Charts CI
``` Updated: aquarist-labs/s3gw: - 0.17.0 argo/argo-cd: - 5.36.1 asserts/asserts: - 1.42.0 bitnami/wordpress: - 16.1.14 datadog/datadog: - 3.32.0 intel/intel-device-plugins-operator: - 0.27.0 intel/intel-device-plugins-qat: - 0.27.0 intel/intel-device-plugins-sgx: - 0.27.0 quobyte/quobyte-cluster: - 0.1.8 weka/csi-wekafsplugin: - 2.0.1 ```pull/788/head
parent
bae96dbdf6
commit
7734f97d90
Binary file not shown.
Binary file not shown.
Binary file not shown.
Binary file not shown.
Binary file not shown.
Binary file not shown.
Binary file not shown.
Binary file not shown.
Binary file not shown.
Binary file not shown.
|
@ -32,4 +32,4 @@ sources:
|
|||
- https://github.com/aquarist-labs/s3gw
|
||||
- https://github.com/aquarist-labs/ceph
|
||||
type: application
|
||||
version: 0.16.0
|
||||
version: 0.17.0
|
||||
|
|
|
@ -229,3 +229,13 @@ COSI cluster role binding name
|
|||
{{- $name := $dcrn }}
|
||||
{{- $name }}
|
||||
{{- end }}
|
||||
|
||||
{{/*
|
||||
COSI endpoint
|
||||
*/}}
|
||||
{{- define "s3gw-cosi.endpoint" -}}
|
||||
{{- $sn := include "s3gw.serviceName" . }}
|
||||
{{- $defaultendpoint := printf "http://%s.%s.%s" $sn .Release.Namespace .Values.privateDomain}}
|
||||
{{- $endpoint := default $defaultendpoint .Values.cosi.driver.endpoint }}
|
||||
{{- $endpoint }}
|
||||
{{- end }}
|
||||
|
|
|
@ -10,7 +10,7 @@ metadata:
|
|||
type: Opaque
|
||||
stringData:
|
||||
DRIVERNAME: {{ include "s3gw-cosi.driverName" . }}
|
||||
ENDPOINT: {{ include "s3gw.serviceName" . }}.{{ .Release.Namespace }}.{{ .Values.privateDomain }}
|
||||
ENDPOINT: {{ include "s3gw-cosi.endpoint" . }}
|
||||
ACCESSKEY: {{ .Values.accessKey }}
|
||||
SECRETKEY: {{ .Values.secretKey }}
|
||||
{{- end }}
|
||||
|
|
|
@ -198,6 +198,9 @@ rgwCustomEnvs: []
|
|||
# - cosi.driver.name: it specifies the name of the COSI driver.
|
||||
# Default: {Release.Name}.{Release.Namespace}.objectstorage.k8s.io
|
||||
#
|
||||
# - cosi.driver.endpoint: it specifies the S3 endpoint url used by the COSI driver.
|
||||
# Default: {Release.Name}.{Release.Namespace}.{Values.privateDomain}
|
||||
#
|
||||
# - cosi.sidecar.imageName: it specifies a custom image name for the COSI sidecar.
|
||||
# Default: s3gw-cosi-sidecar
|
||||
#
|
||||
|
@ -223,6 +226,7 @@ cosi:
|
|||
imageRegistry:
|
||||
imagePullPolicy:
|
||||
name:
|
||||
endpoint:
|
||||
|
||||
sidecar:
|
||||
imageName:
|
||||
|
|
|
@ -1,7 +1,7 @@
|
|||
annotations:
|
||||
artifacthub.io/changes: |
|
||||
- kind: added
|
||||
description: Add .Values.global.env for all deployed containers
|
||||
- kind: fixed
|
||||
description: Allow to specify redis.conf file
|
||||
artifacthub.io/signKey: |
|
||||
fingerprint: 2B8F22F57260EFA67BE1C5824B11F800CD9D2252
|
||||
url: https://argoproj.github.io/argo-helm/pgp_keys.asc
|
||||
|
@ -32,4 +32,4 @@ name: argo-cd
|
|||
sources:
|
||||
- https://github.com/argoproj/argo-helm/tree/main/charts/argo-cd
|
||||
- https://github.com/argoproj/argo-cd
|
||||
version: 5.36.0
|
||||
version: 5.36.1
|
||||
|
|
|
@ -54,13 +54,13 @@ spec:
|
|||
image: {{ .Values.redis.image.repository }}:{{ .Values.redis.image.tag }}
|
||||
imagePullPolicy: {{ default .Values.global.image.imagePullPolicy .Values.redis.image.imagePullPolicy }}
|
||||
args:
|
||||
{{- with .Values.redis.extraArgs }}
|
||||
{{- toYaml . | nindent 8 }}
|
||||
{{- end }}
|
||||
- --save
|
||||
- ""
|
||||
- --appendonly
|
||||
- "no"
|
||||
{{- with .Values.redis.extraArgs }}
|
||||
{{- toYaml . | nindent 8 }}
|
||||
{{- end }}
|
||||
{{- with (concat .Values.global.env .Values.redis.env) }}
|
||||
env:
|
||||
{{- toYaml . | nindent 8 }}
|
||||
|
|
|
@ -58,4 +58,4 @@ maintainers:
|
|||
url: https://github.com/asserts
|
||||
name: asserts
|
||||
type: application
|
||||
version: 1.41.0
|
||||
version: 1.42.0
|
||||
|
|
|
@ -16,7 +16,7 @@ PagerDuty template
|
|||
{{- printf "\n {{- end }}" -}}
|
||||
{{- printf "\n " -}}
|
||||
{{- printf "\n {{ define \"pagerduty.notification.link.insights\" -}}" -}}
|
||||
{{- printf "\n %s/insights/top?start={{(index .Alerts 0).StartsAt.Unix}}000-30m&end={{(index .Alerts 0).StartsAt.Unix}}000%s&search={{ .CommonLabels.asserts_assertion_name }}" $assertsUrl $plus30min -}}
|
||||
{{- printf "\n %s/assertions?start={{(index .Alerts 0).StartsAt.Unix}}000-30m&end={{(index .Alerts 0).StartsAt.Unix}}000%s&search={{ .CommonLabels.asserts_assertion_name }}" $assertsUrl $plus30min -}}
|
||||
{{- printf "\n {{- end }}" -}}
|
||||
{{- printf "\n " -}}
|
||||
{{- printf "\n {{/* PagerDuty Slo */}}" -}}
|
||||
|
|
|
@ -20,10 +20,10 @@ Slack template
|
|||
{{- printf "\n {{- if eq .Status \"firing\" }}" -}}
|
||||
{{- printf "\n {{- if .CommonLabels.asserts_site }}" -}}
|
||||
{{- printf "\n :warning: *<%s/incidents?env[0]={{ .CommonLabels.asserts_env }}&site[0]={{ .CommonLabels.asserts_site }}&start={{(index .Alerts 0).StartsAt.Unix}}000-30m&end={{(index .Alerts 0).StartsAt.Unix}}000%s&search={{ .CommonLabels.asserts_notification_rule_name }}|View Impact>*" $assertsUrl $plus30min -}}
|
||||
{{- printf "\n :fire: *<%s/insights/top?env[0]={{ .CommonLabels.asserts_env }}&site[0]={{ .CommonLabels.asserts_site }}&start={{(index .Alerts 0).StartsAt.Unix}}000-30m&end={{(index .Alerts 0).StartsAt.Unix}}000%s&search={{ .CommonLabels.asserts_assertion_name }}|Start Troubleshooting>*" $assertsUrl $plus30min -}}
|
||||
{{- printf "\n :fire: *<%s/assertions?env[0]={{ .CommonLabels.asserts_env }}&site[0]={{ .CommonLabels.asserts_site }}&start={{(index .Alerts 0).StartsAt.Unix}}000-30m&end={{(index .Alerts 0).StartsAt.Unix}}000%s&search={{ .CommonLabels.asserts_assertion_name }}|Start Troubleshooting>*" $assertsUrl $plus30min -}}
|
||||
{{- printf "\n {{- else }}" -}}
|
||||
{{- printf "\n :warning: *<%s/incidents?env[0]={{ .CommonLabels.asserts_env }}&start={{(index .Alerts 0).StartsAt.Unix}}000-30m&end={{(index .Alerts 0).StartsAt.Unix}}000%s&search={{ .CommonLabels.asserts_notification_rule_name }}|View Impact>*" $assertsUrl $plus30min -}}
|
||||
{{- printf "\n :fire: *<%s/insights/top?env[0]={{ .CommonLabels.asserts_env }}&start={{(index .Alerts 0).StartsAt.Unix}}000-30m&end={{(index .Alerts 0).StartsAt.Unix}}000%s&search={{ .CommonLabels.asserts_assertion_name }}|Start Troubleshooting>*" $assertsUrl $plus30min -}}
|
||||
{{- printf "\n :fire: *<%s/assertions?env[0]={{ .CommonLabels.asserts_env }}&start={{(index .Alerts 0).StartsAt.Unix}}000-30m&end={{(index .Alerts 0).StartsAt.Unix}}000%s&search={{ .CommonLabels.asserts_assertion_name }}|Start Troubleshooting>*" $assertsUrl $plus30min -}}
|
||||
{{- printf "\n {{- end }}" -}}
|
||||
{{- printf "\n {{- end }}" -}}
|
||||
{{- printf "\n *Alert details*:" -}}
|
||||
|
|
|
@ -4,9 +4,9 @@ dependencies:
|
|||
version: 6.5.2
|
||||
- name: mariadb
|
||||
repository: oci://registry-1.docker.io/bitnamicharts
|
||||
version: 12.2.4
|
||||
version: 12.2.5
|
||||
- name: common
|
||||
repository: oci://registry-1.docker.io/bitnamicharts
|
||||
version: 2.4.0
|
||||
digest: sha256:4be6e447ef427ae68dd94decc3295e3a1d1415a2bb9f455f2a3ff4ea33a4a101
|
||||
generated: "2023-05-23T08:42:16.375569322Z"
|
||||
digest: sha256:ac347b3c0eb6aeaa7eafbc5bd5910fa6bf7a2336f63746f4cd4c6547100dcef1
|
||||
generated: "2023-06-08T17:25:37.789940735Z"
|
||||
|
|
|
@ -40,4 +40,4 @@ maintainers:
|
|||
name: wordpress
|
||||
sources:
|
||||
- https://github.com/bitnami/charts/tree/main/bitnami/wordpress
|
||||
version: 16.1.13
|
||||
version: 16.1.14
|
||||
|
|
|
@ -80,7 +80,7 @@ The command removes all the Kubernetes components associated with the chart and
|
|||
| ------------------- | --------------------------------------------------------------------------------------------------------- | --------------------- |
|
||||
| `image.registry` | WordPress image registry | `docker.io` |
|
||||
| `image.repository` | WordPress image repository | `bitnami/wordpress` |
|
||||
| `image.tag` | WordPress image tag (immutable tags are recommended) | `6.2.2-debian-11-r10` |
|
||||
| `image.tag` | WordPress image tag (immutable tags are recommended) | `6.2.2-debian-11-r11` |
|
||||
| `image.digest` | WordPress image digest in the way sha256:aa.... Please note this parameter, if set, will override the tag | `""` |
|
||||
| `image.pullPolicy` | WordPress image pull policy | `IfNotPresent` |
|
||||
| `image.pullSecrets` | WordPress image pull secrets | `[]` |
|
||||
|
@ -247,7 +247,7 @@ The command removes all the Kubernetes components associated with the chart and
|
|||
| `volumePermissions.enabled` | Enable init container that changes the owner/group of the PV mount point to `runAsUser:fsGroup` | `false` |
|
||||
| `volumePermissions.image.registry` | Bitnami Shell image registry | `docker.io` |
|
||||
| `volumePermissions.image.repository` | Bitnami Shell image repository | `bitnami/bitnami-shell` |
|
||||
| `volumePermissions.image.tag` | Bitnami Shell image tag (immutable tags are recommended) | `11-debian-11-r123` |
|
||||
| `volumePermissions.image.tag` | Bitnami Shell image tag (immutable tags are recommended) | `11-debian-11-r124` |
|
||||
| `volumePermissions.image.digest` | Bitnami Shell image digest in the way sha256:aa.... Please note this parameter, if set, will override the tag | `""` |
|
||||
| `volumePermissions.image.pullPolicy` | Bitnami Shell image pull policy | `IfNotPresent` |
|
||||
| `volumePermissions.image.pullSecrets` | Bitnami Shell image pull secrets | `[]` |
|
||||
|
|
|
@ -2,7 +2,7 @@ annotations:
|
|||
category: Database
|
||||
licenses: Apache-2.0
|
||||
apiVersion: v2
|
||||
appVersion: 10.11.3
|
||||
appVersion: 10.11.4
|
||||
dependencies:
|
||||
- name: common
|
||||
repository: oci://registry-1.docker.io/bitnamicharts
|
||||
|
@ -26,4 +26,4 @@ maintainers:
|
|||
name: mariadb
|
||||
sources:
|
||||
- https://github.com/bitnami/charts/tree/main/bitnami/mariadb
|
||||
version: 12.2.4
|
||||
version: 12.2.5
|
||||
|
|
|
@ -84,7 +84,7 @@ The command removes all the Kubernetes components associated with the chart and
|
|||
| -------------------------- | ----------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------- | ---------------------- |
|
||||
| `image.registry` | MariaDB image registry | `docker.io` |
|
||||
| `image.repository` | MariaDB image repository | `bitnami/mariadb` |
|
||||
| `image.tag` | MariaDB image tag (immutable tags are recommended) | `10.11.3-debian-11-r5` |
|
||||
| `image.tag` | MariaDB image tag (immutable tags are recommended) | `10.11.4-debian-11-r0` |
|
||||
| `image.digest` | MariaDB image digest in the way sha256:aa.... Please note this parameter, if set, will override the tag | `""` |
|
||||
| `image.pullPolicy` | MariaDB image pull policy | `IfNotPresent` |
|
||||
| `image.pullSecrets` | Specify docker-registry secret names as an array | `[]` |
|
||||
|
@ -306,7 +306,7 @@ The command removes all the Kubernetes components associated with the chart and
|
|||
| `volumePermissions.enabled` | Enable init container that changes the owner and group of the persistent volume(s) mountpoint to `runAsUser:fsGroup` | `false` |
|
||||
| `volumePermissions.image.registry` | Init container volume-permissions image registry | `docker.io` |
|
||||
| `volumePermissions.image.repository` | Init container volume-permissions image repository | `bitnami/bitnami-shell` |
|
||||
| `volumePermissions.image.tag` | Init container volume-permissions image tag (immutable tags are recommended) | `11-debian-11-r118` |
|
||||
| `volumePermissions.image.tag` | Init container volume-permissions image tag (immutable tags are recommended) | `11-debian-11-r123` |
|
||||
| `volumePermissions.image.digest` | Init container volume-permissions image digest in the way sha256:aa.... Please note this parameter, if set, will override the tag | `""` |
|
||||
| `volumePermissions.image.pullPolicy` | Init container volume-permissions image pull policy | `IfNotPresent` |
|
||||
| `volumePermissions.image.pullSecrets` | Specify docker-registry secret names as an array | `[]` |
|
||||
|
@ -320,7 +320,7 @@ The command removes all the Kubernetes components associated with the chart and
|
|||
| `metrics.enabled` | Start a side-car prometheus exporter | `false` |
|
||||
| `metrics.image.registry` | Exporter image registry | `docker.io` |
|
||||
| `metrics.image.repository` | Exporter image repository | `bitnami/mysqld-exporter` |
|
||||
| `metrics.image.tag` | Exporter image tag (immutable tags are recommended) | `0.14.0-debian-11-r119` |
|
||||
| `metrics.image.tag` | Exporter image tag (immutable tags are recommended) | `0.14.0-debian-11-r125` |
|
||||
| `metrics.image.digest` | Exporter image digest in the way sha256:aa.... Please note this parameter, if set, will override the tag | `""` |
|
||||
| `metrics.image.pullPolicy` | Exporter image pull policy | `IfNotPresent` |
|
||||
| `metrics.image.pullSecrets` | Specify docker-registry secret names as an array | `[]` |
|
||||
|
@ -543,7 +543,7 @@ kubectl delete statefulset opencart-mariadb --cascade=false
|
|||
|
||||
## License
|
||||
|
||||
Copyright © 2023 Bitnami
|
||||
Copyright © 2023 VMware, Inc.
|
||||
|
||||
Licensed under the Apache License, Version 2.0 (the "License");
|
||||
you may not use this file except in compliance with the License.
|
||||
|
|
|
@ -87,7 +87,7 @@ serviceBindings:
|
|||
image:
|
||||
registry: docker.io
|
||||
repository: bitnami/mariadb
|
||||
tag: 10.11.3-debian-11-r5
|
||||
tag: 10.11.4-debian-11-r0
|
||||
digest: ""
|
||||
## Specify a imagePullPolicy
|
||||
## Defaults to 'Always' if image tag is 'latest', else set to 'IfNotPresent'
|
||||
|
@ -1001,7 +1001,7 @@ volumePermissions:
|
|||
image:
|
||||
registry: docker.io
|
||||
repository: bitnami/bitnami-shell
|
||||
tag: 11-debian-11-r118
|
||||
tag: 11-debian-11-r123
|
||||
digest: ""
|
||||
pullPolicy: IfNotPresent
|
||||
## Optionally specify an array of imagePullSecrets (secrets must be manually created in the namespace)
|
||||
|
@ -1037,7 +1037,7 @@ metrics:
|
|||
image:
|
||||
registry: docker.io
|
||||
repository: bitnami/mysqld-exporter
|
||||
tag: 0.14.0-debian-11-r119
|
||||
tag: 0.14.0-debian-11-r125
|
||||
digest: ""
|
||||
pullPolicy: IfNotPresent
|
||||
## Optionally specify an array of imagePullSecrets (secrets must be manually created in the namespace)
|
||||
|
|
|
@ -73,7 +73,7 @@ diagnosticMode:
|
|||
image:
|
||||
registry: docker.io
|
||||
repository: bitnami/wordpress
|
||||
tag: 6.2.2-debian-11-r10
|
||||
tag: 6.2.2-debian-11-r11
|
||||
digest: ""
|
||||
## Specify a imagePullPolicy
|
||||
## Defaults to 'Always' if image tag is 'latest', else set to 'IfNotPresent'
|
||||
|
@ -763,7 +763,7 @@ volumePermissions:
|
|||
image:
|
||||
registry: docker.io
|
||||
repository: bitnami/bitnami-shell
|
||||
tag: 11-debian-11-r123
|
||||
tag: 11-debian-11-r124
|
||||
digest: ""
|
||||
pullPolicy: IfNotPresent
|
||||
## Optionally specify an array of imagePullSecrets.
|
||||
|
|
|
@ -1,5 +1,9 @@
|
|||
# Datadog changelog
|
||||
|
||||
## 3.32.0
|
||||
|
||||
* Add a new preferred parameter to enable Remote Configuration on both the agent and the cluster agent.
|
||||
|
||||
## 3.31.0
|
||||
|
||||
* Default `Agent` and `Cluster-Agent` to `7.45.0` version.
|
||||
|
|
|
@ -19,4 +19,4 @@ name: datadog
|
|||
sources:
|
||||
- https://app.datadoghq.com/account/settings#agent/kubernetes
|
||||
- https://github.com/DataDog/datadog-agent
|
||||
version: 3.31.0
|
||||
version: 3.32.0
|
||||
|
|
|
@ -1,6 +1,6 @@
|
|||
# Datadog
|
||||
|
||||
![Version: 3.31.0](https://img.shields.io/badge/Version-3.31.0-informational?style=flat-square) ![AppVersion: 7](https://img.shields.io/badge/AppVersion-7-informational?style=flat-square)
|
||||
![Version: 3.32.0](https://img.shields.io/badge/Version-3.32.0-informational?style=flat-square) ![AppVersion: 7](https://img.shields.io/badge/AppVersion-7-informational?style=flat-square)
|
||||
|
||||
[Datadog](https://www.datadoghq.com/) is a hosted infrastructure monitoring platform. This chart adds the Datadog Agent to all nodes in your cluster via a DaemonSet. It also optionally depends on the [kube-state-metrics chart](https://github.com/prometheus-community/helm-charts/tree/main/charts/kube-state-metrics). For more information about monitoring Kubernetes with Datadog, please refer to the [Datadog documentation website](https://docs.datadoghq.com/agent/basic_agent_usage/kubernetes/).
|
||||
|
||||
|
@ -489,7 +489,7 @@ helm install <RELEASE_NAME> \
|
|||
| clusterAgent.admissionController.enabled | bool | `true` | Enable the admissionController to be able to inject APM/Dogstatsd config and standard tags (env, service, version) automatically into your pods |
|
||||
| clusterAgent.admissionController.failurePolicy | string | `"Ignore"` | Set the failure policy for dynamic admission control.' |
|
||||
| clusterAgent.admissionController.mutateUnlabelled | bool | `false` | Enable injecting config without having the pod label 'admission.datadoghq.com/enabled="true"' |
|
||||
| clusterAgent.admissionController.remoteInstrumentation.enabled | bool | `false` | Enable polling and applying library injection using Remote Config (beta). # This feature is in beta, and enables Remote Config in the Cluster Agent. It also requires Cluster Agent version 7.43+. # Enabling this feature grants the Cluster Agent the permissions to patch Deployment objects in the cluster. |
|
||||
| clusterAgent.admissionController.remoteInstrumentation.enabled | bool | `false` | Enable polling and applying library injection using Remote Config. # This feature is in beta, and enables Remote Config in the Cluster Agent. It also requires Cluster Agent version 7.43+. # Enabling this feature grants the Cluster Agent the permissions to patch Deployment objects in the cluster. |
|
||||
| clusterAgent.advancedConfd | object | `{}` | Provide additional cluster check configurations. Each key is an integration containing several config files. |
|
||||
| clusterAgent.affinity | object | `{}` | Allow the Cluster Agent Deployment to schedule using affinity rules |
|
||||
| clusterAgent.command | list | `[]` | Command to run in the Cluster Agent container as entrypoint |
|
||||
|
@ -687,7 +687,7 @@ helm install <RELEASE_NAME> \
|
|||
| datadog.prometheusScrape.enabled | bool | `false` | Enable autodiscovering pods and services exposing prometheus metrics. |
|
||||
| datadog.prometheusScrape.serviceEndpoints | bool | `false` | Enable generating dedicated checks for service endpoints. |
|
||||
| datadog.prometheusScrape.version | int | `2` | Version of the openmetrics check to schedule by default. |
|
||||
| datadog.remoteConfiguration.enabled | bool | `false` | Set to true to enable remote configuration. |
|
||||
| datadog.remoteConfiguration.enabled | bool | `false` | Set to true to enable remote configuration. Consider using remoteConfiguration.enabled instead |
|
||||
| datadog.secretAnnotations | object | `{}` | |
|
||||
| datadog.secretBackend.arguments | string | `nil` | Configure the secret backend command arguments (space-separated strings). |
|
||||
| datadog.secretBackend.command | string | `nil` | Configure the secret backend command, path to the secret backend binary. |
|
||||
|
@ -758,6 +758,7 @@ helm install <RELEASE_NAME> \
|
|||
| providers.gke.autopilot | bool | `false` | Enables Datadog Agent deployment on GKE Autopilot |
|
||||
| providers.gke.cos | bool | `false` | Enables Datadog Agent deployment on GKE with Container-Optimized OS (COS) |
|
||||
| registry | string | `"gcr.io/datadoghq"` | Registry to use for all Agent images (default gcr.io) |
|
||||
| remoteConfiguration.enabled | bool | `false` | Set to true to enable remote configuration on the Cluster Agent (if set) and the node agent. This will override `datadog.remoteConfiguration.enabled` and `clusterAgent.admissionController.remoteInstrumentation.enabled`. Preferred way to enable Remote Configuration. |
|
||||
| targetSystem | string | `"linux"` | Target OS for this deployment (possible values: linux, windows) |
|
||||
|
||||
## Configuration options for Windows deployments
|
||||
|
|
|
@ -9,7 +9,7 @@
|
|||
secretKeyRef:
|
||||
name: {{ template "datadog.apiSecretName" . }}
|
||||
key: api-key
|
||||
{{- if .Values.datadog.remoteConfiguration.enabled }}
|
||||
{{- if eq (include "datadog-remoteConfiguration-enabled" .) "true" }}
|
||||
- name: DD_REMOTE_CONFIGURATION_ENABLED
|
||||
value: "true"
|
||||
{{- end }}
|
||||
|
|
|
@ -778,3 +778,25 @@ true
|
|||
false
|
||||
{{- end -}}
|
||||
{{- end -}}
|
||||
|
||||
{{/*
|
||||
Returns whether Remote Configuration should be enabled in the agent
|
||||
*/}}
|
||||
{{- define "datadog-remoteConfiguration-enabled" -}}
|
||||
{{- if or .Values.remoteConfiguration.enabled .Values.datadog.remoteConfiguration.enabled -}}
|
||||
true
|
||||
{{- else -}}
|
||||
false
|
||||
{{- end -}}
|
||||
{{- end -}}
|
||||
|
||||
{{/*
|
||||
Returns whether Remote Configuration should be enabled in the cluster agent
|
||||
*/}}
|
||||
{{- define "clusterAgent-remoteConfiguration-enabled" -}}
|
||||
{{- if or .Values.remoteConfiguration.enabled .Values.clusterAgent.admissionController.remoteInstrumentation.enabled -}}
|
||||
true
|
||||
{{- else -}}
|
||||
false
|
||||
{{- end -}}
|
||||
{{- end -}}
|
||||
|
|
|
@ -213,7 +213,7 @@ spec:
|
|||
- name: DD_ADMISSION_CONTROLLER_FAILURE_POLICY
|
||||
value: {{ .Values.clusterAgent.admissionController.failurePolicy | quote }}
|
||||
{{- end }}
|
||||
{{- if .Values.clusterAgent.admissionController.remoteInstrumentation.enabled }}
|
||||
{{- if eq (include "clusterAgent-remoteConfiguration-enabled" .) "true" }}
|
||||
- name: DD_ADMISSION_CONTROLLER_AUTO_INSTRUMENTATION_PATCHER_ENABLED
|
||||
value: "true"
|
||||
- name: DD_REMOTE_CONFIGURATION_ENABLED
|
||||
|
|
|
@ -155,7 +155,7 @@ rules:
|
|||
- list
|
||||
- get
|
||||
- watch
|
||||
{{- if .Values.clusterAgent.admissionController.remoteInstrumentation.enabled }}
|
||||
{{- if eq (include "clusterAgent-remoteConfiguration-enabled" .) "true" }}
|
||||
- patch
|
||||
{{- end }}
|
||||
- apiGroups:
|
||||
|
|
|
@ -56,7 +56,7 @@ data:
|
|||
network:
|
||||
enabled: {{ $.Values.datadog.securityAgent.runtime.network.enabled }}
|
||||
remote_configuration:
|
||||
enabled: {{ if and .Values.datadog.securityAgent.runtime.enabled .Values.datadog.remoteConfiguration.enabled -}} true {{else -}} false {{end}}
|
||||
enabled: {{ if and .Values.datadog.securityAgent.runtime.enabled (eq (include "datadog-remoteConfiguration-enabled" .) "true") -}} true {{else -}} false {{end}}
|
||||
{{- if .Values.datadog.securityAgent.runtime.activityDump.enabled }}
|
||||
activity_dump:
|
||||
enabled: true
|
||||
|
|
|
@ -388,6 +388,7 @@ datadog:
|
|||
|
||||
remoteConfiguration:
|
||||
# datadog.remoteConfiguration.enabled -- Set to true to enable remote configuration.
|
||||
# Consider using remoteConfiguration.enabled instead
|
||||
enabled: false
|
||||
|
||||
## Enable logs agent and provide custom configs
|
||||
|
@ -971,7 +972,7 @@ clusterAgent:
|
|||
failurePolicy: Ignore
|
||||
|
||||
remoteInstrumentation:
|
||||
# clusterAgent.admissionController.remoteInstrumentation.enabled -- Enable polling and applying library injection using Remote Config (beta).
|
||||
# clusterAgent.admissionController.remoteInstrumentation.enabled -- Enable polling and applying library injection using Remote Config.
|
||||
## This feature is in beta, and enables Remote Config in the Cluster Agent. It also requires Cluster Agent version 7.43+.
|
||||
## Enabling this feature grants the Cluster Agent the permissions to patch Deployment objects in the cluster.
|
||||
enabled: false
|
||||
|
@ -1935,3 +1936,9 @@ providers:
|
|||
aks:
|
||||
# providers.aks.enabled -- Activate all specifities related to AKS configuration. Required as currently we cannot auto-detect AKS.
|
||||
enabled: false
|
||||
|
||||
remoteConfiguration:
|
||||
# remoteConfiguration.enabled -- Set to true to enable remote configuration on the Cluster Agent (if set) and the node agent.
|
||||
# This will override `datadog.remoteConfiguration.enabled` and `clusterAgent.admissionController.remoteInstrumentation.enabled`.
|
||||
# Preferred way to enable Remote Configuration.
|
||||
enabled: false
|
||||
|
|
|
@ -4,9 +4,9 @@ annotations:
|
|||
catalog.cattle.io/kube-version: '>=1.19-0'
|
||||
catalog.cattle.io/release-name: intel-device-plugins-operator
|
||||
apiVersion: v2
|
||||
appVersion: 0.26.1
|
||||
appVersion: 0.27.0
|
||||
description: A Helm chart for Intel Device Plugins Operator for Kubernetes
|
||||
icon: https://avatars.githubusercontent.com/u/17888862?s=200&v=4
|
||||
name: intel-device-plugins-operator
|
||||
type: application
|
||||
version: 0.26.1
|
||||
version: 0.27.0
|
||||
|
|
|
@ -4,9 +4,9 @@ annotations:
|
|||
catalog.cattle.io/kube-version: '>=1.19-0'
|
||||
catalog.cattle.io/release-name: intel-device-plugins-qat
|
||||
apiVersion: v2
|
||||
appVersion: 0.26.1
|
||||
appVersion: 0.27.0
|
||||
description: A Helm chart for Intel QAT Device Plugin
|
||||
icon: https://avatars.githubusercontent.com/u/17888862?s=200&v=4
|
||||
name: intel-device-plugins-qat
|
||||
type: application
|
||||
version: 0.26.1
|
||||
version: 0.27.0
|
||||
|
|
|
@ -4,9 +4,9 @@ annotations:
|
|||
catalog.cattle.io/kube-version: '>=1.19-0'
|
||||
catalog.cattle.io/release-name: intel-device-plugins-sgx
|
||||
apiVersion: v2
|
||||
appVersion: 0.26.1
|
||||
appVersion: 0.27.0
|
||||
description: A Helm chart for Intel SGX Device Plugin
|
||||
icon: https://avatars.githubusercontent.com/u/17888862?s=200&v=4
|
||||
name: intel-device-plugins-sgx
|
||||
type: application
|
||||
version: 0.26.1
|
||||
version: 0.27.0
|
||||
|
|
|
@ -10,7 +10,6 @@ metadata:
|
|||
annotations: {{ toYaml .Values.annotations | nindent 4 }}
|
||||
spec:
|
||||
image: "{{ .Values.image.hub }}/intel-sgx-plugin:{{ .Values.image.tag | default .Chart.AppVersion }}"
|
||||
initImage: "{{ .Values.initImage.hub }}/intel-sgx-initcontainer:{{ .Values.initImage.tag | default .Chart.AppVersion }}"
|
||||
enclaveLimit: {{ .Values.enclaveLimit }}
|
||||
provisionLimit: {{ .Values.provisionLimit }}
|
||||
logLevel: {{ .Values.logLevel }}
|
||||
|
|
|
@ -4,10 +4,6 @@ image:
|
|||
hub: intel
|
||||
tag: ""
|
||||
|
||||
initImage:
|
||||
hub: intel
|
||||
tag: ""
|
||||
|
||||
enclaveLimit: 110
|
||||
provisionLimit: 110
|
||||
logLevel: 4
|
||||
|
|
|
@ -1,7 +1,7 @@
|
|||
annotations:
|
||||
catalog.cattle.io/certified: partner
|
||||
catalog.cattle.io/display-name: Quobyte Cluster Deployment
|
||||
catalog.cattle.io/kube-version: 1.20-0 - 1.24-0
|
||||
catalog.cattle.io/kube-version: 1.20-0 - 1.25-0
|
||||
catalog.cattle.io/release-name: quobyte-cluster
|
||||
apiVersion: v2
|
||||
appVersion: "3"
|
||||
|
@ -11,9 +11,9 @@ icon: https://quobyte.github.io/quobyte-k8s-resources/images/quobyte.png
|
|||
keywords:
|
||||
- quobyte
|
||||
- storage
|
||||
kubeVersion: 1.20-0 - 1.24-0
|
||||
kubeVersion: 1.20-0 - 1.25-0
|
||||
name: quobyte-cluster
|
||||
sources:
|
||||
- https://github.com/quobyte/quobyte-k8s-resources
|
||||
type: application
|
||||
version: 0.1.7
|
||||
version: 0.1.8
|
||||
|
|
|
@ -1,64 +1,8 @@
|
|||
<!-- Release notes generated using configuration in .github/release.yaml at master -->
|
||||
<!-- Release notes generated using configuration in .github/release.yaml at main -->
|
||||
|
||||
## What's Changed
|
||||
Weka CSI Plugin v2.0.0 has a comprehensive set of improvenents and new functionality:
|
||||
* Support of different backings for CSI volumes (filesystem, writable snapshot, directory)
|
||||
* CSI snapshot and volume cloning support
|
||||
* `fsGroup` support
|
||||
* Custom mount options per storageClass
|
||||
* Redundant CSI controllers
|
||||
* Restructuring of CI and release workflows
|
||||
|
||||
> **NOTE:** some of the functionality provided by Weka CSI Plugin 2.0.0 requires Weka software of version 4.2 or higher. Please refer to [documentation](README.md) for additional information
|
||||
|
||||
> **NOTE:** To better understand the different types of volume backings and their implications, refer to documentation.
|
||||
|
||||
### New features
|
||||
* feat: Support of new volumes from content source by @sergeyberezansky in https://github.com/weka/csi-wekafs/pull/11
|
||||
* feat: Support Mount options by @sergeyberezansky in https://github.com/weka/csi-wekafs/pull/18
|
||||
* feat: Add fsGroup support on CSI driver by @sergeyberezansky in https://github.com/weka/csi-wekafs/pull/20
|
||||
* feat: Support different backing types for CSI volumes by @sergeyberezansky in https://github.com/weka/csi-wekafs/pull/69
|
||||
* feat: official support for multiple controller server replicas by @sergeyberezansky in https://github.com/weka/csi-wekafs/pull/47
|
||||
|
||||
### Improvements
|
||||
* feat: configurable log format (colorized human-readable logs or JSON structured logs) by @sergeyberezansky in https://github.com/weka/csi-wekafs/pull/26
|
||||
* feat: OpenTelemetry tracing support by @sergeyberezansky in https://github.com/weka/csi-wekafs/pull/26
|
||||
* feat: support of mutually exclusive mount options by @sergeyberezansky in https://github.com/weka/csi-wekafs/pull/54
|
||||
* feat: Add concurrency limitation for multiple requests by @sergeyberezansky in https://github.com/weka/csi-wekafs/pull/56
|
||||
* refactor: concurrency improvements by @sergeyberezansky in https://github.com/weka/csi-wekafs/pull/68
|
||||
|
||||
### Bug Fixes
|
||||
* fix: Correctly calculate capacity for FS-based volume expansion (fixu… by @sergeyberezansky in https://github.com/weka/csi-wekafs/pull/15
|
||||
* refactor: do not recover lost mounts and shorten default mountOptions by @sergeyberezansky in https://github.com/weka/csi-wekafs/pull/21
|
||||
* fix: plugin might crash when trying to create dir-based volume on non… by @sergeyberezansky in https://github.com/weka/csi-wekafs/pull/29
|
||||
* fix: CSI-47 Snapshot volumes run out of space after filling FS space by @sergeyberezansky in https://github.com/weka/csi-wekafs/pull/35
|
||||
* fix: WEKAPP-298226 volumes published with ReadOnlyMany were writable by @sergeyberezansky in https://github.com/weka/csi-wekafs/pull/36
|
||||
* fix: initial filesystem capacity conversion to bytes is invalid by @sergeyberezansky in https://github.com/weka/csi-wekafs/pull/38
|
||||
* fix: loozen snapshot id validation for static provisioning by @sergeyberezansky in https://github.com/weka/csi-wekafs/pull/41
|
||||
* fix: re-enable writecache by default by @sergeyberezansky in https://github.com/weka/csi-wekafs/pull/51
|
||||
* fix: make sure op is written correctly for each function by @sergeyberezansky in https://github.com/weka/csi-wekafs/pull/67
|
||||
* fix(CSI-74): no error returned when fetching info from weka cluster fails by @dontbreakit & @sergeyberezansky in https://github.com/weka/csi-wekafs/pull/102
|
||||
* fix(CSI-107): revert csi-attacher by @dontbreakit in https://github.com/weka/csi-wekafs/pull/103
|
||||
|
||||
### Miscellaneous
|
||||
* style: add more logging to initial FS resize by @sergeyberezansky in https://github.com/weka/csi-wekafs/pull/37
|
||||
* Add Helm linting and install test by @sergeyberezansky in https://github.com/weka/csi-wekafs/pull/13
|
||||
* Push updated docs to main branch straight after PR merge by @sergeyberezansky in https://github.com/weka/csi-wekafs/pull/19
|
||||
* docs: modify helm docs templates by @sergeyberezansky in https://github.com/weka/csi-wekafs/pull/22
|
||||
* chore: add S3 chart upload GH task by @sergeyberezansky in https://github.com/weka/csi-wekafs/pull/23
|
||||
* chore: auto increase version on feat git commit by @sergeyberezansky in https://github.com/weka/csi-wekafs/pull/24
|
||||
* feat: Bump versions of packages by @sergeyberezansky in https://github.com/weka/csi-wekafs/pull/25
|
||||
* chore: change docker build via native buildx GH action by @sergeyberezansky in https://github.com/weka/csi-wekafs/pull/27
|
||||
* ci: add csi-sanity action to PRs by @dontbreakit in https://github.com/weka/csi-wekafs/pull/30
|
||||
* ci: add release action by @dontbreakit in https://github.com/weka/csi-wekafs/pull/34
|
||||
* docs: Improve documentation on mount options and different volume types by @sergeyberezansky in https://github.com/weka/csi-wekafs/pull/39
|
||||
* chore: Bump CSI sidecar images to latest version by @sergeyberezansky in https://github.com/weka/csi-wekafs/pull/42
|
||||
* docs: fix capacityEnforcement comment inside storageClass examples by @sergeyberezansky in https://github.com/weka/csi-wekafs/pull/46
|
||||
* Add notifications to slack by @dontbreakit in https://github.com/weka/csi-wekafs/pull/53
|
||||
* docs: Improve release.yaml to include additional PR labels by @sergeyberezansky in https://github.com/weka/csi-wekafs/pull/70
|
||||
|
||||
## Upgrade Implications
|
||||
In order to support `fsGroup` functionality, the CSIDriver manifest had to be modified. Since this type of Kubernetes objects is defined as immutable, upgrading Helm release with the new version might fail.
|
||||
Hence, when upgrading from version below 2.0.0, a complete uninstall and reinstall of Helm release is required.
|
||||
> NOTE: it is not required to remove any Secrets, storageClass definitions, PersistentVolumes or PersistentVolumeClaims.
|
||||
|
||||
## Deprecation Notice
|
||||
Support of legacy volumes without API binding will be removed in next major release of Weka CSI Plugin. New features rely on API connectivity to Weka cluster and will not be supported on API unbound volumes. Please make sure to migrate all existing volumes to API based scheme prior to next version upgrade.
|
||||
|
||||
|
|
|
@ -1,6 +1,6 @@
|
|||
annotations:
|
||||
artifacthub.io/category: storage
|
||||
artifacthub.io/containsSecurityUpdates: "true"
|
||||
artifacthub.io/containsSecurityUpdates: "false"
|
||||
artifacthub.io/license: Apache-2.0
|
||||
artifacthub.io/prerelease: "false"
|
||||
catalog.cattle.io/certified: partner
|
||||
|
@ -8,7 +8,7 @@ annotations:
|
|||
catalog.cattle.io/kube-version: '>=1.18.0'
|
||||
catalog.cattle.io/release-name: csi-wekafsplugin
|
||||
apiVersion: v2
|
||||
appVersion: 2.0.0
|
||||
appVersion: v2.0.1
|
||||
description: Helm chart for Deployment of WekaIO Container Storage Interface (CSI)
|
||||
plugin for WekaFS - the world fastest filesystem
|
||||
home: https://github.com/weka/csi-wekafs
|
||||
|
@ -24,6 +24,6 @@ maintainers:
|
|||
url: https://weka.io
|
||||
name: csi-wekafsplugin
|
||||
sources:
|
||||
- https://github.com/weka/csi-wekafs/tree/$VERSION
|
||||
- https://github.com/weka/csi-wekafs/tree/v2.0.1
|
||||
type: application
|
||||
version: 2.0.0
|
||||
version: 2.0.1
|
||||
|
|
|
@ -3,7 +3,7 @@ Helm chart for Deployment of WekaIO Container Storage Interface (CSI) plugin for
|
|||
|
||||
[![License](https://img.shields.io/badge/License-Apache%202.0-blue.svg)](https://opensource.org/licenses/Apache-2.0)
|
||||
[![Artifact HUB](https://img.shields.io/endpoint?url=https://artifacthub.io/badge/repository/csi-wekafs)](https://artifacthub.io/packages/search?repo=csi-wekafs)
|
||||
![Version: 2.0.0](https://img.shields.io/badge/Version-2.0.0-informational?style=flat-square) ![Type: application](https://img.shields.io/badge/Type-application-informational?style=flat-square) ![AppVersion: 2.0.0](https://img.shields.io/badge/AppVersion-2.0.0-informational?style=flat-square)
|
||||
![Version: 2.0.1](https://img.shields.io/badge/Version-2.0.1-informational?style=flat-square) ![Type: application](https://img.shields.io/badge/Type-application-informational?style=flat-square) ![AppVersion: v2.0.1](https://img.shields.io/badge/AppVersion-v2.0.1-informational?style=flat-square)
|
||||
|
||||
## Homepage
|
||||
https://github.com/weka/csi-wekafs
|
||||
|
@ -56,27 +56,26 @@ Kubernetes: `>=1.18.0`
|
|||
|-----|------|---------|-------------|
|
||||
| dynamicProvisionPath | string | `"csi-volumes"` | Directory in root of file system where dynamic volumes are provisioned |
|
||||
| csiDriverName | string | `"csi.weka.io"` | Name of the driver (and provisioner) |
|
||||
| csiDriverVersion | string | `"2.0.0"` | CSI driver version |
|
||||
| csiDriverVersion | string | `"2.0.1"` | CSI driver version |
|
||||
| images.livenessprobesidecar | string | `"registry.k8s.io/sig-storage/livenessprobe:v2.10.0"` | CSI liveness probe sidecar image URL |
|
||||
| images.attachersidecar | string | `"registry.k8s.io/sig-storage/csi-attacher:v4.3.0"` | CSI attacher sidecar image URL |
|
||||
| images.provisionersidecar | string | `"registry.k8s.io/sig-storage/csi-provisioner:v3.5.0"` | CSI provisioner sidecar image URL |
|
||||
| images.registrarsidecar | string | `"registry.k8s.io/sig-storage/csi-node-driver-registrar:v2.8.0"` | CSI registrar sidercar |
|
||||
| images.resizersidecar | string | `"registry.k8s.io/sig-storage/csi-resizer:v1.8.0"` | CSI resizer sidecar image URL |
|
||||
| images.snapshottersidecar | string | `"registry.k8s.io/sig-storage/csi-snapshotter:v6.2.1"` | CSI snapshotter sidecar image URL |
|
||||
| images.csidriver | string | `"quay.io/weka.io/csi-wekafs"` | CSI driver main image URL |
|
||||
| images.csidriverTag | string | `"2.0.0"` | CSI driver tag |
|
||||
| images.csidriverTag | string | `"2.0.1"` | CSI driver tag |
|
||||
| globalPluginTolerations | list | `[{"effect":"NoSchedule","key":"node-role.kubernetes.io/master","operator":"Exists"}]` | Tolerations for all CSI driver components |
|
||||
| controllerPluginTolerations | list | `[{"effect":"NoSchedule","key":"node-role.kubernetes.io/master","operator":"Exists"}]` | Tolerations for CSI controller component only (by default same as global) |
|
||||
| nodePluginTolerations | list | `[{"effect":"NoSchedule","key":"node-role.kubernetes.io/master","operator":"Exists"}]` | Tolerations for CSI node component only (by default same as global) |
|
||||
| nodeSelector | object | `{}` | Optional nodeSelector for CSI plugin deployment on certain Kubernetes nodes only |
|
||||
| controller | object | `{"concurrency":{"createSnapshot":5,"createVolume":5,"deleteSnapshot":5,"deleteVolume":1,"expandVolume":5},"configureProvisionerLeaderElection":true,"configureResizerLeaderElection":true,"configureSnapshotterLeaderElection":true,"grpcRequestTimeoutSeconds":30,"maxConcurrentRequests":5,"replicas":2}` | Controller-specific parameters, please do not change unless explicitly guided |
|
||||
| controller.replicas | int | `2` | Controller number of replicas |
|
||||
| controller.maxConcurrentRequests | int | `5` | Maximum concurrent requests from sidecars (global) |
|
||||
| controller.concurrency | object | `{"createSnapshot":5,"createVolume":5,"deleteSnapshot":5,"deleteVolume":1,"expandVolume":5}` | maximum concurrent operations per operation type (to avoid API starvation) |
|
||||
| controller.concurrency | object | `{"createSnapshot":5,"createVolume":5,"deleteSnapshot":5,"deleteVolume":1,"expandVolume":5}` | maximum concurrent operations per operation type |
|
||||
| controller.grpcRequestTimeoutSeconds | int | `30` | Return GRPC Unavailable if request waits in queue for that long time (seconds) |
|
||||
| controller.configureProvisionerLeaderElection | bool | `true` | Configure provisioner sidecar for leader election |
|
||||
| controller.configureResizerLeaderElection | bool | `true` | Configure resizer sidecar for leader election |
|
||||
| controller.configureSnapshotterLeaderElection | bool | `true` | Configure snapshotter sidecar for leader election |
|
||||
| node | object | `{"concurrency":{"nodePublishVolume":5,"nodeUnpublishVolume":5},"grpcRequestTimeoutSeconds":30,"maxConcurrentRequests":5}` | Node-specific parameters, please do not change unless explicitly guided |
|
||||
| node.maxConcurrentRequests | int | `5` | Maximum concurrent requests from sidecars (global) |
|
||||
| node.concurrency | object | `{"nodePublishVolume":5,"nodeUnpublishVolume":5}` | maximum concurrent operations per operation type (to avoid API starvation) |
|
||||
| node.grpcRequestTimeoutSeconds | int | `30` | Return GRPC Unavailable if request waits in queue for that long time (seconds) |
|
||||
|
@ -93,13 +92,13 @@ Kubernetes: `>=1.18.0`
|
|||
| metrics.resizerPort | int | `9092` | Resizer metrics port |
|
||||
| metrics.snapshotterPort | int | `9093` | Snapshotter metrics port |
|
||||
| pluginConfig.allowInsecureHttps | bool | `false` | Allow insecure HTTPS (skip TLS certificate verification) |
|
||||
| pluginConfig.objectNaming.volumePrefix | string | `"csivol-"` | Prefix that will be added to names of Weka cluster filesystems / snapshots assocciated with CSI volume, must not exceed 7 symbols. |
|
||||
| pluginConfig.objectNaming.snapshotPrefix | string | `"csisnp-"` | Prefix that will be added to names of Weka cluster snapshots assocciated with CSI snapshot, must not exceed 7 symbols. |
|
||||
| pluginConfig.objectNaming.seedSnapshotPrefix | string | `"csisnp-seed-"` | Prefix that will be added to automatically created "seed" snapshot of empty filesytem, must not exceed 12 symbols. |
|
||||
| pluginConfig.objectNaming.volumePrefix | string | `"csivol-"` | Prefix that will be added to names of Weka cluster filesystems / snapshots assocciated with CSI volume, must not exceed 7 symbols. |
|
||||
| pluginConfig.objectNaming.snapshotPrefix | string | `"csisnp-"` | Prefix that will be added to names of Weka cluster snapshots assocciated with CSI snapshot, must not exceed 7 symbols. |
|
||||
| pluginConfig.objectNaming.seedSnapshotPrefix | string | `"csisnp-seed-"` | Prefix that will be added to automatically created "seed" snapshot of empty filesytem, must not exceed 12 symbols. |
|
||||
| pluginConfig.allowedOperations.autoCreateFilesystems | bool | `true` | Allow automatic provisioning of CSI volumes based on distinct Weka filesystem |
|
||||
| pluginConfig.allowedOperations.autoExpandFilesystems | bool | `true` | Allow automatic expansion of filesystem on which Weka snapshot-backed CSI volumes, e.g. in case a required volume capacity exceeds the size of filesystem. Note: the filesystem is not expanded automatically when a new directory-backed volume is provisioned |
|
||||
| pluginConfig.allowedOperations.snapshotDirectoryVolumes | bool | `false` | Create snapshots of legacy (dir/v1) volumes. By default disabled. Note: when enabled, for every legacy volume snapshot, a full filesystem snapshot will be created (wasteful) |
|
||||
| pluginConfig.allowedOperations.snapshotVolumesWithoutQuotaEnforcement | bool | `false` | Allow creation of snapshot-backed volumes even on unsupported Weka cluster versions, off by default Note: On versions of Weka < v4.2 snapshot-backed volume capacity cannot be enforced |
|
||||
| pluginConfig.allowedOperations.autoExpandFilesystems | bool | `true` | Allow automatic expansion of filesystem on which Weka snapshot-backed CSI volumes, e.g. in case a required volume capacity exceeds the size of filesystem. Note: the filesystem is not expanded automatically when a new directory-backed volume is provisioned |
|
||||
| pluginConfig.allowedOperations.snapshotDirectoryVolumes | bool | `false` | Create snapshots of legacy (dir/v1) volumes. By default disabled. Note: when enabled, for every legacy volume snapshot, a full filesystem snapshot will be created (wasteful) |
|
||||
| pluginConfig.allowedOperations.snapshotVolumesWithoutQuotaEnforcement | bool | `false` | Allow creation of snapshot-backed volumes even on unsupported Weka cluster versions, off by default Note: On versions of Weka < v4.2 snapshot-backed volume capacity cannot be enforced |
|
||||
| pluginConfig.mutuallyExclusiveMountOptions[0] | string | `"readcache,writecache,coherent"` | |
|
||||
|
||||
----------------------------------------------
|
||||
|
|
|
@ -31,6 +31,23 @@ spec:
|
|||
{{- end }}
|
||||
serviceAccountName: {{ .Release.Name }}-controller
|
||||
containers:
|
||||
- name: csi-attacher
|
||||
image: {{ required "csi attacher sidercar image." .Values.images.attachersidecar }}
|
||||
securityContext:
|
||||
privileged: true
|
||||
args:
|
||||
- "--csi-address=$(ADDRESS)"
|
||||
- "--v={{ .Values.logLevel | default 5 }}"
|
||||
- "--timeout=60s"
|
||||
- "--leader-election"
|
||||
- "--leader-election-namespace={{ .Release.Namespace }}"
|
||||
- "--worker-threads={{ .Values.controller.maxConcurrentRequests }}"
|
||||
env:
|
||||
- name: ADDRESS
|
||||
value: unix:///csi/csi.sock
|
||||
volumeMounts:
|
||||
- name: socket-dir
|
||||
mountPath: /csi
|
||||
- name: csi-provisioner
|
||||
image: {{ required "csi provisioner sidecar container image." .Values.images.provisionersidecar }}
|
||||
args:
|
||||
|
|
|
@ -91,6 +91,9 @@
|
|||
"images": {
|
||||
"type": "object",
|
||||
"properties": {
|
||||
"attachersidecar": {
|
||||
"type": "string"
|
||||
},
|
||||
"csidriver": {
|
||||
"type": "string"
|
||||
},
|
||||
|
|
|
@ -5,10 +5,12 @@ dynamicProvisionPath: "csi-volumes"
|
|||
# -- Name of the driver (and provisioner)
|
||||
csiDriverName: "csi.weka.io"
|
||||
# -- CSI driver version
|
||||
csiDriverVersion: &csiDriverVersion 2.0.0
|
||||
csiDriverVersion: &csiDriverVersion 2.0.1
|
||||
images:
|
||||
# -- CSI liveness probe sidecar image URL
|
||||
livenessprobesidecar: registry.k8s.io/sig-storage/livenessprobe:v2.10.0
|
||||
# -- CSI attacher sidecar image URL
|
||||
attachersidecar: registry.k8s.io/sig-storage/csi-attacher:v4.3.0
|
||||
# -- CSI provisioner sidecar image URL
|
||||
provisionersidecar: registry.k8s.io/sig-storage/csi-provisioner:v3.5.0
|
||||
# -- CSI registrar sidercar
|
||||
|
@ -32,13 +34,13 @@ controllerPluginTolerations: *globalPluginTolerations
|
|||
nodePluginTolerations: *globalPluginTolerations
|
||||
# -- Optional nodeSelector for CSI plugin deployment on certain Kubernetes nodes only
|
||||
nodeSelector: {}
|
||||
# -- Controller-specific parameters, please do not change unless explicitly guided
|
||||
# Controller-specific parameters, please do not change unless explicitly guided
|
||||
controller:
|
||||
# -- Controller number of replicas
|
||||
replicas: 2
|
||||
# -- Maximum concurrent requests from sidecars (global)
|
||||
maxConcurrentRequests: 5
|
||||
# -- maximum concurrent operations per operation type (to avoid API starvation)
|
||||
# -- maximum concurrent operations per operation type
|
||||
concurrency:
|
||||
createVolume: 5
|
||||
deleteVolume: 1
|
||||
|
@ -53,7 +55,7 @@ controller:
|
|||
configureResizerLeaderElection: true
|
||||
# -- Configure snapshotter sidecar for leader election
|
||||
configureSnapshotterLeaderElection: true
|
||||
# -- Node-specific parameters, please do not change unless explicitly guided
|
||||
# Node-specific parameters, please do not change unless explicitly guided
|
||||
node:
|
||||
# -- Maximum concurrent requests from sidecars (global)
|
||||
maxConcurrentRequests: 5
|
||||
|
@ -102,26 +104,26 @@ pluginConfig:
|
|||
allowInsecureHttps: false
|
||||
objectNaming:
|
||||
# -- Prefix that will be added to names of Weka cluster filesystems / snapshots assocciated with CSI volume,
|
||||
# must not exceed 7 symbols.
|
||||
# must not exceed 7 symbols.
|
||||
volumePrefix: "csivol-"
|
||||
# -- Prefix that will be added to names of Weka cluster snapshots assocciated with CSI snapshot,
|
||||
# must not exceed 7 symbols.
|
||||
# must not exceed 7 symbols.
|
||||
snapshotPrefix: "csisnp-"
|
||||
# -- Prefix that will be added to automatically created "seed" snapshot of empty filesytem,
|
||||
# must not exceed 12 symbols.
|
||||
# must not exceed 12 symbols.
|
||||
seedSnapshotPrefix: "csisnp-seed-"
|
||||
allowedOperations:
|
||||
# -- Allow automatic provisioning of CSI volumes based on distinct Weka filesystem
|
||||
autoCreateFilesystems: true
|
||||
# -- Allow automatic expansion of filesystem on which Weka snapshot-backed CSI volumes,
|
||||
# e.g. in case a required volume capacity exceeds the size of filesystem.
|
||||
# Note: the filesystem is not expanded automatically when a new directory-backed volume is provisioned
|
||||
# e.g. in case a required volume capacity exceeds the size of filesystem.
|
||||
# Note: the filesystem is not expanded automatically when a new directory-backed volume is provisioned
|
||||
autoExpandFilesystems: true
|
||||
# -- Create snapshots of legacy (dir/v1) volumes. By default disabled.
|
||||
# Note: when enabled, for every legacy volume snapshot, a full filesystem snapshot will be created (wasteful)
|
||||
# Note: when enabled, for every legacy volume snapshot, a full filesystem snapshot will be created (wasteful)
|
||||
snapshotDirectoryVolumes: false
|
||||
# -- Allow creation of snapshot-backed volumes even on unsupported Weka cluster versions, off by default
|
||||
# Note: On versions of Weka < v4.2 snapshot-backed volume capacity cannot be enforced
|
||||
# Note: On versions of Weka < v4.2 snapshot-backed volume capacity cannot be enforced
|
||||
snapshotVolumesWithoutQuotaEnforcement: false
|
||||
mutuallyExclusiveMountOptions:
|
||||
- "readcache,writecache,coherent"
|
||||
|
|
331
index.yaml
331
index.yaml
|
@ -1182,6 +1182,45 @@ entries:
|
|||
- assets/ambassador/ambassador-6.7.1100.tgz
|
||||
version: 6.7.1100
|
||||
argo-cd:
|
||||
- annotations:
|
||||
artifacthub.io/changes: |
|
||||
- kind: fixed
|
||||
description: Allow to specify redis.conf file
|
||||
artifacthub.io/signKey: |
|
||||
fingerprint: 2B8F22F57260EFA67BE1C5824B11F800CD9D2252
|
||||
url: https://argoproj.github.io/argo-helm/pgp_keys.asc
|
||||
catalog.cattle.io/certified: partner
|
||||
catalog.cattle.io/display-name: Argo CD
|
||||
catalog.cattle.io/kube-version: '>=1.23.0-0'
|
||||
catalog.cattle.io/release-name: argo-cd
|
||||
apiVersion: v2
|
||||
appVersion: v2.7.4
|
||||
created: "2023-06-09T20:30:02.199487969Z"
|
||||
dependencies:
|
||||
- condition: redis-ha.enabled
|
||||
name: redis-ha
|
||||
repository: file://./charts/redis-ha
|
||||
version: 4.23.0
|
||||
description: A Helm chart for Argo CD, a declarative, GitOps continuous delivery
|
||||
tool for Kubernetes.
|
||||
digest: efbe888e9a71a78a1d4200fc67038c0f2cbd86b37771db7e6b94a9c8554dac5d
|
||||
home: https://github.com/argoproj/argo-helm
|
||||
icon: https://argo-cd.readthedocs.io/en/stable/assets/logo.png
|
||||
keywords:
|
||||
- argoproj
|
||||
- argocd
|
||||
- gitops
|
||||
kubeVersion: '>=1.23.0-0'
|
||||
maintainers:
|
||||
- name: argoproj
|
||||
url: https://argoproj.github.io/
|
||||
name: argo-cd
|
||||
sources:
|
||||
- https://github.com/argoproj/argo-helm/tree/main/charts/argo-cd
|
||||
- https://github.com/argoproj/argo-cd
|
||||
urls:
|
||||
- assets/argo/argo-cd-5.36.1.tgz
|
||||
version: 5.36.1
|
||||
- annotations:
|
||||
artifacthub.io/changes: |
|
||||
- kind: added
|
||||
|
@ -4919,6 +4958,71 @@ entries:
|
|||
- assets/jfrog/artifactory-jcr-2.5.100.tgz
|
||||
version: 2.5.100
|
||||
asserts:
|
||||
- annotations:
|
||||
catalog.cattle.io/certified: partner
|
||||
catalog.cattle.io/display-name: Asserts
|
||||
catalog.cattle.io/kube-version: '>=1.17-0'
|
||||
catalog.cattle.io/release-name: asserts
|
||||
apiVersion: v2
|
||||
created: "2023-06-09T20:30:02.67930755Z"
|
||||
dependencies:
|
||||
- condition: knowledge-sensor.enabled
|
||||
name: knowledge-sensor
|
||||
repository: file://./charts/knowledge-sensor
|
||||
version: 1.1.0
|
||||
- alias: tsdb
|
||||
condition: tsdb.enabled
|
||||
name: victoria-metrics-single
|
||||
repository: file://./charts/victoria-metrics-single
|
||||
version: 1.1.0
|
||||
- condition: alertmanager.enabled
|
||||
name: alertmanager
|
||||
repository: file://./charts/alertmanager
|
||||
version: 1.0.0
|
||||
- alias: promxyruler
|
||||
condition: promxyruler.enabled
|
||||
name: promxy
|
||||
repository: file://./charts/promxy
|
||||
version: 0.8.0
|
||||
- alias: promxyuser
|
||||
condition: promxyuser.enabled
|
||||
name: promxy
|
||||
repository: file://./charts/promxy
|
||||
version: 0.8.0
|
||||
- alias: ebpfProbe
|
||||
condition: ebpfProbe.enabled
|
||||
name: ebpf-probe
|
||||
repository: file://./charts/ebpf-probe
|
||||
version: 0.7.0
|
||||
- name: common
|
||||
repository: file://./charts/common
|
||||
version: 1.x.x
|
||||
- alias: redisgraph
|
||||
condition: redisgraph.enabled
|
||||
name: redis
|
||||
repository: file://./charts/redis
|
||||
version: 16.13.2
|
||||
- alias: redisearch
|
||||
condition: redisearch.enabled
|
||||
name: redis
|
||||
repository: file://./charts/redis
|
||||
version: 16.13.2
|
||||
- alias: postgres
|
||||
condition: postgres.enabled
|
||||
name: postgresql
|
||||
repository: file://./charts/postgresql
|
||||
version: 11.9.13
|
||||
description: Asserts Helm Chart to configure entire asserts stack
|
||||
digest: 81c069c352b607e696d29e69081af2a4babb2bcea10633ba7955d26232e2b3e2
|
||||
icon: https://www.asserts.ai/favicon.png
|
||||
maintainers:
|
||||
- name: Asserts
|
||||
url: https://github.com/asserts
|
||||
name: asserts
|
||||
type: application
|
||||
urls:
|
||||
- assets/asserts/asserts-1.42.0.tgz
|
||||
version: 1.42.0
|
||||
- annotations:
|
||||
catalog.cattle.io/certified: partner
|
||||
catalog.cattle.io/display-name: Asserts
|
||||
|
@ -10941,6 +11045,39 @@ entries:
|
|||
- assets/dell/csi-vxflexos-2.1.0.tgz
|
||||
version: 2.1.0
|
||||
csi-wekafsplugin:
|
||||
- annotations:
|
||||
artifacthub.io/category: storage
|
||||
artifacthub.io/containsSecurityUpdates: "false"
|
||||
artifacthub.io/license: Apache-2.0
|
||||
artifacthub.io/prerelease: "false"
|
||||
catalog.cattle.io/certified: partner
|
||||
catalog.cattle.io/display-name: WekaFS CSI Driver
|
||||
catalog.cattle.io/kube-version: '>=1.18.0'
|
||||
catalog.cattle.io/release-name: csi-wekafsplugin
|
||||
apiVersion: v2
|
||||
appVersion: v2.0.1
|
||||
created: "2023-06-09T20:30:08.966177326Z"
|
||||
description: Helm chart for Deployment of WekaIO Container Storage Interface (CSI)
|
||||
plugin for WekaFS - the world fastest filesystem
|
||||
digest: b7bdfad38257fa16a3aeae6571e1b01f5de6369a32400613925048a1ed2aabff
|
||||
home: https://github.com/weka/csi-wekafs
|
||||
icon: https://weka.github.io/csi-wekafs/logo.png
|
||||
keywords:
|
||||
- storage
|
||||
- filesystem
|
||||
- HPC
|
||||
kubeVersion: '>=1.18.0'
|
||||
maintainers:
|
||||
- email: csi@weka.io
|
||||
name: WekaIO, Inc.
|
||||
url: https://weka.io
|
||||
name: csi-wekafsplugin
|
||||
sources:
|
||||
- https://github.com/weka/csi-wekafs/tree/v2.0.1
|
||||
type: application
|
||||
urls:
|
||||
- assets/weka/csi-wekafsplugin-2.0.1.tgz
|
||||
version: 2.0.1
|
||||
- annotations:
|
||||
artifacthub.io/category: storage
|
||||
artifacthub.io/containsSecurityUpdates: "true"
|
||||
|
@ -11030,6 +11167,43 @@ entries:
|
|||
- assets/weka/csi-wekafsplugin-0.6.400.tgz
|
||||
version: 0.6.400
|
||||
datadog:
|
||||
- annotations:
|
||||
catalog.cattle.io/certified: partner
|
||||
catalog.cattle.io/display-name: Datadog
|
||||
catalog.cattle.io/kube-version: '>=1.10-0'
|
||||
catalog.cattle.io/release-name: datadog
|
||||
apiVersion: v1
|
||||
appVersion: "7"
|
||||
created: "2023-06-09T20:30:05.244691426Z"
|
||||
dependencies:
|
||||
- condition: clusterAgent.metricsProvider.useDatadogMetrics
|
||||
name: datadog-crds
|
||||
repository: https://helm.datadoghq.com
|
||||
tags:
|
||||
- install-crds
|
||||
version: 0.4.7
|
||||
- condition: datadog.kubeStateMetricsEnabled
|
||||
name: kube-state-metrics
|
||||
repository: https://prometheus-community.github.io/helm-charts
|
||||
version: 2.13.2
|
||||
description: Datadog Agent
|
||||
digest: 3fe083108c953c80ac60b348f39acca28607b11ce7cdd4e641030be0238aab86
|
||||
home: https://www.datadoghq.com
|
||||
icon: https://datadog-live.imgix.net/img/dd_logo_70x75.png
|
||||
keywords:
|
||||
- monitoring
|
||||
- alerting
|
||||
- metric
|
||||
maintainers:
|
||||
- email: support@datadoghq.com
|
||||
name: Datadog
|
||||
name: datadog
|
||||
sources:
|
||||
- https://app.datadoghq.com/account/settings#agent/kubernetes
|
||||
- https://github.com/DataDog/datadog-agent
|
||||
urls:
|
||||
- assets/datadog/datadog-3.32.0.tgz
|
||||
version: 3.32.0
|
||||
- annotations:
|
||||
catalog.cattle.io/certified: partner
|
||||
catalog.cattle.io/display-name: Datadog
|
||||
|
@ -16999,6 +17173,22 @@ entries:
|
|||
- assets/instana/instana-agent-1.0.2900.tgz
|
||||
version: 1.0.2900
|
||||
intel-device-plugins-operator:
|
||||
- annotations:
|
||||
catalog.cattle.io/certified: partner
|
||||
catalog.cattle.io/display-name: Intel Device Plugins Operator
|
||||
catalog.cattle.io/kube-version: '>=1.19-0'
|
||||
catalog.cattle.io/release-name: intel-device-plugins-operator
|
||||
apiVersion: v2
|
||||
appVersion: 0.27.0
|
||||
created: "2023-06-09T20:30:05.836553127Z"
|
||||
description: A Helm chart for Intel Device Plugins Operator for Kubernetes
|
||||
digest: ffd27fef5ab8d399198729081951a5cf890f0b51afc1119da32172a0a94fb1f3
|
||||
icon: https://avatars.githubusercontent.com/u/17888862?s=200&v=4
|
||||
name: intel-device-plugins-operator
|
||||
type: application
|
||||
urls:
|
||||
- assets/intel/intel-device-plugins-operator-0.27.0.tgz
|
||||
version: 0.27.0
|
||||
- annotations:
|
||||
catalog.cattle.io/certified: partner
|
||||
catalog.cattle.io/display-name: Intel Device Plugins Operator
|
||||
|
@ -17080,6 +17270,22 @@ entries:
|
|||
- assets/intel/intel-device-plugins-operator-0.24.1.tgz
|
||||
version: 0.24.1
|
||||
intel-device-plugins-qat:
|
||||
- annotations:
|
||||
catalog.cattle.io/certified: partner
|
||||
catalog.cattle.io/display-name: Intel QAT Device Plugin
|
||||
catalog.cattle.io/kube-version: '>=1.19-0'
|
||||
catalog.cattle.io/release-name: intel-device-plugins-qat
|
||||
apiVersion: v2
|
||||
appVersion: 0.27.0
|
||||
created: "2023-06-09T20:30:05.839495146Z"
|
||||
description: A Helm chart for Intel QAT Device Plugin
|
||||
digest: f242159063e9c9573647934abc059c7049dbf349688fa0a5f13f4fe9caa61a58
|
||||
icon: https://avatars.githubusercontent.com/u/17888862?s=200&v=4
|
||||
name: intel-device-plugins-qat
|
||||
type: application
|
||||
urls:
|
||||
- assets/intel/intel-device-plugins-qat-0.27.0.tgz
|
||||
version: 0.27.0
|
||||
- annotations:
|
||||
catalog.cattle.io/certified: partner
|
||||
catalog.cattle.io/display-name: Intel QAT Device Plugin
|
||||
|
@ -17113,6 +17319,22 @@ entries:
|
|||
- assets/intel/intel-device-plugins-qat-0.26.0.tgz
|
||||
version: 0.26.0
|
||||
intel-device-plugins-sgx:
|
||||
- annotations:
|
||||
catalog.cattle.io/certified: partner
|
||||
catalog.cattle.io/display-name: Intel SGX Device Plugin
|
||||
catalog.cattle.io/kube-version: '>=1.19-0'
|
||||
catalog.cattle.io/release-name: intel-device-plugins-sgx
|
||||
apiVersion: v2
|
||||
appVersion: 0.27.0
|
||||
created: "2023-06-09T20:30:05.840708353Z"
|
||||
description: A Helm chart for Intel SGX Device Plugin
|
||||
digest: 2ca333f45b6b46ce924ea2287c9b497c4e2215c6fb6632b84b20909e35cdd2c3
|
||||
icon: https://avatars.githubusercontent.com/u/17888862?s=200&v=4
|
||||
name: intel-device-plugins-sgx
|
||||
type: application
|
||||
urls:
|
||||
- assets/intel/intel-device-plugins-sgx-0.27.0.tgz
|
||||
version: 0.27.0
|
||||
- annotations:
|
||||
catalog.cattle.io/certified: partner
|
||||
catalog.cattle.io/display-name: Intel SGX Device Plugin
|
||||
|
@ -30890,6 +31112,29 @@ entries:
|
|||
- assets/percona/pxc-operator-1.12.0.tgz
|
||||
version: 1.12.0
|
||||
quobyte-cluster:
|
||||
- annotations:
|
||||
catalog.cattle.io/certified: partner
|
||||
catalog.cattle.io/display-name: Quobyte Cluster Deployment
|
||||
catalog.cattle.io/kube-version: 1.20-0 - 1.25-0
|
||||
catalog.cattle.io/release-name: quobyte-cluster
|
||||
apiVersion: v2
|
||||
appVersion: "3"
|
||||
created: "2023-06-09T20:30:08.100686467Z"
|
||||
description: Quobyte Cluster Helm Chart Deployment
|
||||
digest: 4a07534efae7684f573e61fa725268c959533f087bec714b200c589b4dcfeb21
|
||||
home: https://www.quobyte.com
|
||||
icon: https://quobyte.github.io/quobyte-k8s-resources/images/quobyte.png
|
||||
keywords:
|
||||
- quobyte
|
||||
- storage
|
||||
kubeVersion: 1.20-0 - 1.25-0
|
||||
name: quobyte-cluster
|
||||
sources:
|
||||
- https://github.com/quobyte/quobyte-k8s-resources
|
||||
type: application
|
||||
urls:
|
||||
- assets/quobyte/quobyte-cluster-0.1.8.tgz
|
||||
version: 0.1.8
|
||||
- annotations:
|
||||
catalog.cattle.io/certified: partner
|
||||
catalog.cattle.io/display-name: Quobyte Cluster Deployment
|
||||
|
@ -33892,6 +34137,45 @@ entries:
|
|||
- assets/redpanda/redpanda-2.1.7.tgz
|
||||
version: 2.1.7
|
||||
s3gw:
|
||||
- annotations:
|
||||
app.aquarist-labs.io/name: s3gw
|
||||
artifacthub.io/category: storage
|
||||
artifacthub.io/links: |
|
||||
- name: homepage
|
||||
url: https://s3gw.io/
|
||||
- name: support
|
||||
url: https://github.com/aquarist-labs/s3gw/issues
|
||||
catalog.cattle.io/certified: partner
|
||||
catalog.cattle.io/display-name: S3 Gateway
|
||||
catalog.cattle.io/experimental: "true"
|
||||
catalog.cattle.io/kube-version: '>=1.14'
|
||||
catalog.cattle.io/namespace: s3gw
|
||||
catalog.cattle.io/release-name: s3gw
|
||||
apiVersion: v2
|
||||
appVersion: latest
|
||||
created: "2023-06-09T20:30:01.596139894Z"
|
||||
description: 'Easy-to-use Open Source and Cloud Native S3 service for use on Rancher''s
|
||||
Kubernetes. '
|
||||
digest: 8db980f0e976ff7a773c01f5298ad3534efcc1a441645125f6c1100bdad51781
|
||||
home: https://github.com/aquarist-labs/s3gw
|
||||
icon: https://raw.githubusercontent.com/aquarist-labs/aquarium-website/gh-pages/images/logo-xl.png
|
||||
keywords:
|
||||
- storage
|
||||
- s3
|
||||
kubeVersion: '>=1.14'
|
||||
maintainers:
|
||||
- email: s3gw@suse.com
|
||||
name: s3gw maintainers
|
||||
url: https://github.com/orgs/aquarist-labs/projects/5
|
||||
name: s3gw
|
||||
sources:
|
||||
- https://github.com/aquarist-labs/s3gw-charts
|
||||
- https://github.com/aquarist-labs/s3gw
|
||||
- https://github.com/aquarist-labs/ceph
|
||||
type: application
|
||||
urls:
|
||||
- assets/aquarist-labs/s3gw-0.17.0.tgz
|
||||
version: 0.17.0
|
||||
- annotations:
|
||||
app.aquarist-labs.io/name: s3gw
|
||||
artifacthub.io/category: storage
|
||||
|
@ -40444,6 +40728,53 @@ entries:
|
|||
- assets/hashicorp/vault-0.22.0.tgz
|
||||
version: 0.22.0
|
||||
wordpress:
|
||||
- annotations:
|
||||
catalog.cattle.io/certified: partner
|
||||
catalog.cattle.io/display-name: WordPress
|
||||
catalog.cattle.io/kube-version: '>=1.19-0'
|
||||
catalog.cattle.io/release-name: wordpress
|
||||
category: CMS
|
||||
licenses: Apache-2.0
|
||||
apiVersion: v2
|
||||
appVersion: 6.2.2
|
||||
created: "2023-06-09T20:30:04.606488427Z"
|
||||
dependencies:
|
||||
- condition: memcached.enabled
|
||||
name: memcached
|
||||
repository: file://./charts/memcached
|
||||
version: 6.x.x
|
||||
- condition: mariadb.enabled
|
||||
name: mariadb
|
||||
repository: file://./charts/mariadb
|
||||
version: 12.x.x
|
||||
- name: common
|
||||
repository: file://./charts/common
|
||||
tags:
|
||||
- bitnami-common
|
||||
version: 2.x.x
|
||||
description: WordPress is the world's most popular blogging and content management
|
||||
platform. Powerful yet simple, everyone from students to global corporations
|
||||
use it to build beautiful, functional websites.
|
||||
digest: 57d647b00cfe20d4363daaa3a8b03205ed8ce0ee5444ed590ee208c9c1f829c3
|
||||
home: https://bitnami.com
|
||||
icon: https://s.w.org/style/images/about/WordPress-logotype-simplified.png
|
||||
keywords:
|
||||
- application
|
||||
- blog
|
||||
- cms
|
||||
- http
|
||||
- php
|
||||
- web
|
||||
- wordpress
|
||||
maintainers:
|
||||
- name: VMware, Inc.
|
||||
url: https://github.com/bitnami/charts
|
||||
name: wordpress
|
||||
sources:
|
||||
- https://github.com/bitnami/charts/tree/main/bitnami/wordpress
|
||||
urls:
|
||||
- assets/bitnami/wordpress-16.1.14.tgz
|
||||
version: 16.1.14
|
||||
- annotations:
|
||||
catalog.cattle.io/certified: partner
|
||||
catalog.cattle.io/display-name: WordPress
|
||||
|
|
Loading…
Reference in New Issue