullPolicy: IfNotPresent livenessProbe: httpGet: path: /live port: 4191 initialDelaySeconds: 10 name: linkerd-proxy ports: - containerPort: 4143 name: linkerd-proxy - containerPort: 4191 name: linkerd-admin readinessProbe: httpGet: path: /ready port: 4191 initialDelaySeconds: 2 resources: securityContext: allowPrivilegeEscalation: false readOnlyRootFilesystem: true runAsUser: 2102 terminationMessagePolicy: FallbackToLogsOnError volumeMounts: - mountPath: /var/run/linkerd/identity/end-entity name: linkerd-identity-end-entity initContainers: - args: - --incoming-proxy-port - "4143" - --outgoing-proxy-port - "4140" - --proxy-uid - "2102" - --inbound-ports-to-ignore - 4190,4191 - --outbound-ports-to-ignore - "443" image: ghcr.io/linkerd/proxy-init:v1.3.6 imagePullPolicy: IfNotPresent name: linkerd-init resources: limits: cpu: "100m" memory: "50Mi" requests: cpu: "10m" memory: "10Mi" securityContext: allowPrivilegeEscalation: false capabilities: add: - NET_ADMIN - NET_RAW privileged: false readOnlyRootFilesystem: true runAsNonRoot: false runAsUser: 0 terminationMessagePolicy: FallbackToLogsOnError volumeMounts: - mountPath: /run name: linkerd-proxy-init-xtables-lock serviceAccountName: linkerd-controller volumes: - configMap: name: linkerd-config name: config - emptyDir: {} name: linkerd-proxy-init-xtables-lock - emptyDir: medium: Memory name: linkerd-identity-end-entity --- ### ### Destination Controller Service ### --- kind: Service apiVersion: v1 metadata: name: linkerd-dst namespace: linkerd labels: linkerd.io/control-plane-component: destination linkerd.io/control-plane-ns: linkerd annotations: linkerd.io/created-by: linkerd/cli edge-20.10.1 spec: type: ClusterIP selector: linkerd.io/control-plane-component: destination ports: - name: grpc port: 8086 targetPort: 8086 --- kind: Service apiVersion: v1 metadata: name: linkerd-dst-headless namespace: linkerd labels: linkerd.io/control-plane-component: destination linkerd.io/control-plane-ns: linkerd annotations: linkerd.io/created-by: linkerd/cli edge-20.10.1 spec: clusterIP: None selector: linkerd.io/control-plane-component: destination ports: - name: grpc port: 8086 targetPort: 8086 --- apiVersion: apps/v1 kind: Deployment metadata: annotations: linkerd.io/created-by: linkerd/cli edge-20.10.1 labels: app.kubernetes.io/name: destination app.kubernetes.io/part-of: Linkerd app.kubernetes.io/version: edge-20.10.1 linkerd.io/control-plane-component: destination linkerd.io/control-plane-ns: linkerd name: linkerd-destination namespace: linkerd spec: replicas: 1 selector: matchLabels: linkerd.io/control-plane-component: destination linkerd.io/control-plane-ns: linkerd linkerd.io/proxy-deployment: linkerd-destination template: metadata: annotations: linkerd.io/created-by: linkerd/cli edge-20.10.1 linkerd.io/identity-mode: default linkerd.io/proxy-version: edge-20.10.1 labels: linkerd.io/control-plane-component: destination linkerd.io/control-plane-ns: linkerd linkerd.io/workload-ns: linkerd linkerd.io/proxy-deployment: linkerd-destination spec: nodeSelector: beta.kubernetes.io/os: linux containers: - args: - destination - -addr=:8086 - -controller-namespace=linkerd - -enable-h2-upgrade=true - -log-level=info - -enable-endpoint-slices=false image: ghcr.io/linkerd/controller:edge-20.10.1 imagePullPolicy: IfNotPresent livenessProbe: httpGet: path: /ping port: 9996 initialDelaySeconds: 10 name: destination ports: - containerPort: 8086 name: grpc - containerPort: 9996 name: admin-http readinessProbe: failureThreshold: 7 httpGet: path: /ready port: 9996 securityContext: runAsUser: 2103 volumeMounts: - mountPath: /var/run/linkerd/config name: config - env: - name: LINKERD2_PROXY_LOG value: warn,linkerd=info - name: LINKERD2_PROXY_LOG_FORMAT value: plain - name: LINKERD2_PROXY_DESTINATION_SVC_ADDR value: localhost.:8086 - name: LINKERD2_PROXY_DESTINATION_GET_NETWORKS value: "10.0.0.0/8,172.16.0.0/12,192.168.0.0/16" - name: LINKERD2_PROXY_DESTINATION_PROFILE_NETWORKS value: "10.0.0.0/8,172.16.0.0/12,192.168.0.0/16" - name: LINKERD2_PROXY_INBOUND_CONNECT_TIMEOUT value: "100ms" - name: LINKERD2_PROXY_OUTBOUND_CONNECT_TIMEOUT value: "1000ms" - name: LINKERD2_PROXY_CONTROL_LISTEN_ADDR value: 0.0.0.0:4190 - name: LINKERD2_PROXY_ADMIN_LISTEN_ADDR value: 0.0.0.0:4191 - name: LINKERD2_PROXY_OUTBOUND_LISTEN_ADDR value: 127.0.0.1:4140 - name: LINKERD2_PROXY_INBOUND_LISTEN_ADDR value: 0.0.0.0:4143 - name: LINKERD2_PROXY_DESTINATION_GET_SUFFIXES value: svc.cluster.local. - name: LINKERD2_PROXY_DESTINATION_PROFILE_SUFFIXES value: svc.cluster.local. - name: LINKERD2_PROXY_INBOUND_ACCEPT_KEEPALIVE value: 10000ms - name: LINKERD2_PROXY_OUTBOUND_CONNECT_KEEPALIVE value: 10000ms - name: _pod_ns valueFrom: fieldRef: fieldPath: metadata.namespace - name: _pod_nodeName valueFrom: fieldRef: fieldPath: spec.nodeName - name: LINKERD2_PROXY_DESTINATION_CONTEXT value: | {"ns":"$(_pod_ns)", "nodeName":"$(_pod_nodeName)"} - name: LINKERD2_PROXY_IDENTITY_DIR value: /var/run/linkerd/identity/end-entity - name: LINKERD2_PROXY_IDENTITY_TRUST_ANCHORS value: | -----BEGIN CERTIFICATE----- MIIBrTCCAVSgAwIBAgIBATAKBggqhkjOPQQDAjApMScwJQYDVQQDEx5pZGVudGl0 eS5saW5rZXJkLmNsdXN0ZXIubG9jYWwwHhcNMjAxMDA0MDI0ODQwWhcNMjExMDA0 MDI0OTAwWjApMScwJQYDVQQDEx5pZGVudGl0eS5saW5rZXJkLmNsdXN0ZXIubG9j YWwwWTATBgcqhkjOPQIBBggqhkjOPQMBBwNCAASZmf4G3Gv0uLIghidK7hi8JQBy 2SpE0SvMdkxcq5jWnkCcqaIla55PgsTrDE5kFQ0INslrJaKxzGnDE22uvI9xo20w azAOBgNVHQ8BAf8EBAMCAQYwHQYDVR0lBBYwFAYIKwYBBQUHAwEGCCsGAQUFBwMC MA8GA1UdEwEB/wQFMAMBAf8wKQYDVR0RBCIwIIIeaWRlbnRpdHkubGlua2VyZC5j bHVzdGVyLmxvY2FsMAoGCCqGSM49BAMCA0cAMEQCIEI5jVjmF2WPdtqvBI+uGqUh 40GgD/83Y6iOCDULHpBqAiAOfBx0sOwo2rvaiG7DQfrj2n6UQrQIHcxmiTD+9Lb0 Kg== -----END CERTIFICATE----- - name: LINKERD2_PROXY_IDENTITY_TOKEN_FILE value: /var/run/secrets/kubernetes.io/serviceaccount/token - name: LINKERD2_PROXY_IDENTITY_SVC_ADDR value: linkerd-identity-headless.linkerd.svc.cluster.local:8080 - name: _pod_sa valueFrom: fieldRef: fieldPath: spec.serviceAccountName - name: _l5d_ns value: linkerd - name: _l5d_trustdomain value: cluster.local - name: LINKERD2_PROXY_IDENTITY_LOCAL_NAME value: $(_pod_sa).$(_pod_ns).serviceaccount.identity.$(_l5d_ns).$(_l5d_trustdomain) - name: LINKERD2_PROXY_IDENTITY_SVC_NAME value: linkerd-identity.$(_l5d_ns).serviceaccount.identity.$(_l5d_ns).$(_l5d_trustdomain) - name: LINKERD2_PROXY_DESTINATION_SVC_NAME value: linkerd-destination.$(_l5d_ns).serviceaccount.identity.$(_l5d_ns).$(_l5d_trustdomain) - name: LINKERD2_PROXY_TAP_SVC_NAME value: linkerd-tap.$(_l5d_ns).serviceaccount.identity.$(_l5d_ns).$(_l5d_trustdomain) image: ghcr.io/linkerd/proxy:edge-20.10.1 imagePullPolicy: IfNotPresent livenessProbe: httpGet: path: /live port: 4191 initialDelaySeconds: 10 name: linkerd-proxy ports: - containerPort: 4143 name: linkerd-proxy - containerPort: 4191 name: linkerd-admin readinessProbe: httpGet: path: /ready port: 4191 initialDelaySeconds: 2 resources: securityContext: allowPrivilegeEscalation: false readOnlyRootFilesystem: true runAsUser: 2102 terminationMessagePolicy: FallbackToLogsOnError volumeMounts: - mountPath: /var/run/linkerd/identity/end-entity name: linkerd-identity-end-entity initContainers: - args: - --incoming-proxy-port - "4143" - --outgoing-proxy-port - "4140" - --proxy-uid - "2102" - --inbound-ports-to-ignore - 4190,4191 - --outbound-ports-to-ignore - "443" image: ghcr.io/linkerd/proxy-init:v1.3.6 imagePullPolicy: IfNotPresent name: linkerd-init resources: limits: cpu: "100m" memory: "50Mi" requests: cpu: "10m" memory: "10Mi" securityContext: allowPrivilegeEscalation: false capabilities: add: - NET_ADMIN - NET_RAW privileged: false readOnlyRootFilesystem: true runAsNonRoot: false runAsUser: 0 terminationMessagePolicy: FallbackToLogsOnError volumeMounts: - mountPath: /run name: linkerd-proxy-init-xtables-lock serviceAccountName: linkerd-destination volumes: - configMap: name: linkerd-config name: config - emptyDir: {} name: linkerd-proxy-init-xtables-lock - emptyDir: medium: Memory name: linkerd-identity-end-entity --- ### ### Heartbeat ### --- apiVersion: batch/v1beta1 kind: CronJob metadata: name: linkerd-heartbeat namespace: linkerd labels: app.kubernetes.io/name: heartbeat app.kubernetes.io/part-of: Linkerd app.kubernetes.io/version: edge-20.10.1 linkerd.io/control-plane-component: heartbeat linkerd.io/control-plane-ns: linkerd annotations: linkerd.io/created-by: linkerd/cli edge-20.10.1 spec: schedule: "58 2 * * * " successfulJobsHistoryLimit: 0 jobTemplate: spec: template: metadata: labels: linkerd.io/control-plane-component: heartbeat linkerd.io/workload-ns: linkerd annotations: linkerd.io/created-by: linkerd/cli edge-20.10.1 spec: nodeSelector: beta.kubernetes.io/os: linux serviceAccountName: linkerd-heartbeat restartPolicy: Never containers: - name: heartbeat image: ghcr.io/linkerd/controller:edge-20.10.1 imagePullPolicy: IfNotPresent args: - "heartbeat" - "-controller-namespace=linkerd" - "-log-level=info" - "-prometheus-url=http://linkerd-prometheus.linkerd.svc.cluster.local:9090" securityContext: runAsUser: 2103 --- ### ### Web ### --- kind: Service apiVersion: v1 metadata: name: linkerd-web namespace: linkerd labels: linkerd.io/control-plane-component: web linkerd.io/control-plane-ns: linkerd annotations: linkerd.io/created-by: linkerd/cli edge-20.10.1 spec: type: ClusterIP selector: linkerd.io/control-plane-component: web ports: - name: http port: 8084 targetPort: 8084 - name: admin-http port: 9994 targetPort: 9994 --- apiVersion: apps/v1 kind: Deployment metadata: annotations: linkerd.io/created-by: linkerd/cli edge-20.10.1 labels: app.kubernetes.io/name: web app.kubernetes.io/part-of: Linkerd app.kubernetes.io/version: edge-20.10.1 linkerd.io/control-plane-component: web linkerd.io/control-plane-ns: linkerd name: linkerd-web namespace: linkerd spec: replicas: 1 selector: matchLabels: linkerd.io/control-plane-component: web linkerd.io/control-plane-ns: linkerd linkerd.io/proxy-deployment: linkerd-web template: metadata: annotations: linkerd.io/created-by: linkerd/cli edge-20.10.1 linkerd.io/identity-mode: default linkerd.io/proxy-version: edge-20.10.1 labels: linkerd.io/control-plane-component: web linkerd.io/control-plane-ns: linkerd linkerd.io/workload-ns: linkerd linkerd.io/proxy-deployment: linkerd-web spec: nodeSelector: beta.kubernetes.io/os: linux containers: - args: - -api-addr=linkerd-controller-api.linkerd.svc.cluster.local:8085 - -grafana-addr=linkerd-grafana.linkerd.svc.cluster.local:3000 - -controller-namespace=linkerd - -log-level=info - -enforced-host=^(localhost|127\.0\.0\.1|linkerd-web\.linkerd\.svc\.cluster\.local|linkerd-web\.linkerd\.svc|\[::1\])(:\d+)?$ image: ghcr.io/linkerd/web:edge-20.10.1 imagePullPolicy: IfNotPresent livenessProbe: httpGet: path: /ping port: 9994 initialDelaySeconds: 10 name: web ports: - containerPort: 8084 name: http - containerPort: 9994 name: admin-http readinessProbe: failureThreshold: 7 httpGet: path: /ready port: 9994 securityContext: runAsUser: 2103 volumeMounts: - mountPath: /var/run/linkerd/config name: config - env: - name: LINKERD2_PROXY_LOG value: warn,linkerd=info - name: LINKERD2_PROXY_LOG_FORMAT value: plain - name: LINKERD2_PROXY_DESTINATION_SVC_ADDR value: linkerd-dst-headless.linkerd.svc.cluster.local:8086 - name: LINKERD2_PROXY_DESTINATION_GET_NETWORKS value: "10.0.0.0/8,172.16.0.0/12,192.168.0.0/16" - name: LINKERD2_PROXY_DESTINATION_PROFILE_NETWORKS value: "10.0.0.0/8,172.16.0.0/12,192.168.0.0/16" - name: LINKERD2_PROXY_INBOUND_CONNECT_TIMEOUT value: "100ms" - name: LINKERD2_PROXY_OUTBOUND_CONNECT_TIMEOUT value: "1000ms" - name: LINKERD2_PROXY_CONTROL_LISTEN_ADDR value: 0.0.0.0:4190 - name: LINKERD2_PROXY_ADMIN_LISTEN_ADDR value: 0.0.0.0:4191 - name: LINKERD2_PROXY_OUTBOUND_LISTEN_ADDR value: 127.0.0.1:4140 - name: LINKERD2_PROXY_INBOUND_LISTEN_ADDR value: 0.0.0.0:4143 - name: LINKERD2_PROXY_DESTINATION_GET_SUFFIXES value: svc.cluster.local. - name: LINKERD2_PROXY_DESTINATION_PROFILE_SUFFIXES value: svc.cluster.local. - name: LINKERD2_PROXY_INBOUND_ACCEPT_KEEPALIVE value: 10000ms - name: LINKERD2_PROXY_OUTBOUND_CONNECT_KEEPALIVE value: 10000ms - name: _pod_ns valueFrom: fieldRef: fieldPath: metadata.namespace - name: _pod_nodeName valueFrom: fieldRef: fieldPath: spec.nodeName - name: LINKERD2_PROXY_DESTINATION_CONTEXT value: | {"ns":"$(_pod_ns)", "nodeName":"$(_pod_nodeName)"} - name: LINKERD2_PROXY_IDENTITY_DIR value: /var/run/linkerd/identity/end-entity - name: LINKERD2_PROXY_IDENTITY_TRUST_ANCHORS value: | -----BEGIN CERTIFICATE----- MIIBrTCCAVSgAwIBAgIBATAKBggqhkjOPQQDAjApMScwJQYDVQQDEx5pZGVudGl0 eS5saW5rZXJkLmNsdXN0ZXIubG9jYWwwHhcNMjAxMDA0MDI0ODQwWhcNMjExMDA0 MDI0OTAwWjApMScwJQYDVQQDEx5pZGVudGl0eS5saW5rZXJkLmNsdXN0ZXIubG9j YWwwWTATBgcqhkjOPQIBBggqhkjOPQMBBwNCAASZmf4G3Gv0uLIghidK7hi8JQBy 2SpE0SvMdkxcq5jWnkCcqaIla55PgsTrDE5kFQ0INslrJaKxzGnDE22uvI9xo20w azAOBgNVHQ8BAf8EBAMCAQYwHQYDVR0lBBYwFAYIKwYBBQUHAwEGCCsGAQUFBwMC MA8GA1UdEwEB/wQFMAMBAf8wKQYDVR0RBCIwIIIeaWRlbnRpdHkubGlua2VyZC5j bHVzdGVyLmxvY2FsMAoGCCqGSM49BAMCA0cAMEQCIEI5jVjmF2WPdtqvBI+uGqUh 40GgD/83Y6iOCDULHpBqAiAOfBx0sOwo2rvaiG7DQfrj2n6UQrQIHcxmiTD+9Lb0 Kg== -----END CERTIFICATE----- - name: LINKERD2_PROXY_IDENTITY_TOKEN_FILE value: /var/run/secrets/kubernetes.io/serviceaccount/token - name: LINKERD2_PROXY_IDENTITY_SVC_ADDR value: linkerd-identity-headless.linkerd.svc.cluster.local:8080 - name: _pod_sa valueFrom: fieldRef: fieldPath: spec.serviceAccountName - name: _l5d_ns value: linkerd - name: _l5d_trustdomain value: cluster.local - name: LINKERD2_PROXY_IDENTITY_LOCAL_NAME value: $(_pod_sa).$(_pod_ns).serviceaccount.identity.$(_l5d_ns).$(_l5d_trustdomain) - name: LINKERD2_PROXY_IDENTITY_SVC_NAME value: linkerd-identity.$(_l5d_ns).serviceaccount.identity.$(_l5d_ns).$(_l5d_trustdomain) - name: LINKERD2_PROXY_DESTINATION_SVC_NAME value: linkerd-destination.$(_l5d_ns).serviceaccount.identity.$(_l5d_ns).$(_l5d_trustdomain) - name: LINKERD2_PROXY_TAP_SVC_NAME value: linkerd-tap.$(_l5d_ns).serviceaccount.identity.$(_l5d_ns).$(_l5d_trustdomain) image: ghcr.io/linkerd/proxy:edge-20.10.1 imagePullPolicy: IfNotPresent livenessProbe: httpGet: path: /live port: 4191 initialDelaySeconds: 10 name: linkerd-proxy ports: - containerPort: 4143 name: linkerd-proxy - containerPort: 4191 name: linkerd-admin readinessProbe: httpGet: path: /ready port: 4191 initialDelaySeconds: 2 resources: securityContext: allowPrivilegeEscalation: false readOnlyRootFilesystem: true runAsUser: 2102 terminationMessagePolicy: FallbackToLogsOnError volumeMounts: - mountPath: /var/run/linkerd/identity/end-entity name: linkerd-identity-end-entity initContainers: - args: - --incoming-proxy-port - "4143" - --outgoing-proxy-port - "4140" - --proxy-uid - "2102" - --inbound-ports-to-ignore - 4190,4191 - --outbound-ports-to-ignore - "443" image: ghcr.io/linkerd/proxy-init:v1.3.6 imagePullPolicy: IfNotPresent name: linkerd-init resources: limits: cpu: "100m" memory: "50Mi" requests: cpu: "10m" memory: "10Mi" securityContext: allowPrivilegeEscalation: false capabilities: add: - NET_ADMIN - NET_RAW privileged: false readOnlyRootFilesystem: true runAsNonRoot: false runAsUser: 0 terminationMessagePolicy: FallbackToLogsOnError volumeMounts: - mountPath: /run name: linkerd-proxy-init-xtables-lock serviceAccountName: linkerd-web volumes: - configMap: name: linkerd-config name: config - emptyDir: {} name: linkerd-proxy-init-xtables-lock - emptyDir: medium: Memory name: linkerd-identity-end-entity --- ### ### Proxy Injector ### --- apiVersion: apps/v1 kind: Deployment metadata: annotations: linkerd.io/created-by: linkerd/cli edge-20.10.1 labels: app.kubernetes.io/name: proxy-injector app.kubernetes.io/part-of: Linkerd app.kubernetes.io/version: edge-20.10.1 linkerd.io/control-plane-component: proxy-injector linkerd.io/control-plane-ns: linkerd name: linkerd-proxy-injector namespace: linkerd spec: replicas: 1 selector: matchLabels: linkerd.io/control-plane-component: proxy-injector template: metadata: annotations: linkerd.io/created-by: linkerd/cli edge-20.10.1 linkerd.io/identity-mode: default linkerd.io/proxy-version: edge-20.10.1 labels: linkerd.io/control-plane-component: proxy-injector linkerd.io/control-plane-ns: linkerd linkerd.io/workload-ns: linkerd linkerd.io/proxy-deployment: linkerd-proxy-injector spec: nodeSelector: beta.kubernetes.io/os: linux containers: - args: - proxy-injector - -log-level=info image: ghcr.io/linkerd/controller:edge-20.10.1 imagePullPolicy: IfNotPresent livenessProbe: httpGet: path: /ping port: 9995 initialDelaySeconds: 10 name: proxy-injector ports: - containerPort: 8443 name: proxy-injector - containerPort: 9995 name: admin-http readinessProbe: failureThreshold: 7 httpGet: path: /ready port: 9995 securityContext: runAsUser: 2103 volumeMounts: - mountPath: /var/run/linkerd/config name: config - mountPath: /var/run/linkerd/tls name: tls readOnly: true - env: - name: LINKERD2_PROXY_LOG value: warn,linkerd=info - name: LINKERD2_PROXY_LOG_FORMAT value: plain - name: LINKERD2_PROXY_DESTINATION_SVC_ADDR value: linkerd-dst-headless.linkerd.svc.cluster.local:8086 - name: LINKERD2_PROXY_DESTINATION_GET_NETWORKS value: "10.0.0.0/8,172.16.0.0/12,192.168.0.0/16" - name: LINKERD2_PROXY_DESTINATION_PROFILE_NETWORKS value: "10.0.0.0/8,172.16.0.0/12,192.168.0.0/16" - name: LINKERD2_PROXY_INBOUND_CONNECT_TIMEOUT value: "100ms" - name: LINKERD2_PROXY_OUTBOUND_CONNECT_TIMEOUT value: "1000ms" - name: LINKERD2_PROXY_CONTROL_LISTEN_ADDR value: 0.0.0.0:4190 - name: LINKERD2_PROXY_ADMIN_LISTEN_ADDR value: 0.0.0.0:4191 - name: LINKERD2_PROXY_OUTBOUND_LISTEN_ADDR value: 127.0.0.1:4140 - name: LINKERD2_PROXY_INBOUND_LISTEN_ADDR value: 0.0.0.0:4143 - name: LINKERD2_PROXY_DESTINATION_GET_SUFFIXES value: svc.cluster.local. - name: LINKERD2_PROXY_DESTINATION_PROFILE_SUFFIXES value: svc.cluster.local. - name: LINKERD2_PROXY_INBOUND_ACCEPT_KEEPALIVE value: 10000ms - name: LINKERD2_PROXY_OUTBOUND_CONNECT_KEEPALIVE value: 10000ms - name: _pod_ns valueFrom: fieldRef: fieldPath: metadata.namespace - name: _pod_nodeName valueFrom: fieldRef: fieldPath: spec.nodeName - name: LINKERD2_PROXY_DESTINATION_CONTEXT value: | {"ns":"$(_pod_ns)", "nodeName":"$(_pod_nodeName)"} - name: LINKERD2_PROXY_IDENTITY_DIR value: /var/run/linkerd/identity/end-entity - name: LINKERD2_PROXY_IDENTITY_TRUST_ANCHORS value: | -----BEGIN CERTIFICATE----- MIIBrTCCAVSgAwIBAgIBATAKBggqhkjOPQQDAjApMScwJQYDVQQDEx5pZGVudGl0 eS5saW5rZXJkLmNsdXN0ZXIubG9jYWwwHhcNMjAxMDA0MDI0ODQwWhcNMjExMDA0 MDI0OTAwWjApMScwJQYDVQQDEx5pZGVudGl0eS5saW5rZXJkLmNsdXN0ZXIubG9j YWwwWTATBgcqhkjOPQIBBggqhkjOPQMBBwNCAASZmf4G3Gv0uLIghidK7hi8JQBy 2SpE0SvMdkxcq5jWnkCcqaIla55PgsTrDE5kFQ0INslrJaKxzGnDE22uvI9xo20w azAOBgNVHQ8BAf8EBAMCAQYwHQYDVR0lBBYwFAYIKwYBBQUHAwEGCCsGAQUFBwMC MA8GA1UdEwEB/wQFMAMBAf8wKQYDVR0RBCIwIIIeaWRlbnRpdHkubGlua2VyZC5j bHVzdGVyLmxvY2FsMAoGCCqGSM49BAMCA0cAMEQCIEI5jVjmF2WPdtqvBI+uGqUh 40GgD/83Y6iOCDULHpBqAiAOfBx0sOwo2rvaiG7DQfrj2n6UQrQIHcxmiTD+9Lb0 Kg== -----END CERTIFICATE----- - name: LINKERD2_PROXY_IDENTITY_TOKEN_FILE value: /var/run/secrets/kubernetes.io/serviceaccount/token - name: LINKERD2_PROXY_IDENTITY_SVC_ADDR value: linkerd-identity-headless.linkerd.svc.cluster.local:8080 - name: _pod_sa valueFrom: fieldRef: fieldPath: spec.serviceAccountName - name: _l5d_ns value: linkerd - name: _l5d_trustdomain value: cluster.local - name: LINKERD2_PROXY_IDENTITY_LOCAL_NAME value: $(_pod_sa).$(_pod_ns).serviceaccount.identity.$(_l5d_ns).$(_l5d_trustdomain) - name: LINKERD2_PROXY_IDENTITY_SVC_NAME value: linkerd-identity.$(_l5d_ns).serviceaccount.identity.$(_l5d_ns).$(_l5d_trustdomain) - name: LINKERD2_PROXY_DESTINATION_SVC_NAME value: linkerd-destination.$(_l5d_ns).serviceaccount.identity.$(_l5d_ns).$(_l5d_trustdomain) - name: LINKERD2_PROXY_TAP_SVC_NAME value: linkerd-tap.$(_l5d_ns).serviceaccount.identity.$(_l5d_ns).$(_l5d_trustdomain) image: ghcr.io/linkerd/proxy:edge-20.10.1 imagePullPolicy: IfNotPresent livenessProbe: httpGet: path: /live port: 4191 initialDelaySeconds: 10 name: linkerd-proxy ports: - containerPort: 4143 name: linkerd-proxy - containerPort: 4191 name: linkerd-admin readinessProbe: httpGet: path: /ready port: 4191 initialDelaySeconds: 2 resources: securityContext: allowPrivilegeEscalation: false readOnlyRootFilesystem: true runAsUser: 2102 terminationMessagePolicy: FallbackToLogsOnError volumeMounts: - mountPath: /var/run/linkerd/identity/end-entity name: linkerd-identity-end-entity initContainers: - args: - --incoming-proxy-port - "4143" - --outgoing-proxy-port - "4140" - --proxy-uid - "2102" - --inbound-ports-to-ignore - 4190,4191 - --outbound-ports-to-ignore - "443" image: ghcr.io/linkerd/proxy-init:v1.3.6 imagePullPolicy: IfNotPresent name: linkerd-init resources: limits: cpu: "100m" memory: "50Mi" requests: cpu: "10m" memory: "10Mi" securityContext: allowPrivilegeEscalation: false capabilities: add: - NET_ADMIN - NET_RAW privileged: false readOnlyRootFilesystem: true runAsNonRoot: false runAsUser: 0 terminationMessagePolicy: FallbackToLogsOnError volumeMounts: - mountPath: /run name: linkerd-proxy-init-xtables-lock serviceAccountName: linkerd-proxy-injector volumes: - configMap: name: linkerd-config name: config - name: tls secret: secretName: linkerd-proxy-injector-k8s-tls - emptyDir: {} name: linkerd-proxy-init-xtables-lock - emptyDir: medium: Memory name: linkerd-identity-end-entity --- kind: Service apiVersion: v1 metadata: name: linkerd-proxy-injector namespace: linkerd labels: linkerd.io/control-plane-component: proxy-injector linkerd.io/control-plane-ns: linkerd annotations: linkerd.io/created-by: linkerd/cli edge-20.10.1 spec: type: ClusterIP selector: linkerd.io/control-plane-component: proxy-injector ports: - name: proxy-injector port: 443 targetPort: proxy-injector --- ### ### Service Profile Validator ### --- kind: Service apiVersion: v1 metadata: name: linkerd-sp-validator namespace: linkerd labels: linkerd.io/control-plane-component: sp-validator linkerd.io/control-plane-ns: linkerd annotations: linkerd.io/created-by: linkerd/cli edge-20.10.1 spec: type: ClusterIP selector: linkerd.io/control-plane-component: sp-validator ports: - name: sp-validator port: 443 targetPort: sp-validator --- apiVersion: apps/v1 kind: Deployment metadata: annotations: linkerd.io/created-by: linkerd/cli edge-20.10.1 labels: app.kubernetes.io/name: sp-validator app.kubernetes.io/part-of: Linkerd app.kubernetes.io/version: edge-20.10.1 linkerd.io/control-plane-component: sp-validator linkerd.io/control-plane-ns: linkerd name: linkerd-sp-validator namespace: linkerd spec: replicas: 1 selector: matchLabels: linkerd.io/control-plane-component: sp-validator template: metadata: annotations: linkerd.io/created-by: linkerd/cli edge-20.10.1 linkerd.io/identity-mode: default linkerd.io/proxy-version: edge-20.10.1 labels: linkerd.io/control-plane-component: sp-validator linkerd.io/control-plane-ns: linkerd linkerd.io/workload-ns: linkerd linkerd.io/proxy-deployment: linkerd-sp-validator spec: nodeSelector: beta.kubernetes.io/os: linux containers: - args: - sp-validator - -log-level=info image: ghcr.io/linkerd/controller:edge-20.10.1 imagePullPolicy: IfNotPresent livenessProbe: httpGet: path: /ping port: 9997 initialDelaySeconds: 10 name: sp-validator ports: - containerPort: 8443 name: sp-validator - containerPort: 9997 name: admin-http readinessProbe: failureThreshold: 7 httpGet: path: /ready port: 9997 securityContext: runAsUser: 2103 volumeMounts: - mountPath: /var/run/linkerd/tls name: tls readOnly: true - env: - name: LINKERD2_PROXY_LOG value: warn,linkerd=info - name: LINKERD2_PROXY_LOG_FORMAT value: plain - name: LINKERD2_PROXY_DESTINATION_SVC_ADDR value: linkerd-dst-headless.linkerd.svc.cluster.local:8086 - name: LINKERD2_PROXY_DESTINATION_GET_NETWORKS value: "10.0.0.0/8,172.16.0.0/12,192.168.0.0/16" - name: LINKERD2_PROXY_DESTINATION_PROFILE_NETWORKS value: "10.0.0.0/8,172.16.0.0/12,192.168.0.0/16" - name: LINKERD2_PROXY_INBOUND_CONNECT_TIMEOUT value: "100ms" - name: LINKERD2_PROXY_OUTBOUND_CONNECT_TIMEOUT value: "1000ms" - name: LINKERD2_PROXY_CONTROL_LISTEN_ADDR value: 0.0.0.0:4190 - name: LINKERD2_PROXY_ADMIN_LISTEN_ADDR value: 0.0.0.0:4191 - name: LINKERD2_PROXY_OUTBOUND_LISTEN_ADDR value: 127.0.0.1:4140 - name: LINKERD2_PROXY_INBOUND_LISTEN_ADDR value: 0.0.0.0:4143 - name: LINKERD2_PROXY_DESTINATION_GET_SUFFIXES value: svc.cluster.local. - name: LINKERD2_PROXY_DESTINATION_PROFILE_SUFFIXES value: svc.cluster.local. - name: LINKERD2_PROXY_INBOUND_ACCEPT_KEEPALIVE value: 10000ms - name: LINKERD2_PROXY_OUTBOUND_CONNECT_KEEPALIVE value: 10000ms - name: _pod_ns valueFrom: fieldRef: fieldPath: metadata.namespace - name: _pod_nodeName valueFrom: fieldRef: fieldPath: spec.nodeName - name: LINKERD2_PROXY_DESTINATION_CONTEXT value: | {"ns":"$(_pod_ns)", "nodeName":"$(_pod_nodeName)"} - name: LINKERD2_PROXY_IDENTITY_DIR value: /var/run/linkerd/identity/end-entity - name: LINKERD2_PROXY_IDENTITY_TRUST_ANCHORS value: | -----BEGIN CERTIFICATE----- MIIBrTCCAVSgAwIBAgIBATAKBggqhkjOPQQDAjApMScwJQYDVQQDEx5pZGVudGl0 eS5saW5rZXJkLmNsdXN0ZXIubG9jYWwwHhcNMjAxMDA0MDI0ODQwWhcNMjExMDA0 MDI0OTAwWjApMScwJQYDVQQDEx5pZGVudGl0eS5saW5rZXJkLmNsdXN0ZXIubG9j YWwwWTATBgcqhkjOPQIBBggqhkjOPQMBBwNCAASZmf4G3Gv0uLIghidK7hi8JQBy 2SpE0SvMdkxcq5jWnkCcqaIla55PgsTrDE5kFQ0INslrJaKxzGnDE22uvI9xo20w azAOBgNVHQ8BAf8EBAMCAQYwHQYDVR0lBBYwFAYIKwYBBQUHAwEGCCsGAQUFBwMC MA8GA1UdEwEB/wQFMAMBAf8wKQYDVR0RBCIwIIIeaWRlbnRpdHkubGlua2VyZC5j bHVzdGVyLmxvY2FsMAoGCCqGSM49BAMCA0cAMEQCIEI5jVjmF2WPdtqvBI+uGqUh 40GgD/83Y6iOCDULHpBqAiAOfBx0sOwo2rvaiG7DQfrj2n6UQrQIHcxmiTD+9Lb0 Kg== -----END CERTIFICATE----- - name: LINKERD2_PROXY_IDENTITY_TOKEN_FILE value: /var/run/secrets/kubernetes.io/serviceaccount/token - name: LINKERD2_PROXY_IDENTITY_SVC_ADDR value: linkerd-identity-headless.linkerd.svc.cluster.local:8080 - name: _pod_sa valueFrom: fieldRef: fieldPath: spec.serviceAccountName - name: _l5d_ns value: linkerd - name: _l5d_trustdomain value: cluster.local - name: LINKERD2_PROXY_IDENTITY_LOCAL_NAME value: $(_pod_sa).$(_pod_ns).serviceaccount.identity.$(_l5d_ns).$(_l5d_trustdomain) - name: LINKERD2_PROXY_IDENTITY_SVC_NAME value: linkerd-identity.$(_l5d_ns).serviceaccount.identity.$(_l5d_ns).$(_l5d_trustdomain) - name: LINKERD2_PROXY_DESTINATION_SVC_NAME value: linkerd-destination.$(_l5d_ns).serviceaccount.identity.$(_l5d_ns).$(_l5d_trustdomain) - name: LINKERD2_PROXY_TAP_SVC_NAME value: linkerd-tap.$(_l5d_ns).serviceaccount.identity.$(_l5d_ns).$(_l5d_trustdomain) image: ghcr.io/linkerd/proxy:edge-20.10.1 imagePullPolicy: IfNotPresent livenessProbe: httpGet: path: /live port: 4191 initialDelaySeconds: 10 name: linkerd-proxy ports: - containerPort: 4143 name: linkerd-proxy - containerPort: 4191 name: linkerd-admin readinessProbe: httpGet: path: /ready port: 4191 initialDelaySeconds: 2 resources: securityContext: allowPrivilegeEscalation: false readOnlyRootFilesystem: true runAsUser: 2102 terminationMessagePolicy: FallbackToLogsOnError volumeMounts: - mountPath: /var/run/linkerd/identity/end-entity name: linkerd-identity-end-entity initContainers: - args: - --incoming-proxy-port - "4143" - --outgoing-proxy-port - "4140" - --proxy-uid - "2102" - --inbound-ports-to-ignore - 4190,4191 - --outbound-ports-to-ignore - "443" image: ghcr.io/linkerd/proxy-init:v1.3.6 imagePullPolicy: IfNotPresent name: linkerd-init resources: limits: cpu: "100m" memory: "50Mi" requests: cpu: "10m" memory: "10Mi" securityContext: allowPrivilegeEscalation: false capabilities: add: - NET_ADMIN - NET_RAW privileged: false readOnlyRootFilesystem: true runAsNonRoot: false runAsUser: 0 terminationMessagePolicy: FallbackToLogsOnError volumeMounts: - mountPath: /run name: linkerd-proxy-init-xtables-lock serviceAccountName: linkerd-sp-validator volumes: - name: tls secret: secretName: linkerd-sp-validator-k8s-tls - emptyDir: {} name: linkerd-proxy-init-xtables-lock - emptyDir: medium: Memory name: linkerd-identity-end-entity --- ### ### Tap ### --- kind: Service apiVersion: v1 metadata: name: linkerd-tap namespace: linkerd labels: linkerd.io/control-plane-component: tap linkerd.io/control-plane-ns: linkerd annotations: linkerd.io/created-by: linkerd/cli edge-20.10.1 spec: type: ClusterIP selector: linkerd.io/control-plane-component: tap ports: - name: grpc port: 8088 targetPort: 8088 - name: apiserver port: 443 targetPort: apiserver --- kind: Deployment apiVersion: apps/v1 metadata: annotations: linkerd.io/created-by: linkerd/cli edge-20.10.1 labels: app.kubernetes.io/name: tap app.kubernetes.io/part-of: Linkerd app.kubernetes.io/version: edge-20.10.1 linkerd.io/control-plane-component: tap linkerd.io/control-plane-ns: linkerd name: linkerd-tap namespace: linkerd spec: replicas: 1 selector: matchLabels: linkerd.io/control-plane-component: tap linkerd.io/control-plane-ns: linkerd linkerd.io/proxy-deployment: linkerd-tap template: metadata: annotations: linkerd.io/created-by: linkerd/cli edge-20.10.1 linkerd.io/identity-mode: default linkerd.io/proxy-version: edge-20.10.1 labels: linkerd.io/control-plane-component: tap linkerd.io/control-plane-ns: linkerd linkerd.io/workload-ns: linkerd linkerd.io/proxy-deployment: linkerd-tap spec: nodeSelector: beta.kubernetes.io/os: linux containers: - args: - tap - -controller-namespace=linkerd - -log-level=info image: ghcr.io/linkerd/controller:edge-20.10.1 imagePullPolicy: IfNotPresent livenessProbe: httpGet: path: /ping port: 9998 initialDelaySeconds: 10 name: tap ports: - containerPort: 8088 name: grpc - containerPort: 8089 name: apiserver - containerPort: 9998 name: admin-http readinessProbe: failureThreshold: 7 httpGet: path: /ready port: 9998 securityContext: runAsUser: 2103 volumeMounts: - mountPath: /var/run/linkerd/tls name: tls readOnly: true - mountPath: /var/run/linkerd/config name: config - env: - name: LINKERD2_PROXY_LOG value: warn,linkerd=info - name: LINKERD2_PROXY_LOG_FORMAT value: plain - name: LINKERD2_PROXY_DESTINATION_SVC_ADDR value: linkerd-dst-headless.linkerd.svc.cluster.local:8086 - name: LINKERD2_PROXY_DESTINATION_GET_NETWORKS value: "10.0.0.0/8,172.16.0.0/12,192.168.0.0/16" - name: LINKERD2_PROXY_DESTINATION_PROFILE_NETWORKS value: "10.0.0.0/8,172.16.0.0/12,192.168.0.0/16" - name: LINKERD2_PROXY_INBOUND_CONNECT_TIMEOUT value: "100ms" - name: LINKERD2_PROXY_OUTBOUND_CONNECT_TIMEOUT value: "1000ms" - name: LINKERD2_PROXY_CONTROL_LISTEN_ADDR value: 0.0.0.0:4190 - name: LINKERD2_PROXY_ADMIN_LISTEN_ADDR value: 0.0.0.0:4191 - name: LINKERD2_PROXY_OUTBOUND_LISTEN_ADDR value: 127.0.0.1:4140 - name: LINKERD2_PROXY_INBOUND_LISTEN_ADDR value: 0.0.0.0:4143 - name: LINKERD2_PROXY_DESTINATION_GET_SUFFIXES value: svc.cluster.local. - name: LINKERD2_PROXY_DESTINATION_PROFILE_SUFFIXES value: svc.cluster.local. - name: LINKERD2_PROXY_INBOUND_ACCEPT_KEEPALIVE value: 10000ms - name: LINKERD2_PROXY_OUTBOUND_CONNECT_KEEPALIVE value: 10000ms - name: _pod_ns valueFrom: fieldRef: fieldPath: metadata.namespace - name: _pod_nodeName valueFrom: fieldRef: fieldPath: spec.nodeName - name: LINKERD2_PROXY_DESTINATION_CONTEXT value: | {"ns":"$(_pod_ns)", "nodeName":"$(_pod_nodeName)"} - name: LINKERD2_PROXY_IDENTITY_DIR value: /var/run/linkerd/identity/end-entity - name: LINKERD2_PROXY_IDENTITY_TRUST_ANCHORS value: | -----BEGIN CERTIFICATE----- MIIBrTCCAVSgAwIBAgIBATAKBggqhkjOPQQDAjApMScwJQYDVQQDEx5pZGVudGl0 eS5saW5rZXJkLmNsdXN0ZXIubG9jYWwwHhcNMjAxMDA0MDI0ODQwWhcNMjExMDA0 MDI0OTAwWjApMScwJQYDVQQDEx5pZGVudGl0eS5saW5rZXJkLmNsdXN0ZXIubG9j YWwwWTATBgcqhkjOPQIBBggqhkjOPQMBBwNCAASZmf4G3Gv0uLIghidK7hi8JQBy 2SpE0SvMdkxcq5jWnkCcqaIla55PgsTrDE5kFQ0INslrJaKxzGnDE22uvI9xo20w azAOBgNVHQ8BAf8EBAMCAQYwHQYDVR0lBBYwFAYIKwYBBQUHAwEGCCsGAQUFBwMC MA8GA1UdEwEB/wQFMAMBAf8wKQYDVR0RBCIwIIIeaWRlbnRpdHkubGlua2VyZC5j bHVzdGVyLmxvY2FsMAoGCCqGSM49BAMCA0cAMEQCIEI5jVjmF2WPdtqvBI+uGqUh 40GgD/83Y6iOCDULHpBqAiAOfBx0sOwo2rvaiG7DQfrj2n6UQrQIHcxmiTD+9Lb0 Kg== -----END CERTIFICATE----- - name: LINKERD2_PROXY_IDENTITY_TOKEN_FILE value: /var/run/secrets/kubernetes.io/serviceaccount/token - name: LINKERD2_PROXY_IDENTITY_SVC_ADDR value: linkerd-identity-headless.linkerd.svc.cluster.local:8080 - name: _pod_sa valueFrom: fieldRef: fieldPath: spec.serviceAccountName - name: _l5d_ns value: linkerd - name: _l5d_trustdomain value: cluster.local - name: LINKERD2_PROXY_IDENTITY_LOCAL_NAME value: $(_pod_sa).$(_pod_ns).serviceaccount.identity.$(_l5d_ns).$(_l5d_trustdomain) - name: LINKERD2_PROXY_IDENTITY_SVC_NAME value: linkerd-identity.$(_l5d_ns).serviceaccount.identity.$(_l5d_ns).$(_l5d_trustdomain) - name: LINKERD2_PROXY_DESTINATION_SVC_NAME value: linkerd-destination.$(_l5d_ns).serviceaccount.identity.$(_l5d_ns).$(_l5d_trustdomain) - name: LINKERD2_PROXY_TAP_SVC_NAME value: linkerd-tap.$(_l5d_ns).serviceaccount.identity.$(_l5d_ns).$(_l5d_trustdomain) image: ghcr.io/linkerd/proxy:edge-20.10.1 imagePullPolicy: IfNotPresent livenessProbe: httpGet: path: /live port: 4191 initialDelaySeconds: 10 name: linkerd-proxy ports: - containerPort: 4143 name: linkerd-proxy - containerPort: 4191 name: linkerd-admin readinessProbe: httpGet: path: /ready port: 4191 initialDelaySeconds: 2 resources: securityContext: allowPrivilegeEscalation: false readOnlyRootFilesystem: true runAsUser: 2102 terminationMessagePolicy: FallbackToLogsOnError volumeMounts: - mountPath: /var/run/linkerd/identity/end-entity name: linkerd-identity-end-entity initContainers: - args: - --incoming-proxy-port - "4143" - --outgoing-proxy-port - "4140" - --proxy-uid - "2102" - --inbound-ports-to-ignore - 4190,4191 - --outbound-ports-to-ignore - "443" image: ghcr.io/linkerd/proxy-init:v1.3.6 imagePullPolicy: IfNotPresent name: linkerd-init resources: limits: cpu: "100m" memory: "50Mi" requests: cpu: "10m" memory: "10Mi" securityContext: allowPrivilegeEscalation: false capabilities: add: - NET_ADMIN - NET_RAW privileged: false readOnlyRootFilesystem: true runAsNonRoot: false runAsUser: 0 terminationMessagePolicy: FallbackToLogsOnError volumeMounts: - mountPath: /run name: linkerd-proxy-init-xtables-lock serviceAccountName: linkerd-tap volumes: - configMap: name: linkerd-config name: config - emptyDir: {} name: linkerd-proxy-init-xtables-lock - emptyDir: medium: Memory name: linkerd-identity-end-entity - name: tls secret: secretName: linkerd-tap-k8s-tls --- ### ### linkerd add-ons configuration ### --- kind: ConfigMap apiVersion: v1 metadata: name: linkerd-config-addons namespace: linkerd labels: linkerd.io/control-plane-ns: linkerd annotations: linkerd.io/created-by: linkerd/cli edge-20.10.1 data: values: |- global: prometheusUrl: "" grafanaUrl: "" grafana: enabled: true prometheus: enabled: true tracing: enabled: false --- ### ### Grafana RBAC ### --- kind: ServiceAccount apiVersion: v1 metadata: name: linkerd-grafana namespace: linkerd labels: linkerd.io/control-plane-component: grafana linkerd.io/control-plane-ns: linkerd --- ### ### Grafana ### --- kind: ConfigMap apiVersion: v1 metadata: name: linkerd-grafana-config namespace: linkerd labels: linkerd.io/control-plane-component: grafana linkerd.io/control-plane-ns: linkerd annotations: linkerd.io/created-by: linkerd/cli edge-20.10.1 data: grafana.ini: |- instance_name = linkerd-grafana [server] root_url = %(protocol)s://%(domain)s:/grafana/ [auth] disable_login_form = true [auth.anonymous] enabled = true org_role = Editor [auth.basic] enabled = false [analytics] check_for_updates = false [panels] disable_sanitize_html = true datasources.yaml: |- apiVersion: 1 datasources: - name: prometheus type: prometheus access: proxy orgId: 1 url: http://linkerd-prometheus.linkerd.svc.cluster.local:9090 isDefault: true jsonData: timeInterval: "5s" version: 1 editable: true dashboards.yaml: |- apiVersion: 1 providers: - name: 'default' orgId: 1 folder: '' type: file disableDeletion: true editable: true options: path: /var/lib/grafana/dashboards homeDashboardId: linkerd-top-line --- kind: Service apiVersion: v1 metadata: name: linkerd-grafana namespace: linkerd labels: linkerd.io/control-plane-component: grafana linkerd.io/control-plane-ns: linkerd annotations: linkerd.io/created-by: linkerd/cli edge-20.10.1 spec: type: ClusterIP selector: linkerd.io/control-plane-component: grafana ports: - name: http port: 3000 targetPort: 3000 --- apiVersion: apps/v1 kind: Deployment metadata: annotations: linkerd.io/created-by: linkerd/cli edge-20.10.1 labels: app.kubernetes.io/name: grafana app.kubernetes.io/part-of: Linkerd app.kubernetes.io/version: edge-20.10.1 linkerd.io/control-plane-component: grafana linkerd.io/control-plane-ns: linkerd name: linkerd-grafana namespace: linkerd spec: replicas: 1 selector: matchLabels: linkerd.io/control-plane-component: grafana linkerd.io/control-plane-ns: linkerd linkerd.io/proxy-deployment: linkerd-grafana template: metadata: annotations: linkerd.io/created-by: linkerd/cli edge-20.10.1 linkerd.io/identity-mode: default linkerd.io/proxy-version: edge-20.10.1 labels: linkerd.io/control-plane-component: grafana linkerd.io/control-plane-ns: linkerd linkerd.io/workload-ns: linkerd linkerd.io/proxy-deployment: linkerd-grafana spec: nodeSelector: beta.kubernetes.io/os: linux containers: - env: - name: GF_PATHS_DATA value: /data # Force using the go-based DNS resolver instead of the OS' to avoid failures in some environments # see https://github.com/grafana/grafana/issues/20096 - name: GODEBUG value: netdns=go image: ghcr.io/linkerd/grafana:edge-20.10.1 imagePullPolicy: IfNotPresent livenessProbe: httpGet: path: /api/health port: 3000 initialDelaySeconds: 30 name: grafana ports: - containerPort: 3000 name: http readinessProbe: httpGet: path: /api/health port: 3000 securityContext: runAsUser: 472 volumeMounts: - mountPath: /data name: data - mountPath: /etc/grafana name: grafana-config readOnly: true - env: - name: LINKERD2_PROXY_LOG value: warn,linkerd=info - name: LINKERD2_PROXY_LOG_FORMAT value: plain - name: LINKERD2_PROXY_DESTINATION_SVC_ADDR value: linkerd-dst-headless.linkerd.svc.cluster.local:8086 - name: LINKERD2_PROXY_DESTINATION_GET_NETWORKS value: "10.0.0.0/8,172.16.0.0/12,192.168.0.0/16" - name: LINKERD2_PROXY_DESTINATION_PROFILE_NETWORKS value: "10.0.0.0/8,172.16.0.0/12,192.168.0.0/16" - name: LINKERD2_PROXY_INBOUND_CONNECT_TIMEOUT value: "100ms" - name: LINKERD2_PROXY_OUTBOUND_CONNECT_TIMEOUT value: "1000ms" - name: LINKERD2_PROXY_CONTROL_LISTEN_ADDR value: 0.0.0.0:4190 - name: LINKERD2_PROXY_ADMIN_LISTEN_ADDR value: 0.0.0.0:4191 - name: LINKERD2_PROXY_OUTBOUND_LISTEN_ADDR value: 127.0.0.1:4140 - name: LINKERD2_PROXY_INBOUND_LISTEN_ADDR value: 0.0.0.0:4143 - name: LINKERD2_PROXY_DESTINATION_GET_SUFFIXES value: svc.cluster.local. - name: LINKERD2_PROXY_DESTINATION_PROFILE_SUFFIXES value: svc.cluster.local. - name: LINKERD2_PROXY_INBOUND_ACCEPT_KEEPALIVE value: 10000ms - name: LINKERD2_PROXY_OUTBOUND_CONNECT_KEEPALIVE value: 10000ms - name: _pod_ns valueFrom: fieldRef: fieldPath: metadata.namespace - name: _pod_nodeName valueFrom: fieldRef: fieldPath: spec.nodeName - name: LINKERD2_PROXY_DESTINATION_CONTEXT value: | {"ns":"$(_pod_ns)", "nodeName":"$(_pod_nodeName)"} - name: LINKERD2_PROXY_IDENTITY_DIR value: /var/run/linkerd/identity/end-entity - name: LINKERD2_PROXY_IDENTITY_TRUST_ANCHORS value: | -----BEGIN CERTIFICATE----- MIIBrTCCAVSgAwIBAgIBATAKBggqhkjOPQQDAjApMScwJQYDVQQDEx5pZGVudGl0 eS5saW5rZXJkLmNsdXN0ZXIubG9jYWwwHhcNMjAxMDA0MDI0ODQwWhcNMjExMDA0 MDI0OTAwWjApMScwJQYDVQQDEx5pZGVudGl0eS5saW5rZXJkLmNsdXN0ZXIubG9j YWwwWTATBgcqhkjOPQIBBggqhkjOPQMBBwNCAASZmf4G3Gv0uLIghidK7hi8JQBy 2SpE0SvMdkxcq5jWnkCcqaIla55PgsTrDE5kFQ0INslrJaKxzGnDE22uvI9xo20w azAOBgNVHQ8BAf8EBAMCAQYwHQYDVR0lBBYwFAYIKwYBBQUHAwEGCCsGAQUFBwMC MA8GA1UdEwEB/wQFMAMBAf8wKQYDVR0RBCIwIIIeaWRlbnRpdHkubGlua2VyZC5j bHVzdGVyLmxvY2FsMAoGCCqGSM49BAMCA0cAMEQCIEI5jVjmF2WPdtqvBI+uGqUh 40GgD/83Y6iOCDULHpBqAiAOfBx0sOwo2rvaiG7DQfrj2n6UQrQIHcxmiTD+9Lb0 Kg== -----END CERTIFICATE----- - name: LINKERD2_PROXY_IDENTITY_TOKEN_FILE value: /var/run/secrets/kubernetes.io/serviceaccount/token - name: LINKERD2_PROXY_IDENTITY_SVC_ADDR value: linkerd-identity-headless.linkerd.svc.cluster.local:8080 - name: _pod_sa valueFrom: fieldRef: fieldPath: spec.serviceAccountName - name: _l5d_ns value: linkerd - name: _l5d_trustdomain value: cluster.local - name: LINKERD2_PROXY_IDENTITY_LOCAL_NAME value: $(_pod_sa).$(_pod_ns).serviceaccount.identity.$(_l5d_ns).$(_l5d_trustdomain) - name: LINKERD2_PROXY_IDENTITY_SVC_NAME value: linkerd-identity.$(_l5d_ns).serviceaccount.identity.$(_l5d_ns).$(_l5d_trustdomain) - name: LINKERD2_PROXY_DESTINATION_SVC_NAME value: linkerd-destination.$(_l5d_ns).serviceaccount.identity.$(_l5d_ns).$(_l5d_trustdomain) - name: LINKERD2_PROXY_TAP_SVC_NAME value: linkerd-tap.$(_l5d_ns).serviceaccount.identity.$(_l5d_ns).$(_l5d_trustdomain) image: ghcr.io/linkerd/proxy:edge-20.10.1 imagePullPolicy: IfNotPresent livenessProbe: httpGet: path: /live port: 4191 initialDelaySeconds: 10 name: linkerd-proxy ports: - containerPort: 4143 name: linkerd-proxy - containerPort: 4191 name: linkerd-admin readinessProbe: httpGet: path: /ready port: 4191 initialDelaySeconds: 2 resources: securityContext: allowPrivilegeEscalation: false readOnlyRootFilesystem: true runAsUser: 2102 terminationMessagePolicy: FallbackToLogsOnError volumeMounts: - mountPath: /var/run/linkerd/identity/end-entity name: linkerd-identity-end-entity initContainers: - args: - --incoming-proxy-port - "4143" - --outgoing-proxy-port - "4140" - --proxy-uid - "2102" - --inbound-ports-to-ignore - 4190,4191 - --outbound-ports-to-ignore - "443" image: ghcr.io/linkerd/proxy-init:v1.3.6 imagePullPolicy: IfNotPresent name: linkerd-init resources: limits: cpu: "100m" memory: "50Mi" requests: cpu: "10m" memory: "10Mi" securityContext: allowPrivilegeEscalation: false capabilities: add: - NET_ADMIN - NET_RAW privileged: false readOnlyRootFilesystem: true runAsNonRoot: false runAsUser: 0 terminationMessagePolicy: FallbackToLogsOnError volumeMounts: - mountPath: /run name: linkerd-proxy-init-xtables-lock serviceAccountName: linkerd-grafana volumes: - emptyDir: {} name: data - configMap: items: - key: grafana.ini path: grafana.ini - key: datasources.yaml path: provisioning/datasources/datasources.yaml - key: dashboards.yaml path: provisioning/dashboards/dashboards.yaml name: linkerd-grafana-config name: grafana-config - emptyDir: {} name: linkerd-proxy-init-xtables-lock - emptyDir: medium: Memory name: linkerd-identity-end-entity --- ### ### Prometheus RBAC ### --- kind: ClusterRole apiVersion: rbac.authorization.k8s.io/v1 metadata: name: linkerd-linkerd-prometheus labels: linkerd.io/control-plane-component: prometheus linkerd.io/control-plane-ns: linkerd rules: - apiGroups: [""] resources: ["nodes", "nodes/proxy", "pods"] verbs: ["get", "list", "watch"] --- kind: ClusterRoleBinding apiVersion: rbac.authorization.k8s.io/v1 metadata: name: linkerd-linkerd-prometheus labels: linkerd.io/control-plane-component: prometheus linkerd.io/control-plane-ns: linkerd roleRef: apiGroup: rbac.authorization.k8s.io kind: ClusterRole name: linkerd-linkerd-prometheus subjects: - kind: ServiceAccount name: linkerd-prometheus namespace: linkerd --- kind: ServiceAccount apiVersion: v1 metadata: name: linkerd-prometheus namespace: linkerd labels: linkerd.io/control-plane-component: prometheus linkerd.io/control-plane-ns: linkerd --- ### ### Prometheus ### --- kind: ConfigMap apiVersion: v1 metadata: name: linkerd-prometheus-config namespace: linkerd labels: linkerd.io/control-plane-component: prometheus linkerd.io/control-plane-ns: linkerd annotations: linkerd.io/created-by: linkerd/cli edge-20.10.1 data: prometheus.yml: |- global: evaluation_interval: 10s scrape_interval: 10s scrape_timeout: 10s rule_files: - /etc/prometheus/*_rules.yml - /etc/prometheus/*_rules.yaml scrape_configs: - job_name: 'prometheus' static_configs: - targets: ['localhost:9090'] - job_name: 'grafana' kubernetes_sd_configs: - role: pod namespaces: names: ['linkerd'] relabel_configs: - source_labels: - __meta_kubernetes_pod_container_name action: keep regex: ^grafana$ # Required for: https://grafana.com/grafana/dashboards/315 - job_name: 'kubernetes-nodes-cadvisor' scheme: https tls_config: ca_file: /var/run/secrets/kubernetes.io/serviceaccount/ca.crt insecure_skip_verify: true bearer_token_file: /var/run/secrets/kubernetes.io/serviceaccount/token kubernetes_sd_configs: - role: node relabel_configs: - action: labelmap regex: __meta_kubernetes_node_label_(.+) - target_label: __address__ replacement: kubernetes.default.svc:443 - source_labels: [__meta_kubernetes_node_name] regex: (.+) target_label: __metrics_path__ replacement: /api/v1/nodes/$1/proxy/metrics/cadvisor metric_relabel_configs: - source_labels: [__name__] regex: '(container|machine)_(cpu|memory|network|fs)_(.+)' action: keep - source_labels: [__name__] regex: 'container_memory_failures_total' # unneeded large metric action: drop - job_name: 'linkerd-controller' kubernetes_sd_configs: - role: pod namespaces: names: ['linkerd'] relabel_configs: - source_labels: - __meta_kubernetes_pod_label_linkerd_io_control_plane_component - __meta_kubernetes_pod_container_port_name action: keep regex: (.*);admin-http$ - source_labels: [__meta_kubernetes_pod_container_name] action: replace target_label: component - job_name: 'linkerd-service-mirror' kubernetes_sd_configs: - role: pod relabel_configs: - source_labels: - __meta_kubernetes_pod_label_linkerd_io_control_plane_component - __meta_kubernetes_pod_container_port_name action: keep regex: linkerd-service-mirror;admin-http$ - source_labels: [__meta_kubernetes_pod_container_name] action: replace target_label: component - job_name: 'linkerd-proxy' kubernetes_sd_configs: - role: pod relabel_configs: - source_labels: - __meta_kubernetes_pod_container_name - __meta_kubernetes_pod_container_port_name - __meta_kubernetes_pod_label_linkerd_io_control_plane_ns action: keep regex: ^linkerd-proxy;linkerd-admin;linkerd$ - source_labels: [__meta_kubernetes_namespace] action: replace target_label: namespace - source_labels: [__meta_kubernetes_pod_name] action: replace target_label: pod # special case k8s' "job" label, to not interfere with prometheus' "job" # label # __meta_kubernetes_pod_label_linkerd_io_proxy_job=foo => # k8s_job=foo - source_labels: [__meta_kubernetes_pod_label_linkerd_io_proxy_job] action: replace target_label: k8s_job # drop __meta_kubernetes_pod_label_linkerd_io_proxy_job - action: labeldrop regex: __meta_kubernetes_pod_label_linkerd_io_proxy_job # __meta_kubernetes_pod_label_linkerd_io_proxy_deployment=foo => # deployment=foo - action: labelmap regex: __meta_kubernetes_pod_label_linkerd_io_proxy_(.+) # drop all labels that we just made copies of in the previous labelmap - action: labeldrop regex: __meta_kubernetes_pod_label_linkerd_io_proxy_(.+) # __meta_kubernetes_pod_label_linkerd_io_foo=bar => # foo=bar - action: labelmap regex: __meta_kubernetes_pod_label_linkerd_io_(.+) # Copy all pod labels to tmp labels - action: labelmap regex: __meta_kubernetes_pod_label_(.+) replacement: __tmp_pod_label_$1 # Take `linkerd_io_` prefixed labels and copy them without the prefix - action: labelmap regex: __tmp_pod_label_linkerd_io_(.+) replacement: __tmp_pod_label_$1 # Drop the `linkerd_io_` originals - action: labeldrop regex: __tmp_pod_label_linkerd_io_(.+) # Copy tmp labels into real labels - action: labelmap regex: __tmp_pod_label_(.+) --- kind: Service apiVersion: v1 metadata: name: linkerd-prometheus namespace: linkerd labels: linkerd.io/control-plane-component: prometheus linkerd.io/control-plane-ns: linkerd annotations: linkerd.io/created-by: linkerd/cli edge-20.10.1 spec: type: ClusterIP selector: linkerd.io/control-plane-component: prometheus ports: - name: admin-http port: 9090 targetPort: 9090 --- apiVersion: apps/v1 kind: Deployment metadata: annotations: linkerd.io/created-by: linkerd/cli edge-20.10.1 labels: app.kubernetes.io/name: prometheus app.kubernetes.io/part-of: Linkerd app.kubernetes.io/version: edge-20.10.1 linkerd.io/control-plane-component: prometheus linkerd.io/control-plane-ns: linkerd name: linkerd-prometheus namespace: linkerd spec: replicas: 1 selector: matchLabels: linkerd.io/control-plane-component: prometheus linkerd.io/control-plane-ns: linkerd linkerd.io/proxy-deployment: linkerd-prometheus template: metadata: annotations: linkerd.io/created-by: linkerd/cli edge-20.10.1 linkerd.io/identity-mode: default linkerd.io/proxy-version: edge-20.10.1 labels: linkerd.io/control-plane-component: prometheus linkerd.io/control-plane-ns: linkerd linkerd.io/workload-ns: linkerd linkerd.io/proxy-deployment: linkerd-prometheus spec: nodeSelector: beta.kubernetes.io/os: linux securityContext: fsGroup: 65534 containers: - args: - --config.file=/etc/prometheus/prometheus.yml - --log.level=info - --storage.tsdb.path=/data - --storage.tsdb.retention.time=6h image: prom/prometheus:v2.19.3 imagePullPolicy: IfNotPresent livenessProbe: httpGet: path: /-/healthy port: 9090 initialDelaySeconds: 30 timeoutSeconds: 30 name: prometheus ports: - containerPort: 9090 name: admin-http readinessProbe: httpGet: path: /-/ready port: 9090 initialDelaySeconds: 30 timeoutSeconds: 30 securityContext: runAsNonRoot: true runAsUser: 65534 runAsGroup: 65534 volumeMounts: - mountPath: /data name: data - mountPath: /etc/prometheus/prometheus.yml name: prometheus-config subPath: prometheus.yml readOnly: true - env: - name: LINKERD2_PROXY_LOG value: warn,linkerd=info - name: LINKERD2_PROXY_LOG_FORMAT value: plain - name: LINKERD2_PROXY_DESTINATION_SVC_ADDR value: linkerd-dst-headless.linkerd.svc.cluster.local:8086 - name: LINKERD2_PROXY_DESTINATION_GET_NETWORKS value: "10.0.0.0/8,172.16.0.0/12,192.168.0.0/16" - name: LINKERD2_PROXY_DESTINATION_PROFILE_NETWORKS value: "10.0.0.0/8,172.16.0.0/12,192.168.0.0/16" - name: LINKERD2_PROXY_INBOUND_CONNECT_TIMEOUT value: "100ms" - name: LINKERD2_PROXY_OUTBOUND_CONNECT_TIMEOUT value: "1000ms" - name: LINKERD2_PROXY_CONTROL_LISTEN_ADDR value: 0.0.0.0:4190 - name: LINKERD2_PROXY_ADMIN_LISTEN_ADDR value: 0.0.0.0:4191 - name: LINKERD2_PROXY_OUTBOUND_LISTEN_ADDR value: 127.0.0.1:4140 - name: LINKERD2_PROXY_INBOUND_LISTEN_ADDR value: 0.0.0.0:4143 - name: LINKERD2_PROXY_DESTINATION_GET_SUFFIXES value: svc.cluster.local. - name: LINKERD2_PROXY_DESTINATION_PROFILE_SUFFIXES value: svc.cluster.local. - name: LINKERD2_PROXY_INBOUND_ACCEPT_KEEPALIVE value: 10000ms - name: LINKERD2_PROXY_OUTBOUND_CONNECT_KEEPALIVE value: 10000ms - name: _pod_ns valueFrom: fieldRef: fieldPath: metadata.namespace - name: _pod_nodeName valueFrom: fieldRef: fieldPath: spec.nodeName - name: LINKERD2_PROXY_DESTINATION_CONTEXT value: | {"ns":"$(_pod_ns)", "nodeName":"$(_pod_nodeName)"} - name: LINKERD2_PROXY_OUTBOUND_ROUTER_CAPACITY value: "10000" - name: LINKERD2_PROXY_IDENTITY_DIR value: /var/run/linkerd/identity/end-entity - name: LINKERD2_PROXY_IDENTITY_TRUST_ANCHORS value: | -----BEGIN CERTIFICATE----- MIIBrTCCAVSgAwIBAgIBATAKBggqhkjOPQQDAjApMScwJQYDVQQDEx5pZGVudGl0 eS5saW5rZXJkLmNsdXN0ZXIubG9jYWwwHhcNMjAxMDA0MDI0ODQwWhcNMjExMDA0 MDI0OTAwWjApMScwJQYDVQQDEx5pZGVudGl0eS5saW5rZXJkLmNsdXN0ZXIubG9j YWwwWTATBgcqhkjOPQIBBggqhkjOPQMBBwNCAASZmf4G3Gv0uLIghidK7hi8JQBy 2SpE0SvMdkxcq5jWnkCcqaIla55PgsTrDE5kFQ0INslrJaKxzGnDE22uvI9xo20w azAOBgNVHQ8BAf8EBAMCAQYwHQYDVR0lBBYwFAYIKwYBBQUHAwEGCCsGAQUFBwMC MA8GA1UdEwEB/wQFMAMBAf8wKQYDVR0RBCIwIIIeaWRlbnRpdHkubGlua2VyZC5j bHVzdGVyLmxvY2FsMAoGCCqGSM49BAMCA0cAMEQCIEI5jVjmF2WPdtqvBI+uGqUh 40GgD/83Y6iOCDULHpBqAiAOfBx0sOwo2rvaiG7DQfrj2n6UQrQIHcxmiTD+9Lb0 Kg== -----END CERTIFICATE----- - name: LINKERD2_PROXY_IDENTITY_TOKEN_FILE value: /var/run/secrets/kubernetes.io/serviceaccount/token - name: LINKERD2_PROXY_IDENTITY_SVC_ADDR value: linkerd-identity-headless.linkerd.svc.cluster.local:8080 - name: _pod_sa valueFrom: fieldRef: fieldPath: spec.serviceAccountName - name: _l5d_ns value: linkerd - name: _l5d_trustdomain value: cluster.local - name: LINKERD2_PROXY_IDENTITY_LOCAL_NAME value: $(_pod_sa).$(_pod_ns).serviceaccount.identity.$(_l5d_ns).$(_l5d_trustdomain) - name: LINKERD2_PROXY_IDENTITY_SVC_NAME value: linkerd-identity.$(_l5d_ns).serviceaccount.identity.$(_l5d_ns).$(_l5d_trustdomain) - name: LINKERD2_PROXY_DESTINATION_SVC_NAME value: linkerd-destination.$(_l5d_ns).serviceaccount.identity.$(_l5d_ns).$(_l5d_trustdomain) - name: LINKERD2_PROXY_TAP_SVC_NAME value: linkerd-tap.$(_l5d_ns).serviceaccount.identity.$(_l5d_ns).$(_l5d_trustdomain) image: ghcr.io/linkerd/proxy:edge-20.10.1 imagePullPolicy: IfNotPresent livenessProbe: httpGet: path: /live port: 4191 initialDelaySeconds: 10 name: linkerd-proxy ports: - containerPort: 4143 name: linkerd-proxy - containerPort: 4191 name: linkerd-admin readinessProbe: httpGet: path: /ready port: 4191 initialDelaySeconds: 2 resources: securityContext: allowPrivilegeEscalation: false readOnlyRootFilesystem: true runAsUser: 2102 terminationMessagePolicy: FallbackToLogsOnError volumeMounts: - mountPath: /var/run/linkerd/identity/end-entity name: linkerd-identity-end-entity initContainers: - args: - --incoming-proxy-port - "4143" - --outgoing-proxy-port - "4140" - --proxy-uid - "2102" - --inbound-ports-to-ignore - 4190,4191 - --outbound-ports-to-ignore - "443" image: ghcr.io/linkerd/proxy-init:v1.3.6 imagePullPolicy: IfNotPresent name: linkerd-init resources: limits: cpu: "100m" memory: "50Mi" requests: cpu: "10m" memory: "10Mi" securityContext: allowPrivilegeEscalation: false capabilities: add: - NET_ADMIN - NET_RAW privileged: false readOnlyRootFilesystem: true runAsNonRoot: false runAsUser: 0 terminationMessagePolicy: FallbackToLogsOnError volumeMounts: - mountPath: /run name: linkerd-proxy-init-xtables-lock serviceAccountName: linkerd-prometheus volumes: - name: data emptyDir: {} - configMap: name: linkerd-prometheus-config name: prometheus-config - emptyDir: {} name: linkerd-proxy-init-xtables-lock - emptyDir: medium: Memory name: linkerd-identity-end-entity --- apiVersion: v1 data: linkerd-config-overrides: Z2xvYmFsOgogIGlkZW50aXR5VHJ1c3RBbmNob3JzUEVNOiB8CiAgICAtLS0tLUJFR0lOIENFUlRJRklDQVRFLS0tLS0KICAgIE1JSUJyVENDQVZTZ0F3SUJBZ0lCQVRBS0JnZ3Foa2pPUFFRREFqQXBNU2N3SlFZRFZRUURFeDVwWkdWdWRHbDAKICAgIGVTNXNhVzVyWlhKa0xtTnNkWE4wWlhJdWJHOWpZV3d3SGhjTk1qQXhNREEwTURJME9EUXdXaGNOTWpFeE1EQTAKICAgIE1ESTBPVEF3V2pBcE1TY3dKUVlEVlFRREV4NXBaR1Z1ZEdsMGVTNXNhVzVyWlhKa0xtTnNkWE4wWlhJdWJHOWoKICAgIFlXd3dXVEFUQmdjcWhrak9QUUlCQmdncWhrak9QUU1CQndOQ0FBU1ptZjRHM0d2MHVMSWdoaWRLN2hpOEpRQnkKICAgIDJTcEUwU3ZNZGt4Y3E1aldua0NjcWFJbGE1NVBnc1RyREU1a0ZRMElOc2xySmFLeHpHbkRFMjJ1dkk5eG8yMHcKICAgIGF6QU9CZ05WSFE4QkFmOEVCQU1DQVFZd0hRWURWUjBsQkJZd0ZBWUlLd1lCQlFVSEF3RUdDQ3NHQVFVRkJ3TUMKICAgIE1BOEdBMVVkRXdFQi93UUZNQU1CQWY4d0tRWURWUjBSQkNJd0lJSWVhV1JsYm5ScGRIa3ViR2x1YTJWeVpDNWoKICAgIGJIVnpkR1Z5TG14dlkyRnNNQW9HQ0NxR1NNNDlCQU1DQTBjQU1FUUNJRUk1alZqbUYyV1BkdHF2QkkrdUdxVWgKICAgIDQwR2dELzgzWTZpT0NEVUxIcEJxQWlBT2ZCeDBzT3dvMnJ2YWlHN0RRZnJqMm42VVFyUUlIY3htaVREKzlMYjAKICAgIEtnPT0KICAgIC0tLS0tRU5EIENFUlRJRklDQVRFLS0tLS0KaGVhcnRiZWF0U2NoZWR1bGU6ICc1OCAyICogKiAqICcKaWRlbnRpdHk6CiAgaXNzdWVyOgogICAgY3J0RXhwaXJ5OiAiMjAyMS0xMC0wNFQwMjo0OTowMFoiCiAgICB0bHM6CiAgICAgIGNydFBFTTogfAogICAgICAgIC0tLS0tQkVHSU4gQ0VSVElGSUNBVEUtLS0tLQogICAgICAgIE1JSUJyVENDQVZTZ0F3SUJBZ0lCQVRBS0JnZ3Foa2pPUFFRREFqQXBNU2N3SlFZRFZRUURFeDVwWkdWdWRHbDAKICAgICAgICBlUzVzYVc1clpYSmtMbU5zZFhOMFpYSXViRzlqWVd3d0hoY05NakF4TURBME1ESTBPRFF3V2hjTk1qRXhNREEwCiAgICAgICAgTURJME9UQXdXakFwTVNjd0pRWURWUVFERXg1cFpHVnVkR2wwZVM1c2FXNXJaWEprTG1Oc2RYTjBaWEl1Ykc5agogICAgICAgIFlXd3dXVEFUQmdjcWhrak9QUUlCQmdncWhrak9QUU1CQndOQ0FBU1ptZjRHM0d2MHVMSWdoaWRLN2hpOEpRQnkKICAgICAgICAyU3BFMFN2TWRreGNxNWpXbmtDY3FhSWxhNTVQZ3NUckRFNWtGUTBJTnNsckphS3h6R25ERTIydXZJOXhvMjB3CiAgICAgICAgYXpBT0JnTlZIUThCQWY4RUJBTUNBUVl3SFFZRFZSMGxCQll3RkFZSUt3WUJCUVVIQXdFR0NDc0dBUVVGQndNQwogICAgICAgIE1BOEdBMVVkRXdFQi93UUZNQU1CQWY4d0tRWURWUjBSQkNJd0lJSWVhV1JsYm5ScGRIa3ViR2x1YTJWeVpDNWoKICAgICAgICBiSFZ6ZEdWeUxteHZZMkZzTUFvR0NDcUdTTTQ5QkFNQ0EwY0FNRVFDSUVJNWpWam1GMldQZHRxdkJJK3VHcVVoCiAgICAgICAgNDBHZ0QvODNZNmlPQ0RVTEhwQnFBaUFPZkJ4MHNPd28ycnZhaUc3RFFmcmoybjZVUXJRSUhjeG1pVEQrOUxiMAogICAgICAgIEtnPT0KICAgICAgICAtLS0tLUVORCBDRVJUSUZJQ0FURS0tLS0tCiAgICAgIGtleVBFTTogfAogICAgICAgIC0tLS0tQkVHSU4gRUMgUFJJVkFURSBLRVktLS0tLQogICAgICAgIE1IY0NBUUVFSUQxSWsvVm9ranp2bmV5d25OZ3FUN3NZSE9sUEl5bDcxZHh2OXRqc0hRQjRvQW9HQ0NxR1NNNDkKICAgICAgICBBd0VIb1VRRFFnQUVtWm4rQnR4cjlMaXlJSVluU3U0WXZDVUFjdGtxUk5FcnpIWk1YS3VZMXA1QW5LbWlKV3VlCiAgICAgICAgVDRMRTZ3eE9aQlVOQ0RiSmF5V2lzY3hwd3hOdHJyeVBjUT09CiAgICAgICAgLS0tLS1FTkQgRUMgUFJJVkFURSBLRVktLS0tLQo= kind: Secret metadata: creationTimestamp: null name: linkerd-config-overrides namespace: linkerd