Anton Osenenko

Results 66 comments of Anton Osenenko
trafficstars

> > @bittrance I ended up with cert-manager by converting the latest cert-manager.yaml to hcl like this > > ```shell > > tfk8s --strip --file cert-manager_v1.2.0.yaml --output cert-manager_v1.2.0.tf --provider "kubernetes-alpha"...

@deorder ```hcl module "cert_manager" { source = "./cert-manager" providers = { kubernetes = kubernetes kubernetes-alpha = kubernetes-alpha } } resource "kubectl_manifest" "cert_manager_cluster_issuer" { depends_on = [module.cert_manager] yaml_body =

> Ah thanks. So it cannot be done using Terraform HCL syntax from the Kubernetes Alpha provider. Tried to get it working like that for days. IMHO, there is not...

I have the exact same problem (AWS NLB + OpenVPN ran at ECS). Unfortunately openvpn is a piece of old ~~shit~~ soft. It does not provide separate ports for monitoring...

+1 for this. Any suggetions?

I am using `kube-prometheus-stack`. I created a new secret `custom-prometheus-web-config` as described in https://prometheus.io/docs/guides/basic-auth/#creating-web-yml. Now i need a way how to mount this secret instead of default `prometheus-kube-prometheus-stack-prometheus-web-config`

+1 to this feature! It's very often when I need to see all resources in the selected namespace, not all resources in all namespaces.

This version of the registrator works good for me. Thank you!

Thank you for response! This is an interesting trick.