Skip to content

Commit

Permalink
Merge branch 'sebastian/prod-2981-set-up-catalog-pipeline' of github.…
Browse files Browse the repository at this point in the history
…com:pluralsh/scaffolds into sebastian/prod-2981-set-up-catalog-pipeline
  • Loading branch information
floreks committed Dec 17, 2024
2 parents 826ed9b + e558ea2 commit c3aecd1
Show file tree
Hide file tree
Showing 4 changed files with 90 additions and 45 deletions.
25 changes: 25 additions & 0 deletions catalogs/data/dagster/dagster-aws-env.yaml
Original file line number Diff line number Diff line change
@@ -0,0 +1,25 @@
apiVersion: deployments.plural.sh/v1alpha1
kind: ServiceDeployment
metadata:
name: dagster-aws-env-{{ context.cluster }}
namespace: apps
spec:
namespace: dagster
git:
folder: services/apps/dagster
ref: main
repositoryRef:
kind: GitRepository
name: infra
namespace: infra
imports:
- stackRef:
name: dagster-{{ context.cluster }}
namespace: apps
configuration:
cluster: {{ context.cluster }}
hostname: {{ context.hostname }}
clusterRef:
kind: Cluster
name: {{ context.cluster }}
namespace: infra
96 changes: 51 additions & 45 deletions catalogs/data/dagster/helm/dagster.yaml.liquid
Original file line number Diff line number Diff line change
Expand Up @@ -2,55 +2,61 @@
{% assign imports_dagster_key = 'dagster-' | append: configuration.cluster %}
dagsterWebserver:
annotations:
security.plural.sh/oauth-env-secret: dagster-proxy-config
{% if configuration["basicAuth"] %}
security.plural.sh/htpasswd-secret: httpaswd-users
{% endif %}
labels:
security.plural.sh/inject-oauth-sidecar: "true"
annotations:
security.plural.sh/oauth-env-secret: dagster-proxy-config
{% if configuration["basicAuth"] %}
security.plural.sh/htpasswd-secret: httpaswd-users
{% endif %}
labels:
security.plural.sh/inject-oauth-sidecar: "true"
postgresql:
enabled: false
postgresqlHost: {{ imports[imports_dagster_key].postgres_host }}
postgresqlUsername: dagster
postgresqlPassword: {{ imports[imports_dagster_key].postgres_password }}
postgresqlDatabase: dagster
postgresqlParams:
sslmode: require
enabled: false
postgresqlHost: {{ imports[imports_dagster_key].postgres_host }}
postgresqlUsername: dagster
postgresqlPassword: {{ imports[imports_dagster_key].postgres_password }}
postgresqlDatabase: dagster
postgresqlParams:
sslmode: require
computeLogManager:
type: S3ComputeLogManager
config:
s3ComputeLogManager:
bucket: {{ configuration.bucket }}
ingress:
enabled: true
ingressClassName: nginx
dagsterWebserver:
host: {{ configuration.hostname }}
tls:
enabled: true
secretName: dagster-tls
precedingPaths:
- path: /.*
pathType: ImplementationSpecific
serviceName: dagster-oauth2-proxy
servicePort: http-oauth
annotations:
kubernetes.io/tls-acme: "true"
cert-manager.io/cluster-issuer: letsencrypt-prod
# Extend timeout to allow long running queries.
nginx.ingress.kubernetes.io/proxy-connect-timeout: "300"
nginx.ingress.kubernetes.io/proxy-read-timeout: "300"
nginx.ingress.kubernetes.io/proxy-send-timeout: "300"
nginx.ingress.kubernetes.io/use-regex: "true"
enabled: true
ingressClassName: nginx
dagsterWebserver:
host: {{ configuration.hostname }}
tls:
enabled: true
secretName: dagster-tls
precedingPaths:
- path: /.*
pathType: ImplementationSpecific
serviceName: dagster-oauth2-proxy
servicePort: http-oauth
annotations:
kubernetes.io/tls-acme: "true"
cert-manager.io/cluster-issuer: letsencrypt-prod
# Extend timeout to allow long running queries.
nginx.ingress.kubernetes.io/proxy-connect-timeout: "300"
nginx.ingress.kubernetes.io/proxy-read-timeout: "300"
nginx.ingress.kubernetes.io/proxy-send-timeout: "300"
nginx.ingress.kubernetes.io/use-regex: "true"
dagster-user-deployments:
enabled: true
deployments:
- name: "k8s-example-user-code-1"
image:
repository: "docker.io/dagster/user-code-example"
tag: latest
pullPolicy: Always
dagsterApiGrpcArgs:
- "--python-file"
- "/example_project/example_repo/repo.py"
port: 3030
enabled: true
deployments:
- name: "k8s-example-user-code-1"
image:
repository: "docker.io/dagster/user-code-example"
tag: latest
pullPolicy: Always
dagsterApiGrpcArgs:
- "--python-file"
- "/example_project/example_repo/repo.py"
port: 3030
{% endraw %}
11 changes: 11 additions & 0 deletions catalogs/data/dagster/services/dagster-aws-env.yaml.liquid
Original file line number Diff line number Diff line change
@@ -0,0 +1,11 @@
{% raw %}
{% assign imports_dagster_key = 'dagster-' | append: configuration.cluster %}
apiVersion: v1
kind: Secret
metadata:
name: dagster-aws-env
namespace: dagster
stringData:
AWS_ACCESS_KEY_ID: {{ imports[imports_dagster_key].access_key_id }}
AWS_SECRET_ACCESS_KEY: {{ imports[imports_dagster_key].secret_access_key }}
{% endraw %}
3 changes: 3 additions & 0 deletions setup/catalogs/data/dagster.yaml
Original file line number Diff line number Diff line change
Expand Up @@ -26,6 +26,9 @@ spec:
- source: oauth-proxy-config.yaml
destination: "bootstrap/apps/dagster/{{ context.cluster }}/oauth-proxy-config.yaml"
external: true
- source: services/dagster-aws-env.yaml.liquid
destination: services/apps/dagster/dagster-aws-env.yaml.liquid
external: true
repositoryRef:
name: scaffolds
catalogRef:
Expand Down

0 comments on commit c3aecd1

Please sign in to comment.