Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Kubernetes support? #25

Closed
mzac opened this issue Jan 7, 2020 · 22 comments · Fixed by #95
Closed

Kubernetes support? #25

mzac opened this issue Jan 7, 2020 · 22 comments · Fixed by #95
Milestone

Comments

@mzac
Copy link

mzac commented Jan 7, 2020

Have you considered adding Kubernetes as a provider? Or since a lot of kubernetes installs run on docker would you just point it to all your hosts?

@crazy-max
Copy link
Owner

Looks ok to me, thanks for your input.

@crazy-max crazy-max added this to the v4 milestone Jun 17, 2020
@crazy-max crazy-max linked a pull request Jun 17, 2020 that will close this issue
@crazy-max
Copy link
Owner

@mzac Kubernetes provider is available through release 4.0.0-beta.3 if you want to try out. Documentation is available here.

@mzac
Copy link
Author

mzac commented Jun 17, 2020

Wow!!! This looks great! Looking forward to giving it a try!

@mzac
Copy link
Author

mzac commented Jun 18, 2020

Hmm.. I got it up and running but I'm getting errors. Something isn't working right

Thu, 18 Jun 2020 09:16:53 EDT INF Starting Diun version=4.0.0-beta.3
Thu, 18 Jun 2020 09:16:54 EDT WRN No notifier available
Thu, 18 Jun 2020 09:16:54 EDT INF Cron triggered
Thu, 18 Jun 2020 09:16:54 EDT ERR Cannot list Kubernetes pods error="pods is forbidden: User \"system:serviceaccount:diun:diun\" cannot list resource \"pods\" in API group \"\" at the cluster scope" provider=kubernetes
Thu, 18 Jun 2020 09:16:54 EDT WRN No image found
Thu, 18 Jun 2020 09:16:54 EDT INF Cron initialized with schedule */30 * * * *
Thu, 18 Jun 2020 09:16:54 EDT INF Next run in 13 minutes (2020-06-18 09:30:00 -0400 EDT)

This is my deployment.yaml:

# --------------------------------------------------------------------------------
# Namespace
---
apiVersion: v1
kind: Namespace
metadata:
    name: diun

# --------------------------------------------------------------------------------
# Service Account
---
apiVersion: v1
kind: ServiceAccount
metadata:
  namespace: diun
  name: diun

# --------------------------------------------------------------------------------
# Cluster Role
---
apiVersion: rbac.authorization.k8s.io/v1
kind: ClusterRole
metadata:
  namespace: diun
  name: diun
rules:
  - apiGroups:
      - ""
    resources:
      - pods
    verbs:
      - get
      - watch
      - list

# --------------------------------------------------------------------------------
# Cluster Role Binding
---
apiVersion: rbac.authorization.k8s.io/v1
kind: ClusterRoleBinding
metadata:
  namespace: diun
  name: diun
roleRef:
  apiGroup: rbac.authorization.k8s.io
  kind: ClusterRole
  name: diun
subjects:
  - kind: ServiceAccount
    name: diun
    namespace: default

# --------------------------------------------------------------------------------
# Deployment
---
apiVersion: apps/v1
kind: Deployment
metadata:
  namespace: diun
  name: diun
spec:
  replicas: 1
  selector:
    matchLabels:
      app: diun
  template:
    metadata:
      labels:
        app: diun
      annotations:
        diun.enable: "true"
        diun.watch_repo: "true"
    spec:
      serviceAccountName: diun
      containers:
        - name: diun
          image: crazymax/diun:4.0.0-beta.3
          imagePullPolicy: Always
          env:
            - name: TZ
              value: "America/Montreal"
            - name: LOG_LEVEL
              value: "info"
            - name: LOG_JSON
              value: "false"
            - name: DIUN_WATCH_WORKERS
              value: "20"
            - name: DIUN_WATCH_SCHEDULE
              value: "*/30 * * * *"
            - name: DIUN_PROVIDERS_KUBERNETES
              value: "true"
          volumeMounts:
            - mountPath: "/data"
              name: diun-data
      restartPolicy: Always
      volumes:
      - name: diun-data
        nfs:
          server: 192.168.0.6
          path: /volume1/k3s/diun
      nodeSelector:
        kubernetes.io/arch: amd64
        node-role.kubernetes.io/vm: ""

@crazy-max
Copy link
Owner

@mzac Looking at your rbac, the service account system:serviceaccount:diun:diun is not allowed to list pods in all namespaces (default). Try to set DIUN_PROVIDERS_KUBERNETES_NAMESPACES=diun env var.

@mzac
Copy link
Author

mzac commented Jun 18, 2020

Ok I added it and redployed but still getting an error

    Environment:
      TZ:                                    America/Montreal
      LOG_LEVEL:                             info
      LOG_JSON:                              false
      DIUN_WATCH_WORKERS:                    20
      DIUN_WATCH_SCHEDULE:                   */30 * * * *
      DIUN_PROVIDERS_KUBERNETES:             true
      DIUN_PROVIDERS_KUBERNETES_NAMESPACES:  diun
Thu, 18 Jun 2020 13:39:45 EDT INF Starting Diun version=4.0.0-beta.3
Thu, 18 Jun 2020 13:39:46 EDT WRN No notifier available
Thu, 18 Jun 2020 13:39:46 EDT INF Cron triggered
Thu, 18 Jun 2020 13:39:46 EDT ERR Cannot list Kubernetes pods error="pods is forbidden: User \"system:serviceaccount:diun:diun\" cannot list resource \"pods\" in API group \"\" in the namespace \"diun\"" provider=kubernetes
Thu, 18 Jun 2020 13:39:46 EDT WRN No image found
Thu, 18 Jun 2020 13:39:46 EDT INF Cron initialized with schedule */30 * * * *
Thu, 18 Jun 2020 13:39:46 EDT INF Next run in 20 minutes (2020-06-18 14:00:00 -0400 EDT)

@mzac
Copy link
Author

mzac commented Jun 18, 2020

Ah found it!

This is what I had:

# --------------------------------------------------------------------------------
# Cluster Role Binding
---
apiVersion: rbac.authorization.k8s.io/v1
kind: ClusterRoleBinding
metadata:
  namespace: diun
  name: diun
roleRef:
  apiGroup: rbac.authorization.k8s.io
  kind: ClusterRole
  name: diun
subjects:
  - kind: ServiceAccount
    name: diun
    namespace: default

changed it to:

# --------------------------------------------------------------------------------
# Cluster Role Binding
---
apiVersion: rbac.authorization.k8s.io/v1
kind: ClusterRoleBinding
metadata:
  namespace: diun
  name: diun
roleRef:
  apiGroup: rbac.authorization.k8s.io
  kind: ClusterRole
  name: diun
subjects:
  - kind: ServiceAccount
    name: diun
    namespace: diun

^^^ the namespace in the subject.

Thu, 18 Jun 2020 13:55:41 EDT INF Starting Diun version=4.0.0-beta.3
Thu, 18 Jun 2020 13:55:41 EDT WRN No notifier available
Thu, 18 Jun 2020 13:55:41 EDT INF Cron triggered
Thu, 18 Jun 2020 13:55:41 EDT INF Found 1 image(s) to analyze provider=kubernetes
Thu, 18 Jun 2020 13:55:43 EDT INF New image found image=docker.io/crazymax/diun:4.0.0-beta.3 provider=kubernetes
Thu, 18 Jun 2020 13:55:44 EDT INF New image found image=docker.io/crazymax/diun:2.1.0 provider=kubernetes
Thu, 18 Jun 2020 13:55:44 EDT INF New image found image=docker.io/crazymax/diun:latest provider=kubernetes
Thu, 18 Jun 2020 13:55:44 EDT INF New image found image=docker.io/crazymax/diun:3.0.0 provider=kubernetes
Thu, 18 Jun 2020 13:55:44 EDT INF New image found image=docker.io/crazymax/diun:3.0.0-beta.2 provider=kubernetes
Thu, 18 Jun 2020 13:55:44 EDT INF New image found image=docker.io/crazymax/diun:2.2.0 provider=kubernetes
Thu, 18 Jun 2020 13:55:44 EDT INF New image found image=docker.io/crazymax/diun:edge provider=kubernetes
Thu, 18 Jun 2020 13:55:44 EDT INF New image found image=docker.io/crazymax/diun:3.0.0-beta.1 provider=kubernetes
Thu, 18 Jun 2020 13:55:44 EDT INF New image found image=docker.io/crazymax/diun:2.4.0 provider=kubernetes
Thu, 18 Jun 2020 13:55:44 EDT INF New image found image=docker.io/crazymax/diun:3.0.0-beta.3 provider=kubernetes
Thu, 18 Jun 2020 13:55:44 EDT INF New image found image=docker.io/crazymax/diun:2.6.1 provider=kubernetes
Thu, 18 Jun 2020 13:55:44 EDT INF New image found image=docker.io/crazymax/diun:nightly provider=kubernetes
Thu, 18 Jun 2020 13:55:44 EDT INF New image found image=docker.io/crazymax/diun:2.3.0 provider=kubernetes
Thu, 18 Jun 2020 13:55:44 EDT INF New image found image=docker.io/crazymax/diun:2.6.0 provider=kubernetes
Thu, 18 Jun 2020 13:55:44 EDT INF New image found image=docker.io/crazymax/diun:4.0.0-beta.1 provider=kubernetes
Thu, 18 Jun 2020 13:55:44 EDT INF New image found image=docker.io/crazymax/diun:2.5.0 provider=kubernetes
Thu, 18 Jun 2020 13:55:44 EDT INF New image found image=docker.io/crazymax/diun:4.0.0-beta.2 provider=kubernetes
Thu, 18 Jun 2020 13:55:44 EDT INF New image found image=docker.io/crazymax/diun:2.2.1 provider=kubernetes
Thu, 18 Jun 2020 13:55:44 EDT INF New image found image=docker.io/crazymax/diun:3.0.0-beta.4 provider=kubernetes
Thu, 18 Jun 2020 13:55:44 EDT INF New image found image=docker.io/crazymax/diun:3.0.0-beta.5 provider=kubernetes
Thu, 18 Jun 2020 13:55:44 EDT INF New image found image=docker.io/crazymax/diun:1.2.0 provider=kubernetes
Thu, 18 Jun 2020 13:55:44 EDT INF New image found image=docker.io/crazymax/diun:0.4.1 provider=kubernetes
Thu, 18 Jun 2020 13:55:44 EDT INF New image found image=docker.io/crazymax/diun:1.3.0 provider=kubernetes
Thu, 18 Jun 2020 13:55:44 EDT INF New image found image=docker.io/crazymax/diun:0.4.0 provider=kubernetes
Thu, 18 Jun 2020 13:55:44 EDT INF New image found image=docker.io/crazymax/diun:0.3.1 provider=kubernetes
Thu, 18 Jun 2020 13:55:44 EDT INF New image found image=docker.io/crazymax/diun:1.0.0 provider=kubernetes
Thu, 18 Jun 2020 13:55:44 EDT INF New image found image=docker.io/crazymax/diun:1.1.0 provider=kubernetes
Thu, 18 Jun 2020 13:55:44 EDT INF New image found image=docker.io/crazymax/diun:0.3.2 provider=kubernetes
Thu, 18 Jun 2020 13:55:44 EDT INF New image found image=docker.io/crazymax/diun:0.5.0 provider=kubernetes
Thu, 18 Jun 2020 13:55:44 EDT INF New image found image=docker.io/crazymax/diun:1.0.2 provider=kubernetes
Thu, 18 Jun 2020 13:55:44 EDT INF New image found image=docker.io/crazymax/diun:1.0.1 provider=kubernetes
Thu, 18 Jun 2020 13:55:44 EDT INF New image found image=docker.io/crazymax/diun:0.3.0 provider=kubernetes
Thu, 18 Jun 2020 13:55:44 EDT INF New image found image=docker.io/crazymax/diun:0.2.0 provider=kubernetes
Thu, 18 Jun 2020 13:55:44 EDT INF New image found image=docker.io/crazymax/diun:0.1.1 provider=kubernetes
Thu, 18 Jun 2020 13:55:44 EDT INF New image found image=docker.io/crazymax/diun:2.0.0 provider=kubernetes
Thu, 18 Jun 2020 13:55:45 EDT INF New image found image=docker.io/crazymax/diun:0.1.0 provider=kubernetes
Thu, 18 Jun 2020 13:55:45 EDT INF New image found image=docker.io/crazymax/diun:1.4.1 provider=kubernetes
Thu, 18 Jun 2020 13:55:45 EDT INF New image found image=docker.io/crazymax/diun:1.4.0 provider=kubernetes
Thu, 18 Jun 2020 13:55:45 EDT INF Cron initialized with schedule */30 * * * *
Thu, 18 Jun 2020 13:55:45 EDT INF Next run in 4 minutes (2020-06-18 14:00:00 -0400 EDT)

@crazy-max
Copy link
Owner

@mzac Good catch!

@mzac
Copy link
Author

mzac commented Jun 18, 2020

@mzac Good catch!

Thx, now I just need to figure out how to make it watch the rest of my containers (all in different name spaces) and send me notifications!

@crazy-max
Copy link
Owner

@mzac Yeah I think you have to create a "wide" serviceAccount in your cluster to allow that.

@crazy-max
Copy link
Owner

@mzac This should work:

apiVersion: v1
kind: ServiceAccount
metadata:
  namespace: default
  name: diun
---
apiVersion: rbac.authorization.k8s.io/v1
kind: ClusterRole
metadata:
  name: diun
rules:
  - apiGroups:
      - ""
    resources:
      - pods
    verbs:
      - get
      - watch
      - list
---
apiVersion: rbac.authorization.k8s.io/v1
kind: ClusterRoleBinding
metadata:
  name: diun
roleRef:
  apiGroup: rbac.authorization.k8s.io
  kind: ClusterRole
  name: diun
subjects:
  - kind: ServiceAccount
    name: diun
    namespace: default

See also https://stackoverflow.com/a/55594676/514571

@mzac
Copy link
Author

mzac commented Jun 18, 2020

Ok I see now. However my setup has all my different deployments in different namespaces which means I would have to use DIUN_PROVIDERS_KUBERNETES_NAMESPACES and specify all the namespaces to watch? Can a wildcard be used to tell it to watch all namespaces?

@crazy-max
Copy link
Owner

crazy-max commented Jun 18, 2020

@mzac All namespaces are watched by default if you don't set the namespaces var.

@mzac
Copy link
Author

mzac commented Jun 18, 2020

Ok yes I see that now.. Got it working. I'm guessing the errors below are for my private gitlab registry, can I add the credentials?

I would have to configure these environment variables?
https://github.com/crazy-max/diun/blob/v4/doc/configuration.md#regopts

Thu, 18 Jun 2020 14:45:15 EDT INF Starting Diun version=4.0.0-beta.3
Thu, 18 Jun 2020 14:45:15 EDT INF Database migration v2...
Thu, 18 Jun 2020 14:45:15 EDT INF Cron triggered
Thu, 18 Jun 2020 14:45:15 EDT INF Found 71 image(s) to analyze provider=kubernetes
Thu, 18 Jun 2020 14:45:16 EDT INF New image found image=quay.io/jetstack/cert-manager-cainjector:v0.15.1 provider=kubernetes
Thu, 18 Jun 2020 14:45:16 EDT INF New image found image=quay.io/jetstack/cert-manager-controller:v0.15.1 provider=kubernetes
Thu, 18 Jun 2020 14:45:16 EDT INF New image found image=docker.io/rancher/coredns-coredns:1.6.3 provider=kubernetes
Thu, 18 Jun 2020 14:45:16 EDT INF New image found image=quay.io/jetstack/cert-manager-webhook:v0.15.1 provider=kubernetes
Thu, 18 Jun 2020 14:45:16 EDT INF New image found image=docker.io/crazymax/diun:4.0.0-beta.3 provider=kubernetes
Thu, 18 Jun 2020 14:45:16 EDT INF New image found image=docker.io/homeassistant/home-assistant:latest provider=kubernetes
Thu, 18 Jun 2020 14:45:18 EDT INF New image found image=docker.io/crazymax/diun:2.6.1 provider=kubernetes
Thu, 18 Jun 2020 14:45:18 EDT INF New image found image=docker.io/crazymax/diun:nightly provider=kubernetes
Thu, 18 Jun 2020 14:45:18 EDT INF New image found image=docker.io/crazymax/diun:2.4.0 provider=kubernetes
Thu, 18 Jun 2020 14:45:18 EDT INF New image found image=docker.io/crazymax/diun:2.5.0 provider=kubernetes
Thu, 18 Jun 2020 14:45:18 EDT INF New image found image=docker.io/crazymax/diun:2.2.1 provider=kubernetes
Thu, 18 Jun 2020 14:45:19 EDT INF New image found image=docker.io/crazymax/diun:latest provider=kubernetes
Thu, 18 Jun 2020 14:45:19 EDT INF New image found image=docker.io/crazymax/diun:3.0.0-beta.2 provider=kubernetes
Thu, 18 Jun 2020 14:45:19 EDT INF New image found image=docker.io/crazymax/diun:2.1.0 provider=kubernetes
Thu, 18 Jun 2020 14:45:19 EDT INF New image found image=docker.io/crazymax/diun:3.0.0 provider=kubernetes
Thu, 18 Jun 2020 14:45:19 EDT INF New image found image=docker.io/crazymax/diun:2.2.0 provider=kubernetes
Thu, 18 Jun 2020 14:45:19 EDT INF New image found image=docker.io/crazymax/diun:2.6.0 provider=kubernetes
Thu, 18 Jun 2020 14:45:19 EDT INF New image found image=docker.io/crazymax/diun:4.0.0-beta.2 provider=kubernetes
Thu, 18 Jun 2020 14:45:19 EDT INF New image found image=docker.io/crazymax/diun:3.0.0-beta.1 provider=kubernetes
Thu, 18 Jun 2020 14:45:19 EDT INF New image found image=docker.io/crazymax/diun:edge provider=kubernetes
Thu, 18 Jun 2020 14:45:19 EDT INF New image found image=docker.io/crazymax/diun:3.0.0-beta.4 provider=kubernetes
Thu, 18 Jun 2020 14:45:19 EDT INF New image found image=docker.io/crazymax/diun:3.0.0-beta.5 provider=kubernetes
Thu, 18 Jun 2020 14:45:19 EDT INF New image found image=docker.io/crazymax/diun:2.3.0 provider=kubernetes
Thu, 18 Jun 2020 14:45:19 EDT INF New image found image=docker.io/crazymax/diun:4.0.0-beta.1 provider=kubernetes
Thu, 18 Jun 2020 14:45:19 EDT INF New image found image=docker.io/crazymax/diun:3.0.0-beta.3 provider=kubernetes
Thu, 18 Jun 2020 14:45:19 EDT ERR Cannot run job error="Requesting bear token: invalid status code from registry 403 (Forbidden)" provider=kubernetes
Thu, 18 Jun 2020 14:45:19 EDT INF New image found image=docker.io/crazymax/diun:2.0.0 provider=kubernetes
Thu, 18 Jun 2020 14:45:19 EDT INF New image found image=docker.io/crazymax/diun:1.3.0 provider=kubernetes
Thu, 18 Jun 2020 14:45:19 EDT INF New image found image=docker.io/crazymax/diun:1.2.0 provider=kubernetes
Thu, 18 Jun 2020 14:45:19 EDT INF New image found image=docker.io/crazymax/diun:1.4.1 provider=kubernetes
Thu, 18 Jun 2020 14:45:19 EDT INF New image found image=docker.io/crazymax/diun:0.4.1 provider=kubernetes
Thu, 18 Jun 2020 14:45:19 EDT INF New image found image=docker.io/crazymax/diun:1.1.0 provider=kubernetes
Thu, 18 Jun 2020 14:45:19 EDT INF New image found image=docker.io/crazymax/diun:1.0.2 provider=kubernetes
Thu, 18 Jun 2020 14:45:19 EDT INF New image found image=docker.io/crazymax/diun:1.0.1 provider=kubernetes
Thu, 18 Jun 2020 14:45:19 EDT INF New image found image=docker.io/crazymax/diun:1.4.0 provider=kubernetes
Thu, 18 Jun 2020 14:45:19 EDT ERR Cannot run job error="Requesting bear token: invalid status code from registry 403 (Forbidden)" provider=kubernetes
Thu, 18 Jun 2020 14:45:19 EDT INF New image found image=docker.io/crazymax/diun:1.0.0 provider=kubernetes
Thu, 18 Jun 2020 14:45:19 EDT INF New image found image=docker.io/crazymax/diun:0.3.1 provider=kubernetes
Thu, 18 Jun 2020 14:45:19 EDT INF New image found image=docker.io/crazymax/diun:0.3.2 provider=kubernetes
Thu, 18 Jun 2020 14:45:19 EDT INF New image found image=docker.io/crazymax/diun:0.4.0 provider=kubernetes
Thu, 18 Jun 2020 14:45:19 EDT ERR Cannot run job error="Requesting bear token: invalid status code from registry 403 (Forbidden)" provider=kubernetes
Thu, 18 Jun 2020 14:45:19 EDT INF New image found image=docker.io/crazymax/diun:0.5.0 provider=kubernetes
Thu, 18 Jun 2020 14:45:19 EDT INF New image found image=docker.io/crazymax/diun:0.1.1 provider=kubernetes
Thu, 18 Jun 2020 14:45:19 EDT INF New image found image=docker.io/crazymax/diun:0.1.0 provider=kubernetes
Thu, 18 Jun 2020 14:45:19 EDT ERR Cannot run job error="Requesting bear token: invalid status code from registry 403 (Forbidden)" provider=kubernetes
Thu, 18 Jun 2020 14:45:19 EDT INF New image found image=docker.io/crazymax/diun:0.2.0 provider=kubernetes
Thu, 18 Jun 2020 14:45:20 EDT INF New image found image=docker.io/crazymax/diun:0.3.0 provider=kubernetes
Thu, 18 Jun 2020 14:45:20 EDT INF New image found image=docker.io/esphome/esphome:1.14.4 provider=kubernetes
Thu, 18 Jun 2020 14:45:20 EDT ERR Cannot run job error="Requesting bear token: invalid status code from registry 403 (Forbidden)" provider=kubernetes
Thu, 18 Jun 2020 14:45:20 EDT ERR Cannot run job error="Requesting bear token: invalid status code from registry 403 (Forbidden)" provider=kubernetes
Thu, 18 Jun 2020 14:45:20 EDT ERR Cannot run job error="Requesting bear token: invalid status code from registry 403 (Forbidden)" provider=kubernetes
Thu, 18 Jun 2020 14:45:20 EDT ERR Cannot run job error="Requesting bear token: invalid status code from registry 403 (Forbidden)" provider=kubernetes
Thu, 18 Jun 2020 14:45:20 EDT ERR Cannot run job error="Requesting bear token: invalid status code from registry 403 (Forbidden)" provider=kubernetes
Thu, 18 Jun 2020 14:45:20 EDT ERR Cannot run job error="Requesting bear token: invalid status code from registry 403 (Forbidden)" provider=kubernetes
Thu, 18 Jun 2020 14:45:20 EDT ERR Cannot run job error="Requesting bear token: invalid status code from registry 403 (Forbidden)" provider=kubernetes
Thu, 18 Jun 2020 14:45:20 EDT ERR Cannot run job error="Requesting bear token: invalid status code from registry 403 (Forbidden)" provider=kubernetes
Thu, 18 Jun 2020 14:45:20 EDT ERR Cannot run job error="Requesting bear token: invalid status code from registry 403 (Forbidden)" provider=kubernetes
Thu, 18 Jun 2020 14:45:20 EDT ERR Cannot run job error="Requesting bear token: invalid status code from registry 403 (Forbidden)" provider=kubernetes
Thu, 18 Jun 2020 14:45:20 EDT ERR Cannot run job error="Requesting bear token: invalid status code from registry 403 (Forbidden)" provider=kubernetes
Thu, 18 Jun 2020 14:45:20 EDT INF New image found image=docker.io/grafana/grafana:7.0.3 provider=kubernetes
Thu, 18 Jun 2020 14:45:20 EDT INF New image found image=docker.io/library/haproxy:latest provider=kubernetes
Thu, 18 Jun 2020 14:45:20 EDT INF New image found image=docker.io/library/influxdb:latest provider=kubernetes
Thu, 18 Jun 2020 14:45:20 EDT INF New image found image=docker.io/phpmyadmin/phpmyadmin:latest provider=kubernetes
Thu, 18 Jun 2020 14:45:20 EDT INF New image found image=docker.io/rancher/local-path-provisioner:v0.0.11 provider=kubernetes
Thu, 18 Jun 2020 14:45:20 EDT INF New image found image=docker.io/rancher/metrics-server:v0.3.6 provider=kubernetes
Thu, 18 Jun 2020 14:45:20 EDT INF New image found image=docker.io/librenms/librenms:1.64.1 provider=kubernetes
Thu, 18 Jun 2020 14:45:20 EDT INF New image found image=docker.io/pihole/pihole:v5.0 provider=kubernetes
Thu, 18 Jun 2020 14:45:20 EDT INF New image found image=docker.io/library/memcached:alpine provider=kubernetes
Thu, 18 Jun 2020 14:45:20 EDT INF New image found image=docker.io/portainer/portainer-k8s-beta:linux-arm provider=kubernetes
Thu, 18 Jun 2020 14:45:20 EDT INF New image found image=docker.io/minio/minio:latest provider=kubernetes
Thu, 18 Jun 2020 14:45:21 EDT INF New image found image=docker.io/codercom/code-server:latest provider=kubernetes
Thu, 18 Jun 2020 14:45:21 EDT INF New image found image=docker.io/gitlab/gitlab-runner:alpine-v13.0.1 provider=kubernetes
Thu, 18 Jun 2020 14:45:21 EDT INF New image found image=docker.io/prom/prometheus:latest provider=kubernetes
Thu, 18 Jun 2020 14:45:21 EDT INF New image found image=docker.io/linuxserver/librespeed:latest provider=kubernetes
Thu, 18 Jun 2020 14:45:21 EDT INF New image found image=docker.io/rancher/klipper-lb:v0.1.2 provider=kubernetes
Thu, 18 Jun 2020 14:45:22 EDT INF New image found image=docker.io/stefanscherer/whoami:latest provider=kubernetes
Thu, 18 Jun 2020 14:45:22 EDT INF New image found image=docker.io/crazymax/rrdcached:latest provider=kubernetes
Thu, 18 Jun 2020 14:45:22 EDT INF New image found image=docker.io/linuxserver/sickchill:latest provider=kubernetes
Thu, 18 Jun 2020 14:45:23 EDT INF New image found image=docker.io/rancher/library-traefik:1.7.19 provider=kubernetes
Thu, 18 Jun 2020 14:45:23 EDT INF New image found image=docker.io/rancher/system-upgrade-controller:v0.4.0 provider=kubernetes
Thu, 18 Jun 2020 14:45:23 EDT INF New image found image=docker.io/jessestuart/tiller:latest provider=kubernetes
Thu, 18 Jun 2020 14:45:24 EDT INF New image found image=quay.io/external_storage/nfs-client-provisioner-arm:v3.1.0-k8s1.11 provider=kubernetes
Thu, 18 Jun 2020 14:45:24 EDT INF Cron initialized with schedule */30 * * * *
Thu, 18 Jun 2020 14:45:24 EDT INF Next run in 14 minutes (2020-06-18 15:00:00 -0400 EDT)

@crazy-max
Copy link
Owner

@mzac Yes that's it but you have to reference the regopts_id as an annotation for the pods using this registry. I will come up with a new feature soon to reference a default regopts based on the registry domain.

@mzac
Copy link
Author

mzac commented Jun 19, 2020

Notifications via Telegram are working, still having some issues with smtp but I think I have some issues with my postfix container.

image

@crazy-max
Copy link
Owner

@mzac

still having some issues with smtp but I think I have some issues with my postfix container.

Maybe you can take a look at my mstmpd image ;)

@mzac
Copy link
Author

mzac commented Jun 19, 2020

@mzac

still having some issues with smtp but I think I have some issues with my postfix container.

Maybe you can take a look at my mstmpd image ;)

Looks interesting but I need to relay through gmail. I'm currently using https://github.com/panubo/docker-postfix however my issues seem to be related to TLS. From your docs on msmtpd I don't see how I can relay through gmail? The auth settings seem to be for the local auth?

@crazy-max
Copy link
Owner

@mzac

The auth settings seem to be for the local auth?

No it's a mstmp daemon. It acts as a relay like Postfix but less cumbersome and lightweight. Check this example to use it with gmail.

@mzac
Copy link
Author

mzac commented Jun 19, 2020

@mzac

The auth settings seem to be for the local auth?

No it's a mstmp daemon. It acts as a relay like Postfix but less cumbersome and lightweight. Check this example to use it with gmail.

Awesome thanks I got it working :)

@crazy-max
Copy link
Owner

@mzac

@mzac Yes that's it but you have to reference the regopts_id as an annotation for the pods using this registry. I will come up with a new feature soon to reference a default regopts based on the registry domain.

4.0.0-beta.4 can now automatically determine registry options based on image name. More info: https://github.com/crazy-max/diun/blob/v4/docs/config/regopts.md

@crazy-max
Copy link
Owner

Available: https://crazy-max.github.io/diun/changelog/#400-20200622

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Projects
None yet
Development

Successfully merging a pull request may close this issue.

2 participants