forked from elixir-cloud-aai/cwl-WES
-
Notifications
You must be signed in to change notification settings - Fork 0
/
Copy pathvalues.yaml
69 lines (60 loc) · 2.22 KB
/
values.yaml
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
# Default values for Helm-based deployment.
# This is a YAML-formatted file.
# Declare variables to be passed into your templates.
applicationDomain: c03.k8s-popup.csc.fi # change to wes server
clusterType: openshift # either 'kubernetes' or 'openshift'
tlsSecret: mytls-secret # put name of tlsSecret
storageAccessMode: ReadWriteOnce # mongodb-pvc.yaml/rabbitmq-pvc.yaml, change to ReadWriteMany if storageClass can do RWX
extra_config:
folder: /etc/app_config
file: app_config.yaml
autocert:
createJob: "true" # actually create autocert cronjob, for K8S with autocert installed set to "false"
schedule: "0 0 1 */2 *" # cronjob schedule
testCert: "true" # use test certificates so as not to exceed quota
image: elixircloud/autocert:devel
apiServer: kubernetes.default.svc:443 # address of k8s API server
email: [email protected] # email to inject into certificate
flower:
appName: flower
basicAuth: admin:admin
image: endocode/flower
wes:
appName: cwlwes
image: elixircloud/cwl-wes:latest
#netrc: # change this, add one entry per FTP/HTTP server
#- Machine: defaultmachine
# Login: defaultnetrclogin
# Password: defaultnetrcpassword
storageClass: nfs-client # <- wes-volume.yaml, only for K8S, a storageClass with readWriteMany capability is required
volumeSize: 1Gi
celeryWorker:
appName: celery-worker
image: elixircloud/cwl-wes:latest
mongodb:
appName: mongodb
databaseAdminPassword: adminpasswd
databaseName: cwlwes-db
databasePassword: cwlwes-db-passwd
databaseUser: cwlwes-user
volumeSize: 1Gi
image: centos/mongodb-36-centos7
mountPath: /var/lib/mongodb/data
pullPolicy: Always
securityContext: # only for K8S
enabled: true
fsGroup: 1001
runAsUser: 1001
runAsNonRoot: true
rabbitmq:
appName: rabbitmq
volumeSize: 1Gi
image: rabbitmq:3-management
ingress: # <- wes-ingress-kubernetes.yaml, only for system ingress for K8S, ensure wes namespace has rights to access it
letsencryptSystem: "true" # if true, ensure wes namespace has rights to access letsencrypt pods - rbac
nginx_image: nginx/nginx-ingress:1.3.0
tls_letsencrypt:
annotations:
ingressclass: "nginx"
tlsacme: "\"true\""
clusterissuer: "letsencrypt-prod"