diff --git a/helm/capif/charts/mongo/templates/deployment.yaml b/helm/capif/charts/mongo/templates/deployment.yaml index 80cedad5207f48141191f03ba58e0ec9bdf09646..0066ead79f43b3a1a0ec450c3fb77846f0d4dca2 100644 --- a/helm/capif/charts/mongo/templates/deployment.yaml +++ b/helm/capif/charts/mongo/templates/deployment.yaml @@ -40,11 +40,19 @@ spec: - name: http containerPort: {{ .Values.service.port }} protocol: TCP + args: + - mongod + - "--setParameter" + - "diagnosticDataCollectionEnabled=true" + - "--setParameter" + - "logComponentVerbosity={default: {verbosity: ${MONGODB_LOG_LEVEL}}}" env: - name: MONGO_INITDB_ROOT_PASSWORD value: {{ quote .Values.env.mongoInitdbRootPassword }} - name: MONGO_INITDB_ROOT_USERNAME value: {{ quote .Values.env.mongoInitdbRootUsername }} + - name: MONGODB_LOG_LEVEL + value: {{ .Values.env.mongoLeveLog }} livenessProbe: {{- toYaml .Values.livenessProbe | nindent 12 }} readinessProbe: diff --git a/helm/capif/charts/mongo/values.yaml b/helm/capif/charts/mongo/values.yaml index 53b8cf5f9bff46c918a9354c1e2f2f56eba1419f..a226dba62e3692591717a4b86f058c8d5640941f 100644 --- a/helm/capif/charts/mongo/values.yaml +++ b/helm/capif/charts/mongo/values.yaml @@ -17,6 +17,7 @@ fullnameOverride: "" env: mongoInitdbRootPassword: example mongoInitdbRootUsername: root + mongoLeveLog: 0 serviceAccount: # Specifies whether a service account should be created diff --git a/helm/vault-job/vault-job.yaml b/helm/vault-job/vault-job.yaml index 84b247fc65ad091304fbdb6d8bd832b631ef2e54..a68f2f9eb0c1e142be88606b3ea246cf97748cd5 100644 --- a/helm/vault-job/vault-job.yaml +++ b/helm/vault-job/vault-job.yaml @@ -76,7 +76,7 @@ data: vault write pki_int/intermediate/set-signed certificate=@capif_intermediate.cert.pem #Crear rol en Vault - vault write pki_int/roles/my-ca use_csr_common_name=true require_cn=false allowed_domains="*" allow_any_name=true allow_bare_domains=true allow_glob_domains=true allow_subdomains=true max_ttl=4300h ttl=4300h + vault write pki_int/roles/my-ca use_csr_common_name=false require_cn=false allowed_domains="*" allow_any_name=true allow_bare_domains=true allow_glob_domains=true allow_subdomains=true max_ttl=4300h ttl=4300h # Emitir un certificado firmado por la CA intermedia # vault write -format=json pki_int/issue/my-ca \