11 Commits

Author SHA1 Message Date
be0e152de8 chore(deps): update docker.io/library/node docker tag to v22.11.0
All checks were successful
continuous-integration/drone/pr Build is passing
continuous-integration/drone/push Build is passing
2024-11-26 02:40:29 +00:00
4edf2660de chore(deps): update git.cryptic.systems/volker.raschek/git docker tag to v1.4.0
All checks were successful
continuous-integration/drone/pr Build is passing
continuous-integration/drone/push Build is passing
2024-11-25 23:41:05 +00:00
c1a2a098c8 doc(README): adapt warning blockquote
All checks were successful
continuous-integration/drone/push Build is passing
2024-11-25 23:25:03 +01:00
085a68c60c revert(README): adapt warning blockquote
This reverts commit 98fe8fe2a4.
2024-11-25 23:24:04 +01:00
98fe8fe2a4 doc(README): adapt warning blockquote
Some checks failed
continuous-integration/drone/push Build is failing
2024-11-25 23:17:33 +01:00
7d02c5f7b3 doc(README): adapt warning blockquote
All checks were successful
continuous-integration/drone/push Build is passing
2024-11-25 23:14:39 +01:00
cbdf696a4e chore(deps): update git.cryptic.systems/volker.raschek/markdownlint docker tag to v0.42.0
All checks were successful
continuous-integration/drone/pr Build is passing
continuous-integration/drone/push Build is passing
2024-11-25 20:26:07 +00:00
42af0f9739 fix(serviceAccount): remove top level dict .spec
All checks were successful
continuous-integration/drone/push Build is passing
continuous-integration/drone/tag Build is passing
2024-11-25 19:35:46 +01:00
5c0f2fb310 core(chart): add further chart labels for search engine
All checks were successful
continuous-integration/drone/push Build is passing
2024-11-25 19:08:36 +01:00
c211bd7a61 fix: rename chart repository
Some checks failed
continuous-integration/drone/tag Build is passing
continuous-integration/drone/push Build is failing
2024-11-25 19:01:37 +01:00
6d2a3675b1 fix(ci): rename chart repository
All checks were successful
continuous-integration/drone/push Build is passing
continuous-integration/drone/tag Build is passing
2024-11-25 18:48:31 +01:00
5 changed files with 35 additions and 35 deletions

View File

@ -12,7 +12,7 @@ platform:
steps:
- name: clone repository
image: git.cryptic.systems/volker.raschek/git:1.3.1
image: git.cryptic.systems/volker.raschek/git:1.4.0
- name: helm lint
commands:
@ -26,7 +26,7 @@ steps:
- name: markdown lint
commands:
- markdownlint *.md
image: git.cryptic.systems/volker.raschek/markdownlint:0.41.0
image: git.cryptic.systems/volker.raschek/markdownlint:0.42.0
resources:
limits:
cpu: 150
@ -73,7 +73,7 @@ platform:
steps:
- name: clone repository
image: git.cryptic.systems/volker.raschek/git:1.3.1
image: git.cryptic.systems/volker.raschek/git:1.4.0
- name: helm unittest
commands:
@ -125,14 +125,14 @@ platform:
steps:
- name: clone repository
image: git.cryptic.systems/volker.raschek/git:1.3.1
image: git.cryptic.systems/volker.raschek/git:1.4.0
- name: generate README
commands:
- npm install
- npm run readme:parameters
- npm run readme:lint
image: docker.io/library/node:22.9.0-alpine
image: docker.io/library/node:22.11.0-alpine
resources:
limits:
cpu: 150
@ -141,7 +141,7 @@ steps:
- name: detect diff
commands:
- git diff --exit-code --name-only README.md
image: git.cryptic.systems/volker.raschek/git:1.3.1
image: git.cryptic.systems/volker.raschek/git:1.4.0
- name: email-notification
environment:
@ -183,13 +183,13 @@ platform:
steps:
- name: clone repository
image: git.cryptic.systems/volker.raschek/git:1.3.1
image: git.cryptic.systems/volker.raschek/git:1.4.0
- name: release-helm-chart
commands:
- helm repo add prometheus-exporter https://charts.cryptic.systems/prometheus-exporter
- helm repo add prometheus-exporters https://charts.cryptic.systems/prometheus-exporters
- helm package --version ${DRONE_TAG} .
- helm cm-push ${DRONE_REPO_NAME}-${DRONE_TAG}.tgz prometheus-exporter
- helm cm-push ${DRONE_REPO_NAME}-${DRONE_TAG}.tgz prometheus-exporters
environment:
HELM_REPO_PASSWORD:
from_secret: helm_repo_password

View File

@ -10,8 +10,9 @@ appVersion: "0.15.0"
keywords:
- prometheus
- prometheus exporter
- postgres
- prometheus-exporter
- postgres-postgres-exporter
- postgres-exporter
sources:
- https://github.com/prometheus-community/postgres_exporter

View File

@ -29,9 +29,9 @@ chart is tested for deployment scenarios with ArgoCD.
> time is not possible.
```bash
helm repo add prometheus-exporter https://charts.cryptic.systems/prometheus-exporter
helm repo add prometheus-exporters https://charts.cryptic.systems/prometheus-exporters
helm repo update
helm install prometheus-exporter/prometheus-postgres-exporter prometheus-postgres-exporter \
helm install prometheus-exporters/prometheus-postgres-exporter prometheus-postgres-exporter \
--set 'config.database.secret.databaseUsername=postgres' \
--set 'config.database.secret.databasePassword=postgres' \
--set 'config.database.secret.databaseConnectionUrl="postgres.example.local:5432/postgres?ssl=disable"' \
@ -45,7 +45,7 @@ version of the chart must be in sync with the `values.yaml`. Newer *minor* versi
versions can break something!
```bash
helm show values prometheus-exporter/prometheus-postgres-exporter --version 0.1.0 > values.yaml
helm show values prometheus-exporters/prometheus-postgres-exporter --version 0.1.0 > values.yaml
```
A complete list of available helm chart versions can be displayed via the following command:
@ -66,12 +66,12 @@ The following examples serve as individual configurations and as inspiration for
The first example shows how to deploy the metric exporter with TLS encryption. The verification of the custom TLS
certification will be skipped by Prometheus.
> [!WARN]
> A TLS secret with the name `prometheus-postgresql-exporter-http` containing a `ca.crt`, `tls.key` and `tls.crt` is
> already present.
> [!WARNING]
> The secret `prometheus-postgresql-exporter-http` containing the TLS certificate is already present. The keys `ca.crt`,
> `tls.key` and `tls.crt` of the secret can be mounted into the container filesystem for TLS authentication / encryption.
```bash
helm install prometheus-exporter/prometheus-postgres-exporter prometheus-postgres-exporter \
helm install prometheus-exporters/prometheus-postgres-exporter prometheus-postgres-exporter \
--set 'config.database.secret.databaseUsername=postgres' \
--set 'config.database.secret.databasePassword=postgres' \
--set 'config.database.secret.databaseConnectionUrl="postgres.example.local:5432/postgres?ssl=disable"' \
@ -94,7 +94,7 @@ certificate for the metrics exporter - TLS certificate verification can be enabl
replaced:
```diff
helm install prometheus-exporter/prometheus-postgres-exporter prometheus-postgres-exporter \
helm install prometheus-exporters/prometheus-postgres-exporter prometheus-postgres-exporter \
--set 'config.database.secret.databaseUsername=postgres' \
--set 'config.database.secret.databasePassword=postgres' \
--set 'config.database.secret.databaseConnectionUrl="postgres.example.local:5432/postgres?ssl=disable"' \

View File

@ -13,14 +13,13 @@ metadata:
{{- end }}
name: {{ include "prometheus-postgres-exporter.fullname" . }}
namespace: {{ .Release.Namespace }}
spec:
automountServiceAccountToken: {{ .Values.serviceAccount.new.automountServiceAccountToken }}
{{- with .Values.serviceAccount.new.imagePullSecrets }}
imagePullSecrets:
automountServiceAccountToken: {{ .Values.serviceAccount.new.automountServiceAccountToken }}
{{- with .Values.serviceAccount.new.imagePullSecrets }}
imagePullSecrets:
{{- toYaml . | nindent 4 }}
{{- end }}
{{- with .Values.serviceAccount.new.secrets }}
secrets:
{{- toYaml . | nindent 4 }}
{{- end }}
{{- end }}
{{- with .Values.serviceAccount.new.secrets }}
secrets:
{{- toYaml . | nindent 4 }}
{{- end }}
{{- end }}

View File

@ -29,12 +29,12 @@ tests:
- notExists:
path: metadata.labels
- equal:
path: spec.automountServiceAccountToken
path: automountServiceAccountToken
value: true
- notExists:
path: spec.imagePullSecrets
path: imagePullSecrets
- notExists:
path: spec.secrets
path: secrets
- it: Rendering serviceAccount with custom values.
@ -65,14 +65,14 @@ tests:
path: metadata.name
value: prometheus-postgres-exporter-unittest
- equal:
path: spec.automountServiceAccountToken
path: automountServiceAccountToken
value: false
- equal:
path: spec.imagePullSecrets
path: imagePullSecrets
value:
- name: "my-pull-secret"
- equal:
path: spec.secrets
path: secrets
value:
- name: "my-secret"
namespace: "my-namespace"