repo_id stringclasses 137
values | file_path stringlengths 10 89 | content stringlengths 0 990k | __index_level_0__ int64 0 0 |
|---|---|---|---|
dashboards | /mono/helm/grafana/dashboards/market-volatility.json | {
"annotations": {
"list": [
{
"builtIn": 1,
"datasource": {
"type": "grafana",
"uid": "-- Grafana --"
},
"enable": true,
"hide": true,
"iconColor": "rgba(0, 211, 255, 1)",
"name": "Annotations & Alerts",
"type": "dashboard"... | 0 |
dashboards | /mono/helm/grafana/dashboards/market-maker-leaderboard.json | {
"annotations": {
"list": [
{
"builtIn": 1,
"datasource": {
"type": "grafana",
"uid": "-- Grafana --"
},
"enable": true,
"hide": true,
"iconColor": "rgba(0, 211, 255, 1)",
"name": "Annotations & Alerts",
"type": "dashboard"... | 0 |
infra | /mono/helm/grafana/dashboards/infra/node-exporter.json | {
"annotations": {
"list": [
{
"$$hashKey": "object:1058",
"builtIn": 1,
"datasource": {
"type": "datasource",
"uid": "grafana"
},
"enable": true,
"hide": true,
"iconColor": "rgba(0, 211, 255, 1)",
"name": "Annotations & Ale... | 0 |
infra | /mono/helm/grafana/dashboards/infra/csi-volume-metrics.json | {
"annotations": {
"list": [
{
"builtIn": 1,
"datasource": {
"type": "grafana",
"uid": "-- Grafana --"
},
"enable": true,
"hide": true,
"iconColor": "rgba(0, 211, 255, 1)",
"name": "Annotations & Alerts",
"type": "dashboard"... | 0 |
infra | /mono/helm/grafana/dashboards/infra/postgresql.json | {
"annotations": {
"list": [
{
"builtIn": 1,
"datasource": {
"type": "datasource",
"uid": "grafana"
},
"enable": true,
"hide": true,
"iconColor": "rgba(0, 211, 255, 1)",
"name": "Annotations & Alerts",
"type": "dashboard"
... | 0 |
infra | /mono/helm/grafana/dashboards/infra/service-status.json | {
"annotations": {
"list": [
{
"builtIn": 1,
"datasource": {
"type": "grafana",
"uid": "-- Grafana --"
},
"enable": true,
"hide": true,
"iconColor": "rgba(0, 211, 255, 1)",
"name": "Annotations & Alerts",
"type": "dashboard"... | 0 |
templates | /mono/helm/grafana/templates/secret-datasources.yaml | {{ if .Values.grafana.datasources.secretName }}
apiVersion: v1
kind: Secret
metadata:
name: {{ $.Values.grafana.datasources.secretName }}
type: Opaque
stringData:
"datasources.yaml": |
apiVersion: 1
datasources:
- name: prometheus
type: prometheus
uid: prometheus
url: http://... | 0 |
templates | /mono/helm/grafana/templates/cfgmap-dashboards.yaml |
apiVersion: v1
kind: ConfigMap
metadata:
name: grafana-dashboards
data:
{{- range $dashboard := .Values.grafana.dashboards }}
"{{ $dashboard }}": |
{{ ($.Files.Get (printf "dashboards/%s" $dashboard)) | indent 4 }}
{{- end }}
---
apiVersion: v1
kind: ConfigMap
metadata:
name: grafana-dashboards-infra
data:
{{- r... | 0 |
templates | /mono/helm/grafana/templates/secret-admin-password.yaml | {{ if .Values.grafana.admin.existingSecret }}
apiVersion: v1
kind: Secret
metadata:
name: {{ .Values.grafana.admin.existingSecret }}
type: Opaque
data:
password: {{ .Values.secrets.admin.password | b64enc }}
{{ end }} | 0 |
templates | /mono/helm/grafana/templates/cfgmap-config-ini.yaml | apiVersion: v1
kind: ConfigMap
metadata:
name: grafana-config-ini
data:
grafana.ini: |
[analytics]
enabled = false
reporting_enabled = false
{{ if .Values.grafana.auth.enableAnonymous }}
[auth.anonymous]
enabled = true
org_role = Admin
{{ end }} | 0 |
grafana-tempo | /mono/helm/grafana-tempo/values.yaml | tempo:
tempo:
tag: "2.2.2"
# No phoning home to Grafana Org
reportingEnabled: false
server:
http_listen_port: 3100
service:
annotations:
"prometheus.io/scrape": "true"
"prometheus.io/path": "/metrics"
"prometheus.io/port": "3100"
| 0 |
grafana-tempo | /mono/helm/grafana-tempo/Chart.yaml | apiVersion: v2
name: fdr-grafana-tempo
description: Grafana Tempo is an open-source, easy-to-use, and high-scale distributed tracing backend
type: application
icon: https://raw.githubusercontent.com/grafana/tempo/master/docs/tempo/website/logo_and_name.png
home: https://grafana.net
version: "0.1.0"
appVersion: 2.2.2
... | 0 |
grafana-tempo | /mono/helm/grafana-tempo/Chart.lock | dependencies:
- name: tempo
repository: https://grafana.github.io/helm-charts
version: 1.6.1
digest: sha256:bbf7d33e1c0cfd1d976fa900662d0363ebd8fc23576402d6d26d2bc5cf6072bc
generated: "2024-04-24T15:23:17.355910333+08:00"
| 0 |
grafana-tempo | /mono/helm/grafana-tempo/Chart.state | 2efb658a01f9dfb482aafdd56211245ca709cdb642f29967f38b164370338840 ./Chart.lock
a6f6f8de8ddeea2a72544c89b5400fb15ed8cada66dcbc1cfa4e08776c290d99 ./Chart.yaml
b3b17f16b29cb5e9ada28d90bb6e91a017ac572761f27f58a687479916ce4e5e ./values/dev.yaml
719ada21c3f07ccdccb264fd2871a41a95baeee5c897624aa95a1a0bf133afb7 ./values/loc... | 0 |
values | /mono/helm/grafana-tempo/values/dev.yaml | tempo:
tempo:
retention: 24h
persistence:
enabled: true | 0 |
values | /mono/helm/grafana-tempo/values/local.yaml | tempo:
persistence:
enabled: false | 0 |
back-testing-service | /mono/helm/back-testing-service/.helmignore | # Patterns to ignore when building packages.
# This supports shell glob matching, relative path matching, and
# negation (prefixed with !). Only one pattern per line.
.DS_Store
# Common VCS dirs
.git/
.gitignore
.bzr/
.bzrignore
.hg/
.hgignore
.svn/
# Common backup files
*.swp
*.bak
*.tmp
*.orig
*~
# Various IDEs
.proj... | 0 |
back-testing-service | /mono/helm/back-testing-service/Chart.yaml | apiVersion: v2
name: back-testing-service
description: Back Testing Service
type: application
version: 0.1.0
appVersion: "0.1.0"
| 0 |
90d99ddfba11480e9a31792670745053 | /mono/helm/back-testing-service/90d99ddfba11480e9a31792670745053/values.yaml | replicaCount: 1
name: bts-90d99ddfba11480e9a31792670745053
secrets:
- postgresql_username
- postgresql_password
image:
name: back-testing-service
repository: registry.gitlab.com/fdr-group/mono/rs/back-testing-service
pullPolicy: IfNotPresent
tag: local
imagePullSecrets: [ ]
nameOverride: ""
fullnameOverride... | 0 |
templates | /mono/helm/back-testing-service/templates/NOTES.txt | 1. Get the application URL by running these commands:
{{- if .Values.ingress.enabled }}
{{- range $host := .Values.ingress.hosts }}
{{- range .paths }}
http{{ if $.Values.ingress.tls }}s{{ end }}://{{ $host.host }}{{ .path }}
{{- end }}
{{- end }}
{{- else if contains "NodePort" .Values.service.type }}
export N... | 0 |
templates | /mono/helm/back-testing-service/templates/ingress.yaml | {{- if .Values.ingress.enabled -}}
{{- $fullName := include "back-testing-service.fullname" . -}}
{{- $svcPort := .Values.service.port -}}
{{- if and .Values.ingress.className (not (semverCompare ">=1.18-0" .Capabilities.KubeVersion.GitVersion)) }}
{{- if not (hasKey .Values.ingress.annotations "kubernetes.io/ingress... | 0 |
templates | /mono/helm/back-testing-service/templates/_helpers.tpl | {{/*
Expand the name of the chart.
*/}}
{{- define "back-testing-service.name" -}}
{{- default .Chart.Name .Values.nameOverride | trunc 63 | trimSuffix "-" }}
{{- end }}
{{/*
Create a default fully qualified app name.
We truncate at 63 chars because some Kubernetes name fields are limited to this (by the DNS naming sp... | 0 |
templates | /mono/helm/back-testing-service/templates/hpa.yaml | {{- if .Values.autoscaling.enabled }}
apiVersion: autoscaling/v2beta1
kind: HorizontalPodAutoscaler
metadata:
name: {{ include "back-testing-service.fullname" . }}
labels:
{{- include "back-testing-service.labels" . | nindent 4 }}
spec:
scaleTargetRef:
apiVersion: apps/v1
kind: Deployment
name: {{... | 0 |
templates | /mono/helm/back-testing-service/templates/service.yaml | apiVersion: v1
kind: Service
metadata:
name: {{ include "back-testing-service.fullname" . }}
labels:
{{- include "back-testing-service.labels" . | nindent 4 }}
spec:
type: {{ .Values.service.type }}
ports:
{{ toYaml .Values.service.ports | nindent 4 }}
selector:
{{- include "back-testing-service.s... | 0 |
templates | /mono/helm/back-testing-service/templates/deployment.yaml | {{- include "common.secrets" . -}}
{{- include "common.config.configmap" . -}}
apiVersion: apps/v1
kind: Deployment
metadata:
name: {{ include "back-testing-service.fullname" . }}
labels:
{{- include "back-testing-service.labels" . | nindent 4 }}
spec:
{{- if not .Values.autoscaling.enabled }}
replicas: {{ ... | 0 |
templates | /mono/helm/back-testing-service/templates/serviceaccount.yaml | {{- if .Values.serviceAccount.create -}}
apiVersion: v1
kind: ServiceAccount
metadata:
name: {{ include "back-testing-service.serviceAccountName" . }}
labels:
{{- include "back-testing-service.labels" . | nindent 4 }}
{{- with .Values.serviceAccount.annotations }}
annotations:
{{- toYaml . | nindent 4 }... | 0 |
tests | /mono/helm/back-testing-service/templates/tests/test-connection.yaml | apiVersion: v1
kind: Pod
metadata:
name: "{{ include "back-testing-service.fullname" . }}-test-connection"
labels:
{{- include "back-testing-service.labels" . | nindent 4 }}
annotations:
"helm.sh/hook": test
spec:
containers:
- name: wget
image: busybox
command: ['wget']
args: ['{{... | 0 |
grafana-loki | /mono/helm/grafana-loki/values.yaml | # Common values for Grafana Loki | 0 |
grafana-loki | /mono/helm/grafana-loki/values-local.yaml | # Local values for Grafana Loki | 0 |
proxy-kraken | /mono/helm/proxy-kraken/.helmignore | # Patterns to ignore when building packages.
# This supports shell glob matching, relative path matching, and
# negation (prefixed with !). Only one pattern per line.
.DS_Store
# Common VCS dirs
.git/
.gitignore
.bzr/
.bzrignore
.hg/
.hgignore
.svn/
# Common backup files
*.swp
*.bak
*.tmp
*.orig
*~
# Various IDEs
.proj... | 0 |
proxy-kraken | /mono/helm/proxy-kraken/values.yaml | replicaCount: 1
name: proxy-kraken
createSecrets: false
secrets: {}
image:
name: proxy-kraken
repository: registry.gitlab.com/fdr-group/mono/rs/proxy-kraken
pullPolicy: IfNotPresent
tag: "latest"
imagePullSecrets: []
nameOverride: ""
fullnameOverride: "proxy-kraken"
serviceAccount:
create: true
annotat... | 0 |
proxy-kraken | /mono/helm/proxy-kraken/Chart.yaml |
apiVersion: v2
name: proxy-kraken
description: The Kraken Proxy
type: application
version: 0.1.0
appVersion: "0.1.0"
| 0 |
values | /mono/helm/proxy-kraken/values/dev.yaml | SERVICE: "proxy-kraken"
RUST_LOG: info
imagePullSecrets:
- name: gitlab-registry
image:
# https://gitlab.com/fdr-group/mono/-/jobs/6783100559
tag: "amd64-6d06840e"
configTomlFile: config/dev.toml
affinity:
podAffinity:
requiredDuringSchedulingIgnoredDuringExecution:
# Schedule in the same AZ as th... | 0 |
values | /mono/helm/proxy-kraken/values/local.yaml | image:
tag: "local"
SERVICE: "proxy-kraken"
RUST_LOG: debug
configTomlFile: "config/local-k8s.toml"
createSecrets: true
secrets:
kraken_api_key: file://sym-secrets/kraken_api_key
kraken_api_secret: file://sym-secrets/kraken_api_secret
postgresql_username: file://sym-secrets/postgresql_username
postg... | 0 |
templates | /mono/helm/proxy-kraken/templates/NOTES.txt | 1. Get the application URL by running these commands:
{{- if .Values.ingress.enabled }}
{{- range $host := .Values.ingress.hosts }}
{{- range .paths }}
http{{ if $.Values.ingress.tls }}s{{ end }}://{{ $host.host }}{{ .path }}
{{- end }}
{{- end }}
{{- else if contains "NodePort" .Values.service.type }}
export N... | 0 |
templates | /mono/helm/proxy-kraken/templates/ingress.yaml | {{- if .Values.ingress.enabled -}}
{{- $fullName := include "proxy-kraken.fullname" . -}}
{{- $svcPort := .Values.service.port -}}
{{- if and .Values.ingress.className (not (semverCompare ">=1.18-0" .Capabilities.KubeVersion.GitVersion)) }}
{{- if not (hasKey .Values.ingress.annotations "kubernetes.io/ingress.class")... | 0 |
templates | /mono/helm/proxy-kraken/templates/_helpers.tpl | {{/*
Expand the name of the chart.
*/}}
{{- define "proxy-kraken.name" -}}
{{- default .Chart.Name .Values.nameOverride | trunc 63 | trimSuffix "-" }}
{{- end }}
{{/*
Create a default fully qualified app name.
We truncate at 63 chars because some Kubernetes name fields are limited to this (by the DNS naming spec).
If ... | 0 |
templates | /mono/helm/proxy-kraken/templates/hpa.yaml | {{- if .Values.autoscaling.enabled }}
apiVersion: autoscaling/v2beta1
kind: HorizontalPodAutoscaler
metadata:
name: {{ include "proxy-kraken.fullname" . }}
labels:
{{- include "proxy-kraken.labels" . | nindent 4 }}
spec:
scaleTargetRef:
apiVersion: apps/v1
kind: Deployment
name: {{ include "proxy-... | 0 |
templates | /mono/helm/proxy-kraken/templates/service.yaml | apiVersion: v1
kind: Service
metadata:
name: {{ include "proxy-kraken.fullname" . }}
labels:
{{- include "proxy-kraken.labels" . | nindent 4 }}
annotations:
{{- $.Values.service.annotations | toYaml | nindent 4 }}
spec:
type: {{ .Values.service.type }}
ports:
- port: {{ .Values.service.port }}
... | 0 |
templates | /mono/helm/proxy-kraken/templates/deployment.yaml |
{{- if .Values.createSecrets }}
{{- include "common.secrets-v2" . }}
---
{{- end -}}
{{- include "common.config.configmap" . -}}
apiVersion: apps/v1
kind: Deployment
metadata:
name: {{ include "proxy-kraken.fullname" . }}
labels:
{{- include "proxy-kraken.labels" . | nindent 4 }}
spec:
{{- if not .Values.au... | 0 |
templates | /mono/helm/proxy-kraken/templates/serviceaccount.yaml | {{- if .Values.serviceAccount.create -}}
apiVersion: v1
kind: ServiceAccount
metadata:
name: {{ include "proxy-kraken.serviceAccountName" . }}
labels:
{{- include "proxy-kraken.labels" . | nindent 4 }}
{{- with .Values.serviceAccount.annotations }}
annotations:
{{- toYaml . | nindent 4 }}
{{- end }}
{... | 0 |
tests | /mono/helm/proxy-kraken/templates/tests/test-connection.yaml | apiVersion: v1
kind: Pod
metadata:
name: "{{ include "proxy-kraken.fullname" . }}-test-connection"
labels:
{{- include "proxy-kraken.labels" . | nindent 4 }}
annotations:
"helm.sh/hook": test
spec:
containers:
- name: wget
image: busybox
command: ['wget']
args: ['{{ include "proxy-... | 0 |
config | /mono/helm/proxy-kraken/config/dev.toml | [kafka_producer]
bootstrap_servers = "redpanda.default.svc.cluster.local:9093"
max_in_flight_requests_per_connection = 1
batch_num_messages = 1
request_required_acks = "all"
default_timeout_milliseconds = 50
max_retries = 3
retry_backoff_milliseconds = 10
[kafka_consumer]
group_id = "proxy-kraken"
bootstra... | 0 |
config | /mono/helm/proxy-kraken/config/local-k8s.toml | [kafka_producer]
bootstrap_servers = "redpanda:9093"
max_in_flight_requests_per_connection = 1
batch_num_messages = 1
request_required_acks = "all"
default_timeout_milliseconds = 50
max_retries = 3
retry_backoff_milliseconds = 10
[kafka_consumer]
group_id = "proxy-kraken"
bootstrap_servers = "redpanda:9093"
enable_par... | 0 |
config | /mono/helm/proxy-kraken/config/local-host.toml | [kafka_producer]
bootstrap_servers = "localhost:9094"
max_in_flight_requests_per_connection = 1
batch_num_messages = 1
request_required_acks = "all"
default_timeout_milliseconds = 50
max_retries = 3
retry_backoff_milliseconds = 10
[kafka_consumer]
group_id = "proxy-kraken"
bootstrap_servers = "localhost:9094"
enable_p... | 0 |
postgresql-test | /mono/helm/postgresql-test/.helmignore | # Patterns to ignore when building packages.
# This supports shell glob matching, relative path matching, and
# negation (prefixed with !). Only one pattern per line.
.DS_Store
# Common VCS dirs
.git/
.gitignore
.bzr/
.bzrignore
.hg/
.hgignore
.svn/
# Common backup files
*.swp
*.bak
*.tmp
*~
# Various IDEs
.project
.id... | 0 |
postgresql-test | /mono/helm/postgresql-test/values.schema.json | {
"$schema": "http://json-schema.org/schema#",
"type": "object",
"properties": {
"architecture": {
"type": "string",
"title": "PostgreSQL architecture",
"form": true,
"description": "Allowed values: `standalone` or `replication`"
},
"auth": {
"type": "object",
"titl... | 0 |
postgresql-test | /mono/helm/postgresql-test/values.yaml | # Copyright VMware, Inc.
# SPDX-License-Identifier: APACHE-2.0
## @section Global parameters
## Please, note that this will override the parameters, including dependencies, configured to use the global value
##
global:
## @param global.imageRegistry Global Docker image registry
##
imageRegistry: ""
## @param g... | 0 |
postgresql-test | /mono/helm/postgresql-test/Chart.yaml | # Copyright VMware, Inc.
# SPDX-License-Identifier: APACHE-2.0
annotations:
category: Database
licenses: Apache-2.0
images: |
- name: os-shell
image: docker.io/bitnami/os-shell:11-debian-11-r72
- name: postgres-exporter
image: docker.io/bitnami/postgres-exporter:0.14.0-debian-11-r0
- name... | 0 |
postgresql-test | /mono/helm/postgresql-test/Chart.lock | dependencies:
- name: common
repository: oci://registry-1.docker.io/bitnamicharts
version: 2.19.2
digest: sha256:e670e1075bfafffe040fae1158f1fa1f592585f394b48704ba137d2d083b1571
generated: "2024-05-07T09:55:07.106389057-03:00"
| 0 |
postgresql-test | /mono/helm/postgresql-test/Chart.state | 7eaaf3cbb4d77efef16db18b4444c1b3a00a4ad1259befd1aec2cd858d44fe98 ./Chart.lock
7f77429c4d190e8c8cd42e13e50670b3b03c64d12a3eecc02c7f713cea36e756 ./Chart.yaml
0a1e8ed08a372234d8af441442044a88c27dc4409e039dbd3e113fec1ee91024 ./.helmignore
b05d55913601dd909676a7d35783d7f921890347f445c4f113c2a88d5d9887cb ./README.md
4ad5... | 0 |
postgresql-test | /mono/helm/postgresql-test/README.md | <!--- app-name: PostgreSQL -->
# PostgreSQL packaged by Bitnami
PostgreSQL (Postgres) is an open source object-relational database known for reliability and data integrity. ACID-compliant, it supports foreign keys, joins, views, triggers and stored procedures.
[Overview of PostgreSQL](http://www.postgresql.org)
Tra... | 0 |
postgresql-test | /mono/helm/postgresql-test/values-local.yaml | persistence:
useHostPath: false
hostPath:
path: "" | 0 |
postgresql-test | /mono/helm/postgresql-test/values-common.yaml | global:
postgresql:
auth:
postgresPassword: ""
username: "trading-test" # TODO: manage secrets
password: "trading-test" # TODO: manage secrets
database: "trading-test" # TODO: manage secrets
additionalDatabases:
- name: "archive" # TODO: manage secrets
username: "ar... | 0 |
postgresql-test | /mono/helm/postgresql-test/values-dev.yaml | persistence:
useHostPath: true
hostPath:
path: "/data/postgresql" | 0 |
templates | /mono/helm/postgresql-test/templates/networkpolicy-egress.yaml | {{- /*
Copyright VMware, Inc.
SPDX-License-Identifier: APACHE-2.0
*/}}
{{- if and .Values.networkPolicy.enabled (or .Values.networkPolicy.egressRules.denyConnectionsToExternal .Values.networkPolicy.egressRules.customRules) }}
apiVersion: {{ include "common.capabilities.networkPolicy.apiVersion" . }}
kind: NetworkPolic... | 0 |
templates | /mono/helm/postgresql-test/templates/NOTES.txt | CHART NAME: {{ .Chart.Name }}
CHART VERSION: {{ .Chart.Version }}
APP VERSION: {{ .Chart.AppVersion }}
** Please be patient while the chart is being deployed **
{{- if .Values.diagnosticMode.enabled }}
The chart has been deployed in diagnostic mode. All probes have been disabled and the command has been overwritten w... | 0 |
templates | /mono/helm/postgresql-test/templates/rolebinding.yaml | {{- /*
Copyright VMware, Inc.
SPDX-License-Identifier: APACHE-2.0
*/}}
{{- if .Values.rbac.create }}
kind: RoleBinding
apiVersion: {{ include "common.capabilities.rbac.apiVersion" . }}
metadata:
name: {{ include "common.names.fullname" . }}
namespace: {{ .Release.Namespace | quote }}
labels: {{- include "common.... | 0 |
templates | /mono/helm/postgresql-test/templates/psp.yaml | {{- /*
Copyright VMware, Inc.
SPDX-License-Identifier: APACHE-2.0
*/}}
{{- $pspAvailable := (semverCompare "<1.25-0" (include "common.capabilities.kubeVersion" .)) -}}
{{- if and $pspAvailable .Values.psp.create }}
apiVersion: policy/v1beta1
kind: PodSecurityPolicy
metadata:
name: {{ include "common.names.fullname" ... | 0 |
templates | /mono/helm/postgresql-test/templates/tls-secrets.yaml | {{- /*
Copyright VMware, Inc.
SPDX-License-Identifier: APACHE-2.0
*/}}
{{- if (include "postgresql.v1.createTlsSecret" . ) }}
{{- $secretName := printf "%s-crt" (include "common.names.fullname" .) }}
{{- $ca := genCA "postgresql-ca" 365 }}
{{- $fullname := include "common.names.fullname" . }}
{{- $releaseNamespace := ... | 0 |
templates | /mono/helm/postgresql-test/templates/_helpers.tpl | {{/*
Copyright VMware, Inc.
SPDX-License-Identifier: APACHE-2.0
*/}}
{{/* vim: set filetype=mustache: */}}
{{/*
Create a default fully qualified app name for PostgreSQL Primary objects
We truncate at 63 chars because some Kubernetes name fields are limited to this (by the DNS naming spec).
*/}}
{{- define "postgresql... | 0 |
templates | /mono/helm/postgresql-test/templates/extra-list.yaml | {{- /*
Copyright VMware, Inc.
SPDX-License-Identifier: APACHE-2.0
*/}}
{{- range .Values.extraDeploy }}
---
{{ include "common.tplvalues.render" (dict "value" . "context" $) }}
{{- end }}
| 0 |
templates | /mono/helm/postgresql-test/templates/prometheusrule.yaml | {{- /*
Copyright VMware, Inc.
SPDX-License-Identifier: APACHE-2.0
*/}}
{{- if and .Values.metrics.enabled .Values.metrics.prometheusRule.enabled }}
apiVersion: monitoring.coreos.com/v1
kind: PrometheusRule
metadata:
name: {{ include "common.names.fullname" . }}
namespace: {{ default .Release.Namespace .Values.metr... | 0 |
templates | /mono/helm/postgresql-test/templates/role.yaml | {{- /*
Copyright VMware, Inc.
SPDX-License-Identifier: APACHE-2.0
*/}}
{{- if .Values.rbac.create }}
kind: Role
apiVersion: {{ include "common.capabilities.rbac.apiVersion" . }}
metadata:
name: {{ include "common.names.fullname" . }}
namespace: {{ .Release.Namespace | quote }}
labels: {{- include "common.labels.... | 0 |
templates | /mono/helm/postgresql-test/templates/secrets.yaml | {{- /*
Copyright VMware, Inc.
SPDX-License-Identifier: APACHE-2.0
*/}}
{{- $host := include "postgresql.v1.primary.fullname" . }}
{{- $port := include "postgresql.v1.service.port" . }}
{{- $customUser := include "postgresql.v1.username" . }}
{{- $postgresPassword := include "common.secrets.lookup" (dict "secret" (incl... | 0 |
templates | /mono/helm/postgresql-test/templates/serviceaccount.yaml | {{- /*
Copyright VMware, Inc.
SPDX-License-Identifier: APACHE-2.0
*/}}
{{- if .Values.serviceAccount.create }}
apiVersion: v1
kind: ServiceAccount
metadata:
name: {{ include "postgresql.v1.serviceAccountName" . }}
namespace: {{ .Release.Namespace | quote }}
labels: {{- include "common.labels.standard" ( dict "cu... | 0 |
read | /mono/helm/postgresql-test/templates/read/metrics-configmap.yaml | {{- /*
Copyright VMware, Inc.
SPDX-License-Identifier: APACHE-2.0
*/}}
{{- if and .Values.metrics.enabled .Values.metrics.customMetrics (eq .Values.architecture "replication") }}
apiVersion: v1
kind: ConfigMap
metadata:
name: {{ printf "%s-metrics" (include "postgresql.v1.readReplica.fullname" .) }}
namespace: {{ ... | 0 |
read | /mono/helm/postgresql-test/templates/read/metrics-svc.yaml | {{- /*
Copyright VMware, Inc.
SPDX-License-Identifier: APACHE-2.0
*/}}
{{- if and .Values.metrics.enabled (eq .Values.architecture "replication") }}
apiVersion: v1
kind: Service
metadata:
name: {{ printf "%s-metrics" (include "postgresql.v1.readReplica.fullname" .) }}
namespace: {{ .Release.Namespace | quote }}
... | 0 |
read | /mono/helm/postgresql-test/templates/read/servicemonitor.yaml | {{- /*
Copyright VMware, Inc.
SPDX-License-Identifier: APACHE-2.0
*/}}
{{- if and .Values.metrics.enabled .Values.metrics.serviceMonitor.enabled (eq .Values.architecture "replication") }}
apiVersion: monitoring.coreos.com/v1
kind: ServiceMonitor
metadata:
name: {{ include "postgresql.v1.readReplica.fullname" . }}
... | 0 |
read | /mono/helm/postgresql-test/templates/read/statefulset.yaml | {{- /*
Copyright VMware, Inc.
SPDX-License-Identifier: APACHE-2.0
*/}}
{{- if eq .Values.architecture "replication" }}
{{- $customUser := include "postgresql.v1.username" . }}
apiVersion: {{ include "common.capabilities.statefulset.apiVersion" . }}
kind: StatefulSet
metadata:
name: {{ include "postgresql.v1.readRepl... | 0 |
read | /mono/helm/postgresql-test/templates/read/svc.yaml | {{- /*
Copyright VMware, Inc.
SPDX-License-Identifier: APACHE-2.0
*/}}
{{- if eq .Values.architecture "replication" }}
apiVersion: v1
kind: Service
metadata:
name: {{ include "postgresql.v1.readReplica.fullname" . }}
namespace: {{ .Release.Namespace | quote }}
labels: {{- include "common.labels.standard" ( dict ... | 0 |
read | /mono/helm/postgresql-test/templates/read/extended-configmap.yaml | {{- /*
Copyright VMware, Inc.
SPDX-License-Identifier: APACHE-2.0
*/}}
{{- if (include "postgresql.v1.readReplicas.createExtendedConfigmap" .) }}
apiVersion: v1
kind: ConfigMap
metadata:
name: {{ printf "%s-extended-configuration" (include "postgresql.v1.readReplica.fullname" .) }}
namespace: {{ .Release.Namespace... | 0 |
read | /mono/helm/postgresql-test/templates/read/networkpolicy.yaml | {{- /*
Copyright VMware, Inc.
SPDX-License-Identifier: APACHE-2.0
*/}}
{{- if and .Values.networkPolicy.enabled (eq .Values.architecture "replication") .Values.networkPolicy.ingressRules.readReplicasAccessOnlyFrom.enabled }}
apiVersion: {{ include "common.capabilities.networkPolicy.apiVersion" . }}
kind: NetworkPolicy... | 0 |
read | /mono/helm/postgresql-test/templates/read/svc-headless.yaml | {{- /*
Copyright VMware, Inc.
SPDX-License-Identifier: APACHE-2.0
*/}}
{{- if eq .Values.architecture "replication" }}
apiVersion: v1
kind: Service
metadata:
name: {{ include "postgresql.v1.readReplica.svc.headless" . }}
namespace: {{ .Release.Namespace | quote }}
labels: {{- include "common.labels.standard" ( d... | 0 |
backup | /mono/helm/postgresql-test/templates/backup/cronjob.yaml | {{- /*
Copyright VMware, Inc.
SPDX-License-Identifier: APACHE-2.0
*/}}
{{- if .Values.backup.enabled }}
{{- $customUser := include "postgresql.v1.username" . }}
apiVersion: batch/v1
kind: CronJob
metadata:
name: {{ include "postgresql.v1.primary.fullname" . }}-pgdumpall
namespace: {{ .Release.Namespace | quote }}
... | 0 |
backup | /mono/helm/postgresql-test/templates/backup/pvc.yaml | {{- /*
Copyright VMware, Inc.
SPDX-License-Identifier: APACHE-2.0
*/}}
{{- if and .Values.backup.enabled (not .Values.backup.cronjob.storage.existingClaim) -}}
apiVersion: v1
kind: PersistentVolumeClaim
metadata:
name: {{ include "postgresql.v1.primary.fullname" . }}-pgdumpall
namespace: {{ .Release.Namespace | qu... | 0 |
primary | /mono/helm/postgresql-test/templates/primary/metrics-configmap.yaml | {{- /*
Copyright VMware, Inc.
SPDX-License-Identifier: APACHE-2.0
*/}}
{{- if and .Values.metrics.enabled .Values.metrics.customMetrics }}
apiVersion: v1
kind: ConfigMap
metadata:
name: {{ printf "%s-metrics" (include "postgresql.v1.primary.fullname" .) }}
namespace: {{ .Release.Namespace | quote }}
labels: {{- ... | 0 |
primary | /mono/helm/postgresql-test/templates/primary/metrics-svc.yaml | {{- /*
Copyright VMware, Inc.
SPDX-License-Identifier: APACHE-2.0
*/}}
{{- if .Values.metrics.enabled }}
apiVersion: v1
kind: Service
metadata:
name: {{ printf "%s-metrics" (include "postgresql.v1.primary.fullname" .) }}
namespace: {{ .Release.Namespace | quote }}
labels: {{- include "common.labels.standard" ( d... | 0 |
primary | /mono/helm/postgresql-test/templates/primary/servicemonitor.yaml | {{- /*
Copyright VMware, Inc.
SPDX-License-Identifier: APACHE-2.0
*/}}
{{- if and .Values.metrics.enabled .Values.metrics.serviceMonitor.enabled }}
apiVersion: monitoring.coreos.com/v1
kind: ServiceMonitor
metadata:
name: {{ include "postgresql.v1.primary.fullname" . }}
namespace: {{ default .Release.Namespace .Va... | 0 |
primary | /mono/helm/postgresql-test/templates/primary/initialization-configmap.yaml | {{- /*
Copyright VMware, Inc.
SPDX-License-Identifier: APACHE-2.0
*/}}
{{- if and .Values.primary.initdb.scripts (not .Values.primary.initdb.scriptsConfigMap) }}
apiVersion: v1
kind: ConfigMap
metadata:
name: {{ printf "%s-init-scripts" (include "postgresql.v1.primary.fullname" .) }}
namespace: {{ .Release.Namespa... | 0 |
primary | /mono/helm/postgresql-test/templates/primary/configmap.yaml | {{- /*
Copyright VMware, Inc.
SPDX-License-Identifier: APACHE-2.0
*/}}
{{- if (include "postgresql.v1.primary.createConfigmap" .) }}
apiVersion: v1
kind: ConfigMap
metadata:
name: {{ printf "%s-configuration" (include "postgresql.v1.primary.fullname" .) }}
namespace: {{ .Release.Namespace | quote }}
labels: {{- ... | 0 |
primary | /mono/helm/postgresql-test/templates/primary/statefulset.yaml | {{- /*
Copyright VMware, Inc.
SPDX-License-Identifier: APACHE-2.0
*/}}
{{- $customUser := include "postgresql.v1.username" . }}
apiVersion: {{ include "common.capabilities.statefulset.apiVersion" . }}
kind: StatefulSet
metadata:
name: {{ include "postgresql.v1.primary.fullname" . }}
namespace: {{ .Release.Namespac... | 0 |
primary | /mono/helm/postgresql-test/templates/primary/svc.yaml | {{- /*
Copyright VMware, Inc.
SPDX-License-Identifier: APACHE-2.0
*/}}
apiVersion: v1
kind: Service
metadata:
name: {{ include "postgresql.v1.primary.fullname" . }}
namespace: {{ .Release.Namespace | quote }}
labels: {{- include "common.labels.standard" ( dict "customLabels" .Values.commonLabels "context" $ ) | ... | 0 |
primary | /mono/helm/postgresql-test/templates/primary/extended-configmap.yaml | {{- /*
Copyright VMware, Inc.
SPDX-License-Identifier: APACHE-2.0
*/}}
{{- if (include "postgresql.v1.primary.createExtendedConfigmap" .) }}
apiVersion: v1
kind: ConfigMap
metadata:
name: {{ printf "%s-extended-configuration" (include "postgresql.v1.primary.fullname" .) }}
namespace: {{ .Release.Namespace | quote ... | 0 |
primary | /mono/helm/postgresql-test/templates/primary/networkpolicy.yaml | {{- /*
Copyright VMware, Inc.
SPDX-License-Identifier: APACHE-2.0
*/}}
{{- if and .Values.networkPolicy.enabled (or .Values.networkPolicy.metrics.enabled .Values.networkPolicy.ingressRules.primaryAccessOnlyFrom.enabled) }}
apiVersion: {{ include "common.capabilities.networkPolicy.apiVersion" . }}
kind: NetworkPolicy
m... | 0 |
primary | /mono/helm/postgresql-test/templates/primary/svc-headless.yaml | {{- /*
Copyright VMware, Inc.
SPDX-License-Identifier: APACHE-2.0
*/}}
apiVersion: v1
kind: Service
metadata:
name: {{ include "postgresql.v1.primary.svc.headless" . }}
namespace: {{ .Release.Namespace | quote }}
labels: {{- include "common.labels.standard" ( dict "customLabels" .Values.commonLabels "context" $ ... | 0 |
prometheus | /mono/helm/prometheus/.helmignore | # Patterns to ignore when building packages.
.DS_Store
# Local secrets
secrets.yaml
*.secrets.yaml
# Common VCS dirs
.git/
.gitignore
.bzr/
.bzrignore
.hg/
.hgignore
.svn/
# Common backup files
*.swp
*.bak
*.tmp
*~
# Various IDEs
.project
.idea/
*.tmproj | 0 |
prometheus | /mono/helm/prometheus/values.yaml | prometheus:
server:
service:
type: ClusterIP
ports:
http: 9090
serviceAccount:
create: true
automountServiceAccountToken: true
persistence:
enabled: true
| 0 |
prometheus | /mono/helm/prometheus/Chart.yaml | apiVersion: v2
name: fdr-prometheus
description: A Helm chart to deploy Prometheus
type: application
version: 0.1.0
appVersion: "2.47.0" # should match the image tag
dependencies:
- name: prometheus
repository: https://charts.bitnami.com/bitnami
version: 1.0.6 | 0 |
prometheus | /mono/helm/prometheus/Chart.lock | dependencies:
- name: prometheus
repository: https://charts.bitnami.com/bitnami
version: 1.0.6
digest: sha256:b7587b0347a6e770782aad675d607e896ea2affc20a3995571056ad2473d2253
generated: "2024-04-16T10:56:34.661518192+08:00"
| 0 |
prometheus | /mono/helm/prometheus/Chart.state | 41cac664e1ab94ae0830bbca953e09e30c972b2a9a8aabf066a7aa536145d398 ./Chart.lock
cb7ac9f66de7da8128959733e2d91f7ff03f3d82ac09fb1d7c8e411c874a57f5 ./Chart.yaml
4e0eb6a6ebbfde3f2c3b071f5890c460395bc8cbc1ffeea6f73f38c235fbba53 ./.helmignore
4d8c573861be9c975ee30677439db56ac6ce1197f6d1cf2940bd9d0856216cf6 ./templates/svc-... | 0 |
values | /mono/helm/prometheus/values/dev.yaml | prometheus:
alertmanager:
service:
type: ClusterIP
# Used to define services for Charts and systems that do not expose a way to modify service annotations to expose
# metrics targets for prometheus
customServiceTargets:
awsEbsCsiDriver: true
server:
image:
tag: 2.47.0-debian-11-r0
... | 0 |
values | /mono/helm/prometheus/values/local.yaml |
prometheus:
alertmanager:
# We don't need alerting for local
enabled: false
# Used to define services for Charts and systems that do not expose a way to modify service annotations to expose
# metrics targets for prometheus
customServiceTargets:
awsEbsCsiDriver: false
server:
image:
t... | 0 |
templates | /mono/helm/prometheus/templates/svc-aws-ebs-csi-driver.yaml | {{- if .Values.prometheus.customServiceTargets.awsEbsCsiDriver }}
# https://github.com/kubernetes-sigs/aws-ebs-csi-driver/blob/a8d4dae06a490a21f44e0dad59fb5543e2ab76af/charts/aws-ebs-csi-driver/templates/metrics.yaml
apiVersion: v1
kind: Service
metadata:
name: ebs-csi-controller
namespace: kube-system
labels:
... | 0 |
proxy-poloniex | /mono/helm/proxy-poloniex/.helmignore | # Patterns to ignore when building packages.
# This supports shell glob matching, relative path matching, and
# negation (prefixed with !). Only one pattern per line.
.DS_Store
# Common VCS dirs
.git/
.gitignore
.bzr/
.bzrignore
.hg/
.hgignore
.svn/
# Common backup files
*.swp
*.bak
*.tmp
*.orig
*~
# Various IDEs
.proj... | 0 |
proxy-poloniex | /mono/helm/proxy-poloniex/values.yaml | replicaCount: 1
name: proxy-poloniex
secrets:
- poloniex_api_key
- poloniex_api_secret
- postgresql_username
- postgresql_password
image:
name: proxy-poloniex
repository: registry.gitlab.com/fdr-group/mono/rs/proxy-poloniex
pullPolicy: IfNotPresent
tag: "latest"
imagePullSecrets: []
nameOverride: ""... | 0 |
proxy-poloniex | /mono/helm/proxy-poloniex/Chart.yaml | apiVersion: v2
name: proxy-poloniex
description: The Poloniex Proxy
type: application
version: 0.1.0
appVersion: "0.1.0"
| 0 |
proxy-poloniex | /mono/helm/proxy-poloniex/values-local.yaml | image:
tag: "local"
SERVICE: "proxy-poloniex"
RUST_LOG: debug
createSecrets: true
configToml: |
[kafka_producer]
bootstrap_servers = "redpanda:9093"
max_in_flight_requests_per_connection = 1
batch_num_messages = 1
request_required_acks = "all"
default_timeout_milliseconds = 50
max_retries = 3
retry... | 0 |
proxy-poloniex | /mono/helm/proxy-poloniex/values-dev.yaml | SERVICE: "proxy-poloniex"
RUST_LOG: info
imagePullSecrets:
- name: gitlab-registry
image:
tag: "amd64-0efeee20"
configToml: |
[kafka_producer]
bootstrap_servers = "redpanda.fdr-data.svc.cluster.local:9093"
max_in_flight_requests_per_connection = 1
batch_num_messages = 1
request_required_acks = "all"
... | 0 |
templates | /mono/helm/proxy-poloniex/templates/NOTES.txt | 1. Get the application URL by running these commands:
{{- if .Values.ingress.enabled }}
{{- range $host := .Values.ingress.hosts }}
{{- range .paths }}
http{{ if $.Values.ingress.tls }}s{{ end }}://{{ $host.host }}{{ .path }}
{{- end }}
{{- end }}
{{- else if contains "NodePort" .Values.service.type }}
export N... | 0 |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.