fix(examples): update outdated examples to reflect current usage

This commit is contained in:
Jaylon McShan 2025-03-24 08:33:49 -05:00
parent 368f161fa2
commit b539eafcfb
13 changed files with 93 additions and 75 deletions

View file

@ -6,15 +6,19 @@ data "helm_template" "mariadb_instance" {
chart = "mariadb"
version = "7.1.0"
set {
name = "service.port"
value = "13306"
}
set = [
{
name = "service.port"
value = "13306"
}
]
set_sensitive {
name = "rootUser.password"
value = "s3cr3t!"
}
set_sensitive = [
{
name = "rootUser.password"
value = "s3cr3t!"
}
]
}
resource "local_file" "mariadb_manifests" {

View file

@ -10,16 +10,20 @@ data "helm_template" "mariadb_instance" {
"templates/master-statefulset.yaml",
"templates/master-svc.yaml",
]
set {
name = "service.port"
value = "13306"
}
set_sensitive {
name = "rootUser.password"
value = "s3cr3t!"
}
set = [
{
name = "service.port"
value = "13306"
}
]
set_sensitive = [
{
name = "rootUser.password"
value = "s3cr3t!"
}
]
}
resource "local_file" "mariadb_manifests" {

View file

@ -1,31 +1,31 @@
provider "helm" {
kubernetes {
kubernetes = {
config_path = "~/.kube/config"
}
# localhost registry with password protection
registry {
url = "oci://localhost:5000"
username = "username"
password = "password"
}
# private registry
registry {
url = "oci://private.registry"
username = "username"
password = "password"
}
registries = [
{
url = "oci://localhost:5000"
username = "username"
password = "password"
},
{
url = "oci://private.registry"
username = "username"
password = "password"
}
]
}
resource "helm_release" "nginx_ingress" {
name = "nginx-ingress-controller"
repository = "https://charts.bitnami.com/bitnami"
chart = "nginx-ingress-controller"
set {
name = "service.type"
value = "ClusterIP"
}
set = [
{
name = "service.type"
value = "ClusterIP"
}
]
}

View file

@ -1,5 +1,5 @@
provider "helm" {
kubernetes {
kubernetes = {
config_path = "~/.kube/config"
}
}

View file

@ -1,5 +1,5 @@
provider "helm" {
kubernetes {
kubernetes = {
config_paths = [
"/path/to/config_a.yaml",
"/path/to/config_b.yaml"

View file

@ -1,5 +1,5 @@
provider "helm" {
kubernetes {
kubernetes = {
host = "https://cluster_endpoint:port"
client_certificate = file("~/.kube/client-cert.pem")

View file

@ -1,11 +1,11 @@
provider "helm" {
kubernetes {
kubernetes = {
host = var.cluster_endpoint
cluster_ca_certificate = base64decode(var.cluster_ca_cert)
exec {
exec = {
api_version = "client.authentication.k8s.io/v1beta1"
args = ["eks", "get-token", "--cluster-name", var.cluster_name]
command = "aws"
}
}
}
}

View file

@ -1,10 +1,10 @@
provider "helm" {
kubernetes{
kubernetes = {
host = "https://${data.google_container_cluster.my_cluster.endpoint}"
token = data.google_client_config.provider.access_token
cluster_ca_certificate = base64decode(
data.google_container_cluster.my_cluster.master_auth[0].cluster_ca_certificate,)
exec {
exec = {
api_version = "client.authentication.k8s.io/v1beta1"
command = "gke-gcloud-auth-plugin"
}

View file

@ -8,19 +8,22 @@ resource "helm_release" "example" {
"${file("values.yaml")}"
]
set {
name = "cluster.enabled"
value = "true"
}
set = [
{
name = "cluster.enabled"
value = "true"
},
{
name = "metrics.enabled"
value = "true"
}
]
set {
name = "metrics.enabled"
value = "true"
}
set {
name = "service.annotations.prometheus\\.io/port"
value = "9127"
type = "string"
}
set = [
{
name = "service.annotations.prometheus\\.io/port"
value = "9127"
type = "string"
}
]
}

View file

@ -1,4 +1,6 @@
set {
set = [
{
name = "controller.pod.annotations.status\\.kubernetes\\.io/restart-on-failure"
value = "\\{\"timeout\": \"30s\"\\}"
}
}
]

View file

@ -1,15 +1,16 @@
provider "helm" {
kubernetes {
kubernetes = {
config_path = "~/.kube/config"
}
# localhost registry with password protection
registry {
url = "oci://localhost:5000"
username = "username"
password = "password"
}
registries = [
{
url = "oci://localhost:5000"
username = "username"
password = "password"
}
]
}
resource "helm_release" "example" {

View file

@ -1,4 +1,6 @@
set {
name = "grafana.ingress.annotations.alb\\.ingress\\.kubernetes\\.io/group\\.name"
value = "shared-ingress"
}
set = [
{
name = "grafana.ingress.annotations.alb\\.ingress\\.kubernetes\\.io/group\\.name"
value = "shared-ingress"
}
]

View file

@ -1,4 +1,6 @@
set_list {
name = "hashicorp"
value = ["terraform", "nomad", "vault"]
}
set_list = [
{
name = "hashicorp"
value = ["terraform", "nomad", "vault"]
}
]