You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardexpand all lines: CHANGELOG.md
+2
Original file line number
Diff line number
Diff line change
@@ -2,6 +2,8 @@
2
2
3
3
### Added
4
4
5
+
-[PR #476](https://github.com/konpyutaika/nifikop/pull/475) - **[Helm Chart]** Added option in nifi-parameter-context helm chart to support setting `inheritedParameterContexts`.
6
+
5
7
### Changed
6
8
7
9
-[PR #474](https://github.com/konpyutaika/nifikop/pull/474) - **[NiGoApi]** Upgrade NiGoApi to v0.1.3.
Copy file name to clipboardexpand all lines: helm/nifi-cluster/README.md
+2-1
Original file line number
Diff line number
Diff line change
@@ -94,7 +94,8 @@ A Helm chart for deploying NiFi clusters in Kubernetes
94
94
| logging.outputs | object |`{"globalOutputRefs":["loki-cluster-output"]}`| Only global outputs that have been created separately to this helm chart supported for now may consider changing this to a Flow per cluster in future |
95
95
| monitoring | object |`{"enabled":false}`| Monitoring is enabled by the Prometheus operator. This can be deployed stand-alone or as a part of the Rancher Monitoring application. Do not enable this unless you've installed rancher-logging or the Prometheus operator directly. https://rancher.com/docs/rancher/v2.6/en/monitoring-alerting/ Enabling monitoring creates a `ServiceMonitor` custom resource and routes logs to the output of your choice |
96
96
| nodeGroupAutoscalers | list |`[{"downscaleStrategy":"lifo","enabled":false,"horizontalAutoscaler":{"maxReplicas":2,"minReplicas":1},"name":"default-group-autoscaler","nodeConfig":{},"nodeConfigGroupId":"default-group","nodeLabelsSelector":{"matchLabels":{"default-scale-group":"true"}},"readOnlyConfig":{},"replicas":null,"upscaleStrategy":"simple"}]`| Nifi NodeGroup Autoscaler configurations. Use this to autoscale any NodeGroup specified in `cluster.nodeConfigGroups`. To autoscale See https://konpyutaika.github.io/nifikop/docs/5_references/7_nifi_nodegroup_autoscaler|
97
-
| parameterContexts | list |`[{"enabled":false,"name":"default","parameters":[{"description":"my foo bar property","name":"foo-prop","sensitive":false,"value":"bar-value"},{"description":"my foo bar property","name":"foo-prop-2","sensitive":true,"value":"bar-value-2"}],"secretRefs":[]}]`| Parameter context configurations. This is required if you wish to deploy versioned flows via the dataflow config. However, it is not required to provide secret refs. You must provide at least one parameter or nifikop will choke on updating dataflows. The `.name` field must be safe in Kubernetes and match the pattern [A-Za-z0-9-] See https://konpyutaika.github.io/nifikop/docs/5_references/4_nifi_parameter_context|
97
+
| parameterContexts | list |`[{"enabled":false,"inheritedParameterContexts":[],"name":"default","parameters":[{"description":"my foo bar property","name":"foo-prop","sensitive":false,"value":"bar-value"},{"description":"my foo bar property","name":"foo-prop-2","sensitive":true,"value":"bar-value-2"}],"secretRefs":[]}]`| Parameter context configurations. This is required if you wish to deploy versioned flows via the dataflow config. However, it is not required to provide secret refs. You must provide at least one parameter or nifikop will choke on updating dataflows. The `.name` field must be safe in Kubernetes and match the pattern [A-Za-z0-9-] See https://konpyutaika.github.io/nifikop/docs/5_references/4_nifi_parameter_context|
98
+
| parameterContexts[0].inheritedParameterContexts | list |`[]`| List of references of Parameter Contexts from which this one inherits parameters |
98
99
| parameterContexts[0].secretRefs | list |`[]`| Use the given secret and put its values as sensitive values in this parameter context. The key will be the name of parameter in NiFi. |
99
100
| registryClients | list |`[{"description":"Default NiFi Registry client","enabled":false,"endpoint":"http://nifi-registry","name":"default"},{"description":"Alternate NiFi Registry client","enabled":false,"endpoint":"http://nifi-registry","name":"alternate"}]`| registry client configurations. You'd use this to version control process groups & store the configuration in a registry bucket This is required if you wish to deploy versioned flows via the dataflow config The .name field must be safe in Kubernetes and match the pattern [A-Za-z0-9-] See https://konpyutaika.github.io/nifikop/docs/5_references/3_nifi_registry_client|
100
101
| userGroups | list |`[]`| Configure user groups. Each will result in the creation of a `NiFiUserGroup` CRD in k8s, which the operator takes and applies to each nifi configuration. See all properties here: https://konpyutaika.github.io/nifikop/docs/5_references/6_nifi_usergroup|
0 commit comments