Releases: iits-consulting/charts
traefik-32.1.1
The traefik ingress controller with some additional resources and sane default values for IITS projects. Always read the Changelog for information about possible migrations.
oidc-forward-auth-1.6.2
Forward Auth proxy with gogatekeeper. It replaces the old proxy mechanism ## Installing the Chart with iits ArgoCD yaml charts: oidc-forward-auth: namespace: routing targetRevision: "1.6.2" parameters: gatekeeper.config.client-id: "${vault:whatever/data/keycloak/keycloak_proxy_admin#client_id}" gatekeeper.config.client-secret: "${vault:whatever/data/keycloak/keycloak_proxy_admin#client_secret}" gatekeeper.config.discovery-url: "https://{{.Values.projectValues.authDomain}}/realms/{{.Values.projectValues.context}}" ingress.host: "my.protected.domain"
## Then use it like this yaml ingress: enabled: true # -- Mandatory, replace it with your host address host: annotations: traefik.ingress.kubernetes.io/router.entrypoints: websecure traefik.ingress.kubernetes.io/router.tls: "true" #namespace-name@kubernetescrd traefik.ingress.kubernetes.io/router.middlewares: routing-oidc-forward-auth@kubernetescrd # Creates default Ingress with tls and the given host from .Values.ingress.host defaultIngress: enabled: true
kyverno-2.1.1
This chart wraps the upstream kyverno
and kyverno-policies
chart and adds a few useful policies: - Verify all images are signed with cosign - Verify all images come from allowed image repositories - Replace the complete registry reference with a custom one - Prepend the image reference with a custom prefix, useful for e.g. pull-through caches
elastalert-0.3.0
Wrapper chart for elastalert2 with custom rules to kickstart IITS projects ## Installing the Chart with iits ArgoCD yaml elastalert: namespace: monitoring repoURL: "https://charts.iits.tech" targetRevision: "0.3.0" # If you need custom rules valueFile: "value-files/elastalert/values.yaml" parameters: customRules.slack.webhookUrl: "${vault:mySecretPath/data/common/slack#webhookUrl}"
cert-manager-1.16.1
Wrapper chart for cert-manager. Deploys a ClusterIssuer resource to bootstrap Let's encrypt cert generation
argocd-16.3.1
This chart is used to bootstrap a Kubernetes cluster with argocd
. You can use this chart to deploy argocd
through tools like terraform
. Usage example: hcl resource "helm_release" "argocd" { name = "argocd" repository = "https://charts.iits.tech" chart = "argocd" version = "16.3.0" namespace = "argocd" create_namespace = true wait = true atomic = true timeout = 900 // 15 Minutes render_subchart_notes = true dependency_update = true wait_for_jobs = true set_sensitive { name = "projects.app-charts.git.password" value = var.git_token } values = [ yamlencode({ projects = { infrastructure-charts = { projectValues = { # Set this to enable stage values-$STAGE.yaml stage = var.stage # Example values which are handed down to the project. Like this you can give over information from terraform to argo-cd rootDomain = var.domain_name } git = { repoUrl = "https://github.com/iits-consulting/otc-infrastructure-charts-template" } } } } ) ] }
In the project https://github.com/iits-consulting/otc-infrastructure-charts-template it expects a helm chart named infrastructure-charts and will install everything from there.
traefik-31.1.1
The traefik ingress controller with some additional resources and sane default values for IITS projects. Always read the Changelog for information about possible migrations.
traefik-31.0.0
The traefik ingress controller with some additional resources and sane default values for IITS projects. Always read the Changelog for information about possible migrations.
prometheus-stack-62.6.0
A complete monitoring/alerting stack with Grafana Prometheus Alertmanager ## Installing the Chart with iits ArgoCD yaml prometheus-stack: namespace: monitoring repoURL: "https://charts.iits.tech" targetRevision: "62.6.0" ignoreDifferences: - jsonPointers: - /imagePullSecrets kind: ServiceAccount syncOptions: - ServerSideApply=true parameters: global.alertmanager.host: "admin.{{.Values.projectValues.rootDomain}}" global.prometheus.host: "admin.{{.Values.projectValues.rootDomain}}" global.grafana.host: "admin.{{.Values.projectValues.rootDomain}}" prometheusStack.grafana.adminPassword: "REPLACE_ME"
cert-manager-1.15.3
Wrapper chart for cert-manager. Deploys a ClusterIssuer resource to bootstrap Let's encrypt cert generation