diff --git a/helm/dbrepo/README.md b/helm/dbrepo/README.md index 36f522551ea77839f686efe378b4bb77b0c11cf6..2fd53053375841cfb6bd4934aa6630ed4ce279df 100644 --- a/helm/dbrepo/README.md +++ b/helm/dbrepo/README.md @@ -94,11 +94,9 @@ The command removes all the Kubernetes components associated with the chart and | `authservice.enabled` | Enable the Auth Service. | `true` | | `authservice.image.debug` | Set the logging level to `trace`. Otherwise, set to `info`. | `false` | | `authservice.endpoint` | The hostname for the microservices. | `http://auth-service` | -| `authservice.production` | Start Keycloak with production profile. | `true` | +| `authservice.extraStartupArgs` | Extra arguments for the Keycloak container. | `--hostname-strict false --proxy-headers xforwarded` | | `authservice.resourcesPreset` | The container resource presets | `small` | | `authservice.jwt.pubkey` | The JWT public key from the `dbrepo-client`. | `MIIBIjANBgkqhkiG9w0BAQEFAAOCAQ8AMIIBCgKCAQEAqqnHQ2BWWW9vDNLRCcxD++xZg/16oqMo/c1l+lcFEjjAIJjJp/HqrPYU/U9GvquGE6PbVFtTzW1KcKawOW+FJNOA3CGo8Q1TFEfz43B8rZpKsFbJKvQGVv1Z4HaKPvLUm7iMm8Hv91cLduuoWx6Q3DPe2vg13GKKEZe7UFghF+0T9u8EKzA/XqQ0OiICmsmYPbwvf9N3bCKsB/Y10EYmZRb8IhCoV9mmO5TxgWgiuNeCTtNCv2ePYqL/U0WvyGFW0reasIK8eg3KrAUj8DpyOgPOVBn3lBGf+3KFSYi+0bwZbJZWqbC/Xlk20Go1YfeJPRIt7ImxD27R/lNjgDO/MwIDAQAB` | -| `authservice.tls.enabled` | Enable TLS/SSL communication. Required for HTTPS. | `true` | -| `authservice.tls.existingSecret` | The secret containing the `tls.crt`, `tls.key` and `ca.crt`. | `auth-service-secret` | | `authservice.client.id` | The client id for the microservices. | `dbrepo-client` | | `authservice.client.secret` | The client secret for the microservices. | `MUwRc7yfXSJwX8AdRMWaQC3Nep1VjwgG` | | `authservice.setupJob.resourcesPreset` | The container resource preset | `nano` | @@ -382,34 +380,35 @@ mqtt.prefetch = 10 ### Dashboard Service -| Name | Description | Value | -| -------------------------------------------------------------------- | ----------------------------------------------------------------------------------------------------------------- | ---------------- | -| `dashboardservice.enabled` | Enable the Dashboard Service. | `true` | -| `dashboardservice.podSecurityContext.enabled` | Enable pods' Security Context | `true` | -| `dashboardservice.podSecurityContext.fsGroupChangePolicy` | Set filesystem group change policy | `Always` | -| `dashboardservice.podSecurityContext.sysctls` | Set kernel settings using the sysctl interface | `[]` | -| `dashboardservice.podSecurityContext.supplementalGroups` | Set filesystem extra groups | `[]` | -| `dashboardservice.podSecurityContext.fsGroup` | Set RabbitMQ pod's Security Context fsGroup | `0` | -| `dashboardservice.containerSecurityContext.enabled` | Enable containers' Security Context | `true` | -| `dashboardservice.containerSecurityContext.seLinuxOptions` | Set SELinux options in container | `{}` | -| `dashboardservice.containerSecurityContext.runAsUser` | Set RabbitMQ containers' Security Context runAsUser | `1001` | -| `dashboardservice.containerSecurityContext.runAsGroup` | Set RabbitMQ containers' Security Context runAsGroup | `1001` | -| `dashboardservice.containerSecurityContext.runAsNonRoot` | Set RabbitMQ container's Security Context runAsNonRoot | `true` | -| `dashboardservice.containerSecurityContext.allowPrivilegeEscalation` | Set container's privilege escalation | `false` | -| `dashboardservice.containerSecurityContext.readOnlyRootFilesystem` | Set container's Security Context readOnlyRootFilesystem | `false` | -| `dashboardservice.containerSecurityContext.capabilities.drop` | Set container's Security Context runAsNonRoot | `["ALL"]` | -| `dashboardservice.containerSecurityContext.seccompProfile.type` | Set container's Security Context seccomp profile | `RuntimeDefault` | -| `dashboardservice.resourcesPreset` | The container resource preset | `micro` | -| `dashboardservice.resources` | Set container requests and limits for different resources like CPU or memory (essential for production workloads) | `{}` | -| `dashboardservice.replicaCount` | The number of replicas. | `2` | -| `dashboardservice.init.resourcesPreset` | The container resource preset | `nano` | -| `dashboardservice.init.resources` | Set container requests and limits for different resources like CPU or memory (essential for production workloads) | `{}` | -| `dashboardservice.replicaCount` | The number of replicas. | `2` | +| Name | Description | Value | +| -------------------------------------------------------------------- | ----------------------------------------------------------------------------------------------------------------- | -------------------------- | +| `dashboardservice.enabled` | Enable the Dashboard Service. | `true` | +| `dashboardservice.endpoint` | The endpoint for the microservices. | `http://dashboard-service` | +| `dashboardservice.podSecurityContext.enabled` | Enable pods' Security Context | `true` | +| `dashboardservice.podSecurityContext.fsGroupChangePolicy` | Set filesystem group change policy | `Always` | +| `dashboardservice.podSecurityContext.sysctls` | Set kernel settings using the sysctl interface | `[]` | +| `dashboardservice.podSecurityContext.supplementalGroups` | Set filesystem extra groups | `[]` | +| `dashboardservice.podSecurityContext.fsGroup` | Set RabbitMQ pod's Security Context fsGroup | `0` | +| `dashboardservice.containerSecurityContext.enabled` | Enable containers' Security Context | `true` | +| `dashboardservice.containerSecurityContext.seLinuxOptions` | Set SELinux options in container | `{}` | +| `dashboardservice.containerSecurityContext.runAsUser` | Set RabbitMQ containers' Security Context runAsUser | `1001` | +| `dashboardservice.containerSecurityContext.runAsGroup` | Set RabbitMQ containers' Security Context runAsGroup | `1001` | +| `dashboardservice.containerSecurityContext.runAsNonRoot` | Set RabbitMQ container's Security Context runAsNonRoot | `true` | +| `dashboardservice.containerSecurityContext.allowPrivilegeEscalation` | Set container's privilege escalation | `false` | +| `dashboardservice.containerSecurityContext.readOnlyRootFilesystem` | Set container's Security Context readOnlyRootFilesystem | `false` | +| `dashboardservice.containerSecurityContext.capabilities.drop` | Set container's Security Context runAsNonRoot | `["ALL"]` | +| `dashboardservice.containerSecurityContext.seccompProfile.type` | Set container's Security Context seccomp profile | `RuntimeDefault` | +| `dashboardservice.resourcesPreset` | The container resource preset | `micro` | +| `dashboardservice.resources` | Set container requests and limits for different resources like CPU or memory (essential for production workloads) | `{}` | +| `dashboardservice.replicaCount` | The number of replicas. | `2` | +| `dashboardservice.init.resourcesPreset` | The container resource preset | `nano` | +| `dashboardservice.init.resources` | Set container requests and limits for different resources like CPU or memory (essential for production workloads) | `{}` | +| `dashboardservice.replicaCount` | The number of replicas. | `2` | ### Dashboard UI | Name | Description | Value | -| ---------------------------------------- | ---------------------------------------------------------------------------------------------------------------------- |-----------------------| +| ---------------------------------------- | ---------------------------------------------------------------------------------------------------------------------- | --------------------- | | `dashboardui.enabled` | Enable the Dashboard UI. | `true` | | `dashboardui.metrics.enabled` | Enable the metrics sidecar. | `true` | | `dashboardui.endpoint` | The endpoint for the microservices. | `http://dashboard-ui` | diff --git a/helm/dbrepo/charts/seaweedfs-4.2.1.tgz b/helm/dbrepo/charts/seaweedfs-4.2.1.tgz index ca2effba9822297a3a08fa86851edf02e827afee..7f69402d276c85098aaaa89cdbdc47047c6a58aa 100644 Binary files a/helm/dbrepo/charts/seaweedfs-4.2.1.tgz and b/helm/dbrepo/charts/seaweedfs-4.2.1.tgz differ diff --git a/helm/dbrepo/values.schema.json b/helm/dbrepo/values.schema.json index aed6547c451cf57ff8323ca48383fc906829f689..dcb506dba44127137a146ce53222abed01054db1 100644 --- a/helm/dbrepo/values.schema.json +++ b/helm/dbrepo/values.schema.json @@ -129,6 +129,9 @@ "extraEnvVarsCM": { "type": "string" }, + "extraStartupArgs": { + "type": "string" + }, "extraVolumeMounts": { "items": { "properties": { @@ -227,9 +230,6 @@ }, "type": "object" }, - "production": { - "type": "boolean" - }, "replicaCount": { "type": "integer" }, @@ -255,20 +255,6 @@ } }, "type": "object" - }, - "tls": { - "properties": { - "enabled": { - "type": "boolean" - }, - "existingSecret": { - "type": "string" - }, - "usePem": { - "type": "boolean" - } - }, - "type": "object" } }, "type": "object" @@ -507,6 +493,9 @@ "enabled": { "type": "boolean" }, + "endpoint": { + "type": "string" + }, "image": { "properties": { "name": { @@ -632,6 +621,19 @@ } }, "type": "object" + }, + "service": { + "properties": { + "ports": { + "properties": { + "grafana": { + "type": "integer" + } + }, + "type": "object" + } + }, + "type": "object" } }, "type": "object" diff --git a/helm/dbrepo/values.yaml b/helm/dbrepo/values.yaml index 5d46570ed672f9bad84d757f367b855cfc79bdf4..56ac85d0be9f0ef60d0de523b121b8b58410773e 100644 --- a/helm/dbrepo/values.yaml +++ b/helm/dbrepo/values.yaml @@ -85,6 +85,7 @@ authservice: debug: false ## @param authservice.endpoint The hostname for the microservices. endpoint: http://auth-service + ## @param authservice.extraStartupArgs Extra arguments for the Keycloak container. extraStartupArgs: --hostname-strict false --proxy-headers xforwarded ## @skip authservice.postgresql postgresql: @@ -986,6 +987,7 @@ dashboardui: extraEnvVarsSecret: dashboard-ui-secret service: ports: + ## @skip dashboardui.service.ports.grafana grafana: 80 datasources: ## @skip dashboardui.datasources.secretName