Skip to content

Conversation

@razorsk8jz
Copy link
Contributor

Here is my attempt at a basic helm chart based on my requirements - this has been tested working on EKS with redis/postgresql enabled in cluster. I have included istio and an ingress for what is working in our setup feel free to change or ask for me to remove

@netlify
Copy link

netlify bot commented Nov 25, 2025

Deploy Preview for peekaping ready!

Name Link
🔨 Latest commit 18f1b34
🔍 Latest deploy log https://app.netlify.com/projects/peekaping/deploys/692769392d884a000831b3f4
😎 Deploy Preview https://deploy-preview-236--peekaping.netlify.app
📱 Preview on mobile
Toggle QR Code...

QR Code

Use your smartphone camera to open QR code link.

To edit notification comments on pull requests, go to your Netlify project configuration.

@netlify
Copy link

netlify bot commented Nov 25, 2025

Deploy Preview for docspeekaping ready!

Name Link
🔨 Latest commit 18f1b34
🔍 Latest deploy log https://app.netlify.com/projects/docspeekaping/deploys/69276939eaa3ae0008065afd
😎 Deploy Preview https://deploy-preview-236--docspeekaping.netlify.app
📱 Preview on mobile
Toggle QR Code...

QR Code

Use your smartphone camera to open QR code link.

To edit notification comments on pull requests, go to your Netlify project configuration.

@razorsk8jz
Copy link
Contributor Author

Feel free to let me know if i missed anything as this was written in about a day.

@zitrusgelb
Copy link

zitrusgelb commented Nov 25, 2025

I don't now how other people feel about it but I think the ability to provide the database credentials from a secret is a must for me.

Nonetheless thank you for starting with this

@razorsk8jz
Copy link
Contributor Author

razorsk8jz commented Nov 25, 2025 via email

@razorsk8jz
Copy link
Contributor Author

I don't now how other people feel about it but I think the ability to provide the database credentials from a secret is a must for me.

Nonetheless thank you for starting with this

I fully agree with this - my goal was to give the community something to start with there is definitely a need to move credentials to secrets and my goal was just a round 1 iteration that the community can improve on. I will probably make some updates as I get time - this was just spare time work to get it up and running for us. As mentioned feel free to approve or use these as a starting point for a more hardened version.

@razorsk8jz
Copy link
Contributor Author

razorsk8jz commented Nov 26, 2025

I don't now how other people feel about it but I think the ability to provide the database credentials from a secret is a must for me.

Nonetheless thank you for starting with this

@zitrusgelb I've added the ability to read the config from either an existing secret in kubernetes, provide them directly in the values.yaml or a combination of both.

@razorsk8jz
Copy link
Contributor Author

I've updated the ingress to support both non istio routes as well as istio backend - I tested both ways and worked in my deployment using eks

@zitrusgelb
Copy link

Nice, really appreciate your work. Though not a member of the project I think it helps a lot. I will give it a try next week.

@zitrusgelb
Copy link

I tried it and it worked. Though I am probably gonna add a way to set the env variables directly in the values.yaml. Anyways I think this PR could be merged after merging the PR in @razorsk8jz Fork (razorsk8jz#1), as it is a good baseline.

@0xfurai
Copy link
Owner

0xfurai commented Dec 21, 2025

Thanks for this contribution! This is huge!

@0xfurai 0xfurai merged commit 22ba259 into 0xfurai:main Dec 21, 2025
4 checks passed
@0xfurai
Copy link
Owner

0xfurai commented Dec 21, 2025

implements #221

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

None yet

Projects

None yet

Development

Successfully merging this pull request may close these issues.

3 participants