Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Added GCP supplemental values file #237

Open
wants to merge 15 commits into
base: main
Choose a base branch
from
Original file line number Diff line number Diff line change
@@ -0,0 +1,12 @@
rabbitmq:
global:
compatibility:
openshift:
priyadarshini-ni marked this conversation as resolved.
Show resolved Hide resolved
adaptSecurityContext: disabled

webserver:
redis-cluster:
global:
compatibility:
openshift:
adaptSecurityContext: disabled
354 changes: 354 additions & 0 deletions getting-started/templates/GCP/gcp-supplemental-values.yaml
Original file line number Diff line number Diff line change
@@ -0,0 +1,354 @@
global:
ingress:
api:
annotations:
kubernetes.io/ingress.class: <user-defined-ingress-class> #<ATTENTION> Enter the ingress class used
ui:
annotations:
kubernetes.io/ingress.class: <user-defined-ingress-class> #<ATTENTION> Enter the ingress class used

testmonitorservice:
## Configuring sidecars for the Test Monitor Service
## ref: https://cloud.google.com/sql/docs/postgres/connect-kubernetes-engine#run_the_in_a_sidecar_pattern
priyadarshini-ni marked this conversation as resolved.
Show resolved Hide resolved
sidecars:
priyadarshini-ni marked this conversation as resolved.
Show resolved Hide resolved
- name: cloud-sql-auth-proxy
image: gcr.io/cloud-sql-connectors/cloud-sql-proxy:2.8.0
priyadarshini-ni marked this conversation as resolved.
Show resolved Hide resolved
volumeMounts:
- name: <token-volume-name> #<ATTENTION> Enter the volume name where the token is mounted
readOnly: true
mountPath: <token-mount-path> #<ATTENTION> Enter the path where the token is mounted
- name: <config-volume-name> #<ATTENTION> Enter the volume name where config.json is mounted
mountPath: /secrets/
readOnly: true
env:
- name: "GOOGLE_APPLICATION_CREDENTIALS"
value: /secrets/service_account.json
args:
# If connecting from a VPC-native GKE cluster, you can use the
# following flag to have the proxy connect over private IP
- "--private-ip"
- "--auto-iam-authn"

# Enable structured logging with LogEntry format:
- "--structured-logs"
- "--exit-zero-on-sigterm"

# Replace DB_PORT with the port the proxy should listen on
- "--port=5432"
- "<connection-name>" #<ATTENTION> Enter the connection name from the CloudSQL instance
# - "--credentials-file=<token-mount-path>/token"
securityContext:
# The default Cloud SQL Auth Proxy image runs as the
# "nonroot" user and group (uid: 65532) by default.
runAsNonRoot: true
restartPolicy: Always
# You should use resource requests/limits as a best practice to prevent
# pods from consuming too many resources and affecting the execution of
# other pods. You should adjust the following values based on what your
# application needs. For details, see
# https://kubernetes.io/docs/concepts/configuration/manage-resources-containers/
resources:
requests:
# The proxy's memory use scales linearly with the number of active
# connections. Fewer open connections will use less memory. Adjust
# this value based on your application's requirements.
memory: "1Gi"
# The proxy's CPU use scales linearly with the amount of IO between
# the database and the application. Adjust this value based on your
# application's requirements.
cpu: "1"

## Volumes that can be used in sidecars
extraVolumes:
- name: <token-volume-name> #<ATTENTION> Enter the volume name where the token is to be mounted
projected:
sources:
- serviceAccountToken:
audience: <audience-name> #<ATTENTION> Enter the audience name for the projected service account token
expirationSeconds: 3600
path: token
- name: <config-volume-name> #<ATTENTION> Enter the volume name where config.json is to be mounted
secret:
secretName: <secret-name> #<ATTENTION> Enter the secret name where config.json going to be added.

connectionInfo:
## @param database.connectionInfo.host PostgreSQL hostname. Since the cloud-sql-auth-proxy is used, this value should be localhost.
##
host: "localhost"
## @param database.connectionInfo.port PostgreSQL port
##
port: <port>
## @param database.connectionInfo.dbName PostgreSQL database name
##
dbName: <database-name>
## @param database.connectionInfo.user PostgreSQL username used by the service
##
user: <username>
## @param database.connectionInfo.secretName The name of an existing secret with
## PostgreSQL connection credentials
##
secretName: <secret-name>
## @param database.connectionInfo.passwordKey Password key for database.connectionInfo.user to be retrieved from existing secret
## NOTE: Ignored unless `database.connectionInfo.secretName` parameter is set.
##
# passwordKey: "passkey"
## @param database.connectionInfo.migrationPasswordKey Password key for database.connectionInfo.migrationUser to be retrieved from existing secret
## If unset database.connectionInfo.passwordKey is used instead.
## NOTE: Ignored unless `database.connectionInfo.secretName` parameter is set.
##
migrationPasswordKey: null

serviceAccount:
## @param serviceAccount.annotations Annotations to add to the service account
##
annotations:
{
iam.gke.io/gcp-service-account=YOUR-GSA-NAME@YOUR-GOOGLE-CLOUD-PROJECT.iam.gserviceaccount.com,
}
priyadarshini-ni marked this conversation as resolved.
Show resolved Hide resolved
## @param serviceAccount.name The name of the service account to use.
## If not set and create is true, a name is generated using the fullname template
priyadarshini-ni marked this conversation as resolved.
Show resolved Hide resolved
##
name: ""

dashboardhost:
grafana:
## Configuring extraContainers for the Dashboardhost service
priyadarshini-ni marked this conversation as resolved.
Show resolved Hide resolved
## ref: https://cloud.google.com/sql/docs/postgres/connect-kubernetes-engine#run_the_in_a_sidecar_pattern
extraContainers: |
- name: cloud-sql-auth-proxy
image: gcr.io/cloud-sql-connectors/cloud-sql-proxy:2.8.0
volumeMounts:
- name: <token-volume-name> #ATTENTION Enter the volume name where the token is mounted
mountPath: <token-mount-path> #<ATTENTION> Enter the path where the token is mounted
readOnly: true
- name: <config-volume-name> #ATTENTION Enter the volume name where config.json is mounted
mountPath: /secrets/
readOnly: true
env:
- name: "GOOGLE_APPLICATION_CREDENTIALS"
value: /secrets/service_account.json
# - name: DB_HOST
# valueFrom:
# secretKeyRef:
# name: "cloud-sql-ip"
# key: db_host
args:
# If connecting from a VPC-native GKE cluster, you can use the
# following flag to have the proxy connect over private IP
- "--private-ip"
- "--auto-iam-authn"

# Enable structured logging with LogEntry format:
- "--structured-logs"
- "--exit-zero-on-sigterm"

# Replace DB_PORT with the port the proxy should listen on
- "--port=5432"
- "<connection-name>" #<ATTENTION> Enter the connection name from the CloudSQL instance
# - "--credentials-file=<token-mount-path>/token"
securityContext:
# The default Cloud SQL Auth Proxy image runs as the
# "nonroot" user and group (uid: 65532) by default.
runAsNonRoot: true
# You should use resource requests/limits as a best practice to prevent
# pods from consuming too many resources and affecting the execution of
# other pods. You should adjust the following values based on what your
# application needs. For details, see
# https://kubernetes.io/docs/concepts/configuration/manage-resources-containers/
restartPolicy: Always
resources:
requests:
# The proxy's memory use scales linearly with the number of active
# connections. Fewer open connections will use less memory. Adjust
# this value based on your application's requirements.
memory: "1Gi"
# The proxy's CPU use scales linearly with the amount of IO between
# the database and the application. Adjust this value based on your
# application's requirements.
cpu: "0.5"

## Volumes that can be used in extra containers
extraContainerVolumes:
- name: <token-volume-name> #<ATTENTION> Enter the volume name where the token is to be mounted
projected:
sources:
- serviceAccountToken:
audience: <audience-name> #<ATTENTION> Enter the audience for the projected service account token
expirationSeconds: 3600
path: token
- name: <config-volume-name> #<ATTENTION> Enter the volume name where config.json is to be mounted
secret:
secretName: <config-secret> #<ATTENTION> Enter the secret name where config.json going to be added.

connectionInfo:
priyadarshini-ni marked this conversation as resolved.
Show resolved Hide resolved
## @param database.connectionInfo.host PostgreSQL hostname. Since the cloud-sql-auth-proxy is used, this value should be localhost.
##
host: "localhost"
## @param database.connectionInfo.port PostgreSQL port
##
port: <port>
## @param database.connectionInfo.dbName PostgreSQL database name
##
dbName: <database-name>
priyadarshini-ni marked this conversation as resolved.
Show resolved Hide resolved
## @param database.connectionInfo.user PostgreSQL username used by the service
##
user: <username>
## @param database.connectionInfo.secretName The name of an existing secret with
## PostgreSQL connection credentials
##
secretName: <secret-name>
## @param database.connectionInfo.passwordKey Password key for database.connectionInfo.user to be retrieved from existing secret
## NOTE: Ignored unless `database.connectionInfo.secretName` parameter is set.
##
# passwordKey: "passkey"
## @param database.connectionInfo.migrationPasswordKey Password key for database.connectionInfo.migrationUser to be retrieved from existing secret
## If unset database.connectionInfo.passwordKey is used instead.
## NOTE: Ignored unless `database.connectionInfo.secretName` parameter is set.
##
migrationPasswordKey: null

serviceAccount:
## @param serviceAccount.annotations Annotations to add to the service account
##
annotations:
{
iam.gke.io/gcp-service-account=YOUR-GSA-NAME@YOUR-GOOGLE-CLOUD-PROJECT.iam.gserviceaccount.com,
}
## @param serviceAccount.name The name of the service account to use.
## If not set and create is true, a name is generated using the fullname template
##
name: ""

dynamicformfields:
## Configuring sidecars for the Dynamic Form Fields Service
## ref: https://cloud.google.com/sql/docs/postgres/connect-kubernetes-engine#run_the_in_a_sidecar_pattern
sidecars:
- name: cloud-sql-auth-proxy
image: gcr.io/cloud-sql-connectors/cloud-sql-proxy:2.8.0
volumeMounts:
- name: <token-volume-name> #<ATTENTION> Enter the volume name where the token is mounted
readOnly: true
mountPath: <token-mount-path> #<ATTENTION> Enter the path where the token is mounted
- name: <config-volume-name> #<ATTENTION> Enter the volume name where config.json is mounted
mountPath: /secrets/
readOnly: true
env:
- name: "GOOGLE_APPLICATION_CREDENTIALS"
value: /secrets/service_account.json
args:
# If connecting from a VPC-native GKE cluster, you can use the
# following flag to have the proxy connect over private IP
- "--private-ip"
- "--auto-iam-authn"

# Enable structured logging with LogEntry format:
- "--structured-logs"
- "--exit-zero-on-sigterm"

# Replace DB_PORT with the port the proxy should listen on
- "--port=5432"
- "<connection-name>" #<ATTENTION> Enter the connection name from the CloudSQL instance
# - "--credentials-file=<token-mount-path>/token"
securityContext:
# The default Cloud SQL Auth Proxy image runs as the
# "nonroot" user and group (uid: 65532) by default.
runAsNonRoot: true
restartPolicy: Always
# You should use resource requests/limits as a best practice to prevent
# pods from consuming too many resources and affecting the execution of
# other pods. You should adjust the following values based on what your
# application needs. For details, see
# https://kubernetes.io/docs/concepts/configuration/manage-resources-containers/
resources:
requests:
# The proxy's memory use scales linearly with the number of active
# connections. Fewer open connections will use less memory. Adjust
# this value based on your application's requirements.
memory: "1Gi"
# The proxy's CPU use scales linearly with the amount of IO between
# the database and the application. Adjust this value based on your
# application's requirements.
cpu: "1"

## Volumes that can be used in extra containers
extraVolumes:
- name: <token-volume-name> #<ATTENTION> Enter the volume name where the token is to be mounted
projected:
sources:
- serviceAccountToken:
audience: <audience-name> #<ATTENTION> Enter the audience for the projected service account token
expirationSeconds: 3600
path: token
- name: <config-volume-name> #<ATTENTION> Enter the volume name where config.json is to be mounted
secret:
secretName: <secret-name> #<ATTENTION> Enter the secret name where config.json going to be added.
priyadarshini-ni marked this conversation as resolved.
Show resolved Hide resolved

connectionInfo:
## @param database.connectionInfo.host PostgreSQL hostname. Since the cloud-sql-auth-proxy is used, this value should be localhost
##
host: "localhost"
## @param database.connectionInfo.port PostgreSQL port
##
port: <port>
## @param database.connectionInfo.dbName PostgreSQL database name
##
dbName: <database-name>
## @param database.connectionInfo.user PostgreSQL username used by the service
##
user: <username>
## @param database.connectionInfo.secretName The name of an existing secret with
## PostgreSQL connection credentials
##
secretName: <secret-name>
## @param database.connectionInfo.passwordKey Password key for database.connectionInfo.user to be retrieved from existing secret
## NOTE: Ignored unless `database.connectionInfo.secretName` parameter is set.
##
# passwordKey: "passkey"
## @param database.connectionInfo.migrationPasswordKey Password key for database.connectionInfo.migrationUser to be retrieved from existing secret
## If unset database.connectionInfo.passwordKey is used instead.
## NOTE: Ignored unless `database.connectionInfo.secretName` parameter is set.
##
migrationPasswordKey: null

serviceAccount:
## @param serviceAccount.annotations Annotations to add to the service account
##
annotations:
{
iam.gke.io/gcp-service-account=YOUR-GSA-NAME@YOUR-GOOGLE-CLOUD-PROJECT.iam.gserviceaccount.com,
}
## @param serviceAccount.name The name of the service account to use.
## If not set and create is true, a name is generated using the fullname template
##
name: ""

fileingestion:
priyadarshini-ni marked this conversation as resolved.
Show resolved Hide resolved
s3:
port: 443
bucket: <name-of-gcs-bucket> #<ATTENTION> Enter the name of the GCS bucket for fileingestion service
scheme: "https://"
host: "storage.googleapis.com"

feedservice:
s3:
port: 443
bucket: <name-of-gcs-bucket> #<ATTENTION> Enter the name of the GCS bucket for feedservice service
scheme: "https://"
host: "storage.googleapis.com"

saltmaster:
priyadarshini-ni marked this conversation as resolved.
Show resolved Hide resolved
serviceTCP:
type: LoadBalancer

nbexecservice:
priyadarshini-ni marked this conversation as resolved.
Show resolved Hide resolved
argo:
## Configure S3/MinIO access.
priyadarshini-ni marked this conversation as resolved.
Show resolved Hide resolved
##
artifactRepository:
priyadarshini-ni marked this conversation as resolved.
Show resolved Hide resolved
s3:
bucket: <name-of-gcs-bucket> #<ATTENTION> Enter the name of the GCS bucket for nbexecservice service
port: 443
region: "us-east1"
priyadarshini-ni marked this conversation as resolved.
Show resolved Hide resolved
insecure: false
scheme: "https://"
host: "storage.googleapis.com"
Loading