mirror of
https://github.com/marcel-dempers/docker-development-youtube-series.git
synced 2025-06-08 17:03:36 +00:00
3372 lines
119 KiB
YAML
3372 lines
119 KiB
YAML
---
|
|
###
|
|
### Linkerd Namespace
|
|
###
|
|
---
|
|
kind: Namespace
|
|
apiVersion: v1
|
|
metadata:
|
|
name: linkerd
|
|
annotations:
|
|
linkerd.io/inject: disabled
|
|
labels:
|
|
linkerd.io/is-control-plane: "true"
|
|
config.linkerd.io/admission-webhooks: disabled
|
|
linkerd.io/control-plane-ns: linkerd
|
|
---
|
|
###
|
|
### Identity Controller Service RBAC
|
|
###
|
|
---
|
|
kind: ClusterRole
|
|
apiVersion: rbac.authorization.k8s.io/v1
|
|
metadata:
|
|
name: linkerd-linkerd-identity
|
|
labels:
|
|
linkerd.io/control-plane-component: identity
|
|
linkerd.io/control-plane-ns: linkerd
|
|
rules:
|
|
- apiGroups: ["authentication.k8s.io"]
|
|
resources: ["tokenreviews"]
|
|
verbs: ["create"]
|
|
- apiGroups: ["apps"]
|
|
resources: ["deployments"]
|
|
verbs: ["get"]
|
|
- apiGroups: [""]
|
|
resources: ["events"]
|
|
verbs: ["create", "patch"]
|
|
---
|
|
kind: ClusterRoleBinding
|
|
apiVersion: rbac.authorization.k8s.io/v1
|
|
metadata:
|
|
name: linkerd-linkerd-identity
|
|
labels:
|
|
linkerd.io/control-plane-component: identity
|
|
linkerd.io/control-plane-ns: linkerd
|
|
roleRef:
|
|
apiGroup: rbac.authorization.k8s.io
|
|
kind: ClusterRole
|
|
name: linkerd-linkerd-identity
|
|
subjects:
|
|
- kind: ServiceAccount
|
|
name: linkerd-identity
|
|
namespace: linkerd
|
|
---
|
|
kind: ServiceAccount
|
|
apiVersion: v1
|
|
metadata:
|
|
name: linkerd-identity
|
|
namespace: linkerd
|
|
labels:
|
|
linkerd.io/control-plane-component: identity
|
|
linkerd.io/control-plane-ns: linkerd
|
|
---
|
|
###
|
|
### Controller RBAC
|
|
###
|
|
---
|
|
kind: ClusterRole
|
|
apiVersion: rbac.authorization.k8s.io/v1
|
|
metadata:
|
|
name: linkerd-linkerd-controller
|
|
labels:
|
|
linkerd.io/control-plane-component: controller
|
|
linkerd.io/control-plane-ns: linkerd
|
|
rules:
|
|
- apiGroups: ["extensions", "apps"]
|
|
resources: ["daemonsets", "deployments", "replicasets", "statefulsets"]
|
|
verbs: ["list", "get", "watch"]
|
|
- apiGroups: ["extensions", "batch"]
|
|
resources: ["cronjobs", "jobs"]
|
|
verbs: ["list" , "get", "watch"]
|
|
- apiGroups: [""]
|
|
resources: ["pods", "endpoints", "services", "replicationcontrollers", "namespaces"]
|
|
verbs: ["list", "get", "watch"]
|
|
- apiGroups: ["linkerd.io"]
|
|
resources: ["serviceprofiles"]
|
|
verbs: ["list", "get", "watch"]
|
|
- apiGroups: ["split.smi-spec.io"]
|
|
resources: ["trafficsplits"]
|
|
verbs: ["list", "get", "watch"]
|
|
---
|
|
kind: ClusterRoleBinding
|
|
apiVersion: rbac.authorization.k8s.io/v1
|
|
metadata:
|
|
name: linkerd-linkerd-controller
|
|
labels:
|
|
linkerd.io/control-plane-component: controller
|
|
linkerd.io/control-plane-ns: linkerd
|
|
roleRef:
|
|
apiGroup: rbac.authorization.k8s.io
|
|
kind: ClusterRole
|
|
name: linkerd-linkerd-controller
|
|
subjects:
|
|
- kind: ServiceAccount
|
|
name: linkerd-controller
|
|
namespace: linkerd
|
|
---
|
|
kind: ServiceAccount
|
|
apiVersion: v1
|
|
metadata:
|
|
name: linkerd-controller
|
|
namespace: linkerd
|
|
labels:
|
|
linkerd.io/control-plane-component: controller
|
|
linkerd.io/control-plane-ns: linkerd
|
|
---
|
|
###
|
|
### Destination Controller Service
|
|
###
|
|
---
|
|
kind: ClusterRole
|
|
apiVersion: rbac.authorization.k8s.io/v1
|
|
metadata:
|
|
name: linkerd-linkerd-destination
|
|
labels:
|
|
linkerd.io/control-plane-component: destination
|
|
linkerd.io/control-plane-ns: linkerd
|
|
rules:
|
|
- apiGroups: ["apps"]
|
|
resources: ["replicasets"]
|
|
verbs: ["list", "get", "watch"]
|
|
- apiGroups: ["batch"]
|
|
resources: ["jobs"]
|
|
verbs: ["list", "get", "watch"]
|
|
- apiGroups: [""]
|
|
resources: ["pods", "endpoints", "services", "nodes"]
|
|
verbs: ["list", "get", "watch"]
|
|
- apiGroups: ["linkerd.io"]
|
|
resources: ["serviceprofiles"]
|
|
verbs: ["list", "get", "watch"]
|
|
- apiGroups: ["split.smi-spec.io"]
|
|
resources: ["trafficsplits"]
|
|
verbs: ["list", "get", "watch"]
|
|
---
|
|
kind: ClusterRoleBinding
|
|
apiVersion: rbac.authorization.k8s.io/v1
|
|
metadata:
|
|
name: linkerd-linkerd-destination
|
|
labels:
|
|
linkerd.io/control-plane-component: destination
|
|
linkerd.io/control-plane-ns: linkerd
|
|
roleRef:
|
|
apiGroup: rbac.authorization.k8s.io
|
|
kind: ClusterRole
|
|
name: linkerd-linkerd-destination
|
|
subjects:
|
|
- kind: ServiceAccount
|
|
name: linkerd-destination
|
|
namespace: linkerd
|
|
---
|
|
kind: ServiceAccount
|
|
apiVersion: v1
|
|
metadata:
|
|
name: linkerd-destination
|
|
namespace: linkerd
|
|
labels:
|
|
linkerd.io/control-plane-component: destination
|
|
linkerd.io/control-plane-ns: linkerd
|
|
---
|
|
###
|
|
### Heartbeat RBAC
|
|
###
|
|
---
|
|
apiVersion: rbac.authorization.k8s.io/v1
|
|
kind: Role
|
|
metadata:
|
|
name: linkerd-heartbeat
|
|
namespace: linkerd
|
|
labels:
|
|
linkerd.io/control-plane-ns: linkerd
|
|
rules:
|
|
- apiGroups: [""]
|
|
resources: ["configmaps"]
|
|
verbs: ["get"]
|
|
resourceNames: ["linkerd-config"]
|
|
---
|
|
apiVersion: rbac.authorization.k8s.io/v1
|
|
kind: RoleBinding
|
|
metadata:
|
|
name: linkerd-heartbeat
|
|
namespace: linkerd
|
|
labels:
|
|
linkerd.io/control-plane-ns: linkerd
|
|
roleRef:
|
|
kind: Role
|
|
name: linkerd-heartbeat
|
|
apiGroup: rbac.authorization.k8s.io
|
|
subjects:
|
|
- kind: ServiceAccount
|
|
name: linkerd-heartbeat
|
|
namespace: linkerd
|
|
---
|
|
kind: ServiceAccount
|
|
apiVersion: v1
|
|
metadata:
|
|
name: linkerd-heartbeat
|
|
namespace: linkerd
|
|
labels:
|
|
linkerd.io/control-plane-component: heartbeat
|
|
linkerd.io/control-plane-ns: linkerd
|
|
---
|
|
###
|
|
### Web RBAC
|
|
###
|
|
---
|
|
apiVersion: rbac.authorization.k8s.io/v1
|
|
kind: Role
|
|
metadata:
|
|
name: linkerd-web
|
|
namespace: linkerd
|
|
labels:
|
|
linkerd.io/control-plane-component: web
|
|
linkerd.io/control-plane-ns: linkerd
|
|
rules:
|
|
- apiGroups: [""]
|
|
resources: ["configmaps"]
|
|
verbs: ["get"]
|
|
resourceNames: ["linkerd-config"]
|
|
- apiGroups: [""]
|
|
resources: ["namespaces", "configmaps"]
|
|
verbs: ["get"]
|
|
- apiGroups: [""]
|
|
resources: ["serviceaccounts", "pods"]
|
|
verbs: ["list"]
|
|
- apiGroups: ["apps"]
|
|
resources: ["replicasets"]
|
|
verbs: ["list"]
|
|
---
|
|
apiVersion: rbac.authorization.k8s.io/v1
|
|
kind: RoleBinding
|
|
metadata:
|
|
name: linkerd-web
|
|
namespace: linkerd
|
|
labels:
|
|
linkerd.io/control-plane-component: web
|
|
linkerd.io/control-plane-ns: linkerd
|
|
roleRef:
|
|
kind: Role
|
|
name: linkerd-web
|
|
apiGroup: rbac.authorization.k8s.io
|
|
subjects:
|
|
- kind: ServiceAccount
|
|
name: linkerd-web
|
|
namespace: linkerd
|
|
---
|
|
apiVersion: rbac.authorization.k8s.io/v1
|
|
kind: ClusterRole
|
|
metadata:
|
|
name: linkerd-linkerd-web-check
|
|
labels:
|
|
linkerd.io/control-plane-component: web
|
|
linkerd.io/control-plane-ns: linkerd
|
|
rules:
|
|
- apiGroups: ["rbac.authorization.k8s.io"]
|
|
resources: ["clusterroles", "clusterrolebindings"]
|
|
verbs: ["list"]
|
|
- apiGroups: ["apiextensions.k8s.io"]
|
|
resources: ["customresourcedefinitions"]
|
|
verbs: ["list"]
|
|
- apiGroups: ["admissionregistration.k8s.io"]
|
|
resources: ["mutatingwebhookconfigurations", "validatingwebhookconfigurations"]
|
|
verbs: ["list"]
|
|
- apiGroups: ["policy"]
|
|
resources: ["podsecuritypolicies"]
|
|
verbs: ["list"]
|
|
- apiGroups: ["linkerd.io"]
|
|
resources: ["serviceprofiles"]
|
|
verbs: ["list"]
|
|
- apiGroups: ["apiregistration.k8s.io"]
|
|
resources: ["apiservices"]
|
|
verbs: ["get"]
|
|
---
|
|
apiVersion: rbac.authorization.k8s.io/v1
|
|
kind: ClusterRoleBinding
|
|
metadata:
|
|
name: linkerd-linkerd-web-check
|
|
labels:
|
|
linkerd.io/control-plane-component: web
|
|
linkerd.io/control-plane-ns: linkerd
|
|
roleRef:
|
|
kind: ClusterRole
|
|
name: linkerd-linkerd-web-check
|
|
apiGroup: rbac.authorization.k8s.io
|
|
subjects:
|
|
- kind: ServiceAccount
|
|
name: linkerd-web
|
|
namespace: linkerd
|
|
---
|
|
kind: ClusterRoleBinding
|
|
apiVersion: rbac.authorization.k8s.io/v1
|
|
metadata:
|
|
name: linkerd-linkerd-web-admin
|
|
labels:
|
|
linkerd.io/control-plane-component: web
|
|
linkerd.io/control-plane-ns: linkerd
|
|
roleRef:
|
|
apiGroup: rbac.authorization.k8s.io
|
|
kind: ClusterRole
|
|
name: linkerd-linkerd-tap-admin
|
|
subjects:
|
|
- kind: ServiceAccount
|
|
name: linkerd-web
|
|
namespace: linkerd
|
|
---
|
|
kind: ServiceAccount
|
|
apiVersion: v1
|
|
metadata:
|
|
name: linkerd-web
|
|
namespace: linkerd
|
|
labels:
|
|
linkerd.io/control-plane-component: web
|
|
linkerd.io/control-plane-ns: linkerd
|
|
---
|
|
###
|
|
### Service Profile CRD
|
|
###
|
|
---
|
|
apiVersion: apiextensions.k8s.io/v1beta1
|
|
kind: CustomResourceDefinition
|
|
metadata:
|
|
name: serviceprofiles.linkerd.io
|
|
annotations:
|
|
linkerd.io/created-by: linkerd/cli edge-20.9.4
|
|
labels:
|
|
linkerd.io/control-plane-ns: linkerd
|
|
spec:
|
|
group: linkerd.io
|
|
versions:
|
|
- name: v1alpha1
|
|
served: true
|
|
storage: false
|
|
- name: v1alpha2
|
|
served: true
|
|
storage: true
|
|
scope: Namespaced
|
|
names:
|
|
plural: serviceprofiles
|
|
singular: serviceprofile
|
|
kind: ServiceProfile
|
|
shortNames:
|
|
- sp
|
|
---
|
|
###
|
|
### TrafficSplit CRD
|
|
### Copied from https://github.com/deislabs/smi-sdk-go/blob/cea7e1e9372304bbb6c74a3f6ca788d9eaa9cc58/crds/split.yaml
|
|
###
|
|
---
|
|
apiVersion: apiextensions.k8s.io/v1beta1
|
|
kind: CustomResourceDefinition
|
|
metadata:
|
|
name: trafficsplits.split.smi-spec.io
|
|
annotations:
|
|
linkerd.io/created-by: linkerd/cli edge-20.9.4
|
|
labels:
|
|
linkerd.io/control-plane-ns: linkerd
|
|
spec:
|
|
group: split.smi-spec.io
|
|
version: v1alpha1
|
|
scope: Namespaced
|
|
names:
|
|
kind: TrafficSplit
|
|
shortNames:
|
|
- ts
|
|
plural: trafficsplits
|
|
singular: trafficsplit
|
|
additionalPrinterColumns:
|
|
- name: Service
|
|
type: string
|
|
description: The apex service of this split.
|
|
JSONPath: .spec.service
|
|
---
|
|
###
|
|
### Proxy Injector RBAC
|
|
###
|
|
---
|
|
kind: ClusterRole
|
|
apiVersion: rbac.authorization.k8s.io/v1
|
|
metadata:
|
|
name: linkerd-linkerd-proxy-injector
|
|
labels:
|
|
linkerd.io/control-plane-component: proxy-injector
|
|
linkerd.io/control-plane-ns: linkerd
|
|
rules:
|
|
- apiGroups: [""]
|
|
resources: ["events"]
|
|
verbs: ["create", "patch"]
|
|
- apiGroups: [""]
|
|
resources: ["namespaces", "replicationcontrollers"]
|
|
verbs: ["list", "get", "watch"]
|
|
- apiGroups: [""]
|
|
resources: ["pods"]
|
|
verbs: ["list", "watch"]
|
|
- apiGroups: ["extensions", "apps"]
|
|
resources: ["deployments", "replicasets", "daemonsets", "statefulsets"]
|
|
verbs: ["list", "get", "watch"]
|
|
- apiGroups: ["extensions", "batch"]
|
|
resources: ["cronjobs", "jobs"]
|
|
verbs: ["list", "get", "watch"]
|
|
---
|
|
kind: ClusterRoleBinding
|
|
apiVersion: rbac.authorization.k8s.io/v1
|
|
metadata:
|
|
name: linkerd-linkerd-proxy-injector
|
|
labels:
|
|
linkerd.io/control-plane-component: proxy-injector
|
|
linkerd.io/control-plane-ns: linkerd
|
|
subjects:
|
|
- kind: ServiceAccount
|
|
name: linkerd-proxy-injector
|
|
namespace: linkerd
|
|
apiGroup: ""
|
|
roleRef:
|
|
kind: ClusterRole
|
|
name: linkerd-linkerd-proxy-injector
|
|
apiGroup: rbac.authorization.k8s.io
|
|
---
|
|
kind: ServiceAccount
|
|
apiVersion: v1
|
|
metadata:
|
|
name: linkerd-proxy-injector
|
|
namespace: linkerd
|
|
labels:
|
|
linkerd.io/control-plane-component: proxy-injector
|
|
linkerd.io/control-plane-ns: linkerd
|
|
---
|
|
kind: Secret
|
|
apiVersion: v1
|
|
metadata:
|
|
name: linkerd-proxy-injector-tls
|
|
namespace: linkerd
|
|
labels:
|
|
linkerd.io/control-plane-component: proxy-injector
|
|
linkerd.io/control-plane-ns: linkerd
|
|
annotations:
|
|
linkerd.io/created-by: linkerd/cli edge-20.9.4
|
|
type: Opaque
|
|
data:
|
|
crt.pem: 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
|
|
key.pem: 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
|
|
---
|
|
apiVersion: admissionregistration.k8s.io/v1beta1
|
|
kind: MutatingWebhookConfiguration
|
|
metadata:
|
|
name: linkerd-proxy-injector-webhook-config
|
|
labels:
|
|
linkerd.io/control-plane-component: proxy-injector
|
|
linkerd.io/control-plane-ns: linkerd
|
|
webhooks:
|
|
- name: linkerd-proxy-injector.linkerd.io
|
|
namespaceSelector:
|
|
matchExpressions:
|
|
- key: config.linkerd.io/admission-webhooks
|
|
operator: NotIn
|
|
values:
|
|
- disabled
|
|
clientConfig:
|
|
service:
|
|
name: linkerd-proxy-injector
|
|
namespace: linkerd
|
|
path: "/"
|
|
caBundle: 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
|
|
failurePolicy: Ignore
|
|
rules:
|
|
- operations: [ "CREATE" ]
|
|
apiGroups: [""]
|
|
apiVersions: ["v1"]
|
|
resources: ["pods"]
|
|
sideEffects: None
|
|
---
|
|
###
|
|
### Service Profile Validator RBAC
|
|
###
|
|
---
|
|
kind: ClusterRole
|
|
apiVersion: rbac.authorization.k8s.io/v1
|
|
metadata:
|
|
name: linkerd-linkerd-sp-validator
|
|
labels:
|
|
linkerd.io/control-plane-component: sp-validator
|
|
linkerd.io/control-plane-ns: linkerd
|
|
rules:
|
|
- apiGroups: [""]
|
|
resources: ["pods"]
|
|
verbs: ["list"]
|
|
---
|
|
kind: ClusterRoleBinding
|
|
apiVersion: rbac.authorization.k8s.io/v1
|
|
metadata:
|
|
name: linkerd-linkerd-sp-validator
|
|
labels:
|
|
linkerd.io/control-plane-component: sp-validator
|
|
linkerd.io/control-plane-ns: linkerd
|
|
subjects:
|
|
- kind: ServiceAccount
|
|
name: linkerd-sp-validator
|
|
namespace: linkerd
|
|
apiGroup: ""
|
|
roleRef:
|
|
kind: ClusterRole
|
|
name: linkerd-linkerd-sp-validator
|
|
apiGroup: rbac.authorization.k8s.io
|
|
---
|
|
kind: ServiceAccount
|
|
apiVersion: v1
|
|
metadata:
|
|
name: linkerd-sp-validator
|
|
namespace: linkerd
|
|
labels:
|
|
linkerd.io/control-plane-component: sp-validator
|
|
linkerd.io/control-plane-ns: linkerd
|
|
---
|
|
kind: Secret
|
|
apiVersion: v1
|
|
metadata:
|
|
name: linkerd-sp-validator-tls
|
|
namespace: linkerd
|
|
labels:
|
|
linkerd.io/control-plane-component: sp-validator
|
|
linkerd.io/control-plane-ns: linkerd
|
|
annotations:
|
|
linkerd.io/created-by: linkerd/cli edge-20.9.4
|
|
type: Opaque
|
|
data:
|
|
crt.pem: LS0tLS1CRUdJTiBDRVJUSUZJQ0FURS0tLS0tCk1JSURURENDQWpTZ0F3SUJBZ0lRVGVJR1Q2VU1hYnJXaFNsR0R1RWdkakFOQmdrcWhraUc5dzBCQVFzRkFEQXIKTVNrd0p3WURWUVFERXlCc2FXNXJaWEprTFhOd0xYWmhiR2xrWVhSdmNpNXNhVzVyWlhKa0xuTjJZekFlRncweQpNREE1TXpBeU1EQTNOVGRhRncweU1UQTVNekF5TURBM05UZGFNQ3N4S1RBbkJnTlZCQU1USUd4cGJtdGxjbVF0CmMzQXRkbUZzYVdSaGRHOXlMbXhwYm10bGNtUXVjM1pqTUlJQklqQU5CZ2txaGtpRzl3MEJBUUVGQUFPQ0FROEEKTUlJQkNnS0NBUUVBM0hlYXl5dElXdmlEOUxUa0tMQVdtN2RWWVVkaGM3Vlp5bWxCcGlqT3dIQ1FCS1NhRVlZeQpYSXk4WFNucjY2RnhVVE1TQ0Q4OUlMbFRXaFBqa2thbW8vQWE1bktXb2ZSZkEzN2VrT3o4bVdCMkY2TGNib2tSCmV1WGFKcmxMcktFK0RGN2xUK0JDWVA4N3B0TWlYNmMydElPOE1TZEJuNGNZSXJiVUhXOVpqMU1kblI5ZlNJekYKM1p0S1ZUcmQ4aGxjckVmSzk4azhwRFQweTNtSUN4dFlQQ3BOL2h4QkRtcXdEVHhMZmVBVDdFeEJYQTI5aXBqZwpoVkNEMmRQb1AyaG1OUDF2bEl6TkMzMWExUFdMOGxndDNkNlRyRVRPSTI4Mmt4UXZJaXJWSGFYcWZCdTRqM01qCnJhbDE2ZWtiZkhEQUduWEJVS1g1TGRmeHNqbW1handzdFFJREFRQUJvMnd3YWpBT0JnTlZIUThCQWY4RUJBTUMKQmFBd0hRWURWUjBsQkJZd0ZBWUlLd1lCQlFVSEF3RUdDQ3NHQVFVRkJ3TUNNQXdHQTFVZEV3RUIvd1FDTUFBdwpLd1lEVlIwUkJDUXdJb0lnYkdsdWEyVnlaQzF6Y0MxMllXeHBaR0YwYjNJdWJHbHVhMlZ5WkM1emRtTXdEUVlKCktvWklodmNOQVFFTEJRQURnZ0VCQUl5dHVsODhQWjI5TjZmTWhjZW15MTRoVFZaTWZYVCszQ0MxK21FdXYvTHYKWUVoRXlMYWpHL3FpK2hndG1GSW9lbVF5TU1VdTZFYURhY2Y5d3RTdjRFMndrdVRhbU9PRlQ2N0k3c1lMaStCUApENk9iU09yY3B6ZGViekRNenA2VG5jV0J2czBnL09iTzd6Sm1WU3BkZndSRk9ucVkrYXFrRHpVL2UyejNFM2Z5Ck42djdtOXRsQUFWS2gzaC80NHZJVElVazEzVVlqTnovOXcyc1ZCRnc5NGh4Q3JNczlZWkZaMzhqdTU2QUhyZTUKTkFia3ZRZGswM0xhSllNUnhld2tacWVtYkM0ZDkxNXFLRU9td0x3WWNEbjYzcklENGpJcm5IeXg1ZWQ1d0JVWgozTFphSjc0YnEwRnE0V1BnVmRyaEFtbnk5VFlBRVQyR2o4VjBKc3d5ZnQwPQotLS0tLUVORCBDRVJUSUZJQ0FURS0tLS0t
|
|
key.pem: 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
|
|
---
|
|
apiVersion: admissionregistration.k8s.io/v1beta1
|
|
kind: ValidatingWebhookConfiguration
|
|
metadata:
|
|
name: linkerd-sp-validator-webhook-config
|
|
labels:
|
|
linkerd.io/control-plane-component: sp-validator
|
|
linkerd.io/control-plane-ns: linkerd
|
|
webhooks:
|
|
- name: linkerd-sp-validator.linkerd.io
|
|
namespaceSelector:
|
|
matchExpressions:
|
|
- key: config.linkerd.io/admission-webhooks
|
|
operator: NotIn
|
|
values:
|
|
- disabled
|
|
clientConfig:
|
|
service:
|
|
name: linkerd-sp-validator
|
|
namespace: linkerd
|
|
path: "/"
|
|
caBundle: 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
|
|
failurePolicy: Ignore
|
|
rules:
|
|
- operations: [ "CREATE" , "UPDATE" ]
|
|
apiGroups: ["linkerd.io"]
|
|
apiVersions: ["v1alpha1", "v1alpha2"]
|
|
resources: ["serviceprofiles"]
|
|
sideEffects: None
|
|
---
|
|
###
|
|
### Tap RBAC
|
|
###
|
|
---
|
|
kind: ClusterRole
|
|
apiVersion: rbac.authorization.k8s.io/v1
|
|
metadata:
|
|
name: linkerd-linkerd-tap
|
|
labels:
|
|
linkerd.io/control-plane-component: tap
|
|
linkerd.io/control-plane-ns: linkerd
|
|
rules:
|
|
- apiGroups: [""]
|
|
resources: ["pods", "services", "replicationcontrollers", "namespaces", "nodes"]
|
|
verbs: ["list", "get", "watch"]
|
|
- apiGroups: ["extensions", "apps"]
|
|
resources: ["daemonsets", "deployments", "replicasets", "statefulsets"]
|
|
verbs: ["list", "get", "watch"]
|
|
- apiGroups: ["extensions", "batch"]
|
|
resources: ["cronjobs", "jobs"]
|
|
verbs: ["list" , "get", "watch"]
|
|
---
|
|
kind: ClusterRole
|
|
apiVersion: rbac.authorization.k8s.io/v1
|
|
metadata:
|
|
name: linkerd-linkerd-tap-admin
|
|
labels:
|
|
linkerd.io/control-plane-component: tap
|
|
linkerd.io/control-plane-ns: linkerd
|
|
rules:
|
|
- apiGroups: ["tap.linkerd.io"]
|
|
resources: ["*"]
|
|
verbs: ["watch"]
|
|
---
|
|
kind: ClusterRoleBinding
|
|
apiVersion: rbac.authorization.k8s.io/v1
|
|
metadata:
|
|
name: linkerd-linkerd-tap
|
|
labels:
|
|
linkerd.io/control-plane-component: tap
|
|
linkerd.io/control-plane-ns: linkerd
|
|
roleRef:
|
|
apiGroup: rbac.authorization.k8s.io
|
|
kind: ClusterRole
|
|
name: linkerd-linkerd-tap
|
|
subjects:
|
|
- kind: ServiceAccount
|
|
name: linkerd-tap
|
|
namespace: linkerd
|
|
---
|
|
apiVersion: rbac.authorization.k8s.io/v1
|
|
kind: ClusterRoleBinding
|
|
metadata:
|
|
name: linkerd-linkerd-tap-auth-delegator
|
|
labels:
|
|
linkerd.io/control-plane-component: tap
|
|
linkerd.io/control-plane-ns: linkerd
|
|
roleRef:
|
|
apiGroup: rbac.authorization.k8s.io
|
|
kind: ClusterRole
|
|
name: system:auth-delegator
|
|
subjects:
|
|
- kind: ServiceAccount
|
|
name: linkerd-tap
|
|
namespace: linkerd
|
|
---
|
|
kind: ServiceAccount
|
|
apiVersion: v1
|
|
metadata:
|
|
name: linkerd-tap
|
|
namespace: linkerd
|
|
labels:
|
|
linkerd.io/control-plane-component: tap
|
|
linkerd.io/control-plane-ns: linkerd
|
|
---
|
|
apiVersion: rbac.authorization.k8s.io/v1
|
|
kind: RoleBinding
|
|
metadata:
|
|
name: linkerd-linkerd-tap-auth-reader
|
|
namespace: kube-system
|
|
labels:
|
|
linkerd.io/control-plane-component: tap
|
|
linkerd.io/control-plane-ns: linkerd
|
|
roleRef:
|
|
apiGroup: rbac.authorization.k8s.io
|
|
kind: Role
|
|
name: extension-apiserver-authentication-reader
|
|
subjects:
|
|
- kind: ServiceAccount
|
|
name: linkerd-tap
|
|
namespace: linkerd
|
|
---
|
|
kind: Secret
|
|
apiVersion: v1
|
|
metadata:
|
|
name: linkerd-tap-tls
|
|
namespace: linkerd
|
|
labels:
|
|
linkerd.io/control-plane-component: tap
|
|
linkerd.io/control-plane-ns: linkerd
|
|
annotations:
|
|
linkerd.io/created-by: linkerd/cli edge-20.9.4
|
|
type: Opaque
|
|
data:
|
|
crt.pem: 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
|
|
key.pem: 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
|
|
---
|
|
apiVersion: apiregistration.k8s.io/v1
|
|
kind: APIService
|
|
metadata:
|
|
name: v1alpha1.tap.linkerd.io
|
|
labels:
|
|
linkerd.io/control-plane-component: tap
|
|
linkerd.io/control-plane-ns: linkerd
|
|
spec:
|
|
group: tap.linkerd.io
|
|
version: v1alpha1
|
|
groupPriorityMinimum: 1000
|
|
versionPriority: 100
|
|
service:
|
|
name: linkerd-tap
|
|
namespace: linkerd
|
|
caBundle: LS0tLS1CRUdJTiBDRVJUSUZJQ0FURS0tLS0tCk1JSURNakNDQWhxZ0F3SUJBZ0lSQUp6VUF5Q0FHKzBtMFp4MFVYd3lyazB3RFFZSktvWklodmNOQVFFTEJRQXcKSWpFZ01CNEdBMVVFQXhNWGJHbHVhMlZ5WkMxMFlYQXViR2x1YTJWeVpDNXpkbU13SGhjTk1qQXdPVE13TWpBdwpOelUzV2hjTk1qRXdPVE13TWpBd056VTNXakFpTVNBd0hnWURWUVFERXhkc2FXNXJaWEprTFhSaGNDNXNhVzVyClpYSmtMbk4yWXpDQ0FTSXdEUVlKS29aSWh2Y05BUUVCQlFBRGdnRVBBRENDQVFvQ2dnRUJBTlp0RDNhQnV0YzkKaCsvRTZWb1NMTEowQkhkbTUyR0p0RmJSMUtNNmdla1pTeHZ0bkxKLy8yTXcxNjZjdkJ2MU5FMllEbkQzRTdEKwpuZThuSXBkL0VXQVg1ZGJCaVhuQlZjQ2J0MzZWY0tKWi9nRzJJdTZ4VDJLcTArWkVtR1JuZTFLditlaTBZZDFaCkIvRVhlRFZwaUMvM1lyVEJkU2xCMDdJTUI0QlAyd0tRNUNVY0pQcmdhVkcvbnBJNlBrMHhIanNVVHBqK2lJWVUKa3JWMWoxWkVJSVprcEJ3eGRqejRuUC9rTjNIQVdMUEVqV1NGTHpnN3JkZzd0VWs5eUJtRU1lT2V3UklVaS91SgpuTitXZEhXYVJnWFByZGJNZDRSNTUzaW5LNWxNNTRDOSs2RlRBMmJDQWxSTzNYTCtFbTdPYXY2R0Y4M0srTWN3CmU0QTV3YjFYNDM4Q0F3RUFBYU5qTUdFd0RnWURWUjBQQVFIL0JBUURBZ1dnTUIwR0ExVWRKUVFXTUJRR0NDc0cKQVFVRkJ3TUJCZ2dyQmdFRkJRY0RBakFNQmdOVkhSTUJBZjhFQWpBQU1DSUdBMVVkRVFRYk1CbUNGMnhwYm10bApjbVF0ZEdGd0xteHBibXRsY21RdWMzWmpNQTBHQ1NxR1NJYjNEUUVCQ3dVQUE0SUJBUUNhazl3TVllc1J2YXd6CnM2cGtqcW1GdkxCSks4SVhmVjU3bUdMTk5WK2ZXV2p6TllPeitZdjdQNTBxS2ZzY0RiK2V3RFJUQldBV0tCajAKQmtsYyszQ3JKUnRWZ2pFYlU1d1M0d0gvemdaWTg2bjNZOVEvSzAzZXJJTENDSzlIQ1JlUTArL05LdHBkVk53WgpjWUpqZWtCK1F4MDJoSzFhWHlkbHVvdTdBZ1M2cDhyMkl3MTFyZE5yVjZjMzBuNHkxMjc2UUhpZ2liSDlDekdjCjA3WGMzSS9OT1Vkc2hUbzRidmpvV01DWTNRNFh5V1NXV3BuMHRVdk1JcUtGV2xyeUVucDRiOWtTcWVJbUFhVkcKRm9JbTZ1M1BKek41VFJuQjZrVkU4Uzh5b2VHV1pWNlVlZlpXYmpoWmlvYkRQRU80eWIwL0U4WEJISkhnREEraApvZzljWUdiRgotLS0tLUVORCBDRVJUSUZJQ0FURS0tLS0t
|
|
---
|
|
###
|
|
### Control Plane PSP
|
|
###
|
|
---
|
|
apiVersion: policy/v1beta1
|
|
kind: PodSecurityPolicy
|
|
metadata:
|
|
name: linkerd-linkerd-control-plane
|
|
labels:
|
|
linkerd.io/control-plane-ns: linkerd
|
|
spec:
|
|
allowPrivilegeEscalation: false
|
|
readOnlyRootFilesystem: true
|
|
allowedCapabilities:
|
|
- NET_ADMIN
|
|
- NET_RAW
|
|
requiredDropCapabilities:
|
|
- ALL
|
|
hostNetwork: false
|
|
hostIPC: false
|
|
hostPID: false
|
|
seLinux:
|
|
rule: RunAsAny
|
|
runAsUser:
|
|
rule: RunAsAny
|
|
supplementalGroups:
|
|
rule: MustRunAs
|
|
ranges:
|
|
- min: 1
|
|
max: 65535
|
|
fsGroup:
|
|
rule: MustRunAs
|
|
ranges:
|
|
- min: 1
|
|
max: 65535
|
|
volumes:
|
|
- configMap
|
|
- emptyDir
|
|
- secret
|
|
- projected
|
|
- downwardAPI
|
|
- persistentVolumeClaim
|
|
---
|
|
apiVersion: rbac.authorization.k8s.io/v1
|
|
kind: Role
|
|
metadata:
|
|
name: linkerd-psp
|
|
namespace: linkerd
|
|
labels:
|
|
linkerd.io/control-plane-ns: linkerd
|
|
rules:
|
|
- apiGroups: ['policy', 'extensions']
|
|
resources: ['podsecuritypolicies']
|
|
verbs: ['use']
|
|
resourceNames:
|
|
- linkerd-linkerd-control-plane
|
|
---
|
|
apiVersion: rbac.authorization.k8s.io/v1
|
|
kind: RoleBinding
|
|
metadata:
|
|
name: linkerd-psp
|
|
namespace: linkerd
|
|
labels:
|
|
linkerd.io/control-plane-ns: linkerd
|
|
roleRef:
|
|
kind: Role
|
|
name: linkerd-psp
|
|
apiGroup: rbac.authorization.k8s.io
|
|
subjects:
|
|
- kind: ServiceAccount
|
|
name: linkerd-controller
|
|
namespace: linkerd
|
|
- kind: ServiceAccount
|
|
name: linkerd-destination
|
|
namespace: linkerd
|
|
- kind: ServiceAccount
|
|
name: linkerd-grafana
|
|
namespace: linkerd
|
|
- kind: ServiceAccount
|
|
name: linkerd-heartbeat
|
|
namespace: linkerd
|
|
- kind: ServiceAccount
|
|
name: linkerd-identity
|
|
namespace: linkerd
|
|
- kind: ServiceAccount
|
|
name: linkerd-prometheus
|
|
namespace: linkerd
|
|
- kind: ServiceAccount
|
|
name: linkerd-proxy-injector
|
|
namespace: linkerd
|
|
- kind: ServiceAccount
|
|
name: linkerd-sp-validator
|
|
namespace: linkerd
|
|
- kind: ServiceAccount
|
|
name: linkerd-tap
|
|
namespace: linkerd
|
|
- kind: ServiceAccount
|
|
name: linkerd-web
|
|
namespace: linkerd
|
|
---
|
|
kind: ConfigMap
|
|
apiVersion: v1
|
|
metadata:
|
|
name: linkerd-config
|
|
namespace: linkerd
|
|
labels:
|
|
linkerd.io/control-plane-component: controller
|
|
linkerd.io/control-plane-ns: linkerd
|
|
annotations:
|
|
linkerd.io/created-by: linkerd/cli edge-20.9.4
|
|
data:
|
|
global: |
|
|
{"linkerdNamespace":"linkerd","cniEnabled":false,"version":"edge-20.9.4","identityContext":{"trustDomain":"cluster.local","trustAnchorsPem":"-----BEGIN CERTIFICATE-----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\nCC4=\n-----END CERTIFICATE-----\n","issuanceLifetime":"86400s","clockSkewAllowance":"20s","scheme":"linkerd.io/tls"},"autoInjectContext":null,"omitWebhookSideEffects":false,"clusterDomain":"cluster.local"}
|
|
proxy: |
|
|
{"proxyImage":{"imageName":"ghcr.io/linkerd/proxy","pullPolicy":"IfNotPresent"},"proxyInitImage":{"imageName":"ghcr.io/linkerd/proxy-init","pullPolicy":"IfNotPresent"},"controlPort":{"port":4190},"ignoreInboundPorts":[],"ignoreOutboundPorts":[],"inboundPort":{"port":4143},"adminPort":{"port":4191},"outboundPort":{"port":4140},"resource":{"requestCpu":"","requestMemory":"","limitCpu":"","limitMemory":""},"proxyUid":"2102","logLevel":{"level":"warn,linkerd=info"},"disableExternalProfiles":true,"proxyVersion":"edge-20.9.4","proxyInitImageVersion":"v1.3.6","debugImage":{"imageName":"ghcr.io/linkerd/debug","pullPolicy":"IfNotPresent"},"debugImageVersion":"edge-20.9.4","destinationGetNetworks":"10.0.0.0/8,172.16.0.0/12,192.168.0.0/16","logFormat":"plain","outboundConnectTimeout":"","inboundConnectTimeout":""}
|
|
install: |
|
|
{"cliVersion":"edge-20.9.4","flags":[]}
|
|
---
|
|
###
|
|
### Identity Controller Service
|
|
###
|
|
---
|
|
kind: Secret
|
|
apiVersion: v1
|
|
metadata:
|
|
name: linkerd-identity-issuer
|
|
namespace: linkerd
|
|
labels:
|
|
linkerd.io/control-plane-component: identity
|
|
linkerd.io/control-plane-ns: linkerd
|
|
annotations:
|
|
linkerd.io/created-by: linkerd/cli edge-20.9.4
|
|
linkerd.io/identity-issuer-expiry: 2021-09-30T20:08:07Z
|
|
data:
|
|
crt.pem: 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
|
|
key.pem: LS0tLS1CRUdJTiBFQyBQUklWQVRFIEtFWS0tLS0tCk1IY0NBUUVFSUdHWVRwTHo3aVZCb2tkS3drVDJUeStNNW9sZ0tESGROWVljK29wMG1tRnBvQW9HQ0NxR1NNNDkKQXdFSG9VUURRZ0FFL2FkOEhSM0k4bkphLzFuV0FFY1dCSFNhTlI0M0F3MVBISlcydy9ONnNVRUhCRlF1aWQxMQoyYlVkbi90UFFYSFBlaGNXYUplVHVIUkdiVVNjOGhadGlRPT0KLS0tLS1FTkQgRUMgUFJJVkFURSBLRVktLS0tLQ==
|
|
---
|
|
kind: Service
|
|
apiVersion: v1
|
|
metadata:
|
|
name: linkerd-identity
|
|
namespace: linkerd
|
|
labels:
|
|
linkerd.io/control-plane-component: identity
|
|
linkerd.io/control-plane-ns: linkerd
|
|
annotations:
|
|
linkerd.io/created-by: linkerd/cli edge-20.9.4
|
|
spec:
|
|
type: ClusterIP
|
|
selector:
|
|
linkerd.io/control-plane-component: identity
|
|
ports:
|
|
- name: grpc
|
|
port: 8080
|
|
targetPort: 8080
|
|
---
|
|
kind: Service
|
|
apiVersion: v1
|
|
metadata:
|
|
name: linkerd-identity-headless
|
|
namespace: linkerd
|
|
labels:
|
|
linkerd.io/control-plane-component: identity
|
|
linkerd.io/control-plane-ns: linkerd
|
|
annotations:
|
|
linkerd.io/created-by: linkerd/cli edge-20.9.4
|
|
spec:
|
|
clusterIP: None
|
|
selector:
|
|
linkerd.io/control-plane-component: identity
|
|
ports:
|
|
- name: grpc
|
|
port: 8080
|
|
targetPort: 8080
|
|
---
|
|
apiVersion: apps/v1
|
|
kind: Deployment
|
|
metadata:
|
|
annotations:
|
|
linkerd.io/created-by: linkerd/cli edge-20.9.4
|
|
labels:
|
|
app.kubernetes.io/name: identity
|
|
app.kubernetes.io/part-of: Linkerd
|
|
app.kubernetes.io/version: edge-20.9.4
|
|
linkerd.io/control-plane-component: identity
|
|
linkerd.io/control-plane-ns: linkerd
|
|
name: linkerd-identity
|
|
namespace: linkerd
|
|
spec:
|
|
replicas: 1
|
|
selector:
|
|
matchLabels:
|
|
linkerd.io/control-plane-component: identity
|
|
linkerd.io/control-plane-ns: linkerd
|
|
linkerd.io/proxy-deployment: linkerd-identity
|
|
template:
|
|
metadata:
|
|
annotations:
|
|
linkerd.io/created-by: linkerd/cli edge-20.9.4
|
|
linkerd.io/identity-mode: default
|
|
linkerd.io/proxy-version: edge-20.9.4
|
|
labels:
|
|
linkerd.io/control-plane-component: identity
|
|
linkerd.io/control-plane-ns: linkerd
|
|
linkerd.io/workload-ns: linkerd
|
|
linkerd.io/proxy-deployment: linkerd-identity
|
|
spec:
|
|
nodeSelector:
|
|
beta.kubernetes.io/os: linux
|
|
containers:
|
|
- args:
|
|
- identity
|
|
- -log-level=info
|
|
image: ghcr.io/linkerd/controller:edge-20.9.4
|
|
imagePullPolicy: IfNotPresent
|
|
livenessProbe:
|
|
httpGet:
|
|
path: /ping
|
|
port: 9990
|
|
initialDelaySeconds: 10
|
|
name: identity
|
|
ports:
|
|
- containerPort: 8080
|
|
name: grpc
|
|
- containerPort: 9990
|
|
name: admin-http
|
|
readinessProbe:
|
|
failureThreshold: 7
|
|
httpGet:
|
|
path: /ready
|
|
port: 9990
|
|
securityContext:
|
|
runAsUser: 2103
|
|
volumeMounts:
|
|
- mountPath: /var/run/linkerd/config
|
|
name: config
|
|
- mountPath: /var/run/linkerd/identity/issuer
|
|
name: identity-issuer
|
|
- env:
|
|
- name: LINKERD2_PROXY_LOG
|
|
value: warn,linkerd=info
|
|
- name: LINKERD2_PROXY_LOG_FORMAT
|
|
value: plain
|
|
- name: LINKERD2_PROXY_DESTINATION_SVC_ADDR
|
|
value: linkerd-dst-headless.linkerd.svc.cluster.local:8086
|
|
- name: LINKERD2_PROXY_DESTINATION_GET_NETWORKS
|
|
value: "10.0.0.0/8,172.16.0.0/12,192.168.0.0/16"
|
|
- name: LINKERD2_PROXY_DESTINATION_PROFILE_NETWORKS
|
|
value: "10.0.0.0/8,172.16.0.0/12,192.168.0.0/16"
|
|
- name: LINKERD2_PROXY_INBOUND_CONNECT_TIMEOUT
|
|
value: "100ms"
|
|
- name: LINKERD2_PROXY_OUTBOUND_CONNECT_TIMEOUT
|
|
value: "1000ms"
|
|
- name: LINKERD2_PROXY_CONTROL_LISTEN_ADDR
|
|
value: 0.0.0.0:4190
|
|
- name: LINKERD2_PROXY_ADMIN_LISTEN_ADDR
|
|
value: 0.0.0.0:4191
|
|
- name: LINKERD2_PROXY_OUTBOUND_LISTEN_ADDR
|
|
value: 127.0.0.1:4140
|
|
- name: LINKERD2_PROXY_INBOUND_LISTEN_ADDR
|
|
value: 0.0.0.0:4143
|
|
- name: LINKERD2_PROXY_DESTINATION_GET_SUFFIXES
|
|
value: svc.cluster.local.
|
|
- name: LINKERD2_PROXY_DESTINATION_PROFILE_SUFFIXES
|
|
value: svc.cluster.local.
|
|
- name: LINKERD2_PROXY_INBOUND_ACCEPT_KEEPALIVE
|
|
value: 10000ms
|
|
- name: LINKERD2_PROXY_OUTBOUND_CONNECT_KEEPALIVE
|
|
value: 10000ms
|
|
- name: _pod_ns
|
|
valueFrom:
|
|
fieldRef:
|
|
fieldPath: metadata.namespace
|
|
- name: _pod_nodeName
|
|
valueFrom:
|
|
fieldRef:
|
|
fieldPath: spec.nodeName
|
|
- name: LINKERD2_PROXY_DESTINATION_CONTEXT
|
|
value: |
|
|
{"ns":"$(_pod_ns)", "nodeName":"$(_pod_nodeName)"}
|
|
- name: LINKERD2_PROXY_IDENTITY_DIR
|
|
value: /var/run/linkerd/identity/end-entity
|
|
- name: LINKERD2_PROXY_IDENTITY_TRUST_ANCHORS
|
|
value: |
|
|
-----BEGIN CERTIFICATE-----
|
|
MIIBrjCCAVSgAwIBAgIBATAKBggqhkjOPQQDAjApMScwJQYDVQQDEx5pZGVudGl0
|
|
eS5saW5rZXJkLmNsdXN0ZXIubG9jYWwwHhcNMjAwOTMwMjAwNzQ3WhcNMjEwOTMw
|
|
MjAwODA3WjApMScwJQYDVQQDEx5pZGVudGl0eS5saW5rZXJkLmNsdXN0ZXIubG9j
|
|
YWwwWTATBgcqhkjOPQIBBggqhkjOPQMBBwNCAAT9p3wdHcjyclr/WdYARxYEdJo1
|
|
HjcDDU8clbbD83qxQQcEVC6J3XXZtR2f+09Bcc96FxZol5O4dEZtRJzyFm2Jo20w
|
|
azAOBgNVHQ8BAf8EBAMCAQYwHQYDVR0lBBYwFAYIKwYBBQUHAwEGCCsGAQUFBwMC
|
|
MA8GA1UdEwEB/wQFMAMBAf8wKQYDVR0RBCIwIIIeaWRlbnRpdHkubGlua2VyZC5j
|
|
bHVzdGVyLmxvY2FsMAoGCCqGSM49BAMCA0gAMEUCIQDQDEcfUwCGbYnNjU6HJln+
|
|
B8tXapzhErGwLOlyPQT28wIgYAdLtbEgQeg0ZUidFO4QHcaF9UDo88+UifkbLGit
|
|
CC4=
|
|
-----END CERTIFICATE-----
|
|
- name: LINKERD2_PROXY_IDENTITY_TOKEN_FILE
|
|
value: /var/run/secrets/kubernetes.io/serviceaccount/token
|
|
- name: LINKERD2_PROXY_IDENTITY_SVC_ADDR
|
|
value: localhost.:8080
|
|
- name: _pod_sa
|
|
valueFrom:
|
|
fieldRef:
|
|
fieldPath: spec.serviceAccountName
|
|
- name: _l5d_ns
|
|
value: linkerd
|
|
- name: _l5d_trustdomain
|
|
value: cluster.local
|
|
- name: LINKERD2_PROXY_IDENTITY_LOCAL_NAME
|
|
value: $(_pod_sa).$(_pod_ns).serviceaccount.identity.$(_l5d_ns).$(_l5d_trustdomain)
|
|
- name: LINKERD2_PROXY_IDENTITY_SVC_NAME
|
|
value: linkerd-identity.$(_l5d_ns).serviceaccount.identity.$(_l5d_ns).$(_l5d_trustdomain)
|
|
- name: LINKERD2_PROXY_DESTINATION_SVC_NAME
|
|
value: linkerd-destination.$(_l5d_ns).serviceaccount.identity.$(_l5d_ns).$(_l5d_trustdomain)
|
|
- name: LINKERD2_PROXY_TAP_SVC_NAME
|
|
value: linkerd-tap.$(_l5d_ns).serviceaccount.identity.$(_l5d_ns).$(_l5d_trustdomain)
|
|
image: ghcr.io/linkerd/proxy:edge-20.9.4
|
|
imagePullPolicy: IfNotPresent
|
|
livenessProbe:
|
|
httpGet:
|
|
path: /live
|
|
port: 4191
|
|
initialDelaySeconds: 10
|
|
name: linkerd-proxy
|
|
ports:
|
|
- containerPort: 4143
|
|
name: linkerd-proxy
|
|
- containerPort: 4191
|
|
name: linkerd-admin
|
|
readinessProbe:
|
|
httpGet:
|
|
path: /ready
|
|
port: 4191
|
|
initialDelaySeconds: 2
|
|
resources:
|
|
securityContext:
|
|
allowPrivilegeEscalation: false
|
|
readOnlyRootFilesystem: true
|
|
runAsUser: 2102
|
|
terminationMessagePolicy: FallbackToLogsOnError
|
|
volumeMounts:
|
|
- mountPath: /var/run/linkerd/identity/end-entity
|
|
name: linkerd-identity-end-entity
|
|
initContainers:
|
|
- args:
|
|
- --incoming-proxy-port
|
|
- "4143"
|
|
- --outgoing-proxy-port
|
|
- "4140"
|
|
- --proxy-uid
|
|
- "2102"
|
|
- --inbound-ports-to-ignore
|
|
- 4190,4191
|
|
- --outbound-ports-to-ignore
|
|
- "443"
|
|
image: ghcr.io/linkerd/proxy-init:v1.3.6
|
|
imagePullPolicy: IfNotPresent
|
|
name: linkerd-init
|
|
resources:
|
|
limits:
|
|
cpu: "100m"
|
|
memory: "50Mi"
|
|
requests:
|
|
cpu: "10m"
|
|
memory: "10Mi"
|
|
securityContext:
|
|
allowPrivilegeEscalation: false
|
|
capabilities:
|
|
add:
|
|
- NET_ADMIN
|
|
- NET_RAW
|
|
privileged: false
|
|
readOnlyRootFilesystem: true
|
|
runAsNonRoot: false
|
|
runAsUser: 0
|
|
terminationMessagePolicy: FallbackToLogsOnError
|
|
volumeMounts:
|
|
- mountPath: /run
|
|
name: linkerd-proxy-init-xtables-lock
|
|
serviceAccountName: linkerd-identity
|
|
volumes:
|
|
- configMap:
|
|
name: linkerd-config
|
|
name: config
|
|
- name: identity-issuer
|
|
secret:
|
|
secretName: linkerd-identity-issuer
|
|
- emptyDir: {}
|
|
name: linkerd-proxy-init-xtables-lock
|
|
- emptyDir:
|
|
medium: Memory
|
|
name: linkerd-identity-end-entity
|
|
---
|
|
###
|
|
### Controller
|
|
###
|
|
---
|
|
kind: Service
|
|
apiVersion: v1
|
|
metadata:
|
|
name: linkerd-controller-api
|
|
namespace: linkerd
|
|
labels:
|
|
linkerd.io/control-plane-component: controller
|
|
linkerd.io/control-plane-ns: linkerd
|
|
annotations:
|
|
linkerd.io/created-by: linkerd/cli edge-20.9.4
|
|
spec:
|
|
type: ClusterIP
|
|
selector:
|
|
linkerd.io/control-plane-component: controller
|
|
ports:
|
|
- name: http
|
|
port: 8085
|
|
targetPort: 8085
|
|
---
|
|
apiVersion: apps/v1
|
|
kind: Deployment
|
|
metadata:
|
|
annotations:
|
|
linkerd.io/created-by: linkerd/cli edge-20.9.4
|
|
labels:
|
|
app.kubernetes.io/name: controller
|
|
app.kubernetes.io/part-of: Linkerd
|
|
app.kubernetes.io/version: edge-20.9.4
|
|
linkerd.io/control-plane-component: controller
|
|
linkerd.io/control-plane-ns: linkerd
|
|
name: linkerd-controller
|
|
namespace: linkerd
|
|
spec:
|
|
replicas: 1
|
|
selector:
|
|
matchLabels:
|
|
linkerd.io/control-plane-component: controller
|
|
linkerd.io/control-plane-ns: linkerd
|
|
linkerd.io/proxy-deployment: linkerd-controller
|
|
template:
|
|
metadata:
|
|
annotations:
|
|
linkerd.io/created-by: linkerd/cli edge-20.9.4
|
|
linkerd.io/identity-mode: default
|
|
linkerd.io/proxy-version: edge-20.9.4
|
|
labels:
|
|
linkerd.io/control-plane-component: controller
|
|
linkerd.io/control-plane-ns: linkerd
|
|
linkerd.io/workload-ns: linkerd
|
|
linkerd.io/proxy-deployment: linkerd-controller
|
|
spec:
|
|
nodeSelector:
|
|
beta.kubernetes.io/os: linux
|
|
containers:
|
|
- args:
|
|
- public-api
|
|
- -destination-addr=linkerd-dst.linkerd.svc.cluster.local:8086
|
|
- -controller-namespace=linkerd
|
|
- -log-level=info
|
|
- -prometheus-url=http://linkerd-prometheus.linkerd.svc.cluster.local:9090
|
|
image: ghcr.io/linkerd/controller:edge-20.9.4
|
|
imagePullPolicy: IfNotPresent
|
|
livenessProbe:
|
|
httpGet:
|
|
path: /ping
|
|
port: 9995
|
|
initialDelaySeconds: 10
|
|
name: public-api
|
|
ports:
|
|
- containerPort: 8085
|
|
name: http
|
|
- containerPort: 9995
|
|
name: admin-http
|
|
readinessProbe:
|
|
failureThreshold: 7
|
|
httpGet:
|
|
path: /ready
|
|
port: 9995
|
|
securityContext:
|
|
runAsUser: 2103
|
|
volumeMounts:
|
|
- mountPath: /var/run/linkerd/config
|
|
name: config
|
|
- env:
|
|
- name: LINKERD2_PROXY_LOG
|
|
value: warn,linkerd=info
|
|
- name: LINKERD2_PROXY_LOG_FORMAT
|
|
value: plain
|
|
- name: LINKERD2_PROXY_DESTINATION_SVC_ADDR
|
|
value: linkerd-dst-headless.linkerd.svc.cluster.local:8086
|
|
- name: LINKERD2_PROXY_DESTINATION_GET_NETWORKS
|
|
value: "10.0.0.0/8,172.16.0.0/12,192.168.0.0/16"
|
|
- name: LINKERD2_PROXY_DESTINATION_PROFILE_NETWORKS
|
|
value: "10.0.0.0/8,172.16.0.0/12,192.168.0.0/16"
|
|
- name: LINKERD2_PROXY_INBOUND_CONNECT_TIMEOUT
|
|
value: "100ms"
|
|
- name: LINKERD2_PROXY_OUTBOUND_CONNECT_TIMEOUT
|
|
value: "1000ms"
|
|
- name: LINKERD2_PROXY_CONTROL_LISTEN_ADDR
|
|
value: 0.0.0.0:4190
|
|
- name: LINKERD2_PROXY_ADMIN_LISTEN_ADDR
|
|
value: 0.0.0.0:4191
|
|
- name: LINKERD2_PROXY_OUTBOUND_LISTEN_ADDR
|
|
value: 127.0.0.1:4140
|
|
- name: LINKERD2_PROXY_INBOUND_LISTEN_ADDR
|
|
value: 0.0.0.0:4143
|
|
- name: LINKERD2_PROXY_DESTINATION_GET_SUFFIXES
|
|
value: svc.cluster.local.
|
|
- name: LINKERD2_PROXY_DESTINATION_PROFILE_SUFFIXES
|
|
value: svc.cluster.local.
|
|
- name: LINKERD2_PROXY_INBOUND_ACCEPT_KEEPALIVE
|
|
value: 10000ms
|
|
- name: LINKERD2_PROXY_OUTBOUND_CONNECT_KEEPALIVE
|
|
value: 10000ms
|
|
- name: _pod_ns
|
|
valueFrom:
|
|
fieldRef:
|
|
fieldPath: metadata.namespace
|
|
- name: _pod_nodeName
|
|
valueFrom:
|
|
fieldRef:
|
|
fieldPath: spec.nodeName
|
|
- name: LINKERD2_PROXY_DESTINATION_CONTEXT
|
|
value: |
|
|
{"ns":"$(_pod_ns)", "nodeName":"$(_pod_nodeName)"}
|
|
- name: LINKERD2_PROXY_IDENTITY_DIR
|
|
value: /var/run/linkerd/identity/end-entity
|
|
- name: LINKERD2_PROXY_IDENTITY_TRUST_ANCHORS
|
|
value: |
|
|
-----BEGIN CERTIFICATE-----
|
|
MIIBrjCCAVSgAwIBAgIBATAKBggqhkjOPQQDAjApMScwJQYDVQQDEx5pZGVudGl0
|
|
eS5saW5rZXJkLmNsdXN0ZXIubG9jYWwwHhcNMjAwOTMwMjAwNzQ3WhcNMjEwOTMw
|
|
MjAwODA3WjApMScwJQYDVQQDEx5pZGVudGl0eS5saW5rZXJkLmNsdXN0ZXIubG9j
|
|
YWwwWTATBgcqhkjOPQIBBggqhkjOPQMBBwNCAAT9p3wdHcjyclr/WdYARxYEdJo1
|
|
HjcDDU8clbbD83qxQQcEVC6J3XXZtR2f+09Bcc96FxZol5O4dEZtRJzyFm2Jo20w
|
|
azAOBgNVHQ8BAf8EBAMCAQYwHQYDVR0lBBYwFAYIKwYBBQUHAwEGCCsGAQUFBwMC
|
|
MA8GA1UdEwEB/wQFMAMBAf8wKQYDVR0RBCIwIIIeaWRlbnRpdHkubGlua2VyZC5j
|
|
bHVzdGVyLmxvY2FsMAoGCCqGSM49BAMCA0gAMEUCIQDQDEcfUwCGbYnNjU6HJln+
|
|
B8tXapzhErGwLOlyPQT28wIgYAdLtbEgQeg0ZUidFO4QHcaF9UDo88+UifkbLGit
|
|
CC4=
|
|
-----END CERTIFICATE-----
|
|
- name: LINKERD2_PROXY_IDENTITY_TOKEN_FILE
|
|
value: /var/run/secrets/kubernetes.io/serviceaccount/token
|
|
- name: LINKERD2_PROXY_IDENTITY_SVC_ADDR
|
|
value: linkerd-identity-headless.linkerd.svc.cluster.local:8080
|
|
- name: _pod_sa
|
|
valueFrom:
|
|
fieldRef:
|
|
fieldPath: spec.serviceAccountName
|
|
- name: _l5d_ns
|
|
value: linkerd
|
|
- name: _l5d_trustdomain
|
|
value: cluster.local
|
|
- name: LINKERD2_PROXY_IDENTITY_LOCAL_NAME
|
|
value: $(_pod_sa).$(_pod_ns).serviceaccount.identity.$(_l5d_ns).$(_l5d_trustdomain)
|
|
- name: LINKERD2_PROXY_IDENTITY_SVC_NAME
|
|
value: linkerd-identity.$(_l5d_ns).serviceaccount.identity.$(_l5d_ns).$(_l5d_trustdomain)
|
|
- name: LINKERD2_PROXY_DESTINATION_SVC_NAME
|
|
value: linkerd-destination.$(_l5d_ns).serviceaccount.identity.$(_l5d_ns).$(_l5d_trustdomain)
|
|
- name: LINKERD2_PROXY_TAP_SVC_NAME
|
|
value: linkerd-tap.$(_l5d_ns).serviceaccount.identity.$(_l5d_ns).$(_l5d_trustdomain)
|
|
image: ghcr.io/linkerd/proxy:edge-20.9.4
|
|
imagePullPolicy: IfNotPresent
|
|
livenessProbe:
|
|
httpGet:
|
|
path: /live
|
|
port: 4191
|
|
initialDelaySeconds: 10
|
|
name: linkerd-proxy
|
|
ports:
|
|
- containerPort: 4143
|
|
name: linkerd-proxy
|
|
- containerPort: 4191
|
|
name: linkerd-admin
|
|
readinessProbe:
|
|
httpGet:
|
|
path: /ready
|
|
port: 4191
|
|
initialDelaySeconds: 2
|
|
resources:
|
|
securityContext:
|
|
allowPrivilegeEscalation: false
|
|
readOnlyRootFilesystem: true
|
|
runAsUser: 2102
|
|
terminationMessagePolicy: FallbackToLogsOnError
|
|
volumeMounts:
|
|
- mountPath: /var/run/linkerd/identity/end-entity
|
|
name: linkerd-identity-end-entity
|
|
initContainers:
|
|
- args:
|
|
- --incoming-proxy-port
|
|
- "4143"
|
|
- --outgoing-proxy-port
|
|
- "4140"
|
|
- --proxy-uid
|
|
- "2102"
|
|
- --inbound-ports-to-ignore
|
|
- 4190,4191
|
|
- --outbound-ports-to-ignore
|
|
- "443"
|
|
image: ghcr.io/linkerd/proxy-init:v1.3.6
|
|
imagePullPolicy: IfNotPresent
|
|
name: linkerd-init
|
|
resources:
|
|
limits:
|
|
cpu: "100m"
|
|
memory: "50Mi"
|
|
requests:
|
|
cpu: "10m"
|
|
memory: "10Mi"
|
|
securityContext:
|
|
allowPrivilegeEscalation: false
|
|
capabilities:
|
|
add:
|
|
- NET_ADMIN
|
|
- NET_RAW
|
|
privileged: false
|
|
readOnlyRootFilesystem: true
|
|
runAsNonRoot: false
|
|
runAsUser: 0
|
|
terminationMessagePolicy: FallbackToLogsOnError
|
|
volumeMounts:
|
|
- mountPath: /run
|
|
name: linkerd-proxy-init-xtables-lock
|
|
serviceAccountName: linkerd-controller
|
|
volumes:
|
|
- configMap:
|
|
name: linkerd-config
|
|
name: config
|
|
- emptyDir: {}
|
|
name: linkerd-proxy-init-xtables-lock
|
|
- emptyDir:
|
|
medium: Memory
|
|
name: linkerd-identity-end-entity
|
|
---
|
|
###
|
|
### Destination Controller Service
|
|
###
|
|
---
|
|
kind: Service
|
|
apiVersion: v1
|
|
metadata:
|
|
name: linkerd-dst
|
|
namespace: linkerd
|
|
labels:
|
|
linkerd.io/control-plane-component: destination
|
|
linkerd.io/control-plane-ns: linkerd
|
|
annotations:
|
|
linkerd.io/created-by: linkerd/cli edge-20.9.4
|
|
spec:
|
|
type: ClusterIP
|
|
selector:
|
|
linkerd.io/control-plane-component: destination
|
|
ports:
|
|
- name: grpc
|
|
port: 8086
|
|
targetPort: 8086
|
|
---
|
|
kind: Service
|
|
apiVersion: v1
|
|
metadata:
|
|
name: linkerd-dst-headless
|
|
namespace: linkerd
|
|
labels:
|
|
linkerd.io/control-plane-component: destination
|
|
linkerd.io/control-plane-ns: linkerd
|
|
annotations:
|
|
linkerd.io/created-by: linkerd/cli edge-20.9.4
|
|
spec:
|
|
clusterIP: None
|
|
selector:
|
|
linkerd.io/control-plane-component: destination
|
|
ports:
|
|
- name: grpc
|
|
port: 8086
|
|
targetPort: 8086
|
|
---
|
|
apiVersion: apps/v1
|
|
kind: Deployment
|
|
metadata:
|
|
annotations:
|
|
linkerd.io/created-by: linkerd/cli edge-20.9.4
|
|
labels:
|
|
app.kubernetes.io/name: destination
|
|
app.kubernetes.io/part-of: Linkerd
|
|
app.kubernetes.io/version: edge-20.9.4
|
|
linkerd.io/control-plane-component: destination
|
|
linkerd.io/control-plane-ns: linkerd
|
|
name: linkerd-destination
|
|
namespace: linkerd
|
|
spec:
|
|
replicas: 1
|
|
selector:
|
|
matchLabels:
|
|
linkerd.io/control-plane-component: destination
|
|
linkerd.io/control-plane-ns: linkerd
|
|
linkerd.io/proxy-deployment: linkerd-destination
|
|
template:
|
|
metadata:
|
|
annotations:
|
|
linkerd.io/created-by: linkerd/cli edge-20.9.4
|
|
linkerd.io/identity-mode: default
|
|
linkerd.io/proxy-version: edge-20.9.4
|
|
labels:
|
|
linkerd.io/control-plane-component: destination
|
|
linkerd.io/control-plane-ns: linkerd
|
|
linkerd.io/workload-ns: linkerd
|
|
linkerd.io/proxy-deployment: linkerd-destination
|
|
spec:
|
|
nodeSelector:
|
|
beta.kubernetes.io/os: linux
|
|
containers:
|
|
- args:
|
|
- destination
|
|
- -addr=:8086
|
|
- -controller-namespace=linkerd
|
|
- -enable-h2-upgrade=true
|
|
- -log-level=info
|
|
- -enable-endpoint-slices=false
|
|
image: ghcr.io/linkerd/controller:edge-20.9.4
|
|
imagePullPolicy: IfNotPresent
|
|
livenessProbe:
|
|
httpGet:
|
|
path: /ping
|
|
port: 9996
|
|
initialDelaySeconds: 10
|
|
name: destination
|
|
ports:
|
|
- containerPort: 8086
|
|
name: grpc
|
|
- containerPort: 9996
|
|
name: admin-http
|
|
readinessProbe:
|
|
failureThreshold: 7
|
|
httpGet:
|
|
path: /ready
|
|
port: 9996
|
|
securityContext:
|
|
runAsUser: 2103
|
|
volumeMounts:
|
|
- mountPath: /var/run/linkerd/config
|
|
name: config
|
|
- env:
|
|
- name: LINKERD2_PROXY_LOG
|
|
value: warn,linkerd=info
|
|
- name: LINKERD2_PROXY_LOG_FORMAT
|
|
value: plain
|
|
- name: LINKERD2_PROXY_DESTINATION_SVC_ADDR
|
|
value: localhost.:8086
|
|
- name: LINKERD2_PROXY_DESTINATION_GET_NETWORKS
|
|
value: "10.0.0.0/8,172.16.0.0/12,192.168.0.0/16"
|
|
- name: LINKERD2_PROXY_DESTINATION_PROFILE_NETWORKS
|
|
value: "10.0.0.0/8,172.16.0.0/12,192.168.0.0/16"
|
|
- name: LINKERD2_PROXY_INBOUND_CONNECT_TIMEOUT
|
|
value: "100ms"
|
|
- name: LINKERD2_PROXY_OUTBOUND_CONNECT_TIMEOUT
|
|
value: "1000ms"
|
|
- name: LINKERD2_PROXY_CONTROL_LISTEN_ADDR
|
|
value: 0.0.0.0:4190
|
|
- name: LINKERD2_PROXY_ADMIN_LISTEN_ADDR
|
|
value: 0.0.0.0:4191
|
|
- name: LINKERD2_PROXY_OUTBOUND_LISTEN_ADDR
|
|
value: 127.0.0.1:4140
|
|
- name: LINKERD2_PROXY_INBOUND_LISTEN_ADDR
|
|
value: 0.0.0.0:4143
|
|
- name: LINKERD2_PROXY_DESTINATION_GET_SUFFIXES
|
|
value: svc.cluster.local.
|
|
- name: LINKERD2_PROXY_DESTINATION_PROFILE_SUFFIXES
|
|
value: svc.cluster.local.
|
|
- name: LINKERD2_PROXY_INBOUND_ACCEPT_KEEPALIVE
|
|
value: 10000ms
|
|
- name: LINKERD2_PROXY_OUTBOUND_CONNECT_KEEPALIVE
|
|
value: 10000ms
|
|
- name: _pod_ns
|
|
valueFrom:
|
|
fieldRef:
|
|
fieldPath: metadata.namespace
|
|
- name: _pod_nodeName
|
|
valueFrom:
|
|
fieldRef:
|
|
fieldPath: spec.nodeName
|
|
- name: LINKERD2_PROXY_DESTINATION_CONTEXT
|
|
value: |
|
|
{"ns":"$(_pod_ns)", "nodeName":"$(_pod_nodeName)"}
|
|
- name: LINKERD2_PROXY_IDENTITY_DIR
|
|
value: /var/run/linkerd/identity/end-entity
|
|
- name: LINKERD2_PROXY_IDENTITY_TRUST_ANCHORS
|
|
value: |
|
|
-----BEGIN CERTIFICATE-----
|
|
MIIBrjCCAVSgAwIBAgIBATAKBggqhkjOPQQDAjApMScwJQYDVQQDEx5pZGVudGl0
|
|
eS5saW5rZXJkLmNsdXN0ZXIubG9jYWwwHhcNMjAwOTMwMjAwNzQ3WhcNMjEwOTMw
|
|
MjAwODA3WjApMScwJQYDVQQDEx5pZGVudGl0eS5saW5rZXJkLmNsdXN0ZXIubG9j
|
|
YWwwWTATBgcqhkjOPQIBBggqhkjOPQMBBwNCAAT9p3wdHcjyclr/WdYARxYEdJo1
|
|
HjcDDU8clbbD83qxQQcEVC6J3XXZtR2f+09Bcc96FxZol5O4dEZtRJzyFm2Jo20w
|
|
azAOBgNVHQ8BAf8EBAMCAQYwHQYDVR0lBBYwFAYIKwYBBQUHAwEGCCsGAQUFBwMC
|
|
MA8GA1UdEwEB/wQFMAMBAf8wKQYDVR0RBCIwIIIeaWRlbnRpdHkubGlua2VyZC5j
|
|
bHVzdGVyLmxvY2FsMAoGCCqGSM49BAMCA0gAMEUCIQDQDEcfUwCGbYnNjU6HJln+
|
|
B8tXapzhErGwLOlyPQT28wIgYAdLtbEgQeg0ZUidFO4QHcaF9UDo88+UifkbLGit
|
|
CC4=
|
|
-----END CERTIFICATE-----
|
|
- name: LINKERD2_PROXY_IDENTITY_TOKEN_FILE
|
|
value: /var/run/secrets/kubernetes.io/serviceaccount/token
|
|
- name: LINKERD2_PROXY_IDENTITY_SVC_ADDR
|
|
value: linkerd-identity-headless.linkerd.svc.cluster.local:8080
|
|
- name: _pod_sa
|
|
valueFrom:
|
|
fieldRef:
|
|
fieldPath: spec.serviceAccountName
|
|
- name: _l5d_ns
|
|
value: linkerd
|
|
- name: _l5d_trustdomain
|
|
value: cluster.local
|
|
- name: LINKERD2_PROXY_IDENTITY_LOCAL_NAME
|
|
value: $(_pod_sa).$(_pod_ns).serviceaccount.identity.$(_l5d_ns).$(_l5d_trustdomain)
|
|
- name: LINKERD2_PROXY_IDENTITY_SVC_NAME
|
|
value: linkerd-identity.$(_l5d_ns).serviceaccount.identity.$(_l5d_ns).$(_l5d_trustdomain)
|
|
- name: LINKERD2_PROXY_DESTINATION_SVC_NAME
|
|
value: linkerd-destination.$(_l5d_ns).serviceaccount.identity.$(_l5d_ns).$(_l5d_trustdomain)
|
|
- name: LINKERD2_PROXY_TAP_SVC_NAME
|
|
value: linkerd-tap.$(_l5d_ns).serviceaccount.identity.$(_l5d_ns).$(_l5d_trustdomain)
|
|
image: ghcr.io/linkerd/proxy:edge-20.9.4
|
|
imagePullPolicy: IfNotPresent
|
|
livenessProbe:
|
|
httpGet:
|
|
path: /live
|
|
port: 4191
|
|
initialDelaySeconds: 10
|
|
name: linkerd-proxy
|
|
ports:
|
|
- containerPort: 4143
|
|
name: linkerd-proxy
|
|
- containerPort: 4191
|
|
name: linkerd-admin
|
|
readinessProbe:
|
|
httpGet:
|
|
path: /ready
|
|
port: 4191
|
|
initialDelaySeconds: 2
|
|
resources:
|
|
securityContext:
|
|
allowPrivilegeEscalation: false
|
|
readOnlyRootFilesystem: true
|
|
runAsUser: 2102
|
|
terminationMessagePolicy: FallbackToLogsOnError
|
|
volumeMounts:
|
|
- mountPath: /var/run/linkerd/identity/end-entity
|
|
name: linkerd-identity-end-entity
|
|
initContainers:
|
|
- args:
|
|
- --incoming-proxy-port
|
|
- "4143"
|
|
- --outgoing-proxy-port
|
|
- "4140"
|
|
- --proxy-uid
|
|
- "2102"
|
|
- --inbound-ports-to-ignore
|
|
- 4190,4191
|
|
- --outbound-ports-to-ignore
|
|
- "443"
|
|
image: ghcr.io/linkerd/proxy-init:v1.3.6
|
|
imagePullPolicy: IfNotPresent
|
|
name: linkerd-init
|
|
resources:
|
|
limits:
|
|
cpu: "100m"
|
|
memory: "50Mi"
|
|
requests:
|
|
cpu: "10m"
|
|
memory: "10Mi"
|
|
securityContext:
|
|
allowPrivilegeEscalation: false
|
|
capabilities:
|
|
add:
|
|
- NET_ADMIN
|
|
- NET_RAW
|
|
privileged: false
|
|
readOnlyRootFilesystem: true
|
|
runAsNonRoot: false
|
|
runAsUser: 0
|
|
terminationMessagePolicy: FallbackToLogsOnError
|
|
volumeMounts:
|
|
- mountPath: /run
|
|
name: linkerd-proxy-init-xtables-lock
|
|
serviceAccountName: linkerd-destination
|
|
volumes:
|
|
- configMap:
|
|
name: linkerd-config
|
|
name: config
|
|
- emptyDir: {}
|
|
name: linkerd-proxy-init-xtables-lock
|
|
- emptyDir:
|
|
medium: Memory
|
|
name: linkerd-identity-end-entity
|
|
---
|
|
###
|
|
### Heartbeat
|
|
###
|
|
---
|
|
apiVersion: batch/v1beta1
|
|
kind: CronJob
|
|
metadata:
|
|
name: linkerd-heartbeat
|
|
namespace: linkerd
|
|
labels:
|
|
app.kubernetes.io/name: heartbeat
|
|
app.kubernetes.io/part-of: Linkerd
|
|
app.kubernetes.io/version: edge-20.9.4
|
|
linkerd.io/control-plane-component: heartbeat
|
|
linkerd.io/control-plane-ns: linkerd
|
|
annotations:
|
|
linkerd.io/created-by: linkerd/cli edge-20.9.4
|
|
spec:
|
|
schedule: "17 20 * * * "
|
|
successfulJobsHistoryLimit: 0
|
|
jobTemplate:
|
|
spec:
|
|
template:
|
|
metadata:
|
|
labels:
|
|
linkerd.io/control-plane-component: heartbeat
|
|
linkerd.io/workload-ns: linkerd
|
|
annotations:
|
|
linkerd.io/created-by: linkerd/cli edge-20.9.4
|
|
spec:
|
|
nodeSelector:
|
|
beta.kubernetes.io/os: linux
|
|
serviceAccountName: linkerd-heartbeat
|
|
restartPolicy: Never
|
|
containers:
|
|
- name: heartbeat
|
|
image: ghcr.io/linkerd/controller:edge-20.9.4
|
|
imagePullPolicy: IfNotPresent
|
|
args:
|
|
- "heartbeat"
|
|
- "-controller-namespace=linkerd"
|
|
- "-log-level=info"
|
|
- "-prometheus-url=http://linkerd-prometheus.linkerd.svc.cluster.local:9090"
|
|
securityContext:
|
|
runAsUser: 2103
|
|
---
|
|
###
|
|
### Web
|
|
###
|
|
---
|
|
kind: Service
|
|
apiVersion: v1
|
|
metadata:
|
|
name: linkerd-web
|
|
namespace: linkerd
|
|
labels:
|
|
linkerd.io/control-plane-component: web
|
|
linkerd.io/control-plane-ns: linkerd
|
|
annotations:
|
|
linkerd.io/created-by: linkerd/cli edge-20.9.4
|
|
spec:
|
|
type: ClusterIP
|
|
selector:
|
|
linkerd.io/control-plane-component: web
|
|
ports:
|
|
- name: http
|
|
port: 8084
|
|
targetPort: 8084
|
|
- name: admin-http
|
|
port: 9994
|
|
targetPort: 9994
|
|
---
|
|
apiVersion: apps/v1
|
|
kind: Deployment
|
|
metadata:
|
|
annotations:
|
|
linkerd.io/created-by: linkerd/cli edge-20.9.4
|
|
labels:
|
|
app.kubernetes.io/name: web
|
|
app.kubernetes.io/part-of: Linkerd
|
|
app.kubernetes.io/version: edge-20.9.4
|
|
linkerd.io/control-plane-component: web
|
|
linkerd.io/control-plane-ns: linkerd
|
|
name: linkerd-web
|
|
namespace: linkerd
|
|
spec:
|
|
replicas: 1
|
|
selector:
|
|
matchLabels:
|
|
linkerd.io/control-plane-component: web
|
|
linkerd.io/control-plane-ns: linkerd
|
|
linkerd.io/proxy-deployment: linkerd-web
|
|
template:
|
|
metadata:
|
|
annotations:
|
|
linkerd.io/created-by: linkerd/cli edge-20.9.4
|
|
linkerd.io/identity-mode: default
|
|
linkerd.io/proxy-version: edge-20.9.4
|
|
labels:
|
|
linkerd.io/control-plane-component: web
|
|
linkerd.io/control-plane-ns: linkerd
|
|
linkerd.io/workload-ns: linkerd
|
|
linkerd.io/proxy-deployment: linkerd-web
|
|
spec:
|
|
nodeSelector:
|
|
beta.kubernetes.io/os: linux
|
|
containers:
|
|
- args:
|
|
- -api-addr=linkerd-controller-api.linkerd.svc.cluster.local:8085
|
|
- -grafana-addr=linkerd-grafana.linkerd.svc.cluster.local:3000
|
|
- -controller-namespace=linkerd
|
|
- -log-level=info
|
|
- -enforced-host=^(localhost|127\.0\.0\.1|linkerd-web\.linkerd\.svc\.cluster\.local|linkerd-web\.linkerd\.svc|\[::1\])(:\d+)?$
|
|
image: ghcr.io/linkerd/web:edge-20.9.4
|
|
imagePullPolicy: IfNotPresent
|
|
livenessProbe:
|
|
httpGet:
|
|
path: /ping
|
|
port: 9994
|
|
initialDelaySeconds: 10
|
|
name: web
|
|
ports:
|
|
- containerPort: 8084
|
|
name: http
|
|
- containerPort: 9994
|
|
name: admin-http
|
|
readinessProbe:
|
|
failureThreshold: 7
|
|
httpGet:
|
|
path: /ready
|
|
port: 9994
|
|
securityContext:
|
|
runAsUser: 2103
|
|
volumeMounts:
|
|
- mountPath: /var/run/linkerd/config
|
|
name: config
|
|
- env:
|
|
- name: LINKERD2_PROXY_LOG
|
|
value: warn,linkerd=info
|
|
- name: LINKERD2_PROXY_LOG_FORMAT
|
|
value: plain
|
|
- name: LINKERD2_PROXY_DESTINATION_SVC_ADDR
|
|
value: linkerd-dst-headless.linkerd.svc.cluster.local:8086
|
|
- name: LINKERD2_PROXY_DESTINATION_GET_NETWORKS
|
|
value: "10.0.0.0/8,172.16.0.0/12,192.168.0.0/16"
|
|
- name: LINKERD2_PROXY_DESTINATION_PROFILE_NETWORKS
|
|
value: "10.0.0.0/8,172.16.0.0/12,192.168.0.0/16"
|
|
- name: LINKERD2_PROXY_INBOUND_CONNECT_TIMEOUT
|
|
value: "100ms"
|
|
- name: LINKERD2_PROXY_OUTBOUND_CONNECT_TIMEOUT
|
|
value: "1000ms"
|
|
- name: LINKERD2_PROXY_CONTROL_LISTEN_ADDR
|
|
value: 0.0.0.0:4190
|
|
- name: LINKERD2_PROXY_ADMIN_LISTEN_ADDR
|
|
value: 0.0.0.0:4191
|
|
- name: LINKERD2_PROXY_OUTBOUND_LISTEN_ADDR
|
|
value: 127.0.0.1:4140
|
|
- name: LINKERD2_PROXY_INBOUND_LISTEN_ADDR
|
|
value: 0.0.0.0:4143
|
|
- name: LINKERD2_PROXY_DESTINATION_GET_SUFFIXES
|
|
value: svc.cluster.local.
|
|
- name: LINKERD2_PROXY_DESTINATION_PROFILE_SUFFIXES
|
|
value: svc.cluster.local.
|
|
- name: LINKERD2_PROXY_INBOUND_ACCEPT_KEEPALIVE
|
|
value: 10000ms
|
|
- name: LINKERD2_PROXY_OUTBOUND_CONNECT_KEEPALIVE
|
|
value: 10000ms
|
|
- name: _pod_ns
|
|
valueFrom:
|
|
fieldRef:
|
|
fieldPath: metadata.namespace
|
|
- name: _pod_nodeName
|
|
valueFrom:
|
|
fieldRef:
|
|
fieldPath: spec.nodeName
|
|
- name: LINKERD2_PROXY_DESTINATION_CONTEXT
|
|
value: |
|
|
{"ns":"$(_pod_ns)", "nodeName":"$(_pod_nodeName)"}
|
|
- name: LINKERD2_PROXY_IDENTITY_DIR
|
|
value: /var/run/linkerd/identity/end-entity
|
|
- name: LINKERD2_PROXY_IDENTITY_TRUST_ANCHORS
|
|
value: |
|
|
-----BEGIN CERTIFICATE-----
|
|
MIIBrjCCAVSgAwIBAgIBATAKBggqhkjOPQQDAjApMScwJQYDVQQDEx5pZGVudGl0
|
|
eS5saW5rZXJkLmNsdXN0ZXIubG9jYWwwHhcNMjAwOTMwMjAwNzQ3WhcNMjEwOTMw
|
|
MjAwODA3WjApMScwJQYDVQQDEx5pZGVudGl0eS5saW5rZXJkLmNsdXN0ZXIubG9j
|
|
YWwwWTATBgcqhkjOPQIBBggqhkjOPQMBBwNCAAT9p3wdHcjyclr/WdYARxYEdJo1
|
|
HjcDDU8clbbD83qxQQcEVC6J3XXZtR2f+09Bcc96FxZol5O4dEZtRJzyFm2Jo20w
|
|
azAOBgNVHQ8BAf8EBAMCAQYwHQYDVR0lBBYwFAYIKwYBBQUHAwEGCCsGAQUFBwMC
|
|
MA8GA1UdEwEB/wQFMAMBAf8wKQYDVR0RBCIwIIIeaWRlbnRpdHkubGlua2VyZC5j
|
|
bHVzdGVyLmxvY2FsMAoGCCqGSM49BAMCA0gAMEUCIQDQDEcfUwCGbYnNjU6HJln+
|
|
B8tXapzhErGwLOlyPQT28wIgYAdLtbEgQeg0ZUidFO4QHcaF9UDo88+UifkbLGit
|
|
CC4=
|
|
-----END CERTIFICATE-----
|
|
- name: LINKERD2_PROXY_IDENTITY_TOKEN_FILE
|
|
value: /var/run/secrets/kubernetes.io/serviceaccount/token
|
|
- name: LINKERD2_PROXY_IDENTITY_SVC_ADDR
|
|
value: linkerd-identity-headless.linkerd.svc.cluster.local:8080
|
|
- name: _pod_sa
|
|
valueFrom:
|
|
fieldRef:
|
|
fieldPath: spec.serviceAccountName
|
|
- name: _l5d_ns
|
|
value: linkerd
|
|
- name: _l5d_trustdomain
|
|
value: cluster.local
|
|
- name: LINKERD2_PROXY_IDENTITY_LOCAL_NAME
|
|
value: $(_pod_sa).$(_pod_ns).serviceaccount.identity.$(_l5d_ns).$(_l5d_trustdomain)
|
|
- name: LINKERD2_PROXY_IDENTITY_SVC_NAME
|
|
value: linkerd-identity.$(_l5d_ns).serviceaccount.identity.$(_l5d_ns).$(_l5d_trustdomain)
|
|
- name: LINKERD2_PROXY_DESTINATION_SVC_NAME
|
|
value: linkerd-destination.$(_l5d_ns).serviceaccount.identity.$(_l5d_ns).$(_l5d_trustdomain)
|
|
- name: LINKERD2_PROXY_TAP_SVC_NAME
|
|
value: linkerd-tap.$(_l5d_ns).serviceaccount.identity.$(_l5d_ns).$(_l5d_trustdomain)
|
|
image: ghcr.io/linkerd/proxy:edge-20.9.4
|
|
imagePullPolicy: IfNotPresent
|
|
livenessProbe:
|
|
httpGet:
|
|
path: /live
|
|
port: 4191
|
|
initialDelaySeconds: 10
|
|
name: linkerd-proxy
|
|
ports:
|
|
- containerPort: 4143
|
|
name: linkerd-proxy
|
|
- containerPort: 4191
|
|
name: linkerd-admin
|
|
readinessProbe:
|
|
httpGet:
|
|
path: /ready
|
|
port: 4191
|
|
initialDelaySeconds: 2
|
|
resources:
|
|
securityContext:
|
|
allowPrivilegeEscalation: false
|
|
readOnlyRootFilesystem: true
|
|
runAsUser: 2102
|
|
terminationMessagePolicy: FallbackToLogsOnError
|
|
volumeMounts:
|
|
- mountPath: /var/run/linkerd/identity/end-entity
|
|
name: linkerd-identity-end-entity
|
|
initContainers:
|
|
- args:
|
|
- --incoming-proxy-port
|
|
- "4143"
|
|
- --outgoing-proxy-port
|
|
- "4140"
|
|
- --proxy-uid
|
|
- "2102"
|
|
- --inbound-ports-to-ignore
|
|
- 4190,4191
|
|
- --outbound-ports-to-ignore
|
|
- "443"
|
|
image: ghcr.io/linkerd/proxy-init:v1.3.6
|
|
imagePullPolicy: IfNotPresent
|
|
name: linkerd-init
|
|
resources:
|
|
limits:
|
|
cpu: "100m"
|
|
memory: "50Mi"
|
|
requests:
|
|
cpu: "10m"
|
|
memory: "10Mi"
|
|
securityContext:
|
|
allowPrivilegeEscalation: false
|
|
capabilities:
|
|
add:
|
|
- NET_ADMIN
|
|
- NET_RAW
|
|
privileged: false
|
|
readOnlyRootFilesystem: true
|
|
runAsNonRoot: false
|
|
runAsUser: 0
|
|
terminationMessagePolicy: FallbackToLogsOnError
|
|
volumeMounts:
|
|
- mountPath: /run
|
|
name: linkerd-proxy-init-xtables-lock
|
|
serviceAccountName: linkerd-web
|
|
volumes:
|
|
- configMap:
|
|
name: linkerd-config
|
|
name: config
|
|
- emptyDir: {}
|
|
name: linkerd-proxy-init-xtables-lock
|
|
- emptyDir:
|
|
medium: Memory
|
|
name: linkerd-identity-end-entity
|
|
---
|
|
###
|
|
### Proxy Injector
|
|
###
|
|
---
|
|
apiVersion: apps/v1
|
|
kind: Deployment
|
|
metadata:
|
|
annotations:
|
|
linkerd.io/created-by: linkerd/cli edge-20.9.4
|
|
labels:
|
|
app.kubernetes.io/name: proxy-injector
|
|
app.kubernetes.io/part-of: Linkerd
|
|
app.kubernetes.io/version: edge-20.9.4
|
|
linkerd.io/control-plane-component: proxy-injector
|
|
linkerd.io/control-plane-ns: linkerd
|
|
name: linkerd-proxy-injector
|
|
namespace: linkerd
|
|
spec:
|
|
replicas: 1
|
|
selector:
|
|
matchLabels:
|
|
linkerd.io/control-plane-component: proxy-injector
|
|
template:
|
|
metadata:
|
|
annotations:
|
|
linkerd.io/created-by: linkerd/cli edge-20.9.4
|
|
linkerd.io/identity-mode: default
|
|
linkerd.io/proxy-version: edge-20.9.4
|
|
labels:
|
|
linkerd.io/control-plane-component: proxy-injector
|
|
linkerd.io/control-plane-ns: linkerd
|
|
linkerd.io/workload-ns: linkerd
|
|
linkerd.io/proxy-deployment: linkerd-proxy-injector
|
|
spec:
|
|
nodeSelector:
|
|
beta.kubernetes.io/os: linux
|
|
containers:
|
|
- args:
|
|
- proxy-injector
|
|
- -log-level=info
|
|
image: ghcr.io/linkerd/controller:edge-20.9.4
|
|
imagePullPolicy: IfNotPresent
|
|
livenessProbe:
|
|
httpGet:
|
|
path: /ping
|
|
port: 9995
|
|
initialDelaySeconds: 10
|
|
name: proxy-injector
|
|
ports:
|
|
- containerPort: 8443
|
|
name: proxy-injector
|
|
- containerPort: 9995
|
|
name: admin-http
|
|
readinessProbe:
|
|
failureThreshold: 7
|
|
httpGet:
|
|
path: /ready
|
|
port: 9995
|
|
securityContext:
|
|
runAsUser: 2103
|
|
volumeMounts:
|
|
- mountPath: /var/run/linkerd/config
|
|
name: config
|
|
- mountPath: /var/run/linkerd/tls
|
|
name: tls
|
|
readOnly: true
|
|
- env:
|
|
- name: LINKERD2_PROXY_LOG
|
|
value: warn,linkerd=info
|
|
- name: LINKERD2_PROXY_LOG_FORMAT
|
|
value: plain
|
|
- name: LINKERD2_PROXY_DESTINATION_SVC_ADDR
|
|
value: linkerd-dst-headless.linkerd.svc.cluster.local:8086
|
|
- name: LINKERD2_PROXY_DESTINATION_GET_NETWORKS
|
|
value: "10.0.0.0/8,172.16.0.0/12,192.168.0.0/16"
|
|
- name: LINKERD2_PROXY_DESTINATION_PROFILE_NETWORKS
|
|
value: "10.0.0.0/8,172.16.0.0/12,192.168.0.0/16"
|
|
- name: LINKERD2_PROXY_INBOUND_CONNECT_TIMEOUT
|
|
value: "100ms"
|
|
- name: LINKERD2_PROXY_OUTBOUND_CONNECT_TIMEOUT
|
|
value: "1000ms"
|
|
- name: LINKERD2_PROXY_CONTROL_LISTEN_ADDR
|
|
value: 0.0.0.0:4190
|
|
- name: LINKERD2_PROXY_ADMIN_LISTEN_ADDR
|
|
value: 0.0.0.0:4191
|
|
- name: LINKERD2_PROXY_OUTBOUND_LISTEN_ADDR
|
|
value: 127.0.0.1:4140
|
|
- name: LINKERD2_PROXY_INBOUND_LISTEN_ADDR
|
|
value: 0.0.0.0:4143
|
|
- name: LINKERD2_PROXY_DESTINATION_GET_SUFFIXES
|
|
value: svc.cluster.local.
|
|
- name: LINKERD2_PROXY_DESTINATION_PROFILE_SUFFIXES
|
|
value: svc.cluster.local.
|
|
- name: LINKERD2_PROXY_INBOUND_ACCEPT_KEEPALIVE
|
|
value: 10000ms
|
|
- name: LINKERD2_PROXY_OUTBOUND_CONNECT_KEEPALIVE
|
|
value: 10000ms
|
|
- name: _pod_ns
|
|
valueFrom:
|
|
fieldRef:
|
|
fieldPath: metadata.namespace
|
|
- name: _pod_nodeName
|
|
valueFrom:
|
|
fieldRef:
|
|
fieldPath: spec.nodeName
|
|
- name: LINKERD2_PROXY_DESTINATION_CONTEXT
|
|
value: |
|
|
{"ns":"$(_pod_ns)", "nodeName":"$(_pod_nodeName)"}
|
|
- name: LINKERD2_PROXY_IDENTITY_DIR
|
|
value: /var/run/linkerd/identity/end-entity
|
|
- name: LINKERD2_PROXY_IDENTITY_TRUST_ANCHORS
|
|
value: |
|
|
-----BEGIN CERTIFICATE-----
|
|
MIIBrjCCAVSgAwIBAgIBATAKBggqhkjOPQQDAjApMScwJQYDVQQDEx5pZGVudGl0
|
|
eS5saW5rZXJkLmNsdXN0ZXIubG9jYWwwHhcNMjAwOTMwMjAwNzQ3WhcNMjEwOTMw
|
|
MjAwODA3WjApMScwJQYDVQQDEx5pZGVudGl0eS5saW5rZXJkLmNsdXN0ZXIubG9j
|
|
YWwwWTATBgcqhkjOPQIBBggqhkjOPQMBBwNCAAT9p3wdHcjyclr/WdYARxYEdJo1
|
|
HjcDDU8clbbD83qxQQcEVC6J3XXZtR2f+09Bcc96FxZol5O4dEZtRJzyFm2Jo20w
|
|
azAOBgNVHQ8BAf8EBAMCAQYwHQYDVR0lBBYwFAYIKwYBBQUHAwEGCCsGAQUFBwMC
|
|
MA8GA1UdEwEB/wQFMAMBAf8wKQYDVR0RBCIwIIIeaWRlbnRpdHkubGlua2VyZC5j
|
|
bHVzdGVyLmxvY2FsMAoGCCqGSM49BAMCA0gAMEUCIQDQDEcfUwCGbYnNjU6HJln+
|
|
B8tXapzhErGwLOlyPQT28wIgYAdLtbEgQeg0ZUidFO4QHcaF9UDo88+UifkbLGit
|
|
CC4=
|
|
-----END CERTIFICATE-----
|
|
- name: LINKERD2_PROXY_IDENTITY_TOKEN_FILE
|
|
value: /var/run/secrets/kubernetes.io/serviceaccount/token
|
|
- name: LINKERD2_PROXY_IDENTITY_SVC_ADDR
|
|
value: linkerd-identity-headless.linkerd.svc.cluster.local:8080
|
|
- name: _pod_sa
|
|
valueFrom:
|
|
fieldRef:
|
|
fieldPath: spec.serviceAccountName
|
|
- name: _l5d_ns
|
|
value: linkerd
|
|
- name: _l5d_trustdomain
|
|
value: cluster.local
|
|
- name: LINKERD2_PROXY_IDENTITY_LOCAL_NAME
|
|
value: $(_pod_sa).$(_pod_ns).serviceaccount.identity.$(_l5d_ns).$(_l5d_trustdomain)
|
|
- name: LINKERD2_PROXY_IDENTITY_SVC_NAME
|
|
value: linkerd-identity.$(_l5d_ns).serviceaccount.identity.$(_l5d_ns).$(_l5d_trustdomain)
|
|
- name: LINKERD2_PROXY_DESTINATION_SVC_NAME
|
|
value: linkerd-destination.$(_l5d_ns).serviceaccount.identity.$(_l5d_ns).$(_l5d_trustdomain)
|
|
- name: LINKERD2_PROXY_TAP_SVC_NAME
|
|
value: linkerd-tap.$(_l5d_ns).serviceaccount.identity.$(_l5d_ns).$(_l5d_trustdomain)
|
|
image: ghcr.io/linkerd/proxy:edge-20.9.4
|
|
imagePullPolicy: IfNotPresent
|
|
livenessProbe:
|
|
httpGet:
|
|
path: /live
|
|
port: 4191
|
|
initialDelaySeconds: 10
|
|
name: linkerd-proxy
|
|
ports:
|
|
- containerPort: 4143
|
|
name: linkerd-proxy
|
|
- containerPort: 4191
|
|
name: linkerd-admin
|
|
readinessProbe:
|
|
httpGet:
|
|
path: /ready
|
|
port: 4191
|
|
initialDelaySeconds: 2
|
|
resources:
|
|
securityContext:
|
|
allowPrivilegeEscalation: false
|
|
readOnlyRootFilesystem: true
|
|
runAsUser: 2102
|
|
terminationMessagePolicy: FallbackToLogsOnError
|
|
volumeMounts:
|
|
- mountPath: /var/run/linkerd/identity/end-entity
|
|
name: linkerd-identity-end-entity
|
|
initContainers:
|
|
- args:
|
|
- --incoming-proxy-port
|
|
- "4143"
|
|
- --outgoing-proxy-port
|
|
- "4140"
|
|
- --proxy-uid
|
|
- "2102"
|
|
- --inbound-ports-to-ignore
|
|
- 4190,4191
|
|
- --outbound-ports-to-ignore
|
|
- "443"
|
|
image: ghcr.io/linkerd/proxy-init:v1.3.6
|
|
imagePullPolicy: IfNotPresent
|
|
name: linkerd-init
|
|
resources:
|
|
limits:
|
|
cpu: "100m"
|
|
memory: "50Mi"
|
|
requests:
|
|
cpu: "10m"
|
|
memory: "10Mi"
|
|
securityContext:
|
|
allowPrivilegeEscalation: false
|
|
capabilities:
|
|
add:
|
|
- NET_ADMIN
|
|
- NET_RAW
|
|
privileged: false
|
|
readOnlyRootFilesystem: true
|
|
runAsNonRoot: false
|
|
runAsUser: 0
|
|
terminationMessagePolicy: FallbackToLogsOnError
|
|
volumeMounts:
|
|
- mountPath: /run
|
|
name: linkerd-proxy-init-xtables-lock
|
|
serviceAccountName: linkerd-proxy-injector
|
|
volumes:
|
|
- configMap:
|
|
name: linkerd-config
|
|
name: config
|
|
- name: tls
|
|
secret:
|
|
secretName: linkerd-proxy-injector-tls
|
|
- emptyDir: {}
|
|
name: linkerd-proxy-init-xtables-lock
|
|
- emptyDir:
|
|
medium: Memory
|
|
name: linkerd-identity-end-entity
|
|
---
|
|
kind: Service
|
|
apiVersion: v1
|
|
metadata:
|
|
name: linkerd-proxy-injector
|
|
namespace: linkerd
|
|
labels:
|
|
linkerd.io/control-plane-component: proxy-injector
|
|
linkerd.io/control-plane-ns: linkerd
|
|
annotations:
|
|
linkerd.io/created-by: linkerd/cli edge-20.9.4
|
|
spec:
|
|
type: ClusterIP
|
|
selector:
|
|
linkerd.io/control-plane-component: proxy-injector
|
|
ports:
|
|
- name: proxy-injector
|
|
port: 443
|
|
targetPort: proxy-injector
|
|
---
|
|
###
|
|
### Service Profile Validator
|
|
###
|
|
---
|
|
kind: Service
|
|
apiVersion: v1
|
|
metadata:
|
|
name: linkerd-sp-validator
|
|
namespace: linkerd
|
|
labels:
|
|
linkerd.io/control-plane-component: sp-validator
|
|
linkerd.io/control-plane-ns: linkerd
|
|
annotations:
|
|
linkerd.io/created-by: linkerd/cli edge-20.9.4
|
|
spec:
|
|
type: ClusterIP
|
|
selector:
|
|
linkerd.io/control-plane-component: sp-validator
|
|
ports:
|
|
- name: sp-validator
|
|
port: 443
|
|
targetPort: sp-validator
|
|
---
|
|
apiVersion: apps/v1
|
|
kind: Deployment
|
|
metadata:
|
|
annotations:
|
|
linkerd.io/created-by: linkerd/cli edge-20.9.4
|
|
labels:
|
|
app.kubernetes.io/name: sp-validator
|
|
app.kubernetes.io/part-of: Linkerd
|
|
app.kubernetes.io/version: edge-20.9.4
|
|
linkerd.io/control-plane-component: sp-validator
|
|
linkerd.io/control-plane-ns: linkerd
|
|
name: linkerd-sp-validator
|
|
namespace: linkerd
|
|
spec:
|
|
replicas: 1
|
|
selector:
|
|
matchLabels:
|
|
linkerd.io/control-plane-component: sp-validator
|
|
template:
|
|
metadata:
|
|
annotations:
|
|
linkerd.io/created-by: linkerd/cli edge-20.9.4
|
|
linkerd.io/identity-mode: default
|
|
linkerd.io/proxy-version: edge-20.9.4
|
|
labels:
|
|
linkerd.io/control-plane-component: sp-validator
|
|
linkerd.io/control-plane-ns: linkerd
|
|
linkerd.io/workload-ns: linkerd
|
|
linkerd.io/proxy-deployment: linkerd-sp-validator
|
|
spec:
|
|
nodeSelector:
|
|
beta.kubernetes.io/os: linux
|
|
containers:
|
|
- args:
|
|
- sp-validator
|
|
- -log-level=info
|
|
image: ghcr.io/linkerd/controller:edge-20.9.4
|
|
imagePullPolicy: IfNotPresent
|
|
livenessProbe:
|
|
httpGet:
|
|
path: /ping
|
|
port: 9997
|
|
initialDelaySeconds: 10
|
|
name: sp-validator
|
|
ports:
|
|
- containerPort: 8443
|
|
name: sp-validator
|
|
- containerPort: 9997
|
|
name: admin-http
|
|
readinessProbe:
|
|
failureThreshold: 7
|
|
httpGet:
|
|
path: /ready
|
|
port: 9997
|
|
securityContext:
|
|
runAsUser: 2103
|
|
volumeMounts:
|
|
- mountPath: /var/run/linkerd/tls
|
|
name: tls
|
|
readOnly: true
|
|
- env:
|
|
- name: LINKERD2_PROXY_LOG
|
|
value: warn,linkerd=info
|
|
- name: LINKERD2_PROXY_LOG_FORMAT
|
|
value: plain
|
|
- name: LINKERD2_PROXY_DESTINATION_SVC_ADDR
|
|
value: linkerd-dst-headless.linkerd.svc.cluster.local:8086
|
|
- name: LINKERD2_PROXY_DESTINATION_GET_NETWORKS
|
|
value: "10.0.0.0/8,172.16.0.0/12,192.168.0.0/16"
|
|
- name: LINKERD2_PROXY_DESTINATION_PROFILE_NETWORKS
|
|
value: "10.0.0.0/8,172.16.0.0/12,192.168.0.0/16"
|
|
- name: LINKERD2_PROXY_INBOUND_CONNECT_TIMEOUT
|
|
value: "100ms"
|
|
- name: LINKERD2_PROXY_OUTBOUND_CONNECT_TIMEOUT
|
|
value: "1000ms"
|
|
- name: LINKERD2_PROXY_CONTROL_LISTEN_ADDR
|
|
value: 0.0.0.0:4190
|
|
- name: LINKERD2_PROXY_ADMIN_LISTEN_ADDR
|
|
value: 0.0.0.0:4191
|
|
- name: LINKERD2_PROXY_OUTBOUND_LISTEN_ADDR
|
|
value: 127.0.0.1:4140
|
|
- name: LINKERD2_PROXY_INBOUND_LISTEN_ADDR
|
|
value: 0.0.0.0:4143
|
|
- name: LINKERD2_PROXY_DESTINATION_GET_SUFFIXES
|
|
value: svc.cluster.local.
|
|
- name: LINKERD2_PROXY_DESTINATION_PROFILE_SUFFIXES
|
|
value: svc.cluster.local.
|
|
- name: LINKERD2_PROXY_INBOUND_ACCEPT_KEEPALIVE
|
|
value: 10000ms
|
|
- name: LINKERD2_PROXY_OUTBOUND_CONNECT_KEEPALIVE
|
|
value: 10000ms
|
|
- name: _pod_ns
|
|
valueFrom:
|
|
fieldRef:
|
|
fieldPath: metadata.namespace
|
|
- name: _pod_nodeName
|
|
valueFrom:
|
|
fieldRef:
|
|
fieldPath: spec.nodeName
|
|
- name: LINKERD2_PROXY_DESTINATION_CONTEXT
|
|
value: |
|
|
{"ns":"$(_pod_ns)", "nodeName":"$(_pod_nodeName)"}
|
|
- name: LINKERD2_PROXY_IDENTITY_DIR
|
|
value: /var/run/linkerd/identity/end-entity
|
|
- name: LINKERD2_PROXY_IDENTITY_TRUST_ANCHORS
|
|
value: |
|
|
-----BEGIN CERTIFICATE-----
|
|
MIIBrjCCAVSgAwIBAgIBATAKBggqhkjOPQQDAjApMScwJQYDVQQDEx5pZGVudGl0
|
|
eS5saW5rZXJkLmNsdXN0ZXIubG9jYWwwHhcNMjAwOTMwMjAwNzQ3WhcNMjEwOTMw
|
|
MjAwODA3WjApMScwJQYDVQQDEx5pZGVudGl0eS5saW5rZXJkLmNsdXN0ZXIubG9j
|
|
YWwwWTATBgcqhkjOPQIBBggqhkjOPQMBBwNCAAT9p3wdHcjyclr/WdYARxYEdJo1
|
|
HjcDDU8clbbD83qxQQcEVC6J3XXZtR2f+09Bcc96FxZol5O4dEZtRJzyFm2Jo20w
|
|
azAOBgNVHQ8BAf8EBAMCAQYwHQYDVR0lBBYwFAYIKwYBBQUHAwEGCCsGAQUFBwMC
|
|
MA8GA1UdEwEB/wQFMAMBAf8wKQYDVR0RBCIwIIIeaWRlbnRpdHkubGlua2VyZC5j
|
|
bHVzdGVyLmxvY2FsMAoGCCqGSM49BAMCA0gAMEUCIQDQDEcfUwCGbYnNjU6HJln+
|
|
B8tXapzhErGwLOlyPQT28wIgYAdLtbEgQeg0ZUidFO4QHcaF9UDo88+UifkbLGit
|
|
CC4=
|
|
-----END CERTIFICATE-----
|
|
- name: LINKERD2_PROXY_IDENTITY_TOKEN_FILE
|
|
value: /var/run/secrets/kubernetes.io/serviceaccount/token
|
|
- name: LINKERD2_PROXY_IDENTITY_SVC_ADDR
|
|
value: linkerd-identity-headless.linkerd.svc.cluster.local:8080
|
|
- name: _pod_sa
|
|
valueFrom:
|
|
fieldRef:
|
|
fieldPath: spec.serviceAccountName
|
|
- name: _l5d_ns
|
|
value: linkerd
|
|
- name: _l5d_trustdomain
|
|
value: cluster.local
|
|
- name: LINKERD2_PROXY_IDENTITY_LOCAL_NAME
|
|
value: $(_pod_sa).$(_pod_ns).serviceaccount.identity.$(_l5d_ns).$(_l5d_trustdomain)
|
|
- name: LINKERD2_PROXY_IDENTITY_SVC_NAME
|
|
value: linkerd-identity.$(_l5d_ns).serviceaccount.identity.$(_l5d_ns).$(_l5d_trustdomain)
|
|
- name: LINKERD2_PROXY_DESTINATION_SVC_NAME
|
|
value: linkerd-destination.$(_l5d_ns).serviceaccount.identity.$(_l5d_ns).$(_l5d_trustdomain)
|
|
- name: LINKERD2_PROXY_TAP_SVC_NAME
|
|
value: linkerd-tap.$(_l5d_ns).serviceaccount.identity.$(_l5d_ns).$(_l5d_trustdomain)
|
|
image: ghcr.io/linkerd/proxy:edge-20.9.4
|
|
imagePullPolicy: IfNotPresent
|
|
livenessProbe:
|
|
httpGet:
|
|
path: /live
|
|
port: 4191
|
|
initialDelaySeconds: 10
|
|
name: linkerd-proxy
|
|
ports:
|
|
- containerPort: 4143
|
|
name: linkerd-proxy
|
|
- containerPort: 4191
|
|
name: linkerd-admin
|
|
readinessProbe:
|
|
httpGet:
|
|
path: /ready
|
|
port: 4191
|
|
initialDelaySeconds: 2
|
|
resources:
|
|
securityContext:
|
|
allowPrivilegeEscalation: false
|
|
readOnlyRootFilesystem: true
|
|
runAsUser: 2102
|
|
terminationMessagePolicy: FallbackToLogsOnError
|
|
volumeMounts:
|
|
- mountPath: /var/run/linkerd/identity/end-entity
|
|
name: linkerd-identity-end-entity
|
|
initContainers:
|
|
- args:
|
|
- --incoming-proxy-port
|
|
- "4143"
|
|
- --outgoing-proxy-port
|
|
- "4140"
|
|
- --proxy-uid
|
|
- "2102"
|
|
- --inbound-ports-to-ignore
|
|
- 4190,4191
|
|
- --outbound-ports-to-ignore
|
|
- "443"
|
|
image: ghcr.io/linkerd/proxy-init:v1.3.6
|
|
imagePullPolicy: IfNotPresent
|
|
name: linkerd-init
|
|
resources:
|
|
limits:
|
|
cpu: "100m"
|
|
memory: "50Mi"
|
|
requests:
|
|
cpu: "10m"
|
|
memory: "10Mi"
|
|
securityContext:
|
|
allowPrivilegeEscalation: false
|
|
capabilities:
|
|
add:
|
|
- NET_ADMIN
|
|
- NET_RAW
|
|
privileged: false
|
|
readOnlyRootFilesystem: true
|
|
runAsNonRoot: false
|
|
runAsUser: 0
|
|
terminationMessagePolicy: FallbackToLogsOnError
|
|
volumeMounts:
|
|
- mountPath: /run
|
|
name: linkerd-proxy-init-xtables-lock
|
|
serviceAccountName: linkerd-sp-validator
|
|
volumes:
|
|
- name: tls
|
|
secret:
|
|
secretName: linkerd-sp-validator-tls
|
|
- emptyDir: {}
|
|
name: linkerd-proxy-init-xtables-lock
|
|
- emptyDir:
|
|
medium: Memory
|
|
name: linkerd-identity-end-entity
|
|
---
|
|
###
|
|
### Tap
|
|
###
|
|
---
|
|
kind: Service
|
|
apiVersion: v1
|
|
metadata:
|
|
name: linkerd-tap
|
|
namespace: linkerd
|
|
labels:
|
|
linkerd.io/control-plane-component: tap
|
|
linkerd.io/control-plane-ns: linkerd
|
|
annotations:
|
|
linkerd.io/created-by: linkerd/cli edge-20.9.4
|
|
spec:
|
|
type: ClusterIP
|
|
selector:
|
|
linkerd.io/control-plane-component: tap
|
|
ports:
|
|
- name: grpc
|
|
port: 8088
|
|
targetPort: 8088
|
|
- name: apiserver
|
|
port: 443
|
|
targetPort: apiserver
|
|
---
|
|
kind: Deployment
|
|
apiVersion: apps/v1
|
|
metadata:
|
|
annotations:
|
|
linkerd.io/created-by: linkerd/cli edge-20.9.4
|
|
labels:
|
|
app.kubernetes.io/name: tap
|
|
app.kubernetes.io/part-of: Linkerd
|
|
app.kubernetes.io/version: edge-20.9.4
|
|
linkerd.io/control-plane-component: tap
|
|
linkerd.io/control-plane-ns: linkerd
|
|
name: linkerd-tap
|
|
namespace: linkerd
|
|
spec:
|
|
replicas: 1
|
|
selector:
|
|
matchLabels:
|
|
linkerd.io/control-plane-component: tap
|
|
linkerd.io/control-plane-ns: linkerd
|
|
linkerd.io/proxy-deployment: linkerd-tap
|
|
template:
|
|
metadata:
|
|
annotations:
|
|
linkerd.io/created-by: linkerd/cli edge-20.9.4
|
|
linkerd.io/identity-mode: default
|
|
linkerd.io/proxy-version: edge-20.9.4
|
|
labels:
|
|
linkerd.io/control-plane-component: tap
|
|
linkerd.io/control-plane-ns: linkerd
|
|
linkerd.io/workload-ns: linkerd
|
|
linkerd.io/proxy-deployment: linkerd-tap
|
|
spec:
|
|
nodeSelector:
|
|
beta.kubernetes.io/os: linux
|
|
containers:
|
|
- args:
|
|
- tap
|
|
- -controller-namespace=linkerd
|
|
- -log-level=info
|
|
image: ghcr.io/linkerd/controller:edge-20.9.4
|
|
imagePullPolicy: IfNotPresent
|
|
livenessProbe:
|
|
httpGet:
|
|
path: /ping
|
|
port: 9998
|
|
initialDelaySeconds: 10
|
|
name: tap
|
|
ports:
|
|
- containerPort: 8088
|
|
name: grpc
|
|
- containerPort: 8089
|
|
name: apiserver
|
|
- containerPort: 9998
|
|
name: admin-http
|
|
readinessProbe:
|
|
failureThreshold: 7
|
|
httpGet:
|
|
path: /ready
|
|
port: 9998
|
|
securityContext:
|
|
runAsUser: 2103
|
|
volumeMounts:
|
|
- mountPath: /var/run/linkerd/tls
|
|
name: tls
|
|
readOnly: true
|
|
- mountPath: /var/run/linkerd/config
|
|
name: config
|
|
- env:
|
|
- name: LINKERD2_PROXY_LOG
|
|
value: warn,linkerd=info
|
|
- name: LINKERD2_PROXY_LOG_FORMAT
|
|
value: plain
|
|
- name: LINKERD2_PROXY_DESTINATION_SVC_ADDR
|
|
value: linkerd-dst-headless.linkerd.svc.cluster.local:8086
|
|
- name: LINKERD2_PROXY_DESTINATION_GET_NETWORKS
|
|
value: "10.0.0.0/8,172.16.0.0/12,192.168.0.0/16"
|
|
- name: LINKERD2_PROXY_DESTINATION_PROFILE_NETWORKS
|
|
value: "10.0.0.0/8,172.16.0.0/12,192.168.0.0/16"
|
|
- name: LINKERD2_PROXY_INBOUND_CONNECT_TIMEOUT
|
|
value: "100ms"
|
|
- name: LINKERD2_PROXY_OUTBOUND_CONNECT_TIMEOUT
|
|
value: "1000ms"
|
|
- name: LINKERD2_PROXY_CONTROL_LISTEN_ADDR
|
|
value: 0.0.0.0:4190
|
|
- name: LINKERD2_PROXY_ADMIN_LISTEN_ADDR
|
|
value: 0.0.0.0:4191
|
|
- name: LINKERD2_PROXY_OUTBOUND_LISTEN_ADDR
|
|
value: 127.0.0.1:4140
|
|
- name: LINKERD2_PROXY_INBOUND_LISTEN_ADDR
|
|
value: 0.0.0.0:4143
|
|
- name: LINKERD2_PROXY_DESTINATION_GET_SUFFIXES
|
|
value: svc.cluster.local.
|
|
- name: LINKERD2_PROXY_DESTINATION_PROFILE_SUFFIXES
|
|
value: svc.cluster.local.
|
|
- name: LINKERD2_PROXY_INBOUND_ACCEPT_KEEPALIVE
|
|
value: 10000ms
|
|
- name: LINKERD2_PROXY_OUTBOUND_CONNECT_KEEPALIVE
|
|
value: 10000ms
|
|
- name: _pod_ns
|
|
valueFrom:
|
|
fieldRef:
|
|
fieldPath: metadata.namespace
|
|
- name: _pod_nodeName
|
|
valueFrom:
|
|
fieldRef:
|
|
fieldPath: spec.nodeName
|
|
- name: LINKERD2_PROXY_DESTINATION_CONTEXT
|
|
value: |
|
|
{"ns":"$(_pod_ns)", "nodeName":"$(_pod_nodeName)"}
|
|
- name: LINKERD2_PROXY_IDENTITY_DIR
|
|
value: /var/run/linkerd/identity/end-entity
|
|
- name: LINKERD2_PROXY_IDENTITY_TRUST_ANCHORS
|
|
value: |
|
|
-----BEGIN CERTIFICATE-----
|
|
MIIBrjCCAVSgAwIBAgIBATAKBggqhkjOPQQDAjApMScwJQYDVQQDEx5pZGVudGl0
|
|
eS5saW5rZXJkLmNsdXN0ZXIubG9jYWwwHhcNMjAwOTMwMjAwNzQ3WhcNMjEwOTMw
|
|
MjAwODA3WjApMScwJQYDVQQDEx5pZGVudGl0eS5saW5rZXJkLmNsdXN0ZXIubG9j
|
|
YWwwWTATBgcqhkjOPQIBBggqhkjOPQMBBwNCAAT9p3wdHcjyclr/WdYARxYEdJo1
|
|
HjcDDU8clbbD83qxQQcEVC6J3XXZtR2f+09Bcc96FxZol5O4dEZtRJzyFm2Jo20w
|
|
azAOBgNVHQ8BAf8EBAMCAQYwHQYDVR0lBBYwFAYIKwYBBQUHAwEGCCsGAQUFBwMC
|
|
MA8GA1UdEwEB/wQFMAMBAf8wKQYDVR0RBCIwIIIeaWRlbnRpdHkubGlua2VyZC5j
|
|
bHVzdGVyLmxvY2FsMAoGCCqGSM49BAMCA0gAMEUCIQDQDEcfUwCGbYnNjU6HJln+
|
|
B8tXapzhErGwLOlyPQT28wIgYAdLtbEgQeg0ZUidFO4QHcaF9UDo88+UifkbLGit
|
|
CC4=
|
|
-----END CERTIFICATE-----
|
|
- name: LINKERD2_PROXY_IDENTITY_TOKEN_FILE
|
|
value: /var/run/secrets/kubernetes.io/serviceaccount/token
|
|
- name: LINKERD2_PROXY_IDENTITY_SVC_ADDR
|
|
value: linkerd-identity-headless.linkerd.svc.cluster.local:8080
|
|
- name: _pod_sa
|
|
valueFrom:
|
|
fieldRef:
|
|
fieldPath: spec.serviceAccountName
|
|
- name: _l5d_ns
|
|
value: linkerd
|
|
- name: _l5d_trustdomain
|
|
value: cluster.local
|
|
- name: LINKERD2_PROXY_IDENTITY_LOCAL_NAME
|
|
value: $(_pod_sa).$(_pod_ns).serviceaccount.identity.$(_l5d_ns).$(_l5d_trustdomain)
|
|
- name: LINKERD2_PROXY_IDENTITY_SVC_NAME
|
|
value: linkerd-identity.$(_l5d_ns).serviceaccount.identity.$(_l5d_ns).$(_l5d_trustdomain)
|
|
- name: LINKERD2_PROXY_DESTINATION_SVC_NAME
|
|
value: linkerd-destination.$(_l5d_ns).serviceaccount.identity.$(_l5d_ns).$(_l5d_trustdomain)
|
|
- name: LINKERD2_PROXY_TAP_SVC_NAME
|
|
value: linkerd-tap.$(_l5d_ns).serviceaccount.identity.$(_l5d_ns).$(_l5d_trustdomain)
|
|
image: ghcr.io/linkerd/proxy:edge-20.9.4
|
|
imagePullPolicy: IfNotPresent
|
|
livenessProbe:
|
|
httpGet:
|
|
path: /live
|
|
port: 4191
|
|
initialDelaySeconds: 10
|
|
name: linkerd-proxy
|
|
ports:
|
|
- containerPort: 4143
|
|
name: linkerd-proxy
|
|
- containerPort: 4191
|
|
name: linkerd-admin
|
|
readinessProbe:
|
|
httpGet:
|
|
path: /ready
|
|
port: 4191
|
|
initialDelaySeconds: 2
|
|
resources:
|
|
securityContext:
|
|
allowPrivilegeEscalation: false
|
|
readOnlyRootFilesystem: true
|
|
runAsUser: 2102
|
|
terminationMessagePolicy: FallbackToLogsOnError
|
|
volumeMounts:
|
|
- mountPath: /var/run/linkerd/identity/end-entity
|
|
name: linkerd-identity-end-entity
|
|
initContainers:
|
|
- args:
|
|
- --incoming-proxy-port
|
|
- "4143"
|
|
- --outgoing-proxy-port
|
|
- "4140"
|
|
- --proxy-uid
|
|
- "2102"
|
|
- --inbound-ports-to-ignore
|
|
- 4190,4191
|
|
- --outbound-ports-to-ignore
|
|
- "443"
|
|
image: ghcr.io/linkerd/proxy-init:v1.3.6
|
|
imagePullPolicy: IfNotPresent
|
|
name: linkerd-init
|
|
resources:
|
|
limits:
|
|
cpu: "100m"
|
|
memory: "50Mi"
|
|
requests:
|
|
cpu: "10m"
|
|
memory: "10Mi"
|
|
securityContext:
|
|
allowPrivilegeEscalation: false
|
|
capabilities:
|
|
add:
|
|
- NET_ADMIN
|
|
- NET_RAW
|
|
privileged: false
|
|
readOnlyRootFilesystem: true
|
|
runAsNonRoot: false
|
|
runAsUser: 0
|
|
terminationMessagePolicy: FallbackToLogsOnError
|
|
volumeMounts:
|
|
- mountPath: /run
|
|
name: linkerd-proxy-init-xtables-lock
|
|
serviceAccountName: linkerd-tap
|
|
volumes:
|
|
- configMap:
|
|
name: linkerd-config
|
|
name: config
|
|
- emptyDir: {}
|
|
name: linkerd-proxy-init-xtables-lock
|
|
- emptyDir:
|
|
medium: Memory
|
|
name: linkerd-identity-end-entity
|
|
- name: tls
|
|
secret:
|
|
secretName: linkerd-tap-tls
|
|
---
|
|
###
|
|
### linkerd add-ons configuration
|
|
###
|
|
---
|
|
kind: ConfigMap
|
|
apiVersion: v1
|
|
metadata:
|
|
name: linkerd-config-addons
|
|
namespace: linkerd
|
|
labels:
|
|
linkerd.io/control-plane-ns: linkerd
|
|
annotations:
|
|
linkerd.io/created-by: linkerd/cli edge-20.9.4
|
|
data:
|
|
values: |-
|
|
global:
|
|
prometheusUrl: ""
|
|
grafanaUrl: ""
|
|
grafana:
|
|
enabled: true
|
|
prometheus:
|
|
enabled: true
|
|
tracing:
|
|
enabled: false
|
|
---
|
|
###
|
|
### Grafana RBAC
|
|
###
|
|
---
|
|
kind: ServiceAccount
|
|
apiVersion: v1
|
|
metadata:
|
|
name: linkerd-grafana
|
|
namespace: linkerd
|
|
labels:
|
|
linkerd.io/control-plane-component: grafana
|
|
linkerd.io/control-plane-ns: linkerd
|
|
---
|
|
###
|
|
### Grafana
|
|
###
|
|
---
|
|
kind: ConfigMap
|
|
apiVersion: v1
|
|
metadata:
|
|
name: linkerd-grafana-config
|
|
namespace: linkerd
|
|
labels:
|
|
linkerd.io/control-plane-component: grafana
|
|
linkerd.io/control-plane-ns: linkerd
|
|
annotations:
|
|
linkerd.io/created-by: linkerd/cli edge-20.9.4
|
|
data:
|
|
grafana.ini: |-
|
|
instance_name = linkerd-grafana
|
|
|
|
[server]
|
|
root_url = %(protocol)s://%(domain)s:/grafana/
|
|
|
|
[auth]
|
|
disable_login_form = true
|
|
|
|
[auth.anonymous]
|
|
enabled = true
|
|
org_role = Editor
|
|
|
|
[auth.basic]
|
|
enabled = false
|
|
|
|
[analytics]
|
|
check_for_updates = false
|
|
|
|
[panels]
|
|
disable_sanitize_html = true
|
|
|
|
datasources.yaml: |-
|
|
apiVersion: 1
|
|
datasources:
|
|
- name: prometheus
|
|
type: prometheus
|
|
access: proxy
|
|
orgId: 1
|
|
url: http://linkerd-prometheus.linkerd.svc.cluster.local:9090
|
|
isDefault: true
|
|
jsonData:
|
|
timeInterval: "5s"
|
|
version: 1
|
|
editable: true
|
|
|
|
dashboards.yaml: |-
|
|
apiVersion: 1
|
|
providers:
|
|
- name: 'default'
|
|
orgId: 1
|
|
folder: ''
|
|
type: file
|
|
disableDeletion: true
|
|
editable: true
|
|
options:
|
|
path: /var/lib/grafana/dashboards
|
|
homeDashboardId: linkerd-top-line
|
|
---
|
|
kind: Service
|
|
apiVersion: v1
|
|
metadata:
|
|
name: linkerd-grafana
|
|
namespace: linkerd
|
|
labels:
|
|
linkerd.io/control-plane-component: grafana
|
|
linkerd.io/control-plane-ns: linkerd
|
|
annotations:
|
|
linkerd.io/created-by: linkerd/cli edge-20.9.4
|
|
spec:
|
|
type: ClusterIP
|
|
selector:
|
|
linkerd.io/control-plane-component: grafana
|
|
ports:
|
|
- name: http
|
|
port: 3000
|
|
targetPort: 3000
|
|
---
|
|
apiVersion: apps/v1
|
|
kind: Deployment
|
|
metadata:
|
|
annotations:
|
|
linkerd.io/created-by: linkerd/cli edge-20.9.4
|
|
labels:
|
|
app.kubernetes.io/name: grafana
|
|
app.kubernetes.io/part-of: Linkerd
|
|
app.kubernetes.io/version: edge-20.9.4
|
|
linkerd.io/control-plane-component: grafana
|
|
linkerd.io/control-plane-ns: linkerd
|
|
name: linkerd-grafana
|
|
namespace: linkerd
|
|
spec:
|
|
replicas: 1
|
|
selector:
|
|
matchLabels:
|
|
linkerd.io/control-plane-component: grafana
|
|
linkerd.io/control-plane-ns: linkerd
|
|
linkerd.io/proxy-deployment: linkerd-grafana
|
|
template:
|
|
metadata:
|
|
annotations:
|
|
linkerd.io/created-by: linkerd/cli edge-20.9.4
|
|
linkerd.io/identity-mode: default
|
|
linkerd.io/proxy-version: edge-20.9.4
|
|
labels:
|
|
linkerd.io/control-plane-component: grafana
|
|
linkerd.io/control-plane-ns: linkerd
|
|
linkerd.io/workload-ns: linkerd
|
|
linkerd.io/proxy-deployment: linkerd-grafana
|
|
spec:
|
|
nodeSelector:
|
|
beta.kubernetes.io/os: linux
|
|
containers:
|
|
- env:
|
|
- name: GF_PATHS_DATA
|
|
value: /data
|
|
# Force using the go-based DNS resolver instead of the OS' to avoid failures in some environments
|
|
# see https://github.com/grafana/grafana/issues/20096
|
|
- name: GODEBUG
|
|
value: netdns=go
|
|
image: ghcr.io/linkerd/grafana:edge-20.9.4
|
|
imagePullPolicy: IfNotPresent
|
|
livenessProbe:
|
|
httpGet:
|
|
path: /api/health
|
|
port: 3000
|
|
initialDelaySeconds: 30
|
|
name: grafana
|
|
ports:
|
|
- containerPort: 3000
|
|
name: http
|
|
readinessProbe:
|
|
httpGet:
|
|
path: /api/health
|
|
port: 3000
|
|
securityContext:
|
|
runAsUser: 472
|
|
volumeMounts:
|
|
- mountPath: /data
|
|
name: data
|
|
- mountPath: /etc/grafana
|
|
name: grafana-config
|
|
readOnly: true
|
|
- env:
|
|
- name: LINKERD2_PROXY_LOG
|
|
value: warn,linkerd=info
|
|
- name: LINKERD2_PROXY_LOG_FORMAT
|
|
value: plain
|
|
- name: LINKERD2_PROXY_DESTINATION_SVC_ADDR
|
|
value: linkerd-dst-headless.linkerd.svc.cluster.local:8086
|
|
- name: LINKERD2_PROXY_DESTINATION_GET_NETWORKS
|
|
value: "10.0.0.0/8,172.16.0.0/12,192.168.0.0/16"
|
|
- name: LINKERD2_PROXY_DESTINATION_PROFILE_NETWORKS
|
|
value: "10.0.0.0/8,172.16.0.0/12,192.168.0.0/16"
|
|
- name: LINKERD2_PROXY_INBOUND_CONNECT_TIMEOUT
|
|
value: "100ms"
|
|
- name: LINKERD2_PROXY_OUTBOUND_CONNECT_TIMEOUT
|
|
value: "1000ms"
|
|
- name: LINKERD2_PROXY_CONTROL_LISTEN_ADDR
|
|
value: 0.0.0.0:4190
|
|
- name: LINKERD2_PROXY_ADMIN_LISTEN_ADDR
|
|
value: 0.0.0.0:4191
|
|
- name: LINKERD2_PROXY_OUTBOUND_LISTEN_ADDR
|
|
value: 127.0.0.1:4140
|
|
- name: LINKERD2_PROXY_INBOUND_LISTEN_ADDR
|
|
value: 0.0.0.0:4143
|
|
- name: LINKERD2_PROXY_DESTINATION_GET_SUFFIXES
|
|
value: svc.cluster.local.
|
|
- name: LINKERD2_PROXY_DESTINATION_PROFILE_SUFFIXES
|
|
value: svc.cluster.local.
|
|
- name: LINKERD2_PROXY_INBOUND_ACCEPT_KEEPALIVE
|
|
value: 10000ms
|
|
- name: LINKERD2_PROXY_OUTBOUND_CONNECT_KEEPALIVE
|
|
value: 10000ms
|
|
- name: _pod_ns
|
|
valueFrom:
|
|
fieldRef:
|
|
fieldPath: metadata.namespace
|
|
- name: _pod_nodeName
|
|
valueFrom:
|
|
fieldRef:
|
|
fieldPath: spec.nodeName
|
|
- name: LINKERD2_PROXY_DESTINATION_CONTEXT
|
|
value: |
|
|
{"ns":"$(_pod_ns)", "nodeName":"$(_pod_nodeName)"}
|
|
- name: LINKERD2_PROXY_IDENTITY_DIR
|
|
value: /var/run/linkerd/identity/end-entity
|
|
- name: LINKERD2_PROXY_IDENTITY_TRUST_ANCHORS
|
|
value: |
|
|
-----BEGIN CERTIFICATE-----
|
|
MIIBrjCCAVSgAwIBAgIBATAKBggqhkjOPQQDAjApMScwJQYDVQQDEx5pZGVudGl0
|
|
eS5saW5rZXJkLmNsdXN0ZXIubG9jYWwwHhcNMjAwOTMwMjAwNzQ3WhcNMjEwOTMw
|
|
MjAwODA3WjApMScwJQYDVQQDEx5pZGVudGl0eS5saW5rZXJkLmNsdXN0ZXIubG9j
|
|
YWwwWTATBgcqhkjOPQIBBggqhkjOPQMBBwNCAAT9p3wdHcjyclr/WdYARxYEdJo1
|
|
HjcDDU8clbbD83qxQQcEVC6J3XXZtR2f+09Bcc96FxZol5O4dEZtRJzyFm2Jo20w
|
|
azAOBgNVHQ8BAf8EBAMCAQYwHQYDVR0lBBYwFAYIKwYBBQUHAwEGCCsGAQUFBwMC
|
|
MA8GA1UdEwEB/wQFMAMBAf8wKQYDVR0RBCIwIIIeaWRlbnRpdHkubGlua2VyZC5j
|
|
bHVzdGVyLmxvY2FsMAoGCCqGSM49BAMCA0gAMEUCIQDQDEcfUwCGbYnNjU6HJln+
|
|
B8tXapzhErGwLOlyPQT28wIgYAdLtbEgQeg0ZUidFO4QHcaF9UDo88+UifkbLGit
|
|
CC4=
|
|
-----END CERTIFICATE-----
|
|
- name: LINKERD2_PROXY_IDENTITY_TOKEN_FILE
|
|
value: /var/run/secrets/kubernetes.io/serviceaccount/token
|
|
- name: LINKERD2_PROXY_IDENTITY_SVC_ADDR
|
|
value: linkerd-identity-headless.linkerd.svc.cluster.local:8080
|
|
- name: _pod_sa
|
|
valueFrom:
|
|
fieldRef:
|
|
fieldPath: spec.serviceAccountName
|
|
- name: _l5d_ns
|
|
value: linkerd
|
|
- name: _l5d_trustdomain
|
|
value: cluster.local
|
|
- name: LINKERD2_PROXY_IDENTITY_LOCAL_NAME
|
|
value: $(_pod_sa).$(_pod_ns).serviceaccount.identity.$(_l5d_ns).$(_l5d_trustdomain)
|
|
- name: LINKERD2_PROXY_IDENTITY_SVC_NAME
|
|
value: linkerd-identity.$(_l5d_ns).serviceaccount.identity.$(_l5d_ns).$(_l5d_trustdomain)
|
|
- name: LINKERD2_PROXY_DESTINATION_SVC_NAME
|
|
value: linkerd-destination.$(_l5d_ns).serviceaccount.identity.$(_l5d_ns).$(_l5d_trustdomain)
|
|
- name: LINKERD2_PROXY_TAP_SVC_NAME
|
|
value: linkerd-tap.$(_l5d_ns).serviceaccount.identity.$(_l5d_ns).$(_l5d_trustdomain)
|
|
image: ghcr.io/linkerd/proxy:edge-20.9.4
|
|
imagePullPolicy: IfNotPresent
|
|
livenessProbe:
|
|
httpGet:
|
|
path: /live
|
|
port: 4191
|
|
initialDelaySeconds: 10
|
|
name: linkerd-proxy
|
|
ports:
|
|
- containerPort: 4143
|
|
name: linkerd-proxy
|
|
- containerPort: 4191
|
|
name: linkerd-admin
|
|
readinessProbe:
|
|
httpGet:
|
|
path: /ready
|
|
port: 4191
|
|
initialDelaySeconds: 2
|
|
resources:
|
|
securityContext:
|
|
allowPrivilegeEscalation: false
|
|
readOnlyRootFilesystem: true
|
|
runAsUser: 2102
|
|
terminationMessagePolicy: FallbackToLogsOnError
|
|
volumeMounts:
|
|
- mountPath: /var/run/linkerd/identity/end-entity
|
|
name: linkerd-identity-end-entity
|
|
initContainers:
|
|
- args:
|
|
- --incoming-proxy-port
|
|
- "4143"
|
|
- --outgoing-proxy-port
|
|
- "4140"
|
|
- --proxy-uid
|
|
- "2102"
|
|
- --inbound-ports-to-ignore
|
|
- 4190,4191
|
|
- --outbound-ports-to-ignore
|
|
- "443"
|
|
image: ghcr.io/linkerd/proxy-init:v1.3.6
|
|
imagePullPolicy: IfNotPresent
|
|
name: linkerd-init
|
|
resources:
|
|
limits:
|
|
cpu: "100m"
|
|
memory: "50Mi"
|
|
requests:
|
|
cpu: "10m"
|
|
memory: "10Mi"
|
|
securityContext:
|
|
allowPrivilegeEscalation: false
|
|
capabilities:
|
|
add:
|
|
- NET_ADMIN
|
|
- NET_RAW
|
|
privileged: false
|
|
readOnlyRootFilesystem: true
|
|
runAsNonRoot: false
|
|
runAsUser: 0
|
|
terminationMessagePolicy: FallbackToLogsOnError
|
|
volumeMounts:
|
|
- mountPath: /run
|
|
name: linkerd-proxy-init-xtables-lock
|
|
serviceAccountName: linkerd-grafana
|
|
volumes:
|
|
- emptyDir: {}
|
|
name: data
|
|
- configMap:
|
|
items:
|
|
- key: grafana.ini
|
|
path: grafana.ini
|
|
- key: datasources.yaml
|
|
path: provisioning/datasources/datasources.yaml
|
|
- key: dashboards.yaml
|
|
path: provisioning/dashboards/dashboards.yaml
|
|
name: linkerd-grafana-config
|
|
name: grafana-config
|
|
- emptyDir: {}
|
|
name: linkerd-proxy-init-xtables-lock
|
|
- emptyDir:
|
|
medium: Memory
|
|
name: linkerd-identity-end-entity
|
|
---
|
|
###
|
|
### Prometheus RBAC
|
|
###
|
|
---
|
|
kind: ClusterRole
|
|
apiVersion: rbac.authorization.k8s.io/v1
|
|
metadata:
|
|
name: linkerd-linkerd-prometheus
|
|
labels:
|
|
linkerd.io/control-plane-component: prometheus
|
|
linkerd.io/control-plane-ns: linkerd
|
|
rules:
|
|
- apiGroups: [""]
|
|
resources: ["nodes", "nodes/proxy", "pods"]
|
|
verbs: ["get", "list", "watch"]
|
|
---
|
|
kind: ClusterRoleBinding
|
|
apiVersion: rbac.authorization.k8s.io/v1
|
|
metadata:
|
|
name: linkerd-linkerd-prometheus
|
|
labels:
|
|
linkerd.io/control-plane-component: prometheus
|
|
linkerd.io/control-plane-ns: linkerd
|
|
roleRef:
|
|
apiGroup: rbac.authorization.k8s.io
|
|
kind: ClusterRole
|
|
name: linkerd-linkerd-prometheus
|
|
subjects:
|
|
- kind: ServiceAccount
|
|
name: linkerd-prometheus
|
|
namespace: linkerd
|
|
---
|
|
kind: ServiceAccount
|
|
apiVersion: v1
|
|
metadata:
|
|
name: linkerd-prometheus
|
|
namespace: linkerd
|
|
labels:
|
|
linkerd.io/control-plane-component: prometheus
|
|
linkerd.io/control-plane-ns: linkerd
|
|
---
|
|
###
|
|
### Prometheus
|
|
###
|
|
---
|
|
kind: ConfigMap
|
|
apiVersion: v1
|
|
metadata:
|
|
name: linkerd-prometheus-config
|
|
namespace: linkerd
|
|
labels:
|
|
linkerd.io/control-plane-component: prometheus
|
|
linkerd.io/control-plane-ns: linkerd
|
|
annotations:
|
|
linkerd.io/created-by: linkerd/cli edge-20.9.4
|
|
data:
|
|
prometheus.yml: |-
|
|
global:
|
|
evaluation_interval: 10s
|
|
scrape_interval: 10s
|
|
scrape_timeout: 10s
|
|
|
|
rule_files:
|
|
- /etc/prometheus/*_rules.yml
|
|
- /etc/prometheus/*_rules.yaml
|
|
|
|
scrape_configs:
|
|
- job_name: 'prometheus'
|
|
static_configs:
|
|
- targets: ['localhost:9090']
|
|
|
|
- job_name: 'grafana'
|
|
kubernetes_sd_configs:
|
|
- role: pod
|
|
namespaces:
|
|
names: ['linkerd']
|
|
relabel_configs:
|
|
- source_labels:
|
|
- __meta_kubernetes_pod_container_name
|
|
action: keep
|
|
regex: ^grafana$
|
|
|
|
# Required for: https://grafana.com/grafana/dashboards/315
|
|
- job_name: 'kubernetes-nodes-cadvisor'
|
|
scheme: https
|
|
tls_config:
|
|
ca_file: /var/run/secrets/kubernetes.io/serviceaccount/ca.crt
|
|
insecure_skip_verify: true
|
|
bearer_token_file: /var/run/secrets/kubernetes.io/serviceaccount/token
|
|
kubernetes_sd_configs:
|
|
- role: node
|
|
relabel_configs:
|
|
- action: labelmap
|
|
regex: __meta_kubernetes_node_label_(.+)
|
|
- target_label: __address__
|
|
replacement: kubernetes.default.svc:443
|
|
- source_labels: [__meta_kubernetes_node_name]
|
|
regex: (.+)
|
|
target_label: __metrics_path__
|
|
replacement: /api/v1/nodes/$1/proxy/metrics/cadvisor
|
|
metric_relabel_configs:
|
|
- source_labels: [__name__]
|
|
regex: '(container|machine)_(cpu|memory|network|fs)_(.+)'
|
|
action: keep
|
|
- source_labels: [__name__]
|
|
regex: 'container_memory_failures_total' # unneeded large metric
|
|
action: drop
|
|
|
|
- job_name: 'linkerd-controller'
|
|
kubernetes_sd_configs:
|
|
- role: pod
|
|
namespaces:
|
|
names: ['linkerd']
|
|
relabel_configs:
|
|
- source_labels:
|
|
- __meta_kubernetes_pod_label_linkerd_io_control_plane_component
|
|
- __meta_kubernetes_pod_container_port_name
|
|
action: keep
|
|
regex: (.*);admin-http$
|
|
- source_labels: [__meta_kubernetes_pod_container_name]
|
|
action: replace
|
|
target_label: component
|
|
|
|
- job_name: 'linkerd-service-mirror'
|
|
kubernetes_sd_configs:
|
|
- role: pod
|
|
relabel_configs:
|
|
- source_labels:
|
|
- __meta_kubernetes_pod_label_linkerd_io_control_plane_component
|
|
- __meta_kubernetes_pod_container_port_name
|
|
action: keep
|
|
regex: linkerd-service-mirror;admin-http$
|
|
- source_labels: [__meta_kubernetes_pod_container_name]
|
|
action: replace
|
|
target_label: component
|
|
|
|
- job_name: 'linkerd-proxy'
|
|
kubernetes_sd_configs:
|
|
- role: pod
|
|
relabel_configs:
|
|
- source_labels:
|
|
- __meta_kubernetes_pod_container_name
|
|
- __meta_kubernetes_pod_container_port_name
|
|
- __meta_kubernetes_pod_label_linkerd_io_control_plane_ns
|
|
action: keep
|
|
regex: ^linkerd-proxy;linkerd-admin;linkerd$
|
|
- source_labels: [__meta_kubernetes_namespace]
|
|
action: replace
|
|
target_label: namespace
|
|
- source_labels: [__meta_kubernetes_pod_name]
|
|
action: replace
|
|
target_label: pod
|
|
# special case k8s' "job" label, to not interfere with prometheus' "job"
|
|
# label
|
|
# __meta_kubernetes_pod_label_linkerd_io_proxy_job=foo =>
|
|
# k8s_job=foo
|
|
- source_labels: [__meta_kubernetes_pod_label_linkerd_io_proxy_job]
|
|
action: replace
|
|
target_label: k8s_job
|
|
# drop __meta_kubernetes_pod_label_linkerd_io_proxy_job
|
|
- action: labeldrop
|
|
regex: __meta_kubernetes_pod_label_linkerd_io_proxy_job
|
|
# __meta_kubernetes_pod_label_linkerd_io_proxy_deployment=foo =>
|
|
# deployment=foo
|
|
- action: labelmap
|
|
regex: __meta_kubernetes_pod_label_linkerd_io_proxy_(.+)
|
|
# drop all labels that we just made copies of in the previous labelmap
|
|
- action: labeldrop
|
|
regex: __meta_kubernetes_pod_label_linkerd_io_proxy_(.+)
|
|
# __meta_kubernetes_pod_label_linkerd_io_foo=bar =>
|
|
# foo=bar
|
|
- action: labelmap
|
|
regex: __meta_kubernetes_pod_label_linkerd_io_(.+)
|
|
# Copy all pod labels to tmp labels
|
|
- action: labelmap
|
|
regex: __meta_kubernetes_pod_label_(.+)
|
|
replacement: __tmp_pod_label_$1
|
|
# Take `linkerd_io_` prefixed labels and copy them without the prefix
|
|
- action: labelmap
|
|
regex: __tmp_pod_label_linkerd_io_(.+)
|
|
replacement: __tmp_pod_label_$1
|
|
# Drop the `linkerd_io_` originals
|
|
- action: labeldrop
|
|
regex: __tmp_pod_label_linkerd_io_(.+)
|
|
# Copy tmp labels into real labels
|
|
- action: labelmap
|
|
regex: __tmp_pod_label_(.+)
|
|
---
|
|
kind: Service
|
|
apiVersion: v1
|
|
metadata:
|
|
name: linkerd-prometheus
|
|
namespace: linkerd
|
|
labels:
|
|
linkerd.io/control-plane-component: prometheus
|
|
linkerd.io/control-plane-ns: linkerd
|
|
annotations:
|
|
linkerd.io/created-by: linkerd/cli edge-20.9.4
|
|
spec:
|
|
type: ClusterIP
|
|
selector:
|
|
linkerd.io/control-plane-component: prometheus
|
|
ports:
|
|
- name: admin-http
|
|
port: 9090
|
|
targetPort: 9090
|
|
---
|
|
apiVersion: apps/v1
|
|
kind: Deployment
|
|
metadata:
|
|
annotations:
|
|
linkerd.io/created-by: linkerd/cli edge-20.9.4
|
|
labels:
|
|
app.kubernetes.io/name: prometheus
|
|
app.kubernetes.io/part-of: Linkerd
|
|
app.kubernetes.io/version: edge-20.9.4
|
|
linkerd.io/control-plane-component: prometheus
|
|
linkerd.io/control-plane-ns: linkerd
|
|
name: linkerd-prometheus
|
|
namespace: linkerd
|
|
spec:
|
|
replicas: 1
|
|
selector:
|
|
matchLabels:
|
|
linkerd.io/control-plane-component: prometheus
|
|
linkerd.io/control-plane-ns: linkerd
|
|
linkerd.io/proxy-deployment: linkerd-prometheus
|
|
template:
|
|
metadata:
|
|
annotations:
|
|
linkerd.io/created-by: linkerd/cli edge-20.9.4
|
|
linkerd.io/identity-mode: default
|
|
linkerd.io/proxy-version: edge-20.9.4
|
|
labels:
|
|
linkerd.io/control-plane-component: prometheus
|
|
linkerd.io/control-plane-ns: linkerd
|
|
linkerd.io/workload-ns: linkerd
|
|
linkerd.io/proxy-deployment: linkerd-prometheus
|
|
spec:
|
|
nodeSelector:
|
|
beta.kubernetes.io/os: linux
|
|
securityContext:
|
|
fsGroup: 65534
|
|
containers:
|
|
- args:
|
|
- --config.file=/etc/prometheus/prometheus.yml
|
|
- --log.level=info
|
|
- --storage.tsdb.path=/data
|
|
- --storage.tsdb.retention.time=6h
|
|
image: prom/prometheus:v2.19.3
|
|
imagePullPolicy: IfNotPresent
|
|
livenessProbe:
|
|
httpGet:
|
|
path: /-/healthy
|
|
port: 9090
|
|
initialDelaySeconds: 30
|
|
timeoutSeconds: 30
|
|
name: prometheus
|
|
ports:
|
|
- containerPort: 9090
|
|
name: admin-http
|
|
readinessProbe:
|
|
httpGet:
|
|
path: /-/ready
|
|
port: 9090
|
|
initialDelaySeconds: 30
|
|
timeoutSeconds: 30
|
|
securityContext:
|
|
runAsNonRoot: true
|
|
runAsUser: 65534
|
|
runAsGroup: 65534
|
|
volumeMounts:
|
|
- mountPath: /data
|
|
name: data
|
|
- mountPath: /etc/prometheus/prometheus.yml
|
|
name: prometheus-config
|
|
subPath: prometheus.yml
|
|
readOnly: true
|
|
- env:
|
|
- name: LINKERD2_PROXY_LOG
|
|
value: warn,linkerd=info
|
|
- name: LINKERD2_PROXY_LOG_FORMAT
|
|
value: plain
|
|
- name: LINKERD2_PROXY_DESTINATION_SVC_ADDR
|
|
value: linkerd-dst-headless.linkerd.svc.cluster.local:8086
|
|
- name: LINKERD2_PROXY_DESTINATION_GET_NETWORKS
|
|
value: "10.0.0.0/8,172.16.0.0/12,192.168.0.0/16"
|
|
- name: LINKERD2_PROXY_DESTINATION_PROFILE_NETWORKS
|
|
value: "10.0.0.0/8,172.16.0.0/12,192.168.0.0/16"
|
|
- name: LINKERD2_PROXY_INBOUND_CONNECT_TIMEOUT
|
|
value: "100ms"
|
|
- name: LINKERD2_PROXY_OUTBOUND_CONNECT_TIMEOUT
|
|
value: "1000ms"
|
|
- name: LINKERD2_PROXY_CONTROL_LISTEN_ADDR
|
|
value: 0.0.0.0:4190
|
|
- name: LINKERD2_PROXY_ADMIN_LISTEN_ADDR
|
|
value: 0.0.0.0:4191
|
|
- name: LINKERD2_PROXY_OUTBOUND_LISTEN_ADDR
|
|
value: 127.0.0.1:4140
|
|
- name: LINKERD2_PROXY_INBOUND_LISTEN_ADDR
|
|
value: 0.0.0.0:4143
|
|
- name: LINKERD2_PROXY_DESTINATION_GET_SUFFIXES
|
|
value: svc.cluster.local.
|
|
- name: LINKERD2_PROXY_DESTINATION_PROFILE_SUFFIXES
|
|
value: svc.cluster.local.
|
|
- name: LINKERD2_PROXY_INBOUND_ACCEPT_KEEPALIVE
|
|
value: 10000ms
|
|
- name: LINKERD2_PROXY_OUTBOUND_CONNECT_KEEPALIVE
|
|
value: 10000ms
|
|
- name: _pod_ns
|
|
valueFrom:
|
|
fieldRef:
|
|
fieldPath: metadata.namespace
|
|
- name: _pod_nodeName
|
|
valueFrom:
|
|
fieldRef:
|
|
fieldPath: spec.nodeName
|
|
- name: LINKERD2_PROXY_DESTINATION_CONTEXT
|
|
value: |
|
|
{"ns":"$(_pod_ns)", "nodeName":"$(_pod_nodeName)"}
|
|
- name: LINKERD2_PROXY_OUTBOUND_ROUTER_CAPACITY
|
|
value: "10000"
|
|
- name: LINKERD2_PROXY_IDENTITY_DIR
|
|
value: /var/run/linkerd/identity/end-entity
|
|
- name: LINKERD2_PROXY_IDENTITY_TRUST_ANCHORS
|
|
value: |
|
|
-----BEGIN CERTIFICATE-----
|
|
MIIBrjCCAVSgAwIBAgIBATAKBggqhkjOPQQDAjApMScwJQYDVQQDEx5pZGVudGl0
|
|
eS5saW5rZXJkLmNsdXN0ZXIubG9jYWwwHhcNMjAwOTMwMjAwNzQ3WhcNMjEwOTMw
|
|
MjAwODA3WjApMScwJQYDVQQDEx5pZGVudGl0eS5saW5rZXJkLmNsdXN0ZXIubG9j
|
|
YWwwWTATBgcqhkjOPQIBBggqhkjOPQMBBwNCAAT9p3wdHcjyclr/WdYARxYEdJo1
|
|
HjcDDU8clbbD83qxQQcEVC6J3XXZtR2f+09Bcc96FxZol5O4dEZtRJzyFm2Jo20w
|
|
azAOBgNVHQ8BAf8EBAMCAQYwHQYDVR0lBBYwFAYIKwYBBQUHAwEGCCsGAQUFBwMC
|
|
MA8GA1UdEwEB/wQFMAMBAf8wKQYDVR0RBCIwIIIeaWRlbnRpdHkubGlua2VyZC5j
|
|
bHVzdGVyLmxvY2FsMAoGCCqGSM49BAMCA0gAMEUCIQDQDEcfUwCGbYnNjU6HJln+
|
|
B8tXapzhErGwLOlyPQT28wIgYAdLtbEgQeg0ZUidFO4QHcaF9UDo88+UifkbLGit
|
|
CC4=
|
|
-----END CERTIFICATE-----
|
|
- name: LINKERD2_PROXY_IDENTITY_TOKEN_FILE
|
|
value: /var/run/secrets/kubernetes.io/serviceaccount/token
|
|
- name: LINKERD2_PROXY_IDENTITY_SVC_ADDR
|
|
value: linkerd-identity-headless.linkerd.svc.cluster.local:8080
|
|
- name: _pod_sa
|
|
valueFrom:
|
|
fieldRef:
|
|
fieldPath: spec.serviceAccountName
|
|
- name: _l5d_ns
|
|
value: linkerd
|
|
- name: _l5d_trustdomain
|
|
value: cluster.local
|
|
- name: LINKERD2_PROXY_IDENTITY_LOCAL_NAME
|
|
value: $(_pod_sa).$(_pod_ns).serviceaccount.identity.$(_l5d_ns).$(_l5d_trustdomain)
|
|
- name: LINKERD2_PROXY_IDENTITY_SVC_NAME
|
|
value: linkerd-identity.$(_l5d_ns).serviceaccount.identity.$(_l5d_ns).$(_l5d_trustdomain)
|
|
- name: LINKERD2_PROXY_DESTINATION_SVC_NAME
|
|
value: linkerd-destination.$(_l5d_ns).serviceaccount.identity.$(_l5d_ns).$(_l5d_trustdomain)
|
|
- name: LINKERD2_PROXY_TAP_SVC_NAME
|
|
value: linkerd-tap.$(_l5d_ns).serviceaccount.identity.$(_l5d_ns).$(_l5d_trustdomain)
|
|
image: ghcr.io/linkerd/proxy:edge-20.9.4
|
|
imagePullPolicy: IfNotPresent
|
|
livenessProbe:
|
|
httpGet:
|
|
path: /live
|
|
port: 4191
|
|
initialDelaySeconds: 10
|
|
name: linkerd-proxy
|
|
ports:
|
|
- containerPort: 4143
|
|
name: linkerd-proxy
|
|
- containerPort: 4191
|
|
name: linkerd-admin
|
|
readinessProbe:
|
|
httpGet:
|
|
path: /ready
|
|
port: 4191
|
|
initialDelaySeconds: 2
|
|
resources:
|
|
securityContext:
|
|
allowPrivilegeEscalation: false
|
|
readOnlyRootFilesystem: true
|
|
runAsUser: 2102
|
|
terminationMessagePolicy: FallbackToLogsOnError
|
|
volumeMounts:
|
|
- mountPath: /var/run/linkerd/identity/end-entity
|
|
name: linkerd-identity-end-entity
|
|
initContainers:
|
|
- args:
|
|
- --incoming-proxy-port
|
|
- "4143"
|
|
- --outgoing-proxy-port
|
|
- "4140"
|
|
- --proxy-uid
|
|
- "2102"
|
|
- --inbound-ports-to-ignore
|
|
- 4190,4191
|
|
- --outbound-ports-to-ignore
|
|
- "443"
|
|
image: ghcr.io/linkerd/proxy-init:v1.3.6
|
|
imagePullPolicy: IfNotPresent
|
|
name: linkerd-init
|
|
resources:
|
|
limits:
|
|
cpu: "100m"
|
|
memory: "50Mi"
|
|
requests:
|
|
cpu: "10m"
|
|
memory: "10Mi"
|
|
securityContext:
|
|
allowPrivilegeEscalation: false
|
|
capabilities:
|
|
add:
|
|
- NET_ADMIN
|
|
- NET_RAW
|
|
privileged: false
|
|
readOnlyRootFilesystem: true
|
|
runAsNonRoot: false
|
|
runAsUser: 0
|
|
terminationMessagePolicy: FallbackToLogsOnError
|
|
volumeMounts:
|
|
- mountPath: /run
|
|
name: linkerd-proxy-init-xtables-lock
|
|
serviceAccountName: linkerd-prometheus
|
|
volumes:
|
|
- name: data
|
|
emptyDir: {}
|
|
- configMap:
|
|
name: linkerd-prometheus-config
|
|
name: prometheus-config
|
|
- emptyDir: {}
|
|
name: linkerd-proxy-init-xtables-lock
|
|
- emptyDir:
|
|
medium: Memory
|
|
name: linkerd-identity-end-entity
|