Charts CI
``` Updated: aquarist-labs/s3gw: - 0.20.0 bitnami/kafka: - 25.1.5 bitnami/wordpress: - 17.1.6 kong/kong: - 2.26.5 redpanda/redpanda: - 5.3.0 speedscale/speedscale-operator: - 1.3.29 trilio/k8s-triliovault-operator: - 3.1.2 ```pull/873/head
parent
dc731a8a3b
commit
d067833ee4
Binary file not shown.
Binary file not shown.
Binary file not shown.
Binary file not shown.
Binary file not shown.
Binary file not shown.
Binary file not shown.
|
@ -35,4 +35,4 @@ sources:
|
||||||
- https://github.com/aquarist-labs/s3gw-cosi-driver
|
- https://github.com/aquarist-labs/s3gw-cosi-driver
|
||||||
- https://github.com/kubernetes-sigs/container-object-storage-interface-provisioner-sidecar
|
- https://github.com/kubernetes-sigs/container-object-storage-interface-provisioner-sidecar
|
||||||
type: application
|
type: application
|
||||||
version: 0.19.0
|
version: 0.20.0
|
||||||
|
|
|
@ -45,4 +45,4 @@ maintainers:
|
||||||
name: kafka
|
name: kafka
|
||||||
sources:
|
sources:
|
||||||
- https://github.com/bitnami/charts/tree/main/bitnami/kafka
|
- https://github.com/bitnami/charts/tree/main/bitnami/kafka
|
||||||
version: 25.1.4
|
version: 25.1.5
|
||||||
|
|
|
@ -187,6 +187,10 @@ data:
|
||||||
cp "/mounted-certs/kafka.crt" /certs/tls.crt
|
cp "/mounted-certs/kafka.crt" /certs/tls.crt
|
||||||
# Copy the PEM key ensuring the key used PEM format with PKCS#8
|
# Copy the PEM key ensuring the key used PEM format with PKCS#8
|
||||||
openssl pkcs8 -topk8 -nocrypt -in "/mounted-certs/kafka.key" > /certs/tls.key
|
openssl pkcs8 -topk8 -nocrypt -in "/mounted-certs/kafka.key" > /certs/tls.key
|
||||||
|
elif [[ -f /mounted-certs/tls.crt && -f /mounted-certs/tls.key ]]; then
|
||||||
|
cp "/mounted-certs/tls.crt" /certs/tls.crt
|
||||||
|
# Copy the PEM key ensuring the key used PEM format with PKCS#8
|
||||||
|
openssl pkcs8 -topk8 -nocrypt -in "/mounted-certs/tls.key" > /certs/tls.key
|
||||||
else
|
else
|
||||||
error "PEM key and cert files not found"
|
error "PEM key and cert files not found"
|
||||||
fi
|
fi
|
||||||
|
@ -195,6 +199,8 @@ data:
|
||||||
# Copy CA certificate
|
# Copy CA certificate
|
||||||
if [[ -f /mounted-certs/kafka-ca.crt ]]; then
|
if [[ -f /mounted-certs/kafka-ca.crt ]]; then
|
||||||
cp /mounted-certs/kafka-ca.crt /certs/ca.crt
|
cp /mounted-certs/kafka-ca.crt /certs/ca.crt
|
||||||
|
elif [[ -f /mounted-certs/ca.crt ]]; then
|
||||||
|
cp /mounted-certs/ca.crt /certs/ca.crt
|
||||||
else
|
else
|
||||||
error "CA certificate file not found"
|
error "CA certificate file not found"
|
||||||
fi
|
fi
|
||||||
|
|
|
@ -268,6 +268,7 @@ tls:
|
||||||
## --from-file=kafka-broker-0.crt=./kafka-broker-0.crt --from-file=kafka-broker-0.key=./kafka-broker-0.key ...
|
## --from-file=kafka-broker-0.crt=./kafka-broker-0.crt --from-file=kafka-broker-0.key=./kafka-broker-0.key ...
|
||||||
##
|
##
|
||||||
## NOTE: Alternatively, a single key and certificate can be provided for all nodes under the keys 'kafka.crt' and 'kafka.key'. These certificates will be used by all nodes unless overridden by the 'kafka-<role>-X.key' and 'kafka-<role>-X.crt' files
|
## NOTE: Alternatively, a single key and certificate can be provided for all nodes under the keys 'kafka.crt' and 'kafka.key'. These certificates will be used by all nodes unless overridden by the 'kafka-<role>-X.key' and 'kafka-<role>-X.crt' files
|
||||||
|
## NOTE: Alternatively, a single key and certificate can be provided for all nodes under the keys 'tls.crt' and 'tls.key'. These certificates will be used by all nodes unless overridden by the 'kafka-<role>-X.key' and 'kafka-<role>-X.crt' files
|
||||||
##
|
##
|
||||||
existingSecret: ""
|
existingSecret: ""
|
||||||
## @param tls.autoGenerated Generate automatically self-signed TLS certificates for Kafka brokers. Currently only supported if `tls.type` is `PEM`
|
## @param tls.autoGenerated Generate automatically self-signed TLS certificates for Kafka brokers. Currently only supported if `tls.type` is `PEM`
|
||||||
|
|
|
@ -7,6 +7,6 @@ dependencies:
|
||||||
version: 13.1.2
|
version: 13.1.2
|
||||||
- name: common
|
- name: common
|
||||||
repository: oci://registry-1.docker.io/bitnamicharts
|
repository: oci://registry-1.docker.io/bitnamicharts
|
||||||
version: 2.9.1
|
version: 2.9.2
|
||||||
digest: sha256:5df6e862af69422cc6e287bf9dd560b3a1e56d3b49b4bc81132b0db10903cd80
|
digest: sha256:467adda3c6f9bea1762beb6c252fd4d1a5ba52942ab1b9b48af60ac4e375783d
|
||||||
generated: "2023-08-30T09:41:25.351778314Z"
|
generated: "2023-08-31T19:21:10.315977353Z"
|
||||||
|
|
|
@ -6,11 +6,11 @@ annotations:
|
||||||
category: CMS
|
category: CMS
|
||||||
images: |
|
images: |
|
||||||
- name: apache-exporter
|
- name: apache-exporter
|
||||||
image: docker.io/bitnami/apache-exporter:1.0.1-debian-11-r29
|
image: docker.io/bitnami/apache-exporter:1.0.1-debian-11-r32
|
||||||
- name: os-shell
|
- name: os-shell
|
||||||
image: docker.io/bitnami/os-shell:11-debian-11-r51
|
image: docker.io/bitnami/os-shell:11-debian-11-r54
|
||||||
- name: wordpress
|
- name: wordpress
|
||||||
image: docker.io/bitnami/wordpress:6.3.1-debian-11-r0
|
image: docker.io/bitnami/wordpress:6.3.1-debian-11-r2
|
||||||
licenses: Apache-2.0
|
licenses: Apache-2.0
|
||||||
apiVersion: v2
|
apiVersion: v2
|
||||||
appVersion: 6.3.1
|
appVersion: 6.3.1
|
||||||
|
@ -47,4 +47,4 @@ maintainers:
|
||||||
name: wordpress
|
name: wordpress
|
||||||
sources:
|
sources:
|
||||||
- https://github.com/bitnami/charts/tree/main/bitnami/wordpress
|
- https://github.com/bitnami/charts/tree/main/bitnami/wordpress
|
||||||
version: 17.1.4
|
version: 17.1.6
|
||||||
|
|
|
@ -82,7 +82,7 @@ The command removes all the Kubernetes components associated with the chart and
|
||||||
| ------------------- | --------------------------------------------------------------------------------------------------------- | -------------------- |
|
| ------------------- | --------------------------------------------------------------------------------------------------------- | -------------------- |
|
||||||
| `image.registry` | WordPress image registry | `docker.io` |
|
| `image.registry` | WordPress image registry | `docker.io` |
|
||||||
| `image.repository` | WordPress image repository | `bitnami/wordpress` |
|
| `image.repository` | WordPress image repository | `bitnami/wordpress` |
|
||||||
| `image.tag` | WordPress image tag (immutable tags are recommended) | `6.3.1-debian-11-r0` |
|
| `image.tag` | WordPress image tag (immutable tags are recommended) | `6.3.1-debian-11-r2` |
|
||||||
| `image.digest` | WordPress image digest in the way sha256:aa.... Please note this parameter, if set, will override the tag | `""` |
|
| `image.digest` | WordPress image digest in the way sha256:aa.... Please note this parameter, if set, will override the tag | `""` |
|
||||||
| `image.pullPolicy` | WordPress image pull policy | `IfNotPresent` |
|
| `image.pullPolicy` | WordPress image pull policy | `IfNotPresent` |
|
||||||
| `image.pullSecrets` | WordPress image pull secrets | `[]` |
|
| `image.pullSecrets` | WordPress image pull secrets | `[]` |
|
||||||
|
@ -249,7 +249,7 @@ The command removes all the Kubernetes components associated with the chart and
|
||||||
| `volumePermissions.enabled` | Enable init container that changes the owner/group of the PV mount point to `runAsUser:fsGroup` | `false` |
|
| `volumePermissions.enabled` | Enable init container that changes the owner/group of the PV mount point to `runAsUser:fsGroup` | `false` |
|
||||||
| `volumePermissions.image.registry` | OS Shell + Utility image registry | `docker.io` |
|
| `volumePermissions.image.registry` | OS Shell + Utility image registry | `docker.io` |
|
||||||
| `volumePermissions.image.repository` | OS Shell + Utility image repository | `bitnami/os-shell` |
|
| `volumePermissions.image.repository` | OS Shell + Utility image repository | `bitnami/os-shell` |
|
||||||
| `volumePermissions.image.tag` | OS Shell + Utility image tag (immutable tags are recommended) | `11-debian-11-r51` |
|
| `volumePermissions.image.tag` | OS Shell + Utility image tag (immutable tags are recommended) | `11-debian-11-r54` |
|
||||||
| `volumePermissions.image.digest` | OS Shell + Utility image digest in the way sha256:aa.... Please note this parameter, if set, will override the tag | `""` |
|
| `volumePermissions.image.digest` | OS Shell + Utility image digest in the way sha256:aa.... Please note this parameter, if set, will override the tag | `""` |
|
||||||
| `volumePermissions.image.pullPolicy` | OS Shell + Utility image pull policy | `IfNotPresent` |
|
| `volumePermissions.image.pullPolicy` | OS Shell + Utility image pull policy | `IfNotPresent` |
|
||||||
| `volumePermissions.image.pullSecrets` | OS Shell + Utility image pull secrets | `[]` |
|
| `volumePermissions.image.pullSecrets` | OS Shell + Utility image pull secrets | `[]` |
|
||||||
|
@ -281,7 +281,7 @@ The command removes all the Kubernetes components associated with the chart and
|
||||||
| `metrics.enabled` | Start a sidecar prometheus exporter to expose metrics | `false` |
|
| `metrics.enabled` | Start a sidecar prometheus exporter to expose metrics | `false` |
|
||||||
| `metrics.image.registry` | Apache exporter image registry | `docker.io` |
|
| `metrics.image.registry` | Apache exporter image registry | `docker.io` |
|
||||||
| `metrics.image.repository` | Apache exporter image repository | `bitnami/apache-exporter` |
|
| `metrics.image.repository` | Apache exporter image repository | `bitnami/apache-exporter` |
|
||||||
| `metrics.image.tag` | Apache exporter image tag (immutable tags are recommended) | `1.0.1-debian-11-r29` |
|
| `metrics.image.tag` | Apache exporter image tag (immutable tags are recommended) | `1.0.1-debian-11-r32` |
|
||||||
| `metrics.image.digest` | Apache exporter image digest in the way sha256:aa.... Please note this parameter, if set, will override the tag | `""` |
|
| `metrics.image.digest` | Apache exporter image digest in the way sha256:aa.... Please note this parameter, if set, will override the tag | `""` |
|
||||||
| `metrics.image.pullPolicy` | Apache exporter image pull policy | `IfNotPresent` |
|
| `metrics.image.pullPolicy` | Apache exporter image pull policy | `IfNotPresent` |
|
||||||
| `metrics.image.pullSecrets` | Apache exporter image pull secrets | `[]` |
|
| `metrics.image.pullSecrets` | Apache exporter image pull secrets | `[]` |
|
||||||
|
|
|
@ -2,7 +2,7 @@ annotations:
|
||||||
category: Infrastructure
|
category: Infrastructure
|
||||||
licenses: Apache-2.0
|
licenses: Apache-2.0
|
||||||
apiVersion: v2
|
apiVersion: v2
|
||||||
appVersion: 2.9.1
|
appVersion: 2.9.2
|
||||||
description: A Library Helm Chart for grouping common logic between bitnami charts.
|
description: A Library Helm Chart for grouping common logic between bitnami charts.
|
||||||
This chart is not deployable by itself.
|
This chart is not deployable by itself.
|
||||||
home: https://bitnami.com
|
home: https://bitnami.com
|
||||||
|
@ -20,4 +20,4 @@ name: common
|
||||||
sources:
|
sources:
|
||||||
- https://github.com/bitnami/charts
|
- https://github.com/bitnami/charts
|
||||||
type: library
|
type: library
|
||||||
version: 2.9.1
|
version: 2.9.2
|
||||||
|
|
|
@ -11,17 +11,14 @@ Usage:
|
||||||
{{ include "common.tplvalues.render" ( dict "value" .Values.path.to.the.Value "context" $ "scope" $app ) }}
|
{{ include "common.tplvalues.render" ( dict "value" .Values.path.to.the.Value "context" $ "scope" $app ) }}
|
||||||
*/}}
|
*/}}
|
||||||
{{- define "common.tplvalues.render" -}}
|
{{- define "common.tplvalues.render" -}}
|
||||||
{{- if .scope }}
|
{{- $value := typeIs "string" .value | ternary .value (.value | toYaml) }}
|
||||||
{{- if typeIs "string" .value }}
|
{{- if contains "{{" (toJson .value) }}
|
||||||
{{- tpl (cat "{{- with $.RelativeScope -}}" .value "{{- end }}") (merge (dict "RelativeScope" .scope) .context) }}
|
{{- if .scope }}
|
||||||
|
{{- tpl (cat "{{- with $.RelativeScope -}}" $value "{{- end }}") (merge (dict "RelativeScope" .scope) .context) }}
|
||||||
{{- else }}
|
{{- else }}
|
||||||
{{- tpl (cat "{{- with $.RelativeScope -}}" (.value | toYaml) "{{- end }}") (merge (dict "RelativeScope" .scope) .context) }}
|
{{- tpl $value .context }}
|
||||||
{{- end }}
|
{{- end }}
|
||||||
{{- else }}
|
{{- else }}
|
||||||
{{- if typeIs "string" .value }}
|
{{- $value }}
|
||||||
{{- tpl .value .context }}
|
{{- end }}
|
||||||
{{- else }}
|
|
||||||
{{- tpl (.value | toYaml) .context }}
|
|
||||||
{{- end }}
|
|
||||||
{{- end -}}
|
|
||||||
{{- end -}}
|
{{- end -}}
|
||||||
|
|
|
@ -76,7 +76,7 @@ diagnosticMode:
|
||||||
image:
|
image:
|
||||||
registry: docker.io
|
registry: docker.io
|
||||||
repository: bitnami/wordpress
|
repository: bitnami/wordpress
|
||||||
tag: 6.3.1-debian-11-r0
|
tag: 6.3.1-debian-11-r2
|
||||||
digest: ""
|
digest: ""
|
||||||
## Specify a imagePullPolicy
|
## Specify a imagePullPolicy
|
||||||
## Defaults to 'Always' if image tag is 'latest', else set to 'IfNotPresent'
|
## Defaults to 'Always' if image tag is 'latest', else set to 'IfNotPresent'
|
||||||
|
@ -766,7 +766,7 @@ volumePermissions:
|
||||||
image:
|
image:
|
||||||
registry: docker.io
|
registry: docker.io
|
||||||
repository: bitnami/os-shell
|
repository: bitnami/os-shell
|
||||||
tag: 11-debian-11-r51
|
tag: 11-debian-11-r54
|
||||||
digest: ""
|
digest: ""
|
||||||
pullPolicy: IfNotPresent
|
pullPolicy: IfNotPresent
|
||||||
## Optionally specify an array of imagePullSecrets.
|
## Optionally specify an array of imagePullSecrets.
|
||||||
|
@ -860,7 +860,7 @@ metrics:
|
||||||
image:
|
image:
|
||||||
registry: docker.io
|
registry: docker.io
|
||||||
repository: bitnami/apache-exporter
|
repository: bitnami/apache-exporter
|
||||||
tag: 1.0.1-debian-11-r29
|
tag: 1.0.1-debian-11-r32
|
||||||
digest: ""
|
digest: ""
|
||||||
pullPolicy: IfNotPresent
|
pullPolicy: IfNotPresent
|
||||||
## Optionally specify an array of imagePullSecrets.
|
## Optionally specify an array of imagePullSecrets.
|
||||||
|
|
|
@ -4,6 +4,14 @@
|
||||||
|
|
||||||
Nothing yet.
|
Nothing yet.
|
||||||
|
|
||||||
|
## 2.26.5
|
||||||
|
|
||||||
|
### Fixed
|
||||||
|
|
||||||
|
* Kuma ServiceAccount Token hints and volumes are also available in migrations
|
||||||
|
Pods.
|
||||||
|
[#877](https://github.com/Kong/charts/pull/877)
|
||||||
|
|
||||||
## 2.26.4
|
## 2.26.4
|
||||||
|
|
||||||
### Fixed
|
### Fixed
|
||||||
|
|
|
@ -20,4 +20,4 @@ maintainers:
|
||||||
name: kong
|
name: kong
|
||||||
sources:
|
sources:
|
||||||
- https://github.com/Kong/charts/tree/main/charts/kong
|
- https://github.com/Kong/charts/tree/main/charts/kong
|
||||||
version: 2.26.4
|
version: 2.26.5
|
||||||
|
|
|
@ -552,6 +552,41 @@ The name of the service used for the ingress controller's validation webhook
|
||||||
- name: {{ template "kong.fullname" . }}-tmp
|
- name: {{ template "kong.fullname" . }}-tmp
|
||||||
emptyDir:
|
emptyDir:
|
||||||
sizeLimit: {{ .Values.deployment.tmpDir.sizeLimit }}
|
sizeLimit: {{ .Values.deployment.tmpDir.sizeLimit }}
|
||||||
|
{{- if (and (not .Values.deployment.serviceAccount.automountServiceAccountToken) (or .Values.deployment.serviceAccount.create .Values.deployment.serviceAccount.name)) }}
|
||||||
|
- name: {{ template "kong.serviceAccountTokenName" . }}
|
||||||
|
{{- /* Due to GKE versions (e.g. v1.23.15-gke.1900) we need to handle pre-release part of the version as well.
|
||||||
|
See the related documentation of semver module that Helm depends on for semverCompare:
|
||||||
|
https://github.com/Masterminds/semver#working-with-prerelease-versions
|
||||||
|
Related Helm issue: https://github.com/helm/helm/issues/3810 */}}
|
||||||
|
{{- if semverCompare ">=1.20.0-0" .Capabilities.KubeVersion.Version }}
|
||||||
|
projected:
|
||||||
|
sources:
|
||||||
|
- serviceAccountToken:
|
||||||
|
expirationSeconds: 3607
|
||||||
|
path: token
|
||||||
|
- configMap:
|
||||||
|
items:
|
||||||
|
- key: ca.crt
|
||||||
|
path: ca.crt
|
||||||
|
name: kube-root-ca.crt
|
||||||
|
- downwardAPI:
|
||||||
|
items:
|
||||||
|
- fieldRef:
|
||||||
|
apiVersion: v1
|
||||||
|
fieldPath: metadata.namespace
|
||||||
|
path: namespace
|
||||||
|
{{- else }}
|
||||||
|
secret:
|
||||||
|
secretName: {{ template "kong.serviceAccountTokenName" . }}
|
||||||
|
items:
|
||||||
|
- key: token
|
||||||
|
path: token
|
||||||
|
- key: ca.crt
|
||||||
|
path: ca.crt
|
||||||
|
- key: namespace
|
||||||
|
path: namespace
|
||||||
|
{{- end }}
|
||||||
|
{{- end }}
|
||||||
{{- if and ( .Capabilities.APIVersions.Has "cert-manager.io/v1" ) .Values.certificates.enabled -}}
|
{{- if and ( .Capabilities.APIVersions.Has "cert-manager.io/v1" ) .Values.certificates.enabled -}}
|
||||||
{{- if .Values.certificates.cluster.enabled }}
|
{{- if .Values.certificates.cluster.enabled }}
|
||||||
- name: {{ include "kong.fullname" . }}-cluster-cert
|
- name: {{ include "kong.fullname" . }}-cluster-cert
|
||||||
|
|
|
@ -302,39 +302,4 @@ spec:
|
||||||
volumes:
|
volumes:
|
||||||
{{- include "kong.volumes" . | nindent 8 -}}
|
{{- include "kong.volumes" . | nindent 8 -}}
|
||||||
{{- include "kong.userDefinedVolumes" . | nindent 8 -}}
|
{{- include "kong.userDefinedVolumes" . | nindent 8 -}}
|
||||||
{{- if (and (not .Values.deployment.serviceAccount.automountServiceAccountToken) (or .Values.deployment.serviceAccount.create .Values.deployment.serviceAccount.name)) }}
|
|
||||||
- name: {{ template "kong.serviceAccountTokenName" . }}
|
|
||||||
{{- /* Due to GKE versions (e.g. v1.23.15-gke.1900) we need to handle pre-release part of the version as well.
|
|
||||||
See the related documentation of semver module that Helm depends on for semverCompare:
|
|
||||||
https://github.com/Masterminds/semver#working-with-prerelease-versions
|
|
||||||
Related Helm issue: https://github.com/helm/helm/issues/3810 */}}
|
|
||||||
{{- if semverCompare ">=1.20.0-0" .Capabilities.KubeVersion.Version }}
|
|
||||||
projected:
|
|
||||||
sources:
|
|
||||||
- serviceAccountToken:
|
|
||||||
expirationSeconds: 3607
|
|
||||||
path: token
|
|
||||||
- configMap:
|
|
||||||
items:
|
|
||||||
- key: ca.crt
|
|
||||||
path: ca.crt
|
|
||||||
name: kube-root-ca.crt
|
|
||||||
- downwardAPI:
|
|
||||||
items:
|
|
||||||
- fieldRef:
|
|
||||||
apiVersion: v1
|
|
||||||
fieldPath: metadata.namespace
|
|
||||||
path: namespace
|
|
||||||
{{- else }}
|
|
||||||
secret:
|
|
||||||
secretName: {{ template "kong.serviceAccountTokenName" . }}
|
|
||||||
items:
|
|
||||||
- key: token
|
|
||||||
path: token
|
|
||||||
- key: ca.crt
|
|
||||||
path: ca.crt
|
|
||||||
- key: namespace
|
|
||||||
path: namespace
|
|
||||||
{{- end }}
|
|
||||||
{{- end }}
|
|
||||||
{{- end }}
|
{{- end }}
|
||||||
|
|
|
@ -29,6 +29,9 @@ spec:
|
||||||
{{- range $key, $value := .Values.migrations.annotations }}
|
{{- range $key, $value := .Values.migrations.annotations }}
|
||||||
{{ $key }}: {{ $value | quote }}
|
{{ $key }}: {{ $value | quote }}
|
||||||
{{- end }}
|
{{- end }}
|
||||||
|
{{- if (and (not .Values.deployment.serviceAccount.automountServiceAccountToken) (or .Values.deployment.serviceAccount.create .Values.deployment.serviceAccount.name)) }}
|
||||||
|
kuma.io/service-account-token-volume: {{ template "kong.serviceAccountTokenName" . }}
|
||||||
|
{{- end }}
|
||||||
{{- end }}
|
{{- end }}
|
||||||
spec:
|
spec:
|
||||||
{{- if or .Values.deployment.serviceAccount.create .Values.deployment.serviceAccount.name }}
|
{{- if or .Values.deployment.serviceAccount.create .Values.deployment.serviceAccount.name }}
|
||||||
|
|
|
@ -31,6 +31,9 @@ spec:
|
||||||
{{- range $key, $value := .Values.migrations.annotations }}
|
{{- range $key, $value := .Values.migrations.annotations }}
|
||||||
{{ $key }}: {{ $value | quote }}
|
{{ $key }}: {{ $value | quote }}
|
||||||
{{- end }}
|
{{- end }}
|
||||||
|
{{- if (and (not .Values.deployment.serviceAccount.automountServiceAccountToken) (or .Values.deployment.serviceAccount.create .Values.deployment.serviceAccount.name)) }}
|
||||||
|
kuma.io/service-account-token-volume: {{ template "kong.serviceAccountTokenName" . }}
|
||||||
|
{{- end }}
|
||||||
{{- end }}
|
{{- end }}
|
||||||
spec:
|
spec:
|
||||||
{{- if or .Values.deployment.serviceAccount.create .Values.deployment.serviceAccount.name }}
|
{{- if or .Values.deployment.serviceAccount.create .Values.deployment.serviceAccount.name }}
|
||||||
|
|
|
@ -39,6 +39,9 @@ spec:
|
||||||
{{- range $key, $value := .Values.migrations.annotations }}
|
{{- range $key, $value := .Values.migrations.annotations }}
|
||||||
{{ $key }}: {{ $value | quote }}
|
{{ $key }}: {{ $value | quote }}
|
||||||
{{- end }}
|
{{- end }}
|
||||||
|
{{- if (and (not .Values.deployment.serviceAccount.automountServiceAccountToken) (or .Values.deployment.serviceAccount.create .Values.deployment.serviceAccount.name)) }}
|
||||||
|
kuma.io/service-account-token-volume: {{ template "kong.serviceAccountTokenName" . }}
|
||||||
|
{{- end }}
|
||||||
{{- end }}
|
{{- end }}
|
||||||
spec:
|
spec:
|
||||||
{{- if or .Values.deployment.serviceAccount.create .Values.deployment.serviceAccount.name }}
|
{{- if or .Values.deployment.serviceAccount.create .Values.deployment.serviceAccount.name }}
|
||||||
|
|
|
@ -6,4 +6,4 @@ dependencies:
|
||||||
repository: https://charts.redpanda.com
|
repository: https://charts.redpanda.com
|
||||||
version: 0.1.5
|
version: 0.1.5
|
||||||
digest: sha256:dd7afd55f6eb7e9b3a91b0e5eeda47138e23c255b32d277ad4cb3a7ad3ec1b1f
|
digest: sha256:dd7afd55f6eb7e9b3a91b0e5eeda47138e23c255b32d277ad4cb3a7ad3ec1b1f
|
||||||
generated: "2023-08-29T23:24:16.635099387Z"
|
generated: "2023-08-31T03:08:33.366208928Z"
|
||||||
|
|
|
@ -37,4 +37,4 @@ name: redpanda
|
||||||
sources:
|
sources:
|
||||||
- https://github.com/redpanda-data/helm-charts
|
- https://github.com/redpanda-data/helm-charts
|
||||||
type: application
|
type: application
|
||||||
version: 5.2.0
|
version: 5.3.0
|
||||||
|
|
|
@ -0,0 +1,463 @@
|
||||||
|
{{/*
|
||||||
|
Licensed to the Apache Software Foundation (ASF) under one or more
|
||||||
|
contributor license agreements. See the NOTICE file distributed with
|
||||||
|
this work for additional information regarding copyright ownership.
|
||||||
|
The ASF licenses this file to You under the Apache License, Version 2.0
|
||||||
|
(the "License"); you may not use this file except in compliance with
|
||||||
|
the License. You may obtain a copy of the License at
|
||||||
|
|
||||||
|
http://www.apache.org/licenses/LICENSE-2.0
|
||||||
|
|
||||||
|
Unless required by applicable law or agreed to in writing, software
|
||||||
|
distributed under the License is distributed on an "AS IS" BASIS,
|
||||||
|
WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
|
||||||
|
See the License for the specific language governing permissions and
|
||||||
|
limitations under the License.
|
||||||
|
*/}}
|
||||||
|
|
||||||
|
{{- define "configmap-content-no-seed" -}}
|
||||||
|
{{- /*
|
||||||
|
configmap content without seed list.
|
||||||
|
*/ -}}
|
||||||
|
{{- $root := . }}
|
||||||
|
{{- $values := .Values }}
|
||||||
|
|
||||||
|
{{- /*
|
||||||
|
It's impossible to do a rolling upgrade from not-tls-enabled rpc to tls-enabled rpc.
|
||||||
|
*/ -}}
|
||||||
|
{{- $check := list
|
||||||
|
(include "redpanda-atleast-23-1-2" .|fromJson).bool
|
||||||
|
(include "redpanda-22-3-atleast-22-3-13" .|fromJson).bool
|
||||||
|
(include "redpanda-22-2-atleast-22-2-10" .|fromJson).bool
|
||||||
|
-}}
|
||||||
|
{{- $wantedRPCTLS := (include "rpc-tls-enabled" . | fromJson).bool -}}
|
||||||
|
{{- if and (not (mustHas true $check)) $wantedRPCTLS -}}
|
||||||
|
{{- fail (printf "Redpanda version v%s does not support TLS on the RPC port. Please upgrade. See technical service bulletin 2023-01." (include "redpanda.semver" .)) -}}
|
||||||
|
{{- end -}}
|
||||||
|
{{- $cm := lookup "v1" "ConfigMap" .Release.Namespace (include "redpanda.fullname" .) -}}
|
||||||
|
{{- $redpandaYAML := dig "data" "redpanda.yaml" "" $cm | fromYaml -}}
|
||||||
|
{{- $currentRPCTLS := dig "redpanda" "rpc_server_tls" "enabled" false $redpandaYAML -}}
|
||||||
|
{{- /* Lookup will return an empty map when running `helm template` or when `--dry-run` is passed. */ -}}
|
||||||
|
{{- if (and .Release.IsUpgrade $cm) -}}
|
||||||
|
{{- if ne $currentRPCTLS $wantedRPCTLS -}}
|
||||||
|
{{- if eq (get .Values "force" | default false) false -}}
|
||||||
|
{{- fail (join "\n" (list
|
||||||
|
(printf "\n\nError: Cannot do a rolling restart to enable or disable tls at the RPC layer: changing listeners.rpc.tls.enabled (redpanda.yaml:repdanda.rpc_server_tls.enabled) from %v to %v" $currentRPCTLS $wantedRPCTLS)
|
||||||
|
"***WARNING The following instructions will result in a short period of downtime."
|
||||||
|
"To accept this risk, run the upgrade again adding `--force=true` and do the following:\n"
|
||||||
|
"While helm is upgrading the release, manually delete ALL the pods:"
|
||||||
|
(printf " kubectl -n %s delete pod -l app.kubernetes.io/component=redpanda-statefulset" .Release.Namespace)
|
||||||
|
"\nIf you got here thinking rpc tls was already enabled, see technical service bulletin 2023-01."
|
||||||
|
))
|
||||||
|
-}}
|
||||||
|
{{- end -}}
|
||||||
|
{{- end -}}
|
||||||
|
{{- end -}}
|
||||||
|
|
||||||
|
{{- $users := list -}}
|
||||||
|
{{- if (include "sasl-enabled" . | fromJson).bool -}}
|
||||||
|
{{- range $user := .Values.auth.sasl.users -}}
|
||||||
|
{{- $users = append $users $user.name -}}
|
||||||
|
{{- end -}}
|
||||||
|
{{- end -}}
|
||||||
|
|
||||||
|
bootstrap.yaml: |
|
||||||
|
kafka_enable_authorization: {{ (include "sasl-enabled" . | fromJson).bool }}
|
||||||
|
enable_sasl: {{ (include "sasl-enabled" . | fromJson).bool }}
|
||||||
|
enable_rack_awareness: {{ .Values.rackAwareness.enabled }}
|
||||||
|
{{- if $users }}
|
||||||
|
superusers: {{ toJson $users }}
|
||||||
|
{{- end }}
|
||||||
|
{{- with (dig "cluster" dict .Values.config) }}
|
||||||
|
{{- range $key, $element := .}}
|
||||||
|
{{- if or (eq (typeOf $element) "bool") $element }}
|
||||||
|
{{ $key }}: {{ $element | toYaml }}
|
||||||
|
{{- end }}
|
||||||
|
{{- end }}
|
||||||
|
{{- end }}
|
||||||
|
{{- include "tunable" . }}
|
||||||
|
{{- if and (not (hasKey .Values.config.cluster "storage_min_free_bytes")) ((include "redpanda-atleast-22-2-0" . | fromJson).bool) }}
|
||||||
|
storage_min_free_bytes: {{ include "storage-min-free-bytes" . }}
|
||||||
|
{{- end }}
|
||||||
|
{{- if and (include "is-licensed" . | fromJson).bool .Values.storage.tieredConfig.cloud_storage_enabled }}
|
||||||
|
{{- $tieredStorageConfig := deepCopy .Values.storage.tieredConfig }}
|
||||||
|
{{- $tieredStorageConfig = unset $tieredStorageConfig "cloud_storage_cache_directory" }}
|
||||||
|
{{- if not (include "redpanda-atleast-22-3-0" . | fromJson).bool }}
|
||||||
|
{{- $tieredStorageConfig = unset $tieredStorageConfig "cloud_storage_credentials_source"}}
|
||||||
|
{{- end }}
|
||||||
|
{{- range $key, $element := $tieredStorageConfig}}
|
||||||
|
{{- if or (eq (typeOf $element) "bool") $element }}
|
||||||
|
{{ $key }}: {{ $element | toYaml }}
|
||||||
|
{{- end }}
|
||||||
|
{{- end }}
|
||||||
|
{{- end }}
|
||||||
|
redpanda.yaml: |
|
||||||
|
config_file: /etc/redpanda/redpanda.yaml
|
||||||
|
{{- if .Values.logging.usageStats.enabled }}
|
||||||
|
{{- with (dig "usageStats" "organization" "" .Values.logging) }}
|
||||||
|
organization: {{ . }}
|
||||||
|
{{- end }}
|
||||||
|
{{- with (dig "usageStats" "clusterId" "" .Values.logging) }}
|
||||||
|
cluster_id: {{ . }}
|
||||||
|
{{- end }}
|
||||||
|
{{- end }}
|
||||||
|
redpanda:
|
||||||
|
{{- if (include "redpanda-atleast-22-3-0" . | fromJson).bool }}
|
||||||
|
empty_seed_starts_cluster: false
|
||||||
|
{{- end }}
|
||||||
|
kafka_enable_authorization: {{ (include "sasl-enabled" . | fromJson).bool }}
|
||||||
|
enable_sasl: {{ (include "sasl-enabled" . | fromJson).bool }}
|
||||||
|
{{- if $users }}
|
||||||
|
superusers: {{ toJson $users }}
|
||||||
|
{{- end }}
|
||||||
|
{{- with (dig "cluster" dict .Values.config) }}
|
||||||
|
{{- range $key, $element := . }}
|
||||||
|
{{- if or (eq (typeOf $element) "bool") $element }}
|
||||||
|
{{ $key }}: {{ $element | toYaml }}
|
||||||
|
{{- end }}
|
||||||
|
{{- end }}
|
||||||
|
{{- end }}
|
||||||
|
{{- with (dig "tunable" dict .Values.config) }}
|
||||||
|
{{- range $key, $element := .}}
|
||||||
|
{{- if or (eq (typeOf $element) "bool") $element }}
|
||||||
|
{{ $key }}: {{ $element | toYaml }}
|
||||||
|
{{- end }}
|
||||||
|
{{- end }}
|
||||||
|
{{- end }}
|
||||||
|
{{- if not (hasKey .Values.config.cluster "storage_min_free_bytes") }}
|
||||||
|
storage_min_free_bytes: {{ include "storage-min-free-bytes" . }}
|
||||||
|
{{- end }}
|
||||||
|
{{- with dig "node" dict .Values.config }}
|
||||||
|
{{- range $key, $element := .}}
|
||||||
|
{{- if or (eq (typeOf $element) "bool") $element }}
|
||||||
|
{{ $key }}: {{ $element | toYaml }}
|
||||||
|
{{- end }}
|
||||||
|
{{- end }}
|
||||||
|
{{- end }}
|
||||||
|
{{- /* LISTENERS */}}
|
||||||
|
{{- /* Admin API */}}
|
||||||
|
{{- $service := .Values.listeners.admin }}
|
||||||
|
admin:
|
||||||
|
- name: internal
|
||||||
|
address: 0.0.0.0
|
||||||
|
port: {{ $service.port }}
|
||||||
|
{{- range $name, $listener := $service.external }}
|
||||||
|
{{- if and $listener.port $name }}
|
||||||
|
- name: {{ $name }}
|
||||||
|
address: 0.0.0.0
|
||||||
|
port: {{ $listener.port }}
|
||||||
|
{{- end }}
|
||||||
|
{{- end }}
|
||||||
|
admin_api_tls:
|
||||||
|
{{- if (include "admin-internal-tls-enabled" . | fromJson).bool }}
|
||||||
|
- name: internal
|
||||||
|
enabled: true
|
||||||
|
cert_file: /etc/tls/certs/{{ $service.tls.cert }}/tls.crt
|
||||||
|
key_file: /etc/tls/certs/{{ $service.tls.cert }}/tls.key
|
||||||
|
require_client_auth: {{ $service.tls.requireClientAuth }}
|
||||||
|
{{- $cert := get .Values.tls.certs $service.tls.cert }}
|
||||||
|
{{- if empty $cert }}
|
||||||
|
{{- fail (printf "Certificate, '%s', used but not defined")}}
|
||||||
|
{{- end }}
|
||||||
|
{{- if $cert.caEnabled }}
|
||||||
|
truststore_file: /etc/tls/certs/{{ $service.tls.cert }}/ca.crt
|
||||||
|
{{- else }}
|
||||||
|
{{- /* This is a required field so we use the default in the redpanda debian container */}}
|
||||||
|
truststore_file: /etc/ssl/certs/ca-certificates.crt
|
||||||
|
{{- end }}
|
||||||
|
{{- end }}
|
||||||
|
{{- range $name, $listener := $service.external }}
|
||||||
|
{{- $k := dict "Values" $values "listener" $listener }}
|
||||||
|
{{- if (include "admin-external-tls-enabled" $k | fromJson).bool }}
|
||||||
|
{{- $mtls := dig "tls" "requireClientAuth" false $listener }}
|
||||||
|
{{- $mtls = dig "tls" "requireClientAuth" $mtls $k }}
|
||||||
|
{{- $certName := include "admin-external-tls-cert" $k }}
|
||||||
|
{{- $certPath := printf "/etc/tls/certs/%s" $certName }}
|
||||||
|
{{- $cert := get $values.tls.certs $certName }}
|
||||||
|
{{- if empty $cert }}
|
||||||
|
{{- fail (printf "Certificate, '%s', used but not defined" $certName)}}
|
||||||
|
{{- end }}
|
||||||
|
- name: {{ $name }}
|
||||||
|
enabled: true
|
||||||
|
cert_file: {{ $certPath }}/tls.crt
|
||||||
|
key_file: {{ $certPath }}/tls.key
|
||||||
|
require_client_auth: {{ $mtls }}
|
||||||
|
{{- if $cert.caEnabled }}
|
||||||
|
truststore_file: {{ $certPath }}/ca.crt
|
||||||
|
{{- else }}
|
||||||
|
{{- /* This is a required field so we use the default in the redpanda debian container */}}
|
||||||
|
truststore_file: /etc/ssl/certs/ca-certificates.crt
|
||||||
|
{{- end }}
|
||||||
|
{{- end }}
|
||||||
|
{{- end }}
|
||||||
|
{{- /* Kafka API */}}
|
||||||
|
{{- $kafkaService := .Values.listeners.kafka }}
|
||||||
|
kafka_api:
|
||||||
|
- name: internal
|
||||||
|
address: 0.0.0.0
|
||||||
|
port: {{ $kafkaService.port }}
|
||||||
|
{{- if or (include "sasl-enabled" $root | fromJson).bool $kafkaService.authenticationMethod }}
|
||||||
|
authentication_method: {{ default "sasl" $kafkaService.authenticationMethod }}
|
||||||
|
{{- end }}
|
||||||
|
{{- range $name, $listener := $kafkaService.external }}
|
||||||
|
- name: {{ $name }}
|
||||||
|
address: 0.0.0.0
|
||||||
|
port: {{ $listener.port }}
|
||||||
|
{{- if or (include "sasl-enabled" $root | fromJson).bool $listener.authenticationMethod }}
|
||||||
|
authentication_method: {{ default "sasl" $listener.authenticationMethod }}
|
||||||
|
{{- end }}
|
||||||
|
{{- end }}
|
||||||
|
kafka_api_tls:
|
||||||
|
{{- if (include "kafka-internal-tls-enabled" . | fromJson).bool }}
|
||||||
|
- name: internal
|
||||||
|
enabled: true
|
||||||
|
cert_file: /etc/tls/certs/{{ $kafkaService.tls.cert }}/tls.crt
|
||||||
|
key_file: /etc/tls/certs/{{ $kafkaService.tls.cert }}/tls.key
|
||||||
|
require_client_auth: {{ $kafkaService.tls.requireClientAuth }}
|
||||||
|
{{- $cert := get .Values.tls.certs $kafkaService.tls.cert }}
|
||||||
|
{{- if empty $cert }}
|
||||||
|
{{- fail (printf "Certificate, '%s', used but not defined")}}
|
||||||
|
{{- end }}
|
||||||
|
{{- if $cert.caEnabled }}
|
||||||
|
truststore_file: /etc/tls/certs/{{ $kafkaService.tls.cert }}/ca.crt
|
||||||
|
{{- else }}
|
||||||
|
{{- /* This is a required field so we use the default in the redpanda debian container */}}
|
||||||
|
truststore_file: /etc/ssl/certs/ca-certificates.crt
|
||||||
|
{{- end }}
|
||||||
|
{{- end }}
|
||||||
|
{{- range $name, $listener := $kafkaService.external }}
|
||||||
|
{{- $k := dict "Values" $values "listener" $listener }}
|
||||||
|
{{- if (include "kafka-external-tls-enabled" $k | fromJson).bool }}
|
||||||
|
{{- $mtls := dig "tls" "requireClientAuth" false $listener }}
|
||||||
|
{{- $mtls = dig "tls" "requireClientAuth" $mtls $k }}
|
||||||
|
{{- $certName := include "kafka-external-tls-cert" $k }}
|
||||||
|
{{- $certPath := printf "/etc/tls/certs/%s" $certName }}
|
||||||
|
{{- $cert := get $values.tls.certs $certName }}
|
||||||
|
{{- if empty $cert }}
|
||||||
|
{{- fail (printf "Certificate, '%s', used but not defined" $certName)}}
|
||||||
|
{{- end }}
|
||||||
|
- name: {{ $name }}
|
||||||
|
enabled: true
|
||||||
|
cert_file: {{ $certPath }}/tls.crt
|
||||||
|
key_file: {{ $certPath }}/tls.key
|
||||||
|
require_client_auth: {{ $mtls }}
|
||||||
|
{{- if $cert.caEnabled }}
|
||||||
|
truststore_file: {{ $certPath }}/ca.crt
|
||||||
|
{{- else }}
|
||||||
|
{{- /* This is a required field so we use the default in the redpanda debian container */}}
|
||||||
|
truststore_file: /etc/ssl/certs/ca-certificates.crt
|
||||||
|
{{- end }}
|
||||||
|
{{- end }}
|
||||||
|
{{- end }}
|
||||||
|
{{- /* RPC Server */}}
|
||||||
|
{{- $service = .Values.listeners.rpc }}
|
||||||
|
rpc_server:
|
||||||
|
address: 0.0.0.0
|
||||||
|
port: {{ $service.port }}
|
||||||
|
{{- if (include "rpc-tls-enabled" . | fromJson).bool }}
|
||||||
|
rpc_server_tls:
|
||||||
|
enabled: true
|
||||||
|
cert_file: /etc/tls/certs/{{ $service.tls.cert }}/tls.crt
|
||||||
|
key_file: /etc/tls/certs/{{ $service.tls.cert }}/tls.key
|
||||||
|
require_client_auth: {{ $service.tls.requireClientAuth }}
|
||||||
|
{{- $cert := get .Values.tls.certs $service.tls.cert }}
|
||||||
|
{{- if empty $cert }}
|
||||||
|
{{- fail (printf "Certificate, '%s', used but not defined")}}
|
||||||
|
{{- end }}
|
||||||
|
{{- if $cert.caEnabled }}
|
||||||
|
truststore_file: /etc/tls/certs/{{ $service.tls.cert }}/ca.crt
|
||||||
|
{{- else }}
|
||||||
|
{{- /* This is a required field so we use the default in the redpanda debian container */}}
|
||||||
|
truststore_file: /etc/ssl/certs/ca-certificates.crt
|
||||||
|
{{- end }}
|
||||||
|
{{- end }}
|
||||||
|
seed_servers:
|
||||||
|
{{- with $root.tempConfigMapServerList -}}
|
||||||
|
{{- . | trim | nindent 8 }}
|
||||||
|
{{- end -}}
|
||||||
|
{{- if and (include "is-licensed" . | fromJson).bool .Values.storage.tieredConfig.cloud_storage_enabled }}
|
||||||
|
{{- $tieredStorageConfig := deepCopy .Values.storage.tieredConfig }}
|
||||||
|
{{- if not (include "redpanda-atleast-22-3-0" . | fromJson).bool }}
|
||||||
|
{{- $tieredStorageConfig = unset $tieredStorageConfig "cloud_storage_credentials_source"}}
|
||||||
|
{{- end }}
|
||||||
|
{{- range $key, $element := $tieredStorageConfig}}
|
||||||
|
{{- if or (eq (typeOf $element) "bool") $element }}
|
||||||
|
{{ $key }}: {{ $element | toYaml }}
|
||||||
|
{{- end }}
|
||||||
|
{{- end }}
|
||||||
|
{{- end }}
|
||||||
|
{{- /* Schema Registry API */}}
|
||||||
|
{{- if and .Values.listeners.schemaRegistry.enabled (include "redpanda-22-2-x-without-sasl" $root | fromJson).bool }}
|
||||||
|
{{- $schemaRegistryService := .Values.listeners.schemaRegistry }}
|
||||||
|
schema_registry:
|
||||||
|
schema_registry_api:
|
||||||
|
- name: internal
|
||||||
|
address: 0.0.0.0
|
||||||
|
port: {{ $schemaRegistryService.port }}
|
||||||
|
{{- if or (include "sasl-enabled" $root | fromJson).bool $schemaRegistryService.authenticationMethod }}
|
||||||
|
authentication_method: {{ default "http_basic" $schemaRegistryService.authenticationMethod }}
|
||||||
|
{{- end }}
|
||||||
|
{{- range $name, $listener := $schemaRegistryService.external }}
|
||||||
|
- name: {{ $name }}
|
||||||
|
address: 0.0.0.0
|
||||||
|
{{- /*
|
||||||
|
when upgrading from an older version that had a missing port, fail if we cannot guess a default
|
||||||
|
this should work in all cases as the older versions would have failed with multiple listeners anyway
|
||||||
|
*/}}
|
||||||
|
{{- if and (empty $listener.port) (ne (len $schemaRegistryService.external) 1) }}
|
||||||
|
{{- fail "missing required port for schemaRegistry listener $listener.name" }}
|
||||||
|
{{- end }}
|
||||||
|
port: {{ $listener.port | default 8084 }}
|
||||||
|
{{- if or (include "sasl-enabled" $root | fromJson).bool $listener.authenticationMethod }}
|
||||||
|
authentication_method: {{ default "http_basic" $listener.authenticationMethod }}
|
||||||
|
{{- end }}
|
||||||
|
{{- end }}
|
||||||
|
schema_registry_api_tls:
|
||||||
|
{{- if (include "schemaRegistry-internal-tls-enabled" . | fromJson).bool }}
|
||||||
|
- name: internal
|
||||||
|
enabled: true
|
||||||
|
cert_file: /etc/tls/certs/{{ $schemaRegistryService.tls.cert }}/tls.crt
|
||||||
|
key_file: /etc/tls/certs/{{ $schemaRegistryService.tls.cert }}/tls.key
|
||||||
|
require_client_auth: {{ $schemaRegistryService.tls.requireClientAuth }}
|
||||||
|
{{- $cert := get .Values.tls.certs $schemaRegistryService.tls.cert }}
|
||||||
|
{{- if empty $cert }}
|
||||||
|
{{- fail (printf "Certificate, '%s', used but not defined")}}
|
||||||
|
{{- end }}
|
||||||
|
{{- if $cert.caEnabled }}
|
||||||
|
truststore_file: /etc/tls/certs/{{ $schemaRegistryService.tls.cert }}/ca.crt
|
||||||
|
{{- else }}
|
||||||
|
{{- /* This is a required field so we use the default in the redpanda debian container */}}
|
||||||
|
truststore_file: /etc/ssl/certs/ca-certificates.crt
|
||||||
|
{{- end }}
|
||||||
|
{{- end }}
|
||||||
|
{{- range $name, $listener := $schemaRegistryService.external }}
|
||||||
|
{{- $k := dict "Values" $values "listener" $listener }}
|
||||||
|
{{- if (include "schemaRegistry-external-tls-enabled" $k | fromJson).bool }}
|
||||||
|
{{- $mtls := dig "tls" "requireClientAuth" false $listener }}
|
||||||
|
{{- $mtls = dig "tls" "requireClientAuth" $mtls $k }}
|
||||||
|
{{- $certName := include "schemaRegistry-external-tls-cert" $k }}
|
||||||
|
{{- $certPath := printf "/etc/tls/certs/%s" $certName }}
|
||||||
|
{{- $cert := get $values.tls.certs $certName }}
|
||||||
|
{{- if empty $cert }}
|
||||||
|
{{- fail (printf "Certificate, '%s', used but not defined")}}
|
||||||
|
{{- end }}
|
||||||
|
- name: {{ $name }}
|
||||||
|
enabled: true
|
||||||
|
cert_file: {{ $certPath }}/tls.crt
|
||||||
|
key_file: {{ $certPath }}/tls.key
|
||||||
|
require_client_auth: {{ $mtls }}
|
||||||
|
{{- if $cert.caEnabled }}
|
||||||
|
truststore_file: {{ $certPath }}/ca.crt
|
||||||
|
{{- else }}
|
||||||
|
{{- /* This is a required field so we use the default in the redpanda debian container */}}
|
||||||
|
truststore_file: /etc/ssl/certs/ca-certificates.crt
|
||||||
|
{{- end }}
|
||||||
|
{{- end }}
|
||||||
|
{{- end }}
|
||||||
|
{{- end }}
|
||||||
|
{{- /* HTTP Proxy */}}
|
||||||
|
{{- if and .Values.listeners.http.enabled (include "redpanda-22-2-x-without-sasl" $root | fromJson).bool }}
|
||||||
|
{{- $HTTPService := .Values.listeners.http }}
|
||||||
|
pandaproxy:
|
||||||
|
pandaproxy_api:
|
||||||
|
- name: internal
|
||||||
|
address: 0.0.0.0
|
||||||
|
port: {{ $HTTPService.port }}
|
||||||
|
{{- if or (include "sasl-enabled" $root | fromJson).bool $HTTPService.authenticationMethod }}
|
||||||
|
authentication_method: {{ default "http_basic" $HTTPService.authenticationMethod }}
|
||||||
|
{{- end }}
|
||||||
|
{{- range $name, $listener := $HTTPService.external }}
|
||||||
|
- name: {{ $name }}
|
||||||
|
address: 0.0.0.0
|
||||||
|
port: {{ $listener.port }}
|
||||||
|
{{- if or (include "sasl-enabled" $root | fromJson).bool $listener.authenticationMethod }}
|
||||||
|
authentication_method: {{ default "http_basic" $listener.authenticationMethod }}
|
||||||
|
{{- end }}
|
||||||
|
{{- end }}
|
||||||
|
pandaproxy_api_tls:
|
||||||
|
{{- if (include "http-internal-tls-enabled" . | fromJson).bool }}
|
||||||
|
- name: internal
|
||||||
|
enabled: true
|
||||||
|
cert_file: /etc/tls/certs/{{ $HTTPService.tls.cert }}/tls.crt
|
||||||
|
key_file: /etc/tls/certs/{{ $HTTPService.tls.cert }}/tls.key
|
||||||
|
require_client_auth: {{ $HTTPService.tls.requireClientAuth }}
|
||||||
|
{{- $cert := get .Values.tls.certs $HTTPService.tls.cert }}
|
||||||
|
{{- if empty $cert }}
|
||||||
|
{{- fail (printf "Certificate, '%s', used but not defined")}}
|
||||||
|
{{- end }}
|
||||||
|
{{- if $cert.caEnabled }}
|
||||||
|
truststore_file: /etc/tls/certs/{{ $HTTPService.tls.cert }}/ca.crt
|
||||||
|
{{- else }}
|
||||||
|
{{- /* This is a required field so we use the default in the redpanda debian container */}}
|
||||||
|
truststore_file: /etc/ssl/certs/ca-certificates.crt
|
||||||
|
{{- end }}
|
||||||
|
{{- end }}
|
||||||
|
{{- range $name, $listener := $HTTPService.external }}
|
||||||
|
{{- $k := dict "Values" $values "listener" $listener }}
|
||||||
|
{{- if (include "http-external-tls-enabled" $k | fromJson).bool }}
|
||||||
|
{{- $mtls := dig "tls" "requireClientAuth" false $listener }}
|
||||||
|
{{- $mtls = dig "tls" "requireClientAuth" $mtls $k }}
|
||||||
|
{{- $certName := include "http-external-tls-cert" $k }}
|
||||||
|
{{- $certPath := printf "/etc/tls/certs/%s" $certName }}
|
||||||
|
{{- $cert := get $values.tls.certs $certName }}
|
||||||
|
{{- if empty $cert }}
|
||||||
|
{{- fail (printf "Certificate, '%s', used but not defined")}}
|
||||||
|
{{- end }}
|
||||||
|
- name: {{ $name }}
|
||||||
|
enabled: true
|
||||||
|
cert_file: {{ $certPath }}/tls.crt
|
||||||
|
key_file: {{ $certPath }}/tls.key
|
||||||
|
require_client_auth: {{ $mtls }}
|
||||||
|
{{- if $cert.caEnabled }}
|
||||||
|
truststore_file: {{ $certPath }}/ca.crt
|
||||||
|
{{- else }}
|
||||||
|
{{- /* This is a required field so we use the default in the redpanda debian container */}}
|
||||||
|
truststore_file: /etc/ssl/certs/ca-certificates.crt
|
||||||
|
{{- end }}
|
||||||
|
{{- end }}
|
||||||
|
{{- end }}
|
||||||
|
{{- end }}
|
||||||
|
{{- /* END LISTENERS */}}
|
||||||
|
|
||||||
|
rpk:
|
||||||
|
{{- with (dig "rpk" dict .Values.config) }}
|
||||||
|
{{- . | toYaml | nindent 6}}
|
||||||
|
{{- end }}
|
||||||
|
enable_usage_stats: {{ .Values.logging.usageStats.enabled }}
|
||||||
|
overprovisioned: {{ dig "cpu" "overprovisioned" false .Values.resources }}
|
||||||
|
enable_memory_locking: {{ dig "memory" "enable_memory_locking" false .Values.resources }}
|
||||||
|
{{- if hasKey .Values.tuning "tune_aio_events" }}
|
||||||
|
tune_aio_events: {{ .Values.tuning.tune_aio_events }}
|
||||||
|
{{- end }}
|
||||||
|
{{- if hasKey .Values.tuning "tune_clocksource" }}
|
||||||
|
tune_clocksource: {{ .Values.tuning.tune_clocksource }}
|
||||||
|
{{- end }}
|
||||||
|
{{- if hasKey .Values.tuning "tune_ballast_file" }}
|
||||||
|
tune_ballast_file: {{ .Values.tuning.tune_ballast_file }}
|
||||||
|
{{- end }}
|
||||||
|
{{- if hasKey .Values.tuning "ballast_file_path" }}
|
||||||
|
ballast_file_path: {{ .Values.tuning.ballast_file_path }}
|
||||||
|
{{- end }}
|
||||||
|
{{- if hasKey .Values.tuning "ballast_file_size" }}
|
||||||
|
ballast_file_size: {{ .Values.tuning.ballast_file_size }}
|
||||||
|
{{- end }}
|
||||||
|
{{- if hasKey .Values.tuning "well_known_io" }}
|
||||||
|
well_known_io: {{ .Values.tuning.well_known_io }}
|
||||||
|
{{- end }}
|
||||||
|
{{- end -}}
|
||||||
|
|
||||||
|
{{- define "configmap-server-list" -}}
|
||||||
|
{{- $root := . }}
|
||||||
|
{{- range (include "seed-server-list" $root | mustFromJson) }}
|
||||||
|
- host:
|
||||||
|
address: {{ . }}
|
||||||
|
port: {{ $root.Values.listeners.rpc.port }}
|
||||||
|
{{- end }}
|
||||||
|
{{- end -}}
|
||||||
|
|
||||||
|
{{- define "configmap-with-server-list" -}}
|
||||||
|
{{- $root := . }}
|
||||||
|
{{- $serverList := (include "configmap-server-list" $root ) -}}
|
||||||
|
{{- $r := set $root "tempConfigMapServerList" ( $serverList ) }}
|
||||||
|
{{ include "configmap-content-no-seed" $r }}
|
||||||
|
{{- end -}}
|
|
@ -14,47 +14,6 @@ WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
|
||||||
See the License for the specific language governing permissions and
|
See the License for the specific language governing permissions and
|
||||||
limitations under the License.
|
limitations under the License.
|
||||||
*/}}
|
*/}}
|
||||||
{{- $root := . }}
|
|
||||||
{{- $values := .Values }}
|
|
||||||
|
|
||||||
{{- /*
|
|
||||||
It's impossible to do a rolling upgrade from not-tls-enabled rpc to tls-enabled rpc.
|
|
||||||
*/ -}}
|
|
||||||
{{- $check := list
|
|
||||||
(include "redpanda-atleast-23-1-2" .|fromJson).bool
|
|
||||||
(include "redpanda-22-3-atleast-22-3-13" .|fromJson).bool
|
|
||||||
(include "redpanda-22-2-atleast-22-2-10" .|fromJson).bool
|
|
||||||
-}}
|
|
||||||
{{- $wantedRPCTLS := (include "rpc-tls-enabled" . | fromJson).bool -}}
|
|
||||||
{{- if and (not (mustHas true $check)) $wantedRPCTLS -}}
|
|
||||||
{{- fail (printf "Redpanda version v%s does not support TLS on the RPC port. Please upgrade. See technical service bulletin 2023-01." (include "redpanda.semver" .)) -}}
|
|
||||||
{{- end -}}
|
|
||||||
{{- $cm := lookup "v1" "ConfigMap" .Release.Namespace (include "redpanda.fullname" .) -}}
|
|
||||||
{{- $redpandaYAML := dig "data" "redpanda.yaml" "" $cm | fromYaml -}}
|
|
||||||
{{- $currentRPCTLS := dig "redpanda" "rpc_server_tls" "enabled" false $redpandaYAML -}}
|
|
||||||
{{- /* Lookup will return an empty map when running `helm template` or when `--dry-run` is passed. */ -}}
|
|
||||||
{{- if (and .Release.IsUpgrade $cm) -}}
|
|
||||||
{{- if ne $currentRPCTLS $wantedRPCTLS -}}
|
|
||||||
{{- if eq (get .Values "force" | default false) false -}}
|
|
||||||
{{- fail (join "\n" (list
|
|
||||||
(printf "\n\nError: Cannot do a rolling restart to enable or disable tls at the RPC layer: changing listeners.rpc.tls.enabled (redpanda.yaml:repdanda.rpc_server_tls.enabled) from %v to %v" $currentRPCTLS $wantedRPCTLS)
|
|
||||||
"***WARNING The following instructions will result in a short period of downtime."
|
|
||||||
"To accept this risk, run the upgrade again adding `--force=true` and do the following:\n"
|
|
||||||
"While helm is upgrading the release, manually delete ALL the pods:"
|
|
||||||
(printf " kubectl -n %s delete pod -l app.kubernetes.io/component=redpanda-statefulset" .Release.Namespace)
|
|
||||||
"\nIf you got here thinking rpc tls was already enabled, see technical service bulletin 2023-01."
|
|
||||||
))
|
|
||||||
-}}
|
|
||||||
{{- end -}}
|
|
||||||
{{- end -}}
|
|
||||||
{{- end -}}
|
|
||||||
|
|
||||||
{{- $users := list -}}
|
|
||||||
{{- if (include "sasl-enabled" . | fromJson).bool -}}
|
|
||||||
{{- range $user := .Values.auth.sasl.users -}}
|
|
||||||
{{- $users = append $users $user.name -}}
|
|
||||||
{{- end -}}
|
|
||||||
{{- end -}}
|
|
||||||
---
|
---
|
||||||
apiVersion: v1
|
apiVersion: v1
|
||||||
kind: ConfigMap
|
kind: ConfigMap
|
||||||
|
@ -66,388 +25,4 @@ metadata:
|
||||||
{{- . | nindent 4 }}
|
{{- . | nindent 4 }}
|
||||||
{{- end }}
|
{{- end }}
|
||||||
data:
|
data:
|
||||||
bootstrap.yaml: |
|
{{ include "configmap-with-server-list" . | trim }}
|
||||||
kafka_enable_authorization: {{ (include "sasl-enabled" . | fromJson).bool }}
|
|
||||||
enable_sasl: {{ (include "sasl-enabled" . | fromJson).bool }}
|
|
||||||
enable_rack_awareness: {{ .Values.rackAwareness.enabled }}
|
|
||||||
{{- if $users }}
|
|
||||||
superusers: {{ toJson $users }}
|
|
||||||
{{- end }}
|
|
||||||
{{- with (dig "cluster" dict .Values.config) }}
|
|
||||||
{{- range $key, $element := .}}
|
|
||||||
{{- if or (eq (typeOf $element) "bool") $element }}
|
|
||||||
{{ $key }}: {{ $element | toYaml }}
|
|
||||||
{{- end }}
|
|
||||||
{{- end }}
|
|
||||||
{{- end }}
|
|
||||||
{{- include "tunable" . }}
|
|
||||||
{{- if and (not (hasKey .Values.config.cluster "storage_min_free_bytes")) ((include "redpanda-atleast-22-2-0" . | fromJson).bool) }}
|
|
||||||
storage_min_free_bytes: {{ include "storage-min-free-bytes" . }}
|
|
||||||
{{- end }}
|
|
||||||
{{- if and (include "is-licensed" . | fromJson).bool .Values.storage.tieredConfig.cloud_storage_enabled }}
|
|
||||||
{{- $tieredStorageConfig := deepCopy .Values.storage.tieredConfig }}
|
|
||||||
{{- $tieredStorageConfig = unset $tieredStorageConfig "cloud_storage_cache_directory" }}
|
|
||||||
{{- if not (include "redpanda-atleast-22-3-0" . | fromJson).bool }}
|
|
||||||
{{- $tieredStorageConfig = unset $tieredStorageConfig "cloud_storage_credentials_source"}}
|
|
||||||
{{- end }}
|
|
||||||
{{- range $key, $element := $tieredStorageConfig}}
|
|
||||||
{{- if or (eq (typeOf $element) "bool") $element }}
|
|
||||||
{{ $key }}: {{ $element | toYaml }}
|
|
||||||
{{- end }}
|
|
||||||
{{- end }}
|
|
||||||
{{- end }}
|
|
||||||
redpanda.yaml: |
|
|
||||||
config_file: /etc/redpanda/redpanda.yaml
|
|
||||||
{{- if .Values.logging.usageStats.enabled }}
|
|
||||||
{{- with (dig "usageStats" "organization" "" .Values.logging) }}
|
|
||||||
organization: {{ . }}
|
|
||||||
{{- end }}
|
|
||||||
{{- with (dig "usageStats" "clusterId" "" .Values.logging) }}
|
|
||||||
cluster_id: {{ . }}
|
|
||||||
{{- end }}
|
|
||||||
{{- end }}
|
|
||||||
redpanda:
|
|
||||||
{{- if (include "redpanda-atleast-22-3-0" . | fromJson).bool }}
|
|
||||||
empty_seed_starts_cluster: false
|
|
||||||
{{- end }}
|
|
||||||
kafka_enable_authorization: {{ (include "sasl-enabled" . | fromJson).bool }}
|
|
||||||
enable_sasl: {{ (include "sasl-enabled" . | fromJson).bool }}
|
|
||||||
{{- if $users }}
|
|
||||||
superusers: {{ toJson $users }}
|
|
||||||
{{- end }}
|
|
||||||
{{- with (dig "cluster" dict .Values.config) }}
|
|
||||||
{{- range $key, $element := . }}
|
|
||||||
{{- if or (eq (typeOf $element) "bool") $element }}
|
|
||||||
{{ $key }}: {{ $element | toYaml }}
|
|
||||||
{{- end }}
|
|
||||||
{{- end }}
|
|
||||||
{{- end }}
|
|
||||||
{{- with (dig "tunable" dict .Values.config) }}
|
|
||||||
{{- range $key, $element := .}}
|
|
||||||
{{- if or (eq (typeOf $element) "bool") $element }}
|
|
||||||
{{ $key }}: {{ $element | toYaml }}
|
|
||||||
{{- end }}
|
|
||||||
{{- end }}
|
|
||||||
{{- end }}
|
|
||||||
{{- if not (hasKey .Values.config.cluster "storage_min_free_bytes") }}
|
|
||||||
storage_min_free_bytes: {{ include "storage-min-free-bytes" . }}
|
|
||||||
{{- end }}
|
|
||||||
{{- with dig "node" dict .Values.config }}
|
|
||||||
{{- range $key, $element := .}}
|
|
||||||
{{- if or (eq (typeOf $element) "bool") $element }}
|
|
||||||
{{ $key }}: {{ $element | toYaml }}
|
|
||||||
{{- end }}
|
|
||||||
{{- end }}
|
|
||||||
{{- end }}
|
|
||||||
{{- /* LISTENERS */}}
|
|
||||||
{{- /* Admin API */}}
|
|
||||||
{{- $service := .Values.listeners.admin }}
|
|
||||||
admin:
|
|
||||||
- name: internal
|
|
||||||
address: 0.0.0.0
|
|
||||||
port: {{ $service.port }}
|
|
||||||
{{- range $name, $listener := $service.external }}
|
|
||||||
{{- if and $listener.port $name }}
|
|
||||||
- name: {{ $name }}
|
|
||||||
address: 0.0.0.0
|
|
||||||
port: {{ $listener.port }}
|
|
||||||
{{- end }}
|
|
||||||
{{- end }}
|
|
||||||
admin_api_tls:
|
|
||||||
{{- if (include "admin-internal-tls-enabled" . | fromJson).bool }}
|
|
||||||
- name: internal
|
|
||||||
enabled: true
|
|
||||||
cert_file: /etc/tls/certs/{{ $service.tls.cert }}/tls.crt
|
|
||||||
key_file: /etc/tls/certs/{{ $service.tls.cert }}/tls.key
|
|
||||||
require_client_auth: {{ $service.tls.requireClientAuth }}
|
|
||||||
{{- $cert := get .Values.tls.certs $service.tls.cert }}
|
|
||||||
{{- if empty $cert }}
|
|
||||||
{{- fail (printf "Certificate, '%s', used but not defined")}}
|
|
||||||
{{- end }}
|
|
||||||
{{- if $cert.caEnabled }}
|
|
||||||
truststore_file: /etc/tls/certs/{{ $service.tls.cert }}/ca.crt
|
|
||||||
{{- else }}
|
|
||||||
{{- /* This is a required field so we use the default in the redpanda debian container */}}
|
|
||||||
truststore_file: /etc/ssl/certs/ca-certificates.crt
|
|
||||||
{{- end }}
|
|
||||||
{{- end }}
|
|
||||||
{{- range $name, $listener := $service.external }}
|
|
||||||
{{- $k := dict "Values" $values "listener" $listener }}
|
|
||||||
{{- if (include "admin-external-tls-enabled" $k | fromJson).bool }}
|
|
||||||
{{- $mtls := dig "tls" "requireClientAuth" false $listener }}
|
|
||||||
{{- $mtls = dig "tls" "requireClientAuth" $mtls $k }}
|
|
||||||
{{- $certName := include "admin-external-tls-cert" $k }}
|
|
||||||
{{- $certPath := printf "/etc/tls/certs/%s" $certName }}
|
|
||||||
{{- $cert := get $values.tls.certs $certName }}
|
|
||||||
{{- if empty $cert }}
|
|
||||||
{{- fail (printf "Certificate, '%s', used but not defined" $certName)}}
|
|
||||||
{{- end }}
|
|
||||||
- name: {{ $name }}
|
|
||||||
enabled: true
|
|
||||||
cert_file: {{ $certPath }}/tls.crt
|
|
||||||
key_file: {{ $certPath }}/tls.key
|
|
||||||
require_client_auth: {{ $mtls }}
|
|
||||||
{{- if $cert.caEnabled }}
|
|
||||||
truststore_file: {{ $certPath }}/ca.crt
|
|
||||||
{{- else }}
|
|
||||||
{{- /* This is a required field so we use the default in the redpanda debian container */}}
|
|
||||||
truststore_file: /etc/ssl/certs/ca-certificates.crt
|
|
||||||
{{- end }}
|
|
||||||
{{- end }}
|
|
||||||
{{- end }}
|
|
||||||
{{- /* Kafka API */}}
|
|
||||||
{{- $kafkaService := .Values.listeners.kafka }}
|
|
||||||
kafka_api:
|
|
||||||
- name: internal
|
|
||||||
address: 0.0.0.0
|
|
||||||
port: {{ $kafkaService.port }}
|
|
||||||
{{- if or (include "sasl-enabled" $root | fromJson).bool $kafkaService.authenticationMethod }}
|
|
||||||
authentication_method: {{ default "sasl" $kafkaService.authenticationMethod }}
|
|
||||||
{{- end }}
|
|
||||||
{{- range $name, $listener := $kafkaService.external }}
|
|
||||||
- name: {{ $name }}
|
|
||||||
address: 0.0.0.0
|
|
||||||
port: {{ $listener.port }}
|
|
||||||
{{- if or (include "sasl-enabled" $root | fromJson).bool $listener.authenticationMethod }}
|
|
||||||
authentication_method: {{ default "sasl" $listener.authenticationMethod }}
|
|
||||||
{{- end }}
|
|
||||||
{{- end }}
|
|
||||||
kafka_api_tls:
|
|
||||||
{{- if (include "kafka-internal-tls-enabled" . | fromJson).bool }}
|
|
||||||
- name: internal
|
|
||||||
enabled: true
|
|
||||||
cert_file: /etc/tls/certs/{{ $kafkaService.tls.cert }}/tls.crt
|
|
||||||
key_file: /etc/tls/certs/{{ $kafkaService.tls.cert }}/tls.key
|
|
||||||
require_client_auth: {{ $kafkaService.tls.requireClientAuth }}
|
|
||||||
{{- $cert := get .Values.tls.certs $kafkaService.tls.cert }}
|
|
||||||
{{- if empty $cert }}
|
|
||||||
{{- fail (printf "Certificate, '%s', used but not defined")}}
|
|
||||||
{{- end }}
|
|
||||||
{{- if $cert.caEnabled }}
|
|
||||||
truststore_file: /etc/tls/certs/{{ $kafkaService.tls.cert }}/ca.crt
|
|
||||||
{{- else }}
|
|
||||||
{{- /* This is a required field so we use the default in the redpanda debian container */}}
|
|
||||||
truststore_file: /etc/ssl/certs/ca-certificates.crt
|
|
||||||
{{- end }}
|
|
||||||
{{- end }}
|
|
||||||
{{- range $name, $listener := $kafkaService.external }}
|
|
||||||
{{- $k := dict "Values" $values "listener" $listener }}
|
|
||||||
{{- if (include "kafka-external-tls-enabled" $k | fromJson).bool }}
|
|
||||||
{{- $mtls := dig "tls" "requireClientAuth" false $listener }}
|
|
||||||
{{- $mtls = dig "tls" "requireClientAuth" $mtls $k }}
|
|
||||||
{{- $certName := include "kafka-external-tls-cert" $k }}
|
|
||||||
{{- $certPath := printf "/etc/tls/certs/%s" $certName }}
|
|
||||||
{{- $cert := get $values.tls.certs $certName }}
|
|
||||||
{{- if empty $cert }}
|
|
||||||
{{- fail (printf "Certificate, '%s', used but not defined" $certName)}}
|
|
||||||
{{- end }}
|
|
||||||
- name: {{ $name }}
|
|
||||||
enabled: true
|
|
||||||
cert_file: {{ $certPath }}/tls.crt
|
|
||||||
key_file: {{ $certPath }}/tls.key
|
|
||||||
require_client_auth: {{ $mtls }}
|
|
||||||
{{- if $cert.caEnabled }}
|
|
||||||
truststore_file: {{ $certPath }}/ca.crt
|
|
||||||
{{- else }}
|
|
||||||
{{- /* This is a required field so we use the default in the redpanda debian container */}}
|
|
||||||
truststore_file: /etc/ssl/certs/ca-certificates.crt
|
|
||||||
{{- end }}
|
|
||||||
{{- end }}
|
|
||||||
{{- end }}
|
|
||||||
{{- /* RPC Server */}}
|
|
||||||
{{- $service = .Values.listeners.rpc }}
|
|
||||||
rpc_server:
|
|
||||||
address: 0.0.0.0
|
|
||||||
port: {{ $service.port }}
|
|
||||||
{{- if (include "rpc-tls-enabled" . | fromJson).bool }}
|
|
||||||
rpc_server_tls:
|
|
||||||
enabled: true
|
|
||||||
cert_file: /etc/tls/certs/{{ $service.tls.cert }}/tls.crt
|
|
||||||
key_file: /etc/tls/certs/{{ $service.tls.cert }}/tls.key
|
|
||||||
require_client_auth: {{ $service.tls.requireClientAuth }}
|
|
||||||
{{- $cert := get .Values.tls.certs $service.tls.cert }}
|
|
||||||
{{- if empty $cert }}
|
|
||||||
{{- fail (printf "Certificate, '%s', used but not defined")}}
|
|
||||||
{{- end }}
|
|
||||||
{{- if $cert.caEnabled }}
|
|
||||||
truststore_file: /etc/tls/certs/{{ $service.tls.cert }}/ca.crt
|
|
||||||
{{- else }}
|
|
||||||
{{- /* This is a required field so we use the default in the redpanda debian container */}}
|
|
||||||
truststore_file: /etc/ssl/certs/ca-certificates.crt
|
|
||||||
{{- end }}
|
|
||||||
{{- end }}
|
|
||||||
seed_servers:
|
|
||||||
{{- range (include "seed-server-list" . | mustFromJson) }}
|
|
||||||
- host:
|
|
||||||
address: {{ . }}
|
|
||||||
port: {{ $values.listeners.rpc.port }}
|
|
||||||
{{- end }}
|
|
||||||
{{- if and (include "is-licensed" . | fromJson).bool .Values.storage.tieredConfig.cloud_storage_enabled }}
|
|
||||||
{{- $tieredStorageConfig := deepCopy .Values.storage.tieredConfig }}
|
|
||||||
{{- if not (include "redpanda-atleast-22-3-0" . | fromJson).bool }}
|
|
||||||
{{- $tieredStorageConfig = unset $tieredStorageConfig "cloud_storage_credentials_source"}}
|
|
||||||
{{- end }}
|
|
||||||
{{- range $key, $element := $tieredStorageConfig}}
|
|
||||||
{{- if or (eq (typeOf $element) "bool") $element }}
|
|
||||||
{{ $key }}: {{ $element | toYaml }}
|
|
||||||
{{- end }}
|
|
||||||
{{- end }}
|
|
||||||
{{- end }}
|
|
||||||
{{- /* Schema Registry API */}}
|
|
||||||
{{- if and .Values.listeners.schemaRegistry.enabled (include "redpanda-22-2-x-without-sasl" $root | fromJson).bool }}
|
|
||||||
{{- $schemaRegistryService := .Values.listeners.schemaRegistry }}
|
|
||||||
schema_registry:
|
|
||||||
schema_registry_api:
|
|
||||||
- name: internal
|
|
||||||
address: 0.0.0.0
|
|
||||||
port: {{ $schemaRegistryService.port }}
|
|
||||||
{{- if or (include "sasl-enabled" $root | fromJson).bool $schemaRegistryService.authenticationMethod }}
|
|
||||||
authentication_method: {{ default "http_basic" $schemaRegistryService.authenticationMethod }}
|
|
||||||
{{- end }}
|
|
||||||
{{- range $name, $listener := $schemaRegistryService.external }}
|
|
||||||
- name: {{ $name }}
|
|
||||||
address: 0.0.0.0
|
|
||||||
{{- /*
|
|
||||||
when upgrading from an older version that had a missing port, fail if we cannot guess a default
|
|
||||||
this should work in all cases as the older versions would have failed with multiple listeners anyway
|
|
||||||
*/}}
|
|
||||||
{{- if and (empty $listener.port) (ne (len $schemaRegistryService.external) 1) }}
|
|
||||||
{{- fail "missing required port for schemaRegistry listener $listener.name" }}
|
|
||||||
{{- end }}
|
|
||||||
port: {{ $listener.port | default 8084 }}
|
|
||||||
{{- if or (include "sasl-enabled" $root | fromJson).bool $listener.authenticationMethod }}
|
|
||||||
authentication_method: {{ default "http_basic" $listener.authenticationMethod }}
|
|
||||||
{{- end }}
|
|
||||||
{{- end }}
|
|
||||||
schema_registry_api_tls:
|
|
||||||
{{- if (include "schemaRegistry-internal-tls-enabled" . | fromJson).bool }}
|
|
||||||
- name: internal
|
|
||||||
enabled: true
|
|
||||||
cert_file: /etc/tls/certs/{{ $schemaRegistryService.tls.cert }}/tls.crt
|
|
||||||
key_file: /etc/tls/certs/{{ $schemaRegistryService.tls.cert }}/tls.key
|
|
||||||
require_client_auth: {{ $schemaRegistryService.tls.requireClientAuth }}
|
|
||||||
{{- $cert := get .Values.tls.certs $schemaRegistryService.tls.cert }}
|
|
||||||
{{- if empty $cert }}
|
|
||||||
{{- fail (printf "Certificate, '%s', used but not defined")}}
|
|
||||||
{{- end }}
|
|
||||||
{{- if $cert.caEnabled }}
|
|
||||||
truststore_file: /etc/tls/certs/{{ $schemaRegistryService.tls.cert }}/ca.crt
|
|
||||||
{{- else }}
|
|
||||||
{{- /* This is a required field so we use the default in the redpanda debian container */}}
|
|
||||||
truststore_file: /etc/ssl/certs/ca-certificates.crt
|
|
||||||
{{- end }}
|
|
||||||
{{- end }}
|
|
||||||
{{- range $name, $listener := $schemaRegistryService.external }}
|
|
||||||
{{- $k := dict "Values" $values "listener" $listener }}
|
|
||||||
{{- if (include "schemaRegistry-external-tls-enabled" $k | fromJson).bool }}
|
|
||||||
{{- $mtls := dig "tls" "requireClientAuth" false $listener }}
|
|
||||||
{{- $mtls = dig "tls" "requireClientAuth" $mtls $k }}
|
|
||||||
{{- $certName := include "schemaRegistry-external-tls-cert" $k }}
|
|
||||||
{{- $certPath := printf "/etc/tls/certs/%s" $certName }}
|
|
||||||
{{- $cert := get $values.tls.certs $certName }}
|
|
||||||
{{- if empty $cert }}
|
|
||||||
{{- fail (printf "Certificate, '%s', used but not defined")}}
|
|
||||||
{{- end }}
|
|
||||||
- name: {{ $name }}
|
|
||||||
enabled: true
|
|
||||||
cert_file: {{ $certPath }}/tls.crt
|
|
||||||
key_file: {{ $certPath }}/tls.key
|
|
||||||
require_client_auth: {{ $mtls }}
|
|
||||||
{{- if $cert.caEnabled }}
|
|
||||||
truststore_file: {{ $certPath }}/ca.crt
|
|
||||||
{{- else }}
|
|
||||||
{{- /* This is a required field so we use the default in the redpanda debian container */}}
|
|
||||||
truststore_file: /etc/ssl/certs/ca-certificates.crt
|
|
||||||
{{- end }}
|
|
||||||
{{- end }}
|
|
||||||
{{- end }}
|
|
||||||
{{- end }}
|
|
||||||
{{- /* HTTP Proxy */}}
|
|
||||||
{{- if and .Values.listeners.http.enabled (include "redpanda-22-2-x-without-sasl" $root | fromJson).bool }}
|
|
||||||
{{- $HTTPService := .Values.listeners.http }}
|
|
||||||
pandaproxy:
|
|
||||||
pandaproxy_api:
|
|
||||||
- name: internal
|
|
||||||
address: 0.0.0.0
|
|
||||||
port: {{ $HTTPService.port }}
|
|
||||||
{{- if or (include "sasl-enabled" $root | fromJson).bool $HTTPService.authenticationMethod }}
|
|
||||||
authentication_method: {{ default "http_basic" $HTTPService.authenticationMethod }}
|
|
||||||
{{- end }}
|
|
||||||
{{- range $name, $listener := $HTTPService.external }}
|
|
||||||
- name: {{ $name }}
|
|
||||||
address: 0.0.0.0
|
|
||||||
port: {{ $listener.port }}
|
|
||||||
{{- if or (include "sasl-enabled" $root | fromJson).bool $listener.authenticationMethod }}
|
|
||||||
authentication_method: {{ default "http_basic" $listener.authenticationMethod }}
|
|
||||||
{{- end }}
|
|
||||||
{{- end }}
|
|
||||||
pandaproxy_api_tls:
|
|
||||||
{{- if (include "http-internal-tls-enabled" . | fromJson).bool }}
|
|
||||||
- name: internal
|
|
||||||
enabled: true
|
|
||||||
cert_file: /etc/tls/certs/{{ $HTTPService.tls.cert }}/tls.crt
|
|
||||||
key_file: /etc/tls/certs/{{ $HTTPService.tls.cert }}/tls.key
|
|
||||||
require_client_auth: {{ $HTTPService.tls.requireClientAuth }}
|
|
||||||
{{- $cert := get .Values.tls.certs $HTTPService.tls.cert }}
|
|
||||||
{{- if empty $cert }}
|
|
||||||
{{- fail (printf "Certificate, '%s', used but not defined")}}
|
|
||||||
{{- end }}
|
|
||||||
{{- if $cert.caEnabled }}
|
|
||||||
truststore_file: /etc/tls/certs/{{ $HTTPService.tls.cert }}/ca.crt
|
|
||||||
{{- else }}
|
|
||||||
{{- /* This is a required field so we use the default in the redpanda debian container */}}
|
|
||||||
truststore_file: /etc/ssl/certs/ca-certificates.crt
|
|
||||||
{{- end }}
|
|
||||||
{{- end }}
|
|
||||||
{{- range $name, $listener := $HTTPService.external }}
|
|
||||||
{{- $k := dict "Values" $values "listener" $listener }}
|
|
||||||
{{- if (include "http-external-tls-enabled" $k | fromJson).bool }}
|
|
||||||
{{- $mtls := dig "tls" "requireClientAuth" false $listener }}
|
|
||||||
{{- $mtls = dig "tls" "requireClientAuth" $mtls $k }}
|
|
||||||
{{- $certName := include "http-external-tls-cert" $k }}
|
|
||||||
{{- $certPath := printf "/etc/tls/certs/%s" $certName }}
|
|
||||||
{{- $cert := get $values.tls.certs $certName }}
|
|
||||||
{{- if empty $cert }}
|
|
||||||
{{- fail (printf "Certificate, '%s', used but not defined")}}
|
|
||||||
{{- end }}
|
|
||||||
- name: {{ $name }}
|
|
||||||
enabled: true
|
|
||||||
cert_file: {{ $certPath }}/tls.crt
|
|
||||||
key_file: {{ $certPath }}/tls.key
|
|
||||||
require_client_auth: {{ $mtls }}
|
|
||||||
{{- if $cert.caEnabled }}
|
|
||||||
truststore_file: {{ $certPath }}/ca.crt
|
|
||||||
{{- else }}
|
|
||||||
{{- /* This is a required field so we use the default in the redpanda debian container */}}
|
|
||||||
truststore_file: /etc/ssl/certs/ca-certificates.crt
|
|
||||||
{{- end }}
|
|
||||||
{{- end }}
|
|
||||||
{{- end }}
|
|
||||||
{{- end }}
|
|
||||||
{{- /* END LISTENERS */}}
|
|
||||||
|
|
||||||
rpk:
|
|
||||||
{{- with (dig "rpk" dict .Values.config) }}
|
|
||||||
{{- . | toYaml | nindent 6}}
|
|
||||||
{{- end }}
|
|
||||||
enable_usage_stats: {{ .Values.logging.usageStats.enabled }}
|
|
||||||
overprovisioned: {{ dig "cpu" "overprovisioned" false .Values.resources }}
|
|
||||||
enable_memory_locking: {{ dig "memory" "enable_memory_locking" false .Values.resources }}
|
|
||||||
{{- if hasKey .Values.tuning "tune_aio_events" }}
|
|
||||||
tune_aio_events: {{ .Values.tuning.tune_aio_events }}
|
|
||||||
{{- end }}
|
|
||||||
{{- if hasKey .Values.tuning "tune_clocksource" }}
|
|
||||||
tune_clocksource: {{ .Values.tuning.tune_clocksource }}
|
|
||||||
{{- end }}
|
|
||||||
{{- if hasKey .Values.tuning "tune_ballast_file" }}
|
|
||||||
tune_ballast_file: {{ .Values.tuning.tune_ballast_file }}
|
|
||||||
{{- end }}
|
|
||||||
{{- if hasKey .Values.tuning "ballast_file_path" }}
|
|
||||||
ballast_file_path: {{ .Values.tuning.ballast_file_path }}
|
|
||||||
{{- end }}
|
|
||||||
{{- if hasKey .Values.tuning "ballast_file_size" }}
|
|
||||||
ballast_file_size: {{ .Values.tuning.ballast_file_size }}
|
|
||||||
{{- end }}
|
|
||||||
{{- if hasKey .Values.tuning "well_known_io" }}
|
|
||||||
well_known_io: {{ .Values.tuning.well_known_io }}
|
|
||||||
{{- end }}
|
|
||||||
|
|
|
@ -57,7 +57,7 @@ spec:
|
||||||
labels: {{ (include "statefulset-pod-labels" .) | nindent 8 }}
|
labels: {{ (include "statefulset-pod-labels" .) | nindent 8 }}
|
||||||
redpanda.com/poddisruptionbudget: {{ template "redpanda.name" . }}
|
redpanda.com/poddisruptionbudget: {{ template "redpanda.name" . }}
|
||||||
annotations:
|
annotations:
|
||||||
checksum/config: {{ include (print $.Template.BasePath "/configmap.yaml") . | sha256sum }}
|
checksum/config: {{ include "configmap-content-no-seed" . | sha256sum }}
|
||||||
{{- with $.Values.statefulset.annotations }}
|
{{- with $.Values.statefulset.annotations }}
|
||||||
{{- toYaml . | nindent 8 }}
|
{{- toYaml . | nindent 8 }}
|
||||||
{{- end }}
|
{{- end }}
|
||||||
|
|
|
@ -4,7 +4,7 @@ annotations:
|
||||||
catalog.cattle.io/kube-version: '>= 1.17.0-0'
|
catalog.cattle.io/kube-version: '>= 1.17.0-0'
|
||||||
catalog.cattle.io/release-name: speedscale-operator
|
catalog.cattle.io/release-name: speedscale-operator
|
||||||
apiVersion: v1
|
apiVersion: v1
|
||||||
appVersion: 1.3.320
|
appVersion: 1.3.335
|
||||||
description: Stress test your APIs with real world scenarios. Collect and replay
|
description: Stress test your APIs with real world scenarios. Collect and replay
|
||||||
traffic without scripting.
|
traffic without scripting.
|
||||||
home: https://speedscale.com
|
home: https://speedscale.com
|
||||||
|
@ -24,4 +24,4 @@ maintainers:
|
||||||
- email: support@speedscale.com
|
- email: support@speedscale.com
|
||||||
name: Speedscale Support
|
name: Speedscale Support
|
||||||
name: speedscale-operator
|
name: speedscale-operator
|
||||||
version: 1.3.28
|
version: 1.3.29
|
||||||
|
|
|
@ -101,10 +101,10 @@ _See [helm upgrade](https://helm.sh/docs/helm/helm_upgrade/) for command documen
|
||||||
A major chart version change (like v1.2.3 -> v2.0.0) indicates that there is an
|
A major chart version change (like v1.2.3 -> v2.0.0) indicates that there is an
|
||||||
incompatible breaking change needing manual actions.
|
incompatible breaking change needing manual actions.
|
||||||
|
|
||||||
### Upgrade to 1.3.28
|
### Upgrade to 1.3.29
|
||||||
|
|
||||||
```bash
|
```bash
|
||||||
kubectl apply --server-side -f https://raw.githubusercontent.com/speedscale/operator-helm/main/1.3.28/templates/crds/trafficreplays.yaml
|
kubectl apply --server-side -f https://raw.githubusercontent.com/speedscale/operator-helm/main/1.3.29/templates/crds/trafficreplays.yaml
|
||||||
```
|
```
|
||||||
|
|
||||||
### Upgrade to 1.1.0
|
### Upgrade to 1.1.0
|
||||||
|
|
|
@ -101,10 +101,10 @@ _See [helm upgrade](https://helm.sh/docs/helm/helm_upgrade/) for command documen
|
||||||
A major chart version change (like v1.2.3 -> v2.0.0) indicates that there is an
|
A major chart version change (like v1.2.3 -> v2.0.0) indicates that there is an
|
||||||
incompatible breaking change needing manual actions.
|
incompatible breaking change needing manual actions.
|
||||||
|
|
||||||
### Upgrade to 1.3.28
|
### Upgrade to 1.3.29
|
||||||
|
|
||||||
```bash
|
```bash
|
||||||
kubectl apply --server-side -f https://raw.githubusercontent.com/speedscale/operator-helm/main/1.3.28/templates/crds/trafficreplays.yaml
|
kubectl apply --server-side -f https://raw.githubusercontent.com/speedscale/operator-helm/main/1.3.29/templates/crds/trafficreplays.yaml
|
||||||
```
|
```
|
||||||
|
|
||||||
### Upgrade to 1.1.0
|
### Upgrade to 1.1.0
|
||||||
|
|
|
@ -20,7 +20,7 @@ clusterName: "my-cluster"
|
||||||
# Speedscale components image settings.
|
# Speedscale components image settings.
|
||||||
image:
|
image:
|
||||||
registry: gcr.io/speedscale
|
registry: gcr.io/speedscale
|
||||||
tag: v1.3.320
|
tag: v1.3.335
|
||||||
pullPolicy: Always
|
pullPolicy: Always
|
||||||
|
|
||||||
# Log level for Speedscale components.
|
# Log level for Speedscale components.
|
||||||
|
|
|
@ -4,7 +4,7 @@ annotations:
|
||||||
catalog.cattle.io/kube-version: '>=1.19.0-0'
|
catalog.cattle.io/kube-version: '>=1.19.0-0'
|
||||||
catalog.cattle.io/release-name: k8s-triliovault-operator
|
catalog.cattle.io/release-name: k8s-triliovault-operator
|
||||||
apiVersion: v2
|
apiVersion: v2
|
||||||
appVersion: 3.1.1
|
appVersion: 3.1.2
|
||||||
dependencies:
|
dependencies:
|
||||||
- condition: observability.enabled
|
- condition: observability.enabled
|
||||||
name: observability
|
name: observability
|
||||||
|
@ -21,4 +21,4 @@ maintainers:
|
||||||
name: k8s-triliovault-operator
|
name: k8s-triliovault-operator
|
||||||
sources:
|
sources:
|
||||||
- https://github.com/trilioData/k8s-triliovault-operator
|
- https://github.com/trilioData/k8s-triliovault-operator
|
||||||
version: 3.1.1
|
version: 3.1.2
|
||||||
|
|
|
@ -56,4 +56,4 @@ Once all the pods are in running state, you can access the TVK UI from your brow
|
||||||
For more details on how to access the TVK UI, follow this guide: https://docs.trilio.io/kubernetes/management-console-ui/accessing-the-ui
|
For more details on how to access the TVK UI, follow this guide: https://docs.trilio.io/kubernetes/management-console-ui/accessing-the-ui
|
||||||
|
|
||||||
You can start backup and restore of your application using TVK. For more details on how to do that, please follow our
|
You can start backup and restore of your application using TVK. For more details on how to do that, please follow our
|
||||||
getting started guide: https://docs.trilio.io/kubernetes/getting-started-3/getting-started-with-management-console
|
getting started guide: https://docs.trilio.io/kubernetes/advanced-configuration/management-console
|
||||||
|
|
|
@ -4,7 +4,7 @@ operator-webhook-init:
|
||||||
repository: operator-webhook-init
|
repository: operator-webhook-init
|
||||||
k8s-triliovault-operator:
|
k8s-triliovault-operator:
|
||||||
repository: k8s-triliovault-operator
|
repository: k8s-triliovault-operator
|
||||||
tag: "3.1.1"
|
tag: "3.1.2"
|
||||||
# create image pull secrets and specify the name here.
|
# create image pull secrets and specify the name here.
|
||||||
imagePullSecret: ""
|
imagePullSecret: ""
|
||||||
priorityClassName: ""
|
priorityClassName: ""
|
||||||
|
@ -174,8 +174,8 @@ podLabels:
|
||||||
linkerd.io/inject: disabled
|
linkerd.io/inject: disabled
|
||||||
relatedImages:
|
relatedImages:
|
||||||
tags:
|
tags:
|
||||||
tvk: "3.1.1"
|
tvk: "3.1.2"
|
||||||
event: "3.1.1"
|
event: "3.1.2"
|
||||||
control-plane:
|
control-plane:
|
||||||
image: "control-plane"
|
image: "control-plane"
|
||||||
metamover:
|
metamover:
|
||||||
|
|
278
index.yaml
278
index.yaml
|
@ -25046,6 +25046,34 @@ entries:
|
||||||
- assets/jenkins/jenkins-4.2.9.tgz
|
- assets/jenkins/jenkins-4.2.9.tgz
|
||||||
version: 4.2.9
|
version: 4.2.9
|
||||||
k8s-triliovault-operator:
|
k8s-triliovault-operator:
|
||||||
|
- annotations:
|
||||||
|
catalog.cattle.io/certified: partner
|
||||||
|
catalog.cattle.io/display-name: TrilioVault for Kubernetes Operator
|
||||||
|
catalog.cattle.io/kube-version: '>=1.19.0-0'
|
||||||
|
catalog.cattle.io/release-name: k8s-triliovault-operator
|
||||||
|
apiVersion: v2
|
||||||
|
appVersion: 3.1.2
|
||||||
|
created: "2023-09-01T15:03:24.560392195Z"
|
||||||
|
dependencies:
|
||||||
|
- condition: observability.enabled
|
||||||
|
name: observability
|
||||||
|
repository: file://./charts/observability
|
||||||
|
version: ^0.1.0
|
||||||
|
description: K8s-TrilioVault-Operator is an operator designed to manage the K8s-TrilioVault
|
||||||
|
Application Lifecycle.
|
||||||
|
digest: 712d5508b98bcf391b45099ea68fe8823adfbca55e1450586c66778b7bcf9a82
|
||||||
|
home: https://github.com/trilioData/k8s-triliovault-operator
|
||||||
|
icon: https://www.trilio.io/wp-content/uploads/2021/01/Trilio-2020-logo-RGB-gray-green.png
|
||||||
|
kubeVersion: '>=1.19.0-0'
|
||||||
|
maintainers:
|
||||||
|
- email: prafull.ladha@trilio.io
|
||||||
|
name: prafull11
|
||||||
|
name: k8s-triliovault-operator
|
||||||
|
sources:
|
||||||
|
- https://github.com/trilioData/k8s-triliovault-operator
|
||||||
|
urls:
|
||||||
|
- assets/trilio/k8s-triliovault-operator-3.1.2.tgz
|
||||||
|
version: 3.1.2
|
||||||
- annotations:
|
- annotations:
|
||||||
catalog.cattle.io/certified: partner
|
catalog.cattle.io/certified: partner
|
||||||
catalog.cattle.io/display-name: TrilioVault for Kubernetes Operator
|
catalog.cattle.io/display-name: TrilioVault for Kubernetes Operator
|
||||||
|
@ -26683,6 +26711,58 @@ entries:
|
||||||
- assets/kasten/k10-4.5.900.tgz
|
- assets/kasten/k10-4.5.900.tgz
|
||||||
version: 4.5.900
|
version: 4.5.900
|
||||||
kafka:
|
kafka:
|
||||||
|
- annotations:
|
||||||
|
catalog.cattle.io/certified: partner
|
||||||
|
catalog.cattle.io/display-name: Apache Kafka
|
||||||
|
catalog.cattle.io/kube-version: '>=1.19-0'
|
||||||
|
catalog.cattle.io/release-name: kafka
|
||||||
|
category: Infrastructure
|
||||||
|
images: |
|
||||||
|
- name: jmx-exporter
|
||||||
|
image: docker.io/bitnami/jmx-exporter:0.19.0-debian-11-r57
|
||||||
|
- name: kafka-exporter
|
||||||
|
image: docker.io/bitnami/kafka-exporter:1.7.0-debian-11-r93
|
||||||
|
- name: kafka
|
||||||
|
image: docker.io/bitnami/kafka:3.5.1-debian-11-r35
|
||||||
|
- name: kubectl
|
||||||
|
image: docker.io/bitnami/kubectl:1.25.13-debian-11-r5
|
||||||
|
- name: os-shell
|
||||||
|
image: docker.io/bitnami/os-shell:11-debian-11-r51
|
||||||
|
licenses: Apache-2.0
|
||||||
|
apiVersion: v2
|
||||||
|
appVersion: 3.5.1
|
||||||
|
created: "2023-09-01T15:03:16.825486077Z"
|
||||||
|
dependencies:
|
||||||
|
- condition: zookeeper.enabled
|
||||||
|
name: zookeeper
|
||||||
|
repository: file://./charts/zookeeper
|
||||||
|
version: 12.x.x
|
||||||
|
- name: common
|
||||||
|
repository: file://./charts/common
|
||||||
|
tags:
|
||||||
|
- bitnami-common
|
||||||
|
version: 2.x.x
|
||||||
|
description: Apache Kafka is a distributed streaming platform designed to build
|
||||||
|
real-time pipelines and can be used as a message broker or as a replacement
|
||||||
|
for a log aggregation solution for big data applications.
|
||||||
|
digest: b4aa6f0626e742d2165b0fbb347a0f25c6d5116b7dfd46cbb98545be6be3759b
|
||||||
|
home: https://bitnami.com
|
||||||
|
icon: https://svn.apache.org/repos/asf/comdev/project-logos/originals/kafka.svg
|
||||||
|
keywords:
|
||||||
|
- kafka
|
||||||
|
- zookeeper
|
||||||
|
- streaming
|
||||||
|
- producer
|
||||||
|
- consumer
|
||||||
|
maintainers:
|
||||||
|
- name: VMware, Inc.
|
||||||
|
url: https://github.com/bitnami/charts
|
||||||
|
name: kafka
|
||||||
|
sources:
|
||||||
|
- https://github.com/bitnami/charts/tree/main/bitnami/kafka
|
||||||
|
urls:
|
||||||
|
- assets/bitnami/kafka-25.1.5.tgz
|
||||||
|
version: 25.1.5
|
||||||
- annotations:
|
- annotations:
|
||||||
catalog.cattle.io/certified: partner
|
catalog.cattle.io/certified: partner
|
||||||
catalog.cattle.io/display-name: Apache Kafka
|
catalog.cattle.io/display-name: Apache Kafka
|
||||||
|
@ -29165,6 +29245,33 @@ entries:
|
||||||
- assets/elastic/kibana-7.17.3.tgz
|
- assets/elastic/kibana-7.17.3.tgz
|
||||||
version: 7.17.3
|
version: 7.17.3
|
||||||
kong:
|
kong:
|
||||||
|
- annotations:
|
||||||
|
catalog.cattle.io/certified: partner
|
||||||
|
catalog.cattle.io/display-name: Kong Gateway
|
||||||
|
catalog.cattle.io/release-name: kong
|
||||||
|
apiVersion: v2
|
||||||
|
appVersion: "3.3"
|
||||||
|
created: "2023-09-01T15:03:22.032680464Z"
|
||||||
|
dependencies:
|
||||||
|
- condition: postgresql.enabled
|
||||||
|
name: postgresql
|
||||||
|
repository: file://./charts/postgresql
|
||||||
|
version: 11.9.13
|
||||||
|
description: The Cloud-Native Ingress and API-management
|
||||||
|
digest: de6bbed8ac0dfb2bd3d25612417db8e3c4ea24b6fe036e029a992adeecd4959c
|
||||||
|
home: https://konghq.com/
|
||||||
|
icon: https://s3.amazonaws.com/downloads.kong/universe/assets/icon-kong-inc-large.png
|
||||||
|
maintainers:
|
||||||
|
- email: harry@konghq.com
|
||||||
|
name: hbagdi
|
||||||
|
- email: traines@konghq.com
|
||||||
|
name: rainest
|
||||||
|
name: kong
|
||||||
|
sources:
|
||||||
|
- https://github.com/Kong/charts/tree/main/charts/kong
|
||||||
|
urls:
|
||||||
|
- assets/kong/kong-2.26.5.tgz
|
||||||
|
version: 2.26.5
|
||||||
- annotations:
|
- annotations:
|
||||||
catalog.cattle.io/certified: partner
|
catalog.cattle.io/certified: partner
|
||||||
catalog.cattle.io/display-name: Kong Gateway
|
catalog.cattle.io/display-name: Kong Gateway
|
||||||
|
@ -43689,6 +43796,50 @@ entries:
|
||||||
- assets/bitnami/redis-17.3.7.tgz
|
- assets/bitnami/redis-17.3.7.tgz
|
||||||
version: 17.3.7
|
version: 17.3.7
|
||||||
redpanda:
|
redpanda:
|
||||||
|
- annotations:
|
||||||
|
artifacthub.io/images: |
|
||||||
|
- name: redpanda
|
||||||
|
image: docker.redpanda.com/redpandadata/redpanda:v23.2.7
|
||||||
|
- name: busybox
|
||||||
|
image: busybox:latest
|
||||||
|
- name: mintel/docker-alpine-bash-curl-jq
|
||||||
|
image: mintel/docker-alpine-bash-curl-jq:latest
|
||||||
|
artifacthub.io/license: Apache-2.0
|
||||||
|
artifacthub.io/links: |
|
||||||
|
- name: Documentation
|
||||||
|
url: https://docs.redpanda.com
|
||||||
|
- name: "Helm (>= 3.6.0)"
|
||||||
|
url: https://helm.sh/docs/intro/install/
|
||||||
|
catalog.cattle.io/certified: partner
|
||||||
|
catalog.cattle.io/display-name: Redpanda
|
||||||
|
catalog.cattle.io/kube-version: '>=1.21-0'
|
||||||
|
catalog.cattle.io/release-name: redpanda
|
||||||
|
apiVersion: v2
|
||||||
|
appVersion: v23.2.7
|
||||||
|
created: "2023-09-01T15:03:23.741247578Z"
|
||||||
|
dependencies:
|
||||||
|
- condition: console.enabled
|
||||||
|
name: console
|
||||||
|
repository: file://./charts/console
|
||||||
|
version: '>=0.5 <1.0'
|
||||||
|
- condition: connectors.enabled
|
||||||
|
name: connectors
|
||||||
|
repository: file://./charts/connectors
|
||||||
|
version: '>=0.1.2 <1.0'
|
||||||
|
description: Redpanda is the real-time engine for modern apps.
|
||||||
|
digest: 61dcd3ac0abe8dd9ab74e3bd57a84ac317bfd29fe27709b8850f60fa2194ec82
|
||||||
|
icon: https://images.ctfassets.net/paqvtpyf8rwu/3cYHw5UzhXCbKuR24GDFGO/73fb682e6157d11c10d5b2b5da1d5af0/skate-stand-panda.svg
|
||||||
|
kubeVersion: '>=1.21-0'
|
||||||
|
maintainers:
|
||||||
|
- name: redpanda-data
|
||||||
|
url: https://github.com/orgs/redpanda-data/people
|
||||||
|
name: redpanda
|
||||||
|
sources:
|
||||||
|
- https://github.com/redpanda-data/helm-charts
|
||||||
|
type: application
|
||||||
|
urls:
|
||||||
|
- assets/redpanda/redpanda-5.3.0.tgz
|
||||||
|
version: 5.3.0
|
||||||
- annotations:
|
- annotations:
|
||||||
artifacthub.io/images: |
|
artifacthub.io/images: |
|
||||||
- name: redpanda
|
- name: redpanda
|
||||||
|
@ -46455,6 +46606,48 @@ entries:
|
||||||
- assets/redpanda/redpanda-2.1.7.tgz
|
- assets/redpanda/redpanda-2.1.7.tgz
|
||||||
version: 2.1.7
|
version: 2.1.7
|
||||||
s3gw:
|
s3gw:
|
||||||
|
- annotations:
|
||||||
|
app.aquarist-labs.io/name: s3gw
|
||||||
|
artifacthub.io/category: storage
|
||||||
|
artifacthub.io/links: |
|
||||||
|
- name: homepage
|
||||||
|
url: https://s3gw.io/
|
||||||
|
- name: support
|
||||||
|
url: https://github.com/aquarist-labs/s3gw/issues
|
||||||
|
catalog.cattle.io/certified: partner
|
||||||
|
catalog.cattle.io/display-name: S3 Gateway
|
||||||
|
catalog.cattle.io/experimental: "true"
|
||||||
|
catalog.cattle.io/kube-version: '>=1.14'
|
||||||
|
catalog.cattle.io/namespace: s3gw
|
||||||
|
catalog.cattle.io/release-name: s3gw
|
||||||
|
apiVersion: v2
|
||||||
|
appVersion: latest
|
||||||
|
created: "2023-09-01T15:03:14.160391249Z"
|
||||||
|
description: 'Easy-to-use Open Source and Cloud Native S3 service for use on Rancher''s
|
||||||
|
Kubernetes. '
|
||||||
|
digest: a160a0c536d48ee0cd0eb81afc5c374958d3e85b87f40c019f060e2be7f43048
|
||||||
|
home: https://github.com/aquarist-labs/s3gw
|
||||||
|
icon: https://s3gw.io/img/logo-xl.png
|
||||||
|
keywords:
|
||||||
|
- storage
|
||||||
|
- s3
|
||||||
|
kubeVersion: '>=1.14'
|
||||||
|
maintainers:
|
||||||
|
- email: s3gw@suse.com
|
||||||
|
name: s3gw maintainers
|
||||||
|
url: https://github.com/orgs/aquarist-labs/projects/5
|
||||||
|
name: s3gw
|
||||||
|
sources:
|
||||||
|
- https://github.com/aquarist-labs/s3gw-charts
|
||||||
|
- https://github.com/aquarist-labs/s3gw
|
||||||
|
- https://github.com/aquarist-labs/ceph
|
||||||
|
- https://github.com/aquarist-labs/s3gw-ui
|
||||||
|
- https://github.com/aquarist-labs/s3gw-cosi-driver
|
||||||
|
- https://github.com/kubernetes-sigs/container-object-storage-interface-provisioner-sidecar
|
||||||
|
type: application
|
||||||
|
urls:
|
||||||
|
- assets/aquarist-labs/s3gw-0.20.0.tgz
|
||||||
|
version: 0.20.0
|
||||||
- annotations:
|
- annotations:
|
||||||
app.aquarist-labs.io/name: s3gw
|
app.aquarist-labs.io/name: s3gw
|
||||||
artifacthub.io/category: storage
|
artifacthub.io/category: storage
|
||||||
|
@ -48318,6 +48511,37 @@ entries:
|
||||||
- assets/bitnami/spark-6.3.8.tgz
|
- assets/bitnami/spark-6.3.8.tgz
|
||||||
version: 6.3.8
|
version: 6.3.8
|
||||||
speedscale-operator:
|
speedscale-operator:
|
||||||
|
- annotations:
|
||||||
|
catalog.cattle.io/certified: partner
|
||||||
|
catalog.cattle.io/display-name: Speedscale Operator
|
||||||
|
catalog.cattle.io/kube-version: '>= 1.17.0-0'
|
||||||
|
catalog.cattle.io/release-name: speedscale-operator
|
||||||
|
apiVersion: v1
|
||||||
|
appVersion: 1.3.335
|
||||||
|
created: "2023-09-01T15:03:23.838581351Z"
|
||||||
|
description: Stress test your APIs with real world scenarios. Collect and replay
|
||||||
|
traffic without scripting.
|
||||||
|
digest: e8b2a8598ca6040fc58ce49429404a9b1c449f3f04cf14a0464f0d002fd06d02
|
||||||
|
home: https://speedscale.com
|
||||||
|
icon: https://raw.githubusercontent.com/speedscale/assets/main/logo/gold_logo_only.png
|
||||||
|
keywords:
|
||||||
|
- speedscale
|
||||||
|
- test
|
||||||
|
- testing
|
||||||
|
- regression
|
||||||
|
- reliability
|
||||||
|
- load
|
||||||
|
- replay
|
||||||
|
- network
|
||||||
|
- traffic
|
||||||
|
kubeVersion: '>= 1.17.0-0'
|
||||||
|
maintainers:
|
||||||
|
- email: support@speedscale.com
|
||||||
|
name: Speedscale Support
|
||||||
|
name: speedscale-operator
|
||||||
|
urls:
|
||||||
|
- assets/speedscale/speedscale-operator-1.3.29.tgz
|
||||||
|
version: 1.3.29
|
||||||
- annotations:
|
- annotations:
|
||||||
catalog.cattle.io/certified: partner
|
catalog.cattle.io/certified: partner
|
||||||
catalog.cattle.io/display-name: Speedscale Operator
|
catalog.cattle.io/display-name: Speedscale Operator
|
||||||
|
@ -54753,6 +54977,60 @@ entries:
|
||||||
- assets/hashicorp/vault-0.22.0.tgz
|
- assets/hashicorp/vault-0.22.0.tgz
|
||||||
version: 0.22.0
|
version: 0.22.0
|
||||||
wordpress:
|
wordpress:
|
||||||
|
- annotations:
|
||||||
|
catalog.cattle.io/certified: partner
|
||||||
|
catalog.cattle.io/display-name: WordPress
|
||||||
|
catalog.cattle.io/kube-version: '>=1.19-0'
|
||||||
|
catalog.cattle.io/release-name: wordpress
|
||||||
|
category: CMS
|
||||||
|
images: |
|
||||||
|
- name: apache-exporter
|
||||||
|
image: docker.io/bitnami/apache-exporter:1.0.1-debian-11-r32
|
||||||
|
- name: os-shell
|
||||||
|
image: docker.io/bitnami/os-shell:11-debian-11-r54
|
||||||
|
- name: wordpress
|
||||||
|
image: docker.io/bitnami/wordpress:6.3.1-debian-11-r2
|
||||||
|
licenses: Apache-2.0
|
||||||
|
apiVersion: v2
|
||||||
|
appVersion: 6.3.1
|
||||||
|
created: "2023-09-01T15:03:18.6233484Z"
|
||||||
|
dependencies:
|
||||||
|
- condition: memcached.enabled
|
||||||
|
name: memcached
|
||||||
|
repository: file://./charts/memcached
|
||||||
|
version: 6.x.x
|
||||||
|
- condition: mariadb.enabled
|
||||||
|
name: mariadb
|
||||||
|
repository: file://./charts/mariadb
|
||||||
|
version: 13.x.x
|
||||||
|
- name: common
|
||||||
|
repository: file://./charts/common
|
||||||
|
tags:
|
||||||
|
- bitnami-common
|
||||||
|
version: 2.x.x
|
||||||
|
description: WordPress is the world's most popular blogging and content management
|
||||||
|
platform. Powerful yet simple, everyone from students to global corporations
|
||||||
|
use it to build beautiful, functional websites.
|
||||||
|
digest: 67809561f34f3fa58fd45d6c0bb791d6c3a92bc590ee1d9c7c6e84ab6fa53731
|
||||||
|
home: https://bitnami.com
|
||||||
|
icon: https://s.w.org/style/images/about/WordPress-logotype-simplified.png
|
||||||
|
keywords:
|
||||||
|
- application
|
||||||
|
- blog
|
||||||
|
- cms
|
||||||
|
- http
|
||||||
|
- php
|
||||||
|
- web
|
||||||
|
- wordpress
|
||||||
|
maintainers:
|
||||||
|
- name: VMware, Inc.
|
||||||
|
url: https://github.com/bitnami/charts
|
||||||
|
name: wordpress
|
||||||
|
sources:
|
||||||
|
- https://github.com/bitnami/charts/tree/main/bitnami/wordpress
|
||||||
|
urls:
|
||||||
|
- assets/bitnami/wordpress-17.1.6.tgz
|
||||||
|
version: 17.1.6
|
||||||
- annotations:
|
- annotations:
|
||||||
catalog.cattle.io/certified: partner
|
catalog.cattle.io/certified: partner
|
||||||
catalog.cattle.io/display-name: WordPress
|
catalog.cattle.io/display-name: WordPress
|
||||||
|
|
Loading…
Reference in New Issue