Loading helm/capif/charts/mongo/templates/deployment.yaml +8 −0 Original line number Diff line number Diff line Loading @@ -40,11 +40,19 @@ spec: - name: http containerPort: {{ .Values.service.port }} protocol: TCP args: - mongod - "--setParameter" - "diagnosticDataCollectionEnabled=true" - "--setParameter" - "logComponentVerbosity={default: {verbosity: ${MONGODB_LOG_LEVEL}}}" env: - name: MONGO_INITDB_ROOT_PASSWORD value: {{ quote .Values.env.mongoInitdbRootPassword }} - name: MONGO_INITDB_ROOT_USERNAME value: {{ quote .Values.env.mongoInitdbRootUsername }} - name: MONGODB_LOG_LEVEL value: {{ .Values.env.mongoLeveLog }} livenessProbe: {{- toYaml .Values.livenessProbe | nindent 12 }} readinessProbe: Loading helm/capif/charts/mongo/values.yaml +1 −0 Original line number Diff line number Diff line Loading @@ -17,6 +17,7 @@ fullnameOverride: "" env: mongoInitdbRootPassword: example mongoInitdbRootUsername: root mongoLeveLog: 0 serviceAccount: # Specifies whether a service account should be created Loading helm/vault-job/vault-job.yaml +1 −1 Original line number Diff line number Diff line Loading @@ -76,7 +76,7 @@ data: vault write pki_int/intermediate/set-signed certificate=@capif_intermediate.cert.pem #Crear rol en Vault vault write pki_int/roles/my-ca use_csr_common_name=true require_cn=false allowed_domains="*" allow_any_name=true allow_bare_domains=true allow_glob_domains=true allow_subdomains=true max_ttl=4300h ttl=4300h vault write pki_int/roles/my-ca use_csr_common_name=false require_cn=false allowed_domains="*" allow_any_name=true allow_bare_domains=true allow_glob_domains=true allow_subdomains=true max_ttl=4300h ttl=4300h # Emitir un certificado firmado por la CA intermedia # vault write -format=json pki_int/issue/my-ca \ Loading Loading
helm/capif/charts/mongo/templates/deployment.yaml +8 −0 Original line number Diff line number Diff line Loading @@ -40,11 +40,19 @@ spec: - name: http containerPort: {{ .Values.service.port }} protocol: TCP args: - mongod - "--setParameter" - "diagnosticDataCollectionEnabled=true" - "--setParameter" - "logComponentVerbosity={default: {verbosity: ${MONGODB_LOG_LEVEL}}}" env: - name: MONGO_INITDB_ROOT_PASSWORD value: {{ quote .Values.env.mongoInitdbRootPassword }} - name: MONGO_INITDB_ROOT_USERNAME value: {{ quote .Values.env.mongoInitdbRootUsername }} - name: MONGODB_LOG_LEVEL value: {{ .Values.env.mongoLeveLog }} livenessProbe: {{- toYaml .Values.livenessProbe | nindent 12 }} readinessProbe: Loading
helm/capif/charts/mongo/values.yaml +1 −0 Original line number Diff line number Diff line Loading @@ -17,6 +17,7 @@ fullnameOverride: "" env: mongoInitdbRootPassword: example mongoInitdbRootUsername: root mongoLeveLog: 0 serviceAccount: # Specifies whether a service account should be created Loading
helm/vault-job/vault-job.yaml +1 −1 Original line number Diff line number Diff line Loading @@ -76,7 +76,7 @@ data: vault write pki_int/intermediate/set-signed certificate=@capif_intermediate.cert.pem #Crear rol en Vault vault write pki_int/roles/my-ca use_csr_common_name=true require_cn=false allowed_domains="*" allow_any_name=true allow_bare_domains=true allow_glob_domains=true allow_subdomains=true max_ttl=4300h ttl=4300h vault write pki_int/roles/my-ca use_csr_common_name=false require_cn=false allowed_domains="*" allow_any_name=true allow_bare_domains=true allow_glob_domains=true allow_subdomains=true max_ttl=4300h ttl=4300h # Emitir un certificado firmado por la CA intermedia # vault write -format=json pki_int/issue/my-ca \ Loading