Skip to content

Commit cdef57f

Browse files
authored
Merge branch 'ITISFoundation:main' into main
2 parents 29f2f2e + 49664cf commit cdef57f

File tree

24 files changed

+147
-50
lines changed

24 files changed

+147
-50
lines changed

charts/simcore-charts/resource-usage-tracker/values.yaml.gotmpl

Lines changed: 7 additions & 7 deletions
Original file line numberDiff line numberDiff line change
@@ -2,7 +2,7 @@
22
# This is a YAML-formatted file.
33
# Declare variables to be passed into your templates.
44

5-
replicaCount: 1
5+
replicaCount: {{ requiredEnv "RESOURCE_USAGE_TRACKER_KUBERNETES_REPLICAS" }}
66

77
image:
88
repository: '{{ .Values | get "DOCKER_REGISTRY" "itisfoundation" }}/resource-usage-tracker'
@@ -104,14 +104,14 @@ env:
104104
- name: POSTGRES_DB
105105
value: {{ requiredEnv "POSTGRES_DB" }}
106106
- name: POSTGRES_ENDPOINT
107-
value: {{ requiredEnv "POSTGRES_ENDPOINT" }}
107+
value: {{ requiredEnv "POSTGRES_EXTERNAL_ENDPOINT" }}
108108
- name: POSTGRES_HOST
109-
value: {{ requiredEnv "POSTGRES_HOST" }}
109+
value: {{ requiredEnv "POSTGRES_EXTERNAL_HOST" }}
110110
- name: POSTGRES_PASSWORD
111111
value: {{ requiredEnv "POSTGRES_PASSWORD" }}
112112
sensitive: true
113113
- name: POSTGRES_PORT
114-
value: {{ requiredEnv "POSTGRES_PORT" }}
114+
value: {{ requiredEnv "POSTGRES_EXTERNAL_PORT" }}
115115
- name: POSTGRES_USER
116116
value: {{ requiredEnv "POSTGRES_USER" }}
117117
- name: PROMETHEUS_URL
@@ -122,18 +122,18 @@ env:
122122
value: {{ requiredEnv "RESOURCE_USAGE_TRACKER_PROMETHEUS_PASSWORD" }}
123123
sensitive: true
124124
- name: RABBIT_HOST
125-
value: {{ requiredEnv "RABBIT_HOST" }}
125+
value: {{ requiredEnv "RABBIT_EXTERNAL_HOST" }}
126126
- name: RABBIT_PASSWORD
127127
value: {{ requiredEnv "RABBIT_PASSWORD" }}
128128
sensitive: true
129129
- name: RABBIT_PORT
130-
value: {{ requiredEnv "RABBIT_PORT" }}
130+
value: {{ requiredEnv "RABBIT_EXTERNAL_PORT" }}
131131
- name: RABBIT_SECURE
132132
value: {{ requiredEnv "RABBIT_SECURE" }}
133133
- name: RABBIT_USER
134134
value: {{ requiredEnv "RABBIT_USER" }}
135135
- name: REDIS_USER
136-
value: {{ requiredEnv "REDIS_USER" }}
136+
value: {{ env "REDIS_USER" }}
137137
- name: REDIS_HOST
138138
value: {{ requiredEnv "REDIS_EXTERNAL_HOST" }}
139139
- name: REDIS_PORT

services/admin-panels/docker-compose.yml.j2

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -87,7 +87,7 @@ services:
8787
deploy:
8888
labels:
8989
- traefik.enable=true
90-
- traefik.docker.network=${PUBLIC_NETWORK}
90+
- traefik.swarm.network=${PUBLIC_NETWORK}
9191
- traefik.http.services.adminpanels.loadbalancer.server.port=8888
9292
- traefik.http.routers.adminpanels.rule=Host(`${ADMINPANELS_DOMAIN}`)
9393
- traefik.http.routers.adminpanels.entrypoints=https

services/appmotion_gateway/docker-compose.yml.j2

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -13,7 +13,7 @@ services:
1313
replicas: 0
1414
labels:
1515
- traefik.enable=true
16-
- traefik.docker.network=${PUBLIC_NETWORK}
16+
- traefik.swarm.network=${PUBLIC_NETWORK}
1717
- traefik.http.services.adminer_appmotion_gateway.loadbalancer.server.port=8080
1818
- traefik.http.routers.adminer_appmotion_gateway.rule=Host(`${MONITORING_DOMAIN}`) && PathPrefix(`/adminer/appmotion_gateway`)
1919
- traefik.http.routers.adminer_appmotion_gateway.entrypoints=https
@@ -75,7 +75,7 @@ services:
7575
replicas: 1
7676
labels:
7777
- traefik.enable=true
78-
- traefik.docker.network=${PUBLIC_NETWORK}
78+
- traefik.swarm.network=${PUBLIC_NETWORK}
7979
- traefik.http.routers.appmotion_gateway.rule=${DEPLOYMENT_FQDNS_APPMOTION_CAPTURE_TRAEFIK_RULE}
8080
- traefik.http.routers.appmotion_gateway.entrypoints=https
8181
- traefik.http.routers.appmotion_gateway.tls=true

services/filestash/docker-compose.yml.j2

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -13,7 +13,7 @@ services:
1313
deploy:
1414
labels:
1515
- traefik.enable=true
16-
- traefik.docker.network=${PUBLIC_NETWORK}
16+
- traefik.swarm.network=${PUBLIC_NETWORK}
1717
- traefik.http.services.filestash.loadbalancer.server.port=8334
1818
- traefik.http.routers.filestash.rule=Host(`${FILESTASH_DOMAIN}`)
1919
- traefik.http.routers.filestash.entrypoints=https

services/graylog/docker-compose.yml.j2

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -88,7 +88,7 @@ services:
8888

8989
labels:
9090
- traefik.enable=true
91-
- traefik.docker.network=${PUBLIC_NETWORK}
91+
- traefik.swarm.network=${PUBLIC_NETWORK}
9292
# direct access through port
9393
- traefik.http.services.graylog.loadbalancer.server.port=9000
9494
- traefik.http.routers.graylog.rule=Host(`${MONITORING_DOMAIN}`) && PathPrefix(`/graylog`)

services/jaeger/docker-compose.yml.j2

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -2,7 +2,7 @@ version: "3.7"
22

33
services:
44
jaeger:
5-
image: jaegertracing/all-in-one:1.60.0
5+
image: jaegertracing/all-in-one:1.68.0
66
command: >
77
--query.base-path=/jaeger
88
init: true
@@ -17,7 +17,7 @@ services:
1717
- node.labels.ops==true
1818
labels:
1919
- traefik.enable=true
20-
- traefik.docker.network=${PUBLIC_NETWORK}
20+
- traefik.swarm.network=${PUBLIC_NETWORK}
2121
- traefik.http.services.jaeger.loadbalancer.server.port=16686
2222
- traefik.http.routers.jaeger.rule=Host(`${MONITORING_DOMAIN}`) && PathPrefix(`/jaeger`)
2323
- traefik.http.routers.jaeger.entrypoints=https
@@ -33,7 +33,7 @@ services:
3333
memory: 64M
3434
cpus: "0.1"
3535
otel-collector:
36-
image: otel/opentelemetry-collector-contrib:0.105.0
36+
image: otel/opentelemetry-collector-contrib:0.123.0
3737
configs:
3838
- source: opentelemetry-collector-config
3939
target: /etc/otel/config.yaml

services/maintenance-page/docker-compose.yml.j2

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -26,7 +26,7 @@ services:
2626
- node.labels.ops==true
2727
labels:
2828
- traefik.enable=true
29-
- traefik.docker.network=${PUBLIC_NETWORK}
29+
- traefik.swarm.network=${PUBLIC_NETWORK}
3030
- traefik.http.routers.{{"maintenance_" + j2item.replace('@','').replace(' ','').replace('.','').replace('-','').replace('\'','') + "_html"}}.priority={{MAINTENANCE_PAGES_TRAEFIK_PRIORITY}}
3131
- traefik.http.routers.{{"maintenance_" + j2item.replace('@','').replace(' ','').replace('.','').replace('-','').replace('\'','') + "_html"}}.rule=Host(`{{VENDOR_MANUAL_SUBDOMAIN_PREFIX}}.{{j2item}}`) || (Host(`{{j2item}}`) && PathPrefix(`/`)) || (HostRegexp(`services.{{j2item}}`,`{subhost:[a-zA-Z0-9-]+}.services.{{j2item}}`) && PathPrefix(`/`))
3232
- traefik.http.routers.{{"maintenance_" + j2item.replace('@','').replace(' ','').replace('.','').replace('-','').replace('\'','') + "_html"}}.tls=true
@@ -50,7 +50,7 @@ services:
5050
- node.labels.ops==true
5151
labels:
5252
- traefik.enable=true
53-
- traefik.docker.network=${PUBLIC_NETWORK}
53+
- traefik.swarm.network=${PUBLIC_NETWORK}
5454
- traefik.http.routers.nginx_api.priority={{MAINTENANCE_PAGES_TRAEFIK_PRIORITY}}
5555
- traefik.http.routers.nginx_api.tls=true
5656
- traefik.http.routers.nginx_api.rule=${DEPLOYMENT_API_DOMAIN_CAPTURE_TRAEFIK_RULE}

services/minio/docker-compose.yaml

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -22,7 +22,7 @@ services:
2222
window: 60s
2323
labels:
2424
- traefik.enable=true
25-
- traefik.docker.network=${PUBLIC_NETWORK}
25+
- traefik.swarm.network=${PUBLIC_NETWORK}
2626
# direct access without path (necessary for minio client it does not like /path)
2727
- traefik.http.services.minio9000.loadbalancer.server.port=9000
2828
- traefik.http.services.minio9000.loadbalancer.healthcheck.path=/minio/health/ready

services/monitoring/docker-compose.yml.j2

Lines changed: 9 additions & 8 deletions
Original file line numberDiff line numberDiff line change
@@ -25,7 +25,7 @@ services:
2525
cpus: "0.1"
2626
prometheuscatchall:
2727
hostname: "{% raw %}{{.Service.Name}}{% endraw %}"
28-
image: prom/prometheus:v2.54.0
28+
image: prom/prometheus:v2.55.1
2929
volumes:
3030
- prometheus_data:/prometheus
3131
- /var/run/docker.sock:/var/run/docker.sock:ro
@@ -44,6 +44,7 @@ services:
4444
- "--web.external-url=https://${MONITORING_DOMAIN}/prometheus/"
4545
- "--web.route-prefix=/"
4646
- "--storage.tsdb.allow-overlapping-blocks" # via https://jessicagreben.medium.com/prometheus-fill-in-data-for-new-recording-rules-30a14ccb8467
47+
- "--enable-feature=exemplar-storage"
4748
#- "--web.enable-admin-api" This allows messing with prometheus using its API from the CLI. Disabled for security reasons by default.
4849
networks:
4950
- monitored
@@ -52,7 +53,7 @@ services:
5253
deploy:
5354
labels:
5455
- traefik.enable=true
55-
- traefik.docker.network=${PUBLIC_NETWORK}
56+
- traefik.swarm.network=${PUBLIC_NETWORK}
5657
# direct access through port
5758
- traefik.http.services.prometheuscatchall.loadbalancer.server.port=${MONITORING_PROMETHEUS_PORT}
5859
- traefik.http.routers.prometheuscatchall.rule=Host(`${MONITORING_DOMAIN}`) && PathPrefix(`/prometheus`)
@@ -71,7 +72,7 @@ services:
7172
cpus: "0.2"
7273
prometheusfederation:
7374
hostname: "{% raw %}{{.Service.Name}}{% endraw %}"
74-
image: prom/prometheus:v2.54.0
75+
image: prom/prometheus:v2.55.1
7576
volumes:
7677
- prometheus_data_federation:/prometheus
7778
- /var/run/docker.sock:/var/run/docker.sock:ro
@@ -98,7 +99,7 @@ services:
9899
deploy:
99100
labels:
100101
- traefik.enable=true
101-
- traefik.docker.network=${PUBLIC_NETWORK}
102+
- traefik.swarm.network=${PUBLIC_NETWORK}
102103
# direct access through port
103104
- traefik.http.services.prometheusfederation.loadbalancer.server.port=${MONITORING_PROMETHEUS_PORT}
104105
- traefik.http.routers.prometheusfederation.rule=Host(`${MONITORING_DOMAIN}`) && PathPrefix(`/prometheusfederation`)
@@ -218,7 +219,7 @@ services:
218219
cpus: "0.1"
219220

220221
grafana:
221-
image: grafana/grafana-oss:11.2.4
222+
image: grafana/grafana-oss:12.0.0
222223
volumes:
223224
- grafana_data:/var/lib/grafana
224225
env_file:
@@ -232,7 +233,7 @@ services:
232233
# condition: on-failure
233234
labels:
234235
- traefik.enable=true
235-
- traefik.docker.network=${PUBLIC_NETWORK}
236+
- traefik.swarm.network=${PUBLIC_NETWORK}
236237
# direct access through port
237238
- traefik.http.services.grafana.loadbalancer.server.port=3000
238239
- traefik.http.routers.grafana.rule=Host(`${MONITORING_DOMAIN}`) && PathPrefix(`/grafana`)
@@ -370,7 +371,7 @@ services:
370371
memory: 32M
371372
cpus: "0.1"
372373
tempo:
373-
image: grafana/tempo:2.6.1
374+
image: grafana/tempo:2.7.2
374375
command: "-target=scalable-single-binary -config.file=/etc/tempo.yaml"
375376
configs:
376377
- source: tempo_config
@@ -380,7 +381,7 @@ services:
380381
deploy:
381382
labels:
382383
- traefik.enable=true
383-
- traefik.docker.network=${PUBLIC_NETWORK}
384+
- traefik.swarm.network=${PUBLIC_NETWORK}
384385
- traefik.http.services.tempo.loadbalancer.server.port=9095
385386
- traefik.http.routers.tempo.rule=Host(`${MONITORING_DOMAIN}`) && PathPrefix(`/tempo`)
386387
- traefik.http.routers.tempo.priority=10

services/monitoring/grafana/Makefile

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -27,7 +27,7 @@ terraform/plan.cache:
2727
@exit 1
2828

2929
.PHONY: terraform-plan
30-
terraform-plan: $(REPO_CONFIG_LOCATION) $(TF_STATE_FILE) ensure-grafana-online ## terraform plan
30+
terraform-plan: $(REPO_CONFIG_LOCATION) $(TF_STATE_FILE) ensure-grafana-online assets ## terraform plan
3131
# terraform plan
3232
@set -a; source $<; set +a; \
3333
terraform -chdir=./terraform plan -out=plan.cache

0 commit comments

Comments
 (0)