Skip to content

Otel jaeger v2 helm chart along with plater integration#1073

Open
hyi wants to merge 5 commits into
developfrom
otel-jaeger-v2
Open

Otel jaeger v2 helm chart along with plater integration#1073
hyi wants to merge 5 commits into
developfrom
otel-jaeger-v2

Conversation

@hyi
Copy link
Copy Markdown
Contributor

@hyi hyi commented May 11, 2026

Otel jaeger v2 helm chart along with plater integration.

@hyi hyi requested a review from EvanDietzMorris May 11, 2026 15:34
Comment thread helm/plater/values.yaml Outdated
plater:
repository: ghcr.io/translatorsri/plater-clustered
tag: "v2.1.4"
tag: "otel-test-connection"
Copy link
Copy Markdown
Contributor Author

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

@EvanDietzMorris I'll update this tag after a new release is created for plater with this PR merged.

@EvanDietzMorris
Copy link
Copy Markdown
Collaborator

EvanDietzMorris commented May 11, 2026

Very cool. I haven't tried installing this but the instance at RENCI seems to be working.

I noticed that the values files here do not get encrypted with git-crypt, because they don't match the patterns in https://github.com/helxplatform/translator-devops/blob/develop/.gitattributes

We might want to go ahead and make a renci-values and ncats-values files that contain any secrets or possibly resource allocations we can tweak independently. Otherwise, after we update the plater image, I think we might as well merge this is in as a great first pass.

@hyi
Copy link
Copy Markdown
Contributor Author

hyi commented May 11, 2026

@EvanDietzMorris Thanks for pointing me to the .gitattributes git-crypt which I totally forgot I might need to update to have the new values file encrypted. After looking into the new values files more carefully, I verified there are no secrets included in the new values file, but a secret yaml file needs to be generated as part of the jaeger setup and deployment process as detailed in the readme file. The main reason is that the elasticsearch helm chart deployment will randomly generate a password secret for handshaking with jaeger, and that value needs to be used to generate a secret value yaml file which will be used for deploying jaeger as part of the user authentication to link to the elasticsearch backend. So we may not need to encrypt the new values files after all.

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

None yet

Projects

None yet

Development

Successfully merging this pull request may close these issues.

2 participants