Skip to content

Commit

Permalink
add irsa for all accounts
Browse files Browse the repository at this point in the history
  • Loading branch information
leiicamundi committed Oct 14, 2024
1 parent eb11cdf commit 94e7fd7
Show file tree
Hide file tree
Showing 2 changed files with 92 additions and 1 deletion.
43 changes: 42 additions & 1 deletion examples/camunda-8.6-irsa/helm-values/values-domain.yml
Original file line number Diff line number Diff line change
@@ -1,15 +1,17 @@
---
identityKeycloak:
serviceAccount:
name: ''
name: ${CAMUNDA_KEYCLOAK_SERVICE_ACCOUNT_NAME}
annotations:
eks.amazonaws.com/role-arn: ${DB_ROLE_ARN}

postgresql:
enabled: false
externalDatabase:
host: ${DB_HOST}
user: ${PG_USERNAME}
database: ${DEFAULT_DB_NAME}

extraEnvVars:
- name: KEYCLOAK_EXTRA_ARGS
value: --db-driver=software.amazon.jdbc.Driver --transaction-xa-enabled=false --log-level=INFO,software.amazon.jdbc:INFO
Expand All @@ -25,6 +27,10 @@ global:
enabled: true
aws:
enabled: true
url:
protocol: https
host: ${OPENSEARCH_HOST}
port: 443

ingress:
enabled: true
Expand All @@ -44,19 +50,51 @@ global:
optimize:
redirectUrl: https://${DOMAIN_NAME}/optimize

webModeler:
serviceAccount:
name: ${CAMUNDA_WEBMODELER_SERVICE_ACCOUNT_NAME}
annotations:
eks.amazonaws.com/role-arn: ${DB_ROLE_ARN}

identity:
contextPath: /identity
fullURL: https://${DOMAIN_NAME}/identity

serviceAccount:
name: ${CAMUNDA_IDENTITY_SERVICE_ACCOUNT_NAME}
annotations:
eks.amazonaws.com/role-arn: ${DB_ROLE_ARN}

operate:
contextPath: /operate

serviceAccount:
name: ${CAMUNDA_OPERATE_SERVICE_ACCOUNT_NAME}
annotations:
eks.amazonaws.com/role-arn: ${OPENSEARCH_ROLE_ARN}

tasklist:
contextPath: /tasklist

serviceAccount:
name: ${CAMUNDA_TASKLIST_SERVICE_ACCOUNT_NAME}
annotations:
eks.amazonaws.com/role-arn: ${OPENSEARCH_ROLE_ARN}

optimize:
contextPath: /optimize

serviceAccount:
name: ${CAMUNDA_OPTIMIZE_SERVICE_ACCOUNT_NAME}
annotations:
eks.amazonaws.com/role-arn: ${OPENSEARCH_ROLE_ARN}

zeebe:
serviceAccount:
name: ${CAMUNDA_ZEEBE_SERVICE_ACCOUNT_NAME}
annotations:
eks.amazonaws.com/role-arn: ${OPENSEARCH_ROLE_ARN}

zeebeGateway:
ingress:
grpc:
Expand All @@ -68,3 +106,6 @@ zeebeGateway:
annotations:
kubernetes.io/tls-acme: 'true'
contextPath: /zeebe

elasticsearch:
enabled: false
50 changes: 50 additions & 0 deletions examples/camunda-8.6-irsa/helm-values/values-no-domain.yml
Original file line number Diff line number Diff line change
@@ -1,11 +1,17 @@
---
identityKeycloak:
serviceAccount:
name: ${CAMUNDA_KEYCLOAK_SERVICE_ACCOUNT_NAME}
annotations:
eks.amazonaws.com/role-arn: ${DB_ROLE_ARN}

postgresql:
enabled: false
externalDatabase:
host: ${DB_HOST}
user: ${PG_USERNAME}
database: ${DEFAULT_DB_NAME}

extraEnvVars:
- name: KEYCLOAK_EXTRA_ARGS
value: --db-driver=software.amazon.jdbc.Driver --transaction-xa-enabled=false --log-level=INFO,software.amazon.jdbc:INFO
Expand All @@ -21,3 +27,47 @@ global:
enabled: true
aws:
enabled: true
url:
protocol: https
host: ${OPENSEARCH_HOST}
port: 443

webModeler:
serviceAccount:
name: ${CAMUNDA_WEBMODELER_SERVICE_ACCOUNT_NAME}
annotations:
eks.amazonaws.com/role-arn: ${DB_ROLE_ARN}

identity:
serviceAccount:
name: ${CAMUNDA_IDENTITY_SERVICE_ACCOUNT_NAME}
annotations:
eks.amazonaws.com/role-arn: ${DB_ROLE_ARN}


zeebe:
serviceAccount:
name: ${CAMUNDA_ZEEBE_SERVICE_ACCOUNT_NAME}
annotations:
eks.amazonaws.com/role-arn: ${OPENSEARCH_ROLE_ARN}

operate:
serviceAccount:
name: ${CAMUNDA_OPERATE_SERVICE_ACCOUNT_NAME}
annotations:
eks.amazonaws.com/role-arn: ${OPENSEARCH_ROLE_ARN}

tasklist:
serviceAccount:
name: ${CAMUNDA_TASKLIST_SERVICE_ACCOUNT_NAME}
annotations:
eks.amazonaws.com/role-arn: ${OPENSEARCH_ROLE_ARN}

optimize:
serviceAccount:
name: ${CAMUNDA_OPTIMIZE_SERVICE_ACCOUNT_NAME}
annotations:
eks.amazonaws.com/role-arn: ${OPENSEARCH_ROLE_ARN}

elasticsearch:
enabled: false

0 comments on commit 94e7fd7

Please sign in to comment.