pritunl-k8s-tf-do
Pritunl
Our great sponsors
pritunl-k8s-tf-do | Pritunl | |
---|---|---|
11 | 34 | |
23 | 4,282 | |
- | 0.8% | |
3.6 | 9.0 | |
5 months ago | 11 days ago | |
HCL | Python | |
MIT License | GNU General Public License v3.0 or later |
Stars - the number of stars that a project has on GitHub. Growth - month over month growth in stars.
Activity is a relative number indicating how actively a project is being developed. Recent commits have higher weight than older ones.
For example, an activity of 9.0 indicates that a project is amongst the top 10% of the most actively developed projects that we are tracking.
pritunl-k8s-tf-do
-
Why migrate to GitHub from Jenkins?
I have a full example here of a working GHA pipeline that deploys terraform infrastructure. This deploys atlantis, which can then be used to deploy Pritunl VPN. Works almost perfectly except for the fact that helm yaml encoded sensitive values are revealed on terraform destroy, so I simply don't have anything sensitive encoded in yaml.
-
[FOR HIRE] Where are the high paying remote DevOps jobs that don't require LeetCode?
Hey now, I've already got a homelab that launches a k8s cluster and installs Pritunl VPN for coffee shop wifi. I do at least understand that tools need a valid use case before being applied, although admittedly installing it on k8s vs just using Nomad or something is more RDD than not for this one.
-
Start date pushed back multiple times at new contract gig. Looking to see what else is out there.
I'm looking for a company that is willing to judge me based off of past experience and previous projects I've already completed. So ideally no LeetCode, and no more take homes unless you want me to post them publicly. Ideally looking to come in at $160K+ for mid level or $200K+ for senior, depending on how much of a match there is between me and the position, and a sign-on bonus would be incredible. Hopefully I have enough of a reputation at this point where you've seen my posts and comments in /r/devops and already know what I'm capable of, but if not, I'm happy to chat about previous projects in-depth and go over what I've worked on. A code review as part of the interview process would be absolutely stellar. This is what I've been working on recently as well as my "homelab" if you re looking for some specifics. DM or chat with your work email for an official resume
-
So I've installed grafana, loki, and prometheus on the personal Kubernetes cluster via Terraform. Now what?
Already done, but good call on learning how to create conditionals. I will look into it!
-
Ask r/kubernetes: What are you working on this week?
Playing around with grafana/loki/prometheus all via Terraform, GitHub Actions, and Atlantis in a public repo.
-
What's the best cloud provider for me to mess around in and learn k8s without accidentally getting charged a lot of dollar?
I set up a whole pipeline to install and configure Pritunl VPN on DigitalOcean and it only costs me like $60/month for a 3 node cluster.
-
I built an open source deployment pipeline of Pritunl to Digital Ocean using Github Actions and Atlantis. User-friendly, open source, VPN on Kubernetes at under $60/month!
https://github.com/autotune/pritunl-k8s-tf-do/blob/master/README.md is the repo. The README should answer any questions about how the pipeline works but the end result is a pritunl webgui listening on port 80 with an ingress route for https, a SERVICE load balancer that listens for VPN connections, and the ability to connect to said service load balancer over Pritunl VPN client. Note this is missing a few things, for one you can only have a replica set of 1 in the deployment. I need to figure out how to add HA with the "enterprise" edition at $70/month extra (still relatively cheap for what you get!). But for personal use it should suffice. Also, I tried using an ingress for the vpn itself but can't get it working, so stuck with SVC load balaner instead, which works fine. Any suggestions here would be appreciated!
-
Any folks from the zerossl project lurking these forums? Your user signup page cert is expired.
All I know for sure is the one cert I was using with letsencrypt kept failing to renew. I just tried it with zerossl since the sign up page cert was finally renewed last night and people have generally been happy with them outside this little incident and seems to actually be working as expected. The helm release I am using is linked to via tf here and the ingress rules are here.
Pritunl
-
OpenVPN access server alternative
Also check Pritunl
-
VPN solution backed by Google Identity?
It doesn't run on OpnSense but Pritunl's paid version supports Google SSO. Works well. Easy client deploy.
-
Road warrior VPN to multiple sites, with MFA
https://pritunl.com/ Might do the trick for you.
-
Lansweeper updating their subscription plans as of August 1, 2022...
Went to pritunl. Self-hosted.
-
So I've installed grafana, loki, and prometheus on the personal Kubernetes cluster via Terraform. Now what?
Thanks! I currently run Pritunl on the cluster, but I could definitely host my resume on there as well. I could stand to learn tools like https://locust.io or Bees With Machines Guns as a load testing exercise for sure. I will dive into it!
-
Suggestions for VPN gateway appliance for SOHO.
I personally use Pritunl at home. It works quite well and is push button simple to set up for a basic configuration. https://pritunl.com/
-
Setup a VPN on AWS
I use Pritunl. Very simple to install and manage. And its free https://pritunl.com/
-
Wireguard Server GUI?
Pritunl
-
Open-source VPN Web Portal?
Pritunl has been pretty good for me. OpenVPN performance is pretty solid and it's really easy to configure and manage users.
-
Self hosted TCP VPN easily?
Wireguard is UDP natively, do use the TCP option in OpenVPN. It installed easily. Here’s one tool that makes installation and management easy https://pritunl.com/
What are some alternatives?
locust - Write scalable load tests in plain Python 🚗💨
OpenVPN - OpenVPN is an open source VPN daemon
pritunl-client-electron - Pritunl OpenVPN client
SoftEther - Cross-platform multi-protocol VPN software. Pull requests are welcome. The stable version is available at https://github.com/SoftEtherVPN/SoftEtherVPN_Stable.
k3s - Lightweight Kubernetes
Nebula - A scalable overlay networking tool with a focus on performance, simplicity and security
beeswithmachineguns - A utility for arming (creating) many bees (micro EC2 instances) to attack (load test) targets (web applications).
Pritunl-Fake-API - This neat script provides a little fake API to unlock all premium/enterprise/enterprise+ (here called ultimate) features of your own Pritunl VPN server. A mirror of https://gitlab.simonmicro.de/simonmicro/pritunl-fake-api
predator - A powerful open-source platform for load testing APIs.
ssh-audit - SSH server & client security auditing (banner, key exchange, encryption, mac, compression, compatibility, security, etc)
thanos - Highly available Prometheus setup with long term storage capabilities. A CNCF Incubating project.
firezone - Open-source VPN server and egress firewall for Linux built on WireGuard. Firezone is easy to set up (all dependencies are bundled thanks to Chef Omnibus), secure, performant, and self hostable.