Releases: iits-consulting/charts
cert-manager-1.14.5
Wrapper chart for cert-manager. Deploys a ClusterIssuer resource to bootstrap Let's encrypt cert generation
traefik-28.2.0
The traefik ingress controller with some additional resources and sane default values for IITS projects
ollama-0.8.2
Get up and running with large language models locally. ## Installing the Chart with iits ArgoCD yaml ollama: namespace: ollama repoURL: "https://charts.my-domain.com" targetRevision: "0.7.4" valueFile: "value-files/ollama/values.yaml"
value-files/ollama/values.yaml yaml ollama: ollama: gpu: enabled: "true" ingress: host: "ollama.my-domain.com" annotations: # Adds the oidc proxy upfront traefik.ingress.kubernetes.io/router.middlewares: "ollama-oidc-forward-auth-ollama@kubernetescrd, ollama-strip-prefix-ollama@kubernetescrd" webui: env: OLLAMA_API_BASE_URL: "https://ollama.my-domain.com/api" ingress: annotations: # Adds the oidc proxy upfront traefik.ingress.kubernetes.io/router.middlewares: "ollama-oidc-forward-auth-ollama@kubernetescrd" host: "ollama.my-domain.com" middleware: env: OLLAMA_URL: "http://ollama:11434" WEAVIATE_URL: "http://weaviate:80" ingress: annotations: # Adds the oidc proxy upfront traefik.ingress.kubernetes.io/router.middlewares: "ollama-oidc-forward-auth-ollama@kubernetescrd" host: "ollama.my-domain.com"
argocd-16.2.0
This chart is used to bootstrap a Kubernetes cluster with argocd
. You can use this chart to deploy argocd
through tools like terraform
. Usage example: hcl resource "helm_release" "argocd" { name = "argocd" repository = "https://charts.iits.tech" chart = "argocd" version = "16.2.0" namespace = "argocd" create_namespace = true wait = true atomic = true timeout = 900 // 15 Minutes render_subchart_notes = true dependency_update = true wait_for_jobs = true values = [ yamlencode({ projects = { infrastructure-charts = { projectValues = { # Set this to enable stage values-$STAGE.yaml stage = var.stage # Example values which are handed down to the project. Like this you can give over informations from terraform to argocd rootDomain = var.domain_name } git = { password = var.git_token repoUrl = "https://github.com/iits-consulting/otc-infrastructure-charts-template" } } } } ) ] }
In the project https://github.com/iits-consulting/otc-infrastructure-charts-template it expects a helm chart named infrastructure-charts and will install everything from there.
elasticsearch-8.9.1
Elasticsearch + filebeat + kibana with default common used indexes and Index Lifecycle Management. It comes also with a backup functionality. # Installing the Chart with iits ArgoCD ## Register the Chart yaml elasticsearch: namespace: monitoring targetRevision: "8.6.2" parameters: ingress.host: "admin.{{.Values.projectValues.rootDomain}}" backup.enabled: "false"
oidc-forward-auth-1.6.0
Forward Auth proxy with gogatekeeper. It replaces the old proxy mechanism ## Installing the Chart with iits ArgoCD yaml charts: oidc-forward-auth: namespace: routing targetRevision: "1.0.0" parameters: gatekeeper.config.client-id: "${vault:whatever/data/keycloak/keycloak_proxy_admin#client_id}" gatekeeper.config.client-secret: "${vault:whatever/data/keycloak/keycloak_proxy_admin#client_secret}" gatekeeper.config.discovery-url: "https://{{.Values.projectValues.authDomain}}/realms/{{.Values.projectValues.context}}" ingress.host: "my.protected.domain"
## Then use it like this yaml ingress: enabled: true # -- Mandatory, replace it with your host address host: annotations: traefik.ingress.kubernetes.io/router.entrypoints: websecure traefik.ingress.kubernetes.io/router.tls: "true" #namespace-name@kubernetescrd traefik.ingress.kubernetes.io/router.middlewares: routing-oidc-forward-auth@kubernetescrd # Creates default Ingress with tls and the given host from .Values.ingress.host defaultIngress: enabled: true
traefik-28.1.0
The traefik ingress controller with some additional resources and sane default values for IITS projects
traefik-27.0.2
The traefik ingress controller with some additional resources and sane default values for IITS projects
kyverno-2.0.1
This chart wraps the upstream kyverno
and kyverno-policies
chart and adds a few useful policies: - Verify all images are signed with cosign - Verify all images come from allowed image repositories - Replace the complete registry reference with a custom one - Prepend the image reference with a custom prefix, useful for e.g. pull-through caches
traefik-27.0.1
The traefik ingress controller with some additional resources and sane default values for IITS projects