Skip to content

Instantly share code, notes, and snippets.

This file has been truncated, but you can view the full file.
Jun 09 14:00:52 danu-01 pre-start[77690]: Error response from daemon: No such container: omni-bare-metal
Jun 09 14:00:52 danu-01 systemd[1]: Started docker-omni-bare-metal.service.
Jun 09 14:00:52 danu-01 docker-omni-bare-metal-start[77698]: {"level":"info","ts":1749492052.4427958,"caller":"provider/provider.go:100","msg":"starting provider","options":{"Name":"Bare Metal","Description":"Bare metal infrastructure provider","OmniAPIEndpoint":"https://omni.danu-01.adrp.xyz","ImageFactoryBaseURL":"https://factory.talos.dev","ImageFactoryPXEBaseURL":"https://pxe.factory.talos.dev","AgentModeTalosVersion":"v1.9.6","APIListenAddress":"","APIAdvertiseAddress":"10.3.20.5","APIPowerMgmtStateDir":"","DHCPProxyIfaceOrIP":"","BootFromDiskMethod":"ipxe-exit","IPMIPXEBootMode":"uefi","MachineLabels":null,"APIPort":50042,"EnableResourceCache":false,"AgentTestMode":false,"InsecureSkipTLSVerify":false,"UseLocalBootAssets":false,"ClearState":false,"DisableDHCPProxy":false,"SecureBootEnabled":false,"TLS":{"APIPort":50043,"CATTL"
{"level":"info","ts":1749503750.3392181,"caller":"etcdserver/corrupt.go:276","msg":"starting compact hash check","component":"server","component":"embedded_etcd","local-member-id":"8e9e05c52164694d","timeout":7}
{"level":"info","ts":1749503750.3392975,"caller":"etcdserver/corrupt.go:335","msg":"finished compaction hash check","component":"server","component":"embedded_etcd","number-of-hashes-checked":0}
{"level":"info","ts":1749503752.6719863,"caller":"omni/versions.go:310","msg":"reconciled Kubernetes versions","component":"omni_runtime","controller":"VersionsController"}
{"level":"info","ts":1749503752.910078,"caller":"omni/versions.go:281","msg":"reconciled Talos versions","component":"omni_runtime","controller":"VersionsController"}
{"level":"info","ts":1749503765.5823908,"caller":"zap/options.go:212","msg":"finished unary call with code OK","component":"server","grpc.start_time":"2025-06-09T21:16:05Z","system":"grpc","span.kind":"server","grpc.service":"cosi.resource.State","grpc.method":"Update","authen
@a1994sc
a1994sc / test.yml
Created May 10, 2024 23:16
overview of kustomization
---
apiVersion: kustomize.toolkit.fluxcd.io/v1
kind: Kustomization
metadata:
name: cert-manager
namespace: flux-system
spec:
interval: 5m
path: "./cert-manager/controller"
prune: true
2024-03-15 00:48:47.404259 I | op-osd: ceph osd status in namespace "rook-ceph" check interval "1m0s"
2024-03-15 00:48:47.404266 I | ceph-cluster-controller: enabling ceph osd monitoring goroutine for cluster "rook-ceph"
2024-03-15 00:48:48.396763 I | op-k8sutil: CSI_PROVISIONER_TOLERATIONS="" (default)
2024-03-15 00:48:58.783679 I | op-k8sutil: CSI_PLUGIN_TOLERATIONS="- key: node-role.kubernetes.io/control-plane\n operator: Exists\n- key: node-role.kubernetes.io/infrastructure\n operator: Exists" (configmap)
2024-03-15 00:48:58.783755 I | op-k8sutil: CSI_RBD_PLUGIN_TOLERATIONS="" (default)
2024-03-15 00:48:59.415188 I | op-k8sutil: CSI_RBD_PROVISIONER_TOLERATIONS="" (default)
2024-03-15 00:49:01.990334 I | op-k8sutil: CSI_CEPHFS_PLUGIN_TOLERATIONS="" (default)
2024-03-15 00:49:02.757884 I | op-k8sutil: CSI_CEPHFS_PROVISIONER_TOLERATIONS="" (default)
2024-03-15 00:49:10.717449 I | op-osd: stopping monitoring of OSDs in namespace "rook-ceph"
   Tolerations: []v1.Toleration{
@a1994sc
a1994sc / gist:0d5689b6cb7eda8c1886c892cf6ba174
Created December 13, 2023 12:05
Keycloak provider logs
2023-12-13T12:04:01Z DEBUG provider-keycloak Starting {"sync-period": "1h0m0s"}
2023-12-13T12:04:01Z INFO controller-runtime.metrics Metrics server is starting to listen {"addr": ":8080"}
2023-12-13T12:04:01Z INFO starting server {"path": "/metrics", "kind": "metrics", "addr": "[::]:8080"}
2023-12-13T12:04:01Z INFO Starting EventSource {"controller": "managed/client.keycloak.crossplane.io/v1alpha1, kind=protocolmapper", "controllerGroup": "client.keycloak.crossplane.io", "controllerKind": "ProtocolMapper", "source": "kind source: *v1alpha1.ProtocolMapper"}
2023-12-13T12:04:01Z INFO Starting Controller {"controller": "managed/client.keycloak.crossplane.io/v1alpha1, kind=protocolmapper", "controllerGroup": "client.keycloak.crossplane.io", "controllerKind": "ProtocolMapper"}
2023-12-13T12:04:01Z INFO Starting EventSource {"controller": "managed/group.keycloak.crossplane.io/v1alpha1, kind=group", "controllerGroup": "group.keycloak.crossplane.io", "controllerKind": "Group", "source": "kind source: *v1alpha1.Group"
resource "local_file" "pro_hosts_yaml" {
content = templatefile("${path.module}/templates/pro-hosts.tftpl",
{
trunks = local.trunk-l
leafs = local.leaf-l
}
)
filename = "${path.module}/provision/hosts.yaml"
file_permission = "0644"
}
@a1994sc
a1994sc / cloudflared.yaml
Created November 9, 2021 03:13
cloudflared - k3s
---
apiVersion: apps/v1
#kind: Deployment
kind: DaemonSet
metadata:
name: cloudflared
namespace: ingress
labels:
group: cloudflare
spec:
---
apiVersion: v1
kind: ConfigMap
metadata:
name: xbs-config
namespace: apps
data:
healthcheck.js: |
const http = require('http');
@a1994sc
a1994sc / whoami-deploy.yaml
Created October 10, 2021 22:39
Traefik Cross Namespace Issues
kind: Deployment
apiVersion: apps/v1
metadata:
namespace: tools
name: whoami
labels:
app: whoami
spec:
replicas: 6
selector:
@a1994sc
a1994sc / k3s_calico.yaml
Last active September 28, 2021 01:07
K3S Calico
---
# Source: calico/templates/calico-config.yaml
# This ConfigMap is used to configure a self-hosted Calico installation.
kind: ConfigMap
apiVersion: v1
metadata:
name: calico-config
namespace: kube-system
data:
# Typha is disabled.