|
|
|
|
@ -289,7 +289,7 @@ harbor_oidc_realm: "harbor"
|
|
|
|
|
harbor_oidc_client_id: "harbor"
|
|
|
|
|
harbor_oidc_client_secret: "{{ docker_registry_oidc_client_secret_vault }}"
|
|
|
|
|
harbor_oidc_admin_username: "harbor-admin"
|
|
|
|
|
harbor_oidc_admin_password: "harbor-admin"
|
|
|
|
|
harbor_oidc_admin_password: "{{ harbor_oidc_admin_password_vault }}"
|
|
|
|
|
|
|
|
|
|
management_oidc_realm: "management"
|
|
|
|
|
management_oidc_client_id: "smardigo"
|
|
|
|
|
@ -304,28 +304,27 @@ iam_jwt_enabled: true
|
|
|
|
|
iam_jwt_secret: "456ae14462d049d3be76439ef379c7c6"
|
|
|
|
|
|
|
|
|
|
keycloak_admin_username: "keycloak-admin"
|
|
|
|
|
keycloak_admin_password: "keycloak-admin"
|
|
|
|
|
keycloak_admin_password: "{{ keycloak_admin_password_vault }}"
|
|
|
|
|
|
|
|
|
|
# Note: all dollar signs in the hash need to be doubled for escaping.
|
|
|
|
|
# To create user:password pair, it's possible to use this command:
|
|
|
|
|
# echo $(htpasswd -nb user password) | sed -e s/\\$/\\$\\$/g
|
|
|
|
|
# TODO should be part of the automation (htpasswd -nb <username> <password>)
|
|
|
|
|
traefik_admin_username: "traefik-admin"
|
|
|
|
|
traefik_admin_password: "$apr1$nJfFcFaI$ylS3Qa9BWAvhrMo5tWiD9."
|
|
|
|
|
traefik_admin_password_htpasswd: "{{ traefik_admin_password_htpasswd_vault }}"
|
|
|
|
|
|
|
|
|
|
grafana_admin_username: "grafana-admin"
|
|
|
|
|
grafana_admin_password: "grafana-admin"
|
|
|
|
|
grafana_admin_password: "{{ grafana_admin_password_vault }}"
|
|
|
|
|
grafana_user_smardigo_login: "smardigo"
|
|
|
|
|
grafana_user_smardigo_password: "smardigo"
|
|
|
|
|
grafana_user_smardigo_password: "{{ grafana_user_smardigo_password_vault }}"
|
|
|
|
|
grafana_signing_secret: "{{ grafana_signing_secret_vault }}"
|
|
|
|
|
|
|
|
|
|
pgadmin4_admin_username: "{{ pgadmin4_admin_email }}"
|
|
|
|
|
pgadmin4_admin_password: "pgadmin-admin"
|
|
|
|
|
pgadmin4_admin_password: "{{ pgadmin4_admin_password_vault }}"
|
|
|
|
|
|
|
|
|
|
management_admin_username: "management-admin"
|
|
|
|
|
management_admin_password: "management-admin"
|
|
|
|
|
management_admin_password: "{{ management_admin_password_vault }}"
|
|
|
|
|
management_realm_admin_username: "management-realm-admin"
|
|
|
|
|
management_realm_admin_password: "management-realm-admin"
|
|
|
|
|
management_realm_admin_password: "{{ management_realm_admin_password_vault }}"
|
|
|
|
|
|
|
|
|
|
harbor_admin_username: "{{ harbor_admin_username_vault }}"
|
|
|
|
|
harbor_admin_password: "{{ harbor_admin_password_vault }}"
|
|
|
|
|
@ -343,12 +342,12 @@ mysql_root_username: "{{ mysql_root_username_vault }}"
|
|
|
|
|
mysql_root_password: "{{ mysql_root_password_vault }}"
|
|
|
|
|
|
|
|
|
|
gitea_admin_username: "gitea-admin"
|
|
|
|
|
gitea_admin_password: "gitea-admin"
|
|
|
|
|
gitea_admin_password: "{{ gitea_admin_password_vault }}"
|
|
|
|
|
gitea_realm_admin_username: "gitea-realm-admin"
|
|
|
|
|
gitea_realm_admin_password: "gitea-realm-admin"
|
|
|
|
|
|
|
|
|
|
argocd_admin_username: "argocd-admin"
|
|
|
|
|
argocd_admin_password: "argocd-admin"
|
|
|
|
|
argocd_admin_password: "{{ argocd_admin_password_vault }}"
|
|
|
|
|
argo_keycloak_client_secret: "{{ argo_keycloak_client_secret_vault }}"
|
|
|
|
|
argocd_server_admin_password: "{{ argocd_server_admin_password_vault }}"
|
|
|
|
|
|
|
|
|
|
@ -357,26 +356,18 @@ awx_admin_password: "{{ awx_admin_password_vault }}"
|
|
|
|
|
|
|
|
|
|
prometheus_admin_username: "prometheus-admin"
|
|
|
|
|
prometheus_admin_password: "{{ prometheus_admin_password_vault }}"
|
|
|
|
|
prometheus_admin_password_unencrypted: "{{ prometheus_admin_password_unencrypted_vault }}"
|
|
|
|
|
prometheus_admin_password_htpasswd: "{{ prometheus_admin_password_htpasswd_vault }}"
|
|
|
|
|
|
|
|
|
|
k8s_prometheus_basic_auth_username: "prometheus-admin"
|
|
|
|
|
k8s_prometheus_basic_auth_password: "{{ k8s_prometheus_basic_auth_password_vault }}"
|
|
|
|
|
alertmanager_admin_username: "alertmanager-admin"
|
|
|
|
|
alertmanager_admin_password: "{{ alertmanager_admin_password_vault }}"
|
|
|
|
|
alertmanager_admin_password_htpasswd: "{{ alertmanager_admin_password_htpasswd_vault }}"
|
|
|
|
|
|
|
|
|
|
netgo_msteams_hook_cd: "{{ netgo_msteams_hook_cd_vault }}"
|
|
|
|
|
netgo_msteams_hook_alerting: "{{ netgo_msteams_hook_alerting_vault }}"
|
|
|
|
|
|
|
|
|
|
management_oidc_client_secret: "{{ management_oidc_client_secret_vault }}"
|
|
|
|
|
|
|
|
|
|
# smardigo automation DEV gpg key
|
|
|
|
|
# smardigo automation {{ stage }} gpg key
|
|
|
|
|
# https://git.dev-at.de/smardigo-hetzner/communication-keys/
|
|
|
|
|
# push mirror: https://{{ stage }}-gitea-01.smardigo.digital/communication-keys.git
|
|
|
|
|
# push mirror: https://{{ stage }}-gitea-01.smardigo.digital/gitea-admin/communication-keys/
|
|
|
|
|
gpg_key_smardigo_automation__private: '{{ gpg_key_smardigo_automation__private__vault }}'
|
|
|
|
|
|
|
|
|
|
iam_opentracing_jaeger_enabled: true
|
|
|
|
|
iam_opentracing_jaeger_http_sender_url: "http://{{ shared_service_kube_jaeger_collector_hostname }}/api/traces"
|
|
|
|
|
webdav_opentracing_jaeger_enabled: true
|
|
|
|
|
webdav_opentracing_jaeger_http_sender_url: "http://{{ shared_service_kube_jaeger_collector_hostname }}/api/traces"
|
|
|
|
|
connect_opentracing_jaeger_enabled: true
|
|
|
|
|
connect_opentracing_jaeger_http_sender_url: "http://{{ shared_service_kube_jaeger_collector_hostname }}/api/traces"
|
|
|
|
|
|
|
|
|
|
prometheus_tsdb_rentention_time: '2w'
|
|
|
|
|
|