Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

chore: upgrade gretimedb chart version to 0.1.1-alpha.14 #64

Merged
merged 9 commits into from
Oct 11, 2023
2 changes: 1 addition & 1 deletion charts/greptimedb/Chart.yaml
Original file line number Diff line number Diff line change
Expand Up @@ -2,5 +2,5 @@ apiVersion: v2
name: greptimedb
description: A Helm chart for deploying GreptimeDB cluster in Kubernetes
type: application
version: 0.1.1-alpha.13
version: 0.1.1-alpha.14
appVersion: 0.3.2
4 changes: 2 additions & 2 deletions charts/greptimedb/templates/cluster.yaml
Original file line number Diff line number Diff line change
Expand Up @@ -46,7 +46,7 @@ spec:
storageClassName: {{ .Values.datanode.storage.storageClassName }}
storageSize: {{ .Values.datanode.storage.storageSize }}
storageRetainPolicy: {{ .Values.datanode.storage.storageRetainPolicy }}
{{- if (and .Values.prometheusMonitor .Values.prometheusMonitor.enabled )}}
{{- if (and .Values.prometheusMonitor (eq .Values.prometheusMonitor.enabled true ))}}
prometheusMonitor: {{- toYaml .Values.prometheusMonitor | nindent 4 }}
{{- end }}
httpServicePort: {{ .Values.httpServicePort }}
Expand All @@ -62,7 +62,7 @@ spec:
bucket: {{ .Values.storage.s3.bucket }}
region: {{ .Values.storage.s3.region }}
root: {{ .Values.storage.s3.root }}
secretName: {{ .Values.storage.s3.credentials.secretName }}
secretName: {{ .Values.storage.s3.secretName }}
endpoint: {{ .Values.storage.s3.endpoint }}
{{- else if .Values.storage.local }}
local:
Expand Down
20 changes: 20 additions & 0 deletions charts/greptimedb/templates/credentials-sealed-secret.yaml
Original file line number Diff line number Diff line change
@@ -0,0 +1,20 @@
{{- if .Values.storage.credentials }}
{{- if .Values.storage.credentials.secretCreation }}
{{- if and (eq .Values.storage.credentials.secretCreation.enabled true) (eq .Values.storage.credentials.secretCreation.enableEncryption true) }}
apiVersion: bitnami.com/v1alpha1
kind: SealedSecret
metadata:
name: {{ .Values.storage.credentials.secretName }}
namespace: {{ .Release.Namespace }}
spec:
encryptedData:
{{- range $key, $value := .Values.storage.credentials.secretCreation.data }}
{{ $key }}: {{ $value | quote }}
{{- end }}
template:
metadata:
name: {{ .Values.storage.credentials.secretName }}
namespace: {{ .Release.Namespace }}
{{- end }}
{{- end }}
{{- end }}
16 changes: 16 additions & 0 deletions charts/greptimedb/templates/credentials-secret.yaml
Original file line number Diff line number Diff line change
@@ -0,0 +1,16 @@
{{- if .Values.storage.credentials }}
{{- if .Values.storage.credentials.secretCreation }}
{{- if and (eq .Values.storage.credentials.secretCreation.enabled true) (eq .Values.storage.credentials.secretCreation.enableEncryption false) }}
apiVersion: v1
metadata:
name: {{ .Values.storage.credentials.secretName }}
namespace: {{ .Release.Namespace }}
kind: Secret
type: Opaque
data:
{{- range $key, $value := .Values.storage.credentials.secretCreation.data }}
{{ $key }}: {{ $value | b64enc | quote }}
{{- end }}
{{- end }}
{{- end }}
{{- end }}
20 changes: 0 additions & 20 deletions charts/greptimedb/templates/s3-credentials-sealed-secret.yaml

This file was deleted.

16 changes: 0 additions & 16 deletions charts/greptimedb/templates/s3-credentials-secret.yaml

This file was deleted.

48 changes: 32 additions & 16 deletions charts/greptimedb/values.yaml
Original file line number Diff line number Diff line change
Expand Up @@ -43,10 +43,13 @@ datanode:
storageSize: 10Gi
storageRetainPolicy: Retain

# # The wal directory of the storage, default is "/tmp/greptimedb/wal".
# walDir: "/tmp/greptimedb/wal"

initializer:
registry: docker.io
repository: greptime/greptimedb-initializer
tag: 0.1.0-alpha.14
tag: 0.1.0-alpha.16

# The etcdEndpoints need be modified to the actual etcd cluster.
etcdEndpoints: "etcd.default.svc.cluster.local:2379"
Expand All @@ -68,29 +71,42 @@ prometheusMonitor: {}
# release: prometheus

storage:
# credentials:
# secretName: "credentials"
# secretCreation:
# # Create the raw secret.
# enabled: true
# # Create the sealed secret.
# # If enableEncryption is true, the credentials should be encrypted.
# enableEncryption: false
#
# # If the enableEncryption is true, the data should be set as encrypted data.
# data:
# access-key-id: "you-should-set-the-access-key-id-here"
# secret-access-key: "you-should-set-the-secret-access-key-here"

# configure to use local storage.
local: {}
# directory: /tmp/greptimedb

# configure to use s3 storage.
s3: {}
# bucket: "mycluster"
# bucket: "bucket-name"
# region: "us-west-2"
#

# # The root directory of the cluster.
# # The data directory in S3 will be: 's3://<bucket>/<root>/data/...'.
# root: "mycluster"
# endpoint: "s3.us-west-2.amazonaws.com"
# credentials:
# secretName: "s3-credentials"
# secretCreation:
# # Create the raw secret.
# enabled: true
# # Create the sealed secret.
# # If enableEncryption is true, the credentials should be encrypted.
# enableEncryption: false
#
# # If the enableEncryption is true, the data should be set as encrypted data.
# data:
# access-key-id: "you-should-set-the-access-key-id-here"
# secret-access-key: "you-should-set-the-secret-access-key-here"
# secretName: "credentials"

# configure to use oss storage.
oss: {}
# bucket: "bucket-name"
# region: "cn-hangzhou"

# # The root directory of the cluster.
# # The data directory in OSS will be: 'oss://<bucket>/<root>/data/...'.
# root: "mycluster"
# endpoint: "oss-cn-hangzhou.aliyuncs.com"
# secretName: "credentials"
Loading