helm-chart
Here are 416 public repositories matching this topic...
-
Updated
Aug 19, 2020 - Smarty
-
Updated
Jun 27, 2021 - Go
-
Updated
Aug 9, 2021 - Go
-
Updated
Aug 7, 2021 - Python
-
Updated
Aug 6, 2021 - Shell
-
Updated
Jun 20, 2021 - Go
What would you like to be added:
Document experience we have seen with various log rotation size/frequency settings and how rotate_wait or refresh_interval may help.
Why is this needed:
To help users validate the upper limit of a single collector and review some deployment changes that can be made t
-
Updated
Jun 21, 2021 - Shell
-
Updated
Aug 9, 2021 - Smarty
-
Updated
Aug 3, 2021 - Python
-
Updated
Nov 28, 2018 - Dockerfile
Describe the bug
Version number has to be changed manually.
Expected behavior
Version number changes automatically with each new release
Automation pipeline that keeps version number up to date.
Additional context
From the last Hangout.
I don't know where to start, but with some pointers maybe I can assist :).
Prerequisites
- Put an X between the brackets on this line if you have done all of the following:
- Checked that your issue isn't already filled: https
-
Updated
Feb 15, 2021 - Java
-
Updated
Jul 21, 2021 - Go
-
Updated
Aug 9, 2021 - Mustache
-
Updated
Mar 31, 2020 - Shell
-
Updated
Aug 9, 2021 - Dockerfile
-
Updated
Aug 2, 2021 - Shell
-
Updated
Jun 22, 2021 - Shell
-
Updated
Apr 8, 2021 - Mustache
-
Updated
Aug 8, 2021 - Java
It would be nice to auto-generate the datastore_crypto_key as part of the helm install.
All of the templates get templated at once, so using the st2-generate-symmetric-crypto-key utility (as described in the datastore doc) cannot be encapsulated within the chart. Instead, we need to be able to generate the key using [he
-
Updated
Jan 30, 2021
-
Updated
Jul 28, 2021 - Shell
Improve this page
Add a description, image, and links to the helm-chart topic page so that developers can more easily learn about it.
Add this topic to your repo
To associate your repository with the helm-chart topic, visit your repo's landing page and select "manage topics."
Is your feature request related to a problem? Please describe.
Vault has backends for AWS like dynamo and s3. However to use them you should provide credentials. AWS support 2 solutions to eliminate this. IAM roles for Service Accounts and Instance profile roles.
Due to some unknown reason vault requires more time to start when using dynamic creds than explicit definition keys in s3 block o