GithubHelp home page GithubHelp logo

enix / helm-charts Goto Github PK

View Code? Open in Web Editor NEW
55.0 14.0 19.0 1.06 MB

A collection of Helm packages brought to you by Enix Monkeys :monkey_face:

Home Page: https://charts.enix.io

License: Apache License 2.0

Smarty 71.18% Mustache 28.82%
helm charts helm-charts

helm-charts's Introduction

The Enix Package collection for Kubernetes

A collection of Helm packages brought to you by Enix Monkeys ๐Ÿต.

TL;DR

$ helm repo add enix https://charts.enix.io/
$ helm search repo enix
$ helm install my-release enix/<chart>

Charts collection

The following helm charts are maintained:

Please refer to each individual documentation!

License

Copyright (c) 2022, 2023 ENIX

Licensed under the Apache License, Version 2.0 (the "License");
you may not use this file except in compliance with the License.
You may obtain a copy of the License at

    http://www.apache.org/licenses/LICENSE-2.0

Unless required by applicable law or agreed to in writing, software
distributed under the License is distributed on an "AS IS" BASIS,
WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
See the License for the specific language governing permissions and
limitations under the License.

helm-charts's People

Contributors

abuisine avatar arcln avatar devthejo avatar donch avatar kkonovodoff avatar monkeynator avatar naps avatar npdgm avatar oceyral avatar paullaffitte avatar rdegez avatar rustymunkey avatar tassatux avatar tiagoalves83 avatar vi7 avatar zempashi avatar

Stargazers

 avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar

Watchers

 avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar

helm-charts's Issues

I am unable to find the prometheus rules

Hi,

I have installed the helm with:

helm repo add enix https://charts.enix.io
helm repo update

NAMESPACE="x509-certificate-exporter"

helm upgrade x509-certificate-exporter enix/x509-certificate-exporter -f monitor-host-values.yaml \
    --install \
    --create-namespace \
    --namespace ${NAMESPACE}

The monitor-host-values.yaml contains:

hostPathsExporter:
  daemonSets:
    cp:
      nodeSelector:
        node-role.kubernetes.io/master: ""
      tolerations:
      - effect: NoSchedule
        key: node-role.kubernetes.io/master
        operator: Exists
      watchFiles:
      - /var/lib/kubelet/pki/kubelet-client-current.pem
      - /etc/kubernetes/pki/apiserver.crt
      - /etc/kubernetes/pki/apiserver-etcd-client.crt
      - /etc/kubernetes/pki/apiserver-kubelet-client.crt
      - /etc/kubernetes/pki/ca.crt
      - /etc/kubernetes/pki/front-proxy-ca.crt
      - /etc/kubernetes/pki/front-proxy-client.crt
      - /etc/kubernetes/pki/etcd/ca.crt
      - /etc/kubernetes/pki/etcd/healthcheck-client.crt
      - /etc/kubernetes/pki/etcd/peer.crt
      - /etc/kubernetes/pki/etcd/server.crt
      watchKubeconfFiles:
      - /etc/kubernetes/admin.conf
      - /etc/kubernetes/controller-manager.conf
      - /etc/kubernetes/scheduler.conf
    nodes:
      tolerations:
      - effect: NoSchedule
        key: node-role.kubernetes.io/ingress
        operator: Exists
      watchFiles:
      - /var/lib/kubelet/pki/kubelet-client-current.pem
      - /etc/kubernetes/pki/ca.crt

But I am unable to find the Prometheus rules. there is nothing in Prometheus (rules or alerts) with x509. I am running Kube-Prometheus-Stack 20.0.1 (Helm) with K8s 1.22.2

Can you help me out with this? Thanks!

Charts are not scoped

What I mean by this:

the values.yaml files in the charts are not something like:

---
x509-exporter:
  imagePullSecrets: []
  image:
    repository: enix/x509-exporter
  [...]

and

---
netbox:
  kind: StatefulSet
  statefulSet:

but they just simply contain the key:values without any scope.

Why is this a problem? For example we maintain a common values.yaml structure for all our Helm charts, so that the prometheus rules and the cert-manager configuration is in one common file; one can then use this single file with Helm and not dozens of values.yaml files for all the Helm charts.

Not limiting the chart's values to a scope means that it's not possible to have more than one chart's key:value pairs in one values.yaml file. We can't use something like repository: enix/x509-exporter in this common values.yaml file since it would affect all similarly non-scoped charts' repository key.

I hope I was able to describe the problem. I'd argue it's very common to use a scope for a chart, actually I know only one single chart which has the same issue (velero from vmware-tanzu) and every other chart I've ever seen has this main scope.

It'd be nice to adjust the charts like this if you're open for it.

Making use of the netbox initializers

I'd like to use the chart to deploy Netbox with some new custom fields using the initializers. Would you have an example the most efficient way to do this?

initializers -- Netbox initializer file content (mounted in /opt/netbox/initializers/)

initializers: {}

[kube-router] bgpGracefulRestart does not work as expected

It seems that there is a bug in the DaemonSet template :

        {{- if .bgpGracefulRestartDeferralTime }}
        - "--bgp-graceful-restart-deferral-time={{ .bgpGracefulRestartDeferralTime }}"
        {{- end }}
        {{- if .bgpGracefulRestartDeferralTime }}
        - "--bgp-graceful-restart={{ .bgpGracefulRestart }}"
        {{- end }}

the bgpGracefulRestart is not used

[netbox] How to upgrade netbox chart ?

How to upgrade netbox chart ?

I tried:

helm repo update
helm upgrade netbox-enix enix/netbox

got the following error:

$ helm upgrade netbox-enix enix/netbox
Error: UPGRADE FAILED: cannot patch "netbox-enix-postgresql" with kind StatefulSet: StatefulSet.apps "netbox-enix-postgresql" is invalid: spec: Forbidden: updates to statefulset spec for fields other than 'replicas', 'template', and 'updateStrategy' are forbidden. && cannot patch "netbox-enix" with kind StatefulSet: StatefulSet.apps "netbox-enix" is invalid: spec: Forbidden: updates to statefulset spec for fields other than 'replicas', 'template', and 'updateStrategy' are forbidden. 

x509-exporter exclude-list from watch-folder

On k8s cluster upgrade, when kubeadm rotate certificates, it keeps expired ones in /etc/kubernetes/pki/expired.

So the x509-exporter, having /etc/kubernetes/pki configured as watch-folder, will keep raising alarms on expired certificates in /etc/kubernetes/pki/expired.

Maybe we can add some way to exclude or ignore certains folders in the configured watchfolder.

extensions/v1beta1 deprecated

Replacing extensions/v1beta1 with networking.k8s.io/v1
`
diff -r netbox/templates/ingress.yaml netbox.orig/templates/ingress.yaml
4c4
< apiVersion: networking.k8s.io/v1

apiVersion: extensions/v1beta1
37d36
< pathType: ImplementationSpecific
39,42c38,39
< service:
< name: {{ $fullName }}
< port:
< name: http


          serviceName: {{ $fullName }}
          servicePort: http

`
patch attached (thanks to stupid filter: ingress.txt instead of ingress.patch
ingress.txt
)

Deprecation of netbox chart

We are considering deprecating netbox chart in favor of https://github.com/bootc/netbox-chart

Due to the lack of testing with ldap and other feature, and that our user base is less important than the one of bootc, we will face difficulties to provide full fledged chart as originally intended.

If you are using the netbox chart and see problem using the one of bootc, let us know in this issue

cc #40

kube-router: rbac.authorization.k8s.io/v1beta1 deprecated

Per kubectl warning:

Warning: rbac.authorization.k8s.io/v1beta1 ClusterRoleBinding is deprecated in v1.17+, unavailable in v1.22+;

The RBAC (ClusterRole and ClusterRoleBinding) in kube-router is using these deprecated APIs, should change to rbac.authorization.k8s.io/v1b in order to support new cluster versions.

Improve release workflow

Currently we can't release a chart if an other from the repository fails to build or wasn't pushed. Usually because files were altered and the version not bumped yet.

Perhaps we could use a matrix and run a job for each one. But also there's no need to trigger a workflow acting on all charts, so events would have to be filtered in some way. I don't like the idea of having multiple workflows but it would surely fix the situation for now.

[kube-router] hairpin mode misses configuration in cni-conf.json

while enable hairpinMode, a field must be added to the cni-conf.json :

  cni-conf.json: |
    {
       "cniVersion":"0.3.0",
       "name":"mynet",
       "plugins":[
          {
             "name":"kubernetes",
             "type":"bridge",
             "bridge":"kube-bridge",
             "isDefaultGateway":true,
             "hairpinMode":true,
             "ipam":{
                "type":"host-local"
             }
          }
       ]
    }

failed calling webhook "prometheusrulemutate.monitoring.coreos.com"

I tried to install your Helm chart into my on-prem kubernetes cluster by

$ helm -n monitoring install x509-certificate-exporter enix/x509-certificate-exporter -f ./x509-exporter.values.yml

The values.yml is still the default from your git repo.

My enabled admission plugins are

  • NodeRestriction
  • NamespaceLifecycle
  • LimitRanger
  • ServiceAccount
  • DefaultStorageClass
  • DefaultTolerationSeconds
  • MutatingAdmissionWebhook
  • ValidatingAdmissionWebhook
  • Priority
  • ResourceQuota
  • PodSecurityPolicy

I installed also a webhook:

apiVersion: admissionregistration.k8s.io/v1
kind: ValidatingWebhookConfiguration
metadata:
  name: prometheus-operator-rulesvalidation
webhooks:
  - clientConfig:
      caBundle: LS0tLS1CRUdJTiBDRVJUSUZJQ0FURS0tLS0tCk1JSUJjekNDQVJtZ0F3SUJBZ0lRZEtYaWh3Yk53UWpXWXdFVTJ6d3hvakFLQmdncWhrak9QUVFEQWpBT01Rd3cKQ2dZRFZRUUtFd051YVd3d0lCY05NakV3TXpJMU1ERXhOVEU0V2hnUE1qRXlNVEF6TURFd01URTFNVGhhTUE0eApEREFLQmdOV>
      service:
        name: prometheus-kube-prometheus-operator
        namespace: monitoring
        path: /admission-prometheusrules/mutate
    failurePolicy: Fail
    name: prometheusrulemutate.monitoring.coreos.com
    namespaceSelector: {}
    rules:
      - apiGroups:
          - monitoring.coreos.com
        apiVersions:
          - '*'
        operations:
          - CREATE
          - UPDATE
        resources:
          - prometheusrules
    admissionReviewVersions: ["v1", "v1beta1"]
    sideEffects: None

But I get all the time the follwoing error:

$ helm -n monitoring upgrade -i x509-certificate-exporter enix/x509-certificate-exporter -f ./x509-exporter.values.yml 
Error: UPGRADE FAILED: failed to create resource: Internal error occurred: failed calling webhook "prometheusrulemutate.monitoring.coreos.com": Post "https://prometheus-kube-prometheus-operator.monitoring.svc:443/admission-prometheusrules/mutate?timeout=10s": dial tcp 172.20.151.210:443: i/o timeout

The Service as well as the Pod for prometheus operator is installed, working and reachable inside monitoring namespace at 172.20.151.210:443.

[x509-exporter] should keep absolute path as labels

It is quite handy to have full path of certificates in the label.
Although I understand the motivation to manage complex scenarios, I think that we should have an option to keep full paths (maybe only in simple scenarios).

[netbox] Some Bugs with Openshift 3.11

What I tried:

helm install netbox-enix enix/netbox

BUG 1: postgresql image could not be pulled
Solution replace container location from docker.io/bitnami/postgresql:11.8.0-debian-10-r14 to bitnami/postgresql:11.8.0-debian-10-r14

BUG 2: redis image could not be pulled
Solution replace container location from docker.io/bitnami/redis:6.0.4-debian-10-r0 to bitnami/redis:6.0.4-debian-10-r0

BUG 3: netbox configuration error: REDIS_PORT enviroment variable was being set with: "tcp://x.x.x.x:6379"
Solution set REDIS_PORT= 6379 in netbox ConfigMap

BUG 4:
I am new to Helm, but I couldn't make Chart Values to work. I tried:

config.yaml

persistence:
  storageClassName: stage-nas-nfs-noresize

helm install -f config.yaml netbox-enix enix/netbox

and the PVC's did not add storageClassName config ...

Suggestion
Maybe you should put configuration.py in a configMap parameter.

Questions
a) Is it safe to apply netbox version upgrades with this helm chart ?
b) How can I use plugins with this helm chart ? I want to try https://github.com/iDebugAll/nextbox-ui-plugin

Recommend Projects

  • React photo React

    A declarative, efficient, and flexible JavaScript library for building user interfaces.

  • Vue.js photo Vue.js

    ๐Ÿ–– Vue.js is a progressive, incrementally-adoptable JavaScript framework for building UI on the web.

  • Typescript photo Typescript

    TypeScript is a superset of JavaScript that compiles to clean JavaScript output.

  • TensorFlow photo TensorFlow

    An Open Source Machine Learning Framework for Everyone

  • Django photo Django

    The Web framework for perfectionists with deadlines.

  • D3 photo D3

    Bring data to life with SVG, Canvas and HTML. ๐Ÿ“Š๐Ÿ“ˆ๐ŸŽ‰

Recommend Topics

  • javascript

    JavaScript (JS) is a lightweight interpreted programming language with first-class functions.

  • web

    Some thing interesting about web. New door for the world.

  • server

    A server is a program made to process requests and deliver data to clients.

  • Machine learning

    Machine learning is a way of modeling and interpreting data that allows a piece of software to respond intelligently.

  • Game

    Some thing interesting about game, make everyone happy.

Recommend Org

  • Facebook photo Facebook

    We are working to build community through open source technology. NB: members must have two-factor auth.

  • Microsoft photo Microsoft

    Open source projects and samples from Microsoft.

  • Google photo Google

    Google โค๏ธ Open Source for everyone.

  • D3 photo D3

    Data-Driven Documents codes.