-
Notifications
You must be signed in to change notification settings - Fork 0
Expand file tree
/
Copy pathapplication.yml
More file actions
192 lines (191 loc) · 7.11 KB
/
application.yml
File metadata and controls
192 lines (191 loc) · 7.11 KB
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
122
123
124
125
126
127
128
129
130
131
132
133
134
135
136
137
138
139
140
141
142
143
144
145
146
147
148
149
150
151
152
153
154
155
156
157
158
159
160
161
162
163
164
165
166
167
168
169
170
171
172
173
174
175
176
177
178
179
180
181
182
183
184
185
186
187
188
189
190
191
192
quarkus:
console:
color: true
log:
console:
json:
enabled: false
log-format: ECS
kubernetes-client:
devservices:
enabled: true
# To not use our default kubeconfig from the home directory, which could lead to
# potential damage if we had the permissions to install the CRD in an existing configured cluster context.
# By setting this to true, Quarkus will use a temporary kubeconfig that will be removed after the test.
override-kubeconfig: true
flavor: k3s
# See https://github.com/dajudge/kindcontainer/blob/master/k8s-versions.json
api-version: 1.34.1
live-reload:
instrumentation: true
micrometer:
enabled: true
datasource:
devservices:
enabled: true
image-name: postgres:18
username: root
password: password
reuse: false
jdbc:
metrics:
enabled: true
operator-sdk:
crd:
generate: true
# NOTE that this option is only considered when *not* in production mode
# as applying the CRD to a production cluster could be dangerous if done automatically.
apply: true
# Whether controllers should only process events if the associated resource generation
# has increased since the last reconciliation, otherwise will process all events.
generation-aware: true
test:
hang-detection-timeout: PT1M
# Config for the generated Helm chart #
# Container Image config for Kubernetes Helm #
container-image:
registry: ghcr.io
group: aboutbits
name: postgresql-operator
tag: ${quarkus.application.version}
helm:
app-version: ${quarkus.application.version}
type: application
name: ${quarkus.kubernetes.name}
description: AboutBits PostgreSQL Operator Helm Chart
# Keep the map-system-properties flag below on false, else it will map all ${ENV_VARS} we define in the application.yml or application-prod.yml files.
# In Kubernetes the env entries take precedence over envFrom entries
map-system-properties: false
home: https://github.com/aboutbits/postgresql-operator
sources:
- https://github.com/aboutbits/postgresql-operator
annotations:
"catalog.cattle.io/os": linux
keywords:
- aboutbits
- postgresql
- operator
maintainers:
"AboutBits":
name: AboutBits
email: info@aboutbits.it
url: https://aboutbits.it/
create-tar-file: false
extension: tgz
values:
replicas:
property: replicas
value-as-int: 1
paths:
- (kind == Deployment).spec.replicas
image-pull-policy:
property: imagePullPolicy
value: IfNotPresent
paths:
- (kind == Deployment).spec.template.spec.containers.(name == ${quarkus.kubernetes.name}).imagePullPolicy
image-pull-secrets:
property: imagePullSecrets
value:
- null
paths:
- (kind == Deployment).spec.template.spec.imagePullSecrets
expression: "{{- if eq (toYaml .Values.app.imagePullSecrets | trim) \"- {}\" }} null{{- else }}{{- toYaml .Values.app.imagePullSecrets | nindent 8 }}{{- end }}"
description: Kubernetes image pull secrets to use if the OCI image is hosted on a private registry
resource-requests-cpu:
property: resources.requests.cpu
value: ${quarkus.kubernetes.resources.requests.cpu}
paths:
- (kind == Deployment).spec.template.spec.containers.(name == ${quarkus.kubernetes.name}).resources.requests.cpu
resource-requests-memory:
property: resources.requests.memory
value: ${quarkus.kubernetes.resources.requests.memory}
paths:
- (kind == Deployment).spec.template.spec.containers.(name == ${quarkus.kubernetes.name}).resources.requests.memory
resource-limits-memory:
property: resources.limits.memory
value: ${quarkus.kubernetes.resources.limits.memory}
paths:
- (kind == Deployment).spec.template.spec.containers.(name == ${quarkus.kubernetes.name}).resources.limits.memory
affinity:
property: affinity
value-as-map: {}
paths:
- (kind == Deployment).spec.template.spec.affinity
description: Kubernetes affinity configuration for Pod scheduling
console-color:
property: envs.QUARKUS_CONSOLE_COLOR
value-as-bool: ${quarkus.console.color}
description: If color should be enabled or disabled. If this is unset, then an attempt will be made to guess if the terminal supports color.
log-console-json-enabled:
property: envs.QUARKUS_LOG_CONSOLE_JSON_ENABLED
value-as-bool: ${quarkus.log.console.json.enabled}
description: Determine whether to enable the JSON console formatting extension, which disables "normal" console formatting.
log-console-json-log-format:
property: envs.QUARKUS_LOG_CONSOLE_JSON_LOG_FORMAT
value: ${quarkus.log.console.json.log-format}
description: Specify the format of the produced JSON. Supported values are "DEFAULT", "ECS", and "GCP".
values-schema:
properties:
"affinity":
name: app.affinity
type: object
expressions:
release-name-labels:
expression: "{{ .Release.Name }}"
path: metadata.labels.'app.kubernetes.io/name'
release-name-service-selector:
expression: "{{ .Release.Name }}"
path: (kind == Service).spec.selector.'app.kubernetes.io/name'
release-name-deployment-match-labels:
expression: "{{ .Release.Name }}"
path: (kind == Deployment).spec.selector.matchLabels.'app.kubernetes.io/name'
release-name-deployment-labels:
expression: "{{ .Release.Name }}"
path: (kind == Deployment).spec.template.metadata.labels.'app.kubernetes.io/name'
affinity:
expression: "{{- toYaml (.Values.app.affinity | default dict) | nindent 8 }}"
path: (kind == Deployment).spec.template.spec.affinity
kubernetes:
name: postgresql-operator
version: ${quarkus.application.version}
add-version-to-label-selectors: false
image-pull-policy: IfNotPresent
replicas: 1
annotations:
"app.kubernetes.io/version": ${quarkus.application.version}
resources:
requests:
cpu: 50m
memory: 300Mi
limits:
memory: 512Mi
prometheus:
generate-service-monitor: false
startup-probe:
http-action-port-name: http
initial-delay: PT2S
period: PT10S
timeout: PT3S
success-threshold: 1
failure-threshold: 20
readiness-probe:
http-action-port-name: http
initial-delay: PT0S
period: PT5S
timeout: PT3S
success-threshold: 1
failure-threshold: 20
liveness-probe:
http-action-port-name: http
initial-delay: PT5S
period: PT10S
timeout: PT3S
success-threshold: 1
failure-threshold: 20
env:
fields:
KUBERNETES_NODE_NAME: spec.nodeName
vars:
QUARKUS_CONSOLE_COLOR: ${quarkus.console.color}
QUARKUS_LOG_CONSOLE_JSON_ENABLED: ${quarkus.log.console.json.enabled}
QUARKUS_LOG_CONSOLE_JSON_LOG_FORMAT: ${quarkus.log.console.json.log-format}