repo_id
stringclasses
137 values
file_path
stringlengths
10
89
content
stringlengths
0
990k
__index_level_0__
int64
0
0
dashboards
/mono/helm/grafana/dashboards/market-volatility.json
{ "annotations": { "list": [ { "builtIn": 1, "datasource": { "type": "grafana", "uid": "-- Grafana --" }, "enable": true, "hide": true, "iconColor": "rgba(0, 211, 255, 1)", "name": "Annotations & Alerts", "type": "dashboard"...
0
dashboards
/mono/helm/grafana/dashboards/market-maker-leaderboard.json
{ "annotations": { "list": [ { "builtIn": 1, "datasource": { "type": "grafana", "uid": "-- Grafana --" }, "enable": true, "hide": true, "iconColor": "rgba(0, 211, 255, 1)", "name": "Annotations & Alerts", "type": "dashboard"...
0
infra
/mono/helm/grafana/dashboards/infra/node-exporter.json
{ "annotations": { "list": [ { "$$hashKey": "object:1058", "builtIn": 1, "datasource": { "type": "datasource", "uid": "grafana" }, "enable": true, "hide": true, "iconColor": "rgba(0, 211, 255, 1)", "name": "Annotations & Ale...
0
infra
/mono/helm/grafana/dashboards/infra/csi-volume-metrics.json
{ "annotations": { "list": [ { "builtIn": 1, "datasource": { "type": "grafana", "uid": "-- Grafana --" }, "enable": true, "hide": true, "iconColor": "rgba(0, 211, 255, 1)", "name": "Annotations & Alerts", "type": "dashboard"...
0
infra
/mono/helm/grafana/dashboards/infra/postgresql.json
{ "annotations": { "list": [ { "builtIn": 1, "datasource": { "type": "datasource", "uid": "grafana" }, "enable": true, "hide": true, "iconColor": "rgba(0, 211, 255, 1)", "name": "Annotations & Alerts", "type": "dashboard" ...
0
infra
/mono/helm/grafana/dashboards/infra/service-status.json
{ "annotations": { "list": [ { "builtIn": 1, "datasource": { "type": "grafana", "uid": "-- Grafana --" }, "enable": true, "hide": true, "iconColor": "rgba(0, 211, 255, 1)", "name": "Annotations & Alerts", "type": "dashboard"...
0
templates
/mono/helm/grafana/templates/secret-datasources.yaml
{{ if .Values.grafana.datasources.secretName }} apiVersion: v1 kind: Secret metadata: name: {{ $.Values.grafana.datasources.secretName }} type: Opaque stringData: "datasources.yaml": | apiVersion: 1 datasources: - name: prometheus type: prometheus uid: prometheus url: http://...
0
templates
/mono/helm/grafana/templates/cfgmap-dashboards.yaml
apiVersion: v1 kind: ConfigMap metadata: name: grafana-dashboards data: {{- range $dashboard := .Values.grafana.dashboards }} "{{ $dashboard }}": | {{ ($.Files.Get (printf "dashboards/%s" $dashboard)) | indent 4 }} {{- end }} --- apiVersion: v1 kind: ConfigMap metadata: name: grafana-dashboards-infra data: {{- r...
0
templates
/mono/helm/grafana/templates/secret-admin-password.yaml
{{ if .Values.grafana.admin.existingSecret }} apiVersion: v1 kind: Secret metadata: name: {{ .Values.grafana.admin.existingSecret }} type: Opaque data: password: {{ .Values.secrets.admin.password | b64enc }} {{ end }}
0
templates
/mono/helm/grafana/templates/cfgmap-config-ini.yaml
apiVersion: v1 kind: ConfigMap metadata: name: grafana-config-ini data: grafana.ini: | [analytics] enabled = false reporting_enabled = false {{ if .Values.grafana.auth.enableAnonymous }} [auth.anonymous] enabled = true org_role = Admin {{ end }}
0
grafana-tempo
/mono/helm/grafana-tempo/values.yaml
tempo: tempo: tag: "2.2.2" # No phoning home to Grafana Org reportingEnabled: false server: http_listen_port: 3100 service: annotations: "prometheus.io/scrape": "true" "prometheus.io/path": "/metrics" "prometheus.io/port": "3100"
0
grafana-tempo
/mono/helm/grafana-tempo/Chart.yaml
apiVersion: v2 name: fdr-grafana-tempo description: Grafana Tempo is an open-source, easy-to-use, and high-scale distributed tracing backend type: application icon: https://raw.githubusercontent.com/grafana/tempo/master/docs/tempo/website/logo_and_name.png home: https://grafana.net version: "0.1.0" appVersion: 2.2.2 ...
0
grafana-tempo
/mono/helm/grafana-tempo/Chart.lock
dependencies: - name: tempo repository: https://grafana.github.io/helm-charts version: 1.6.1 digest: sha256:bbf7d33e1c0cfd1d976fa900662d0363ebd8fc23576402d6d26d2bc5cf6072bc generated: "2024-04-24T15:23:17.355910333+08:00"
0
grafana-tempo
/mono/helm/grafana-tempo/Chart.state
2efb658a01f9dfb482aafdd56211245ca709cdb642f29967f38b164370338840 ./Chart.lock a6f6f8de8ddeea2a72544c89b5400fb15ed8cada66dcbc1cfa4e08776c290d99 ./Chart.yaml b3b17f16b29cb5e9ada28d90bb6e91a017ac572761f27f58a687479916ce4e5e ./values/dev.yaml 719ada21c3f07ccdccb264fd2871a41a95baeee5c897624aa95a1a0bf133afb7 ./values/loc...
0
values
/mono/helm/grafana-tempo/values/dev.yaml
tempo: tempo: retention: 24h persistence: enabled: true
0
values
/mono/helm/grafana-tempo/values/local.yaml
tempo: persistence: enabled: false
0
back-testing-service
/mono/helm/back-testing-service/.helmignore
# Patterns to ignore when building packages. # This supports shell glob matching, relative path matching, and # negation (prefixed with !). Only one pattern per line. .DS_Store # Common VCS dirs .git/ .gitignore .bzr/ .bzrignore .hg/ .hgignore .svn/ # Common backup files *.swp *.bak *.tmp *.orig *~ # Various IDEs .proj...
0
back-testing-service
/mono/helm/back-testing-service/Chart.yaml
apiVersion: v2 name: back-testing-service description: Back Testing Service type: application version: 0.1.0 appVersion: "0.1.0"
0
90d99ddfba11480e9a31792670745053
/mono/helm/back-testing-service/90d99ddfba11480e9a31792670745053/values.yaml
replicaCount: 1 name: bts-90d99ddfba11480e9a31792670745053 secrets: - postgresql_username - postgresql_password image: name: back-testing-service repository: registry.gitlab.com/fdr-group/mono/rs/back-testing-service pullPolicy: IfNotPresent tag: local imagePullSecrets: [ ] nameOverride: "" fullnameOverride...
0
templates
/mono/helm/back-testing-service/templates/NOTES.txt
1. Get the application URL by running these commands: {{- if .Values.ingress.enabled }} {{- range $host := .Values.ingress.hosts }} {{- range .paths }} http{{ if $.Values.ingress.tls }}s{{ end }}://{{ $host.host }}{{ .path }} {{- end }} {{- end }} {{- else if contains "NodePort" .Values.service.type }} export N...
0
templates
/mono/helm/back-testing-service/templates/ingress.yaml
{{- if .Values.ingress.enabled -}} {{- $fullName := include "back-testing-service.fullname" . -}} {{- $svcPort := .Values.service.port -}} {{- if and .Values.ingress.className (not (semverCompare ">=1.18-0" .Capabilities.KubeVersion.GitVersion)) }} {{- if not (hasKey .Values.ingress.annotations "kubernetes.io/ingress...
0
templates
/mono/helm/back-testing-service/templates/_helpers.tpl
{{/* Expand the name of the chart. */}} {{- define "back-testing-service.name" -}} {{- default .Chart.Name .Values.nameOverride | trunc 63 | trimSuffix "-" }} {{- end }} {{/* Create a default fully qualified app name. We truncate at 63 chars because some Kubernetes name fields are limited to this (by the DNS naming sp...
0
templates
/mono/helm/back-testing-service/templates/hpa.yaml
{{- if .Values.autoscaling.enabled }} apiVersion: autoscaling/v2beta1 kind: HorizontalPodAutoscaler metadata: name: {{ include "back-testing-service.fullname" . }} labels: {{- include "back-testing-service.labels" . | nindent 4 }} spec: scaleTargetRef: apiVersion: apps/v1 kind: Deployment name: {{...
0
templates
/mono/helm/back-testing-service/templates/service.yaml
apiVersion: v1 kind: Service metadata: name: {{ include "back-testing-service.fullname" . }} labels: {{- include "back-testing-service.labels" . | nindent 4 }} spec: type: {{ .Values.service.type }} ports: {{ toYaml .Values.service.ports | nindent 4 }} selector: {{- include "back-testing-service.s...
0
templates
/mono/helm/back-testing-service/templates/deployment.yaml
{{- include "common.secrets" . -}} {{- include "common.config.configmap" . -}} apiVersion: apps/v1 kind: Deployment metadata: name: {{ include "back-testing-service.fullname" . }} labels: {{- include "back-testing-service.labels" . | nindent 4 }} spec: {{- if not .Values.autoscaling.enabled }} replicas: {{ ...
0
templates
/mono/helm/back-testing-service/templates/serviceaccount.yaml
{{- if .Values.serviceAccount.create -}} apiVersion: v1 kind: ServiceAccount metadata: name: {{ include "back-testing-service.serviceAccountName" . }} labels: {{- include "back-testing-service.labels" . | nindent 4 }} {{- with .Values.serviceAccount.annotations }} annotations: {{- toYaml . | nindent 4 }...
0
tests
/mono/helm/back-testing-service/templates/tests/test-connection.yaml
apiVersion: v1 kind: Pod metadata: name: "{{ include "back-testing-service.fullname" . }}-test-connection" labels: {{- include "back-testing-service.labels" . | nindent 4 }} annotations: "helm.sh/hook": test spec: containers: - name: wget image: busybox command: ['wget'] args: ['{{...
0
grafana-loki
/mono/helm/grafana-loki/values.yaml
# Common values for Grafana Loki
0
grafana-loki
/mono/helm/grafana-loki/values-local.yaml
# Local values for Grafana Loki
0
proxy-kraken
/mono/helm/proxy-kraken/.helmignore
# Patterns to ignore when building packages. # This supports shell glob matching, relative path matching, and # negation (prefixed with !). Only one pattern per line. .DS_Store # Common VCS dirs .git/ .gitignore .bzr/ .bzrignore .hg/ .hgignore .svn/ # Common backup files *.swp *.bak *.tmp *.orig *~ # Various IDEs .proj...
0
proxy-kraken
/mono/helm/proxy-kraken/values.yaml
replicaCount: 1 name: proxy-kraken createSecrets: false secrets: {} image: name: proxy-kraken repository: registry.gitlab.com/fdr-group/mono/rs/proxy-kraken pullPolicy: IfNotPresent tag: "latest" imagePullSecrets: [] nameOverride: "" fullnameOverride: "proxy-kraken" serviceAccount: create: true annotat...
0
proxy-kraken
/mono/helm/proxy-kraken/Chart.yaml
apiVersion: v2 name: proxy-kraken description: The Kraken Proxy type: application version: 0.1.0 appVersion: "0.1.0"
0
values
/mono/helm/proxy-kraken/values/dev.yaml
SERVICE: "proxy-kraken" RUST_LOG: info imagePullSecrets: - name: gitlab-registry image: # https://gitlab.com/fdr-group/mono/-/jobs/6783100559 tag: "amd64-6d06840e" configTomlFile: config/dev.toml affinity: podAffinity: requiredDuringSchedulingIgnoredDuringExecution: # Schedule in the same AZ as th...
0
values
/mono/helm/proxy-kraken/values/local.yaml
image: tag: "local" SERVICE: "proxy-kraken" RUST_LOG: debug configTomlFile: "config/local-k8s.toml" createSecrets: true secrets: kraken_api_key: file://sym-secrets/kraken_api_key kraken_api_secret: file://sym-secrets/kraken_api_secret postgresql_username: file://sym-secrets/postgresql_username postg...
0
templates
/mono/helm/proxy-kraken/templates/NOTES.txt
1. Get the application URL by running these commands: {{- if .Values.ingress.enabled }} {{- range $host := .Values.ingress.hosts }} {{- range .paths }} http{{ if $.Values.ingress.tls }}s{{ end }}://{{ $host.host }}{{ .path }} {{- end }} {{- end }} {{- else if contains "NodePort" .Values.service.type }} export N...
0
templates
/mono/helm/proxy-kraken/templates/ingress.yaml
{{- if .Values.ingress.enabled -}} {{- $fullName := include "proxy-kraken.fullname" . -}} {{- $svcPort := .Values.service.port -}} {{- if and .Values.ingress.className (not (semverCompare ">=1.18-0" .Capabilities.KubeVersion.GitVersion)) }} {{- if not (hasKey .Values.ingress.annotations "kubernetes.io/ingress.class")...
0
templates
/mono/helm/proxy-kraken/templates/_helpers.tpl
{{/* Expand the name of the chart. */}} {{- define "proxy-kraken.name" -}} {{- default .Chart.Name .Values.nameOverride | trunc 63 | trimSuffix "-" }} {{- end }} {{/* Create a default fully qualified app name. We truncate at 63 chars because some Kubernetes name fields are limited to this (by the DNS naming spec). If ...
0
templates
/mono/helm/proxy-kraken/templates/hpa.yaml
{{- if .Values.autoscaling.enabled }} apiVersion: autoscaling/v2beta1 kind: HorizontalPodAutoscaler metadata: name: {{ include "proxy-kraken.fullname" . }} labels: {{- include "proxy-kraken.labels" . | nindent 4 }} spec: scaleTargetRef: apiVersion: apps/v1 kind: Deployment name: {{ include "proxy-...
0
templates
/mono/helm/proxy-kraken/templates/service.yaml
apiVersion: v1 kind: Service metadata: name: {{ include "proxy-kraken.fullname" . }} labels: {{- include "proxy-kraken.labels" . | nindent 4 }} annotations: {{- $.Values.service.annotations | toYaml | nindent 4 }} spec: type: {{ .Values.service.type }} ports: - port: {{ .Values.service.port }} ...
0
templates
/mono/helm/proxy-kraken/templates/deployment.yaml
{{- if .Values.createSecrets }} {{- include "common.secrets-v2" . }} --- {{- end -}} {{- include "common.config.configmap" . -}} apiVersion: apps/v1 kind: Deployment metadata: name: {{ include "proxy-kraken.fullname" . }} labels: {{- include "proxy-kraken.labels" . | nindent 4 }} spec: {{- if not .Values.au...
0
templates
/mono/helm/proxy-kraken/templates/serviceaccount.yaml
{{- if .Values.serviceAccount.create -}} apiVersion: v1 kind: ServiceAccount metadata: name: {{ include "proxy-kraken.serviceAccountName" . }} labels: {{- include "proxy-kraken.labels" . | nindent 4 }} {{- with .Values.serviceAccount.annotations }} annotations: {{- toYaml . | nindent 4 }} {{- end }} {...
0
tests
/mono/helm/proxy-kraken/templates/tests/test-connection.yaml
apiVersion: v1 kind: Pod metadata: name: "{{ include "proxy-kraken.fullname" . }}-test-connection" labels: {{- include "proxy-kraken.labels" . | nindent 4 }} annotations: "helm.sh/hook": test spec: containers: - name: wget image: busybox command: ['wget'] args: ['{{ include "proxy-...
0
config
/mono/helm/proxy-kraken/config/dev.toml
[kafka_producer] bootstrap_servers = "redpanda.default.svc.cluster.local:9093" max_in_flight_requests_per_connection = 1 batch_num_messages = 1 request_required_acks = "all" default_timeout_milliseconds = 50 max_retries = 3 retry_backoff_milliseconds = 10 [kafka_consumer] group_id = "proxy-kraken" bootstra...
0
config
/mono/helm/proxy-kraken/config/local-k8s.toml
[kafka_producer] bootstrap_servers = "redpanda:9093" max_in_flight_requests_per_connection = 1 batch_num_messages = 1 request_required_acks = "all" default_timeout_milliseconds = 50 max_retries = 3 retry_backoff_milliseconds = 10 [kafka_consumer] group_id = "proxy-kraken" bootstrap_servers = "redpanda:9093" enable_par...
0
config
/mono/helm/proxy-kraken/config/local-host.toml
[kafka_producer] bootstrap_servers = "localhost:9094" max_in_flight_requests_per_connection = 1 batch_num_messages = 1 request_required_acks = "all" default_timeout_milliseconds = 50 max_retries = 3 retry_backoff_milliseconds = 10 [kafka_consumer] group_id = "proxy-kraken" bootstrap_servers = "localhost:9094" enable_p...
0
postgresql-test
/mono/helm/postgresql-test/.helmignore
# Patterns to ignore when building packages. # This supports shell glob matching, relative path matching, and # negation (prefixed with !). Only one pattern per line. .DS_Store # Common VCS dirs .git/ .gitignore .bzr/ .bzrignore .hg/ .hgignore .svn/ # Common backup files *.swp *.bak *.tmp *~ # Various IDEs .project .id...
0
postgresql-test
/mono/helm/postgresql-test/values.schema.json
{ "$schema": "http://json-schema.org/schema#", "type": "object", "properties": { "architecture": { "type": "string", "title": "PostgreSQL architecture", "form": true, "description": "Allowed values: `standalone` or `replication`" }, "auth": { "type": "object", "titl...
0
postgresql-test
/mono/helm/postgresql-test/values.yaml
# Copyright VMware, Inc. # SPDX-License-Identifier: APACHE-2.0 ## @section Global parameters ## Please, note that this will override the parameters, including dependencies, configured to use the global value ## global: ## @param global.imageRegistry Global Docker image registry ## imageRegistry: "" ## @param g...
0
postgresql-test
/mono/helm/postgresql-test/Chart.yaml
# Copyright VMware, Inc. # SPDX-License-Identifier: APACHE-2.0 annotations: category: Database licenses: Apache-2.0 images: | - name: os-shell image: docker.io/bitnami/os-shell:11-debian-11-r72 - name: postgres-exporter image: docker.io/bitnami/postgres-exporter:0.14.0-debian-11-r0 - name...
0
postgresql-test
/mono/helm/postgresql-test/Chart.lock
dependencies: - name: common repository: oci://registry-1.docker.io/bitnamicharts version: 2.19.2 digest: sha256:e670e1075bfafffe040fae1158f1fa1f592585f394b48704ba137d2d083b1571 generated: "2024-05-07T09:55:07.106389057-03:00"
0
postgresql-test
/mono/helm/postgresql-test/Chart.state
7eaaf3cbb4d77efef16db18b4444c1b3a00a4ad1259befd1aec2cd858d44fe98 ./Chart.lock 7f77429c4d190e8c8cd42e13e50670b3b03c64d12a3eecc02c7f713cea36e756 ./Chart.yaml 0a1e8ed08a372234d8af441442044a88c27dc4409e039dbd3e113fec1ee91024 ./.helmignore b05d55913601dd909676a7d35783d7f921890347f445c4f113c2a88d5d9887cb ./README.md 4ad5...
0
postgresql-test
/mono/helm/postgresql-test/README.md
<!--- app-name: PostgreSQL --> # PostgreSQL packaged by Bitnami PostgreSQL (Postgres) is an open source object-relational database known for reliability and data integrity. ACID-compliant, it supports foreign keys, joins, views, triggers and stored procedures. [Overview of PostgreSQL](http://www.postgresql.org) Tra...
0
postgresql-test
/mono/helm/postgresql-test/values-local.yaml
persistence: useHostPath: false hostPath: path: ""
0
postgresql-test
/mono/helm/postgresql-test/values-common.yaml
global: postgresql: auth: postgresPassword: "" username: "trading-test" # TODO: manage secrets password: "trading-test" # TODO: manage secrets database: "trading-test" # TODO: manage secrets additionalDatabases: - name: "archive" # TODO: manage secrets username: "ar...
0
postgresql-test
/mono/helm/postgresql-test/values-dev.yaml
persistence: useHostPath: true hostPath: path: "/data/postgresql"
0
templates
/mono/helm/postgresql-test/templates/networkpolicy-egress.yaml
{{- /* Copyright VMware, Inc. SPDX-License-Identifier: APACHE-2.0 */}} {{- if and .Values.networkPolicy.enabled (or .Values.networkPolicy.egressRules.denyConnectionsToExternal .Values.networkPolicy.egressRules.customRules) }} apiVersion: {{ include "common.capabilities.networkPolicy.apiVersion" . }} kind: NetworkPolic...
0
templates
/mono/helm/postgresql-test/templates/NOTES.txt
CHART NAME: {{ .Chart.Name }} CHART VERSION: {{ .Chart.Version }} APP VERSION: {{ .Chart.AppVersion }} ** Please be patient while the chart is being deployed ** {{- if .Values.diagnosticMode.enabled }} The chart has been deployed in diagnostic mode. All probes have been disabled and the command has been overwritten w...
0
templates
/mono/helm/postgresql-test/templates/rolebinding.yaml
{{- /* Copyright VMware, Inc. SPDX-License-Identifier: APACHE-2.0 */}} {{- if .Values.rbac.create }} kind: RoleBinding apiVersion: {{ include "common.capabilities.rbac.apiVersion" . }} metadata: name: {{ include "common.names.fullname" . }} namespace: {{ .Release.Namespace | quote }} labels: {{- include "common....
0
templates
/mono/helm/postgresql-test/templates/psp.yaml
{{- /* Copyright VMware, Inc. SPDX-License-Identifier: APACHE-2.0 */}} {{- $pspAvailable := (semverCompare "<1.25-0" (include "common.capabilities.kubeVersion" .)) -}} {{- if and $pspAvailable .Values.psp.create }} apiVersion: policy/v1beta1 kind: PodSecurityPolicy metadata: name: {{ include "common.names.fullname" ...
0
templates
/mono/helm/postgresql-test/templates/tls-secrets.yaml
{{- /* Copyright VMware, Inc. SPDX-License-Identifier: APACHE-2.0 */}} {{- if (include "postgresql.v1.createTlsSecret" . ) }} {{- $secretName := printf "%s-crt" (include "common.names.fullname" .) }} {{- $ca := genCA "postgresql-ca" 365 }} {{- $fullname := include "common.names.fullname" . }} {{- $releaseNamespace := ...
0
templates
/mono/helm/postgresql-test/templates/_helpers.tpl
{{/* Copyright VMware, Inc. SPDX-License-Identifier: APACHE-2.0 */}} {{/* vim: set filetype=mustache: */}} {{/* Create a default fully qualified app name for PostgreSQL Primary objects We truncate at 63 chars because some Kubernetes name fields are limited to this (by the DNS naming spec). */}} {{- define "postgresql...
0
templates
/mono/helm/postgresql-test/templates/extra-list.yaml
{{- /* Copyright VMware, Inc. SPDX-License-Identifier: APACHE-2.0 */}} {{- range .Values.extraDeploy }} --- {{ include "common.tplvalues.render" (dict "value" . "context" $) }} {{- end }}
0
templates
/mono/helm/postgresql-test/templates/prometheusrule.yaml
{{- /* Copyright VMware, Inc. SPDX-License-Identifier: APACHE-2.0 */}} {{- if and .Values.metrics.enabled .Values.metrics.prometheusRule.enabled }} apiVersion: monitoring.coreos.com/v1 kind: PrometheusRule metadata: name: {{ include "common.names.fullname" . }} namespace: {{ default .Release.Namespace .Values.metr...
0
templates
/mono/helm/postgresql-test/templates/role.yaml
{{- /* Copyright VMware, Inc. SPDX-License-Identifier: APACHE-2.0 */}} {{- if .Values.rbac.create }} kind: Role apiVersion: {{ include "common.capabilities.rbac.apiVersion" . }} metadata: name: {{ include "common.names.fullname" . }} namespace: {{ .Release.Namespace | quote }} labels: {{- include "common.labels....
0
templates
/mono/helm/postgresql-test/templates/secrets.yaml
{{- /* Copyright VMware, Inc. SPDX-License-Identifier: APACHE-2.0 */}} {{- $host := include "postgresql.v1.primary.fullname" . }} {{- $port := include "postgresql.v1.service.port" . }} {{- $customUser := include "postgresql.v1.username" . }} {{- $postgresPassword := include "common.secrets.lookup" (dict "secret" (incl...
0
templates
/mono/helm/postgresql-test/templates/serviceaccount.yaml
{{- /* Copyright VMware, Inc. SPDX-License-Identifier: APACHE-2.0 */}} {{- if .Values.serviceAccount.create }} apiVersion: v1 kind: ServiceAccount metadata: name: {{ include "postgresql.v1.serviceAccountName" . }} namespace: {{ .Release.Namespace | quote }} labels: {{- include "common.labels.standard" ( dict "cu...
0
read
/mono/helm/postgresql-test/templates/read/metrics-configmap.yaml
{{- /* Copyright VMware, Inc. SPDX-License-Identifier: APACHE-2.0 */}} {{- if and .Values.metrics.enabled .Values.metrics.customMetrics (eq .Values.architecture "replication") }} apiVersion: v1 kind: ConfigMap metadata: name: {{ printf "%s-metrics" (include "postgresql.v1.readReplica.fullname" .) }} namespace: {{ ...
0
read
/mono/helm/postgresql-test/templates/read/metrics-svc.yaml
{{- /* Copyright VMware, Inc. SPDX-License-Identifier: APACHE-2.0 */}} {{- if and .Values.metrics.enabled (eq .Values.architecture "replication") }} apiVersion: v1 kind: Service metadata: name: {{ printf "%s-metrics" (include "postgresql.v1.readReplica.fullname" .) }} namespace: {{ .Release.Namespace | quote }} ...
0
read
/mono/helm/postgresql-test/templates/read/servicemonitor.yaml
{{- /* Copyright VMware, Inc. SPDX-License-Identifier: APACHE-2.0 */}} {{- if and .Values.metrics.enabled .Values.metrics.serviceMonitor.enabled (eq .Values.architecture "replication") }} apiVersion: monitoring.coreos.com/v1 kind: ServiceMonitor metadata: name: {{ include "postgresql.v1.readReplica.fullname" . }} ...
0
read
/mono/helm/postgresql-test/templates/read/statefulset.yaml
{{- /* Copyright VMware, Inc. SPDX-License-Identifier: APACHE-2.0 */}} {{- if eq .Values.architecture "replication" }} {{- $customUser := include "postgresql.v1.username" . }} apiVersion: {{ include "common.capabilities.statefulset.apiVersion" . }} kind: StatefulSet metadata: name: {{ include "postgresql.v1.readRepl...
0
read
/mono/helm/postgresql-test/templates/read/svc.yaml
{{- /* Copyright VMware, Inc. SPDX-License-Identifier: APACHE-2.0 */}} {{- if eq .Values.architecture "replication" }} apiVersion: v1 kind: Service metadata: name: {{ include "postgresql.v1.readReplica.fullname" . }} namespace: {{ .Release.Namespace | quote }} labels: {{- include "common.labels.standard" ( dict ...
0
read
/mono/helm/postgresql-test/templates/read/extended-configmap.yaml
{{- /* Copyright VMware, Inc. SPDX-License-Identifier: APACHE-2.0 */}} {{- if (include "postgresql.v1.readReplicas.createExtendedConfigmap" .) }} apiVersion: v1 kind: ConfigMap metadata: name: {{ printf "%s-extended-configuration" (include "postgresql.v1.readReplica.fullname" .) }} namespace: {{ .Release.Namespace...
0
read
/mono/helm/postgresql-test/templates/read/networkpolicy.yaml
{{- /* Copyright VMware, Inc. SPDX-License-Identifier: APACHE-2.0 */}} {{- if and .Values.networkPolicy.enabled (eq .Values.architecture "replication") .Values.networkPolicy.ingressRules.readReplicasAccessOnlyFrom.enabled }} apiVersion: {{ include "common.capabilities.networkPolicy.apiVersion" . }} kind: NetworkPolicy...
0
read
/mono/helm/postgresql-test/templates/read/svc-headless.yaml
{{- /* Copyright VMware, Inc. SPDX-License-Identifier: APACHE-2.0 */}} {{- if eq .Values.architecture "replication" }} apiVersion: v1 kind: Service metadata: name: {{ include "postgresql.v1.readReplica.svc.headless" . }} namespace: {{ .Release.Namespace | quote }} labels: {{- include "common.labels.standard" ( d...
0
backup
/mono/helm/postgresql-test/templates/backup/cronjob.yaml
{{- /* Copyright VMware, Inc. SPDX-License-Identifier: APACHE-2.0 */}} {{- if .Values.backup.enabled }} {{- $customUser := include "postgresql.v1.username" . }} apiVersion: batch/v1 kind: CronJob metadata: name: {{ include "postgresql.v1.primary.fullname" . }}-pgdumpall namespace: {{ .Release.Namespace | quote }} ...
0
backup
/mono/helm/postgresql-test/templates/backup/pvc.yaml
{{- /* Copyright VMware, Inc. SPDX-License-Identifier: APACHE-2.0 */}} {{- if and .Values.backup.enabled (not .Values.backup.cronjob.storage.existingClaim) -}} apiVersion: v1 kind: PersistentVolumeClaim metadata: name: {{ include "postgresql.v1.primary.fullname" . }}-pgdumpall namespace: {{ .Release.Namespace | qu...
0
primary
/mono/helm/postgresql-test/templates/primary/metrics-configmap.yaml
{{- /* Copyright VMware, Inc. SPDX-License-Identifier: APACHE-2.0 */}} {{- if and .Values.metrics.enabled .Values.metrics.customMetrics }} apiVersion: v1 kind: ConfigMap metadata: name: {{ printf "%s-metrics" (include "postgresql.v1.primary.fullname" .) }} namespace: {{ .Release.Namespace | quote }} labels: {{- ...
0
primary
/mono/helm/postgresql-test/templates/primary/metrics-svc.yaml
{{- /* Copyright VMware, Inc. SPDX-License-Identifier: APACHE-2.0 */}} {{- if .Values.metrics.enabled }} apiVersion: v1 kind: Service metadata: name: {{ printf "%s-metrics" (include "postgresql.v1.primary.fullname" .) }} namespace: {{ .Release.Namespace | quote }} labels: {{- include "common.labels.standard" ( d...
0
primary
/mono/helm/postgresql-test/templates/primary/servicemonitor.yaml
{{- /* Copyright VMware, Inc. SPDX-License-Identifier: APACHE-2.0 */}} {{- if and .Values.metrics.enabled .Values.metrics.serviceMonitor.enabled }} apiVersion: monitoring.coreos.com/v1 kind: ServiceMonitor metadata: name: {{ include "postgresql.v1.primary.fullname" . }} namespace: {{ default .Release.Namespace .Va...
0
primary
/mono/helm/postgresql-test/templates/primary/initialization-configmap.yaml
{{- /* Copyright VMware, Inc. SPDX-License-Identifier: APACHE-2.0 */}} {{- if and .Values.primary.initdb.scripts (not .Values.primary.initdb.scriptsConfigMap) }} apiVersion: v1 kind: ConfigMap metadata: name: {{ printf "%s-init-scripts" (include "postgresql.v1.primary.fullname" .) }} namespace: {{ .Release.Namespa...
0
primary
/mono/helm/postgresql-test/templates/primary/configmap.yaml
{{- /* Copyright VMware, Inc. SPDX-License-Identifier: APACHE-2.0 */}} {{- if (include "postgresql.v1.primary.createConfigmap" .) }} apiVersion: v1 kind: ConfigMap metadata: name: {{ printf "%s-configuration" (include "postgresql.v1.primary.fullname" .) }} namespace: {{ .Release.Namespace | quote }} labels: {{- ...
0
primary
/mono/helm/postgresql-test/templates/primary/statefulset.yaml
{{- /* Copyright VMware, Inc. SPDX-License-Identifier: APACHE-2.0 */}} {{- $customUser := include "postgresql.v1.username" . }} apiVersion: {{ include "common.capabilities.statefulset.apiVersion" . }} kind: StatefulSet metadata: name: {{ include "postgresql.v1.primary.fullname" . }} namespace: {{ .Release.Namespac...
0
primary
/mono/helm/postgresql-test/templates/primary/svc.yaml
{{- /* Copyright VMware, Inc. SPDX-License-Identifier: APACHE-2.0 */}} apiVersion: v1 kind: Service metadata: name: {{ include "postgresql.v1.primary.fullname" . }} namespace: {{ .Release.Namespace | quote }} labels: {{- include "common.labels.standard" ( dict "customLabels" .Values.commonLabels "context" $ ) | ...
0
primary
/mono/helm/postgresql-test/templates/primary/extended-configmap.yaml
{{- /* Copyright VMware, Inc. SPDX-License-Identifier: APACHE-2.0 */}} {{- if (include "postgresql.v1.primary.createExtendedConfigmap" .) }} apiVersion: v1 kind: ConfigMap metadata: name: {{ printf "%s-extended-configuration" (include "postgresql.v1.primary.fullname" .) }} namespace: {{ .Release.Namespace | quote ...
0
primary
/mono/helm/postgresql-test/templates/primary/networkpolicy.yaml
{{- /* Copyright VMware, Inc. SPDX-License-Identifier: APACHE-2.0 */}} {{- if and .Values.networkPolicy.enabled (or .Values.networkPolicy.metrics.enabled .Values.networkPolicy.ingressRules.primaryAccessOnlyFrom.enabled) }} apiVersion: {{ include "common.capabilities.networkPolicy.apiVersion" . }} kind: NetworkPolicy m...
0
primary
/mono/helm/postgresql-test/templates/primary/svc-headless.yaml
{{- /* Copyright VMware, Inc. SPDX-License-Identifier: APACHE-2.0 */}} apiVersion: v1 kind: Service metadata: name: {{ include "postgresql.v1.primary.svc.headless" . }} namespace: {{ .Release.Namespace | quote }} labels: {{- include "common.labels.standard" ( dict "customLabels" .Values.commonLabels "context" $ ...
0
prometheus
/mono/helm/prometheus/.helmignore
# Patterns to ignore when building packages. .DS_Store # Local secrets secrets.yaml *.secrets.yaml # Common VCS dirs .git/ .gitignore .bzr/ .bzrignore .hg/ .hgignore .svn/ # Common backup files *.swp *.bak *.tmp *~ # Various IDEs .project .idea/ *.tmproj
0
prometheus
/mono/helm/prometheus/values.yaml
prometheus: server: service: type: ClusterIP ports: http: 9090 serviceAccount: create: true automountServiceAccountToken: true persistence: enabled: true
0
prometheus
/mono/helm/prometheus/Chart.yaml
apiVersion: v2 name: fdr-prometheus description: A Helm chart to deploy Prometheus type: application version: 0.1.0 appVersion: "2.47.0" # should match the image tag dependencies: - name: prometheus repository: https://charts.bitnami.com/bitnami version: 1.0.6
0
prometheus
/mono/helm/prometheus/Chart.lock
dependencies: - name: prometheus repository: https://charts.bitnami.com/bitnami version: 1.0.6 digest: sha256:b7587b0347a6e770782aad675d607e896ea2affc20a3995571056ad2473d2253 generated: "2024-04-16T10:56:34.661518192+08:00"
0
prometheus
/mono/helm/prometheus/Chart.state
41cac664e1ab94ae0830bbca953e09e30c972b2a9a8aabf066a7aa536145d398 ./Chart.lock cb7ac9f66de7da8128959733e2d91f7ff03f3d82ac09fb1d7c8e411c874a57f5 ./Chart.yaml 4e0eb6a6ebbfde3f2c3b071f5890c460395bc8cbc1ffeea6f73f38c235fbba53 ./.helmignore 4d8c573861be9c975ee30677439db56ac6ce1197f6d1cf2940bd9d0856216cf6 ./templates/svc-...
0
values
/mono/helm/prometheus/values/dev.yaml
prometheus: alertmanager: service: type: ClusterIP # Used to define services for Charts and systems that do not expose a way to modify service annotations to expose # metrics targets for prometheus customServiceTargets: awsEbsCsiDriver: true server: image: tag: 2.47.0-debian-11-r0 ...
0
values
/mono/helm/prometheus/values/local.yaml
prometheus: alertmanager: # We don't need alerting for local enabled: false # Used to define services for Charts and systems that do not expose a way to modify service annotations to expose # metrics targets for prometheus customServiceTargets: awsEbsCsiDriver: false server: image: t...
0
templates
/mono/helm/prometheus/templates/svc-aws-ebs-csi-driver.yaml
{{- if .Values.prometheus.customServiceTargets.awsEbsCsiDriver }} # https://github.com/kubernetes-sigs/aws-ebs-csi-driver/blob/a8d4dae06a490a21f44e0dad59fb5543e2ab76af/charts/aws-ebs-csi-driver/templates/metrics.yaml apiVersion: v1 kind: Service metadata: name: ebs-csi-controller namespace: kube-system labels: ...
0
proxy-poloniex
/mono/helm/proxy-poloniex/.helmignore
# Patterns to ignore when building packages. # This supports shell glob matching, relative path matching, and # negation (prefixed with !). Only one pattern per line. .DS_Store # Common VCS dirs .git/ .gitignore .bzr/ .bzrignore .hg/ .hgignore .svn/ # Common backup files *.swp *.bak *.tmp *.orig *~ # Various IDEs .proj...
0
proxy-poloniex
/mono/helm/proxy-poloniex/values.yaml
replicaCount: 1 name: proxy-poloniex secrets: - poloniex_api_key - poloniex_api_secret - postgresql_username - postgresql_password image: name: proxy-poloniex repository: registry.gitlab.com/fdr-group/mono/rs/proxy-poloniex pullPolicy: IfNotPresent tag: "latest" imagePullSecrets: [] nameOverride: ""...
0
proxy-poloniex
/mono/helm/proxy-poloniex/Chart.yaml
apiVersion: v2 name: proxy-poloniex description: The Poloniex Proxy type: application version: 0.1.0 appVersion: "0.1.0"
0
proxy-poloniex
/mono/helm/proxy-poloniex/values-local.yaml
image: tag: "local" SERVICE: "proxy-poloniex" RUST_LOG: debug createSecrets: true configToml: | [kafka_producer] bootstrap_servers = "redpanda:9093" max_in_flight_requests_per_connection = 1 batch_num_messages = 1 request_required_acks = "all" default_timeout_milliseconds = 50 max_retries = 3 retry...
0
proxy-poloniex
/mono/helm/proxy-poloniex/values-dev.yaml
SERVICE: "proxy-poloniex" RUST_LOG: info imagePullSecrets: - name: gitlab-registry image: tag: "amd64-0efeee20" configToml: | [kafka_producer] bootstrap_servers = "redpanda.fdr-data.svc.cluster.local:9093" max_in_flight_requests_per_connection = 1 batch_num_messages = 1 request_required_acks = "all" ...
0
templates
/mono/helm/proxy-poloniex/templates/NOTES.txt
1. Get the application URL by running these commands: {{- if .Values.ingress.enabled }} {{- range $host := .Values.ingress.hosts }} {{- range .paths }} http{{ if $.Values.ingress.tls }}s{{ end }}://{{ $host.host }}{{ .path }} {{- end }} {{- end }} {{- else if contains "NodePort" .Values.service.type }} export N...
0