diff --git a/apps/base/crowdsec/release.yaml b/apps/base/crowdsec/release.yaml index 7f7d631f90abbe3d4d3631be81fa0c3c5b2a362d..cdfee964017007817e3a28007df35ac8b19319b7 100644 --- a/apps/base/crowdsec/release.yaml +++ b/apps/base/crowdsec/release.yaml @@ -74,9 +74,6 @@ data: podName: nginx-ingress-ingress-nginx-controller-* # as in crowdsec configuration, we need to specify the program name so the parser will match and parse logs program: nginx - - namespace: jellyfin - podName: jellyfin-* - program: jellyfin # Those are ENV variables env: # As it's a test, we don't want to share signals with CrowdSec so disable the Online API. @@ -84,7 +81,7 @@ data: value: "true" # As we are running Nginx, we want to install the Nginx collection - name: COLLECTIONS - value: "crowdsecurity/nginx LePresidente/jellyfin" + value: "crowdsecurity/nginx" lapi: metrics: enabled: true @@ -97,10 +94,6 @@ data: requests: cpu: 150m memory: 100Mi - env: - # As it's a test, we don't want to share signals with CrowdSec, so disable the Online API. - - name: DISABLE_ONLINE_API - value: "true" dashboard: enabled: false diff --git a/apps/k8s01/crowdsec/kustomization.yaml b/apps/k8s01/crowdsec/kustomization.yaml index 91fc64cd08b9b5740d0f464e2152c94b33cce23e..d7a746c256f0d17cf9adf4413d23f41e0989636e 100644 --- a/apps/k8s01/crowdsec/kustomization.yaml +++ b/apps/k8s01/crowdsec/kustomization.yaml @@ -5,4 +5,5 @@ resources: - ../../base/crowdsec - ingress.yaml - certificate.yaml + - release-values.yaml - ../../../shared/resourcequotas/default.yaml diff --git a/apps/k8s01/crowdsec/release-values.yaml b/apps/k8s01/crowdsec/release-values.yaml new file mode 100644 index 0000000000000000000000000000000000000000..9b218bfdc37a6fba889547336237769d8f3129ed --- /dev/null +++ b/apps/k8s01/crowdsec/release-values.yaml @@ -0,0 +1,62 @@ +apiVersion: v1 +kind: Secret +metadata: + name: crowdsec-override-values + namespace: crowdsec +type: Opaque +stringData: + values-overrides.yaml: ENC[AES256_GCM,data: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,iv:GQlDL/eTl2sosC+zK2ztruP3QVF9vErH7q/TQQMkIZk=,tag:n3VDSES/kdiP+2qtvOCs6w==,type:str] + enrollKey: ENC[AES256_GCM,data:mR03lhEdYQFpT5MJp0awUgVijVmcoLvXEQ==,iv:hzxQL818iHe83vstbawpDfDL9X7nG39yB3X2t98u2sY=,tag:NG/mbbqvGKysacHQBxoyUA==,type:str] + enrollInstanceName: ENC[AES256_GCM,data:nnbFRJGxnZZYKw==,iv:+/0+Bi6LEW6v2i7jKFxEHn9xjcxZfI7sh/ZxGHtdczE=,tag:kCuvVI2a0I5db0hkyDM/aw==,type:str] +sops: + kms: [] + gcp_kms: [] + azure_kv: [] + hc_vault: [] + age: [] + lastmodified: "2023-09-28T22:39:43Z" + mac: ENC[AES256_GCM,data:gDeBDejqiFhPecUBdyoXRhS1qcAfXb3KYTocMh+n1Arud3cVnPBEqibrEwiAS1Ak+cJVscOXXMMwPTz3Ew6jQMYcGQ6PKG7amNZ7xPTfUWkGd68o3mM5YVLHA1j2xZqA02hnkkJG1nDVJhZtmj35Nnz2hT/f3F+KpNhVfAeDsW8=,iv:+t/8JI+XGe1qAic1zqtqeMDXwZLN/FHvtS8h7KrKBUk=,tag:t02HfM4gnPPFvn9Y6Qx5Lw==,type:str] + pgp: + - created_at: "2022-03-22T22:26:35Z" + enc: |- + -----BEGIN PGP MESSAGE----- + + wcFMA7kpg2bgzVHcARAAmpPJYfBx1JYmUXqCJmkej7ba7aogITgzwuMEBBQbr/65 + WMVEptobGcljz/ycAIIT8zExiglRwXaV70Ds9SzLvJ0RM01cWQfQUpQEivrF2K+4 + L/BLMYJdGtrNADvYVuUFcrLOASEi4cRawh/Rwmo4RAHolTmt1VbPrA/No1bmtLXZ + veUAwANUT8kexxuX3njKQKmkK3eyFf/P1SBmCKie4Br6jEQlN9Z7OdiskQtVTOHE + vvy6zFmyU/VIfOEUUxegsVyYaC+qV9L3AcomfJfUX1cxMzNzj7wax+b1EadM/v8B + 8B66H72gksIAJeZD/unU66gIKIZuMFXDo/yYbLbp/+sFJGtyGh08YTunEwyQql1k + 2qXCgoeJJHrAGypWyWVBAsDUaHd+HwmgzOcE6mx107k6rA54uNOlhj0m9/Imu0+f + rnOQ0o0Clkw6U5hXJ9VTZdWksPDOa6j9hNy3wfH0LS+W5S4YOXIneqKCoqqMzryy + 6vgf0ndz63od86dF0733WAjR0OGs1iCgXFSE8OIf0CG3jf0IU3erpaVQ9rdeL8FV + 9L1ikCaX6V+inJrkXijzgdl3TslWG6a+y8j6RNPMh0TEJiQZMa+qliTSSk3MBRLi + aNKPbZQF/4S3Ou7VKIf/kGfTkzDw0wj0PcmD99GxCrJjG/fIR/tR5pkahFxwMhjS + UQHJQHIymV6Mr/T/WPKcz/+kQUUm7BDPLo0HgwtpiQ8F1/Kh/U74qV2KW2kqDyPy + Puc4QJTnUVybUOhMR6d2ARB9Rn05ETaH6tTsEHs2VSEgfw== + =x66y + -----END PGP MESSAGE----- + fp: 286791FB6648539775DB31B8FCB98C2A3EC6F601 + - created_at: "2022-03-22T22:26:35Z" + enc: | + -----BEGIN PGP MESSAGE----- + + hQIMA4oYbIHZIrAPARAAh/jKXCjLYRo45aqFBAr+IIuZSKMB6KxgdCIPVJaKN3sL + w1TSUf1Qbtk6mf/6A81GlT3CiOug7z1tH0HpcciFxC7PK4yka6cwm32qlr3d9mK6 + L+OsFwj/TAFVg7KIvMHk6NKdKjT7JOBYhE+pdthYxs0+X0TFjdw/FJpOa5qt+6YA + uyq17gh877tasrj7wINW8qsntdM5E36kQcBf9msF/yxdKgMdCFU40tgFzz0wx9Ra + cueBidvOZonpvXi+9wu6p67lAp98ud3ZsbKBSelbmcscgwaOg26NOkEH8siZC3KK + QbC1209h6p8128NLhNgSo/nIYEJcFNeiRFZV3Crqr1f/akNRYm3QunxPY/ytkw4o + ArJNhWl75Mn3hDRoxtGxMiiCCUkpX3OLdUpi2rseT1skDVJXRnLQhAVuVugM+Q7b + ALx8xFjKBLRPw1jyLbbp/UGJse8dAMsFH5dVkU1nchL9qt2meTzm+7n5yxqXGxXM + 8iTpJsYkD8N/QEyIiVF6c9uiS5PKuVbXnIq1Y/UbSoATVKANq+FX5XLA2au0r28L + Hdzah7RjN/+X/h/bQFUHjHe2SMKPDTrOcwN2NNI0BtuRYAon5SBEboHZIx6ch7RL + npBSfiV+MDPRBwoRYxuPqo+0jC4IxWm6XwA3PoMoEOhqJOCWf/iRAnIBC8P48H3U + ZgEJAhCLN0nf09dsjbiWnZBvrB/ro0ooOBIZKwbTtnjm5fN+K9+hH3xfp97ebJsq + DR6CBPL7HE/UK4yA6QFOOkA2oT5q9wTciNwJ9DdZ4D+tWtXPUUp2HOnhStCMFv4f + A3XBQLtGLg== + =MC25 + -----END PGP MESSAGE----- + fp: B137EE1549DFAF960DD1E2B15147025FB9F09E07 + encrypted_regex: ^(data|stringData|email|dnsZones?|dnsNames?|hosts?|tang|externalURL|.*-secret|.*-url|.*Secrets?|.*-domain|password|subjects|node|apiURL|.*(S|s)erverNames?|.*SecretKey)$ + version: 3.7.3