Skip to content

Commit 2972e4b

Browse files
feat: add separate redis for cf-argocd-extras and app-proxy
1 parent ba00efa commit 2972e4b

File tree

5 files changed

+23
-7
lines changed

5 files changed

+23
-7
lines changed

charts/gitops-runtime/README.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -695,7 +695,7 @@ redis-ha:
695695
| internal-router.serviceAccount.create | bool | `true` | |
696696
| internal-router.serviceAccount.name | string | `""` | |
697697
| internal-router.tolerations | list | `[]` | |
698-
| redis | object | `{"affinity":{},"enabled":true,"env":{},"envFrom":[],"extraArgs":[],"image":{"registry":"public.ecr.aws","repository":"docker/library/redis","tag":"8.2.1-alpine"},"imagePullSecrets":[],"livenessProbe":{"enabled":true,"failureThreshold":5,"initialDelaySeconds":30,"periodSeconds":15,"successThreshold":1,"timeoutSeconds":15},"metrics":{"enabled":true,"env":{},"envFrom":[],"image":{"registry":"ghcr.io","repository":"oliver006/redis_exporter","tag":"v1.72.1"},"livenessProbe":{"enabled":true,"failureThreshold":5,"initialDelaySeconds":30,"periodSeconds":15,"successThreshold":1,"timeoutSeconds":15},"readinessProbe":{"enabled":true,"failureThreshold":5,"initialDelaySeconds":30,"periodSeconds":15,"successThreshold":1,"timeoutSeconds":15},"resources":{},"serviceMonitor":{"enabled":false}},"nodeSelector":{},"pdb":{"annotations":{},"enabled":false,"labels":{},"maxUnavailable":"","minAvailable":1},"podAnnotations":{},"podLabels":{},"podSecurityContext":{},"readinessProbe":{"enabled":true,"failureThreshold":5,"initialDelaySeconds":30,"periodSeconds":15,"successThreshold":1,"timeoutSeconds":15},"resources":{},"securityContext":{},"service":{"annotations":{},"labels":{},"ports":{"metrics":{"port":9121,"targetPort":9121},"redis":{"port":6379,"targetPort":6379}},"type":"ClusterIP"},"serviceAccount":{"annotations":{},"create":true,"name":""},"tolerations":[],"topologySpreadConstraints":[]}` | Enable standalone redis deployment Will be replaced by redis-ha subchart when `redis-ha.enabled=true` |
698+
| redis | object | `{"affinity":{},"enabled":true,"env":{},"envFrom":[],"extraArgs":[],"fullnameOverride":"runtime-redis","image":{"registry":"public.ecr.aws","repository":"docker/library/redis","tag":"8.2.1-alpine"},"imagePullSecrets":[],"livenessProbe":{"enabled":true,"failureThreshold":5,"initialDelaySeconds":30,"periodSeconds":15,"successThreshold":1,"timeoutSeconds":15},"metrics":{"enabled":true,"env":{},"envFrom":[],"image":{"registry":"ghcr.io","repository":"oliver006/redis_exporter","tag":"v1.72.1"},"livenessProbe":{"enabled":true,"failureThreshold":5,"initialDelaySeconds":30,"periodSeconds":15,"successThreshold":1,"timeoutSeconds":15},"readinessProbe":{"enabled":true,"failureThreshold":5,"initialDelaySeconds":30,"periodSeconds":15,"successThreshold":1,"timeoutSeconds":15},"resources":{},"serviceMonitor":{"enabled":false}},"nodeSelector":{},"pdb":{"annotations":{},"enabled":false,"labels":{},"maxUnavailable":"","minAvailable":1},"podAnnotations":{},"podLabels":{},"podSecurityContext":{},"readinessProbe":{"enabled":true,"failureThreshold":5,"initialDelaySeconds":30,"periodSeconds":15,"successThreshold":1,"timeoutSeconds":15},"resources":{},"securityContext":{},"service":{"annotations":{},"labels":{},"ports":{"metrics":{"port":9121,"targetPort":9121},"redis":{"port":6379,"targetPort":6379}},"type":"ClusterIP"},"serviceAccount":{"annotations":{},"create":true,"name":""},"tolerations":[],"topologySpreadConstraints":[]}` | Enable standalone redis deployment Will be replaced by redis-ha subchart when `redis-ha.enabled=true` |
699699
| redis-ha.additionalAffinities | object | `{}` | Additional affinities to add to the Redis server pods. |
700700
| redis-ha.affinity | string | `""` | Assign custom [affinity] rules to the Redis pods. |
701701
| redis-ha.auth | bool | `true` | Configures redis-ha with AUTH |
@@ -705,7 +705,7 @@ redis-ha:
705705
| redis-ha.exporter.enabled | bool | `false` | Enable Prometheus redis-exporter sidecar |
706706
| redis-ha.exporter.image | string | `"ghcr.io/oliver006/redis_exporter"` | Repository to use for the redis-exporter |
707707
| redis-ha.exporter.tag | string | `"v1.69.0"` | Tag to use for the redis-exporter |
708-
| redis-ha.fullnameOverride | string | `"redis-ha"` | Full name of the Redis HA Resources |
708+
| redis-ha.fullnameOverride | string | `"runtime-redis-ha"` | Full name of the Redis HA Resources |
709709
| redis-ha.haproxy.additionalAffinities | object | `{}` | Additional affinities to add to the haproxy pods. |
710710
| redis-ha.haproxy.affinity | string | `""` | Assign custom [affinity] rules to the haproxy pods. |
711711
| redis-ha.haproxy.containerSecurityContext | object | See [values.yaml] | HAProxy container-level security context |

charts/gitops-runtime/templates/redis/_helpers.tpl

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -4,7 +4,7 @@ We truncate at 63 chars because some Kubernetes name fields are limited to this
44
If release name contains chart name it will be used as a full name.
55
*/}}
66
{{- define "redis.fullname" -}}
7-
{{- print "redis" }}
7+
{{- .Values.redis.fullnameOverride | default (print "redis") }}
88
{{- end }}
99

1010
{{/*

charts/gitops-runtime/tests/argo-api-gateway_test.yaml

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -13,7 +13,7 @@ tests:
1313
value: argo-cd-server:80
1414
- equal:
1515
path: data["redis.server"]
16-
value: redis:6379
16+
value: runtime-redis:6379
1717
- equal:
1818
path: data["repo.server"]
1919
value: argo-cd-repo-server:8081
@@ -82,7 +82,7 @@ tests:
8282
asserts:
8383
- equal:
8484
path: data["redis.server"]
85-
value: redis-ha-haproxy:6379
85+
value: runtime-redis-ha-haproxy:6379
8686

8787
- it: Argo Api Gateway should have CODEFRESH_SSL_CERT_PATH env var when .Values.global.codefresh.tls.caCerts.secret.create is true
8888
template: argo-gateway/deployment.yaml

charts/gitops-runtime/tests/event-reporters_test.yaml

Lines changed: 16 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -30,6 +30,21 @@ tests:
3030
path: metadata.name
3131
value: runtime-event-reporter
3232

33+
- it: Runtime Reporter ConfigMap should have valid data
34+
template: event-reporters/runtime-event-reporter/configmap.yaml
35+
values:
36+
- ./values/mandatory-values-ingress.yaml
37+
asserts:
38+
- equal:
39+
path: data["argocd.server"]
40+
value: argo-cd-server:80
41+
- equal:
42+
path: data["redis.server"]
43+
value: runtime-redis:6379
44+
- equal:
45+
path: data["repo.server"]
46+
value: argo-cd-repo-server:8081
47+
3348
- it: Runtime Reporter ConfigMap should have valid redis-ha url
3449
template: event-reporters/runtime-event-reporter/configmap.yaml
3550
values:
@@ -40,7 +55,7 @@ tests:
4055
asserts:
4156
- equal:
4257
path: data["redis.server"]
43-
value: redis-ha-haproxy:6379
58+
value: runtime-redis-ha-haproxy:6379
4459

4560
- it: Runtime Reporter should have CODEFRESH_SSL_CERT_PATH env var when .Values.global.codefresh.tls.caCerts.secret.create is true
4661
template: event-reporters/runtime-event-reporter/deployment.yaml

charts/gitops-runtime/values.yaml

Lines changed: 2 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -714,6 +714,7 @@ redis-secret-init:
714714
# Will be replaced by redis-ha subchart when `redis-ha.enabled=true`
715715
redis:
716716
enabled: true
717+
fullnameOverride: "runtime-redis"
717718
# -- Redis image
718719
image:
719720
registry: public.ecr.aws
@@ -809,7 +810,7 @@ redis-ha:
809810
# -- Enables the Redis HA subchart and disables the custom Redis single node deployment
810811
enabled: false
811812
# -- Full name of the Redis HA Resources
812-
fullnameOverride: "redis-ha"
813+
fullnameOverride: "runtime-redis-ha"
813814
## Redis image
814815
image:
815816
# -- Redis repository

0 commit comments

Comments
 (0)