mirror of https://git.rancher.io/charts
Regenerate released directory
Merge pull request #1150 from aiyengar2/small_updates_to_monitoring_charts Small updates for Monitoringpull/1158/head
parent
abb6f9a76d
commit
6992135d80
File diff suppressed because it is too large
Load Diff
Binary file not shown.
Binary file not shown.
Binary file not shown.
Binary file not shown.
Binary file not shown.
Binary file not shown.
Binary file not shown.
Binary file not shown.
Binary file not shown.
Binary file not shown.
Binary file not shown.
Binary file not shown.
Binary file not shown.
Binary file not shown.
Binary file not shown.
Binary file not shown.
Binary file not shown.
Binary file not shown.
Binary file not shown.
Binary file not shown.
Binary file not shown.
Binary file not shown.
Binary file not shown.
Binary file not shown.
Binary file not shown.
Binary file not shown.
Binary file not shown.
Binary file not shown.
Binary file not shown.
Binary file not shown.
Binary file not shown.
Binary file not shown.
Binary file not shown.
Binary file not shown.
Binary file not shown.
Binary file not shown.
Binary file not shown.
Binary file not shown.
Binary file not shown.
Binary file not shown.
Binary file not shown.
Binary file not shown.
Binary file not shown.
Binary file not shown.
|
@ -21,6 +21,7 @@ clients:
|
|||
image:
|
||||
repository: rancher/windows_exporter-package
|
||||
tag: v0.0.1
|
||||
os: "windows"
|
||||
|
||||
# Specify the IP addresses of nodes that you want to collect metrics from
|
||||
endpoints: []
|
||||
|
|
|
@ -358,11 +358,13 @@ global:
|
|||
systemDefaultRegistry: ""
|
||||
## Windows Monitoring
|
||||
## ref: https://github.com/rancher/charts/tree/dev-v2.5-source/packages/rancher-windows-exporter
|
||||
## Runs https://github.com/prometheus-community/windows_exporter as a DaemonSet
|
||||
## Relies on the existence of a wins server of version v0.1.0+ on every Windows host to allow
|
||||
## windows_exporter to run as a host process that can publish host metrics to a port on the Pod
|
||||
windows:
|
||||
enabled: false
|
||||
##
|
||||
## Deploys a DaemonSet of Prometheus exporters based on https://github.com/prometheus-community/windows_exporter.
|
||||
## Every Windows host must have a wins version of 0.1.0+ to use this chart (default as of Rancher 2.5.8).
|
||||
## To upgrade wins versions on Windows hosts, see https://github.com/rancher/wins/tree/master/charts/rancher-wins-upgrader.
|
||||
##
|
||||
# windows:
|
||||
# enabled: false
|
||||
kubectl:
|
||||
repository: rancher/kubectl
|
||||
tag: v1.20.2
|
||||
|
@ -1763,8 +1765,8 @@ prometheusOperator:
|
|||
enabled: true
|
||||
# Value must match version names from https://golang.org/pkg/crypto/tls/#pkg-constants
|
||||
tlsMinVersion: VersionTLS13
|
||||
# The default webhook port is 10250 in order to work out-of-the-box in GKE private clusters and avoid adding firewall rules.
|
||||
internalPort: 10250
|
||||
# Users who are deploying this chart in GKE private clusters will need to add firewall rules to expose this port for admissions webhooks
|
||||
internalPort: 8443
|
||||
|
||||
## Admission webhook support for PrometheusRules resources added in Prometheus Operator 0.30 can be enabled to prevent incorrectly formatted
|
||||
## rules from making their way into prometheus and potentially preventing the container from starting
|
||||
|
|
|
@ -21,6 +21,7 @@ clients:
|
|||
image:
|
||||
repository: rancher/windows_exporter-package
|
||||
tag: v0.0.1
|
||||
os: "windows"
|
||||
|
||||
# Specify the IP addresses of nodes that you want to collect metrics from
|
||||
endpoints: []
|
||||
|
|
|
@ -1,23 +1,23 @@
|
|||
# Patterns to ignore when building packages.
|
||||
# This supports shell glob matching, relative path matching, and
|
||||
# negation (prefixed with !). Only one pattern per line.
|
||||
.DS_Store
|
||||
# Common VCS dirs
|
||||
.git/
|
||||
.gitignore
|
||||
.bzr/
|
||||
.bzrignore
|
||||
.hg/
|
||||
.hgignore
|
||||
.svn/
|
||||
# Common backup files
|
||||
*.swp
|
||||
*.bak
|
||||
*.tmp
|
||||
*.orig
|
||||
*~
|
||||
# Various IDEs
|
||||
.project
|
||||
.idea/
|
||||
*.tmproj
|
||||
.vscode/
|
||||
# Patterns to ignore when building packages.
|
||||
# This supports shell glob matching, relative path matching, and
|
||||
# negation (prefixed with !). Only one pattern per line.
|
||||
.DS_Store
|
||||
# Common VCS dirs
|
||||
.git/
|
||||
.gitignore
|
||||
.bzr/
|
||||
.bzrignore
|
||||
.hg/
|
||||
.hgignore
|
||||
.svn/
|
||||
# Common backup files
|
||||
*.swp
|
||||
*.bak
|
||||
*.tmp
|
||||
*.orig
|
||||
*~
|
||||
# Various IDEs
|
||||
.project
|
||||
.idea/
|
||||
*.tmproj
|
||||
.vscode/
|
||||
|
|
|
@ -1,41 +1,41 @@
|
|||
# Rancher Wins Upgrader
|
||||
|
||||
A Rancher chart that handles keeping the wins server version and config across some (or all) of the Windows nodes on a Kubernetes cluster in sync. It does this by running a simple script to replace the contents of the `\etc\rancher\wins` directory with the newly specified config and wins image via one or more DaemonSets. Once executed, the script will simply sleep forever.
|
||||
|
||||
## How does this work?
|
||||
|
||||
A DaemonSet of initContainers copies the provided config (stored in a ConfigMap) into `\etc\rancher\wins\config` and runs `wins cli prc run --path {path-to-wins} --args {up}`, where `.\wins up[grade]` is a Go program that runs a simple Powershell script that forces an upgrade of the binary used by the `rancher-wins` service across all of your Windows hosts.
|
||||
|
||||
TLDR: we use wins (cli) to pass wins (upgrade) to wins (server) in order to update wins (server) on the host on demand.
|
||||
|
||||
## Cluster / Node Requirements
|
||||
|
||||
This Helm chart is intended to be used on a Windows cluster that meets the following two requirements:
|
||||
- A Windows Service called `rancher-wins` is currently running on each Windows host (e.g. `.\wins srv app run --register; Start-Service -Name rancher-wins` or `.\wins up` has been run on the host) that is running a wins server version of v0.1.0+.
|
||||
- The wins config used by each Windows host's `rancher-wins` Service has `{{ .Values.prefixPath }}etc\rancher\wins\wins-upgrade.exe` within `whiteList.processPath` so that the new wins version can be delivered onto the host
|
||||
|
||||
If the cluster you are installing this chart on is a custom cluster that was created via RKE1 with Windows Support enabled, your nodes should already meet the first requirement; this should have been added as part of [the bootstrapping process for adding the Windows node onto your RKE1 cluster](https://github.com/rancher/rancher/blob/master/package/windows/bootstrap.ps1).
|
||||
|
||||
However, depending on the bootstrap.ps1 version that was used when you spun up your Windows cluster, it is possible that the second requirement is not met yet.
|
||||
|
||||
If the second requirement is not met, there are two options to reconcile:
|
||||
|
||||
### Manual Update
|
||||
|
||||
This is the recommended approach for updating your Windows hosts, but it requires the user to log onto every Windows host to upgrade the wins config. After logging onto each host, you will need to do manually update the wins config.
|
||||
|
||||
By default, the wins config is located in `c:\etc\rancher\wins\config`, but you could use the following powershell command to identify the command line arguments passed into the `rancher-wins` service (`--config` corresponds to the config path on the host):
|
||||
```powershell
|
||||
(Get-CimInstance Win32_Service -Filter 'Name = "rancher-wins"').PathName
|
||||
```
|
||||
|
||||
Once complete, restart the service:
|
||||
```powershell
|
||||
Restart-Service -Name "rancher-wins" | Stop-Service
|
||||
```
|
||||
|
||||
### Masquerading (Use at your own risk. Here be dragons...)
|
||||
|
||||
This option is *only* meant as a hack to allow users who are currently operating on Windows clusters that have not whitelisted `{{ .Values.prefixPath }}etc\rancher\wins\wins-upgrade.exe`. If you plan to use this option, please ensure that you immediately upgrade this chart with `masquerade.enabled=false` and perform another `helm upgrade` to avoid any unintentional consequences (e.g. failure to install the original process that you meant to whitelist on the host).
|
||||
|
||||
# Rancher Wins Upgrader
|
||||
|
||||
A Rancher chart that handles keeping the wins server version and config across some (or all) of the Windows nodes on a Kubernetes cluster in sync. It does this by running a simple script to replace the contents of the `\etc\rancher\wins` directory with the newly specified config and wins image via one or more DaemonSets. Once executed, the script will simply sleep forever.
|
||||
|
||||
## How does this work?
|
||||
|
||||
A DaemonSet of initContainers copies the provided config (stored in a ConfigMap) into `\etc\rancher\wins\config` and runs `wins cli prc run --path {path-to-wins} --args {up}`, where `.\wins up[grade]` is a Go program that runs a simple Powershell script that forces an upgrade of the binary used by the `rancher-wins` service across all of your Windows hosts.
|
||||
|
||||
TLDR: we use wins (cli) to pass wins (upgrade) to wins (server) in order to update wins (server) on the host on demand.
|
||||
|
||||
## Cluster / Node Requirements
|
||||
|
||||
This Helm chart is intended to be used on a Windows cluster that meets the following two requirements:
|
||||
- A Windows Service called `rancher-wins` is currently running on each Windows host (e.g. `.\wins srv app run --register; Start-Service -Name rancher-wins` or `.\wins up` has been run on the host) that is running a wins server version of v0.1.0+.
|
||||
- The wins config used by each Windows host's `rancher-wins` Service has `{{ .Values.prefixPath }}etc\rancher\wins\wins-upgrade.exe` within `whiteList.processPath` so that the new wins version can be delivered onto the host
|
||||
|
||||
If the cluster you are installing this chart on is a custom cluster that was created via RKE1 with Windows Support enabled, your nodes should already meet the first requirement; this should have been added as part of [the bootstrapping process for adding the Windows node onto your RKE1 cluster](https://github.com/rancher/rancher/blob/master/package/windows/bootstrap.ps1).
|
||||
|
||||
However, depending on the bootstrap.ps1 version that was used when you spun up your Windows cluster, it is possible that the second requirement is not met yet.
|
||||
|
||||
If the second requirement is not met, there are two options to reconcile:
|
||||
|
||||
### Manual Update
|
||||
|
||||
This is the recommended approach for updating your Windows hosts, but it requires the user to log onto every Windows host to upgrade the wins config. After logging onto each host, you will need to do manually update the wins config.
|
||||
|
||||
By default, the wins config is located in `c:\etc\rancher\wins\config`, but you could use the following powershell command to identify the command line arguments passed into the `rancher-wins` service (`--config` corresponds to the config path on the host):
|
||||
```powershell
|
||||
(Get-CimInstance Win32_Service -Filter 'Name = "rancher-wins"').PathName
|
||||
```
|
||||
|
||||
Once complete, restart the service:
|
||||
```powershell
|
||||
Restart-Service -Name "rancher-wins" | Stop-Service
|
||||
```
|
||||
|
||||
### Masquerading (Use at your own risk. Here be dragons...)
|
||||
|
||||
This option is *only* meant as a hack to allow users who are currently operating on Windows clusters that have not whitelisted `{{ .Values.prefixPath }}etc\rancher\wins\wins-upgrade.exe`. If you plan to use this option, please ensure that you immediately upgrade this chart with `masquerade.enabled=false` and perform another `helm upgrade` to avoid any unintentional consequences (e.g. failure to install the original process that you meant to whitelist on the host).
|
||||
|
||||
If `masquerade.enabled=True`, this chart will have the wins client execute `wins-upgrade.exe` payload under the `masquerade.as` path provided, effectively tricking the `wins server` into running the binary although it has not been whitelisted. This relies on the fact that the wins server does not / cannot do any verification on the binary passed into wins since it does track a list of valid checksums on the binaries provided to it.
|
|
@ -1,19 +1,19 @@
|
|||
# Rancher Wins Upgrader
|
||||
|
||||
A Rancher chart that handles keeping the wins server version and config across some (or all) of the Windows nodes on a Kubernetes cluster in sync. It does this by running a simple script to replace the contents of the `\etc\rancher\wins` directory with the newly specified config and wins image via one or more DaemonSets. Once executed, the script will simply sleep forever.
|
||||
|
||||
## How does this work?
|
||||
|
||||
A DaemonSet of initContainers copies the provided config (stored in a ConfigMap) into `\etc\rancher\wins\config` and runs `wins cli prc run --path {path-to-wins} --args {up}`, where `.\wins up[grade]` is a Go program that runs a simple Powershell script that forces an upgrade of the binary used by the `rancher-wins` service across all of your Windows hosts.
|
||||
|
||||
TLDR: we use wins (cli) to pass wins (upgrade) to wins (server) in order to update wins (server) on the host on demand.
|
||||
|
||||
## Cluster / Node Requirements
|
||||
|
||||
This Helm chart is intended to be used on a Windows cluster that meets the following two requirements:
|
||||
- A Windows Service called `rancher-wins` is currently running on each Windows host (e.g. `.\wins srv app run --register; Start-Service -Name rancher-wins` or `.\wins up` has been run on the host) that is running a wins server version of v0.1.0+.
|
||||
- The wins config used by each Windows host's `rancher-wins` Service has `{{ .Values.prefixPath }}etc\rancher\wins\wins-upgrade.exe` within `whiteList.processPath` so that the new wins version can be delivered onto the host
|
||||
|
||||
If the cluster you are installing this chart on is a custom cluster that was created via RKE1 with Windows Support enabled after wins v0.1.0+ was released (i.e. Rancher 2.5.7+), your nodes should already meet the first requirement; this should have been added as part of [the bootstrapping process for adding the Windows node onto your RKE1 cluster](https://github.com/rancher/rancher/blob/master/package/windows/bootstrap.ps1).
|
||||
|
||||
# Rancher Wins Upgrader
|
||||
|
||||
A Rancher chart that handles keeping the wins server version and config across some (or all) of the Windows nodes on a Kubernetes cluster in sync. It does this by running a simple script to replace the contents of the `\etc\rancher\wins` directory with the newly specified config and wins image via one or more DaemonSets. Once executed, the script will simply sleep forever.
|
||||
|
||||
## How does this work?
|
||||
|
||||
A DaemonSet of initContainers copies the provided config (stored in a ConfigMap) into `\etc\rancher\wins\config` and runs `wins cli prc run --path {path-to-wins} --args {up}`, where `.\wins up[grade]` is a Go program that runs a simple Powershell script that forces an upgrade of the binary used by the `rancher-wins` service across all of your Windows hosts.
|
||||
|
||||
TLDR: we use wins (cli) to pass wins (upgrade) to wins (server) in order to update wins (server) on the host on demand.
|
||||
|
||||
## Cluster / Node Requirements
|
||||
|
||||
This Helm chart is intended to be used on a Windows cluster that meets the following two requirements:
|
||||
- A Windows Service called `rancher-wins` is currently running on each Windows host (e.g. `.\wins srv app run --register; Start-Service -Name rancher-wins` or `.\wins up` has been run on the host) that is running a wins server version of v0.1.0+.
|
||||
- The wins config used by each Windows host's `rancher-wins` Service has `{{ .Values.prefixPath }}etc\rancher\wins\wins-upgrade.exe` within `whiteList.processPath` so that the new wins version can be delivered onto the host
|
||||
|
||||
If the cluster you are installing this chart on is a custom cluster that was created via RKE1 with Windows Support enabled after wins v0.1.0+ was released (i.e. Rancher 2.5.7+), your nodes should already meet the first requirement; this should have been added as part of [the bootstrapping process for adding the Windows node onto your RKE1 cluster](https://github.com/rancher/rancher/blob/master/package/windows/bootstrap.ps1).
|
||||
|
||||
If not, please see the README.md for more information on how you can use this chart.
|
|
@ -1,4 +1,4 @@
|
|||
$ErrorActionPreference = 'Stop'
|
||||
|
||||
# Sleep forever, since a DaemonSet's restartPolicy must be Always
|
||||
$ErrorActionPreference = 'Stop'
|
||||
|
||||
# Sleep forever, since a DaemonSet's restartPolicy must be Always
|
||||
while(1) { Start-Sleep -s 3600 }
|
|
@ -1,67 +1,67 @@
|
|||
$ErrorActionPreference = 'Stop'
|
||||
|
||||
function Create-Directory
|
||||
{
|
||||
param (
|
||||
[parameter(Mandatory = $false, ValueFromPipeline = $true)] [string]$Path
|
||||
)
|
||||
|
||||
if (Test-Path -Path $Path) {
|
||||
if (-not (Test-Path -Path $Path -PathType Container)) {
|
||||
# clean the same path file
|
||||
Remove-Item -Recurse -Force -Path $Path -ErrorAction Ignore | Out-Null
|
||||
}
|
||||
|
||||
return
|
||||
}
|
||||
|
||||
New-Item -Force -ItemType Directory -Path $Path | Out-Null
|
||||
}
|
||||
|
||||
function Transfer-File
|
||||
{
|
||||
param (
|
||||
[parameter(Mandatory = $true)] [string]$Src,
|
||||
[parameter(Mandatory = $true)] [string]$Dst
|
||||
)
|
||||
|
||||
if (Test-Path -PathType leaf -Path $Dst) {
|
||||
$dstHasher = Get-FileHash -Path $Dst
|
||||
$srcHasher = Get-FileHash -Path $Src
|
||||
if ($dstHasher.Hash -eq $srcHasher.Hash) {
|
||||
return
|
||||
}
|
||||
}
|
||||
|
||||
$null = Copy-Item -Force -Path $Src -Destination $Dst
|
||||
}
|
||||
|
||||
if ($env:WINS_UPGRADE_PATH) {
|
||||
$winsUpgradePath = $env:WINS_UPGRADE_PATH
|
||||
} else {
|
||||
$winsUpgradePath = "c:\etc\rancher\wins\wins-upgrade.exe"
|
||||
}
|
||||
$winsUpgradeDir = Split-Path -Path $winsUpgradePath
|
||||
$winsUpgradeFilename = Split-Path -Path $winsUpgradePath -Leaf
|
||||
|
||||
Create-Directory -Path $winsUpgradeDir
|
||||
Transfer-File -Src "c:\Windows\wins.exe" -Dst $winsUpgradePath
|
||||
|
||||
Create-Directory -Path "c:\host\etc\rancher\wins"
|
||||
Transfer-File -Src $winsUpgradePath -Dst "c:\host\etc\rancher\wins\$winsUpgradeFilename"
|
||||
Transfer-File -Src "c:\scripts\config" -Dst "c:\host\etc\rancher\wins\config"
|
||||
|
||||
$winsOut = wins.exe cli prc run --path=$winsUpgradePath --args="up --wins-args=`'--config=$winsUpgradeDir\config`'"
|
||||
|
||||
Write-Host $winsOut
|
||||
|
||||
if ($winsOut -match ".* rpc error: code = Unavailable desc = transport is closing") {
|
||||
Write-Host "Successfully upgraded"
|
||||
exit 0
|
||||
} elseif ($LastExitCode -ne 0) {
|
||||
Write-Host "Returned exit $LastExitCode"
|
||||
exit $LastExitCode
|
||||
} else {
|
||||
Write-Host "Returned exit 0, but did not receive expected output from .\wins up"
|
||||
exit 1
|
||||
}
|
||||
$ErrorActionPreference = 'Stop'
|
||||
|
||||
function Create-Directory
|
||||
{
|
||||
param (
|
||||
[parameter(Mandatory = $false, ValueFromPipeline = $true)] [string]$Path
|
||||
)
|
||||
|
||||
if (Test-Path -Path $Path) {
|
||||
if (-not (Test-Path -Path $Path -PathType Container)) {
|
||||
# clean the same path file
|
||||
Remove-Item -Recurse -Force -Path $Path -ErrorAction Ignore | Out-Null
|
||||
}
|
||||
|
||||
return
|
||||
}
|
||||
|
||||
New-Item -Force -ItemType Directory -Path $Path | Out-Null
|
||||
}
|
||||
|
||||
function Transfer-File
|
||||
{
|
||||
param (
|
||||
[parameter(Mandatory = $true)] [string]$Src,
|
||||
[parameter(Mandatory = $true)] [string]$Dst
|
||||
)
|
||||
|
||||
if (Test-Path -PathType leaf -Path $Dst) {
|
||||
$dstHasher = Get-FileHash -Path $Dst
|
||||
$srcHasher = Get-FileHash -Path $Src
|
||||
if ($dstHasher.Hash -eq $srcHasher.Hash) {
|
||||
return
|
||||
}
|
||||
}
|
||||
|
||||
$null = Copy-Item -Force -Path $Src -Destination $Dst
|
||||
}
|
||||
|
||||
if ($env:WINS_UPGRADE_PATH) {
|
||||
$winsUpgradePath = $env:WINS_UPGRADE_PATH
|
||||
} else {
|
||||
$winsUpgradePath = "c:\etc\rancher\wins\wins-upgrade.exe"
|
||||
}
|
||||
$winsUpgradeDir = Split-Path -Path $winsUpgradePath
|
||||
$winsUpgradeFilename = Split-Path -Path $winsUpgradePath -Leaf
|
||||
|
||||
Create-Directory -Path $winsUpgradeDir
|
||||
Transfer-File -Src "c:\Windows\wins.exe" -Dst $winsUpgradePath
|
||||
|
||||
Create-Directory -Path "c:\host\etc\rancher\wins"
|
||||
Transfer-File -Src $winsUpgradePath -Dst "c:\host\etc\rancher\wins\$winsUpgradeFilename"
|
||||
Transfer-File -Src "c:\scripts\config" -Dst "c:\host\etc\rancher\wins\config"
|
||||
|
||||
$winsOut = wins.exe cli prc run --path=$winsUpgradePath --args="up --wins-args=`'--config=$winsUpgradeDir\config`'"
|
||||
|
||||
Write-Host $winsOut
|
||||
|
||||
if ($winsOut -match ".* rpc error: code = Unavailable desc = transport is closing") {
|
||||
Write-Host "Successfully upgraded"
|
||||
exit 0
|
||||
} elseif ($LastExitCode -ne 0) {
|
||||
Write-Host "Returned exit $LastExitCode"
|
||||
exit $LastExitCode
|
||||
} else {
|
||||
Write-Host "Returned exit 0, but did not receive expected output from .\wins up"
|
||||
exit 1
|
||||
}
|
||||
|
|
|
@ -1,50 +1,50 @@
|
|||
# Rancher
|
||||
|
||||
{{- define "system_default_registry" -}}
|
||||
{{- if .Values.global.cattle.systemDefaultRegistry -}}
|
||||
{{- printf "%s/" .Values.global.cattle.systemDefaultRegistry -}}
|
||||
{{- end -}}
|
||||
{{- end -}}
|
||||
|
||||
# General
|
||||
|
||||
{{/*
|
||||
Create a default fully qualified app name.
|
||||
We truncate at 63 chars because some Kubernetes name fields are limited to this (by the DNS naming spec).
|
||||
If release name contains chart name it will be used as a full name.
|
||||
The components in this chart create additional resources that expand the longest created name strings.
|
||||
The longest name that gets created adds and extra 37 characters, so truncation should be 63-35=26.
|
||||
*/}}
|
||||
{{- define "winsUpgrader.name" -}}
|
||||
wins-upgrader
|
||||
{{- end -}}
|
||||
|
||||
{{- define "winsUpgrader.namespace" -}}
|
||||
{{- default .Release.Namespace .Values.namespaceOverride -}}
|
||||
{{- end -}}
|
||||
|
||||
{{- define "winsUpgrader.labels" -}}
|
||||
k8s-app: {{ template "winsUpgrader.name" . }}
|
||||
release: {{ .Release.Name }}
|
||||
provider: kubernetes
|
||||
{{- end -}}
|
||||
|
||||
{{- define "winsUpgrader.winsHostPath" -}}
|
||||
{{ .Values.prefixPath | replace "\\\\" "/" }}etc/rancher/wins
|
||||
{{- end -}}
|
||||
|
||||
{{- define "winsUpgrader.winsMasqueradeHostPath" -}}
|
||||
{{ required "Must provide name for .Values.masquerade.as if enabled" .Values.masquerade.as | replace "\\\\" "\\" | replace "\\" "/" | dir }}
|
||||
{{- end -}}
|
||||
|
||||
{{- define "winsUpgrader.nodeSelector" -}}
|
||||
{{- if semverCompare "<1.14-0" .Capabilities.KubeVersion.GitVersion -}}
|
||||
beta.kubernetes.io/os: windows
|
||||
{{- else -}}
|
||||
kubernetes.io/os: windows
|
||||
{{- end -}}
|
||||
{{- end -}}
|
||||
|
||||
{{- define "winsUpgrader.tolerations" -}}
|
||||
- operator: Exists
|
||||
{{- end -}}
|
||||
# Rancher
|
||||
|
||||
{{- define "system_default_registry" -}}
|
||||
{{- if .Values.global.cattle.systemDefaultRegistry -}}
|
||||
{{- printf "%s/" .Values.global.cattle.systemDefaultRegistry -}}
|
||||
{{- end -}}
|
||||
{{- end -}}
|
||||
|
||||
# General
|
||||
|
||||
{{/*
|
||||
Create a default fully qualified app name.
|
||||
We truncate at 63 chars because some Kubernetes name fields are limited to this (by the DNS naming spec).
|
||||
If release name contains chart name it will be used as a full name.
|
||||
The components in this chart create additional resources that expand the longest created name strings.
|
||||
The longest name that gets created adds and extra 37 characters, so truncation should be 63-35=26.
|
||||
*/}}
|
||||
{{- define "winsUpgrader.name" -}}
|
||||
wins-upgrader
|
||||
{{- end -}}
|
||||
|
||||
{{- define "winsUpgrader.namespace" -}}
|
||||
{{- default .Release.Namespace .Values.namespaceOverride -}}
|
||||
{{- end -}}
|
||||
|
||||
{{- define "winsUpgrader.labels" -}}
|
||||
k8s-app: {{ template "winsUpgrader.name" . }}
|
||||
release: {{ .Release.Name }}
|
||||
provider: kubernetes
|
||||
{{- end -}}
|
||||
|
||||
{{- define "winsUpgrader.winsHostPath" -}}
|
||||
{{ .Values.prefixPath | replace "\\\\" "/" }}etc/rancher/wins
|
||||
{{- end -}}
|
||||
|
||||
{{- define "winsUpgrader.winsMasqueradeHostPath" -}}
|
||||
{{ required "Must provide name for .Values.masquerade.as if enabled" .Values.masquerade.as | replace "\\\\" "\\" | replace "\\" "/" | dir }}
|
||||
{{- end -}}
|
||||
|
||||
{{- define "winsUpgrader.nodeSelector" -}}
|
||||
{{- if semverCompare "<1.14-0" .Capabilities.KubeVersion.GitVersion -}}
|
||||
beta.kubernetes.io/os: windows
|
||||
{{- else -}}
|
||||
kubernetes.io/os: windows
|
||||
{{- end -}}
|
||||
{{- end -}}
|
||||
|
||||
{{- define "winsUpgrader.tolerations" -}}
|
||||
- operator: Exists
|
||||
{{- end -}}
|
||||
|
|
|
@ -1,16 +1,16 @@
|
|||
{{- range .Values.winsConfigs }}
|
||||
apiVersion: v1
|
||||
kind: ConfigMap
|
||||
metadata:
|
||||
name: {{ template "winsUpgrader.name" $ }}-{{ .name }}
|
||||
namespace: {{ template "winsUpgrader.namespace" $ }}
|
||||
labels: {{ include "winsUpgrader.labels" $ | nindent 4 }}
|
||||
data:
|
||||
config: |-
|
||||
{{ tpl .config $ | indent 4 }}
|
||||
upgrade.ps1: |-
|
||||
{{ $.Files.Get "scripts/upgrade.ps1" | indent 4 }}
|
||||
noop.ps1: |-
|
||||
{{ $.Files.Get "scripts/noop.ps1" | indent 4 }}
|
||||
---
|
||||
{{- end }}
|
||||
{{- range .Values.winsConfigs }}
|
||||
apiVersion: v1
|
||||
kind: ConfigMap
|
||||
metadata:
|
||||
name: {{ template "winsUpgrader.name" $ }}-{{ .name }}
|
||||
namespace: {{ template "winsUpgrader.namespace" $ }}
|
||||
labels: {{ include "winsUpgrader.labels" $ | nindent 4 }}
|
||||
data:
|
||||
config: |-
|
||||
{{ tpl .config $ | indent 4 }}
|
||||
upgrade.ps1: |-
|
||||
{{ $.Files.Get "scripts/upgrade.ps1" | indent 4 }}
|
||||
noop.ps1: |-
|
||||
{{ $.Files.Get "scripts/noop.ps1" | indent 4 }}
|
||||
---
|
||||
{{- end }}
|
||||
|
|
|
@ -1,70 +1,70 @@
|
|||
{{- range .Values.winsConfigs }}
|
||||
apiVersion: apps/v1
|
||||
kind: DaemonSet
|
||||
metadata:
|
||||
name: {{ template "winsUpgrader.name" $ }}-{{ required "Must provide name for .Values.winsConfigs[].name" .name }}
|
||||
namespace: {{ template "winsUpgrader.namespace" $ }}
|
||||
labels: {{ include "winsUpgrader.labels" $ | nindent 4 }}
|
||||
spec:
|
||||
selector:
|
||||
matchLabels: {{ include "winsUpgrader.labels" $ | nindent 6 }}
|
||||
template:
|
||||
metadata:
|
||||
labels: {{ include "winsUpgrader.labels" $ | nindent 8 }}
|
||||
spec:
|
||||
nodeSelector: {{ include "winsUpgrader.nodeSelector" $ | nindent 8 }}
|
||||
{{- if .nodeSelector }}
|
||||
{{ toYaml .nodeSelector | indent 8 }}
|
||||
{{- end }}
|
||||
{{- if .tolerations }}
|
||||
tolerations: {{ .tolerations | toYaml | nindent 8 }}
|
||||
{{- else }}
|
||||
tolerations: {{ include "winsUpgrader.tolerations" $ | nindent 8 }}
|
||||
{{- end }}
|
||||
serviceAccountName: {{ template "winsUpgrader.name" $ }}
|
||||
containers:
|
||||
- name: noop
|
||||
image: {{ template "system_default_registry" $ }}{{ required "Must provide name for .Values.winsConfigs[].image.repository" .image.repository }}:{{ required "Must provide name for .Values.winsConfigs[].tag" .image.tag }}
|
||||
command: ["pwsh", "-f", "c:/scripts/noop.ps1"]
|
||||
volumeMounts:
|
||||
- name: upgrade-scripts
|
||||
mountPath: c:/scripts/
|
||||
initContainers:
|
||||
- name: wins-upgrader
|
||||
image: {{ template "system_default_registry" $ }}{{ .image.repository }}:{{ .image.tag }}
|
||||
command: ["pwsh", "-f", "c:/scripts/upgrade.ps1"]
|
||||
volumeMounts:
|
||||
- name: wins-pipe
|
||||
mountPath: \\.\pipe\rancher_wins
|
||||
- name: wins
|
||||
mountPath: c:/host/etc/rancher/wins
|
||||
- name: upgrade-scripts
|
||||
mountPath: c:/scripts/
|
||||
env:
|
||||
- name: HELM_REVISION_NUMBER
|
||||
value: {{ $.Release.Revision | quote }}
|
||||
{{- if $.Values.masquerade.enabled }}
|
||||
- name: WINS_UPGRADE_PATH
|
||||
value: {{ $.Values.masquerade.as }}
|
||||
{{- end }}
|
||||
volumes:
|
||||
- name: wins-pipe
|
||||
hostPath:
|
||||
path: \\.\pipe\rancher_wins
|
||||
- name: wins
|
||||
hostPath:
|
||||
{{- if $.Values.masquerade.enabled }}
|
||||
path: {{ include "winsUpgrader.winsMasqueradeHostPath" $ }}
|
||||
type: DirectoryOrCreate
|
||||
{{- else }}
|
||||
path: {{ include "winsUpgrader.winsHostPath" $ }}
|
||||
type: DirectoryOrCreate
|
||||
{{- end }}
|
||||
- name: upgrade-scripts
|
||||
configMap:
|
||||
name: {{ template "winsUpgrader.name" $ }}-{{ .name }}
|
||||
---
|
||||
{{- end }}
|
||||
{{- if not .Values.winsConfigs }}
|
||||
{{- fail "Cannot install chart unless at least one config is provided in .Values.winsConfigs" }}
|
||||
{{- range .Values.winsConfigs }}
|
||||
apiVersion: apps/v1
|
||||
kind: DaemonSet
|
||||
metadata:
|
||||
name: {{ template "winsUpgrader.name" $ }}-{{ required "Must provide name for .Values.winsConfigs[].name" .name }}
|
||||
namespace: {{ template "winsUpgrader.namespace" $ }}
|
||||
labels: {{ include "winsUpgrader.labels" $ | nindent 4 }}
|
||||
spec:
|
||||
selector:
|
||||
matchLabels: {{ include "winsUpgrader.labels" $ | nindent 6 }}
|
||||
template:
|
||||
metadata:
|
||||
labels: {{ include "winsUpgrader.labels" $ | nindent 8 }}
|
||||
spec:
|
||||
nodeSelector: {{ include "winsUpgrader.nodeSelector" $ | nindent 8 }}
|
||||
{{- if .nodeSelector }}
|
||||
{{ toYaml .nodeSelector | indent 8 }}
|
||||
{{- end }}
|
||||
{{- if .tolerations }}
|
||||
tolerations: {{ .tolerations | toYaml | nindent 8 }}
|
||||
{{- else }}
|
||||
tolerations: {{ include "winsUpgrader.tolerations" $ | nindent 8 }}
|
||||
{{- end }}
|
||||
serviceAccountName: {{ template "winsUpgrader.name" $ }}
|
||||
containers:
|
||||
- name: noop
|
||||
image: {{ template "system_default_registry" $ }}{{ required "Must provide name for .Values.winsConfigs[].image.repository" .image.repository }}:{{ required "Must provide name for .Values.winsConfigs[].tag" .image.tag }}
|
||||
command: ["pwsh", "-f", "c:/scripts/noop.ps1"]
|
||||
volumeMounts:
|
||||
- name: upgrade-scripts
|
||||
mountPath: c:/scripts/
|
||||
initContainers:
|
||||
- name: wins-upgrader
|
||||
image: {{ template "system_default_registry" $ }}{{ .image.repository }}:{{ .image.tag }}
|
||||
command: ["pwsh", "-f", "c:/scripts/upgrade.ps1"]
|
||||
volumeMounts:
|
||||
- name: wins-pipe
|
||||
mountPath: \\.\pipe\rancher_wins
|
||||
- name: wins
|
||||
mountPath: c:/host/etc/rancher/wins
|
||||
- name: upgrade-scripts
|
||||
mountPath: c:/scripts/
|
||||
env:
|
||||
- name: HELM_REVISION_NUMBER
|
||||
value: {{ $.Release.Revision | quote }}
|
||||
{{- if $.Values.masquerade.enabled }}
|
||||
- name: WINS_UPGRADE_PATH
|
||||
value: {{ $.Values.masquerade.as }}
|
||||
{{- end }}
|
||||
volumes:
|
||||
- name: wins-pipe
|
||||
hostPath:
|
||||
path: \\.\pipe\rancher_wins
|
||||
- name: wins
|
||||
hostPath:
|
||||
{{- if $.Values.masquerade.enabled }}
|
||||
path: {{ include "winsUpgrader.winsMasqueradeHostPath" $ }}
|
||||
type: DirectoryOrCreate
|
||||
{{- else }}
|
||||
path: {{ include "winsUpgrader.winsHostPath" $ }}
|
||||
type: DirectoryOrCreate
|
||||
{{- end }}
|
||||
- name: upgrade-scripts
|
||||
configMap:
|
||||
name: {{ template "winsUpgrader.name" $ }}-{{ .name }}
|
||||
---
|
||||
{{- end }}
|
||||
{{- if not .Values.winsConfigs }}
|
||||
{{- fail "Cannot install chart unless at least one config is provided in .Values.winsConfigs" }}
|
||||
{{- end }}
|
|
@ -1,70 +1,70 @@
|
|||
apiVersion: rbac.authorization.k8s.io/v1
|
||||
kind: ClusterRole
|
||||
metadata:
|
||||
name: {{ template "winsUpgrader.name" . }}
|
||||
namespace: {{ template "winsUpgrader.namespace" . }}
|
||||
labels: {{ include "winsUpgrader.labels" . | nindent 4 }}
|
||||
rules:
|
||||
- apiGroups: ['policy']
|
||||
resources: ['podsecuritypolicies']
|
||||
verbs: ['use']
|
||||
resourceNames: [{{ include "winsUpgrader.name" . | quote }}]
|
||||
---
|
||||
apiVersion: rbac.authorization.k8s.io/v1
|
||||
kind: ClusterRoleBinding
|
||||
metadata:
|
||||
name: {{ template "winsUpgrader.name" . }}
|
||||
namespace: {{ template "winsUpgrader.namespace" . }}
|
||||
labels: {{ include "winsUpgrader.labels" . | nindent 4 }}
|
||||
roleRef:
|
||||
apiGroup: rbac.authorization.k8s.io
|
||||
kind: ClusterRole
|
||||
name: {{ template "winsUpgrader.name" . }}
|
||||
subjects:
|
||||
- kind: ServiceAccount
|
||||
name: {{ template "winsUpgrader.name" . }}
|
||||
namespace: {{ template "winsUpgrader.namespace" $ }}
|
||||
---
|
||||
apiVersion: v1
|
||||
kind: ServiceAccount
|
||||
metadata:
|
||||
name: {{ template "winsUpgrader.name" . }}
|
||||
namespace: {{ template "winsUpgrader.namespace" . }}
|
||||
labels: {{ include "winsUpgrader.labels" . | nindent 4 }}
|
||||
---
|
||||
apiVersion: policy/v1beta1
|
||||
kind: PodSecurityPolicy
|
||||
metadata:
|
||||
name: {{ template "winsUpgrader.name" . }}
|
||||
namespace: {{ template "winsUpgrader.namespace" . }}
|
||||
labels: {{ include "winsUpgrader.labels" . | nindent 4 }}
|
||||
spec:
|
||||
privileged: false
|
||||
hostNetwork: false
|
||||
hostIPC: false
|
||||
hostPID: false
|
||||
runAsUser:
|
||||
rule: 'RunAsAny'
|
||||
seLinux:
|
||||
rule: 'RunAsAny'
|
||||
supplementalGroups:
|
||||
rule: 'MustRunAs'
|
||||
ranges:
|
||||
- min: 0
|
||||
max: 65535
|
||||
fsGroup:
|
||||
rule: 'MustRunAs'
|
||||
ranges:
|
||||
- min: 0
|
||||
max: 65535
|
||||
readOnlyRootFilesystem: false
|
||||
volumes:
|
||||
- 'secret'
|
||||
- 'hostPath'
|
||||
allowedHostPaths:
|
||||
- pathPrefix: \\.\pipe\rancher_wins
|
||||
{{- if .Values.masquerade.enabled }}
|
||||
- pathPrefix: {{ include "winsUpgrader.winsMasqueradeHostPath" . }}
|
||||
{{- else }}
|
||||
- pathPrefix: {{ include "winsUpgrader.winsHostPath" . }}
|
||||
{{- end }}
|
||||
apiVersion: rbac.authorization.k8s.io/v1
|
||||
kind: ClusterRole
|
||||
metadata:
|
||||
name: {{ template "winsUpgrader.name" . }}
|
||||
namespace: {{ template "winsUpgrader.namespace" . }}
|
||||
labels: {{ include "winsUpgrader.labels" . | nindent 4 }}
|
||||
rules:
|
||||
- apiGroups: ['policy']
|
||||
resources: ['podsecuritypolicies']
|
||||
verbs: ['use']
|
||||
resourceNames: [{{ include "winsUpgrader.name" . | quote }}]
|
||||
---
|
||||
apiVersion: rbac.authorization.k8s.io/v1
|
||||
kind: ClusterRoleBinding
|
||||
metadata:
|
||||
name: {{ template "winsUpgrader.name" . }}
|
||||
namespace: {{ template "winsUpgrader.namespace" . }}
|
||||
labels: {{ include "winsUpgrader.labels" . | nindent 4 }}
|
||||
roleRef:
|
||||
apiGroup: rbac.authorization.k8s.io
|
||||
kind: ClusterRole
|
||||
name: {{ template "winsUpgrader.name" . }}
|
||||
subjects:
|
||||
- kind: ServiceAccount
|
||||
name: {{ template "winsUpgrader.name" . }}
|
||||
namespace: {{ template "winsUpgrader.namespace" $ }}
|
||||
---
|
||||
apiVersion: v1
|
||||
kind: ServiceAccount
|
||||
metadata:
|
||||
name: {{ template "winsUpgrader.name" . }}
|
||||
namespace: {{ template "winsUpgrader.namespace" . }}
|
||||
labels: {{ include "winsUpgrader.labels" . | nindent 4 }}
|
||||
---
|
||||
apiVersion: policy/v1beta1
|
||||
kind: PodSecurityPolicy
|
||||
metadata:
|
||||
name: {{ template "winsUpgrader.name" . }}
|
||||
namespace: {{ template "winsUpgrader.namespace" . }}
|
||||
labels: {{ include "winsUpgrader.labels" . | nindent 4 }}
|
||||
spec:
|
||||
privileged: false
|
||||
hostNetwork: false
|
||||
hostIPC: false
|
||||
hostPID: false
|
||||
runAsUser:
|
||||
rule: 'RunAsAny'
|
||||
seLinux:
|
||||
rule: 'RunAsAny'
|
||||
supplementalGroups:
|
||||
rule: 'MustRunAs'
|
||||
ranges:
|
||||
- min: 0
|
||||
max: 65535
|
||||
fsGroup:
|
||||
rule: 'MustRunAs'
|
||||
ranges:
|
||||
- min: 0
|
||||
max: 65535
|
||||
readOnlyRootFilesystem: false
|
||||
volumes:
|
||||
- 'secret'
|
||||
- 'hostPath'
|
||||
allowedHostPaths:
|
||||
- pathPrefix: \\.\pipe\rancher_wins
|
||||
{{- if .Values.masquerade.enabled }}
|
||||
- pathPrefix: {{ include "winsUpgrader.winsMasqueradeHostPath" . }}
|
||||
{{- else }}
|
||||
- pathPrefix: {{ include "winsUpgrader.winsHostPath" . }}
|
||||
{{- end }}
|
||||
|
|
|
@ -1,62 +1,62 @@
|
|||
# Default values for rancher-windows-exporter.
|
||||
# This is a YAML-formatted file.
|
||||
# Declare variables to be passed into your templates.
|
||||
|
||||
# Configuration
|
||||
|
||||
global:
|
||||
cattle:
|
||||
systemDefaultRegistry: ""
|
||||
|
||||
## The path that prefixes all of your wins processPaths, used in the template for each config
|
||||
##
|
||||
prefixPath: c:\\
|
||||
|
||||
## One or more configurations for the wins server to be applied across all of the nodes based on the nodeSelector and tolerations provided
|
||||
##
|
||||
winsConfigs:
|
||||
- name: default
|
||||
image:
|
||||
# TODO(aiyengar2): replace with an image that just contains wins
|
||||
repository: rancher/wins
|
||||
tag: v0.1.0
|
||||
config: |
|
||||
debug: false
|
||||
listen: rancher_wins
|
||||
proxy: rancher_wins_proxy
|
||||
whiteList:
|
||||
processPaths:
|
||||
- {{ .Values.prefixPath }}etc\rancher\wins\wins-upgrade.exe
|
||||
- {{ .Values.prefixPath }}etc\windows-exporter\windows-exporter.exe
|
||||
- {{ .Values.prefixPath }}etc\wmi-exporter\wmi-exporter.exe
|
||||
- {{ .Values.prefixPath }}etc\kubernetes\bin\kube-proxy.exe
|
||||
- {{ .Values.prefixPath }}etc\kubernetes\bin\kubelet.exe
|
||||
- {{ .Values.prefixPath }}etc\nginx\nginx.exe
|
||||
- {{ .Values.prefixPath }}opt\bin\flanneld.exe
|
||||
proxyPorts:
|
||||
- 9796
|
||||
upgrade:
|
||||
mode: watching
|
||||
watchingPath: {{ .Values.prefixPath }}etc\rancher\wins\wins.exe
|
||||
# By default, `kubernetes.io/os: windows` or `beta.kubernetes.io/os: windows` will be included
|
||||
nodeSelector: {}
|
||||
# If provided, these tolerations will be used. Otherwise, it defaults to `[ {operator: Exists} ]`
|
||||
tolerations: []
|
||||
|
||||
## Masquerade is *only* meant as a hack to allow users who are currently operating on Windows clusters that do
|
||||
## not support wins upgrades (e.g. those which have not whitelisted {{ .Values.prefixPath }}etc\rancher\wins\wins-upgrade.exe)
|
||||
## to be able to masquerade the payload for this installer under another whitelisted process's name.
|
||||
##
|
||||
## Please read the README.md before trying to enable this option and, if applied, ensure that you immediately upgrade
|
||||
## this chart with masquerade.enabled=false to avoid any unintentional consequences (e.g. failure to install the original
|
||||
## process that you meant to whitelist on the host)
|
||||
##
|
||||
## TLDR: Use at your own risk. Here be dragons...
|
||||
##
|
||||
masquerade:
|
||||
enabled: false
|
||||
# Why wmi_exporter?
|
||||
# wmi_exporter is the only default whitelisted process that may or may not be run on the host, since
|
||||
# it is only ever deployed if the Windows cluster is also using Prometheus-based Windows monitoring (e.g. Rancher Monitoring V1)
|
||||
# All of the other default whitelisted processes are required for the Kubernetes cluster to operate
|
||||
# Default values for rancher-windows-exporter.
|
||||
# This is a YAML-formatted file.
|
||||
# Declare variables to be passed into your templates.
|
||||
|
||||
# Configuration
|
||||
|
||||
global:
|
||||
cattle:
|
||||
systemDefaultRegistry: ""
|
||||
|
||||
## The path that prefixes all of your wins processPaths, used in the template for each config
|
||||
##
|
||||
prefixPath: c:\\
|
||||
|
||||
## One or more configurations for the wins server to be applied across all of the nodes based on the nodeSelector and tolerations provided
|
||||
##
|
||||
winsConfigs:
|
||||
- name: default
|
||||
image:
|
||||
repository: rancher/wins
|
||||
tag: v0.1.0
|
||||
os: windows
|
||||
config: |
|
||||
debug: false
|
||||
listen: rancher_wins
|
||||
proxy: rancher_wins_proxy
|
||||
whiteList:
|
||||
processPaths:
|
||||
- {{ .Values.prefixPath }}etc\rancher\wins\wins-upgrade.exe
|
||||
- {{ .Values.prefixPath }}etc\windows-exporter\windows-exporter.exe
|
||||
- {{ .Values.prefixPath }}etc\wmi-exporter\wmi-exporter.exe
|
||||
- {{ .Values.prefixPath }}etc\kubernetes\bin\kube-proxy.exe
|
||||
- {{ .Values.prefixPath }}etc\kubernetes\bin\kubelet.exe
|
||||
- {{ .Values.prefixPath }}etc\nginx\nginx.exe
|
||||
- {{ .Values.prefixPath }}opt\bin\flanneld.exe
|
||||
proxyPorts:
|
||||
- 9796
|
||||
upgrade:
|
||||
mode: watching
|
||||
watchingPath: {{ .Values.prefixPath }}etc\rancher\wins\wins.exe
|
||||
# By default, `kubernetes.io/os: windows` or `beta.kubernetes.io/os: windows` will be included
|
||||
nodeSelector: {}
|
||||
# If provided, these tolerations will be used. Otherwise, it defaults to `[ {operator: Exists} ]`
|
||||
tolerations: []
|
||||
|
||||
## Masquerade is *only* meant as a hack to allow users who are currently operating on Windows clusters that do
|
||||
## not support wins upgrades (e.g. those which have not whitelisted {{ .Values.prefixPath }}etc\rancher\wins\wins-upgrade.exe)
|
||||
## to be able to masquerade the payload for this installer under another whitelisted process's name.
|
||||
##
|
||||
## Please read the README.md before trying to enable this option and, if applied, ensure that you immediately upgrade
|
||||
## this chart with masquerade.enabled=false to avoid any unintentional consequences (e.g. failure to install the original
|
||||
## process that you meant to whitelist on the host)
|
||||
##
|
||||
## TLDR: Use at your own risk. Here be dragons...
|
||||
##
|
||||
masquerade:
|
||||
enabled: false
|
||||
# Why wmi_exporter?
|
||||
# wmi_exporter is the only default whitelisted process that may or may not be run on the host, since
|
||||
# it is only ever deployed if the Windows cluster is also using Prometheus-based Windows monitoring (e.g. Rancher Monitoring V1)
|
||||
# All of the other default whitelisted processes are required for the Kubernetes cluster to operate
|
||||
as: c:\\etc\wmi-exporter\wmi-exporter.exe
|
|
@ -12,9 +12,9 @@ entries:
|
|||
catalog.cattle.io/release-name: fleet
|
||||
apiVersion: v2
|
||||
appVersion: 0.3.5
|
||||
created: "2021-04-23T22:29:53.065772106Z"
|
||||
created: "2021-04-26T21:09:08.807447037Z"
|
||||
description: Fleet Manager - GitOps at Scale
|
||||
digest: 0901c4030d501fc936da001fa83e6f445513003e73080f27258614f816cdc5ca
|
||||
digest: 032377b1e3eb5db269be4159e69dcd0adeaec4ab33b3a6989c2be3f5adce080a
|
||||
icon: https://charts.rancher.io/assets/logos/fleet.svg
|
||||
name: fleet
|
||||
urls:
|
||||
|
@ -124,9 +124,9 @@ entries:
|
|||
catalog.cattle.io/release-name: fleet-agent
|
||||
apiVersion: v2
|
||||
appVersion: 0.3.5
|
||||
created: "2021-04-23T22:29:53.068234134Z"
|
||||
created: "2021-04-26T21:09:08.810954774Z"
|
||||
description: Fleet Manager Agent - GitOps at Scale
|
||||
digest: ae734792241f7968adecbd68832e5ad6c294a2c51ea2361fb536b828bdbec26f
|
||||
digest: 6af228ccc1139666883d8499331fc7a015ef2758ab08815fd8919afec82ff120
|
||||
icon: https://charts.rancher.io/assets/logos/fleet.svg
|
||||
name: fleet-agent
|
||||
urls:
|
||||
|
@ -221,9 +221,9 @@ entries:
|
|||
catalog.cattle.io/release-name: fleet-crd
|
||||
apiVersion: v2
|
||||
appVersion: 0.3.5
|
||||
created: "2021-04-23T22:29:53.072748469Z"
|
||||
created: "2021-04-26T21:09:08.816614732Z"
|
||||
description: Fleet Manager CustomResourceDefinitions
|
||||
digest: 39cf036aa7eb60ff8e96c0876c3d0f1a5bae91a0884c2d4c1527a14af844a1d2
|
||||
digest: 8047046f3b428914c526ffdcbf311d0d6f84382a640460005d88bd7f0c7e01c4
|
||||
icon: https://charts.rancher.io/assets/logos/fleet.svg
|
||||
name: fleet-crd
|
||||
urls:
|
||||
|
@ -534,7 +534,7 @@ entries:
|
|||
catalog.cattle.io/release-name: rancher-alerting-drivers
|
||||
apiVersion: v2
|
||||
appVersion: 1.16.0
|
||||
created: "2021-04-23T22:29:53.079628826Z"
|
||||
created: "2021-04-26T21:09:08.824955119Z"
|
||||
dependencies:
|
||||
- condition: prom2teams.enabled
|
||||
name: prom2teams
|
||||
|
@ -544,7 +544,7 @@ entries:
|
|||
repository: file://./charts/sachet
|
||||
description: The manager for third-party webhook receivers used in Prometheus
|
||||
Alertmanager
|
||||
digest: d1ba607cb58c3c78323288e7b54a4b7ff3d11275e70ddb728304eb2be29f22c4
|
||||
digest: 31d71db813b01272013780dfbb71e82ea8135edcf4ef62a7e10bd68fd3f27e9e
|
||||
keywords:
|
||||
- monitoring
|
||||
- alertmanger
|
||||
|
@ -566,10 +566,10 @@ entries:
|
|||
catalog.cattle.io/ui-component: rancher-backup
|
||||
apiVersion: v2
|
||||
appVersion: 1.0.4
|
||||
created: "2021-04-23T22:29:53.082070853Z"
|
||||
created: "2021-04-26T21:09:08.827803748Z"
|
||||
description: Provides ability to back up and restore the Rancher application running
|
||||
on any Kubernetes cluster
|
||||
digest: 86182359f261d6da5d3a6cab06113a8f57ef6ea6e2645abc950c3975a1f2c77f
|
||||
digest: 2008163de468553bc31973d96f6184f9a2373e5c3b1bda67a02867a6709e6e45
|
||||
icon: https://charts.rancher.io/assets/logos/backup-restore.svg
|
||||
keywords:
|
||||
- applications
|
||||
|
@ -681,9 +681,9 @@ entries:
|
|||
catalog.cattle.io/release-name: rancher-backup-crd
|
||||
apiVersion: v2
|
||||
appVersion: 1.0.4
|
||||
created: "2021-04-23T22:29:53.083586432Z"
|
||||
created: "2021-04-26T21:09:08.828804758Z"
|
||||
description: Installs the CRDs for rancher-backup.
|
||||
digest: c7e2b2c2846fda431f4bccb49983ca198b017a33c6654d94052935f2017e46d9
|
||||
digest: e86d39e1f4d347aa2ce136cbd3a57b17c378c1bce176f5acf9e96c6b6572704b
|
||||
name: rancher-backup-crd
|
||||
type: application
|
||||
urls:
|
||||
|
@ -757,10 +757,10 @@ entries:
|
|||
catalog.cattle.io/ui-component: rancher-cis-benchmark
|
||||
apiVersion: v1
|
||||
appVersion: v1.0.4
|
||||
created: "2021-04-23T22:29:53.08796876Z"
|
||||
created: "2021-04-26T21:09:08.833066303Z"
|
||||
description: The cis-operator enables running CIS benchmark security scans on
|
||||
a kubernetes cluster
|
||||
digest: 33c252f7c74cfb789b2bc0f1ae0458a935358f4a05a5878a650343c5a58e3dbb
|
||||
digest: 85057d67e0ea90581674768f45cfd3198b9a64a971b6bc2a5d8f3cbd4a02578e
|
||||
icon: https://charts.rancher.io/assets/logos/cis-kube-bench.svg
|
||||
keywords:
|
||||
- security
|
||||
|
@ -779,10 +779,10 @@ entries:
|
|||
catalog.cattle.io/ui-component: rancher-cis-benchmark
|
||||
apiVersion: v1
|
||||
appVersion: v1.0.4
|
||||
created: "2021-04-23T22:29:53.087271824Z"
|
||||
created: "2021-04-26T21:09:08.831972591Z"
|
||||
description: The cis-operator enables running CIS benchmark security scans on
|
||||
a kubernetes cluster
|
||||
digest: cca9af836b2c8194b4f702dd6d453699efee5072abc03fda0400128e32fc1c4a
|
||||
digest: bbfe36e02650c172bce5877240fac9b88a53c3802353fbed7a38b9449e0b492f
|
||||
icon: https://charts.rancher.io/assets/logos/cis-kube-bench.svg
|
||||
keywords:
|
||||
- security
|
||||
|
@ -884,9 +884,9 @@ entries:
|
|||
catalog.cattle.io/namespace: cis-operator-system
|
||||
catalog.cattle.io/release-name: rancher-cis-benchmark-crd
|
||||
apiVersion: v1
|
||||
created: "2021-04-23T22:29:53.089196824Z"
|
||||
created: "2021-04-26T21:09:08.835109224Z"
|
||||
description: Installs the CRDs for rancher-cis-benchmark.
|
||||
digest: 9d5aa6021aa70c51b3959fb6ecc246576b8edb4c6b711b834e6bd58b4d3b4d48
|
||||
digest: d356ce0d0ecd94960db87ef4f8ddf0b5bd187f2b3d4e768eb798c66088249631
|
||||
name: rancher-cis-benchmark-crd
|
||||
type: application
|
||||
urls:
|
||||
|
@ -898,9 +898,9 @@ entries:
|
|||
catalog.cattle.io/namespace: cis-operator-system
|
||||
catalog.cattle.io/release-name: rancher-cis-benchmark-crd
|
||||
apiVersion: v1
|
||||
created: "2021-04-23T22:29:53.088982413Z"
|
||||
created: "2021-04-26T21:09:08.834351116Z"
|
||||
description: Installs the CRDs for rancher-cis-benchmark.
|
||||
digest: f3963b8ed438a93c69fc15a7bbddbbe6118424462848d5a2b1bf3aa0f2e02173
|
||||
digest: 173464a203a988984c4bdb83f3301267ed6640a872972ef6e6507980c2a105c7
|
||||
name: rancher-cis-benchmark-crd
|
||||
type: application
|
||||
urls:
|
||||
|
@ -1059,10 +1059,10 @@ entries:
|
|||
catalog.cattle.io/ui-component: gatekeeper
|
||||
apiVersion: v1
|
||||
appVersion: v3.3.0
|
||||
created: "2021-04-23T22:29:53.095128532Z"
|
||||
created: "2021-04-26T21:09:08.841617391Z"
|
||||
description: Modifies Open Policy Agent's upstream gatekeeper chart that provides
|
||||
policy-based control for cloud native environments
|
||||
digest: 8dfa9a4cf69981095487027ce4ce96cab989bdb5aab1a65f66d36e4814a0ee6e
|
||||
digest: 3fa906b9e53b1813a33125a1e9886edca374d843e156bcc54843bd10a91f971c
|
||||
home: https://github.com/open-policy-agent/gatekeeper
|
||||
icon: https://charts.rancher.io/assets/logos/gatekeeper.svg
|
||||
keywords:
|
||||
|
@ -1185,9 +1185,9 @@ entries:
|
|||
catalog.cattle.io/namespace: cattle-gatekeeper-system
|
||||
catalog.cattle.io/release-name: rancher-gatekeeper-crd
|
||||
apiVersion: v1
|
||||
created: "2021-04-23T22:29:53.098151789Z"
|
||||
created: "2021-04-26T21:09:08.843039106Z"
|
||||
description: Installs the CRDs for rancher-gatekeeper.
|
||||
digest: 26b354c0f0c3f305fcc55c4acdcb0f7277750c23e2b4f97a795f0b217b867eed
|
||||
digest: af2c9d417e05803e14d83b54f681bd8daa27882637a8f119651492d8e7a0c2f0
|
||||
name: rancher-gatekeeper-crd
|
||||
type: application
|
||||
urls:
|
||||
|
@ -1261,9 +1261,9 @@ entries:
|
|||
catalog.rancher.io/release-name: rancher-grafana
|
||||
apiVersion: v2
|
||||
appVersion: 7.4.5
|
||||
created: "2021-04-23T22:29:53.101641171Z"
|
||||
created: "2021-04-26T21:09:08.845116827Z"
|
||||
description: The leading tool for querying and visualizing time series and metrics.
|
||||
digest: 06f1b778b04d1c4e1296a8ba59c9cd70b90ec38d1da46e01d9300f0dc95030cf
|
||||
digest: 426227064a81cd67f14b5721d6ddb10368893292301a010858ecdde83f14b1ca
|
||||
home: https://grafana.net
|
||||
icon: https://raw.githubusercontent.com/grafana/grafana/master/public/img/logo_transparent_400x.png
|
||||
kubeVersion: ^1.8.0-0
|
||||
|
@ -1299,7 +1299,7 @@ entries:
|
|||
catalog.cattle.io/ui-component: istio
|
||||
apiVersion: v1
|
||||
appVersion: 1.9.3
|
||||
created: "2021-04-23T22:29:53.120774965Z"
|
||||
created: "2021-04-26T21:09:08.866105045Z"
|
||||
dependencies:
|
||||
- condition: kiali.enabled
|
||||
name: kiali
|
||||
|
@ -1309,7 +1309,7 @@ entries:
|
|||
repository: file://./charts/tracing
|
||||
description: A basic Istio setup that installs with the istioctl. Refer to https://istio.io/latest/
|
||||
for details.
|
||||
digest: 6b4c63474cdc4a42c2258e2b47f4b7caeb25583adb69f40ae26ae75c5bcd9d7e
|
||||
digest: 2e39d7cb14812695b03ce1940672ebe4866f1e1ba53c6b2a00d13ac686323de9
|
||||
icon: https://charts.rancher.io/assets/logos/istio.svg
|
||||
keywords:
|
||||
- networking
|
||||
|
@ -1331,7 +1331,7 @@ entries:
|
|||
catalog.cattle.io/ui-component: istio
|
||||
apiVersion: v1
|
||||
appVersion: 1.9.2
|
||||
created: "2021-04-23T22:29:53.118678156Z"
|
||||
created: "2021-04-26T21:09:08.862429107Z"
|
||||
dependencies:
|
||||
- condition: kiali.enabled
|
||||
name: kiali
|
||||
|
@ -1341,7 +1341,7 @@ entries:
|
|||
repository: file://./charts/tracing
|
||||
description: A basic Istio setup that installs with the istioctl. Refer to https://istio.io/latest/
|
||||
for details.
|
||||
digest: 9e28d6789ce413af9890062952857bdc7070249eefef622c55221ec952cc505b
|
||||
digest: 92ff097bf8bfef928ae44317bbd7be7c917ccd04cbd8713d6ca33be73140055f
|
||||
icon: https://charts.rancher.io/assets/logos/istio.svg
|
||||
keywords:
|
||||
- networking
|
||||
|
@ -1363,7 +1363,7 @@ entries:
|
|||
catalog.cattle.io/ui-component: istio
|
||||
apiVersion: v1
|
||||
appVersion: 1.8.5
|
||||
created: "2021-04-23T22:29:53.116185227Z"
|
||||
created: "2021-04-26T21:09:08.860318385Z"
|
||||
dependencies:
|
||||
- condition: kiali.enabled
|
||||
name: kiali
|
||||
|
@ -1373,7 +1373,7 @@ entries:
|
|||
repository: file://./charts/tracing
|
||||
description: A basic Istio setup that installs with the istioctl. Refer to https://istio.io/latest/
|
||||
for details.
|
||||
digest: 3a79bded2fbd0fc107006d06a6fba4e067c9e8b1d079a45ca7e35b0d3d065dee
|
||||
digest: 8f7b73095bee971444b2a3fba4556658cbc69a88f09dd14ae611c0a187ab230f
|
||||
icon: https://charts.rancher.io/assets/logos/istio.svg
|
||||
keywords:
|
||||
- networking
|
||||
|
@ -1395,7 +1395,7 @@ entries:
|
|||
catalog.cattle.io/ui-component: istio
|
||||
apiVersion: v1
|
||||
appVersion: 1.8.4
|
||||
created: "2021-04-23T22:29:53.113783302Z"
|
||||
created: "2021-04-26T21:09:08.858047461Z"
|
||||
dependencies:
|
||||
- condition: kiali.enabled
|
||||
name: kiali
|
||||
|
@ -1405,7 +1405,7 @@ entries:
|
|||
repository: file://./charts/tracing
|
||||
description: A basic Istio setup that installs with the istioctl. Refer to https://istio.io/latest/
|
||||
for details.
|
||||
digest: 740ffdb2e317e8943febaecfc92e4088aa6903abbffd02da86760342404cc164
|
||||
digest: 7f3cd5cab0e07507ffaefd91c3ddfefc13a2e2674eb9b49b76057b54168b1797
|
||||
icon: https://charts.rancher.io/assets/logos/istio.svg
|
||||
keywords:
|
||||
- networking
|
||||
|
@ -1427,7 +1427,7 @@ entries:
|
|||
catalog.cattle.io/ui-component: istio
|
||||
apiVersion: v1
|
||||
appVersion: 1.8.3
|
||||
created: "2021-04-23T22:29:53.111085262Z"
|
||||
created: "2021-04-26T21:09:08.855930039Z"
|
||||
dependencies:
|
||||
- condition: kiali.enabled
|
||||
name: kiali
|
||||
|
@ -1437,7 +1437,7 @@ entries:
|
|||
repository: file://./charts/tracing
|
||||
description: A basic Istio setup that installs with the istioctl. Refer to https://istio.io/latest/
|
||||
for details.
|
||||
digest: b854ecd7610f74792ec844ac86c8c76f79b8145dcbba359a4224aed82f1409ed
|
||||
digest: b0c74a7283dbff6f4a2c4dc475b953e26fa65697087c12466dc488e9c30d731a
|
||||
icon: https://charts.rancher.io/assets/logos/istio.svg
|
||||
keywords:
|
||||
- networking
|
||||
|
@ -1581,11 +1581,11 @@ entries:
|
|||
catalog.rancher.io/release-name: rancher-kiali-server
|
||||
apiVersion: v2
|
||||
appVersion: v1.32.0
|
||||
created: "2021-04-23T22:29:53.12625105Z"
|
||||
created: "2021-04-26T21:09:08.871644202Z"
|
||||
description: Kiali is an open source project for service mesh observability, refer
|
||||
to https://www.kiali.io for details. This is installed as sub-chart with customized
|
||||
values in Rancher's Istio.
|
||||
digest: 647b0013646599c90f1283f092ad9103441aea3dd4146b03c952ec329f84fa14
|
||||
digest: 61a2b9ab2de7620b0caee47ee86181180ed6f5e26f90477913eaa76318ce8cc7
|
||||
home: https://github.com/kiali/kiali
|
||||
icon: https://raw.githubusercontent.com/kiali/kiali.io/master/themes/kiali/static/img/kiali_logo_masthead.png
|
||||
keywords:
|
||||
|
@ -1616,11 +1616,11 @@ entries:
|
|||
catalog.rancher.io/release-name: rancher-kiali-server
|
||||
apiVersion: v2
|
||||
appVersion: v1.29.0
|
||||
created: "2021-04-23T22:29:53.125269499Z"
|
||||
created: "2021-04-26T21:09:08.870693292Z"
|
||||
description: Kiali is an open source project for service mesh observability, refer
|
||||
to https://www.kiali.io for details. This is installed as sub-chart with customized
|
||||
values in Rancher's Istio.
|
||||
digest: b2b4393b39a5a57b1201c83f7d3f6a736e654f839a85e494ff90fcbc741f0c19
|
||||
digest: 5e17227b58d3c63adeb44e37ab674c4e98e3940ded80cdc2f4851fb49d252311
|
||||
home: https://github.com/kiali/kiali
|
||||
icon: https://raw.githubusercontent.com/kiali/kiali.io/master/themes/kiali/static/img/kiali_logo_masthead.png
|
||||
keywords:
|
||||
|
@ -1785,9 +1785,9 @@ entries:
|
|||
- annotations:
|
||||
catalog.cattle.io/hidden: "true"
|
||||
apiVersion: v2
|
||||
created: "2021-04-23T22:29:53.127527616Z"
|
||||
created: "2021-04-26T21:09:08.87239861Z"
|
||||
description: Installs the CRDs for rancher-kiali-server.
|
||||
digest: cc3ebffbe46f961e561aaeb66697a8d1ff80a1915f2027592666e1282904fc44
|
||||
digest: ebe42b28026ba8656ccbbeb9cc16093d7f8d8ac0cfe8d4d754fe5616269b33da
|
||||
name: rancher-kiali-server-crd
|
||||
type: application
|
||||
urls:
|
||||
|
@ -1796,9 +1796,9 @@ entries:
|
|||
- annotations:
|
||||
catalog.cattle.io/hidden: "true"
|
||||
apiVersion: v2
|
||||
created: "2021-04-23T22:29:53.127237601Z"
|
||||
created: "2021-04-26T21:09:08.872282809Z"
|
||||
description: Installs the CRDs for rancher-kiali-server.
|
||||
digest: 0859eb062b26a52debb0380ebf3f9583b422313e80ec9ed10eaedb6e63ff43d5
|
||||
digest: 56668663db5b384916204897a02862bc1287e80ecf5a08343bf0a1b202427720
|
||||
name: rancher-kiali-server-crd
|
||||
type: application
|
||||
urls:
|
||||
|
@ -1857,9 +1857,9 @@ entries:
|
|||
catalog.rancher.io/release-name: rancher-kube-state-metrics
|
||||
apiVersion: v1
|
||||
appVersion: 1.9.8
|
||||
created: "2021-04-23T22:29:53.129008493Z"
|
||||
created: "2021-04-26T21:09:08.87333832Z"
|
||||
description: Install kube-state-metrics to generate and expose cluster-level metrics
|
||||
digest: a21588f3f38199b24460c74c6c5b4348e47e1c3e58c6e6dacb22fce3932ae0cb
|
||||
digest: fc0ffec21630dda60fbce68c618cd2a6fa1ac7fd751e5b446330e74a1b59beeb
|
||||
home: https://github.com/kubernetes/kube-state-metrics/
|
||||
keywords:
|
||||
- metric
|
||||
|
@ -1888,10 +1888,10 @@ entries:
|
|||
catalog.cattle.io/ui-component: logging
|
||||
apiVersion: v1
|
||||
appVersion: 3.9.4
|
||||
created: "2021-04-23T22:29:53.135382025Z"
|
||||
created: "2021-04-26T21:09:08.881356703Z"
|
||||
description: Collects and filter logs using highly configurable CRDs. Powered
|
||||
by Banzai Cloud Logging Operator.
|
||||
digest: 2b18db3a548ad8609b1c24b34268311428b92ae5d8af5bbb1071ac976926b80e
|
||||
digest: e0b45df1760f114d3450f76ed23ea41c9ad73aa12df212a538bdfb0e26559283
|
||||
icon: https://charts.rancher.io/assets/logos/logging.svg
|
||||
keywords:
|
||||
- logging
|
||||
|
@ -1912,10 +1912,10 @@ entries:
|
|||
catalog.cattle.io/ui-component: logging
|
||||
apiVersion: v1
|
||||
appVersion: 3.9.0
|
||||
created: "2021-04-23T22:29:53.134367172Z"
|
||||
created: "2021-04-26T21:09:08.880291892Z"
|
||||
description: Collects and filter logs using highly configurable CRDs. Powered
|
||||
by Banzai Cloud Logging Operator.
|
||||
digest: b8e55207ee02929435690cf3ca947d268c1f3d22b494549e12acec244cc620b4
|
||||
digest: e8df39243078513b13820974bf65449a77200f70e6b7c0a717fd420170dc0949
|
||||
icon: https://charts.rancher.io/assets/logos/logging.svg
|
||||
keywords:
|
||||
- logging
|
||||
|
@ -1936,10 +1936,10 @@ entries:
|
|||
catalog.cattle.io/ui-component: logging
|
||||
apiVersion: v1
|
||||
appVersion: 3.9.0
|
||||
created: "2021-04-23T22:29:53.133502427Z"
|
||||
created: "2021-04-26T21:09:08.878757076Z"
|
||||
description: Collects and filter logs using highly configurable CRDs. Powered
|
||||
by Banzai Cloud Logging Operator.
|
||||
digest: 5e2fa52f5220e99d5370dfc9b91ad026661a4601c4b615b2e2f5d1f2d90f90a6
|
||||
digest: 6958738a77314c9cfa1315bed8a214a6ad09e7255a978e06824b46755725348c
|
||||
icon: https://charts.rancher.io/assets/logos/logging.svg
|
||||
keywords:
|
||||
- logging
|
||||
|
@ -2051,9 +2051,9 @@ entries:
|
|||
catalog.cattle.io/namespace: cattle-logging-system
|
||||
catalog.cattle.io/release-name: rancher-logging-crd
|
||||
apiVersion: v1
|
||||
created: "2021-04-23T22:29:53.146496703Z"
|
||||
created: "2021-04-26T21:09:08.891214605Z"
|
||||
description: Installs the CRDs for rancher-logging.
|
||||
digest: e77e429b9b1e195faa51e6eaff68143711338b2cfdd43f2e833b061456edf368
|
||||
digest: 612916bf1ed503fb3a737a1e60307c6875a7595b6cee41b00ba390a49e5e30ba
|
||||
name: rancher-logging-crd
|
||||
type: application
|
||||
urls:
|
||||
|
@ -2065,9 +2065,9 @@ entries:
|
|||
catalog.cattle.io/namespace: cattle-logging-system
|
||||
catalog.cattle.io/release-name: rancher-logging-crd
|
||||
apiVersion: v1
|
||||
created: "2021-04-23T22:29:53.14489992Z"
|
||||
created: "2021-04-26T21:09:08.889264885Z"
|
||||
description: Installs the CRDs for rancher-logging.
|
||||
digest: fec51fb34426c9bf5d17bc93c1bfcaa193eec57697f1219a20f4710cf6e47774
|
||||
digest: acbafc3d11f54902dace3f4596af31742cca89e4536d649ec499f00f433d6881
|
||||
name: rancher-logging-crd
|
||||
type: application
|
||||
urls:
|
||||
|
@ -2079,9 +2079,9 @@ entries:
|
|||
catalog.cattle.io/namespace: cattle-logging-system
|
||||
catalog.cattle.io/release-name: rancher-logging-crd
|
||||
apiVersion: v1
|
||||
created: "2021-04-23T22:29:53.143631454Z"
|
||||
created: "2021-04-26T21:09:08.888069572Z"
|
||||
description: Installs the CRDs for rancher-logging.
|
||||
digest: dc126123aae1a927000b186c8f4debafc256a14300ea167888664b6fdbfa7e67
|
||||
digest: c21a63b7a7ad86362d07835a4f1db934a725ceae42928bb81de4398e420e7474
|
||||
name: rancher-logging-crd
|
||||
type: application
|
||||
urls:
|
||||
|
@ -2162,7 +2162,7 @@ entries:
|
|||
catalog.cattle.io/ui-component: monitoring
|
||||
apiVersion: v2
|
||||
appVersion: 0.46.0
|
||||
created: "2021-04-23T22:29:53.170460548Z"
|
||||
created: "2021-04-26T21:09:08.91679077Z"
|
||||
dependencies:
|
||||
- condition: grafana.enabled
|
||||
name: grafana
|
||||
|
@ -2221,7 +2221,7 @@ entries:
|
|||
description: Collects several related Helm charts, Grafana dashboards, and Prometheus
|
||||
rules combined with documentation and scripts to provide easy to operate end-to-end
|
||||
Kubernetes cluster monitoring with Prometheus using the Prometheus Operator.
|
||||
digest: 98d099e8773ee312bc5e645db08a2b846c0d6a164335f6a28875cea6bedc0371
|
||||
digest: fbcf79db1332920f09034f2a8dac5d4f9317f4e70fc137ad29bcee3a40e0520b
|
||||
home: https://github.com/prometheus-operator/kube-prometheus
|
||||
icon: https://raw.githubusercontent.com/prometheus/prometheus.github.io/master/assets/prometheus_logo-cb55bb5c346.png
|
||||
keywords:
|
||||
|
@ -2269,7 +2269,7 @@ entries:
|
|||
catalog.cattle.io/ui-component: monitoring
|
||||
apiVersion: v1
|
||||
appVersion: 0.38.1
|
||||
created: "2021-04-23T22:29:53.264899058Z"
|
||||
created: "2021-04-26T21:09:09.014966886Z"
|
||||
dependencies:
|
||||
- condition: grafana.enabled
|
||||
name: grafana
|
||||
|
@ -2328,7 +2328,7 @@ entries:
|
|||
description: Collects several related Helm charts, Grafana dashboards, and Prometheus
|
||||
rules combined with documentation and scripts to provide easy to operate end-to-end
|
||||
Kubernetes cluster monitoring with Prometheus using the Prometheus Operator.
|
||||
digest: 0ca3cfc978539f83aa36dd2cbc4c2bec95e956c0795f46b07ea405cf61866d2f
|
||||
digest: 8eaa786ec3d1243f1ab3b35904a0a5595babf1ab36299cfb3ec5f1619be1856b
|
||||
home: https://github.com/prometheus-operator/kube-prometheus
|
||||
icon: https://raw.githubusercontent.com/prometheus/prometheus.github.io/master/assets/prometheus_logo-cb55bb5c346.png
|
||||
keywords:
|
||||
|
@ -2862,9 +2862,9 @@ entries:
|
|||
catalog.cattle.io/namespace: cattle-monitoring-system
|
||||
catalog.cattle.io/release-name: rancher-monitoring-crd
|
||||
apiVersion: v1
|
||||
created: "2021-04-23T22:29:53.268940268Z"
|
||||
created: "2021-04-26T21:09:09.019726636Z"
|
||||
description: Installs the CRDs for rancher-monitoring.
|
||||
digest: 190246be621f9df5fe71db60ea87867014b54f342f60e3fe1d72e9c560f494a6
|
||||
digest: 68fba729b2d8066a761eaec0bc2db04ea3dbd3dc8ede9859804385b1faa0bfcd
|
||||
name: rancher-monitoring-crd
|
||||
type: application
|
||||
urls:
|
||||
|
@ -2876,9 +2876,9 @@ entries:
|
|||
catalog.cattle.io/namespace: cattle-monitoring-system
|
||||
catalog.cattle.io/release-name: rancher-monitoring-crd
|
||||
apiVersion: v1
|
||||
created: "2021-04-23T22:29:53.291493541Z"
|
||||
created: "2021-04-26T21:09:09.041747364Z"
|
||||
description: Installs the CRDs for rancher-monitoring.
|
||||
digest: 8936b06a5cdbbc0a69961611602189d2756159bea1437014253472b4c8007378
|
||||
digest: df05c941a342ce1424c45f5b965989307cf5c3ea361a9a57b578eecf42e975b7
|
||||
name: rancher-monitoring-crd
|
||||
type: application
|
||||
urls:
|
||||
|
@ -2949,9 +2949,9 @@ entries:
|
|||
catalog.rancher.io/release-name: rancher-node-exporter
|
||||
apiVersion: v1
|
||||
appVersion: 1.1.2
|
||||
created: "2021-04-23T22:29:53.292230379Z"
|
||||
created: "2021-04-26T21:09:09.042507272Z"
|
||||
description: A Helm chart for prometheus node-exporter
|
||||
digest: f1c61d0e3c486ca5fe487e89360ac21cb57c707d026175bf459c439315a3e89c
|
||||
digest: 83e6effdd107b4c9cf5b1434d7e30a80c83f1a45b6b7a84729119ffde777b941
|
||||
home: https://github.com/prometheus/node_exporter/
|
||||
keywords:
|
||||
- node-exporter
|
||||
|
@ -2980,9 +2980,9 @@ entries:
|
|||
catalog.cattle.io/release-name: rancher-operator
|
||||
apiVersion: v2
|
||||
appVersion: 0.1.4
|
||||
created: "2021-04-23T22:29:53.293349737Z"
|
||||
created: "2021-04-26T21:09:09.043721984Z"
|
||||
description: Control Rancher using GitOps
|
||||
digest: 4bce3fd45f9409834b2aab09d03636682d934461e02f3326629a74c93d2d0477
|
||||
digest: 93109a8e18809b5889261e5590977b8aaae5e066a6c85002dd95225341bce871
|
||||
name: rancher-operator
|
||||
urls:
|
||||
- assets/rancher-operator/rancher-operator-0.1.400.tgz
|
||||
|
@ -3068,9 +3068,9 @@ entries:
|
|||
catalog.cattle.io/release-name: rancher-operator-crd
|
||||
apiVersion: v2
|
||||
appVersion: 0.1.4
|
||||
created: "2021-04-23T22:29:53.29589907Z"
|
||||
created: "2021-04-26T21:09:09.045733205Z"
|
||||
description: Rancher Operator CustomResourceDefinitions
|
||||
digest: 78bc6f31b6a154ad71f0cd9d643431237d6dc96cad3db78863f3a61d1eb48865
|
||||
digest: 35dda4b2b06a63ff88bbc79eeac007c6dfb6b4bac69ba280ff87584df589ab15
|
||||
name: rancher-operator-crd
|
||||
urls:
|
||||
- assets/rancher-operator-crd/rancher-operator-crd-0.1.400.tgz
|
||||
|
@ -3141,9 +3141,9 @@ entries:
|
|||
catalog.cattle.io/release-name: rancher-prom2teams
|
||||
apiVersion: v1
|
||||
appVersion: 3.2.1
|
||||
created: "2021-04-23T22:29:53.296760315Z"
|
||||
created: "2021-04-26T21:09:09.04616931Z"
|
||||
description: A Helm chart for Prom2Teams based on the upstream https://github.com/idealista/prom2teams
|
||||
digest: 13fc293f16596c12726d8da19cad9d1e347a2342001e9d0543c3a92c9acc0295
|
||||
digest: d076efa3e5d6fb2bc88d935265ff22b565f10c233d7767f5225038dbbfdf0235
|
||||
name: rancher-prom2teams
|
||||
urls:
|
||||
- assets/rancher-prom2teams/rancher-prom2teams-0.2.000.tgz
|
||||
|
@ -3157,9 +3157,9 @@ entries:
|
|||
catalog.rancher.io/release-name: rancher-prometheus-adapter
|
||||
apiVersion: v1
|
||||
appVersion: v0.8.3
|
||||
created: "2021-04-23T22:29:53.297647761Z"
|
||||
created: "2021-04-26T21:09:09.046959818Z"
|
||||
description: A Helm chart for k8s prometheus adapter
|
||||
digest: 0d2b67953e02149217390040cf62010d39ce9569232a318564f68374c108cf62
|
||||
digest: 543ab69f8d58de6c3625db835ff21f0d24d35919b08cba9de7f817b3a530b6af
|
||||
home: https://github.com/DirectXMan12/k8s-prometheus-adapter
|
||||
keywords:
|
||||
- hpa
|
||||
|
@ -3188,10 +3188,10 @@ entries:
|
|||
catalog.rancher.io/release-name: rancher-pushprox
|
||||
apiVersion: v1
|
||||
appVersion: 0.1.0
|
||||
created: "2021-04-23T22:29:53.300963133Z"
|
||||
created: "2021-04-26T21:09:09.050012449Z"
|
||||
description: Sets up a deployment of the PushProx proxy and a DaemonSet of PushProx
|
||||
clients.
|
||||
digest: 9e988fdb7244447762a9a89881b72359ab3c31383d46c26323634e6d966b1f48
|
||||
digest: 3e42eb412c83b3822c3f0c52e68d65a5fe82d61279902231a8f9ade9c8e5d6be
|
||||
name: rancher-pushprox
|
||||
type: application
|
||||
urls:
|
||||
|
@ -3271,9 +3271,9 @@ entries:
|
|||
catalog.cattle.io/release-name: rancher-sachet
|
||||
apiVersion: v2
|
||||
appVersion: 0.2.3
|
||||
created: "2021-04-23T22:29:53.301457059Z"
|
||||
created: "2021-04-26T21:09:09.050416054Z"
|
||||
description: A Helm chart for Sachet based on the upstream https://github.com/messagebird/sachet
|
||||
digest: 367523674af71285bc29aa32fa0218a48ffdb0ca54ead1aae2497b38536a5bb1
|
||||
digest: 3b26cbf371989b052fbc85c30ad1ce049b53fcc134859329311385ded308f592
|
||||
name: rancher-sachet
|
||||
type: application
|
||||
urls:
|
||||
|
@ -3288,11 +3288,11 @@ entries:
|
|||
catalog.rancher.io/release-name: rancher-tracing
|
||||
apiVersion: v1
|
||||
appVersion: 1.20.0
|
||||
created: "2021-04-23T22:29:53.302692923Z"
|
||||
created: "2021-04-26T21:09:09.052119571Z"
|
||||
description: A quick start Jaeger Tracing installation using the all-in-one demo.
|
||||
This is not production qualified. Refer to https://www.jaegertracing.io/ for
|
||||
details.
|
||||
digest: 95c78776b1bd279af3754d292e275db8c549acc03f99b3020b79893271e36bc4
|
||||
digest: fe3fcda4c85d8a2f8e833a7c6c1b8617639b5c45720baf643ecf146c46ee7de5
|
||||
name: rancher-tracing
|
||||
urls:
|
||||
- assets/rancher-tracing/rancher-tracing-1.20.100.tgz
|
||||
|
@ -3388,9 +3388,9 @@ entries:
|
|||
catalog.cattle.io/release-name: rancher-webhook
|
||||
apiVersion: v2
|
||||
appVersion: 0.1.0
|
||||
created: "2021-04-23T22:29:53.304975542Z"
|
||||
created: "2021-04-26T21:09:09.055460106Z"
|
||||
description: ValidatingAdmissionWebhook for Rancher types
|
||||
digest: a59f0cc0490380469d39272a8ac5451e814d009013227659124c4daa977ecefc
|
||||
digest: 5d3591cc3a6921b7b4f31dfbc7beaac8e2e871f67698e0e8556a3fe0a9b0f9a5
|
||||
name: rancher-webhook
|
||||
urls:
|
||||
- assets/rancher-webhook/rancher-webhook-0.1.000.tgz
|
||||
|
@ -3464,9 +3464,9 @@ entries:
|
|||
catalog.rancher.io/release-name: rancher-windows-exporter
|
||||
apiVersion: v1
|
||||
appVersion: 0.0.4
|
||||
created: "2021-04-23T22:29:53.305415965Z"
|
||||
created: "2021-04-26T21:09:09.055991811Z"
|
||||
description: Sets up monitoring metrics from Windows nodes via Prometheus windows-exporter
|
||||
digest: 442f58b81bcd9bb384fd9e33722dd42cafe0973eb6d3655dd0634ee6fb469b84
|
||||
digest: b0bcbb1c7a7b09f275b8c54ece4325d999a84476a8cc7d46d285fad9f0a65b75
|
||||
maintainers:
|
||||
- email: arvind.iyengar@rancher.com
|
||||
name: aiyengar2
|
||||
|
@ -3483,10 +3483,10 @@ entries:
|
|||
catalog.cattle.io/release-name: rancher-wins-upgrader
|
||||
apiVersion: v2
|
||||
appVersion: 0.1.0
|
||||
created: "2021-04-23T22:29:53.305886089Z"
|
||||
created: "2021-04-26T21:09:09.056472016Z"
|
||||
description: Manages upgrading the wins server version and configuration across
|
||||
all of your Windows nodes
|
||||
digest: feb7e51297cfd2928b3ef49c2627c4896ff46405911d98eab7c1fef027890891
|
||||
digest: 829216aac0ef63383feda7cd964bb3d5abfbd57898bed54cacbbe787b493fbed
|
||||
maintainers:
|
||||
- email: arvind.iyengar@suse.com
|
||||
name: aiyengar2
|
||||
|
|
Loading…
Reference in New Issue