repo_id
stringclasses
137 values
file_path
stringlengths
10
89
content
stringlengths
0
990k
__index_level_0__
int64
0
0
mono
/mono/.editorconfig
root = true [*] max_line_length = 120 trim_trailing_whitespace = true insert_final_newline = true indent_style = space indent_size = 2
0
mono
/mono/init.sh
#!/usr/bin/env bash echo -e "__________________ _____ ______ _____ _ _______ " echo -e "| ___| _ \ ___ \ | __ \| ___ \ _ | | | | ___ \ " echo -e "| |_ | | | | |_/ / | | \/| |_/ / | | | | | | |_/ / " echo -e "| _| | | | | / | | __ | /| | | | | | | __/ " echo -e "| | | |/ /| |\ \ | |_\ \| |\...
0
mono
/mono/Tiltfile.test
# Tiltfile update_settings(max_parallel_updates=8, k8s_upsert_timeout_secs=120) load('ext://min_tilt_version', 'min_tilt_version') load('ext://min_k8s_version', 'min_k8s_version') load('ext://helm_remote', 'helm_remote') load('ext://helm_resource', 'helm_resource', 'helm_repo') load('scripts/tilt/port_forward.py', 'fdr...
0
mono
/mono/Tiltfile
# Tiltfile update_settings(max_parallel_updates=8, k8s_upsert_timeout_secs=120) load('ext://min_tilt_version', 'min_tilt_version') load('ext://min_k8s_version', 'min_k8s_version') load('ext://helm_remote', 'helm_remote') load('ext://helm_resource', 'helm_resource', 'helm_repo') load('scripts/tilt/port_forward.py', 'fdr...
0
mono
/mono/Cargo.toml
[workspace] members = [ "crates/*", ] resolver = "2" [workspace.package] version = "0.1.0" edition = "2021" [workspace.dependencies] anyhow = "1.0.75" arc-swap = "1.6.0" async-channel = "2.2.1" async-trait = "0.1.74" axum = "0.7.4" axum-tracing-opentelemetry = "0.18.0" base64 = "0.22.0" chrono = "0.4.0" clap = {...
0
mono
/mono/.envrc
#!/usr/bin/env bash GIT_ROOT="$(git rev-parse --show-toplevel)" # AWS export AWS_PROFILE=fdr-dev # default, but can be overridden export AWS_CONFIG_FILE="${GIT_ROOT}/.aws" # Python export PYTHONWARNINGS=ignore # Kubernetes export KUBECONFIG="$HOME/.kube/config:${GIT_ROOT}/kubeconfig.yaml" # Support overriding valu...
0
mono
/mono/.gitlab-ci.yml
include: # todo: this file depends on arm builders which we no longer have # - local: "/.gitlab/.gitlab-makedeb-ci.yml" # - local: "/.gitlab/.gitlab-general-ci.yml" - local: "/.gitlab/.gitlab-rust-ci.yml" - local: "/.gitlab/.gitlab-docker-ci.yml" - local: "/.gitlab/.gitlab-terraform-ci.yml" - local: "/....
0
mono
/mono/.gitignore
.DS_Store # Editor files .idea # Local config **/.cargo_docker_cache **/.secrets **/sym-secrets # Local environment .env .envrc.local # Rust **/target **/config-local.toml # Terraform .terraform *.tfstate *.tfstate.backup docs/mermaid.min.js docs/mermaid-init.js opportunities.csv success.csv trades.csv services...
0
mono
/mono/Cargo.lock
# This file is automatically @generated by Cargo. # It is not intended for manual editing. version = 3 [[package]] name = "addr2line" version = "0.21.0" source = "registry+https://github.com/rust-lang/crates.io-index" checksum = "8a30b2e23b9e17a9f90641c7ab1549cd9b44f296d3ccbf309d2863cfe398a0cb" dependencies = [ "giml...
0
mono
/mono/kubeconfig.yaml
apiVersion: v1 kind: Config preferences: { } contexts: - name: fdr-dev context: cluster: fdr-dev user: aws-developer namespace: default - name: fdr-dev-admin context: cluster: fdr-dev user: aws-admin namespace: default clusters: - name: fdr-dev cluster: cer...
0
mono
/mono/Makefile
.PHONY: up down secrets env sqlx-check migrations rust-builder helm-update ROOT_DIR:=$(shell dirname $(realpath $(firstword $(MAKEFILE_LIST)))) # ---------------------------------------- # Bring Localstack Up # ---------------------------------------- up: tilt up # ---------------------------------------- # Bring...
0
mono
/mono/rustfmt.toml
# Maximum width of each line. # Default: 100 max_width = 120
0
mono
/mono/.dockerignore
**/node_modules .env ./target/debug ./target/sqlx-tmp
0
mono
/mono/.aws
# TODO: Update to use a DevOps role once it is created [profile state] sso_start_url = https://fdrgroup.awsapps.com/start sso_region = us-east-1 sso_account_id = 806085365067 sso_role_name = AdministratorAccess region = us-east-2 output = json [profile fdr-dev] sso_start_url = https://fdrgroup.awsapps.com/start sso_re...
0
mono
/mono/README.md
# Monorepo --- The FDR monorepo contains a set of modules and services that work together to execute trading strategies. ## Getting started ### Prerequisites - [Docker](https://docs.docker.com/get-docker/) - [Tilt](https://docs.tilt.dev/install.html) - [Kubectl](https://kubernetes.io/docs/tasks/tools/install-kubec...
0
.gitlab
/mono/.gitlab/.gitlab-docker-ci.yml
############################################################################### # BUILDER PIPELINE DEFINITION ############################################################################### .ci-image-rules: &ci-image-rules rules: - if: !reference [ .is, scheduled ] when: never ...
0
.gitlab
/mono/.gitlab/.gitlab-change-rules-ci.yml
############################################################################### # DEFINE CHANGES AND RULES FOR CI PIPELINES ############################################################################### .is: default-branch: $CI_COMMIT_BRANCH == $CI_DEFAULT_BRANCH merge-request: $CI_PIPELINE_SOURCE == "...
0
.gitlab
/mono/.gitlab/.gitlab-general-ci.yml
stages: - check check::aws: stage: check image: docker script: - echo $ECR_REGISTRY_ADD - printenv | grep AWS_ > aws.env - docker login -p $CI_REGISTRY_PASSWORD -u $CI_REGISTRY_USER registry.gitlab.com - docker run --rm --env-file ./aws.env amazon/aws-cli ecr get-login-password
0
.gitlab
/mono/.gitlab/.gitlab-makedeb-ci.yml
stages: build .only-makedeb: &only-makedeb rules: - changes: paths: - "infra/debpkgs/**/*" makedeb::build: image: registry.gitlab.com/fdr-group/mono/ci/makedeb stage: build tags: - aarch64 <<: *only-makedeb needs: [ ] parallel: matrix: - PKGDIR: - infra/de...
0
.gitlab
/mono/.gitlab/.gitlab-rust-ci.yml
############################################################################### # RUST PIPELINE DEFINITION ############################################################################### # jobs that use this anchor will always run on main / tag pipelines but will only run on merge request pipe...
0
.gitlab
/mono/.gitlab/.gitlab-terraform-ci.yml
############################################################################### # INFRA PIPELINE DEFINITION ############################################################################### # jobs that use this anchor will always run on main / tag pipelines but will only run on merge request pip...
0
.secrets
/mono/.secrets/postgresql_username
trading
0
.secrets
/mono/.secrets/postgresql_test_password
trading-test
0
.secrets
/mono/.secrets/postgresql_test_username
trading-test
0
.secrets
/mono/.secrets/kraken_api_secret
fillinfromkrakenaccount
0
.secrets
/mono/.secrets/kraken_api_key
fillinfromkrakenaccount
0
.secrets
/mono/.secrets/poloniex_api_key
fillinfrompoloaccount
0
.secrets
/mono/.secrets/poloniex_api_secret
fillinfrompoloaccount
0
.secrets
/mono/.secrets/.gitkeep
0
.secrets
/mono/.secrets/postgresql_password
trading
0
database
/mono/test/database/strat_runs.sql
INSERT INTO public.strat_runs (id, strat_id, name, meta) VALUES ('90d99ddf-ba11-480e-9a31-792670745053', '80e28dec-ba11-481f-1c32-792570742054', 'Market Maker DOTUSD', null); INSERT INTO public.strat_runs (id, strat_id, name, meta) VALUES ('80d99ddf-ba11-480e-9a31-792670745053', '80e28dec-ba11-481f-1c32-792570742054', ...
0
database
/mono/test/database/strategies.sql
INSERT INTO public.strategies (id, name) VALUES ('80e28dec-ba11-481f-1c32-792570742054', 'MARKET_MAKER_ON_TICKER'); INSERT INTO public.strategies (id, name) VALUES ('5c6897f9-258f-4ae0-a044-ecd1db996493', 'TRIANGULAR_ARBITRAGE');
0
database
/mono/test/database/import.sh
#!/bin/bash # Define variables POSTGRES_USER="trading-test" POSTGRES_PASSWORD="trading-test" DATABASE_NAME="trading-test" BALANCE_ACCOUNTS="test/database/balance_accounts.sql" STRAT_BALANCE_ACCOUNTS="test/database/strat_balance_accounts.sql" STRAT_RUNS="test/database/strat_runs.sql" VIRTUAL_BALANCE_ACCOUNTS="test/data...
0
database
/mono/test/database/virtual_balance_accounts.sql
INSERT INTO public.virtual_balance_accounts (id, account_id, account_status, asset, amount, available, created_at) VALUES ('40e22dec-ba11-481f-1c32-982570742054', '23e28dec-ba11-481f-1c32-792570742054', 'ACTIVE', 'DOT', 0, 0, '2024-03-27 15:52:59.196000 +00:00'); INSERT INTO public.virtual_balance_accounts (id,...
0
database
/mono/test/database/strat_balance_accounts.sql
INSERT INTO public.strat_balance_accounts (strat_run_id, vba_id) VALUES ('90d99ddf-ba11-480e-9a31-792670745053', '40e22dec-ba11-481f-1c32-982570742054'); INSERT INTO public.strat_balance_accounts (strat_run_id, vba_id) VALUES ('90d99ddf-ba11-480e-9a31-792670745053', '50e32cec-ba11-481f-1c32-232570742054'); INSERT INTO ...
0
database
/mono/test/database/balance_accounts.sql
INSERT INTO public.balance_accounts (id, asset, amount) VALUES ('23e28dec-ba11-481f-1c32-792570742054', 'DOT', 0); INSERT INTO public.balance_accounts (id, asset, amount) VALUES ('12e28dec-ba11-481f-1c32-322570742054', 'USD', 0); INSERT INTO public.balance_accounts (id, asset, amount) VALUES ('23e28dec-ba11-481f-1c32-3...
0
.cargo
/mono/.cargo/audit.toml
[advisories] ignore = [ "RUSTSEC-2021-0145", # `rsa` no update path "RUSTSEC-2023-0071", # `rsa` no update path ] [output] quiet = false deny = ["warnings"]
0
.cargo
/mono/.cargo/config
[alias] ci-check = "check --all --all-targets --all-features" ci-clippy = "clippy --all --all-targets --all-features -- -Dwarnings -Drust-2018-idioms" ci-format = "fmt --all -- --config imports_granularity=crate --check" [build] rustflags = ["--cfg", "tokio_unstable"] rustdocflags = ["--cfg", "tokio_unstable"] # In c...
0
infra
/mono/infra/.gitignore
# Local files used to track Makefile changes .sync/ !.sync/READMD.md # Ignore backup config files *.backup.yaml # Secrets secrets/ !secrets/README.md
0
infra
/mono/infra/Makefile
.PHONY: clean docs sync clean: find .sync/* ! -name README.md -exec rm {} \; docs: find modules/ -name main.tf -printf '%h\n' | xargs -I {} sh -c "docker run --rm --volume \"${PWD}/{}:/terraform-docs\" quay.io/terraform-docs/terraform-docs:0.16.0 markdown /terraform-docs > {}/README.md" ##########################...
0
infra
/mono/infra/docker-compose.yaml
version: "3.9" services: strat-market-makers: profiles: ["dev"] image: registry.gitlab.com/fdr-group/mono/rs/market-makers:aarch64-346737ea labels: "com.fdr.logging": promtail environment: - RUST_LOG=info container_name: market-makers volumes: - type: bind source: ${...
0
infra
/mono/infra/README.md
# Infrastructure This directory contains the configuration for the infrastructure and operational workloads that support the FDR system. This include the provisioning of servers and networks, database configrations, and general tuning. ## Structure ``` infra/ ├── envs │ └── Different infrastructure environments...
0
infra
/mono/infra/docker-compose.ops.yaml
version: "3.9" secrets: grafana_cloud_prometheus_api_key: file: ./secrets/grafana_cloud_prometheus_api_key grafana_cloud_loki_api_key: file: ./secrets/grafana_cloud_loki_api_key volumes: # TODO: Create a mounted volume to store Prom data or move Prom to a managed DB postgres_data: {} services: post...
0
.sync
/mono/infra/.sync/README.md
This directory contains temporary files to be used by make to track make targets and determine the last time a file was synced. Make doesn't actually look at the contents of the file and only checks the last updated time.
0
debpkgs
/mono/infra/debpkgs/README.md
# Deb Pkgs This directory is used to manage and build custom Debian packages for tools that either don't distribute Debian installers or that we would like to customize the installation of. This directory user `makedeb` to build Debian package. Makedeb is based on Arch's makepkg and uses the same PKGBUILD - https:/...
0
node_exporter
/mono/infra/debpkgs/node_exporter/PKGBUILD
# This PKGBUILD is used to build a deb for node_exporter. Based on # https://aur.archlinux.org/cgit/aur.git/tree/PKGBUILD?h=prometheus-node-exporter-bin # Maintainer: Dawson <dawson@3304813.com> pkgname=node_exporter pkgver=1.5.0 pkgrel=1 pkgdesc='Exporter for machine metrics' arch=('amd64' 'arm64') depends=() provide...
0
node_exporter
/mono/infra/debpkgs/node_exporter/node-exporter.service
[Unit] Description=Exporter for machine metrics After=network.target [Service] User=node_exporter Group=node_exporter ExecStart=/usr/bin/node_exporter [Install] WantedBy=multi-user.target
0
ci-user
/mono/infra/modules/ci-user/main.tf
variable "ecr_repository_arns" { type = list(string) description = "The ARN of the ECR repository images will be pushed to." } # TODO: Apply a permission boundary that limits this user to only be used as a service account resource "aws_iam_user" "ci" { name = "ci-user" path = "/fdr/" # Ignore tag ch...
0
ci-user
/mono/infra/modules/ci-user/README.md
## Requirements No requirements. ## Providers | Name | Version | |------|---------| | <a name="provider_aws"></a> [aws](#provider\_aws) | n/a | ## Modules No modules. ## Resources | Name | Type | |------|------| | [aws_iam_user.ci](https://registry.terraform.io/providers/hashicorp/aws/latest/docs/resources/iam_u...
0
vpc
/mono/infra/modules/vpc/main.tf
terraform { required_version = ">= 1.5.0" required_providers { aws = { source = "hashicorp/aws" version = ">= 4.0" } } } resource "aws_vpc" "vpc" { cidr_block = var.cidr_block tags = var.tags lifecycle { prevent_destroy = true } } resource "aws_subnet" "default" { vpc_id ...
0
vpc
/mono/infra/modules/vpc/variables.tf
variable "cidr_block" { description = "The VPC CIDR block. All other internal blocks are derrived" validation { condition = can(regex("10\\.\\d+\\.0\\.0/16", var.cidr_block)) error_message = "The CIDR block must be a 10.x block allocating a \\16." } } variable "tags" { default = {} type ...
0
vpc
/mono/infra/modules/vpc/outputs.tf
output "vpc_id" { value = aws_vpc.vpc.id description = "The ID of the VPC created" } output "default_subnet_id" { value = aws_subnet.default.id description = "The default subnet ID" }
0
vpc
/mono/infra/modules/vpc/README.md
## Requirements | Name | Version | |------|---------| | <a name="requirement_aws"></a> [aws](#requirement\_aws) | ~> 4.0 | ## Providers | Name | Version | |------|---------| | <a name="provider_aws"></a> [aws](#provider\_aws) | ~> 4.0 | ## Modules No modules. ## Resources | Name | Type | |------|------| | [aws_i...
0
tf-state
/mono/infra/modules/tf-state/main.tf
/** This module creates an AWS S3 bucket, KMS key, and DynamoDB table used to manage the Terraform state and should be used for all Terraform state. This module currently creates the basic resources required to store state, but in the future this module can be extended to include role based access controls to state. */...
0
tf-state
/mono/infra/modules/tf-state/variables.tf
variable "name" { type = string description = "The name of the S3 bucket being created. Displayed in the AWS management console." }
0
tf-state
/mono/infra/modules/tf-state/outputs.tf
output "backend" { value = <<-EOT backend "s3" { profile = "state" bucket = "${local.state-name}" key = "envs/${local.state-name}" kms_key_id = "${aws_kms_key.state.id}" dynamodb_table = "${aws_dynamodb_table.state.name}" } EOT }
0
tf-state
/mono/infra/modules/tf-state/.terraform-docs.yml
header-from: main.tf sections: show: - header - requirements - inputs - outputs - footer
0
tf-state
/mono/infra/modules/tf-state/README.md
## Requirements No requirements. ## Inputs | Name | Description | Type | Default | Required | |------|-------------|------|---------|:--------:| | <a name="input_name"></a> [name](#input\_name) | The name of the S3 bucket being created. Displayed in the AWS management console. | `string` | n/a | yes | ## Outputs |...
0
instance-dev
/mono/infra/modules/instance-dev/main.tf
terraform { required_version = ">= 1.5.0" required_providers { aws = { source = "hashicorp/aws" version = ">= 4.0" } } } data "aws_subnet" "default" { id = var.subnet_id } resource "aws_instance" "default" { ami = var.ami_id instance_type = var.machine_ty...
0
instance-dev
/mono/infra/modules/instance-dev/variables.tf
variable "key_name" { type = string description = "The name of the key to use to provide SSH access to the instance." } variable "machine_type" { type = string description = "The machine type (aka size and specs) to create." default = "m6g.medium" } variable "ami_id" { type = stri...
0
instance-dev
/mono/infra/modules/instance-dev/.terraform-docs.yml
header-from: main.tf sections: show: - header - requirements - inputs - outputs - footer
0
instance-dev
/mono/infra/modules/instance-dev/README.md
## Requirements No requirements. ## Inputs | Name | Description | Type | Default | Required | |------|-------------|------|---------|:--------:| | <a name="input_ami_id"></a> [ami\_id](#input\_ami\_id) | The AMI that should be used to initialize the image. | `string` | n/a | yes | | <a name="input_availability_zone"...
0
sg-allow-ssh
/mono/infra/modules/sg-allow-ssh/main.tf
variable "vpc_id" { description = "The ID of the VPC to attach the security group to" } resource "aws_security_group" "allow_ssh" { name = "fdr_allow_ssh" vpc_id = var.vpc_id } resource "aws_security_group_rule" "allow_ssh" { security_group_id = aws_security_group.allow_ssh.id type = "ingress" f...
0
sg-allow-ssh
/mono/infra/modules/sg-allow-ssh/README.md
## Requirements No requirements. ## Providers | Name | Version | |------|---------| | <a name="provider_aws"></a> [aws](#provider\_aws) | n/a | ## Modules No modules. ## Resources | Name | Type | |------|------| | [aws_security_group.allow_ssh](https://registry.terraform.io/providers/hashicorp/aws/latest/docs/re...
0
grafana-cloud
/mono/infra/envs/grafana-cloud/contact_points.auto.tfvars
slack_contact_points = { "default" = { mention_channel = "channel" } "strat-mirror" = { mention_users = ["chris"] } "proxy-kraken" = { mention_users = ["steve"] } "infra" = { mention_users = ["dawson"] } "balances" = { # TODO: Add more users when we have run books for rebalancing ...
0
grafana-cloud
/mono/infra/envs/grafana-cloud/main.tf
terraform { backend "s3" { profile = "state" region = "us-east-1" bucket = "tf-e6ziha2350d5bgbi" key = "envs/grafana-cloud" kms_key_id = "9225d9f3-ddcd-4860-a4cf-81543b2525aa" dynamodb_table = "tf-e6ziha2350d5bgbi" } required_providers { grafana ...
0
grafana-cloud
/mono/infra/envs/grafana-cloud/alerts_balances.auto.tfvars
alerts_balances = { ETH = { min_amount = 0.1 is_paused = true } BTC = { min_amount = 0.01 is_paused = true } SOL = { min_amount = 2 is_paused = true } USDT = { min_amount = 40 is_paused = true } LINK = { min_amount = 12.5 is_paused = true } }
0
grafana-cloud
/mono/infra/envs/grafana-cloud/notification_policy.tf
locals { # TODO: Move service declarations to some inventory state of config services = [ "strat-mirror", "proxy-kraken", ] } resource "grafana_notification_policy" "default" { provider = grafana.fdr contact_point = grafana_contact_point.slack["default"].name repeat_interval = "6h" group_by ...
0
grafana-cloud
/mono/infra/envs/grafana-cloud/alerts_balances.tf
# Create balance based alerts resource "grafana_folder" "alerts_balances" { provider = grafana.fdr title = "Balances" } variable "alerts_balances" { description = "A map assets to configurations balance based alerts" type = map(object({ min_amount = number is_paused = optional(bool, false) })) }...
0
grafana-cloud
/mono/infra/envs/grafana-cloud/.aws
[profile state] sso_start_url = https://fdrgroup.awsapps.com/start sso_region = us-east-1 sso_account_id = 806085365067 sso_role_name = PowerUserAccess region = us-east-1 output = json [profile fdr-dev] sso_start_url = https://fdrgroup.awsapps.com/start sso_region = us-east-1 sso_account_id = 806085365067 sso_role_nam...
0
grafana-cloud
/mono/infra/envs/grafana-cloud/.terraform.lock.hcl
# This file is maintained automatically by "terraform init". # Manual edits may be lost in future updates. provider "registry.terraform.io/grafana/grafana" { version = "1.40.1" constraints = "~> 1.40.1" hashes = [ "h1:jwrO9gFdIut2TAwF73fvqvdndrycKwJvWZPYY6i3vNA=", "zh:059a3ad4a05ace3f637628555aa3c3c0...
0
grafana-cloud
/mono/infra/envs/grafana-cloud/contact_points.tf
# This files creates the contact points for alerts. Contact points are methods for sending notifications. In our case # these are primarily Slack webhooks. locals { # Map readable names to user IDs users = { "chris" = "U05AR7UF4JF", "dawson" = "U05B42U5QMP", "joseph" = "U05AJPKFBD4", "justin" = "U...
0
dev
/mono/infra/envs/dev/ecr.tf
locals { services = [ "rs/proxy-kraken", "rs/proxy-kraken", "rs/proxy-kraken", "rs/market-makers", "rs/arbitrage", "rs/triangular-arbitrage", ] } # todo(dawson): Create lifecycle rules to automatically clean up old images resource "aws_ecr_repository" "repos" { provider = aws...
0
dev
/mono/infra/envs/dev/providers.tf
terraform { backend "s3" { profile = "state" region = "us-east-1" bucket = "tf-e6ziha2350d5bgbi" key = "envs/dev" kms_key_id = "9225d9f3-ddcd-4860-a4cf-81543b2525aa" dynamodb_table = "tf-e6ziha2350d5bgbi" } } provider "aws" { region = "us-east-2" ...
0
dev
/mono/infra/envs/dev/main.tf
# Create the state backend for storing the Terraform state module "tf-state" { source = "../../modules/tf-state" name = "FDR Dev State" providers = { aws = aws.us-east-1 } } module "ci-user" { source = "../../modules/ci-user" ecr_repository_arns = [for repo in aws_ecr_repository.repos ...
0
dev
/mono/infra/envs/dev/.terraform-version
1.5.6
0
dev
/mono/infra/envs/dev/README.md
# FDR Development This environment manages the FDR development environment in the FDR Development AWS account. To manage resources in this environment you will need access to the FDR Development AWS account. ## Planning and applying changes To plan and apply changes you will need to SSO auth to AWS. To make it easy...
0
dev
/mono/infra/envs/dev/ebs.tf
data "aws_caller_identity" "self" {} data "aws_subnet" "default" { id = module.vpc-east-2.default_subnet_id } # > These volumes are automatically enumerated and assigned a device name; including them in your block device mapping has no effect. # https://docs.aws.amazon.com/AWSEC2/latest/UserGuide/block-device-mapp...
0
dev
/mono/infra/envs/dev/us-east-2.tf
# Creates our VPC and subnets module "vpc-east-2" { source = "../../modules/vpc" cidr_block = "10.10.0.0/16" tags = { name = "FDR Dev VPC" } } resource "aws_eip" "dev-east-2" { vpc = true lifecycle { prevent_destroy = true } } output "dev_ip" { value = aws_eip.dev-east-2.public_ip } dat...
0
dev
/mono/infra/envs/dev/.terraform.lock.hcl
# This file is maintained automatically by "terraform init". # Manual edits may be lost in future updates. provider "registry.terraform.io/hashicorp/aws" { version = "4.53.0" hashes = [ "h1:CymaUpULY6LR/rHl+4+Vs0i2jVHXMhSZuJj8VXqGIPs=", "zh:0d44171544a916adf0fa96b7d0851a49d8dec98f71f0229dfd2d178958b3996b",...
0
vault
/mono/infra/envs/dev/vault/database.tf
resource "vault_mount" "database" { path = "database" description = "Provides dynamic database credentials." type = "database" } resource "vault_database_secret_backend_connection" "trading" { backend = vault_mount.database.path name = "trading" allowed_roles = ["k8s-*"] v...
0
vault
/mono/infra/envs/dev/vault/database.auto.tfvars
database = { # Database trading = { # K8s Namespace default = { # K8s Service Account "indicator-service" = { creation_statements = [ "GRANT INSERT ON TABLE public.indicator_rsi TO \"{{name}}\";", "GRANT INSERT ON TABLE public.indicator_stddev TO \"{{name}}\";", ...
0
vault
/mono/infra/envs/dev/vault/providers.tf
terraform { backend "s3" { profile = "state" region = "us-east-1" bucket = "tf-e6ziha2350d5bgbi" key = "envs/dev/vault.tfstate" kms_key_id = "9225d9f3-ddcd-4860-a4cf-81543b2525aa" dynamodb_table = "tf-e6ziha2350d5bgbi" } required_providers { va...
0
vault
/mono/infra/envs/dev/vault/main.tf
resource "vault_mount" "kv-v2" { path = "kv" description = "Key value store for static secrets. Dynamic secrets should be used whenever possible." type = "kv-v2" options = { version = "2" type = "kv-v2" } }
0
vault
/mono/infra/envs/dev/vault/.envrc
#!/usr/bin/env bash GIT_ROOT="$(git rev-parse --show-toplevel)" # AWS export AWS_PROFILE=fdr-dev # default, but can be overridden export AWS_CONFIG_FILE="${GIT_ROOT}/.aws" export VAULT_ADDR="http://localhost:8200" export VAULT_SKIP_VERIFY=true # TODO: Fix once PKI is setup # Check if VAULT_TOKEN environment variabl...
0
vault
/mono/infra/envs/dev/vault/.terraform.lock.hcl
# This file is maintained automatically by "terraform init". # Manual edits may be lost in future updates. provider "registry.terraform.io/hashicorp/vault" { version = "4.2.0" constraints = "4.2.0" hashes = [ "h1:c+42CI+oYWjIvOBzPWwiTeeU4lf8o8gPKz3Mwk25tPc=", "zh:1262f53e05f69b996220b05dd0714a90306f3...
0
pubkeys
/mono/infra/pubkeys/justin.pub
ssh-ed25519 AAAAC3NzaC1lZDI1NTE5AAAAIF4wSG5DTXn6IKDOtdWedVuJ7BctXcgaZqts0GT4dici justin
0
pubkeys
/mono/infra/pubkeys/dawson.pub
ssh-ed25519 AAAAC3NzaC1lZDI1NTE5AAAAILQWh6HF2mh39tKZfKTBraRHACT9TCsDB0lxkK6eWG0h dawson@devbox
0
pubkeys
/mono/infra/pubkeys/steve.pub
ssh-ed25519 AAAAC3NzaC1lZDI1NTE5AAAAIDn3O16ErQJS9fyRr/+CgYF7jTN8pix9WBVsdBUzmLKS stephen
0
pubkeys
/mono/infra/pubkeys/chris.pub
ssh-ed25519 AAAAC3NzaC1lZDI1NTE5AAAAIGTHvwaqmRfFh08ozZg3pnCHODfVkbpLI4KRIJNCqqiU Chris@teamEdward
0
secrets
/mono/infra/secrets/README.md
# Secrets This directory is used for storing docker compose secrets. Secrets should not be committed to the repo, but need to be stored in files so they can be exposed to containers via docker compose. ### `grafana_cloud_prometheus_api_key` This is a Grafana Cloud API key used by a our internal Prometheus to push me...
0
tempo
/mono/infra/services/tempo/config.yaml
server: http_listen_port: 3200 distributor: receivers: # this configuration will listen on all ports and protocols that tempo is capable of. jaeger: # the receives all come from the OpenTelemetry collector. more configuration information can protocols...
0
redpanda
/mono/infra/services/redpanda/redpanda.yaml
config_file: /etc/redpanda/redpanda.yaml pandaproxy: advertised_pandaproxy_api: - address: 0.0.0.0 name: internal port: 8082 - address: 0.0.0.0 name: external port: 18082 pandaproxy_api: - address: 0.0.0.0 name: internal port:...
0
promtail
/mono/infra/services/promtail/promtail.yml
server: http_listen_port: 9080 grpc_listen_port: 0 positions: filename: /tmp/positions.yaml clients: - url: https://logs-prod-006.grafana.net/loki/api/v1/push basic_auth: username: 602505 # Mounted via Docker Compose secrets # https://docs.docker.com/compose/use-secrets/ password_f...
0
console
/mono/infra/services/console/config.yaml
kafka: brokers: ["redpanda:19092"] schemaRegistry: enabled: true urls: ["http://redpanda:8081"] redpanda: adminApi: enabled: true urls: ["http://redpanda:9644"]
0
dashboards
/mono/infra/services/grafana/provisioning/dashboards/simple_market_maker.json
{ "annotations": { "list": [ { "builtIn": 1, "datasource": { "type": "grafana", "uid": "-- Grafana --" }, "enable": true, "hide": true, "iconColor": "rgba(0, 211, 255, 1)", "name": "Annotations & Alerts", "target": { ...
0
dashboards
/mono/infra/services/grafana/provisioning/dashboards/example-service-dashboard.json
{ "annotations": { "list": [ { "builtIn": 1, "datasource": "-- Grafana --", "enable": true, "hide": true, "iconColor": "rgba(0, 211, 255, 1)", "name": "Annotations & Alerts", "type": "dashboard" } ] }, "editable": true, "gnetId": null, ...
0
dashboards
/mono/infra/services/grafana/provisioning/dashboards/dashboard.yml
apiVersion: 1 providers: - name: "Prometheus" orgId: 1 folder: "" type: file disableDeletion: false editable: true options: path: /etc/grafana/provisioning/dashboards
0
dashboards
/mono/infra/services/grafana/provisioning/dashboards/market_metrics.json
{ "annotations": { "list": [ { "builtIn": 1, "datasource": { "type": "grafana", "uid": "-- Grafana --" }, "enable": true, "hide": true, "iconColor": "rgba(0, 211, 255, 1)", "name": "Annotations & Alerts", "target": { ...
0
dashboards
/mono/infra/services/grafana/provisioning/dashboards/triangular_arbitrage.json
{ "annotations": { "list": [ { "builtIn": 1, "datasource": { "type": "grafana", "uid": "-- Grafana --" }, "enable": true, "hide": true, "iconColor": "rgba(0, 211, 255, 1)", "name": "Annotations & Alerts", "target": { ...
0