commit
4e3a45cc19
Binary file not shown.
Binary file not shown.
Binary file not shown.
Binary file not shown.
Binary file not shown.
Binary file not shown.
Binary file not shown.
Binary file not shown.
Binary file not shown.
Binary file not shown.
Binary file not shown.
Binary file not shown.
Binary file not shown.
Binary file not shown.
Binary file not shown.
|
@ -1,6 +1,8 @@
|
|||
annotations:
|
||||
artifacthub.io/changes: |
|
||||
- "[Changed]: Update redis-ha to v4.22.4"
|
||||
- "[Docs]: Added sample how to provide K8s credentials plugin"
|
||||
- "[Docs]: Added sample how to provide Argo config management plugin"
|
||||
- "[Docs]: Removed samples that injects tools into incorrect controllers"
|
||||
catalog.cattle.io/certified: partner
|
||||
catalog.cattle.io/display-name: Argo CD
|
||||
catalog.cattle.io/kube-version: '>=1.22.0-0'
|
||||
|
@ -28,4 +30,4 @@ name: argo-cd
|
|||
sources:
|
||||
- https://github.com/argoproj/argo-helm/tree/main/charts/argo-cd
|
||||
- https://github.com/argoproj/argo-cd
|
||||
version: 5.16.10
|
||||
version: 5.16.14
|
||||
|
|
|
@ -359,8 +359,6 @@ NAME: my-release
|
|||
| apiVersionOverrides.autoscaling | string | `""` | String to override apiVersion of autoscaling rendered by this helm chart |
|
||||
| apiVersionOverrides.certmanager | string | `""` | String to override apiVersion of cert-manager resources rendered by this helm chart |
|
||||
| apiVersionOverrides.cloudgoogle | string | `""` | String to override apiVersion of GKE resources rendered by this helm chart |
|
||||
| apiVersionOverrides.ingress | string | `""` | String to override apiVersion of ingresses rendered by this helm chart |
|
||||
| apiVersionOverrides.pdb | string | `""` | String to override apiVersion of pod disruption budgets rendered by this helm chart |
|
||||
| crds.annotations | object | `{}` | Annotations to be added to all CRDs |
|
||||
| crds.install | bool | `true` | Install and upgrade CRDs |
|
||||
| crds.keep | bool | `true` | Keep CRDs on chart uninstall |
|
||||
|
@ -641,7 +639,7 @@ NAME: my-release
|
|||
| server.envFrom | list | `[]` (See [values.yaml]) | envFrom to pass to Argo CD server |
|
||||
| server.extensions.containerSecurityContext | object | See [values.yaml] | Server UI extensions container-level security context |
|
||||
| server.extensions.enabled | bool | `false` | Enable support for Argo UI extensions |
|
||||
| server.extensions.image.imagePullPolicy | string | `"IfNotPresent"` | Image pull policy for extensions |
|
||||
| server.extensions.image.imagePullPolicy | string | `""` (defaults to global.image.imagePullPolicy) | Image pull policy for extensions |
|
||||
| server.extensions.image.repository | string | `"ghcr.io/argoproj-labs/argocd-extensions"` | Repository to use for extensions image |
|
||||
| server.extensions.image.tag | string | `"v0.1.0"` | Tag to use for extensions image |
|
||||
| server.extensions.resources | object | `{}` | Resource limits and requests for the argocd-extensions container |
|
||||
|
|
|
@ -19,34 +19,6 @@ Return the appropriate apiVersion for autoscaling
|
|||
{{- end -}}
|
||||
{{- end -}}
|
||||
|
||||
{{/*
|
||||
Return the appropriate apiVersion for ingress
|
||||
*/}}
|
||||
{{- define "argo-cd.apiVersion.ingress" -}}
|
||||
{{- if .Values.apiVersionOverrides.ingress -}}
|
||||
{{- print .Values.apiVersionOverrides.ingress -}}
|
||||
{{- else if semverCompare "<1.14-0" (include "argo-cd.kubeVersion" .) -}}
|
||||
{{- print "extensions/v1beta1" -}}
|
||||
{{- else if semverCompare "<1.19-0" (include "argo-cd.kubeVersion" .) -}}
|
||||
{{- print "networking.k8s.io/v1beta1" -}}
|
||||
{{- else -}}
|
||||
{{- print "networking.k8s.io/v1" -}}
|
||||
{{- end -}}
|
||||
{{- end -}}
|
||||
|
||||
{{/*
|
||||
Return the appropriate apiVersion for pod disruption budget
|
||||
*/}}
|
||||
{{- define "argo-cd.apiVersion.pdb" -}}
|
||||
{{- if .Values.apiVersionOverrides.pdb -}}
|
||||
{{- print .Values.apiVersionOverrides.pdb -}}
|
||||
{{- else if semverCompare "<1.21-0" (include "argo-cd.kubeVersion" .) -}}
|
||||
{{- print "policy/v1beta1" -}}
|
||||
{{- else -}}
|
||||
{{- print "policy/v1" -}}
|
||||
{{- end -}}
|
||||
{{- end -}}
|
||||
|
||||
{{/*
|
||||
Return the appropriate apiVersion for cert-manager
|
||||
*/}}
|
||||
|
|
|
@ -1,5 +1,5 @@
|
|||
{{- if .Values.controller.pdb.enabled }}
|
||||
apiVersion: {{ include "argo-cd.apiVersion.pdb" . }}
|
||||
apiVersion: policy/v1
|
||||
kind: PodDisruptionBudget
|
||||
metadata:
|
||||
name: {{ include "argo-cd.controller.fullname" . }}
|
||||
|
|
|
@ -40,6 +40,10 @@ spec:
|
|||
{{- toYaml . | nindent 8 }}
|
||||
{{- end }}
|
||||
serviceAccountName: {{ include "argo-cd.applicationSetServiceAccountName" . }}
|
||||
{{- with .Values.global.hostAliases }}
|
||||
hostAliases:
|
||||
{{- toYaml . | nindent 6 }}
|
||||
{{- end }}
|
||||
containers:
|
||||
- name: {{ .Values.applicationSet.name }}
|
||||
image: {{ default .Values.global.image.repository .Values.applicationSet.image.repository }}:{{ default (include "argo-cd.defaultTag" .) .Values.applicationSet.image.tag }}
|
||||
|
|
|
@ -1,5 +1,5 @@
|
|||
{{- if and .Values.applicationSet.enabled .Values.applicationSet.pdb.enabled }}
|
||||
apiVersion: {{ include "argo-cd.apiVersion.pdb" . }}
|
||||
apiVersion: policy/v1
|
||||
kind: PodDisruptionBudget
|
||||
metadata:
|
||||
name: {{ include "argo-cd.applicationSet.fullname" . }}
|
||||
|
|
|
@ -1,89 +1,72 @@
|
|||
{{- if and .Values.applicationSet.enabled .Values.applicationSet.webhook.ingress.enabled -}}
|
||||
{{- $serviceName := include "argo-cd.applicationSet.fullname" . -}}
|
||||
{{- $servicePort := .Values.applicationSet.service.portName -}}
|
||||
{{- $paths := .Values.applicationSet.webhook.ingress.paths -}}
|
||||
{{- $extraPaths := .Values.applicationSet.webhook.ingress.extraPaths -}}
|
||||
{{- $pathType := .Values.applicationSet.webhook.ingress.pathType -}}
|
||||
apiVersion: {{ include "argo-cd.apiVersion.ingress" . }}
|
||||
apiVersion: networking.k8s.io/v1
|
||||
kind: Ingress
|
||||
metadata:
|
||||
{{- if .Values.applicationSet.webhook.ingress.annotations }}
|
||||
annotations:
|
||||
{{- range $key, $value := .Values.applicationSet.webhook.ingress.annotations }}
|
||||
{{ $key }}: {{ $value | quote }}
|
||||
{{- end }}
|
||||
{{- end }}
|
||||
name: {{ template "argo-cd.applicationSet.fullname" . }}
|
||||
name: {{ include "argo-cd.applicationSet.fullname" . }}
|
||||
labels:
|
||||
{{- include "argo-cd.labels" (dict "context" . "component" .Values.applicationSet.name "name" .Values.applicationSet.name) | nindent 4 }}
|
||||
{{- if .Values.applicationSet.webhook.ingress.labels }}
|
||||
{{- toYaml .Values.applicationSet.webhook.ingress.labels | nindent 4 }}
|
||||
{{- with .Values.applicationSet.webhook.ingress.labels }}
|
||||
{{- toYaml . | nindent 4 }}
|
||||
{{- end }}
|
||||
{{- with .Values.applicationSet.webhook.ingress.annotations }}
|
||||
annotations:
|
||||
{{- range $key, $value := . }}
|
||||
{{ $key }}: {{ $value | quote }}
|
||||
{{- end }}
|
||||
{{- end }}
|
||||
spec:
|
||||
{{- if eq (include "argo-cd.apiVersion.ingress" $) "networking.k8s.io/v1" }}
|
||||
{{- with .Values.applicationSet.webhook.ingress.ingressClassName }}
|
||||
ingressClassName: {{ . }}
|
||||
{{- end }}
|
||||
{{- end }}
|
||||
rules:
|
||||
{{- if .Values.applicationSet.webhook.ingress.hosts }}
|
||||
{{- range $host := .Values.applicationSet.webhook.ingress.hosts }}
|
||||
- host: {{ $host }}
|
||||
http:
|
||||
paths:
|
||||
{{- if $extraPaths }}
|
||||
{{- toYaml $extraPaths | nindent 10 }}
|
||||
{{- with $extraPaths }}
|
||||
{{- toYaml . | nindent 10 }}
|
||||
{{- end }}
|
||||
{{- range $p := $paths }}
|
||||
- path: {{ $p }}
|
||||
{{- if eq (include "argo-cd.apiVersion.ingress" $) "networking.k8s.io/v1" }}
|
||||
pathType: {{ $pathType }}
|
||||
{{- end }}
|
||||
backend:
|
||||
{{- if eq (include "argo-cd.apiVersion.ingress" $) "networking.k8s.io/v1" }}
|
||||
service:
|
||||
name: {{ $serviceName }}
|
||||
name: {{ include "argo-cd.applicationSet.fullname" $ }}
|
||||
port:
|
||||
{{- if kindIs "float64" $servicePort }}
|
||||
number: {{ $servicePort }}
|
||||
{{- else }}
|
||||
name: {{ $servicePort }}
|
||||
{{- end }}
|
||||
{{- else }}
|
||||
serviceName: {{ $serviceName }}
|
||||
servicePort: {{ $servicePort }}
|
||||
{{- end }}
|
||||
{{- end -}}
|
||||
{{- end -}}
|
||||
{{- else }}
|
||||
- http:
|
||||
paths:
|
||||
{{- if $extraPaths }}
|
||||
{{- toYaml $extraPaths | nindent 10 }}
|
||||
{{- with $extraPaths }}
|
||||
{{- toYaml . | nindent 10 }}
|
||||
{{- end }}
|
||||
{{- range $p := $paths }}
|
||||
- path: {{ $p }}
|
||||
{{- if eq (include "argo-cd.apiVersion.ingress" $) "networking.k8s.io/v1" }}
|
||||
pathType: {{ $pathType }}
|
||||
{{- end }}
|
||||
backend:
|
||||
{{- if eq (include "argo-cd.apiVersion.ingress" $) "networking.k8s.io/v1" }}
|
||||
service:
|
||||
name: {{ $serviceName }}
|
||||
name: {{ include "argo-cd.applicationSet.fullname" $ }}
|
||||
port:
|
||||
{{- if kindIs "float64" $servicePort }}
|
||||
number: {{ $servicePort }}
|
||||
{{- else }}
|
||||
name: {{ $servicePort }}
|
||||
{{- end }}
|
||||
{{- else }}
|
||||
serviceName: {{ $serviceName }}
|
||||
servicePort: {{ $servicePort }}
|
||||
{{- end }}
|
||||
{{- end -}}
|
||||
{{- end -}}
|
||||
{{- if .Values.applicationSet.webhook.ingress.tls }}
|
||||
{{- with .Values.applicationSet.webhook.ingress.tls }}
|
||||
tls:
|
||||
{{- toYaml .Values.applicationSet.webhook.ingress.tls | nindent 4 }}
|
||||
{{- toYaml . | nindent 4 }}
|
||||
{{- end -}}
|
||||
{{- end -}}
|
||||
|
|
|
@ -1,5 +1,5 @@
|
|||
{{- if and .Values.notifications.enabled .Values.notifications.bots.slack.enabled .Values.notifications.bots.slack.pdb.enabled }}
|
||||
apiVersion: {{ include "argo-cd.apiVersion.pdb" . }}
|
||||
apiVersion: policy/v1
|
||||
kind: PodDisruptionBudget
|
||||
metadata:
|
||||
name: {{ include "argo-cd.notifications.fullname" . }}-bot
|
||||
|
|
|
@ -1,5 +1,5 @@
|
|||
{{- if and .Values.notifications.enabled .Values.notifications.pdb.enabled }}
|
||||
apiVersion: {{ include "argo-cd.apiVersion.pdb" . }}
|
||||
apiVersion: policy/v1
|
||||
kind: PodDisruptionBudget
|
||||
metadata:
|
||||
name: {{ include "argo-cd.notifications.fullname" . }}
|
||||
|
|
|
@ -1,5 +1,5 @@
|
|||
{{- if .Values.repoServer.pdb.enabled }}
|
||||
apiVersion: {{ include "argo-cd.apiVersion.pdb" . }}
|
||||
apiVersion: policy/v1
|
||||
kind: PodDisruptionBudget
|
||||
metadata:
|
||||
name: {{ include "argo-cd.repoServer.fullname" . }}
|
||||
|
|
|
@ -1,89 +1,72 @@
|
|||
{{- if and .Values.server.ingressGrpc.enabled (not .Values.server.ingressGrpc.isAWSALB) -}}
|
||||
{{- $serviceName := include "argo-cd.server.fullname" . -}}
|
||||
{{- $servicePort := ternary .Values.server.service.servicePortHttps .Values.server.service.servicePortHttp .Values.server.ingressGrpc.https -}}
|
||||
{{- $paths := .Values.server.ingressGrpc.paths -}}
|
||||
{{- $extraPaths := .Values.server.ingressGrpc.extraPaths -}}
|
||||
{{- $pathType := .Values.server.ingressGrpc.pathType -}}
|
||||
apiVersion: {{ include "argo-cd.apiVersion.ingress" . }}
|
||||
apiVersion: networking.k8s.io/v1
|
||||
kind: Ingress
|
||||
metadata:
|
||||
{{- if .Values.server.ingressGrpc.annotations }}
|
||||
annotations:
|
||||
{{- range $key, $value := .Values.server.ingressGrpc.annotations }}
|
||||
{{ $key }}: {{ $value | quote }}
|
||||
{{- end }}
|
||||
{{- end }}
|
||||
name: {{ template "argo-cd.server.fullname" . }}-grpc
|
||||
name: {{ include "argo-cd.server.fullname" . }}-grpc
|
||||
labels:
|
||||
{{- include "argo-cd.labels" (dict "context" . "component" .Values.server.name "name" .Values.server.name) | nindent 4 }}
|
||||
{{- if .Values.server.ingressGrpc.labels }}
|
||||
{{- toYaml .Values.server.ingressGrpc.labels | nindent 4 }}
|
||||
{{- with .Values.server.ingressGrpc.labels }}
|
||||
{{- toYaml . | nindent 4 }}
|
||||
{{- end }}
|
||||
{{- with .Values.server.ingressGrpc.annotations }}
|
||||
annotations:
|
||||
{{- range $key, $value := . }}
|
||||
{{ $key }}: {{ $value | quote }}
|
||||
{{- end }}
|
||||
{{- end }}
|
||||
spec:
|
||||
{{- if eq (include "argo-cd.apiVersion.ingress" $) "networking.k8s.io/v1" }}
|
||||
{{- with .Values.server.ingressGrpc.ingressClassName }}
|
||||
ingressClassName: {{ . }}
|
||||
{{- end }}
|
||||
{{- end }}
|
||||
rules:
|
||||
{{- if .Values.server.ingressGrpc.hosts }}
|
||||
{{- range $host := .Values.server.ingressGrpc.hosts }}
|
||||
- host: {{ $host }}
|
||||
http:
|
||||
paths:
|
||||
{{- if $extraPaths }}
|
||||
{{- toYaml $extraPaths | nindent 10 }}
|
||||
{{- end -}}
|
||||
{{- with $extraPaths }}
|
||||
{{- toYaml . | nindent 10 }}
|
||||
{{- end }}
|
||||
{{- range $p := $paths }}
|
||||
- path: {{ $p }}
|
||||
{{- if eq (include "argo-cd.apiVersion.ingress" $) "networking.k8s.io/v1" }}
|
||||
pathType: {{ $pathType }}
|
||||
{{- end }}
|
||||
backend:
|
||||
{{- if eq (include "argo-cd.apiVersion.ingress" $) "networking.k8s.io/v1" }}
|
||||
service:
|
||||
name: {{ $serviceName }}
|
||||
name: {{ include "argo-cd.server.fullname" $ }}
|
||||
port:
|
||||
{{- if kindIs "float64" $servicePort }}
|
||||
number: {{ $servicePort }}
|
||||
{{- else }}
|
||||
name: {{ $servicePort }}
|
||||
{{- end }}
|
||||
{{- else }}
|
||||
serviceName: {{ $serviceName }}
|
||||
servicePort: {{ $servicePort }}
|
||||
{{- end }}
|
||||
{{- end -}}
|
||||
{{- end -}}
|
||||
{{- else }}
|
||||
- http:
|
||||
paths:
|
||||
{{- if $extraPaths }}
|
||||
{{- toYaml $extraPaths | nindent 10 }}
|
||||
{{- end -}}
|
||||
{{- with $extraPaths }}
|
||||
{{- toYaml . | nindent 10 }}
|
||||
{{- end }}
|
||||
{{- range $p := $paths }}
|
||||
- path: {{ $p }}
|
||||
{{- if eq (include "argo-cd.apiVersion.ingress" $) "networking.k8s.io/v1" }}
|
||||
pathType: {{ $pathType }}
|
||||
{{- end }}
|
||||
backend:
|
||||
{{- if eq (include "argo-cd.apiVersion.ingress" $) "networking.k8s.io/v1" }}
|
||||
service:
|
||||
name: {{ $serviceName }}
|
||||
name: {{ include "argo-cd.server.fullname" $ }}
|
||||
port:
|
||||
{{- if kindIs "float64" $servicePort }}
|
||||
number: {{ $servicePort }}
|
||||
{{- else }}
|
||||
name: {{ $servicePort }}
|
||||
{{- end }}
|
||||
{{- else }}
|
||||
serviceName: {{ $serviceName }}
|
||||
servicePort: {{ $servicePort }}
|
||||
{{- end }}
|
||||
{{- end -}}
|
||||
{{- end -}}
|
||||
{{- if .Values.server.ingressGrpc.tls }}
|
||||
{{- with .Values.server.ingressGrpc.tls }}
|
||||
tls:
|
||||
{{- toYaml .Values.server.ingressGrpc.tls | nindent 4 }}
|
||||
{{- toYaml . | nindent 4 }}
|
||||
{{- end -}}
|
||||
{{- end -}}
|
||||
|
|
|
@ -1,51 +1,45 @@
|
|||
{{- if .Values.server.ingress.enabled -}}
|
||||
{{- $serviceName := include "argo-cd.server.fullname" . -}}
|
||||
{{- $servicePort := ternary .Values.server.service.servicePortHttps .Values.server.service.servicePortHttp .Values.server.ingress.https -}}
|
||||
{{- $paths := .Values.server.ingress.paths -}}
|
||||
{{- $extraPaths := .Values.server.ingress.extraPaths -}}
|
||||
{{- $pathType := .Values.server.ingress.pathType -}}
|
||||
apiVersion: {{ include "argo-cd.apiVersion.ingress" . }}
|
||||
apiVersion: networking.k8s.io/v1
|
||||
kind: Ingress
|
||||
metadata:
|
||||
{{- if .Values.server.ingress.annotations }}
|
||||
annotations:
|
||||
{{- range $key, $value := .Values.server.ingress.annotations }}
|
||||
{{ $key }}: {{ $value | quote }}
|
||||
{{- end }}
|
||||
{{- if and .Values.server.ingressGrpc.isAWSALB .Values.server.ingressGrpc.enabled }}
|
||||
alb.ingress.kubernetes.io/conditions.{{ template "argo-cd.server.fullname" . }}-grpc: |
|
||||
[{"field":"http-header","httpHeaderConfig":{"httpHeaderName": "Content-Type", "values":["application/grpc"]}}]
|
||||
{{- end }}
|
||||
{{- end }}
|
||||
name: {{ template "argo-cd.server.fullname" . }}
|
||||
name: {{ include "argo-cd.server.fullname" . }}
|
||||
labels:
|
||||
{{- include "argo-cd.labels" (dict "context" . "component" .Values.server.name "name" .Values.server.name) | nindent 4 }}
|
||||
{{- if .Values.server.ingress.labels }}
|
||||
{{- toYaml .Values.server.ingress.labels | nindent 4 }}
|
||||
{{- with .Values.server.ingress.labels }}
|
||||
{{- toYaml . | nindent 4 }}
|
||||
{{- end }}
|
||||
{{- if .Values.server.ingress.annotations }}
|
||||
annotations:
|
||||
{{- range $key, $value := .Values.server.ingress.annotations }}
|
||||
{{ $key }}: {{ $value | quote }}
|
||||
{{- end }}
|
||||
{{- if and .Values.server.ingressGrpc.isAWSALB .Values.server.ingressGrpc.enabled }}
|
||||
alb.ingress.kubernetes.io/conditions.{{ template "argo-cd.server.fullname" . }}-grpc: |
|
||||
[{"field":"http-header","httpHeaderConfig":{"httpHeaderName": "Content-Type", "values":["application/grpc"]}}]
|
||||
{{- end }}
|
||||
{{- end }}
|
||||
spec:
|
||||
{{- if eq (include "argo-cd.apiVersion.ingress" $) "networking.k8s.io/v1" }}
|
||||
{{- with .Values.server.ingress.ingressClassName }}
|
||||
ingressClassName: {{ . }}
|
||||
{{- end }}
|
||||
{{- end }}
|
||||
rules:
|
||||
{{- if .Values.server.ingress.hosts }}
|
||||
{{- range $host := .Values.server.ingress.hosts }}
|
||||
- host: {{ $host }}
|
||||
http:
|
||||
paths:
|
||||
{{- if $extraPaths }}
|
||||
{{- toYaml $extraPaths | nindent 10 }}
|
||||
{{- with $extraPaths }}
|
||||
{{- toYaml . | nindent 10 }}
|
||||
{{- end }}
|
||||
{{- range $p := $paths }}
|
||||
{{- if and $.Values.server.ingressGrpc.isAWSALB $.Values.server.ingressGrpc.enabled }}
|
||||
- path: {{ $p }}
|
||||
{{- if eq (include "argo-cd.apiVersion.ingress" $) "networking.k8s.io/v1" }}
|
||||
pathType: Prefix
|
||||
{{- end }}
|
||||
backend:
|
||||
{{- if eq (include "argo-cd.apiVersion.ingress" $) "networking.k8s.io/v1" }}
|
||||
service:
|
||||
name: {{ template "argo-cd.server.fullname" $ }}-grpc
|
||||
port:
|
||||
|
@ -54,60 +48,42 @@ spec:
|
|||
{{- else }}
|
||||
name: {{ $servicePort }}
|
||||
{{- end }}
|
||||
{{- else }}
|
||||
serviceName: {{ template "argo-cd.server.fullname" $ }}-grpc
|
||||
servicePort: {{ $servicePort }}
|
||||
{{- end }}
|
||||
{{- end }}
|
||||
- path: {{ $p }}
|
||||
{{- if eq (include "argo-cd.apiVersion.ingress" $) "networking.k8s.io/v1" }}
|
||||
pathType: {{ $pathType }}
|
||||
{{- end }}
|
||||
backend:
|
||||
{{- if eq (include "argo-cd.apiVersion.ingress" $) "networking.k8s.io/v1" }}
|
||||
service:
|
||||
name: {{ $serviceName }}
|
||||
name: {{ include "argo-cd.server.fullname" $ }}
|
||||
port:
|
||||
{{- if kindIs "float64" $servicePort }}
|
||||
number: {{ $servicePort }}
|
||||
{{- else }}
|
||||
name: {{ $servicePort }}
|
||||
{{- end }}
|
||||
{{- else }}
|
||||
serviceName: {{ $serviceName }}
|
||||
servicePort: {{ $servicePort }}
|
||||
{{- end }}
|
||||
{{- end -}}
|
||||
{{- end -}}
|
||||
{{- else }}
|
||||
- http:
|
||||
paths:
|
||||
{{- if $extraPaths }}
|
||||
{{- toYaml $extraPaths | nindent 10 }}
|
||||
{{- with $extraPaths }}
|
||||
{{- toYaml . | nindent 10 }}
|
||||
{{- end }}
|
||||
{{- range $p := $paths }}
|
||||
- path: {{ $p }}
|
||||
{{- if eq (include "argo-cd.apiVersion.ingress" $) "networking.k8s.io/v1" }}
|
||||
pathType: {{ $pathType }}
|
||||
{{- end }}
|
||||
backend:
|
||||
{{- if eq (include "argo-cd.apiVersion.ingress" $) "networking.k8s.io/v1" }}
|
||||
service:
|
||||
name: {{ $serviceName }}
|
||||
name: {{ include "argo-cd.server.fullname" $ }}
|
||||
port:
|
||||
{{- if kindIs "float64" $servicePort }}
|
||||
number: {{ $servicePort }}
|
||||
{{- else }}
|
||||
name: {{ $servicePort }}
|
||||
{{- end }}
|
||||
{{- else }}
|
||||
serviceName: {{ $serviceName }}
|
||||
servicePort: {{ $servicePort }}
|
||||
{{- end }}
|
||||
{{- end -}}
|
||||
{{- end -}}
|
||||
{{- if .Values.server.ingress.tls }}
|
||||
{{- with .Values.server.ingress.tls }}
|
||||
tls:
|
||||
{{- toYaml .Values.server.ingress.tls | nindent 4 }}
|
||||
{{- toYaml . | nindent 4 }}
|
||||
{{- end -}}
|
||||
{{- end -}}
|
||||
|
|
|
@ -1,5 +1,5 @@
|
|||
{{- if .Values.server.pdb.enabled }}
|
||||
apiVersion: {{ include "argo-cd.apiVersion.pdb" . }}
|
||||
apiVersion: policy/v1
|
||||
kind: PodDisruptionBudget
|
||||
metadata:
|
||||
name: {{ include "argo-cd.server.fullname" . }}
|
||||
|
|
|
@ -1,5 +1,5 @@
|
|||
{{- if and .Values.dex.enabled .Values.dex.pdb.enabled }}
|
||||
apiVersion: {{ include "argo-cd.apiVersion.pdb" . }}
|
||||
apiVersion: policy/v1
|
||||
kind: PodDisruptionBudget
|
||||
metadata:
|
||||
name: {{ include "argo-cd.dex.fullname" . }}
|
||||
|
|
|
@ -1,6 +1,6 @@
|
|||
{{- $redisHa := index .Values "redis-ha" -}}
|
||||
{{- if and .Values.redis.enabled (not $redisHa.enabled) .Values.redis.pdb.enabled }}
|
||||
apiVersion: {{ include "argo-cd.apiVersion.pdb" . }}
|
||||
apiVersion: policy/v1
|
||||
kind: PodDisruptionBudget
|
||||
metadata:
|
||||
name: {{ include "argo-cd.redis.fullname" . }}
|
||||
|
|
|
@ -18,10 +18,6 @@ apiVersionOverrides:
|
|||
cloudgoogle: "" # cloud.google.com/v1
|
||||
# -- String to override apiVersion of autoscaling rendered by this helm chart
|
||||
autoscaling: "" # autoscaling/v2
|
||||
# -- String to override apiVersion of ingresses rendered by this helm chart
|
||||
ingress: "" # networking.k8s.io/v1beta1
|
||||
# -- String to override apiVersion of pod disruption budgets rendered by this helm chart
|
||||
pdb: "" # policy/v1
|
||||
|
||||
# -- Create clusterroles that extend existing clusterroles to interact with argo-cd crds
|
||||
## Ref: https://kubernetes.io/docs/reference/access-authn-authz/rbac/#aggregated-clusterroles
|
||||
|
@ -524,14 +520,6 @@ controller:
|
|||
# # -- define the application controller `--repo-server-timeout-seconds`
|
||||
# repoServerTimeoutSeconds: "60"
|
||||
|
||||
# DEPRECATED - Use configs.params to override
|
||||
# -- Application controller log format. Either `text` or `json`
|
||||
# @default -- `""` (defaults to global.logging.format)
|
||||
# logFormat: ""
|
||||
# -- Application controller log level. One of: `debug`, `info`, `warn` or `error`
|
||||
# @default -- `""` (defaults to global.logging.level)
|
||||
# logLevel: ""
|
||||
|
||||
# -- Additional command line arguments to pass to application controller
|
||||
extraArgs: []
|
||||
|
||||
|
@ -546,6 +534,35 @@ controller:
|
|||
# - secretRef:
|
||||
# name: secret-name
|
||||
|
||||
# -- Additional containers to be added to the application controller pod
|
||||
extraContainers: []
|
||||
|
||||
# -- Init containers to add to the application controller pod
|
||||
## If your target Kubernetes cluster(s) require a custom credential (exec) plugin
|
||||
## you could use this (and the same in the server pod) to provide such executable
|
||||
## Ref: https://kubernetes.io/docs/reference/access-authn-authz/authentication/#client-go-credential-plugins
|
||||
initContainers: []
|
||||
# - name: download-tools
|
||||
# image: alpine:3
|
||||
# command: [sh, -c]
|
||||
# args:
|
||||
# - wget -qO kubelogin.zip https://github.com/Azure/kubelogin/releases/download/v0.0.25/kubelogin-linux-amd64.zip &&
|
||||
# unzip kubelogin.zip && mv bin/linux_amd64/kubelogin /custom-tools/
|
||||
# volumeMounts:
|
||||
# - mountPath: /custom-tools
|
||||
# name: custom-tools
|
||||
|
||||
# -- Additional volumeMounts to the application controller main container
|
||||
volumeMounts: []
|
||||
# - mountPath: /usr/local/bin/kubelogin
|
||||
# name: custom-tools
|
||||
# subPath: kubelogin
|
||||
|
||||
# -- Additional volumes to the application controller pod
|
||||
volumes: []
|
||||
# - name: custom-tools
|
||||
# emptyDir: {}
|
||||
|
||||
# -- Annotations for the application controller StatefulSet
|
||||
statefulsetAnnotations: {}
|
||||
|
||||
|
@ -555,6 +572,15 @@ controller:
|
|||
# -- Labels to be added to application controller pods
|
||||
podLabels: {}
|
||||
|
||||
# -- Resource limits and requests for the application controller pods
|
||||
resources: {}
|
||||
# limits:
|
||||
# cpu: 500m
|
||||
# memory: 512Mi
|
||||
# requests:
|
||||
# cpu: 250m
|
||||
# memory: 256Mi
|
||||
|
||||
# -- Application controller container-level security context
|
||||
# @default -- See [values.yaml]
|
||||
containerSecurityContext:
|
||||
|
@ -584,12 +610,6 @@ controller:
|
|||
# -- Number of seconds after which the [probe] times out
|
||||
timeoutSeconds: 1
|
||||
|
||||
# -- Additional volumeMounts to the application controller main container
|
||||
volumeMounts: []
|
||||
|
||||
# -- Additional volumes to the application controller pod
|
||||
volumes: []
|
||||
|
||||
# -- [Node selector]
|
||||
nodeSelector: {}
|
||||
|
||||
|
@ -610,15 +630,6 @@ controller:
|
|||
# -- Priority class for the application controller pods
|
||||
priorityClassName: ""
|
||||
|
||||
# -- Resource limits and requests for the application controller pods
|
||||
resources: {}
|
||||
# limits:
|
||||
# cpu: 500m
|
||||
# memory: 512Mi
|
||||
# requests:
|
||||
# cpu: 250m
|
||||
# memory: 256Mi
|
||||
|
||||
serviceAccount:
|
||||
# -- Create a service account for the application controller
|
||||
create: true
|
||||
|
@ -720,28 +731,6 @@ controller:
|
|||
# -- List of custom rules for the application controller's ClusterRole resource
|
||||
rules: []
|
||||
|
||||
# -- Additional containers to be added to the application controller pod
|
||||
extraContainers: []
|
||||
|
||||
# -- Init containers to add to the application controller pod
|
||||
## If your target Kubernetes cluster(s) require a custom auth provider executable
|
||||
## you could use this (and the same in the server pod) to bootstrap
|
||||
## that executable into your Argo CD container
|
||||
initContainers: []
|
||||
# - name: download-tools
|
||||
# image: alpine:3.8
|
||||
# command: [sh, -c]
|
||||
# args:
|
||||
# - wget -qO- https://get.helm.sh/helm-v2.16.1-linux-amd64.tar.gz | tar -xvzf - &&
|
||||
# mv linux-amd64/helm /custom-tools/
|
||||
# volumeMounts:
|
||||
# - mountPath: /custom-tools
|
||||
# name: custom-tools
|
||||
# volumeMounts:
|
||||
# - mountPath: /usr/local/bin/helm
|
||||
# name: custom-tools
|
||||
# subPath: helm
|
||||
|
||||
## Dex
|
||||
dex:
|
||||
# -- Enable dex
|
||||
|
@ -839,6 +828,18 @@ dex:
|
|||
# - secretRef:
|
||||
# name: secret-name
|
||||
|
||||
# -- Additional containers to be added to the dex pod
|
||||
extraContainers: []
|
||||
|
||||
# -- Init containers to add to the dex pod
|
||||
initContainers: []
|
||||
|
||||
# -- Additional volumeMounts to the dex main container
|
||||
volumeMounts: []
|
||||
|
||||
# -- Additional volumes to the dex pod
|
||||
volumes: []
|
||||
|
||||
# TLS certificate configuration via Secret
|
||||
## Ref: https://argo-cd.readthedocs.io/en/stable/operator-manual/tls/#configuring-tls-to-argocd-dex-server
|
||||
## Note: Issuing certificates via cert-manager in not supported right now because it's not possible to restart Dex automatically without extra controllers.
|
||||
|
@ -865,6 +866,15 @@ dex:
|
|||
# -- Labels to be added to the Dex server pods
|
||||
podLabels: {}
|
||||
|
||||
# -- Resource limits and requests for dex
|
||||
resources: {}
|
||||
# limits:
|
||||
# cpu: 50m
|
||||
# memory: 64Mi
|
||||
# requests:
|
||||
# cpu: 10m
|
||||
# memory: 32Mi
|
||||
|
||||
# -- Dex container-level security context
|
||||
# @default -- See [values.yaml]
|
||||
containerSecurityContext:
|
||||
|
@ -916,12 +926,6 @@ dex:
|
|||
# -- Automount API credentials for the Service Account
|
||||
automountServiceAccountToken: true
|
||||
|
||||
# -- Additional volumeMounts to the dex main container
|
||||
volumeMounts: []
|
||||
|
||||
# -- Additional volumes to the dex pod
|
||||
volumes: []
|
||||
|
||||
# -- Container port for HTTP access
|
||||
containerPortHttp: 5556
|
||||
# -- Service port for HTTP access
|
||||
|
@ -957,34 +961,6 @@ dex:
|
|||
# -- Priority class for dex
|
||||
priorityClassName: ""
|
||||
|
||||
# -- Resource limits and requests for dex
|
||||
resources: {}
|
||||
# limits:
|
||||
# cpu: 50m
|
||||
# memory: 64Mi
|
||||
# requests:
|
||||
# cpu: 10m
|
||||
# memory: 32Mi
|
||||
|
||||
# -- Additional containers to be added to the dex pod
|
||||
extraContainers: []
|
||||
|
||||
# -- Init containers to add to the dex pod
|
||||
initContainers: []
|
||||
# - name: download-tools
|
||||
# image: alpine:3.8
|
||||
# command: [sh, -c]
|
||||
# args:
|
||||
# - wget -qO- https://get.helm.sh/helm-v2.16.1-linux-amd64.tar.gz | tar -xvzf - &&
|
||||
# mv linux-amd64/helm /custom-tools/
|
||||
# volumeMounts:
|
||||
# - mountPath: /custom-tools
|
||||
# name: custom-tools
|
||||
# volumeMounts:
|
||||
# - mountPath: /usr/local/bin/helm
|
||||
# name: custom-tools
|
||||
# subPath: helm
|
||||
|
||||
## Redis
|
||||
redis:
|
||||
# -- Enable redis
|
||||
|
@ -1026,11 +1002,6 @@ redis:
|
|||
# - --bind
|
||||
# - "0.0.0.0"
|
||||
|
||||
# -- Redis container port
|
||||
containerPort: 6379
|
||||
# -- Redis service port
|
||||
servicePort: 6379
|
||||
|
||||
# -- Environment variables to pass to the Redis server
|
||||
env: []
|
||||
|
||||
|
@ -1042,6 +1013,18 @@ redis:
|
|||
# - secretRef:
|
||||
# name: secret-name
|
||||
|
||||
# -- Additional containers to be added to the redis pod
|
||||
extraContainers: []
|
||||
|
||||
# -- Init containers to add to the redis pod
|
||||
initContainers: []
|
||||
|
||||
# -- Additional volumeMounts to the redis container
|
||||
volumeMounts: []
|
||||
|
||||
# -- Additional volumes to the redis pod
|
||||
volumes: []
|
||||
|
||||
# -- Annotations to be added to the Redis server Deployment
|
||||
deploymentAnnotations: {}
|
||||
|
||||
|
@ -1051,6 +1034,15 @@ redis:
|
|||
# -- Labels to be added to the Redis server pods
|
||||
podLabels: {}
|
||||
|
||||
# -- Resource limits and requests for redis
|
||||
resources: {}
|
||||
# limits:
|
||||
# cpu: 200m
|
||||
# memory: 128Mi
|
||||
# requests:
|
||||
# cpu: 100m
|
||||
# memory: 64Mi
|
||||
|
||||
# -- Redis pod-level security context
|
||||
# @default -- See [values.yaml]
|
||||
securityContext:
|
||||
|
@ -1067,10 +1059,17 @@ redis:
|
|||
drop:
|
||||
- ALL
|
||||
|
||||
# -- Redis container port
|
||||
containerPort: 6379
|
||||
# -- Redis service port
|
||||
servicePort: 6379
|
||||
|
||||
# -- [Node selector]
|
||||
nodeSelector: {}
|
||||
|
||||
# -- [Tolerations] for use with node taints
|
||||
tolerations: []
|
||||
|
||||
# -- Assign custom [affinity] rules to the deployment
|
||||
affinity: {}
|
||||
|
||||
|
@ -1095,39 +1094,6 @@ redis:
|
|||
# -- Automount API credentials for the Service Account
|
||||
automountServiceAccountToken: false
|
||||
|
||||
# -- Resource limits and requests for redis
|
||||
resources: {}
|
||||
# limits:
|
||||
# cpu: 200m
|
||||
# memory: 128Mi
|
||||
# requests:
|
||||
# cpu: 100m
|
||||
# memory: 64Mi
|
||||
|
||||
# -- Additional volumeMounts to the redis container
|
||||
volumeMounts: []
|
||||
# -- Additional volumes to the redis pod
|
||||
volumes: []
|
||||
|
||||
# -- Additional containers to be added to the redis pod
|
||||
extraContainers: []
|
||||
|
||||
# -- Init containers to add to the redis pod
|
||||
initContainers: []
|
||||
# - name: download-tools
|
||||
# image: alpine:3.8
|
||||
# command: [sh, -c]
|
||||
# args:
|
||||
# - wget -qO- https://get.helm.sh/helm-v2.16.1-linux-amd64.tar.gz | tar -xvzf - &&
|
||||
# mv linux-amd64/helm /custom-tools/
|
||||
# volumeMounts:
|
||||
# - mountPath: /custom-tools
|
||||
# name: custom-tools
|
||||
# volumeMounts:
|
||||
# - mountPath: /usr/local/bin/helm
|
||||
# name: custom-tools
|
||||
# subPath: helm
|
||||
|
||||
service:
|
||||
# -- Redis service annotations
|
||||
annotations: {}
|
||||
|
@ -1204,7 +1170,6 @@ redis:
|
|||
# -- Prometheus ServiceMonitor annotations
|
||||
annotations: {}
|
||||
|
||||
|
||||
# This key configures Redis-HA subchart and when enabled (redis-ha.enabled=true)
|
||||
# the custom redis deployment is omitted
|
||||
# Check the redis-ha chart for more properties
|
||||
|
@ -1351,13 +1316,93 @@ server:
|
|||
# -- Specify postStart and preStop lifecycle hooks for your argo-cd-server container
|
||||
lifecycle: {}
|
||||
|
||||
# DEPRECATED - Use configs.params to override
|
||||
# -- Argo CD server log format: Either `text` or `json`
|
||||
# @default -- `""` (defaults to global.logging.format)
|
||||
# logFormat: ""
|
||||
# -- Argo CD server log level. One of: `debug`, `info`, `warn` or `error`
|
||||
# @default -- `""` (defaults to global.logging.level)
|
||||
# logLevel: ""
|
||||
## Argo UI extensions
|
||||
## This function in tech preview stage, do expect unstability or breaking changes in newer versions.
|
||||
## Ref: https://github.com/argoproj-labs/argocd-extensions
|
||||
extensions:
|
||||
# -- Enable support for Argo UI extensions
|
||||
enabled: false
|
||||
|
||||
## Argo UI extensions image
|
||||
image:
|
||||
# -- Repository to use for extensions image
|
||||
repository: "ghcr.io/argoproj-labs/argocd-extensions"
|
||||
# -- Tag to use for extensions image
|
||||
tag: "v0.1.0"
|
||||
# -- Image pull policy for extensions
|
||||
# @default -- `""` (defaults to global.image.imagePullPolicy)
|
||||
imagePullPolicy: ""
|
||||
|
||||
# -- Server UI extensions container-level security context
|
||||
# @default -- See [values.yaml]
|
||||
containerSecurityContext:
|
||||
runAsNonRoot: true
|
||||
readOnlyRootFilesystem: true
|
||||
allowPrivilegeEscalation: false
|
||||
seccompProfile:
|
||||
type: RuntimeDefault
|
||||
capabilities:
|
||||
drop:
|
||||
- ALL
|
||||
|
||||
# -- Resource limits and requests for the argocd-extensions container
|
||||
resources: {}
|
||||
# limits:
|
||||
# cpu: 50m
|
||||
# memory: 128Mi
|
||||
# requests:
|
||||
# cpu: 10m
|
||||
# memory: 64Mi
|
||||
|
||||
# -- Additional containers to be added to the server pod
|
||||
## See https://github.com/lemonldap-ng-controller/lemonldap-ng-controller as example.
|
||||
extraContainers: []
|
||||
# - name: my-sidecar
|
||||
# image: nginx:latest
|
||||
# - name: lemonldap-ng-controller
|
||||
# image: lemonldapng/lemonldap-ng-controller:0.2.0
|
||||
# args:
|
||||
# - /lemonldap-ng-controller
|
||||
# - --alsologtostderr
|
||||
# - --configmap=$(POD_NAMESPACE)/lemonldap-ng-configuration
|
||||
# env:
|
||||
# - name: POD_NAME
|
||||
# valueFrom:
|
||||
# fieldRef:
|
||||
# fieldPath: metadata.name
|
||||
# - name: POD_NAMESPACE
|
||||
# valueFrom:
|
||||
# fieldRef:
|
||||
# fieldPath: metadata.namespace
|
||||
# volumeMounts:
|
||||
# - name: copy-portal-skins
|
||||
# mountPath: /srv/var/lib/lemonldap-ng/portal/skins
|
||||
|
||||
# -- Init containers to add to the server pod
|
||||
## If your target Kubernetes cluster(s) require a custom credential (exec) plugin
|
||||
## you could use this (and the same in the application controller pod) to provide such executable
|
||||
## Ref: https://kubernetes.io/docs/reference/access-authn-authz/authentication/#client-go-credential-plugins
|
||||
initContainers: []
|
||||
# - name: download-tools
|
||||
# image: alpine:3
|
||||
# command: [sh, -c]
|
||||
# args:
|
||||
# - wget -qO kubelogin.zip https://github.com/Azure/kubelogin/releases/download/v0.0.25/kubelogin-linux-amd64.zip &&
|
||||
# unzip kubelogin.zip && mv bin/linux_amd64/kubelogin /custom-tools/
|
||||
# volumeMounts:
|
||||
# - mountPath: /custom-tools
|
||||
# name: custom-tools
|
||||
|
||||
# -- Additional volumeMounts to the server main container
|
||||
volumeMounts: []
|
||||
# - mountPath: /usr/local/bin/kubelogin
|
||||
# name: custom-tools
|
||||
# subPath: kubelogin
|
||||
|
||||
# -- Additional volumes to the server pod
|
||||
volumes: []
|
||||
# - name: custom-tools
|
||||
# emptyDir: {}
|
||||
|
||||
# -- Annotations to be added to server Deployment
|
||||
deploymentAnnotations: {}
|
||||
|
@ -1368,6 +1413,15 @@ server:
|
|||
# -- Labels to be added to server pods
|
||||
podLabels: {}
|
||||
|
||||
# -- Resource limits and requests for the Argo CD server
|
||||
resources: {}
|
||||
# limits:
|
||||
# cpu: 100m
|
||||
# memory: 128Mi
|
||||
# requests:
|
||||
# cpu: 50m
|
||||
# memory: 64Mi
|
||||
|
||||
# -- Configures the server port
|
||||
containerPort: 8080
|
||||
|
||||
|
@ -1396,12 +1450,6 @@ server:
|
|||
# -- Number of seconds after which the [probe] times out
|
||||
timeoutSeconds: 1
|
||||
|
||||
# -- Additional volumeMounts to the server main container
|
||||
volumeMounts: []
|
||||
|
||||
# -- Additional volumes to the server pod
|
||||
volumes: []
|
||||
|
||||
# -- [Node selector]
|
||||
nodeSelector: {}
|
||||
# -- [Tolerations] for use with node taints
|
||||
|
@ -1432,15 +1480,6 @@ server:
|
|||
drop:
|
||||
- ALL
|
||||
|
||||
# -- Resource limits and requests for the Argo CD server
|
||||
resources: {}
|
||||
# limits:
|
||||
# cpu: 100m
|
||||
# memory: 128Mi
|
||||
# requests:
|
||||
# cpu: 50m
|
||||
# memory: 64Mi
|
||||
|
||||
# TLS certificate configuration via cert-manager
|
||||
## Ref: https://argo-cd.readthedocs.io/en/stable/operator-manual/tls/#tls-certificates-used-by-argocd-server
|
||||
certificate:
|
||||
|
@ -1592,8 +1631,7 @@ server:
|
|||
## Argo Ingress.
|
||||
## Hostnames must be provided if Ingress is enabled.
|
||||
## Secrets must be manually created in the namespace
|
||||
hosts:
|
||||
[]
|
||||
hosts: []
|
||||
# - argocd.example.com
|
||||
|
||||
# -- List of ingress paths
|
||||
|
@ -1602,13 +1640,7 @@ server:
|
|||
# -- Ingress path type. One of `Exact`, `Prefix` or `ImplementationSpecific`
|
||||
pathType: Prefix
|
||||
# -- Additional ingress paths
|
||||
extraPaths:
|
||||
[]
|
||||
# - path: /*
|
||||
# backend:
|
||||
# serviceName: ssl-redirect
|
||||
# servicePort: use-annotation
|
||||
## for Kubernetes >=1.19 (when "networking.k8s.io/v1" is used)
|
||||
extraPaths: []
|
||||
# - path: /*
|
||||
# pathType: Prefix
|
||||
# backend:
|
||||
|
@ -1618,8 +1650,7 @@ server:
|
|||
# name: use-annotation
|
||||
|
||||
# -- Ingress TLS configuration
|
||||
tls:
|
||||
[]
|
||||
tls: []
|
||||
# - secretName: your-certificate-name
|
||||
# hosts:
|
||||
# - argocd.example.com
|
||||
|
@ -1658,8 +1689,7 @@ server:
|
|||
## Hostnames must be provided if Ingress is enabled.
|
||||
## Secrets must be manually created in the namespace
|
||||
##
|
||||
hosts:
|
||||
[]
|
||||
hosts: []
|
||||
# - argocd.example.com
|
||||
|
||||
# -- List of ingress paths for dedicated [gRPC-ingress]
|
||||
|
@ -1668,13 +1698,7 @@ server:
|
|||
# -- Ingress path type for dedicated [gRPC-ingress]. One of `Exact`, `Prefix` or `ImplementationSpecific`
|
||||
pathType: Prefix
|
||||
# -- Additional ingress paths for dedicated [gRPC-ingress]
|
||||
extraPaths:
|
||||
[]
|
||||
# - path: /*
|
||||
# backend:
|
||||
# serviceName: ssl-redirect
|
||||
# servicePort: use-annotation
|
||||
## for Kubernetes >=1.19 (when "networking.k8s.io/v1" is used)
|
||||
extraPaths: []
|
||||
# - path: /*
|
||||
# pathType: Prefix
|
||||
# backend:
|
||||
|
@ -1684,8 +1708,7 @@ server:
|
|||
# name: use-annotation
|
||||
|
||||
# -- Ingress TLS configuration for dedicated [gRPC-ingress]
|
||||
tls:
|
||||
[]
|
||||
tls: []
|
||||
# - secretName: your-certificate-name
|
||||
# hosts:
|
||||
# - argocd.example.com
|
||||
|
@ -1747,86 +1770,6 @@ server:
|
|||
# enabled: true
|
||||
# responseCodeName: RESPONSE_CODE
|
||||
|
||||
# -- Additional containers to be added to the server pod
|
||||
## See https://github.com/lemonldap-ng-controller/lemonldap-ng-controller as example.
|
||||
extraContainers: []
|
||||
# - name: my-sidecar
|
||||
# image: nginx:latest
|
||||
# - name: lemonldap-ng-controller
|
||||
# image: lemonldapng/lemonldap-ng-controller:0.2.0
|
||||
# args:
|
||||
# - /lemonldap-ng-controller
|
||||
# - --alsologtostderr
|
||||
# - --configmap=$(POD_NAMESPACE)/lemonldap-ng-configuration
|
||||
# env:
|
||||
# - name: POD_NAME
|
||||
# valueFrom:
|
||||
# fieldRef:
|
||||
# fieldPath: metadata.name
|
||||
# - name: POD_NAMESPACE
|
||||
# valueFrom:
|
||||
# fieldRef:
|
||||
# fieldPath: metadata.namespace
|
||||
# volumeMounts:
|
||||
# - name: copy-portal-skins
|
||||
# mountPath: /srv/var/lib/lemonldap-ng/portal/skins
|
||||
|
||||
# -- Init containers to add to the server pod
|
||||
## If your target Kubernetes cluster(s) require a custom auth provider executable
|
||||
## you could use this (and the same in the application controller pod) to bootstrap
|
||||
## that executable into your Argo CD container
|
||||
initContainers: []
|
||||
# - name: download-tools
|
||||
# image: alpine:3.8
|
||||
# command: [sh, -c]
|
||||
# args:
|
||||
# - wget -qO- https://get.helm.sh/helm-v2.16.1-linux-amd64.tar.gz | tar -xvzf - &&
|
||||
# mv linux-amd64/helm /custom-tools/
|
||||
# volumeMounts:
|
||||
# - mountPath: /custom-tools
|
||||
# name: custom-tools
|
||||
# volumeMounts:
|
||||
# - mountPath: /usr/local/bin/helm
|
||||
# name: custom-tools
|
||||
# subPath: helm
|
||||
|
||||
## Argo UI extensions
|
||||
## This function in tech preview stage, do expect unstability or breaking changes in newer versions.
|
||||
## Ref: https://github.com/argoproj-labs/argocd-extensions
|
||||
extensions:
|
||||
# -- Enable support for Argo UI extensions
|
||||
enabled: false
|
||||
|
||||
## Argo UI extensions image
|
||||
image:
|
||||
# -- Repository to use for extensions image
|
||||
repository: "ghcr.io/argoproj-labs/argocd-extensions"
|
||||
# -- Tag to use for extensions image
|
||||
tag: "v0.1.0"
|
||||
# -- Image pull policy for extensions
|
||||
imagePullPolicy: IfNotPresent
|
||||
|
||||
# -- Server UI extensions container-level security context
|
||||
# @default -- See [values.yaml]
|
||||
containerSecurityContext:
|
||||
runAsNonRoot: true
|
||||
readOnlyRootFilesystem: true
|
||||
allowPrivilegeEscalation: false
|
||||
seccompProfile:
|
||||
type: RuntimeDefault
|
||||
capabilities:
|
||||
drop:
|
||||
- ALL
|
||||
|
||||
# -- Resource limits and requests for the argocd-extensions container
|
||||
resources: {}
|
||||
# limits:
|
||||
# cpu: 50m
|
||||
# memory: 128Mi
|
||||
# requests:
|
||||
# cpu: 10m
|
||||
# memory: 64Mi
|
||||
|
||||
## Repo Server
|
||||
repoServer:
|
||||
# -- Repo server name
|
||||
|
@ -1883,13 +1826,13 @@ repoServer:
|
|||
image:
|
||||
# -- Repository to use for the repo server
|
||||
# @default -- `""` (defaults to global.image.repository)
|
||||
repository: "" # defaults to global.image.repository
|
||||
repository: ""
|
||||
# -- Tag to use for the repo server
|
||||
# @default -- `""` (defaults to global.image.tag)
|
||||
tag: "" # defaults to global.image.tag
|
||||
tag: ""
|
||||
# -- Image pull policy for the repo server
|
||||
# @default -- `""` (defaults to global.image.imagePullPolicy)
|
||||
imagePullPolicy: "" # IfNotPresent
|
||||
imagePullPolicy: ""
|
||||
|
||||
# -- Secrets with credentials to pull images from a private registry
|
||||
# @default -- `[]` (defaults to global.imagePullSecrets)
|
||||
|
@ -1909,13 +1852,43 @@ repoServer:
|
|||
# - secretRef:
|
||||
# name: secret-name
|
||||
|
||||
# DEPRECATED - Use configs.params to override
|
||||
# -- Repo server log format: Either `text` or `json`
|
||||
# @default -- `""` (defaults to global.logging.level)
|
||||
# logFormat: ""
|
||||
# -- Repo server log level. One of: `debug`, `info`, `warn` or `error`
|
||||
# @default -- `""` (defaults to global.logging.format)
|
||||
# logLevel: ""
|
||||
# -- Additional containers to be added to the repo server pod
|
||||
## Ref: https://argo-cd.readthedocs.io/en/stable/user-guide/config-management-plugins/
|
||||
extraContainers: []
|
||||
# - name: cmp
|
||||
# # Entrypoint should be Argo CD lightweight CMP server i.e. argocd-cmp-server
|
||||
# command: [/var/run/argocd/argocd-cmp-server]
|
||||
# image: busybox # This can be off-the-shelf or custom-built image
|
||||
# securityContext:
|
||||
# runAsNonRoot: true
|
||||
# runAsUser: 999
|
||||
# volumeMounts:
|
||||
# - mountPath: /var/run/argocd
|
||||
# name: var-files
|
||||
# - mountPath: /home/argocd/cmp-server/plugins
|
||||
# name: plugins
|
||||
# # Remove this volumeMount if you've chosen to bake the config file into the sidecar image.
|
||||
# - mountPath: /home/argocd/cmp-server/config/plugin.yaml
|
||||
# subPath: plugin.yaml
|
||||
# name: cmp-plugin
|
||||
# # Starting with v2.4, do NOT mount the same tmp volume as the repo-server container. The filesystem separation helps
|
||||
# # mitigate path traversal attacks.
|
||||
# - mountPath: /tmp
|
||||
# name: cmp-tmp
|
||||
|
||||
# -- Init containers to add to the repo server pods
|
||||
initContainers: []
|
||||
|
||||
# -- Additional volumeMounts to the repo server main container
|
||||
volumeMounts: []
|
||||
|
||||
# -- Additional volumes to the repo server pod
|
||||
volumes: []
|
||||
# - name: cmp-plugin
|
||||
# configMap:
|
||||
# name: cmp-plugin
|
||||
# - name: cmp-tmp
|
||||
# emptyDir: {}
|
||||
|
||||
# -- Annotations to be added to repo server Deployment
|
||||
deploymentAnnotations: {}
|
||||
|
@ -1926,6 +1899,15 @@ repoServer:
|
|||
# -- Labels to be added to repo server pods
|
||||
podLabels: {}
|
||||
|
||||
# -- Resource limits and requests for the repo server pods
|
||||
resources: {}
|
||||
# limits:
|
||||
# cpu: 50m
|
||||
# memory: 128Mi
|
||||
# requests:
|
||||
# cpu: 10m
|
||||
# memory: 64Mi
|
||||
|
||||
# -- Configures the repo server port
|
||||
containerPort: 8081
|
||||
|
||||
|
@ -1954,17 +1936,6 @@ repoServer:
|
|||
# -- Number of seconds after which the [probe] times out
|
||||
timeoutSeconds: 1
|
||||
|
||||
# -- Additional volumeMounts to the repo server main container
|
||||
volumeMounts: []
|
||||
|
||||
# -- Additional volumes to the repo server pod
|
||||
volumes: []
|
||||
## Use init containers to configure custom tooling
|
||||
## https://argo-cd.readthedocs.io/en/stable/operator-manual/custom_tools/
|
||||
## When using the volumes & volumeMounts section bellow, please comment out those above.
|
||||
# - name: custom-tools
|
||||
# emptyDir: {}
|
||||
|
||||
# -- [Node selector]
|
||||
nodeSelector: {}
|
||||
# -- [Tolerations] for use with node taints
|
||||
|
@ -1995,15 +1966,6 @@ repoServer:
|
|||
drop:
|
||||
- ALL
|
||||
|
||||
# -- Resource limits and requests for the repo server pods
|
||||
resources: {}
|
||||
# limits:
|
||||
# cpu: 50m
|
||||
# memory: 128Mi
|
||||
# requests:
|
||||
# cpu: 10m
|
||||
# memory: 64Mi
|
||||
|
||||
# TLS certificate configuration via Secret
|
||||
## Ref: https://argo-cd.readthedocs.io/en/stable/operator-manual/tls/#configuring-tls-to-argocd-repo-server
|
||||
## Note: Issuing certificates via cert-manager in not supported right now because it's not possible to restart repo server automatically without extra controllers.
|
||||
|
@ -2097,9 +2059,6 @@ repoServer:
|
|||
# -- Automount API credentials for the Service Account
|
||||
automountServiceAccountToken: true
|
||||
|
||||
# -- Additional containers to be added to the repo server pod
|
||||
extraContainers: []
|
||||
|
||||
# -- Repo server rbac rules
|
||||
rbac: []
|
||||
# - apiGroups:
|
||||
|
@ -2111,22 +2070,6 @@ repoServer:
|
|||
# - list
|
||||
# - watch
|
||||
|
||||
# -- Init containers to add to the repo server pods
|
||||
initContainers: []
|
||||
# - name: download-tools
|
||||
# image: alpine:3.8
|
||||
# command: [sh, -c]
|
||||
# args:
|
||||
# - wget -qO- https://get.helm.sh/helm-v2.16.1-linux-amd64.tar.gz | tar -xvzf - &&
|
||||
# mv linux-amd64/helm /custom-tools/
|
||||
# volumeMounts:
|
||||
# - mountPath: /custom-tools
|
||||
# name: custom-tools
|
||||
# volumeMounts:
|
||||
# - mountPath: /usr/local/bin/helm
|
||||
# name: custom-tools
|
||||
# subPath: helm
|
||||
|
||||
## ApplicationSet controller
|
||||
applicationSet:
|
||||
# -- Enable ApplicationSet controller
|
||||
|
@ -2170,6 +2113,13 @@ applicationSet:
|
|||
# @default -- `[]` (defaults to global.imagePullSecrets)
|
||||
imagePullSecrets: []
|
||||
|
||||
# -- ApplicationSet controller log format. Either `text` or `json`
|
||||
# @default -- `""` (defaults to global.logging.format)
|
||||
logFormat: ""
|
||||
# -- ApplicationSet controller log level. One of: `debug`, `info`, `warn`, `error`
|
||||
# @default -- `""` (defaults to global.logging.level)
|
||||
logLevel: ""
|
||||
|
||||
args:
|
||||
# -- The default metric address
|
||||
metricsAddr: :8080
|
||||
|
@ -2180,16 +2130,31 @@ applicationSet:
|
|||
# -- Enable dry run mode
|
||||
dryRun: false
|
||||
|
||||
# -- ApplicationSet controller log format. Either `text` or `json`
|
||||
# @default -- `""` (defaults to global.logging.format)
|
||||
logFormat: ""
|
||||
# -- ApplicationSet controller log level. One of: `debug`, `info`, `warn`, `error`
|
||||
# @default -- `""` (defaults to global.logging.level)
|
||||
logLevel: ""
|
||||
# -- List of extra cli args to add
|
||||
extraArgs: []
|
||||
|
||||
# -- Environment variables to pass to the ApplicationSet controller
|
||||
extraEnv: []
|
||||
# - name: "MY_VAR"
|
||||
# value: "value"
|
||||
|
||||
# -- envFrom to pass to the ApplicationSet controller
|
||||
# @default -- `[]` (See [values.yaml])
|
||||
extraEnvFrom: []
|
||||
# - configMapRef:
|
||||
# name: config-map-name
|
||||
# - secretRef:
|
||||
# name: secret-name
|
||||
|
||||
# -- Additional containers to be added to the ApplicationSet controller pod
|
||||
extraContainers: []
|
||||
|
||||
# -- List of extra mounts to add (normally used with extraVolumes)
|
||||
extraVolumeMounts: []
|
||||
|
||||
# -- List of extra volumes to add
|
||||
extraVolumes: []
|
||||
|
||||
## Metrics service configuration
|
||||
metrics:
|
||||
# -- Deploy metrics service
|
||||
|
@ -2258,6 +2223,15 @@ applicationSet:
|
|||
# -- Labels for the ApplicationSet controller pods
|
||||
podLabels: {}
|
||||
|
||||
# -- Resource limits and requests for the ApplicationSet controller pods.
|
||||
resources: {}
|
||||
# limits:
|
||||
# cpu: 100m
|
||||
# memory: 128Mi
|
||||
# requests:
|
||||
# cpu: 100m
|
||||
# memory: 128Mi
|
||||
|
||||
# -- ApplicationSet controller container-level security context
|
||||
# @default -- See [values.yaml]
|
||||
containerSecurityContext:
|
||||
|
@ -2300,19 +2274,6 @@ applicationSet:
|
|||
# -- Minimum consecutive failures for the [probe] to be considered failed after having succeeded
|
||||
failureThreshold: 3
|
||||
|
||||
# -- Resource limits and requests for the ApplicationSet controller pods.
|
||||
resources: {}
|
||||
# We usually recommend not to specify default resources and to leave this as a conscious
|
||||
# choice for the user. This also increases chances charts run on environments with little
|
||||
# resources, such as Minikube. If you do want to specify resources, uncomment the following
|
||||
# lines, adjust them as necessary, and remove the curly braces after 'resources:'.
|
||||
# limits:
|
||||
# cpu: 100m
|
||||
# memory: 128Mi
|
||||
# requests:
|
||||
# cpu: 100m
|
||||
# memory: 128Mi
|
||||
|
||||
# -- [Node selector]
|
||||
nodeSelector: {}
|
||||
|
||||
|
@ -2325,32 +2286,6 @@ applicationSet:
|
|||
# -- If specified, indicates the pod's priority. If not specified, the pod priority will be default or zero if there is no default.
|
||||
priorityClassName: ""
|
||||
|
||||
# -- List of extra mounts to add (normally used with extraVolumes)
|
||||
extraVolumeMounts: []
|
||||
# - mountPath: /tmp/foobar
|
||||
# name: foobar
|
||||
|
||||
# -- List of extra volumes to add
|
||||
extraVolumes: []
|
||||
# - name: foobar
|
||||
# emptyDir: {}
|
||||
|
||||
# -- List of extra cli args to add
|
||||
extraArgs: []
|
||||
|
||||
# -- Environment variables to pass to the ApplicationSet controller
|
||||
extraEnv: []
|
||||
# - name: "MY_VAR"
|
||||
# value: "value"
|
||||
|
||||
# -- envFrom to pass to the ApplicationSet controller
|
||||
# @default -- `[]` (See [values.yaml])
|
||||
extraEnvFrom: []
|
||||
# - configMapRef:
|
||||
# name: config-map-name
|
||||
# - secretRef:
|
||||
# name: secret-name
|
||||
|
||||
## Webhook for the Git Generator
|
||||
## Ref: https://argocd-applicationset.readthedocs.io/en/master/Generators-Git/#webhook-configuration)
|
||||
webhook:
|
||||
|
@ -2404,9 +2339,6 @@ notifications:
|
|||
# -- Notifications controller name string
|
||||
name: notifications-controller
|
||||
|
||||
# -- Assign custom [affinity] rules
|
||||
affinity: {}
|
||||
|
||||
# -- Argo CD dashboard url; used in place of {{.context.argocdUrl}} in templates
|
||||
argocdUrl:
|
||||
|
||||
|
@ -2442,8 +2374,32 @@ notifications:
|
|||
# @default -- `[]` (defaults to global.imagePullSecrets)
|
||||
imagePullSecrets: []
|
||||
|
||||
# -- [Node selector]
|
||||
nodeSelector: {}
|
||||
# -- Notifications controller log format. Either `text` or `json`
|
||||
# @default -- `""` (defaults to global.logging.format)
|
||||
logFormat: ""
|
||||
# -- Notifications controller log level. One of: `debug`, `info`, `warn`, `error`
|
||||
# @default -- `""` (defaults to global.logging.level)
|
||||
logLevel: ""
|
||||
|
||||
# -- Extra arguments to provide to the notifications controller
|
||||
extraArgs: []
|
||||
|
||||
# -- Additional container environment variables
|
||||
extraEnv: []
|
||||
|
||||
# -- envFrom to pass to the notifications controller
|
||||
# @default -- `[]` (See [values.yaml])
|
||||
extraEnvFrom: []
|
||||
# - configMapRef:
|
||||
# name: config-map-name
|
||||
# - secretRef:
|
||||
# name: secret-name
|
||||
|
||||
# -- List of extra mounts to add (normally used with extraVolumes)
|
||||
extraVolumeMounts: []
|
||||
|
||||
# -- List of extra volumes to add
|
||||
extraVolumes: []
|
||||
|
||||
# -- Define user-defined context
|
||||
## For more information: https://argocd-notifications.readthedocs.io/en/stable/templates/#defining-user-defined-context
|
||||
|
@ -2474,37 +2430,6 @@ notifications:
|
|||
# email-password:
|
||||
# For more information: https://argocd-notifications.readthedocs.io/en/stable/services/email/
|
||||
|
||||
# -- Notifications controller log format. Either `text` or `json`
|
||||
# @default -- `""` (defaults to global.logging.format)
|
||||
logFormat: ""
|
||||
# -- Notifications controller log level. One of: `debug`, `info`, `warn`, `error`
|
||||
# @default -- `""` (defaults to global.logging.level)
|
||||
logLevel: ""
|
||||
|
||||
# -- Extra arguments to provide to the notifications controller
|
||||
extraArgs: []
|
||||
|
||||
# -- Additional container environment variables
|
||||
extraEnv: []
|
||||
|
||||
# -- envFrom to pass to the notifications controller
|
||||
# @default -- `[]` (See [values.yaml])
|
||||
extraEnvFrom: []
|
||||
# - configMapRef:
|
||||
# name: config-map-name
|
||||
# - secretRef:
|
||||
# name: secret-name
|
||||
|
||||
# -- List of extra mounts to add (normally used with extraVolumes)
|
||||
extraVolumeMounts: []
|
||||
# - mountPath: /tmp/foobar
|
||||
# name: foobar
|
||||
|
||||
# -- List of extra volumes to add
|
||||
extraVolumes: []
|
||||
# - name: foobar
|
||||
# emptyDir: {}
|
||||
|
||||
metrics:
|
||||
# -- Enables prometheus metrics server
|
||||
enabled: false
|
||||
|
@ -2555,6 +2480,15 @@ notifications:
|
|||
# -- Labels to be applied to the notifications controller Pods
|
||||
podLabels: {}
|
||||
|
||||
# -- Resource limits and requests for the notifications controller
|
||||
resources: {}
|
||||
# limits:
|
||||
# cpu: 100m
|
||||
# memory: 128Mi
|
||||
# requests:
|
||||
# cpu: 100m
|
||||
# memory: 128Mi
|
||||
|
||||
# -- Notification controller container-level security Context
|
||||
# @default -- See [values.yaml]
|
||||
containerSecurityContext:
|
||||
|
@ -2567,18 +2501,18 @@ notifications:
|
|||
drop:
|
||||
- ALL
|
||||
|
||||
# -- [Node selector]
|
||||
nodeSelector: {}
|
||||
|
||||
# -- [Tolerations] for use with node taints
|
||||
tolerations: []
|
||||
|
||||
# -- Assign custom [affinity] rules
|
||||
affinity: {}
|
||||
|
||||
# -- Priority class for the notifications controller pods
|
||||
priorityClassName: ""
|
||||
|
||||
# -- Resource limits and requests for the notifications controller
|
||||
resources: {}
|
||||
# limits:
|
||||
# cpu: 100m
|
||||
# memory: 128Mi
|
||||
# requests:
|
||||
# cpu: 100m
|
||||
# memory: 128Mi
|
||||
|
||||
serviceAccount:
|
||||
# -- Specifies whether a service account should be created
|
||||
create: true
|
||||
|
@ -2829,9 +2763,6 @@ notifications:
|
|||
# ]
|
||||
# }]
|
||||
|
||||
# -- [Tolerations] for use with node taints
|
||||
tolerations: []
|
||||
|
||||
# -- The trigger defines the condition when the notification should be sent
|
||||
## For more information: https://argocd-notifications.readthedocs.io/en/stable/triggers/
|
||||
triggers: {}
|
||||
|
|
|
@ -53,4 +53,4 @@ maintainers:
|
|||
url: https://github.com/asserts
|
||||
name: asserts
|
||||
type: application
|
||||
version: 1.24.0
|
||||
version: 1.26.0
|
||||
|
|
|
@ -336,10 +336,11 @@ data:
|
|||
springdoc:
|
||||
pathsToMatch: "/v*/**"
|
||||
|
||||
model:
|
||||
stats:
|
||||
initialDelay: 8640000000
|
||||
fixedDelay: 8640000000
|
||||
graph:
|
||||
trimming:
|
||||
enable: true
|
||||
retentionDays:
|
||||
default: 30
|
||||
|
||||
prometheus:
|
||||
client:
|
||||
|
|
|
@ -31,4 +31,4 @@ name: postgresql
|
|||
sources:
|
||||
- https://github.com/bitnami/containers/tree/main/bitnami/postgresql
|
||||
- https://www.postgresql.org/
|
||||
version: 12.1.6
|
||||
version: 12.1.7
|
||||
|
|
|
@ -101,7 +101,7 @@ kubectl delete pvc -l release=my-release
|
|||
| ---------------------------------------- | --------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------- | -------------------------- |
|
||||
| `image.registry` | PostgreSQL image registry | `docker.io` |
|
||||
| `image.repository` | PostgreSQL image repository | `bitnami/postgresql` |
|
||||
| `image.tag` | PostgreSQL image tag (immutable tags are recommended) | `15.1.0-debian-11-r12` |
|
||||
| `image.tag` | PostgreSQL image tag (immutable tags are recommended) | `15.1.0-debian-11-r19` |
|
||||
| `image.digest` | PostgreSQL image digest in the way sha256:aa.... Please note this parameter, if set, will override the tag | `""` |
|
||||
| `image.pullPolicy` | PostgreSQL image pull policy | `IfNotPresent` |
|
||||
| `image.pullSecrets` | Specify image pull secrets | `[]` |
|
||||
|
@ -382,7 +382,7 @@ kubectl delete pvc -l release=my-release
|
|||
| `volumePermissions.enabled` | Enable init container that changes the owner and group of the persistent volume | `false` |
|
||||
| `volumePermissions.image.registry` | Init container volume-permissions image registry | `docker.io` |
|
||||
| `volumePermissions.image.repository` | Init container volume-permissions image repository | `bitnami/bitnami-shell` |
|
||||
| `volumePermissions.image.tag` | Init container volume-permissions image tag (immutable tags are recommended) | `11-debian-11-r62` |
|
||||
| `volumePermissions.image.tag` | Init container volume-permissions image tag (immutable tags are recommended) | `11-debian-11-r68` |
|
||||
| `volumePermissions.image.digest` | Init container volume-permissions image digest in the way sha256:aa.... Please note this parameter, if set, will override the tag | `""` |
|
||||
| `volumePermissions.image.pullPolicy` | Init container volume-permissions image pull policy | `IfNotPresent` |
|
||||
| `volumePermissions.image.pullSecrets` | Init container volume-permissions image pull secrets | `[]` |
|
||||
|
@ -411,7 +411,7 @@ kubectl delete pvc -l release=my-release
|
|||
| `metrics.enabled` | Start a prometheus exporter | `false` |
|
||||
| `metrics.image.registry` | PostgreSQL Prometheus Exporter image registry | `docker.io` |
|
||||
| `metrics.image.repository` | PostgreSQL Prometheus Exporter image repository | `bitnami/postgres-exporter` |
|
||||
| `metrics.image.tag` | PostgreSQL Prometheus Exporter image tag (immutable tags are recommended) | `0.11.1-debian-11-r39` |
|
||||
| `metrics.image.tag` | PostgreSQL Prometheus Exporter image tag (immutable tags are recommended) | `0.11.1-debian-11-r45` |
|
||||
| `metrics.image.digest` | PostgreSQL image digest in the way sha256:aa.... Please note this parameter, if set, will override the tag | `""` |
|
||||
| `metrics.image.pullPolicy` | PostgreSQL Prometheus Exporter image pull policy | `IfNotPresent` |
|
||||
| `metrics.image.pullSecrets` | Specify image pull secrets | `[]` |
|
||||
|
|
|
@ -95,7 +95,7 @@ diagnosticMode:
|
|||
image:
|
||||
registry: docker.io
|
||||
repository: bitnami/postgresql
|
||||
tag: 15.1.0-debian-11-r12
|
||||
tag: 15.1.0-debian-11-r19
|
||||
digest: ""
|
||||
## Specify a imagePullPolicy
|
||||
## Defaults to 'Always' if image tag is 'latest', else set to 'IfNotPresent'
|
||||
|
@ -1130,7 +1130,7 @@ volumePermissions:
|
|||
image:
|
||||
registry: docker.io
|
||||
repository: bitnami/bitnami-shell
|
||||
tag: 11-debian-11-r62
|
||||
tag: 11-debian-11-r68
|
||||
digest: ""
|
||||
pullPolicy: IfNotPresent
|
||||
## Optionally specify an array of imagePullSecrets.
|
||||
|
@ -1217,7 +1217,7 @@ metrics:
|
|||
image:
|
||||
registry: docker.io
|
||||
repository: bitnami/postgres-exporter
|
||||
tag: 0.11.1-debian-11-r39
|
||||
tag: 0.11.1-debian-11-r45
|
||||
digest: ""
|
||||
pullPolicy: IfNotPresent
|
||||
## Optionally specify an array of imagePullSecrets.
|
||||
|
|
|
@ -27,4 +27,4 @@ maintainers:
|
|||
name: redis
|
||||
sources:
|
||||
- https://github.com/bitnami/containers/tree/main/bitnami/redis
|
||||
version: 17.4.0
|
||||
version: 17.4.1
|
||||
|
|
|
@ -7,7 +7,7 @@ Redis(R) is an open source, advanced key-value store. It is often referred to as
|
|||
[Overview of Redis®](http://redis.io)
|
||||
|
||||
Disclaimer: Redis is a registered trademark of Redis Ltd. Any rights therein are reserved to Redis Ltd. Any use by Bitnami is for referential purposes only and does not indicate any sponsorship, endorsement, or affiliation between Redis Ltd.
|
||||
|
||||
|
||||
## TL;DR
|
||||
|
||||
```bash
|
||||
|
@ -99,7 +99,7 @@ The command removes all the Kubernetes components associated with the chart and
|
|||
| ------------------- | ---------------------------------------------------------------------------------------------------------- | -------------------- |
|
||||
| `image.registry` | Redis® image registry | `docker.io` |
|
||||
| `image.repository` | Redis® image repository | `bitnami/redis` |
|
||||
| `image.tag` | Redis® image tag (immutable tags are recommended) | `7.0.7-debian-11-r2` |
|
||||
| `image.tag` | Redis® image tag (immutable tags are recommended) | `7.0.7-debian-11-r7` |
|
||||
| `image.digest` | Redis® image digest in the way sha256:aa.... Please note this parameter, if set, will override the tag | `""` |
|
||||
| `image.pullPolicy` | Redis® image pull policy | `IfNotPresent` |
|
||||
| `image.pullSecrets` | Redis® image pull secrets | `[]` |
|
||||
|
@ -335,7 +335,7 @@ The command removes all the Kubernetes components associated with the chart and
|
|||
| `sentinel.enabled` | Use Redis® Sentinel on Redis® pods. | `false` |
|
||||
| `sentinel.image.registry` | Redis® Sentinel image registry | `docker.io` |
|
||||
| `sentinel.image.repository` | Redis® Sentinel image repository | `bitnami/redis-sentinel` |
|
||||
| `sentinel.image.tag` | Redis® Sentinel image tag (immutable tags are recommended) | `7.0.7-debian-11-r1` |
|
||||
| `sentinel.image.tag` | Redis® Sentinel image tag (immutable tags are recommended) | `7.0.7-debian-11-r6` |
|
||||
| `sentinel.image.digest` | Redis® Sentinel image digest in the way sha256:aa.... Please note this parameter, if set, will override the tag | `""` |
|
||||
| `sentinel.image.pullPolicy` | Redis® Sentinel image pull policy | `IfNotPresent` |
|
||||
| `sentinel.image.pullSecrets` | Redis® Sentinel image pull secrets | `[]` |
|
||||
|
@ -449,7 +449,7 @@ The command removes all the Kubernetes components associated with the chart and
|
|||
| `metrics.enabled` | Start a sidecar prometheus exporter to expose Redis® metrics | `false` |
|
||||
| `metrics.image.registry` | Redis® Exporter image registry | `docker.io` |
|
||||
| `metrics.image.repository` | Redis® Exporter image repository | `bitnami/redis-exporter` |
|
||||
| `metrics.image.tag` | Redis® Exporter image tag (immutable tags are recommended) | `1.45.0-debian-11-r18` |
|
||||
| `metrics.image.tag` | Redis® Exporter image tag (immutable tags are recommended) | `1.45.0-debian-11-r22` |
|
||||
| `metrics.image.digest` | Redis® Exporter image digest in the way sha256:aa.... Please note this parameter, if set, will override the tag | `""` |
|
||||
| `metrics.image.pullPolicy` | Redis® Exporter image pull policy | `IfNotPresent` |
|
||||
| `metrics.image.pullSecrets` | Redis® Exporter image pull secrets | `[]` |
|
||||
|
@ -494,7 +494,7 @@ The command removes all the Kubernetes components associated with the chart and
|
|||
| `volumePermissions.enabled` | Enable init container that changes the owner/group of the PV mount point to `runAsUser:fsGroup` | `false` |
|
||||
| `volumePermissions.image.registry` | Bitnami Shell image registry | `docker.io` |
|
||||
| `volumePermissions.image.repository` | Bitnami Shell image repository | `bitnami/bitnami-shell` |
|
||||
| `volumePermissions.image.tag` | Bitnami Shell image tag (immutable tags are recommended) | `11-debian-11-r64` |
|
||||
| `volumePermissions.image.tag` | Bitnami Shell image tag (immutable tags are recommended) | `11-debian-11-r68` |
|
||||
| `volumePermissions.image.digest` | Bitnami Shell image digest in the way sha256:aa.... Please note this parameter, if set, will override the tag | `""` |
|
||||
| `volumePermissions.image.pullPolicy` | Bitnami Shell image pull policy | `IfNotPresent` |
|
||||
| `volumePermissions.image.pullSecrets` | Bitnami Shell image pull secrets | `[]` |
|
||||
|
@ -504,7 +504,7 @@ The command removes all the Kubernetes components associated with the chart and
|
|||
| `sysctl.enabled` | Enable init container to modify Kernel settings | `false` |
|
||||
| `sysctl.image.registry` | Bitnami Shell image registry | `docker.io` |
|
||||
| `sysctl.image.repository` | Bitnami Shell image repository | `bitnami/bitnami-shell` |
|
||||
| `sysctl.image.tag` | Bitnami Shell image tag (immutable tags are recommended) | `11-debian-11-r64` |
|
||||
| `sysctl.image.tag` | Bitnami Shell image tag (immutable tags are recommended) | `11-debian-11-r68` |
|
||||
| `sysctl.image.digest` | Bitnami Shell image digest in the way sha256:aa.... Please note this parameter, if set, will override the tag | `""` |
|
||||
| `sysctl.image.pullPolicy` | Bitnami Shell image pull policy | `IfNotPresent` |
|
||||
| `sysctl.image.pullSecrets` | Bitnami Shell image pull secrets | `[]` |
|
||||
|
|
|
@ -79,7 +79,7 @@ diagnosticMode:
|
|||
image:
|
||||
registry: docker.io
|
||||
repository: bitnami/redis
|
||||
tag: 7.0.7-debian-11-r2
|
||||
tag: 7.0.7-debian-11-r7
|
||||
digest: ""
|
||||
## Specify a imagePullPolicy
|
||||
## Defaults to 'Always' if image tag is 'latest', else set to 'IfNotPresent'
|
||||
|
@ -982,7 +982,7 @@ sentinel:
|
|||
image:
|
||||
registry: docker.io
|
||||
repository: bitnami/redis-sentinel
|
||||
tag: 7.0.7-debian-11-r1
|
||||
tag: 7.0.7-debian-11-r6
|
||||
digest: ""
|
||||
## Specify a imagePullPolicy
|
||||
## Defaults to 'Always' if image tag is 'latest', else set to 'IfNotPresent'
|
||||
|
@ -1399,7 +1399,7 @@ metrics:
|
|||
image:
|
||||
registry: docker.io
|
||||
repository: bitnami/redis-exporter
|
||||
tag: 1.45.0-debian-11-r18
|
||||
tag: 1.45.0-debian-11-r22
|
||||
digest: ""
|
||||
pullPolicy: IfNotPresent
|
||||
## Optionally specify an array of imagePullSecrets.
|
||||
|
@ -1597,7 +1597,7 @@ volumePermissions:
|
|||
image:
|
||||
registry: docker.io
|
||||
repository: bitnami/bitnami-shell
|
||||
tag: 11-debian-11-r64
|
||||
tag: 11-debian-11-r68
|
||||
digest: ""
|
||||
pullPolicy: IfNotPresent
|
||||
## Optionally specify an array of imagePullSecrets.
|
||||
|
@ -1645,7 +1645,7 @@ sysctl:
|
|||
image:
|
||||
registry: docker.io
|
||||
repository: bitnami/bitnami-shell
|
||||
tag: 11-debian-11-r64
|
||||
tag: 11-debian-11-r68
|
||||
digest: ""
|
||||
pullPolicy: IfNotPresent
|
||||
## Optionally specify an array of imagePullSecrets.
|
||||
|
|
|
@ -4,7 +4,7 @@ annotations:
|
|||
catalog.cattle.io/kube-version: '>=1.8-0'
|
||||
catalog.cattle.io/release-name: cockroachdb
|
||||
apiVersion: v1
|
||||
appVersion: 22.2.1
|
||||
appVersion: 22.2.2
|
||||
description: CockroachDB is a scalable, survivable, strongly-consistent SQL database.
|
||||
home: https://www.cockroachlabs.com
|
||||
icon: https://raw.githubusercontent.com/cockroachdb/cockroach/master/docs/media/cockroach_db.png
|
||||
|
@ -14,4 +14,4 @@ maintainers:
|
|||
name: cockroachdb
|
||||
sources:
|
||||
- https://github.com/cockroachdb/cockroach
|
||||
version: 10.0.1
|
||||
version: 10.0.2
|
||||
|
|
|
@ -229,10 +229,10 @@ kubectl get pods \
|
|||
```
|
||||
|
||||
```
|
||||
my-release-cockroachdb-0 cockroachdb/cockroach:v22.2.1
|
||||
my-release-cockroachdb-1 cockroachdb/cockroach:v22.2.1
|
||||
my-release-cockroachdb-2 cockroachdb/cockroach:v22.2.1
|
||||
my-release-cockroachdb-3 cockroachdb/cockroach:v22.2.1
|
||||
my-release-cockroachdb-0 cockroachdb/cockroach:v22.2.2
|
||||
my-release-cockroachdb-1 cockroachdb/cockroach:v22.2.2
|
||||
my-release-cockroachdb-2 cockroachdb/cockroach:v22.2.2
|
||||
my-release-cockroachdb-3 cockroachdb/cockroach:v22.2.2
|
||||
```
|
||||
|
||||
Resume normal operations. Once you are comfortable that the stability and performance of the cluster is what you'd expect post-upgrade, finalize the upgrade:
|
||||
|
@ -287,7 +287,7 @@ Verify that no pod is deleted and then upgrade as normal. A new StatefulSet will
|
|||
|
||||
For more information about upgrading a cluster to the latest major release of CockroachDB, see [Upgrade to CockroachDB v21.1](https://www.cockroachlabs.com/docs/stable/upgrade-cockroach-version.html).
|
||||
|
||||
Note that there are some backward-incompatible changes to SQL features between versions 20.2 and 21.1. For details, see the [CockroachDB v22.2.1 release notes](https://www.cockroachlabs.com/docs/releases/v22.2.1.html#backward-incompatible-changes).
|
||||
Note that there are some backward-incompatible changes to SQL features between versions 20.2 and 21.1. For details, see the [CockroachDB v22.2.2 release notes](https://www.cockroachlabs.com/docs/releases/v22.2.2.html#backward-incompatible-changes).
|
||||
|
||||
## Configuration
|
||||
|
||||
|
@ -316,7 +316,7 @@ For details see the [`values.yaml`](values.yaml) file.
|
|||
| `conf.store.size` | CockroachDB storage size | `""` |
|
||||
| `conf.store.attrs` | CockroachDB storage attributes | `""` |
|
||||
| `image.repository` | Container image name | `cockroachdb/cockroach` |
|
||||
| `image.tag` | Container image tag | `v22.2.1` |
|
||||
| `image.tag` | Container image tag | `v22.2.2` |
|
||||
| `image.pullPolicy` | Container pull policy | `IfNotPresent` |
|
||||
| `image.credentials` | `registry`, `user` and `pass` credentials to pull private image | `{}` |
|
||||
| `statefulset.replicas` | StatefulSet replicas number | `3` |
|
||||
|
|
|
@ -1,7 +1,7 @@
|
|||
# Generated file, DO NOT EDIT. Source: build/templates/values.yaml
|
||||
image:
|
||||
repository: cockroachdb/cockroach
|
||||
tag: v22.2.1
|
||||
tag: v22.2.2
|
||||
pullPolicy: IfNotPresent
|
||||
credentials: {}
|
||||
# registry: docker.io
|
||||
|
|
|
@ -1,6 +1,18 @@
|
|||
# Datadog changelog
|
||||
|
||||
# 3.6.5
|
||||
## 3.6.8
|
||||
|
||||
* Add missing RBAC rules for collection of Vertical Pod Autoscaler resources in the Orchestrator Explorer.
|
||||
|
||||
## 3.6.7
|
||||
|
||||
* Default `Agent` and `Cluster-Agent` image tags to `7.41.1`.
|
||||
|
||||
## 3.6.6
|
||||
|
||||
* Fix missing volumeMount in `security-agent` container when `datadog.kubelet.hostCAPath` is provided.
|
||||
|
||||
## 3.6.5
|
||||
|
||||
* Fix missing Cluster Agent configuration in `security-agent` if CSPM is not actived.
|
||||
|
||||
|
|
|
@ -19,4 +19,4 @@ name: datadog
|
|||
sources:
|
||||
- https://app.datadoghq.com/account/settings#agent/kubernetes
|
||||
- https://github.com/DataDog/datadog-agent
|
||||
version: 3.6.5
|
||||
version: 3.6.8
|
||||
|
|
|
@ -1,6 +1,6 @@
|
|||
# Datadog
|
||||
|
||||
![Version: 3.6.5](https://img.shields.io/badge/Version-3.6.5-informational?style=flat-square) ![AppVersion: 7](https://img.shields.io/badge/AppVersion-7-informational?style=flat-square)
|
||||
![Version: 3.6.8](https://img.shields.io/badge/Version-3.6.8-informational?style=flat-square) ![AppVersion: 7](https://img.shields.io/badge/AppVersion-7-informational?style=flat-square)
|
||||
|
||||
[Datadog](https://www.datadoghq.com/) is a hosted infrastructure monitoring platform. This chart adds the Datadog Agent to all nodes in your cluster via a DaemonSet. It also optionally depends on the [kube-state-metrics chart](https://github.com/prometheus-community/helm-charts/tree/main/charts/kube-state-metrics). For more information about monitoring Kubernetes with Datadog, please refer to the [Datadog documentation website](https://docs.datadoghq.com/agent/basic_agent_usage/kubernetes/).
|
||||
|
||||
|
@ -443,7 +443,7 @@ helm install <RELEASE_NAME> \
|
|||
| agents.image.pullPolicy | string | `"IfNotPresent"` | Datadog Agent image pull policy |
|
||||
| agents.image.pullSecrets | list | `[]` | Datadog Agent repository pullSecret (ex: specify docker registry credentials) |
|
||||
| agents.image.repository | string | `nil` | Override default registry + image.name for Agent |
|
||||
| agents.image.tag | string | `"7.41.0"` | Define the Agent version to use |
|
||||
| agents.image.tag | string | `"7.41.1"` | Define the Agent version to use |
|
||||
| agents.image.tagSuffix | string | `""` | Suffix to append to Agent tag |
|
||||
| agents.localService.forceLocalServiceEnabled | bool | `false` | Force the creation of the internal traffic policy service to target the agent running on the local node. By default, the internal traffic service is created only on Kubernetes 1.22+ where the feature became beta and enabled by default. This option allows to force the creation of the internal traffic service on kubernetes 1.21 where the feature was alpha and required a feature gate to be explicitly enabled. |
|
||||
| agents.localService.overrideName | string | `""` | Name of the internal traffic service to target the agent running on the local node |
|
||||
|
@ -501,7 +501,7 @@ helm install <RELEASE_NAME> \
|
|||
| clusterAgent.image.pullPolicy | string | `"IfNotPresent"` | Cluster Agent image pullPolicy |
|
||||
| clusterAgent.image.pullSecrets | list | `[]` | Cluster Agent repository pullSecret (ex: specify docker registry credentials) |
|
||||
| clusterAgent.image.repository | string | `nil` | Override default registry + image.name for Cluster Agent |
|
||||
| clusterAgent.image.tag | string | `"7.41.0"` | Cluster Agent image tag to use |
|
||||
| clusterAgent.image.tag | string | `"7.41.1"` | Cluster Agent image tag to use |
|
||||
| clusterAgent.livenessProbe | object | Every 15s / 6 KO / 1 OK | Override default Cluster Agent liveness probe settings |
|
||||
| clusterAgent.metricsProvider.aggregator | string | `"avg"` | Define the aggregator the cluster agent will use to process the metrics. The options are (avg, min, max, sum) |
|
||||
| clusterAgent.metricsProvider.createReaderRbac | bool | `true` | Create `external-metrics-reader` RBAC automatically (to allow HPA to read data from Cluster Agent) |
|
||||
|
@ -547,7 +547,7 @@ helm install <RELEASE_NAME> \
|
|||
| clusterChecksRunner.image.pullPolicy | string | `"IfNotPresent"` | Datadog Agent image pull policy |
|
||||
| clusterChecksRunner.image.pullSecrets | list | `[]` | Datadog Agent repository pullSecret (ex: specify docker registry credentials) |
|
||||
| clusterChecksRunner.image.repository | string | `nil` | Override default registry + image.name for Cluster Check Runners |
|
||||
| clusterChecksRunner.image.tag | string | `"7.41.0"` | Define the Agent version to use |
|
||||
| clusterChecksRunner.image.tag | string | `"7.41.1"` | Define the Agent version to use |
|
||||
| clusterChecksRunner.image.tagSuffix | string | `""` | Suffix to append to Agent tag |
|
||||
| clusterChecksRunner.livenessProbe | object | Every 15s / 6 KO / 1 OK | Override default agent liveness probe settings |
|
||||
| clusterChecksRunner.networkPolicy.create | bool | `false` | If true, create a NetworkPolicy for the cluster checks runners. DEPRECATED. Use datadog.networkPolicy.create instead |
|
||||
|
|
|
@ -87,6 +87,9 @@
|
|||
- name: procdir
|
||||
mountPath: /host/proc
|
||||
readOnly: true
|
||||
{{- if .Values.datadog.kubelet.hostCAPath }}
|
||||
{{ include "datadog.kubelet.volumeMount" . | indent 4 }}
|
||||
{{- end }}
|
||||
{{- if .Values.datadog.securityAgent.compliance.configMap }}
|
||||
- name: complianceconfigdir
|
||||
mountPath: /etc/datadog-agent/compliance.d
|
||||
|
|
|
@ -168,6 +168,14 @@ rules:
|
|||
- list
|
||||
- get
|
||||
- watch
|
||||
- apiGroups:
|
||||
- autoscaling.k8s.io
|
||||
resources:
|
||||
- verticalpodautoscalers
|
||||
verbs:
|
||||
- list
|
||||
- get
|
||||
- watch
|
||||
- apiGroups:
|
||||
- "apiextensions.k8s.io"
|
||||
resources:
|
||||
|
|
|
@ -757,7 +757,7 @@ clusterAgent:
|
|||
name: cluster-agent
|
||||
|
||||
# clusterAgent.image.tag -- Cluster Agent image tag to use
|
||||
tag: 7.41.0
|
||||
tag: 7.41.1
|
||||
|
||||
# clusterAgent.image.digest -- Cluster Agent image digest to use, takes precedence over tag if specified
|
||||
digest: ""
|
||||
|
@ -1079,7 +1079,7 @@ agents:
|
|||
name: agent
|
||||
|
||||
# agents.image.tag -- Define the Agent version to use
|
||||
tag: 7.41.0
|
||||
tag: 7.41.1
|
||||
|
||||
# agents.image.digest -- Define Agent image digest to use, takes precedence over tag if specified
|
||||
digest: ""
|
||||
|
@ -1519,7 +1519,7 @@ clusterChecksRunner:
|
|||
name: agent
|
||||
|
||||
# clusterChecksRunner.image.tag -- Define the Agent version to use
|
||||
tag: 7.41.0
|
||||
tag: 7.41.1
|
||||
|
||||
# clusterChecksRunner.image.digest -- Define Agent image digest to use, takes precedence over tag if specified
|
||||
digest: ""
|
||||
|
|
|
@ -4,7 +4,7 @@ annotations:
|
|||
catalog.cattle.io/kube-version: '>= 1.19.0-0'
|
||||
catalog.cattle.io/release-name: external-secrets
|
||||
apiVersion: v2
|
||||
appVersion: v0.7.0
|
||||
appVersion: v0.7.1
|
||||
description: External secret management for Kubernetes
|
||||
home: https://github.com/external-secrets/external-secrets
|
||||
icon: https://raw.githubusercontent.com/external-secrets/external-secrets/main/assets/eso-logo-large.png
|
||||
|
@ -17,4 +17,4 @@ maintainers:
|
|||
name: mcavoyk
|
||||
name: external-secrets
|
||||
type: application
|
||||
version: 0.7.0
|
||||
version: 0.7.1
|
||||
|
|
|
@ -4,7 +4,7 @@
|
|||
|
||||
[//]: # (README.md generated by gotmpl. DO NOT EDIT.)
|
||||
|
||||
![Type: application](https://img.shields.io/badge/Type-application-informational?style=flat-square) ![Version: 0.7.0](https://img.shields.io/badge/Version-0.7.0-informational?style=flat-square)
|
||||
![Type: application](https://img.shields.io/badge/Type-application-informational?style=flat-square) ![Version: 0.7.1](https://img.shields.io/badge/Version-0.7.1-informational?style=flat-square)
|
||||
|
||||
External secret management for Kubernetes
|
||||
|
||||
|
@ -65,6 +65,7 @@ The command removes all the Kubernetes components associated with the chart and
|
|||
| certController.resources | object | `{}` | |
|
||||
| certController.securityContext | object | `{}` | |
|
||||
| certController.serviceAccount.annotations | object | `{}` | Annotations to add to the service account. |
|
||||
| certController.serviceAccount.automount | bool | `true` | Automounts the service account token in all containers of the pod |
|
||||
| certController.serviceAccount.create | bool | `true` | Specifies whether a service account should be created. |
|
||||
| certController.serviceAccount.extraLabels | object | `{}` | Extra Labels to add to the service account. |
|
||||
| certController.serviceAccount.name | string | `""` | The name of the service account to use. If not set and create is true, a name is generated using the fullname template. |
|
||||
|
@ -113,6 +114,7 @@ The command removes all the Kubernetes components associated with the chart and
|
|||
| scopedRBAC | bool | `false` | Must be used with scopedNamespace. If true, create scoped RBAC roles under the scoped namespace and implicitly disable cluster stores and cluster external secrets |
|
||||
| securityContext | object | `{}` | |
|
||||
| serviceAccount.annotations | object | `{}` | Annotations to add to the service account. |
|
||||
| serviceAccount.automount | bool | `true` | Automounts the service account token in all containers of the pod |
|
||||
| serviceAccount.create | bool | `true` | Specifies whether a service account should be created. |
|
||||
| serviceAccount.extraLabels | object | `{}` | Extra Labels to add to the service account. |
|
||||
| serviceAccount.name | string | `""` | The name of the service account to use. If not set and create is true, a name is generated using the fullname template. |
|
||||
|
@ -159,6 +161,7 @@ The command removes all the Kubernetes components associated with the chart and
|
|||
| webhook.secretAnnotations | object | `{}` | Annotations to add to Secret |
|
||||
| webhook.securityContext | object | `{}` | |
|
||||
| webhook.serviceAccount.annotations | object | `{}` | Annotations to add to the service account. |
|
||||
| webhook.serviceAccount.automount | bool | `true` | Automounts the service account token in all containers of the pod |
|
||||
| webhook.serviceAccount.create | bool | `true` | Specifies whether a service account should be created. |
|
||||
| webhook.serviceAccount.extraLabels | object | `{}` | Extra Labels to add to the service account. |
|
||||
| webhook.serviceAccount.name | string | `""` | The name of the service account to use. If not set and create is true, a name is generated using the fullname template. |
|
||||
|
|
|
@ -32,6 +32,7 @@ spec:
|
|||
{{- toYaml . | nindent 8 }}
|
||||
{{- end }}
|
||||
serviceAccountName: {{ include "external-secrets-cert-controller.serviceAccountName" . }}
|
||||
automountServiceAccountToken: {{ .Values.certController.serviceAccount.automount }}
|
||||
{{- with .Values.certController.podSecurityContext }}
|
||||
securityContext:
|
||||
{{- toYaml . | nindent 8 }}
|
||||
|
@ -51,6 +52,10 @@ spec:
|
|||
- --service-namespace={{ .Release.Namespace }}
|
||||
- --secret-name={{ include "external-secrets.fullname" . }}-webhook
|
||||
- --secret-namespace={{ .Release.Namespace }}
|
||||
{{ if not .Values.crds.createClusterSecretStore -}}
|
||||
- --crd-names=externalsecrets.external-secrets.io
|
||||
- --crd-names=secretstores.external-secrets.io
|
||||
{{- end -}}
|
||||
{{- range $key, $value := .Values.certController.extraArgs }}
|
||||
{{- if $value }}
|
||||
- --{{ $key }}={{ $value }}
|
||||
|
|
|
@ -308,8 +308,6 @@ spec:
|
|||
type: object
|
||||
templateFrom:
|
||||
items:
|
||||
maxProperties: 1
|
||||
minProperties: 1
|
||||
properties:
|
||||
configMap:
|
||||
properties:
|
||||
|
@ -318,22 +316,8 @@ spec:
|
|||
properties:
|
||||
key:
|
||||
type: string
|
||||
required:
|
||||
- key
|
||||
type: object
|
||||
type: array
|
||||
name:
|
||||
type: string
|
||||
required:
|
||||
- items
|
||||
- name
|
||||
type: object
|
||||
secret:
|
||||
properties:
|
||||
items:
|
||||
items:
|
||||
properties:
|
||||
key:
|
||||
templateAs:
|
||||
default: Values
|
||||
type: string
|
||||
required:
|
||||
- key
|
||||
|
@ -345,6 +329,31 @@ spec:
|
|||
- items
|
||||
- name
|
||||
type: object
|
||||
literal:
|
||||
type: string
|
||||
secret:
|
||||
properties:
|
||||
items:
|
||||
items:
|
||||
properties:
|
||||
key:
|
||||
type: string
|
||||
templateAs:
|
||||
default: Values
|
||||
type: string
|
||||
required:
|
||||
- key
|
||||
type: object
|
||||
type: array
|
||||
name:
|
||||
type: string
|
||||
required:
|
||||
- items
|
||||
- name
|
||||
type: object
|
||||
target:
|
||||
default: Data
|
||||
type: string
|
||||
type: object
|
||||
type: array
|
||||
type:
|
||||
|
|
|
@ -518,8 +518,6 @@ spec:
|
|||
type: object
|
||||
templateFrom:
|
||||
items:
|
||||
maxProperties: 1
|
||||
minProperties: 1
|
||||
properties:
|
||||
configMap:
|
||||
properties:
|
||||
|
@ -528,22 +526,8 @@ spec:
|
|||
properties:
|
||||
key:
|
||||
type: string
|
||||
required:
|
||||
- key
|
||||
type: object
|
||||
type: array
|
||||
name:
|
||||
type: string
|
||||
required:
|
||||
- items
|
||||
- name
|
||||
type: object
|
||||
secret:
|
||||
properties:
|
||||
items:
|
||||
items:
|
||||
properties:
|
||||
key:
|
||||
templateAs:
|
||||
default: Values
|
||||
type: string
|
||||
required:
|
||||
- key
|
||||
|
@ -555,6 +539,31 @@ spec:
|
|||
- items
|
||||
- name
|
||||
type: object
|
||||
literal:
|
||||
type: string
|
||||
secret:
|
||||
properties:
|
||||
items:
|
||||
items:
|
||||
properties:
|
||||
key:
|
||||
type: string
|
||||
templateAs:
|
||||
default: Values
|
||||
type: string
|
||||
required:
|
||||
- key
|
||||
type: object
|
||||
type: array
|
||||
name:
|
||||
type: string
|
||||
required:
|
||||
- items
|
||||
- name
|
||||
type: object
|
||||
target:
|
||||
default: Data
|
||||
type: string
|
||||
type: object
|
||||
type: array
|
||||
type:
|
||||
|
|
|
@ -32,6 +32,7 @@ spec:
|
|||
{{- toYaml . | nindent 8 }}
|
||||
{{- end }}
|
||||
serviceAccountName: {{ include "external-secrets.serviceAccountName" . }}
|
||||
automountServiceAccountToken: {{ .Values.serviceAccount.automount }}
|
||||
{{- with .Values.podSecurityContext }}
|
||||
securityContext:
|
||||
{{- toYaml . | nindent 8 }}
|
||||
|
|
|
@ -33,6 +33,7 @@ spec:
|
|||
{{- end }}
|
||||
hostNetwork: {{ .Values.webhook.hostNetwork}}
|
||||
serviceAccountName: {{ include "external-secrets-webhook.serviceAccountName" . }}
|
||||
automountServiceAccountToken: {{ .Values.webhook.serviceAccount.automount }}
|
||||
{{- with .Values.webhook.podSecurityContext }}
|
||||
securityContext:
|
||||
{{- toYaml . | nindent 8 }}
|
||||
|
|
|
@ -13,7 +13,7 @@ metadata:
|
|||
prometheus.io/scrape: "true"
|
||||
prometheus.io/port: {{ .Values.prometheus.service.port | quote }}
|
||||
{{- else }}
|
||||
{{- with .Values.metrics.service.annotations }}
|
||||
{{- with .Values.webhook.metrics.service.annotations }}
|
||||
annotations:
|
||||
{{- toYaml . | nindent 4 }}
|
||||
{{- end }}
|
||||
|
|
|
@ -56,6 +56,8 @@ concurrent: 1
|
|||
serviceAccount:
|
||||
# -- Specifies whether a service account should be created.
|
||||
create: true
|
||||
# -- Automounts the service account token in all containers of the pod
|
||||
automount: true
|
||||
# -- Annotations to add to the service account.
|
||||
annotations: {}
|
||||
# -- Extra Labels to add to the service account.
|
||||
|
@ -179,6 +181,8 @@ webhook:
|
|||
serviceAccount:
|
||||
# -- Specifies whether a service account should be created.
|
||||
create: true
|
||||
# -- Automounts the service account token in all containers of the pod
|
||||
automount: true
|
||||
# -- Annotations to add to the service account.
|
||||
annotations: {}
|
||||
# -- Extra Labels to add to the service account.
|
||||
|
@ -296,6 +300,8 @@ certController:
|
|||
serviceAccount:
|
||||
# -- Specifies whether a service account should be created.
|
||||
create: true
|
||||
# -- Automounts the service account token in all containers of the pod
|
||||
automount: true
|
||||
# -- Annotations to add to the service account.
|
||||
annotations: {}
|
||||
# -- Extra Labels to add to the service account.
|
||||
|
|
|
@ -0,0 +1,23 @@
|
|||
# Patterns to ignore when building packages.
|
||||
# This supports shell glob matching, relative path matching, and
|
||||
# negation (prefixed with !). Only one pattern per line.
|
||||
.DS_Store
|
||||
# Common VCS dirs
|
||||
.git/
|
||||
.gitignore
|
||||
.bzr/
|
||||
.bzrignore
|
||||
.hg/
|
||||
.hgignore
|
||||
.svn/
|
||||
# Common backup files
|
||||
*.swp
|
||||
*.bak
|
||||
*.tmp
|
||||
*~
|
||||
# Various IDEs
|
||||
.project
|
||||
.idea/
|
||||
*.tmproj
|
||||
# OWNERS file for helm
|
||||
OWNERS
|
|
@ -9,7 +9,7 @@ annotations:
|
|||
catalog.cattle.io/kube-version: '>=1.21-0'
|
||||
catalog.cattle.io/release-name: instana-agent
|
||||
apiVersion: v2
|
||||
appVersion: 1.238.0
|
||||
appVersion: 1.239.0
|
||||
description: Instana Agent for Kubernetes
|
||||
home: https://www.instana.com/
|
||||
icon: https://agents.instana.io/helm/stan-logo-2020.png
|
||||
|
@ -23,4 +23,4 @@ maintainers:
|
|||
name: instana-agent
|
||||
sources:
|
||||
- https://github.com/instana/instana-agent-docker
|
||||
version: 1.2.48
|
||||
version: 1.2.49
|
||||
|
|
|
@ -100,16 +100,15 @@ spec:
|
|||
- name: INSTANA_KUBERNETES_REDACT_SECRETS
|
||||
value: {{ .Values.agent.redactKubernetesSecrets | quote }}
|
||||
{{- end }}
|
||||
{{- if .Values.agent.configuration_yaml }}
|
||||
- name: CONFIG_PATH
|
||||
value: /root
|
||||
{{- end }}
|
||||
|
||||
volumeMounts:
|
||||
{{- include "instana-agent.commonVolumeMounts" . | nindent 12 }}
|
||||
- name: kubernetes-sensor-configuration
|
||||
- name: configuration
|
||||
subPath: configuration.yaml
|
||||
mountPath: /root/configuration.yaml
|
||||
{{- if .Values.agent.tls }}
|
||||
{{- if or .Values.agent.tls.secretName (and .Values.agent.tls.certificate .Values.agent.tls.key) }}
|
||||
{{- include "instana-agent.tls-volumeMounts" . | nindent 12 }}
|
||||
{{- end }}
|
||||
{{- end }}
|
||||
resources:
|
||||
requests:
|
||||
{{- include "instana-agent.resources" .Values.k8s_sensor.deployment.pod.requests | nindent 14 }}
|
||||
|
@ -117,6 +116,10 @@ spec:
|
|||
{{- include "instana-agent.resources" .Values.k8s_sensor.deployment.pod.limits | nindent 14 }}
|
||||
ports:
|
||||
- containerPort: 42699
|
||||
volumes:
|
||||
- name: configuration
|
||||
configMap:
|
||||
name: {{ include "instana-agent.fullname" . }}
|
||||
{{- if .Values.k8s_sensor.deployment.pod.tolerations }}
|
||||
tolerations:
|
||||
{{- toYaml .Values.k8s_sensor.deployment.pod.tolerations | nindent 8 }}
|
||||
|
@ -135,16 +138,6 @@ spec:
|
|||
operator: In
|
||||
values: [ KUBERNETES ]
|
||||
topologyKey: "kubernetes.io/hostname"
|
||||
volumes:
|
||||
{{- include "instana-agent.commonVolumes" . | nindent 8 }}
|
||||
- name: kubernetes-sensor-configuration
|
||||
configMap:
|
||||
name: k8sensor
|
||||
{{- if .Values.agent.tls }}
|
||||
{{- if or .Values.agent.tls.secretName (and .Values.agent.tls.certificate .Values.agent.tls.key) }}
|
||||
{{- include "instana-agent.tls-volume" . | nindent 8 }}
|
||||
{{- end }}
|
||||
{{- end }}
|
||||
{{- end -}}
|
||||
{{- end -}}
|
||||
{{- end -}}
|
||||
|
|
|
@ -12,6 +12,14 @@ Use the following links to reference issues, PRs, and commits prior to v2.6.0.
|
|||
The change log until v1.5.7 was auto-generated based on git commits.
|
||||
Those entries include a reference to the git commit to be able to get more details.
|
||||
|
||||
## 4.2.19
|
||||
|
||||
CronJob api version upgraded to batch/v1
|
||||
|
||||
## 4.2.18
|
||||
|
||||
Added option to set secretEnvVars.
|
||||
|
||||
## 4.2.17
|
||||
|
||||
Update Jenkins image and appVersion to jenkins lts release version 2.375.1
|
||||
|
|
|
@ -41,4 +41,4 @@ sources:
|
|||
- https://github.com/jenkinsci/docker-inbound-agent
|
||||
- https://github.com/maorfr/kube-tasks
|
||||
- https://github.com/jenkinsci/configuration-as-code-plugin
|
||||
version: 4.2.17
|
||||
version: 4.2.19
|
||||
|
|
|
@ -396,5 +396,6 @@ The following tables list the configurable parameters of the Jenkins chart and t
|
|||
| `backup.runAsUser` | Deprecated in favor of `backup.podSecurityContextOverride`. uid that jenkins runs with. | `1000` |
|
||||
| `backup.fsGroup` | Deprecated in favor of `backup.podSecurityContextOverride`. uid that will be used for persistent volume. | `1000` |
|
||||
| `backup.podSecurityContextOverride` | Completely overwrites the contents of the backup pod's security context, ignoring the values provided for `runAsUser`, and `fsGroup`. | Not set |
|
||||
| `cronJob.apiVersion` | CronJob API version | 'batch/v1' |
|
||||
| `awsSecurityGroupPolicies.enabled` | Enable the creation of SecurityGroupPolicy resources | `false` |
|
||||
| `awsSecurityGroupPolicies.policies` | Security Group Policy definitions. `awsSecurityGroupPolicies.enabled` must be `true` | Not set |
|
|
@ -287,13 +287,20 @@ Returns kubernetes pod template configuration as code
|
|||
ttyEnabled: {{ $additionalContainers.TTYEnabled | default $.Values.agent.TTYEnabled }}
|
||||
workingDir: {{ $additionalContainers.workingDir | default $.Values.agent.workingDir }}
|
||||
{{- end }}
|
||||
{{- if .Values.agent.envVars }}
|
||||
{{- if or .Values.agent.envVars .Values.agent.secretEnvVars }}
|
||||
envVars:
|
||||
{{- range $index, $var := .Values.agent.envVars }}
|
||||
- envVar:
|
||||
key: {{ $var.name }}
|
||||
value: {{ tpl $var.value $ }}
|
||||
{{- end }}
|
||||
{{- range $index, $var := .Values.agent.secretEnvVars }}
|
||||
- secretEnvVar:
|
||||
key: {{ $var.key }}
|
||||
secretName: {{ $var.secretName }}
|
||||
secretKey: {{ $var.secretKey }}
|
||||
optional: {{ $var.optional | default false }}
|
||||
{{- end }}
|
||||
{{- end }}
|
||||
idleMinutes: {{ .Values.agent.idleMinutes }}
|
||||
instanceCap: 2147483647
|
||||
|
|
|
@ -1,5 +1,5 @@
|
|||
{{- if .Values.backup.enabled }}
|
||||
apiVersion: batch/v1beta1
|
||||
apiVersion: {{ .Values.cronJob.apiVersion }}
|
||||
kind: CronJob
|
||||
metadata:
|
||||
name: {{ template "jenkins.fullname" . }}-backup
|
||||
|
|
|
@ -700,6 +700,12 @@ agent:
|
|||
envVars: []
|
||||
# - name: PATH
|
||||
# value: /usr/local/bin
|
||||
# Mount a secret as environment variable
|
||||
secretEnvVars: []
|
||||
# - key: PATH
|
||||
# optional: false # default: false
|
||||
# secretKey: MY-K8S-PATH
|
||||
# secretName: my-k8s-secret
|
||||
nodeSelector: {}
|
||||
# Key Value selectors. Ex:
|
||||
# jenkins-agent: v1
|
||||
|
@ -934,6 +940,9 @@ backup:
|
|||
securityContextCapabilities: {}
|
||||
# drop:
|
||||
# - NET_RAW
|
||||
cronJob:
|
||||
apiVersion: batch/v1
|
||||
|
||||
checkDeprecation: true
|
||||
|
||||
awsSecurityGroupPolicies:
|
||||
|
|
|
@ -1,7 +1,12 @@
|
|||
# JFrog Artifactory-ha Chart Changelog
|
||||
All changes to this chart will be documented in this file
|
||||
|
||||
## [107.47.14] - Oct 27, 2022
|
||||
## [107.49.3] - Dec 14, 2022
|
||||
* Updated initContainerImage and logger image to `ubi8/ubi-micro:8.7.1`
|
||||
* Changed logic in wait-for-primary container to use /dev/tcp instead of curl
|
||||
* Added option to enable/disable proxy_request_buffering and proxy_buffering_off [GH-1686](https://github.com/jfrog/charts/pull/1686)
|
||||
|
||||
## [107.48.0] - Oct 27, 2022
|
||||
* Updated router version to `7.51.0`
|
||||
|
||||
## [107.47.0] - Sep 29, 2022
|
||||
|
|
|
@ -4,7 +4,7 @@ annotations:
|
|||
catalog.cattle.io/kube-version: '>= 1.14.0-0'
|
||||
catalog.cattle.io/release-name: artifactory-ha
|
||||
apiVersion: v2
|
||||
appVersion: 7.47.14
|
||||
appVersion: 7.49.3
|
||||
dependencies:
|
||||
- condition: postgresql.enabled
|
||||
name: postgresql
|
||||
|
@ -26,4 +26,4 @@ name: artifactory-ha
|
|||
sources:
|
||||
- https://github.com/jfrog/charts
|
||||
type: application
|
||||
version: 107.47.14
|
||||
version: 107.49.3
|
||||
|
|
|
@ -4,6 +4,7 @@ artifactory:
|
|||
enabled: true
|
||||
fsGroupChangePolicy: "OnRootMismatch"
|
||||
masterKey: FFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFF
|
||||
unifiedSecretInstallation: true
|
||||
persistence:
|
||||
enabled: false
|
||||
replicator:
|
||||
|
|
|
@ -141,13 +141,11 @@ spec:
|
|||
echo "Sleeping to allow time for primary node to come up";
|
||||
sleep {{ .Values.artifactory.node.waitForPrimaryStartup.time }};
|
||||
{{- else }}
|
||||
response="";
|
||||
url={{ include "artifactory-ha.scheme" . }}://{{ template "artifactory-ha.primary.name" . }}:{{ .Values.artifactory.externalPort }};
|
||||
while [ "$response" != "200" ];
|
||||
do echo "Primary not ready. Waiting..."; sleep 3;
|
||||
response=$(curl -k --connect-timeout 5 --write-out '%{http_code}' --silent --output /dev/null $url);
|
||||
done;
|
||||
echo "Primary node ready!";
|
||||
ready=false;
|
||||
while ! $ready; do echo Primary not ready. Waiting...;
|
||||
timeout 2s bash -c "</dev/tcp/{{ template "artifactory-ha.primary.name" . }}/{{ .Values.artifactory.externalPort }}"; exit_status=$?;
|
||||
if [[ $exit_status -eq 0 ]]; then ready=true; echo "Primary node ready!"; fi; sleep 3;
|
||||
done
|
||||
{{- end }}
|
||||
resources:
|
||||
{{ toYaml .Values.initContainers.resources | indent 10 }}
|
||||
|
|
File diff suppressed because it is too large
Load Diff
|
@ -1,7 +1,7 @@
|
|||
# JFrog Container Registry Chart Changelog
|
||||
All changes to this chart will be documented in this file.
|
||||
|
||||
## [107.47.14] - Aug 25, 2022
|
||||
## [107.49.3] - Aug 25, 2022
|
||||
* Included event service as mandatory and remove the flag from values.yaml
|
||||
|
||||
## [107.41.0] - Jul 22, 2022
|
||||
|
|
|
@ -4,11 +4,11 @@ annotations:
|
|||
catalog.cattle.io/kube-version: '>= 1.14.0-0'
|
||||
catalog.cattle.io/release-name: artifactory-jcr
|
||||
apiVersion: v2
|
||||
appVersion: 7.47.14
|
||||
appVersion: 7.49.3
|
||||
dependencies:
|
||||
- name: artifactory
|
||||
repository: file://./charts/artifactory
|
||||
version: 107.47.14
|
||||
version: 107.49.3
|
||||
description: JFrog Container Registry
|
||||
home: https://jfrog.com/container-registry/
|
||||
icon: https://raw.githubusercontent.com/jfrog/charts/ea5c3112c24a973f64f3ccd99747323db292a369/stable/artifactory-jcr/logo/jcr-logo.png
|
||||
|
@ -27,4 +27,4 @@ name: artifactory-jcr
|
|||
sources:
|
||||
- https://github.com/jfrog/charts
|
||||
type: application
|
||||
version: 107.47.14
|
||||
version: 107.49.3
|
||||
|
|
|
@ -1,7 +1,11 @@
|
|||
# JFrog Artifactory Chart Changelog
|
||||
All changes to this chart will be documented in this file.
|
||||
|
||||
## [107.47.14] - Oct 27, 2022
|
||||
## [107.49.3] - Dec 14, 2022
|
||||
* Updated initContainerImage and logger image to `ubi8/ubi-micro:8.7.1`
|
||||
* Added option to enable/disable proxy_request_buffering and proxy_buffering_off [GH-1686](https://github.com/jfrog/charts/pull/1686)
|
||||
|
||||
## [107.48.0] - Oct 27, 2022
|
||||
* Updated router version to `7.51.0`
|
||||
|
||||
## [107.47.0] - Sep 29, 2022
|
||||
|
|
|
@ -1,5 +1,5 @@
|
|||
apiVersion: v2
|
||||
appVersion: 7.47.14
|
||||
appVersion: 7.49.3
|
||||
dependencies:
|
||||
- condition: postgresql.enabled
|
||||
name: postgresql
|
||||
|
@ -21,4 +21,4 @@ name: artifactory
|
|||
sources:
|
||||
- https://github.com/jfrog/charts
|
||||
type: application
|
||||
version: 107.47.14
|
||||
version: 107.49.3
|
||||
|
|
|
@ -3,6 +3,7 @@ artifactory:
|
|||
replicaCount: 3
|
||||
joinKey: EEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEE
|
||||
masterKey: FFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFF
|
||||
unifiedSecretInstallation: true
|
||||
openMetrics:
|
||||
enabled: true
|
||||
persistence:
|
||||
|
|
File diff suppressed because it is too large
Load Diff
|
@ -9,7 +9,6 @@
|
|||
|
||||
## All values are under the 'artifactory' sub chart.
|
||||
artifactory:
|
||||
|
||||
## Artifactory
|
||||
## See full list of supported Artifactory options and documentation in artifactory chart: https://github.com/jfrog/charts/tree/master/stable/artifactory
|
||||
artifactory:
|
||||
|
@ -18,7 +17,6 @@ artifactory:
|
|||
registry: releases-docker.jfrog.io
|
||||
repository: jfrog/artifactory-jcr
|
||||
# tag:
|
||||
|
||||
## Uncomment the following resources definitions or pass them from command line
|
||||
## to control the cpu and memory resources allocated by the Kubernetes cluster
|
||||
resources: {}
|
||||
|
@ -32,13 +30,11 @@ artifactory:
|
|||
## You should set them according to the resources set above.
|
||||
## IMPORTANT: Make sure resources.limits.memory is at least 1G more than Xmx.
|
||||
javaOpts: {}
|
||||
# xms: "1g"
|
||||
# xmx: "3g"
|
||||
# other: ""
|
||||
|
||||
# xms: "1g"
|
||||
# xmx: "3g"
|
||||
# other: ""
|
||||
installer:
|
||||
platform: jcr-helm
|
||||
|
||||
installerInfo: '{"productId": "Helm_artifactory-jcr/{{ .Chart.Version }}", "features": [ { "featureId": "Platform/{{ default "kubernetes" .Values.installer.platform }}"}]}'
|
||||
## Nginx
|
||||
## See full list of supported Nginx options and documentation in artifactory chart: https://github.com/jfrog/charts/tree/master/stable/artifactory
|
||||
|
@ -47,31 +43,32 @@ artifactory:
|
|||
tlsSecretName: ""
|
||||
service:
|
||||
type: LoadBalancer
|
||||
|
||||
## Ingress
|
||||
## See full list of supported Ingress options and documentation in artifactory chart: https://github.com/jfrog/charts/tree/master/stable/artifactory
|
||||
ingress:
|
||||
enabled: false
|
||||
tls:
|
||||
|
||||
## PostgreSQL
|
||||
## See list of supported postgresql options and documentation in artifactory chart: https://github.com/jfrog/charts/tree/master/stable/artifactory
|
||||
## Configuration values for the PostgreSQL dependency sub-chart
|
||||
## ref: https://github.com/bitnami/charts/blob/master/bitnami/postgresql/README.md
|
||||
postgresql:
|
||||
enabled: true
|
||||
|
||||
## This key is required for upgrades to protect old PostgreSQL chart's breaking changes.
|
||||
databaseUpgradeReady: "yes"
|
||||
|
||||
## If NOT using the PostgreSQL in this chart (artifactory.postgresql.enabled=false),
|
||||
## specify custom database details here or leave empty and Artifactory will use embedded derby.
|
||||
## See full list of database options and documentation in artifactory chart: https://github.com/jfrog/charts/tree/master/stable/artifactory
|
||||
# database:
|
||||
|
||||
jfconnect:
|
||||
enabled: false
|
||||
|
||||
## Enable the PostgreSQL sub chart
|
||||
postgresql:
|
||||
enabled: true
|
||||
router:
|
||||
image:
|
||||
tag: 7.56.0
|
||||
logger:
|
||||
image:
|
||||
tag: 8.7.1
|
||||
initContainerImage: releases-docker.jfrog.io/ubi8/ubi-micro:8.7.1
|
||||
|
|
|
@ -4,7 +4,7 @@ annotations:
|
|||
catalog.cattle.io/kube-version: '>=1.19-0'
|
||||
catalog.cattle.io/release-name: minio-operator
|
||||
apiVersion: v2
|
||||
appVersion: v4.5.5
|
||||
appVersion: v4.5.6
|
||||
description: A Helm chart for MinIO Operator
|
||||
home: https://min.io
|
||||
icon: https://min.io/resources/img/logo/MINIO_wordmark.png
|
||||
|
@ -19,4 +19,4 @@ name: minio-operator
|
|||
sources:
|
||||
- https://github.com/minio/operator
|
||||
type: application
|
||||
version: 4.5.5
|
||||
version: 4.5.6
|
||||
|
|
|
@ -63,6 +63,10 @@ spec:
|
|||
{{- with .Values.console.volumeMounts }}
|
||||
{{- toYaml . | nindent 12 }}
|
||||
{{- end }}
|
||||
securityContext:
|
||||
{{- with .Values.console.containerSecurityContext }}
|
||||
{{- toYaml . | nindent 12 }}
|
||||
{{- end }}
|
||||
volumes:
|
||||
{{- with .Values.console.volumes }}
|
||||
{{- toYaml . | nindent 8 }}
|
||||
|
|
|
@ -7647,6 +7647,67 @@ spec:
|
|||
additionalProperties:
|
||||
type: string
|
||||
type: object
|
||||
containerSecurityContext:
|
||||
properties:
|
||||
allowPrivilegeEscalation:
|
||||
type: boolean
|
||||
capabilities:
|
||||
properties:
|
||||
add:
|
||||
items:
|
||||
type: string
|
||||
type: array
|
||||
drop:
|
||||
items:
|
||||
type: string
|
||||
type: array
|
||||
type: object
|
||||
privileged:
|
||||
type: boolean
|
||||
procMount:
|
||||
type: string
|
||||
readOnlyRootFilesystem:
|
||||
type: boolean
|
||||
runAsGroup:
|
||||
format: int64
|
||||
type: integer
|
||||
runAsNonRoot:
|
||||
type: boolean
|
||||
runAsUser:
|
||||
format: int64
|
||||
type: integer
|
||||
seLinuxOptions:
|
||||
properties:
|
||||
level:
|
||||
type: string
|
||||
role:
|
||||
type: string
|
||||
type:
|
||||
type: string
|
||||
user:
|
||||
type: string
|
||||
type: object
|
||||
seccompProfile:
|
||||
properties:
|
||||
localhostProfile:
|
||||
type: string
|
||||
type:
|
||||
type: string
|
||||
required:
|
||||
- type
|
||||
type: object
|
||||
windowsOptions:
|
||||
properties:
|
||||
gmsaCredentialSpec:
|
||||
type: string
|
||||
gmsaCredentialSpecName:
|
||||
type: string
|
||||
hostProcess:
|
||||
type: boolean
|
||||
runAsUserName:
|
||||
type: string
|
||||
type: object
|
||||
type: object
|
||||
labels:
|
||||
additionalProperties:
|
||||
type: string
|
||||
|
|
|
@ -49,7 +49,11 @@ spec:
|
|||
{{ toYaml . | nindent 10 }}
|
||||
{{- end }}
|
||||
resources:
|
||||
{{- toYaml .Values.operator.resources | nindent 12 }}
|
||||
{{- toYaml .Values.operator.resources | nindent 12 }}
|
||||
securityContext:
|
||||
{{- with .Values.operator.containerSecurityContext }}
|
||||
{{- toYaml . | nindent 12 }}
|
||||
{{- end }}
|
||||
{{- with .Values.operator.initContainers }}
|
||||
initContainers:
|
||||
{{- toYaml . | nindent 8 }}
|
||||
|
|
|
@ -5,13 +5,15 @@ operator:
|
|||
# env:
|
||||
# - name: MINIO_OPERATOR_TLS_ENABLE
|
||||
# value: "off"
|
||||
# - name: MINIO_CONSOLE_TLS_ENABLE
|
||||
# value: "off"
|
||||
# - name: CLUSTER_DOMAIN
|
||||
# value: "cluster.domain"
|
||||
# - name: WATCHED_NAMESPACE
|
||||
# value: ""
|
||||
image:
|
||||
repository: minio/operator
|
||||
tag: v4.5.5
|
||||
tag: v4.5.6
|
||||
pullPolicy: IfNotPresent
|
||||
imagePullSecrets: [ ]
|
||||
initcontainers: [ ]
|
||||
|
@ -21,6 +23,10 @@ operator:
|
|||
runAsGroup: 1000
|
||||
runAsNonRoot: true
|
||||
fsGroup: 1000
|
||||
containerSecurityContext:
|
||||
runAsUser: 1000
|
||||
runAsGroup: 1000
|
||||
runAsNonRoot: true
|
||||
nodeSelector: { }
|
||||
affinity:
|
||||
podAntiAffinity:
|
||||
|
@ -43,7 +49,7 @@ operator:
|
|||
console:
|
||||
image:
|
||||
repository: minio/console
|
||||
tag: v0.22.1
|
||||
tag: v0.22.3
|
||||
pullPolicy: IfNotPresent
|
||||
imagePullSecrets: [ ]
|
||||
initcontainers: [ ]
|
||||
|
@ -56,6 +62,9 @@ console:
|
|||
securityContext:
|
||||
runAsUser: 1000
|
||||
runAsNonRoot: true
|
||||
containerSecurityContext:
|
||||
runAsUser: 1000
|
||||
runAsNonRoot: true
|
||||
ingress:
|
||||
enabled: false
|
||||
ingressClassName: ""
|
||||
|
|
|
@ -6,4 +6,4 @@ apiVersion: v2
|
|||
icon: https://raw.githubusercontent.com/cncf/artwork/master/projects/pixie/icon/color/pixie-icon-color.svg
|
||||
name: pixie-operator-chart
|
||||
type: application
|
||||
version: 0.0.3401
|
||||
version: 0.0.3501
|
||||
|
|
|
@ -36,6 +36,9 @@ spec:
|
|||
spec:
|
||||
description: VizierSpec defines the desired state of Vizier
|
||||
properties:
|
||||
autopilot:
|
||||
description: Autopilot should be set if running Pixie on GKE Autopilot.
|
||||
type: boolean
|
||||
clockConverter:
|
||||
description: ClockConverter specifies which routine to use for converting
|
||||
timestamps to a synced reference time.
|
||||
|
|
|
@ -4,11 +4,13 @@
|
|||
{{ if and (not $olmCRDFound) (not (eq $nsLookup 0))}}{{ fail "CRDs missing! Please deploy CRDs from https://github.com/pixie-io/pixie/tree/main/k8s/operator/helm/crds to continue with deploy." }}{{end}}
|
||||
{{- $lookupLen := 0 -}}{{- $opLookup := (lookup "operators.coreos.com/v1" "OperatorGroup" "" "").items -}}{{if $opLookup }}{{ $lookupLen = len $opLookup }}{{ end }}
|
||||
{{ if (or (eq (.Values.deployOLM | toString) "true") (and (not (eq (.Values.deployOLM | toString) "false")) (eq $lookupLen 0))) }}
|
||||
{{ if not (eq .Values.olmNamespace .Release.Namespace) }}
|
||||
---
|
||||
apiVersion: v1
|
||||
kind: Namespace
|
||||
metadata:
|
||||
name: {{ .Values.olmNamespace }}
|
||||
{{ end }}
|
||||
---
|
||||
kind: ServiceAccount
|
||||
apiVersion: v1
|
||||
|
|
|
@ -1,8 +1,10 @@
|
|||
{{ if not (eq .Values.olmOperatorNamespace .Release.Namespace) }}
|
||||
---
|
||||
apiVersion: v1
|
||||
kind: Namespace
|
||||
metadata:
|
||||
name: {{ .Values.olmOperatorNamespace }}
|
||||
{{ end }}
|
||||
---
|
||||
apiVersion: operators.coreos.com/v1
|
||||
kind: OperatorGroup
|
||||
|
|
|
@ -14,7 +14,9 @@ spec:
|
|||
cloudAddr: {{ .Values.cloudAddr }}
|
||||
disableAutoUpdate: {{ .Values.disableAutoUpdate }}
|
||||
useEtcdOperator: {{ .Values.useEtcdOperator }}
|
||||
{{- if .Values.clusterName }}
|
||||
{{- if (.Values.global).cluster }}
|
||||
clusterName: {{ .Values.global.cluster }}
|
||||
{{- else if .Values.clusterName }}
|
||||
clusterName: {{ .Values.clusterName }}
|
||||
{{- end }}
|
||||
{{- if .Values.devCloudNamespace }}
|
||||
|
@ -32,9 +34,14 @@ spec:
|
|||
{{- if .Values.patches }}
|
||||
patches: {{ .Values.patches | toYaml | nindent 4 }}
|
||||
{{- end }}
|
||||
{{- if .Values.registry }}
|
||||
{{- if ((.Values.global).images).registry }}
|
||||
registry: {{ .Values.global.images.registry }}
|
||||
{{- else if .Values.registry }}
|
||||
registry: {{ .Values.registry }}
|
||||
{{- end}}
|
||||
{{- if .Values.autopilot }}
|
||||
autopilot: {{ .Values.autopilot }}
|
||||
{{- end}}
|
||||
{{- if .Values.dataCollectorParams }}
|
||||
dataCollectorParams:
|
||||
{{- if .Values.dataCollectorParams.datastreamBufferSize }}
|
||||
|
|
|
@ -19,7 +19,7 @@ spec:
|
|||
fieldPath: metadata.namespace
|
||||
- name: PL_VIZIER_NAME
|
||||
value: '{{ .Values.name }}'
|
||||
image: gcr.io/pixie-oss/pixie-prod/operator/vizier_deleter:0.0.34
|
||||
image: gcr.io/pixie-oss/pixie-prod/operator/vizier_deleter:0.0.35
|
||||
name: delete-job
|
||||
restartPolicy: Never
|
||||
serviceAccountName: pl-deleter-service-account
|
||||
|
|
|
@ -0,0 +1,22 @@
|
|||
# Patterns to ignore when building packages.
|
||||
# This supports shell glob matching, relative path matching, and
|
||||
# negation (prefixed with !). Only one pattern per line.
|
||||
.DS_Store
|
||||
# Common VCS dirs
|
||||
.git/
|
||||
.gitignore
|
||||
.bzr/
|
||||
.bzrignore
|
||||
.hg/
|
||||
.hgignore
|
||||
.svn/
|
||||
# Common backup files
|
||||
*.swp
|
||||
*.bak
|
||||
*.tmp
|
||||
*~
|
||||
# Various IDEs
|
||||
.project
|
||||
.idea/
|
||||
*.tmproj
|
||||
.vscode/
|
|
@ -9,7 +9,7 @@ dependencies:
|
|||
repository: https://falcosecurity.github.io/charts
|
||||
version: 1.18.6
|
||||
- name: metrics-server
|
||||
repository: https://charts.bitnami.com/bitnami
|
||||
repository: https://raw.githubusercontent.com/bitnami/charts/archive-full-index/bitnami
|
||||
version: 5.11.9
|
||||
- name: telegraf-operator
|
||||
repository: https://helm.influxdata.com/
|
||||
|
@ -20,5 +20,5 @@ dependencies:
|
|||
- name: opentelemetry-operator
|
||||
repository: https://open-telemetry.github.io/opentelemetry-helm-charts
|
||||
version: 0.18.3
|
||||
digest: sha256:b52addf60fe3fe576518a914324efd0d071aaaf0642a977b79959a06b472ed72
|
||||
generated: "2022-11-24T12:04:42.943370756Z"
|
||||
digest: sha256:cc3f4081f63a9ea3b927746629b1511302f242b069d14b21717c4300b5dc308c
|
||||
generated: "2022-12-29T09:34:51.405907168Z"
|
||||
|
|
|
@ -4,7 +4,7 @@ annotations:
|
|||
catalog.cattle.io/kube-version: '>=1.18-0'
|
||||
catalog.cattle.io/release-name: sumologic
|
||||
apiVersion: v2
|
||||
appVersion: 2.19.0
|
||||
appVersion: 2.19.1
|
||||
dependencies:
|
||||
- condition: fluent-bit.enabled,sumologic.logs.enabled
|
||||
name: fluent-bit
|
||||
|
@ -45,4 +45,4 @@ name: sumologic
|
|||
sources:
|
||||
- https://github.com/SumoLogic/sumologic-kubernetes-collection
|
||||
type: application
|
||||
version: 2.19.0
|
||||
version: 2.19.1
|
||||
|
|
|
@ -1025,7 +1025,7 @@ fluent-bit:
|
|||
# - name: "image-pull-secret"
|
||||
image:
|
||||
repository: public.ecr.aws/sumologic/fluent-bit
|
||||
tag: 1.6.10-sumo-2
|
||||
tag: 1.6.10-sumo-3
|
||||
pullPolicy: IfNotPresent
|
||||
|
||||
## Resource limits for fluent-bit
|
||||
|
|
|
@ -10,6 +10,12 @@ Manual edits are supported only below '## Change Log' and should be used
|
|||
exclusively to fix incorrect entries and not to add new ones.
|
||||
|
||||
## Change Log
|
||||
# v1.15.69
|
||||
### Documentation
|
||||
* **agent,node-analyzer,sysdig,sysdig-stackdriver-bridge** [da18fe5](https://github.com/sysdiglabs/charts/commit/da18fe5e7225be9bbfc484d6dcb22987d7d08066): remove references of the deprecated --purge option for 'helm delete' ([#864](https://github.com/sysdiglabs/charts/issues/864))
|
||||
# v1.15.68
|
||||
### Documentation
|
||||
* **agent,node-analyzer,sysdig** [bd37186](https://github.com/sysdiglabs/charts/commit/bd371864313e64d7a7ac07f79fe30f296b46d540): Remove references to Get Started in the READMEs ([#819](https://github.com/sysdiglabs/charts/issues/819))
|
||||
# v1.15.67
|
||||
### Chores
|
||||
* **sysdig** [577e003](https://github.com/sysdiglabs/charts/commit/577e003eddd43e6e9a71bb89e4265a3a2d131262): bump agent version to 12.10.1 ([#849](https://github.com/sysdiglabs/charts/issues/849))
|
||||
|
|
|
@ -29,4 +29,4 @@ name: sysdig
|
|||
sources:
|
||||
- https://app.sysdigcloud.com/#/settings/user
|
||||
- https://github.com/draios/sysdig
|
||||
version: 1.15.67
|
||||
version: 1.15.69
|
||||
|
|
|
@ -57,9 +57,9 @@ To find the values:
|
|||
|
||||
- YOUR-KEY-HERE: This is the agent access key. You can retrieve this from Settings > Agent Installation in the Sysdig
|
||||
UI.
|
||||
- COLLECTOR_URL: This value is region-dependent in SaaS and is auto-completed on the Get Started page in the UI. (It is
|
||||
- COLLECTOR_URL: This value is region-dependent in SaaS and is auto-completed in install snippets in the UI. (It is
|
||||
a custom value in on-prem installations.)
|
||||
- API_ENDPOINT: This is the base URL (region-dependent) for Sysdig Secure and is auto-completed on the Get Started page.
|
||||
- API_ENDPOINT: This is the base URL (region-dependent) for Sysdig Secure and is auto-completed in install snippets in the UI.
|
||||
E.g. secure.sysdig.com, us2.app.sysdig.com, eu1.app.sysdig.com.
|
||||
|
||||
After a few seconds, you should see hosts and containers appearing in Sysdig Monitor and Sysdig Secure.
|
||||
|
@ -74,8 +74,6 @@ To uninstall/delete the `sysdig-agent` deployment:
|
|||
$ helm delete --namespace sysdig-agent sysdig-agent
|
||||
```
|
||||
|
||||
> **Tip**: Use `helm delete --namespace sysdig-agent --purge sysdig-agent` to completely remove the release from Helm internal storage
|
||||
|
||||
The command removes all the Kubernetes components associated with the chart and deletes the release.
|
||||
|
||||
## Configuration
|
||||
|
|
|
@ -1,6 +1,6 @@
|
|||
# What's Changed
|
||||
|
||||
### Chores
|
||||
- **sysdig** [577e003](https://github.com/sysdiglabs/charts/commit/577e003eddd43e6e9a71bb89e4265a3a2d131262): bump agent version to 12.10.1 ([#849](https://github.com/sysdiglabs/charts/issues/849))
|
||||
### Documentation
|
||||
- **agent,node-analyzer,sysdig,sysdig-stackdriver-bridge** [da18fe5](https://github.com/sysdiglabs/charts/commit/da18fe5e7225be9bbfc484d6dcb22987d7d08066): remove references of the deprecated --purge option for 'helm delete' ([#864](https://github.com/sysdiglabs/charts/issues/864))
|
||||
|
||||
#### Full diff: https://github.com/sysdiglabs/charts/compare/sysdig-deploy-1.5.31...sysdig-1.15.67
|
||||
#### Full diff: https://github.com/sysdiglabs/charts/compare/sysdig-deploy-1.5.39...sysdig-1.15.69
|
||||
|
|
|
@ -2,8 +2,8 @@ The agent for Sysdig Secure DevOps Platform is spinning up on each node in your
|
|||
cluster. After a few seconds, you should see your hosts appearing in the
|
||||
Sysdig Agent Health & Status Dashboard:
|
||||
|
||||
COLLECTOR_URL: This value is region-dependent in SaaS and is auto-completed on the Get Started page in the UI. (It is a custom value in on-prem installations.)
|
||||
API_ENDPOINT: This is the base URL (region-dependent) for Sysdig Secure and is auto-completed on the Get Started page. E.g. secure.sysdig.com, us2.app.sysdig.com, eu1.app.sysdig.com.
|
||||
COLLECTOR_URL: This value is region-dependent in SaaS and is auto-completed in install snippets in the UI. (It is a custom value in on-prem installations.)
|
||||
API_ENDPOINT: This is the base URL (region-dependent) for Sysdig Secure and is auto-completed in install snippets in the UI. E.g. secure.sysdig.com, us2.app.sysdig.com, eu1.app.sysdig.com.
|
||||
|
||||
These are few example links (valid for us-east only):
|
||||
|
||||
|
|
523
index.yaml
523
index.yaml
|
@ -396,6 +396,43 @@ entries:
|
|||
- assets/ambassador/ambassador-6.7.1100.tgz
|
||||
version: 6.7.1100
|
||||
argo-cd:
|
||||
- annotations:
|
||||
artifacthub.io/changes: |
|
||||
- "[Docs]: Added sample how to provide K8s credentials plugin"
|
||||
- "[Docs]: Added sample how to provide Argo config management plugin"
|
||||
- "[Docs]: Removed samples that injects tools into incorrect controllers"
|
||||
catalog.cattle.io/certified: partner
|
||||
catalog.cattle.io/display-name: Argo CD
|
||||
catalog.cattle.io/kube-version: '>=1.22.0-0'
|
||||
catalog.cattle.io/release-name: argo-cd
|
||||
apiVersion: v2
|
||||
appVersion: v2.5.5
|
||||
created: "2023-01-05T08:41:43.967915074-07:00"
|
||||
dependencies:
|
||||
- condition: redis-ha.enabled
|
||||
name: redis-ha
|
||||
repository: file://./charts/redis-ha
|
||||
version: 4.22.4
|
||||
description: A Helm chart for Argo CD, a declarative, GitOps continuous delivery
|
||||
tool for Kubernetes.
|
||||
digest: 8ed41bb09509ae3b4602168a515083591389d245ca5c1905a2b22f5d58b56b5c
|
||||
home: https://github.com/argoproj/argo-helm
|
||||
icon: https://argo-cd.readthedocs.io/en/stable/assets/logo.png
|
||||
keywords:
|
||||
- argoproj
|
||||
- argocd
|
||||
- gitops
|
||||
kubeVersion: '>=1.22.0-0'
|
||||
maintainers:
|
||||
- name: argoproj
|
||||
url: https://argoproj.github.io/
|
||||
name: argo-cd
|
||||
sources:
|
||||
- https://github.com/argoproj/argo-helm/tree/main/charts/argo-cd
|
||||
- https://github.com/argoproj/argo-cd
|
||||
urls:
|
||||
- assets/argo/argo-cd-5.16.14.tgz
|
||||
version: 5.16.14
|
||||
- annotations:
|
||||
artifacthub.io/changes: |
|
||||
- "[Changed]: Update redis-ha to v4.22.4"
|
||||
|
@ -1098,6 +1135,39 @@ entries:
|
|||
- assets/argo/argo-cd-5.8.0.tgz
|
||||
version: 5.8.0
|
||||
artifactory-ha:
|
||||
- annotations:
|
||||
catalog.cattle.io/certified: partner
|
||||
catalog.cattle.io/display-name: JFrog Artifactory HA
|
||||
catalog.cattle.io/kube-version: '>= 1.14.0-0'
|
||||
catalog.cattle.io/release-name: artifactory-ha
|
||||
apiVersion: v2
|
||||
appVersion: 7.49.3
|
||||
created: "2023-01-05T08:41:45.560365662-07:00"
|
||||
dependencies:
|
||||
- condition: postgresql.enabled
|
||||
name: postgresql
|
||||
repository: file://./charts/postgresql
|
||||
version: 10.3.18
|
||||
description: Universal Repository Manager supporting all major packaging formats,
|
||||
build tools and CI servers.
|
||||
digest: e722596276c249fce0c7c130c9e7b790047bd41d991403ad32372c4b94486e39
|
||||
home: https://www.jfrog.com/artifactory/
|
||||
icon: https://raw.githubusercontent.com/jfrog/charts/ea5c3112c24a973f64f3ccd99747323db292a369/stable/artifactory-ha/logo/artifactory-logo.png
|
||||
keywords:
|
||||
- artifactory
|
||||
- jfrog
|
||||
- devops
|
||||
kubeVersion: '>= 1.14.0-0'
|
||||
maintainers:
|
||||
- email: installers@jfrog.com
|
||||
name: Chart Maintainers at JFrog
|
||||
name: artifactory-ha
|
||||
sources:
|
||||
- https://github.com/jfrog/charts
|
||||
type: application
|
||||
urls:
|
||||
- assets/jfrog/artifactory-ha-107.49.3.tgz
|
||||
version: 107.49.3
|
||||
- annotations:
|
||||
catalog.cattle.io/certified: partner
|
||||
catalog.cattle.io/display-name: JFrog Artifactory HA
|
||||
|
@ -1488,6 +1558,40 @@ entries:
|
|||
- assets/jfrog/artifactory-ha-3.0.1400.tgz
|
||||
version: 3.0.1400
|
||||
artifactory-jcr:
|
||||
- annotations:
|
||||
catalog.cattle.io/certified: partner
|
||||
catalog.cattle.io/display-name: JFrog Container Registry
|
||||
catalog.cattle.io/kube-version: '>= 1.14.0-0'
|
||||
catalog.cattle.io/release-name: artifactory-jcr
|
||||
apiVersion: v2
|
||||
appVersion: 7.49.3
|
||||
created: "2023-01-05T08:41:45.668283028-07:00"
|
||||
dependencies:
|
||||
- name: artifactory
|
||||
repository: file://./charts/artifactory
|
||||
version: 107.49.3
|
||||
description: JFrog Container Registry
|
||||
digest: afdfa852585f85acedb29ac59d89c473e178513172ecfcf569a72056b5fe8f4f
|
||||
home: https://jfrog.com/container-registry/
|
||||
icon: https://raw.githubusercontent.com/jfrog/charts/ea5c3112c24a973f64f3ccd99747323db292a369/stable/artifactory-jcr/logo/jcr-logo.png
|
||||
keywords:
|
||||
- artifactory
|
||||
- jfrog
|
||||
- container
|
||||
- registry
|
||||
- devops
|
||||
- jfrog-container-registry
|
||||
kubeVersion: '>= 1.14.0-0'
|
||||
maintainers:
|
||||
- email: helm@jfrog.com
|
||||
name: Chart Maintainers at JFrog
|
||||
name: artifactory-jcr
|
||||
sources:
|
||||
- https://github.com/jfrog/charts
|
||||
type: application
|
||||
urls:
|
||||
- assets/jfrog/artifactory-jcr-107.49.3.tgz
|
||||
version: 107.49.3
|
||||
- annotations:
|
||||
catalog.cattle.io/certified: partner
|
||||
catalog.cattle.io/display-name: JFrog Container Registry
|
||||
|
@ -1860,6 +1964,66 @@ entries:
|
|||
- assets/jfrog/artifactory-jcr-2.5.100.tgz
|
||||
version: 2.5.100
|
||||
asserts:
|
||||
- annotations:
|
||||
catalog.cattle.io/certified: partner
|
||||
catalog.cattle.io/display-name: Asserts
|
||||
catalog.cattle.io/kube-version: '>=1.17-0'
|
||||
catalog.cattle.io/release-name: asserts
|
||||
apiVersion: v2
|
||||
created: "2023-01-05T08:41:44.158128266-07:00"
|
||||
dependencies:
|
||||
- condition: knowledge-sensor.enabled
|
||||
name: knowledge-sensor
|
||||
repository: file://./charts/knowledge-sensor
|
||||
version: 1.1.0
|
||||
- alias: tsdb
|
||||
condition: tsdb.enabled
|
||||
name: victoria-metrics-single
|
||||
repository: file://./charts/victoria-metrics-single
|
||||
version: 1.1.0
|
||||
- condition: alertmanager.enabled
|
||||
name: alertmanager
|
||||
repository: file://./charts/alertmanager
|
||||
version: 1.0.0
|
||||
- alias: promxyruler
|
||||
condition: promxyruler.enabled
|
||||
name: promxy
|
||||
repository: file://./charts/promxy
|
||||
version: 0.7.0
|
||||
- alias: promxyuser
|
||||
condition: promxyuser.enabled
|
||||
name: promxy
|
||||
repository: file://./charts/promxy
|
||||
version: 0.7.0
|
||||
- name: common
|
||||
repository: file://./charts/common
|
||||
version: 1.x.x
|
||||
- alias: redisgraph
|
||||
condition: redisgraph.enabled
|
||||
name: redis
|
||||
repository: file://./charts/redis
|
||||
version: 16.13.2
|
||||
- alias: redisearch
|
||||
condition: redisearch.enabled
|
||||
name: redis
|
||||
repository: file://./charts/redis
|
||||
version: 16.13.2
|
||||
- alias: postgres
|
||||
condition: postgres.enabled
|
||||
name: postgresql
|
||||
repository: file://./charts/postgresql
|
||||
version: 11.9.13
|
||||
description: Asserts Helm Chart to configure entire asserts stack
|
||||
digest: 80dd1488715d339f26a628e8c4ee81f946fc94fd4c5e179fc0e856c4b73dc51a
|
||||
icon: https://www.asserts.ai/favicon.png
|
||||
maintainers:
|
||||
- name: Asserts
|
||||
url: https://github.com/asserts
|
||||
name: asserts
|
||||
type: application
|
||||
urls:
|
||||
- assets/asserts/asserts-1.26.0.tgz
|
||||
version: 1.26.0
|
||||
- annotations:
|
||||
catalog.cattle.io/certified: partner
|
||||
catalog.cattle.io/display-name: Asserts
|
||||
|
@ -3529,6 +3693,27 @@ entries:
|
|||
- assets/cloudcasa/cloudcasa-0.1.000.tgz
|
||||
version: 0.1.000
|
||||
cockroachdb:
|
||||
- annotations:
|
||||
catalog.cattle.io/certified: partner
|
||||
catalog.cattle.io/display-name: CockroachDB
|
||||
catalog.cattle.io/kube-version: '>=1.8-0'
|
||||
catalog.cattle.io/release-name: cockroachdb
|
||||
apiVersion: v1
|
||||
appVersion: 22.2.2
|
||||
created: "2023-01-05T08:41:44.737286335-07:00"
|
||||
description: CockroachDB is a scalable, survivable, strongly-consistent SQL database.
|
||||
digest: 7532528974889cd82395e4c0546326b843afcc651915acd2f5253e5deb1cafec
|
||||
home: https://www.cockroachlabs.com
|
||||
icon: https://raw.githubusercontent.com/cockroachdb/cockroach/master/docs/media/cockroach_db.png
|
||||
maintainers:
|
||||
- email: helm-charts@cockroachlabs.com
|
||||
name: cockroachlabs
|
||||
name: cockroachdb
|
||||
sources:
|
||||
- https://github.com/cockroachdb/cockroach
|
||||
urls:
|
||||
- assets/cockroach-labs/cockroachdb-10.0.2.tgz
|
||||
version: 10.0.2
|
||||
- annotations:
|
||||
catalog.cattle.io/certified: partner
|
||||
catalog.cattle.io/display-name: CockroachDB
|
||||
|
@ -4517,6 +4702,43 @@ entries:
|
|||
- assets/weka/csi-wekafsplugin-0.6.400.tgz
|
||||
version: 0.6.400
|
||||
datadog:
|
||||
- annotations:
|
||||
catalog.cattle.io/certified: partner
|
||||
catalog.cattle.io/display-name: Datadog
|
||||
catalog.cattle.io/kube-version: '>=1.10-0'
|
||||
catalog.cattle.io/release-name: datadog
|
||||
apiVersion: v1
|
||||
appVersion: "7"
|
||||
created: "2023-01-05T08:41:44.884820989-07:00"
|
||||
dependencies:
|
||||
- condition: clusterAgent.metricsProvider.useDatadogMetrics
|
||||
name: datadog-crds
|
||||
repository: https://helm.datadoghq.com
|
||||
tags:
|
||||
- install-crds
|
||||
version: 0.4.7
|
||||
- condition: datadog.kubeStateMetricsEnabled
|
||||
name: kube-state-metrics
|
||||
repository: https://prometheus-community.github.io/helm-charts
|
||||
version: 2.13.2
|
||||
description: Datadog Agent
|
||||
digest: 50836b1830faa5add436add78879ef7903337f6533b5f0b9a7034e6f745da216
|
||||
home: https://www.datadoghq.com
|
||||
icon: https://datadog-live.imgix.net/img/dd_logo_70x75.png
|
||||
keywords:
|
||||
- monitoring
|
||||
- alerting
|
||||
- metric
|
||||
maintainers:
|
||||
- email: support@datadoghq.com
|
||||
name: Datadog
|
||||
name: datadog
|
||||
sources:
|
||||
- https://app.datadoghq.com/account/settings#agent/kubernetes
|
||||
- https://github.com/DataDog/datadog-agent
|
||||
urls:
|
||||
- assets/datadog/datadog-3.6.8.tgz
|
||||
version: 3.6.8
|
||||
- annotations:
|
||||
catalog.cattle.io/certified: partner
|
||||
catalog.cattle.io/display-name: Datadog
|
||||
|
@ -5486,6 +5708,30 @@ entries:
|
|||
- assets/elastic/elasticsearch-7.17.3.tgz
|
||||
version: 7.17.3
|
||||
external-secrets:
|
||||
- annotations:
|
||||
catalog.cattle.io/certified: partner
|
||||
catalog.cattle.io/display-name: External Secrets Operator
|
||||
catalog.cattle.io/kube-version: '>= 1.19.0-0'
|
||||
catalog.cattle.io/release-name: external-secrets
|
||||
apiVersion: v2
|
||||
appVersion: v0.7.1
|
||||
created: "2023-01-05T08:41:44.969764983-07:00"
|
||||
description: External secret management for Kubernetes
|
||||
digest: 36fe41b82250381db2479e1f6d038bd671c0ad8304347944176208db7e4649f5
|
||||
home: https://github.com/external-secrets/external-secrets
|
||||
icon: https://raw.githubusercontent.com/external-secrets/external-secrets/main/assets/eso-logo-large.png
|
||||
keywords:
|
||||
- kubernetes-external-secrets
|
||||
- secrets
|
||||
kubeVersion: '>= 1.19.0-0'
|
||||
maintainers:
|
||||
- email: kellinmcavoy@gmail.com
|
||||
name: mcavoyk
|
||||
name: external-secrets
|
||||
type: application
|
||||
urls:
|
||||
- assets/external-secrets/external-secrets-0.7.1.tgz
|
||||
version: 0.7.1
|
||||
- annotations:
|
||||
catalog.cattle.io/certified: partner
|
||||
catalog.cattle.io/display-name: External Secrets Operator
|
||||
|
@ -7691,6 +7937,36 @@ entries:
|
|||
- assets/hpe/hpe-flexvolume-driver-3.1.000.tgz
|
||||
version: 3.1.000
|
||||
instana-agent:
|
||||
- annotations:
|
||||
artifacthub.io/links: |
|
||||
- name: Instana website
|
||||
url: https://www.instana.com
|
||||
- name: Instana Helm charts
|
||||
url: https://github.com/instana/helm-charts
|
||||
catalog.cattle.io/certified: partner
|
||||
catalog.cattle.io/display-name: Instana Agent
|
||||
catalog.cattle.io/kube-version: '>=1.21-0'
|
||||
catalog.cattle.io/release-name: instana-agent
|
||||
apiVersion: v2
|
||||
appVersion: 1.239.0
|
||||
created: "2023-01-05T08:41:45.439449978-07:00"
|
||||
description: Instana Agent for Kubernetes
|
||||
digest: b4587c8344f5de23ccaf084bf73456a9e9eaf92d87a0209b3e7467af22d437ce
|
||||
home: https://www.instana.com/
|
||||
icon: https://agents.instana.io/helm/stan-logo-2020.png
|
||||
maintainers:
|
||||
- email: felix.marx@ibm.com
|
||||
name: FelixMarxIBM
|
||||
- email: henning.treu@ibm.com
|
||||
name: htreu
|
||||
- email: torsten.kohn@ibm.com
|
||||
name: tkohn
|
||||
name: instana-agent
|
||||
sources:
|
||||
- https://github.com/instana/instana-agent-docker
|
||||
urls:
|
||||
- assets/instana/instana-agent-1.2.49.tgz
|
||||
version: 1.2.49
|
||||
- annotations:
|
||||
artifacthub.io/links: |
|
||||
- name: Instana website
|
||||
|
@ -7991,6 +8267,54 @@ entries:
|
|||
- assets/jaeger/jaeger-operator-2.36.0.tgz
|
||||
version: 2.36.0
|
||||
jenkins:
|
||||
- annotations:
|
||||
artifacthub.io/images: |
|
||||
- name: jenkins
|
||||
image: jenkins/jenkins:2.375.1-jdk11
|
||||
- name: k8s-sidecar
|
||||
image: kiwigrid/k8s-sidecar:1.15.0
|
||||
- name: inbound-agent
|
||||
image: jenkins/inbound-agent:4.11.2-4
|
||||
- name: backup
|
||||
image: maorfr/kube-tasks:0.2.0
|
||||
artifacthub.io/links: |
|
||||
- name: Chart Source
|
||||
url: https://github.com/jenkinsci/helm-charts/tree/main/charts/jenkins
|
||||
- name: Jenkins
|
||||
url: https://www.jenkins.io/
|
||||
catalog.cattle.io/certified: partner
|
||||
catalog.cattle.io/display-name: Jenkins
|
||||
catalog.cattle.io/kube-version: '>=1.14-0'
|
||||
catalog.cattle.io/release-name: jenkins
|
||||
apiVersion: v2
|
||||
appVersion: 2.375.1
|
||||
created: "2023-01-05T08:41:45.48413134-07:00"
|
||||
description: Jenkins - Build great things at any scale! The leading open source
|
||||
automation server, Jenkins provides hundreds of plugins to support building,
|
||||
deploying and automating any project.
|
||||
digest: 21dd419dac0c90d65da8d0517bcad99d3fb7ad9869754d6973d531495119952c
|
||||
home: https://jenkins.io/
|
||||
icon: https://get.jenkins.io/art/jenkins-logo/logo.svg
|
||||
maintainers:
|
||||
- email: maor.friedman@redhat.com
|
||||
name: maorfr
|
||||
- email: mail@torstenwalter.de
|
||||
name: torstenwalter
|
||||
- email: garridomota@gmail.com
|
||||
name: mogaal
|
||||
- email: wmcdona89@gmail.com
|
||||
name: wmcdona89
|
||||
- email: timjacomb1@gmail.com
|
||||
name: timja
|
||||
name: jenkins
|
||||
sources:
|
||||
- https://github.com/jenkinsci/jenkins
|
||||
- https://github.com/jenkinsci/docker-inbound-agent
|
||||
- https://github.com/maorfr/kube-tasks
|
||||
- https://github.com/jenkinsci/configuration-as-code-plugin
|
||||
urls:
|
||||
- assets/jenkins/jenkins-4.2.19.tgz
|
||||
version: 4.2.19
|
||||
- annotations:
|
||||
artifacthub.io/images: |
|
||||
- name: jenkins
|
||||
|
@ -10831,6 +11155,32 @@ entries:
|
|||
- assets/metallb/metallb-0.13.7.tgz
|
||||
version: 0.13.7
|
||||
minio-operator:
|
||||
- annotations:
|
||||
catalog.cattle.io/certified: partner
|
||||
catalog.cattle.io/display-name: Minio Operator
|
||||
catalog.cattle.io/kube-version: '>=1.19-0'
|
||||
catalog.cattle.io/release-name: minio-operator
|
||||
apiVersion: v2
|
||||
appVersion: v4.5.6
|
||||
created: "2023-01-05T08:41:45.997655891-07:00"
|
||||
description: A Helm chart for MinIO Operator
|
||||
digest: d03c3043fccefb1e26ee0a625cd3fa8005f47abae629fed58621dfde83ccae42
|
||||
home: https://min.io
|
||||
icon: https://min.io/resources/img/logo/MINIO_wordmark.png
|
||||
keywords:
|
||||
- storage
|
||||
- object-storage
|
||||
- S3
|
||||
maintainers:
|
||||
- email: dev@minio.io
|
||||
name: MinIO, Inc
|
||||
name: minio-operator
|
||||
sources:
|
||||
- https://github.com/minio/operator
|
||||
type: application
|
||||
urls:
|
||||
- assets/minio/minio-operator-4.5.6.tgz
|
||||
version: 4.5.6
|
||||
- annotations:
|
||||
catalog.cattle.io/certified: partner
|
||||
catalog.cattle.io/display-name: Minio Operator
|
||||
|
@ -12592,6 +12942,19 @@ entries:
|
|||
- assets/openebs/openebs-1.12.300.tgz
|
||||
version: 1.12.300
|
||||
pixie-operator-chart:
|
||||
- annotations:
|
||||
catalog.cattle.io/certified: partner
|
||||
catalog.cattle.io/display-name: Pixie
|
||||
catalog.cattle.io/release-name: pixie
|
||||
apiVersion: v2
|
||||
created: "2023-01-05T08:41:46.16858893-07:00"
|
||||
digest: 01943f6bf580d55f8f4539af41a318f7af79d6826df08ade7993c6768bd231bd
|
||||
icon: https://raw.githubusercontent.com/cncf/artwork/master/projects/pixie/icon/color/pixie-icon-color.svg
|
||||
name: pixie-operator-chart
|
||||
type: application
|
||||
urls:
|
||||
- assets/pixie/pixie-operator-chart-0.0.3501.tgz
|
||||
version: 0.0.3501
|
||||
- annotations:
|
||||
catalog.cattle.io/certified: partner
|
||||
catalog.cattle.io/display-name: Pixie
|
||||
|
@ -13016,6 +13379,44 @@ entries:
|
|||
- assets/portworx/portworx-essentials-2.9.100.tgz
|
||||
version: 2.9.100
|
||||
postgresql:
|
||||
- annotations:
|
||||
catalog.cattle.io/certified: partner
|
||||
catalog.cattle.io/display-name: PostgreSQL
|
||||
catalog.cattle.io/kube-version: '>=1.19-0'
|
||||
catalog.cattle.io/release-name: postgresql
|
||||
category: Database
|
||||
apiVersion: v2
|
||||
appVersion: 15.1.0
|
||||
created: "2023-01-05T08:41:44.474003364-07:00"
|
||||
dependencies:
|
||||
- name: common
|
||||
repository: file://./charts/common
|
||||
tags:
|
||||
- bitnami-common
|
||||
version: 2.x.x
|
||||
description: PostgreSQL (Postgres) is an open source object-relational database
|
||||
known for reliability and data integrity. ACID-compliant, it supports foreign
|
||||
keys, joins, views, triggers and stored procedures.
|
||||
digest: 871931fd61db11ac72a4fa30763d6809cd80ebf117da8b688590901bec38f639
|
||||
home: https://github.com/bitnami/charts/tree/main/bitnami/postgresql
|
||||
icon: https://wiki.postgresql.org/images/a/a4/PostgreSQL_logo.3colors.svg
|
||||
keywords:
|
||||
- postgresql
|
||||
- postgres
|
||||
- database
|
||||
- sql
|
||||
- replication
|
||||
- cluster
|
||||
maintainers:
|
||||
- name: Bitnami
|
||||
url: https://github.com/bitnami/charts
|
||||
name: postgresql
|
||||
sources:
|
||||
- https://github.com/bitnami/containers/tree/main/bitnami/postgresql
|
||||
- https://www.postgresql.org/
|
||||
urls:
|
||||
- assets/bitnami/postgresql-12.1.7.tgz
|
||||
version: 12.1.7
|
||||
- annotations:
|
||||
catalog.cattle.io/certified: partner
|
||||
catalog.cattle.io/display-name: PostgreSQL
|
||||
|
@ -13553,6 +13954,40 @@ entries:
|
|||
- assets/quobyte/quobyte-cluster-0.1.5.tgz
|
||||
version: 0.1.5
|
||||
redis:
|
||||
- annotations:
|
||||
catalog.cattle.io/certified: partner
|
||||
catalog.cattle.io/display-name: Redis
|
||||
catalog.cattle.io/kube-version: '>=1.19-0'
|
||||
catalog.cattle.io/release-name: redis
|
||||
category: Database
|
||||
apiVersion: v2
|
||||
appVersion: 7.0.7
|
||||
created: "2023-01-05T08:41:44.535576064-07:00"
|
||||
dependencies:
|
||||
- name: common
|
||||
repository: file://./charts/common
|
||||
tags:
|
||||
- bitnami-common
|
||||
version: 2.x.x
|
||||
description: Redis(R) is an open source, advanced key-value store. It is often
|
||||
referred to as a data structure server since keys can contain strings, hashes,
|
||||
lists, sets and sorted sets.
|
||||
digest: 30bc4470ce5ae29a6f65f915c4063f1df8c4cad5ec4e3ef15f3cafa6d8762483
|
||||
home: https://github.com/bitnami/charts/tree/main/bitnami/redis
|
||||
icon: https://redis.com/wp-content/uploads/2021/08/redis-logo.png
|
||||
keywords:
|
||||
- redis
|
||||
- keyvalue
|
||||
- database
|
||||
maintainers:
|
||||
- name: Bitnami
|
||||
url: https://github.com/bitnami/charts
|
||||
name: redis
|
||||
sources:
|
||||
- https://github.com/bitnami/containers/tree/main/bitnami/redis
|
||||
urls:
|
||||
- assets/bitnami/redis-17.4.1.tgz
|
||||
version: 17.4.1
|
||||
- annotations:
|
||||
catalog.cattle.io/certified: partner
|
||||
catalog.cattle.io/display-name: Redis
|
||||
|
@ -15390,6 +15825,58 @@ entries:
|
|||
- assets/speedscale/speedscale-operator-0.9.12600.tgz
|
||||
version: 0.9.12600
|
||||
sumologic:
|
||||
- annotations:
|
||||
catalog.cattle.io/certified: partner
|
||||
catalog.cattle.io/display-name: Sumo Logic
|
||||
catalog.cattle.io/kube-version: '>=1.18-0'
|
||||
catalog.cattle.io/release-name: sumologic
|
||||
apiVersion: v2
|
||||
appVersion: 2.19.1
|
||||
created: "2023-01-05T08:41:46.430130105-07:00"
|
||||
dependencies:
|
||||
- condition: fluent-bit.enabled,sumologic.logs.enabled
|
||||
name: fluent-bit
|
||||
repository: file://./charts/fluent-bit
|
||||
version: 0.20.9
|
||||
- condition: kube-prometheus-stack.enabled,sumologic.metrics.enabled
|
||||
name: kube-prometheus-stack
|
||||
repository: file://./charts/kube-prometheus-stack
|
||||
version: 12.10.0
|
||||
- condition: falco.enabled
|
||||
name: falco
|
||||
repository: file://./charts/falco
|
||||
version: 1.18.6
|
||||
- condition: metrics-server.enabled
|
||||
name: metrics-server
|
||||
repository: file://./charts/metrics-server
|
||||
version: 5.11.9
|
||||
- condition: telegraf-operator.enabled
|
||||
name: telegraf-operator
|
||||
repository: file://./charts/telegraf-operator
|
||||
version: 1.3.10
|
||||
- condition: tailing-sidecar-operator.enabled
|
||||
name: tailing-sidecar-operator
|
||||
repository: file://./charts/tailing-sidecar-operator
|
||||
version: 0.3.4
|
||||
- condition: opentelemetry-operator.enabled
|
||||
name: opentelemetry-operator
|
||||
repository: file://./charts/opentelemetry-operator
|
||||
version: 0.18.3
|
||||
description: A Helm chart for collecting Kubernetes logs, metrics, traces and
|
||||
events into Sumo Logic.
|
||||
digest: 00a599cf0e2341956d81ba722b50e172726ad6dc5facfa081824943416fc7b3c
|
||||
home: https://github.com/SumoLogic/sumologic-kubernetes-collection
|
||||
icon: https://raw.githubusercontent.com/SumoLogic/sumologic-kubernetes-collection/main/images/sumo_logic_logo.png
|
||||
keywords:
|
||||
- monitoring
|
||||
- logging
|
||||
name: sumologic
|
||||
sources:
|
||||
- https://github.com/SumoLogic/sumologic-kubernetes-collection
|
||||
type: application
|
||||
urls:
|
||||
- assets/sumologic/sumologic-2.19.1.tgz
|
||||
version: 2.19.1
|
||||
- annotations:
|
||||
catalog.cattle.io/certified: partner
|
||||
catalog.cattle.io/display-name: Sumo Logic
|
||||
|
@ -15547,6 +16034,42 @@ entries:
|
|||
- assets/sumologic/sumologic-2.17.0.tgz
|
||||
version: 2.17.0
|
||||
sysdig:
|
||||
- annotations:
|
||||
catalog.cattle.io/certified: partner
|
||||
catalog.cattle.io/display-name: Sysdig
|
||||
catalog.cattle.io/release-name: sysdig
|
||||
apiVersion: v1
|
||||
appVersion: 12.10.1
|
||||
created: "2023-01-05T08:41:46.45083171-07:00"
|
||||
description: Sysdig Monitor and Secure agent
|
||||
digest: e8629c3f0bfb2e886e8edc2c7a068f2ce9d0fcc1a276b1ed2d9eabfb025ff0c2
|
||||
home: https://www.sysdig.com/
|
||||
icon: https://avatars.githubusercontent.com/u/5068817?s=200&v=4
|
||||
keywords:
|
||||
- monitoring
|
||||
- security
|
||||
- alerting
|
||||
- metric
|
||||
- troubleshooting
|
||||
- run-time
|
||||
maintainers:
|
||||
- email: lachlan@deis.com
|
||||
name: lachie83
|
||||
- email: jorge.salamero@sysdig.com
|
||||
name: bencer
|
||||
- email: nestor.salceda@sysdig.com
|
||||
name: nestorsalceda
|
||||
- email: alvaro.iradier@sysdig.com
|
||||
name: airadier
|
||||
- email: carlos.arilla@sysdig.com
|
||||
name: carillan81
|
||||
name: sysdig
|
||||
sources:
|
||||
- https://app.sysdigcloud.com/#/settings/user
|
||||
- https://github.com/draios/sysdig
|
||||
urls:
|
||||
- assets/sysdig/sysdig-1.15.69.tgz
|
||||
version: 1.15.69
|
||||
- annotations:
|
||||
catalog.cattle.io/certified: partner
|
||||
catalog.cattle.io/display-name: Sysdig
|
||||
|
|
Loading…
Reference in New Issue