Charts CI

```
Updated:
  aquarist-labs/s3gw:
    - 0.17.0
  argo/argo-cd:
    - 5.36.1
  asserts/asserts:
    - 1.42.0
  bitnami/wordpress:
    - 16.1.14
  datadog/datadog:
    - 3.32.0
  intel/intel-device-plugins-operator:
    - 0.27.0
  intel/intel-device-plugins-qat:
    - 0.27.0
  intel/intel-device-plugins-sgx:
    - 0.27.0
  quobyte/quobyte-cluster:
    - 0.1.8
  weka/csi-wekafsplugin:
    - 2.0.1
```
pull/788/head
github-actions[bot] 2023-06-09 20:31:10 +00:00
parent bae96dbdf6
commit 7734f97d90
48 changed files with 478 additions and 139 deletions

Binary file not shown.

Binary file not shown.

Binary file not shown.

Binary file not shown.

Binary file not shown.

Binary file not shown.

Binary file not shown.

Binary file not shown.

Binary file not shown.

Binary file not shown.

View File

@ -32,4 +32,4 @@ sources:
- https://github.com/aquarist-labs/s3gw
- https://github.com/aquarist-labs/ceph
type: application
version: 0.16.0
version: 0.17.0

View File

@ -229,3 +229,13 @@ COSI cluster role binding name
{{- $name := $dcrn }}
{{- $name }}
{{- end }}
{{/*
COSI endpoint
*/}}
{{- define "s3gw-cosi.endpoint" -}}
{{- $sn := include "s3gw.serviceName" . }}
{{- $defaultendpoint := printf "http://%s.%s.%s" $sn .Release.Namespace .Values.privateDomain}}
{{- $endpoint := default $defaultendpoint .Values.cosi.driver.endpoint }}
{{- $endpoint }}
{{- end }}

View File

@ -10,7 +10,7 @@ metadata:
type: Opaque
stringData:
DRIVERNAME: {{ include "s3gw-cosi.driverName" . }}
ENDPOINT: {{ include "s3gw.serviceName" . }}.{{ .Release.Namespace }}.{{ .Values.privateDomain }}
ENDPOINT: {{ include "s3gw-cosi.endpoint" . }}
ACCESSKEY: {{ .Values.accessKey }}
SECRETKEY: {{ .Values.secretKey }}
{{- end }}

View File

@ -198,6 +198,9 @@ rgwCustomEnvs: []
# - cosi.driver.name: it specifies the name of the COSI driver.
# Default: {Release.Name}.{Release.Namespace}.objectstorage.k8s.io
#
# - cosi.driver.endpoint: it specifies the S3 endpoint url used by the COSI driver.
# Default: {Release.Name}.{Release.Namespace}.{Values.privateDomain}
#
# - cosi.sidecar.imageName: it specifies a custom image name for the COSI sidecar.
# Default: s3gw-cosi-sidecar
#
@ -223,6 +226,7 @@ cosi:
imageRegistry:
imagePullPolicy:
name:
endpoint:
sidecar:
imageName:

View File

@ -1,7 +1,7 @@
annotations:
artifacthub.io/changes: |
- kind: added
description: Add .Values.global.env for all deployed containers
- kind: fixed
description: Allow to specify redis.conf file
artifacthub.io/signKey: |
fingerprint: 2B8F22F57260EFA67BE1C5824B11F800CD9D2252
url: https://argoproj.github.io/argo-helm/pgp_keys.asc
@ -32,4 +32,4 @@ name: argo-cd
sources:
- https://github.com/argoproj/argo-helm/tree/main/charts/argo-cd
- https://github.com/argoproj/argo-cd
version: 5.36.0
version: 5.36.1

View File

@ -54,13 +54,13 @@ spec:
image: {{ .Values.redis.image.repository }}:{{ .Values.redis.image.tag }}
imagePullPolicy: {{ default .Values.global.image.imagePullPolicy .Values.redis.image.imagePullPolicy }}
args:
{{- with .Values.redis.extraArgs }}
{{- toYaml . | nindent 8 }}
{{- end }}
- --save
- ""
- --appendonly
- "no"
{{- with .Values.redis.extraArgs }}
{{- toYaml . | nindent 8 }}
{{- end }}
{{- with (concat .Values.global.env .Values.redis.env) }}
env:
{{- toYaml . | nindent 8 }}

View File

@ -58,4 +58,4 @@ maintainers:
url: https://github.com/asserts
name: asserts
type: application
version: 1.41.0
version: 1.42.0

View File

@ -16,7 +16,7 @@ PagerDuty template
{{- printf "\n {{- end }}" -}}
{{- printf "\n " -}}
{{- printf "\n {{ define \"pagerduty.notification.link.insights\" -}}" -}}
{{- printf "\n %s/insights/top?start={{(index .Alerts 0).StartsAt.Unix}}000-30m&end={{(index .Alerts 0).StartsAt.Unix}}000%s&search={{ .CommonLabels.asserts_assertion_name }}" $assertsUrl $plus30min -}}
{{- printf "\n %s/assertions?start={{(index .Alerts 0).StartsAt.Unix}}000-30m&end={{(index .Alerts 0).StartsAt.Unix}}000%s&search={{ .CommonLabels.asserts_assertion_name }}" $assertsUrl $plus30min -}}
{{- printf "\n {{- end }}" -}}
{{- printf "\n " -}}
{{- printf "\n {{/* PagerDuty Slo */}}" -}}

View File

@ -20,10 +20,10 @@ Slack template
{{- printf "\n {{- if eq .Status \"firing\" }}" -}}
{{- printf "\n {{- if .CommonLabels.asserts_site }}" -}}
{{- printf "\n :warning: *<%s/incidents?env[0]={{ .CommonLabels.asserts_env }}&site[0]={{ .CommonLabels.asserts_site }}&start={{(index .Alerts 0).StartsAt.Unix}}000-30m&end={{(index .Alerts 0).StartsAt.Unix}}000%s&search={{ .CommonLabels.asserts_notification_rule_name }}|View Impact>*" $assertsUrl $plus30min -}}
{{- printf "\n :fire: *<%s/insights/top?env[0]={{ .CommonLabels.asserts_env }}&site[0]={{ .CommonLabels.asserts_site }}&start={{(index .Alerts 0).StartsAt.Unix}}000-30m&end={{(index .Alerts 0).StartsAt.Unix}}000%s&search={{ .CommonLabels.asserts_assertion_name }}|Start Troubleshooting>*" $assertsUrl $plus30min -}}
{{- printf "\n :fire: *<%s/assertions?env[0]={{ .CommonLabels.asserts_env }}&site[0]={{ .CommonLabels.asserts_site }}&start={{(index .Alerts 0).StartsAt.Unix}}000-30m&end={{(index .Alerts 0).StartsAt.Unix}}000%s&search={{ .CommonLabels.asserts_assertion_name }}|Start Troubleshooting>*" $assertsUrl $plus30min -}}
{{- printf "\n {{- else }}" -}}
{{- printf "\n :warning: *<%s/incidents?env[0]={{ .CommonLabels.asserts_env }}&start={{(index .Alerts 0).StartsAt.Unix}}000-30m&end={{(index .Alerts 0).StartsAt.Unix}}000%s&search={{ .CommonLabels.asserts_notification_rule_name }}|View Impact>*" $assertsUrl $plus30min -}}
{{- printf "\n :fire: *<%s/insights/top?env[0]={{ .CommonLabels.asserts_env }}&start={{(index .Alerts 0).StartsAt.Unix}}000-30m&end={{(index .Alerts 0).StartsAt.Unix}}000%s&search={{ .CommonLabels.asserts_assertion_name }}|Start Troubleshooting>*" $assertsUrl $plus30min -}}
{{- printf "\n :fire: *<%s/assertions?env[0]={{ .CommonLabels.asserts_env }}&start={{(index .Alerts 0).StartsAt.Unix}}000-30m&end={{(index .Alerts 0).StartsAt.Unix}}000%s&search={{ .CommonLabels.asserts_assertion_name }}|Start Troubleshooting>*" $assertsUrl $plus30min -}}
{{- printf "\n {{- end }}" -}}
{{- printf "\n {{- end }}" -}}
{{- printf "\n *Alert details*:" -}}

View File

@ -4,9 +4,9 @@ dependencies:
version: 6.5.2
- name: mariadb
repository: oci://registry-1.docker.io/bitnamicharts
version: 12.2.4
version: 12.2.5
- name: common
repository: oci://registry-1.docker.io/bitnamicharts
version: 2.4.0
digest: sha256:4be6e447ef427ae68dd94decc3295e3a1d1415a2bb9f455f2a3ff4ea33a4a101
generated: "2023-05-23T08:42:16.375569322Z"
digest: sha256:ac347b3c0eb6aeaa7eafbc5bd5910fa6bf7a2336f63746f4cd4c6547100dcef1
generated: "2023-06-08T17:25:37.789940735Z"

View File

@ -40,4 +40,4 @@ maintainers:
name: wordpress
sources:
- https://github.com/bitnami/charts/tree/main/bitnami/wordpress
version: 16.1.13
version: 16.1.14

View File

@ -80,7 +80,7 @@ The command removes all the Kubernetes components associated with the chart and
| ------------------- | --------------------------------------------------------------------------------------------------------- | --------------------- |
| `image.registry` | WordPress image registry | `docker.io` |
| `image.repository` | WordPress image repository | `bitnami/wordpress` |
| `image.tag` | WordPress image tag (immutable tags are recommended) | `6.2.2-debian-11-r10` |
| `image.tag` | WordPress image tag (immutable tags are recommended) | `6.2.2-debian-11-r11` |
| `image.digest` | WordPress image digest in the way sha256:aa.... Please note this parameter, if set, will override the tag | `""` |
| `image.pullPolicy` | WordPress image pull policy | `IfNotPresent` |
| `image.pullSecrets` | WordPress image pull secrets | `[]` |
@ -247,7 +247,7 @@ The command removes all the Kubernetes components associated with the chart and
| `volumePermissions.enabled` | Enable init container that changes the owner/group of the PV mount point to `runAsUser:fsGroup` | `false` |
| `volumePermissions.image.registry` | Bitnami Shell image registry | `docker.io` |
| `volumePermissions.image.repository` | Bitnami Shell image repository | `bitnami/bitnami-shell` |
| `volumePermissions.image.tag` | Bitnami Shell image tag (immutable tags are recommended) | `11-debian-11-r123` |
| `volumePermissions.image.tag` | Bitnami Shell image tag (immutable tags are recommended) | `11-debian-11-r124` |
| `volumePermissions.image.digest` | Bitnami Shell image digest in the way sha256:aa.... Please note this parameter, if set, will override the tag | `""` |
| `volumePermissions.image.pullPolicy` | Bitnami Shell image pull policy | `IfNotPresent` |
| `volumePermissions.image.pullSecrets` | Bitnami Shell image pull secrets | `[]` |

View File

@ -2,7 +2,7 @@ annotations:
category: Database
licenses: Apache-2.0
apiVersion: v2
appVersion: 10.11.3
appVersion: 10.11.4
dependencies:
- name: common
repository: oci://registry-1.docker.io/bitnamicharts
@ -26,4 +26,4 @@ maintainers:
name: mariadb
sources:
- https://github.com/bitnami/charts/tree/main/bitnami/mariadb
version: 12.2.4
version: 12.2.5

View File

@ -84,7 +84,7 @@ The command removes all the Kubernetes components associated with the chart and
| -------------------------- | ----------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------- | ---------------------- |
| `image.registry` | MariaDB image registry | `docker.io` |
| `image.repository` | MariaDB image repository | `bitnami/mariadb` |
| `image.tag` | MariaDB image tag (immutable tags are recommended) | `10.11.3-debian-11-r5` |
| `image.tag` | MariaDB image tag (immutable tags are recommended) | `10.11.4-debian-11-r0` |
| `image.digest` | MariaDB image digest in the way sha256:aa.... Please note this parameter, if set, will override the tag | `""` |
| `image.pullPolicy` | MariaDB image pull policy | `IfNotPresent` |
| `image.pullSecrets` | Specify docker-registry secret names as an array | `[]` |
@ -306,7 +306,7 @@ The command removes all the Kubernetes components associated with the chart and
| `volumePermissions.enabled` | Enable init container that changes the owner and group of the persistent volume(s) mountpoint to `runAsUser:fsGroup` | `false` |
| `volumePermissions.image.registry` | Init container volume-permissions image registry | `docker.io` |
| `volumePermissions.image.repository` | Init container volume-permissions image repository | `bitnami/bitnami-shell` |
| `volumePermissions.image.tag` | Init container volume-permissions image tag (immutable tags are recommended) | `11-debian-11-r118` |
| `volumePermissions.image.tag` | Init container volume-permissions image tag (immutable tags are recommended) | `11-debian-11-r123` |
| `volumePermissions.image.digest` | Init container volume-permissions image digest in the way sha256:aa.... Please note this parameter, if set, will override the tag | `""` |
| `volumePermissions.image.pullPolicy` | Init container volume-permissions image pull policy | `IfNotPresent` |
| `volumePermissions.image.pullSecrets` | Specify docker-registry secret names as an array | `[]` |
@ -320,7 +320,7 @@ The command removes all the Kubernetes components associated with the chart and
| `metrics.enabled` | Start a side-car prometheus exporter | `false` |
| `metrics.image.registry` | Exporter image registry | `docker.io` |
| `metrics.image.repository` | Exporter image repository | `bitnami/mysqld-exporter` |
| `metrics.image.tag` | Exporter image tag (immutable tags are recommended) | `0.14.0-debian-11-r119` |
| `metrics.image.tag` | Exporter image tag (immutable tags are recommended) | `0.14.0-debian-11-r125` |
| `metrics.image.digest` | Exporter image digest in the way sha256:aa.... Please note this parameter, if set, will override the tag | `""` |
| `metrics.image.pullPolicy` | Exporter image pull policy | `IfNotPresent` |
| `metrics.image.pullSecrets` | Specify docker-registry secret names as an array | `[]` |
@ -543,7 +543,7 @@ kubectl delete statefulset opencart-mariadb --cascade=false
## License
Copyright &copy; 2023 Bitnami
Copyright &copy; 2023 VMware, Inc.
Licensed under the Apache License, Version 2.0 (the "License");
you may not use this file except in compliance with the License.

View File

@ -87,7 +87,7 @@ serviceBindings:
image:
registry: docker.io
repository: bitnami/mariadb
tag: 10.11.3-debian-11-r5
tag: 10.11.4-debian-11-r0
digest: ""
## Specify a imagePullPolicy
## Defaults to 'Always' if image tag is 'latest', else set to 'IfNotPresent'
@ -1001,7 +1001,7 @@ volumePermissions:
image:
registry: docker.io
repository: bitnami/bitnami-shell
tag: 11-debian-11-r118
tag: 11-debian-11-r123
digest: ""
pullPolicy: IfNotPresent
## Optionally specify an array of imagePullSecrets (secrets must be manually created in the namespace)
@ -1037,7 +1037,7 @@ metrics:
image:
registry: docker.io
repository: bitnami/mysqld-exporter
tag: 0.14.0-debian-11-r119
tag: 0.14.0-debian-11-r125
digest: ""
pullPolicy: IfNotPresent
## Optionally specify an array of imagePullSecrets (secrets must be manually created in the namespace)

View File

@ -73,7 +73,7 @@ diagnosticMode:
image:
registry: docker.io
repository: bitnami/wordpress
tag: 6.2.2-debian-11-r10
tag: 6.2.2-debian-11-r11
digest: ""
## Specify a imagePullPolicy
## Defaults to 'Always' if image tag is 'latest', else set to 'IfNotPresent'
@ -763,7 +763,7 @@ volumePermissions:
image:
registry: docker.io
repository: bitnami/bitnami-shell
tag: 11-debian-11-r123
tag: 11-debian-11-r124
digest: ""
pullPolicy: IfNotPresent
## Optionally specify an array of imagePullSecrets.

View File

@ -1,5 +1,9 @@
# Datadog changelog
## 3.32.0
* Add a new preferred parameter to enable Remote Configuration on both the agent and the cluster agent.
## 3.31.0
* Default `Agent` and `Cluster-Agent` to `7.45.0` version.

View File

@ -19,4 +19,4 @@ name: datadog
sources:
- https://app.datadoghq.com/account/settings#agent/kubernetes
- https://github.com/DataDog/datadog-agent
version: 3.31.0
version: 3.32.0

View File

@ -1,6 +1,6 @@
# Datadog
![Version: 3.31.0](https://img.shields.io/badge/Version-3.31.0-informational?style=flat-square) ![AppVersion: 7](https://img.shields.io/badge/AppVersion-7-informational?style=flat-square)
![Version: 3.32.0](https://img.shields.io/badge/Version-3.32.0-informational?style=flat-square) ![AppVersion: 7](https://img.shields.io/badge/AppVersion-7-informational?style=flat-square)
[Datadog](https://www.datadoghq.com/) is a hosted infrastructure monitoring platform. This chart adds the Datadog Agent to all nodes in your cluster via a DaemonSet. It also optionally depends on the [kube-state-metrics chart](https://github.com/prometheus-community/helm-charts/tree/main/charts/kube-state-metrics). For more information about monitoring Kubernetes with Datadog, please refer to the [Datadog documentation website](https://docs.datadoghq.com/agent/basic_agent_usage/kubernetes/).
@ -489,7 +489,7 @@ helm install <RELEASE_NAME> \
| clusterAgent.admissionController.enabled | bool | `true` | Enable the admissionController to be able to inject APM/Dogstatsd config and standard tags (env, service, version) automatically into your pods |
| clusterAgent.admissionController.failurePolicy | string | `"Ignore"` | Set the failure policy for dynamic admission control.' |
| clusterAgent.admissionController.mutateUnlabelled | bool | `false` | Enable injecting config without having the pod label 'admission.datadoghq.com/enabled="true"' |
| clusterAgent.admissionController.remoteInstrumentation.enabled | bool | `false` | Enable polling and applying library injection using Remote Config (beta). # This feature is in beta, and enables Remote Config in the Cluster Agent. It also requires Cluster Agent version 7.43+. # Enabling this feature grants the Cluster Agent the permissions to patch Deployment objects in the cluster. |
| clusterAgent.admissionController.remoteInstrumentation.enabled | bool | `false` | Enable polling and applying library injection using Remote Config. # This feature is in beta, and enables Remote Config in the Cluster Agent. It also requires Cluster Agent version 7.43+. # Enabling this feature grants the Cluster Agent the permissions to patch Deployment objects in the cluster. |
| clusterAgent.advancedConfd | object | `{}` | Provide additional cluster check configurations. Each key is an integration containing several config files. |
| clusterAgent.affinity | object | `{}` | Allow the Cluster Agent Deployment to schedule using affinity rules |
| clusterAgent.command | list | `[]` | Command to run in the Cluster Agent container as entrypoint |
@ -687,7 +687,7 @@ helm install <RELEASE_NAME> \
| datadog.prometheusScrape.enabled | bool | `false` | Enable autodiscovering pods and services exposing prometheus metrics. |
| datadog.prometheusScrape.serviceEndpoints | bool | `false` | Enable generating dedicated checks for service endpoints. |
| datadog.prometheusScrape.version | int | `2` | Version of the openmetrics check to schedule by default. |
| datadog.remoteConfiguration.enabled | bool | `false` | Set to true to enable remote configuration. |
| datadog.remoteConfiguration.enabled | bool | `false` | Set to true to enable remote configuration. Consider using remoteConfiguration.enabled instead |
| datadog.secretAnnotations | object | `{}` | |
| datadog.secretBackend.arguments | string | `nil` | Configure the secret backend command arguments (space-separated strings). |
| datadog.secretBackend.command | string | `nil` | Configure the secret backend command, path to the secret backend binary. |
@ -758,6 +758,7 @@ helm install <RELEASE_NAME> \
| providers.gke.autopilot | bool | `false` | Enables Datadog Agent deployment on GKE Autopilot |
| providers.gke.cos | bool | `false` | Enables Datadog Agent deployment on GKE with Container-Optimized OS (COS) |
| registry | string | `"gcr.io/datadoghq"` | Registry to use for all Agent images (default gcr.io) |
| remoteConfiguration.enabled | bool | `false` | Set to true to enable remote configuration on the Cluster Agent (if set) and the node agent. This will override `datadog.remoteConfiguration.enabled` and `clusterAgent.admissionController.remoteInstrumentation.enabled`. Preferred way to enable Remote Configuration. |
| targetSystem | string | `"linux"` | Target OS for this deployment (possible values: linux, windows) |
## Configuration options for Windows deployments

View File

@ -9,7 +9,7 @@
secretKeyRef:
name: {{ template "datadog.apiSecretName" . }}
key: api-key
{{- if .Values.datadog.remoteConfiguration.enabled }}
{{- if eq (include "datadog-remoteConfiguration-enabled" .) "true" }}
- name: DD_REMOTE_CONFIGURATION_ENABLED
value: "true"
{{- end }}

View File

@ -778,3 +778,25 @@ true
false
{{- end -}}
{{- end -}}
{{/*
Returns whether Remote Configuration should be enabled in the agent
*/}}
{{- define "datadog-remoteConfiguration-enabled" -}}
{{- if or .Values.remoteConfiguration.enabled .Values.datadog.remoteConfiguration.enabled -}}
true
{{- else -}}
false
{{- end -}}
{{- end -}}
{{/*
Returns whether Remote Configuration should be enabled in the cluster agent
*/}}
{{- define "clusterAgent-remoteConfiguration-enabled" -}}
{{- if or .Values.remoteConfiguration.enabled .Values.clusterAgent.admissionController.remoteInstrumentation.enabled -}}
true
{{- else -}}
false
{{- end -}}
{{- end -}}

View File

@ -213,7 +213,7 @@ spec:
- name: DD_ADMISSION_CONTROLLER_FAILURE_POLICY
value: {{ .Values.clusterAgent.admissionController.failurePolicy | quote }}
{{- end }}
{{- if .Values.clusterAgent.admissionController.remoteInstrumentation.enabled }}
{{- if eq (include "clusterAgent-remoteConfiguration-enabled" .) "true" }}
- name: DD_ADMISSION_CONTROLLER_AUTO_INSTRUMENTATION_PATCHER_ENABLED
value: "true"
- name: DD_REMOTE_CONFIGURATION_ENABLED

View File

@ -155,7 +155,7 @@ rules:
- list
- get
- watch
{{- if .Values.clusterAgent.admissionController.remoteInstrumentation.enabled }}
{{- if eq (include "clusterAgent-remoteConfiguration-enabled" .) "true" }}
- patch
{{- end }}
- apiGroups:

View File

@ -56,7 +56,7 @@ data:
network:
enabled: {{ $.Values.datadog.securityAgent.runtime.network.enabled }}
remote_configuration:
enabled: {{ if and .Values.datadog.securityAgent.runtime.enabled .Values.datadog.remoteConfiguration.enabled -}} true {{else -}} false {{end}}
enabled: {{ if and .Values.datadog.securityAgent.runtime.enabled (eq (include "datadog-remoteConfiguration-enabled" .) "true") -}} true {{else -}} false {{end}}
{{- if .Values.datadog.securityAgent.runtime.activityDump.enabled }}
activity_dump:
enabled: true

View File

@ -388,6 +388,7 @@ datadog:
remoteConfiguration:
# datadog.remoteConfiguration.enabled -- Set to true to enable remote configuration.
# Consider using remoteConfiguration.enabled instead
enabled: false
## Enable logs agent and provide custom configs
@ -971,7 +972,7 @@ clusterAgent:
failurePolicy: Ignore
remoteInstrumentation:
# clusterAgent.admissionController.remoteInstrumentation.enabled -- Enable polling and applying library injection using Remote Config (beta).
# clusterAgent.admissionController.remoteInstrumentation.enabled -- Enable polling and applying library injection using Remote Config.
## This feature is in beta, and enables Remote Config in the Cluster Agent. It also requires Cluster Agent version 7.43+.
## Enabling this feature grants the Cluster Agent the permissions to patch Deployment objects in the cluster.
enabled: false
@ -1935,3 +1936,9 @@ providers:
aks:
# providers.aks.enabled -- Activate all specifities related to AKS configuration. Required as currently we cannot auto-detect AKS.
enabled: false
remoteConfiguration:
# remoteConfiguration.enabled -- Set to true to enable remote configuration on the Cluster Agent (if set) and the node agent.
# This will override `datadog.remoteConfiguration.enabled` and `clusterAgent.admissionController.remoteInstrumentation.enabled`.
# Preferred way to enable Remote Configuration.
enabled: false

View File

@ -4,9 +4,9 @@ annotations:
catalog.cattle.io/kube-version: '>=1.19-0'
catalog.cattle.io/release-name: intel-device-plugins-operator
apiVersion: v2
appVersion: 0.26.1
appVersion: 0.27.0
description: A Helm chart for Intel Device Plugins Operator for Kubernetes
icon: https://avatars.githubusercontent.com/u/17888862?s=200&v=4
name: intel-device-plugins-operator
type: application
version: 0.26.1
version: 0.27.0

View File

@ -4,9 +4,9 @@ annotations:
catalog.cattle.io/kube-version: '>=1.19-0'
catalog.cattle.io/release-name: intel-device-plugins-qat
apiVersion: v2
appVersion: 0.26.1
appVersion: 0.27.0
description: A Helm chart for Intel QAT Device Plugin
icon: https://avatars.githubusercontent.com/u/17888862?s=200&v=4
name: intel-device-plugins-qat
type: application
version: 0.26.1
version: 0.27.0

View File

@ -4,9 +4,9 @@ annotations:
catalog.cattle.io/kube-version: '>=1.19-0'
catalog.cattle.io/release-name: intel-device-plugins-sgx
apiVersion: v2
appVersion: 0.26.1
appVersion: 0.27.0
description: A Helm chart for Intel SGX Device Plugin
icon: https://avatars.githubusercontent.com/u/17888862?s=200&v=4
name: intel-device-plugins-sgx
type: application
version: 0.26.1
version: 0.27.0

View File

@ -10,7 +10,6 @@ metadata:
annotations: {{ toYaml .Values.annotations | nindent 4 }}
spec:
image: "{{ .Values.image.hub }}/intel-sgx-plugin:{{ .Values.image.tag | default .Chart.AppVersion }}"
initImage: "{{ .Values.initImage.hub }}/intel-sgx-initcontainer:{{ .Values.initImage.tag | default .Chart.AppVersion }}"
enclaveLimit: {{ .Values.enclaveLimit }}
provisionLimit: {{ .Values.provisionLimit }}
logLevel: {{ .Values.logLevel }}

View File

@ -4,10 +4,6 @@ image:
hub: intel
tag: ""
initImage:
hub: intel
tag: ""
enclaveLimit: 110
provisionLimit: 110
logLevel: 4

View File

@ -1,7 +1,7 @@
annotations:
catalog.cattle.io/certified: partner
catalog.cattle.io/display-name: Quobyte Cluster Deployment
catalog.cattle.io/kube-version: 1.20-0 - 1.24-0
catalog.cattle.io/kube-version: 1.20-0 - 1.25-0
catalog.cattle.io/release-name: quobyte-cluster
apiVersion: v2
appVersion: "3"
@ -11,9 +11,9 @@ icon: https://quobyte.github.io/quobyte-k8s-resources/images/quobyte.png
keywords:
- quobyte
- storage
kubeVersion: 1.20-0 - 1.24-0
kubeVersion: 1.20-0 - 1.25-0
name: quobyte-cluster
sources:
- https://github.com/quobyte/quobyte-k8s-resources
type: application
version: 0.1.7
version: 0.1.8

View File

@ -1,64 +1,8 @@
<!-- Release notes generated using configuration in .github/release.yaml at master -->
<!-- Release notes generated using configuration in .github/release.yaml at main -->
## What's Changed
Weka CSI Plugin v2.0.0 has a comprehensive set of improvenents and new functionality:
* Support of different backings for CSI volumes (filesystem, writable snapshot, directory)
* CSI snapshot and volume cloning support
* `fsGroup` support
* Custom mount options per storageClass
* Redundant CSI controllers
* Restructuring of CI and release workflows
> **NOTE:** some of the functionality provided by Weka CSI Plugin 2.0.0 requires Weka software of version 4.2 or higher. Please refer to [documentation](README.md) for additional information
> **NOTE:** To better understand the different types of volume backings and their implications, refer to documentation.
### New features
* feat: Support of new volumes from content source by @sergeyberezansky in https://github.com/weka/csi-wekafs/pull/11
* feat: Support Mount options by @sergeyberezansky in https://github.com/weka/csi-wekafs/pull/18
* feat: Add fsGroup support on CSI driver by @sergeyberezansky in https://github.com/weka/csi-wekafs/pull/20
* feat: Support different backing types for CSI volumes by @sergeyberezansky in https://github.com/weka/csi-wekafs/pull/69
* feat: official support for multiple controller server replicas by @sergeyberezansky in https://github.com/weka/csi-wekafs/pull/47
### Improvements
* feat: configurable log format (colorized human-readable logs or JSON structured logs) by @sergeyberezansky in https://github.com/weka/csi-wekafs/pull/26
* feat: OpenTelemetry tracing support by @sergeyberezansky in https://github.com/weka/csi-wekafs/pull/26
* feat: support of mutually exclusive mount options by @sergeyberezansky in https://github.com/weka/csi-wekafs/pull/54
* feat: Add concurrency limitation for multiple requests by @sergeyberezansky in https://github.com/weka/csi-wekafs/pull/56
* refactor: concurrency improvements by @sergeyberezansky in https://github.com/weka/csi-wekafs/pull/68
### Bug Fixes
* fix: Correctly calculate capacity for FS-based volume expansion (fixu… by @sergeyberezansky in https://github.com/weka/csi-wekafs/pull/15
* refactor: do not recover lost mounts and shorten default mountOptions by @sergeyberezansky in https://github.com/weka/csi-wekafs/pull/21
* fix: plugin might crash when trying to create dir-based volume on non… by @sergeyberezansky in https://github.com/weka/csi-wekafs/pull/29
* fix: CSI-47 Snapshot volumes run out of space after filling FS space by @sergeyberezansky in https://github.com/weka/csi-wekafs/pull/35
* fix: WEKAPP-298226 volumes published with ReadOnlyMany were writable by @sergeyberezansky in https://github.com/weka/csi-wekafs/pull/36
* fix: initial filesystem capacity conversion to bytes is invalid by @sergeyberezansky in https://github.com/weka/csi-wekafs/pull/38
* fix: loozen snapshot id validation for static provisioning by @sergeyberezansky in https://github.com/weka/csi-wekafs/pull/41
* fix: re-enable writecache by default by @sergeyberezansky in https://github.com/weka/csi-wekafs/pull/51
* fix: make sure op is written correctly for each function by @sergeyberezansky in https://github.com/weka/csi-wekafs/pull/67
* fix(CSI-74): no error returned when fetching info from weka cluster fails by @dontbreakit & @sergeyberezansky in https://github.com/weka/csi-wekafs/pull/102
* fix(CSI-107): revert csi-attacher by @dontbreakit in https://github.com/weka/csi-wekafs/pull/103
### Miscellaneous
* style: add more logging to initial FS resize by @sergeyberezansky in https://github.com/weka/csi-wekafs/pull/37
* Add Helm linting and install test by @sergeyberezansky in https://github.com/weka/csi-wekafs/pull/13
* Push updated docs to main branch straight after PR merge by @sergeyberezansky in https://github.com/weka/csi-wekafs/pull/19
* docs: modify helm docs templates by @sergeyberezansky in https://github.com/weka/csi-wekafs/pull/22
* chore: add S3 chart upload GH task by @sergeyberezansky in https://github.com/weka/csi-wekafs/pull/23
* chore: auto increase version on feat git commit by @sergeyberezansky in https://github.com/weka/csi-wekafs/pull/24
* feat: Bump versions of packages by @sergeyberezansky in https://github.com/weka/csi-wekafs/pull/25
* chore: change docker build via native buildx GH action by @sergeyberezansky in https://github.com/weka/csi-wekafs/pull/27
* ci: add csi-sanity action to PRs by @dontbreakit in https://github.com/weka/csi-wekafs/pull/30
* ci: add release action by @dontbreakit in https://github.com/weka/csi-wekafs/pull/34
* docs: Improve documentation on mount options and different volume types by @sergeyberezansky in https://github.com/weka/csi-wekafs/pull/39
* chore: Bump CSI sidecar images to latest version by @sergeyberezansky in https://github.com/weka/csi-wekafs/pull/42
* docs: fix capacityEnforcement comment inside storageClass examples by @sergeyberezansky in https://github.com/weka/csi-wekafs/pull/46
* Add notifications to slack by @dontbreakit in https://github.com/weka/csi-wekafs/pull/53
* docs: Improve release.yaml to include additional PR labels by @sergeyberezansky in https://github.com/weka/csi-wekafs/pull/70
## Upgrade Implications
In order to support `fsGroup` functionality, the CSIDriver manifest had to be modified. Since this type of Kubernetes objects is defined as immutable, upgrading Helm release with the new version might fail.
Hence, when upgrading from version below 2.0.0, a complete uninstall and reinstall of Helm release is required.
> NOTE: it is not required to remove any Secrets, storageClass definitions, PersistentVolumes or PersistentVolumeClaims.
## Deprecation Notice
Support of legacy volumes without API binding will be removed in next major release of Weka CSI Plugin. New features rely on API connectivity to Weka cluster and will not be supported on API unbound volumes. Please make sure to migrate all existing volumes to API based scheme prior to next version upgrade.

View File

@ -1,6 +1,6 @@
annotations:
artifacthub.io/category: storage
artifacthub.io/containsSecurityUpdates: "true"
artifacthub.io/containsSecurityUpdates: "false"
artifacthub.io/license: Apache-2.0
artifacthub.io/prerelease: "false"
catalog.cattle.io/certified: partner
@ -8,7 +8,7 @@ annotations:
catalog.cattle.io/kube-version: '>=1.18.0'
catalog.cattle.io/release-name: csi-wekafsplugin
apiVersion: v2
appVersion: 2.0.0
appVersion: v2.0.1
description: Helm chart for Deployment of WekaIO Container Storage Interface (CSI)
plugin for WekaFS - the world fastest filesystem
home: https://github.com/weka/csi-wekafs
@ -24,6 +24,6 @@ maintainers:
url: https://weka.io
name: csi-wekafsplugin
sources:
- https://github.com/weka/csi-wekafs/tree/$VERSION
- https://github.com/weka/csi-wekafs/tree/v2.0.1
type: application
version: 2.0.0
version: 2.0.1

View File

@ -3,7 +3,7 @@ Helm chart for Deployment of WekaIO Container Storage Interface (CSI) plugin for
[![License](https://img.shields.io/badge/License-Apache%202.0-blue.svg)](https://opensource.org/licenses/Apache-2.0)
[![Artifact HUB](https://img.shields.io/endpoint?url=https://artifacthub.io/badge/repository/csi-wekafs)](https://artifacthub.io/packages/search?repo=csi-wekafs)
![Version: 2.0.0](https://img.shields.io/badge/Version-2.0.0-informational?style=flat-square) ![Type: application](https://img.shields.io/badge/Type-application-informational?style=flat-square) ![AppVersion: 2.0.0](https://img.shields.io/badge/AppVersion-2.0.0-informational?style=flat-square)
![Version: 2.0.1](https://img.shields.io/badge/Version-2.0.1-informational?style=flat-square) ![Type: application](https://img.shields.io/badge/Type-application-informational?style=flat-square) ![AppVersion: v2.0.1](https://img.shields.io/badge/AppVersion-v2.0.1-informational?style=flat-square)
## Homepage
https://github.com/weka/csi-wekafs
@ -56,27 +56,26 @@ Kubernetes: `>=1.18.0`
|-----|------|---------|-------------|
| dynamicProvisionPath | string | `"csi-volumes"` | Directory in root of file system where dynamic volumes are provisioned |
| csiDriverName | string | `"csi.weka.io"` | Name of the driver (and provisioner) |
| csiDriverVersion | string | `"2.0.0"` | CSI driver version |
| csiDriverVersion | string | `"2.0.1"` | CSI driver version |
| images.livenessprobesidecar | string | `"registry.k8s.io/sig-storage/livenessprobe:v2.10.0"` | CSI liveness probe sidecar image URL |
| images.attachersidecar | string | `"registry.k8s.io/sig-storage/csi-attacher:v4.3.0"` | CSI attacher sidecar image URL |
| images.provisionersidecar | string | `"registry.k8s.io/sig-storage/csi-provisioner:v3.5.0"` | CSI provisioner sidecar image URL |
| images.registrarsidecar | string | `"registry.k8s.io/sig-storage/csi-node-driver-registrar:v2.8.0"` | CSI registrar sidercar |
| images.resizersidecar | string | `"registry.k8s.io/sig-storage/csi-resizer:v1.8.0"` | CSI resizer sidecar image URL |
| images.snapshottersidecar | string | `"registry.k8s.io/sig-storage/csi-snapshotter:v6.2.1"` | CSI snapshotter sidecar image URL |
| images.csidriver | string | `"quay.io/weka.io/csi-wekafs"` | CSI driver main image URL |
| images.csidriverTag | string | `"2.0.0"` | CSI driver tag |
| images.csidriverTag | string | `"2.0.1"` | CSI driver tag |
| globalPluginTolerations | list | `[{"effect":"NoSchedule","key":"node-role.kubernetes.io/master","operator":"Exists"}]` | Tolerations for all CSI driver components |
| controllerPluginTolerations | list | `[{"effect":"NoSchedule","key":"node-role.kubernetes.io/master","operator":"Exists"}]` | Tolerations for CSI controller component only (by default same as global) |
| nodePluginTolerations | list | `[{"effect":"NoSchedule","key":"node-role.kubernetes.io/master","operator":"Exists"}]` | Tolerations for CSI node component only (by default same as global) |
| nodeSelector | object | `{}` | Optional nodeSelector for CSI plugin deployment on certain Kubernetes nodes only |
| controller | object | `{"concurrency":{"createSnapshot":5,"createVolume":5,"deleteSnapshot":5,"deleteVolume":1,"expandVolume":5},"configureProvisionerLeaderElection":true,"configureResizerLeaderElection":true,"configureSnapshotterLeaderElection":true,"grpcRequestTimeoutSeconds":30,"maxConcurrentRequests":5,"replicas":2}` | Controller-specific parameters, please do not change unless explicitly guided |
| controller.replicas | int | `2` | Controller number of replicas |
| controller.maxConcurrentRequests | int | `5` | Maximum concurrent requests from sidecars (global) |
| controller.concurrency | object | `{"createSnapshot":5,"createVolume":5,"deleteSnapshot":5,"deleteVolume":1,"expandVolume":5}` | maximum concurrent operations per operation type (to avoid API starvation) |
| controller.concurrency | object | `{"createSnapshot":5,"createVolume":5,"deleteSnapshot":5,"deleteVolume":1,"expandVolume":5}` | maximum concurrent operations per operation type |
| controller.grpcRequestTimeoutSeconds | int | `30` | Return GRPC Unavailable if request waits in queue for that long time (seconds) |
| controller.configureProvisionerLeaderElection | bool | `true` | Configure provisioner sidecar for leader election |
| controller.configureResizerLeaderElection | bool | `true` | Configure resizer sidecar for leader election |
| controller.configureSnapshotterLeaderElection | bool | `true` | Configure snapshotter sidecar for leader election |
| node | object | `{"concurrency":{"nodePublishVolume":5,"nodeUnpublishVolume":5},"grpcRequestTimeoutSeconds":30,"maxConcurrentRequests":5}` | Node-specific parameters, please do not change unless explicitly guided |
| node.maxConcurrentRequests | int | `5` | Maximum concurrent requests from sidecars (global) |
| node.concurrency | object | `{"nodePublishVolume":5,"nodeUnpublishVolume":5}` | maximum concurrent operations per operation type (to avoid API starvation) |
| node.grpcRequestTimeoutSeconds | int | `30` | Return GRPC Unavailable if request waits in queue for that long time (seconds) |
@ -93,13 +92,13 @@ Kubernetes: `>=1.18.0`
| metrics.resizerPort | int | `9092` | Resizer metrics port |
| metrics.snapshotterPort | int | `9093` | Snapshotter metrics port |
| pluginConfig.allowInsecureHttps | bool | `false` | Allow insecure HTTPS (skip TLS certificate verification) |
| pluginConfig.objectNaming.volumePrefix | string | `"csivol-"` | Prefix that will be added to names of Weka cluster filesystems / snapshots assocciated with CSI volume, must not exceed 7 symbols. |
| pluginConfig.objectNaming.snapshotPrefix | string | `"csisnp-"` | Prefix that will be added to names of Weka cluster snapshots assocciated with CSI snapshot, must not exceed 7 symbols. |
| pluginConfig.objectNaming.seedSnapshotPrefix | string | `"csisnp-seed-"` | Prefix that will be added to automatically created "seed" snapshot of empty filesytem, must not exceed 12 symbols. |
| pluginConfig.objectNaming.volumePrefix | string | `"csivol-"` | Prefix that will be added to names of Weka cluster filesystems / snapshots assocciated with CSI volume, must not exceed 7 symbols. |
| pluginConfig.objectNaming.snapshotPrefix | string | `"csisnp-"` | Prefix that will be added to names of Weka cluster snapshots assocciated with CSI snapshot, must not exceed 7 symbols. |
| pluginConfig.objectNaming.seedSnapshotPrefix | string | `"csisnp-seed-"` | Prefix that will be added to automatically created "seed" snapshot of empty filesytem, must not exceed 12 symbols. |
| pluginConfig.allowedOperations.autoCreateFilesystems | bool | `true` | Allow automatic provisioning of CSI volumes based on distinct Weka filesystem |
| pluginConfig.allowedOperations.autoExpandFilesystems | bool | `true` | Allow automatic expansion of filesystem on which Weka snapshot-backed CSI volumes, e.g. in case a required volume capacity exceeds the size of filesystem. Note: the filesystem is not expanded automatically when a new directory-backed volume is provisioned |
| pluginConfig.allowedOperations.snapshotDirectoryVolumes | bool | `false` | Create snapshots of legacy (dir/v1) volumes. By default disabled. Note: when enabled, for every legacy volume snapshot, a full filesystem snapshot will be created (wasteful) |
| pluginConfig.allowedOperations.snapshotVolumesWithoutQuotaEnforcement | bool | `false` | Allow creation of snapshot-backed volumes even on unsupported Weka cluster versions, off by default Note: On versions of Weka < v4.2 snapshot-backed volume capacity cannot be enforced |
| pluginConfig.allowedOperations.autoExpandFilesystems | bool | `true` | Allow automatic expansion of filesystem on which Weka snapshot-backed CSI volumes, e.g. in case a required volume capacity exceeds the size of filesystem. Note: the filesystem is not expanded automatically when a new directory-backed volume is provisioned |
| pluginConfig.allowedOperations.snapshotDirectoryVolumes | bool | `false` | Create snapshots of legacy (dir/v1) volumes. By default disabled. Note: when enabled, for every legacy volume snapshot, a full filesystem snapshot will be created (wasteful) |
| pluginConfig.allowedOperations.snapshotVolumesWithoutQuotaEnforcement | bool | `false` | Allow creation of snapshot-backed volumes even on unsupported Weka cluster versions, off by default Note: On versions of Weka < v4.2 snapshot-backed volume capacity cannot be enforced |
| pluginConfig.mutuallyExclusiveMountOptions[0] | string | `"readcache,writecache,coherent"` | |
----------------------------------------------

View File

@ -31,6 +31,23 @@ spec:
{{- end }}
serviceAccountName: {{ .Release.Name }}-controller
containers:
- name: csi-attacher
image: {{ required "csi attacher sidercar image." .Values.images.attachersidecar }}
securityContext:
privileged: true
args:
- "--csi-address=$(ADDRESS)"
- "--v={{ .Values.logLevel | default 5 }}"
- "--timeout=60s"
- "--leader-election"
- "--leader-election-namespace={{ .Release.Namespace }}"
- "--worker-threads={{ .Values.controller.maxConcurrentRequests }}"
env:
- name: ADDRESS
value: unix:///csi/csi.sock
volumeMounts:
- name: socket-dir
mountPath: /csi
- name: csi-provisioner
image: {{ required "csi provisioner sidecar container image." .Values.images.provisionersidecar }}
args:

View File

@ -91,6 +91,9 @@
"images": {
"type": "object",
"properties": {
"attachersidecar": {
"type": "string"
},
"csidriver": {
"type": "string"
},

View File

@ -5,10 +5,12 @@ dynamicProvisionPath: "csi-volumes"
# -- Name of the driver (and provisioner)
csiDriverName: "csi.weka.io"
# -- CSI driver version
csiDriverVersion: &csiDriverVersion 2.0.0
csiDriverVersion: &csiDriverVersion 2.0.1
images:
# -- CSI liveness probe sidecar image URL
livenessprobesidecar: registry.k8s.io/sig-storage/livenessprobe:v2.10.0
# -- CSI attacher sidecar image URL
attachersidecar: registry.k8s.io/sig-storage/csi-attacher:v4.3.0
# -- CSI provisioner sidecar image URL
provisionersidecar: registry.k8s.io/sig-storage/csi-provisioner:v3.5.0
# -- CSI registrar sidercar
@ -32,13 +34,13 @@ controllerPluginTolerations: *globalPluginTolerations
nodePluginTolerations: *globalPluginTolerations
# -- Optional nodeSelector for CSI plugin deployment on certain Kubernetes nodes only
nodeSelector: {}
# -- Controller-specific parameters, please do not change unless explicitly guided
# Controller-specific parameters, please do not change unless explicitly guided
controller:
# -- Controller number of replicas
replicas: 2
# -- Maximum concurrent requests from sidecars (global)
maxConcurrentRequests: 5
# -- maximum concurrent operations per operation type (to avoid API starvation)
# -- maximum concurrent operations per operation type
concurrency:
createVolume: 5
deleteVolume: 1
@ -53,7 +55,7 @@ controller:
configureResizerLeaderElection: true
# -- Configure snapshotter sidecar for leader election
configureSnapshotterLeaderElection: true
# -- Node-specific parameters, please do not change unless explicitly guided
# Node-specific parameters, please do not change unless explicitly guided
node:
# -- Maximum concurrent requests from sidecars (global)
maxConcurrentRequests: 5
@ -102,26 +104,26 @@ pluginConfig:
allowInsecureHttps: false
objectNaming:
# -- Prefix that will be added to names of Weka cluster filesystems / snapshots assocciated with CSI volume,
# must not exceed 7 symbols.
# must not exceed 7 symbols.
volumePrefix: "csivol-"
# -- Prefix that will be added to names of Weka cluster snapshots assocciated with CSI snapshot,
# must not exceed 7 symbols.
# must not exceed 7 symbols.
snapshotPrefix: "csisnp-"
# -- Prefix that will be added to automatically created "seed" snapshot of empty filesytem,
# must not exceed 12 symbols.
# must not exceed 12 symbols.
seedSnapshotPrefix: "csisnp-seed-"
allowedOperations:
# -- Allow automatic provisioning of CSI volumes based on distinct Weka filesystem
autoCreateFilesystems: true
# -- Allow automatic expansion of filesystem on which Weka snapshot-backed CSI volumes,
# e.g. in case a required volume capacity exceeds the size of filesystem.
# Note: the filesystem is not expanded automatically when a new directory-backed volume is provisioned
# e.g. in case a required volume capacity exceeds the size of filesystem.
# Note: the filesystem is not expanded automatically when a new directory-backed volume is provisioned
autoExpandFilesystems: true
# -- Create snapshots of legacy (dir/v1) volumes. By default disabled.
# Note: when enabled, for every legacy volume snapshot, a full filesystem snapshot will be created (wasteful)
# Note: when enabled, for every legacy volume snapshot, a full filesystem snapshot will be created (wasteful)
snapshotDirectoryVolumes: false
# -- Allow creation of snapshot-backed volumes even on unsupported Weka cluster versions, off by default
# Note: On versions of Weka < v4.2 snapshot-backed volume capacity cannot be enforced
# Note: On versions of Weka < v4.2 snapshot-backed volume capacity cannot be enforced
snapshotVolumesWithoutQuotaEnforcement: false
mutuallyExclusiveMountOptions:
- "readcache,writecache,coherent"

View File

@ -1182,6 +1182,45 @@ entries:
- assets/ambassador/ambassador-6.7.1100.tgz
version: 6.7.1100
argo-cd:
- annotations:
artifacthub.io/changes: |
- kind: fixed
description: Allow to specify redis.conf file
artifacthub.io/signKey: |
fingerprint: 2B8F22F57260EFA67BE1C5824B11F800CD9D2252
url: https://argoproj.github.io/argo-helm/pgp_keys.asc
catalog.cattle.io/certified: partner
catalog.cattle.io/display-name: Argo CD
catalog.cattle.io/kube-version: '>=1.23.0-0'
catalog.cattle.io/release-name: argo-cd
apiVersion: v2
appVersion: v2.7.4
created: "2023-06-09T20:30:02.199487969Z"
dependencies:
- condition: redis-ha.enabled
name: redis-ha
repository: file://./charts/redis-ha
version: 4.23.0
description: A Helm chart for Argo CD, a declarative, GitOps continuous delivery
tool for Kubernetes.
digest: efbe888e9a71a78a1d4200fc67038c0f2cbd86b37771db7e6b94a9c8554dac5d
home: https://github.com/argoproj/argo-helm
icon: https://argo-cd.readthedocs.io/en/stable/assets/logo.png
keywords:
- argoproj
- argocd
- gitops
kubeVersion: '>=1.23.0-0'
maintainers:
- name: argoproj
url: https://argoproj.github.io/
name: argo-cd
sources:
- https://github.com/argoproj/argo-helm/tree/main/charts/argo-cd
- https://github.com/argoproj/argo-cd
urls:
- assets/argo/argo-cd-5.36.1.tgz
version: 5.36.1
- annotations:
artifacthub.io/changes: |
- kind: added
@ -4919,6 +4958,71 @@ entries:
- assets/jfrog/artifactory-jcr-2.5.100.tgz
version: 2.5.100
asserts:
- annotations:
catalog.cattle.io/certified: partner
catalog.cattle.io/display-name: Asserts
catalog.cattle.io/kube-version: '>=1.17-0'
catalog.cattle.io/release-name: asserts
apiVersion: v2
created: "2023-06-09T20:30:02.67930755Z"
dependencies:
- condition: knowledge-sensor.enabled
name: knowledge-sensor
repository: file://./charts/knowledge-sensor
version: 1.1.0
- alias: tsdb
condition: tsdb.enabled
name: victoria-metrics-single
repository: file://./charts/victoria-metrics-single
version: 1.1.0
- condition: alertmanager.enabled
name: alertmanager
repository: file://./charts/alertmanager
version: 1.0.0
- alias: promxyruler
condition: promxyruler.enabled
name: promxy
repository: file://./charts/promxy
version: 0.8.0
- alias: promxyuser
condition: promxyuser.enabled
name: promxy
repository: file://./charts/promxy
version: 0.8.0
- alias: ebpfProbe
condition: ebpfProbe.enabled
name: ebpf-probe
repository: file://./charts/ebpf-probe
version: 0.7.0
- name: common
repository: file://./charts/common
version: 1.x.x
- alias: redisgraph
condition: redisgraph.enabled
name: redis
repository: file://./charts/redis
version: 16.13.2
- alias: redisearch
condition: redisearch.enabled
name: redis
repository: file://./charts/redis
version: 16.13.2
- alias: postgres
condition: postgres.enabled
name: postgresql
repository: file://./charts/postgresql
version: 11.9.13
description: Asserts Helm Chart to configure entire asserts stack
digest: 81c069c352b607e696d29e69081af2a4babb2bcea10633ba7955d26232e2b3e2
icon: https://www.asserts.ai/favicon.png
maintainers:
- name: Asserts
url: https://github.com/asserts
name: asserts
type: application
urls:
- assets/asserts/asserts-1.42.0.tgz
version: 1.42.0
- annotations:
catalog.cattle.io/certified: partner
catalog.cattle.io/display-name: Asserts
@ -10941,6 +11045,39 @@ entries:
- assets/dell/csi-vxflexos-2.1.0.tgz
version: 2.1.0
csi-wekafsplugin:
- annotations:
artifacthub.io/category: storage
artifacthub.io/containsSecurityUpdates: "false"
artifacthub.io/license: Apache-2.0
artifacthub.io/prerelease: "false"
catalog.cattle.io/certified: partner
catalog.cattle.io/display-name: WekaFS CSI Driver
catalog.cattle.io/kube-version: '>=1.18.0'
catalog.cattle.io/release-name: csi-wekafsplugin
apiVersion: v2
appVersion: v2.0.1
created: "2023-06-09T20:30:08.966177326Z"
description: Helm chart for Deployment of WekaIO Container Storage Interface (CSI)
plugin for WekaFS - the world fastest filesystem
digest: b7bdfad38257fa16a3aeae6571e1b01f5de6369a32400613925048a1ed2aabff
home: https://github.com/weka/csi-wekafs
icon: https://weka.github.io/csi-wekafs/logo.png
keywords:
- storage
- filesystem
- HPC
kubeVersion: '>=1.18.0'
maintainers:
- email: csi@weka.io
name: WekaIO, Inc.
url: https://weka.io
name: csi-wekafsplugin
sources:
- https://github.com/weka/csi-wekafs/tree/v2.0.1
type: application
urls:
- assets/weka/csi-wekafsplugin-2.0.1.tgz
version: 2.0.1
- annotations:
artifacthub.io/category: storage
artifacthub.io/containsSecurityUpdates: "true"
@ -11030,6 +11167,43 @@ entries:
- assets/weka/csi-wekafsplugin-0.6.400.tgz
version: 0.6.400
datadog:
- annotations:
catalog.cattle.io/certified: partner
catalog.cattle.io/display-name: Datadog
catalog.cattle.io/kube-version: '>=1.10-0'
catalog.cattle.io/release-name: datadog
apiVersion: v1
appVersion: "7"
created: "2023-06-09T20:30:05.244691426Z"
dependencies:
- condition: clusterAgent.metricsProvider.useDatadogMetrics
name: datadog-crds
repository: https://helm.datadoghq.com
tags:
- install-crds
version: 0.4.7
- condition: datadog.kubeStateMetricsEnabled
name: kube-state-metrics
repository: https://prometheus-community.github.io/helm-charts
version: 2.13.2
description: Datadog Agent
digest: 3fe083108c953c80ac60b348f39acca28607b11ce7cdd4e641030be0238aab86
home: https://www.datadoghq.com
icon: https://datadog-live.imgix.net/img/dd_logo_70x75.png
keywords:
- monitoring
- alerting
- metric
maintainers:
- email: support@datadoghq.com
name: Datadog
name: datadog
sources:
- https://app.datadoghq.com/account/settings#agent/kubernetes
- https://github.com/DataDog/datadog-agent
urls:
- assets/datadog/datadog-3.32.0.tgz
version: 3.32.0
- annotations:
catalog.cattle.io/certified: partner
catalog.cattle.io/display-name: Datadog
@ -16999,6 +17173,22 @@ entries:
- assets/instana/instana-agent-1.0.2900.tgz
version: 1.0.2900
intel-device-plugins-operator:
- annotations:
catalog.cattle.io/certified: partner
catalog.cattle.io/display-name: Intel Device Plugins Operator
catalog.cattle.io/kube-version: '>=1.19-0'
catalog.cattle.io/release-name: intel-device-plugins-operator
apiVersion: v2
appVersion: 0.27.0
created: "2023-06-09T20:30:05.836553127Z"
description: A Helm chart for Intel Device Plugins Operator for Kubernetes
digest: ffd27fef5ab8d399198729081951a5cf890f0b51afc1119da32172a0a94fb1f3
icon: https://avatars.githubusercontent.com/u/17888862?s=200&v=4
name: intel-device-plugins-operator
type: application
urls:
- assets/intel/intel-device-plugins-operator-0.27.0.tgz
version: 0.27.0
- annotations:
catalog.cattle.io/certified: partner
catalog.cattle.io/display-name: Intel Device Plugins Operator
@ -17080,6 +17270,22 @@ entries:
- assets/intel/intel-device-plugins-operator-0.24.1.tgz
version: 0.24.1
intel-device-plugins-qat:
- annotations:
catalog.cattle.io/certified: partner
catalog.cattle.io/display-name: Intel QAT Device Plugin
catalog.cattle.io/kube-version: '>=1.19-0'
catalog.cattle.io/release-name: intel-device-plugins-qat
apiVersion: v2
appVersion: 0.27.0
created: "2023-06-09T20:30:05.839495146Z"
description: A Helm chart for Intel QAT Device Plugin
digest: f242159063e9c9573647934abc059c7049dbf349688fa0a5f13f4fe9caa61a58
icon: https://avatars.githubusercontent.com/u/17888862?s=200&v=4
name: intel-device-plugins-qat
type: application
urls:
- assets/intel/intel-device-plugins-qat-0.27.0.tgz
version: 0.27.0
- annotations:
catalog.cattle.io/certified: partner
catalog.cattle.io/display-name: Intel QAT Device Plugin
@ -17113,6 +17319,22 @@ entries:
- assets/intel/intel-device-plugins-qat-0.26.0.tgz
version: 0.26.0
intel-device-plugins-sgx:
- annotations:
catalog.cattle.io/certified: partner
catalog.cattle.io/display-name: Intel SGX Device Plugin
catalog.cattle.io/kube-version: '>=1.19-0'
catalog.cattle.io/release-name: intel-device-plugins-sgx
apiVersion: v2
appVersion: 0.27.0
created: "2023-06-09T20:30:05.840708353Z"
description: A Helm chart for Intel SGX Device Plugin
digest: 2ca333f45b6b46ce924ea2287c9b497c4e2215c6fb6632b84b20909e35cdd2c3
icon: https://avatars.githubusercontent.com/u/17888862?s=200&v=4
name: intel-device-plugins-sgx
type: application
urls:
- assets/intel/intel-device-plugins-sgx-0.27.0.tgz
version: 0.27.0
- annotations:
catalog.cattle.io/certified: partner
catalog.cattle.io/display-name: Intel SGX Device Plugin
@ -30890,6 +31112,29 @@ entries:
- assets/percona/pxc-operator-1.12.0.tgz
version: 1.12.0
quobyte-cluster:
- annotations:
catalog.cattle.io/certified: partner
catalog.cattle.io/display-name: Quobyte Cluster Deployment
catalog.cattle.io/kube-version: 1.20-0 - 1.25-0
catalog.cattle.io/release-name: quobyte-cluster
apiVersion: v2
appVersion: "3"
created: "2023-06-09T20:30:08.100686467Z"
description: Quobyte Cluster Helm Chart Deployment
digest: 4a07534efae7684f573e61fa725268c959533f087bec714b200c589b4dcfeb21
home: https://www.quobyte.com
icon: https://quobyte.github.io/quobyte-k8s-resources/images/quobyte.png
keywords:
- quobyte
- storage
kubeVersion: 1.20-0 - 1.25-0
name: quobyte-cluster
sources:
- https://github.com/quobyte/quobyte-k8s-resources
type: application
urls:
- assets/quobyte/quobyte-cluster-0.1.8.tgz
version: 0.1.8
- annotations:
catalog.cattle.io/certified: partner
catalog.cattle.io/display-name: Quobyte Cluster Deployment
@ -33892,6 +34137,45 @@ entries:
- assets/redpanda/redpanda-2.1.7.tgz
version: 2.1.7
s3gw:
- annotations:
app.aquarist-labs.io/name: s3gw
artifacthub.io/category: storage
artifacthub.io/links: |
- name: homepage
url: https://s3gw.io/
- name: support
url: https://github.com/aquarist-labs/s3gw/issues
catalog.cattle.io/certified: partner
catalog.cattle.io/display-name: S3 Gateway
catalog.cattle.io/experimental: "true"
catalog.cattle.io/kube-version: '>=1.14'
catalog.cattle.io/namespace: s3gw
catalog.cattle.io/release-name: s3gw
apiVersion: v2
appVersion: latest
created: "2023-06-09T20:30:01.596139894Z"
description: 'Easy-to-use Open Source and Cloud Native S3 service for use on Rancher''s
Kubernetes. '
digest: 8db980f0e976ff7a773c01f5298ad3534efcc1a441645125f6c1100bdad51781
home: https://github.com/aquarist-labs/s3gw
icon: https://raw.githubusercontent.com/aquarist-labs/aquarium-website/gh-pages/images/logo-xl.png
keywords:
- storage
- s3
kubeVersion: '>=1.14'
maintainers:
- email: s3gw@suse.com
name: s3gw maintainers
url: https://github.com/orgs/aquarist-labs/projects/5
name: s3gw
sources:
- https://github.com/aquarist-labs/s3gw-charts
- https://github.com/aquarist-labs/s3gw
- https://github.com/aquarist-labs/ceph
type: application
urls:
- assets/aquarist-labs/s3gw-0.17.0.tgz
version: 0.17.0
- annotations:
app.aquarist-labs.io/name: s3gw
artifacthub.io/category: storage
@ -40444,6 +40728,53 @@ entries:
- assets/hashicorp/vault-0.22.0.tgz
version: 0.22.0
wordpress:
- annotations:
catalog.cattle.io/certified: partner
catalog.cattle.io/display-name: WordPress
catalog.cattle.io/kube-version: '>=1.19-0'
catalog.cattle.io/release-name: wordpress
category: CMS
licenses: Apache-2.0
apiVersion: v2
appVersion: 6.2.2
created: "2023-06-09T20:30:04.606488427Z"
dependencies:
- condition: memcached.enabled
name: memcached
repository: file://./charts/memcached
version: 6.x.x
- condition: mariadb.enabled
name: mariadb
repository: file://./charts/mariadb
version: 12.x.x
- name: common
repository: file://./charts/common
tags:
- bitnami-common
version: 2.x.x
description: WordPress is the world's most popular blogging and content management
platform. Powerful yet simple, everyone from students to global corporations
use it to build beautiful, functional websites.
digest: 57d647b00cfe20d4363daaa3a8b03205ed8ce0ee5444ed590ee208c9c1f829c3
home: https://bitnami.com
icon: https://s.w.org/style/images/about/WordPress-logotype-simplified.png
keywords:
- application
- blog
- cms
- http
- php
- web
- wordpress
maintainers:
- name: VMware, Inc.
url: https://github.com/bitnami/charts
name: wordpress
sources:
- https://github.com/bitnami/charts/tree/main/bitnami/wordpress
urls:
- assets/bitnami/wordpress-16.1.14.tgz
version: 16.1.14
- annotations:
catalog.cattle.io/certified: partner
catalog.cattle.io/display-name: WordPress