Skip to content

Commit 3ad145c

Browse files
committed
added default values for eso
1 parent d54355b commit 3ad145c

File tree

1 file changed

+61
-24
lines changed

1 file changed

+61
-24
lines changed

scripts/devtron-reference-helm-charts/cronjob-chart_1-6-0/test_values.yaml

Lines changed: 61 additions & 24 deletions
Original file line numberDiff line numberDiff line change
@@ -18,8 +18,36 @@ cronjobConfigs:
1818
suspend: false
1919
successfulJobsHistoryLimit: 3
2020
failedJobsHistoryLimit: 1
21-
restartPolicy: OnFailure
2221
timeZone: "UTC"
22+
cronJobAnnotations:
23+
example.com/dummy: "true"
24+
cronJobLabels:
25+
example.com/dummy: "true"
26+
LivenessProbe:
27+
Path: "/"
28+
command: []
29+
failureThreshold: 3
30+
httpHeaders: []
31+
initialDelaySeconds: 20
32+
periodSeconds: 10
33+
port: 8080
34+
scheme: ""
35+
successThreshold: 1
36+
tcp: false
37+
timeoutSeconds: 5
38+
ReadinessProbe:
39+
Path: "/"
40+
command: []
41+
failureThreshold: 3
42+
httpHeaders: []
43+
initialDelaySeconds: 20
44+
periodSeconds: 10
45+
port: 8080
46+
scheme: ""
47+
successThreshold: 1
48+
tcp: false
49+
timeoutSeconds: 5
50+
restartPolicy: Always
2351

2452
imagePullSecrets:
2553
- test1
@@ -222,25 +250,34 @@ ConfigMaps:
222250
ConfigSecrets:
223251
enabled: true
224252
secrets:
225-
- name: config-secret-1
226-
type: environment
227-
external: true
228-
externalType: ESO_AWSSecretsManager
229-
esoSecretData:
230-
secretStoreRef:
231-
kind: ClusteSecret
232-
name: test-secret
233-
aws:
234-
service: SecretsManager
235-
region: us-east-1
236-
auth:
237-
secretRef:
238-
accessKeyIDSecretRef:
239-
name: awssm-secret
240-
key: access-key
241-
secretAccessKeySecretRef:
242-
name: awssm-secret
243-
key: secret-access-key
253+
- name: config-secret-1
254+
type: environment
255+
external: true
256+
externalType: ESO_AWSSecretsManager
257+
esoSecretData:
258+
refreshInterval: "30m"
259+
260+
# Option 1: Define an inline SecretStore
261+
secretStore:
262+
aws:
263+
service: SecretsManager
264+
region: us-east-1
265+
auth:
266+
secretRef:
267+
accessKeyIDSecretRef:
268+
name: awssm-secret
269+
key: access-key
270+
secretAccessKeySecretRef:
271+
name: awssm-secret
272+
key: secret-access-key
273+
274+
# Option 2: Reference an existing SecretStore / ClusterSecretStore
275+
# (comment out if not needed)
276+
secretStoreRef:
277+
kind: ClusterSecretStore # or SecretStore
278+
name: test-secret
279+
280+
# Map individual keys from AWS Secrets Manager into K8s Secret
244281
esoData:
245282
- secretKey: prod-mysql-password
246283
key: secrets/prod-mysql-secrets
@@ -254,10 +291,10 @@ ConfigSecrets:
254291
- secretKey: prod-mysql-password
255292
key: secrets/prod-mysql-secrets
256293
property: prodPassword
257-
data:
258-
key1: key1value-1
259-
key2: key2value-1
260-
key3: key3value-1
294+
data:
295+
key1: key1value-1
296+
key2: key2value-1
297+
key3: key3value-1
261298
# - name: config-secret-1
262299
# type: environment
263300
# external: false

0 commit comments

Comments
 (0)