Greg greg
  • Joined on 2018-11-05
greg closed issue kosmos/chef#52 2019-06-17 09:08:52 +00:00
Improve IPFS memory usage
greg commented on issue kosmos/chef#52 2019-06-17 09:08:29 +00:00
Improve IPFS memory usage

We forgot to close this one. We merged https://github.com/67P/ipfs-cookbook/pull/4

greg created pull request kosmos/chef#67 2019-06-14 14:40:12 +00:00
Fix the permissions for the ejabberd upload folders
greg pushed to bugfix/ejabberd_upload_permissions at kosmos/chef 2019-06-14 14:39:07 +00:00
b01985ec4f Fix the permissions for the ejabberd upload folders
greg pushed to master at kosmos/chef 2019-06-14 13:49:39 +00:00
283f623fee Add mastodon role
greg commented on issue kosmos/gitea.kosmos.org#26 2019-06-14 10:21:32 +00:00
WIP: Set up ingress with Let's Encrypt certificates using cert-manager

The benefit is that you end up with only one load balancer instead of one for each service. And yes, the built-in ingress is perfect for everything that doesn't need SSH

greg commented on issue kosmos/gitea.kosmos.org#26 2019-06-14 09:26:25 +00:00
WIP: Set up ingress with Let's Encrypt certificates using cert-manager

OK, now I finally understand what I was missing. You need more moving parts than I thought when running your own ingress controller (that's needed for SSH, the GCE and nginx ingresses built into GKE are for HTTP(S)).

greg commented on issue kosmos/gitea.kosmos.org#26 2019-06-13 09:36:27 +00:00
WIP: Set up ingress with Let's Encrypt certificates using cert-manager

I fixed my RBAC troubles. I was missing the serviceAccountName in the deployment, https://github.com/jcmoraisjr/haproxy-ingress/tree/master/examples/rbac#usage.

greg commented on issue kosmos/gitea.kosmos.org#26 2019-06-12 11:09:17 +00:00
WIP: Set up ingress with Let's Encrypt certificates using cert-manager

Almost there, now I have a permission issue running this with a fresh Gitea on GKE inside its own namespace. Reading on RBAC to fix the error I'm getting on the ingress pod (service with name gitea-test/ingress-default-backend found: services "ingress-default-backend" is forbidden: User "system:serviceaccount:gitea-test:default" cannot get resource "services" in API group "" in the namespace "gitea-test")

greg created pull request kosmos/gitea.kosmos.org#26 2019-06-05 16:08:06 +00:00
WIP: Set up ingress with Let's Encrypt certificates using cert-manager
greg pushed to feature/ingress at kosmos/gitea.kosmos.org 2019-06-05 16:01:05 +00:00
ae8d6a6cf3 WIP: Set up ingress with Let's Encrypt certificates using cert-manager
greg commented on issue kosmos/chef#5 2019-06-04 13:43:08 +00:00
Prevent the nodejs applications restarting on every Chef run

All the application/poise projects are dead, the maintainer isn't working on them anymore. I'm currently taking a look at Chef's new app build/deployment/management system, Habitat, that looks very interesting: https://www.habitat.sh

greg commented on issue kosmos/chef#11 2019-05-28 12:25:11 +00:00
Set journald to persist logs

I think we can close this, as the journald logs on barnard go back further than the last reboot (12 days ago)

greg commented on issue kosmos/chef#11 2019-05-28 12:00:45 +00:00
Set journald to persist logs

I don't understand, the logs wouldn't be "empty" even if they were explicitly set to volatile, they would still be stored in memory

greg commented on issue kosmos/chef#11 2019-05-28 11:52:21 +00:00
Set journald to persist logs

I checked and it doesn't appear to be an issue. From the docs:

greg commented on issue kosmos/chef#1 2019-05-28 11:33:35 +00:00
Automate LE cert renewal for ejabberd

Closing this one, this was done as part of the 5apps migration to ejabberd and is included in the ejabberd cookbook

greg closed issue kosmos/chef#1 2019-05-28 11:33:35 +00:00
Automate LE cert renewal for ejabberd
greg commented on issue kosmos/chef#50 2019-05-28 11:07:15 +00:00
Add initial instructions for joining the IPFS cluster

Good point, I have updated the instructions

greg pushed to doc/4-join_ipfs_cluster at kosmos/chef 2019-05-28 11:06:54 +00:00
339f32c957 Simplify the instructions to get the cluster secret
greg commented on issue kosmos/chef#2 2019-05-28 10:33:20 +00:00
Make this repo public

I have made the repo public, closing this one