INIT(repo): cluster infrastructure setup
This commit is contained in:
32
vault/argocd/vault-secrets.yaml
Normal file
32
vault/argocd/vault-secrets.yaml
Normal file
@@ -0,0 +1,32 @@
|
||||
apiVersion: argoproj.io/v1alpha1
|
||||
kind: Application
|
||||
metadata:
|
||||
name: vault-secrets
|
||||
namespace: argocd
|
||||
finalizers:
|
||||
- resources-finalizer.argocd.argoproj.io
|
||||
spec:
|
||||
project: default
|
||||
|
||||
source:
|
||||
repoURL: https://gitea0213.kro.kr/bluemayne/infrastructure.git
|
||||
targetRevision: main
|
||||
path: vault
|
||||
|
||||
destination:
|
||||
server: https://kubernetes.default.svc
|
||||
|
||||
syncPolicy:
|
||||
automated:
|
||||
prune: true
|
||||
selfHeal: true
|
||||
syncOptions:
|
||||
- CreateNamespace=true
|
||||
retry:
|
||||
limit: 5
|
||||
backoff:
|
||||
duration: 5s
|
||||
factor: 2
|
||||
maxDuration: 3m
|
||||
|
||||
revisionHistoryLimit: 10
|
||||
46
vault/argocd/vault.yaml
Normal file
46
vault/argocd/vault.yaml
Normal file
@@ -0,0 +1,46 @@
|
||||
apiVersion: argoproj.io/v1alpha1
|
||||
kind: Application
|
||||
metadata:
|
||||
name: vault
|
||||
namespace: argocd
|
||||
finalizers:
|
||||
- resources-finalizer.argocd.argoproj.io
|
||||
spec:
|
||||
project: default
|
||||
|
||||
sources:
|
||||
# Helm chart from external repository
|
||||
- repoURL: https://helm.releases.hashicorp.com
|
||||
chart: vault
|
||||
targetRevision: 0.28.1
|
||||
helm:
|
||||
valueFiles:
|
||||
- $values/vault/helm-values/vault.yaml
|
||||
# Values file from Git repository
|
||||
- repoURL: https://gitea0213.kro.kr/bluemayne/infrastructure.git
|
||||
targetRevision: main
|
||||
ref: values
|
||||
|
||||
destination:
|
||||
server: https://kubernetes.default.svc
|
||||
namespace: vault
|
||||
|
||||
syncPolicy:
|
||||
automated:
|
||||
prune: true
|
||||
selfHeal: true
|
||||
allowEmpty: false
|
||||
|
||||
syncOptions:
|
||||
- CreateNamespace=true
|
||||
- PrunePropagationPolicy=foreground
|
||||
- PruneLast=true
|
||||
|
||||
retry:
|
||||
limit: 5
|
||||
backoff:
|
||||
duration: 5s
|
||||
factor: 2
|
||||
maxDuration: 3m
|
||||
|
||||
revisionHistoryLimit: 10
|
||||
55
vault/helm-values/vault.yaml
Normal file
55
vault/helm-values/vault.yaml
Normal file
@@ -0,0 +1,55 @@
|
||||
# HashiCorp Vault Helm Values
|
||||
# Chart: https://github.com/hashicorp/vault-helm
|
||||
|
||||
global:
|
||||
enabled: true
|
||||
tlsDisable: true # 내부 클러스터에서는 TLS 비활성화
|
||||
|
||||
server:
|
||||
enabled: true
|
||||
|
||||
# Dev 모드 (시작하기 쉽게, 나중에 production 모드로 변경 가능)
|
||||
dev:
|
||||
enabled: true
|
||||
devRootToken: "root" # 초기 root 토큰 (나중에 변경 권장)
|
||||
|
||||
# 리소스 제한
|
||||
resources:
|
||||
requests:
|
||||
cpu: 50m
|
||||
memory: 128Mi
|
||||
limits:
|
||||
cpu: 500m
|
||||
memory: 512Mi
|
||||
|
||||
# Ingress 설정
|
||||
ingress:
|
||||
enabled: true
|
||||
ingressClassName: nginx
|
||||
hosts:
|
||||
- host: vault0213.kro.kr
|
||||
paths:
|
||||
- /
|
||||
tls:
|
||||
- secretName: vault-tls
|
||||
hosts:
|
||||
- vault0213.kro.kr
|
||||
|
||||
# 고가용성 비활성화 (단일 인스턴스)
|
||||
ha:
|
||||
enabled: false
|
||||
|
||||
# 서비스 타입
|
||||
service:
|
||||
enabled: true
|
||||
type: ClusterIP
|
||||
port: 8200
|
||||
|
||||
# UI 활성화
|
||||
ui:
|
||||
enabled: true
|
||||
serviceType: ClusterIP
|
||||
|
||||
# Injector (나중에 필요하면 활성화)
|
||||
injector:
|
||||
enabled: false
|
||||
7
vault/kustomization.yaml
Normal file
7
vault/kustomization.yaml
Normal file
@@ -0,0 +1,7 @@
|
||||
apiVersion: kustomize.config.k8s.io/v1beta1
|
||||
kind: Kustomization
|
||||
|
||||
resources:
|
||||
# ArgoCD Application 리소스는 infrastructure/kustomization.yaml에서 관리
|
||||
# - argocd/vault.yaml
|
||||
# - argocd/vault-secrets.yaml
|
||||
Reference in New Issue
Block a user