mirror of
https://git.lapiole.org/dani/ansible-roles.git
synced 2025-04-16 18:23:40 +02:00
Update to 2022-10-03 16:00
This commit is contained in:
parent
7e816544ca
commit
2c921512aa
@ -5,8 +5,8 @@
|
|||||||
element_id: element
|
element_id: element
|
||||||
|
|
||||||
# Version to deploy, and expected sha256
|
# Version to deploy, and expected sha256
|
||||||
element_version: 1.11.6
|
element_version: 1.11.8
|
||||||
element_archive_sha256: c2f24b624eed057dc0a1a17bdb7e9fc99a54d2a20a5e7cad6e51d074fe367ff4
|
element_archive_sha256: e1c1c6b5e7d961a0b2c8fcff5b1d1c56dc518cd6ab2ebb75a319e8666b513688
|
||||||
|
|
||||||
# Where to install element
|
# Where to install element
|
||||||
element_root_dir: /opt/matrix/element
|
element_root_dir: /opt/matrix/element
|
||||||
|
@ -1,15 +1,15 @@
|
|||||||
---
|
---
|
||||||
|
|
||||||
# Version to deploy
|
# Version to deploy
|
||||||
metabase_version: 0.44.3
|
metabase_version: 0.44.4
|
||||||
# URL to fetch the jar
|
# URL to fetch the jar
|
||||||
metabase_jar_url: https://downloads.metabase.com/v{{ metabase_version }}/metabase.jar
|
metabase_jar_url: https://downloads.metabase.com/v{{ metabase_version }}/metabase.jar
|
||||||
# Expected sha256 of the jar
|
# Expected sha256 of the jar
|
||||||
metabase_jar_sha256: ef8fc6d12251bf2062208b02821f4b948345e8c4b952b08a9a77d328f2c8a6bd
|
metabase_jar_sha256: 72c3286a523138a4e36588b120230bfed16d19cfe25899ccc1ceacf5ca4729b6
|
||||||
# When building from source
|
# When building from source
|
||||||
metabase_archive_url: https://github.com/metabase/metabase/archive/refs/tags/v{{ metabase_version }}.tar.gz
|
metabase_archive_url: https://github.com/metabase/metabase/archive/refs/tags/v{{ metabase_version }}.tar.gz
|
||||||
# Expected sha256 of the archive
|
# Expected sha256 of the archive
|
||||||
metabase_archive_sha256: 98a51d1f3f5408a8da008745032790e0b32213fb9defa135211cbf44556f30c5
|
metabase_archive_sha256: 04cfcb451d79fda049ec08f91925b59ba4f40b8c59ad9c1a93271df985d97d03
|
||||||
# Should ansible handle upgrades ? If set to false, only the initial install (and the config) will be handled
|
# Should ansible handle upgrades ? If set to false, only the initial install (and the config) will be handled
|
||||||
metabase_manage_upgrade: True
|
metabase_manage_upgrade: True
|
||||||
|
|
||||||
|
@ -169,7 +169,7 @@ nomad_base_conf:
|
|||||||
|
|
||||||
# Telemetry settings
|
# Telemetry settings
|
||||||
telemetry:
|
telemetry:
|
||||||
prometheus_metrics: False
|
prometheus_metrics: True
|
||||||
disable_hostname: True
|
disable_hostname: True
|
||||||
publish_allocation_metrics: True
|
publish_allocation_metrics: True
|
||||||
publish_node_metrics: True
|
publish_node_metrics: True
|
||||||
|
@ -389,3 +389,6 @@ nexus.squashtest.org
|
|||||||
|
|
||||||
# Hashicorp products (Nomad, Consul, Vault etc.)
|
# Hashicorp products (Nomad, Consul, Vault etc.)
|
||||||
releases.hashicorp.com
|
releases.hashicorp.com
|
||||||
|
|
||||||
|
# Traefik plugins
|
||||||
|
.plugin.pilot.traefik.io
|
||||||
|
@ -1,11 +1,11 @@
|
|||||||
---
|
---
|
||||||
|
|
||||||
# Version of Vault to install
|
# Version of Vault to install
|
||||||
vault_version: 1.11.3
|
vault_version: 1.11.4
|
||||||
# URL of the archive
|
# URL of the archive
|
||||||
vault_archive_url: https://releases.hashicorp.com/vault/{{ vault_version }}/vault_{{ vault_version }}_linux_amd64.zip
|
vault_archive_url: https://releases.hashicorp.com/vault/{{ vault_version }}/vault_{{ vault_version }}_linux_amd64.zip
|
||||||
# Expected sha256 of the archive
|
# Expected sha256 of the archive
|
||||||
vault_archive_sha256: b433413ce524f26abe6292f7fc95f267e809daeacdf7ba92b68dead322f92deb
|
vault_archive_sha256: 8764a55bdd69faedaaf5d50325d5e6806041e6305b1e66454b46dc6426d26556
|
||||||
|
|
||||||
# Root dir where Nomad will be installed
|
# Root dir where Nomad will be installed
|
||||||
vault_root_dir: /opt/vault
|
vault_root_dir: /opt/vault
|
||||||
@ -112,6 +112,10 @@ vault_base_conf:
|
|||||||
# tls_cert_file: /opt/vault/tls/consul_cert.crt
|
# tls_cert_file: /opt/vault/tls/consul_cert.crt
|
||||||
# tls_key_file: /opt/vault/tls/consul_key.crt
|
# tls_key_file: /opt/vault/tls/consul_key.crt
|
||||||
|
|
||||||
|
telemetry:
|
||||||
|
prometheus_retention_time: 1h
|
||||||
|
disable_hostname: True
|
||||||
|
|
||||||
# You can add additional paramters in vault_extra_conf (or vault_host_conf)
|
# You can add additional paramters in vault_extra_conf (or vault_host_conf)
|
||||||
# they will be merged into the vault_base_conf before rendering
|
# they will be merged into the vault_base_conf before rendering
|
||||||
# Example
|
# Example
|
||||||
|
@ -57,3 +57,12 @@ service_registration "consul" {
|
|||||||
{% endif %}
|
{% endif %}
|
||||||
|
|
||||||
ui = {{ vault_conf.ui | ternary('true', 'false') }}
|
ui = {{ vault_conf.ui | ternary('true', 'false') }}
|
||||||
|
|
||||||
|
telemetry {
|
||||||
|
{% for key in ['prometheus_retention_time'] %}
|
||||||
|
{{ key }} = "{{ vault_conf.telemetry[key] }}"
|
||||||
|
{% endfor %}
|
||||||
|
{% for key in ['disable_hostname'] %}
|
||||||
|
{{ key }} = {{ vault_conf.telemetry[key] | ternary('true', 'false') }}
|
||||||
|
{% endfor %}
|
||||||
|
}
|
||||||
|
Loading…
x
Reference in New Issue
Block a user