Skip to content

Instantly share code, notes, and snippets.

@dsandip
Last active May 5, 2022 08:26
Show Gist options
  • Save dsandip/5a2cb5db11d893d95b97250a775124b6 to your computer and use it in GitHub Desktop.
Save dsandip/5a2cb5db11d893d95b97250a775124b6 to your computer and use it in GitHub Desktop.
sample override file for using a private container registry with Hasura E.E
# For more information on configuration options, refer to https://docs.pro.hasura.io/custom-installation/helm-configs/
global:
# Allowed values: http, https
uriScheme: "http"
# Set to the configured domain / Ingress' loadbalancerIP.nip.io
domain: "35.235.7.103.nip.io"
# Set to the k8s namespace the resources should be deployed to.The namespace should exist before applying the manifest
namespace: "default"
# Configure the container registry to be used; defaults to gcr.io/hasura-ee
containerRegistry: "docker.io/yourcompany"
# Enable subdomain based deployment, defaults to path based deployment [false]
subDomain: false
# When urischeme is set to https, choose between letsencrypt-staging and letsencrypt-prod to enable TLS termination using certificats from Let's encrypt.
certIssuer: "letsencrypt-prod"
# Deployments will now use service accounts to pull docker images from private container registries. Should be set to true to use Hasura private registry for control plane images.
serviceAccount:
enabled: false
secrets:
# Add imagePullSecret to pull images from private container registry as per your requirements (or as desbcribed here https://stackoverflow.com/questions/32726923/pulling-images-from-private-registry-in-kubernetes/32972366#32972366)
imagePullSecret:
# - name: registrypullsecret
# Password length - 16 - Generate new passwords
dbPassword: "5gfFvdBfUcYcQ4Js"
timescaledbPassword: "5gfFvdBfUcYcQ4Js"
data:
# Generate some random secrets for below of said length
# Secret length - 64
# Sets the Admin secret for Hasura instances powering the control plane. This is different from the admin secrets of the Data plance Hasura Pro instances.
HASURA_GRAPHQL_ADMIN_SECRET: "dKpC46ZapzYa5b2ymfv9TWy8w9Kg7mCmhTEebTPzhrNmYpHMwLYmcVDGUcqV6uVa"
# Generate some secrets for oauth2 service
# Secret length - 64
OIDC_SUBJECT_TYPE_PAIRWISE_SALT: "22LEu9qH3nMXmYs8d4tgYnJ2THLbkNe5KfuLvZZeXjX5QQhCQpKGYpGec6hWrAKJ"
SECRETS_SYSTEM: "TRUB88kkZzcGT5E5DYSGnZLKEX6ty2g6GfjgBvaYMYEAFFLcEcE8PYCNU78JPxgK"
# Generate some secrets for auth service [for cookie and session encrytion keys]
# Secret length - 64
COOKIE_KEY: "K2qZ3XMuwCuw3NkhfsRAKfBy3AXX4BmFw972pd6awyRUhckTXDPKB8nBwXwPpapk"
SESSION_KEY: "rbe8jLRKAaSYn5NTA53f2jJaFQqaPkREAT9seYYMAr2dL9yZ3695M9NdBP3EqsC6"
# set credentials for accompanying redis instance
# redis is part of the installation - only credentials needs to be set
# Secret length - 32
AUTH_REDIS_PASSWORD: "DG7MjA4hquDyYE9q6e32AcbadMTRqEuK"
LOGS_REDIS_PASSWORD: "DG7MjA4hquDyYE9q6e32AcbadMTRqEuK"
# email credentials
# SMTP server is not part of the installation, credentials for an external service is required
SMTP_PASSWORD: "password"
# Social login details for auth service (Optional)
GITHUB_CLIENT_ID: "<github-client-id>"
GITHUB_CLIENT_SECRET: "<github-client-secret>"
GOOGLE_CLIENT_ID: "<google-client-id>"
GOOGLE_CLIENT_SECRET: "<google-client-secret>"
# configs:
# # SMTP configs to send E-mails
# smtpHost: "smtp.org.com"
# smtpPort: "2525"
# smtpDisableAuth: "true"
# #Stateful services configuration. Defaults to true to use embedded services. Can be set to false to use external managed services. Refer
postgres:
enabled: true
timescaledb:
enabled: true
auth-redis:
enabled: true
logs-redis:
enabled: true
# # Per Service configuration override. For more options, refer https://docs.pro.hasura.io/custom-installation/helm-configs/#common-overrides
# hge-pro:
# namespace: data-plane
# tag: "v1.3.3-pro.3"
# additionalEnv: |
# - name: HASURA_GRAPHQL_ENABLED_APIS
# value: "graphql,metadata,config,developer,pgdump"
# resources: |
# requests:
# cpu: 200m
# memory: 1Gi
# limits:
# cpu: 1000m
# memory: 1Gi
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment