Skip to content

This repository contains the GlueOps platform Helm chart, which is used to deploy and manage various applications and services on Kubernetes clusters. It includes configurations for applications like Vault, Dex, Promtail, Loki, QR Code Generator, and others. The chart facilitates automated deployments using Argo CD and simplifies cluster management

Notifications You must be signed in to change notification settings

GlueOps/platform-helm-chart-platform

Repository files navigation

glueops-platform

Version: 0.53.5 AppVersion: v0.1.0

This chart deploys the GlueOps Platform

Values

Key Type Default Description
captain_domain string "placeholder_cluster_environment.placeholder_tenant_key.placeholder_glueops_root_domain" The Route53 subdomain for the services on your cluster. It will be used as the suffix url for argocd, grafana, vault, and any other services that come out of the box in the glueops platform. Note: you need to create this before using this repo as this repo does not provision DNS Zones for you. This is the domain you created through: https://github.com/GlueOps/terraform-module-cloud-multy-prerequisites
captain_repo.private_b64enc_deploy_key string "placeholder_captain_repo_b64enc_private_deploy_key" This is a read only deploy key that will be used to read the captain repo. Part of output from terraform-module-cloud-multy-prerequisites: https://github.com/GlueOps/terraform-module-cloud-multy-prerequisites
captain_repo.ssh_clone_url string "placeholder_captain_repo_ssh_clone_url" This is the github url of the captain repo https://github.com/glueops/development-captains/tenant . Part of output from terraform-module-cloud-multy-prerequisites: https://github.com/GlueOps/terraform-module-cloud-multy-prerequisites
certManager.aws_accessKey string "placeholder_certmanager_aws_access_key" Part of certmanager_iam_credentials output from terraform-module-cloud-multy-prerequisites: https://github.com/GlueOps/terraform-module-cloud-multy-prerequisites
certManager.aws_region string "placeholder_aws_region" Should be the same primary_region you used in: https://github.com/GlueOps/terraform-module-cloud-multy-prerequisites
certManager.aws_secretKey string "placeholder_certmanager_aws_secret_key" Part of certmanager_iam_credentials output from terraform-module-cloud-multy-prerequisites: https://github.com/GlueOps/terraform-module-cloud-multy-prerequisites
container_images.app_backup_and_exports.backup_tools.image.registry string "ghcr.io"
container_images.app_backup_and_exports.backup_tools.image.repository string "glueops/backup-tools"
container_images.app_backup_and_exports.backup_tools.image.tag string "v0.17.1@sha256:cc06c4a3b0a01e16d6bef97ac8ff4457d411b05577e4a804fabe2b2eb4d9a997"
container_images.app_backup_and_exports.certs_backup_restore.image.registry string "ghcr.io"
container_images.app_backup_and_exports.certs_backup_restore.image.repository string "glueops/certs-backup-restore"
container_images.app_backup_and_exports.certs_backup_restore.image.tag string "v0.10.0@sha256:dbc6a7209ff2e92a0b9766fa61dc45bd6d4e124afdc236972327044c93858926"
container_images.app_backup_and_exports.vault_backup_validator.image.registry string "ghcr.io"
container_images.app_backup_and_exports.vault_backup_validator.image.repository string "glueops/vault-backup-validator"
container_images.app_backup_and_exports.vault_backup_validator.image.tag string "v0.3.3@sha256:7c8bbce86645efc1c8b2f1782cd524a682cdaa9062e6ea6480713aca1c7e7885"
container_images.app_cluster_info_page.cluster_information_help_page_html.image.registry string "ghcr.io"
container_images.app_cluster_info_page.cluster_information_help_page_html.image.repository string "glueops/cluster-information-help-page-html"
container_images.app_cluster_info_page.cluster_information_help_page_html.image.tag string "v0.4.4@sha256:5c9a0cf36c3539a2076c654b3c2e253cc3f131c93395acb293f6ffb4ef053baf"
container_images.app_dex.dex.image.registry string "ghcr.io"
container_images.app_dex.dex.image.repository string "dexidp/dex"
container_images.app_dex.dex.image.tag string "v2.41.1@sha256:bc7cfce7c17f52864e2bb2a4dc1d2f86a41e3019f6d42e81d92a301fad0c8a1d"
container_images.app_fluent_operator.image.registry string "docker.io"
container_images.app_fluent_operator.image.repository string "kubesphere/fluent-operator"
container_images.app_fluent_operator.image.tag string "v2.7.0@sha256:b0668c0d878bde4ab04802a7e92d0dd3bef4c1fed1b5e63cf83d49bb3c5d3947"
container_images.app_glueops_alerts.cluster_monitoring.image.registry string "ghcr.io"
container_images.app_glueops_alerts.cluster_monitoring.image.repository string "glueops/cluster-monitoring"
container_images.app_glueops_alerts.cluster_monitoring.image.tag string "v0.8.0@sha256:79feeb74fc9e0ba5873d444689d7697926e533167bac7331e7edcb99858fbe49"
container_images.app_ingress_nginx.controller.image.registry string "registry.k8s.io"
container_images.app_ingress_nginx.controller.image.repository string "ingress-nginx/controller"
container_images.app_ingress_nginx.controller.image.tag string "v1.11.3@sha256:d56f135b6462cfc476447cfe564b83a45e8bb7da2774963b00d12161112270b7"
container_images.app_kube_prometheus_stack.grafana.image.registry string "docker.io"
container_images.app_kube_prometheus_stack.grafana.image.repository string "grafana/grafana"
container_images.app_kube_prometheus_stack.grafana.image.tag string "10.4.13@sha256:c8644d0d41757dd444bd1aabc23740be71f0a34549128454a2b37f57a0c496b0"
container_images.app_loki.loki.image.registry string "docker.io"
container_images.app_loki.loki.image.repository string "grafana/loki"
container_images.app_loki.loki.image.tag string "2.9.10@sha256:35b02acc67654ddc38273e519b4f26f3967a907b9db5489af300c21f37ee1ae7"
container_images.app_loki_alert_group_controller.loki_alert_group_controller.image.registry string "ghcr.io"
container_images.app_loki_alert_group_controller.loki_alert_group_controller.image.repository string "glueops/metacontroller-operator-loki-rule-group"
container_images.app_loki_alert_group_controller.loki_alert_group_controller.image.tag string "v0.4.6@sha256:61aa2e48fd5c2277551daca68f287e77530a357d280a8199a5db5724b255401c"
container_images.app_metacontroller.metacontroller.image.registry string "ghcr.io"
container_images.app_metacontroller.metacontroller.image.repository string "metacontroller/metacontroller"
container_images.app_metacontroller.metacontroller.image.tag string "v4.11.21@sha256:4cbf35c1c725b2c83b926d9ade1e282bf789bf4453f23fe2f1b055b781a6798c"
container_images.app_network_exporter.network_exporter.image.registry string "docker.io"
container_images.app_network_exporter.network_exporter.image.repository string "syepes/network_exporter"
container_images.app_network_exporter.network_exporter.image.tag string "1.7.9@sha256:36cd647c80c30e3f5b78f9d2ca60f38e1d024fb3b9588a845cac2dc3f4fb75e1"
container_images.app_promtail.promtail.image.registry string "docker.io"
container_images.app_promtail.promtail.image.repository string "grafana/promtail"
container_images.app_promtail.promtail.image.tag string "2.9.10@sha256:63a2e57a5b1401109f77d36a49a637889d431280ed38f5f885eedcd3949e52cf"
container_images.app_pull_request_bot.pull_request_bot.image.registry string "ghcr.io"
container_images.app_pull_request_bot.pull_request_bot.image.repository string "glueops/pull-request-bot"
container_images.app_pull_request_bot.pull_request_bot.image.tag string "v0.22.0@sha256:a7b28359d7e658d41a45f01e1eba4b6b57fe453263cd94698394b53b88520127"
container_images.app_qr_code_generator.qr_code_generator.image.registry string "ghcr.io"
container_images.app_qr_code_generator.qr_code_generator.image.repository string "glueops/qr-code-generator"
container_images.app_qr_code_generator.qr_code_generator.image.tag string "v0.7.0@sha256:bf8ed3bc7d036624e9317f3ffcbcb9a3f4609321e8886432d6b1a1ed94fcd005"
container_images.app_vault.vault.image.registry string "docker.io"
container_images.app_vault.vault.image.repository string "hashicorp/vault"
container_images.app_vault.vault.image.tag string "1.14.10@sha256:14be0a8eb323181a56d10facab3b424809d9921e85d2f2678126ce232766a8e1"
container_images.app_vault_init_controller.vault_init_controller.image.registry string "ghcr.io"
container_images.app_vault_init_controller.vault_init_controller.image.repository string "glueops/vault-init-controller"
container_images.app_vault_init_controller.vault_init_controller.image.tag string "v0.8.0@sha256:ece5c50b5c05b1c676e5b68c54aaced0899457f13d9e41b5ea2c41a63011500a"
daemonset_tolerations[0].effect string "NoSchedule"
daemonset_tolerations[0].operator string "Exists"
daemonset_tolerations[1].effect string "NoExecute"
daemonset_tolerations[1].key string "node.kubernetes.io/not-ready"
daemonset_tolerations[1].operator string "Exists"
daemonset_tolerations[2].effect string "NoExecute"
daemonset_tolerations[2].key string "node.kubernetes.io/unreachable"
daemonset_tolerations[2].operator string "Exists"
daemonset_tolerations[3].effect string "NoSchedule"
daemonset_tolerations[3].key string "node.kubernetes.io/disk-pressure"
daemonset_tolerations[3].operator string "Exists"
daemonset_tolerations[4].effect string "NoSchedule"
daemonset_tolerations[4].key string "node.kubernetes.io/memory-pressure"
daemonset_tolerations[4].operator string "Exists"
daemonset_tolerations[5].effect string "NoSchedule"
daemonset_tolerations[5].key string "node.kubernetes.io/pid-pressure"
daemonset_tolerations[5].operator string "Exists"
daemonset_tolerations[6].effect string "NoSchedule"
daemonset_tolerations[6].key string "node.kubernetes.io/unschedulable"
daemonset_tolerations[6].operator string "Exists"
daemonset_tolerations[7].effect string "NoSchedule"
daemonset_tolerations[7].key string "node.kubernetes.io/network-unavailable"
daemonset_tolerations[7].operator string "Exists"
dex.argocd.client_secret string "placeholder_dex_argocd_client_secret" Specify a unique password here. This will be used to connect argocd via OIDC to the Dex IDP. You can create one with in bash openssl rand -base64 32
dex.github.client_id string "placeholder_dex_github_client_id" To create a clientID please reference: https://github.com/GlueOps/github-oauth-apps/tree/v0.0.1
dex.github.client_secret string "placeholder_dex_github_client_secret" To create a clientSecret please reference: https://github.com/GlueOps/github-oauth-apps/tree/v0.0.1
dex.github.orgs list ["placeholder_admin_github_org_name","placeholder_tenant_github_org_name"] Specify the github orgs you want to allow access to. This is a list of strings. Note: users still need to be in the proper groups to have access.
dex.grafana.client_secret string "placeholder_dex_grafana_client_secret" Specify a unique password here. This will be used to connect grafana via OAuth to the Dex IDP. You can create one with in bash openssl rand -base64 32
dex.pomerium.client_secret string "placeholder_dex_pomerium_client_secret" Specify a unique password here. This will be used to connect argocd via OIDC to the Dex IDP. You can create one with in bash openssl rand -base64 32
dex.vault.client_secret string "placeholder_dex_vault_client_secret"
externalDns.aws_accessKey string "placeholder_externaldns_aws_access_key" Part of externaldns_iam_credentials output from terraform-module-cloud-multy-prerequisites: https://github.com/GlueOps/terraform-module-cloud-multy-prerequisites
externalDns.aws_region string "placeholder_aws_region" Should be the same primary_region you used in: https://github.com/GlueOps/terraform-module-cloud-multy-prerequisites
externalDns.aws_secretKey string "placeholder_externaldns_aws_secret_key" Part of externaldns_iam_credentials output from terraform-module-cloud-multy-prerequisites: https://github.com/GlueOps/terraform-module-cloud-multy-prerequisites
gitHub.github_app_b64enc_private_key string "placeholder_github_tenant_app_b64enc_private_key"
gitHub.github_app_id string "placeholder_github_tenant_app_id" Create an Application in the tenant's github organization that has repo scope access and can comment against PRs. https://docs.github.com/en/apps/creating-github-apps/setting-up-a-github-app/creating-a-github-app. Format the key using format using `cat
gitHub.github_app_installation_id string "placeholder_github_tenant_app_installation_id"
gitHub.tenant_github_org string "placeholder_tenant_github_org_name"
gitHub.tenant_github_org_and_team string "placeholder_tenant_github_org_name:developers" The format is: : (The team should include the developers)
glueops_alerts.opsgenie_apikey string "placeholder_opsgenie_api_key" Found at opsgenie_credentials in the json output that is part of opsgenie_prometheus_api_keys output from terraform-module-cloud-multy-prerequisites: https://github.com/GlueOps/terraform-module-cloud-multy-prerequisites
glueops_backups.s3_bucket_name string "glueops-tenant-placeholder_tenant_key-primary"
glueops_backups.tls_cert_backup.aws_accessKey string "placeholder_tls_cert_backup_aws_access_key" Part of loki_log_exporter output from terraform-module-cloud-multy-prerequisites: https://github.com/GlueOps/terraform-module-cloud-multy-prerequisites
glueops_backups.tls_cert_backup.aws_region string "placeholder_aws_region" Should be the same primary_region you used in: https://github.com/GlueOps/terraform-module-cloud-multy-prerequisites
glueops_backups.tls_cert_backup.aws_secretKey string "placeholder_tls_cert_backup_aws_secret_key" Part of loki_log_exporter output from terraform-module-cloud-multy-prerequisites: https://github.com/GlueOps/terraform-module-cloud-multy-prerequisites
glueops_backups.tls_cert_backup.backup_prefix string "placeholder_tls_cert_backup_s3_key_prefix"
glueops_backups.tls_cert_backup.company_key string "placeholder_tenant_key"
glueops_backups.vault.aws_accessKey string "placeholder_vault_aws_access_key" Part of vault_s3_iam_credentials output from terraform-module-cloud-multy-prerequisites: https://github.com/GlueOps/terraform-module-cloud-multy-prerequisites
glueops_backups.vault.aws_region string "placeholder_aws_region" Should be the same primary_region you used in: https://github.com/GlueOps/terraform-module-cloud-multy-prerequisites
glueops_backups.vault.aws_secretKey string "placeholder_vault_aws_secret_key" Part of vault_s3_iam_credentials output from terraform-module-cloud-multy-prerequisites: https://github.com/GlueOps/terraform-module-cloud-multy-prerequisites
glueops_backups.vault.company_key string "placeholder_tenant_key"
glueops_node_and_tolerations.nodeSelector."glueops.dev/role" string "glueops-platform"
glueops_node_and_tolerations.tolerations[0].effect string "NoSchedule"
glueops_node_and_tolerations.tolerations[0].key string "glueops.dev/role"
glueops_node_and_tolerations.tolerations[0].operator string "Equal"
glueops_node_and_tolerations.tolerations[0].value string "glueops-platform"
grafana.admin_password string "placeholder_grafana_admin_password" Default admin password. CHANGE THIS!!!!
grafana.github_other_org_names string "placeholder_tenant_github_org_name"
host_network.cert_manager.webhook_secure_port int 45020
host_network.enabled string "placeholder_enable_host_network"
host_network.external_secrets.webhook_port int 45010
host_network.keda.prometheus.metricServer.port int 45056
host_network.keda.prometheus.operator.port int 45055
host_network.keda.prometheus.webhooks.port int 45054
host_network.keda.service.portHttps int 45052
host_network.keda.service.portHttpsTarget int 45053
host_network.keda.webhooks.healthProbePort int 45051
host_network.keda.webhooks.port int 45050
host_network.kube_pometheus_stack.prometheusOperator.admissionWebhooks.deployment.tls.internal_port int 45041
host_network.kube_pometheus_stack.prometheusOperator.tls.internal_port int 45040
host_network.nginx_public.controller.host_port.ports.http int 45030
host_network.nginx_public.controller.host_port.ports.https int 45031
loki.aws_accessKey string "placeholder_loki_aws_access_key" Part of loki_s3_iam_credentials output from terraform-module-cloud-multy-prerequisites: https://github.com/GlueOps/terraform-module-cloud-multy-prerequisites
loki.aws_region string "placeholder_aws_region" Should be the same primary_region you used in: https://github.com/GlueOps/terraform-module-cloud-multy-prerequisites
loki.aws_secretKey string "placeholder_loki_aws_secret_key" Part of loki_s3_iam_credentials output from terraform-module-cloud-multy-prerequisites: https://github.com/GlueOps/terraform-module-cloud-multy-prerequisites
loki.bucket string "glueops-tenant-placeholder_tenant_key-placeholder_cluster_environment-loki-primary" Format: glueops-tenant-placeholder_tenant_key-placeholder_cluster_environment-loki-primary, Credentials found at loki_credentials of json output of terraform-module-cloud-multy-prerequisites
nginx.controller_replica_count int 2 number of replicas for ingress controller
prometheus.volume_claim_storage_request string "50" Volume of storage requested for each Prometheus PVC, in Gi
pull_request_bot.watch_for_apps_delay_seconds string "10" number of seconds to wait before checking ArgoCD for new applications
tls_cert_restore.aws_accessKey string "placeholder_tls_cert_restore_aws_access_key" Part of loki_log_exporter output from terraform-module-cloud-multy-prerequisites: https://github.com/GlueOps/terraform-module-cloud-multy-prerequisites
tls_cert_restore.aws_region string "placeholder_aws_region" Should be the same primary_region you used in: https://github.com/GlueOps/terraform-module-cloud-multy-prerequisites
tls_cert_restore.aws_secretKey string "placeholder_tls_cert_restore_aws_secret_key" Part of loki_log_exporter output from terraform-module-cloud-multy-prerequisites: https://github.com/GlueOps/terraform-module-cloud-multy-prerequisites
tls_cert_restore.backup_prefix string "placeholder_tls_cert_backup_s3_key_prefix"
tls_cert_restore.exclude_namespaces string "placeholder_tls_cert_restore_exclude_namespaces"
vault.data_storage int 10 Volume of storage requested for each Vault Data PVC, in Gi
vault_init_controller.aws_accessKey string "placeholder_vault_init_controller_aws_access_key" S3 Credentials to access the vault_access.json
vault_init_controller.aws_region string "placeholder_aws_region" S3 region to access the vault_access.json
vault_init_controller.aws_secretKey string "placeholder_vault_init_controller_aws_access_secret" S3 Credentials to access the vault_access.json
vault_init_controller.enable_restore bool true Enable/Disable restore of an existing backup upon a fresh deployment of vault during cluster bootstrap
vault_init_controller.pause_reconcile bool false Enable/Disable reconcile
vault_init_controller.reconcile_period int 30 How often the controller should run
vault_init_controller.s3_bucket_name string "glueops-tenant-placeholder_tenant_key-primary" S3 bucket that will store the vault unseal key(s) and root token
vault_init_controller.s3_key_path string "placeholder_vault_init_controller_s3_key" S3 key/path to the unseal key(s) and root token

About

This repository contains the GlueOps platform Helm chart, which is used to deploy and manage various applications and services on Kubernetes clusters. It includes configurations for applications like Vault, Dex, Promtail, Loki, QR Code Generator, and others. The chart facilitates automated deployments using Argo CD and simplifies cluster management

Topics

Resources

Stars

Watchers

Forks

Packages

No packages published

Languages