diff --git a/src/aks-platform/.terraform.lock.hcl b/src/aks-platform/.terraform.lock.hcl index 677d8574..877431e4 100644 --- a/src/aks-platform/.terraform.lock.hcl +++ b/src/aks-platform/.terraform.lock.hcl @@ -5,6 +5,10 @@ provider "registry.terraform.io/hashicorp/azuread" { version = "2.40.0" constraints = "> 2.10.0" hashes = [ + "h1:dCp1/MhTXZBOhTMT40casPdBVM4J1V6sRtRPJwv8r7E=", + "h1:fH+wk3nY1D09xgcUHE66ox7JF5OEbwQbQbaxomt5GVQ=", + "h1:jtdDK7uhdbYc39Fm3nzrNCoQ/zp0boDNczn2cv9WHHQ=", + "h1:ym1nSH/bHzANaUBETxViclMpHL/28PzMXGYEg+HItNs=", "h1:dCp1/MhTXZBOhTMT40casPdBVM4J1V6sRtRPJwv8r7E=", "h1:fH+wk3nY1D09xgcUHE66ox7JF5OEbwQbQbaxomt5GVQ=", "h1:jtdDK7uhdbYc39Fm3nzrNCoQ/zp0boDNczn2cv9WHHQ=", @@ -21,28 +25,39 @@ provider "registry.terraform.io/hashicorp/azuread" { "zh:c73b64a52d6c8ec816c073d8113cb9eb9ba99bb78af5d67423a70a127ac92e48", "zh:e8687d575e9bb6a94bc593dd1a9b8e0529c391e398d877dff1a8f330f2862551", "zh:ff6e70ad6146c5e3ff1aa90471d48eba67892ced5a5bde0946d1bd16b262c78c", + "zh:2bfa5dfa9b7d1fd58c3cc92251b3d140e17bca8da4cd44f6b02da51709ceeb34", + "zh:5327aa0643dbb3e4387f1a41b25211ac562be908b95631ca81917cc90530ed9a", + "zh:6365ee93a131c3f1122155890121778198ba26cf01286aa568d7343ce746f1e8", + "zh:75c01bbb0a337f0a32ae11fb9b74440b12230027d184244d417c852ee0fe56cd", + "zh:894907e8b3d31efea4597ddea7217660259950eefba1b1a47dbde1b024577e08", + "zh:a29f2d8b112803ce30ca75f390a9c05b87846d17b8ac32730fa44ed00d8fbeca", + "zh:a35f40210d810e65e20c8a16d1cba10867225e1f45826c29eb03860aa7d5fabd", + "zh:b8dfb7a03547cae504fb060ca794b5b7ac139e03a098e8a9612488aa4023edc1", + "zh:c73b64a52d6c8ec816c073d8113cb9eb9ba99bb78af5d67423a70a127ac92e48", + "zh:e8687d575e9bb6a94bc593dd1a9b8e0529c391e398d877dff1a8f330f2862551", + "zh:ff6e70ad6146c5e3ff1aa90471d48eba67892ced5a5bde0946d1bd16b262c78c", ] } provider "registry.terraform.io/hashicorp/azurerm" { - version = "3.38.0" - constraints = ">= 3.30.0, >= 3.36.0, <= 3.38.0" + version = "3.64.0" + constraints = ">= 3.30.0, >= 3.64.0, <= 3.64.0" hashes = [ - "h1:Isa/rY8+4+DCatuYgmDT4TYkcp/he7RrfR6jyhrm7hQ=", - "h1:Pq4ZX7h5FM1h+NBCjReCPMy1qwaFAvJ3EY45+mObfSg=", - "h1:Wb7brdbvDPw01eMasdl8vmkPeCZLT0rbOQRAHw2N/TY=", - "h1:cRwQAznzBQsumUaPUvDHqmKLP+tM9jNL0kEngi4S3r0=", - "zh:08df48bdaf162bf3da7ac2b09147d44f94fae6f3cfd97d6cf9c45cb7c1c36a44", - "zh:220b68a3f819777872281974e6621527698575096c3a2ef78cb0aabf28665161", - "zh:25db1128a96599ffbcc7e865579bec7c009cb4e7f7731e0e30d261ab02cc38d5", - "zh:279444db11f570b837143559e5df7453bd8aeda4e22a9879a5a1a795bf6612a3", - "zh:2d506b6b865f6d5143e54e139d9a61b18bdcc8b9485d2bc7237e95a53a9c7ed9", - "zh:6ddb2cbcdf15b432508fe00ee7863f6d51a136db1746e7af03bec8ce2a09bad3", - "zh:96b664a716678923ce0f9828eaad22b5353669fa5013ea39b7b8081a77988b85", - "zh:a9ca583b219a3daba171ca11908547abb1b09453934950aacff17ae8b51d0ff0", - "zh:aa497620c82afab7819736180f0a56b76da6f3e23bd0580383fda98104b4e5c2", - "zh:ab9e9f3c35288d0bd615024f213e46d16d639c281f7d850b21971b530d08e231", - "zh:b164a0ddb30b64c35f13dad0aa9701a4e3eb24dc8165a3e794c499f1e9070b99", + "h1:cmleWBjFp4eK0iQICvCKxTxECx8nvl0MAfth9mLzT70=", + "h1:g2p1LQQy+Ih6gWzMQTmlb6v5s9iXP3EusXIwd63APg0=", + "h1:mjWPxOTzxJcw4QCRopBwO568tnfZRZPAbCIEzQj2ous=", + "h1:y6R1GCooPE9y9BpPuhqokyYJky5T8s0dOMgFsC+VL/0=", + "zh:08463ceca4208419715b5816d120fe05f2abda9bea083cfe1818e25517483581", + "zh:130760c5ab791bd114b3edbb79b95138a60cd97f1b72e4096b33a207b367d126", + "zh:26403fc9be70b60fddf09b1510067763b2da57cf3b116d375b5bee048acad8d2", + "zh:352c79bb75c1a0d88a686c4e22fded1114de0249aba081e34265d4b11c878fc7", + "zh:52ee37390b70e89add8b70b43c05bc90037a723a726c63440943f9bf2f064817", + "zh:79ad0c72e2b15b9412f1fdb5461dfcec6ca192ab4512e70fcbcea4585c02d71e", + "zh:7a60226f41064a95db14e64dc0250063a621df254ee41e4b3b25ccc5ce47936d", + "zh:9191136871cf2ffa4f1963a6b79d6868f911f827330234421af869df616bacd0", + "zh:a32cb5eb225ccea6d3d5e70f948dfc4b4ed442cd20ceb80ce014a3df05ab93e8", + "zh:de16cb2726016e0eb9a04599fdb81b503a96263b1805243b75b202c559051a5e", + "zh:ee636ddb5281772071f9952f75b2c7ad7f443f25c84c96e6e78d628a151ec4ac", "zh:f569b65999264a9416862bca5cd2a6177d94ccb0424f3a4ef424428912b9cb3c", ] } diff --git a/src/aks-platform/01_network_aks.tf b/src/aks-platform/01_network_aks.tf index 41b6aeeb..6673982a 100644 --- a/src/aks-platform/01_network_aks.tf +++ b/src/aks-platform/01_network_aks.tf @@ -1,6 +1,6 @@ # k8s cluster subnet module "snet_aks" { - source = "git::https://github.com/pagopa/terraform-azurerm-v3.git//subnet?ref=v4.1.0" + source = "git::https://github.com/pagopa/terraform-azurerm-v3.git//subnet?ref=v6.20.1" name = "${local.project}-aks-snet" diff --git a/src/aks-platform/03_aks.tf b/src/aks-platform/02_aks.tf similarity index 95% rename from src/aks-platform/03_aks.tf rename to src/aks-platform/02_aks.tf index 3188c9c6..b804a254 100644 --- a/src/aks-platform/03_aks.tf +++ b/src/aks-platform/02_aks.tf @@ -5,7 +5,7 @@ resource "azurerm_resource_group" "rg_aks" { } module "aks" { - source = "git::https://github.com/pagopa/terraform-azurerm-v3.git//kubernetes_cluster?ref=v4.1.0" + source = "git::https://github.com/pagopa/terraform-azurerm-v3.git//kubernetes_cluster?ref=v6.20.1" count = var.aks_enabled ? 1 : 0 @@ -96,6 +96,12 @@ module "aks" { ] } +resource "azurerm_role_assignment" "managed_identity_operator_vs_aks_managed_identity" { + scope = azurerm_resource_group.rg_aks.id + role_definition_name = "Managed Identity Operator" + principal_id = module.aks[0].identity_principal_id +} + # # ACR connection # diff --git a/src/aks-platform/03_monitoring.tf b/src/aks-platform/03_monitoring.tf new file mode 100644 index 00000000..1e24ef92 --- /dev/null +++ b/src/aks-platform/03_monitoring.tf @@ -0,0 +1,113 @@ +resource "kubernetes_namespace" "monitoring" { + metadata { + name = "monitoring" + } +} + +resource "helm_release" "prometheus" { + name = "prometheus" + repository = "https://prometheus-community.github.io/helm-charts" + chart = "prometheus" + version = var.prometheus_helm.chart_version + namespace = kubernetes_namespace.monitoring.metadata[0].name + + set { + name = "server.global.scrape_interval" + value = "30s" + } + set { + name = "alertmanager.image.repository" + value = var.prometheus_helm.alertmanager.image_name + } + set { + name = "alertmanager.image.tag" + value = var.prometheus_helm.alertmanager.image_tag + } + set { + name = "alertmanager.configmapReload.prometheus.image.repository" + value = var.prometheus_helm.configmap_reload_prometheus.image_name + } + set { + name = "alertmanager.configmapReload.prometheus.image.tag" + value = var.prometheus_helm.configmap_reload_prometheus.image_tag + } + set { + name = "alertmanager.configmapReload.alertmanager.image.repository" + value = var.prometheus_helm.configmap_reload_alertmanager.image_name + } + set { + name = "alertmanager.configmapReload.alertmanager.image.tag" + value = var.prometheus_helm.configmap_reload_alertmanager.image_tag + } + set { + name = "alertmanager.nodeExporter.image.repository" + value = var.prometheus_helm.node_exporter.image_name + } + set { + name = "alertmanager.nodeExporter.image.tag" + value = var.prometheus_helm.node_exporter.image_tag + } + set { + name = "alertmanager.nodeExporter.image.repository" + value = var.prometheus_helm.node_exporter.image_name + } + set { + name = "alertmanager.nodeExporter.image.tag" + value = var.prometheus_helm.node_exporter.image_tag + } + set { + name = "alertmanager.server.image.repository" + value = var.prometheus_helm.server.image_name + } + set { + name = "alertmanager.server.image.tag" + value = var.prometheus_helm.server.image_tag + } + set { + name = "alertmanager.pushgateway.image.repository" + value = var.prometheus_helm.pushgateway.image_name + } + set { + name = "alertmanager.pushgateway.image.tag" + value = var.prometheus_helm.pushgateway.image_tag + } +} + +# resource "helm_release" "grafana" { +# name = "grafana" +# repository = "https://grafana.github.io/helm-charts" +# chart = "grafana" +# version = var.grafana_helm_version +# namespace = kubernetes_namespace.monitoring.metadata[0].name + +# set { +# name = "adminUser" +# value = data.azurerm_key_vault_secret.grafana_admin_username.value +# } + +# set { +# name = "adminPassword" +# value = data.azurerm_key_vault_secret.grafana_admin_password.value +# } +# } + +resource "helm_release" "monitoring_reloader" { + name = "reloader" + repository = "https://stakater.github.io/stakater-charts" + chart = "reloader" + version = var.reloader_helm.chart_version + namespace = kubernetes_namespace.monitoring.metadata[0].name + + set { + name = "reloader.watchGlobally" + value = "false" + } + set { + name = "reloader.deployment.image.name" + value = var.reloader_helm.image_name + } + set { + name = "reloader.deployment.image.tag" + value = var.reloader_helm.image_tag + } +} diff --git a/src/aks-platform/04_rbac.tf b/src/aks-platform/04_rbac.tf index 592d6554..6f41e51a 100644 --- a/src/aks-platform/04_rbac.tf +++ b/src/aks-platform/04_rbac.tf @@ -207,6 +207,10 @@ resource "kubernetes_cluster_role_binding" "edit_binding" { name = data.azuread_group.adgroup_developers.object_id namespace = "kube-system" } + + depends_on = [ + module.aks + ] } resource "kubernetes_cluster_role_binding" "view_binding" { diff --git a/src/aks-platform/05_ingress.tf b/src/aks-platform/05_ingress.tf index faea08cd..48441302 100644 --- a/src/aks-platform/05_ingress.tf +++ b/src/aks-platform/05_ingress.tf @@ -33,10 +33,6 @@ module "nginx_ingress" { name = "controller.replicaCount" value = var.ingress_replica_count }, - { - name = "controller.service.annotations.service\\.beta\\.kubernetes\\.io/azure-load-balancer-health-probe-request-path" - value = "/healthz" - }, { name = "controller.nodeSelector.beta\\.kubernetes\\.io/os" value = "linux" @@ -48,6 +44,10 @@ module "nginx_ingress" { { name = "controller.admissionWebhooks.patch.nodeSelector.beta\\.kubernetes\\.io/os" value = "linux" + }, + { + name = "controller.service.annotations.service\\.beta\\.kubernetes\\.io/azure-load-balancer-health-probe-request-path" + value = "/healthz" } ] diff --git a/src/aks-platform/05_keda.tf b/src/aks-platform/05_keda.tf index a3718b13..c0a1f7c8 100644 --- a/src/aks-platform/05_keda.tf +++ b/src/aks-platform/05_keda.tf @@ -13,7 +13,7 @@ locals { } module "keda_pod_identity" { - source = "git::https://github.com/pagopa/terraform-azurerm-v3.git//kubernetes_pod_identity?ref=v4.1.0" + source = "git::https://github.com/pagopa/terraform-azurerm-v3.git//kubernetes_pod_identity?ref=v6.20.1" resource_group_name = azurerm_resource_group.rg_aks.name location = var.location @@ -33,6 +33,10 @@ resource "azurerm_role_assignment" "keda_monitoring_reader" { scope = data.azurerm_subscription.current.id role_definition_name = "Monitoring Reader" principal_id = module.keda_pod_identity.identity.principal_id + + depends_on = [ + module.aks + ] } resource "helm_release" "keda" { diff --git a/src/aks-platform/99_main.tf b/src/aks-platform/99_main.tf index 36eaa837..754d3a9b 100644 --- a/src/aks-platform/99_main.tf +++ b/src/aks-platform/99_main.tf @@ -3,7 +3,7 @@ terraform { required_providers { azurerm = { source = "hashicorp/azurerm" - version = ">= 3.36.0" + version = ">= 3.64.0" } azuread = { source = "hashicorp/azuread" diff --git a/src/aks-platform/99_main.tf.ci b/src/aks-platform/99_main.tf.ci index be975b4f..5249a96e 100644 --- a/src/aks-platform/99_main.tf.ci +++ b/src/aks-platform/99_main.tf.ci @@ -3,7 +3,7 @@ terraform { required_providers { azurerm = { source = "hashicorp/azurerm" - version = ">= 3.36.0" + version = ">= 3.64.0" } azuread = { source = "hashicorp/azuread" diff --git a/src/aks-platform/99_variables.tf b/src/aks-platform/99_variables.tf index 882b6371..5f7131cb 100644 --- a/src/aks-platform/99_variables.tf +++ b/src/aks-platform/99_variables.tf @@ -515,3 +515,47 @@ variable "nginx_helm_version" { variable "keda_helm_version" { type = string } + +variable "reloader_helm" { + type = object({ + chart_version = string, + image_name = string, + image_tag = string + }) + description = "reloader helm chart configuration" +} + +variable "prometheus_helm" { + type = object({ + chart_version = string, + alertmanager = object({ + image_name = string, + image_tag = string, + }), + configmap_reload_prometheus = object({ + image_name = string, + image_tag = string, + }), + configmap_reload_alertmanager = object({ + image_name = string, + image_tag = string, + }), + configmap_reload_prometheus = object({ + image_name = string, + image_tag = string, + }), + node_exporter = object({ + image_name = string, + image_tag = string, + }), + server = object({ + image_name = string, + image_tag = string, + }), + pushgateway = object({ + image_name = string, + image_tag = string, + }), + }) + description = "prometheus helm chart configuration" +} diff --git a/src/aks-platform/README.md b/src/aks-platform/README.md index 41d0d6f4..12cbb544 100644 --- a/src/aks-platform/README.md +++ b/src/aks-platform/README.md @@ -30,16 +30,16 @@ Re-enable all the resource, commented before to complete the procedure |------|---------| | [terraform](#requirement\_terraform) | >=1.3.0 | | [azuread](#requirement\_azuread) | > 2.10.0 | -| [azurerm](#requirement\_azurerm) | >= 3.36.0 | +| [azurerm](#requirement\_azurerm) | >= 3.64.0 | ## Modules | Name | Source | Version | |------|--------|---------| -| [aks](#module\_aks) | git::https://github.com/pagopa/terraform-azurerm-v3.git//kubernetes_cluster | v4.1.0 | -| [keda\_pod\_identity](#module\_keda\_pod\_identity) | git::https://github.com/pagopa/terraform-azurerm-v3.git//kubernetes_pod_identity | v4.1.0 | +| [aks](#module\_aks) | git::https://github.com/pagopa/terraform-azurerm-v3.git//kubernetes_cluster | v6.20.1 | +| [keda\_pod\_identity](#module\_keda\_pod\_identity) | git::https://github.com/pagopa/terraform-azurerm-v3.git//kubernetes_pod_identity | v6.20.1 | | [nginx\_ingress](#module\_nginx\_ingress) | terraform-module/release/helm | 2.7.0 | -| [snet\_aks](#module\_snet\_aks) | git::https://github.com/pagopa/terraform-azurerm-v3.git//subnet | v4.1.0 | +| [snet\_aks](#module\_snet\_aks) | git::https://github.com/pagopa/terraform-azurerm-v3.git//subnet | v6.20.1 | ## Resources @@ -48,7 +48,10 @@ Re-enable all the resource, commented before to complete the procedure | [azurerm_resource_group.rg_aks](https://registry.terraform.io/providers/hashicorp/azurerm/latest/docs/resources/resource_group) | resource | | [azurerm_role_assignment.aks_to_acr](https://registry.terraform.io/providers/hashicorp/azurerm/latest/docs/resources/role_assignment) | resource | | [azurerm_role_assignment.keda_monitoring_reader](https://registry.terraform.io/providers/hashicorp/azurerm/latest/docs/resources/role_assignment) | resource | +| [azurerm_role_assignment.managed_identity_operator_vs_aks_managed_identity](https://registry.terraform.io/providers/hashicorp/azurerm/latest/docs/resources/role_assignment) | resource | | [helm_release.keda](https://registry.terraform.io/providers/hashicorp/helm/latest/docs/resources/release) | resource | +| [helm_release.monitoring_reloader](https://registry.terraform.io/providers/hashicorp/helm/latest/docs/resources/release) | resource | +| [helm_release.prometheus](https://registry.terraform.io/providers/hashicorp/helm/latest/docs/resources/release) | resource | | [kubernetes_cluster_role.cluster_deployer](https://registry.terraform.io/providers/hashicorp/kubernetes/latest/docs/resources/cluster_role) | resource | | [kubernetes_cluster_role.edit_extra](https://registry.terraform.io/providers/hashicorp/kubernetes/latest/docs/resources/cluster_role) | resource | | [kubernetes_cluster_role.system_cluster_deployer](https://registry.terraform.io/providers/hashicorp/kubernetes/latest/docs/resources/cluster_role) | resource | @@ -59,6 +62,7 @@ Re-enable all the resource, commented before to complete the procedure | [kubernetes_cluster_role_binding.view_extra_binding](https://registry.terraform.io/providers/hashicorp/kubernetes/latest/docs/resources/cluster_role_binding) | resource | | [kubernetes_namespace.ingress](https://registry.terraform.io/providers/hashicorp/kubernetes/latest/docs/resources/namespace) | resource | | [kubernetes_namespace.keda](https://registry.terraform.io/providers/hashicorp/kubernetes/latest/docs/resources/namespace) | resource | +| [kubernetes_namespace.monitoring](https://registry.terraform.io/providers/hashicorp/kubernetes/latest/docs/resources/namespace) | resource | | [null_resource.create_vnet_core_aks_link](https://registry.terraform.io/providers/hashicorp/null/latest/docs/resources/resource) | resource | | [azuread_group.adgroup_admin](https://registry.terraform.io/providers/hashicorp/azuread/latest/docs/data-sources/group) | data source | | [azuread_group.adgroup_developers](https://registry.terraform.io/providers/hashicorp/azuread/latest/docs/data-sources/group) | data source | @@ -119,7 +123,9 @@ Re-enable all the resource, commented before to complete the procedure | [lock\_enable](#input\_lock\_enable) | Apply locks to block accedentaly deletions. | `bool` | `false` | no | | [nginx\_helm\_version](#input\_nginx\_helm\_version) | NGINX helm verison | `string` | n/a | yes | | [prefix](#input\_prefix) | n/a | `string` | `"cstar"` | no | +| [prometheus\_helm](#input\_prometheus\_helm) | prometheus helm chart configuration |
object({
chart_version = string,
alertmanager = object({
image_name = string,
image_tag = string,
}),
configmap_reload_prometheus = object({
image_name = string,
image_tag = string,
}),
configmap_reload_alertmanager = object({
image_name = string,
image_tag = string,
}),
configmap_reload_prometheus = object({
image_name = string,
image_tag = string,
}),
node_exporter = object({
image_name = string,
image_tag = string,
}),
server = object({
image_name = string,
image_tag = string,
}),
pushgateway = object({
image_name = string,
image_tag = string,
}),
})
| n/a | yes | | [public\_ip\_aksoutbound\_name](#input\_public\_ip\_aksoutbound\_name) | Public IP AKS outbound | `string` | n/a | yes | +| [reloader\_helm](#input\_reloader\_helm) | reloader helm chart configuration |
object({
chart_version = string,
image_name = string,
image_tag = string
})
| n/a | yes | | [rg\_vnet\_aks\_name](#input\_rg\_vnet\_aks\_name) | Resource group dedicated to VNet AKS | `string` | n/a | yes | | [tags](#input\_tags) | n/a | `map(any)` |
{
"CreatedBy": "Terraform"
}
| no | | [vnet\_aks\_name](#input\_vnet\_aks\_name) | VNet dedicated to AKS | `string` | n/a | yes | diff --git a/src/aks-platform/env/dev01/terraform.tfvars b/src/aks-platform/env/dev01/terraform.tfvars index b14dbf08..fce70726 100644 --- a/src/aks-platform/env/dev01/terraform.tfvars +++ b/src/aks-platform/env/dev01/terraform.tfvars @@ -99,8 +99,60 @@ aks_addons = { pod_identity_enabled = true, } -ingress_replica_count = "2" +ingress_replica_count = "1" # This is the k8s ingress controller ip. It must be in the aks subnet range. ingress_load_balancer_ip = "10.11.100.250" -nginx_helm_version = "4.1.0" -keda_helm_version = "2.6.2" +nginx_helm_version = "4.7.1" +keda_helm_version = "2.11.1" + +# chart releases: https://github.com/stakater/Reloader/releases +# image tags: https://hub.docker.com/r/stakater/reloader/tags +reloader_helm = { + chart_version = "v1.0.30" + image_name = "stakater/reloader" + image_tag = "v1.0.30" +} + +# chart releases: https://github.com/prometheus-community/helm-charts/releases?q=tag%3Aprometheus-15&expanded=true +# quay.io/prometheus/alertmanager image tags: https://quay.io/repository/prometheus/alertmanager?tab=tags +# jimmidyson/configmap-reload image tags: https://hub.docker.com/r/jimmidyson/configmap-reload/tags +# quay.io/prometheus/node-exporter image tags: https://quay.io/repository/prometheus/node-exporter?tab=tags +# quay.io/prometheus/prometheus image tags: https://quay.io/repository/prometheus/prometheus?tab=tags +# prom/pushgateway image tags:https://hub.docker.com/r/prom/pushgateway/tags +prometheus_helm = { + chart_version = "15.18.0" + alertmanager = { + image_name = "quay.io/prometheus/alertmanager" + image_tag = "v0.25.0" + } + configmap_reload_prometheus = { + image_name = "jimmidyson/configmap-reload" + image_tag = "v0.9.0" + } + configmap_reload_alertmanager = { + image_name = "jimmidyson/configmap-reload" + image_tag = "v0.9.0" + } + node_exporter = { + image_name = "quay.io/prometheus/node-exporter" + image_tag = "v1.6.1" + } + server = { + image_name = "quay.io/prometheus/prometheus" + image_tag = "v2.45.0" + } + pushgateway = { + image_name = "prom/pushgateway" + image_tag = "v1.6.0" + } +} + +# chart releases: https://github.com/pagopa/aks-microservice-chart-blueprint/releases +# image tags: https://github.com/pagopa/infra-ssl-check/releases +tls_cert_check_helm = { + chart_version = "1.21.0" + image_name = "ghcr.io/pagopa/infra-ssl-check" + image_tag = "v1.2.2@sha256:22f4b53177cc8891bf10cbd0deb39f60e1cd12877021c3048a01e7738f63e0f9" +} + +tls_checker_https_endpoints_to_check = []