local-path-provisioner
dex
Our great sponsors
local-path-provisioner | dex | |
---|---|---|
30 | 37 | |
1,978 | 8,973 | |
3.1% | 1.2% | |
6.3 | 9.4 | |
12 days ago | 7 days ago | |
Go | Go | |
Apache License 2.0 | Apache License 2.0 |
Stars - the number of stars that a project has on GitHub. Growth - month over month growth in stars.
Activity is a relative number indicating how actively a project is being developed. Recent commits have higher weight than older ones.
For example, an activity of 9.0 indicates that a project is amongst the top 10% of the most actively developed projects that we are tracking.
local-path-provisioner
-
Deploy Ghost with MySQL DB replication using helm chart
Deploy local-path-provisioner storage class but it does not support readwritemany so for high availability of your Kubernetes cluster better to use longhorn
-
lvp: Local Volume CSI Provisioner -- Dynamic PV Provisioning for your Home Cluster
I use this one. I'm waiting for the day it's combined with syncthing to sync across all nodes. https://github.com/rancher/local-path-provisioner
-
How to format drives for local persistent volumes
Just create 1 single partition and format it with whatevery filesystem you like. And then use ranchers local-path-provisioner which will create a folder per PV (k3s has this integrated by default).
-
Issues with "victoria-metrics-k8s-stack", monitoring k8s targets
It is better to use https://github.com/rancher/local-path-provisioner (or similar) for this case which will do PVC on local directories because manually linking PV<>PVC will not work.
-
single node k8s on nuc - homelab/prod - storage question
Since you only have one physical node anyway, I would just make the cluster a single-node cluster (1 VM) and use local storage on that VM. I’m biased though because this is what I do (I run K3s and use local path provisioner).
-
Kubernetes: How to Persistent Storage
With any of those tools, you'd implement a network storage on top of a network storage. I would go with mouting few volumes per node +local storage like (https://github.com/rancher/local-path-provisioner).
- There doesn't seam to be any good distributed block storage for Kubernetes
-
TopoLVM to provide local storage
As I normally just Local-path from Rancher https://github.com/rancher/local-path-provisioner which is basically a wrapper around hostpath so from the application and container viewpoint it’s just a bind mount. Now I normally only use local-path for single node clusters and for distributed apps like database clusters which the application is making the data node redundant.
-
Learning with K3s at home. "Best" storage option for a single-node cluster?
Rancher's local-path-provisioner (which uses hostPath or local under the hood)
-
What's the coolest thing you have (or do) in your homelab?
I run local-path-provisioner, openEBS (jiva) and minio on top of local-path storage.
dex
-
Navigating Identity Authentication: From LDAP to Modern Protocols
Dex: https://dexidp.io
-
Keycloak SSO with Docker Compose and Nginx
Recently I looked into having a relatively simple SSO setup for my homelab. My main objective is that I could easily login with Google or GitHub auth. At my previous job I used both JetBrains Hub [1] and Keycloak but I found both of them a bit of a PITA to setup.
JetBrains Hub was really, really easy to get going. As was my previous experience with them. The only thing that annoyed me was the lack of a latest tag on their Docker registry. Don't get me wrong, pinned versions are great, but for my personal use I mostly just want to update all my Docker containers in one go.
On the other hand I found Keycloak very cumbersome to get going. It was pretty easy in dev mode, but I stumbled to get it going in production. AFAIK it had something to do with the wildcard Let's Encrypt cert that I tried to use. But after a couple of hours, I just gave up.
I finally went with Dex [2]. I had previously put it off because of the lack of documentation, but in the end it was extremely easy to setup. It just required some basic YAML, a SQLite database and a (sub)domain. I combined Dex with the excellent OAuth2 Proxy and a custom Nginx (Proxy Manager) template for an easy two line SSO configuration on all of my internal services.
In addition to this setup, I also added Cloudflare Access and WAF outside of my home to add some security. I only want to add some CrowdSec to get a little more insights.
1. https://www.jetbrains.com/hub/
- Show HN: Obligator – An OpenID Connect server for self-hosters
-
I made a small program that makes it easier to run commands inside containers
dex is well-known: https://github.com/dexidp/dex
-
Keycloak – Open-Source Identity and Access Management Interview
We used keycloak for openid identity provider as well. It is fine to setup keycloak once. But it is painful share the setup with other engineers.
For local development, we end up using dex (https://dexidp.io). When we need support group/role, we use dex and glauth(https://glauth.github.io). Both dex and glauth can be configured with yaml files. We just created a few yaml files and a docker compose file, every engineer can be brought up the whole environment in a few seconds.
Also https://www.authelia.com and https://github.com/goauthentik/authentik look pretty promising, if you need more advanced features from them.
-
dex VS boruta-server - a user suggested alternative
2 projects | 22 May 2023
-
Have you convinced anyone to use Nix or NixOS? Friends? Coworkers?
I added it as an available option (flake) in Dex: https://github.com/dexidp/dex
- Okta Access Gateway Alternatives
- Is there a good example of an open source non-trivial (DB connection, authentication, authorization, data validation, tests, etc...) Go API?
- I created Atomic: Self Hosted Open Source Alternative to Reclaim, Clockwise & Motion
What are some alternatives?
Keycloak - Open Source Identity and Access Management For Modern Applications and Services
authelia - The Single Sign-On Multi-Factor portal for web apps
Ory Hydra - OpenID Certified™ OpenID Connect and OAuth Provider written in Go - cloud native, security-first, open source API security for your infrastructure. SDKs for any language. Works with Hardware Security Modules. Compatible with MITREid.
sig-storage-local-static-provisioner - Static provisioner of local volumes
OpenUnison - Unified Identity Management
oauth2-proxy - A reverse proxy that provides authentication with Google, Azure, OpenID Connect and many more identity providers.
caddy-auth-portal - Authentication Plugin for Caddy v2 implementing Form-Based, Basic, Local, LDAP, OpenID Connect, OAuth 2.0 (Github, Google, Facebook, Okta, etc.), SAML Authentication. MFA with App Authenticators and Yubico.
okta-k8s-oidc-terraform-example - An example repo showcasing setting up Okta OIDC using Terraform
topolvm - Capacity-aware CSI plugin for Kubernetes
csi-lib-utils - Common code for Kubernetes CSI sidecar containers (e.g. `external-attacher`, `external-provisioner`, etc.)
authentik - The authentication glue you need.
minikube - Run Kubernetes locally