hexsha
stringlengths
40
40
size
int64
2
1.04M
ext
stringclasses
6 values
lang
stringclasses
1 value
max_stars_repo_path
stringlengths
5
244
max_stars_repo_name
stringlengths
5
96
max_stars_repo_head_hexsha
stringlengths
40
40
max_stars_repo_licenses
sequence
max_stars_count
int64
1
84.9k
max_stars_repo_stars_event_min_datetime
stringlengths
24
24
max_stars_repo_stars_event_max_datetime
stringlengths
24
24
max_issues_repo_path
stringlengths
5
244
max_issues_repo_name
stringlengths
5
96
max_issues_repo_head_hexsha
stringlengths
40
40
max_issues_repo_licenses
sequence
max_issues_count
int64
1
98.3k
max_issues_repo_issues_event_min_datetime
stringlengths
24
24
max_issues_repo_issues_event_max_datetime
stringlengths
24
24
max_forks_repo_path
stringlengths
5
244
max_forks_repo_name
stringlengths
5
96
max_forks_repo_head_hexsha
stringlengths
40
40
max_forks_repo_licenses
sequence
max_forks_count
int64
1
36.6k
max_forks_repo_forks_event_min_datetime
stringlengths
24
24
max_forks_repo_forks_event_max_datetime
stringlengths
24
24
content
stringlengths
2
1.04M
avg_line_length
float64
1
11.9k
max_line_length
int64
1
548k
alphanum_fraction
float64
0
1
a62d7cf4f5a682f9b891e23c793dff9e8c598c38
20,482
yaml
YAML
src/front-door/azext_front_door/tests/latest/recordings/test_frontend_endpoint_basic.yaml
00Kai0/azure-cli-extensions
4bcafd5c9bb4d4f2eca0b8b512d9d79fe9061b8e
[ "MIT" ]
null
null
null
src/front-door/azext_front_door/tests/latest/recordings/test_frontend_endpoint_basic.yaml
00Kai0/azure-cli-extensions
4bcafd5c9bb4d4f2eca0b8b512d9d79fe9061b8e
[ "MIT" ]
null
null
null
src/front-door/azext_front_door/tests/latest/recordings/test_frontend_endpoint_basic.yaml
00Kai0/azure-cli-extensions
4bcafd5c9bb4d4f2eca0b8b512d9d79fe9061b8e
[ "MIT" ]
null
null
null
interactions: - request: body: '{"location": "global", "properties": {"friendlyName": "clifrontdoor000002", "routingRules": [{"properties": {"frontendEndpoints": [{"id": "/subscriptions/00000000-0000-0000-0000-000000000000/resourceGroups/clitest.rg000001/providers/Microsoft.Network/frontdoors/clifrontdoor000002/frontendEndpoints/DefaultFrontendEndpoint"}], "acceptedProtocols": ["Http"], "patternsToMatch": ["/*"], "enabledState": "Enabled", "routeConfiguration": {"@odata.type": "#Microsoft.Azure.FrontDoor.Models.FrontdoorForwardingConfiguration", "forwardingProtocol": "MatchRequest", "backendPool": {"id": "/subscriptions/00000000-0000-0000-0000-000000000000/resourceGroups/clitest.rg000001/providers/Microsoft.Network/frontdoors/clifrontdoor000002/backendPools/DefaultBackendPool"}}, "resourceState": "Enabled"}, "name": "DefaultRoutingRule"}], "loadBalancingSettings": [{"properties": {"sampleSize": 4, "successfulSamplesRequired": 2, "additionalLatencyMilliseconds": 0, "resourceState": "Enabled"}, "name": "DefaultLoadBalancingSettings"}], "healthProbeSettings": [{"properties": {"path": "/", "protocol": "Https", "intervalInSeconds": 30, "healthProbeMethod": "HEAD", "resourceState": "Enabled"}, "name": "DefaultProbeSettings"}], "backendPools": [{"properties": {"backends": [{"address": "202.120.2.3", "httpPort": 80, "httpsPort": 443, "enabledState": "Enabled", "priority": 1, "weight": 50, "backendHostHeader": "202.120.2.3"}], "loadBalancingSettings": {"id": "/subscriptions/00000000-0000-0000-0000-000000000000/resourceGroups/clitest.rg000001/providers/Microsoft.Network/frontdoors/clifrontdoor000002/loadBalancingSettings/DefaultLoadBalancingSettings"}, "healthProbeSettings": {"id": "/subscriptions/00000000-0000-0000-0000-000000000000/resourceGroups/clitest.rg000001/providers/Microsoft.Network/frontdoors/clifrontdoor000002/healthProbeSettings/DefaultProbeSettings"}, "resourceState": "Enabled"}, "name": "DefaultBackendPool"}], "frontendEndpoints": [{"properties": {"hostName": "clifrontdoor000002.azurefd.net", "sessionAffinityEnabledState": "Disabled", "resourceState": "Enabled"}, "name": "DefaultFrontendEndpoint"}], "backendPoolsSettings": {"enforceCertificateNameCheck": "Enabled"}, "enabledState": "Enabled"}}' headers: Accept: - application/json Accept-Encoding: - gzip, deflate CommandName: - network front-door create Connection: - keep-alive Content-Length: - '2453' Content-Type: - application/json; charset=utf-8 ParameterSetName: - -g -n --backend-address User-Agent: - python/3.7.9 (Windows-10-10.0.19041-SP0) msrest/0.6.21 msrest_azure/0.6.3 azure-mgmt-frontdoor/0.3.0 Azure-SDK-For-Python AZURECLI/2.21.0 (MSI) accept-language: - en-US method: PUT uri: https://management.azure.com/subscriptions/00000000-0000-0000-0000-000000000000/resourceGroups/clitest.rg000001/providers/Microsoft.Network/frontDoors/clifrontdoor000002?api-version=2020-05-01 response: body: string: '{"name":"clifrontdoor000002","id":"/subscriptions/00000000-0000-0000-0000-000000000000/resourcegroups/clitest.rg000001/providers/Microsoft.Network/frontdoors/clifrontdoor000002","type":"Microsoft.Network/frontdoors","location":"Global","tags":{},"properties":{"provisioningState":"Creating","resourceState":"Creating","enabledState":"Enabled","cName":"clifrontdoor000002.azurefd.net","frontdoorId":"767632aa-08cc-4c01-86a3-261cd5d58eba","friendlyName":"clifrontdoor000002","backendPools":[{"id":"/subscriptions/00000000-0000-0000-0000-000000000000/resourcegroups/clitest.rg000001/providers/Microsoft.Network/Frontdoors/clifrontdoor000002/BackendPools/DefaultBackendPool","name":"DefaultBackendPool","type":"Microsoft.Network/Frontdoors/BackendPools","properties":{"resourceState":"Creating","backends":[{"address":"202.120.2.3","httpPort":80,"httpsPort":443,"priority":1,"weight":50,"backendHostHeader":"202.120.2.3","enabledState":"Enabled","privateLinkAlias":null,"privateLinkApprovalMessage":null,"privateLinkResourceId":null,"privateLinkLocation":null,"privateEndpointStatus":null}],"healthProbeSettings":{"id":"/subscriptions/00000000-0000-0000-0000-000000000000/resourceGroups/clitest.rg000001/providers/Microsoft.Network/frontdoors/clifrontdoor000002/healthProbeSettings/DefaultProbeSettings"},"loadBalancingSettings":{"id":"/subscriptions/00000000-0000-0000-0000-000000000000/resourceGroups/clitest.rg000001/providers/Microsoft.Network/frontdoors/clifrontdoor000002/loadBalancingSettings/DefaultLoadBalancingSettings"}}}],"healthProbeSettings":[{"id":"/subscriptions/00000000-0000-0000-0000-000000000000/resourcegroups/clitest.rg000001/providers/Microsoft.Network/Frontdoors/clifrontdoor000002/HealthProbeSettings/DefaultProbeSettings","name":"DefaultProbeSettings","type":"Microsoft.Network/Frontdoors/HealthProbeSettings","properties":{"intervalInSeconds":30,"path":"/","protocol":"Https","resourceState":"Creating","enabledState":"Enabled","healthProbeMethod":"Head"}}],"frontendEndpoints":[{"id":"/subscriptions/00000000-0000-0000-0000-000000000000/resourcegroups/clitest.rg000001/providers/Microsoft.Network/Frontdoors/clifrontdoor000002/FrontendEndpoints/DefaultFrontendEndpoint","name":"DefaultFrontendEndpoint","type":"Microsoft.Network/Frontdoors/FrontendEndpoints","properties":{"hostName":"clifrontdoor000002.azurefd.net","sessionAffinityEnabledState":"Disabled","sessionAffinityTtlSeconds":0,"customHttpsProvisioningState":null,"customHttpsProvisioningSubstate":null,"resourceState":"Creating","webApplicationFirewallPolicyLink":null,"customHttpsConfiguration":null}}],"loadBalancingSettings":[{"id":"/subscriptions/00000000-0000-0000-0000-000000000000/resourcegroups/clitest.rg000001/providers/Microsoft.Network/Frontdoors/clifrontdoor000002/LoadBalancingSettings/DefaultLoadBalancingSettings","name":"DefaultLoadBalancingSettings","type":"Microsoft.Network/Frontdoors/LoadBalancingSettings","properties":{"additionalLatencyMilliseconds":0,"sampleSize":4,"successfulSamplesRequired":2,"resourceState":"Creating"}}],"rulesEngines":[],"routingRules":[{"id":"/subscriptions/00000000-0000-0000-0000-000000000000/resourcegroups/clitest.rg000001/providers/Microsoft.Network/Frontdoors/clifrontdoor000002/RoutingRules/DefaultRoutingRule","name":"DefaultRoutingRule","type":"Microsoft.Network/Frontdoors/RoutingRules","properties":{"acceptedProtocols":["Http"],"patternsToMatch":["/*"],"enabledState":"Enabled","resourceState":"Creating","frontendEndpoints":[{"id":"/subscriptions/00000000-0000-0000-0000-000000000000/resourceGroups/clitest.rg000001/providers/Microsoft.Network/frontdoors/clifrontdoor000002/frontendEndpoints/DefaultFrontendEndpoint"}],"routeConfiguration":{"customForwardingPath":null,"forwardingProtocol":"MatchRequest","@odata.type":"#Microsoft.Azure.FrontDoor.Models.FrontdoorForwardingConfiguration","cacheConfiguration":null,"backendPool":{"id":"/subscriptions/00000000-0000-0000-0000-000000000000/resourceGroups/clitest.rg000001/providers/Microsoft.Network/frontdoors/clifrontdoor000002/backendPools/DefaultBackendPool"}},"rulesEngine":null,"webApplicationFirewallPolicyLink":null}}],"backendPoolsSettings":{"enforceCertificateNameCheck":"Enabled","sendRecvTimeoutSeconds":30}}}' headers: azure-asyncoperation: - https://management.azure.com/subscriptions/00000000-0000-0000-0000-000000000000/resourcegroups/clitest.rg000001/providers/Microsoft.Network/frontdooroperationresults/f03228c6-66b5-4e56-a696-41301e8e74d1?api-version=2020-05-01 cache-control: - no-cache content-length: - '4833' content-type: - application/json; odata.metadata=minimal; odata.streaming=true date: - Fri, 02 Apr 2021 09:03:21 GMT expires: - '-1' odata-version: - '4.0' pragma: - no-cache server: - Kestrel strict-transport-security: - max-age=31536000; includeSubDomains x-content-type-options: - nosniff x-ms-ratelimit-remaining-subscription-writes: - '1199' status: code: 201 message: Created - request: body: null headers: Accept: - application/json Accept-Encoding: - gzip, deflate CommandName: - network front-door create Connection: - keep-alive ParameterSetName: - -g -n --backend-address User-Agent: - python/3.7.9 (Windows-10-10.0.19041-SP0) msrest/0.6.21 msrest_azure/0.6.3 azure-mgmt-frontdoor/0.3.0 Azure-SDK-For-Python AZURECLI/2.21.0 (MSI) method: GET uri: https://management.azure.com/subscriptions/00000000-0000-0000-0000-000000000000/resourcegroups/clitest.rg000001/providers/Microsoft.Network/frontdooroperationresults/f03228c6-66b5-4e56-a696-41301e8e74d1?api-version=2020-05-01 response: body: string: '{"status":"InProgress","error":{"code":"None","message":null}}' headers: cache-control: - no-cache content-length: - '62' content-type: - application/json; odata.metadata=minimal; odata.streaming=true date: - Fri, 02 Apr 2021 09:03:33 GMT expires: - '-1' odata-version: - '4.0' pragma: - no-cache server: - Kestrel strict-transport-security: - max-age=31536000; includeSubDomains transfer-encoding: - chunked vary: - Accept-Encoding x-content-type-options: - nosniff status: code: 200 message: OK - request: body: null headers: Accept: - application/json Accept-Encoding: - gzip, deflate CommandName: - network front-door create Connection: - keep-alive ParameterSetName: - -g -n --backend-address User-Agent: - python/3.7.9 (Windows-10-10.0.19041-SP0) msrest/0.6.21 msrest_azure/0.6.3 azure-mgmt-frontdoor/0.3.0 Azure-SDK-For-Python AZURECLI/2.21.0 (MSI) method: GET uri: https://management.azure.com/subscriptions/00000000-0000-0000-0000-000000000000/resourcegroups/clitest.rg000001/providers/Microsoft.Network/frontdooroperationresults/f03228c6-66b5-4e56-a696-41301e8e74d1?api-version=2020-05-01 response: body: string: '{"status":"Succeeded","error":{"code":"None","message":null}}' headers: cache-control: - no-cache content-length: - '61' content-type: - application/json; odata.metadata=minimal; odata.streaming=true date: - Fri, 02 Apr 2021 09:04:03 GMT expires: - '-1' odata-version: - '4.0' pragma: - no-cache server: - Kestrel strict-transport-security: - max-age=31536000; includeSubDomains transfer-encoding: - chunked vary: - Accept-Encoding x-content-type-options: - nosniff status: code: 200 message: OK - request: body: null headers: Accept: - application/json Accept-Encoding: - gzip, deflate CommandName: - network front-door create Connection: - keep-alive ParameterSetName: - -g -n --backend-address User-Agent: - python/3.7.9 (Windows-10-10.0.19041-SP0) msrest/0.6.21 msrest_azure/0.6.3 azure-mgmt-frontdoor/0.3.0 Azure-SDK-For-Python AZURECLI/2.21.0 (MSI) method: GET uri: https://management.azure.com/subscriptions/00000000-0000-0000-0000-000000000000/resourceGroups/clitest.rg000001/providers/Microsoft.Network/frontDoors/clifrontdoor000002?api-version=2020-05-01 response: body: string: '{"name":"clifrontdoor000002","id":"/subscriptions/00000000-0000-0000-0000-000000000000/resourcegroups/clitest.rg000001/providers/Microsoft.Network/frontdoors/clifrontdoor000002","type":"Microsoft.Network/frontdoors","location":"Global","tags":{},"properties":{"provisioningState":"Succeeded","resourceState":"Enabled","enabledState":"Enabled","cName":"clifrontdoor000002.azurefd.net","frontdoorId":"767632aa-08cc-4c01-86a3-261cd5d58eba","friendlyName":"clifrontdoor000002","backendPools":[{"id":"/subscriptions/00000000-0000-0000-0000-000000000000/resourcegroups/clitest.rg000001/providers/Microsoft.Network/Frontdoors/clifrontdoor000002/BackendPools/DefaultBackendPool","name":"DefaultBackendPool","type":"Microsoft.Network/Frontdoors/BackendPools","properties":{"resourceState":"Enabled","backends":[{"address":"202.120.2.3","httpPort":80,"httpsPort":443,"priority":1,"weight":50,"backendHostHeader":"202.120.2.3","enabledState":"Enabled","privateLinkAlias":null,"privateLinkApprovalMessage":null,"privateLinkResourceId":null,"privateLinkLocation":null,"privateEndpointStatus":null}],"healthProbeSettings":{"id":"/subscriptions/00000000-0000-0000-0000-000000000000/resourceGroups/clitest.rg000001/providers/Microsoft.Network/frontdoors/clifrontdoor000002/healthProbeSettings/DefaultProbeSettings"},"loadBalancingSettings":{"id":"/subscriptions/00000000-0000-0000-0000-000000000000/resourceGroups/clitest.rg000001/providers/Microsoft.Network/frontdoors/clifrontdoor000002/loadBalancingSettings/DefaultLoadBalancingSettings"}}}],"healthProbeSettings":[{"id":"/subscriptions/00000000-0000-0000-0000-000000000000/resourcegroups/clitest.rg000001/providers/Microsoft.Network/Frontdoors/clifrontdoor000002/HealthProbeSettings/DefaultProbeSettings","name":"DefaultProbeSettings","type":"Microsoft.Network/Frontdoors/HealthProbeSettings","properties":{"intervalInSeconds":30,"path":"/","protocol":"Https","resourceState":"Enabled","enabledState":"Enabled","healthProbeMethod":"Head"}}],"frontendEndpoints":[{"id":"/subscriptions/00000000-0000-0000-0000-000000000000/resourcegroups/clitest.rg000001/providers/Microsoft.Network/Frontdoors/clifrontdoor000002/FrontendEndpoints/DefaultFrontendEndpoint","name":"DefaultFrontendEndpoint","type":"Microsoft.Network/Frontdoors/FrontendEndpoints","properties":{"hostName":"clifrontdoor000002.azurefd.net","sessionAffinityEnabledState":"Disabled","sessionAffinityTtlSeconds":0,"customHttpsProvisioningState":null,"customHttpsProvisioningSubstate":null,"resourceState":"Enabled","webApplicationFirewallPolicyLink":null,"customHttpsConfiguration":null}}],"loadBalancingSettings":[{"id":"/subscriptions/00000000-0000-0000-0000-000000000000/resourcegroups/clitest.rg000001/providers/Microsoft.Network/Frontdoors/clifrontdoor000002/LoadBalancingSettings/DefaultLoadBalancingSettings","name":"DefaultLoadBalancingSettings","type":"Microsoft.Network/Frontdoors/LoadBalancingSettings","properties":{"additionalLatencyMilliseconds":0,"sampleSize":4,"successfulSamplesRequired":2,"resourceState":"Enabled"}}],"rulesEngines":[],"routingRules":[{"id":"/subscriptions/00000000-0000-0000-0000-000000000000/resourcegroups/clitest.rg000001/providers/Microsoft.Network/Frontdoors/clifrontdoor000002/RoutingRules/DefaultRoutingRule","name":"DefaultRoutingRule","type":"Microsoft.Network/Frontdoors/RoutingRules","properties":{"acceptedProtocols":["Http"],"patternsToMatch":["/*"],"enabledState":"Enabled","resourceState":"Enabled","frontendEndpoints":[{"id":"/subscriptions/00000000-0000-0000-0000-000000000000/resourceGroups/clitest.rg000001/providers/Microsoft.Network/frontdoors/clifrontdoor000002/frontendEndpoints/DefaultFrontendEndpoint"}],"routeConfiguration":{"customForwardingPath":null,"forwardingProtocol":"MatchRequest","@odata.type":"#Microsoft.Azure.FrontDoor.Models.FrontdoorForwardingConfiguration","cacheConfiguration":null,"backendPool":{"id":"/subscriptions/00000000-0000-0000-0000-000000000000/resourceGroups/clitest.rg000001/providers/Microsoft.Network/frontdoors/clifrontdoor000002/backendPools/DefaultBackendPool"}},"rulesEngine":null,"webApplicationFirewallPolicyLink":null}}],"backendPoolsSettings":{"enforceCertificateNameCheck":"Enabled","sendRecvTimeoutSeconds":30}}}' headers: cache-control: - no-cache content-length: - '4828' content-type: - application/json; odata.metadata=minimal; odata.streaming=true date: - Fri, 02 Apr 2021 09:04:03 GMT expires: - '-1' odata-version: - '4.0' pragma: - no-cache server: - Kestrel strict-transport-security: - max-age=31536000; includeSubDomains transfer-encoding: - chunked vary: - Accept-Encoding x-content-type-options: - nosniff status: code: 200 message: OK - request: body: null headers: Accept: - application/json Accept-Encoding: - gzip, deflate CommandName: - network front-door frontend-endpoint list Connection: - keep-alive ParameterSetName: - -f -g User-Agent: - python/3.7.9 (Windows-10-10.0.19041-SP0) msrest/0.6.21 msrest_azure/0.6.3 azure-mgmt-frontdoor/0.3.0 Azure-SDK-For-Python AZURECLI/2.21.0 (MSI) accept-language: - en-US method: GET uri: https://management.azure.com/subscriptions/00000000-0000-0000-0000-000000000000/resourceGroups/clitest.rg000001/providers/Microsoft.Network/frontDoors/clifrontdoor000002/frontendEndpoints?api-version=2020-05-01 response: body: string: '{"value":[{"name":"DefaultFrontendEndpoint","id":"/subscriptions/00000000-0000-0000-0000-000000000000/resourcegroups/clitest.rg000001/providers/Microsoft.Network/frontdoors/clifrontdoor000002/frontendendpoints/DefaultFrontendEndpoint","type":"Microsoft.Network/frontdoors/frontendendpoints","properties":{"hostName":"clifrontdoor000002.azurefd.net","sessionAffinityEnabledState":"Disabled","sessionAffinityTtlSeconds":0,"customHttpsProvisioningState":"Disabled","customHttpsProvisioningSubstate":"None","resourceState":"Enabled","webApplicationFirewallPolicyLink":null,"customHttpsConfiguration":null}}]}' headers: cache-control: - no-cache content-length: - '667' content-type: - application/json; odata.metadata=minimal; odata.streaming=true date: - Fri, 02 Apr 2021 09:04:06 GMT expires: - '-1' odata-version: - '4.0' pragma: - no-cache server: - Kestrel strict-transport-security: - max-age=31536000; includeSubDomains transfer-encoding: - chunked vary: - Accept-Encoding x-content-type-options: - nosniff status: code: 200 message: OK - request: body: null headers: Accept: - application/json Accept-Encoding: - gzip, deflate CommandName: - network front-door frontend-endpoint show Connection: - keep-alive ParameterSetName: - -f -g -n User-Agent: - python/3.7.9 (Windows-10-10.0.19041-SP0) msrest/0.6.21 msrest_azure/0.6.3 azure-mgmt-frontdoor/0.3.0 Azure-SDK-For-Python AZURECLI/2.21.0 (MSI) accept-language: - en-US method: GET uri: https://management.azure.com/subscriptions/00000000-0000-0000-0000-000000000000/resourceGroups/clitest.rg000001/providers/Microsoft.Network/frontDoors/clifrontdoor000002/frontendEndpoints/DefaultFrontendEndpoint?api-version=2020-05-01 response: body: string: '{"name":"DefaultFrontendEndpoint","id":"/subscriptions/00000000-0000-0000-0000-000000000000/resourcegroups/clitest.rg000001/providers/Microsoft.Network/frontdoors/clifrontdoor000002/frontendendpoints/DefaultFrontendEndpoint","type":"Microsoft.Network/frontdoors/frontendendpoints","properties":{"hostName":"clifrontdoor000002.azurefd.net","sessionAffinityEnabledState":"Disabled","sessionAffinityTtlSeconds":0,"customHttpsProvisioningState":"Disabled","customHttpsProvisioningSubstate":"None","resourceState":"Enabled","webApplicationFirewallPolicyLink":null,"customHttpsConfiguration":null}}' headers: cache-control: - no-cache content-length: - '655' content-type: - application/json; odata.metadata=minimal; odata.streaming=true date: - Fri, 02 Apr 2021 09:04:08 GMT expires: - '-1' odata-version: - '4.0' pragma: - no-cache server: - Kestrel strict-transport-security: - max-age=31536000; includeSubDomains transfer-encoding: - chunked vary: - Accept-Encoding x-content-type-options: - nosniff status: code: 200 message: OK version: 1
63.021538
4,231
0.732302
b19ccadabe7887f07c2a024e6eb1e56011fad286
86,045
yaml
YAML
src/front-door/azext_front_door/tests/latest/recordings/test_backend_pool_basic.yaml
00Kai0/azure-cli-extensions
4bcafd5c9bb4d4f2eca0b8b512d9d79fe9061b8e
[ "MIT" ]
null
null
null
src/front-door/azext_front_door/tests/latest/recordings/test_backend_pool_basic.yaml
00Kai0/azure-cli-extensions
4bcafd5c9bb4d4f2eca0b8b512d9d79fe9061b8e
[ "MIT" ]
null
null
null
src/front-door/azext_front_door/tests/latest/recordings/test_backend_pool_basic.yaml
00Kai0/azure-cli-extensions
4bcafd5c9bb4d4f2eca0b8b512d9d79fe9061b8e
[ "MIT" ]
null
null
null
interactions: - request: body: '{"location": "global", "properties": {"friendlyName": "clifrontdoor000002", "routingRules": [{"properties": {"frontendEndpoints": [{"id": "/subscriptions/00000000-0000-0000-0000-000000000000/resourceGroups/clitest.rg000001/providers/Microsoft.Network/frontdoors/clifrontdoor000002/frontendEndpoints/DefaultFrontendEndpoint"}], "acceptedProtocols": ["Http"], "patternsToMatch": ["/*"], "enabledState": "Enabled", "routeConfiguration": {"@odata.type": "#Microsoft.Azure.FrontDoor.Models.FrontdoorForwardingConfiguration", "forwardingProtocol": "MatchRequest", "backendPool": {"id": "/subscriptions/00000000-0000-0000-0000-000000000000/resourceGroups/clitest.rg000001/providers/Microsoft.Network/frontdoors/clifrontdoor000002/backendPools/DefaultBackendPool"}}, "resourceState": "Enabled"}, "name": "DefaultRoutingRule"}], "loadBalancingSettings": [{"properties": {"sampleSize": 4, "successfulSamplesRequired": 2, "additionalLatencyMilliseconds": 0, "resourceState": "Enabled"}, "name": "DefaultLoadBalancingSettings"}], "healthProbeSettings": [{"properties": {"path": "/", "protocol": "Https", "intervalInSeconds": 30, "healthProbeMethod": "HEAD", "resourceState": "Enabled"}, "name": "DefaultProbeSettings"}], "backendPools": [{"properties": {"backends": [{"address": "202.120.2.3", "httpPort": 80, "httpsPort": 443, "enabledState": "Enabled", "priority": 1, "weight": 50, "backendHostHeader": "202.120.2.3"}], "loadBalancingSettings": {"id": "/subscriptions/00000000-0000-0000-0000-000000000000/resourceGroups/clitest.rg000001/providers/Microsoft.Network/frontdoors/clifrontdoor000002/loadBalancingSettings/DefaultLoadBalancingSettings"}, "healthProbeSettings": {"id": "/subscriptions/00000000-0000-0000-0000-000000000000/resourceGroups/clitest.rg000001/providers/Microsoft.Network/frontdoors/clifrontdoor000002/healthProbeSettings/DefaultProbeSettings"}, "resourceState": "Enabled"}, "name": "DefaultBackendPool"}], "frontendEndpoints": [{"properties": {"hostName": "clifrontdoor000002.azurefd.net", "sessionAffinityEnabledState": "Disabled", "resourceState": "Enabled"}, "name": "DefaultFrontendEndpoint"}], "backendPoolsSettings": {"enforceCertificateNameCheck": "Enabled"}, "enabledState": "Enabled"}}' headers: Accept: - application/json Accept-Encoding: - gzip, deflate CommandName: - network front-door create Connection: - keep-alive Content-Length: - '2453' Content-Type: - application/json; charset=utf-8 ParameterSetName: - -g -n --backend-address User-Agent: - python/3.7.9 (Windows-10-10.0.19041-SP0) msrest/0.6.21 msrest_azure/0.6.3 azure-mgmt-frontdoor/0.3.0 Azure-SDK-For-Python AZURECLI/2.21.0 (MSI) accept-language: - en-US method: PUT uri: https://management.azure.com/subscriptions/00000000-0000-0000-0000-000000000000/resourceGroups/clitest.rg000001/providers/Microsoft.Network/frontDoors/clifrontdoor000002?api-version=2020-05-01 response: body: string: '{"name":"clifrontdoor000002","id":"/subscriptions/00000000-0000-0000-0000-000000000000/resourcegroups/clitest.rg000001/providers/Microsoft.Network/frontdoors/clifrontdoor000002","type":"Microsoft.Network/frontdoors","location":"Global","tags":{},"properties":{"provisioningState":"Creating","resourceState":"Creating","enabledState":"Enabled","cName":"clifrontdoor000002.azurefd.net","frontdoorId":"f5ff28ef-a022-48ca-9d89-3ade6acd3abb","friendlyName":"clifrontdoor000002","backendPools":[{"id":"/subscriptions/00000000-0000-0000-0000-000000000000/resourcegroups/clitest.rg000001/providers/Microsoft.Network/Frontdoors/clifrontdoor000002/BackendPools/DefaultBackendPool","name":"DefaultBackendPool","type":"Microsoft.Network/Frontdoors/BackendPools","properties":{"resourceState":"Creating","backends":[{"address":"202.120.2.3","httpPort":80,"httpsPort":443,"priority":1,"weight":50,"backendHostHeader":"202.120.2.3","enabledState":"Enabled","privateLinkAlias":null,"privateLinkApprovalMessage":null,"privateLinkResourceId":null,"privateLinkLocation":null,"privateEndpointStatus":null}],"healthProbeSettings":{"id":"/subscriptions/00000000-0000-0000-0000-000000000000/resourceGroups/clitest.rg000001/providers/Microsoft.Network/frontdoors/clifrontdoor000002/healthProbeSettings/DefaultProbeSettings"},"loadBalancingSettings":{"id":"/subscriptions/00000000-0000-0000-0000-000000000000/resourceGroups/clitest.rg000001/providers/Microsoft.Network/frontdoors/clifrontdoor000002/loadBalancingSettings/DefaultLoadBalancingSettings"}}}],"healthProbeSettings":[{"id":"/subscriptions/00000000-0000-0000-0000-000000000000/resourcegroups/clitest.rg000001/providers/Microsoft.Network/Frontdoors/clifrontdoor000002/HealthProbeSettings/DefaultProbeSettings","name":"DefaultProbeSettings","type":"Microsoft.Network/Frontdoors/HealthProbeSettings","properties":{"intervalInSeconds":30,"path":"/","protocol":"Https","resourceState":"Creating","enabledState":"Enabled","healthProbeMethod":"Head"}}],"frontendEndpoints":[{"id":"/subscriptions/00000000-0000-0000-0000-000000000000/resourcegroups/clitest.rg000001/providers/Microsoft.Network/Frontdoors/clifrontdoor000002/FrontendEndpoints/DefaultFrontendEndpoint","name":"DefaultFrontendEndpoint","type":"Microsoft.Network/Frontdoors/FrontendEndpoints","properties":{"hostName":"clifrontdoor000002.azurefd.net","sessionAffinityEnabledState":"Disabled","sessionAffinityTtlSeconds":0,"customHttpsProvisioningState":null,"customHttpsProvisioningSubstate":null,"resourceState":"Creating","webApplicationFirewallPolicyLink":null,"customHttpsConfiguration":null}}],"loadBalancingSettings":[{"id":"/subscriptions/00000000-0000-0000-0000-000000000000/resourcegroups/clitest.rg000001/providers/Microsoft.Network/Frontdoors/clifrontdoor000002/LoadBalancingSettings/DefaultLoadBalancingSettings","name":"DefaultLoadBalancingSettings","type":"Microsoft.Network/Frontdoors/LoadBalancingSettings","properties":{"additionalLatencyMilliseconds":0,"sampleSize":4,"successfulSamplesRequired":2,"resourceState":"Creating"}}],"rulesEngines":[],"routingRules":[{"id":"/subscriptions/00000000-0000-0000-0000-000000000000/resourcegroups/clitest.rg000001/providers/Microsoft.Network/Frontdoors/clifrontdoor000002/RoutingRules/DefaultRoutingRule","name":"DefaultRoutingRule","type":"Microsoft.Network/Frontdoors/RoutingRules","properties":{"acceptedProtocols":["Http"],"patternsToMatch":["/*"],"enabledState":"Enabled","resourceState":"Creating","frontendEndpoints":[{"id":"/subscriptions/00000000-0000-0000-0000-000000000000/resourceGroups/clitest.rg000001/providers/Microsoft.Network/frontdoors/clifrontdoor000002/frontendEndpoints/DefaultFrontendEndpoint"}],"routeConfiguration":{"customForwardingPath":null,"forwardingProtocol":"MatchRequest","@odata.type":"#Microsoft.Azure.FrontDoor.Models.FrontdoorForwardingConfiguration","cacheConfiguration":null,"backendPool":{"id":"/subscriptions/00000000-0000-0000-0000-000000000000/resourceGroups/clitest.rg000001/providers/Microsoft.Network/frontdoors/clifrontdoor000002/backendPools/DefaultBackendPool"}},"rulesEngine":null,"webApplicationFirewallPolicyLink":null}}],"backendPoolsSettings":{"enforceCertificateNameCheck":"Enabled","sendRecvTimeoutSeconds":30}}}' headers: azure-asyncoperation: - https://management.azure.com/subscriptions/00000000-0000-0000-0000-000000000000/resourcegroups/clitest.rg000001/providers/Microsoft.Network/frontdooroperationresults/693a5035-fa99-446a-8a1f-30ae130df8d0?api-version=2020-05-01 cache-control: - no-cache content-length: - '4833' content-type: - application/json; odata.metadata=minimal; odata.streaming=true date: - Thu, 01 Apr 2021 16:58:03 GMT expires: - '-1' odata-version: - '4.0' pragma: - no-cache server: - Kestrel strict-transport-security: - max-age=31536000; includeSubDomains x-content-type-options: - nosniff x-ms-ratelimit-remaining-subscription-writes: - '1198' status: code: 201 message: Created - request: body: null headers: Accept: - application/json Accept-Encoding: - gzip, deflate CommandName: - network front-door create Connection: - keep-alive ParameterSetName: - -g -n --backend-address User-Agent: - python/3.7.9 (Windows-10-10.0.19041-SP0) msrest/0.6.21 msrest_azure/0.6.3 azure-mgmt-frontdoor/0.3.0 Azure-SDK-For-Python AZURECLI/2.21.0 (MSI) method: GET uri: https://management.azure.com/subscriptions/00000000-0000-0000-0000-000000000000/resourcegroups/clitest.rg000001/providers/Microsoft.Network/frontdooroperationresults/693a5035-fa99-446a-8a1f-30ae130df8d0?api-version=2020-05-01 response: body: string: '{"status":"InProgress","error":{"code":"None","message":null}}' headers: cache-control: - no-cache content-length: - '62' content-type: - application/json; odata.metadata=minimal; odata.streaming=true date: - Thu, 01 Apr 2021 16:58:14 GMT expires: - '-1' odata-version: - '4.0' pragma: - no-cache server: - Kestrel strict-transport-security: - max-age=31536000; includeSubDomains transfer-encoding: - chunked vary: - Accept-Encoding x-content-type-options: - nosniff status: code: 200 message: OK - request: body: null headers: Accept: - application/json Accept-Encoding: - gzip, deflate CommandName: - network front-door create Connection: - keep-alive ParameterSetName: - -g -n --backend-address User-Agent: - python/3.7.9 (Windows-10-10.0.19041-SP0) msrest/0.6.21 msrest_azure/0.6.3 azure-mgmt-frontdoor/0.3.0 Azure-SDK-For-Python AZURECLI/2.21.0 (MSI) method: GET uri: https://management.azure.com/subscriptions/00000000-0000-0000-0000-000000000000/resourcegroups/clitest.rg000001/providers/Microsoft.Network/frontdooroperationresults/693a5035-fa99-446a-8a1f-30ae130df8d0?api-version=2020-05-01 response: body: string: '{"status":"Succeeded","error":{"code":"None","message":null}}' headers: cache-control: - no-cache content-length: - '61' content-type: - application/json; odata.metadata=minimal; odata.streaming=true date: - Thu, 01 Apr 2021 16:58:44 GMT expires: - '-1' odata-version: - '4.0' pragma: - no-cache server: - Kestrel strict-transport-security: - max-age=31536000; includeSubDomains transfer-encoding: - chunked vary: - Accept-Encoding x-content-type-options: - nosniff status: code: 200 message: OK - request: body: null headers: Accept: - application/json Accept-Encoding: - gzip, deflate CommandName: - network front-door create Connection: - keep-alive ParameterSetName: - -g -n --backend-address User-Agent: - python/3.7.9 (Windows-10-10.0.19041-SP0) msrest/0.6.21 msrest_azure/0.6.3 azure-mgmt-frontdoor/0.3.0 Azure-SDK-For-Python AZURECLI/2.21.0 (MSI) method: GET uri: https://management.azure.com/subscriptions/00000000-0000-0000-0000-000000000000/resourceGroups/clitest.rg000001/providers/Microsoft.Network/frontDoors/clifrontdoor000002?api-version=2020-05-01 response: body: string: '{"name":"clifrontdoor000002","id":"/subscriptions/00000000-0000-0000-0000-000000000000/resourcegroups/clitest.rg000001/providers/Microsoft.Network/frontdoors/clifrontdoor000002","type":"Microsoft.Network/frontdoors","location":"Global","tags":{},"properties":{"provisioningState":"Succeeded","resourceState":"Enabled","enabledState":"Enabled","cName":"clifrontdoor000002.azurefd.net","frontdoorId":"f5ff28ef-a022-48ca-9d89-3ade6acd3abb","friendlyName":"clifrontdoor000002","backendPools":[{"id":"/subscriptions/00000000-0000-0000-0000-000000000000/resourcegroups/clitest.rg000001/providers/Microsoft.Network/Frontdoors/clifrontdoor000002/BackendPools/DefaultBackendPool","name":"DefaultBackendPool","type":"Microsoft.Network/Frontdoors/BackendPools","properties":{"resourceState":"Enabled","backends":[{"address":"202.120.2.3","httpPort":80,"httpsPort":443,"priority":1,"weight":50,"backendHostHeader":"202.120.2.3","enabledState":"Enabled","privateLinkAlias":null,"privateLinkApprovalMessage":null,"privateLinkResourceId":null,"privateLinkLocation":null,"privateEndpointStatus":null}],"healthProbeSettings":{"id":"/subscriptions/00000000-0000-0000-0000-000000000000/resourceGroups/clitest.rg000001/providers/Microsoft.Network/frontdoors/clifrontdoor000002/healthProbeSettings/DefaultProbeSettings"},"loadBalancingSettings":{"id":"/subscriptions/00000000-0000-0000-0000-000000000000/resourceGroups/clitest.rg000001/providers/Microsoft.Network/frontdoors/clifrontdoor000002/loadBalancingSettings/DefaultLoadBalancingSettings"}}}],"healthProbeSettings":[{"id":"/subscriptions/00000000-0000-0000-0000-000000000000/resourcegroups/clitest.rg000001/providers/Microsoft.Network/Frontdoors/clifrontdoor000002/HealthProbeSettings/DefaultProbeSettings","name":"DefaultProbeSettings","type":"Microsoft.Network/Frontdoors/HealthProbeSettings","properties":{"intervalInSeconds":30,"path":"/","protocol":"Https","resourceState":"Enabled","enabledState":"Enabled","healthProbeMethod":"Head"}}],"frontendEndpoints":[{"id":"/subscriptions/00000000-0000-0000-0000-000000000000/resourcegroups/clitest.rg000001/providers/Microsoft.Network/Frontdoors/clifrontdoor000002/FrontendEndpoints/DefaultFrontendEndpoint","name":"DefaultFrontendEndpoint","type":"Microsoft.Network/Frontdoors/FrontendEndpoints","properties":{"hostName":"clifrontdoor000002.azurefd.net","sessionAffinityEnabledState":"Disabled","sessionAffinityTtlSeconds":0,"customHttpsProvisioningState":null,"customHttpsProvisioningSubstate":null,"resourceState":"Enabled","webApplicationFirewallPolicyLink":null,"customHttpsConfiguration":null}}],"loadBalancingSettings":[{"id":"/subscriptions/00000000-0000-0000-0000-000000000000/resourcegroups/clitest.rg000001/providers/Microsoft.Network/Frontdoors/clifrontdoor000002/LoadBalancingSettings/DefaultLoadBalancingSettings","name":"DefaultLoadBalancingSettings","type":"Microsoft.Network/Frontdoors/LoadBalancingSettings","properties":{"additionalLatencyMilliseconds":0,"sampleSize":4,"successfulSamplesRequired":2,"resourceState":"Enabled"}}],"rulesEngines":[],"routingRules":[{"id":"/subscriptions/00000000-0000-0000-0000-000000000000/resourcegroups/clitest.rg000001/providers/Microsoft.Network/Frontdoors/clifrontdoor000002/RoutingRules/DefaultRoutingRule","name":"DefaultRoutingRule","type":"Microsoft.Network/Frontdoors/RoutingRules","properties":{"acceptedProtocols":["Http"],"patternsToMatch":["/*"],"enabledState":"Enabled","resourceState":"Enabled","frontendEndpoints":[{"id":"/subscriptions/00000000-0000-0000-0000-000000000000/resourceGroups/clitest.rg000001/providers/Microsoft.Network/frontdoors/clifrontdoor000002/frontendEndpoints/DefaultFrontendEndpoint"}],"routeConfiguration":{"customForwardingPath":null,"forwardingProtocol":"MatchRequest","@odata.type":"#Microsoft.Azure.FrontDoor.Models.FrontdoorForwardingConfiguration","cacheConfiguration":null,"backendPool":{"id":"/subscriptions/00000000-0000-0000-0000-000000000000/resourceGroups/clitest.rg000001/providers/Microsoft.Network/frontdoors/clifrontdoor000002/backendPools/DefaultBackendPool"}},"rulesEngine":null,"webApplicationFirewallPolicyLink":null}}],"backendPoolsSettings":{"enforceCertificateNameCheck":"Enabled","sendRecvTimeoutSeconds":30}}}' headers: cache-control: - no-cache content-length: - '4828' content-type: - application/json; odata.metadata=minimal; odata.streaming=true date: - Thu, 01 Apr 2021 16:58:45 GMT expires: - '-1' odata-version: - '4.0' pragma: - no-cache server: - Kestrel strict-transport-security: - max-age=31536000; includeSubDomains transfer-encoding: - chunked vary: - Accept-Encoding x-content-type-options: - nosniff status: code: 200 message: OK - request: body: null headers: Accept: - application/json Accept-Encoding: - gzip, deflate CommandName: - network front-door backend-pool create Connection: - keep-alive ParameterSetName: - -f -g -n --address --load-balancing --probe User-Agent: - python/3.7.9 (Windows-10-10.0.19041-SP0) msrest/0.6.21 msrest_azure/0.6.3 azure-mgmt-frontdoor/0.3.0 Azure-SDK-For-Python AZURECLI/2.21.0 (MSI) accept-language: - en-US method: GET uri: https://management.azure.com/subscriptions/00000000-0000-0000-0000-000000000000/resourceGroups/clitest.rg000001/providers/Microsoft.Network/frontDoors/clifrontdoor000002?api-version=2020-05-01 response: body: string: '{"name":"clifrontdoor000002","id":"/subscriptions/00000000-0000-0000-0000-000000000000/resourcegroups/clitest.rg000001/providers/Microsoft.Network/frontdoors/clifrontdoor000002","type":"Microsoft.Network/frontdoors","location":"Global","tags":{},"properties":{"provisioningState":"Succeeded","resourceState":"Enabled","enabledState":"Enabled","cName":"clifrontdoor000002.azurefd.net","frontdoorId":"f5ff28ef-a022-48ca-9d89-3ade6acd3abb","friendlyName":"clifrontdoor000002","backendPools":[{"id":"/subscriptions/00000000-0000-0000-0000-000000000000/resourcegroups/clitest.rg000001/providers/Microsoft.Network/Frontdoors/clifrontdoor000002/BackendPools/DefaultBackendPool","name":"DefaultBackendPool","type":"Microsoft.Network/Frontdoors/BackendPools","properties":{"resourceState":"Enabled","backends":[{"address":"202.120.2.3","httpPort":80,"httpsPort":443,"priority":1,"weight":50,"backendHostHeader":"202.120.2.3","enabledState":"Enabled","privateLinkAlias":null,"privateLinkApprovalMessage":null,"privateLinkResourceId":null,"privateLinkLocation":null,"privateEndpointStatus":null}],"healthProbeSettings":{"id":"/subscriptions/00000000-0000-0000-0000-000000000000/resourceGroups/clitest.rg000001/providers/Microsoft.Network/frontdoors/clifrontdoor000002/healthProbeSettings/DefaultProbeSettings"},"loadBalancingSettings":{"id":"/subscriptions/00000000-0000-0000-0000-000000000000/resourceGroups/clitest.rg000001/providers/Microsoft.Network/frontdoors/clifrontdoor000002/loadBalancingSettings/DefaultLoadBalancingSettings"}}}],"healthProbeSettings":[{"id":"/subscriptions/00000000-0000-0000-0000-000000000000/resourcegroups/clitest.rg000001/providers/Microsoft.Network/Frontdoors/clifrontdoor000002/HealthProbeSettings/DefaultProbeSettings","name":"DefaultProbeSettings","type":"Microsoft.Network/Frontdoors/HealthProbeSettings","properties":{"intervalInSeconds":30,"path":"/","protocol":"Https","resourceState":"Enabled","enabledState":"Enabled","healthProbeMethod":"Head"}}],"frontendEndpoints":[{"id":"/subscriptions/00000000-0000-0000-0000-000000000000/resourcegroups/clitest.rg000001/providers/Microsoft.Network/Frontdoors/clifrontdoor000002/FrontendEndpoints/DefaultFrontendEndpoint","name":"DefaultFrontendEndpoint","type":"Microsoft.Network/Frontdoors/FrontendEndpoints","properties":{"hostName":"clifrontdoor000002.azurefd.net","sessionAffinityEnabledState":"Disabled","sessionAffinityTtlSeconds":0,"customHttpsProvisioningState":null,"customHttpsProvisioningSubstate":null,"resourceState":"Enabled","webApplicationFirewallPolicyLink":null,"customHttpsConfiguration":null}}],"loadBalancingSettings":[{"id":"/subscriptions/00000000-0000-0000-0000-000000000000/resourcegroups/clitest.rg000001/providers/Microsoft.Network/Frontdoors/clifrontdoor000002/LoadBalancingSettings/DefaultLoadBalancingSettings","name":"DefaultLoadBalancingSettings","type":"Microsoft.Network/Frontdoors/LoadBalancingSettings","properties":{"additionalLatencyMilliseconds":0,"sampleSize":4,"successfulSamplesRequired":2,"resourceState":"Enabled"}}],"rulesEngines":[],"routingRules":[{"id":"/subscriptions/00000000-0000-0000-0000-000000000000/resourcegroups/clitest.rg000001/providers/Microsoft.Network/Frontdoors/clifrontdoor000002/RoutingRules/DefaultRoutingRule","name":"DefaultRoutingRule","type":"Microsoft.Network/Frontdoors/RoutingRules","properties":{"acceptedProtocols":["Http"],"patternsToMatch":["/*"],"enabledState":"Enabled","resourceState":"Enabled","frontendEndpoints":[{"id":"/subscriptions/00000000-0000-0000-0000-000000000000/resourceGroups/clitest.rg000001/providers/Microsoft.Network/frontdoors/clifrontdoor000002/frontendEndpoints/DefaultFrontendEndpoint"}],"routeConfiguration":{"customForwardingPath":null,"forwardingProtocol":"MatchRequest","@odata.type":"#Microsoft.Azure.FrontDoor.Models.FrontdoorForwardingConfiguration","cacheConfiguration":null,"backendPool":{"id":"/subscriptions/00000000-0000-0000-0000-000000000000/resourceGroups/clitest.rg000001/providers/Microsoft.Network/frontdoors/clifrontdoor000002/backendPools/DefaultBackendPool"}},"rulesEngine":null,"webApplicationFirewallPolicyLink":null}}],"backendPoolsSettings":{"enforceCertificateNameCheck":"Enabled","sendRecvTimeoutSeconds":30}}}' headers: cache-control: - no-cache content-length: - '4828' content-type: - application/json; odata.metadata=minimal; odata.streaming=true date: - Thu, 01 Apr 2021 16:58:47 GMT expires: - '-1' odata-version: - '4.0' pragma: - no-cache server: - Kestrel strict-transport-security: - max-age=31536000; includeSubDomains transfer-encoding: - chunked vary: - Accept-Encoding x-content-type-options: - nosniff status: code: 200 message: OK - request: body: '{"location": "Global", "tags": {}, "properties": {"friendlyName": "clifrontdoor000002", "routingRules": [{"id": "/subscriptions/00000000-0000-0000-0000-000000000000/resourcegroups/clitest.rg000001/providers/Microsoft.Network/Frontdoors/clifrontdoor000002/RoutingRules/DefaultRoutingRule", "properties": {"frontendEndpoints": [{"id": "/subscriptions/00000000-0000-0000-0000-000000000000/resourceGroups/clitest.rg000001/providers/Microsoft.Network/frontdoors/clifrontdoor000002/frontendEndpoints/DefaultFrontendEndpoint"}], "acceptedProtocols": ["Http"], "patternsToMatch": ["/*"], "enabledState": "Enabled", "routeConfiguration": {"@odata.type": "#Microsoft.Azure.FrontDoor.Models.FrontdoorForwardingConfiguration", "forwardingProtocol": "MatchRequest", "backendPool": {"id": "/subscriptions/00000000-0000-0000-0000-000000000000/resourceGroups/clitest.rg000001/providers/Microsoft.Network/frontdoors/clifrontdoor000002/backendPools/DefaultBackendPool"}}, "resourceState": "Enabled"}, "name": "DefaultRoutingRule"}], "loadBalancingSettings": [{"id": "/subscriptions/00000000-0000-0000-0000-000000000000/resourcegroups/clitest.rg000001/providers/Microsoft.Network/Frontdoors/clifrontdoor000002/LoadBalancingSettings/DefaultLoadBalancingSettings", "properties": {"sampleSize": 4, "successfulSamplesRequired": 2, "additionalLatencyMilliseconds": 0, "resourceState": "Enabled"}, "name": "DefaultLoadBalancingSettings"}], "healthProbeSettings": [{"id": "/subscriptions/00000000-0000-0000-0000-000000000000/resourcegroups/clitest.rg000001/providers/Microsoft.Network/Frontdoors/clifrontdoor000002/HealthProbeSettings/DefaultProbeSettings", "properties": {"path": "/", "protocol": "Https", "intervalInSeconds": 30, "healthProbeMethod": "Head", "enabledState": "Enabled", "resourceState": "Enabled"}, "name": "DefaultProbeSettings"}], "backendPools": [{"id": "/subscriptions/00000000-0000-0000-0000-000000000000/resourcegroups/clitest.rg000001/providers/Microsoft.Network/Frontdoors/clifrontdoor000002/BackendPools/DefaultBackendPool", "properties": {"backends": [{"address": "202.120.2.3", "httpPort": 80, "httpsPort": 443, "enabledState": "Enabled", "priority": 1, "weight": 50, "backendHostHeader": "202.120.2.3"}], "loadBalancingSettings": {"id": "/subscriptions/00000000-0000-0000-0000-000000000000/resourceGroups/clitest.rg000001/providers/Microsoft.Network/frontdoors/clifrontdoor000002/loadBalancingSettings/DefaultLoadBalancingSettings"}, "healthProbeSettings": {"id": "/subscriptions/00000000-0000-0000-0000-000000000000/resourceGroups/clitest.rg000001/providers/Microsoft.Network/frontdoors/clifrontdoor000002/healthProbeSettings/DefaultProbeSettings"}, "resourceState": "Enabled"}, "name": "DefaultBackendPool"}, {"properties": {"backends": [{"address": "202.120.2.3", "httpPort": 80, "httpsPort": 443, "enabledState": "Enabled", "priority": 1, "weight": 50, "backendHostHeader": "202.120.2.3"}], "loadBalancingSettings": {"id": "/subscriptions/00000000-0000-0000-0000-000000000000/resourceGroups/clitest.rg000001/providers/Microsoft.Network/Frontdoors/clifrontdoor000002/loadBalancingSettings/DefaultLoadBalancingSettings"}, "healthProbeSettings": {"id": "/subscriptions/00000000-0000-0000-0000-000000000000/resourceGroups/clitest.rg000001/providers/Microsoft.Network/Frontdoors/clifrontdoor000002/healthProbeSettings/DefaultProbeSettings"}, "resourceState": "Enabled"}, "name": "bkp1"}], "frontendEndpoints": [{"id": "/subscriptions/00000000-0000-0000-0000-000000000000/resourcegroups/clitest.rg000001/providers/Microsoft.Network/Frontdoors/clifrontdoor000002/FrontendEndpoints/DefaultFrontendEndpoint", "properties": {"hostName": "clifrontdoor000002.azurefd.net", "sessionAffinityEnabledState": "Disabled", "sessionAffinityTtlSeconds": 0, "resourceState": "Enabled"}, "name": "DefaultFrontendEndpoint"}], "backendPoolsSettings": {"enforceCertificateNameCheck": "Enabled", "sendRecvTimeoutSeconds": 30}, "enabledState": "Enabled", "resourceState": "Enabled"}}' headers: Accept: - application/json Accept-Encoding: - gzip, deflate CommandName: - network front-door backend-pool create Connection: - keep-alive Content-Length: - '4638' Content-Type: - application/json; charset=utf-8 ParameterSetName: - -f -g -n --address --load-balancing --probe User-Agent: - python/3.7.9 (Windows-10-10.0.19041-SP0) msrest/0.6.21 msrest_azure/0.6.3 azure-mgmt-frontdoor/0.3.0 Azure-SDK-For-Python AZURECLI/2.21.0 (MSI) accept-language: - en-US method: PUT uri: https://management.azure.com/subscriptions/00000000-0000-0000-0000-000000000000/resourceGroups/clitest.rg000001/providers/Microsoft.Network/frontDoors/clifrontdoor000002?api-version=2020-05-01 response: body: string: '{"name":"clifrontdoor000002","id":"/subscriptions/00000000-0000-0000-0000-000000000000/resourcegroups/clitest.rg000001/providers/Microsoft.Network/frontdoors/clifrontdoor000002","type":"Microsoft.Network/frontdoors","location":"Global","tags":{},"properties":{"provisioningState":"Succeeded","resourceState":"Enabled","enabledState":"Enabled","cName":"clifrontdoor000002.azurefd.net","frontdoorId":"f5ff28ef-a022-48ca-9d89-3ade6acd3abb","friendlyName":"clifrontdoor000002","backendPools":[{"id":"/subscriptions/00000000-0000-0000-0000-000000000000/resourcegroups/clitest.rg000001/providers/Microsoft.Network/Frontdoors/clifrontdoor000002/BackendPools/DefaultBackendPool","name":"DefaultBackendPool","type":"Microsoft.Network/Frontdoors/BackendPools","properties":{"resourceState":"Enabled","backends":[{"address":"202.120.2.3","httpPort":80,"httpsPort":443,"priority":1,"weight":50,"backendHostHeader":"202.120.2.3","enabledState":"Enabled","privateLinkAlias":null,"privateLinkApprovalMessage":null,"privateLinkResourceId":null,"privateLinkLocation":null,"privateEndpointStatus":null}],"healthProbeSettings":{"id":"/subscriptions/00000000-0000-0000-0000-000000000000/resourceGroups/clitest.rg000001/providers/Microsoft.Network/frontdoors/clifrontdoor000002/healthProbeSettings/DefaultProbeSettings"},"loadBalancingSettings":{"id":"/subscriptions/00000000-0000-0000-0000-000000000000/resourceGroups/clitest.rg000001/providers/Microsoft.Network/frontdoors/clifrontdoor000002/loadBalancingSettings/DefaultLoadBalancingSettings"}}},{"id":"/subscriptions/00000000-0000-0000-0000-000000000000/resourcegroups/clitest.rg000001/providers/Microsoft.Network/Frontdoors/clifrontdoor000002/BackendPools/bkp1","name":"bkp1","type":"Microsoft.Network/Frontdoors/BackendPools","properties":{"resourceState":"Enabled","backends":[{"address":"202.120.2.3","httpPort":80,"httpsPort":443,"priority":1,"weight":50,"backendHostHeader":"202.120.2.3","enabledState":"Enabled","privateLinkAlias":null,"privateLinkApprovalMessage":null,"privateLinkResourceId":null,"privateLinkLocation":null,"privateEndpointStatus":null}],"healthProbeSettings":{"id":"/subscriptions/00000000-0000-0000-0000-000000000000/resourceGroups/clitest.rg000001/providers/Microsoft.Network/Frontdoors/clifrontdoor000002/healthProbeSettings/DefaultProbeSettings"},"loadBalancingSettings":{"id":"/subscriptions/00000000-0000-0000-0000-000000000000/resourceGroups/clitest.rg000001/providers/Microsoft.Network/Frontdoors/clifrontdoor000002/loadBalancingSettings/DefaultLoadBalancingSettings"}}}],"healthProbeSettings":[{"id":"/subscriptions/00000000-0000-0000-0000-000000000000/resourcegroups/clitest.rg000001/providers/Microsoft.Network/Frontdoors/clifrontdoor000002/HealthProbeSettings/DefaultProbeSettings","name":"DefaultProbeSettings","type":"Microsoft.Network/Frontdoors/HealthProbeSettings","properties":{"intervalInSeconds":30,"path":"/","protocol":"Https","resourceState":"Enabled","enabledState":"Enabled","healthProbeMethod":"Head"}}],"frontendEndpoints":[{"id":"/subscriptions/00000000-0000-0000-0000-000000000000/resourcegroups/clitest.rg000001/providers/Microsoft.Network/Frontdoors/clifrontdoor000002/FrontendEndpoints/DefaultFrontendEndpoint","name":"DefaultFrontendEndpoint","type":"Microsoft.Network/Frontdoors/FrontendEndpoints","properties":{"hostName":"clifrontdoor000002.azurefd.net","sessionAffinityEnabledState":"Disabled","sessionAffinityTtlSeconds":0,"customHttpsProvisioningState":null,"customHttpsProvisioningSubstate":null,"resourceState":"Enabled","webApplicationFirewallPolicyLink":null,"customHttpsConfiguration":null}}],"loadBalancingSettings":[{"id":"/subscriptions/00000000-0000-0000-0000-000000000000/resourcegroups/clitest.rg000001/providers/Microsoft.Network/Frontdoors/clifrontdoor000002/LoadBalancingSettings/DefaultLoadBalancingSettings","name":"DefaultLoadBalancingSettings","type":"Microsoft.Network/Frontdoors/LoadBalancingSettings","properties":{"additionalLatencyMilliseconds":0,"sampleSize":4,"successfulSamplesRequired":2,"resourceState":"Enabled"}}],"rulesEngines":[],"routingRules":[{"id":"/subscriptions/00000000-0000-0000-0000-000000000000/resourcegroups/clitest.rg000001/providers/Microsoft.Network/Frontdoors/clifrontdoor000002/RoutingRules/DefaultRoutingRule","name":"DefaultRoutingRule","type":"Microsoft.Network/Frontdoors/RoutingRules","properties":{"acceptedProtocols":["Http"],"patternsToMatch":["/*"],"enabledState":"Enabled","resourceState":"Enabled","frontendEndpoints":[{"id":"/subscriptions/00000000-0000-0000-0000-000000000000/resourceGroups/clitest.rg000001/providers/Microsoft.Network/frontdoors/clifrontdoor000002/frontendEndpoints/DefaultFrontendEndpoint"}],"routeConfiguration":{"customForwardingPath":null,"forwardingProtocol":"MatchRequest","@odata.type":"#Microsoft.Azure.FrontDoor.Models.FrontdoorForwardingConfiguration","cacheConfiguration":null,"backendPool":{"id":"/subscriptions/00000000-0000-0000-0000-000000000000/resourceGroups/clitest.rg000001/providers/Microsoft.Network/frontdoors/clifrontdoor000002/backendPools/DefaultBackendPool"}},"rulesEngine":null,"webApplicationFirewallPolicyLink":null}}],"backendPoolsSettings":{"enforceCertificateNameCheck":"Enabled","sendRecvTimeoutSeconds":30}}}' headers: azure-asyncoperation: - https://management.azure.com/subscriptions/00000000-0000-0000-0000-000000000000/resourcegroups/clitest.rg000001/providers/Microsoft.Network/frontdooroperationresults/6d16aedf-4726-4199-948a-5b83b437c6f6?api-version=2020-05-01 cache-control: - no-cache content-length: - '6022' content-type: - application/json; odata.metadata=minimal; odata.streaming=true date: - Thu, 01 Apr 2021 16:58:49 GMT expires: - '-1' location: - https://management.azure.com/subscriptions/00000000-0000-0000-0000-000000000000/resourcegroups/clitest.rg000001/providers/Microsoft.Network/frontdooroperationresults/6d16aedf-4726-4199-948a-5b83b437c6f6/frontdoorresults/clifrontdoor000002?api-version=2020-05-01 odata-version: - '4.0' pragma: - no-cache server: - Kestrel strict-transport-security: - max-age=31536000; includeSubDomains x-content-type-options: - nosniff x-ms-ratelimit-remaining-subscription-writes: - '1198' status: code: 202 message: Accepted - request: body: null headers: Accept: - application/json Accept-Encoding: - gzip, deflate CommandName: - network front-door backend-pool create Connection: - keep-alive ParameterSetName: - -f -g -n --address --load-balancing --probe User-Agent: - python/3.7.9 (Windows-10-10.0.19041-SP0) msrest/0.6.21 msrest_azure/0.6.3 azure-mgmt-frontdoor/0.3.0 Azure-SDK-For-Python AZURECLI/2.21.0 (MSI) method: GET uri: https://management.azure.com/subscriptions/00000000-0000-0000-0000-000000000000/resourcegroups/clitest.rg000001/providers/Microsoft.Network/frontdooroperationresults/6d16aedf-4726-4199-948a-5b83b437c6f6?api-version=2020-05-01 response: body: string: '{"status":"InProgress","error":{"code":"None","message":null}}' headers: cache-control: - no-cache content-length: - '62' content-type: - application/json; odata.metadata=minimal; odata.streaming=true date: - Thu, 01 Apr 2021 16:59:00 GMT expires: - '-1' odata-version: - '4.0' pragma: - no-cache server: - Kestrel strict-transport-security: - max-age=31536000; includeSubDomains transfer-encoding: - chunked vary: - Accept-Encoding x-content-type-options: - nosniff status: code: 200 message: OK - request: body: null headers: Accept: - application/json Accept-Encoding: - gzip, deflate CommandName: - network front-door backend-pool create Connection: - keep-alive ParameterSetName: - -f -g -n --address --load-balancing --probe User-Agent: - python/3.7.9 (Windows-10-10.0.19041-SP0) msrest/0.6.21 msrest_azure/0.6.3 azure-mgmt-frontdoor/0.3.0 Azure-SDK-For-Python AZURECLI/2.21.0 (MSI) method: GET uri: https://management.azure.com/subscriptions/00000000-0000-0000-0000-000000000000/resourcegroups/clitest.rg000001/providers/Microsoft.Network/frontdooroperationresults/6d16aedf-4726-4199-948a-5b83b437c6f6?api-version=2020-05-01 response: body: string: '{"status":"Succeeded","error":{"code":"None","message":null}}' headers: cache-control: - no-cache content-length: - '61' content-type: - application/json; odata.metadata=minimal; odata.streaming=true date: - Thu, 01 Apr 2021 16:59:31 GMT expires: - '-1' odata-version: - '4.0' pragma: - no-cache server: - Kestrel strict-transport-security: - max-age=31536000; includeSubDomains transfer-encoding: - chunked vary: - Accept-Encoding x-content-type-options: - nosniff status: code: 200 message: OK - request: body: null headers: Accept: - application/json Accept-Encoding: - gzip, deflate CommandName: - network front-door backend-pool create Connection: - keep-alive ParameterSetName: - -f -g -n --address --load-balancing --probe User-Agent: - python/3.7.9 (Windows-10-10.0.19041-SP0) msrest/0.6.21 msrest_azure/0.6.3 azure-mgmt-frontdoor/0.3.0 Azure-SDK-For-Python AZURECLI/2.21.0 (MSI) method: GET uri: https://management.azure.com/subscriptions/00000000-0000-0000-0000-000000000000/resourceGroups/clitest.rg000001/providers/Microsoft.Network/frontDoors/clifrontdoor000002?api-version=2020-05-01 response: body: string: '{"name":"clifrontdoor000002","id":"/subscriptions/00000000-0000-0000-0000-000000000000/resourcegroups/clitest.rg000001/providers/Microsoft.Network/frontdoors/clifrontdoor000002","type":"Microsoft.Network/frontdoors","location":"Global","tags":{},"properties":{"provisioningState":"Succeeded","resourceState":"Enabled","enabledState":"Enabled","cName":"clifrontdoor000002.azurefd.net","frontdoorId":"f5ff28ef-a022-48ca-9d89-3ade6acd3abb","friendlyName":"clifrontdoor000002","backendPools":[{"id":"/subscriptions/00000000-0000-0000-0000-000000000000/resourcegroups/clitest.rg000001/providers/Microsoft.Network/Frontdoors/clifrontdoor000002/BackendPools/DefaultBackendPool","name":"DefaultBackendPool","type":"Microsoft.Network/Frontdoors/BackendPools","properties":{"resourceState":"Enabled","backends":[{"address":"202.120.2.3","httpPort":80,"httpsPort":443,"priority":1,"weight":50,"backendHostHeader":"202.120.2.3","enabledState":"Enabled","privateLinkAlias":null,"privateLinkApprovalMessage":null,"privateLinkResourceId":null,"privateLinkLocation":null,"privateEndpointStatus":null}],"healthProbeSettings":{"id":"/subscriptions/00000000-0000-0000-0000-000000000000/resourceGroups/clitest.rg000001/providers/Microsoft.Network/frontdoors/clifrontdoor000002/healthProbeSettings/DefaultProbeSettings"},"loadBalancingSettings":{"id":"/subscriptions/00000000-0000-0000-0000-000000000000/resourceGroups/clitest.rg000001/providers/Microsoft.Network/frontdoors/clifrontdoor000002/loadBalancingSettings/DefaultLoadBalancingSettings"}}},{"id":"/subscriptions/00000000-0000-0000-0000-000000000000/resourcegroups/clitest.rg000001/providers/Microsoft.Network/Frontdoors/clifrontdoor000002/BackendPools/bkp1","name":"bkp1","type":"Microsoft.Network/Frontdoors/BackendPools","properties":{"resourceState":"Enabled","backends":[{"address":"202.120.2.3","httpPort":80,"httpsPort":443,"priority":1,"weight":50,"backendHostHeader":"202.120.2.3","enabledState":"Enabled","privateLinkAlias":null,"privateLinkApprovalMessage":null,"privateLinkResourceId":null,"privateLinkLocation":null,"privateEndpointStatus":null}],"healthProbeSettings":{"id":"/subscriptions/00000000-0000-0000-0000-000000000000/resourceGroups/clitest.rg000001/providers/Microsoft.Network/Frontdoors/clifrontdoor000002/healthProbeSettings/DefaultProbeSettings"},"loadBalancingSettings":{"id":"/subscriptions/00000000-0000-0000-0000-000000000000/resourceGroups/clitest.rg000001/providers/Microsoft.Network/Frontdoors/clifrontdoor000002/loadBalancingSettings/DefaultLoadBalancingSettings"}}}],"healthProbeSettings":[{"id":"/subscriptions/00000000-0000-0000-0000-000000000000/resourcegroups/clitest.rg000001/providers/Microsoft.Network/Frontdoors/clifrontdoor000002/HealthProbeSettings/DefaultProbeSettings","name":"DefaultProbeSettings","type":"Microsoft.Network/Frontdoors/HealthProbeSettings","properties":{"intervalInSeconds":30,"path":"/","protocol":"Https","resourceState":"Enabled","enabledState":"Enabled","healthProbeMethod":"Head"}}],"frontendEndpoints":[{"id":"/subscriptions/00000000-0000-0000-0000-000000000000/resourcegroups/clitest.rg000001/providers/Microsoft.Network/Frontdoors/clifrontdoor000002/FrontendEndpoints/DefaultFrontendEndpoint","name":"DefaultFrontendEndpoint","type":"Microsoft.Network/Frontdoors/FrontendEndpoints","properties":{"hostName":"clifrontdoor000002.azurefd.net","sessionAffinityEnabledState":"Disabled","sessionAffinityTtlSeconds":0,"customHttpsProvisioningState":null,"customHttpsProvisioningSubstate":null,"resourceState":"Enabled","webApplicationFirewallPolicyLink":null,"customHttpsConfiguration":null}}],"loadBalancingSettings":[{"id":"/subscriptions/00000000-0000-0000-0000-000000000000/resourcegroups/clitest.rg000001/providers/Microsoft.Network/Frontdoors/clifrontdoor000002/LoadBalancingSettings/DefaultLoadBalancingSettings","name":"DefaultLoadBalancingSettings","type":"Microsoft.Network/Frontdoors/LoadBalancingSettings","properties":{"additionalLatencyMilliseconds":0,"sampleSize":4,"successfulSamplesRequired":2,"resourceState":"Enabled"}}],"rulesEngines":[],"routingRules":[{"id":"/subscriptions/00000000-0000-0000-0000-000000000000/resourcegroups/clitest.rg000001/providers/Microsoft.Network/Frontdoors/clifrontdoor000002/RoutingRules/DefaultRoutingRule","name":"DefaultRoutingRule","type":"Microsoft.Network/Frontdoors/RoutingRules","properties":{"acceptedProtocols":["Http"],"patternsToMatch":["/*"],"enabledState":"Enabled","resourceState":"Enabled","frontendEndpoints":[{"id":"/subscriptions/00000000-0000-0000-0000-000000000000/resourceGroups/clitest.rg000001/providers/Microsoft.Network/frontdoors/clifrontdoor000002/frontendEndpoints/DefaultFrontendEndpoint"}],"routeConfiguration":{"customForwardingPath":null,"forwardingProtocol":"MatchRequest","@odata.type":"#Microsoft.Azure.FrontDoor.Models.FrontdoorForwardingConfiguration","cacheConfiguration":null,"backendPool":{"id":"/subscriptions/00000000-0000-0000-0000-000000000000/resourceGroups/clitest.rg000001/providers/Microsoft.Network/frontdoors/clifrontdoor000002/backendPools/DefaultBackendPool"}},"rulesEngine":null,"webApplicationFirewallPolicyLink":null}}],"backendPoolsSettings":{"enforceCertificateNameCheck":"Enabled","sendRecvTimeoutSeconds":30}}}' headers: cache-control: - no-cache content-length: - '6022' content-type: - application/json; odata.metadata=minimal; odata.streaming=true date: - Thu, 01 Apr 2021 16:59:31 GMT expires: - '-1' odata-version: - '4.0' pragma: - no-cache server: - Kestrel strict-transport-security: - max-age=31536000; includeSubDomains transfer-encoding: - chunked vary: - Accept-Encoding x-content-type-options: - nosniff status: code: 200 message: OK - request: body: null headers: Accept: - application/json Accept-Encoding: - gzip, deflate CommandName: - network front-door backend-pool list Connection: - keep-alive ParameterSetName: - -f -g User-Agent: - python/3.7.9 (Windows-10-10.0.19041-SP0) msrest/0.6.21 msrest_azure/0.6.3 azure-mgmt-frontdoor/0.3.0 Azure-SDK-For-Python AZURECLI/2.21.0 (MSI) accept-language: - en-US method: GET uri: https://management.azure.com/subscriptions/00000000-0000-0000-0000-000000000000/resourceGroups/clitest.rg000001/providers/Microsoft.Network/frontDoors/clifrontdoor000002?api-version=2020-05-01 response: body: string: '{"name":"clifrontdoor000002","id":"/subscriptions/00000000-0000-0000-0000-000000000000/resourcegroups/clitest.rg000001/providers/Microsoft.Network/frontdoors/clifrontdoor000002","type":"Microsoft.Network/frontdoors","location":"Global","tags":{},"properties":{"provisioningState":"Succeeded","resourceState":"Enabled","enabledState":"Enabled","cName":"clifrontdoor000002.azurefd.net","frontdoorId":"f5ff28ef-a022-48ca-9d89-3ade6acd3abb","friendlyName":"clifrontdoor000002","backendPools":[{"id":"/subscriptions/00000000-0000-0000-0000-000000000000/resourcegroups/clitest.rg000001/providers/Microsoft.Network/Frontdoors/clifrontdoor000002/BackendPools/DefaultBackendPool","name":"DefaultBackendPool","type":"Microsoft.Network/Frontdoors/BackendPools","properties":{"resourceState":"Enabled","backends":[{"address":"202.120.2.3","httpPort":80,"httpsPort":443,"priority":1,"weight":50,"backendHostHeader":"202.120.2.3","enabledState":"Enabled","privateLinkAlias":null,"privateLinkApprovalMessage":null,"privateLinkResourceId":null,"privateLinkLocation":null,"privateEndpointStatus":null}],"healthProbeSettings":{"id":"/subscriptions/00000000-0000-0000-0000-000000000000/resourceGroups/clitest.rg000001/providers/Microsoft.Network/frontdoors/clifrontdoor000002/healthProbeSettings/DefaultProbeSettings"},"loadBalancingSettings":{"id":"/subscriptions/00000000-0000-0000-0000-000000000000/resourceGroups/clitest.rg000001/providers/Microsoft.Network/frontdoors/clifrontdoor000002/loadBalancingSettings/DefaultLoadBalancingSettings"}}},{"id":"/subscriptions/00000000-0000-0000-0000-000000000000/resourcegroups/clitest.rg000001/providers/Microsoft.Network/Frontdoors/clifrontdoor000002/BackendPools/bkp1","name":"bkp1","type":"Microsoft.Network/Frontdoors/BackendPools","properties":{"resourceState":"Enabled","backends":[{"address":"202.120.2.3","httpPort":80,"httpsPort":443,"priority":1,"weight":50,"backendHostHeader":"202.120.2.3","enabledState":"Enabled","privateLinkAlias":null,"privateLinkApprovalMessage":null,"privateLinkResourceId":null,"privateLinkLocation":null,"privateEndpointStatus":null}],"healthProbeSettings":{"id":"/subscriptions/00000000-0000-0000-0000-000000000000/resourceGroups/clitest.rg000001/providers/Microsoft.Network/Frontdoors/clifrontdoor000002/healthProbeSettings/DefaultProbeSettings"},"loadBalancingSettings":{"id":"/subscriptions/00000000-0000-0000-0000-000000000000/resourceGroups/clitest.rg000001/providers/Microsoft.Network/Frontdoors/clifrontdoor000002/loadBalancingSettings/DefaultLoadBalancingSettings"}}}],"healthProbeSettings":[{"id":"/subscriptions/00000000-0000-0000-0000-000000000000/resourcegroups/clitest.rg000001/providers/Microsoft.Network/Frontdoors/clifrontdoor000002/HealthProbeSettings/DefaultProbeSettings","name":"DefaultProbeSettings","type":"Microsoft.Network/Frontdoors/HealthProbeSettings","properties":{"intervalInSeconds":30,"path":"/","protocol":"Https","resourceState":"Enabled","enabledState":"Enabled","healthProbeMethod":"Head"}}],"frontendEndpoints":[{"id":"/subscriptions/00000000-0000-0000-0000-000000000000/resourcegroups/clitest.rg000001/providers/Microsoft.Network/Frontdoors/clifrontdoor000002/FrontendEndpoints/DefaultFrontendEndpoint","name":"DefaultFrontendEndpoint","type":"Microsoft.Network/Frontdoors/FrontendEndpoints","properties":{"hostName":"clifrontdoor000002.azurefd.net","sessionAffinityEnabledState":"Disabled","sessionAffinityTtlSeconds":0,"customHttpsProvisioningState":null,"customHttpsProvisioningSubstate":null,"resourceState":"Enabled","webApplicationFirewallPolicyLink":null,"customHttpsConfiguration":null}}],"loadBalancingSettings":[{"id":"/subscriptions/00000000-0000-0000-0000-000000000000/resourcegroups/clitest.rg000001/providers/Microsoft.Network/Frontdoors/clifrontdoor000002/LoadBalancingSettings/DefaultLoadBalancingSettings","name":"DefaultLoadBalancingSettings","type":"Microsoft.Network/Frontdoors/LoadBalancingSettings","properties":{"additionalLatencyMilliseconds":0,"sampleSize":4,"successfulSamplesRequired":2,"resourceState":"Enabled"}}],"rulesEngines":[],"routingRules":[{"id":"/subscriptions/00000000-0000-0000-0000-000000000000/resourcegroups/clitest.rg000001/providers/Microsoft.Network/Frontdoors/clifrontdoor000002/RoutingRules/DefaultRoutingRule","name":"DefaultRoutingRule","type":"Microsoft.Network/Frontdoors/RoutingRules","properties":{"acceptedProtocols":["Http"],"patternsToMatch":["/*"],"enabledState":"Enabled","resourceState":"Enabled","frontendEndpoints":[{"id":"/subscriptions/00000000-0000-0000-0000-000000000000/resourceGroups/clitest.rg000001/providers/Microsoft.Network/frontdoors/clifrontdoor000002/frontendEndpoints/DefaultFrontendEndpoint"}],"routeConfiguration":{"customForwardingPath":null,"forwardingProtocol":"MatchRequest","@odata.type":"#Microsoft.Azure.FrontDoor.Models.FrontdoorForwardingConfiguration","cacheConfiguration":null,"backendPool":{"id":"/subscriptions/00000000-0000-0000-0000-000000000000/resourceGroups/clitest.rg000001/providers/Microsoft.Network/frontdoors/clifrontdoor000002/backendPools/DefaultBackendPool"}},"rulesEngine":null,"webApplicationFirewallPolicyLink":null}}],"backendPoolsSettings":{"enforceCertificateNameCheck":"Enabled","sendRecvTimeoutSeconds":30}}}' headers: cache-control: - no-cache content-length: - '6022' content-type: - application/json; odata.metadata=minimal; odata.streaming=true date: - Thu, 01 Apr 2021 16:59:32 GMT expires: - '-1' odata-version: - '4.0' pragma: - no-cache server: - Kestrel strict-transport-security: - max-age=31536000; includeSubDomains transfer-encoding: - chunked vary: - Accept-Encoding x-content-type-options: - nosniff status: code: 200 message: OK - request: body: null headers: Accept: - application/json Accept-Encoding: - gzip, deflate CommandName: - network front-door backend-pool show Connection: - keep-alive ParameterSetName: - -f -g -n User-Agent: - python/3.7.9 (Windows-10-10.0.19041-SP0) msrest/0.6.21 msrest_azure/0.6.3 azure-mgmt-frontdoor/0.3.0 Azure-SDK-For-Python AZURECLI/2.21.0 (MSI) accept-language: - en-US method: GET uri: https://management.azure.com/subscriptions/00000000-0000-0000-0000-000000000000/resourceGroups/clitest.rg000001/providers/Microsoft.Network/frontDoors/clifrontdoor000002?api-version=2020-05-01 response: body: string: '{"name":"clifrontdoor000002","id":"/subscriptions/00000000-0000-0000-0000-000000000000/resourcegroups/clitest.rg000001/providers/Microsoft.Network/frontdoors/clifrontdoor000002","type":"Microsoft.Network/frontdoors","location":"Global","tags":{},"properties":{"provisioningState":"Succeeded","resourceState":"Enabled","enabledState":"Enabled","cName":"clifrontdoor000002.azurefd.net","frontdoorId":"f5ff28ef-a022-48ca-9d89-3ade6acd3abb","friendlyName":"clifrontdoor000002","backendPools":[{"id":"/subscriptions/00000000-0000-0000-0000-000000000000/resourcegroups/clitest.rg000001/providers/Microsoft.Network/Frontdoors/clifrontdoor000002/BackendPools/DefaultBackendPool","name":"DefaultBackendPool","type":"Microsoft.Network/Frontdoors/BackendPools","properties":{"resourceState":"Enabled","backends":[{"address":"202.120.2.3","httpPort":80,"httpsPort":443,"priority":1,"weight":50,"backendHostHeader":"202.120.2.3","enabledState":"Enabled","privateLinkAlias":null,"privateLinkApprovalMessage":null,"privateLinkResourceId":null,"privateLinkLocation":null,"privateEndpointStatus":null}],"healthProbeSettings":{"id":"/subscriptions/00000000-0000-0000-0000-000000000000/resourceGroups/clitest.rg000001/providers/Microsoft.Network/frontdoors/clifrontdoor000002/healthProbeSettings/DefaultProbeSettings"},"loadBalancingSettings":{"id":"/subscriptions/00000000-0000-0000-0000-000000000000/resourceGroups/clitest.rg000001/providers/Microsoft.Network/frontdoors/clifrontdoor000002/loadBalancingSettings/DefaultLoadBalancingSettings"}}},{"id":"/subscriptions/00000000-0000-0000-0000-000000000000/resourcegroups/clitest.rg000001/providers/Microsoft.Network/Frontdoors/clifrontdoor000002/BackendPools/bkp1","name":"bkp1","type":"Microsoft.Network/Frontdoors/BackendPools","properties":{"resourceState":"Enabled","backends":[{"address":"202.120.2.3","httpPort":80,"httpsPort":443,"priority":1,"weight":50,"backendHostHeader":"202.120.2.3","enabledState":"Enabled","privateLinkAlias":null,"privateLinkApprovalMessage":null,"privateLinkResourceId":null,"privateLinkLocation":null,"privateEndpointStatus":null}],"healthProbeSettings":{"id":"/subscriptions/00000000-0000-0000-0000-000000000000/resourceGroups/clitest.rg000001/providers/Microsoft.Network/Frontdoors/clifrontdoor000002/healthProbeSettings/DefaultProbeSettings"},"loadBalancingSettings":{"id":"/subscriptions/00000000-0000-0000-0000-000000000000/resourceGroups/clitest.rg000001/providers/Microsoft.Network/Frontdoors/clifrontdoor000002/loadBalancingSettings/DefaultLoadBalancingSettings"}}}],"healthProbeSettings":[{"id":"/subscriptions/00000000-0000-0000-0000-000000000000/resourcegroups/clitest.rg000001/providers/Microsoft.Network/Frontdoors/clifrontdoor000002/HealthProbeSettings/DefaultProbeSettings","name":"DefaultProbeSettings","type":"Microsoft.Network/Frontdoors/HealthProbeSettings","properties":{"intervalInSeconds":30,"path":"/","protocol":"Https","resourceState":"Enabled","enabledState":"Enabled","healthProbeMethod":"Head"}}],"frontendEndpoints":[{"id":"/subscriptions/00000000-0000-0000-0000-000000000000/resourcegroups/clitest.rg000001/providers/Microsoft.Network/Frontdoors/clifrontdoor000002/FrontendEndpoints/DefaultFrontendEndpoint","name":"DefaultFrontendEndpoint","type":"Microsoft.Network/Frontdoors/FrontendEndpoints","properties":{"hostName":"clifrontdoor000002.azurefd.net","sessionAffinityEnabledState":"Disabled","sessionAffinityTtlSeconds":0,"customHttpsProvisioningState":null,"customHttpsProvisioningSubstate":null,"resourceState":"Enabled","webApplicationFirewallPolicyLink":null,"customHttpsConfiguration":null}}],"loadBalancingSettings":[{"id":"/subscriptions/00000000-0000-0000-0000-000000000000/resourcegroups/clitest.rg000001/providers/Microsoft.Network/Frontdoors/clifrontdoor000002/LoadBalancingSettings/DefaultLoadBalancingSettings","name":"DefaultLoadBalancingSettings","type":"Microsoft.Network/Frontdoors/LoadBalancingSettings","properties":{"additionalLatencyMilliseconds":0,"sampleSize":4,"successfulSamplesRequired":2,"resourceState":"Enabled"}}],"rulesEngines":[],"routingRules":[{"id":"/subscriptions/00000000-0000-0000-0000-000000000000/resourcegroups/clitest.rg000001/providers/Microsoft.Network/Frontdoors/clifrontdoor000002/RoutingRules/DefaultRoutingRule","name":"DefaultRoutingRule","type":"Microsoft.Network/Frontdoors/RoutingRules","properties":{"acceptedProtocols":["Http"],"patternsToMatch":["/*"],"enabledState":"Enabled","resourceState":"Enabled","frontendEndpoints":[{"id":"/subscriptions/00000000-0000-0000-0000-000000000000/resourceGroups/clitest.rg000001/providers/Microsoft.Network/frontdoors/clifrontdoor000002/frontendEndpoints/DefaultFrontendEndpoint"}],"routeConfiguration":{"customForwardingPath":null,"forwardingProtocol":"MatchRequest","@odata.type":"#Microsoft.Azure.FrontDoor.Models.FrontdoorForwardingConfiguration","cacheConfiguration":null,"backendPool":{"id":"/subscriptions/00000000-0000-0000-0000-000000000000/resourceGroups/clitest.rg000001/providers/Microsoft.Network/frontdoors/clifrontdoor000002/backendPools/DefaultBackendPool"}},"rulesEngine":null,"webApplicationFirewallPolicyLink":null}}],"backendPoolsSettings":{"enforceCertificateNameCheck":"Enabled","sendRecvTimeoutSeconds":30}}}' headers: cache-control: - no-cache content-length: - '6022' content-type: - application/json; odata.metadata=minimal; odata.streaming=true date: - Thu, 01 Apr 2021 16:59:32 GMT expires: - '-1' odata-version: - '4.0' pragma: - no-cache server: - Kestrel strict-transport-security: - max-age=31536000; includeSubDomains transfer-encoding: - chunked vary: - Accept-Encoding x-content-type-options: - nosniff status: code: 200 message: OK - request: body: null headers: Accept: - application/json Accept-Encoding: - gzip, deflate CommandName: - network front-door backend-pool delete Connection: - keep-alive ParameterSetName: - -f -g -n User-Agent: - python/3.7.9 (Windows-10-10.0.19041-SP0) msrest/0.6.21 msrest_azure/0.6.3 azure-mgmt-frontdoor/0.3.0 Azure-SDK-For-Python AZURECLI/2.21.0 (MSI) accept-language: - en-US method: GET uri: https://management.azure.com/subscriptions/00000000-0000-0000-0000-000000000000/resourceGroups/clitest.rg000001/providers/Microsoft.Network/frontDoors/clifrontdoor000002?api-version=2020-05-01 response: body: string: '{"name":"clifrontdoor000002","id":"/subscriptions/00000000-0000-0000-0000-000000000000/resourcegroups/clitest.rg000001/providers/Microsoft.Network/frontdoors/clifrontdoor000002","type":"Microsoft.Network/frontdoors","location":"Global","tags":{},"properties":{"provisioningState":"Succeeded","resourceState":"Enabled","enabledState":"Enabled","cName":"clifrontdoor000002.azurefd.net","frontdoorId":"f5ff28ef-a022-48ca-9d89-3ade6acd3abb","friendlyName":"clifrontdoor000002","backendPools":[{"id":"/subscriptions/00000000-0000-0000-0000-000000000000/resourcegroups/clitest.rg000001/providers/Microsoft.Network/Frontdoors/clifrontdoor000002/BackendPools/DefaultBackendPool","name":"DefaultBackendPool","type":"Microsoft.Network/Frontdoors/BackendPools","properties":{"resourceState":"Enabled","backends":[{"address":"202.120.2.3","httpPort":80,"httpsPort":443,"priority":1,"weight":50,"backendHostHeader":"202.120.2.3","enabledState":"Enabled","privateLinkAlias":null,"privateLinkApprovalMessage":null,"privateLinkResourceId":null,"privateLinkLocation":null,"privateEndpointStatus":null}],"healthProbeSettings":{"id":"/subscriptions/00000000-0000-0000-0000-000000000000/resourceGroups/clitest.rg000001/providers/Microsoft.Network/frontdoors/clifrontdoor000002/healthProbeSettings/DefaultProbeSettings"},"loadBalancingSettings":{"id":"/subscriptions/00000000-0000-0000-0000-000000000000/resourceGroups/clitest.rg000001/providers/Microsoft.Network/frontdoors/clifrontdoor000002/loadBalancingSettings/DefaultLoadBalancingSettings"}}},{"id":"/subscriptions/00000000-0000-0000-0000-000000000000/resourcegroups/clitest.rg000001/providers/Microsoft.Network/Frontdoors/clifrontdoor000002/BackendPools/bkp1","name":"bkp1","type":"Microsoft.Network/Frontdoors/BackendPools","properties":{"resourceState":"Enabled","backends":[{"address":"202.120.2.3","httpPort":80,"httpsPort":443,"priority":1,"weight":50,"backendHostHeader":"202.120.2.3","enabledState":"Enabled","privateLinkAlias":null,"privateLinkApprovalMessage":null,"privateLinkResourceId":null,"privateLinkLocation":null,"privateEndpointStatus":null}],"healthProbeSettings":{"id":"/subscriptions/00000000-0000-0000-0000-000000000000/resourceGroups/clitest.rg000001/providers/Microsoft.Network/Frontdoors/clifrontdoor000002/healthProbeSettings/DefaultProbeSettings"},"loadBalancingSettings":{"id":"/subscriptions/00000000-0000-0000-0000-000000000000/resourceGroups/clitest.rg000001/providers/Microsoft.Network/Frontdoors/clifrontdoor000002/loadBalancingSettings/DefaultLoadBalancingSettings"}}}],"healthProbeSettings":[{"id":"/subscriptions/00000000-0000-0000-0000-000000000000/resourcegroups/clitest.rg000001/providers/Microsoft.Network/Frontdoors/clifrontdoor000002/HealthProbeSettings/DefaultProbeSettings","name":"DefaultProbeSettings","type":"Microsoft.Network/Frontdoors/HealthProbeSettings","properties":{"intervalInSeconds":30,"path":"/","protocol":"Https","resourceState":"Enabled","enabledState":"Enabled","healthProbeMethod":"Head"}}],"frontendEndpoints":[{"id":"/subscriptions/00000000-0000-0000-0000-000000000000/resourcegroups/clitest.rg000001/providers/Microsoft.Network/Frontdoors/clifrontdoor000002/FrontendEndpoints/DefaultFrontendEndpoint","name":"DefaultFrontendEndpoint","type":"Microsoft.Network/Frontdoors/FrontendEndpoints","properties":{"hostName":"clifrontdoor000002.azurefd.net","sessionAffinityEnabledState":"Disabled","sessionAffinityTtlSeconds":0,"customHttpsProvisioningState":null,"customHttpsProvisioningSubstate":null,"resourceState":"Enabled","webApplicationFirewallPolicyLink":null,"customHttpsConfiguration":null}}],"loadBalancingSettings":[{"id":"/subscriptions/00000000-0000-0000-0000-000000000000/resourcegroups/clitest.rg000001/providers/Microsoft.Network/Frontdoors/clifrontdoor000002/LoadBalancingSettings/DefaultLoadBalancingSettings","name":"DefaultLoadBalancingSettings","type":"Microsoft.Network/Frontdoors/LoadBalancingSettings","properties":{"additionalLatencyMilliseconds":0,"sampleSize":4,"successfulSamplesRequired":2,"resourceState":"Enabled"}}],"rulesEngines":[],"routingRules":[{"id":"/subscriptions/00000000-0000-0000-0000-000000000000/resourcegroups/clitest.rg000001/providers/Microsoft.Network/Frontdoors/clifrontdoor000002/RoutingRules/DefaultRoutingRule","name":"DefaultRoutingRule","type":"Microsoft.Network/Frontdoors/RoutingRules","properties":{"acceptedProtocols":["Http"],"patternsToMatch":["/*"],"enabledState":"Enabled","resourceState":"Enabled","frontendEndpoints":[{"id":"/subscriptions/00000000-0000-0000-0000-000000000000/resourceGroups/clitest.rg000001/providers/Microsoft.Network/frontdoors/clifrontdoor000002/frontendEndpoints/DefaultFrontendEndpoint"}],"routeConfiguration":{"customForwardingPath":null,"forwardingProtocol":"MatchRequest","@odata.type":"#Microsoft.Azure.FrontDoor.Models.FrontdoorForwardingConfiguration","cacheConfiguration":null,"backendPool":{"id":"/subscriptions/00000000-0000-0000-0000-000000000000/resourceGroups/clitest.rg000001/providers/Microsoft.Network/frontdoors/clifrontdoor000002/backendPools/DefaultBackendPool"}},"rulesEngine":null,"webApplicationFirewallPolicyLink":null}}],"backendPoolsSettings":{"enforceCertificateNameCheck":"Enabled","sendRecvTimeoutSeconds":30}}}' headers: cache-control: - no-cache content-length: - '6022' content-type: - application/json; odata.metadata=minimal; odata.streaming=true date: - Thu, 01 Apr 2021 16:59:33 GMT expires: - '-1' odata-version: - '4.0' pragma: - no-cache server: - Kestrel strict-transport-security: - max-age=31536000; includeSubDomains transfer-encoding: - chunked vary: - Accept-Encoding x-content-type-options: - nosniff status: code: 200 message: OK - request: body: '{"location": "Global", "tags": {}, "properties": {"friendlyName": "clifrontdoor000002", "routingRules": [{"id": "/subscriptions/00000000-0000-0000-0000-000000000000/resourcegroups/clitest.rg000001/providers/Microsoft.Network/Frontdoors/clifrontdoor000002/RoutingRules/DefaultRoutingRule", "properties": {"frontendEndpoints": [{"id": "/subscriptions/00000000-0000-0000-0000-000000000000/resourceGroups/clitest.rg000001/providers/Microsoft.Network/frontdoors/clifrontdoor000002/frontendEndpoints/DefaultFrontendEndpoint"}], "acceptedProtocols": ["Http"], "patternsToMatch": ["/*"], "enabledState": "Enabled", "routeConfiguration": {"@odata.type": "#Microsoft.Azure.FrontDoor.Models.FrontdoorForwardingConfiguration", "forwardingProtocol": "MatchRequest", "backendPool": {"id": "/subscriptions/00000000-0000-0000-0000-000000000000/resourceGroups/clitest.rg000001/providers/Microsoft.Network/frontdoors/clifrontdoor000002/backendPools/DefaultBackendPool"}}, "resourceState": "Enabled"}, "name": "DefaultRoutingRule"}], "loadBalancingSettings": [{"id": "/subscriptions/00000000-0000-0000-0000-000000000000/resourcegroups/clitest.rg000001/providers/Microsoft.Network/Frontdoors/clifrontdoor000002/LoadBalancingSettings/DefaultLoadBalancingSettings", "properties": {"sampleSize": 4, "successfulSamplesRequired": 2, "additionalLatencyMilliseconds": 0, "resourceState": "Enabled"}, "name": "DefaultLoadBalancingSettings"}], "healthProbeSettings": [{"id": "/subscriptions/00000000-0000-0000-0000-000000000000/resourcegroups/clitest.rg000001/providers/Microsoft.Network/Frontdoors/clifrontdoor000002/HealthProbeSettings/DefaultProbeSettings", "properties": {"path": "/", "protocol": "Https", "intervalInSeconds": 30, "healthProbeMethod": "Head", "enabledState": "Enabled", "resourceState": "Enabled"}, "name": "DefaultProbeSettings"}], "backendPools": [{"id": "/subscriptions/00000000-0000-0000-0000-000000000000/resourcegroups/clitest.rg000001/providers/Microsoft.Network/Frontdoors/clifrontdoor000002/BackendPools/DefaultBackendPool", "properties": {"backends": [{"address": "202.120.2.3", "httpPort": 80, "httpsPort": 443, "enabledState": "Enabled", "priority": 1, "weight": 50, "backendHostHeader": "202.120.2.3"}], "loadBalancingSettings": {"id": "/subscriptions/00000000-0000-0000-0000-000000000000/resourceGroups/clitest.rg000001/providers/Microsoft.Network/frontdoors/clifrontdoor000002/loadBalancingSettings/DefaultLoadBalancingSettings"}, "healthProbeSettings": {"id": "/subscriptions/00000000-0000-0000-0000-000000000000/resourceGroups/clitest.rg000001/providers/Microsoft.Network/frontdoors/clifrontdoor000002/healthProbeSettings/DefaultProbeSettings"}, "resourceState": "Enabled"}, "name": "DefaultBackendPool"}], "frontendEndpoints": [{"id": "/subscriptions/00000000-0000-0000-0000-000000000000/resourcegroups/clitest.rg000001/providers/Microsoft.Network/Frontdoors/clifrontdoor000002/FrontendEndpoints/DefaultFrontendEndpoint", "properties": {"hostName": "clifrontdoor000002.azurefd.net", "sessionAffinityEnabledState": "Disabled", "sessionAffinityTtlSeconds": 0, "resourceState": "Enabled"}, "name": "DefaultFrontendEndpoint"}], "backendPoolsSettings": {"enforceCertificateNameCheck": "Enabled", "sendRecvTimeoutSeconds": 30}, "enabledState": "Enabled", "resourceState": "Enabled"}}' headers: Accept: - application/json Accept-Encoding: - gzip, deflate CommandName: - network front-door backend-pool delete Connection: - keep-alive Content-Length: - '3840' Content-Type: - application/json; charset=utf-8 ParameterSetName: - -f -g -n User-Agent: - python/3.7.9 (Windows-10-10.0.19041-SP0) msrest/0.6.21 msrest_azure/0.6.3 azure-mgmt-frontdoor/0.3.0 Azure-SDK-For-Python AZURECLI/2.21.0 (MSI) accept-language: - en-US method: PUT uri: https://management.azure.com/subscriptions/00000000-0000-0000-0000-000000000000/resourceGroups/clitest.rg000001/providers/Microsoft.Network/frontDoors/clifrontdoor000002?api-version=2020-05-01 response: body: string: '{"name":"clifrontdoor000002","id":"/subscriptions/00000000-0000-0000-0000-000000000000/resourcegroups/clitest.rg000001/providers/Microsoft.Network/frontdoors/clifrontdoor000002","type":"Microsoft.Network/frontdoors","location":"Global","tags":{},"properties":{"provisioningState":"Succeeded","resourceState":"Enabled","enabledState":"Enabled","cName":"clifrontdoor000002.azurefd.net","frontdoorId":"f5ff28ef-a022-48ca-9d89-3ade6acd3abb","friendlyName":"clifrontdoor000002","backendPools":[{"id":"/subscriptions/00000000-0000-0000-0000-000000000000/resourcegroups/clitest.rg000001/providers/Microsoft.Network/Frontdoors/clifrontdoor000002/BackendPools/DefaultBackendPool","name":"DefaultBackendPool","type":"Microsoft.Network/Frontdoors/BackendPools","properties":{"resourceState":"Enabled","backends":[{"address":"202.120.2.3","httpPort":80,"httpsPort":443,"priority":1,"weight":50,"backendHostHeader":"202.120.2.3","enabledState":"Enabled","privateLinkAlias":null,"privateLinkApprovalMessage":null,"privateLinkResourceId":null,"privateLinkLocation":null,"privateEndpointStatus":null}],"healthProbeSettings":{"id":"/subscriptions/00000000-0000-0000-0000-000000000000/resourceGroups/clitest.rg000001/providers/Microsoft.Network/frontdoors/clifrontdoor000002/healthProbeSettings/DefaultProbeSettings"},"loadBalancingSettings":{"id":"/subscriptions/00000000-0000-0000-0000-000000000000/resourceGroups/clitest.rg000001/providers/Microsoft.Network/frontdoors/clifrontdoor000002/loadBalancingSettings/DefaultLoadBalancingSettings"}}}],"healthProbeSettings":[{"id":"/subscriptions/00000000-0000-0000-0000-000000000000/resourcegroups/clitest.rg000001/providers/Microsoft.Network/Frontdoors/clifrontdoor000002/HealthProbeSettings/DefaultProbeSettings","name":"DefaultProbeSettings","type":"Microsoft.Network/Frontdoors/HealthProbeSettings","properties":{"intervalInSeconds":30,"path":"/","protocol":"Https","resourceState":"Enabled","enabledState":"Enabled","healthProbeMethod":"Head"}}],"frontendEndpoints":[{"id":"/subscriptions/00000000-0000-0000-0000-000000000000/resourcegroups/clitest.rg000001/providers/Microsoft.Network/Frontdoors/clifrontdoor000002/FrontendEndpoints/DefaultFrontendEndpoint","name":"DefaultFrontendEndpoint","type":"Microsoft.Network/Frontdoors/FrontendEndpoints","properties":{"hostName":"clifrontdoor000002.azurefd.net","sessionAffinityEnabledState":"Disabled","sessionAffinityTtlSeconds":0,"customHttpsProvisioningState":null,"customHttpsProvisioningSubstate":null,"resourceState":"Enabled","webApplicationFirewallPolicyLink":null,"customHttpsConfiguration":null}}],"loadBalancingSettings":[{"id":"/subscriptions/00000000-0000-0000-0000-000000000000/resourcegroups/clitest.rg000001/providers/Microsoft.Network/Frontdoors/clifrontdoor000002/LoadBalancingSettings/DefaultLoadBalancingSettings","name":"DefaultLoadBalancingSettings","type":"Microsoft.Network/Frontdoors/LoadBalancingSettings","properties":{"additionalLatencyMilliseconds":0,"sampleSize":4,"successfulSamplesRequired":2,"resourceState":"Enabled"}}],"rulesEngines":[],"routingRules":[{"id":"/subscriptions/00000000-0000-0000-0000-000000000000/resourcegroups/clitest.rg000001/providers/Microsoft.Network/Frontdoors/clifrontdoor000002/RoutingRules/DefaultRoutingRule","name":"DefaultRoutingRule","type":"Microsoft.Network/Frontdoors/RoutingRules","properties":{"acceptedProtocols":["Http"],"patternsToMatch":["/*"],"enabledState":"Enabled","resourceState":"Enabled","frontendEndpoints":[{"id":"/subscriptions/00000000-0000-0000-0000-000000000000/resourceGroups/clitest.rg000001/providers/Microsoft.Network/frontdoors/clifrontdoor000002/frontendEndpoints/DefaultFrontendEndpoint"}],"routeConfiguration":{"customForwardingPath":null,"forwardingProtocol":"MatchRequest","@odata.type":"#Microsoft.Azure.FrontDoor.Models.FrontdoorForwardingConfiguration","cacheConfiguration":null,"backendPool":{"id":"/subscriptions/00000000-0000-0000-0000-000000000000/resourceGroups/clitest.rg000001/providers/Microsoft.Network/frontdoors/clifrontdoor000002/backendPools/DefaultBackendPool"}},"rulesEngine":null,"webApplicationFirewallPolicyLink":null}}],"backendPoolsSettings":{"enforceCertificateNameCheck":"Enabled","sendRecvTimeoutSeconds":30}}}' headers: azure-asyncoperation: - https://management.azure.com/subscriptions/00000000-0000-0000-0000-000000000000/resourcegroups/clitest.rg000001/providers/Microsoft.Network/frontdooroperationresults/f0af85a3-b02e-44d8-aba7-a249afb1851b?api-version=2020-05-01 cache-control: - no-cache content-length: - '4828' content-type: - application/json; odata.metadata=minimal; odata.streaming=true date: - Thu, 01 Apr 2021 16:59:35 GMT expires: - '-1' location: - https://management.azure.com/subscriptions/00000000-0000-0000-0000-000000000000/resourcegroups/clitest.rg000001/providers/Microsoft.Network/frontdooroperationresults/f0af85a3-b02e-44d8-aba7-a249afb1851b/frontdoorresults/clifrontdoor000002?api-version=2020-05-01 odata-version: - '4.0' pragma: - no-cache server: - Kestrel strict-transport-security: - max-age=31536000; includeSubDomains x-content-type-options: - nosniff x-ms-ratelimit-remaining-subscription-writes: - '1196' status: code: 202 message: Accepted - request: body: null headers: Accept: - application/json Accept-Encoding: - gzip, deflate CommandName: - network front-door backend-pool delete Connection: - keep-alive ParameterSetName: - -f -g -n User-Agent: - python/3.7.9 (Windows-10-10.0.19041-SP0) msrest/0.6.21 msrest_azure/0.6.3 azure-mgmt-frontdoor/0.3.0 Azure-SDK-For-Python AZURECLI/2.21.0 (MSI) method: GET uri: https://management.azure.com/subscriptions/00000000-0000-0000-0000-000000000000/resourcegroups/clitest.rg000001/providers/Microsoft.Network/frontdooroperationresults/f0af85a3-b02e-44d8-aba7-a249afb1851b?api-version=2020-05-01 response: body: string: '{"status":"InProgress","error":{"code":"None","message":null}}' headers: cache-control: - no-cache content-length: - '62' content-type: - application/json; odata.metadata=minimal; odata.streaming=true date: - Thu, 01 Apr 2021 16:59:47 GMT expires: - '-1' odata-version: - '4.0' pragma: - no-cache server: - Kestrel strict-transport-security: - max-age=31536000; includeSubDomains transfer-encoding: - chunked vary: - Accept-Encoding x-content-type-options: - nosniff status: code: 200 message: OK - request: body: null headers: Accept: - application/json Accept-Encoding: - gzip, deflate CommandName: - network front-door backend-pool delete Connection: - keep-alive ParameterSetName: - -f -g -n User-Agent: - python/3.7.9 (Windows-10-10.0.19041-SP0) msrest/0.6.21 msrest_azure/0.6.3 azure-mgmt-frontdoor/0.3.0 Azure-SDK-For-Python AZURECLI/2.21.0 (MSI) method: GET uri: https://management.azure.com/subscriptions/00000000-0000-0000-0000-000000000000/resourcegroups/clitest.rg000001/providers/Microsoft.Network/frontdooroperationresults/f0af85a3-b02e-44d8-aba7-a249afb1851b?api-version=2020-05-01 response: body: string: '{"status":"Succeeded","error":{"code":"None","message":null}}' headers: cache-control: - no-cache content-length: - '61' content-type: - application/json; odata.metadata=minimal; odata.streaming=true date: - Thu, 01 Apr 2021 17:00:17 GMT expires: - '-1' odata-version: - '4.0' pragma: - no-cache server: - Kestrel strict-transport-security: - max-age=31536000; includeSubDomains transfer-encoding: - chunked vary: - Accept-Encoding x-content-type-options: - nosniff status: code: 200 message: OK - request: body: null headers: Accept: - application/json Accept-Encoding: - gzip, deflate CommandName: - network front-door backend-pool delete Connection: - keep-alive ParameterSetName: - -f -g -n User-Agent: - python/3.7.9 (Windows-10-10.0.19041-SP0) msrest/0.6.21 msrest_azure/0.6.3 azure-mgmt-frontdoor/0.3.0 Azure-SDK-For-Python AZURECLI/2.21.0 (MSI) method: GET uri: https://management.azure.com/subscriptions/00000000-0000-0000-0000-000000000000/resourceGroups/clitest.rg000001/providers/Microsoft.Network/frontDoors/clifrontdoor000002?api-version=2020-05-01 response: body: string: '{"name":"clifrontdoor000002","id":"/subscriptions/00000000-0000-0000-0000-000000000000/resourcegroups/clitest.rg000001/providers/Microsoft.Network/frontdoors/clifrontdoor000002","type":"Microsoft.Network/frontdoors","location":"Global","tags":{},"properties":{"provisioningState":"Succeeded","resourceState":"Enabled","enabledState":"Enabled","cName":"clifrontdoor000002.azurefd.net","frontdoorId":"f5ff28ef-a022-48ca-9d89-3ade6acd3abb","friendlyName":"clifrontdoor000002","backendPools":[{"id":"/subscriptions/00000000-0000-0000-0000-000000000000/resourcegroups/clitest.rg000001/providers/Microsoft.Network/Frontdoors/clifrontdoor000002/BackendPools/DefaultBackendPool","name":"DefaultBackendPool","type":"Microsoft.Network/Frontdoors/BackendPools","properties":{"resourceState":"Enabled","backends":[{"address":"202.120.2.3","httpPort":80,"httpsPort":443,"priority":1,"weight":50,"backendHostHeader":"202.120.2.3","enabledState":"Enabled","privateLinkAlias":null,"privateLinkApprovalMessage":null,"privateLinkResourceId":null,"privateLinkLocation":null,"privateEndpointStatus":null}],"healthProbeSettings":{"id":"/subscriptions/00000000-0000-0000-0000-000000000000/resourceGroups/clitest.rg000001/providers/Microsoft.Network/frontdoors/clifrontdoor000002/healthProbeSettings/DefaultProbeSettings"},"loadBalancingSettings":{"id":"/subscriptions/00000000-0000-0000-0000-000000000000/resourceGroups/clitest.rg000001/providers/Microsoft.Network/frontdoors/clifrontdoor000002/loadBalancingSettings/DefaultLoadBalancingSettings"}}}],"healthProbeSettings":[{"id":"/subscriptions/00000000-0000-0000-0000-000000000000/resourcegroups/clitest.rg000001/providers/Microsoft.Network/Frontdoors/clifrontdoor000002/HealthProbeSettings/DefaultProbeSettings","name":"DefaultProbeSettings","type":"Microsoft.Network/Frontdoors/HealthProbeSettings","properties":{"intervalInSeconds":30,"path":"/","protocol":"Https","resourceState":"Enabled","enabledState":"Enabled","healthProbeMethod":"Head"}}],"frontendEndpoints":[{"id":"/subscriptions/00000000-0000-0000-0000-000000000000/resourcegroups/clitest.rg000001/providers/Microsoft.Network/Frontdoors/clifrontdoor000002/FrontendEndpoints/DefaultFrontendEndpoint","name":"DefaultFrontendEndpoint","type":"Microsoft.Network/Frontdoors/FrontendEndpoints","properties":{"hostName":"clifrontdoor000002.azurefd.net","sessionAffinityEnabledState":"Disabled","sessionAffinityTtlSeconds":0,"customHttpsProvisioningState":null,"customHttpsProvisioningSubstate":null,"resourceState":"Enabled","webApplicationFirewallPolicyLink":null,"customHttpsConfiguration":null}}],"loadBalancingSettings":[{"id":"/subscriptions/00000000-0000-0000-0000-000000000000/resourcegroups/clitest.rg000001/providers/Microsoft.Network/Frontdoors/clifrontdoor000002/LoadBalancingSettings/DefaultLoadBalancingSettings","name":"DefaultLoadBalancingSettings","type":"Microsoft.Network/Frontdoors/LoadBalancingSettings","properties":{"additionalLatencyMilliseconds":0,"sampleSize":4,"successfulSamplesRequired":2,"resourceState":"Enabled"}}],"rulesEngines":[],"routingRules":[{"id":"/subscriptions/00000000-0000-0000-0000-000000000000/resourcegroups/clitest.rg000001/providers/Microsoft.Network/Frontdoors/clifrontdoor000002/RoutingRules/DefaultRoutingRule","name":"DefaultRoutingRule","type":"Microsoft.Network/Frontdoors/RoutingRules","properties":{"acceptedProtocols":["Http"],"patternsToMatch":["/*"],"enabledState":"Enabled","resourceState":"Enabled","frontendEndpoints":[{"id":"/subscriptions/00000000-0000-0000-0000-000000000000/resourceGroups/clitest.rg000001/providers/Microsoft.Network/frontdoors/clifrontdoor000002/frontendEndpoints/DefaultFrontendEndpoint"}],"routeConfiguration":{"customForwardingPath":null,"forwardingProtocol":"MatchRequest","@odata.type":"#Microsoft.Azure.FrontDoor.Models.FrontdoorForwardingConfiguration","cacheConfiguration":null,"backendPool":{"id":"/subscriptions/00000000-0000-0000-0000-000000000000/resourceGroups/clitest.rg000001/providers/Microsoft.Network/frontdoors/clifrontdoor000002/backendPools/DefaultBackendPool"}},"rulesEngine":null,"webApplicationFirewallPolicyLink":null}}],"backendPoolsSettings":{"enforceCertificateNameCheck":"Enabled","sendRecvTimeoutSeconds":30}}}' headers: cache-control: - no-cache content-length: - '4828' content-type: - application/json; odata.metadata=minimal; odata.streaming=true date: - Thu, 01 Apr 2021 17:00:17 GMT expires: - '-1' odata-version: - '4.0' pragma: - no-cache server: - Kestrel strict-transport-security: - max-age=31536000; includeSubDomains transfer-encoding: - chunked vary: - Accept-Encoding x-content-type-options: - nosniff status: code: 200 message: OK - request: body: null headers: Accept: - application/json Accept-Encoding: - gzip, deflate CommandName: - network front-door backend-pool list Connection: - keep-alive ParameterSetName: - -f -g User-Agent: - python/3.7.9 (Windows-10-10.0.19041-SP0) msrest/0.6.21 msrest_azure/0.6.3 azure-mgmt-frontdoor/0.3.0 Azure-SDK-For-Python AZURECLI/2.21.0 (MSI) accept-language: - en-US method: GET uri: https://management.azure.com/subscriptions/00000000-0000-0000-0000-000000000000/resourceGroups/clitest.rg000001/providers/Microsoft.Network/frontDoors/clifrontdoor000002?api-version=2020-05-01 response: body: string: '{"name":"clifrontdoor000002","id":"/subscriptions/00000000-0000-0000-0000-000000000000/resourcegroups/clitest.rg000001/providers/Microsoft.Network/frontdoors/clifrontdoor000002","type":"Microsoft.Network/frontdoors","location":"Global","tags":{},"properties":{"provisioningState":"Succeeded","resourceState":"Enabled","enabledState":"Enabled","cName":"clifrontdoor000002.azurefd.net","frontdoorId":"f5ff28ef-a022-48ca-9d89-3ade6acd3abb","friendlyName":"clifrontdoor000002","backendPools":[{"id":"/subscriptions/00000000-0000-0000-0000-000000000000/resourcegroups/clitest.rg000001/providers/Microsoft.Network/Frontdoors/clifrontdoor000002/BackendPools/DefaultBackendPool","name":"DefaultBackendPool","type":"Microsoft.Network/Frontdoors/BackendPools","properties":{"resourceState":"Enabled","backends":[{"address":"202.120.2.3","httpPort":80,"httpsPort":443,"priority":1,"weight":50,"backendHostHeader":"202.120.2.3","enabledState":"Enabled","privateLinkAlias":null,"privateLinkApprovalMessage":null,"privateLinkResourceId":null,"privateLinkLocation":null,"privateEndpointStatus":null}],"healthProbeSettings":{"id":"/subscriptions/00000000-0000-0000-0000-000000000000/resourceGroups/clitest.rg000001/providers/Microsoft.Network/frontdoors/clifrontdoor000002/healthProbeSettings/DefaultProbeSettings"},"loadBalancingSettings":{"id":"/subscriptions/00000000-0000-0000-0000-000000000000/resourceGroups/clitest.rg000001/providers/Microsoft.Network/frontdoors/clifrontdoor000002/loadBalancingSettings/DefaultLoadBalancingSettings"}}}],"healthProbeSettings":[{"id":"/subscriptions/00000000-0000-0000-0000-000000000000/resourcegroups/clitest.rg000001/providers/Microsoft.Network/Frontdoors/clifrontdoor000002/HealthProbeSettings/DefaultProbeSettings","name":"DefaultProbeSettings","type":"Microsoft.Network/Frontdoors/HealthProbeSettings","properties":{"intervalInSeconds":30,"path":"/","protocol":"Https","resourceState":"Enabled","enabledState":"Enabled","healthProbeMethod":"Head"}}],"frontendEndpoints":[{"id":"/subscriptions/00000000-0000-0000-0000-000000000000/resourcegroups/clitest.rg000001/providers/Microsoft.Network/Frontdoors/clifrontdoor000002/FrontendEndpoints/DefaultFrontendEndpoint","name":"DefaultFrontendEndpoint","type":"Microsoft.Network/Frontdoors/FrontendEndpoints","properties":{"hostName":"clifrontdoor000002.azurefd.net","sessionAffinityEnabledState":"Disabled","sessionAffinityTtlSeconds":0,"customHttpsProvisioningState":null,"customHttpsProvisioningSubstate":null,"resourceState":"Enabled","webApplicationFirewallPolicyLink":null,"customHttpsConfiguration":null}}],"loadBalancingSettings":[{"id":"/subscriptions/00000000-0000-0000-0000-000000000000/resourcegroups/clitest.rg000001/providers/Microsoft.Network/Frontdoors/clifrontdoor000002/LoadBalancingSettings/DefaultLoadBalancingSettings","name":"DefaultLoadBalancingSettings","type":"Microsoft.Network/Frontdoors/LoadBalancingSettings","properties":{"additionalLatencyMilliseconds":0,"sampleSize":4,"successfulSamplesRequired":2,"resourceState":"Enabled"}}],"rulesEngines":[],"routingRules":[{"id":"/subscriptions/00000000-0000-0000-0000-000000000000/resourcegroups/clitest.rg000001/providers/Microsoft.Network/Frontdoors/clifrontdoor000002/RoutingRules/DefaultRoutingRule","name":"DefaultRoutingRule","type":"Microsoft.Network/Frontdoors/RoutingRules","properties":{"acceptedProtocols":["Http"],"patternsToMatch":["/*"],"enabledState":"Enabled","resourceState":"Enabled","frontendEndpoints":[{"id":"/subscriptions/00000000-0000-0000-0000-000000000000/resourceGroups/clitest.rg000001/providers/Microsoft.Network/frontdoors/clifrontdoor000002/frontendEndpoints/DefaultFrontendEndpoint"}],"routeConfiguration":{"customForwardingPath":null,"forwardingProtocol":"MatchRequest","@odata.type":"#Microsoft.Azure.FrontDoor.Models.FrontdoorForwardingConfiguration","cacheConfiguration":null,"backendPool":{"id":"/subscriptions/00000000-0000-0000-0000-000000000000/resourceGroups/clitest.rg000001/providers/Microsoft.Network/frontdoors/clifrontdoor000002/backendPools/DefaultBackendPool"}},"rulesEngine":null,"webApplicationFirewallPolicyLink":null}}],"backendPoolsSettings":{"enforceCertificateNameCheck":"Enabled","sendRecvTimeoutSeconds":30}}}' headers: cache-control: - no-cache content-length: - '4828' content-type: - application/json; odata.metadata=minimal; odata.streaming=true date: - Thu, 01 Apr 2021 17:00:18 GMT expires: - '-1' odata-version: - '4.0' pragma: - no-cache server: - Kestrel strict-transport-security: - max-age=31536000; includeSubDomains transfer-encoding: - chunked vary: - Accept-Encoding x-content-type-options: - nosniff status: code: 200 message: OK version: 1
91.634718
5,237
0.762392
3da1c2af4fd4ab049e93d1e141fb6cc88515bf64
76,890
yaml
YAML
src/front-door/azext_front_door/tests/latest/recordings/test_waf_exclusions.yaml
00Kai0/azure-cli-extensions
4bcafd5c9bb4d4f2eca0b8b512d9d79fe9061b8e
[ "MIT" ]
null
null
null
src/front-door/azext_front_door/tests/latest/recordings/test_waf_exclusions.yaml
00Kai0/azure-cli-extensions
4bcafd5c9bb4d4f2eca0b8b512d9d79fe9061b8e
[ "MIT" ]
null
null
null
src/front-door/azext_front_door/tests/latest/recordings/test_waf_exclusions.yaml
00Kai0/azure-cli-extensions
4bcafd5c9bb4d4f2eca0b8b512d9d79fe9061b8e
[ "MIT" ]
null
null
null
interactions: - request: body: '{"location": "global", "properties": {"policySettings": {"enabledState": "Enabled", "mode": "Prevention"}, "customRules": {"rules": []}, "managedRules": {}}, "sku": {"name": "Classic_AzureFrontDoor"}}' headers: Accept: - application/json Accept-Encoding: - gzip, deflate CommandName: - network front-door waf-policy create Connection: - keep-alive Content-Length: - '200' Content-Type: - application/json; charset=utf-8 ParameterSetName: - -g -n --mode User-Agent: - python/3.7.9 (Windows-10-10.0.19041-SP0) msrest/0.6.21 msrest_azure/0.6.3 azure-mgmt-frontdoor/0.3.0 Azure-SDK-For-Python AZURECLI/2.21.0 (MSI) accept-language: - en-US method: PUT uri: https://management.azure.com/subscriptions/00000000-0000-0000-0000-000000000000/resourceGroups/clitest.rg000001/providers/Microsoft.Network/FrontDoorWebApplicationFirewallPolicies/cli000002?api-version=2020-11-01 response: body: string: '{"name":"cli000002","id":"/subscriptions/00000000-0000-0000-0000-000000000000/resourcegroups/clitest.rg000001/providers/Microsoft.Network/frontdoorwebapplicationfirewallpolicies/cli000002","type":"Microsoft.Network/frontdoorwebapplicationfirewallpolicies","location":"Global","tags":{},"sku":{"name":"Classic_AzureFrontDoor"},"properties":{"resourceState":"Enabled","provisioningState":"Succeeded","policySettings":{"enabledState":"Enabled","mode":"Prevention","redirectUrl":null,"customBlockResponseStatusCode":null,"customBlockResponseBody":null,"requestBodyCheck":"Disabled"},"customRules":{"rules":[]},"managedRules":{"managedRuleSets":[]},"frontendEndpointLinks":[],"routingRuleLinks":[],"securityPolicyLinks":[]}}' headers: cache-control: - no-cache content-length: - '808' content-type: - application/json; odata.metadata=minimal; odata.streaming=true date: - Thu, 01 Apr 2021 16:59:03 GMT expires: - '-1' odata-version: - '4.0' pragma: - no-cache server: - Kestrel strict-transport-security: - max-age=31536000; includeSubDomains x-content-type-options: - nosniff x-ms-ratelimit-remaining-subscription-writes: - '1195' status: code: 201 message: Created - request: body: null headers: Accept: - application/json Accept-Encoding: - gzip, deflate CommandName: - network front-door waf-policy managed-rules add Connection: - keep-alive ParameterSetName: - -g --policy-name --type --version User-Agent: - python/3.7.9 (Windows-10-10.0.19041-SP0) msrest/0.6.21 msrest_azure/0.6.3 azure-mgmt-frontdoor/0.3.0 Azure-SDK-For-Python AZURECLI/2.21.0 (MSI) accept-language: - en-US method: GET uri: https://management.azure.com/subscriptions/00000000-0000-0000-0000-000000000000/resourceGroups/clitest.rg000001/providers/Microsoft.Network/FrontDoorWebApplicationFirewallPolicies/cli000002?api-version=2020-11-01 response: body: string: '{"name":"cli000002","id":"/subscriptions/00000000-0000-0000-0000-000000000000/resourcegroups/clitest.rg000001/providers/Microsoft.Network/frontdoorwebapplicationfirewallpolicies/cli000002","type":"Microsoft.Network/frontdoorwebapplicationfirewallpolicies","location":"Global","tags":{},"sku":{"name":"Classic_AzureFrontDoor"},"properties":{"resourceState":"Enabled","provisioningState":"Succeeded","policySettings":{"enabledState":"Enabled","mode":"Prevention","redirectUrl":null,"customBlockResponseStatusCode":null,"customBlockResponseBody":null,"requestBodyCheck":"Disabled"},"customRules":{"rules":[]},"managedRules":{"managedRuleSets":[]},"frontendEndpointLinks":[],"routingRuleLinks":[],"securityPolicyLinks":[]}}' headers: cache-control: - no-cache content-length: - '808' content-type: - application/json; odata.metadata=minimal; odata.streaming=true date: - Thu, 01 Apr 2021 16:59:04 GMT expires: - '-1' odata-version: - '4.0' pragma: - no-cache server: - Kestrel strict-transport-security: - max-age=31536000; includeSubDomains transfer-encoding: - chunked vary: - Accept-Encoding x-content-type-options: - nosniff status: code: 200 message: OK - request: body: '{"location": "Global", "tags": {}, "properties": {"policySettings": {"enabledState": "Enabled", "mode": "Prevention", "requestBodyCheck": "Disabled"}, "customRules": {"rules": []}, "managedRules": {"managedRuleSets": [{"ruleSetType": "DefaultRuleSet", "ruleSetVersion": "1.0"}]}}, "sku": {"name": "Classic_AzureFrontDoor"}}' headers: Accept: - application/json Accept-Encoding: - gzip, deflate CommandName: - network front-door waf-policy managed-rules add Connection: - keep-alive Content-Length: - '323' Content-Type: - application/json; charset=utf-8 ParameterSetName: - -g --policy-name --type --version User-Agent: - python/3.7.9 (Windows-10-10.0.19041-SP0) msrest/0.6.21 msrest_azure/0.6.3 azure-mgmt-frontdoor/0.3.0 Azure-SDK-For-Python AZURECLI/2.21.0 (MSI) accept-language: - en-US method: PUT uri: https://management.azure.com/subscriptions/00000000-0000-0000-0000-000000000000/resourceGroups/clitest.rg000001/providers/Microsoft.Network/FrontDoorWebApplicationFirewallPolicies/cli000002?api-version=2020-11-01 response: body: string: '{"name":"cli000002","id":"/subscriptions/00000000-0000-0000-0000-000000000000/resourcegroups/clitest.rg000001/providers/Microsoft.Network/frontdoorwebapplicationfirewallpolicies/cli000002","type":"Microsoft.Network/frontdoorwebapplicationfirewallpolicies","location":"Global","tags":{},"sku":{"name":"Classic_AzureFrontDoor"},"properties":{"resourceState":"Enabled","provisioningState":"Succeeded","policySettings":{"enabledState":"Enabled","mode":"Prevention","redirectUrl":null,"customBlockResponseStatusCode":null,"customBlockResponseBody":null,"requestBodyCheck":"Disabled"},"customRules":{"rules":[]},"managedRules":{"managedRuleSets":[{"ruleSetType":"DefaultRuleSet","ruleSetVersion":"1.0","ruleSetAction":null,"ruleGroupOverrides":[],"exclusions":[]}]},"frontendEndpointLinks":[],"routingRuleLinks":[],"securityPolicyLinks":[]}}' headers: cache-control: - no-cache content-length: - '924' content-type: - application/json; odata.metadata=minimal; odata.streaming=true date: - Thu, 01 Apr 2021 16:59:05 GMT expires: - '-1' odata-version: - '4.0' pragma: - no-cache server: - Kestrel strict-transport-security: - max-age=31536000; includeSubDomains transfer-encoding: - chunked vary: - Accept-Encoding x-content-type-options: - nosniff x-ms-ratelimit-remaining-subscription-writes: - '1197' status: code: 200 message: OK - request: body: null headers: Accept: - application/json Accept-Encoding: - gzip, deflate CommandName: - network front-door waf-policy managed-rules exclusion list Connection: - keep-alive ParameterSetName: - -g --policy-name --type User-Agent: - python/3.7.9 (Windows-10-10.0.19041-SP0) msrest/0.6.21 msrest_azure/0.6.3 azure-mgmt-frontdoor/0.3.0 Azure-SDK-For-Python AZURECLI/2.21.0 (MSI) accept-language: - en-US method: GET uri: https://management.azure.com/subscriptions/00000000-0000-0000-0000-000000000000/resourceGroups/clitest.rg000001/providers/Microsoft.Network/FrontDoorWebApplicationFirewallPolicies/cli000002?api-version=2020-11-01 response: body: string: '{"name":"cli000002","id":"/subscriptions/00000000-0000-0000-0000-000000000000/resourcegroups/clitest.rg000001/providers/Microsoft.Network/frontdoorwebapplicationfirewallpolicies/cli000002","type":"Microsoft.Network/frontdoorwebapplicationfirewallpolicies","location":"Global","tags":{},"sku":{"name":"Classic_AzureFrontDoor"},"properties":{"resourceState":"Enabled","provisioningState":"Succeeded","policySettings":{"enabledState":"Enabled","mode":"Prevention","redirectUrl":null,"customBlockResponseStatusCode":null,"customBlockResponseBody":null,"requestBodyCheck":"Disabled"},"customRules":{"rules":[]},"managedRules":{"managedRuleSets":[{"ruleSetType":"DefaultRuleSet","ruleSetVersion":"1.0","ruleSetAction":null,"ruleGroupOverrides":[],"exclusions":[]}]},"frontendEndpointLinks":[],"routingRuleLinks":[],"securityPolicyLinks":[]}}' headers: cache-control: - no-cache content-length: - '924' content-type: - application/json; odata.metadata=minimal; odata.streaming=true date: - Thu, 01 Apr 2021 16:59:07 GMT expires: - '-1' odata-version: - '4.0' pragma: - no-cache server: - Kestrel strict-transport-security: - max-age=31536000; includeSubDomains transfer-encoding: - chunked vary: - Accept-Encoding x-content-type-options: - nosniff status: code: 200 message: OK - request: body: null headers: Accept: - application/json Accept-Encoding: - gzip, deflate CommandName: - network front-door waf-policy managed-rules exclusion list Connection: - keep-alive ParameterSetName: - -g --policy-name --type User-Agent: - python/3.7.9 (Windows-10-10.0.19041-SP0) msrest/0.6.21 msrest_azure/0.6.3 azure-mgmt-frontdoor/0.3.0 Azure-SDK-For-Python AZURECLI/2.21.0 (MSI) accept-language: - en-US method: GET uri: https://management.azure.com/subscriptions/00000000-0000-0000-0000-000000000000/resourceGroups/clitest.rg000001/providers/Microsoft.Network/FrontDoorWebApplicationFirewallPolicies/cli000002?api-version=2020-11-01 response: body: string: '{"name":"cli000002","id":"/subscriptions/00000000-0000-0000-0000-000000000000/resourcegroups/clitest.rg000001/providers/Microsoft.Network/frontdoorwebapplicationfirewallpolicies/cli000002","type":"Microsoft.Network/frontdoorwebapplicationfirewallpolicies","location":"Global","tags":{},"sku":{"name":"Classic_AzureFrontDoor"},"properties":{"resourceState":"Enabled","provisioningState":"Succeeded","policySettings":{"enabledState":"Enabled","mode":"Prevention","redirectUrl":null,"customBlockResponseStatusCode":null,"customBlockResponseBody":null,"requestBodyCheck":"Disabled"},"customRules":{"rules":[]},"managedRules":{"managedRuleSets":[{"ruleSetType":"DefaultRuleSet","ruleSetVersion":"1.0","ruleSetAction":null,"ruleGroupOverrides":[],"exclusions":[]}]},"frontendEndpointLinks":[],"routingRuleLinks":[],"securityPolicyLinks":[]}}' headers: cache-control: - no-cache content-length: - '924' content-type: - application/json; odata.metadata=minimal; odata.streaming=true date: - Thu, 01 Apr 2021 16:59:08 GMT expires: - '-1' odata-version: - '4.0' pragma: - no-cache server: - Kestrel strict-transport-security: - max-age=31536000; includeSubDomains transfer-encoding: - chunked vary: - Accept-Encoding x-content-type-options: - nosniff status: code: 200 message: OK - request: body: null headers: Accept: - application/json Accept-Encoding: - gzip, deflate CommandName: - network front-door waf-policy managed-rules exclusion add Connection: - keep-alive ParameterSetName: - -g --policy-name --type --match-variable --operator --value User-Agent: - python/3.7.9 (Windows-10-10.0.19041-SP0) msrest/0.6.21 msrest_azure/0.6.3 azure-mgmt-frontdoor/0.3.0 Azure-SDK-For-Python AZURECLI/2.21.0 (MSI) accept-language: - en-US method: GET uri: https://management.azure.com/subscriptions/00000000-0000-0000-0000-000000000000/resourceGroups/clitest.rg000001/providers/Microsoft.Network/FrontDoorWebApplicationFirewallPolicies/cli000002?api-version=2020-11-01 response: body: string: '{"name":"cli000002","id":"/subscriptions/00000000-0000-0000-0000-000000000000/resourcegroups/clitest.rg000001/providers/Microsoft.Network/frontdoorwebapplicationfirewallpolicies/cli000002","type":"Microsoft.Network/frontdoorwebapplicationfirewallpolicies","location":"Global","tags":{},"sku":{"name":"Classic_AzureFrontDoor"},"properties":{"resourceState":"Enabled","provisioningState":"Succeeded","policySettings":{"enabledState":"Enabled","mode":"Prevention","redirectUrl":null,"customBlockResponseStatusCode":null,"customBlockResponseBody":null,"requestBodyCheck":"Disabled"},"customRules":{"rules":[]},"managedRules":{"managedRuleSets":[{"ruleSetType":"DefaultRuleSet","ruleSetVersion":"1.0","ruleSetAction":null,"ruleGroupOverrides":[],"exclusions":[]}]},"frontendEndpointLinks":[],"routingRuleLinks":[],"securityPolicyLinks":[]}}' headers: cache-control: - no-cache content-length: - '924' content-type: - application/json; odata.metadata=minimal; odata.streaming=true date: - Thu, 01 Apr 2021 16:59:08 GMT expires: - '-1' odata-version: - '4.0' pragma: - no-cache server: - Kestrel strict-transport-security: - max-age=31536000; includeSubDomains transfer-encoding: - chunked vary: - Accept-Encoding x-content-type-options: - nosniff status: code: 200 message: OK - request: body: '{"location": "Global", "tags": {}, "properties": {"policySettings": {"enabledState": "Enabled", "mode": "Prevention", "requestBodyCheck": "Disabled"}, "customRules": {"rules": []}, "managedRules": {"managedRuleSets": [{"ruleSetType": "DefaultRuleSet", "ruleSetVersion": "1.0", "exclusions": [{"matchVariable": "RequestHeaderNames", "selectorMatchOperator": "Contains", "selector": "ignoreme"}], "ruleGroupOverrides": []}]}}, "sku": {"name": "Classic_AzureFrontDoor"}}' headers: Accept: - application/json Accept-Encoding: - gzip, deflate CommandName: - network front-door waf-policy managed-rules exclusion add Connection: - keep-alive Content-Length: - '467' Content-Type: - application/json; charset=utf-8 ParameterSetName: - -g --policy-name --type --match-variable --operator --value User-Agent: - python/3.7.9 (Windows-10-10.0.19041-SP0) msrest/0.6.21 msrest_azure/0.6.3 azure-mgmt-frontdoor/0.3.0 Azure-SDK-For-Python AZURECLI/2.21.0 (MSI) accept-language: - en-US method: PUT uri: https://management.azure.com/subscriptions/00000000-0000-0000-0000-000000000000/resourceGroups/clitest.rg000001/providers/Microsoft.Network/FrontDoorWebApplicationFirewallPolicies/cli000002?api-version=2020-11-01 response: body: string: '{"name":"cli000002","id":"/subscriptions/00000000-0000-0000-0000-000000000000/resourcegroups/clitest.rg000001/providers/Microsoft.Network/frontdoorwebapplicationfirewallpolicies/cli000002","type":"Microsoft.Network/frontdoorwebapplicationfirewallpolicies","location":"Global","tags":{},"sku":{"name":"Classic_AzureFrontDoor"},"properties":{"resourceState":"Enabled","provisioningState":"Succeeded","policySettings":{"enabledState":"Enabled","mode":"Prevention","redirectUrl":null,"customBlockResponseStatusCode":null,"customBlockResponseBody":null,"requestBodyCheck":"Disabled"},"customRules":{"rules":[]},"managedRules":{"managedRuleSets":[{"ruleSetType":"DefaultRuleSet","ruleSetVersion":"1.0","ruleSetAction":null,"ruleGroupOverrides":[],"exclusions":[{"matchVariable":"RequestHeaderNames","selectorMatchOperator":"Contains","selector":"ignoreme"}]}]},"frontendEndpointLinks":[],"routingRuleLinks":[],"securityPolicyLinks":[]}}' headers: cache-control: - no-cache content-length: - '1019' content-type: - application/json; odata.metadata=minimal; odata.streaming=true date: - Thu, 01 Apr 2021 16:59:09 GMT expires: - '-1' odata-version: - '4.0' pragma: - no-cache server: - Kestrel strict-transport-security: - max-age=31536000; includeSubDomains transfer-encoding: - chunked vary: - Accept-Encoding x-content-type-options: - nosniff x-ms-ratelimit-remaining-subscription-writes: - '1196' status: code: 200 message: OK - request: body: null headers: Accept: - application/json Accept-Encoding: - gzip, deflate CommandName: - network front-door waf-policy managed-rules exclusion list Connection: - keep-alive ParameterSetName: - -g --policy-name --type User-Agent: - python/3.7.9 (Windows-10-10.0.19041-SP0) msrest/0.6.21 msrest_azure/0.6.3 azure-mgmt-frontdoor/0.3.0 Azure-SDK-For-Python AZURECLI/2.21.0 (MSI) accept-language: - en-US method: GET uri: https://management.azure.com/subscriptions/00000000-0000-0000-0000-000000000000/resourceGroups/clitest.rg000001/providers/Microsoft.Network/FrontDoorWebApplicationFirewallPolicies/cli000002?api-version=2020-11-01 response: body: string: '{"name":"cli000002","id":"/subscriptions/00000000-0000-0000-0000-000000000000/resourcegroups/clitest.rg000001/providers/Microsoft.Network/frontdoorwebapplicationfirewallpolicies/cli000002","type":"Microsoft.Network/frontdoorwebapplicationfirewallpolicies","location":"Global","tags":{},"sku":{"name":"Classic_AzureFrontDoor"},"properties":{"resourceState":"Enabled","provisioningState":"Succeeded","policySettings":{"enabledState":"Enabled","mode":"Prevention","redirectUrl":null,"customBlockResponseStatusCode":null,"customBlockResponseBody":null,"requestBodyCheck":"Disabled"},"customRules":{"rules":[]},"managedRules":{"managedRuleSets":[{"ruleSetType":"DefaultRuleSet","ruleSetVersion":"1.0","ruleSetAction":null,"ruleGroupOverrides":[],"exclusions":[{"matchVariable":"RequestHeaderNames","selectorMatchOperator":"Contains","selector":"ignoreme"}]}]},"frontendEndpointLinks":[],"routingRuleLinks":[],"securityPolicyLinks":[]}}' headers: cache-control: - no-cache content-length: - '1019' content-type: - application/json; odata.metadata=minimal; odata.streaming=true date: - Thu, 01 Apr 2021 16:59:11 GMT expires: - '-1' odata-version: - '4.0' pragma: - no-cache server: - Kestrel strict-transport-security: - max-age=31536000; includeSubDomains transfer-encoding: - chunked vary: - Accept-Encoding x-content-type-options: - nosniff status: code: 200 message: OK - request: body: null headers: Accept: - application/json Accept-Encoding: - gzip, deflate CommandName: - network front-door waf-policy managed-rules exclusion list Connection: - keep-alive ParameterSetName: - -g --policy-name --type User-Agent: - python/3.7.9 (Windows-10-10.0.19041-SP0) msrest/0.6.21 msrest_azure/0.6.3 azure-mgmt-frontdoor/0.3.0 Azure-SDK-For-Python AZURECLI/2.21.0 (MSI) accept-language: - en-US method: GET uri: https://management.azure.com/subscriptions/00000000-0000-0000-0000-000000000000/resourceGroups/clitest.rg000001/providers/Microsoft.Network/FrontDoorWebApplicationFirewallPolicies/cli000002?api-version=2020-11-01 response: body: string: '{"name":"cli000002","id":"/subscriptions/00000000-0000-0000-0000-000000000000/resourcegroups/clitest.rg000001/providers/Microsoft.Network/frontdoorwebapplicationfirewallpolicies/cli000002","type":"Microsoft.Network/frontdoorwebapplicationfirewallpolicies","location":"Global","tags":{},"sku":{"name":"Classic_AzureFrontDoor"},"properties":{"resourceState":"Enabled","provisioningState":"Succeeded","policySettings":{"enabledState":"Enabled","mode":"Prevention","redirectUrl":null,"customBlockResponseStatusCode":null,"customBlockResponseBody":null,"requestBodyCheck":"Disabled"},"customRules":{"rules":[]},"managedRules":{"managedRuleSets":[{"ruleSetType":"DefaultRuleSet","ruleSetVersion":"1.0","ruleSetAction":null,"ruleGroupOverrides":[],"exclusions":[{"matchVariable":"RequestHeaderNames","selectorMatchOperator":"Contains","selector":"ignoreme"}]}]},"frontendEndpointLinks":[],"routingRuleLinks":[],"securityPolicyLinks":[]}}' headers: cache-control: - no-cache content-length: - '1019' content-type: - application/json; odata.metadata=minimal; odata.streaming=true date: - Thu, 01 Apr 2021 16:59:11 GMT expires: - '-1' odata-version: - '4.0' pragma: - no-cache server: - Kestrel strict-transport-security: - max-age=31536000; includeSubDomains transfer-encoding: - chunked vary: - Accept-Encoding x-content-type-options: - nosniff status: code: 200 message: OK - request: body: null headers: Accept: - application/json Accept-Encoding: - gzip, deflate CommandName: - network front-door waf-policy managed-rules exclusion remove Connection: - keep-alive ParameterSetName: - -g --policy-name --type --match-variable --operator --value User-Agent: - python/3.7.9 (Windows-10-10.0.19041-SP0) msrest/0.6.21 msrest_azure/0.6.3 azure-mgmt-frontdoor/0.3.0 Azure-SDK-For-Python AZURECLI/2.21.0 (MSI) accept-language: - en-US method: GET uri: https://management.azure.com/subscriptions/00000000-0000-0000-0000-000000000000/resourceGroups/clitest.rg000001/providers/Microsoft.Network/FrontDoorWebApplicationFirewallPolicies/cli000002?api-version=2020-11-01 response: body: string: '{"name":"cli000002","id":"/subscriptions/00000000-0000-0000-0000-000000000000/resourcegroups/clitest.rg000001/providers/Microsoft.Network/frontdoorwebapplicationfirewallpolicies/cli000002","type":"Microsoft.Network/frontdoorwebapplicationfirewallpolicies","location":"Global","tags":{},"sku":{"name":"Classic_AzureFrontDoor"},"properties":{"resourceState":"Enabled","provisioningState":"Succeeded","policySettings":{"enabledState":"Enabled","mode":"Prevention","redirectUrl":null,"customBlockResponseStatusCode":null,"customBlockResponseBody":null,"requestBodyCheck":"Disabled"},"customRules":{"rules":[]},"managedRules":{"managedRuleSets":[{"ruleSetType":"DefaultRuleSet","ruleSetVersion":"1.0","ruleSetAction":null,"ruleGroupOverrides":[],"exclusions":[{"matchVariable":"RequestHeaderNames","selectorMatchOperator":"Contains","selector":"ignoreme"}]}]},"frontendEndpointLinks":[],"routingRuleLinks":[],"securityPolicyLinks":[]}}' headers: cache-control: - no-cache content-length: - '1019' content-type: - application/json; odata.metadata=minimal; odata.streaming=true date: - Thu, 01 Apr 2021 16:59:12 GMT expires: - '-1' odata-version: - '4.0' pragma: - no-cache server: - Kestrel strict-transport-security: - max-age=31536000; includeSubDomains transfer-encoding: - chunked vary: - Accept-Encoding x-content-type-options: - nosniff status: code: 200 message: OK - request: body: '{"location": "Global", "tags": {}, "properties": {"policySettings": {"enabledState": "Enabled", "mode": "Prevention", "requestBodyCheck": "Disabled"}, "customRules": {"rules": []}, "managedRules": {"managedRuleSets": [{"ruleSetType": "DefaultRuleSet", "ruleSetVersion": "1.0", "exclusions": [], "ruleGroupOverrides": []}]}}, "sku": {"name": "Classic_AzureFrontDoor"}}' headers: Accept: - application/json Accept-Encoding: - gzip, deflate CommandName: - network front-door waf-policy managed-rules exclusion remove Connection: - keep-alive Content-Length: - '367' Content-Type: - application/json; charset=utf-8 ParameterSetName: - -g --policy-name --type --match-variable --operator --value User-Agent: - python/3.7.9 (Windows-10-10.0.19041-SP0) msrest/0.6.21 msrest_azure/0.6.3 azure-mgmt-frontdoor/0.3.0 Azure-SDK-For-Python AZURECLI/2.21.0 (MSI) accept-language: - en-US method: PUT uri: https://management.azure.com/subscriptions/00000000-0000-0000-0000-000000000000/resourceGroups/clitest.rg000001/providers/Microsoft.Network/FrontDoorWebApplicationFirewallPolicies/cli000002?api-version=2020-11-01 response: body: string: '{"name":"cli000002","id":"/subscriptions/00000000-0000-0000-0000-000000000000/resourcegroups/clitest.rg000001/providers/Microsoft.Network/frontdoorwebapplicationfirewallpolicies/cli000002","type":"Microsoft.Network/frontdoorwebapplicationfirewallpolicies","location":"Global","tags":{},"sku":{"name":"Classic_AzureFrontDoor"},"properties":{"resourceState":"Enabled","provisioningState":"Succeeded","policySettings":{"enabledState":"Enabled","mode":"Prevention","redirectUrl":null,"customBlockResponseStatusCode":null,"customBlockResponseBody":null,"requestBodyCheck":"Disabled"},"customRules":{"rules":[]},"managedRules":{"managedRuleSets":[{"ruleSetType":"DefaultRuleSet","ruleSetVersion":"1.0","ruleSetAction":null,"ruleGroupOverrides":[],"exclusions":[]}]},"frontendEndpointLinks":[],"routingRuleLinks":[],"securityPolicyLinks":[]}}' headers: cache-control: - no-cache content-length: - '924' content-type: - application/json; odata.metadata=minimal; odata.streaming=true date: - Thu, 01 Apr 2021 16:59:13 GMT expires: - '-1' odata-version: - '4.0' pragma: - no-cache server: - Kestrel strict-transport-security: - max-age=31536000; includeSubDomains transfer-encoding: - chunked vary: - Accept-Encoding x-content-type-options: - nosniff x-ms-ratelimit-remaining-subscription-writes: - '1194' status: code: 200 message: OK - request: body: null headers: Accept: - application/json Accept-Encoding: - gzip, deflate CommandName: - network front-door waf-policy managed-rules exclusion list Connection: - keep-alive ParameterSetName: - -g --policy-name --type User-Agent: - python/3.7.9 (Windows-10-10.0.19041-SP0) msrest/0.6.21 msrest_azure/0.6.3 azure-mgmt-frontdoor/0.3.0 Azure-SDK-For-Python AZURECLI/2.21.0 (MSI) accept-language: - en-US method: GET uri: https://management.azure.com/subscriptions/00000000-0000-0000-0000-000000000000/resourceGroups/clitest.rg000001/providers/Microsoft.Network/FrontDoorWebApplicationFirewallPolicies/cli000002?api-version=2020-11-01 response: body: string: '{"name":"cli000002","id":"/subscriptions/00000000-0000-0000-0000-000000000000/resourcegroups/clitest.rg000001/providers/Microsoft.Network/frontdoorwebapplicationfirewallpolicies/cli000002","type":"Microsoft.Network/frontdoorwebapplicationfirewallpolicies","location":"Global","tags":{},"sku":{"name":"Classic_AzureFrontDoor"},"properties":{"resourceState":"Enabled","provisioningState":"Succeeded","policySettings":{"enabledState":"Enabled","mode":"Prevention","redirectUrl":null,"customBlockResponseStatusCode":null,"customBlockResponseBody":null,"requestBodyCheck":"Disabled"},"customRules":{"rules":[]},"managedRules":{"managedRuleSets":[{"ruleSetType":"DefaultRuleSet","ruleSetVersion":"1.0","ruleSetAction":null,"ruleGroupOverrides":[],"exclusions":[]}]},"frontendEndpointLinks":[],"routingRuleLinks":[],"securityPolicyLinks":[]}}' headers: cache-control: - no-cache content-length: - '924' content-type: - application/json; odata.metadata=minimal; odata.streaming=true date: - Thu, 01 Apr 2021 16:59:13 GMT expires: - '-1' odata-version: - '4.0' pragma: - no-cache server: - Kestrel strict-transport-security: - max-age=31536000; includeSubDomains transfer-encoding: - chunked vary: - Accept-Encoding x-content-type-options: - nosniff status: code: 200 message: OK - request: body: null headers: Accept: - application/json Accept-Encoding: - gzip, deflate CommandName: - network front-door waf-policy managed-rules exclusion list Connection: - keep-alive ParameterSetName: - -g --policy-name --type User-Agent: - python/3.7.9 (Windows-10-10.0.19041-SP0) msrest/0.6.21 msrest_azure/0.6.3 azure-mgmt-frontdoor/0.3.0 Azure-SDK-For-Python AZURECLI/2.21.0 (MSI) accept-language: - en-US method: GET uri: https://management.azure.com/subscriptions/00000000-0000-0000-0000-000000000000/resourceGroups/clitest.rg000001/providers/Microsoft.Network/FrontDoorWebApplicationFirewallPolicies/cli000002?api-version=2020-11-01 response: body: string: '{"name":"cli000002","id":"/subscriptions/00000000-0000-0000-0000-000000000000/resourcegroups/clitest.rg000001/providers/Microsoft.Network/frontdoorwebapplicationfirewallpolicies/cli000002","type":"Microsoft.Network/frontdoorwebapplicationfirewallpolicies","location":"Global","tags":{},"sku":{"name":"Classic_AzureFrontDoor"},"properties":{"resourceState":"Enabled","provisioningState":"Succeeded","policySettings":{"enabledState":"Enabled","mode":"Prevention","redirectUrl":null,"customBlockResponseStatusCode":null,"customBlockResponseBody":null,"requestBodyCheck":"Disabled"},"customRules":{"rules":[]},"managedRules":{"managedRuleSets":[{"ruleSetType":"DefaultRuleSet","ruleSetVersion":"1.0","ruleSetAction":null,"ruleGroupOverrides":[],"exclusions":[]}]},"frontendEndpointLinks":[],"routingRuleLinks":[],"securityPolicyLinks":[]}}' headers: cache-control: - no-cache content-length: - '924' content-type: - application/json; odata.metadata=minimal; odata.streaming=true date: - Thu, 01 Apr 2021 16:59:14 GMT expires: - '-1' odata-version: - '4.0' pragma: - no-cache server: - Kestrel strict-transport-security: - max-age=31536000; includeSubDomains transfer-encoding: - chunked vary: - Accept-Encoding x-content-type-options: - nosniff status: code: 200 message: OK - request: body: null headers: Accept: - application/json Accept-Encoding: - gzip, deflate CommandName: - network front-door waf-policy managed-rules exclusion list Connection: - keep-alive ParameterSetName: - -g --policy-name --type --rule-group-id User-Agent: - python/3.7.9 (Windows-10-10.0.19041-SP0) msrest/0.6.21 msrest_azure/0.6.3 azure-mgmt-frontdoor/0.3.0 Azure-SDK-For-Python AZURECLI/2.21.0 (MSI) accept-language: - en-US method: GET uri: https://management.azure.com/subscriptions/00000000-0000-0000-0000-000000000000/resourceGroups/clitest.rg000001/providers/Microsoft.Network/FrontDoorWebApplicationFirewallPolicies/cli000002?api-version=2020-11-01 response: body: string: '{"name":"cli000002","id":"/subscriptions/00000000-0000-0000-0000-000000000000/resourcegroups/clitest.rg000001/providers/Microsoft.Network/frontdoorwebapplicationfirewallpolicies/cli000002","type":"Microsoft.Network/frontdoorwebapplicationfirewallpolicies","location":"Global","tags":{},"sku":{"name":"Classic_AzureFrontDoor"},"properties":{"resourceState":"Enabled","provisioningState":"Succeeded","policySettings":{"enabledState":"Enabled","mode":"Prevention","redirectUrl":null,"customBlockResponseStatusCode":null,"customBlockResponseBody":null,"requestBodyCheck":"Disabled"},"customRules":{"rules":[]},"managedRules":{"managedRuleSets":[{"ruleSetType":"DefaultRuleSet","ruleSetVersion":"1.0","ruleSetAction":null,"ruleGroupOverrides":[],"exclusions":[]}]},"frontendEndpointLinks":[],"routingRuleLinks":[],"securityPolicyLinks":[]}}' headers: cache-control: - no-cache content-length: - '924' content-type: - application/json; odata.metadata=minimal; odata.streaming=true date: - Thu, 01 Apr 2021 16:59:15 GMT expires: - '-1' odata-version: - '4.0' pragma: - no-cache server: - Kestrel strict-transport-security: - max-age=31536000; includeSubDomains transfer-encoding: - chunked vary: - Accept-Encoding x-content-type-options: - nosniff status: code: 200 message: OK - request: body: null headers: Accept: - application/json Accept-Encoding: - gzip, deflate CommandName: - network front-door waf-policy managed-rules exclusion list Connection: - keep-alive ParameterSetName: - -g --policy-name --type --rule-group-id User-Agent: - python/3.7.9 (Windows-10-10.0.19041-SP0) msrest/0.6.21 msrest_azure/0.6.3 azure-mgmt-frontdoor/0.3.0 Azure-SDK-For-Python AZURECLI/2.21.0 (MSI) accept-language: - en-US method: GET uri: https://management.azure.com/subscriptions/00000000-0000-0000-0000-000000000000/resourceGroups/clitest.rg000001/providers/Microsoft.Network/FrontDoorWebApplicationFirewallPolicies/cli000002?api-version=2020-11-01 response: body: string: '{"name":"cli000002","id":"/subscriptions/00000000-0000-0000-0000-000000000000/resourcegroups/clitest.rg000001/providers/Microsoft.Network/frontdoorwebapplicationfirewallpolicies/cli000002","type":"Microsoft.Network/frontdoorwebapplicationfirewallpolicies","location":"Global","tags":{},"sku":{"name":"Classic_AzureFrontDoor"},"properties":{"resourceState":"Enabled","provisioningState":"Succeeded","policySettings":{"enabledState":"Enabled","mode":"Prevention","redirectUrl":null,"customBlockResponseStatusCode":null,"customBlockResponseBody":null,"requestBodyCheck":"Disabled"},"customRules":{"rules":[]},"managedRules":{"managedRuleSets":[{"ruleSetType":"DefaultRuleSet","ruleSetVersion":"1.0","ruleSetAction":null,"ruleGroupOverrides":[],"exclusions":[]}]},"frontendEndpointLinks":[],"routingRuleLinks":[],"securityPolicyLinks":[]}}' headers: cache-control: - no-cache content-length: - '924' content-type: - application/json; odata.metadata=minimal; odata.streaming=true date: - Thu, 01 Apr 2021 16:59:15 GMT expires: - '-1' odata-version: - '4.0' pragma: - no-cache server: - Kestrel strict-transport-security: - max-age=31536000; includeSubDomains transfer-encoding: - chunked vary: - Accept-Encoding x-content-type-options: - nosniff status: code: 200 message: OK - request: body: null headers: Accept: - application/json Accept-Encoding: - gzip, deflate CommandName: - network front-door waf-policy managed-rules exclusion add Connection: - keep-alive ParameterSetName: - -g --policy-name --type --rule-group-id --match-variable --operator --value User-Agent: - python/3.7.9 (Windows-10-10.0.19041-SP0) msrest/0.6.21 msrest_azure/0.6.3 azure-mgmt-frontdoor/0.3.0 Azure-SDK-For-Python AZURECLI/2.21.0 (MSI) accept-language: - en-US method: GET uri: https://management.azure.com/subscriptions/00000000-0000-0000-0000-000000000000/resourceGroups/clitest.rg000001/providers/Microsoft.Network/FrontDoorWebApplicationFirewallPolicies/cli000002?api-version=2020-11-01 response: body: string: '{"name":"cli000002","id":"/subscriptions/00000000-0000-0000-0000-000000000000/resourcegroups/clitest.rg000001/providers/Microsoft.Network/frontdoorwebapplicationfirewallpolicies/cli000002","type":"Microsoft.Network/frontdoorwebapplicationfirewallpolicies","location":"Global","tags":{},"sku":{"name":"Classic_AzureFrontDoor"},"properties":{"resourceState":"Enabled","provisioningState":"Succeeded","policySettings":{"enabledState":"Enabled","mode":"Prevention","redirectUrl":null,"customBlockResponseStatusCode":null,"customBlockResponseBody":null,"requestBodyCheck":"Disabled"},"customRules":{"rules":[]},"managedRules":{"managedRuleSets":[{"ruleSetType":"DefaultRuleSet","ruleSetVersion":"1.0","ruleSetAction":null,"ruleGroupOverrides":[],"exclusions":[]}]},"frontendEndpointLinks":[],"routingRuleLinks":[],"securityPolicyLinks":[]}}' headers: cache-control: - no-cache content-length: - '924' content-type: - application/json; odata.metadata=minimal; odata.streaming=true date: - Thu, 01 Apr 2021 16:59:16 GMT expires: - '-1' odata-version: - '4.0' pragma: - no-cache server: - Kestrel strict-transport-security: - max-age=31536000; includeSubDomains transfer-encoding: - chunked vary: - Accept-Encoding x-content-type-options: - nosniff status: code: 200 message: OK - request: body: '{"location": "Global", "tags": {}, "properties": {"policySettings": {"enabledState": "Enabled", "mode": "Prevention", "requestBodyCheck": "Disabled"}, "customRules": {"rules": []}, "managedRules": {"managedRuleSets": [{"ruleSetType": "DefaultRuleSet", "ruleSetVersion": "1.0", "exclusions": [], "ruleGroupOverrides": [{"ruleGroupName": "SQLI", "exclusions": [{"matchVariable": "RequestHeaderNames", "selectorMatchOperator": "Contains", "selector": "ignoreme"}]}]}]}}, "sku": {"name": "Classic_AzureFrontDoor"}}' headers: Accept: - application/json Accept-Encoding: - gzip, deflate CommandName: - network front-door waf-policy managed-rules exclusion add Connection: - keep-alive Content-Length: - '510' Content-Type: - application/json; charset=utf-8 ParameterSetName: - -g --policy-name --type --rule-group-id --match-variable --operator --value User-Agent: - python/3.7.9 (Windows-10-10.0.19041-SP0) msrest/0.6.21 msrest_azure/0.6.3 azure-mgmt-frontdoor/0.3.0 Azure-SDK-For-Python AZURECLI/2.21.0 (MSI) accept-language: - en-US method: PUT uri: https://management.azure.com/subscriptions/00000000-0000-0000-0000-000000000000/resourceGroups/clitest.rg000001/providers/Microsoft.Network/FrontDoorWebApplicationFirewallPolicies/cli000002?api-version=2020-11-01 response: body: string: '{"name":"cli000002","id":"/subscriptions/00000000-0000-0000-0000-000000000000/resourcegroups/clitest.rg000001/providers/Microsoft.Network/frontdoorwebapplicationfirewallpolicies/cli000002","type":"Microsoft.Network/frontdoorwebapplicationfirewallpolicies","location":"Global","tags":{},"sku":{"name":"Classic_AzureFrontDoor"},"properties":{"resourceState":"Enabled","provisioningState":"Succeeded","policySettings":{"enabledState":"Enabled","mode":"Prevention","redirectUrl":null,"customBlockResponseStatusCode":null,"customBlockResponseBody":null,"requestBodyCheck":"Disabled"},"customRules":{"rules":[]},"managedRules":{"managedRuleSets":[{"ruleSetType":"DefaultRuleSet","ruleSetVersion":"1.0","ruleSetAction":null,"ruleGroupOverrides":[{"ruleGroupName":"SQLI","rules":[],"exclusions":[{"matchVariable":"RequestHeaderNames","selectorMatchOperator":"Contains","selector":"ignoreme"}]}],"exclusions":[]}]},"frontendEndpointLinks":[],"routingRuleLinks":[],"securityPolicyLinks":[]}}' headers: cache-control: - no-cache content-length: - '1070' content-type: - application/json; odata.metadata=minimal; odata.streaming=true date: - Thu, 01 Apr 2021 16:59:17 GMT expires: - '-1' odata-version: - '4.0' pragma: - no-cache server: - Kestrel strict-transport-security: - max-age=31536000; includeSubDomains transfer-encoding: - chunked vary: - Accept-Encoding x-content-type-options: - nosniff x-ms-ratelimit-remaining-subscription-writes: - '1195' status: code: 200 message: OK - request: body: null headers: Accept: - application/json Accept-Encoding: - gzip, deflate CommandName: - network front-door waf-policy managed-rules exclusion list Connection: - keep-alive ParameterSetName: - -g --policy-name --type --rule-group-id User-Agent: - python/3.7.9 (Windows-10-10.0.19041-SP0) msrest/0.6.21 msrest_azure/0.6.3 azure-mgmt-frontdoor/0.3.0 Azure-SDK-For-Python AZURECLI/2.21.0 (MSI) accept-language: - en-US method: GET uri: https://management.azure.com/subscriptions/00000000-0000-0000-0000-000000000000/resourceGroups/clitest.rg000001/providers/Microsoft.Network/FrontDoorWebApplicationFirewallPolicies/cli000002?api-version=2020-11-01 response: body: string: '{"name":"cli000002","id":"/subscriptions/00000000-0000-0000-0000-000000000000/resourcegroups/clitest.rg000001/providers/Microsoft.Network/frontdoorwebapplicationfirewallpolicies/cli000002","type":"Microsoft.Network/frontdoorwebapplicationfirewallpolicies","location":"Global","tags":{},"sku":{"name":"Classic_AzureFrontDoor"},"properties":{"resourceState":"Enabled","provisioningState":"Succeeded","policySettings":{"enabledState":"Enabled","mode":"Prevention","redirectUrl":null,"customBlockResponseStatusCode":null,"customBlockResponseBody":null,"requestBodyCheck":"Disabled"},"customRules":{"rules":[]},"managedRules":{"managedRuleSets":[{"ruleSetType":"DefaultRuleSet","ruleSetVersion":"1.0","ruleSetAction":null,"ruleGroupOverrides":[{"ruleGroupName":"SQLI","rules":[],"exclusions":[{"matchVariable":"RequestHeaderNames","selectorMatchOperator":"Contains","selector":"ignoreme"}]}],"exclusions":[]}]},"frontendEndpointLinks":[],"routingRuleLinks":[],"securityPolicyLinks":[]}}' headers: cache-control: - no-cache content-length: - '1070' content-type: - application/json; odata.metadata=minimal; odata.streaming=true date: - Thu, 01 Apr 2021 16:59:18 GMT expires: - '-1' odata-version: - '4.0' pragma: - no-cache server: - Kestrel strict-transport-security: - max-age=31536000; includeSubDomains transfer-encoding: - chunked vary: - Accept-Encoding x-content-type-options: - nosniff status: code: 200 message: OK - request: body: null headers: Accept: - application/json Accept-Encoding: - gzip, deflate CommandName: - network front-door waf-policy managed-rules exclusion list Connection: - keep-alive ParameterSetName: - -g --policy-name --type --rule-group-id User-Agent: - python/3.7.9 (Windows-10-10.0.19041-SP0) msrest/0.6.21 msrest_azure/0.6.3 azure-mgmt-frontdoor/0.3.0 Azure-SDK-For-Python AZURECLI/2.21.0 (MSI) accept-language: - en-US method: GET uri: https://management.azure.com/subscriptions/00000000-0000-0000-0000-000000000000/resourceGroups/clitest.rg000001/providers/Microsoft.Network/FrontDoorWebApplicationFirewallPolicies/cli000002?api-version=2020-11-01 response: body: string: '{"name":"cli000002","id":"/subscriptions/00000000-0000-0000-0000-000000000000/resourcegroups/clitest.rg000001/providers/Microsoft.Network/frontdoorwebapplicationfirewallpolicies/cli000002","type":"Microsoft.Network/frontdoorwebapplicationfirewallpolicies","location":"Global","tags":{},"sku":{"name":"Classic_AzureFrontDoor"},"properties":{"resourceState":"Enabled","provisioningState":"Succeeded","policySettings":{"enabledState":"Enabled","mode":"Prevention","redirectUrl":null,"customBlockResponseStatusCode":null,"customBlockResponseBody":null,"requestBodyCheck":"Disabled"},"customRules":{"rules":[]},"managedRules":{"managedRuleSets":[{"ruleSetType":"DefaultRuleSet","ruleSetVersion":"1.0","ruleSetAction":null,"ruleGroupOverrides":[{"ruleGroupName":"SQLI","rules":[],"exclusions":[{"matchVariable":"RequestHeaderNames","selectorMatchOperator":"Contains","selector":"ignoreme"}]}],"exclusions":[]}]},"frontendEndpointLinks":[],"routingRuleLinks":[],"securityPolicyLinks":[]}}' headers: cache-control: - no-cache content-length: - '1070' content-type: - application/json; odata.metadata=minimal; odata.streaming=true date: - Thu, 01 Apr 2021 16:59:20 GMT expires: - '-1' odata-version: - '4.0' pragma: - no-cache server: - Kestrel strict-transport-security: - max-age=31536000; includeSubDomains transfer-encoding: - chunked vary: - Accept-Encoding x-content-type-options: - nosniff status: code: 200 message: OK - request: body: null headers: Accept: - application/json Accept-Encoding: - gzip, deflate CommandName: - network front-door waf-policy managed-rules exclusion remove Connection: - keep-alive ParameterSetName: - -g --policy-name --type --rule-group-id --match-variable --operator --value User-Agent: - python/3.7.9 (Windows-10-10.0.19041-SP0) msrest/0.6.21 msrest_azure/0.6.3 azure-mgmt-frontdoor/0.3.0 Azure-SDK-For-Python AZURECLI/2.21.0 (MSI) accept-language: - en-US method: GET uri: https://management.azure.com/subscriptions/00000000-0000-0000-0000-000000000000/resourceGroups/clitest.rg000001/providers/Microsoft.Network/FrontDoorWebApplicationFirewallPolicies/cli000002?api-version=2020-11-01 response: body: string: '{"name":"cli000002","id":"/subscriptions/00000000-0000-0000-0000-000000000000/resourcegroups/clitest.rg000001/providers/Microsoft.Network/frontdoorwebapplicationfirewallpolicies/cli000002","type":"Microsoft.Network/frontdoorwebapplicationfirewallpolicies","location":"Global","tags":{},"sku":{"name":"Classic_AzureFrontDoor"},"properties":{"resourceState":"Enabled","provisioningState":"Succeeded","policySettings":{"enabledState":"Enabled","mode":"Prevention","redirectUrl":null,"customBlockResponseStatusCode":null,"customBlockResponseBody":null,"requestBodyCheck":"Disabled"},"customRules":{"rules":[]},"managedRules":{"managedRuleSets":[{"ruleSetType":"DefaultRuleSet","ruleSetVersion":"1.0","ruleSetAction":null,"ruleGroupOverrides":[{"ruleGroupName":"SQLI","rules":[],"exclusions":[{"matchVariable":"RequestHeaderNames","selectorMatchOperator":"Contains","selector":"ignoreme"}]}],"exclusions":[]}]},"frontendEndpointLinks":[],"routingRuleLinks":[],"securityPolicyLinks":[]}}' headers: cache-control: - no-cache content-length: - '1070' content-type: - application/json; odata.metadata=minimal; odata.streaming=true date: - Thu, 01 Apr 2021 16:59:20 GMT expires: - '-1' odata-version: - '4.0' pragma: - no-cache server: - Kestrel strict-transport-security: - max-age=31536000; includeSubDomains transfer-encoding: - chunked vary: - Accept-Encoding x-content-type-options: - nosniff status: code: 200 message: OK - request: body: '{"location": "Global", "tags": {}, "properties": {"policySettings": {"enabledState": "Enabled", "mode": "Prevention", "requestBodyCheck": "Disabled"}, "customRules": {"rules": []}, "managedRules": {"managedRuleSets": [{"ruleSetType": "DefaultRuleSet", "ruleSetVersion": "1.0", "exclusions": [], "ruleGroupOverrides": [{"ruleGroupName": "SQLI", "exclusions": [], "rules": []}]}]}}, "sku": {"name": "Classic_AzureFrontDoor"}}' headers: Accept: - application/json Accept-Encoding: - gzip, deflate CommandName: - network front-door waf-policy managed-rules exclusion remove Connection: - keep-alive Content-Length: - '423' Content-Type: - application/json; charset=utf-8 ParameterSetName: - -g --policy-name --type --rule-group-id --match-variable --operator --value User-Agent: - python/3.7.9 (Windows-10-10.0.19041-SP0) msrest/0.6.21 msrest_azure/0.6.3 azure-mgmt-frontdoor/0.3.0 Azure-SDK-For-Python AZURECLI/2.21.0 (MSI) accept-language: - en-US method: PUT uri: https://management.azure.com/subscriptions/00000000-0000-0000-0000-000000000000/resourceGroups/clitest.rg000001/providers/Microsoft.Network/FrontDoorWebApplicationFirewallPolicies/cli000002?api-version=2020-11-01 response: body: string: '{"name":"cli000002","id":"/subscriptions/00000000-0000-0000-0000-000000000000/resourcegroups/clitest.rg000001/providers/Microsoft.Network/frontdoorwebapplicationfirewallpolicies/cli000002","type":"Microsoft.Network/frontdoorwebapplicationfirewallpolicies","location":"Global","tags":{},"sku":{"name":"Classic_AzureFrontDoor"},"properties":{"resourceState":"Enabled","provisioningState":"Succeeded","policySettings":{"enabledState":"Enabled","mode":"Prevention","redirectUrl":null,"customBlockResponseStatusCode":null,"customBlockResponseBody":null,"requestBodyCheck":"Disabled"},"customRules":{"rules":[]},"managedRules":{"managedRuleSets":[{"ruleSetType":"DefaultRuleSet","ruleSetVersion":"1.0","ruleSetAction":null,"ruleGroupOverrides":[{"ruleGroupName":"SQLI","rules":[],"exclusions":[]}],"exclusions":[]}]},"frontendEndpointLinks":[],"routingRuleLinks":[],"securityPolicyLinks":[]}}' headers: cache-control: - no-cache content-length: - '975' content-type: - application/json; odata.metadata=minimal; odata.streaming=true date: - Thu, 01 Apr 2021 16:59:21 GMT expires: - '-1' odata-version: - '4.0' pragma: - no-cache server: - Kestrel strict-transport-security: - max-age=31536000; includeSubDomains transfer-encoding: - chunked vary: - Accept-Encoding x-content-type-options: - nosniff x-ms-ratelimit-remaining-subscription-writes: - '1197' status: code: 200 message: OK - request: body: null headers: Accept: - application/json Accept-Encoding: - gzip, deflate CommandName: - network front-door waf-policy managed-rules exclusion list Connection: - keep-alive ParameterSetName: - -g --policy-name --type --rule-group-id --rule-id User-Agent: - python/3.7.9 (Windows-10-10.0.19041-SP0) msrest/0.6.21 msrest_azure/0.6.3 azure-mgmt-frontdoor/0.3.0 Azure-SDK-For-Python AZURECLI/2.21.0 (MSI) accept-language: - en-US method: GET uri: https://management.azure.com/subscriptions/00000000-0000-0000-0000-000000000000/resourceGroups/clitest.rg000001/providers/Microsoft.Network/FrontDoorWebApplicationFirewallPolicies/cli000002?api-version=2020-11-01 response: body: string: '{"name":"cli000002","id":"/subscriptions/00000000-0000-0000-0000-000000000000/resourcegroups/clitest.rg000001/providers/Microsoft.Network/frontdoorwebapplicationfirewallpolicies/cli000002","type":"Microsoft.Network/frontdoorwebapplicationfirewallpolicies","location":"Global","tags":{},"sku":{"name":"Classic_AzureFrontDoor"},"properties":{"resourceState":"Enabled","provisioningState":"Succeeded","policySettings":{"enabledState":"Enabled","mode":"Prevention","redirectUrl":null,"customBlockResponseStatusCode":null,"customBlockResponseBody":null,"requestBodyCheck":"Disabled"},"customRules":{"rules":[]},"managedRules":{"managedRuleSets":[{"ruleSetType":"DefaultRuleSet","ruleSetVersion":"1.0","ruleSetAction":null,"ruleGroupOverrides":[{"ruleGroupName":"SQLI","rules":[],"exclusions":[]}],"exclusions":[]}]},"frontendEndpointLinks":[],"routingRuleLinks":[],"securityPolicyLinks":[]}}' headers: cache-control: - no-cache content-length: - '975' content-type: - application/json; odata.metadata=minimal; odata.streaming=true date: - Thu, 01 Apr 2021 16:59:22 GMT expires: - '-1' odata-version: - '4.0' pragma: - no-cache server: - Kestrel strict-transport-security: - max-age=31536000; includeSubDomains transfer-encoding: - chunked vary: - Accept-Encoding x-content-type-options: - nosniff status: code: 200 message: OK - request: body: null headers: Accept: - application/json Accept-Encoding: - gzip, deflate CommandName: - network front-door waf-policy managed-rules exclusion list Connection: - keep-alive ParameterSetName: - -g --policy-name --type --rule-group-id --rule-id User-Agent: - python/3.7.9 (Windows-10-10.0.19041-SP0) msrest/0.6.21 msrest_azure/0.6.3 azure-mgmt-frontdoor/0.3.0 Azure-SDK-For-Python AZURECLI/2.21.0 (MSI) accept-language: - en-US method: GET uri: https://management.azure.com/subscriptions/00000000-0000-0000-0000-000000000000/resourceGroups/clitest.rg000001/providers/Microsoft.Network/FrontDoorWebApplicationFirewallPolicies/cli000002?api-version=2020-11-01 response: body: string: '{"name":"cli000002","id":"/subscriptions/00000000-0000-0000-0000-000000000000/resourcegroups/clitest.rg000001/providers/Microsoft.Network/frontdoorwebapplicationfirewallpolicies/cli000002","type":"Microsoft.Network/frontdoorwebapplicationfirewallpolicies","location":"Global","tags":{},"sku":{"name":"Classic_AzureFrontDoor"},"properties":{"resourceState":"Enabled","provisioningState":"Succeeded","policySettings":{"enabledState":"Enabled","mode":"Prevention","redirectUrl":null,"customBlockResponseStatusCode":null,"customBlockResponseBody":null,"requestBodyCheck":"Disabled"},"customRules":{"rules":[]},"managedRules":{"managedRuleSets":[{"ruleSetType":"DefaultRuleSet","ruleSetVersion":"1.0","ruleSetAction":null,"ruleGroupOverrides":[{"ruleGroupName":"SQLI","rules":[],"exclusions":[]}],"exclusions":[]}]},"frontendEndpointLinks":[],"routingRuleLinks":[],"securityPolicyLinks":[]}}' headers: cache-control: - no-cache content-length: - '975' content-type: - application/json; odata.metadata=minimal; odata.streaming=true date: - Thu, 01 Apr 2021 16:59:22 GMT expires: - '-1' odata-version: - '4.0' pragma: - no-cache server: - Kestrel strict-transport-security: - max-age=31536000; includeSubDomains transfer-encoding: - chunked vary: - Accept-Encoding x-content-type-options: - nosniff status: code: 200 message: OK - request: body: null headers: Accept: - application/json Accept-Encoding: - gzip, deflate CommandName: - network front-door waf-policy managed-rules exclusion add Connection: - keep-alive ParameterSetName: - -g --policy-name --type --rule-group-id --rule-id --match-variable --operator --value User-Agent: - python/3.7.9 (Windows-10-10.0.19041-SP0) msrest/0.6.21 msrest_azure/0.6.3 azure-mgmt-frontdoor/0.3.0 Azure-SDK-For-Python AZURECLI/2.21.0 (MSI) accept-language: - en-US method: GET uri: https://management.azure.com/subscriptions/00000000-0000-0000-0000-000000000000/resourceGroups/clitest.rg000001/providers/Microsoft.Network/FrontDoorWebApplicationFirewallPolicies/cli000002?api-version=2020-11-01 response: body: string: '{"name":"cli000002","id":"/subscriptions/00000000-0000-0000-0000-000000000000/resourcegroups/clitest.rg000001/providers/Microsoft.Network/frontdoorwebapplicationfirewallpolicies/cli000002","type":"Microsoft.Network/frontdoorwebapplicationfirewallpolicies","location":"Global","tags":{},"sku":{"name":"Classic_AzureFrontDoor"},"properties":{"resourceState":"Enabled","provisioningState":"Succeeded","policySettings":{"enabledState":"Enabled","mode":"Prevention","redirectUrl":null,"customBlockResponseStatusCode":null,"customBlockResponseBody":null,"requestBodyCheck":"Disabled"},"customRules":{"rules":[]},"managedRules":{"managedRuleSets":[{"ruleSetType":"DefaultRuleSet","ruleSetVersion":"1.0","ruleSetAction":null,"ruleGroupOverrides":[{"ruleGroupName":"SQLI","rules":[],"exclusions":[]}],"exclusions":[]}]},"frontendEndpointLinks":[],"routingRuleLinks":[],"securityPolicyLinks":[]}}' headers: cache-control: - no-cache content-length: - '975' content-type: - application/json; odata.metadata=minimal; odata.streaming=true date: - Thu, 01 Apr 2021 16:59:23 GMT expires: - '-1' odata-version: - '4.0' pragma: - no-cache server: - Kestrel strict-transport-security: - max-age=31536000; includeSubDomains transfer-encoding: - chunked vary: - Accept-Encoding x-content-type-options: - nosniff status: code: 200 message: OK - request: body: '{"location": "Global", "tags": {}, "properties": {"policySettings": {"enabledState": "Enabled", "mode": "Prevention", "requestBodyCheck": "Disabled"}, "customRules": {"rules": []}, "managedRules": {"managedRuleSets": [{"ruleSetType": "DefaultRuleSet", "ruleSetVersion": "1.0", "exclusions": [], "ruleGroupOverrides": [{"ruleGroupName": "SQLI", "exclusions": [], "rules": [{"ruleId": "942100", "exclusions": [{"matchVariable": "RequestHeaderNames", "selectorMatchOperator": "Contains", "selector": "ignoreme"}]}]}]}]}}, "sku": {"name": "Classic_AzureFrontDoor"}}' headers: Accept: - application/json Accept-Encoding: - gzip, deflate CommandName: - network front-door waf-policy managed-rules exclusion add Connection: - keep-alive Content-Length: - '561' Content-Type: - application/json; charset=utf-8 ParameterSetName: - -g --policy-name --type --rule-group-id --rule-id --match-variable --operator --value User-Agent: - python/3.7.9 (Windows-10-10.0.19041-SP0) msrest/0.6.21 msrest_azure/0.6.3 azure-mgmt-frontdoor/0.3.0 Azure-SDK-For-Python AZURECLI/2.21.0 (MSI) accept-language: - en-US method: PUT uri: https://management.azure.com/subscriptions/00000000-0000-0000-0000-000000000000/resourceGroups/clitest.rg000001/providers/Microsoft.Network/FrontDoorWebApplicationFirewallPolicies/cli000002?api-version=2020-11-01 response: body: string: '{"name":"cli000002","id":"/subscriptions/00000000-0000-0000-0000-000000000000/resourcegroups/clitest.rg000001/providers/Microsoft.Network/frontdoorwebapplicationfirewallpolicies/cli000002","type":"Microsoft.Network/frontdoorwebapplicationfirewallpolicies","location":"Global","tags":{},"sku":{"name":"Classic_AzureFrontDoor"},"properties":{"resourceState":"Enabled","provisioningState":"Succeeded","policySettings":{"enabledState":"Enabled","mode":"Prevention","redirectUrl":null,"customBlockResponseStatusCode":null,"customBlockResponseBody":null,"requestBodyCheck":"Disabled"},"customRules":{"rules":[]},"managedRules":{"managedRuleSets":[{"ruleSetType":"DefaultRuleSet","ruleSetVersion":"1.0","ruleSetAction":null,"ruleGroupOverrides":[{"ruleGroupName":"SQLI","rules":[{"ruleId":"942100","enabledState":"Enabled","action":"Block","exclusions":[{"matchVariable":"RequestHeaderNames","selectorMatchOperator":"Contains","selector":"ignoreme"}]}],"exclusions":[]}],"exclusions":[]}]},"frontendEndpointLinks":[],"routingRuleLinks":[],"securityPolicyLinks":[]}}' headers: cache-control: - no-cache content-length: - '1147' content-type: - application/json; odata.metadata=minimal; odata.streaming=true date: - Thu, 01 Apr 2021 16:59:24 GMT expires: - '-1' odata-version: - '4.0' pragma: - no-cache server: - Kestrel strict-transport-security: - max-age=31536000; includeSubDomains transfer-encoding: - chunked vary: - Accept-Encoding x-content-type-options: - nosniff x-ms-ratelimit-remaining-subscription-writes: - '1196' status: code: 200 message: OK - request: body: null headers: Accept: - application/json Accept-Encoding: - gzip, deflate CommandName: - network front-door waf-policy managed-rules exclusion list Connection: - keep-alive ParameterSetName: - -g --policy-name --type --rule-group-id --rule-id User-Agent: - python/3.7.9 (Windows-10-10.0.19041-SP0) msrest/0.6.21 msrest_azure/0.6.3 azure-mgmt-frontdoor/0.3.0 Azure-SDK-For-Python AZURECLI/2.21.0 (MSI) accept-language: - en-US method: GET uri: https://management.azure.com/subscriptions/00000000-0000-0000-0000-000000000000/resourceGroups/clitest.rg000001/providers/Microsoft.Network/FrontDoorWebApplicationFirewallPolicies/cli000002?api-version=2020-11-01 response: body: string: '{"name":"cli000002","id":"/subscriptions/00000000-0000-0000-0000-000000000000/resourcegroups/clitest.rg000001/providers/Microsoft.Network/frontdoorwebapplicationfirewallpolicies/cli000002","type":"Microsoft.Network/frontdoorwebapplicationfirewallpolicies","location":"Global","tags":{},"sku":{"name":"Classic_AzureFrontDoor"},"properties":{"resourceState":"Enabled","provisioningState":"Succeeded","policySettings":{"enabledState":"Enabled","mode":"Prevention","redirectUrl":null,"customBlockResponseStatusCode":null,"customBlockResponseBody":null,"requestBodyCheck":"Disabled"},"customRules":{"rules":[]},"managedRules":{"managedRuleSets":[{"ruleSetType":"DefaultRuleSet","ruleSetVersion":"1.0","ruleSetAction":null,"ruleGroupOverrides":[{"ruleGroupName":"SQLI","rules":[{"ruleId":"942100","enabledState":"Enabled","action":"Block","exclusions":[{"matchVariable":"RequestHeaderNames","selectorMatchOperator":"Contains","selector":"ignoreme"}]}],"exclusions":[]}],"exclusions":[]}]},"frontendEndpointLinks":[],"routingRuleLinks":[],"securityPolicyLinks":[]}}' headers: cache-control: - no-cache content-length: - '1147' content-type: - application/json; odata.metadata=minimal; odata.streaming=true date: - Thu, 01 Apr 2021 16:59:26 GMT expires: - '-1' odata-version: - '4.0' pragma: - no-cache server: - Kestrel strict-transport-security: - max-age=31536000; includeSubDomains transfer-encoding: - chunked vary: - Accept-Encoding x-content-type-options: - nosniff status: code: 200 message: OK - request: body: null headers: Accept: - application/json Accept-Encoding: - gzip, deflate CommandName: - network front-door waf-policy managed-rules exclusion list Connection: - keep-alive ParameterSetName: - -g --policy-name --type --rule-group-id --rule-id User-Agent: - python/3.7.9 (Windows-10-10.0.19041-SP0) msrest/0.6.21 msrest_azure/0.6.3 azure-mgmt-frontdoor/0.3.0 Azure-SDK-For-Python AZURECLI/2.21.0 (MSI) accept-language: - en-US method: GET uri: https://management.azure.com/subscriptions/00000000-0000-0000-0000-000000000000/resourceGroups/clitest.rg000001/providers/Microsoft.Network/FrontDoorWebApplicationFirewallPolicies/cli000002?api-version=2020-11-01 response: body: string: '{"name":"cli000002","id":"/subscriptions/00000000-0000-0000-0000-000000000000/resourcegroups/clitest.rg000001/providers/Microsoft.Network/frontdoorwebapplicationfirewallpolicies/cli000002","type":"Microsoft.Network/frontdoorwebapplicationfirewallpolicies","location":"Global","tags":{},"sku":{"name":"Classic_AzureFrontDoor"},"properties":{"resourceState":"Enabled","provisioningState":"Succeeded","policySettings":{"enabledState":"Enabled","mode":"Prevention","redirectUrl":null,"customBlockResponseStatusCode":null,"customBlockResponseBody":null,"requestBodyCheck":"Disabled"},"customRules":{"rules":[]},"managedRules":{"managedRuleSets":[{"ruleSetType":"DefaultRuleSet","ruleSetVersion":"1.0","ruleSetAction":null,"ruleGroupOverrides":[{"ruleGroupName":"SQLI","rules":[{"ruleId":"942100","enabledState":"Enabled","action":"Block","exclusions":[{"matchVariable":"RequestHeaderNames","selectorMatchOperator":"Contains","selector":"ignoreme"}]}],"exclusions":[]}],"exclusions":[]}]},"frontendEndpointLinks":[],"routingRuleLinks":[],"securityPolicyLinks":[]}}' headers: cache-control: - no-cache content-length: - '1147' content-type: - application/json; odata.metadata=minimal; odata.streaming=true date: - Thu, 01 Apr 2021 16:59:26 GMT expires: - '-1' odata-version: - '4.0' pragma: - no-cache server: - Kestrel strict-transport-security: - max-age=31536000; includeSubDomains transfer-encoding: - chunked vary: - Accept-Encoding x-content-type-options: - nosniff status: code: 200 message: OK - request: body: null headers: Accept: - application/json Accept-Encoding: - gzip, deflate CommandName: - network front-door waf-policy managed-rules exclusion remove Connection: - keep-alive ParameterSetName: - -g --policy-name --type --rule-group-id --rule-id --match-variable --operator --value User-Agent: - python/3.7.9 (Windows-10-10.0.19041-SP0) msrest/0.6.21 msrest_azure/0.6.3 azure-mgmt-frontdoor/0.3.0 Azure-SDK-For-Python AZURECLI/2.21.0 (MSI) accept-language: - en-US method: GET uri: https://management.azure.com/subscriptions/00000000-0000-0000-0000-000000000000/resourceGroups/clitest.rg000001/providers/Microsoft.Network/FrontDoorWebApplicationFirewallPolicies/cli000002?api-version=2020-11-01 response: body: string: '{"name":"cli000002","id":"/subscriptions/00000000-0000-0000-0000-000000000000/resourcegroups/clitest.rg000001/providers/Microsoft.Network/frontdoorwebapplicationfirewallpolicies/cli000002","type":"Microsoft.Network/frontdoorwebapplicationfirewallpolicies","location":"Global","tags":{},"sku":{"name":"Classic_AzureFrontDoor"},"properties":{"resourceState":"Enabled","provisioningState":"Succeeded","policySettings":{"enabledState":"Enabled","mode":"Prevention","redirectUrl":null,"customBlockResponseStatusCode":null,"customBlockResponseBody":null,"requestBodyCheck":"Disabled"},"customRules":{"rules":[]},"managedRules":{"managedRuleSets":[{"ruleSetType":"DefaultRuleSet","ruleSetVersion":"1.0","ruleSetAction":null,"ruleGroupOverrides":[{"ruleGroupName":"SQLI","rules":[{"ruleId":"942100","enabledState":"Enabled","action":"Block","exclusions":[{"matchVariable":"RequestHeaderNames","selectorMatchOperator":"Contains","selector":"ignoreme"}]}],"exclusions":[]}],"exclusions":[]}]},"frontendEndpointLinks":[],"routingRuleLinks":[],"securityPolicyLinks":[]}}' headers: cache-control: - no-cache content-length: - '1147' content-type: - application/json; odata.metadata=minimal; odata.streaming=true date: - Thu, 01 Apr 2021 16:59:26 GMT expires: - '-1' odata-version: - '4.0' pragma: - no-cache server: - Kestrel strict-transport-security: - max-age=31536000; includeSubDomains transfer-encoding: - chunked vary: - Accept-Encoding x-content-type-options: - nosniff status: code: 200 message: OK - request: body: '{"location": "Global", "tags": {}, "properties": {"policySettings": {"enabledState": "Enabled", "mode": "Prevention", "requestBodyCheck": "Disabled"}, "customRules": {"rules": []}, "managedRules": {"managedRuleSets": [{"ruleSetType": "DefaultRuleSet", "ruleSetVersion": "1.0", "exclusions": [], "ruleGroupOverrides": [{"ruleGroupName": "SQLI", "exclusions": [], "rules": [{"ruleId": "942100", "enabledState": "Enabled", "action": "Block", "exclusions": []}]}]}]}}, "sku": {"name": "Classic_AzureFrontDoor"}}' headers: Accept: - application/json Accept-Encoding: - gzip, deflate CommandName: - network front-door waf-policy managed-rules exclusion remove Connection: - keep-alive Content-Length: - '507' Content-Type: - application/json; charset=utf-8 ParameterSetName: - -g --policy-name --type --rule-group-id --rule-id --match-variable --operator --value User-Agent: - python/3.7.9 (Windows-10-10.0.19041-SP0) msrest/0.6.21 msrest_azure/0.6.3 azure-mgmt-frontdoor/0.3.0 Azure-SDK-For-Python AZURECLI/2.21.0 (MSI) accept-language: - en-US method: PUT uri: https://management.azure.com/subscriptions/00000000-0000-0000-0000-000000000000/resourceGroups/clitest.rg000001/providers/Microsoft.Network/FrontDoorWebApplicationFirewallPolicies/cli000002?api-version=2020-11-01 response: body: string: '{"name":"cli000002","id":"/subscriptions/00000000-0000-0000-0000-000000000000/resourcegroups/clitest.rg000001/providers/Microsoft.Network/frontdoorwebapplicationfirewallpolicies/cli000002","type":"Microsoft.Network/frontdoorwebapplicationfirewallpolicies","location":"Global","tags":{},"sku":{"name":"Classic_AzureFrontDoor"},"properties":{"resourceState":"Enabled","provisioningState":"Succeeded","policySettings":{"enabledState":"Enabled","mode":"Prevention","redirectUrl":null,"customBlockResponseStatusCode":null,"customBlockResponseBody":null,"requestBodyCheck":"Disabled"},"customRules":{"rules":[]},"managedRules":{"managedRuleSets":[{"ruleSetType":"DefaultRuleSet","ruleSetVersion":"1.0","ruleSetAction":null,"ruleGroupOverrides":[{"ruleGroupName":"SQLI","rules":[{"ruleId":"942100","enabledState":"Enabled","action":"Block","exclusions":[]}],"exclusions":[]}],"exclusions":[]}]},"frontendEndpointLinks":[],"routingRuleLinks":[],"securityPolicyLinks":[]}}' headers: cache-control: - no-cache content-length: - '1052' content-type: - application/json; odata.metadata=minimal; odata.streaming=true date: - Thu, 01 Apr 2021 16:59:27 GMT expires: - '-1' odata-version: - '4.0' pragma: - no-cache server: - Kestrel strict-transport-security: - max-age=31536000; includeSubDomains transfer-encoding: - chunked vary: - Accept-Encoding x-content-type-options: - nosniff x-ms-ratelimit-remaining-subscription-writes: - '1196' status: code: 200 message: OK - request: body: null headers: Accept: - application/json Accept-Encoding: - gzip, deflate CommandName: - network front-door waf-policy managed-rules exclusion list Connection: - keep-alive ParameterSetName: - -g --policy-name --type --rule-group-id --rule-id User-Agent: - python/3.7.9 (Windows-10-10.0.19041-SP0) msrest/0.6.21 msrest_azure/0.6.3 azure-mgmt-frontdoor/0.3.0 Azure-SDK-For-Python AZURECLI/2.21.0 (MSI) accept-language: - en-US method: GET uri: https://management.azure.com/subscriptions/00000000-0000-0000-0000-000000000000/resourceGroups/clitest.rg000001/providers/Microsoft.Network/FrontDoorWebApplicationFirewallPolicies/cli000002?api-version=2020-11-01 response: body: string: '{"name":"cli000002","id":"/subscriptions/00000000-0000-0000-0000-000000000000/resourcegroups/clitest.rg000001/providers/Microsoft.Network/frontdoorwebapplicationfirewallpolicies/cli000002","type":"Microsoft.Network/frontdoorwebapplicationfirewallpolicies","location":"Global","tags":{},"sku":{"name":"Classic_AzureFrontDoor"},"properties":{"resourceState":"Enabled","provisioningState":"Succeeded","policySettings":{"enabledState":"Enabled","mode":"Prevention","redirectUrl":null,"customBlockResponseStatusCode":null,"customBlockResponseBody":null,"requestBodyCheck":"Disabled"},"customRules":{"rules":[]},"managedRules":{"managedRuleSets":[{"ruleSetType":"DefaultRuleSet","ruleSetVersion":"1.0","ruleSetAction":null,"ruleGroupOverrides":[{"ruleGroupName":"SQLI","rules":[{"ruleId":"942100","enabledState":"Enabled","action":"Block","exclusions":[]}],"exclusions":[]}],"exclusions":[]}]},"frontendEndpointLinks":[],"routingRuleLinks":[],"securityPolicyLinks":[]}}' headers: cache-control: - no-cache content-length: - '1052' content-type: - application/json; odata.metadata=minimal; odata.streaming=true date: - Thu, 01 Apr 2021 16:59:28 GMT expires: - '-1' odata-version: - '4.0' pragma: - no-cache server: - Kestrel strict-transport-security: - max-age=31536000; includeSubDomains transfer-encoding: - chunked vary: - Accept-Encoding x-content-type-options: - nosniff status: code: 200 message: OK - request: body: null headers: Accept: - application/json Accept-Encoding: - gzip, deflate CommandName: - network front-door waf-policy managed-rules exclusion list Connection: - keep-alive ParameterSetName: - -g --policy-name --type --rule-group-id --rule-id User-Agent: - python/3.7.9 (Windows-10-10.0.19041-SP0) msrest/0.6.21 msrest_azure/0.6.3 azure-mgmt-frontdoor/0.3.0 Azure-SDK-For-Python AZURECLI/2.21.0 (MSI) accept-language: - en-US method: GET uri: https://management.azure.com/subscriptions/00000000-0000-0000-0000-000000000000/resourceGroups/clitest.rg000001/providers/Microsoft.Network/FrontDoorWebApplicationFirewallPolicies/cli000002?api-version=2020-11-01 response: body: string: '{"name":"cli000002","id":"/subscriptions/00000000-0000-0000-0000-000000000000/resourcegroups/clitest.rg000001/providers/Microsoft.Network/frontdoorwebapplicationfirewallpolicies/cli000002","type":"Microsoft.Network/frontdoorwebapplicationfirewallpolicies","location":"Global","tags":{},"sku":{"name":"Classic_AzureFrontDoor"},"properties":{"resourceState":"Enabled","provisioningState":"Succeeded","policySettings":{"enabledState":"Enabled","mode":"Prevention","redirectUrl":null,"customBlockResponseStatusCode":null,"customBlockResponseBody":null,"requestBodyCheck":"Disabled"},"customRules":{"rules":[]},"managedRules":{"managedRuleSets":[{"ruleSetType":"DefaultRuleSet","ruleSetVersion":"1.0","ruleSetAction":null,"ruleGroupOverrides":[{"ruleGroupName":"SQLI","rules":[{"ruleId":"942100","enabledState":"Enabled","action":"Block","exclusions":[]}],"exclusions":[]}],"exclusions":[]}]},"frontendEndpointLinks":[],"routingRuleLinks":[],"securityPolicyLinks":[]}}' headers: cache-control: - no-cache content-length: - '1052' content-type: - application/json; odata.metadata=minimal; odata.streaming=true date: - Thu, 01 Apr 2021 16:59:30 GMT expires: - '-1' odata-version: - '4.0' pragma: - no-cache server: - Kestrel strict-transport-security: - max-age=31536000; includeSubDomains transfer-encoding: - chunked vary: - Accept-Encoding x-content-type-options: - nosniff status: code: 200 message: OK version: 1
46.152461
1,074
0.673872
aaaaca4bb843b7dd4995a16474c2036fb1a3fbb9
62,105
yaml
YAML
src/front-door/azext_front_door/tests/latest/recordings/test_waf_policy_basic.yaml
00Kai0/azure-cli-extensions
4bcafd5c9bb4d4f2eca0b8b512d9d79fe9061b8e
[ "MIT" ]
null
null
null
src/front-door/azext_front_door/tests/latest/recordings/test_waf_policy_basic.yaml
00Kai0/azure-cli-extensions
4bcafd5c9bb4d4f2eca0b8b512d9d79fe9061b8e
[ "MIT" ]
null
null
null
src/front-door/azext_front_door/tests/latest/recordings/test_waf_policy_basic.yaml
00Kai0/azure-cli-extensions
4bcafd5c9bb4d4f2eca0b8b512d9d79fe9061b8e
[ "MIT" ]
null
null
null
interactions: - request: body: '{"location": "global", "properties": {"policySettings": {"enabledState": "Enabled", "mode": "Prevention"}, "customRules": {"rules": []}, "managedRules": {}}, "sku": {"name": "Classic_AzureFrontDoor"}}' headers: Accept: - application/json Accept-Encoding: - gzip, deflate CommandName: - network front-door waf-policy create Connection: - keep-alive Content-Length: - '200' Content-Type: - application/json; charset=utf-8 ParameterSetName: - -g -n --mode User-Agent: - python/3.7.9 (Windows-10-10.0.19041-SP0) msrest/0.6.21 msrest_azure/0.6.3 azure-mgmt-frontdoor/0.3.0 Azure-SDK-For-Python AZURECLI/2.21.0 (MSI) accept-language: - en-US method: PUT uri: https://management.azure.com/subscriptions/00000000-0000-0000-0000-000000000000/resourceGroups/clitest.rg000001/providers/Microsoft.Network/FrontDoorWebApplicationFirewallPolicies/cli000002?api-version=2020-11-01 response: body: string: '{"name":"cli000002","id":"/subscriptions/00000000-0000-0000-0000-000000000000/resourcegroups/clitest.rg000001/providers/Microsoft.Network/frontdoorwebapplicationfirewallpolicies/cli000002","type":"Microsoft.Network/frontdoorwebapplicationfirewallpolicies","location":"Global","tags":{},"sku":{"name":"Classic_AzureFrontDoor"},"properties":{"resourceState":"Enabled","provisioningState":"Succeeded","policySettings":{"enabledState":"Enabled","mode":"Prevention","redirectUrl":null,"customBlockResponseStatusCode":null,"customBlockResponseBody":null,"requestBodyCheck":"Disabled"},"customRules":{"rules":[]},"managedRules":{"managedRuleSets":[]},"frontendEndpointLinks":[],"routingRuleLinks":[],"securityPolicyLinks":[]}}' headers: cache-control: - no-cache content-length: - '808' content-type: - application/json; odata.metadata=minimal; odata.streaming=true date: - Thu, 01 Apr 2021 16:59:02 GMT expires: - '-1' odata-version: - '4.0' pragma: - no-cache server: - Kestrel strict-transport-security: - max-age=31536000; includeSubDomains x-content-type-options: - nosniff x-ms-ratelimit-remaining-subscription-writes: - '1194' status: code: 201 message: Created - request: body: '{"location": "global", "properties": {"policySettings": {"enabledState": "Enabled", "mode": "Prevention"}, "customRules": {"rules": []}, "managedRules": {}}, "sku": {"name": "Standard_AzureFrontDoor"}}' headers: Accept: - application/json Accept-Encoding: - gzip, deflate CommandName: - network front-door waf-policy create Connection: - keep-alive Content-Length: - '201' Content-Type: - application/json; charset=utf-8 ParameterSetName: - -g -n --mode --sku User-Agent: - python/3.7.9 (Windows-10-10.0.19041-SP0) msrest/0.6.21 msrest_azure/0.6.3 azure-mgmt-frontdoor/0.3.0 Azure-SDK-For-Python AZURECLI/2.21.0 (MSI) accept-language: - en-US method: PUT uri: https://management.azure.com/subscriptions/00000000-0000-0000-0000-000000000000/resourceGroups/clitest.rg000001/providers/Microsoft.Network/FrontDoorWebApplicationFirewallPolicies/cli000004?api-version=2020-11-01 response: body: string: '{"name":"cli000004","id":"/subscriptions/00000000-0000-0000-0000-000000000000/resourcegroups/clitest.rg000001/providers/Microsoft.Network/frontdoorwebapplicationfirewallpolicies/cli000004","type":"Microsoft.Network/frontdoorwebapplicationfirewallpolicies","location":"Global","tags":{},"sku":{"name":"Standard_AzureFrontDoor"},"properties":{"resourceState":"Enabled","provisioningState":"Succeeded","policySettings":{"enabledState":"Enabled","mode":"Prevention","redirectUrl":null,"customBlockResponseStatusCode":null,"customBlockResponseBody":null,"requestBodyCheck":"Disabled"},"customRules":{"rules":[]},"managedRules":{"managedRuleSets":[]},"frontendEndpointLinks":[],"routingRuleLinks":[],"securityPolicyLinks":[]}}' headers: cache-control: - no-cache content-length: - '809' content-type: - application/json; odata.metadata=minimal; odata.streaming=true date: - Thu, 01 Apr 2021 16:59:09 GMT expires: - '-1' odata-version: - '4.0' pragma: - no-cache server: - Kestrel strict-transport-security: - max-age=31536000; includeSubDomains x-content-type-options: - nosniff x-ms-ratelimit-remaining-subscription-writes: - '1197' status: code: 201 message: Created - request: body: '{"location": "global", "properties": {"policySettings": {"enabledState": "Enabled", "mode": "Detection", "redirectUrl": "http://www.microsoft.com"}, "customRules": {"rules": []}, "managedRules": {}}, "sku": {"name": "Premium_AzureFrontDoor"}}' headers: Accept: - application/json Accept-Encoding: - gzip, deflate CommandName: - network front-door waf-policy create Connection: - keep-alive Content-Length: - '242' Content-Type: - application/json; charset=utf-8 ParameterSetName: - -g -n --mode --redirect-url --sku User-Agent: - python/3.7.9 (Windows-10-10.0.19041-SP0) msrest/0.6.21 msrest_azure/0.6.3 azure-mgmt-frontdoor/0.3.0 Azure-SDK-For-Python AZURECLI/2.21.0 (MSI) accept-language: - en-US method: PUT uri: https://management.azure.com/subscriptions/00000000-0000-0000-0000-000000000000/resourceGroups/clitest.rg000001/providers/Microsoft.Network/FrontDoorWebApplicationFirewallPolicies/cli000005?api-version=2020-11-01 response: body: string: '{"name":"cli000005","id":"/subscriptions/00000000-0000-0000-0000-000000000000/resourcegroups/clitest.rg000001/providers/Microsoft.Network/frontdoorwebapplicationfirewallpolicies/cli000005","type":"Microsoft.Network/frontdoorwebapplicationfirewallpolicies","location":"Global","tags":{},"sku":{"name":"Premium_AzureFrontDoor"},"properties":{"resourceState":"Enabled","provisioningState":"Succeeded","policySettings":{"enabledState":"Enabled","mode":"Detection","redirectUrl":"http://www.microsoft.com","customBlockResponseStatusCode":null,"customBlockResponseBody":null,"requestBodyCheck":"Disabled"},"customRules":{"rules":[]},"managedRules":{"managedRuleSets":[]},"frontendEndpointLinks":[],"routingRuleLinks":[],"securityPolicyLinks":[]}}' headers: cache-control: - no-cache content-length: - '829' content-type: - application/json; odata.metadata=minimal; odata.streaming=true date: - Thu, 01 Apr 2021 16:59:16 GMT expires: - '-1' odata-version: - '4.0' pragma: - no-cache server: - Kestrel strict-transport-security: - max-age=31536000; includeSubDomains x-content-type-options: - nosniff x-ms-ratelimit-remaining-subscription-writes: - '1196' status: code: 201 message: Created - request: body: '{"location": "global", "properties": {"policySettings": {"enabledState": "Enabled", "mode": "Detection", "redirectUrl": "http://www.microsoft.com", "customBlockResponseStatusCode": 406}, "customRules": {"rules": []}, "managedRules": {}}, "sku": {"name": "Classic_AzureFrontDoor"}}' headers: Accept: - application/json Accept-Encoding: - gzip, deflate CommandName: - network front-door waf-policy create Connection: - keep-alive Content-Length: - '280' Content-Type: - application/json; charset=utf-8 ParameterSetName: - -g -n --mode --redirect-url --custom-block-response-status-code --sku User-Agent: - python/3.7.9 (Windows-10-10.0.19041-SP0) msrest/0.6.21 msrest_azure/0.6.3 azure-mgmt-frontdoor/0.3.0 Azure-SDK-For-Python AZURECLI/2.21.0 (MSI) accept-language: - en-US method: PUT uri: https://management.azure.com/subscriptions/00000000-0000-0000-0000-000000000000/resourceGroups/clitest.rg000001/providers/Microsoft.Network/FrontDoorWebApplicationFirewallPolicies/cli000006?api-version=2020-11-01 response: body: string: '{"name":"cli000006","id":"/subscriptions/00000000-0000-0000-0000-000000000000/resourcegroups/clitest.rg000001/providers/Microsoft.Network/frontdoorwebapplicationfirewallpolicies/cli000006","type":"Microsoft.Network/frontdoorwebapplicationfirewallpolicies","location":"Global","tags":{},"sku":{"name":"Classic_AzureFrontDoor"},"properties":{"resourceState":"Enabled","provisioningState":"Succeeded","policySettings":{"enabledState":"Enabled","mode":"Detection","redirectUrl":"http://www.microsoft.com","customBlockResponseStatusCode":406,"customBlockResponseBody":null,"requestBodyCheck":"Disabled"},"customRules":{"rules":[]},"managedRules":{"managedRuleSets":[]},"frontendEndpointLinks":[],"routingRuleLinks":[],"securityPolicyLinks":[]}}' headers: cache-control: - no-cache content-length: - '828' content-type: - application/json; odata.metadata=minimal; odata.streaming=true date: - Thu, 01 Apr 2021 16:59:23 GMT expires: - '-1' odata-version: - '4.0' pragma: - no-cache server: - Kestrel strict-transport-security: - max-age=31536000; includeSubDomains x-content-type-options: - nosniff x-ms-ratelimit-remaining-subscription-writes: - '1197' status: code: 201 message: Created - request: body: '{"location": "global", "properties": {"policySettings": {"enabledState": "Enabled", "mode": "Detection", "redirectUrl": "http://www.microsoft.com", "customBlockResponseStatusCode": 406, "customBlockResponseBody": "YiBvZHk="}, "customRules": {"rules": []}, "managedRules": {}}, "sku": {"name": "Classic_AzureFrontDoor"}}' headers: Accept: - application/json Accept-Encoding: - gzip, deflate CommandName: - network front-door waf-policy create Connection: - keep-alive Content-Length: - '319' Content-Type: - application/json; charset=utf-8 ParameterSetName: - -g -n --mode --redirect-url --custom-block-response-status-code --custom-block-response-body User-Agent: - python/3.7.9 (Windows-10-10.0.19041-SP0) msrest/0.6.21 msrest_azure/0.6.3 azure-mgmt-frontdoor/0.3.0 Azure-SDK-For-Python AZURECLI/2.21.0 (MSI) accept-language: - en-US method: PUT uri: https://management.azure.com/subscriptions/00000000-0000-0000-0000-000000000000/resourceGroups/clitest.rg000001/providers/Microsoft.Network/FrontDoorWebApplicationFirewallPolicies/cli000007?api-version=2020-11-01 response: body: string: '{"name":"cli000007","id":"/subscriptions/00000000-0000-0000-0000-000000000000/resourcegroups/clitest.rg000001/providers/Microsoft.Network/frontdoorwebapplicationfirewallpolicies/cli000007","type":"Microsoft.Network/frontdoorwebapplicationfirewallpolicies","location":"Global","tags":{},"sku":{"name":"Classic_AzureFrontDoor"},"properties":{"resourceState":"Enabled","provisioningState":"Succeeded","policySettings":{"enabledState":"Enabled","mode":"Detection","redirectUrl":"http://www.microsoft.com","customBlockResponseStatusCode":406,"customBlockResponseBody":"YiBvZHk=","requestBodyCheck":"Disabled"},"customRules":{"rules":[]},"managedRules":{"managedRuleSets":[]},"frontendEndpointLinks":[],"routingRuleLinks":[],"securityPolicyLinks":[]}}' headers: cache-control: - no-cache content-length: - '834' content-type: - application/json; odata.metadata=minimal; odata.streaming=true date: - Thu, 01 Apr 2021 16:59:30 GMT expires: - '-1' odata-version: - '4.0' pragma: - no-cache server: - Kestrel strict-transport-security: - max-age=31536000; includeSubDomains x-content-type-options: - nosniff x-ms-ratelimit-remaining-subscription-writes: - '1197' status: code: 201 message: Created - request: body: '{"location": "global", "properties": {"policySettings": {"enabledState": "Disabled", "mode": "Detection"}, "customRules": {"rules": []}, "managedRules": {}}, "sku": {"name": "Classic_AzureFrontDoor"}}' headers: Accept: - application/json Accept-Encoding: - gzip, deflate CommandName: - network front-door waf-policy create Connection: - keep-alive Content-Length: - '200' Content-Type: - application/json; charset=utf-8 ParameterSetName: - -g -n --mode --disabled User-Agent: - python/3.7.9 (Windows-10-10.0.19041-SP0) msrest/0.6.21 msrest_azure/0.6.3 azure-mgmt-frontdoor/0.3.0 Azure-SDK-For-Python AZURECLI/2.21.0 (MSI) accept-language: - en-US method: PUT uri: https://management.azure.com/subscriptions/00000000-0000-0000-0000-000000000000/resourceGroups/clitest.rg000001/providers/Microsoft.Network/FrontDoorWebApplicationFirewallPolicies/cli000008?api-version=2020-11-01 response: body: string: '{"name":"cli000008","id":"/subscriptions/00000000-0000-0000-0000-000000000000/resourcegroups/clitest.rg000001/providers/Microsoft.Network/frontdoorwebapplicationfirewallpolicies/cli000008","type":"Microsoft.Network/frontdoorwebapplicationfirewallpolicies","location":"Global","tags":{},"sku":{"name":"Classic_AzureFrontDoor"},"properties":{"resourceState":"Enabled","provisioningState":"Succeeded","policySettings":{"enabledState":"Disabled","mode":"Detection","redirectUrl":null,"customBlockResponseStatusCode":null,"customBlockResponseBody":null,"requestBodyCheck":"Disabled"},"customRules":{"rules":[]},"managedRules":{"managedRuleSets":[]},"frontendEndpointLinks":[],"routingRuleLinks":[],"securityPolicyLinks":[]}}' headers: cache-control: - no-cache content-length: - '808' content-type: - application/json; odata.metadata=minimal; odata.streaming=true date: - Thu, 01 Apr 2021 16:59:40 GMT expires: - '-1' odata-version: - '4.0' pragma: - no-cache server: - Kestrel strict-transport-security: - max-age=31536000; includeSubDomains x-content-type-options: - nosniff x-ms-ratelimit-remaining-subscription-writes: - '1199' status: code: 201 message: Created - request: body: null headers: Accept: - application/json Accept-Encoding: - gzip, deflate CommandName: - network front-door waf-policy update Connection: - keep-alive ParameterSetName: - -g -n --mode User-Agent: - python/3.7.9 (Windows-10-10.0.19041-SP0) msrest/0.6.21 msrest_azure/0.6.3 azure-mgmt-frontdoor/0.3.0 Azure-SDK-For-Python AZURECLI/2.21.0 (MSI) accept-language: - en-US method: GET uri: https://management.azure.com/subscriptions/00000000-0000-0000-0000-000000000000/resourceGroups/clitest.rg000001/providers/Microsoft.Network/FrontDoorWebApplicationFirewallPolicies/cli000008?api-version=2020-11-01 response: body: string: '{"name":"cli000008","id":"/subscriptions/00000000-0000-0000-0000-000000000000/resourcegroups/clitest.rg000001/providers/Microsoft.Network/frontdoorwebapplicationfirewallpolicies/cli000008","type":"Microsoft.Network/frontdoorwebapplicationfirewallpolicies","location":"Global","tags":{},"sku":{"name":"Classic_AzureFrontDoor"},"properties":{"resourceState":"Enabled","provisioningState":"Succeeded","policySettings":{"enabledState":"Disabled","mode":"Detection","redirectUrl":null,"customBlockResponseStatusCode":null,"customBlockResponseBody":null,"requestBodyCheck":"Disabled"},"customRules":{"rules":[]},"managedRules":{"managedRuleSets":[]},"frontendEndpointLinks":[],"routingRuleLinks":[],"securityPolicyLinks":[]}}' headers: cache-control: - no-cache content-length: - '808' content-type: - application/json; odata.metadata=minimal; odata.streaming=true date: - Thu, 01 Apr 2021 16:59:40 GMT expires: - '-1' odata-version: - '4.0' pragma: - no-cache server: - Kestrel strict-transport-security: - max-age=31536000; includeSubDomains transfer-encoding: - chunked vary: - Accept-Encoding x-content-type-options: - nosniff status: code: 200 message: OK - request: body: '{"location": "Global", "tags": {}, "properties": {"policySettings": {"enabledState": "Enabled", "mode": "Detection", "requestBodyCheck": "Disabled"}, "customRules": {"rules": []}, "managedRules": {"managedRuleSets": []}}, "sku": {"name": "Classic_AzureFrontDoor"}}' headers: Accept: - application/json Accept-Encoding: - gzip, deflate CommandName: - network front-door waf-policy update Connection: - keep-alive Content-Length: - '264' Content-Type: - application/json; charset=utf-8 ParameterSetName: - -g -n --mode User-Agent: - python/3.7.9 (Windows-10-10.0.19041-SP0) msrest/0.6.21 msrest_azure/0.6.3 azure-mgmt-frontdoor/0.3.0 Azure-SDK-For-Python AZURECLI/2.21.0 (MSI) accept-language: - en-US method: PUT uri: https://management.azure.com/subscriptions/00000000-0000-0000-0000-000000000000/resourceGroups/clitest.rg000001/providers/Microsoft.Network/FrontDoorWebApplicationFirewallPolicies/cli000008?api-version=2020-11-01 response: body: string: '{"name":"cli000008","id":"/subscriptions/00000000-0000-0000-0000-000000000000/resourcegroups/clitest.rg000001/providers/Microsoft.Network/frontdoorwebapplicationfirewallpolicies/cli000008","type":"Microsoft.Network/frontdoorwebapplicationfirewallpolicies","location":"Global","tags":{},"sku":{"name":"Classic_AzureFrontDoor"},"properties":{"resourceState":"Enabled","provisioningState":"Succeeded","policySettings":{"enabledState":"Enabled","mode":"Detection","redirectUrl":null,"customBlockResponseStatusCode":null,"customBlockResponseBody":null,"requestBodyCheck":"Disabled"},"customRules":{"rules":[]},"managedRules":{"managedRuleSets":[]},"frontendEndpointLinks":[],"routingRuleLinks":[],"securityPolicyLinks":[]}}' headers: cache-control: - no-cache content-length: - '807' content-type: - application/json; odata.metadata=minimal; odata.streaming=true date: - Thu, 01 Apr 2021 16:59:42 GMT expires: - '-1' odata-version: - '4.0' pragma: - no-cache server: - Kestrel strict-transport-security: - max-age=31536000; includeSubDomains transfer-encoding: - chunked vary: - Accept-Encoding x-content-type-options: - nosniff x-ms-ratelimit-remaining-subscription-writes: - '1196' status: code: 200 message: OK - request: body: null headers: Accept: - application/json Accept-Encoding: - gzip, deflate CommandName: - network front-door waf-policy update Connection: - keep-alive ParameterSetName: - -g -n --tags User-Agent: - python/3.7.9 (Windows-10-10.0.19041-SP0) msrest/0.6.21 msrest_azure/0.6.3 azure-mgmt-frontdoor/0.3.0 Azure-SDK-For-Python AZURECLI/2.21.0 (MSI) accept-language: - en-US method: GET uri: https://management.azure.com/subscriptions/00000000-0000-0000-0000-000000000000/resourceGroups/clitest.rg000001/providers/Microsoft.Network/FrontDoorWebApplicationFirewallPolicies/cli000002?api-version=2020-11-01 response: body: string: '{"name":"cli000002","id":"/subscriptions/00000000-0000-0000-0000-000000000000/resourcegroups/clitest.rg000001/providers/Microsoft.Network/frontdoorwebapplicationfirewallpolicies/cli000002","type":"Microsoft.Network/frontdoorwebapplicationfirewallpolicies","location":"Global","tags":{},"sku":{"name":"Classic_AzureFrontDoor"},"properties":{"resourceState":"Enabled","provisioningState":"Succeeded","policySettings":{"enabledState":"Enabled","mode":"Prevention","redirectUrl":null,"customBlockResponseStatusCode":null,"customBlockResponseBody":null,"requestBodyCheck":"Disabled"},"customRules":{"rules":[]},"managedRules":{"managedRuleSets":[]},"frontendEndpointLinks":[],"routingRuleLinks":[],"securityPolicyLinks":[]}}' headers: cache-control: - no-cache content-length: - '808' content-type: - application/json; odata.metadata=minimal; odata.streaming=true date: - Thu, 01 Apr 2021 16:59:43 GMT expires: - '-1' odata-version: - '4.0' pragma: - no-cache server: - Kestrel strict-transport-security: - max-age=31536000; includeSubDomains transfer-encoding: - chunked vary: - Accept-Encoding x-content-type-options: - nosniff status: code: 200 message: OK - request: body: '{"location": "Global", "tags": {"test": "best"}, "properties": {"policySettings": {"enabledState": "Enabled", "mode": "Prevention", "requestBodyCheck": "Disabled"}, "customRules": {"rules": []}, "managedRules": {"managedRuleSets": []}}, "sku": {"name": "Classic_AzureFrontDoor"}}' headers: Accept: - application/json Accept-Encoding: - gzip, deflate CommandName: - network front-door waf-policy update Connection: - keep-alive Content-Length: - '279' Content-Type: - application/json; charset=utf-8 ParameterSetName: - -g -n --tags User-Agent: - python/3.7.9 (Windows-10-10.0.19041-SP0) msrest/0.6.21 msrest_azure/0.6.3 azure-mgmt-frontdoor/0.3.0 Azure-SDK-For-Python AZURECLI/2.21.0 (MSI) accept-language: - en-US method: PUT uri: https://management.azure.com/subscriptions/00000000-0000-0000-0000-000000000000/resourceGroups/clitest.rg000001/providers/Microsoft.Network/FrontDoorWebApplicationFirewallPolicies/cli000002?api-version=2020-11-01 response: body: string: '{"name":"cli000002","id":"/subscriptions/00000000-0000-0000-0000-000000000000/resourcegroups/clitest.rg000001/providers/Microsoft.Network/frontdoorwebapplicationfirewallpolicies/cli000002","type":"Microsoft.Network/frontdoorwebapplicationfirewallpolicies","location":"Global","tags":{"test":"best"},"sku":{"name":"Classic_AzureFrontDoor"},"properties":{"resourceState":"Enabled","provisioningState":"Succeeded","policySettings":{"enabledState":"Enabled","mode":"Prevention","redirectUrl":null,"customBlockResponseStatusCode":null,"customBlockResponseBody":null,"requestBodyCheck":"Disabled"},"customRules":{"rules":[]},"managedRules":{"managedRuleSets":[]},"frontendEndpointLinks":[],"routingRuleLinks":[],"securityPolicyLinks":[]}}' headers: cache-control: - no-cache content-length: - '821' content-type: - application/json; odata.metadata=minimal; odata.streaming=true date: - Thu, 01 Apr 2021 16:59:46 GMT expires: - '-1' odata-version: - '4.0' pragma: - no-cache server: - Kestrel strict-transport-security: - max-age=31536000; includeSubDomains transfer-encoding: - chunked vary: - Accept-Encoding x-content-type-options: - nosniff x-ms-ratelimit-remaining-subscription-writes: - '1195' status: code: 200 message: OK - request: body: null headers: Accept: - application/json Accept-Encoding: - gzip, deflate CommandName: - network front-door waf-policy update Connection: - keep-alive ParameterSetName: - -g -n --mode --sku User-Agent: - python/3.7.9 (Windows-10-10.0.19041-SP0) msrest/0.6.21 msrest_azure/0.6.3 azure-mgmt-frontdoor/0.3.0 Azure-SDK-For-Python AZURECLI/2.21.0 (MSI) accept-language: - en-US method: GET uri: https://management.azure.com/subscriptions/00000000-0000-0000-0000-000000000000/resourceGroups/clitest.rg000001/providers/Microsoft.Network/FrontDoorWebApplicationFirewallPolicies/cli000002?api-version=2020-11-01 response: body: string: '{"name":"cli000002","id":"/subscriptions/00000000-0000-0000-0000-000000000000/resourcegroups/clitest.rg000001/providers/Microsoft.Network/frontdoorwebapplicationfirewallpolicies/cli000002","type":"Microsoft.Network/frontdoorwebapplicationfirewallpolicies","location":"Global","tags":{"test":"best"},"sku":{"name":"Classic_AzureFrontDoor"},"properties":{"resourceState":"Enabled","provisioningState":"Succeeded","policySettings":{"enabledState":"Enabled","mode":"Prevention","redirectUrl":null,"customBlockResponseStatusCode":null,"customBlockResponseBody":null,"requestBodyCheck":"Disabled"},"customRules":{"rules":[]},"managedRules":{"managedRuleSets":[]},"frontendEndpointLinks":[],"routingRuleLinks":[],"securityPolicyLinks":[]}}' headers: cache-control: - no-cache content-length: - '821' content-type: - application/json; odata.metadata=minimal; odata.streaming=true date: - Thu, 01 Apr 2021 16:59:47 GMT expires: - '-1' odata-version: - '4.0' pragma: - no-cache server: - Kestrel strict-transport-security: - max-age=31536000; includeSubDomains transfer-encoding: - chunked vary: - Accept-Encoding x-content-type-options: - nosniff status: code: 200 message: OK - request: body: '{"location": "Global", "tags": {"test": "best"}, "properties": {"policySettings": {"enabledState": "Enabled", "mode": "Detection", "requestBodyCheck": "Disabled"}, "customRules": {"rules": []}, "managedRules": {"managedRuleSets": []}}, "sku": {"name": "Classic_AzureFrontDoor"}}' headers: Accept: - application/json Accept-Encoding: - gzip, deflate CommandName: - network front-door waf-policy update Connection: - keep-alive Content-Length: - '278' Content-Type: - application/json; charset=utf-8 ParameterSetName: - -g -n --mode --sku User-Agent: - python/3.7.9 (Windows-10-10.0.19041-SP0) msrest/0.6.21 msrest_azure/0.6.3 azure-mgmt-frontdoor/0.3.0 Azure-SDK-For-Python AZURECLI/2.21.0 (MSI) accept-language: - en-US method: PUT uri: https://management.azure.com/subscriptions/00000000-0000-0000-0000-000000000000/resourceGroups/clitest.rg000001/providers/Microsoft.Network/FrontDoorWebApplicationFirewallPolicies/cli000002?api-version=2020-11-01 response: body: string: '{"name":"cli000002","id":"/subscriptions/00000000-0000-0000-0000-000000000000/resourcegroups/clitest.rg000001/providers/Microsoft.Network/frontdoorwebapplicationfirewallpolicies/cli000002","type":"Microsoft.Network/frontdoorwebapplicationfirewallpolicies","location":"Global","tags":{"test":"best"},"sku":{"name":"Classic_AzureFrontDoor"},"properties":{"resourceState":"Enabled","provisioningState":"Succeeded","policySettings":{"enabledState":"Enabled","mode":"Detection","redirectUrl":null,"customBlockResponseStatusCode":null,"customBlockResponseBody":null,"requestBodyCheck":"Disabled"},"customRules":{"rules":[]},"managedRules":{"managedRuleSets":[]},"frontendEndpointLinks":[],"routingRuleLinks":[],"securityPolicyLinks":[]}}' headers: cache-control: - no-cache content-length: - '820' content-type: - application/json; odata.metadata=minimal; odata.streaming=true date: - Thu, 01 Apr 2021 16:59:48 GMT expires: - '-1' odata-version: - '4.0' pragma: - no-cache server: - Kestrel strict-transport-security: - max-age=31536000; includeSubDomains transfer-encoding: - chunked vary: - Accept-Encoding x-content-type-options: - nosniff x-ms-ratelimit-remaining-subscription-writes: - '1193' status: code: 200 message: OK - request: body: null headers: Accept: - application/json Accept-Encoding: - gzip, deflate CommandName: - network front-door waf-policy update Connection: - keep-alive ParameterSetName: - -g -n --mode --redirect-url User-Agent: - python/3.7.9 (Windows-10-10.0.19041-SP0) msrest/0.6.21 msrest_azure/0.6.3 azure-mgmt-frontdoor/0.3.0 Azure-SDK-For-Python AZURECLI/2.21.0 (MSI) accept-language: - en-US method: GET uri: https://management.azure.com/subscriptions/00000000-0000-0000-0000-000000000000/resourceGroups/clitest.rg000001/providers/Microsoft.Network/FrontDoorWebApplicationFirewallPolicies/cli000002?api-version=2020-11-01 response: body: string: '{"name":"cli000002","id":"/subscriptions/00000000-0000-0000-0000-000000000000/resourcegroups/clitest.rg000001/providers/Microsoft.Network/frontdoorwebapplicationfirewallpolicies/cli000002","type":"Microsoft.Network/frontdoorwebapplicationfirewallpolicies","location":"Global","tags":{"test":"best"},"sku":{"name":"Classic_AzureFrontDoor"},"properties":{"resourceState":"Enabled","provisioningState":"Succeeded","policySettings":{"enabledState":"Enabled","mode":"Detection","redirectUrl":null,"customBlockResponseStatusCode":null,"customBlockResponseBody":null,"requestBodyCheck":"Disabled"},"customRules":{"rules":[]},"managedRules":{"managedRuleSets":[]},"frontendEndpointLinks":[],"routingRuleLinks":[],"securityPolicyLinks":[]}}' headers: cache-control: - no-cache content-length: - '820' content-type: - application/json; odata.metadata=minimal; odata.streaming=true date: - Thu, 01 Apr 2021 16:59:48 GMT expires: - '-1' odata-version: - '4.0' pragma: - no-cache server: - Kestrel strict-transport-security: - max-age=31536000; includeSubDomains transfer-encoding: - chunked vary: - Accept-Encoding x-content-type-options: - nosniff status: code: 200 message: OK - request: body: '{"location": "Global", "tags": {"test": "best"}, "properties": {"policySettings": {"enabledState": "Enabled", "mode": "Prevention", "redirectUrl": "http://www.microsoft.com", "requestBodyCheck": "Disabled"}, "customRules": {"rules": []}, "managedRules": {"managedRuleSets": []}}, "sku": {"name": "Classic_AzureFrontDoor"}}' headers: Accept: - application/json Accept-Encoding: - gzip, deflate CommandName: - network front-door waf-policy update Connection: - keep-alive Content-Length: - '322' Content-Type: - application/json; charset=utf-8 ParameterSetName: - -g -n --mode --redirect-url User-Agent: - python/3.7.9 (Windows-10-10.0.19041-SP0) msrest/0.6.21 msrest_azure/0.6.3 azure-mgmt-frontdoor/0.3.0 Azure-SDK-For-Python AZURECLI/2.21.0 (MSI) accept-language: - en-US method: PUT uri: https://management.azure.com/subscriptions/00000000-0000-0000-0000-000000000000/resourceGroups/clitest.rg000001/providers/Microsoft.Network/FrontDoorWebApplicationFirewallPolicies/cli000002?api-version=2020-11-01 response: body: string: '{"name":"cli000002","id":"/subscriptions/00000000-0000-0000-0000-000000000000/resourcegroups/clitest.rg000001/providers/Microsoft.Network/frontdoorwebapplicationfirewallpolicies/cli000002","type":"Microsoft.Network/frontdoorwebapplicationfirewallpolicies","location":"Global","tags":{"test":"best"},"sku":{"name":"Classic_AzureFrontDoor"},"properties":{"resourceState":"Enabled","provisioningState":"Succeeded","policySettings":{"enabledState":"Enabled","mode":"Prevention","redirectUrl":"http://www.microsoft.com","customBlockResponseStatusCode":null,"customBlockResponseBody":null,"requestBodyCheck":"Disabled"},"customRules":{"rules":[]},"managedRules":{"managedRuleSets":[]},"frontendEndpointLinks":[],"routingRuleLinks":[],"securityPolicyLinks":[]}}' headers: cache-control: - no-cache content-length: - '843' content-type: - application/json; odata.metadata=minimal; odata.streaming=true date: - Thu, 01 Apr 2021 16:59:50 GMT expires: - '-1' odata-version: - '4.0' pragma: - no-cache server: - Kestrel strict-transport-security: - max-age=31536000; includeSubDomains transfer-encoding: - chunked vary: - Accept-Encoding x-content-type-options: - nosniff x-ms-ratelimit-remaining-subscription-writes: - '1196' status: code: 200 message: OK - request: body: null headers: Accept: - application/json Accept-Encoding: - gzip, deflate CommandName: - network front-door waf-policy update Connection: - keep-alive ParameterSetName: - -g -n --custom-block-response-status-code User-Agent: - python/3.7.9 (Windows-10-10.0.19041-SP0) msrest/0.6.21 msrest_azure/0.6.3 azure-mgmt-frontdoor/0.3.0 Azure-SDK-For-Python AZURECLI/2.21.0 (MSI) accept-language: - en-US method: GET uri: https://management.azure.com/subscriptions/00000000-0000-0000-0000-000000000000/resourceGroups/clitest.rg000001/providers/Microsoft.Network/FrontDoorWebApplicationFirewallPolicies/cli000002?api-version=2020-11-01 response: body: string: '{"name":"cli000002","id":"/subscriptions/00000000-0000-0000-0000-000000000000/resourcegroups/clitest.rg000001/providers/Microsoft.Network/frontdoorwebapplicationfirewallpolicies/cli000002","type":"Microsoft.Network/frontdoorwebapplicationfirewallpolicies","location":"Global","tags":{"test":"best"},"sku":{"name":"Classic_AzureFrontDoor"},"properties":{"resourceState":"Enabled","provisioningState":"Succeeded","policySettings":{"enabledState":"Enabled","mode":"Prevention","redirectUrl":"http://www.microsoft.com","customBlockResponseStatusCode":null,"customBlockResponseBody":null,"requestBodyCheck":"Disabled"},"customRules":{"rules":[]},"managedRules":{"managedRuleSets":[]},"frontendEndpointLinks":[],"routingRuleLinks":[],"securityPolicyLinks":[]}}' headers: cache-control: - no-cache content-length: - '843' content-type: - application/json; odata.metadata=minimal; odata.streaming=true date: - Thu, 01 Apr 2021 16:59:51 GMT expires: - '-1' odata-version: - '4.0' pragma: - no-cache server: - Kestrel strict-transport-security: - max-age=31536000; includeSubDomains transfer-encoding: - chunked vary: - Accept-Encoding x-content-type-options: - nosniff status: code: 200 message: OK - request: body: '{"location": "Global", "tags": {"test": "best"}, "properties": {"policySettings": {"enabledState": "Enabled", "mode": "Prevention", "redirectUrl": "http://www.microsoft.com", "customBlockResponseStatusCode": 406, "requestBodyCheck": "Disabled"}, "customRules": {"rules": []}, "managedRules": {"managedRuleSets": []}}, "sku": {"name": "Classic_AzureFrontDoor"}}' headers: Accept: - application/json Accept-Encoding: - gzip, deflate CommandName: - network front-door waf-policy update Connection: - keep-alive Content-Length: - '360' Content-Type: - application/json; charset=utf-8 ParameterSetName: - -g -n --custom-block-response-status-code User-Agent: - python/3.7.9 (Windows-10-10.0.19041-SP0) msrest/0.6.21 msrest_azure/0.6.3 azure-mgmt-frontdoor/0.3.0 Azure-SDK-For-Python AZURECLI/2.21.0 (MSI) accept-language: - en-US method: PUT uri: https://management.azure.com/subscriptions/00000000-0000-0000-0000-000000000000/resourceGroups/clitest.rg000001/providers/Microsoft.Network/FrontDoorWebApplicationFirewallPolicies/cli000002?api-version=2020-11-01 response: body: string: '{"name":"cli000002","id":"/subscriptions/00000000-0000-0000-0000-000000000000/resourcegroups/clitest.rg000001/providers/Microsoft.Network/frontdoorwebapplicationfirewallpolicies/cli000002","type":"Microsoft.Network/frontdoorwebapplicationfirewallpolicies","location":"Global","tags":{"test":"best"},"sku":{"name":"Classic_AzureFrontDoor"},"properties":{"resourceState":"Enabled","provisioningState":"Succeeded","policySettings":{"enabledState":"Enabled","mode":"Prevention","redirectUrl":"http://www.microsoft.com","customBlockResponseStatusCode":406,"customBlockResponseBody":null,"requestBodyCheck":"Disabled"},"customRules":{"rules":[]},"managedRules":{"managedRuleSets":[]},"frontendEndpointLinks":[],"routingRuleLinks":[],"securityPolicyLinks":[]}}' headers: cache-control: - no-cache content-length: - '842' content-type: - application/json; odata.metadata=minimal; odata.streaming=true date: - Thu, 01 Apr 2021 16:59:53 GMT expires: - '-1' odata-version: - '4.0' pragma: - no-cache server: - Kestrel strict-transport-security: - max-age=31536000; includeSubDomains transfer-encoding: - chunked vary: - Accept-Encoding x-content-type-options: - nosniff x-ms-ratelimit-remaining-subscription-writes: - '1195' status: code: 200 message: OK - request: body: null headers: Accept: - application/json Accept-Encoding: - gzip, deflate CommandName: - network front-door waf-policy update Connection: - keep-alive ParameterSetName: - -g -n --custom-block-response-status-code --custom-block-response-body User-Agent: - python/3.7.9 (Windows-10-10.0.19041-SP0) msrest/0.6.21 msrest_azure/0.6.3 azure-mgmt-frontdoor/0.3.0 Azure-SDK-For-Python AZURECLI/2.21.0 (MSI) accept-language: - en-US method: GET uri: https://management.azure.com/subscriptions/00000000-0000-0000-0000-000000000000/resourceGroups/clitest.rg000001/providers/Microsoft.Network/FrontDoorWebApplicationFirewallPolicies/cli000002?api-version=2020-11-01 response: body: string: '{"name":"cli000002","id":"/subscriptions/00000000-0000-0000-0000-000000000000/resourcegroups/clitest.rg000001/providers/Microsoft.Network/frontdoorwebapplicationfirewallpolicies/cli000002","type":"Microsoft.Network/frontdoorwebapplicationfirewallpolicies","location":"Global","tags":{"test":"best"},"sku":{"name":"Classic_AzureFrontDoor"},"properties":{"resourceState":"Enabled","provisioningState":"Succeeded","policySettings":{"enabledState":"Enabled","mode":"Prevention","redirectUrl":"http://www.microsoft.com","customBlockResponseStatusCode":406,"customBlockResponseBody":null,"requestBodyCheck":"Disabled"},"customRules":{"rules":[]},"managedRules":{"managedRuleSets":[]},"frontendEndpointLinks":[],"routingRuleLinks":[],"securityPolicyLinks":[]}}' headers: cache-control: - no-cache content-length: - '842' content-type: - application/json; odata.metadata=minimal; odata.streaming=true date: - Thu, 01 Apr 2021 16:59:53 GMT expires: - '-1' odata-version: - '4.0' pragma: - no-cache server: - Kestrel strict-transport-security: - max-age=31536000; includeSubDomains transfer-encoding: - chunked vary: - Accept-Encoding x-content-type-options: - nosniff status: code: 200 message: OK - request: body: '{"location": "Global", "tags": {"test": "best"}, "properties": {"policySettings": {"enabledState": "Enabled", "mode": "Prevention", "redirectUrl": "http://www.microsoft.com", "customBlockResponseStatusCode": 405, "customBlockResponseBody": "YiBvZHk=", "requestBodyCheck": "Disabled"}, "customRules": {"rules": []}, "managedRules": {"managedRuleSets": []}}, "sku": {"name": "Classic_AzureFrontDoor"}}' headers: Accept: - application/json Accept-Encoding: - gzip, deflate CommandName: - network front-door waf-policy update Connection: - keep-alive Content-Length: - '399' Content-Type: - application/json; charset=utf-8 ParameterSetName: - -g -n --custom-block-response-status-code --custom-block-response-body User-Agent: - python/3.7.9 (Windows-10-10.0.19041-SP0) msrest/0.6.21 msrest_azure/0.6.3 azure-mgmt-frontdoor/0.3.0 Azure-SDK-For-Python AZURECLI/2.21.0 (MSI) accept-language: - en-US method: PUT uri: https://management.azure.com/subscriptions/00000000-0000-0000-0000-000000000000/resourceGroups/clitest.rg000001/providers/Microsoft.Network/FrontDoorWebApplicationFirewallPolicies/cli000002?api-version=2020-11-01 response: body: string: '{"name":"cli000002","id":"/subscriptions/00000000-0000-0000-0000-000000000000/resourcegroups/clitest.rg000001/providers/Microsoft.Network/frontdoorwebapplicationfirewallpolicies/cli000002","type":"Microsoft.Network/frontdoorwebapplicationfirewallpolicies","location":"Global","tags":{"test":"best"},"sku":{"name":"Classic_AzureFrontDoor"},"properties":{"resourceState":"Enabled","provisioningState":"Succeeded","policySettings":{"enabledState":"Enabled","mode":"Prevention","redirectUrl":"http://www.microsoft.com","customBlockResponseStatusCode":405,"customBlockResponseBody":"YiBvZHk=","requestBodyCheck":"Disabled"},"customRules":{"rules":[]},"managedRules":{"managedRuleSets":[]},"frontendEndpointLinks":[],"routingRuleLinks":[],"securityPolicyLinks":[]}}' headers: cache-control: - no-cache content-length: - '848' content-type: - application/json; odata.metadata=minimal; odata.streaming=true date: - Thu, 01 Apr 2021 16:59:54 GMT expires: - '-1' odata-version: - '4.0' pragma: - no-cache server: - Kestrel strict-transport-security: - max-age=31536000; includeSubDomains transfer-encoding: - chunked vary: - Accept-Encoding x-content-type-options: - nosniff x-ms-ratelimit-remaining-subscription-writes: - '1195' status: code: 200 message: OK - request: body: null headers: Accept: - application/json Accept-Encoding: - gzip, deflate CommandName: - network front-door waf-policy update Connection: - keep-alive ParameterSetName: - -g -n --disabled User-Agent: - python/3.7.9 (Windows-10-10.0.19041-SP0) msrest/0.6.21 msrest_azure/0.6.3 azure-mgmt-frontdoor/0.3.0 Azure-SDK-For-Python AZURECLI/2.21.0 (MSI) accept-language: - en-US method: GET uri: https://management.azure.com/subscriptions/00000000-0000-0000-0000-000000000000/resourceGroups/clitest.rg000001/providers/Microsoft.Network/FrontDoorWebApplicationFirewallPolicies/cli000002?api-version=2020-11-01 response: body: string: '{"name":"cli000002","id":"/subscriptions/00000000-0000-0000-0000-000000000000/resourcegroups/clitest.rg000001/providers/Microsoft.Network/frontdoorwebapplicationfirewallpolicies/cli000002","type":"Microsoft.Network/frontdoorwebapplicationfirewallpolicies","location":"Global","tags":{"test":"best"},"sku":{"name":"Classic_AzureFrontDoor"},"properties":{"resourceState":"Enabled","provisioningState":"Succeeded","policySettings":{"enabledState":"Enabled","mode":"Prevention","redirectUrl":"http://www.microsoft.com","customBlockResponseStatusCode":405,"customBlockResponseBody":"YiBvZHk=","requestBodyCheck":"Disabled"},"customRules":{"rules":[]},"managedRules":{"managedRuleSets":[]},"frontendEndpointLinks":[],"routingRuleLinks":[],"securityPolicyLinks":[]}}' headers: cache-control: - no-cache content-length: - '848' content-type: - application/json; odata.metadata=minimal; odata.streaming=true date: - Thu, 01 Apr 2021 16:59:55 GMT expires: - '-1' odata-version: - '4.0' pragma: - no-cache server: - Kestrel strict-transport-security: - max-age=31536000; includeSubDomains transfer-encoding: - chunked vary: - Accept-Encoding x-content-type-options: - nosniff status: code: 200 message: OK - request: body: '{"location": "Global", "tags": {"test": "best"}, "properties": {"policySettings": {"enabledState": "Disabled", "mode": "Prevention", "redirectUrl": "http://www.microsoft.com", "customBlockResponseStatusCode": 405, "customBlockResponseBody": "YiBvZHk=", "requestBodyCheck": "Disabled"}, "customRules": {"rules": []}, "managedRules": {"managedRuleSets": []}}, "sku": {"name": "Classic_AzureFrontDoor"}}' headers: Accept: - application/json Accept-Encoding: - gzip, deflate CommandName: - network front-door waf-policy update Connection: - keep-alive Content-Length: - '400' Content-Type: - application/json; charset=utf-8 ParameterSetName: - -g -n --disabled User-Agent: - python/3.7.9 (Windows-10-10.0.19041-SP0) msrest/0.6.21 msrest_azure/0.6.3 azure-mgmt-frontdoor/0.3.0 Azure-SDK-For-Python AZURECLI/2.21.0 (MSI) accept-language: - en-US method: PUT uri: https://management.azure.com/subscriptions/00000000-0000-0000-0000-000000000000/resourceGroups/clitest.rg000001/providers/Microsoft.Network/FrontDoorWebApplicationFirewallPolicies/cli000002?api-version=2020-11-01 response: body: string: '{"name":"cli000002","id":"/subscriptions/00000000-0000-0000-0000-000000000000/resourcegroups/clitest.rg000001/providers/Microsoft.Network/frontdoorwebapplicationfirewallpolicies/cli000002","type":"Microsoft.Network/frontdoorwebapplicationfirewallpolicies","location":"Global","tags":{"test":"best"},"sku":{"name":"Classic_AzureFrontDoor"},"properties":{"resourceState":"Enabled","provisioningState":"Succeeded","policySettings":{"enabledState":"Disabled","mode":"Prevention","redirectUrl":"http://www.microsoft.com","customBlockResponseStatusCode":405,"customBlockResponseBody":"YiBvZHk=","requestBodyCheck":"Disabled"},"customRules":{"rules":[]},"managedRules":{"managedRuleSets":[]},"frontendEndpointLinks":[],"routingRuleLinks":[],"securityPolicyLinks":[]}}' headers: cache-control: - no-cache content-length: - '849' content-type: - application/json; odata.metadata=minimal; odata.streaming=true date: - Thu, 01 Apr 2021 16:59:56 GMT expires: - '-1' odata-version: - '4.0' pragma: - no-cache server: - Kestrel strict-transport-security: - max-age=31536000; includeSubDomains transfer-encoding: - chunked vary: - Accept-Encoding x-content-type-options: - nosniff x-ms-ratelimit-remaining-subscription-writes: - '1193' status: code: 200 message: OK - request: body: null headers: Accept: - application/json Accept-Encoding: - gzip, deflate CommandName: - network front-door waf-policy show Connection: - keep-alive ParameterSetName: - -g -n User-Agent: - python/3.7.9 (Windows-10-10.0.19041-SP0) msrest/0.6.21 msrest_azure/0.6.3 azure-mgmt-frontdoor/0.3.0 Azure-SDK-For-Python AZURECLI/2.21.0 (MSI) accept-language: - en-US method: GET uri: https://management.azure.com/subscriptions/00000000-0000-0000-0000-000000000000/resourceGroups/clitest.rg000001/providers/Microsoft.Network/FrontDoorWebApplicationFirewallPolicies/cli000002?api-version=2020-11-01 response: body: string: '{"name":"cli000002","id":"/subscriptions/00000000-0000-0000-0000-000000000000/resourcegroups/clitest.rg000001/providers/Microsoft.Network/frontdoorwebapplicationfirewallpolicies/cli000002","type":"Microsoft.Network/frontdoorwebapplicationfirewallpolicies","location":"Global","tags":{"test":"best"},"sku":{"name":"Classic_AzureFrontDoor"},"properties":{"resourceState":"Enabled","provisioningState":"Succeeded","policySettings":{"enabledState":"Disabled","mode":"Prevention","redirectUrl":"http://www.microsoft.com","customBlockResponseStatusCode":405,"customBlockResponseBody":"YiBvZHk=","requestBodyCheck":"Disabled"},"customRules":{"rules":[]},"managedRules":{"managedRuleSets":[]},"frontendEndpointLinks":[],"routingRuleLinks":[],"securityPolicyLinks":[]}}' headers: cache-control: - no-cache content-length: - '849' content-type: - application/json; odata.metadata=minimal; odata.streaming=true date: - Thu, 01 Apr 2021 16:59:57 GMT expires: - '-1' odata-version: - '4.0' pragma: - no-cache server: - Kestrel strict-transport-security: - max-age=31536000; includeSubDomains transfer-encoding: - chunked vary: - Accept-Encoding x-content-type-options: - nosniff status: code: 200 message: OK - request: body: null headers: Accept: - application/json Accept-Encoding: - gzip, deflate CommandName: - network front-door waf-policy list Connection: - keep-alive ParameterSetName: - -g User-Agent: - python/3.7.9 (Windows-10-10.0.19041-SP0) msrest/0.6.21 msrest_azure/0.6.3 azure-mgmt-frontdoor/0.3.0 Azure-SDK-For-Python AZURECLI/2.21.0 (MSI) accept-language: - en-US method: GET uri: https://management.azure.com/subscriptions/00000000-0000-0000-0000-000000000000/resourceGroups/clitest.rg000001/providers/Microsoft.Network/frontDoorWebApplicationFirewallPolicies?api-version=2020-11-01 response: body: string: '{"value":[{"name":"cli000008","id":"/subscriptions/00000000-0000-0000-0000-000000000000/resourcegroups/clitest.rg000001/providers/Microsoft.Network/frontdoorwebapplicationfirewallpolicies/cli000008","type":"Microsoft.Network/frontdoorwebapplicationfirewallpolicies","location":"Global","tags":{},"sku":{"name":"Classic_AzureFrontDoor"},"properties":{"resourceState":"Enabled","provisioningState":"Succeeded","policySettings":{"enabledState":"Enabled","mode":"Detection","redirectUrl":null,"customBlockResponseStatusCode":null,"customBlockResponseBody":null,"requestBodyCheck":"Disabled"},"customRules":{"rules":[]},"managedRules":{"managedRuleSets":[]},"frontendEndpointLinks":[],"routingRuleLinks":[],"securityPolicyLinks":[]}},{"name":"cli000004","id":"/subscriptions/00000000-0000-0000-0000-000000000000/resourcegroups/clitest.rg000001/providers/Microsoft.Network/frontdoorwebapplicationfirewallpolicies/cli000004","type":"Microsoft.Network/frontdoorwebapplicationfirewallpolicies","location":"Global","tags":{},"sku":{"name":"Standard_AzureFrontDoor"},"properties":{"resourceState":"Enabled","provisioningState":"Succeeded","policySettings":{"enabledState":"Enabled","mode":"Prevention","redirectUrl":null,"customBlockResponseStatusCode":null,"customBlockResponseBody":null,"requestBodyCheck":"Disabled"},"customRules":{"rules":[]},"managedRules":{"managedRuleSets":[]},"frontendEndpointLinks":[],"routingRuleLinks":[],"securityPolicyLinks":[]}},{"name":"cli000002","id":"/subscriptions/00000000-0000-0000-0000-000000000000/resourcegroups/clitest.rg000001/providers/Microsoft.Network/frontdoorwebapplicationfirewallpolicies/cli000002","type":"Microsoft.Network/frontdoorwebapplicationfirewallpolicies","location":"Global","tags":{"test":"best"},"sku":{"name":"Classic_AzureFrontDoor"},"properties":{"resourceState":"Enabled","provisioningState":"Succeeded","policySettings":{"enabledState":"Disabled","mode":"Prevention","redirectUrl":"http://www.microsoft.com","customBlockResponseStatusCode":405,"customBlockResponseBody":"YiBvZHk=","requestBodyCheck":"Disabled"},"customRules":{"rules":[]},"managedRules":{"managedRuleSets":[]},"frontendEndpointLinks":[],"routingRuleLinks":[],"securityPolicyLinks":[]}},{"name":"cli000005","id":"/subscriptions/00000000-0000-0000-0000-000000000000/resourcegroups/clitest.rg000001/providers/Microsoft.Network/frontdoorwebapplicationfirewallpolicies/cli000005","type":"Microsoft.Network/frontdoorwebapplicationfirewallpolicies","location":"Global","tags":{},"sku":{"name":"Premium_AzureFrontDoor"},"properties":{"resourceState":"Enabled","provisioningState":"Succeeded","policySettings":{"enabledState":"Enabled","mode":"Detection","redirectUrl":"http://www.microsoft.com","customBlockResponseStatusCode":null,"customBlockResponseBody":null,"requestBodyCheck":"Disabled"},"customRules":{"rules":[]},"managedRules":{"managedRuleSets":[]},"frontendEndpointLinks":[],"routingRuleLinks":[],"securityPolicyLinks":[]}},{"name":"cli000006","id":"/subscriptions/00000000-0000-0000-0000-000000000000/resourcegroups/clitest.rg000001/providers/Microsoft.Network/frontdoorwebapplicationfirewallpolicies/cli000006","type":"Microsoft.Network/frontdoorwebapplicationfirewallpolicies","location":"Global","tags":{},"sku":{"name":"Classic_AzureFrontDoor"},"properties":{"resourceState":"Enabled","provisioningState":"Succeeded","policySettings":{"enabledState":"Enabled","mode":"Detection","redirectUrl":"http://www.microsoft.com","customBlockResponseStatusCode":406,"customBlockResponseBody":null,"requestBodyCheck":"Disabled"},"customRules":{"rules":[]},"managedRules":{"managedRuleSets":[]},"frontendEndpointLinks":[],"routingRuleLinks":[],"securityPolicyLinks":[]}},{"name":"cli000007","id":"/subscriptions/00000000-0000-0000-0000-000000000000/resourcegroups/clitest.rg000001/providers/Microsoft.Network/frontdoorwebapplicationfirewallpolicies/cli000007","type":"Microsoft.Network/frontdoorwebapplicationfirewallpolicies","location":"Global","tags":{},"sku":{"name":"Classic_AzureFrontDoor"},"properties":{"resourceState":"Enabled","provisioningState":"Succeeded","policySettings":{"enabledState":"Enabled","mode":"Detection","redirectUrl":"http://www.microsoft.com","customBlockResponseStatusCode":406,"customBlockResponseBody":"YiBvZHk=","requestBodyCheck":"Disabled"},"customRules":{"rules":[]},"managedRules":{"managedRuleSets":[]},"frontendEndpointLinks":[],"routingRuleLinks":[],"securityPolicyLinks":[]}}]}' headers: cache-control: - no-cache content-length: - '4973' content-type: - application/json; odata.metadata=minimal; odata.streaming=true date: - Thu, 01 Apr 2021 16:59:58 GMT expires: - '-1' odata-version: - '4.0' pragma: - no-cache server: - Kestrel strict-transport-security: - max-age=31536000; includeSubDomains transfer-encoding: - chunked vary: - Accept-Encoding x-content-type-options: - nosniff status: code: 200 message: OK - request: body: null headers: Accept: - application/json Accept-Encoding: - gzip, deflate CommandName: - network front-door waf-policy delete Connection: - keep-alive Content-Length: - '0' ParameterSetName: - -g -n User-Agent: - python/3.7.9 (Windows-10-10.0.19041-SP0) msrest/0.6.21 msrest_azure/0.6.3 azure-mgmt-frontdoor/0.3.0 Azure-SDK-For-Python AZURECLI/2.21.0 (MSI) accept-language: - en-US method: DELETE uri: https://management.azure.com/subscriptions/00000000-0000-0000-0000-000000000000/resourceGroups/clitest.rg000001/providers/Microsoft.Network/FrontDoorWebApplicationFirewallPolicies/cli000002?api-version=2020-11-01 response: body: string: '' headers: cache-control: - no-cache date: - Thu, 01 Apr 2021 17:00:03 GMT expires: - '-1' pragma: - no-cache server: - Kestrel strict-transport-security: - max-age=31536000; includeSubDomains x-content-type-options: - nosniff x-ms-ratelimit-remaining-subscription-deletes: - '14999' status: code: 204 message: No Content - request: body: null headers: Accept: - application/json Accept-Encoding: - gzip, deflate CommandName: - network front-door waf-policy list Connection: - keep-alive ParameterSetName: - -g User-Agent: - python/3.7.9 (Windows-10-10.0.19041-SP0) msrest/0.6.21 msrest_azure/0.6.3 azure-mgmt-frontdoor/0.3.0 Azure-SDK-For-Python AZURECLI/2.21.0 (MSI) accept-language: - en-US method: GET uri: https://management.azure.com/subscriptions/00000000-0000-0000-0000-000000000000/resourceGroups/clitest.rg000001/providers/Microsoft.Network/frontDoorWebApplicationFirewallPolicies?api-version=2020-11-01 response: body: string: '{"value":[{"name":"cli000006","id":"/subscriptions/00000000-0000-0000-0000-000000000000/resourcegroups/clitest.rg000001/providers/Microsoft.Network/frontdoorwebapplicationfirewallpolicies/cli000006","type":"Microsoft.Network/frontdoorwebapplicationfirewallpolicies","location":"Global","tags":{},"sku":{"name":"Classic_AzureFrontDoor"},"properties":{"resourceState":"Enabled","provisioningState":"Succeeded","policySettings":{"enabledState":"Enabled","mode":"Detection","redirectUrl":"http://www.microsoft.com","customBlockResponseStatusCode":406,"customBlockResponseBody":null,"requestBodyCheck":"Disabled"},"customRules":{"rules":[]},"managedRules":{"managedRuleSets":[]},"frontendEndpointLinks":[],"routingRuleLinks":[],"securityPolicyLinks":[]}},{"name":"cli000008","id":"/subscriptions/00000000-0000-0000-0000-000000000000/resourcegroups/clitest.rg000001/providers/Microsoft.Network/frontdoorwebapplicationfirewallpolicies/cli000008","type":"Microsoft.Network/frontdoorwebapplicationfirewallpolicies","location":"Global","tags":{},"sku":{"name":"Classic_AzureFrontDoor"},"properties":{"resourceState":"Enabled","provisioningState":"Succeeded","policySettings":{"enabledState":"Enabled","mode":"Detection","redirectUrl":null,"customBlockResponseStatusCode":null,"customBlockResponseBody":null,"requestBodyCheck":"Disabled"},"customRules":{"rules":[]},"managedRules":{"managedRuleSets":[]},"frontendEndpointLinks":[],"routingRuleLinks":[],"securityPolicyLinks":[]}},{"name":"cli000007","id":"/subscriptions/00000000-0000-0000-0000-000000000000/resourcegroups/clitest.rg000001/providers/Microsoft.Network/frontdoorwebapplicationfirewallpolicies/cli000007","type":"Microsoft.Network/frontdoorwebapplicationfirewallpolicies","location":"Global","tags":{},"sku":{"name":"Classic_AzureFrontDoor"},"properties":{"resourceState":"Enabled","provisioningState":"Succeeded","policySettings":{"enabledState":"Enabled","mode":"Detection","redirectUrl":"http://www.microsoft.com","customBlockResponseStatusCode":406,"customBlockResponseBody":"YiBvZHk=","requestBodyCheck":"Disabled"},"customRules":{"rules":[]},"managedRules":{"managedRuleSets":[]},"frontendEndpointLinks":[],"routingRuleLinks":[],"securityPolicyLinks":[]}},{"name":"cli000004","id":"/subscriptions/00000000-0000-0000-0000-000000000000/resourcegroups/clitest.rg000001/providers/Microsoft.Network/frontdoorwebapplicationfirewallpolicies/cli000004","type":"Microsoft.Network/frontdoorwebapplicationfirewallpolicies","location":"Global","tags":{},"sku":{"name":"Standard_AzureFrontDoor"},"properties":{"resourceState":"Enabled","provisioningState":"Succeeded","policySettings":{"enabledState":"Enabled","mode":"Prevention","redirectUrl":null,"customBlockResponseStatusCode":null,"customBlockResponseBody":null,"requestBodyCheck":"Disabled"},"customRules":{"rules":[]},"managedRules":{"managedRuleSets":[]},"frontendEndpointLinks":[],"routingRuleLinks":[],"securityPolicyLinks":[]}},{"name":"cli000005","id":"/subscriptions/00000000-0000-0000-0000-000000000000/resourcegroups/clitest.rg000001/providers/Microsoft.Network/frontdoorwebapplicationfirewallpolicies/cli000005","type":"Microsoft.Network/frontdoorwebapplicationfirewallpolicies","location":"Global","tags":{},"sku":{"name":"Premium_AzureFrontDoor"},"properties":{"resourceState":"Enabled","provisioningState":"Succeeded","policySettings":{"enabledState":"Enabled","mode":"Detection","redirectUrl":"http://www.microsoft.com","customBlockResponseStatusCode":null,"customBlockResponseBody":null,"requestBodyCheck":"Disabled"},"customRules":{"rules":[]},"managedRules":{"managedRuleSets":[]},"frontendEndpointLinks":[],"routingRuleLinks":[],"securityPolicyLinks":[]}}]}' headers: cache-control: - no-cache content-length: - '4123' content-type: - application/json; odata.metadata=minimal; odata.streaming=true date: - Thu, 01 Apr 2021 17:00:04 GMT expires: - '-1' odata-version: - '4.0' pragma: - no-cache server: - Kestrel strict-transport-security: - max-age=31536000; includeSubDomains transfer-encoding: - chunked vary: - Accept-Encoding x-content-type-options: - nosniff status: code: 200 message: OK version: 1
47.408397
4,455
0.677433
cedd516d25462e7c85dfea972a3f2888ea99340a
5,675
yaml
YAML
src/front-door/azext_front_door/tests/latest/recordings/test_frontend_endpoint_byoc_latest_version.yaml
00Kai0/azure-cli-extensions
4bcafd5c9bb4d4f2eca0b8b512d9d79fe9061b8e
[ "MIT" ]
null
null
null
src/front-door/azext_front_door/tests/latest/recordings/test_frontend_endpoint_byoc_latest_version.yaml
00Kai0/azure-cli-extensions
4bcafd5c9bb4d4f2eca0b8b512d9d79fe9061b8e
[ "MIT" ]
null
null
null
src/front-door/azext_front_door/tests/latest/recordings/test_frontend_endpoint_byoc_latest_version.yaml
00Kai0/azure-cli-extensions
4bcafd5c9bb4d4f2eca0b8b512d9d79fe9061b8e
[ "MIT" ]
null
null
null
interactions: - request: body: '{"certificateSource": "AzureKeyVault", "protocolType": "ServerNameIndication", "minimumTlsVersion": "1.2", "keyVaultCertificateSourceParameters": {"vault": {"id": "/subscriptions/00000000-0000-0000-0000-000000000000/resourceGroups/bzhanafdtest/providers/Microsoft.KeyVault/vaults/bzhanbyostest"}, "secretName": "frontdoorpstest2"}}' headers: Accept: - application/json Accept-Encoding: - gzip, deflate CommandName: - network front-door frontend-endpoint enable-https Connection: - keep-alive Content-Length: - '331' Content-Type: - application/json; charset=utf-8 ParameterSetName: - -f -g -n --certificate-source --vault-id --secret-name User-Agent: - python/3.7.9 (Windows-10-10.0.19041-SP0) msrest/0.6.21 msrest_azure/0.6.3 azure-mgmt-frontdoor/0.3.0 Azure-SDK-For-Python AZURECLI/2.21.0 accept-language: - en-US method: POST uri: https://management.azure.com/subscriptions/00000000-0000-0000-0000-000000000000/resourceGroups/bzhanafdtest/providers/Microsoft.Network/frontDoors/frontdoorpstest2/frontendEndpoints/afd-byoc-latest-localdev-cdn-azure-cn/enableHttps?api-version=2020-05-01 response: body: string: '{"hostName":"afd-byoc-latest.localdev.cdn.azure.cn","sessionAffinityEnabledState":"Disabled","sessionAffinityTtlSeconds":0,"customHttpsProvisioningState":"Enabling","customHttpsProvisioningSubstate":"ImportingUserProvidedCertificate","resourceState":"Enabled","webApplicationFirewallPolicyLink":null,"customHttpsConfiguration":{"protocolType":"ServerNameIndication","certificateSource":"AzureKeyVault","minimumTlsVersion":"1.2","frontDoorCertificateSourceParameters":{"certificateType":null},"keyVaultCertificateSourceParameters":{"secretName":"frontdoorpstest2","secretVersion":null,"vault":{"id":"/subscriptions/00000000-0000-0000-0000-000000000000/resourceGroups/bzhanafdtest/providers/Microsoft.KeyVault/vaults/bzhanbyostest"}}}}' headers: azure-asyncoperation: - https://management.azure.com/subscriptions/00000000-0000-0000-0000-000000000000/resourcegroups/bzhanafdtest/providers/Microsoft.Network/frontdooroperationresults/0785c1a9-e4ed-496c-b92b-5c36c23368e5?api-version=2020-05-01 cache-control: - no-cache content-length: - '733' content-type: - application/json; odata.metadata=minimal; odata.streaming=true date: - Wed, 07 Apr 2021 02:47:07 GMT expires: - '-1' location: - https://management.azure.com/subscriptions/00000000-0000-0000-0000-000000000000/resourcegroups/bzhanafdtest/providers/Microsoft.Network/frontdooroperationresults/0785c1a9-e4ed-496c-b92b-5c36c23368e5/frontdoorresults/frontdoorpstest2?api-version=2020-05-01 odata-version: - '4.0' pragma: - no-cache server: - Kestrel strict-transport-security: - max-age=31536000; includeSubDomains x-content-type-options: - nosniff x-ms-ratelimit-remaining-subscription-writes: - '1199' status: code: 202 message: Accepted - request: body: null headers: Accept: - application/json Accept-Encoding: - gzip, deflate CommandName: - network front-door frontend-endpoint enable-https Connection: - keep-alive ParameterSetName: - -f -g -n --certificate-source --vault-id --secret-name User-Agent: - python/3.7.9 (Windows-10-10.0.19041-SP0) msrest/0.6.21 msrest_azure/0.6.3 azure-mgmt-frontdoor/0.3.0 Azure-SDK-For-Python AZURECLI/2.21.0 accept-language: - en-US method: GET uri: https://management.azure.com/subscriptions/00000000-0000-0000-0000-000000000000/resourceGroups/bzhanafdtest/providers/Microsoft.Network/frontDoors/frontdoorpstest2/frontendEndpoints/afd-byoc-latest-localdev-cdn-azure-cn?api-version=2020-05-01 response: body: string: '{"name":"afd-byoc-latest-localdev-cdn-azure-cn","id":"/subscriptions/00000000-0000-0000-0000-000000000000/resourcegroups/bzhanafdtest/providers/Microsoft.Network/frontdoors/frontdoorpstest2/frontendendpoints/afd-byoc-latest-localdev-cdn-azure-cn","type":"Microsoft.Network/frontdoors/frontendendpoints","properties":{"hostName":"afd-byoc-latest.localdev.cdn.azure.cn","sessionAffinityEnabledState":"Disabled","sessionAffinityTtlSeconds":0,"customHttpsProvisioningState":"Enabling","customHttpsProvisioningSubstate":"ImportingUserProvidedCertificate","resourceState":"Enabled","webApplicationFirewallPolicyLink":null,"customHttpsConfiguration":{"protocolType":"ServerNameIndication","certificateSource":"AzureKeyVault","minimumTlsVersion":"1.2","frontDoorCertificateSourceParameters":{"certificateType":null},"keyVaultCertificateSourceParameters":{"secretName":"frontdoorpstest2","secretVersion":null,"vault":{"id":"/subscriptions/00000000-0000-0000-0000-000000000000/resourceGroups/bzhanafdtest/providers/Microsoft.KeyVault/vaults/bzhanbyostest"}}}}}' headers: cache-control: - no-cache content-length: - '1050' content-type: - application/json; odata.metadata=minimal; odata.streaming=true date: - Wed, 07 Apr 2021 02:47:08 GMT expires: - '-1' odata-version: - '4.0' pragma: - no-cache server: - Kestrel strict-transport-security: - max-age=31536000; includeSubDomains transfer-encoding: - chunked vary: - Accept-Encoding x-content-type-options: - nosniff status: code: 200 message: OK version: 1
49.780702
1,066
0.717885
9e4dbc03727fc0b5c9ccecf85be303ac37059605
27,221
yaml
YAML
src/front-door/azext_front_door/tests/latest/recordings/test_waf_policy_custom_rules.yaml
00Kai0/azure-cli-extensions
4bcafd5c9bb4d4f2eca0b8b512d9d79fe9061b8e
[ "MIT" ]
null
null
null
src/front-door/azext_front_door/tests/latest/recordings/test_waf_policy_custom_rules.yaml
00Kai0/azure-cli-extensions
4bcafd5c9bb4d4f2eca0b8b512d9d79fe9061b8e
[ "MIT" ]
null
null
null
src/front-door/azext_front_door/tests/latest/recordings/test_waf_policy_custom_rules.yaml
00Kai0/azure-cli-extensions
4bcafd5c9bb4d4f2eca0b8b512d9d79fe9061b8e
[ "MIT" ]
null
null
null
interactions: - request: body: '{"location": "global", "properties": {"policySettings": {"enabledState": "Enabled", "mode": "Prevention"}, "customRules": {"rules": []}, "managedRules": {}}, "sku": {"name": "Classic_AzureFrontDoor"}}' headers: Accept: - application/json Accept-Encoding: - gzip, deflate CommandName: - network front-door waf-policy create Connection: - keep-alive Content-Length: - '200' Content-Type: - application/json; charset=utf-8 ParameterSetName: - -g -n --mode User-Agent: - python/3.7.9 (Windows-10-10.0.19041-SP0) msrest/0.6.21 msrest_azure/0.6.3 azure-mgmt-frontdoor/0.3.0 Azure-SDK-For-Python AZURECLI/2.21.0 (MSI) accept-language: - en-US method: PUT uri: https://management.azure.com/subscriptions/00000000-0000-0000-0000-000000000000/resourceGroups/clitest.rg000001/providers/Microsoft.Network/FrontDoorWebApplicationFirewallPolicies/cli000002?api-version=2020-11-01 response: body: string: '{"name":"cli000002","id":"/subscriptions/00000000-0000-0000-0000-000000000000/resourcegroups/clitest.rg000001/providers/Microsoft.Network/frontdoorwebapplicationfirewallpolicies/cli000002","type":"Microsoft.Network/frontdoorwebapplicationfirewallpolicies","location":"Global","tags":{},"sku":{"name":"Classic_AzureFrontDoor"},"properties":{"resourceState":"Enabled","provisioningState":"Succeeded","policySettings":{"enabledState":"Enabled","mode":"Prevention","redirectUrl":null,"customBlockResponseStatusCode":null,"customBlockResponseBody":null,"requestBodyCheck":"Disabled"},"customRules":{"rules":[]},"managedRules":{"managedRuleSets":[]},"frontendEndpointLinks":[],"routingRuleLinks":[],"securityPolicyLinks":[]}}' headers: cache-control: - no-cache content-length: - '808' content-type: - application/json; odata.metadata=minimal; odata.streaming=true date: - Thu, 01 Apr 2021 17:01:18 GMT expires: - '-1' odata-version: - '4.0' pragma: - no-cache server: - Kestrel strict-transport-security: - max-age=31536000; includeSubDomains x-content-type-options: - nosniff x-ms-ratelimit-remaining-subscription-writes: - '1198' status: code: 201 message: Created - request: body: null headers: Accept: - application/json Accept-Encoding: - gzip, deflate CommandName: - network front-door waf-policy rule create Connection: - keep-alive ParameterSetName: - -g --policy-name -n --priority --action --rule-type --rate-limit-duration --rate-limit-threshold --defer User-Agent: - python/3.7.9 (Windows-10-10.0.19041-SP0) msrest/0.6.21 msrest_azure/0.6.3 azure-mgmt-frontdoor/0.3.0 Azure-SDK-For-Python AZURECLI/2.21.0 (MSI) accept-language: - en-US method: GET uri: https://management.azure.com/subscriptions/00000000-0000-0000-0000-000000000000/resourceGroups/clitest.rg000001/providers/Microsoft.Network/FrontDoorWebApplicationFirewallPolicies/cli000002?api-version=2020-11-01 response: body: string: '{"name":"cli000002","id":"/subscriptions/00000000-0000-0000-0000-000000000000/resourcegroups/clitest.rg000001/providers/Microsoft.Network/frontdoorwebapplicationfirewallpolicies/cli000002","type":"Microsoft.Network/frontdoorwebapplicationfirewallpolicies","location":"Global","tags":{},"sku":{"name":"Classic_AzureFrontDoor"},"properties":{"resourceState":"Enabled","provisioningState":"Succeeded","policySettings":{"enabledState":"Enabled","mode":"Prevention","redirectUrl":null,"customBlockResponseStatusCode":null,"customBlockResponseBody":null,"requestBodyCheck":"Disabled"},"customRules":{"rules":[]},"managedRules":{"managedRuleSets":[]},"frontendEndpointLinks":[],"routingRuleLinks":[],"securityPolicyLinks":[]}}' headers: cache-control: - no-cache content-length: - '808' content-type: - application/json; odata.metadata=minimal; odata.streaming=true date: - Thu, 01 Apr 2021 17:01:18 GMT expires: - '-1' odata-version: - '4.0' pragma: - no-cache server: - Kestrel strict-transport-security: - max-age=31536000; includeSubDomains transfer-encoding: - chunked vary: - Accept-Encoding x-content-type-options: - nosniff status: code: 200 message: OK - request: body: '{"location": "Global", "tags": {}, "properties": {"policySettings": {"enabledState": "Enabled", "mode": "Prevention", "requestBodyCheck": "Disabled"}, "customRules": {"rules": [{"name": "cli000003", "priority": 45, "enabledState": "Enabled", "ruleType": "RateLimitRule", "rateLimitDurationInMinutes": 5, "rateLimitThreshold": 10000, "matchConditions": [{"matchVariable": "RequestHeader", "selector": "value", "operator": "Contains", "matchValue": ["foo", "boo"]}, {"matchVariable": "RequestHeader", "operator": "Contains", "matchValue": ["foo", "boo"]}], "action": "Block"}, {"name": "cli000005", "priority": 75, "enabledState": "Enabled", "ruleType": "RateLimitRule", "rateLimitDurationInMinutes": 1, "rateLimitThreshold": 10000, "matchConditions": [{"matchVariable": "RequestUri", "operator": "Contains", "negateCondition": true, "matchValue": ["foo", "boo"]}], "action": "Log"}, {"name": "cli000006", "priority": 40, "enabledState": "Enabled", "ruleType": "MatchRule", "matchConditions": [{"matchVariable": "RequestUri", "operator": "Contains", "matchValue": ["foo", "boo"]}], "action": "Log"}]}, "managedRules": {"managedRuleSets": []}}, "sku": {"name": "Classic_AzureFrontDoor"}}' headers: Accept: - application/json Accept-Encoding: - gzip, deflate CommandName: - network front-door waf-policy rule update Connection: - keep-alive Content-Length: - '1229' Content-Type: - application/json; charset=utf-8 ParameterSetName: - -g --policy-name -n --priority User-Agent: - python/3.7.9 (Windows-10-10.0.19041-SP0) msrest/0.6.21 msrest_azure/0.6.3 azure-mgmt-frontdoor/0.3.0 Azure-SDK-For-Python AZURECLI/2.21.0 (MSI) accept-language: - en-US method: PUT uri: https://management.azure.com/subscriptions/00000000-0000-0000-0000-000000000000/resourceGroups/clitest.rg000001/providers/Microsoft.Network/FrontDoorWebApplicationFirewallPolicies/cli000002?api-version=2020-11-01 response: body: string: "{\n \"error\": {\n \"code\": \"BadRequest\",\n \"message\": \"WebApplicationFirewallPolicy validation failed. More information \\\"Selector must be set when using RequestHeader match variable\\\".\"\n }\n}" headers: cache-control: - no-cache content-length: - '194' content-type: - application/json date: - Thu, 01 Apr 2021 17:01:21 GMT expires: - '-1' pragma: - no-cache server: - Kestrel strict-transport-security: - max-age=31536000; includeSubDomains x-content-type-options: - nosniff x-ms-ratelimit-remaining-subscription-writes: - '1194' status: code: 400 message: Bad Request - request: body: '{"location": "Global", "tags": {}, "properties": {"policySettings": {"enabledState": "Enabled", "mode": "Prevention", "requestBodyCheck": "Disabled"}, "customRules": {"rules": [{"name": "cli000003", "priority": 45, "enabledState": "Enabled", "ruleType": "RateLimitRule", "rateLimitDurationInMinutes": 5, "rateLimitThreshold": 10000, "matchConditions": [{"matchVariable": "RequestHeader", "selector": "value", "operator": "Contains", "matchValue": ["foo", "boo"]}], "action": "Block"}, {"name": "cli000005", "priority": 75, "enabledState": "Enabled", "ruleType": "RateLimitRule", "rateLimitDurationInMinutes": 1, "rateLimitThreshold": 10000, "matchConditions": [{"matchVariable": "RequestUri", "operator": "Contains", "negateCondition": true, "matchValue": ["foo", "boo"]}], "action": "Log"}, {"name": "cli000006", "priority": 40, "enabledState": "Enabled", "ruleType": "MatchRule", "matchConditions": [{"matchVariable": "RequestUri", "operator": "Contains", "matchValue": ["foo", "boo"]}], "action": "Log"}]}, "managedRules": {"managedRuleSets": []}}, "sku": {"name": "Classic_AzureFrontDoor"}}' headers: Accept: - application/json Accept-Encoding: - gzip, deflate CommandName: - network front-door waf-policy rule update Connection: - keep-alive Content-Length: - '1139' Content-Type: - application/json; charset=utf-8 ParameterSetName: - -g --policy-name -n --priority User-Agent: - python/3.7.9 (Windows-10-10.0.19041-SP0) msrest/0.6.21 msrest_azure/0.6.3 azure-mgmt-frontdoor/0.3.0 Azure-SDK-For-Python AZURECLI/2.21.0 (MSI) accept-language: - en-US method: PUT uri: https://management.azure.com/subscriptions/00000000-0000-0000-0000-000000000000/resourceGroups/clitest.rg000001/providers/Microsoft.Network/FrontDoorWebApplicationFirewallPolicies/cli000002?api-version=2020-11-01 response: body: string: '{"name":"cli000002","id":"/subscriptions/00000000-0000-0000-0000-000000000000/resourcegroups/clitest.rg000001/providers/Microsoft.Network/frontdoorwebapplicationfirewallpolicies/cli000002","type":"Microsoft.Network/frontdoorwebapplicationfirewallpolicies","location":"Global","tags":{},"sku":{"name":"Classic_AzureFrontDoor"},"properties":{"resourceState":"Enabled","provisioningState":"Succeeded","policySettings":{"enabledState":"Enabled","mode":"Prevention","redirectUrl":null,"customBlockResponseStatusCode":null,"customBlockResponseBody":null,"requestBodyCheck":"Disabled"},"customRules":{"rules":[{"name":"cli000003","enabledState":"Enabled","priority":45,"ruleType":"RateLimitRule","rateLimitDurationInMinutes":5,"rateLimitThreshold":10000,"action":"Block","matchConditions":[{"matchVariable":"RequestHeader","selector":"value","operator":"Contains","negateCondition":false,"matchValue":["foo","boo"],"transforms":[]}]},{"name":"cli000005","enabledState":"Enabled","priority":75,"ruleType":"RateLimitRule","rateLimitDurationInMinutes":1,"rateLimitThreshold":10000,"action":"Log","matchConditions":[{"matchVariable":"RequestUri","selector":null,"operator":"Contains","negateCondition":true,"matchValue":["foo","boo"],"transforms":[]}]},{"name":"cli000006","enabledState":"Enabled","priority":40,"ruleType":"MatchRule","rateLimitDurationInMinutes":null,"rateLimitThreshold":null,"action":"Log","matchConditions":[{"matchVariable":"RequestUri","selector":null,"operator":"Contains","negateCondition":false,"matchValue":["foo","boo"],"transforms":[]}]}]},"managedRules":{"managedRuleSets":[]},"frontendEndpointLinks":[],"routingRuleLinks":[],"securityPolicyLinks":[]}}' headers: cache-control: - no-cache content-length: - '1805' content-type: - application/json; odata.metadata=minimal; odata.streaming=true date: - Thu, 01 Apr 2021 17:01:22 GMT expires: - '-1' odata-version: - '4.0' pragma: - no-cache server: - Kestrel strict-transport-security: - max-age=31536000; includeSubDomains transfer-encoding: - chunked vary: - Accept-Encoding x-content-type-options: - nosniff x-ms-ratelimit-remaining-subscription-writes: - '1194' status: code: 200 message: OK - request: body: null headers: Accept: - application/json Accept-Encoding: - gzip, deflate CommandName: - network front-door waf-policy rule list Connection: - keep-alive ParameterSetName: - -g --policy-name User-Agent: - python/3.7.9 (Windows-10-10.0.19041-SP0) msrest/0.6.21 msrest_azure/0.6.3 azure-mgmt-frontdoor/0.3.0 Azure-SDK-For-Python AZURECLI/2.21.0 (MSI) accept-language: - en-US method: GET uri: https://management.azure.com/subscriptions/00000000-0000-0000-0000-000000000000/resourceGroups/clitest.rg000001/providers/Microsoft.Network/FrontDoorWebApplicationFirewallPolicies/cli000002?api-version=2020-11-01 response: body: string: '{"name":"cli000002","id":"/subscriptions/00000000-0000-0000-0000-000000000000/resourcegroups/clitest.rg000001/providers/Microsoft.Network/frontdoorwebapplicationfirewallpolicies/cli000002","type":"Microsoft.Network/frontdoorwebapplicationfirewallpolicies","location":"Global","tags":{},"sku":{"name":"Classic_AzureFrontDoor"},"properties":{"resourceState":"Enabled","provisioningState":"Succeeded","policySettings":{"enabledState":"Enabled","mode":"Prevention","redirectUrl":null,"customBlockResponseStatusCode":null,"customBlockResponseBody":null,"requestBodyCheck":"Disabled"},"customRules":{"rules":[{"name":"cli000003","enabledState":"Enabled","priority":45,"ruleType":"RateLimitRule","rateLimitDurationInMinutes":5,"rateLimitThreshold":10000,"action":"Block","matchConditions":[{"matchVariable":"RequestHeader","selector":"value","operator":"Contains","negateCondition":false,"matchValue":["foo","boo"],"transforms":[]}]},{"name":"cli000005","enabledState":"Enabled","priority":75,"ruleType":"RateLimitRule","rateLimitDurationInMinutes":1,"rateLimitThreshold":10000,"action":"Log","matchConditions":[{"matchVariable":"RequestUri","selector":null,"operator":"Contains","negateCondition":true,"matchValue":["foo","boo"],"transforms":[]}]},{"name":"cli000006","enabledState":"Enabled","priority":40,"ruleType":"MatchRule","rateLimitDurationInMinutes":null,"rateLimitThreshold":null,"action":"Log","matchConditions":[{"matchVariable":"RequestUri","selector":null,"operator":"Contains","negateCondition":false,"matchValue":["foo","boo"],"transforms":[]}]}]},"managedRules":{"managedRuleSets":[]},"frontendEndpointLinks":[],"routingRuleLinks":[],"securityPolicyLinks":[]}}' headers: cache-control: - no-cache content-length: - '1805' content-type: - application/json; odata.metadata=minimal; odata.streaming=true date: - Thu, 01 Apr 2021 17:01:23 GMT expires: - '-1' odata-version: - '4.0' pragma: - no-cache server: - Kestrel strict-transport-security: - max-age=31536000; includeSubDomains transfer-encoding: - chunked vary: - Accept-Encoding x-content-type-options: - nosniff status: code: 200 message: OK - request: body: null headers: Accept: - application/json Accept-Encoding: - gzip, deflate CommandName: - network front-door waf-policy rule delete Connection: - keep-alive ParameterSetName: - -g --policy-name -n User-Agent: - python/3.7.9 (Windows-10-10.0.19041-SP0) msrest/0.6.21 msrest_azure/0.6.3 azure-mgmt-frontdoor/0.3.0 Azure-SDK-For-Python AZURECLI/2.21.0 (MSI) accept-language: - en-US method: GET uri: https://management.azure.com/subscriptions/00000000-0000-0000-0000-000000000000/resourceGroups/clitest.rg000001/providers/Microsoft.Network/FrontDoorWebApplicationFirewallPolicies/cli000002?api-version=2020-11-01 response: body: string: '{"name":"cli000002","id":"/subscriptions/00000000-0000-0000-0000-000000000000/resourcegroups/clitest.rg000001/providers/Microsoft.Network/frontdoorwebapplicationfirewallpolicies/cli000002","type":"Microsoft.Network/frontdoorwebapplicationfirewallpolicies","location":"Global","tags":{},"sku":{"name":"Classic_AzureFrontDoor"},"properties":{"resourceState":"Enabled","provisioningState":"Succeeded","policySettings":{"enabledState":"Enabled","mode":"Prevention","redirectUrl":null,"customBlockResponseStatusCode":null,"customBlockResponseBody":null,"requestBodyCheck":"Disabled"},"customRules":{"rules":[{"name":"cli000003","enabledState":"Enabled","priority":45,"ruleType":"RateLimitRule","rateLimitDurationInMinutes":5,"rateLimitThreshold":10000,"action":"Block","matchConditions":[{"matchVariable":"RequestHeader","selector":"value","operator":"Contains","negateCondition":false,"matchValue":["foo","boo"],"transforms":[]}]},{"name":"cli000005","enabledState":"Enabled","priority":75,"ruleType":"RateLimitRule","rateLimitDurationInMinutes":1,"rateLimitThreshold":10000,"action":"Log","matchConditions":[{"matchVariable":"RequestUri","selector":null,"operator":"Contains","negateCondition":true,"matchValue":["foo","boo"],"transforms":[]}]},{"name":"cli000006","enabledState":"Enabled","priority":40,"ruleType":"MatchRule","rateLimitDurationInMinutes":null,"rateLimitThreshold":null,"action":"Log","matchConditions":[{"matchVariable":"RequestUri","selector":null,"operator":"Contains","negateCondition":false,"matchValue":["foo","boo"],"transforms":[]}]}]},"managedRules":{"managedRuleSets":[]},"frontendEndpointLinks":[],"routingRuleLinks":[],"securityPolicyLinks":[]}}' headers: cache-control: - no-cache content-length: - '1805' content-type: - application/json; odata.metadata=minimal; odata.streaming=true date: - Thu, 01 Apr 2021 17:01:24 GMT expires: - '-1' odata-version: - '4.0' pragma: - no-cache server: - Kestrel strict-transport-security: - max-age=31536000; includeSubDomains transfer-encoding: - chunked vary: - Accept-Encoding x-content-type-options: - nosniff status: code: 200 message: OK - request: body: '{"location": "Global", "tags": {}, "properties": {"policySettings": {"enabledState": "Enabled", "mode": "Prevention", "requestBodyCheck": "Disabled"}, "customRules": {"rules": [{"name": "cli000003", "priority": 45, "enabledState": "Enabled", "ruleType": "RateLimitRule", "rateLimitDurationInMinutes": 5, "rateLimitThreshold": 10000, "matchConditions": [{"matchVariable": "RequestHeader", "selector": "value", "operator": "Contains", "negateCondition": false, "matchValue": ["foo", "boo"], "transforms": []}], "action": "Block"}, {"name": "cli000006", "priority": 40, "enabledState": "Enabled", "ruleType": "MatchRule", "matchConditions": [{"matchVariable": "RequestUri", "operator": "Contains", "negateCondition": false, "matchValue": ["foo", "boo"], "transforms": []}], "action": "Log"}]}, "managedRules": {"managedRuleSets": []}}, "sku": {"name": "Classic_AzureFrontDoor"}}' headers: Accept: - application/json Accept-Encoding: - gzip, deflate CommandName: - network front-door waf-policy rule delete Connection: - keep-alive Content-Length: - '905' Content-Type: - application/json; charset=utf-8 ParameterSetName: - -g --policy-name -n User-Agent: - python/3.7.9 (Windows-10-10.0.19041-SP0) msrest/0.6.21 msrest_azure/0.6.3 azure-mgmt-frontdoor/0.3.0 Azure-SDK-For-Python AZURECLI/2.21.0 (MSI) accept-language: - en-US method: PUT uri: https://management.azure.com/subscriptions/00000000-0000-0000-0000-000000000000/resourceGroups/clitest.rg000001/providers/Microsoft.Network/FrontDoorWebApplicationFirewallPolicies/cli000002?api-version=2020-11-01 response: body: string: '{"name":"cli000002","id":"/subscriptions/00000000-0000-0000-0000-000000000000/resourcegroups/clitest.rg000001/providers/Microsoft.Network/frontdoorwebapplicationfirewallpolicies/cli000002","type":"Microsoft.Network/frontdoorwebapplicationfirewallpolicies","location":"Global","tags":{},"sku":{"name":"Classic_AzureFrontDoor"},"properties":{"resourceState":"Enabled","provisioningState":"Succeeded","policySettings":{"enabledState":"Enabled","mode":"Prevention","redirectUrl":null,"customBlockResponseStatusCode":null,"customBlockResponseBody":null,"requestBodyCheck":"Disabled"},"customRules":{"rules":[{"name":"cli000003","enabledState":"Enabled","priority":45,"ruleType":"RateLimitRule","rateLimitDurationInMinutes":5,"rateLimitThreshold":10000,"action":"Block","matchConditions":[{"matchVariable":"RequestHeader","selector":"value","operator":"Contains","negateCondition":false,"matchValue":["foo","boo"],"transforms":[]}]},{"name":"cli000006","enabledState":"Enabled","priority":40,"ruleType":"MatchRule","rateLimitDurationInMinutes":null,"rateLimitThreshold":null,"action":"Log","matchConditions":[{"matchVariable":"RequestUri","selector":null,"operator":"Contains","negateCondition":false,"matchValue":["foo","boo"],"transforms":[]}]}]},"managedRules":{"managedRuleSets":[]},"frontendEndpointLinks":[],"routingRuleLinks":[],"securityPolicyLinks":[]}}' headers: cache-control: - no-cache content-length: - '1475' content-type: - application/json; odata.metadata=minimal; odata.streaming=true date: - Thu, 01 Apr 2021 17:01:25 GMT expires: - '-1' odata-version: - '4.0' pragma: - no-cache server: - Kestrel strict-transport-security: - max-age=31536000; includeSubDomains transfer-encoding: - chunked vary: - Accept-Encoding x-content-type-options: - nosniff x-ms-ratelimit-remaining-subscription-writes: - '1195' status: code: 200 message: OK - request: body: null headers: Accept: - application/json Accept-Encoding: - gzip, deflate CommandName: - network front-door waf-policy rule show Connection: - keep-alive ParameterSetName: - -g --policy-name -n User-Agent: - python/3.7.9 (Windows-10-10.0.19041-SP0) msrest/0.6.21 msrest_azure/0.6.3 azure-mgmt-frontdoor/0.3.0 Azure-SDK-For-Python AZURECLI/2.21.0 (MSI) accept-language: - en-US method: GET uri: https://management.azure.com/subscriptions/00000000-0000-0000-0000-000000000000/resourceGroups/clitest.rg000001/providers/Microsoft.Network/FrontDoorWebApplicationFirewallPolicies/cli000002?api-version=2020-11-01 response: body: string: '{"name":"cli000002","id":"/subscriptions/00000000-0000-0000-0000-000000000000/resourcegroups/clitest.rg000001/providers/Microsoft.Network/frontdoorwebapplicationfirewallpolicies/cli000002","type":"Microsoft.Network/frontdoorwebapplicationfirewallpolicies","location":"Global","tags":{},"sku":{"name":"Classic_AzureFrontDoor"},"properties":{"resourceState":"Enabled","provisioningState":"Succeeded","policySettings":{"enabledState":"Enabled","mode":"Prevention","redirectUrl":null,"customBlockResponseStatusCode":null,"customBlockResponseBody":null,"requestBodyCheck":"Disabled"},"customRules":{"rules":[{"name":"cli000003","enabledState":"Enabled","priority":45,"ruleType":"RateLimitRule","rateLimitDurationInMinutes":5,"rateLimitThreshold":10000,"action":"Block","matchConditions":[{"matchVariable":"RequestHeader","selector":"value","operator":"Contains","negateCondition":false,"matchValue":["foo","boo"],"transforms":[]}]},{"name":"cli000006","enabledState":"Enabled","priority":40,"ruleType":"MatchRule","rateLimitDurationInMinutes":null,"rateLimitThreshold":null,"action":"Log","matchConditions":[{"matchVariable":"RequestUri","selector":null,"operator":"Contains","negateCondition":false,"matchValue":["foo","boo"],"transforms":[]}]}]},"managedRules":{"managedRuleSets":[]},"frontendEndpointLinks":[],"routingRuleLinks":[],"securityPolicyLinks":[]}}' headers: cache-control: - no-cache content-length: - '1475' content-type: - application/json; odata.metadata=minimal; odata.streaming=true date: - Thu, 01 Apr 2021 17:01:27 GMT expires: - '-1' odata-version: - '4.0' pragma: - no-cache server: - Kestrel strict-transport-security: - max-age=31536000; includeSubDomains transfer-encoding: - chunked vary: - Accept-Encoding x-content-type-options: - nosniff status: code: 200 message: OK - request: body: null headers: Accept: - application/json Accept-Encoding: - gzip, deflate CommandName: - network front-door waf-policy rule list Connection: - keep-alive ParameterSetName: - -g --policy-name User-Agent: - python/3.7.9 (Windows-10-10.0.19041-SP0) msrest/0.6.21 msrest_azure/0.6.3 azure-mgmt-frontdoor/0.3.0 Azure-SDK-For-Python AZURECLI/2.21.0 (MSI) accept-language: - en-US method: GET uri: https://management.azure.com/subscriptions/00000000-0000-0000-0000-000000000000/resourceGroups/clitest.rg000001/providers/Microsoft.Network/FrontDoorWebApplicationFirewallPolicies/cli000002?api-version=2020-11-01 response: body: string: '{"name":"cli000002","id":"/subscriptions/00000000-0000-0000-0000-000000000000/resourcegroups/clitest.rg000001/providers/Microsoft.Network/frontdoorwebapplicationfirewallpolicies/cli000002","type":"Microsoft.Network/frontdoorwebapplicationfirewallpolicies","location":"Global","tags":{},"sku":{"name":"Classic_AzureFrontDoor"},"properties":{"resourceState":"Enabled","provisioningState":"Succeeded","policySettings":{"enabledState":"Enabled","mode":"Prevention","redirectUrl":null,"customBlockResponseStatusCode":null,"customBlockResponseBody":null,"requestBodyCheck":"Disabled"},"customRules":{"rules":[{"name":"cli000003","enabledState":"Enabled","priority":45,"ruleType":"RateLimitRule","rateLimitDurationInMinutes":5,"rateLimitThreshold":10000,"action":"Block","matchConditions":[{"matchVariable":"RequestHeader","selector":"value","operator":"Contains","negateCondition":false,"matchValue":["foo","boo"],"transforms":[]}]},{"name":"cli000006","enabledState":"Enabled","priority":40,"ruleType":"MatchRule","rateLimitDurationInMinutes":null,"rateLimitThreshold":null,"action":"Log","matchConditions":[{"matchVariable":"RequestUri","selector":null,"operator":"Contains","negateCondition":false,"matchValue":["foo","boo"],"transforms":[]}]}]},"managedRules":{"managedRuleSets":[]},"frontendEndpointLinks":[],"routingRuleLinks":[],"securityPolicyLinks":[]}}' headers: cache-control: - no-cache content-length: - '1475' content-type: - application/json; odata.metadata=minimal; odata.streaming=true date: - Thu, 01 Apr 2021 17:01:27 GMT expires: - '-1' odata-version: - '4.0' pragma: - no-cache server: - Kestrel strict-transport-security: - max-age=31536000; includeSubDomains transfer-encoding: - chunked vary: - Accept-Encoding x-content-type-options: - nosniff status: code: 200 message: OK version: 1
52.550193
1,687
0.672275
a6dc5a67559ccaa2a4f134bc8e1f3ae567b5594a
215
yml
YAML
.travis.yml
00Kai0/fastapi
1f03e85f06aa71ad1704a56d56b734fbac5a016f
[ "MIT" ]
3
2019-03-15T02:44:48.000Z
2020-03-14T15:42:52.000Z
.travis.yml
00Kai0/fastapi
1f03e85f06aa71ad1704a56d56b734fbac5a016f
[ "MIT" ]
null
null
null
.travis.yml
00Kai0/fastapi
1f03e85f06aa71ad1704a56d56b734fbac5a016f
[ "MIT" ]
null
null
null
language: python cache: pip python: - "3.6" - "3.7-dev" install: - pip install flit - flit install script: - bash scripts/test.sh after_script: - bash <(curl -s https://codecov.io/bash)
11.944444
45
0.6
ab9973eebd0aae7e859ada67da6e0edbd34f117c
631
yml
YAML
.travis.yml
00Kai0/pgcontents
365b40961d6ebfc1d010d2a283ed02a3a1018c6e
[ "Apache-2.0" ]
null
null
null
.travis.yml
00Kai0/pgcontents
365b40961d6ebfc1d010d2a283ed02a3a1018c6e
[ "Apache-2.0" ]
null
null
null
.travis.yml
00Kai0/pgcontents
365b40961d6ebfc1d010d2a283ed02a3a1018c6e
[ "Apache-2.0" ]
2
2019-06-06T13:20:05.000Z
2019-12-28T18:32:17.000Z
language: python sudo: false python: - "2.7" - "3.4" - "3.6" env: - NB_VERSION=4 - NB_VERSION=5 - FLAKE8=true NB_VERSION=5 - NOTEST=true NB_VERSION=5 addons: postgresql: "9.3" install: - pip install tox script: - if [[ $TRAVIS_PYTHON_VERSION = '2.7' ]]; then tox -e py27-notebook$NB_VERSION; fi - if [[ $TRAVIS_PYTHON_VERSION = '3.4' ]]; then tox -e py34-notebook$NB_VERSION; fi - if [[ $TRAVIS_PYTHON_VERSION = '3.6' ]]; then tox -e py36-notebook$NB_VERSION; fi - if [[ $FLAKE8 = 'true' ]]; then tox -e notest; fi - if [[ $NOTEST = 'true' ]]; then tox -e flake8; fi branches: only: - master
21.033333
85
0.619651
0bf3a5fb141101d2a6a9bd0e041f73c6cb61fc62
200
yml
YAML
.travis.yml
00LT00/caddy-authz
6c41de3ad7fa61fea8f1c0448f8f0a74d1a8090a
[ "Apache-2.0" ]
2
2021-02-24T19:59:52.000Z
2021-07-27T22:24:23.000Z
.travis.yml
00LT00/caddy-authz
6c41de3ad7fa61fea8f1c0448f8f0a74d1a8090a
[ "Apache-2.0" ]
1
2021-09-20T10:44:16.000Z
2021-09-20T10:44:16.000Z
.travis.yml
00LT00/caddy-authz
6c41de3ad7fa61fea8f1c0448f8f0a74d1a8090a
[ "Apache-2.0" ]
1
2021-02-24T20:01:11.000Z
2021-02-24T20:01:11.000Z
language: go sudo: false go: - 1.12.5 env: - GO111MODULE=on before_install: - go get github.com/mattn/goveralls install: - go get -t ./... script: - $GOPATH/bin/goveralls -service=travis-ci
10.526316
44
0.675
e7f2755f55d18d9bd6d45b3c6671ecf16cf0a50d
4,441
yml
YAML
_config.yml
00X0h0st/00X0h0st.github.io
86cfeabfd5564111287bf7362884e1049ed8e4f3
[ "Apache-2.0" ]
null
null
null
_config.yml
00X0h0st/00X0h0st.github.io
86cfeabfd5564111287bf7362884e1049ed8e4f3
[ "Apache-2.0" ]
null
null
null
_config.yml
00X0h0st/00X0h0st.github.io
86cfeabfd5564111287bf7362884e1049ed8e4f3
[ "Apache-2.0" ]
null
null
null
# Welcome to Jekyll! # # This config file is meant for settings that affect your whole blog, values # which you are expected to set up once and rarely need to edit after that. # For technical reasons, this file is *NOT* reloaded automatically when you use # 'jekyll serve'. If you change this file, please restart the server process. # Site settings title: 纯洁的微笑 subtitle: 分享技术,品味人生 name: 纯洁的微笑 email: [email protected] description: 本站是纯洁的微笑的技术分享博客。内容涵盖生活故事、Java后端技术、Spring Boot、Spring Cloud、微服务架构、大数据演进、高可用架构、中间件使用、系统监控等相关的研究与知识分享。 keywords: ityouknow,纯洁的微笑,Spring,Spring Boot,Spring Cloud,MongoDB,Jvm,Docker,生活故事,架构,大数据,一线,FastDFS,开发者,编程,代码,开源,IT网站,Developer,Programmer,Coder,Geek,IT技术博客,Java,Python, encoding: "utf-8" favicon: favicon.ico repository: 00X0h0st/00X0h0st.github.io github_url: https://github.com/00X0h0st url: http://www.lishiqian.top enforce_ssl: lishiqian.top ## Gem plugins: - jekyll-paginate - jekyll-geo-pattern - rouge - kramdown - jekyll-github-metadata - jekyll-octicons # Build settings markdown: kramdown highlighter: rouge lsi: false excerpt_separator: "\n\n" source: . destination: ./_site quiet: false defaults: [] kramdown: input: GFM enable_coderay: true syntax_highlighter: rouge syntax_highlighter_opts: coderay_line_numbers: nil # Pagination paginate: 12 paginate_path: 'page:num' # Navigation. top menu list menus: - href: /zsxq.html label: 星球 target: _self - href: /gitchat.html label: Chat target: _self - href: http://gk.link/a/103Gb label: 极客 target: _blank - href: /life.html label: 故事 target: _self - href: /arch.html label: 架构 target: _self - href: /link.html label: 友链 target: _self # Navigation. main menu list navs: - href: / label: Home - href: /spring-boot.html label: Spring Boot target: _self subnav: - subHref: /spring-boot.html subLabel: Spring Boot - subHref: /spring-cloud.html subLabel: Spring Cloud - href: /spring-cloud.html label: Spring Cloud target: _self - href: http://www.justdojava.com label: Java target: _blank - href: /archives.html label: Archives target: _self - href: /about.html label: About target: _self # labels. my blog key words labels: - href: /payment.html label: 支付 target: _self - href: /fastdfs.html label: FastDFS target: _blank - href: /mongodb.html label: MongoDB target: _blank - href: /docker.html label: Docker target: _blank - href: /open-source.html label: Code target: _blank - href: /it.html label: IT target: _blank - href: /python.html label: Python target: _blank # selected articles classes: - href: /life.html name: 我的故事 describe: 生活就是故事,故事就是生活 - href: /arch.html name: 架构师之路 describe: 一个架构师的自我修养 - href: /java.html name: Java 系列文章 describe: Java 之根基,Java 程序员必学 # ---------------- # # RSS # # ---------------- # subscribe_rss: /feed.xml # Sidebar to show popular repo side_bar_repo_limit: 6 # Number of repos to show # Google Analytics # analytics : # provider : google # google : # tracking_id : '' # ex. UA-72165600-X # For about.html. Fell free to create your own! skill_software_keywords: [Java, MySQL, Oracle, Design Patterns] skill_j2ee_keywords: [Spring, Struct, Hibernet, MyBatis, JSP] skill_web_keywords: [HTML, CSS, JS, JQuery, Ajax, NodeJS, ExpressJS, MongoDB, Redis, PHP, Boostrap] skill_mobile_app_keywords: [vuejs, hyhird app] # ---------------- # # Comments # # ---------------- # # support provider: disqus, gitment, gitalk comments_provider: gitalk # !!!重要!!! 请修改下面这些信息为你自己申请的 # !!!Important!!! Please modify infos below to yours # https://disqus.com disqus: username: ityouknow # https://imsun.net/posts/gitment-introduction/ gitment: owner: ityouknow repo: blog-comments oauth: client_id: 61bfc53d957e74e78f8f client_secret: 31c61e66cdcc9ada8db2267ee779d0bdafac434c # https://github.com/gitalk/gitalk#install gitalk: owner: ityouknow repo: blog-comments clientID: 61bfc53d957e74e78f8f clientSecret: 31c61e66cdcc9ada8db2267ee779d0bdafac434c # 在使用其它评论组件时可点击显示 Disqus lazy_load_disqus : true
18.504167
169
0.661788
213ef172b220cef174cdb57e040f980801fb6c73
922
yaml
YAML
manifests/controllers/01_deployment_multi_cluster_scheduler.yaml
00ahui/mck8s
d7742e11a19b34c21095e5a6b10b3e4d07f8a5e7
[ "Apache-2.0" ]
2
2021-08-19T11:29:18.000Z
2021-08-31T11:58:04.000Z
manifests/controllers/01_deployment_multi_cluster_scheduler.yaml
00ahui/mck8s
d7742e11a19b34c21095e5a6b10b3e4d07f8a5e7
[ "Apache-2.0" ]
null
null
null
manifests/controllers/01_deployment_multi_cluster_scheduler.yaml
00ahui/mck8s
d7742e11a19b34c21095e5a6b10b3e4d07f8a5e7
[ "Apache-2.0" ]
null
null
null
apiVersion: apps/v1 kind: Deployment metadata: name: multiclusterscheduler spec: replicas: 1 selector: matchLabels: app: multiclusterscheduler template: metadata: labels: app: multiclusterscheduler spec: serviceAccountName: rbac-mck8s containers: - image: mck8s-scheduler name: mcs imagePullPolicy: IfNotPresent - env: - name: PYTHONUNBUFFERED value: "0" - name: PROMETHEUS_DEMO_SERVICE_SERVICE_HOST value: 8.46.188.21 - name: PROMETHEUS_DEMO_SERVICE_SERVICE_PORT value: "30003" volumeMounts: - mountPath: /root/.kube/config name: kube-config #resources: # requests: # cpu: 1 # memory: 1024Mi volumes: - name: kube-config hostPath: path: /root/.kube/config type: File
23.05
54
0.572668
16836775ff5e3f3d0f9395e5e0c6117e8d8ab944
639
yaml
YAML
manifests/controllers/02_deployment_multi_cluster_hpa.yaml
00ahui/mck8s
d7742e11a19b34c21095e5a6b10b3e4d07f8a5e7
[ "Apache-2.0" ]
2
2021-08-19T11:29:18.000Z
2021-08-31T11:58:04.000Z
manifests/controllers/02_deployment_multi_cluster_hpa.yaml
00ahui/mck8s
d7742e11a19b34c21095e5a6b10b3e4d07f8a5e7
[ "Apache-2.0" ]
null
null
null
manifests/controllers/02_deployment_multi_cluster_hpa.yaml
00ahui/mck8s
d7742e11a19b34c21095e5a6b10b3e4d07f8a5e7
[ "Apache-2.0" ]
null
null
null
apiVersion: apps/v1 kind: Deployment metadata: name: mchpa spec: replicas: 1 selector: matchLabels: app: mchpa template: metadata: labels: app: mchpa spec: serviceAccountName: rbac-mck8s containers: - image: mck8s-autoscaler name: mchpa imagePullPolicy: IfNotPresent volumeMounts: - mountPath: /root/.kube/config name: kube-config #resources: # requests: # cpu: 1000m # memory: 1024Mi volumes: - name: kube-config hostPath: path: /root/.kube/config type: File
19.96875
39
0.555556
b3ebfd1b712622f62ad8b7d83bab43017254fc1e
689
yaml
YAML
manifests/controllers/03_deployment_cloud_provisioner_cluster_autoscaler.yaml
00ahui/mck8s
d7742e11a19b34c21095e5a6b10b3e4d07f8a5e7
[ "Apache-2.0" ]
2
2021-08-19T11:29:18.000Z
2021-08-31T11:58:04.000Z
manifests/controllers/03_deployment_cloud_provisioner_cluster_autoscaler.yaml
00ahui/mck8s
d7742e11a19b34c21095e5a6b10b3e4d07f8a5e7
[ "Apache-2.0" ]
null
null
null
manifests/controllers/03_deployment_cloud_provisioner_cluster_autoscaler.yaml
00ahui/mck8s
d7742e11a19b34c21095e5a6b10b3e4d07f8a5e7
[ "Apache-2.0" ]
null
null
null
apiVersion: apps/v1 kind: Deployment metadata: name: cloud-provisioner spec: replicas: 1 selector: matchLabels: app: cloud-provisioner template: metadata: labels: app: cloud-provisioner spec: serviceAccountName: rbac-mck8s containers: - image: mck8s-provisioner name: cloud-provisioner imagePullPolicy: IfNotPresent volumeMounts: - mountPath: /root/.kube/config name: kube-config #resources: # requests: # cpu: 1000m # memory: 1024Mi volumes: - name: kube-config hostPath: path: /root/.kube/config type: File
20.878788
39
0.580552
3861b466eba2a857b8813b6024c533ae5daf090b
1,454
yml
YAML
_config.yml
00aney/00aney.github.com
7b216c7b1fafa017abac0da2376885b40b6200b1
[ "MIT" ]
null
null
null
_config.yml
00aney/00aney.github.com
7b216c7b1fafa017abac0da2376885b40b6200b1
[ "MIT" ]
null
null
null
_config.yml
00aney/00aney.github.com
7b216c7b1fafa017abac0da2376885b40b6200b1
[ "MIT" ]
null
null
null
# ################################### # Site wide configuration #################################### # title: Aney's Blog email: [email protected] description: iOS developer url: # the base hostname & protocol for your site # ################################### # Jekyll configuration #################################### # #timezone: Europe/Paris markdown: kramdown #highlighter: rouge excerpt_separator: <!--more--> permalink: /articles/:year-:month/:title kramdown: auto_ids: true footnote_nr: 1 entity_output: as_char toc_levels: 1..6 enable_coderay: false # ################################### # Site Owner configuration #################################### # owner: name: Aney avatar: 20268356.jpeg job: "iOS Developer" bio: "" email: [email protected] disqus-shortname: twitter: #username facebook: #username google: plus: #username analytics: verify: ad-client: ad-slot: bing-verify: github: 00aney gitlab: #username stackoverflow: #123456/username from a "http://stackoverflow.com/users/123456/username" link linkedin: #username skype: #username xing: #username instagram: #username lastfm: #username tumblr: #username pinterest: #username foursquare: #username steam: #username dribbble: #username youtube: #username soundcloud: #username weibo: #username flickr: #username 500px: #username codepen: #username
20.771429
96
0.59216
55a2f6f10586034ae5a9c090f8421d865cd61ce6
341
yml
YAML
.travis.yml
00aney/TDKFrame
df9ac38f37ad486587798e3daf217d72d3aa281f
[ "MIT" ]
1
2017-03-29T13:06:47.000Z
2017-03-29T13:06:47.000Z
.travis.yml
00aney/TDKFrame
df9ac38f37ad486587798e3daf217d72d3aa281f
[ "MIT" ]
null
null
null
.travis.yml
00aney/TDKFrame
df9ac38f37ad486587798e3daf217d72d3aa281f
[ "MIT" ]
null
null
null
language: objective-c osx_image: xcode8.2 sudo: false #before_install: # - gem install fastlane #install: # - pod install #before_script: # - fastlane snapshot reset_simulators --force #script: # - xcodebuild clean build test -project TDKFrame.xcodeproj -scheme TDKFrame -destination "platform=iOS Simulator,name=iPhone 7,OS=10.2”
18.944444
137
0.753666
d4e27490875c931d73bbe7a0f37f94c237f10d1e
647
yml
YAML
.circleci/config.yml
00aney/blog
f9a90445568fca8f8308d1808e173ee84b94af52
[ "MIT" ]
1
2017-03-21T18:00:18.000Z
2017-03-21T18:00:18.000Z
.circleci/config.yml
00aney/blog
f9a90445568fca8f8308d1808e173ee84b94af52
[ "MIT" ]
null
null
null
.circleci/config.yml
00aney/blog
f9a90445568fca8f8308d1808e173ee84b94af52
[ "MIT" ]
null
null
null
version: 2 jobs: build: docker: # run the steps with Docker - image: circleci/node:8 steps: - checkout - run: name: update npm command: 'sudo npm install -g npm@latest' - restore_cache: key: dependency-cache-{{ checksum "package.json" }} - run: name: Install node modules command: npm install - save_cache: key: dependency-cache-{{ checksum "package.json" }} paths: - ./node_modules - run: name: test command: echo "no test" - run: name: build command: npm run build
24.884615
61
0.51932
ab489717e935c16e7eb47ab90607017652a3e195
1,904
yaml
YAML
deploy/pyspark-driver-pod.yaml
00anupam00/comparative-analysis
e7c630e9706a9be1144dd484340c1c826ded0d65
[ "Apache-2.0" ]
null
null
null
deploy/pyspark-driver-pod.yaml
00anupam00/comparative-analysis
e7c630e9706a9be1144dd484340c1c826ded0d65
[ "Apache-2.0" ]
null
null
null
deploy/pyspark-driver-pod.yaml
00anupam00/comparative-analysis
e7c630e9706a9be1144dd484340c1c826ded0d65
[ "Apache-2.0" ]
null
null
null
apiVersion: v1 kind: Pod metadata: labels: app-name: pyspark-pi-${PRIORITY_CLASS_NAME}${NAME_SUFFIX} spark-role: driver name: pyspark-pi-${PRIORITY_CLASS_NAME}${NAME_SUFFIX}-driver namespace: ${NAMESPACE} spec: containers: - name: pyspark-pi image: eu.gcr.io/yippee-spark-k8s/spark-py:3.0.1 imagePullPolicy: IfNotPresent ports: - containerPort: 5678 name: headless-svc - containerPort: 4040 name: web-ui resources: requests: memory: 512Mi cpu: 1 limits: cpu: 1200m env: # Overriding configuration directory - name: SPARK_CONF_DIR value: /spark-conf - name: SPARK_HOME value: /opt/spark # Configure all key-value pairs in ConfigMap as container environment variables envFrom: - configMapRef: name: pyspark-pi-${PRIORITY_CLASS_NAME}${NAME_SUFFIX}-cm args: - $(SPARK_HOME)/bin/spark-submit - /opt/spark/examples/src/main/python/pi.py - "10" volumeMounts: - name: spark-config mountPath: /spark-conf readOnly: true affinity: nodeAffinity: requiredDuringSchedulingIgnoredDuringExecution: nodeSelectorTerms: - matchExpressions: - key: type operator: In values: [${DRIVER_NODE_AFFINITIES}] priorityClassName: ${PRIORITY_CLASS_NAME} restartPolicy: OnFailure schedulerName: volcano serviceAccountName: ${SERVICE_ACCOUNT_NAME} volumes: # Add the executor pod template in read-only volume, for the driver to read - name: spark-config configMap: name: pyspark-pi-${PRIORITY_CLASS_NAME}${NAME_SUFFIX}-cm items: - key: spark-defaults.conf path: spark-defaults.conf - key: spark-env.sh path: spark-env.sh - key: executor-pod-template.yaml path: executor-pod-template.yaml
28.848485
83
0.643908
30e814ae02a2caa3c887f16d4fe4511085b2914b
598
yaml
YAML
deploy/service-account.yaml
00anupam00/comparative-analysis
e7c630e9706a9be1144dd484340c1c826ded0d65
[ "Apache-2.0" ]
null
null
null
deploy/service-account.yaml
00anupam00/comparative-analysis
e7c630e9706a9be1144dd484340c1c826ded0d65
[ "Apache-2.0" ]
null
null
null
deploy/service-account.yaml
00anupam00/comparative-analysis
e7c630e9706a9be1144dd484340c1c826ded0d65
[ "Apache-2.0" ]
null
null
null
apiVersion: v1 kind: ServiceAccount metadata: name: spark-sa --- kind: ClusterRole apiVersion: rbac.authorization.k8s.io/v1 metadata: namespace: default name: spark-role rules: - apiGroups: [""] resources: ["pods", "services", "configmaps" ] verbs: ["create", "get", "watch", "list", "post", "delete" ] --- kind: ClusterRoleBinding apiVersion: rbac.authorization.k8s.io/v1 metadata: name: spark-role-binding namespace: default subjects: - kind: ServiceAccount name: spark-sa namespace: default roleRef: kind: ClusterRole name: spark-role apiGroup: rbac.authorization.k8s.io
21.357143
63
0.720736
ff4d1cc820ec20259d8fdaebfda3c01c7a85f913
32,753
yaml
YAML
bitnami/etcd/values.yaml
00arthur00/charts
502aa1e64541669b732a4eda896e5937847b6c3c
[ "Apache-2.0" ]
null
null
null
bitnami/etcd/values.yaml
00arthur00/charts
502aa1e64541669b732a4eda896e5937847b6c3c
[ "Apache-2.0" ]
2
2022-01-26T01:14:30.000Z
2022-01-26T07:03:39.000Z
bitnami/etcd/values.yaml
00arthur00/charts
502aa1e64541669b732a4eda896e5937847b6c3c
[ "Apache-2.0" ]
null
null
null
## @section Global parameters ## Global Docker image parameters ## Please, note that this will override the image parameters, including dependencies, configured to use the global value ## Current available global Docker image parameters: imageRegistry, imagePullSecrets and storageClass ## @param global.imageRegistry Global Docker image registry ## @param global.imagePullSecrets [array] Global Docker registry secret names as an array ## @param global.storageClass Global StorageClass for Persistent Volume(s) ## global: imageRegistry: "" ## E.g. ## imagePullSecrets: ## - myRegistryKeySecretName ## imagePullSecrets: [] storageClass: "" ## @section Common parameters ## @param kubeVersion Force target Kubernetes version (using Helm capabilities if not set) ## kubeVersion: "" ## @param nameOverride String to partially override common.names.fullname template (will maintain the release name) ## nameOverride: "" ## @param fullnameOverride String to fully override common.names.fullname template ## fullnameOverride: "" ## @param commonLabels [object] Labels to add to all deployed objects ## commonLabels: {} ## @param commonAnnotations [object] Annotations to add to all deployed objects ## commonAnnotations: {} ## @param clusterDomain Default Kubernetes cluster domain ## clusterDomain: cluster.local ## @param extraDeploy [array] Array of extra objects to deploy with the release ## extraDeploy: [] ## Enable diagnostic mode in the deployment ## diagnosticMode: ## @param diagnosticMode.enabled Enable diagnostic mode (all probes will be disabled and the command will be overridden) ## enabled: false ## @param diagnosticMode.command Command to override all containers in the deployment ## command: - sleep ## @param diagnosticMode.args Args to override all containers in the deployment ## args: - infinity ## @section etcd parameters ## Bitnami etcd image version ## ref: https://hub.docker.com/r/bitnami/etcd/tags/ ## @param image.registry etcd image registry ## @param image.repository etcd image name ## @param image.tag etcd image tag ## @param image.pullPolicy etcd image pull policy ## @param image.pullSecrets [array] etcd image pull secrets ## @param image.debug Enable image debug mode ## image: registry: docker.io repository: bitnami/etcd tag: 3.5.2-debian-10-r39 ## Specify a imagePullPolicy ## Defaults to 'Always' if image tag is 'latest', else set to 'IfNotPresent' ## ref: https://kubernetes.io/docs/user-guide/images/#pre-pulling-images ## pullPolicy: IfNotPresent ## Optionally specify an array of imagePullSecrets. ## Secrets must be manually created in the namespace. ## ref: https://kubernetes.io/docs/tasks/configure-pod-container/pull-image-private-registry/ ## e.g: ## pullSecrets: ## - myRegistryKeySecretName ## pullSecrets: [] ## Set to true if you would like to see extra information on logs ## debug: false ## Authentication parameters ## auth: ## Role-based access control parameters ## ref: https://etcd.io/docs/current/op-guide/authentication/ ## rbac: ## @param auth.rbac.create Switch to enable RBAC authentication ## create: true ## @param auth.rbac.allowNoneAuthentication Allow to use etcd without configuring RBAC authentication ## allowNoneAuthentication: true ## @param auth.rbac.rootPassword Root user password. The root user is always `root` ## rootPassword: "" ## @param auth.rbac.existingSecret Name of the existing secret containing credentials for the root user ## existingSecret: "" ## @param auth.rbac.existingSecretPasswordKey Name of key containing password to be retrieved from the existing secret ## existingSecretPasswordKey: "" ## Authentication token ## ref: https://etcd.io/docs/latest/learning/design-auth-v3/#two-types-of-tokens-simple-and-jwt ## token: ## @param auth.token.type Authentication token type. Allowed values: 'simple' or 'jwt' ## ref: https://etcd.io/docs/latest/op-guide/configuration/#--auth-token ## type: jwt ## @param auth.token.privateKey.filename Name of the file containing the private key for signing the JWT token ## @param auth.token.privateKey.existingSecret Name of the existing secret containing the private key for signing the JWT token ## NOTE: Ignored if auth.token.type=simple ## NOTE: A secret containing a private key will be auto-generated if an existing one is not provided. ## privateKey: filename: jwt-token.pem existingSecret: "" ## @param auth.token.signMethod JWT token sign method ## NOTE: Ignored if auth.token.type=simple ## signMethod: RS256 ## @param auth.token.ttl JWT token TTL ## NOTE: Ignored if auth.token.type=simple ## ttl: 10m ## TLS authentication for client-to-server communications ## ref: https://etcd.io/docs/current/op-guide/security/ ## client: ## @param auth.client.secureTransport Switch to encrypt client-to-server communications using TLS certificates ## secureTransport: false ## @param auth.client.useAutoTLS Switch to automatically create the TLS certificates ## useAutoTLS: false ## @param auth.client.existingSecret Name of the existing secret containing the TLS certificates for client-to-server communications ## existingSecret: "" ## @param auth.client.enableAuthentication Switch to enable host authentication using TLS certificates. Requires existing secret ## enableAuthentication: false ## @param auth.client.certFilename Name of the file containing the client certificate ## certFilename: cert.pem ## @param auth.client.certKeyFilename Name of the file containing the client certificate private key ## certKeyFilename: key.pem ## @param auth.client.caFilename Name of the file containing the client CA certificate ## If not specified and `auth.client.enableAuthentication=true` or `auth.rbac.enabled=true`, the default is is `ca.crt` ## caFilename: "" ## TLS authentication for server-to-server communications ## ref: https://etcd.io/docs/current/op-guide/security/ ## peer: ## @param auth.peer.secureTransport Switch to encrypt server-to-server communications using TLS certificates ## secureTransport: false ## @param auth.peer.useAutoTLS Switch to automatically create the TLS certificates ## useAutoTLS: false ## @param auth.peer.existingSecret Name of the existing secret containing the TLS certificates for server-to-server communications ## existingSecret: "" ## @param auth.peer.enableAuthentication Switch to enable host authentication using TLS certificates. Requires existing secret ## enableAuthentication: false ## @param auth.peer.certFilename Name of the file containing the peer certificate ## certFilename: cert.pem ## @param auth.peer.certKeyFilename Name of the file containing the peer certificate private key ## certKeyFilename: key.pem ## @param auth.peer.caFilename Name of the file containing the peer CA certificate ## If not specified and `auth.peer.enableAuthentication=true` or `rbac.enabled=true`, the default is is `ca.crt` ## caFilename: "" ## @param autoCompactionMode Auto compaction mode, by default periodic. Valid values: "periodic", "revision". ## - 'periodic' for duration based retention, defaulting to hours if no time unit is provided (e.g. 5m). ## - 'revision' for revision number based retention. ## autoCompactionMode: "" ## @param autoCompactionRetention Auto compaction retention for mvcc key value store in hour, by default 0, means disabled ## autoCompactionRetention: "" ## @param initialClusterState Initial cluster state. Allowed values: 'new' or 'existing' ## If this values is not set, the default values below are set: ## - 'new': when installing the chart ('helm install ...') ## - 'existing': when upgrading the chart ('helm upgrade ...') ## initialClusterState: "" ## @param maxProcs Limits the number of operating system threads that can execute user-level ## Go code simultaneously by setting GOMAXPROCS environment variable ## ref: https://golang.org/pkg/runtime ## maxProcs: "" ## @param removeMemberOnContainerTermination Use a PreStop hook to remove the etcd members from the etcd cluster on container termination ## they the containers are terminated ## NOTE: Ignored if lifecycleHooks is set or replicaCount=1 ## removeMemberOnContainerTermination: true ## @param configuration etcd configuration. Specify content for etcd.conf.yml ## e.g: ## configuration: |- ## foo: bar ## baz: ## configuration: "" ## @param existingConfigmap Existing ConfigMap with etcd configuration ## NOTE: When it's set the configuration parameter is ignored ## existingConfigmap: "" ## @param extraEnvVars [array] Extra environment variables to be set on etcd container ## e.g: ## extraEnvVars: ## - name: FOO ## value: "bar" ## extraEnvVars: [] ## @param extraEnvVarsCM Name of existing ConfigMap containing extra env vars ## extraEnvVarsCM: "" ## @param extraEnvVarsSecret Name of existing Secret containing extra env vars ## extraEnvVarsSecret: "" ## @param command [array] Default container command (useful when using custom images) ## command: [] ## @param args [array] Default container args (useful when using custom images) ## args: [] ## @section etcd statefulset parameters ## @param replicaCount Number of etcd replicas to deploy ## replicaCount: 1 ## Update strategy ## ref: https://kubernetes.io/docs/concepts/workloads/controllers/statefulset/#update-strategies ## @param updateStrategy.type Update strategy type, can be set to RollingUpdate or OnDelete. ## updateStrategy: type: RollingUpdate ## @param podManagementPolicy Pod management policy for the etcd statefulset ## ref: https://kubernetes.io/docs/concepts/workloads/controllers/statefulset/#pod-management-policies ## podManagementPolicy: Parallel ## @param hostAliases [array] etcd pod host aliases ## ref: https://kubernetes.io/docs/concepts/services-networking/add-entries-to-pod-etc-hosts-with-host-aliases/ ## hostAliases: [] ## @param lifecycleHooks [object] Override default etcd container hooks ## lifecycleHooks: {} ## etcd container ports to open ## @param containerPorts.client Client port to expose at container level ## @param containerPorts.peer Peer port to expose at container level ## containerPorts: client: 2379 peer: 2380 ## etcd pods' Security Context ## ref: https://kubernetes.io/docs/tasks/configure-pod-container/security-context/#set-the-security-context-for-a-pod ## @param podSecurityContext.enabled Enabled etcd pods' Security Context ## @param podSecurityContext.fsGroup Set etcd pod's Security Context fsGroup ## podSecurityContext: enabled: true fsGroup: 1001 ## etcd containers' SecurityContext ## ref: https://kubernetes.io/docs/tasks/configure-pod-container/security-context/#set-the-security-context-for-a-container ## @param containerSecurityContext.enabled Enabled etcd containers' Security Context ## @param containerSecurityContext.runAsUser Set etcd container's Security Context runAsUser ## @param containerSecurityContext.runAsNonRoot Set etcd container's Security Context runAsNonRoot ## containerSecurityContext: enabled: true runAsUser: 1001 runAsNonRoot: true ## etcd containers' resource requests and limits ## ref: https://kubernetes.io/docs/user-guide/compute-resources/ ## We usually recommend not to specify default resources and to leave this as a conscious ## choice for the user. This also increases chances charts run on environments with little ## resources, such as Minikube. If you do want to specify resources, uncomment the following ## lines, adjust them as necessary, and remove the curly braces after 'resources:'. ## @param resources.limits [object] The resources limits for the etcd container ## @param resources.requests [object] The requested resources for the etcd container ## resources: ## Example: ## limits: ## cpu: 500m ## memory: 1Gi limits: {} requests: {} ## Configure extra options for liveness probe ## ref: https://kubernetes.io/docs/tasks/configure-pod-container/configure-liveness-readiness-startup-probes/#configure-probes ## @param livenessProbe.enabled Enable livenessProbe ## @param livenessProbe.initialDelaySeconds Initial delay seconds for livenessProbe ## @param livenessProbe.periodSeconds Period seconds for livenessProbe ## @param livenessProbe.timeoutSeconds Timeout seconds for livenessProbe ## @param livenessProbe.failureThreshold Failure threshold for livenessProbe ## @param livenessProbe.successThreshold Success threshold for livenessProbe ## livenessProbe: enabled: true initialDelaySeconds: 60 periodSeconds: 30 timeoutSeconds: 5 successThreshold: 1 failureThreshold: 5 ## Configure extra options for readiness probe ## ref: https://kubernetes.io/docs/tasks/configure-pod-container/configure-liveness-readiness-startup-probes/#configure-probes ## @param readinessProbe.enabled Enable readinessProbe ## @param readinessProbe.initialDelaySeconds Initial delay seconds for readinessProbe ## @param readinessProbe.periodSeconds Period seconds for readinessProbe ## @param readinessProbe.timeoutSeconds Timeout seconds for readinessProbe ## @param readinessProbe.failureThreshold Failure threshold for readinessProbe ## @param readinessProbe.successThreshold Success threshold for readinessProbe ## readinessProbe: enabled: true initialDelaySeconds: 60 periodSeconds: 10 timeoutSeconds: 5 successThreshold: 1 failureThreshold: 5 ## Configure extra options for liveness probe ## ref: https://kubernetes.io/docs/tasks/configure-pod-container/configure-liveness-readiness-startup-probes/#configure-probes ## @param startupProbe.enabled Enable startupProbe ## @param startupProbe.initialDelaySeconds Initial delay seconds for startupProbe ## @param startupProbe.periodSeconds Period seconds for startupProbe ## @param startupProbe.timeoutSeconds Timeout seconds for startupProbe ## @param startupProbe.failureThreshold Failure threshold for startupProbe ## @param startupProbe.successThreshold Success threshold for startupProbe ## startupProbe: enabled: false initialDelaySeconds: 0 periodSeconds: 10 timeoutSeconds: 5 successThreshold: 1 failureThreshold: 60 ## @param customLivenessProbe [object] Override default liveness probe ## customLivenessProbe: {} ## @param customReadinessProbe [object] Override default readiness probe ## customReadinessProbe: {} ## @param customStartupProbe [object] Override default startup probe ## customStartupProbe: {} ## @param extraVolumes [array] Optionally specify extra list of additional volumes for etcd pods ## extraVolumes: [] ## @param extraVolumeMounts [array] Optionally specify extra list of additional volumeMounts for etcd container(s) ## extraVolumeMounts: [] ## @param initContainers [array] Add additional init containers to the etcd pods ## e.g: ## initContainers: ## - name: your-image-name ## image: your-image ## imagePullPolicy: Always ## ports: ## - name: portname ## containerPort: 1234 ## initContainers: [] ## @param sidecars [array] Add additional sidecar containers to the etcd pods ## e.g: ## sidecars: ## - name: your-image-name ## image: your-image ## imagePullPolicy: Always ## ports: ## - name: portname ## containerPort: 1234 ## sidecars: [] ## @param podAnnotations [object] Annotations for etcd pods ## ref: https://kubernetes.io/docs/concepts/overview/working-with-objects/annotations/ ## podAnnotations: {} ## @param podLabels [object] Extra labels for etcd pods ## Ref: https://kubernetes.io/docs/concepts/overview/working-with-objects/labels/ ## podLabels: {} ## @param podAffinityPreset Pod affinity preset. Ignored if `affinity` is set. Allowed values: `soft` or `hard` ## ref: https://kubernetes.io/docs/concepts/scheduling-eviction/assign-pod-node/#inter-pod-affinity-and-anti-affinity ## podAffinityPreset: "" ## @param podAntiAffinityPreset Pod anti-affinity preset. Ignored if `affinity` is set. Allowed values: `soft` or `hard` ## Ref: https://kubernetes.io/docs/concepts/scheduling-eviction/assign-pod-node/#inter-pod-affinity-and-anti-affinity ## podAntiAffinityPreset: soft ## Node affinity preset ## Ref: https://kubernetes.io/docs/concepts/scheduling-eviction/assign-pod-node/#node-affinity ## @param nodeAffinityPreset.type Node affinity preset type. Ignored if `affinity` is set. Allowed values: `soft` or `hard` ## @param nodeAffinityPreset.key Node label key to match. Ignored if `affinity` is set. ## @param nodeAffinityPreset.values [array] Node label values to match. Ignored if `affinity` is set. ## nodeAffinityPreset: type: "" ## e.g: ## key: "kubernetes.io/e2e-az-name" ## key: "" ## e.g: ## values: ## - e2e-az1 ## - e2e-az2 ## values: [] ## @param affinity [object] Affinity for pod assignment ## Ref: https://kubernetes.io/docs/concepts/configuration/assign-pod-node/#affinity-and-anti-affinity ## Note: podAffinityPreset, podAntiAffinityPreset, and nodeAffinityPreset will be ignored when it's set ## affinity: {} ## @param nodeSelector [object] Node labels for pod assignment ## Ref: https://kubernetes.io/docs/user-guide/node-selection/ ## nodeSelector: {} ## @param tolerations [array] Tolerations for pod assignment ## Ref: https://kubernetes.io/docs/concepts/configuration/taint-and-toleration/ ## tolerations: [] ## @param terminationGracePeriodSeconds Seconds the pod needs to gracefully terminate ## ref: https://kubernetes.io/docs/concepts/containers/container-lifecycle-hooks/#hook-handler-execution ## terminationGracePeriodSeconds: "" ## @param schedulerName Name of the k8s scheduler (other than default) ## ref: https://kubernetes.io/docs/tasks/administer-cluster/configure-multiple-schedulers/ ## schedulerName: "" ## @param priorityClassName Name of the priority class to be used by etcd pods ## Priority class needs to be created beforehand ## Ref: https://kubernetes.io/docs/concepts/configuration/pod-priority-preemption/ ## priorityClassName: "" ## @param topologySpreadConstraints Topology Spread Constraints for pod assignment ## https://kubernetes.io/docs/concepts/workloads/pods/pod-topology-spread-constraints/ ## The value is evaluated as a template ## topologySpreadConstraints: [] ## @section Traffic exposure parameters service: ## @param service.type Kubernetes Service type ## type: ClusterIP ## @param service.enabled create second service if equal true ## enabled: true ## @param service.clusterIP Kubernetes service Cluster IP ## e.g.: ## clusterIP: None ## clusterIP: "" ## @param service.ports.client etcd client port ## @param service.ports.peer etcd peer port ## ports: client: 2379 peer: 2380 ## @param service.nodePorts.client Specify the nodePort client value for the LoadBalancer and NodePort service types. ## @param service.nodePorts.peer Specify the nodePort peer value for the LoadBalancer and NodePort service types. ## ref: https://kubernetes.io/docs/concepts/services-networking/service/#type-nodeport ## nodePorts: client: "" peer: "" ## @param service.clientPortNameOverride etcd client port name override ## clientPortNameOverride: "" ## @param service.peerPortNameOverride etcd peer port name override ## peerPortNameOverride: "" ## @param service.loadBalancerIP loadBalancerIP for the etcd service (optional, cloud specific) ## ref: https://kubernetes.io/docs/user-guide/services/#type-loadbalancer ## loadBalancerIP: "" ## @param service.loadBalancerSourceRanges [array] Load Balancer source ranges ## ref: https://kubernetes.io/docs/tasks/access-application-cluster/configure-cloud-provider-firewall/#restrict-access-for-loadbalancer-service ## e.g: ## loadBalancerSourceRanges: ## - 10.10.10.0/24 ## loadBalancerSourceRanges: [] ## @param service.externalIPs [array] External IPs ## ref: https://kubernetes.io/docs/concepts/services-networking/service/#external-ips ## externalIPs: [] ## @param service.externalTrafficPolicy %%MAIN_CONTAINER_NAME%% service external traffic policy ## ref http://kubernetes.io/docs/tasks/access-application-cluster/create-external-load-balancer/#preserving-the-client-source-ip ## externalTrafficPolicy: Cluster ## @param service.extraPorts Extra ports to expose (normally used with the `sidecar` value) ## extraPorts: [] ## @param service.annotations [object] Additional annotations for the etcd service ## annotations: {} ## @param service.sessionAffinity Session Affinity for Kubernetes service, can be "None" or "ClientIP" ## If "ClientIP", consecutive client requests will be directed to the same Pod ## ref: https://kubernetes.io/docs/concepts/services-networking/service/#virtual-ips-and-service-proxies ## sessionAffinity: None ## @param service.sessionAffinityConfig Additional settings for the sessionAffinity ## sessionAffinityConfig: ## clientIP: ## timeoutSeconds: 300 ## sessionAffinityConfig: {} ## @section Persistence parameters ## Enable persistence using Persistent Volume Claims ## ref: https://kubernetes.io/docs/user-guide/persistent-volumes/ ## persistence: ## @param persistence.enabled If true, use a Persistent Volume Claim. If false, use emptyDir. ## enabled: true ## @param persistence.storageClass Persistent Volume Storage Class ## If defined, storageClassName: <storageClass> ## If set to "-", storageClassName: "", which disables dynamic provisioning ## If undefined (the default) or set to null, no storageClassName spec is ## set, choosing the default provisioner. (gp2 on AWS, standard on ## GKE, AWS & OpenStack) ## storageClass: "" ## ## @param persistence.annotations [object] Annotations for the PVC ## annotations: {} ## @param persistence.accessModes Persistent Volume Access Modes ## accessModes: - ReadWriteOnce ## @param persistence.size PVC Storage Request for etcd data volume ## size: 8Gi ## @param persistence.selector [object] Selector to match an existing Persistent Volume ## ref: https://kubernetes.io/docs/concepts/storage/persistent-volumes/#selector ## selector: {} ## @section Volume Permissions parameters ## Init containers parameters: ## volumePermissions: Change the owner and group of the persistent volume mountpoint to runAsUser:fsGroup values from the securityContext section. ## volumePermissions: ## @param volumePermissions.enabled Enable init container that changes the owner and group of the persistent volume(s) mountpoint to `runAsUser:fsGroup` ## enabled: false ## @param volumePermissions.image.registry Init container volume-permissions image registry ## @param volumePermissions.image.repository Init container volume-permissions image name ## @param volumePermissions.image.tag Init container volume-permissions image tag ## @param volumePermissions.image.pullPolicy Init container volume-permissions image pull policy ## @param volumePermissions.image.pullSecrets [array] Specify docker-registry secret names as an array ## image: registry: docker.io repository: bitnami/bitnami-shell tag: 10-debian-10-r366 pullPolicy: IfNotPresent ## Optionally specify an array of imagePullSecrets. ## Secrets must be manually created in the namespace. ## ref: https://kubernetes.io/docs/tasks/configure-pod-container/pull-image-private-registry/ ## e.g: ## pullSecrets: ## - myRegistryKeySecretName ## pullSecrets: [] ## Init container' resource requests and limits ## ref: https://kubernetes.io/docs/user-guide/compute-resources/ ## We usually recommend not to specify default resources and to leave this as a conscious ## choice for the user. This also increases chances charts run on environments with little ## resources, such as Minikube. If you do want to specify resources, uncomment the following ## lines, adjust them as necessary, and remove the curly braces after 'resources:'. ## @param volumePermissions.resources.limits [object] Init container volume-permissions resource limits ## @param volumePermissions.resources.requests [object] Init container volume-permissions resource requests ## resources: ## Example: ## limits: ## cpu: 500m ## memory: 1Gi limits: {} requests: {} ## @section Network Policy parameters ## ref: https://kubernetes.io/docs/concepts/services-networking/network-policies/ ## networkPolicy: ## @param networkPolicy.enabled Enable creation of NetworkPolicy resources ## enabled: false ## @param networkPolicy.allowExternal Don't require client label for connections ## When set to false, only pods with the correct client label will have network access to the ports ## etcd is listening on. When true, etcd will accept connections from any source ## (with the correct destination port). ## allowExternal: true ## @param networkPolicy.extraIngress [array] Add extra ingress rules to the NetworkPolicy ## e.g: ## extraIngress: ## - ports: ## - port: 1234 ## from: ## - podSelector: ## - matchLabels: ## - role: frontend ## - podSelector: ## - matchExpressions: ## - key: role ## operator: In ## values: ## - frontend ## extraIngress: [] ## @param networkPolicy.extraEgress [array] Add extra ingress rules to the NetworkPolicy ## e.g: ## extraEgress: ## - ports: ## - port: 1234 ## to: ## - podSelector: ## - matchLabels: ## - role: frontend ## - podSelector: ## - matchExpressions: ## - key: role ## operator: In ## values: ## - frontend ## extraEgress: [] ## @param networkPolicy.ingressNSMatchLabels [object] Labels to match to allow traffic from other namespaces ## @param networkPolicy.ingressNSPodMatchLabels [object] Pod labels to match to allow traffic from other namespaces ## ingressNSMatchLabels: {} ingressNSPodMatchLabels: {} ## @section Metrics parameters metrics: ## @param metrics.enabled Expose etcd metrics ## enabled: false ## @param metrics.podAnnotations [object] Annotations for the Prometheus metrics on etcd pods ## podAnnotations: prometheus.io/scrape: "true" prometheus.io/port: "{{ .Values.containerPorts.client }}" ## Prometheus Service Monitor ## ref: https://github.com/coreos/prometheus-operator/blob/master/Documentation/api.md#endpoint ## podMonitor: ## @param metrics.podMonitor.enabled Create PodMonitor Resource for scraping metrics using PrometheusOperator ## enabled: false ## @param metrics.podMonitor.namespace Namespace in which Prometheus is running ## namespace: monitoring ## @param metrics.podMonitor.interval Specify the interval at which metrics should be scraped ## interval: 30s ## @param metrics.podMonitor.scrapeTimeout Specify the timeout after which the scrape is ended ## scrapeTimeout: 30s ## @param metrics.podMonitor.additionalLabels [object] Additional labels that can be used so PodMonitors will be discovered by Prometheus ## ref: https://github.com/coreos/prometheus-operator/blob/master/Documentation/api.md#prometheusspec ## additionalLabels: {} ## @param metrics.podMonitor.scheme Scheme to use for scraping ## scheme: http ## @param metrics.podMonitor.tlsConfig [object] TLS configuration used for scrape endpoints used by Prometheus ## ref: https://github.com/prometheus-operator/prometheus-operator/blob/master/Documentation/api.md#tlsconfig ## e.g: ## tlsConfig: ## ca: ## secret: ## name: existingSecretName ## tlsConfig: {} ## @param metrics.podMonitor.relabelings [array] Prometheus relabeling rules ## relabelings: [] ## @section Snapshotting parameters ## Start a new etcd cluster recovering the data from an existing snapshot before bootstrapping ## startFromSnapshot: ## @param startFromSnapshot.enabled Initialize new cluster recovering an existing snapshot ## enabled: false ## @param startFromSnapshot.existingClaim Existing PVC containing the etcd snapshot ## existingClaim: "" ## @param startFromSnapshot.snapshotFilename Snapshot filename ## snapshotFilename: "" ## Enable auto disaster recovery by periodically snapshotting the keyspace: ## - It creates a cronjob to periodically snapshotting the keyspace ## - It also creates a ReadWriteMany PVC to store the snapshots ## If the cluster permanently loses more than (N-1)/2 members, it tries to ## recover itself from the last available snapshot. ## disasterRecovery: ## @param disasterRecovery.enabled Enable auto disaster recovery by periodically snapshotting the keyspace ## enabled: false cronjob: ## @param disasterRecovery.cronjob.schedule Schedule in Cron format to save snapshots ## See https://en.wikipedia.org/wiki/Cron ## schedule: "*/30 * * * *" ## @param disasterRecovery.cronjob.historyLimit Number of successful finished jobs to retain ## historyLimit: 1 ## @param disasterRecovery.cronjob.snapshotHistoryLimit Number of etcd snapshots to retain, tagged by date ## snapshotHistoryLimit: 1 ## @param disasterRecovery.cronjob.podAnnotations [object] Pod annotations for cronjob pods ## ref: https://kubernetes.io/docs/concepts/overview/working-with-objects/annotations/ ## podAnnotations: {} ## Configure resource requests and limits for snapshotter containers ## ref: https://kubernetes.io/docs/user-guide/compute-resources/ ## We usually recommend not to specify default resources and to leave this as a conscious ## choice for the user. This also increases chances charts run on environments with little ## resources, such as Minikube. If you do want to specify resources, uncomment the following ## lines, adjust them as necessary, and remove the curly braces after 'resources:'. ## @param disasterRecovery.cronjob.resources.limits [object] Cronjob container resource limits ## @param disasterRecovery.cronjob.resources.requests [object] Cronjob container resource requests ## resources: ## Example: ## limits: ## cpu: 500m ## memory: 1Gi limits: {} requests: {} ## @param disasterRecovery.cronjob.nodeSelector Node labels for cronjob pods assignment ## Ref: https://kubernetes.io/docs/user-guide/node-selection/ ## nodeSelector: {} ## @param disasterRecovery.cronjob.tolerations Tolerations for cronjob pods assignment ## Ref: https://kubernetes.io/docs/concepts/configuration/taint-and-toleration/ ## tolerations: [] pvc: ## @param disasterRecovery.pvc.existingClaim A manually managed Persistent Volume and Claim ## If defined, PVC must be created manually before volume will be bound ## The value is evaluated as a template, so, for example, the name can depend on .Release or .Chart ## existingClaim: "" ## @param disasterRecovery.pvc.size PVC Storage Request ## size: 2Gi ## @param disasterRecovery.pvc.storageClassName Storage Class for snapshots volume ## storageClassName: nfs ## @section Service account parameters serviceAccount: ## @param serviceAccount.create Enable/disable service account creation ## create: false ## @param serviceAccount.name Name of the service account to create or use ## name: "" ## @param serviceAccount.automountServiceAccountToken Enable/disable auto mounting of service account token ## ref: https://kubernetes.io/docs/tasks/configure-pod-container/configure-service-account/#use-the-default-service-account-to-access-the-api-server ## automountServiceAccountToken: true ## @param serviceAccount.annotations [object] Additional annotations to be included on the service account ## annotations: {} ## @param serviceAccount.labels [object] Additional labels to be included on the service account ## labels: {} ## @section Other parameters ## etcd Pod Disruption Budget configuration ## ref: https://kubernetes.io/docs/tasks/run-application/configure-pdb/ ## pdb: ## @param pdb.create Enable/disable a Pod Disruption Budget creation ## create: false ## @param pdb.minAvailable Minimum number/percentage of pods that should remain scheduled ## minAvailable: 1 ## @param pdb.maxUnavailable Maximum number/percentage of pods that may be made unavailable ## maxUnavailable: ""
40.089351
154
0.736452
08f4509801158fd9f4c273ad2b91c9d6a337c2c5
1,287
yaml
YAML
bitnami/harbor/Chart.yaml
00arthur00/charts
502aa1e64541669b732a4eda896e5937847b6c3c
[ "Apache-2.0" ]
null
null
null
bitnami/harbor/Chart.yaml
00arthur00/charts
502aa1e64541669b732a4eda896e5937847b6c3c
[ "Apache-2.0" ]
2
2022-01-26T01:14:30.000Z
2022-01-26T07:03:39.000Z
bitnami/harbor/Chart.yaml
00arthur00/charts
502aa1e64541669b732a4eda896e5937847b6c3c
[ "Apache-2.0" ]
null
null
null
annotations: category: Infrastructure apiVersion: v2 appVersion: 2.4.1 dependencies: - condition: redis.enabled name: redis repository: https://charts.bitnami.com/bitnami version: 16.x.x - condition: postgresql.enabled name: postgresql repository: https://charts.bitnami.com/bitnami version: 11.x.x - name: common repository: https://charts.bitnami.com/bitnami version: 1.x.x description: Harbor is an open source trusted cloud-native registry to store, sign, and scan content. It adds functionalities like security, identity, and management to the open source Docker distribution. engine: gotpl home: https://github.com/bitnami/charts/tree/master/bitnami/harbor icon: https://bitnami.com/assets/stacks/harbor-core/img/harbor-core-stack-220x234.png keywords: - docker - registry - vulnerability - scan maintainers: - email: [email protected] name: Bitnami name: harbor sources: - https://github.com/bitnami/bitnami-docker-harbor-core - https://github.com/bitnami/bitnami-docker-harbor-portal - https://github.com/bitnami/bitnami-docker-harbor-jobservice - https://github.com/bitnami/bitnami-docker-harbor-registry - https://github.com/bitnami/bitnami-docker-harbor-registryctl - https://goharbor.io/ version: 12.0.1
33.868421
205
0.75136
1c560734453ee8a6707429675c1a93d1e833631a
1,191
yaml
YAML
bitnami/kubeapps/Chart.yaml
00arthur00/charts
502aa1e64541669b732a4eda896e5937847b6c3c
[ "Apache-2.0" ]
null
null
null
bitnami/kubeapps/Chart.yaml
00arthur00/charts
502aa1e64541669b732a4eda896e5937847b6c3c
[ "Apache-2.0" ]
2
2022-01-26T01:14:30.000Z
2022-01-26T07:03:39.000Z
bitnami/kubeapps/Chart.yaml
00arthur00/charts
502aa1e64541669b732a4eda896e5937847b6c3c
[ "Apache-2.0" ]
null
null
null
annotations: category: Infrastructure apiVersion: v2 appVersion: 2.4.3 dependencies: # Currently redis is only used for an in-progress plugin for flux support. # Our upstream bitnami/kubeapps chart should not include redis as a # dependency yet, and in development we can set redis.enabled if developing # other plugins only. - name: redis repository: https://charts.bitnami.com/bitnami version: 15.x.x condition: packaging.flux.enabled - name: postgresql repository: https://charts.bitnami.com/bitnami version: 10.x.x - name: common repository: https://charts.bitnami.com/bitnami tags: - bitnami-common version: 1.x.x description: Kubeapps is a web-based UI for launching and managing applications on Kubernetes. It allows users to deploy trusted applications and operators to control users access to the cluster. home: https://kubeapps.com icon: https://raw.githubusercontent.com/kubeapps/kubeapps/main/docs/img/logo.png keywords: - helm - dashboard - service catalog - deployment maintainers: - email: [email protected] name: Bitnami name: kubeapps sources: - https://github.com/kubeapps/kubeapps version: 7.8.10
32.189189
195
0.744752
6258d0c8d8cb74e0104b9b2d3c1a2a3f1b120fe7
29,169
yaml
YAML
bitnami/odoo/values.yaml
00arthur00/charts
502aa1e64541669b732a4eda896e5937847b6c3c
[ "Apache-2.0" ]
null
null
null
bitnami/odoo/values.yaml
00arthur00/charts
502aa1e64541669b732a4eda896e5937847b6c3c
[ "Apache-2.0" ]
2
2022-01-26T01:14:30.000Z
2022-01-26T07:03:39.000Z
bitnami/odoo/values.yaml
00arthur00/charts
502aa1e64541669b732a4eda896e5937847b6c3c
[ "Apache-2.0" ]
null
null
null
## @section Global parameters ## Global Docker image parameters ## Please, note that this will override the image parameters, including dependencies, configured to use the global value ## Current available global Docker image parameters: imageRegistry, imagePullSecrets and storageClass ## ## @param global.imageRegistry Global Docker image registry ## @param global.imagePullSecrets Global Docker registry secret names as an array ## @param global.storageClass Global StorageClass for Persistent Volume(s) ## global: imageRegistry: "" ## E.g. ## imagePullSecrets: ## - myRegistryKeySecretName ## imagePullSecrets: [] storageClass: "" ## @section Common parameters ## ## @param kubeVersion Override Kubernetes version ## kubeVersion: "" ## @param nameOverride String to partially override common.names.fullname ## nameOverride: "" ## @param fullnameOverride String to fully override common.names.fullname ## fullnameOverride: "" ## @param commonLabels Labels to add to all deployed objects ## commonLabels: {} ## @param commonAnnotations Annotations to add to all deployed objects ## commonAnnotations: {} ## @param clusterDomain Default Kubernetes cluster domain ## clusterDomain: cluster.local ## @param extraDeploy Array of extra objects to deploy with the release ## extraDeploy: [] ## Enable diagnostic mode in the statefulset ## diagnosticMode: ## @param diagnosticMode.enabled Enable diagnostic mode (all probes will be disabled and the command will be overridden) ## enabled: false ## @param diagnosticMode.command Command to override all containers in the the statefulset ## command: - sleep ## @param diagnosticMode.args Args to override all containers in the the statefulset ## args: - infinity ## Bitnami Odoo image ## ref: https://hub.docker.com/r/bitnami/odoo/tags/ ## @param image.registry Odoo image registry ## @param image.repository Odoo image repository ## @param image.tag Odoo image tag (immutable tags are recommended) ## @param image.pullPolicy Odoo image pull policy ## @param image.pullSecrets Odoo image pull secrets ## @param image.debug Enable image debug mode ## image: registry: docker.io repository: bitnami/odoo tag: 15.0.20220310-debian-10-r3 ## Specify a imagePullPolicy ## Defaults to 'Always' if image tag is 'latest', else set to 'IfNotPresent' ## ref: https://kubernetes.io/docs/user-guide/images/#pre-pulling-images ## pullPolicy: IfNotPresent ## Optionally specify an array of imagePullSecrets. ## Secrets must be manually created in the namespace. ## ref: https://kubernetes.io/docs/tasks/configure-pod-container/pull-image-private-registry/ ## e.g: ## pullSecrets: ## - myRegistryKeySecretName ## pullSecrets: [] ## Enable debug mode ## debug: false ## @section Odoo Configuration parameters ## Odoo settings based on environment variables ## ref: https://github.com/bitnami/bitnami-docker-odoo#environment-variables ## ## @param odooEmail Odoo user email ## ref: https://github.com/bitnami/bitnami-docker-odoo#configuration ## odooEmail: [email protected] ## @param odooPassword Odoo user password ## Defaults to a random 10-character alphanumeric string if not set ## ref: https://github.com/bitnami/bitnami-docker-odoo#configuration ## odooPassword: "" ## @param odooSkipInstall Skip Odoo installation wizard ## odooSkipInstall: false ## @param loadDemoData Whether to load demo data for all modules during initialization ## ref: https://github.com/bitnami/bitnami-docker-odoo#configuration ## loadDemoData: false ## @param customPostInitScripts Custom post-init.d user scripts ## ref: https://github.com/bitnami/bitnami-docker-odoo/tree/master/14.0/debian-10/rootfs/post-init.d ## NOTE: supported formats are `.sh`, `.sql` or `.php` ## NOTE: scripts are exclusively executed during the 1st boot of the container ## e.g: ## customPostInitScripts: ## enable-logs.sh: | ## #!/bin/bash ## sed -i s/;logfile/logfile/ /opt/bitnami/odoo/conf/odoo.conf ## ... ## customPostInitScripts: {} ## SMTP mail delivery configuration ## ref: https://github.com/bitnami/bitnami-docker-odoo/#smtp-configuration ## @param smtpHost SMTP server host ## @param smtpPort SMTP server port ## @param smtpUser SMTP username ## @param smtpPassword SMTP user password ## @param smtpProtocol SMTP protocol ## smtpHost: "" smtpPort: "" smtpUser: "" smtpPassword: "" smtpProtocol: "" ## @param existingSecret Name of existing secret containing Odoo credentials ## NOTE: Must contain key `odoo-password` ## NOTE: When it's set, the `odooPassword` parameter is ignored ## existingSecret: "" ## @param smtpExistingSecret The name of an existing secret with SMTP credentials ## NOTE: Must contain key `smtp-password` ## NOTE: When it's set, the `smtpPassword` parameter is ignored ## smtpExistingSecret: "" ## @param allowEmptyPassword Allow the container to be started with blank passwords ## allowEmptyPassword: false ## @param command Override default container command (useful when using custom images) ## command: [] ## @param args Override default container args (useful when using custom images) ## args: [] ## @param extraEnvVars Array with extra environment variables to add to the Odoo container ## e.g: ## extraEnvVars: ## - name: FOO ## value: "bar" ## extraEnvVars: [] ## @param extraEnvVarsCM Name of existing ConfigMap containing extra env vars ## extraEnvVarsCM: "" ## @param extraEnvVarsSecret Name of existing Secret containing extra env vars ## extraEnvVarsSecret: "" ## @section Odoo deployment parameters ## ## @param replicaCount Number of Odoo replicas to deploy ## NOTE: ReadWriteMany PVC(s) are required if replicaCount > 1 ## replicaCount: 1 ## Odoo container ports ## @param containerPorts.http Odoo HTTP container port ## containerPorts: http: 8069 ## Odoo containers' resource requests and limits ## ref: https://kubernetes.io/docs/user-guide/compute-resources/ ## @param resources.limits The resources limits for the Odoo container ## @param resources.requests [object] The requested resources for the Odoo container ## resources: limits: {} requests: memory: 512Mi cpu: 300m ## Configure Pods Security Context ## ref: https://kubernetes.io/docs/tasks/configure-pod-container/security-context/#set-the-security-context-for-a-pod ## @param podSecurityContext.enabled Enabled Odoo pods' Security Context ## @param podSecurityContext.fsGroup Set Odoo pod's Security Context fsGroup ## podSecurityContext: enabled: false fsGroup: 1001 ## Configure Container Security Context (only main container) ## ref: https://kubernetes.io/docs/tasks/configure-pod-container/security-context/#set-the-security-context-for-a-container ## @param containerSecurityContext.enabled Enabled Odoo containers' Security Context ## @param containerSecurityContext.runAsUser Set Odoo container's Security Context runAsUser ## containerSecurityContext: enabled: false runAsUser: 1001 ## Configure extra options for Odoo containers' liveness and readiness probes ## ref: https://kubernetes.io/docs/tasks/configure-pod-container/configure-liveness-readiness-probes/#configure-probes ## @param livenessProbe.enabled Enable livenessProbe ## @param livenessProbe.path Path for to check for livenessProbe ## @param livenessProbe.initialDelaySeconds Initial delay seconds for livenessProbe ## @param livenessProbe.periodSeconds Period seconds for livenessProbe ## @param livenessProbe.timeoutSeconds Timeout seconds for livenessProbe ## @param livenessProbe.failureThreshold Failure threshold for livenessProbe ## @param livenessProbe.successThreshold Success threshold for livenessProbe ## livenessProbe: enabled: true path: / initialDelaySeconds: 600 periodSeconds: 30 timeoutSeconds: 5 failureThreshold: 6 successThreshold: 1 ## @param readinessProbe.enabled Enable readinessProbe ## @param readinessProbe.path Path to check for readinessProbe ## @param readinessProbe.initialDelaySeconds Initial delay seconds for readinessProbe ## @param readinessProbe.periodSeconds Period seconds for readinessProbe ## @param readinessProbe.timeoutSeconds Timeout seconds for readinessProbe ## @param readinessProbe.failureThreshold Failure threshold for readinessProbe ## @param readinessProbe.successThreshold Success threshold for readinessProbe ## readinessProbe: enabled: true path: / initialDelaySeconds: 30 periodSeconds: 10 timeoutSeconds: 5 failureThreshold: 6 successThreshold: 1 ## @param startupProbe.enabled Enable startupProbe ## @param startupProbe.path Path to check for startupProbe ## @param startupProbe.initialDelaySeconds Initial delay seconds for startupProbe ## @param startupProbe.periodSeconds Period seconds for startupProbe ## @param startupProbe.timeoutSeconds Timeout seconds for startupProbe ## @param startupProbe.failureThreshold Failure threshold for startupProbe ## @param startupProbe.successThreshold Success threshold for startupProbe ## startupProbe: enabled: false path: / initialDelaySeconds: 300 periodSeconds: 10 timeoutSeconds: 5 failureThreshold: 6 successThreshold: 1 ## @param customLivenessProbe Custom livenessProbe that overrides the default one ## customLivenessProbe: {} ## @param customReadinessProbe Custom readinessProbe that overrides the default one # customReadinessProbe: {} ## @param customStartupProbe Custom startupProbe that overrides the default one # customStartupProbe: {} ## @param lifecycleHooks LifecycleHooks to set additional configuration at startup ## lifecycleHooks: {} ## @param hostAliases Odoo pod host aliases ## https://kubernetes.io/docs/concepts/services-networking/add-entries-to-pod-etc-hosts-with-host-aliases/ ## hostAliases: [] ## @param podLabels Extra labels for Odoo pods ## ref: https://kubernetes.io/docs/concepts/overview/working-with-objects/labels/ ## podLabels: {} ## @param podAnnotations Annotations for Odoo pods ## ref: https://kubernetes.io/docs/concepts/overview/working-with-objects/annotations/ ## podAnnotations: {} ## @param podAffinityPreset Pod affinity preset. Ignored if `affinity` is set. Allowed values: `soft` or `hard` ## ref: https://kubernetes.io/docs/concepts/scheduling-eviction/assign-pod-node/#inter-pod-affinity-and-anti-affinity ## podAffinityPreset: "" ## @param podAntiAffinityPreset Pod anti-affinity preset. Ignored if `affinity` is set. Allowed values: `soft` or `hard` ## Ref: https://kubernetes.io/docs/concepts/scheduling-eviction/assign-pod-node/#inter-pod-affinity-and-anti-affinity ## podAntiAffinityPreset: soft ## Node affinity preset ## Ref: https://kubernetes.io/docs/concepts/scheduling-eviction/assign-pod-node/#node-affinity ## nodeAffinityPreset: ## @param nodeAffinityPreset.type Node affinity preset type. Ignored if `affinity` is set. Allowed values: `soft` or `hard` ## type: "" ## @param nodeAffinityPreset.key Node label key to match. Ignored if `affinity` is set ## key: "" ## @param nodeAffinityPreset.values Node label values to match. Ignored if `affinity` is set ## E.g. ## values: ## - e2e-az1 ## - e2e-az2 ## values: [] ## @param affinity Affinity for pod assignment ## Ref: https://kubernetes.io/docs/concepts/configuration/assign-pod-node/#affinity-and-anti-affinity ## NOTE: podAffinityPreset, podAntiAffinityPreset, and nodeAffinityPreset will be ignored when it's set ## affinity: {} ## @param nodeSelector Node labels for pod assignment ## ref: https://kubernetes.io/docs/user-guide/node-selection/ ## nodeSelector: {} ## @param tolerations Tolerations for pod assignment ## ref: https://kubernetes.io/docs/concepts/configuration/taint-and-toleration/ ## tolerations: [] ## @param topologySpreadConstraints Topology Spread Constraints for pod assignment spread across your cluster among failure-domains. Evaluated as a template ## Ref: https://kubernetes.io/docs/concepts/workloads/pods/pod-topology-spread-constraints/#spread-constraints-for-pods ## topologySpreadConstraints: {} ## @param podManagementPolicy Pod management policy for the Odoo statefulset ## podManagementPolicy: Parallel ## @param priorityClassName Odoo pods' Priority Class Name ## ref: https://kubernetes.io/docs/concepts/configuration/pod-priority-preemption/ ## priorityClassName: "" ## @param schedulerName Use an alternate scheduler, e.g. "stork". ## ref: https://kubernetes.io/docs/tasks/administer-cluster/configure-multiple-schedulers/ ## schedulerName: "" ## @param terminationGracePeriodSeconds Seconds Odoo pod needs to terminate gracefully ## ref: https://kubernetes.io/docs/concepts/workloads/pods/pod/#termination-of-pods ## terminationGracePeriodSeconds: "" ## @param updateStrategy.type Odoo deployment strategy type ## @param updateStrategy.rollingUpdate Odoo deployment rolling update configuration parameters ## ref: https://kubernetes.io/docs/concepts/workloads/controllers/deployment/#strategy ## NOTE: Set it to `Recreate` if you use a PV that cannot be mounted on multiple pods ## e.g: ## updateStrategy: ## type: RollingUpdate ## rollingUpdate: ## maxSurge: 25% ## maxUnavailable: 25% ## updateStrategy: type: RollingUpdate rollingUpdate: {} ## @param extraVolumes Optionally specify extra list of additional volumes for Odoo pods ## extraVolumes: [] ## @param extraVolumeMounts Optionally specify extra list of additional volumeMounts for Odoo container(s) ## extraVolumeMounts: [] ## @param sidecars Add additional sidecar containers to the Odoo pod ## e.g: ## sidecars: ## - name: your-image-name ## image: your-image ## imagePullPolicy: Always ## ports: ## - name: portname ## containerPort: 1234 ## sidecars: [] ## @param initContainers Add additional init containers to the Odoo pods ## ref: https://kubernetes.io/docs/concepts/workloads/pods/init-containers/ ## e.g: ## initContainers: ## - name: your-image-name ## image: your-image ## imagePullPolicy: Always ## command: ['sh', '-c', 'copy addons from git and push to /bitnami/odoo/addons. Should work with extraVolumeMounts and extraVolumes'] ## initContainers: [] ## @section Traffic Exposure Parameters ## ## Odoo service parameters ## service: ## @param service.type Odoo service type ## type: LoadBalancer ## @param service.ports.http Odoo service HTTP port ## ports: http: 80 ## @param service.nodePorts.http NodePort for the Odoo HTTP endpoint ## NOTE: choose port between <30000-32767> ## nodePorts: http: "" ## @param service.sessionAffinity Control where client requests go, to the same pod or round-robin ## Values: ClientIP or None ## ref: https://kubernetes.io/docs/user-guide/services/ ## sessionAffinity: None ## @param service.clusterIP Odoo service Cluster IP ## e.g.: ## clusterIP: None ## clusterIP: "" ## @param service.loadBalancerIP Odoo service Load Balancer IP ## ref: https://kubernetes.io/docs/concepts/services-networking/service/#type-loadbalancer ## loadBalancerIP: "" ## @param service.loadBalancerSourceRanges Odoo service Load Balancer sources ## ref: https://kubernetes.io/docs/tasks/access-application-cluster/configure-cloud-provider-firewall/#restrict-access-for-loadbalancer-service ## e.g: ## loadBalancerSourceRanges: ## - 10.10.10.0/24 ## loadBalancerSourceRanges: [] ## @param service.externalTrafficPolicy Odoo service external traffic policy ## ref https://kubernetes.io/docs/tasks/access-application-cluster/create-external-load-balancer/#preserving-the-client-source-ip ## externalTrafficPolicy: Cluster ## @param service.annotations Additional custom annotations for Odoo service ## annotations: {} ## @param service.extraPorts Extra port to expose on Odoo service ## extraPorts: [] ## Configure the ingress resource that allows you to access the Odoo installation ## ref: https://kubernetes.io/docs/concepts/services-networking/ingress/ ## ingress: ## @param ingress.enabled Enable ingress record generation for Odoo ## enabled: false ## @param ingress.ingressClassName IngressClass that will be be used to implement the Ingress (Kubernetes 1.18+) ## This is supported in Kubernetes 1.18+ and required if you have more than one IngressClass marked as the default for your cluster . ## ref: https://kubernetes.io/blog/2020/04/02/improvements-to-the-ingress-api-in-kubernetes-1.18/ ## ingressClassName: "" ## @param ingress.pathType Ingress path type ## pathType: ImplementationSpecific ## @param ingress.apiVersion Force Ingress API version (automatically detected if not set) ## apiVersion: "" ## @param ingress.hostname Default host for the ingress record ## hostname: odoo.local ## @param ingress.path Default path for the ingress record ## NOTE: You may need to set this to '/*' in order to use this with ALB ingress controllers ## path: / ## @param ingress.annotations [object] Additional annotations for the Ingress resource. To enable certificate autogeneration, place here your cert-manager annotations. ## Use this parameter to set the required annotations for cert-manager, see ## ref: https://cert-manager.io/docs/usage/ingress/#supported-annotations ## e.g: ## annotations: ## kubernetes.io/ingress.class: nginx ## cert-manager.io/cluster-issuer: cluster-issuer-name ## annotations: {} ## @param ingress.tls Enable TLS configuration for the host defined at `ingress.hostname` parameter ## TLS certificates will be retrieved from a TLS secret with name: `{{- printf "%s-tls" .Values.ingress.hostname }}` ## You can: ## - Use the `ingress.secrets` parameter to create this TLS secret ## - Relay on cert-manager to create it by setting the corresponding annotations ## - Relay on Helm to create self-signed certificates by setting `ingress.tls=true` and `ingress.certManager=false` ## tls: false ## @param ingress.selfSigned Create a TLS secret for this ingress record using self-signed certificates generated by Helm ## selfSigned: false ## @param ingress.extraHosts An array with additional hostname(s) to be covered with the ingress record ## e.g: ## extraHosts: ## - name: odoo.local ## path: / ## extraHosts: [] ## @param ingress.extraPaths An array with additional arbitrary paths that may need to be added to the ingress under the main host ## e.g: ## extraPaths: ## - path: /* ## backend: ## serviceName: ssl-redirect ## servicePort: use-annotation ## extraPaths: [] ## @param ingress.extraTls TLS configuration for additional hostname(s) to be covered with this ingress record ## ref: https://kubernetes.io/docs/concepts/services-networking/ingress/#tls ## e.g: ## extraTls: ## - hosts: ## - odoo.local ## secretName: odoo.local-tls ## extraTls: [] ## @param ingress.secrets Custom TLS certificates as secrets ## NOTE: 'key' and 'certificate' are expected in PEM format ## NOTE: 'name' should line up with a 'secretName' set further up ## If it is not set and you're using cert-manager, this is unneeded, as it will create a secret for you with valid certificates ## If it is not set and you're NOT using cert-manager either, self-signed certificates will be created valid for 365 days ## It is also possible to create and manage the certificates outside of this helm chart ## Please see README.md for more information ## e.g: ## secrets: ## - name: odoo.local-tls ## key: |- ## -----BEGIN RSA PRIVATE KEY----- ## ... ## -----END RSA PRIVATE KEY----- ## certificate: |- ## -----BEGIN CERTIFICATE----- ## ... ## -----END CERTIFICATE----- ## secrets: [] ## @section Persistence Parameters ## ## Persistence Parameters ## ref: https://kubernetes.io/docs/user-guide/persistent-volumes/ ## persistence: ## @param persistence.enabled Enable persistence using Persistent Volume Claims ## enabled: true ## @param persistence.resourcePolicy Setting it to "keep" to avoid removing PVCs during a helm delete operation. Leaving it empty will delete PVCs after the chart deleted ## resourcePolicy: "" ## @param persistence.storageClass Persistent Volume storage class ## If defined, storageClassName: <storageClass> ## If set to "-", storageClassName: "", which disables dynamic provisioning ## If undefined (the default) or set to null, no storageClassName spec is set, choosing the default provisioner ## storageClass: "" ## @param persistence.accessModes [array] Persistent Volume access modes ## accessModes: - ReadWriteOnce ## @param persistence.accessMode Persistent Volume access mode (DEPRECATED: use `persistence.accessModes` instead) ## accessMode: ReadWriteOnce ## @param persistence.size Persistent Volume size ## size: 10Gi ## @param persistence.dataSource Custom PVC data source ## dataSource: {} ## @param persistence.annotations Annotations for the PVC ## annotations: {} ## @param persistence.selector Selector to match an existing Persistent Volume (this value is evaluated as a template) ## selector: ## matchLabels: ## app: my-app ## selector: {} ## @param persistence.existingClaim The name of an existing PVC to use for persistence ## existingClaim: "" ## 'volumePermissions' init container parameters ## Changes the owner and group of the persistent volume mount point to runAsUser:fsGroup values ## based on the podSecurityContext/containerSecurityContext parameters ## volumePermissions: ## @param volumePermissions.enabled Enable init container that changes the owner/group of the PV mount point to `runAsUser:fsGroup` ## enabled: false ## Init container's resource requests and limits ## ref: https://kubernetes.io/docs/user-guide/compute-resources/ ## @param volumePermissions.resources.limits The resources limits for the init container ## @param volumePermissions.resources.requests The requested resources for the init container ## resources: limits: {} requests: {} ## Init container Container Security Context ## ref: https://kubernetes.io/docs/tasks/configure-pod-container/security-context/#set-the-security-context-for-a-container ## @param volumePermissions.containerSecurityContext.enabled Enable init container's Security Context ## @param volumePermissions.containerSecurityContext.runAsUser Set init container's Security Context runAsUser ## containerSecurityContext: enabled: true runAsUser: 0 ## @section RBAC Parameters ## @param serviceAccount.create Specifies whether a ServiceAccount should be created ## @param serviceAccount.name The name of the ServiceAccount to create (name generated using common.names.fullname template otherwise) ## @param serviceAccount.automountServiceAccountToken Auto-mount the service account token in the pod ## @param serviceAccount.annotations Additional custom annotations for the ServiceAccount ## serviceAccount: create: true name: "" automountServiceAccountToken: false annotations: {} ## @section Other Parameters ## ## Odoo Pod Disruption Budget configuration ## ref: https://kubernetes.io/docs/tasks/run-application/configure-pdb/ ## @param pdb.create Enable a Pod Disruption Budget creation ## @param pdb.minAvailable Minimum number/percentage of pods that should remain scheduled ## @param pdb.maxUnavailable Maximum number/percentage of pods that may be made unavailable ## pdb: create: false minAvailable: 1 maxUnavailable: "" ## Odoo Autoscaling configuration ## ref: https://kubernetes.io/docs/tasks/run-application/horizontal-pod-autoscale/ ## @param autoscaling.enabled Enable Horizontal POD autoscaling for Odoo ## @param autoscaling.minReplicas Minimum number of Odoo replicas ## @param autoscaling.maxReplicas Maximum number of Odoo replicas ## @param autoscaling.targetCPU Target CPU utilization percentage ## @param autoscaling.targetMemory Target Memory utilization percentage ## autoscaling: enabled: false minReplicas: 1 maxReplicas: 11 targetCPU: 50 targetMemory: 50 ## @section Database Parameters ## PostgreSQL chart configuration ## ref: https://github.com/bitnami/charts/blob/master/bitnami/postgresql/values.yaml ## @param postgresql.enabled Switch to enable or disable the PostgreSQL helm chart ## @param postgresql.auth.username Name for a custom user to create ## @param postgresql.auth.password Password for the custom user to create ## @param postgresql.auth.database Name for a custom database to create ## @param postgresql.auth.existingSecret Name of existing secret to use for PostgreSQL credentials ## @param postgresql.architecture PostgreSQL architecture (`standalone` or `replication`) ## postgresql: enabled: true auth: username: bn_odoo password: "" database: bitnami_odoo existingSecret: "" architecture: standalone ## External PostgreSQL configuration ## All of these values are only used when postgresql.enabled is set to false ## @param externalDatabase.host Database host ## @param externalDatabase.port Database port number ## @param externalDatabase.user Non-root username for Keycloak ## @param externalDatabase.password Password for the non-root username for Keycloak ## @param externalDatabase.database Keycloak database name ## @param externalDatabase.create Enable PostgreSQL user and database creation (when using an external db) ## @param externalDatabase.postgresqlPostgresUser External Database admin username ## @param externalDatabase.postgresqlPostgresPassword External Database admin password ## @param externalDatabase.existingSecret Name of an existing secret resource containing the database credentials ## @param externalDatabase.existingSecretPasswordKey Name of an existing secret key containing the non-root credentials ## @param externalDatabase.existingSecretPostgresPasswordKey Name of an existing secret key containing the admin credentials ## externalDatabase: host: "" port: 5432 user: bn_odoo password: "" database: bitnami_odoo create: true postgresqlPostgresUser: "postgres" postgresqlPostgresPassword: "" existingSecret: "" existingSecretPasswordKey: "" existingSecretPostgresPasswordKey: "" ## @section NetworkPolicy parameters ## ## Add networkpolicies ## networkPolicy: ## @param networkPolicy.enabled Enable network policies ## If ingress.enabled or metrics.enabled are true, configure networkPolicy.ingress and networkPolicy.metrics selectors respectively to allow communication ## enabled: false ## @param networkPolicy.ingress.enabled Enable network policy for Ingress Proxies ## @param networkPolicy.ingress.namespaceSelector Ingress Proxy namespace selector labels. These labels will be used to identify the Ingress Proxy's namespace. ## @param networkPolicy.ingress.podSelector Ingress Proxy pods selector labels. These labels will be used to identify the Ingress Proxy pods. ## ingress: enabled: false ## e.g: ## podSelector: ## label: ingress ## podSelector: {} ## e.g: ## namespaceSelector: ## label: ingress ## namespaceSelector: {} ## @param networkPolicy.ingressRules.backendOnlyAccessibleByFrontend Enable ingress rule that makes the backend (mariadb) only accessible by Odoo's pods. ## @param networkPolicy.ingressRules.customBackendSelector Backend selector labels. These labels will be used to identify the backend pods. ## @param networkPolicy.ingressRules.accessOnlyFrom.enabled Enable ingress rule that makes Odoo only accessible from a particular origin ## @param networkPolicy.ingressRules.accessOnlyFrom.namespaceSelector Namespace selector label that is allowed to access Odoo. This label will be used to identified the allowed namespace(s). ## @param networkPolicy.ingressRules.accessOnlyFrom.podSelector Pods selector label that is allowed to access Odoo. This label will be used to identified the allowed pod(s). ## @param networkPolicy.ingressRules.customRules Custom network policy ingress rule ## ingressRules: ## mariadb backend only can be accessed from Odoo ## backendOnlyAccessibleByFrontend: false customBackendSelector: {} ## Allow only from the indicated: ## accessOnlyFrom: enabled: false ## e.g: ## namespaceSelector: ## label: ingress ## namespaceSelector: {} ## e.g: ## podSelector: ## label: access ## podSelector: {} ## custom ingress rules ## e.g: ## customRules: ## - from: ## - namespaceSelector: ## matchLabels: ## label: example ## customRules: {} ## @param networkPolicy.egressRules.denyConnectionsToExternal Enable egress rule that denies outgoing traffic outside the cluster, except for DNS (port 53). ## @param networkPolicy.egressRules.customRules Custom network policy rule ## egressRules: ## Deny connections to external. This is not compatible with an external database. ## denyConnectionsToExternal: false ## Additional custom egress rules ## e.g: ## customRules: ## - to: ## - namespaceSelector: ## matchLabels: ## label: example ## customRules: {}
38.634437
192
0.747574
28b937fe473a893f6c0c446406495ca618f0ab79
890
yaml
YAML
bitnami/keycloak/Chart.yaml
00arthur00/charts
502aa1e64541669b732a4eda896e5937847b6c3c
[ "Apache-2.0" ]
null
null
null
bitnami/keycloak/Chart.yaml
00arthur00/charts
502aa1e64541669b732a4eda896e5937847b6c3c
[ "Apache-2.0" ]
2
2022-01-26T01:14:30.000Z
2022-01-26T07:03:39.000Z
bitnami/keycloak/Chart.yaml
00arthur00/charts
502aa1e64541669b732a4eda896e5937847b6c3c
[ "Apache-2.0" ]
null
null
null
annotations: category: DeveloperTools apiVersion: v2 appVersion: 16.1.1 dependencies: - condition: postgresql.enabled name: postgresql repository: https://charts.bitnami.com/bitnami version: 11.x.x - name: common repository: https://charts.bitnami.com/bitnami tags: - bitnami-common version: 1.x.x description: Keycloak is a high performance Java-based identity and access management solution. It lets developers add an authentication layer to their applications with minimum effort. engine: gotpl home: https://www.keycloak.org icon: https://bitnami.com/assets/stacks/keycloak/img/keycloak-stack-220x234.png keywords: - keycloak - access-management maintainers: - email: [email protected] name: Bitnami name: keycloak sources: - https://github.com/bitnami/bitnami-docker-keycloak - https://github.com/keycloak/keycloak version: 7.1.4
29.666667
185
0.753933
01b1006ba75477fef6e57677fa72cbf44b74f3b9
981
yaml
YAML
bitnami/ghost/Chart.yaml
00arthur00/charts
502aa1e64541669b732a4eda896e5937847b6c3c
[ "Apache-2.0" ]
null
null
null
bitnami/ghost/Chart.yaml
00arthur00/charts
502aa1e64541669b732a4eda896e5937847b6c3c
[ "Apache-2.0" ]
2
2022-01-26T01:14:30.000Z
2022-01-26T07:03:39.000Z
bitnami/ghost/Chart.yaml
00arthur00/charts
502aa1e64541669b732a4eda896e5937847b6c3c
[ "Apache-2.0" ]
null
null
null
annotations: category: CMS apiVersion: v2 appVersion: 4.37.0 dependencies: - condition: mariadb.enabled name: mariadb repository: https://charts.bitnami.com/bitnami tags: - ghost-database version: 10.x.x - name: common repository: https://charts.bitnami.com/bitnami tags: - bitnami-common version: 1.x.x description: Ghost is an open source publishing platform designed to create blogs, magazines, and news sites. It includes a simple markdown editor with preview, theming, and SEO built-in to simplify editing. engine: gotpl home: https://github.com/bitnami/charts/tree/master/bitnami/ghost icon: https://bitnami.com/assets/stacks/ghost/img/ghost-stack-220x234.png keywords: - ghost - blog - http - web - application - nodejs - javascript maintainers: - email: [email protected] name: Bitnami name: ghost sources: - https://github.com/bitnami/bitnami-docker-ghost - https://www.ghost.org/ version: 16.2.1
26.513514
207
0.720693
f838a20c2ea038c4d3c64f19818b0e2770183d90
64,869
yaml
YAML
bitnami/redis/values.yaml
00arthur00/charts
502aa1e64541669b732a4eda896e5937847b6c3c
[ "Apache-2.0" ]
null
null
null
bitnami/redis/values.yaml
00arthur00/charts
502aa1e64541669b732a4eda896e5937847b6c3c
[ "Apache-2.0" ]
2
2022-01-26T01:14:30.000Z
2022-01-26T07:03:39.000Z
bitnami/redis/values.yaml
00arthur00/charts
502aa1e64541669b732a4eda896e5937847b6c3c
[ "Apache-2.0" ]
null
null
null
## @section Global parameters ## Global Docker image parameters ## Please, note that this will override the image parameters, including dependencies, configured to use the global value ## Current available global Docker image parameters: imageRegistry, imagePullSecrets and storageClass ## ## @param global.imageRegistry Global Docker image registry ## @param global.imagePullSecrets Global Docker registry secret names as an array ## @param global.storageClass Global StorageClass for Persistent Volume(s) ## @param global.redis.password Global Redis&trade; password (overrides `auth.password`) ## global: imageRegistry: "" ## E.g. ## imagePullSecrets: ## - myRegistryKeySecretName ## imagePullSecrets: [] storageClass: "" redis: password: "" ## @section Common parameters ## ## @param kubeVersion Override Kubernetes version ## kubeVersion: "" ## @param nameOverride String to partially override common.names.fullname ## nameOverride: "" ## @param fullnameOverride String to fully override common.names.fullname ## fullnameOverride: "" ## @param commonLabels Labels to add to all deployed objects ## commonLabels: {} ## @param commonAnnotations Annotations to add to all deployed objects ## commonAnnotations: {} ## @param clusterDomain Kubernetes cluster domain name ## clusterDomain: cluster.local ## @param extraDeploy Array of extra objects to deploy with the release ## extraDeploy: [] ## Enable diagnostic mode in the deployment ## diagnosticMode: ## @param diagnosticMode.enabled Enable diagnostic mode (all probes will be disabled and the command will be overridden) ## enabled: false ## @param diagnosticMode.command Command to override all containers in the deployment ## command: - sleep ## @param diagnosticMode.args Args to override all containers in the deployment ## args: - infinity ## @section Redis&trade; Image parameters ## ## Bitnami Redis&trade; image ## ref: https://hub.docker.com/r/bitnami/redis/tags/ ## @param image.registry Redis&trade; image registry ## @param image.repository Redis&trade; image repository ## @param image.tag Redis&trade; image tag (immutable tags are recommended) ## @param image.pullPolicy Redis&trade; image pull policy ## @param image.pullSecrets Redis&trade; image pull secrets ## @param image.debug Enable image debug mode ## image: registry: docker.io repository: bitnami/redis tag: 6.2.6-debian-10-r158 ## Specify a imagePullPolicy ## Defaults to 'Always' if image tag is 'latest', else set to 'IfNotPresent' ## ref: https://kubernetes.io/docs/user-guide/images/#pre-pulling-images ## pullPolicy: IfNotPresent ## Optionally specify an array of imagePullSecrets. ## Secrets must be manually created in the namespace. ## ref: https://kubernetes.io/docs/tasks/configure-pod-container/pull-image-private-registry/ ## e.g: ## pullSecrets: ## - myRegistryKeySecretName ## pullSecrets: [] ## Enable debug mode ## debug: false ## @section Redis&trade; common configuration parameters ## https://github.com/bitnami/bitnami-docker-redis#configuration ## ## @param architecture Redis&trade; architecture. Allowed values: `standalone` or `replication` ## architecture: replication ## Redis&trade; Authentication parameters ## ref: https://github.com/bitnami/bitnami-docker-redis#setting-the-server-password-on-first-run ## auth: ## @param auth.enabled Enable password authentication ## enabled: true ## @param auth.sentinel Enable password authentication on sentinels too ## sentinel: true ## @param auth.password Redis&trade; password ## Defaults to a random 10-character alphanumeric string if not set ## password: "" ## @param auth.existingSecret The name of an existing secret with Redis&trade; credentials ## NOTE: When it's set, the previous `auth.password` parameter is ignored ## existingSecret: "" ## @param auth.existingSecretPasswordKey Password key to be retrieved from existing secret ## NOTE: ignored unless `auth.existingSecret` parameter is set ## existingSecretPasswordKey: "" ## @param auth.usePasswordFiles Mount credentials as files instead of using an environment variable ## usePasswordFiles: false ## @param commonConfiguration [string] Common configuration to be added into the ConfigMap ## ref: https://redis.io/topics/config ## commonConfiguration: |- # Enable AOF https://redis.io/topics/persistence#append-only-file appendonly yes # Disable RDB persistence, AOF persistence already enabled. save "" ## @param existingConfigmap The name of an existing ConfigMap with your custom configuration for Redis&trade; nodes ## existingConfigmap: "" ## @section Redis&trade; master configuration parameters ## master: ## @param master.configuration Configuration for Redis&trade; master nodes ## ref: https://redis.io/topics/config ## configuration: "" ## @param master.disableCommands Array with Redis&trade; commands to disable on master nodes ## Commands will be completely disabled by renaming each to an empty string. ## ref: https://redis.io/topics/security#disabling-of-specific-commands ## disableCommands: - FLUSHDB - FLUSHALL ## @param master.command Override default container command (useful when using custom images) ## command: [] ## @param master.args Override default container args (useful when using custom images) ## args: [] ## @param master.preExecCmds Additional commands to run prior to starting Redis&trade; master ## preExecCmds: [] ## @param master.extraFlags Array with additional command line flags for Redis&trade; master ## e.g: ## extraFlags: ## - "--maxmemory-policy volatile-ttl" ## - "--repl-backlog-size 1024mb" ## extraFlags: [] ## @param master.extraEnvVars Array with extra environment variables to add to Redis&trade; master nodes ## e.g: ## extraEnvVars: ## - name: FOO ## value: "bar" ## extraEnvVars: [] ## @param master.extraEnvVarsCM Name of existing ConfigMap containing extra env vars for Redis&trade; master nodes ## extraEnvVarsCM: "" ## @param master.extraEnvVarsSecret Name of existing Secret containing extra env vars for Redis&trade; master nodes ## extraEnvVarsSecret: "" ## @param master.containerPorts.redis Container port to open on Redis&trade; master nodes ## containerPorts: redis: 6379 ## Configure extra options for Redis&trade; containers' liveness and readiness probes ## ref: https://kubernetes.io/docs/tasks/configure-pod-container/configure-liveness-readiness-probes/#configure-probes ## @param master.startupProbe.enabled Enable startupProbe on Redis&trade; master nodes ## @param master.startupProbe.initialDelaySeconds Initial delay seconds for startupProbe ## @param master.startupProbe.periodSeconds Period seconds for startupProbe ## @param master.startupProbe.timeoutSeconds Timeout seconds for startupProbe ## @param master.startupProbe.failureThreshold Failure threshold for startupProbe ## @param master.startupProbe.successThreshold Success threshold for startupProbe ## startupProbe: enabled: false initialDelaySeconds: 20 periodSeconds: 5 timeoutSeconds: 5 successThreshold: 1 failureThreshold: 5 ## @param master.livenessProbe.enabled Enable livenessProbe on Redis&trade; master nodes ## @param master.livenessProbe.initialDelaySeconds Initial delay seconds for livenessProbe ## @param master.livenessProbe.periodSeconds Period seconds for livenessProbe ## @param master.livenessProbe.timeoutSeconds Timeout seconds for livenessProbe ## @param master.livenessProbe.failureThreshold Failure threshold for livenessProbe ## @param master.livenessProbe.successThreshold Success threshold for livenessProbe ## livenessProbe: enabled: true initialDelaySeconds: 20 periodSeconds: 5 timeoutSeconds: 5 successThreshold: 1 failureThreshold: 5 ## @param master.readinessProbe.enabled Enable readinessProbe on Redis&trade; master nodes ## @param master.readinessProbe.initialDelaySeconds Initial delay seconds for readinessProbe ## @param master.readinessProbe.periodSeconds Period seconds for readinessProbe ## @param master.readinessProbe.timeoutSeconds Timeout seconds for readinessProbe ## @param master.readinessProbe.failureThreshold Failure threshold for readinessProbe ## @param master.readinessProbe.successThreshold Success threshold for readinessProbe ## readinessProbe: enabled: true initialDelaySeconds: 20 periodSeconds: 5 timeoutSeconds: 1 successThreshold: 1 failureThreshold: 5 ## @param master.customStartupProbe Custom startupProbe that overrides the default one ## customStartupProbe: {} ## @param master.customLivenessProbe Custom livenessProbe that overrides the default one ## customLivenessProbe: {} ## @param master.customReadinessProbe Custom readinessProbe that overrides the default one ## customReadinessProbe: {} ## Redis&trade; master resource requests and limits ## ref: https://kubernetes.io/docs/user-guide/compute-resources/ ## @param master.resources.limits The resources limits for the Redis&trade; master containers ## @param master.resources.requests The requested resources for the Redis&trade; master containers ## resources: limits: {} requests: {} ## Configure Pods Security Context ## ref: https://kubernetes.io/docs/tasks/configure-pod-container/security-context/#set-the-security-context-for-a-pod ## @param master.podSecurityContext.enabled Enabled Redis&trade; master pods' Security Context ## @param master.podSecurityContext.fsGroup Set Redis&trade; master pod's Security Context fsGroup ## podSecurityContext: enabled: true fsGroup: 1001 ## Configure Container Security Context ## ref: https://kubernetes.io/docs/tasks/configure-pod-container/security-context/#set-the-security-context-for-a-pod ## @param master.containerSecurityContext.enabled Enabled Redis&trade; master containers' Security Context ## @param master.containerSecurityContext.runAsUser Set Redis&trade; master containers' Security Context runAsUser ## containerSecurityContext: enabled: true runAsUser: 1001 ## @param master.kind Use either Deployment or StatefulSet (default) ## ref: https://kubernetes.io/docs/concepts/workloads/controllers/statefulset/ ## kind: StatefulSet ## @param master.schedulerName Alternate scheduler for Redis&trade; master pods ## ref: https://kubernetes.io/docs/tasks/administer-cluster/configure-multiple-schedulers/ ## schedulerName: "" ## @param master.updateStrategy.type Redis&trade; master statefulset strategy type ## @skip master.updateStrategy.rollingUpdate ## ref: https://kubernetes.io/docs/concepts/workloads/controllers/statefulset/#update-strategies ## updateStrategy: ## StrategyType ## Can be set to RollingUpdate or OnDelete ## type: RollingUpdate rollingUpdate: {} ## @param master.priorityClassName Redis&trade; master pods' priorityClassName ## priorityClassName: "" ## @param master.hostAliases Redis&trade; master pods host aliases ## https://kubernetes.io/docs/concepts/services-networking/add-entries-to-pod-etc-hosts-with-host-aliases/ ## hostAliases: [] ## @param master.podLabels Extra labels for Redis&trade; master pods ## ref: https://kubernetes.io/docs/concepts/overview/working-with-objects/labels/ ## podLabels: {} ## @param master.podAnnotations Annotations for Redis&trade; master pods ## ref: https://kubernetes.io/docs/concepts/overview/working-with-objects/annotations/ ## podAnnotations: {} ## @param master.shareProcessNamespace Share a single process namespace between all of the containers in Redis&trade; master pods ## ref: https://kubernetes.io/docs/tasks/configure-pod-container/share-process-namespace/ ## shareProcessNamespace: false ## @param master.podAffinityPreset Pod affinity preset. Ignored if `master.affinity` is set. Allowed values: `soft` or `hard` ## ref: https://kubernetes.io/docs/concepts/scheduling-eviction/assign-pod-node/#inter-pod-affinity-and-anti-affinity ## podAffinityPreset: "" ## @param master.podAntiAffinityPreset Pod anti-affinity preset. Ignored if `master.affinity` is set. Allowed values: `soft` or `hard` ## ref: https://kubernetes.io/docs/concepts/scheduling-eviction/assign-pod-node/#inter-pod-affinity-and-anti-affinity ## podAntiAffinityPreset: soft ## Node master.affinity preset ## ref: https://kubernetes.io/docs/concepts/scheduling-eviction/assign-pod-node/#node-affinity ## nodeAffinityPreset: ## @param master.nodeAffinityPreset.type Node affinity preset type. Ignored if `master.affinity` is set. Allowed values: `soft` or `hard` ## type: "" ## @param master.nodeAffinityPreset.key Node label key to match. Ignored if `master.affinity` is set ## key: "" ## @param master.nodeAffinityPreset.values Node label values to match. Ignored if `master.affinity` is set ## E.g. ## values: ## - e2e-az1 ## - e2e-az2 ## values: [] ## @param master.affinity Affinity for Redis&trade; master pods assignment ## ref: https://kubernetes.io/docs/concepts/configuration/assign-pod-node/#affinity-and-anti-affinity ## NOTE: `master.podAffinityPreset`, `master.podAntiAffinityPreset`, and `master.nodeAffinityPreset` will be ignored when it's set ## affinity: {} ## @param master.nodeSelector Node labels for Redis&trade; master pods assignment ## ref: https://kubernetes.io/docs/user-guide/node-selection/ ## nodeSelector: {} ## @param master.tolerations Tolerations for Redis&trade; master pods assignment ## ref: https://kubernetes.io/docs/concepts/configuration/taint-and-toleration/ ## tolerations: [] ## @param master.topologySpreadConstraints Spread Constraints for Redis&trade; master pod assignment ## ref: https://kubernetes.io/docs/concepts/workloads/pods/pod-topology-spread-constraints/ ## E.g. ## topologySpreadConstraints: ## - maxSkew: 1 ## topologyKey: node ## whenUnsatisfiable: DoNotSchedule ## topologySpreadConstraints: {} ## @param master.lifecycleHooks for the Redis&trade; master container(s) to automate configuration before or after startup ## lifecycleHooks: {} ## @param master.extraVolumes Optionally specify extra list of additional volumes for the Redis&trade; master pod(s) ## extraVolumes: [] ## @param master.extraVolumeMounts Optionally specify extra list of additional volumeMounts for the Redis&trade; master container(s) ## extraVolumeMounts: [] ## @param master.sidecars Add additional sidecar containers to the Redis&trade; master pod(s) ## e.g: ## sidecars: ## - name: your-image-name ## image: your-image ## imagePullPolicy: Always ## ports: ## - name: portname ## containerPort: 1234 ## sidecars: [] ## @param master.initContainers Add additional init containers to the Redis&trade; master pod(s) ## ref: https://kubernetes.io/docs/concepts/workloads/pods/init-containers/ ## e.g: ## initContainers: ## - name: your-image-name ## image: your-image ## imagePullPolicy: Always ## command: ['sh', '-c', 'echo "hello world"'] ## initContainers: [] ## Persistence parameters ## ref: https://kubernetes.io/docs/user-guide/persistent-volumes/ ## persistence: ## @param master.persistence.enabled Enable persistence on Redis&trade; master nodes using Persistent Volume Claims ## enabled: true ## @param master.persistence.medium Provide a medium for `emptyDir` volumes. ## medium: "" sizeLimit: "" ## @param master.persistence.sizeLimit Set this to enable a size limit for `emptyDir` volumes. ## ## @param master.persistence.path The path the volume will be mounted at on Redis&trade; master containers ## NOTE: Useful when using different Redis&trade; images ## path: /data ## @param master.persistence.subPath The subdirectory of the volume to mount on Redis&trade; master containers ## NOTE: Useful in dev environments ## subPath: "" ## @param master.persistence.storageClass Persistent Volume storage class ## If defined, storageClassName: <storageClass> ## If set to "-", storageClassName: "", which disables dynamic provisioning ## If undefined (the default) or set to null, no storageClassName spec is set, choosing the default provisioner ## storageClass: "" ## @param master.persistence.accessModes Persistent Volume access modes ## accessModes: - ReadWriteOnce ## @param master.persistence.size Persistent Volume size ## size: 8Gi ## @param master.persistence.annotations Additional custom annotations for the PVC ## annotations: {} ## @param master.persistence.selector Additional labels to match for the PVC ## e.g: ## selector: ## matchLabels: ## app: my-app ## selector: {} ## @param master.persistence.dataSource Custom PVC data source ## dataSource: {} ## @param master.persistence.existingClaim Use a existing PVC which must be created manually before bound ## NOTE: requires master.persistence.enabled: true ## existingClaim: "" ## Redis&trade; master service parameters ## service: ## @param master.service.type Redis&trade; master service type ## type: ClusterIP ## @param master.service.ports.redis Redis&trade; master service port ## ports: redis: 6379 ## @param master.service.nodePorts.redis Node port for Redis&trade; master ## ref: https://kubernetes.io/docs/concepts/services-networking/service/#type-nodeport ## NOTE: choose port between <30000-32767> ## nodePorts: redis: "" ## @param master.service.externalTrafficPolicy Redis&trade; master service external traffic policy ## ref: https://kubernetes.io/docs/tasks/access-application-cluster/create-external-load-balancer/#preserving-the-client-source-ip ## externalTrafficPolicy: Cluster ## @param master.service.extraPorts Extra ports to expose (normally used with the `sidecar` value) ## extraPorts: [] ## @param master.service.clusterIP Redis&trade; master service Cluster IP ## clusterIP: "" ## @param master.service.loadBalancerIP Redis&trade; master service Load Balancer IP ## ref: https://kubernetes.io/docs/concepts/services-networking/service/#internal-load-balancer ## loadBalancerIP: "" ## @param master.service.loadBalancerSourceRanges Redis&trade; master service Load Balancer sources ## https://kubernetes.io/docs/tasks/access-application-cluster/configure-cloud-provider-firewall/#restrict-access-for-loadbalancer-service ## e.g. ## loadBalancerSourceRanges: ## - 10.10.10.0/24 ## loadBalancerSourceRanges: [] ## @param master.service.annotations Additional custom annotations for Redis&trade; master service ## annotations: {} ## @param master.terminationGracePeriodSeconds Integer setting the termination grace period for the redis-master pods ## terminationGracePeriodSeconds: 30 ## @section Redis&trade; replicas configuration parameters ## replica: ## @param replica.replicaCount Number of Redis&trade; replicas to deploy ## replicaCount: 3 ## @param replica.configuration Configuration for Redis&trade; replicas nodes ## ref: https://redis.io/topics/config ## configuration: "" ## @param replica.disableCommands Array with Redis&trade; commands to disable on replicas nodes ## Commands will be completely disabled by renaming each to an empty string. ## ref: https://redis.io/topics/security#disabling-of-specific-commands ## disableCommands: - FLUSHDB - FLUSHALL ## @param replica.command Override default container command (useful when using custom images) ## command: [] ## @param replica.args Override default container args (useful when using custom images) ## args: [] ## @param replica.preExecCmds Additional commands to run prior to starting Redis&trade; replicas ## preExecCmds: [] ## @param replica.extraFlags Array with additional command line flags for Redis&trade; replicas ## e.g: ## extraFlags: ## - "--maxmemory-policy volatile-ttl" ## - "--repl-backlog-size 1024mb" ## extraFlags: [] ## @param replica.extraEnvVars Array with extra environment variables to add to Redis&trade; replicas nodes ## e.g: ## extraEnvVars: ## - name: FOO ## value: "bar" ## extraEnvVars: [] ## @param replica.extraEnvVarsCM Name of existing ConfigMap containing extra env vars for Redis&trade; replicas nodes ## extraEnvVarsCM: "" ## @param replica.extraEnvVarsSecret Name of existing Secret containing extra env vars for Redis&trade; replicas nodes ## extraEnvVarsSecret: "" ## @param replica.externalMaster.enabled Use external master for bootstrapping ## @param replica.externalMaster.host External master host to bootstrap from ## @param replica.externalMaster.port Port for Redis service external master host ## externalMaster: enabled: false host: "" port: 6379 ## @param replica.containerPorts.redis Container port to open on Redis&trade; replicas nodes ## containerPorts: redis: 6379 ## Configure extra options for Redis&trade; containers' liveness and readiness probes ## ref: https://kubernetes.io/docs/tasks/configure-pod-container/configure-liveness-readiness-probes/#configure-probes ## @param replica.startupProbe.enabled Enable startupProbe on Redis&trade; replicas nodes ## @param replica.startupProbe.initialDelaySeconds Initial delay seconds for startupProbe ## @param replica.startupProbe.periodSeconds Period seconds for startupProbe ## @param replica.startupProbe.timeoutSeconds Timeout seconds for startupProbe ## @param replica.startupProbe.failureThreshold Failure threshold for startupProbe ## @param replica.startupProbe.successThreshold Success threshold for startupProbe ## startupProbe: enabled: true initialDelaySeconds: 10 periodSeconds: 10 timeoutSeconds: 5 successThreshold: 1 failureThreshold: 22 ## @param replica.livenessProbe.enabled Enable livenessProbe on Redis&trade; replicas nodes ## @param replica.livenessProbe.initialDelaySeconds Initial delay seconds for livenessProbe ## @param replica.livenessProbe.periodSeconds Period seconds for livenessProbe ## @param replica.livenessProbe.timeoutSeconds Timeout seconds for livenessProbe ## @param replica.livenessProbe.failureThreshold Failure threshold for livenessProbe ## @param replica.livenessProbe.successThreshold Success threshold for livenessProbe ## livenessProbe: enabled: true initialDelaySeconds: 20 periodSeconds: 5 timeoutSeconds: 5 successThreshold: 1 failureThreshold: 5 ## @param replica.readinessProbe.enabled Enable readinessProbe on Redis&trade; replicas nodes ## @param replica.readinessProbe.initialDelaySeconds Initial delay seconds for readinessProbe ## @param replica.readinessProbe.periodSeconds Period seconds for readinessProbe ## @param replica.readinessProbe.timeoutSeconds Timeout seconds for readinessProbe ## @param replica.readinessProbe.failureThreshold Failure threshold for readinessProbe ## @param replica.readinessProbe.successThreshold Success threshold for readinessProbe ## readinessProbe: enabled: true initialDelaySeconds: 20 periodSeconds: 5 timeoutSeconds: 1 successThreshold: 1 failureThreshold: 5 ## @param replica.customStartupProbe Custom startupProbe that overrides the default one ## customStartupProbe: {} ## @param replica.customLivenessProbe Custom livenessProbe that overrides the default one ## customLivenessProbe: {} ## @param replica.customReadinessProbe Custom readinessProbe that overrides the default one ## customReadinessProbe: {} ## Redis&trade; replicas resource requests and limits ## ref: https://kubernetes.io/docs/user-guide/compute-resources/ ## @param replica.resources.limits The resources limits for the Redis&trade; replicas containers ## @param replica.resources.requests The requested resources for the Redis&trade; replicas containers ## resources: # We usually recommend not to specify default resources and to leave this as a conscious # choice for the user. This also increases chances charts run on environments with little # resources, such as Minikube. If you do want to specify resources, uncomment the following # lines, adjust them as necessary, and remove the curly braces after 'resources:'. limits: {} # cpu: 250m # memory: 256Mi requests: {} # cpu: 250m # memory: 256Mi ## Configure Pods Security Context ## ref: https://kubernetes.io/docs/tasks/configure-pod-container/security-context/#set-the-security-context-for-a-pod ## @param replica.podSecurityContext.enabled Enabled Redis&trade; replicas pods' Security Context ## @param replica.podSecurityContext.fsGroup Set Redis&trade; replicas pod's Security Context fsGroup ## podSecurityContext: enabled: true fsGroup: 1001 ## Configure Container Security Context ## ref: https://kubernetes.io/docs/tasks/configure-pod-container/security-context/#set-the-security-context-for-a-pod ## @param replica.containerSecurityContext.enabled Enabled Redis&trade; replicas containers' Security Context ## @param replica.containerSecurityContext.runAsUser Set Redis&trade; replicas containers' Security Context runAsUser ## containerSecurityContext: enabled: true runAsUser: 1001 ## @param replica.schedulerName Alternate scheduler for Redis&trade; replicas pods ## ref: https://kubernetes.io/docs/tasks/administer-cluster/configure-multiple-schedulers/ ## schedulerName: "" ## @param replica.updateStrategy.type Redis&trade; replicas statefulset strategy type ## @skip replica.updateStrategy.rollingUpdate ## ref: https://kubernetes.io/docs/concepts/workloads/controllers/statefulset/#update-strategies ## updateStrategy: ## StrategyType ## Can be set to RollingUpdate or OnDelete ## type: RollingUpdate rollingUpdate: {} ## @param replica.priorityClassName Redis&trade; replicas pods' priorityClassName ## priorityClassName: "" ## @param replica.podManagementPolicy podManagementPolicy to manage scaling operation of %%MAIN_CONTAINER_NAME%% pods ## ref: https://kubernetes.io/docs/concepts/workloads/controllers/statefulset/#pod-management-policies ## podManagementPolicy: "" ## @param replica.hostAliases Redis&trade; replicas pods host aliases ## https://kubernetes.io/docs/concepts/services-networking/add-entries-to-pod-etc-hosts-with-host-aliases/ ## hostAliases: [] ## @param replica.podLabels Extra labels for Redis&trade; replicas pods ## ref: https://kubernetes.io/docs/concepts/overview/working-with-objects/labels/ ## podLabels: {} ## @param replica.podAnnotations Annotations for Redis&trade; replicas pods ## ref: https://kubernetes.io/docs/concepts/overview/working-with-objects/annotations/ ## podAnnotations: {} ## @param replica.shareProcessNamespace Share a single process namespace between all of the containers in Redis&trade; replicas pods ## ref: https://kubernetes.io/docs/tasks/configure-pod-container/share-process-namespace/ ## shareProcessNamespace: false ## @param replica.podAffinityPreset Pod affinity preset. Ignored if `replica.affinity` is set. Allowed values: `soft` or `hard` ## ref: https://kubernetes.io/docs/concepts/scheduling-eviction/assign-pod-node/#inter-pod-affinity-and-anti-affinity ## podAffinityPreset: "" ## @param replica.podAntiAffinityPreset Pod anti-affinity preset. Ignored if `replica.affinity` is set. Allowed values: `soft` or `hard` ## ref: https://kubernetes.io/docs/concepts/scheduling-eviction/assign-pod-node/#inter-pod-affinity-and-anti-affinity ## podAntiAffinityPreset: soft ## Node affinity preset ## ref: https://kubernetes.io/docs/concepts/scheduling-eviction/assign-pod-node/#node-affinity ## nodeAffinityPreset: ## @param replica.nodeAffinityPreset.type Node affinity preset type. Ignored if `replica.affinity` is set. Allowed values: `soft` or `hard` ## type: "" ## @param replica.nodeAffinityPreset.key Node label key to match. Ignored if `replica.affinity` is set ## key: "" ## @param replica.nodeAffinityPreset.values Node label values to match. Ignored if `replica.affinity` is set ## E.g. ## values: ## - e2e-az1 ## - e2e-az2 ## values: [] ## @param replica.affinity Affinity for Redis&trade; replicas pods assignment ## ref: https://kubernetes.io/docs/concepts/configuration/assign-pod-node/#affinity-and-anti-affinity ## NOTE: `replica.podAffinityPreset`, `replica.podAntiAffinityPreset`, and `replica.nodeAffinityPreset` will be ignored when it's set ## affinity: {} ## @param replica.nodeSelector Node labels for Redis&trade; replicas pods assignment ## ref: https://kubernetes.io/docs/user-guide/node-selection/ ## nodeSelector: {} ## @param replica.tolerations Tolerations for Redis&trade; replicas pods assignment ## ref: https://kubernetes.io/docs/concepts/configuration/taint-and-toleration/ ## tolerations: [] ## @param replica.topologySpreadConstraints Spread Constraints for Redis&trade; replicas pod assignment ## ref: https://kubernetes.io/docs/concepts/workloads/pods/pod-topology-spread-constraints/ ## E.g. ## topologySpreadConstraints: ## - maxSkew: 1 ## topologyKey: node ## whenUnsatisfiable: DoNotSchedule ## topologySpreadConstraints: {} ## @param replica.lifecycleHooks for the Redis&trade; replica container(s) to automate configuration before or after startup ## lifecycleHooks: {} ## @param replica.extraVolumes Optionally specify extra list of additional volumes for the Redis&trade; replicas pod(s) ## extraVolumes: [] ## @param replica.extraVolumeMounts Optionally specify extra list of additional volumeMounts for the Redis&trade; replicas container(s) ## extraVolumeMounts: [] ## @param replica.sidecars Add additional sidecar containers to the Redis&trade; replicas pod(s) ## e.g: ## sidecars: ## - name: your-image-name ## image: your-image ## imagePullPolicy: Always ## ports: ## - name: portname ## containerPort: 1234 ## sidecars: [] ## @param replica.initContainers Add additional init containers to the Redis&trade; replicas pod(s) ## ref: https://kubernetes.io/docs/concepts/workloads/pods/init-containers/ ## e.g: ## initContainers: ## - name: your-image-name ## image: your-image ## imagePullPolicy: Always ## command: ['sh', '-c', 'echo "hello world"'] ## initContainers: [] ## Persistence Parameters ## ref: https://kubernetes.io/docs/user-guide/persistent-volumes/ ## persistence: ## @param replica.persistence.enabled Enable persistence on Redis&trade; replicas nodes using Persistent Volume Claims ## enabled: true ## @param replica.persistence.medium Provide a medium for `emptyDir` volumes. ## medium: "" ## @param replica.persistence.path The path the volume will be mounted at on Redis&trade; replicas containers ## NOTE: Useful when using different Redis&trade; images ## path: /data ## @param replica.persistence.subPath The subdirectory of the volume to mount on Redis&trade; replicas containers ## NOTE: Useful in dev environments ## subPath: "" ## @param replica.persistence.storageClass Persistent Volume storage class ## If defined, storageClassName: <storageClass> ## If set to "-", storageClassName: "", which disables dynamic provisioning ## If undefined (the default) or set to null, no storageClassName spec is set, choosing the default provisioner ## storageClass: "" ## @param replica.persistence.accessModes Persistent Volume access modes ## accessModes: - ReadWriteOnce ## @param replica.persistence.size Persistent Volume size ## size: 8Gi ## @param replica.persistence.annotations Additional custom annotations for the PVC ## annotations: {} ## @param replica.persistence.selector Additional labels to match for the PVC ## e.g: ## selector: ## matchLabels: ## app: my-app ## selector: {} ## @param replica.persistence.dataSource Custom PVC data source ## dataSource: {} ## Redis&trade; replicas service parameters ## service: ## @param replica.service.type Redis&trade; replicas service type ## type: ClusterIP ## @param replica.service.ports.redis Redis&trade; replicas service port ## ports: redis: 6379 ## @param replica.service.nodePorts.redis Node port for Redis&trade; replicas ## ref: https://kubernetes.io/docs/concepts/services-networking/service/#type-nodeport ## NOTE: choose port between <30000-32767> ## nodePorts: redis: "" ## @param replica.service.externalTrafficPolicy Redis&trade; replicas service external traffic policy ## ref: https://kubernetes.io/docs/tasks/access-application-cluster/create-external-load-balancer/#preserving-the-client-source-ip ## externalTrafficPolicy: Cluster ## @param replica.service.extraPorts Extra ports to expose (normally used with the `sidecar` value) ## extraPorts: [] ## @param replica.service.clusterIP Redis&trade; replicas service Cluster IP ## clusterIP: "" ## @param replica.service.loadBalancerIP Redis&trade; replicas service Load Balancer IP ## ref: https://kubernetes.io/docs/concepts/services-networking/service/#internal-load-balancer ## loadBalancerIP: "" ## @param replica.service.loadBalancerSourceRanges Redis&trade; replicas service Load Balancer sources ## https://kubernetes.io/docs/tasks/access-application-cluster/configure-cloud-provider-firewall/#restrict-access-for-loadbalancer-service ## e.g. ## loadBalancerSourceRanges: ## - 10.10.10.0/24 ## loadBalancerSourceRanges: [] ## @param replica.service.annotations Additional custom annotations for Redis&trade; replicas service ## annotations: {} ## @param replica.terminationGracePeriodSeconds Integer setting the termination grace period for the redis-replicas pods ## terminationGracePeriodSeconds: 30 ## Autoscaling configuration ## autoscaling: ## @param replica.autoscaling.enabled Enable replica autoscaling settings ## enabled: false ## @param replica.autoscaling.minReplicas Minimum replicas for the pod autoscaling ## minReplicas: 1 ## @param replica.autoscaling.maxReplicas Maximum replicas for the pod autoscaling ## maxReplicas: 11 ## @param replica.autoscaling.targetCPU Percentage of CPU to consider when autoscaling ## targetCPU: "" ## @param replica.autoscaling.targetMemory Percentage of Memory to consider when autoscaling ## targetMemory: "" ## @section Redis&trade; Sentinel configuration parameters ## sentinel: ## @param sentinel.enabled Use Redis&trade; Sentinel on Redis&trade; pods. ## IMPORTANT: this will disable the master and replicas services and ## create a single Redis&trade; service exposing both the Redis and Sentinel ports ## enabled: false ## Bitnami Redis&trade; Sentinel image version ## ref: https://hub.docker.com/r/bitnami/redis-sentinel/tags/ ## @param sentinel.image.registry Redis&trade; Sentinel image registry ## @param sentinel.image.repository Redis&trade; Sentinel image repository ## @param sentinel.image.tag Redis&trade; Sentinel image tag (immutable tags are recommended) ## @param sentinel.image.pullPolicy Redis&trade; Sentinel image pull policy ## @param sentinel.image.pullSecrets Redis&trade; Sentinel image pull secrets ## @param sentinel.image.debug Enable image debug mode ## image: registry: docker.io repository: bitnami/redis-sentinel tag: 6.2.6-debian-10-r156 ## Specify a imagePullPolicy ## Defaults to 'Always' if image tag is 'latest', else set to 'IfNotPresent' ## ref: https://kubernetes.io/docs/user-guide/images/#pre-pulling-images ## pullPolicy: IfNotPresent ## Optionally specify an array of imagePullSecrets. ## Secrets must be manually created in the namespace. ## ref: https://kubernetes.io/docs/tasks/configure-pod-container/pull-image-private-registry/ ## e.g: ## pullSecrets: ## - myRegistryKeySecretName ## pullSecrets: [] ## Enable debug mode ## debug: false ## @param sentinel.masterSet Master set name ## masterSet: mymaster ## @param sentinel.quorum Sentinel Quorum ## quorum: 2 ## @param sentinel.getMasterTimeout Amount of time to allow before get_sentinel_master_info() times out. ## NOTE: This is directly related to the startupProbes which are configured to run every 10 seconds for a total of 22 failures. If adjusting this value, also adjust the startupProbes. getMasterTimeout: 220 ## @param sentinel.automateClusterRecovery Automate cluster recovery in cases where the last replica is not considered a good replica and Sentinel won't automatically failover to it. ## This also prevents any new replica from starting until the last remaining replica is elected as master to guarantee that it is the one to be elected by Sentinel, and not a newly started replica with no data. ## NOTE: This feature requires a "downAfterMilliseconds" value less or equal to 2000. ## automateClusterRecovery: false ## Sentinel timing restrictions ## @param sentinel.downAfterMilliseconds Timeout for detecting a Redis&trade; node is down ## @param sentinel.failoverTimeout Timeout for performing a election failover ## downAfterMilliseconds: 60000 failoverTimeout: 18000 ## @param sentinel.parallelSyncs Number of replicas that can be reconfigured in parallel to use the new master after a failover ## parallelSyncs: 1 ## @param sentinel.configuration Configuration for Redis&trade; Sentinel nodes ## ref: https://redis.io/topics/sentinel ## configuration: "" ## @param sentinel.command Override default container command (useful when using custom images) ## command: [] ## @param sentinel.args Override default container args (useful when using custom images) ## args: [] ## @param sentinel.preExecCmds Additional commands to run prior to starting Redis&trade; Sentinel ## preExecCmds: [] ## @param sentinel.extraEnvVars Array with extra environment variables to add to Redis&trade; Sentinel nodes ## e.g: ## extraEnvVars: ## - name: FOO ## value: "bar" ## extraEnvVars: [] ## @param sentinel.extraEnvVarsCM Name of existing ConfigMap containing extra env vars for Redis&trade; Sentinel nodes ## extraEnvVarsCM: "" ## @param sentinel.extraEnvVarsSecret Name of existing Secret containing extra env vars for Redis&trade; Sentinel nodes ## extraEnvVarsSecret: "" ## @param sentinel.externalMaster.enabled Use external master for bootstrapping ## @param sentinel.externalMaster.host External master host to bootstrap from ## @param sentinel.externalMaster.port Port for Redis service external master host ## externalMaster: enabled: false host: "" port: 6379 ## @param sentinel.containerPorts.sentinel Container port to open on Redis&trade; Sentinel nodes ## containerPorts: sentinel: 26379 ## Configure extra options for Redis&trade; containers' liveness and readiness probes ## ref: https://kubernetes.io/docs/tasks/configure-pod-container/configure-liveness-readiness-probes/#configure-probes ## @param sentinel.startupProbe.enabled Enable startupProbe on Redis&trade; Sentinel nodes ## @param sentinel.startupProbe.initialDelaySeconds Initial delay seconds for startupProbe ## @param sentinel.startupProbe.periodSeconds Period seconds for startupProbe ## @param sentinel.startupProbe.timeoutSeconds Timeout seconds for startupProbe ## @param sentinel.startupProbe.failureThreshold Failure threshold for startupProbe ## @param sentinel.startupProbe.successThreshold Success threshold for startupProbe ## startupProbe: enabled: true initialDelaySeconds: 10 periodSeconds: 10 timeoutSeconds: 5 successThreshold: 1 failureThreshold: 22 ## @param sentinel.livenessProbe.enabled Enable livenessProbe on Redis&trade; Sentinel nodes ## @param sentinel.livenessProbe.initialDelaySeconds Initial delay seconds for livenessProbe ## @param sentinel.livenessProbe.periodSeconds Period seconds for livenessProbe ## @param sentinel.livenessProbe.timeoutSeconds Timeout seconds for livenessProbe ## @param sentinel.livenessProbe.failureThreshold Failure threshold for livenessProbe ## @param sentinel.livenessProbe.successThreshold Success threshold for livenessProbe ## livenessProbe: enabled: true initialDelaySeconds: 20 periodSeconds: 5 timeoutSeconds: 5 successThreshold: 1 failureThreshold: 5 ## @param sentinel.readinessProbe.enabled Enable readinessProbe on Redis&trade; Sentinel nodes ## @param sentinel.readinessProbe.initialDelaySeconds Initial delay seconds for readinessProbe ## @param sentinel.readinessProbe.periodSeconds Period seconds for readinessProbe ## @param sentinel.readinessProbe.timeoutSeconds Timeout seconds for readinessProbe ## @param sentinel.readinessProbe.failureThreshold Failure threshold for readinessProbe ## @param sentinel.readinessProbe.successThreshold Success threshold for readinessProbe ## readinessProbe: enabled: true initialDelaySeconds: 20 periodSeconds: 5 timeoutSeconds: 1 successThreshold: 1 failureThreshold: 5 ## @param sentinel.customStartupProbe Custom startupProbe that overrides the default one ## customStartupProbe: {} ## @param sentinel.customLivenessProbe Custom livenessProbe that overrides the default one ## customLivenessProbe: {} ## @param sentinel.customReadinessProbe Custom readinessProbe that overrides the default one ## customReadinessProbe: {} ## Persistence parameters ## ref: https://kubernetes.io/docs/user-guide/persistent-volumes/ ## persistence: ## @param sentinel.persistence.enabled Enable persistence on Redis&trade; sentinel nodes using Persistent Volume Claims (Experimental) ## enabled: false ## @param sentinel.persistence.storageClass Persistent Volume storage class ## If defined, storageClassName: <storageClass> ## If set to "-", storageClassName: "", which disables dynamic provisioning ## If undefined (the default) or set to null, no storageClassName spec is set, choosing the default provisioner ## storageClass: "" ## @param sentinel.persistence.accessModes Persistent Volume access modes ## accessModes: - ReadWriteOnce ## @param sentinel.persistence.size Persistent Volume size ## size: 100Mi ## @param sentinel.persistence.annotations Additional custom annotations for the PVC ## annotations: {} ## @param sentinel.persistence.selector Additional labels to match for the PVC ## e.g: ## selector: ## matchLabels: ## app: my-app ## selector: {} ## @param sentinel.persistence.dataSource Custom PVC data source ## dataSource: {} ## Redis&trade; Sentinel resource requests and limits ## ref: https://kubernetes.io/docs/user-guide/compute-resources/ ## @param sentinel.resources.limits The resources limits for the Redis&trade; Sentinel containers ## @param sentinel.resources.requests The requested resources for the Redis&trade; Sentinel containers ## resources: limits: {} requests: {} ## Configure Container Security Context ## ref: https://kubernetes.io/docs/tasks/configure-pod-container/security-context/#set-the-security-context-for-a-pod ## @param sentinel.containerSecurityContext.enabled Enabled Redis&trade; Sentinel containers' Security Context ## @param sentinel.containerSecurityContext.runAsUser Set Redis&trade; Sentinel containers' Security Context runAsUser ## containerSecurityContext: enabled: true runAsUser: 1001 ## @param sentinel.lifecycleHooks for the Redis&trade; sentinel container(s) to automate configuration before or after startup ## lifecycleHooks: {} ## @param sentinel.extraVolumes Optionally specify extra list of additional volumes for the Redis&trade; Sentinel ## extraVolumes: [] ## @param sentinel.extraVolumeMounts Optionally specify extra list of additional volumeMounts for the Redis&trade; Sentinel container(s) ## extraVolumeMounts: [] ## Redis&trade; Sentinel service parameters ## service: ## @param sentinel.service.type Redis&trade; Sentinel service type ## type: ClusterIP ## @param sentinel.service.ports.redis Redis&trade; service port for Redis&trade; ## @param sentinel.service.ports.sentinel Redis&trade; service port for Redis&trade; Sentinel ## ports: redis: 6379 sentinel: 26379 ## @param sentinel.service.nodePorts.redis Node port for Redis&trade; ## @param sentinel.service.nodePorts.sentinel Node port for Sentinel ## ref: https://kubernetes.io/docs/concepts/services-networking/service/#type-nodeport ## NOTE: choose port between <30000-32767> ## NOTE: By leaving these values blank, they will be generated by ports-configmap ## If setting manually, please leave at least replica.replicaCount + 1 in between sentinel.service.nodePorts.redis and sentinel.service.nodePorts.sentinel to take into account the ports that will be created while incrementing that base port ## nodePorts: redis: "" sentinel: "" ## @param sentinel.service.externalTrafficPolicy Redis&trade; Sentinel service external traffic policy ## ref: https://kubernetes.io/docs/tasks/access-application-cluster/create-external-load-balancer/#preserving-the-client-source-ip ## externalTrafficPolicy: Cluster ## @param sentinel.service.extraPorts Extra ports to expose (normally used with the `sidecar` value) ## extraPorts: [] ## @param sentinel.service.clusterIP Redis&trade; Sentinel service Cluster IP ## clusterIP: "" ## @param sentinel.service.loadBalancerIP Redis&trade; Sentinel service Load Balancer IP ## ref: https://kubernetes.io/docs/concepts/services-networking/service/#internal-load-balancer ## loadBalancerIP: "" ## @param sentinel.service.loadBalancerSourceRanges Redis&trade; Sentinel service Load Balancer sources ## https://kubernetes.io/docs/tasks/access-application-cluster/configure-cloud-provider-firewall/#restrict-access-for-loadbalancer-service ## e.g. ## loadBalancerSourceRanges: ## - 10.10.10.0/24 ## loadBalancerSourceRanges: [] ## @param sentinel.service.annotations Additional custom annotations for Redis&trade; Sentinel service ## annotations: {} ## @param sentinel.terminationGracePeriodSeconds Integer setting the termination grace period for the redis-node pods ## terminationGracePeriodSeconds: 30 ## @section Other Parameters ## ## Network Policy configuration ## ref: https://kubernetes.io/docs/concepts/services-networking/network-policies/ ## networkPolicy: ## @param networkPolicy.enabled Enable creation of NetworkPolicy resources ## enabled: false ## @param networkPolicy.allowExternal Don't require client label for connections ## When set to false, only pods with the correct client label will have network access to the ports ## Redis&trade; is listening on. When true, Redis&trade; will accept connections from any source ## (with the correct destination port). ## allowExternal: true ## @param networkPolicy.extraIngress Add extra ingress rules to the NetworkPolicy ## e.g: ## extraIngress: ## - ports: ## - port: 1234 ## from: ## - podSelector: ## - matchLabels: ## - role: frontend ## - podSelector: ## - matchExpressions: ## - key: role ## operator: In ## values: ## - frontend ## extraIngress: [] ## @param networkPolicy.extraEgress Add extra ingress rules to the NetworkPolicy ## e.g: ## extraEgress: ## - ports: ## - port: 1234 ## to: ## - podSelector: ## - matchLabels: ## - role: frontend ## - podSelector: ## - matchExpressions: ## - key: role ## operator: In ## values: ## - frontend ## extraEgress: [] ## @param networkPolicy.ingressNSMatchLabels Labels to match to allow traffic from other namespaces ## @param networkPolicy.ingressNSPodMatchLabels Pod labels to match to allow traffic from other namespaces ## ingressNSMatchLabels: {} ingressNSPodMatchLabels: {} ## PodSecurityPolicy configuration ## ref: https://kubernetes.io/docs/concepts/policy/pod-security-policy/ ## podSecurityPolicy: ## @param podSecurityPolicy.create Whether to create a PodSecurityPolicy. WARNING: PodSecurityPolicy is deprecated in Kubernetes v1.21 or later, unavailable in v1.25 or later ## create: false ## @param podSecurityPolicy.enabled Enable PodSecurityPolicy's RBAC rules ## enabled: false ## RBAC configuration ## rbac: ## @param rbac.create Specifies whether RBAC resources should be created ## create: false ## @param rbac.rules Custom RBAC rules to set ## e.g: ## rules: ## - apiGroups: ## - "" ## resources: ## - pods ## verbs: ## - get ## - list ## rules: [] ## ServiceAccount configuration ## serviceAccount: ## @param serviceAccount.create Specifies whether a ServiceAccount should be created ## create: true ## @param serviceAccount.name The name of the ServiceAccount to use. ## If not set and create is true, a name is generated using the common.names.fullname template ## name: "" ## @param serviceAccount.automountServiceAccountToken Whether to auto mount the service account token ## ref: https://kubernetes.io/docs/tasks/configure-pod-container/configure-service-account/#use-the-default-service-account-to-access-the-api-server ## automountServiceAccountToken: true ## @param serviceAccount.annotations Additional custom annotations for the ServiceAccount ## annotations: {} ## Redis&trade; Pod Disruption Budget configuration ## ref: https://kubernetes.io/docs/tasks/run-application/configure-pdb/ ## pdb: ## @param pdb.create Specifies whether a PodDisruptionBudget should be created ## create: false ## @param pdb.minAvailable Min number of pods that must still be available after the eviction ## minAvailable: 1 ## @param pdb.maxUnavailable Max number of pods that can be unavailable after the eviction ## maxUnavailable: "" ## TLS configuration ## tls: ## @param tls.enabled Enable TLS traffic ## enabled: false ## @param tls.authClients Require clients to authenticate ## authClients: true ## @param tls.autoGenerated Enable autogenerated certificates ## autoGenerated: false ## @param tls.existingSecret The name of the existing secret that contains the TLS certificates ## existingSecret: "" ## @param tls.certificatesSecret DEPRECATED. Use existingSecret instead. ## certificatesSecret: "" ## @param tls.certFilename Certificate filename ## certFilename: "" ## @param tls.certKeyFilename Certificate Key filename ## certKeyFilename: "" ## @param tls.certCAFilename CA Certificate filename ## certCAFilename: "" ## @param tls.dhParamsFilename File containing DH params (in order to support DH based ciphers) ## dhParamsFilename: "" ## @section Metrics Parameters ## metrics: ## @param metrics.enabled Start a sidecar prometheus exporter to expose Redis&trade; metrics ## enabled: false ## Bitnami Redis&trade; Exporter image ## ref: https://hub.docker.com/r/bitnami/redis-exporter/tags/ ## @param metrics.image.registry Redis&trade; Exporter image registry ## @param metrics.image.repository Redis&trade; Exporter image repository ## @param metrics.image.tag Redis&trade; Redis&trade; Exporter image tag (immutable tags are recommended) ## @param metrics.image.pullPolicy Redis&trade; Exporter image pull policy ## @param metrics.image.pullSecrets Redis&trade; Exporter image pull secrets ## image: registry: docker.io repository: bitnami/redis-exporter tag: 1.36.0-debian-10-r5 pullPolicy: IfNotPresent ## Optionally specify an array of imagePullSecrets. ## Secrets must be manually created in the namespace. ## ref: https://kubernetes.io/docs/tasks/configure-pod-container/pull-image-private-registry/ ## e.g: ## pullSecrets: ## - myRegistryKeySecretName ## pullSecrets: [] ## @param metrics.command Override default metrics container init command (useful when using custom images) ## command: [] ## @param metrics.redisTargetHost A way to specify an alternative Redis&trade; hostname ## Useful for certificate CN/SAN matching ## redisTargetHost: "localhost" ## @param metrics.extraArgs Extra arguments for Redis&trade; exporter, for example: ## e.g.: ## extraArgs: ## check-keys: myKey,myOtherKey ## extraArgs: {} ## Configure Container Security Context ## ref: https://kubernetes.io/docs/tasks/configure-pod-container/security-context/#set-the-security-context-for-a-pod ## @param metrics.containerSecurityContext.enabled Enabled Redis&trade; exporter containers' Security Context ## @param metrics.containerSecurityContext.runAsUser Set Redis&trade; exporter containers' Security Context runAsUser ## containerSecurityContext: enabled: true runAsUser: 1001 ## @param metrics.extraVolumes Optionally specify extra list of additional volumes for the Redis&trade; metrics sidecar ## extraVolumes: [] ## @param metrics.extraVolumeMounts Optionally specify extra list of additional volumeMounts for the Redis&trade; metrics sidecar ## extraVolumeMounts: [] ## Redis&trade; exporter resource requests and limits ## ref: https://kubernetes.io/docs/user-guide/compute-resources/ ## @param metrics.resources.limits The resources limits for the Redis&trade; exporter container ## @param metrics.resources.requests The requested resources for the Redis&trade; exporter container ## resources: limits: {} requests: {} ## @param metrics.podLabels Extra labels for Redis&trade; exporter pods ## ref: https://kubernetes.io/docs/concepts/overview/working-with-objects/labels/ ## podLabels: {} ## @param metrics.podAnnotations [object] Annotations for Redis&trade; exporter pods ## ref: https://kubernetes.io/docs/concepts/overview/working-with-objects/annotations/ ## podAnnotations: prometheus.io/scrape: "true" prometheus.io/port: "9121" ## Redis&trade; exporter service parameters ## service: ## @param metrics.service.type Redis&trade; exporter service type ## type: ClusterIP ## @param metrics.service.port Redis&trade; exporter service port ## port: 9121 ## @param metrics.service.externalTrafficPolicy Redis&trade; exporter service external traffic policy ## ref: https://kubernetes.io/docs/tasks/access-application-cluster/create-external-load-balancer/#preserving-the-client-source-ip ## externalTrafficPolicy: Cluster ## @param metrics.service.extraPorts Extra ports to expose (normally used with the `sidecar` value) ## extraPorts: [] ## @param metrics.service.loadBalancerIP Redis&trade; exporter service Load Balancer IP ## ref: https://kubernetes.io/docs/concepts/services-networking/service/#internal-load-balancer ## loadBalancerIP: "" ## @param metrics.service.loadBalancerSourceRanges Redis&trade; exporter service Load Balancer sources ## https://kubernetes.io/docs/tasks/access-application-cluster/configure-cloud-provider-firewall/#restrict-access-for-loadbalancer-service ## e.g. ## loadBalancerSourceRanges: ## - 10.10.10.0/24 ## loadBalancerSourceRanges: [] ## @param metrics.service.annotations Additional custom annotations for Redis&trade; exporter service ## annotations: {} ## Prometheus Service Monitor ## ref: https://github.com/coreos/prometheus-operator ## https://github.com/coreos/prometheus-operator/blob/master/Documentation/api.md#endpoint ## serviceMonitor: ## @param metrics.serviceMonitor.enabled Create ServiceMonitor resource(s) for scraping metrics using PrometheusOperator ## enabled: false ## @param metrics.serviceMonitor.namespace The namespace in which the ServiceMonitor will be created ## namespace: "" ## @param metrics.serviceMonitor.interval The interval at which metrics should be scraped ## interval: 30s ## @param metrics.serviceMonitor.scrapeTimeout The timeout after which the scrape is ended ## scrapeTimeout: "" ## @param metrics.serviceMonitor.relabellings Metrics RelabelConfigs to apply to samples before scraping. ## relabellings: [] ## @param metrics.serviceMonitor.metricRelabelings Metrics RelabelConfigs to apply to samples before ingestion. ## metricRelabelings: [] ## @param metrics.serviceMonitor.honorLabels Specify honorLabels parameter to add the scrape endpoint ## honorLabels: false ## @param metrics.serviceMonitor.additionalLabels Additional labels that can be used so ServiceMonitor resource(s) can be discovered by Prometheus ## additionalLabels: {} ## Custom PrometheusRule to be defined ## ref: https://github.com/coreos/prometheus-operator#customresourcedefinitions ## prometheusRule: ## @param metrics.prometheusRule.enabled Create a custom prometheusRule Resource for scraping metrics using PrometheusOperator ## enabled: false ## @param metrics.prometheusRule.namespace The namespace in which the prometheusRule will be created ## namespace: "" ## @param metrics.prometheusRule.additionalLabels Additional labels for the prometheusRule ## additionalLabels: {} ## @param metrics.prometheusRule.rules Custom Prometheus rules ## e.g: ## rules: ## - alert: RedisDown ## expr: redis_up{service="{{ template "common.names.fullname" . }}-metrics"} == 0 ## for: 2m ## labels: ## severity: error ## annotations: ## summary: Redis&trade; instance {{ "{{ $labels.instance }}" }} down ## description: Redis&trade; instance {{ "{{ $labels.instance }}" }} is down ## - alert: RedisMemoryHigh ## expr: > ## redis_memory_used_bytes{service="{{ template "common.names.fullname" . }}-metrics"} * 100 ## / ## redis_memory_max_bytes{service="{{ template "common.names.fullname" . }}-metrics"} ## > 90 ## for: 2m ## labels: ## severity: error ## annotations: ## summary: Redis&trade; instance {{ "{{ $labels.instance }}" }} is using too much memory ## description: | ## Redis&trade; instance {{ "{{ $labels.instance }}" }} is using {{ "{{ $value }}" }}% of its available memory. ## - alert: RedisKeyEviction ## expr: | ## increase(redis_evicted_keys_total{service="{{ template "common.names.fullname" . }}-metrics"}[5m]) > 0 ## for: 1s ## labels: ## severity: error ## annotations: ## summary: Redis&trade; instance {{ "{{ $labels.instance }}" }} has evicted keys ## description: | ## Redis&trade; instance {{ "{{ $labels.instance }}" }} has evicted {{ "{{ $value }}" }} keys in the last 5 minutes. ## rules: [] ## @section Init Container Parameters ## ## 'volumePermissions' init container parameters ## Changes the owner and group of the persistent volume mount point to runAsUser:fsGroup values ## based on the *podSecurityContext/*containerSecurityContext parameters ## volumePermissions: ## @param volumePermissions.enabled Enable init container that changes the owner/group of the PV mount point to `runAsUser:fsGroup` ## enabled: false ## Bitnami Shell image ## ref: https://hub.docker.com/r/bitnami/bitnami-shell/tags/ ## @param volumePermissions.image.registry Bitnami Shell image registry ## @param volumePermissions.image.repository Bitnami Shell image repository ## @param volumePermissions.image.tag Bitnami Shell image tag (immutable tags are recommended) ## @param volumePermissions.image.pullPolicy Bitnami Shell image pull policy ## @param volumePermissions.image.pullSecrets Bitnami Shell image pull secrets ## image: registry: docker.io repository: bitnami/bitnami-shell tag: 10-debian-10-r367 pullPolicy: IfNotPresent ## Optionally specify an array of imagePullSecrets. ## Secrets must be manually created in the namespace. ## ref: https://kubernetes.io/docs/tasks/configure-pod-container/pull-image-private-registry/ ## e.g: ## pullSecrets: ## - myRegistryKeySecretName ## pullSecrets: [] ## Init container's resource requests and limits ## ref: https://kubernetes.io/docs/user-guide/compute-resources/ ## @param volumePermissions.resources.limits The resources limits for the init container ## @param volumePermissions.resources.requests The requested resources for the init container ## resources: limits: {} requests: {} ## Init container Container Security Context ## ref: https://kubernetes.io/docs/tasks/configure-pod-container/security-context/#set-the-security-context-for-a-container ## @param volumePermissions.containerSecurityContext.runAsUser Set init container's Security Context runAsUser ## NOTE: when runAsUser is set to special value "auto", init container will try to chown the ## data folder to auto-determined user&group, using commands: `id -u`:`id -G | cut -d" " -f2` ## "auto" is especially useful for OpenShift which has scc with dynamic user ids (and 0 is not allowed) ## containerSecurityContext: runAsUser: 0 ## init-sysctl container parameters ## used to perform sysctl operation to modify Kernel settings (needed sometimes to avoid warnings) ## sysctl: ## @param sysctl.enabled Enable init container to modify Kernel settings ## enabled: false ## Bitnami Shell image ## ref: https://hub.docker.com/r/bitnami/bitnami-shell/tags/ ## @param sysctl.image.registry Bitnami Shell image registry ## @param sysctl.image.repository Bitnami Shell image repository ## @param sysctl.image.tag Bitnami Shell image tag (immutable tags are recommended) ## @param sysctl.image.pullPolicy Bitnami Shell image pull policy ## @param sysctl.image.pullSecrets Bitnami Shell image pull secrets ## image: registry: docker.io repository: bitnami/bitnami-shell tag: 10-debian-10-r367 pullPolicy: IfNotPresent ## Optionally specify an array of imagePullSecrets. ## Secrets must be manually created in the namespace. ## ref: https://kubernetes.io/docs/tasks/configure-pod-container/pull-image-private-registry/ ## e.g: ## pullSecrets: ## - myRegistryKeySecretName ## pullSecrets: [] ## @param sysctl.command Override default init-sysctl container command (useful when using custom images) ## command: [] ## @param sysctl.mountHostSys Mount the host `/sys` folder to `/host-sys` ## mountHostSys: false ## Init container's resource requests and limits ## ref: https://kubernetes.io/docs/user-guide/compute-resources/ ## @param sysctl.resources.limits The resources limits for the init container ## @param sysctl.resources.requests The requested resources for the init container ## resources: limits: {} requests: {} ## @section useExternalDNS Parameters ## ## @param useExternalDNS.enabled Enable various syntax that would enable external-dns to work. Note this requires a working installation of `external-dns` to be usable. ## @param useExternalDNS.additionalAnnotations Extra annotations to be utilized when `external-dns` is enabled. ## @param useExternalDNS.annotationKey The annotation key utilized when `external-dns` is enabled. ## @param useExternalDNS.suffix The DNS suffix utilized when `external-dns` is enabled. Note that we prepend the suffix with the full name of the release. ## useExternalDNS: enabled: false suffix: "" annotationKey: external-dns.alpha.kubernetes.io/ additionalAnnotations: {}
42.398039
250
0.726618
ed1e35f28dbc6db17dc745a5e41e42310e5c971c
183,211
yaml
YAML
bitnami/harbor/values.yaml
00arthur00/charts
502aa1e64541669b732a4eda896e5937847b6c3c
[ "Apache-2.0" ]
null
null
null
bitnami/harbor/values.yaml
00arthur00/charts
502aa1e64541669b732a4eda896e5937847b6c3c
[ "Apache-2.0" ]
2
2022-01-26T01:14:30.000Z
2022-01-26T07:03:39.000Z
bitnami/harbor/values.yaml
00arthur00/charts
502aa1e64541669b732a4eda896e5937847b6c3c
[ "Apache-2.0" ]
null
null
null
## @section Global parameters ## Global Docker image parameters ## Please, note that this will override the image parameters, including dependencies, configured to use the global value ## Current available global Docker image parameters: imageRegistry, imagePullSecrets and storageClass ## @param global.imageRegistry Global Docker image registry ## @param global.imagePullSecrets Global Docker registry secret names as an array ## @param global.storageClass Global StorageClass for Persistent Volume(s) ## global: imageRegistry: "" ## E.g. ## imagePullSecrets: ## - myRegistryKeySecretName ## imagePullSecrets: [] storageClass: "" ## @section Common Parameters ## @param nameOverride String to partially override common.names.fullname template (will maintain the release name) ## nameOverride: "" ## @param fullnameOverride String to fully override common.names.fullname template with a string ## fullnameOverride: "" ## @param kubeVersion Force target Kubernetes version (using Helm capabilities if not set) ## kubeVersion: "" ## @param clusterDomain Kubernetes Cluster Domain ## clusterDomain: cluster.local ## @param commonAnnotations Annotations to add to all deployed objects ## commonAnnotations: {} ## @param commonLabels Labels to add to all deployed objects ## commonLabels: {} ## @param extraDeploy Array of extra objects to deploy with the release (evaluated as a template). ## extraDeploy: [] ## Enable diagnostic mode in the deployment(s)/statefulset(s) ## diagnosticMode: ## @param diagnosticMode.enabled Enable diagnostic mode (all probes will be disabled and the command will be overridden) ## enabled: false ## @param diagnosticMode.command Command to override all containers in the the deployment(s)/statefulset(s) ## command: - sleep ## @param diagnosticMode.args Args to override all containers in the the deployment(s)/statefulset(s) ## args: - infinity ## @section Harbor common parameters ## @param adminPassword The initial password of Harbor admin. Change it from portal after launching Harbor ## adminPassword: "" ## @param externalURL The external URL for Harbor Core service ## It is used to ## 1) populate the docker/helm commands showed on portal ## 2) populate the token service URL returned to docker/notary client ## ## Format: protocol://domain[:port]. Usually: ## 1) if "exposureType" is "ingress", the "domain" should be ## the value of "ingress.hostname" ## 2) if "exposureType" is "proxy" and "service.type" is "ClusterIP", ## the "domain" should be the value of "service.clusterIP" ## 3) if "exposureType" is "proxy" and "service.type" is "NodePort", ## the "domain" should be the IP address of k8s node ## 4) if "exposureType" is "proxy" and "service.type" is "LoadBalancer", ## the "domain" should be the LoadBalancer IP ## externalURL: https://core.harbor.domain ## The proxy settings for updating clair vulnerabilities from the Internet and replicating ## artifacts from/to the registries that cannot be reached directly ## Note: If Harbor is exposed via Ingress, the NGINX server will not be used ## @param proxy.httpProxy The URL of the HTTP proxy server ## @param proxy.httpsProxy The URL of the HTTPS proxy server ## @param proxy.noProxy The URLs that the proxy settings not apply to ## @param proxy.components The component list that the proxy settings apply to ## proxy: httpProxy: "" httpsProxy: "" noProxy: 127.0.0.1,localhost,.local,.internal components: - core - jobservice - clair - trivy ## @param logLevel The log level used for Harbor services. Allowed values are [ fatal | error | warn | info | debug | trace ] ## logLevel: debug ## TLS settings ## Note: TLS cert files need to provided in each components in advance. ## internalTLS: ## @param internalTLS.enabled Use TLS in all the supported containers: chartmuseum, clair, core, jobservice, portal, registry and trivy ## enabled: false ## @param internalTLS.caBundleSecret Name of an existing secret with a custom CA that will be injected into the trust store for chartmuseum, clair, core, jobservice, registry, trivy components ## The secret must contain the key "ca.crt" ## caBundleSecret: "" ## IP family parameters ## ipFamily: ## @param ipFamily.ipv6.enabled Enable listening on IPv6 ([::]) for NGINX-based components (NGINX,portal) ## Note: enabling IPv6 will cause NGINX to crash on start on systems with IPv6 disabled (`ipv6.disable` kernel flag) ## ipv6: enabled: true ## @param ipFamily.ipv4.enabled Enable listening on IPv4 for NGINX-based components (NGINX,portal) ## ipv4: enabled: true ## @section Traffic Exposure Parameters ## @param exposureType The way to expose Harbor. Allowed values are [ ingress | proxy ] ## Use "proxy" to use a deploy NGINX proxy in front of Harbor services ## Use "ingress" to use an Ingress Controller as proxy ## exposureType: proxy ## Service parameters ## service: ## @param service.type NGINX proxy service type ## type: LoadBalancer ## @param service.ports.http NGINX proxy service HTTP port ## @param service.ports.https NGINX proxy service HTTPS port ## @param service.ports.notary Notary service port ## ports: http: 80 https: 443 notary: 4443 ## Node ports to expose ## @param service.nodePorts.http Node port for HTTP ## @param service.nodePorts.https Node port for HTTPS ## @param service.nodePorts.notary Node port for Notary ## NOTE: choose port between <30000-32767> ## nodePorts: http: "" https: "" notary: "" ## @param service.sessionAffinity Control where client requests go, to the same pod or round-robin ## Values: ClientIP or None ## ref: https://kubernetes.io/docs/user-guide/services/ ## sessionAffinity: None ## @param service.clusterIP NGINX proxy service Cluster IP ## e.g.: ## clusterIP: None ## clusterIP: "" ## @param service.loadBalancerIP NGINX proxy service Load Balancer IP ## ref: https://kubernetes.io/docs/concepts/services-networking/service/#type-loadbalancer ## loadBalancerIP: "" ## @param service.loadBalancerSourceRanges NGINX proxy service Load Balancer sources ## ref: https://kubernetes.io/docs/tasks/access-application-cluster/configure-cloud-provider-firewall/#restrict-access-for-loadbalancer-service ## e.g: ## loadBalancerSourceRanges: ## - 10.10.10.0/24 ## loadBalancerSourceRanges: [] ## @param service.externalTrafficPolicy NGINX proxy service external traffic policy ## ref https://kubernetes.io/docs/tasks/access-application-cluster/create-external-load-balancer/#preserving-the-client-source-ip ## externalTrafficPolicy: Cluster ## @param service.annotations Additional custom annotations for NGINX proxy service ## annotations: {} ## @param service.extraPorts Extra port to expose on NGINX proxy service ## extraPorts: [] ingress: ## Configure the ingress resource that allows you to access Harbor Core ## ref: https://kubernetes.io/docs/user-guide/ingress/ ## core: ## @param ingress.core.ingressClassName IngressClass that will be be used to implement the Ingress (Kubernetes 1.18+) ## This is supported in Kubernetes 1.18+ and required if you have more than one IngressClass marked as the default for your cluster . ## ref: https://kubernetes.io/blog/2020/04/02/improvements-to-the-ingress-api-in-kubernetes-1.18/ ## ingressClassName: "" ## @param ingress.core.pathType Ingress path type ## pathType: ImplementationSpecific ## @param ingress.core.apiVersion Force Ingress API version (automatically detected if not set) ## apiVersion: "" ## @param ingress.core.controller The ingress controller type. Currently supports `default`, `gce` and `ncp` ## leave as `default` for most ingress controllers. ## set to `gce` if using the GCE ingress controller ## set to `ncp` if using the NCP (NSX-T Container Plugin) ingress controller ## controller: default ## @param ingress.core.hostname Default host for the ingress record ## hostname: core.harbor.domain ## @param ingress.core.annotations [object] Additional annotations for the Ingress resource. To enable certificate autogeneration, place here your cert-manager annotations. ## Use this parameter to set the required annotations for cert-manager, see ## ref: https://cert-manager.io/docs/usage/ingress/#supported-annotations ## e.g: ## annotations: ## kubernetes.io/ingress.class: nginx ## cert-manager.io/cluster-issuer: cluster-issuer-name ## annotations: ingress.kubernetes.io/ssl-redirect: 'true' ingress.kubernetes.io/proxy-body-size: '0' nginx.ingress.kubernetes.io/ssl-redirect: 'true' nginx.ingress.kubernetes.io/proxy-body-size: '0' ## @param ingress.core.tls Enable TLS configuration for the host defined at `ingress.core.hostname` parameter ## TLS certificates will be retrieved from a TLS secret with name: `{{- printf "%s-tls" .Values.ingress.core.hostname }}` ## You can: ## - Use the `ingress.core.secrets` parameter to create this TLS secret ## - Relay on cert-manager to create it by setting the corresponding annotations ## - Relay on Helm to create self-signed certificates by setting `ingress.core.selfSigned=true` ## tls: false ## @param ingress.core.selfSigned Create a TLS secret for this ingress record using self-signed certificates generated by Helm ## selfSigned: false ## @param ingress.core.extraHosts An array with additional hostname(s) to be covered with the ingress record ## e.g: ## extraHosts: ## - name: core.harbor.domain ## path: / ## extraHosts: [] ## @param ingress.core.extraPaths An array with additional arbitrary paths that may need to be added to the ingress under the main host ## e.g: ## extraPaths: ## - path: /* ## backend: ## serviceName: ssl-redirect ## servicePort: use-annotation ## extraPaths: [] ## @param ingress.core.extraTls TLS configuration for additional hostname(s) to be covered with this ingress record ## ref: https://kubernetes.io/docs/concepts/services-networking/ingress/#tls ## e.g: ## extraTls: ## - hosts: ## - core.harbor.domain ## secretName: core.harbor.domain-tls ## extraTls: [] ## @param ingress.core.secrets Custom TLS certificates as secrets ## NOTE: 'key' and 'certificate' are expected in PEM format ## NOTE: 'name' should line up with a 'secretName' set further up ## If it is not set and you're using cert-manager, this is unneeded, as it will create a secret for you with valid certificates ## If it is not set and you're NOT using cert-manager either, self-signed certificates will be created valid for 365 days ## It is also possible to create and manage the certificates outside of this helm chart ## Please see README.md for more information ## e.g: ## secrets: ## - name: core.harbor.domain-tls ## key: |- ## -----BEGIN RSA PRIVATE KEY----- ## ... ## -----END RSA PRIVATE KEY----- ## certificate: |- ## -----BEGIN CERTIFICATE----- ## ... ## -----END CERTIFICATE----- ## secrets: [] ## Configure the ingress resource that allows you to access Notary ## ref: https://kubernetes.io/docs/user-guide/ingress/ ## notary: ## @param ingress.notary.ingressClassName IngressClass that will be be used to implement the Ingress (Kubernetes 1.18+) ## This is supported in Kubernetes 1.18+ and required if you have more than one IngressClass marked as the default for your cluster . ## ref: https://kubernetes.io/blog/2020/04/02/improvements-to-the-ingress-api-in-kubernetes-1.18/ ## ingressClassName: "" ## @param ingress.notary.pathType Ingress path type ## pathType: ImplementationSpecific ## @param ingress.notary.apiVersion Force Ingress API version (automatically detected if not set) ## apiVersion: "" ## @param ingress.notary.controller The ingress controller type. Currently supports `default`, `gce` and `ncp` ## leave as `default` for most ingress controllers. ## set to `gce` if using the GCE ingress controller ## set to `ncp` if using the NCP (NSX-T Container Plugin) ingress controller ## controller: default ## @param ingress.notary.hostname Default host for the ingress record ## hostname: notary.harbor.domain ## @param ingress.notary.annotations [object] Additional annotations for the Ingress resource. To enable certificate autogeneration, place here your cert-manager annotations. ## Use this parameter to set the required annotations for cert-manager, see ## ref: https://cert-manager.io/docs/usage/ingress/#supported-annotations ## e.g: ## annotations: ## kubernetes.io/ingress.class: nginx ## cert-manager.io/cluster-issuer: cluster-issuer-name ## annotations: ingress.kubernetes.io/ssl-redirect: 'true' ingress.kubernetes.io/proxy-body-size: '0' nginx.ingress.kubernetes.io/ssl-redirect: 'true' nginx.ingress.kubernetes.io/proxy-body-size: '0' ## @param ingress.notary.tls Enable TLS configuration for the host defined at `ingress.hostname` parameter ## TLS certificates will be retrieved from a TLS secret with name: `{{- printf "%s-tls" .Values.ingress.notary.hostname }}` ## You can: ## - Use the `ingress.notary.secrets` parameter to create this TLS secret ## - Relay on cert-manager to create it by setting the corresponding annotations ## - Relay on Helm to create self-signed certificates by setting `ingress.notary.selfSigned=true` ## tls: false ## @param ingress.notary.selfSigned Create a TLS secret for this ingress record using self-signed certificates generated by Helm ## selfSigned: false ## @param ingress.notary.extraHosts An array with additional hostname(s) to be covered with the ingress record ## e.g: ## extraHosts: ## - name: notary.harbor.domain ## path: / ## extraHosts: [] ## @param ingress.notary.extraPaths An array with additional arbitrary paths that may need to be added to the ingress under the main host ## e.g: ## extraPaths: ## - path: /* ## backend: ## serviceName: ssl-redirect ## servicePort: use-annotation ## extraPaths: [] ## @param ingress.notary.extraTls TLS configuration for additional hostname(s) to be covered with this ingress record ## ref: https://kubernetes.io/docs/concepts/services-networking/ingress/#tls ## e.g: ## extraTls: ## - hosts: ## - notary.harbor.domain ## secretName: notary.harbor.domain-tls ## extraTls: [] ## @param ingress.notary.secrets Custom TLS certificates as secrets ## NOTE: 'key' and 'certificate' are expected in PEM format ## NOTE: 'name' should line up with a 'secretName' set further up ## If it is not set and you're using cert-manager, this is unneeded, as it will create a secret for you with valid certificates ## If it is not set and you're NOT using cert-manager either, self-signed certificates will be created valid for 365 days ## It is also possible to create and manage the certificates outside of this helm chart ## Please see README.md for more information ## e.g: ## secrets: ## - name: notary.harbor.domain-tls ## key: |- ## -----BEGIN RSA PRIVATE KEY----- ## ... ## -----END RSA PRIVATE KEY----- ## certificate: |- ## -----BEGIN CERTIFICATE----- ## ... ## -----END CERTIFICATE----- ## secrets: [] ## @section Persistence Parameters ## The persistence is enabled by default and a default StorageClass ## is needed in the k8s cluster to provision volumes dynamically. ## Specify another StorageClass in the "storageClass" or set "existingClaim" ## if you have already existing persistent volumes to use ## ## For storing images and charts, you can also use "azure", "gcs", "s3", ## "swift" or "oss". Set it in the "imageChartStorage" section ## persistence: ## @param persistence.enabled Enable the data persistence or not ## enabled: true ## Resource Policy ## @param persistence.resourcePolicy Setting it to `keep` to avoid removing PVCs during a helm delete operation. Leaving it empty will delete PVCs after the chart deleted ## resourcePolicy: 'keep' persistentVolumeClaim: ## @param persistence.persistentVolumeClaim.registry.existingClaim Name of an existing PVC to use ## @param persistence.persistentVolumeClaim.registry.storageClass PVC Storage Class for Harbor Registry data volume ## Note: The default StorageClass will be used if not defined. Set it to `-` to disable dynamic provisioning ## @param persistence.persistentVolumeClaim.registry.subPath The sub path used in the volume ## @param persistence.persistentVolumeClaim.registry.accessModes The access mode of the volume ## @param persistence.persistentVolumeClaim.registry.size The size of the volume ## @param persistence.persistentVolumeClaim.registry.annotations Annotations for the PVC ## @param persistence.persistentVolumeClaim.registry.selector Selector to match an existing Persistent Volume ## registry: existingClaim: "" storageClass: "" subPath: "" accessModes: - ReadWriteOnce size: 5Gi annotations: {} selector: {} ## @param persistence.persistentVolumeClaim.jobservice.existingClaim Name of an existing PVC to use ## @param persistence.persistentVolumeClaim.jobservice.storageClass PVC Storage Class for Harbor Jobservice data volume ## Note: The default StorageClass will be used if not defined. Set it to `-` to disable dynamic provisioning ## @param persistence.persistentVolumeClaim.jobservice.subPath The sub path used in the volume ## @param persistence.persistentVolumeClaim.jobservice.accessModes The access mode of the volume ## @param persistence.persistentVolumeClaim.jobservice.size The size of the volume ## @param persistence.persistentVolumeClaim.jobservice.annotations Annotations for the PVC ## @param persistence.persistentVolumeClaim.jobservice.selector Selector to match an existing Persistent Volume ## jobservice: existingClaim: "" storageClass: "" subPath: "" accessModes: - ReadWriteOnce size: 1Gi annotations: {} selector: {} ## @param persistence.persistentVolumeClaim.chartmuseum.existingClaim Name of an existing PVC to use ## @param persistence.persistentVolumeClaim.chartmuseum.storageClass PVC Storage Class for Chartmuseum data volume ## Note: The default StorageClass will be used if not defined. Set it to `-` to disable dynamic provisioning ## @param persistence.persistentVolumeClaim.chartmuseum.subPath The sub path used in the volume ## @param persistence.persistentVolumeClaim.chartmuseum.accessModes The access mode of the volume ## @param persistence.persistentVolumeClaim.chartmuseum.size The size of the volume ## @param persistence.persistentVolumeClaim.chartmuseum.annotations Annotations for the PVC ## @param persistence.persistentVolumeClaim.chartmuseum.selector Selector to match an existing Persistent Volume ## chartmuseum: existingClaim: "" storageClass: "" subPath: "" accessModes: - ReadWriteOnce size: 5Gi annotations: {} selector: {} ## @param persistence.persistentVolumeClaim.trivy.storageClass PVC Storage Class for Trivy data volume ## Note: The default StorageClass will be used if not defined. Set it to `-` to disable dynamic provisioning ## @param persistence.persistentVolumeClaim.trivy.accessModes The access mode of the volume ## @param persistence.persistentVolumeClaim.trivy.size The size of the volume ## @param persistence.persistentVolumeClaim.trivy.annotations Annotations for the PVC ## @param persistence.persistentVolumeClaim.trivy.selector Selector to match an existing Persistent Volume ## trivy: storageClass: "" accessModes: - ReadWriteOnce size: 5Gi annotations: {} selector: {} ## Define which storage backend is used for registry and chartmuseum to store ## images and charts. ## ref: https://github.com/docker/distribution/blob/master/docs/configuration.md#storage ## imageChartStorage: ## @param persistence.imageChartStorage.caBundleSecret Specify the `caBundleSecret` if the storage service uses a self-signed certificate. The secret must contain keys named `ca.crt` which will be injected into the trust store of registry's and chartmuseum's containers. ## caBundleSecret: "" ## @param persistence.imageChartStorage.disableredirect The configuration for managing redirects from content backends. For backends which do not supported it (such as using MinIO&reg; for `s3` storage type), please set it to `true` to disable redirects. Refer to the [guide](https://github.com/docker/distribution/blob/master/docs/configuration.md#redirect) for more information about the detail ## disableredirect: false ## @param persistence.imageChartStorage.type The type of storage for images and charts: `filesystem`, `azure`, `gcs`, `s3`, `swift` or `oss`. The type must be `filesystem` if you want to use persistent volumes for registry and chartmuseum. Refer to the [guide](https://github.com/docker/distribution/blob/master/docs/configuration.md#storage) for more information about the detail ## type: filesystem ## Images/charts storage parameters when type is "filesystem" ## @param persistence.imageChartStorage.filesystem.rootdirectory Filesystem storage type setting: Storage root directory ## @param persistence.imageChartStorage.filesystem.maxthreads Filesystem storage type setting: Maximum threads directory ## filesystem: rootdirectory: /storage maxthreads: "" ## Images/charts storage parameters when type is "azure" ## @param persistence.imageChartStorage.azure.accountname Azure storage type setting: Name of the Azure account ## @param persistence.imageChartStorage.azure.accountkey Azure storage type setting: Key of the Azure account ## @param persistence.imageChartStorage.azure.container Azure storage type setting: Container ## @param persistence.imageChartStorage.azure.storagePrefix Azure storage type setting: Storage prefix ## @param persistence.imageChartStorage.azure.realm Azure storage type setting: Realm of the Azure account ## azure: accountname: accountname accountkey: base64encodedaccountkey container: containername storagePrefix: /azure/harbor/charts ## Example realm ## realm: core.windows.net ## realm: "" ## Images/charts storage parameters when type is "gcs" ## @param persistence.imageChartStorage.gcs.bucket GCS storage type setting: Bucket name ## @param persistence.imageChartStorage.gcs.encodedkey GCS storage type setting: Base64 encoded key ## @param persistence.imageChartStorage.gcs.rootdirectory GCS storage type setting: Root directory name ## @param persistence.imageChartStorage.gcs.chunksize GCS storage type setting: Chunk size name ## gcs: bucket: bucketname ## The base64 encoded json file which contains the gcs key (file's content) ## encodedkey: base64-encoded-json-key-file rootdirectory: "" chunksize: "" ## Images/charts storage parameters when type is "s3" ## ref: https://docs.docker.com/registry/storage-drivers/s3/ ## @param persistence.imageChartStorage.s3.region S3 storage type setting: Region ## @param persistence.imageChartStorage.s3.bucket S3 storage type setting: Bucket name ## @param persistence.imageChartStorage.s3.accesskey S3 storage type setting: Access key name ## @param persistence.imageChartStorage.s3.secretkey S3 storage type setting: Secret Key name ## @param persistence.imageChartStorage.s3.regionendpoint S3 storage type setting: Region Endpoint ## @param persistence.imageChartStorage.s3.encrypt S3 storage type setting: Encrypt ## @param persistence.imageChartStorage.s3.keyid S3 storage type setting: Key ID ## @param persistence.imageChartStorage.s3.secure S3 storage type setting: Secure ## @param persistence.imageChartStorage.s3.skipverify S3 storage type setting: TLS skip verification ## @param persistence.imageChartStorage.s3.v4auth S3 storage type setting: V4 authorization ## @param persistence.imageChartStorage.s3.chunksize S3 storage type setting: V4 authorization ## @param persistence.imageChartStorage.s3.rootdirectory S3 storage type setting: Root directory name ## @param persistence.imageChartStorage.s3.storageClass S3 storage type setting: Storage class ## @param persistence.imageChartStorage.s3.sse S3 storage type setting: SSE name ## s3: region: us-west-1 bucket: bucketname accesskey: "" secretkey: "" regionendpoint: "" encrypt: "" keyid: "" secure: "" skipverify: "" v4auth: "" chunksize: "" rootdirectory: "" storageClass: "" sse: "" ## Images/charts storage parameters when type is "swift" ## @param persistence.imageChartStorage.swift.authurl Swift storage type setting: Authentication url ## @param persistence.imageChartStorage.swift.username Swift storage type setting: Authentication url ## @param persistence.imageChartStorage.swift.password Swift storage type setting: Password ## @param persistence.imageChartStorage.swift.container Swift storage type setting: Container ## @param persistence.imageChartStorage.swift.region Swift storage type setting: Region ## @param persistence.imageChartStorage.swift.tenant Swift storage type setting: Tenant ## @param persistence.imageChartStorage.swift.tenantid Swift storage type setting: TenantID ## @param persistence.imageChartStorage.swift.domain Swift storage type setting: Domain ## @param persistence.imageChartStorage.swift.domainid Swift storage type setting: DomainID ## @param persistence.imageChartStorage.swift.trustid Swift storage type setting: TrustID ## @param persistence.imageChartStorage.swift.insecureskipverify Swift storage type setting: Verification ## @param persistence.imageChartStorage.swift.chunksize Swift storage type setting: Chunk ## @param persistence.imageChartStorage.swift.prefix Swift storage type setting: Prefix ## @param persistence.imageChartStorage.swift.secretkey Swift storage type setting: Secre Key ## @param persistence.imageChartStorage.swift.accesskey Swift storage type setting: Access Key ## @param persistence.imageChartStorage.swift.authversion Swift storage type setting: Auth ## @param persistence.imageChartStorage.swift.endpointtype Swift storage type setting: Endpoint ## @param persistence.imageChartStorage.swift.tempurlcontainerkey Swift storage type setting: Temp URL container key ## @param persistence.imageChartStorage.swift.tempurlmethods Swift storage type setting: Temp URL methods ## swift: authurl: https://storage.myprovider.com/v3/auth username: "" password: "" container: "" region: "" tenant: "" tenantid: "" domain: "" domainid: "" trustid: "" insecureskipverify: "" chunksize: "" prefix: "" secretkey: "" accesskey: "" authversion: "" endpointtype: "" tempurlcontainerkey: "" tempurlmethods: "" ## Images/charts storage parameters when type is "oss" ## @param persistence.imageChartStorage.oss.accesskeyid OSS storage type setting: Access key ID ## @param persistence.imageChartStorage.oss.accesskeysecret OSS storage type setting: Access key secret name containing the token ## @param persistence.imageChartStorage.oss.region OSS storage type setting: Region name ## @param persistence.imageChartStorage.oss.bucket OSS storage type setting: Bucket name ## @param persistence.imageChartStorage.oss.endpoint OSS storage type setting: Endpoint ## @param persistence.imageChartStorage.oss.internal OSS storage type setting: Internal ## @param persistence.imageChartStorage.oss.encrypt OSS storage type setting: Encrypt ## @param persistence.imageChartStorage.oss.secure OSS storage type setting: Secure ## @param persistence.imageChartStorage.oss.chunksize OSS storage type setting: Chunk ## @param persistence.imageChartStorage.oss.rootdirectory OSS storage type setting: Directory ## @param persistence.imageChartStorage.oss.secretkey OSS storage type setting: Secret key ## oss: accesskeyid: "" accesskeysecret: "" region: "" bucket: "" endpoint: "" internal: "" encrypt: "" secure: "" chunksize: "" rootdirectory: "" secretkey: "" ## @section Volume Permissions parameters ## Init containers parameters: ## volumePermissions: Change the owner and group of the persistent volume(s) mountpoint(s) to 'runAsUser:fsGroup' on each node ## volumePermissions: ## @param volumePermissions.enabled Enable init container that changes the owner and group of the persistent volume ## enabled: false ## @param volumePermissions.image.registry Init container volume-permissions image registry ## @param volumePermissions.image.repository Init container volume-permissions image repository ## @param volumePermissions.image.tag Init container volume-permissions image tag (immutable tags are recommended) ## @param volumePermissions.image.pullPolicy Init container volume-permissions image pull policy ## @param volumePermissions.image.pullSecrets Init container volume-permissions image pull secrets ## image: registry: docker.io repository: bitnami/bitnami-shell tag: 10-debian-10-r366 pullPolicy: IfNotPresent ## Optionally specify an array of imagePullSecrets. ## Secrets must be manually created in the namespace. ## ref: https://kubernetes.io/docs/tasks/configure-pod-container/pull-image-private-registry/ ## Example: ## pullSecrets: ## - myRegistryKeySecretName ## pullSecrets: [] ## Init container resource requests and limits ## ref: https://kubernetes.io/docs/user-guide/compute-resources/ ## @param volumePermissions.resources.limits Init container volume-permissions resource limits ## @param volumePermissions.resources.requests Init container volume-permissions resource requests ## resources: limits: {} requests: {} ## Init container' Security Context ## Note: the chown of the data folder is done to containerSecurityContext.runAsUser ## and not the below volumePermissions.containerSecurityContext.runAsUser ## @param volumePermissions.containerSecurityContext.enabled Enable init container Security Context ## @param volumePermissions.containerSecurityContext.runAsUser User ID for the init container ## containerSecurityContext: enabled: true runAsUser: 0 ## @section NGINX Parameters nginx: ## Bitnami NGINX image ## ref: https://hub.docker.com/r/bitnami/nginx/tags/ ## @param nginx.image.registry NGINX image registry ## @param nginx.image.repository NGINX image repository ## @param nginx.image.tag NGINX image tag (immutable tags are recommended) ## @param nginx.image.pullPolicy NGINX image pull policy ## @param nginx.image.pullSecrets NGINX image pull secrets ## @param nginx.image.debug Enable NGINX image debug mode ## image: registry: docker.io repository: bitnami/nginx tag: 1.21.6-debian-10-r47 ## Specify a imagePullPolicy ## Defaults to 'Always' if image tag is 'latest', else set to 'IfNotPresent' ## ref: https://kubernetes.io/docs/user-guide/images/#pre-pulling-images ## pullPolicy: IfNotPresent ## Optionally specify an array of imagePullSecrets. ## Secrets must be manually created in the namespace. ## ref: https://kubernetes.io/docs/tasks/configure-pod-container/pull-image-private-registry/ ## e.g: ## pullSecrets: ## - myRegistryKeySecretName ## pullSecrets: [] ## Enable debug mode ## debug: false ## TLS parameters ## tls: ## @param nginx.tls.enabled Enable TLS termination ## enabled: true ## @param nginx.tls.existingSecret Existing secret name containing your own TLS certificates. ## The secret must contain the keys: ## `tls.crt` - the certificate (required), ## `tls.key` - the private key (required), ## `ca.crt` - CA certificate (optional) ## Self-signed TLS certificates will be used otherwise. ## existingSecret: "" ## @param nginx.tls.commonName The common name used to generate the self-signed TLS certificates ## commonName: core.harbor.domain ## @param nginx.behindReverseProxy If NGINX is behind another reverse proxy, set to true ## if the reverse proxy already provides the 'X-Forwarded-Proto' header field. ## This is, for example, the case for the OpenShift HAProxy router. ## behindReverseProxy: false ## @param nginx.command Override default container command (useful when using custom images) ## command: [] ## @param nginx.args Override default container args (useful when using custom images) ## args: [] ## @param nginx.extraEnvVars Array with extra environment variables to add NGINX pods ## extraEnvVars: [] ## @param nginx.extraEnvVarsCM ConfigMap containing extra environment variables for NGINX pods ## extraEnvVarsCM: "" ## @param nginx.extraEnvVarsSecret Secret containing extra environment variables (in case of sensitive data) for NGINX pods ## extraEnvVarsSecret: "" ## @param nginx.containerPorts.http NGINX HTTP container port ## @param nginx.containerPorts.https NGINX HTTPS container port ## @param nginx.containerPorts.notary NGINX container port where Notary svc is exposed ## containerPorts: http: 8080 https: 8443 notary: 4443 ## @param nginx.replicaCount Number of NGINX replicas ## replicaCount: 1 ## Configure extra options for NGINX containers' liveness, readiness and startup probes ## ref: https://kubernetes.io/docs/tasks/configure-pod-container/configure-liveness-readiness-startup-probes/#configure-probes ## @param nginx.livenessProbe.enabled Enable livenessProbe on NGINX containers ## @param nginx.livenessProbe.initialDelaySeconds Initial delay seconds for livenessProbe ## @param nginx.livenessProbe.periodSeconds Period seconds for livenessProbe ## @param nginx.livenessProbe.timeoutSeconds Timeout seconds for livenessProbe ## @param nginx.livenessProbe.failureThreshold Failure threshold for livenessProbe ## @param nginx.livenessProbe.successThreshold Success threshold for livenessProbe ## livenessProbe: enabled: true initialDelaySeconds: 20 periodSeconds: 10 timeoutSeconds: 5 failureThreshold: 6 successThreshold: 1 ## @param nginx.readinessProbe.enabled Enable readinessProbe on NGINX containers ## @param nginx.readinessProbe.initialDelaySeconds Initial delay seconds for readinessProbe ## @param nginx.readinessProbe.periodSeconds Period seconds for readinessProbe ## @param nginx.readinessProbe.timeoutSeconds Timeout seconds for readinessProbe ## @param nginx.readinessProbe.failureThreshold Failure threshold for readinessProbe ## @param nginx.readinessProbe.successThreshold Success threshold for readinessProbe ## readinessProbe: enabled: true initialDelaySeconds: 20 periodSeconds: 10 timeoutSeconds: 5 failureThreshold: 6 successThreshold: 1 ## @param nginx.startupProbe.enabled Enable startupProbe on NGINX containers ## @param nginx.startupProbe.initialDelaySeconds Initial delay seconds for startupProbe ## @param nginx.startupProbe.periodSeconds Period seconds for startupProbe ## @param nginx.startupProbe.timeoutSeconds Timeout seconds for startupProbe ## @param nginx.startupProbe.failureThreshold Failure threshold for startupProbe ## @param nginx.startupProbe.successThreshold Success threshold for startupProbe ## startupProbe: enabled: false initialDelaySeconds: 10 periodSeconds: 10 timeoutSeconds: 1 failureThreshold: 15 successThreshold: 1 ## @param nginx.customLivenessProbe Custom livenessProbe that overrides the default one ## customLivenessProbe: {} ## @param nginx.customReadinessProbe Custom readinessProbe that overrides the default one ## customReadinessProbe: {} ## @param nginx.customStartupProbe Custom startupProbe that overrides the default one ## customStartupProbe: {} ## NGINX resource requests and limits ## ref: https://kubernetes.io/docs/user-guide/compute-resources/ ## @param nginx.resources.limits The resources limits for the NGINX containers ## @param nginx.resources.requests The requested resources for the NGINX containers ## resources: limits: {} requests: {} ## Configure NGINX pods Security Context ## ref: https://kubernetes.io/docs/tasks/configure-pod-container/security-context/#set-the-security-context-for-a-pod ## @param nginx.podSecurityContext.enabled Enabled NGINX pods' Security Context ## @param nginx.podSecurityContext.fsGroup Set NGINX pod's Security Context fsGroup ## podSecurityContext: enabled: true fsGroup: 1001 ## Configure NGINX containers (only main one) Security Context ## ref: https://kubernetes.io/docs/tasks/configure-pod-container/security-context/#set-the-security-context-for-a-container ## @param nginx.containerSecurityContext.enabled Enabled NGINX containers' Security Context ## @param nginx.containerSecurityContext.runAsUser Set NGINX containers' Security Context runAsUser ## @param nginx.containerSecurityContext.runAsNonRoot Set NGINX containers' Security Context runAsNonRoot ## containerSecurityContext: enabled: true runAsUser: 1001 runAsNonRoot: true ## @param nginx.updateStrategy.type NGINX deployment strategy type - only really applicable for deployments with RWO PVs attached ## @param nginx.updateStrategy.rollingUpdate NGINX deployment rolling update configuration parameters ## If replicas = 1, an update can get "stuck", as the previous pod remains attached to the ## PV, and the "incoming" pod can never start. Changing the strategy to "Recreate" will ## terminate the single previous pod, so that the new, incoming pod can attach to the PV ## updateStrategy: type: RollingUpdate rollingUpdate: {} ## @param nginx.lifecycleHooks LifecycleHook for the NGINX container(s) to automate configuration before or after startup ## lifecycleHooks: {} ## @param nginx.hostAliases NGINX pods host aliases ## hostAliases: [] ## @param nginx.podLabels Add additional labels to the NGINX pods (evaluated as a template) ## ref: https://kubernetes.io/docs/concepts/overview/working-with-objects/labels/ ## podLabels: {} ## @param nginx.podAnnotations Annotations to add to the NGINX pods (evaluated as a template) ## ref: https://kubernetes.io/docs/concepts/overview/working-with-objects/annotations/ ## podAnnotations: {} ## @param nginx.podAffinityPreset NGINX Pod affinity preset. Ignored if `affinity` is set. Allowed values: `soft` or `hard` ## ref: https://kubernetes.io/docs/concepts/scheduling-eviction/assign-pod-node/#inter-pod-affinity-and-anti-affinity ## podAffinityPreset: "" ## @param nginx.podAntiAffinityPreset NGINX Pod anti-affinity preset. Ignored if `affinity` is set. Allowed values: `soft` or `hard` ## Ref: https://kubernetes.io/docs/concepts/scheduling-eviction/assign-pod-node/#inter-pod-affinity-and-anti-affinity ## podAntiAffinityPreset: soft ## Node affinity preset ## Ref: https://kubernetes.io/docs/concepts/scheduling-eviction/assign-pod-node/#node-affinity ## Allowed values: soft, hard ## nodeAffinityPreset: ## @param nginx.nodeAffinityPreset.type NGINX Node affinity preset type. Ignored if `affinity` is set. Allowed values: `soft` or `hard` ## type: "" ## @param nginx.nodeAffinityPreset.key NGINX Node label key to match Ignored if `affinity` is set. ## E.g. ## key: "kubernetes.io/e2e-az-name" ## key: "" ## @param nginx.nodeAffinityPreset.values NGINX Node label values to match. Ignored if `affinity` is set. ## E.g. ## values: ## - e2e-az1 ## - e2e-az2 ## values: [] ## @param nginx.affinity NGINX Affinity for pod assignment ## Ref: https://kubernetes.io/docs/concepts/configuration/assign-pod-node/#affinity-and-anti-affinity ## Note: podAffinityPreset, podAntiAffinityPreset, and nodeAffinityPreset will be ignored when it's set ## affinity: {} ## @param nginx.nodeSelector NGINX Node labels for pod assignment ## Ref: https://kubernetes.io/docs/user-guide/node-selection/ ## nodeSelector: {} ## @param nginx.tolerations NGINX Tolerations for pod assignment ## Ref: https://kubernetes.io/docs/concepts/configuration/taint-and-toleration/ ## tolerations: [] ## @param nginx.topologySpreadConstraints Topology Spread Constraints for pod assignment spread across your cluster among failure-domains. Evaluated as a template ## Ref: https://kubernetes.io/docs/concepts/workloads/pods/pod-topology-spread-constraints/#spread-constraints-for-pods ## topologySpreadConstraints: {} ## @param nginx.priorityClassName Priority Class Name ## ref: https://kubernetes.io/docs/concepts/configuration/pod-priority-preemption/#priorityclass ## priorityClassName: "" ## @param nginx.schedulerName Use an alternate scheduler, e.g. "stork". ## ref: https://kubernetes.io/docs/tasks/administer-cluster/configure-multiple-schedulers/ ## schedulerName: "" ## @param nginx.sidecars Add additional sidecar containers to the NGINX pods ## Example: ## sidecars: ## - name: your-image-name ## image: your-image ## imagePullPolicy: Always ## ports: ## - name: portname ## containerPort: 1234 ## sidecars: [] ## @param nginx.initContainers Add additional init containers to the NGINX pods ## Example: ## initContainers: ## - name: your-image-name ## image: your-image ## imagePullPolicy: Always ## ports: ## - name: portname ## containerPort: 1234 ## initContainers: [] ## @param nginx.extraVolumeMounts Optionally specify extra list of additional volumeMounts for the NGINX pods ## extraVolumeMounts: [] ## @param nginx.extraVolumes Optionally specify extra list of additional volumes for the NGINX pods ## extraVolumes: [] ## @section Harbor Portal Parameters portal: ## Bitnami Harbor Portal image ## ref: https://hub.docker.com/r/bitnami/harbor-portal/tags/ ## @param portal.image.registry Harbor Portal image registry ## @param portal.image.repository Harbor Portal image repository ## @param portal.image.tag Harbor Portal image tag (immutable tags are recommended) ## @param portal.image.pullPolicy Harbor Portal image pull policy ## @param portal.image.pullSecrets Harbor Portal image pull secrets ## @param portal.image.debug Enable Harbor Portal image debug mode ## image: registry: docker.io repository: bitnami/harbor-portal tag: 2.4.1-debian-10-r70 ## Specify a imagePullPolicy ## Defaults to 'Always' if image tag is 'latest', else set to 'IfNotPresent' ## ref: https://kubernetes.io/docs/user-guide/images/#pre-pulling-images ## pullPolicy: IfNotPresent ## Optionally specify an array of imagePullSecrets. ## Secrets must be manually created in the namespace. ## ref: https://kubernetes.io/docs/tasks/configure-pod-container/pull-image-private-registry/ ## e.g: ## pullSecrets: ## - myRegistryKeySecretName ## pullSecrets: [] ## Enable debug mode ## debug: false ## Use TLS in the container ## tls: ## @param portal.tls.existingSecret Name of an existing secret with the certificates for internal TLS access ## Requires `internalTLS.enabled` to be set to `true`` ## Self-signed TLS certificates will be used otherwise ## existingSecret: "" ## @param portal.command Override default container command (useful when using custom images) ## command: [] ## @param portal.args Override default container args (useful when using custom images) ## args: [] ## @param portal.extraEnvVars Array with extra environment variables to add Harbor Portal pods ## extraEnvVars: [] ## @param portal.extraEnvVarsCM ConfigMap containing extra environment variables for Harbor Portal pods ## extraEnvVarsCM: "" ## @param portal.extraEnvVarsSecret Secret containing extra environment variables (in case of sensitive data) for Harbor Portal pods ## extraEnvVarsSecret: "" ## @param portal.containerPorts.http Harbor Portal HTTP container port ## @param portal.containerPorts.https Harbor Portal HTTPS container port ## containerPorts: http: 8080 https: 8443 ## @param portal.replicaCount Number of Harbor Portal replicas ## replicaCount: 1 ## Configure extra options for Harbor Portal containers' liveness, readiness and startup probes ## ref: https://kubernetes.io/docs/tasks/configure-pod-container/configure-liveness-readiness-startup-probes/#configure-probes ## @param portal.livenessProbe.enabled Enable livenessProbe on Harbor Portal containers ## @param portal.livenessProbe.initialDelaySeconds Initial delay seconds for livenessProbe ## @param portal.livenessProbe.periodSeconds Period seconds for livenessProbe ## @param portal.livenessProbe.timeoutSeconds Timeout seconds for livenessProbe ## @param portal.livenessProbe.failureThreshold Failure threshold for livenessProbe ## @param portal.livenessProbe.successThreshold Success threshold for livenessProbe ## livenessProbe: enabled: true initialDelaySeconds: 20 periodSeconds: 10 timeoutSeconds: 5 failureThreshold: 6 successThreshold: 1 ## @param portal.readinessProbe.enabled Enable readinessProbe on Harbor Portal containers ## @param portal.readinessProbe.initialDelaySeconds Initial delay seconds for readinessProbe ## @param portal.readinessProbe.periodSeconds Period seconds for readinessProbe ## @param portal.readinessProbe.timeoutSeconds Timeout seconds for readinessProbe ## @param portal.readinessProbe.failureThreshold Failure threshold for readinessProbe ## @param portal.readinessProbe.successThreshold Success threshold for readinessProbe ## readinessProbe: enabled: true initialDelaySeconds: 20 periodSeconds: 10 timeoutSeconds: 5 failureThreshold: 6 successThreshold: 1 ## @param portal.startupProbe.enabled Enable startupProbe on Harbor Portal containers ## @param portal.startupProbe.initialDelaySeconds Initial delay seconds for startupProbe ## @param portal.startupProbe.periodSeconds Period seconds for startupProbe ## @param portal.startupProbe.timeoutSeconds Timeout seconds for startupProbe ## @param portal.startupProbe.failureThreshold Failure threshold for startupProbe ## @param portal.startupProbe.successThreshold Success threshold for startupProbe ## startupProbe: enabled: false initialDelaySeconds: 5 periodSeconds: 10 timeoutSeconds: 1 failureThreshold: 15 successThreshold: 1 ## @param portal.customLivenessProbe Custom livenessProbe that overrides the default one ## customLivenessProbe: {} ## @param portal.customReadinessProbe Custom readinessProbe that overrides the default one ## customReadinessProbe: {} ## @param portal.customStartupProbe Custom startupProbe that overrides the default one ## customStartupProbe: {} ## Harbor Portal resource requests and limits ## ref: https://kubernetes.io/docs/user-guide/compute-resources/ ## @param portal.resources.limits The resources limits for the Harbor Portal containers ## @param portal.resources.requests The requested resources for the Harbor Portal containers ## resources: limits: {} requests: {} ## Configure Harbor Portal pods Security Context ## ref: https://kubernetes.io/docs/tasks/configure-pod-container/security-context/#set-the-security-context-for-a-pod ## @param portal.podSecurityContext.enabled Enabled Harbor Portal pods' Security Context ## @param portal.podSecurityContext.fsGroup Set Harbor Portal pod's Security Context fsGroup ## podSecurityContext: enabled: true fsGroup: 1001 ## Configure Harbor Portal containers (only main one) Security Context ## ref: https://kubernetes.io/docs/tasks/configure-pod-container/security-context/#set-the-security-context-for-a-container ## @param portal.containerSecurityContext.enabled Enabled Harbor Portal containers' Security Context ## @param portal.containerSecurityContext.runAsUser Set Harbor Portal containers' Security Context runAsUser ## @param portal.containerSecurityContext.runAsNonRoot Set Harbor Portal containers' Security Context runAsNonRoot ## containerSecurityContext: enabled: true runAsUser: 1001 runAsNonRoot: true ## @param portal.updateStrategy.type Harbor Portal deployment strategy type - only really applicable for deployments with RWO PVs attached ## @param portal.updateStrategy.rollingUpdate Harbor Portal deployment rolling update configuration parameters ## If replicas = 1, an update can get "stuck", as the previous pod remains attached to the ## PV, and the "incoming" pod can never start. Changing the strategy to "Recreate" will ## terminate the single previous pod, so that the new, incoming pod can attach to the PV ## updateStrategy: type: RollingUpdate rollingUpdate: {} ## @param portal.lifecycleHooks LifecycleHook for the Harbor Portal container(s) to automate configuration before or after startup ## lifecycleHooks: {} ## @param portal.hostAliases Harbor Portal pods host aliases ## hostAliases: [] ## @param portal.podLabels Add additional labels to the Harbor Portal pods (evaluated as a template) ## ref: https://kubernetes.io/docs/concepts/overview/working-with-objects/labels/ ## podLabels: {} ## @param portal.podAnnotations Annotations to add to the Harbor Portal pods (evaluated as a template) ## ref: https://kubernetes.io/docs/concepts/overview/working-with-objects/annotations/ ## podAnnotations: {} ## @param portal.podAffinityPreset Harbor Portal Pod affinity preset. Ignored if `portal.affinity` is set. Allowed values: `soft` or `hard` ## ref: https://kubernetes.io/docs/concepts/scheduling-eviction/assign-pod-node/#inter-pod-affinity-and-anti-affinity ## podAffinityPreset: "" ## @param portal.podAntiAffinityPreset Harbor Portal Pod anti-affinity preset. Ignored if `portal.affinity` is set. Allowed values: `soft` or `hard` ## Ref: https://kubernetes.io/docs/concepts/scheduling-eviction/assign-pod-node/#inter-pod-affinity-and-anti-affinity ## podAntiAffinityPreset: soft ## Node affinity preset ## Ref: https://kubernetes.io/docs/concepts/scheduling-eviction/assign-pod-node/#node-affinity ## nodeAffinityPreset: ## @param portal.nodeAffinityPreset.type Harbor Portal Node affinity preset type. Ignored if `portal.affinity` is set. Allowed values: `soft` or `hard` ## type: "" ## @param portal.nodeAffinityPreset.key Harbor Portal Node label key to match Ignored if `portal.affinity` is set. ## E.g. ## key: "kubernetes.io/e2e-az-name" ## key: "" ## @param portal.nodeAffinityPreset.values Harbor Portal Node label values to match. Ignored if `portal.affinity` is set. ## E.g. ## values: ## - e2e-az1 ## - e2e-az2 ## values: [] ## @param portal.affinity Harbor Portal Affinity for pod assignment ## Ref: https://kubernetes.io/docs/concepts/configuration/assign-pod-node/#affinity-and-anti-affinity ## Note: portal.podAffinityPreset, portal.podAntiAffinityPreset, and portal.nodeAffinityPreset will be ignored when it's set ## affinity: {} ## @param portal.nodeSelector Harbor Portal Node labels for pod assignment ## Ref: https://kubernetes.io/docs/user-guide/node-selection/ ## nodeSelector: {} ## @param portal.tolerations Harbor Portal Tolerations for pod assignment ## Ref: https://kubernetes.io/docs/concepts/configuration/taint-and-toleration/ ## tolerations: [] ## @param portal.topologySpreadConstraints Topology Spread Constraints for pod assignment spread across your cluster among failure-domains. Evaluated as a template ## Ref: https://kubernetes.io/docs/concepts/workloads/pods/pod-topology-spread-constraints/#spread-constraints-for-pods ## topologySpreadConstraints: {} ## @param portal.priorityClassName Priority Class Name ## ref: https://kubernetes.io/docs/concepts/configuration/pod-priority-preemption/#priorityclass ## priorityClassName: "" ## @param portal.schedulerName Use an alternate scheduler, e.g. "stork". ## ref: https://kubernetes.io/docs/tasks/administer-cluster/configure-multiple-schedulers/ ## schedulerName: "" ## @param portal.sidecars Add additional sidecar containers to the Harbor Portal pods ## Example: ## sidecars: ## - name: your-image-name ## image: your-image ## imagePullPolicy: Always ## ports: ## - name: portname ## containerPort: 1234 ## sidecars: [] ## @param portal.initContainers Add additional init containers to the Harbor Portal pods ## Example: ## initContainers: ## - name: your-image-name ## image: your-image ## imagePullPolicy: Always ## ports: ## - name: portname ## containerPort: 1234 ## initContainers: [] ## @param portal.extraVolumeMounts Optionally specify extra list of additional volumeMounts for the Harbor Portal pods ## extraVolumeMounts: [] ## @param portal.extraVolumes Optionally specify extra list of additional volumes for the Harbor Portal pods ## extraVolumes: [] ## @param portal.automountServiceAccountToken Automount service account token ## automountServiceAccountToken: false ## Harbor Portal service configuration ## service: ## @param portal.service.ports.http Harbor Portal HTTP service port ## @param portal.service.ports.https Harbor Portal HTTPS service port ## ports: http: 80 https: 443 ## @section Harbor Core Parameters core: ## Bitnami Harbor Core image ## ref: https://hub.docker.com/r/bitnami/harbor-core/tags/ ## @param core.image.registry Harbor Core image registry ## @param core.image.repository Harbor Core image repository ## @param core.image.tag Harbor Core image tag (immutable tags are recommended) ## @param core.image.pullPolicy Harbor Core image pull policy ## @param core.image.pullSecrets Harbor Core image pull secrets ## @param core.image.debug Enable Harbor Core image debug mode ## image: registry: docker.io repository: bitnami/harbor-core tag: 2.4.1-debian-10-r81 ## Specify a imagePullPolicy ## Defaults to 'Always' if image tag is 'latest', else set to 'IfNotPresent' ## ref: https://kubernetes.io/docs/user-guide/images/#pre-pulling-images ## pullPolicy: IfNotPresent ## Optionally specify an array of imagePullSecrets. ## Secrets must be manually created in the namespace. ## ref: https://kubernetes.io/docs/tasks/configure-pod-container/pull-image-private-registry/ ## e.g: ## pullSecrets: ## - myRegistryKeySecretName ## pullSecrets: [] ## Enable debug mode ## debug: false ## @param core.uaaSecret If using external UAA auth which has a self signed cert, you can provide a pre-created secret containing it under the key `ca.crt`. ## uaaSecret: "" ## @param core.secretKey The key used for encryption. Must be a string of 16 chars ## e.g: ## secretKey: "not-a-secure-string" ## secretKey: "" ## @param core.secret Secret used when the core server communicates with other components. If a secret key is not specified, Helm will generate one. Must be a string of 16 chars. ## secret: "" ## @param core.secretName Fill the name of a kubernetes secret if you want to use your own TLS certificate and private key for token encryption/decryption. The secret must contain two keys named: `tls.crt` - the certificate and `tls.key` - the private key. The default key pair will be used if it isn't set ## secretName: "" ## @param core.csrfKey The CSRF key. Will be generated automatically if it isn't specified ## csrfKey: "" ## Use TLS in the container ## tls: ## @param core.tls.existingSecret Name of an existing secret with the certificates for internal TLS access ## Requires `internalTLS.enabled` to be set to `true`` ## Self-signed TLS certificates will be used otherwise ## existingSecret: "" ## @param core.command Override default container command (useful when using custom images) ## command: [] ## @param core.args Override default container args (useful when using custom images) ## args: [] ## @param core.extraEnvVars Array with extra environment variables to add Harbor Core pods ## extraEnvVars: [] ## @param core.extraEnvVarsCM ConfigMap containing extra environment variables for Harbor Core pods ## extraEnvVarsCM: "" ## @param core.extraEnvVarsSecret Secret containing extra environment variables (in case of sensitive data) for Harbor Core pods ## extraEnvVarsSecret: "" ## @param core.containerPorts.http Harbor Core HTTP container port ## @param core.containerPorts.https Harbor Core HTTPS container port ## containerPorts: http: 8080 https: 8443 ## @param core.replicaCount Number of Harbor Core replicas ## replicaCount: 1 ## Configure extra options for Harbor Core containers' liveness, readiness and startup probes ## ref: https://kubernetes.io/docs/tasks/configure-pod-container/configure-liveness-readiness-startup-probes/#configure-probes ## @param core.livenessProbe.enabled Enable livenessProbe on Harbor Core containers ## @param core.livenessProbe.initialDelaySeconds Initial delay seconds for livenessProbe ## @param core.livenessProbe.periodSeconds Period seconds for livenessProbe ## @param core.livenessProbe.timeoutSeconds Timeout seconds for livenessProbe ## @param core.livenessProbe.failureThreshold Failure threshold for livenessProbe ## @param core.livenessProbe.successThreshold Success threshold for livenessProbe ## livenessProbe: enabled: true initialDelaySeconds: 20 periodSeconds: 10 timeoutSeconds: 5 failureThreshold: 6 successThreshold: 1 ## @param core.readinessProbe.enabled Enable readinessProbe on Harbor Core containers ## @param core.readinessProbe.initialDelaySeconds Initial delay seconds for readinessProbe ## @param core.readinessProbe.periodSeconds Period seconds for readinessProbe ## @param core.readinessProbe.timeoutSeconds Timeout seconds for readinessProbe ## @param core.readinessProbe.failureThreshold Failure threshold for readinessProbe ## @param core.readinessProbe.successThreshold Success threshold for readinessProbe ## readinessProbe: enabled: true initialDelaySeconds: 20 periodSeconds: 10 timeoutSeconds: 5 failureThreshold: 6 successThreshold: 1 ## @param core.startupProbe.enabled Enable startupProbe on Harbor Core containers ## @param core.startupProbe.initialDelaySeconds Initial delay seconds for startupProbe ## @param core.startupProbe.periodSeconds Period seconds for startupProbe ## @param core.startupProbe.timeoutSeconds Timeout seconds for startupProbe ## @param core.startupProbe.failureThreshold Failure threshold for startupProbe ## @param core.startupProbe.successThreshold Success threshold for startupProbe ## startupProbe: enabled: false initialDelaySeconds: 5 periodSeconds: 10 timeoutSeconds: 1 failureThreshold: 15 successThreshold: 1 ## @param core.customLivenessProbe Custom livenessProbe that overrides the default one ## customLivenessProbe: {} ## @param core.customReadinessProbe Custom readinessProbe that overrides the default one ## customReadinessProbe: {} ## @param core.customStartupProbe Custom startupProbe that overrides the default one ## customStartupProbe: {} ## Harbor Core resource requests and limits ## ref: https://kubernetes.io/docs/user-guide/compute-resources/ ## @param core.resources.limits The resources limits for the Harbor Core containers ## @param core.resources.requests The requested resources for the Harbor Core containers ## resources: limits: {} requests: {} ## Configure Harbor Core pods Security Context ## ref: https://kubernetes.io/docs/tasks/configure-pod-container/security-context/#set-the-security-context-for-a-pod ## @param core.podSecurityContext.enabled Enabled Harbor Core pods' Security Context ## @param core.podSecurityContext.fsGroup Set Harbor Core pod's Security Context fsGroup ## podSecurityContext: enabled: true fsGroup: 1001 ## Configure Harbor Core containers (only main one) Security Context ## ref: https://kubernetes.io/docs/tasks/configure-pod-container/security-context/#set-the-security-context-for-a-container ## @param core.containerSecurityContext.enabled Enabled Harbor Core containers' Security Context ## @param core.containerSecurityContext.runAsUser Set Harbor Core containers' Security Context runAsUser ## @param core.containerSecurityContext.runAsNonRoot Set Harbor Core containers' Security Context runAsNonRoot ## containerSecurityContext: enabled: true runAsUser: 1001 runAsNonRoot: true ## @param core.updateStrategy.type Harbor Core deployment strategy type - only really applicable for deployments with RWO PVs attached ## @param core.updateStrategy.rollingUpdate Harbor Core deployment rolling update configuration parameters ## If replicas = 1, an update can get "stuck", as the previous pod remains attached to the ## PV, and the "incoming" pod can never start. Changing the strategy to "Recreate" will ## terminate the single previous pod, so that the new, incoming pod can attach to the PV ## updateStrategy: type: RollingUpdate rollingUpdate: {} ## @param core.lifecycleHooks LifecycleHook for the Harbor Core container(s) to automate configuration before or after startup ## lifecycleHooks: {} ## @param core.hostAliases Harbor Core pods host aliases ## hostAliases: [] ## @param core.podLabels Add additional labels to the Harbor Core pods (evaluated as a template) ## ref: https://kubernetes.io/docs/concepts/overview/working-with-objects/labels/ ## podLabels: {} ## @param core.podAnnotations Annotations to add to the Harbor Core pods (evaluated as a template) ## ref: https://kubernetes.io/docs/concepts/overview/working-with-objects/annotations/ ## podAnnotations: {} ## @param core.podAffinityPreset Harbor Core Pod affinity preset. Ignored if `core.affinity` is set. Allowed values: `soft` or `hard` ## ref: https://kubernetes.io/docs/concepts/scheduling-eviction/assign-pod-node/#inter-pod-affinity-and-anti-affinity ## podAffinityPreset: "" ## @param core.podAntiAffinityPreset Harbor Core Pod anti-affinity preset. Ignored if `core.affinity` is set. Allowed values: `soft` or `hard` ## Ref: https://kubernetes.io/docs/concepts/scheduling-eviction/assign-pod-node/#inter-pod-affinity-and-anti-affinity ## podAntiAffinityPreset: soft ## Node affinity preset ## Ref: https://kubernetes.io/docs/concepts/scheduling-eviction/assign-pod-node/#node-affinity ## nodeAffinityPreset: ## @param core.nodeAffinityPreset.type Harbor Core Node affinity preset type. Ignored if `core.affinity` is set. Allowed values: `soft` or `hard` ## type: "" ## @param core.nodeAffinityPreset.key Harbor Core Node label key to match Ignored if `core.affinity` is set. ## E.g. ## key: "kubernetes.io/e2e-az-name" ## key: "" ## @param core.nodeAffinityPreset.values Harbor Core Node label values to match. Ignored if `core.affinity` is set. ## E.g. ## values: ## - e2e-az1 ## - e2e-az2 ## values: [] ## @param core.affinity Harbor Core Affinity for pod assignment ## Ref: https://kubernetes.io/docs/concepts/configuration/assign-pod-node/#affinity-and-anti-affinity ## Note: core.podAffinityPreset, core.podAntiAffinityPreset, and core.nodeAffinityPreset will be ignored when it's set ## affinity: {} ## @param core.nodeSelector Harbor Core Node labels for pod assignment ## Ref: https://kubernetes.io/docs/user-guide/node-selection/ ## nodeSelector: {} ## @param core.tolerations Harbor Core Tolerations for pod assignment ## Ref: https://kubernetes.io/docs/concepts/configuration/taint-and-toleration/ ## tolerations: [] ## @param core.topologySpreadConstraints Topology Spread Constraints for pod assignment spread across your cluster among failure-domains. Evaluated as a template ## Ref: https://kubernetes.io/docs/concepts/workloads/pods/pod-topology-spread-constraints/#spread-constraints-for-pods ## topologySpreadConstraints: {} ## @param core.priorityClassName Priority Class Name ## ref: https://kubernetes.io/docs/concepts/configuration/pod-priority-preemption/#priorityclass ## priorityClassName: "" ## @param core.schedulerName Use an alternate scheduler, e.g. "stork". ## ref: https://kubernetes.io/docs/tasks/administer-cluster/configure-multiple-schedulers/ ## schedulerName: "" ## @param core.sidecars Add additional sidecar containers to the Harbor Core pods ## Example: ## sidecars: ## - name: your-image-name ## image: your-image ## imagePullPolicy: Always ## ports: ## - name: portname ## containerPort: 1234 ## sidecars: [] ## @param core.initContainers Add additional init containers to the Harbor Core pods ## Example: ## initContainers: ## - name: your-image-name ## image: your-image ## imagePullPolicy: Always ## ports: ## - name: portname ## containerPort: 1234 ## initContainers: [] ## @param core.extraVolumeMounts Optionally specify extra list of additional volumeMounts for the Harbor Core pods ## extraVolumeMounts: [] ## @param core.extraVolumes Optionally specify extra list of additional volumes for the Harbor Core pods ## extraVolumes: [] ## @param core.automountServiceAccountToken Automount service account token ## automountServiceAccountToken: false ## Harbor Core service configuration ## service: ## @param core.service.ports.http Harbor Core HTTP service port ## @param core.service.ports.https Harbor Core HTTPS service port ## ports: http: 80 https: 443 ## @section Harbor Jobservice Parameters jobservice: ## Bitnami Harbor Jobservice image ## ref: https://hub.docker.com/r/bitnami/harbor-jobservice/tags/ ## @param jobservice.image.registry Harbor Jobservice image registry ## @param jobservice.image.repository Harbor Jobservice image repository ## @param jobservice.image.tag Harbor Jobservice image tag (immutable tags are recommended) ## @param jobservice.image.pullPolicy Harbor Jobservice image pull policy ## @param jobservice.image.pullSecrets Harbor Jobservice image pull secrets ## @param jobservice.image.debug Enable Harbor Jobservice image debug mode ## image: registry: docker.io repository: bitnami/harbor-jobservice tag: 2.4.1-debian-10-r83 ## Specify a imagePullPolicy ## Defaults to 'Always' if image tag is 'latest', else set to 'IfNotPresent' ## ref: https://kubernetes.io/docs/user-guide/images/#pre-pulling-images ## pullPolicy: IfNotPresent ## Optionally specify an array of imagePullSecrets. ## Secrets must be manually created in the namespace. ## ref: https://kubernetes.io/docs/tasks/configure-pod-container/pull-image-private-registry/ ## e.g: ## pullSecrets: ## - myRegistryKeySecretName ## pullSecrets: [] ## Enable debug mode ## debug: false ## @param jobservice.maxJobWorkers The max job workers ## maxJobWorkers: 10 ## @param jobservice.jobLogger The logger for jobs: `file`, `database` or `stdout` ## jobLogger: file ## @param jobservice.secret Secret used when the job service communicates with other components. If a secret key is not specified, Helm will generate one. Must be a string of 16 chars. ## If a secret key is not specified, Helm will generate one. ## Must be a string of 16 chars. ## secret: "" ## Use TLS in the container ## tls: ## @param jobservice.tls.existingSecret Name of an existing secret with the certificates for internal TLS access ## Requires `internalTLS.enabled` to be set to `true`` ## Self-signed TLS certificates will be used otherwise ## existingSecret: "" ## @param jobservice.command Override default container command (useful when using custom images) ## command: [] ## @param jobservice.args Override default container args (useful when using custom images) ## args: [] ## @param jobservice.extraEnvVars Array with extra environment variables to add Harbor Jobservice pods ## extraEnvVars: [] ## @param jobservice.extraEnvVarsCM ConfigMap containing extra environment variables for Harbor Jobservice pods ## extraEnvVarsCM: "" ## @param jobservice.extraEnvVarsSecret Secret containing extra environment variables (in case of sensitive data) for Harbor Jobservice pods ## extraEnvVarsSecret: "" ## @param jobservice.containerPorts.http Harbor Jobservice HTTP container port ## @param jobservice.containerPorts.https Harbor Jobservice HTTPS container port ## containerPorts: http: 8080 https: 8443 ## @param jobservice.replicaCount Number of Harbor Jobservice replicas ## replicaCount: 1 ## Configure extra options for Harbor Jobservice containers' liveness, readiness and startup probes ## ref: https://kubernetes.io/docs/tasks/configure-pod-container/configure-liveness-readiness-startup-probes/#configure-probes ## @param jobservice.livenessProbe.enabled Enable livenessProbe on Harbor Jobservice containers ## @param jobservice.livenessProbe.initialDelaySeconds Initial delay seconds for livenessProbe ## @param jobservice.livenessProbe.periodSeconds Period seconds for livenessProbe ## @param jobservice.livenessProbe.timeoutSeconds Timeout seconds for livenessProbe ## @param jobservice.livenessProbe.failureThreshold Failure threshold for livenessProbe ## @param jobservice.livenessProbe.successThreshold Success threshold for livenessProbe ## livenessProbe: enabled: true initialDelaySeconds: 20 periodSeconds: 10 timeoutSeconds: 5 failureThreshold: 6 successThreshold: 1 ## @param jobservice.readinessProbe.enabled Enable readinessProbe on Harbor Jobservice containers ## @param jobservice.readinessProbe.initialDelaySeconds Initial delay seconds for readinessProbe ## @param jobservice.readinessProbe.periodSeconds Period seconds for readinessProbe ## @param jobservice.readinessProbe.timeoutSeconds Timeout seconds for readinessProbe ## @param jobservice.readinessProbe.failureThreshold Failure threshold for readinessProbe ## @param jobservice.readinessProbe.successThreshold Success threshold for readinessProbe ## readinessProbe: enabled: true initialDelaySeconds: 20 periodSeconds: 10 timeoutSeconds: 5 failureThreshold: 6 successThreshold: 1 ## @param jobservice.startupProbe.enabled Enable startupProbe on Harbor Jobservice containers ## @param jobservice.startupProbe.initialDelaySeconds Initial delay seconds for startupProbe ## @param jobservice.startupProbe.periodSeconds Period seconds for startupProbe ## @param jobservice.startupProbe.timeoutSeconds Timeout seconds for startupProbe ## @param jobservice.startupProbe.failureThreshold Failure threshold for startupProbe ## @param jobservice.startupProbe.successThreshold Success threshold for startupProbe ## startupProbe: enabled: false initialDelaySeconds: 5 periodSeconds: 10 timeoutSeconds: 1 failureThreshold: 15 successThreshold: 1 ## @param jobservice.customLivenessProbe Custom livenessProbe that overrides the default one ## customLivenessProbe: {} ## @param jobservice.customReadinessProbe Custom readinessProbe that overrides the default one ## customReadinessProbe: {} ## @param jobservice.customStartupProbe Custom startupProbe that overrides the default one ## customStartupProbe: {} ## Harbor Jobservice resource requests and limits ## ref: https://kubernetes.io/docs/user-guide/compute-resources/ ## @param jobservice.resources.limits The resources limits for the Harbor Jobservice containers ## @param jobservice.resources.requests The requested resources for the Harbor Jobservice containers ## resources: limits: {} requests: {} ## Configure Harbor Jobservice pods Security Context ## ref: https://kubernetes.io/docs/tasks/configure-pod-container/security-context/#set-the-security-context-for-a-pod ## @param jobservice.podSecurityContext.enabled Enabled Harbor Jobservice pods' Security Context ## @param jobservice.podSecurityContext.fsGroup Set Harbor Jobservice pod's Security Context fsGroup ## podSecurityContext: enabled: true fsGroup: 1001 ## Configure Harbor Jobservice containers (only main one) Security Context ## ref: https://kubernetes.io/docs/tasks/configure-pod-container/security-context/#set-the-security-context-for-a-container ## @param jobservice.containerSecurityContext.enabled Enabled Harbor Jobservice containers' Security Context ## @param jobservice.containerSecurityContext.runAsUser Set Harbor Jobservice containers' Security Context runAsUser ## @param jobservice.containerSecurityContext.runAsNonRoot Set Harbor Jobservice containers' Security Context runAsNonRoot ## containerSecurityContext: enabled: true runAsUser: 1001 runAsNonRoot: true ## @param jobservice.updateStrategy.type Harbor Jobservice deployment strategy type - only really applicable for deployments with RWO PVs attached ## @param jobservice.updateStrategy.rollingUpdate Harbor Jobservice deployment rolling update configuration parameters ## If replicas = 1, an update can get "stuck", as the previous pod remains attached to the ## PV, and the "incoming" pod can never start. Changing the strategy to "Recreate" will ## terminate the single previous pod, so that the new, incoming pod can attach to the PV ## updateStrategy: type: RollingUpdate rollingUpdate: {} ## @param jobservice.lifecycleHooks LifecycleHook for the Harbor Jobservice container(s) to automate configuration before or after startup ## lifecycleHooks: {} ## @param jobservice.hostAliases Harbor Jobservice pods host aliases ## hostAliases: [] ## @param jobservice.podLabels Add additional labels to the Harbor Jobservice pods (evaluated as a template) ## ref: https://kubernetes.io/docs/concepts/overview/working-with-objects/labels/ ## podLabels: {} ## @param jobservice.podAnnotations Annotations to add to the Harbor Jobservice pods (evaluated as a template) ## ref: https://kubernetes.io/docs/concepts/overview/working-with-objects/annotations/ ## podAnnotations: {} ## @param jobservice.podAffinityPreset Harbor Jobservice Pod affinity preset. Ignored if `jobservice.affinity` is set. Allowed values: `soft` or `hard` ## ref: https://kubernetes.io/docs/concepts/scheduling-eviction/assign-pod-node/#inter-pod-affinity-and-anti-affinity ## podAffinityPreset: "" ## @param jobservice.podAntiAffinityPreset Harbor Jobservice Pod anti-affinity preset. Ignored if `jobservice.affinity` is set. Allowed values: `soft` or `hard` ## Ref: https://kubernetes.io/docs/concepts/scheduling-eviction/assign-pod-node/#inter-pod-affinity-and-anti-affinity ## podAntiAffinityPreset: soft ## Node affinity preset ## Ref: https://kubernetes.io/docs/concepts/scheduling-eviction/assign-pod-node/#node-affinity ## nodeAffinityPreset: ## @param jobservice.nodeAffinityPreset.type Harbor Jobservice Node affinity preset type. Ignored if `jobservice.affinity` is set. Allowed values: `soft` or `hard` ## type: "" ## @param jobservice.nodeAffinityPreset.key Harbor Jobservice Node label key to match Ignored if `jobservice.affinity` is set. ## E.g. ## key: "kubernetes.io/e2e-az-name" ## key: "" ## @param jobservice.nodeAffinityPreset.values Harbor Jobservice Node label values to match. Ignored if `jobservice.affinity` is set. ## E.g. ## values: ## - e2e-az1 ## - e2e-az2 ## values: [] ## @param jobservice.affinity Harbor Jobservice Affinity for pod assignment ## Ref: https://kubernetes.io/docs/concepts/configuration/assign-pod-node/#affinity-and-anti-affinity ## Note: jobservice.podAffinityPreset, jobservice.podAntiAffinityPreset, and jobservice.nodeAffinityPreset will be ignored when it's set ## affinity: {} ## @param jobservice.nodeSelector Harbor Jobservice Node labels for pod assignment ## Ref: https://kubernetes.io/docs/user-guide/node-selection/ ## nodeSelector: {} ## @param jobservice.tolerations Harbor Jobservice Tolerations for pod assignment ## Ref: https://kubernetes.io/docs/concepts/configuration/taint-and-toleration/ ## tolerations: [] ## @param jobservice.topologySpreadConstraints Topology Spread Constraints for pod assignment spread across your cluster among failure-domains. Evaluated as a template ## Ref: https://kubernetes.io/docs/concepts/workloads/pods/pod-topology-spread-constraints/#spread-constraints-for-pods ## topologySpreadConstraints: {} ## @param jobservice.priorityClassName Priority Class Name ## ref: https://kubernetes.io/docs/concepts/configuration/pod-priority-preemption/#priorityclass ## priorityClassName: "" ## @param jobservice.schedulerName Use an alternate scheduler, e.g. "stork". ## ref: https://kubernetes.io/docs/tasks/administer-cluster/configure-multiple-schedulers/ ## schedulerName: "" ## @param jobservice.sidecars Add additional sidecar containers to the Harbor Jobservice pods ## Example: ## sidecars: ## - name: your-image-name ## image: your-image ## imagePullPolicy: Always ## ports: ## - name: portname ## containerPort: 1234 ## sidecars: [] ## @param jobservice.initContainers Add additional init containers to the Harbor Jobservice pods ## Example: ## initContainers: ## - name: your-image-name ## image: your-image ## imagePullPolicy: Always ## ports: ## - name: portname ## containerPort: 1234 ## initContainers: [] ## @param jobservice.extraVolumeMounts Optionally specify extra list of additional volumeMounts for the Harbor Jobservice pods ## extraVolumeMounts: [] ## @param jobservice.extraVolumes Optionally specify extra list of additional volumes for the Harbor Jobservice pods ## extraVolumes: [] ## @param jobservice.automountServiceAccountToken Automount service account token ## automountServiceAccountToken: false ## Harbor Jobservice service configuration ## service: ## @param jobservice.service.ports.http Harbor Jobservice HTTP service port ## @param jobservice.service.ports.https Harbor Jobservice HTTPS service port ## ports: http: 80 https: 443 ## @section Harbor Registry Parameters ## Registry Parameters ## registry: ## @param registry.secret Secret is used to secure the upload state from client and registry storage backend. See: https://github.com/docker/distribution/blob/master/docs/configuration.md ## and registry storage backend. ## See: https://github.com/docker/distribution/blob/master/docs/configuration.md#http ## If a secret key is not specified, Helm will generate one. ## Must be a string of 16 chars. ## secret: "" ## @param registry.relativeurls Make the registry return relative URLs in Location headers. The client is responsible for resolving the correct URL. ## relativeurls: false ## @param registry.credentials.username The username for accessing the registry instance, which is hosted by htpasswd auth mode. More details see [official docs](https://github.com/docker/distribution/blob/master/docs/configuration.md#htpasswd) ## @param registry.credentials.password The password for accessing the registry instance, which is hosted by htpasswd auth mode. More details see [official docs](https://github.com/docker/distribution/blob/master/docs/configuration.md#htpasswd). It is suggested you update this value before installation. ## @param registry.credentials.htpasswd The content of htpasswd file based on the value of `registry.credentials.username` `registry.credentials.password`. Currently `helm` does not support bcrypt in the template script, if the credential is updated you need to manually generated by calling ## credentials: username: 'harbor_registry_user' password: 'harbor_registry_password' ## If you update the username or password of registry, make sure use cli tool htpasswd to generate the bcrypt hash ## e.g. "htpasswd -nbBC10 $username $password" ## htpasswd: 'harbor_registry_user:$2y$10$9L4Tc0DJbFFMB6RdSCunrOpTHdwhid4ktBJmLD00bYgqkkGOvll3m' middleware: ## @param registry.middleware.enabled Middleware is used to add support for a CDN between backend storage and `docker pull` recipient. See ## enabled: false ## @param registry.middleware.type CDN type for the middleware ## type: cloudFront ## @param registry.middleware.cloudFront.baseurl CloudFront CDN settings: Base URL ## @param registry.middleware.cloudFront.keypairid CloudFront CDN settings: Keypair ID ## @param registry.middleware.cloudFront.duration CloudFront CDN settings: Duration ## @param registry.middleware.cloudFront.ipfilteredby CloudFront CDN settings: IP filters ## @param registry.middleware.cloudFront.privateKeySecret CloudFront CDN settings: Secret name with the private key ## cloudFront: baseurl: example.cloudfront.net keypairid: KEYPAIRID duration: 3000s ipfilteredby: none ## The secret key that should be present is CLOUDFRONT_KEY_DATA, which should be the encoded private key ## that allows access to CloudFront ## privateKeySecret: 'my-secret' ## Use TLS in the container ## tls: ## @param registry.tls.existingSecret Name of an existing secret with the certificates for internal TLS access ## Requires `internalTLS.enabled` to be set to `true`` ## Self-signed TLS certificates will be used otherwise ## existingSecret: "" ## @param registry.replicaCount Number of Harbor Registry replicas ## replicaCount: 1 ## Configure Harbor Registry pods Security Context ## ref: https://kubernetes.io/docs/tasks/configure-pod-container/security-context/#set-the-security-context-for-a-pod ## @param registry.podSecurityContext.enabled Enabled Harbor Registry pods' Security Context ## @param registry.podSecurityContext.fsGroup Set Harbor Registry pod's Security Context fsGroup ## podSecurityContext: enabled: true fsGroup: 1001 ## @param registry.updateStrategy.type Harbor Registry deployment strategy type - only really applicable for deployments with RWO PVs attached ## @param registry.updateStrategy.rollingUpdate Harbor Registry deployment rolling update configuration parameters ## If replicas = 1, an update can get "stuck", as the previous pod remains attached to the ## PV, and the "incoming" pod can never start. Changing the strategy to "Recreate" will ## terminate the single previous pod, so that the new, incoming pod can attach to the PV ## updateStrategy: type: RollingUpdate rollingUpdate: {} ## @param registry.hostAliases Harbor Registry pods host aliases ## hostAliases: [] ## @param registry.podLabels Add additional labels to the Harbor Registry pods (evaluated as a template) ## ref: https://kubernetes.io/docs/concepts/overview/working-with-objects/labels/ ## podLabels: {} ## @param registry.podAnnotations Annotations to add to the Harbor Registry pods (evaluated as a template) ## ref: https://kubernetes.io/docs/concepts/overview/working-with-objects/annotations/ ## podAnnotations: {} ## @param registry.podAffinityPreset Harbor Registry Pod affinity preset. Ignored if `registry.affinity` is set. Allowed values: `soft` or `hard` ## ref: https://kubernetes.io/docs/concepts/scheduling-eviction/assign-pod-node/#inter-pod-affinity-and-anti-affinity ## podAffinityPreset: "" ## @param registry.podAntiAffinityPreset Harbor Registry Pod anti-affinity preset. Ignored if `registry.affinity` is set. Allowed values: `soft` or `hard` ## Ref: https://kubernetes.io/docs/concepts/scheduling-eviction/assign-pod-node/#inter-pod-affinity-and-anti-affinity ## podAntiAffinityPreset: soft ## Node affinity preset ## Ref: https://kubernetes.io/docs/concepts/scheduling-eviction/assign-pod-node/#node-affinity ## nodeAffinityPreset: ## @param registry.nodeAffinityPreset.type Harbor Registry Node affinity preset type. Ignored if `registry.affinity` is set. Allowed values: `soft` or `hard` ## type: "" ## @param registry.nodeAffinityPreset.key Harbor Registry Node label key to match Ignored if `registry.affinity` is set. ## E.g. ## key: "kubernetes.io/e2e-az-name" ## key: "" ## @param registry.nodeAffinityPreset.values Harbor Registry Node label values to match. Ignored if `registry.affinity` is set. ## E.g. ## values: ## - e2e-az1 ## - e2e-az2 ## values: [] ## @param registry.affinity Harbor Registry Affinity for pod assignment ## Ref: https://kubernetes.io/docs/concepts/configuration/assign-pod-node/#affinity-and-anti-affinity ## Note: registry.podAffinityPreset, registry.podAntiAffinityPreset, and registry.nodeAffinityPreset will be ignored when it's set ## affinity: {} ## @param registry.nodeSelector Harbor Registry Node labels for pod assignment ## Ref: https://kubernetes.io/docs/user-guide/node-selection/ ## nodeSelector: {} ## @param registry.tolerations Harbor Registry Tolerations for pod assignment ## Ref: https://kubernetes.io/docs/concepts/configuration/taint-and-toleration/ ## tolerations: [] ## @param registry.topologySpreadConstraints Topology Spread Constraints for pod assignment spread across your cluster among failure-domains. Evaluated as a template ## Ref: https://kubernetes.io/docs/concepts/workloads/pods/pod-topology-spread-constraints/#spread-constraints-for-pods ## topologySpreadConstraints: {} ## @param registry.priorityClassName Priority Class Name ## ref: https://kubernetes.io/docs/concepts/configuration/pod-priority-preemption/#priorityclass ## priorityClassName: "" ## @param registry.schedulerName Use an alternate scheduler, e.g. "stork". ## ref: https://kubernetes.io/docs/tasks/administer-cluster/configure-multiple-schedulers/ ## schedulerName: "" ## @param registry.sidecars Add additional sidecar containers to the Harbor Registry pods ## Example: ## sidecars: ## - name: your-image-name ## image: your-image ## imagePullPolicy: Always ## ports: ## - name: portname ## containerPort: 1234 ## sidecars: [] ## @param registry.initContainers Add additional init containers to the Harbor Registry pods ## Example: ## initContainers: ## - name: your-image-name ## image: your-image ## imagePullPolicy: Always ## ports: ## - name: portname ## containerPort: 1234 ## initContainers: [] ## @param registry.extraVolumes Optionally specify extra list of additional volumes for the Harbor Registry pods ## extraVolumes: [] ## @param registry.automountServiceAccountToken Automount service account token ## automountServiceAccountToken: false ## Harbor Registry main container parameters ## server: ## Bitnami Harbor Registry image ## ref: https://hub.docker.com/r/bitnami/harbor-registry/tags/ ## @param registry.server.image.registry Harbor Registry image registry ## @param registry.server.image.repository Harbor Registry image repository ## @param registry.server.image.tag Harbor Registry image tag (immutable tags are recommended) ## @param registry.server.image.pullPolicy Harbor Registry image pull policy ## @param registry.server.image.pullSecrets Harbor Registry image pull secrets ## @param registry.server.image.debug Enable Harbor Registry image debug mode ## image: registry: docker.io repository: bitnami/harbor-registry tag: 2.4.1-debian-10-r87 ## Specify a imagePullPolicy ## Defaults to 'Always' if image tag is 'latest', else set to 'IfNotPresent' ## ref: https://kubernetes.io/docs/user-guide/images/#pre-pulling-images ## pullPolicy: IfNotPresent ## Optionally specify an array of imagePullSecrets. ## Secrets must be manually created in the namespace. ## ref: https://kubernetes.io/docs/tasks/configure-pod-container/pull-image-private-registry/ ## e.g: ## pullSecrets: ## - myRegistryKeySecretName ## pullSecrets: [] ## Enable debug mode ## debug: false ## @param registry.server.command Override default container command (useful when using custom images) ## command: [] ## @param registry.server.args Override default container args (useful when using custom images) ## args: [] ## @param registry.server.extraEnvVars Array with extra environment variables to add Harbor Registry main containers ## extraEnvVars: [] ## @param registry.server.extraEnvVarsCM ConfigMap containing extra environment variables for Harbor Registry main containers ## extraEnvVarsCM: "" ## @param registry.server.extraEnvVarsSecret Secret containing extra environment variables (in case of sensitive data) for Harbor Registry main containers ## extraEnvVarsSecret: "" ## @param registry.server.containerPorts.http Harbor Registry HTTP container port ## @param registry.server.containerPorts.https Harbor Registry HTTPS container port ## @param registry.server.containerPorts.debug Harbor Registry debug container port ## containerPorts: http: 5000 https: 5443 debug: 5001 ## Configure extra options for Harbor Registry main containers' liveness, readiness and startup probes ## ref: https://kubernetes.io/docs/tasks/configure-pod-container/configure-liveness-readiness-startup-probes/#configure-probes ## @param registry.server.livenessProbe.enabled Enable livenessProbe on Harbor Registry main containers ## @param registry.server.livenessProbe.initialDelaySeconds Initial delay seconds for livenessProbe ## @param registry.server.livenessProbe.periodSeconds Period seconds for livenessProbe ## @param registry.server.livenessProbe.timeoutSeconds Timeout seconds for livenessProbe ## @param registry.server.livenessProbe.failureThreshold Failure threshold for livenessProbe ## @param registry.server.livenessProbe.successThreshold Success threshold for livenessProbe ## livenessProbe: enabled: true initialDelaySeconds: 20 periodSeconds: 10 timeoutSeconds: 5 failureThreshold: 6 successThreshold: 1 ## @param registry.server.readinessProbe.enabled Enable readinessProbe on Harbor Registry main containers ## @param registry.server.readinessProbe.initialDelaySeconds Initial delay seconds for readinessProbe ## @param registry.server.readinessProbe.periodSeconds Period seconds for readinessProbe ## @param registry.server.readinessProbe.timeoutSeconds Timeout seconds for readinessProbe ## @param registry.server.readinessProbe.failureThreshold Failure threshold for readinessProbe ## @param registry.server.readinessProbe.successThreshold Success threshold for readinessProbe ## readinessProbe: enabled: true initialDelaySeconds: 20 periodSeconds: 10 timeoutSeconds: 5 failureThreshold: 6 successThreshold: 1 ## @param registry.server.startupProbe.enabled Enable startupProbe on Harbor Registry main containers ## @param registry.server.startupProbe.initialDelaySeconds Initial delay seconds for startupProbe ## @param registry.server.startupProbe.periodSeconds Period seconds for startupProbe ## @param registry.server.startupProbe.timeoutSeconds Timeout seconds for startupProbe ## @param registry.server.startupProbe.failureThreshold Failure threshold for startupProbe ## @param registry.server.startupProbe.successThreshold Success threshold for startupProbe ## startupProbe: enabled: false initialDelaySeconds: 5 periodSeconds: 10 timeoutSeconds: 1 failureThreshold: 15 successThreshold: 1 ## @param registry.server.customLivenessProbe Custom livenessProbe that overrides the default one ## customLivenessProbe: {} ## @param registry.server.customReadinessProbe Custom readinessProbe that overrides the default one ## customReadinessProbe: {} ## @param registry.server.customStartupProbe Custom startupProbe that overrides the default one ## customStartupProbe: {} ## Harbor Registry main resource requests and limits ## ref: https://kubernetes.io/docs/user-guide/compute-resources/ ## @param registry.server.resources.limits The resources limits for the Harbor Registry main containers ## @param registry.server.resources.requests The requested resources for the Harbor Registry main containers ## resources: limits: {} requests: {} ## Configure Harbor Registry main containers (only main one) Security Context ## ref: https://kubernetes.io/docs/tasks/configure-pod-container/security-context/#set-the-security-context-for-a-container ## @param registry.server.containerSecurityContext.enabled Enabled Harbor Registry main containers' Security Context ## @param registry.server.containerSecurityContext.runAsUser Set Harbor Registry main containers' Security Context runAsUser ## @param registry.server.containerSecurityContext.runAsNonRoot Set Harbor Registry main containers' Security Context runAsNonRoot ## containerSecurityContext: enabled: true runAsUser: 1001 runAsNonRoot: true ## @param registry.server.lifecycleHooks LifecycleHook for the Harbor Registry main container(s) to automate configuration before or after startup ## lifecycleHooks: {} ## @param registry.server.extraVolumeMounts Optionally specify extra list of additional volumeMounts for the Harbor Registry main pods ## extraVolumeMounts: [] ## Harbor Registry service configuration ## service: ## @param registry.server.service.ports.http Harbor Registry HTTP service port ## @param registry.server.service.ports.https Harbor Registry HTTPS service port ## ports: http: 5000 https: 5443 ## Harbor Registryctl parameters ## controller: ## Bitnami Harbor Registryctl image ## ref: https://hub.docker.com/r/bitnami/harbor-registryctl/tags/ ## @param registry.controller.image.registry Harbor Registryctl image registry ## @param registry.controller.image.repository Harbor Registryctl image repository ## @param registry.controller.image.tag Harbor Registryctl image tag (immutable tags are recommended) ## @param registry.controller.image.pullPolicy Harbor Registryctl image pull policy ## @param registry.controller.image.pullSecrets Harbor Registryctl image pull secrets ## @param registry.controller.image.debug Enable Harbor Registryctl image debug mode ## image: registry: docker.io repository: bitnami/harbor-registryctl tag: 2.4.1-debian-10-r86 ## Specify a imagePullPolicy ## Defaults to 'Always' if image tag is 'latest', else set to 'IfNotPresent' ## ref: https://kubernetes.io/docs/user-guide/images/#pre-pulling-images ## pullPolicy: IfNotPresent ## Optionally specify an array of imagePullSecrets. ## Secrets must be manually created in the namespace. ## ref: https://kubernetes.io/docs/tasks/configure-pod-container/pull-image-private-registry/ ## e.g: ## pullSecrets: ## - myRegistryKeySecretName ## pullSecrets: [] ## Enable debug mode ## debug: false ## @param registry.controller.command Override default container command (useful when using custom images) ## command: [] ## @param registry.controller.args Override default container args (useful when using custom images) ## args: [] ## @param registry.controller.extraEnvVars Array with extra environment variables to add Harbor Registryctl containers ## extraEnvVars: [] ## @param registry.controller.extraEnvVarsCM ConfigMap containing extra environment variables for Harbor Registryctl containers ## extraEnvVarsCM: "" ## @param registry.controller.extraEnvVarsSecret Secret containing extra environment variables (in case of sensitive data) for Harbor Registryctl containers ## extraEnvVarsSecret: "" ## @param registry.controller.containerPorts.http Harbor Registryctl HTTP container port ## @param registry.controller.containerPorts.https Harbor Registryctl HTTPS container port ## containerPorts: http: 8080 https: 8443 ## Configure extra options for Harbor Registryctl containers' liveness, readiness and startup probes ## ref: https://kubernetes.io/docs/tasks/configure-pod-container/configure-liveness-readiness-startup-probes/#configure-probes ## @param registry.controller.livenessProbe.enabled Enable livenessProbe on Harbor Registryctl containers ## @param registry.controller.livenessProbe.initialDelaySeconds Initial delay seconds for livenessProbe ## @param registry.controller.livenessProbe.periodSeconds Period seconds for livenessProbe ## @param registry.controller.livenessProbe.timeoutSeconds Timeout seconds for livenessProbe ## @param registry.controller.livenessProbe.failureThreshold Failure threshold for livenessProbe ## @param registry.controller.livenessProbe.successThreshold Success threshold for livenessProbe ## livenessProbe: enabled: true initialDelaySeconds: 20 periodSeconds: 10 timeoutSeconds: 5 failureThreshold: 6 successThreshold: 1 ## @param registry.controller.readinessProbe.enabled Enable readinessProbe on Harbor Registryctl containers ## @param registry.controller.readinessProbe.initialDelaySeconds Initial delay seconds for readinessProbe ## @param registry.controller.readinessProbe.periodSeconds Period seconds for readinessProbe ## @param registry.controller.readinessProbe.timeoutSeconds Timeout seconds for readinessProbe ## @param registry.controller.readinessProbe.failureThreshold Failure threshold for readinessProbe ## @param registry.controller.readinessProbe.successThreshold Success threshold for readinessProbe ## readinessProbe: enabled: true initialDelaySeconds: 20 periodSeconds: 10 timeoutSeconds: 5 failureThreshold: 6 successThreshold: 1 ## @param registry.controller.startupProbe.enabled Enable startupProbe on Harbor Registryctl containers ## @param registry.controller.startupProbe.initialDelaySeconds Initial delay seconds for startupProbe ## @param registry.controller.startupProbe.periodSeconds Period seconds for startupProbe ## @param registry.controller.startupProbe.timeoutSeconds Timeout seconds for startupProbe ## @param registry.controller.startupProbe.failureThreshold Failure threshold for startupProbe ## @param registry.controller.startupProbe.successThreshold Success threshold for startupProbe ## startupProbe: enabled: false initialDelaySeconds: 5 periodSeconds: 10 timeoutSeconds: 1 failureThreshold: 15 successThreshold: 1 ## @param registry.controller.customLivenessProbe Custom livenessProbe that overrides the default one ## customLivenessProbe: {} ## @param registry.controller.customReadinessProbe Custom readinessProbe that overrides the default one ## customReadinessProbe: {} ## @param registry.controller.customStartupProbe Custom startupProbe that overrides the default one ## customStartupProbe: {} ## Harbor Registryctl resource requests and limits ## ref: https://kubernetes.io/docs/user-guide/compute-resources/ ## @param registry.controller.resources.limits The resources limits for the Harbor Registryctl containers ## @param registry.controller.resources.requests The requested resources for the Harbor Registryctl containers ## resources: limits: {} requests: {} ## Configure Harbor Registryctl containers (only main one) Security Context ## ref: https://kubernetes.io/docs/tasks/configure-pod-container/security-context/#set-the-security-context-for-a-container ## @param registry.controller.containerSecurityContext.enabled Enabled Harbor Registryctl containers' Security Context ## @param registry.controller.containerSecurityContext.runAsUser Set Harbor Registryctl containers' Security Context runAsUser ## @param registry.controller.containerSecurityContext.runAsNonRoot Set Harbor Registryctl containers' Security Context runAsNonRoot ## containerSecurityContext: enabled: true runAsUser: 1001 runAsNonRoot: true ## @param registry.controller.lifecycleHooks LifecycleHook for the Harbor Registryctl container(s) to automate configuration before or after startup ## lifecycleHooks: {} ## @param registry.controller.extraVolumeMounts Optionally specify extra list of additional volumeMounts for the Harbor Registryctl pods ## extraVolumeMounts: [] ## Harbor Registryctl service configuration ## service: ## @param registry.controller.service.ports.http Harbor Registryctl HTTP service port ## @param registry.controller.service.ports.https Harbor Registryctl HTTPS service port ## ports: http: 8080 https: 8443 ## @section ChartMuseum Parameters chartmuseum: ## Bitnami ChartMuseum image ## ref: https://hub.docker.com/r/bitnami/chartmuseum/tags/ ## @param chartmuseum.image.registry ChartMuseum image registry ## @param chartmuseum.image.repository ChartMuseum image repository ## @param chartmuseum.image.tag ChartMuseum image tag (immutable tags are recommended) ## @param chartmuseum.image.pullPolicy ChartMuseum image pull policy ## @param chartmuseum.image.pullSecrets ChartMuseum image pull secrets ## @param chartmuseum.image.debug Enable ChartMuseum image debug mode ## image: registry: docker.io repository: bitnami/chartmuseum tag: 0.14.0-debian-10-r42 ## Specify a imagePullPolicy ## Defaults to 'Always' if image tag is 'latest', else set to 'IfNotPresent' ## ref: https://kubernetes.io/docs/user-guide/images/#pre-pulling-images ## pullPolicy: IfNotPresent ## Optionally specify an array of imagePullSecrets. ## Secrets must be manually created in the namespace. ## ref: https://kubernetes.io/docs/tasks/configure-pod-container/pull-image-private-registry/ ## e.g: ## pullSecrets: ## - myRegistryKeySecretName ## pullSecrets: [] ## Enable debug mode ## debug: false ## @param chartmuseum.enabled Enable ChartMuseum ## enabled: true ## @param chartmuseum.useRedisCache Specify if ChartMuseum will use redis cache ## useRedisCache: true ## Set the absolute URL to access the chartmuseum repository and the endpoint where it will be available. ## @param chartmuseum.absoluteUrl Specify an absolute URL for ChartMuseum registry ## @param chartmuseum.chartRepoName Specify the endpoint for the chartmuseum registry. Only applicable if `chartmuseum.absoluteUrl` is `true` ## absoluteUrl: false chartRepoName: 'chartsRepo' ## @param chartmuseum.depth Support for multitenancy. More info [here](https://chartmuseum.com/docs/#multitenancy) ## depth: 1 ## @param chartmuseum.logJson Print logs on JSON format ## logJson: false ## @param chartmuseum.disableMetrics Disable prometheus metrics exposure ## disableMetrics: false ## @param chartmuseum.disableApi Disable all the routes prefixed with `/api` ## disableApi: false ## @param chartmuseum.disableStatefiles Disable use of index-cache.yaml ## disableStatefiles: false ## @param chartmuseum.allowOverwrite Allow chart versions to be re-uploaded without force querystring ## allowOverwrite: true ## @param chartmuseum.anonymousGet Allow anonymous GET operations ## anonymousGet: false ## Optional parameters for ChartMuseum not used by default. ## ref: https://chartmuseum.com/docs/#other-cli-options ## @param chartmuseum.contextPath Set the base context path for ChartMuseum ## @param chartmuseum.indexLimit Limit the number of parallels indexes for ChartMuseum ## @param chartmuseum.chartPostFormFieldName Form field which will be queried for the chart file content ## @param chartmuseum.provPostFormFieldName Form field which will be queried for the provenance file content ## @param chartmuseum.maxStorageObjects Maximum storage objects ## @param chartmuseum.maxUploadSize Maximum upload size ## @param chartmuseum.storageTimestampTolerance Timestamp tolerance size ## contextPath: "" indexLimit: "" chartPostFormFieldName: "" provPostFormFieldName: "" maxStorageObjects: "" maxUploadSize: "" storageTimestampTolerance: "1s" ## Use TLS in the container ## tls: ## @param chartmuseum.tls.existingSecret Name of an existing secret with the certificates for internal TLS access ## Requires `internalTLS.enabled` to be set to `true`` ## Self-signed TLS certificates will be used otherwise ## existingSecret: "" ## @param chartmuseum.command Override default container command (useful when using custom images) ## command: [] ## @param chartmuseum.args Override default container args (useful when using custom images) ## args: [] ## @param chartmuseum.extraEnvVars Array with extra environment variables to add Chartmuseum pods ## extraEnvVars: [] ## @param chartmuseum.extraEnvVarsCM ConfigMap containing extra environment variables for Chartmuseum pods ## extraEnvVarsCM: "" ## @param chartmuseum.extraEnvVarsSecret Secret containing extra environment variables (in case of sensitive data) for Chartmuseum pods ## extraEnvVarsSecret: "" ## @param chartmuseum.containerPorts.http Chartmuseum HTTP container port ## @param chartmuseum.containerPorts.https Chartmuseum HTTPS container port ## containerPorts: http: 9999 https: 9443 ## @param chartmuseum.replicaCount Number of Chartmuseum replicas ## replicaCount: 1 ## Configure extra options for Chartmuseum containers' liveness, readiness and startup probes ## ref: https://kubernetes.io/docs/tasks/configure-pod-container/configure-liveness-readiness-startup-probes/#configure-probes ## @param chartmuseum.livenessProbe.enabled Enable livenessProbe on Chartmuseum containers ## @param chartmuseum.livenessProbe.initialDelaySeconds Initial delay seconds for livenessProbe ## @param chartmuseum.livenessProbe.periodSeconds Period seconds for livenessProbe ## @param chartmuseum.livenessProbe.timeoutSeconds Timeout seconds for livenessProbe ## @param chartmuseum.livenessProbe.failureThreshold Failure threshold for livenessProbe ## @param chartmuseum.livenessProbe.successThreshold Success threshold for livenessProbe ## livenessProbe: enabled: true initialDelaySeconds: 20 periodSeconds: 10 timeoutSeconds: 5 failureThreshold: 6 successThreshold: 1 ## @param chartmuseum.readinessProbe.enabled Enable readinessProbe on Chartmuseum containers ## @param chartmuseum.readinessProbe.initialDelaySeconds Initial delay seconds for readinessProbe ## @param chartmuseum.readinessProbe.periodSeconds Period seconds for readinessProbe ## @param chartmuseum.readinessProbe.timeoutSeconds Timeout seconds for readinessProbe ## @param chartmuseum.readinessProbe.failureThreshold Failure threshold for readinessProbe ## @param chartmuseum.readinessProbe.successThreshold Success threshold for readinessProbe ## readinessProbe: enabled: true initialDelaySeconds: 20 periodSeconds: 10 timeoutSeconds: 5 failureThreshold: 6 successThreshold: 1 ## @param chartmuseum.startupProbe.enabled Enable startupProbe on Chartmuseum containers ## @param chartmuseum.startupProbe.initialDelaySeconds Initial delay seconds for startupProbe ## @param chartmuseum.startupProbe.periodSeconds Period seconds for startupProbe ## @param chartmuseum.startupProbe.timeoutSeconds Timeout seconds for startupProbe ## @param chartmuseum.startupProbe.failureThreshold Failure threshold for startupProbe ## @param chartmuseum.startupProbe.successThreshold Success threshold for startupProbe ## startupProbe: enabled: false initialDelaySeconds: 5 periodSeconds: 10 timeoutSeconds: 1 failureThreshold: 15 successThreshold: 1 ## @param chartmuseum.customLivenessProbe Custom livenessProbe that overrides the default one ## customLivenessProbe: {} ## @param chartmuseum.customReadinessProbe Custom readinessProbe that overrides the default one ## customReadinessProbe: {} ## @param chartmuseum.customStartupProbe Custom startupProbe that overrides the default one ## customStartupProbe: {} ## Chartmuseum resource requests and limits ## ref: https://kubernetes.io/docs/user-guide/compute-resources/ ## @param chartmuseum.resources.limits The resources limits for the Chartmuseum containers ## @param chartmuseum.resources.requests The requested resources for the Chartmuseum containers ## resources: limits: {} requests: {} ## Configure Chartmuseum pods Security Context ## ref: https://kubernetes.io/docs/tasks/configure-pod-container/security-context/#set-the-security-context-for-a-pod ## @param chartmuseum.podSecurityContext.enabled Enabled Chartmuseum pods' Security Context ## @param chartmuseum.podSecurityContext.fsGroup Set Chartmuseum pod's Security Context fsGroup ## podSecurityContext: enabled: true fsGroup: 1001 ## Configure Chartmuseum containers (only main one) Security Context ## ref: https://kubernetes.io/docs/tasks/configure-pod-container/security-context/#set-the-security-context-for-a-container ## @param chartmuseum.containerSecurityContext.enabled Enabled Chartmuseum containers' Security Context ## @param chartmuseum.containerSecurityContext.runAsUser Set Chartmuseum containers' Security Context runAsUser ## @param chartmuseum.containerSecurityContext.runAsNonRoot Set Chartmuseum containers' Security Context runAsNonRoot ## containerSecurityContext: enabled: true runAsUser: 1001 runAsNonRoot: true ## @param chartmuseum.updateStrategy.type Chartmuseum deployment strategy type - only really applicable for deployments with RWO PVs attached ## @param chartmuseum.updateStrategy.rollingUpdate Chartmuseum deployment rolling update configuration parameters ## If replicas = 1, an update can get "stuck", as the previous pod remains attached to the ## PV, and the "incoming" pod can never start. Changing the strategy to "Recreate" will ## terminate the single previous pod, so that the new, incoming pod can attach to the PV ## updateStrategy: type: RollingUpdate rollingUpdate: {} ## @param chartmuseum.lifecycleHooks LifecycleHook for the Chartmuseum container(s) to automate configuration before or after startup ## lifecycleHooks: {} ## @param chartmuseum.hostAliases Chartmuseum pods host aliases ## hostAliases: [] ## @param chartmuseum.podLabels Add additional labels to the Chartmuseum pods (evaluated as a template) ## ref: https://kubernetes.io/docs/concepts/overview/working-with-objects/labels/ ## podLabels: {} ## @param chartmuseum.podAnnotations Annotations to add to the Chartmuseum pods (evaluated as a template) ## ref: https://kubernetes.io/docs/concepts/overview/working-with-objects/annotations/ ## podAnnotations: {} ## @param chartmuseum.podAffinityPreset Chartmuseum Pod affinity preset. Ignored if `chartmuseum.affinity` is set. Allowed values: `soft` or `hard` ## ref: https://kubernetes.io/docs/concepts/scheduling-eviction/assign-pod-node/#inter-pod-affinity-and-anti-affinity ## podAffinityPreset: "" ## @param chartmuseum.podAntiAffinityPreset Chartmuseum Pod anti-affinity preset. Ignored if `chartmuseum.affinity` is set. Allowed values: `soft` or `hard` ## Ref: https://kubernetes.io/docs/concepts/scheduling-eviction/assign-pod-node/#inter-pod-affinity-and-anti-affinity ## podAntiAffinityPreset: soft ## Node affinity preset ## Ref: https://kubernetes.io/docs/concepts/scheduling-eviction/assign-pod-node/#node-affinity ## nodeAffinityPreset: ## @param chartmuseum.nodeAffinityPreset.type Chartmuseum Node affinity preset type. Ignored if `chartmuseum.affinity` is set. Allowed values: `soft` or `hard` ## type: "" ## @param chartmuseum.nodeAffinityPreset.key Chartmuseum Node label key to match Ignored if `chartmuseum.affinity` is set. ## E.g. ## key: "kubernetes.io/e2e-az-name" ## key: "" ## @param chartmuseum.nodeAffinityPreset.values Chartmuseum Node label values to match. Ignored if `chartmuseum.affinity` is set. ## E.g. ## values: ## - e2e-az1 ## - e2e-az2 ## values: [] ## @param chartmuseum.affinity Chartmuseum Affinity for pod assignment ## Ref: https://kubernetes.io/docs/concepts/configuration/assign-pod-node/#affinity-and-anti-affinity ## Note: chartmuseum.podAffinityPreset, chartmuseum.podAntiAffinityPreset, and chartmuseum.nodeAffinityPreset will be ignored when it's set ## affinity: {} ## @param chartmuseum.nodeSelector Chartmuseum Node labels for pod assignment ## Ref: https://kubernetes.io/docs/user-guide/node-selection/ ## nodeSelector: {} ## @param chartmuseum.tolerations Chartmuseum Tolerations for pod assignment ## Ref: https://kubernetes.io/docs/concepts/configuration/taint-and-toleration/ ## tolerations: [] ## @param chartmuseum.topologySpreadConstraints Topology Spread Constraints for pod assignment spread across your cluster among failure-domains. Evaluated as a template ## Ref: https://kubernetes.io/docs/concepts/workloads/pods/pod-topology-spread-constraints/#spread-constraints-for-pods ## topologySpreadConstraints: {} ## @param chartmuseum.priorityClassName Priority Class Name ## ref: https://kubernetes.io/docs/concepts/configuration/pod-priority-preemption/#priorityclass ## priorityClassName: "" ## @param chartmuseum.schedulerName Use an alternate scheduler, e.g. "stork". ## ref: https://kubernetes.io/docs/tasks/administer-cluster/configure-multiple-schedulers/ ## schedulerName: "" ## @param chartmuseum.sidecars Add additional sidecar containers to the Chartmuseum pods ## Example: ## sidecars: ## - name: your-image-name ## image: your-image ## imagePullPolicy: Always ## ports: ## - name: portname ## containerPort: 1234 ## sidecars: [] ## @param chartmuseum.initContainers Add additional init containers to the Chartmuseum pods ## Example: ## initContainers: ## - name: your-image-name ## image: your-image ## imagePullPolicy: Always ## ports: ## - name: portname ## containerPort: 1234 ## initContainers: [] ## @param chartmuseum.extraVolumeMounts Optionally specify extra list of additional volumeMounts for the Chartmuseum pods ## extraVolumeMounts: [] ## @param chartmuseum.extraVolumes Optionally specify extra list of additional volumes for the Chartmuseum pods ## extraVolumes: [] ## @param chartmuseum.automountServiceAccountToken Automount service account token ## automountServiceAccountToken: false ## Chartmuseum service configuration ## service: ## @param chartmuseum.service.ports.http Chartmuseum HTTP service port ## @param chartmuseum.service.ports.https Chartmuseum HTTPS service port ## ports: http: 80 https: 443 ## @section Clair Parameters clair: ## @param clair.enabled Enable Clair scanner. Add it as an additional interrogation service by following https://goharbor.io/docs/latest/administration/vulnerability-scanning/pluggable-scanners ## enabled: false ## The http(s) proxy used to update vulnerabilities database from internet ## @param clair.httpProxy The http proxy used to update vulnerabilities database from internet ## @param clair.httpsProxy The https proxy used to update vulnerabilities database from internet ## httpProxy: "" httpsProxy: "" ## @param clair.updatersInterval The interval of clair updaters (hours), set to 0 to disable ## disable the updaters ## updatersInterval: 12 ## Use TLS in the container ## tls: ## @param clair.tls.existingSecret Name of an existing secret with the certificates for internal TLS access ## Requires `internalTLS.enabled` to be set to `true`` ## Self-signed TLS certificates will be used otherwise ## existingSecret: "" ## @param clair.replicaCount Number of Clair replicas ## replicaCount: 1 ## Configure Clair pods Security Context ## ref: https://kubernetes.io/docs/tasks/configure-pod-container/security-context/#set-the-security-context-for-a-pod ## @param clair.podSecurityContext.enabled Enabled Clair pods' Security Context ## @param clair.podSecurityContext.fsGroup Set Clair pod's Security Context fsGroup ## podSecurityContext: enabled: true fsGroup: 1001 ## @param clair.updateStrategy.type Clair deployment strategy type - only really applicable for deployments with RWO PVs attached ## @param clair.updateStrategy.rollingUpdate Clair deployment rolling update configuration parameters ## If replicas = 1, an update can get "stuck", as the previous pod remains attached to the ## PV, and the "incoming" pod can never start. Changing the strategy to "Recreate" will ## terminate the single previous pod, so that the new, incoming pod can attach to the PV ## updateStrategy: type: RollingUpdate rollingUpdate: {} ## @param clair.hostAliases Clair pods host aliases ## hostAliases: [] ## @param clair.podLabels Add additional labels to the Clair pods (evaluated as a template) ## ref: https://kubernetes.io/docs/concepts/overview/working-with-objects/labels/ ## podLabels: {} ## @param clair.podAnnotations Annotations to add to the Clair pods (evaluated as a template) ## ref: https://kubernetes.io/docs/concepts/overview/working-with-objects/annotations/ ## podAnnotations: {} ## @param clair.podAffinityPreset Clair Pod affinity preset. Ignored if `clair.affinity` is set. Allowed values: `soft` or `hard` ## ref: https://kubernetes.io/docs/concepts/scheduling-eviction/assign-pod-node/#inter-pod-affinity-and-anti-affinity ## podAffinityPreset: "" ## @param clair.podAntiAffinityPreset Clair Pod anti-affinity preset. Ignored if `clair.affinity` is set. Allowed values: `soft` or `hard` ## Ref: https://kubernetes.io/docs/concepts/scheduling-eviction/assign-pod-node/#inter-pod-affinity-and-anti-affinity ## podAntiAffinityPreset: soft ## Node affinity preset ## Ref: https://kubernetes.io/docs/concepts/scheduling-eviction/assign-pod-node/#node-affinity ## nodeAffinityPreset: ## @param clair.nodeAffinityPreset.type Clair Node affinity preset type. Ignored if `clair.affinity` is set. Allowed values: `soft` or `hard` ## type: "" ## @param clair.nodeAffinityPreset.key Clair Node label key to match Ignored if `clair.affinity` is set. ## E.g. ## key: "kubernetes.io/e2e-az-name" ## key: "" ## @param clair.nodeAffinityPreset.values Clair Node label values to match. Ignored if `clair.affinity` is set. ## E.g. ## values: ## - e2e-az1 ## - e2e-az2 ## values: [] ## @param clair.affinity Clair Affinity for pod assignment ## Ref: https://kubernetes.io/docs/concepts/configuration/assign-pod-node/#affinity-and-anti-affinity ## Note: clair.podAffinityPreset, clair.podAntiAffinityPreset, and clair.nodeAffinityPreset will be ignored when it's set ## affinity: {} ## @param clair.nodeSelector Clair Node labels for pod assignment ## Ref: https://kubernetes.io/docs/user-guide/node-selection/ ## nodeSelector: {} ## @param clair.tolerations Clair Tolerations for pod assignment ## Ref: https://kubernetes.io/docs/concepts/configuration/taint-and-toleration/ ## tolerations: [] ## @param clair.topologySpreadConstraints Topology Spread Constraints for pod assignment spread across your cluster among failure-domains. Evaluated as a template ## Ref: https://kubernetes.io/docs/concepts/workloads/pods/pod-topology-spread-constraints/#spread-constraints-for-pods ## topologySpreadConstraints: {} ## @param clair.priorityClassName Priority Class Name ## ref: https://kubernetes.io/docs/concepts/configuration/pod-priority-preemption/#priorityclass ## priorityClassName: "" ## @param clair.schedulerName Use an alternate scheduler, e.g. "stork". ## ref: https://kubernetes.io/docs/tasks/administer-cluster/configure-multiple-schedulers/ ## schedulerName: "" ## @param clair.sidecars Add additional sidecar containers to the Clair pods ## Example: ## sidecars: ## - name: your-image-name ## image: your-image ## imagePullPolicy: Always ## ports: ## - name: portname ## containerPort: 1234 ## sidecars: [] ## @param clair.initContainers Add additional init containers to the Clair pods ## Example: ## initContainers: ## - name: your-image-name ## image: your-image ## imagePullPolicy: Always ## ports: ## - name: portname ## containerPort: 1234 ## initContainers: [] ## @param clair.extraVolumes Optionally specify extra list of additional volumes for the Clair pods ## extraVolumes: [] ## @param clair.automountServiceAccountToken Automount service account token ## automountServiceAccountToken: false ## Harbor needs Clair adapter to communicate with Clair API. ## adapter: ## Bitnami Harbor Adapter for Clair image ## ref: https://hub.docker.com/r/bitnami/harbor-adapter-clair/tags/ ## @param clair.adapter.image.registry Harbor Adapter for Clair image registry ## @param clair.adapter.image.repository Harbor Adapter for Clair image repository ## @param clair.adapter.image.tag Harbor Adapter for Clair image tag (immutable tags are recommended) ## @param clair.adapter.image.pullPolicy Harbor Adapter for Clair image pull policy ## @param clair.adapter.image.pullSecrets Harbor Adapter for Clair image pull secrets ## @param clair.adapter.image.debug Enable Harbor Adapter for Clair image debug mode ## image: registry: docker.io repository: bitnami/harbor-adapter-clair tag: 2.4.1-debian-10-r87 ## Specify a imagePullPolicy ## Defaults to 'Always' if image tag is 'latest', else set to 'IfNotPresent' ## ref: https://kubernetes.io/docs/user-guide/images/#pre-pulling-images ## pullPolicy: IfNotPresent ## Optionally specify an array of imagePullSecrets. ## Secrets must be manually created in the namespace. ## ref: https://kubernetes.io/docs/tasks/configure-pod-container/pull-image-private-registry/ ## e.g: ## pullSecrets: ## - myRegistryKeySecretName ## pullSecrets: [] ## Enable debug mode ## debug: false ## @param clair.adapter.command Override default container command (useful when using custom images) ## command: [] ## @param clair.adapter.args Override default container args (useful when using custom images) ## args: [] ## @param clair.adapter.extraEnvVars Array with extra environment variables to add Harbor Adapter for Clair containers ## extraEnvVars: [] ## @param clair.adapter.extraEnvVarsCM ConfigMap containing extra environment variables for Harbor Adapter for Clair containers ## extraEnvVarsCM: "" ## @param clair.adapter.extraEnvVarsSecret Secret containing extra environment variables (in case of sensitive data) for Harbor Adapter for Clair containers ## extraEnvVarsSecret: "" ## @param clair.adapter.containerPorts.http Harbor Adapter for Clair HTTP container port ## @param clair.adapter.containerPorts.https Harbor Adapter for Clair HTTPS container port ## containerPorts: http: 8080 https: 8443 ## Configure extra options for Harbor Adapter for Clair containers' liveness, readiness and startup probes ## ref: https://kubernetes.io/docs/tasks/configure-pod-container/configure-liveness-readiness-startup-probes/#configure-probes ## @param clair.adapter.livenessProbe.enabled Enable livenessProbe on Harbor Adapter for Clair containers ## @param clair.adapter.livenessProbe.initialDelaySeconds Initial delay seconds for livenessProbe ## @param clair.adapter.livenessProbe.periodSeconds Period seconds for livenessProbe ## @param clair.adapter.livenessProbe.timeoutSeconds Timeout seconds for livenessProbe ## @param clair.adapter.livenessProbe.failureThreshold Failure threshold for livenessProbe ## @param clair.adapter.livenessProbe.successThreshold Success threshold for livenessProbe ## livenessProbe: enabled: true initialDelaySeconds: 20 periodSeconds: 10 timeoutSeconds: 5 failureThreshold: 6 successThreshold: 1 ## @param clair.adapter.readinessProbe.enabled Enable readinessProbe on Harbor Adapter for Clair containers ## @param clair.adapter.readinessProbe.initialDelaySeconds Initial delay seconds for readinessProbe ## @param clair.adapter.readinessProbe.periodSeconds Period seconds for readinessProbe ## @param clair.adapter.readinessProbe.timeoutSeconds Timeout seconds for readinessProbe ## @param clair.adapter.readinessProbe.failureThreshold Failure threshold for readinessProbe ## @param clair.adapter.readinessProbe.successThreshold Success threshold for readinessProbe ## readinessProbe: enabled: true initialDelaySeconds: 20 periodSeconds: 10 timeoutSeconds: 5 failureThreshold: 6 successThreshold: 1 ## @param clair.adapter.startupProbe.enabled Enable startupProbe on Harbor Adapter for Clair containers ## @param clair.adapter.startupProbe.initialDelaySeconds Initial delay seconds for startupProbe ## @param clair.adapter.startupProbe.periodSeconds Period seconds for startupProbe ## @param clair.adapter.startupProbe.timeoutSeconds Timeout seconds for startupProbe ## @param clair.adapter.startupProbe.failureThreshold Failure threshold for startupProbe ## @param clair.adapter.startupProbe.successThreshold Success threshold for startupProbe ## startupProbe: enabled: false initialDelaySeconds: 5 periodSeconds: 10 timeoutSeconds: 1 failureThreshold: 15 successThreshold: 1 ## @param clair.adapter.customLivenessProbe Custom livenessProbe that overrides the default one ## customLivenessProbe: {} ## @param clair.adapter.customReadinessProbe Custom readinessProbe that overrides the default one ## customReadinessProbe: {} ## @param clair.adapter.customStartupProbe Custom startupProbe that overrides the default one ## customStartupProbe: {} ## Harbor Adapter for Clair resource requests and limits ## ref: https://kubernetes.io/docs/user-guide/compute-resources/ ## @param clair.adapter.resources.limits The resources limits for the Harbor Adapter for Clair containers ## @param clair.adapter.resources.requests The requested resources for the Harbor Adapter for Clair containers ## resources: limits: {} requests: {} ## Configure Harbor Adapter for Clair containers (only main one) Security Context ## ref: https://kubernetes.io/docs/tasks/configure-pod-container/security-context/#set-the-security-context-for-a-container ## @param clair.adapter.containerSecurityContext.enabled Enabled Harbor Adapter for Clair containers' Security Context ## @param clair.adapter.containerSecurityContext.runAsUser Set Harbor Adapter for Clair containers' Security Context runAsUser ## @param clair.adapter.containerSecurityContext.runAsNonRoot Set Harbor Adapter for Clair containers' Security Context runAsNonRoot ## containerSecurityContext: enabled: true runAsUser: 1001 runAsNonRoot: true ## @param clair.adapter.lifecycleHooks LifecycleHook for the Harbor Adapter for Clair container(s) to automate configuration before or after startup ## lifecycleHooks: {} ## @param clair.adapter.extraVolumeMounts Optionally specify extra list of additional volumeMounts for the Harbor Adapter for Clair pods ## extraVolumeMounts: [] ## Harbor Adapter for Clair service configuration ## service: ## @param clair.adapter.service.ports.http Harbor Adapter for Clair HTTP service port ## @param clair.adapter.service.ports.https Harbor Adapter for Clair HTTPS service port ## ports: http: 8080 https: 8443 ## Clair main container properties ## server: ## Bitnami Harbor Clair image ## ref: https://hub.docker.com/r/bitnami/harbor-clair/tags/ ## @param clair.server.image.registry Harbor Clair image registry ## @param clair.server.image.repository Harbor Clair image repository ## @param clair.server.image.tag Harbor Clair image tag (immutable tags are recommended) ## @param clair.server.image.pullPolicy Harbor Clair image pull policy ## @param clair.server.image.pullSecrets Harbor Clair image pull secrets ## @param clair.server.image.debug Enable Harbor Clair image debug mode ## image: registry: docker.io repository: bitnami/harbor-clair tag: 2.4.1-debian-10-r89 ## Specify a imagePullPolicy ## Defaults to 'Always' if image tag is 'latest', else set to 'IfNotPresent' ## ref: https://kubernetes.io/docs/user-guide/images/#pre-pulling-images ## pullPolicy: IfNotPresent ## Optionally specify an array of imagePullSecrets. ## Secrets must be manually created in the namespace. ## ref: https://kubernetes.io/docs/tasks/configure-pod-container/pull-image-private-registry/ ## e.g: ## pullSecrets: ## - myRegistryKeySecretName ## pullSecrets: [] ## Enable debug mode ## debug: false ## @param clair.server.command Override default container command (useful when using custom images) ## command: [] ## @param clair.server.args Override default container args (useful when using custom images) ## args: [] ## @param clair.server.extraEnvVars Array with extra environment variables to add Harbor Clair containers ## extraEnvVars: [] ## @param clair.server.extraEnvVarsCM ConfigMap containing extra environment variables for Harbor Clair containers ## extraEnvVarsCM: "" ## @param clair.server.extraEnvVarsSecret Secret containing extra environment variables (in case of sensitive data) for Harbor Clair containers ## extraEnvVarsSecret: "" ## @param clair.server.containerPorts.api Harbor Clair API container port ## @param clair.server.containerPorts.health Harbor Clair health container port ## containerPorts: api: 6060 health: 6061 ## Configure extra options for Harbor Clair containers' liveness, readiness and startup probes ## ref: https://kubernetes.io/docs/tasks/configure-pod-container/configure-liveness-readiness-startup-probes/#configure-probes ## @param clair.server.livenessProbe.enabled Enable livenessProbe on Harbor Clair containers ## @param clair.server.livenessProbe.initialDelaySeconds Initial delay seconds for livenessProbe ## @param clair.server.livenessProbe.periodSeconds Period seconds for livenessProbe ## @param clair.server.livenessProbe.timeoutSeconds Timeout seconds for livenessProbe ## @param clair.server.livenessProbe.failureThreshold Failure threshold for livenessProbe ## @param clair.server.livenessProbe.successThreshold Success threshold for livenessProbe ## livenessProbe: enabled: true initialDelaySeconds: 20 periodSeconds: 10 timeoutSeconds: 5 failureThreshold: 6 successThreshold: 1 ## @param clair.server.readinessProbe.enabled Enable readinessProbe on Harbor Clair containers ## @param clair.server.readinessProbe.initialDelaySeconds Initial delay seconds for readinessProbe ## @param clair.server.readinessProbe.periodSeconds Period seconds for readinessProbe ## @param clair.server.readinessProbe.timeoutSeconds Timeout seconds for readinessProbe ## @param clair.server.readinessProbe.failureThreshold Failure threshold for readinessProbe ## @param clair.server.readinessProbe.successThreshold Success threshold for readinessProbe ## readinessProbe: enabled: true initialDelaySeconds: 20 periodSeconds: 10 timeoutSeconds: 5 failureThreshold: 6 successThreshold: 1 ## @param clair.server.startupProbe.enabled Enable startupProbe on Harbor Clair containers ## @param clair.server.startupProbe.initialDelaySeconds Initial delay seconds for startupProbe ## @param clair.server.startupProbe.periodSeconds Period seconds for startupProbe ## @param clair.server.startupProbe.timeoutSeconds Timeout seconds for startupProbe ## @param clair.server.startupProbe.failureThreshold Failure threshold for startupProbe ## @param clair.server.startupProbe.successThreshold Success threshold for startupProbe ## startupProbe: enabled: false initialDelaySeconds: 5 periodSeconds: 10 timeoutSeconds: 1 failureThreshold: 15 successThreshold: 1 ## @param clair.server.customLivenessProbe Custom livenessProbe that overrides the default one ## customLivenessProbe: {} ## @param clair.server.customReadinessProbe Custom readinessProbe that overrides the default one ## customReadinessProbe: {} ## @param clair.server.customStartupProbe Custom startupProbe that overrides the default one ## customStartupProbe: {} ## Harbor Clair resource requests and limits ## ref: https://kubernetes.io/docs/user-guide/compute-resources/ ## @param clair.server.resources.limits The resources limits for the Harbor Clair containers ## @param clair.server.resources.requests The requested resources for the Harbor Clair containers ## resources: limits: {} requests: {} ## Configure Harbor Clair containers (only main one) Security Context ## ref: https://kubernetes.io/docs/tasks/configure-pod-container/security-context/#set-the-security-context-for-a-container ## @param clair.server.containerSecurityContext.enabled Enabled Harbor Clair containers' Security Context ## @param clair.server.containerSecurityContext.runAsUser Set Harbor Clair containers' Security Context runAsUser ## @param clair.server.containerSecurityContext.runAsNonRoot Set Harbor Clair containers' Security Context runAsNonRoot ## containerSecurityContext: enabled: true runAsUser: 1001 runAsNonRoot: true ## @param clair.server.lifecycleHooks LifecycleHook for the Harbor Clair container(s) to automate configuration before or after startup ## lifecycleHooks: {} ## @param clair.server.extraVolumeMounts Optionally specify extra list of additional volumeMounts for the Harbor Clair pods ## extraVolumeMounts: [] ## Harbor Clair service configuration ## service: ## @param clair.server.service.ports.api Harbor Clair API service port ## @param clair.server.service.ports.health Harbor Clair health service port ## ports: api: 6060 health: 6061 ## @section Notary Parameters ## Notary Parameters ## notary: ## @param notary.enabled Enable Notary ## enabled: true ## @param notary.secretName Fill the name of a kubernetes secret if you want to use your own TLS certificate authority, certificate and private key for notary communications. The secret must contain keys named `notary-signer-ca.crt`, `notary-signer.key` and `notary-signer.crt` that contain the CA, certificate and private key. They will be generated if not set. ## TLS certificate authority, certificate and private key for notary ## communications. ## The secret must contain keys named ca.crt, tls.crt and tls.key that ## contain the CA, certificate and private key. ## They will be generated if not set. ## secretName: "" server: ## Bitnami Harbor Notary Server image ## ref: https://hub.docker.com/r/bitnami/harbor-notary-server/tags/ ## @param notary.server.image.registry Harbor Notary Server image registry ## @param notary.server.image.repository Harbor Notary Server image repository ## @param notary.server.image.tag Harbor Notary Server image tag (immutable tags are recommended) ## @param notary.server.image.pullPolicy Harbor Notary Server image pull policy ## @param notary.server.image.pullSecrets Harbor Notary Server image pull secrets ## @param notary.server.image.debug Enable Harbor Notary Server image debug mode ## image: registry: docker.io repository: bitnami/harbor-notary-server tag: 2.4.1-debian-10-r91 ## Specify a imagePullPolicy ## Defaults to 'Always' if image tag is 'latest', else set to 'IfNotPresent' ## ref: https://kubernetes.io/docs/user-guide/images/#pre-pulling-images ## pullPolicy: IfNotPresent ## Optionally specify an array of imagePullSecrets. ## Secrets must be manually created in the namespace. ## ref: https://kubernetes.io/docs/tasks/configure-pod-container/pull-image-private-registry/ ## e.g: ## pullSecrets: ## - myRegistryKeySecretName ## pullSecrets: [] ## Enable debug mode ## debug: false ## @param notary.server.command Override default container command (useful when using custom images) ## command: [] ## @param notary.server.args Override default container args (useful when using custom images) ## args: [] ## @param notary.server.extraEnvVars Array with extra environment variables to add Harbor Notary Server pods ## extraEnvVars: [] ## @param notary.server.extraEnvVarsCM ConfigMap containing extra environment variables for Harbor Notary Server pods ## extraEnvVarsCM: "" ## @param notary.server.extraEnvVarsSecret Secret containing extra environment variables (in case of sensitive data) for Harbor Notary Server pods ## extraEnvVarsSecret: "" ## @param notary.server.containerPorts.server Harbor Notary Server container port ## containerPorts: server: 4443 ## @param notary.server.replicaCount Number of Harbor Notary Server replicas ## replicaCount: 1 ## Configure extra options for Harbor Notary Server containers' liveness, readiness and startup probes ## ref: https://kubernetes.io/docs/tasks/configure-pod-container/configure-liveness-readiness-startup-probes/#configure-probes ## @param notary.server.livenessProbe.enabled Enable livenessProbe on Harbor Notary Server containers ## @param notary.server.livenessProbe.initialDelaySeconds Initial delay seconds for livenessProbe ## @param notary.server.livenessProbe.periodSeconds Period seconds for livenessProbe ## @param notary.server.livenessProbe.timeoutSeconds Timeout seconds for livenessProbe ## @param notary.server.livenessProbe.failureThreshold Failure threshold for livenessProbe ## @param notary.server.livenessProbe.successThreshold Success threshold for livenessProbe ## livenessProbe: enabled: true initialDelaySeconds: 20 periodSeconds: 10 timeoutSeconds: 5 failureThreshold: 6 successThreshold: 1 ## @param notary.server.readinessProbe.enabled Enable readinessProbe on Harbor Notary Server containers ## @param notary.server.readinessProbe.initialDelaySeconds Initial delay seconds for readinessProbe ## @param notary.server.readinessProbe.periodSeconds Period seconds for readinessProbe ## @param notary.server.readinessProbe.timeoutSeconds Timeout seconds for readinessProbe ## @param notary.server.readinessProbe.failureThreshold Failure threshold for readinessProbe ## @param notary.server.readinessProbe.successThreshold Success threshold for readinessProbe ## readinessProbe: enabled: true initialDelaySeconds: 20 periodSeconds: 10 timeoutSeconds: 5 failureThreshold: 6 successThreshold: 1 ## @param notary.server.startupProbe.enabled Enable startupProbe on Harbor Notary Server containers ## @param notary.server.startupProbe.initialDelaySeconds Initial delay seconds for startupProbe ## @param notary.server.startupProbe.periodSeconds Period seconds for startupProbe ## @param notary.server.startupProbe.timeoutSeconds Timeout seconds for startupProbe ## @param notary.server.startupProbe.failureThreshold Failure threshold for startupProbe ## @param notary.server.startupProbe.successThreshold Success threshold for startupProbe ## startupProbe: enabled: false initialDelaySeconds: 5 periodSeconds: 10 timeoutSeconds: 1 failureThreshold: 15 successThreshold: 1 ## @param notary.server.customLivenessProbe Custom livenessProbe that overrides the default one ## customLivenessProbe: {} ## @param notary.server.customReadinessProbe Custom readinessProbe that overrides the default one ## customReadinessProbe: {} ## @param notary.server.customStartupProbe Custom startupProbe that overrides the default one ## customStartupProbe: {} ## Harbor Notary Server resource requests and limits ## ref: https://kubernetes.io/docs/user-guide/compute-resources/ ## @param notary.server.resources.limits The resources limits for the Harbor Notary Server containers ## @param notary.server.resources.requests The requested resources for the Harbor Notary Server containers ## resources: limits: {} requests: {} ## Configure Harbor Notary Server pods Security Context ## ref: https://kubernetes.io/docs/tasks/configure-pod-container/security-context/#set-the-security-context-for-a-pod ## @param notary.server.podSecurityContext.enabled Enabled Harbor Notary Server pods' Security Context ## @param notary.server.podSecurityContext.fsGroup Set Harbor Notary Server pod's Security Context fsGroup ## podSecurityContext: enabled: true fsGroup: 1001 ## Configure Harbor Notary Server containers (only main one) Security Context ## ref: https://kubernetes.io/docs/tasks/configure-pod-container/security-context/#set-the-security-context-for-a-container ## @param notary.server.containerSecurityContext.enabled Enabled Harbor Notary Server containers' Security Context ## @param notary.server.containerSecurityContext.runAsUser Set Harbor Notary Server containers' Security Context runAsUser ## @param notary.server.containerSecurityContext.runAsNonRoot Set Harbor Notary Server containers' Security Context runAsNonRoot ## containerSecurityContext: enabled: true runAsUser: 1001 runAsNonRoot: true ## @param notary.server.updateStrategy.type Harbor Notary Server deployment strategy type - only really applicable for deployments with RWO PVs attached ## @param notary.server.updateStrategy.rollingUpdate Harbor Notary Server deployment rolling update configuration parameters ## If replicas = 1, an update can get "stuck", as the previous pod remains attached to the ## PV, and the "incoming" pod can never start. Changing the strategy to "Recreate" will ## terminate the single previous pod, so that the new, incoming pod can attach to the PV ## updateStrategy: type: RollingUpdate rollingUpdate: {} ## @param notary.server.lifecycleHooks LifecycleHook for the Harbor Notary Server container(s) to automate configuration before or after startup ## lifecycleHooks: {} ## @param notary.server.hostAliases Harbor Notary Server pods host aliases ## hostAliases: [] ## @param notary.server.podLabels Add additional labels to the Harbor Notary Server pods (evaluated as a template) ## ref: https://kubernetes.io/docs/concepts/overview/working-with-objects/labels/ ## podLabels: {} ## @param notary.server.podAnnotations Annotations to add to the Harbor Notary Server pods (evaluated as a template) ## ref: https://kubernetes.io/docs/concepts/overview/working-with-objects/annotations/ ## podAnnotations: {} ## @param notary.server.podAffinityPreset Harbor Notary Server Pod affinity preset. Ignored if `notary.server.affinity` is set. Allowed values: `soft` or `hard` ## ref: https://kubernetes.io/docs/concepts/scheduling-eviction/assign-pod-node/#inter-pod-affinity-and-anti-affinity ## podAffinityPreset: "" ## @param notary.server.podAntiAffinityPreset Harbor Notary Server Pod anti-affinity preset. Ignored if `notary.server.affinity` is set. Allowed values: `soft` or `hard` ## Ref: https://kubernetes.io/docs/concepts/scheduling-eviction/assign-pod-node/#inter-pod-affinity-and-anti-affinity ## podAntiAffinityPreset: soft ## Node affinity preset ## Ref: https://kubernetes.io/docs/concepts/scheduling-eviction/assign-pod-node/#node-affinity ## nodeAffinityPreset: ## @param notary.server.nodeAffinityPreset.type Harbor Notary Server Node affinity preset type. Ignored if `notary.server.affinity` is set. Allowed values: `soft` or `hard` ## type: "" ## @param notary.server.nodeAffinityPreset.key Harbor Notary Server Node label key to match Ignored if `notary.server.affinity` is set. ## E.g. ## key: "kubernetes.io/e2e-az-name" ## key: "" ## @param notary.server.nodeAffinityPreset.values Harbor Notary Server Node label values to match. Ignored if `notary.server.affinity` is set. ## E.g. ## values: ## - e2e-az1 ## - e2e-az2 ## values: [] ## @param notary.server.affinity Harbor Notary Server Affinity for pod assignment ## Ref: https://kubernetes.io/docs/concepts/configuration/assign-pod-node/#affinity-and-anti-affinity ## Note: notary.server.podAffinityPreset, notary.server.podAntiAffinityPreset, and notary.server.nodeAffinityPreset will be ignored when it's set ## affinity: {} ## @param notary.server.nodeSelector Harbor Notary Server Node labels for pod assignment ## Ref: https://kubernetes.io/docs/user-guide/node-selection/ ## nodeSelector: {} ## @param notary.server.tolerations Harbor Notary Server Tolerations for pod assignment ## Ref: https://kubernetes.io/docs/concepts/configuration/taint-and-toleration/ ## tolerations: [] ## @param notary.server.topologySpreadConstraints Topology Spread Constraints for pod assignment spread across your cluster among failure-domains. Evaluated as a template ## Ref: https://kubernetes.io/docs/concepts/workloads/pods/pod-topology-spread-constraints/#spread-constraints-for-pods ## topologySpreadConstraints: {} ## @param notary.server.priorityClassName Priority Class Name ## ref: https://kubernetes.io/docs/concepts/configuration/pod-priority-preemption/#priorityclass ## priorityClassName: "" ## @param notary.server.schedulerName Use an alternate scheduler, e.g. "stork". ## ref: https://kubernetes.io/docs/tasks/administer-cluster/configure-multiple-schedulers/ ## schedulerName: "" ## @param notary.server.sidecars Add additional sidecar containers to the Harbor Notary Server pods ## Example: ## sidecars: ## - name: your-image-name ## image: your-image ## imagePullPolicy: Always ## ports: ## - name: portname ## containerPort: 1234 ## sidecars: [] ## @param notary.server.initContainers Add additional init containers to the Harbor Notary Server pods ## Example: ## initContainers: ## - name: your-image-name ## image: your-image ## imagePullPolicy: Always ## ports: ## - name: portname ## containerPort: 1234 ## initContainers: [] ## @param notary.server.extraVolumeMounts Optionally specify extra list of additional volumeMounts for the Harbor Notary Server pods ## extraVolumeMounts: [] ## @param notary.server.extraVolumes Optionally specify extra list of additional volumes for the Harbor Notary Server pods ## extraVolumes: [] ## @param notary.server.automountServiceAccountToken Automount service account token ## automountServiceAccountToken: false signer: ## Bitnami Harbor Notary Signer image ## ref: https://hub.docker.com/r/bitnami/harbor-notary-signer/tags/ ## @param notary.signer.image.registry Harbor Notary Signer image registry ## @param notary.signer.image.repository Harbor Notary Signer image repository ## @param notary.signer.image.tag Harbor Notary Signer image tag (immutable tags are recommended) ## @param notary.signer.image.pullPolicy Harbor Notary Signer image pull policy ## @param notary.signer.image.pullSecrets Harbor Notary Signer image pull secrets ## @param notary.signer.image.debug Enable Harbor Notary Signer image debug mode ## image: registry: docker.io repository: bitnami/harbor-notary-signer tag: 2.4.1-debian-10-r88 ## Specify a imagePullPolicy ## Defaults to 'Always' if image tag is 'latest', else set to 'IfNotPresent' ## ref: https://kubernetes.io/docs/user-guide/images/#pre-pulling-images ## pullPolicy: IfNotPresent ## Optionally specify an array of imagePullSecrets. ## Secrets must be manually created in the namespace. ## ref: https://kubernetes.io/docs/tasks/configure-pod-container/pull-image-private-registry/ ## e.g: ## pullSecrets: ## - myRegistryKeySecretName ## pullSecrets: [] ## Enable debug mode ## debug: false ## @param notary.signer.command Override default container command (useful when using custom images) ## command: [] ## @param notary.signer.args Override default container args (useful when using custom images) ## args: [] ## @param notary.signer.extraEnvVars Array with extra environment variables to add Harbor Notary Signer pods ## extraEnvVars: [] ## @param notary.signer.extraEnvVarsCM ConfigMap containing extra environment variables for Harbor Notary Signer pods ## extraEnvVarsCM: "" ## @param notary.signer.extraEnvVarsSecret Secret containing extra environment variables (in case of sensitive data) for Harbor Notary Signer pods ## extraEnvVarsSecret: "" ## @param notary.signer.containerPorts.signer Harbor Notary Signer container port ## containerPorts: signer: 7899 ## @param notary.signer.replicaCount Number of Harbor Notary Signer replicas ## replicaCount: 1 ## Configure extra options for Harbor Notary Signer containers' liveness, readiness and startup probes ## ref: https://kubernetes.io/docs/tasks/configure-pod-container/configure-liveness-readiness-startup-probes/#configure-probes ## @param notary.signer.livenessProbe.enabled Enable livenessProbe on Harbor Notary Signer containers ## @param notary.signer.livenessProbe.initialDelaySeconds Initial delay seconds for livenessProbe ## @param notary.signer.livenessProbe.periodSeconds Period seconds for livenessProbe ## @param notary.signer.livenessProbe.timeoutSeconds Timeout seconds for livenessProbe ## @param notary.signer.livenessProbe.failureThreshold Failure threshold for livenessProbe ## @param notary.signer.livenessProbe.successThreshold Success threshold for livenessProbe ## livenessProbe: enabled: true initialDelaySeconds: 20 periodSeconds: 10 timeoutSeconds: 5 failureThreshold: 6 successThreshold: 1 ## @param notary.signer.readinessProbe.enabled Enable readinessProbe on Harbor Notary Signer containers ## @param notary.signer.readinessProbe.initialDelaySeconds Initial delay seconds for readinessProbe ## @param notary.signer.readinessProbe.periodSeconds Period seconds for readinessProbe ## @param notary.signer.readinessProbe.timeoutSeconds Timeout seconds for readinessProbe ## @param notary.signer.readinessProbe.failureThreshold Failure threshold for readinessProbe ## @param notary.signer.readinessProbe.successThreshold Success threshold for readinessProbe ## readinessProbe: enabled: true initialDelaySeconds: 20 periodSeconds: 10 timeoutSeconds: 5 failureThreshold: 6 successThreshold: 1 ## @param notary.signer.startupProbe.enabled Enable startupProbe on Harbor Notary Signer containers ## @param notary.signer.startupProbe.initialDelaySeconds Initial delay seconds for startupProbe ## @param notary.signer.startupProbe.periodSeconds Period seconds for startupProbe ## @param notary.signer.startupProbe.timeoutSeconds Timeout seconds for startupProbe ## @param notary.signer.startupProbe.failureThreshold Failure threshold for startupProbe ## @param notary.signer.startupProbe.successThreshold Success threshold for startupProbe ## startupProbe: enabled: false initialDelaySeconds: 5 periodSeconds: 10 timeoutSeconds: 1 failureThreshold: 15 successThreshold: 1 ## @param notary.signer.customLivenessProbe Custom livenessProbe that overrides the default one ## customLivenessProbe: {} ## @param notary.signer.customReadinessProbe Custom readinessProbe that overrides the default one ## customReadinessProbe: {} ## @param notary.signer.customStartupProbe Custom startupProbe that overrides the default one ## customStartupProbe: {} ## Harbor Notary Signer resource requests and limits ## ref: https://kubernetes.io/docs/user-guide/compute-resources/ ## @param notary.signer.resources.limits The resources limits for the Harbor Notary Signer containers ## @param notary.signer.resources.requests The requested resources for the Harbor Notary Signer containers ## resources: limits: {} requests: {} ## Configure Harbor Notary Signer pods Security Context ## ref: https://kubernetes.io/docs/tasks/configure-pod-container/security-context/#set-the-security-context-for-a-pod ## @param notary.signer.podSecurityContext.enabled Enabled Harbor Notary Signer pods' Security Context ## @param notary.signer.podSecurityContext.fsGroup Set Harbor Notary Signer pod's Security Context fsGroup ## podSecurityContext: enabled: true fsGroup: 1001 ## Configure Harbor Notary Signer containers (only main one) Security Context ## ref: https://kubernetes.io/docs/tasks/configure-pod-container/security-context/#set-the-security-context-for-a-container ## @param notary.signer.containerSecurityContext.enabled Enabled Harbor Notary Signer containers' Security Context ## @param notary.signer.containerSecurityContext.runAsUser Set Harbor Notary Signer containers' Security Context runAsUser ## @param notary.signer.containerSecurityContext.runAsNonRoot Set Harbor Notary Signer containers' Security Context runAsNonRoot ## containerSecurityContext: enabled: true runAsUser: 1001 runAsNonRoot: true ## @param notary.signer.updateStrategy.type Harbor Notary Signer deployment strategy type - only really applicable for deployments with RWO PVs attached ## @param notary.signer.updateStrategy.rollingUpdate Harbor Notary Signer deployment rolling update configuration parameters ## If replicas = 1, an update can get "stuck", as the previous pod remains attached to the ## PV, and the "incoming" pod can never start. Changing the strategy to "Recreate" will ## terminate the single previous pod, so that the new, incoming pod can attach to the PV ## updateStrategy: type: RollingUpdate rollingUpdate: {} ## @param notary.signer.lifecycleHooks LifecycleHook for the Harbor Notary Signer container(s) to automate configuration before or after startup ## lifecycleHooks: {} ## @param notary.signer.hostAliases Harbor Notary Signer pods host aliases ## hostAliases: [] ## @param notary.signer.podLabels Add additional labels to the Harbor Notary Signer pods (evaluated as a template) ## ref: https://kubernetes.io/docs/concepts/overview/working-with-objects/labels/ ## podLabels: {} ## @param notary.signer.podAnnotations Annotations to add to the Harbor Notary Signer pods (evaluated as a template) ## ref: https://kubernetes.io/docs/concepts/overview/working-with-objects/annotations/ ## podAnnotations: {} ## @param notary.signer.podAffinityPreset Harbor Notary Signer Pod affinity preset. Ignored if `notary.signer.affinity` is set. Allowed values: `soft` or `hard` ## ref: https://kubernetes.io/docs/concepts/scheduling-eviction/assign-pod-node/#inter-pod-affinity-and-anti-affinity ## podAffinityPreset: "" ## @param notary.signer.podAntiAffinityPreset Harbor Notary Signer Pod anti-affinity preset. Ignored if `notary.signer.affinity` is set. Allowed values: `soft` or `hard` ## Ref: https://kubernetes.io/docs/concepts/scheduling-eviction/assign-pod-node/#inter-pod-affinity-and-anti-affinity ## podAntiAffinityPreset: soft ## Node affinity preset ## Ref: https://kubernetes.io/docs/concepts/scheduling-eviction/assign-pod-node/#node-affinity ## nodeAffinityPreset: ## @param notary.signer.nodeAffinityPreset.type Harbor Notary Signer Node affinity preset type. Ignored if `notary.signer.affinity` is set. Allowed values: `soft` or `hard` ## type: "" ## @param notary.signer.nodeAffinityPreset.key Harbor Notary Signer Node label key to match Ignored if `notary.signer.affinity` is set. ## E.g. ## key: "kubernetes.io/e2e-az-name" ## key: "" ## @param notary.signer.nodeAffinityPreset.values Harbor Notary Signer Node label values to match. Ignored if `notary.signer.affinity` is set. ## E.g. ## values: ## - e2e-az1 ## - e2e-az2 ## values: [] ## @param notary.signer.affinity Harbor Notary Signer Affinity for pod assignment ## Ref: https://kubernetes.io/docs/concepts/configuration/assign-pod-node/#affinity-and-anti-affinity ## Note: notary.signer.podAffinityPreset, notary.signer.podAntiAffinityPreset, and notary.signer.nodeAffinityPreset will be ignored when it's set ## affinity: {} ## @param notary.signer.nodeSelector Harbor Notary Signer Node labels for pod assignment ## Ref: https://kubernetes.io/docs/user-guide/node-selection/ ## nodeSelector: {} ## @param notary.signer.tolerations Harbor Notary Signer Tolerations for pod assignment ## Ref: https://kubernetes.io/docs/concepts/configuration/taint-and-toleration/ ## tolerations: [] ## @param notary.signer.topologySpreadConstraints Topology Spread Constraints for pod assignment spread across your cluster among failure-domains. Evaluated as a template ## Ref: https://kubernetes.io/docs/concepts/workloads/pods/pod-topology-spread-constraints/#spread-constraints-for-pods ## topologySpreadConstraints: {} ## @param notary.signer.priorityClassName Priority Class Name ## ref: https://kubernetes.io/docs/concepts/configuration/pod-priority-preemption/#priorityclass ## priorityClassName: "" ## @param notary.signer.schedulerName Use an alternate scheduler, e.g. "stork". ## ref: https://kubernetes.io/docs/tasks/administer-cluster/configure-multiple-schedulers/ ## schedulerName: "" ## @param notary.signer.sidecars Add additional sidecar containers to the Harbor Notary Signer pods ## Example: ## sidecars: ## - name: your-image-name ## image: your-image ## imagePullPolicy: Always ## ports: ## - name: portname ## containerPort: 1234 ## sidecars: [] ## @param notary.signer.initContainers Add additional init containers to the Harbor Notary Signer pods ## Example: ## initContainers: ## - name: your-image-name ## image: your-image ## imagePullPolicy: Always ## ports: ## - name: portname ## containerPort: 1234 ## initContainers: [] ## @param notary.signer.extraVolumeMounts Optionally specify extra list of additional volumeMounts for the Harbor Notary Signer pods ## extraVolumeMounts: [] ## @param notary.signer.extraVolumes Optionally specify extra list of additional volumes for the Harbor Notary Signer pods ## extraVolumes: [] ## @param notary.signer.automountServiceAccountToken Automount service account token ## automountServiceAccountToken: false ## Harbor Notary service configuration ## service: ## @param notary.service.ports.server Harbor Notary server service port ## @param notary.service.ports.signer Harbor Notary signer service port ## ports: server: 4443 signer: 7899 ## @section Harbor Adapter Trivy Parameters trivy: ## Bitnami Harbor Adapter Trivy image ## ref: https://hub.docker.com/r/bitnami/harbor-adapter-trivy/tags/ ## @param trivy.image.registry Harbor Adapter Trivy image registry ## @param trivy.image.repository Harbor Adapter Trivy image repository ## @param trivy.image.tag Harbor Adapter Trivy image tag (immutable tags are recommended) ## @param trivy.image.pullPolicy Harbor Adapter Trivy image pull policy ## @param trivy.image.pullSecrets Harbor Adapter Trivy image pull secrets ## @param trivy.image.debug Enable Harbor Adapter Trivy image debug mode ## image: registry: docker.io repository: bitnami/harbor-adapter-trivy tag: 2.4.1-debian-10-r86 ## Specify a imagePullPolicy ## Defaults to 'Always' if image tag is 'latest', else set to 'IfNotPresent' ## ref: https://kubernetes.io/docs/user-guide/images/#pre-pulling-images ## pullPolicy: IfNotPresent ## Optionally specify an array of imagePullSecrets. ## Secrets must be manually created in the namespace. ## ref: https://kubernetes.io/docs/tasks/configure-pod-container/pull-image-private-registry/ ## e.g: ## pullSecrets: ## - myRegistryKeySecretName ## pullSecrets: [] ## Enable debug mode ## debug: false ## @param trivy.enabled Enable Trivy ## enabled: true ## @param trivy.debugMode The flag to enable Trivy debug mode ## debugMode: false ## @param trivy.vulnType Comma-separated list of vulnerability types. Possible values `os` and `library`. ## vulnType: 'os,library' ## @param trivy.severity Comma-separated list of severities to be checked ## severity: 'UNKNOWN,LOW,MEDIUM,HIGH,CRITICAL' ## @param trivy.ignoreUnfixed The flag to display only fixed vulnerabilities ## ignoreUnfixed: false ## @param trivy.insecure The flag to skip verifying registry certificate ## insecure: false ## @param trivy.gitHubToken The GitHub access token to download Trivy DB ## ## Trivy DB contains vulnerability information from NVD, Red Hat, and many other upstream vulnerability databases. ## It is downloaded by Trivy from the GitHub release page https://github.com/aquasecurity/trivy-db/releases and cached ## in the local file system (`/home/scanner/.cache/trivy/db/trivy.db`). In addition, the database contains the update ## timestamp so Trivy can detect whether it should download a newer version from the Internet or use the cached one. ## Currently, the database is updated every 12 hours and published as a new release to GitHub. ## ## Anonymous downloads from GitHub are subject to the limit of 60 requests per hour. Normally such rate limit is enough ## for production operations. If, for any reason, it's not enough, you could increase the rate limit to 5000 ## requests per hour by specifying the GitHub access token. For more details on GitHub rate limiting please consult ## https://developer.github.com/v3/#rate-limiting ## ## You can create a GitHub token by following the instructions in ## https://help.github.com/en/github/authenticating-to-github/creating-a-personal-access-token-for-the-command-line ## gitHubToken: "" ## @param trivy.skipUpdate The flag to disable Trivy DB downloads from GitHub ## You might want to set the value of this flag to `true` in test or CI/CD environments to avoid GitHub rate limiting issues. ## If the value is set to `true` you have to manually download the `trivy.db` file and mount it in the ## `/home/scanner/.cache/trivy/db/trivy.db` path. ## skipUpdate: false ## @param trivy.cacheDir Directory to store the cache ## cacheDir: '/bitnami/harbor-adapter-trivy/.cache' ## Use TLS in the container ## tls: ## @param trivy.tls.existingSecret Name of an existing secret with the certificates for internal TLS access ## Requires `internalTLS.enabled` to be set to `true`` ## Self-signed TLS certificates will be used otherwise ## existingSecret: "" ## @param trivy.command Override default container command (useful when using custom images) ## command: [] ## @param trivy.args Override default container args (useful when using custom images) ## args: [] ## @param trivy.extraEnvVars Array with extra environment variables to add Trivy pods ## extraEnvVars: [] ## @param trivy.extraEnvVarsCM ConfigMap containing extra environment variables for Trivy pods ## extraEnvVarsCM: "" ## @param trivy.extraEnvVarsSecret Secret containing extra environment variables (in case of sensitive data) for Trivy pods ## extraEnvVarsSecret: "" ## @param trivy.containerPorts.http Trivy HTTP container port ## @param trivy.containerPorts.https Trivy HTTPS container port ## containerPorts: http: 8080 https: 8443 ## @param trivy.replicaCount Number of Trivy replicas ## replicaCount: 1 ## Configure extra options for Trivy containers' liveness, readiness and startup probes ## ref: https://kubernetes.io/docs/tasks/configure-pod-container/configure-liveness-readiness-startup-probes/#configure-probes ## @param trivy.livenessProbe.enabled Enable livenessProbe on Trivy containers ## @param trivy.livenessProbe.initialDelaySeconds Initial delay seconds for livenessProbe ## @param trivy.livenessProbe.periodSeconds Period seconds for livenessProbe ## @param trivy.livenessProbe.timeoutSeconds Timeout seconds for livenessProbe ## @param trivy.livenessProbe.failureThreshold Failure threshold for livenessProbe ## @param trivy.livenessProbe.successThreshold Success threshold for livenessProbe ## livenessProbe: enabled: true initialDelaySeconds: 20 periodSeconds: 10 timeoutSeconds: 5 failureThreshold: 6 successThreshold: 1 ## @param trivy.readinessProbe.enabled Enable readinessProbe on Trivy containers ## @param trivy.readinessProbe.initialDelaySeconds Initial delay seconds for readinessProbe ## @param trivy.readinessProbe.periodSeconds Period seconds for readinessProbe ## @param trivy.readinessProbe.timeoutSeconds Timeout seconds for readinessProbe ## @param trivy.readinessProbe.failureThreshold Failure threshold for readinessProbe ## @param trivy.readinessProbe.successThreshold Success threshold for readinessProbe ## readinessProbe: enabled: true initialDelaySeconds: 20 periodSeconds: 10 timeoutSeconds: 5 failureThreshold: 6 successThreshold: 1 ## @param trivy.startupProbe.enabled Enable startupProbe on Trivy containers ## @param trivy.startupProbe.initialDelaySeconds Initial delay seconds for startupProbe ## @param trivy.startupProbe.periodSeconds Period seconds for startupProbe ## @param trivy.startupProbe.timeoutSeconds Timeout seconds for startupProbe ## @param trivy.startupProbe.failureThreshold Failure threshold for startupProbe ## @param trivy.startupProbe.successThreshold Success threshold for startupProbe ## startupProbe: enabled: false initialDelaySeconds: 5 periodSeconds: 10 timeoutSeconds: 1 failureThreshold: 15 successThreshold: 1 ## @param trivy.customLivenessProbe Custom livenessProbe that overrides the default one ## customLivenessProbe: {} ## @param trivy.customReadinessProbe Custom readinessProbe that overrides the default one ## customReadinessProbe: {} ## @param trivy.customStartupProbe Custom startupProbe that overrides the default one ## customStartupProbe: {} ## Trivy resource requests and limits ## ref: https://kubernetes.io/docs/user-guide/compute-resources/ ## @param trivy.resources.limits [object] The resources limits for the Trivy containers ## @param trivy.resources.requests [object] The requested resources for the Trivy containers ## resources: requests: cpu: 200m memory: 512Mi limits: cpu: 1 memory: 1Gi ## Configure Trivy pods Security Context ## ref: https://kubernetes.io/docs/tasks/configure-pod-container/security-context/#set-the-security-context-for-a-pod ## @param trivy.podSecurityContext.enabled Enabled Trivy pods' Security Context ## @param trivy.podSecurityContext.fsGroup Set Trivy pod's Security Context fsGroup ## podSecurityContext: enabled: true fsGroup: 1001 ## Configure Trivy containers (only main one) Security Context ## ref: https://kubernetes.io/docs/tasks/configure-pod-container/security-context/#set-the-security-context-for-a-container ## @param trivy.containerSecurityContext.enabled Enabled Trivy containers' Security Context ## @param trivy.containerSecurityContext.runAsUser Set Trivy containers' Security Context runAsUser ## @param trivy.containerSecurityContext.runAsNonRoot Set Trivy containers' Security Context runAsNonRoot ## containerSecurityContext: enabled: true runAsUser: 1001 runAsNonRoot: true ## @param trivy.updateStrategy.type Trivy deployment strategy type - only really applicable for deployments with RWO PVs attached ## @param trivy.updateStrategy.rollingUpdate Trivy deployment rolling update configuration parameters ## If replicas = 1, an update can get "stuck", as the previous pod remains attached to the ## PV, and the "incoming" pod can never start. Changing the strategy to "Recreate" will ## terminate the single previous pod, so that the new, incoming pod can attach to the PV ## updateStrategy: type: RollingUpdate rollingUpdate: {} ## @param trivy.lifecycleHooks LifecycleHook for the Trivy container(s) to automate configuration before or after startup ## lifecycleHooks: {} ## @param trivy.hostAliases Trivy pods host aliases ## hostAliases: [] ## @param trivy.podLabels Add additional labels to the Trivy pods (evaluated as a template) ## ref: https://kubernetes.io/docs/concepts/overview/working-with-objects/labels/ ## podLabels: {} ## @param trivy.podAnnotations Annotations to add to the Trivy pods (evaluated as a template) ## ref: https://kubernetes.io/docs/concepts/overview/working-with-objects/annotations/ ## podAnnotations: {} ## @param trivy.podAffinityPreset Trivy Pod affinity preset. Ignored if `trivy.affinity` is set. Allowed values: `soft` or `hard` ## ref: https://kubernetes.io/docs/concepts/scheduling-eviction/assign-pod-node/#inter-pod-affinity-and-anti-affinity ## podAffinityPreset: "" ## @param trivy.podAntiAffinityPreset Trivy Pod anti-affinity preset. Ignored if `trivy.affinity` is set. Allowed values: `soft` or `hard` ## Ref: https://kubernetes.io/docs/concepts/scheduling-eviction/assign-pod-node/#inter-pod-affinity-and-anti-affinity ## podAntiAffinityPreset: soft ## Node affinity preset ## Ref: https://kubernetes.io/docs/concepts/scheduling-eviction/assign-pod-node/#node-affinity ## nodeAffinityPreset: ## @param trivy.nodeAffinityPreset.type Trivy Node affinity preset type. Ignored if `trivy.affinity` is set. Allowed values: `soft` or `hard` ## type: "" ## @param trivy.nodeAffinityPreset.key Trivy Node label key to match Ignored if `trivy.affinity` is set. ## E.g. ## key: "kubernetes.io/e2e-az-name" ## key: "" ## @param trivy.nodeAffinityPreset.values Trivy Node label values to match. Ignored if `trivy.affinity` is set. ## E.g. ## values: ## - e2e-az1 ## - e2e-az2 ## values: [] ## @param trivy.affinity Trivy Affinity for pod assignment ## Ref: https://kubernetes.io/docs/concepts/configuration/assign-pod-node/#affinity-and-anti-affinity ## Note: trivy.podAffinityPreset, trivy.podAntiAffinityPreset, and trivy.nodeAffinityPreset will be ignored when it's set ## affinity: {} ## @param trivy.nodeSelector Trivy Node labels for pod assignment ## Ref: https://kubernetes.io/docs/user-guide/node-selection/ ## nodeSelector: {} ## @param trivy.tolerations Trivy Tolerations for pod assignment ## Ref: https://kubernetes.io/docs/concepts/configuration/taint-and-toleration/ ## tolerations: [] ## @param trivy.topologySpreadConstraints Topology Spread Constraints for pod assignment spread across your cluster among failure-domains. Evaluated as a template ## Ref: https://kubernetes.io/docs/concepts/workloads/pods/pod-topology-spread-constraints/#spread-constraints-for-pods ## topologySpreadConstraints: {} ## @param trivy.priorityClassName Priority Class Name ## ref: https://kubernetes.io/docs/concepts/configuration/pod-priority-preemption/#priorityclass ## priorityClassName: "" ## @param trivy.schedulerName Use an alternate scheduler, e.g. "stork". ## ref: https://kubernetes.io/docs/tasks/administer-cluster/configure-multiple-schedulers/ ## schedulerName: "" ## @param trivy.sidecars Add additional sidecar containers to the Trivy pods ## Example: ## sidecars: ## - name: your-image-name ## image: your-image ## imagePullPolicy: Always ## ports: ## - name: portname ## containerPort: 1234 ## sidecars: [] ## @param trivy.initContainers Add additional init containers to the Trivy pods ## Example: ## initContainers: ## - name: your-image-name ## image: your-image ## imagePullPolicy: Always ## ports: ## - name: portname ## containerPort: 1234 ## initContainers: [] ## @param trivy.extraVolumeMounts Optionally specify extra list of additional volumeMounts for the Trivy pods ## extraVolumeMounts: [] ## @param trivy.extraVolumes Optionally specify extra list of additional volumes for the Trivy pods ## extraVolumes: [] ## @param trivy.automountServiceAccountToken Automount service account token ## automountServiceAccountToken: false ## Trivy service configuration ## service: ## @param trivy.service.ports.http Trivy HTTP service port ## @param trivy.service.ports.https Trivy HTTPS service port ## ports: http: 8080 https: 8443 ## @section PostgreSQL Parameters ## PostgreSQL chart configuration ## ref: https://github.com/bitnami/charts/blob/master/bitnami/postgresql/values.yaml ## @param postgresql.enabled Switch to enable or disable the PostgreSQL helm chart ## @param postgresql.auth.enablePostgresUser Assign a password to the "postgres" admin user. Otherwise, remote access will be blocked for this user ## @param postgresql.auth.postgresPassword Password for the "postgres" admin user ## @param postgresql.auth.existingSecret Name of existing secret to use for PostgreSQL credentials ## @param postgresql.architecture PostgreSQL architecture (`standalone` or `replication`) ## @param postgresql.primary.extendedConfiguration Extended PostgreSQL Primary configuration (appended to main or default configuration) ## @param postgresql.primary.initdb.scripts [object] Initdb scripts to create Harbor databases ## postgresql: enabled: true ## Override PostgreSQL default image as 14.x is not supported https://goharbor.io/docs/2.4.0/install-config/ ## ref: https://github.com/bitnami/bitnami-docker-postgresql ## @param postgresql.image.registry PostgreSQL image registry ## @param postgresql.image.repository PostgreSQL image repository ## @param postgresql.image.tag PostgreSQL image tag (immutable tags are recommended) ## image: registry: docker.io repository: bitnami/postgresql tag: 11.15.0-debian-10-r33 auth: enablePostgresUser: true postgresPassword: not-secure-database-password existingSecret: "" architecture: standalone primary: extendedConfiguration: | max_connections = 1024 initdb: scripts: initial-notaryserver.sql: | CREATE DATABASE notaryserver; CREATE USER server; alter user server with encrypted password 'password'; GRANT ALL PRIVILEGES ON DATABASE notaryserver TO server; initial-notarysigner.sql: | CREATE DATABASE notarysigner; CREATE USER signer; alter user signer with encrypted password 'password'; GRANT ALL PRIVILEGES ON DATABASE notarysigner TO signer; initial-registry.sql: | CREATE DATABASE registry ENCODING 'UTF8'; \c registry; CREATE TABLE schema_migrations(version bigint not null primary key, dirty boolean not null); ## External PostgreSQL configuration ## All of these values are only used when postgresql.enabled is set to false ## @param externalDatabase.host Database host ## @param externalDatabase.port Database port number ## @param externalDatabase.user Non-root username for Harbor ## @param externalDatabase.password Password for the non-root username for Harbor ## @param externalDatabase.sslmode External database ssl mode ## @param externalDatabase.coreDatabase External database name for core ## @param externalDatabase.clairDatabase External database name for clair ## @param externalDatabase.clairUsername External database username for clair ## @param externalDatabase.clairPassword External database password for clair ## @param externalDatabase.notaryServerDatabase External database name for notary server ## @param externalDatabase.notaryServerUsername External database username for notary server ## @param externalDatabase.notaryServerPassword External database password for notary server ## @param externalDatabase.notarySignerDatabase External database name for notary signer ## @param externalDatabase.notarySignerUsername External database username for notary signer ## @param externalDatabase.notarySignerPassword External database password for notary signer ## externalDatabase: host: localhost port: 5432 user: bn_harbor password: "" sslmode: disable coreDatabase: "" clairDatabase: "" clairUsername: "" clairPassword: "" notaryServerDatabase: "" notaryServerUsername: "" notaryServerPassword: "" notarySignerDatabase: "" notarySignerUsername: "" notarySignerPassword: "" ## @section Redis&trade; parameters ## Redis&trade; chart configuration ## ref: https://github.com/bitnami/charts/blob/master/bitnami/redis/values.yaml ## @param redis.enabled Switch to enable or disable the Redis&trade; helm ## @param redis.auth.enabled Enable password authentication ## @param redis.auth.password Redis&trade; password ## @param redis.auth.existingSecret The name of an existing secret with Redis&trade; credentials ## @param redis.architecture Redis&trade; architecture. Allowed values: `standalone` or `replication` ## redis: enabled: true auth: enabled: false ## Redis&trade; password (both master and slave). Defaults to a random 10-character alphanumeric string if not set and auth.enabled is true. ## It should always be set using the password value or in the existingSecret to avoid issues ## with Harbor. ## The password value is ignored if existingSecret is set password: "" existingSecret: "" architecture: standalone ## External Redis&trade; configuration ## All of these values are only used when redis.enabled is set to false ## @param externalRedis.host Redis&trade; host ## @param externalRedis.port Redis&trade; port number ## @param externalRedis.password Redis&trade; password ## @param externalRedis.coreDatabaseIndex Index for core database ## @param externalRedis.jobserviceDatabaseIndex Index for jobservice database ## @param externalRedis.registryDatabaseIndex Index for registry database ## @param externalRedis.chartmuseumDatabaseIndex Index for chartmuseum database ## @param externalRedis.clairAdapterDatabaseIndex Index for chartmuseum database ## @param externalRedis.trivyAdapterDatabaseIndex Index for chartmuseum database ## externalRedis: host: localhost port: 6379 password: "" coreDatabaseIndex: '0' jobserviceDatabaseIndex: '1' registryDatabaseIndex: '2' chartmuseumDatabaseIndex: '3' clairAdapterDatabaseIndex: '4' trivyAdapterDatabaseIndex: '5' ## Redis&trade; sentinel configuration ## @param externalRedis.sentinel.enabled If external redis with sentinal is used, set it to `true` ## @param externalRedis.sentinel.masterSet Name of sentinel masterSet if sentinel is used ## @param externalRedis.sentinel.hosts Sentinel hosts and ports in the format ## sentinel: enabled: false masterSet: 'mymaster' hosts: ""
47.698776
400
0.736577
1153541e9d8ddd1df00e3d81d0942bf645337810
53,823
yaml
YAML
bitnami/fluentd/values.yaml
00arthur00/charts
502aa1e64541669b732a4eda896e5937847b6c3c
[ "Apache-2.0" ]
null
null
null
bitnami/fluentd/values.yaml
00arthur00/charts
502aa1e64541669b732a4eda896e5937847b6c3c
[ "Apache-2.0" ]
2
2022-01-26T01:14:30.000Z
2022-01-26T07:03:39.000Z
bitnami/fluentd/values.yaml
00arthur00/charts
502aa1e64541669b732a4eda896e5937847b6c3c
[ "Apache-2.0" ]
null
null
null
## @section Global parameters ## Global Docker image parameters ## Please, note that this will override the image parameters, including dependencies, configured to use the global value ## Current available global Docker image parameters: imageRegistry, imagePullSecrets and storageClass ## @param global.imageRegistry Global Docker image registry ## @param global.imagePullSecrets Global Docker registry secret names as an array ## @param global.storageClass Global StorageClass for Persistent Volume(s) ## global: imageRegistry: "" ## E.g. ## imagePullSecrets: ## - myRegistryKeySecretName ## imagePullSecrets: [] storageClass: "" ## @section Common parameters ## @param kubeVersion Force target Kubernetes version (using Helm capabilities if not set) ## kubeVersion: "" ## @param nameOverride String to partially override common.names.fullname template (will maintain the release name) ## nameOverride: "" ## @param fullnameOverride String to fully override common.names.fullname template ## fullnameOverride: "" ## @param commonAnnotations Annotations to add to all deployed objects ## commonAnnotations: {} ## @param commonLabels Labels to add to all deployed objects ## commonLabels: {} ## @param clusterDomain Cluster Domain ## clusterDomain: cluster.local ## @param extraDeploy Array of extra objects to deploy with the release ## extraDeploy: [] ## Enable diagnostic mode in the deployment ## diagnosticMode: ## @param diagnosticMode.enabled Enable diagnostic mode (all probes will be disabled and the command will be overridden) ## enabled: false ## @param diagnosticMode.command Command to override all containers in the deployment ## command: - sleep ## @param diagnosticMode.args Args to override all containers in the deployment ## args: - infinity ## @section Fluentd parameters ## Bitnami Fluentd image version ## ref: https://hub.docker.com/r/bitnami/fluentd/tags/ ## @param image.registry Fluentd image registry ## @param image.repository Fluentd image repository ## @param image.tag Fluentd image tag (immutable tags are recommended) ## @param image.pullPolicy Fluentd image pull policy ## @param image.pullSecrets Fluentd image pull secrets ## @param image.debug Enable image debug mode ## image: registry: docker.io repository: bitnami/fluentd tag: 1.14.5-debian-10-r31 ## Specify a imagePullPolicy ## Defaults to 'Always' if image tag is 'latest', else set to 'IfNotPresent' ## ref: https://kubernetes.io/docs/user-guide/images/#pre-pulling-images ## pullPolicy: IfNotPresent ## Optionally specify an array of imagePullSecrets. ## Secrets must be manually created in the namespace. ## ref: https://kubernetes.io/docs/tasks/configure-pod-container/pull-image-private-registry/ ## ## pullSecrets: ## - myRegistryKeySecretName pullSecrets: [] ## Enable debug mode ## debug: false ## Forwarder parameters ## forwarder: ## @param forwarder.enabled Enable forwarder daemonset ## enabled: true ## @param forwarder.image.registry Fluentd forwarder image registry override ## @param forwarder.image.repository Fluentd forwarder image repository override ## @param forwarder.image.tag Fluentd forwarder image tag override (immutable tags are recommended) image: registry: "" repository: "" tag: "" ## @param forwarder.daemonUser Forwarder daemon user and group (set to root by default because it reads from host paths) ## daemonUser: root ## @param forwarder.daemonGroup Fluentd forwarder daemon system group ## daemonGroup: root ## @param forwarder.hostAliases Add deployment host aliases ## https://kubernetes.io/docs/concepts/services-networking/add-entries-to-pod-etc-hosts-with-host-aliases/ ## hostAliases: [] ## K8s Security Context for forwarder pods ## https://kubernetes.io/docs/tasks/configure-pod-container/security-context/ ## @param forwarder.podSecurityContext.enabled Enable security context for forwarder pods ## @param forwarder.podSecurityContext.runAsUser User ID for forwarder's containers ## @param forwarder.podSecurityContext.runAsGroup Group ID for forwarder's containers ## @param forwarder.podSecurityContext.fsGroup Group ID for forwarder's containers filesystem ## podSecurityContext: enabled: true runAsUser: 0 runAsGroup: 0 fsGroup: 0 ## K8s Security Context for forwarder container ## https://kubernetes.io/docs/tasks/configure-pod-container/security-context/ ## @param forwarder.containerSecurityContext.enabled Enable security context for the forwarder container ## @param forwarder.containerSecurityContext.privileged Run as privileged ## @param forwarder.containerSecurityContext.allowPrivilegeEscalation Allow Privilege Escalation ## @param forwarder.containerSecurityContext.readOnlyRootFilesystem Require the use of a read only root file system ## @param forwarder.containerSecurityContext.capabilities.drop [array] Drop capabilities for the securityContext ## containerSecurityContext: enabled: true privileged: false allowPrivilegeEscalation: false ## Requires mounting an `extraVolume` of type `emptyDir` into /tmp ## readOnlyRootFilesystem: false capabilities: drop: - ALL ## @param forwarder.terminationGracePeriodSeconds Duration in seconds the pod needs to terminate gracefully ## https://kubernetes.io/docs/concepts/containers/container-lifecycle-hooks/ ## terminationGracePeriodSeconds: 30 ## @param forwarder.configFile Name of the config file that will be used by Fluentd at launch under the `/opt/bitnami/fluentd/conf` directory ## configFile: fluentd.conf ## @param forwarder.configMap Name of the config map that contains the Fluentd configuration files ## If not specified, one will be created by default ## configMap: "" ## @param forwarder.configMapFiles [object] Files to be added to be config map. Ignored if `forwarder.configMap` is set ## configMapFiles: fluentd.conf: | # Ignore fluentd own events <match fluent.**> @type null </match> @include fluentd-inputs.conf @include fluentd-output.conf {{- if .Values.metrics.enabled }} @include metrics.conf {{- end }} fluentd-inputs.conf: | # HTTP input for the liveness and readiness probes <source> @type http port 9880 </source> # Get the logs from the containers running in the node <source> @type tail path /var/log/containers/*.log # exclude Fluentd logs exclude_path /var/log/containers/*fluentd*.log pos_file /opt/bitnami/fluentd/logs/buffers/fluentd-docker.pos tag kubernetes.* read_from_head true <parse> @type json time_key time time_format %Y-%m-%dT%H:%M:%S.%NZ </parse> </source> # enrich with kubernetes metadata <filter kubernetes.**> @type kubernetes_metadata </filter> fluentd-output.conf: | # Throw the healthcheck to the standard output instead of forwarding it <match fluentd.healthcheck> @type stdout </match> {{- if .Values.aggregator.enabled }} # Forward all logs to the aggregators <match **> @type forward {{- if .Values.tls.enabled }} transport tls tls_cert_path /opt/bitnami/fluentd/certs/out_forward/ca.crt tls_client_cert_path /opt/bitnami/fluentd/certs/out_forward/tls.crt tls_client_private_key_path /opt/bitnami/fluentd/certs/out_forward/tls.key {{- end }} {{- $fullName := (include "common.names.fullname" .) }} {{- $global := . }} {{- $domain := default "cluster.local" .Values.clusterDomain }} {{- $port := .Values.aggregator.port | int }} {{- range $i, $e := until (.Values.aggregator.replicaCount | int) }} <server> {{ printf "host %s-%d.%s-headless.%s.svc.%s" $fullName $i $fullName $global.Release.Namespace $domain }} {{ printf "port %d" $port }} {{- if ne $i 0 }} standby {{- end }} </server> {{- end }} <buffer> @type file path /opt/bitnami/fluentd/logs/buffers/logs.buffer flush_thread_count 2 flush_interval 5s </buffer> </match> {{- else }} # Send the logs to the standard output <match **> @type stdout </match> {{- end }} metrics.conf: | # Prometheus Exporter Plugin # input plugin that exports metrics <source> @type prometheus port {{ .Values.metrics.service.port }} </source> # input plugin that collects metrics from MonitorAgent <source> @type prometheus_monitor <labels> host ${hostname} </labels> </source> # input plugin that collects metrics for output plugin <source> @type prometheus_output_monitor <labels> host ${hostname} </labels> </source> # input plugin that collects metrics for in_tail plugin <source> @type prometheus_tail_monitor <labels> host ${hostname} </labels> </source> ## @param forwarder.extraArgs Extra arguments for the Fluentd command line ## ref: https://docs.fluentd.org/deployment/command-line-option ## extraArgs: "" ## @param forwarder.extraEnvVars Extra environment variables to pass to the container ## extraEnv: ## - name: MY_ENV_VAR ## value: my_value ## extraEnvVars: [] ## @param forwarder.extraEnvVarsCM Name of existing ConfigMap containing extra env vars for Fluentd Forwarder nodes ## extraEnvVarsCM: "" ## @param forwarder.extraEnvVarsSecret Name of existing Secret containing extra env vars for Fluentd Forwarder nodes ## extraEnvVarsSecret: "" ## @param forwarder.containerPorts [array] Ports the forwarder containers will listen on ## containerPorts: ## - name: syslog-tcp ## containerPort: 5140 ## protocol: TCP ## - name: syslog-udp ## containerPort: 5140 ## protocol: UDP ## - name: tcp ## containerPort: 24224 ## protocol: TCP - name: http containerPort: 9880 protocol: TCP ## Service parameters ## service: ## @param forwarder.service.type Kubernetes service type (`ClusterIP`, `NodePort`, or `LoadBalancer`) for the forwarders ## type: ClusterIP ## @param forwarder.service.ports [object] Array containing the forwarder service ports ## ports: ## syslog-udp: ## port: 5140 ## targetPort: syslog-udp ## protocol: UDP ## nodePort: 31514 ## syslog-tcp: ## port: 5140 ## targetPort: syslog-tcp ## protocol: TCP ## nodePort: 31514 ## tcp: ## port: 24224 ## targetPort: tcp ## protocol: TCP http: port: 9880 targetPort: http protocol: TCP ## @param forwarder.service.loadBalancerIP loadBalancerIP if service type is `LoadBalancer` (optional, cloud specific) ## ref: https://kubernetes.io/docs/user-guide/services/#type-loadbalancer ## loadBalancerIP: "" ## @param forwarder.service.loadBalancerSourceRanges Addresses that are allowed when service is LoadBalancer ## https://kubernetes.io/docs/tasks/access-application-cluster/configure-cloud-provider-firewall/#restrict-access-for-loadbalancer-service ## ## loadBalancerSourceRanges: ## - 10.10.10.0/24 ## loadBalancerSourceRanges: [] ## @param forwarder.service.externalTrafficPolicy Fluentd Forwarder service external traffic policy ## ref http://kubernetes.io/docs/tasks/access-application-cluster/create-external-load-balancer/#preserving-the-client-source-ip ## externalTrafficPolicy: Cluster ## @param forwarder.service.clusterIP Static clusterIP or None for headless services ## ref: https://kubernetes.io/docs/concepts/services-networking/service/#choosing-your-own-ip-address ## e.g: ## clusterIP: None ## clusterIP: "" ## @param forwarder.service.annotations Provide any additional annotations which may be required ## annotations: {} ## @param forwarder.service.sessionAffinity Session Affinity for Kubernetes service, can be "None" or "ClientIP" ## If "ClientIP", consecutive client requests will be directed to the same Pod ## ref: https://kubernetes.io/docs/concepts/services-networking/service/#virtual-ips-and-service-proxies ## sessionAffinity: None ## @param forwarder.service.sessionAffinityConfig Additional settings for the sessionAffinity ## sessionAffinityConfig: ## clientIP: ## timeoutSeconds: 300 ## sessionAffinityConfig: {} ## Configure extra options for startup probe ## ref: https://kubernetes.io/docs/tasks/configure-pod-container/configure-liveness-readiness-probes/#configure-probes ## @param forwarder.startupProbe.enabled Enable startupProbe ## @param forwarder.startupProbe.httpGet.path Request path for startupProbe ## @param forwarder.startupProbe.httpGet.port Port for startupProbe ## @param forwarder.startupProbe.initialDelaySeconds Initial delay seconds for startupProbe ## @param forwarder.startupProbe.periodSeconds Period seconds for startupProbe ## @param forwarder.startupProbe.timeoutSeconds Timeout seconds for startupProbe ## @param forwarder.startupProbe.failureThreshold Failure threshold for startupProbe ## @param forwarder.startupProbe.successThreshold Success threshold for startupProbe ## startupProbe: enabled: false httpGet: path: /fluentd.healthcheck?json=%7B%22ping%22%3A+%22pong%22%7D port: http initialDelaySeconds: 60 periodSeconds: 10 timeoutSeconds: 5 failureThreshold: 6 successThreshold: 1 ## Configure extra options for liveness probe ## ref: https://kubernetes.io/docs/tasks/configure-pod-container/configure-liveness-readiness-probes/#configure-probes ## @param forwarder.livenessProbe.enabled Enable livenessProbe ## @param forwarder.livenessProbe.httpGet.path Request path for livenessProbe ## @param forwarder.livenessProbe.httpGet.port Port for livenessProbe ## @param forwarder.livenessProbe.initialDelaySeconds Initial delay seconds for livenessProbe ## @param forwarder.livenessProbe.periodSeconds Period seconds for livenessProbe ## @param forwarder.livenessProbe.timeoutSeconds Timeout seconds for livenessProbe ## @param forwarder.livenessProbe.failureThreshold Failure threshold for livenessProbe ## @param forwarder.livenessProbe.successThreshold Success threshold for livenessProbe ## livenessProbe: enabled: true httpGet: path: /fluentd.healthcheck?json=%7B%22ping%22%3A+%22pong%22%7D port: http initialDelaySeconds: 60 periodSeconds: 10 timeoutSeconds: 5 failureThreshold: 6 successThreshold: 1 ## Configure extra options for readiness probe ## ref: https://kubernetes.io/docs/tasks/configure-pod-container/configure-liveness-readiness-probes/#configure-probes ## @param forwarder.readinessProbe.enabled Enable readinessProbe ## @param forwarder.readinessProbe.httpGet.path Request path for readinessProbe ## @param forwarder.readinessProbe.httpGet.port Port for readinessProbe ## @param forwarder.readinessProbe.initialDelaySeconds Initial delay seconds for readinessProbe ## @param forwarder.readinessProbe.periodSeconds Period seconds for readinessProbe ## @param forwarder.readinessProbe.timeoutSeconds Timeout seconds for readinessProbe ## @param forwarder.readinessProbe.failureThreshold Failure threshold for readinessProbe ## @param forwarder.readinessProbe.successThreshold Success threshold for readinessProbe ## readinessProbe: enabled: true httpGet: path: /fluentd.healthcheck?json=%7B%22ping%22%3A+%22pong%22%7D port: http initialDelaySeconds: 5 periodSeconds: 10 timeoutSeconds: 5 failureThreshold: 6 successThreshold: 1 ## @param forwarder.customStartupProbe Custom liveness probe for the Fluend Forwarder ## customStartupProbe: {} ## @param forwarder.customLivenessProbe Custom liveness probe for the Fluend Forwarder ## customLivenessProbe: {} ## @param forwarder.customReadinessProbe Custom rediness probe for the Fluend Forwarder ## customReadinessProbe: {} ## @param forwarder.updateStrategy.type Set up update strategy. ## ref: https://kubernetes.io/docs/tasks/manage-daemon/update-daemon-set/#daemonset-update-strategy ## Example: ## updateStrategy: ## type: RollingUpdate ## rollingUpdate: ## maxSurge: 25% ## maxUnavailable: 25% ## updateStrategy: type: RollingUpdate ## Forwarder containers' resource requests and limits ## ref: https://kubernetes.io/docs/user-guide/compute-resources/ ## We usually recommend not to specify default resources and to leave this as a conscious ## choice for the user. This also increases chances charts run on environments with little ## resources, such as Minikube. If you do want to specify resources, uncomment the following ## lines, adjust them as necessary, and remove the curly braces after 'resources:'. ## @param forwarder.resources.limits The resources limits for the container ## @param forwarder.resources.requests The requested resources for the container ## resources: ## Example: ## limits: ## cpu: 500m ## memory: 1Gi limits: {} ## Examples: ## requests: ## cpu: 300m ## memory: 512Mi requests: {} ## @param forwarder.priorityClassName Set Priority Class Name to allow priority control over other pods ## ref: https://kubernetes.io/docs/concepts/configuration/pod-priority-preemption/ ## priorityClassName: "" ## @param forwarder.schedulerName Name of the k8s scheduler (other than default) ## ref: https://kubernetes.io/docs/tasks/administer-cluster/configure-multiple-schedulers/ ## schedulerName: "" ## @param forwarder.topologySpreadConstraints Topology Spread Constraints for pod assignment ## https://kubernetes.io/docs/concepts/workloads/pods/pod-topology-spread-constraints/ ## The value is evaluated as a template ## topologySpreadConstraints: [] ## @param forwarder.podAffinityPreset Forwarder Pod affinity preset. Ignored if `affinity` is set. Allowed values: `soft` or `hard` ## ref: https://kubernetes.io/docs/concepts/scheduling-eviction/assign-pod-node/#inter-pod-affinity-and-anti-affinity ## podAffinityPreset: "" ## @param forwarder.podAntiAffinityPreset Forwarder Pod anti-affinity preset. Ignored if `affinity` is set. Allowed values: `soft` or `hard` ## Ref: https://kubernetes.io/docs/concepts/scheduling-eviction/assign-pod-node/#inter-pod-affinity-and-anti-affinity ## podAntiAffinityPreset: "" ## Node affinity preset ## Ref: https://kubernetes.io/docs/concepts/scheduling-eviction/assign-pod-node/#node-affinity ## nodeAffinityPreset: ## @param forwarder.nodeAffinityPreset.type Forwarder Node affinity preset type. Ignored if `affinity` is set. Allowed values: `soft` or `hard` ## type: "" ## @param forwarder.nodeAffinityPreset.key Forwarder Node label key to match Ignored if `affinity` is set. ## E.g. ## key: "kubernetes.io/e2e-az-name" ## key: "" ## @param forwarder.nodeAffinityPreset.values Forwarder Node label values to match. Ignored if `affinity` is set. ## E.g. ## values: ## - e2e-az1 ## - e2e-az2 ## values: [] ## @param forwarder.affinity Forwarder Affinity for pod assignment ## Ref: https://kubernetes.io/docs/concepts/configuration/assign-pod-node/#affinity-and-anti-affinity ## Note: podAffinityPreset, podAntiAffinityPreset, and nodeAffinityPreset will be ignored when it's set ## affinity: {} ## @param forwarder.nodeSelector Forwarder Node labels for pod assignment ## Ref: https://kubernetes.io/docs/user-guide/node-selection/ ## nodeSelector: {} ## @param forwarder.tolerations Forwarder Tolerations for pod assignment ## Ref: https://kubernetes.io/docs/concepts/configuration/taint-and-toleration/ ## tolerations: [] ## @param forwarder.podAnnotations Pod annotations ## ref: https://kubernetes.io/docs/concepts/overview/working-with-objects/annotations/ ## podAnnotations: {} ## @param forwarder.podLabels Extra labels to add to Pod ## podLabels: {} ## Pods Service Account ## ref: https://kubernetes.io/docs/tasks/configure-pod-container/configure-service-account/ ## serviceAccount: ## @param forwarder.serviceAccount.create Specify whether a ServiceAccount should be created. ## create: true ## @param forwarder.serviceAccount.name The name of the ServiceAccount to create ## If not set and create is true, a name is generated using the common.names.fullname template name: "" ## @param forwarder.serviceAccount.annotations Additional Service Account annotations (evaluated as a template) ## annotations: {} ## @param forwarder.serviceAccount.automountServiceAccountToken Automount service account token for the server service account ## automountServiceAccountToken: true ## Role Based Access ## ref: https://kubernetes.io/docs/admin/authorization/rbac/ ## @param forwarder.rbac.create Specify whether RBAC resources should be created and used, allowing the get, watch and list of pods/namespaces ## @param forwarder.rbac.pspEnabled Whether to create a PodSecurityPolicy and bound it with RBAC. WARNING: PodSecurityPolicy is deprecated in Kubernetes v1.21 or later, unavailable in v1.25 or later ## rbac: create: true pspEnabled: false ## Persist data to a persistent volume ## persistence: ## @param forwarder.persistence.enabled Enable persistence volume for the forwarder ## enabled: false ## @param forwarder.persistence.hostPath.path Directory from the host node's filesystem to mount as hostPath volume for persistence. ## The host directory you chose is mounted into /opt/bitnami/fluentd/logs/buffers in your Pod ## Example use case: mount host directory /tmp/buffer (if the directory doesn't exist, it creates it) into forwarder pod. ## persistence: ## enabled: true ## hostPath: ## path: /tmp/buffer ## hostPath: path: /opt/bitnami/fluentd/logs/buffers ## @param forwarder.command Override default container command (useful when using custom images) ## command: [] ## @param forwarder.args Override default container args (useful when using custom images) ## args: [] ## @param forwarder.lifecycleHooks Additional lifecycles to add to the pods ## ref: https://kubernetes.io/docs/tasks/configure-pod-container/attach-handler-lifecycle-event/ ## e.g: ## postStart: ## exec: ## command: ["/bin/sh", "-c", "echo Hello from the postStart handler > /usr/share/message"] ## preStop: ## exec: ## command: ["/bin/sh","-c","nginx -s quit; while killall -0 nginx; do sleep 1; done"] ## lifecycleHooks: {} ## @param forwarder.initContainers Additional init containers to add to the pods ## For example: ## initContainers: ## - name: your-image-name ## image: your-image ## imagePullPolicy: Always ## initContainers: [] ## @param forwarder.sidecars Add sidecars to forwarder pods ## ## For example: ## sidecars: ## - name: your-image-name ## image: your-image ## imagePullPolicy: Always ## ports: ## - name: portname ## containerPort: 1234 ## sidecars: [] ## @param forwarder.extraVolumes Extra volumes ## Example Use Case: mount systemd journal volume ## - name: systemd ## hostPath: ## path: /run/log/journal/ ## extraVolumes: [] ## @param forwarder.extraVolumeMounts Mount extra volume(s) ## - name: systemd ## mountPath: /run/log/journal/ ## extraVolumeMounts: [] ## Aggregator parameters ## aggregator: ## @param aggregator.enabled Enable Fluentd aggregator statefulset ## enabled: true ## @param aggregator.image.registry Fluentd aggregator image registry override ## @param aggregator.image.repository Fluentd aggregator image repository override ## @param aggregator.image.tag Fluentd aggregator image tag override (immutable tags are recommended) image: registry: "" repository: "" tag: "" ## @param aggregator.replicaCount Number of aggregator pods to deploy in the Stateful Set ## replicaCount: 1 ## K8s Security Context for Aggregator pods ## https://kubernetes.io/docs/tasks/configure-pod-container/security-context/ ## @param aggregator.podSecurityContext.enabled Enable security context for aggregator pods ## @param aggregator.podSecurityContext.runAsUser User ID for aggregator's containers ## @param aggregator.podSecurityContext.runAsGroup Group ID for aggregator's containers ## @param aggregator.podSecurityContext.fsGroup Group ID for aggregator's containers filesystem ## podSecurityContext: enabled: true runAsUser: 1001 runAsGroup: 1001 fsGroup: 1001 ## @param aggregator.hostAliases Add deployment host aliases ## https://kubernetes.io/docs/concepts/services-networking/add-entries-to-pod-etc-hosts-with-host-aliases/ ## hostAliases: [] ## K8s Security Context for Aggregator containers ## https://kubernetes.io/docs/tasks/configure-pod-container/security-context/ ## @param aggregator.containerSecurityContext.enabled Enable security context for the aggregator container ## @param aggregator.containerSecurityContext.privileged Run as privileged ## @param aggregator.containerSecurityContext.allowPrivilegeEscalation Allow Privilege Escalation ## @param aggregator.containerSecurityContext.readOnlyRootFilesystem Require the use of a read only root file system ## @param aggregator.containerSecurityContext.capabilities.drop [array] Drop capabilities for the securityContext ## containerSecurityContext: enabled: true privileged: false allowPrivilegeEscalation: false ## Requires mounting an `extraVolume` of type `emptyDir` into /tmp ## readOnlyRootFilesystem: false capabilities: drop: - ALL ## @param aggregator.terminationGracePeriodSeconds Duration in seconds the pod needs to terminate gracefully ## https://kubernetes.io/docs/concepts/containers/container-lifecycle-hooks/ ## terminationGracePeriodSeconds: 30 ## @param aggregator.configFile Name of the config file that will be used by Fluentd at launch under the `/opt/bitnami/fluentd/conf` directory ## configFile: fluentd.conf ## @param aggregator.configMap Name of the config map that contains the Fluentd configuration files ## configMap: "" ## @param aggregator.configMapFiles [object] Files to be added to be config map. Ignored if `aggregator.configMap` is set ## configMapFiles: fluentd.conf: | # Ignore fluentd own events <match fluent.**> @type null </match> @include fluentd-inputs.conf @include fluentd-output.conf {{- if .Values.metrics.enabled }} @include metrics.conf {{- end }} fluentd-inputs.conf: | # TCP input to receive logs from {{- if .Values.aggregator.port }} <source> @type forward bind 0.0.0.0 port {{ .Values.aggregator.port }} {{- if .Values.tls.enabled }} <transport tls> ca_path /opt/bitnami/fluentd/certs/in_forward/ca.crt cert_path /opt/bitnami/fluentd/certs/in_forward/tls.crt private_key_path /opt/bitnami/fluentd/certs/in_forward/tls.key client_cert_auth true </transport> {{- end }} </source> {{- end }} # HTTP input for the liveness and readiness probes <source> @type http bind 0.0.0.0 port 9880 </source> fluentd-output.conf: | # Throw the healthcheck to the standard output <match fluentd.healthcheck> @type stdout </match> # Send the logs to the standard output <match **> @type stdout </match> metrics.conf: | # Prometheus Exporter Plugin # input plugin that exports metrics <source> @type prometheus port {{ .Values.metrics.service.port }} </source> # input plugin that collects metrics from MonitorAgent <source> @type prometheus_monitor <labels> host ${hostname} </labels> </source> # input plugin that collects metrics for output plugin <source> @type prometheus_output_monitor <labels> host ${hostname} </labels> </source> ## @param aggregator.port Port the Aggregator container will listen for logs. Leave it blank to ignore. ## You can specify other ports in the aggregator.containerPorts parameter ## port: 24224 ## @param aggregator.extraArgs Extra arguments for the Fluentd command line ## ref: https://docs.fluentd.org/deployment/command-line-option ## extraArgs: "" ## @param aggregator.extraEnvVars Extra environment variables to pass to the container ## extraEnv: ## - name: MY_ENV_VAR ## value: my_value ## extraEnvVars: [] ## @param aggregator.extraEnvVarsCM Name of existing ConfigMap containing extra env vars for Fluentd Aggregator nodes ## extraEnvVarsCM: "" ## @param aggregator.extraEnvVarsSecret Name of existing Secret containing extra env vars for Fluentd Aggregator nodes ## extraEnvVarsSecret: "" ## @param aggregator.containerPorts [array] Ports the aggregator containers will listen on ## containerPorts: # - name: my-port # containerPort: 24222 # protocol: TCP - name: http containerPort: 9880 protocol: TCP ## Service parameters ## service: ## @param aggregator.service.type Kubernetes service type (`ClusterIP`, `NodePort`, or `LoadBalancer`) for the aggregators ## type: ClusterIP ## @param aggregator.service.ports [object] Array containing the aggregator service ports ## ports: http: port: 9880 targetPort: http protocol: TCP tcp: port: 24224 targetPort: tcp protocol: TCP ## @param aggregator.service.loadBalancerIP loadBalancerIP if service type is `LoadBalancer` (optional, cloud specific) ## ref: https://kubernetes.io/docs/user-guide/services/#type-loadbalancer ## loadBalancerIP: "" ## @param aggregator.service.loadBalancerSourceRanges Addresses that are allowed when service is LoadBalancer ## https://kubernetes.io/docs/tasks/access-application-cluster/configure-cloud-provider-firewall/#restrict-access-for-loadbalancer-service ## ## loadBalancerSourceRanges: ## - 10.10.10.0/24 loadBalancerSourceRanges: [] ## @param aggregator.service.clusterIP Static clusterIP or None for headless services ## ref: https://kubernetes.io/docs/concepts/services-networking/service/#choosing-your-own-ip-address ## e.g: ## clusterIP: None ## clusterIP: "" ## @param aggregator.service.annotations Provide any additional annotations which may be required ## annotations: {} ## @param aggregator.service.externalTrafficPolicy Fluentd Aggregator service external traffic policy ## ref http://kubernetes.io/docs/tasks/access-application-cluster/create-external-load-balancer/#preserving-the-client-source-ip ## externalTrafficPolicy: Cluster ## @param aggregator.service.sessionAffinity Session Affinity for Kubernetes service, can be "None" or "ClientIP" ## If "ClientIP", consecutive client requests will be directed to the same Pod ## ref: https://kubernetes.io/docs/concepts/services-networking/service/#virtual-ips-and-service-proxies ## sessionAffinity: None ## @param aggregator.service.sessionAffinityConfig Additional settings for the sessionAffinity ## sessionAffinityConfig: ## clientIP: ## timeoutSeconds: 300 ## sessionAffinityConfig: {} ## @param aggregator.service.annotationsHeadless Provide any additional annotations which may be required on headless service ## annotationsHeadless: {} ## Configure the ingress resource that allows you to access the ## Fluentd aggregator. Set up the URL ## ref: https://kubernetes.io/docs/user-guide/ingress/ ## ingress: ## @param aggregator.ingress.enabled Set to true to enable ingress record generation ## enabled: false ## DEPRECATED: Use ingress.annotations instead of ingress.certManager ## certManager: false ## ## @param aggregator.ingress.pathType Ingress Path type. How the path matching is interpreted ## pathType: ImplementationSpecific ## @param aggregator.ingress.apiVersion Override API Version (automatically detected if not set) ## apiVersion: "" ## @param aggregator.ingress.hostname Default host for the ingress resource ## hostname: fluentd.local ## @param aggregator.ingress.path Default path for the ingress resource ## You may need to set this to '/*' in order to use this with ALB ingress controllers. ## path: / ## @param aggregator.ingress.annotations Additional annotations for the Ingress resource. To enable certificate autogeneration, place here your cert-manager annotations. ## For a full list of possible ingress annotations, please see ## ref: https://github.com/kubernetes/ingress-nginx/blob/master/docs/user-guide/nginx-configuration/annotations.md ## Use this parameter to set the required annotations for cert-manager, see ## ref: https://cert-manager.io/docs/usage/ingress/#supported-annotations ## ## e.g: ## annotations: ## kubernetes.io/ingress.class: nginx ## cert-manager.io/cluster-issuer: cluster-issuer-name ## annotations: {} ## @param aggregator.ingress.tls Enable TLS configuration for the hostname defined at ingress.hostname parameter ## TLS certificates will be retrieved from a TLS secret with name: {{- printf "%s-tls" .Values.aggregator.ingress.hostname }} ## You can use the ingress.secrets parameter to create this TLS secret or relay on cert-manager to create it ## tls: false ## @param aggregator.ingress.extraHosts The list of additional hostnames to be covered with this ingress record. ## Most likely the hostname above will be enough, but in the event more hosts are needed, this is an array ## extraHosts: ## - name: fluentd.local ## path: / ## extraHosts: [] ## @param aggregator.ingress.extraPaths Any additional arbitrary paths that may need to be added to the ingress under the main host. ## For example: The ALB ingress controller requires a special rule for handling SSL redirection. ## extraPaths: ## - path: /* ## backend: ## serviceName: ssl-redirect ## servicePort: use-annotation ## extraPaths: [] ## @param aggregator.ingress.extraTls The tls configuration for additional hostnames to be covered with this ingress record. ## see: https://kubernetes.io/docs/concepts/services-networking/ingress/#tls ## extraTls: ## - hosts: ## - fluentd.local ## secretName: fluentd.local-tls ## extraTls: [] ## @param aggregator.ingress.secrets If you're providing your own certificates, please use this to add the certificates as secrets ## key and certificate should start with -----BEGIN CERTIFICATE----- or ## -----BEGIN RSA PRIVATE KEY----- ## ## name should line up with a tlsSecret set further up ## If you're using cert-manager, this is unneeded, as it will create the secret for you if it is not set ## ## It is also possible to create and manage the certificates outside of this helm chart ## Please see README.md for more information ## e.g: ## - name: fluentd.local-tls ## key: ## certificate: ## secrets: [] ## @param aggregator.ingress.ingressClassName IngressClass that will be be used to implement the Ingress (Kubernetes 1.18+) ## This is supported in Kubernetes 1.18+ and required if you have more than one IngressClass marked as the default for your cluster . ## ref: https://kubernetes.io/blog/2020/04/02/improvements-to-the-ingress-api-in-kubernetes-1.18/ ## ingressClassName: "" ## Configure extra options for startup probe ## ref: https://kubernetes.io/docs/tasks/configure-pod-container/configure-liveness-readiness-probes/#configure-probes ## @param aggregator.startupProbe.enabled Enable startupProbe ## @param aggregator.startupProbe.httpGet.path Request path for startupProbe ## @param aggregator.startupProbe.httpGet.port Port for startupProbe ## @param aggregator.startupProbe.initialDelaySeconds Initial delay seconds for startupProbe ## @param aggregator.startupProbe.periodSeconds Period seconds for startupProbe ## @param aggregator.startupProbe.timeoutSeconds Timeout seconds for startupProbe ## @param aggregator.startupProbe.failureThreshold Failure threshold for startupProbe ## @param aggregator.startupProbe.successThreshold Success threshold for startupProbe ## startupProbe: enabled: true httpGet: path: /fluentd.healthcheck?json=%7B%22ping%22%3A+%22pong%22%7D port: http initialDelaySeconds: 60 periodSeconds: 10 timeoutSeconds: 5 failureThreshold: 6 successThreshold: 1 ## Configure extra options for liveness probe ## ref: https://kubernetes.io/docs/tasks/configure-pod-container/configure-liveness-readiness-probes/#configure-probes ## @param aggregator.livenessProbe.enabled Enable livenessProbe ## @param aggregator.livenessProbe.httpGet.path Request path for livenessProbe ## @param aggregator.livenessProbe.httpGet.port Port for livenessProbe ## @param aggregator.livenessProbe.initialDelaySeconds Initial delay seconds for livenessProbe ## @param aggregator.livenessProbe.periodSeconds Period seconds for livenessProbe ## @param aggregator.livenessProbe.timeoutSeconds Timeout seconds for livenessProbe ## @param aggregator.livenessProbe.failureThreshold Failure threshold for livenessProbe ## @param aggregator.livenessProbe.successThreshold Success threshold for livenessProbe ## livenessProbe: enabled: true httpGet: path: /fluentd.healthcheck?json=%7B%22ping%22%3A+%22pong%22%7D port: http initialDelaySeconds: 60 periodSeconds: 10 timeoutSeconds: 5 failureThreshold: 6 successThreshold: 1 ## Configure extra options for readiness probe ## ref: https://kubernetes.io/docs/tasks/configure-pod-container/configure-liveness-readiness-probes/#configure-probes ## @param aggregator.readinessProbe.enabled Enable readinessProbe ## @param aggregator.readinessProbe.httpGet.path Request path for readinessProbe ## @param aggregator.readinessProbe.httpGet.port Port for readinessProbe ## @param aggregator.readinessProbe.initialDelaySeconds Initial delay seconds for readinessProbe ## @param aggregator.readinessProbe.periodSeconds Period seconds for readinessProbe ## @param aggregator.readinessProbe.timeoutSeconds Timeout seconds for readinessProbe ## @param aggregator.readinessProbe.failureThreshold Failure threshold for readinessProbe ## @param aggregator.readinessProbe.successThreshold Success threshold for readinessProbe ## readinessProbe: enabled: true httpGet: path: /fluentd.healthcheck?json=%7B%22ping%22%3A+%22pong%22%7D port: http initialDelaySeconds: 5 periodSeconds: 10 timeoutSeconds: 5 failureThreshold: 6 successThreshold: 1 ## @param aggregator.customStartupProbe Custom liveness probe for the Fluentd Aggregator ## customStartupProbe: {} ## @param aggregator.customLivenessProbe Custom liveness probe for the Fluentd Aggregator ## customLivenessProbe: {} ## @param aggregator.customReadinessProbe Custom rediness probe for the Fluentd Aggregator ## customReadinessProbe: {} ## @param aggregator.updateStrategy.type Set up update strategy. ## ref: https://kubernetes.io/docs/tutorials/stateful-application/basic-stateful-set/#updating-statefulsets ## Example: ## updateStrategy: ## type: RollingUpdate ## rollingUpdate: ## maxSurge: 25% ## maxUnavailable: 25% ## updateStrategy: type: RollingUpdate ## Aggregator containers' resource requests and limits ## ref: https://kubernetes.io/docs/user-guide/compute-resources/ ## We usually recommend not to specify default resources and to leave this as a conscious ## choice for the user. This also increases chances charts run on environments with little ## resources, such as Minikube. If you do want to specify resources, uncomment the following ## lines, adjust them as necessary, and remove the curly braces after 'resources:'. ## @param aggregator.resources.limits The resources limits for the container ## @param aggregator.resources.requests The requested resources for the container ## resources: ## Example: ## limits: ## cpu: 500m ## memory: 1Gi limits: {} ## Examples: ## requests: ## cpu: 300m ## memory: 512Mi requests: {} ## @param aggregator.priorityClassName Fluentd Aggregator pods' priorityClassName ## priorityClassName: "" ## @param aggregator.schedulerName Name of the k8s scheduler (other than default) ## ref: https://kubernetes.io/docs/tasks/administer-cluster/configure-multiple-schedulers/ ## schedulerName: "" ## @param aggregator.topologySpreadConstraints Topology Spread Constraints for pod assignment ## https://kubernetes.io/docs/concepts/workloads/pods/pod-topology-spread-constraints/ ## The value is evaluated as a template ## topologySpreadConstraints: [] ## @param aggregator.podManagementPolicy podManagementPolicy to manage scaling operation of Fluentd Aggregator pods ## ref: https://kubernetes.io/docs/concepts/workloads/controllers/statefulset/#pod-management-policies ## podManagementPolicy: "" ## @param aggregator.podAffinityPreset Aggregator Pod affinity preset. Ignored if `affinity` is set. Allowed values: `soft` or `hard` ## ref: https://kubernetes.io/docs/concepts/scheduling-eviction/assign-pod-node/#inter-pod-affinity-and-anti-affinity ## podAffinityPreset: "" ## @param aggregator.podAntiAffinityPreset Aggregator Pod anti-affinity preset. Ignored if `affinity` is set. Allowed values: `soft` or `hard` ## Ref: https://kubernetes.io/docs/concepts/scheduling-eviction/assign-pod-node/#inter-pod-affinity-and-anti-affinity ## podAntiAffinityPreset: soft ## Node affinity preset ## Ref: https://kubernetes.io/docs/concepts/scheduling-eviction/assign-pod-node/#node-affinity ## nodeAffinityPreset: ## @param aggregator.nodeAffinityPreset.type Aggregator Node affinity preset type. Ignored if `affinity` is set. Allowed values: `soft` or `hard` ## type: "" ## @param aggregator.nodeAffinityPreset.key Aggregator Node label key to match Ignored if `affinity` is set. ## key: "" ## @param aggregator.nodeAffinityPreset.values Aggregator Node label values to match. Ignored if `affinity` is set. ## E.g. ## values: ## - e2e-az1 ## - e2e-az2 ## values: [] ## @param aggregator.affinity Aggregator Affinity for pod assignment ## Ref: https://kubernetes.io/docs/concepts/configuration/assign-pod-node/#affinity-and-anti-affinity ## Note: podAffinityPreset, podAntiAffinityPreset, and nodeAffinityPreset will be ignored when it's set ## affinity: {} ## @param aggregator.nodeSelector Aggregator Node labels for pod assignment ## Ref: https://kubernetes.io/docs/user-guide/node-selection/ ## nodeSelector: {} ## @param aggregator.tolerations Aggregator Tolerations for pod assignment ## Ref: https://kubernetes.io/docs/concepts/configuration/taint-and-toleration/ ## tolerations: [] ## @param aggregator.podAnnotations Pod annotations ## ref: https://kubernetes.io/docs/concepts/overview/working-with-objects/annotations/ ## podAnnotations: {} ## @param aggregator.podLabels Extra labels to add to Pod ## podLabels: {} ## Pods Service Account ## ref: https://kubernetes.io/docs/tasks/configure-pod-container/configure-service-account/ ## serviceAccount: ## @param aggregator.serviceAccount.create Specify whether a ServiceAccount should be created ## create: false ## @param aggregator.serviceAccount.name The name of the ServiceAccount to create ## If not set and create is true, a name is generated using the common.names.fullname template name: "" ## @param aggregator.serviceAccount.annotations Additional Service Account annotations (evaluated as a template) ## annotations: {} ## @param aggregator.serviceAccount.automountServiceAccountToken Automount service account token for the server service account ## automountServiceAccountToken: true ## Autoscaling parameters ## This is not recommended in a forwarder+aggregator architecture ## @param aggregator.autoscaling.enabled Create an Horizontal Pod Autoscaler ## @param aggregator.autoscaling.minReplicas Minimum number of replicas for the HPA ## @param aggregator.autoscaling.maxReplicas Maximum number of replicas for the HPA ## @param aggregator.autoscaling.metrics [array] Metrics for the HPA to manage the scaling ## autoscaling: enabled: false minReplicas: 2 maxReplicas: 5 metrics: - type: Resource resource: name: cpu target: type: Utilization averageUtilization: 60 - type: Resource resource: name: memory target: type: Utilization averageUtilization: 60 ## Persist data to a persistent volume ## persistence: ## @param aggregator.persistence.enabled Enable persistence volume for the aggregator ## enabled: false ## @param aggregator.persistence.storageClass Persistent Volume storage class ## If defined, storageClassName: <storageClass> ## If set to "-", storageClassName: "", which disables dynamic provisioning ## If undefined (the default) or set to null, no storageClassName spec is ## set, choosing the default provisioner. (gp2 on AWS, standard on ## GKE, AWS & OpenStack) ## storageClass: "" ## @param aggregator.persistence.accessModes Persistent Volume access modes ## accessModes: - ReadWriteOnce ## @param aggregator.persistence.size Persistent Volume size ## size: 10Gi ## @param aggregator.persistence.selector Selector to match an existing Persistent Volume (this value is evaluated as a template) ## selector: ## matchLabels: ## app: my-app selector: {} ## @param aggregator.persistence.annotations Persistent Volume Claim annotations ## annotations: {} ## @param aggregator.command Override default container command (useful when using custom images) ## command: [] ## @param aggregator.args Override default container args (useful when using custom images) ## args: [] ## @param aggregator.lifecycleHooks Additional lifecycles to add to the pods ## ref: https://kubernetes.io/docs/tasks/configure-pod-container/attach-handler-lifecycle-event/ ## e.g: ## postStart: ## exec: ## command: ["/bin/sh", "-c", "echo Hello from the postStart handler > /usr/share/message"] ## preStop: ## exec: ## command: ["/bin/sh","-c","nginx -s quit; while killall -0 nginx; do sleep 1; done"] ## lifecycleHooks: {} ## @param aggregator.initContainers Add init containers to aggregator pods ## Example ## ## initContainers: ## - name: do-something ## image: busybox ## command: ['do', 'something'] ## initContainers: [] ## @param aggregator.sidecars Add sidecars to aggregator pods ## ## For example: ## sidecars: ## - name: your-image-name ## image: your-image ## imagePullPolicy: Always ## ports: ## - name: portname ## containerPort: 1234 ## sidecars: [] ## @param aggregator.extraVolumes Extra volumes ## Example Use Case: mount an emptyDir into /tmp to support running with readOnlyRootFileSystem ## - name: tmpDir ## emptyDir: {} ## extraVolumes: [] ## @param aggregator.extraVolumeMounts Mount extra volume(s) ## - name: tmpDir ## mountPath: /tmp ## extraVolumeMounts: [] ## @param aggregator.extraVolumeClaimTemplates Optionally specify extra list of additional volume claim templates for the Fluentd Aggregator pods in StatefulSet ## extraVolumeClaimTemplates: [] ## Prometheus Exporter / Metrics ## metrics: ## @param metrics.enabled Enable the export of Prometheus metrics ## enabled: false ## Prometheus Exporter service parameters ## service: ## @param metrics.service.type Prometheus metrics service type ## type: ClusterIP ## @param metrics.service.port Prometheus metrics service port ## port: 24231 ## @param metrics.service.loadBalancerIP Load Balancer IP if the Prometheus metrics server type is `LoadBalancer` ## ref: https://kubernetes.io/docs/user-guide/services/#type-loadbalancer ## loadBalancerIP: "" ## @param metrics.service.clusterIP Prometheus metrics service Cluster IP ## e.g.: ## clusterIP: None ## clusterIP: "" ## @param metrics.service.loadBalancerSourceRanges Prometheus metrics service Load Balancer sources ## ref: https://kubernetes.io/docs/tasks/access-application-cluster/configure-cloud-provider-firewall/#restrict-access-for-loadbalancer-service ## e.g: ## loadBalancerSourceRanges: ## - 10.10.10.0/24 ## loadBalancerSourceRanges: [] ## @param metrics.service.externalTrafficPolicy Prometheus metrics service external traffic policy ## ref http://kubernetes.io/docs/tasks/access-application-cluster/create-external-load-balancer/#preserving-the-client-source-ip ## externalTrafficPolicy: Cluster ## @param metrics.service.annotations [object] Annotations for the Prometheus Exporter service service ## annotations: prometheus.io/scrape: "true" prometheus.io/port: "24231" prometheus.io/path: "/metrics" ## @param metrics.service.sessionAffinity Session Affinity for Kubernetes service, can be "None" or "ClientIP" ## If "ClientIP", consecutive client requests will be directed to the same Pod ## ref: https://kubernetes.io/docs/concepts/services-networking/service/#virtual-ips-and-service-proxies ## sessionAffinity: None ## @param metrics.service.sessionAffinityConfig Additional settings for the sessionAffinity ## sessionAffinityConfig: ## clientIP: ## timeoutSeconds: 300 ## sessionAffinityConfig: {} ## Prometheus Operator ServiceMonitor configuration ## serviceMonitor: ## @param metrics.serviceMonitor.enabled if `true`, creates a Prometheus Operator ServiceMonitor (also requires `metrics.enabled` to be `true`) ## enabled: false ## @param metrics.serviceMonitor.namespace Namespace in which Prometheus is running ## namespace: "" ## @param metrics.serviceMonitor.interval Interval at which metrics should be scraped. ## ref: https://github.com/coreos/prometheus-operator/blob/master/Documentation/api.md#endpoint ## e.g: ## interval: 10s ## interval: "" ## @param metrics.serviceMonitor.scrapeTimeout Timeout after which the scrape is ended ## ref: https://github.com/coreos/prometheus-operator/blob/master/Documentation/api.md#endpoint ## e.g: ## scrapeTimeout: 10s ## scrapeTimeout: "" ## @param metrics.serviceMonitor.jobLabel The name of the label on the target service to use as the job name in prometheus. ## jobLabel: "" ## @param metrics.serviceMonitor.relabelings RelabelConfigs to apply to samples before scraping ## ref: https://github.com/coreos/prometheus-operator/blob/master/Documentation/api.md#relabelconfig ## relabelings: [] ## @param metrics.serviceMonitor.metricRelabelings MetricRelabelConfigs to apply to samples before ingestion ## ref: https://github.com/coreos/prometheus-operator/blob/master/Documentation/api.md#relabelconfig ## metricRelabelings: [] ## @param metrics.serviceMonitor.selector Prometheus instance selector labels ## ref: https://github.com/bitnami/charts/tree/master/bitnami/prometheus-operator#prometheus-configuration ## e.g: ## selector: ## prometheus: my-prometheus ## selector: {} ## @param metrics.serviceMonitor.labels ServiceMonitor extra labels ## labels: {} ## @param metrics.serviceMonitor.annotations ServiceMonitor annotations ## annotations: {} ## @param metrics.serviceMonitor.honorLabels honorLabels chooses the metric's labels on collisions with target labels ## honorLabels: false ## Enable internal SSL/TLS encryption ## tls: ## @param tls.enabled Enable TLS/SSL encrytion for internal communications ## enabled: false ## @param tls.autoGenerated Generate automatically self-signed TLS certificates. ## autoGenerated: false ## @param tls.forwarder.existingSecret Name of the existing secret containing the TLS certificates for the Fluentd forwarder ## forwarder: existingSecret: "" ## @param tls.aggregator.existingSecret Name of the existing secret containing the TLS certificates for the Fluentd aggregator ## aggregator: existingSecret: ""
40.898936
200
0.71005
166a8f0a3aa1540b0bafb4f1c318f00437714fe1
15,367
yaml
YAML
bitnami/haproxy/values.yaml
00arthur00/charts
502aa1e64541669b732a4eda896e5937847b6c3c
[ "Apache-2.0" ]
null
null
null
bitnami/haproxy/values.yaml
00arthur00/charts
502aa1e64541669b732a4eda896e5937847b6c3c
[ "Apache-2.0" ]
2
2022-01-26T01:14:30.000Z
2022-01-26T07:03:39.000Z
bitnami/haproxy/values.yaml
00arthur00/charts
502aa1e64541669b732a4eda896e5937847b6c3c
[ "Apache-2.0" ]
null
null
null
## @section Global parameters ## Global Docker image parameters ## Please, note that this will override the image parameters, including dependencies, configured to use the global value ## Current available global Docker image parameters: imageRegistry, imagePullSecrets and storageClass ## ## @param global.imageRegistry Global Docker image registry ## @param global.imagePullSecrets Global Docker registry secret names as an array ## @param global.storageClass Global StorageClass for Persistent Volume(s) ## global: imageRegistry: "" ## E.g. ## imagePullSecrets: ## - myRegistryKeySecretName ## imagePullSecrets: [] storageClass: "" ## @section Common parameters ## ## @param kubeVersion Override Kubernetes version ## kubeVersion: "" ## @param nameOverride String to partially override common.names.fullname ## nameOverride: "" ## @param fullnameOverride String to fully override common.names.fullname ## fullnameOverride: "" ## @param commonLabels Labels to add to all deployed objects ## commonLabels: {} ## @param commonAnnotations Annotations to add to all deployed objects ## commonAnnotations: {} ## @param clusterDomain Kubernetes cluster domain name ## clusterDomain: cluster.local ## @param extraDeploy Array of extra objects to deploy with the release ## extraDeploy: [] ## Enable diagnostic mode in the deployment ## diagnosticMode: ## @param diagnosticMode.enabled Enable diagnostic mode (all probes will be disabled and the command will be overridden) ## enabled: false ## @param diagnosticMode.command Command to override all containers in the deployment ## command: - sleep ## @param diagnosticMode.args Args to override all containers in the deployment ## args: - infinity ## @section Traffic Exposure Parameters ## ## haproxy service parameters ## service: ## @param service.type haproxy service type ## type: LoadBalancer ## @param service.ports [array] List of haproxy service ports ## ports: - name: http protocol: TCP port: 80 targetPort: http ## @param service.clusterIP haproxy service Cluster IP ## e.g.: ## clusterIP: None ## clusterIP: "" ## @param service.loadBalancerIP haproxy service Load Balancer IP ## ref: https://kubernetes.io/docs/concepts/services-networking/service/#type-loadbalancer ## loadBalancerIP: "" ## @param service.loadBalancerSourceRanges haproxy service Load Balancer sources ## ref: https://kubernetes.io/docs/tasks/access-application-cluster/configure-cloud-provider-firewall/#restrict-access-for-loadbalancer-service ## e.g: ## loadBalancerSourceRanges: ## - 10.10.10.0/24 ## loadBalancerSourceRanges: [] ## @param service.externalTrafficPolicy haproxy service external traffic policy ## ref https://kubernetes.io/docs/tasks/access-application-cluster/create-external-load-balancer/#preserving-the-client-source-ip ## externalTrafficPolicy: Cluster ## @param service.annotations Additional custom annotations for haproxy service ## annotations: {} ## @param service.sessionAffinity Session Affinity for Kubernetes service, can be "None" or "ClientIP" ## If "ClientIP", consecutive client requests will be directed to the same mongos Pod ## ref: https://kubernetes.io/docs/concepts/services-networking/service/#virtual-ips-and-service-proxies ## sessionAffinity: None ## @param service.sessionAffinityConfig Additional settings for the sessionAffinity ## sessionAffinityConfig: ## clientIP: ## timeoutSeconds: 300 ## sessionAffinityConfig: {} ## @param service.labels Additional custom labels for haproxy service ## labels: {} ## @section HAProxy Parameters ## ## @param image.registry HAProxy image registry ## @param image.repository HAProxy image repository ## @param image.tag HAProxy image tag (immutable tags are recommended) ## @param image.pullPolicy HAProxy image pull policy ## @param image.pullSecrets HAProxy image pull secrets ## image: registry: docker.io repository: bitnami/haproxy tag: 2.5.5-debian-10-r0 ## Specify a imagePullPolicy ## Defaults to 'Always' if image tag is 'latest', else set to 'IfNotPresent' ## ref: https://kubernetes.io/docs/user-guide/images/#pre-pulling-images ## pullPolicy: IfNotPresent ## Optionally specify an array of imagePullSecrets. ## Secrets must be manually created in the namespace. ## ref: https://kubernetes.io/docs/tasks/configure-pod-container/pull-image-private-registry/ ## e.g: ## pullSecrets: ## - myRegistryKeySecretName ## pullSecrets: [] ## @param replicaCount Number of haproxy replicas to deploy ## replicaCount: 1 ## Configure extra options for haproxy containers' liveness and readiness probes ## ref: https://kubernetes.io/docs/tasks/configure-pod-container/configure-liveness-readiness-probes/#configure-probes ## @param startupProbe.enabled Enable startupProbe on haproxy nodes ## @param startupProbe.initialDelaySeconds Initial delay seconds for startupProbe ## @param startupProbe.periodSeconds Period seconds for startupProbe ## @param startupProbe.timeoutSeconds Timeout seconds for startupProbe ## @param startupProbe.failureThreshold Failure threshold for startupProbe ## @param startupProbe.successThreshold Success threshold for startupProbe ## startupProbe: enabled: false failureThreshold: 5 initialDelaySeconds: 15 periodSeconds: 10 successThreshold: 1 timeoutSeconds: 5 ## @param livenessProbe.enabled Enable livenessProbe on haproxy nodes ## @param livenessProbe.initialDelaySeconds Initial delay seconds for livenessProbe ## @param livenessProbe.periodSeconds Period seconds for livenessProbe ## @param livenessProbe.timeoutSeconds Timeout seconds for livenessProbe ## @param livenessProbe.failureThreshold Failure threshold for livenessProbe ## @param livenessProbe.successThreshold Success threshold for livenessProbe ## livenessProbe: enabled: true failureThreshold: 5 initialDelaySeconds: 15 periodSeconds: 10 successThreshold: 1 timeoutSeconds: 5 ## @param readinessProbe.enabled Enable readinessProbe on haproxy nodes ## @param readinessProbe.initialDelaySeconds Initial delay seconds for readinessProbe ## @param readinessProbe.periodSeconds Period seconds for readinessProbe ## @param readinessProbe.timeoutSeconds Timeout seconds for readinessProbe ## @param readinessProbe.failureThreshold Failure threshold for readinessProbe ## @param readinessProbe.successThreshold Success threshold for readinessProbe ## readinessProbe: enabled: true failureThreshold: 5 initialDelaySeconds: 15 periodSeconds: 10 successThreshold: 1 timeoutSeconds: 5 ## @param customStartupProbe Custom startupProbe that overrides the default one ## customStartupProbe: {} ## @param customLivenessProbe Custom livenessProbe that overrides the default one ## customLivenessProbe: {} ## @param customReadinessProbe Custom readinessProbe that overrides the default one ## customReadinessProbe: {} ## haproxy resource requests and limits ## ref: https://kubernetes.io/docs/user-guide/compute-resources/ ## @param resources.limits The resources limits for the haproxy containers ## @param resources.requests The requested resources for the haproxy containers ## resources: limits: {} requests: {} ## Configure Pods Security Context ## ref: https://kubernetes.io/docs/tasks/configure-pod-container/security-context/#set-the-security-context-for-a-pod ## @param podSecurityContext.enabled Enabled haproxy pods' Security Context ## @param podSecurityContext.fsGroup Set haproxy pod's Security Context fsGroup ## podSecurityContext: enabled: true fsGroup: 1001 ## Configure Container Security Context ## ref: https://kubernetes.io/docs/tasks/configure-pod-container/security-context/#set-the-security-context-for-a-pod ## @param containerSecurityContext.enabled Enabled haproxy containers' Security Context ## @param containerSecurityContext.runAsUser Set haproxy containers' Security Context runAsUser ## @param containerSecurityContext.runAsNonRoot Set haproxy container's Security Context runAsNonRoot ## containerSecurityContext: enabled: true runAsUser: 1001 runAsNonRoot: true ## HAProxy Pod Disruption Budget configuration ## ref: https://kubernetes.io/docs/tasks/run-application/configure-pdb/ ## @param pdb.create Enable a Pod Disruption Budget creation ## @param pdb.minAvailable Minimum number/percentage of pods that should remain scheduled ## @param pdb.maxUnavailable Maximum number/percentage of pods that may be made unavailable ## pdb: create: false minAvailable: 1 maxUnavailable: "" ## HAProxy Autoscaling configuration ## ref: https://kubernetes.io/docs/tasks/run-application/horizontal-pod-autoscale/ ## @param autoscaling.enabled Enable Horizontal POD autoscaling for HAProxy ## @param autoscaling.minReplicas Minimum number of HAProxy replicas ## @param autoscaling.maxReplicas Maximum number of HAProxy replicas ## @param autoscaling.targetCPU Target CPU utilization percentage ## @param autoscaling.targetMemory Target Memory utilization percentage ## autoscaling: enabled: false minReplicas: 1 maxReplicas: 11 targetCPU: 50 targetMemory: 50 ## @param command Override default container command (useful when using custom images) ## command: [] ## @param args Override default container args (useful when using custom images) ## args: [] ## @param hostAliases haproxy pods host aliases ## https://kubernetes.io/docs/concepts/services-networking/add-entries-to-pod-etc-hosts-with-host-aliases/ ## hostAliases: [] ## @param podLabels Extra labels for haproxy pods ## ref: https://kubernetes.io/docs/concepts/overview/working-with-objects/labels/ ## podLabels: {} ## @param podAnnotations Annotations for haproxy pods ## ref: https://kubernetes.io/docs/concepts/overview/working-with-objects/annotations/ ## podAnnotations: {} ## @param podAffinityPreset Pod affinity preset. Ignored if `affinity` is set. Allowed values: `soft` or `hard` ## ref: https://kubernetes.io/docs/concepts/scheduling-eviction/assign-pod-node/#inter-pod-affinity-and-anti-affinity ## podAffinityPreset: "" ## @param podAntiAffinityPreset Pod anti-affinity preset. Ignored if `affinity` is set. Allowed values: `soft` or `hard` ## ref: https://kubernetes.io/docs/concepts/scheduling-eviction/assign-pod-node/#inter-pod-affinity-and-anti-affinity ## podAntiAffinityPreset: soft ## Node affinity preset ## ref: https://kubernetes.io/docs/concepts/scheduling-eviction/assign-pod-node/#node-affinity ## nodeAffinityPreset: ## @param nodeAffinityPreset.type Node affinity preset type. Ignored if `affinity` is set. Allowed values: `soft` or `hard` ## type: "" ## @param nodeAffinityPreset.key Node label key to match. Ignored if `affinity` is set ## key: "" ## @param nodeAffinityPreset.values Node label values to match. Ignored if `affinity` is set ## E.g. ## values: ## - e2e-az1 ## - e2e-az2 ## values: [] ## @param configuration [string] haproxy configuration ## Taken from haproxytech/haproxy chart: https://github.com/haproxytech/helm-charts/tree/main/haproxy ## configuration: | global log stdout format raw local0 maxconn 1024 defaults log global timeout client 60s timeout connect 60s timeout server 60s frontend fe_main bind :8080 default_backend be_main backend be_main server web1 10.0.0.1:8080 check ## @param containerPorts [array] List of container ports to enable in the haproxy container ## containerPorts: - name: http containerPort: 8080 ## @param existingConfigmap configmap with HAProxy configuration ## existingConfigmap: "" ## @param affinity Affinity for haproxy pods assignment ## ref: https://kubernetes.io/docs/concepts/configuration/assign-pod-node/#affinity-and-anti-affinity ## NOTE: `podAffinityPreset`, `podAntiAffinityPreset`, and `nodeAffinityPreset` will be ignored when it's set ## affinity: {} ## @param nodeSelector Node labels for haproxy pods assignment ## ref: https://kubernetes.io/docs/user-guide/node-selection/ ## nodeSelector: {} ## @param tolerations Tolerations for haproxy pods assignment ## ref: https://kubernetes.io/docs/concepts/configuration/taint-and-toleration/ ## tolerations: [] ## @param schedulerName Name of the k8s scheduler (other than default) ## ref: https://kubernetes.io/docs/tasks/administer-cluster/configure-multiple-schedulers/ ## schedulerName: "" ## @param topologySpreadConstraints Topology Spread Constraints for pod assignment ## https://kubernetes.io/docs/concepts/workloads/pods/pod-topology-spread-constraints/ ## The value is evaluated as a template ## topologySpreadConstraints: [] ## @param updateStrategy.type haproxy statefulset strategy type ## ref: https://kubernetes.io/docs/concepts/workloads/controllers/statefulset/#update-strategies ## updateStrategy: ## StrategyType ## Can be set to RollingUpdate or OnDelete ## type: RollingUpdate ## @param priorityClassName haproxy pods' priorityClassName ## priorityClassName: "" ## @param lifecycleHooks for the haproxy container(s) to automate configuration before or after startup ## lifecycleHooks: {} ## @param extraEnvVars Array with extra environment variables to add to haproxy nodes ## e.g: ## extraEnvVars: ## - name: FOO ## value: "bar" ## extraEnvVars: [] ## @param extraEnvVarsCM Name of existing ConfigMap containing extra env vars for haproxy nodes ## extraEnvVarsCM: "" ## @param extraEnvVarsSecret Name of existing Secret containing extra env vars for haproxy nodes ## extraEnvVarsSecret: "" ## @param extraVolumes Optionally specify extra list of additional volumes for the haproxy pod(s) ## extraVolumes: [] ## @param extraVolumeMounts Optionally specify extra list of additional volumeMounts for the haproxy container(s) ## extraVolumeMounts: [] ## @param sidecars Add additional sidecar containers to the haproxy pod(s) ## e.g: ## sidecars: ## - name: your-image-name ## image: your-image ## imagePullPolicy: Always ## ports: ## - name: portname ## containerPort: 1234 ## sidecars: [] ## @param initContainers Add additional init containers to the haproxy pod(s) ## ref: https://kubernetes.io/docs/concepts/workloads/pods/init-containers/ ## e.g: ## initContainers: ## - name: your-image-name ## image: your-image ## imagePullPolicy: Always ## command: ['sh', '-c', 'echo "hello world"'] ## initContainers: [] ## @section Other Parameters ## ## ServiceAccount configuration ## ref: https://kubernetes.io/docs/tasks/configure-pod-container/configure-service-account/ ## @param serviceAccount.create Specifies whether a ServiceAccount should be created ## @param serviceAccount.name Name of the service account to use. If not set and create is true, a name is generated using the fullname template. ## @param serviceAccount.automountServiceAccountToken Automount service account token for the server service account ## @param serviceAccount.annotations Annotations for service account. Evaluated as a template. Only used if `create` is `true`. ## serviceAccount: ## @param serviceAccount.create Specifies whether a ServiceAccount should be created ## create: true ## @param serviceAccount.name The name of the ServiceAccount to use. ## If not set and create is true, a name is generated using the common.names.fullname template ## name: "" automountServiceAccountToken: true annotations: {}
36.851319
145
0.764495
64ab6c9d90fe274bc4f6705f7e56a57add224697
890
yaml
YAML
bitnami/contour/Chart.yaml
00arthur00/charts
502aa1e64541669b732a4eda896e5937847b6c3c
[ "Apache-2.0" ]
null
null
null
bitnami/contour/Chart.yaml
00arthur00/charts
502aa1e64541669b732a4eda896e5937847b6c3c
[ "Apache-2.0" ]
2
2022-01-26T01:14:30.000Z
2022-01-26T07:03:39.000Z
bitnami/contour/Chart.yaml
00arthur00/charts
502aa1e64541669b732a4eda896e5937847b6c3c
[ "Apache-2.0" ]
null
null
null
annotations: category: Infrastructure apiVersion: v2 appVersion: 1.20.1 dependencies: - name: common repository: https://charts.bitnami.com/bitnami tags: - bitnami-common version: 1.x.x description: Contour is an open source Kubernetes ingress controller that works by deploying the Envoy proxy as a reverse proxy and load balancer. engine: gotpl home: https://github.com/bitnami/charts/tree/master/bitnami/contour icon: https://bitnami.com/assets/stacks/contour/img/contour-stack-220x234.png keywords: - ingress - envoy - contour maintainers: - name: cellebyte url: https://github.com/Cellebyte - email: [email protected] name: Bitnami name: contour sources: - https://github.com/projectcontour/contour - https://github.com/envoyproxy/envoy - https://github.com/bitnami/bitnami-docker-contour - https://projectcontour.io version: 7.4.3
28.709677
146
0.746067
d9bd9cdac66ecc225640442ba037bdcb0bc9831c
84,530
yaml
YAML
bitnami/kubeapps/values.yaml
00arthur00/charts
502aa1e64541669b732a4eda896e5937847b6c3c
[ "Apache-2.0" ]
null
null
null
bitnami/kubeapps/values.yaml
00arthur00/charts
502aa1e64541669b732a4eda896e5937847b6c3c
[ "Apache-2.0" ]
2
2022-01-26T01:14:30.000Z
2022-01-26T07:03:39.000Z
bitnami/kubeapps/values.yaml
00arthur00/charts
502aa1e64541669b732a4eda896e5937847b6c3c
[ "Apache-2.0" ]
null
null
null
## @section Global parameters ## Global Docker image parameters ## Please, note that this will override the image parameters, including dependencies, configured to use the global value ## Current available global Docker image parameters: imageRegistry, imagePullSecrets and storageClass ## @param global.imageRegistry Global Docker image registry ## @param global.imagePullSecrets Global Docker registry secret names as an array ## @param global.storageClass Global StorageClass for Persistent Volume(s) ## global: imageRegistry: "" ## E.g. ## imagePullSecrets: ## - myRegistryKeySecretName ## imagePullSecrets: [] storageClass: "" ## @section Common parameters ## @param kubeVersion Override Kubernetes version ## kubeVersion: "" ## @param nameOverride String to partially override common.names.fullname ## nameOverride: "" ## @param fullnameOverride String to fully override common.names.fullname ## fullnameOverride: "" ## @param commonLabels Labels to add to all deployed objects ## commonLabels: {} ## @param commonAnnotations Annotations to add to all deployed objects ## commonAnnotations: {} ## @param extraDeploy Array of extra objects to deploy with the release ## extraDeploy: [] ## @param enableIPv6 Enable IPv6 configuration ## enableIPv6: false ## @section Traffic Exposure Parameters ## Configure the ingress resource that allows you to access the Kubeapps installation ## ref: https://kubernetes.io/docs/concepts/services-networking/ingress/ ## ingress: ## @param ingress.enabled Enable ingress record generation for Kubeapps ## enabled: false ## @param ingress.apiVersion Force Ingress API version (automatically detected if not set) ## apiVersion: "" ## @param ingress.hostname Default host for the ingress record ## hostname: kubeapps.local ## @param ingress.path Default path for the ingress record ## NOTE: You may need to set this to '/*' in order to use this with ALB ingress controllers ## path: / ## @param ingress.pathType Ingress path type ## pathType: ImplementationSpecific ## @param ingress.annotations [object] Additional annotations for the Ingress resource. To enable certificate autogeneration, place here your cert-manager annotations. ## For a full list of possible ingress annotations, please see ## ref: https://github.com/kubernetes/ingress-nginx/blob/main/docs/user-guide/nginx-configuration/annotations.md ## Use this parameter to set the required annotations for cert-manager, see ## ref: https://cert-manager.io/docs/usage/ingress/#supported-annotations ## ## e.g: ## annotations: ## kubernetes.io/ingress.class: nginx ## cert-manager.io/cluster-issuer: cluster-issuer-name ## annotations: nginx.ingress.kubernetes.io/proxy-read-timeout: "600" ## @param ingress.tls Enable TLS configuration for the host defined at `ingress.hostname` parameter ## TLS certificates will be retrieved from a TLS secret with name: `{{- printf "%s-tls" .Values.ingress.hostname }}` ## You can: ## - Use the `ingress.secrets` parameter to create this TLS secret ## - Relay on cert-manager to create it by setting the corresponding annotations ## - Relay on Helm to create self-signed certificates by setting `ingress.selfSigned=true` ## tls: false ## DEPRECATED: Use ingress.annotations instead of ingress.certManager ## certManager: {} ## ## @param ingress.selfSigned Create a TLS secret for this ingress record using self-signed certificates generated by Helm ## selfSigned: false ## @param ingress.extraHosts An array with additional hostname(s) to be covered with the ingress record ## e.g: ## extraHosts: ## - name: kubeapps.local ## path: / ## extraHosts: [] ## @param ingress.extraPaths An array with additional arbitrary paths that may need to be added to the ingress under the main host ## e.g: ## extraPaths: ## - path: /* ## backend: ## serviceName: ssl-redirect ## servicePort: use-annotation ## extraPaths: [] ## @param ingress.extraTls TLS configuration for additional hostname(s) to be covered with this ingress record ## ref: https://kubernetes.io/docs/concepts/services-networking/ingress/#tls ## e.g: ## extraTls: ## - hosts: ## - kubeapps.local ## secretName: kubeapps.local-tls ## extraTls: [] ## @param ingress.secrets Custom TLS certificates as secrets ## NOTE: 'key' and 'certificate' are expected in PEM format ## NOTE: 'name' should line up with a 'secretName' set further up ## If it is not set and you're using cert-manager, this is unneeded, as it will create a secret for you with valid certificates ## If it is not set and you're NOT using cert-manager either, self-signed certificates will be created valid for 365 days ## It is also possible to create and manage the certificates outside of this helm chart ## Please see README.md for more information ## e.g: ## secrets: ## - name: kubeapps.local-tls ## key: |- ## -----BEGIN RSA PRIVATE KEY----- ## ... ## -----END RSA PRIVATE KEY----- ## certificate: |- ## -----BEGIN CERTIFICATE----- ## ... ## -----END CERTIFICATE----- ## secrets: [] ## @section Kubeapps packaging options ## Note: the helm and flux plugins are mutually exclusive, you can only ## enable one or the other since they both operate on Helm release objects. ## Enabling carvel or flux does *not* install the required related Carvel or ## Flux controllers on your cluster. Please read the documentation for running ## Kubeapps with Carvel or Flux support. packaging: ## Default helm packaging ## @param packaging.helm.enabled Enable the standard Helm packaging. helm: enabled: true ## Carvel packaging ## @param packaging.carvel.enabled Enable support for the Carvel (kapp-controller) packaging. carvel: enabled: false ## Flux (v2) packaging ## @param packaging.flux.enabled Enable support for Flux (v2) packaging. flux: enabled: false ## @section Frontend parameters ## Frontend parameters ## frontend: ## Bitnami NGINX image ## ref: https://hub.docker.com/r/bitnami/nginx/tags/ ## @param frontend.image.registry NGINX image registry ## @param frontend.image.repository NGINX image repository ## @param frontend.image.tag NGINX image tag (immutable tags are recommended) ## @param frontend.image.pullPolicy NGINX image pull policy ## @param frontend.image.pullSecrets NGINX image pull secrets ## @param frontend.image.debug Enable image debug mode ## image: registry: docker.io repository: bitnami/nginx tag: 1.21.6-debian-10-r47 ## Specify a imagePullPolicy ## Defaults to 'Always' if image tag is 'latest', else set to 'IfNotPresent' ## ref: https://kubernetes.io/docs/user-guide/images/#pre-pulling-images ## pullPolicy: IfNotPresent ## Optionally specify an array of imagePullSecrets. ## Secrets must be manually created in the namespace. ## ref: https://kubernetes.io/docs/tasks/configure-pod-container/pull-image-private-registry/ ## e.g: ## pullSecrets: ## - myRegistryKeySecretName ## pullSecrets: [] ## Enable debug mode ## debug: false ## @param frontend.proxypassAccessTokenAsBearer Use access_token as the Bearer when talking to the k8s api server ## NOTE: Some K8s distributions such as GKE requires it ## proxypassAccessTokenAsBearer: false ## @param frontend.proxypassExtraSetHeader Set an additional proxy header for all requests proxied via NGINX ## Authorization header(s) set in this way will be included with the request from kubeops to the k8s service API URL. ## ref: https://github.com/kubeapps/kubeapps/blob/7e31d0e7241f826aa365856c134cf901d40890e7/pkg/http-handler/http-handler.go#L247 ## e.g: ## proxypassExtraSetHeader: Authorization "Bearer $cookie_sessionid"; ## proxypassExtraSetHeader: "" ## @param frontend.largeClientHeaderBuffers Set large_client_header_buffers in NGINX config ## NOTE: Can be required when using OIDC or LDAP due to large cookies ## largeClientHeaderBuffers: "4 32k" ## @param frontend.replicaCount Number of frontend replicas to deploy ## replicaCount: 2 ## Frontend containers' resource requests and limits ## ref: https://kubernetes.io/docs/user-guide/compute-resources/ ## @param frontend.resources.limits.cpu The CPU limits for the NGINX container ## @param frontend.resources.limits.memory The memory limits for the NGINX container ## @param frontend.resources.requests.cpu The requested CPU for the NGINX container ## @param frontend.resources.requests.memory The requested memory for the NGINX container ## resources: limits: cpu: 250m memory: 128Mi requests: cpu: 25m memory: 32Mi ## @param frontend.extraEnvVars Array with extra environment variables to add to the NGINX container ## e.g: ## extraEnvVars: ## - name: FOO ## value: "bar" ## extraEnvVars: [] ## @param frontend.extraEnvVarsCM Name of existing ConfigMap containing extra env vars for the NGINX container ## extraEnvVarsCM: "" ## @param frontend.extraEnvVarsSecret Name of existing Secret containing extra env vars for the NGINX container ## extraEnvVarsSecret: "" ## @param frontend.containerPort NGINX HTTP container port ## containerPort: 8080 ## Configure Pods Security Context ## ref: https://kubernetes.io/docs/tasks/configure-pod-container/security-context/#set-the-security-context-for-a-pod ## @param frontend.podSecurityContext.enabled Enabled frontend pods' Security Context ## @param frontend.podSecurityContext.fsGroup Set frontend pod's Security Context fsGroup ## podSecurityContext: enabled: true fsGroup: 1001 ## Configure Container Security Context (only main container) ## ref: https://kubernetes.io/docs/tasks/configure-pod-container/security-context/#set-the-security-context-for-a-container ## @param frontend.containerSecurityContext.enabled Enabled NGINX containers' Security Context ## @param frontend.containerSecurityContext.runAsUser Set NGINX container's Security Context runAsUser ## @param frontend.containerSecurityContext.runAsNonRoot Set NGINX container's Security Context runAsNonRoot ## containerSecurityContext: enabled: true runAsUser: 1001 runAsNonRoot: true ## Configure extra options for frontend containers' liveness and readiness probes ## ref: https://kubernetes.io/docs/tasks/configure-pod-container/configure-liveness-readiness-probes/#configure-probes ## @param frontend.livenessProbe.enabled Enable livenessProbe ## @skip frontend.livenessProbe.httpGet ## @param frontend.livenessProbe.initialDelaySeconds Initial delay seconds for livenessProbe ## @param frontend.livenessProbe.periodSeconds Period seconds for livenessProbe ## @param frontend.livenessProbe.timeoutSeconds Timeout seconds for livenessProbe ## @param frontend.livenessProbe.failureThreshold Failure threshold for livenessProbe ## @param frontend.livenessProbe.successThreshold Success threshold for livenessProbe ## livenessProbe: enabled: true httpGet: path: /healthz port: 8080 initialDelaySeconds: 60 periodSeconds: 10 timeoutSeconds: 5 failureThreshold: 6 successThreshold: 1 ## @param frontend.readinessProbe.enabled Enable readinessProbe ## @skip frontend.readinessProbe.httpGet ## @param frontend.readinessProbe.initialDelaySeconds Initial delay seconds for readinessProbe ## @param frontend.readinessProbe.periodSeconds Period seconds for readinessProbe ## @param frontend.readinessProbe.timeoutSeconds Timeout seconds for readinessProbe ## @param frontend.readinessProbe.failureThreshold Failure threshold for readinessProbe ## @param frontend.readinessProbe.successThreshold Success threshold for readinessProbe ## readinessProbe: enabled: true httpGet: path: / port: 8080 initialDelaySeconds: 0 periodSeconds: 10 timeoutSeconds: 5 failureThreshold: 6 successThreshold: 1 ## @param frontend.customLivenessProbe Custom livenessProbe that overrides the default one ## customLivenessProbe: {} ## @param frontend.customReadinessProbe Custom readinessProbe that overrides the default one ## customReadinessProbe: {} ## @param frontend.lifecycleHooks Custom lifecycle hooks for frontend containers ## lifecycleHooks: {} ## @param frontend.podLabels Extra labels for frontend pods ## ref: https://kubernetes.io/docs/concepts/overview/working-with-objects/labels/ ## podLabels: {} ## @param frontend.podAnnotations Annotations for frontend pods ## ref: https://kubernetes.io/docs/concepts/overview/working-with-objects/annotations/ ## podAnnotations: {} ## @param frontend.podAffinityPreset Pod affinity preset. Ignored if `affinity` is set. Allowed values: `soft` or `hard` ## ref: https://kubernetes.io/docs/concepts/scheduling-eviction/assign-pod-node/#inter-pod-affinity-and-anti-affinity ## podAffinityPreset: "" ## @param frontend.podAntiAffinityPreset Pod anti-affinity preset. Ignored if `affinity` is set. Allowed values: `soft` or `hard` ## Ref: https://kubernetes.io/docs/concepts/scheduling-eviction/assign-pod-node/#inter-pod-affinity-and-anti-affinity ## podAntiAffinityPreset: soft ## nodeAffinityPreset Node affinity preset ## Ref: https://kubernetes.io/docs/concepts/scheduling-eviction/assign-pod-node/#node-affinity ## nodeAffinityPreset: ## @param frontend.nodeAffinityPreset.type Node affinity preset type. Ignored if `affinity` is set. Allowed values: `soft` or `hard` ## type: "" ## @param frontend.nodeAffinityPreset.key Node label key to match. Ignored if `affinity` is set ## key: "" ## @param frontend.nodeAffinityPreset.values Node label values to match. Ignored if `affinity` is set ## E.g. ## values: ## - e2e-az1 ## - e2e-az2 ## values: [] ## @param frontend.affinity Affinity for pod assignment ## Ref: https://kubernetes.io/docs/concepts/configuration/assign-pod-node/#affinity-and-anti-affinity ## NOTE: frontend.podAffinityPreset, frontend.podAntiAffinityPreset, and frontend.nodeAffinityPreset will be ignored when it's set ## affinity: {} ## @param frontend.nodeSelector Node labels for pod assignment ## ref: https://kubernetes.io/docs/user-guide/node-selection/ ## nodeSelector: {} ## @param frontend.tolerations Tolerations for pod assignment ## ref: https://kubernetes.io/docs/concepts/configuration/taint-and-toleration/ ## tolerations: [] ## @param frontend.priorityClassName Priority class name for frontend pods ## priorityClassName: "" ## @param frontend.hostAliases Custom host aliases for frontend pods ## https://kubernetes.io/docs/concepts/services-networking/add-entries-to-pod-etc-hosts-with-host-aliases/ ## hostAliases: [] ## @param frontend.extraVolumes Optionally specify extra list of additional volumes for frontend pods ## extraVolumes: [] ## @param frontend.extraVolumeMounts Optionally specify extra list of additional volumeMounts for frontend container(s) ## extraVolumeMounts: [] ## @param frontend.sidecars Add additional sidecar containers to the frontend pod ## e.g: ## sidecars: ## - name: your-image-name ## image: your-image ## imagePullPolicy: Always ## ports: ## - name: portname ## containerPort: 1234 ## sidecars: [] ## @param frontend.initContainers Add additional init containers to the frontend pods ## ref: https://kubernetes.io/docs/concepts/workloads/pods/init-containers/ ## e.g: ## initContainers: ## - name: your-image-name ## image: your-image ## imagePullPolicy: Always ## command: ['sh', '-c', 'echo "hello world"'] ## initContainers: [] ## Frontend service parameters ## service: ## @param frontend.service.type Frontend service type ## type: ClusterIP ## @param frontend.service.port Frontend service HTTP port ## port: 80 ## @param frontend.service.nodePort Node port for HTTP ## ref: https://kubernetes.io/docs/concepts/services-networking/service/#nodeport ## nodePort: "" ## @param frontend.service.clusterIP Frontend service Cluster IP ## e.g.: ## clusterIP: None ## clusterIP: "" ## @param frontend.service.loadBalancerIP Frontend service Load Balancer IP ## ref: https://kubernetes.io/docs/concepts/services-networking/service/#type-loadbalancer ## loadBalancerIP: "" ## @param frontend.service.loadBalancerSourceRanges Frontend service Load Balancer sources ## ref: https://v1-17.docs.kubernetes.io/docs/tasks/access-application-cluster/configure-cloud-provider-firewall/#restrict-access-for-loadbalancer-service ## e.g: ## loadBalancerSourceRanges: ## - 10.10.10.0/24 ## loadBalancerSourceRanges: [] ## @param frontend.service.externalTrafficPolicy Frontend service external traffic policy ## ref https://kubernetes.io/docs/tasks/access-application-cluster/create-external-load-balancer/#preserving-the-client-source-ip ## externalTrafficPolicy: Cluster ## @param frontend.service.annotations Additional custom annotations for frontend service ## annotations: {} ## @section Dashboard parameters ## Dashboard parameters ## dashboard: ## Bitnami Kubeapps Dashboard image ## ref: https://hub.docker.com/r/bitnami/kubeops/tags/ ## @param dashboard.image.registry Dashboard image registry ## @param dashboard.image.repository Dashboard image repository ## @param dashboard.image.tag Dashboard image tag (immutable tags are recommended) ## @param dashboard.image.pullPolicy Dashboard image pull policy ## @param dashboard.image.pullSecrets Dashboard image pull secrets ## @param dashboard.image.debug Enable image debug mode ## image: registry: docker.io repository: bitnami/kubeapps-dashboard tag: 2.4.3-debian-10-r26 ## Specify a imagePullPolicy ## Defaults to 'Always' if image tag is 'latest', else set to 'IfNotPresent' ## ref: https://kubernetes.io/docs/user-guide/images/#pre-pulling-images ## pullPolicy: IfNotPresent ## Optionally specify an array of imagePullSecrets. ## Secrets must be manually created in the namespace. ## ref: https://kubernetes.io/docs/tasks/configure-pod-container/pull-image-private-registry/ ## e.g: ## pullSecrets: ## - myRegistryKeySecretName ## pullSecrets: [] ## Enable debug mode ## debug: false ## @param dashboard.customStyle Custom CSS injected to the Dashboard to customize Kubeapps look and feel ## e.g: ## customStyle: |- ## .header.header-7 { ## background-color: #991700; ## } ## customStyle: "" ## @param dashboard.customAppViews Package names to signal a custom app view ## ref: https://github.com/kubeapps/kubeapps/blob/main/docs/developer/custom-app-view-support.md ## e.g: ## customAppViews: ## - plugin: helm ## name: helm-chart ## repository: bitnami customAppViews: [] ## @param dashboard.customComponents Custom Form components injected into the BasicDeploymentForm ## ref: https://github.com/kubeapps/kubeapps/blob/main/docs/developer/custom-form-component-support.md ## customComponents: "" ## @param dashboard.remoteComponentsUrl Remote URL that can be used to load custom components vs loading from the local filesystem ## remoteComponentsUrl: "" ## @param dashboard.skipAvailablePackageDetails Skip the package details view and go straight to the installation view of the latest version ## skipAvailablePackageDetails: false ## @param dashboard.customLocale Custom translations injected to the Dashboard to customize the strings used in Kubeapps ## ref: https://github.com/kubeapps/kubeapps/blob/main/docs/developer/translate-kubeapps.md ## e.g: ## customLocale: ## "Kubeapps": "My Dashboard" ## "login-oidc": "Login with my company SSO" ## customLocale: "" ## @param dashboard.defaultTheme Default theme used in the Dashboard if the user has not selected any theme yet. ## enum: [ "light", "dark" ] ## e.g: ## defaultTheme: dark ## defaultTheme: "" ## @param dashboard.replicaCount Number of Dashboard replicas to deploy ## replicaCount: 2 ## @param dashboard.extraEnvVars Array with extra environment variables to add to the Dashboard container ## e.g: ## extraEnvVars: ## - name: FOO ## value: "bar" ## extraEnvVars: [] ## @param dashboard.extraEnvVarsCM Name of existing ConfigMap containing extra env vars for the Dashboard container ## extraEnvVarsCM: "" ## @param dashboard.extraEnvVarsSecret Name of existing Secret containing extra env vars for the Dashboard container ## extraEnvVarsSecret: "" ## @param dashboard.containerPort Dashboard HTTP container port ## containerPort: 8080 ## Dashboard containers' resource requests and limits ## ref: https://kubernetes.io/docs/user-guide/compute-resources/ ## @param dashboard.resources.limits.cpu The CPU limits for the Dashboard container ## @param dashboard.resources.limits.memory The memory limits for the Dashboard container ## @param dashboard.resources.requests.cpu The requested CPU for the Dashboard container ## @param dashboard.resources.requests.memory The requested memory for the Dashboard container ## resources: limits: cpu: 250m memory: 128Mi requests: cpu: 25m memory: 32Mi ## Configure Pods Security Context ## ref: https://kubernetes.io/docs/tasks/configure-pod-container/security-context/#set-the-security-context-for-a-pod ## @param dashboard.podSecurityContext.enabled Enabled Dashboard pods' Security Context ## @param dashboard.podSecurityContext.fsGroup Set Dashboard pod's Security Context fsGroup ## podSecurityContext: enabled: true fsGroup: 1001 ## Configure Container Security Context (only main container) ## ref: https://kubernetes.io/docs/tasks/configure-pod-container/security-context/#set-the-security-context-for-a-container ## @param dashboard.containerSecurityContext.enabled Enabled Dashboard containers' Security Context ## @param dashboard.containerSecurityContext.runAsUser Set Dashboard container's Security Context runAsUser ## @param dashboard.containerSecurityContext.runAsNonRoot Set Dashboard container's Security Context runAsNonRoot ## containerSecurityContext: enabled: true runAsUser: 1001 runAsNonRoot: true ## Configure extra options for Dashboard containers' liveness and readiness probes ## ref: https://kubernetes.io/docs/tasks/configure-pod-container/configure-liveness-readiness-probes/#configure-probes ## @param dashboard.livenessProbe.enabled Enable livenessProbe ## @skip dashboard.livenessProbe.httpGet ## @param dashboard.livenessProbe.initialDelaySeconds Initial delay seconds for livenessProbe ## @param dashboard.livenessProbe.periodSeconds Period seconds for livenessProbe ## @param dashboard.livenessProbe.timeoutSeconds Timeout seconds for livenessProbe ## @param dashboard.livenessProbe.failureThreshold Failure threshold for livenessProbe ## @param dashboard.livenessProbe.successThreshold Success threshold for livenessProbe ## Dashboard containers' liveness and readiness probes ## ref: https://kubernetes.io/docs/concepts/workloads/pods/pod-lifecycle/#container-probes ## livenessProbe: enabled: true httpGet: path: / port: 8080 initialDelaySeconds: 60 periodSeconds: 10 timeoutSeconds: 5 failureThreshold: 6 successThreshold: 1 ## @param dashboard.readinessProbe.enabled Enable readinessProbe ## @skip dashboard.readinessProbe.httpGet ## @param dashboard.readinessProbe.initialDelaySeconds Initial delay seconds for readinessProbe ## @param dashboard.readinessProbe.periodSeconds Period seconds for readinessProbe ## @param dashboard.readinessProbe.timeoutSeconds Timeout seconds for readinessProbe ## @param dashboard.readinessProbe.failureThreshold Failure threshold for readinessProbe ## @param dashboard.readinessProbe.successThreshold Success threshold for readinessProbe ## readinessProbe: enabled: true httpGet: path: / port: 8080 initialDelaySeconds: 0 periodSeconds: 10 timeoutSeconds: 5 failureThreshold: 6 successThreshold: 1 ## @param dashboard.customLivenessProbe Custom livenessProbe that overrides the default one ## customLivenessProbe: {} ## @param dashboard.customReadinessProbe Custom readinessProbe that overrides the default one ## customReadinessProbe: {} ## @param dashboard.lifecycleHooks Custom lifecycle hooks for Dashboard containers ## lifecycleHooks: {} ## @param dashboard.podLabels Extra labels for Dasbhoard pods ## ref: https://kubernetes.io/docs/concepts/overview/working-with-objects/labels/ ## podLabels: {} ## @param dashboard.podAnnotations Annotations for Dasbhoard pods ## ref: https://kubernetes.io/docs/concepts/overview/working-with-objects/annotations/ ## podAnnotations: {} ## @param dashboard.podAffinityPreset Pod affinity preset. Ignored if `affinity` is set. Allowed values: `soft` or `hard` ## ref: https://kubernetes.io/docs/concepts/scheduling-eviction/assign-pod-node/#inter-pod-affinity-and-anti-affinity ## podAffinityPreset: "" ## @param dashboard.podAntiAffinityPreset Pod anti-affinity preset. Ignored if `affinity` is set. Allowed values: `soft` or `hard` ## Ref: https://kubernetes.io/docs/concepts/scheduling-eviction/assign-pod-node/#inter-pod-affinity-and-anti-affinity ## podAntiAffinityPreset: soft ## Node affinity preset ## Ref: https://kubernetes.io/docs/concepts/scheduling-eviction/assign-pod-node/#node-affinity ## nodeAffinityPreset: ## @param dashboard.nodeAffinityPreset.type Node affinity preset type. Ignored if `affinity` is set. Allowed values: `soft` or `hard` ## type: "" ## @param dashboard.nodeAffinityPreset.key Node label key to match. Ignored if `affinity` is set ## key: "" ## @param dashboard.nodeAffinityPreset.values Node label values to match. Ignored if `affinity` is set ## E.g. ## values: ## - e2e-az1 ## - e2e-az2 ## values: [] ## @param dashboard.affinity Affinity for pod assignment ## Ref: https://kubernetes.io/docs/concepts/configuration/assign-pod-node/#affinity-and-anti-affinity ## NOTE: dashboard.podAffinityPreset, dashboard.podAntiAffinityPreset, and dashboard.nodeAffinityPreset will be ignored when it's set ## affinity: {} ## @param dashboard.nodeSelector Node labels for pod assignment ## ref: https://kubernetes.io/docs/user-guide/node-selection/ ## nodeSelector: {} ## @param dashboard.tolerations Tolerations for pod assignment ## ref: https://kubernetes.io/docs/concepts/configuration/taint-and-toleration/ ## tolerations: [] ## @param dashboard.priorityClassName Priority class name for Dashboard pods ## priorityClassName: "" ## @param dashboard.hostAliases Custom host aliases for Dashboard pods ## https://kubernetes.io/docs/concepts/services-networking/add-entries-to-pod-etc-hosts-with-host-aliases/ ## hostAliases: [] ## @param dashboard.extraVolumes Optionally specify extra list of additional volumes for Dasbhoard pods ## extraVolumes: [] ## @param dashboard.extraVolumeMounts Optionally specify extra list of additional volumeMounts for Dasbhoard container(s) ## extraVolumeMounts: [] ## @param dashboard.sidecars Add additional sidecar containers to the Dasbhoard pod ## e.g: ## sidecars: ## - name: your-image-name ## image: your-image ## imagePullPolicy: Always ## ports: ## - name: portname ## containerPort: 1234 ## sidecars: [] ## @param dashboard.initContainers Add additional init containers to the Dasbhoard pods ## ref: https://kubernetes.io/docs/concepts/workloads/pods/init-containers/ ## e.g: ## initContainers: ## - name: your-image-name ## image: your-image ## imagePullPolicy: Always ## command: ['sh', '-c', 'echo "hello world"'] ## initContainers: [] ## Dasbhoard service parameters ## service: ## @param dashboard.service.port Dasbhoard service HTTP port ## port: 8080 ## @param dashboard.service.annotations Additional custom annotations for Dasbhoard service ## annotations: {} ## @section AppRepository Controller parameters ## AppRepository Controller parameters ## apprepository: ## Bitnami Kubeapps AppRepository Controller image ## ref: https://hub.docker.com/r/bitnami/kubeapps-apprepository-controller/tags/ ## @param apprepository.image.registry Kubeapps AppRepository Controller image registry ## @param apprepository.image.repository Kubeapps AppRepository Controller image repository ## @param apprepository.image.tag Kubeapps AppRepository Controller image tag (immutable tags are recommended) ## @param apprepository.image.pullPolicy Kubeapps AppRepository Controller image pull policy ## @param apprepository.image.pullSecrets Kubeapps AppRepository Controller image pull secrets ## image: registry: docker.io repository: bitnami/kubeapps-apprepository-controller tag: 2.4.3-scratch-r1 ## Specify a imagePullPolicy ## Defaults to 'Always' if image tag is 'latest', else set to 'IfNotPresent' ## ref: https://kubernetes.io/docs/user-guide/images/#pre-pulling-images ## pullPolicy: IfNotPresent ## Optionally specify an array of imagePullSecrets. ## Secrets must be manually created in the namespace. ## ref: https://kubernetes.io/docs/tasks/configure-pod-container/pull-image-private-registry/ ## e.g: ## pullSecrets: ## - myRegistryKeySecretName ## pullSecrets: [] ## Bitnami Kubeapps Asset Syncer image ## ref: https://hub.docker.com/r/bitnami/kubeapps-asset-syncer/tags/ ## @param apprepository.syncImage.registry Kubeapps Asset Syncer image registry ## @param apprepository.syncImage.repository Kubeapps Asset Syncer image repository ## @param apprepository.syncImage.tag Kubeapps Asset Syncer image tag (immutable tags are recommended) ## @param apprepository.syncImage.pullPolicy Kubeapps Asset Syncer image pull policy ## @param apprepository.syncImage.pullSecrets Kubeapps Asset Syncer image pull secrets ## syncImage: registry: docker.io repository: bitnami/kubeapps-asset-syncer tag: 2.4.3-scratch-r2 ## Specify a imagePullPolicy ## Defaults to 'Always' if image tag is 'latest', else set to 'IfNotPresent' ## ref: https://kubernetes.io/docs/user-guide/images/#pre-pulling-images ## pullPolicy: IfNotPresent ## Optionally specify an array of imagePullSecrets. ## Secrets must be manually created in the namespace. ## ref: https://kubernetes.io/docs/tasks/configure-pod-container/pull-image-private-registry/ ## e.g: ## pullSecrets: ## - myRegistryKeySecretName ## pullSecrets: [] ## @param apprepository.globalReposNamespaceSuffix Suffix for the namespace of global repos. Defaults to empty for backwards compatibility. ## globalReposNamespaceSuffix: "" ## @param apprepository.initialRepos [array] Initial chart repositories to configure ## e.g: ## initialRepos: ## - name: chartmuseum ## url: https://chartmuseum.default:8080 ## nodeSelector: ## somelabel: somevalue ## # Specify an Authorization Header if you are using an authentication method: ## authorizationHeader: "Bearer xrxNC..." ## # Specify the credentials if you are using a basic authentication method: ## basicAuth: ## user: ## password: ## # If you're providing your own certificates, please use this to add the certificates as secrets. ## # It should start with -----BEGIN CERTIFICATE----- or ## # -----BEGIN RSA PRIVATE KEY----- ## caCert: ## # Create this apprepository in a custom namespace ## namespace: ## # In case of an OCI registry, specify the type ## type: oci ## # And specify the list of repositories ## ociRepositories: ## - nginx ## - jenkins ## # Optionally filter out some charts. ## # The jq query format is not exposed in the UI, so care needs to be taken to use the format which the UI expects to parse, ## # which is why variables are used in the example below. ## filterRule: ## jq: .name == $var0 or .name == $var1 ## variables: ## $var0: nginx ## $var1: jenkins ## initialRepos: - name: bitnami url: https://charts.bitnami.com/bitnami ## @param apprepository.customAnnotations Custom annotations be added to each AppRepository-generated CronJob, Job and Pod ## customAnnotations: {} ## @param apprepository.customLabels Custom labels be added to each AppRepository-generated CronJob, Job and Pod ## customLabels: {} ## Proxy configuration to access chart repositories ## ## @param apprepository.initialReposProxy.enabled Enables the proxy ## @param apprepository.initialReposProxy.httpProxy URL for the http proxy ## @param apprepository.initialReposProxy.httpsProxy URL for the https proxy ## @param apprepository.initialReposProxy.noProxy URL to exclude from using the proxy ## initialReposProxy: enabled: false httpProxy: "" httpsProxy: "" noProxy: "" ## @param apprepository.crontab Schedule for syncing App repositories (default to 10 minutes) ## e.g: ## crontab: "*/10 * * * *" ## crontab: "" ## @param apprepository.watchAllNamespaces Watch all namespaces to support separate AppRepositories per namespace ## Switch this off only if you require running multiple instances of Kubeapps in different namespaces ## without each instance watching AppRepositories of each other ## watchAllNamespaces: true ## @param apprepository.replicaCount Number of AppRepository Controller replicas to deploy ## Running a single controller replica to avoid sync job duplication ## replicaCount: 1 ## AppRepository Controller containers' resource requests and limits ## ref: https://kubernetes.io/docs/user-guide/compute-resources/ ## @param apprepository.resources.limits.cpu The CPU limits for the AppRepository Controller container ## @param apprepository.resources.limits.memory The memory limits for the AppRepository Controller container ## @param apprepository.resources.requests.cpu The requested CPU for the AppRepository Controller container ## @param apprepository.resources.requests.memory The requested memory for the AppRepository Controller container ## resources: limits: cpu: 250m memory: 128Mi requests: cpu: 25m memory: 32Mi ## Configure Pods Security Context ## ref: https://kubernetes.io/docs/tasks/configure-pod-container/security-context/#set-the-security-context-for-a-pod ## @param apprepository.podSecurityContext.enabled Enabled AppRepository Controller pods' Security Context ## @param apprepository.podSecurityContext.fsGroup Set AppRepository Controller pod's Security Context fsGroup ## podSecurityContext: enabled: true fsGroup: 1001 ## Configure Container Security Context (only main container) ## ref: https://kubernetes.io/docs/tasks/configure-pod-container/security-context/#set-the-security-context-for-a-container ## @param apprepository.containerSecurityContext.enabled Enabled AppRepository Controller containers' Security Context ## @param apprepository.containerSecurityContext.runAsUser Set AppRepository Controller container's Security Context runAsUser ## @param apprepository.containerSecurityContext.runAsNonRoot Set AppRepository Controller container's Security Context runAsNonRoot ## containerSecurityContext: enabled: true runAsUser: 1001 runAsNonRoot: true ## @param apprepository.lifecycleHooks Custom lifecycle hooks for AppRepository Controller containers ## lifecycleHooks: {} ## @param apprepository.podLabels Extra labels for AppRepository Controller pods ## ref: https://kubernetes.io/docs/concepts/overview/working-with-objects/labels/ ## podLabels: {} ## @param apprepository.podAnnotations Annotations for AppRepository Controller pods ## ref: https://kubernetes.io/docs/concepts/overview/working-with-objects/annotations/ ## podAnnotations: {} ## @param apprepository.podAffinityPreset Pod affinity preset. Ignored if `affinity` is set. Allowed values: `soft` or `hard` ## ref: https://kubernetes.io/docs/concepts/scheduling-eviction/assign-pod-node/#inter-pod-affinity-and-anti-affinity ## podAffinityPreset: "" ## @param apprepository.podAntiAffinityPreset Pod anti-affinity preset. Ignored if `affinity` is set. Allowed values: `soft` or `hard` ## Ref: https://kubernetes.io/docs/concepts/scheduling-eviction/assign-pod-node/#inter-pod-affinity-and-anti-affinity ## podAntiAffinityPreset: soft ## nodeAffinityPreset Node affinity preset ## Ref: https://kubernetes.io/docs/concepts/scheduling-eviction/assign-pod-node/#node-affinity ## nodeAffinityPreset: ## @param apprepository.nodeAffinityPreset.type Node affinity preset type. Ignored if `affinity` is set. Allowed values: `soft` or `hard` ## type: "" ## @param apprepository.nodeAffinityPreset.key Node label key to match. Ignored if `affinity` is set ## key: "" ## @param apprepository.nodeAffinityPreset.values Node label values to match. Ignored if `affinity` is set ## E.g. ## values: ## - e2e-az1 ## - e2e-az2 ## values: [] ## @param apprepository.affinity Affinity for pod assignment ## Ref: https://kubernetes.io/docs/concepts/configuration/assign-pod-node/#affinity-and-anti-affinity ## NOTE: apprepository.podAffinityPreset, apprepository.podAntiAffinityPreset, and apprepository.nodeAffinityPreset will be ignored when it's set ## affinity: {} ## @param apprepository.nodeSelector Node labels for pod assignment ## ref: https://kubernetes.io/docs/user-guide/node-selection/ ## nodeSelector: {} ## @param apprepository.tolerations Tolerations for pod assignment ## ref: https://kubernetes.io/docs/concepts/configuration/taint-and-toleration/ ## tolerations: [] ## @param apprepository.priorityClassName Priority class name for AppRepository Controller pods ## priorityClassName: "" ## @param apprepository.hostAliases Custom host aliases for AppRepository Controller pods ## https://kubernetes.io/docs/concepts/services-networking/add-entries-to-pod-etc-hosts-with-host-aliases/ ## hostAliases: [] ## @section Kubeops parameters ## Kubeops parameters ## kubeops: ## @param kubeops.enabled Specifies whether this component should be installed. ## In a future release we will be setting this to default to false. ## enabled: true ## Bitnami Kubeops image ## ref: https://hub.docker.com/r/bitnami/kubeops/tags/ ## @param kubeops.image.registry Kubeops image registry ## @param kubeops.image.repository Kubeops image repository ## @param kubeops.image.tag Kubeops image tag (immutable tags are recommended) ## @param kubeops.image.pullPolicy Kubeops image pull policy ## @param kubeops.image.pullSecrets Kubeops image pull secrets ## image: registry: docker.io repository: bitnami/kubeapps-kubeops tag: 2.4.3-scratch-r2 ## Specify a imagePullPolicy ## Defaults to 'Always' if image tag is 'latest', else set to 'IfNotPresent' ## ref: https://kubernetes.io/docs/user-guide/images/#pre-pulling-images ## pullPolicy: IfNotPresent ## Optionally specify an array of imagePullSecrets. ## Secrets must be manually created in the namespace. ## ref: https://kubernetes.io/docs/tasks/configure-pod-container/pull-image-private-registry/ ## e.g: ## pullSecrets: ## - myRegistryKeySecretName ## pullSecrets: [] ## @param kubeops.namespaceHeaderName Additional header name for trusted namespaces ## e.g: ## namespaceHeaderName: X-Consumer-Groups ## namespaceHeaderName: "" ## @param kubeops.namespaceHeaderPattern Additional header pattern for trusted namespaces ## e.g: ## namespaceHeaderPattern: namespace:^([\w-]+):\w+$ ## namespaceHeaderPattern: "" ## @param kubeops.qps Kubeops QPS (queries per second) rate ## qps: "" ## @param kubeops.burst Kubeops burst rate ## burst: "" ## @param kubeops.replicaCount Number of Kubeops replicas to deploy ## replicaCount: 2 ## @param kubeops.terminationGracePeriodSeconds The grace time period for sig term ## ref: https://kubernetes.io/docs/concepts/containers/container-lifecycle-hooks/#hook-handler-execution ## terminationGracePeriodSeconds: 300 ## @param kubeops.extraEnvVars Array with extra environment variables to add to the Kubeops container ## e.g: ## extraEnvVars: ## - name: FOO ## value: "bar" ## extraEnvVars: [] ## @param kubeops.extraEnvVarsCM Name of existing ConfigMap containing extra env vars for the Kubeops container ## extraEnvVarsCM: "" ## @param kubeops.extraEnvVarsSecret Name of existing Secret containing extra env vars for the Kubeops container ## extraEnvVarsSecret: "" ## @param kubeops.containerPort Kubeops HTTP container port ## containerPort: 8080 ## Kubeops containers' resource requests and limits ## ref: https://kubernetes.io/docs/user-guide/compute-resources/ ## @param kubeops.resources.limits.cpu The CPU limits for the Kubeops container ## @param kubeops.resources.limits.memory The memory limits for the Kubeops container ## @param kubeops.resources.requests.cpu The requested CPU for the Kubeops container ## @param kubeops.resources.requests.memory The requested memory for the Kubeops container ## resources: limits: cpu: 250m memory: 256Mi requests: cpu: 25m memory: 32Mi ## Configure Pods Security Context ## ref: https://kubernetes.io/docs/tasks/configure-pod-container/security-context/#set-the-security-context-for-a-pod ## @param kubeops.podSecurityContext.enabled Enabled Kubeops pods' Security Context ## @param kubeops.podSecurityContext.fsGroup Set Kubeops pod's Security Context fsGroup ## podSecurityContext: enabled: true fsGroup: 1001 ## Configure Container Security Context (only main container) ## ref: https://kubernetes.io/docs/tasks/configure-pod-container/security-context/#set-the-security-context-for-a-container ## @param kubeops.containerSecurityContext.enabled Enabled Kubeops containers' Security Context ## @param kubeops.containerSecurityContext.runAsUser Set Kubeops container's Security Context runAsUser ## @param kubeops.containerSecurityContext.runAsNonRoot Set Kubeops container's Security Context runAsNonRoot ## containerSecurityContext: enabled: true runAsUser: 1001 runAsNonRoot: true ## Configure extra options for Kubeops containers' liveness and readiness probes ## ref: https://kubernetes.io/docs/tasks/configure-pod-container/configure-liveness-readiness-probes/#configure-probes ## @param kubeops.livenessProbe.enabled Enable livenessProbe ## @skip kubeops.livenessProbe.httpGet ## @param kubeops.livenessProbe.initialDelaySeconds Initial delay seconds for livenessProbe ## @param kubeops.livenessProbe.periodSeconds Period seconds for livenessProbe ## @param kubeops.livenessProbe.timeoutSeconds Timeout seconds for livenessProbe ## @param kubeops.livenessProbe.failureThreshold Failure threshold for livenessProbe ## @param kubeops.livenessProbe.successThreshold Success threshold for livenessProbe ## Kubeops containers' liveness and readiness probes ## ref: https://kubernetes.io/docs/concepts/workloads/pods/pod-lifecycle/#container-probes ## livenessProbe: enabled: true httpGet: path: /live port: 8080 initialDelaySeconds: 60 periodSeconds: 10 timeoutSeconds: 5 failureThreshold: 6 successThreshold: 1 ## @param kubeops.readinessProbe.enabled Enable readinessProbe ## @skip kubeops.readinessProbe.httpGet ## @param kubeops.readinessProbe.initialDelaySeconds Initial delay seconds for readinessProbe ## @param kubeops.readinessProbe.periodSeconds Period seconds for readinessProbe ## @param kubeops.readinessProbe.timeoutSeconds Timeout seconds for readinessProbe ## @param kubeops.readinessProbe.failureThreshold Failure threshold for readinessProbe ## @param kubeops.readinessProbe.successThreshold Success threshold for readinessProbe ## readinessProbe: enabled: true httpGet: path: /ready port: 8080 initialDelaySeconds: 0 periodSeconds: 10 timeoutSeconds: 5 failureThreshold: 6 successThreshold: 1 ## @param kubeops.customLivenessProbe Custom livenessProbe that overrides the default one ## customLivenessProbe: {} ## @param kubeops.customReadinessProbe Custom readinessProbe that overrides the default one ## customReadinessProbe: {} ## @param kubeops.lifecycleHooks Custom lifecycle hooks for Kubeops containers ## lifecycleHooks: {} ## @param kubeops.podLabels Extra labels for Kubeops pods ## ref: https://kubernetes.io/docs/concepts/overview/working-with-objects/labels/ ## podLabels: {} ## @param kubeops.podAnnotations Annotations for Kubeops pods ## ref: https://kubernetes.io/docs/concepts/overview/working-with-objects/annotations/ ## podAnnotations: {} ## @param kubeops.podAffinityPreset Pod affinity preset. Ignored if `affinity` is set. Allowed values: `soft` or `hard` ## ref: https://kubernetes.io/docs/concepts/scheduling-eviction/assign-pod-node/#inter-pod-affinity-and-anti-affinity ## podAffinityPreset: "" ## @param kubeops.podAntiAffinityPreset Pod anti-affinity preset. Ignored if `affinity` is set. Allowed values: `soft` or `hard` ## Ref: https://kubernetes.io/docs/concepts/scheduling-eviction/assign-pod-node/#inter-pod-affinity-and-anti-affinity ## podAntiAffinityPreset: soft ## nodeAffinityPreset Node affinity preset ## Ref: https://kubernetes.io/docs/concepts/scheduling-eviction/assign-pod-node/#node-affinity ## nodeAffinityPreset: ## @param kubeops.nodeAffinityPreset.type Node affinity preset type. Ignored if `affinity` is set. Allowed values: `soft` or `hard` ## type: "" ## @param kubeops.nodeAffinityPreset.key Node label key to match. Ignored if `affinity` is set ## key: "" ## @param kubeops.nodeAffinityPreset.values Node label values to match. Ignored if `affinity` is set ## E.g. ## values: ## - e2e-az1 ## - e2e-az2 ## values: [] ## @param kubeops.affinity Affinity for pod assignment ## Ref: https://kubernetes.io/docs/concepts/configuration/assign-pod-node/#affinity-and-anti-affinity ## NOTE: kubeops.podAffinityPreset, kubeops.podAntiAffinityPreset, and kubeops.nodeAffinityPreset will be ignored when it's set ## affinity: {} ## @param kubeops.nodeSelector Node labels for pod assignment ## ref: https://kubernetes.io/docs/user-guide/node-selection/ ## nodeSelector: {} ## @param kubeops.tolerations Tolerations for pod assignment ## ref: https://kubernetes.io/docs/concepts/configuration/taint-and-toleration/ ## tolerations: [] ## @param kubeops.priorityClassName Priority class name for Kubeops pods ## priorityClassName: "" ## @param kubeops.hostAliases Custom host aliases for Kubeops pods ## https://kubernetes.io/docs/concepts/services-networking/add-entries-to-pod-etc-hosts-with-host-aliases/ ## hostAliases: [] ## Kubeops service parameters ## service: ## @param kubeops.service.port Kubeops service HTTP port ## port: 8080 ## @param kubeops.service.annotations Additional custom annotations for Kubeops service ## annotations: {} ## @section Assetsvc parameters ## Assetsvc parameters ## @deprecated assetsvc: ## @param assetsvc.enabled Specifies whether this deprecated component should be installed. ## As per Kubeapps v2.4.0 it is no longer used in the UI. ## In future releases, this service will get entirely removed. ## enabled: false ## Bitnami Kubeapps Assetsvc image ## ref: https://hub.docker.com/r/bitnami/kubeapps-assetsvc/tags/ ## @param assetsvc.image.registry Kubeapps Assetsvc image registry ## @param assetsvc.image.repository Kubeapps Assetsvc image repository ## @param assetsvc.image.tag Kubeapps Assetsvc image tag (immutable tags are recommended) ## @param assetsvc.image.pullPolicy Kubeapps Assetsvc image pull policy ## @param assetsvc.image.pullSecrets Kubeapps Assetsvc image pull secrets ## image: registry: docker.io repository: bitnami/kubeapps-assetsvc tag: 2.4.3-scratch-r2 ## Specify a imagePullPolicy ## Defaults to 'Always' if image tag is 'latest', else set to 'IfNotPresent' ## ref: https://kubernetes.io/docs/user-guide/images/#pre-pulling-images ## pullPolicy: IfNotPresent ## Optionally specify an array of imagePullSecrets. ## Secrets must be manually created in the namespace. ## ref: https://kubernetes.io/docs/tasks/configure-pod-container/pull-image-private-registry/ ## e.g: ## pullSecrets: ## - myRegistryKeySecretName ## pullSecrets: [] ## @param assetsvc.replicaCount Number of Assetsvc replicas to deploy ## replicaCount: 1 ## @param assetsvc.extraEnvVars Array with extra environment variables to add to the Assetsvc container ## e.g: ## extraEnvVars: ## - name: FOO ## value: "bar" ## extraEnvVars: [] ## @param assetsvc.extraEnvVarsCM Name of existing ConfigMap containing extra env vars for the Assetsvc container ## extraEnvVarsCM: "" ## @param assetsvc.extraEnvVarsSecret Name of existing Secret containing extra env vars for the Assetsvc container ## extraEnvVarsSecret: "" ## @param assetsvc.containerPort Assetsvc HTTP container port ## containerPort: 8080 ## Assetsvc containers' resource requests and limits ## ref: https://kubernetes.io/docs/user-guide/compute-resources/ ## @param assetsvc.resources.limits.cpu The CPU limits for the Assetsvc container ## @param assetsvc.resources.limits.memory The memory limits for the Assetsvc container ## @param assetsvc.resources.requests.cpu The requested CPU for the Assetsvc container ## @param assetsvc.resources.requests.memory The requested memory for the Assetsvc container ## resources: limits: cpu: 250m memory: 128Mi requests: cpu: 25m memory: 32Mi ## Configure Pods Security Context ## ref: https://kubernetes.io/docs/tasks/configure-pod-container/security-context/#set-the-security-context-for-a-pod ## @param assetsvc.podSecurityContext.enabled Enabled Assetsvc pods' Security Context ## @param assetsvc.podSecurityContext.fsGroup Set Assetsvc pod's Security Context fsGroup ## podSecurityContext: enabled: true fsGroup: 1001 ## Configure Container Security Context (only main container) ## ref: https://kubernetes.io/docs/tasks/configure-pod-container/security-context/#set-the-security-context-for-a-container ## @param assetsvc.containerSecurityContext.enabled Enabled Assetsvc containers' Security Context ## @param assetsvc.containerSecurityContext.runAsUser Set Assetsvc container's Security Context runAsUser ## @param assetsvc.containerSecurityContext.runAsNonRoot Set Assetsvc container's Security Context runAsNonRoot ## containerSecurityContext: enabled: true runAsUser: 1001 runAsNonRoot: true ## Configure extra options for Assetsvc containers' liveness and readiness probes ## ref: https://kubernetes.io/docs/tasks/configure-pod-container/configure-liveness-readiness-probes/#configure-probes ## @param assetsvc.livenessProbe.enabled Enable livenessProbe ## @skip assetsvc.livenessProbe.httpGet ## @param assetsvc.livenessProbe.initialDelaySeconds Initial delay seconds for livenessProbe ## @param assetsvc.livenessProbe.periodSeconds Period seconds for livenessProbe ## @param assetsvc.livenessProbe.timeoutSeconds Timeout seconds for livenessProbe ## @param assetsvc.livenessProbe.failureThreshold Failure threshold for livenessProbe ## @param assetsvc.livenessProbe.successThreshold Success threshold for livenessProbe ## Assetsvc containers' liveness and readiness probes ## ref: https://kubernetes.io/docs/concepts/workloads/pods/pod-lifecycle/#container-probes ## livenessProbe: enabled: true httpGet: path: /live port: 8080 initialDelaySeconds: 60 periodSeconds: 10 timeoutSeconds: 5 failureThreshold: 6 successThreshold: 1 ## @param assetsvc.readinessProbe.enabled Enable readinessProbe ## @skip assetsvc.readinessProbe.httpGet ## @param assetsvc.readinessProbe.initialDelaySeconds Initial delay seconds for readinessProbe ## @param assetsvc.readinessProbe.periodSeconds Period seconds for readinessProbe ## @param assetsvc.readinessProbe.timeoutSeconds Timeout seconds for readinessProbe ## @param assetsvc.readinessProbe.failureThreshold Failure threshold for readinessProbe ## @param assetsvc.readinessProbe.successThreshold Success threshold for readinessProbe ## readinessProbe: enabled: true httpGet: path: /ready port: 8080 initialDelaySeconds: 0 periodSeconds: 10 timeoutSeconds: 5 failureThreshold: 6 successThreshold: 1 ## @param assetsvc.customLivenessProbe Custom livenessProbe that overrides the default one ## customLivenessProbe: {} ## @param assetsvc.customReadinessProbe Custom readinessProbe that overrides the default one ## customReadinessProbe: {} ## @param assetsvc.lifecycleHooks Custom lifecycle hooks for Assetsvc containers ## lifecycleHooks: {} ## @param assetsvc.podLabels Extra labels for Assetsvc pods ## ref: https://kubernetes.io/docs/concepts/overview/working-with-objects/labels/ ## podLabels: {} ## @param assetsvc.podAnnotations Annotations for Assetsvc pods ## ref: https://kubernetes.io/docs/concepts/overview/working-with-objects/annotations/ ## podAnnotations: {} ## @param assetsvc.podAffinityPreset Pod affinity preset. Ignored if `affinity` is set. Allowed values: `soft` or `hard` ## ref: https://kubernetes.io/docs/concepts/scheduling-eviction/assign-pod-node/#inter-pod-affinity-and-anti-affinity ## podAffinityPreset: "" ## @param assetsvc.podAntiAffinityPreset Pod anti-affinity preset. Ignored if `affinity` is set. Allowed values: `soft` or `hard` ## Ref: https://kubernetes.io/docs/concepts/scheduling-eviction/assign-pod-node/#inter-pod-affinity-and-anti-affinity ## podAntiAffinityPreset: soft ## nodeAffinityPreset Node affinity preset ## Ref: https://kubernetes.io/docs/concepts/scheduling-eviction/assign-pod-node/#node-affinity ## nodeAffinityPreset: ## @param assetsvc.nodeAffinityPreset.type Node affinity preset type. Ignored if `affinity` is set. Allowed values: `soft` or `hard` ## type: "" ## @param assetsvc.nodeAffinityPreset.key Node label key to match. Ignored if `affinity` is set ## key: "" ## @param assetsvc.nodeAffinityPreset.values Node label values to match. Ignored if `affinity` is set ## E.g. ## values: ## - e2e-az1 ## - e2e-az2 ## values: [] ## @param assetsvc.affinity Affinity for pod assignment ## Ref: https://kubernetes.io/docs/concepts/configuration/assign-pod-node/#affinity-and-anti-affinity ## NOTE: assetsvc.podAffinityPreset, assetsvc.podAntiAffinityPreset, and assetsvc.nodeAffinityPreset will be ignored when it's set ## affinity: {} ## @param assetsvc.nodeSelector Node labels for pod assignment ## ref: https://kubernetes.io/docs/user-guide/node-selection/ ## nodeSelector: {} ## @param assetsvc.tolerations Tolerations for pod assignment ## ref: https://kubernetes.io/docs/concepts/configuration/taint-and-toleration/ ## tolerations: [] ## @param assetsvc.priorityClassName Priority class name for Assetsvc pods ## priorityClassName: "" ## @param assetsvc.hostAliases Custom host aliases for Assetsvc pods ## https://kubernetes.io/docs/concepts/services-networking/add-entries-to-pod-etc-hosts-with-host-aliases/ ## hostAliases: [] ## Assetsvc service parameters ## service: ## @param assetsvc.service.port Assetsvc service HTTP port ## port: 8080 ## @param assetsvc.service.annotations Additional custom annotations for Assetsvc service ## annotations: {} ## @section Auth Proxy parameters ## Auth Proxy configuration for OIDC support ## ref: https://github.com/kubeapps/kubeapps/blob/main/docs/user/using-an-OIDC-provider.md ## authProxy: ## @param authProxy.enabled Specifies whether Kubeapps should configure OAuth login/logout ## enabled: false ## Bitnami OAuth2 Proxy image ## ref: https://hub.docker.com/r/bitnami/oauth2-proxy/tags/ ## @param authProxy.image.registry OAuth2 Proxy image registry ## @param authProxy.image.repository OAuth2 Proxy image repository ## @param authProxy.image.tag OAuth2 Proxy image tag (immutable tags are recommended) ## @param authProxy.image.pullPolicy OAuth2 Proxy image pull policy ## @param authProxy.image.pullSecrets OAuth2 Proxy image pull secrets ## image: registry: docker.io repository: bitnami/oauth2-proxy tag: 7.2.1-debian-10-r82 ## Specify a imagePullPolicy ## Defaults to 'Always' if image tag is 'latest', else set to 'IfNotPresent' ## ref: https://kubernetes.io/docs/user-guide/images/#pre-pulling-images ## pullPolicy: IfNotPresent ## Optionally specify an array of imagePullSecrets. ## Secrets must be manually created in the namespace. ## ref: https://kubernetes.io/docs/tasks/configure-pod-container/pull-image-private-registry/ ## e.g: ## pullSecrets: ## - myRegistryKeySecretName ## pullSecrets: [] ## @param authProxy.external Use an external Auth Proxy instead of deploying its own one ## external: false ## @param authProxy.oauthLoginURI OAuth Login URI to which the Kubeapps frontend redirects for authn ## @param authProxy.oauthLogoutURI OAuth Logout URI to which the Kubeapps frontend redirects for authn ## oauthLoginURI: /oauth2/start oauthLogoutURI: /oauth2/sign_out ## @param authProxy.skipKubeappsLoginPage Skip the Kubeapps login page when using OIDC and directly redirect to the IdP ## skipKubeappsLoginPage: false ## @param authProxy.provider OAuth provider ## @param authProxy.clientID OAuth Client ID ## @param authProxy.clientSecret OAuth Client secret ## NOTE: Mandatory parameters for the internal auth-proxy ## provider: "" clientID: "" clientSecret: "" ## @param authProxy.cookieSecret Secret used by oauth2-proxy to encrypt any credentials ## NOTE: It must be a particular number of bytes. It's recommended using the following ## script to generate a cookieSecret: ## python -c 'import os,base64; print base64.urlsafe_b64encode(os.urandom(16))' ## ref: https://oauth2-proxy.github.io/oauth2-proxy/docs/configuration/overview#generating-a-cookie-secret ## cookieSecret: "" ## @param authProxy.cookieRefresh Duration after which to refresh the cookie ## cookieRefresh: 2m ## @param authProxy.scope OAuth scope specification ## scope: "openid email groups" ## @param authProxy.emailDomain Allowed email domains ## Use "example.com" to restrict logins to emails from example.com ## emailDomain: "*" ## @param authProxy.additionalFlags Additional flags for oauth2-proxy ## ref: https://oauth2-proxy.github.io/oauth2-proxy/docs/configuration/overview ## e.g: ## additionalFlags: ## - --ssl-insecure-skip-verify ## - --cookie-secure=false ## - --oidc-issuer-url=https://accounts.google.com # Only needed if provider is oidc ## additionalFlags: [] ## @param authProxy.extraEnvVars Array with extra environment variables to add to the Auth Proxy container ## e.g: ## extraEnvVars: ## - name: FOO ## value: "bar" ## extraEnvVars: [] ## @param authProxy.containerPort Auth Proxy HTTP container port ## containerPort: 3000 ## Configure Container Security Context for Auth Proxy ## ref: https://kubernetes.io/docs/tasks/configure-pod-container/security-context/#set-the-security-context-for-a-container ## @param authProxy.containerSecurityContext.enabled Enabled Auth Proxy containers' Security Context ## @param authProxy.containerSecurityContext.runAsUser Set Auth Proxy container's Security Context runAsUser ## @param authProxy.containerSecurityContext.runAsNonRoot Set Auth Proxy container's Security Context runAsNonRoot ## containerSecurityContext: enabled: true runAsUser: 1001 runAsNonRoot: true ## OAuth2 Proxy containers' resource requests and limits ## ref: https://kubernetes.io/docs/user-guide/compute-resources/ ## @param authProxy.resources.limits.cpu The CPU limits for the OAuth2 Proxy container ## @param authProxy.resources.limits.memory The memory limits for the OAuth2 Proxy container ## @param authProxy.resources.requests.cpu The requested CPU for the OAuth2 Proxy container ## @param authProxy.resources.requests.memory The requested memory for the OAuth2 Proxy container ## resources: limits: cpu: 250m memory: 128Mi requests: cpu: 25m memory: 32Mi ## @section Pinniped Proxy parameters ## Pinniped Proxy configuration for converting user OIDC tokens to k8s client authorization certs ## pinnipedProxy: ## @param pinnipedProxy.enabled Specifies whether Kubeapps should configure Pinniped Proxy ## enabled: false ## Bitnami Pinniped Proxy image ## ref: https://hub.docker.com/r/bitnami/kubeapps-pinniped-proxy/tags/ ## @param pinnipedProxy.image.registry Pinniped Proxy image registry ## @param pinnipedProxy.image.repository Pinniped Proxy image repository ## @param pinnipedProxy.image.tag Pinniped Proxy image tag (immutable tags are recommended) ## @param pinnipedProxy.image.pullPolicy Pinniped Proxy image pull policy ## @param pinnipedProxy.image.pullSecrets Pinniped Proxy image pull secrets ## image: registry: docker.io repository: bitnami/kubeapps-pinniped-proxy tag: 2.4.3-debian-10-r32 ## Specify a imagePullPolicy ## Defaults to 'Always' if image tag is 'latest', else set to 'IfNotPresent' ## ref: https://kubernetes.io/docs/user-guide/images/#pre-pulling-images ## pullPolicy: IfNotPresent ## Optionally specify an array of imagePullSecrets. ## Secrets must be manually created in the namespace. ## ref: https://kubernetes.io/docs/tasks/configure-pod-container/pull-image-private-registry/ ## e.g: ## pullSecrets: ## - myRegistryKeySecretName ## pullSecrets: [] ## @param pinnipedProxy.defaultPinnipedNamespace Specify the (default) namespace in which pinniped concierge is installed ## defaultPinnipedNamespace: pinniped-concierge ## @param pinnipedProxy.defaultAuthenticatorType Specify the (default) authenticator type ## defaultAuthenticatorType: JWTAuthenticator ## @param pinnipedProxy.defaultAuthenticatorName Specify the (default) authenticator name ## defaultAuthenticatorName: jwt-authenticator ## @param pinnipedProxy.defaultPinnipedAPISuffix Specify the (default) API suffix ## defaultPinnipedAPISuffix: pinniped.dev ## @param pinnipedProxy.containerPort Kubeops HTTP container port ## containerPort: 3333 ## Configure Container Security Context for Pinniped Proxy ## ref: https://kubernetes.io/docs/tasks/configure-pod-container/security-context/#set-the-security-context-for-a-container ## @param pinnipedProxy.containerSecurityContext.enabled Enabled Pinniped Proxy containers' Security Context ## @param pinnipedProxy.containerSecurityContext.runAsUser Set Pinniped Proxy container's Security Context runAsUser ## @param pinnipedProxy.containerSecurityContext.runAsNonRoot Set Pinniped Proxy container's Security Context runAsNonRoot ## containerSecurityContext: enabled: true runAsUser: 1001 runAsNonRoot: true ## Pinniped Proxy containers' resource requests and limits ## ref: https://kubernetes.io/docs/user-guide/compute-resources/ ## @param pinnipedProxy.resources.limits.cpu The CPU limits for the Pinniped Proxy container ## @param pinnipedProxy.resources.limits.memory The memory limits for the Pinniped Proxy container ## @param pinnipedProxy.resources.requests.cpu The requested CPU for the Pinniped Proxy container ## @param pinnipedProxy.resources.requests.memory The requested memory for the Pinniped Proxy container ## resources: limits: cpu: 250m memory: 128Mi requests: cpu: 25m memory: 32Mi ## @section Other Parameters ## @param allowNamespaceDiscovery Allow users to discover available namespaces (only the ones they have access) ## NOTE: When set to true, Kubeapps creates a ClusterRole to be able to list namespaces. ## allowNamespaceDiscovery: true ## @param clusters [array] List of clusters that Kubeapps can target for deployments ## When populated with a single cluster (as it is by default), Kubeapps will not allow users to ## change the target cluster. When populated with multiple clusters, Kubeapps will present the clusters to ## the user as potential targets for install or browsing. ## - Note that you can define a single cluster without an apiServiceURL and the chart will assume this is ## the name you are assigning to the cluster on which Kubeapps is itself installed. Specifying more than ## one cluster without an apiServiceURL will cause the chart display an error. ## - The base64-encoded certificateAuthorityData can be obtained from the additional cluster's kube config ## file, for example, to get the ca data for the 0th cluster in your config (adjust the index 0 as necessary): ## kubectl --kubeconfig ~/.kube/kind-config-kubeapps-additional config view --raw -o jsonpath='{.clusters[0].cluster.certificate-authority-data}' ## - serviceToken is an optional token configured to allow LIST namespaces and package manifests (operators) only on the additional cluster ## so that the UI can present a list of (only) those namespaces to which the user has access and the available operators. ## - isKubeappsCluster is an optional parameter that allows defining the cluster in which Kubeapps is installed; ## this param is useful when every cluster is using an apiServiceURL (e.g., when using the Pinniped Impersonation Proxy) ## as the chart cannot infer the cluster on which Kubeapps is installed in that case. ## - pinnipedConfig is an optional parameter that contains configuration options specific to a cluster running the pinniped concierge service. ## e.g.: ## clusters: ## - name: default ## domain: cluster.local ## - name: second-cluster ## domain: cluster.local ## apiServiceURL: https://second-cluster:6443 ## certificateAuthorityData: LS0tLS1CRUdJ... ## serviceToken: ... ## isKubeappsCluster: true ## pinnipedConfig: ## enabled: true ## clusters: - name: default domain: cluster.local ## @skip featureFlags Feature flags (used to switch on development features) ## featureFlags: ## @param featureFlags.operators Enable ingress record generation for Kubeapps ## operators: false ## RBAC configuration ## rbac: ## @param rbac.create Specifies whether RBAC resources should be created ## create: true ## Image used for the tests ## Bitnami NGINX image ## ref: https://hub.docker.com/r/bitnami/nginx/tags/ ## @param testImage.registry NGINX image registry ## @param testImage.repository NGINX image repository ## @param testImage.tag NGINX image tag (immutable tags are recommended) ## @param testImage.pullPolicy NGINX image pull policy ## @param testImage.pullSecrets NGINX image pull secrets ## testImage: registry: docker.io repository: bitnami/nginx tag: 1.21.6-debian-10-r47 ## Specify a imagePullPolicy ## Defaults to 'Always' if image tag is 'latest', else set to 'IfNotPresent' ## ref: https://kubernetes.io/docs/user-guide/images/#pre-pulling-images ## pullPolicy: IfNotPresent ## Optionally specify an array of imagePullSecrets. ## Secrets must be manually created in the namespace. ## ref: https://kubernetes.io/docs/tasks/configure-pod-container/pull-image-private-registry/ ## e.g: ## pullSecrets: ## - myRegistryKeySecretName ## pullSecrets: [] ## @section Database Parameters ## PostgreSQL chart configuration ## ref: https://github.com/bitnami/charts/blob/master/bitnami/postgresql/values.yaml ## postgresql: ## @param postgresql.enabled Deploy a PostgreSQL server to satisfy the applications database requirements ## enabled: true ## @param postgresql.replication.enabled Enable replication for high availability ## replication: enabled: true ## @param postgresql.postgresqlDatabase Database name for Kubeapps to be created on the first run ## postgresqlDatabase: assets ## @param postgresql.postgresqlPassword Password for 'postgres' user ## ref: https://github.com/bitnami/bitnami-docker-postgresql/blob/master/README.md#setting-the-root-password-on-first-run ## postgresqlPassword: "" ## PostgreSQL Persistence parameters ## ref: https://kubernetes.io/docs/user-guide/persistent-volumes/ ## @param postgresql.persistence.enabled Enable persistence on PostgreSQL using PVC(s) ## @param postgresql.persistence.size Persistent Volume size ## persistence: enabled: false size: 8Gi ## @param postgresql.securityContext.enabled Enabled PostgreSQL replicas pods' Security Context ## ref: https://kubernetes.io/docs/tasks/configure-pod-container/security-context/ ## securityContext: enabled: false ## PostreSQL containers' resource requests and limits ## ref: https://kubernetes.io/docs/user-guide/compute-resources/ ## @param postgresql.resources.limits The resources limits for the PostreSQL container ## @param postgresql.resources.requests.cpu The requested CPU for the PostreSQL container ## @param postgresql.resources.requests.memory The requested memory for the PostreSQL container ## resources: limits: {} requests: memory: 256Mi cpu: 250m ## @section kubeappsapis parameters kubeappsapis: ## @param kubeappsapis.enabledPlugins Manually override which plugins are enabled for the Kubeapps-APIs service ## ## NOTE: normally this should remain blank, with the top-level `packaging` ## value automatically determining which plugins should be enabled. Only ## set this value if you want to manually override the list of plugins ## enabled for the service. ## enabledPlugins: [] pluginConfig: core: packages: v1alpha1: versionsInSummary: ## @param kubeappsapis.pluginConfig.core.packages.v1alpha1.versionsInSummary.major Number of major versions to display in the summary major: 3 ## @param kubeappsapis.pluginConfig.core.packages.v1alpha1.versionsInSummary.minor Number of minor versions to display in the summary minor: 3 ## @param kubeappsapis.pluginConfig.core.packages.v1alpha1.versionsInSummary.patch Number of patch versions to display in the summary patch: 3 ## @param kubeappsapis.pluginConfig.core.packages.v1alpha1.timeoutSeconds Value to wait for Kubernetes commands to complete timeoutSeconds: 300 kappController: packages: v1alpha1: ## @param kubeappsapis.pluginConfig.kappController.packages.v1alpha1.defaultUpgradePolicy Default upgrade policy generating version constraints ## enum: [ "major", "minor", "patch", "none" ] defaultUpgradePolicy: none ## @param kubeappsapis.pluginConfig.kappController.packages.v1alpha1.defaultPrereleasesVersionSelection [array,nullable] Default policy for allowing prereleases containing one of the identifiers ## ref: https://carvel.dev/kapp-controller/docs/latest/package-consumer-concepts/#prereleases ## e.g: # defaultPrereleasesVersionSelection: # - rc defaultPrereleasesVersionSelection: null ## @param kubeappsapis.pluginConfig.kappController.packages.v1alpha1.defaultAllowDowngrades Default policy for allowing applications to be downgraded to previous versions ## ref: https://carvel.dev/kapp-controller/docs/latest/package-consumer-concepts/#downgrading defaultAllowDowngrades: false ## Bitnami Kubeapps-APIs image ## ref: https://hub.docker.com/r/bitnami/kubeapps-apis/tags/ ## @param kubeappsapis.image.registry Kubeapps-APIs image registry ## @param kubeappsapis.image.repository Kubeapps-APIs image repository ## @param kubeappsapis.image.tag Kubeapps-APIs image tag (immutable tags are recommended) ## @param kubeappsapis.image.pullPolicy Kubeapps-APIs image pull policy ## @param kubeappsapis.image.pullSecrets Kubeapps-APIs image pull secrets ## image: registry: docker.io repository: bitnami/kubeapps-apis tag: 2.4.3-debian-10-r33 ## Specify a imagePullPolicy ## Defaults to 'Always' if image tag is 'latest', else set to 'IfNotPresent' ## ref: https://kubernetes.io/docs/user-guide/images/#pre-pulling-images ## pullPolicy: IfNotPresent ## Optionally specify an array of imagePullSecrets. ## Secrets must be manually created in the namespace. ## ref: https://kubernetes.io/docs/tasks/configure-pod-container/pull-image-private-registry/ ## e.g: ## pullSecrets: ## - myRegistryKeySecretName ## pullSecrets: [] ## @param kubeappsapis.replicaCount Number of frontend replicas to deploy ## replicaCount: 2 ## @param kubeappsapis.qps KubeappsAPIs Kubernetes API client QPS limit ## qps: "50.0" ## @param kubeappsapis.burst KubeappsAPIs Kubernetes API client Burst limit ## burst: "100" ## @param kubeappsapis.terminationGracePeriodSeconds The grace time period for sig term ## ref: https://kubernetes.io/docs/concepts/containers/container-lifecycle-hooks/#hook-handler-execution ## terminationGracePeriodSeconds: 300 ## @param kubeappsapis.extraEnvVars Array with extra environment variables to add to the KubeappsAPIs container ## e.g: ## extraEnvVars: ## - name: FOO ## value: "bar" ## extraEnvVars: [] ## @param kubeappsapis.extraEnvVarsCM Name of existing ConfigMap containing extra env vars for the KubeappsAPIs container ## extraEnvVarsCM: "" ## @param kubeappsapis.extraEnvVarsSecret Name of existing Secret containing extra env vars for the KubeappsAPIs container ## extraEnvVarsSecret: "" ## @param kubeappsapis.containerPort KubeappsAPIs HTTP container port ## containerPort: 50051 ## KubeappsAPIs containers' resource requests and limits ## ref: https://kubernetes.io/docs/user-guide/compute-resources/ ## @param kubeappsapis.resources.limits.cpu The CPU limits for the KubeappsAPIs container ## @param kubeappsapis.resources.limits.memory The memory limits for the KubeappsAPIs container ## @param kubeappsapis.resources.requests.cpu The requested CPU for the KubeappsAPIs container ## @param kubeappsapis.resources.requests.memory The requested memory for the KubeappsAPIs container ## resources: limits: cpu: 250m memory: 256Mi requests: cpu: 25m memory: 32Mi ## Configure Pods Security Context ## ref: https://kubernetes.io/docs/tasks/configure-pod-container/security-context/#set-the-security-context-for-a-pod ## @param kubeappsapis.podSecurityContext.enabled Enabled KubeappsAPIs pods' Security Context ## @param kubeappsapis.podSecurityContext.fsGroup Set KubeappsAPIs pod's Security Context fsGroup ## podSecurityContext: enabled: true fsGroup: 1001 ## Configure Container Security Context (only main container) ## ref: https://kubernetes.io/docs/tasks/configure-pod-container/security-context/#set-the-security-context-for-a-container ## @param kubeappsapis.containerSecurityContext.enabled Enabled KubeappsAPIs containers' Security Context ## @param kubeappsapis.containerSecurityContext.runAsUser Set KubeappsAPIs container's Security Context runAsUser ## @param kubeappsapis.containerSecurityContext.runAsNonRoot Set KubeappsAPIs container's Security Context runAsNonRoot ## containerSecurityContext: enabled: true runAsUser: 1001 runAsNonRoot: true ## Configure extra options for KubeappsAPIs containers' liveness and readiness probes ## ref: https://kubernetes.io/docs/tasks/configure-pod-container/configure-liveness-readiness-probes/#configure-probes ## @param kubeappsapis.livenessProbe.enabled Enable livenessProbe ## @skip kubeappsapis.livenessProbe.httpGet ## @param kubeappsapis.livenessProbe.initialDelaySeconds Initial delay seconds for livenessProbe ## @param kubeappsapis.livenessProbe.periodSeconds Period seconds for livenessProbe ## @param kubeappsapis.livenessProbe.timeoutSeconds Timeout seconds for livenessProbe ## @param kubeappsapis.livenessProbe.failureThreshold Failure threshold for livenessProbe ## @param kubeappsapis.livenessProbe.successThreshold Success threshold for livenessProbe ## KubeappsAPIs containers' liveness and readiness probes ## ref: https://kubernetes.io/docs/concepts/workloads/pods/pod-lifecycle/#container-probes ## livenessProbe: enabled: true httpGet: path: /core/plugins/v1alpha1/configured-plugins port: 50051 initialDelaySeconds: 60 periodSeconds: 10 timeoutSeconds: 5 failureThreshold: 6 successThreshold: 1 ## @param kubeappsapis.readinessProbe.enabled Enable readinessProbe ## @skip kubeappsapis.readinessProbe.httpGet ## @param kubeappsapis.readinessProbe.initialDelaySeconds Initial delay seconds for readinessProbe ## @param kubeappsapis.readinessProbe.periodSeconds Period seconds for readinessProbe ## @param kubeappsapis.readinessProbe.timeoutSeconds Timeout seconds for readinessProbe ## @param kubeappsapis.readinessProbe.failureThreshold Failure threshold for readinessProbe ## @param kubeappsapis.readinessProbe.successThreshold Success threshold for readinessProbe ## readinessProbe: enabled: true httpGet: path: /core/plugins/v1alpha1/configured-plugins port: 50051 initialDelaySeconds: 0 periodSeconds: 10 timeoutSeconds: 5 failureThreshold: 6 successThreshold: 1 ## @param kubeappsapis.customLivenessProbe Custom livenessProbe that overrides the default one ## customLivenessProbe: {} ## @param kubeappsapis.customReadinessProbe Custom readinessProbe that overrides the default one ## customReadinessProbe: {} ## @param kubeappsapis.lifecycleHooks Custom lifecycle hooks for KubeappsAPIs containers ## lifecycleHooks: {} ## @param kubeappsapis.podLabels Extra labels for KubeappsAPIs pods ## ref: https://kubernetes.io/docs/concepts/overview/working-with-objects/labels/ ## podLabels: {} ## @param kubeappsapis.podAnnotations Annotations for KubeappsAPIs pods ## ref: https://kubernetes.io/docs/concepts/overview/working-with-objects/annotations/ ## podAnnotations: {} ## @param kubeappsapis.podAffinityPreset Pod affinity preset. Ignored if `affinity` is set. Allowed values: `soft` or `hard` ## ref: https://kubernetes.io/docs/concepts/scheduling-eviction/assign-pod-node/#inter-pod-affinity-and-anti-affinity ## podAffinityPreset: "" ## @param kubeappsapis.podAntiAffinityPreset Pod anti-affinity preset. Ignored if `affinity` is set. Allowed values: `soft` or `hard` ## Ref: https://kubernetes.io/docs/concepts/scheduling-eviction/assign-pod-node/#inter-pod-affinity-and-anti-affinity ## podAntiAffinityPreset: soft ## nodeAffinityPreset Node affinity preset ## Ref: https://kubernetes.io/docs/concepts/scheduling-eviction/assign-pod-node/#node-affinity ## nodeAffinityPreset: ## @param kubeappsapis.nodeAffinityPreset.type Node affinity preset type. Ignored if `affinity` is set. Allowed values: `soft` or `hard` ## type: "" ## @param kubeappsapis.nodeAffinityPreset.key Node label key to match. Ignored if `affinity` is set ## key: "" ## @param kubeappsapis.nodeAffinityPreset.values Node label values to match. Ignored if `affinity` is set ## E.g. ## values: ## - e2e-az1 ## - e2e-az2 ## values: [] ## @param kubeappsapis.affinity Affinity for pod assignment ## Ref: https://kubernetes.io/docs/concepts/configuration/assign-pod-node/#affinity-and-anti-affinity ## NOTE: kubeappsapis.podAffinityPreset, kubeappsapis.podAntiAffinityPreset, and kubeappsapis.nodeAffinityPreset will be ignored when it's set ## affinity: {} ## @param kubeappsapis.nodeSelector Node labels for pod assignment ## ref: https://kubernetes.io/docs/user-guide/node-selection/ ## nodeSelector: {} ## @param kubeappsapis.tolerations Tolerations for pod assignment ## ref: https://kubernetes.io/docs/concepts/configuration/taint-and-toleration/ ## tolerations: [] ## @param kubeappsapis.priorityClassName Priority class name for KubeappsAPIs pods ## priorityClassName: "" ## @param kubeappsapis.hostAliases Custom host aliases for KubeappsAPIs pods ## https://kubernetes.io/docs/concepts/services-networking/add-entries-to-pod-etc-hosts-with-host-aliases/ ## hostAliases: [] ## kubeappsapis service parameters ## service: ## @param kubeappsapis.service.port KubeappsAPIs service HTTP port ## port: 8080 ## @param kubeappsapis.service.annotations Additional custom annotations for KubeappsAPIs service ## annotations: {} ## @section Redis&trade; chart configuration ## ref: https://github.com/bitnami/charts/blob/master/bitnami/redis/values.yaml ## ## Redis will be enabled and installed if `packages.flux.enabled` is true. redis: ## @param redis.redisPassword Password used in Redis&trade; ## ref: https://github.com/bitnami/bitnami-docker-redis/blob/master/README.md#setting-the-server-password-on-first-run ## redisPassword: "" master: ## @param redis.master.extraFlags Array with additional command line flags for Redis&trade; master extraFlags: ## The maxmemory configuration directive is used in order to configure Redis to use a specified ## amount of memory for the data set. Setting maxmemory to zero results into no memory limits ## see https://redis.io/topics/lru-cache for more details - "--maxmemory 200mb" ## The exact behavior Redis follows when the maxmemory limit is reached is configured using the ## maxmemory-policy configuration directive ## allkeys-lru: evict keys by trying to remove the less recently used (LRU) keys first, in order ## to make space for the new data added - "--maxmemory-policy allkeys-lru" ## ref https://stackoverflow.com/questions/22815364/flushall-and-flushdb-commands-on-redis-return-unk-command ## Redis official Helm chart by default disables FLUSHDB and FLUSHALL commands ## @param redis.master.disableCommands Array with commands to deactivate on Redis&trade disableCommands: [] replica: ## @param redis.replica.replicaCount Number of Redis&trade; replicas to deploy replicaCount: 1 ## @param redis.replica.extraFlags Array with additional command line flags for Redis&trade; replicas extraFlags: ## The maxmemory configuration directive is used in order to configure Redis to use a specified ## amount of memory for the data set. Setting maxmemory to zero results into no memory limits - "--maxmemory 200mb" ## The exact behavior Redis follows when the maxmemory limit is reached is configured using the ## maxmemory-policy configuration directive ## allkeys-lru: evict keys by trying to remove the less recently used (LRU) keys first, in order ## to make space for the new data added - "--maxmemory-policy allkeys-lru" ## ref https://stackoverflow.com/questions/22815364/flushall-and-flushdb-commands-on-redis-return-unk-command ## Redis official Helm chart by default disables FLUSHDB and FLUSHALL commands ## @param redis.replica.disableCommands Array with commands to deactivate on Redis&trade disableCommands: []
44.302935
204
0.738767
763d34dca0599cd4e020d545757c24410bfc5d59
37,255
yaml
YAML
bitnami/wordpress-intel/values.yaml
00arthur00/charts
502aa1e64541669b732a4eda896e5937847b6c3c
[ "Apache-2.0" ]
null
null
null
bitnami/wordpress-intel/values.yaml
00arthur00/charts
502aa1e64541669b732a4eda896e5937847b6c3c
[ "Apache-2.0" ]
2
2022-01-26T01:14:30.000Z
2022-01-26T07:03:39.000Z
bitnami/wordpress-intel/values.yaml
00arthur00/charts
502aa1e64541669b732a4eda896e5937847b6c3c
[ "Apache-2.0" ]
null
null
null
## @section Global parameters ## Global Docker image parameters ## Please, note that this will override the image parameters, including dependencies, configured to use the global value ## Current available global Docker image parameters: imageRegistry, imagePullSecrets and storageClass ## @param global.imageRegistry Global Docker image registry ## @param global.imagePullSecrets Global Docker registry secret names as an array ## @param global.storageClass Global StorageClass for Persistent Volume(s) ## global: imageRegistry: "" ## E.g. ## imagePullSecrets: ## - myRegistryKeySecretName ## imagePullSecrets: [] storageClass: "" ## @section Common parameters ## @param kubeVersion Override Kubernetes version ## kubeVersion: "" ## @param nameOverride String to partially override common.names.fullname ## nameOverride: "" ## @param fullnameOverride String to fully override common.names.fullname ## fullnameOverride: "" ## @param commonLabels Labels to add to all deployed objects ## commonLabels: {} ## @param commonAnnotations Annotations to add to all deployed objects ## commonAnnotations: {} ## @param clusterDomain Kubernetes cluster domain name ## clusterDomain: cluster.local ## @param extraDeploy Array of extra objects to deploy with the release ## extraDeploy: [] ## Enable diagnostic mode in the deployment ## diagnosticMode: ## @param diagnosticMode.enabled Enable diagnostic mode (all probes will be disabled and the command will be overridden) ## enabled: false ## @param diagnosticMode.command Command to override all containers in the deployment ## command: - sleep ## @param diagnosticMode.args Args to override all containers in the deployment ## args: - infinity ## @section WordPress Image parameters ## Bitnami WordPress image ## ref: https://hub.docker.com/r/bitnami/wordpress/tags/ ## @param image.registry WordPress image registry ## @param image.repository WordPress image repository ## @param image.tag WordPress image tag (immutable tags are recommended) ## @param image.pullPolicy WordPress image pull policy ## @param image.pullSecrets WordPress image pull secrets ## @param image.debug Enable image debug mode ## image: registry: docker.io repository: bitnami/wordpress-intel tag: 5.9.2-debian-10-r4 ## Specify a imagePullPolicy ## Defaults to 'Always' if image tag is 'latest', else set to 'IfNotPresent' ## ref: https://kubernetes.io/docs/user-guide/images/#pre-pulling-images ## pullPolicy: IfNotPresent ## Optionally specify an array of imagePullSecrets. ## Secrets must be manually created in the namespace. ## ref: https://kubernetes.io/docs/tasks/configure-pod-container/pull-image-private-registry/ ## e.g: ## pullSecrets: ## - myRegistryKeySecretName ## pullSecrets: [] ## Enable debug mode ## debug: false ## @section WordPress Configuration parameters ## WordPress settings based on environment variables ## ref: https://github.com/bitnami/bitnami-docker-wordpress#environment-variables ## @param wordpressUsername WordPress username ## wordpressUsername: user ## @param wordpressPassword WordPress user password ## Defaults to a random 10-character alphanumeric string if not set ## wordpressPassword: "" ## @param existingSecret Name of existing secret containing WordPress credentials ## NOTE: Must contain key `wordpress-password` ## NOTE: When it's set, the `wordpressPassword` parameter is ignored ## existingSecret: "" ## @param wordpressEmail WordPress user email ## wordpressEmail: [email protected] ## @param wordpressFirstName WordPress user first name ## wordpressFirstName: FirstName ## @param wordpressLastName WordPress user last name ## wordpressLastName: LastName ## @param wordpressBlogName Blog name ## wordpressBlogName: User's Blog! ## @param wordpressTablePrefix Prefix to use for WordPress database tables ## wordpressTablePrefix: wp_ ## @param wordpressScheme Scheme to use to generate WordPress URLs ## wordpressScheme: http ## @param wordpressSkipInstall Skip wizard installation ## NOTE: useful if you use an external database that already contains WordPress data ## ref: https://github.com/bitnami/bitnami-docker-wordpress#connect-wordpress-docker-container-to-an-existing-database ## wordpressSkipInstall: false ## @param wordpressExtraConfigContent Add extra content to the default wp-config.php file ## e.g: ## wordpressExtraConfigContent: | ## @ini_set( 'post_max_size', '128M'); ## @ini_set( 'memory_limit', '256M' ); ## wordpressExtraConfigContent: "" ## @param wordpressConfiguration The content for your custom wp-config.php file (advanced feature) ## NOTE: This will override configuring WordPress based on environment variables (including those set by the chart) ## NOTE: Currently only supported when `wordpressSkipInstall=true` ## wordpressConfiguration: "" ## @param existingWordPressConfigurationSecret The name of an existing secret with your custom wp-config.php file (advanced feature) ## NOTE: When it's set the `wordpressConfiguration` parameter is ignored ## existingWordPressConfigurationSecret: "" ## @param wordpressConfigureCache Enable W3 Total Cache plugin and configure cache settings ## NOTE: useful if you deploy Memcached for caching database queries or you use an external cache server ## wordpressConfigureCache: false ## @param wordpressAutoUpdateLevel Level of auto-updates to allow. Allowed values: `major`, `minor` or `none`. ## wordpressAutoUpdateLevel: none ## @param wordpressPlugins Array of plugins to install and activate. Can be specified as `all` or `none`. ## NOTE: If set to all, only plugins that are already installed will be activated, and if set to none, no plugins will be activated ## wordpressPlugins: none ## @param customPostInitScripts Custom post-init.d user scripts ## ref: https://github.com/bitnami/bitnami-docker-wordpress/tree/master/5/debian-10/rootfs/post-init.d ## NOTE: supported formats are `.sh`, `.sql` or `.php` ## NOTE: scripts are exclusively executed during the 1st boot of the container ## customPostInitScripts: {} ## SMTP mail delivery configuration ## ref: https://github.com/bitnami/bitnami-docker-wordpress/#smtp-configuration ## @param smtpHost SMTP server host ## @param smtpPort SMTP server port ## @param smtpUser SMTP username ## @param smtpPassword SMTP user password ## @param smtpProtocol SMTP protocol ## smtpHost: "" smtpPort: "" smtpUser: "" smtpPassword: "" smtpProtocol: "" ## @param smtpExistingSecret The name of an existing secret with SMTP credentials ## NOTE: Must contain key `smtp-password` ## NOTE: When it's set, the `smtpPassword` parameter is ignored ## smtpExistingSecret: "" ## @param allowEmptyPassword Allow the container to be started with blank passwords ## allowEmptyPassword: true ## @param command Override default container command (useful when using custom images) ## command: [] ## @param args Override default container args (useful when using custom images) ## args: [] ## @param extraEnvVars Array with extra environment variables to add to the WordPress container ## e.g: ## extraEnvVars: ## - name: FOO ## value: "bar" ## extraEnvVars: [] ## @param extraEnvVarsCM Name of existing ConfigMap containing extra env vars ## extraEnvVarsCM: "" ## @param extraEnvVarsSecret Name of existing Secret containing extra env vars ## extraEnvVarsSecret: "" ## @section WordPress Multisite Configuration parameters ## ref: https://github.com/bitnami/bitnami-docker-wordpress#multisite-configuration ## @param multisite.enable Whether to enable WordPress Multisite configuration. ## @param multisite.host WordPress Multisite hostname/address. This value is mandatory when enabling Multisite mode. ## @param multisite.networkType WordPress Multisite network type to enable. Allowed values: `subfolder`, `subdirectory` or `subdomain`. ## @param multisite.enableNipIoRedirect Whether to enable IP address redirection to nip.io wildcard DNS. Useful when running on an IP address with subdomain network type. ## multisite: enable: false host: "" networkType: subdomain enableNipIoRedirect: false ## @section WordPress deployment parameters ## @param replicaCount Number of WordPress replicas to deploy ## NOTE: ReadWriteMany PVC(s) are required if replicaCount > 1 ## replicaCount: 1 ## @param updateStrategy.type WordPress deployment strategy type ## @param updateStrategy.rollingUpdate WordPress deployment rolling update configuration parameters ## ref: https://kubernetes.io/docs/concepts/workloads/controllers/deployment/#strategy ## NOTE: Set it to `Recreate` if you use a PV that cannot be mounted on multiple pods ## e.g: ## updateStrategy: ## type: RollingUpdate ## rollingUpdate: ## maxSurge: 25% ## maxUnavailable: 25% ## updateStrategy: type: RollingUpdate rollingUpdate: {} ## @param schedulerName Alternate scheduler ## ref: https://kubernetes.io/docs/tasks/administer-cluster/configure-multiple-schedulers/ ## schedulerName: "" ## @param serviceAccountName ServiceAccount name ## serviceAccountName: default ## @param hostAliases [array] WordPress pod host aliases ## https://kubernetes.io/docs/concepts/services-networking/add-entries-to-pod-etc-hosts-with-host-aliases/ ## hostAliases: [] ## @param extraVolumes Optionally specify extra list of additional volumes for WordPress pods ## extraVolumes: [] ## @param extraVolumeMounts Optionally specify extra list of additional volumeMounts for WordPress container(s) ## extraVolumeMounts: [] ## @param extraContainerPorts Optionally specify extra list of additional ports for WordPress container(s) ## e.g: ## extraContainerPorts: ## - name: myservice ## containerPort: 9090 ## extraContainerPorts: [] ## @param sidecars Add additional sidecar containers to the WordPress pod ## e.g: ## sidecars: ## - name: your-image-name ## image: your-image ## imagePullPolicy: Always ## ports: ## - name: portname ## containerPort: 1234 ## sidecars: [] ## @param initContainers Add additional init containers to the WordPress pods ## ref: https://kubernetes.io/docs/concepts/workloads/pods/init-containers/ ## e.g: ## initContainers: ## - name: your-image-name ## image: your-image ## imagePullPolicy: Always ## command: ['sh', '-c', 'copy themes and plugins from git and push to /bitnami/wordpress/wp-content. Should work with extraVolumeMounts and extraVolumes'] ## initContainers: [] ## @param podLabels Extra labels for WordPress pods ## ref: https://kubernetes.io/docs/concepts/overview/working-with-objects/labels/ ## podLabels: {} ## @param podAnnotations Annotations for WordPress pods ## ref: https://kubernetes.io/docs/concepts/overview/working-with-objects/annotations/ ## podAnnotations: {} ## @param podAffinityPreset Pod affinity preset. Ignored if `affinity` is set. Allowed values: `soft` or `hard` ## ref: https://kubernetes.io/docs/concepts/scheduling-eviction/assign-pod-node/#inter-pod-affinity-and-anti-affinity ## podAffinityPreset: "" ## @param podAntiAffinityPreset Pod anti-affinity preset. Ignored if `affinity` is set. Allowed values: `soft` or `hard` ## Ref: https://kubernetes.io/docs/concepts/scheduling-eviction/assign-pod-node/#inter-pod-affinity-and-anti-affinity ## podAntiAffinityPreset: soft ## Node affinity preset ## Ref: https://kubernetes.io/docs/concepts/scheduling-eviction/assign-pod-node/#node-affinity ## nodeAffinityPreset: ## @param nodeAffinityPreset.type Node affinity preset type. Ignored if `affinity` is set. Allowed values: `soft` or `hard` ## type: "" ## @param nodeAffinityPreset.key Node label key to match. Ignored if `affinity` is set ## key: "" ## @param nodeAffinityPreset.values Node label values to match. Ignored if `affinity` is set ## E.g. ## values: ## - e2e-az1 ## - e2e-az2 ## values: [] ## @param affinity Affinity for pod assignment ## Ref: https://kubernetes.io/docs/concepts/configuration/assign-pod-node/#affinity-and-anti-affinity ## NOTE: podAffinityPreset, podAntiAffinityPreset, and nodeAffinityPreset will be ignored when it's set ## affinity: {} ## @param nodeSelector Node labels for pod assignment ## ref: https://kubernetes.io/docs/user-guide/node-selection/ ## nodeSelector: {} ## @param tolerations Tolerations for pod assignment ## ref: https://kubernetes.io/docs/concepts/configuration/taint-and-toleration/ ## tolerations: [] ## WordPress containers' resource requests and limits ## ref: https://kubernetes.io/docs/user-guide/compute-resources/ ## @param resources.limits The resources limits for the WordPress container ## @param resources.requests [object] The requested resources for the WordPress container ## resources: limits: {} requests: memory: 512Mi cpu: 300m ## Container ports ## @param containerPorts.http WordPress HTTP container port ## @param containerPorts.https WordPress HTTPS container port ## containerPorts: http: 8080 https: 8443 ## Configure Pods Security Context ## ref: https://kubernetes.io/docs/tasks/configure-pod-container/security-context/#set-the-security-context-for-a-pod ## @param podSecurityContext.enabled Enabled WordPress pods' Security Context ## @param podSecurityContext.fsGroup Set WordPress pod's Security Context fsGroup ## podSecurityContext: enabled: true fsGroup: 1001 ## Configure Container Security Context (only main container) ## ref: https://kubernetes.io/docs/tasks/configure-pod-container/security-context/#set-the-security-context-for-a-container ## @param containerSecurityContext.enabled Enabled WordPress containers' Security Context ## @param containerSecurityContext.runAsUser Set WordPress container's Security Context runAsUser ## @param containerSecurityContext.runAsNonRoot Set WordPress container's Security Context runAsNonRoot ## containerSecurityContext: enabled: true runAsUser: 1001 runAsNonRoot: true ## Configure extra options for WordPress containers' liveness and readiness probes ## ref: https://kubernetes.io/docs/tasks/configure-pod-container/configure-liveness-readiness-probes/#configure-probes ## @param livenessProbe.enabled Enable livenessProbe ## @skip livenessProbe.httpGet ## @param livenessProbe.initialDelaySeconds Initial delay seconds for livenessProbe ## @param livenessProbe.periodSeconds Period seconds for livenessProbe ## @param livenessProbe.timeoutSeconds Timeout seconds for livenessProbe ## @param livenessProbe.failureThreshold Failure threshold for livenessProbe ## @param livenessProbe.successThreshold Success threshold for livenessProbe ## livenessProbe: enabled: true httpGet: path: /wp-admin/install.php port: '{{ .Values.wordpressScheme }}' scheme: '{{ .Values.wordpressScheme | upper }}' ## If using an HTTPS-terminating load-balancer, the probes may need to behave ## like the balancer to prevent HTTP 302 responses. According to the Kubernetes ## docs, 302 should be considered "successful", but this issue on GitHub ## (https://github.com/kubernetes/kubernetes/issues/47893) shows that it isn't. ## E.g. ## httpHeaders: ## - name: X-Forwarded-Proto ## value: https ## httpHeaders: [] initialDelaySeconds: 120 periodSeconds: 10 timeoutSeconds: 5 failureThreshold: 6 successThreshold: 1 ## @param readinessProbe.enabled Enable readinessProbe ## @skip readinessProbe.httpGet ## @param readinessProbe.initialDelaySeconds Initial delay seconds for readinessProbe ## @param readinessProbe.periodSeconds Period seconds for readinessProbe ## @param readinessProbe.timeoutSeconds Timeout seconds for readinessProbe ## @param readinessProbe.failureThreshold Failure threshold for readinessProbe ## @param readinessProbe.successThreshold Success threshold for readinessProbe ## readinessProbe: enabled: true httpGet: path: /wp-login.php port: '{{ .Values.wordpressScheme }}' scheme: '{{ .Values.wordpressScheme | upper }}' ## If using an HTTPS-terminating load-balancer, the probes may need to behave ## like the balancer to prevent HTTP 302 responses. According to the Kubernetes ## docs, 302 should be considered "successful", but this issue on GitHub ## (https://github.com/kubernetes/kubernetes/issues/47893) shows that it isn't. ## E.g. ## httpHeaders: ## - name: X-Forwarded-Proto ## value: https ## httpHeaders: [] initialDelaySeconds: 30 periodSeconds: 10 timeoutSeconds: 5 failureThreshold: 6 successThreshold: 1 ## @param customLivenessProbe Custom livenessProbe that overrides the default one ## customLivenessProbe: {} ## @param customReadinessProbe Custom readinessProbe that overrides the default one ## customReadinessProbe: {} ## @section Traffic Exposure Parameters ## WordPress service parameters ## service: ## @param service.type WordPress service type ## type: LoadBalancer ## @param service.port WordPress service HTTP port ## port: 80 ## @param service.httpsPort WordPress service HTTPS port ## httpsPort: 443 ## @param service.httpsTargetPort Target port for HTTPS ## httpsTargetPort: https ## Node ports to expose ## @param service.nodePorts.http Node port for HTTP ## @param service.nodePorts.https Node port for HTTPS ## NOTE: choose port between <30000-32767> ## nodePorts: http: "" https: "" ## @param service.clusterIP WordPress service Cluster IP ## e.g.: ## clusterIP: None ## clusterIP: "" ## @param service.loadBalancerIP WordPress service Load Balancer IP ## ref: https://kubernetes.io/docs/concepts/services-networking/service/#type-loadbalancer ## loadBalancerIP: "" ## @param service.loadBalancerSourceRanges WordPress service Load Balancer sources ## ref: https://kubernetes.io/docs/tasks/access-application-cluster/configure-cloud-provider-firewall/#restrict-access-for-loadbalancer-service ## e.g: ## loadBalancerSourceRanges: ## - 10.10.10.0/24 ## loadBalancerSourceRanges: [] ## @param service.externalTrafficPolicy WordPress service external traffic policy ## ref https://kubernetes.io/docs/tasks/access-application-cluster/create-external-load-balancer/#preserving-the-client-source-ip ## externalTrafficPolicy: Cluster ## @param service.annotations Additional custom annotations for WordPress service ## annotations: {} ## @param service.extraPorts Extra port to expose on WordPress service ## extraPorts: [] ## Configure the ingress resource that allows you to access the WordPress installation ## ref: https://kubernetes.io/docs/concepts/services-networking/ingress/ ## ingress: ## @param ingress.enabled Enable ingress record generation for WordPress ## enabled: false ## DEPRECATED: Use ingress.annotations instead of ingress.certManager ## certManager: false ## ## @param ingress.pathType Ingress path type ## pathType: ImplementationSpecific ## @param ingress.apiVersion Force Ingress API version (automatically detected if not set) ## apiVersion: "" ## @param ingress.ingressClassName IngressClass that will be be used to implement the Ingress (Kubernetes 1.18+) ## This is supported in Kubernetes 1.18+ and required if you have more than one IngressClass marked as the default for your cluster . ## ref: https://kubernetes.io/blog/2020/04/02/improvements-to-the-ingress-api-in-kubernetes-1.18/ ## ingressClassName: "" ## @param ingress.hostname Default host for the ingress record ## hostname: wordpress.local ## @param ingress.path Default path for the ingress record ## NOTE: You may need to set this to '/*' in order to use this with ALB ingress controllers ## path: / ## @param ingress.annotations Additional annotations for the Ingress resource. To enable certificate autogeneration, place here your cert-manager annotations. ## For a full list of possible ingress annotations, please see ## ref: https://github.com/kubernetes/ingress-nginx/blob/master/docs/user-guide/nginx-configuration/annotations.md ## Use this parameter to set the required annotations for cert-manager, see ## ref: https://cert-manager.io/docs/usage/ingress/#supported-annotations ## ## e.g: ## annotations: ## kubernetes.io/ingress.class: nginx ## cert-manager.io/cluster-issuer: cluster-issuer-name ## annotations: {} ## @param ingress.tls Enable TLS configuration for the host defined at `ingress.hostname` parameter ## TLS certificates will be retrieved from a TLS secret with name: `{{- printf "%s-tls" .Values.ingress.hostname }}` ## You can: ## - Use the `ingress.secrets` parameter to create this TLS secret ## - Relay on cert-manager to create it by setting the corresponding annotations ## - Relay on Helm to create self-signed certificates by setting `ingress.tls=true` and `ingress.certManager=false` ## tls: false ## @param ingress.extraHosts An array with additional hostname(s) to be covered with the ingress record ## e.g: ## extraHosts: ## - name: wordpress.local ## path: / ## extraHosts: [] ## @param ingress.extraPaths An array with additional arbitrary paths that may need to be added to the ingress under the main host ## e.g: ## extraPaths: ## - path: /* ## backend: ## serviceName: ssl-redirect ## servicePort: use-annotation ## extraPaths: [] ## @param ingress.extraTls TLS configuration for additional hostname(s) to be covered with this ingress record ## ref: https://kubernetes.io/docs/concepts/services-networking/ingress/#tls ## e.g: ## extraTls: ## - hosts: ## - wordpress.local ## secretName: wordpress.local-tls ## extraTls: [] ## @param ingress.secrets Custom TLS certificates as secrets ## NOTE: 'key' and 'certificate' are expected in PEM format ## NOTE: 'name' should line up with a 'secretName' set further up ## If it is not set and you're using cert-manager, this is unneeded, as it will create a secret for you with valid certificates ## If it is not set and you're NOT using cert-manager either, self-signed certificates will be created valid for 365 days ## It is also possible to create and manage the certificates outside of this helm chart ## Please see README.md for more information ## e.g: ## secrets: ## - name: wordpress.local-tls ## key: |- ## -----BEGIN RSA PRIVATE KEY----- ## ... ## -----END RSA PRIVATE KEY----- ## certificate: |- ## -----BEGIN CERTIFICATE----- ## ... ## -----END CERTIFICATE----- ## secrets: [] ## @section Persistence Parameters ## Persistence Parameters ## ref: https://kubernetes.io/docs/user-guide/persistent-volumes/ ## persistence: ## @param persistence.enabled Enable persistence using Persistent Volume Claims ## enabled: true ## @param persistence.storageClass Persistent Volume storage class ## If defined, storageClassName: <storageClass> ## If set to "-", storageClassName: "", which disables dynamic provisioning ## If undefined (the default) or set to null, no storageClassName spec is set, choosing the default provisioner ## storageClass: "" ## @param persistence.accessModes [array] Persistent Volume access modes ## accessModes: - ReadWriteOnce ## @param persistence.accessMode Persistent Volume access mode (DEPRECATED: use `persistence.accessModes` instead) ## accessMode: ReadWriteOnce ## @param persistence.size Persistent Volume size ## size: 10Gi ## @param persistence.dataSource Custom PVC data source ## dataSource: {} ## @param persistence.existingClaim The name of an existing PVC to use for persistence ## existingClaim: "" ## 'volumePermissions' init container parameters ## Changes the owner and group of the persistent volume mount point to runAsUser:fsGroup values ## based on the podSecurityContext/containerSecurityContext parameters ## volumePermissions: ## @param volumePermissions.enabled Enable init container that changes the owner/group of the PV mount point to `runAsUser:fsGroup` ## enabled: false ## Bitnami Shell image ## ref: https://hub.docker.com/r/bitnami/bitnami-shell/tags/ ## @param volumePermissions.image.registry Bitnami Shell image registry ## @param volumePermissions.image.repository Bitnami Shell image repository ## @param volumePermissions.image.tag Bitnami Shell image tag (immutable tags are recommended) ## @param volumePermissions.image.pullPolicy Bitnami Shell image pull policy ## @param volumePermissions.image.pullSecrets Bitnami Shell image pull secrets ## image: registry: docker.io repository: bitnami/bitnami-shell tag: 10-debian-10-r366 pullPolicy: IfNotPresent ## Optionally specify an array of imagePullSecrets. ## Secrets must be manually created in the namespace. ## ref: https://kubernetes.io/docs/tasks/configure-pod-container/pull-image-private-registry/ ## e.g: ## pullSecrets: ## - myRegistryKeySecretName ## pullSecrets: [] ## Init container's resource requests and limits ## ref: https://kubernetes.io/docs/user-guide/compute-resources/ ## @param volumePermissions.resources.limits The resources limits for the init container ## @param volumePermissions.resources.requests The requested resources for the init container ## resources: limits: {} requests: {} ## Init container Container Security Context ## ref: https://kubernetes.io/docs/tasks/configure-pod-container/security-context/#set-the-security-context-for-a-container ## @param volumePermissions.securityContext.runAsUser Set init container's Security Context runAsUser ## NOTE: when runAsUser is set to special value "auto", init container will try to chown the ## data folder to auto-determined user&group, using commands: `id -u`:`id -G | cut -d" " -f2` ## "auto" is especially useful for OpenShift which has scc with dynamic user ids (and 0 is not allowed) ## securityContext: runAsUser: 0 ## @section Other Parameters ## Wordpress Pod Disruption Budget configuration ## ref: https://kubernetes.io/docs/tasks/run-application/configure-pdb/ ## @param pdb.create Enable a Pod Disruption Budget creation ## @param pdb.minAvailable Minimum number/percentage of pods that should remain scheduled ## @param pdb.maxUnavailable Maximum number/percentage of pods that may be made unavailable ## pdb: create: false minAvailable: 1 maxUnavailable: "" ## Wordpress Autoscaling configuration ## ref: https://kubernetes.io/docs/tasks/run-application/horizontal-pod-autoscale/ ## @param autoscaling.enabled Enable Horizontal POD autoscaling for WordPress ## @param autoscaling.minReplicas Minimum number of WordPress replicas ## @param autoscaling.maxReplicas Maximum number of WordPress replicas ## @param autoscaling.targetCPU Target CPU utilization percentage ## @param autoscaling.targetMemory Target Memory utilization percentage ## autoscaling: enabled: false minReplicas: 1 maxReplicas: 11 targetCPU: 50 targetMemory: 50 ## @section Metrics Parameters ## Prometheus Exporter / Metrics configuration ## metrics: ## @param metrics.enabled Start a sidecar prometheus exporter to expose metrics ## enabled: false ## @param metrics.port NGINX Container Status Port scraped by Prometheus Exporter ## Defaults to specified http port port: "" ## ref: https://hub.docker.com/r/bitnami/nginx-exporter/tags/ ## @param metrics.image.registry NGINX Prometheus exporter image registry ## @param metrics.image.repository NGINX Prometheus exporter image repository ## @param metrics.image.tag NGINX Prometheus exporter image tag (immutable tags are recommended) ## @param metrics.image.pullPolicy NGINX Prometheus exporter image pull policy ## @param metrics.image.pullSecrets Specify docker-registry secret names as an array ## image: registry: docker.io repository: bitnami/nginx-exporter tag: 0.10.0-debian-10-r80 pullPolicy: IfNotPresent ## Optionally specify an array of imagePullSecrets. ## Secrets must be manually created in the namespace. ## ref: https://kubernetes.io/docs/tasks/configure-pod-container/pull-image-private-registry/ ## e.g: ## pullSecrets: ## - myRegistryKeySecretName ## pullSecrets: [] ## Prometheus exporter container's resource requests and limits ## ref: https://kubernetes.io/docs/user-guide/compute-resources/ ## @param metrics.resources.limits The resources limits for the Prometheus exporter container ## @param metrics.resources.requests The requested resources for the Prometheus exporter container ## resources: limits: {} requests: {} ## Prometheus exporter service parameters ## service: ## @param metrics.service.port Metrics service port ## port: 9113 ## @param metrics.service.annotations [object] Additional custom annotations for Metrics service ## annotations: prometheus.io/scrape: "true" prometheus.io/port: "{{ .Values.metrics.service.port }}" ## Prometheus Service Monitor ## ref: https://github.com/coreos/prometheus-operator ## https://github.com/coreos/prometheus-operator/blob/master/Documentation/api.md#endpoint ## serviceMonitor: ## @param metrics.serviceMonitor.enabled Create ServiceMonitor Resource for scraping metrics using PrometheusOperator ## enabled: false ## @param metrics.serviceMonitor.namespace The namespace in which the ServiceMonitor will be created ## namespace: "" ## @param metrics.serviceMonitor.interval The interval at which metrics should be scraped ## interval: 30s ## @param metrics.serviceMonitor.scrapeTimeout The timeout after which the scrape is ended ## scrapeTimeout: "" ## @param metrics.serviceMonitor.relabellings Metrics relabellings to add to the scrape endpoint ## relabellings: [] ## @param metrics.serviceMonitor.honorLabels Labels to honor to add to the scrape endpoint ## honorLabels: false ## @param metrics.serviceMonitor.additionalLabels Additional custom labels for the ServiceMonitor ## additionalLabels: {} ## @section NetworkPolicy parameters ## Add networkpolicies ## networkPolicy: ## @param networkPolicy.enabled Enable network policies ## If ingress.enabled or metrics.enabled are true, configure networkPolicy.ingress and networkPolicy.metrics selectors respectively to allow communication ## enabled: false ## @param networkPolicy.metrics.enabled Enable network policy for metrics (prometheus) ## @param networkPolicy.metrics.namespaceSelector [object] Monitoring namespace selector labels. These labels will be used to identify the prometheus' namespace. ## @param networkPolicy.metrics.podSelector [object] Monitoring pod selector labels. These labels will be used to identify the Prometheus pods. ## metrics: enabled: false ## e.g: ## podSelector: ## label: monitoring ## podSelector: {} ## e.g: ## namespaceSelector: ## label: monitoring ## namespaceSelector: {} ## @param networkPolicy.ingress.enabled Enable network policy for Ingress Proxies ## @param networkPolicy.ingress.namespaceSelector [object] Ingress Proxy namespace selector labels. These labels will be used to identify the Ingress Proxy's namespace. ## @param networkPolicy.ingress.podSelector [object] Ingress Proxy pods selector labels. These labels will be used to identify the Ingress Proxy pods. ## ingress: enabled: false ## e.g: ## podSelector: ## label: ingress ## podSelector: {} ## e.g: ## namespaceSelector: ## label: ingress ## namespaceSelector: {} ## @param networkPolicy.ingressRules.backendOnlyAccessibleByFrontend Enable ingress rule that makes the backend (mariadb) only accessible by testlink's pods. ## @param networkPolicy.ingressRules.customBackendSelector [object] Backend selector labels. These labels will be used to identify the backend pods. ## @param networkPolicy.ingressRules.accessOnlyFrom.enabled Enable ingress rule that makes testlink only accessible from a particular origin ## @param networkPolicy.ingressRules.accessOnlyFrom.namespaceSelector [object] Namespace selector label that is allowed to access testlink. This label will be used to identified the allowed namespace(s). ## @param networkPolicy.ingressRules.accessOnlyFrom.podSelector [object] Pods selector label that is allowed to access testlink. This label will be used to identified the allowed pod(s). ## @param networkPolicy.ingressRules.customRules [object] Custom network policy ingress rule ## ingressRules: ## mariadb backend only can be accessed from testlink ## backendOnlyAccessibleByFrontend: false ## Additional custom backend selector ## e.g: ## customBackendSelector: ## - to: ## - namespaceSelector: ## matchLabels: ## label: example customBackendSelector: {} ## Allow only from the indicated: accessOnlyFrom: enabled: false ## e.g: ## podSelector: ## label: access ## podSelector: {} ## e.g: ## namespaceSelector: ## label: access ## namespaceSelector: {} ## custom ingress rules ## e.g: ## customRules: ## - from: ## - namespaceSelector: ## matchLabels: ## label: example customRules: {} ## @param networkPolicy.egressRules.denyConnectionsToExternal Enable egress rule that denies outgoing traffic outside the cluster, except for DNS (port 53). ## @param networkPolicy.egressRules.customRules [object] Custom network policy rule ## egressRules: # Deny connections to external. This is not compatible with an external database. denyConnectionsToExternal: false ## Additional custom egress rules ## e.g: ## customRules: ## - to: ## - namespaceSelector: ## matchLabels: ## label: example customRules: {} ## @section Database Parameters ## MariaDB chart configuration ## ref: https://github.com/bitnami/charts/blob/master/bitnami/mariadb/values.yaml ## mariadb: ## @param mariadb.enabled Deploy a MariaDB server to satisfy the applications database requirements ## To use an external database set this to false and configure the `externalDatabase.*` parameters ## enabled: true ## @param mariadb.architecture MariaDB architecture. Allowed values: `standalone` or `replication` ## architecture: standalone ## MariaDB Authentication parameters ## @param mariadb.auth.rootPassword MariaDB root password ## @param mariadb.auth.database MariaDB custom database ## @param mariadb.auth.username MariaDB custom user name ## @param mariadb.auth.password MariaDB custom user password ## ref: https://github.com/bitnami/bitnami-docker-mariadb#setting-the-root-password-on-first-run ## https://github.com/bitnami/bitnami-docker-mariadb/blob/master/README.md#creating-a-database-on-first-run ## https://github.com/bitnami/bitnami-docker-mariadb/blob/master/README.md#creating-a-database-user-on-first-run auth: rootPassword: "" database: bitnami_wordpress username: bn_wordpress password: "" ## MariaDB Primary configuration ## primary: ## MariaDB Primary Persistence parameters ## ref: https://kubernetes.io/docs/user-guide/persistent-volumes/ ## @param mariadb.primary.persistence.enabled Enable persistence on MariaDB using PVC(s) ## @param mariadb.primary.persistence.storageClass Persistent Volume storage class ## @param mariadb.primary.persistence.accessModes [array] Persistent Volume access modes ## @param mariadb.primary.persistence.size Persistent Volume size ## persistence: enabled: true storageClass: "" accessModes: - ReadWriteOnce size: 8Gi ## External Database Configuration ## All of these values are only used if `mariadb.enabled=false` ## externalDatabase: ## @param externalDatabase.host External Database server host ## host: localhost ## @param externalDatabase.port External Database server port ## port: 3306 ## @param externalDatabase.user External Database username ## user: bn_wordpress ## @param externalDatabase.password External Database user password ## password: "" ## @param externalDatabase.database External Database database name ## database: bitnami_wordpress ## @param externalDatabase.existingSecret The name of an existing secret with database credentials ## NOTE: Must contain key `mariadb-password` ## NOTE: When it's set, the `externalDatabase.password` parameter is ignored ## existingSecret: "" ## Memcached chart configuration ## ref: https://github.com/bitnami/charts/blob/master/bitnami/memcached/values.yaml ## memcached: ## @param memcached.enabled Deploy a Memcached server for caching database queries ## enabled: false ## Service parameters ## service: ## @param memcached.service.port Memcached service port ## port: 11211 ## External Memcached Configuration ## All of these values are only used if `memcached.enabled=false` ## externalCache: ## @param externalCache.host External cache server host ## host: localhost ## @param externalCache.port External cache server port ## port: 11211
39.506893
205
0.740357
765437c2b4802f23becaedcdb7113066490b6c9c
45,756
yaml
YAML
bitnami/wordpress/values.yaml
00arthur00/charts
502aa1e64541669b732a4eda896e5937847b6c3c
[ "Apache-2.0" ]
null
null
null
bitnami/wordpress/values.yaml
00arthur00/charts
502aa1e64541669b732a4eda896e5937847b6c3c
[ "Apache-2.0" ]
2
2022-01-26T01:14:30.000Z
2022-01-26T07:03:39.000Z
bitnami/wordpress/values.yaml
00arthur00/charts
502aa1e64541669b732a4eda896e5937847b6c3c
[ "Apache-2.0" ]
null
null
null
## @section Global parameters ## Global Docker image parameters ## Please, note that this will override the image parameters, including dependencies, configured to use the global value ## Current available global Docker image parameters: imageRegistry, imagePullSecrets and storageClass ## @param global.imageRegistry Global Docker image registry ## @param global.imagePullSecrets Global Docker registry secret names as an array ## @param global.storageClass Global StorageClass for Persistent Volume(s) ## global: imageRegistry: "" ## E.g. ## imagePullSecrets: ## - myRegistryKeySecretName ## imagePullSecrets: [] storageClass: "" ## @section Common parameters ## @param kubeVersion Override Kubernetes version ## kubeVersion: "" ## @param nameOverride String to partially override common.names.fullname template (will maintain the release name) ## nameOverride: "" ## @param fullnameOverride String to fully override common.names.fullname template ## fullnameOverride: "" ## @param commonLabels Labels to add to all deployed resources ## commonLabels: {} ## @param commonAnnotations Annotations to add to all deployed resources ## commonAnnotations: {} ## @param clusterDomain Kubernetes Cluster Domain ## clusterDomain: cluster.local ## @param extraDeploy Array of extra objects to deploy with the release ## extraDeploy: [] ## Enable diagnostic mode in the deployment ## diagnosticMode: ## @param diagnosticMode.enabled Enable diagnostic mode (all probes will be disabled and the command will be overridden) ## enabled: false ## @param diagnosticMode.command Command to override all containers in the deployment ## command: - sleep ## @param diagnosticMode.args Args to override all containers in the deployment ## args: - infinity ## @section WordPress Image parameters ## Bitnami WordPress image ## ref: https://hub.docker.com/r/bitnami/wordpress/tags/ ## @param image.registry WordPress image registry ## @param image.repository WordPress image repository ## @param image.tag WordPress image tag (immutable tags are recommended) ## @param image.pullPolicy WordPress image pull policy ## @param image.pullSecrets WordPress image pull secrets ## @param image.debug Specify if debug values should be set ## image: registry: docker.io repository: bitnami/wordpress tag: 5.9.2-debian-10-r4 ## Specify a imagePullPolicy ## Defaults to 'Always' if image tag is 'latest', else set to 'IfNotPresent' ## ref: https://kubernetes.io/docs/user-guide/images/#pre-pulling-images ## pullPolicy: IfNotPresent ## Optionally specify an array of imagePullSecrets. ## Secrets must be manually created in the namespace. ## ref: https://kubernetes.io/docs/tasks/configure-pod-container/pull-image-private-registry/ ## e.g: ## pullSecrets: ## - myRegistryKeySecretName ## pullSecrets: [] ## Enable debug mode ## debug: false ## @section WordPress Configuration parameters ## WordPress settings based on environment variables ## ref: https://github.com/bitnami/bitnami-docker-wordpress#environment-variables ## @param wordpressUsername WordPress username ## wordpressUsername: user ## @param wordpressPassword WordPress user password ## Defaults to a random 10-character alphanumeric string if not set ## wordpressPassword: "" ## @param existingSecret Name of existing secret containing WordPress credentials ## NOTE: Must contain key `wordpress-password` ## NOTE: When it's set, the `wordpressPassword` parameter is ignored ## existingSecret: "" ## @param wordpressEmail WordPress user email ## wordpressEmail: [email protected] ## @param wordpressFirstName WordPress user first name ## wordpressFirstName: FirstName ## @param wordpressLastName WordPress user last name ## wordpressLastName: LastName ## @param wordpressBlogName Blog name ## wordpressBlogName: User's Blog! ## @param wordpressTablePrefix Prefix to use for WordPress database tables ## wordpressTablePrefix: wp_ ## @param wordpressScheme Scheme to use to generate WordPress URLs ## wordpressScheme: http ## @param wordpressSkipInstall Skip wizard installation ## NOTE: useful if you use an external database that already contains WordPress data ## ref: https://github.com/bitnami/bitnami-docker-wordpress#connect-wordpress-docker-container-to-an-existing-database ## wordpressSkipInstall: false ## @param wordpressExtraConfigContent Add extra content to the default wp-config.php file ## e.g: ## wordpressExtraConfigContent: | ## @ini_set( 'post_max_size', '128M'); ## @ini_set( 'memory_limit', '256M' ); ## wordpressExtraConfigContent: "" ## @param wordpressConfiguration The content for your custom wp-config.php file (advanced feature) ## NOTE: This will override configuring WordPress based on environment variables (including those set by the chart) ## NOTE: Currently only supported when `wordpressSkipInstall=true` ## wordpressConfiguration: "" ## @param existingWordPressConfigurationSecret The name of an existing secret with your custom wp-config.php file (advanced feature) ## NOTE: When it's set the `wordpressConfiguration` parameter is ignored ## existingWordPressConfigurationSecret: "" ## @param wordpressConfigureCache Enable W3 Total Cache plugin and configure cache settings ## NOTE: useful if you deploy Memcached for caching database queries or you use an external cache server ## wordpressConfigureCache: false ## @param wordpressAutoUpdateLevel Level of auto-updates to allow. Allowed values: `major`, `minor` or `none`. ## wordpressAutoUpdateLevel: none ## @param wordpressPlugins Array of plugins to install and activate. Can be specified as `all` or `none`. ## NOTE: If set to all, only plugins that are already installed will be activated, and if set to none, no plugins will be activated ## wordpressPlugins: none ## @param apacheConfiguration The content for your custom httpd.conf file (advanced feature) ## apacheConfiguration: "" ## @param existingApacheConfigurationConfigMap The name of an existing secret with your custom httpd.conf file (advanced feature) ## NOTE: When it's set the `apacheConfiguration` parameter is ignored ## existingApacheConfigurationConfigMap: "" ## @param customPostInitScripts Custom post-init.d user scripts ## ref: https://github.com/bitnami/bitnami-docker-wordpress/tree/master/5/debian-10/rootfs/post-init.d ## NOTE: supported formats are `.sh`, `.sql` or `.php` ## NOTE: scripts are exclusively executed during the 1st boot of the container ## e.g: ## customPostInitScripts: ## enable-multisite.sh: | ## #!/bin/bash ## chmod +w /bitnami/wordpress/wp-config.php ## wp core multisite-install --url=example.com --title="Welcome to the WordPress Multisite" --admin_user="doesntmatternotreallyused" --admin_password="doesntmatternotreallyused" --admin_email="[email protected]" ## cat /docker-entrypoint-init.d/.htaccess > /bitnami/wordpress/.htaccess ## chmod -w bitnami/wordpress/wp-config.php ## .htaccess: | ## RewriteEngine On ## RewriteBase / ## ... ## customPostInitScripts: {} ## SMTP mail delivery configuration ## ref: https://github.com/bitnami/bitnami-docker-wordpress/#smtp-configuration ## @param smtpHost SMTP server host ## @param smtpPort SMTP server port ## @param smtpUser SMTP username ## @param smtpPassword SMTP user password ## @param smtpProtocol SMTP protocol ## smtpHost: "" smtpPort: "" smtpUser: "" smtpPassword: "" smtpProtocol: "" ## @param smtpExistingSecret The name of an existing secret with SMTP credentials ## NOTE: Must contain key `smtp-password` ## NOTE: When it's set, the `smtpPassword` parameter is ignored ## smtpExistingSecret: "" ## @param allowEmptyPassword Allow the container to be started with blank passwords ## allowEmptyPassword: true ## @param allowOverrideNone Configure Apache to prohibit overriding directives with htaccess files ## allowOverrideNone: false ## @param htaccessPersistenceEnabled Persist custom changes on htaccess files ## If `allowOverrideNone` is `false`, it will persist `/opt/bitnami/wordpress/wordpress-htaccess.conf` ## If `allowOverrideNone` is `true`, it will persist `/opt/bitnami/wordpress/.htaccess` ## htaccessPersistenceEnabled: false ## @param customHTAccessCM The name of an existing ConfigMap with custom htaccess rules ## NOTE: Must contain key `wordpress-htaccess.conf` with the file content ## NOTE: Requires setting `allowOverrideNone=false` ## customHTAccessCM: "" ## @param command Override default container command (useful when using custom images) ## command: [] ## @param args Override default container args (useful when using custom images) ## args: [] ## @param extraEnvVars Array with extra environment variables to add to the WordPress container ## e.g: ## extraEnvVars: ## - name: FOO ## value: "bar" ## extraEnvVars: [] ## @param extraEnvVarsCM Name of existing ConfigMap containing extra env vars ## extraEnvVarsCM: "" ## @param extraEnvVarsSecret Name of existing Secret containing extra env vars ## extraEnvVarsSecret: "" ## @section WordPress Multisite Configuration parameters ## ref: https://github.com/bitnami/bitnami-docker-wordpress#multisite-configuration ## @param multisite.enable Whether to enable WordPress Multisite configuration. ## @param multisite.host WordPress Multisite hostname/address. This value is mandatory when enabling Multisite mode. ## @param multisite.networkType WordPress Multisite network type to enable. Allowed values: `subfolder`, `subdirectory` or `subdomain`. ## @param multisite.enableNipIoRedirect Whether to enable IP address redirection to nip.io wildcard DNS. Useful when running on an IP address with subdomain network type. ## multisite: enable: false host: "" networkType: subdomain enableNipIoRedirect: false ## @section WordPress deployment parameters ## @param replicaCount Number of WordPress replicas to deploy ## NOTE: ReadWriteMany PVC(s) are required if replicaCount > 1 ## replicaCount: 1 ## @param updateStrategy.type WordPress deployment strategy type ## @param updateStrategy.rollingUpdate WordPress deployment rolling update configuration parameters ## ref: https://kubernetes.io/docs/concepts/workloads/controllers/deployment/#strategy ## NOTE: Set it to `Recreate` if you use a PV that cannot be mounted on multiple pods ## e.g: ## updateStrategy: ## type: RollingUpdate ## rollingUpdate: ## maxSurge: 25% ## maxUnavailable: 25% ## updateStrategy: type: RollingUpdate rollingUpdate: {} ## @param schedulerName Alternate scheduler ## ref: https://kubernetes.io/docs/tasks/administer-cluster/configure-multiple-schedulers/ ## schedulerName: "" ## @param topologySpreadConstraints Topology Spread Constraints for pod assignment spread across your cluster among failure-domains. Evaluated as a template ## Ref: https://kubernetes.io/docs/concepts/workloads/pods/pod-topology-spread-constraints/#spread-constraints-for-pods ## topologySpreadConstraints: {} ## @param priorityClassName Name of the existing priority class to be used by WordPress pods, priority class needs to be created beforehand ## Ref: https://kubernetes.io/docs/concepts/configuration/pod-priority-preemption/ ## priorityClassName: "" ## @param hostAliases [array] WordPress pod host aliases ## https://kubernetes.io/docs/concepts/services-networking/add-entries-to-pod-etc-hosts-with-host-aliases/ ## hostAliases: ## Required for Apache exporter to work - ip: "127.0.0.1" hostnames: - "status.localhost" ## @param extraVolumes Optionally specify extra list of additional volumes for WordPress pods ## extraVolumes: [] ## @param extraVolumeMounts Optionally specify extra list of additional volumeMounts for WordPress container(s) ## extraVolumeMounts: [] ## @param sidecars Add additional sidecar containers to the WordPress pod ## e.g: ## sidecars: ## - name: your-image-name ## image: your-image ## imagePullPolicy: Always ## ports: ## - name: portname ## containerPort: 1234 ## sidecars: [] ## @param initContainers Add additional init containers to the WordPress pods ## ref: https://kubernetes.io/docs/concepts/workloads/pods/init-containers/ ## e.g: ## initContainers: ## - name: your-image-name ## image: your-image ## imagePullPolicy: Always ## command: ['sh', '-c', 'copy themes and plugins from git and push to /bitnami/wordpress/wp-content. Should work with extraVolumeMounts and extraVolumes'] ## initContainers: [] ## @param podLabels Extra labels for WordPress pods ## ref: https://kubernetes.io/docs/concepts/overview/working-with-objects/labels/ ## podLabels: {} ## @param podAnnotations Annotations for WordPress pods ## ref: https://kubernetes.io/docs/concepts/overview/working-with-objects/annotations/ ## podAnnotations: {} ## @param podAffinityPreset Pod affinity preset. Ignored if `affinity` is set. Allowed values: `soft` or `hard` ## ref: https://kubernetes.io/docs/concepts/scheduling-eviction/assign-pod-node/#inter-pod-affinity-and-anti-affinity ## podAffinityPreset: "" ## @param podAntiAffinityPreset Pod anti-affinity preset. Ignored if `affinity` is set. Allowed values: `soft` or `hard` ## Ref: https://kubernetes.io/docs/concepts/scheduling-eviction/assign-pod-node/#inter-pod-affinity-and-anti-affinity ## podAntiAffinityPreset: soft ## Node affinity preset ## Ref: https://kubernetes.io/docs/concepts/scheduling-eviction/assign-pod-node/#node-affinity ## nodeAffinityPreset: ## @param nodeAffinityPreset.type Node affinity preset type. Ignored if `affinity` is set. Allowed values: `soft` or `hard` ## type: "" ## @param nodeAffinityPreset.key Node label key to match. Ignored if `affinity` is set ## key: "" ## @param nodeAffinityPreset.values Node label values to match. Ignored if `affinity` is set ## E.g. ## values: ## - e2e-az1 ## - e2e-az2 ## values: [] ## @param affinity Affinity for pod assignment ## Ref: https://kubernetes.io/docs/concepts/configuration/assign-pod-node/#affinity-and-anti-affinity ## NOTE: podAffinityPreset, podAntiAffinityPreset, and nodeAffinityPreset will be ignored when it's set ## affinity: {} ## @param nodeSelector Node labels for pod assignment ## ref: https://kubernetes.io/docs/user-guide/node-selection/ ## nodeSelector: {} ## @param tolerations Tolerations for pod assignment ## ref: https://kubernetes.io/docs/concepts/configuration/taint-and-toleration/ ## tolerations: [] ## WordPress containers' resource requests and limits ## ref: https://kubernetes.io/docs/user-guide/compute-resources/ ## @param resources.limits The resources limits for the WordPress containers ## @param resources.requests.memory The requested memory for the WordPress containers ## @param resources.requests.cpu The requested cpu for the WordPress containers ## resources: limits: {} requests: memory: 512Mi cpu: 300m ## Container ports ## @param containerPorts.http WordPress HTTP container port ## @param containerPorts.https WordPress HTTPS container port ## containerPorts: http: 8080 https: 8443 ## @param extraContainerPorts Optionally specify extra list of additional ports for WordPress container(s) ## e.g: ## extraContainerPorts: ## - name: myservice ## containerPort: 9090 ## extraContainerPorts: [] ## Configure Pods Security Context ## ref: https://kubernetes.io/docs/tasks/configure-pod-container/security-context/#set-the-security-context-for-a-pod ## @param podSecurityContext.enabled Enabled WordPress pods' Security Context ## @param podSecurityContext.fsGroup Set WordPress pod's Security Context fsGroup ## podSecurityContext: enabled: true fsGroup: 1001 ## Configure Container Security Context (only main container) ## ref: https://kubernetes.io/docs/tasks/configure-pod-container/security-context/#set-the-security-context-for-a-container ## @param containerSecurityContext.enabled Enabled WordPress containers' Security Context ## @param containerSecurityContext.runAsUser Set WordPress container's Security Context runAsUser ## @param containerSecurityContext.runAsNonRoot Set WordPress container's Security Context runAsNonRoot ## containerSecurityContext: enabled: true runAsUser: 1001 runAsNonRoot: true ## Configure extra options for WordPress containers' liveness, readiness and startup probes ## ref: https://kubernetes.io/docs/tasks/configure-pod-container/configure-liveness-readiness-startup-probes/#configure-probes ## @param livenessProbe.enabled Enable livenessProbe on WordPress containers ## @skip livenessProbe.httpGet ## @param livenessProbe.initialDelaySeconds Initial delay seconds for livenessProbe ## @param livenessProbe.periodSeconds Period seconds for livenessProbe ## @param livenessProbe.timeoutSeconds Timeout seconds for livenessProbe ## @param livenessProbe.failureThreshold Failure threshold for livenessProbe ## @param livenessProbe.successThreshold Success threshold for livenessProbe ## livenessProbe: enabled: true httpGet: path: /wp-admin/install.php port: '{{ .Values.wordpressScheme }}' scheme: '{{ .Values.wordpressScheme | upper }}' ## If using an HTTPS-terminating load-balancer, the probes may need to behave ## like the balancer to prevent HTTP 302 responses. According to the Kubernetes ## docs, 302 should be considered "successful", but this issue on GitHub ## (https://github.com/kubernetes/kubernetes/issues/47893) shows that it isn't. ## E.g. ## httpHeaders: ## - name: X-Forwarded-Proto ## value: https ## httpHeaders: [] initialDelaySeconds: 120 periodSeconds: 10 timeoutSeconds: 5 failureThreshold: 6 successThreshold: 1 ## @param readinessProbe.enabled Enable readinessProbe on WordPress containers ## @skip readinessProbe.httpGet ## @param readinessProbe.initialDelaySeconds Initial delay seconds for readinessProbe ## @param readinessProbe.periodSeconds Period seconds for readinessProbe ## @param readinessProbe.timeoutSeconds Timeout seconds for readinessProbe ## @param readinessProbe.failureThreshold Failure threshold for readinessProbe ## @param readinessProbe.successThreshold Success threshold for readinessProbe ## readinessProbe: enabled: true httpGet: path: /wp-login.php port: '{{ .Values.wordpressScheme }}' scheme: '{{ .Values.wordpressScheme | upper }}' ## If using an HTTPS-terminating load-balancer, the probes may need to behave ## like the balancer to prevent HTTP 302 responses. According to the Kubernetes ## docs, 302 should be considered "successful", but this issue on GitHub ## (https://github.com/kubernetes/kubernetes/issues/47893) shows that it isn't. ## E.g. ## httpHeaders: ## - name: X-Forwarded-Proto ## value: https ## httpHeaders: [] initialDelaySeconds: 30 periodSeconds: 10 timeoutSeconds: 5 failureThreshold: 6 successThreshold: 1 ## @param startupProbe.enabled Enable startupProbe on WordPress containers ## @skip startupProbe.httpGet ## @param startupProbe.initialDelaySeconds Initial delay seconds for startupProbe ## @param startupProbe.periodSeconds Period seconds for startupProbe ## @param startupProbe.timeoutSeconds Timeout seconds for startupProbe ## @param startupProbe.failureThreshold Failure threshold for startupProbe ## @param startupProbe.successThreshold Success threshold for startupProbe ## startupProbe: enabled: false httpGet: path: /wp-login.php port: '{{ .Values.wordpressScheme }}' scheme: '{{ .Values.wordpressScheme | upper }}' ## If using an HTTPS-terminating load-balancer, the probes may need to behave ## like the balancer to prevent HTTP 302 responses. According to the Kubernetes ## docs, 302 should be considered "successful", but this issue on GitHub ## (https://github.com/kubernetes/kubernetes/issues/47893) shows that it isn't. ## E.g. ## httpHeaders: ## - name: X-Forwarded-Proto ## value: https ## httpHeaders: [] initialDelaySeconds: 30 periodSeconds: 10 timeoutSeconds: 5 failureThreshold: 6 successThreshold: 1 ## @param customLivenessProbe Custom livenessProbe that overrides the default one ## customLivenessProbe: {} ## @param customReadinessProbe Custom readinessProbe that overrides the default one ## customReadinessProbe: {} ## @param customStartupProbe Custom startupProbe that overrides the default one ## customStartupProbe: {} ## @param lifecycleHooks for the WordPress container(s) to automate configuration before or after startup ## lifecycleHooks: {} ## @section Traffic Exposure Parameters ## WordPress service parameters ## service: ## @param service.type WordPress service type ## type: LoadBalancer ## @param service.ports.http WordPress service HTTP port ## @param service.ports.https WordPress service HTTPS port ## ports: http: 80 https: 443 ## @param service.httpsTargetPort Target port for HTTPS ## httpsTargetPort: https ## Node ports to expose ## @param service.nodePorts.http Node port for HTTP ## @param service.nodePorts.https Node port for HTTPS ## NOTE: choose port between <30000-32767> ## nodePorts: http: "" https: "" ## @param service.sessionAffinity Control where client requests go, to the same pod or round-robin ## Values: ClientIP or None ## ref: https://kubernetes.io/docs/user-guide/services/ ## sessionAffinity: None ## @param service.clusterIP WordPress service Cluster IP ## e.g.: ## clusterIP: None ## clusterIP: "" ## @param service.loadBalancerIP WordPress service Load Balancer IP ## ref: https://kubernetes.io/docs/concepts/services-networking/service/#type-loadbalancer ## loadBalancerIP: "" ## @param service.loadBalancerSourceRanges WordPress service Load Balancer sources ## ref: https://kubernetes.io/docs/tasks/access-application-cluster/configure-cloud-provider-firewall/#restrict-access-for-loadbalancer-service ## e.g: ## loadBalancerSourceRanges: ## - 10.10.10.0/24 ## loadBalancerSourceRanges: [] ## @param service.externalTrafficPolicy WordPress service external traffic policy ## ref https://kubernetes.io/docs/tasks/access-application-cluster/create-external-load-balancer/#preserving-the-client-source-ip ## externalTrafficPolicy: Cluster ## @param service.annotations Additional custom annotations for WordPress service ## annotations: {} ## @param service.extraPorts Extra port to expose on WordPress service ## extraPorts: [] ## Configure the ingress resource that allows you to access the WordPress installation ## ref: https://kubernetes.io/docs/concepts/services-networking/ingress/ ## ingress: ## @param ingress.enabled Enable ingress record generation for WordPress ## enabled: false ## @param ingress.pathType Ingress path type ## pathType: ImplementationSpecific ## @param ingress.apiVersion Force Ingress API version (automatically detected if not set) ## apiVersion: "" ## @param ingress.ingressClassName IngressClass that will be be used to implement the Ingress (Kubernetes 1.18+) ## This is supported in Kubernetes 1.18+ and required if you have more than one IngressClass marked as the default for your cluster . ## ref: https://kubernetes.io/blog/2020/04/02/improvements-to-the-ingress-api-in-kubernetes-1.18/ ## ingressClassName: "" ## @param ingress.hostname Default host for the ingress record ## hostname: wordpress.local ## @param ingress.path Default path for the ingress record ## NOTE: You may need to set this to '/*' in order to use this with ALB ingress controllers ## path: / ## @param ingress.annotations Additional annotations for the Ingress resource. To enable certificate autogeneration, place here your cert-manager annotations. ## For a full list of possible ingress annotations, please see ## ref: https://github.com/kubernetes/ingress-nginx/blob/master/docs/user-guide/nginx-configuration/annotations.md ## Use this parameter to set the required annotations for cert-manager, see ## ref: https://cert-manager.io/docs/usage/ingress/#supported-annotations ## ## e.g: ## annotations: ## kubernetes.io/ingress.class: nginx ## cert-manager.io/cluster-issuer: cluster-issuer-name ## annotations: {} ## @param ingress.tls Enable TLS configuration for the host defined at `ingress.hostname` parameter ## TLS certificates will be retrieved from a TLS secret with name: `{{- printf "%s-tls" .Values.ingress.hostname }}` ## You can: ## - Use the `ingress.secrets` parameter to create this TLS secret ## - Relay on cert-manager to create it by setting the corresponding annotations ## - Relay on Helm to create self-signed certificates by setting `ingress.selfSigned=true` ## tls: false ## @param ingress.selfSigned Create a TLS secret for this ingress record using self-signed certificates generated by Helm ## selfSigned: false ## @param ingress.extraHosts An array with additional hostname(s) to be covered with the ingress record ## e.g: ## extraHosts: ## - name: wordpress.local ## path: / ## extraHosts: [] ## @param ingress.extraPaths An array with additional arbitrary paths that may need to be added to the ingress under the main host ## e.g: ## extraPaths: ## - path: /* ## backend: ## serviceName: ssl-redirect ## servicePort: use-annotation ## extraPaths: [] ## @param ingress.extraTls TLS configuration for additional hostname(s) to be covered with this ingress record ## ref: https://kubernetes.io/docs/concepts/services-networking/ingress/#tls ## e.g: ## extraTls: ## - hosts: ## - wordpress.local ## secretName: wordpress.local-tls ## extraTls: [] ## @param ingress.secrets Custom TLS certificates as secrets ## NOTE: 'key' and 'certificate' are expected in PEM format ## NOTE: 'name' should line up with a 'secretName' set further up ## If it is not set and you're using cert-manager, this is unneeded, as it will create a secret for you with valid certificates ## If it is not set and you're NOT using cert-manager either, self-signed certificates will be created valid for 365 days ## It is also possible to create and manage the certificates outside of this helm chart ## Please see README.md for more information ## e.g: ## secrets: ## - name: wordpress.local-tls ## key: |- ## -----BEGIN RSA PRIVATE KEY----- ## ... ## -----END RSA PRIVATE KEY----- ## certificate: |- ## -----BEGIN CERTIFICATE----- ## ... ## -----END CERTIFICATE----- ## secrets: [] ## @section Persistence Parameters ## Persistence Parameters ## ref: https://kubernetes.io/docs/user-guide/persistent-volumes/ ## persistence: ## @param persistence.enabled Enable persistence using Persistent Volume Claims ## enabled: true ## @param persistence.storageClass Persistent Volume storage class ## If defined, storageClassName: <storageClass> ## If set to "-", storageClassName: "", which disables dynamic provisioning ## If undefined (the default) or set to null, no storageClassName spec is set, choosing the default provisioner ## storageClass: "" ## @param persistence.accessModes [array] Persistent Volume access modes ## accessModes: - ReadWriteOnce ## @param persistence.accessMode Persistent Volume access mode (DEPRECATED: use `persistence.accessModes` instead) ## accessMode: ReadWriteOnce ## @param persistence.size Persistent Volume size ## size: 10Gi ## @param persistence.dataSource Custom PVC data source ## dataSource: {} ## @param persistence.existingClaim The name of an existing PVC to use for persistence ## existingClaim: "" ## @param persistence.selector Selector to match an existing Persistent Volume for WordPress data PVC ## If set, the PVC can't have a PV dynamically provisioned for it ## E.g. ## selector: ## matchLabels: ## app: my-app ## selector: {} ## Init containers parameters: ## volumePermissions: Change the owner and group of the persistent volume(s) mountpoint(s) to 'runAsUser:fsGroup' on each node ## volumePermissions: ## @param volumePermissions.enabled Enable init container that changes the owner/group of the PV mount point to `runAsUser:fsGroup` ## enabled: false ## Bitnami Shell image ## ref: https://hub.docker.com/r/bitnami/bitnami-shell/tags/ ## @param volumePermissions.image.registry Bitnami Shell image registry ## @param volumePermissions.image.repository Bitnami Shell image repository ## @param volumePermissions.image.tag Bitnami Shell image tag (immutable tags are recommended) ## @param volumePermissions.image.pullPolicy Bitnami Shell image pull policy ## @param volumePermissions.image.pullSecrets Bitnami Shell image pull secrets ## image: registry: docker.io repository: bitnami/bitnami-shell tag: 10-debian-10-r366 pullPolicy: IfNotPresent ## Optionally specify an array of imagePullSecrets. ## Secrets must be manually created in the namespace. ## ref: https://kubernetes.io/docs/tasks/configure-pod-container/pull-image-private-registry/ ## e.g: ## pullSecrets: ## - myRegistryKeySecretName ## pullSecrets: [] ## Init container's resource requests and limits ## ref: https://kubernetes.io/docs/user-guide/compute-resources/ ## @param volumePermissions.resources.limits The resources limits for the init container ## @param volumePermissions.resources.requests The requested resources for the init container ## resources: limits: {} requests: {} ## Init container' Security Context ## Note: the chown of the data folder is done to containerSecurityContext.runAsUser ## and not the below volumePermissions.containerSecurityContext.runAsUser ## @param volumePermissions.containerSecurityContext.runAsUser User ID for the init container ## containerSecurityContext: runAsUser: 0 ## @section Other Parameters ## WordPress Service Account ## ref: https://kubernetes.io/docs/tasks/configure-pod-container/configure-service-account/ ## serviceAccount: ## @param serviceAccount.create Enable creation of ServiceAccount for WordPress pod ## create: false ## @param serviceAccount.name The name of the ServiceAccount to use. ## If not set and create is true, a name is generated using the common.names.fullname template ## name: "" ## @param serviceAccount.automountServiceAccountToken Allows auto mount of ServiceAccountToken on the serviceAccount created ## Can be set to false if pods using this serviceAccount do not need to use K8s API ## automountServiceAccountToken: true ## @param serviceAccount.annotations Additional custom annotations for the ServiceAccount ## annotations: {} ## WordPress Pod Disruption Budget configuration ## ref: https://kubernetes.io/docs/tasks/run-application/configure-pdb/ ## @param pdb.create Enable a Pod Disruption Budget creation ## @param pdb.minAvailable Minimum number/percentage of pods that should remain scheduled ## @param pdb.maxUnavailable Maximum number/percentage of pods that may be made unavailable ## pdb: create: false minAvailable: 1 maxUnavailable: "" ## WordPress Autoscaling configuration ## ref: https://kubernetes.io/docs/tasks/run-application/horizontal-pod-autoscale/ ## @param autoscaling.enabled Enable Horizontal POD autoscaling for WordPress ## @param autoscaling.minReplicas Minimum number of WordPress replicas ## @param autoscaling.maxReplicas Maximum number of WordPress replicas ## @param autoscaling.targetCPU Target CPU utilization percentage ## @param autoscaling.targetMemory Target Memory utilization percentage ## autoscaling: enabled: false minReplicas: 1 maxReplicas: 11 targetCPU: 50 targetMemory: 50 ## @section Metrics Parameters ## Prometheus Exporter / Metrics configuration ## metrics: ## @param metrics.enabled Start a sidecar prometheus exporter to expose metrics ## enabled: false ## Bitnami Apache exporter image ## ref: https://hub.docker.com/r/bitnami/apache-exporter/tags/ ## @param metrics.image.registry Apache exporter image registry ## @param metrics.image.repository Apache exporter image repository ## @param metrics.image.tag Apache exporter image tag (immutable tags are recommended) ## @param metrics.image.pullPolicy Apache exporter image pull policy ## @param metrics.image.pullSecrets Apache exporter image pull secrets ## image: registry: docker.io repository: bitnami/apache-exporter tag: 0.11.0-debian-10-r84 pullPolicy: IfNotPresent ## Optionally specify an array of imagePullSecrets. ## Secrets must be manually created in the namespace. ## ref: https://kubernetes.io/docs/tasks/configure-pod-container/pull-image-private-registry/ ## e.g: ## pullSecrets: ## - myRegistryKeySecretName ## pullSecrets: [] ## @param metrics.containerPorts.metrics Prometheus exporter container port ## containerPorts: metrics: 9117 ## Configure extra options for Prometheus exporter containers' liveness, readiness and startup probes ## ref: https://kubernetes.io/docs/tasks/configure-pod-container/configure-liveness-readiness-startup-probes/#configure-probes ## @param metrics.livenessProbe.enabled Enable livenessProbe on Prometheus exporter containers ## @param metrics.livenessProbe.initialDelaySeconds Initial delay seconds for livenessProbe ## @param metrics.livenessProbe.periodSeconds Period seconds for livenessProbe ## @param metrics.livenessProbe.timeoutSeconds Timeout seconds for livenessProbe ## @param metrics.livenessProbe.failureThreshold Failure threshold for livenessProbe ## @param metrics.livenessProbe.successThreshold Success threshold for livenessProbe ## livenessProbe: enabled: true initialDelaySeconds: 15 periodSeconds: 10 timeoutSeconds: 5 failureThreshold: 3 successThreshold: 1 ## @param metrics.readinessProbe.enabled Enable readinessProbe on Prometheus exporter containers ## @param metrics.readinessProbe.initialDelaySeconds Initial delay seconds for readinessProbe ## @param metrics.readinessProbe.periodSeconds Period seconds for readinessProbe ## @param metrics.readinessProbe.timeoutSeconds Timeout seconds for readinessProbe ## @param metrics.readinessProbe.failureThreshold Failure threshold for readinessProbe ## @param metrics.readinessProbe.successThreshold Success threshold for readinessProbe ## readinessProbe: enabled: true initialDelaySeconds: 5 periodSeconds: 10 timeoutSeconds: 3 failureThreshold: 3 successThreshold: 1 ## @param metrics.startupProbe.enabled Enable startupProbe on Prometheus exporter containers ## @param metrics.startupProbe.initialDelaySeconds Initial delay seconds for startupProbe ## @param metrics.startupProbe.periodSeconds Period seconds for startupProbe ## @param metrics.startupProbe.timeoutSeconds Timeout seconds for startupProbe ## @param metrics.startupProbe.failureThreshold Failure threshold for startupProbe ## @param metrics.startupProbe.successThreshold Success threshold for startupProbe ## startupProbe: enabled: false initialDelaySeconds: 10 periodSeconds: 10 timeoutSeconds: 1 failureThreshold: 15 successThreshold: 1 ## @param metrics.customLivenessProbe Custom livenessProbe that overrides the default one ## customLivenessProbe: {} ## @param metrics.customReadinessProbe Custom readinessProbe that overrides the default one ## customReadinessProbe: {} ## @param metrics.customStartupProbe Custom startupProbe that overrides the default one ## customStartupProbe: {} ## Prometheus exporter container's resource requests and limits ## ref: https://kubernetes.io/docs/user-guide/compute-resources/ ## @param metrics.resources.limits The resources limits for the Prometheus exporter container ## @param metrics.resources.requests The requested resources for the Prometheus exporter container ## resources: limits: {} requests: {} ## Prometheus exporter service parameters ## service: ## @param metrics.service.ports.metrics Prometheus metrics service port ## ports: metrics: 9150 ## @param metrics.service.annotations [object] Additional custom annotations for Metrics service ## annotations: prometheus.io/scrape: "true" prometheus.io/port: "{{ .Values.metrics.containerPorts.metrics }}" ## Prometheus Operator ServiceMonitor configuration ## serviceMonitor: ## @param metrics.serviceMonitor.enabled Create ServiceMonitor Resource for scraping metrics using Prometheus Operator ## enabled: false ## @param metrics.serviceMonitor.namespace Namespace for the ServiceMonitor Resource (defaults to the Release Namespace) ## namespace: "" ## @param metrics.serviceMonitor.interval Interval at which metrics should be scraped. ## ref: https://github.com/coreos/prometheus-operator/blob/master/Documentation/api.md#endpoint ## interval: "" ## @param metrics.serviceMonitor.scrapeTimeout Timeout after which the scrape is ended ## ref: https://github.com/coreos/prometheus-operator/blob/master/Documentation/api.md#endpoint ## scrapeTimeout: "" ## @param metrics.serviceMonitor.labels Additional labels that can be used so ServiceMonitor will be discovered by Prometheus ## labels: {} ## @param metrics.serviceMonitor.selector Prometheus instance selector labels ## ref: https://github.com/bitnami/charts/tree/master/bitnami/prometheus-operator#prometheus-configuration ## selector: {} ## @param metrics.serviceMonitor.relabelings RelabelConfigs to apply to samples before scraping ## relabelings: [] ## @param metrics.serviceMonitor.metricRelabelings MetricRelabelConfigs to apply to samples before ingestion ## metricRelabelings: [] ## @param metrics.serviceMonitor.honorLabels Specify honorLabels parameter to add the scrape endpoint ## honorLabels: false ## @param metrics.serviceMonitor.jobLabel The name of the label on the target service to use as the job name in prometheus. ## jobLabel: "" ## @section NetworkPolicy parameters ## Add networkpolicies ## networkPolicy: ## @param networkPolicy.enabled Enable network policies ## If ingress.enabled or metrics.enabled are true, configure networkPolicy.ingress and networkPolicy.metrics selectors respectively to allow communication ## enabled: false ## @param networkPolicy.metrics.enabled Enable network policy for metrics (prometheus) ## @param networkPolicy.metrics.namespaceSelector [object] Monitoring namespace selector labels. These labels will be used to identify the prometheus' namespace. ## @param networkPolicy.metrics.podSelector [object] Monitoring pod selector labels. These labels will be used to identify the Prometheus pods. ## metrics: enabled: false ## e.g: ## podSelector: ## label: monitoring ## podSelector: {} ## e.g: ## namespaceSelector: ## label: monitoring ## namespaceSelector: {} ## @param networkPolicy.ingress.enabled Enable network policy for Ingress Proxies ## @param networkPolicy.ingress.namespaceSelector [object] Ingress Proxy namespace selector labels. These labels will be used to identify the Ingress Proxy's namespace. ## @param networkPolicy.ingress.podSelector [object] Ingress Proxy pods selector labels. These labels will be used to identify the Ingress Proxy pods. ## ingress: enabled: false ## e.g: ## podSelector: ## label: ingress ## podSelector: {} ## e.g: ## namespaceSelector: ## label: ingress ## namespaceSelector: {} ## @param networkPolicy.ingressRules.backendOnlyAccessibleByFrontend Enable ingress rule that makes the backend (mariadb) only accessible by testlink's pods. ## @param networkPolicy.ingressRules.customBackendSelector [object] Backend selector labels. These labels will be used to identify the backend pods. ## @param networkPolicy.ingressRules.accessOnlyFrom.enabled Enable ingress rule that makes testlink only accessible from a particular origin ## @param networkPolicy.ingressRules.accessOnlyFrom.namespaceSelector [object] Namespace selector label that is allowed to access testlink. This label will be used to identified the allowed namespace(s). ## @param networkPolicy.ingressRules.accessOnlyFrom.podSelector [object] Pods selector label that is allowed to access testlink. This label will be used to identified the allowed pod(s). ## @param networkPolicy.ingressRules.customRules [object] Custom network policy ingress rule ## ingressRules: ## mariadb backend only can be accessed from testlink ## backendOnlyAccessibleByFrontend: false ## Additional custom backend selector ## e.g: ## customBackendSelector: ## - to: ## - namespaceSelector: ## matchLabels: ## label: example customBackendSelector: {} ## Allow only from the indicated: accessOnlyFrom: enabled: false ## e.g: ## podSelector: ## label: access ## podSelector: {} ## e.g: ## namespaceSelector: ## label: access ## namespaceSelector: {} ## custom ingress rules ## e.g: ## customRules: ## - from: ## - namespaceSelector: ## matchLabels: ## label: example customRules: {} ## @param networkPolicy.egressRules.denyConnectionsToExternal Enable egress rule that denies outgoing traffic outside the cluster, except for DNS (port 53). ## @param networkPolicy.egressRules.customRules [object] Custom network policy rule ## egressRules: # Deny connections to external. This is not compatible with an external database. denyConnectionsToExternal: false ## Additional custom egress rules ## e.g: ## customRules: ## - to: ## - namespaceSelector: ## matchLabels: ## label: example customRules: {} ## @section Database Parameters ## MariaDB chart configuration ## ref: https://github.com/bitnami/charts/blob/master/bitnami/mariadb/values.yaml ## mariadb: ## @param mariadb.enabled Deploy a MariaDB server to satisfy the applications database requirements ## To use an external database set this to false and configure the `externalDatabase.*` parameters ## enabled: true ## @param mariadb.architecture MariaDB architecture. Allowed values: `standalone` or `replication` ## architecture: standalone ## MariaDB Authentication parameters ## @param mariadb.auth.rootPassword MariaDB root password ## @param mariadb.auth.database MariaDB custom database ## @param mariadb.auth.username MariaDB custom user name ## @param mariadb.auth.password MariaDB custom user password ## ref: https://github.com/bitnami/bitnami-docker-mariadb#setting-the-root-password-on-first-run ## https://github.com/bitnami/bitnami-docker-mariadb/blob/master/README.md#creating-a-database-on-first-run ## https://github.com/bitnami/bitnami-docker-mariadb/blob/master/README.md#creating-a-database-user-on-first-run auth: rootPassword: "" database: bitnami_wordpress username: bn_wordpress password: "" ## MariaDB Primary configuration ## primary: ## MariaDB Primary Persistence parameters ## ref: https://kubernetes.io/docs/user-guide/persistent-volumes/ ## @param mariadb.primary.persistence.enabled Enable persistence on MariaDB using PVC(s) ## @param mariadb.primary.persistence.storageClass Persistent Volume storage class ## @param mariadb.primary.persistence.accessModes [array] Persistent Volume access modes ## @param mariadb.primary.persistence.size Persistent Volume size ## persistence: enabled: true storageClass: "" accessModes: - ReadWriteOnce size: 8Gi ## External Database Configuration ## All of these values are only used if `mariadb.enabled=false` ## externalDatabase: ## @param externalDatabase.host External Database server host ## host: localhost ## @param externalDatabase.port External Database server port ## port: 3306 ## @param externalDatabase.user External Database username ## user: bn_wordpress ## @param externalDatabase.password External Database user password ## password: "" ## @param externalDatabase.database External Database database name ## database: bitnami_wordpress ## @param externalDatabase.existingSecret The name of an existing secret with database credentials. Evaluated as a template ## NOTE: Must contain key `mariadb-password` ## NOTE: When it's set, the `externalDatabase.password` parameter is ignored ## existingSecret: "" ## Memcached chart configuration ## ref: https://github.com/bitnami/charts/blob/master/bitnami/memcached/values.yaml ## memcached: ## @param memcached.enabled Deploy a Memcached server for caching database queries ## enabled: false ## Authentication parameters ## ref: https://github.com/bitnami/bitnami-docker-memcached#creating-the-memcached-admin-user ## auth: ## @param memcached.auth.enabled Enable Memcached authentication ## enabled: false ## @param memcached.auth.username Memcached admin user ## username: "" ## @param memcached.auth.password Memcached admin password ## password: "" ## Service parameters ## service: ## @param memcached.service.port Memcached service port ## port: 11211 ## External Memcached Configuration ## All of these values are only used if `memcached.enabled=false` ## externalCache: ## @param externalCache.host External cache server host ## host: localhost ## @param externalCache.port External cache server port ## port: 11211
40.599823
214
0.745279
efc5a69efe6ce9f9809821262233b4ee59502519
35,676
yaml
YAML
bitnami/discourse/values.yaml
00arthur00/charts
502aa1e64541669b732a4eda896e5937847b6c3c
[ "Apache-2.0" ]
null
null
null
bitnami/discourse/values.yaml
00arthur00/charts
502aa1e64541669b732a4eda896e5937847b6c3c
[ "Apache-2.0" ]
2
2022-01-26T01:14:30.000Z
2022-01-26T07:03:39.000Z
bitnami/discourse/values.yaml
00arthur00/charts
502aa1e64541669b732a4eda896e5937847b6c3c
[ "Apache-2.0" ]
null
null
null
## @section Global parameters ## Global Docker image parameters ## Please, note that this will override the image parameters, including dependencies, configured to use the global value ## Current available global Docker image parameters: imageRegistry, imagePullSecrets and storageClass ## @param global.imageRegistry Global Docker image registry ## @param global.imagePullSecrets Global Docker registry secret names as an array ## @param global.storageClass Global StorageClass for Persistent Volume(s) ## global: imageRegistry: "" ## E.g. ## imagePullSecrets: ## - myRegistryKeySecretName ## imagePullSecrets: [] storageClass: "" ## @section Common parameters ## @param kubeVersion Force target Kubernetes version (using Helm capabilities if not set) ## kubeVersion: "" ## @param nameOverride String to partially override discourse.fullname template (will maintain the release name) ## nameOverride: "" ## @param fullnameOverride String to fully override discourse.fullname template ## fullnameOverride: "" ## @param clusterDomain Kubernetes Cluster Domain ## clusterDomain: cluster.local ## @param commonLabels Labels to be added to all deployed resources ## commonLabels: {} ## @param commonAnnotations Annotations to be added to all deployed resources ## commonAnnotations: {} ## @param extraDeploy Array of extra objects to deploy with the release ## extraDeploy: [] ## Enable diagnostic mode in the deployment(s)/statefulset(s) ## diagnosticMode: ## @param diagnosticMode.enabled Enable diagnostic mode (all probes will be disabled and the command will be overridden) ## enabled: false ## @param diagnosticMode.command Command to override all containers in the the deployment(s)/statefulset(s) ## command: - sleep ## @param diagnosticMode.args Args to override all containers in the the deployment(s)/statefulset(s) ## args: - infinity ## @section Discourse Common parameters ## Bitnami Discourse image version ## ref: https://hub.docker.com/r/bitnami/discourse/tags/ ## @param image.registry Discourse image registry ## @param image.repository Discourse image repository ## @param image.tag Discourse image tag ## @param image.pullPolicy Discourse image pull policy ## @param image.pullSecrets Discourse image pull secrets ## @param image.debug Enable image debug mode ## image: registry: docker.io repository: bitnami/discourse tag: 2.8.1-debian-10-r11 ## Specify a imagePullPolicy ## Defaults to 'Always' if image tag is 'latest', else set to 'IfNotPresent' ## ref: https://kubernetes.io/docs/user-guide/images/#pre-pulling-images ## pullPolicy: IfNotPresent ## Optionally specify an array of imagePullSecrets. ## Secrets must be manually created in the namespace. ## ref: https://kubernetes.io/docs/tasks/configure-pod-container/pull-image-private-registry/ ## e.g: ## pullSecrets: ## - myRegistryKeySecretName ## pullSecrets: [] ## Set to true if you would like to see extra information on logs ## debug: false ## Authentication parameters ## ref: https://github.com/bitnami/bitnami-docker-discourse#user-and-site-configuration ## auth: ## @param auth.email Discourse admin user email ## email: [email protected] ## @param auth.username Discourse admin user ## username: user ## @param auth.password Discourse admin password. WARNING: Minimum length of 10 characters ## Defaults to a random 10-character alphanumeric string if not set ## password: "" ## @param auth.existingSecret Name of an existing secret to use for Discourse credentials ## `auth.password` will be ignored and picked up from this secret ## The secret must contain the key `discourse-password` ## The value is evaluated as a template ## existingSecret: "" ## @param host Hostname to create application URLs (include the port if =/= 80) ## host: "" ## @param siteName Discourse site name ## siteName: 'My Site!' ## Discourse SMTP settings ## @param smtp.enabled Enable/disable SMTP ## @param smtp.host SMTP host name ## @param smtp.port SMTP port number ## @param smtp.user SMTP account user name ## @param smtp.password SMTP account password ## @param smtp.protocol SMTP protocol (Allowed values: tls, ssl) ## @param smtp.auth SMTP authentication method ## @param smtp.existingSecret Name of an existing Kubernetes secret. The secret must have the following key configured: `smtp-password` ## smtp: enabled: false host: "" port: "" user: "" password: "" protocol: "" auth: "" existingSecret: "" ## @param replicaCount Number of Discourse & Sidekiq replicas ## Note: ReadWriteMany PVCs are required to scale ## replicaCount: 1 ## Configure Discourse pods Security Context ## ref: https://kubernetes.io/docs/tasks/configure-pod-container/security-context/#set-the-security-context-for-a-pod ## @param podSecurityContext.enabled Enabled Discourse pods' Security Context ## @param podSecurityContext.fsGroup Set Discourse pod's Security Context fsGroup ## podSecurityContext: enabled: false fsGroup: 0 ## @param hostAliases Add deployment host aliases ## https://kubernetes.io/docs/concepts/services-networking/add-entries-to-pod-etc-hosts-with-host-aliases/ ## hostAliases: [] ## @param podAnnotations Additional pod annotations ## ref: https://kubernetes.io/docs/concepts/overview/working-with-objects/annotations/ ## podAnnotations: {} ## @param podLabels Additional pod labels ## ref: https://kubernetes.io/docs/concepts/overview/working-with-objects/labels/ ## podLabels: {} ## @param podAffinityPreset Pod affinity preset. Allowed values: soft, hard ## ref: https://kubernetes.io/docs/concepts/scheduling-eviction/assign-pod-node/#inter-pod-affinity-and-anti-affinity ## podAffinityPreset: "" ## @param podAntiAffinityPreset Pod anti-affinity preset. Ignored if `affinity` is set. Allowed values: `soft` or `hard` ## Ref: https://kubernetes.io/docs/concepts/scheduling-eviction/assign-pod-node/#inter-pod-affinity-and-anti-affinity ## podAntiAffinityPreset: soft ## Node affinity preset ## Ref: https://kubernetes.io/docs/concepts/scheduling-eviction/assign-pod-node/#node-affinity ## @param nodeAffinityPreset.type Node affinity preset type. Ignored if `affinity` is set. Allowed values: `soft` or `hard` ## @param nodeAffinityPreset.key Node label key to match Ignored if `affinity` is set. ## @param nodeAffinityPreset.values Node label values to match. Ignored if `affinity` is set. ## nodeAffinityPreset: type: "" ## E.g. ## key: "kubernetes.io/e2e-az-name" ## key: "" ## E.g. ## values: ## - e2e-az1 ## - e2e-az2 ## values: [] ## @param affinity Affinity for pod assignment ## Ref: https://kubernetes.io/docs/concepts/configuration/assign-pod-node/#affinity-and-anti-affinity ## Note: podAffinityPreset, podAntiAffinityPreset, and nodeAffinityPreset will be ignored when it's set ## affinity: {} ## @param nodeSelector Node labels for pod assignment. ## Ref: https://kubernetes.io/docs/user-guide/node-selection/ ## nodeSelector: {} ## @param tolerations Tolerations for pod assignment. ## Ref: https://kubernetes.io/docs/concepts/configuration/taint-and-toleration/ ## tolerations: [] ## @param topologySpreadConstraints Topology Spread Constraints for pod assignment spread across your cluster among failure-domains. Evaluated as a template ## Ref: https://kubernetes.io/docs/concepts/workloads/pods/pod-topology-spread-constraints/#spread-constraints-for-pods ## topologySpreadConstraints: {} ## @param priorityClassName Priority Class Name ## ref: https://kubernetes.io/docs/concepts/configuration/pod-priority-preemption/#priorityclass ## priorityClassName: "" ## @param schedulerName Use an alternate scheduler, e.g. "stork". ## ref: https://kubernetes.io/docs/tasks/administer-cluster/configure-multiple-schedulers/ ## schedulerName: "" ## @param terminationGracePeriodSeconds Seconds Discourse pod needs to terminate gracefully ## ref: https://kubernetes.io/docs/concepts/workloads/pods/pod/#termination-of-pods ## terminationGracePeriodSeconds: "" ## @param updateStrategy.type Discourse deployment strategy type ## @param updateStrategy.rollingUpdate Discourse deployment rolling update configuration parameters ## ref: https://kubernetes.io/docs/concepts/workloads/controllers/deployment/#strategy ## updateStrategy: type: RollingUpdate rollingUpdate: {} ## @param sidecars Add additional sidecar containers to the Discourse pods ## Example: ## sidecars: ## - name: your-image-name ## image: your-image ## imagePullPolicy: Always ## ports: ## - name: portname ## containerPort: 1234 ## sidecars: [] ## @param initContainers Add additional init containers to the Discourse pods ## Example: ## initContainers: ## - name: your-image-name ## image: your-image ## imagePullPolicy: Always ## ports: ## - name: portname ## containerPort: 1234 ## initContainers: [] ## @param extraVolumeMounts Optionally specify extra list of additional volumeMounts for the Discourse pods ## extraVolumeMounts: [] ## @param extraVolumes Optionally specify extra list of additional volumes for the Discourse pods ## extraVolumes: [] ## @section Discourse container parameters discourse: ## @param discourse.skipInstall Do not run the Discourse installation wizard ## Use only in case you are importing an existing database. ## skipInstall: false ## @param discourse.command Custom command to override image cmd ## command: [] ## @param discourse.args Custom args for the custom command ## args: [] ## @param discourse.extraEnvVars Array with extra environment variables to add Discourse pods ## extraEnvVars: [] ## @param discourse.extraEnvVarsCM ConfigMap containing extra environment variables for Discourse pods ## extraEnvVarsCM: "" ## @param discourse.extraEnvVarsSecret Secret containing extra environment variables (in case of sensitive data) for Discourse pods ## extraEnvVarsSecret: "" ## @param discourse.containerPorts.http Discourse HTTP container port ## containerPorts: http: 8080 ## Configure extra options for Discourse containers' liveness, readiness and startup probes ## ref: https://kubernetes.io/docs/tasks/configure-pod-container/configure-liveness-readiness-startup-probes/#configure-probes ## @param discourse.livenessProbe.enabled Enable livenessProbe on Discourse containers ## @param discourse.livenessProbe.initialDelaySeconds Initial delay seconds for livenessProbe ## @param discourse.livenessProbe.periodSeconds Period seconds for livenessProbe ## @param discourse.livenessProbe.timeoutSeconds Timeout seconds for livenessProbe ## @param discourse.livenessProbe.failureThreshold Failure threshold for livenessProbe ## @param discourse.livenessProbe.successThreshold Success threshold for livenessProbe ## livenessProbe: enabled: true initialDelaySeconds: 500 periodSeconds: 10 timeoutSeconds: 5 failureThreshold: 6 successThreshold: 1 ## @param discourse.readinessProbe.enabled Enable readinessProbe on Discourse containers ## @param discourse.readinessProbe.initialDelaySeconds Initial delay seconds for readinessProbe ## @param discourse.readinessProbe.periodSeconds Period seconds for readinessProbe ## @param discourse.readinessProbe.timeoutSeconds Timeout seconds for readinessProbe ## @param discourse.readinessProbe.failureThreshold Failure threshold for readinessProbe ## @param discourse.readinessProbe.successThreshold Success threshold for readinessProbe ## readinessProbe: enabled: true initialDelaySeconds: 30 periodSeconds: 10 timeoutSeconds: 5 failureThreshold: 6 successThreshold: 1 ## @param discourse.startupProbe.enabled Enable startupProbe on Discourse containers ## @param discourse.startupProbe.initialDelaySeconds Initial delay seconds for startupProbe ## @param discourse.startupProbe.periodSeconds Period seconds for startupProbe ## @param discourse.startupProbe.timeoutSeconds Timeout seconds for startupProbe ## @param discourse.startupProbe.failureThreshold Failure threshold for startupProbe ## @param discourse.startupProbe.successThreshold Success threshold for startupProbe ## startupProbe: enabled: false initialDelaySeconds: 60 periodSeconds: 10 timeoutSeconds: 5 failureThreshold: 15 successThreshold: 1 ## @param discourse.customLivenessProbe Custom livenessProbe that overrides the default one ## customLivenessProbe: {} ## @param discourse.customReadinessProbe Custom readinessProbe that overrides the default one ## customReadinessProbe: {} ## @param discourse.customStartupProbe Custom startupProbe that overrides the default one ## customStartupProbe: {} ## Discourse resource requests and limits ## ref: https://kubernetes.io/docs/user-guide/compute-resources/ ## @param discourse.resources.limits The resources limits for the Discourse containers ## @param discourse.resources.requests The requested resources for the Discourse containers ## resources: limits: {} requests: {} ## Configure Discourse containers (only main one) Security Context ## ref: https://kubernetes.io/docs/tasks/configure-pod-container/security-context/#set-the-security-context-for-a-container ## @param discourse.containerSecurityContext.enabled Enabled Discourse containers' Security Context ## @param discourse.containerSecurityContext.runAsUser Set Discourse containers' Security Context runAsUser ## @param discourse.containerSecurityContext.runAsNonRoot Set Discourse containers' Security Context runAsNonRoot ## containerSecurityContext: enabled: false runAsUser: 0 runAsNonRoot: false ## @param discourse.lifecycleHooks for the Discourse container(s) to automate configuration before or after startup ## lifecycleHooks: {} ## @param discourse.extraVolumeMounts Optionally specify extra list of additional volumeMounts for the Discourse pods ## extraVolumeMounts: [] ## Persistence Parameters ## ref: https://kubernetes.io/docs/user-guide/persistent-volumes/ ## persistence: ## @param persistence.enabled Enable persistence using Persistent Volume Claims ## enabled: true ## @param persistence.storageClass Persistent Volume storage class ## If defined, storageClassName: <storageClass> ## If set to "-", storageClassName: "", which disables dynamic provisioning ## If undefined (the default) or set to null, no storageClassName spec is set, choosing the default provisioner ## storageClass: "" ## @param persistence.accessModes [array] Persistent Volume access modes ## accessModes: - ReadWriteOnce ## @param persistence.accessMode Persistent Volume access mode (DEPRECATED: use `persistence.accessModes` instead) ## accessMode: ReadWriteOnce ## @param persistence.size Persistent Volume size ## size: 10Gi ## @param persistence.existingClaim The name of an existing PVC to use for persistence ## existingClaim: "" ## @param persistence.selector Selector to match an existing Persistent Volume for Discourse data PVC ## If set, the PVC can't have a PV dynamically provisioned for it ## E.g. ## selector: ## matchLabels: ## app: my-app ## selector: {} ## @section Sidekiq container parameters sidekiq: ## @param sidekiq.command Custom command to override image cmd (evaluated as a template) ## command: ['/opt/bitnami/scripts/discourse/entrypoint.sh'] ## @param sidekiq.args Custom args for the custom command (evaluated as a template) ## args: ['/opt/bitnami/scripts/discourse-sidekiq/run.sh'] ## @param sidekiq.extraEnvVars Array with extra environment variables to add Sidekiq pods ## extraEnvVars: [] ## @param sidekiq.extraEnvVarsCM ConfigMap containing extra environment variables for Sidekiq pods ## extraEnvVarsCM: "" ## @param sidekiq.extraEnvVarsSecret Secret containing extra environment variables (in case of sensitive data) for Sidekiq pods ## extraEnvVarsSecret: "" ## Configure extra options for Sidekiq containers' liveness, readiness and startup probes ## ref: https://kubernetes.io/docs/tasks/configure-pod-container/configure-liveness-readiness-startup-probes/#configure-probes ## @param sidekiq.livenessProbe.enabled Enable livenessProbe on Sidekiq containers ## @param sidekiq.livenessProbe.initialDelaySeconds Delay before liveness probe is initiated ## @param sidekiq.livenessProbe.periodSeconds How often to perform the probe ## @param sidekiq.livenessProbe.timeoutSeconds When the probe times out ## @param sidekiq.livenessProbe.failureThreshold Minimum consecutive failures for the probe ## @param sidekiq.livenessProbe.successThreshold Minimum consecutive successes for the probe ## livenessProbe: enabled: true initialDelaySeconds: 500 periodSeconds: 10 timeoutSeconds: 5 failureThreshold: 6 successThreshold: 1 ## Sidekiq extra options for readiness probe ## @param sidekiq.readinessProbe.enabled Enable readinessProbe on Sidekiq containers ## @param sidekiq.readinessProbe.initialDelaySeconds Delay before readiness probe is initiated ## @param sidekiq.readinessProbe.periodSeconds How often to perform the probe ## @param sidekiq.readinessProbe.timeoutSeconds When the probe times out ## @param sidekiq.readinessProbe.failureThreshold Minimum consecutive failures for the probe ## @param sidekiq.readinessProbe.successThreshold Minimum consecutive successes for the probe ## readinessProbe: enabled: true initialDelaySeconds: 30 periodSeconds: 10 timeoutSeconds: 5 failureThreshold: 6 successThreshold: 1 ## @param sidekiq.startupProbe.enabled Enable startupProbe on Sidekiq containers ## @param sidekiq.startupProbe.initialDelaySeconds Initial delay seconds for startupProbe ## @param sidekiq.startupProbe.periodSeconds Period seconds for startupProbe ## @param sidekiq.startupProbe.timeoutSeconds Timeout seconds for startupProbe ## @param sidekiq.startupProbe.failureThreshold Failure threshold for startupProbe ## @param sidekiq.startupProbe.successThreshold Success threshold for startupProbe ## startupProbe: enabled: false initialDelaySeconds: 60 periodSeconds: 10 timeoutSeconds: 5 failureThreshold: 15 successThreshold: 1 ## @param sidekiq.customLivenessProbe Custom livenessProbe that overrides the default one ## customLivenessProbe: {} ## @param sidekiq.customReadinessProbe Custom readinessProbe that overrides the default one ## customReadinessProbe: {} ## @param sidekiq.customStartupProbe Custom startupProbe that overrides the default one ## customStartupProbe: {} ## Sidekiq resource requests and limits ## ref: https://kubernetes.io/docs/user-guide/compute-resources/ ## @param sidekiq.resources.limits The resources limits for the Sidekiq containers ## @param sidekiq.resources.requests The requested resources for the Sidekiq containers ## resources: limits: {} requests: {} ## Configure Sidekiq containers (only main one) Security Context ## ref: https://kubernetes.io/docs/tasks/configure-pod-container/security-context/#set-the-security-context-for-a-container ## @param sidekiq.containerSecurityContext.enabled Enabled Sidekiq containers' Security Context ## @param sidekiq.containerSecurityContext.runAsUser Set Sidekiq containers' Security Context runAsUser ## @param sidekiq.containerSecurityContext.runAsNonRoot Set Sidekiq containers' Security Context runAsNonRoot ## containerSecurityContext: enabled: false runAsUser: 0 runAsNonRoot: false ## @param sidekiq.lifecycleHooks for the Sidekiq container(s) to automate configuration before or after startup ## lifecycleHooks: {} ## @param sidekiq.extraVolumeMounts Optionally specify extra list of additional volumeMounts for the Sidekiq pods ## extraVolumeMounts: [] ## @section Traffic Exposure Parameters ## Discourse service parameters ## service: ## @param service.type Discourse service type ## type: ClusterIP ## @param service.ports.http Discourse service HTTP port ## ports: http: 80 ## Node ports to expose ## @param service.nodePorts.http Node port for HTTP ## NOTE: choose port between <30000-32767> ## nodePorts: http: "" ## @param service.sessionAffinity Control where client requests go, to the same pod or round-robin ## Values: ClientIP or None ## ref: https://kubernetes.io/docs/user-guide/services/ ## sessionAffinity: None ## @param service.clusterIP Discourse service Cluster IP ## e.g.: ## clusterIP: None ## clusterIP: "" ## @param service.loadBalancerIP Discourse service Load Balancer IP ## ref: https://kubernetes.io/docs/concepts/services-networking/service/#type-loadbalancer ## loadBalancerIP: "" ## @param service.loadBalancerSourceRanges Discourse service Load Balancer sources ## ref: https://kubernetes.io/docs/tasks/access-application-cluster/configure-cloud-provider-firewall/#restrict-access-for-loadbalancer-service ## e.g: ## loadBalancerSourceRanges: ## - 10.10.10.0/24 ## loadBalancerSourceRanges: [] ## @param service.externalTrafficPolicy Discourse service external traffic policy ## ref https://kubernetes.io/docs/tasks/access-application-cluster/create-external-load-balancer/#preserving-the-client-source-ip ## externalTrafficPolicy: Cluster ## @param service.annotations Additional custom annotations for Discourse service ## annotations: {} ## @param service.extraPorts Extra port to expose on Discourse service ## extraPorts: [] ## Discourse ingress parameters ## ref: https://kubernetes.io/docs/user-guide/ingress/ ## ingress: ## @param ingress.enabled Enable ingress record generation for Discourse ## enabled: false ## @param ingress.ingressClassName IngressClass that will be be used to implement the Ingress (Kubernetes 1.18+) ## This is supported in Kubernetes 1.18+ and required if you have more than one IngressClass marked as the default for your cluster . ## ref: https://kubernetes.io/blog/2020/04/02/improvements-to-the-ingress-api-in-kubernetes-1.18/ ## ingressClassName: "" ## @param ingress.pathType Ingress path type ## pathType: ImplementationSpecific ## @param ingress.apiVersion Force Ingress API version (automatically detected if not set) ## apiVersion: "" ## @param ingress.hostname Default host for the ingress record ## hostname: discourse.local ## @param ingress.path Default path for the ingress record ## NOTE: You may need to set this to '/*' in order to use this with ALB ingress controllers ## path: / ## @param ingress.annotations [object] Additional annotations for the Ingress resource. To enable certificate autogeneration, place here your cert-manager annotations. ## Use this parameter to set the required annotations for cert-manager, see ## ref: https://cert-manager.io/docs/usage/ingress/#supported-annotations ## e.g: ## annotations: ## kubernetes.io/ingress.class: nginx ## cert-manager.io/cluster-issuer: cluster-issuer-name ## annotations: {} ## @param ingress.tls Enable TLS configuration for the host defined at `ingress.hostname` parameter ## TLS certificates will be retrieved from a TLS secret with name: `{{- printf "%s-tls" .Values.ingress.hostname }}` ## You can: ## - Use the `ingress.secrets` parameter to create this TLS secret ## - Relay on cert-manager to create it by setting the corresponding annotations ## - Relay on Helm to create self-signed certificates by setting `ingress.selfSigned=true` ## tls: false ## @param ingress.selfSigned Create a TLS secret for this ingress record using self-signed certificates generated by Helm ## selfSigned: false ## @param ingress.extraHosts An array with additional hostname(s) to be covered with the ingress record ## e.g: ## extraHosts: ## - name: discourse.local ## path: / ## extraHosts: [] ## @param ingress.extraPaths An array with additional arbitrary paths that may need to be added to the ingress under the main host ## e.g: ## extraPaths: ## - path: /* ## backend: ## serviceName: ssl-redirect ## servicePort: use-annotation ## extraPaths: [] ## @param ingress.extraTls TLS configuration for additional hostname(s) to be covered with this ingress record ## ref: https://kubernetes.io/docs/concepts/services-networking/ingress/#tls ## e.g: ## extraTls: ## - hosts: ## - discourse.local ## secretName: discourse.local-tls ## extraTls: [] ## @param ingress.secrets Custom TLS certificates as secrets ## NOTE: 'key' and 'certificate' are expected in PEM format ## NOTE: 'name' should line up with a 'secretName' set further up ## If it is not set and you're using cert-manager, this is unneeded, as it will create a secret for you with valid certificates ## If it is not set and you're NOT using cert-manager either, self-signed certificates will be created valid for 365 days ## It is also possible to create and manage the certificates outside of this helm chart ## Please see README.md for more information ## e.g: ## secrets: ## - name: discourse.local-tls ## key: |- ## -----BEGIN RSA PRIVATE KEY----- ## ... ## -----END RSA PRIVATE KEY----- ## certificate: |- ## -----BEGIN CERTIFICATE----- ## ... ## -----END CERTIFICATE----- ## secrets: [] ## @section Volume Permissions parameters ## Init containers parameters: ## volumePermissions: Change the owner and group of the persistent volume(s) mountpoint(s) to 'runAsUser:fsGroup' on each node ## volumePermissions: ## @param volumePermissions.enabled Enable init container that changes the owner and group of the persistent volume ## enabled: false ## @param volumePermissions.image.registry Init container volume-permissions image registry ## @param volumePermissions.image.repository Init container volume-permissions image repository ## @param volumePermissions.image.tag Init container volume-permissions image tag (immutable tags are recommended) ## @param volumePermissions.image.pullPolicy Init container volume-permissions image pull policy ## @param volumePermissions.image.pullSecrets Init container volume-permissions image pull secrets ## image: registry: docker.io repository: bitnami/bitnami-shell tag: 10-debian-10-r312 pullPolicy: IfNotPresent ## Optionally specify an array of imagePullSecrets. ## Secrets must be manually created in the namespace. ## ref: https://kubernetes.io/docs/tasks/configure-pod-container/pull-image-private-registry/ ## Example: ## pullSecrets: ## - myRegistryKeySecretName ## pullSecrets: [] ## Init container resource requests and limits ## ref: https://kubernetes.io/docs/user-guide/compute-resources/ ## @param volumePermissions.resources.limits Init container volume-permissions resource limits ## @param volumePermissions.resources.requests Init container volume-permissions resource requests ## resources: limits: {} requests: {} ## Init container' Security Context ## Note: the chown of the data folder is done to containerSecurityContext.runAsUser ## and not the below volumePermissions.containerSecurityContext.runAsUser ## @param volumePermissions.containerSecurityContext.runAsUser User ID for the init container ## containerSecurityContext: runAsUser: 0 ## @section Other Parameters ## Service account for Discourse pods to use. ## ref: https://kubernetes.io/docs/tasks/configure-pod-container/configure-service-account/ ## serviceAccount: ## @param serviceAccount.create Enable creation of ServiceAccount for Discourse pods ## create: false ## @param serviceAccount.name The name of the ServiceAccount to use. ## If not set and create is true, a name is generated using the common.names.fullname template ## name: "" ## @param serviceAccount.automountServiceAccountToken Allows auto mount of ServiceAccountToken on the serviceAccount created ## Can be set to false if pods using this serviceAccount do not need to use K8s API ## automountServiceAccountToken: true ## @param serviceAccount.annotations Additional custom annotations for the ServiceAccount ## annotations: {} ## @section NetworkPolicy parameters networkPolicy: ## @param networkPolicy.enabled Enable network policies ## If ingress.enabled is true, configure networkPolicy.ingress selectors to allow communication ## enabled: false ## @param networkPolicy.ingress.enabled Enable network policy for Ingress Proxies ## @param networkPolicy.ingress.namespaceSelector Ingress Proxy namespace selector labels. These labels will be used to identify the Ingress Proxy's namespace. ## @param networkPolicy.ingress.podSelector Ingress Proxy pods selector labels. These labels will be used to identify the Ingress Proxy pods. ## ingress: enabled: false ## e.g: ## podSelector: ## label: ingress ## podSelector: {} ## e.g: ## namespaceSelector: ## label: ingress ## namespaceSelector: {} ## @param networkPolicy.ingressRules.backendOnlyAccessibleByFrontend Enable ingress rule that makes the backends (PostgreSQL and Redis) only accessible by Discourse's pods. ## @param networkPolicy.ingressRules.customBackendSelector Backend selector labels. These labels will be used to identify the backend pods. ## @param networkPolicy.ingressRules.accessOnlyFrom.enabled Enable ingress rule that makes Discourse only accessible from a particular origin ## @param networkPolicy.ingressRules.accessOnlyFrom.namespaceSelector Namespace selector label that is allowed to access Discourse. This label will be used to identified the allowed namespace(s). ## @param networkPolicy.ingressRules.accessOnlyFrom.podSelector Pods selector label that is allowed to access Discourse. This label will be used to identified the allowed pod(s). ## @param networkPolicy.ingressRules.customRules Custom network policy ingress rule ## ingressRules: ## PostgreSQL and Redis backends only can be accessed from Discourse ## backendOnlyAccessibleByFrontend: false customBackendSelector: {} ## Allow only from the indicated: ## accessOnlyFrom: enabled: false ## e.g: ## namespaceSelector: ## label: ingress ## namespaceSelector: {} ## e.g: ## podSelector: ## label: access ## podSelector: {} ## custom ingress rules ## e.g: ## customRules: ## - from: ## - namespaceSelector: ## matchLabels: ## label: example ## customRules: {} ## @param networkPolicy.egressRules.denyConnectionsToExternal Enable egress rule that denies outgoing traffic outside the cluster, except for DNS (port 53). ## @param networkPolicy.egressRules.customRules Custom network policy rule ## egressRules: ## Deny connections to external. This is not compatible with an external database. ## denyConnectionsToExternal: false ## Additional custom egress rules ## e.g: ## customRules: ## - to: ## - namespaceSelector: ## matchLabels: ## label: example ## customRules: {} ## @section Discourse database parameters ## PostgreSQL chart configuration ## ref: https://github.com/bitnami/charts/blob/master/bitnami/postgresql/values.yaml ## @param postgresql.enabled Switch to enable or disable the PostgreSQL helm chart ## @param postgresql.auth.enablePostgresUser Assign a password to the "postgres" admin user. Otherwise, remote access will be blocked for this user ## @param postgresql.auth.postgresPassword Password for the "postgres" admin user ## @param postgresql.auth.username Name for a custom user to create ## @param postgresql.auth.password Password for the custom user to create ## @param postgresql.auth.database Name for a custom database to create ## @param postgresql.auth.existingSecret Name of existing secret to use for PostgreSQL credentials ## @param postgresql.architecture PostgreSQL architecture (`standalone` or `replication`) ## postgresql: enabled: true auth: enablePostgresUser: true postgresPassword: bitnami username: bn_discourse password: "" database: bitnami_application existingSecret: "" architecture: standalone ## External PostgreSQL configuration ## All of these values are only used when postgresql.enabled is set to false ## @param externalDatabase.host Database host ## @param externalDatabase.port Database port number ## @param externalDatabase.user Non-root username for Discourse ## @param externalDatabase.password Password for the non-root username for Discourse ## @param externalDatabase.database Discourse database name ## @param externalDatabase.create Switch to enable user/database creation during the installation stage ## @param externalDatabase.postgresUser PostgreSQL admin user, used during the installation stage ## @param externalDatabase.postgresPassword PostgreSQL admin password, used during the installation stage ## @param externalDatabase.existingSecret Name of an existing secret resource containing the database credentials ## @param externalDatabase.existingSecretPasswordKey Name of an existing secret key containing the database credentials ## @param externalDatabase.existingSecretPostgresPasswordKey Name of an existing secret key containing the database admin user credentials ## externalDatabase: host: localhost port: 5432 user: bn_discourse database: bitnami_application password: "" create: true postgresUser: "" postgresPassword: "" existingSecret: "" existingSecretPasswordKey: "password" existingSecretPostgresPasswordKey: "postgres-password" ## @section Redis&trade; parameters ## Redis&trade; chart configuration ## ref: https://github.com/bitnami/charts/blob/master/bitnami/redis/values.yaml ## @param redis.enabled Switch to enable or disable the Redis&trade; helm ## @param redis.auth.enabled Enable password authentication ## @param redis.auth.password Redis&trade; password ## @param redis.auth.existingSecret The name of an existing secret with Redis&trade; credentials ## @param redis.architecture Redis&trade; architecture. Allowed values: `standalone` or `replication` ## redis: enabled: true auth: enabled: true ## Redis&trade; password (both master and slave). Defaults to a random 10-character alphanumeric string if not set and auth.enabled is true. ## It should always be set using the password value or in the existingSecret to avoid issues ## with Discourse. ## The password value is ignored if existingSecret is set password: "" existingSecret: "" architecture: standalone ## External Redis&trade; configuration ## All of these values are only used when redis.enabled is set to false ## @param externalRedis.host Redis&trade; host ## @param externalRedis.port Redis&trade; port number ## @param externalRedis.username Redis&trade; username ## @param externalRedis.password Redis&trade; password ## @param externalRedis.existingSecret Name of an existing secret resource containing the Redis&trade credentials ## @param externalRedis.existingSecretPasswordKey Name of an existing secret key containing the Redis&trade credentials ## externalRedis: host: localhost port: 6379 ## Most Redis&trade; implementations do not require a username ## to authenticate and it should be enough with the password username: "" password: "" existingSecret: "" existingSecretPasswordKey: "redis-password"
41.726316
197
0.750869
714276799adfae70a517d95bbd8265e34e792bba
794
yaml
YAML
bitnami/memcached/Chart.yaml
00arthur00/charts
502aa1e64541669b732a4eda896e5937847b6c3c
[ "Apache-2.0" ]
null
null
null
bitnami/memcached/Chart.yaml
00arthur00/charts
502aa1e64541669b732a4eda896e5937847b6c3c
[ "Apache-2.0" ]
2
2022-01-26T01:14:30.000Z
2022-01-26T07:03:39.000Z
bitnami/memcached/Chart.yaml
00arthur00/charts
502aa1e64541669b732a4eda896e5937847b6c3c
[ "Apache-2.0" ]
null
null
null
annotations: category: Infrastructure apiVersion: v2 appVersion: 1.6.14 dependencies: - name: common repository: https://charts.bitnami.com/bitnami tags: - bitnami-common version: 1.x.x description: Memcached is an high-performance, distributed memory object caching system, generic in nature, but intended for use in speeding up dynamic web applications by alleviating database load. engine: gotpl home: https://github.com/bitnami/charts/tree/master/bitnami/memcached icon: https://bitnami.com/assets/stacks/memcached/img/memcached-stack-220x234.png keywords: - memcached - cache maintainers: - email: [email protected] name: Bitnami name: memcached sources: - https://github.com/bitnami/bitnami-docker-memcached - http://memcached.org/ version: 6.0.6
30.538462
198
0.761965
7178d93e64d927a4a158f2383553c6e09def1235
29,326
yaml
YAML
bitnami/tomcat/values.yaml
00arthur00/charts
502aa1e64541669b732a4eda896e5937847b6c3c
[ "Apache-2.0" ]
null
null
null
bitnami/tomcat/values.yaml
00arthur00/charts
502aa1e64541669b732a4eda896e5937847b6c3c
[ "Apache-2.0" ]
2
2022-01-26T01:14:30.000Z
2022-01-26T07:03:39.000Z
bitnami/tomcat/values.yaml
00arthur00/charts
502aa1e64541669b732a4eda896e5937847b6c3c
[ "Apache-2.0" ]
null
null
null
## @section Global parameters ## Global Docker image parameters ## Please, note that this will override the image parameters, including dependencies, configured to use the global value ## Current available global Docker image parameters: imageRegistry, imagePullSecrets and storageClass ## ## @param global.imageRegistry Global Docker image registry ## @param global.imagePullSecrets Global Docker registry secret names as an array ## @param global.storageClass Global StorageClass for Persistent Volume(s) ## global: imageRegistry: "" ## E.g. ## imagePullSecrets: ## - myRegistryKeySecretName ## imagePullSecrets: [] storageClass: "" ## @section Common parameters ## ## @param kubeVersion Force target Kubernetes version (using Helm capabilities if not set) ## kubeVersion: "" ## @param nameOverride String to partially override common.names.fullname template (will maintain the release name) ## nameOverride: "" ## @param fullnameOverride String to fully override common.names.fullname template ## fullnameOverride: "" ## @param commonLabels Add labels to all the deployed resources ## commonLabels: {} ## @param commonAnnotations Add annotations to all the deployed resources ## commonAnnotations: {} ## @param clusterDomain Kubernetes Cluster Domain ## clusterDomain: cluster.local ## @param extraDeploy Array of extra objects to deploy with the release ## extraDeploy: [] ## @section Tomcat parameters ## ## Bitnami Tomcat image version ## ref: https://hub.docker.com/r/bitnami/tomcat/tags/ ## @param image.registry Tomcat image registry ## @param image.repository Tomcat image repository ## @param image.tag Tomcat image tag (immutable tags are recommended) ## @param image.pullPolicy Tomcat image pull policy ## @param image.pullSecrets Specify docker-registry secret names as an array ## @param image.debug Specify if debug logs should be enabled ## image: registry: docker.io repository: bitnami/tomcat tag: 10.0.18-debian-10-r0 ## Specify a imagePullPolicy ## Defaults to 'Always' if image tag is 'latest', else set to 'IfNotPresent' ## ref: https://kubernetes.io/docs/user-guide/images/#pre-pulling-images ## pullPolicy: IfNotPresent ## Optionally specify an array of imagePullSecrets. ## Secrets must be manually created in the namespace. ## ref: https://kubernetes.io/docs/tasks/configure-pod-container/pull-image-private-registry/ ## Example: ## pullSecrets: ## - myRegistryKeySecretName ## pullSecrets: [] ## Set to true if you would like to see extra information on logs ## debug: false ## @param hostAliases Deployment pod host aliases ## https://kubernetes.io/docs/concepts/services-networking/add-entries-to-pod-etc-hosts-with-host-aliases/ ## hostAliases: [] ## @param tomcatUsername Tomcat admin user ## ref: https://github.com/bitnami/bitnami-docker-tomcat#creating-a-custom-user ## tomcatUsername: user ## @param tomcatPassword Tomcat admin password ## ref: https://github.com/bitnami/bitnami-docker-tomcat#creating-a-custom-user ## tomcatPassword: "" ## @param tomcatAllowRemoteManagement Enable remote access to management interface ## ref: https://github.com/bitnami/charts/tree/master/bitnami/tomcat#configuration ## tomcatAllowRemoteManagement: 0 ## @param catalinaOpts Java runtime option used by tomcat JVM ## catalinaOpts: "" ## @param command Override default container command (useful when using custom images) ## command: [] ## @param args Override default container args (useful when using custom images) ## args: [] ## @param extraEnvVars Extra environment variables to be set on Tomcat container ## Example: ## extraEnvVars: ## - name: FOO ## value: "bar" ## extraEnvVars: [] ## @param extraEnvVarsCM Name of existing ConfigMap containing extra environment variables ## extraEnvVarsCM: "" ## @param extraEnvVarsSecret Name of existing Secret containing extra environment variables ## extraEnvVarsSecret: "" ## @section Tomcat deployment parameters ## ## @param replicaCount Specify number of Tomcat replicas ## replicaCount: 1 ## Deployment ## deployment: ## @param deployment.type Use Deployment or StatefulSet ## type: deployment ## Strategy to use to update Pods ## updateStrategy: ## @param updateStrategy.type StrategyType ## Can be set to RollingUpdate or OnDelete ## type: RollingUpdate ## @param containerPorts.http HTTP port to expose at container level ## containerPorts: http: 8080 ## @param containerExtraPorts Extra ports to expose at container level ## ## Example: ## containerExtraPorts: ## - name: ajp ## containerPort: 8081 ## containerExtraPorts: {} ## Tomcat pods' Security Context ## ref: https://kubernetes.io/docs/tasks/configure-pod-container/security-context/#set-the-security-context-for-a-container ## @param podSecurityContext.enabled Enable Tomcat pods' Security Context ## @param podSecurityContext.fsGroup Set Tomcat pod's Security Context fsGroup ## podSecurityContext: enabled: true fsGroup: 1001 ## Tomcat containers' SecurityContext ## ref: https://kubernetes.io/docs/tasks/configure-pod-container/security-context/#set-the-security-context-for-a-pod ## @param containerSecurityContext.enabled Enable Tomcat containers' SecurityContext ## @param containerSecurityContext.runAsUser User ID for the Tomcat container ## @param containerSecurityContext.runAsNonRoot Force user to be root in Tomcat container ## containerSecurityContext: enabled: true runAsUser: 1001 runAsNonRoot: true ## Tomcat containers' resource requests and limits ## ref: https://kubernetes.io/docs/user-guide/compute-resources/ ## We usually recommend not to specify default resources and to leave this as a conscious ## choice for the user. This also increases chances charts run on environments with little ## resources, such as Minikube. If you do want to specify resources, uncomment the following ## lines, adjust them as necessary, and remove the curly braces after 'resources:'. ## @param resources.limits The resources limits for the Tomcat container ## @param resources.requests [object] The requested resources for the Tomcat container ## resources: ## Example: ## limits: ## cpu: 500m ## memory: 1Gi ## limits: {} requests: cpu: 300m memory: 512Mi ## Configure extra options for liveness probe ## ref: https://kubernetes.io/docs/tasks/configure-pod-container/configure-liveness-readiness-probes/#configure-probes ## @param livenessProbe.enabled Enable livenessProbe ## @param livenessProbe.initialDelaySeconds Initial delay seconds for livenessProbe ## @param livenessProbe.periodSeconds Period seconds for livenessProbe ## @param livenessProbe.timeoutSeconds Timeout seconds for livenessProbe ## @param livenessProbe.failureThreshold Failure threshold for livenessProbe ## @param livenessProbe.successThreshold Success threshold for livenessProbe ## livenessProbe: enabled: true initialDelaySeconds: 120 periodSeconds: 10 failureThreshold: 6 timeoutSeconds: 5 successThreshold: 1 ## Configure extra options for readiness probe ## ref: https://kubernetes.io/docs/tasks/configure-pod-container/configure-liveness-readiness-probes/#configure-probes ## @param readinessProbe.enabled Enable readinessProbe ## @param readinessProbe.initialDelaySeconds Initial delay seconds for readinessProbe ## @param readinessProbe.periodSeconds Period seconds for readinessProbe ## @param readinessProbe.timeoutSeconds Timeout seconds for readinessProbe ## @param readinessProbe.failureThreshold Failure threshold for readinessProbe ## @param readinessProbe.successThreshold Success threshold for readinessProbe ## readinessProbe: enabled: true initialDelaySeconds: 30 periodSeconds: 5 failureThreshold: 3 timeoutSeconds: 3 successThreshold: 1 ## Configure extra options for startup probe ## ref: https://kubernetes.io/docs/tasks/configure-pod-container/configure-liveness-startup-probes/#configure-probes ## @param startupProbe.enabled Enable startupProbe ## @param startupProbe.initialDelaySeconds Initial delay seconds for startupProbe ## @param startupProbe.periodSeconds Period seconds for startupProbe ## @param startupProbe.timeoutSeconds Timeout seconds for startupProbe ## @param startupProbe.failureThreshold Failure threshold for startupProbe ## @param startupProbe.successThreshold Success threshold for startupProbe ## startupProbe: enabled: false initialDelaySeconds: 30 periodSeconds: 5 failureThreshold: 3 timeoutSeconds: 3 successThreshold: 1 ## @param customLivenessProbe Override default liveness probe ## customLivenessProbe: {} ## @param customReadinessProbe Override default readiness probe ## customReadinessProbe: {} ## @param customStartupProbe Override default startup probe ## customStartupProbe: {} ## @param podLabels Extra labels for Tomcat pods ## ref: https://kubernetes.io/docs/concepts/overview/working-with-objects/labels/ ## podLabels: {} ## @param podAnnotations Annotations for Tomcat pods ## ref: https://kubernetes.io/docs/concepts/overview/working-with-objects/annotations/ ## podAnnotations: {} ## @param podAffinityPreset Pod affinity preset. Ignored if `affinity` is set. Allowed values: `soft` or `hard` ## ref: https://kubernetes.io/docs/concepts/scheduling-eviction/assign-pod-node/#inter-pod-affinity-and-anti-affinity ## podAffinityPreset: "" ## @param podAntiAffinityPreset Pod anti-affinity preset. Ignored if `affinity` is set. Allowed values: `soft` or `hard` ## Ref: https://kubernetes.io/docs/concepts/scheduling-eviction/assign-pod-node/#inter-pod-affinity-and-anti-affinity ## podAntiAffinityPreset: soft ## Node affinity preset ## Ref: https://kubernetes.io/docs/concepts/scheduling-eviction/assign-pod-node/#node-affinity ## nodeAffinityPreset: ## @param nodeAffinityPreset.type Node affinity preset type. Ignored if `affinity` is set. Allowed values: `soft` or `hard` ## type: "" ## @param nodeAffinityPreset.key Node label key to match. Ignored if `affinity` is set. ## E.g. ## key: "kubernetes.io/e2e-az-name" ## key: "" ## @param nodeAffinityPreset.values Node label values to match. Ignored if `affinity` is set. ## E.g. ## values: ## - e2e-az1 ## - e2e-az2 ## values: [] ## @param affinity Affinity for pod assignment. Evaluated as a template. ## Ref: https://kubernetes.io/docs/concepts/configuration/assign-pod-node/#affinity-and-anti-affinity ## Note: podAffinityPreset, podAntiAffinityPreset, and nodeAffinityPreset will be ignored when it's set ## affinity: {} ## @param nodeSelector Node labels for pod assignment. Evaluated as a template. ## ref: https://kubernetes.io/docs/user-guide/node-selection/ ## nodeSelector: {} ## @param schedulerName Alternative scheduler ## ref: https://kubernetes.io/docs/tasks/administer-cluster/configure-multiple-schedulers/ ## schedulerName: "" ## @param lifecycleHooks [object] Override default etcd container hooks ## lifecycleHooks: {} ## @param podManagementPolicy podManagementPolicy to manage scaling operation of pods (only in StatefulSet mode) ## ref: https://kubernetes.io/docs/concepts/workloads/controllers/statefulset/#pod-management-policies ## podManagementPolicy: "" ## @param tolerations Tolerations for pod assignment. Evaluated as a template. ## ref: https://kubernetes.io/docs/concepts/configuration/taint-and-toleration/ ## tolerations: [] ## @param topologySpreadConstraints Topology Spread Constraints for pod assignment spread across your cluster among failure-domains. Evaluated as a template ## Ref: https://kubernetes.io/docs/concepts/workloads/pods/pod-topology-spread-constraints/#spread-constraints-for-pods ## topologySpreadConstraints: [] ## @param extraPodSpec Optionally specify extra PodSpec ## extraPodSpec: {} ## @param extraVolumes Optionally specify extra list of additional volumes for Tomcat pods in Deployment ## extraVolumes: [] ## @param extraVolumeClaimTemplates Optionally specify extra list of additional volume claim templates for Tomcat pods in StatefulSet ## extraVolumeClaimTemplates: [] ## @param extraVolumeMounts Optionally specify extra list of additional volumeMounts for Tomcat container(s) ## extraVolumeMounts: [] ## @param initContainers Add init containers to the Tomcat pods. ## Example: ## initContainers: ## - name: your-image-name ## image: your-image ## imagePullPolicy: Always ## ports: ## - name: portname ## containerPort: 1234 ## initContainers: [] ## @param sidecars Add sidecars to the Tomcat pods. ## Example: ## sidecars: ## - name: your-image-name ## image: your-image ## imagePullPolicy: Always ## ports: ## - name: portname ## containerPort: 1234 ## sidecars: [] ## Enable persistence using Persistent Volume Claims ## ref: https://kubernetes.io/docs/user-guide/persistent-volumes/ ## persistence: ## @param persistence.enabled Enable persistence ## enabled: true ## @param persistence.storageClass PVC Storage Class for Tomcat volume ## If defined, storageClassName: <storageClass> ## If set to "-", storageClassName: "", which disables dynamic provisioning ## If undefined (the default) or set to null, no storageClassName spec is ## set, choosing the default provisioner. (gp2 on AWS, standard on ## GKE, AWS & OpenStack) ## storageClass: "" ## @param persistence.annotations Persistent Volume Claim annotations ## annotations: {} ## @param persistence.accessModes PVC Access Modes for Tomcat volume ## accessModes: - ReadWriteOnce ## @param persistence.size PVC Storage Request for Tomcat volume ## size: 8Gi ## @param persistence.existingClaim An Existing PVC name for Tomcat volume ## existingClaim: "" ## @param persistence.selectorLabels Selector labels to use in volume claim template in statefulset ## Applicable when deployment.type is statefulset ## selectorLabels: {} networkPolicy: ## @param networkPolicy.enabled Enable creation of NetworkPolicy resources. Only Ingress traffic is filtered for now. ## enabled: false ## @param networkPolicy.allowExternal Don't require client label for connections ## The Policy model to apply. When set to false, only pods with the correct ## client label will have network access to every tomcat port defined on containerPort and containerExtraPorts. ## When true, tomcat will accept connections from any source ## (with the correct destination port). ## allowExternal: true ## @param networkPolicy.explicitNamespacesSelector A Kubernetes LabelSelector to explicitly select namespaces from which traffic could be allowed ## If explicitNamespacesSelector is missing or set to {}, only client Pods that are in the networkPolicy's namespace ## and that match other criteria, the ones that have the good label, can reach the tomcat. ## But sometimes, we want the tomcat to be accessible to clients from other namespaces, in this case, we can use this ## LabelSelector to select these namespaces, note that the networkPolicy's namespace should also be explicitly added. ## ## Example: ## explicitNamespacesSelector: ## matchLabels: ## role: frontend ## matchExpressions: ## - {key: role, operator: In, values: [frontend]} ## explicitNamespacesSelector: {} ## @section Traffic Exposure parameters ## ## Service parameters ## service: ## @param service.type Kubernetes Service type ## For minikube, set this to NodePort, elsewhere use LoadBalancer ## type: LoadBalancer ## @param service.ports.http Service HTTP port ## ports: http: 80 ## @param service.nodePorts.http Kubernetes http node port ## ref: https://kubernetes.io/docs/concepts/services-networking/service/#type-nodeport ## nodePorts: http: "" ## @param service.extraPorts Extra ports to expose (normally used with the `sidecar` value) ## extraPorts: [] ## @param service.loadBalancerIP Port Use serviceLoadBalancerIP to request a specific static IP, otherwise leave blank ## loadBalancerIP: "" ## @param service.clusterIP Service Cluster IP ## e.g.: ## clusterIP: None ## clusterIP: "" ## @param service.loadBalancerSourceRanges Service Load Balancer sources ## ref: https://kubernetes.io/docs/tasks/access-application-cluster/configure-cloud-provider-firewall/#restrict-access-for-loadbalancer-service ## e.g: ## loadBalancerSourceRanges: ## - 10.10.10.0/24 ## loadBalancerSourceRanges: [] ## @param service.externalTrafficPolicy Enable client source IP preservation ## ref https://kubernetes.io/docs/tasks/access-application-cluster/create-external-load-balancer/#preserving-the-client-source-ip ## externalTrafficPolicy: Cluster ## @param service.annotations Annotations for Tomcat service ## set the LoadBalancer service type to internal only. ## ref: https://kubernetes.io/docs/concepts/services-networking/service/#internal-load-balancer ## annotations: {} ## Ingress configuratiom ## ingress: ## @param ingress.enabled Enable ingress controller resource ## enabled: false ## DEPRECATED: Use ingress.annotations instead of ingress.certManager ## certManager: false ## ## @param ingress.hostname Default host for the ingress resource ## hostname: tomcat.local ## @param ingress.annotations Additional annotations for the Ingress resource. To enable certificate autogeneration, place here your cert-manager annotations. ## For a full list of possible ingress annotations, please see ## ref: https://github.com/kubernetes/ingress-nginx/blob/master/docs/user-guide/nginx-configuration/annotations.md ## Use this parameter to set the required annotations for cert-manager, see ## ref: https://cert-manager.io/docs/usage/ingress/#supported-annotations ## ## e.g: ## annotations: ## kubernetes.io/ingress.class: nginx ## cert-manager.io/cluster-issuer: cluster-issuer-name ## annotations: {} ## @param ingress.tls Enable TLS configuration for the hostname defined at `ingress.hostname` parameter ## TLS certificates will be retrieved from a TLS secret with name: {{- printf "%s-tls" .Values.ingress.hostname }} ## You can use the ingress.secrets parameter to create this TLS secret, relay on cert-manager to create it, or ## let the chart create self-signed certificates for you ## tls: false ## @param ingress.extraHosts The list of additional hostnames to be covered with this ingress record. ## Most likely the hostname above will be enough, but in the event more hosts are needed, this is an array ## Example: ## extraHosts: ## - name: tomcat.local ## path: / ## extraHosts: [] ## @param ingress.extraTls The tls configuration for additional hostnames to be covered with this ingress record. ## see: https://kubernetes.io/docs/concepts/services-networking/ingress/#tls ## Example: ## extraTls: ## - hosts: ## - tomcat.local ## secretName: tomcat.local-tls ## extraTls: [] ## @param ingress.extraPaths Any additional arbitrary paths that may need to be added to the ingress under the main host. ## For example: The ALB ingress controller requires a special rule for handling SSL redirection. ## extraPaths: ## - path: /* ## backend: ## serviceName: ssl-redirect ## servicePort: use-annotation ## extraPaths: [] ## @param ingress.selfSigned Create a TLS secret for this ingress record using self-signed certificates generated by Helm ## selfSigned: false ## @param ingress.ingressClassName IngressClass that will be be used to implement the Ingress (Kubernetes 1.18+) ## This is supported in Kubernetes 1.18+ and required if you have more than one IngressClass marked as the default for your cluster . ## ref: https://kubernetes.io/blog/2020/04/02/improvements-to-the-ingress-api-in-kubernetes-1.18/ ## ingressClassName: "" ## @param ingress.secrets If you're providing your own certificates, please use this to add the certificates as secrets ## key and certificate should start with -----BEGIN CERTIFICATE----- or -----BEGIN RSA PRIVATE KEY----- ## name should line up with a secretName set further up ## ## If it is not set and you're using cert-manager, this is unneeded, as it will create the secret for you ## If it is not set and you're NOT using cert-manager either, self-signed certificates will be created ## It is also possible to create and manage the certificates outside of this helm chart ## Please see README.md for more information ## ## Example ## secrets: ## - name: tomcat.local-tls ## key: "" ## certificate: "" ## secrets: [] ## @param ingress.apiVersion Force Ingress API version (automatically detected if not set) ## apiVersion: "" ## @param ingress.path Ingress path ## path: / ## @param ingress.pathType Ingress path type ## pathType: ImplementationSpecific ## @section Volume Permissions parameters ## ## Init containers parameters: ## volumePermissions: Change the owner and group of the persistent volume mountpoint to runAsUser:fsGroup values from the securityContext section. ## volumePermissions: ## @param volumePermissions.enabled Enable init container that changes volume permissions in the data directory ## enabled: false ## @param volumePermissions.image.registry Init container volume-permissions image registry ## @param volumePermissions.image.repository Init container volume-permissions image repository ## @param volumePermissions.image.tag Init container volume-permissions image tag ## @param volumePermissions.image.pullPolicy Init container volume-permissions image pull policy ## @param volumePermissions.image.pullSecrets Specify docker-registry secret names as an array ## image: registry: docker.io repository: bitnami/bitnami-shell tag: 10-debian-10-r365 pullPolicy: IfNotPresent ## Optionally specify an array of imagePullSecrets. ## Secrets must be manually created in the namespace. ## ref: https://kubernetes.io/docs/tasks/configure-pod-container/pull-image-private-registry/ ## Example: ## pullSecrets: ## - myRegistryKeySecretName ## pullSecrets: [] ## Init container' resource requests and limits ## ref: https://kubernetes.io/docs/user-guide/compute-resources/ ## We usually recommend not to specify default resources and to leave this as a conscious ## choice for the user. This also increases chances charts run on environments with little ## resources, such as Minikube. If you do want to specify resources, uncomment the following ## lines, adjust them as necessary, and remove the curly braces after 'resources:'. ## @param volumePermissions.resources.limits Init container volume-permissions resource limits ## @param volumePermissions.resources.requests Init container volume-permissions resource requests ## resources: ## Example: ## limits: ## cpu: 100m ## memory: 128Mi ## limits: {} ## Examples: ## requests: ## cpu: 100m ## memory: 128Mi ## requests: {} ## @section Metrics parameters ## Prometheus Exporters / Metrics ## metrics: ## Prometheus JMX Exporter: exposes the majority of tomcat jvm metrics ## jmx: ## @param metrics.jmx.enabled Whether or not to expose JMX metrics to Prometheus ## enabled: false ## @param metrics.jmx.catalinaOpts custom option used to enabled JMX on tomcat jvm evaluated as template ## catalinaOpts: -Dcom.sun.management.jmxremote -Dcom.sun.management.jmxremote.port=5555 -Dcom.sun.management.jmxremote.authenticate=false -Dcom.sun.management.jmxremote.ssl=false -Dcom.sun.management.jmxremote.local.only=true ## Bitnami JMX exporter image ## ref: https://hub.docker.com/r/bitnami/jmx-exporter/tags/ ## @param metrics.jmx.image.registry JMX exporter image registry ## @param metrics.jmx.image.repository JMX exporter image repository ## @param metrics.jmx.image.tag JMX exporter image tag (immutable tags are recommended) ## @param metrics.jmx.image.pullPolicy JMX exporter image pull policy ## @param metrics.jmx.image.pullSecrets Specify docker-registry secret names as an array ## image: registry: docker.io repository: bitnami/jmx-exporter tag: 0.16.1-debian-10-r237 ## Specify a imagePullPolicy ## Defaults to 'Always' if image tag is 'latest', else set to 'IfNotPresent' ## ref: https://kubernetes.io/docs/user-guide/images/#pre-pulling-images ## pullPolicy: IfNotPresent ## Optionally specify an array of imagePullSecrets (secrets must be manually created in the namespace) ## ref: https://kubernetes.io/docs/tasks/configure-pod-container/pull-image-private-registry/ ## Example: ## pullSecrets: ## - myRegistryKeySecretName ## pullSecrets: [] ## @param metrics.jmx.config [string] Configuration file for JMX exporter ## Specify content for jmx-tomcat-prometheus.yml. Evaluated as a template ## config: | jmxUrl: service:jmx:rmi:///jndi/rmi://127.0.0.1:5555/jmxrmi startDelaySecs: 120 ssl: false lowercaseOutputName: true lowercaseOutputLabelNames: true attrNameSnakeCase: true ## Prometheus JMX Exporter' resource requests and limits ## ref: https://kubernetes.io/docs/user-guide/compute-resources/ ## We usually recommend not to specify default resources and to leave this as a conscious ## choice for the user. This also increases chances charts run on environments with little ## resources, such as Minikube. If you do want to specify resources, uncomment the following ## lines, adjust them as necessary, and remove the curly braces after 'resources:'. ## @param metrics.jmx.resources.limits JMX Exporter container resource limits ## @param metrics.jmx.resources.requests JMX Exporter container resource requests ## resources: ## Example: ## limits: ## cpu: 100m ## memory: 128Mi limits: {} ## Examples: ## requests: ## cpu: 100m ## memory: 128Mi requests: {} ## @param metrics.jmx.ports.metrics JMX Exporter container metrics ports ## ports: metrics: 5556 ## @param metrics.jmx.existingConfigmap Name of existing ConfigMap with JMX exporter configuration ## NOTE: This will override metrics.jmx.config ## existingConfigmap: "" ## Prometheus pod Monitor ## ref: https://github.com/prometheus-operator/prometheus-operator/blob/master/Documentation/api.md#podmonitorspec ## podMonitor: ## @param metrics.podMonitor.podTargetLabels Used to keep given pod's labels in target ## e.g: ## - app.kubernetes.io/name ## podTargetLabels: [] ## @param metrics.podMonitor.enabled Create PodMonitor Resource for scraping metrics using PrometheusOperator ## enabled: false ## @param metrics.podMonitor.namespace Namespace in which Prometheus is running ## namespace: monitoring ## @param metrics.podMonitor.interval Specify the interval at which metrics should be scraped ## interval: 30s ## @param metrics.podMonitor.scrapeTimeout Specify the timeout after which the scrape is ended ## scrapeTimeout: 30s ## @param metrics.podMonitor.additionalLabels [object] Additional labels that can be used so PodMonitors will be discovered by Prometheus ## ref: https://github.com/coreos/prometheus-operator/blob/master/Documentation/api.md#prometheusspec ## additionalLabels: {} ## @param metrics.podMonitor.scheme Scheme to use for scraping ## scheme: http ## @param metrics.podMonitor.tlsConfig [object] TLS configuration used for scrape endpoints used by Prometheus ## ref: https://github.com/prometheus-operator/prometheus-operator/blob/master/Documentation/api.md#tlsconfig ## e.g: ## tlsConfig: ## ca: ## secret: ## name: existingSecretName ## tlsConfig: {} ## @param metrics.podMonitor.relabelings [array] Prometheus relabeling rules ## relabelings: [] ## Custom PrometheusRule to be defined ## The value is evaluated as a template, so, for example, the value can depend on .Release or .Chart ## ref: https://github.com/coreos/prometheus-operator#customresourcedefinitions ## prometheusRule: ## @param metrics.prometheusRule.enabled Set this to true to create prometheusRules for Prometheus operator ## enabled: false ## @param metrics.prometheusRule.additionalLabels Additional labels that can be used so prometheusRules will be discovered by Prometheus ## additionalLabels: {} ## @param metrics.prometheusRule.namespace namespace where prometheusRules resource should be created ## namespace: "" ## @param metrics.prometheusRule.rules Create specified [Rules](https://prometheus.io/docs/prometheus/latest/configuration/alerting_rules/) ## Make sure to constraint the rules to the current tomcat service. ## rules: ## - alert: HugeReplicationLag ## expr: up{service="{{ template "common.names.fullname" . }}-metrics"} < 1 ## for: 1m ## labels: ## severity: critical ## annotations: ## description: Service {{ template "common.names.fullname" . }} Tomcat is down since 1m. ## summary: Tomcat instance is down. ## rules: []
40.338377
227
0.737639
670c5de5a49135f8bc6f3d2dc1afbbd368ab33dd
23,051
yaml
YAML
bitnami/redis/templates/master/application.yaml
00arthur00/charts
502aa1e64541669b732a4eda896e5937847b6c3c
[ "Apache-2.0" ]
null
null
null
bitnami/redis/templates/master/application.yaml
00arthur00/charts
502aa1e64541669b732a4eda896e5937847b6c3c
[ "Apache-2.0" ]
2
2022-01-26T01:14:30.000Z
2022-01-26T07:03:39.000Z
bitnami/redis/templates/master/application.yaml
00arthur00/charts
502aa1e64541669b732a4eda896e5937847b6c3c
[ "Apache-2.0" ]
null
null
null
{{- if or (not (eq .Values.architecture "replication")) (not .Values.sentinel.enabled) }} apiVersion: {{ include "common.capabilities.statefulset.apiVersion" . }} kind: {{ .Values.master.kind }} metadata: name: {{ printf "%s-master" (include "common.names.fullname" .) }} namespace: {{ .Release.Namespace | quote }} labels: {{- include "common.labels.standard" . | nindent 4 }} app.kubernetes.io/component: master {{- if .Values.commonLabels }} {{- include "common.tplvalues.render" ( dict "value" .Values.commonLabels "context" $ ) | nindent 4 }} {{- end }} {{- if .Values.commonAnnotations }} annotations: {{- include "common.tplvalues.render" ( dict "value" .Values.commonAnnotations "context" $ ) | nindent 4 }} {{- end }} spec: replicas: 1 selector: matchLabels: {{- include "common.labels.matchLabels" . | nindent 6 }} app.kubernetes.io/component: master {{- if (eq .Values.master.kind "StatefulSet") }} serviceName: {{ printf "%s-headless" (include "common.names.fullname" .) }} {{- end }} {{- if .Values.master.updateStrategy }} {{- if (eq .Values.master.kind "Deployment") }} strategy: {{- toYaml .Values.master.updateStrategy | nindent 4 }} {{- else }} updateStrategy: {{- toYaml .Values.master.updateStrategy | nindent 4 }} {{- end }} {{- end }} template: metadata: labels: {{- include "common.labels.standard" . | nindent 8 }} app.kubernetes.io/component: master {{- if .Values.master.podLabels }} {{- include "common.tplvalues.render" ( dict "value" .Values.master.podLabels "context" $ ) | nindent 8 }} {{- end }} {{- if and .Values.metrics.enabled .Values.metrics.podLabels }} {{- include "common.tplvalues.render" ( dict "value" .Values.metrics.podLabels "context" $ ) | nindent 8 }} {{- end }} annotations: {{- if (include "redis.createConfigmap" .) }} checksum/configmap: {{ include (print $.Template.BasePath "/configmap.yaml") . | sha256sum }} {{- end }} checksum/health: {{ include (print $.Template.BasePath "/health-configmap.yaml") . | sha256sum }} checksum/scripts: {{ include (print $.Template.BasePath "/scripts-configmap.yaml") . | sha256sum }} checksum/secret: {{ include (print $.Template.BasePath "/secret.yaml") . | sha256sum }} {{- if .Values.master.podAnnotations }} {{- include "common.tplvalues.render" ( dict "value" .Values.master.podAnnotations "context" $ ) | nindent 8 }} {{- end }} {{- if and .Values.metrics.enabled .Values.metrics.podAnnotations }} {{- include "common.tplvalues.render" ( dict "value" .Values.metrics.podAnnotations "context" $ ) | nindent 8 }} {{- end }} spec: {{- include "redis.imagePullSecrets" . | nindent 6 }} {{- if .Values.master.hostAliases }} hostAliases: {{- include "common.tplvalues.render" (dict "value" .Values.master.hostAliases "context" $) | nindent 8 }} {{- end }} {{- if .Values.master.podSecurityContext.enabled }} securityContext: {{- omit .Values.master.podSecurityContext "enabled" | toYaml | nindent 8 }} {{- end }} serviceAccountName: {{ template "redis.serviceAccountName" . }} {{- if .Values.master.priorityClassName }} priorityClassName: {{ .Values.master.priorityClassName | quote }} {{- end }} {{- if .Values.master.affinity }} affinity: {{- include "common.tplvalues.render" (dict "value" .Values.master.affinity "context" $) | nindent 8 }} {{- else }} affinity: podAffinity: {{- include "common.affinities.pods" (dict "type" .Values.master.podAffinityPreset "component" "master" "context" $) | nindent 10 }} podAntiAffinity: {{- include "common.affinities.pods" (dict "type" .Values.master.podAntiAffinityPreset "component" "master" "context" $) | nindent 10 }} nodeAffinity: {{- include "common.affinities.nodes" (dict "type" .Values.master.nodeAffinityPreset.type "key" .Values.master.nodeAffinityPreset.key "values" .Values.master.nodeAffinityPreset.values) | nindent 10 }} {{- end }} {{- if .Values.master.nodeSelector }} nodeSelector: {{- include "common.tplvalues.render" (dict "value" .Values.master.nodeSelector "context" $) | nindent 8 }} {{- end }} {{- if .Values.master.tolerations }} tolerations: {{- include "common.tplvalues.render" (dict "value" .Values.master.tolerations "context" $) | nindent 8 }} {{- end }} {{- if .Values.master.topologySpreadConstraints }} topologySpreadConstraints: {{- include "common.tplvalues.render" (dict "value" .Values.master.topologySpreadConstraints "context" $) | nindent 8 }} {{- end }} {{- if .Values.master.shareProcessNamespace }} shareProcessNamespace: {{ .Values.master.shareProcessNamespace }} {{- end }} {{- if .Values.master.schedulerName }} schedulerName: {{ .Values.master.schedulerName | quote }} {{- end }} terminationGracePeriodSeconds: {{ .Values.master.terminationGracePeriodSeconds }} containers: - name: redis image: {{ template "redis.image" . }} imagePullPolicy: {{ .Values.image.pullPolicy | quote }} {{- if .Values.master.lifecycleHooks }} lifecycle: {{- include "common.tplvalues.render" (dict "value" .Values.master.lifecycleHooks "context" $) | nindent 12 }} {{- end }} {{- if .Values.master.containerSecurityContext.enabled }} securityContext: {{- omit .Values.master.containerSecurityContext "enabled" | toYaml | nindent 12 }} {{- end }} {{- if .Values.diagnosticMode.enabled }} command: {{- include "common.tplvalues.render" (dict "value" .Values.diagnosticMode.command "context" $) | nindent 12 }} {{- else if .Values.master.command }} command: {{- include "common.tplvalues.render" (dict "value" .Values.master.command "context" $) | nindent 12 }} {{- else }} command: - /bin/bash {{- end }} {{- if .Values.diagnosticMode.enabled }} args: {{- include "common.tplvalues.render" (dict "value" .Values.diagnosticMode.args "context" $) | nindent 12 }} {{- else if .Values.master.args }} args: {{- include "common.tplvalues.render" (dict "value" .Values.master.args "context" $) | nindent 12 }} {{- else }} args: - -c - /opt/bitnami/scripts/start-scripts/start-master.sh {{- end }} env: - name: BITNAMI_DEBUG value: {{ ternary "true" "false" (or .Values.image.debug .Values.diagnosticMode.enabled) | quote }} - name: REDIS_REPLICATION_MODE value: master - name: ALLOW_EMPTY_PASSWORD value: {{ ternary "no" "yes" .Values.auth.enabled | quote }} {{- if .Values.auth.enabled }} {{- if .Values.auth.usePasswordFiles }} - name: REDIS_PASSWORD_FILE value: "/opt/bitnami/redis/secrets/redis-password" {{- else }} - name: REDIS_PASSWORD valueFrom: secretKeyRef: name: {{ template "redis.secretName" . }} key: {{ template "redis.secretPasswordKey" . }} {{- end }} {{- end }} - name: REDIS_TLS_ENABLED value: {{ ternary "yes" "no" .Values.tls.enabled | quote }} {{- if .Values.tls.enabled }} - name: REDIS_TLS_PORT value: {{ .Values.master.containerPorts.redis | quote }} - name: REDIS_TLS_AUTH_CLIENTS value: {{ ternary "yes" "no" .Values.tls.authClients | quote }} - name: REDIS_TLS_CERT_FILE value: {{ template "redis.tlsCert" . }} - name: REDIS_TLS_KEY_FILE value: {{ template "redis.tlsCertKey" . }} - name: REDIS_TLS_CA_FILE value: {{ template "redis.tlsCACert" . }} {{- if .Values.tls.dhParamsFilename }} - name: REDIS_TLS_DH_PARAMS_FILE value: {{ template "redis.tlsDHParams" . }} {{- end }} {{- else }} - name: REDIS_PORT value: {{ .Values.master.containerPorts.redis | quote }} {{- end }} {{- if .Values.master.extraEnvVars }} {{- include "common.tplvalues.render" (dict "value" .Values.master.extraEnvVars "context" $) | nindent 12 }} {{- end }} {{- if or .Values.master.extraEnvVarsCM .Values.master.extraEnvVarsSecret }} envFrom: {{- if .Values.master.extraEnvVarsCM }} - configMapRef: name: {{ .Values.master.extraEnvVarsCM }} {{- end }} {{- if .Values.master.extraEnvVarsSecret }} - secretRef: name: {{ .Values.master.extraEnvVarsSecret }} {{- end }} {{- end }} ports: - name: redis containerPort: {{ .Values.master.containerPorts.redis }} {{- if not .Values.diagnosticMode.enabled }} {{- if .Values.master.startupProbe.enabled }} startupProbe: {{- include "common.tplvalues.render" (dict "value" (omit .Values.master.startupProbe "enabled") "context" $) | nindent 12 }} tcpSocket: port: redis {{- else if .Values.master.customStartupProbe }} startupProbe: {{- include "common.tplvalues.render" (dict "value" .Values.master.customStartupProbe "context" $) | nindent 12 }} {{- end }} {{- if .Values.master.livenessProbe.enabled }} livenessProbe: initialDelaySeconds: {{ .Values.master.livenessProbe.initialDelaySeconds }} periodSeconds: {{ .Values.master.livenessProbe.periodSeconds }} # One second longer than command timeout should prevent generation of zombie processes. timeoutSeconds: {{ add1 .Values.master.livenessProbe.timeoutSeconds }} successThreshold: {{ .Values.master.livenessProbe.successThreshold }} failureThreshold: {{ .Values.master.livenessProbe.failureThreshold }} exec: command: - sh - -c - /health/ping_liveness_local.sh {{ .Values.master.livenessProbe.timeoutSeconds }} {{- else if .Values.master.customLivenessProbe }} livenessProbe: {{- include "common.tplvalues.render" (dict "value" .Values.master.customLivenessProbe "context" $) | nindent 12 }} {{- end }} {{- if .Values.master.readinessProbe.enabled }} readinessProbe: initialDelaySeconds: {{ .Values.master.readinessProbe.initialDelaySeconds }} periodSeconds: {{ .Values.master.readinessProbe.periodSeconds }} timeoutSeconds: {{ add1 .Values.master.readinessProbe.timeoutSeconds }} successThreshold: {{ .Values.master.readinessProbe.successThreshold }} failureThreshold: {{ .Values.master.readinessProbe.failureThreshold }} exec: command: - sh - -c - /health/ping_readiness_local.sh {{ .Values.master.readinessProbe.timeoutSeconds }} {{- else if .Values.master.customReadinessProbe }} readinessProbe: {{- include "common.tplvalues.render" (dict "value" .Values.master.customReadinessProbe "context" $) | nindent 12 }} {{- end }} {{- end }} {{- if .Values.master.resources }} resources: {{- toYaml .Values.master.resources | nindent 12 }} {{- end }} volumeMounts: - name: start-scripts mountPath: /opt/bitnami/scripts/start-scripts - name: health mountPath: /health {{- if .Values.auth.usePasswordFiles }} - name: redis-password mountPath: /opt/bitnami/redis/secrets/ {{- end }} - name: redis-data mountPath: {{ .Values.master.persistence.path }} subPath: {{ .Values.master.persistence.subPath }} - name: config mountPath: /opt/bitnami/redis/mounted-etc - name: redis-tmp-conf mountPath: /opt/bitnami/redis/etc/ - name: tmp mountPath: /tmp {{- if .Values.tls.enabled }} - name: redis-certificates mountPath: /opt/bitnami/redis/certs readOnly: true {{- end }} {{- if .Values.master.extraVolumeMounts }} {{- include "common.tplvalues.render" ( dict "value" .Values.master.extraVolumeMounts "context" $ ) | nindent 12 }} {{- end }} {{- if .Values.metrics.enabled }} - name: metrics image: {{ include "redis.metrics.image" . }} imagePullPolicy: {{ .Values.metrics.image.pullPolicy | quote }} {{- if .Values.metrics.containerSecurityContext.enabled }} securityContext: {{- omit .Values.metrics.containerSecurityContext "enabled" | toYaml | nindent 12 }} {{- end }} {{- if .Values.diagnosticMode.enabled }} command: {{- include "common.tplvalues.render" (dict "value" .Values.diagnosticMode.command "context" $) | nindent 12 }} {{- else }} command: - /bin/bash - -c - | if [[ -f '/secrets/redis-password' ]]; then export REDIS_PASSWORD=$(cat /secrets/redis-password) fi redis_exporter{{- range $key, $value := .Values.metrics.extraArgs }} --{{ $key }}={{ $value }}{{- end }} {{- end }} {{- if .Values.diagnosticMode.enabled }} args: {{- include "common.tplvalues.render" (dict "value" .Values.diagnosticMode.args "context" $) | nindent 12 }} {{- end }} env: - name: REDIS_ALIAS value: {{ template "common.names.fullname" . }} {{- if .Values.auth.enabled }} - name: REDIS_USER value: default {{- if (not .Values.auth.usePasswordFiles) }} - name: REDIS_PASSWORD valueFrom: secretKeyRef: name: {{ template "redis.secretName" . }} key: {{ template "redis.secretPasswordKey" . }} {{- end }} {{- end }} {{- if .Values.tls.enabled }} - name: REDIS_ADDR value: rediss://{{ .Values.metrics.redisTargetHost }}:{{ .Values.master.containerPorts.redis }} {{- if .Values.tls.authClients }} - name: REDIS_EXPORTER_TLS_CLIENT_KEY_FILE value: {{ template "redis.tlsCertKey" . }} - name: REDIS_EXPORTER_TLS_CLIENT_CERT_FILE value: {{ template "redis.tlsCert" . }} {{- end }} - name: REDIS_EXPORTER_TLS_CA_CERT_FILE value: {{ template "redis.tlsCACert" . }} {{- end }} ports: - name: metrics containerPort: 9121 {{- if .Values.metrics.resources }} resources: {{- toYaml .Values.metrics.resources | nindent 12 }} {{- end }} volumeMounts: {{- if .Values.auth.usePasswordFiles }} - name: redis-password mountPath: /secrets/ {{- end }} {{- if .Values.tls.enabled }} - name: redis-certificates mountPath: /opt/bitnami/redis/certs readOnly: true {{- end }} {{- if .Values.metrics.extraVolumeMounts }} {{- include "common.tplvalues.render" ( dict "value" .Values.metrics.extraVolumeMounts "context" $ ) | nindent 12 }} {{- end }} {{- end }} {{- if .Values.master.sidecars }} {{- include "common.tplvalues.render" (dict "value" .Values.master.sidecars "context" $) | nindent 8 }} {{- end }} {{- $needsVolumePermissions := and .Values.volumePermissions.enabled .Values.master.persistence.enabled .Values.master.podSecurityContext.enabled .Values.master.containerSecurityContext.enabled }} {{- if or .Values.master.initContainers $needsVolumePermissions .Values.sysctl.enabled }} initContainers: {{- if .Values.master.initContainers }} {{- include "common.tplvalues.render" (dict "value" .Values.master.initContainers "context" $) | nindent 8 }} {{- end }} {{- if $needsVolumePermissions }} - name: volume-permissions image: {{ include "redis.volumePermissions.image" . }} imagePullPolicy: {{ .Values.volumePermissions.image.pullPolicy | quote }} command: - /bin/bash - -ec - | {{- if eq ( toString ( .Values.volumePermissions.containerSecurityContext.runAsUser )) "auto" }} chown -R `id -u`:`id -G | cut -d " " -f2` {{ .Values.master.persistence.path }} {{- else }} chown -R {{ .Values.master.containerSecurityContext.runAsUser }}:{{ .Values.master.podSecurityContext.fsGroup }} {{ .Values.master.persistence.path }} {{- end }} {{- if eq ( toString ( .Values.volumePermissions.containerSecurityContext.runAsUser )) "auto" }} securityContext: {{- omit .Values.volumePermissions.containerSecurityContext "runAsUser" | toYaml | nindent 12 }} {{- else }} securityContext: {{- .Values.volumePermissions.containerSecurityContext | toYaml | nindent 12 }} {{- end }} {{- if .Values.volumePermissions.resources }} resources: {{- toYaml .Values.volumePermissions.resources | nindent 12 }} {{- end }} volumeMounts: - name: redis-data mountPath: {{ .Values.master.persistence.path }} subPath: {{ .Values.master.persistence.subPath }} {{- end }} {{- if .Values.sysctl.enabled }} - name: init-sysctl image: {{ include "redis.sysctl.image" . }} imagePullPolicy: {{ default "" .Values.sysctl.image.pullPolicy | quote }} securityContext: privileged: true runAsUser: 0 {{- if .Values.sysctl.command }} command: {{- include "common.tplvalues.render" (dict "value" .Values.sysctl.command "context" $) | nindent 12 }} {{- end }} {{- if .Values.sysctl.resources }} resources: {{- toYaml .Values.sysctl.resources | nindent 12 }} {{- end }} {{- if .Values.sysctl.mountHostSys }} volumeMounts: - name: host-sys mountPath: /host-sys {{- end }} {{- end }} {{- end }} volumes: - name: start-scripts configMap: name: {{ printf "%s-scripts" (include "common.names.fullname" .) }} defaultMode: 0755 - name: health configMap: name: {{ printf "%s-health" (include "common.names.fullname" .) }} defaultMode: 0755 {{- if .Values.auth.usePasswordFiles }} - name: redis-password secret: secretName: {{ template "redis.secretName" . }} items: - key: {{ template "redis.secretPasswordKey" . }} path: redis-password {{- end }} - name: config configMap: name: {{ include "redis.configmapName" . }} {{- if .Values.sysctl.mountHostSys }} - name: host-sys hostPath: path: /sys {{- end }} - name: redis-tmp-conf {{- if .Values.master.persistence.medium }} emptyDir: { medium: {{ .Values.master.persistence.medium | quote }} {{- if .Values.master.persistence.sizeLimit }} sizeLimit: {{ .Values.master.persistence.sizeLimit | quote }} {{- end }} } {{- else }} emptyDir: {} {{- end }} - name: tmp {{- if .Values.master.persistence.medium }} emptyDir: { medium: {{ .Values.master.persistence.medium | quote }} {{- if .Values.master.persistence.sizeLimit }} sizeLimit: {{ .Values.master.persistence.sizeLimit | quote }} {{- end }} } {{- else }} emptyDir: {} {{- end }} {{- if .Values.tls.enabled }} - name: redis-certificates secret: secretName: {{ include "redis.tlsSecretName" . }} defaultMode: 256 {{- end }} {{- if .Values.master.extraVolumes }} {{- include "common.tplvalues.render" ( dict "value" .Values.master.extraVolumes "context" $ ) | nindent 8 }} {{- end }} {{- if .Values.metrics.extraVolumes }} {{- include "common.tplvalues.render" ( dict "value" .Values.metrics.extraVolumes "context" $ ) | nindent 8 }} {{- end }} {{- if not .Values.master.persistence.enabled }} - name: redis-data {{- if .Values.master.persistence.medium }} emptyDir: { medium: {{ .Values.master.persistence.medium | quote }} } {{- else }} emptyDir: {} {{- end }} {{- else if .Values.master.persistence.existingClaim }} - name: redis-data persistentVolumeClaim: claimName: {{ printf "%s" (tpl .Values.master.persistence.existingClaim .) }} {{- else if (eq .Values.master.kind "Deployment") }} - name: redis-data persistentVolumeClaim: claimName: {{ printf "redis-data-%s-master" (include "common.names.fullname" .) }} {{- else }} volumeClaimTemplates: - metadata: name: redis-data labels: {{- include "common.labels.matchLabels" . | nindent 10 }} app.kubernetes.io/component: master {{- if .Values.master.persistence.annotations }} annotations: {{- toYaml .Values.master.persistence.annotations | nindent 10 }} {{- end }} spec: accessModes: {{- range .Values.master.persistence.accessModes }} - {{ . | quote }} {{- end }} resources: requests: storage: {{ .Values.master.persistence.size | quote }} {{- if .Values.master.persistence.selector }} selector: {{- include "common.tplvalues.render" (dict "value" .Values.master.persistence.selector "context" $) | nindent 10 }} {{- end }} {{- if .Values.master.persistence.dataSource }} dataSource: {{- include "common.tplvalues.render" (dict "value" .Values.master.persistence.dataSource "context" $) | nindent 10 }} {{- end }} {{- include "common.storage.class" (dict "persistence" .Values.master.persistence "global" .Values.global) | nindent 8 }} {{- end }} {{- end }}
49.359743
222
0.561798
dbab9ce036d0777b974c8f27452b9215eba5e045
28,573
yaml
YAML
bitnami/phpmyadmin/values.yaml
00arthur00/charts
502aa1e64541669b732a4eda896e5937847b6c3c
[ "Apache-2.0" ]
null
null
null
bitnami/phpmyadmin/values.yaml
00arthur00/charts
502aa1e64541669b732a4eda896e5937847b6c3c
[ "Apache-2.0" ]
2
2022-01-26T01:14:30.000Z
2022-01-26T07:03:39.000Z
bitnami/phpmyadmin/values.yaml
00arthur00/charts
502aa1e64541669b732a4eda896e5937847b6c3c
[ "Apache-2.0" ]
null
null
null
## @section Global parameters ## Global Docker image parameters ## Please, note that this will override the image parameters, including dependencies, configured to use the global value ## Current available global Docker image parameters: imageRegistry, imagePullSecrets and storageClass ## @param global.imageRegistry Global Docker image registry ## @param global.imagePullSecrets Global Docker registry secret names as an array ## global: imageRegistry: "" ## E.g. ## imagePullSecrets: ## - myRegistryKeySecretName ## imagePullSecrets: [] ## @section Common parameters ## @param kubeVersion Force target Kubernetes version (using Helm capabilities if not set) ## kubeVersion: "" ## @param nameOverride String to partially override common.names.fullname template (will maintain the release name) ## nameOverride: "" ## @param fullnameOverride String to fully override common.names.fullname template ## fullnameOverride: "" ## @param commonLabels Add labels to all the deployed resources ## commonLabels: {} ## @param commonAnnotations Add annotations to all the deployed resources ## commonAnnotations: {} ## @param clusterDomain Kubernetes Cluster Domain ## clusterDomain: cluster.local ## @param extraDeploy Array of extra objects to deploy with the release ## extraDeploy: [] ## @section phpMyAdmin parameters ## Bitnami WordPress image version ## ref: https://hub.docker.com/r/bitnami/phpmyadmin/tags/ ## @param image.registry phpMyAdmin image registry ## @param image.repository phpMyAdmin image repository ## @param image.tag phpMyAdmin image tag (immutable tags are recommended) ## @param image.pullPolicy Image pull policy ## @param image.pullSecrets Specify docker-registry secret names as an array ## @param image.debug Enable phpmyadmin image debug mode ## image: registry: docker.io repository: bitnami/phpmyadmin tag: 5.1.3-debian-10-r29 ## Specify a imagePullPolicy ## pullPolicy: IfNotPresent ## Optionally specify an array of imagePullSecrets. ## Secrets must be manually created in the namespace. ## ref: https://kubernetes.io/docs/tasks/configure-pod-container/pull-image-private-registry/ ## Example: ## pullSecrets: ## - myRegistryKeySecretName ## pullSecrets: [] ## Enable debug mode ## debug: false ## @param command Override default container command (useful when using custom images) ## command: [] ## @param args Override default container args (useful when using custom images) ## args: [] ## @param lifecycleHooks for the phpmyadmin container(s) to automate configuration before or after startup ## lifecycleHooks: {} ## @param extraEnvVars Extra environment variables to be set on PhpMyAdmin container ## For example: ## extraEnvVars: ## - name: PHP_UPLOAD_MAX_FILESIZE ## value: "80M" ## extraEnvVars: [] ## @param extraEnvVarsCM Name of a existing ConfigMap containing extra env vars ## extraEnvVarsCM: "" ## @param extraEnvVarsSecret Name of a existing Secret containing extra env vars ## extraEnvVarsSecret: "" ## @section phpMyAdmin deployment parameters ## @param hostAliases [array] Deployment pod host aliases ## https://kubernetes.io/docs/concepts/services-networking/add-entries-to-pod-etc-hosts-with-host-aliases/ ## hostAliases: ## Necessary for apache-exporter to work ## - ip: "127.0.0.1" hostnames: - "status.localhost" ## phpMyAdmin container ports to open ## @param containerPorts.http HTTP port to expose at container level ## @param containerPorts.https HTTPS port to expose at container level ## containerPorts: http: 8080 https: 8443 ## @param updateStrategy.type Strategy to use to update Pods ## updateStrategy: ## StrategyType ## Can be set to RollingUpdate or OnDelete ## type: RollingUpdate ## phpMyAdmin pods' Security Context ## ref: https://kubernetes.io/docs/tasks/configure-pod-container/security-context/#set-the-security-context-for-a-pod ## @param podSecurityContext.enabled Enable phpMyAdmin pods' Security Context ## @param podSecurityContext.fsGroup User ID for the container ## podSecurityContext: enabled: true fsGroup: 1001 ## phpMyAdmin containers' Security Context (only main container) ## ref: https://kubernetes.io/docs/tasks/configure-pod-container/security-context/#set-the-security-context-for-a-container ## @param containerSecurityContext.enabled Enable phpMyAdmin containers' Security Context ## @param containerSecurityContext.runAsUser Group ID for the volumes of the pod ## @param containerSecurityContext.runAsNonRoot Set phpmyadmin container's Security Context runAsNonRoot ## containerSecurityContext: enabled: true runAsUser: 1001 runAsNonRoot: true ## phpMyAdmin containers' resource requests and limits ## ref: https://kubernetes.io/docs/user-guide/compute-resources ## We usually recommend not to specify default resources and to leave this as a conscious ## choice for the user. This also increases chances charts run on environments with little ## resources, such as Minikube. If you do want to specify resources, uncomment the following ## lines, adjust them as necessary, and remove the curly braces after 'resources:'. ## @param resources.limits The resources limits for the PhpMyAdmin container ## @param resources.requests The requested resources for the PhpMyAdmin container ## resources: ## Example: ## limits: ## cpu: 100m ## memory: 128Mi limits: {} ## Examples: ## requests: ## cpu: 100m ## memory: 128Mi requests: {} ## phpMyAdmin containers' startup probe. Evaluated as a template. ## ref: https://kubernetes.io/docs/concepts/workloads/pods/pod-lifecycle/#container-probes ## @param startupProbe.enabled Enable startupProbe ## @param startupProbe.httpGet.path Request path for startupProbe ## @param startupProbe.httpGet.port Port for startupProbe ## @param startupProbe.initialDelaySeconds Initial delay seconds for startupProbe ## @param startupProbe.periodSeconds Period seconds for startupProbe ## @param startupProbe.timeoutSeconds Timeout seconds for startupProbe ## @param startupProbe.failureThreshold Failure threshold for startupProbe ## @param startupProbe.successThreshold Success threshold for startupProbe ## startupProbe: enabled: false initialDelaySeconds: 30 timeoutSeconds: 30 periodSeconds: 10 successThreshold: 1 failureThreshold: 6 httpGet: path: / port: http ## phpMyAdmin containers' liveness probe. Evaluated as a template. ## ref: https://kubernetes.io/docs/concepts/workloads/pods/pod-lifecycle/#container-probes ## @param livenessProbe.enabled Enable livenessProbe ## @param livenessProbe.httpGet.path Request path for livenessProbe ## @param livenessProbe.httpGet.port Port for livenessProbe ## @param livenessProbe.initialDelaySeconds Initial delay seconds for livenessProbe ## @param livenessProbe.periodSeconds Period seconds for livenessProbe ## @param livenessProbe.timeoutSeconds Timeout seconds for livenessProbe ## @param livenessProbe.failureThreshold Failure threshold for livenessProbe ## @param livenessProbe.successThreshold Success threshold for livenessProbe ## livenessProbe: enabled: true initialDelaySeconds: 30 timeoutSeconds: 30 periodSeconds: 10 successThreshold: 1 failureThreshold: 6 httpGet: path: / port: http ## phpMyAdmin containers' readiness probes. Evaluated as a template. ## ref: https://kubernetes.io/docs/concepts/workloads/pods/pod-lifecycle/#container-probes ## @param readinessProbe.enabled Enable readinessProbe ## @param readinessProbe.httpGet.path Request path for readinessProbe ## @param readinessProbe.httpGet.port Port for readinessProbe ## @param readinessProbe.initialDelaySeconds Initial delay seconds for readinessProbe ## @param readinessProbe.periodSeconds Period seconds for readinessProbe ## @param readinessProbe.timeoutSeconds Timeout seconds for readinessProbe ## @param readinessProbe.failureThreshold Failure threshold for readinessProbe ## @param readinessProbe.successThreshold Success threshold for readinessProbe ## readinessProbe: enabled: true initialDelaySeconds: 30 timeoutSeconds: 30 periodSeconds: 10 successThreshold: 1 failureThreshold: 6 httpGet: path: / port: http ## @param customStartupProbe Override default startup probe ## customStartupProbe: {} ## @param customLivenessProbe Override default liveness probe ## customLivenessProbe: {} ## @param customReadinessProbe Override default readiness probe ## customReadinessProbe: {} ## @param podLabels Extra labels for PhpMyAdmin pods ## ref: https://kubernetes.io/docs/concepts/overview/working-with-objects/labels/ ## podLabels: {} ## @param podAnnotations Annotations for PhpMyAdmin pods ## ref: https://kubernetes.io/docs/concepts/overview/working-with-objects/annotations/ ## podAnnotations: {} ## @param podAffinityPreset Pod affinity preset. Ignored if `affinity` is set. Allowed values: `soft` or `hard` ## ref: https://kubernetes.io/docs/concepts/scheduling-eviction/assign-pod-node/#inter-pod-affinity-and-anti-affinity ## podAffinityPreset: "" ## @param podAntiAffinityPreset Pod anti-affinity preset. Ignored if `affinity` is set. Allowed values: `soft` or `hard` ## ref: https://kubernetes.io/docs/concepts/scheduling-eviction/assign-pod-node/#inter-pod-affinity-and-anti-affinity ## podAntiAffinityPreset: soft ## Node affinity preset ## ref: https://kubernetes.io/docs/concepts/scheduling-eviction/assign-pod-node/#node-affinity ## nodeAffinityPreset: ## @param nodeAffinityPreset.type Node affinity preset type. Ignored if `affinity` is set. Allowed values: `soft` or `hard` ## type: "" ## @param nodeAffinityPreset.key Node label key to match. Ignored if `affinity` is set. ## E.g. ## key: "kubernetes.io/e2e-az-name" ## key: "" ## @param nodeAffinityPreset.values Node label values to match. Ignored if `affinity` is set. ## E.g. ## values: ## - e2e-az1 ## - e2e-az2 ## values: [] ## @param affinity Affinity for pod assignment. Evaluated as a template. ## ref: https://kubernetes.io/docs/concepts/configuration/assign-pod-node/#affinity-and-anti-affinity ## Note: podAffinityPreset, podAntiAffinityPreset, and nodeAffinityPreset will be ignored when it's set ## affinity: {} ## @param nodeSelector Node labels for pod assignment. Evaluated as a template. ## ref: https://kubernetes.io/docs/user-guide/node-selection/ ## nodeSelector: {} ## @param tolerations Tolerations for pod assignment. Evaluated as a template. ## ref: https://kubernetes.io/docs/concepts/configuration/taint-and-toleration/ ## tolerations: [] ## @param priorityClassName phpmyadmin pods' priorityClassName ## priorityClassName: "" ## @param schedulerName Name of the k8s scheduler (other than default) ## ref: https://kubernetes.io/docs/tasks/administer-cluster/configure-multiple-schedulers/ ## schedulerName: "" ## @param topologySpreadConstraints Topology Spread Constraints for pod assignment ## https://kubernetes.io/docs/concepts/workloads/pods/pod-topology-spread-constraints/ ## The value is evaluated as a template ## topologySpreadConstraints: [] ## @param extraVolumes Optionally specify extra list of additional volumes for PhpMyAdmin pods ## extraVolumes: [] ## @param extraVolumeMounts Optionally specify extra list of additional volumeMounts for PhpMyAdmin container(s) ## extraVolumeMounts: [] ## @param initContainers Add init containers to the PhpMyAdmin pods ## Example: ## initContainers: ## - name: your-image-name ## image: your-image ## imagePullPolicy: Always ## ports: ## - name: portname ## containerPort: 1234 ## initContainers: [] ## @param sidecars Add sidecar containers to the PhpMyAdmin pods ## Example: ## sidecars: ## - name: your-image-name ## image: your-image ## imagePullPolicy: Always ## ports: ## - name: portname ## containerPort: 1234 ## sidecars: [] ## @section Traffic Exposure parameters ## Service configuration ## service: ## @param service.type Kubernetes Service type ## type: ClusterIP ## @param service.ports.http Service HTTP port ## @param service.ports.https Service HTTPS port ## ports: http: 80 https: 443 ## Specify the nodePort values for the LoadBalancer and NodePort service types ## ref: https://kubernetes.io/docs/concepts/services-networking/service/#type-nodeport ## @param service.nodePorts.http Kubernetes http node port ## @param service.nodePorts.https Kubernetes https node port ## nodePorts: http: "" https: "" ## @param service.clusterIP PhpMyAdmin service clusterIP IP ## e.g: ## clusterIP: None ## clusterIP: "" ## @param service.loadBalancerIP Load balancer IP for the phpMyAdmin Service (optional, cloud specific) ## ref: https://kubernetes.io/docs/user-guide/services/#type-loadbalancer ## loadBalancerIP: "" ## @param service.loadBalancerSourceRanges Addresses that are allowed when service is LoadBalancer ## https://kubernetes.io/docs/tasks/access-application-cluster/configure-cloud-provider-firewall/#restrict-access-for-loadbalancer-service ## Example: ## loadBalancerSourceRanges: ## - 10.10.10.0/24 ## loadBalancerSourceRanges: [] ## @param service.externalTrafficPolicy Enable client source IP preservation ## ref https://kubernetes.io/docs/tasks/access-application-cluster/create-external-load-balancer/#preserving-the-client-source-ip ## externalTrafficPolicy: Cluster ## @param service.extraPorts Extra ports to expose (normally used with the `sidecar` value) ## extraPorts: [] ## @param service.annotations Provide any additional annotations that may be required for the PhpMyAdmin service ## annotations: {} ## @param service.sessionAffinity Session Affinity for Kubernetes service, can be "None" or "ClientIP" ## If "ClientIP", consecutive client requests will be directed to the same Pod ## ref: https://kubernetes.io/docs/concepts/services-networking/service/#virtual-ips-and-service-proxies ## sessionAffinity: None ## @param service.sessionAffinityConfig Additional settings for the sessionAffinity ## sessionAffinityConfig: ## clientIP: ## timeoutSeconds: 300 ## sessionAffinityConfig: {} ## Ingress configuration ## ingress: ## @param ingress.enabled Set to true to enable ingress record generation ## enabled: false ## @param ingress.apiVersion Force Ingress API version (automatically detected if not set) ## apiVersion: "" ## DEPRECATED: Use ingress.annotations instead of ingress.certManager ## certManager: false ## ## @param ingress.hostname When the ingress is enabled, a host pointing to this will be created ## hostname: phpmyadmin.local ## @param ingress.pathType Ingress path type ## pathType: ImplementationSpecific ## @param ingress.path Default path for the ingress record ## NOTE: You may need to set this to '/*' in order to use this with ALB ingress controllers ## path: / ## @param ingress.extraPaths An array with additional arbitrary paths that may need to be added to the ingress under the main host ## e.g: ## extraPaths: ## - path: /* ## backend: ## serviceName: ssl-redirect ## servicePort: use-annotation ## extraPaths: [] ## @param ingress.annotations Additional annotations for the Ingress resource. To enable certificate autogeneration, place here your cert-manager annotations. ## For a full list of possible ingress annotations, please see ## ref: https://github.com/kubernetes/ingress-nginx/blob/master/docs/user-guide/nginx-configuration/annotations.md ## Use this parameter to set the required annotations for cert-manager, see ## ref: https://cert-manager.io/docs/usage/ingress/#supported-annotations ## ## e.g: ## annotations: ## kubernetes.io/ingress.class: nginx ## cert-manager.io/cluster-issuer: cluster-issuer-name ## annotations: {} ## @param ingress.tls Enable TLS configuration for the hostname defined at `ingress.hostname` parameter ## TLS certificates will be retrieved from a TLS secret with name: {{- printf "%s-tls" .Values.ingress.hostname }} ## You can use the ingress.secrets parameter to create this TLS secret, relay on cert-manager to create it, or ## let the chart create self-signed certificates for you ## tls: false ## @param ingress.extraHosts The list of additional hostnames to be covered with this ingress record. ## Most likely the hostname above will be enough, but in the event more hosts are needed, this is an array ## Example: ## extraHosts: ## - name: phpmyadmin.local ## path: / ## extraHosts: [] ## @param ingress.extraTls The tls configuration for additional hostnames to be covered with this ingress record. ## see: https://kubernetes.io/docs/concepts/services-networking/ingress/#tls ## Example: ## extraTls: ## - hosts: ## - phpmyadmin.local ## secretName: phpmyadmin.local-tls ## extraTls: [] ## @param ingress.secrets If you're providing your own certificates, please use this to add the certificates as secrets ## key and certificate should start with -----BEGIN CERTIFICATE----- or -----BEGIN RSA PRIVATE KEY----- ## name should line up with a secretName set further up ## ## If it is not set and you're using cert-manager, this is unneeded, as it will create the secret for you ## If it is not set and you're NOT using cert-manager either, self-signed certificates will be created ## It is also possible to create and manage the certificates outside of this helm chart ## Please see README.md for more information ## ## Example ## secrets: ## - name: phpmyadmin.local-tls ## key: "" ## certificate: "" ## secrets: [] ## @param ingress.ingressClassName IngressClass that will be be used to implement the Ingress (Kubernetes 1.18+) ## This is supported in Kubernetes 1.18+ and required if you have more than one IngressClass marked as the default for your cluster . ## ref: https://kubernetes.io/blog/2020/04/02/improvements-to-the-ingress-api-in-kubernetes-1.18/ ## ingressClassName: "" ## @section Database parameters ## Database configuration ## db: ## @param db.allowArbitraryServer Enable connection to arbitrary MySQL server ## If you do not want the user to be able to specify an arbitrary MySQL server at login time, set this to false ## allowArbitraryServer: true ## @param db.port Database port to use to connect ## port: 3306 ## @param db.chartName Database suffix if included in the same release ## If you are deploying phpMyAdmin as part of a release and the database is part ## of the release, you can pass a suffix that will be used to find the database ## in releasename-dbSuffix. Please note that this setting precedes db.host ## e.g: ## chartName: mariadb ## chartName: "" ## @param db.host Database Hostname. Ignored when `db.chartName` is set. ## e.g: ## host: foo ## host: "" ## @param db.bundleTestDB Deploy a MariaDB instance for testing purposes ## bundleTestDB: false ## @param db.enableSsl Enable SSL for the connection between phpMyAdmin and the database ## enableSsl: false ssl: ## @param db.ssl.clientKey Client key file when using SSL ## clientKey: |- ## @param db.ssl.clientCertificate Client certificate file when using SSL ## clientCertificate: |- ## @param db.ssl.caCertificate CA file when using SSL ## caCertificate: |- ## @param db.ssl.ciphers List of allowable ciphers for connections when using SSL ## ciphers: [] ## @param db.ssl.verify Enable SSL certificate validation ## verify: true ## @param mariadb MariaDB chart configuration ## https://github.com/bitnami/charts/blob/master/bitnami/mariadb/values.yaml ## mariadb: {} ## @section Metrics parameters ## Prometheus Exporter / Metrics ## metrics: ## @param metrics.enabled Start a side-car prometheus exporter ## enabled: false ## @param metrics.image.registry Apache exporter image registry ## @param metrics.image.repository Apache exporter image repository ## @param metrics.image.tag Apache exporter image tag (immutable tags are recommended) ## @param metrics.image.pullPolicy Image pull policy ## @param metrics.image.pullSecrets Specify docker-registry secret names as an array ## image: registry: docker.io repository: bitnami/apache-exporter tag: 0.11.0-debian-10-r85 pullPolicy: IfNotPresent ## Optionally specify an array of imagePullSecrets. ## Secrets must be manually created in the namespace. ## ref: https://kubernetes.io/docs/tasks/configure-pod-container/pull-image-private-registry/ ## Example: ## pullSecrets: ## - myRegistryKeySecretName ## pullSecrets: [] ## @param metrics.resources Metrics exporter resource requests and limits ## ref: https://kubernetes.io/docs/user-guide/compute-resources/ ## resources: {} ## Prometheus Exporter service configuration ## service: ## @param metrics.service.type Prometheus metrics service type ## type: ClusterIP ## @param metrics.service.port Prometheus metrics service port ## port: 9117 ## @param metrics.service.annotations [object] Annotations for Prometheus metrics service ## ref: https://kubernetes.io/docs/concepts/overview/working-with-objects/annotations/ annotations: prometheus.io/scrape: "true" prometheus.io/port: "{{ .Values.metrics.service.port }}" ## @param metrics.service.clusterIP phpmyadmin service Cluster IP ## e.g.: ## clusterIP: None ## clusterIP: "" ## @param metrics.service.loadBalancerIP Load Balancer IP if the Prometheus metrics server type is `LoadBalancer` ## Use serviceLoadBalancerIP to request a specific static IP, otherwise leave blank ## loadBalancerIP: "" ## @param metrics.service.loadBalancerSourceRanges phpmyadmin service Load Balancer sources ## ref: https://kubernetes.io/docs/tasks/access-application-cluster/configure-cloud-provider-firewall/#restrict-access-for-loadbalancer-service ## e.g: ## loadBalancerSourceRanges: ## - 10.10.10.0/24 ## loadBalancerSourceRanges: [] ## @param metrics.service.externalTrafficPolicy phpmyadmin service external traffic policy ## ref http://kubernetes.io/docs/tasks/access-application-cluster/create-external-load-balancer/#preserving-the-client-source-ip ## externalTrafficPolicy: Cluster ## @param metrics.service.sessionAffinity Session Affinity for Kubernetes service, can be "None" or "ClientIP" ## If "ClientIP", consecutive client requests will be directed to the same Pod ## ref: https://kubernetes.io/docs/concepts/services-networking/service/#virtual-ips-and-service-proxies ## sessionAffinity: None ## @param metrics.service.sessionAffinityConfig Additional settings for the sessionAffinity ## sessionAffinityConfig: ## clientIP: ## timeoutSeconds: 300 ## sessionAffinityConfig: {} ## Prometheus Service Monitor ## ref: https://github.com/coreos/prometheus-operator ## https://github.com/coreos/prometheus-operator/blob/master/Documentation/api.md#endpoint ## serviceMonitor: ## @param metrics.serviceMonitor.enabled Create ServiceMonitor Resource for scraping metrics using PrometheusOperator ## enabled: false ## @param metrics.serviceMonitor.namespace Specify the namespace in which the serviceMonitor resource will be created ## namespace: "" ## @param metrics.serviceMonitor.jobLabel The name of the label on the target service to use as the job name in prometheus. ## jobLabel: "" ## @param metrics.serviceMonitor.interval Specify the interval at which metrics should be scraped ## interval: 30s ## @param metrics.serviceMonitor.scrapeTimeout Specify the timeout after which the scrape is ended ## e.g: ## scrapeTimeout: 30s ## scrapeTimeout: "" ## @param metrics.serviceMonitor.relabelings RelabelConfigs to apply to samples before scraping ## ref: https://github.com/coreos/prometheus-operator/blob/master/Documentation/api.md#relabelconfig ## relabelings: [] ## @param metrics.serviceMonitor.metricRelabelings Specify Metric Relabelings to add to the scrape endpoint ## ref: https://github.com/coreos/prometheus-operator/blob/master/Documentation/api.md#relabelconfig ## metricRelabelings: [] ## @param metrics.serviceMonitor.labels Extra labels for the ServiceMonitor ## labels: {} ## @param metrics.serviceMonitor.honorLabels Specify honorLabels parameter to add the scrape endpoint ## honorLabels: false ## @param metrics.serviceMonitor.selector ServiceMonitor selector labels ## ref: https://github.com/bitnami/charts/tree/master/bitnami/prometheus-operator#prometheus-configuration ## ## selector: ## prometheus: my-prometheus ## selector: {} ## @section NetworkPolicy parameters ## Add networkpolicies ## networkPolicy: ## @param networkPolicy.enabled Enable network policies ## If ingress.enabled or metrics.enabled are true, configure networkPolicy.ingress and networkPolicy.metrics selectors respectively to allow communication ## enabled: false ## @param networkPolicy.metrics.enabled Enable network policy for metrics (prometheus) ## @param networkPolicy.metrics.namespaceSelector Monitoring namespace selector labels. These labels will be used to identify the prometheus' namespace. ## @param networkPolicy.metrics.podSelector Monitoring pod selector labels. These labels will be used to identify the Prometheus pods. ## metrics: enabled: false ## e.g: ## podSelector: ## label: monitoring ## podSelector: {} ## e.g: ## namespaceSelector: ## label: monitoring ## namespaceSelector: {} ## @param networkPolicy.ingress.enabled Enable network policy for Ingress Proxies ## @param networkPolicy.ingress.namespaceSelector Ingress Proxy namespace selector labels. These labels will be used to identify the Ingress Proxy's namespace. ## @param networkPolicy.ingress.podSelector Ingress Proxy pods selector labels. These labels will be used to identify the Ingress Proxy pods. ## ingress: enabled: false ## e.g: ## podSelector: ## label: ingress ## podSelector: {} ## e.g: ## namespaceSelector: ## label: ingress ## namespaceSelector: {} ## @param networkPolicy.ingressRules.backendOnlyAccessibleByFrontend Enable ingress rule that makes the backend (mariadb) only accessible by phpMyAdmin's pods. ## @param networkPolicy.ingressRules.customBackendSelector Backend selector labels. These labels will be used to identify the backend pods. ## @param networkPolicy.ingressRules.accessOnlyFrom.enabled Enable ingress rule that makes phpMyAdmin only accessible from a particular origin ## @param networkPolicy.ingressRules.accessOnlyFrom.namespaceSelector Namespace selector label that is allowed to access phpMyAdmin. This label will be used to identified the allowed namespace(s). ## @param networkPolicy.ingressRules.accessOnlyFrom.podSelector Pods selector label that is allowed to access phpMyAdmin. This label will be used to identified the allowed pod(s). ## @param networkPolicy.ingressRules.customRules Custom network policy ingress rule ## ingressRules: ## mariadb backend only can be accessed from phpMyAdmin ## backendOnlyAccessibleByFrontend: false customBackendSelector: {} ## Allow only from the indicated: ## accessOnlyFrom: enabled: false ## e.g: ## namespaceSelector: ## label: ingress ## namespaceSelector: {} ## e.g: ## podSelector: ## label: access ## podSelector: {} ## custom ingress rules ## e.g: ## customRules: ## - from: ## - namespaceSelector: ## matchLabels: ## label: example ## customRules: {} ## @param networkPolicy.egressRules.denyConnectionsToExternal Enable egress rule that denies outgoing traffic outside the cluster, except for DNS (port 53). ## @param networkPolicy.egressRules.customRules Custom network policy rule ## egressRules: ## Deny connections to external. This is not compatible with an external database. ## denyConnectionsToExternal: false ## Additional custom egress rules ## e.g: ## customRules: ## - to: ## - namespaceSelector: ## matchLabels: ## label: example ## customRules: {}
39.087551
198
0.735065
e0e8114decdc67e807d55241c6cb740e7f622ca9
786
yaml
YAML
bitnami/etcd/Chart.yaml
00arthur00/charts
502aa1e64541669b732a4eda896e5937847b6c3c
[ "Apache-2.0" ]
null
null
null
bitnami/etcd/Chart.yaml
00arthur00/charts
502aa1e64541669b732a4eda896e5937847b6c3c
[ "Apache-2.0" ]
2
2022-01-26T01:14:30.000Z
2022-01-26T07:03:39.000Z
bitnami/etcd/Chart.yaml
00arthur00/charts
502aa1e64541669b732a4eda896e5937847b6c3c
[ "Apache-2.0" ]
null
null
null
annotations: category: Database apiVersion: v2 appVersion: 3.5.2 dependencies: - name: common repository: https://charts.bitnami.com/bitnami tags: - bitnami-common version: 1.x.x description: etcd is a distributed key-value store designed to securely store data across a cluster. etcd is widely used in production on account of its reliability, fault-tolerance and ease of use. home: https://github.com/bitnami/charts/tree/master/bitnami/etcd icon: https://bitnami.com/assets/stacks/etcd/img/etcd-stack-220x234.png keywords: - etcd - cluster - database - cache - key-value maintainers: - email: [email protected] name: Bitnami name: etcd sources: - https://github.com/bitnami/bitnami-docker-etcd - https://coreos.com/etcd/ version: 6.13.6
28.071429
198
0.736641
462bf0d83ddf1c14e71dfc1f0318ddd062a127cf
37,757
yaml
YAML
bitnami/keycloak/values.yaml
00arthur00/charts
502aa1e64541669b732a4eda896e5937847b6c3c
[ "Apache-2.0" ]
null
null
null
bitnami/keycloak/values.yaml
00arthur00/charts
502aa1e64541669b732a4eda896e5937847b6c3c
[ "Apache-2.0" ]
2
2022-01-26T01:14:30.000Z
2022-01-26T07:03:39.000Z
bitnami/keycloak/values.yaml
00arthur00/charts
502aa1e64541669b732a4eda896e5937847b6c3c
[ "Apache-2.0" ]
null
null
null
## @section Global parameters ## Global Docker image parameters ## Please, note that this will override the image parameters, including dependencies, configured to use the global value ## Current available global Docker image parameters: imageRegistry, imagePullSecrets and storageClass ## ## @param global.imageRegistry Global Docker image registry ## @param global.imagePullSecrets Global Docker registry secret names as an array ## @param global.storageClass Global StorageClass for Persistent Volume(s) ## global: imageRegistry: "" ## E.g. ## imagePullSecrets: ## - myRegistryKeySecretName ## imagePullSecrets: [] storageClass: "" ## @section Common parameters ## ## @param kubeVersion Force target Kubernetes version (using Helm capabilities if not set) ## kubeVersion: "" ## @param nameOverride String to partially override keycloak.fullname ## nameOverride: "" ## @param fullnameOverride String to fully override keycloak.fullname ## fullnameOverride: "" ## @param commonLabels Labels to add to all deployed objects ## commonLabels: {} ## @param commonAnnotations Annotations to add to all deployed objects ## commonAnnotations: {} ## @param clusterDomain Default Kubernetes cluster domain ## clusterDomain: cluster.local ## @param extraDeploy Array of extra objects to deploy with the release ## extraDeploy: [] ## Enable diagnostic mode in the statefulset ## diagnosticMode: ## @param diagnosticMode.enabled Enable diagnostic mode (all probes will be disabled and the command will be overridden) ## enabled: false ## @param diagnosticMode.command Command to override all containers in the the statefulset ## command: - sleep ## @param diagnosticMode.args Args to override all containers in the the statefulset ## args: - infinity ## @section Keycloak parameters ## Bitnami Keycloak image version ## ref: https://hub.docker.com/r/bitnami/keycloak/tags/ ## @param image.registry Keycloak image registry ## @param image.repository Keycloak image repository ## @param image.tag Keycloak image tag (immutable tags are recommended) ## @param image.pullPolicy Keycloak image pull policy ## @param image.pullSecrets Specify docker-registry secret names as an array ## @param image.debug Specify if debug logs should be enabled ## image: registry: docker.io repository: bitnami/keycloak tag: 16.1.1-debian-10-r50 ## Specify a imagePullPolicy ## Defaults to 'Always' if image tag is 'latest', else set to 'IfNotPresent' ## ref: https://kubernetes.io/docs/user-guide/images/#pre-pulling-images ## pullPolicy: IfNotPresent ## Optionally specify an array of imagePullSecrets. ## Secrets must be manually created in the namespace. ## ref: https://kubernetes.io/docs/tasks/configure-pod-container/pull-image-private-registry/ ## Example: ## pullSecrets: ## - myRegistryKeySecretName ## pullSecrets: [] ## Set to true if you would like to see extra information on logs ## debug: false ## Keycloak authentication parameters ## ref: https://github.com/bitnami/bitnami-docker-keycloak#admin-credentials ## auth: ## @param auth.createAdminUser Create administrator user on boot ## createAdminUser: true ## @param auth.adminUser Keycloak administrator user ## adminUser: user ## @param auth.adminPassword Keycloak administrator password for the new user ## adminPassword: "" ## @param auth.managementUser Wildfly management user ## managementUser: manager ## @param auth.managementPassword Wildfly management password ## managementPassword: "" ## @param auth.existingSecret An already existing secret containing auth info ## e.g: ## existingSecret: ## name: mySecret ## keyMapping: ## admin-password: myPasswordKey ## management-password: myManagementPasswordKey ## tls-keystore-password: myTlsKeystorePasswordKey ## tls-truestore-password: myTlsTruestorePasswordKey ## existingSecret: "" ## @param auth.existingSecretPerPassword Override `existingSecret` and other secret values ## e.g: ## existingSecretPerPassword: ## keyMapping: ## adminPassword: KEYCLOAK_ADMIN_PASSWORD ## managementPassword: KEYCLOAK_MANAGEMENT_PASSWORD ## databasePassword: password ## tlsKeystorePassword: JKS_KEYSTORE_TRUSTSTORE_PASSWORD ## tlsTruststorePassword: JKS_KEYSTORE_TRUSTSTORE_PASSWORD ## adminPassword: ## name: keycloak-test2.credentials ## release-name ## managementPassword: ## name: keycloak-test2.credentials ## databasePassword: ## name: keycloak.pocwatt-keycloak-cluster.credentials ## tlsKeystorePassword: ## name: keycloak-test2.credentials ## tlsTruststorePassword: ## name: keycloak-test2.credentials ## existingSecretPerPassword: {} ## TLS encryption parameters ## ref: https://github.com/bitnami/bitnami-docker-keycloak#tls-encryption ## tls: ## @param auth.tls.enabled Enable TLS encryption ## enabled: false ## @param auth.tls.autoGenerated Generate automatically self-signed TLS certificates. Currently only supports PEM certificates ## autoGenerated: false ## @param auth.tls.existingSecret Existing secret containing the TLS certificates per Keycloak replica ## Create this secret following the steps below: ## 1) Generate your trustore and keystore files (more info at https://www.keycloak.org/docs/latest/server_installation/#_setting_up_ssl) ## 2) Rename your truststore to `keycloak.truststore.jks`. ## 3) Rename your keystores to `keycloak-X.keystore.jks` where X is the ID of each Keycloak replica ## 4) Run the command below where SECRET_NAME is the name of the secret you want to create: ## kubectl create secret generic SECRET_NAME --from-file=./keycloak.truststore.jks --from-file=./keycloak-0.keystore.jks --from-file=./keycloak-1.keystore.jks ... ## existingSecret: "" ## @param auth.tls.usePem Use PEM certificates as input instead of PKS12/JKS stores ## If "true", the Keycloak chart will look for the files ca.crt, keycloak-X.key and keycloak-X.crt inside the secret provided with 'existingSecret'. ## If keystorePassword and truststorePassword are not provided, they will be autogenerated. ## usePem: false ## @param auth.tls.truststoreFilename Truststore specific filename inside the existing secret ## Note: Setting up this value, you will use the same trustore file in all the replicas ## truststoreFilename: "" ## @param auth.tls.keystoreFilename Keystore specific filename inside the existing secret ## Note: Setting up this value, you will use the same trustore file in all the replicas ## keystoreFilename: "" ## @param auth.tls.jksSecret DEPRECATED. Use `auth.tls.existingSecret` instead ## jksSecret: "" ## @param auth.tls.keystorePassword Password to access the keystore when it's password-protected ## keystorePassword: "" ## @param auth.tls.truststorePassword Password to access the truststore when it's password-protected ## truststorePassword: "" ## Init containers' resource requests and limits ## ref: https://kubernetes.io/docs/user-guide/compute-resources/ ## We usually recommend not to specify default resources and to leave this as a conscious ## choice for the user. This also increases chances charts run on environments with little ## resources, such as Minikube. If you do want to specify resources, uncomment the following ## lines, adjust them as necessary, and remove the curly braces after 'resources:'. ## @param auth.tls.resources.limits The resources limits for the TLS init container ## @param auth.tls.resources.requests The requested resources for the TLS init container ## resources: ## Example: ## limits: ## cpu: 100m ## memory: 128Mi ## limits: {} ## Examples: ## requests: ## cpu: 100m ## memory: 128Mi ## requests: {} ## @param proxyAddressForwarding Enable Proxy Address Forwarding ## ref: https://www.keycloak.org/docs/latest/server_installation/#_setting-up-a-load-balancer-or-proxy ## proxyAddressForwarding: false ## Keycloak Service Discovery settings ## ref: https://github.com/bitnami/bitnami-docker-keycloak#cluster-configuration ## serviceDiscovery: ## @param serviceDiscovery.enabled Enable Service Discovery for Keycloak (required if `replicaCount` > `1`) ## enabled: false ## @param serviceDiscovery.protocol Sets the protocol that Keycloak nodes would use to discover new peers ## Available protocols can be found at http://www.jgroups.org/javadoc3/org/jgroups/protocols/ ## protocol: kubernetes.KUBE_PING ## @param serviceDiscovery.properties Properties for the discovery protocol set in `serviceDiscovery.protocol` parameter ## List of key=>value pairs ## Example: ## properties: ## - datasource_jndi_name=>"java:jboss/datasources/KeycloakDS" ## - initialize_sql=>"CREATE TABLE IF NOT EXISTS JGROUPSPING ( own_addr varchar(200) NOT NULL, cluster_name varchar(200) NOT NULL, created timestamp default current_timestamp, ping_data BYTEA, constraint PK_JGROUPSPING PRIMARY KEY (own_addr, cluster_name))" ## properties: [] ## @param serviceDiscovery.transportStack Transport stack for the discovery protocol set in `serviceDiscovery.protocol` parameter ## transportStack: tcp ## Keycloak cache settings ## ref: https://github.com/bitnami/bitnami-docker-keycloak#cluster-configuration ## cache: ## @param cache.ownersCount Number of nodes that will replicate cached data ## ownersCount: 1 ## @param cache.authOwnersCount Number of nodes that will replicate cached authentication data ## authOwnersCount: 1 ## @param configuration Keycloak Configuration. Auto-generated based on other parameters when not specified ## Specify content for standalone-ha.xml ## NOTE: This will override configuring Keycloak based on environment variables (including those set by the chart) ## The standalone-ha.xml is auto-generated based on other parameters when this parameter is not specified ## ## Example: ## configuration: |- ## foo: bar ## baz: ## configuration: "" ## @param existingConfigmap Name of existing ConfigMap with Keycloak configuration ## NOTE: When it's set the configuration parameter is ignored ## existingConfigmap: "" ## @param extraStartupArgs Extra default startup args ## extraStartupArgs: "" ## @param initdbScripts Dictionary of initdb scripts ## Specify dictionary of scripts to be run at first boot ## ref: https://github.com/bitnami/bitnami-docker-keycloak#initializing-a-new-instance ## Example: ## initdbScripts: ## my_init_script.sh: | ## #!/bin/bash ## echo "Do something." ## initdbScripts: {} ## @param initdbScriptsConfigMap ConfigMap with the initdb scripts (Note: Overrides `initdbScripts`) ## initdbScriptsConfigMap: "" ## @param command Override default container command (useful when using custom images) ## command: [] ## @param args Override default container args (useful when using custom images) ## args: [] ## @param extraEnvVars Extra environment variables to be set on Keycloak container ## Example: ## extraEnvVars: ## - name: FOO ## value: "bar" ## extraEnvVars: [] ## @param extraEnvVarsCM Name of existing ConfigMap containing extra env vars ## extraEnvVarsCM: "" ## @param extraEnvVarsSecret Name of existing Secret containing extra env vars ## extraEnvVarsSecret: "" ## @section Keycloak statefulset parameters ## @param replicaCount Number of Keycloak replicas to deploy ## replicaCount: 1 ## @param containerPorts.http Keycloak HTTP container port ## @param containerPorts.https Keycloak HTTPS container port ## @param containerPorts.management Keycloak management HTTP container port ## containerPorts: http: 8080 https: 8443 management: 9990 ## Keycloak pods' SecurityContext ## ref: https://kubernetes.io/docs/tasks/configure-pod-container/security-context/#set-the-security-context-for-a-pod ## @param podSecurityContext.enabled Enabled Keykloak pods' Security Context ## @param podSecurityContext.fsGroup Set Keykloak pod's Security Context fsGroup ## podSecurityContext: enabled: true fsGroup: 1001 ## Keycloak containers' Security Context ## ref: https://kubernetes.io/docs/tasks/configure-pod-container/security-context/#set-the-security-context-for-a-container ## @param containerSecurityContext.enabled Enabled Keykloak containers' Security Context ## @param containerSecurityContext.runAsUser Set Keykloak container's Security Context runAsUser ## @param containerSecurityContext.runAsNonRoot Set Keykloak container's Security Context runAsNonRoot ## containerSecurityContext: enabled: true runAsUser: 1001 runAsNonRoot: true ## Keycloak resource requests and limits ## ref: https://kubernetes.io/docs/user-guide/compute-resources/ ## @param resources.limits The resources limits for the Keycloak containers ## @param resources.requests The requested resources for the Keycloak containers ## resources: limits: {} requests: {} ## Configure extra options for Keycloak containers' liveness, readiness and startup probes ## ref: https://kubernetes.io/docs/tasks/configure-pod-container/configure-liveness-readiness-startup-probes/#configure-probes ## @param livenessProbe.enabled Enable livenessProbe on Keycloak containers ## @param livenessProbe.initialDelaySeconds Initial delay seconds for livenessProbe ## @param livenessProbe.periodSeconds Period seconds for livenessProbe ## @param livenessProbe.timeoutSeconds Timeout seconds for livenessProbe ## @param livenessProbe.failureThreshold Failure threshold for livenessProbe ## @param livenessProbe.successThreshold Success threshold for livenessProbe ## livenessProbe: enabled: true initialDelaySeconds: 300 periodSeconds: 1 timeoutSeconds: 5 failureThreshold: 3 successThreshold: 1 ## @param readinessProbe.enabled Enable readinessProbe on Keycloak containers ## @param readinessProbe.initialDelaySeconds Initial delay seconds for readinessProbe ## @param readinessProbe.periodSeconds Period seconds for readinessProbe ## @param readinessProbe.timeoutSeconds Timeout seconds for readinessProbe ## @param readinessProbe.failureThreshold Failure threshold for readinessProbe ## @param readinessProbe.successThreshold Success threshold for readinessProbe ## readinessProbe: enabled: true initialDelaySeconds: 30 periodSeconds: 10 timeoutSeconds: 1 failureThreshold: 3 successThreshold: 1 ## When enabling this, make sure to set initialDelaySeconds to 0 for livenessProbe and readinessProbe ## @param startupProbe.enabled Enable startupProbe on Keycloak containers ## @param startupProbe.initialDelaySeconds Initial delay seconds for startupProbe ## @param startupProbe.periodSeconds Period seconds for startupProbe ## @param startupProbe.timeoutSeconds Timeout seconds for startupProbe ## @param startupProbe.failureThreshold Failure threshold for startupProbe ## @param startupProbe.successThreshold Success threshold for startupProbe ## startupProbe: enabled: false initialDelaySeconds: 30 periodSeconds: 5 timeoutSeconds: 1 failureThreshold: 60 successThreshold: 1 ## @param customLivenessProbe Custom Liveness probes for Keycloak ## customLivenessProbe: {} ## @param customReadinessProbe Custom Rediness probes Keycloak ## customReadinessProbe: {} ## @param customStartupProbe Custom Startup probes for Keycloak ## customStartupProbe: {} ## @param lifecycleHooks LifecycleHooks to set additional configuration at startup ## lifecycleHooks: {} ## @param hostAliases Deployment pod host aliases ## https://kubernetes.io/docs/concepts/services-networking/add-entries-to-pod-etc-hosts-with-host-aliases/ ## hostAliases: [] ## @param podLabels Extra labels for Keycloak pods ## ref: https://kubernetes.io/docs/concepts/overview/working-with-objects/labels/ ## podLabels: {} ## @param podAnnotations Annotations for Keycloak pods ## ref: https://kubernetes.io/docs/concepts/overview/working-with-objects/annotations/ ## podAnnotations: {} ## @param podAffinityPreset Pod affinity preset. Ignored if `affinity` is set. Allowed values: `soft` or `hard` ## ref: https://kubernetes.io/docs/concepts/scheduling-eviction/assign-pod-node/#inter-pod-affinity-and-anti-affinity ## podAffinityPreset: "" ## @param podAntiAffinityPreset Pod anti-affinity preset. Ignored if `affinity` is set. Allowed values: `soft` or `hard` ## Ref: https://kubernetes.io/docs/concepts/scheduling-eviction/assign-pod-node/#inter-pod-affinity-and-anti-affinity ## podAntiAffinityPreset: soft ## Node affinity preset ## Ref: https://kubernetes.io/docs/concepts/scheduling-eviction/assign-pod-node/#node-affinity ## nodeAffinityPreset: ## @param nodeAffinityPreset.type Node affinity preset type. Ignored if `affinity` is set. Allowed values: `soft` or `hard` ## type: "" ## @param nodeAffinityPreset.key Node label key to match. Ignored if `affinity` is set. ## E.g. ## key: "kubernetes.io/e2e-az-name" ## key: "" ## @param nodeAffinityPreset.values Node label values to match. Ignored if `affinity` is set. ## E.g. ## values: ## - e2e-az1 ## - e2e-az2 ## values: [] ## @param affinity Affinity for pod assignment ## Ref: https://kubernetes.io/docs/concepts/configuration/assign-pod-node/#affinity-and-anti-affinity ## affinity: {} ## @param nodeSelector Node labels for pod assignment ## ref: https://kubernetes.io/docs/user-guide/node-selection/ ## nodeSelector: {} ## @param tolerations Tolerations for pod assignment ## ref: https://kubernetes.io/docs/concepts/configuration/taint-and-toleration/ ## tolerations: [] ## @param topologySpreadConstraints Topology Spread Constraints for pod assignment spread across your cluster among failure-domains. Evaluated as a template ## Ref: https://kubernetes.io/docs/concepts/workloads/pods/pod-topology-spread-constraints/#spread-constraints-for-pods ## topologySpreadConstraints: {} ## @param podManagementPolicy Pod management policy for the Keycloak statefulset ## podManagementPolicy: Parallel ## @param priorityClassName Keycloak pods' Priority Class Name ## ref: https://kubernetes.io/docs/concepts/configuration/pod-priority-preemption/ ## priorityClassName: "" ## @param schedulerName Use an alternate scheduler, e.g. "stork". ## ref: https://kubernetes.io/docs/tasks/administer-cluster/configure-multiple-schedulers/ ## schedulerName: "" ## @param terminationGracePeriodSeconds Seconds Keycloak pod needs to terminate gracefully ## ref: https://kubernetes.io/docs/concepts/workloads/pods/pod/#termination-of-pods ## terminationGracePeriodSeconds: "" ## @param updateStrategy.type Keycloak statefulset strategy type ## @param updateStrategy.rollingUpdate Keycloak statefulset rolling update configuration parameters ## ref: https://kubernetes.io/docs/concepts/workloads/controllers/statefulset/#update-strategies ## updateStrategy: type: RollingUpdate rollingUpdate: {} ## @param extraVolumes Optionally specify extra list of additional volumes for Keycloak pods ## extraVolumes: [] ## @param extraVolumeMounts Optionally specify extra list of additional volumeMounts for Keycloak container(s) ## extraVolumeMounts: [] ## @param initContainers Add additional init containers to the Keycloak pods ## Example: ## initContainers: ## - name: your-image-name ## image: your-image ## imagePullPolicy: Always ## ports: ## - name: portname ## containerPort: 1234 ## initContainers: [] ## @param sidecars Add additional sidecar containers to the Keycloak pods ## Example: ## sidecars: ## - name: your-image-name ## image: your-image ## imagePullPolicy: Always ## ports: ## - name: portname ## containerPort: 1234 ## sidecars: [] ## @section Exposure parameters ## ## Service configuration ## service: ## @param service.type Kubernetes service type ## type: LoadBalancer ## @param service.ports.http Keycloak service HTTP port ## @param service.ports.https Keycloak service HTTPS port ## ports: http: 80 https: 443 ## @param service.nodePorts [object] Specify the nodePort values for the LoadBalancer and NodePort service types. ## ref: https://kubernetes.io/docs/concepts/services-networking/service/#type-nodeport ## nodePorts: http: "" https: "" ## @param service.sessionAffinity Control where client requests go, to the same pod or round-robin ## Values: ClientIP or None ## ref: https://kubernetes.io/docs/user-guide/services/ ## sessionAffinity: None ## @param service.clusterIP Keycloak service clusterIP IP ## e.g: ## clusterIP: None ## clusterIP: "" ## @param service.loadBalancerIP loadBalancerIP for the SuiteCRM Service (optional, cloud specific) ## ref: https://kubernetes.io/docs/user-guide/services/#type-loadbalancer ## loadBalancerIP: "" ## @param service.loadBalancerSourceRanges Address that are allowed when service is LoadBalancer ## https://kubernetes.io/docs/tasks/access-application-cluster/configure-cloud-provider-firewall/#restrict-access-for-loadbalancer-service ## Example: ## loadBalancerSourceRanges: ## - 10.10.10.0/24 ## loadBalancerSourceRanges: [] ## @param service.externalTrafficPolicy Enable client source IP preservation ## ref https://kubernetes.io/docs/tasks/access-application-cluster/create-external-load-balancer/#preserving-the-client-source-ip ## externalTrafficPolicy: Cluster ## @param service.annotations Additional custom annotations for Keycloak service ## annotations: {} ## @param service.extraPorts Extra port to expose on Keycloak service ## extraPorts: [] ## Keycloak ingress parameters ## ref: https://kubernetes.io/docs/user-guide/ingress/ ## ingress: ## @param ingress.enabled Enable ingress record generation for Keycloak ## enabled: false ## @param ingress.ingressClassName IngressClass that will be be used to implement the Ingress (Kubernetes 1.18+) ## This is supported in Kubernetes 1.18+ and required if you have more than one IngressClass marked as the default for your cluster . ## ref: https://kubernetes.io/blog/2020/04/02/improvements-to-the-ingress-api-in-kubernetes-1.18/ ## ingressClassName: "" ## @param ingress.pathType Ingress path type ## pathType: ImplementationSpecific ## @param ingress.apiVersion Force Ingress API version (automatically detected if not set) ## apiVersion: "" ## @param ingress.hostname Default host for the ingress record ## hostname: keycloak.local ## @param ingress.path Default path for the ingress record ## path: / ## @param ingress.servicePort Backend service port to use ## Default is http. Alternative is https. ## servicePort: http ## @param ingress.annotations [object] Additional annotations for the Ingress resource. To enable certificate autogeneration, place here your cert-manager annotations. ## Use this parameter to set the required annotations for cert-manager, see ## ref: https://cert-manager.io/docs/usage/ingress/#supported-annotations ## e.g: ## annotations: ## kubernetes.io/ingress.class: nginx ## cert-manager.io/cluster-issuer: cluster-issuer-name ## annotations: {} ## @param ingress.tls Enable TLS configuration for the host defined at `ingress.hostname` parameter ## TLS certificates will be retrieved from a TLS secret with name: `{{- printf "%s-tls" .Values.ingress.hostname }}` ## You can: ## - Use the `ingress.secrets` parameter to create this TLS secret ## - Relay on cert-manager to create it by setting the corresponding annotations ## - Relay on Helm to create self-signed certificates by setting `ingress.selfSigned=true` ## tls: false ## @param ingress.selfSigned Create a TLS secret for this ingress record using self-signed certificates generated by Helm ## selfSigned: false ## @param ingress.extraHosts An array with additional hostname(s) to be covered with the ingress record ## e.g: ## extraHosts: ## - name: keycloak.local ## path: / ## extraHosts: [] ## @param ingress.extraPaths Any additional arbitrary paths that may need to be added to the ingress under the main host. ## For example: The ALB ingress controller requires a special rule for handling SSL redirection. ## extraPaths: ## - path: /* ## backend: ## serviceName: ssl-redirect ## servicePort: use-annotation ## extraPaths: [] ## @param ingress.extraTls The tls configuration for additional hostnames to be covered with this ingress record. ## see: https://kubernetes.io/docs/concepts/services-networking/ingress/#tls ## extraTls: ## - hosts: ## - keycloak.local ## secretName: keycloak.local-tls ## extraTls: [] ## @param ingress.secrets If you're providing your own certificates, please use this to add the certificates as secrets ## key and certificate should start with -----BEGIN CERTIFICATE----- or ## -----BEGIN RSA PRIVATE KEY----- ## ## name should line up with a tlsSecret set further up ## If you're using cert-manager, this is unneeded, as it will create the secret for you if it is not set ## ## It is also possible to create and manage the certificates outside of this helm chart ## Please see README.md for more information ## e.g: ## - name: keycloak.local-tls ## key: ## certificate: ## secrets: [] ## Network Policy configuration ## ref: https://kubernetes.io/docs/concepts/services-networking/network-policies/ ## networkPolicy: ## @param networkPolicy.enabled Enable the default NetworkPolicy policy ## enabled: false ## @param networkPolicy.allowExternal Don't require client label for connections ## The Policy model to apply. When set to false, only pods with the correct ## client label will have network access to the ports Keycloak is listening ## on. When true, Keycloak will accept connections from any source ## (with the correct destination port). ## allowExternal: true ## @param networkPolicy.additionalRules Additional NetworkPolicy rules ## Note that all rules are OR-ed. ## Example: ## additionalRules: ## - matchLabels: ## - role: frontend ## - matchExpressions: ## - key: role ## operator: In ## values: ## - frontend ## additionalRules: {} ## @section RBAC parameter ## Specifies whether a ServiceAccount should be created ## serviceAccount: ## @param serviceAccount.create Enable the creation of a ServiceAccount for Keycloak pods ## create: true ## @param serviceAccount.name Name of the created ServiceAccount ## If not set and create is true, a name is generated using the fullname template ## name: "" ## @param serviceAccount.automountServiceAccountToken Auto-mount the service account token in the pod ## automountServiceAccountToken: true ## @param serviceAccount.annotations Additional custom annotations for the ServiceAccount ## annotations: {} ## Specifies whether RBAC resources should be created ## rbac: ## @param rbac.create Whether to create and use RBAC resources or not ## create: false ## @param rbac.rules Custom RBAC rules ## Example: ## rules: ## - apiGroups: ## - "" ## resources: ## - pods ## verbs: ## - get ## - list ## rules: [] ## @section Other parameters ## ## Keycloak Pod Disruption Budget configuration ## ref: https://kubernetes.io/docs/tasks/run-application/configure-pdb/ ## pdb: ## @param pdb.create Enable/disable a Pod Disruption Budget creation ## create: false ## @param pdb.minAvailable Minimum number/percentage of pods that should remain scheduled ## minAvailable: 1 ## @param pdb.maxUnavailable Maximum number/percentage of pods that may be made unavailable ## maxUnavailable: "" ## Keycloak Autoscaling configuration ## @param autoscaling.enabled Enable autoscaling for Keycloak ## @param autoscaling.minReplicas Minimum number of Keycloak replicas ## @param autoscaling.maxReplicas Maximum number of Keycloak replicas ## @param autoscaling.targetCPU Target CPU utilization percentage ## @param autoscaling.targetMemory Target Memory utilization percentage ## autoscaling: enabled: false minReplicas: 1 maxReplicas: 11 targetCPU: "" targetMemory: "" ## @section Metrics parameters ## ## Metrics configuration ## metrics: ## @param metrics.enabled Enable exposing Keycloak statistics ## ref: https://github.com/bitnami/bitnami-docker-keycloak#enabling-statistics ## enabled: false ## Keycloak metrics service parameters ## service: ## @param metrics.service.ports.http Metrics service HTTP port ## ports: http: 9990 ## @param metrics.service.annotations [object] Annotations for enabling prometheus to access the metrics endpoints ## annotations: prometheus.io/scrape: "true" prometheus.io/port: "{{ .Values.metrics.service.ports.http }}" ## Prometheus Operator ServiceMonitor configuration ## serviceMonitor: ## @param metrics.serviceMonitor.enabled Create ServiceMonitor Resource for scraping metrics using PrometheusOperator ## enabled: false ## @param metrics.serviceMonitor.namespace Namespace which Prometheus is running in ## namespace: "" ## @param metrics.serviceMonitor.interval Interval at which metrics should be scraped ## interval: 30s ## @param metrics.serviceMonitor.scrapeTimeout Specify the timeout after which the scrape is ended ## e.g: ## scrapeTimeout: 30s ## scrapeTimeout: "" ## @param metrics.serviceMonitor.labels Additional labels that can be used so ServiceMonitor will be discovered by Prometheus ## labels: {} ## @param metrics.serviceMonitor.selector Prometheus instance selector labels ## ref: https://github.com/bitnami/charts/tree/master/bitnami/prometheus-operator#prometheus-configuration ## selector: {} ## @param metrics.serviceMonitor.relabelings RelabelConfigs to apply to samples before scraping ## relabelings: [] ## @param metrics.serviceMonitor.metricRelabelings MetricRelabelConfigs to apply to samples before ingestion ## metricRelabelings: [] ## @param metrics.serviceMonitor.honorLabels honorLabels chooses the metric's labels on collisions with target labels ## honorLabels: false ## @param metrics.serviceMonitor.jobLabel The name of the label on the target service to use as the job name in prometheus. ## jobLabel: "" ## @section keycloak-config-cli parameters ## Configuration for keycloak-config-cli ## ref: https://github.com/adorsys/keycloak-config-cli ## keycloakConfigCli: ## @param keycloakConfigCli.enabled Whether to enable keycloak-config-cli job ## enabled: false ## Bitnami keycloak-config-cli image ## ref: https://hub.docker.com/r/bitnami/keycloak-config-cli/tags/ ## @param keycloakConfigCli.image.registry keycloak-config-cli container image registry ## @param keycloakConfigCli.image.repository keycloak-config-cli container image repository ## @param keycloakConfigCli.image.tag keycloak-config-cli container image tag ## @param keycloakConfigCli.image.pullPolicy keycloak-config-cli container image pull policy ## @param keycloakConfigCli.image.pullSecrets keycloak-config-cli container image pull secrets ## image: registry: docker.io repository: bitnami/keycloak-config-cli tag: 4.8.1-debian-10-r6 ## Specify a imagePullPolicy ## Defaults to 'Always' if image tag is 'latest', else set to 'IfNotPresent' ## ref: https://kubernetes.io/docs/user-guide/images/#pre-pulling-images ## pullPolicy: IfNotPresent ## Optionally specify an array of imagePullSecrets. ## Secrets must be manually created in the namespace. ## ref: https://kubernetes.io/docs/tasks/configure-pod-container/pull-image-private-registry/ ## e.g: ## pullSecrets: ## - myRegistryKeySecretName ## pullSecrets: [] ## @param keycloakConfigCli.annotations [object] Annotations for keycloak-config-cli job ## ref: https://kubernetes.io/docs/concepts/overview/working-with-objects/annotations/ ## annotations: helm.sh/hook: "post-install,post-upgrade,post-rollback" helm.sh/hook-delete-policy: "hook-succeeded,before-hook-creation" helm.sh/hook-weight: "5" ## @param keycloakConfigCli.command Command for running the container (set to default if not set). Use array form ## command: [] ## @param keycloakConfigCli.args Args for running the container (set to default if not set). Use array form ## args: [] ## @param keycloakConfigCli.hostAliases Job pod host aliases ## https://kubernetes.io/docs/concepts/services-networking/add-entries-to-pod-etc-hosts-with-host-aliases/ ## hostAliases: [] ## Keycloak config CLI resource requests and limits ## ref: https://kubernetes.io/docs/user-guide/compute-resources/ ## @param keycloakConfigCli.resources.limits The resources limits for the keycloak-config-cli container ## @param keycloakConfigCli.resources.requests The requested resources for the keycloak-config-cli container ## resources: limits: {} requests: {} ## keycloak-config-cli containers' Security Context ## ref: https://kubernetes.io/docs/tasks/configure-pod-container/security-context/#set-the-security-context-for-a-container ## @param keycloakConfigCli.containerSecurityContext.enabled Enabled keycloak-config-cli containers' Security Context ## @param keycloakConfigCli.containerSecurityContext.runAsUser Set keycloak-config-cli container's Security Context runAsUser ## @param keycloakConfigCli.containerSecurityContext.runAsNonRoot Set keycloak-config-cli container's Security Context runAsNonRoot ## containerSecurityContext: enabled: true runAsUser: 1001 runAsNonRoot: true ## keycloak-config-cli pods' Security Context ## ref: https://kubernetes.io/docs/tasks/configure-pod-container/security-context/#set-the-security-context-for-a-pod ## @param keycloakConfigCli.podSecurityContext.enabled Enabled keycloak-config-cli pods' Security Context ## @param keycloakConfigCli.podSecurityContext.fsGroup Set keycloak-config-cli pod's Security Context fsGroup ## podSecurityContext: enabled: true fsGroup: 1001 ## @param keycloakConfigCli.backoffLimit Number of retries before considering a Job as failed ## ref: https://kubernetes.io/docs/concepts/workloads/controllers/job/#pod-backoff-failure-policy ## backoffLimit: 1 ## @param keycloakConfigCli.podLabels Pod extra labels ## ref: https://kubernetes.io/docs/concepts/overview/working-with-objects/labels/ ## podLabels: {} ## @param keycloakConfigCli.podAnnotations Annotations for job pod ## ref: https://kubernetes.io/docs/concepts/overview/working-with-objects/annotations/ ## podAnnotations: {} ## @param keycloakConfigCli.extraEnvVars Additional environment variables to set ## Example: ## extraEnvVars: ## - name: FOO ## value: "bar" ## extraEnvVars: [] ## @param keycloakConfigCli.extraEnvVarsCM ConfigMap with extra environment variables ## extraEnvVarsCM: "" ## @param keycloakConfigCli.extraEnvVarsSecret Secret with extra environment variables ## extraEnvVarsSecret: "" ## @param keycloakConfigCli.extraVolumes Extra volumes to add to the job ## extraVolumes: [] ## @param keycloakConfigCli.extraVolumeMounts Extra volume mounts to add to the container ## extraVolumeMounts: [] ## @param keycloakConfigCli.configuration keycloak-config-cli realms configuration ## NOTE: nil keys will be considered files to import locally ## Example: ## configuration: ## realm1.json: | ## { ## "realm": "realm1", ## "clients": [] ## } ## files/realm2.yaml: ## realm3.yaml: | ## realm: realm3 ## clients: [] ## configuration: {} ## @param keycloakConfigCli.existingConfigmap ConfigMap with keycloak-config-cli configuration. This will override `keycloakConfigCli.config` ## NOTE: This will override keycloakConfigCli.configuration ## existingConfigmap: "" ## @section Database parameters ## PostgreSQL chart configuration ## ref: https://github.com/bitnami/charts/blob/master/bitnami/postgresql/values.yaml ## @param postgresql.enabled Switch to enable or disable the PostgreSQL helm chart ## @param postgresql.auth.username Name for a custom user to create ## @param postgresql.auth.password Password for the custom user to create ## @param postgresql.auth.database Name for a custom database to create ## @param postgresql.auth.existingSecret Name of existing secret to use for PostgreSQL credentials ## @param postgresql.architecture PostgreSQL architecture (`standalone` or `replication`) ## postgresql: enabled: true auth: username: bn_keycloak password: "" database: bitnami_keycloak existingSecret: "" architecture: standalone ## External PostgreSQL configuration ## All of these values are only used when postgresql.enabled is set to false ## @param externalDatabase.host Database host ## @param externalDatabase.port Database port number ## @param externalDatabase.user Non-root username for Keycloak ## @param externalDatabase.password Password for the non-root username for Keycloak ## @param externalDatabase.database Keycloak database name ## @param externalDatabase.existingSecret Name of an existing secret resource containing the database credentials ## @param externalDatabase.existingSecretPasswordKey Name of an existing secret key containing the database credentials ## externalDatabase: host: "" port: 5432 user: bn_keycloak database: bitnami_keycloak password: "" existingSecret: "" existingSecretPasswordKey: ""
39.660714
261
0.742962
e1e76c31188e01f6f19fc515150215abfe88fc4f
820
yaml
YAML
bitnami/kibana/Chart.yaml
00arthur00/charts
502aa1e64541669b732a4eda896e5937847b6c3c
[ "Apache-2.0" ]
null
null
null
bitnami/kibana/Chart.yaml
00arthur00/charts
502aa1e64541669b732a4eda896e5937847b6c3c
[ "Apache-2.0" ]
2
2022-01-26T01:14:30.000Z
2022-01-26T07:03:39.000Z
bitnami/kibana/Chart.yaml
00arthur00/charts
502aa1e64541669b732a4eda896e5937847b6c3c
[ "Apache-2.0" ]
null
null
null
annotations: category: Analytics apiVersion: v2 appVersion: 7.17.1 dependencies: - name: common repository: https://charts.bitnami.com/bitnami tags: - bitnami-common version: 1.x.x description: Kibana is an open source, browser based analytics and search dashboard for Elasticsearch. Kibana strives to be easy to get started with, while also being flexible and powerful. engine: gotpl home: https://github.com/bitnami/charts/tree/master/bitnami/kibana icon: https://bitnami.com/assets/stacks/kibana/img/kibana-stack-220x234.png keywords: - kibana - analytics - monitoring - metrics - logs maintainers: - email: [email protected] name: Bitnami name: kibana sources: - https://github.com/bitnami/bitnami-docker-kibana - https://www.elastic.co/products/kibana version: 9.3.10
28.275862
189
0.747561
a9d53403a24fa5d0d9b019bd9694958664118b39
780
yaml
YAML
bitnami/haproxy/Chart.yaml
00arthur00/charts
502aa1e64541669b732a4eda896e5937847b6c3c
[ "Apache-2.0" ]
null
null
null
bitnami/haproxy/Chart.yaml
00arthur00/charts
502aa1e64541669b732a4eda896e5937847b6c3c
[ "Apache-2.0" ]
2
2022-01-26T01:14:30.000Z
2022-01-26T07:03:39.000Z
bitnami/haproxy/Chart.yaml
00arthur00/charts
502aa1e64541669b732a4eda896e5937847b6c3c
[ "Apache-2.0" ]
null
null
null
annotations: category: Infrastructure apiVersion: v2 appVersion: 2.5.5 dependencies: - name: common repository: https://charts.bitnami.com/bitnami tags: - bitnami-common version: 1.x.x description: HAProxy is a TCP proxy and a HTTP reverse proxy. It supports SSL termination and offloading, TCP and HTTP normalization, traffic regulation, caching and protection against DDoS attacks. engine: gotpl home: https://www.haproxy.org/ icon: https://bitnami.com/assets/stacks/haproxy/img/haproxy-stack-220x234.png keywords: - haproxy - proxy - infrastructure maintainers: - email: [email protected] name: Bitnami name: haproxy sources: - https://github.com/bitnami/bitnami-docker-haproxy - https://github.com/haproxytech/haproxy version: 0.3.9
28.888889
198
0.752564
f08f9e5daef2161b639f688458d5fc5645e3ca9e
62,629
yaml
YAML
bitnami/airflow/values.yaml
00arthur00/charts
502aa1e64541669b732a4eda896e5937847b6c3c
[ "Apache-2.0" ]
null
null
null
bitnami/airflow/values.yaml
00arthur00/charts
502aa1e64541669b732a4eda896e5937847b6c3c
[ "Apache-2.0" ]
2
2022-01-26T01:14:30.000Z
2022-01-26T07:03:39.000Z
bitnami/airflow/values.yaml
00arthur00/charts
502aa1e64541669b732a4eda896e5937847b6c3c
[ "Apache-2.0" ]
null
null
null
## @section Global parameters ## Global Docker image parameters ## Please, note that this will override the image parameters, including dependencies, configured to use the global value ## Current available global Docker image parameters: imageRegistry, imagePullSecrets and storageClass ## @param global.imageRegistry Global Docker image registry ## @param global.imagePullSecrets Global Docker registry secret names as an array ## @param global.storageClass Global StorageClass for Persistent Volume(s) ## global: imageRegistry: "" ## E.g. ## imagePullSecrets: ## - myRegistryKeySecretName ## imagePullSecrets: [] storageClass: "" ## @section Common parameters ## @param kubeVersion Override Kubernetes version ## kubeVersion: "" ## @param nameOverride String to partially override common.names.fullname template (will maintain the release name) ## nameOverride: "" ## @param fullnameOverride String to fully override common.names.fullname template ## fullnameOverride: "" ## @param clusterDomain Kubernetes Cluster Domain ## clusterDomain: cluster.local ## @param extraDeploy Extra objects to deploy (evaluated as a template) ## extraDeploy: [] ## @param commonLabels Add labels to all the deployed resources ## commonLabels: {} ## @param commonAnnotations Add annotations to all the deployed resources ## commonAnnotations: {} ## Enable diagnostic mode in the deployment(s)/statefulset(s) ## diagnosticMode: ## @param diagnosticMode.enabled Enable diagnostic mode (all probes will be disabled and the command will be overridden) ## enabled: false ## @param diagnosticMode.command Command to override all containers in the the deployment(s)/statefulset(s) ## command: - sleep ## @param diagnosticMode.args Args to override all containers in the the deployment(s)/statefulset(s) ## args: - infinity ## @section Airflow common parameters ## Authentication parameters ## ref: https://github.com/bitnami/bitnami-docker-airflow#environment-variables ## auth: ## @param auth.username Username to access web UI ## username: user ## @param auth.password Password to access web UI ## password: "" ## @param auth.fernetKey Fernet key to secure connections ## ref: https://airflow.readthedocs.io/en/stable/howto/secure-connections.html ## ref: https://bcb.github.io/airflow/fernet-key ## fernetKey: "" ## @param auth.secretKey Secret key to run your flask app ## ref: https://airflow.apache.org/docs/apache-airflow/stable/configurations-ref.html#secret-key ## secretKey: "" ## @param auth.existingSecret Name of an existing secret to use for Airflow credentials ## `auth.password`, `auth.fernetKey`, and `auth.secretKey` will be ignored and picked up from this secret ## The secret must contain the keys `airflow-password`, `airflow-fernet-key` and `airflow-secret-key' ## The value is evaluated as a template ## existingSecret: "" ## @param executor Airflow executor. Allowed values: `SequentialExecutor`, `LocalExecutor`, `CeleryExecutor`, `KubernetesExecutor` and `CeleryKubernetesExecutor` ## ref: http://airflow.apache.org/docs/stable/executor/index.html ## executor: CeleryExecutor ## @param loadExamples Switch to load some Airflow examples ## loadExamples: false ## @param configuration Specify content for Airflow config file (auto-generated based on other env. vars otherwise) ## e.g: ## configuration: |- ## [core] ## dags_folder=/opt/bitnami/airflow/dags ## ... ## configuration: "" ## @param existingConfigmap Name of an existing ConfigMap with the Airflow config file ## existingConfigmap: "" ## Load custom DAGs from a ConfigMap ## Note: an init container will be used to prepare the DAGs available in the ConfigMap to be consumed by Airflow containers ## dags: ## @param dags.existingConfigmap Name of an existing ConfigMap with all the DAGs files you want to load in Airflow ## existingConfigmap: "" ## Bitnami Shell image ## ref: https://hub.docker.com/r/bitnami/bitnami-shell/tags/ ## @param dags.image.registry Init container load-dags image registry ## @param dags.image.repository Init container load-dags image repository ## @param dags.image.tag Init container load-dags image tag (immutable tags are recommended) ## @param dags.image.pullPolicy Init container load-dags image pull policy ## @param dags.image.pullSecrets Init container load-dags image pull secrets ## image: registry: docker.io repository: bitnami/bitnami-shell tag: 10-debian-10-r366 pullPolicy: IfNotPresent ## Optionally specify an array of imagePullSecrets. ## Secrets must be manually created in the namespace. ## ref: https://kubernetes.io/docs/tasks/configure-pod-container/pull-image-private-registry/ ## e.g: ## pullSecrets: ## - myRegistryKeySecretName ## pullSecrets: [] ## @section Airflow web parameters web: ## Bitnami Airflow image version ## ref: https://hub.docker.com/r/bitnami/airflow/tags/ ## @param web.image.registry Airflow image registry ## @param web.image.repository Airflow image repository ## @param web.image.tag Airflow image tag (immutable tags are recommended) ## @param web.image.pullPolicy Airflow image pull policy ## @param web.image.pullSecrets Airflow image pull secrets ## @param web.image.debug Enable image debug mode image: registry: docker.io repository: bitnami/airflow tag: 2.2.4-debian-10-r8 ## Specify a imagePullPolicy ## Defaults to 'Always' if image tag is 'latest', else set to 'IfNotPresent' ## ref: https://kubernetes.io/docs/user-guide/images/#pre-pulling-images ## pullPolicy: IfNotPresent ## Optionally specify an array of imagePullSecrets. ## Secrets must be manually created in the namespace. ## ref: https://kubernetes.io/docs/tasks/configure-pod-container/pull-image-private-registry/ ## e.g: ## pullSecrets: ## - myRegistryKeySecretName ## pullSecrets: [] ## Set to true if you would like to see extra information on logs ## debug: false ## @param web.baseUrl URL used to access to Airflow web ui ## baseUrl: "" ## @param web.existingConfigmap Name of an existing config map containing the Airflow web config file ## existingConfigmap: "" ## @param web.command Override default container command (useful when using custom images) ## command: [] ## @param web.args Override default container args (useful when using custom images) ## args: [] ## @param web.extraEnvVars Array with extra environment variables to add Airflow web pods ## extraEnvVars: [] ## @param web.extraEnvVarsCM ConfigMap containing extra environment variables for Airflow web pods ## extraEnvVarsCM: "" ## @param web.extraEnvVarsSecret Secret containing extra environment variables (in case of sensitive data) for Airflow web pods ## extraEnvVarsSecret: "" ## @param web.containerPorts.http Airflow web HTTP container port ## containerPorts: http: 8080 ## @param web.replicaCount Number of Airflow web replicas ## replicaCount: 1 ## Configure extra options for Airflow web containers' liveness, readiness and startup probes ## ref: https://kubernetes.io/docs/tasks/configure-pod-container/configure-liveness-readiness-startup-probes/#configure-probes ## @param web.livenessProbe.enabled Enable livenessProbe on Airflow web containers ## @param web.livenessProbe.initialDelaySeconds Initial delay seconds for livenessProbe ## @param web.livenessProbe.periodSeconds Period seconds for livenessProbe ## @param web.livenessProbe.timeoutSeconds Timeout seconds for livenessProbe ## @param web.livenessProbe.failureThreshold Failure threshold for livenessProbe ## @param web.livenessProbe.successThreshold Success threshold for livenessProbe ## livenessProbe: enabled: true initialDelaySeconds: 180 periodSeconds: 20 timeoutSeconds: 5 failureThreshold: 6 successThreshold: 1 ## @param web.readinessProbe.enabled Enable readinessProbe on Airflow web containers ## @param web.readinessProbe.initialDelaySeconds Initial delay seconds for readinessProbe ## @param web.readinessProbe.periodSeconds Period seconds for readinessProbe ## @param web.readinessProbe.timeoutSeconds Timeout seconds for readinessProbe ## @param web.readinessProbe.failureThreshold Failure threshold for readinessProbe ## @param web.readinessProbe.successThreshold Success threshold for readinessProbe ## readinessProbe: enabled: true initialDelaySeconds: 30 periodSeconds: 10 timeoutSeconds: 5 failureThreshold: 6 successThreshold: 1 ## @param web.startupProbe.enabled Enable startupProbe on Airflow web containers ## @param web.startupProbe.initialDelaySeconds Initial delay seconds for startupProbe ## @param web.startupProbe.periodSeconds Period seconds for startupProbe ## @param web.startupProbe.timeoutSeconds Timeout seconds for startupProbe ## @param web.startupProbe.failureThreshold Failure threshold for startupProbe ## @param web.startupProbe.successThreshold Success threshold for startupProbe ## startupProbe: enabled: false initialDelaySeconds: 60 periodSeconds: 10 timeoutSeconds: 1 failureThreshold: 15 successThreshold: 1 ## @param web.customLivenessProbe Custom livenessProbe that overrides the default one ## customLivenessProbe: {} ## @param web.customReadinessProbe Custom readinessProbe that overrides the default one ## customReadinessProbe: {} ## @param web.customStartupProbe Custom startupProbe that overrides the default one ## customStartupProbe: {} ## Airflow web resource requests and limits ## ref: https://kubernetes.io/docs/user-guide/compute-resources/ ## @param web.resources.limits The resources limits for the Airflow web containers ## @param web.resources.requests The requested resources for the Airflow web containers ## resources: limits: {} requests: {} ## Configure Airflow web pods Security Context ## ref: https://kubernetes.io/docs/tasks/configure-pod-container/security-context/#set-the-security-context-for-a-pod ## @param web.podSecurityContext.enabled Enabled Airflow web pods' Security Context ## @param web.podSecurityContext.fsGroup Set Airflow web pod's Security Context fsGroup ## podSecurityContext: enabled: true fsGroup: 1001 ## Configure Airflow web containers (only main one) Security Context ## ref: https://kubernetes.io/docs/tasks/configure-pod-container/security-context/#set-the-security-context-for-a-container ## @param web.containerSecurityContext.enabled Enabled Airflow web containers' Security Context ## @param web.containerSecurityContext.runAsUser Set Airflow web containers' Security Context runAsUser ## @param web.containerSecurityContext.runAsNonRoot Set Airflow web containers' Security Context runAsNonRoot ## containerSecurityContext: enabled: true runAsUser: 1001 runAsNonRoot: true ## @param web.lifecycleHooks for the Airflow web container(s) to automate configuration before or after startup ## lifecycleHooks: {} ## @param web.hostAliases Deployment pod host aliases ## https://kubernetes.io/docs/concepts/services-networking/add-entries-to-pod-etc-hosts-with-host-aliases/ ## hostAliases: [] ## @param web.podLabels Add extra labels to the Airflow web pods ## podLabels: {} ## @param web.podAnnotations Add extra annotations to the Airflow web pods ## podAnnotations: {} ## @param web.affinity Affinity for Airflow web pods assignment (evaluated as a template) ## Ref: https://kubernetes.io/docs/concepts/configuration/assign-pod-node/#affinity-and-anti-affinity ## Note: `web.podAffinityPreset`, `web.podAntiAffinityPreset`, and `web.nodeAffinityPreset` will be ignored when it's set ## affinity: {} ## Node affinity preset ## Ref: https://kubernetes.io/docs/concepts/scheduling-eviction/assign-pod-node/#node-affinity ## @param web.nodeAffinityPreset.key Node label key to match. Ignored if `web.affinity` is set. ## @param web.nodeAffinityPreset.type Node affinity preset type. Ignored if `web.affinity` is set. Allowed values: `soft` or `hard` ## @param web.nodeAffinityPreset.values Node label values to match. Ignored if `web.affinity` is set. ## nodeAffinityPreset: ## e.g: ## key: "kubernetes.io/e2e-az-name" ## key: "" type: "" ## e.g: ## values: ## - e2e-az1 ## - e2e-az2 ## values: [] ## @param web.nodeSelector Node labels for Airflow web pods assignment ## Ref: https://kubernetes.io/docs/user-guide/node-selection/ ## nodeSelector: {} ## @param web.podAffinityPreset Pod affinity preset. Ignored if `web.affinity` is set. Allowed values: `soft` or `hard`. ## ref: https://kubernetes.io/docs/concepts/scheduling-eviction/assign-pod-node/#inter-pod-affinity-and-anti-affinity ## podAffinityPreset: "" ## @param web.podAntiAffinityPreset Pod anti-affinity preset. Ignored if `web.affinity` is set. Allowed values: `soft` or `hard`. ## Ref: https://kubernetes.io/docs/concepts/scheduling-eviction/assign-pod-node/#inter-pod-affinity-and-anti-affinity ## podAntiAffinityPreset: soft ## @param web.tolerations Tolerations for Airflow web pods assignment ## Ref: https://kubernetes.io/docs/concepts/configuration/taint-and-toleration/ ## tolerations: [] ## @param web.topologySpreadConstraints Topology Spread Constraints for pod assignment spread across your cluster among failure-domains. Evaluated as a template ## Ref: https://kubernetes.io/docs/concepts/workloads/pods/pod-topology-spread-constraints/#spread-constraints-for-pods ## topologySpreadConstraints: {} ## @param web.priorityClassName Priority Class Name ## ref: https://kubernetes.io/docs/concepts/configuration/pod-priority-preemption/#priorityclass ## priorityClassName: "" ## @param web.schedulerName Use an alternate scheduler, e.g. "stork". ## ref: https://kubernetes.io/docs/tasks/administer-cluster/configure-multiple-schedulers/ ## schedulerName: "" ## @param web.terminationGracePeriodSeconds Seconds Airflow web pod needs to terminate gracefully ## ref: https://kubernetes.io/docs/concepts/workloads/pods/pod/#termination-of-pods ## terminationGracePeriodSeconds: "" ## @param web.updateStrategy.type Airflow web deployment strategy type ## @param web.updateStrategy.rollingUpdate Airflow web deployment rolling update configuration parameters ## ref: https://kubernetes.io/docs/concepts/workloads/controllers/deployment/#strategy ## updateStrategy: type: RollingUpdate rollingUpdate: {} ## @param web.sidecars Add additional sidecar containers to the Airflow web pods ## Example: ## sidecars: ## - name: your-image-name ## image: your-image ## imagePullPolicy: Always ## ports: ## - name: portname ## containerPort: 1234 ## sidecars: [] ## @param web.initContainers Add additional init containers to the Airflow web pods ## Example: ## initContainers: ## - name: your-image-name ## image: your-image ## imagePullPolicy: Always ## ports: ## - name: portname ## containerPort: 1234 ## initContainers: [] ## @param web.extraVolumeMounts Optionally specify extra list of additional volumeMounts for the Airflow web pods ## extraVolumeMounts: [] ## @param web.extraVolumes Optionally specify extra list of additional volumes for the Airflow web pods ## extraVolumes: [] ## Airflow web Pod Disruption Budget ## ref: https://kubernetes.io/docs/concepts/workloads/pods/disruptions/ ## @param web.pdb.create Deploy a pdb object for the Airflow web pods ## @param web.pdb.minAvailable Maximum number/percentage of unavailable Airflow web replicas ## @param web.pdb.maxUnavailable Maximum number/percentage of unavailable Airflow web replicas ## pdb: create: false minAvailable: 1 maxUnavailable: "" ## @section Airflow scheduler parameters scheduler: ## Bitnami Airflow Scheduler image version ## ref: https://hub.docker.com/r/bitnami/airflow-scheduler/tags/ ## @param scheduler.image.registry Airflow Scheduler image registry ## @param scheduler.image.repository Airflow Scheduler image repository ## @param scheduler.image.tag Airflow Scheduler image tag (immutable tags are recommended) ## @param scheduler.image.pullPolicy Airflow Scheduler image pull policy ## @param scheduler.image.pullSecrets Airflow Scheduler image pull secrets ## @param scheduler.image.debug Enable image debug mode ## image: registry: docker.io repository: bitnami/airflow-scheduler tag: 2.2.4-debian-10-r20 ## Specify a imagePullPolicy ## Defaults to 'Always' if image tag is 'latest', else set to 'IfNotPresent' ## ref: https://kubernetes.io/docs/user-guide/images/#pre-pulling-images ## pullPolicy: IfNotPresent ## Optionally specify an array of imagePullSecrets. ## Secrets must be manually created in the namespace. ## ref: https://kubernetes.io/docs/tasks/configure-pod-container/pull-image-private-registry/ ## e.g: ## pullSecrets: ## - myRegistryKeySecretName ## pullSecrets: [] ## Set to true if you would like to see extra information on logs ## debug: false ## @param scheduler.replicaCount Number of scheduler replicas ## replicaCount: 1 ## @param scheduler.command Override cmd ## command: [] ## @param scheduler.args Override args ## args: [] ## @param scheduler.extraEnvVars Add extra environment variables ## extraEnvVars: [] ## @param scheduler.extraEnvVarsCM ConfigMap with extra environment variables ## extraEnvVarsCM: "" ## @param scheduler.extraEnvVarsSecret Secret with extra environment variables ## extraEnvVarsSecret: "" ## @param scheduler.customLivenessProbe Custom livenessProbe that overrides the default one ## customLivenessProbe: {} ## @param scheduler.customReadinessProbe Custom readinessProbe that overrides the default one ## customReadinessProbe: {} ## @param scheduler.customStartupProbe Custom startupProbe that overrides the default one ## customStartupProbe: {} ## Airflow scheduler resource requests and limits ## ref: https://kubernetes.io/docs/user-guide/compute-resources/ ## @param scheduler.resources.limits The resources limits for the Airflow scheduler containers ## @param scheduler.resources.requests The requested resources for the Airflow scheduler containers ## resources: limits: {} requests: {} ## Configure Airflow scheduler pods Security Context ## ref: https://kubernetes.io/docs/tasks/configure-pod-container/security-context/#set-the-security-context-for-a-pod ## @param scheduler.podSecurityContext.enabled Enabled Airflow scheduler pods' Security Context ## @param scheduler.podSecurityContext.fsGroup Set Airflow scheduler pod's Security Context fsGroup ## podSecurityContext: enabled: true fsGroup: 1001 ## Configure Airflow scheduler containers (only main one) Security Context ## ref: https://kubernetes.io/docs/tasks/configure-pod-container/security-context/#set-the-security-context-for-a-container ## @param scheduler.containerSecurityContext.enabled Enabled Airflow scheduler containers' Security Context ## @param scheduler.containerSecurityContext.runAsUser Set Airflow scheduler containers' Security Context runAsUser ## @param scheduler.containerSecurityContext.runAsNonRoot Set Airflow scheduler containers' Security Context runAsNonRoot ## containerSecurityContext: enabled: true runAsUser: 1001 runAsNonRoot: true ## @param scheduler.lifecycleHooks for the Airflow scheduler container(s) to automate configuration before or after startup ## lifecycleHooks: {} ## @param scheduler.hostAliases Deployment pod host aliases ## https://kubernetes.io/docs/concepts/services-networking/add-entries-to-pod-etc-hosts-with-host-aliases/ ## hostAliases: [] ## @param scheduler.podLabels Add extra labels to the Airflow scheduler pods ## podLabels: {} ## @param scheduler.podAnnotations Add extra annotations to the Airflow scheduler pods ## podAnnotations: {} ## @param scheduler.affinity Affinity for Airflow scheduler pods assignment (evaluated as a template) ## Ref: https://kubernetes.io/docs/concepts/configuration/assign-pod-node/#affinity-and-anti-affinity ## Note: `scheduler.podAffinityPreset`, `scheduler.podAntiAffinityPreset`, and `scheduler.nodeAffinityPreset` will be ignored when it's set ## affinity: {} ## Node affinity preset ## Ref: https://kubernetes.io/docs/concepts/scheduling-eviction/assign-pod-node/#node-affinity ## @param scheduler.nodeAffinityPreset.key Node label key to match. Ignored if `scheduler.affinity` is set. ## @param scheduler.nodeAffinityPreset.type Node affinity preset type. Ignored if `scheduler.affinity` is set. Allowed values: `soft` or `hard` ## @param scheduler.nodeAffinityPreset.values Node label values to match. Ignored if `scheduler.affinity` is set. ## nodeAffinityPreset: ## e.g: ## key: "kubernetes.io/e2e-az-name" ## key: "" type: "" ## e.g: ## values: ## - e2e-az1 ## - e2e-az2 ## values: [] ## @param scheduler.nodeSelector Node labels for Airflow scheduler pods assignment ## Ref: https://kubernetes.io/docs/user-guide/node-selection/ ## nodeSelector: {} ## @param scheduler.podAffinityPreset Pod affinity preset. Ignored if `scheduler.affinity` is set. Allowed values: `soft` or `hard`. ## ref: https://kubernetes.io/docs/concepts/scheduling-eviction/assign-pod-node/#inter-pod-affinity-and-anti-affinity ## podAffinityPreset: "" ## @param scheduler.podAntiAffinityPreset Pod anti-affinity preset. Ignored if `scheduler.affinity` is set. Allowed values: `soft` or `hard`. ## Ref: https://kubernetes.io/docs/concepts/scheduling-eviction/assign-pod-node/#inter-pod-affinity-and-anti-affinity ## podAntiAffinityPreset: soft ## @param scheduler.tolerations Tolerations for Airflow scheduler pods assignment ## Ref: https://kubernetes.io/docs/concepts/configuration/taint-and-toleration/ ## tolerations: [] ## @param scheduler.topologySpreadConstraints Topology Spread Constraints for pod assignment spread across your cluster among failure-domains. Evaluated as a template ## Ref: https://kubernetes.io/docs/concepts/workloads/pods/pod-topology-spread-constraints/#spread-constraints-for-pods ## topologySpreadConstraints: {} ## @param scheduler.priorityClassName Priority Class Name ## ref: https://kubernetes.io/docs/concepts/configuration/pod-priority-preemption/#priorityclass ## priorityClassName: "" ## @param scheduler.schedulerName Use an alternate scheduler, e.g. "stork". ## ref: https://kubernetes.io/docs/tasks/administer-cluster/configure-multiple-schedulers/ ## schedulerName: "" ## @param scheduler.terminationGracePeriodSeconds Seconds Airflow scheduler pod needs to terminate gracefully ## ref: https://kubernetes.io/docs/concepts/workloads/pods/pod/#termination-of-pods ## terminationGracePeriodSeconds: "" ## @param scheduler.updateStrategy.type Airflow scheduler deployment strategy type ## @param scheduler.updateStrategy.rollingUpdate Airflow scheduler deployment rolling update configuration parameters ## ref: https://kubernetes.io/docs/concepts/workloads/controllers/deployment/#strategy ## updateStrategy: type: RollingUpdate rollingUpdate: {} ## @param scheduler.sidecars Add additional sidecar containers to the Airflow scheduler pods ## Example: ## sidecars: ## - name: your-image-name ## image: your-image ## imagePullPolicy: Always ## ports: ## - name: portname ## containerPort: 1234 ## sidecars: [] ## @param scheduler.initContainers Add additional init containers to the Airflow scheduler pods ## Example: ## initContainers: ## - name: your-image-name ## image: your-image ## imagePullPolicy: Always ## ports: ## - name: portname ## containerPort: 1234 ## initContainers: [] ## @param scheduler.extraVolumeMounts Optionally specify extra list of additional volumeMounts for the Airflow scheduler pods ## extraVolumeMounts: [] ## @param scheduler.extraVolumes Optionally specify extra list of additional volumes for the Airflow scheduler pods ## extraVolumes: [] ## Airflow scheduler Pod Disruption Budget ## ref: https://kubernetes.io/docs/concepts/workloads/pods/disruptions/ ## @param scheduler.pdb.create Deploy a pdb object for the Airflow scheduler pods ## @param scheduler.pdb.minAvailable Maximum number/percentage of unavailable Airflow scheduler replicas ## @param scheduler.pdb.maxUnavailable Maximum number/percentage of unavailable Airflow scheduler replicas ## pdb: create: false minAvailable: 1 maxUnavailable: "" ## @section Airflow worker parameters worker: ## Bitnami Airflow Worker image version ## ref: https://hub.docker.com/r/bitnami/airflow-worker/tags/ ## @param worker.image.registry Airflow Worker image registry ## @param worker.image.repository Airflow Worker image repository ## @param worker.image.tag Airflow Worker image tag (immutable tags are recommended) ## @param worker.image.pullPolicy Airflow Worker image pull policy ## @param worker.image.pullSecrets Airflow Worker image pull secrets ## @param worker.image.debug Enable image debug mode ## image: registry: docker.io repository: bitnami/airflow-worker tag: 2.2.4-debian-10-r21 ## Specify a imagePullPolicy ## Defaults to 'Always' if image tag is 'latest', else set to 'IfNotPresent' ## ref: https://kubernetes.io/docs/user-guide/images/#pre-pulling-images ## pullPolicy: IfNotPresent ## Optionally specify an array of imagePullSecrets. ## Secrets must be manually created in the namespace. ## ref: https://kubernetes.io/docs/tasks/configure-pod-container/pull-image-private-registry/ ## e.g: ## pullSecrets: ## - myRegistryKeySecretName ## pullSecrets: [] ## Set to true if you would like to see extra information on logs ## debug: false ## @param worker.command Override default container command (useful when using custom images) ## command: [] ## @param worker.args Override default container args (useful when using custom images) ## args: [] ## @param worker.extraEnvVars Array with extra environment variables to add Airflow worker pods ## extraEnvVars: [] ## @param worker.extraEnvVarsCM ConfigMap containing extra environment variables for Airflow worker pods ## extraEnvVarsCM: "" ## @param worker.extraEnvVarsSecret Secret containing extra environment variables (in case of sensitive data) for Airflow worker pods ## extraEnvVarsSecret: "" ## @param worker.containerPorts.http Airflow worker HTTP container port ## containerPorts: http: 8793 ## @param worker.replicaCount Number of Airflow worker replicas ## replicaCount: 1 ## Configure extra options for Airflow worker containers' liveness, readiness and startup probes ## ref: https://kubernetes.io/docs/tasks/configure-pod-container/configure-liveness-readiness-startup-probes/#configure-probes ## @param worker.livenessProbe.enabled Enable livenessProbe on Airflow worker containers ## @param worker.livenessProbe.initialDelaySeconds Initial delay seconds for livenessProbe ## @param worker.livenessProbe.periodSeconds Period seconds for livenessProbe ## @param worker.livenessProbe.timeoutSeconds Timeout seconds for livenessProbe ## @param worker.livenessProbe.failureThreshold Failure threshold for livenessProbe ## @param worker.livenessProbe.successThreshold Success threshold for livenessProbe ## livenessProbe: enabled: true initialDelaySeconds: 180 periodSeconds: 20 timeoutSeconds: 5 failureThreshold: 6 successThreshold: 1 ## @param worker.readinessProbe.enabled Enable readinessProbe on Airflow worker containers ## @param worker.readinessProbe.initialDelaySeconds Initial delay seconds for readinessProbe ## @param worker.readinessProbe.periodSeconds Period seconds for readinessProbe ## @param worker.readinessProbe.timeoutSeconds Timeout seconds for readinessProbe ## @param worker.readinessProbe.failureThreshold Failure threshold for readinessProbe ## @param worker.readinessProbe.successThreshold Success threshold for readinessProbe ## readinessProbe: enabled: true initialDelaySeconds: 30 periodSeconds: 10 timeoutSeconds: 5 failureThreshold: 6 successThreshold: 1 ## @param worker.startupProbe.enabled Enable startupProbe on Airflow worker containers ## @param worker.startupProbe.initialDelaySeconds Initial delay seconds for startupProbe ## @param worker.startupProbe.periodSeconds Period seconds for startupProbe ## @param worker.startupProbe.timeoutSeconds Timeout seconds for startupProbe ## @param worker.startupProbe.failureThreshold Failure threshold for startupProbe ## @param worker.startupProbe.successThreshold Success threshold for startupProbe ## startupProbe: enabled: false initialDelaySeconds: 60 periodSeconds: 10 timeoutSeconds: 1 failureThreshold: 15 successThreshold: 1 ## @param worker.customLivenessProbe Custom livenessProbe that overrides the default one ## customLivenessProbe: {} ## @param worker.customReadinessProbe Custom readinessProbe that overrides the default one ## customReadinessProbe: {} ## @param worker.customStartupProbe Custom startupProbe that overrides the default one ## customStartupProbe: {} ## Airflow worker resource requests and limits ## ref: https://kubernetes.io/docs/user-guide/compute-resources/ ## @param worker.resources.limits The resources limits for the Airflow worker containers ## @param worker.resources.requests The requested resources for the Airflow worker containers ## resources: limits: {} requests: {} ## Configure Airflow worker pods Security Context ## ref: https://kubernetes.io/docs/tasks/configure-pod-container/security-context/#set-the-security-context-for-a-pod ## @param worker.podSecurityContext.enabled Enabled Airflow worker pods' Security Context ## @param worker.podSecurityContext.fsGroup Set Airflow worker pod's Security Context fsGroup ## podSecurityContext: enabled: true fsGroup: 1001 ## Configure Airflow worker containers (only main one) Security Context ## ref: https://kubernetes.io/docs/tasks/configure-pod-container/security-context/#set-the-security-context-for-a-container ## @param worker.containerSecurityContext.enabled Enabled Airflow worker containers' Security Context ## @param worker.containerSecurityContext.runAsUser Set Airflow worker containers' Security Context runAsUser ## @param worker.containerSecurityContext.runAsNonRoot Set Airflow worker containers' Security Context runAsNonRoot ## containerSecurityContext: enabled: true runAsUser: 1001 runAsNonRoot: true ## @param worker.lifecycleHooks for the Airflow worker container(s) to automate configuration before or after startup ## lifecycleHooks: {} ## @param worker.hostAliases Deployment pod host aliases ## https://kubernetes.io/docs/concepts/services-networking/add-entries-to-pod-etc-hosts-with-host-aliases/ ## hostAliases: [] ## @param worker.podLabels Add extra labels to the Airflow worker pods ## podLabels: {} ## @param worker.podAnnotations Add extra annotations to the Airflow worker pods ## podAnnotations: {} ## @param worker.affinity Affinity for Airflow worker pods assignment (evaluated as a template) ## Ref: https://kubernetes.io/docs/concepts/configuration/assign-pod-node/#affinity-and-anti-affinity ## Note: `worker.podAffinityPreset`, `worker.podAntiAffinityPreset`, and `worker.nodeAffinityPreset` will be ignored when it's set ## affinity: {} ## Node affinity preset ## Ref: https://kubernetes.io/docs/concepts/scheduling-eviction/assign-pod-node/#node-affinity ## @param worker.nodeAffinityPreset.key Node label key to match. Ignored if `worker.affinity` is set. ## @param worker.nodeAffinityPreset.type Node affinity preset type. Ignored if `worker.affinity` is set. Allowed values: `soft` or `hard` ## @param worker.nodeAffinityPreset.values Node label values to match. Ignored if `worker.affinity` is set. ## nodeAffinityPreset: ## e.g: ## key: "kubernetes.io/e2e-az-name" ## key: "" type: "" ## e.g: ## values: ## - e2e-az1 ## - e2e-az2 ## values: [] ## @param worker.nodeSelector Node labels for Airflow worker pods assignment ## Ref: https://kubernetes.io/docs/user-guide/node-selection/ ## nodeSelector: {} ## @param worker.podAffinityPreset Pod affinity preset. Ignored if `worker.affinity` is set. Allowed values: `soft` or `hard`. ## ref: https://kubernetes.io/docs/concepts/scheduling-eviction/assign-pod-node/#inter-pod-affinity-and-anti-affinity ## podAffinityPreset: "" ## @param worker.podAntiAffinityPreset Pod anti-affinity preset. Ignored if `worker.affinity` is set. Allowed values: `soft` or `hard`. ## Ref: https://kubernetes.io/docs/concepts/scheduling-eviction/assign-pod-node/#inter-pod-affinity-and-anti-affinity ## podAntiAffinityPreset: soft ## @param worker.tolerations Tolerations for Airflow worker pods assignment ## Ref: https://kubernetes.io/docs/concepts/configuration/taint-and-toleration/ ## tolerations: [] ## @param worker.topologySpreadConstraints Topology Spread Constraints for pod assignment spread across your cluster among failure-domains. Evaluated as a template ## Ref: https://kubernetes.io/docs/concepts/workloads/pods/pod-topology-spread-constraints/#spread-constraints-for-pods ## topologySpreadConstraints: {} ## @param worker.priorityClassName Priority Class Name ## ref: https://kubernetes.io/docs/concepts/configuration/pod-priority-preemption/#priorityclass ## priorityClassName: "" ## @param worker.schedulerName Use an alternate scheduler, e.g. "stork". ## ref: https://kubernetes.io/docs/tasks/administer-cluster/configure-multiple-schedulers/ ## schedulerName: "" ## @param worker.terminationGracePeriodSeconds Seconds Airflow worker pod needs to terminate gracefully ## ref: https://kubernetes.io/docs/concepts/workloads/pods/pod/#termination-of-pods ## terminationGracePeriodSeconds: "" ## @param worker.updateStrategy.type Airflow worker deployment strategy type ## @param worker.updateStrategy.rollingUpdate Airflow worker deployment rolling update configuration parameters ## ref: https://kubernetes.io/docs/concepts/workloads/controllers/deployment/#strategy ## updateStrategy: type: RollingUpdate rollingUpdate: {} ## @param worker.sidecars Add additional sidecar containers to the Airflow worker pods ## Example: ## sidecars: ## - name: your-image-name ## image: your-image ## imagePullPolicy: Always ## ports: ## - name: portname ## containerPort: 1234 ## sidecars: [] ## @param worker.initContainers Add additional init containers to the Airflow worker pods ## Example: ## initContainers: ## - name: your-image-name ## image: your-image ## imagePullPolicy: Always ## ports: ## - name: portname ## containerPort: 1234 ## initContainers: [] ## @param worker.extraVolumeMounts Optionally specify extra list of additional volumeMounts for the Airflow worker pods ## extraVolumeMounts: [] ## @param worker.extraVolumes Optionally specify extra list of additional volumes for the Airflow worker pods ## extraVolumes: [] ## @param worker.extraVolumeClaimTemplates Optionally specify extra list of volumesClaimTemplates for the Airflow worker statefulset ## extraVolumeClaimTemplates: [] ## @param worker.podTemplate Template to replace the default one to be use when `executor=KubernetesExecutor` to create Airflow worker pods ## podTemplate: {} ## Airflow worker Pod Disruption Budget ## ref: https://kubernetes.io/docs/concepts/workloads/pods/disruptions/ ## @param worker.pdb.create Deploy a pdb object for the Airflow worker pods ## @param worker.pdb.minAvailable Maximum number/percentage of unavailable Airflow worker replicas ## @param worker.pdb.maxUnavailable Maximum number/percentage of unavailable Airflow worker replicas ## pdb: create: false minAvailable: 1 maxUnavailable: "" ## Enable HorizontalPodAutoscaler for worker pods ## ref: https://kubernetes.io/docs/tasks/run-application/horizontal-pod-autoscale/ ## @param worker.autoscaling.enabled Whether enable horizontal pod autoscaler ## @param worker.autoscaling.minReplicas Configure a minimum amount of pods ## @param worker.autoscaling.maxReplicas Configure a maximum amount of pods ## @param worker.autoscaling.targetCPU Define the CPU target to trigger the scaling actions (utilization percentage) ## @param worker.autoscaling.targetMemory Define the memory target to trigger the scaling actions (utilization percentage) ## autoscaling: enabled: false minReplicas: 1 maxReplicas: 3 targetCPU: 80 targetMemory: 80 ## @section Airflow git sync parameters ## Configure Git to pull dags and plugins ## git: ## Bitnami Git image version ## ref: https://hub.docker.com/r/bitnami/git/tags/ ## @param git.image.registry Git image registry ## @param git.image.repository Git image repository ## @param git.image.tag Git image tag (immutable tags are recommended) ## @param git.image.pullPolicy Git image pull policy ## @param git.image.pullSecrets Git image pull secrets ## image: registry: docker.io repository: bitnami/git tag: 2.35.1-debian-10-r46 ## Specify a imagePullPolicy ## Defaults to 'Always' if image tag is 'latest', else set to 'IfNotPresent' ## ref: https://kubernetes.io/docs/user-guide/images/#pre-pulling-images ## pullPolicy: IfNotPresent ## Optionally specify an array of imagePullSecrets. ## Secrets must be manually created in the namespace. ## ref: https://kubernetes.io/docs/tasks/configure-pod-container/pull-image-private-registry/ ## e.g: ## pullSecrets: ## - myRegistryKeySecretName ## pullSecrets: [] ## Get DAG files from git repositories ## @param git.dags.enabled Enable in order to download DAG files from git repositories. ## @param git.dags.repositories [array] Array of repositories from which to download DAG files ## dags: enabled: false ## Name for repositories can be anything unique and must follow same naming conventions as kubernetes. ## Kubernetes resources can have names up to 253 characters long. The characters allowed in names are: ## digits (0-9), lower case letters (a-z), -, and . ## Example: ## - repository: https://github.com/myuser/myrepo ## branch: main ## name: my-dags ## path: / ## repositories: - repository: "" ## Branch from repository to checkout ## branch: "" ## An unique identifier for repository, must be unique for each repository ## name: "" ## Path to a folder in the repository containing the dags ## path: "" ## Get Plugins files from git repositories. ## @param git.plugins.enabled Enable in order to download Plugins files from git repositories. ## @param git.plugins.repositories [array] Array of repositories from which to download DAG files ## plugins: enabled: false repositories: - repository: "" ## Branch from repository to checkout ## branch: "" ## An unique identifier for repository, must be unique for each repository ## name: "" ## Path to a folder in the repository containing the plugins ## path: "" ## Properties for the Clone init container ## @param git.clone.command Override cmd ## @param git.clone.args Override args ## @param git.clone.extraVolumeMounts Add extra volume mounts ## @param git.clone.extraEnvVars Add extra environment variables ## @param git.clone.extraEnvVarsCM ConfigMap with extra environment variables ## @param git.clone.extraEnvVarsSecret Secret with extra environment variables ## @param git.clone.resources Clone init container resource requests and limits ## clone: command: [] args: [] extraVolumeMounts: [] extraEnvVars: [] extraEnvVarsCM: "" extraEnvVarsSecret: "" ## Clone init container resource requests and limits ## ref: https://kubernetes.io/docs/user-guide/compute-resources/ ## resources: {} ## Properties for the Sync sidecar container ## @param git.sync.interval Interval in seconds to pull the git repository containing the plugins and/or DAG files ## @param git.sync.command Override cmd ## @param git.sync.args Override args ## @param git.sync.extraVolumeMounts Add extra volume mounts ## @param git.sync.extraEnvVars Add extra environment variables ## @param git.sync.extraEnvVarsCM ConfigMap with extra environment variables ## @param git.sync.extraEnvVarsSecret Secret with extra environment variables ## @param git.sync.resources Sync sidecar container resource requests and limits ## sync: interval: 60 command: [] args: [] extraVolumeMounts: [] extraEnvVars: [] extraEnvVarsCM: "" extraEnvVarsSecret: "" ## Sync sidecar container resource requests and limits ## ref: https://kubernetes.io/docs/user-guide/compute-resources/ ## resources: {} ## @section Airflow ldap parameters ## LDAP configuration ## @param ldap.enabled Enable LDAP authentication ## @param ldap.uri Server URI, eg. ldap://ldap_server:389 ## @param ldap.base Base of the search, eg. ou=example,o=org ## @param ldap.uidField if doing an indirect bind to ldap, this is the field that matches the username when searching for the account to bind to ## @param ldap.binddn Bind DN ## @param ldap.bindpw Bind Password ## @param ldap.userRegistration Set to True to enable user self registration ## @param ldap.userRegistrationRole Set role name to be assign when a user registers himself. This role must already exist. Mandatory when using ldap.userRegistration ## @param ldap.rolesMapping mapping from LDAP DN to a list of roles ## @param ldap.rolesSyncAtLogin replace ALL the user's roles each login, or only on registration ## @para ## ldap: enabled: false uri: 'ldap://ldap_server:389' base: 'dc=example,dc=org' uidField: 'cn' binddn: 'cn=admin,dc=example,dc=org' bindpw: '' userRegistration: 'True' userRegistrationRole: 'Public' rolesMapping: '{ "cn=All,ou=Groups,dc=example,dc=org": ["User"], "cn=Admins,ou=Groups,dc=example,dc=org": ["Admin"], }' rolesSyncAtLogin: 'True' ## SSL/TLS parameters for LDAP ## @param ldap.tls.enabled Enabled TLS/SSL for LDAP, you must include the CA file. ## @param ldap.tls.allowSelfSigned Allow to use self signed certificates ## @param ldap.tls.CAcertificateSecret Name of the existing secret containing the certificate CA file that will be used by ldap client. ## @param ldap.tls.CAcertificateFilename LDAP CA cert filename ## tls: enabled: false allowSelfSigned: true ## Cloud be create with: kubectl create secret generic airflow-secret --from-file=./ca.pem ## CAcertificateSecret: "" ## Example: ## CAcertificateFilename: 'ca.pem' ## CAcertificateFilename: "" ## @section Traffic Exposure Parameters ## Airflow service parameters ## service: ## @param service.type Airflow service type ## type: ClusterIP ## @param service.ports.http Airflow service HTTP port ## ports: http: 8080 ## Node ports to expose ## @param service.nodePorts.http Node port for HTTP ## NOTE: choose port between <30000-32767> ## nodePorts: http: "" ## @param service.sessionAffinity Control where client requests go, to the same pod or round-robin ## Values: ClientIP or None ## ref: https://kubernetes.io/docs/user-guide/services/ ## sessionAffinity: None ## @param service.clusterIP Airflow service Cluster IP ## e.g.: ## clusterIP: None ## clusterIP: "" ## @param service.loadBalancerIP Airflow service Load Balancer IP ## ref: https://kubernetes.io/docs/concepts/services-networking/service/#type-loadbalancer ## loadBalancerIP: "" ## @param service.loadBalancerSourceRanges Airflow service Load Balancer sources ## ref: https://kubernetes.io/docs/tasks/access-application-cluster/configure-cloud-provider-firewall/#restrict-access-for-loadbalancer-service ## e.g: ## loadBalancerSourceRanges: ## - 10.10.10.0/24 ## loadBalancerSourceRanges: [] ## @param service.externalTrafficPolicy Airflow service external traffic policy ## ref https://kubernetes.io/docs/tasks/access-application-cluster/create-external-load-balancer/#preserving-the-client-source-ip ## externalTrafficPolicy: Cluster ## @param service.annotations Additional custom annotations for Airflow service ## annotations: {} ## @param service.extraPorts Extra port to expose on Airflow service ## extraPorts: [] ## Airflow ingress parameters ## ref: https://kubernetes.io/docs/user-guide/ingress/ ## ingress: ## @param ingress.enabled Enable ingress record generation for Airflow ## enabled: false ## @param ingress.ingressClassName IngressClass that will be be used to implement the Ingress (Kubernetes 1.18+) ## This is supported in Kubernetes 1.18+ and required if you have more than one IngressClass marked as the default for your cluster . ## ref: https://kubernetes.io/blog/2020/04/02/improvements-to-the-ingress-api-in-kubernetes-1.18/ ## ingressClassName: "" ## @param ingress.pathType Ingress path type ## pathType: ImplementationSpecific ## @param ingress.apiVersion Force Ingress API version (automatically detected if not set) ## apiVersion: "" ## @param ingress.hostname Default host for the ingress record ## hostname: airflow.local ## @param ingress.path Default path for the ingress record ## NOTE: You may need to set this to '/*' in order to use this with ALB ingress controllers ## path: / ## @param ingress.annotations [object] Additional annotations for the Ingress resource. To enable certificate autogeneration, place here your cert-manager annotations. ## Use this parameter to set the required annotations for cert-manager, see ## ref: https://cert-manager.io/docs/usage/ingress/#supported-annotations ## e.g: ## annotations: ## kubernetes.io/ingress.class: nginx ## cert-manager.io/cluster-issuer: cluster-issuer-name ## annotations: {} ## @param ingress.tls Enable TLS configuration for the host defined at `ingress.hostname` parameter ## TLS certificates will be retrieved from a TLS secret with name: `{{- printf "%s-tls" .Values.ingress.hostname }}` ## You can: ## - Use the `ingress.secrets` parameter to create this TLS secret ## - Relay on cert-manager to create it by setting the corresponding annotations ## - Relay on Helm to create self-signed certificates by setting `ingress.selfSigned=true` ## tls: false ## @param ingress.selfSigned Create a TLS secret for this ingress record using self-signed certificates generated by Helm ## selfSigned: false ## @param ingress.extraHosts An array with additional hostname(s) to be covered with the ingress record ## e.g: ## extraHosts: ## - name: airflow.local ## path: / ## extraHosts: [] ## @param ingress.extraPaths An array with additional arbitrary paths that may need to be added to the ingress under the main host ## e.g: ## extraPaths: ## - path: /* ## backend: ## serviceName: ssl-redirect ## servicePort: use-annotation ## extraPaths: [] ## @param ingress.extraTls TLS configuration for additional hostname(s) to be covered with this ingress record ## ref: https://kubernetes.io/docs/concepts/services-networking/ingress/#tls ## e.g: ## extraTls: ## - hosts: ## - airflow.local ## secretName: airflow.local-tls ## extraTls: [] ## @param ingress.secrets Custom TLS certificates as secrets ## NOTE: 'key' and 'certificate' are expected in PEM format ## NOTE: 'name' should line up with a 'secretName' set further up ## If it is not set and you're using cert-manager, this is unneeded, as it will create a secret for you with valid certificates ## If it is not set and you're NOT using cert-manager either, self-signed certificates will be created valid for 365 days ## It is also possible to create and manage the certificates outside of this helm chart ## Please see README.md for more information ## e.g: ## secrets: ## - name: airflow.local-tls ## key: |- ## -----BEGIN RSA PRIVATE KEY----- ## ... ## -----END RSA PRIVATE KEY----- ## certificate: |- ## -----BEGIN CERTIFICATE----- ## ... ## -----END CERTIFICATE----- ## secrets: [] ## @section Other Parameters ## Service account for Airflow pods to use. ## ref: https://kubernetes.io/docs/tasks/configure-pod-container/configure-service-account/ ## serviceAccount: ## @param serviceAccount.create Enable creation of ServiceAccount for Airflow pods ## create: false ## @param serviceAccount.name The name of the ServiceAccount to use. ## If not set and create is true, a name is generated using the common.names.fullname template ## name: "" ## @param serviceAccount.automountServiceAccountToken Allows auto mount of ServiceAccountToken on the serviceAccount created ## Can be set to false if pods using this serviceAccount do not need to use K8s API ## automountServiceAccountToken: true ## @param serviceAccount.annotations Additional custom annotations for the ServiceAccount ## annotations: {} ## Role Based Access ## Ref: https://kubernetes.io/docs/admin/authorization/rbac/ ## @param rbac.create Create Role and RoleBinding ## rbac: create: false ## @param rbac.rules Custom RBAC rules to set ## e.g: ## rules: ## - apiGroups: ## - "" ## resources: ## - pods ## verbs: ## - get ## - list ## rules: [] ## @section Airflow metrics parameters metrics: ## @param metrics.enabled Whether or not to create a standalone Airflow exporter to expose Airflow metrics ## enabled: false ## Bitnami Airflow exporter image ## ref: https://hub.docker.com/r/bitnami/airflow-exporter/tags/ ## @param metrics.image.registry Airflow exporter image registry ## @param metrics.image.repository Airflow exporter image repository ## @param metrics.image.tag Airflow exporter image tag (immutable tags are recommended) ## @param metrics.image.pullPolicy Airflow exporter image pull policy ## @param metrics.image.pullSecrets Airflow exporter image pull secrets ## image: registry: docker.io repository: bitnami/airflow-exporter tag: 0.20220314.0-debian-10-r1 pullPolicy: IfNotPresent ## Optionally specify an array of imagePullSecrets. ## Secrets must be manually created in the namespace. ## ref: https://kubernetes.io/docs/tasks/configure-pod-container/pull-image-private-registry/ ## e.g: ## pullSecrets: ## - myRegistryKeySecretName ## pullSecrets: [] ## @param metrics.extraEnvVars Array with extra environment variables to add Airflow exporter pods ## extraEnvVars: [] ## @param metrics.extraEnvVarsCM ConfigMap containing extra environment variables for Airflow exporter pods ## extraEnvVarsCM: "" ## @param metrics.extraEnvVarsSecret Secret containing extra environment variables (in case of sensitive data) for Airflow exporter pods ## extraEnvVarsSecret: "" ## @param metrics.containerPorts.http Airflow exporter metrics container port ## containerPorts: http: 9112 ## Airflow exporter resource requests and limits ## ref: https://kubernetes.io/docs/user-guide/compute-resources/ ## @param metrics.resources.limits The resources limits for the container ## @param metrics.resources.requests The requested resources for the container ## resources: limits: {} requests: {} ## Airflow exporter pods' Security Context ## ref: https://kubernetes.io/docs/tasks/configure-pod-container/security-context/#set-the-security-context-for-a-pod ## @param metrics.podSecurityContext.enabled Enable security context for the pods ## @param metrics.podSecurityContext.fsGroup Set Airflow exporter pod's Security Context fsGroup ## podSecurityContext: enabled: true fsGroup: 1001 ## Airflow exporter containers' Security Context ## ref: https://kubernetes.io/docs/tasks/configure-pod-container/security-context/#set-the-security-context-for-a-container ## @param metrics.containerSecurityContext.enabled Enable Airflow exporter containers' Security Context ## @param metrics.containerSecurityContext.runAsUser Set Airflow exporter containers' Security Context runAsUser ## @param metrics.containerSecurityContext.runAsNonRoot Set Airflow exporter containers' Security Context runAsNonRoot ## e.g: ## containerSecurityContext: ## enabled: true ## capabilities: ## drop: ["NET_RAW"] ## readOnlyRootFilesystem: true ## containerSecurityContext: enabled: true runAsUser: 1001 runAsNonRoot: true ## @param metrics.lifecycleHooks for the Airflow exporter container(s) to automate configuration before or after startup ## lifecycleHooks: {} ## @param metrics.hostAliases Airflow exporter pods host aliases ## https://kubernetes.io/docs/concepts/services-networking/add-entries-to-pod-etc-hosts-with-host-aliases/ ## hostAliases: [] ## @param metrics.podLabels Extra labels for Airflow exporter pods ## Ref: https://kubernetes.io/docs/concepts/overview/working-with-objects/labels/ ## podLabels: {} ## @param metrics.podAnnotations Extra annotations for Airflow exporter pods ## ref: https://kubernetes.io/docs/concepts/overview/working-with-objects/annotations/ ## podAnnotations: {} ## @param metrics.podAffinityPreset Pod affinity preset. Ignored if `metrics.affinity` is set. Allowed values: `soft` or `hard` ## ref: https://kubernetes.io/docs/concepts/scheduling-eviction/assign-pod-node/#inter-pod-affinity-and-anti-affinity ## podAffinityPreset: "" ## @param metrics.podAntiAffinityPreset Pod anti-affinity preset. Ignored if `metrics.affinity` is set. Allowed values: `soft` or `hard` ## Ref: https://kubernetes.io/docs/concepts/scheduling-eviction/assign-pod-node/#inter-pod-affinity-and-anti-affinity ## podAntiAffinityPreset: soft ## Node metrics.affinity preset ## Ref: https://kubernetes.io/docs/concepts/scheduling-eviction/assign-pod-node/#node-affinity ## nodeAffinityPreset: ## @param metrics.nodeAffinityPreset.type Node affinity preset type. Ignored if `metrics.affinity` is set. Allowed values: `soft` or `hard` ## type: "" ## @param metrics.nodeAffinityPreset.key Node label key to match Ignored if `metrics.affinity` is set. ## E.g. ## key: "kubernetes.io/e2e-az-name" ## key: "" ## @param metrics.nodeAffinityPreset.values Node label values to match. Ignored if `metrics.affinity` is set. ## E.g. ## values: ## - e2e-az1 ## - e2e-az2 ## values: [] ## @param metrics.affinity Affinity for pod assignment ## Ref: https://kubernetes.io/docs/concepts/configuration/assign-pod-node/#affinity-and-anti-affinity ## Note: metrics.podAffinityPreset, metrics.podAntiAffinityPreset, and metrics.nodeAffinityPreset will be ignored when it's set ## affinity: {} ## @param metrics.nodeSelector Node labels for pod assignment ## Ref: https://kubernetes.io/docs/user-guide/node-selection/ ## nodeSelector: {} ## @param metrics.tolerations Tolerations for pod assignment ## Ref: https://kubernetes.io/docs/concepts/configuration/taint-and-toleration/ ## tolerations: [] ## @param metrics.schedulerName Name of the k8s scheduler (other than default) for Airflow exporter ## ref: https://kubernetes.io/docs/tasks/administer-cluster/configure-multiple-schedulers/ ## schedulerName: "" ## Airflow exporter service configuration ## service: ## @param metrics.service.ports.http Airflow exporter metrics service port ## ports: http: 9112 ## @param metrics.service.clusterIP Static clusterIP or None for headless services ## ref: https://kubernetes.io/docs/concepts/services-networking/service/#choosing-your-own-ip-address ## clusterIP: "" ## @param metrics.service.sessionAffinity Control where client requests go, to the same pod or round-robin ## Values: ClientIP or None ## ref: https://kubernetes.io/docs/user-guide/services/ ## sessionAffinity: None ## @param metrics.service.annotations [object] Annotations for the Airflow exporter service ## annotations: prometheus.io/scrape: "true" prometheus.io/port: "{{ .Values.metrics.service.ports.http }}" ## Prometheus Operator ServiceMonitor configuration ## serviceMonitor: ## @param metrics.serviceMonitor.enabled if `true`, creates a Prometheus Operator ServiceMonitor (requires `metrics.enabled` to be `true`) ## enabled: false ## @param metrics.serviceMonitor.namespace Namespace in which Prometheus is running ## namespace: "" ## @param metrics.serviceMonitor.interval Interval at which metrics should be scraped ## ref: https://github.com/coreos/prometheus-operator/blob/master/Documentation/api.md#endpoint ## interval: "" ## @param metrics.serviceMonitor.scrapeTimeout Timeout after which the scrape is ended ## ref: https://github.com/coreos/prometheus-operator/blob/master/Documentation/api.md#endpoint ## scrapeTimeout: "" ## @param metrics.serviceMonitor.labels Additional labels that can be used so ServiceMonitor will be discovered by Prometheus ## labels: {} ## @param metrics.serviceMonitor.selector Prometheus instance selector labels ## ref: https://github.com/bitnami/charts/tree/master/bitnami/prometheus-operator#prometheus-configuration ## selector: {} ## @param metrics.serviceMonitor.relabelings RelabelConfigs to apply to samples before scraping ## relabelings: [] ## @param metrics.serviceMonitor.metricRelabelings MetricRelabelConfigs to apply to samples before ingestion ## metricRelabelings: [] ## @param metrics.serviceMonitor.honorLabels Specify honorLabels parameter to add the scrape endpoint ## honorLabels: false ## @param metrics.serviceMonitor.jobLabel The name of the label on the target service to use as the job name in prometheus. ## jobLabel: "" ## @section Airflow database parameters ## PostgreSQL chart configuration ## ref: https://github.com/bitnami/charts/blob/master/bitnami/postgresql/values.yaml ## @param postgresql.enabled Switch to enable or disable the PostgreSQL helm chart ## @param postgresql.auth.enablePostgresUser Assign a password to the "postgres" admin user. Otherwise, remote access will be blocked for this user ## @param postgresql.auth.username Name for a custom user to create ## @param postgresql.auth.password Password for the custom user to create ## @param postgresql.auth.database Name for a custom database to create ## @param postgresql.auth.existingSecret Name of existing secret to use for PostgreSQL credentials ## @param postgresql.architecture PostgreSQL architecture (`standalone` or `replication`) ## postgresql: enabled: true auth: enablePostgresUser: false username: bn_airflow password: "" database: bitnami_airflow existingSecret: "" architecture: standalone ## External PostgreSQL configuration ## All of these values are only used when postgresql.enabled is set to false ## @param externalDatabase.host Database host ## @param externalDatabase.port Database port number ## @param externalDatabase.user Non-root username for Airflow ## @param externalDatabase.password Password for the non-root username for Airflow ## @param externalDatabase.database Airflow database name ## @param externalDatabase.existingSecret Name of an existing secret resource containing the database credentials ## @param externalDatabase.existingSecretPasswordKey Name of an existing secret key containing the database credentials ## externalDatabase: host: localhost port: 5432 user: bn_airflow database: bitnami_airflow password: "" existingSecret: "" existingSecretPasswordKey: "" ## Redis&trade; chart configuration ## ref: https://github.com/bitnami/charts/blob/master/bitnami/redis/values.yaml ## @param redis.enabled Switch to enable or disable the Redis&trade; helm ## @param redis.auth.enabled Enable password authentication ## @param redis.auth.password Redis&trade; password ## @param redis.auth.existingSecret The name of an existing secret with Redis&trade; credentials ## @param redis.architecture Redis&trade; architecture. Allowed values: `standalone` or `replication` ## redis: enabled: true auth: enabled: true ## Redis&trade; password (both master and slave). Defaults to a random 10-character alphanumeric string if not set and auth.enabled is true. ## It should always be set using the password value or in the existingSecret to avoid issues ## with Airflow. ## The password value is ignored if existingSecret is set password: "" existingSecret: "" architecture: standalone ## External Redis&trade; configuration ## All of these values are only used when redis.enabled is set to false ## @param externalRedis.host Redis&trade; host ## @param externalRedis.port Redis&trade; port number ## @param externalRedis.username Redis&trade; username ## @param externalRedis.password Redis&trade; password ## @param externalRedis.existingSecret Name of an existing secret resource containing the Redis&trade credentials ## @param externalRedis.existingSecretPasswordKey Name of an existing secret key containing the Redis&trade credentials ## externalRedis: host: localhost port: 6379 ## Most Redis&trade; implementations do not require a username ## to authenticate and it should be enough with the password username: "" password: "" existingSecret: "" existingSecretPasswordKey: ""
43.014423
169
0.734165
ca15240b544af7145154ad6d43b1aa95c83d5ea6
26,547
yaml
YAML
bitnami/ejbca/values.yaml
00arthur00/charts
502aa1e64541669b732a4eda896e5937847b6c3c
[ "Apache-2.0" ]
null
null
null
bitnami/ejbca/values.yaml
00arthur00/charts
502aa1e64541669b732a4eda896e5937847b6c3c
[ "Apache-2.0" ]
2
2022-01-26T01:14:30.000Z
2022-01-26T07:03:39.000Z
bitnami/ejbca/values.yaml
00arthur00/charts
502aa1e64541669b732a4eda896e5937847b6c3c
[ "Apache-2.0" ]
null
null
null
## @section Global parameters ## Global Docker image parameters ## Please, note that this will override the image parameters, including dependencies, configured to use the global value ## Current available global Docker image parameters: imageRegistry, imagePullSecrets and storageClass ## @param global.imageRegistry Global Docker image registry ## @param global.imagePullSecrets Global Docker registry secret names as an array ## @param global.storageClass Global StorageClass for Persistent Volume(s) ## global: imageRegistry: "" ## E.g. ## imagePullSecrets: ## - myRegistryKeySecretName ## imagePullSecrets: [] storageClass: "" ## @section Common parameters ## @param kubeVersion Force target Kubernetes version (using Helm capabilities if not set) ## kubeVersion: "" ## @param nameOverride String to partially override ebjca.fullname template (will maintain the release name) ## nameOverride: "" ## @param fullnameOverride String to fully override ebjca.fullname template ## fullnameOverride: "" ## @param commonLabels Add labels to all the deployed resources ## commonLabels: {} ## @param commonAnnotations Annotations to be added to all deployed resources ## commonAnnotations: {} ## @param extraDeploy Array of extra objects to deploy with the release ## extraDeploy: [] ## Enable diagnostic mode in the deployment ## diagnosticMode: ## @param diagnosticMode.enabled Enable diagnostic mode (all probes will be disabled and the command will be overridden) ## enabled: false ## @param diagnosticMode.command Command to override all containers in the deployment ## command: - sleep ## @param diagnosticMode.args Args to override all containers in the deployment ## args: - infinity ## @section EJBCA parameters ## Bitnami EJBCA image version ## ref: https://hub.docker.com/r/bitnami/ejbca/tags/ ## @param image.registry EJBCA image registry ## @param image.repository EJBCA image name ## @param image.tag EJBCA image tag ## @param image.pullPolicy EJBCA image pull policy ## @param image.pullSecrets Specify docker-registry secret names as an array ## @param image.debug Enable image debug mode ## image: registry: docker.io repository: bitnami/ejbca tag: 7.4.3-2-debian-10-r111 ## Specify a imagePullPolicy ## Defaults to 'Always' if image tag is 'latest', else set to 'IfNotPresent' ## ref: https://kubernetes.io/docs/user-guide/images/#pre-pulling-images ## pullPolicy: IfNotPresent ## Optionally specify an array of imagePullSecrets. ## Secrets must be manually created in the namespace. ## ref: https://kubernetes.io/docs/tasks/configure-pod-container/pull-image-private-registry/ ## e.g: ## pullSecrets: ## - myRegistryKeySecretName ## pullSecrets: [] ## Enable debug mode ## debug: false ## @param replicaCount Number of EJBCA replicas to deploy ## replicaCount: 1 ## @param extraVolumeMounts Additional volume mounts (used along with `extraVolumes`) ## Example: Mount CA file ## extraVolumeMounts ## - name: ca-cert ## subPath: ca_cert ## mountPath: /path/to/ca_cert ## extraVolumeMounts: [] ## @param extraVolumes Array of extra volumes to be added deployment. Requires setting `extraVolumeMounts` ## Example: Add secret volume ## extraVolumes: ## - name: ca-cert ## secret: ## secretName: ca-cert ## items: ## - key: ca-cert ## path: ca_cert ## extraVolumes: [] ## @param podAnnotations Additional pod annotations ## ref: https://kubernetes.io/docs/concepts/overview/working-with-objects/annotations/ ## podAnnotations: {} ## @param podLabels Additional pod labels ## ref: https://kubernetes.io/docs/concepts/overview/working-with-objects/labels/ ## podLabels: {} ## K8s Security Context for EJBCA pods ## https://kubernetes.io/docs/tasks/configure-pod-container/security-context/ ## @param podSecurityContext.enabled Enable security context for EJBCA container ## @param podSecurityContext.fsGroup Group ID for the volumes of the pod ## podSecurityContext: enabled: true fsGroup: 1001 ## @param podAffinityPreset Pod affinity preset. Ignored if `affinity` is set. Allowed values: `soft` or `hard` ## ref: https://kubernetes.io/docs/concepts/scheduling-eviction/assign-pod-node/#inter-pod-affinity-and-anti-affinity ## Allowed values: soft, hard ## podAffinityPreset: "" ## @param podAntiAffinityPreset Pod anti-affinity preset. Ignored if `affinity` is set. Allowed values: `soft` or `hard` ## Ref: https://kubernetes.io/docs/concepts/scheduling-eviction/assign-pod-node/#inter-pod-affinity-and-anti-affinity ## Allowed values: soft, hard ## podAntiAffinityPreset: soft ## Node affinity preset ## Ref: https://kubernetes.io/docs/concepts/scheduling-eviction/assign-pod-node/#node-affinity ## @param nodeAffinityPreset.type Node affinity preset type. Ignored if `affinity` is set. Allowed values: `soft` or `hard` ## @param nodeAffinityPreset.key Node label key to match Ignored if `affinity` is set. ## @param nodeAffinityPreset.values Node label values to match. Ignored if `affinity` is set. ## nodeAffinityPreset: type: "" ## E.g. ## key: "kubernetes.io/e2e-az-name" ## key: "" ## E.g. ## values: ## - e2e-az1 ## - e2e-az2 ## values: [] ## @param affinity Affinity for pod assignment ## Ref: https://kubernetes.io/docs/concepts/configuration/assign-pod-node/#affinity-and-anti-affinity ## Note: podAffinityPreset, podAntiAffinityPreset, and nodeAffinityPreset will be ignored when it's set ## affinity: {} ## @param nodeSelector Node labels for pod assignment ## Ref: https://kubernetes.io/docs/user-guide/node-selection/ ## nodeSelector: {} ## @param tolerations Tolerations for pod assignment ## Ref: https://kubernetes.io/docs/concepts/configuration/taint-and-toleration/ ## tolerations: [] ## @param updateStrategy.type EJBCA deployment strategy type. ## ref: https://kubernetes.io/docs/concepts/workloads/controllers/deployment/#strategy ## e.g: ## updateStrategy: ## type: RollingUpdate ## rollingUpdate: ## maxSurge: 25% ## maxUnavailable: 25% ## updateStrategy: type: RollingUpdate ## Enable persistence using Persistent Volume Claims ## ref: https://kubernetes.io/docs/user-guide/persistent-volumes/ ## @param persistence.enabled Whether to enable persistence based on Persistent Volume Claims ## @param persistence.accessModes [array] Persistent Volume access modes ## @param persistence.size Size of the PVC to request ## @param persistence.storageClass PVC Storage Class ## @param persistence.existingClaim Name of an existing PVC to reuse ## @param persistence.annotations Persistent Volume Claim annotations ## persistence: enabled: true ## EJBCA data Persistent Volume Storage Class ## If defined, storageClassName: <storageClass> ## If set to "-", storageClassName: "", which disables dynamic provisioning ## If undefined (the default) or set to null, no storageClassName spec is ## set, choosing the default provisioner. (gp2 on AWS, standard on ## GKE, AWS & OpenStack) ## storageClass: "" ## If you want to reuse an existing claim, you can pass the name of the PVC using the existingClaim variable ## e.g: ## existingClaim: your-claim ## existingClaim: "" accessModes: - ReadWriteOnce size: 2Gi annotations: {} ## @param sidecars Attach additional sidecar containers to the pod ## Example: ## sidecars: ## - name: your-image-name ## image: your-image ## imagePullPolicy: Always ## ports: ## - name: portname ## containerPort: 1234 ## sidecars: [] ## @param initContainers Additional init containers to add to the pods ## ref: https://kubernetes.io/docs/concepts/workloads/pods/init-containers/ ## Example: ## initContainers: ## - name: your-image-name ## image: your-image ## imagePullPolicy: Always ## initContainers: [] ## @param hostAliases Add deployment host aliases ## https://kubernetes.io/docs/concepts/services-networking/add-entries-to-pod-etc-hosts-with-host-aliases/ ## hostAliases: [] ## @param priorityClassName EJBCA pods' priorityClassName ## ref: https://kubernetes.io/docs/concepts/configuration/pod-priority-preemption/ ## priorityClassName: "" ## @param schedulerName Name of the k8s scheduler (other than default) ## ref: https://kubernetes.io/docs/tasks/administer-cluster/configure-multiple-schedulers/ ## schedulerName: "" ## @param topologySpreadConstraints Topology Spread Constraints for pod assignment ## https://kubernetes.io/docs/concepts/workloads/pods/pod-topology-spread-constraints/ ## The value is evaluated as a template ## topologySpreadConstraints: [] ## @param ejbcaAdminUsername EJBCA administrator username ## ref: https://github.com/bitnami/bitnami-docker-ejbca#environment-variables ## ejbcaAdminUsername: bitnami ## @param ejbcaAdminPassword Password for the administrator account ## If the password is not specified, a random one will be generated ## ejbcaAdminPassword: "" ## @param existingSecret Alternatively, you can provide the name of an existing secret containing ## a key named "ejbca-admin-password" ## NOTE: This will override the password defined at ejbcaAdminPassword ## existingSecret: "" ## @param ejbcaJavaOpts Options used to launch the WildFly server ## E.g. ejbcaJavaOpts: "-Xms2048m -Xmx2048m" ejbcaJavaOpts: "" ## Details regarding the CA that EJBCA will instantiate ## @param ejbcaCA.name Name of the CA EJBCA will instantiate by default ## @param ejbcaCA.baseDN Base DomainName of the CA EJBCA will instantiate by default ## ejbcaCA: name: "ManagementCA" ## e.g. baseDN: "O=Example CA,C=SE,UID=c-5ca04c9328c8208704310f7c2ed16414" ## baseDN: "" ## @param ejbcaKeystoreExistingSecret Name of an existing Secret containing a Keystore object ## to be imported by EBJCA. ## ## It should contain at the following two keys: ## ## "keystore.jks" --> The actual keystore object ## "keystore-password" --> Password used to encrypt keystore.jks ## ejbcaKeystoreExistingSecret: "" ## @param extraEnvVars Array with extra environment variables to add to EJBCA nodes ## e.g: ## extraEnvVars: ## - name: FOO ## value: "bar" ## extraEnvVars: [] ## @param extraEnvVarsCM Name of existing ConfigMap containing extra env vars for EJBCA nodes ## extraEnvVarsCM: "" ## @param extraEnvVarsSecret Name of existing Secret containing extra env vars for EJBCA nodes ## extraEnvVarsSecret: "" ## @param command Custom command to override image cmd ## command: [] ## @param args Custom args for the custom command ## args: [] ## @param lifecycleHooks for the EJBCA container(s) to automate configuration before or after startup ## lifecycleHooks: {} ## EJBCA containers' resource requests and limits ## ref: https://kubernetes.io/docs/user-guide/compute-resources/ ## @param resources.limits The resources limits for the container ## @param resources.requests [object] The requested resources for the container ## resources: limits: {} requests: memory: 512Mi cpu: 300m ## K8s Security Context for EJBCA container ## @param containerSecurityContext.enabled Enabled EJBCA containers' Security Context ## @param containerSecurityContext.runAsUser Set EJBCA containers' Security Context runAsUser ## @param containerSecurityContext.runAsNonRoot Set EJBCA container's Security Context runAsNonRoot ## containerSecurityContext: enabled: true runAsUser: 1001 runAsNonRoot: true ## EJBCA pod extra options for startup probe ## ref: https://kubernetes.io/docs/concepts/workloads/pods/pod-lifecycle/#container-probes ## @param startupProbe.enabled Enable/disable startupProbe ## @param startupProbe.initialDelaySeconds Delay before startup probe is initiated ## @param startupProbe.periodSeconds How often to perform the probe ## @param startupProbe.timeoutSeconds When the probe times out ## @param startupProbe.failureThreshold Minimum consecutive failures for the probe ## @param startupProbe.successThreshold Minimum consecutive successes for the probe ## startupProbe: enabled: false initialDelaySeconds: 500 periodSeconds: 10 timeoutSeconds: 5 failureThreshold: 6 successThreshold: 1 ## EJBCA pod extra options for liveness probe ## ref: https://kubernetes.io/docs/concepts/workloads/pods/pod-lifecycle/#container-probes ## @param livenessProbe.enabled Enable/disable livenessProbe ## @param livenessProbe.initialDelaySeconds Delay before liveness probe is initiated ## @param livenessProbe.periodSeconds How often to perform the probe ## @param livenessProbe.timeoutSeconds When the probe times out ## @param livenessProbe.failureThreshold Minimum consecutive failures for the probe ## @param livenessProbe.successThreshold Minimum consecutive successes for the probe ## livenessProbe: enabled: true initialDelaySeconds: 500 periodSeconds: 10 timeoutSeconds: 5 failureThreshold: 6 successThreshold: 1 ## EJBCA pod extra options for readiness probe ## ref: https://kubernetes.io/docs/concepts/workloads/pods/pod-lifecycle/#container-probes ## @param readinessProbe.enabled Enable/disable readinessProbe ## @param readinessProbe.initialDelaySeconds Delay before readiness probe is initiated ## @param readinessProbe.periodSeconds How often to perform the probe ## @param readinessProbe.timeoutSeconds When the probe times out ## @param readinessProbe.failureThreshold Minimum consecutive failures for the probe ## @param readinessProbe.successThreshold Minimum consecutive successes for the probe ## readinessProbe: enabled: true initialDelaySeconds: 500 periodSeconds: 10 timeoutSeconds: 5 failureThreshold: 6 successThreshold: 1 ## @param customStartupProbe Custom startup probe to execute (when the main one is disabled) ## customStartupProbe: {} ## @param customLivenessProbe Custom liveness probe to execute (when the main one is disabled) ## customLivenessProbe: {} ## @param customReadinessProbe Custom readiness probe to execute (when the main one is disabled) ## customReadinessProbe: {} ## @param containerPorts [object] EJBCA Container ports to open ## containerPorts: http: 8080 https: 8443 ## @section Service parameters ## Kubernetes configuration. For minikube, set this to NodePort, elsewhere use LoadBalancer or ClusterIP ## service: ## @param service.type Kubernetes Service type ## type: LoadBalancer ## @param service.ports.http Service HTTP port ## @param service.ports.https Service HTTPS port ## ports: http: 8080 https: 8443 ## @param service.advertisedHttpsPort Port number used in the rendered URLs for the admistrator login. ## advertisedHttpsPort: 443 ## @param service.httpsTargetPort Service Target HTTPS port ## defaults to https unless overridden to the specified port. ## if you want the target port to be "http" or "80" you can specify that here. ## httpsTargetPort: https ## @param service.nodePorts [object] Node Ports to expose ## nodePorts: ## http: <to set explicitly, choose port between 30000-32767> ## https: <to set explicitly, choose port between 30000-32767> ## nodePorts: http: "" https: "" ## @param service.clusterIP EJBCA service Cluster IP ## e.g.: ## clusterIP: None ## clusterIP: "" ## @param service.loadBalancerIP EJBCA service Load Balancer IP ## ref: https://kubernetes.io/docs/concepts/services-networking/service/#type-loadbalancer ## loadBalancerIP: "" ## @param service.externalTrafficPolicy Enable client source IP preservation ## ref https://kubernetes.io/docs/tasks/access-application-cluster/create-external-load-balancer/#preserving-the-client-source-ip ## externalTrafficPolicy: Cluster ## @param service.annotations Service annotations ## annotations: {} ## @param service.loadBalancerSourceRanges Limits which cidr blocks can connect to service's load balancer ## Only valid if service.type: LoadBalancer ## loadBalancerSourceRanges: [] ## @param service.extraPorts Extra ports to expose in the service (normally used with the `sidecar` value) ## extraPorts: [] ## @param service.sessionAffinity Session Affinity for Kubernetes service, can be "None" or "ClientIP" ## If "ClientIP", consecutive client requests will be directed to the same Pod ## ref: https://kubernetes.io/docs/concepts/services-networking/service/#virtual-ips-and-service-proxies ## sessionAffinity: None ## @param service.sessionAffinityConfig Additional settings for the sessionAffinity ## sessionAffinityConfig: ## clientIP: ## timeoutSeconds: 300 sessionAffinityConfig: {} ## @section Ingress parameters ## Configure the ingress resource that allows you to access the ## EJBCA installation. Set up the URL ## ref: https://kubernetes.io/docs/user-guide/ingress/ ## ingress: ## @param ingress.enabled Enable ingress controller resource ## enabled: false ## DEPRECATED: Use ingress.annotations instead of ingress.certManager ## certManager: false ## ## @param ingress.pathType Ingress Path type ## pathType: ImplementationSpecific ## @param ingress.apiVersion Override API Version (automatically detected if not set) ## apiVersion: "" ## @param ingress.hostname Default host for the ingress resource ## hostname: ejbca.local ## @param ingress.path The Path to EJBCA. You may need to set this to '/*' in order to use this ## with ALB ingress controllers. ## path: / ## @param ingress.annotations Additional annotations for the Ingress resource. To enable certificate autogeneration, place here your cert-manager annotations. ## For a full list of possible ingress annotations, please see ## ref: https://github.com/kubernetes/ingress-nginx/blob/master/docs/user-guide/nginx-configuration/annotations.md ## Use this parameter to set the required annotations for cert-manager, see ## ref: https://cert-manager.io/docs/usage/ingress/#supported-annotations ## ## e.g: ## annotations: ## kubernetes.io/ingress.class: nginx ## cert-manager.io/cluster-issuer: cluster-issuer-name ## annotations: {} ## @param ingress.tls Enable TLS configuration for the hostname defined at ingress.hostname parameter ## TLS certificates will be retrieved from a TLS secret with name: {{- printf "%s-tls" .Values.ingress.hostname }} ## You can use the ingress.secrets parameter to create this TLS secret or relay on cert-manager to create it ## tls: false ## @param ingress.extraHosts The list of additional hostnames to be covered with this ingress record. ## Most likely the hostname above will be enough, but in the event more hosts are needed, this is an array ## extraHosts: ## - name: ejbca.local ## path: / extraHosts: [] ## @param ingress.extraPaths Any additional arbitrary paths that may need to be added to the ingress under the main host. ## For example: The ALB ingress controller requires a special rule for handling SSL redirection. ## extraPaths: ## - path: /* ## backend: ## serviceName: ssl-redirect ## servicePort: use-annotation extraPaths: [] ## @param ingress.extraTls The tls configuration for additional hostnames to be covered with this ingress record. ## see: https://kubernetes.io/docs/concepts/services-networking/ingress/#tls ## extraTls: ## - hosts: ## - ejbca.local ## secretName: ejbca.local-tls extraTls: [] ## @param ingress.secrets If you're providing your own certificates, please use this to add the certificates as secrets ## key and certificate should start with -----BEGIN CERTIFICATE----- or ## -----BEGIN RSA PRIVATE KEY----- ## ## name should line up with a tlsSecret set further up ## If you're using cert-manager, this is unneeded, as it will create the secret for you if it is not set ## ## It is also possible to create and manage the certificates outside of this helm chart ## Please see README.md for more information ## Example: ## - name: ejbca.local-tls ## key: ## certificate: ## secrets: [] ## @param ingress.ingressClassName IngressClass that will be be used to implement the Ingress (Kubernetes 1.18+) ## This is supported in Kubernetes 1.18+ and required if you have more than one IngressClass marked as the default for your cluster . ## ref: https://kubernetes.io/blog/2020/04/02/improvements-to-the-ingress-api-in-kubernetes-1.18/ ## ingressClassName: "" ## @section Database parameters ## MariaDB chart configuration ## https://github.com/bitnami/charts/blob/master/bitnami/mariadb/values.yaml ## mariadb: ## @param mariadb.enabled Whether to deploy a mariadb server to satisfy the applications database requirements. ## To use an external database set this to false and configure the externalDatabase parameters ## enabled: true ## @param mariadb.architecture MariaDB architecture (`standalone` or `replication`) ## architecture: standalone ## MariaDB Authentication parameters ## @param mariadb.auth.rootPassword Password for the MariaDB `root` user ## @param mariadb.auth.database Database name to create ## @param mariadb.auth.username Database user to create ## @param mariadb.auth.password Password for the database ## auth: ## ref: https://github.com/bitnami/bitnami-docker-mariadb#setting-the-root-password-on-first-run ## rootPassword: "" ## ref: https://github.com/bitnami/bitnami-docker-mariadb/blob/master/README.md#creating-a-database-on-first-run ## database: bitnami_ejbca ## ref: https://github.com/bitnami/bitnami-docker-mariadb/blob/master/README.md#creating-a-database-user-on-first-run ## username: bn_ejbca password: "" primary: ## Enable persistence using Persistent Volume Claims ## ref: https://kubernetes.io/docs/user-guide/persistent-volumes/ ## @param mariadb.primary.persistence.enabled Enable database persistence using PVC ## @param mariadb.primary.persistence.storageClass MariaDB primary persistent volume storage Class ## @param mariadb.primary.persistence.accessMode Persistent Volume access mode ## @param mariadb.primary.persistence.size Database Persistent Volume Size ## @param mariadb.primary.persistence.hostPath Set path in case you want to use local host path volumes (not recommended in production) ## @param mariadb.primary.persistence.existingClaim Name of an existing `PersistentVolumeClaim` for MariaDB primary replicas ## persistence: enabled: true ## mariadb data Persistent Volume Storage Class ## If defined, storageClassName: <storageClass> ## If set to "-", storageClassName: "", which disables dynamic provisioning ## If undefined (the default) or set to null, no storageClassName spec is ## set, choosing the default provisioner. (gp2 on AWS, standard on ## GKE, AWS & OpenStack) ## storageClass: "" accessMode: ReadWriteOnce size: 8Gi hostPath: "" existingClaim: "" ## External Database Configuration ## All of these values are only used when mariadb.enabled is set to false ## @param externalDatabase.host Host of the external database ## @param externalDatabase.user non-root Username for EJBCA Database ## @param externalDatabase.password Password for the above username ## @param externalDatabase.existingSecret Name of an existing secret resource containing the DB password in a 'mariadb-password' key ## @param externalDatabase.database Name of the existing database ## @param externalDatabase.port Database port number ## externalDatabase: host: localhost user: bn_ejbca password: "" existingSecret: "" database: bitnami_ejbca port: 3306 ## @section NetworkPolicy parameters ## Add networkpolicies ## networkPolicy: ## @param networkPolicy.enabled Enable network policies ## If ingress.enabled or metrics.enabled are true, configure networkPolicy.ingress and networkPolicy.metrics selectors respectively to allow communication ## enabled: false ## @param networkPolicy.ingress.enabled Enable network policy for Ingress Proxies ## @param networkPolicy.ingress.namespaceSelector Ingress Proxy namespace selector labels. These labels will be used to identify the Ingress Proxy's namespace. ## @param networkPolicy.ingress.podSelector Ingress Proxy pods selector labels. These labels will be used to identify the Ingress Proxy pods. ## ingress: enabled: false ## e.g: ## podSelector: ## label: ingress ## podSelector: {} ## e.g: ## namespaceSelector: ## label: ingress ## namespaceSelector: {} ## @param networkPolicy.ingressRules.backendOnlyAccessibleByFrontend Enable ingress rule that makes the backend (mariadb) only accessible by EJBCA's pods. ## @param networkPolicy.ingressRules.customBackendSelector Backend selector labels. These labels will be used to identify the backend pods. ## @param networkPolicy.ingressRules.accessOnlyFrom.enabled Enable ingress rule that makes EJBCA only accessible from a particular origin ## @param networkPolicy.ingressRules.accessOnlyFrom.namespaceSelector Namespace selector label that is allowed to access EJBCA. This label will be used to identified the allowed namespace(s). ## @param networkPolicy.ingressRules.accessOnlyFrom.podSelector Pods selector label that is allowed to access EJBCA. This label will be used to identified the allowed pod(s). ## @param networkPolicy.ingressRules.customRules Custom network policy ingress rule ## ingressRules: ## mariadb backend only can be accessed from EJBCA ## backendOnlyAccessibleByFrontend: false customBackendSelector: {} ## Allow only from the indicated: ## accessOnlyFrom: enabled: false ## e.g: ## namespaceSelector: ## label: ingress ## namespaceSelector: {} ## e.g: ## podSelector: ## label: access ## podSelector: {} ## custom ingress rules ## e.g: ## customRules: ## - from: ## - namespaceSelector: ## matchLabels: ## label: example ## customRules: {} ## @param networkPolicy.egressRules.denyConnectionsToExternal Enable egress rule that denies outgoing traffic outside the cluster, except for DNS (port 53). ## @param networkPolicy.egressRules.customRules Custom network policy rule ## egressRules: ## Deny connections to external. This is not compatible with an external database. ## denyConnectionsToExternal: false ## Additional custom egress rules ## e.g: ## customRules: ## - to: ## - namespaceSelector: ## matchLabels: ## label: example ## customRules: {}
39.27071
193
0.739895
ca2b997d1dd14855338ca96b7d1ff4450ea7abcd
861
yaml
YAML
bitnami/external-dns/Chart.yaml
00arthur00/charts
502aa1e64541669b732a4eda896e5937847b6c3c
[ "Apache-2.0" ]
null
null
null
bitnami/external-dns/Chart.yaml
00arthur00/charts
502aa1e64541669b732a4eda896e5937847b6c3c
[ "Apache-2.0" ]
null
null
null
bitnami/external-dns/Chart.yaml
00arthur00/charts
502aa1e64541669b732a4eda896e5937847b6c3c
[ "Apache-2.0" ]
null
null
null
annotations: category: DeveloperTools apiVersion: v2 appVersion: 0.10.2 dependencies: - name: common repository: https://charts.bitnami.com/bitnami tags: - bitnami-common version: 1.x.x description: ExternalDNS is a Kubernetes addon that configures public DNS servers with information about exposed Kubernetes services to make them discoverable. engine: gotpl home: https://github.com/bitnami/charts/tree/master/bitnami/external-dns icon: https://bitnami.com/assets/stacks/external-dns/img/external-dns-stack-220x234.png keywords: - external-dns - network - dns maintainers: - email: [email protected] name: Bitnami name: external-dns sources: - https://github.com/kubernetes-sigs/external-dns - https://github.com/bitnami/bitnami-docker-external-dns - https://github.com/kubernetes-sigs/external-dns version: 6.2.0
30.75
159
0.760743
1b14de82376104a6104ce388773b23694e232a2f
31,681
yaml
YAML
bitnami/mediawiki/values.yaml
00arthur00/charts
502aa1e64541669b732a4eda896e5937847b6c3c
[ "Apache-2.0" ]
null
null
null
bitnami/mediawiki/values.yaml
00arthur00/charts
502aa1e64541669b732a4eda896e5937847b6c3c
[ "Apache-2.0" ]
2
2022-01-26T01:14:30.000Z
2022-01-26T07:03:39.000Z
bitnami/mediawiki/values.yaml
00arthur00/charts
502aa1e64541669b732a4eda896e5937847b6c3c
[ "Apache-2.0" ]
null
null
null
## @section Global parameters ## Global Docker image parameters ## Please, note that this will override the image parameters, including dependencies, configured to use the global value ## Current available global Docker image parameters: imageRegistry, imagePullSecrets and storageClass ## @param global.imageRegistry Global Docker image registry ## @param global.imagePullSecrets Global Docker registry secret names as an array ## @param global.storageClass Global StorageClass for Persistent Volume(s) ## global: imageRegistry: "" ## E.g. ## imagePullSecrets: ## - myRegistryKeySecretName ## imagePullSecrets: [] storageClass: "" ## @section Common parameters ## @param kubeVersion Force target Kubernetes version (using Helm capabilities if not set) ## kubeVersion: "" ## @param nameOverride String to partially override common.names.fullname template (will maintain the release name) ## nameOverride: "" ## @param fullnameOverride String to fully override common.names.fullname template ## fullnameOverride: "" ## @param commonLabels Labels to add to all deployed objects ## commonLabels: {} ## @param commonAnnotations Annotations to add to all deployed objects ## commonAnnotations: {} ## @param clusterDomain Default Kubernetes cluster domain ## clusterDomain: cluster.local ## @param extraDeploy Array of extra objects to deploy with the release ## extraDeploy: [] ## @section Mediawiki parameters ## Bitnami DokuWiki image version ## ref: https://hub.docker.com/r/bitnami/mediawiki/tags/ ## @param image.registry MediaWiki image registry ## @param image.repository MediaWiki image repository ## @param image.tag MediaWiki image tag (immutable tags are recommended) ## @param image.pullPolicy Image pull policy ## @param image.pullSecrets Specify docker-registry secret names as an array ## @param image.debug Enable MediaWiki image debug mode ## image: registry: docker.io repository: bitnami/mediawiki tag: 1.37.1-debian-10-r85 ## Specify a imagePullPolicy ## Defaults to 'Always' if image tag is 'latest', else set to 'IfNotPresent' ## ref: https://kubernetes.io/docs/user-guide/images/#pre-pulling-images ## pullPolicy: IfNotPresent ## Optionally specify an array of imagePullSecrets. ## Secrets must be manually created in the namespace. ## ref: https://kubernetes.io/docs/tasks/configure-pod-container/pull-image-private-registry/ ## e.g: ## pullSecrets: ## - myRegistryKeySecretName ## pullSecrets: [] ## Enable debug mode ## debug: false ## @param hostAliases [array] Deployment pod host aliases ## https://kubernetes.io/docs/concepts/services-networking/add-entries-to-pod-etc-hosts-with-host-aliases/ ## hostAliases: ## Necessary for apache-exporter to work ## - ip: "127.0.0.1" hostnames: - "status.localhost" ## @param mediawikiUser User of the application ## ref: https://github.com/bitnami/bitnami-docker-mediawiki#environment-variables ## mediawikiUser: user ## @param mediawikiPassword Application password ## Defaults to a random 10-character alphanumeric string if not set ## ref: https://github.com/bitnami/bitnami-docker-mediawiki#environment-variables ## mediawikiPassword: "" ## @param mediawikiEmail Admin email ## ref: https://github.com/bitnami/bitnami-docker-mediawiki#environment-variables ## mediawikiEmail: [email protected] ## @param mediawikiName Name for the wiki ## ref: https://github.com/bitnami/bitnami-docker-mediawiki#environment-variables ## mediawikiName: My Wiki ## @param mediawikiHost Mediawiki host to create application URLs ## ref: https://github.com/bitnami/bitnami-docker-mediawiki#configuration ## mediawikiHost: "" ## @param allowEmptyPassword Allow DB blank passwords ## ref: https://github.com/bitnami/bitnami-docker-mediawiki#environment-variables ## allowEmptyPassword: "yes" ## SMTP mail delivery configuration ## ref: https://github.com/bitnami/bitnami-docker-mediawiki#smtp-configuration ## @param smtpHost SMTP host ## @param smtpPort SMTP port ## @param smtpHostID SMTP host ID ## @param smtpUser SMTP user ## @param smtpPassword SMTP password ## smtpHost: "" smtpPort: "" smtpHostID: "" smtpUser: "" smtpPassword: "" ## @param command Override default container command (useful when using custom images) ## command: [] ## @param args Override default container args (useful when using custom images) ## args: [] ## @param lifecycleHooks for the Mediawiki container(s) to automate configuration before or after startup ## lifecycleHooks: {} ## @param extraEnvVars Extra environment variables to be set on Mediawki container ## Example: ## extraEnvVars: ## - name: FOO ## value: "bar" ## extraEnvVars: [] ## @param extraEnvVarsCM Name of existing ConfigMap containing extra env vars ## extraEnvVarsCM: "" ## @param extraEnvVarsSecret Name of existing Secret containing extra env vars ## extraEnvVarsSecret: "" ## @section Mediawiki deployment parameters ## Strategy to use to update Pods ## @param updateStrategy.type StrategyType can be set to RollingUpdate or OnDelete ## updateStrategy: type: RollingUpdate ## Mediawiki pods' Security Context ## ref: https://kubernetes.io/docs/tasks/configure-pod-container/security-context/#set-the-security-context-for-a-container ## @param podSecurityContext.enabled Enable Mediawiki pods' Security Context ## @param podSecurityContext.fsGroup Group ID for the volumes of the pod ## podSecurityContext: enabled: true fsGroup: 1001 ## Mediawiki containers' SecurityContext ## ref: https://kubernetes.io/docs/tasks/configure-pod-container/security-context/#set-the-security-context-for-a-pod ## @param containerSecurityContext.enabled Enable Mediawiki containers' SecurityContext ## @param containerSecurityContext.runAsUser User ID to run Mediawiki containers ## @param containerSecurityContext.runAsNonRoot Set Mediawiki container's Security Context runAsNonRoot ## containerSecurityContext: enabled: true runAsUser: 1001 runAsNonRoot: true ## Mediawiki resource requests and limits ## ref: https://kubernetes.io/docs/user-guide/compute-resources/ ## We usually recommend not to specify default resources and to leave this as a conscious ## choice for the user. This also increases chances charts run on environments with little ## resources, such as Minikube. If you do want to specify resources, uncomment the following ## lines, adjust them as necessary, and remove the curly braces after 'resources:'. ## @param resources.limits The resources limits for the Mediawki container ## @param resources.requests [object] The requested resources for the Mediawki container ## resources: ## Example: ## limits: ## cpu: 200m ## memory: 256Mi limits: {} requests: memory: 512Mi cpu: 300m ## Mediawiki containers' startup probe. ## Configure extra options for startup probe ## ref: https://kubernetes.io/docs/tasks/configure-pod-container/configure-liveness-readiness-probes/#configure-probes ## @param startupProbe.enabled Enable startupProbe ## @param startupProbe.httpGet.path Request path for startupProbe ## @param startupProbe.httpGet.port Port for startupProbe ## @param startupProbe.httpGet.httpHeaders [array] Headers for startupProbe ## @param startupProbe.initialDelaySeconds Initial delay seconds for startupProbe ## @param startupProbe.periodSeconds Period seconds for startupProbe ## @param startupProbe.timeoutSeconds Timeout seconds for startupProbe ## @param startupProbe.failureThreshold Failure threshold for startupProbe ## @param startupProbe.successThreshold Success threshold for startupProbe ## startupProbe: enabled: false httpGet: path: /api.php?action=query&meta=siteinfo&format=none port: http httpHeaders: - name: Host value: "{{ include \"mediawiki.host\" . }}" initialDelaySeconds: 120 periodSeconds: 10 timeoutSeconds: 5 failureThreshold: 6 successThreshold: 1 ## Mediawiki containers' liveness probe. ## Configure extra options for liveness probe ## ref: https://kubernetes.io/docs/tasks/configure-pod-container/configure-liveness-readiness-probes/#configure-probes ## @param livenessProbe.enabled Enable livenessProbe ## @param livenessProbe.httpGet.path Request path for livenessProbe ## @param livenessProbe.httpGet.port Port for livenessProbe ## @param livenessProbe.httpGet.httpHeaders [array] Headers for livenessProbe ## @param livenessProbe.initialDelaySeconds Initial delay seconds for livenessProbe ## @param livenessProbe.periodSeconds Period seconds for livenessProbe ## @param livenessProbe.timeoutSeconds Timeout seconds for livenessProbe ## @param livenessProbe.failureThreshold Failure threshold for livenessProbe ## @param livenessProbe.successThreshold Success threshold for livenessProbe ## livenessProbe: enabled: true httpGet: path: /api.php?action=query&meta=siteinfo&format=none port: http httpHeaders: - name: Host value: "{{ include \"mediawiki.host\" . }}" initialDelaySeconds: 120 periodSeconds: 10 timeoutSeconds: 5 failureThreshold: 6 successThreshold: 1 ## Mediawiki containers' readinessProbe probe. ## Configure extra options for liveness probe ## ref: https://kubernetes.io/docs/tasks/configure-pod-container/configure-liveness-readiness-probes/#configure-probes ## @param readinessProbe.enabled Enable readinessProbe ## @param readinessProbe.httpGet.path Request path for readinessProbe ## @param readinessProbe.httpGet.port Port for readinessProbe ## @param readinessProbe.httpGet.httpHeaders [array] Headers for livenessProbe ## @param readinessProbe.initialDelaySeconds Initial delay seconds for readinessProbe ## @param readinessProbe.periodSeconds Period seconds for readinessProbe ## @param readinessProbe.timeoutSeconds Timeout seconds for readinessProbe ## @param readinessProbe.failureThreshold Failure threshold for readinessProbe ## @param readinessProbe.successThreshold Success threshold for readinessProbe ## readinessProbe: enabled: true httpGet: path: /api.php?action=query&meta=siteinfo&format=none port: http httpHeaders: - name: Host value: "{{ include \"mediawiki.host\" . }}" initialDelaySeconds: 30 periodSeconds: 10 timeoutSeconds: 5 failureThreshold: 6 successThreshold: 1 ## @param customStartupProbe Override default startup probe ## customStartupProbe: {} ## @param customLivenessProbe Override default liveness probe ## customLivenessProbe: {} ## @param customReadinessProbe Override default readiness probe ## customReadinessProbe: {} ## @param podLabels Extra labels for Mediawki pods ## ref: https://kubernetes.io/docs/concepts/overview/working-with-objects/labels/ ## podLabels: {} ## @param podAnnotations Annotations for Mediawki pods ## ref: https://kubernetes.io/docs/concepts/overview/working-with-objects/annotations/ ## podAnnotations: {} ## @param podAffinityPreset Pod affinity preset. Ignored if `affinity` is set. Allowed values: `soft` or `hard` ## ref: https://kubernetes.io/docs/concepts/scheduling-eviction/assign-pod-node/#inter-pod-affinity-and-anti-affinity ## podAffinityPreset: "" ## @param podAntiAffinityPreset Pod anti-affinity preset. Ignored if `affinity` is set. Allowed values: `soft` or `hard` ## Ref: https://kubernetes.io/docs/concepts/scheduling-eviction/assign-pod-node/#inter-pod-affinity-and-anti-affinity ## podAntiAffinityPreset: soft ## Node affinity preset ## Ref: https://kubernetes.io/docs/concepts/scheduling-eviction/assign-pod-node/#node-affinity ## Allowed values: soft, hard ## nodeAffinityPreset: ## @param nodeAffinityPreset.type Node affinity preset type. Ignored if `affinity` is set. Allowed values: `soft` or `hard` ## type: "" ## @param nodeAffinityPreset.key Node label key to match. Ignored if `affinity` is set. ## E.g. ## key: "kubernetes.io/e2e-az-name" ## key: "" ## @param nodeAffinityPreset.values Node label values to match. Ignored if `affinity` is set. ## E.g. ## values: ## - e2e-az1 ## - e2e-az2 ## values: [] ## @param affinity Affinity for pod assignment. Evaluated as a template. ## Ref: https://kubernetes.io/docs/concepts/configuration/assign-pod-node/#affinity-and-anti-affinity ## Note: podAffinityPreset, podAntiAffinityPreset, and nodeAffinityPreset will be ignored when it's set ## affinity: {} ## @param nodeSelector Node labels for pod assignment. Evaluated as a template. ## ref: https://kubernetes.io/docs/user-guide/node-selection/ ## nodeSelector: {} ## @param tolerations Tolerations for pod assignment. Evaluated as a template. ## ref: https://kubernetes.io/docs/concepts/configuration/taint-and-toleration/ ## tolerations: [] ## @param priorityClassName Mediawiki pods' priorityClassName ## priorityClassName: "" ## @param schedulerName Name of the k8s scheduler (other than default) ## ref: https://kubernetes.io/docs/tasks/administer-cluster/configure-multiple-schedulers/ ## schedulerName: "" ## @param topologySpreadConstraints Topology Spread Constraints for pod assignment ## https://kubernetes.io/docs/concepts/workloads/pods/pod-topology-spread-constraints/ ## The value is evaluated as a template ## topologySpreadConstraints: [] ## @param extraVolumes Optionally specify extra list of additional volumes for Mediawki pods ## extraVolumes: [] ## @param extraVolumeMounts Optionally specify extra list of additional volumeMounts for Mediawki container(s) ## extraVolumeMounts: [] ## @param initContainers Add additional init containers to the Mediawki pods ## Example: ## initContainers: ## - name: your-image-name ## image: your-image ## imagePullPolicy: Always ## ports: ## - name: portname ## containerPort: 1234 ## initContainers: [] ## @param sidecars Add additional sidecar containers to the Mediawki pods ## Example: ## sidecars: ## - name: your-image-name ## image: your-image ## imagePullPolicy: Always ## ports: ## - name: portname ## containerPort: 1234 ## sidecars: [] ## Enable persistence using Persistent Volume Claims ## ref: https://kubernetes.io/docs/user-guide/persistent-volumes/ ## persistence: ## @param persistence.enabled Enable persistence using PVC ## enabled: true ## @param persistence.storageClass PVC Storage Class for MediaWiki volume ## If defined, storageClassName: <storageClass> ## If set to "-", storageClassName: "", which disables dynamic provisioning ## If undefined (the default) or set to null, no storageClassName spec is ## set, choosing the default provisioner. (gp2 on AWS, standard on ## GKE, AWS & OpenStack) ## storageClass: "" ## @param persistence.existingClaim An Existing PVC name for MediaWiki volume ## Requires persistence.enabled: true ## If defined, PVC must be created manually before volume will be bound ## existingClaim: "" ## @param persistence.accessModes [array] Persistent Volume access modes ## accessModes: - ReadWriteOnce ## @param persistence.size PVC Storage Request for MediaWiki volume ## size: 8Gi ## @param persistence.annotations Persistent Volume Claim annotations ## annotations: {} ## @section Traffic Exposure parameters ## Kubernetes service configuration ## For minikube, set this to NodePort, elsewhere use LoadBalancer ## Use serviceLoadBalancerIP to request a specific static IP, otherwise leave blank ## service: ## @param service.type Kubernetes Service type ## For minikube, set this to NodePort, elsewhere use LoadBalancer ## type: LoadBalancer ## @param service.ports.http Service HTTP port ## @param service.ports.https HTTPS Port. Set this to any value (recommended: 443) to enable the https service port ## ports: http: 80 https: 443 ## Use nodePorts to requests some specific ports when using NodePort ## @param service.nodePorts.http Kubernetes http node port ## @param service.nodePorts.https Kubernetes https node port ## nodePorts: ## http: <to set explicitly, choose port between 30000-32767> ## https: <to set explicitly, choose port between 30000-32767> ## nodePorts: http: "" https: "" ## @param service.externalTrafficPolicy Enable client source IP preservation ## ref https://kubernetes.io/docs/tasks/access-application-cluster/create-external-load-balancer/#preserving-the-client-source-ip ## externalTrafficPolicy: Cluster ## @param service.clusterIP Mediawiki service Cluster IP ## e.g.: ## clusterIP: None ## clusterIP: "" ## @param service.loadBalancerIP Mediawiki service Load Balancer IP ## ref: https://kubernetes.io/docs/concepts/services-networking/service/#type-loadbalancer ## loadBalancerIP: "" ## @param service.loadBalancerSourceRanges Mediawiki service Load Balancer sources ## ref: https://kubernetes.io/docs/tasks/access-application-cluster/configure-cloud-provider-firewall/#restrict-access-for-loadbalancer-service ## e.g: ## loadBalancerSourceRanges: ## - 10.10.10.0/24 ## loadBalancerSourceRanges: [] ## @param service.extraPorts Extra ports to expose (normally used with the `sidecar` value) ## extraPorts: [] ## @param service.annotations Additional custom annotations for Mediawiki service ## annotations: {} ## @param service.sessionAffinity Session Affinity for Kubernetes service, can be "None" or "ClientIP" ## If "ClientIP", consecutive client requests will be directed to the same Pod ## ref: https://kubernetes.io/docs/concepts/services-networking/service/#virtual-ips-and-service-proxies ## sessionAffinity: None ## @param service.sessionAffinityConfig Additional settings for the sessionAffinity ## sessionAffinityConfig: ## clientIP: ## timeoutSeconds: 300 ## sessionAffinityConfig: {} ## Configure the ingress resource that allows you to access the Mediawiki installation. Set up the URL ## ref: https://kubernetes.io/docs/user-guide/ingress/ ## ingress: ## @param ingress.enabled Set to true to enable ingress record generation ## enabled: false ## DEPRECATED: Use ingress.annotations instead of ingress.certManager ## certManager: false ## ## @param ingress.pathType Ingress path type ## pathType: ImplementationSpecific ## @param ingress.apiVersion Force Ingress API version (automatically detected if not set) ## apiVersion: "" ## @param ingress.hostname Default host for the ingress resource ## hostname: mediawiki.local ## @param ingress.path The Path to Mediawiki. You may need to set this to '/*' in order to use this with ALB ingress controllers. ## path: / ## @param ingress.annotations Additional annotations for the Ingress resource. To enable certificate autogeneration, place here your cert-manager annotations. ## For a full list of possible ingress annotations, please see ## ref: https://github.com/kubernetes/ingress-nginx/blob/master/docs/user-guide/nginx-configuration/annotations.md ## Use this parameter to set the required annotations for cert-manager, see ## ref: https://cert-manager.io/docs/usage/ingress/#supported-annotations ## ## e.g: ## annotations: ## kubernetes.io/ingress.class: nginx ## cert-manager.io/cluster-issuer: cluster-issuer-name ## annotations: {} ## @param ingress.tls Enable TLS configuration for the hostname defined at ingress.hostname parameter ## TLS certificates will be retrieved from a TLS secret with name: {{- printf "%s-tls" .Values.ingress.hostname }} ## You can use the ingress.secrets parameter to create this TLS secret or relay on cert-manager to create it ## tls: false ## @param ingress.extraHosts The list of additional hostnames to be covered with this ingress record. ## Most likely the hostname above will be enough, but in the event more hosts are needed, this is an array ## extraHosts: ## - name: mediawiki.local ## path: / ## extraHosts: [] ## @param ingress.extraPaths Any additional arbitrary paths that may need to be added to the ingress under the main host. ## For example: The ALB ingress controller requires a special rule for handling SSL redirection. ## extraPaths: ## - path: /* ## backend: ## serviceName: ssl-redirect ## servicePort: use-annotation ## extraPaths: [] ## @param ingress.extraTls The tls configuration for additional hostnames to be covered with this ingress record. ## see: https://kubernetes.io/docs/concepts/services-networking/ingress/#tls ## extraTls: ## - hosts: ## - mediawiki.local ## secretName: mediawiki.local-tls ## extraTls: [] ## @param ingress.secrets If you're providing your own certificates, please use this to add the certificates as secrets ## key and certificate should start with -----BEGIN CERTIFICATE----- or ## -----BEGIN RSA PRIVATE KEY----- ## ## name should line up with a tlsSecret set further up ## If you're using cert-manager, this is unneeded, as it will create the secret for you if it is not set ## ## It is also possible to create and manage the certificates outside of this helm chart ## Please see README.md for more information ## e.g: ## - name: mediawiki.local-tls ## key: ## certificate: ## secrets: [] ## @param ingress.ingressClassName IngressClass that will be be used to implement the Ingress (Kubernetes 1.18+) ## This is supported in Kubernetes 1.18+ and required if you have more than one IngressClass marked as the default for your cluster . ## ref: https://kubernetes.io/blog/2020/04/02/improvements-to-the-ingress-api-in-kubernetes-1.18/ ## ingressClassName: "" ## @section Database parameters ## MariaDB chart configuration ## https://github.com/bitnami/charts/blob/master/bitnami/mariadb/values.yaml ## mariadb: ## @param mariadb.enabled Whether to deploy a mariadb server to satisfy the applications database requirements. ## To use an external database set this to false and configure the externalDatabase parameters ## enabled: true ## @param mariadb.architecture MariaDB architecture (`standalone` or `replication`) ## architecture: standalone ## MariaDB Authentication parameters ## auth: ## @param mariadb.auth.rootPassword Password for the MariaDB `root` user ## ref: https://github.com/bitnami/bitnami-docker-mariadb#setting-the-root-password-on-first-run ## rootPassword: "" ## @param mariadb.auth.database Database name to create ## ref: https://github.com/bitnami/bitnami-docker-mariadb/blob/master/README.md#creating-a-database-on-first-run ## database: bitnami_mediawiki ## @param mariadb.auth.username Database user to create ## ref: https://github.com/bitnami/bitnami-docker-mariadb/blob/master/README.md#creating-a-database-user-on-first-run ## username: bn_mediawiki ## @param mariadb.auth.password Password for the database ## password: "" primary: ## Enable persistence using Persistent Volume Claims ## ref: https://kubernetes.io/docs/user-guide/persistent-volumes/ ## @param mariadb.primary.persistence.enabled Enable database persistence using PVC ## @param mariadb.primary.persistence.storageClass PVC Storage Class ## @param mariadb.primary.persistence.accessModes Persistent Volume Access Mode ## @param mariadb.primary.persistence.size Database Persistent Volume Size ## @param mariadb.primary.persistence.hostPath Host mount path for MariaDB volume ## @param mariadb.primary.persistence.existingClaim Enable persistence using an existing PVC ## persistence: enabled: true ## mariadb data Persistent Volume Storage Class ## If defined, storageClassName: <storageClass> ## If set to "-", storageClassName: "", which disables dynamic provisioning ## If undefined (the default) or set to null, no storageClassName spec is ## set, choosing the default provisioner. (gp2 on AWS, standard on ## GKE, AWS & OpenStack) ## storageClass: "" accessModes: - ReadWriteOnce size: 8Gi ## Set path in case you want to use local host path volumes (not recommended in production) ## hostPath: "" ## Use an existing PVC ## existingClaim: "" ## External database configuration ## externalDatabase: ## @param externalDatabase.existingSecret Use existing secret (ignores previous password) ## Must contain key `mariadb-password` ## NOTE: When it's set, the `externalDatabase.password` parameter is ignored ## existingSecret: "" ## @param externalDatabase.host Host of the existing database ## host: "" ## @param externalDatabase.port Port of the existing database ## port: 3306 ## @param externalDatabase.user Existing username in the external db ## user: bn_mediawiki ## @param externalDatabase.password Password for the above username ## password: "" ## @param externalDatabase.database Name of the existing database ## database: bitnami_mediawiki ## @section Metrics parameters ## Prometheus Exporter / Metrics ## metrics: ## @param metrics.enabled Start a side-car prometheus exporter ## enabled: false ## @param metrics.image.registry Apache exporter image registry ## @param metrics.image.repository Apache exporter image repository ## @param metrics.image.tag Apache exporter image tag (immutable tags are recommended) ## @param metrics.image.pullPolicy Image pull policy ## @param metrics.image.pullSecrets Specify docker-registry secret names as an array ## image: registry: docker.io repository: bitnami/apache-exporter tag: 0.11.0-debian-10-r85 pullPolicy: IfNotPresent ## Optionally specify an array of imagePullSecrets. ## Secrets must be manually created in the namespace. ## ref: https://kubernetes.io/docs/tasks/configure-pod-container/pull-image-private-registry/ ## e.g: ## pullSecrets: ## - myRegistryKeySecretName ## pullSecrets: [] ## @param metrics.resources Exporter resource requests/limit ## ref: https://kubernetes.io/docs/user-guide/compute-resources/ ## resources: {} ## Metrics exporter pod Annotation and Labels ## ## @param metrics.port Metrics service port ## port: 9117 ## @param metrics.podAnnotations [object] Additional annotations for Metrics exporter pod ## podAnnotations: prometheus.io/scrape: "true" prometheus.io/port: "{{ .Values.metrics.port }}" ## Prometheus Service Monitor ## ref: https://github.com/coreos/prometheus-operator ## https://github.com/coreos/prometheus-operator/blob/master/Documentation/api.md#endpoint ## serviceMonitor: ## @param metrics.serviceMonitor.enabled Create ServiceMonitor Resource for scraping metrics using PrometheusOperator ## enabled: true ## @param metrics.serviceMonitor.namespace The namespace in which the ServiceMonitor will be created ## namespace: "" ## @param metrics.serviceMonitor.interval The interval at which metrics should be scraped ## interval: 30s ## @param metrics.serviceMonitor.scrapeTimeout The timeout after which the scrape is ended ## scrapeTimeout: "" ## @param metrics.serviceMonitor.relabelings RelabelConfigs to apply to samples before scraping ## ref: https://github.com/coreos/prometheus-operator/blob/master/Documentation/api.md#relabelconfig ## relabelings: [] ## @param metrics.serviceMonitor.metricRelabelings MetricRelabelConfigs to apply to samples before ingestion ## ref: https://github.com/coreos/prometheus-operator/blob/master/Documentation/api.md#relabelconfig ## metricRelabelings: [] ## @param metrics.serviceMonitor.selector ServiceMonitor selector labels ## ref: https://github.com/bitnami/charts/tree/master/bitnami/prometheus-operator#prometheus-configuration ## ## selector: ## prometheus: my-prometheus ## selector: {} ## @param metrics.serviceMonitor.labels Extra labels for the ServiceMonitor ## labels: {} ## @param metrics.serviceMonitor.honorLabels honorLabels chooses the metric's labels on collisions with target labels ## honorLabels: false ## @section NetworkPolicy parameters ## Add networkpolicies ## networkPolicy: ## @param networkPolicy.enabled Enable network policies ## If ingress.enabled or metrics.enabled are true, configure networkPolicy.ingress and networkPolicy.metrics selectors respectively to allow communication ## enabled: false ## @param networkPolicy.metrics.enabled Enable network policy for metrics (prometheus) ## @param networkPolicy.metrics.namespaceSelector Monitoring namespace selector labels. These labels will be used to identify the prometheus' namespace. ## @param networkPolicy.metrics.podSelector Monitoring pod selector labels. These labels will be used to identify the Prometheus pods. ## metrics: enabled: false ## e.g: ## podSelector: ## label: monitoring ## podSelector: {} ## e.g: ## namespaceSelector: ## label: monitoring ## namespaceSelector: {} ## @param networkPolicy.ingress.enabled Enable network policy for Ingress Proxies ## @param networkPolicy.ingress.namespaceSelector Ingress Proxy namespace selector labels. These labels will be used to identify the Ingress Proxy's namespace. ## @param networkPolicy.ingress.podSelector Ingress Proxy pods selector labels. These labels will be used to identify the Ingress Proxy pods. ## ingress: enabled: false ## e.g: ## podSelector: ## label: ingress ## podSelector: {} ## e.g: ## namespaceSelector: ## label: ingress ## namespaceSelector: {} ## @param networkPolicy.ingressRules.backendOnlyAccessibleByFrontend Enable ingress rule that makes the backend (mariadb) only accessible by MediaWiki's pods. ## @param networkPolicy.ingressRules.customBackendSelector Backend selector labels. These labels will be used to identify the backend pods. ## @param networkPolicy.ingressRules.accessOnlyFrom.enabled Enable ingress rule that makes MediaWiki only accessible from a particular origin ## @param networkPolicy.ingressRules.accessOnlyFrom.namespaceSelector Namespace selector label that is allowed to access MediaWiki. This label will be used to identified the allowed namespace(s). ## @param networkPolicy.ingressRules.accessOnlyFrom.podSelector Pods selector label that is allowed to access MediaWiki. This label will be used to identified the allowed pod(s). ## @param networkPolicy.ingressRules.customRules Custom network policy ingress rule ## ingressRules: ## mariadb backend only can be accessed from MediaWiki ## backendOnlyAccessibleByFrontend: false customBackendSelector: {} ## Allow only from the indicated: ## accessOnlyFrom: enabled: false ## e.g: ## namespaceSelector: ## label: ingress ## namespaceSelector: {} ## e.g: ## podSelector: ## label: access ## podSelector: {} ## custom ingress rules ## e.g: ## customRules: ## - from: ## - namespaceSelector: ## matchLabels: ## label: example ## customRules: {} ## @param networkPolicy.egressRules.denyConnectionsToExternal Enable egress rule that denies outgoing traffic outside the cluster, except for DNS (port 53). ## @param networkPolicy.egressRules.customRules Custom network policy rule ## egressRules: ## Deny connections to external. This is not compatible with an external database. ## denyConnectionsToExternal: false ## Additional custom egress rules ## e.g: ## customRules: ## - to: ## - namespaceSelector: ## matchLabels: ## label: example ## customRules: {}
39.650814
197
0.737855
dc66a7ee14c46138fe4da755b1b2bf6a5e81a796
866
yaml
YAML
bitnami/ejbca/Chart.yaml
00arthur00/charts
502aa1e64541669b732a4eda896e5937847b6c3c
[ "Apache-2.0" ]
null
null
null
bitnami/ejbca/Chart.yaml
00arthur00/charts
502aa1e64541669b732a4eda896e5937847b6c3c
[ "Apache-2.0" ]
2
2022-01-26T01:14:30.000Z
2022-01-26T07:03:39.000Z
bitnami/ejbca/Chart.yaml
00arthur00/charts
502aa1e64541669b732a4eda896e5937847b6c3c
[ "Apache-2.0" ]
null
null
null
annotations: category: CertificateAuthority apiVersion: v2 appVersion: 7.4.3-2 dependencies: - condition: mariadb.enabled name: mariadb repository: https://charts.bitnami.com/bitnami tags: - ejbca-database version: 10.x.x - name: common repository: https://charts.bitnami.com/bitnami tags: - bitnami-common version: 1.x.x description: EJBCA is an enterprise class PKI Certificate Authority software, built using Java (JEE) technology. engine: gotpl home: https://github.com/bitnami/charts/tree/master/bitnami/ejbca icon: https://bitnami.com/assets/stacks/ejbca/img/ejbca-stack-220x234.png keywords: - ejbca - ca - pki - certificate maintainers: - email: [email protected] name: Bitnami name: ejbca sources: - https://github.com/bitnami/bitnami-docker-ejbca - https://www.ejbca.org/ version: 5.1.5
25.470588
112
0.721709
dca261a68b7333a5b81f78daed44cc7c4a9e8422
27,146
yaml
YAML
bitnami/memcached/values.yaml
00arthur00/charts
502aa1e64541669b732a4eda896e5937847b6c3c
[ "Apache-2.0" ]
null
null
null
bitnami/memcached/values.yaml
00arthur00/charts
502aa1e64541669b732a4eda896e5937847b6c3c
[ "Apache-2.0" ]
2
2022-01-26T01:14:30.000Z
2022-01-26T07:03:39.000Z
bitnami/memcached/values.yaml
00arthur00/charts
502aa1e64541669b732a4eda896e5937847b6c3c
[ "Apache-2.0" ]
null
null
null
## @section Global parameters ## Global Docker image parameters ## Please, note that this will override the image parameters, including dependencies, configured to use the global value ## Current available global Docker image parameters: imageRegistry, imagePullSecrets and storageClass ## @param global.imageRegistry Global Docker image registry ## @param global.imagePullSecrets Global Docker registry secret names as an array ## @param global.storageClass Global StorageClass for Persistent Volume(s) ## global: imageRegistry: "" ## E.g. ## imagePullSecrets: ## - myRegistryKeySecretName ## imagePullSecrets: [] storageClass: "" ## @section Common parameters ## @param kubeVersion Override Kubernetes version ## kubeVersion: "" ## @param nameOverride String to partially override common.names.fullname template (will maintain the release name) ## nameOverride: "" ## @param fullnameOverride String to fully override common.names.fullname template ## fullnameOverride: "" ## @param clusterDomain Kubernetes Cluster Domain ## clusterDomain: cluster.local ## @param extraDeploy Extra objects to deploy (evaluated as a template) ## extraDeploy: [] ## @param commonLabels Add labels to all the deployed resources ## commonLabels: {} ## @param commonAnnotations Add annotations to all the deployed resources ## commonAnnotations: {} ## Enable diagnostic mode in the deployment/statefulset ## diagnosticMode: ## @param diagnosticMode.enabled Enable diagnostic mode (all probes will be disabled and the command will be overridden) ## enabled: false ## @param diagnosticMode.command Command to override all containers in the deployment/statefulset ## command: - sleep ## @param diagnosticMode.args Args to override all containers in the deployment/statefulset ## args: - infinity ## @section Memcached parameters ## Bitnami Memcached image version ## ref: https://hub.docker.com/r/bitnami/memcached/tags/ ## @param image.registry Memcached image registry ## @param image.repository Memcached image repository ## @param image.tag Memcached image tag (immutable tags are recommended) ## @param image.pullPolicy Memcached image pull policy ## @param image.pullSecrets Specify docker-registry secret names as an array ## @param image.debug Specify if debug values should be set ## image: registry: docker.io repository: bitnami/memcached tag: 1.6.14-debian-10-r32 ## Specify a imagePullPolicy ## Defaults to 'Always' if image tag is 'latest', else set to 'IfNotPresent' ## ref: https://kubernetes.io/docs/user-guide/images/#pre-pulling-images ## pullPolicy: IfNotPresent ## Optionally specify an array of imagePullSecrets. ## Secrets must be manually created in the namespace. ## ref: https://kubernetes.io/docs/tasks/configure-pod-container/pull-image-private-registry/ ## e.g: ## pullSecrets: ## - myRegistryKeySecretName ## pullSecrets: [] ## Set to true if you would like to see extra information on logs ## debug: false ## @param architecture Memcached architecture. Allowed values: standalone or high-availability ## architecture: standalone ## Authentication parameters ## ref: https://github.com/bitnami/bitnami-docker-memcached#creating-the-memcached-admin-user ## auth: ## @param auth.enabled Enable Memcached authentication ## enabled: false ## @param auth.username Memcached admin user ## username: "" ## @param auth.password Memcached admin password ## password: "" ## @param command Override default container command (useful when using custom images) ## command: [] ## @param args Override default container args (useful when using custom images) ## e.g: ## arguments: ## - /run.sh ## - -m <maxMemoryLimit> ## - -I <maxItemSize> ## - -vv ## args: [] ## @param extraEnvVars Array with extra environment variables to add to Memcached nodes ## e.g: ## extraEnvVars: ## - name: FOO ## value: "bar" ## extraEnvVars: [] ## @param extraEnvVarsCM Name of existing ConfigMap containing extra env vars for Memcached nodes ## extraEnvVarsCM: "" ## @param extraEnvVarsSecret Name of existing Secret containing extra env vars for Memcached nodes ## extraEnvVarsSecret: "" ## @section Deployment/Statefulset parameters ## @param replicaCount Number of Memcached nodes ## replicaCount: 1 ## @param containerPorts.memcached Memcached container port ## containerPorts: memcached: 11211 ## Configure extra options for Memcached containers' liveness, readiness and startup probes ## ref: https://kubernetes.io/docs/tasks/configure-pod-container/configure-liveness-readiness-startup-probes/#configure-probes ## @param livenessProbe.enabled Enable livenessProbe on Memcached containers ## @param livenessProbe.initialDelaySeconds Initial delay seconds for livenessProbe ## @param livenessProbe.periodSeconds Period seconds for livenessProbe ## @param livenessProbe.timeoutSeconds Timeout seconds for livenessProbe ## @param livenessProbe.failureThreshold Failure threshold for livenessProbe ## @param livenessProbe.successThreshold Success threshold for livenessProbe ## livenessProbe: enabled: true initialDelaySeconds: 30 periodSeconds: 10 timeoutSeconds: 5 failureThreshold: 6 successThreshold: 1 ## @param readinessProbe.enabled Enable readinessProbe on Memcached containers ## @param readinessProbe.initialDelaySeconds Initial delay seconds for readinessProbe ## @param readinessProbe.periodSeconds Period seconds for readinessProbe ## @param readinessProbe.timeoutSeconds Timeout seconds for readinessProbe ## @param readinessProbe.failureThreshold Failure threshold for readinessProbe ## @param readinessProbe.successThreshold Success threshold for readinessProbe ## readinessProbe: enabled: true initialDelaySeconds: 5 periodSeconds: 5 timeoutSeconds: 3 failureThreshold: 6 successThreshold: 1 ## @param startupProbe.enabled Enable startupProbe on Memcached containers ## @param startupProbe.initialDelaySeconds Initial delay seconds for startupProbe ## @param startupProbe.periodSeconds Period seconds for startupProbe ## @param startupProbe.timeoutSeconds Timeout seconds for startupProbe ## @param startupProbe.failureThreshold Failure threshold for startupProbe ## @param startupProbe.successThreshold Success threshold for startupProbe ## startupProbe: enabled: false initialDelaySeconds: 30 periodSeconds: 10 timeoutSeconds: 1 failureThreshold: 15 successThreshold: 1 ## @param customLivenessProbe Custom livenessProbe that overrides the default one ## customLivenessProbe: {} ## @param customReadinessProbe Custom readinessProbe that overrides the default one ## customReadinessProbe: {} ## @param customStartupProbe Custom startupProbe that overrides the default one ## customStartupProbe: {} ## @param lifecycleHooks for the Memcached container(s) to automate configuration before or after startup ## lifecycleHooks: {} ## Memcached resource requests and limits ## ref: https://kubernetes.io/docs/user-guide/compute-resources/ ## @param resources.limits The resources limits for the Memcached containers ## @param resources.requests.memory The requested memory for the Memcached containers ## @param resources.requests.cpu The requested cpu for the Memcached containers ## resources: limits: {} requests: memory: 256Mi cpu: 250m ## Configure Pods Security Context ## ref: https://kubernetes.io/docs/tasks/configure-pod-container/security-context/#set-the-security-context-for-a-pod ## @param podSecurityContext.enabled Enabled Memcached pods' Security Context ## @param podSecurityContext.fsGroup Set Memcached pod's Security Context fsGroup ## podSecurityContext: enabled: true fsGroup: 1001 ## Configure Container Security Context ## ref: https://kubernetes.io/docs/tasks/configure-pod-container/security-context/#set-the-security-context-for-a-container ## @param containerSecurityContext.enabled Enabled Memcached containers' Security Context ## @param containerSecurityContext.runAsUser Set Memcached containers' Security Context runAsUser ## @param containerSecurityContext.runAsNonRoot Set Memcached containers' Security Context runAsNonRoot ## containerSecurityContext: enabled: true runAsUser: 1001 runAsNonRoot: true ## @param hostAliases Add deployment host aliases ## https://kubernetes.io/docs/concepts/services-networking/add-entries-to-pod-etc-hosts-with-host-aliases/ ## hostAliases: [] ## @param podLabels Extra labels for Memcached pods ## ref: https://kubernetes.io/docs/concepts/overview/working-with-objects/labels/ ## podLabels: {} ## @param podAnnotations Annotations for Memcached pods ## ref: https://kubernetes.io/docs/concepts/overview/working-with-objects/annotations/ ## podAnnotations: {} ## @param podAffinityPreset Pod affinity preset. Ignored if `affinity` is set. Allowed values: `soft` or `hard` ## ref: https://kubernetes.io/docs/concepts/scheduling-eviction/assign-pod-node/#inter-pod-affinity-and-anti-affinity ## podAffinityPreset: "" ## @param podAntiAffinityPreset Pod anti-affinity preset. Ignored if `affinity` is set. Allowed values: `soft` or `hard` ## Ref: https://kubernetes.io/docs/concepts/scheduling-eviction/assign-pod-node/#inter-pod-affinity-and-anti-affinity ## podAntiAffinityPreset: soft ## Node affinity preset ## Ref: https://kubernetes.io/docs/concepts/scheduling-eviction/assign-pod-node/#node-affinity ## nodeAffinityPreset: ## @param nodeAffinityPreset.type Node affinity preset type. Ignored if `affinity` is set. Allowed values: `soft` or `hard` ## type: "" ## @param nodeAffinityPreset.key Node label key to match Ignored if `affinity` is set. ## E.g. ## key: "kubernetes.io/e2e-az-name" ## key: "" ## @param nodeAffinityPreset.values Node label values to match. Ignored if `affinity` is set. ## E.g. ## values: ## - e2e-az1 ## - e2e-az2 ## values: [] ## @param affinity Affinity for pod assignment ## Ref: https://kubernetes.io/docs/concepts/configuration/assign-pod-node/#affinity-and-anti-affinity ## Note: podAffinityPreset, podAntiAffinityPreset, and nodeAffinityPreset will be ignored when it's set ## affinity: {} ## @param nodeSelector Node labels for pod assignment ## Ref: https://kubernetes.io/docs/user-guide/node-selection/ ## nodeSelector: {} ## @param tolerations Tolerations for pod assignment ## Ref: https://kubernetes.io/docs/concepts/configuration/taint-and-toleration/ ## tolerations: [] ## @param topologySpreadConstraints Topology Spread Constraints for pod assignment spread across your cluster among failure-domains. Evaluated as a template ## Ref: https://kubernetes.io/docs/concepts/workloads/pods/pod-topology-spread-constraints/#spread-constraints-for-pods ## topologySpreadConstraints: {} ## @param podManagementPolicy StatefulSet controller supports relax its ordering guarantees while preserving its uniqueness and identity guarantees. There are two valid pod management policies: `OrderedReady` and `Parallel` ## ref: https://kubernetes.io/docs/tutorials/stateful-application/basic-stateful-set/#pod-management-policy ## podManagementPolicy: Parallel ## @param priorityClassName Name of the existing priority class to be used by Memcached pods, priority class needs to be created beforehand ## Ref: https://kubernetes.io/docs/concepts/configuration/pod-priority-preemption/ ## priorityClassName: "" ## @param schedulerName Kubernetes pod scheduler registry ## https://kubernetes.io/docs/tasks/administer-cluster/configure-multiple-schedulers/ ## schedulerName: "" ## @param updateStrategy.type Memcached statefulset strategy type ## @param updateStrategy.rollingUpdate Memcached statefulset rolling update configuration parameters ## ref: https://kubernetes.io/docs/concepts/workloads/controllers/statefulset/#update-strategies ## updateStrategy: type: RollingUpdate rollingUpdate: {} ## @param extraVolumes Optionally specify extra list of additional volumes for the Memcached pod(s) ## Example Use Case: mount certificates to enable TLS ## e.g: ## extraVolumes: ## - name: zookeeper-keystore ## secret: ## defaultMode: 288 ## secretName: zookeeper-keystore ## - name: zookeeper-truststore ## secret: ## defaultMode: 288 ## secretName: zookeeper-truststore ## extraVolumes: [] ## @param extraVolumeMounts Optionally specify extra list of additional volumeMounts for the Memcached container(s) ## Example Use Case: mount certificates to enable TLS ## e.g: ## extraVolumeMounts: ## - name: zookeeper-keystore ## mountPath: /certs/keystore ## readOnly: true ## - name: zookeeper-truststore ## mountPath: /certs/truststore ## readOnly: true ## extraVolumeMounts: [] ## @param sidecars Add additional sidecar containers to the Memcached pod(s) ## e.g: ## sidecars: ## - name: your-image-name ## image: your-image ## imagePullPolicy: Always ## ports: ## - name: portname ## containerPort: 1234 ## sidecars: [] ## @param initContainers Add additional init containers to the Memcached pod(s) ## Example: ## initContainers: ## - name: your-image-name ## image: your-image ## imagePullPolicy: Always ## ports: ## - name: portname ## containerPort: 1234 ## initContainers: [] ## Memcached Autoscaling ## @param autoscaling.enabled Enable memcached statefulset autoscaling (requires architecture: "high-availability") ## @param autoscaling.minReplicas memcached statefulset autoscaling minimum number of replicas ## @param autoscaling.maxReplicas memcached statefulset autoscaling maximum number of replicas ## @param autoscaling.targetCPU memcached statefulset autoscaling target CPU percentage ## @param autoscaling.targetMemory memcached statefulset autoscaling target CPU memory ## autoscaling: enabled: false minReplicas: 3 maxReplicas: 6 targetCPU: 50 targetMemory: 50 ## Memcached Pod Disruption Budget ## ref: https://kubernetes.io/docs/concepts/workloads/pods/disruptions/ ## @param pdb.create Deploy a pdb object for the Memcached pod ## @param pdb.minAvailable Minimum available Memcached replicas ## @param pdb.maxUnavailable Maximum unavailable Memcached replicas ## pdb: create: false minAvailable: "" maxUnavailable: 1 ## @section Traffic Exposure parameters service: ## @param service.type Kubernetes Service type ## type: ClusterIP ## @param service.ports.memcached Memcached service port ## ports: memcached: 11211 ## Node ports to expose ## NOTE: choose port between <30000-32767> ## @param service.nodePorts.memcached Node port for Memcached ## nodePorts: memcached: "" ## @param service.sessionAffinity Control where client requests go, to the same pod or round-robin ## Values: ClientIP or None ## ref: https://kubernetes.io/docs/user-guide/services/ ## sessionAffinity: None ## @param service.clusterIP Memcached service Cluster IP ## e.g.: ## clusterIP: None ## clusterIP: "" ## @param service.loadBalancerIP Memcached service Load Balancer IP ## ref: https://kubernetes.io/docs/user-guide/services/#type-loadbalancer ## loadBalancerIP: "" ## @param service.loadBalancerSourceRanges Memcached service Load Balancer sources ## ref: https://kubernetes.io/docs/tasks/access-application-cluster/configure-cloud-provider-firewall/#restrict-access-for-loadbalancer-service ## e.g: ## loadBalancerSourceRanges: ## - 10.10.10.0/24 ## loadBalancerSourceRanges: [] ## @param service.externalTrafficPolicy Memcached service external traffic policy ## ref https://kubernetes.io/docs/tasks/access-application-cluster/create-external-load-balancer/#preserving-the-client-source-ip ## externalTrafficPolicy: Cluster ## @param service.annotations Additional custom annotations for Memcached service ## annotations: {} ## @param service.extraPorts Extra ports to expose in the Memcached service (normally used with the `sidecar` value) ## extraPorts: [] ## @section Other Parameters ## Service account for Memcached to use. ## ref: https://kubernetes.io/docs/tasks/configure-pod-container/configure-service-account/ ## serviceAccount: ## @param serviceAccount.create Enable creation of ServiceAccount for Memcached pod ## create: false ## @param serviceAccount.name The name of the ServiceAccount to use. ## If not set and create is true, a name is generated using the common.names.fullname template ## name: "" ## @param serviceAccount.automountServiceAccountToken Allows auto mount of ServiceAccountToken on the serviceAccount created ## Can be set to false if pods using this serviceAccount do not need to use K8s API ## automountServiceAccountToken: true ## @param serviceAccount.annotations Additional custom annotations for the ServiceAccount ## annotations: {} ## @section Persistence parameters ## Enable persistence using Persistent Volume Claims ## ref: https://kubernetes.io/docs/user-guide/persistent-volumes/ ## persistence: ## @param persistence.enabled Enable Memcached data persistence using PVC. If false, use emptyDir ## enabled: false ## @param persistence.storageClass PVC Storage Class for Memcached data volume ## If defined, storageClassName: <storageClass> ## If set to "-", storageClassName: "", which disables dynamic provisioning ## If undefined (the default) or set to null, no storageClassName spec is ## set, choosing the default provisioner. (gp2 on AWS, standard on ## GKE, AWS & OpenStack) ## storageClass: "" ## @param persistence.accessModes PVC Access modes ## accessModes: - ReadWriteOnce ## @param persistence.size PVC Storage Request for Memcached data volume ## size: 8Gi ## @param persistence.annotations Annotations for the PVC ## annotations: {} ## @param persistence.selector Selector to match an existing Persistent Volume for Memcached's data PVC ## If set, the PVC can't have a PV dynamically provisioned for it ## E.g. ## selector: ## matchLabels: ## app: my-app ## selector: {} ## @section Volume Permissions parameters ## ## Init containers parameters: ## volumePermissions: Change the owner and group of the persistent volume(s) mountpoint(s) to 'runAsUser:fsGroup' on each node ## volumePermissions: ## @param volumePermissions.enabled Enable init container that changes the owner and group of the persistent volume ## enabled: false ## @param volumePermissions.image.registry Init container volume-permissions image registry ## @param volumePermissions.image.repository Init container volume-permissions image repository ## @param volumePermissions.image.tag Init container volume-permissions image tag (immutable tags are recommended) ## @param volumePermissions.image.pullPolicy Init container volume-permissions image pull policy ## @param volumePermissions.image.pullSecrets Init container volume-permissions image pull secrets ## image: registry: docker.io repository: bitnami/bitnami-shell tag: 10-debian-10-r365 pullPolicy: IfNotPresent ## Optionally specify an array of imagePullSecrets. ## Secrets must be manually created in the namespace. ## ref: https://kubernetes.io/docs/tasks/configure-pod-container/pull-image-private-registry/ ## Example: ## pullSecrets: ## - myRegistryKeySecretName ## pullSecrets: [] ## Init container resource requests and limits ## ref: https://kubernetes.io/docs/user-guide/compute-resources/ ## @param volumePermissions.resources.limits Init container volume-permissions resource limits ## @param volumePermissions.resources.requests Init container volume-permissions resource requests ## resources: limits: {} requests: {} ## Init container' Security Context ## Note: the chown of the data folder is done to containerSecurityContext.runAsUser ## and not the below volumePermissions.containerSecurityContext.runAsUser ## @param volumePermissions.containerSecurityContext.runAsUser User ID for the init container ## containerSecurityContext: runAsUser: 0 ## Prometheus Exporter / Metrics ## metrics: ## @param metrics.enabled Start a side-car prometheus exporter ## enabled: false ## Bitnami Memcached Prometheus Exporter image ## ref: https://hub.docker.com/r/bitnami/memcached-exporter/tags/ ## @param metrics.image.registry Memcached exporter image registry ## @param metrics.image.repository Memcached exporter image repository ## @param metrics.image.tag Memcached exporter image tag (immutable tags are recommended) ## @param metrics.image.pullPolicy Image pull policy ## @param metrics.image.pullSecrets Specify docker-registry secret names as an array ## image: registry: docker.io repository: bitnami/memcached-exporter tag: 0.9.0-debian-10-r328 pullPolicy: IfNotPresent ## Optionally specify an array of imagePullSecrets. ## Secrets must be manually created in the namespace. ## ref: https://kubernetes.io/docs/tasks/configure-pod-container/pull-image-private-registry/ ## e.g: ## pullSecrets: ## - myRegistryKeySecretName ## pullSecrets: [] ## @param metrics.containerPorts.metrics Memcached Prometheus Exporter container port ## containerPorts: metrics: 9150 ## Memcached Prometheus exporter container resource requests and limits ## ref: https://kubernetes.io/docs/user-guide/compute-resources/ ## @param metrics.resources.limits Init container volume-permissions resource limits ## @param metrics.resources.requests Init container volume-permissions resource requests ## resources: limits: {} requests: {} ## Configure extra options for Memcached Prometheus exporter containers' liveness, readiness and startup probes ## ref: https://kubernetes.io/docs/tasks/configure-pod-container/configure-liveness-readiness-startup-probes/#configure-probes ## @param metrics.livenessProbe.enabled Enable livenessProbe on Memcached Prometheus exporter containers ## @param metrics.livenessProbe.initialDelaySeconds Initial delay seconds for livenessProbe ## @param metrics.livenessProbe.periodSeconds Period seconds for livenessProbe ## @param metrics.livenessProbe.timeoutSeconds Timeout seconds for livenessProbe ## @param metrics.livenessProbe.failureThreshold Failure threshold for livenessProbe ## @param metrics.livenessProbe.successThreshold Success threshold for livenessProbe ## livenessProbe: enabled: true initialDelaySeconds: 15 periodSeconds: 10 timeoutSeconds: 5 failureThreshold: 3 successThreshold: 1 ## @param metrics.readinessProbe.enabled Enable readinessProbe on Memcached Prometheus exporter containers ## @param metrics.readinessProbe.initialDelaySeconds Initial delay seconds for readinessProbe ## @param metrics.readinessProbe.periodSeconds Period seconds for readinessProbe ## @param metrics.readinessProbe.timeoutSeconds Timeout seconds for readinessProbe ## @param metrics.readinessProbe.failureThreshold Failure threshold for readinessProbe ## @param metrics.readinessProbe.successThreshold Success threshold for readinessProbe ## readinessProbe: enabled: true initialDelaySeconds: 5 periodSeconds: 10 timeoutSeconds: 3 failureThreshold: 3 successThreshold: 1 ## @param metrics.startupProbe.enabled Enable startupProbe on Memcached Prometheus exporter containers ## @param metrics.startupProbe.initialDelaySeconds Initial delay seconds for startupProbe ## @param metrics.startupProbe.periodSeconds Period seconds for startupProbe ## @param metrics.startupProbe.timeoutSeconds Timeout seconds for startupProbe ## @param metrics.startupProbe.failureThreshold Failure threshold for startupProbe ## @param metrics.startupProbe.successThreshold Success threshold for startupProbe ## startupProbe: enabled: false initialDelaySeconds: 10 periodSeconds: 10 timeoutSeconds: 1 failureThreshold: 15 successThreshold: 1 ## @param metrics.customLivenessProbe Custom livenessProbe that overrides the default one ## customLivenessProbe: {} ## @param metrics.customReadinessProbe Custom readinessProbe that overrides the default one ## customReadinessProbe: {} ## @param metrics.customStartupProbe Custom startupProbe that overrides the default one ## customStartupProbe: {} ## @param metrics.podAnnotations [object] Memcached Prometheus exporter pod Annotation and Labels ## ref: https://kubernetes.io/docs/concepts/overview/working-with-objects/annotations/ ## podAnnotations: prometheus.io/scrape: "true" prometheus.io/port: "{{ .Values.metrics.containerPorts.metrics }}" ## Service configuration ## service: ## @param metrics.service.ports.metrics Prometheus metrics service port ## ports: metrics: 9150 ## @param metrics.service.clusterIP Static clusterIP or None for headless services ## ref: https://kubernetes.io/docs/concepts/services-networking/service/#choosing-your-own-ip-address ## clusterIP: "" ## @param metrics.service.sessionAffinity Control where client requests go, to the same pod or round-robin ## Values: ClientIP or None ## ref: https://kubernetes.io/docs/user-guide/services/ ## sessionAffinity: None ## @param metrics.service.annotations [object] Annotations for the Prometheus metrics service ## annotations: prometheus.io/scrape: "true" prometheus.io/port: "{{ .Values.metrics.service.ports.metrics }}" ## Prometheus Operator ServiceMonitor configuration ## serviceMonitor: ## @param metrics.serviceMonitor.enabled Create ServiceMonitor Resource for scraping metrics using Prometheus Operator ## enabled: false ## @param metrics.serviceMonitor.namespace Namespace for the ServiceMonitor Resource (defaults to the Release Namespace) ## namespace: "" ## @param metrics.serviceMonitor.interval Interval at which metrics should be scraped. ## ref: https://github.com/coreos/prometheus-operator/blob/master/Documentation/api.md#endpoint ## interval: "" ## @param metrics.serviceMonitor.scrapeTimeout Timeout after which the scrape is ended ## ref: https://github.com/coreos/prometheus-operator/blob/master/Documentation/api.md#endpoint ## scrapeTimeout: "" ## @param metrics.serviceMonitor.labels Additional labels that can be used so ServiceMonitor will be discovered by Prometheus ## labels: {} ## @param metrics.serviceMonitor.selector Prometheus instance selector labels ## ref: https://github.com/bitnami/charts/tree/master/bitnami/prometheus-operator#prometheus-configuration ## selector: {} ## @param metrics.serviceMonitor.relabelings RelabelConfigs to apply to samples before scraping ## relabelings: [] ## @param metrics.serviceMonitor.metricRelabelings MetricRelabelConfigs to apply to samples before ingestion ## metricRelabelings: [] ## @param metrics.serviceMonitor.honorLabels Specify honorLabels parameter to add the scrape endpoint ## honorLabels: false ## @param metrics.serviceMonitor.jobLabel The name of the label on the target service to use as the job name in prometheus. ## jobLabel: ""
40.097489
223
0.760001
99ed3d106c7f5d76dfd5e372eaf90078f5bb37a5
749
yaml
YAML
bitnami/fluentd/Chart.yaml
00arthur00/charts
502aa1e64541669b732a4eda896e5937847b6c3c
[ "Apache-2.0" ]
null
null
null
bitnami/fluentd/Chart.yaml
00arthur00/charts
502aa1e64541669b732a4eda896e5937847b6c3c
[ "Apache-2.0" ]
2
2022-01-26T01:14:30.000Z
2022-01-26T07:03:39.000Z
bitnami/fluentd/Chart.yaml
00arthur00/charts
502aa1e64541669b732a4eda896e5937847b6c3c
[ "Apache-2.0" ]
null
null
null
annotations: category: Analytics apiVersion: v2 appVersion: 1.14.5 dependencies: - name: common repository: https://charts.bitnami.com/bitnami tags: - bitnami-common version: 1.x.x description: Fluentd collects events from various data sources and writes them to files, RDBMS, NoSQL, IaaS, SaaS, Hadoop and so on. engine: gotpl home: https://github.com/bitnami/charts/tree/master/bitnami/fluentd icon: https://bitnami.com/assets/stacks/fluentd/img/fluentd-stack-220x234.png keywords: - fluentd - logging - logs - data - collector maintainers: - email: [email protected] name: Bitnami name: fluentd sources: - https://github.com/bitnami/bitnami-docker-fluentd - https://www.fluentd.org/ version: 5.0.11
25.827586
132
0.732977
d2fa7ad6c413edcb6ba5b75b4679404dca4dd667
837
yaml
YAML
bitnami/apache/Chart.yaml
00arthur00/charts
502aa1e64541669b732a4eda896e5937847b6c3c
[ "Apache-2.0" ]
null
null
null
bitnami/apache/Chart.yaml
00arthur00/charts
502aa1e64541669b732a4eda896e5937847b6c3c
[ "Apache-2.0" ]
2
2022-01-26T01:14:30.000Z
2022-01-26T07:03:39.000Z
bitnami/apache/Chart.yaml
00arthur00/charts
502aa1e64541669b732a4eda896e5937847b6c3c
[ "Apache-2.0" ]
null
null
null
annotations: category: Infrastructure apiVersion: v2 appVersion: 2.4.53 dependencies: - name: common repository: https://charts.bitnami.com/bitnami tags: - bitnami-common version: 1.x.x description: Apache HTTP Server is an open-source HTTP server. The goal of this project is to provide a secure, efficient and extensible server that provides HTTP services in sync with the current HTTP standards. engine: gotpl home: https://github.com/bitnami/charts/tree/master/bitnami/apache icon: https://bitnami.com/assets/stacks/apache/img/apache-stack-220x234.png keywords: - apache - http - https - www - web - reverse proxy maintainers: - email: [email protected] name: Bitnami name: apache sources: - https://github.com/bitnami/bitnami-docker-apache - https://httpd.apache.org version: 9.0.11
27.9
212
0.741935
a8df4ca1f2f8d76d5c2f0dcb9512678ee59f4958
926
yaml
YAML
bitnami/solr/Chart.yaml
00arthur00/charts
502aa1e64541669b732a4eda896e5937847b6c3c
[ "Apache-2.0" ]
null
null
null
bitnami/solr/Chart.yaml
00arthur00/charts
502aa1e64541669b732a4eda896e5937847b6c3c
[ "Apache-2.0" ]
2
2022-01-26T01:14:30.000Z
2022-01-26T07:03:39.000Z
bitnami/solr/Chart.yaml
00arthur00/charts
502aa1e64541669b732a4eda896e5937847b6c3c
[ "Apache-2.0" ]
null
null
null
annotations: category: Infrastructure apiVersion: v2 appVersion: 8.11.1 dependencies: - condition: zookeeper.enabled name: zookeeper repository: https://charts.bitnami.com/bitnami version: 8.x.x - name: common repository: https://charts.bitnami.com/bitnami tags: - bitnami-common version: 1.x.x description: Apache Solr is an extremely powerful, open source enterprise search platform built on Apache Lucene. It is highly reliable and flexible, scalable, and designed to add value very quickly after launch. engine: gotpl home: https://github.com/bitnami/charts/tree/master/bitnami/solr icon: https://bitnami.com/assets/stacks/solr/img/solr-stack-110x117.png keywords: - solr - zookeeper - apache maintainers: - email: [email protected] name: Bitnami name: solr sources: - https://github.com/bitnami/bitnami-docker-solr - https://lucene.apache.org/solr/ version: 3.0.8
29.870968
212
0.742981
0606a1177af87b383ed0d3a61911588a62ba07fb
28,178
yaml
YAML
bitnami/ghost/values.yaml
00arthur00/charts
502aa1e64541669b732a4eda896e5937847b6c3c
[ "Apache-2.0" ]
null
null
null
bitnami/ghost/values.yaml
00arthur00/charts
502aa1e64541669b732a4eda896e5937847b6c3c
[ "Apache-2.0" ]
2
2022-01-26T01:14:30.000Z
2022-01-26T07:03:39.000Z
bitnami/ghost/values.yaml
00arthur00/charts
502aa1e64541669b732a4eda896e5937847b6c3c
[ "Apache-2.0" ]
null
null
null
## @section Global parameters ## Global Docker image parameters ## Please, note that this will override the image parameters, including dependencies, configured to use the global value ## Current available global Docker image parameters: imageRegistry, imagePullSecrets and storageClass ## @param global.imageRegistry Global Docker image registry ## @param global.imagePullSecrets Global Docker registry secret names as an array ## @param global.storageClass Global StorageClass for Persistent Volume(s) ## global: imageRegistry: "" ## E.g. ## imagePullSecrets: ## - myRegistryKeySecretName ## imagePullSecrets: [] storageClass: "" ## @section Common parameters ## @param kubeVersion Override Kubernetes version ## kubeVersion: "" ## @param nameOverride String to partially override common.names.fullname ## nameOverride: "" ## @param fullnameOverride String to fully override common.names.fullname ## fullnameOverride: "" ## @param commonLabels Labels to add to all deployed objects ## commonLabels: {} ## @param commonAnnotations Annotations to add to all deployed objects ## commonAnnotations: {} ## @param clusterDomain Kubernetes cluster domain name ## clusterDomain: cluster.local ## @param extraDeploy Array of extra objects to deploy with the release ## extraDeploy: [] ## @section Ghost Image parameters ## Bitnami Ghost image ## ref: https://hub.docker.com/r/bitnami/ghost/tags/ ## @param image.registry Ghost image registry ## @param image.repository Ghost image repository ## @param image.tag Ghost image tag (immutable tags are recommended) ## @param image.pullPolicy Ghost image pull policy ## @param image.pullSecrets Ghost image pull secrets ## @param image.debug Enable image debug mode ## image: registry: docker.io repository: bitnami/ghost tag: 4.37.0-debian-10-r18 ## Specify a imagePullPolicy ## Defaults to 'Always' if image tag is 'latest', else set to 'IfNotPresent' ## ref: https://kubernetes.io/docs/user-guide/images/#pre-pulling-images ## pullPolicy: IfNotPresent ## Optionally specify an array of imagePullSecrets. ## Secrets must be manually created in the namespace. ## ref: https://kubernetes.io/docs/tasks/configure-pod-container/pull-image-private-registry/ ## e.g: ## pullSecrets: ## - myRegistryKeySecretName ## pullSecrets: [] ## Enable debug mode ## debug: false ## @section Ghost Configuration parameters ## Ghost settings based on environment variables ## ref: https://github.com/bitnami/bitnami-docker-ghost#configuration ## @param ghostUsername Ghost user name ## ghostUsername: user ## @param ghostPassword Ghost user password ## Defaults to a random 10-character alphanumeric string if not set ## ghostPassword: "" ## @param existingSecret Name of existing secret containing Ghost credentials ## NOTE: Must contain key `ghost-password` ## NOTE: When it's set, the `ghostPassword` parameter is ignored ## existingSecret: "" ## @param ghostEmail Ghost user email ## ghostEmail: [email protected] ## @param ghostBlogTitle Ghost Blog title ## ghostBlogTitle: User's Blog ## @param ghostHost Ghost host to create application URLs ## ghostHost: "" ## @param ghostPath URL sub path where to server the Ghost application ## ghostPath: / ## @param ghostEnableHttps Configure Ghost to build application URLs using https ## ghostEnableHttps: false ## SMTP mail delivery configuration ## ref: https://github.com/bitnami/bitnami-docker-ghost/#smtp-configuration ## @param smtpHost SMTP server host ## @param smtpPort SMTP server port ## @param smtpUser SMTP username ## @param smtpPassword SMTP user password ## @param smtpService SMTP service ## @param smtpProtocol SMTP protocol (ssl or tls) ## smtpHost: "" smtpPort: "" smtpUser: "" smtpPassword: "" smtpService: "" smtpProtocol: "" ## @param smtpExistingSecret The name of an existing secret with SMTP credentials ## NOTE: Must contain key `smtp-password` ## NOTE: When it's set, the `smtpPassword` parameter is ignored ## smtpExistingSecret: "" ## @param allowEmptyPassword Allow the container to be started with blank passwords ## allowEmptyPassword: true ## @param ghostSkipInstall Skip performing the initial bootstrapping for Ghost ## ghostSkipInstall: false ## @param command Override default container command (useful when using custom images) ## command: [] ## @param args Override default container args (useful when using custom images) ## args: [] ## @param extraEnvVars Array with extra environment variables to add to the Ghost container ## e.g: ## extraEnvVars: ## - name: FOO ## value: "bar" ## extraEnvVars: [] ## @param extraEnvVarsCM Name of existing ConfigMap containing extra env vars ## extraEnvVarsCM: "" ## @param extraEnvVarsSecret Name of existing Secret containing extra env vars ## extraEnvVarsSecret: "" ## @section Ghost deployment parameters ## @param replicaCount Number of Ghost replicas to deploy ## NOTE: ReadWriteMany PVC(s) are required if replicaCount > 1 ## replicaCount: 1 ## @param updateStrategy.type Ghost deployment strategy type ## ref: https://kubernetes.io/docs/concepts/workloads/controllers/deployment/#strategy ## NOTE: Set it to `Recreate` if you use a PV that cannot be mounted on multiple pods ## e.g: ## updateStrategy: ## type: RollingUpdate ## rollingUpdate: ## maxSurge: 25% ## maxUnavailable: 25% ## updateStrategy: type: RollingUpdate ## @param priorityClassName Ghost pod priority class name ## priorityClassName: "" ## @param schedulerName Name of the k8s scheduler (other than default) ## ref: https://kubernetes.io/docs/tasks/administer-cluster/configure-multiple-schedulers/ ## schedulerName: "" ## @param topologySpreadConstraints Topology Spread Constraints for pod assignment ## https://kubernetes.io/docs/concepts/workloads/pods/pod-topology-spread-constraints/ ## The value is evaluated as a template ## topologySpreadConstraints: [] ## @param hostAliases Ghost pod host aliases ## https://kubernetes.io/docs/concepts/services-networking/add-entries-to-pod-etc-hosts-with-host-aliases/ ## hostAliases: [] ## @param extraVolumes Optionally specify extra list of additional volumes for Ghost pods ## extraVolumes: [] ## @param extraVolumeMounts Optionally specify extra list of additional volumeMounts for Ghost container(s) ## extraVolumeMounts: [] ## @param sidecars Add additional sidecar containers to the Ghost pod ## e.g: ## sidecars: ## - name: your-image-name ## image: your-image ## imagePullPolicy: Always ## ports: ## - name: portname ## containerPort: 1234 ## sidecars: [] ## @param initContainers Add additional init containers to the Ghost pods ## ref: https://kubernetes.io/docs/concepts/workloads/pods/init-containers/ ## e.g: ## initContainers: ## - name: your-image-name ## image: your-image ## imagePullPolicy: Always ## ports: ## - name: portname ## containerPort: 1234 ## initContainers: [] ## @param lifecycleHooks Add lifecycle hooks to the Ghost deployment ## lifecycleHooks: {} ## @param podLabels Extra labels for Ghost pods ## ref: https://kubernetes.io/docs/concepts/overview/working-with-objects/labels/ ## podLabels: {} ## @param podAnnotations Annotations for Ghost pods ## ref: https://kubernetes.io/docs/concepts/overview/working-with-objects/annotations/ ## podAnnotations: {} ## @param podAffinityPreset Pod affinity preset. Ignored if `affinity` is set. Allowed values: `soft` or `hard` ## ref: https://kubernetes.io/docs/concepts/scheduling-eviction/assign-pod-node/#inter-pod-affinity-and-anti-affinity ## podAffinityPreset: "" ## @param podAntiAffinityPreset Pod anti-affinity preset. Ignored if `affinity` is set. Allowed values: `soft` or `hard` ## Ref: https://kubernetes.io/docs/concepts/scheduling-eviction/assign-pod-node/#inter-pod-affinity-and-anti-affinity ## podAntiAffinityPreset: soft ## Node affinity preset ## Ref: https://kubernetes.io/docs/concepts/scheduling-eviction/assign-pod-node/#node-affinity ## nodeAffinityPreset: ## @param nodeAffinityPreset.type Node affinity preset type. Ignored if `affinity` is set. Allowed values: `soft` or `hard` ## type: "" ## @param nodeAffinityPreset.key Node label key to match. Ignored if `affinity` is set ## key: "" ## @param nodeAffinityPreset.values Node label values to match. Ignored if `affinity` is set ## E.g. ## values: ## - e2e-az1 ## - e2e-az2 ## values: [] ## @param affinity Affinity for pod assignment ## Ref: https://kubernetes.io/docs/concepts/configuration/assign-pod-node/#affinity-and-anti-affinity ## NOTE: podAffinityPreset, podAntiAffinityPreset, and nodeAffinityPreset will be ignored when it's set ## affinity: {} ## @param nodeSelector Node labels for pod assignment ## ref: https://kubernetes.io/docs/user-guide/node-selection/ ## nodeSelector: {} ## @param tolerations Tolerations for pod assignment ## ref: https://kubernetes.io/docs/concepts/configuration/taint-and-toleration/ ## tolerations: {} ## Ghost containers' resource requests and limits ## ref: https://kubernetes.io/docs/user-guide/compute-resources/ ## @param resources.limits The resources limits for the Ghost container ## @param resources.requests The requested resources for the Ghost container ## resources: limits: {} requests: {} ## Container ports ## @param containerPorts.http Ghost HTTP container port ## @param containerPorts.https Ghost HTTPS container port ## containerPorts: http: 2368 https: 2368 ## Configure Pods Security Context ## ref: https://kubernetes.io/docs/tasks/configure-pod-container/security-context/#set-the-security-context-for-a-pod ## @param podSecurityContext.enabled Enabled Ghost pods' Security Context ## @param podSecurityContext.fsGroup Set Ghost pod's Security Context fsGroup ## podSecurityContext: enabled: true fsGroup: 1001 ## Configure Container Security Context (only main container) ## ref: https://kubernetes.io/docs/tasks/configure-pod-container/security-context/#set-the-security-context-for-a-container ## @param containerSecurityContext.enabled Enabled Ghost containers' Security Context ## @param containerSecurityContext.runAsUser Set Ghost container's Security Context runAsUser ## @param containerSecurityContext.runAsNonRoot Set Ghost container's Security Context runAsNonRoot ## containerSecurityContext: enabled: true runAsUser: 1001 runAsNonRoot: true ## Configure extra options for Ghost containers' liveness, readiness and startup probes ## ref: https://kubernetes.io/docs/tasks/configure-pod-container/configure-liveness-readiness-probes/#configure-probes ## @param startupProbe.enabled Enable startupProbe ## @param startupProbe.initialDelaySeconds Initial delay seconds for startupProbe ## @param startupProbe.periodSeconds Period seconds for startupProbe ## @param startupProbe.timeoutSeconds Timeout seconds for startupProbe ## @param startupProbe.failureThreshold Failure threshold for startupProbe ## @param startupProbe.successThreshold Success threshold for startupProbe ## startupProbe: enabled: false initialDelaySeconds: 120 periodSeconds: 10 timeoutSeconds: 5 failureThreshold: 6 successThreshold: 1 ## @param livenessProbe.enabled Enable livenessProbe ## @param livenessProbe.initialDelaySeconds Initial delay seconds for livenessProbe ## @param livenessProbe.periodSeconds Period seconds for livenessProbe ## @param livenessProbe.timeoutSeconds Timeout seconds for livenessProbe ## @param livenessProbe.failureThreshold Failure threshold for livenessProbe ## @param livenessProbe.successThreshold Success threshold for livenessProbe ## livenessProbe: enabled: true initialDelaySeconds: 120 periodSeconds: 10 timeoutSeconds: 5 failureThreshold: 6 successThreshold: 1 ## @param readinessProbe.enabled Enable readinessProbe ## @param readinessProbe.initialDelaySeconds Initial delay seconds for readinessProbe ## @param readinessProbe.periodSeconds Period seconds for readinessProbe ## @param readinessProbe.timeoutSeconds Timeout seconds for readinessProbe ## @param readinessProbe.failureThreshold Failure threshold for readinessProbe ## @param readinessProbe.successThreshold Success threshold for readinessProbe ## readinessProbe: enabled: true initialDelaySeconds: 30 periodSeconds: 5 timeoutSeconds: 3 failureThreshold: 6 successThreshold: 1 ## @param customLivenessProbe Custom livenessProbe that overrides the default one ## customLivenessProbe: {} ## @param customReadinessProbe Custom readinessProbe that overrides the default one # customReadinessProbe: {} ## @section Traffic Exposure Parameters ## Ghost service parameters ## service: ## @param service.type Ghost service type ## type: LoadBalancer ## @param service.ports.http Ghost service HTTP port ## @param service.ports.https Ghost service HTTPS port ## ports: http: 80 https: 443 ## Node ports to expose ## @param service.nodePorts.http Node port for HTTP ## @param service.nodePorts.https Node port for HTTPS ## NOTE: choose port between <30000-32767> ## nodePorts: http: "" https: "" ## @param service.clusterIP Ghost service Cluster IP ## e.g.: ## clusterIP: None ## clusterIP: "" ## @param service.loadBalancerIP Ghost service Load Balancer IP ## ref: https://kubernetes.io/docs/concepts/services-networking/service/#type-loadbalancer ## loadBalancerIP: "" ## @param service.loadBalancerSourceRanges Ghost service Load Balancer sources ## ref: https://kubernetes.io/docs/tasks/access-application-cluster/configure-cloud-provider-firewall/#restrict-access-for-loadbalancer-service ## e.g: ## loadBalancerSourceRanges: ## - 10.10.10.0/24 ## loadBalancerSourceRanges: [] ## @param service.externalTrafficPolicy Ghost service external traffic policy ## ref https://kubernetes.io/docs/tasks/access-application-cluster/create-external-load-balancer/#preserving-the-client-source-ip ## externalTrafficPolicy: Cluster ## @param service.annotations Additional custom annotations for Ghost service ## annotations: {} ## @param service.extraPorts Extra port to expose on Ghost service ## extraPorts: [] ## @param service.sessionAffinity Session Affinity for Kubernetes service, can be "None" or "ClientIP" ## If "ClientIP", consecutive client requests will be directed to the same Pod ## ref: https://kubernetes.io/docs/concepts/services-networking/service/#virtual-ips-and-service-proxies ## sessionAffinity: None ## @param service.sessionAffinityConfig Additional settings for the sessionAffinity ## sessionAffinityConfig: ## clientIP: ## timeoutSeconds: 300 sessionAffinityConfig: {} ## Configure the ingress resource that allows you to access the Ghost installation ## ref: https://kubernetes.io/docs/user-guide/ingress/ ## ingress: ## @param ingress.enabled Enable ingress record generation for Ghost ## enabled: false ## @param ingress.pathType Ingress path type ## pathType: ImplementationSpecific ## @param ingress.apiVersion Force Ingress API version (automatically detected if not set) ## apiVersion: "" ## @param ingress.hostname Default host for the ingress record ## hostname: ghost.local ## @param ingress.path Default path for the ingress record ## NOTE: You may need to set this to '/*' in order to use this with ALB ingress controllers ## path: / ## @param ingress.annotations Additional annotations for the Ingress resource. To enable certificate autogeneration, place here your cert-manager annotations. ## For a full list of possible ingress annotations, please see ## ref: https://github.com/kubernetes/ingress-nginx/blob/master/docs/user-guide/nginx-configuration/annotations.md ## Use this parameter to set the required annotations for cert-manager, see ## ref: https://cert-manager.io/docs/usage/ingress/#supported-annotations ## ## e.g: ## annotations: ## kubernetes.io/ingress.class: nginx ## cert-manager.io/cluster-issuer: cluster-issuer-name ## annotations: {} ## @param ingress.tls Enable TLS configuration for the host defined at `ingress.hostname` parameter ## TLS certificates will be retrieved from a TLS secret with name: `{{- printf "%s-tls" .Values.ingress.hostname }}` ## You can: ## - Use the `ingress.secrets` parameter to create this TLS secret ## - Relay on cert-manager to create it by setting the corresponding annotations ## - Relay on Helm to create self-signed certificates by setting `ingress.selfSigned=true` ## tls: false ## DEPRECATED: Use ingress.annotations instead of ingress.certManager ## certManager: false ## ## @param ingress.selfSigned Create a TLS secret for this ingress record using self-signed certificates generated by Helm ## selfSigned: false ## @param ingress.extraHosts An array with additional hostname(s) to be covered with the ingress record ## e.g: ## extraHosts: ## - name: ghost.local ## path: / ## extraHosts: [] ## @param ingress.extraPaths An array with additional arbitrary paths that may need to be added to the ingress under the main host ## e.g: ## extraPaths: ## - path: /* ## backend: ## serviceName: ssl-redirect ## servicePort: use-annotation ## extraPaths: [] ## @param ingress.extraTls TLS configuration for additional hostname(s) to be covered with this ingress record ## ref: https://kubernetes.io/docs/concepts/services-networking/ingress/#tls ## e.g: ## extraTls: ## - hosts: ## - ghost.local ## secretName: ghost.local-tls ## extraTls: [] ## @param ingress.secrets Custom TLS certificates as secrets ## NOTE: 'key' and 'certificate' are expected in PEM format ## NOTE: 'name' should line up with a 'secretName' set further up ## If it is not set and you're using cert-manager, this is unneeded, as it will create a secret for you with valid certificates ## If it is not set and you're NOT using cert-manager either, self-signed certificates will be created valid for 365 days ## It is also possible to create and manage the certificates outside of this helm chart ## Please see README.md for more information ## e.g: ## secrets: ## - name: ghost.local-tls ## key: |- ## -----BEGIN RSA PRIVATE KEY----- ## ... ## -----END RSA PRIVATE KEY----- ## certificate: |- ## -----BEGIN CERTIFICATE----- ## ... ## -----END CERTIFICATE----- ## secrets: [] ## @param ingress.ingressClassName IngressClass that will be be used to implement the Ingress (Kubernetes 1.18+) ## This is supported in Kubernetes 1.18+ and required if you have more than one IngressClass marked as the default for your cluster . ## ref: https://kubernetes.io/blog/2020/04/02/improvements-to-the-ingress-api-in-kubernetes-1.18/ ## ingressClassName: "" ## @section Persistence Parameters ## Persistence Parameters ## ref: https://kubernetes.io/docs/user-guide/persistent-volumes/ ## persistence: ## @param persistence.enabled Enable persistence using Persistent Volume Claims ## enabled: true ## @param persistence.storageClass Persistent Volume storage class ## If defined, storageClassName: <storageClass> ## If set to "-", storageClassName: "", which disables dynamic provisioning ## If undefined (the default) or set to null, no storageClassName spec is set, choosing the default provisioner ## storageClass: "" ## @param persistence.annotations Additional custom annotations for the PVC ## annotations: {} ## @param persistence.accessModes [array] Persistent Volume access modes ## accessModes: - ReadWriteOnce ## @param persistence.size Persistent Volume size ## size: 8Gi ## @param persistence.existingClaim The name of an existing PVC to use for persistence ## existingClaim: "" ## 'volumePermissions' init container parameters ## Changes the owner and group of the persistent volume mount point to runAsUser:fsGroup values ## based on the podSecurityContext/containerSecurityContext parameters ## volumePermissions: ## @param volumePermissions.enabled Enable init container that changes the owner/group of the PV mount point to `runAsUser:fsGroup` ## enabled: false ## Bitnami Shell image ## ref: https://hub.docker.com/r/bitnami/bitnami-shell/tags/ ## @param volumePermissions.image.registry Bitnami Shell image registry ## @param volumePermissions.image.repository Bitnami Shell image repository ## @param volumePermissions.image.tag Bitnami Shell image tag (immutable tags are recommended) ## @param volumePermissions.image.pullPolicy Bitnami Shell image pull policy ## @param volumePermissions.image.pullSecrets Bitnami Shell image pull secrets ## image: registry: docker.io repository: bitnami/bitnami-shell tag: 10-debian-10-r367 pullPolicy: IfNotPresent ## Optionally specify an array of imagePullSecrets. ## Secrets must be manually created in the namespace. ## ref: https://kubernetes.io/docs/tasks/configure-pod-container/pull-image-private-registry/ ## e.g: ## pullSecrets: ## - myRegistryKeySecretName ## pullSecrets: [] ## Init container's resource requests and limits ## ref: https://kubernetes.io/docs/user-guide/compute-resources/ ## @param volumePermissions.resources.limits The resources limits for the init container ## @param volumePermissions.resources.requests The requested resources for the init container ## resources: limits: {} requests: {} ## Init container Container Security Context ## ref: https://kubernetes.io/docs/tasks/configure-pod-container/security-context/#set-the-security-context-for-a-container ## @param volumePermissions.securityContext.runAsUser Set init container's Security Context runAsUser ## NOTE: when runAsUser is set to special value "auto", init container will try to chown the ## data folder to auto-determined user&group, using commands: `id -u`:`id -G | cut -d" " -f2` ## "auto" is especially useful for OpenShift which has scc with dynamic user ids (and 0 is not allowed) ## securityContext: runAsUser: 0 ## @section Database Parameters ## MariaDB chart configuration ## ref: https://github.com/bitnami/charts/blob/master/bitnami/mariadb/values.yaml ## mariadb: ## @param mariadb.enabled Deploy a MariaDB server to satisfy the applications database requirements ## To use an external database set this to false and configure the `externalDatabase.*` parameters ## enabled: true ## @param mariadb.architecture MariaDB architecture. Allowed values: `standalone` or `replication` ## architecture: standalone ## MariaDB Authentication parameters ## @param mariadb.auth.rootPassword MariaDB root password ## @param mariadb.auth.database MariaDB custom database ## @param mariadb.auth.username MariaDB custom user name ## @param mariadb.auth.password MariaDB custom user password ## @param mariadb.auth.existingSecret Existing secret with MariaDB credentials ## ref: https://github.com/bitnami/bitnami-docker-mariadb#setting-the-root-password-on-first-run ## https://github.com/bitnami/bitnami-docker-mariadb/blob/master/README.md#creating-a-database-on-first-run ## https://github.com/bitnami/bitnami-docker-mariadb/blob/master/README.md#creating-a-database-user-on-first-run auth: rootPassword: "" database: bitnami_ghost username: bn_ghost password: "" existingSecret: "" ## MariaDB Primary configuration ## primary: ## MariaDB Primary Persistence parameters ## ref: https://kubernetes.io/docs/user-guide/persistent-volumes/ ## @param mariadb.primary.persistence.enabled Enable persistence on MariaDB using PVC(s) ## @param mariadb.primary.persistence.storageClass Persistent Volume storage class ## @param mariadb.primary.persistence.accessModes [array] Persistent Volume access modes ## @param mariadb.primary.persistence.size Persistent Volume size ## persistence: enabled: true storageClass: "" accessModes: - ReadWriteOnce size: 8Gi ## External Database Configuration ## All of these values are only used if `mariadb.enabled=false` ## externalDatabase: ## @param externalDatabase.host External Database server host ## host: localhost ## @param externalDatabase.port External Database server port ## port: 3306 ## @param externalDatabase.user External Database username ## user: bn_ghost ## @param externalDatabase.password External Database user password ## password: "" ## @param externalDatabase.database External Database database name ## database: bitnami_ghost ## @param externalDatabase.existingSecret The name of an existing secret with database credentials ## NOTE: Must contain key `mariadb-password` ## NOTE: When it's set, the `externalDatabase.password` parameter is ignored ## existingSecret: "" ## @param externalDatabase.ssl External Database ssl ## ssl: false ## @param externalDatabase.sslCaFile External Database ssl CA filepath ## sslCaFile: "" ## @section NetworkPolicy parameters ## Add networkpolicies ## networkPolicy: ## @param networkPolicy.enabled Enable network policies ## If ingress.enabled or metrics.enabled are true, configure networkPolicy.ingress and networkPolicy.metrics selectors respectively to allow communication ## enabled: false ## @param networkPolicy.ingress.enabled Enable network policy for Ingress Proxies ## @param networkPolicy.ingress.namespaceSelector Ingress Proxy namespace selector labels. These labels will be used to identify the Ingress Proxy's namespace. ## @param networkPolicy.ingress.podSelector Ingress Proxy pods selector labels. These labels will be used to identify the Ingress Proxy pods. ## ingress: enabled: false ## e.g: ## podSelector: ## label: ingress ## podSelector: {} ## e.g: ## namespaceSelector: ## label: ingress ## namespaceSelector: {} ## @param networkPolicy.ingressRules.backendOnlyAccessibleByFrontend Enable ingress rule that makes the backend (mariadb) only accessible by Ghost's pods. ## @param networkPolicy.ingressRules.customBackendSelector Backend selector labels. These labels will be used to identify the backend pods. ## @param networkPolicy.ingressRules.accessOnlyFrom.enabled Enable ingress rule that makes Ghost only accessible from a particular origin ## @param networkPolicy.ingressRules.accessOnlyFrom.namespaceSelector Namespace selector label that is allowed to access Ghost. This label will be used to identified the allowed namespace(s). ## @param networkPolicy.ingressRules.accessOnlyFrom.podSelector Pods selector label that is allowed to access Ghost. This label will be used to identified the allowed pod(s). ## @param networkPolicy.ingressRules.customRules Custom network policy ingress rule ## ingressRules: ## mariadb backend only can be accessed from Ghost ## backendOnlyAccessibleByFrontend: false customBackendSelector: {} ## Allow only from the indicated: ## accessOnlyFrom: enabled: false ## e.g: ## namespaceSelector: ## label: ingress ## namespaceSelector: {} ## e.g: ## podSelector: ## label: access ## podSelector: {} ## custom ingress rules ## e.g: ## customRules: ## - from: ## - namespaceSelector: ## matchLabels: ## label: example ## customRules: {} ## @param networkPolicy.egressRules.denyConnectionsToExternal Enable egress rule that denies outgoing traffic outside the cluster, except for DNS (port 53). ## @param networkPolicy.egressRules.customRules Custom network policy rule ## egressRules: ## Deny connections to external. This is not compatible with an external database. ## denyConnectionsToExternal: false ## Additional custom egress rules ## e.g: ## customRules: ## - to: ## - namespaceSelector: ## matchLabels: ## label: example ## customRules: {} ## Service Account ## serviceAccount: ## @param serviceAccount.name Service Account Name ## name: ""
38.285326
193
0.739478
ba91890d486f43f644828eb4f12ad2cee4bab02b
880
yaml
YAML
bitnami/odoo/Chart.yaml
00arthur00/charts
502aa1e64541669b732a4eda896e5937847b6c3c
[ "Apache-2.0" ]
null
null
null
bitnami/odoo/Chart.yaml
00arthur00/charts
502aa1e64541669b732a4eda896e5937847b6c3c
[ "Apache-2.0" ]
2
2022-01-26T01:14:30.000Z
2022-01-26T07:03:39.000Z
bitnami/odoo/Chart.yaml
00arthur00/charts
502aa1e64541669b732a4eda896e5937847b6c3c
[ "Apache-2.0" ]
null
null
null
annotations: category: CRM apiVersion: v2 appVersion: 15.0.20220310 dependencies: - condition: postgresql.enabled name: postgresql repository: https://charts.bitnami.com/bitnami version: 11.x.x - name: common repository: https://charts.bitnami.com/bitnami version: 1.x.x description: Odoo is an open source ERP and CRM platform, formerly known as OpenERP, that can connect a wide variety of business operations such as sales, supply chain, finance, and project management. engine: gotpl home: https://github.com/bitnami/charts/tree/master/bitnami/odoo icon: https://bitnami.com/assets/stacks/odoo/img/odoo-stack-220x234.png keywords: - odoo - crm - www - http - web maintainers: - email: [email protected] name: Bitnami name: odoo sources: - https://github.com/bitnami/bitnami-docker-odoo - https://www.odoo.com/ version: 21.2.1
28.387097
201
0.736364
24cb33fef0e9020f67cd88b5f22c76388ff6f1a6
38,879
yaml
YAML
bitnami/redis-cluster/values.yaml
00arthur00/charts
502aa1e64541669b732a4eda896e5937847b6c3c
[ "Apache-2.0" ]
null
null
null
bitnami/redis-cluster/values.yaml
00arthur00/charts
502aa1e64541669b732a4eda896e5937847b6c3c
[ "Apache-2.0" ]
2
2022-01-26T01:14:30.000Z
2022-01-26T07:03:39.000Z
bitnami/redis-cluster/values.yaml
00arthur00/charts
502aa1e64541669b732a4eda896e5937847b6c3c
[ "Apache-2.0" ]
null
null
null
## @section Global parameters ## Global Docker image parameters ## Please, note that this will override the image parameters, including dependencies, configured to use the global value ## Current available global Docker image parameters: imageRegistry, imagePullSecrets and storageClass ## ## @param global.imageRegistry Global Docker image registry ## @param global.imagePullSecrets Global Docker registry secret names as an array ## @param global.storageClass Global StorageClass for Persistent Volume(s) ## @param global.redis.password Redis&trade; password (overrides `password`) ## global: imageRegistry: "" ## E.g. ## imagePullSecrets: ## - myRegistryKeySecretName ## imagePullSecrets: [] storageClass: "" redis: password: "" ## @section Redis&trade; Cluster Common parameters ## ## @param nameOverride String to partially override common.names.fullname template (will maintain the release name) ## nameOverride: "" ## @param fullnameOverride String to fully override common.names.fullname template ## fullnameOverride: "" ## @param clusterDomain Kubernetes Cluster Domain ## clusterDomain: cluster.local ## @param commonAnnotations Annotations to add to all deployed objects ## commonAnnotations: {} ## @param commonLabels Labels to add to all deployed objects ## commonLabels: {} ## @param extraDeploy Array of extra objects to deploy with the release (evaluated as a template) ## extraDeploy: [] ## Enable diagnostic mode in the deployment ## diagnosticMode: ## @param diagnosticMode.enabled Enable diagnostic mode (all probes will be disabled and the command will be overridden) ## enabled: false ## @param diagnosticMode.command Command to override all containers in the deployment ## command: - sleep ## @param diagnosticMode.args Args to override all containers in the deployment ## args: - infinity ## Bitnami Redis&trade; image version ## ref: https://hub.docker.com/r/bitnami/redis/tags/ ## @param image.registry Redis&trade; cluster image registry ## @param image.repository Redis&trade; cluster image repository ## @param image.tag Redis&trade; cluster image tag (immutable tags are recommended) ## @param image.pullPolicy Redis&trade; cluster image pull policy ## @param image.pullSecrets Specify docker-registry secret names as an array ## @param image.debug Enable image debug mode ## image: registry: docker.io repository: bitnami/redis-cluster ## Bitnami Redis&trade; image tag ## ref: https://github.com/bitnami/bitnami-docker-redis#supported-tags-and-respective-dockerfile-links ## tag: 6.2.6-debian-10-r140 ## Specify a imagePullPolicy ## Defaults to 'Always' if image tag is 'latest', else set to 'IfNotPresent' ## ref: https://kubernetes.io/docs/user-guide/images/#pre-pulling-images ## pullPolicy: IfNotPresent ## Optionally specify an array of imagePullSecrets. ## Secrets must be manually created in the namespace. ## ref: https://kubernetes.io/docs/tasks/configure-pod-container/pull-image-private-registry/ ## e.g: ## pullSecrets: ## - myRegistryKeySecretName ## pullSecrets: [] ## Enable debug mode ## debug: false ## Network Policy ## @param networkPolicy.enabled Enable NetworkPolicy ## @param networkPolicy.allowExternal The Policy model to apply. Don't require client label for connections ## @param networkPolicy.ingressNSMatchLabels Allow connections from other namespacess. Just set label for namespace and set label for pods (optional). ## @param networkPolicy.ingressNSPodMatchLabels For other namespaces match by pod labels and namespace labels ## networkPolicy: enabled: false ## When set to false, only pods with the correct ## client label will have network access to the port Redis&trade; is listening ## on. When true, Redis&trade; will accept connections from any source ## (with the correct destination port). ## allowExternal: true ingressNSMatchLabels: {} ingressNSPodMatchLabels: {} serviceAccount: ## @param serviceAccount.create Specifies whether a ServiceAccount should be created ## create: false ## @param serviceAccount.name The name of the ServiceAccount to create ## If not set and create is true, a name is generated using the fullname template ## name: "" ## @param serviceAccount.annotations Annotations for Cassandra Service Account ## annotations: {} ## @param serviceAccount.automountServiceAccountToken Automount API credentials for a service account. ## automountServiceAccountToken: false rbac: ## @param rbac.create Specifies whether RBAC resources should be created ## create: false role: ## @param rbac.role.rules Rules to create. It follows the role specification ## rules: ## - apiGroups: ## - extensions ## resources: ## - podsecuritypolicies ## verbs: ## - use ## resourceNames: ## - gce.unprivileged ## rules: [] ## Redis&trade; pod Security Context ## @param podSecurityContext.enabled Enable Redis&trade; pod Security Context ## @param podSecurityContext.fsGroup Group ID for the pods ## @param podSecurityContext.runAsUser User ID for the pods ## @param podSecurityContext.sysctls Set namespaced sysctls for the pods ## podSecurityContext: enabled: true fsGroup: 1001 runAsUser: 1001 ## Uncomment the setting below to increase the net.core.somaxconn value ## e.g: ## sysctls: ## - name: net.core.somaxconn ## value: "10000" ## sysctls: [] ## @param podDisruptionBudget Limits the number of pods of the replicated application that are down simultaneously from voluntary disruptions ## ref: https://kubernetes.io/docs/concepts/workloads/pods/disruptions ## podDisruptionBudget: {} ## @param minAvailable Min number of pods that must still be available after the eviction ## minAvailable: "" ## @param maxUnavailable Max number of pods that can be unavailable after the eviction ## maxUnavailable: "" ## Containers Security Context ## @param containerSecurityContext.enabled Enable Containers' Security Context ## @param containerSecurityContext.runAsUser User ID for the containers. ## @param containerSecurityContext.runAsNonRoot Run container as non root ## containerSecurityContext: enabled: true runAsUser: 1001 runAsNonRoot: true ## @param usePassword Use password authentication ## usePassword: true ## @param password Redis&trade; password (ignored if existingSecret set) ## Defaults to a random 10-character alphanumeric string if not set and usePassword is true ## ref: https://github.com/bitnami/bitnami-docker-redis#setting-the-server-password-on-first-run ## password: "" ## @param existingSecret Name of existing secret object (for password authentication) ## existingSecret: "" ## @param existingSecretPasswordKey Name of key containing password to be retrieved from the existing secret ## existingSecretPasswordKey: "" ## @param usePasswordFile Mount passwords as files instead of environment variables ## usePasswordFile: false ## ## TLS configuration ## tls: ## @param tls.enabled Enable TLS support for replication traffic ## enabled: false ## @param tls.authClients Require clients to authenticate or not ## authClients: true ## @param tls.autoGenerated Generate automatically self-signed TLS certificates ## autoGenerated: false ## @param tls.existingSecret The name of the existing secret that contains the TLS certificates ## existingSecret: "" ## @param tls.certificatesSecret DEPRECATED. Use tls.existingSecret instead ## certificatesSecret: "" ## @param tls.certFilename Certificate filename ## certFilename: "" ## @param tls.certKeyFilename Certificate key filename ## certKeyFilename: "" ## @param tls.certCAFilename CA Certificate filename ## certCAFilename: "" ## @param tls.dhParamsFilename File containing DH params (in order to support DH based ciphers) ## dhParamsFilename: "" ## Redis&trade; Service properties for standalone mode. ## service: ## @param service.ports.redis Kubernetes Redis service port ## ports: redis: 6379 ## Node ports to expose ## ref: https://kubernetes.io/docs/concepts/services-networking/service/#type-nodeport ## @param service.nodePorts.redis Node port for Redis ## nodePorts: redis: "" ## @param service.extraPorts Extra ports to expose in the service (normally used with the `sidecar` value) ## extraPorts: [] ## @param service.annotations Provide any additional annotations which may be required. ## This can be used to set the LoadBalancer service type to internal only. ## ref: https://kubernetes.io/docs/concepts/services-networking/service/#internal-load-balancer ## annotations: {} ## @param service.labels Additional labels for redis service ## labels: {} ## @param service.type Service type for default redis service ## Setting this to LoadBalancer may require corresponding service annotations for loadbalancer creation to succeed. ## Currently supported types are ClusterIP (default) and LoadBalancer ## type: ClusterIP ## @param service.clusterIP Service Cluster IP ## e.g.: ## clusterIP: None ## clusterIP: "" ## @param service.loadBalancerIP Load balancer IP if `service.type` is `LoadBalancer` ## If service.type is LoadBalancer, request a specific static IP address if supported by the cloud provider, otherwise leave blank ## loadBalancerIP: "" ## @param service.loadBalancerSourceRanges Service Load Balancer sources ## ref: https://kubernetes.io/docs/tasks/access-application-cluster/configure-cloud-provider-firewall/#restrict-access-for-loadbalancer-service ## e.g: ## loadBalancerSourceRanges: ## - 10.10.10.0/24 ## loadBalancerSourceRanges: [] ## @param service.externalTrafficPolicy Service external traffic policy ## ref https://kubernetes.io/docs/tasks/access-application-cluster/create-external-load-balancer/#preserving-the-client-source-ip ## externalTrafficPolicy: Cluster ## Enable persistence using Persistent Volume Claims ## ref: https://kubernetes.io/docs/user-guide/persistent-volumes/ ## persistence: ## @param persistence.path Path to mount the volume at, to use other images Redis&trade; images. ## path: /bitnami/redis/data ## @param persistence.subPath The subdirectory of the volume to mount to, useful in dev environments and one PV for multiple services ## subPath: "" ## @param persistence.storageClass Storage class of backing PVC ## If defined, storageClassName: <storageClass> ## If set to "-", storageClassName: "", which disables dynamic provisioning ## If undefined (the default) or set to null, no storageClassName spec is ## set, choosing the default provisioner. (gp2 on AWS, standard on ## GKE, AWS & OpenStack) ## storageClass: "" ## @param persistence.annotations Persistent Volume Claim annotations ## annotations: {} ## @param persistence.accessModes Persistent Volume Access Modes ## accessModes: - ReadWriteOnce ## @param persistence.size Size of data volume ## size: 8Gi ## @param persistence.matchLabels Persistent Volume selectors ## https://kubernetes.io/docs/concepts/storage/persistent-volumes/#selector ## matchLabels: {} ## @param persistence.matchExpressions matchExpressions Persistent Volume selectors ## matchExpressions: {} ## Init containers parameters: ## volumePermissions: Change the owner of the persist volume mountpoint to RunAsUser:fsGroup ## volumePermissions: ## @param volumePermissions.enabled Enable init container that changes volume permissions in the registry (for cases where the default k8s `runAsUser` and `fsUser` values do not work) ## enabled: false ## @param volumePermissions.image.registry Init container volume-permissions image registry ## @param volumePermissions.image.repository Init container volume-permissions image repository ## @param volumePermissions.image.tag Init container volume-permissions image tag ## @param volumePermissions.image.pullPolicy Init container volume-permissions image pull policy ## @param volumePermissions.image.pullSecrets Specify docker-registry secret names as an array ## image: registry: docker.io repository: bitnami/bitnami-shell tag: 10-debian-10-r349 pullPolicy: IfNotPresent ## Optionally specify an array of imagePullSecrets. ## Secrets must be manually created in the namespace. ## ref: https://kubernetes.io/docs/tasks/configure-pod-container/pull-image-private-registry/ ## e.g: ## pullSecrets: ## - myRegistryKeySecretName ## pullSecrets: [] ## Container resource requests and limits ## ref: https://kubernetes.io/docs/user-guide/compute-resources/ ## @param volumePermissions.resources.limits The resources limits for the container ## @param volumePermissions.resources.requests The requested resources for the container ## resources: ## Example: ## limits: ## cpu: 100m ## memory: 128Mi ## limits: {} ## Examples: ## requests: ## cpu: 100m ## memory: 128Mi ## requests: {} ## PodSecurityPolicy configuration ## ref: https://kubernetes.io/docs/concepts/policy/pod-security-policy/ ## @param podSecurityPolicy.create Whether to create a PodSecurityPolicy. WARNING: PodSecurityPolicy is deprecated in Kubernetes v1.21 or later, unavailable in v1.25 or later ## podSecurityPolicy: create: false ## @section Redis&trade; statefulset parameters ## redis: ## @param redis.command Redis&trade; entrypoint string. The command `redis-server` is executed if this is not provided ## command: [] ## @param redis.args Arguments for the provided command if needed ## args: [] ## @param redis.updateStrategy.type Argo Workflows statefulset strategy type ## ref: https://kubernetes.io/docs/concepts/workloads/controllers/statefulset/#update-strategies ## updateStrategy: ## StrategyType ## Can be set to RollingUpdate or OnDelete ## type: RollingUpdate ## @param redis.updateStrategy.rollingUpdate.partition Partition update strategy ## https://kubernetes.io/docs/concepts/workloads/controllers/statefulset/#partitions ## rollingUpdate: partition: 0 ## @param redis.podManagementPolicy Statefulset Pod management policy, it needs to be Parallel to be able to complete the cluster join ## Ref: https://kubernetes.io/docs/concepts/workloads/controllers/statefulset/#pod-management-policies ## podManagementPolicy: Parallel ## @param redis.hostAliases Deployment pod host aliases ## https://kubernetes.io/docs/concepts/services-networking/add-entries-to-pod-etc-hosts-with-host-aliases/ ## hostAliases: [] ## @param redis.hostNetwork Host networking requested for this pod. Use the host's network namespace. ## https://kubernetes.io/docs/reference/generated/kubernetes-api/v1.22/#podspec-v1-core ## hostNetwork: false ## @param redis.useAOFPersistence Whether to use AOF Persistence mode or not ## It is strongly recommended to use this type when dealing with clusters ## ref: https://redis.io/topics/persistence#append-only-file ## ref: https://redis.io/topics/cluster-tutorial#creating-and-using-a-redis-cluster ## useAOFPersistence: "yes" ## @param redis.containerPorts.redis Redis&trade; port ## @param redis.containerPorts.bus The busPort should be obtained adding 10000 to the redisPort. By default: 10000 + 6379 = 16379 ## containerPorts: redis: 6379 bus: 16379 ## @param redis.lifecycleHooks LifecycleHook to set additional configuration before or after startup. Evaluated as a template ## lifecycleHooks: {} ## @param redis.extraVolumes Extra volumes to add to the deployment ## extraVolumes: [] ## @param redis.extraVolumeMounts Extra volume mounts to add to the container ## extraVolumeMounts: [] ## @param redis.customLivenessProbe Override default liveness probe ## customLivenessProbe: {} ## @param redis.customReadinessProbe Override default readiness probe ## customReadinessProbe: {} ## @param redis.customStartupProbe Custom startupProbe that overrides the default one ## customStartupProbe: {} ## @param redis.initContainers Extra init containers to add to the deployment ## initContainers: [] ## @param redis.sidecars Extra sidecar containers to add to the deployment ## sidecars: [] ## @param redis.podLabels Additional labels for Redis&trade; pod ## ref: https://kubernetes.io/docs/concepts/overview/working-with-objects/labels/ ## podLabels: {} ## @param redis.priorityClassName Redis&trade; Master pod priorityClassName ## priorityClassName: "" ## @param redis.configmap Additional Redis&trade; configuration for the nodes ## ref: https://redis.io/topics/config ## configmap: "" ## @param redis.extraEnvVars An array to add extra environment variables ## For example: ## - name: BEARER_AUTH ## value: true ## extraEnvVars: [] ## @param redis.extraEnvVarsCM ConfigMap with extra environment variables ## extraEnvVarsCM: "" ## @param redis.extraEnvVarsSecret Secret with extra environment variables ## extraEnvVarsSecret: "" ## @param redis.podAnnotations Redis&trade; additional annotations ## ref: https://kubernetes.io/docs/concepts/overview/working-with-objects/labels/ ## podAnnotations: {} ## Redis&trade; resource requests and limits ## ref: https://kubernetes.io/docs/user-guide/compute-resources/ ## @param redis.resources.limits The resources limits for the container ## @param redis.resources.requests The requested resources for the container ## resources: ## Example: ## limits: ## cpu: 100m ## memory: 128Mi ## limits: {} ## Examples: ## requests: ## cpu: 100m ## memory: 128Mi ## requests: {} ## @param redis.schedulerName Use an alternate scheduler, e.g. "stork". ## ref: https://kubernetes.io/docs/tasks/administer-cluster/configure-multiple-schedulers/ ## schedulerName: "" ## @param redis.shareProcessNamespace Enable shared process namespace in a pod. ## If set to false (default), each container will run in separate namespace, redis will have PID=1. ## If set to true, the /pause will run as init process and will reap any zombie PIDs, ## for example, generated by a custom exec probe running longer than a probe timeoutSeconds. ## Enable this only if customLivenessProbe or customReadinessProbe is used and zombie PIDs are accumulating. ## Ref: https://kubernetes.io/docs/tasks/configure-pod-container/share-process-namespace/ ## shareProcessNamespace: false ## Configure extra options for Redis&trade; liveness probes ## ref: https://kubernetes.io/docs/tasks/configure-pod-container/configure-liveness-readiness-probes/#configure-probes) ## @param redis.livenessProbe.enabled Enable livenessProbe ## @param redis.livenessProbe.initialDelaySeconds Initial delay seconds for livenessProbe ## @param redis.livenessProbe.periodSeconds Period seconds for livenessProbe ## @param redis.livenessProbe.timeoutSeconds Timeout seconds for livenessProbe ## @param redis.livenessProbe.failureThreshold Failure threshold for livenessProbe ## @param redis.livenessProbe.successThreshold Success threshold for livenessProbe ## livenessProbe: enabled: true initialDelaySeconds: 5 periodSeconds: 5 timeoutSeconds: 5 successThreshold: 1 failureThreshold: 5 ## Configure extra options for Redis&trade; readiness probes ## ref: https://kubernetes.io/docs/tasks/configure-pod-container/configure-liveness-readiness-probes/#configure-probes) ## @param redis.readinessProbe.enabled Enable readinessProbe ## @param redis.readinessProbe.initialDelaySeconds Initial delay seconds for readinessProbe ## @param redis.readinessProbe.periodSeconds Period seconds for readinessProbe ## @param redis.readinessProbe.timeoutSeconds Timeout seconds for readinessProbe ## @param redis.readinessProbe.failureThreshold Failure threshold for readinessProbe ## @param redis.readinessProbe.successThreshold Success threshold for readinessProbe ## readinessProbe: enabled: true initialDelaySeconds: 5 periodSeconds: 5 timeoutSeconds: 1 successThreshold: 1 failureThreshold: 5 ## @param redis.startupProbe.enabled Enable startupProbe ## @param redis.startupProbe.path Path to check for startupProbe ## @param redis.startupProbe.initialDelaySeconds Initial delay seconds for startupProbe ## @param redis.startupProbe.periodSeconds Period seconds for startupProbe ## @param redis.startupProbe.timeoutSeconds Timeout seconds for startupProbe ## @param redis.startupProbe.failureThreshold Failure threshold for startupProbe ## @param redis.startupProbe.successThreshold Success threshold for startupProbe ## startupProbe: enabled: false path: / initialDelaySeconds: 300 periodSeconds: 10 timeoutSeconds: 5 failureThreshold: 6 successThreshold: 1 ## @param redis.podAffinityPreset Redis&trade; pod affinity preset. Ignored if `redis.affinity` is set. Allowed values: `soft` or `hard` ## ref: https://kubernetes.io/docs/concepts/scheduling-eviction/assign-pod-node/#inter-pod-affinity-and-anti-affinity ## podAffinityPreset: "" ## @param redis.podAntiAffinityPreset Redis&trade; pod anti-affinity preset. Ignored if `redis.affinity` is set. Allowed values: `soft` or `hard` ## ref: https://kubernetes.io/docs/concepts/scheduling-eviction/assign-pod-node/#inter-pod-affinity-and-anti-affinity ## podAntiAffinityPreset: soft ## Redis&trade; node affinity preset ## ref: https://kubernetes.io/docs/concepts/scheduling-eviction/assign-pod-node/#node-affinity ## nodeAffinityPreset: ## @param redis.nodeAffinityPreset.type Redis&trade; node affinity preset type. Ignored if `redis.affinity` is set. Allowed values: `soft` or `hard` ## type: "" ## @param redis.nodeAffinityPreset.key Redis&trade; node label key to match Ignored if `redis.affinity` is set. ## E.g. ## key: "kubernetes.io/e2e-az-name" ## key: "" ## @param redis.nodeAffinityPreset.values Redis&trade; node label values to match. Ignored if `redis.affinity` is set. ## E.g. ## values: ## - e2e-az1 ## - e2e-az2 ## values: [] ## @param redis.affinity Affinity settings for Redis&trade; pod assignment ## ref: https://kubernetes.io/docs/concepts/configuration/assign-pod-node/#affinity-and-anti-affinity ## Note: redis.podAffinityPreset, redis.podAntiAffinityPreset, and redis.nodeAffinityPreset will be ignored when it's set ## affinity: {} ## @param redis.nodeSelector Node labels for Redis&trade; pods assignment ## ref: https://kubernetes.io/docs/user-guide/node-selection/ ## nodeSelector: {} ## @param redis.tolerations Tolerations for Redis&trade; pods assignment ## ref: https://kubernetes.io/docs/concepts/configuration/taint-and-toleration/ ## tolerations: [] ## @param redis.topologySpreadConstraints Pod topology spread constraints for Redis&trade; pod ## https://kubernetes.io/docs/concepts/workloads/pods/pod-topology-spread-constraints/ ## The value is evaluated as a template ## topologySpreadConstraints: [] ## @section Cluster update job parameters ## ## Cluster update job settings ## updateJob: ## @param updateJob.activeDeadlineSeconds Number of seconds the Job to create the cluster will be waiting for the Nodes to be ready. ## activeDeadlineSeconds: 600 ## @param updateJob.command Container command (using container default if not set) ## command: [] ## @param updateJob.args Container args (using container default if not set) ## args: [] ## @param updateJob.hostAliases Deployment pod host aliases ## https://kubernetes.io/docs/concepts/services-networking/add-entries-to-pod-etc-hosts-with-host-aliases/ ## hostAliases: [] ## @param updateJob.annotations Job annotations ## annotations: {} ## @param updateJob.podAnnotations Job pod annotations ## podAnnotations: {} ## @param updateJob.podLabels Pod extra labels ## ref: https://kubernetes.io/docs/concepts/overview/working-with-objects/labels/ ## podLabels: {} ## @param updateJob.extraEnvVars An array to add extra environment variables ## For example: ## - name: BEARER_AUTH ## value: true ## extraEnvVars: [] ## @param updateJob.extraEnvVarsCM ConfigMap containing extra environment variables ## extraEnvVarsCM: "" ## @param updateJob.extraEnvVarsSecret Secret containing extra environment variables ## extraEnvVarsSecret: "" ## @param updateJob.extraVolumes Extra volumes to add to the deployment ## extraVolumes: [] ## @param updateJob.extraVolumeMounts Extra volume mounts to add to the container ## extraVolumeMounts: [] ## @param updateJob.initContainers Extra init containers to add to the deployment ## initContainers: [] ## @param updateJob.podAffinityPreset Update job pod affinity preset. Ignored if `updateJob.affinity` is set. Allowed values: `soft` or `hard` ## ref: https://kubernetes.io/docs/concepts/scheduling-eviction/assign-pod-node/#inter-pod-affinity-and-anti-affinity ## podAffinityPreset: "" ## @param updateJob.podAntiAffinityPreset Update job pod anti-affinity preset. Ignored if `updateJob.affinity` is set. Allowed values: `soft` or `hard` ## ref: https://kubernetes.io/docs/concepts/scheduling-eviction/assign-pod-node/#inter-pod-affinity-and-anti-affinity ## podAntiAffinityPreset: soft ## Update job node affinity preset ## ref: https://kubernetes.io/docs/concepts/scheduling-eviction/assign-pod-node/#node-affinity ## nodeAffinityPreset: ## @param updateJob.nodeAffinityPreset.type Update job node affinity preset type. Ignored if `updateJob.affinity` is set. Allowed values: `soft` or `hard` ## type: "" ## @param updateJob.nodeAffinityPreset.key Update job node label key to match Ignored if `updateJob.affinity` is set. ## E.g. ## key: "kubernetes.io/e2e-az-name" ## key: "" ## @param updateJob.nodeAffinityPreset.values Update job node label values to match. Ignored if `updateJob.affinity` is set. ## E.g. ## values: ## - e2e-az1 ## - e2e-az2 ## values: [] ## @param updateJob.affinity Affinity for update job pods assignment ## ref: https://kubernetes.io/docs/concepts/configuration/assign-pod-node/#affinity-and-anti-affinity ## Note: updateJob.podAffinityPreset, updateJob.podAntiAffinityPreset, and updateJob.nodeAffinityPreset will be ignored when it's set ## affinity: {} ## @param updateJob.nodeSelector Node labels for update job pods assignment ## ref: https://kubernetes.io/docs/user-guide/node-selection/ ## nodeSelector: {} ## @param updateJob.tolerations Tolerations for update job pods assignment ## ref: https://kubernetes.io/docs/concepts/configuration/taint-and-toleration/ ## tolerations: [] ## @param updateJob.priorityClassName Priority class name ## priorityClassName: "" ## Container resource requests and limits ## ref: https://kubernetes.io/docs/user-guide/compute-resources/ ## We usually recommend not to specify default resources and to leave this as a conscious ## choice for the user. This also increases chances charts run on environments with little ## resources, such as Minikube. If you do want to specify resources, uncomment the following ## lines, adjust them as necessary, and remove the curly braces after 'resources:'. ## @param updateJob.resources.limits The resources limits for the container ## @param updateJob.resources.requests The requested resources for the container ## resources: ## Example: ## limits: ## cpu: 500m ## memory: 1Gi ## limits: {} ## Examples: ## requests: ## cpu: 250m ## memory: 256Mi ## requests: {} ## @section Cluster management parameters ## ## Redis&trade; Cluster settings ## cluster: ## @param cluster.init Enable the initialization of the Redis&trade; Cluster ## init: true ## Number of Redis&trade; nodes to be deployed ## ## Note: ## This is total number of nodes including the replicas. Meaning there will be 3 master and 3 replica ## nodes (as replica count is set to 1 by default, there will be 1 replica per master node). ## Hence, nodes = numberOfMasterNodes + numberOfMasterNodes * replicas ## ## @param cluster.nodes The number of master nodes should always be >= 3, otherwise cluster creation will fail ## nodes: 6 ## @param cluster.replicas Number of replicas for every master in the cluster ## Parameter to be passed as --cluster-replicas to the redis-cli --cluster create ## 1 means that we want a replica for every master created ## replicas: 1 ## Configuration to access the Redis&trade; Cluster from outside the Kubernetes cluster ## externalAccess: ## @param cluster.externalAccess.enabled Enable access to the Redis ## enabled: false service: ## @param cluster.externalAccess.service.type Type for the services used to expose every Pod ## At this moment only LoadBalancer is supported ## type: LoadBalancer ## @param cluster.externalAccess.service.port Port for the services used to expose every Pod ## port: 6379 ## @param cluster.externalAccess.service.loadBalancerIP Array of load balancer IPs for each Redis&trade; node. Length must be the same as cluster.nodes ## loadBalancerIP: [] ## @param cluster.externalAccess.service.annotations Annotations to add to the services used to expose every Pod of the Redis&trade; Cluster ## annotations: {} ## This section allows to update the Redis&trade; cluster nodes. ## update: ## @param cluster.update.addNodes Boolean to specify if you want to add nodes after the upgrade ## Setting this to true a hook will add nodes to the Redis&trade; cluster after the upgrade. currentNumberOfNodes and currentNumberOfReplicas is required ## addNodes: false ## @param cluster.update.currentNumberOfNodes Number of currently deployed Redis&trade; nodes ## currentNumberOfNodes: 6 ## @param cluster.update.currentNumberOfReplicas Number of currently deployed Redis&trade; replicas ## currentNumberOfReplicas: 1 ## @param cluster.update.newExternalIPs External IPs obtained from the services for the new nodes to add to the cluster ## newExternalIPs: [] ## @section Metrics sidecar parameters ## ## Prometheus Exporter / Metrics ## metrics: ## @param metrics.enabled Start a side-car prometheus exporter ## enabled: false ## @param metrics.image.registry Redis&trade; exporter image registry ## @param metrics.image.repository Redis&trade; exporter image name ## @param metrics.image.tag Redis&trade; exporter image tag ## @param metrics.image.pullPolicy Redis&trade; exporter image pull policy ## @param metrics.image.pullSecrets Specify docker-registry secret names as an array ## image: registry: docker.io repository: bitnami/redis-exporter tag: 1.35.1-debian-10-r10 pullPolicy: IfNotPresent ## Optionally specify an array of imagePullSecrets. ## Secrets must be manually created in the namespace. ## ref: https://kubernetes.io/docs/tasks/configure-pod-container/pull-image-private-registry/ ## e.g: ## pullSecrets: ## - myRegistryKeySecretName ## pullSecrets: [] ## @param metrics.resources Metrics exporter resource requests and limits ## ref: https://kubernetes.io/docs/user-guide/compute-resources/ ## resources: {} ## @param metrics.extraArgs Extra arguments for the binary; possible values [here](https://github.com/oliver006/redis_exporter ## extraArgs: ## check-keys: myKey,myOtherKey ## extraArgs: {} ## @param metrics.podAnnotations [object] Additional annotations for Metrics exporter pod ## podAnnotations: prometheus.io/scrape: "true" prometheus.io/port: "9121" ## @param metrics.podLabels Additional labels for Metrics exporter pod ## podLabels: {} ## Enable this if you're using https://github.com/coreos/prometheus-operator ## serviceMonitor: ## @param metrics.serviceMonitor.enabled If `true`, creates a Prometheus Operator ServiceMonitor (also requires `metrics.enabled` to be `true`) ## enabled: false ## @param metrics.serviceMonitor.namespace Optional namespace which Prometheus is running in ## namespace: "" ## @param metrics.serviceMonitor.interval How frequently to scrape metrics (use by default, falling back to Prometheus' default) ## interval: "" ## @param metrics.serviceMonitor.scrapeTimeout Timeout after which the scrape is ended ## ref: https://github.com/coreos/prometheus-operator/blob/master/Documentation/api.md#endpoint ## e.g: ## scrapeTimeout: 10s ## scrapeTimeout: "" ## @param metrics.serviceMonitor.selector Prometheus instance selector labels ## ref: https://github.com/bitnami/charts/tree/master/bitnami/prometheus-operator#prometheus-configuration ## e.g: ## selector: ## prometheus: my-prometheus ## selector: {} ## @param metrics.serviceMonitor.labels ServiceMonitor extra labels ## labels: {} ## @param metrics.serviceMonitor.annotations ServiceMonitor annotations ## annotations: {} ## @param metrics.serviceMonitor.jobLabel The name of the label on the target service to use as the job name in prometheus. ## jobLabel: "" ## @param metrics.serviceMonitor.relabelings RelabelConfigs to apply to samples before scraping ## ref: https://github.com/coreos/prometheus-operator/blob/master/Documentation/api.md#relabelconfig ## relabelings: [] ## @param metrics.serviceMonitor.metricRelabelings MetricRelabelConfigs to apply to samples before ingestion ## ref: https://github.com/coreos/prometheus-operator/blob/master/Documentation/api.md#relabelconfig ## metricRelabelings: [] ## Custom PrometheusRule to be defined ## The value is evaluated as a template, so, for example, the value can depend on .Release or .Chart ## ref: https://github.com/coreos/prometheus-operator#customresourcedefinitions ## @param metrics.prometheusRule.enabled Set this to true to create prometheusRules for Prometheus operator ## @param metrics.prometheusRule.additionalLabels Additional labels that can be used so prometheusRules will be discovered by Prometheus ## @param metrics.prometheusRule.namespace namespace where prometheusRules resource should be created ## @param metrics.prometheusRule.rules Create specified [rules](https://prometheus.io/docs/prometheus/latest/configuration/alerting_rules/), check values for an example. ## prometheusRule: enabled: false additionalLabels: {} namespace: "" ## These are just examples rules, please adapt them to your needs. ## Make sure to constraint the rules to the current postgresql service. ## - alert: RedisDown ## expr: redis_up{service="{{ template "common.names.fullname" . }}-metrics"} == 0 ## for: 2m ## labels: ## severity: error ## annotations: ## summary: Redis&trade; instance {{ "{{ $instance }}" }} down ## description: Redis&trade; instance {{ "{{ $instance }}" }} is down. ## - alert: RedisMemoryHigh ## expr: > ## redis_memory_used_bytes{service="{{ template "common.names.fullname" . }}-metrics"} * 100 ## / ## redis_memory_max_bytes{service="{{ template "common.names.fullname" . }}-metrics"} ## > 90 ## for: 2m ## labels: ## severity: error ## annotations: ## summary: Redis&trade; instance {{ "{{ $instance }}" }} is using too much memory ## description: Redis&trade; instance {{ "{{ $instance }}" }} is using {{ "{{ $value }}" }}% of its available memory. ## - alert: RedisKeyEviction ## expr: increase(redis_evicted_keys_total{service="{{ template "common.names.fullname" . }}-metrics"}[5m]) > 0 ## for: 1s ## labels: ## severity: error ## annotations: ## summary: Redis&trade; instance {{ "{{ $instance }}" }} has evicted keys ## description: Redis&trade; instance {{ "{{ $instance }}" }} has evicted {{ "{{ $value }}" }} keys in the last 5 minutes. ## rules: [] ## @param metrics.priorityClassName Metrics exporter pod priorityClassName ## priorityClassName: "" ## @param metrics.service.type Kubernetes Service type (redis metrics) ## @param metrics.service.loadBalancerIP Use serviceLoadBalancerIP to request a specific static IP, otherwise leave blank ## @param metrics.service.annotations Annotations for the services to monitor. ## @param metrics.service.labels Additional labels for the metrics service ## service: type: ClusterIP ## @param metrics.service.clusterIP Service Cluster IP ## e.g.: ## clusterIP: None ## clusterIP: "" loadBalancerIP: "" annotations: {} labels: {} ## @section Sysctl Image parameters ## ## Sysctl InitContainer ## Used to perform sysctl operation to modify Kernel settings (needed sometimes to avoid warnings) ## sysctlImage: ## @param sysctlImage.enabled Enable an init container to modify Kernel settings ## enabled: false ## @param sysctlImage.command sysctlImage command to execute ## command: [] ## @param sysctlImage.registry sysctlImage Init container registry ## @param sysctlImage.repository sysctlImage Init container repository ## @param sysctlImage.tag sysctlImage Init container tag ## @param sysctlImage.pullPolicy sysctlImage Init container pull policy ## @param sysctlImage.pullSecrets Specify docker-registry secret names as an array ## registry: docker.io repository: bitnami/bitnami-shell tag: 10-debian-10-r349 pullPolicy: IfNotPresent ## Optionally specify an array of imagePullSecrets. ## Secrets must be manually created in the namespace. ## ref: https://kubernetes.io/docs/tasks/configure-pod-container/pull-image-private-registry/ ## e.g: ## pullSecrets: ## - myRegistryKeySecretName ## pullSecrets: [] ## @param sysctlImage.mountHostSys Mount the host `/sys` folder to `/host-sys` ## mountHostSys: false ## Container resource requests and limits ## ref: https://kubernetes.io/docs/user-guide/compute-resources/ ## @param sysctlImage.resources.limits The resources limits for the container ## @param sysctlImage.resources.requests The requested resources for the container ## resources: ## Example: ## limits: ## cpu: 100m ## memory: 128Mi ## limits: {} ## Examples: ## requests: ## cpu: 100m ## memory: 128Mi ## requests: {}
40.372793
185
0.725867
cb7474ff931128842ed7719addd5d24688923b2a
26,736
yaml
YAML
bitnami/consul/values.yaml
00arthur00/charts
502aa1e64541669b732a4eda896e5937847b6c3c
[ "Apache-2.0" ]
null
null
null
bitnami/consul/values.yaml
00arthur00/charts
502aa1e64541669b732a4eda896e5937847b6c3c
[ "Apache-2.0" ]
null
null
null
bitnami/consul/values.yaml
00arthur00/charts
502aa1e64541669b732a4eda896e5937847b6c3c
[ "Apache-2.0" ]
null
null
null
## @section Global parameters ## Global Docker image parameters ## Please, note that this will override the image parameters, including dependencies, configured to use the global value ## Current available global Docker image parameters: imageRegistry, imagePullSecrets and storageClass ## ## @param global.imageRegistry Global Docker image registry ## @param global.imagePullSecrets Global Docker registry secret names as an array ## @param global.storageClass Global StorageClass for Persistent Volume(s) ## global: imageRegistry: "" ## E.g. ## imagePullSecrets: ## - myRegistryKeySecretName ## imagePullSecrets: [] storageClass: "" ## @section Common parameters ## ## @param kubeVersion Override Kubernetes version ## kubeVersion: "" ## @param nameOverride String to partially override common.names.fullname ## nameOverride: "" ## @param fullnameOverride String to fully override common.names.fullname ## fullnameOverride: "" ## @param commonLabels Labels to add to all deployed objects (sub-charts are not considered) ## commonLabels: {} ## @param commonAnnotations Annotations to add to all deployed objects (sub-charts are not considered) ## commonAnnotations: {} ## @param clusterDomain Kubernetes cluster domain name ## clusterDomain: cluster.local ## @param extraDeploy Array of extra objects to deploy with the release ## extraDeploy: [] ## Enable diagnostic mode in the deployment ## diagnosticMode: ## @param diagnosticMode.enabled Enable diagnostic mode (all probes will be disabled and the command will be overridden) ## enabled: false ## @param diagnosticMode.command Command to override all containers in the deployment ## command: - sleep ## @param diagnosticMode.args Args to override all containers in the deployment ## args: - infinity ## @section HashiCorp Consul parameters ## ## Bitnami HashiCorp Consul image ## ref: https://hub.docker.com/r/bitnami/consul/tags/ ## @param image.registry HashiCorp Consul image registry ## @param image.repository HashiCorp Consul image repository ## @param image.tag HashiCorp Consul image tag (immutable tags are recommended) ## @param image.pullPolicy HashiCorp Consul image pull policy ## @param image.pullSecrets HashiCorp Consul image pull secrets ## @param image.debug Enable image debug mode ## image: registry: docker.io repository: bitnami/consul tag: 1.11.4-debian-10-r9 ## Specify a imagePullPolicy ## Defaults to 'Always' if image tag is 'latest', else set to 'IfNotPresent' ## ref: https://kubernetes.io/docs/user-guide/images/#pre-pulling-images ## pullPolicy: IfNotPresent ## Optionally specify an array of imagePullSecrets. ## Secrets must be manually created in the namespace. ## ref: https://kubernetes.io/docs/tasks/configure-pod-container/pull-image-private-registry/ ## e.g: ## pullSecrets: ## - myRegistryKeySecretName ## pullSecrets: [] ## Enable debug mode ## debug: false ## @param datacenterName Datacenter name for Consul. If not supplied, will use the Consul ## datacenterName: dc1 ## @param domain Consul domain name ## domain: consul ## @param raftMultiplier Multiplier used to scale key Raft timing parameters ## raftMultiplier: "1" ## @param gossipKey Gossip key for all members. The key must be 16-bytes, can be generated with $(consul keygen) ## Example: ## gossipKey: 887Syd/BOvbtvRAKviazMg== ## gossipKey: "" ## @param tlsEncryptionSecretName Name of existing secret with TLS encryption data ## Use TLS to verify the authenticity of servers and clients. ## Check README for more information. ## Example: ## tlsEncryptionSecretName: your-already-created-secret ## tlsEncryptionSecretName: "" ## @param hostAliases Deployment pod host aliases ## https://kubernetes.io/docs/concepts/services-networking/add-entries-to-pod-etc-hosts-with-host-aliases/ ## hostAliases: [] ## @param configuration HashiCorp Consul configuration to be injected as ConfigMap ## Example: ## configuration: |- ## { ## "datacenter":"dc2", ## "domain":"consul", ## "data_dir":"/opt/bitnami/consul/data", ## "pid_file":"/opt/bitnami/consul/tmp/consul.pid", ## "server":true, ## "ui":false, ## "bootstrap_expect":3, ## "addresses": { ## "http":"0.0.0.0" ## }, ## "ports": { ## "http":8500, ## "dns":8600, ## "serf_lan":8301, ## "server":8300 ## }, ## "serf_lan":"0.0.0.0" ## } ## configuration: "" ## @param existingConfigmap ConfigMap with HashiCorp Consul configuration ## existingConfigmap: "" ## @param localConfig Extra configuration that will be added to the default one ## Example: ## localConfig: |- ## { ## "key": "value" ## } ## localConfig: "" ## @param podLabels Pod labels ## ref: https://kubernetes.io/docs/concepts/overview/working-with-objects/labels/ ## podLabels: {} ## @param priorityClassName Priority class assigned to the Pods ## priorityClassName: "" ## @param schedulerName Alternative scheduler ## ref: https://kubernetes.io/docs/tasks/administer-cluster/configure-multiple-schedulers/ ## schedulerName: "" ## @param topologySpreadConstraints Topology Spread Constraints for pod assignment ## https://kubernetes.io/docs/concepts/workloads/pods/pod-topology-spread-constraints/ ## The value is evaluated as a template ## topologySpreadConstraints: [] ## @param command Command for running the container (set to default if not set). Use array form ## command: [] ## @param args Args for running the container (set to default if not set). Use array form ## args: [] ## @param extraEnvVars Extra environment variables to be set on HashiCorp Consul container ## For example: ## extraEnvVars: [] # - name: FOO # value: BAR ## @param extraEnvVarsCM Name of existing ConfigMap containing extra env vars ## extraEnvVarsCM: "" ## @param extraEnvVarsSecret Name of existing Secret containing extra env vars ## extraEnvVarsSecret: "" ## HashiCorp Consul container ports to open ## @param containerPorts.http Port to open for HTTP in Consul ## @param containerPorts.dns Port to open for DNS server in Consul ## @param containerPorts.rpc Port to open for RPC in Consul ## @param containerPorts.rpcServer Port to open for RPC Server in Consul ## @param containerPorts.serfLAN Port to open for Serf LAN in Consul ## containerPorts: http: 8500 dns: 8600 rpc: 8400 rpcServer: 8300 serfLAN: 8301 ## @param lifecycleHooks Add lifecycle hooks to the deployment ## lifecycleHooks: {} ## @section Statefulset parameters ## ## @param replicaCount Number of HashiCorp Consul replicas to deploy ## replicaCount: 3 ## @param updateStrategy.type Update strategy type for the HashiCorp Consul statefulset ## ref: https://kubernetes.io/docs/concepts/workloads/controllers/statefulset/#update-strategies ## updateStrategy: type: RollingUpdate ## @param podManagementPolicy StatefulSet pod management policy ## podManagementPolicy: Parallel ## @param podAnnotations Additional pod annotations ## ref: https://kubernetes.io/docs/concepts/overview/working-with-objects/annotations/ ## podAnnotations: {} ## @param podAffinityPreset Pod affinity preset. Ignored if `affinity` is set. Allowed values: `soft` or `hard` ## ref: https://kubernetes.io/docs/concepts/scheduling-eviction/assign-pod-node/#inter-pod-affinity-and-anti-affinity ## podAffinityPreset: "" ## @param podAntiAffinityPreset Pod anti-affinity preset. Ignored if `affinity` is set. Allowed values: `soft` or `hard` ## Ref: https://kubernetes.io/docs/concepts/scheduling-eviction/assign-pod-node/#inter-pod-affinity-and-anti-affinity ## podAntiAffinityPreset: soft ## Node affinity preset ## Ref: https://kubernetes.io/docs/concepts/scheduling-eviction/assign-pod-node/#node-affinity ## nodeAffinityPreset: ## @param nodeAffinityPreset.type Node affinity preset type. Ignored if `affinity` is set. Allowed values: `soft` or `hard` ## type: "" ## @param nodeAffinityPreset.key Node label key to match. Ignored if `affinity` is set. ## E.g. ## key: "kubernetes.io/e2e-az-name" ## key: "" ## @param nodeAffinityPreset.values Node label values to match. Ignored if `affinity` is set. ## E.g. ## values: ## - e2e-az1 ## - e2e-az2 ## values: [] ## @param affinity Affinity for pod assignment ## Ref: https://kubernetes.io/docs/concepts/configuration/assign-pod-node/#affinity-and-anti-affinity ## Note: podAffinityPreset, podAntiAffinityPreset, and nodeAffinityPreset will be ignored when it's set ## affinity: {} ## @param nodeSelector Node labels for pod assignment ## Ref: https://kubernetes.io/docs/user-guide/node-selection/ ## nodeSelector: {} ## @param tolerations Tolerations for pod assignment ## Ref: https://kubernetes.io/docs/concepts/configuration/taint-and-toleration/ ## tolerations: [] ## Pod security context ## ref: https://kubernetes.io/docs/tasks/configure-pod-container/security-context/#set-the-security-context-for-a-pod ## @param podSecurityContext.enabled Enable security context for HashiCorp Consul pods ## @param podSecurityContext.fsGroup Group ID for the volumes of the pod ## podSecurityContext: enabled: true fsGroup: 1001 ## Container security context ## ref: https://kubernetes.io/docs/tasks/configure-pod-container/security-context/#set-the-security-context-for-a-container ## @param containerSecurityContext.enabled HashiCorp Consul Container securityContext ## @param containerSecurityContext.runAsUser User ID for the HashiCorp Consul container ## @param containerSecurityContext.runAsNonRoot Force the container to be run as non root ## containerSecurityContext: enabled: true runAsUser: 1001 runAsNonRoot: true ## Container's resource requests and limits ## ref: https://kubernetes.io/docs/user-guide/compute-resources/ ## We usually recommend not to specify default resources and to leave this as a conscious ## choice for the user. This also increases chances charts run on environments with little ## resources, such as Minikube. If you do want to specify resources, uncomment the following ## lines, adjust them as necessary, and remove the curly braces after 'resources:'. ## @param resources.limits The resources limits for HashiCorp Consul containers ## @param resources.requests The requested resources for HashiCorp Consul containers ## resources: ## Example: ## limits: ## cpu: 100m ## memory: 128Mi ## limits: {} ## Examples: ## requests: ## cpu: 100m ## memory: 128Mi ## requests: {} ## Configure extra options for HashiCorp Consul containers' liveness and readiness probes ## ref: https://kubernetes.io/docs/tasks/configure-pod-container/configure-liveness-readiness-probes/#configure-probes ## @param livenessProbe.enabled Enable livenessProbe ## @param livenessProbe.initialDelaySeconds Initial delay seconds for livenessProbe ## @param livenessProbe.periodSeconds Period seconds for livenessProbe ## @param livenessProbe.timeoutSeconds Timeout seconds for livenessProbe ## @param livenessProbe.failureThreshold Failure threshold for livenessProbe ## @param livenessProbe.successThreshold Success threshold for livenessProbe ## livenessProbe: enabled: true initialDelaySeconds: 30 periodSeconds: 10 timeoutSeconds: 5 failureThreshold: 6 successThreshold: 1 ## @param readinessProbe.enabled Enable readinessProbe ## @param readinessProbe.initialDelaySeconds Initial delay seconds for readinessProbe ## @param readinessProbe.periodSeconds Period seconds for readinessProbe ## @param readinessProbe.timeoutSeconds Timeout seconds for readinessProbe ## @param readinessProbe.failureThreshold Failure threshold for readinessProbe ## @param readinessProbe.successThreshold Success threshold for readinessProbe ## readinessProbe: enabled: true initialDelaySeconds: 5 periodSeconds: 10 timeoutSeconds: 5 failureThreshold: 6 successThreshold: 1 ## Configure extra options for startup probe ## ref: https://kubernetes.io/docs/tasks/configure-pod-container/configure-liveness-readiness-startup-probes/#configure-probes ## @param startupProbe.enabled Enable startupProbe ## @param startupProbe.initialDelaySeconds Initial delay seconds for startupProbe ## @param startupProbe.periodSeconds Period seconds for startupProbe ## @param startupProbe.timeoutSeconds Timeout seconds for startupProbe ## @param startupProbe.failureThreshold Failure threshold for startupProbe ## @param startupProbe.successThreshold Success threshold for startupProbe ## startupProbe: enabled: false initialDelaySeconds: 0 periodSeconds: 10 timeoutSeconds: 5 successThreshold: 1 failureThreshold: 60 ## @param customLivenessProbe Override default liveness probe ## customLivenessProbe: {} ## @param customReadinessProbe Override default readiness probe ## customReadinessProbe: {} ## @param customStartupProbe Override default startup probe ## customStartupProbe: {} ## @param extraVolumeMounts Optionally specify extra list of additional volumeMounts for Hashicorp Consul container ## extraVolumeMounts: [] ## @param extraVolumes Optionally specify extra list of additional volumes for Hashicorp Consul container ## extraVolumes: [] ## @param initContainers Add additional init containers to the Hashicorp Consul pods ## initContainers: [] ## @param sidecars Add additional sidecar containers to the Hashicorp Consul pods ## sidecars: [] ## HashiCorp Consul Pod Disruption Budget configuration ## ref: https://kubernetes.io/docs/tasks/run-application/configure-pdb/ ## pdb: ## @param pdb.create Enable/disable a Pod Disruption Budget creation ## create: false ## @param pdb.minAvailable Minimum number of pods that must still be available after the eviction ## minAvailable: 1 ## @param pdb.maxUnavailable Max number of pods that can be unavailable after the eviction ## maxUnavailable: "" ## @section Exposure parameters ## ## HashiCorp Consul UI service parameters ## service: ## @param service.enabled Use a service to access HashiCorp Consul Ui ## enabled: true ## @param service.ports.http HashiCorp Consul UI svc port ## ports: http: 80 ## @param service.type HashiCorp Consul UI Service Type ## type: ClusterIP ## Specify the nodePort value for the LoadBalancer and NodePort service types. ## ref: https://kubernetes.io/docs/concepts/services-networking/service/#type-nodeport ## @param service.nodePorts.http Node port for HashiCorp Consul UI ## nodePorts: http: "" ## @param service.loadBalancerIP HashiCorp Consul UI service Load Balancer IP ## Set the LoadBalancer service type to internal only. ## ref: https://kubernetes.io/docs/concepts/services-networking/service/#internal-load-balancer ## loadBalancerIP: "" ## Provide any additional annotations which may be required. This can be used to ## set the LoadBalancer service type to internal only. ## ref: https://kubernetes.io/docs/concepts/services-networking/service/#internal-load-balancer ## @param service.annotations Annotations for HashiCorp Consul UI service ## annotations: {} ## @param service.externalTrafficPolicy Service external traffic policy ## ref https://kubernetes.io/docs/tasks/access-application-cluster/create-external-load-balancer/#preserving-the-client-source-ip ## externalTrafficPolicy: Cluster ## Configure the ingress resource that allows you to access the Consul UI ## ref: https://kubernetes.io/docs/user-guide/ingress/ ## ingress: ## @param ingress.enabled Enable ingress resource for Management console ## enabled: false ## @param ingress.path Path for the default host ## path: / ## @param ingress.apiVersion Override API Version (automatically detected if not set) ## apiVersion: "" ## @param ingress.pathType Ingress path type ## pathType: ImplementationSpecific ## DEPRECATED: Use ingress.annotations instead of ingress.certManager ## certManager: false ## ## @param ingress.hostname Default host for the ingress resource, a host pointing to this will be created ## hostname: consul-ui.local ## @param ingress.annotations Additional annotations for the Ingress resource. To enable certificate autogeneration, place here your cert-manager annotations. ## For a full list of possible ingress annotations, please see ## ref: https://github.com/kubernetes/ingress-nginx/blob/master/docs/user-guide/nginx-configuration/annotations.md ## Use this parameter to set the required annotations for cert-manager, see ## ref: https://cert-manager.io/docs/usage/ingress/#supported-annotations ## ## e.g: ## annotations: ## kubernetes.io/ingress.class: nginx ## cert-manager.io/cluster-issuer: cluster-issuer-name ## annotations: {} ## @param ingress.tls Enable TLS configuration for the hostname defined at ingress.hostname parameter ## TLS certificates will be retrieved from a TLS secret with name: {{- printf "%s-tls" .Values.ingress.hostname }} ## or a custom one if you use the tls.existingSecret parameter ## You can use the ingress.secrets parameter to create this TLS secret or relay on cert-manager to create it ## Example: ## existingSecret: name-of-existing-secret ## tls: false ## @param ingress.extraHosts An array with additional hostname(s) to be covered with the ingress record ## Most likely the hostname above will be enough, but in the event more hosts are needed, this is an array ## extraHosts: ## - name: consul-ui.local ## path: / ## extraHosts: [] ## @param ingress.extraPaths Any additional arbitrary paths that may need to be added to the ingress under the main host. ## For example: The ALB ingress controller requires a special rule for handling SSL redirection. ## extraPaths: ## - path: /* ## backend: ## serviceName: ssl-redirect ## servicePort: use-annotation ## extraPaths: [] ## @param ingress.selfSigned Create a TLS secret for this ingress record using self-signed certificates generated by Helm ## selfSigned: false ## @param ingress.extraTls TLS configuration for additional hostname(s) to be covered with this ingress record ## see: https://kubernetes.io/docs/concepts/services-networking/ingress/#tls ## extraTls: ## - hosts: ## - consul-ui.local ## secretName: rconsul-ui.local-tls ## extraTls: [] ## @param ingress.secrets If you're providing your own certificates, please use this to add the certificates as secrets ## key and certificate should start with -----BEGIN CERTIFICATE----- or ## -----BEGIN RSA PRIVATE KEY----- ## ## name should line up with a tlsSecret set further up ## If you're using cert-manager, this is unneeded, as it will create the secret for you if it is not set ## ## It is also possible to create and manage the certificates outside of this helm chart ## Please see README.md for more information ## Example: ## - name: consul-ui.local-tls ## key: ## certificate: ## secrets: [] ## @param ingress.existingSecret It is you own the certificate as secret. existingSecret: "" ## @section Persistence parameters ## ## Enable persistence using Persistent Volume Claims ## ref: https://kubernetes.io/docs/user-guide/persistent-volumes/ ## persistence: ## @param persistence.enabled Enable HashiCorp Consul data persistence using PVC, use a Persistent Volume Claim, If false, use emptyDir ## enabled: true ## @param persistence.storageClass Persistent Volume storage class ## If defined, storageClassName: <storageClass> ## If set to "-", storageClassName: "", which disables dynamic provisioning ## If undefined (the default) or set to null, no storageClassName spec is ## set, choosing the default provisioner. (gp2 on AWS, standard on ## GKE, AWS & OpenStack) ## storageClass: "" ## @param persistence.annotations Persistent Volume Claim annotations ## annotations: {} ## @param persistence.accessModes Persistent Volume Access Mode ## accessModes: - ReadWriteOnce ## @param persistence.size PVC Storage Request for HashiCorp Consul data volume ## size: 8Gi ## @section Volume Permissions parameters ## ## Init containers parameters: ## volumePermissions: Change the owner and group of the persistent volume mountpoint to runAsUser:fsGroup values from the podSecurityContext section. ## volumePermissions: ## @param volumePermissions.enabled Enable init container that changes the owner and group of the persistent volume ## enabled: false ## Bitnami Shell image ## ref: https://hub.docker.com/r/bitnami/bitnami-shell/tags/ ## @param volumePermissions.image.registry Bitnami Shell image registry ## @param volumePermissions.image.repository Bitnami Shell image repository ## @param volumePermissions.image.tag Bitnami Shell image tag (immutable tags are recommended) ## @param volumePermissions.image.pullPolicy Bitnami Shell image pull policy ## @param volumePermissions.image.pullSecrets Bitnami Shell image pull secrets ## image: registry: docker.io repository: bitnami/bitnami-shell tag: 10-debian-10-r361 pullPolicy: IfNotPresent ## Optionally specify an array of imagePullSecrets. ## Secrets must be manually created in the namespace. ## ref: https://kubernetes.io/docs/tasks/configure-pod-container/pull-image-private-registry/ ## e.g: ## pullSecrets: ## - myRegistryKeySecretName ## pullSecrets: [] ## Init container' resource requests and limits ## ref: https://kubernetes.io/docs/user-guide/compute-resources/ ## @param volumePermissions.resources.limits The resources limits for the container ## @param volumePermissions.resources.requests The requested resources for the container ## resources: ## Example: ## limits: ## cpu: 100m ## memory: 128Mi ## limits: {} ## Examples: ## requests: ## cpu: 100m ## memory: 128Mi ## requests: {} ## @section Metrics parameters ## ## Prometheus Exporter / Metrics ## metrics: ## @param metrics.enabled Start a side-car prometheus exporter ## enabled: false ## Bitnami HashiCorp Consul Prometheus Exporter image ## ref: https://hub.docker.com/r/bitnami/consul-exporter/tags/ ## @param metrics.image.registry HashiCorp Consul Prometheus Exporter image registry ## @param metrics.image.repository HashiCorp Consul Prometheus Exporter image repository ## @param metrics.image.tag HashiCorp Consul Prometheus Exporter image tag (immutable tags are recommended) ## @param metrics.image.pullPolicy HashiCorp Consul Prometheus Exporter image pull policy ## @param metrics.image.pullSecrets HashiCorp Consul Prometheus Exporter image pull secrets ## image: registry: docker.io repository: bitnami/consul-exporter tag: 0.8.0-debian-10-r25 pullPolicy: IfNotPresent ## Optionally specify an array of imagePullSecrets. ## Secrets must be manually created in the namespace. ## ref: https://kubernetes.io/docs/tasks/configure-pod-container/pull-image-private-registry/ ## e.g: ## pullSecrets: ## - myRegistryKeySecretName ## pullSecrets: [] ## Container security context ## ref: https://kubernetes.io/docs/tasks/configure-pod-container/security-context/#set-the-security-context-for-a-container ## @param metrics.containerSecurityContext.enabled HashiCorp Consul Prometheus Exporter securityContext ## @param metrics.containerSecurityContext.runAsUser User ID for the HashiCorp Consul Prometheus Exporter ## @param metrics.containerSecurityContext.runAsNonRoot Force the container to be run as non root ## containerSecurityContext: enabled: true runAsUser: 1001 runAsNonRoot: true ## Consul Prometheus exporter service type ## service: ## @param metrics.service.type Kubernetes Service type ## type: ClusterIP ## @param metrics.service.loadBalancerIP Service Load Balancer IP ## Use serviceLoadBalancerIP to request a specific static IP, otherwise leave blank ## loadBalancerIP: "" ## @param metrics.service.annotations [object] Provide any additional annotations which may be required. ## This can be used to set the LoadBalancer service type to internal only. ## ref: https://kubernetes.io/docs/concepts/services-networking/service/#internal-load-balancer ## annotations: prometheus.io/scrape: "true" prometheus.io/port: "9107" ## @param metrics.podAnnotations [object] Metrics exporter pod Annotation and Labels ## ref: https://kubernetes.io/docs/concepts/overview/working-with-objects/annotations/ ## podAnnotations: prometheus.io/scrape: "true" prometheus.io/port: "9107" ## HashiCorp Consul Prometheus exporter resource requests and limits ## ref: https://kubernetes.io/docs/user-guide/compute-resources/ ## @param metrics.resources.limits The resources limits for the container ## @param metrics.resources.requests The requested resources for the container ## resources: ## Example: ## limits: ## cpu: 100m ## memory: 128Mi ## limits: {} ## Examples: ## requests: ## cpu: 100m ## memory: 128Mi ## requests: {} ## Prometheus Service Monitor ## ref: https://github.com/coreos/prometheus-operator ## serviceMonitor: ## @param metrics.serviceMonitor.enabled Create ServiceMonitor Resource for scraping metrics using PrometheusOperator, set to true to create a Service Monitor Entry ## enabled: false ## @param metrics.serviceMonitor.namespace The namespace in which the ServiceMonitor will be created ## namespace: "" ## @param metrics.serviceMonitor.interval Interval at which metrics should be scraped ## interval: 30s ## @param metrics.serviceMonitor.scrapeTimeout The timeout after which the scrape is ended ## scrapeTimeout: "" ## @param metrics.serviceMonitor.metricRelabelings Metrics relabelings to add to the scrape endpoint ## metricRelabelings: [] ## @param metrics.serviceMonitor.honorLabels Specify honorLabels parameter to add the scrape endpoint ## honorLabels: false ## @param metrics.serviceMonitor.jobLabel The name of the label on the target service to use as the job name in prometheus. ## jobLabel: "" ## @param metrics.serviceMonitor.selector ServiceMonitor selector labels ## ref: https://github.com/bitnami/charts/tree/master/bitnami/prometheus-operator#prometheus-configuration ## ## selector: ## prometheus: my-prometheus ## selector: {} ## @param metrics.serviceMonitor.additionalLabels Used to pass Labels that are used by the Prometheus installed in your cluster to select Service Monitors to work with ## ref: https://github.com/coreos/prometheus-operator/blob/master/Documentation/api.md#prometheusspec ## additionalLabels: {}
37.977273
171
0.741697
cb8b7d7b4b3825d6fc4f3c19d4f7a52f349c00c6
972
yaml
YAML
bitnami/osclass/Chart.yaml
00arthur00/charts
502aa1e64541669b732a4eda896e5937847b6c3c
[ "Apache-2.0" ]
null
null
null
bitnami/osclass/Chart.yaml
00arthur00/charts
502aa1e64541669b732a4eda896e5937847b6c3c
[ "Apache-2.0" ]
2
2022-01-26T01:14:30.000Z
2022-01-26T07:03:39.000Z
bitnami/osclass/Chart.yaml
00arthur00/charts
502aa1e64541669b732a4eda896e5937847b6c3c
[ "Apache-2.0" ]
null
null
null
annotations: category: CMS apiVersion: v2 appVersion: 8.0.1 dependencies: - condition: mariadb.enabled name: mariadb repository: https://charts.bitnami.com/bitnami tags: - osclass-database version: 10.x.x - name: common repository: https://charts.bitnami.com/bitnami tags: - bitnami-common version: 1.x.x description: Osclass allows you to easily create a classifieds site without any technical knowledge. It provides support for presenting general ads or specialized ads, is customizable, extensible and multilingual. engine: gotpl home: https://github.com/bitnami/charts/tree/master/bitnami/osclass icon: https://bitnami.com/assets/stacks/osclass/img/osclass-stack-220x234.png keywords: - osclass - classifieds - http - web - php maintainers: - email: [email protected] name: Bitnami name: osclass sources: - https://github.com/bitnami/bitnami-docker-osclass - https://osclass.org/ version: 13.0.13
27.771429
213
0.734568
0209f95a148a408584e2da19a37d2e22afa27358
890
yaml
YAML
bitnami/postgresql/Chart.yaml
00arthur00/charts
502aa1e64541669b732a4eda896e5937847b6c3c
[ "Apache-2.0" ]
null
null
null
bitnami/postgresql/Chart.yaml
00arthur00/charts
502aa1e64541669b732a4eda896e5937847b6c3c
[ "Apache-2.0" ]
2
2022-01-26T01:14:30.000Z
2022-01-26T07:03:39.000Z
bitnami/postgresql/Chart.yaml
00arthur00/charts
502aa1e64541669b732a4eda896e5937847b6c3c
[ "Apache-2.0" ]
null
null
null
annotations: category: Database apiVersion: v2 appVersion: 14.2.0 dependencies: - name: common repository: https://charts.bitnami.com/bitnami version: 1.x.x description: PostgreSQL (Postgres) is an open source object-relational database known for reliability and data integrity. ACID-compliant, it supports foreign keys, joins, views, triggers and stored procedures. engine: gotpl home: https://github.com/bitnami/charts/tree/master/bitnami/postgresql icon: https://bitnami.com/assets/stacks/postgresql/img/postgresql-stack-220x234.png keywords: - postgresql - postgres - database - sql - replication - cluster maintainers: - email: [email protected] name: Bitnami - email: [email protected] name: desaintmartin name: postgresql sources: - https://github.com/bitnami/bitnami-docker-postgresql - https://www.postgresql.org/ version: 11.1.7
29.666667
209
0.759551
f34087257077fd839911969bf877138e5618442d
927
yaml
YAML
bitnami/elasticsearch/Chart.yaml
00arthur00/charts
502aa1e64541669b732a4eda896e5937847b6c3c
[ "Apache-2.0" ]
null
null
null
bitnami/elasticsearch/Chart.yaml
00arthur00/charts
502aa1e64541669b732a4eda896e5937847b6c3c
[ "Apache-2.0" ]
2
2022-01-26T01:14:30.000Z
2022-01-26T07:03:39.000Z
bitnami/elasticsearch/Chart.yaml
00arthur00/charts
502aa1e64541669b732a4eda896e5937847b6c3c
[ "Apache-2.0" ]
null
null
null
annotations: category: Analytics apiVersion: v2 appVersion: 7.17.1 dependencies: - condition: global.kibanaEnabled name: kibana repository: https://charts.bitnami.com/bitnami version: 9.x.x - name: common repository: https://charts.bitnami.com/bitnami tags: - bitnami-common version: 1.x.x description: Elasticsearch is a distributed search and analytics engine. It is used for web search, log monitoring, and real-time analytics. Ideal for Big Data applications. engine: gotpl home: https://github.com/bitnami/charts/tree/master/bitnami/elasticsearch icon: https://bitnami.com/assets/stacks/elasticsearch/img/elasticsearch-stack-220x234.png keywords: - elasticsearch maintainers: - email: [email protected] name: Bitnami name: elasticsearch sources: - https://github.com/bitnami/bitnami-docker-elasticsearch - https://www.elastic.co/products/elasticsearch version: 17.9.12
31.965517
173
0.760518
6de0e866d1711b87d6c1549699e4ce7c52816d1d
844
yaml
YAML
bitnami/postgresql-ha/Chart.yaml
00arthur00/charts
502aa1e64541669b732a4eda896e5937847b6c3c
[ "Apache-2.0" ]
null
null
null
bitnami/postgresql-ha/Chart.yaml
00arthur00/charts
502aa1e64541669b732a4eda896e5937847b6c3c
[ "Apache-2.0" ]
2
2022-01-26T01:14:30.000Z
2022-01-26T07:03:39.000Z
bitnami/postgresql-ha/Chart.yaml
00arthur00/charts
502aa1e64541669b732a4eda896e5937847b6c3c
[ "Apache-2.0" ]
null
null
null
annotations: category: Database apiVersion: v2 appVersion: 11.15.0 dependencies: - name: common repository: https://charts.bitnami.com/bitnami version: 1.x.x description: This PostgreSQL cluster solution includes the PostgreSQL replication manager, an open-source tool for managing replication and failover on PostgreSQL clusters. engine: gotpl home: https://github.com/bitnami/charts/tree/master/bitnami/postgresql-ha icon: https://bitnami.com/assets/stacks/postgresql/img/postgresql-stack-220x234.png keywords: - postgresql - repmgr - pgpool - postgres - database - sql - replication - cluster - high availability maintainers: - email: [email protected] name: Bitnami name: postgresql-ha sources: - https://github.com/bitnami/bitnami-docker-postgresql - https://www.postgresql.org/ version: 8.6.2
27.225806
172
0.758294
430fdb19f88a230d0d5179b55793623425a5468c
933
yaml
YAML
bitnami/testlink/Chart.yaml
00arthur00/charts
502aa1e64541669b732a4eda896e5937847b6c3c
[ "Apache-2.0" ]
null
null
null
bitnami/testlink/Chart.yaml
00arthur00/charts
502aa1e64541669b732a4eda896e5937847b6c3c
[ "Apache-2.0" ]
2
2022-01-26T01:14:30.000Z
2022-01-26T07:03:39.000Z
bitnami/testlink/Chart.yaml
00arthur00/charts
502aa1e64541669b732a4eda896e5937847b6c3c
[ "Apache-2.0" ]
null
null
null
annotations: category: DeveloperTools apiVersion: v2 appVersion: 1.9.20 dependencies: - condition: mariadb.enabled name: mariadb repository: https://charts.bitnami.com/bitnami version: 10.x.x - name: common repository: https://charts.bitnami.com/bitnami tags: - bitnami-common version: 1.x.x description: TestLink is test management software that facilitates software quality assurance. It suppors test cases, test suites, test plans, test projects and user management, and stats reporting. engine: gotpl home: https://github.com/bitnami/charts/tree/master/bitnami/testlink icon: https://bitnami.com/assets/stacks/testlink/img/testlink-stack-220x234.png keywords: - testlink - testing - http - php maintainers: - email: [email protected] name: Bitnami name: testlink sources: - https://github.com/bitnami/bitnami-docker-testlink - https://www.testlink.org/ version: 10.0.12
29.15625
198
0.744909
a10171a7fd208ad10082a63906fb552c6b42fd57
54,928
yaml
YAML
bitnami/mariadb/values.yaml
00arthur00/charts
502aa1e64541669b732a4eda896e5937847b6c3c
[ "Apache-2.0" ]
null
null
null
bitnami/mariadb/values.yaml
00arthur00/charts
502aa1e64541669b732a4eda896e5937847b6c3c
[ "Apache-2.0" ]
2
2022-01-26T01:14:30.000Z
2022-01-26T07:03:39.000Z
bitnami/mariadb/values.yaml
00arthur00/charts
502aa1e64541669b732a4eda896e5937847b6c3c
[ "Apache-2.0" ]
null
null
null
## @section Global parameters ## Global Docker image parameters ## Please, note that this will override the image parameters, including dependencies, configured to use the global value ## Current available global Docker image parameters: imageRegistry, imagePullSecrets and storageClass ## @param global.imageRegistry Global Docker Image registry ## @param global.imagePullSecrets Global Docker registry secret names as an array ## @param global.storageClass Global storage class for dynamic provisioning ## global: imageRegistry: "" ## E.g. ## imagePullSecrets: ## - myRegistryKeySecretName ## imagePullSecrets: [] storageClass: "" ## @section Common parameters ## @param kubeVersion Force target Kubernetes version (using Helm capabilities if not set) ## kubeVersion: "" ## @param nameOverride String to partially override mariadb.fullname ## nameOverride: "" ## @param fullnameOverride String to fully override mariadb.fullname ## fullnameOverride: "" ## @param clusterDomain Default Kubernetes cluster domain ## clusterDomain: cluster.local ## @param commonAnnotations Common annotations to add to all MariaDB resources (sub-charts are not considered) ## commonAnnotations: {} ## @param commonLabels Common labels to add to all MariaDB resources (sub-charts are not considered) ## commonLabels: {} ## @param schedulerName Name of the scheduler (other than default) to dispatch pods ## ref: https://kubernetes.io/docs/tasks/administer-cluster/configure-multiple-schedulers/ ## schedulerName: "" ## @param extraDeploy Array of extra objects to deploy with the release (evaluated as a template) ## extraDeploy: [] ## Enable diagnostic mode in the deployment ## diagnosticMode: ## @param diagnosticMode.enabled Enable diagnostic mode (all probes will be disabled and the command will be overridden) ## enabled: false ## @param diagnosticMode.command Command to override all containers in the deployment ## command: - sleep ## @param diagnosticMode.args Args to override all containers in the deployment ## args: - infinity ## @section MariaDB common parameters ## Bitnami MariaDB image ## ref: https://hub.docker.com/r/bitnami/mariadb/tags/ ## @param image.registry MariaDB image registry ## @param image.repository MariaDB image repository ## @param image.tag MariaDB image tag (immutable tags are recommended) ## @param image.pullPolicy MariaDB image pull policy ## @param image.pullSecrets Specify docker-registry secret names as an array ## @param image.debug Specify if debug logs should be enabled ## image: registry: docker.io repository: bitnami/mariadb tag: 10.5.15-debian-10-r28 ## Specify a imagePullPolicy ## Defaults to 'Always' if image tag is 'latest', else set to 'IfNotPresent' ## ref: https://kubernetes.io/docs/user-guide/images/#pre-pulling-images ## pullPolicy: IfNotPresent ## Optionally specify an array of imagePullSecrets (secrets must be manually created in the namespace) ## ref: https://kubernetes.io/docs/tasks/configure-pod-container/pull-image-private-registry/ ## Example: ## pullSecrets: ## - myRegistryKeySecretName ## pullSecrets: [] ## Set to true if you would like to see extra information on logs ## It turns BASH and/or NAMI debugging in the image ## debug: false ## @param architecture MariaDB architecture (`standalone` or `replication`) ## architecture: standalone ## MariaDB Authentication parameters ## auth: ## @param auth.rootPassword Password for the `root` user. Ignored if existing secret is provided. ## ref: https://github.com/bitnami/bitnami-docker-mariadb#setting-the-root-password-on-first-run ## rootPassword: "" ## @param auth.database Name for a custom database to create ## ref: https://github.com/bitnami/bitnami-docker-mariadb/blob/master/README.md#creating-a-database-on-first-run ## database: my_database ## @param auth.username Name for a custom user to create ## ref: https://github.com/bitnami/bitnami-docker-mariadb/blob/master/README.md#creating-a-database-user-on-first-run ## username: "" ## @param auth.password Password for the new user. Ignored if existing secret is provided ## password: "" ## @param auth.replicationUser MariaDB replication user ## ref: https://github.com/bitnami/bitnami-docker-mariadb#setting-up-a-replication-cluster ## replicationUser: replicator ## @param auth.replicationPassword MariaDB replication user password. Ignored if existing secret is provided ## ref: https://github.com/bitnami/bitnami-docker-mariadb#setting-up-a-replication-cluster ## replicationPassword: "" ## @param auth.existingSecret Use existing secret for password details (`auth.rootPassword`, `auth.password`, `auth.replicationPassword` will be ignored and picked up from this secret). The secret has to contain the keys `mariadb-root-password`, `mariadb-replication-password` and `mariadb-password` ## existingSecret: "" ## @param auth.forcePassword Force users to specify required passwords ## forcePassword: false ## @param auth.usePasswordFiles Mount credentials as files instead of using environment variables ## usePasswordFiles: false ## @param auth.customPasswordFiles Use custom password files when `auth.usePasswordFiles` is set to `true`. Define path for keys `root` and `user`, also define `replicator` if `architecture` is set to `replication` ## Example: ## customPasswordFiles: ## root: /vault/secrets/mariadb-root ## user: /vault/secrets/mariadb-user ## replicator: /vault/secrets/mariadb-replicator ## customPasswordFiles: {} ## @param initdbScripts Dictionary of initdb scripts ## Specify dictionary of scripts to be run at first boot ## Example: ## initdbScripts: ## my_init_script.sh: | ## #!/bin/bash ## echo "Do something." ## initdbScripts: {} ## @param initdbScriptsConfigMap ConfigMap with the initdb scripts (Note: Overrides `initdbScripts`) ## initdbScriptsConfigMap: "" ## @section MariaDB Primary parameters ## Mariadb Primary parameters ## primary: ## @param primary.command Override default container command on MariaDB Primary container(s) (useful when using custom images) ## command: [] ## @param primary.args Override default container args on MariaDB Primary container(s) (useful when using custom images) ## args: [] ## @param primary.lifecycleHooks for the MariaDB Primary container(s) to automate configuration before or after startup ## lifecycleHooks: {} ## @param primary.hostAliases Add deployment host aliases ## https://kubernetes.io/docs/concepts/services-networking/add-entries-to-pod-etc-hosts-with-host-aliases/ ## hostAliases: [] ## @param primary.configuration [string] MariaDB Primary configuration to be injected as ConfigMap ## ref: https://mysql.com/kb/en/mysql/configuring-mysql-with-mycnf/#example-of-configuration-file ## configuration: |- [mysqld] skip-name-resolve explicit_defaults_for_timestamp basedir=/opt/bitnami/mariadb plugin_dir=/opt/bitnami/mariadb/plugin port=3306 socket=/opt/bitnami/mariadb/tmp/mysql.sock tmpdir=/opt/bitnami/mariadb/tmp max_allowed_packet=16M bind-address=:: pid-file=/opt/bitnami/mariadb/tmp/mysqld.pid log-error=/opt/bitnami/mariadb/logs/mysqld.log character-set-server=UTF8 collation-server=utf8_general_ci [client] port=3306 socket=/opt/bitnami/mariadb/tmp/mysql.sock default-character-set=UTF8 plugin_dir=/opt/bitnami/mariadb/plugin [manager] port=3306 socket=/opt/bitnami/mariadb/tmp/mysql.sock pid-file=/opt/bitnami/mariadb/tmp/mysqld.pid ## @param primary.existingConfigmap Name of existing ConfigMap with MariaDB Primary configuration. ## NOTE: When it's set the 'configuration' parameter is ignored ## existingConfigmap: "" ## @param primary.updateStrategy.type MariaDB primary statefulset strategy type ## ref: https://kubernetes.io/docs/concepts/workloads/controllers/statefulset/#update-strategies ## updateStrategy: ## StrategyType ## Can be set to RollingUpdate or OnDelete ## type: RollingUpdate ## @param primary.rollingUpdatePartition Partition update strategy for Mariadb Primary statefulset ## https://kubernetes.io/docs/concepts/workloads/controllers/statefulset/#partitions ## rollingUpdatePartition: "" ## @param primary.podAnnotations Additional pod annotations for MariaDB primary pods ## ref: https://kubernetes.io/docs/concepts/overview/working-with-objects/annotations/ ## podAnnotations: {} ## @param primary.podLabels Extra labels for MariaDB primary pods ## ref: https://kubernetes.io/docs/concepts/overview/working-with-objects/labels/ ## podLabels: {} ## @param primary.podAffinityPreset MariaDB primary pod affinity preset. Ignored if `primary.affinity` is set. Allowed values: `soft` or `hard` ## ref: https://kubernetes.io/docs/concepts/scheduling-eviction/assign-pod-node/#inter-pod-affinity-and-anti-affinity ## podAffinityPreset: "" ## @param primary.podAntiAffinityPreset MariaDB primary pod anti-affinity preset. Ignored if `primary.affinity` is set. Allowed values: `soft` or `hard` ## Ref: https://kubernetes.io/docs/concepts/scheduling-eviction/assign-pod-node/#inter-pod-affinity-and-anti-affinity ## podAntiAffinityPreset: soft ## Mariadb Primary node affinity preset ## Ref: https://kubernetes.io/docs/concepts/scheduling-eviction/assign-pod-node/#node-affinity ## nodeAffinityPreset: ## @param primary.nodeAffinityPreset.type MariaDB primary node affinity preset type. Ignored if `primary.affinity` is set. Allowed values: `soft` or `hard` ## type: "" ## @param primary.nodeAffinityPreset.key MariaDB primary node label key to match Ignored if `primary.affinity` is set. ## E.g. ## key: "kubernetes.io/e2e-az-name" ## key: "" ## @param primary.nodeAffinityPreset.values MariaDB primary node label values to match. Ignored if `primary.affinity` is set. ## E.g. ## values: ## - e2e-az1 ## - e2e-az2 ## values: [] ## @param primary.affinity Affinity for MariaDB primary pods assignment ## Ref: https://kubernetes.io/docs/concepts/configuration/assign-pod-node/#affinity-and-anti-affinity ## Note: podAffinityPreset, podAntiAffinityPreset, and nodeAffinityPreset will be ignored when it's set ## affinity: {} ## @param primary.nodeSelector Node labels for MariaDB primary pods assignment ## Ref: https://kubernetes.io/docs/user-guide/node-selection/ ## nodeSelector: {} ## @param primary.tolerations Tolerations for MariaDB primary pods assignment ## Ref: https://kubernetes.io/docs/concepts/configuration/taint-and-toleration/ ## tolerations: [] ## @param primary.schedulerName Name of the k8s scheduler (other than default) ## ref: https://kubernetes.io/docs/tasks/administer-cluster/configure-multiple-schedulers/ ## schedulerName: "" ## @param primary.podManagementPolicy podManagementPolicy to manage scaling operation of MariaDB primary pods ## ref: https://kubernetes.io/docs/concepts/workloads/controllers/statefulset/#pod-management-policies ## podManagementPolicy: "" ## @param primary.topologySpreadConstraints Topology Spread Constraints for MariaDB primary pods assignment ## ref: https://kubernetes.io/docs/concepts/workloads/pods/pod-topology-spread-constraints/ ## E.g. ## topologySpreadConstraints: ## - maxSkew: 1 ## topologyKey: topology.kubernetes.io/zone ## whenUnsatisfiable: DoNotSchedule ## topologySpreadConstraints: {} ## @param primary.priorityClassName Priority class for MariaDB primary pods assignment ## Ref: https://kubernetes.io/docs/concepts/configuration/pod-priority-preemption/ ## priorityClassName: "" ## MariaDB primary Pod security context ## ref: https://kubernetes.io/docs/tasks/configure-pod-container/security-context/#set-the-security-context-for-a-pod ## @param primary.podSecurityContext.enabled Enable security context for MariaDB primary pods ## @param primary.podSecurityContext.fsGroup Group ID for the mounted volumes' filesystem ## podSecurityContext: enabled: true fsGroup: 1001 ## MariaDB primary container security context ## ref: https://kubernetes.io/docs/tasks/configure-pod-container/security-context/#set-the-security-context-for-a-container ## @param primary.containerSecurityContext.enabled MariaDB primary container securityContext ## @param primary.containerSecurityContext.runAsUser User ID for the MariaDB primary container ## @param primary.containerSecurityContext.runAsNonRoot Set Controller container's Security Context runAsNonRoot ## containerSecurityContext: enabled: true runAsUser: 1001 runAsNonRoot: true ## MariaDB primary container's resource requests and limits ## ref: https://kubernetes.io/docs/user-guide/compute-resources/ ## We usually recommend not to specify default resources and to leave this as a conscious ## choice for the user. This also increases chances charts run on environments with little ## resources, such as Minikube. If you do want to specify resources, uncomment the following ## lines, adjust them as necessary, and remove the curly braces after 'resources:'. ## @param primary.resources.limits The resources limits for MariaDB primary containers ## @param primary.resources.requests The requested resources for MariaDB primary containers ## resources: ## Example: ## limits: ## cpu: 100m ## memory: 256Mi limits: {} ## Examples: ## requests: ## cpu: 100m ## memory: 256Mi requests: {} ## Configure extra options for MariaDB primary containers' liveness, readiness and startup probes ## ref: https://kubernetes.io/docs/tasks/configure-pod-container/configure-liveness-readiness-probes/#configure-probes) ## @param primary.startupProbe.enabled Enable startupProbe ## @param primary.startupProbe.initialDelaySeconds Initial delay seconds for startupProbe ## @param primary.startupProbe.periodSeconds Period seconds for startupProbe ## @param primary.startupProbe.timeoutSeconds Timeout seconds for startupProbe ## @param primary.startupProbe.failureThreshold Failure threshold for startupProbe ## @param primary.startupProbe.successThreshold Success threshold for startupProbe ## startupProbe: enabled: false initialDelaySeconds: 120 periodSeconds: 15 timeoutSeconds: 5 failureThreshold: 10 successThreshold: 1 ## Configure extra options for liveness probe ## ref: https://kubernetes.io/docs/tasks/configure-pod-container/configure-liveness-readiness-probes/#configure-probes ## @param primary.livenessProbe.enabled Enable livenessProbe ## @param primary.livenessProbe.initialDelaySeconds Initial delay seconds for livenessProbe ## @param primary.livenessProbe.periodSeconds Period seconds for livenessProbe ## @param primary.livenessProbe.timeoutSeconds Timeout seconds for livenessProbe ## @param primary.livenessProbe.failureThreshold Failure threshold for livenessProbe ## @param primary.livenessProbe.successThreshold Success threshold for livenessProbe ## livenessProbe: enabled: true initialDelaySeconds: 120 periodSeconds: 10 timeoutSeconds: 1 failureThreshold: 3 successThreshold: 1 ## @param primary.readinessProbe.enabled Enable readinessProbe ## @param primary.readinessProbe.initialDelaySeconds Initial delay seconds for readinessProbe ## @param primary.readinessProbe.periodSeconds Period seconds for readinessProbe ## @param primary.readinessProbe.timeoutSeconds Timeout seconds for readinessProbe ## @param primary.readinessProbe.failureThreshold Failure threshold for readinessProbe ## @param primary.readinessProbe.successThreshold Success threshold for readinessProbe ## readinessProbe: enabled: true initialDelaySeconds: 30 periodSeconds: 10 timeoutSeconds: 1 failureThreshold: 3 successThreshold: 1 ## @param primary.customStartupProbe Override default startup probe for MariaDB primary containers ## customStartupProbe: {} ## @param primary.customLivenessProbe Override default liveness probe for MariaDB primary containers ## customLivenessProbe: {} ## @param primary.customReadinessProbe Override default readiness probe for MariaDB primary containers ## customReadinessProbe: {} ## @param primary.startupWaitOptions Override default builtin startup wait check options for MariaDB primary containers ## `bitnami/mariadb` Docker image has built-in startup check mechanism, ## which periodically checks if MariaDB service has started up and stops it ## if all checks have failed after X tries. Use these to control these checks. ## ref: https://github.com/bitnami/bitnami-docker-mariadb/pull/240 ## Example (with default options): ## startupWaitOptions: ## retries: 300 ## waitTime: 2 ## startupWaitOptions: {} ## @param primary.extraFlags MariaDB primary additional command line flags ## Can be used to specify command line flags, for example: ## E.g. ## extraFlags: "--max-connect-errors=1000 --max_connections=155" ## extraFlags: "" ## @param primary.extraEnvVars Extra environment variables to be set on MariaDB primary containers ## E.g. ## extraEnvVars: ## - name: TZ ## value: "Europe/Paris" ## extraEnvVars: [] ## @param primary.extraEnvVarsCM Name of existing ConfigMap containing extra env vars for MariaDB primary containers ## extraEnvVarsCM: "" ## @param primary.extraEnvVarsSecret Name of existing Secret containing extra env vars for MariaDB primary containers ## extraEnvVarsSecret: "" ## Enable persistence using Persistent Volume Claims ## ref: https://kubernetes.io/docs/user-guide/persistent-volumes/ ## persistence: ## @param primary.persistence.enabled Enable persistence on MariaDB primary replicas using a `PersistentVolumeClaim`. If false, use emptyDir ## enabled: true ## @param primary.persistence.existingClaim Name of an existing `PersistentVolumeClaim` for MariaDB primary replicas ## NOTE: When it's set the rest of persistence parameters are ignored ## existingClaim: "" ## @param primary.persistence.subPath Subdirectory of the volume to mount at ## subPath: "" ## @param primary.persistence.storageClass MariaDB primary persistent volume storage Class ## If defined, storageClassName: <storageClass> ## If set to "-", storageClassName: "", which disables dynamic provisioning ## If undefined (the default) or set to null, no storageClassName spec is ## set, choosing the default provisioner. (gp2 on AWS, standard on ## GKE, AWS & OpenStack) ## storageClass: "" ## @param primary.persistence.annotations MariaDB primary persistent volume claim annotations ## annotations: {} ## @param primary.persistence.accessModes MariaDB primary persistent volume access Modes ## accessModes: - ReadWriteOnce ## @param primary.persistence.size MariaDB primary persistent volume size ## size: 8Gi ## @param primary.persistence.selector Selector to match an existing Persistent Volume ## selector: ## matchLabels: ## app: my-app ## selector: {} ## @param primary.extraVolumes Optionally specify extra list of additional volumes to the MariaDB Primary pod(s) ## extraVolumes: [] ## @param primary.extraVolumeMounts Optionally specify extra list of additional volumeMounts for the MariaDB Primary container(s) ## extraVolumeMounts: [] ## @param primary.initContainers Add additional init containers for the MariaDB Primary pod(s) ## initContainers: [] ## @param primary.sidecars Add additional sidecar containers for the MariaDB Primary pod(s) ## sidecars: [] ## MariaDB Primary Service parameters ## service: ## @param primary.service.type MariaDB Primary Kubernetes service type ## type: ClusterIP ## @param primary.service.ports.mysql MariaDB Primary Kubernetes service port ## ports: mysql: 3306 ## @param primary.service.nodePorts.mysql MariaDB Primary Kubernetes service node port ## ref: https://kubernetes.io/docs/concepts/services-networking/service/#type-nodeport ## nodePorts: mysql: "" ## @param primary.service.clusterIP MariaDB Primary Kubernetes service clusterIP IP ## clusterIP: "" ## @param primary.service.loadBalancerIP MariaDB Primary loadBalancerIP if service type is `LoadBalancer` ## ref: https://kubernetes.io/docs/concepts/services-networking/service/#internal-load-balancer ## loadBalancerIP: "" ## @param primary.service.externalTrafficPolicy Enable client source IP preservation ## ref https://kubernetes.io/docs/tasks/access-application-cluster/create-external-load-balancer/#preserving-the-client-source-ip ## externalTrafficPolicy: Cluster ## @param primary.service.loadBalancerSourceRanges Address that are allowed when MariaDB Primary service is LoadBalancer ## https://kubernetes.io/docs/tasks/access-application-cluster/configure-cloud-provider-firewall/#restrict-access-for-loadbalancer-service ## E.g. ## loadBalancerSourceRanges: ## - 10.10.10.0/24 ## loadBalancerSourceRanges: [] ## @param primary.service.extraPorts Extra ports to expose (normally used with the `sidecar` value) ## extraPorts: [] ## @param primary.service.annotations Provide any additional annotations which may be required ## annotations: {} ## @param primary.service.sessionAffinity Session Affinity for Kubernetes service, can be "None" or "ClientIP" ## If "ClientIP", consecutive client requests will be directed to the same Pod ## ref: https://kubernetes.io/docs/concepts/services-networking/service/#virtual-ips-and-service-proxies ## sessionAffinity: None ## @param primary.service.sessionAffinityConfig Additional settings for the sessionAffinity ## sessionAffinityConfig: ## clientIP: ## timeoutSeconds: 300 sessionAffinityConfig: {} ## MariaDB primary Pod Disruption Budget configuration ## ref: https://kubernetes.io/docs/tasks/run-application/configure-pdb/ ## pdb: ## @param primary.pdb.create Enable/disable a Pod Disruption Budget creation for MariaDB primary pods ## create: false ## @param primary.pdb.minAvailable Minimum number/percentage of MariaDB primary pods that must still be available after the eviction ## minAvailable: 1 ## @param primary.pdb.maxUnavailable Maximum number/percentage of MariaDB primary pods that can be unavailable after the eviction ## maxUnavailable: "" ## @param primary.revisionHistoryLimit Maximum number of revisions that will be maintained in the StatefulSet ## revisionHistoryLimit: 10 ## @section MariaDB Secondary parameters ## Mariadb Secondary parameters ## secondary: ## @param secondary.replicaCount Number of MariaDB secondary replicas ## replicaCount: 1 ## @param secondary.command Override default container command on MariaDB Secondary container(s) (useful when using custom images) ## command: [] ## @param secondary.args Override default container args on MariaDB Secondary container(s) (useful when using custom images) ## args: [] ## @param secondary.lifecycleHooks for the MariaDB Secondary container(s) to automate configuration before or after startup ## lifecycleHooks: {} ## @param secondary.hostAliases Add deployment host aliases ## https://kubernetes.io/docs/concepts/services-networking/add-entries-to-pod-etc-hosts-with-host-aliases/ ## hostAliases: [] ## @param secondary.configuration [string] MariaDB Secondary configuration to be injected as ConfigMap ## ref: https://mysql.com/kb/en/mysql/configuring-mysql-with-mycnf/#example-of-configuration-file ## configuration: |- [mysqld] skip-name-resolve explicit_defaults_for_timestamp basedir=/opt/bitnami/mariadb port=3306 socket=/opt/bitnami/mariadb/tmp/mysql.sock tmpdir=/opt/bitnami/mariadb/tmp max_allowed_packet=16M bind-address=0.0.0.0 pid-file=/opt/bitnami/mariadb/tmp/mysqld.pid log-error=/opt/bitnami/mariadb/logs/mysqld.log character-set-server=UTF8 collation-server=utf8_general_ci [client] port=3306 socket=/opt/bitnami/mariadb/tmp/mysql.sock default-character-set=UTF8 [manager] port=3306 socket=/opt/bitnami/mariadb/tmp/mysql.sock pid-file=/opt/bitnami/mariadb/tmp/mysqld.pid ## @param secondary.existingConfigmap Name of existing ConfigMap with MariaDB Secondary configuration. ## NOTE: When it's set the 'configuration' parameter is ignored ## existingConfigmap: "" ## @param secondary.updateStrategy.type MariaDB secondary statefulset strategy type ## ref: https://kubernetes.io/docs/concepts/workloads/controllers/statefulset/#update-strategies ## updateStrategy: ## StrategyType ## Can be set to RollingUpdate or OnDelete ## type: RollingUpdate ## @param secondary.rollingUpdatePartition Partition update strategy for Mariadb Secondary statefulset ## https://kubernetes.io/docs/concepts/workloads/controllers/statefulset/#partitions ## rollingUpdatePartition: "" ## @param secondary.podAnnotations Additional pod annotations for MariaDB secondary pods ## ref: https://kubernetes.io/docs/concepts/overview/working-with-objects/annotations/ ## podAnnotations: {} ## @param secondary.podLabels Extra labels for MariaDB secondary pods ## ref: https://kubernetes.io/docs/concepts/overview/working-with-objects/labels/ ## podLabels: {} ## @param secondary.podAffinityPreset MariaDB secondary pod affinity preset. Ignored if `secondary.affinity` is set. Allowed values: `soft` or `hard` ## ref: https://kubernetes.io/docs/concepts/scheduling-eviction/assign-pod-node/#inter-pod-affinity-and-anti-affinity ## podAffinityPreset: "" ## @param secondary.podAntiAffinityPreset MariaDB secondary pod anti-affinity preset. Ignored if `secondary.affinity` is set. Allowed values: `soft` or `hard` ## Ref: https://kubernetes.io/docs/concepts/scheduling-eviction/assign-pod-node/#inter-pod-affinity-and-anti-affinity ## podAntiAffinityPreset: soft ## Mariadb Secondary node affinity preset ## Ref: https://kubernetes.io/docs/concepts/scheduling-eviction/assign-pod-node/#node-affinity ## nodeAffinityPreset: ## @param secondary.nodeAffinityPreset.type MariaDB secondary node affinity preset type. Ignored if `secondary.affinity` is set. Allowed values: `soft` or `hard` ## type: "" ## @param secondary.nodeAffinityPreset.key MariaDB secondary node label key to match Ignored if `secondary.affinity` is set. ## E.g. ## key: "kubernetes.io/e2e-az-name" ## key: "" ## @param secondary.nodeAffinityPreset.values MariaDB secondary node label values to match. Ignored if `secondary.affinity` is set. ## E.g. ## values: ## - e2e-az1 ## - e2e-az2 ## values: [] ## @param secondary.affinity Affinity for MariaDB secondary pods assignment ## Ref: https://kubernetes.io/docs/concepts/configuration/assign-pod-node/#affinity-and-anti-affinity ## Note: podAffinityPreset, podAntiAffinityPreset, and nodeAffinityPreset will be ignored when it's set ## affinity: {} ## @param secondary.nodeSelector Node labels for MariaDB secondary pods assignment ## Ref: https://kubernetes.io/docs/user-guide/node-selection/ ## nodeSelector: {} ## @param secondary.tolerations Tolerations for MariaDB secondary pods assignment ## Ref: https://kubernetes.io/docs/concepts/configuration/taint-and-toleration/ ## tolerations: [] ## @param secondary.topologySpreadConstraints Topology Spread Constraints for MariaDB secondary pods assignment ## ref: https://kubernetes.io/docs/concepts/workloads/pods/pod-topology-spread-constraints/ ## E.g. ## topologySpreadConstraints: ## - maxSkew: 1 ## topologyKey: topology.kubernetes.io/zone ## whenUnsatisfiable: DoNotSchedule ## topologySpreadConstraints: {} ## @param secondary.priorityClassName Priority class for MariaDB secondary pods assignment ## Ref: https://kubernetes.io/docs/concepts/configuration/pod-priority-preemption/ ## priorityClassName: "" ## @param secondary.schedulerName Name of the k8s scheduler (other than default) ## ref: https://kubernetes.io/docs/tasks/administer-cluster/configure-multiple-schedulers/ ## schedulerName: "" ## @param secondary.podManagementPolicy podManagementPolicy to manage scaling operation of MariaDB secondary pods ## ref: https://kubernetes.io/docs/concepts/workloads/controllers/statefulset/#pod-management-policies ## podManagementPolicy: "" ## MariaDB secondary Pod security context ## ref: https://kubernetes.io/docs/tasks/configure-pod-container/security-context/#set-the-security-context-for-a-pod ## @param secondary.podSecurityContext.enabled Enable security context for MariaDB secondary pods ## @param secondary.podSecurityContext.fsGroup Group ID for the mounted volumes' filesystem ## podSecurityContext: enabled: true fsGroup: 1001 ## MariaDB secondary container security context ## ref: https://kubernetes.io/docs/tasks/configure-pod-container/security-context/#set-the-security-context-for-a-container ## @param secondary.containerSecurityContext.enabled MariaDB secondary container securityContext ## @param secondary.containerSecurityContext.runAsUser User ID for the MariaDB secondary container ## @param secondary.containerSecurityContext.runAsNonRoot Set Controller container's Security Context runAsNonRoot ## containerSecurityContext: enabled: true runAsUser: 1001 runAsNonRoot: true ## MariaDB secondary container's resource requests and limits ## ref: https://kubernetes.io/docs/user-guide/compute-resources/ ## We usually recommend not to specify default resources and to leave this as a conscious ## choice for the user. This also increases chances charts run on environments with little ## resources, such as Minikube. If you do want to specify resources, uncomment the following ## lines, adjust them as necessary, and remove the curly braces after 'resources:'. ## @param secondary.resources.limits The resources limits for MariaDB secondary containers ## @param secondary.resources.requests The requested resources for MariaDB secondary containers ## resources: ## Example: ## limits: ## cpu: 100m ## memory: 256Mi limits: {} ## Examples: ## requests: ## cpu: 100m ## memory: 256Mi requests: {} ## Configure extra options for MariaDB Secondary containers' liveness, readiness and startup probes ## ref: https://kubernetes.io/docs/tasks/configure-pod-container/configure-liveness-readiness-probes/#configure-probes) ## @param secondary.startupProbe.enabled Enable startupProbe ## @param secondary.startupProbe.initialDelaySeconds Initial delay seconds for startupProbe ## @param secondary.startupProbe.periodSeconds Period seconds for startupProbe ## @param secondary.startupProbe.timeoutSeconds Timeout seconds for startupProbe ## @param secondary.startupProbe.failureThreshold Failure threshold for startupProbe ## @param secondary.startupProbe.successThreshold Success threshold for startupProbe ## startupProbe: enabled: false initialDelaySeconds: 120 periodSeconds: 15 timeoutSeconds: 5 failureThreshold: 10 successThreshold: 1 ## Configure extra options for liveness probe ## ref: https://kubernetes.io/docs/tasks/configure-pod-container/configure-liveness-readiness-probes/#configure-probes ## @param secondary.livenessProbe.enabled Enable livenessProbe ## @param secondary.livenessProbe.initialDelaySeconds Initial delay seconds for livenessProbe ## @param secondary.livenessProbe.periodSeconds Period seconds for livenessProbe ## @param secondary.livenessProbe.timeoutSeconds Timeout seconds for livenessProbe ## @param secondary.livenessProbe.failureThreshold Failure threshold for livenessProbe ## @param secondary.livenessProbe.successThreshold Success threshold for livenessProbe ## livenessProbe: enabled: true initialDelaySeconds: 120 periodSeconds: 10 timeoutSeconds: 1 failureThreshold: 3 successThreshold: 1 ## @param secondary.readinessProbe.enabled Enable readinessProbe ## @param secondary.readinessProbe.initialDelaySeconds Initial delay seconds for readinessProbe ## @param secondary.readinessProbe.periodSeconds Period seconds for readinessProbe ## @param secondary.readinessProbe.timeoutSeconds Timeout seconds for readinessProbe ## @param secondary.readinessProbe.failureThreshold Failure threshold for readinessProbe ## @param secondary.readinessProbe.successThreshold Success threshold for readinessProbe ## readinessProbe: enabled: true initialDelaySeconds: 30 periodSeconds: 10 timeoutSeconds: 1 failureThreshold: 3 successThreshold: 1 ## @param secondary.customStartupProbe Override default startup probe for MariaDB secondary containers ## customStartupProbe: {} ## @param secondary.customLivenessProbe Override default liveness probe for MariaDB secondary containers ## customLivenessProbe: {} ## @param secondary.customReadinessProbe Override default readiness probe for MariaDB secondary containers ## customReadinessProbe: {} ## @param secondary.startupWaitOptions Override default builtin startup wait check options for MariaDB secondary containers ## `bitnami/mariadb` Docker image has built-in startup check mechanism, ## which periodically checks if MariaDB service has started up and stops it ## if all checks have failed after X tries. Use these to control these checks. ## ref: https://github.com/bitnami/bitnami-docker-mariadb/pull/240 ## Example (with default options): ## startupWaitOptions: ## retries: 300 ## waitTime: 2 ## startupWaitOptions: {} ## @param secondary.extraFlags MariaDB secondary additional command line flags ## Can be used to specify command line flags, for example: ## E.g. ## extraFlags: "--max-connect-errors=1000 --max_connections=155" ## extraFlags: "" ## @param secondary.extraEnvVars Extra environment variables to be set on MariaDB secondary containers ## E.g. ## extraEnvVars: ## - name: TZ ## value: "Europe/Paris" ## extraEnvVars: [] ## @param secondary.extraEnvVarsCM Name of existing ConfigMap containing extra env vars for MariaDB secondary containers ## extraEnvVarsCM: "" ## @param secondary.extraEnvVarsSecret Name of existing Secret containing extra env vars for MariaDB secondary containers ## extraEnvVarsSecret: "" ## Enable persistence using Persistent Volume Claims ## ref: https://kubernetes.io/docs/user-guide/persistent-volumes/ ## persistence: ## @param secondary.persistence.enabled Enable persistence on MariaDB secondary replicas using a `PersistentVolumeClaim` ## enabled: true ## @param secondary.persistence.subPath Subdirectory of the volume to mount at ## subPath: "" ## @param secondary.persistence.storageClass MariaDB secondary persistent volume storage Class ## If defined, storageClassName: <storageClass> ## If set to "-", storageClassName: "", which disables dynamic provisioning ## If undefined (the default) or set to null, no storageClassName spec is ## set, choosing the default provisioner. (gp2 on AWS, standard on ## GKE, AWS & OpenStack) ## storageClass: "" ## @param secondary.persistence.annotations MariaDB secondary persistent volume claim annotations ## annotations: {} ## @param secondary.persistence.accessModes MariaDB secondary persistent volume access Modes ## accessModes: - ReadWriteOnce ## @param secondary.persistence.size MariaDB secondary persistent volume size ## size: 8Gi ## @param secondary.persistence.selector Selector to match an existing Persistent Volume ## selector: ## matchLabels: ## app: my-app ## selector: {} ## @param secondary.extraVolumes Optionally specify extra list of additional volumes to the MariaDB secondary pod(s) ## extraVolumes: [] ## @param secondary.extraVolumeMounts Optionally specify extra list of additional volumeMounts for the MariaDB secondary container(s) ## extraVolumeMounts: [] ## @param secondary.initContainers Add additional init containers for the MariaDB secondary pod(s) ## initContainers: [] ## @param secondary.sidecars Add additional sidecar containers for the MariaDB secondary pod(s) ## sidecars: [] ## MariaDB Secondary Service parameters ## service: ## @param secondary.service.type MariaDB secondary Kubernetes service type ## type: ClusterIP ## @param secondary.service.ports.mysql MariaDB secondary Kubernetes service port ## ports: mysql: 3306 ## @param secondary.service.nodePorts.mysql MariaDB secondary Kubernetes service node port ## ref: https://kubernetes.io/docs/concepts/services-networking/service/#type-nodeport ## nodePorts: mysql: "" ## @param secondary.service.clusterIP MariaDB secondary Kubernetes service clusterIP IP ## e.g: ## clusterIP: None ## clusterIP: "" ## @param secondary.service.loadBalancerIP MariaDB secondary loadBalancerIP if service type is `LoadBalancer` ## ref: https://kubernetes.io/docs/concepts/services-networking/service/#internal-load-balancer ## loadBalancerIP: "" ## @param secondary.service.externalTrafficPolicy Enable client source IP preservation ## ref https://kubernetes.io/docs/tasks/access-application-cluster/create-external-load-balancer/#preserving-the-client-source-ip ## externalTrafficPolicy: Cluster ## @param secondary.service.loadBalancerSourceRanges Address that are allowed when MariaDB secondary service is LoadBalancer ## https://kubernetes.io/docs/tasks/access-application-cluster/configure-cloud-provider-firewall/#restrict-access-for-loadbalancer-service ## E.g. ## loadBalancerSourceRanges: ## - 10.10.10.0/24 ## loadBalancerSourceRanges: [] ## @param secondary.service.extraPorts Extra ports to expose (normally used with the `sidecar` value) ## extraPorts: [] ## @param secondary.service.annotations Provide any additional annotations which may be required ## annotations: {} ## @param secondary.service.sessionAffinity Session Affinity for Kubernetes service, can be "None" or "ClientIP" ## If "ClientIP", consecutive client requests will be directed to the same Pod ## ref: https://kubernetes.io/docs/concepts/services-networking/service/#virtual-ips-and-service-proxies ## sessionAffinity: None ## @param secondary.service.sessionAffinityConfig Additional settings for the sessionAffinity ## sessionAffinityConfig: ## clientIP: ## timeoutSeconds: 300 sessionAffinityConfig: {} ## MariaDB secondary Pod Disruption Budget configuration ## ref: https://kubernetes.io/docs/tasks/run-application/configure-pdb/ ## pdb: ## @param secondary.pdb.create Enable/disable a Pod Disruption Budget creation for MariaDB secondary pods ## create: false ## @param secondary.pdb.minAvailable Minimum number/percentage of MariaDB secondary pods that should remain scheduled ## minAvailable: 1 ## @param secondary.pdb.maxUnavailable Maximum number/percentage of MariaDB secondary pods that may be made unavailable ## maxUnavailable: "" ## @param secondary.revisionHistoryLimit Maximum number of revisions that will be maintained in the StatefulSet ## revisionHistoryLimit: 10 ## @section RBAC parameters ## MariaDB pods ServiceAccount ## ref: https://kubernetes.io/docs/tasks/configure-pod-container/configure-service-account/ ## serviceAccount: ## @param serviceAccount.create Enable the creation of a ServiceAccount for MariaDB pods ## create: true ## @param serviceAccount.name Name of the created ServiceAccount ## If not set and create is true, a name is generated using the mariadb.fullname template ## name: "" ## @param serviceAccount.annotations Annotations for MariaDB Service Account ## annotations: {} ## @param serviceAccount.automountServiceAccountToken Automount service account token for the server service account ## automountServiceAccountToken: false ## Role Based Access ## ref: https://kubernetes.io/docs/admin/authorization/rbac/ ## rbac: ## @param rbac.create Whether to create and use RBAC resources or not ## create: false ## @section Volume Permissions parameters ## Init containers parameters: ## volumePermissions: Change the owner and group of the persistent volume mountpoint to runAsUser:fsGroup values from the securityContext section. ## volumePermissions: ## @param volumePermissions.enabled Enable init container that changes the owner and group of the persistent volume(s) mountpoint to `runAsUser:fsGroup` ## enabled: false ## @param volumePermissions.image.registry Init container volume-permissions image registry ## @param volumePermissions.image.repository Init container volume-permissions image repository ## @param volumePermissions.image.tag Init container volume-permissions image tag (immutable tags are recommended) ## @param volumePermissions.image.pullPolicy Init container volume-permissions image pull policy ## @param volumePermissions.image.pullSecrets Specify docker-registry secret names as an array ## image: registry: docker.io repository: bitnami/bitnami-shell tag: 10-debian-10-r366 pullPolicy: IfNotPresent ## Optionally specify an array of imagePullSecrets (secrets must be manually created in the namespace) ## ref: https://kubernetes.io/docs/tasks/configure-pod-container/pull-image-private-registry/ ## Example: ## pullSecrets: ## - myRegistryKeySecretName ## pullSecrets: [] ## @param volumePermissions.resources.limits Init container volume-permissions resource limits ## @param volumePermissions.resources.requests Init container volume-permissions resource requests ## resources: limits: {} requests: {} ## @section Metrics parameters ## Mysqld Prometheus exporter parameters ## metrics: ## @param metrics.enabled Start a side-car prometheus exporter ## enabled: false ## @param metrics.image.registry Exporter image registry ## @param metrics.image.repository Exporter image repository ## @param metrics.image.tag Exporter image tag (immutable tags are recommended) ## @param metrics.image.pullPolicy Exporter image pull policy ## @param metrics.image.pullSecrets Specify docker-registry secret names as an array ## image: registry: docker.io repository: bitnami/mysqld-exporter tag: 0.14.0-debian-10-r10 pullPolicy: IfNotPresent ## Optionally specify an array of imagePullSecrets (secrets must be manually created in the namespace) ## ref: https://kubernetes.io/docs/tasks/configure-pod-container/pull-image-private-registry/ ## Example: ## pullSecrets: ## - myRegistryKeySecretName ## pullSecrets: [] ## @param metrics.annotations [object] Annotations for the Exporter pod ## annotations: prometheus.io/scrape: "true" prometheus.io/port: "9104" ## @param metrics.extraArgs [object] Extra args to be passed to mysqld_exporter ## ref: https://github.com/prometheus/mysqld_exporter/ ## E.g. ## - --collect.auto_increment.columns ## - --collect.binlog_size ## - --collect.engine_innodb_status ## - --collect.engine_tokudb_status ## - --collect.global_status ## - --collect.global_variables ## - --collect.info_schema.clientstats ## - --collect.info_schema.innodb_metrics ## - --collect.info_schema.innodb_tablespaces ## - --collect.info_schema.innodb_cmp ## - --collect.info_schema.innodb_cmpmem ## - --collect.info_schema.processlist ## - --collect.info_schema.processlist.min_time ## - --collect.info_schema.query_response_time ## - --collect.info_schema.tables ## - --collect.info_schema.tables.databases ## - --collect.info_schema.tablestats ## - --collect.info_schema.userstats ## - --collect.perf_schema.eventsstatements ## - --collect.perf_schema.eventsstatements.digest_text_limit ## - --collect.perf_schema.eventsstatements.limit ## - --collect.perf_schema.eventsstatements.timelimit ## - --collect.perf_schema.eventswaits ## - --collect.perf_schema.file_events ## - --collect.perf_schema.file_instances ## - --collect.perf_schema.indexiowaits ## - --collect.perf_schema.tableiowaits ## - --collect.perf_schema.tablelocks ## - --collect.perf_schema.replication_group_member_stats ## - --collect.slave_status ## - --collect.slave_hosts ## - --collect.heartbeat ## - --collect.heartbeat.database ## - --collect.heartbeat.table ## extraArgs: primary: [] secondary: [] ## MariaDB metrics container Security Context ## ref: https://kubernetes.io/docs/tasks/configure-pod-container/security-context/#set-the-security-context-for-a-container ## @param metrics.containerSecurityContext.enabled Enable security context for MariaDB metrics container ## Example: ## containerSecurityContext: ## enabled: true ## capabilities: ## drop: ["NET_RAW"] ## readOnlyRootFilesystem: true ## containerSecurityContext: enabled: false ## Mysqld Prometheus exporter resource requests and limits ## ref: https://kubernetes.io/docs/user-guide/compute-resources/ ## We usually recommend not to specify default resources and to leave this as a conscious ## choice for the user. This also increases chances charts run on environments with little ## resources, such as Minikube. If you do want to specify resources, uncomment the following ## lines, adjust them as necessary, and remove the curly braces after 'resources:'. ## @param metrics.resources.limits The resources limits for MariaDB prometheus exporter containers ## @param metrics.resources.requests The requested resources for MariaDB prometheus exporter containers ## resources: ## Example: ## limits: ## cpu: 100m ## memory: 256Mi limits: {} ## Examples: ## requests: ## cpu: 100m ## memory: 256Mi requests: {} ## Configure extra options for liveness probe ## ref: https://kubernetes.io/docs/tasks/configure-pod-container/configure-liveness-readiness-probes/#configure-probes ## @param metrics.livenessProbe.enabled Enable livenessProbe ## @param metrics.livenessProbe.initialDelaySeconds Initial delay seconds for livenessProbe ## @param metrics.livenessProbe.periodSeconds Period seconds for livenessProbe ## @param metrics.livenessProbe.timeoutSeconds Timeout seconds for livenessProbe ## @param metrics.livenessProbe.failureThreshold Failure threshold for livenessProbe ## @param metrics.livenessProbe.successThreshold Success threshold for livenessProbe ## livenessProbe: enabled: true initialDelaySeconds: 120 periodSeconds: 10 timeoutSeconds: 1 successThreshold: 1 failureThreshold: 3 ## Configure extra options for readiness probe ## ref: https://kubernetes.io/docs/tasks/configure-pod-container/configure-liveness-readiness-probes/#configure-probes ## @param metrics.readinessProbe.enabled Enable readinessProbe ## @param metrics.readinessProbe.initialDelaySeconds Initial delay seconds for readinessProbe ## @param metrics.readinessProbe.periodSeconds Period seconds for readinessProbe ## @param metrics.readinessProbe.timeoutSeconds Timeout seconds for readinessProbe ## @param metrics.readinessProbe.failureThreshold Failure threshold for readinessProbe ## @param metrics.readinessProbe.successThreshold Success threshold for readinessProbe ## readinessProbe: enabled: true initialDelaySeconds: 30 periodSeconds: 10 timeoutSeconds: 1 successThreshold: 1 failureThreshold: 3 ## Prometheus Service Monitor ## ref: https://github.com/coreos/prometheus-operator ## serviceMonitor: ## @param metrics.serviceMonitor.enabled Create ServiceMonitor Resource for scraping metrics using PrometheusOperator ## enabled: false ## @param metrics.serviceMonitor.namespace Namespace which Prometheus is running in ## namespace: "" ## @param metrics.serviceMonitor.jobLabel The name of the label on the target service to use as the job name in prometheus. ## jobLabel: "" ## @param metrics.serviceMonitor.interval Interval at which metrics should be scraped ## interval: 30s ## @param metrics.serviceMonitor.scrapeTimeout Specify the timeout after which the scrape is ended ## e.g: ## scrapeTimeout: 30s ## scrapeTimeout: "" ## @param metrics.serviceMonitor.relabelings RelabelConfigs to apply to samples before scraping ## ref: https://github.com/coreos/prometheus-operator/blob/master/Documentation/api.md#relabelconfig ## relabelings: [] ## @param metrics.serviceMonitor.metricRelabelings MetricRelabelConfigs to apply to samples before ingestion ## ref: https://github.com/coreos/prometheus-operator/blob/master/Documentation/api.md#relabelconfig ## metricRelabelings: [] ## @param metrics.serviceMonitor.honorLabels honorLabels chooses the metric's labels on collisions with target labels ## honorLabels: false ## @param metrics.serviceMonitor.selector ServiceMonitor selector labels ## ref: https://github.com/bitnami/charts/tree/master/bitnami/prometheus-operator#prometheus-configuration ## ## selector: ## prometheus: my-prometheus ## selector: {} ## @param metrics.serviceMonitor.labels Extra labels for the ServiceMonitor ## labels: {} ## Prometheus Operator PrometheusRule configuration ## prometheusRule: ## @param metrics.prometheusRule.enabled if `true`, creates a Prometheus Operator PrometheusRule (also requires `metrics.enabled` to be `true` and `metrics.prometheusRule.rules`) ## enabled: false ## @param metrics.prometheusRule.namespace Namespace for the PrometheusRule Resource (defaults to the Release Namespace) ## namespace: "" ## @param metrics.prometheusRule.additionalLabels Additional labels that can be used so PrometheusRule will be discovered by Prometheus ## additionalLabels: {} ## @param metrics.prometheusRule.rules Prometheus Rule definitions ## - alert: MariaDB-Down ## expr: absent(up{job="mariadb"} == 1) ## for: 5m ## labels: ## severity: warning ## service: mariadb ## annotations: ## message: 'MariaDB instance {{ $labels.instance }} is down' ## summary: MariaDB instance is down ## rules: [] ## @section NetworkPolicy parameters ## Add networkpolicies ## networkPolicy: ## @param networkPolicy.enabled Enable network policies ## enabled: false ## @param networkPolicy.metrics.enabled Enable network policy for metrics (prometheus) ## @param networkPolicy.metrics.namespaceSelector [object] Monitoring namespace selector labels. These labels will be used to identify the prometheus' namespace. ## @param networkPolicy.metrics.podSelector [object] Monitoring pod selector labels. These labels will be used to identify the Prometheus pods. ## metrics: enabled: false ## e.g: ## podSelector: ## label: monitoring ## podSelector: {} ## e.g: ## namespaceSelector: ## label: monitoring ## namespaceSelector: {} ## @param networkPolicy.ingressRules.primaryAccessOnlyFrom.enabled Enable ingress rule that makes primary mariadb nodes only accessible from a particular origin. ## @param networkPolicy.ingressRules.primaryAccessOnlyFrom.namespaceSelector [object] Namespace selector label that is allowed to access the primary node. This label will be used to identified the allowed namespace(s). ## @param networkPolicy.ingressRules.primaryAccessOnlyFrom.podSelector [object] Pods selector label that is allowed to access the primary node. This label will be used to identified the allowed pod(s). ## @param networkPolicy.ingressRules.primaryAccessOnlyFrom.customRules [object] Custom network policy for the primary node. ## @param networkPolicy.ingressRules.secondaryAccessOnlyFrom.enabled Enable ingress rule that makes primary mariadb nodes only accessible from a particular origin. ## @param networkPolicy.ingressRules.secondaryAccessOnlyFrom.namespaceSelector [object] Namespace selector label that is allowed to acces the secondary nodes. This label will be used to identified the allowed namespace(s). ## @param networkPolicy.ingressRules.secondaryAccessOnlyFrom.podSelector [object] Pods selector label that is allowed to access the secondary nodes. This label will be used to identified the allowed pod(s). ## @param networkPolicy.ingressRules.secondaryAccessOnlyFrom.customRules [object] Custom network policy for the secondary nodes. ## ingressRules: ## Allow access to the primary node only from the indicated: primaryAccessOnlyFrom: enabled: false ## e.g: ## namespaceSelector: ## label: ingress ## namespaceSelector: {} ## e.g: ## podSelector: ## label: access ## podSelector: {} ## custom ingress rules ## e.g: ## customRules: ## - from: ## - namespaceSelector: ## matchLabels: ## label: example customRules: {} ## Allow access to the secondary node only from the indicated: secondaryAccessOnlyFrom: enabled: false ## e.g: ## namespaceSelector: ## label: ingress ## namespaceSelector: {} ## e.g: ## podSelector: ## label: access ## podSelector: {} ## custom ingress rules ## e.g: ## CustomRules: ## - from: ## - namespaceSelector: ## matchLabels: ## label: example customRules: {} ## @param networkPolicy.egressRules.denyConnectionsToExternal Enable egress rule that denies outgoing traffic outside the cluster, except for DNS (port 53). ## @param networkPolicy.egressRules.customRules [object] Custom network policy rule ## egressRules: # Deny connections to external. This is not compatible with an external database. denyConnectionsToExternal: false ## Additional custom egress rules ## e.g: ## customRules: ## - to: ## - namespaceSelector: ## matchLabels: ## label: example customRules: {}
43.977582
301
0.738621
b81bd9ebc6b6e5bff5946b24c9978075d32beccd
847
yaml
YAML
bitnami/tomcat/Chart.yaml
00arthur00/charts
502aa1e64541669b732a4eda896e5937847b6c3c
[ "Apache-2.0" ]
null
null
null
bitnami/tomcat/Chart.yaml
00arthur00/charts
502aa1e64541669b732a4eda896e5937847b6c3c
[ "Apache-2.0" ]
2
2022-01-26T01:14:30.000Z
2022-01-26T07:03:39.000Z
bitnami/tomcat/Chart.yaml
00arthur00/charts
502aa1e64541669b732a4eda896e5937847b6c3c
[ "Apache-2.0" ]
null
null
null
annotations: category: ApplicationServer apiVersion: v2 appVersion: 10.0.18 dependencies: - name: common repository: https://charts.bitnami.com/bitnami tags: - bitnami-common version: 1.x.x description: Apache Tomcat is an open-source web server designed to host and run Java-based web applications. It is a lightweight server with a good performance for applications running in production environments. engine: gotpl home: https://github.com/bitnami/charts/tree/master/bitnami/tomcat icon: https://bitnami.com/assets/stacks/tomcat/img/tomcat-stack-220x234.png keywords: - tomcat - java - http - web - application server - jsp maintainers: - email: [email protected] name: Bitnami name: tomcat sources: - https://github.com/bitnami/bitnami-docker-tomcat - http://tomcat.apache.org version: 10.1.13
28.233333
213
0.748524
775424e57bfe6a05f73a4db8b74c6acebdcfe535
793
yaml
YAML
bitnami/minio/Chart.yaml
00arthur00/charts
502aa1e64541669b732a4eda896e5937847b6c3c
[ "Apache-2.0" ]
null
null
null
bitnami/minio/Chart.yaml
00arthur00/charts
502aa1e64541669b732a4eda896e5937847b6c3c
[ "Apache-2.0" ]
null
null
null
bitnami/minio/Chart.yaml
00arthur00/charts
502aa1e64541669b732a4eda896e5937847b6c3c
[ "Apache-2.0" ]
null
null
null
annotations: category: Infrastructure apiVersion: v2 appVersion: 2022.3.14 dependencies: - name: common repository: https://charts.bitnami.com/bitnami tags: - bitnami-common version: 1.x.x description: MinIO(R) is an object storage server, compatible with Amazon S3 cloud storage service, mainly used for storing unstructured data (such as photos, videos, log files, etc.). engine: gotpl home: https://github.com/bitnami/charts/tree/master/bitnami/minio icon: https://bitnami.com/assets/stacks/minio/img/minio-stack-220x234.png keywords: - minio - storage - object-storage - s3 - cluster maintainers: - email: [email protected] name: Bitnami name: minio sources: - https://github.com/bitnami/bitnami-docker-minio - https://min.io version: 11.1.2
27.344828
184
0.735183
77c786302d9e8ea6da87bdf2546255403a09c55c
22,940
yaml
YAML
bitnami/kibana/values.yaml
00arthur00/charts
502aa1e64541669b732a4eda896e5937847b6c3c
[ "Apache-2.0" ]
null
null
null
bitnami/kibana/values.yaml
00arthur00/charts
502aa1e64541669b732a4eda896e5937847b6c3c
[ "Apache-2.0" ]
2
2022-01-26T01:14:30.000Z
2022-01-26T07:03:39.000Z
bitnami/kibana/values.yaml
00arthur00/charts
502aa1e64541669b732a4eda896e5937847b6c3c
[ "Apache-2.0" ]
null
null
null
## @section Global parameters ## Global Docker image parameters ## Please, note that this will override the image parameters, including dependencies, configured to use the global value ## Current available global Docker image parameters: imageRegistry, imagePullSecrets and storageClass ## @param global.imageRegistry Global Docker image registry ## @param global.imagePullSecrets Global Docker registry secret names as an array ## @param global.storageClass Global StorageClass for Persistent Volume(s) ## global: imageRegistry: "" ## E.g. ## imagePullSecrets: ## - myRegistryKeySecretName ## imagePullSecrets: [] storageClass: "" ## @section Common parameters ## @param kubeVersion Force target Kubernetes version (using Helm capabilities if not set) ## kubeVersion: "" ## @param nameOverride String to partially override common.names.fullname template with a string (will prepend the release name) ## nameOverride: "" ## @param fullnameOverride String to fully override common.names.fullname template with a string ## fullnameOverride: "" ## @param extraDeploy Array of extra objects to deploy with the release ## extraDeploy: [] ## @section Kibana parameters ## Bitnami Kibana image version ## ref: https://hub.docker.com/r/bitnami/kibana/tags/ ## @param image.registry Kibana image registry ## @param image.repository Kibana image repository ## @param image.tag Kibana image tag (immutable tags are recommended) ## @param image.pullPolicy Kibana image pull policy ## @param image.pullSecrets Specify docker-registry secret names as an array ## image: registry: docker.io repository: bitnami/kibana tag: 7.17.1-debian-10-r8 ## Specify a imagePullPolicy ## Defaults to 'Always' if image tag is 'latest', else set to 'IfNotPresent' ## ref: https://kubernetes.io/docs/user-guide/images/#pre-pulling-images ## pullPolicy: IfNotPresent ## Optionally specify an array of imagePullSecrets. ## Secrets must be manually created in the namespace. ## ref: https://kubernetes.io/docs/tasks/configure-pod-container/pull-image-private-registry/ ## Example: ## pullSecrets: ## - myRegistryKeySecretName ## pullSecrets: [] ## @param replicaCount Number of replicas of the Kibana Pod ## replicaCount: 1 ## @param updateStrategy.type Set up update strategy for Kibana installation. ## Set to Recreate if you use persistent volume that cannot be mounted by more than one pods to makesure the pods are destroyed first. ## ref: https://kubernetes.io/docs/concepts/workloads/controllers/deployment/#strategy ## Example: ## updateStrategy: ## type: RollingUpdate ## rollingUpdate: ## maxSurge: 25% ## maxUnavailable: 25% ## updateStrategy: type: RollingUpdate ## @param schedulerName Alternative scheduler ## ref: https://kubernetes.io/docs/tasks/administer-cluster/configure-multiple-schedulers/ ## schedulerName: "" ## @param hostAliases Add deployment host aliases ## https://kubernetes.io/docs/concepts/services-networking/add-entries-to-pod-etc-hosts-with-host-aliases/ ## hostAliases: [] ## @param plugins Array containing the Kibana plugins to be installed in deployment ## eg: ## plugins: ## - https://github.com/fbaligand/kibana-enhanced-table/releases/download/v1.5.0/enhanced-table-1.5.0_7.3.2.zip ## plugins: [] ## Saved objects to import (NDJSON format) ## savedObjects: ## @param savedObjects.urls Array containing links to NDJSON files to be imported during Kibana initialization ## e.g: ## urls: ## - www.example.com/dashboard.ndjson ## urls: [] ## @param savedObjects.configmap Configmap containing NDJSON files to be imported during Kibana initialization (evaluated as a template) ## configmap: "" ## @param extraConfiguration Extra settings to be added to the default kibana.yml configmap that the chart creates (unless replaced using `configurationCM`). Evaluated as a template ## extraConfiguration: {} ## @param configurationCM ConfigMap containing a kibana.yml file that will replace the default one specified in configuration.yaml ## configurationCM: "" ## @param extraEnvVars Array containing extra env vars to configure Kibana ## For example: ## extraEnvVars: ## - name: KIBANA_ELASTICSEARCH_URL ## value: test ## extraEnvVars: [] ## @param extraEnvVarsCM ConfigMap containing extra env vars to configure Kibana ## extraEnvVarsCM: "" ## @param extraEnvVarsSecret Secret containing extra env vars to configure Kibana (in case of sensitive data) ## extraEnvVarsSecret: "" ## @param extraVolumes Array to add extra volumes. Requires setting `extraVolumeMounts` ## extraVolumes: [] ## @param extraVolumeMounts Array to add extra mounts. Normally used with `extraVolumes` ## extraVolumeMounts: [] ## Init containers parameters: ## volumePermissions: Change the owner of the persist volume mountpoint to RunAsUser:fsGroup ## volumePermissions: ## @param volumePermissions.enabled Enable init container that changes volume permissions in the data directory (for cases where the default k8s `runAsUser` and `fsUser` values do not work) ## enabled: false ## @param volumePermissions.image.registry Init container volume-permissions image registry ## @param volumePermissions.image.repository Init container volume-permissions image name ## @param volumePermissions.image.tag Init container volume-permissions image tag ## @param volumePermissions.image.pullPolicy Init container volume-permissions image pull policy ## @param volumePermissions.image.pullSecrets Init container volume-permissions image pull secrets ## image: registry: docker.io repository: bitnami/bitnami-shell tag: 10-debian-10-r366 pullPolicy: IfNotPresent ## Optionally specify an array of imagePullSecrets. ## Secrets must be manually created in the namespace. ## ref: https://kubernetes.io/docs/tasks/configure-pod-container/pull-image-private-registry/ ## Example: ## pullSecrets: ## - myRegistryKeySecretName ## pullSecrets: [] ## @param volumePermissions.resources Volume Permissions resources ## resources: ## requests: ## memory: 128Mi ## cpu: 100m resources: {} ## Enable persistence using Persistent Volume Claims ## ref: https://kubernetes.io/docs/user-guide/persistent-volumes/ ## persistence: ## @param persistence.enabled Enable persistence ## enabled: true ## @param persistence.storageClass Kibana data Persistent Volume Storage Class ## If defined, storageClassName: <storageClass> ## If set to "-", storageClassName: "", which disables dynamic provisioning ## If undefined (the default) or set to null, no storageClassName spec is ## set, choosing the default provisioner. (gp2 on AWS, standard on ## GKE, AWS & OpenStack) ## storageClass: "" ## @param persistence.existingClaim Provide an existing `PersistentVolumeClaim` ## existingClaim: "" ## @param persistence.accessMode Access mode to the PV ## accessMode: ReadWriteOnce ## @param persistence.size Size for the PV ## size: 10Gi ## Configure extra options for liveness probe ## ref: https://kubernetes.io/docs/tasks/configure-pod-container/configure-liveness-readiness-probes/#configure-probes) ## @param livenessProbe.enabled Enable/disable the Liveness probe ## @param livenessProbe.initialDelaySeconds Delay before liveness probe is initiated ## @param livenessProbe.periodSeconds How often to perform the probe ## @param livenessProbe.timeoutSeconds When the probe times out ## @param livenessProbe.failureThreshold Minimum consecutive failures for the probe to be considered failed after having succeeded. ## @param livenessProbe.successThreshold Minimum consecutive successes for the probe to be considered successful after having failed. ## livenessProbe: enabled: true initialDelaySeconds: 120 periodSeconds: 10 timeoutSeconds: 5 failureThreshold: 6 successThreshold: 1 ## Configure extra options for readiness probe ## ref: https://kubernetes.io/docs/tasks/configure-pod-container/configure-liveness-readiness-probes/#configure-probes) ## @param readinessProbe.enabled Enable/disable the Readiness probe ## @param readinessProbe.initialDelaySeconds Delay before readiness probe is initiated ## @param readinessProbe.periodSeconds How often to perform the probe ## @param readinessProbe.timeoutSeconds When the probe times out ## @param readinessProbe.failureThreshold Minimum consecutive failures for the probe to be considered failed after having succeeded. ## @param readinessProbe.successThreshold Minimum consecutive successes for the probe to be considered successful after having failed. ## readinessProbe: enabled: true initialDelaySeconds: 30 periodSeconds: 10 timeoutSeconds: 5 failureThreshold: 6 successThreshold: 1 ## @param forceInitScripts Force execution of init scripts ## forceInitScripts: false ## @param initScriptsCM Configmap with init scripts to execute ## initScriptsCM: "" ## @param initScriptsSecret Secret with init scripts to execute (for sensitive data) ## initScriptsSecret: "" ## Service configuration ## service: ## @param service.port Kubernetes Service port ## port: 5601 ## @param service.type Kubernetes Service type ## type: ClusterIP ## @param service.nodePort Specify the nodePort value for the LoadBalancer and NodePort service types ## ref: https://kubernetes.io/docs/concepts/services-networking/service/#type-nodeport ## nodePort: "" ## @param service.externalTrafficPolicy Enable client source IP preservation ## ref https://kubernetes.io/docs/tasks/access-application-cluster/create-external-load-balancer/#preserving-the-client-source-ip ## externalTrafficPolicy: Cluster ## @param service.annotations Annotations for Kibana service (evaluated as a template) ## This can be used to set the LoadBalancer service type to internal only. ## ref: https://kubernetes.io/docs/concepts/services-networking/service/#internal-load-balancer ## annotations: {} ## @param service.labels Extra labels for Kibana service ## labels: {} ## @param service.loadBalancerIP loadBalancerIP if Kibana service type is `LoadBalancer` ## ref: https://kubernetes.io/docs/user-guide/services/#type-loadbalancer ## loadBalancerIP: "" ## @param service.extraPorts Extra ports to expose in the service (normally used with the `sidecar` value) ## extraPorts: [] ## Configure the ingress resource that allows you to access the ## Kibana installation. Set up the URL ## ref: https://kubernetes.io/docs/user-guide/ingress/ ## ingress: ## @param ingress.enabled Enable ingress controller resource ## enabled: false ## DEPRECATED: Use ingress.annotations instead of ingress.certManager ## certManager: false ## ## @param ingress.pathType Ingress Path type ## pathType: ImplementationSpecific ## @param ingress.apiVersion Override API Version (automatically detected if not set) ## apiVersion: "" ## @param ingress.hostname Default host for the ingress resource. If specified as "*" no host rule is configured ## hostname: kibana.local ## @param ingress.path The Path to Kibana. You may need to set this to '/*' in order to use this with ALB ingress controllers. ## path: / ## @param ingress.annotations Additional annotations for the Ingress resource. To enable certificate autogeneration, place here your cert-manager annotations. ## For a full list of possible ingress annotations, please see ## ref: https://github.com/kubernetes/ingress-nginx/blob/master/docs/user-guide/nginx-configuration/annotations.md ## Use this parameter to set the required annotations for cert-manager, see ## ref: https://cert-manager.io/docs/usage/ingress/#supported-annotations ## ## e.g: ## annotations: ## kubernetes.io/ingress.class: nginx ## cert-manager.io/cluster-issuer: cluster-issuer-name ## annotations: {} ## @param ingress.tls Enable TLS configuration for the hostname defined at ingress.hostname parameter ## TLS certificates will be retrieved from a TLS secret with name: {{- printf "%s-tls" .Values.ingress.hostname }} ## You can use the ingress.secrets parameter to create this TLS secret or relay on cert-manager to create it ## tls: false ## @param ingress.selfSigned Create a TLS secret for this ingress record using self-signed certificates generated by Helm ## selfSigned: false ## @param ingress.extraHosts The list of additional hostnames to be covered with this ingress record. ## Most likely the hostname above will be enough, but in the event more hosts are needed, this is an array ## extraHosts: ## - name: kibana.local ## path: / ## extraHosts: [] ## @param ingress.extraPaths Additional arbitrary path/backend objects ## For example: The ALB ingress controller requires a special rule for handling SSL redirection. ## extraPaths: ## - path: /* ## backend: ## serviceName: ssl-redirect ## servicePort: use-annotation ## extraPaths: [] ## @param ingress.extraTls The tls configuration for additional hostnames to be covered with this ingress record. ## see: https://kubernetes.io/docs/concepts/services-networking/ingress/#tls ## extraTls: ## - hosts: ## - kibana.local ## secretName: kibana.local-tls ## extraTls: [] ## @param ingress.secrets If you're providing your own certificates, please use this to add the certificates as secrets ## key and certificate should start with -----BEGIN CERTIFICATE----- or ## -----BEGIN RSA PRIVATE KEY----- ## ## name should line up with a tlsSecret set further up ## If you're using cert-manager, this is unneeded, as it will create the secret for you if it is not set ## ## It is also possible to create and manage the certificates outside of this helm chart ## Please see README.md for more information ## e.g: ## - name: kibana.local-tls ## key: ## certificate: ## secrets: [] ## @param ingress.ingressClassName IngressClass that will be be used to implement the Ingress (Kubernetes 1.18+) ## This is supported in Kubernetes 1.18+ and required if you have more than one IngressClass marked as the default for your cluster . ## ref: https://kubernetes.io/blog/2020/04/02/improvements-to-the-ingress-api-in-kubernetes-1.18/ ## ingressClassName: "" ## @param serviceAccount.create Enable creation of ServiceAccount for Kibana ## @param serviceAccount.name Name of serviceAccount ## @param serviceAccount.annotations Additional custom annotations for the ServiceAccount serviceAccount: create: true name: "" annotations: {} ## @param containerPort Port to expose at container level ## containerPort: 5601 ## @param securityContext.enabled Enable securityContext on for Kibana deployment ## @param securityContext.fsGroup Group to configure permissions for volumes ## @param securityContext.runAsUser User for the security context ## @param securityContext.runAsNonRoot Set container's Security Context runAsNonRoot ## securityContext: enabled: true runAsUser: 1001 fsGroup: 1001 runAsNonRoot: true ## Kibana resource requests and limits ## ref: https://kubernetes.io/docs/user-guide/compute-resources/ ## We usually recommend not to specify default resources and to leave this as a conscious ## choice for the user. This also increases chances charts run on environments with little ## resources, such as Minikube. If you do want to specify resources, uncomment the following ## lines, adjust them as necessary, and remove the curly braces after 'resources:'. ## @param resources.limits The resources limits for the container ## @param resources.requests The requested resources for the container ## resources: ## Example: ## limits: ## cpu: 100m ## memory: 256Mi limits: {} ## Examples: ## requests: ## cpu: 100m ## memory: 256Mi requests: {} ## @param podAffinityPreset Pod affinity preset. Ignored if `affinity` is set. Allowed values: `soft` or `hard` ## ref: https://kubernetes.io/docs/concepts/scheduling-eviction/assign-pod-node/#inter-pod-affinity-and-anti-affinity ## podAffinityPreset: "" ## @param podAntiAffinityPreset Pod anti-affinity preset. Ignored if `affinity` is set. Allowed values: `soft` or `hard` ## Ref: https://kubernetes.io/docs/concepts/scheduling-eviction/assign-pod-node/#inter-pod-affinity-and-anti-affinity ## podAntiAffinityPreset: soft ## Node affinity preset ## Ref: https://kubernetes.io/docs/concepts/scheduling-eviction/assign-pod-node/#node-affinity ## Allowed values: soft, hard ## nodeAffinityPreset: ## @param nodeAffinityPreset.type Node affinity preset type. Ignored if `affinity` is set. Allowed values: `soft` or `hard` ## type: "" ## @param nodeAffinityPreset.key Node label key to match Ignored if `affinity` is set. ## E.g. ## key: "kubernetes.io/e2e-az-name" ## key: "" ## @param nodeAffinityPreset.values Node label values to match. Ignored if `affinity` is set. ## E.g. ## values: ## - e2e-az1 ## - e2e-az2 ## values: [] ## @param affinity Affinity for pod assignment ## Ref: https://kubernetes.io/docs/concepts/configuration/assign-pod-node/#affinity-and-anti-affinity ## Note: podAffinityPreset, podAntiAffinityPreset, and nodeAffinityPreset will be ignored when it's set ## affinity: {} ## @param nodeSelector Node labels for pod assignment ## Ref: https://kubernetes.io/docs/user-guide/node-selection/ ## nodeSelector: {} ## @param tolerations Tolerations for pod assignment ## Ref: https://kubernetes.io/docs/concepts/configuration/taint-and-toleration/ ## tolerations: [] ## @param podAnnotations Pod annotations ## ref: https://kubernetes.io/docs/concepts/overview/working-with-objects/annotations/ ## podAnnotations: {} ## @param podLabels Extra labels to add to Pod ## podLabels: {} ## @param sidecars Attach additional containers to the pod ## e.g. ## - name: your-image-name ## image: your-image ## imagePullPolicy: Always ## ports: ## - name: portname ## containerPort: 1234 ## sidecars: [] ## @param initContainers Add additional init containers to the pod ## e.g. ## - name: your-image-name ## image: your-image ## imagePullPolicy: Always ## ports: ## - name: portname ## containerPort: 1234 ## initContainers: [] ## @param configuration [object] Kibana configuration ## configuration: server: basePath: "" rewriteBasePath: false ## Prometheus metrics (requires the kibana-prometheus-exporter plugin) ## metrics: ## @param metrics.enabled Start a side-car prometheus exporter ## enabled: false service: ## @param metrics.service.annotations [object] Prometheus annotations for the Kibana service ## annotations: prometheus.io/scrape: "true" prometheus.io/port: "80" prometheus.io/path: "_prometheus/metrics" ## Prometheus Operator ServiceMonitor configuration ## serviceMonitor: ## @param metrics.serviceMonitor.enabled If `true`, creates a Prometheus Operator ServiceMonitor (also requires `metrics.enabled` to be `true`) ## enabled: false ## @param metrics.serviceMonitor.namespace Namespace in which Prometheus is running ## namespace: "" ## @param metrics.serviceMonitor.interval Interval at which metrics should be scraped. ## ref: https://github.com/coreos/prometheus-operator/blob/master/Documentation/api.md#endpoint ## e.g: ## interval: 10s ## interval: "" ## @param metrics.serviceMonitor.scrapeTimeout Timeout after which the scrape is ended ## ref: https://github.com/coreos/prometheus-operator/blob/master/Documentation/api.md#endpoint ## e.g: ## scrapeTimeout: 10s ## scrapeTimeout: "" ## @param metrics.serviceMonitor.selector Prometheus instance selector labels ## ref: https://github.com/bitnami/charts/tree/master/bitnami/prometheus-operator#prometheus-configuration ## e.g: ## selector: ## prometheus: my-prometheus ## # selector: # prometheus: my-prometheus selector: {} ## @section Kibana server TLS configuration ## tls: ## @param tls.enabled Enable SSL/TLS encryption for Kibana server (HTTPS) ## enabled: false ## @param tls.autoGenerated Create self-signed TLS certificates. Currently only supports PEM certificates. ## autoGenerated: false ## @param tls.existingSecret Name of the existing secret containing Kibana server certificates ## existingSecret: "" ## @param tls.usePemCerts Use this variable if your secrets contain PEM certificates instead of PKCS12 ## Note: Ignored when using autoGenerated certs. ## usePemCerts: false ## @param tls.keyPassword Password to access the PEM key when it is password-protected. ## keyPassword: "" ## @param tls.keystorePassword Password to access the PKCS12 keystore when it is password-protected. ## keystorePassword: "" ## @param tls.passwordsSecret Name of a existing secret containing the Keystore or PEM key password ## passwordsSecret: "" ## @section Elasticsearch parameters ## elasticsearch: ## @param elasticsearch.hosts List of elasticsearch hosts to connect to. ## e.g: ## hosts: ## - elasticsearch-1 ## - elasticsearch-2 ## hosts: [] ## @param elasticsearch.port Elasticsearch port ## port: "" security: auth: ## @param elasticsearch.security.auth.enabled Set to 'true' if Elasticsearch has authentication enabled ## enabled: false ## @param elasticsearch.security.auth.kibanaUsername Kibana server user to authenticate with Elasticsearch ## kibanaUsername: "elastic" ## @param elasticsearch.security.auth.kibanaPassword Kibana server password to authenticate with Elasticsearch ## kibanaPassword: "" ## @param elasticsearch.security.auth.existingSecret Name of the existing secret containing the Password for the Kibana user ## existingSecret: "" tls: ## @param elasticsearch.security.tls.enabled Set to 'true' if Elasticsearch API uses TLS/SSL (HTTPS) ## enabled: false ## @param elasticsearch.security.tls.verificationMode Verification mode for SSL communications. ## Supported values: full, certificate, none. ## Ref: https://www.elastic.co/guide/en/kibana/7.x/settings.html#elasticsearch-ssl-verificationmode verificationMode: "full" ## @param elasticsearch.security.tls.existingSecret Name of the existing secret containing Elasticsearch Truststore or CA certificate. Required unless verificationMode=none ## existingSecret: "" ## @param elasticsearch.security.tls.usePemCerts Set to 'true' to use PEM certificates instead of PKCS12. ## usePemCerts: false ## @param elasticsearch.security.tls.truststorePassword Password to access the PKCS12 trustore in case it is password-protected. ## truststorePassword: "" ## @param elasticsearch.security.tls.passwordsSecret Name of a existing secret containing the Truststore password ## passwordsSecret: ""
39.688581
191
0.739015
ae9e3428646bbf9c9e9948ad622449d29ae05575
30,396
yaml
YAML
bitnami/phpbb/values.yaml
00arthur00/charts
502aa1e64541669b732a4eda896e5937847b6c3c
[ "Apache-2.0" ]
null
null
null
bitnami/phpbb/values.yaml
00arthur00/charts
502aa1e64541669b732a4eda896e5937847b6c3c
[ "Apache-2.0" ]
2
2022-01-26T01:14:30.000Z
2022-01-26T07:03:39.000Z
bitnami/phpbb/values.yaml
00arthur00/charts
502aa1e64541669b732a4eda896e5937847b6c3c
[ "Apache-2.0" ]
null
null
null
## @section Global parameters ## Global Docker image parameters ## Please, note that this will override the image parameters, including dependencies, configured to use the global value ## Current available global Docker image parameters: imageRegistry, imagePullSecrets and storageClass ## @param global.imageRegistry Global Docker image registry ## @param global.imagePullSecrets Global Docker registry secret names as an array ## @param global.storageClass Global StorageClass for Persistent Volume(s) ## global: imageRegistry: "" ## E.g. ## imagePullSecrets: ## - myRegistryKeySecretName ## imagePullSecrets: [] storageClass: "" ## @section Common parameters ## @param kubeVersion Force target Kubernetes version (using Helm capabilities if not set) ## kubeVersion: "" ## @param nameOverride String to partially override common.names.fullname template (will maintain the release name) ## nameOverride: "" ## @param fullnameOverride String to fully override common.names.fullname template ## fullnameOverride: "" ## @param commonAnnotations Common annotations to add to all phpBB resources (sub-charts are not considered). Evaluated as a template ## commonAnnotations: {} ## @param commonLabels Common labels to add to all phpBB resources (sub-charts are not considered). Evaluated as a template ## commonLabels: {} ## @param extraDeploy Array of extra objects to deploy with the release (evaluated as a template) ## extraDeploy: [] ## @section phpBB parameters ## Bitnami phpBB image version ## ref: https://hub.docker.com/r/bitnami/phpbb/tags/ ## @param image.registry phpBB image registry ## @param image.repository phpBB Image repository ## @param image.tag phpBB Image tag (immutable tags are recommended) ## @param image.pullPolicy phpBB image pull policy ## @param image.pullSecrets Specify docker-registry secret names as an array ## @param image.debug Specify if debug logs should be enabled ## image: registry: docker.io repository: bitnami/phpbb tag: 3.3.6-debian-10-r0 ## Specify a imagePullPolicy ## Defaults to 'Always' if image tag is 'latest', else set to 'IfNotPresent' ## ref: https://kubernetes.io/docs/user-guide/images/#pre-pulling-images ## pullPolicy: IfNotPresent ## Optionally specify an array of imagePullSecrets. ## Secrets must be manually created in the namespace. ## ref: https://kubernetes.io/docs/tasks/configure-pod-container/pull-image-private-registry/ ## Example: ## pullSecrets: ## - myRegistryKeySecretName ## pullSecrets: [] ## Set to true if you would like to see extra information on logs ## debug: false ## @param replicaCount Number of replicas (requires ReadWriteMany PVC support) ## replicaCount: 1 ## @param phpbbSkipInstall Skip phpBB installation wizard. Useful for migrations and restoring from SQL dump ## ref: https://github.com/bitnami/bitnami-docker-phpbb#configuration ## phpbbSkipInstall: "no" ## @param phpbbDisableSessionValidation Disable session validation ## ref: https://github.com/bitnami/bitnami-docker-phpbb#configuration ## phpbbDisableSessionValidation: "yes" ## @param phpbbUsername User of the application ## ref: https://github.com/bitnami/bitnami-docker-phpbb#configuration ## phpbbUsername: user ## @param phpbbPassword Application password ## Defaults to a random 10-character alphanumeric string if not set ## ref: https://github.com/bitnami/bitnami-docker-phpbb#configuration ## phpbbPassword: "" ## @param phpbbEmail Admin email ## ref: https://github.com/bitnami/bitnami-docker-phpbb#configuration ## phpbbEmail: [email protected] ## @param allowEmptyPassword Allow DB blank passwords ## ref: https://github.com/bitnami/bitnami-docker-phpbb#environment-variables ## allowEmptyPassword: "no" ## @param command Override default container command (useful when using custom images) ## command: [] ## @param args Override default container args (useful when using custom images) ## args: [] ## @param hostAliases [array] Add deployment host aliases ## https://kubernetes.io/docs/concepts/services-networking/add-entries-to-pod-etc-hosts-with-host-aliases/ ## hostAliases: ## Necessary for apache-exporter to work ## - ip: "127.0.0.1" hostnames: - "status.localhost" ## @param updateStrategy.type Update strategy - only really applicable for deployments with RWO PVs attached ## If replicas = 1, an update can get "stuck", as the previous pod remains attached to the ## PV, and the "incoming" pod can never start. Changing the strategy to "Recreate" will ## terminate the single previous pod, so that the new, incoming pod can attach to the PV ## updateStrategy: type: RollingUpdate ## @param extraEnvVars An array to add extra env vars ## For example: ## - name: BEARER_AUTH ## value: true ## extraEnvVars: [] ## @param extraEnvVarsCM ConfigMap with extra environment variables ## extraEnvVarsCM: "" ## @param extraEnvVarsSecret Secret with extra environment variables ## extraEnvVarsSecret: "" ## @param extraVolumes Extra volumes to add to the deployment. Requires setting `extraVolumeMounts` ## extraVolumes: [] ## @param extraVolumeMounts Extra volume mounts to add to the container. Normally used with `extraVolumes` ## extraVolumeMounts: [] ## @param initContainers Extra init containers to add to the deployment ## initContainers: [] ## @param sidecars Extra sidecar containers to add to the deployment ## sidecars: [] ## @param tolerations Tolerations for pod assignment ## Ref: https://kubernetes.io/docs/concepts/configuration/taint-and-toleration/ ## tolerations: [] ## @param existingSecret Use existing secret for the application password ## existingSecret: "" ## Init containers parameters: ## volumePermissions: Change the owner and group of the persistent volume mountpoint to runAsUser:fsGroup values from the securityContext section. ## volumePermissions: ## @param volumePermissions.enabled Enable init container that changes volume permissions in the data directory (for cases where the default k8s `runAsUser` and `fsUser` values do not work) ## enabled: false ## @param volumePermissions.image.registry Init container volume-permissions image registry ## @param volumePermissions.image.repository Init container volume-permissions image repository ## @param volumePermissions.image.tag Init container volume-permissions image tag (immutable tags are recommended) ## @param volumePermissions.image.pullPolicy Init container volume-permissions image pull policy ## @param volumePermissions.image.pullSecrets Specify docker-registry secret names as an array ## image: registry: docker.io repository: bitnami/bitnami-shell tag: 10-debian-10-r366 pullPolicy: IfNotPresent ## Optionally specify an array of imagePullSecrets. ## Secrets must be manually created in the namespace. ## ref: https://kubernetes.io/docs/tasks/configure-pod-container/pull-image-private-registry/ ## Example: ## pullSecrets: ## - myRegistryKeySecretName ## pullSecrets: [] ## Init containers' resource requests and limits ## ref: https://kubernetes.io/docs/user-guide/compute-resources/ ## We usually recommend not to specify default resources and to leave this as a conscious ## choice for the user. This also increases chances charts run on environments with little ## resources, such as Minikube. If you do want to specify resources, uncomment the following ## lines, adjust them as necessary, and remove the curly braces after 'resources:'. ## @param volumePermissions.resources.limits The resources limits for the container ## @param volumePermissions.resources.requests The requested resources for the container ## resources: ## Example: ## limits: ## cpu: 100m ## memory: 128Mi limits: {} ## Examples: ## requests: ## cpu: 100m ## memory: 128Mi requests: {} ## SMTP mail delivery configuration ## ref: https://github.com/bitnami/bitnami-docker-phpbb/#smtp-configuration ## @param smtpHost SMTP host ## @param smtpPort SMTP port ## @param smtpUser SMTP user ## @param smtpPassword SMTP password ## @param smtpProtocol SMTP Protocol (options: ssl,tls, nil) ## smtpHost: "" smtpPort: "" smtpUser: "" smtpPassword: "" smtpProtocol: "" ## @param containerPorts [object] Container ports ## containerPorts: http: 8080 https: 8443 ## Enable persistence using Persistent Volume Claims ## ref: https://kubernetes.io/docs/user-guide/persistent-volumes/ ## persistence: ## @param persistence.enabled Enable persistence using PVC ## enabled: true ## @param persistence.storageClass Database data Persistent Volume Storage Class ## If defined, storageClassName: <storageClass> ## If set to "-", storageClassName: "", which disables dynamic provisioning ## If undefined (the default) or set to null, no storageClassName spec is ## set, choosing the default provisioner. (gp2 on AWS, standard on ## GKE, AWS & OpenStack) ## storageClass: "" ## @param persistence.accessModes PVC Access Mode for phpBB volume ## accessModes: - ReadWriteOnce ## @param persistence.size PVC Storage Request for phpBB volume ## size: 8Gi ## @param persistence.existingClaim A manually managed Persistent Volume Claim ## Requires persistence.enabled: true ## If defined, PVC must be created manually before volume will be bound ## existingClaim: "" ## @param persistence.hostPath Host mount path for phpBB volume ## Requires persistence.enabled: true ## Requires persistence.existingClaim: nil|false ## Default: nil. ## hostPath: "" ## @param persistence.annotations Persistent Volume Claim annotations ## annotations: {} ## @param podAffinityPreset Pod affinity preset. Ignored if `affinity` is set. Allowed values: `soft` or `hard` ## ref: https://kubernetes.io/docs/concepts/scheduling-eviction/assign-pod-node/#inter-pod-affinity-and-anti-affinity ## podAffinityPreset: "" ## @param podAntiAffinityPreset Pod anti-affinity preset. Ignored if `affinity` is set. Allowed values: `soft` or `hard` ## Ref: https://kubernetes.io/docs/concepts/scheduling-eviction/assign-pod-node/#inter-pod-affinity-and-anti-affinity ## podAntiAffinityPreset: soft ## Node affinity preset ## Ref: https://kubernetes.io/docs/concepts/scheduling-eviction/assign-pod-node/#node-affinity ## nodeAffinityPreset: ## @param nodeAffinityPreset.type Node affinity preset type. Ignored if `affinity` is set. Allowed values: `soft` or `hard` ## type: "" ## @param nodeAffinityPreset.key Node label key to match Ignored if `affinity` is set. ## E.g. ## key: "kubernetes.io/e2e-az-name" ## key: "" ## @param nodeAffinityPreset.values Node label values to match. Ignored if `affinity` is set. ## E.g. ## values: ## - e2e-az1 ## - e2e-az2 ## values: [] ## @param affinity Affinity for pod assignment. Evaluated as a template. ## Ref: https://kubernetes.io/docs/concepts/configuration/assign-pod-node/#affinity-and-anti-affinity ## affinity: {} ## @param nodeSelector Node labels for pod assignment. Evaluated as a template. ## ref: https://kubernetes.io/docs/user-guide/node-selection/ ## nodeSelector: {} ## Configure resource requests and limits ## ref: https://kubernetes.io/docs/user-guide/compute-resources/ ## @param resources.requests [object] The requested resources for the container ## @param resources.limits The resources limits for the container ## resources: requests: memory: 512Mi cpu: 300m limits: {} ## Configure Pods Security Context ## ref: https://kubernetes.io/docs/tasks/configure-pod-container/security-context/#set-the-security-context-for-a-pod ## @param podSecurityContext.enabled Enable phpBB pods' Security Context ## @param podSecurityContext.fsGroup phpBB pods' group ID ## podSecurityContext: enabled: true fsGroup: 1001 ## Configure Container Security Context (only main container) ## ref: https://kubernetes.io/docs/tasks/configure-pod-container/security-context/#set-the-security-context-for-a-container ## @param containerSecurityContext.enabled Enable phpBB containers' Security Context ## @param containerSecurityContext.runAsUser phpBB containers' Security Context runAsUser ## @param containerSecurityContext.runAsNonRoot phpBB containers' Security Context runAsNonRoot ## containerSecurityContext: enabled: true runAsUser: 1001 runAsNonRoot: true ## Configure extra options for startup probe ## ref: https://kubernetes.io/docs/tasks/configure-pod-container/configure-liveness-readiness-probes/#configure-probes ## @param startupProbe.enabled Enable startupProbe ## @param startupProbe.initialDelaySeconds Initial delay seconds for startupProbe ## @param startupProbe.periodSeconds Period seconds for startupProbe ## @param startupProbe.timeoutSeconds Timeout seconds for startupProbe ## @param startupProbe.failureThreshold Failure threshold for startupProbe ## @param startupProbe.successThreshold Success threshold for startupProbe ## startupProbe: enabled: false initialDelaySeconds: 600 periodSeconds: 10 timeoutSeconds: 5 failureThreshold: 6 successThreshold: 1 ## Configure extra options for liveness probe ## ref: https://kubernetes.io/docs/tasks/configure-pod-container/configure-liveness-readiness-probes/#configure-probes ## @param livenessProbe.enabled Enable livenessProbe ## @param livenessProbe.initialDelaySeconds Initial delay seconds for livenessProbe ## @param livenessProbe.periodSeconds Period seconds for livenessProbe ## @param livenessProbe.timeoutSeconds Timeout seconds for livenessProbe ## @param livenessProbe.failureThreshold Failure threshold for livenessProbe ## @param livenessProbe.successThreshold Success threshold for livenessProbe ## livenessProbe: enabled: true initialDelaySeconds: 600 periodSeconds: 10 timeoutSeconds: 5 failureThreshold: 6 successThreshold: 1 ## Configure extra options for readiness probe ## ref: https://kubernetes.io/docs/tasks/configure-pod-container/configure-liveness-readiness-probes/#configure-probes ## @param readinessProbe.enabled Enable readinessProbe ## @param readinessProbe.initialDelaySeconds Initial delay seconds for readinessProbe ## @param readinessProbe.periodSeconds Period seconds for readinessProbe ## @param readinessProbe.timeoutSeconds Timeout seconds for readinessProbe ## @param readinessProbe.failureThreshold Failure threshold for readinessProbe ## @param readinessProbe.successThreshold Success threshold for readinessProbe ## readinessProbe: enabled: true initialDelaySeconds: 30 periodSeconds: 5 timeoutSeconds: 3 failureThreshold: 6 successThreshold: 1 ## @param customStartupProbe Override default startup probe ## customStartupProbe: {} ## @param customLivenessProbe Override default liveness probe ## customLivenessProbe: {} ## @param customReadinessProbe Override default readiness probe ## customReadinessProbe: {} ## @param priorityClassName Define the priority class name to use for the phpbb pods ## ref: https://kubernetes.io/docs/concepts/configuration/pod-priority-preemption/ ## priorityClassName: "" ## @param schedulerName Name of the k8s scheduler (other than default) ## ref: https://kubernetes.io/docs/tasks/administer-cluster/configure-multiple-schedulers/ ## schedulerName: "" ## @param topologySpreadConstraints Topology Spread Constraints for pod assignment ## https://kubernetes.io/docs/concepts/workloads/pods/pod-topology-spread-constraints/ ## The value is evaluated as a template ## topologySpreadConstraints: [] ## @param lifecycleHooks LifecycleHook to set additional configuration before or after startup ## lifecycleHooks: {} ## @param podAnnotations Pod annotations ## ref: https://kubernetes.io/docs/concepts/overview/working-with-objects/annotations/ ## podAnnotations: {} ## @param podLabels Pod extra labels ## ref: https://kubernetes.io/docs/concepts/overview/working-with-objects/labels/ ## podLabels: {} ## @section Traffic Exposure Parameters ## Kubernetes configuration ## For minikube, set this to NodePort, for ingress ClusterIP, elsewhere use LoadBalancer ## service: ## @param service.type Kubernetes Service type ## type: LoadBalancer ## @param service.ports.http Service HTTP port ## @param service.ports.https Service HTTPS port ## ports: http: 80 https: 443 ## loadBalancerIP for the phpBB Service (optional, cloud specific) ## ref: https://kubernetes.io/docs/user-guide/services/#type-loadbalancer ## ## loadBalancerIP: ## @param service.nodePorts.http Kubernetes HTTP node port ## @param service.nodePorts.https Kubernetes HTTPS node port ## nodePorts: ## http: <to set explicitly, choose port between 30000-32767> ## https: <to set explicitly, choose port between 30000-32767> ## nodePorts: http: "" https: "" ## @param service.externalTrafficPolicy Enable client source IP preservation ## ref https://kubernetes.io/docs/tasks/access-application-cluster/create-external-load-balancer/#preserving-the-client-source-ip ## externalTrafficPolicy: Cluster ## @param service.clusterIP phpbb service Cluster IP ## e.g.: ## clusterIP: None ## clusterIP: "" ## @param service.loadBalancerIP phpbb service Load Balancer IP ## ref: https://kubernetes.io/docs/concepts/services-networking/service/#type-loadbalancer ## loadBalancerIP: "" ## @param service.loadBalancerSourceRanges phpbb service Load Balancer sources ## ref: https://kubernetes.io/docs/tasks/access-application-cluster/configure-cloud-provider-firewall/#restrict-access-for-loadbalancer-service ## e.g: ## loadBalancerSourceRanges: ## - 10.10.10.0/24 ## loadBalancerSourceRanges: [] ## @param service.extraPorts Extra ports to expose (normally used with the `sidecar` value) ## extraPorts: [] ## @param service.annotations Additional custom annotations for phpbb service ## annotations: {} ## @param service.sessionAffinity Session Affinity for Kubernetes service, can be "None" or "ClientIP" ## If "ClientIP", consecutive client requests will be directed to the same Pod ## ref: https://kubernetes.io/docs/concepts/services-networking/service/#virtual-ips-and-service-proxies ## sessionAffinity: None ## @param service.sessionAffinityConfig Additional settings for the sessionAffinity ## sessionAffinityConfig: ## clientIP: ## timeoutSeconds: 300 ## sessionAffinityConfig: {} ## Configure the ingress resource that allows you to access the ## phpBB installation. Set up the URL ## ref: https://kubernetes.io/docs/user-guide/ingress/ ## ingress: ## @param ingress.enabled Set to true to enable ingress record generation ## enabled: false ## DEPRECATED: Use ingress.annotations instead of ingress.certManager ## certManager: false ## ## @param ingress.pathType Ingress path type ## pathType: ImplementationSpecific ## @param ingress.apiVersion Override API Version (automatically detected if not set) ## apiVersion: "" ## @param ingress.hostname Default host for the ingress resource ## hostname: phpbb.local ## @param ingress.path The Path to phpBB. You may need to set this to '/*' in order to use this with ALB ingress controllers. ## path: / ## @param ingress.annotations Additional annotations for the Ingress resource. To enable certificate autogeneration, place here your cert-manager annotations. ## For a full list of possible ingress annotations, please see ## ref: https://github.com/kubernetes/ingress-nginx/blob/master/docs/user-guide/nginx-configuration/annotations.md ## Use this parameter to set the required annotations for cert-manager, see ## ref: https://cert-manager.io/docs/usage/ingress/#supported-annotations ## ## e.g: ## annotations: ## kubernetes.io/ingress.class: nginx ## cert-manager.io/cluster-issuer: cluster-issuer-name ## annotations: {} ## @param ingress.tls Enable TLS configuration for the hostname defined at ingress.hostname parameter ## TLS certificates will be retrieved from a TLS secret with name: {{- printf "%s-tls" .Values.ingress.hostname }} ## You can use the ingress.secrets parameter to create this TLS secret or relay on cert-manager to create it ## tls: false ## @param ingress.extraHosts The list of additional hostnames to be covered with this ingress record. ## Most likely the hostname above will be enough, but in the event more hosts are needed, this is an array ## extraHosts: ## - name: phpbb.local ## path: / ## extraHosts: [] ## @param ingress.extraPaths Any additional arbitrary paths that may need to be added to the ingress under the main host. ## For example: The ALB ingress controller requires a special rule for handling SSL redirection. ## extraPaths: ## - path: /* ## backend: ## serviceName: ssl-redirect ## servicePort: use-annotation ## extraPaths: [] ## @param ingress.extraTls The tls configuration for additional hostnames to be covered with this ingress record. ## see: https://kubernetes.io/docs/concepts/services-networking/ingress/#tls ## extraTls: ## - hosts: ## - phpbb.local ## secretName: phpbb.local-tls ## extraTls: [] ## @param ingress.secrets If you're providing your own certificates, please use this to add the certificates as secrets ## key and certificate should start with -----BEGIN CERTIFICATE----- or ## -----BEGIN RSA PRIVATE KEY----- ## ## name should line up with a tlsSecret set further up ## If you're using cert-manager, this is unneeded, as it will create the secret for you if it is not set ## ## It is also possible to create and manage the certificates outside of this helm chart ## Please see README.md for more information ## e.g: ## - name: phpbb.local-tls ## key: ## certificate: ## secrets: [] ## @param ingress.ingressClassName IngressClass that will be be used to implement the Ingress (Kubernetes 1.18+) ## This is supported in Kubernetes 1.18+ and required if you have more than one IngressClass marked as the default for your cluster . ## ref: https://kubernetes.io/blog/2020/04/02/improvements-to-the-ingress-api-in-kubernetes-1.18/ ## ingressClassName: "" ## @section Database parameters ## MariaDB chart configuration ## https://github.com/bitnami/charts/blob/master/bitnami/mariadb/values.yaml ## mariadb: ## @param mariadb.enabled Whether to deploy a mariadb server to satisfy the applications database requirements ## To use an external database set this to false and configure the externalDatabase parameters ## enabled: true ## @param mariadb.architecture MariaDB architecture. Allowed values: `standalone` or `replication` ## architecture: standalone ## MariaDB Authentication parameters ## auth: ## @param mariadb.auth.rootPassword Password for the MariaDB `root` user ## ref: https://github.com/bitnami/bitnami-docker-mariadb#setting-the-root-password-on-first-run ## rootPassword: "" ## @param mariadb.auth.database Database name to create ## ref: https://github.com/bitnami/bitnami-docker-mariadb/blob/master/README.md#creating-a-database-on-first-run ## database: bitnami_phpbb ## @param mariadb.auth.username Database user to create ## ref: https://github.com/bitnami/bitnami-docker-mariadb/blob/master/README.md#creating-a-database-user-on-first-run ## username: bn_phpbb ## @param mariadb.auth.password Password for the database ## password: "" primary: ## Enable persistence using Persistent Volume Claims ## ref: https://kubernetes.io/docs/user-guide/persistent-volumes/ ## persistence: ## @param mariadb.primary.persistence.enabled Enable database persistence using PVC ## enabled: true ## @param mariadb.primary.persistence.storageClass MariaDB primary persistent volume storage Class ## If defined, storageClassName: <storageClass> ## If set to "-", storageClassName: "", which disables dynamic provisioning ## If undefined (the default) or set to null, no storageClassName spec is ## set, choosing the default provisioner. (gp2 on AWS, standard on ## GKE, AWS & OpenStack) ## storageClass: "" ## @param mariadb.primary.persistence.accessModes PVC Access Modes for phpBB volume ## accessModes: - ReadWriteOnce ## @param mariadb.primary.persistence.size Database Persistent Volume Size ## size: 8Gi ## @param mariadb.primary.persistence.hostPath Host mount path for MariaDB volume ## hostPath: "" ## @param mariadb.primary.persistence.existingClaim Name of an existing `PersistentVolumeClaim` for MariaDB primary replicas ## existingClaim: "" ## External database configuration ## externalDatabase: ## @param externalDatabase.existingSecret Use existing secret (ignores previous password) ## Must contain key `mariadb-password` ## NOTE: When it's set, the `externalDatabase.password` parameter is ignored existingSecret: "" ## @param externalDatabase.host Host of the existing database ## host: "" ## @param externalDatabase.port Port of the existing database ## port: 3306 ## @param externalDatabase.user Existing username in the external db ## user: bn_phpbb ## @param externalDatabase.password Password for the above username ## password: "" ## @param externalDatabase.database Name of the existing database ## database: bitnami_phpbb ## @section Metrics parameters ## Prometheus Exporter / Metrics ## metrics: ## @param metrics.enabled Start a side-car prometheus exporter ## enabled: false ## @param metrics.image.registry Apache exporter image registry ## @param metrics.image.repository Apache exporter image repository ## @param metrics.image.tag Apache exporter image tag (immutable tags are recommended) ## @param metrics.image.pullPolicy Image pull policy ## @param metrics.image.pullSecrets Specify docker-registry secret names as an array ## image: registry: docker.io repository: bitnami/apache-exporter tag: 0.11.0-debian-10-r85 pullPolicy: IfNotPresent ## Optionally specify an array of imagePullSecrets. ## Secrets must be manually created in the namespace. ## ref: https://kubernetes.io/docs/tasks/configure-pod-container/pull-image-private-registry/ ## Example: ## pullSecrets: ## - myRegistryKeySecretName ## pullSecrets: [] ## @param metrics.resources Metrics exporter resource requests and limits ## ref: https://kubernetes.io/docs/user-guide/compute-resources/ ## resources: {} ## @param metrics.podAnnotations [object] Additional annotations for Metrics exporter pod ## podAnnotations: prometheus.io/scrape: "true" prometheus.io/port: "9117" ## @section NetworkPolicy parameters ## Add networkpolicies ## networkPolicy: ## @param networkPolicy.enabled Enable network policies ## If ingress.enabled or metrics.enabled are true, configure networkPolicy.ingress and networkPolicy.metrics selectors respectively to allow communication ## enabled: false ## @param networkPolicy.metrics.enabled Enable network policy for metrics (prometheus) ## @param networkPolicy.metrics.namespaceSelector Monitoring namespace selector labels. These labels will be used to identify the prometheus' namespace. ## @param networkPolicy.metrics.podSelector Monitoring pod selector labels. These labels will be used to identify the Prometheus pods. ## metrics: enabled: false ## e.g: ## podSelector: ## label: monitoring ## podSelector: {} ## e.g: ## namespaceSelector: ## label: monitoring ## namespaceSelector: {} ## @param networkPolicy.ingress.enabled Enable network policy for Ingress Proxies ## @param networkPolicy.ingress.namespaceSelector Ingress Proxy namespace selector labels. These labels will be used to identify the Ingress Proxy's namespace. ## @param networkPolicy.ingress.podSelector Ingress Proxy pods selector labels. These labels will be used to identify the Ingress Proxy pods. ## ingress: enabled: false ## e.g: ## podSelector: ## label: ingress ## podSelector: {} ## e.g: ## namespaceSelector: ## label: ingress ## namespaceSelector: {} ## @param networkPolicy.ingressRules.backendOnlyAccessibleByFrontend Enable ingress rule that makes the backend (mariadb) only accessible by phpBB's pods. ## @param networkPolicy.ingressRules.customBackendSelector Backend selector labels. These labels will be used to identify the backend pods. ## @param networkPolicy.ingressRules.accessOnlyFrom.enabled Enable ingress rule that makes phpBB only accessible from a particular origin ## @param networkPolicy.ingressRules.accessOnlyFrom.namespaceSelector Namespace selector label that is allowed to access phpBB. This label will be used to identified the allowed namespace(s). ## @param networkPolicy.ingressRules.accessOnlyFrom.podSelector Pods selector label that is allowed to access phpBB. This label will be used to identified the allowed pod(s). ## @param networkPolicy.ingressRules.customRules Custom network policy ingress rule ## ingressRules: ## mariadb backend only can be accessed from phpBB ## backendOnlyAccessibleByFrontend: false customBackendSelector: {} ## Allow only from the indicated: ## accessOnlyFrom: enabled: false ## e.g: ## namespaceSelector: ## label: ingress ## namespaceSelector: {} ## e.g: ## podSelector: ## label: access ## podSelector: {} ## custom ingress rules ## e.g: ## customRules: ## - from: ## - namespaceSelector: ## matchLabels: ## label: example ## customRules: {} ## @param networkPolicy.egressRules.denyConnectionsToExternal Enable egress rule that denies outgoing traffic outside the cluster, except for DNS (port 53). ## @param networkPolicy.egressRules.customRules Custom network policy rule ## egressRules: ## Deny connections to external. This is not compatible with an external database. ## denyConnectionsToExternal: false ## Additional custom egress rules ## e.g: ## customRules: ## - to: ## - namespaceSelector: ## matchLabels: ## label: example ## customRules: {}
39.942181
193
0.739472
801148fcc55507a4e3420329b1da251c71a05de2
870
yaml
YAML
bitnami/mariadb/Chart.yaml
00arthur00/charts
502aa1e64541669b732a4eda896e5937847b6c3c
[ "Apache-2.0" ]
null
null
null
bitnami/mariadb/Chart.yaml
00arthur00/charts
502aa1e64541669b732a4eda896e5937847b6c3c
[ "Apache-2.0" ]
2
2022-01-26T01:14:30.000Z
2022-01-26T07:03:39.000Z
bitnami/mariadb/Chart.yaml
00arthur00/charts
502aa1e64541669b732a4eda896e5937847b6c3c
[ "Apache-2.0" ]
null
null
null
annotations: category: Database apiVersion: v2 appVersion: 10.5.15 dependencies: - name: common repository: https://charts.bitnami.com/bitnami tags: - bitnami-common version: 1.x.x description: MariaDB is an open source, community-developed SQL database server that is widely in use around the world due to its enterprise features, flexibility, and collaboration with leading tech firms. engine: gotpl home: https://github.com/bitnami/charts/tree/master/bitnami/mariadb icon: https://bitnami.com/assets/stacks/mariadb/img/mariadb-stack-220x234.png keywords: - mariadb - mysql - database - sql - prometheus maintainers: - email: [email protected] name: Bitnami name: mariadb sources: - https://github.com/bitnami/bitnami-docker-mariadb - https://github.com/prometheus/mysqld_exporter - https://mariadb.org version: 10.4.1
29
206
0.750575
80f17d56acf99ccef125f61827af5ba016a44629
975
yaml
YAML
bitnami/oauth2-proxy/Chart.yaml
00arthur00/charts
502aa1e64541669b732a4eda896e5937847b6c3c
[ "Apache-2.0" ]
null
null
null
bitnami/oauth2-proxy/Chart.yaml
00arthur00/charts
502aa1e64541669b732a4eda896e5937847b6c3c
[ "Apache-2.0" ]
2
2022-01-26T01:14:30.000Z
2022-01-26T07:03:39.000Z
bitnami/oauth2-proxy/Chart.yaml
00arthur00/charts
502aa1e64541669b732a4eda896e5937847b6c3c
[ "Apache-2.0" ]
null
null
null
annotations: category: Infrastructure apiVersion: v2 appVersion: 7.2.1 dependencies: - name: redis repository: https://charts.bitnami.com/bitnami condition: redis.enabled version: 16.x.x - name: common repository: https://charts.bitnami.com/bitnami tags: - bitnami-common version: 1.x.x description: A reverse proxy and static file server that provides authentication using Providers (Google, GitHub, and others) to validate accounts by email, domain or group. engine: gotpl home: https://github.com/bitnami/charts/tree/master/bitnami/oauth2-proxy icon: https://bitnami.com/assets/stacks/oauth2-proxy/img/oauth2-proxy-stack-220x234.png keywords: - kubernetes - oauth - oauth2 - authentication - google - github maintainers: - email: [email protected] name: Bitnami name: oauth2-proxy sources: - https://github.com/bitnami/bitnami-docker-oauth2-proxy - https://github.com/oauth2-proxy/oauth2-proxy version: 2.0.9
28.676471
173
0.740513
446de167c9a13296d8ac4f85c3076911f268ad9d
796
yaml
YAML
bitnami/contour-operator/Chart.yaml
00arthur00/charts
502aa1e64541669b732a4eda896e5937847b6c3c
[ "Apache-2.0" ]
null
null
null
bitnami/contour-operator/Chart.yaml
00arthur00/charts
502aa1e64541669b732a4eda896e5937847b6c3c
[ "Apache-2.0" ]
2
2022-01-26T01:14:30.000Z
2022-01-26T07:03:39.000Z
bitnami/contour-operator/Chart.yaml
00arthur00/charts
502aa1e64541669b732a4eda896e5937847b6c3c
[ "Apache-2.0" ]
null
null
null
annotations: category: Infrastructure apiVersion: v2 appVersion: 1.20.1 dependencies: - name: common repository: https://charts.bitnami.com/bitnami tags: - bitnami-common version: 1.x.x description: The Contour Operator extends the Kubernetes API to create, configure and manage instances of Contour on behalf of users. engine: gotpl home: https://github.com/projectcontour/contour-operator icon: https://bitnami.com/assets/stacks/contour-operator/img/contour-operator-stack-220x234.png keywords: - contour - operator - ingress - envoy maintainers: - email: [email protected] name: Bitnami name: contour-operator sources: - https://github.com/projectcontour/contour-operator - https://github.com/bitnami/bitnami-docker-contour-operator version: 1.0.1
28.428571
133
0.758794
fa232b3d598f8bb7131f6a5d0dd174f23e07b9ba
41,336
yaml
YAML
bitnami/external-dns/values.yaml
00arthur00/charts
502aa1e64541669b732a4eda896e5937847b6c3c
[ "Apache-2.0" ]
null
null
null
bitnami/external-dns/values.yaml
00arthur00/charts
502aa1e64541669b732a4eda896e5937847b6c3c
[ "Apache-2.0" ]
null
null
null
bitnami/external-dns/values.yaml
00arthur00/charts
502aa1e64541669b732a4eda896e5937847b6c3c
[ "Apache-2.0" ]
null
null
null
## @section Global parameters ## Global Docker image parameters ## Please, note that this will override the image parameters, including dependencies, configured to use the global value ## Current available global Docker image parameters: imageRegistry, imagePullSecrets and storageClass ## ## @param global.imageRegistry Global Docker image registry ## @param global.imagePullSecrets Global Docker registry secret names as an array ## global: imageRegistry: "" ## E.g. ## imagePullSecrets: ## - myRegistryKeySecretName ## imagePullSecrets: [] ## @section Common parameters ## ## @param nameOverride String to partially override external-dns.fullname template (will maintain the release name) ## nameOverride: "" ## @param fullnameOverride String to fully override external-dns.fullname template ## fullnameOverride: "" ## @param clusterDomain Kubernetes Cluster Domain ## clusterDomain: cluster.local ## @param commonLabels Labels to add to all deployed objects ## commonLabels: {} ## @param commonAnnotations Annotations to add to all deployed objects ## commonAnnotations: {} ## ## @param extraDeploy Array of extra objects to deploy with the release (evaluated as a template). ## extraDeploy: [] ## @param kubeVersion Force target Kubernetes version (using Helm capabilities if not set) ## kubeVersion: "" ## @section external-dns parameters ## ## Bitnami external-dns image version ## ref: https://hub.docker.com/r/bitnami/external-dns/tags/ ## @param image.registry ExternalDNS image registry ## @param image.repository ExternalDNS image repository ## @param image.tag ExternalDNS Image tag (immutable tags are recommended) ## @param image.pullPolicy ExternalDNS image pull policy ## @param image.pullSecrets ExternalDNS image pull secrets ## image: registry: docker.io repository: bitnami/external-dns tag: 0.10.2-debian-10-r71 ## Specify a imagePullPolicy ## Defaults to 'Always' if image tag is 'latest', else set to 'IfNotPresent' ## ref: https://kubernetes.io/docs/user-guide/images/#pre-pulling-images ## pullPolicy: IfNotPresent ## Optionally specify an array of imagePullSecrets. ## Secrets must be manually created in the namespace. ## ref: https://kubernetes.io/docs/tasks/configure-pod-container/pull-image-private-registry/ ## e.g: ## pullSecrets: ## - myRegistryKeySecretName ## pullSecrets: [] ## @param hostAliases Deployment pod host aliases ## https://kubernetes.io/docs/concepts/services-networking/add-entries-to-pod-etc-hosts-with-host-aliases/ ## hostAliases: [] ## @param updateStrategy update strategy type ## ref: https://kubernetes.io/docs/concepts/workloads/controllers/deployment/#update-strategies ## updateStrategy: {} ## @param command Override kiam default command ## command: [] ## @param args Override kiam default args ## args: [] ## @param sources [array] K8s resources type to be observed for new DNS entries by ExternalDNS ## sources: # - crd - service - ingress # - contour-httpproxy ## @param provider DNS provider where the DNS records will be created. ## Available providers are: ## - alibabacloud, aws, azure, azure-private-dns, cloudflare, coredns, designate, digitalocean, google, hetzner, infoblox, linode, rfc2136, transip, oci ## provider: aws ## @param initContainers Attach additional init containers to the pod (evaluated as a template) ## initContainers: [] ## @param sidecars Attach additional containers to the pod (evaluated as a template) ## sidecars: [] ## Flags related to processing sources ## ref: https://github.com/kubernetes-sigs/external-dns/blob/master/pkg/apis/externaldns/types.go#L272 ## @param namespace Limit sources of endpoints to a specific namespace (default: all namespaces) ## namespace: "" ## @param fqdnTemplates Templated strings that are used to generate DNS names from sources that don't define a hostname themselves ## fqdnTemplates: [] ## @param containerPorts.http HTTP Container port ## containerPorts: http: 7979 ## @param combineFQDNAnnotation Combine FQDN template and annotations instead of overwriting ## combineFQDNAnnotation: false ## @param ignoreHostnameAnnotation Ignore hostname annotation when generating DNS names, valid only when fqdn-template is set ## ignoreHostnameAnnotation: false ## @param publishInternalServices Allow external-dns to publish DNS records for ClusterIP services ## publishInternalServices: false ## @param publishHostIP Allow external-dns to publish host-ip for headless services ## publishHostIP: false ## @param serviceTypeFilter The service types to take care about (default: all, options: ClusterIP, NodePort, LoadBalancer, ExternalName) ## serviceTypeFilter: [] ## Alibaba cloud configuration to be set via arguments/env. variables ## These will be added to /etc/kubernetes/alibaba-cloud.json via secret ## alibabacloud: ## @param alibabacloud.accessKeyId When using the Alibaba Cloud provider, set `accessKeyId` in the Alibaba Cloud configuration file (optional) ## accessKeyId: "" ## @param alibabacloud.accessKeySecret When using the Alibaba Cloud provider, set `accessKeySecret` in the Alibaba Cloud configuration file (optional) ## accessKeySecret: "" ## @param alibabacloud.regionId When using the Alibaba Cloud provider, set `regionId` in the Alibaba Cloud configuration file (optional) ## regionId: "" ## @param alibabacloud.vpcId Alibaba Cloud VPC Id ## vpcId: "" ## @param alibabacloud.secretName Use an existing secret with key "alibaba-cloud.json" defined. ## This ignores alibabacloud.accessKeyId, and alibabacloud.accessKeySecret ## secretName: "" ## @param alibabacloud.zoneType Zone Filter. Available values are: public, private, or no value for both ## zoneType: "" ## AWS configuration to be set via arguments/env. variables ## aws: ## AWS credentials ## @param aws.credentials.secretKey When using the AWS provider, set `aws_secret_access_key` in the AWS credentials (optional) ## @param aws.credentials.accessKey When using the AWS provider, set `aws_access_key_id` in the AWS credentials (optional) ## @param aws.credentials.mountPath When using the AWS provider, determine `mountPath` for `credentials` secret ## credentials: secretKey: "" accessKey: "" ## Before external-dns 0.5.9 home dir should be `/root/.aws` ## mountPath: "/.aws" ## @param aws.credentials.secretName Use an existing secret with key "credentials" defined. ## This ignores aws.credentials.secretKey, and aws.credentials.accessKey ## secretName: "" ## @param aws.region When using the AWS provider, `AWS_DEFAULT_REGION` to set in the environment (optional) ## region: "us-east-1" ## @param aws.zoneType When using the AWS provider, filter for zones of this type (optional, options: public, private) ## zoneType: "" ## @param aws.assumeRoleArn When using the AWS provider, assume role by specifying --aws-assume-role to the external-dns daemon ## assumeRoleArn: "" ## @param aws.roleArn Specify role ARN to the external-dns daemon ## roleArn: "" ## @param aws.apiRetries Maximum number of retries for AWS API calls before giving up ## apiRetries: 3 ## @param aws.batchChangeSize When using the AWS provider, set the maximum number of changes that will be applied in each batch ## batchChangeSize: 1000 ## @param aws.zoneTags When using the AWS provider, filter for zones with these tags ## zoneTags: [] ## @param aws.preferCNAME When using the AWS provider, replaces Alias records with CNAME (options: true, false) ## preferCNAME: "" ## @param aws.evaluateTargetHealth When using the AWS provider, sets the evaluate target health flag (options: true, false) ## evaluateTargetHealth: "" ## Azure configuration to be set via arguments/env. variables ## azure: ## When a secret to load azure.json is not specified, the host's /etc/kubernetes/azure.json will be used ## @param azure.secretName When using the Azure provider, set the secret containing the `azure.json` file ## secretName: "" ## @param azure.cloud When using the Azure provider, set the Azure Cloud ## cloud: "" ## @param azure.resourceGroup When using the Azure provider, set the Azure Resource Group ## resourceGroup: "" ## @param azure.tenantId When using the Azure provider, set the Azure Tenant ID ## tenantId: "" ## @param azure.subscriptionId When using the Azure provider, set the Azure Subscription ID ## subscriptionId: "" ## @param azure.aadClientId When using the Azure provider, set the Azure AAD Client ID ## aadClientId: "" ## @param azure.aadClientSecret When using the Azure provider, set the Azure AAD Client Secret ## aadClientSecret: "" ## @param azure.useManagedIdentityExtension When using the Azure provider, set if you use Azure MSI ## useManagedIdentityExtension: false ## @param azure.userAssignedIdentityID When using the Azure provider with Azure MSI, set Client ID of Azure user-assigned managed identity (optional, otherwise system-assigned managed identity is used) ## userAssignedIdentityID: "" ## Cloudflare configuration to be set via arguments/env. variables ## cloudflare: ## @param cloudflare.apiToken When using the Cloudflare provider, `CF_API_TOKEN` to set (optional) ## apiToken: "" ## @param cloudflare.apiKey When using the Cloudflare provider, `CF_API_KEY` to set (optional) ## apiKey: "" ## @param cloudflare.secretName When using the Cloudflare provider, it's the name of the secret containing cloudflare_api_token or cloudflare_api_key. ## This ignores cloudflare.apiToken, and cloudflare.apiKey ## secretName: "" ## @param cloudflare.email When using the Cloudflare provider, `CF_API_EMAIL` to set (optional). Needed when using CF_API_KEY ## email: "" ## @param cloudflare.proxied When using the Cloudflare provider, enable the proxy feature (DDOS protection, CDN...) (optional) ## proxied: true ## CoreDNS configuration to be set via arguments/env variables ## coredns: ## @param coredns.etcdEndpoints When using the CoreDNS provider, set etcd backend endpoints (comma-separated list) ## Secure (https) endpoints can be used as well, in that case `etcdTLS` section ## should be filled in accordingly ## etcdEndpoints: "http://etcd-extdns:2379" ## Configuration of the secure communication and client authentication to the etcd cluster ## If enabled all the values under this key must hold a valid data ## etcdTLS: ## @param coredns.etcdTLS.enabled When using the CoreDNS provider, enable secure communication with etcd ## enabled: false ## @param coredns.etcdTLS.autoGenerated Generate automatically self-signed TLS certificates ## autoGenerated: false ## @param coredns.etcdTLS.secretName When using the CoreDNS provider, specify a name of existing Secret with etcd certs and keys ## ref: https://github.com/etcd-io/etcd/blob/master/Documentation/op-guide/security.md ## ref (secret creation): ## https://github.com/bitnami/charts/tree/master/bitnami/etcd#configure-certificates-for-client-communication ## secretName: "etcd-client-certs" ## @param coredns.etcdTLS.mountPath When using the CoreDNS provider, set destination dir to mount data from `coredns.etcdTLS.secretName` to ## mountPath: "/etc/coredns/tls/etcd" ## @param coredns.etcdTLS.caFilename When using the CoreDNS provider, specify CA PEM file name from the `coredns.etcdTLS.secretName` ## caFilename: "ca.crt" ## @param coredns.etcdTLS.certFilename When using the CoreDNS provider, specify cert PEM file name from the `coredns.etcdTLS.secretName` ## Will be used by external-dns to authenticate against etcd ## certFilename: "cert.pem" ## @param coredns.etcdTLS.keyFilename When using the CoreDNS provider, specify private key PEM file name from the `coredns.etcdTLS.secretName` ## Will be used by external-dns to authenticate against etcd ## keyFilename: "key.pem" ## OpenStack Designate provider configuration to be set via arguments/env. variables ## designate: ## Set Openstack environment variables (optional). Username and password will be saved in a kubernetes secret ## The alternative to this is to export the necessary Openstack environment variables in the extraEnv argument ## @param designate.username When using the Designate provider, specify the OpenStack authentication username. (optional) ## @param designate.password When using the Designate provider, specify the OpenStack authentication password. (optional) ## @param designate.authUrl When using the Designate provider, specify the OpenStack authentication Url. (optional) ## @param designate.regionName When using the Designate provider, specify the OpenStack region name. (optional) ## @param designate.userDomainName When using the Designate provider, specify the OpenStack user domain name. (optional) ## @param designate.projectName When using the Designate provider, specify the OpenStack project name. (optional) ## @param designate.username When using the Designate provider, specify the OpenStack authentication username. (optional) ## e.g: ## username: "someuser" ## password: "p@55w0rd" ## authUrl: "https://mykeystone.example.net:5000/v3/" ## regionName: "dev" ## userDomainName: "development" ## projectName: "myteamname" ## username: "" password: "" authUrl: "" regionName: "" userDomainName: "" projectName: "" ## @param designate.customCAHostPath When using the Designate provider, use a CA file already on the host to validate Openstack APIs. This conflicts with `designate.customCA.enabled` ## This conflicts setting the above customCA to true and chart rendering will fail if you set customCA to true and specify customCAHostPath ## customCAHostPath: "" ## Use a custom CA (optional) ## @param designate.customCA.enabled When using the Designate provider, enable a custom CA (optional) ## @param designate.customCA.content When using the Designate provider, set the content of the custom CA ## @param designate.customCA.mountPath When using the Designate provider, set the mountPath in which to mount the custom CA configuration ## @param designate.customCA.filename When using the Designate provider, set the custom CA configuration filename ## customCA: enabled: false content: "" mountPath: "/config/designate" filename: "designate-ca.pem" ## DigitalOcean configuration to be set via arguments/env. variables ## digitalocean: ## @param digitalocean.apiToken When using the DigitalOcean provider, `DO_TOKEN` to set (optional) ## apiToken: "" ## @param digitalocean.secretName Use an existing secret with key "digitalocean_api_token" defined. ## This ignores digitalocean.apiToken ## secretName: "" ## Google configuration to be set via arguments/env. variables ## google: ## @param google.project When using the Google provider, specify the Google project (required when provider=google) ## project: "" ## @param google.serviceAccountSecret When using the Google provider, specify the existing secret which contains credentials.json (optional) ## serviceAccountSecret: "" ## @param google.serviceAccountSecretKey When using the Google provider with an existing secret, specify the key name (optional) ## serviceAccountSecretKey: "credentials.json" ## @param google.serviceAccountKey When using the Google provider, specify the service account key JSON file. In this case a new secret will be created holding this service account (optional) ## serviceAccountKey: "" ## @param google.zoneVisibility When using the Google provider, fiter for zones of a specific visibility (private or public) ## zoneVisibility: "" ## Hetzner configuration to be set via arguments/env. variables ## hetzner: ## @param hetzner.token When using the Hetzner provider, specify your token here. (required when `hetzner.secretName` is not provided. In this case a new secret will be created holding the token.) ## Mutually exclusive with `hetzner.secretName`. ## token: "" ## @param hetzner.secretName When using the Hetzner provider, specify the existing secret which contains your token. Disables the usage of `hetzner.token` (optional) ## secretName: "" ## @param hetzner.secretKey When using the Hetzner provider with an existing secret, specify the key name (optional) ## secretKey: "hetzner_token" ## Infoblox configuration to be set via arguments/env. variables ## infoblox: ## @param infoblox.wapiUsername When using the Infoblox provider, specify the Infoblox WAPI username ## wapiUsername: "admin" ## @param infoblox.wapiPassword When using the Infoblox provider, specify the Infoblox WAPI password (required when provider=infoblox) ## wapiPassword: "" ## @param infoblox.gridHost When using the Infoblox provider, specify the Infoblox Grid host (required when provider=infoblox) ## gridHost: "" ## @param infoblox.view Infoblox view ## view: "" ## Optional keys ## ## @param infoblox.secretName Existing secret name, when in place wapiUsername and wapiPassword are not required ## secretName: "" ## ## @param infoblox.domainFilter When using the Infoblox provider, specify the domain (optional) ## domainFilter: "" ## @param infoblox.noSslVerify When using the Infoblox provider, disable SSL verification (optional) ## noSslVerify: false ## @param infoblox.wapiPort When using the Infoblox provider, specify the Infoblox WAPI port (optional) ## wapiPort: "" ## @param infoblox.wapiVersion When using the Infoblox provider, specify the Infoblox WAPI version (optional) ## wapiVersion: "" ## @param infoblox.wapiConnectionPoolSize When using the Infoblox provider, specify the Infoblox WAPI request connection pool size (optional) ## wapiConnectionPoolSize: "" ## @param infoblox.wapiHttpTimeout When using the Infoblox provider, specify the Infoblox WAPI request timeout in seconds (optional) ## wapiHttpTimeout: "" ## @param infoblox.maxResults When using the Infoblox provider, specify the Infoblox Max Results (optional) ## maxResults: "" ## Linode configuration to be set via arguments/env. variables ## linode: ## @param linode.apiToken When using the Linode provider, `LINODE_TOKEN` to set (optional) ## apiToken: "" ## @param linode.secretName Use an existing secret with key "linode_api_token" defined. ## This ignores linode.apiToken ## secretName: "" ## NS1 configuration to be set via arguments/env. variables ## @param ns1.minTTL When using the ns1 provider, specify minimal TTL, as an integer, for records ## ns1: minTTL: 10 ## oci configuration to be set via arguments/env. variables ## oci: ## @param oci.region When using the OCI provider, specify the region, where your zone is located in. ## region: "" ## @param oci.tenancyOCID When using the OCI provider, specify your Tenancy OCID ## tenancyOCID: "" ## @param oci.userOCID When using the OCI provider, specify your User OCID ## userOCID: "" ## @param oci.compartmentOCID When using the OCI provider, specify your Compartment OCID where your DNS Zone is located in. ## compartmentOCID: "" ## @param oci.privateKey When using the OCI provider, paste in your RSA private key file for the Oracle API ## privateKey: | -----BEGIN RSA PRIVATE KEY----- -----END RSA PRIVATE KEY----- ## @param oci.privateKeyFingerprint When using the OCI provider, put in the fingerprint of your privateKey ## privateKeyFingerprint: "" ## @param oci.privateKeyPassphrase When using the OCI provider and your privateKey has a passphrase, put it in here. (optional) ## privateKeyPassphrase: "" ## OVH configuration to be set via arguments/env. variables ## ovh: ## @param ovh.consumerKey When using the OVH provider, specify the existing consumer key. (required when provider=ovh and `ovh.secretName` is not provided.) ## consumerKey: "" ## @param ovh.applicationKey When using the OVH provider with an existing application, specify the application key. (required when provider=ovh and `ovh.secretName` is not provided.) ## applicationKey: "" ## @param ovh.applicationSecret When using the OVH provider with an existing application, specify the application secret. (required when provider=ovh and `ovh.secretName` is not provided.) ## applicationSecret: "" ## @param ovh.secretName When using the OVH provider, it's the name of the secret containing `ovh_consumer_key`, `ovh_application_key` and `ovh_application_secret`. Disables usage of other `ovh`. ## with following keys: ## - ovh_consumer_key ## - ovh_application_key ## - ovh_application_secret ## This ignores consumerKey, applicationKey & applicationSecret ## secretName: "" ## Scaleway configuration to be set via arguments/env. variables ## scaleway: ## @param scaleway.scwAccessKey When using the Scaleway provider, specify an existing access key. (required when provider=scaleway) ## scwAccessKey: "" ## @param scaleway.scwSecretKey When using the Scaleway provider, specify an existing secret key. (required when provider=scaleway) ## scwSecretKey: "" ## @param scaleway.scwDefaultOrganizationId When using the Scaleway provider, specify the existing organization id. (required when provider=scaleway) ## scwDefaultOrganizationId: "" ## RFC 2136 configuration to be set via arguments/env. variables ## rfc2136: ## @param rfc2136.host When using the rfc2136 provider, specify the RFC2136 host (required when provider=rfc2136) ## host: "" ## @param rfc2136.port When using the rfc2136 provider, specify the RFC2136 port (optional) ## port: 53 ## @param rfc2136.zone When using the rfc2136 provider, specify the zone (required when provider=rfc2136) ## zone: "" ## @param rfc2136.tsigSecret When using the rfc2136 provider, specify the tsig secret to enable security. (do not specify if `rfc2136.secretName` is provided.) (optional) ## tsigSecret: "" ## @param rfc2136.secretName When using the rfc2136 provider, specify the existing secret which contains your tsig secret. Disables the usage of `rfc2136.tsigSecret` (optional) ## secretName: "" ## @param rfc2136.tsigSecretAlg When using the rfc2136 provider, specify the tsig secret to enable security (optional) ## tsigSecretAlg: hmac-sha256 ## @param rfc2136.tsigKeyname When using the rfc2136 provider, specify the tsig keyname to enable security (optional) ## tsigKeyname: externaldns-key ## @param rfc2136.tsigAxfr When using the rfc2136 provider, enable AFXR to enable security (optional) ## tsigAxfr: true ## @param rfc2136.minTTL When using the rfc2136 provider, specify minimal TTL (in duration format) for records[ns, us, ms, s, m, h], see more https://golang.org/pkg/time/#ParseDuration ## minTTL: "0s" ## @param rfc2136.rfc3645Enabled When using the rfc2136 provider, extend using RFC3645 to support secure updates over Kerberos with GSS-TSIG ## rfc3645Enabled: false ## @param rfc2136.kerberosConfig When using the rfc2136 provider with rfc3645Enabled, the contents of a configuration file for krb5 (optional) ## kerberosConfig: "" ## @param rfc2136.kerberosUsername When using the rfc2136 provider with rfc3645Enabled, specify the username to authenticate with (optional) ## kerberosUsername: "" ## @param rfc2136.kerberosPassword When using the rfc2136 provider with rfc3645Enabled, specify the password to authenticate with (optional) ## kerberosPassword: "" ## @param rfc2136.kerberosRealm When using the rfc2136 provider with rfc3645Enabled, specify the realm to authenticate to (required when provider=rfc2136 and rfc2136.rfc3645Enabled=true) ## kerberosRealm: "" ## PowerDNS configuration to be set via arguments/env. variables ## pdns: ## @param pdns.apiUrl When using the PowerDNS provider, specify the API URL of the server. ## apiUrl: "" ## @param pdns.apiPort When using the PowerDNS provider, specify the API port of the server. ## apiPort: "8081" ## @param pdns.apiKey When using the PowerDNS provider, specify the API key of the server. ## apiKey: "" ## @param pdns.secretName When using the PowerDNS provider, specify as secret name containing the API Key ## secretName: "" ## TransIP configuration to be set via arguments/env. variables ## transip: ## @param transip.account When using the TransIP provider, specify the account name. ## account: "" ## @param transip.apiKey When using the TransIP provider, specify the API key to use. ## apiKey: "" ## VinylDNS configuration to be set via arguments/env. variables ## vinyldns: ## @param vinyldns.host When using the VinylDNS provider, specify the VinylDNS API host. ## host: "" ## @param vinyldns.accessKey When using the VinylDNS provider, specify the Access Key to use. ## accessKey: "" ## @param vinyldns.secretKey When using the VinylDNS provider, specify the Secret key to use. ## secretKey: "" ## @param domainFilters Limit possible target zones by domain suffixes (optional) ## domainFilters: [] ## @param excludeDomains Exclude subdomains (optional) ## excludeDomains: [] ## @param regexDomainFilter Limit possible target zones by regex domain suffixes (optional) ## If regexDomainFilter is specified, domainFilters will be ignored ## regexDomainFilter: "" ## @param regexDomainExclusion Exclude subdomains by using regex pattern (optional) ## If regexDomainFilter is specified, excludeDomains will be ignored and external-dns will use regexDomainExclusion even though regexDomainExclusion is empty ## regexDomainExclusion: "" ## @param zoneNameFilters Filter target zones by zone domain (optional) ## zoneNameFilters: [] ## @param zoneIdFilters Limit possible target zones by zone id (optional) ## zoneIdFilters: [] ## @param annotationFilter Filter sources managed by external-dns via annotation using label selector (optional) ## annotationFilter: "" ## @param labelFilter Select sources managed by external-dns using label selector (optional) ## labelFilter: "" ## @param dryRun When enabled, prints DNS record changes rather than actually performing them (optional) ## dryRun: false ## @param triggerLoopOnEvent When enabled, triggers run loop on create/update/delete events in addition to regular interval (optional) ## triggerLoopOnEvent: false ## @param interval Interval update period to use ## interval: "1m" ## @param logLevel Verbosity of the logs (options: panic, debug, info, warning, error, fatal, trace) ## logLevel: info ## @param logFormat Which format to output logs in (options: text, json) ## logFormat: text ## @param policy Modify how DNS records are synchronized between sources and providers (options: sync, upsert-only ) ## policy: upsert-only ## @param registry Registry method to use (options: txt, aws-sd, noop) ## ref: https://github.com/kubernetes-sigs/external-dns/blob/master/docs/proposal/registry.md ## registry: "txt" ## @param txtPrefix When using the TXT registry, a prefix for ownership records that avoids collision with CNAME entries (optional)<CNAME record> (Mutual exclusive with txt-suffix) ## txtPrefix: "" ## @param txtSuffix When using the TXT registry, a suffix for ownership records that avoids collision with CNAME entries (optional)<CNAME record>.suffix (Mutual exclusive with txt-prefix) ## txtSuffix: "" ## @param txtOwnerId A name that identifies this instance of ExternalDNS. Currently used by registry types: txt & aws-sd (optional) ## But other registry types might be added in the future. ## txtOwnerId: "" ## @param forceTxtOwnerId (backward compatibility) When using the non-TXT registry, it will pass the value defined by `txtOwnerId` down to the application (optional) ## This setting added for backward compatibility for ## customers who already used bitnami/external-dns helm chart ## to privision 'aws-sd' registry type. ## Previously bitnami/external-dns helm chart did not pass ## txtOwnerId value down to the external-dns application ## so the app itself sets that value to be a string 'default'. ## If existing customers force the actual txtOwnerId value to be ## passed properly, their external-dns updates will stop working ## because the owner's value for exting DNS records in ## AWS Service Discovery would remain 'default'. ## NOTE: It is up to the end user to update AWS Service Discovery ## 'default' values in description fields to make it work with new ## value passed as txtOwnerId when forceTxtOwnerId=true ## forceTxtOwnerId: false ## @param extraArgs Extra arguments to be passed to external-dns ## extraArgs: {} ## @param extraEnvVars An array to add extra env vars ## extraEnvVars: [] ## @param extraEnvVarsCM ConfigMap containing extra env vars ## extraEnvVarsCM: "" ## @param extraEnvVarsSecret Secret containing extra env vars (in case of sensitive data) ## extraEnvVarsSecret: "" ## @param lifecycleHooks [object] Override default etcd container hooks ## lifecycleHooks: {} ## @param schedulerName Alternative scheduler ## ref: https://kubernetes.io/docs/tasks/administer-cluster/configure-multiple-schedulers/ ## schedulerName: "" ## @param topologySpreadConstraints Topology Spread Constraints for pod assignment ## https://kubernetes.io/docs/concepts/workloads/pods/pod-topology-spread-constraints/ ## The value is evaluated as a template ## topologySpreadConstraints: [] ## @param replicaCount Desired number of ExternalDNS replicas ## replicaCount: 1 ## @param podAffinityPreset Pod affinity preset. Ignored if `affinity` is set. Allowed values: `soft` or `hard` ## ref: https://kubernetes.io/docs/concepts/scheduling-eviction/assign-pod-node/#inter-pod-affinity-and-anti-affinity ## podAffinityPreset: "" ## @param podAntiAffinityPreset Pod anti-affinity preset. Ignored if `affinity` is set. Allowed values: `soft` or `hard` ## Ref: https://kubernetes.io/docs/concepts/scheduling-eviction/assign-pod-node/#inter-pod-affinity-and-anti-affinity ## Allowed values: soft, hard ## podAntiAffinityPreset: soft ## Node affinity preset ## Ref: https://kubernetes.io/docs/concepts/scheduling-eviction/assign-pod-node/#node-affinity ## nodeAffinityPreset: ## @param nodeAffinityPreset.type Node affinity preset type. Ignored if `affinity` is set. Allowed values: `soft` or `hard` ## type: "" ## @param nodeAffinityPreset.key Node label key to match Ignored if `affinity` is set. ## E.g. ## key: "kubernetes.io/e2e-az-name" ## key: "" ## @param nodeAffinityPreset.values Node label values to match. Ignored if `affinity` is set. ## E.g. ## values: ## - e2e-az1 ## - e2e-az2 ## values: [] ## @param affinity Affinity for pod assignment ## Ref: https://kubernetes.io/docs/concepts/configuration/assign-pod-node/#affinity-and-anti-affinity ## Note: podAffinityPreset, podAntiAffinityPreset, and nodeAffinityPreset will be ignored when it's set ## affinity: {} ## @param nodeSelector Node labels for pod assignment ## Ref: https://kubernetes.io/docs/user-guide/node-selection/ ## nodeSelector: {} ## @param tolerations Tolerations for pod assignment ## Ref: https://kubernetes.io/docs/concepts/configuration/taint-and-toleration/ ## tolerations: [] ## @param podAnnotations Additional annotations to apply to the pod. ## podAnnotations: {} ## @param podLabels Additional labels to be added to pods ## podLabels: {} ## @param priorityClassName priorityClassName ## priorityClassName: "" ## @param secretAnnotations Additional annotations to apply to the secret ## secretAnnotations: {} ## Options for the source type "crd" ## crd: ## @param crd.create Install and use the integrated DNSEndpoint CRD ## create: false ## @param crd.apiversion Sets the API version for the CRD to watch ## apiversion: "" ## @param crd.kind Sets the kind for the CRD to watch ## kind: "" ## Kubernetes svc configutarion ## service: ## @param service.enabled Whether to create Service resource or not ## enabled: true ## @param service.type Kubernetes Service type ## type: ClusterIP ## @param service.ports.http ExternalDNS client port ## ports: http: 7979 ## @param service.nodePorts.http Port to bind to for NodePort service type (client port) ## ref: https://kubernetes.io/docs/concepts/services-networking/service/#type-nodeport ## nodePorts: http: "" ## @param service.clusterIP IP address to assign to service ## clusterIP: "" ## @param service.externalIPs Service external IP addresses ## externalIPs: [] ## @param service.loadBalancerIP IP address to assign to load balancer (if supported) ## loadBalancerIP: "" ## @param service.loadBalancerSourceRanges List of IP CIDRs allowed access to load balancer (if supported) ## loadBalancerSourceRanges: [] ## @param service.externalTrafficPolicy Enable client source IP preservation ## ref http://kubernetes.io/docs/tasks/access-application-cluster/create-external-load-balancer/#preserving-the-client-source-ip ## externalTrafficPolicy: Cluster ## @param service.extraPorts Extra ports to expose in the service (normally used with the `sidecar` value) ## extraPorts: [] ## @param service.annotations Annotations to add to service ## set the LoadBalancer service type to internal only. ## ref: https://kubernetes.io/docs/concepts/services-networking/service/#internal-load-balancer ## annotations: {} ## @param service.labels Provide any additional labels which may be required. ## This can be used to have external-dns show up in `kubectl cluster-info` ## kubernetes.io/cluster-service: "true" ## kubernetes.io/name: "external-dns" ## labels: {} ## ServiceAccount parameters ## https://kubernetes.io/docs/tasks/configure-pod-container/configure-service-account/ ## serviceAccount: ## @param serviceAccount.create Determine whether a Service Account should be created or it should reuse a exiting one. ## create: true ## @param serviceAccount.name ServiceAccount to use. A name is generated using the external-dns.fullname template if it is not set ## name: "" ## @param serviceAccount.annotations Additional Service Account annotations ## annotations: {} ## @param serviceAccount.automountServiceAccountToken Automount API credentials for a service account. ## automountServiceAccountToken: true ## RBAC parameters ## https://kubernetes.io/docs/reference/access-authn-authz/rbac/ ## rbac: ## @param rbac.create Whether to create & use RBAC resources or not ## create: true ## @param rbac.clusterRole Whether to create Cluster Role. When set to false creates a Role in `namespace` ## clusterRole: true ## @param rbac.apiVersion Version of the RBAC API ## apiVersion: v1 ## @param rbac.pspEnabled Whether to create a PodSecurityPolicy. WARNING: PodSecurityPolicy is deprecated in Kubernetes v1.21 or later, unavailable in v1.25 or later ## pspEnabled: false ## @param containerSecurityContext Security context for the container ## https://kubernetes.io/docs/tasks/configure-pod-container/security-context/ ## Example: ## securityContext: ## allowPrivilegeEscalation: false ## readOnlyRootFilesystem: true ## capabilities: ## drop: ["ALL"] ## containerSecurityContext: {} ## @param podSecurityContext.enabled Enable pod security context ## @param podSecurityContext.fsGroup Group ID for the container ## @param podSecurityContext.runAsUser User ID for the container ## podSecurityContext: enabled: true fsGroup: 1001 runAsUser: 1001 ## Container resource requests and limits ## ref: https://kubernetes.io/docs/user-guide/compute-resources/ ## We usually recommend not to specify default resources and to leave this as a conscious ## choice for the user. This also increases chances charts run on environments with little ## resources, such as Minikube. If you do want to specify resources, uncomment the following ## lines, adjust them as necessary, and remove the curly braces after 'resources:'. ## @param resources.limits The resources limits for the container ## @param resources.requests The requested resources for the container ## resources: ## Example: ## limits: ## cpu: 50m ## memory: 50Mi ## limits: {} ## Examples: ## requests: ## cpu: 10m ## memory: 50Mi ## requests: {} ## Configure extra options for liveness probe ## ref: https://kubernetes.io/docs/tasks/configure-pod-container/configure-liveness-readiness-probes/#configure-probes ## @param livenessProbe.enabled Enable livenessProbe ## @param livenessProbe.initialDelaySeconds Initial delay seconds for livenessProbe ## @param livenessProbe.periodSeconds Period seconds for livenessProbe ## @param livenessProbe.timeoutSeconds Timeout seconds for livenessProbe ## @param livenessProbe.failureThreshold Failure threshold for livenessProbe ## @param livenessProbe.successThreshold Success threshold for livenessProbe ## livenessProbe: enabled: true initialDelaySeconds: 10 periodSeconds: 10 timeoutSeconds: 5 failureThreshold: 2 successThreshold: 1 ## Configure extra options for readiness probe ## ref: https://kubernetes.io/docs/tasks/configure-pod-container/configure-liveness-readiness-probes/#configure-probes ## @param readinessProbe.enabled Enable readinessProbe ## @param readinessProbe.initialDelaySeconds Initial delay seconds for readinessProbe ## @param readinessProbe.periodSeconds Period seconds for readinessProbe ## @param readinessProbe.timeoutSeconds Timeout seconds for readinessProbe ## @param readinessProbe.failureThreshold Failure threshold for readinessProbe ## @param readinessProbe.successThreshold Success threshold for readinessProbe ## readinessProbe: enabled: true initialDelaySeconds: 5 periodSeconds: 10 timeoutSeconds: 5 failureThreshold: 6 successThreshold: 1 ## Configure extra options for startup probe ## ref: https://kubernetes.io/docs/tasks/configure-pod-container/configure-liveness-startup-probes/#configure-probes ## @param startupProbe.enabled Enable startupProbe ## @param startupProbe.initialDelaySeconds Initial delay seconds for startupProbe ## @param startupProbe.periodSeconds Period seconds for startupProbe ## @param startupProbe.timeoutSeconds Timeout seconds for startupProbe ## @param startupProbe.failureThreshold Failure threshold for startupProbe ## @param startupProbe.successThreshold Success threshold for startupProbe ## startupProbe: enabled: false initialDelaySeconds: 5 periodSeconds: 10 timeoutSeconds: 5 failureThreshold: 6 successThreshold: 1 ## @param customLivenessProbe Override default liveness probe ## customLivenessProbe: {} ## @param customReadinessProbe Override default readiness probe ## customReadinessProbe: {} ## @param customStartupProbe Override default startup probe ## customStartupProbe: {} ## @param extraVolumes A list of volumes to be added to the pod ## extraVolumes: [] ## @param extraVolumeMounts A list of volume mounts to be added to the pod ## extraVolumeMounts: [] ## @param podDisruptionBudget Configure PodDisruptionBudget ## ref: https://kubernetes.io/docs/tasks/run-application/configure-pdb/ ## podDisruptionBudget: {} ## Prometheus Exporter / Metrics ## metrics: ## @param metrics.enabled Enable prometheus to access external-dns metrics endpoint ## enabled: false ## @param metrics.podAnnotations Annotations for enabling prometheus to access the metrics endpoint ## podAnnotations: {} ## Prometheus Operator ServiceMonitor configuration ## serviceMonitor: ## @param metrics.serviceMonitor.enabled Create ServiceMonitor object ## enabled: false ## @param metrics.serviceMonitor.namespace Namespace in which Prometheus is running ## namespace: "" ## @param metrics.serviceMonitor.interval Interval at which metrics should be scraped ## ref: https://github.com/coreos/prometheus-operator/blob/master/Documentation/api.md#endpoint ## interval: "" ## @param metrics.serviceMonitor.scrapeTimeout Timeout after which the scrape is ended ## ref: https://github.com/coreos/prometheus-operator/blob/master/Documentation/api.md#endpoint ## scrapeTimeout: "" ## @param metrics.serviceMonitor.selector Additional labels for ServiceMonitor object ## ref: https://github.com/bitnami/charts/tree/master/bitnami/prometheus-operator#prometheus-configuration ## e.g: ## selector: ## prometheus: my-prometheus ## selector: {} ## @param metrics.serviceMonitor.metricRelabelings Specify Metric Relabelings to add to the scrape endpoint ## ref: https://github.com/coreos/prometheus-operator/blob/master/Documentation/api.md#relabelconfig ## metricRelabelings: [] ## @param metrics.serviceMonitor.relabelings [array] Prometheus relabeling rules ## relabelings: [] ## @param metrics.serviceMonitor.honorLabels Specify honorLabels parameter to add the scrape endpoint ## honorLabels: false ## @param metrics.serviceMonitor.additionalLabels Used to pass Labels that are required by the installed Prometheus Operator ## ref: https://github.com/coreos/prometheus-operator/blob/master/Documentation/api.md#prometheusspec ## additionalLabels: {} ## @param metrics.serviceMonitor.jobLabel The name of the label on the target service to use as the job name in prometheus. ## jobLabel: ""
42.265849
203
0.750484
8b6091aa56f03d71b365044b5da1b04d1714fd2a
33,855
yaml
YAML
bitnami/cert-manager/values.yaml
00arthur00/charts
502aa1e64541669b732a4eda896e5937847b6c3c
[ "Apache-2.0" ]
null
null
null
bitnami/cert-manager/values.yaml
00arthur00/charts
502aa1e64541669b732a4eda896e5937847b6c3c
[ "Apache-2.0" ]
2
2022-01-26T01:14:30.000Z
2022-01-26T07:03:39.000Z
bitnami/cert-manager/values.yaml
00arthur00/charts
502aa1e64541669b732a4eda896e5937847b6c3c
[ "Apache-2.0" ]
null
null
null
## Global Docker image parameters ## Please, note that this will override the image parameters, including dependencies, configured to use the global value ## Current available global Docker image parameters: imageRegistry and imagePullSecrets ## @section Global parameters ## @param global.imageRegistry Global Docker image registry ## @param global.imagePullSecrets Global Docker registry secret names as an array ## @param global.storageClass Global StorageClass for Persistent Volume(s) ## global: imageRegistry: "" imagePullSecrets: [] storageClass: "" ## @section Common parameters ## @param kubeVersion Override Kubernetes version ## kubeVersion: "" ## @param nameOverride String to partially override common.names.fullname ## nameOverride: "" ## @param fullnameOverride String to fully override common.names.fullname ## fullnameOverride: "" ## @param commonLabels Labels to add to all deployed objects ## commonLabels: {} ## @param commonAnnotations Annotations to add to all deployed objects ## commonAnnotations: {} ## @param extraDeploy Array of extra objects to deploy with the release ## extraDeploy: [] ## @param logLevel Set up cert manager log level ## logLevel: 2 ## @param clusterResourceNamespace Namespace used to store DNS provider credentials etc. for ClusterIssuer resources. If empty, uses the namespace where the controller is deployed. ## clusterResourceNamespace: "" ## @param leaderElection.namespace Namespace which leaderElection works. ## leaderElection: namespace: "kube-system" ## @param installCRDs Flag to install Cert Manager CRDs ## installCRDs: false ## @param replicaCount Number of Cert Manager replicas ## replicaCount: 1 ## @section Controller deployment parameters ## Controller deployment parameters ## controller: ## @param controller.replicaCount Number of Controller replicas ## replicaCount: 1 ## Bitnami Cert Manager image ## ref: https://hub.docker.com/r/bitnami/cert-manager/tags/ ## @param controller.image.registry Controller image registry ## @param controller.image.repository Controller image repository ## @param controller.image.tag Controller image tag (immutable tags are recommended) ## @param controller.image.pullPolicy Controller image pull policy ## @param controller.image.pullSecrets Controller image pull secrets ## @param controller.image.debug Controller image debug mode ## image: registry: docker.io repository: bitnami/cert-manager tag: 1.7.1-debian-10-r36 ## Specify a imagePullPolicy ## Defaults to 'Always' if image tag is 'latest', else set to 'IfNotPresent' ## ref: https://kubernetes.io/docs/user-guide/images/#pre-pulling-images ## ## pullPolicy: IfNotPresent ## Optionally specify an array of imagePullSecrets. ## Secrets must be manually created in the namespace. ## ref: https://kubernetes.io/docs/tasks/configure-pod-container/pull-image-private-registry/ ## E.g: ## pullSecrets: ## - myRegistryKeySecretName ## pullSecrets: [] ## Set to true if you would like to see extra information on logs ## debug: false acmesolver: ## @param controller.acmesolver.image.registry Controller image registry ## @param controller.acmesolver.image.repository Controller image repository ## @param controller.acmesolver.image.tag Controller image tag (immutable tags are recommended) ## @param controller.acmesolver.image.pullPolicy Controller image pull policy ## @param controller.acmesolver.image.pullSecrets Controller image pull secrets ## @param controller.acmesolver.image.debug Controller image debug mode ## image: registry: docker.io repository: bitnami/acmesolver tag: 1.7.1-debian-10-r37 ## Specify a imagePullPolicy ## Defaults to 'Always' if image tag is 'latest', else set to 'IfNotPresent' ## ref: https://kubernetes.io/docs/user-guide/images/#pre-pulling-images ## pullPolicy: IfNotPresent ## Optionally specify an array of imagePullSecrets. ## Secrets must be manually created in the namespace. ## ref: https://kubernetes.io/docs/tasks/configure-pod-container/pull-image-private-registry/ ## E.g: ## pullSecrets: ## - myRegistryKeySecretName ## pullSecrets: [] ## Set to true if you would like to see extra information on logs ## debug: false ## Controller containers' resource requests and limits ## ref: https://kubernetes.io/docs/user-guide/compute-resources/ ## @param controller.resources.limits The resources limits for the Controller container ## @param controller.resources.requests The requested resources for the Controller container ## resources: limits: {} requests: {} ## controller pods' Security Context ## ref: https://kubernetes.io/docs/tasks/configure-pod-container/security-context/#set-the-security-context-for-a-pod ## @param controller.podSecurityContext.enabled Enabled Controller pods' Security Context ## @param controller.podSecurityContext.fsGroup Set Controller pod's Security Context fsGroup ## podSecurityContext: enabled: true fsGroup: 1001 ## controller containers' Security Context ## ref: https://kubernetes.io/docs/tasks/configure-pod-container/security-context/#set-the-security-context-for-a-container ## @param controller.containerSecurityContext.enabled Enabled Controller containers' Security Context ## @param controller.containerSecurityContext.runAsUser Set Controller container's Security Context runAsUser ## @param controller.containerSecurityContext.runAsNonRoot Set Controller container's Security Context runAsNonRoot ## containerSecurityContext: enabled: true runAsUser: 1001 runAsNonRoot: true ## @param controller.podAffinityPreset Pod affinity preset. Ignored if `controller.affinity` is set. Allowed values: `soft` or `hard` ## ref: https://kubernetes.io/docs/concepts/scheduling-eviction/assign-pod-node/#inter-pod-affinity-and-anti-affinity ## podAffinityPreset: "" ## @param controller.podAntiAffinityPreset Pod anti-affinity preset. Ignored if `controller.affinity` is set. Allowed values: `soft` or `hard` ## Ref: https://kubernetes.io/docs/concepts/scheduling-eviction/assign-pod-node/#inter-pod-affinity-and-anti-affinity ## podAntiAffinityPreset: soft ## Node affinity preset ## Ref: https://kubernetes.io/docs/concepts/scheduling-eviction/assign-pod-node/#node-affinity ## @param controller.nodeAffinityPreset.type Node affinity preset type. Ignored if `controller.affinity` is set. Allowed values: `soft` or `hard` ## @param controller.nodeAffinityPreset.key Node label key to match. Ignored if `controller.affinity` is set ## @param controller.nodeAffinityPreset.values Node label values to match. Ignored if `controller.affinity` is set ## nodeAffinityPreset: type: "" key: "" ## E.g. ## values: ## - e2e-az1 ## - e2e-az2 ## values: [] ## @param controller.affinity Affinity for Cert Manager Controller ## ref: https://kubernetes.io/docs/concepts/configuration/assign-pod-node/#affinity-and-anti-affinity ## NOTE: `controller.podAffinityPreset`, `controller.podAntiAffinityPreset`, and `controller.nodeAffinityPreset` will be ignored when it's set ## affinity: {} ## @param controller.nodeSelector Node labels for pod assignment ## ref: https://kubernetes.io/docs/user-guide/node-selection/ ## nodeSelector: {} ## Controller Container port ## @param controller.containerPort Controller container port ## containerPort: 9402 ## @param controller.command Override Controller default command ## command: [] ## @param controller.args Override Controller default args ## args: [] ## @param controller.priorityClassName Controller pod priority class name ## priorityClassName: "" ## @param controller.schedulerName Name of the k8s scheduler (other than default) ## ref: https://kubernetes.io/docs/tasks/administer-cluster/configure-multiple-schedulers/ ## schedulerName: "" ## @param controller.topologySpreadConstraints Topology Spread Constraints for pod assignment ## https://kubernetes.io/docs/concepts/workloads/pods/pod-topology-spread-constraints/ ## The value is evaluated as a template ## topologySpreadConstraints: [] ## @param controller.hostAliases Custom host aliases for Controller pods ## ref: https://kubernetes.io/docs/concepts/services-networking/add-entries-to-pod-etc-hosts-with-host-aliases/ ## hostAliases: [] ## @param controller.tolerations Tolerations for pod assignment ## ref: https://kubernetes.io/docs/concepts/configuration/taint-and-toleration/ ## tolerations: [] ## @param controller.podLabels Extra labels for Controller pods ## ref: https://kubernetes.io/docs/concepts/overview/working-with-objects/labels/ ## podLabels: {} ## @param controller.podAnnotations Annotations for Controller pods ## ref: https://kubernetes.io/docs/concepts/overview/working-with-objects/annotations/ ## podAnnotations: {} ## @param controller.dnsPolicy Controller pod DNS policy ## Ref: https://kubernetes.io/docs/concepts/services-networking/dns-pod-service/#pod-s-dns-policy ## dnsPolicy: "" ## @param controller.dnsConfig Controller pod DNS config. Required if `controller.dnsPolicy` is set to `None` ## Ref: https://kubernetes.io/docs/concepts/services-networking/dns-pod-service/#pod-dns-config ## E.g: ## dnsConfig: ## nameservers: ## - "1.1.1.1" ## dnsConfig: {} ## @param controller.lifecycleHooks Add lifecycle hooks to the Controller deployment ## lifecycleHooks: {} ## @param controller.updateStrategy.type Controller deployment update strategy ## @param controller.updateStrategy.rollingUpdate Controller deployment rolling update configuration parameters ## updateStrategy: type: RollingUpdate rollingUpdate: {} ## @param controller.extraEnvVars Add extra environment variables to the Controller container ## E.g: ## extraEnvVars: ## - name: FOO ## value: "bar" ## extraEnvVars: [] ## @param controller.extraEnvVarsCM Name of existing ConfigMap containing extra env vars ## extraEnvVarsCM: "" ## @param controller.extraEnvVarsSecret Name of existing Secret containing extra env vars ## extraEnvVarsSecret: "" ## @param controller.extraVolumes Optionally specify extra list of additional volumes for Controller pods ## extraVolumes: [] ## @param controller.extraVolumeMounts Optionally specify extra list of additional volumeMounts for Controller container(s) ## extraVolumeMounts: [] ## @param controller.initContainers Add additional init containers to the Controller pods ## ref: https://kubernetes.io/docs/concepts/workloads/pods/init-containers/ ## E.g: ## initContainers: ## - name: your-image-name ## image: your-image ## imagePullPolicy: Always ## ports: ## - name: portname ## containerPort: 1234 ## initContainers: [] ## @param controller.sidecars Add additional sidecar containers to the Controller pod ## E.g: ## sidecars: ## - name: your-image-name ## image: your-image ## imagePullPolicy: Always ## ports: ## - name: portname ## containerPort: 1234 ## sidecars: [] ## ServiceAccount configuration ## serviceAccount: ## @param controller.serviceAccount.create Specifies whether a ServiceAccount should be created ## create: true ## @param controller.serviceAccount.name The name of the ServiceAccount to use. ## If not set and create is true, a name is generated using the common.names.fullname template ## name: "" ## @param controller.serviceAccount.annotations Additional custom annotations for the ServiceAccount ## annotations: {} ## @param controller.serviceAccount.automountServiceAccountToken Automount service account token for the server service account ## automountServiceAccountToken: true ## @section Webhook deployment parameters ## Webhook deployment parameters ## webhook: ## @param webhook.replicaCount Number of Webhook replicas ## replicaCount: 1 ## Bitnami Cert Manager Webhook image ## ref: https://hub.docker.com/r/bitnami/cert-manager-webhook/tags/ ## @param webhook.image.registry Webhook image registry ## @param webhook.image.repository Webhook image repository ## @param webhook.image.tag Webhook image tag (immutable tags are recommended) ## @param webhook.image.pullPolicy Webhook image pull policy ## @param webhook.image.pullSecrets Webhook image pull secrets ## @param webhook.image.debug Webhook image debug mode ## image: registry: docker.io repository: bitnami/cert-manager-webhook tag: 1.7.1-debian-10-r37 ## Specify a imagePullPolicy ## Defaults to 'Always' if image tag is 'latest', else set to 'IfNotPresent' ## ref: https://kubernetes.io/docs/user-guide/images/#pre-pulling-images ## pullPolicy: IfNotPresent ## Optionally specify an array of imagePullSecrets. ## Secrets must be manually created in the namespace. ## ref: https://kubernetes.io/docs/tasks/configure-pod-container/pull-image-private-registry/ ## E.g: ## pullSecrets: ## - myRegistryKeySecretName ## pullSecrets: [] ## Set to true if you would like to see extra information on logs ## debug: false ## Webhook containers' resource requests and limits ## ref: https://kubernetes.io/docs/user-guide/compute-resources/ ## resources: ## @param webhook.resources.limits The resources limits for the Webhook container ## limits: {} ## @param webhook.resources.requests The requested resources for the Webhook container ## requests: {} ## webhook pods' Security Context ## ref: https://kubernetes.io/docs/tasks/configure-pod-container/security-context/#set-the-security-context-for-a-pod ## @param webhook.podSecurityContext.enabled Enabled Webhook pods' Security Context ## @param webhook.podSecurityContext.fsGroup Set Webhook pod's Security Context fsGroup ## podSecurityContext: enabled: true fsGroup: 1001 ## webhook containers' Security Context ## ref: https://kubernetes.io/docs/tasks/configure-pod-container/security-context/#set-the-security-context-for-a-container ## @param webhook.containerSecurityContext.enabled Enabled Webhook containers' Security Context ## @param webhook.containerSecurityContext.runAsUser Set Webhook container's Security Context runAsUser ## @param webhook.containerSecurityContext.runAsNonRoot Set Webhook container's Security Context runAsNonRoot ## containerSecurityContext: enabled: true runAsUser: 1001 runAsNonRoot: true ## @param webhook.podAffinityPreset Pod affinity preset. Ignored if `webhook.affinity` is set. Allowed values: `soft` or `hard` ## ref: https://kubernetes.io/docs/concepts/scheduling-eviction/assign-pod-node/#inter-pod-affinity-and-anti-affinity ## podAffinityPreset: "" ## @param webhook.podAntiAffinityPreset Pod anti-affinity preset. Ignored if `webhook.affinity` is set. Allowed values: `soft` or `hard` ## Ref: https://kubernetes.io/docs/concepts/scheduling-eviction/assign-pod-node/#inter-pod-affinity-and-anti-affinity ## podAntiAffinityPreset: soft ## Node affinity preset ## Ref: https://kubernetes.io/docs/concepts/scheduling-eviction/assign-pod-node/#node-affinity ## @param webhook.nodeAffinityPreset.type Node affinity preset type. Ignored if `webhook.affinity` is set. Allowed values: `soft` or `hard` ## @param webhook.nodeAffinityPreset.key Node label key to match. Ignored if `webhook.affinity` is set ## @param webhook.nodeAffinityPreset.values Node label values to match. Ignored if `webhook.affinity` is set ## nodeAffinityPreset: type: "" key: "" ## E.g. ## values: ## - e2e-az1 ## - e2e-az2 ## values: [] ## @param webhook.affinity Affinity for Cert Manager Webhook ## ref: https://kubernetes.io/docs/concepts/configuration/assign-pod-node/#affinity-and-anti-affinity ## NOTE: `webhook.podAffinityPreset`, `webhook.podAntiAffinityPreset`, and `webhook.nodeAffinityPreset` will be ignored when it's set ## affinity: {} ## @param webhook.nodeSelector Node labels for pod assignment ## ref: https://kubernetes.io/docs/user-guide/node-selection/ ## nodeSelector: {} ## Webhook Container port ## @param webhook.containerPort Webhook container port ## containerPort: 10250 ## Webhook https port ## @param webhook.httpsPort Webhook container port ## httpsPort: 443 ## @param webhook.command Override Webhook default command ## command: [] ## @param webhook.args Override Webhook default args ## args: [] ## @param webhook.livenessProbe.enabled Enable livenessProbe ## @param webhook.livenessProbe.path Path for livenessProbe ## @param webhook.livenessProbe.initialDelaySeconds Initial delay seconds for livenessProbe ## @param webhook.livenessProbe.periodSeconds Period seconds for livenessProbe ## @param webhook.livenessProbe.timeoutSeconds Timeout seconds for livenessProbe ## @param webhook.livenessProbe.failureThreshold Failure threshold for livenessProbe ## @param webhook.livenessProbe.successThreshold Success threshold for livenessProbe ## livenessProbe: enabled: true path: /livez initialDelaySeconds: 60 periodSeconds: 10 timeoutSeconds: 1 successThreshold: 1 failureThreshold: 3 ## @param webhook.readinessProbe.enabled Enable readinessProbe ## @param webhook.readinessProbe.path Path for readinessProbe ## @param webhook.readinessProbe.initialDelaySeconds Initial delay seconds for readinessProbe ## @param webhook.readinessProbe.periodSeconds Period seconds for readinessProbe ## @param webhook.readinessProbe.timeoutSeconds Timeout seconds for readinessProbe ## @param webhook.readinessProbe.failureThreshold Failure threshold for readinessProbe ## @param webhook.readinessProbe.successThreshold Success threshold for readinessProbe ## readinessProbe: enabled: true path: /healthz initialDelaySeconds: 5 periodSeconds: 5 timeoutSeconds: 1 successThreshold: 1 failureThreshold: 3 ## Custom Startup probes for webhook ## @param webhook.customStartupProbe Override default startup probe ## customStartupProbe: {} ## Custom Liveness probes for webhook ## @param webhook.customLivenessProbe Override default liveness probe ## customLivenessProbe: {} ## Custom Rediness probes webhook ## @param webhook.customReadinessProbe Override default readiness probe ## customReadinessProbe: {} ## @param webhook.priorityClassName Webhook pod priority class name ## priorityClassName: "" ## @param webhook.schedulerName Name of the k8s scheduler (other than default) ## ref: https://kubernetes.io/docs/tasks/administer-cluster/configure-multiple-schedulers/ ## schedulerName: "" ## @param webhook.topologySpreadConstraints Topology Spread Constraints for pod assignment ## https://kubernetes.io/docs/concepts/workloads/pods/pod-topology-spread-constraints/ ## The value is evaluated as a template ## topologySpreadConstraints: [] ## @param webhook.hostAliases Custom host aliases for Webhook pods ## https://kubernetes.io/docs/concepts/services-networking/add-entries-to-pod-etc-hosts-with-host-aliases/ ## hostAliases: [] ## @param webhook.tolerations Tolerations for pod assignment ## ref: https://kubernetes.io/docs/concepts/configuration/taint-and-toleration/ ## tolerations: [] ## @param webhook.podLabels Extra labels for Webhook pods ## ref: https://kubernetes.io/docs/concepts/overview/working-with-objects/labels/ ## podLabels: {} ## @param webhook.podAnnotations Annotations for Webhook pods ## ref: https://kubernetes.io/docs/concepts/overview/working-with-objects/annotations/ ## podAnnotations: {} ## @param webhook.lifecycleHooks Add lifecycle hooks to the Webhook deployment ## lifecycleHooks: {} ## @param webhook.updateStrategy.type Webhook deployment update strategy ## @param webhook.updateStrategy.rollingUpdate Controller deployment rolling update configuration parameters ## updateStrategy: type: RollingUpdate rollingUpdate: {} ## @param webhook.extraEnvVars Add extra environment variables to the Webhook container ## E.g: ## extraEnvVars: ## - name: FOO ## value: "bar" ## extraEnvVars: [] ## @param webhook.extraEnvVarsCM Name of existing ConfigMap containing extra env vars ## extraEnvVarsCM: "" ## @param webhook.extraEnvVarsSecret Name of existing Secret containing extra env vars ## extraEnvVarsSecret: "" ## @param webhook.extraVolumes Optionally specify extra list of additional volumes for Webhook pods ## extraVolumes: [] ## @param webhook.extraVolumeMounts Optionally specify extra list of additional volumeMounts for Webhook container ## extraVolumeMounts: [] ## @param webhook.initContainers Add additional init containers to the Webhook pods ## E.g: ## initContainers: ## - name: your-image-name ## image: your-image ## imagePullPolicy: Always ## ports: ## - name: portname ## containerPort: 1234 ## initContainers: [] ## @param webhook.sidecars Add additional sidecar containers to the Webhook pod ## E.g: ## sidecars: ## - name: your-image-name ## image: your-image ## imagePullPolicy: Always ## ports: ## - name: portname ## containerPort: 1234 ## sidecars: [] ## ServiceAccount configuration ## serviceAccount: ## @param webhook.serviceAccount.create Specifies whether a ServiceAccount should be created ## create: true ## @param webhook.serviceAccount.name The name of the ServiceAccount to use. ## If not set and create is true, a name is generated using the common.names.fullname template ## name: "" ## @param webhook.serviceAccount.annotations Additional custom annotations for the ServiceAccount ## annotations: {} ## @param webhook.serviceAccount.automountServiceAccountToken Automount service account token for the server service account ## automountServiceAccountToken: true ## @section CAInjector deployment parameters ## CAInjector deployment parameters ## cainjector: ## @param cainjector.replicaCount Number of CAInjector replicas ## replicaCount: 1 ## Bitnami CAInjector image ## ref: https://hub.docker.com/r/bitnami/cainjector/tags/ ## @param cainjector.image.registry CAInjector image registry ## @param cainjector.image.repository CAInjector image repository ## @param cainjector.image.tag CAInjector image tag (immutable tags are recommended) ## @param cainjector.image.pullPolicy CAInjector image pull policy ## @param cainjector.image.pullSecrets CAInjector image pull secrets ## @param cainjector.image.debug CAInjector image debug mode ## image: registry: docker.io repository: bitnami/cainjector tag: 1.7.1-debian-10-r37 ## Specify a imagePullPolicy ## Defaults to 'Always' if image tag is 'latest', else set to 'IfNotPresent' ## ref: https://kubernetes.io/docs/user-guide/images/#pre-pulling-images ## pullPolicy: IfNotPresent ## Optionally specify an array of imagePullSecrets. ## Secrets must be manually created in the namespace. ## ref: https://kubernetes.io/docs/tasks/configure-pod-container/pull-image-private-registry/ ## E.g: ## pullSecrets: ## - myRegistryKeySecretName ## pullSecrets: [] ## Set to true if you would like to see extra information on logs ## debug: false ## CAInjector containers' resource requests and limits ## ref: https://kubernetes.io/docs/user-guide/compute-resources/ ## resources: ## @param cainjector.resources.limits The resources limits for the CAInjector container ## limits: {} ## @param cainjector.resources.requests The requested resources for the CAInjector container ## requests: {} ## cainjector pods' Security Context ## ref: https://kubernetes.io/docs/tasks/configure-pod-container/security-context/#set-the-security-context-for-a-pod ## @param cainjector.podSecurityContext.enabled Enabled CAInjector pods' Security Context ## @param cainjector.podSecurityContext.fsGroup Set CAInjector pod's Security Context fsGroup ## podSecurityContext: enabled: true fsGroup: 1001 ## cainjector containers' Security Context ## ref: https://kubernetes.io/docs/tasks/configure-pod-container/security-context/#set-the-security-context-for-a-container ## @param cainjector.containerSecurityContext.enabled Enabled CAInjector containers' Security Context ## @param cainjector.containerSecurityContext.runAsUser Set CAInjector container's Security Context runAsUser ## @param cainjector.containerSecurityContext.runAsNonRoot Set CAInjector container's Security Context runAsNonRoot ## containerSecurityContext: enabled: true runAsUser: 1001 runAsNonRoot: true ## ref: https://kubernetes.io/docs/concepts/scheduling-eviction/assign-pod-node/#inter-pod-affinity-and-anti-affinity ## @param cainjector.podAffinityPreset Pod affinity preset. Ignored if `cainjector.affinity` is set. Allowed values: `soft` or `hard` ## podAffinityPreset: "" ## @param cainjector.podAntiAffinityPreset Pod anti-affinity preset. Ignored if `cainjector.affinity` is set. Allowed values: `soft` or `hard` ## Ref: https://kubernetes.io/docs/concepts/scheduling-eviction/assign-pod-node/#inter-pod-affinity-and-anti-affinity ## podAntiAffinityPreset: soft ## Node affinity preset ## Ref: https://kubernetes.io/docs/concepts/scheduling-eviction/assign-pod-node/#node-affinity ## @param cainjector.nodeAffinityPreset.type Node affinity preset type. Ignored if `cainjector.affinity` is set. Allowed values: `soft` or `hard` ## @param cainjector.nodeAffinityPreset.key Node label key to match. Ignored if `cainjector.affinity` is set ## @param cainjector.nodeAffinityPreset.values Node label values to match. Ignored if `cainjector.affinity` is set ## nodeAffinityPreset: type: "" key: "" ## E.g. ## values: ## - e2e-az1 ## - e2e-az2 ## values: [] ## @param cainjector.affinity Affinity for Cert Manager CAInjector ## ref: https://kubernetes.io/docs/concepts/configuration/assign-pod-node/#affinity-and-anti-affinity ## NOTE: `cainjector.podAffinityPreset`, `cainjector.podAntiAffinityPreset`, and `cainjector.nodeAffinityPreset` will be ignored when it's set ## affinity: {} ## @param cainjector.nodeSelector Node labels for pod assignment ## ref: https://kubernetes.io/docs/user-guide/node-selection/ ## nodeSelector: {} ## @param cainjector.command Override CAInjector default command ## command: [] ## @param cainjector.args Override CAInjector default args ## args: [] ## @param cainjector.priorityClassName CAInjector pod priority class name ## priorityClassName: "" ## @param cainjector.schedulerName Name of the k8s scheduler (other than default) ## ref: https://kubernetes.io/docs/tasks/administer-cluster/configure-multiple-schedulers/ ## schedulerName: "" ## @param cainjector.topologySpreadConstraints Topology Spread Constraints for pod assignment ## https://kubernetes.io/docs/concepts/workloads/pods/pod-topology-spread-constraints/ ## The value is evaluated as a template ## topologySpreadConstraints: [] ## @param cainjector.hostAliases Custom host aliases for CAInjector pods ## https://kubernetes.io/docs/concepts/services-networking/add-entries-to-pod-etc-hosts-with-host-aliases/ ## hostAliases: [] ## @param cainjector.tolerations Tolerations for pod assignment ## ref: https://kubernetes.io/docs/concepts/configuration/taint-and-toleration/ ## tolerations: [] ## @param cainjector.podLabels Extra labels for CAInjector pods ## ref: https://kubernetes.io/docs/concepts/overview/working-with-objects/labels/ ## podLabels: {} ## @param cainjector.podAnnotations Annotations for CAInjector pods ## ref: https://kubernetes.io/docs/concepts/overview/working-with-objects/annotations/ ## podAnnotations: {} ## @param cainjector.lifecycleHooks Add lifecycle hooks to the CAInjector deployment ## lifecycleHooks: {} ## @param cainjector.updateStrategy.type Controller deployment update strategy ## @param cainjector.updateStrategy.rollingUpdate Controller deployment rolling update configuration parameters updateStrategy: type: RollingUpdate rollingUpdate: {} ## @param cainjector.extraEnvVars Add extra environment variables to the CAInjector container ## E.g: ## extraEnvVars: ## - name: FOO ## value: "bar" ## extraEnvVars: [] ## @param cainjector.extraEnvVarsCM Name of existing ConfigMap containing extra env vars ## extraEnvVarsCM: "" ## @param cainjector.extraEnvVarsSecret Name of existing Secret containing extra env vars ## extraEnvVarsSecret: "" ## @param cainjector.extraVolumes Optionally specify extra list of additional volumes for CAInjector pods ## extraVolumes: [] ## @param cainjector.extraVolumeMounts Optionally specify extra list of additional volumeMounts for CAInjector container(s) ## extraVolumeMounts: [] ## @param cainjector.initContainers Add additional init containers to the CAInjector pods ## E.g: ## initContainers: ## - name: your-image-name ## image: your-image ## imagePullPolicy: Always ## ports: ## - name: portname ## containerPort: 1234 ## initContainers: [] ## @param cainjector.sidecars Add additional sidecar containers to the CAInjector pod ## E.g: ## sidecars: ## - name: your-image-name ## image: your-image ## imagePullPolicy: Always ## ports: ## - name: portname ## containerPort: 1234 ## sidecars: [] ## ServiceAccount configuration ## serviceAccount: ## @param cainjector.serviceAccount.create Specifies whether a ServiceAccount should be created ## create: true ## @param cainjector.serviceAccount.name The name of the ServiceAccount to use. ## If not set and create is true, a name is generated using the common.names.fullname template ## name: "" ## @param cainjector.serviceAccount.annotations Additional custom annotations for the ServiceAccount ## annotations: {} ## @param cainjector.serviceAccount.automountServiceAccountToken Automount service account token for the server service account ## automountServiceAccountToken: true ## @section Metrics Parameters metrics: ## @param metrics.enabled Start metrics ## enabled: true ## Prometheus Service Monitor ## ref: https://github.com/coreos/prometheus-operator ## https://github.com/coreos/prometheus-operator/blob/master/Documentation/api.md#endpoint ## ## @param metrics.podAnnotations [object] Annotations for Cert Manager exporter pods ## ref: https://kubernetes.io/docs/concepts/overview/working-with-objects/annotations/ ## podAnnotations: prometheus.io/path: "/metrics" prometheus.io/scrape: "true" prometheus.io/port: "{{ .Values.controller.containerPort }}" ## Prometheus Operator ServiceMonitor resource ## serviceMonitor: ## @param metrics.serviceMonitor.path The path which the ServiceMonitor will monitor ## path: /metrics ## @param metrics.serviceMonitor.targetPort The port in which the ServiceMonitor will monitor ## targetPort: 9402 ## @param metrics.serviceMonitor.enabled Create ServiceMonitor Resource for scraping metrics using PrometheusOperator ## enabled: false ## @param metrics.serviceMonitor.namespace Namespace which Prometheus is running in ## e.g: ## namespace: monitoring ## namespace: "" ## @param metrics.serviceMonitor.jobLabel The name of the label on the target service to use as the job name in prometheus. ## jobLabel: "" ## @param metrics.serviceMonitor.interval Interval at which metrics should be scraped ## ref: https://github.com/coreos/prometheus-operator/blob/master/Documentation/api.md#endpoint ## interval: 60s ## @param metrics.serviceMonitor.scrapeTimeout Timeout after which the scrape is ended ## ref: https://github.com/coreos/prometheus-operator/blob/master/Documentation/api.md#endpoint ## scrapeTimeout: 30s ## @param metrics.serviceMonitor.relabelings RelabelConfigs to apply to samples before scraping ## ref: https://github.com/coreos/prometheus-operator/blob/master/Documentation/api.md#relabelconfig ## relabelings: [] ## @param metrics.serviceMonitor.metricRelabelings MetricRelabelConfigs to apply to samples before ingestion ## ref: https://github.com/coreos/prometheus-operator/blob/master/Documentation/api.md#relabelconfig ## metricRelabelings: [] ## @param metrics.serviceMonitor.selector ServiceMonitor selector labels ## ref: https://github.com/bitnami/charts/tree/master/bitnami/prometheus-operator#prometheus-configuration ## ## selector: ## prometheus: my-prometheus ## selector: {} ## @param metrics.serviceMonitor.labels Extra labels for the ServiceMonitor ## labels: {} ## @param metrics.serviceMonitor.additionalLabels DEPRECATED. Use metrics.serviceMonitor.labels instead. ## additionalLabels: {} ## @param metrics.serviceMonitor.honorLabels honorLabels chooses the metric's labels on collisions with target labels ## honorLabels: false ## @section Other Parameters ## RBAC configuration ## @param rbac.create Specifies whether RBAC resources should be created ## rbac: create: true
41.336996
180
0.732684
8b690943933491dd58c82c151119ea827a355314
971
yaml
YAML
bitnami/phpmyadmin/Chart.yaml
00arthur00/charts
502aa1e64541669b732a4eda896e5937847b6c3c
[ "Apache-2.0" ]
null
null
null
bitnami/phpmyadmin/Chart.yaml
00arthur00/charts
502aa1e64541669b732a4eda896e5937847b6c3c
[ "Apache-2.0" ]
2
2022-01-26T01:14:30.000Z
2022-01-26T07:03:39.000Z
bitnami/phpmyadmin/Chart.yaml
00arthur00/charts
502aa1e64541669b732a4eda896e5937847b6c3c
[ "Apache-2.0" ]
null
null
null
annotations: category: Infrastructure apiVersion: v2 appVersion: 5.1.3 dependencies: - condition: db.bundleTestDB name: mariadb repository: https://charts.bitnami.com/bitnami tags: - phpmyadmin-database version: 10.x.x - name: common repository: https://charts.bitnami.com/bitnami tags: - bitnami-common version: 1.x.x description: phpMyAdmin is a free software tool written in PHP, intended to handle the administration of MySQL over the Web. phpMyAdmin supports a wide range of operations on MySQL and MariaDB. engine: gotpl home: https://github.com/bitnami/charts/tree/master/bitnami/phpmyadmin icon: https://bitnami.com/assets/stacks/phpmyadmin/img/phpmyadmin-stack-220x234.png keywords: - mariadb - mysql - phpmyadmin maintainers: - email: [email protected] name: Bitnami name: phpmyadmin sources: - https://github.com/bitnami/bitnami-docker-phpmyadmin - https://www.phpmyadmin.net/ version: 9.0.10
29.424242
193
0.742533
c5388c30734fbe742a13f3c2abf8a092e17e0eca
1,047
yaml
YAML
bitnami/airflow/Chart.yaml
00arthur00/charts
502aa1e64541669b732a4eda896e5937847b6c3c
[ "Apache-2.0" ]
null
null
null
bitnami/airflow/Chart.yaml
00arthur00/charts
502aa1e64541669b732a4eda896e5937847b6c3c
[ "Apache-2.0" ]
2
2022-01-26T01:14:30.000Z
2022-01-26T07:03:39.000Z
bitnami/airflow/Chart.yaml
00arthur00/charts
502aa1e64541669b732a4eda896e5937847b6c3c
[ "Apache-2.0" ]
null
null
null
annotations: category: WorkFlow apiVersion: v2 appVersion: 2.2.4 dependencies: - condition: redis.enabled name: redis repository: https://charts.bitnami.com/bitnami version: 16.x.x - condition: postgresql.enabled name: postgresql repository: https://charts.bitnami.com/bitnami version: 11.x.x - name: common repository: https://charts.bitnami.com/bitnami tags: - bitnami-common version: 1.x.x description: Apache Airflow is a tool to express and execute workflows as directed acyclic graphs (DAGs). It includes utilities to schedule tasks, monitor task progress and handle task dependencies. engine: gotpl home: https://github.com/bitnami/charts/tree/master/bitnami/airflow icon: https://bitnami.com/assets/stacks/airflow/img/airflow-stack-220x234.png keywords: - apache - airflow - workflow - dag maintainers: - email: [email protected] name: Bitnami name: airflow sources: - https://github.com/bitnami/bitnami-docker-airflow - https://airflow.apache.org/ version: 12.0.12
29.083333
198
0.73639
59d2de41c505537e09e5c9da365752d5145a87bf
1,103
yaml
YAML
bitnami/wordpress-intel/Chart.yaml
00arthur00/charts
502aa1e64541669b732a4eda896e5937847b6c3c
[ "Apache-2.0" ]
null
null
null
bitnami/wordpress-intel/Chart.yaml
00arthur00/charts
502aa1e64541669b732a4eda896e5937847b6c3c
[ "Apache-2.0" ]
2
2022-01-26T01:14:30.000Z
2022-01-26T07:03:39.000Z
bitnami/wordpress-intel/Chart.yaml
00arthur00/charts
502aa1e64541669b732a4eda896e5937847b6c3c
[ "Apache-2.0" ]
null
null
null
annotations: category: CMS apiVersion: v2 appVersion: 5.9.2 dependencies: - condition: memcached.enabled name: memcached repository: https://charts.bitnami.com/bitnami version: 6.x.x - condition: mariadb.enabled name: mariadb repository: https://charts.bitnami.com/bitnami version: 10.x.x - name: common repository: https://charts.bitnami.com/bitnami tags: - bitnami-common version: 1.x.x description: WordPress for Intel is the most popular blogging application combined with cryptography acceleration for 3rd gen Xeon Scalable Processors (Ice Lake) to get a breakthrough performance improvement. engine: gotpl home: https://github.com/bitnami/charts/tree/master/bitnami/wordpress-intel icon: https://bitnami.com/assets/stacks/wordpress/img/wordpress-stack-220x234.png keywords: - application - blog - cms - http - php - web - wordpress maintainers: - email: [email protected] name: Bitnami name: wordpress-intel sources: - https://github.com/bitnami/bitnami-docker-wordpress-intel - https://wordpress.org/ version: 0.1.15
28.282051
208
0.737081
49095b90149dda0086ae7fb1256b4798fb021f88
874
yaml
YAML
bitnami/phpbb/Chart.yaml
00arthur00/charts
502aa1e64541669b732a4eda896e5937847b6c3c
[ "Apache-2.0" ]
null
null
null
bitnami/phpbb/Chart.yaml
00arthur00/charts
502aa1e64541669b732a4eda896e5937847b6c3c
[ "Apache-2.0" ]
2
2022-01-26T01:14:30.000Z
2022-01-26T07:03:39.000Z
bitnami/phpbb/Chart.yaml
00arthur00/charts
502aa1e64541669b732a4eda896e5937847b6c3c
[ "Apache-2.0" ]
null
null
null
annotations: category: Forum apiVersion: v2 appVersion: 3.3.6 dependencies: - condition: mariadb.enabled name: mariadb repository: https://charts.bitnami.com/bitnami version: 10.x.x - name: common repository: https://charts.bitnami.com/bitnami version: 1.x.x description: phpBB is a popular bulletin board that features robust messaging capabilities such as flat message structure, subforums, topic split/merge/lock, user groups, full-text search, and attachments. engine: gotpl home: https://github.com/bitnami/charts/tree/master/bitnami/phpbb icon: https://bitnami.com/assets/stacks/phpbb/img/phpbb-stack-220x234.png keywords: - phpbb - forum - http - php maintainers: - email: [email protected] name: Bitnami name: phpbb sources: - https://github.com/bitnami/bitnami-docker-phpbb - https://www.phpbb.com/ version: 11.0.10
29.133333
205
0.743707
15db69b2c6edb53012e5ddeb5b122c2643db98c4
49,547
yaml
YAML
bitnami/contour/values.yaml
00arthur00/charts
502aa1e64541669b732a4eda896e5937847b6c3c
[ "Apache-2.0" ]
null
null
null
bitnami/contour/values.yaml
00arthur00/charts
502aa1e64541669b732a4eda896e5937847b6c3c
[ "Apache-2.0" ]
2
2022-01-26T01:14:30.000Z
2022-01-26T07:03:39.000Z
bitnami/contour/values.yaml
00arthur00/charts
502aa1e64541669b732a4eda896e5937847b6c3c
[ "Apache-2.0" ]
null
null
null
## @section Global parameters ## Global Docker image parameters ## Please, note that this will override the image parameters, including dependencies, configured to use the global value ## Current available global Docker image parameters: imageRegistry, imagePullSecrets and storageClass ## ## @param global.imageRegistry Global Docker image registry ## @param global.imagePullSecrets [array] Global Docker registry secret names as an array ## @param global.storageClass Global StorageClass for Persistent Volume(s) ## global: imageRegistry: "" ## E.g. ## imagePullSecrets: ## - myRegistryKeySecretName ## imagePullSecrets: [] storageClass: "" ## @section Common parameters ## ## @param nameOverride String to partially override contour.fullname include (will maintain the release name) ## nameOverride: "" ## @param fullnameOverride String to fully override contour.fullname template ## fullnameOverride: "" ## @param kubeVersion Force target Kubernetes version (using Helm capabilities if not set) ## kubeVersion: "" ## @param extraDeploy [array] Array of extra objects to deploy with the release ## extraDeploy: [] ## @param commonLabels Labels to add to all deployed objects ## commonLabels: {} ## @param commonAnnotations Annotations to add to all deployed objects ## commonAnnotations: {} ## Diagnostic mode in the deployment ## diagnosticMode: ## @param diagnosticMode.enabled Enable diagnostic mode (all probes will be disabled and the command will be overridden) ## enabled: false ## @param diagnosticMode.command [array] Command to override all containers in the deployment ## command: - sleep ## @param diagnosticMode.args [array] Args to override all containers in the deployment ## args: - infinity ## @section Contour parameters ## ## To configure Contour, you must specify ONE of the following two options. ## @param existingConfigMap Specifies the name of an externally-defined ConfigMap to use as the configuration (this is mutually exclusive with `configInline`) ## Helm will not manage the contents of this ConfigMap, it is your responsibility to create it. ## e.g: ## existingConfigMap: contour ## existingConfigMap: "" ## @param configInline [object] Specifies Contour's configuration directly in YAML format ## When configInline is used, Helm manages Contour's configuration ConfigMap as ## part of the release, and existingConfigMap is ignored. ## Refer to https://projectcontour.io/docs/latest/configuration for available options. ## configInline: disablePermitInsecure: false tls: fallback-certificate: {} leaderelection: configmap-namespace: "{{ .Release.Namespace }}" envoy-service-name: '{{ include "common.names.fullname" . }}-envoy' accesslog-format: envoy contour: ## @param contour.enabled Contour Deployment creation. ## enabled: true ## @param contour.image.registry Contour image registry ## @param contour.image.repository Contour image name ## @param contour.image.tag Contour image tag ## @param contour.image.pullPolicy Contour Image pull policy ## @param contour.image.pullSecrets [array] Contour Image pull secrets ## @param contour.image.debug Enable image debug mode ## image: registry: docker.io repository: bitnami/contour tag: 1.20.1-debian-10-r19 ## Specify a imagePullPolicy ## Defaults to 'Always' if image tag is 'latest', else set to 'IfNotPresent' ## ref: https://kubernetes.io/docs/user-guide/images/#pre-pulling-images ## pullPolicy: IfNotPresent ## Optionally specify an array of imagePullSecrets. ## Secrets must be manually created in the namespace. ## ref: https://kubernetes.io/docs/tasks/configure-pod-container/pull-image-private-registry/ ## e.g: ## pullSecrets: ## - myRegistryKeySecretName ## pullSecrets: [] debug: false ## @param contour.replicaCount Number of Contour Pod replicas ## replicaCount: 1 ## @param contour.priorityClassName Priority class assigned to the pods ## ref: https://kubernetes.io/docs/concepts/configuration/pod-priority-preemption/#priorityclass ## priorityClassName: "" ## Configures the ports the Envoy proxy listens on ## @param contour.containerPorts.xds Set xds port inside Contour pod ## @param contour.containerPorts.metrics Set metrics port inside Contour pod ## containerPorts: xds: 8001 metrics: 8000 ## @param contour.hostAliases [array] Add deployment host aliases ## https://kubernetes.io/docs/concepts/services-networking/add-entries-to-pod-etc-hosts-with-host-aliases/ ## hostAliases: [] ## @param contour.updateStrategy Strategy to use to update Pods ## ref: https://kubernetes.io/docs/concepts/workloads/controllers/statefulset/#update-strategies ## updateStrategy: {} ## @param contour.extraArgs [array] Extra arguments passed to Contour container ## extraArgs: [] ## Contour container resource requests and limits ## ref: https://kubernetes.io/docs/user-guide/compute-resources/ ## ref: https://projectcontour.io/guides/resource-limits/ ## We usually recommend not to specify default resources and to leave this as a conscious ## choice for the user. This also increases chances charts run on environments with little ## resources, such as Minikube. If you do want to specify resources, uncomment the following ## lines, adjust them as necessary, and remove the curly braces after 'resources:'. ## @param contour.resources.limits [object] Specify resource limits which the container is not allowed to succeed. ## @param contour.resources.requests [object] Specify resource requests which the container needs to spawn. ## resources: ## Example: ## limits: ## cpu: 400m ## memory: 258Mi ## limits: {} ## Examples: ## requests: ## cpu: 100m ## memory: 25Mi ## requests: {} ## @param contour.manageCRDs Manage the creation, upgrade and deletion of Contour CRDs. ## manageCRDs: true ## @param contour.podAffinityPreset Contour Pod affinity preset. Ignored if `affinity` is set. Allowed values: `soft` or `hard` ## ref: https://kubernetes.io/docs/concepts/scheduling-eviction/assign-pod-node/#inter-pod-affinity-and-anti-affinity ## podAffinityPreset: "" ## @param contour.podAntiAffinityPreset Contour Pod anti-affinity preset. Ignored if `affinity` is set. Allowed values: `soft` or `hard` ## Ref: https://kubernetes.io/docs/concepts/scheduling-eviction/assign-pod-node/#inter-pod-affinity-and-anti-affinity ## podAntiAffinityPreset: soft ## @param contour.podLabels [object] Extra labels for Contour pods ## ref: https://kubernetes.io/docs/concepts/overview/working-with-objects/labels/ ## podLabels: {} ## @param contour.lifecycleHooks lifecycleHooks for the container to automate configuration before or after startup. ## lifecycleHooks: {} ## @param contour.customLivenessProbe Override default liveness probe ## customLivenessProbe: {} ## @param contour.customReadinessProbe Override default readiness probe ## customReadinessProbe: {} ## @param contour.customStartupProbe Override default startup probe ## customStartupProbe: {} ## Node affinity preset ## Ref: https://kubernetes.io/docs/concepts/scheduling-eviction/assign-pod-node/#node-affinity ## @param contour.nodeAffinityPreset.type Contour Node affinity preset type. Ignored if `affinity` is set. Allowed values: `soft` or `hard` ## @param contour.nodeAffinityPreset.key Contour Node label key to match Ignored if `affinity` is set. ## @param contour.nodeAffinityPreset.values [array] Contour Node label values to match. Ignored if `affinity` is set. ## nodeAffinityPreset: type: "" ## E.g. ## key: "kubernetes.io/e2e-az-name" ## key: "" ## E.g. ## values: ## - e2e-az1 ## - e2e-az2 ## values: [] ## @param contour.command Override default command ## command: [] ## @param contour.args Override default args ## args: [] ## @param contour.affinity [object] Affinity for Contour pod assignment ## Ref: https://kubernetes.io/docs/concepts/configuration/assign-pod-node/#affinity-and-anti-affinity ## Note: podAffinityPreset, podAntiAffinityPreset, and nodeAffinityPreset will be ignored when it's set ## affinity: {} ## @param contour.nodeSelector [object] Node labels for Contour pod assignment ## Ref: https://kubernetes.io/docs/user-guide/node-selection/ ## nodeSelector: {} ## @param contour.tolerations [array] Tolerations for Contour pod assignment ## Ref: https://kubernetes.io/docs/concepts/configuration/taint-and-toleration/ ## tolerations: [] ## @param contour.podAnnotations [object] Contour Pod annotations ## ref: https://kubernetes.io/docs/concepts/overview/working-with-objects/annotations/ ## podAnnotations: {} ## @param contour.serviceAccount.create Create a serviceAccount for the Contour pod ## @param contour.serviceAccount.name Use the serviceAccount with the specified name, a name is generated using the fullname template ## serviceAccount: create: true name: "" ## Contour Security Context ## ref: https://kubernetes.io/docs/tasks/configure-pod-container/security-context/#set-the-security-context-for-a-pod ## @param contour.podSecurityContext.enabled Default backend Pod securityContext ## @param contour.podSecurityContext.fsGroup Set Default backend Pod's Security Context fsGroup ## podSecurityContext: enabled: true fsGroup: 1001 ## Envoy container security context ## ref: https://kubernetes.io/docs/tasks/configure-pod-container/security-context/#set-the-security-context-for-a-container ## @param contour.containerSecurityContext.enabled Envoy Container securityContext ## @param contour.containerSecurityContext.runAsUser User ID for the Contour container (to change this, http and https containerPorts must be set to >1024) ## @param contour.containerSecurityContext.runAsNonRoot Run as noon root ## containerSecurityContext: enabled: true runAsUser: 1001 runAsNonRoot: true ## @param contour.livenessProbe.enabled Enable/disable the Liveness probe ## @param contour.livenessProbe.initialDelaySeconds Delay before liveness probe is initiated ## @param contour.livenessProbe.periodSeconds How often to perform the probe ## @param contour.livenessProbe.timeoutSeconds When the probe times out ## @param contour.livenessProbe.failureThreshold Minimum consecutive failures for the probe to be considered failed after having succeeded. ## @param contour.livenessProbe.successThreshold Minimum consecutive successes for the probe to be considered successful after having failed. ## livenessProbe: enabled: true initialDelaySeconds: 120 periodSeconds: 20 timeoutSeconds: 5 failureThreshold: 6 successThreshold: 1 ## @param contour.readinessProbe.enabled Enable/disable the readiness probe ## @param contour.readinessProbe.initialDelaySeconds Delay before readiness probe is initiated ## @param contour.readinessProbe.periodSeconds How often to perform the probe ## @param contour.readinessProbe.timeoutSeconds When the probe times out ## @param contour.readinessProbe.failureThreshold Minimum consecutive failures for the probe to be considered failed after having succeeded. ## @param contour.readinessProbe.successThreshold Minimum consecutive successes for the probe to be considered successful after having failed. ## readinessProbe: enabled: true initialDelaySeconds: 15 periodSeconds: 10 timeoutSeconds: 5 failureThreshold: 3 successThreshold: 1 ## @param contour.startupProbe.enabled Enable/disable the startup probe ## @param contour.startupProbe.initialDelaySeconds Delay before startup probe is initiated ## @param contour.startupProbe.periodSeconds How often to perform the probe ## @param contour.startupProbe.timeoutSeconds When the probe times out ## @param contour.startupProbe.failureThreshold Minimum consecutive failures for the probe to be considered failed after having succeeded. ## @param contour.startupProbe.successThreshold Minimum consecutive successes for the probe to be considered successful after having failed. ## startupProbe: enabled: false initialDelaySeconds: 15 periodSeconds: 10 timeoutSeconds: 5 failureThreshold: 3 successThreshold: 1 ## Contour certgen configs ## certgen: ## @param contour.certgen.serviceAccount.create Create a serviceAccount for the Contour pod ## @param contour.certgen.serviceAccount.name Use the serviceAccount with the specified name, a name is generated using the fullname template ## serviceAccount: create: true name: "" ## @param contour.certgen.certificateLifetime Generated certificate lifetime (in days). ## certificateLifetime: 365 ## @param contour.tlsExistingSecret Name of the existingSecret to be use in Contour deployment. If it is not nil `contour.certgen` will be disabled. ## It will override `tlsExistingSecret` ## tlsExistingSecret: "" ## Contour Service properties ## ref: https://kubernetes.io/docs/concepts/services-networking/service/#multi-port-services ## service: ## @param contour.service.type Service type ## type: ClusterIP ## @param contour.service.ports.xds Contour service xds port ## @param contour.service.ports.metrics Contour service xds port ## ports: xds: 8001 metrics: 8000 ## Node ports to expose ## @param contour.service.nodePorts.xds Node port for HTTP ## NOTE: choose port between <30000-32767> ## nodePorts: xds: "" ## @param contour.service.clusterIP Contour service Cluster IP ## e.g.: ## clusterIP: None ## clusterIP: "" ## @param contour.service.loadBalancerIP Contour service Load Balancer IP ## ref: https://kubernetes.io/docs/concepts/services-networking/service/#type-loadbalancer ## loadBalancerIP: "" ## @param contour.service.loadBalancerSourceRanges Contour service Load Balancer sources ## ref: https://kubernetes.io/docs/tasks/access-application-cluster/configure-cloud-provider-firewall/#restrict-access-for-loadbalancer-service ## e.g: ## loadBalancerSourceRanges: ## - 10.10.10.0/24 ## loadBalancerSourceRanges: [] ## @param contour.service.externalTrafficPolicy Contour service external traffic policy ## ref https://kubernetes.io/docs/tasks/access-application-cluster/create-external-load-balancer/#preserving-the-client-source-ip ## externalTrafficPolicy: Cluster ## @param contour.service.annotations Additional custom annotations for Contour service ## annotations: {} ## @param contour.service.extraPorts Extra port to expose on Contour service ## extraPorts: [] ## @param contour.initContainers [array] Attach additional init containers to Contour pods ## For example: ## initContainers: ## - name: your-image-name ## image: your-image ## imagePullPolicy: Always ## initContainers: [] ## @param contour.sidecars [array] Add additional sidecar containers to the Contour pods ## Example: ## sidecars: ## - name: your-image-name ## image: your-image ## imagePullPolicy: Always ## ports: ## - name: portname ## containerPort: 1234 ## sidecars: [] ## @param contour.extraVolumes [array] Array to add extra volumes ## extraVolumes: [] ## @param contour.extraVolumeMounts [array] Array to add extra mounts (normally used with extraVolumes) ## extraVolumeMounts: [] ## @param contour.extraEnvVars [array] Array containing extra env vars to be added to all Contour containers ## For example: ## extraEnvVars: ## - name: MY_ENV_VAR ## value: env_var_value ## extraEnvVars: [] ## @param contour.extraEnvVarsCM ConfigMap containing extra env vars to be added to all Contour containers ## extraEnvVarsCM: "" ## @param contour.extraEnvVarsSecret Secret containing extra env vars to be added to all Contour containers ## extraEnvVarsSecret: "" ## @param contour.ingressClass.name Name of the ingress class to route through this controller. ## @param contour.ingressClass.create Whether to create or not the IngressClass resource ## @param contour.ingressClass.default Mark IngressClass resource as default for cluster ## ## DEPRECATED: Use a map instead ## You can use the the 'contour.ingressClass' as a string to indicate the ingress ## class name. This will skip the creation of an IngressClass resource. ## e.g: ## ingressClass: contour ## ingressClass: name: "" create: true default: true ## @section Envoy parameters ## envoy: ## @param envoy.enabled Envoy Proxy creation ## enabled: true ## Bitnami Envoy image ## ref: https://hub.docker.com/r/bitnami/envoy/tags/ ## @param envoy.image.registry Envoy Proxy image registry ## @param envoy.image.repository Envoy Proxy image repository ## @param envoy.image.tag Envoy Proxy image tag (immutable tags are recommended) ## @param envoy.image.pullPolicy Envoy image pull policy ## @param envoy.image.pullSecrets [array] Envoy image pull secrets ## image: registry: docker.io repository: bitnami/envoy tag: 1.21.1-debian-10-r20 ## Specify a imagePullPolicy ## Defaults to 'Always' if image tag is 'latest', else set to 'IfNotPresent' ## ref: https://kubernetes.io/docs/user-guide/images/#pre-pulling-images ## pullPolicy: IfNotPresent ## Optionally specify an array of imagePullSecrets. ## Secrets must be manually created in the namespace. ## ref: https://kubernetes.io/docs/tasks/configure-pod-container/pull-image-private-registry/ ## e.g: ## pullSecrets: ## - myRegistryKeySecretName ## pullSecrets: [] ## @param envoy.priorityClassName Priority class assigned to the pods ## ref: https://kubernetes.io/docs/concepts/configuration/pod-priority-preemption/#priorityclass ## priorityClassName: "" ## @param envoy.extraArgs [array] Extra arguments passed to Envoy container ## extraArgs: [] ## @param envoy.hostAliases [array] Add deployment host aliases ## https://kubernetes.io/docs/concepts/services-networking/add-entries-to-pod-etc-hosts-with-host-aliases/ ## hostAliases: [] ## Envoy container resource requests and limits ## ref: https://kubernetes.io/docs/user-guide/compute-resources/ ## ref: https://projectcontour.io/guides/resource-limits/ ## We usually recommend not to specify default resources and to leave this as a conscious ## choice for the user. This also increases chances charts run on environments with little ## resources, such as Minikube. If you do want to specify resources, uncomment the following ## lines, adjust them as necessary, and remove the curly braces after 'resources:'. ## @param envoy.resources.limits [object] Specify resource limits which the container is not allowed to succeed. ## @param envoy.resources.requests [object] Specify resource requests which the container needs to spawn. ## resources: ## Example: ## limits: ## cpu: 400m ## memory: 250Mi ## limits: {} ## Examples: ## requests: ## cpu: 100m ## memory: 25Mi ## requests: {} ## @param envoy.command Override default command ## command: [] ## @param envoy.args Override default args ## args: [] ## @param envoy.shutdownManager.resources.limits [object] Specify resource limits which the container is not allowed to succeed. ## @param envoy.shutdownManager.resources.requests [object] Specify resource requests which the container needs to spawn. ## shutdownManager: resources: ## Example: ## limits: ## cpu: 50m ## memory: 32Mi ## limits: {} ## Examples: ## requests: ## cpu: 10m ## memory: 16Mi ## requests: {} ## @param envoy.kind Install as deployment or daemonset ## kind: daemonset ## @param envoy.replicaCount Desired number of Controller pods ## replicaCount: 1 ## @param envoy.lifecycleHooks lifecycleHooks for the container to automate configuration before or after startup. ## lifecycleHooks: {} ## @param envoy.updateStrategy [object] Strategy to use to update Pods ## ref: https://kubernetes.io/docs/concepts/workloads/controllers/statefulset/#update-strategies ## updateStrategy: type: RollingUpdate rollingUpdate: maxUnavailable: 10% ## @param envoy.minReadySeconds The minimum number of seconds for which a newly created Pod should be ready ## minReadySeconds: 0 ## @param envoy.revisionHistoryLimit The number of old history to retain to allow rollback ## revisionHistoryLimit: 10 ## Controller Autoscaling configuration ## @param envoy.autoscaling.enabled Enable autoscaling for Controller ## @param envoy.autoscaling.minReplicas Minimum number of Controller replicas ## @param envoy.autoscaling.maxReplicas Maximum number of Controller replicas ## @param envoy.autoscaling.targetCPU Target CPU utilization percentage ## @param envoy.autoscaling.targetMemory Target Memory utilization percentage ## autoscaling: enabled: false minReplicas: 1 maxReplicas: 11 targetCPU: "" targetMemory: "" ## @param envoy.podAffinityPreset Envoy Pod affinity preset. Ignored if `affinity` is set. Allowed values: `soft` or `hard` ## ref: https://kubernetes.io/docs/concepts/scheduling-eviction/assign-pod-node/#inter-pod-affinity-and-anti-affinity ## Allowed values: soft, hard ## podAffinityPreset: "" ## @param envoy.podAntiAffinityPreset Envoy Pod anti-affinity preset. Ignored if `affinity` is set. Allowed values: `soft` or `hard` ## Ref: https://kubernetes.io/docs/concepts/scheduling-eviction/assign-pod-node/#inter-pod-affinity-and-anti-affinity ## Allowed values: soft, hard ## podAntiAffinityPreset: "" ## Node affinity preset ## Ref: https://kubernetes.io/docs/concepts/scheduling-eviction/assign-pod-node/#node-affinity ## @param envoy.nodeAffinityPreset.type Envoy Node affinity preset type. Ignored if `affinity` is set. Allowed values: `soft` or `hard` ## @param envoy.nodeAffinityPreset.key Envoy Node label key to match Ignored if `affinity` is set. ## @param envoy.nodeAffinityPreset.values [array] Envoy Node label values to match. Ignored if `affinity` is set. ## nodeAffinityPreset: type: "" key: "" ## E.g. ## values: ## - e2e-az1 ## - e2e-az2 ## values: [] ## @param envoy.affinity [object] Affinity for Envoy pod assignment ## Ref: https://kubernetes.io/docs/concepts/configuration/assign-pod-node/#affinity-and-anti-affinity ## Note: podAffinityPreset, podAntiAffinityPreset, and nodeAffinityPreset will be ignored when it's set ## affinity: {} ## @param envoy.nodeSelector [object] Node labels for Envoy pod assignment ## Ref: https://kubernetes.io/docs/user-guide/node-selection/ ## nodeSelector: {} ## @param envoy.tolerations [array] Tolerations for Envoy pod assignment ## Ref: https://kubernetes.io/docs/concepts/configuration/taint-and-toleration/ ## tolerations: [] ## @param envoy.podAnnotations [object] Envoy Pod annotations ## ref: https://kubernetes.io/docs/concepts/overview/working-with-objects/annotations/ ## podAnnotations: {} ## Pod security context ## ref: https://kubernetes.io/docs/tasks/configure-pod-container/security-context/#set-the-security-context-for-a-pod ## @param envoy.podSecurityContext.enabled Envoy Pod securityContext ## @param envoy.podSecurityContext.fsGroup User ID for the for the mounted volumes ## @param envoy.podSecurityContext.sysctls Array of sysctl options to allow ## podSecurityContext: fsGroup: 0 sysctls: [] enabled: false ## Envoy container security context ## ref: https://kubernetes.io/docs/tasks/configure-pod-container/security-context/#set-the-security-context-for-a-container ## @param envoy.containerSecurityContext.enabled Envoy Container securityContext ## @param envoy.containerSecurityContext.runAsUser User ID for the Envoy container (to change this, http and https containerPorts must be set to >1024) ## containerSecurityContext: enabled: true runAsUser: 1001 ## @param envoy.hostNetwork Envoy Pod host network access ## ref: https://kubernetes.io/docs/concepts/policy/pod-security-policy/#host-namespaces ## hostNetwork: false ## @param envoy.dnsPolicy Envoy Pod Dns Policy's DNS Policy ## ref: https://kubernetes.io/docs/concepts/services-networking/dns-pod-service/#pod-s-dns-policy ## dnsPolicy: ClusterFirst ## @param envoy.tlsExistingSecret Name of the existingSecret to be use in Envoy deployment ## tlsExistingSecret: "" ## @param envoy.serviceAccount.create Specifies whether a ServiceAccount should be created ## @param envoy.serviceAccount.name The name of the ServiceAccount to use. If not set and create is true, a name is generated using the fullname template ## @param envoy.serviceAccount.automountServiceAccountToken Whether to auto mount API credentials for a service account ## ref: https://kubernetes.io/docs/tasks/configure-pod-container/configure-service-account/#use-the-default-service-account-to-access-the-api-server ## serviceAccount: create: true name: "" automountServiceAccountToken: false ## @param envoy.livenessProbe.enabled Enable livenessProbe ## @param envoy.livenessProbe.initialDelaySeconds Initial delay seconds for livenessProbe ## @param envoy.livenessProbe.periodSeconds Period seconds for livenessProbe ## @param envoy.livenessProbe.timeoutSeconds Timeout seconds for livenessProbe ## @param envoy.livenessProbe.failureThreshold Failure threshold for livenessProbe ## @param envoy.livenessProbe.successThreshold Success threshold for livenessProbe ## livenessProbe: enabled: true initialDelaySeconds: 120 periodSeconds: 20 timeoutSeconds: 5 failureThreshold: 6 successThreshold: 1 ## @param envoy.readinessProbe.enabled Enable/disable the readiness probe ## @param envoy.readinessProbe.initialDelaySeconds Delay before readiness probe is initiated ## @param envoy.readinessProbe.periodSeconds How often to perform the probe ## @param envoy.readinessProbe.timeoutSeconds When the probe times out ## @param envoy.readinessProbe.failureThreshold Minimum consecutive failures for the probe to be considered failed after having succeeded. ## @param envoy.readinessProbe.successThreshold Minimum consecutive successes for the probe to be considered successful after having failed. ## readinessProbe: enabled: true initialDelaySeconds: 10 periodSeconds: 3 timeoutSeconds: 1 failureThreshold: 3 successThreshold: 1 ## @param envoy.startupProbe.enabled Enable/disable the startup probe ## @param envoy.startupProbe.initialDelaySeconds Delay before startup probe is initiated ## @param envoy.startupProbe.periodSeconds How often to perform the probe ## @param envoy.startupProbe.timeoutSeconds When the probe times out ## @param envoy.startupProbe.failureThreshold Minimum consecutive failures for the probe to be considered failed after having succeeded. ## @param envoy.startupProbe.successThreshold Minimum consecutive successes for the probe to be considered successful after having failed. ## startupProbe: enabled: false initialDelaySeconds: 15 periodSeconds: 10 timeoutSeconds: 5 failureThreshold: 3 successThreshold: 1 ## @param envoy.customLivenessProbe Override default liveness probe ## customLivenessProbe: {} ## @param envoy.customReadinessProbe Override default readiness probe ## customReadinessProbe: {} ## @param envoy.customStartupProbe Override default startup probe ## customStartupProbe: {} ## @param envoy.terminationGracePeriodSeconds Envoy termination grace period in seconds ## terminationGracePeriodSeconds: 300 ## @param envoy.logLevel Envoy log level ## logLevel: info ## Envoy Service properties ## service: ## @param envoy.service.type Type of Envoy service to create ## type: LoadBalancer ## @param envoy.service.externalTrafficPolicy Envoy Service external cluster policy. If `envoy.service.type` is NodePort or LoadBalancer ## externalTrafficPolicy: Local ## @param envoy.service.labels Labels to add to te envoy service ## labels: {} ## @param envoy.service.clusterIP Internal envoy cluster service IP ## e.g.: ## clusterIP: None ## clusterIP: "" ## @param envoy.service.externalIPs [array] Envoy service external IP addresses ## externalIPs: [] ## @param envoy.service.loadBalancerIP IP address to assign to load balancer (if supported) ## loadBalancerIP: "" ## @param envoy.service.loadBalancerSourceRanges [array] List of IP CIDRs allowed access to load balancer (if supported) ## loadBalancerSourceRanges: [] ## @param envoy.service.ipFamilyPolicy [string], support SingleStack, PreferDualStack and RequireDualStack ## ipFamilyPolicy: "" ## @param envoy.service.annotations [object] Annotations for Envoy service ## annotations: {} ports: ## @param envoy.service.ports.http Sets service http port ## http: 80 ## @param envoy.service.ports.https Sets service https port ## https: 443 ## Specify the nodePort(s) value(s) for the LoadBalancer and NodePort service types. ## ref: https://kubernetes.io/docs/concepts/services-networking/service/#type-nodeport ## @param envoy.service.nodePorts.http HTTP Port. If `envoy.service.type` is NodePort and this is non-empty ## @param envoy.service.nodePorts.https HTTPS Port. If `envoy.service.type` is NodePort and this is non-empty ## nodePorts: http: "" https: "" ## @param envoy.service.extraPorts [array] Extra ports to expose (normally used with the `sidecar` value) ## ref: https://kubernetes.io/docs/concepts/services-networking/service/#multi-port-services ## extraPorts: [] ## @param envoy.useHostPort Enable/disable `hostPort` for TCP/80 and TCP/443 ## useHostPort: true ## @param envoy.useHostIP Enable/disable `hostIP` ## useHostIP: false ## @param envoy.hostPorts.http Sets `hostPort` http port ## @param envoy.hostPorts.https Sets `hostPort` https port ## hostPorts: http: 80 https: 443 ## @param envoy.hostIPs.http Sets `hostIP` http IP ## @param envoy.hostIPs.https Sets `hostIP` https IP ## hostIPs: http: 127.0.0.1 https: 127.0.0.1 ## Configures the ports the Envoy proxy listens on ## @param envoy.containerPorts.http Sets http port inside Envoy pod (change this to >1024 to run envoy as a non-root user) ## @param envoy.containerPorts.https Sets https port inside Envoy pod (change this to >1024 to run envoy as a non-root user) ## containerPorts: http: 8080 https: 8443 ## @param envoy.initContainers [array] Attach additional init containers to Envoy pods ## For example: ## initContainers: ## - name: your-image-name ## image: your-image ## imagePullPolicy: Always ## initContainers: [] ## @param envoy.sidecars Add additional sidecar containers to the Envoy pods ## Example: ## sidecars: ## - name: your-image-name ## image: your-image ## imagePullPolicy: Always ## ports: ## - name: portname ## containerPort: 1234 ## sidecars: [] ## @param envoy.extraVolumes [array] Array to add extra volumes ## extraVolumes: [] ## @param envoy.extraVolumeMounts [array] Array to add extra mounts (normally used with extraVolumes) ## extraVolumeMounts: [] ## @param envoy.extraEnvVars [array] Array containing extra env vars to be added to all Envoy containers ## For example: ## extraEnvVars: ## - name: MY_ENV_VAR ## value: env_var_value ## extraEnvVars: [] ## @param envoy.extraEnvVarsCM ConfigMap containing extra env vars to be added to all Envoy containers ## extraEnvVarsCM: "" ## @param envoy.extraEnvVarsSecret Secret containing extra env vars to be added to all Envoy containers ## extraEnvVarsSecret: "" ## @section Default backend parameters ## ## Default 404 backend ## defaultBackend: ## @param defaultBackend.enabled Enable a default backend based on NGINX ## enabled: false ## Bitnami NGINX image ## ref: https://hub.docker.com/r/bitnami/nginx/tags/ ## @param defaultBackend.image.registry Default backend image registry ## @param defaultBackend.image.repository Default backend image name ## @param defaultBackend.image.tag Default backend image tag ## @param defaultBackend.image.pullPolicy Image pull policy ## @param defaultBackend.image.pullSecrets [array] Specify docker-registry secret names as an array ## image: registry: docker.io repository: bitnami/nginx tag: 1.21.6-debian-10-r46 ## Specify a imagePullPolicy ## Defaults to 'Always' if image tag is 'latest', else set to 'IfNotPresent' ## ref: https://kubernetes.io/docs/user-guide/images/#pre-pulling-images ## pullPolicy: IfNotPresent ## Optionally specify an array of imagePullSecrets. ## Secrets must be manually created in the namespace. ## ref: https://kubernetes.io/docs/tasks/configure-pod-container/pull-image-private-registry/ ## Example: ## pullSecrets: ## - myRegistryKeySecretName ## pullSecrets: [] ## @param defaultBackend.extraArgs [object] Additional command line arguments to pass to NGINX container ## extraArgs: {} ## @param defaultBackend.lifecycleHooks lifecycleHooks for the container to automate configuration before or after startup. ## lifecycleHooks: {} ## @param defaultBackend.extraEnvVars [array] Array containing extra env vars to be added to all Contour containers ## For example: ## extraEnvVars: ## - name: MY_ENV_VAR ## value: env_var_value ## extraEnvVars: [] ## @param defaultBackend.extraEnvVarsCM ConfigMap containing extra env vars to be added to all Contour containers ## extraEnvVarsCM: "" ## @param defaultBackend.extraEnvVarsSecret Secret containing extra env vars to be added to all Contour containers ## extraEnvVarsSecret: "" ## @param defaultBackend.extraVolumes [array] Array to add extra volumes ## extraVolumes: [] ## @param defaultBackend.extraVolumeMounts [array] Array to add extra mounts (normally used with extraVolumes) ## extraVolumeMounts: [] ## @param defaultBackend.initContainers [array] Attach additional init containers to the http backend pods ## For example: ## initContainers: ## - name: your-image-name ## image: your-image ## imagePullPolicy: Always ## initContainers: [] ## @param defaultBackend.sidecars [array] Add additional sidecar containers to the default backend ## Example: ## sidecars: ## - name: your-image-name ## image: your-image ## imagePullPolicy: Always ## ports: ## - name: portname ## containerPort: 1234 ## sidecars: [] ## Configures the ports the http backend listens on ## @param defaultBackend.containerPorts.http Set http port inside Contour pod ## containerPorts: http: 8001 ## @param defaultBackend.updateStrategy Strategy to use to update Pods ## ref: https://kubernetes.io/docs/concepts/workloads/controllers/statefulset/#update-strategies ## updateStrategy: {} ## @param defaultBackend.command Override default command ## command: [] ## @param defaultBackend.args Override default args ## args: [] ## @param defaultBackend.hostAliases [array] Add deployment host aliases ## https://kubernetes.io/docs/concepts/services-networking/add-entries-to-pod-etc-hosts-with-host-aliases/ ## hostAliases: [] ## @param defaultBackend.replicaCount Desired number of default backend pods ## replicaCount: 1 ## Default backend pods' Security Context ## ref: https://kubernetes.io/docs/tasks/configure-pod-container/security-context/#set-the-security-context-for-a-pod ## @param defaultBackend.podSecurityContext.enabled Default backend Pod securityContext ## @param defaultBackend.podSecurityContext.fsGroup Set Default backend Pod's Security Context fsGroup ## podSecurityContext: enabled: true fsGroup: 1001 ## Default backend containers' Security Context (only main container) ## ref: https://kubernetes.io/docs/tasks/configure-pod-container/security-context/#set-the-security-context-for-a-container ## @param defaultBackend.containerSecurityContext.enabled Default backend container securityContext ## @param defaultBackend.containerSecurityContext.runAsUser User ID for the Envoy container (to change this, http and https containerPorts must be set to >1024) ## containerSecurityContext: enabled: true runAsUser: 1001 ## Default backend containers' resource requests and limits ## ref: https://kubernetes.io/docs/user-guide/compute-resources ## We usually recommend not to specify default resources and to leave this as a conscious ## choice for the user. This also increases chances charts run on environments with little ## resources, such as Minikube. ## @param defaultBackend.resources.limits [object] The resources limits for the Default backend container ## @param defaultBackend.resources.requests [object] The requested resources for the Default backend container ## resources: ## Example: ## limits: ## cpu: 250m ## memory: 256Mi ## limits: {} ## Examples: ## requests: ## cpu: 250m ## memory: 256Mi ## requests: {} ## Default backend containers' liveness probe. Evaluated as a template. ## ref: https://kubernetes.io/docs/concepts/workloads/pods/pod-lifecycle/#container-probes ## @param defaultBackend.livenessProbe.enabled Enable livenessProbe ## @param defaultBackend.livenessProbe.httpGet [object] Path, port and scheme for the livenessProbe ## @param defaultBackend.livenessProbe.initialDelaySeconds Initial delay seconds for livenessProbe ## @param defaultBackend.livenessProbe.periodSeconds Period seconds for livenessProbe ## @param defaultBackend.livenessProbe.timeoutSeconds Timeout seconds for livenessProbe ## @param defaultBackend.livenessProbe.failureThreshold Failure threshold for livenessProbe ## @param defaultBackend.livenessProbe.successThreshold Success threshold for livenessProbe ## livenessProbe: enabled: true failureThreshold: 3 initialDelaySeconds: 30 periodSeconds: 10 successThreshold: 1 timeoutSeconds: 5 ## Default backend containers' readiness probe. Evaluated as a template. ## ref: https://kubernetes.io/docs/concepts/workloads/pods/pod-lifecycle/#container-probes ## @param defaultBackend.readinessProbe.enabled Enable readinessProbe ## @param defaultBackend.readinessProbe.httpGet [object] Path, port and scheme for the readinessProbe ## @param defaultBackend.readinessProbe.initialDelaySeconds Initial delay seconds for readinessProbe ## @param defaultBackend.readinessProbe.periodSeconds Period seconds for readinessProbe ## @param defaultBackend.readinessProbe.timeoutSeconds Timeout seconds for readinessProbe ## @param defaultBackend.readinessProbe.failureThreshold Failure threshold for readinessProbe ## @param defaultBackend.readinessProbe.successThreshold Success threshold for readinessProbe ## readinessProbe: enabled: true failureThreshold: 6 initialDelaySeconds: 0 periodSeconds: 5 successThreshold: 1 timeoutSeconds: 5 ## @param defaultBackend.startupProbe.enabled Enable/disable the startup probe ## @param defaultBackend.startupProbe.initialDelaySeconds Delay before startup probe is initiated ## @param defaultBackend.startupProbe.periodSeconds How often to perform the probe ## @param defaultBackend.startupProbe.timeoutSeconds When the probe times out ## @param defaultBackend.startupProbe.failureThreshold Minimum consecutive failures for the probe to be considered failed after having succeeded. ## @param defaultBackend.startupProbe.successThreshold Minimum consecutive successes for the probe to be considered successful after having failed. ## startupProbe: enabled: false initialDelaySeconds: 15 periodSeconds: 10 timeoutSeconds: 5 failureThreshold: 3 successThreshold: 1 ## @param defaultBackend.customLivenessProbe [object] Override default liveness probe, it overrides the default one (evaluated as a template) ## customLivenessProbe: {} ## @param defaultBackend.customReadinessProbe [object] Override default readiness probe, it overrides the default one (evaluated as a template) ## customReadinessProbe: {} ## @param defaultBackend.customStartupProbe Override default startup probe ## customStartupProbe: {} ## @param defaultBackend.podLabels [object] Extra labels for Controller pods ## ref: https://kubernetes.io/docs/concepts/overview/working-with-objects/labels/ ## podLabels: {} ## @param defaultBackend.podAnnotations [object] Annotations for Controller pods ## ref: https://kubernetes.io/docs/concepts/overview/working-with-objects/annotations/ ## podAnnotations: {} ## @param defaultBackend.priorityClassName Priority class assigned to the pods ## ref: https://kubernetes.io/docs/concepts/configuration/pod-priority-preemption/#priorityclass ## priorityClassName: "" ## @param defaultBackend.podAffinityPreset Pod affinity preset. Ignored if `affinity` is set. Allowed values: `soft` or `hard` ## ref: https://kubernetes.io/docs/concepts/scheduling-eviction/assign-pod-node/#inter-pod-affinity-and-anti-affinity ## Allowed values: soft, hard ## podAffinityPreset: "" ## @param defaultBackend.podAntiAffinityPreset Pod anti-affinity preset. Ignored if `affinity` is set. Allowed values: `soft` or `hard` ## ref: https://kubernetes.io/docs/concepts/scheduling-eviction/assign-pod-node/#inter-pod-affinity-and-anti-affinity ## Allowed values: soft, hard ## podAntiAffinityPreset: soft ## Node affinity preset ## Ref: https://kubernetes.io/docs/concepts/scheduling-eviction/assign-pod-node/#node-affinity ## @param defaultBackend.nodeAffinityPreset.type Node affinity preset type. Ignored if `affinity` is set. Allowed values: `soft` or `hard` ## @param defaultBackend.nodeAffinityPreset.key Node label key to match. Ignored if `affinity` is set. ## @param defaultBackend.nodeAffinityPreset.values [array] Node label values to match. Ignored if `affinity` is set. ## nodeAffinityPreset: type: "" key: "" ## E.g. ## values: ## - e2e-az1 ## - e2e-az2 ## values: [] ## @param defaultBackend.affinity [object] Affinity for pod assignment. Evaluated as a template. ## ref: https://kubernetes.io/docs/concepts/configuration/assign-pod-node/#affinity-and-anti-affinity ## Note: defaultBackend.podAffinityPreset, defaultBackend.podAntiAffinityPreset, and defaultBackend.nodeAffinityPreset will be ignored when it's set ## affinity: {} ## @param defaultBackend.nodeSelector [object] Node labels for pod assignment. Evaluated as a template. ## ref: https://kubernetes.io/docs/user-guide/node-selection/ ## nodeSelector: {} ## @param defaultBackend.tolerations [array] Tolerations for pod assignment. Evaluated as a template. ## ref: https://kubernetes.io/docs/concepts/configuration/taint-and-toleration/ ## tolerations: [] ## Default backend Service parameters ## @param defaultBackend.service.type Service type ## @param defaultBackend.service.ports.http Service port ## @param defaultBackend.service.annotations Annotations to add to the service ## service: type: ClusterIP ports: http: 80 annotations: {} ## PodDisruptionBudget for default backend ## Default backend Pod Disruption Budget configuration ## ref: https://kubernetes.io/docs/tasks/run-application/configure-pdb/ ## @param defaultBackend.pdb.create Enable Pod Disruption Budget configuration ## @param defaultBackend.pdb.minAvailable Minimum number/percentage of Default backend pods that should remain scheduled ## @param defaultBackend.pdb.maxUnavailable Maximum number/percentage of Default backend pods that should remain scheduled ## pdb: create: false minAvailable: 1 maxUnavailable: "" ## Ingress parameters ## ingress: ## @param ingress.enabled Ingress configuration enabled ## Ref: https://kubernetes.io/docs/user-guide/ingress/ ## ## Enable Ingress. ## enabled: false ## @param ingress.certManager Add annotations for cert-manager ## certManager: false ## @param ingress.annotations Annotations to be added to the web ingress. ## Example: ## kubernetes.io/ingress.class: nginx ## kubernetes.io/tls-acme: 'true' ## annotations: {} ## Either `hosts` or `rulesOverride` must be provided if Ingress is enabled. ## `hosts` sets up the Ingress with default rules per provided hostname. ## @param ingress.hostname Hostename for the Ingress object ## hostname: contour.local ## @param ingress.path The Path to Concourse ## path: / ## @param ingress.rulesOverride Ingress rules override ## Either `hosts` or `rulesOverride` must be provided if Ingress is enabled. ## `rulesOverride` allows the user to define the full set of ingress rules, for more complex Ingress setups. ## rulesOverride: [] ## @param ingress.selfSigned Create a TLS secret for this ingress record using self-signed certificates generated by Helm ## selfSigned: false ## @param ingress.ingressClassName IngressClass that will be be used to implement the Ingress (Kubernetes 1.18+) ## ingressClassName: "" ## @param ingress.extraPaths Add additional arbitrary paths that may need to be added to the ingress under the main host. ## For example: The ALB ingress controller requires a special rule for handling SSL redirection. ## extraPaths: [] ## @param ingress.tls TLS configuration. ## Secrets must be manually created in the namespace. ## Example: ## - secretName: concourse-web-tls ## hosts: ## - concourse.domain.com ## tls: false ## @param ingress.pathType Ingress Path type ## pathType: ImplementationSpecific ## @param ingress.extraHosts The list of additional hostnames to be covered with this ingress record. ## Most likely the hostname above will be enough, but in the event more hosts are needed, this is an array ## extraHosts: ## - name: concourse.local ## path: / ## extraHosts: [] ## @param ingress.extraTls The tls configuration for additional hostnames to be covered with this ingress record. ## see: https://kubernetes.io/docs/concepts/services-networking/ingress/#tls ## extraTls: ## - hosts: ## - concourse.local ## secretName: concourse.local-tls ## extraTls: [] ## @param ingress.secrets If you're providing your own certificates, please use this to add the certificates as secrets ## key and certificate should start with -----BEGIN CERTIFICATE----- or ## -----BEGIN RSA PRIVATE KEY----- ## ## name should line up with a tlsSecret set further up ## If you're using cert-manager, this is unneeded, as it will create the secret for you if it is not set ## ## It is also possible to create and manage the certificates outside of this helm chart ## Please see README.md for more information ## Example: ## - name: concourse.local-tls ## key: ## certificate: ## secrets: [] ## @section Metrics parameters ## ## Prometheus Operator service monitors ## @param metrics.serviceMonitor.namespace Specify if the servicemonitors will be deployed into a different namespace (blank deploys into same namespace as chart) ## @param metrics.serviceMonitor.enabled Specify if a servicemonitor will be deployed for prometheus-operator. ## @param metrics.serviceMonitor.jobLabel Specify the jobLabel to use for the prometheus-operator ## @param metrics.serviceMonitor.interval Specify the scrape interval if not specified use default prometheus scrapeIntervall, the Prometheus default scrape interval is used. ## @param metrics.serviceMonitor.metricRelabelings [array] Specify additional relabeling of metrics. ## @param metrics.serviceMonitor.relabelings [array] Specify general relabeling. ## @param metrics.serviceMonitor.honorLabels Specify honorLabels parameter to add the scrape endpoint ## @param metrics.serviceMonitor.scrapeTimeout The timeout after which the scrape is ended ## @param metrics.serviceMonitor.selector Specify honorLabels parameter to add the scrape endpoint ## metrics: serviceMonitor: namespace: "" enabled: false jobLabel: "app.kubernetes.io/name" interval: "" metricRelabelings: [] relabelings: [] honorLabels: false scrapeTimeout: "" selector: {} ## @section Other parameters ## ## @param rbac.create Create the RBAC roles for API accessibility ## rbac: create: true ## @param rbac.rules [array] Custom RBAC rules to set ## e.g: ## rules: ## - apiGroups: ## - "" ## resources: ## - pods ## verbs: ## - get ## - list ## rules: [] ## @param tlsExistingSecret Name of the existingSecret to be use in both contour and envoy. If it is not nil `contour.certgen` will be disabled. ## tlsExistingSecret: ""
41.601175
174
0.731043
c66655ffb534591e443dff5b9259cee80f331eef
30,180
yaml
YAML
bitnami/cassandra/values.yaml
00arthur00/charts
502aa1e64541669b732a4eda896e5937847b6c3c
[ "Apache-2.0" ]
null
null
null
bitnami/cassandra/values.yaml
00arthur00/charts
502aa1e64541669b732a4eda896e5937847b6c3c
[ "Apache-2.0" ]
2
2022-01-26T01:14:30.000Z
2022-01-26T07:03:39.000Z
bitnami/cassandra/values.yaml
00arthur00/charts
502aa1e64541669b732a4eda896e5937847b6c3c
[ "Apache-2.0" ]
null
null
null
## @section Global parameters ## Global Docker image parameters ## Please, note that this will override the image parameters, including dependencies, configured to use the global value ## Current available global Docker image parameters: imageRegistry, imagePullSecrets and storageClass ## ## @param global.imageRegistry Global Docker image registry ## @param global.imagePullSecrets Global Docker registry secret names as an array ## @param global.storageClass Global StorageClass for Persistent Volume(s) ## global: imageRegistry: "" ## E.g. ## imagePullSecrets: ## - myRegistryKeySecretName ## imagePullSecrets: [] storageClass: "" ## @section Common parameters ## ## @param nameOverride String to partially override common.names.fullname ## nameOverride: "" ## @param fullnameOverride String to fully override common.names.fullname ## fullnameOverride: "" ## @param kubeVersion Force target Kubernetes version (using Helm capabilities if not set) ## kubeVersion: "" ## @param commonLabels Labels to add to all deployed objects (sub-charts are not considered) ## commonLabels: {} ## @param commonAnnotations Annotations to add to all deployed objects ## commonAnnotations: {} ## @param clusterDomain Kubernetes cluster domain name ## clusterDomain: cluster.local ## @param extraDeploy Array of extra objects to deploy with the release ## extraDeploy: [] ## Enable diagnostic mode in the deployment ## diagnosticMode: ## @param diagnosticMode.enabled Enable diagnostic mode (all probes will be disabled and the command will be overridden) ## enabled: false ## @param diagnosticMode.command Command to override all containers in the deployment ## command: - sleep ## @param diagnosticMode.args Args to override all containers in the deployment ## args: - infinity ## @section Cassandra parameters ## ## Bitnami Cassandra image ## ref: https://hub.docker.com/r/bitnami/cassandra/tags/ ## @param image.registry Cassandra image registry ## @param image.repository Cassandra image repository ## @param image.tag Cassandra image tag (immutable tags are recommended) ## @param image.pullPolicy image pull policy ## @param image.pullSecrets Cassandra image pull secrets ## @param image.debug Enable image debug mode ## image: registry: docker.io repository: bitnami/cassandra tag: 4.0.3-debian-10-r24 ## Specify a imagePullPolicy ## Defaults to 'Always' if image tag is 'latest', else set to 'IfNotPresent' ## ref: https://kubernetes.io/docs/user-guide/images/#pre-pulling-images ## pullPolicy: IfNotPresent ## Optionally specify an array of imagePullSecrets. ## Secrets must be manually created in the namespace. ## ref: https://kubernetes.io/docs/tasks/configure-pod-container/pull-image-private-registry/ ## e.g: ## pullSecrets: ## - myRegistryKeySecretName ## pullSecrets: [] ## Enable debug mode ## debug: false ## Secret with keystore, keystore password, truststore, truststore password ## DEPRECATED. Use tls.existingSecret instead # tlsEncryptionSecretName: ## Database credentials ## @param dbUser.user Cassandra admin user ## @param dbUser.forcePassword Force the user to provide a non ## @param dbUser.password Password for `dbUser.user`. Randomly generated if empty ## @param dbUser.existingSecret Use an existing secret object for `dbUser.user` password (will ignore `dbUser.password`) ## dbUser: user: cassandra forcePassword: false password: "" ## Use an existing secrets which already stores your password data. ## for backwards compatibility, existingSecret can be a simple string, ## referencing the secret by name. ## existingSecret: ## ## Name of the existing secret ## ## ## name: mySecret ## ## Key mapping where <key> is the value which the deployment is expecting and ## ## <value> is the name of the key in the existing secret. ## ## ## keyMapping: ## cassandra-password: myCassandraPasswordKey ## existingSecret: "" ## @param initDBConfigMap ConfigMap with cql scripts. Useful for creating a keyspace and pre-populating data ## initDBConfigMap: "" ## @param initDBSecret Secret with cql script (with sensitive data). Useful for creating a keyspace and pre-populating data ## initDBSecret: "" ## @param existingConfiguration ConfigMap with custom cassandra configuration files. This overrides any other Cassandra configuration set in the chart ## existingConfiguration: "" ## Cluster parameters ## @param cluster.name Cassandra cluster name ## @param cluster.seedCount Number of seed nodes ## @param cluster.numTokens Number of tokens for each node ## @param cluster.datacenter Datacenter name ## @param cluster.rack Rack name ## @param cluster.endpointSnitch Endpoint Snitch ## @param cluster.internodeEncryption DEPRECATED: use tls.internode and tls.client instead. Encryption values. ## @param cluster.clientEncryption Client Encryption ## @param cluster.extraSeeds For an external/second cassandra ring. ## @param cluster.enableUDF Enable User defined functions ## cluster: name: cassandra seedCount: 1 numTokens: 256 datacenter: dc1 rack: rack1 endpointSnitch: SimpleSnitch ## NOTE: internodeEncryption requires tlsEncryptionSecretName ## internodeEncryption: none clientEncryption: false ## eg: ## extraSeeds: ## - hostname/IP ## - hostname/IP ## extraSeeds: [] enableUDF: false ## JVM Settings ## @param jvm.extraOpts Set the value for Java Virtual Machine extra options ## @param jvm.maxHeapSize Set Java Virtual Machine maximum heap size (MAX_HEAP_SIZE). Calculated automatically if `nil` ## @param jvm.newHeapSize Set Java Virtual Machine new heap size (HEAP_NEWSIZE). Calculated automatically if `nil` ## jvm: extraOpts: "" ## Memory settings: These are calculated automatically unless specified otherwise ## To run on environments with little resources (<= 8GB), tune your heap settings: ## - calculate 1/2 ram and cap to 1024MB ## - calculate 1/4 ram and cap to 8192MB ## - pick the max ## maxHeapSize: "" ## newHeapSize: ## A good guideline is 100 MB per CPU core. ## - min(100 * num_cores, 1/4 * heap size) ## ref: https://docs.datastax.com/en/archived/cassandra/2.0/cassandra/operations/ops_tune_jvm_c.html ## newHeapSize: "" ## @param command Command for running the container (set to default if not set). Use array form ## command: [] ## @param args Args for running the container (set to default if not set). Use array form ## args: [] ## @param extraEnvVars Extra environment variables to be set on cassandra container ## For example: ## - name: FOO ## value: BAR ## extraEnvVars: [] ## @param extraEnvVarsCM Name of existing ConfigMap containing extra env vars ## extraEnvVarsCM: "" ## @param extraEnvVarsSecret Name of existing Secret containing extra env vars ## extraEnvVarsSecret: "" ## @section Statefulset parameters ## ## @param replicaCount Number of Cassandra replicas ## replicaCount: 1 ## @param updateStrategy.type updateStrategy for Cassandra statefulset ## ref: https://kubernetes.io/docs/concepts/workloads/controllers/statefulset/#update-strategies ## updateStrategy: type: RollingUpdate ## @param hostAliases Add deployment host aliases ## https://kubernetes.io/docs/concepts/services-networking/add-entries-to-pod-etc-hosts-with-host-aliases/ ## hostAliases: [] ## @param podManagementPolicy StatefulSet pod management policy ## podManagementPolicy: OrderedReady ## @param priorityClassName Cassandra pods' priority. ## ref: https://kubernetes.io/docs/concepts/configuration/pod-priority-preemption/ ## priorityClassName: "" ## @param podAnnotations Additional pod annotations ## ref: https://kubernetes.io/docs/concepts/overview/working-with-objects/annotations/ ## podAnnotations: {} ## @param podLabels Additional pod labels ## ref: https://kubernetes.io/docs/concepts/overview/working-with-objects/labels/ ## podLabels: {} ## @param podAffinityPreset Pod affinity preset. Ignored if `affinity` is set. Allowed values: `soft` or `hard` ## ref: https://kubernetes.io/docs/concepts/scheduling-eviction/assign-pod-node/#inter-pod-affinity-and-anti-affinity ## podAffinityPreset: "" ## @param podAntiAffinityPreset Pod anti-affinity preset. Ignored if `affinity` is set. Allowed values: `soft` or `hard` ## Ref: https://kubernetes.io/docs/concepts/scheduling-eviction/assign-pod-node/#inter-pod-affinity-and-anti-affinity ## podAntiAffinityPreset: soft ## Node affinity preset ## Ref: https://kubernetes.io/docs/concepts/scheduling-eviction/assign-pod-node/#node-affinity ## nodeAffinityPreset: ## @param nodeAffinityPreset.type Node affinity preset type. Ignored if `affinity` is set. Allowed values: `soft` or `hard` ## type: "" ## @param nodeAffinityPreset.key Node label key to match. Ignored if `affinity` is set ## key: "" ## @param nodeAffinityPreset.values Node label values to match. Ignored if `affinity` is set ## E.g. ## values: ## - e2e-az1 ## - e2e-az2 ## values: [] ## @param affinity Affinity for pod assignment ## Ref: https://kubernetes.io/docs/concepts/configuration/assign-pod-node/#affinity-and-anti-affinity ## NOTE: podAffinityPreset, podAntiAffinityPreset, and nodeAffinityPreset will be ignored when it's set ## affinity: {} ## @param nodeSelector Node labels for pod assignment ## ref: https://kubernetes.io/docs/user-guide/node-selection/ ## nodeSelector: {} ## @param tolerations Tolerations for pod assignment ## ref: https://kubernetes.io/docs/concepts/configuration/taint-and-toleration/ ## tolerations: [] ## @param topologySpreadConstraints Topology Spread Constraints for pod assignment ## https://kubernetes.io/docs/concepts/workloads/pods/pod-topology-spread-constraints/ ## The value is evaluated as a template ## topologySpreadConstraints: [] ## Pod security context ## ref: https://kubernetes.io/docs/tasks/configure-pod-container/security-context/#set-the-security-context-for-a-pod ## @param podSecurityContext.enabled Enabled Cassandra pods' Security Context ## @param podSecurityContext.fsGroup Set Cassandra pod's Security Context fsGroup ## podSecurityContext: enabled: true fsGroup: 1001 ## Configure Container Security Context (only main container) ## ref: https://kubernetes.io/docs/tasks/configure-pod-container/security-context/#set-the-security-context-for-a-container ## @param containerSecurityContext.enabled Enabled Cassandra containers' Security Context ## @param containerSecurityContext.runAsUser Set Cassandra container's Security Context runAsUser ## @param containerSecurityContext.runAsNonRoot Force the container to be run as non root ## containerSecurityContext: enabled: true runAsUser: 1001 runAsNonRoot: true ## Cassandra pods' resource requests and limits ## ref: https://kubernetes.io/docs/user-guide/compute-resources/ ## Minimum memory for development is 4GB and 2 CPU cores ## Minimum memory for production is 8GB and 4 CPU cores ## ref: http://docs.datastax.com/en/archived/cassandra/2.0/cassandra/architecture/architecturePlanningHardware_c.html ## ## We usually recommend not to specify default resources and to leave this as a conscious ## choice for the user. This also increases chances charts run on environments with little ## resources, such as Minikube. If you do want to specify resources, uncomment the following ## lines, adjust them as necessary, and remove the curly braces after 'resources:'. ## @param resources.limits The resources limits for Cassandra containers ## @param resources.requests The requested resources for Cassandra containers ## resources: ## Example: ## limits: ## cpu: 2 ## memory: 4Gi ## limits: {} ## Examples: ## requests: ## cpu: 2 ## memory: 4Gi ## requests: {} ## Configure extra options for Cassandra containers' liveness and readiness probes ## ref: https://kubernetes.io/docs/tasks/configure-pod-container/configure-liveness-readiness-probes/#configure-probes ## @param livenessProbe.enabled Enable livenessProbe ## @param livenessProbe.initialDelaySeconds Initial delay seconds for livenessProbe ## @param livenessProbe.periodSeconds Period seconds for livenessProbe ## @param livenessProbe.timeoutSeconds Timeout seconds for livenessProbe ## @param livenessProbe.failureThreshold Failure threshold for livenessProbe ## @param livenessProbe.successThreshold Success threshold for livenessProbe ## livenessProbe: enabled: true initialDelaySeconds: 60 periodSeconds: 30 timeoutSeconds: 5 successThreshold: 1 failureThreshold: 5 ## @param readinessProbe.enabled Enable readinessProbe ## @param readinessProbe.initialDelaySeconds Initial delay seconds for readinessProbe ## @param readinessProbe.periodSeconds Period seconds for readinessProbe ## @param readinessProbe.timeoutSeconds Timeout seconds for readinessProbe ## @param readinessProbe.failureThreshold Failure threshold for readinessProbe ## @param readinessProbe.successThreshold Success threshold for readinessProbe ## readinessProbe: enabled: true initialDelaySeconds: 60 periodSeconds: 10 timeoutSeconds: 5 successThreshold: 1 failureThreshold: 5 ## Configure extra options for startup probe ## ref: https://kubernetes.io/docs/tasks/configure-pod-container/configure-liveness-readiness-startup-probes/#configure-probes ## @param startupProbe.enabled Enable startupProbe ## @param startupProbe.initialDelaySeconds Initial delay seconds for startupProbe ## @param startupProbe.periodSeconds Period seconds for startupProbe ## @param startupProbe.timeoutSeconds Timeout seconds for startupProbe ## @param startupProbe.failureThreshold Failure threshold for startupProbe ## @param startupProbe.successThreshold Success threshold for startupProbe ## startupProbe: enabled: false initialDelaySeconds: 0 periodSeconds: 10 timeoutSeconds: 5 successThreshold: 1 failureThreshold: 60 ## @param customLivenessProbe Custom livenessProbe that overrides the default one ## customLivenessProbe: {} ## @param customReadinessProbe Custom readinessProbe that overrides the default one ## customReadinessProbe: {} ## @param customStartupProbe [object] Override default startup probe ## customStartupProbe: {} ## @param lifecycleHooks [object] Override default etcd container hooks ## lifecycleHooks: {} ## @param schedulerName Alternative scheduler ## ref: https://kubernetes.io/docs/tasks/administer-cluster/configure-multiple-schedulers/ ## schedulerName: "" ## @param extraVolumes Optionally specify extra list of additional volumes for cassandra container ## extraVolumes: [] ## @param extraVolumeMounts Optionally specify extra list of additional volumeMounts for cassandra container ## extraVolumeMounts: [] ## @param initContainers Add additional init containers to the cassandra pods ## initContainers: [] ## @param sidecars Add additional sidecar containers to the cassandra pods ## sidecars: [] ## Cassandra Pod Disruption Budget configuration ## ref: https://kubernetes.io/docs/tasks/run-application/configure-pdb/ ## pdb: ## @param pdb.create Enable/disable a Pod Disruption Budget creation ## create: false ## @param pdb.minAvailable Mininimum number of pods that must still be available after the eviction ## minAvailable: 1 ## @param pdb.maxUnavailable Max number of pods that can be unavailable after the eviction ## maxUnavailable: "" ## @param hostNetwork Enable HOST Network ## If hostNetwork true -> dnsPolicy is set to ClusterFirstWithHostNet ## hostNetwork: false ## Cassandra container ports to open ## If hostNetwork true: the hostPort is set identical to the containerPort ## @param containerPorts.intra Intra Port on the Host and Container ## @param containerPorts.tls TLS Port on the Host and Container ## @param containerPorts.jmx JMX Port on the Host and Container ## @param containerPorts.cql CQL Port on the Host and Container ## containerPorts: intra: 7000 tls: 7001 jmx: 7199 cql: 9042 ## @section RBAC parameters ## ## Cassandra pods ServiceAccount ## ref: https://kubernetes.io/docs/tasks/configure-pod-container/configure-service-account/ ## serviceAccount: ## @param serviceAccount.create Enable the creation of a ServiceAccount for Cassandra pods ## create: true ## @param serviceAccount.name The name of the ServiceAccount to use. ## If not set and create is true, a name is generated using the cassandra.fullname template ## name: "" ## @param serviceAccount.annotations Annotations for Cassandra Service Account ## annotations: {} ## @param serviceAccount.automountServiceAccountToken Automount API credentials for a service account. ## automountServiceAccountToken: true ## @section Traffic Exposure Parameters ## ## Cassandra service parameters ## service: ## @param service.type Cassandra service type ## type: ClusterIP ## @param service.ports.cql Cassandra service CQL Port ## @param service.ports.metrics Cassandra service metrics port ## ports: cql: 9042 metrics: 8080 ## Node ports to expose ## ref: https://kubernetes.io/docs/concepts/services-networking/service/#type-nodeport ## @param service.nodePorts.cql Node port for CQL ## @param service.nodePorts.metrics Node port for metrics ## nodePorts: cql: "" metrics: "" ## @param service.extraPorts Extra ports to expose in the service (normally used with the `sidecar` value) ## extraPorts: [] ## @param service.loadBalancerIP LoadBalancerIP if service type is `LoadBalancer` ## ref: https://kubernetes.io/docs/concepts/services-networking/service/#internal-load-balancer ## loadBalancerIP: "" ## @param service.loadBalancerSourceRanges Service Load Balancer sources ## ref: https://kubernetes.io/docs/tasks/access-application-cluster/configure-cloud-provider-firewall/#restrict-access-for-loadbalancer-service ## e.g: ## loadBalancerSourceRanges: ## - 10.10.10.0/24 ## loadBalancerSourceRanges: [] ## @param service.clusterIP Service Cluster IP ## e.g.: ## clusterIP: None ## clusterIP: "" ## @param service.externalTrafficPolicy Service external traffic policy ## ref https://kubernetes.io/docs/tasks/access-application-cluster/create-external-load-balancer/#preserving-the-client-source-ip ## externalTrafficPolicy: Cluster ## @param service.annotations Provide any additional annotations which may be required. ## This can be used to set the LoadBalancer service type to internal only. ## ref: https://kubernetes.io/docs/concepts/services-networking/service/#internal-load-balancer ## annotations: {} ## Network policies ## Ref: https://kubernetes.io/docs/concepts/services-networking/network-policies/ ## networkPolicy: ## @param networkPolicy.enabled Specifies whether a NetworkPolicy should be created ## enabled: false ## @param networkPolicy.allowExternal Don't require client label for connections ## The Policy model to apply. When set to false, only pods with the correct ## client label will have network access to the port Redis&trade; is listening ## on. When true, Redis&trade; will accept connections from any source ## (with the correct destination port). ## allowExternal: true ## @section Persistence parameters ## ## Enable persistence using Persistent Volume Claims ## ref: https://kubernetes.io/docs/user-guide/persistent-volumes/ ## persistence: ## @param persistence.enabled Enable Cassandra data persistence using PVC, use a Persistent Volume Claim, If false, use emptyDir ## enabled: true ## @param persistence.storageClass PVC Storage Class for Cassandra data volume ## If defined, storageClassName: <storageClass> ## If set to "-", storageClassName: "", which disables dynamic provisioning ## If undefined (the default) or set to null, no storageClassName spec is ## set, choosing the default provisioner. (gp2 on AWS, standard on ## GKE, AWS & OpenStack) ## storageClass: "" ## @param persistence.commitStorageClass PVC Storage Class for Cassandra Commit Log volume ## Storage class to use with CASSANDRA_COMMITLOG_DIR to reduce the concurrence for writing data and commit logs ## ref: https://github.com/bitnami/bitnami-docker-cassandra ## If set to "-", commitStorageClass: "", which disables dynamic provisioning ## If undefined (the default) or set to null, no storageClassName spec is ## set, choosing the default provisioner. (gp2 on AWS, standard on ## GKE, AWS & OpenStack) ## commitStorageClass: "" ## @param persistence.annotations Persistent Volume Claim annotations ## annotations: {} ## @param persistence.accessModes Persistent Volume Access Mode ## accessModes: - ReadWriteOnce ## @param persistence.size PVC Storage Request for Cassandra data volume ## size: 8Gi ## @skip persistence.commitLogsize PVC Storage Request for Cassandra commit log volume ## # commitLogsize: 2Gi ## @param persistence.mountPath The path the data volume will be mounted at ## mountPath: /bitnami/cassandra ## @skip persistence.commitLogMountPath The path the commit log volume will be mounted at ## # commitLogMountPath: /bitnami/cassandra/commitlog ## @section Volume Permissions parameters ## ## Init containers parameters: ## volumePermissions: Change the owner and group of the persistent volume mountpoint to runAsUser:fsGroup values from the securityContext section. ## volumePermissions: ## @param volumePermissions.enabled Enable init container that changes the owner and group of the persistent volume ## enabled: false ## @param volumePermissions.image.registry Init container volume ## @param volumePermissions.image.repository Init container volume ## @param volumePermissions.image.tag Init container volume ## @param volumePermissions.image.pullPolicy Init container volume ## @param volumePermissions.image.pullSecrets Specify docker-registry secret names as an array ## image: registry: docker.io repository: bitnami/bitnami-shell tag: 10-debian-10-r366 pullPolicy: IfNotPresent ## Optionally specify an array of imagePullSecrets. ## Secrets must be manually created in the namespace. ## ref: https://kubernetes.io/docs/tasks/configure-pod-container/pull-image-private-registry/ ## e.g: ## pullSecrets: ## - myRegistryKeySecretName ## pullSecrets: [] ## Init container' resource requests and limits ## ref: https://kubernetes.io/docs/user-guide/compute-resources/ ## We usually recommend not to specify default resources and to leave this as a conscious ## choice for the user. This also increases chances charts run on environments with little ## resources, such as Minikube. If you do want to specify resources, uncomment the following ## lines, adjust them as necessary, and remove the curly braces after 'resources:'. ## @param volumePermissions.resources.limits The resources limits for the container ## @param volumePermissions.resources.requests The requested resources for the container ## resources: ## Example: ## limits: ## cpu: 100m ## memory: 128Mi ## limits: {} ## Examples: ## requests: ## cpu: 100m ## memory: 128Mi ## requests: {} ## Init container Security Context ## Note: the chown of the data folder is done to securityContext.runAsUser ## and not the below volumePermissions.securityContext.runAsUser ## @param volumePermissions.securityContext.runAsUser User ID for the init container ## ## When runAsUser is set to special value "auto", init container will try to chwon the ## data folder to autodetermined user&group, using commands: `id -u`:`id -G | cut -d" " -f2` ## "auto" is especially useful for OpenShift which has scc with dynamic userids (and 0 is not allowed). ## You may want to use this volumePermissions.securityContext.runAsUser="auto" in combination with ## pod securityContext.enabled=false and shmVolume.chmod.enabled=false ## securityContext: runAsUser: 0 ## @section Metrics parameters ## ## Cassandra Prometheus exporter configuration ## metrics: ## @param metrics.enabled Start a side-car prometheus exporter ## enabled: false ## Bitnami Cassandra Exporter image ## ref: https://hub.docker.com/r/bitnami/cassandra-exporter/tags/ ## @param metrics.image.registry Cassandra exporter image registry ## @param metrics.image.repository Cassandra exporter image name ## @param metrics.image.tag Cassandra exporter image tag ## @param metrics.image.pullPolicy image pull policy ## @param metrics.image.pullSecrets Specify docker-registry secret names as an array ## image: registry: docker.io pullPolicy: IfNotPresent repository: bitnami/cassandra-exporter tag: 2.3.7-debian-10-r40 ## Optionally specify an array of imagePullSecrets. ## Secrets must be manually created in the namespace. ## ref: https://kubernetes.io/docs/tasks/configure-pod-container/pull-image-private-registry/ ## e.g: ## pullSecrets: ## - myRegistryKeySecretName ## pullSecrets: [] ## Cassandra Prometheus exporter resource requests and limits ## ref: https://kubernetes.io/docs/user-guide/compute-resources/ ## We usually recommend not to specify default resources and to leave this as a conscious ## choice for the user. This also increases chances charts run on environments with little ## resources, such as Minikube. If you do want to specify resources, uncomment the following ## lines, adjust them as necessary, and remove the curly braces after 'resources:'. ## @param metrics.resources.limits The resources limits for the container ## @param metrics.resources.requests The requested resources for the container ## resources: ## Example: ## limits: ## cpu: 100m ## memory: 128Mi ## limits: {} ## Examples: ## requests: ## cpu: 100m ## memory: 128Mi ## requests: {} ## @param metrics.podAnnotations [object] Metrics exporter pod Annotation and Labels ## ref: https://kubernetes.io/docs/concepts/overview/working-with-objects/annotations/ ## podAnnotations: prometheus.io/scrape: "true" prometheus.io/port: "8080" ## Prometheus Operator ServiceMonitor configuration ## serviceMonitor: ## @param metrics.serviceMonitor.enabled If `true`, creates a Prometheus Operator ServiceMonitor (also requires `metrics.enabled` to be `true`) ## enabled: false ## @param metrics.serviceMonitor.namespace Namespace in which Prometheus is running ## namespace: monitoring ## @param metrics.serviceMonitor.interval Interval at which metrics should be scraped. ## ref: https://github.com/coreos/prometheus-operator/blob/master/Documentation/api.md#endpoint ## e.g: ## interval: 10s ## interval: "" ## @param metrics.serviceMonitor.scrapeTimeout Timeout after which the scrape is ended ## ref: https://github.com/coreos/prometheus-operator/blob/master/Documentation/api.md#endpoint ## e.g: ## scrapeTimeout: 10s ## scrapeTimeout: "" ## @param metrics.serviceMonitor.selector Prometheus instance selector labels ## ref: https://github.com/bitnami/charts/tree/master/bitnami/prometheus-operator#prometheus-configuration ## e.g: ## selector: ## prometheus: my-prometheus ## selector: {} ## @param metrics.serviceMonitor.metricRelabelings Specify Metric Relabelings to add to the scrape endpoint ## ref: https://github.com/coreos/prometheus-operator/blob/master/Documentation/api.md#relabelconfig ## metricRelabelings: [] ## @param metrics.serviceMonitor.honorLabels Specify honorLabels parameter to add the scrape endpoint ## honorLabels: false ## @param metrics.serviceMonitor.jobLabel The name of the label on the target service to use as the job name in prometheus. ## jobLabel: "" ## @param metrics.serviceMonitor.additionalLabels Used to pass Labels that are required by the installed Prometheus Operator ## ref: https://github.com/coreos/prometheus-operator/blob/master/Documentation/api.md#prometheusspec ## additionalLabels: {} ## Metrics container ports to open ## If hostNetwork true: the hostPort is set identical to the containerPort ## @param metrics.containerPorts.http HTTP Port on the Host and Container ## @param metrics.containerPorts.jmx JMX Port on the Host and Container ## containerPorts: http: 8080 jmx: 5555 ## @section TLS/SSL parameters ## ## TLS/SSL parameters ## @param tls.internodeEncryption Set internode encryption ## @param tls.clientEncryption Set client-server encryption ## @param tls.autoGenerated Generate automatically self-signed TLS certificates. Currently only supports PEM certificates ## @param tls.existingSecret Existing secret that contains Cassandra Keystore and truststore ## @param tls.passwordsSecret Secret containing the Keystore and Truststore passwords if needed ## @param tls.keystorePassword Password for the keystore, if needed. ## @param tls.truststorePassword Password for the truststore, if needed. ## @param tls.resources.limits The resources limits for the TLS init container ## @param tls.resources.requests The requested resources for the TLS init container ## @param tls.certificatesSecret Secret with the TLS certificates. ## @param tls.tlsEncryptionSecretName Secret with the encryption of the TLS certificates ## tls: internodeEncryption: none clientEncryption: false autoGenerated: false existingSecret: "" passwordsSecret: "" keystorePassword: "" truststorePassword: "" certificatesSecret: "" tlsEncryptionSecretName: "" ## We usually recommend not to specify default resources and to leave this as a conscious ## choice for the user. This also increases chances charts run on environments with little ## resources, such as Minikube. If you do want to specify resources, uncomment the following ## lines, adjust them as necessary, and remove the curly braces after 'resources:'. ## resources: ## Example: ## limits: ## cpu: 100m ## memory: 128Mi ## limits: {} ## Examples: ## requests: ## cpu: 100m ## memory: 128Mi ## requests: {}
38.941935
150
0.74841
050330fe44d9def8b0307fd66859e42240253d53
22,810
yaml
YAML
bitnami/node/values.yaml
00arthur00/charts
502aa1e64541669b732a4eda896e5937847b6c3c
[ "Apache-2.0" ]
null
null
null
bitnami/node/values.yaml
00arthur00/charts
502aa1e64541669b732a4eda896e5937847b6c3c
[ "Apache-2.0" ]
2
2022-01-26T01:14:30.000Z
2022-01-26T07:03:39.000Z
bitnami/node/values.yaml
00arthur00/charts
502aa1e64541669b732a4eda896e5937847b6c3c
[ "Apache-2.0" ]
null
null
null
## @section Global parameters ## Global Docker image parameters ## Please, note that this will override the image parameters, including dependencies, configured to use the global value ## Current available global Docker image parameters: imageRegistry, imagePullSecrets and storageClass ## @param global.imageRegistry Global Docker image registry ## @param global.imagePullSecrets Global Docker registry secret names as an array ## @param global.storageClass Global StorageClass for Persistent Volume(s) ## global: imageRegistry: "" ## E.g. ## imagePullSecrets: ## - myRegistryKeySecretName ## imagePullSecrets: [] storageClass: "" ## @section Common parameters ## @param kubeVersion Force target Kubernetes version (using Helm capabilities if not set) ## kubeVersion: "" ## @param nameOverride String to partially override node.fullname template (will maintain the release name) ## nameOverride: "" ## @param fullnameOverride String to fully override node.fullname template ## fullnameOverride: "" ## @param commonLabels Add labels to all the deployed resources ## commonLabels: {} ## @param commonAnnotations Add annotations to all the deployed resources ## commonAnnotations: {} ## @section Node parameters ## @param installCommand Override default container install command (useful when using custom images or repositories) ## installCommand: ['/bin/bash', '-ec', 'npm install'] ## @param command Override default container command (useful when using custom images) ## command: ['/bin/bash', '-ec', 'npm start'] ## @param args Override default container args (useful when using custom images) ## args: [] ## @param hostAliases Deployment pod host aliases ## https://kubernetes.io/docs/concepts/services-networking/add-entries-to-pod-etc-hosts-with-host-aliases/ ## hostAliases: [] ## @param extraEnvVars Extra environment variables to be set on Node container ## For example: ## - name: BEARER_AUTH ## value: true ## extraEnvVars: [] ## @param extraEnvVarsCM Name of existing ConfigMap containing extra environment variables ## extraEnvVarsCM: "" ## @param extraEnvVarsSecret Name of existing Secret containing extra environment variables ## extraEnvVarsSecret: "" ## MongoDB&reg; chart configuration ## ref: https://github.com/bitnami/charts/blob/master/bitnami/mongodb/values.yaml ## mongodb: ## @param mongodb.enabled Whether to install or not the MongoDB&reg; chart ## To use an external database set this to false and configure the externaldb parameters ## enabled: true ## MongoDB&reg; Authentication parameters ## auth: ## @param mongodb.auth.enabled Whether to enable auth or not for the MongoDB&reg; chart ## ref: https://docs.mongodb.com/manual/tutorial/enable-authentication/ ## enabled: true ## @param mongodb.auth.rootPassword MongoDB&reg; admin password ## ref: https://github.com/bitnami/bitnami-docker-mongodb/blob/master/README.md#setting-the-root-password-on-first-run ## rootPassword: "" ## @param mongodb.auth.username MongoDB&reg; custom user ## ref: https://github.com/bitnami/bitnami-docker-mongodb/blob/master/README.md#creating-a-user-and-database-on-first-run ## username: user ## @param mongodb.auth.database MongoDB&reg; custom database ## database: test_db ## @param mongodb.auth.password MongoDB&reg; custom password ## password: secret_password ## External Database Configuration ## Provision an external database ## You have two alternatives: ## 1) Pass an already existing Secret with your database credentials ## 2) Pass an already existing ServiceInstance name and specify the service catalog broker to automatically create a ServiceBinding for your application. ## externaldb: ## @param externaldb.enabled Enables or disables external database (ignored if `mongodb.enabled=true`) ## enabled: false ## @param externaldb.ssl Set to true if your external database has ssl enabled ## ssl: false ## @param externaldb.secretName Secret containing existing database credentials ## Please refer to the respective section in the README to know the details about this secret. ## secretName: "" ## @param externaldb.type Only if using Kubernetes Service Catalog you can specify the kind of broker used. Available options are osba|gce|aws ## type: osba ## @param externaldb.broker.serviceInstanceName If you provide the serviceInstanceName, the chart will create a ServiceBinding for that ServiceInstance ## broker: serviceInstanceName: "" ## @section Node deployment parameters ## Bitnami node image version ## ref: https://hub.docker.com/r/bitnami/node/tags/ ## @param image.registry NodeJS image registry ## @param image.repository NodeJS image repository ## @param image.tag NodeJS image tag (immutable tags are recommended) ## @param image.pullPolicy NodeJS image pull policy ## @param image.pullSecrets Specify docker-registry secret names as an array ## image: registry: docker.io repository: bitnami/node tag: 16.14.1-debian-10-r0 ## Specify a imagePullPolicy ## Defaults to 'Always' if image tag is 'latest', else set to 'IfNotPresent' ## ref: https://kubernetes.io/docs/user-guide/images/#pre-pulling-images ## pullPolicy: IfNotPresent ## Optionally specify an array of imagePullSecrets. ## Secrets must be manually created in the namespace. ## ref: https://kubernetes.io/docs/tasks/configure-pod-container/pull-image-private-registry/ ## Example: ## pullSecrets: ## - myRegistryKeySecretName ## pullSecrets: [] ## @param replicaCount Specify the number of replicas for the application ## replicaCount: 1 ## @param applicationPort Specify the port where your application will be running ## applicationPort: 3000 ## @param podAffinityPreset Pod affinity preset. Ignored if `affinity` is set. Allowed values: `soft` or `hard` ## ref: https://kubernetes.io/docs/concepts/scheduling-eviction/assign-pod-node/#inter-pod-affinity-and-anti-affinity ## podAffinityPreset: "" ## @param podAntiAffinityPreset Pod anti-affinity preset. Ignored if `affinity` is set. Allowed values: `soft` or `hard` ## Ref: https://kubernetes.io/docs/concepts/scheduling-eviction/assign-pod-node/#inter-pod-affinity-and-anti-affinity ## podAntiAffinityPreset: soft ## Node affinity preset ## Ref: https://kubernetes.io/docs/concepts/scheduling-eviction/assign-pod-node/#node-affinity ## nodeAffinityPreset: ## @param nodeAffinityPreset.type Node affinity preset type. Ignored if `affinity` is set. Allowed values: `soft` or `hard` ## type: "" ## @param nodeAffinityPreset.key Node label key to match Ignored if `affinity` is set. ## E.g. ## key: "kubernetes.io/e2e-az-name" ## key: "" ## @param nodeAffinityPreset.values Node label values to match. Ignored if `affinity` is set. ## E.g. ## values: ## - e2e-az1 ## - e2e-az2 ## values: [] ## @param affinity Affinity for pod assignment. Evaluated as a template. ## Ref: https://kubernetes.io/docs/concepts/configuration/assign-pod-node/#affinity-and-anti-affinity ## affinity: {} ## @param nodeSelector Node labels for pod assignment. Evaluated as a template. ## Ref: https://kubernetes.io/docs/user-guide/node-selection/ ## nodeSelector: {} ## @param tolerations Tolerations for pod assignment. Evaluated as a template. ## Ref: https://kubernetes.io/docs/concepts/configuration/taint-and-toleration/ ## tolerations: {} ## @param podAnnotations Additional pod annotations ## ref: https://kubernetes.io/docs/concepts/overview/working-with-objects/annotations/ ## podAnnotations: {} ## @param podLabels Additional labels for Node pods ## ref: https://kubernetes.io/docs/concepts/overview/working-with-objects/labels/ ## podLabels: {} ## @param extraDeploy Array of extra objects to deploy with the release (evaluated as a template) ## extraDeploy: [] ## Configure extra options for liveness probe ## ref: https://kubernetes.io/docs/tasks/configure-pod-container/configure-liveness-readiness-probes/#configure-probes ## @param livenessProbe.enabled Enable livenessProbe ## @param livenessProbe.path Request path for livenessProbe ## @param livenessProbe.initialDelaySeconds Initial delay seconds for livenessProbe ## @param livenessProbe.periodSeconds Period seconds for livenessProbe ## @param livenessProbe.timeoutSeconds Timeout seconds for livenessProbe ## @param livenessProbe.failureThreshold Failure threshold for livenessProbe ## @param livenessProbe.successThreshold Success threshold for livenessProbe ## livenessProbe: enabled: true path: '/' initialDelaySeconds: 60 periodSeconds: 10 timeoutSeconds: 5 failureThreshold: 6 successThreshold: 1 ## Configure extra options for readiness probe ## ref: https://kubernetes.io/docs/tasks/configure-pod-container/configure-liveness-readiness-probes/#configure-probes ## @param readinessProbe.enabled Enable readinessProbe ## @param readinessProbe.path Request path for readinessProbe ## @param readinessProbe.initialDelaySeconds Initial delay seconds for readinessProbe ## @param readinessProbe.periodSeconds Period seconds for readinessProbe ## @param readinessProbe.timeoutSeconds Timeout seconds for readinessProbe ## @param readinessProbe.failureThreshold Failure threshold for readinessProbe ## @param readinessProbe.successThreshold Success threshold for readinessProbe ## readinessProbe: enabled: true path: '/' initialDelaySeconds: 10 periodSeconds: 5 timeoutSeconds: 3 failureThreshold: 3 successThreshold: 1 ## @param customLivenessProbe Override default liveness probe ## customLivenessProbe: {} ## @param customReadinessProbe Override default readiness probe ## customReadinessProbe: {} ## @param priorityClassName Node priorityClassName ## ref: https://kubernetes.io/docs/concepts/configuration/pod-priority-preemption/ ## priorityClassName: "" ## @param lifecycleHooks lifecycleHooks for the Node container to automate configuration before or after startup. ## lifecycleHooks: {} ## @param sidecars Add sidecars to the Node pods ## Example: ## sidecars: ## - name: your-image-name ## image: your-image ## imagePullPolicy: Always ## ports: ## - name: portname ## containerPort: 1234 ## sidecars: [] ## @param initContainers Add init containers to the Node pods ## Example: ## initContainers: ## - name: your-image-name ## image: your-image ## imagePullPolicy: Always ## ports: ## - name: portname ## containerPort: 1234 ## initContainers: [] ## @param extraVolumes Extra volumes to add to the deployment ## extraVolumes: [] ## @param extraVolumeMounts Extra volume mounts to add to the container ## extraVolumeMounts: [] ## Pods Service Account ## ref: https://kubernetes.io/docs/tasks/configure-pod-container/configure-service-account/ ## serviceAccount: ## @param serviceAccount.create Enable creation of ServiceAccount for node pod ## create: false ## @param serviceAccount.name The name of the ServiceAccount to use. ## If not set and create is true, a name is generated using the `common.names.fullname` template name: "" ## @param serviceAccount.annotations Annotations for service account. Evaluated as a template. ## Only used if `create` is `true`. ## annotations: {} ## @param serviceAccount.automountServiceAccountToken Whether to auto mount the service account token ## ref: https://kubernetes.io/docs/tasks/configure-pod-container/configure-service-account/#use-the-default-service-account-to-access-the-api-server ## automountServiceAccountToken: false ## SecurityContext configuration ## ref: https://kubernetes.io/docs/tasks/configure-pod-container/security-context/ ## @param containerSecurityContext.enabled Node Container securityContext ## @param containerSecurityContext.runAsUser User ID for the Node container ## @param containerSecurityContext.runAsNonRoot Set container's Security Context runAsNonRoot ## containerSecurityContext: enabled: true runAsUser: 1001 runAsNonRoot: true ## @param podSecurityContext.enabled Enable security context for Node pods ## @param podSecurityContext.fsGroup Group ID for the volumes of the pod ## podSecurityContext: enabled: true fsGroup: 1001 ## Node conatiners' resource requests and limits ## ref: https://kubernetes.io/docs/user-guide/compute-resources/ ## We usually recommend not to specify default resources and to leave this as a conscious ## choice for the user. This also increases chances charts run on environments with little ## resources, such as Minikube. If you do want to specify resources, uncomment the following ## lines, adjust them as necessary, and remove the curly braces after 'resources:'. ## @param resources.limits The resources limits for the Node container ## @param resources.requests The requested resources for the Node container ## resources: ## Example: ## limits: ## cpu: 100m ## memory: 128Mi limits: {} ## Examples: ## requests: ## cpu: 100m ## memory: 128Mi requests: {} ## @section Node application parameters ## Bitnami Git image version ## ref: https://hub.docker.com/r/bitnami/git/tags/ ## git: ## Bitnami git image version ## ref: https://hub.docker.com/r/bitnami/git/tags/ ## @param git.image.registry Git image registry ## @param git.image.repository Git image repository ## @param git.image.tag Git image tag (immutable tags are recommended) ## @param git.image.pullPolicy Git image pull policy ## @param git.image.pullSecrets Specify docker-registry secret names as an array ## image: registry: docker.io repository: bitnami/git tag: 2.35.1-debian-10-r46 ## Specify a imagePullPolicy ## Defaults to 'Always' if image tag is 'latest', else set to 'IfNotPresent' ## ref: https://kubernetes.io/docs/user-guide/images/#pre-pulling-images ## pullPolicy: IfNotPresent ## Optionally specify an array of imagePullSecrets. ## Secrets must be manually created in the namespace. ## ref: https://kubernetes.io/docs/tasks/configure-pod-container/pull-image-private-registry/ ## Example: ## pullSecrets: ## - myRegistryKeySecretName ## pullSecrets: [] ## @param git.extraVolumeMounts Add extra volume mounts for the Git container ## Useful to mount keys to connect through ssh. (normally used with extraVolumes) ## E.g: ## extraVolumeMounts: ## - name: ssh-dir ## mountPath: /root/.ssh/ ## extraVolumeMounts: [] ## @param getAppFromExternalRepository Enable to download app from external git repository ## Disable it if your docker image already includes your application at /app ## getAppFromExternalRepository: true ## @param repository Git repository http/https url ## repository: https://github.com/bitnami/sample-mean.git ## @param revision Git repository revision to checkout ## revision: master ## @section Volume permissions parameters ## Init containers parameters: ## volumePermissions: Change the owner and group of the persistent volume mountpoint to runAsUser:fsGroup values from the securityContext section. ## volumePermissions: ## @param volumePermissions.enabled Enable init container that changes volume permissions in the data directory ## enabled: false ## @param volumePermissions.image.registry Init container volume-permissions image registry ## @param volumePermissions.image.repository Init container volume-permissions image repository ## @param volumePermissions.image.tag Init container volume-permissions image tag (immutable tags are recommended) ## @param volumePermissions.image.pullPolicy Init container volume-permissions image pull policy ## @param volumePermissions.image.pullSecrets Specify docker-registry secret names as an array ## image: registry: docker.io repository: bitnami/bitnami-shell tag: 10-debian-10-r366 pullPolicy: IfNotPresent ## Optionally specify an array of imagePullSecrets. ## Secrets must be manually created in the namespace. ## ref: https://kubernetes.io/docs/tasks/configure-pod-container/pull-image-private-registry/ ## Example: ## pullSecrets: ## - myRegistryKeySecretName ## pullSecrets: [] ## Init container' resource requests and limits ## ref: https://kubernetes.io/docs/user-guide/compute-resources/ ## We usually recommend not to specify default resources and to leave this as a conscious ## choice for the user. This also increases chances charts run on environments with little ## resources, such as Minikube. If you do want to specify resources, uncomment the following ## lines, adjust them as necessary, and remove the curly braces after 'resources:'. ## @param volumePermissions.resources.limits The resources limits for the container ## @param volumePermissions.resources.requests The requested resources for the container ## resources: ## Example: ## limits: ## cpu: 100m ## memory: 128Mi limits: {} ## Examples: ## requests: ## cpu: 100m ## memory: 128Mi requests: {} ## @section Persistence parameters ## Enable persistence using Persistent Volume Claims ## ref: https://kubernetes.io/docs/user-guide/persistent-volumes/ ## persistence: ## @param persistence.enabled Enable persistence using PVC ## enabled: false ## @param persistence.path Path to persisted directory ## path: /app/data ## @param persistence.storageClass Persistent Volume Storage Class ## If defined, storageClassName: <storageClass> ## If set to "-", storageClassName: "", which disables dynamic provisioning ## If undefined (the default) or set to null, no storageClassName spec is ## set, choosing the default provisioner. (gp2 on AWS, standard on ## GKE, AWS & OpenStack) ## storageClass: "" ## @param persistence.accessMode PVC Access Mode ## accessMode: ReadWriteOnce ## @param persistence.size PVC Storage Request ## size: 1Gi ## @section Traffic exposure parameters ## Service parameters ## service: ## @param service.type Kubernetes Service type ## type: ClusterIP ## @param service.port Kubernetes Service port ## port: 80 ## @param service.clusterIP Service Cluster IP ## clusterIP: "" ## @param service.sessionAffinity Control where client requests go, to the same pod or round-robin ## Values: ClientIP or None ## ref: https://kubernetes.io/docs/user-guide/services/ ## sessionAffinity: 'None' ## @param service.nodePort NodePort if Service type is `LoadBalancer` or `NodePort` ## ref: https://kubernetes.io/docs/concepts/services-networking/service/#type-nodeport ## nodePort: "" ## @param service.loadBalancerIP LoadBalancer IP if Service type is `LoadBalancer` ## Set the LoadBalancer service type to internal only. ## ref: https://kubernetes.io/docs/concepts/services-networking/service/#internal-load-balancer ## loadBalancerIP: "" ## @param service.loadBalancerSourceRanges In order to limit which client IP's can access the Network Load Balancer, specify loadBalancerSourceRanges ## ref: https://kubernetes.io/docs/concepts/services-networking/service/#aws-nlb-support ## loadBalancerSourceRanges: [] ## @param service.annotations Annotations for the Service ## This can be used to set the LoadBalancer service type to internal only. ## ref: https://kubernetes.io/docs/concepts/services-networking/service/#internal-load-balancer ## annotations: {} ## Configure the ingress resource that allows you to access the ## Node.js installation. Set up the URL ## ref: https://kubernetes.io/docs/user-guide/ingress/ ## ingress: ## @param ingress.enabled Set to true to enable ingress record generation ## enabled: false ## DEPRECATED: Use ingress.annotations instead of ingress.certManager ## certManager: false ## ## @param ingress.pathType Ingress path type ## pathType: ImplementationSpecific ## @param ingress.apiVersion Override API Version (automatically detected if not set) ## apiVersion: "" ## @param ingress.hostname When the ingress is enabled, a host pointing to this will be created ## hostname: node.local ## @param ingress.path The Path to Node.js. You may need to set this to '/*' in order to use this with ALB ingress controllers. ## path: / ## @param ingress.annotations Additional annotations for the Ingress resource. To enable certificate autogeneration, place here your cert-manager annotations. ## For a full list of possible ingress annotations, please see ## ref: https://github.com/kubernetes/ingress-nginx/blob/master/docs/user-guide/nginx-configuration/annotations.md ## Use this parameter to set the required annotations for cert-manager, see ## ref: https://cert-manager.io/docs/usage/ingress/#supported-annotations ## ## e.g: ## annotations: ## kubernetes.io/ingress.class: nginx ## cert-manager.io/cluster-issuer: cluster-issuer-name ## annotations: {} ## @param ingress.tls Enable TLS configuration for the hostname defined at ingress.hostname parameter ## TLS certificates will be retrieved from a TLS secret with name: {{- printf "%s-tls" .Values.ingress.hostname }} ## You can use the ingress.secrets parameter to create this TLS secret or relay on cert-manager to create it ## tls: false ## @param ingress.extraHosts The list of additional hostnames to be covered with this ingress record. ## Most likely the hostname above will be enough, but in the event more hosts are needed, this is an array ## extraHosts: ## - name: node.local ## path: / ## extraHosts: [] ## @param ingress.extraPaths Any additional arbitrary paths that may need to be added to the ingress under the main host. ## For example: The ALB ingress controller requires a special rule for handling SSL redirection. ## extraPaths: ## - path: /* ## backend: ## serviceName: ssl-redirect ## servicePort: use-annotation ## extraPaths: [] ## @param ingress.extraTls The tls configuration for additional hostnames to be covered with this ingress record. ## see: https://kubernetes.io/docs/concepts/services-networking/ingress/#tls ## extraTls: ## - hosts: ## - node.local ## secretName: node.local-tls ## extraTls: [] ## @param ingress.secrets If you're providing your own certificates, please use this to add the certificates as secrets ## key and certificate should start with -----BEGIN CERTIFICATE----- or ## -----BEGIN RSA PRIVATE KEY----- ## ## name should line up with a tlsSecret set further up ## If you're using cert-manager, this is unneeded, as it will create the secret for you if it is not set ## ## It is also possible to create and manage the certificates outside of this helm chart ## Please see README.md for more information ## e.g: ## - name: node.local-tls ## key: ## certificate: ## secrets: []
39.600694
160
0.741166
af8c26c08c49469ce407055935f5e67a96c1ee2c
23,854
yaml
YAML
bitnami/oauth2-proxy/values.yaml
00arthur00/charts
502aa1e64541669b732a4eda896e5937847b6c3c
[ "Apache-2.0" ]
null
null
null
bitnami/oauth2-proxy/values.yaml
00arthur00/charts
502aa1e64541669b732a4eda896e5937847b6c3c
[ "Apache-2.0" ]
2
2022-01-26T01:14:30.000Z
2022-01-26T07:03:39.000Z
bitnami/oauth2-proxy/values.yaml
00arthur00/charts
502aa1e64541669b732a4eda896e5937847b6c3c
[ "Apache-2.0" ]
null
null
null
## @section Global parameters ## Global Docker image parameters ## Please, note that this will override the image parameters, including dependencies, configured to use the global value ## Current available global Docker image parameters: imageRegistry, imagePullSecrets and storageClass ## ## @param global.imageRegistry Global Docker image registry ## @param global.imagePullSecrets Global Docker registry secret names as an array ## @param global.storageClass Global StorageClass for Persistent Volume(s) ## global: imageRegistry: "" ## E.g. ## imagePullSecrets: ## - myRegistryKeySecretName ## imagePullSecrets: [] storageClass: "" ## @section Common parameters ## ## @param kubeVersion Override Kubernetes version ## kubeVersion: "" ## @param nameOverride String to partially override common.names.fullname ## nameOverride: "" ## @param fullnameOverride String to fully override common.names.fullname ## fullnameOverride: "" ## @param commonLabels Labels to add to all deployed objects ## commonLabels: {} ## @param commonAnnotations Annotations to add to all deployed objects ## commonAnnotations: {} ## @param clusterDomain Kubernetes cluster domain name ## clusterDomain: cluster.local ## @param extraDeploy Array of extra objects to deploy with the release ## extraDeploy: [] ## Enable diagnostic mode in the deployment ## diagnosticMode: ## @param diagnosticMode.enabled Enable diagnostic mode (all probes will be disabled and the command will be overridden) ## enabled: false ## @param diagnosticMode.command Command to override all containers in the deployment ## command: - sleep ## @param diagnosticMode.args Args to override all containers in the deployment ## args: - infinity ## @section Traffic Exposure Parameters ## ## OAuth2 Proxy service parameters ## service: ## @param service.type OAuth2 Proxy service type ## type: ClusterIP ## @param service.port OAuth2 Proxy service HTTP port ## port: 80 ## Node ports to expose ## @param service.nodePorts.http Node port for HTTP ## NOTE: choose port between <30000-32767> ## nodePorts: http: "" ## @param service.clusterIP OAuth2 Proxy service Cluster IP ## e.g.: ## clusterIP: None ## clusterIP: "" ## @param service.loadBalancerIP OAuth2 Proxy service Load Balancer IP ## ref: https://kubernetes.io/docs/concepts/services-networking/service/#type-loadbalancer ## loadBalancerIP: "" ## @param service.loadBalancerSourceRanges OAuth2 Proxy service Load Balancer sources ## ref: https://kubernetes.io/docs/tasks/access-application-cluster/configure-cloud-provider-firewall/#restrict-access-for-loadbalancer-service ## e.g: ## loadBalancerSourceRanges: ## - 10.10.10.0/24 ## loadBalancerSourceRanges: [] ## @param service.externalTrafficPolicy OAuth2 Proxy service external traffic policy ## ref https://kubernetes.io/docs/tasks/access-application-cluster/create-external-load-balancer/#preserving-the-client-source-ip ## externalTrafficPolicy: Cluster ## @param service.extraPorts Extra ports to expose (normally used with the `sidecar` value) ## extraPorts: [] ## @param service.annotations Additional custom annotations for OAuth2 Proxy service ## annotations: {} ## @param service.sessionAffinity Session Affinity for Kubernetes service, can be "None" or "ClientIP" ## If "ClientIP", consecutive client requests will be directed to the same Pod ## ref: https://kubernetes.io/docs/concepts/services-networking/service/#virtual-ips-and-service-proxies ## sessionAffinity: None ## @param service.sessionAffinityConfig Additional settings for the sessionAffinity ## sessionAffinityConfig: ## clientIP: ## timeoutSeconds: 300 ## sessionAffinityConfig: {} ## Configure the ingress resource that allows you to access the OAuth2 Proxy installation ## ref: https://kubernetes.io/docs/concepts/services-networking/ingress/ ## ingress: ## @param ingress.enabled Enable ingress record generation for OAuth2 Proxy ## enabled: false ## DEPRECATED: Use ingress.annotations instead of ingress.certManager ## certManager: false ## ## @param ingress.pathType Ingress path type ## pathType: ImplementationSpecific ## @param ingress.apiVersion Force Ingress API version (automatically detected if not set) ## apiVersion: "" ## @param ingress.ingressClassName IngressClass that will be be used to implement the Ingress (Kubernetes 1.18+) ## This is supported in Kubernetes 1.18+ and required if you have more than one IngressClass marked as the default for your cluster . ## ref: https://kubernetes.io/blog/2020/04/02/improvements-to-the-ingress-api-in-kubernetes-1.18/ ## ingressClassName: "" ## @param ingress.hostname Default host for the ingress record ## hostname: oaut2-proxy.local ## @param ingress.path Default path for the ingress record ## NOTE: You may need to set this to '/*' in order to use this with ALB ingress controllers ## path: / ## @param ingress.annotations Additional annotations for the Ingress resource. To enable certificate autogeneration, place here your cert-manager annotations. ## For a full list of possible ingress annotations, please see ## ref: https://github.com/kubernetes/ingress-nginx/blob/master/docs/user-guide/nginx-configuration/annotations.md ## Use this parameter to set the required annotations for cert-manager, see ## ref: https://cert-manager.io/docs/usage/ingress/#supported-annotations ## ## e.g: ## annotations: ## kubernetes.io/ingress.class: nginx ## cert-manager.io/cluster-issuer: cluster-issuer-name ## annotations: {} ## @param ingress.tls Enable TLS configuration for the host defined at `ingress.hostname` parameter ## TLS certificates will be retrieved from a TLS secret with name: `{{- printf "%s-tls" .Values.ingress.hostname }}` ## You can: ## - Relay on cert-manager to create it by setting the corresponding annotations ## - Relay on Helm to create self-signed certificates by setting `ingress.tls=true` and `ingress.certManager=false` ## tls: false ## @param ingress.extraHosts An array with additional hostname(s) to be covered with the ingress record ## e.g: ## extraHosts: ## - name: oaut2-proxy.local ## path: / ## extraHosts: [] ## @param ingress.extraPaths An array with additional arbitrary paths that may need to be added to the ingress under the main host ## e.g: ## extraPaths: ## - path: /* ## backend: ## serviceName: ssl-redirect ## servicePort: use-annotation ## extraPaths: [] ## @param ingress.extraTls TLS configuration for additional hostname(s) to be covered with this ingress record ## ref: https://kubernetes.io/docs/concepts/services-networking/ingress/#tls ## e.g: ## extraTls: ## - hosts: ## - oaut2-proxy.local ## secretName: oaut2-proxy.local-tls ## extraTls: [] ## @param ingress.certManager Add the corresponding annotations for cert-manager integration ## certManager: false ## @param ingress.selfSigned Create a TLS secret for this ingress record using self-signed certificates generated by Helm ## selfSigned: false ## @param ingress.secrets Custom TLS certificates as secrets ## NOTE: 'key' and 'certificate' are expected in PEM format ## NOTE: 'name' should line up with a 'secretName' set further up ## If it is not set and you're using cert-manager, this is unneeded, as it will create a secret for you with valid certificates ## If it is not set and you're NOT using cert-manager either, self-signed certificates will be created valid for 365 days ## It is also possible to create and manage the certificates outside of this helm chart ## Please see README.md for more information ## e.g: ## secrets: ## - name: %%COMPONENT_NAME%%.local-tls ## key: |- ## -----BEGIN RSA PRIVATE KEY----- ## ... ## -----END RSA PRIVATE KEY----- ## certificate: |- ## -----BEGIN CERTIFICATE----- ## ... ## -----END CERTIFICATE----- ## secrets: [] ## @section OAuth2 Proxy Image parameters ## ## Bitnami OAuth2 Proxy image ## ref: https://hub.docker.com/r/bitnami/redis/tags/ ## @param image.registry OAuth2 Proxy image registry ## @param image.repository OAuth2 Proxy image repository ## @param image.tag OAuth2 Proxy image tag (immutable tags are recommended) ## @param image.pullPolicy OAuth2 Proxy image pull policy ## @param image.pullSecrets OAuth2 Proxy image pull secrets ## image: registry: docker.io repository: bitnami/oauth2-proxy tag: 7.2.1-debian-10-r82 ## Specify a imagePullPolicy ## Defaults to 'Always' if image tag is 'latest', else set to 'IfNotPresent' ## ref: https://kubernetes.io/docs/user-guide/images/#pre-pulling-images ## pullPolicy: IfNotPresent ## Optionally specify an array of imagePullSecrets ## Secrets must be manually created in the namespace ## ref: https://kubernetes.io/docs/tasks/configure-pod-container/pull-image-private-registry/ ## e.g: ## pullSecrets: ## - myRegistryKeySecretName ## pullSecrets: [] ## @section OAuth2 Proxy configuration parameters ## ## Configuration section ## configuration: ## @param configuration.clientID OAuth client ID ## clientID: "XXXXXXX" ## @param configuration.clientSecret OAuth client secret ## clientSecret: "XXXXXXXX" ## Create a new secret with the following command openssl rand -base64 32 | head -c 32 | base64 ## Use an existing secret for OAuth2 credentials (see secret.yaml for required fields) ## ## @param configuration.cookieSecret OAuth cookie secret ## cookieSecret: "XXXXXXXXXXXXXXXX" ## @param configuration.existingSecret Secret with the client ID, secret and cookie secret ## existingSecret: "" ## e.g: ## google: ## adminEmail: xxxx ## serviceAccountJson: xxxx ## existingSecret: google-secret ## Alternatively, use an existing secret (see secret-google.yaml for required fields) ## ## @param configuration.google.enabled Enable Google service account ## @param configuration.google.adminEmail Google admin email ## @param configuration.google.googleGroup Restrict logins to members of this google group ## @param configuration.google.serviceAccountJson Google Service account JSON ## @param configuration.google.existingSecret Existing secret containing Google Service Account ## google: enabled: false adminEmail: "" googleGroup: "" serviceAccountJson: "" existingSecret: "" ## Custom configuration file: oauth2_proxy.cfg ## content: | ## pass_basic_auth = false ## pass_access_token = true ## ## @param configuration.content [string] Default configuration ## content: | email_domains = [ "*" ] upstreams = [ "file:///dev/null" ] ## @param configuration.existingConfigmap Configmap with the OAuth2 Proxy configuration ## existingConfigmap: "" ## Authorize individual email addresses ## @param configuration.authenticatedEmailsFile.enabled Enable authenticated emails file ## @param configuration.authenticatedEmailsFile.content Restricted access list (one email per line) ## @param configuration.authenticatedEmailsFile.existingSecret Secret with the authenticated emails file ## authenticatedEmailsFile: enabled: false ## One email per line ## e.g: ## content: |- ## name1@domain ## name2@domain ## If you override the config with restricted_access it will configure a user list within this chart what takes care of the configmap ## content: "" existingSecret: "" ## Additionally authenticate against a htpasswd file. Entries must be created with "htpasswd -s" for SHA encryption ## @param configuration.htpasswdFile.enabled Enable htpasswd file ## @param configuration.htpasswdFile.existingSecret Existing secret for htpasswd file ## @param configuration.htpasswdFile.content htpasswd file entries (one row per user) ## htpasswdFile: enabled: false ## Alternatively supply an existing secret which contains the required information ## existingSecret: "" ## One row for each user ## e.g: ## entries: | ## testuser:{SHA}EWhzdhgoYJWy0z2gyzhRYlN9DSiv ## content: "" ## @section OAuth2 Proxy deployment parameters ## ## @param containerPort OAuth2 Proxy port number ## containerPort: 4180 ## @param replicaCount Number of OAuth2 Proxy replicas to deploy ## replicaCount: 1 ## @param extraArgs add extra args to the default command ## extraArgs: [] ## Configure extra options for OAuth2 Proxy containers' startup, liveness and readiness probes ## ref: https://kubernetes.io/docs/tasks/configure-pod-container/configure-liveness-readiness-probes/#configure-probes ## @param startupProbe.enabled Enable startupProbe on OAuth2 Proxy nodes ## @param startupProbe.initialDelaySeconds Initial delay seconds for startupProbe ## @param startupProbe.periodSeconds Period seconds for startupProbe ## @param startupProbe.timeoutSeconds Timeout seconds for startupProbe ## @param startupProbe.failureThreshold Failure threshold for startupProbe ## @param startupProbe.successThreshold Success threshold for startupProbe ## startupProbe: enabled: false initialDelaySeconds: 0 periodSeconds: 10 timeoutSeconds: 1 failureThreshold: 5 successThreshold: 1 ## @param livenessProbe.enabled Enable livenessProbe on OAuth2 Proxy nodes ## @param livenessProbe.initialDelaySeconds Initial delay seconds for livenessProbe ## @param livenessProbe.periodSeconds Period seconds for livenessProbe ## @param livenessProbe.timeoutSeconds Timeout seconds for livenessProbe ## @param livenessProbe.failureThreshold Failure threshold for livenessProbe ## @param livenessProbe.successThreshold Success threshold for livenessProbe ## livenessProbe: enabled: true initialDelaySeconds: 0 periodSeconds: 10 timeoutSeconds: 1 failureThreshold: 5 successThreshold: 1 ## @param readinessProbe.enabled Enable readinessProbe on OAuth2 Proxy nodes ## @param readinessProbe.initialDelaySeconds Initial delay seconds for readinessProbe ## @param readinessProbe.periodSeconds Period seconds for readinessProbe ## @param readinessProbe.timeoutSeconds Timeout seconds for readinessProbe ## @param readinessProbe.failureThreshold Failure threshold for readinessProbe ## @param readinessProbe.successThreshold Success threshold for readinessProbe ## readinessProbe: enabled: true initialDelaySeconds: 0 periodSeconds: 10 timeoutSeconds: 1 failureThreshold: 5 successThreshold: 1 ## @param customStartupProbe Custom startupProbe that overrides the default one ## customStartupProbe: {} ## @param customLivenessProbe Custom livenessProbe that overrides the default one ## customLivenessProbe: {} ## @param customReadinessProbe Custom readinessProbe that overrides the default one ## customReadinessProbe: {} ## OAuth2 Proxy resource requests and limits ## ref: https://kubernetes.io/docs/user-guide/compute-resources/ ## @param resources.limits The resources limits for the OAuth2 Proxy containers ## @param resources.requests The requested resources for the OAuth2 Proxy containers ## resources: limits: {} requests: {} ## Limits the number of pods of the replicated application that are down simultaneously from voluntary disruptions ## ref: https://kubernetes.io/docs/concepts/workloads/pods/disruptions ## e.g: ## podDisruptionBudget: ## minAvailable: 1 ## maxUnavailable: 1 ## @param pdb.create Enable a Pod Disruption Budget creation ## @param pdb.minAvailable Minimum number/percentage of pods that should remain scheduled ## @param pdb.maxUnavailable Maximum number/percentage of pods that may be made unavailable ## pdb: create: false minAvailable: 1 maxUnavailable: 1 ## Configure Pods Security Context ## ref: https://kubernetes.io/docs/tasks/configure-pod-container/security-context/#set-the-security-context-for-a-pod ## @param podSecurityContext.enabled Enabled OAuth2 Proxy pods' Security Context ## @param podSecurityContext.fsGroup Set OAuth2 Proxy pod's Security Context fsGroup ## podSecurityContext: enabled: true fsGroup: 1001 ## Configure Container Security Context ## ref: https://kubernetes.io/docs/tasks/configure-pod-container/security-context/#set-the-security-context-for-a-pod ## @param containerSecurityContext.enabled Enabled OAuth2 Proxy containers' Security Context ## @param containerSecurityContext.runAsUser Set OAuth2 Proxy containers' Security Context runAsUser ## containerSecurityContext: enabled: true runAsUser: 1001 ## @param command Override default container command (useful when using custom images) ## command: [] ## @param args Override default container args (useful when using custom images) ## args: [] ## @param hostAliases OAuth2 Proxy pods host aliases ## ref: https://kubernetes.io/docs/concepts/services-networking/add-entries-to-pod-etc-hosts-with-host-aliases/ ## hostAliases: [] ## @param podLabels Extra labels for OAuth2 Proxy pods ## ref: https://kubernetes.io/docs/concepts/overview/working-with-objects/labels/ ## podLabels: {} ## @param podAnnotations Annotations for OAuth2 Proxy pods ## ref: https://kubernetes.io/docs/concepts/overview/working-with-objects/annotations/ ## podAnnotations: {} ## @param podAffinityPreset Pod affinity preset. Ignored if `affinity` is set. Allowed values: `soft` or `hard` ## ref: https://kubernetes.io/docs/concepts/scheduling-eviction/assign-pod-node/#inter-pod-affinity-and-anti-affinity ## podAffinityPreset: "" ## @param podAntiAffinityPreset Pod anti-affinity preset. Ignored if `affinity` is set. Allowed values: `soft` or `hard` ## ref: https://kubernetes.io/docs/concepts/scheduling-eviction/assign-pod-node/#inter-pod-affinity-and-anti-affinity ## podAntiAffinityPreset: soft ## Node affinity preset ## ref: https://kubernetes.io/docs/concepts/scheduling-eviction/assign-pod-node/#node-affinity ## nodeAffinityPreset: ## @param nodeAffinityPreset.type Node affinity preset type. Ignored if `affinity` is set. Allowed values: `soft` or `hard` ## type: "" ## @param nodeAffinityPreset.key Node label key to match. Ignored if `affinity` is set ## key: "" ## @param nodeAffinityPreset.values Node label values to match. Ignored if `affinity` is set ## E.g. ## values: ## - e2e-az1 ## - e2e-az2 ## values: [] ## @param affinity Affinity for OAuth2 Proxy pods assignment ## ref: https://kubernetes.io/docs/concepts/configuration/assign-pod-node/#affinity-and-anti-affinity ## NOTE: `podAffinityPreset`, `podAntiAffinityPreset`, and `nodeAffinityPreset` will be ignored when it's set ## affinity: {} ## @param nodeSelector Node labels for OAuth2 Proxy pods assignment ## ref: https://kubernetes.io/docs/user-guide/node-selection/ ## nodeSelector: {} ## @param tolerations Tolerations for OAuth2 Proxy pods assignment ## ref: https://kubernetes.io/docs/concepts/configuration/taint-and-toleration/ ## tolerations: [] ## @param updateStrategy.type OAuth2 Proxy statefulset strategy type ## ref: https://kubernetes.io/docs/concepts/workloads/controllers/statefulset/#update-strategies ## updateStrategy: ## StrategyType ## Can be set to RollingUpdate or OnDelete ## type: RollingUpdate ## @param priorityClassName OAuth2 Proxy pods' priorityClassName ## priorityClassName: "" ## @param schedulerName Name of the k8s scheduler (other than default) ## ref: https://kubernetes.io/docs/tasks/administer-cluster/configure-multiple-schedulers/ ## schedulerName: "" ## @param topologySpreadConstraints Topology Spread Constraints for pod assignment ## https://kubernetes.io/docs/concepts/workloads/pods/pod-topology-spread-constraints/ ## The value is evaluated as a template ## topologySpreadConstraints: [] ## @param lifecycleHooks for the OAuth2 Proxy container(s) to automate configuration before or after startup ## lifecycleHooks: {} ## @param extraEnvVars Array with extra environment variables to add to OAuth2 Proxy nodes ## e.g: ## extraEnvVars: ## - name: FOO ## value: "bar" ## extraEnvVars: [] ## @param extraEnvVarsCM Name of existing ConfigMap containing extra env vars for OAuth2 Proxy nodes ## extraEnvVarsCM: "" ## @param extraEnvVarsSecret Name of existing Secret containing extra env vars for OAuth2 Proxy nodes ## extraEnvVarsSecret: "" ## @param extraVolumes Optionally specify extra list of additional volumes for the OAuth2 Proxy pod(s) ## extraVolumes: [] ## @param extraVolumeMounts Optionally specify extra list of additional volumeMounts for the OAuth2 Proxy container(s) ## extraVolumeMounts: [] ## @param sidecars Add additional sidecar containers to the OAuth2 Proxy pod(s) ## e.g: ## sidecars: ## - name: your-image-name ## image: your-image ## imagePullPolicy: Always ## ports: ## - name: portname ## containerPort: 1234 ## sidecars: [] ## @param initContainers Add additional init containers to the OAuth2 Proxy pod(s) ## ref: https://kubernetes.io/docs/concepts/workloads/pods/init-containers/ ## e.g: ## initContainers: ## - name: your-image-name ## image: your-image ## imagePullPolicy: Always ## command: ['sh', '-c', 'echo "hello world"'] ## initContainers: [] ## ServiceAccount configuration ## serviceAccount: ## @param serviceAccount.create Specifies whether a ServiceAccount should be created ## create: true ## @param serviceAccount.name The name of the ServiceAccount to use ## If not set and create is true, a name is generated using the common.names.fullname template ## name: "" ## @param serviceAccount.automountServiceAccountToken Automount service account token for the server service account ## automountServiceAccountToken: true ## @param serviceAccount.annotations Annotations for service account. Evaluated as a template. Only used if `create` is `true`. ## annotations: {} ## @section External Redis&trade; parameters ## externalRedis: ## @param externalRedis.host External Redis&trade; server host ## host: "" ## @param externalRedis.password External Redis&trade; user password ## password: "" ## @param externalRedis.port External Redis&trade; server port ## port: 6379 ## @param externalRedis.existingSecret The name of an existing secret with Redis&trade; credentials ## NOTE: Must contain key `redis-password` ## NOTE: When it's set, the `externalRedis.password` parameter is ignored ## existingSecret: "" ## @section Redis&trade; sub-chart parameters ## redis: ## @param redis.enabled Deploy Redis&trade; sub-chart ## enabled: true ## @param redis.architecture Redis&trade; architecture ## architecture: "standalone" master: ## @param redis.master.service.port Redis&trade; (without Sentinel) service port ## service: port: 6379 replica: ## @param redis.replica.replicaCount Number of Redis&trade; replicas ## replicaCount: 3 auth: ## @param redis.auth.enabled Enable Redis&trade; authentication ## enabled: true ## @param redis.auth.existingSecret Secret with Redis&trade; credentials ## existingSecret: "" ## @param redis.auth.existingSecretPasswordKey Key inside the existing secret with Redis&trade; credentials ## existingSecretPasswordKey: "" ## @param redis.auth.sentinel Enable authentication in the Sentinel nodes ## sentinel: true sentinel: ## @param redis.sentinel.enabled Enable Redis&trade; sentinel in the deployment ## enabled: false ## @param redis.sentinel.masterSet Name of the Redis&trade; Sentinel master set ## masterSet: mymaster service: ## @param redis.sentinel.service.port Redis&trade; (with Sentinel) service port ## port: 6379 ## @param redis.sentinel.service.sentinelPort Redis&trade; (with Sentinel) sentinel service port ## sentinelPort: 26379
37.271875
160
0.739121
afa4a89f208c8437a0d2156cf16f87e6910e15bd
1,084
yaml
YAML
bitnami/wordpress/Chart.yaml
00arthur00/charts
502aa1e64541669b732a4eda896e5937847b6c3c
[ "Apache-2.0" ]
null
null
null
bitnami/wordpress/Chart.yaml
00arthur00/charts
502aa1e64541669b732a4eda896e5937847b6c3c
[ "Apache-2.0" ]
2
2022-01-26T01:14:30.000Z
2022-01-26T07:03:39.000Z
bitnami/wordpress/Chart.yaml
00arthur00/charts
502aa1e64541669b732a4eda896e5937847b6c3c
[ "Apache-2.0" ]
null
null
null
annotations: category: CMS apiVersion: v2 appVersion: 5.9.2 dependencies: - condition: memcached.enabled name: memcached repository: https://charts.bitnami.com/bitnami version: 6.x.x - condition: mariadb.enabled name: mariadb repository: https://charts.bitnami.com/bitnami version: 10.x.x - name: common repository: https://charts.bitnami.com/bitnami tags: - bitnami-common version: 1.x.x description: WordPress is the world's most popular blogging and content management platform. Powerful yet simple, everyone from students to global corporations use it to build beautiful, functional websites. engine: gotpl home: https://github.com/bitnami/charts/tree/master/bitnami/wordpress icon: https://bitnami.com/assets/stacks/wordpress/img/wordpress-stack-220x234.png keywords: - application - blog - cms - http - php - web - wordpress maintainers: - email: [email protected] name: Bitnami name: wordpress sources: - https://github.com/bitnami/bitnami-docker-wordpress - https://wordpress.org/ version: 13.1.1
27.794872
207
0.733395
afc228423872b72488008c31ced49665e191e8f3
42,258
yaml
YAML
bitnami/minio/values.yaml
00arthur00/charts
502aa1e64541669b732a4eda896e5937847b6c3c
[ "Apache-2.0" ]
null
null
null
bitnami/minio/values.yaml
00arthur00/charts
502aa1e64541669b732a4eda896e5937847b6c3c
[ "Apache-2.0" ]
null
null
null
bitnami/minio/values.yaml
00arthur00/charts
502aa1e64541669b732a4eda896e5937847b6c3c
[ "Apache-2.0" ]
null
null
null
## @section Global parameters ## Global Docker image parameters ## Please, note that this will override the image parameters, including dependencies, configured to use the global value ## Current available global Docker image parameters: imageRegistry, imagePullSecrets and storageClass ## @param global.imageRegistry Global Docker image registry ## @param global.imagePullSecrets Global Docker registry secret names as an array ## @param global.storageClass Global StorageClass for Persistent Volume(s) ## global: imageRegistry: "" ## e.g. ## imagePullSecrets: ## - myRegistryKeySecretName ## imagePullSecrets: [] storageClass: "" ## @section Common parameters ## @param nameOverride String to partially override common.names.fullname template (will maintain the release name) ## nameOverride: "" ## @param fullnameOverride String to fully override common.names.fullname template ## fullnameOverride: "" ## @param commonLabels Labels to add to all deployed objects ## commonLabels: {} ## @param commonAnnotations Annotations to add to all deployed objects ## commonAnnotations: {} ## @param kubeVersion Force target Kubernetes version (using Helm capabilities if not set) ## kubeVersion: "" ## @param clusterDomain Default Kubernetes cluster domain ## clusterDomain: cluster.local ## @param extraDeploy Array of extra objects to deploy with the release ## extraDeploy: [] ## @section MinIO&reg; parameters ## Bitnami MinIO&reg; image version ## ref: https://hub.docker.com/r/bitnami/minio/tags/ ## @param image.registry MinIO&reg; image registry ## @param image.repository MinIO&reg; image repository ## @param image.tag MinIO&reg; image tag (immutable tags are recommended) ## @param image.pullPolicy Image pull policy ## @param image.pullSecrets Specify docker-registry secret names as an array ## @param image.debug Specify if debug logs should be enabled ## image: registry: docker.io repository: bitnami/minio tag: 2022.3.14-debian-10-r0 ## Specify a imagePullPolicy ## Defaults to 'Always' if image tag is 'latest', else set to 'IfNotPresent' ## ref: https://kubernetes.io/docs/user-guide/images/#pre-pulling-images ## pullPolicy: IfNotPresent ## Optionally specify an array of imagePullSecrets. ## Secrets must be manually created in the namespace. ## ref: https://kubernetes.io/docs/tasks/configure-pod-container/pull-image-private-registry/ ## e.g: ## pullSecrets: ## - myRegistryKeySecretName ## pullSecrets: [] ## Set to true if you would like to see extra information on logs ## debug: false ## Bitnami MinIO&reg; Client image version ## ref: https://hub.docker.com/r/bitnami/minio-client/tags/ ## @param clientImage.registry MinIO&reg; Client image registry ## @param clientImage.repository MinIO&reg; Client image repository ## @param clientImage.tag MinIO&reg; Client image tag (immutable tags are recommended) ## clientImage: registry: docker.io repository: bitnami/minio-client tag: 2022.3.13-debian-10-r1 ## @param mode MinIO&reg; server mode (`standalone` or `distributed`) ## ref: https://docs.minio.io/docs/distributed-minio-quickstart-guide ## mode: standalone ## MinIO&reg; authentication parameters ## auth: ## @param auth.rootUser MinIO&reg; root username ## rootUser: admin ## @param auth.rootPassword Password for MinIO&reg; root user ## rootPassword: "" ## @param auth.existingSecret Use existing secret for credentials details (`auth.rootUser` and `auth.rootPassword` will be ignored and picked up from this secret). The secret has to contain the keys `root-user` and `root-password`) ## existingSecret: "" ## @param auth.forcePassword Force users to specify required passwords ## forcePassword: false ## @param auth.useCredentialsFiles Mount credentials as a files instead of using an environment variable ## useCredentialsFiles: false ## @param auth.forceNewKeys Force root credentials (user and password) to be reconfigured every time they change in the secrets ## forceNewKeys: false ## @param defaultBuckets Comma, semi-colon or space separated list of buckets to create at initialization (only in standalone mode) ## e.g: ## defaultBuckets: "my-bucket, my-second-bucket" ## defaultBuckets: "" ## @param disableWebUI Disable MinIO&reg; Web UI ## ref: https://github.com/minio/minio/tree/master/docs/config/#browser ## disableWebUI: false ## Enable tls in front of MinIO&reg; containers. ## tls: ## @param tls.enabled Enable tls in front of the container ## enabled: false ## @param tls.existingSecret Name of an existing secret holding the certificate information ## existingSecret: "" ## @param tls.mountPath The mount path where the secret will be located ## Custom mount path where the certificates will be located, if empty will default to /certs mountPath: "" ## @param extraEnvVars Extra environment variables to be set on MinIO&reg; container ## e.g: ## extraEnvVars: ## - name: FOO ## value: "bar" ## extraEnvVars: {} ## @param extraEnvVarsCM ConfigMap with extra environment variables ## extraEnvVarsCM: "" ## @param extraEnvVarsSecret Secret with extra environment variables ## extraEnvVarsSecret: "" ## @param command Default container command (useful when using custom images). Use array form ## command: [] ## @param args Default container args (useful when using custom images). Use array form ## args: [] ## @section MinIO&reg; deployment/statefulset parameters ## @param schedulerName Specifies the schedulerName, if it's nil uses kube-scheduler ## https://kubernetes.io/docs/tasks/administer-cluster/configure-multiple-schedulers/ ## schedulerName: "" ## MinIO&reg; deployment parameters ## Only when 'mode' is 'standalone' or 'gateway.enabled' is 'true' ## deployment: ## @param deployment.updateStrategy.type Deployment strategy type ## ref: https://kubernetes.io/docs/concepts/workloads/controllers/statefulset/#update-strategies ## e.g: ## updateStrategy: ## type: RollingUpdate ## rollingUpdate: ## maxSurge: 25% ## maxUnavailable: 25% ## updateStrategy: type: Recreate ## MinIO&reg; statefulset parameters ## Only when mode is 'distributed' ## statefulset: ## @param statefulset.updateStrategy.type StatefulSet strategy type ## ref: https://kubernetes.io/docs/concepts/workloads/controllers/statefulset/#update-strategies ## e.g: ## updateStrategy: ## type: RollingUpdate ## rollingUpdate: ## maxSurge: 25% ## maxUnavailable: 25% ## updateStrategy: type: RollingUpdate ## @param statefulset.podManagementPolicy StatefulSet controller supports relax its ordering guarantees while preserving its uniqueness and identity guarantees. There are two valid pod management policies: OrderedReady and Parallel ## ref: https://kubernetes.io/docs/tutorials/stateful-application/basic-stateful-set/#pod-management-policy ## podManagementPolicy: Parallel ## @param statefulset.replicaCount Number of pods per zone (only for MinIO&reg; distributed mode). Should be even and `>= 4` ## replicaCount: 4 ## @param statefulset.zones Number of zones (only for MinIO&reg; distributed mode) ## zones: 1 ## @param statefulset.drivesPerNode Number of drives attached to every node (only for MinIO&reg; distributed mode) ## drivesPerNode: 1 ## MinIO&reg; provisioning ## provisioning: ## @param provisioning.enabled Enable MinIO&reg; provisioning Job ## enabled: false ## @param provisioning.schedulerName Name of the k8s scheduler (other than default) for MinIO&reg; provisioning ## ref: https://kubernetes.io/docs/tasks/administer-cluster/configure-multiple-schedulers/ ## schedulerName: "" ## @param provisioning.podAnnotations Provisioning Pod annotations. ## podAnnotations: {} ## @param provisioning.command Default provisioning container command (useful when using custom images). Use array form ## command: [] ## @param provisioning.args Default provisioning container args (useful when using custom images). Use array form ## args: [] ## @param provisioning.extraVolumes Optionally specify extra list of additional volumes for MinIO&reg; provisioning pod ## extraVolumes: [] ## @param provisioning.extraVolumeMounts Optionally specify extra list of additional volumeMounts for MinIO&reg; provisioning container ## extraVolumeMounts: [] ## We usually recommend not to specify default resources and to leave this as a conscious ## choice for the user. This also increases chances charts run on environments with little ## resources, such as Minikube. If you do want to specify resources, uncomment the following ## lines, adjust them as necessary, and remove the curly braces after 'resources:'. ## @param provisioning.resources.limits The resources limits for the container ## @param provisioning.resources.requests The requested resources for the container ## resources: ## Example: ## limits: ## cpu: 100m ## memory: 64Mi limits: {} ## Examples: ## requests: ## cpu: 200m ## memory: 128Mi requests: {} ## @param provisioning.users MinIO&reg; users provisioning ## https://docs.min.io/docs/minio-admin-complete-guide.html#user ## e.g. ## users: ## - username: test-username ## password: test-password ## disabled: false ## policies: ## - readwrite ## - consoleAdmin ## - diagnostics ## # When set to true, it will replace all policies with the specified. ## # When false, the policies will be added to the existing. ## setPolicies: false users: [] ## @param provisioning.groups MinIO&reg; groups provisioning ## https://docs.min.io/docs/minio-admin-complete-guide.html#group ## e.g. ## groups ## - name: test-group ## disabled: false ## members: ## - test-username ## policies: ## - readwrite ## # When set to true, it will replace all policies with the specified. ## # When false, the policies will be added to the existing. ## setPolicies: false groups: [] ## @param provisioning.buckets MinIO&reg; buckets, versioning, lifecycle, quota and tags provisioning ## Buckets https://docs.min.io/docs/minio-client-complete-guide.html#mb ## Lifecycle https://docs.min.io/docs/minio-client-complete-guide.html#ilm ## Quotas https://docs.min.io/docs/minio-admin-complete-guide.html#bucket ## Tags https://docs.min.io/docs/minio-client-complete-guide.html#tag ## Versioning https://docs.min.io/docs/minio-client-complete-guide.html#version ## e.g. ## buckets: ## - name: test-bucket ## region: us-east-1 ## # Only when mode is 'distributed' ## # ref: https://docs.minio.io/docs/distributed-minio-quickstart-guide ## versioning: false ## # Versioning is automatically enabled if withLock is true ## # ref: https://docs.min.io/docs/minio-bucket-versioning-guide.html ## withLock: true ## # Only when mode is 'distributed' ## # ref: https://docs.minio.io/docs/distributed-minio-quickstart-guide ## lifecycle: ## - id: TestPrefix7dRetention ## prefix: test-prefix ## disabled: false ## expiry: ## days: 7 ## # Days !OR! date ## # date: "2021-11-11T00:00:00Z" ## nonconcurrentDays: 3 ## # Only when mode is 'distributed' ## # ref: https://docs.minio.io/docs/distributed-minio-quickstart-guide ## quota: ## # hard or clear(+ omit size) ## type: hard ## size: 10GiB ## tags: ## key1: value1 buckets: [] ## @param provisioning.config MinIO&reg; config provisioning ## https://docs.min.io/docs/minio-server-configuration-guide.html ## e.g. ## config: ## - name: region ## options: ## name: us-east-1 config: [] ## @param hostAliases MinIO&reg; pod host aliases ## https://kubernetes.io/docs/concepts/services-networking/add-entries-to-pod-etc-hosts-with-host-aliases/ ## hostAliases: [] ## @param containerPorts.api MinIO&reg; container port to open for MinIO&reg; API ## @param containerPorts.console MinIO&reg; container port to open for MinIO&reg; Console ## containerPorts: api: 9000 console: 9001 ## MinIO&reg; pod Security Context ## ref: https://kubernetes.io/docs/tasks/configure-pod-container/security-context/#set-the-security-context-for-a-pod ## @param podSecurityContext.enabled Enable pod Security Context ## @param podSecurityContext.fsGroup Group ID for the container ## podSecurityContext: enabled: true fsGroup: 1001 ## MinIO&reg; container Security Context ## ref: https://kubernetes.io/docs/tasks/configure-pod-container/security-context/#set-the-security-context-for-a-container ## @param containerSecurityContext.enabled Enable container Security Context ## @param containerSecurityContext.runAsUser User ID for the container ## @param containerSecurityContext.runAsNonRoot Avoid running as root User ## containerSecurityContext: enabled: true runAsUser: 1001 runAsNonRoot: true ## @param podLabels Extra labels for MinIO&reg; pods ## Ref: https://kubernetes.io/docs/concepts/overview/working-with-objects/labels/ ## podLabels: {} ## @param podAnnotations Annotations for MinIO&reg; pods ## ref: https://kubernetes.io/docs/concepts/overview/working-with-objects/annotations/ ## podAnnotations: {} ## @param podAffinityPreset Pod affinity preset. Ignored if `affinity` is set. Allowed values: `soft` or `hard` ## ref: https://kubernetes.io/docs/concepts/scheduling-eviction/assign-pod-node/#inter-pod-affinity-and-anti-affinity ## podAffinityPreset: "" ## @param podAntiAffinityPreset Pod anti-affinity preset. Ignored if `affinity` is set. Allowed values: `soft` or `hard` ## ref: https://kubernetes.io/docs/concepts/scheduling-eviction/assign-pod-node/#inter-pod-affinity-and-anti-affinity ## podAntiAffinityPreset: soft ## Node affinity preset ## ref: https://kubernetes.io/docs/concepts/scheduling-eviction/assign-pod-node/#node-affinity ## nodeAffinityPreset: ## @param nodeAffinityPreset.type Node affinity preset type. Ignored if `affinity` is set. Allowed values: `soft` or `hard` ## type: "" ## @param nodeAffinityPreset.key Node label key to match. Ignored if `affinity` is set. ## E.g. ## key: "kubernetes.io/e2e-az-name" ## key: "" ## @param nodeAffinityPreset.values Node label values to match. Ignored if `affinity` is set. ## E.g. ## values: ## - e2e-az1 ## - e2e-az2 ## values: [] ## @param affinity Affinity for pod assignment. Evaluated as a template. ## ref: https://kubernetes.io/docs/concepts/configuration/assign-pod-node/#affinity-and-anti-affinity ## Note: podAffinityPreset, podAntiAffinityPreset, and nodeAffinityPreset will be ignored when it's set ## affinity: {} ## @param nodeSelector Node labels for pod assignment. Evaluated as a template. ## ref: https://kubernetes.io/docs/user-guide/node-selection/ ## nodeSelector: {} ## @param tolerations Tolerations for pod assignment. Evaluated as a template. ## ref: https://kubernetes.io/docs/concepts/configuration/taint-and-toleration/ ## tolerations: [] ## @param topologySpreadConstraints Topology Spread Constraints for MinIO&reg; pods assignment spread across your cluster among failure-domains ## Ref: https://kubernetes.io/docs/concepts/workloads/pods/pod-topology-spread-constraints/#spread-constraints-for-pods ## topologySpreadConstraints: [] ## @param priorityClassName MinIO&reg; pods' priorityClassName ## priorityClassName: "" ## MinIO&reg; containers' resource requests and limits ## ref: https://kubernetes.io/docs/user-guide/compute-resources/ ## We usually recommend not to specify default resources and to leave this as a conscious ## choice for the user. This also increases chances charts run on environments with little ## resources, such as Minikube. If you do want to specify resources, uncomment the following ## lines, adjust them as necessary, and remove the curly braces after 'resources:'. ## @param resources.limits The resources limits for the MinIO&reg; container ## @param resources.requests The requested resources for the MinIO&reg; container ## resources: ## Example: ## limits: ## cpu: 250m ## memory: 256Mi limits: {} ## Examples: ## requests: ## cpu: 250m ## memory: 256Mi requests: {} ## Configure extra options for liveness probe ## ref: https://kubernetes.io/docs/tasks/configure-pod-container/configure-liveness-readiness-probes/#configure-probes ## @param livenessProbe.enabled Enable livenessProbe ## @param livenessProbe.initialDelaySeconds Initial delay seconds for livenessProbe ## @param livenessProbe.periodSeconds Period seconds for livenessProbe ## @param livenessProbe.timeoutSeconds Timeout seconds for livenessProbe ## @param livenessProbe.failureThreshold Failure threshold for livenessProbe ## @param livenessProbe.successThreshold Success threshold for livenessProbe ## livenessProbe: enabled: true initialDelaySeconds: 5 periodSeconds: 5 timeoutSeconds: 5 successThreshold: 1 failureThreshold: 5 ## Configure extra options for readiness probe ## ref: https://kubernetes.io/docs/tasks/configure-pod-container/configure-liveness-readiness-probes/#configure-probes ## @param readinessProbe.enabled Enable readinessProbe ## @param readinessProbe.initialDelaySeconds Initial delay seconds for readinessProbe ## @param readinessProbe.periodSeconds Period seconds for readinessProbe ## @param readinessProbe.timeoutSeconds Timeout seconds for readinessProbe ## @param readinessProbe.failureThreshold Failure threshold for readinessProbe ## @param readinessProbe.successThreshold Success threshold for readinessProbe ## readinessProbe: enabled: true initialDelaySeconds: 5 periodSeconds: 5 timeoutSeconds: 1 successThreshold: 1 failureThreshold: 5 ## Configure extra options for startupProbe probe ## ref: https://kubernetes.io/docs/tasks/configure-pod-container/configure-liveness-readiness-probes/#configure-probes ## @param startupProbe.enabled Enable startupProbe ## @param startupProbe.initialDelaySeconds Initial delay seconds for startupProbe ## @param startupProbe.periodSeconds Period seconds for startupProbe ## @param startupProbe.timeoutSeconds Timeout seconds for startupProbe ## @param startupProbe.failureThreshold Failure threshold for startupProbe ## @param startupProbe.successThreshold Success threshold for startupProbe ## startupProbe: enabled: false initialDelaySeconds: 0 periodSeconds: 10 timeoutSeconds: 5 successThreshold: 1 failureThreshold: 60 ## @param customLivenessProbe Override default liveness probe ## customLivenessProbe: {} ## @param customReadinessProbe Override default readiness probe ## customReadinessProbe: {} ## @param customStartupProbe Override default startup probe ## customStartupProbe: {} ## @param lifecycleHooks for the MinIO&reg container(s) to automate configuration before or after startup ## lifecycleHooks: {} ## @param extraVolumes Optionally specify extra list of additional volumes for MinIO&reg; pods ## extraVolumes: [] ## @param extraVolumeMounts Optionally specify extra list of additional volumeMounts for MinIO&reg; container(s) ## extraVolumeMounts: [] ## @param initContainers Add additional init containers to the MinIO&reg; pods ## e.g: ## initContainers: ## - name: your-image-name ## image: your-image ## imagePullPolicy: Always ## ports: ## - name: portname ## containerPort: 1234 ## initContainers: [] ## @param sidecars Add additional sidecar containers to the MinIO&reg; pods ## e.g: ## sidecars: ## - name: your-image-name ## image: your-image ## imagePullPolicy: Always ## ports: ## - name: portname ## containerPort: 1234 ## sidecars: [] ## @section Traffic exposure parameters ## MinIO&reg; Service properties ## service: ## @param service.type MinIO&reg; service type ## type: ClusterIP ## @param service.ports.api MinIO&reg; API service port ## @param service.ports.console MinIO&reg; Console service port ## ports: api: 9000 console: 9001 ## @param service.nodePorts.api Specify the MinIO&reg API nodePort value for the LoadBalancer and NodePort service types ## @param service.nodePorts.console Specify the MinIO&reg Console nodePort value for the LoadBalancer and NodePort service types ## ref: https://kubernetes.io/docs/concepts/services-networking/service/#type-nodeport ## nodePorts: api: "" console: "" ## @param service.clusterIP Service Cluster IP ## e.g.: ## clusterIP: None ## clusterIP: "" ## @param service.loadBalancerIP loadBalancerIP if service type is `LoadBalancer` (optional, cloud specific) ## ref: https://kubernetes.io/docs/user-guide/services/#type-loadbalancer ## loadBalancerIP: "" ## @param service.loadBalancerSourceRanges Addresses that are allowed when service is LoadBalancer ## https://kubernetes.io/docs/tasks/access-application-cluster/configure-cloud-provider-firewall/#restrict-access-for-loadbalancer-service ## e.g: ## loadBalancerSourceRanges: ## - 10.10.10.0/24 ## loadBalancerSourceRanges: [] ## @param service.externalTrafficPolicy Enable client source IP preservation ## ref https://kubernetes.io/docs/tasks/access-application-cluster/create-external-load-balancer/#preserving-the-client-source-ip ## externalTrafficPolicy: Cluster ## @param service.extraPorts Extra ports to expose in the service (normally used with the `sidecar` value) ## extraPorts: [] ## @param service.annotations Annotations for MinIO&reg; service ## This can be used to set the LoadBalancer service type to internal only. ## ref: https://kubernetes.io/docs/concepts/services-networking/service/#internal-load-balancer ## annotations: {} ## Configure the ingress resource that allows you to access the ## MinIO&reg; Console. Set up the URL ## ref: https://kubernetes.io/docs/user-guide/ingress/ ## ingress: ## @param ingress.enabled Enable ingress controller resource ## enabled: false ## @param ingress.apiVersion Force Ingress API version (automatically detected if not set) ## apiVersion: "" ## @param ingress.ingressClassName IngressClass that will be be used to implement the Ingress (Kubernetes 1.18+) ## This is supported in Kubernetes 1.18+ and required if you have more than one IngressClass marked as the default for your cluster. ## ref: https://kubernetes.io/blog/2020/04/02/improvements-to-the-ingress-api-in-kubernetes-1.18/ ## ingressClassName: "" ## @param ingress.hostname Default host for the ingress resource ## hostname: minio.local ## @param ingress.path The Path to MinIO&reg;. You may need to set this to '/*' in order to use this with ALB ingress controllers. ## path: / ## @param ingress.pathType Ingress path type ## pathType: ImplementationSpecific ## @param ingress.servicePort Service port to be used ## Default is http. Alternative is https. ## servicePort: minio-console ## @param ingress.annotations Additional annotations for the Ingress resource. To enable certificate autogeneration, place here your cert-manager annotations. ## For a full list of possible ingress annotations, please see ## ref: https://github.com/kubernetes/ingress-nginx/blob/master/docs/user-guide/nginx-configuration/annotations.md ## Use this parameter to set the required annotations for cert-manager, see ## ref: https://cert-manager.io/docs/usage/ingress/#supported-annotations ## ## e.g: ## annotations: ## kubernetes.io/ingress.class: nginx ## cert-manager.io/cluster-issuer: cluster-issuer-name ## annotations: {} ## @param ingress.tls Enable TLS configuration for the hostname defined at `ingress.hostname` parameter ## TLS certificates will be retrieved from a TLS secret with name: `{{- printf "%s-tls" .Values.ingress.hostname }}` ## You can: ## - Use the `ingress.secrets` parameter to create this TLS secret ## - Rely on cert-manager to create it by setting the corresponding annotations ## - Rely on Helm to create self-signed certificates by setting `ingress.selfSigned=true` ## tls: false ## @param ingress.selfSigned Create a TLS secret for this ingress record using self-signed certificates generated by Helm ## selfSigned: false ## @param ingress.extraHosts The list of additional hostnames to be covered with this ingress record. ## Most likely the hostname above will be enough, but in the event more hosts are needed, this is an array ## e.g: ## extraHosts: ## - name: minio.local ## path: / ## extraHosts: [] ## @param ingress.extraPaths Any additional paths that may need to be added to the ingress under the main host ## For example: The ALB ingress controller requires a special rule for handling SSL redirection. ## extraPaths: ## - path: /* ## backend: ## serviceName: ssl-redirect ## servicePort: use-annotation ## extraPaths: [] ## @param ingress.extraTls The tls configuration for additional hostnames to be covered with this ingress record. ## see: https://kubernetes.io/docs/concepts/services-networking/ingress/#tls ## e.g: ## extraTls: ## - hosts: ## - minio.local ## secretName: minio.local-tls ## extraTls: [] ## @param ingress.secrets If you're providing your own certificates, please use this to add the certificates as secrets ## key and certificate are expected in PEM format ## name should line up with a secretName set further up ## ## If it is not set and you're using cert-manager, this is unneeded, as it will create a secret for you with valid certificates ## If it is not set and you're NOT using cert-manager either, self-signed certificates will be created valid for 365 days ## It is also possible to create and manage the certificates outside of this helm chart ## Please see README.md for more information ## ## Example ## secrets: ## - name: minio.local-tls ## key: "" ## certificate: "" ## secrets: [] ## Configure the ingress resource that allows you to access the ## MinIO&reg; API. Set up the URL ## ref: https://kubernetes.io/docs/user-guide/ingress/ ## apiIngress: ## @param apiIngress.enabled Enable ingress controller resource ## enabled: false ## @param apiIngress.apiVersion Force Ingress API version (automatically detected if not set) ## apiVersion: "" ## @param apiIngress.ingressClassName IngressClass that will be be used to implement the Ingress (Kubernetes 1.18+) ## This is supported in Kubernetes 1.18+ and required if you have more than one IngressClass marked as the default for your cluster. ## ref: https://kubernetes.io/blog/2020/04/02/improvements-to-the-ingress-api-in-kubernetes-1.18/ ## ingressClassName: "" ## @param apiIngress.hostname Default host for the ingress resource ## hostname: minio.local ## @param apiIngress.path The Path to MinIO&reg;. You may need to set this to '/*' in order to use this with ALB ingress controllers. ## path: / ## @param apiIngress.pathType Ingress path type ## pathType: ImplementationSpecific ## @param apiIngress.servicePort Service port to be used ## Default is http. Alternative is https. ## servicePort: minio-api ## @param apiIngress.annotations Additional annotations for the Ingress resource. To enable certificate autogeneration, place here your cert-manager annotations. ## For a full list of possible ingress annotations, please see ## ref: https://github.com/kubernetes/ingress-nginx/blob/master/docs/user-guide/nginx-configuration/annotations.md ## Use this parameter to set the required annotations for cert-manager, see ## ref: https://cert-manager.io/docs/usage/ingress/#supported-annotations ## ## e.g: ## annotations: ## kubernetes.io/ingress.class: nginx ## cert-manager.io/cluster-issuer: cluster-issuer-name ## annotations: {} ## @param apiIngress.tls Enable TLS configuration for the hostname defined at `apiIngress.hostname` parameter ## TLS certificates will be retrieved from a TLS secret with name: `{{- printf "%s-tls" .Values.apiIngress.hostname }}` ## You can: ## - Use the `ingress.secrets` parameter to create this TLS secret ## - Rely on cert-manager to create it by setting the corresponding annotations ## - Rely on Helm to create self-signed certificates by setting `ingress.selfSigned=true` ## tls: false ## @param apiIngress.selfSigned Create a TLS secret for this ingress record using self-signed certificates generated by Helm ## selfSigned: false ## @param apiIngress.extraHosts The list of additional hostnames to be covered with this ingress record. ## Most likely the hostname above will be enough, but in the event more hosts are needed, this is an array ## e.g: ## extraHosts: ## - name: minio.local ## path: / ## extraHosts: [] ## @param apiIngress.extraPaths Any additional paths that may need to be added to the ingress under the main host ## For example: The ALB ingress controller requires a special rule for handling SSL redirection. ## extraPaths: ## - path: /* ## backend: ## serviceName: ssl-redirect ## servicePort: use-annotation ## extraPaths: [] ## @param apiIngress.extraTls The tls configuration for additional hostnames to be covered with this ingress record. ## see: https://kubernetes.io/docs/concepts/services-networking/ingress/#tls ## e.g: ## extraTls: ## - hosts: ## - minio.local ## secretName: minio.local-tls ## extraTls: [] ## @param apiIngress.secrets If you're providing your own certificates, please use this to add the certificates as secrets ## key and certificate are expected in PEM format ## name should line up with a secretName set further up ## ## If it is not set and you're using cert-manager, this is unneeded, as it will create a secret for you with valid certificates ## If it is not set and you're NOT using cert-manager either, self-signed certificates will be created valid for 365 days ## It is also possible to create and manage the certificates outside of this helm chart ## Please see README.md for more information ## ## Example ## secrets: ## - name: minio.local-tls ## key: "" ## certificate: "" ## secrets: [] ## NetworkPolicy parameters ## networkPolicy: ## @param networkPolicy.enabled Enable the default NetworkPolicy policy ## enabled: false ## @param networkPolicy.allowExternal Don't require client label for connections ## When set to false, only pods with the correct client label will have network access to the port MinIO&reg; is ## listening on. When true, MinIO&reg; will accept connections from any source (with the correct destination port). ## allowExternal: true ## @param networkPolicy.extraFromClauses Allows to add extra 'from' clauses to the NetworkPolicy extraFromClauses: {} ## Example ## extraFromClauses: ## - podSelector: ## matchLabels: ## a: b ## @section Persistence parameters ## Enable persistence using Persistent Volume Claims ## ref: https://kubernetes.io/docs/user-guide/persistent-volumes/ ## persistence: ## @param persistence.enabled Enable MinIO&reg; data persistence using PVC. If false, use emptyDir ## enabled: true ## @param persistence.storageClass PVC Storage Class for MinIO&reg; data volume ## If defined, storageClassName: <storageClass> ## If set to "-", storageClassName: "", which disables dynamic provisioning ## If undefined (the default) or set to null, no storageClassName spec is ## set, choosing the default provisioner. (gp2 on AWS, standard on ## GKE, AWS & OpenStack) ## storageClass: "" ## @param persistence.mountPath Data volume mount path ## mountPath: /data ## @param persistence.accessModes PVC Access Modes for MinIO&reg; data volume ## accessModes: - ReadWriteOnce ## @param persistence.size PVC Storage Request for MinIO&reg; data volume ## size: 8Gi ## @param persistence.annotations Annotations for the PVC ## annotations: {} ## @param persistence.existingClaim Name of an existing PVC to use (only in `standalone` mode) ## existingClaim: "" ## @section Volume Permissions parameters ## Init containers parameters: ## volumePermissions: Change the owner and group of the persistent volume mountpoint to runAsUser:fsGroup values from the securityContext section. ## volumePermissions: ## @param volumePermissions.enabled Enable init container that changes the owner and group of the persistent volume(s) mountpoint to `runAsUser:fsGroup` ## enabled: false ## @param volumePermissions.image.registry Init container volume-permissions image registry ## @param volumePermissions.image.repository Init container volume-permissions image repository ## @param volumePermissions.image.tag Init container volume-permissions image tag (immutable tags are recommended) ## @param volumePermissions.image.pullPolicy Init container volume-permissions image pull policy ## @param volumePermissions.image.pullSecrets Specify docker-registry secret names as an array ## image: registry: docker.io repository: bitnami/bitnami-shell tag: 10-debian-10-r366 pullPolicy: IfNotPresent ## Optionally specify an array of imagePullSecrets. ## Secrets must be manually created in the namespace. ## ref: https://kubernetes.io/docs/tasks/configure-pod-container/pull-image-private-registry/ ## e.g: ## pullSecrets: ## - myRegistryKeySecretName ## pullSecrets: [] ## Init container' resource requests and limits ## ref: https://kubernetes.io/docs/user-guide/compute-resources/ ## We usually recommend not to specify default resources and to leave this as a conscious ## choice for the user. This also increases chances charts run on environments with little ## resources, such as Minikube. If you do want to specify resources, uncomment the following ## lines, adjust them as necessary, and remove the curly braces after 'resources:'. ## @param volumePermissions.resources.limits Init container volume-permissions resource limits ## @param volumePermissions.resources.requests Init container volume-permissions resource requests ## resources: ## Example: ## limits: ## cpu: 500m ## memory: 1Gi limits: {} requests: {} ## Init container' Security Context ## Note: the chown of the data folder is done to containerSecurityContext.runAsUser ## and not the below volumePermissions.containerSecurityContext.runAsUser ## @param volumePermissions.containerSecurityContext.runAsUser User ID for the init container ## containerSecurityContext: runAsUser: 0 ## @section RBAC parameters ## Specifies whether a ServiceAccount should be created ## serviceAccount: ## @param serviceAccount.create Enable the creation of a ServiceAccount for MinIO&reg; pods ## create: true ## @param serviceAccount.name Name of the created ServiceAccount ## If not set and create is true, a name is generated using the common.names.fullname template ## name: "" ## @param serviceAccount.automountServiceAccountToken Enable/disable auto mounting of the service account token ## automountServiceAccountToken: true ## @param serviceAccount.annotations Custom annotations for MinIO&reg; ServiceAccount ## annotations: {} ## @section Other parameters ## MinIO&reg; Pod Disruption Budget configuration in distributed mode. ## If MinIO&reg; Gateway is enabled, creates a Pod Disruption Budget for the Gateway instead (mutually exclusive with distributed mode). ## ref: https://kubernetes.io/docs/tasks/run-application/configure-pdb/ ## pdb: ## @param pdb.create Enable/disable a Pod Disruption Budget creation ## create: false ## @param pdb.minAvailable Minimum number/percentage of pods that must still be available after the eviction ## minAvailable: 1 ## @param pdb.maxUnavailable Maximum number/percentage of pods that may be made unavailable after the eviction ## maxUnavailable: "" ## @section Metrics parameters metrics: ## @param metrics.prometheusAuthType Authentication mode for Prometheus (`jwt` or `public`) ## To allow public access without authentication for prometheus metrics set environment as follows. ## prometheusAuthType: public ## Prometheus Operator ServiceMonitor configuration ## serviceMonitor: ## @param metrics.serviceMonitor.enabled If the operator is installed in your cluster, set to true to create a Service Monitor Entry ## enabled: false ## @param metrics.serviceMonitor.namespace Namespace which Prometheus is running in ## namespace: "" ## @param metrics.serviceMonitor.labels Extra labels for the ServiceMonitor ## labels: {} ## @param metrics.serviceMonitor.jobLabel The name of the label on the target service to use as the job name in Prometheus ## jobLabel: "" ## @param metrics.serviceMonitor.path HTTP path to scrape for metrics ## path: /minio/v2/metrics/cluster ## @param metrics.serviceMonitor.interval Interval at which metrics should be scraped ## interval: 30s ## @param metrics.serviceMonitor.scrapeTimeout Specify the timeout after which the scrape is ended ## e.g: ## scrapeTimeout: 30s scrapeTimeout: "" ## @param metrics.serviceMonitor.metricRelabelings MetricRelabelConfigs to apply to samples before ingestion ## metricRelabelings: [] ## @param metrics.serviceMonitor.relabelings Metrics relabelings to add to the scrape endpoint, applied before scraping ## relabelings: [] ## @param metrics.serviceMonitor.honorLabels Specify honorLabels parameter to add the scrape endpoint ## honorLabels: false ## @param metrics.serviceMonitor.selector Prometheus instance selector labels ## ref: https://github.com/bitnami/charts/tree/master/bitnami/prometheus-operator#prometheus-configuration ## selector: {} ## @section Gateway parameters gateway: ## @param gateway.enabled Use MinIO&reg; as Gateway for other storage systems ## enabled: false ## @param gateway.type Gateway type. Supported types are: `azure`, `gcs`, `nas`, `s3` ## ref: https://docs.minio.io/docs/minio-gateway-for-azure ## ref: https://docs.minio.io/docs/minio-gateway-for-gcs ## ref: https://docs.minio.io/docs/minio-gateway-for-nas ## ref: https://docs.minio.io/docs/minio-gateway-for-s3 ## type: s3 ## @param gateway.replicaCount Number of MinIO&reg; Gateway replicas ## replicaCount: 4 ## @param gateway.updateStrategy.type Update strategy type for MinIO&reg; Gateway replicas updateStrategy: type: Recreate ## Autoscaling configuration for MinIO&reg; Gateway. overrides gateway.replicaCount if enabled ## @param gateway.autoscaling.enabled Enable autoscaling for MinIO&reg; Gateway deployment ## @param gateway.autoscaling.minReplicas Minimum number of replicas to scale back ## @param gateway.autoscaling.maxReplicas Maximum number of replicas to scale out ## @param gateway.autoscaling.targetCPU Target CPU utilization percentage ## @param gateway.autoscaling.targetMemory Target Memory utilization percentage autoscaling: enabled: false minReplicas: "4" maxReplicas: "4" targetCPU: "" targetMemory: "" ## @param gateway.priorityClassName Pod priority class name for MinIO&reg; Gateway ## priorityClassName: "" ## Gateway authentication configuration ## auth: ## Authentication configuration for Azure. Ignored unless type=azure ## @param gateway.auth.azure.accessKey Access key to access MinIO&reg; using Azure Gateway ## @param gateway.auth.azure.secretKey Secret key to access MinIO&reg; using Azure Gateway ## @param gateway.auth.azure.serviceEndpoint Azure Blob Storage custom endpoint ## @param gateway.auth.azure.storageAccountName Azure Storage Account Name to use to access Azure Blob Storage ## @param gateway.auth.azure.storageAccountKey Azure Storage Account Key to use to access Azure Blob Storage ## @param gateway.auth.azure.storageAccountNameExistingSecret Existing Secret name to extract Azure Storage Account Name from to access Azure Blob Storage ## @param gateway.auth.azure.storageAccountNameExistingSecretKey Existing Secret key to extract Azure Storage Account Name from to use to access Azure Blob Storage ## @param gateway.auth.azure.storageAccountKeyExistingSecret Existing Secret name to extract Azure Storage Account Key from to access Azure Blob Storage ## @param gateway.auth.azure.storageAccountKeyExistingSecretKey Existing Secret key to extract Azure Storage Account Key from to use to access Azure Blob Storage ## azure: accessKey: "" secretKey: "" serviceEndpoint: "" storageAccountName: "" storageAccountKey: "" storageAccountNameExistingSecret: "" storageAccountNameExistingSecretKey: "" storageAccountKeyExistingSecret: "" storageAccountKeyExistingSecretKey: "" ## Authentication configuration for GCS. Ignored unless type=gcs ## @param gateway.auth.gcs.accessKey Access key to access MinIO&reg; using GCS Gateway ## @param gateway.auth.gcs.secretKey Secret key to access MinIO&reg; using GCS Gateway ## @param gateway.auth.gcs.keyJSON Service Account key to access GCS ## @param gateway.auth.gcs.projectID GCP Project ID to use ## gcs: accessKey: "" secretKey: "" keyJSON: "" projectID: "" ## Authentication configuration for NAS. Ignored unless type=nas ## @param gateway.auth.nas.accessKey Access key to access MinIO&reg; using NAS Gateway ## @param gateway.auth.nas.secretKey Secret key to access MinIO&reg; using NAS Gateway ## nas: accessKey: "" secretKey: "" ## Authentication configuration for S3. Ignored unless type=s3 ## @param gateway.auth.s3.accessKey Access key to use to access AWS S3 ## @param gateway.auth.s3.secretKey Secret key to use to access AWS S3 ## @param gateway.auth.s3.serviceEndpoint AWS S3 endpoint ## s3: accessKey: "" secretKey: "" serviceEndpoint: https://s3.amazonaws.com
41.429412
233
0.731317
7b79d665d1de57272feec37c289d7718853663ff
60,838
yaml
YAML
bitnami/postgresql-ha/values.yaml
00arthur00/charts
502aa1e64541669b732a4eda896e5937847b6c3c
[ "Apache-2.0" ]
null
null
null
bitnami/postgresql-ha/values.yaml
00arthur00/charts
502aa1e64541669b732a4eda896e5937847b6c3c
[ "Apache-2.0" ]
2
2022-01-26T01:14:30.000Z
2022-01-26T07:03:39.000Z
bitnami/postgresql-ha/values.yaml
00arthur00/charts
502aa1e64541669b732a4eda896e5937847b6c3c
[ "Apache-2.0" ]
null
null
null
## @section Global parameters ## Global Docker image parameters ## Please, note that this will override the image parameters, including dependencies, configured to use the global value ## Current available global Docker image parameters: imageRegistry, imagePullSecrets and storageClass ## ## @param global.imageRegistry Global Docker image registry ## @param global.imagePullSecrets Global Docker registry secret names as an array ## @param global.storageClass Global StorageClass for Persistent Volume(s) ## @param global.postgresql.username PostgreSQL username (overrides `postgresql.username`) ## @param global.postgresql.password PostgreSQL password (overrides `postgresql.password`) ## @param global.postgresql.database PostgreSQL database (overrides `postgresql.database`) ## @param global.postgresql.repmgrUsername PostgreSQL repmgr username (overrides `postgresql.repmgrUsername`) ## @param global.postgresql.repmgrPassword PostgreSQL repmgr password (overrides `postgresql.repmgrpassword`) ## @param global.postgresql.repmgrDatabase PostgreSQL repmgr database (overrides `postgresql.repmgrDatabase`) ## @param global.postgresql.existingSecret Name of existing secret to use for PostgreSQL passwords (overrides `postgresql.existingSecret`) ## @param global.ldap.bindpw LDAP bind password (overrides `ldap.bindpw`) ## @param global.ldap.existingSecret Name of existing secret to use for LDAP passwords (overrides `ldap.existingSecret`) ## @param global.pgpool.adminUsername Pgpool Admin username (overrides `pgpool.adminUsername`) ## @param global.pgpool.adminPassword Pgpool Admin password (overrides `pgpool.adminPassword`) ## @param global.pgpool.existingSecret Pgpool existing secret ## global: imageRegistry: "" ## E.g. ## imagePullSecrets: ## - myRegistryKeySecretName ## imagePullSecrets: [] storageClass: "" postgresql: username: "" password: "" database: "" repmgrUsername: "" repmgrPassword: "" repmgrDatabase: "" existingSecret: "" ldap: bindpw: "" existingSecret: "" pgpool: adminUsername: "" adminPassword: "" existingSecret: "" ## @section General parameters ## ## @param nameOverride String to partially override common.names.fullname template (will maintain the release name) ## nameOverride: "" ## @param fullnameOverride String to fully override common.names.fullname template ## fullnameOverride: "" ## @param clusterDomain Kubernetes Cluster Domain ## clusterDomain: cluster.local ## @param commonAnnotations Common annotations to add to all resources (sub-charts are not considered). Evaluated as a template ## commonAnnotations: {} ## @param commonLabels Common labels to add to all resources (sub-charts are not considered). Evaluated as a template ## commonLabels: {} ## @param extraDeploy Array of extra objects to deploy with the release (evaluated as a template) ## extraDeploy: [] ## Pod Service Account ## ref: https://kubernetes.io/docs/tasks/configure-pod-container/configure-service-account/ ## serviceAccount: ## @param serviceAccount.enabled Enable service account (Note: Service Account will only be automatically created if `serviceAccount.name` is not set) ## enabled: false ## @param serviceAccount.name Name of an already existing service account. Setting this value disables the automatic service account creation ## name: "" ## Pod Security Policy ## ref: https://kubernetes.io/docs/concepts/policy/pod-security-policy/ ## @param psp.create Whether to create a PodSecurityPolicy. WARNING: PodSecurityPolicy is deprecated in Kubernetes v1.21 or later, unavailable in v1.25 or later ## psp: create: false ## Creates role for ServiceAccount ## Required for PSP ## @param rbac.create Create Role and RoleBinding (required for PSP to work) ## rbac: create: false ## @param topologySpreadConstraints Topology Spread Constraints for pod assignment spread across your cluster among failure-domains. Evaluated as a template ## Ref: https://kubernetes.io/docs/concepts/workloads/pods/pod-topology-spread-constraints/#spread-constraints-for-pods ## topologySpreadConstraints: {} ## Diagnostic mode in the deployment ## diagnosticMode: ## @param diagnosticMode.enabled Enable diagnostic mode (all probes will be disabled and the command will be overridden) ## enabled: false ## @param diagnosticMode.command [array] Command to override all containers in the deployment ## command: - sleep ## @param diagnosticMode.args [array] Args to override all containers in the deployment ## args: - infinity ## @section PostgreSQL with Repmgr parameters ## ## Bitnami PostgreSQL image ## ref: https://hub.docker.com/r/bitnami/postgresql/tags/ ## @param postgresqlImage.registry PostgreSQL with Repmgr image registry ## @param postgresqlImage.repository PostgreSQL with Repmgr image repository ## @param postgresqlImage.tag PostgreSQL with Repmgr image tag ## @param postgresqlImage.pullPolicy PostgreSQL with Repmgr image pull policy ## @param postgresqlImage.pullSecrets Specify docker-registry secret names as an array ## @param postgresqlImage.debug Specify if debug logs should be enabled ## postgresqlImage: registry: docker.io repository: bitnami/postgresql-repmgr tag: 11.15.0-debian-10-r31 ## Specify a imagePullPolicy. Defaults to 'Always' if image tag is 'latest', else set to 'IfNotPresent' ## ref: https://kubernetes.io/docs/user-guide/images/#pre-pulling-images ## pullPolicy: IfNotPresent ## Optionally specify an array of imagePullSecrets. ## Secrets must be manually created in the namespace. ## ref: https://kubernetes.io/docs/tasks/configure-pod-container/pull-image-private-registry/ ## Example: ## pullSecrets: ## - myRegistryKeySecretName ## pullSecrets: [] ## Set to true if you would like to see extra information on logs ## debug: false ## PostgreSQL parameters ## postgresql: ## @param postgresql.labels Labels to add to the StatefulSet. Evaluated as template ## labels: {} ## @param postgresql.podLabels Labels to add to the StatefulSet pods. Evaluated as template ## podLabels: {} ## @param postgresql.replicaCount Number of replicas to deploy. Use an odd number. Having 3 replicas is the minimum to get quorum when promoting a new primary. ## replicaCount: 3 ## @param postgresql.updateStrategyType Update strategy for PostgreSQL statefulset ## ref: https://kubernetes.io/docs/concepts/workloads/controllers/statefulset/#update-strategies ## updateStrategyType: RollingUpdate ## @param postgresql.containerPort PostgreSQL port ## containerPort: 5432 ## @param postgresql.hostAliases Deployment pod host aliases ## https://kubernetes.io/docs/concepts/services-networking/add-entries-to-pod-etc-hosts-with-host-aliases/ ## hostAliases: [] ## @param postgresql.hostNetwork Specify if host network should be enabled for PostgreSQL pod ## hostNetwork: false ## @param postgresql.hostIPC Specify if host IPC should be enabled for PostgreSQL pod ## hostIPC: false ## @param postgresql.podAnnotations Additional pod annotations ## ref: https://kubernetes.io/docs/concepts/overview/working-with-objects/annotations/ ## podAnnotations: {} ## @param postgresql.priorityClassName Pod priority class ## Ref: https://kubernetes.io/docs/concepts/configuration/pod-priority-preemption/ ## priorityClassName: "" ## @param postgresql.podAffinityPreset PostgreSQL pod affinity preset. Ignored if `postgresql.affinity` is set. Allowed values: `soft` or `hard` ## ref: https://kubernetes.io/docs/concepts/scheduling-eviction/assign-pod-node/#inter-pod-affinity-and-anti-affinity ## podAffinityPreset: "" ## @param postgresql.podAntiAffinityPreset PostgreSQL pod anti-affinity preset. Ignored if `postgresql.affinity` is set. Allowed values: `soft` or `hard` ## ref: https://kubernetes.io/docs/concepts/scheduling-eviction/assign-pod-node/#inter-pod-affinity-and-anti-affinity ## podAntiAffinityPreset: soft ## PostgreSQL node affinity preset ## ref: https://kubernetes.io/docs/concepts/scheduling-eviction/assign-pod-node/#node-affinity ## nodeAffinityPreset: ## @param postgresql.nodeAffinityPreset.type PostgreSQL node affinity preset type. Ignored if `postgresql.affinity` is set. Allowed values: `soft` or `hard` ## type: "" ## @param postgresql.nodeAffinityPreset.key PostgreSQL node label key to match Ignored if `postgresql.affinity` is set. ## E.g. ## key: "kubernetes.io/e2e-az-name" ## key: "" ## @param postgresql.nodeAffinityPreset.values PostgreSQL node label values to match. Ignored if `postgresql.affinity` is set. ## E.g. ## values: ## - e2e-az1 ## - e2e-az2 ## values: [] ## @param postgresql.affinity Affinity for PostgreSQL pods assignment ## ref: https://kubernetes.io/docs/concepts/configuration/assign-pod-node/#affinity-and-anti-affinity ## Note: postgresql.podAffinityPreset, postgresql.podAntiAffinityPreset, and postgresql.nodeAffinityPreset will be ignored when it's set ## affinity: {} ## @param postgresql.nodeSelector Node labels for PostgreSQL pods assignment ## ref: https://kubernetes.io/docs/user-guide/node-selection/ ## nodeSelector: {} ## @param postgresql.tolerations Tolerations for PostgreSQL pods assignment ## ref: https://kubernetes.io/docs/concepts/configuration/taint-and-toleration/ ## tolerations: [] ## K8s Security Context ## https://kubernetes.io/docs/tasks/configure-pod-container/security-context/ ## @param postgresql.securityContext.enabled Enable security context for PostgreSQL with Repmgr ## @param postgresql.securityContext.fsGroup Group ID for the PostgreSQL with Repmgr filesystem ## securityContext: enabled: true fsGroup: 1001 ## Container Security Context ## https://kubernetes.io/docs/tasks/configure-pod-container/security-context/ ## @param postgresql.containerSecurityContext.enabled Enable container security context ## @param postgresql.containerSecurityContext.runAsUser User ID for the PostgreSQL with Repmgr container ## containerSecurityContext: enabled: true runAsUser: 1001 ## @param postgresql.customLivenessProbe Override default liveness probe ## customLivenessProbe: {} ## @param postgresql.customReadinessProbe Override default readiness probe ## customReadinessProbe: {} ## @param postgresql.customStartupProbe Override default startup probe ## customStartupProbe: {} ## @param postgresql.command Override default container command (useful when using custom images) ## command: [] ## @param postgresql.args Override default container args (useful when using custom images) ## args: [] ## @param postgresql.lifecycleHooks LifecycleHook to set additional configuration at startup, e.g. LDAP settings via REST API. Evaluated as a template ## lifecycleHooks: {} ## @param postgresql.extraEnvVars Array containing extra environment variables ## For example: ## - name: BEARER_AUTH ## value: true ## extraEnvVars: [] ## @param postgresql.extraEnvVarsCM ConfigMap with extra environment variables ## extraEnvVarsCM: "" ## @param postgresql.extraEnvVarsSecret Secret with extra environment variables ## extraEnvVarsSecret: "" ## @param postgresql.extraVolumes Extra volumes to add to the deployment ## extraVolumes: [] ## @param postgresql.extraVolumeMounts Extra volume mounts to add to the container. Normally used with `extraVolumes`. ## extraVolumeMounts: [] ## @param postgresql.initContainers Extra init containers to add to the deployment ## initContainers: [] ## @param postgresql.sidecars Extra sidecar containers to add to the deployment ## sidecars: [] ## PostgreSQL containers' resource requests and limits ## ref: https://kubernetes.io/docs/user-guide/compute-resources/ ## We usually recommend not to specify default resources and to leave this as a conscious ## choice for the user. This also increases chances charts run on environments with little ## resources, such as Minikube. If you do want to specify resources, uncomment the following ## lines, adjust them as necessary, and remove the curly braces after 'resources:'. ## @param postgresql.resources.limits The resources limits for the container ## @param postgresql.resources.requests The requested resources for the container ## resources: ## Example: ## limits: ## cpu: 250m ## memory: 256Mi ## limits: {} ## Examples: ## requests: ## cpu: 250m ## memory: 256Mi ## requests: {} ## PostgreSQL container's liveness probe ## ref: https://kubernetes.io/docs/concepts/workloads/pods/pod-lifecycle/#container-probes ## @param postgresql.livenessProbe.enabled Enable livenessProbe ## @param postgresql.livenessProbe.initialDelaySeconds Initial delay seconds for livenessProbe ## @param postgresql.livenessProbe.periodSeconds Period seconds for livenessProbe ## @param postgresql.livenessProbe.timeoutSeconds Timeout seconds for livenessProbe ## @param postgresql.livenessProbe.failureThreshold Failure threshold for livenessProbe ## @param postgresql.livenessProbe.successThreshold Success threshold for livenessProbe ## livenessProbe: enabled: true initialDelaySeconds: 30 periodSeconds: 10 timeoutSeconds: 5 successThreshold: 1 failureThreshold: 6 ## PostgreSQL container's readiness probe ## ref: https://kubernetes.io/docs/concepts/workloads/pods/pod-lifecycle/#container-probes ## @param postgresql.readinessProbe.enabled Enable readinessProbe ## @param postgresql.readinessProbe.initialDelaySeconds Initial delay seconds for readinessProbe ## @param postgresql.readinessProbe.periodSeconds Period seconds for readinessProbe ## @param postgresql.readinessProbe.timeoutSeconds Timeout seconds for readinessProbe ## @param postgresql.readinessProbe.failureThreshold Failure threshold for readinessProbe ## @param postgresql.readinessProbe.successThreshold Success threshold for readinessProbe ## readinessProbe: enabled: true initialDelaySeconds: 5 periodSeconds: 10 timeoutSeconds: 5 successThreshold: 1 failureThreshold: 6 ## PostgreSQL container's startup probe ## ref: https://kubernetes.io/docs/concepts/workloads/pods/pod-lifecycle/#container-probes ## @param postgresql.startupProbe.enabled Enable startupProbe ## @param postgresql.startupProbe.initialDelaySeconds Initial delay seconds for startupProbe ## @param postgresql.startupProbe.periodSeconds Period seconds for startupProbe ## @param postgresql.startupProbe.timeoutSeconds Timeout seconds for startupProbe ## @param postgresql.startupProbe.failureThreshold Failure threshold for startupProbe ## @param postgresql.startupProbe.successThreshold Success threshold for startupProbe ## startupProbe: enabled: false initialDelaySeconds: 5 periodSeconds: 10 timeoutSeconds: 5 successThreshold: 1 failureThreshold: 10 ## Pod disruption budget configuration ## pdb: ## @param postgresql.pdb.create Specifies whether to create a Pod disruption budget for PostgreSQL with Repmgr ## create: false ## @param postgresql.pdb.minAvailable Minimum number / percentage of pods that should remain scheduled ## minAvailable: 1 ## @param postgresql.pdb.maxUnavailable Maximum number / percentage of pods that may be made unavailable ## maxUnavailable: "" ## PostgreSQL configuration parameters ## @param postgresql.username PostgreSQL username ## @param postgresql.password PostgreSQL password ## @param postgresql.database PostgreSQL database ## username: postgres password: "" database: "" ## @param postgresql.existingSecret PostgreSQL password using existing secret ## existingSecret: "" ## @param postgresql.postgresPassword PostgreSQL password for the `postgres` user when `username` is not `postgres` ## ref: https://github.com/bitnami/bitnami-docker-postgresql/blob/master/README.md#creating-a-database-user-on-first-run (see note!) ## postgresPassword: "" ## @param postgresql.usePasswordFile Set to `true` to mount PostgreSQL secret as a file instead of passing environment variable ## usePasswordFile: "" ## @param postgresql.repmgrUsePassfile Set to `true` to configure repmgrl to use `passfile` instead of `password` vars*:*:*:username:password" and use it to configure Repmgr instead of using password (Requires Postgresql 10+, otherwise ignored) ## ref: https://repmgr.org/docs/current/configuration-password-management.html ## https://www.postgresql.org/docs/current/libpq-pgpass.html ## repmgrUsePassfile: "" ## @param postgresql.repmgrPassfilePath Custom path where `passfile` will be stored ## repmgrPassfilePath: "" ## @param postgresql.upgradeRepmgrExtension Upgrade repmgr extension in the database ## upgradeRepmgrExtension: false ## @param postgresql.pgHbaTrustAll Configures PostgreSQL HBA to trust every user ## pgHbaTrustAll: false ## @param postgresql.syncReplication Make the replication synchronous. This will wait until the data is synchronized in all the replicas before other query can be run. This ensures the data availability at the expenses of speed. ## syncReplication: false ## Repmgr configuration parameters ## @param postgresql.repmgrUsername PostgreSQL Repmgr username ## @param postgresql.repmgrPassword PostgreSQL Repmgr password ## @param postgresql.repmgrDatabase PostgreSQL Repmgr database ## @param postgresql.repmgrLogLevel Repmgr log level (DEBUG, INFO, NOTICE, WARNING, ERROR, ALERT, CRIT or EMERG) ## @param postgresql.repmgrConnectTimeout Repmgr backend connection timeout (in seconds) ## @param postgresql.repmgrReconnectAttempts Repmgr backend reconnection attempts ## @param postgresql.repmgrReconnectInterval Repmgr backend reconnection interval (in seconds) ## @param postgresql.repmgrFenceOldPrimary Set if fencing of old primary in multiple primary situation is desired ## @param postgresql.repmgrChildNodesCheckInterval Repmgr child nodes check interval (in seconds) ## @param postgresql.repmgrChildNodesConnectedMinCount Repmgr minimum number of connected child nodes before being considered as failed primary for fencing ## @param postgresql.repmgrChildNodesDisconnectTimeout Repmgr time before node will be fenced when insufficient child nodes are detected (in seconds) ## repmgrUsername: repmgr repmgrPassword: "" repmgrDatabase: repmgr repmgrLogLevel: NOTICE repmgrConnectTimeout: 5 repmgrReconnectAttempts: 2 repmgrReconnectInterval: 3 repmgrFenceOldPrimary: false repmgrChildNodesCheckInterval: 5 repmgrChildNodesConnectedMinCount: 1 repmgrChildNodesDisconnectTimeout: 30 ## EXPERMENTAL: Use pg_rewind for standby failover ## @param postgresql.usePgRewind Use pg_rewind for standby failover (experimental) ## usePgRewind: false ## Audit settings ## https://github.com/bitnami/bitnami-docker-postgresql#auditing ## audit: ## @param postgresql.audit.logHostname Add client hostnames to the log file ## logHostname: true ## @param postgresql.audit.logConnections Add client log-in operations to the log file ## logConnections: false ## @param postgresql.audit.logDisconnections Add client log-outs operations to the log file ## logDisconnections: false ## @param postgresql.audit.pgAuditLog Add operations to log using the pgAudit extension ## pgAuditLog: "" ## @param postgresql.audit.pgAuditLogCatalog Log catalog using pgAudit ## pgAuditLogCatalog: "off" ## @param postgresql.audit.clientMinMessages Message log level to share with the user ## clientMinMessages: error ## @param postgresql.audit.logLinePrefix Template string for the log line prefix ## logLinePrefix: "" ## @param postgresql.audit.logTimezone Timezone for the log timestamps ## logTimezone: "" ## @param postgresql.sharedPreloadLibraries Shared preload libraries (comma-separated list) ## sharedPreloadLibraries: "pgaudit, repmgr" ## @param postgresql.maxConnections Maximum total connections ## maxConnections: "" ## @param postgresql.postgresConnectionLimit Maximum connections for the postgres user ## postgresConnectionLimit: "" ## @param postgresql.dbUserConnectionLimit Maximum connections for the created user ## dbUserConnectionLimit: "" ## @param postgresql.tcpKeepalivesInterval TCP keepalives interval ## tcpKeepalivesInterval: "" ## @param postgresql.tcpKeepalivesIdle TCP keepalives idle ## tcpKeepalivesIdle: "" ## @param postgresql.tcpKeepalivesCount TCP keepalives count ## tcpKeepalivesCount: "" ## @param postgresql.statementTimeout Statement timeout ## statementTimeout: "" ## @param postgresql.pghbaRemoveFilters Comma-separated list of patterns to remove from the pg_hba.conf file ## (cannot be used with custom pg_hba.conf) ## pghbaRemoveFilters: "" ## @param postgresql.extraInitContainers Extra init containers ## Example: ## extraInitContainers: ## - name: do-something ## image: busybox ## command: ['do', 'something'] ## extraInitContainers: [] ## @param postgresql.repmgrConfiguration Repmgr configuration ## You can use this parameter to specify the content for repmgr.conf ## Otherwise, a repmgr.conf will be generated based on the environment variables ## ref: https://github.com/bitnami/bitnami-docker-postgresql-repmgr#configuration ## ref: https://github.com/bitnami/bitnami-docker-postgresql-repmgr#configuration-file ## Example: ## repmgrConfiguration: |- ## ssh_options='-o "StrictHostKeyChecking no" -v' ## use_replication_slots='1' ## ... ## repmgrConfiguration: "" ## @param postgresql.configuration PostgreSQL configuration ## You can use this parameter to specify the content for postgresql.conf ## Otherwise, a repmgr.conf will be generated based on the environment variables ## ref: https://github.com/bitnami/bitnami-docker-postgresql-repmgr#configuration ## ref: https://github.com/bitnami/bitnami-docker-postgresql-repmgr#configuration-file ## Example: ## configuration: |- ## listen_addresses = '*' ## port = '5432' ## ... ## configuration: "" ## @param postgresql.pgHbaConfiguration PostgreSQL client authentication configuration ## You can use this parameter to specify the content for pg_hba.conf ## Otherwise, a repmgr.conf will be generated based on the environment variables ## ref: https://github.com/bitnami/bitnami-docker-postgresql-repmgr#configuration ## ref: https://github.com/bitnami/bitnami-docker-postgresql-repmgr#configuration-file ## Example: ## pgHbaConfiguration: |- ## host all repmgr 0.0.0.0/0 md5 ## host repmgr repmgr 0.0.0.0/0 md ## ... ## pgHbaConfiguration: "" ## @param postgresql.configurationCM Name of existing ConfigMap with configuration files ## NOTE: This will override postgresql.repmgrConfiguration, postgresql.configuration and postgresql.pgHbaConfiguration ## configurationCM: "" ## @param postgresql.extendedConf Extended PostgreSQL configuration (appended to main or default configuration). Implies `volumePermissions.enabled`. ## Similar to postgresql.configuration, but _appended_ to the main configuration ## ref: https://github.com/bitnami/bitnami-docker-postgresql-repmgr#allow-settings-to-be-loaded-from-files-other-than-the-default-postgresqlconf ## Example: ## extendedConf: |- ## deadlock_timeout = 1s ## max_locks_per_transaction = 64 ## ... ## extendedConf: "" ## @param postgresql.extendedConfCM ConfigMap with PostgreSQL extended configuration ## NOTE: This will override postgresql.extendedConf and implies `volumePermissions.enabled` ## extendedConfCM: "" ## @param postgresql.initdbScripts Dictionary of initdb scripts ## Specify dictionary of scripts to be run at first boot ## The allowed extensions are `.sh`, `.sql` and `.sql.gz` ## ref: https://github.com/bitnami/charts/tree/master/bitnami/postgresql-ha#initialize-a-fresh-instance ## e.g: ## initdbScripts: ## my_init_script.sh: | ## #!/bin/sh ## echo "Do something." ## initdbScripts: {} ## @param postgresql.initdbScriptsCM ConfigMap with scripts to be run at first boot ## NOTE: This will override initdbScripts ## initdbScriptsCM: "" ## @param postgresql.initdbScriptsSecret Secret with scripts to be run at first boot ## Note: can be used with initdbScriptsCM or initdbScripts ## initdbScriptsSecret: "" ## TLS configuration ## tls: ## @param postgresql.tls.enabled Enable TLS traffic support for end-client connections ## enabled: false ## @param postgresql.tls.preferServerCiphers Whether to use the server's TLS cipher preferences rather than the client's ## preferServerCiphers: true ## @param postgresql.tls.certificatesSecret Name of an existing secret that contains the certificates ## certificatesSecret: "" ## @param postgresql.tls.certFilename Certificate filename ## certFilename: "" ## @param postgresql.tls.certKeyFilename Certificate key filename ## certKeyFilename: "" ## @param postgresql.tls.certCAFilename CA Certificate filename ## If provided, PgPool will authenticate TLS/SSL clients by requesting them a certificate ## ref: https://www.pgpool.net/docs/latest/en/html/runtime-ssl.html ## certCAFilename: "" ## @section Pgpool parameters ## ## Bitnami Pgpool image ## ref: https://hub.docker.com/r/bitnami/pgpool/tags/ ## @param pgpoolImage.registry Pgpool image registry ## @param pgpoolImage.repository Pgpool image repository ## @param pgpoolImage.tag Pgpool image tag ## @param pgpoolImage.pullPolicy Pgpool image pull policy ## @param pgpoolImage.pullSecrets Specify docker-registry secret names as an array ## @param pgpoolImage.debug Specify if debug logs should be enabled ## pgpoolImage: registry: docker.io repository: bitnami/pgpool tag: 4.3.1-debian-10-r25 ## Specify a imagePullPolicy. Defaults to 'Always' if image tag is 'latest', else set to 'IfNotPresent' ## ref: https://kubernetes.io/docs/user-guide/images/#pre-pulling-images ## pullPolicy: IfNotPresent ## Optionally specify an array of imagePullSecrets. ## Secrets must be manually created in the namespace. ## ref: https://kubernetes.io/docs/tasks/configure-pod-container/pull-image-private-registry/ ## Example: ## pullSecrets: ## - myRegistryKeySecretName ## pullSecrets: [] ## Set to true if you would like to see extra information on logs ## debug: false ## Pgpool parameters ## pgpool: ## @param pgpool.customUsers Additional users that will be performing connections to the database using ## pgpool. Use this property in order to create new user/password entries that ## will be appended to the "pgpool_passwd" file ## customUsers: {} ## @param pgpool.usernames Comma or semicolon separated list of postgres usernames ## e.g: ## usernames: 'user01;user02' ## usernames: "" ## @param pgpool.passwords Comma or semicolon separated list of the associated passwords for the users above ## e.g: ## passwords: 'pass01;pass02' ## passwords: "" ## @param pgpool.hostAliases Deployment pod host aliases ## https://kubernetes.io/docs/concepts/services-networking/add-entries-to-pod-etc-hosts-with-host-aliases/ ## hostAliases: [] ## @param pgpool.customUsersSecret Name of a secret containing the usernames and passwords of accounts that will be added to pgpool_passwd ## The secret must contain the keys "usernames" and "passwords" respectively. ## customUsersSecret: "" ## @param pgpool.existingSecret Pgpool admin password using existing secret ## existingSecret: "" ## @param pgpool.srCheckDatabase Name of the database to perform streaming replication checks ## srCheckDatabase: postgres ## @param pgpool.labels Labels to add to the Deployment. Evaluated as template ## labels: {} ## @param pgpool.podLabels Labels to add to the pods. Evaluated as template ## podLabels: {} ## @param pgpool.serviceLabels Labels to add to the service. Evaluated as template ## serviceLabels: {} ## @param pgpool.customLivenessProbe Override default liveness probe ## customLivenessProbe: {} ## @param pgpool.customReadinessProbe Override default readiness probe ## customReadinessProbe: {} ## @param pgpool.customStartupProbe Override default startup probe ## customStartupProbe: {} ## @param pgpool.command Override default container command (useful when using custom images) ## command: [] ## @param pgpool.args Override default container args (useful when using custom images) ## args: [] ## @param pgpool.lifecycleHooks LifecycleHook to set additional configuration at startup, e.g. LDAP settings via REST API. Evaluated as a template ## lifecycleHooks: {} ## @param pgpool.extraEnvVars Array containing extra environment variables ## For example: ## - name: BEARER_AUTH ## value: true ## extraEnvVars: [] ## @param pgpool.extraEnvVarsCM ConfigMap with extra environment variables ## extraEnvVarsCM: "" ## @param pgpool.extraEnvVarsSecret Secret with extra environment variables ## extraEnvVarsSecret: "" ## @param pgpool.extraVolumes Extra volumes to add to the deployment ## extraVolumes: [] ## @param pgpool.extraVolumeMounts Extra volume mounts to add to the container. Normally used with `extraVolumes` ## extraVolumeMounts: [] ## @param pgpool.initContainers Extra init containers to add to the deployment ## initContainers: [] ## @param pgpool.sidecars Extra sidecar containers to add to the deployment ## sidecars: [] ## @param pgpool.replicaCount The number of replicas to deploy ## replicaCount: 1 ## @param pgpool.podAnnotations Additional pod annotations ## ref: https://kubernetes.io/docs/concepts/overview/working-with-objects/annotations/ ## podAnnotations: {} ## @param pgpool.priorityClassName Pod priority class ## Ref: https://kubernetes.io/docs/concepts/configuration/pod-priority-preemption/ ## priorityClassName: "" ## @param pgpool.podAffinityPreset Pgpool pod affinity preset. Ignored if `pgpool.affinity` is set. Allowed values: `soft` or `hard` ## ref: https://kubernetes.io/docs/concepts/scheduling-eviction/assign-pod-node/#inter-pod-affinity-and-anti-affinity ## podAffinityPreset: "" ## @param pgpool.podAntiAffinityPreset Pgpool pod anti-affinity preset. Ignored if `pgpool.affinity` is set. Allowed values: `soft` or `hard` ## ref: https://kubernetes.io/docs/concepts/scheduling-eviction/assign-pod-node/#inter-pod-affinity-and-anti-affinity ## podAntiAffinityPreset: soft ## Pgpool node affinity preset ## ref: https://kubernetes.io/docs/concepts/scheduling-eviction/assign-pod-node/#node-affinity ## nodeAffinityPreset: ## @param pgpool.nodeAffinityPreset.type Pgpool node affinity preset type. Ignored if `pgpool.affinity` is set. Allowed values: `soft` or `hard` ## type: "" ## @param pgpool.nodeAffinityPreset.key Pgpool node label key to match Ignored if `pgpool.affinity` is set. ## E.g. ## key: "kubernetes.io/e2e-az-name" ## key: "" ## @param pgpool.nodeAffinityPreset.values Pgpool node label values to match. Ignored if `pgpool.affinity` is set. ## E.g. ## values: ## - e2e-az1 ## - e2e-az2 ## values: [] ## @param pgpool.affinity Affinity for Pgpool pods assignment ## ref: https://kubernetes.io/docs/concepts/configuration/assign-pod-node/#affinity-and-anti-affinity ## Note: pgpool.podAffinityPreset, pgpool.podAntiAffinityPreset, and pgpool.nodeAffinityPreset will be ignored when it's set ## affinity: {} ## @param pgpool.nodeSelector Node labels for Pgpool pods assignment ## ref: https://kubernetes.io/docs/user-guide/node-selection/ ## nodeSelector: {} ## @param pgpool.tolerations Tolerations for Pgpool pods assignment ## ref: https://kubernetes.io/docs/concepts/configuration/taint-and-toleration/ ## tolerations: [] ## K8s Security Context ## https://kubernetes.io/docs/tasks/configure-pod-container/security-context/ ## @param pgpool.securityContext.enabled Enable security context for Pgpool ## @param pgpool.securityContext.fsGroup Group ID for the Pgpool filesystem ## securityContext: enabled: true fsGroup: 1001 ## Container Security Context ## https://kubernetes.io/docs/tasks/configure-pod-container/security-context/ ## @param pgpool.containerSecurityContext.enabled Enable container security context ## @param pgpool.containerSecurityContext.runAsUser User ID for the Pgpool container ## containerSecurityContext: enabled: true runAsUser: 1001 ## Pgpool containers' resource requests and limits ## ref: https://kubernetes.io/docs/user-guide/compute-resources/ ## We usually recommend not to specify default resources and to leave this as a conscious ## choice for the user. This also increases chances charts run on environments with little ## resources, such as Minikube. If you do want to specify resources, uncomment the following ## lines, adjust them as necessary, and remove the curly braces after 'resources:'. ## @param pgpool.resources.limits The resources limits for the container ## @param pgpool.resources.requests The requested resources for the container ## resources: ## Example: ## limits: ## cpu: 250m ## memory: 256Mi ## limits: {} ## Examples: ## requests: ## cpu: 250m ## memory: 256Mi ## requests: {} ## Pgpool container's liveness probe ## ref: https://kubernetes.io/docs/concepts/workloads/pods/pod-lifecycle/#container-probes ## @param pgpool.livenessProbe.enabled Enable livenessProbe ## @param pgpool.livenessProbe.initialDelaySeconds Initial delay seconds for livenessProbe ## @param pgpool.livenessProbe.periodSeconds Period seconds for livenessProbe ## @param pgpool.livenessProbe.timeoutSeconds Timeout seconds for livenessProbe ## @param pgpool.livenessProbe.failureThreshold Failure threshold for livenessProbe ## @param pgpool.livenessProbe.successThreshold Success threshold for livenessProbe ## livenessProbe: enabled: true initialDelaySeconds: 30 periodSeconds: 10 timeoutSeconds: 5 successThreshold: 1 failureThreshold: 5 ## Pgpool container's readiness probe ## ref: https://kubernetes.io/docs/concepts/workloads/pods/pod-lifecycle/#container-probes ## @param pgpool.readinessProbe.enabled Enable readinessProbe ## @param pgpool.readinessProbe.initialDelaySeconds Initial delay seconds for readinessProbe ## @param pgpool.readinessProbe.periodSeconds Period seconds for readinessProbe ## @param pgpool.readinessProbe.timeoutSeconds Timeout seconds for readinessProbe ## @param pgpool.readinessProbe.failureThreshold Failure threshold for readinessProbe ## @param pgpool.readinessProbe.successThreshold Success threshold for readinessProbe ## readinessProbe: enabled: true initialDelaySeconds: 5 periodSeconds: 5 timeoutSeconds: 5 successThreshold: 1 failureThreshold: 5 ## Pgpool container's startup probe ## ref: https://kubernetes.io/docs/concepts/workloads/pods/pod-lifecycle/#container-probes ## @param pgpool.startupProbe.enabled Enable startupProbe ## @param pgpool.startupProbe.initialDelaySeconds Initial delay seconds for startupProbe ## @param pgpool.startupProbe.periodSeconds Period seconds for startupProbe ## @param pgpool.startupProbe.timeoutSeconds Timeout seconds for startupProbe ## @param pgpool.startupProbe.failureThreshold Failure threshold for startupProbe ## @param pgpool.startupProbe.successThreshold Success threshold for startupProbe ## startupProbe: enabled: false initialDelaySeconds: 5 periodSeconds: 10 timeoutSeconds: 5 successThreshold: 1 failureThreshold: 10 ## Pod disruption budget configuration ## pdb: ## @param pgpool.pdb.create Specifies whether a Pod disruption budget should be created for Pgpool pods ## create: false ## @param pgpool.pdb.minAvailable Minimum number / percentage of pods that should remain scheduled ## minAvailable: 1 ## @param pgpool.pdb.maxUnavailable Maximum number / percentage of pods that may be made unavailable ## maxUnavailable: "" ## @param pgpool.updateStrategy Strategy used to replace old Pods by new ones ## ref: https://kubernetes.io/docs/concepts/workloads/controllers/deployment/#strategy ## updateStrategy: {} ## @param pgpool.containerPort Pgpool port ## containerPort: 5432 ## @param pgpool.minReadySeconds How many seconds a pod needs to be ready before killing the next, during update ## minReadySeconds: "" ## Credentials for the pgpool administrator ## @param pgpool.adminUsername Pgpool Admin username ## @param pgpool.adminPassword Pgpool Admin password ## adminUsername: admin adminPassword: "" ## @param pgpool.logConnections Log all client connections (PGPOOL_ENABLE_LOG_CONNECTIONS) ## ref: https://github.com/bitnami/bitnami-docker-pgpool#configuration ## logConnections: false ## @param pgpool.logHostname Log the client hostname instead of IP address (PGPOOL_ENABLE_LOG_HOSTNAME) ## ref: https://github.com/bitnami/bitnami-docker-pgpool#configuration ## logHostname: true ## @param pgpool.logPerNodeStatement Log every SQL statement for each DB node separately (PGPOOL_ENABLE_LOG_PER_NODE_STATEMENT) ## ref: https://github.com/bitnami/bitnami-docker-pgpool#configuration ## logPerNodeStatement: false ## @param pgpool.logLinePrefix Format of the log entry lines (PGPOOL_LOG_LINE_PREFIX) ## ref: https://github.com/bitnami/bitnami-docker-pgpool#configuration ## ref: https://www.pgpool.net/docs/latest/en/html/runtime-config-logging.html ## logLinePrefix: "" ## @param pgpool.clientMinMessages Log level for clients ## ref: https://github.com/bitnami/bitnami-docker-pgpool#configuration ## clientMinMessages: error ## @param pgpool.numInitChildren The number of preforked Pgpool-II server processes. It is also the concurrent ## connections limit to Pgpool-II from clients. Must be a positive integer. (PGPOOL_NUM_INIT_CHILDREN) ## ref: https://github.com/bitnami/bitnami-docker-pgpool#configuration ## numInitChildren: "" ## @param pgpool.reservedConnections Number of reserved connections. When zero, excess connection block. When non-zero, excess connections are refused with an error message. ## When this parameter is set to 1 or greater, incoming connections from clients are not accepted with error message ## "Sorry, too many clients already", rather than blocked if the number of current connections from clients is more than ## (num_init_children - reserved_connections). ## ref: https://github.com/bitnami/bitnami-docker-pgpool#configuration ## reservedConnections: 1 ## @param pgpool.maxPool The maximum number of cached connections in each child process (PGPOOL_MAX_POOL) ## ref: https://github.com/bitnami/bitnami-docker-pgpool#configuration ## maxPool: "" ## @param pgpool.childMaxConnections The maximum number of client connections in each child process (PGPOOL_CHILD_MAX_CONNECTIONS) ## ref: https://github.com/bitnami/bitnami-docker-pgpool#configuration ## childMaxConnections: "" ## @param pgpool.childLifeTime The time in seconds to terminate a Pgpool-II child process if it remains idle (PGPOOL_CHILD_LIFE_TIME) ## ref: https://github.com/bitnami/bitnami-docker-pgpool#configuration ## childLifeTime: "" ## @param pgpool.clientIdleLimit The time in seconds to disconnect a client if it remains idle since the last query (PGPOOL_CLIENT_IDLE_LIMIT) ## ref: https://github.com/bitnami/bitnami-docker-pgpool#configuration ## clientIdleLimit: "" ## @param pgpool.connectionLifeTime The time in seconds to terminate the cached connections to the PostgreSQL backend (PGPOOL_CONNECTION_LIFE_TIME) ## ref: https://github.com/bitnami/bitnami-docker-pgpool#configuration ## connectionLifeTime: "" ## @param pgpool.useLoadBalancing Use Pgpool Load-Balancing ## useLoadBalancing: true ## @param pgpool.loadBalancingOnWrite LoadBalancer on write actions behavior ## one of: [off, transaction, trans_transaction, always] ## loadBalancingOnWrite: transaction ## @param pgpool.configuration Pgpool configuration ## You can use this parameter to specify the content for pgpool.conf ## Otherwise, a repmgr.conf will be generated based on the environment variables ## ref: https://github.com/bitnami/bitnami-docker-pgpool#configuration ## ref: https://github.com/bitnami/bitnami-docker-pgpool#configuration-file ## Example: ## configuration: |- ## listen_addresses = '*' ## port = '5432' ## ... ## configuration: "" ## @param pgpool.configurationCM ConfigMap with Pgpool configuration ## NOTE: This will override pgpool.configuration parameter ## The file used must be named `pgpool.conf` ## configurationCM: "" ## @param pgpool.initdbScripts Dictionary of initdb scripts ## Specify dictionary of scripts to be run every time Pgpool container is initialized ## The allowed extension is `.sh` ## ref: https://github.com/bitnami/charts/tree/master/bitnami/postgresql-ha#initialize-a-fresh-instance ## e.g: ## initdbScripts: ## my_init_script.sh: | ## #!/bin/sh ## echo "Do something." ## initdbScripts: {} ## @param pgpool.initdbScriptsCM ConfigMap with scripts to be run every time Pgpool container is initialized ## NOTE: This will override pgpool.initdbScripts ## initdbScriptsCM: "" ## @param pgpool.initdbScriptsSecret Secret with scripts to be run every time Pgpool container is initialized ## Note: can be used with initdbScriptsCM or initdbScripts ## initdbScriptsSecret: "" ## ## TLS configuration ## tls: ## @param pgpool.tls.enabled Enable TLS traffic support for end-client connections ## enabled: false ## @param pgpool.tls.autoGenerated Create self-signed TLS certificates. Currently only supports PEM certificates ## autoGenerated: false ## @param pgpool.tls.preferServerCiphers Whether to use the server's TLS cipher preferences rather than the client's ## preferServerCiphers: true ## @param pgpool.tls.certificatesSecret Name of an existing secret that contains the certificates ## certificatesSecret: "" ## @param pgpool.tls.certFilename Certificate filename ## certFilename: "" ## @param pgpool.tls.certKeyFilename Certificate key filename ## certKeyFilename: "" ## @param pgpool.tls.certCAFilename CA Certificate filename ## If provided, PgPool will authenticate TLS/SSL clients by requesting them a certificate ## ref: https://www.pgpool.net/docs/latest/en/html/runtime-ssl.html ## certCAFilename: "" ## @section LDAP parameters ## ## LDAP parameters ## @param ldap.enabled Enable LDAP support ## @param ldap.existingSecret Name of existing secret to use for LDAP passwords ## @param ldap.uri LDAP URL beginning in the form `ldap[s]://<hostname>:<port>` ## @param ldap.base LDAP base DN ## @param ldap.binddn LDAP bind DN ## @param ldap.bindpw LDAP bind password ## @param ldap.bslookup LDAP base lookup ## @param ldap.scope LDAP search scope ## @param ldap.tlsReqcert LDAP TLS check on server certificates ## @param ldap.nssInitgroupsIgnoreusers LDAP ignored users ## ldap: enabled: false existingSecret: "" uri: "" base: "" binddn: "" bindpw: "" bslookup: "" scope: "" tlsReqcert: "" nssInitgroupsIgnoreusers: root,nslcd ## @section Metrics parameters ## ## Bitnami PostgreSQL Prometheus exporter image ## ref: https://hub.docker.com/r/bitnami/pgpool/tags/ ## @param metricsImage.registry PostgreSQL Prometheus exporter image registry ## @param metricsImage.repository PostgreSQL Prometheus exporter image repository ## @param metricsImage.tag PostgreSQL Prometheus exporter image tag ## @param metricsImage.pullPolicy PostgreSQL Prometheus exporter image pull policy ## @param metricsImage.pullSecrets Specify docker-registry secret names as an array ## @param metricsImage.debug Specify if debug logs should be enabled ## metricsImage: registry: docker.io repository: bitnami/postgres-exporter tag: 0.10.1-debian-10-r53 ## Specify a imagePullPolicy. Defaults to 'Always' if image tag is 'latest', else set to 'IfNotPresent' ## ref: https://kubernetes.io/docs/user-guide/images/#pre-pulling-images ## pullPolicy: IfNotPresent ## Optionally specify an array of imagePullSecrets. ## Secrets must be manually created in the namespace. ## ref: https://kubernetes.io/docs/tasks/configure-pod-container/pull-image-private-registry/ ## Example: ## pullSecrets: ## - myRegistryKeySecretName ## pullSecrets: [] ## Set to true if you would like to see extra information on logs ## debug: false ## PostgreSQL Prometheus exporter parameters ## metrics: ## @param metrics.enabled Enable PostgreSQL Prometheus exporter ## enabled: false ## K8s Security Context ## https://kubernetes.io/docs/tasks/configure-pod-container/security-context/ ## @param metrics.securityContext.enabled Enable security context for PostgreSQL Prometheus exporter ## @param metrics.securityContext.runAsUser User ID for the PostgreSQL Prometheus exporter container ## securityContext: enabled: true runAsUser: 1001 ## Prometheus exporter containers' resource requests and limits ## ref: https://kubernetes.io/docs/user-guide/compute-resources/ ## We usually recommend not to specify default resources and to leave this as a conscious ## choice for the user. This also increases chances charts run on environments with little ## resources, such as Minikube. If you do want to specify resources, uncomment the following ## lines, adjust them as necessary, and remove the curly braces after 'resources:'. ## @param metrics.resources.limits The resources limits for the container ## @param metrics.resources.requests The requested resources for the container ## resources: ## Example: ## limits: ## cpu: 250m ## memory: 256Mi ## limits: {} ## Examples: ## requests: ## cpu: 250m ## memory: 256Mi ## requests: {} ## @param metrics.containerPort Prometheus metrics exporter port ## containerPort: 9187 ## Prometheus exporter container's liveness probe ## ref: https://kubernetes.io/docs/concepts/workloads/pods/pod-lifecycle/#container-probes ## @param metrics.livenessProbe.enabled Enable livenessProbe ## @param metrics.livenessProbe.initialDelaySeconds Initial delay seconds for livenessProbe ## @param metrics.livenessProbe.periodSeconds Period seconds for livenessProbe ## @param metrics.livenessProbe.timeoutSeconds Timeout seconds for livenessProbe ## @param metrics.livenessProbe.failureThreshold Failure threshold for livenessProbe ## @param metrics.livenessProbe.successThreshold Success threshold for livenessProbe ## livenessProbe: enabled: true initialDelaySeconds: 30 periodSeconds: 10 timeoutSeconds: 5 successThreshold: 1 failureThreshold: 6 ## Prometheus exporter container's readiness probe ## ref: https://kubernetes.io/docs/concepts/workloads/pods/pod-lifecycle/#container-probes ## @param metrics.readinessProbe.enabled Enable readinessProbe ## @param metrics.readinessProbe.initialDelaySeconds Initial delay seconds for readinessProbe ## @param metrics.readinessProbe.periodSeconds Period seconds for readinessProbe ## @param metrics.readinessProbe.timeoutSeconds Timeout seconds for readinessProbe ## @param metrics.readinessProbe.failureThreshold Failure threshold for readinessProbe ## @param metrics.readinessProbe.successThreshold Success threshold for readinessProbe ## readinessProbe: enabled: true initialDelaySeconds: 5 periodSeconds: 10 timeoutSeconds: 5 successThreshold: 1 failureThreshold: 6 ## Prometheus exporter container's startup probes ## ref: https://kubernetes.io/docs/concepts/workloads/pods/pod-lifecycle/#container-probes ## @param metrics.startupProbe.enabled Enable startupProbe ## @param metrics.startupProbe.initialDelaySeconds Initial delay seconds for startupProbe ## @param metrics.startupProbe.periodSeconds Period seconds for startupProbe ## @param metrics.startupProbe.timeoutSeconds Timeout seconds for startupProbe ## @param metrics.startupProbe.failureThreshold Failure threshold for startupProbe ## @param metrics.startupProbe.successThreshold Success threshold for startupProbe ## startupProbe: enabled: false initialDelaySeconds: 5 periodSeconds: 10 timeoutSeconds: 5 successThreshold: 1 failureThreshold: 10 ## Metrics service parameters ## service: ## @param metrics.service.type PostgreSQL Prometheus exporter metrics service type ## type: ClusterIP ## @param metrics.service.port PostgreSQL Prometheus exporter metrics service port ## port: 9187 ## @param metrics.service.nodePort PostgreSQL Prometheus exporter Node Port ## ref: https://kubernetes.io/docs/concepts/services-networking/service/#type-nodeport ## nodePort: "" ## @param metrics.service.clusterIP PostgreSQL Prometheus exporter metrics service Cluster IP ## e.g.: ## clusterIP: None ## clusterIP: "" ## @param metrics.service.loadBalancerIP PostgreSQL Prometheus exporter service Load Balancer IP ## ref: https://kubernetes.io/docs/concepts/services-networking/service/#type-loadbalancer ## loadBalancerIP: "" ## @param metrics.service.loadBalancerSourceRanges PostgreSQL Prometheus exporter service Load Balancer sources ## ref: https://kubernetes.io/docs/tasks/access-application-cluster/configure-cloud-provider-firewall/#restrict-access-for-loadbalancer-service ## e.g: ## loadBalancerSourceRanges: ## - 10.10.10.0/24 ## loadBalancerSourceRanges: [] ## @param metrics.service.externalTrafficPolicy PostgreSQL Prometheus exporter service external traffic policy ## ref https://kubernetes.io/docs/tasks/access-application-cluster/create-external-load-balancer/#preserving-the-client-source-ip ## externalTrafficPolicy: Cluster ## @param metrics.annotations [object] Annotations for PostgreSQL Prometheus exporter service ## annotations: prometheus.io/scrape: "true" prometheus.io/port: "9187" ## @param metrics.customMetrics Additional custom metrics ## ref: https://github.com/wrouesnel/postgres_exporter#adding-new-metrics-via-a-config-file ## customMetrics: ## pg_database: ## query: "SELECT d.datname AS name, CASE WHEN pg_catalog.has_database_privilege(d.datname, 'CONNECT') THEN pg_catalog.pg_database_size(d.datname) ELSE 0 END AS size_bytes FROM pg_catalog.pg_database d where datname not in ('template0', 'template1', 'postgres')" ## metrics: ## - name: ## usage: "LABEL" ## description: "Name of the database" ## - size_bytes: ## usage: "GAUGE" ## description: "Size of the database in bytes" ## customMetrics: {} ## @param metrics.extraEnvVars An array to add extra environment variables to configure postgres-exporter ## see: https://github.com/wrouesnel/postgres_exporter#environment-variables ## For example: ## extraEnvVars: ## - name: PG_EXPORTER_DISABLE_DEFAULT_METRICS ## value: "true" ## extraEnvVars: {} ## Enable this if you're using Prometheus Operator ## serviceMonitor: ## @param metrics.serviceMonitor.enabled if `true`, creates a Prometheus Operator ServiceMonitor (also requires `metrics.enabled` to be `true`) ## enabled: false ## @param metrics.serviceMonitor.namespace Optional namespace which Prometheus is running in ## Fallback to the prometheus default unless specified ## namespace: "" ## @param metrics.serviceMonitor.interval How frequently to scrape metrics (use by default, falling back to Prometheus' default) ## e.g: ## interval: 10s ## interval: "" ## @param metrics.serviceMonitor.scrapeTimeout Service monitor scrape timeout ## e.g: ## scrapeTimeout: 10s ## scrapeTimeout: "" ## @param metrics.serviceMonitor.selector [object] Defaults to what's used if you follow CoreOS Prometheus Install Instructions (https://github.com/bitnami/charts/tree/master/bitnami/kube-prometheus#tldr) ## Prometheus Selector Label (https://github.com/bitnami/charts/tree/master/bitnami/kube-prometheus#prometheus-operator-parameters) ## Kube Prometheus Selector Label (https://github.com/bitnami/charts/tree/master/bitnami/kube-prometheus#exporters) ## selector: prometheus: kube-prometheus ## @param metrics.serviceMonitor.relabelings ServiceMonitor relabelings. Value is evaluated as a template ## ref: https://github.com/coreos/prometheus-operator/blob/master/Documentation/api.md#relabelconfig ## relabelings: [] ## @param metrics.serviceMonitor.metricRelabelings ServiceMonitor metricRelabelings. Value is evaluated as a template ## ref: https://github.com/coreos/prometheus-operator/blob/master/Documentation/api.md#relabelconfig ## metricRelabelings: [] ## @section Volume permissions parameters ## ## Init containers parameters: ## volumePermissions: Change the owner and group of the persistent volume mountpoint ## @param volumePermissionsImage.registry Init container volume-permissions image registry ## @param volumePermissionsImage.repository Init container volume-permissions image repository ## @param volumePermissionsImage.tag Init container volume-permissions image tag ## @param volumePermissionsImage.pullPolicy Init container volume-permissions image pull policy ## @param volumePermissionsImage.pullSecrets Specify docker-registry secret names as an array ## volumePermissionsImage: registry: docker.io repository: bitnami/bitnami-shell tag: 10-debian-10-r366 ## Specify a imagePullPolicy. Defaults to 'Always' if image tag is 'latest', else set to 'IfNotPresent' ## ref: https://kubernetes.io/docs/user-guide/images/#pre-pulling-images ## pullPolicy: IfNotPresent ## Optionally specify an array of imagePullSecrets. ## Secrets must be manually created in the namespace. ## ref: https://kubernetes.io/docs/tasks/configure-pod-container/pull-image-private-registry/ ## Example: ## pullSecrets: ## - myRegistryKeySecretName ## pullSecrets: [] ## Init Container parameters ## volumePermissions: ## @param volumePermissions.enabled Enable init container to adapt volume permissions ## enabled: false ## K8s Security Context ## https://kubernetes.io/docs/tasks/configure-pod-container/security-context/ ## @param volumePermissions.securityContext.runAsUser Init container volume-permissions User ID ## securityContext: runAsUser: 0 ## Init container' resource requests and limits ## ref: https://kubernetes.io/docs/user-guide/compute-resources/ ## We usually recommend not to specify default resources and to leave this as a conscious ## choice for the user. This also increases chances charts run on environments with little ## resources, such as Minikube. If you do want to specify resources, uncomment the following ## lines, adjust them as necessary, and remove the curly braces after 'resources:'. ## @param volumePermissions.resources.limits The resources limits for the container ## @param volumePermissions.resources.requests The requested resources for the container ## resources: ## Example: ## limits: ## cpu: 100m ## memory: 128Mi ## limits: {} ## Examples: ## requests: ## cpu: 100m ## memory: 128Mi ## requests: {} ## @section Persistence parameters ## persistence: ## @param persistence.enabled Enable data persistence ## enabled: true ## @param persistence.existingClaim A manually managed Persistent Volume and Claim ## If defined, PVC must be created manually before volume will be bound. ## All replicas will share this PVC, using existingClaim with replicas > 1 is only useful in very special use cases. ## The value is evaluated as a template. ## existingClaim: "" ## @param persistence.storageClass Persistent Volume Storage Class ## If defined, storageClassName: <storageClass> ## If set to "-", storageClassName: "", which disables dynamic provisioning ## If undefined (the default) or set to null, no storageClassName spec is ## set, choosing the default provisioner. ## storageClass: "" ## @param persistence.mountPath The path the volume will be mounted at, useful when using different PostgreSQL images. ## mountPath: /bitnami/postgresql ## @param persistence.accessModes List of access modes of data volume ## accessModes: - ReadWriteOnce ## @param persistence.size Persistent Volume Claim size ## size: 8Gi ## @param persistence.annotations Persistent Volume Claim annotations ## annotations: {} ## @param persistence.selector Selector to match an existing Persistent Volume (this value is evaluated as a template) ## selector: ## matchLabels: ## app: my-app ## selector: {} ## @section Traffic Exposure parameters ## ## PgPool service parameters ## service: ## @param service.type Kubernetes service type (`ClusterIP`, `NodePort` or `LoadBalancer`) ## type: ClusterIP ## @param service.port PostgreSQL port ## port: 5432 ## @param service.portName PostgreSQL service port name ## ref: https://kubernetes.io/docs/concepts/services-networking/service/#multi-port-services ## portName: postgresql ## @param service.nodePort Kubernetes service nodePort ## ref: https://kubernetes.io/docs/concepts/services-networking/service/#type-nodeport ## nodePort: "" ## @param service.loadBalancerIP Load balancer IP if service type is `LoadBalancer` ## Set the LoadBalancer service type to internal only ## ref: https://kubernetes.io/docs/concepts/services-networking/service/#internal-load-balancer ## loadBalancerIP: "" ## @param service.loadBalancerSourceRanges Addresses that are allowed when service is LoadBalancer ## https://kubernetes.io/docs/tasks/access-application-cluster/configure-cloud-provider-firewall/#restrict-access-for-loadbalancer-service ## ## loadBalancerSourceRanges: ## - 10.10.10.0/24 ## loadBalancerSourceRanges: [] ## @param service.clusterIP Set the Cluster IP to use ## Static clusterIP or None for headless services ## ref: https://kubernetes.io/docs/concepts/services-networking/service/#choosing-your-own-ip-address ## e.g: ## clusterIP: None ## clusterIP: "" ## @param service.externalTrafficPolicy Enable client source IP preservation ## ref https://kubernetes.io/docs/tasks/access-application-cluster/create-external-load-balancer/#preserving-the-client-source-ip ## externalTrafficPolicy: Cluster ## @param service.sessionAffinity Control where client requests go, to the same pod or round-robin ## Values: ClientIP or None ## ref: https://kubernetes.io/docs/user-guide/services/ ## sessionAffinity: "None" ## @param service.annotations Provide any additional annotations for PostgreSQL service ## annotations: {} ## @param service.serviceLabels Labels for PostgreSQL service ## serviceLabels: {} ## NetworkPolicy parameters ## networkPolicy: ## @param networkPolicy.enabled Enable NetworkPolicy ## enabled: false ## @param networkPolicy.allowExternal Don't require client label for connections ## The Policy model to apply. When set to false, only pods with the correct ## client labels will have network access to the port PostgreSQL is listening ## on. When true, PostgreSQL will accept connections from any source ## (with the correct destination port). ## allowExternal: true ## @param networkPolicy.egressRules.denyConnectionsToExternal Enable egress rule that denies outgoing traffic outside the cluster, except for DNS (port 53) ## @param networkPolicy.egressRules.customRules [object] Custom network policy rule ## egressRules: # Deny connections to external. This is not compatible with an external database. denyConnectionsToExternal: false ## Additional custom egress rules ## e.g: ## customRules: ## - to: ## - namespaceSelector: ## matchLabels: ## label: example ## customRules: []
43.147518
268
0.744272
c2733523af57c02b03785557c142cda82bf8ea5f
789
yaml
YAML
bitnami/redis-cluster/Chart.yaml
00arthur00/charts
502aa1e64541669b732a4eda896e5937847b6c3c
[ "Apache-2.0" ]
null
null
null
bitnami/redis-cluster/Chart.yaml
00arthur00/charts
502aa1e64541669b732a4eda896e5937847b6c3c
[ "Apache-2.0" ]
2
2022-01-26T01:14:30.000Z
2022-01-26T07:03:39.000Z
bitnami/redis-cluster/Chart.yaml
00arthur00/charts
502aa1e64541669b732a4eda896e5937847b6c3c
[ "Apache-2.0" ]
null
null
null
annotations: category: Database apiVersion: v2 appVersion: 6.2.6 dependencies: - name: common repository: https://charts.bitnami.com/bitnami tags: - bitnami-common version: 1.x.x description: Redis(TM) is an open source, scalable, distributed in-memory cache for applications. It can be used to store and serve data in the form of strings, hashes, lists, sets and sorted sets. engine: gotpl home: https://github.com/bitnami/charts/tree/master/bitnami/redis-cluster icon: https://bitnami.com/assets/stacks/redis/img/redis-stack-220x234.png keywords: - redis - keyvalue - database maintainers: - email: [email protected] name: Bitnami name: redis-cluster sources: - https://github.com/bitnami/bitnami-docker-redis - http://redis.io/ version: 7.4.0
29.222222
197
0.73891
9f8908a22954c55a33da8cb3e6369e53e9f4638c
913
yaml
YAML
bitnami/node/Chart.yaml
00arthur00/charts
502aa1e64541669b732a4eda896e5937847b6c3c
[ "Apache-2.0" ]
null
null
null
bitnami/node/Chart.yaml
00arthur00/charts
502aa1e64541669b732a4eda896e5937847b6c3c
[ "Apache-2.0" ]
2
2022-01-26T01:14:30.000Z
2022-01-26T07:03:39.000Z
bitnami/node/Chart.yaml
00arthur00/charts
502aa1e64541669b732a4eda896e5937847b6c3c
[ "Apache-2.0" ]
null
null
null
annotations: category: Infrastructure apiVersion: v2 appVersion: 16.14.1 dependencies: - condition: mongodb.enabled name: mongodb repository: https://charts.bitnami.com/bitnami version: 11.x.x - name: common repository: https://charts.bitnami.com/bitnami tags: - bitnami-common version: 1.x.x description: Node.js is a runtime environment built on V8 JavaScript engine. Its event-driven, non-blocking I/O model enables the development of fast, scalable, and data-intensive server applications. engine: gotpl home: https://github.com/bitnami/charts/tree/master/bitnami/node icon: https://bitnami.com/assets/stacks/nodejs/img/nodejs-stack-220x234.png keywords: - node - javascript - nodejs - git maintainers: - email: [email protected] name: Bitnami name: node sources: - https://github.com/bitnami/bitnami-docker-node - http://nodejs.org/ version: 17.0.7
28.53125
200
0.73713
9f8e909573d0ee41b9fe53556519543b7819d303
33,705
yaml
YAML
bitnami/testlink/values.yaml
00arthur00/charts
502aa1e64541669b732a4eda896e5937847b6c3c
[ "Apache-2.0" ]
null
null
null
bitnami/testlink/values.yaml
00arthur00/charts
502aa1e64541669b732a4eda896e5937847b6c3c
[ "Apache-2.0" ]
2
2022-01-26T01:14:30.000Z
2022-01-26T07:03:39.000Z
bitnami/testlink/values.yaml
00arthur00/charts
502aa1e64541669b732a4eda896e5937847b6c3c
[ "Apache-2.0" ]
null
null
null
## @section Global parameters ## Global Docker image parameters ## Please, note that this will override the image parameters, including dependencies, configured to use the global value ## Current available global Docker image parameters: imageRegistry, imagePullSecrets and storageClass ## @param global.imageRegistry Global Docker image registry ## @param global.imagePullSecrets Global Docker registry secret names as an array ## @param global.storageClass Global StorageClass for Persistent Volume(s) ## global: imageRegistry: "" ## E.g. ## imagePullSecrets: ## - myRegistryKeySecretName ## imagePullSecrets: [] storageClass: "" ## @section Common parameters ## @param kubeVersion Force target Kubernetes version (using Helm capabilities if not set) ## kubeVersion: "" ## @param nameOverride String to partially override testlink.fullname template (will maintain the release name) ## nameOverride: "" ## @param fullnameOverride String to fully override testlink.fullname template ## fullnameOverride: "" ## @param commonAnnotations Common annotations to add to all TestLink resources (sub-charts are not considered). Evaluated as a template ## commonAnnotations: {} ## @param commonLabels Common labels to add to all TestLink resources (sub-charts are not considered). Evaluated as a template ## commonLabels: {} ## @param extraDeploy Array with extra yaml to deploy with the chart. Evaluated as a template ## extraDeploy: [] ## @section TestLink parameters ## Bitnami TestLink image version ## ref: https://hub.docker.com/r/bitnami/testlink/tags/ ## @param image.registry TestLink image registry ## @param image.repository TestLink image repository ## @param image.tag TestLink Image tag (immutable tags are recommended) ## @param image.pullPolicy TestLink image pull policy ## @param image.pullSecrets Specify docker-registry secret names as an array ## @param image.debug Specify if debug logs should be enabled ## image: registry: docker.io repository: bitnami/testlink tag: 1.9.20-debian-10-r669 ## Specify a imagePullPolicy ## Defaults to 'Always' if image tag is 'latest', else set to 'IfNotPresent' ## ref: https://kubernetes.io/docs/user-guide/images/#pre-pulling-images ## pullPolicy: IfNotPresent ## Optionally specify an array of imagePullSecrets. ## Secrets must be manually created in the namespace. ## ref: https://kubernetes.io/docs/tasks/configure-pod-container/pull-image-private-registry/ ## e.g: ## pullSecrets: ## - myRegistryKeySecretName ## pullSecrets: [] ## Set to true if you would like to see extra information on logs ## debug: false ## @param replicaCount Number of replicas (requires ReadWriteMany PVC support) ## replicaCount: 1 ## @param hostAliases [array] Deployment pod host aliases ## https://kubernetes.io/docs/concepts/services-networking/add-entries-to-pod-etc-hosts-with-host-aliases/ ## hostAliases: ## Necessary for apache-exporter to work ## - ip: "127.0.0.1" hostnames: - "status.localhost" ## @param testlinkSkipInstall Skip TestLink installation wizard. Useful for migrations and restoring from SQL dump ## ref: https://github.com/bitnami/bitnami-docker-testlink#configuration ## testlinkSkipInstall: false ## @param testlinkUsername User of the application ## ref: https://github.com/bitnami/bitnami-docker-testlink#configuration ## testlinkUsername: user ## @param testlinkPassword Application password ## Defaults to a random 10-character alphanumeric string if not set ## ref: https://github.com/bitnami/bitnami-docker-testlink#configuration ## testlinkPassword: "" ## @param testlinkEmail Admin email ## ref: https://github.com/bitnami/bitnami-docker-testlink#configuration ## testlinkEmail: [email protected] ## @param testlinkLanguage Default language ## ref: https://github.com/bitnami/bitnami-docker-testlink#environment-variables ## testlinkLanguage: en_US ## @param allowEmptyPassword Allow DB blank passwords ## ref: https://github.com/bitnami/bitnami-docker-testlink#environment-variables ## allowEmptyPassword: true ## @param command Override default container command (useful when using custom images) ## command: [] ## @param args Override default container args (useful when using custom images) ## args: [] ## @param updateStrategy.type Update strategy - only really applicable for deployments with RWO PVs attached ## If replicas = 1, an update can get "stuck", as the previous pod remains attached to the ## PV, and the "incoming" pod can never start. Changing the strategy to "Recreate" will ## terminate the single previous pod, so that the new, incoming pod can attach to the PV ## updateStrategy: type: RollingUpdate ## @param extraEnvVars An array to add extra environment variables ## For example: ## - name: BEARER_AUTH ## value: true ## extraEnvVars: [] ## @param extraEnvVarsCM ConfigMap containing extra environment variables ## extraEnvVarsCM: "" ## @param extraEnvVarsSecret Secret containing extra environment variables ## extraEnvVarsSecret: "" ## @param extraVolumes Extra volumes to add to the deployment. Requires setting `extraVolumeMounts` ## extraVolumes: [] ## @param extraVolumeMounts Extra volume mounts to add to the container. Normally used with `extraVolumes` ## extraVolumeMounts: [] ## @param initContainers Extra init containers to add to the deployment ## initContainers: [] ## @param sidecars Extra sidecar containers to add to the deployment ## sidecars: [] ## @param tolerations Tolerations for pod assignment. Evaluated as a template. ## Ref: https://kubernetes.io/docs/concepts/configuration/taint-and-toleration/ ## tolerations: [] ## @param priorityClassName TestLink pods' priorityClassName ## priorityClassName: "" ## @param schedulerName Name of the k8s scheduler (other than default) ## ref: https://kubernetes.io/docs/tasks/administer-cluster/configure-multiple-schedulers/ ## schedulerName: "" ## @param topologySpreadConstraints Topology Spread Constraints for pod assignment ## https://kubernetes.io/docs/concepts/workloads/pods/pod-topology-spread-constraints/ ## The value is evaluated as a template ## topologySpreadConstraints: [] ## @param existingSecret Use existing secret for the application password ## existingSecret: "" ## SMTP mail delivery configuration ## ref: https://github.com/bitnami/bitnami-docker-testlink/#smtp-configuration ## @param smtpHost SMTP host ## @param smtpPort SMTP port ## @param smtpUser SMTP user ## @param smtpPassword SMTP password ## @param smtpProtocol SMTP Protocol (options: ssl, tls, nil) ## smtpHost: "" smtpPort: "" smtpUser: "" smtpPassword: "" smtpProtocol: "" ## @param containerPorts [object] Container ports ## containerPorts: http: 8080 https: 8443 ## @param sessionAffinity Control where client requests go, to the same pod or round-robin ## Values: ClientIP or None ## ref: https://kubernetes.io/docs/user-guide/services/ ## sessionAffinity: "None" ## Enable persistence using Persistent Volume Claims ## ref: https://kubernetes.io/docs/user-guide/persistent-volumes/ ## persistence: ## @param persistence.enabled Enable persistence using PVC ## enabled: true ## @param persistence.storageClass TestLink Data Persistent Volume Storage Class ## If defined, storageClassName: <storageClass> ## If set to "-", storageClassName: "", which disables dynamic provisioning ## If undefined (the default) or set to null, no storageClassName spec is ## set, choosing the default provisioner. (gp2 on AWS, standard on ## GKE, AWS & OpenStack) ## storageClass: "" ## @param persistence.accessModes PVC Access Mode for TestLink volume ## accessModes: - ReadWriteOnce ## @param persistence.size PVC Storage Request for TestLink volume ## size: 8Gi ## @param persistence.existingClaim An Existing PVC name ## Requires persistence.enabled: true ## If defined, PVC must be created manually before volume will be bound ## existingClaim: "" ## @param persistence.hostPath Host mount path for TestLink volume ## If defined, the testlink-data volume will mount to the specified hostPath ## Requires persistence.enabled: true ## Requires persistence.existingClaim: nil|false ## Default: nil. ## hostPath: "" ## @param persistence.annotations Persistent Volume Claim annotations ## annotations: {} ## @param podAffinityPreset Pod affinity preset. Ignored if `affinity` is set. Allowed values: `soft` or `hard` ## ref: https://kubernetes.io/docs/concepts/scheduling-eviction/assign-pod-node/#inter-pod-affinity-and-anti-affinity ## podAffinityPreset: "" ## @param podAntiAffinityPreset Pod anti-affinity preset. Ignored if `affinity` is set. Allowed values: `soft` or `hard` ## Ref: https://kubernetes.io/docs/concepts/scheduling-eviction/assign-pod-node/#inter-pod-affinity-and-anti-affinity ## podAntiAffinityPreset: soft ## Node affinity preset ## Ref: https://kubernetes.io/docs/concepts/scheduling-eviction/assign-pod-node/#node-affinity ## nodeAffinityPreset: ## @param nodeAffinityPreset.type Node affinity preset type. Ignored if `affinity` is set. Allowed values: `soft` or `hard` ## type: "" ## @param nodeAffinityPreset.key Node label key to match Ignored if `affinity` is set. ## E.g. ## key: "kubernetes.io/e2e-az-name" ## key: "" ## @param nodeAffinityPreset.values Node label values to match. Ignored if `affinity` is set. ## E.g. ## values: ## - e2e-az1 ## - e2e-az2 ## values: [] ## @param affinity Affinity for pod assignment ## Ref: https://kubernetes.io/docs/concepts/configuration/assign-pod-node/#affinity-and-anti-affinity ## Note: podAffinityPreset, podAntiAffinityPreset, and nodeAffinityPreset will be ignored when it's set ## affinity: {} ## @param nodeSelector Node labels for pod assignment. Evaluated as a template. ## ref: https://kubernetes.io/docs/user-guide/node-selection/ ## nodeSelector: {} ## Configure resource requests and limits ## ref: https://kubernetes.io/docs/user-guide/compute-resources/ ## @param resources.requests [object] The requested resources for the container ## @param resources.limits The resources limits for the container ## resources: requests: memory: 512Mi cpu: 300m limits: {} ## Configure Pods Security Context ## ref: https://kubernetes.io/docs/tasks/configure-pod-container/security-context/#set-the-security-context-for-a-pod ## @param podSecurityContext.enabled Enable TestLink pods' Security Context ## @param podSecurityContext.fsGroup TestLink pods' group ID ## podSecurityContext: enabled: true fsGroup: 1001 ## Configure Container Security Context (only main container) ## ref: https://kubernetes.io/docs/tasks/configure-pod-container/security-context/#set-the-security-context-for-a-container ## @param containerSecurityContext.enabled Enable TestLink containers' Security Context ## @param containerSecurityContext.runAsUser TestLink containers' Security Context runAsUser ## @param containerSecurityContext.runAsNonRoot TestLink containers' Security Context runAsNonRoot ## containerSecurityContext: enabled: true runAsUser: 1001 runAsNonRoot: true ## Configure extra options for startup probe ## ref: https://kubernetes.io/docs/tasks/configure-pod-container/configure-liveness-readiness-probes/#configure-probes ## @param startupProbe.enabled Enable startupProbe ## @param startupProbe.path Request path for startupProbe ## @param startupProbe.initialDelaySeconds Initial delay seconds for startupProbe ## @param startupProbe.periodSeconds Period seconds for startupProbe ## @param startupProbe.timeoutSeconds Timeout seconds for startupProbe ## @param startupProbe.failureThreshold Failure threshold for startupProbe ## @param startupProbe.successThreshold Success threshold for startupProbe ## startupProbe: enabled: false path: "/login.php" initialDelaySeconds: 120 periodSeconds: 10 timeoutSeconds: 5 failureThreshold: 6 successThreshold: 1 ## Configure extra options for liveness probe ## ref: https://kubernetes.io/docs/tasks/configure-pod-container/configure-liveness-readiness-probes/#configure-probes ## @param livenessProbe.enabled Enable livenessProbe ## @param livenessProbe.path Request path for livenessProbe ## @param livenessProbe.initialDelaySeconds Initial delay seconds for livenessProbe ## @param livenessProbe.periodSeconds Period seconds for livenessProbe ## @param livenessProbe.timeoutSeconds Timeout seconds for livenessProbe ## @param livenessProbe.failureThreshold Failure threshold for livenessProbe ## @param livenessProbe.successThreshold Success threshold for livenessProbe ## livenessProbe: enabled: true path: "/login.php" initialDelaySeconds: 120 periodSeconds: 10 timeoutSeconds: 5 failureThreshold: 6 successThreshold: 1 ## Configure extra options for readiness probe ## ref: https://kubernetes.io/docs/tasks/configure-pod-container/configure-liveness-readiness-probes/#configure-probes ## @param readinessProbe.enabled Enable readinessProbe ## @param readinessProbe.path Request path for readinessProbe ## @param readinessProbe.initialDelaySeconds Initial delay seconds for readinessProbe ## @param readinessProbe.periodSeconds Period seconds for readinessProbe ## @param readinessProbe.timeoutSeconds Timeout seconds for readinessProbe ## @param readinessProbe.failureThreshold Failure threshold for readinessProbe ## @param readinessProbe.successThreshold Success threshold for readinessProbe ## readinessProbe: enabled: true path: "/login.php" initialDelaySeconds: 30 periodSeconds: 5 timeoutSeconds: 3 failureThreshold: 6 successThreshold: 1 ## @param customStartupProbe Override default startup probe ## customStartupProbe: {} ## @param customLivenessProbe Override default liveness probe ## customLivenessProbe: {} ## @param customReadinessProbe Override default readiness probe ## customReadinessProbe: {} ## @param lifecycleHooks Lifecycle hooks for the container to automate configuration before or after startup ## lifecycleHooks: {} ## @param podAnnotations Pod annotations ## ref: https://kubernetes.io/docs/concepts/overview/working-with-objects/annotations/ ## podAnnotations: {} ## @param podLabels Pod extra labels ## ref: https://kubernetes.io/docs/concepts/overview/working-with-objects/labels/ ## podLabels: {} ## @section Traffic Exposure Parameters ## Kubernetes configuration ## For minikube, set this to NodePort, elsewhere use LoadBalancer ## service: ## @param service.type Kubernetes Service type ## type: LoadBalancer ## @param service.ports.http Service HTTP port ## @param service.ports.https Service HTTPS port ## ports: http: 80 https: 443 ## @param service.clusterIP Service cluster IP ## clusterIP: "" ## @param service.loadBalancerSourceRanges Control hosts connecting to "LoadBalancer" only ## loadBalancerSourceRanges: ## - 0.0.0.0/0 ## loadBalancerSourceRanges: [] ## @param service.loadBalancerIP Load balancer IP for the TestLink Service (optional, cloud specific) ## ref: https://kubernetes.io/docs/user-guide/services/#type-loadbalancer ## loadBalancerIP: "" ## @param service.nodePorts.http Kubernetes HTTP node port ## @param service.nodePorts.https Kubernetes HTTPS node port ## nodePorts: ## http: <to set explicitly, choose port between 30000-32767> ## https: <to set explicitly, choose port between 30000-32767> ## nodePorts: http: "" https: "" ## @param service.externalTrafficPolicy Enable client source IP preservation ## ref https://kubernetes.io/docs/tasks/access-application-cluster/create-external-load-balancer/#preserving-the-client-source-ip ## externalTrafficPolicy: Cluster ## @param service.extraPorts Extra ports to expose (normally used with the `sidecar` value) ## extraPorts: [] ## @param service.annotations Additional custom annotations for TestLink service ## annotations: {} ## @param service.sessionAffinity Session Affinity for Kubernetes service, can be "None" or "ClientIP" ## If "ClientIP", consecutive client requests will be directed to the same Pod ## ref: https://kubernetes.io/docs/concepts/services-networking/service/#virtual-ips-and-service-proxies ## sessionAffinity: None ## @param service.sessionAffinityConfig Additional settings for the sessionAffinity ## sessionAffinityConfig: ## clientIP: ## timeoutSeconds: 300 ## sessionAffinityConfig: {} ## Configure the ingress resource that allows you to access the ## TestLink installation. Set up the URL ## ref: https://kubernetes.io/docs/user-guide/ingress/ ## ingress: ## @param ingress.enabled Enable ingress controller resource ## enabled: false ## @param ingress.pathType Ingress path type ## pathType: ImplementationSpecific ## @param ingress.apiVersion Force Ingress API version (automatically detected if not set) ## apiVersion: "" ## DEPRECATED: Use ingress.annotations instead of ingress.certManager ## certManager: false ## ## @param ingress.hostname Default host for the ingress resource ## hostname: testlink.local ## @param ingress.path Ingress path ## path: / ## @param ingress.annotations Additional annotations for the Ingress resource. To enable certificate autogeneration, place here your cert-manager annotations. ## For a full list of possible ingress annotations, please see ## ref: https://github.com/kubernetes/ingress-nginx/blob/master/docs/user-guide/nginx-configuration/annotations.md ## Use this parameter to set the required annotations for cert-manager, see ## ref: https://cert-manager.io/docs/usage/ingress/#supported-annotations ## ## e.g: ## annotations: ## kubernetes.io/ingress.class: nginx ## cert-manager.io/cluster-issuer: cluster-issuer-name ## annotations: {} ## @param ingress.tls Enable TLS configuration for the host defined at `ingress.hostname` parameter ## TLS certificates will be retrieved from a TLS secret with name: `{{- printf "%s-tls" .Values.ingress.hostname }}` ## You can: ## - Use the `ingress.secrets` parameter to create this TLS secret ## - Relay on cert-manager to create it by setting `ingress.certManager=true` ## - Relay on Helm to create self-signed certificates by setting `ingress.selfSigned=true` ## tls: false ## @param ingress.extraHosts An array with additional hostname(s) to be covered with the ingress record ## e.g: ## extraHosts: ## - name: testlink.local ## path: / ## extraHosts: [] ## @param ingress.extraPaths An array with additional arbitrary paths that may need to be added to the ingress under the main host ## e.g: ## extraPaths: ## - path: /* ## backend: ## serviceName: ssl-redirect ## servicePort: use-annotation ## extraPaths: [] ## @param ingress.extraTls TLS configuration for additional hostname(s) to be covered with this ingress record ## ref: https://kubernetes.io/docs/concepts/services-networking/ingress/#tls ## e.g: ## extraTls: ## - hosts: ## - testlink.local ## secretName: testlink.local-tls ## extraTls: [] ## @param ingress.secrets If you're providing your own certificates, please use this to add the certificates as secrets ## key and certificate should start with -----BEGIN CERTIFICATE----- or ## -----BEGIN RSA PRIVATE KEY----- ## ## name should line up with a tlsSecret set further up ## If you're using cert-manager, this is unneeded, as it will create the secret for you if it is not set ## ## It is also possible to create and manage the certificates outside of this helm chart ## Please see README.md for more information ## e.g: ## - name: testlink.local-tls ## key: ## certificate: ## secrets: [] ## @param ingress.ingressClassName IngressClass that will be be used to implement the Ingress (Kubernetes 1.18+) ## This is supported in Kubernetes 1.18+ and required if you have more than one IngressClass marked as the default for your cluster . ## ref: https://kubernetes.io/blog/2020/04/02/improvements-to-the-ingress-api-in-kubernetes-1.18/ ## ingressClassName: "" ## @section NetworkPolicy parameters ## Add networkpolicies ## networkPolicy: ## @param networkPolicy.enabled Enable network policies ## If ingress.enabled or metrics.enabled are true, configure networkPolicy.ingress and networkPolicy.metrics selectors respectively to allow communication ## enabled: false ## @param networkPolicy.metrics.enabled Enable network policy for metrics (prometheus) ## @param networkPolicy.metrics.namespaceSelector [object] Monitoring namespace selector labels. These labels will be used to identify the prometheus' namespace. ## @param networkPolicy.metrics.podSelector [object] Monitoring pod selector labels. These labels will be used to identify the Prometheus pods. ## metrics: enabled: false ## e.g: ## podSelector: ## label: monitoring ## podSelector: {} ## e.g: ## namespaceSelector: ## label: monitoring ## namespaceSelector: {} ## @param networkPolicy.ingress.enabled Enable network policy for Ingress Proxies ## @param networkPolicy.ingress.namespaceSelector [object] Ingress Proxy namespace selector labels. These labels will be used to identify the Ingress Proxy's namespace. ## @param networkPolicy.ingress.podSelector [object] Ingress Proxy pods selector labels. These labels will be used to identify the Ingress Proxy pods. ## ingress: enabled: false ## e.g: ## podSelector: ## label: ingress ## podSelector: {} ## e.g: ## namespaceSelector: ## label: ingress ## namespaceSelector: {} ## @param networkPolicy.ingressRules.backendOnlyAccessibleByFrontend Enable ingress rule that makes the backend (mariadb) only accessible by testlink's pods. ## @param networkPolicy.ingressRules.customBackendSelector [object] Backend selector labels. These labels will be used to identify the backend pods. ## @param networkPolicy.ingressRules.accessOnlyFrom.enabled Enable ingress rule that makes testlink only accessible from a particular origin ## @param networkPolicy.ingressRules.accessOnlyFrom.namespaceSelector [object] Namespace selector label that is allowed to access testlink. This label will be used to identified the allowed namespace(s). ## @param networkPolicy.ingressRules.accessOnlyFrom.podSelector [object] Pods selector label that is allowed to access testlink. This label will be used to identified the allowed pod(s). ## @param networkPolicy.ingressRules.customRules [object] Custom network policy ingress rule ## ingressRules: ## mariadb backend only can be accessed from testlink ## backendOnlyAccessibleByFrontend: false ## Additional custom backend selector ## e.g: ## customBackendSelector: ## - to: ## - namespaceSelector: ## matchLabels: ## label: example ## customBackendSelector: {} ## Allow only from the indicated: accessOnlyFrom: enabled: false ## e.g: ## podSelector: ## label: access ## podSelector: {} ## e.g: ## namespaceSelector: ## label: access ## namespaceSelector: {} ## custom ingress rules ## e.g: ## customRules: ## - from: ## - namespaceSelector: ## matchLabels: ## label: example customRules: {} ## @param networkPolicy.egressRules.denyConnectionsToExternal Enable egress rule that denies outgoing traffic outside the cluster, except for DNS (port 53). ## @param networkPolicy.egressRules.customRules Custom network policy rule ## egressRules: # Deny connections to external. This is not compatible with an external database. denyConnectionsToExternal: false ## Additional custom egress rules ## e.g: ## customRules: ## - to: ## - namespaceSelector: ## matchLabels: ## label: example customRules: {} ## @section Database parameters ## MariaDB chart configuration ## https://github.com/bitnami/charts/blob/master/bitnami/mariadb/values.yaml ## mariadb: ## @param mariadb.enabled Whether to deploy a mariadb server to satisfy the applications database requirements ## To use an external database set this to false and configure the externalDatabase parameters ## enabled: true ## @param mariadb.architecture MariaDB architecture. Allowed values: `standalone` or `replication` ## architecture: standalone ## MariaDB Authentication parameters ## auth: ## @param mariadb.auth.rootPassword Password for the MariaDB `root` user ## ref: https://github.com/bitnami/bitnami-docker-mariadb#setting-the-root-password-on-first-run ## rootPassword: "" ## @param mariadb.auth.database Database name to create ## ref: https://github.com/bitnami/bitnami-docker-mariadb/blob/master/README.md#creating-a-database-on-first-run ## database: bitnami_testlink ## @param mariadb.auth.username Database user to create ## ref: https://github.com/bitnami/bitnami-docker-mariadb/blob/master/README.md#creating-a-database-user-on-first-run ## username: bn_testlink ## @param mariadb.auth.password Password for the database ## password: "" primary: ## Enable persistence using Persistent Volume Claims ## ref: https://kubernetes.io/docs/user-guide/persistent-volumes/ ## persistence: ## @param mariadb.primary.persistence.enabled Enable database persistence using PVC ## enabled: true ## @param mariadb.primary.persistence.storageClass MariaDB primary persistent volume storage Class ## If defined, storageClassName: <storageClass> ## If set to "-", storageClassName: "", which disables dynamic provisioning ## If undefined (the default) or set to null, no storageClassName spec is ## set, choosing the default provisioner. (gp2 on AWS, standard on ## GKE, AWS & OpenStack) ## storageClass: "" ## @param mariadb.primary.persistence.accessModes Database Persistent Volume Access Modes ## accessModes: - ReadWriteOnce ## @param mariadb.primary.persistence.size Database Persistent Volume Size ## size: 8Gi ## @param mariadb.primary.persistence.hostPath Set path in case you want to use local host path volumes (not recommended in production) ## hostPath: "" ## @param mariadb.primary.persistence.existingClaim Name of an existing `PersistentVolumeClaim` for MariaDB primary replicas ## existingClaim: "" ## External database configuration ## externalDatabase: ## @param externalDatabase.host Host of the existing database ## host: "" ## @param externalDatabase.port Port of the existing database ## port: 3306 ## @param externalDatabase.user Existing username in the external database ## user: bn_testlink ## @param externalDatabase.password Password for the above username ## password: "" ## @param externalDatabase.database Name of the existing database ## database: bitnami_testlink ## @param externalDatabase.existingSecret Name of an existing secret resource containing the DB password ## existingSecret: "" ## @section Volume Permissions parameters ## Init containers parameters: ## volumePermissions: Change the owner and group of the persistent volume mountpoint to runAsUser:fsGroup values from the securityContext section. ## volumePermissions: ## @param volumePermissions.enabled Enable init container that changes volume permissions in the data directory (for cases where the default k8s `runAsUser` and `fsUser` values do not work) ## enabled: false ## @param volumePermissions.image.registry Init container volume-permissions image registry ## @param volumePermissions.image.repository Init container volume-permissions image repository ## @param volumePermissions.image.tag Init container volume-permissions image tag (immutable tags are recommended) ## @param volumePermissions.image.pullPolicy Init container volume-permissions image pull policy ## @param volumePermissions.image.pullSecrets Specify docker-registry secret names as an array ## image: registry: docker.io repository: bitnami/bitnami-shell tag: 10-debian-10-r366 pullPolicy: IfNotPresent ## Optionally specify an array of imagePullSecrets. ## Secrets must be manually created in the namespace. ## ref: https://kubernetes.io/docs/tasks/configure-pod-container/pull-image-private-registry/ ## e.g: ## pullSecrets: ## - myRegistryKeySecretName ## pullSecrets: [] ## Init containers' resource requests and limits ## ref: https://kubernetes.io/docs/user-guide/compute-resources/ ## We usually recommend not to specify default resources and to leave this as a conscious ## choice for the user. This also increases chances charts run on environments with little ## resources, such as Minikube. If you do want to specify resources, uncomment the following ## lines, adjust them as necessary, and remove the curly braces after 'resources:'. ## @param volumePermissions.resources.limits The resources limits for the container ## @param volumePermissions.resources.requests The requested resources for the container ## resources: ## Example: ## limits: ## cpu: 100m ## memory: 128Mi limits: {} ## Examples: ## requests: ## cpu: 100m ## memory: 128Mi requests: {} ## @section Metrics parameters ## Prometheus Exporter / Metrics ## metrics: ## @param metrics.enabled Start a side-car prometheus exporter ## enabled: false ## @param metrics.image.registry Apache exporter image registry ## @param metrics.image.repository Apache exporter image repository ## @param metrics.image.tag Apache exporter image tag (immutable tags are recommended) ## @param metrics.image.pullPolicy Image pull policy ## @param metrics.image.pullSecrets Specify docker-registry secret names as an array ## image: registry: docker.io repository: bitnami/apache-exporter tag: 0.11.0-debian-10-r85 pullPolicy: IfNotPresent ## Optionally specify an array of imagePullSecrets. ## Secrets must be manually created in the namespace. ## ref: https://kubernetes.io/docs/tasks/configure-pod-container/pull-image-private-registry/ ## e.g: ## pullSecrets: ## - myRegistryKeySecretName ## pullSecrets: [] ## @param metrics.resources Metrics exporter resource requests and limits ## ref: https://kubernetes.io/docs/user-guide/compute-resources/ ## resources: {} ## @param metrics.podAnnotations [object] Additional annotations for Metrics exporter pod ## podAnnotations: prometheus.io/scrape: "true" prometheus.io/port: "9117" ## @section Certificate injection parameters ## Add custom certificates and certificate authorities to redmine container ## certificates: ## @param certificates.customCertificate.certificateSecret Secret containing the certificate and key to add ## @param certificates.customCertificate.chainSecret.name Name of the secret containing the certificate chain ## @param certificates.customCertificate.chainSecret.key Key of the certificate chain file inside the secret ## @param certificates.customCertificate.certificateLocation Location in the container to store the certificate ## @param certificates.customCertificate.keyLocation Location in the container to store the private key ## @param certificates.customCertificate.chainLocation Location in the container to store the certificate chain ## customCertificate: certificateSecret: "" chainSecret: name: "" key: "" certificateLocation: /etc/ssl/certs/ssl-cert-snakeoil.pem keyLocation: /etc/ssl/private/ssl-cert-snakeoil.key chainLocation: /etc/ssl/certs/mychain.pem ## @param certificates.customCAs Defines a list of secrets to import into the container trust store ## customCAs: [] ## @param certificates.command Override default container command (useful when using custom images) ## command: [] ## @param certificates.args Override default container args (useful when using custom images) ## e.g: ## - secret: custom-CA ## - secret: more-custom-CAs ## args: [] ## @param certificates.extraEnvVars Container sidecar extra environment variables (eg proxy) ## extraEnvVars: [] ## @param certificates.extraEnvVarsCM ConfigMap containing extra env vars ## extraEnvVarsCM: "" ## @param certificates.extraEnvVarsSecret Secret containing extra env vars (in case of sensitive data) ## extraEnvVarsSecret: "" ## @param certificates.image.registry Container sidecar registry ## @param certificates.image.repository Container sidecar image repository ## @param certificates.image.tag Container sidecar image tag (immutable tags are recommended) ## @param certificates.image.pullPolicy Container sidecar image pull policy ## @param certificates.image.pullSecrets Container sidecar image pull secrets ## image: registry: docker.io repository: bitnami/bitnami-shell tag: 10-debian-10-r366 ## Specify a imagePullPolicy ## Defaults to 'Always' if image tag is 'latest', else set to 'IfNotPresent' ## ref: https://kubernetes.io/docs/user-guide/images/#pre-pulling-images ## pullPolicy: IfNotPresent ## Optionally specify an array of imagePullSecrets. ## Secrets must be manually created in the namespace. ## ref: https://kubernetes.io/docs/tasks/configure-pod-container/pull-image-private-registry/ ## e.g: ## pullSecrets: ## - myRegistryKeySecretName ## pullSecrets: []
40.029691
205
0.739416
6b63ad3ca7f59f1a54d2bbd537e5a748510c9cc9
802
yaml
YAML
bitnami/redis/Chart.yaml
00arthur00/charts
502aa1e64541669b732a4eda896e5937847b6c3c
[ "Apache-2.0" ]
null
null
null
bitnami/redis/Chart.yaml
00arthur00/charts
502aa1e64541669b732a4eda896e5937847b6c3c
[ "Apache-2.0" ]
2
2022-01-26T01:14:30.000Z
2022-01-26T07:03:39.000Z
bitnami/redis/Chart.yaml
00arthur00/charts
502aa1e64541669b732a4eda896e5937847b6c3c
[ "Apache-2.0" ]
null
null
null
annotations: category: Database apiVersion: v2 appVersion: 6.2.6 dependencies: - name: common repository: https://charts.bitnami.com/bitnami tags: - bitnami-common version: 1.x.x description: Redis(TM) is an open source, advanced key-value store. It is often referred to as a data structure server since keys can contain strings, hashes, lists, sets and sorted sets. engine: gotpl home: https://github.com/bitnami/charts/tree/master/bitnami/redis icon: https://bitnami.com/assets/stacks/redis/img/redis-stack-220x234.png keywords: - redis - keyvalue - database maintainers: - email: [email protected] name: Bitnami - email: [email protected] name: desaintmartin name: redis sources: - https://github.com/bitnami/bitnami-docker-redis version: 16.5.3
28.642857
187
0.741895
6b7ea729f9bf33a8f13b1c22d81b4d9bbb699f93
35,919
yaml
YAML
bitnami/osclass/values.yaml
00arthur00/charts
502aa1e64541669b732a4eda896e5937847b6c3c
[ "Apache-2.0" ]
null
null
null
bitnami/osclass/values.yaml
00arthur00/charts
502aa1e64541669b732a4eda896e5937847b6c3c
[ "Apache-2.0" ]
2
2022-01-26T01:14:30.000Z
2022-01-26T07:03:39.000Z
bitnami/osclass/values.yaml
00arthur00/charts
502aa1e64541669b732a4eda896e5937847b6c3c
[ "Apache-2.0" ]
null
null
null
## @section Global parameters ## Global Docker image parameters ## Please, note that this will override the image parameters, including dependencies, configured to use the global value ## Current available global Docker image parameters: imageRegistry, imagePullSecrets and storageClass ## ## @param global.imageRegistry Global Docker image registry ## @param global.imagePullSecrets Global Docker registry secret names as an array ## @param global.storageClass Global StorageClass for Persistent Volume(s) ## global: imageRegistry: "" ## E.g. ## imagePullSecrets: ## - myRegistryKeySecretName ## imagePullSecrets: [] storageClass: "" ## @section Common parameters ## ## @param kubeVersion Override Kubernetes version ## kubeVersion: "" ## @param nameOverride String to partially override common.names.fullname ## nameOverride: "" ## @param fullnameOverride String to fully override common.names.fullname ## fullnameOverride: "" ## @param commonAnnotations Annotations to add to all deployed objects ## commonAnnotations: {} ## @param commonLabels Labels to add to all deployed objects ## commonLabels: {} ## @param extraDeploy Array of extra objects to deploy with the release ## extraDeploy: [] ## @section Osclass Image parameters ## ## Bitnami Osclass image version ## ref: https://hub.docker.com/r/bitnami/osclass/tags/ ## @param image.registry Osclass image registry ## @param image.repository Osclass image repository ## @param image.tag Osclass image tag (immutable tags are recommended) ## @param image.pullPolicy Osclass image pull policy ## @param image.pullSecrets Osclass image pull secrets ## @param image.debug Enable Bitnami debug mode in Osclass image ## image: registry: docker.io repository: bitnami/osclass tag: 8.0.1-debian-10-r67 ## Specify a imagePullPolicy ## Defaults to 'Always' if image tag is 'latest', else set to 'IfNotPresent' ## ref: https://kubernetes.io/docs/user-guide/images/#pre-pulling-images ## pullPolicy: IfNotPresent ## Optionally specify an array of imagePullSecrets. ## Secrets must be manually created in the namespace. ## ref: https://kubernetes.io/docs/tasks/configure-pod-container/pull-image-private-registry/ ## pullSecrets: [] # - myRegistryKeySecretName ## Set to true if you would like to see extra information on logs ## debug: false ## @section Osclass Configuration parameters ## ## @param osclassSkipInstall Skip wizard installation ## NOTE: useful if you use an external database that already contains Osclass data ## ref: https://github.com/bitnami/bitnami-docker-osclass#connect-osclass-docker-container-to-an-existing-database ## osclassSkipInstall: false ## @param osclassUsername Osclass username ## osclassUsername: user ## @param osclassSiteTitle Osclass site title ## osclassSiteTitle: user ## @param osclassPassword Osclass user password ## Defaults to a random 10-character alphanumeric string if not set ## osclassPassword: "" ## @param osclassEmail Osclass user email ## osclassEmail: [email protected] ## @param existingSecret Name of existing secret containing Osclass credentials ## NOTE: Must contain key `osclass-password` ## NOTE: When it's set, the `osclassPassword` parameter is ignored ## existingSecret: "" ## @param allowEmptyPassword Allow the container to be started with blank passwords ## allowEmptyPassword: true ## SMTP mail delivery configuration ## ref: https://github.com/bitnami/bitnami-docker-osclass/#smtp-configuration ## @param smtpHost SMTP server host ## @param smtpPort SMTP server port ## @param smtpUser SMTP username ## @param smtpPassword SMTP user password ## @param smtpProtocol SMTP protocol ## smtpHost: "" smtpPort: "" smtpUser: "" smtpPassword: "" smtpProtocol: "" ## @section Osclass deployment parameters ## ## @param hostAliases [array] Osclass pod host aliases ## https://kubernetes.io/docs/concepts/services-networking/add-entries-to-pod-etc-hosts-with-host-aliases/ ## hostAliases: # Necessary for apache-exporter to work - ip: "127.0.0.1" hostnames: - "status.localhost" ## Configure Pods Security Context ## ref: https://kubernetes.io/docs/tasks/configure-pod-container/security-context/#set-the-security-context-for-a-pod ## @param podSecurityContext.enabled Enabled Osclass pods' Security Context ## @param podSecurityContext.fsGroup Set Osclass pod's Security Context fsGroup ## podSecurityContext: enabled: true fsGroup: 1001 ## Configure Container Security Context (only main container) ## ref: https://kubernetes.io/docs/tasks/configure-pod-container/security-context/#set-the-security-context-for-a-container ## @param containerSecurityContext.enabled Enabled Osclass containers' Security Context ## @param containerSecurityContext.runAsUser Set Osclass container's Security Context runAsUser ## @param containerSecurityContext.runAsNonRoot Set Osclass container's Security Context runAsNonRoot ## containerSecurityContext: enabled: true runAsUser: 1001 runAsNonRoot: true ## Configure extra options for Osclass containers' liveness, readiness and startup probes ## ref: https://kubernetes.io/docs/tasks/configure-pod-container/configure-liveness-readiness-probes/#configure-probes ## @param startupProbe.enabled Enable startupProbe ## @param startupProbe.path Path for the HTTP probe ## @param startupProbe.initialDelaySeconds Initial delay seconds for startupProbe ## @param startupProbe.periodSeconds Period seconds for startupProbe ## @param startupProbe.timeoutSeconds Timeout seconds for startupProbe ## @param startupProbe.failureThreshold Failure threshold for startupProbe ## @param startupProbe.successThreshold Success threshold for startupProbe ## startupProbe: enabled: false path: /oc-admin initialDelaySeconds: 600 periodSeconds: 10 timeoutSeconds: 5 failureThreshold: 5 successThreshold: 1 ## @param livenessProbe.enabled Enable livenessProbe ## @param livenessProbe.path Path for the HTTP probe ## @param livenessProbe.initialDelaySeconds Initial delay seconds for livenessProbe ## @param livenessProbe.periodSeconds Period seconds for livenessProbe ## @param livenessProbe.timeoutSeconds Timeout seconds for livenessProbe ## @param livenessProbe.failureThreshold Failure threshold for livenessProbe ## @param livenessProbe.successThreshold Success threshold for livenessProbe ## livenessProbe: enabled: true path: /oc-admin initialDelaySeconds: 600 periodSeconds: 10 timeoutSeconds: 5 failureThreshold: 5 successThreshold: 1 ## @param readinessProbe.enabled Enable readinessProbe ## @param readinessProbe.path Path for the HTTP probe ## @param readinessProbe.initialDelaySeconds Initial delay seconds for readinessProbe ## @param readinessProbe.periodSeconds Period seconds for readinessProbe ## @param readinessProbe.timeoutSeconds Timeout seconds for readinessProbe ## @param readinessProbe.failureThreshold Failure threshold for readinessProbe ## @param readinessProbe.successThreshold Success threshold for readinessProbe ## readinessProbe: enabled: true path: /oc-admin initialDelaySeconds: 30 periodSeconds: 5 timeoutSeconds: 1 failureThreshold: 5 successThreshold: 1 ## @param customStartupProbe Custom livenessProbe that overrides the default one ## customStartupProbe: {} ## @param customLivenessProbe Custom livenessProbe that overrides the default one ## customLivenessProbe: {} ## @param customReadinessProbe Custom readinessProbe that overrides the default one ## customReadinessProbe: {} ## Add custom certificates and certificate authorities to Osclass container ## certificates: customCertificate: ## @param certificates.customCertificate.certificateSecret name of the secret with custom certificates ## certificateSecret: "" ## @param certificates.customCertificate.chainSecret.name name of the secret with the chain ## @param certificates.customCertificate.chainSecret.key key of the secret with the chain ## chainSecret: name: "" key: "" ## @param certificates.customCertificate.certificateLocation Location of the certificate inside the container ## certificateLocation: /etc/ssl/certs/ssl-cert-snakeoil.pem ## @param certificates.customCertificate.keyLocation Location of the certificate key inside the container ## keyLocation: /etc/ssl/private/ssl-cert-snakeoil.key ## @param certificates.customCertificate.chainLocation Location of the certificate chain inside the container ## chainLocation: /etc/ssl/certs/mychain.pem ## @param certificates.customCAs Array with custom CAs ## customCAs: [] ## @param certificates.command Override certificate container command ## command: [] ## Override container args ## @param certificates.args Override certificate container args ## args: [] ## @param certificates.extraEnvVars An array to add extra env vars ## extraEnvVars: [] ## @param certificates.extraEnvVarsCM ConfigMap with extra environment variables ## extraEnvVarsCM: "" ## @param certificates.extraEnvVarsSecret Secret with extra environment variables ## extraEnvVarsSecret: "" ## Bitnami Apache Exporter image ## ref: https://hub.docker.com/r/bitnami/apache-exporter/tags/ ## @param certificates.image.registry Apache Exporter image registry ## @param certificates.image.repository Apache Exporter image repository ## @param certificates.image.tag Apache Exporter image tag (immutable tags are recommended) ## @param certificates.image.pullPolicy Apache Exporter image pull policy ## @param certificates.image.pullSecrets Apache Exporter image pull secrets ## image: registry: docker.io repository: bitnami/bitnami-shell tag: 10-debian-10-r366 ## Specify a imagePullPolicy ## Defaults to 'Always' if image tag is 'latest', else set to 'IfNotPresent' ## ref: https://kubernetes.io/docs/user-guide/images/#pre-pulling-images ## pullPolicy: IfNotPresent # pullPolicy: pullSecrets: [] # - myRegistryKeySecretName ## @param lifecycleHooks lifecycleHooks for the container to automate configuration before or after startup. ## lifecycleHooks: {} ## @param podAnnotations Annotations for Osclass pods ## ref: https://kubernetes.io/docs/concepts/overview/working-with-objects/annotations/ ## podAnnotations: {} ## @param podLabels Extra labels for Osclass pods ## ref: https://kubernetes.io/docs/concepts/overview/working-with-objects/labels/ ## podLabels: {} ## @param replicaCount Number of Osclass replicas to deploy ## NOTE: ReadWriteMany PVC(s) are required if replicaCount > 1 ## replicaCount: 1 ## Container ports ## @param containerPorts.http Osclass HTTP container port ## @param containerPorts.https Osclass HTTPS container port ## containerPorts: http: 8080 https: 8443 ## @param command Override default container command (useful when using custom images) ## command: [] ## @param args Override default container args (useful when using custom images) ## args: [] ## @param updateStrategy.type Osclass deployment strategy type ## @param updateStrategy.rollingUpdate Osclass deployment rolling update configuration parameters ## ref: https://kubernetes.io/docs/concepts/workloads/controllers/deployment/#strategy ## NOTE: Set it to `Recreate` if you use a PV that cannot be mounted on multiple pods ## e.g: ## updateStrategy: ## type: RollingUpdate ## rollingUpdate: ## maxSurge: 25% ## maxUnavailable: 25% ## updateStrategy: type: RollingUpdate rollingUpdate: {} ## @param extraEnvVars Array with extra environment variables to add to the Osclass container ## e.g: ## extraEnvVars: ## - name: FOO ## value: "bar" ## extraEnvVars: [] ## @param extraEnvVarsCM Name of existing ConfigMap containing extra env vars ## extraEnvVarsCM: "" ## @param extraEnvVarsSecret Name of existing Secret containing extra env vars ## extraEnvVarsSecret: "" ## @param extraVolumes Optionally specify extra list of additional volumes for Osclass pods ## extraVolumes: [] ## @param extraVolumeMounts Optionally specify extra list of additional volumeMounts for Osclass container(s) ## extraVolumeMounts: [] ## @param initContainers Add additional init containers to the Osclass pods ## ref: https://kubernetes.io/docs/concepts/workloads/pods/init-containers/ ## e.g: ## initContainers: ## - name: your-image-name ## image: your-image ## imagePullPolicy: Always ## command: ['sh', '-c', 'copy themes and plugins from git and push to /bitnami/osclass/wp-content. Should work with extraVolumeMounts and extraVolumes'] ## initContainers: [] ## @param sidecars Add additional sidecar containers to the Osclass pod ## e.g: ## sidecars: ## - name: your-image-name ## image: your-image ## imagePullPolicy: Always ## ports: ## - name: portname ## containerPort: 1234 ## sidecars: [] ## @param podAffinityPreset Pod affinity preset. Ignored if `affinity` is set. Allowed values: `soft` or `hard` ## ref: https://kubernetes.io/docs/concepts/scheduling-eviction/assign-pod-node/#inter-pod-affinity-and-anti-affinity ## podAffinityPreset: "" ## @param podAntiAffinityPreset Pod anti-affinity preset. Ignored if `affinity` is set. Allowed values: `soft` or `hard` ## Ref: https://kubernetes.io/docs/concepts/scheduling-eviction/assign-pod-node/#inter-pod-affinity-and-anti-affinity ## podAntiAffinityPreset: soft ## Node affinity preset ## Ref: https://kubernetes.io/docs/concepts/scheduling-eviction/assign-pod-node/#node-affinity ## nodeAffinityPreset: ## @param nodeAffinityPreset.type Node affinity preset type. Ignored if `affinity` is set. Allowed values: `soft` or `hard` ## type: "" ## @param nodeAffinityPreset.key Node label key to match. Ignored if `affinity` is set ## key: "" ## @param nodeAffinityPreset.values Node label values to match. Ignored if `affinity` is set ## E.g. ## values: ## - e2e-az1 ## - e2e-az2 ## values: [] ## @param affinity Affinity for pod assignment ## Ref: https://kubernetes.io/docs/concepts/configuration/assign-pod-node/#affinity-and-anti-affinity ## NOTE: podAffinityPreset, podAntiAffinityPreset, and nodeAffinityPreset will be ignored when it's set ## affinity: {} ## @param nodeSelector Node labels for pod assignment ## ref: https://kubernetes.io/docs/user-guide/node-selection/ ## nodeSelector: {} ## Osclass containers' resource requests and limits ## ref: https://kubernetes.io/docs/user-guide/compute-resources/ ## @param resources.limits The resources limits for the Osclass container ## @param resources.requests [object] The requested resources for the Osclass container ## resources: requests: memory: 512Mi cpu: 300m limits: {} ## @param tolerations Tolerations for pod assignment ## ref: https://kubernetes.io/docs/concepts/configuration/taint-and-toleration/ ## tolerations: [] ## @param priorityClassName Osclass pods' priorityClassName ## priorityClassName: "" ## @param schedulerName Name of the k8s scheduler (other than default) ## ref: https://kubernetes.io/docs/tasks/administer-cluster/configure-multiple-schedulers/ ## schedulerName: "" ## @param topologySpreadConstraints Topology Spread Constraints for pod assignment ## https://kubernetes.io/docs/concepts/workloads/pods/pod-topology-spread-constraints/ ## The value is evaluated as a template ## topologySpreadConstraints: [] ## @section Traffic Exposure Parameters ## ## Osclass service parameters ## service: ## @param service.type Osclass service type ## type: LoadBalancer ## @param service.ports.http Osclass service HTTP port ## @param service.ports.https Osclass service HTTPS port ## ports: http: 80 https: 443 ## @param service.clusterIP Osclass service Cluster IP ## e.g.: ## clusterIP: None ## clusterIP: "" ## @param service.loadBalancerIP Osclass service Load Balancer IP ## ref: https://kubernetes.io/docs/concepts/services-networking/service/#type-loadbalancer ## loadBalancerIP: "" ## @param service.loadBalancerSourceRanges Osclass service Load Balancer sources ## ref: https://kubernetes.io/docs/tasks/access-application-cluster/configure-cloud-provider-firewall/#restrict-access-for-loadbalancer-service ## e.g: ## loadBalancerSourceRanges: ## - 10.10.10.0/24 ## loadBalancerSourceRanges: [] ## @param service.extraPorts Extra ports to expose (normally used with the `sidecar` value) ## extraPorts: [] ## @param service.annotations Additional custom annotations for Osclass service ## annotations: {} ## @param service.sessionAffinity Control where client requests go, to the same pod or round-robin ## Values: ClientIP or None ## ref: https://kubernetes.io/docs/user-guide/services/ ## sessionAffinity: "None" ## @param service.sessionAffinityConfig Additional settings for the sessionAffinity ## sessionAffinityConfig: ## clientIP: ## timeoutSeconds: 300 sessionAffinityConfig: {} ## Node ports to expose ## @param service.nodePorts.http Node port for HTTP ## @param service.nodePorts.https Node port for HTTPS ## NOTE: choose port between <30000-32767> ## nodePorts: http: "" https: "" ## @param service.externalTrafficPolicy Osclass service external traffic policy ## ref https://kubernetes.io/docs/tasks/access-application-cluster/create-external-load-balancer/#preserving-the-client-source-ip ## externalTrafficPolicy: Cluster ## Configure the ingress resource that allows you to access the Osclass installation ## ref: https://kubernetes.io/docs/concepts/services-networking/ingress/ ## ingress: ## @param ingress.enabled Enable ingress record generation for Osclass ## enabled: false ## DEPRECATED: Use ingress.annotations instead of ingress.certManager ## certManager: false ## ## @param ingress.pathType Ingress path type ## pathType: ImplementationSpecific ## @param ingress.apiVersion Force Ingress API version (automatically detected if not set) ## apiVersion: "" ## @param ingress.hostname Default host for the ingress record ## hostname: osclass.local ## @param ingress.path Default path for the ingress record ## NOTE: You may need to set this to '/*' in order to use this with ALB ingress controllers ## path: / ## @param ingress.annotations Additional annotations for the Ingress resource. To enable certificate autogeneration, place here your cert-manager annotations. ## For a full list of possible ingress annotations, please see ## ref: https://github.com/kubernetes/ingress-nginx/blob/master/docs/user-guide/nginx-configuration/annotations.md ## Use this parameter to set the required annotations for cert-manager, see ## ref: https://cert-manager.io/docs/usage/ingress/#supported-annotations ## ## e.g: ## annotations: ## kubernetes.io/ingress.class: nginx ## cert-manager.io/cluster-issuer: cluster-issuer-name ## annotations: {} ## @param ingress.tls Enable TLS configuration for the host defined at `ingress.hostname` parameter ## TLS certificates will be retrieved from a TLS secret with name: `{{- printf "%s-tls" .Values.ingress.hostname }}` ## You can: ## - Use the `ingress.secrets` parameter to create this TLS secret ## - Relay on cert-manager to create it by setting the corresponding annotations ## - Relay on Helm to create self-signed certificates by setting `ingress.tls=true` and `ingress.certManager=false` ## tls: false ## @param ingress.extraHosts An array with additional hostname(s) to be covered with the ingress record ## e.g: ## extraHosts: ## - name: osclass.local ## path: / ## extraHosts: [] ## @param ingress.extraPaths An array with additional arbitrary paths that may need to be added to the ingress under the main host ## e.g: ## extraPaths: ## - path: /* ## backend: ## serviceName: ssl-redirect ## servicePort: use-annotation ## extraPaths: [] ## @param ingress.extraTls TLS configuration for additional hostname(s) to be covered with this ingress record ## ref: https://kubernetes.io/docs/concepts/services-networking/ingress/#tls ## e.g: ## extraTls: ## - hosts: ## - osclass.local ## secretName: osclass.local-tls ## extraTls: [] ## @param ingress.secrets Custom TLS certificates as secrets ## NOTE: 'key' and 'certificate' are expected in PEM format ## NOTE: 'name' should line up with a 'secretName' set further up ## If it is not set and you're using cert-manager, this is unneeded, as it will create a secret for you with valid certificates ## If it is not set and you're NOT using cert-manager either, self-signed certificates will be created valid for 365 days ## It is also possible to create and manage the certificates outside of this helm chart ## Please see README.md for more information ## e.g: ## secrets: ## - name: osclass.local-tls ## key: |- ## -----BEGIN RSA PRIVATE KEY----- ## ... ## -----END RSA PRIVATE KEY----- ## certificate: |- ## -----BEGIN CERTIFICATE----- ## ... ## -----END CERTIFICATE----- ## secrets: [] ## @param ingress.ingressClassName IngressClass that will be be used to implement the Ingress (Kubernetes 1.18+) ## This is supported in Kubernetes 1.18+ and required if you have more than one IngressClass marked as the default for your cluster . ## ref: https://kubernetes.io/blog/2020/04/02/improvements-to-the-ingress-api-in-kubernetes-1.18/ ## ingressClassName: "" ## @section Database Parameters ## ## External Database Configuration ## All of these values are only used if `mariadb.enabled=false` ## externalDatabase: ## @param externalDatabase.host External Database server host ## host: "" ## @param externalDatabase.port External Database server port ## port: 3306 ## @param externalDatabase.user External Database username ## user: bn_osclass ## @param externalDatabase.password External Database user password ## password: "" ## @param externalDatabase.database External Database database name ## database: bitnami_osclass ## @param externalDatabase.existingSecret Name of an existing secret resource containing the DB password ## existingSecret: "" ## ## MariaDB chart configuration ## ## https://github.com/bitnami/charts/blob/master/bitnami/mariadb/values.yaml ## mariadb: ## @param mariadb.enabled Deploy a MariaDB server to satisfy the applications database requirements ## To use an external database set this to false and configure the `externalDatabase.*` parameters ## enabled: true ## @param mariadb.architecture MariaDB architecture. Allowed values: `standalone` or `replication` ## architecture: standalone ## MariaDB Authentication parameters ## @param mariadb.auth.rootPassword MariaDB root password ## @param mariadb.auth.database MariaDB custom database ## @param mariadb.auth.username MariaDB custom user name ## @param mariadb.auth.password MariaDB custom user password ## ref: https://github.com/bitnami/bitnami-docker-mariadb#setting-the-root-password-on-first-run ## https://github.com/bitnami/bitnami-docker-mariadb/blob/master/README.md#creating-a-database-on-first-run ## https://github.com/bitnami/bitnami-docker-mariadb/blob/master/README.md#creating-a-database-user-on-first-run ## auth: rootPassword: "" database: bitnami_osclass username: bn_osclass password: "" ## MariaDB Primary configuration ## primary: ## MariaDB Primary Persistence parameters ## ref: https://kubernetes.io/docs/user-guide/persistent-volumes/ ## @param mariadb.primary.persistence.enabled Enable persistence on MariaDB using PVC(s) ## @param mariadb.primary.persistence.storageClass Persistent Volume storage class ## @param mariadb.primary.persistence.accessModes [array] Persistent Volume access modes ## @param mariadb.primary.persistence.size Persistent Volume size ## persistence: enabled: true storageClass: "" accessModes: - ReadWriteOnce size: 8Gi ## Enable persistence using Persistent Volume Claims ## ref: https://kubernetes.io/docs/user-guide/persistent-volumes/ ## persistence: ## @param persistence.enabled Enable persistence using Persistent Volume Claims ## enabled: true ## @param persistence.storageClass Persistent Volume storage class ## If defined, storageClassName: <storageClass> ## If set to "-", storageClassName: "", which disables dynamic provisioning ## If undefined (the default) or set to null, no storageClassName spec is set, choosing the default provisioner ## storageClass: "" ## @param persistence.accessModes [array] Persistent Volume access modes ## accessModes: - ReadWriteOnce ## @param persistence.size Persistent Volume size ## size: 8Gi ## @param persistence.existingClaim The name of an existing PVC to use for persistence ## existingClaim: "" ## @param persistence.hostPath If defined, the osclass-data volume will mount to the specified hostPath. ## Requires persistence.enabled: true ## Requires persistence.existingClaim: nil|false ## Default: nil. ## hostPath: "" ## @param persistence.annotations Persistent Volume Claim annotations ## annotations: {} ## Init containers parameters: ## volumePermissions: Change the owner and group of the persistent volume mountpoint to runAsUser:fsGroup values from the securityContext section. ## volumePermissions: ## @param volumePermissions.enabled Enable init container that changes the owner/group of the PV mount point to `runAsUser:fsGroup` ## enabled: false ## Bitnami Shell image ## ref: https://hub.docker.com/r/bitnami/bitnami-shell/tags/ ## @param volumePermissions.image.registry Bitnami Shell image registry ## @param volumePermissions.image.repository Bitnami Shell image repository ## @param volumePermissions.image.tag Bitnami Shell image tag (immutable tags are recommended) ## @param volumePermissions.image.pullPolicy Bitnami Shell image pull policy ## @param volumePermissions.image.pullSecrets Bitnami Shell image pull secrets ## image: registry: docker.io repository: bitnami/bitnami-shell tag: 10-debian-10-r366 pullPolicy: IfNotPresent ## Optionally specify an array of imagePullSecrets. ## Secrets must be manually created in the namespace. ## ref: https://kubernetes.io/docs/tasks/configure-pod-container/pull-image-private-registry/ ## pullSecrets: [] ## - myRegistryKeySecretName ## Init container's resource requests and limits ## ref: https://kubernetes.io/docs/user-guide/compute-resources/ ## @param volumePermissions.resources.limits The resources limits for the init container ## @param volumePermissions.resources.requests The requested resources for the init container ## resources: ## We usually recommend not to specify default resources and to leave this as a conscious ## choice for the user. This also increases chances charts run on environments with little ## resources, such as Minikube. If you do want to specify resources, uncomment the following ## lines, adjust them as necessary, and remove the curly braces after 'resources:'. ## limits: {} ## cpu: 100m ## memory: 128Mi ## requests: {} ## cpu: 100m ## memory: 128Mi ## ## @section Other Parameters ## ## Osclass Pod Disruption Budget configuration ## ref: https://kubernetes.io/docs/tasks/run-application/configure-pdb/ ## @param pdb.create Enable a Pod Disruption Budget creation ## @param pdb.minAvailable Minimum number/percentage of pods that should remain scheduled ## @param pdb.maxUnavailable Maximum number/percentage of pods that may be made unavailable ## pdb: create: false minAvailable: 1 maxUnavailable: "" ## Osclass Autoscaling configuration ## ref: https://kubernetes.io/docs/tasks/run-application/horizontal-pod-autoscale/ ## @param autoscaling.enabled Enable Horizontal POD autoscaling for Osclass ## @param autoscaling.minReplicas Minimum number of Osclass replicas ## @param autoscaling.maxReplicas Maximum number of Osclass replicas ## @param autoscaling.targetCPU Target CPU utilization percentage ## @param autoscaling.targetMemory Target Memory utilization percentage ## autoscaling: enabled: false minReplicas: 1 maxReplicas: 11 targetCPU: 50 targetMemory: 50 ## @section Metrics Parameters ## ## Prometheus Exporter / Metrics ## metrics: ## @param metrics.enabled Start a sidecar prometheus exporter to expose metrics ## enabled: false ## Bitnami Apache Exporter image ## ref: https://hub.docker.com/r/bitnami/apache-exporter/tags/ ## @param metrics.image.registry Apache Exporter image registry ## @param metrics.image.repository Apache Exporter image repository ## @param metrics.image.tag Apache Exporter image tag (immutable tags are recommended) ## @param metrics.image.pullPolicy Apache Exporter image pull policy ## @param metrics.image.pullSecrets Apache Exporter image pull secrets ## image: registry: docker.io repository: bitnami/apache-exporter tag: 0.11.0-debian-10-r85 pullPolicy: IfNotPresent ## Optionally specify an array of imagePullSecrets. ## Secrets must be manually created in the namespace. ## ref: https://kubernetes.io/docs/tasks/configure-pod-container/pull-image-private-registry/ ## pullSecrets: [] # - myRegistryKeySecretName ## Prometheus exporter container's resource requests and limits ## ref: https://kubernetes.io/docs/user-guide/compute-resources/ ## @param metrics.resources.limits The resources limits for the Prometheus exporter container ## @param metrics.resources.requests The requested resources for the Prometheus exporter container ## resources: limits: {} requests: {} ## @param metrics.podAnnotations Annotations to add ## ref: https://kubernetes.io/docs/concepts/overview/working-with-objects/annotations/ ## podAnnotations: {} ## Prometheus exporter service parameters ## service: ## @param metrics.service.type Metrics service type ## type: ClusterIP ## @param metrics.service.port Metrics service port ## port: 9117 ## @param metrics.service.annotations [object] Additional custom annotations for Metrics service ## annotations: prometheus.io/scrape: "true" prometheus.io/port: "{{ .Values.metrics.service.port }}" ## Prometheus Service Monitor ## ref: https://github.com/coreos/prometheus-operator ## https://github.com/coreos/prometheus-operator/blob/master/Documentation/api.md#endpoint ## serviceMonitor: ## @param metrics.serviceMonitor.enabled Create ServiceMonitor Resource for scraping metrics using PrometheusOperator ## enabled: false ## @param metrics.serviceMonitor.namespace The namespace in which the ServiceMonitor will be created ## namespace: "" ## @param metrics.serviceMonitor.interval The interval at which metrics should be scraped ## interval: 30s ## @param metrics.serviceMonitor.scrapeTimeout The timeout after which the scrape is ended ## scrapeTimeout: "" ## @param metrics.serviceMonitor.relabelings RelabelConfigs to apply to samples before scraping ## ref: https://github.com/coreos/prometheus-operator/blob/master/Documentation/api.md#relabelconfig ## relabelings: [] ## @param metrics.serviceMonitor.metricRelabelings MetricRelabelConfigs to apply to samples before ingestion ## ref: https://github.com/coreos/prometheus-operator/blob/master/Documentation/api.md#relabelconfig ## metricRelabelings: [] ## @param metrics.serviceMonitor.honorLabels Labels to honor to add to the scrape endpoint ## honorLabels: false ## @param metrics.serviceMonitor.selector ServiceMonitor selector labels ## ref: https://github.com/bitnami/charts/tree/master/bitnami/prometheus-operator#prometheus-configuration ## ## selector: ## prometheus: my-prometheus ## selector: {} ## @param metrics.serviceMonitor.labels Extra labels for the ServiceMonitor ## labels: {} ## @param metrics.serviceMonitor.jobLabel The name of the label on the target service to use as the job name in prometheus. ## jobLabel: "" ## @section NetworkPolicy parameters ## Add networkpolicies ## networkPolicy: ## @param networkPolicy.enabled Enable network policies ## If ingress.enabled or metrics.enabled are true, configure networkPolicy.ingress and networkPolicy.metrics selectors respectively to allow communication ## enabled: false ## @param networkPolicy.metrics.enabled Enable network policy for metrics (prometheus) ## @param networkPolicy.metrics.namespaceSelector Monitoring namespace selector labels. These labels will be used to identify the prometheus' namespace. ## @param networkPolicy.metrics.podSelector Monitoring pod selector labels. These labels will be used to identify the Prometheus pods. ## metrics: enabled: false ## e.g: ## podSelector: ## label: monitoring ## podSelector: {} ## e.g: ## namespaceSelector: ## label: monitoring ## namespaceSelector: {} ## @param networkPolicy.ingress.enabled Enable network policy for Ingress Proxies ## @param networkPolicy.ingress.namespaceSelector Ingress Proxy namespace selector labels. These labels will be used to identify the Ingress Proxy's namespace. ## @param networkPolicy.ingress.podSelector Ingress Proxy pods selector labels. These labels will be used to identify the Ingress Proxy pods. ## ingress: enabled: false ## e.g: ## podSelector: ## label: ingress ## podSelector: {} ## e.g: ## namespaceSelector: ## label: ingress ## namespaceSelector: {} ## @param networkPolicy.ingressRules.backendOnlyAccessibleByFrontend Enable ingress rule that makes the backend (mariadb) only accessible by Osclass's pods. ## @param networkPolicy.ingressRules.customBackendSelector Backend selector labels. These labels will be used to identify the backend pods. ## @param networkPolicy.ingressRules.accessOnlyFrom.enabled Enable ingress rule that makes Osclass only accessible from a particular origin ## @param networkPolicy.ingressRules.accessOnlyFrom.namespaceSelector Namespace selector label that is allowed to access Osclass. This label will be used to identified the allowed namespace(s). ## @param networkPolicy.ingressRules.accessOnlyFrom.podSelector Pods selector label that is allowed to access Osclass. This label will be used to identified the allowed pod(s). ## @param networkPolicy.ingressRules.customRules Custom network policy ingress rule ## ingressRules: ## mariadb backend only can be accessed from Osclass ## backendOnlyAccessibleByFrontend: false customBackendSelector: {} ## Allow only from the indicated: ## accessOnlyFrom: enabled: false ## e.g: ## namespaceSelector: ## label: ingress ## namespaceSelector: {} ## e.g: ## podSelector: ## label: access ## podSelector: {} ## custom ingress rules ## e.g: ## customRules: ## - from: ## - namespaceSelector: ## matchLabels: ## label: example ## customRules: {} ## @param networkPolicy.egressRules.denyConnectionsToExternal Enable egress rule that denies outgoing traffic outside the cluster, except for DNS (port 53). ## @param networkPolicy.egressRules.customRules Custom network policy rule ## egressRules: ## Deny connections to external. This is not compatible with an external database. ## denyConnectionsToExternal: false ## Additional custom egress rules ## e.g: ## customRules: ## - to: ## - namespaceSelector: ## matchLabels: ## label: example ## customRules: {}
38.5397
195
0.738467
bee818d0609ea9e212ae624a0c64d8810c8b9a3b
58,616
yaml
YAML
bitnami/postgresql/values.yaml
00arthur00/charts
502aa1e64541669b732a4eda896e5937847b6c3c
[ "Apache-2.0" ]
null
null
null
bitnami/postgresql/values.yaml
00arthur00/charts
502aa1e64541669b732a4eda896e5937847b6c3c
[ "Apache-2.0" ]
2
2022-01-26T01:14:30.000Z
2022-01-26T07:03:39.000Z
bitnami/postgresql/values.yaml
00arthur00/charts
502aa1e64541669b732a4eda896e5937847b6c3c
[ "Apache-2.0" ]
null
null
null
## @section Global parameters ## Please, note that this will override the parameters, including dependencies, configured to use the global value ## global: ## @param global.imageRegistry Global Docker image registry ## imageRegistry: "" ## @param global.imagePullSecrets Global Docker registry secret names as an array ## e.g. ## imagePullSecrets: ## - myRegistryKeySecretName ## imagePullSecrets: [] ## @param global.storageClass Global StorageClass for Persistent Volume(s) ## storageClass: "" postgresql: ## @param global.postgresql.auth.postgresPassword Password for the "postgres" admin user (overrides `auth.postgresPassword`) ## @param global.postgresql.auth.username Name for a custom user to create (overrides `auth.username`) ## @param global.postgresql.auth.password Password for the custom user to create (overrides `auth.password`) ## @param global.postgresql.auth.database Name for a custom database to create (overrides `auth.database`) ## @param global.postgresql.auth.existingSecret Name of existing secret to use for PostgreSQL credentials (overrides `auth.existingSecret`) ## auth: postgresPassword: "" username: "" password: "" database: "" existingSecret: "" ## @param global.postgresql.service.ports.postgresql PostgreSQL service port (overrides `service.ports.postgresql`) ## service: ports: postgresql: "" ## @section Common parameters ## ## @param kubeVersion Override Kubernetes version ## kubeVersion: "" ## @param nameOverride String to partially override common.names.fullname template (will maintain the release name) ## nameOverride: "" ## @param fullnameOverride String to fully override common.names.fullname template ## fullnameOverride: "" ## @param clusterDomain Kubernetes Cluster Domain ## clusterDomain: cluster.local ## @param extraDeploy Array of extra objects to deploy with the release (evaluated as a template) ## extraDeploy: [] ## @param commonLabels Add labels to all the deployed resources ## commonLabels: {} ## @param commonAnnotations Add annotations to all the deployed resources ## commonAnnotations: {} ## Enable diagnostic mode in the statefulset ## diagnosticMode: ## @param diagnosticMode.enabled Enable diagnostic mode (all probes will be disabled and the command will be overridden) ## enabled: false ## @param diagnosticMode.command Command to override all containers in the statefulset ## command: - sleep ## @param diagnosticMode.args Args to override all containers in the statefulset ## args: - infinity ## @section PostgreSQL common parameters ## ## Bitnami PostgreSQL image version ## ref: https://hub.docker.com/r/bitnami/postgresql/tags/ ## @param image.registry PostgreSQL image registry ## @param image.repository PostgreSQL image repository ## @param image.tag PostgreSQL image tag (immutable tags are recommended) ## @param image.pullPolicy PostgreSQL image pull policy ## @param image.pullSecrets Specify image pull secrets ## @param image.debug Specify if debug values should be set ## image: registry: docker.io repository: bitnami/postgresql tag: 14.2.0-debian-10-r31 ## Specify a imagePullPolicy ## Defaults to 'Always' if image tag is 'latest', else set to 'IfNotPresent' ## ref: https://kubernetes.io/docs/user-guide/images/#pre-pulling-images ## pullPolicy: IfNotPresent ## Optionally specify an array of imagePullSecrets. ## Secrets must be manually created in the namespace. ## ref: https://kubernetes.io/docs/tasks/configure-pod-container/pull-image-private-registry/ ## Example: ## pullSecrets: ## - myRegistryKeySecretName ## pullSecrets: [] ## Set to true if you would like to see extra information on logs ## debug: false ## Authentication parameters ## ref: https://github.com/bitnami/bitnami-docker-postgresql/blob/master/README.md#setting-the-root-password-on-first-run ## ref: https://github.com/bitnami/bitnami-docker-postgresql/blob/master/README.md#creating-a-database-on-first-run ## ref: https://github.com/bitnami/bitnami-docker-postgresql/blob/master/README.md#creating-a-database-user-on-first-run ## auth: ## @param auth.enablePostgresUser Assign a password to the "postgres" admin user. Otherwise, remote access will be blocked for this user ## enablePostgresUser: true ## @param auth.postgresPassword Password for the "postgres" admin user ## postgresPassword: "" ## @param auth.username Name for a custom user to create ## username: "" ## @param auth.password Password for the custom user to create ## password: "" ## @param auth.database Name for a custom database to create ## database: "" ## @param auth.replicationUsername Name of the replication user ## replicationUsername: repl_user ## @param auth.replicationPassword Password for the replication user ## replicationPassword: "" ## @param auth.existingSecret Name of existing secret to use for PostgreSQL credentials ## `auth.postgresPassword`, `auth.password`, and `auth.replicationPassword` will be ignored and picked up from this secret ## The secret must contain the keys `postgres-password` (which is the password for "postgres" admin user), ## `password` (which is the password for the custom user to create when `auth.username` is set), ## and `replication-password` (which is the password for replication user). ## The secret might also contains the key `ldap-password` if LDAP is enabled. `ldap.bind_password` will be ignored and ## picked from this secret in this case. ## The value is evaluated as a template. ## existingSecret: "" ## @param auth.usePasswordFiles Mount credentials as a files instead of using an environment variable ## usePasswordFiles: false ## @param architecture PostgreSQL architecture (`standalone` or `replication`) ## architecture: standalone ## Replication configuration ## Ignored if `architecture` is `standalone` ## replication: ## @param replication.synchronousCommit Set synchronous commit mode. Allowed values: `on`, `remote_apply`, `remote_write`, `local` and `off` ## @param replication.numSynchronousReplicas Number of replicas that will have synchronous replication. Note: Cannot be greater than `readReplicas.replicaCount`. ## ref: https://www.postgresql.org/docs/current/runtime-config-wal.html#GUC-SYNCHRONOUS-COMMIT ## synchronousCommit: "off" numSynchronousReplicas: 0 ## @param replication.applicationName Cluster application name. Useful for advanced replication settings ## applicationName: my_application ## @param containerPorts.postgresql PostgreSQL container port ## containerPorts: postgresql: 5432 ## Audit settings ## https://github.com/bitnami/bitnami-docker-postgresql#auditing ## @param audit.logHostname Log client hostnames ## @param audit.logConnections Add client log-in operations to the log file ## @param audit.logDisconnections Add client log-outs operations to the log file ## @param audit.pgAuditLog Add operations to log using the pgAudit extension ## @param audit.pgAuditLogCatalog Log catalog using pgAudit ## @param audit.clientMinMessages Message log level to share with the user ## @param audit.logLinePrefix Template for log line prefix (default if not set) ## @param audit.logTimezone Timezone for the log timestamps ## audit: logHostname: false logConnections: false logDisconnections: false pgAuditLog: "" pgAuditLogCatalog: "off" clientMinMessages: error logLinePrefix: "" logTimezone: "" ## LDAP configuration ## @param ldap.enabled Enable LDAP support ## @param ldap.url LDAP URL beginning in the form `ldap[s]://host[:port]/basedn` ## @param ldap.server IP address or name of the LDAP server. ## @param ldap.port Port number on the LDAP server to connect to ## @param ldap.prefix String to prepend to the user name when forming the DN to bind ## @param ldap.suffix String to append to the user name when forming the DN to bind ## @param ldap.baseDN Root DN to begin the search for the user in ## @param ldap.bindDN DN of user to bind to LDAP ## @param ldap.bind_password Password for the user to bind to LDAP ## @param ldap.search_attr Attribute to match against the user name in the search ## @param ldap.search_filter The search filter to use when doing search+bind authentication ## @param ldap.scheme Set to `ldaps` to use LDAPS ## @param ldap.tls Set to `1` to use TLS encryption ## ldap: enabled: false url: "" server: "" port: "" prefix: "" suffix: "" baseDN: "" bindDN: "" bind_password: "" search_attr: "" search_filter: "" scheme: "" tls: "" ## @param postgresqlDataDir PostgreSQL data dir folder ## postgresqlDataDir: /bitnami/postgresql/data ## @param postgresqlSharedPreloadLibraries Shared preload libraries (comma-separated list) ## postgresqlSharedPreloadLibraries: "pgaudit" ## Start PostgreSQL pod(s) without limitations on shm memory. ## By default docker and containerd (and possibly other container runtimes) limit `/dev/shm` to `64M` ## ref: https://github.com/docker-library/postgres/issues/416 ## ref: https://github.com/containerd/containerd/issues/3654 ## shmVolume: ## @param shmVolume.enabled Enable emptyDir volume for /dev/shm for PostgreSQL pod(s) ## enabled: true ## @param shmVolume.sizeLimit Set this to enable a size limit on the shm tmpfs ## Note: the size of the tmpfs counts against container's memory limit ## e.g: ## sizeLimit: 1Gi ## sizeLimit: "" ## TLS configuration ## tls: ## @param tls.enabled Enable TLS traffic support ## enabled: false ## @param tls.autoGenerated Generate automatically self-signed TLS certificates ## autoGenerated: false ## @param tls.preferServerCiphers Whether to use the server's TLS cipher preferences rather than the client's ## preferServerCiphers: true ## @param tls.certificatesSecret Name of an existing secret that contains the certificates ## certificatesSecret: "" ## @param tls.certFilename Certificate filename ## certFilename: "" ## @param tls.certKeyFilename Certificate key filename ## certKeyFilename: "" ## @param tls.certCAFilename CA Certificate filename ## If provided, PostgreSQL will authenticate TLS/SSL clients by requesting them a certificate ## ref: https://www.postgresql.org/docs/9.6/auth-methods.html ## certCAFilename: "" ## @param tls.crlFilename File containing a Certificate Revocation List ## crlFilename: "" ## @section PostgreSQL Primary parameters ## primary: ## @param primary.configuration PostgreSQL Primary main configuration to be injected as ConfigMap ## ref: https://www.postgresql.org/docs/current/static/runtime-config.html ## configuration: "" ## @param primary.pgHbaConfiguration PostgreSQL Primary client authentication configuration ## ref: https://www.postgresql.org/docs/current/static/auth-pg-hba-conf.html ## e.g:# ## pgHbaConfiguration: |- ## local all all trust ## host all all localhost trust ## host mydatabase mysuser 192.168.0.0/24 md5 ## pgHbaConfiguration: "" ## @param primary.existingConfigmap Name of an existing ConfigMap with PostgreSQL Primary configuration ## NOTE: `primary.configuration` and `primary.pgHbaConfiguration` will be ignored ## existingConfigmap: "" ## @param primary.extendedConfiguration Extended PostgreSQL Primary configuration (appended to main or default configuration) ## ref: https://github.com/bitnami/bitnami-docker-postgresql#allow-settings-to-be-loaded-from-files-other-than-the-default-postgresqlconf ## extendedConfiguration: "" ## @param primary.existingExtendedConfigmap Name of an existing ConfigMap with PostgreSQL Primary extended configuration ## NOTE: `primary.extendedConfiguration` will be ignored ## existingExtendedConfigmap: "" ## Initdb configuration ## ref: https://github.com/bitnami/bitnami-docker-postgresql/blob/master/README.md#specifying-initdb-arguments ## initdb: ## @param primary.initdb.args PostgreSQL initdb extra arguments ## args: "" ## @param primary.initdb.postgresqlWalDir Specify a custom location for the PostgreSQL transaction log ## postgresqlWalDir: "" ## @param primary.initdb.scripts Dictionary of initdb scripts ## Specify dictionary of scripts to be run at first boot ## e.g: ## scripts: ## my_init_script.sh: | ## #!/bin/sh ## echo "Do something." ## scripts: {} ## @param primary.initdb.scriptsConfigMap ConfigMap with scripts to be run at first boot ## NOTE: This will override `primary.initdb.scripts` ## scriptsConfigMap: "" ## @param primary.initdb.scriptsSecret Secret with scripts to be run at first boot (in case it contains sensitive information) ## NOTE: This can work along `primary.initdb.scripts` or `primary.initdb.scriptsConfigMap` ## scriptsSecret: "" ## @param primary.initdb.user Specify the PostgreSQL username to execute the initdb scripts ## user: "" ## @param primary.initdb.password Specify the PostgreSQL password to execute the initdb scripts ## password: "" ## Configure current cluster's primary server to be the standby server in other cluster. ## This will allow cross cluster replication and provide cross cluster high availability. ## You will need to configure pgHbaConfiguration if you want to enable this feature with local cluster replication enabled. ## @param primary.standby.enabled Whether to enable current cluster's primary as standby server of another cluster or not ## @param primary.standby.primaryHost The Host of replication primary in the other cluster ## @param primary.standby.primaryPort The Port of replication primary in the other cluster ## standby: enabled: false primaryHost: "" primaryPort: "" ## @param primary.extraEnvVars Array with extra environment variables to add to PostgreSQL Primary nodes ## e.g: ## extraEnvVars: ## - name: FOO ## value: "bar" ## extraEnvVars: [] ## @param primary.extraEnvVarsCM Name of existing ConfigMap containing extra env vars for PostgreSQL Primary nodes ## extraEnvVarsCM: "" ## @param primary.extraEnvVarsSecret Name of existing Secret containing extra env vars for PostgreSQL Primary nodes ## extraEnvVarsSecret: "" ## @param primary.command Override default container command (useful when using custom images) ## command: [] ## @param primary.args Override default container args (useful when using custom images) ## args: [] ## Configure extra options for PostgreSQL Primary containers' liveness, readiness and startup probes ## ref: https://kubernetes.io/docs/tasks/configure-pod-container/configure-liveness-readiness-startup-probes/#configure-probes ## @param primary.livenessProbe.enabled Enable livenessProbe on PostgreSQL Primary containers ## @param primary.livenessProbe.initialDelaySeconds Initial delay seconds for livenessProbe ## @param primary.livenessProbe.periodSeconds Period seconds for livenessProbe ## @param primary.livenessProbe.timeoutSeconds Timeout seconds for livenessProbe ## @param primary.livenessProbe.failureThreshold Failure threshold for livenessProbe ## @param primary.livenessProbe.successThreshold Success threshold for livenessProbe ## livenessProbe: enabled: true initialDelaySeconds: 30 periodSeconds: 10 timeoutSeconds: 5 failureThreshold: 6 successThreshold: 1 ## @param primary.readinessProbe.enabled Enable readinessProbe on PostgreSQL Primary containers ## @param primary.readinessProbe.initialDelaySeconds Initial delay seconds for readinessProbe ## @param primary.readinessProbe.periodSeconds Period seconds for readinessProbe ## @param primary.readinessProbe.timeoutSeconds Timeout seconds for readinessProbe ## @param primary.readinessProbe.failureThreshold Failure threshold for readinessProbe ## @param primary.readinessProbe.successThreshold Success threshold for readinessProbe ## readinessProbe: enabled: true initialDelaySeconds: 5 periodSeconds: 10 timeoutSeconds: 5 failureThreshold: 6 successThreshold: 1 ## @param primary.startupProbe.enabled Enable startupProbe on PostgreSQL Primary containers ## @param primary.startupProbe.initialDelaySeconds Initial delay seconds for startupProbe ## @param primary.startupProbe.periodSeconds Period seconds for startupProbe ## @param primary.startupProbe.timeoutSeconds Timeout seconds for startupProbe ## @param primary.startupProbe.failureThreshold Failure threshold for startupProbe ## @param primary.startupProbe.successThreshold Success threshold for startupProbe ## startupProbe: enabled: false initialDelaySeconds: 30 periodSeconds: 10 timeoutSeconds: 1 failureThreshold: 15 successThreshold: 1 ## @param primary.customLivenessProbe Custom livenessProbe that overrides the default one ## customLivenessProbe: {} ## @param primary.customReadinessProbe Custom readinessProbe that overrides the default one ## customReadinessProbe: {} ## @param primary.customStartupProbe Custom startupProbe that overrides the default one ## customStartupProbe: {} ## @param primary.lifecycleHooks for the PostgreSQL Primary container to automate configuration before or after startup ## lifecycleHooks: {} ## PostgreSQL Primary resource requests and limits ## ref: https://kubernetes.io/docs/user-guide/compute-resources/ ## @param primary.resources.limits The resources limits for the PostgreSQL Primary containers ## @param primary.resources.requests.memory The requested memory for the PostgreSQL Primary containers ## @param primary.resources.requests.cpu The requested cpu for the PostgreSQL Primary containers ## resources: limits: {} requests: memory: 256Mi cpu: 250m ## Pod Security Context ## ref: https://kubernetes.io/docs/tasks/configure-pod-container/security-context/ ## @param primary.podSecurityContext.enabled Enable security context ## @param primary.podSecurityContext.fsGroup Group ID for the pod ## podSecurityContext: enabled: true fsGroup: 1001 ## Container Security Context ## ref: https://kubernetes.io/docs/tasks/configure-pod-container/security-context/ ## @param primary.containerSecurityContext.enabled Enable container security context ## @param primary.containerSecurityContext.runAsUser User ID for the container ## containerSecurityContext: enabled: true runAsUser: 1001 ## @param primary.hostAliases PostgreSQL primary pods host aliases ## https://kubernetes.io/docs/concepts/services-networking/add-entries-to-pod-etc-hosts-with-host-aliases/ ## hostAliases: [] ## @param primary.hostNetwork Specify if host network should be enabled for PostgreSQL pod (postgresql primary) ## hostNetwork: false ## @param primary.hostIPC Specify if host IPC should be enabled for PostgreSQL pod (postgresql primary) ## hostIPC: false ## @param primary.labels Map of labels to add to the statefulset (postgresql primary) ## labels: {} ## @param primary.annotations Annotations for PostgreSQL primary pods ## annotations: {} ## @param primary.podLabels Map of labels to add to the pods (postgresql primary) ## podLabels: {} ## @param primary.podAnnotations Map of annotations to add to the pods (postgresql primary) ## podAnnotations: {} ## @param primary.podAffinityPreset PostgreSQL primary pod affinity preset. Ignored if `primary.affinity` is set. Allowed values: `soft` or `hard` ## ref: https://kubernetes.io/docs/concepts/scheduling-eviction/assign-pod-node/#inter-pod-affinity-and-anti-affinity ## podAffinityPreset: "" ## @param primary.podAntiAffinityPreset PostgreSQL primary pod anti-affinity preset. Ignored if `primary.affinity` is set. Allowed values: `soft` or `hard` ## ref: https://kubernetes.io/docs/concepts/scheduling-eviction/assign-pod-node/#inter-pod-affinity-and-anti-affinity ## podAntiAffinityPreset: soft ## PostgreSQL Primary node affinity preset ## ref: https://kubernetes.io/docs/concepts/scheduling-eviction/assign-pod-node/#node-affinity ## nodeAffinityPreset: ## @param primary.nodeAffinityPreset.type PostgreSQL primary node affinity preset type. Ignored if `primary.affinity` is set. Allowed values: `soft` or `hard` ## type: "" ## @param primary.nodeAffinityPreset.key PostgreSQL primary node label key to match Ignored if `primary.affinity` is set. ## E.g. ## key: "kubernetes.io/e2e-az-name" ## key: "" ## @param primary.nodeAffinityPreset.values PostgreSQL primary node label values to match. Ignored if `primary.affinity` is set. ## E.g. ## values: ## - e2e-az1 ## - e2e-az2 ## values: [] ## @param primary.affinity Affinity for PostgreSQL primary pods assignment ## ref: https://kubernetes.io/docs/concepts/configuration/assign-pod-node/#affinity-and-anti-affinity ## Note: primary.podAffinityPreset, primary.podAntiAffinityPreset, and primary.nodeAffinityPreset will be ignored when it's set ## affinity: {} ## @param primary.nodeSelector Node labels for PostgreSQL primary pods assignment ## ref: https://kubernetes.io/docs/user-guide/node-selection/ ## nodeSelector: {} ## @param primary.tolerations Tolerations for PostgreSQL primary pods assignment ## ref: https://kubernetes.io/docs/concepts/configuration/taint-and-toleration/ ## tolerations: [] ## @param primary.topologySpreadConstraints Topology Spread Constraints for pod assignment spread across your cluster among failure-domains. Evaluated as a template ## Ref: https://kubernetes.io/docs/concepts/workloads/pods/pod-topology-spread-constraints/#spread-constraints-for-pods ## topologySpreadConstraints: {} ## @param primary.priorityClassName Priority Class to use for each pod (postgresql primary) ## priorityClassName: "" ## @param primary.schedulerName Use an alternate scheduler, e.g. "stork". ## ref: https://kubernetes.io/docs/tasks/administer-cluster/configure-multiple-schedulers/ ## schedulerName: "" ## @param primary.terminationGracePeriodSeconds Seconds PostgreSQL primary pod needs to terminate gracefully ## ref: https://kubernetes.io/docs/concepts/workloads/pods/pod/#termination-of-pods ## terminationGracePeriodSeconds: "" ## @param primary.updateStrategy.type PostgreSQL Primary statefulset strategy type ## @param primary.updateStrategy.rollingUpdate PostgreSQL Primary statefulset rolling update configuration parameters ## ref: https://kubernetes.io/docs/concepts/workloads/controllers/statefulset/#update-strategies ## updateStrategy: type: RollingUpdate rollingUpdate: {} ## @param primary.extraVolumeMounts Optionally specify extra list of additional volumeMounts for the PostgreSQL Primary container(s) ## extraVolumeMounts: [] ## @param primary.extraVolumes Optionally specify extra list of additional volumes for the PostgreSQL Primary pod(s) ## extraVolumes: [] ## @param primary.sidecars Add additional sidecar containers to the PostgreSQL Primary pod(s) ## For example: ## sidecars: ## - name: your-image-name ## image: your-image ## imagePullPolicy: Always ## ports: ## - name: portname ## containerPort: 1234 ## sidecars: [] ## @param primary.initContainers Add additional init containers to the PostgreSQL Primary pod(s) ## Example ## ## initContainers: ## - name: do-something ## image: busybox ## command: ['do', 'something'] ## initContainers: [] ## @param primary.extraPodSpec Optionally specify extra PodSpec for the PostgreSQL Primary pod(s) ## extraPodSpec: {} ## PostgreSQL Primary service configuration ## service: ## @param primary.service.type Kubernetes Service type ## type: ClusterIP ## @param primary.service.ports.postgresql PostgreSQL service port ## ports: postgresql: 5432 ## Node ports to expose ## NOTE: choose port between <30000-32767> ## @param primary.service.nodePorts.postgresql Node port for PostgreSQL ## ref: https://kubernetes.io/docs/concepts/services-networking/service/#type-nodeport ## nodePorts: postgresql: "" ## @param primary.service.clusterIP Static clusterIP or None for headless services ## e.g: ## clusterIP: None ## clusterIP: "" ## @param primary.service.annotations Annotations for PostgreSQL primary service ## annotations: {} ## @param primary.service.loadBalancerIP Load balancer IP if service type is `LoadBalancer` ## Set the LoadBalancer service type to internal only ## ref: https://kubernetes.io/docs/concepts/services-networking/service/#internal-load-balancer ## loadBalancerIP: "" ## @param primary.service.externalTrafficPolicy Enable client source IP preservation ## ref https://kubernetes.io/docs/tasks/access-application-cluster/create-external-load-balancer/#preserving-the-client-source-ip ## externalTrafficPolicy: Cluster ## @param primary.service.loadBalancerSourceRanges Addresses that are allowed when service is LoadBalancer ## https://kubernetes.io/docs/tasks/access-application-cluster/configure-cloud-provider-firewall/#restrict-access-for-loadbalancer-service ## ## loadBalancerSourceRanges: ## - 10.10.10.0/24 ## loadBalancerSourceRanges: [] ## @param primary.service.extraPorts Extra ports to expose in the PostgreSQL primary service ## extraPorts: [] ## PostgreSQL Primary persistence configuration ## persistence: ## @param primary.persistence.enabled Enable PostgreSQL Primary data persistence using PVC ## enabled: true ## @param primary.persistence.existingClaim Name of an existing PVC to use ## existingClaim: "" ## @param primary.persistence.mountPath The path the volume will be mounted at ## Note: useful when using custom PostgreSQL images ## mountPath: /bitnami/postgresql ## @param primary.persistence.subPath The subdirectory of the volume to mount to ## Useful in dev environments and one PV for multiple services ## subPath: "" ## @param primary.persistence.storageClass PVC Storage Class for PostgreSQL Primary data volume ## If defined, storageClassName: <storageClass> ## If set to "-", storageClassName: "", which disables dynamic provisioning ## If undefined (the default) or set to null, no storageClassName spec is ## set, choosing the default provisioner. (gp2 on AWS, standard on ## GKE, AWS & OpenStack) ## storageClass: "" ## @param primary.persistence.accessModes PVC Access Mode for PostgreSQL volume ## accessModes: - ReadWriteOnce ## @param primary.persistence.size PVC Storage Request for PostgreSQL volume ## size: 8Gi ## @param primary.persistence.annotations Annotations for the PVC ## annotations: {} ## @param primary.persistence.selector Selector to match an existing Persistent Volume (this value is evaluated as a template) ## selector: ## matchLabels: ## app: my-app ## selector: {} ## @param primary.persistence.dataSource Custom PVC data source ## dataSource: {} ## @section PostgreSQL read only replica parameters ## readReplicas: ## @param readReplicas.replicaCount Number of PostgreSQL read only replicas ## replicaCount: 1 ## @param readReplicas.extraEnvVars Array with extra environment variables to add to PostgreSQL read only nodes ## e.g: ## extraEnvVars: ## - name: FOO ## value: "bar" ## extraEnvVars: [] ## @param readReplicas.extraEnvVarsCM Name of existing ConfigMap containing extra env vars for PostgreSQL read only nodes ## extraEnvVarsCM: "" ## @param readReplicas.extraEnvVarsSecret Name of existing Secret containing extra env vars for PostgreSQL read only nodes ## extraEnvVarsSecret: "" ## @param readReplicas.command Override default container command (useful when using custom images) ## command: [] ## @param readReplicas.args Override default container args (useful when using custom images) ## args: [] ## Configure extra options for PostgreSQL read only containers' liveness, readiness and startup probes ## ref: https://kubernetes.io/docs/tasks/configure-pod-container/configure-liveness-readiness-startup-probes/#configure-probes ## @param readReplicas.livenessProbe.enabled Enable livenessProbe on PostgreSQL read only containers ## @param readReplicas.livenessProbe.initialDelaySeconds Initial delay seconds for livenessProbe ## @param readReplicas.livenessProbe.periodSeconds Period seconds for livenessProbe ## @param readReplicas.livenessProbe.timeoutSeconds Timeout seconds for livenessProbe ## @param readReplicas.livenessProbe.failureThreshold Failure threshold for livenessProbe ## @param readReplicas.livenessProbe.successThreshold Success threshold for livenessProbe ## livenessProbe: enabled: true initialDelaySeconds: 30 periodSeconds: 10 timeoutSeconds: 5 failureThreshold: 6 successThreshold: 1 ## @param readReplicas.readinessProbe.enabled Enable readinessProbe on PostgreSQL read only containers ## @param readReplicas.readinessProbe.initialDelaySeconds Initial delay seconds for readinessProbe ## @param readReplicas.readinessProbe.periodSeconds Period seconds for readinessProbe ## @param readReplicas.readinessProbe.timeoutSeconds Timeout seconds for readinessProbe ## @param readReplicas.readinessProbe.failureThreshold Failure threshold for readinessProbe ## @param readReplicas.readinessProbe.successThreshold Success threshold for readinessProbe ## readinessProbe: enabled: true initialDelaySeconds: 5 periodSeconds: 10 timeoutSeconds: 5 failureThreshold: 6 successThreshold: 1 ## @param readReplicas.startupProbe.enabled Enable startupProbe on PostgreSQL read only containers ## @param readReplicas.startupProbe.initialDelaySeconds Initial delay seconds for startupProbe ## @param readReplicas.startupProbe.periodSeconds Period seconds for startupProbe ## @param readReplicas.startupProbe.timeoutSeconds Timeout seconds for startupProbe ## @param readReplicas.startupProbe.failureThreshold Failure threshold for startupProbe ## @param readReplicas.startupProbe.successThreshold Success threshold for startupProbe ## startupProbe: enabled: false initialDelaySeconds: 30 periodSeconds: 10 timeoutSeconds: 1 failureThreshold: 15 successThreshold: 1 ## @param readReplicas.customLivenessProbe Custom livenessProbe that overrides the default one ## customLivenessProbe: {} ## @param readReplicas.customReadinessProbe Custom readinessProbe that overrides the default one ## customReadinessProbe: {} ## @param readReplicas.customStartupProbe Custom startupProbe that overrides the default one ## customStartupProbe: {} ## @param readReplicas.lifecycleHooks for the PostgreSQL read only container to automate configuration before or after startup ## lifecycleHooks: {} ## PostgreSQL read only resource requests and limits ## ref: https://kubernetes.io/docs/user-guide/compute-resources/ ## @param readReplicas.resources.limits The resources limits for the PostgreSQL read only containers ## @param readReplicas.resources.requests.memory The requested memory for the PostgreSQL read only containers ## @param readReplicas.resources.requests.cpu The requested cpu for the PostgreSQL read only containers ## resources: limits: {} requests: memory: 256Mi cpu: 250m ## Pod Security Context ## ref: https://kubernetes.io/docs/tasks/configure-pod-container/security-context/ ## @param readReplicas.podSecurityContext.enabled Enable security context ## @param readReplicas.podSecurityContext.fsGroup Group ID for the pod ## podSecurityContext: enabled: true fsGroup: 1001 ## Container Security Context ## ref: https://kubernetes.io/docs/tasks/configure-pod-container/security-context/ ## @param readReplicas.containerSecurityContext.enabled Enable container security context ## @param readReplicas.containerSecurityContext.runAsUser User ID for the container ## containerSecurityContext: enabled: true runAsUser: 1001 ## @param readReplicas.hostAliases PostgreSQL read only pods host aliases ## https://kubernetes.io/docs/concepts/services-networking/add-entries-to-pod-etc-hosts-with-host-aliases/ ## hostAliases: [] ## @param readReplicas.hostNetwork Specify if host network should be enabled for PostgreSQL pod (PostgreSQL read only) ## hostNetwork: false ## @param readReplicas.hostIPC Specify if host IPC should be enabled for PostgreSQL pod (postgresql primary) ## hostIPC: false ## @param readReplicas.labels Map of labels to add to the statefulset (PostgreSQL read only) ## labels: {} ## @param readReplicas.annotations Annotations for PostgreSQL read only pods ## annotations: {} ## @param readReplicas.podLabels Map of labels to add to the pods (PostgreSQL read only) ## podLabels: {} ## @param readReplicas.podAnnotations Map of annotations to add to the pods (PostgreSQL read only) ## podAnnotations: {} ## @param readReplicas.podAffinityPreset PostgreSQL read only pod affinity preset. Ignored if `primary.affinity` is set. Allowed values: `soft` or `hard` ## ref: https://kubernetes.io/docs/concepts/scheduling-eviction/assign-pod-node/#inter-pod-affinity-and-anti-affinity ## podAffinityPreset: "" ## @param readReplicas.podAntiAffinityPreset PostgreSQL read only pod anti-affinity preset. Ignored if `primary.affinity` is set. Allowed values: `soft` or `hard` ## ref: https://kubernetes.io/docs/concepts/scheduling-eviction/assign-pod-node/#inter-pod-affinity-and-anti-affinity ## podAntiAffinityPreset: soft ## PostgreSQL read only node affinity preset ## ref: https://kubernetes.io/docs/concepts/scheduling-eviction/assign-pod-node/#node-affinity ## nodeAffinityPreset: ## @param readReplicas.nodeAffinityPreset.type PostgreSQL read only node affinity preset type. Ignored if `primary.affinity` is set. Allowed values: `soft` or `hard` ## type: "" ## @param readReplicas.nodeAffinityPreset.key PostgreSQL read only node label key to match Ignored if `primary.affinity` is set. ## E.g. ## key: "kubernetes.io/e2e-az-name" ## key: "" ## @param readReplicas.nodeAffinityPreset.values PostgreSQL read only node label values to match. Ignored if `primary.affinity` is set. ## E.g. ## values: ## - e2e-az1 ## - e2e-az2 ## values: [] ## @param readReplicas.affinity Affinity for PostgreSQL read only pods assignment ## ref: https://kubernetes.io/docs/concepts/configuration/assign-pod-node/#affinity-and-anti-affinity ## Note: primary.podAffinityPreset, primary.podAntiAffinityPreset, and primary.nodeAffinityPreset will be ignored when it's set ## affinity: {} ## @param readReplicas.nodeSelector Node labels for PostgreSQL read only pods assignment ## ref: https://kubernetes.io/docs/user-guide/node-selection/ ## nodeSelector: {} ## @param readReplicas.tolerations Tolerations for PostgreSQL read only pods assignment ## ref: https://kubernetes.io/docs/concepts/configuration/taint-and-toleration/ ## tolerations: [] ## @param readReplicas.topologySpreadConstraints Topology Spread Constraints for pod assignment spread across your cluster among failure-domains. Evaluated as a template ## Ref: https://kubernetes.io/docs/concepts/workloads/pods/pod-topology-spread-constraints/#spread-constraints-for-pods ## topologySpreadConstraints: {} ## @param readReplicas.priorityClassName Priority Class to use for each pod (PostgreSQL read only) ## priorityClassName: "" ## @param readReplicas.schedulerName Use an alternate scheduler, e.g. "stork". ## ref: https://kubernetes.io/docs/tasks/administer-cluster/configure-multiple-schedulers/ ## schedulerName: "" ## @param readReplicas.terminationGracePeriodSeconds Seconds PostgreSQL read only pod needs to terminate gracefully ## ref: https://kubernetes.io/docs/concepts/workloads/pods/pod/#termination-of-pods ## terminationGracePeriodSeconds: "" ## @param readReplicas.updateStrategy.type PostgreSQL read only statefulset strategy type ## @param readReplicas.updateStrategy.rollingUpdate PostgreSQL read only statefulset rolling update configuration parameters ## ref: https://kubernetes.io/docs/concepts/workloads/controllers/statefulset/#update-strategies ## updateStrategy: type: RollingUpdate rollingUpdate: {} ## @param readReplicas.extraVolumeMounts Optionally specify extra list of additional volumeMounts for the PostgreSQL read only container(s) ## extraVolumeMounts: [] ## @param readReplicas.extraVolumes Optionally specify extra list of additional volumes for the PostgreSQL read only pod(s) ## extraVolumes: [] ## @param readReplicas.sidecars Add additional sidecar containers to the PostgreSQL read only pod(s) ## For example: ## sidecars: ## - name: your-image-name ## image: your-image ## imagePullPolicy: Always ## ports: ## - name: portname ## containerPort: 1234 ## sidecars: [] ## @param readReplicas.initContainers Add additional init containers to the PostgreSQL read only pod(s) ## Example ## ## initContainers: ## - name: do-something ## image: busybox ## command: ['do', 'something'] ## initContainers: [] ## @param readReplicas.extraPodSpec Optionally specify extra PodSpec for the PostgreSQL read only pod(s) ## extraPodSpec: {} ## PostgreSQL read only service configuration ## service: ## @param readReplicas.service.type Kubernetes Service type ## type: ClusterIP ## @param readReplicas.service.ports.postgresql PostgreSQL service port ## ports: postgresql: 5432 ## Node ports to expose ## NOTE: choose port between <30000-32767> ## @param readReplicas.service.nodePorts.postgresql Node port for PostgreSQL ## ref: https://kubernetes.io/docs/concepts/services-networking/service/#type-nodeport ## nodePorts: postgresql: "" ## @param readReplicas.service.clusterIP Static clusterIP or None for headless services ## e.g: ## clusterIP: None ## clusterIP: "" ## @param readReplicas.service.annotations Annotations for PostgreSQL read only service ## annotations: {} ## @param readReplicas.service.loadBalancerIP Load balancer IP if service type is `LoadBalancer` ## Set the LoadBalancer service type to internal only ## ref: https://kubernetes.io/docs/concepts/services-networking/service/#internal-load-balancer ## loadBalancerIP: "" ## @param readReplicas.service.externalTrafficPolicy Enable client source IP preservation ## ref https://kubernetes.io/docs/tasks/access-application-cluster/create-external-load-balancer/#preserving-the-client-source-ip ## externalTrafficPolicy: Cluster ## @param readReplicas.service.loadBalancerSourceRanges Addresses that are allowed when service is LoadBalancer ## https://kubernetes.io/docs/tasks/access-application-cluster/configure-cloud-provider-firewall/#restrict-access-for-loadbalancer-service ## ## loadBalancerSourceRanges: ## - 10.10.10.0/24 ## loadBalancerSourceRanges: [] ## @param readReplicas.service.extraPorts Extra ports to expose in the PostgreSQL read only service ## extraPorts: [] ## PostgreSQL read only persistence configuration ## persistence: ## @param readReplicas.persistence.enabled Enable PostgreSQL read only data persistence using PVC ## enabled: true ## @param readReplicas.persistence.mountPath The path the volume will be mounted at ## Note: useful when using custom PostgreSQL images ## mountPath: /bitnami/postgresql ## @param readReplicas.persistence.subPath The subdirectory of the volume to mount to ## Useful in dev environments and one PV for multiple services ## subPath: "" ## @param readReplicas.persistence.storageClass PVC Storage Class for PostgreSQL read only data volume ## If defined, storageClassName: <storageClass> ## If set to "-", storageClassName: "", which disables dynamic provisioning ## If undefined (the default) or set to null, no storageClassName spec is ## set, choosing the default provisioner. (gp2 on AWS, standard on ## GKE, AWS & OpenStack) ## storageClass: "" ## @param readReplicas.persistence.accessModes PVC Access Mode for PostgreSQL volume ## accessModes: - ReadWriteOnce ## @param readReplicas.persistence.size PVC Storage Request for PostgreSQL volume ## size: 8Gi ## @param readReplicas.persistence.annotations Annotations for the PVC ## annotations: {} ## @param readReplicas.persistence.selector Selector to match an existing Persistent Volume (this value is evaluated as a template) ## selector: ## matchLabels: ## app: my-app ## selector: {} ## @param readReplicas.persistence.dataSource Custom PVC data source ## dataSource: {} ## @section NetworkPolicy parameters ## Add networkpolicies ## networkPolicy: ## @param networkPolicy.enabled Enable network policies ## enabled: false ## @param networkPolicy.metrics.enabled Enable network policies for metrics (prometheus) ## @param networkPolicy.metrics.namespaceSelector [object] Monitoring namespace selector labels. These labels will be used to identify the prometheus' namespace. ## @param networkPolicy.metrics.podSelector [object] Monitoring pod selector labels. These labels will be used to identify the Prometheus pods. ## metrics: enabled: false ## e.g: ## namespaceSelector: ## label: monitoring ## namespaceSelector: {} ## e.g: ## podSelector: ## label: monitoring ## podSelector: {} ## Ingress Rules ## ingressRules: ## @param networkPolicy.ingressRules.primaryAccessOnlyFrom.enabled Enable ingress rule that makes PostgreSQL primary node only accessible from a particular origin. ## @param networkPolicy.ingressRules.primaryAccessOnlyFrom.namespaceSelector [object] Namespace selector label that is allowed to access the PostgreSQL primary node. This label will be used to identified the allowed namespace(s). ## @param networkPolicy.ingressRules.primaryAccessOnlyFrom.podSelector [object] Pods selector label that is allowed to access the PostgreSQL primary node. This label will be used to identified the allowed pod(s). ## @param networkPolicy.ingressRules.primaryAccessOnlyFrom.customRules [object] Custom network policy for the PostgreSQL primary node. ## primaryAccessOnlyFrom: enabled: false ## e.g: ## namespaceSelector: ## label: ingress ## namespaceSelector: {} ## e.g: ## podSelector: ## label: access ## podSelector: {} ## custom ingress rules ## e.g: ## customRules: ## - from: ## - namespaceSelector: ## matchLabels: ## label: example customRules: {} ## @param networkPolicy.ingressRules.readReplicasAccessOnlyFrom.enabled Enable ingress rule that makes PostgreSQL read-only nodes only accessible from a particular origin. ## @param networkPolicy.ingressRules.readReplicasAccessOnlyFrom.namespaceSelector [object] Namespace selector label that is allowed to access the PostgreSQL read-only nodes. This label will be used to identified the allowed namespace(s). ## @param networkPolicy.ingressRules.readReplicasAccessOnlyFrom.podSelector [object] Pods selector label that is allowed to access the PostgreSQL read-only nodes. This label will be used to identified the allowed pod(s). ## @param networkPolicy.ingressRules.readReplicasAccessOnlyFrom.customRules [object] Custom network policy for the PostgreSQL read-only nodes. ## readReplicasAccessOnlyFrom: enabled: false ## e.g: ## namespaceSelector: ## label: ingress ## namespaceSelector: {} ## e.g: ## podSelector: ## label: access ## podSelector: {} ## custom ingress rules ## e.g: ## CustomRules: ## - from: ## - namespaceSelector: ## matchLabels: ## label: example customRules: {} ## @param networkPolicy.egressRules.denyConnectionsToExternal Enable egress rule that denies outgoing traffic outside the cluster, except for DNS (port 53). ## @param networkPolicy.egressRules.customRules [object] Custom network policy rule ## egressRules: # Deny connections to external. This is not compatible with an external database. denyConnectionsToExternal: false ## Additional custom egress rules ## e.g: ## customRules: ## - to: ## - namespaceSelector: ## matchLabels: ## label: example customRules: {} ## @section Volume Permissions parameters ## Init containers parameters: ## volumePermissions: Change the owner and group of the persistent volume(s) mountpoint(s) to 'runAsUser:fsGroup' on each node ## volumePermissions: ## @param volumePermissions.enabled Enable init container that changes the owner and group of the persistent volume ## enabled: false ## @param volumePermissions.image.registry Init container volume-permissions image registry ## @param volumePermissions.image.repository Init container volume-permissions image repository ## @param volumePermissions.image.tag Init container volume-permissions image tag (immutable tags are recommended) ## @param volumePermissions.image.pullPolicy Init container volume-permissions image pull policy ## @param volumePermissions.image.pullSecrets Init container volume-permissions image pull secrets ## image: registry: docker.io repository: bitnami/bitnami-shell tag: 10-debian-10-r365 pullPolicy: IfNotPresent ## Optionally specify an array of imagePullSecrets. ## Secrets must be manually created in the namespace. ## ref: https://kubernetes.io/docs/tasks/configure-pod-container/pull-image-private-registry/ ## Example: ## pullSecrets: ## - myRegistryKeySecretName ## pullSecrets: [] ## Init container resource requests and limits ## ref: https://kubernetes.io/docs/user-guide/compute-resources/ ## @param volumePermissions.resources.limits Init container volume-permissions resource limits ## @param volumePermissions.resources.requests Init container volume-permissions resource requests ## resources: limits: {} requests: {} ## Init container' Security Context ## Note: the chown of the data folder is done to containerSecurityContext.runAsUser ## and not the below volumePermissions.containerSecurityContext.runAsUser ## @param volumePermissions.containerSecurityContext.runAsUser User ID for the init container ## containerSecurityContext: runAsUser: 0 ## @section Other Parameters ## Service account for PostgreSQL to use. ## ref: https://kubernetes.io/docs/tasks/configure-pod-container/configure-service-account/ ## serviceAccount: ## @param serviceAccount.create Enable creation of ServiceAccount for PostgreSQL pod ## create: false ## @param serviceAccount.name The name of the ServiceAccount to use. ## If not set and create is true, a name is generated using the common.names.fullname template ## name: "" ## @param serviceAccount.automountServiceAccountToken Allows auto mount of ServiceAccountToken on the serviceAccount created ## Can be set to false if pods using this serviceAccount do not need to use K8s API ## automountServiceAccountToken: true ## @param serviceAccount.annotations Additional custom annotations for the ServiceAccount ## annotations: {} ## Creates role for ServiceAccount ## @param rbac.create Create Role and RoleBinding (required for PSP to work) ## rbac: create: false ## @param rbac.rules Custom RBAC rules to set ## e.g: ## rules: ## - apiGroups: ## - "" ## resources: ## - pods ## verbs: ## - get ## - list ## rules: [] ## Pod Security Policy ## ref: https://kubernetes.io/docs/concepts/policy/pod-security-policy/ ## @param psp.create Whether to create a PodSecurityPolicy. WARNING: PodSecurityPolicy is deprecated in Kubernetes v1.21 or later, unavailable in v1.25 or later ## psp: create: false ## @section Metrics Parameters metrics: ## @param metrics.enabled Start a prometheus exporter ## enabled: false ## @param metrics.image.registry PostgreSQL Prometheus Exporter image registry ## @param metrics.image.repository PostgreSQL Prometheus Exporter image repository ## @param metrics.image.tag PostgreSQL Prometheus Exporter image tag (immutable tags are recommended) ## @param metrics.image.pullPolicy PostgreSQL Prometheus Exporter image pull policy ## @param metrics.image.pullSecrets Specify image pull secrets ## image: registry: docker.io repository: bitnami/postgres-exporter tag: 0.10.1-debian-10-r52 pullPolicy: IfNotPresent ## Optionally specify an array of imagePullSecrets. ## Secrets must be manually created in the namespace. ## ref: https://kubernetes.io/docs/tasks/configure-pod-container/pull-image-private-registry/ ## Example: ## pullSecrets: ## - myRegistryKeySecretName ## pullSecrets: [] ## @param metrics.customMetrics Define additional custom metrics ## ref: https://github.com/wrouesnel/postgres_exporter#adding-new-metrics-via-a-config-file ## customMetrics: ## pg_database: ## query: "SELECT d.datname AS name, CASE WHEN pg_catalog.has_database_privilege(d.datname, 'CONNECT') THEN pg_catalog.pg_database_size(d.datname) ELSE 0 END AS size_bytes FROM pg_catalog.pg_database d where datname not in ('template0', 'template1', 'postgres')" ## metrics: ## - name: ## usage: "LABEL" ## description: "Name of the database" ## - size_bytes: ## usage: "GAUGE" ## description: "Size of the database in bytes" ## customMetrics: {} ## @param metrics.extraEnvVars Extra environment variables to add to PostgreSQL Prometheus exporter ## see: https://github.com/wrouesnel/postgres_exporter#environment-variables ## For example: ## extraEnvVars: ## - name: PG_EXPORTER_DISABLE_DEFAULT_METRICS ## value: "true" ## extraEnvVars: [] ## PostgreSQL Prometheus exporter containers' Security Context ## ref: https://kubernetes.io/docs/tasks/configure-pod-container/security-context/#set-the-security-context-for-a-container ## @param metrics.containerSecurityContext.enabled Enable PostgreSQL Prometheus exporter containers' Security Context ## @param metrics.containerSecurityContext.runAsUser Set PostgreSQL Prometheus exporter containers' Security Context runAsUser ## @param metrics.containerSecurityContext.runAsNonRoot Set PostgreSQL Prometheus exporter containers' Security Context runAsNonRoot ## containerSecurityContext: enabled: true runAsUser: 1001 runAsNonRoot: true ## Configure extra options for PostgreSQL Prometheus exporter containers' liveness, readiness and startup probes ## ref: https://kubernetes.io/docs/tasks/configure-pod-container/configure-liveness-readiness-startup-probes/#configure-probes ## @param metrics.livenessProbe.enabled Enable livenessProbe on PostgreSQL Prometheus exporter containers ## @param metrics.livenessProbe.initialDelaySeconds Initial delay seconds for livenessProbe ## @param metrics.livenessProbe.periodSeconds Period seconds for livenessProbe ## @param metrics.livenessProbe.timeoutSeconds Timeout seconds for livenessProbe ## @param metrics.livenessProbe.failureThreshold Failure threshold for livenessProbe ## @param metrics.livenessProbe.successThreshold Success threshold for livenessProbe ## livenessProbe: enabled: true initialDelaySeconds: 5 periodSeconds: 10 timeoutSeconds: 5 failureThreshold: 6 successThreshold: 1 ## @param metrics.readinessProbe.enabled Enable readinessProbe on PostgreSQL Prometheus exporter containers ## @param metrics.readinessProbe.initialDelaySeconds Initial delay seconds for readinessProbe ## @param metrics.readinessProbe.periodSeconds Period seconds for readinessProbe ## @param metrics.readinessProbe.timeoutSeconds Timeout seconds for readinessProbe ## @param metrics.readinessProbe.failureThreshold Failure threshold for readinessProbe ## @param metrics.readinessProbe.successThreshold Success threshold for readinessProbe ## readinessProbe: enabled: true initialDelaySeconds: 5 periodSeconds: 10 timeoutSeconds: 5 failureThreshold: 6 successThreshold: 1 ## @param metrics.startupProbe.enabled Enable startupProbe on PostgreSQL Prometheus exporter containers ## @param metrics.startupProbe.initialDelaySeconds Initial delay seconds for startupProbe ## @param metrics.startupProbe.periodSeconds Period seconds for startupProbe ## @param metrics.startupProbe.timeoutSeconds Timeout seconds for startupProbe ## @param metrics.startupProbe.failureThreshold Failure threshold for startupProbe ## @param metrics.startupProbe.successThreshold Success threshold for startupProbe ## startupProbe: enabled: false initialDelaySeconds: 10 periodSeconds: 10 timeoutSeconds: 1 failureThreshold: 15 successThreshold: 1 ## @param metrics.customLivenessProbe Custom livenessProbe that overrides the default one ## customLivenessProbe: {} ## @param metrics.customReadinessProbe Custom readinessProbe that overrides the default one ## customReadinessProbe: {} ## @param metrics.customStartupProbe Custom startupProbe that overrides the default one ## customStartupProbe: {} ## @param metrics.containerPorts.metrics PostgreSQL Prometheus exporter metrics container port ## containerPorts: metrics: 9187 ## PostgreSQL Prometheus exporter resource requests and limits ## ref: https://kubernetes.io/docs/user-guide/compute-resources/ ## @param metrics.resources.limits The resources limits for the PostgreSQL Prometheus exporter container ## @param metrics.resources.requests The requested resources for the PostgreSQL Prometheus exporter container ## resources: limits: {} requests: {} ## Service configuration ## service: ## @param metrics.service.ports.metrics PostgreSQL Prometheus Exporter service port ## ports: metrics: 9187 ## @param metrics.service.clusterIP Static clusterIP or None for headless services ## ref: https://kubernetes.io/docs/concepts/services-networking/service/#choosing-your-own-ip-address ## clusterIP: "" ## @param metrics.service.sessionAffinity Control where client requests go, to the same pod or round-robin ## Values: ClientIP or None ## ref: https://kubernetes.io/docs/user-guide/services/ ## sessionAffinity: None ## @param metrics.service.annotations [object] Annotations for Prometheus to auto-discover the metrics endpoint ## annotations: prometheus.io/scrape: "true" prometheus.io/port: "{{ .Values.metrics.service.ports.metrics }}" ## Prometheus Operator ServiceMonitor configuration ## serviceMonitor: ## @param metrics.serviceMonitor.enabled Create ServiceMonitor Resource for scraping metrics using Prometheus Operator ## enabled: false ## @param metrics.serviceMonitor.namespace Namespace for the ServiceMonitor Resource (defaults to the Release Namespace) ## namespace: "" ## @param metrics.serviceMonitor.interval Interval at which metrics should be scraped. ## ref: https://github.com/coreos/prometheus-operator/blob/master/Documentation/api.md#endpoint ## interval: "" ## @param metrics.serviceMonitor.scrapeTimeout Timeout after which the scrape is ended ## ref: https://github.com/coreos/prometheus-operator/blob/master/Documentation/api.md#endpoint ## scrapeTimeout: "" ## @param metrics.serviceMonitor.labels Additional labels that can be used so ServiceMonitor will be discovered by Prometheus ## labels: {} ## @param metrics.serviceMonitor.selector Prometheus instance selector labels ## ref: https://github.com/bitnami/charts/tree/master/bitnami/prometheus-operator#prometheus-configuration ## selector: {} ## @param metrics.serviceMonitor.relabelings RelabelConfigs to apply to samples before scraping ## relabelings: [] ## @param metrics.serviceMonitor.metricRelabelings MetricRelabelConfigs to apply to samples before ingestion ## metricRelabelings: [] ## @param metrics.serviceMonitor.honorLabels Specify honorLabels parameter to add the scrape endpoint ## honorLabels: false ## @param metrics.serviceMonitor.jobLabel The name of the label on the target service to use as the job name in prometheus. ## jobLabel: "" ## Custom PrometheusRule to be defined ## The value is evaluated as a template, so, for example, the value can depend on .Release or .Chart ## ref: https://github.com/coreos/prometheus-operator#customresourcedefinitions ## prometheusRule: ## @param metrics.prometheusRule.enabled Create a PrometheusRule for Prometheus Operator ## enabled: false ## @param metrics.prometheusRule.namespace Namespace for the PrometheusRule Resource (defaults to the Release Namespace) ## namespace: "" ## @param metrics.prometheusRule.labels Additional labels that can be used so PrometheusRule will be discovered by Prometheus ## labels: {} ## @param metrics.prometheusRule.rules PrometheusRule definitions ## Make sure to constraint the rules to the current postgresql service. ## rules: ## - alert: HugeReplicationLag ## expr: pg_replication_lag{service="{{ printf "%s-metrics" (include "common.names.fullname" .) }}"} / 3600 > 1 ## for: 1m ## labels: ## severity: critical ## annotations: ## description: replication for {{ include "common.names.fullname" . }} PostgreSQL is lagging by {{ "{{ $value }}" }} hour(s). ## summary: PostgreSQL replication is lagging by {{ "{{ $value }}" }} hour(s). ## rules: []
43.874251
268
0.737222
42e1f72da4130733d42a97fb98e0b4bd755420ce
26,237
yaml
YAML
bitnami/apache/values.yaml
00arthur00/charts
502aa1e64541669b732a4eda896e5937847b6c3c
[ "Apache-2.0" ]
null
null
null
bitnami/apache/values.yaml
00arthur00/charts
502aa1e64541669b732a4eda896e5937847b6c3c
[ "Apache-2.0" ]
2
2022-01-26T01:14:30.000Z
2022-01-26T07:03:39.000Z
bitnami/apache/values.yaml
00arthur00/charts
502aa1e64541669b732a4eda896e5937847b6c3c
[ "Apache-2.0" ]
null
null
null
## @section Global parameters ## Global Docker image parameters ## Please, note that this will override the image parameters, including dependencies, configured to use the global value ## Current available global Docker image parameters: imageRegistry, imagePullSecrets and storageClass ## @param global.imageRegistry Global Docker image registry ## @param global.imagePullSecrets Global Docker registry secret names as an array ## @param global.storageClass Global StorageClass for Persistent Volume(s) ## global: imageRegistry: "" ## E.g. ## imagePullSecrets: ## - myRegistryKeySecretName ## imagePullSecrets: [] storageClass: "" ## @section Common parameters ## @param kubeVersion Override Kubernetes version ## kubeVersion: "" ## @param nameOverride String to partially override common.names.fullname ## nameOverride: "" ## @param fullnameOverride String to fully override common.names.fullname ## fullnameOverride: "" ## @param commonLabels Labels to add to all deployed objects ## commonLabels: {} ## @param commonAnnotations Annotations to add to all deployed objects ## commonAnnotations: {} ## @param extraDeploy Array of extra objects to deploy with the release ## extraDeploy: [] ## @section Apache parameters ## Bitnami Apache image ## ref: https://hub.docker.com/r/bitnami/apache/tags/ ## @param image.registry Apache image registry ## @param image.repository Apache image repository ## @param image.tag Apache image tag (immutable tags are recommended) ## @param image.pullPolicy Apache image pull policy ## @param image.pullSecrets Apache image pull secrets ## @param image.debug Enable image debug mode ## image: registry: docker.io repository: bitnami/apache tag: 2.4.53-debian-10-r1 ## Specify a imagePullPolicy ## Defaults to 'Always' if image tag is 'latest', else set to 'IfNotPresent' ## ref: https://kubernetes.io/docs/user-guide/images/#pre-pulling-images ## pullPolicy: IfNotPresent ## Optionally specify an array of imagePullSecrets. ## Secrets must be manually created in the namespace. ## ref: https://kubernetes.io/docs/tasks/configure-pod-container/pull-image-private-registry/ ## e.g: ## pullSecrets: ## - myRegistryKeySecretName ## pullSecrets: [] ## Enable debug mode ## debug: false ## Bitnami Git image version ## ref: https://hub.docker.com/r/bitnami/git/tags/ ## @param git.registry Git image registry ## @param git.repository Git image name ## @param git.tag Git image tag ## @param git.pullPolicy Git image pull policy ## @param git.pullSecrets Specify docker-registry secret names as an array ## git: registry: docker.io repository: bitnami/git tag: 2.35.1-debian-10-r45 pullPolicy: IfNotPresent ## Optionally specify an array of imagePullSecrets. ## Secrets must be manually created in the namespace. ## ref: https://kubernetes.io/docs/tasks/configure-pod-container/pull-image-private-registry/ ## e.g: ## pullSecrets: ## - myRegistryKeySecretName ## pullSecrets: [] ## @param replicaCount Number of replicas of the Apache deployment ## replicaCount: 1 ## @param podAffinityPreset Pod affinity preset. Ignored if `affinity` is set. Allowed values: `soft` or `hard` ## ref: https://kubernetes.io/docs/concepts/scheduling-eviction/assign-pod-node/#inter-pod-affinity-and-anti-affinity ## podAffinityPreset: "" ## @param podAntiAffinityPreset Pod anti-affinity preset. Ignored if `affinity` is set. Allowed values: `soft` or `hard` ## Ref: https://kubernetes.io/docs/concepts/scheduling-eviction/assign-pod-node/#inter-pod-affinity-and-anti-affinity ## podAntiAffinityPreset: soft ## Node affinity preset ## Ref: https://kubernetes.io/docs/concepts/scheduling-eviction/assign-pod-node/#node-affinity ## nodeAffinityPreset: ## @param nodeAffinityPreset.type Node affinity preset type. Ignored if `affinity` is set. Allowed values: `soft` or `hard` ## type: "" ## @param nodeAffinityPreset.key Node label key to match. Ignored if `affinity` is set ## key: "" ## @param nodeAffinityPreset.values Node label values to match. Ignored if `affinity` is set ## E.g. ## values: ## - e2e-az1 ## - e2e-az2 ## values: [] ## @param affinity Affinity for pod assignment ## Ref: https://kubernetes.io/docs/concepts/configuration/assign-pod-node/#affinity-and-anti-affinity ## NOTE: podAffinityPreset, podAntiAffinityPreset, and nodeAffinityPreset will be ignored when it's set ## affinity: {} ## @param nodeSelector Node labels for pod assignment ## ref: https://kubernetes.io/docs/user-guide/node-selection/ ## nodeSelector: {} ## @param tolerations Tolerations for pod assignment ## ref: https://kubernetes.io/docs/concepts/configuration/taint-and-toleration/ ## tolerations: [] ## @param topologySpreadConstraints Topology Spread Constraints for pod assignment spread across your cluster among failure-domains. Evaluated as a template ## Ref: https://kubernetes.io/docs/concepts/workloads/pods/pod-topology-spread-constraints/#spread-constraints-for-pods ## topologySpreadConstraints: [] ## @param extraPodSpec Optionally specify extra PodSpec ## extraPodSpec: {} ## Get the server static content from a git repository ## @param cloneHtdocsFromGit.enabled Get the server static content from a git repository ## @param cloneHtdocsFromGit.repository Repository to clone static content from ## @param cloneHtdocsFromGit.branch Branch inside the git repository ## @param cloneHtdocsFromGit.enableAutoRefresh Enables an automatic git pull with a sidecar container ## @param cloneHtdocsFromGit.interval Interval for sidecar container pull from the repository ## @param cloneHtdocsFromGit.resources Init container git resource requests ## @param cloneHtdocsFromGit.extraVolumeMounts Add extra volume mounts for the GIT containers ## cloneHtdocsFromGit: enabled: false repository: "" branch: "" enableAutoRefresh: true interval: 60 resources: {} ## Useful to mount keys to connect through ssh. (normally used with extraVolumes) ## E.g: ## extraVolumeMounts: ## - name: ssh-dir ## mountPath: /root/.ssh/ ## extraVolumeMounts: [] ## @param htdocsConfigMap Name of a config map with the server static content ## htdocsConfigMap: "" ## @param htdocsPVC Name of a PVC with the server static content ## htdocsPVC: "" ## @param vhostsConfigMap Name of a config map with the virtual hosts content ## vhostsConfigMap: "" ## @param httpdConfConfigMap Name of a config map with the httpd.conf file contents ## httpdConfConfigMap: "" ## @param podLabels Extra labels for Apache pods ## ref: https://kubernetes.io/docs/concepts/overview/working-with-objects/labels/ ## podLabels: {} ## @param podAnnotations Pod annotations ## ref: https://kubernetes.io/docs/concepts/overview/working-with-objects/annotations/ ## podAnnotations: {} ## @param hostAliases [array] Add deployment host aliases ## https://kubernetes.io/docs/concepts/services-networking/add-entries-to-pod-etc-hosts-with-host-aliases/ ## hostAliases: ## Necessary for apache-exporter to work ## - ip: "127.0.0.1" hostnames: - "status.localhost" ## @param priorityClassName Apache Server pods' priorityClassName ## priorityClassName: "" ## @param schedulerName Name of the k8s scheduler (other than default) ## ref: https://kubernetes.io/docs/tasks/administer-cluster/configure-multiple-schedulers/ ## schedulerName: "" ## Configure Pods Security Context ## ref: https://kubernetes.io/docs/tasks/configure-pod-container/security-context/#set-the-security-context-for-a-pod ## @param podSecurityContext.enabled Enabled Apache Server pods' Security Context ## @param podSecurityContext.fsGroup Set Apache Server pod's Security Context fsGroup ## podSecurityContext: enabled: true fsGroup: 1001 ## Configure Container Security Context ## ref: https://kubernetes.io/docs/tasks/configure-pod-container/security-context/#set-the-security-context-for-a-pod ## @param containerSecurityContext.enabled Enabled Apache Server containers' Security Context ## @param containerSecurityContext.runAsUser Set Apache Server containers' Security Context runAsUser ## @param containerSecurityContext.runAsNonRoot Set Controller container's Security Context runAsNonRoot ## containerSecurityContext: enabled: true runAsUser: 1001 runAsNonRoot: true ## @param command Override default container command (useful when using custom images) ## command: [] ## @param args Override default container args (useful when using custom images) ## args: [] ## @param lifecycleHooks for the Apache server container(s) to automate configuration before or after startup ## lifecycleHooks: {} ## Apache pods' resource requests and limits ## ref: https://kubernetes.io/docs/user-guide/compute-resources/ ## We usually recommend not to specify default resources and to leave this as a conscious ## choice for the user. This also increases chances charts run on environments with little ## resources, such as Minikube. If you do want to specify resources, uncomment the following ## lines, adjust them as necessary, and remove the curly braces after 'resources:'. ## @param resources.limits The resources limits for the container ## @param resources.requests The requested resources for the container ## resources: ## Example: ## limits: ## cpu: 100m ## memory: 128Mi limits: {} ## Examples: ## requests: ## cpu: 100m ## memory: 128Mi requests: {} ## Configure extra options for containers' liveness and readiness probes ## Configure extra options for Apache server containers' liveness, readiness and startup probes ## ref: https://kubernetes.io/docs/tasks/configure-pod-container/configure-liveness-readiness-probes/#configure-probes) ## @param startupProbe.enabled Enable startupProbe ## @param startupProbe.path Path to access on the HTTP server ## @param startupProbe.port Port for startupProbe ## @param startupProbe.initialDelaySeconds Initial delay seconds for startupProbe ## @param startupProbe.periodSeconds Period seconds for startupProbe ## @param startupProbe.timeoutSeconds Timeout seconds for startupProbe ## @param startupProbe.failureThreshold Failure threshold for startupProbe ## @param startupProbe.successThreshold Success threshold for startupProbe ## startupProbe: enabled: false path: "/" port: http initialDelaySeconds: 180 periodSeconds: 20 timeoutSeconds: 5 failureThreshold: 6 successThreshold: 1 ## @param livenessProbe.enabled Enable liveness probe ## @param livenessProbe.path Path to access on the HTTP server ## @param livenessProbe.port Port for livenessProbe ## @param livenessProbe.initialDelaySeconds Initial delay seconds for livenessProbe ## @param livenessProbe.periodSeconds Period seconds for livenessProbe ## @param livenessProbe.timeoutSeconds Timeout seconds for livenessProbe ## @param livenessProbe.failureThreshold Failure threshold for livenessProbe ## @param livenessProbe.successThreshold Success threshold for livenessProbe ## livenessProbe: enabled: true path: "/" port: http initialDelaySeconds: 180 periodSeconds: 20 timeoutSeconds: 5 failureThreshold: 6 successThreshold: 1 ## @param readinessProbe.enabled Enable readiness probe ## @param readinessProbe.path Path to access on the HTTP server ## @param readinessProbe.port Port for readinessProbe ## @param readinessProbe.initialDelaySeconds Initial delay seconds for readinessProbe ## @param readinessProbe.periodSeconds Period seconds for readinessProbe ## @param readinessProbe.timeoutSeconds Timeout seconds for readinessProbe ## @param readinessProbe.failureThreshold Failure threshold for readinessProbe ## @param readinessProbe.successThreshold Success threshold for readinessProbe ## readinessProbe: enabled: true path: "/" port: http initialDelaySeconds: 30 periodSeconds: 10 timeoutSeconds: 5 failureThreshold: 6 successThreshold: 1 ## @param customStartupProbe Custom liveness probe for the Web component ## customStartupProbe: {} ## @param customLivenessProbe Custom liveness probe for the Web component ## customLivenessProbe: {} ## @param customReadinessProbe Custom rediness probe for the Web component ## customReadinessProbe: {} ## @param extraVolumes Array to add extra volumes (evaluated as a template) ## extraVolumes: [] ## @param extraVolumeMounts Array to add extra mounts (normally used with extraVolumes, evaluated as a template) ## extraVolumeMounts: [] ## @param extraEnvVars Array to add extra environment variables ## extraEnvVars: [] ## @param extraEnvVarsCM Name of existing ConfigMap containing extra env vars for Apache server nodes ## extraEnvVarsCM: "" ## @param extraEnvVarsSecret Name of existing Secret containing extra env vars for Apache server nodes ## extraEnvVarsSecret: "" ## Apache server container port ## @param containerPorts.http Apache server HTTP container port ## @param containerPorts.https Apache server HTTPS container port ## containerPorts: http: 8080 https: 8443 ## @param initContainers Add additional init containers to the Apache pods ## Example: ## initContainers: ## - name: your-image-name ## image: your-image ## imagePullPolicy: Always ## ports: ## - name: portname ## containerPort: 1234 ## initContainers: [] ## @param sidecars Add additional sidecar containers to the Apache pods ## Example: ## sidecars: ## - name: your-image-name ## image: your-image ## imagePullPolicy: Always ## ports: ## - name: portname ## containerPort: 1234 ## sidecars: [] ## @param updateStrategy.type Apache Server deployment strategy type. ## ref: https://kubernetes.io/docs/concepts/workloads/controllers/deployment/#strategy ## e.g: ## updateStrategy: ## type: RollingUpdate ## rollingUpdate: ## maxSurge: 25% ## maxUnavailable: 25% ## updateStrategy: type: RollingUpdate ## @section Other Parameters ## Apache Pod Disruption Budget configuration ## ref: https://kubernetes.io/docs/tasks/run-application/configure-pdb/ ## @param pdb.create Enable a Pod Disruption Budget creation ## @param pdb.minAvailable Minimum number/percentage of pods that should remain scheduled ## @param pdb.maxUnavailable Maximum number/percentage of pods that may be made unavailable ## pdb: create: false minAvailable: 1 maxUnavailable: "" ## Apache Autoscaling parameters ## ref: https://kubernetes.io/docs/tasks/run-application/horizontal-pod-autoscale/ ## @param autoscaling.enabled Enable Horizontal POD autoscaling for Apache ## @param autoscaling.minReplicas Minimum number of Apache replicas ## @param autoscaling.maxReplicas Maximum number of Apache replicas ## @param autoscaling.targetCPU Target CPU utilization percentage ## @param autoscaling.targetMemory Target Memory utilization percentage ## autoscaling: enabled: false minReplicas: 1 maxReplicas: 11 targetCPU: 50 targetMemory: 50 ## @section Traffic Exposure Parameters ## Apache service parameters ## service: ## @param service.type Apache Service type ## type: LoadBalancer ## @param service.ports.http Apache service HTTP port ## @param service.ports.https Apache service HTTPS port ## ports: http: 80 https: 443 ## Node ports to expose ## @param service.nodePorts.http Node port for HTTP ## @param service.nodePorts.https Node port for HTTPS ## nodePorts: http: "" https: "" ## @param service.clusterIP Apache service Cluster IP ## e.g.: ## clusterIP: None ## clusterIP: "" ## @param service.loadBalancerIP Apache service Load Balancer IP ## ref: https://kubernetes.io/docs/concepts/services-networking/service/#type-loadbalancer ## loadBalancerIP: "" ## @param service.loadBalancerSourceRanges Apache service Load Balancer sources ## ref: https://kubernetes.io/docs/tasks/access-application-cluster/configure-cloud-provider-firewall/#restrict-access-for-loadbalancer-service ## e.g: ## loadBalancerSourceRanges: ## - 10.10.10.0/24 ## loadBalancerSourceRanges: [] ## @param service.annotations Additional custom annotations for Apache service ## This can be used to set the LoadBalancer service type to internal only. ## ref: https://kubernetes.io/docs/concepts/services-networking/service/#internal-load-balancer ## annotations: {} ## @param service.externalTrafficPolicy Apache service external traffic policy ## ref https://kubernetes.io/docs/tasks/access-application-cluster/create-external-load-balancer/#preserving-the-client-source-ip ## externalTrafficPolicy: Cluster ## @param service.extraPorts Extra ports to expose (normally used with the `sidecar` value) ## extraPorts: [] ## @param service.sessionAffinity Session Affinity for Kubernetes service, can be "None" or "ClientIP" ## If "ClientIP", consecutive client requests will be directed to the same mongos Pod ## ref: https://kubernetes.io/docs/concepts/services-networking/service/#virtual-ips-and-service-proxies ## sessionAffinity: None ## @param service.sessionAffinityConfig Additional settings for the sessionAffinity ## sessionAffinityConfig: ## clientIP: ## timeoutSeconds: 300 ## sessionAffinityConfig: {} ## Configure the ingress resource that allows you to access the Apache installation ## ref: https://kubernetes.io/docs/user-guide/ingress/ ## ingress: ## @param ingress.enabled Enable ingress record generation for Apache ## enabled: false ## @param ingress.selfSigned Create a TLS secret for this ingress record using self-signed certificates generated by Helm ## selfSigned: false ## @param ingress.pathType Ingress path type ## pathType: ImplementationSpecific ## @param ingress.apiVersion Force Ingress API version (automatically detected if not set) ## apiVersion: "" ## @param ingress.ingressClassName IngressClass that will be be used to implement the Ingress (Kubernetes 1.18+) ## IngressClassName is used to reference the IngressClass that should be used to implement this Ingress. ## This is supported in Kubernetes 1.18+ and required if you have more than one IngressClass marked as the default for your cluster . ## ref: https://kubernetes.io/blog/2020/04/02/improvements-to-the-ingress-api-in-kubernetes-1.18/ ## ingressClassName: "" ## @param ingress.hostname Default host for the ingress record ## hostname: example.local ## @param ingress.path Default path for the ingress record ## path: / ## @param ingress.annotations Additional annotations for the Ingress resource. To enable certificate autogeneration, place here your cert-manager annotations. ## For a full list of possible ingress annotations, please see ## ref: https://github.com/kubernetes/ingress-nginx/blob/master/docs/user-guide/nginx-configuration/annotations.md ## Use this parameter to set the required annotations for cert-manager, see ## ref: https://cert-manager.io/docs/usage/ingress/#supported-annotations ## ## e.g: ## annotations: ## kubernetes.io/ingress.class: nginx ## cert-manager.io/cluster-issuer: cluster-issuer-name ## annotations: {} ## @param ingress.tls [array] Enable TLS configuration for the hosts defined ## ref: https://kubernetes.io/docs/concepts/services-networking/ingress/#tls ## tls: - hosts: - example.local secretName: example.local-tls ## DEPRECATED: Use ingress.annotations instead of ingress.certManager ## certManager: false ## ## @param ingress.hosts An array with additional hostname(s) to be covered with the ingress record ## Most likely the hostname above will be enough, but in the event more hosts are needed, this is an array ## e.g: ## hosts: ## - name: example.local ## path: / ## hosts: [] ## @param ingress.extraHosts An array with additional hostname(s) to be covered with the ingress record ## e.g: ## extraHosts: ## - name: apache.local ## path: / ## extraHosts: [] ## @param ingress.extraPaths An array with additional arbitrary paths that may need to be added to the ingress under the main host ## e.g: ## extraPaths: ## - path: /* ## backend: ## serviceName: ssl-redirect ## servicePort: use-annotation ## extraPaths: [] ## @param ingress.extraTls TLS configuration for additional hostname(s) to be covered with this ingress record ## ref: https://kubernetes.io/docs/concepts/services-networking/ingress/#tls ## e.g: ## extraTls: ## - hosts: ## - apache.local ## secretName: apache.local-tls ## extraTls: [] ## @param ingress.secrets Custom TLS certificates as secrets ## NOTE: 'key' and 'certificate' are expected in PEM format ## NOTE: 'name' should line up with a 'secretName' set further up ## If it is not set and you're using cert-manager, this is unneeded, as it will create a secret for you with valid certificates ## If it is not set and you're NOT using cert-manager either, self-signed certificates will be created valid for 365 days ## It is also possible to create and manage the certificates outside of this helm chart ## Please see README.md for more information ## e.g: ## secrets: ## - name: example.local-tls ## key: |- ## -----BEGIN RSA PRIVATE KEY----- ## ... ## -----END RSA PRIVATE KEY----- ## certificate: |- ## -----BEGIN CERTIFICATE----- ## ... ## -----END CERTIFICATE----- ## secrets: [] ## @section Metrics Parameters metrics: ## @param metrics.enabled Start a sidecar prometheus exporter to expose Apache metrics ## enabled: false ## Bitnami Apache Prometheus Exporter image ## ref: https://hub.docker.com/r/bitnami/apache-exporter/tags/ ## @param metrics.image.registry Apache Exporter image registry ## @param metrics.image.repository Apache Exporter image repository ## @param metrics.image.tag Apache Exporter image tag (immutable tags are recommended) ## @param metrics.image.pullPolicy Apache Exporter image pull policy ## @param metrics.image.pullSecrets Apache Exporter image pull secrets ## @param metrics.image.debug Apache Exporter image debug mode ## image: registry: docker.io repository: bitnami/apache-exporter tag: 0.11.0-debian-10-r85 pullPolicy: IfNotPresent ## Optionally specify an array of imagePullSecrets. ## Secrets must be manually created in the namespace. ## ref: https://kubernetes.io/docs/tasks/configure-pod-container/pull-image-private-registry/ ## e.g: ## pullSecrets: ## - myRegistryKeySecretName ## pullSecrets: [] ## Enable debug mode ## debug: false ## @param metrics.podAnnotations [object] Additional custom annotations for Apache exporter service ## podAnnotations: prometheus.io/scrape: "true" prometheus.io/port: "9117" ## Apache Prometheus exporter resource requests and limits ## ref: https://kubernetes.io/docs/user-guide/compute-resources/ ## We usually recommend not to specify default resources and to leave this as a conscious ## choice for the user. This also increases chances charts run on environments with little ## resources, such as Minikube. If you do want to specify resources, uncomment the following ## lines, adjust them as necessary, and remove the curly braces after 'resources:'. ## @param metrics.resources.limits The resources limits for the container ## @param metrics.resources.requests The requested resources for the container ## resources: ## Example: ## limits: ## cpu: 100m ## memory: 128Mi limits: {} ## Examples: ## requests: ## cpu: 100m ## memory: 128Mi requests: {} ## Prometheus exporter service parameters ## service: ## @param metrics.service.port Metrics service port ## port: 9117 ## @param metrics.service.annotations [object] Additional custom annotations for Metrics service ## annotations: prometheus.io/scrape: "true" prometheus.io/port: "{{ .Values.metrics.service.port }}" ## Prometheus Operator PodMonitor configuration ## serviceMonitor: ## @param metrics.serviceMonitor.enabled if `true`, creates a Prometheus Operator PodMonitor (also requires `metrics.enabled` to be `true`) ## enabled: false ## @param metrics.serviceMonitor.namespace Namespace for the PodMonitor Resource (defaults to the Release Namespace) ## namespace: "" ## @param metrics.serviceMonitor.interval Interval at which metrics should be scraped. ## ref: https://github.com/coreos/prometheus-operator/blob/master/Documentation/api.md#endpoint ## e.g: ## interval: 10s ## interval: "" ## @param metrics.serviceMonitor.scrapeTimeout Timeout after which the scrape is ended ## ref: https://github.com/coreos/prometheus-operator/blob/master/Documentation/api.md#endpoint ## e.g: ## scrapeTimeout: 10s ## scrapeTimeout: "" ## @param metrics.serviceMonitor.labels Labels that can be used so PodMonitor will be discovered by Prometheus ## labels: {} ## @param metrics.serviceMonitor.relabelings RelabelConfigs to apply to samples before scraping ## relabelings: [] ## @param metrics.serviceMonitor.metricRelabelings MetricRelabelConfigs to apply to samples before ingestion ## metricRelabelings: [] ## Prometheus Operator PrometheusRule configuration ## prometheusRule: ## @param metrics.prometheusRule.enabled if `true`, creates a Prometheus Operator PrometheusRule (also requires `metrics.enabled` to be `true` and `metrics.prometheusRule.rules`) ## enabled: false ## @param metrics.prometheusRule.namespace Namespace for the PrometheusRule Resource (defaults to the Release Namespace) ## namespace: "" ## @param metrics.prometheusRule.labels Labels that can be used so PrometheusRule will be discovered by Prometheus ## labels: {} ## @param metrics.prometheusRule.rules Prometheus Rule definitions ## - alert: LowInstance ## expr: up{service="{{ template "common.names.fullname" . }}"} < 1 ## for: 1m ## labels: ## severity: critical ## annotations: ## description: Service {{ template "common.names.fullname" . }} Apache is down since 1m. ## summary: Apache instance is down. ## rules: []
38.358187
182
0.736784
6e38ad917b271310434494bb054238e2895493e0
26,945
yaml
YAML
bitnami/aspnet-core/values.yaml
00arthur00/charts
502aa1e64541669b732a4eda896e5937847b6c3c
[ "Apache-2.0" ]
null
null
null
bitnami/aspnet-core/values.yaml
00arthur00/charts
502aa1e64541669b732a4eda896e5937847b6c3c
[ "Apache-2.0" ]
2
2022-01-26T01:14:30.000Z
2022-01-26T07:03:39.000Z
bitnami/aspnet-core/values.yaml
00arthur00/charts
502aa1e64541669b732a4eda896e5937847b6c3c
[ "Apache-2.0" ]
null
null
null
## @section Global parameters ## Global Docker image parameters ## Please, note that this will override the image parameters, including dependencies, configured to use the global value ## Current available global Docker image parameters: imageRegistry, imagePullSecrets and storageClass ## ## @param global.imageRegistry Global Docker image registry ## @param global.imagePullSecrets Global Docker registry secret names as an array ## @param global.storageClass Global StorageClass for Persistent Volume(s) ## global: imageRegistry: "" ## E.g. ## imagePullSecrets: ## - myRegistryKeySecretName ## imagePullSecrets: [] storageClass: "" ## @section Common parameters ## ## @param kubeVersion Override Kubernetes version ## kubeVersion: "" ## @param nameOverride String to partially override aspnet-core.fullname ## nameOverride: "" ## @param fullnameOverride String to fully override aspnet-core.fullname ## fullnameOverride: "" ## @param commonLabels Labels to add to all deployed objects ## commonLabels: {} ## @param commonAnnotations Annotations to add to all deployed objects ## commonAnnotations: {} ## @param clusterDomain Kubernetes cluster domain name ## clusterDomain: cluster.local ## @param extraDeploy Array of extra objects to deploy with the release ## extraDeploy: [] ## @section ASP.NET Core parameters ## ## Bitnami ASP.NET Core image ## ref: https://hub.docker.com/r/bitnami/aspnet-core/tags/ ## @param image.registry ASP.NET Core image registry ## @param image.repository ASP.NET Core image repository ## @param image.tag ASP.NET Core image tag (immutable tags are recommended) ## @param image.pullPolicy ASP.NET Core image pull policy ## @param image.pullSecrets ASP.NET Core image pull secrets ## @param image.debug Enable image debug mode ## image: registry: docker.io repository: bitnami/aspnet-core tag: 6.0.3-debian-10-r7 ## Specify a imagePullPolicy ## Defaults to 'Always' if image tag is 'latest', else set to 'IfNotPresent' ## ref: https://kubernetes.io/docs/user-guide/images/#pre-pulling-images ## pullPolicy: IfNotPresent ## Optionally specify an array of imagePullSecrets. ## Secrets must be manually created in the namespace. ## ref: https://kubernetes.io/docs/tasks/configure-pod-container/pull-image-private-registry/ ## e.g: ## pullSecrets: ## - myRegistryKeySecretName ## pullSecrets: [] debug: false ## @param command Override default container command (useful when using custom images) ## command: [] ## @param args Override default container args (useful when using custom images) ## args: [] ## @param bindURLs URLs to bind ## bindURLs: http://+:8080 ## @param extraEnvVars Extra environment variables to be set on ASP.NET Core container ## E.g: ## extraEnvVars: ## - name: FOO ## value: BAR ## extraEnvVars: [] ## @param extraEnvVarsCM ConfigMap with extra environment variables ## extraEnvVarsCM: "" ## @param extraEnvVarsSecret Secret with extra environment variables ## extraEnvVarsSecret: "" ## @section ASP.NET Core deployment parameters ## ## @param replicaCount Number of ASP.NET Core replicas to deploy ## replicaCount: 1 ## @param schedulerName Name of the k8s scheduler (other than default) ## ref: https://kubernetes.io/docs/tasks/administer-cluster/configure-multiple-schedulers/ ## schedulerName: "" ## @param priorityClassName ASP.NET Core pod priority class name ## ref: https://kubernetes.io/docs/concepts/scheduling-eviction/pod-priority-preemption/ ## priorityClassName: "" ## @param topologySpreadConstraints Topology Spread Constraints for pod assignment ## https://kubernetes.io/docs/concepts/workloads/pods/pod-topology-spread-constraints/ ## The value is evaluated as a template ## topologySpreadConstraints: [] ## @param hostAliases ASP.NET Core pod host aliases ## https://kubernetes.io/docs/concepts/services-networking/add-entries-to-pod-etc-hosts-with-host-aliases/ ## hostAliases: [] ## @param extraVolumes Optionally specify extra list of additional volumes for ASP.NET Core pods ## e.g: ## extraVolumes: ## - name: extras ## emptyDir: {} ## extraVolumes: [] ## @param extraVolumeMounts Optionally specify extra list of additional volumeMounts for ASP.NET Core container(s) ## Example: ## extraVolumeMounts: ## - name: extras ## mountPath: /usr/share/extras ## readOnly: true ## extraVolumeMounts: [] ## @param sidecars Add additional sidecar containers to the ASP.NET Core pods ## e.g: ## sidecars: ## - name: your-image-name ## image: your-image ## imagePullPolicy: Always ## ports: ## - name: portname ## containerPort: 1234 ## sidecars: [] ## @param initContainers Add additional init containers to the ASP.NET Core pods ## ref: https://kubernetes.io/docs/concepts/workloads/pods/init-containers/ ## e.g: ## initContainers: ## - name: your-image-name ## image: your-image ## imagePullPolicy: Always ## ports: ## - name: portname ## containerPort: 1234 ## initContainers: [] ## @param lifecycleHooks Add lifecycle hooks to the ASP.NET Core deployment ## lifecycleHooks: {} ## @param podAnnotations Annotations for ASP.NET Core pods ## ref: https://kubernetes.io/docs/concepts/overview/working-with-objects/annotations/ ## podAnnotations: {} ## @param podLabels Extra labels for ASP.NET Core pods ## ref: https://kubernetes.io/docs/concepts/overview/working-with-objects/labels/ ## podLabels: {} ## @param updateStrategy.type Deployment strategy type ## ref: https://kubernetes.io/docs/concepts/workloads/controllers/statefulset/#update-strategies ## updateStrategy: ## StrategyType ## Can be set to RollingUpdate or OnDelete ## type: RollingUpdate ## @param podAffinityPreset Pod affinity preset. Ignored if `affinity` is set. Allowed values: `soft` or `hard` ## ref: https://kubernetes.io/docs/concepts/scheduling-eviction/assign-pod-node/#inter-pod-affinity-and-anti-affinity ## podAffinityPreset: "" ## @param podAntiAffinityPreset Pod anti-affinity preset. Ignored if `affinity` is set. Allowed values: `soft` or `hard` ## Ref: https://kubernetes.io/docs/concepts/scheduling-eviction/assign-pod-node/#inter-pod-affinity-and-anti-affinity ## podAntiAffinityPreset: soft ## Node affinity preset ## Ref: https://kubernetes.io/docs/concepts/scheduling-eviction/assign-pod-node/#node-affinity ## nodeAffinityPreset: ## @param nodeAffinityPreset.type Node affinity preset type. Ignored if `affinity` is set. Allowed values: `soft` or `hard` ## type: "" ## @param nodeAffinityPreset.key Node label key to match. Ignored if `affinity` is set ## key: "" ## @param nodeAffinityPreset.values Node label values to match. Ignored if `affinity` is set ## E.g. ## values: ## - e2e-az1 ## - e2e-az2 ## values: [] ## @param affinity Affinity for pod assignment ## Ref: https://kubernetes.io/docs/concepts/configuration/assign-pod-node/#affinity-and-anti-affinity ## NOTE: podAffinityPreset, podAntiAffinityPreset, and nodeAffinityPreset will be ignored when it's set ## affinity: {} ## @param nodeSelector Node labels for pod assignment ## ref: https://kubernetes.io/docs/user-guide/node-selection/ ## nodeSelector: {} ## @param tolerations Tolerations for pod assignment ## ref: https://kubernetes.io/docs/concepts/configuration/taint-and-toleration/ ## tolerations: [] ## ASP.NET Core containers' resource requests and limits ## ref: https://kubernetes.io/docs/user-guide/compute-resources/ ## We usually recommend not to specify default resources and to leave this as a conscious ## choice for the user. This also increases chances charts run on environments with little ## resources, such as Minikube. If you do want to specify resources, uncomment the following ## lines, adjust them as necessary, and remove the curly braces after 'resources:'. ## @param resources.limits The resources limits for the ASP.NET Core container ## @param resources.requests The requested resources for the ASP.NET Core container ## resources: ## Example: ## limits: ## cpu: 100m ## memory: 128Mi ## limits: {} ## Examples: ## requests: ## cpu: 100m ## memory: 128Mi ## requests: {} ## @param containerPorts.http Port to expose at ASP.NET Core container level ## containerPorts: http: 8080 ## Configure Pods Security Context ## ref: https://kubernetes.io/docs/tasks/configure-pod-container/security-context/#set-the-security-context-for-a-pod ## @param podSecurityContext.enabled Enabled ASP.NET Core pods' Security Context ## @param podSecurityContext.sysctls Set namespaced sysctls for the ASP.NET Core pods ## @param podSecurityContext.fsGroup Set Security Context fsGroup ## podSecurityContext: enabled: false ## e.g: ## sysctls: ## - name: net.core.somaxconn ## value: "10000" ## sysctls: [] fsGroup: 0 ## Configure Container Security Context (only main container) ## ref: https://kubernetes.io/docs/tasks/configure-pod-container/security-context/#set-the-security-context-for-a-container ## @param containerSecurityContext.enabled Enabled ASP.NET Core containers' Security Context ## @param containerSecurityContext.runAsUser Set ASP.NET Core container's Security Context runAsUser ## @param containerSecurityContext.runAsNonRoot Set container's Security Context runAsNonRoot ## containerSecurityContext: enabled: false runAsUser: 0 runAsNonRoot: false ## Configure extra options for ASP.NET Core containers' liveness and readiness probes ## ref: https://kubernetes.io/docs/tasks/configure-pod-container/configure-liveness-readiness-probes/#configure-probes ## @param livenessProbe.enabled Enable livenessProbe ## @param livenessProbe.initialDelaySeconds Initial delay seconds for livenessProbe ## @param livenessProbe.periodSeconds Period seconds for livenessProbe ## @param livenessProbe.timeoutSeconds Timeout seconds for livenessProbe ## @param livenessProbe.failureThreshold Failure threshold for livenessProbe ## @param livenessProbe.successThreshold Success threshold for livenessProbe ## livenessProbe: enabled: true initialDelaySeconds: 10 timeoutSeconds: 1 periodSeconds: 20 failureThreshold: 6 successThreshold: 1 ## @param readinessProbe.enabled Enable readinessProbe ## @param readinessProbe.initialDelaySeconds Initial delay seconds for readinessProbe ## @param readinessProbe.periodSeconds Period seconds for readinessProbe ## @param readinessProbe.timeoutSeconds Timeout seconds for readinessProbe ## @param readinessProbe.failureThreshold Failure threshold for readinessProbe ## @param readinessProbe.successThreshold Success threshold for readinessProbe ## readinessProbe: enabled: true initialDelaySeconds: 10 timeoutSeconds: 1 periodSeconds: 20 failureThreshold: 6 successThreshold: 1 ## Configure extra options for ASP.NET Core containers' startup and readiness probes ## ref: https://kubernetes.io/docs/tasks/configure-pod-container/configure-startup-readiness-probes/#configure-probes ## @param startupProbe.enabled Enable startupProbe ## @param startupProbe.initialDelaySeconds Initial delay seconds for startupProbe ## @param startupProbe.periodSeconds Period seconds for startupProbe ## @param startupProbe.timeoutSeconds Timeout seconds for startupProbe ## @param startupProbe.failureThreshold Failure threshold for startupProbe ## @param startupProbe.successThreshold Success threshold for startupProbe ## startupProbe: enabled: false initialDelaySeconds: 10 timeoutSeconds: 1 periodSeconds: 20 failureThreshold: 6 successThreshold: 1 ## @param customLivenessProbe Custom livenessProbe that overrides the default one ## customLivenessProbe: {} ## @param customStartupProbe Custom startupProbe that overrides the default one ## customStartupProbe: {} ## @param customReadinessProbe Custom readinessProbe that overrides the default one ## customReadinessProbe: {} ## Configure Pod Disruption Budget ## ref: https://kubernetes.io/docs/tasks/run-application/configure-pdb/ ## @param pdb.create Enable/disable a Pod Disruption Budget creation ## @param pdb.minAvailable Minimum number/percentage of pods that should remain scheduled ## @param pdb.maxUnavailable Maximum number/percentage of pods that may be made unavailable ## pdb: create: false minAvailable: 1 maxUnavailable: "" ## ASP.NET Core Autoscaling parameters. ## @param autoscaling.enabled Enable autoscaling for ASP.NET Core ## @param autoscaling.minReplicas Minimum number of ASP.NET Core replicas ## @param autoscaling.maxReplicas Maximum number of ASP.NET Core replicas ## @param autoscaling.targetCPU Target CPU utilization percentage ## @param autoscaling.targetMemory Target Memory utilization percentage ## autoscaling: enabled: false minReplicas: 1 maxReplicas: 11 targetCPU: "" targetMemory: "" ## @section Custom ASP.NET Core application parameters ## ## Enable to download/build ASP.NET Core app from external git repository. ## Do not enable it if your docker image already includes your application ## appFromExternalRepo: ## @param appFromExternalRepo.enabled Enable to download/build ASP.NET Core app from external git repository ## enabled: true clone: ## Bitnami Git image version ## ref: https://hub.docker.com/r/bitnami/git/tags/ ## @param appFromExternalRepo.clone.image.registry Git image registry ## @param appFromExternalRepo.clone.image.repository Git image repository ## @param appFromExternalRepo.clone.image.tag Git image tag (immutable tags are recommended) ## @param appFromExternalRepo.clone.image.pullPolicy Git image pull policy ## @param appFromExternalRepo.clone.image.pullSecrets Git image pull secrets ## image: registry: docker.io repository: bitnami/git tag: 2.35.1-debian-10-r46 ## Specify a imagePullPolicy ## Defaults to 'Always' if image tag is 'latest', else set to 'IfNotPresent' ## ref: https://kubernetes.io/docs/user-guide/images/#pre-pulling-images ## pullPolicy: IfNotPresent ## Optionally specify an array of imagePullSecrets. ## Secrets must be manually created in the namespace. ## ref: https://kubernetes.io/docs/tasks/configure-pod-container/pull-image-private-registry/ ## e.g: ## pullSecrets: ## - myRegistryKeySecretName ## pullSecrets: [] ## @param appFromExternalRepo.clone.repository Git repository to clone ## repository: https://github.com/dotnet/AspNetCore.Docs.git ## @param appFromExternalRepo.clone.revision Git revision to checkout ## revision: main ## @param appFromExternalRepo.clone.extraVolumeMounts Add extra volume mounts for the GIT container ## Useful to mount keys to connect through ssh. (normally used with extraVolumes) ## e.g: ## extraVolumeMounts: ## - name: ssh-dir ## mountPath: /root/.ssh/ ## extraVolumeMounts: [] publish: ## Bitnami .NET SDK image version ## ref: https://hub.docker.com/r/bitnami/dotnet-sdk/tags/ ## @param appFromExternalRepo.publish.image.registry .NET SDK image registry ## @param appFromExternalRepo.publish.image.repository .NET SDK image repository ## @param appFromExternalRepo.publish.image.tag .NET SDK image tag (immutable tags are recommended) ## @param appFromExternalRepo.publish.image.pullPolicy .NET SDK image pull policy ## @param appFromExternalRepo.publish.image.pullSecrets .NET SDK image pull secrets ## image: registry: docker.io repository: bitnami/dotnet-sdk tag: 6.0.201-debian-10-r6 ## Specify a imagePullPolicy ## Defaults to 'Always' if image tag is 'latest', else set to 'IfNotPresent' ## ref: https://kubernetes.io/docs/user-guide/images/#pre-pulling-images ## pullPolicy: IfNotPresent ## Optionally specify an array of imagePullSecrets. ## Secrets must be manually created in the namespace. ## ref: https://kubernetes.io/docs/tasks/configure-pod-container/pull-image-private-registry/ ## e.g: ## pullSecrets: ## - myRegistryKeySecretName ## pullSecrets: [] ## @param appFromExternalRepo.publish.subFolder Sub folder under the Git repository containing the ASP.NET Core app ## subFolder: aspnetcore/fundamentals/servers/kestrel/samples/6.x/KestrelSample ## @param appFromExternalRepo.publish.extraFlags Extra flags to be appended to "dotnet publish" command ## extraFlags: [] ## @param appFromExternalRepo.startCommand Command used to start ASP.NET Core app ## startCommand: ["dotnet", "KestrelSample.dll"] ## Enable mounting your ASP.NET Core app from an existing PVC ## Do not enable it if your docker image already includes your application ## @param appFromExistingPVC.enabled Enable mounting your ASP.NET Core app from an existing PVC ## @param appFromExistingPVC.existingClaim A existing Persistent Volume Claim containing your ASP.NET Core app ## appFromExistingPVC: enabled: false ## PVC must be created manually before volume will be bound. The value is evaluated as a template ## existingClaim: "" ## @section Traffic Exposure Parameters ## ## ASP.NET Core Service parameters. ## service: ## @param service.type ASP.NET Core service type ## type: ClusterIP ## @param service.ports.http ASP.NET Core service HTTP port ## ports: http: 80 ## @param service.nodePorts.http Node ports to expose ## ref: https://kubernetes.io/docs/concepts/services-networking/service/#type-nodeport ## nodePorts: http: "" ## @param service.clusterIP ASP.NET Core service Cluster IP ## e.g.: ## clusterIP: None ## clusterIP: "" ## @param service.extraPorts Extra ports to expose (normally used with the `sidecar` value) ## extraPorts: [] ## @param service.loadBalancerIP ASP.NET Core service Load Balancer IP ## ref: https://kubernetes.io/docs/concepts/services-networking/service/#type-loadbalancer ## loadBalancerIP: "" ## @param service.loadBalancerSourceRanges ASP.NET Core service Load Balancer sources ## ref: https://kubernetes.io/docs/tasks/access-application-cluster/configure-cloud-provider-firewall/#restrict-access-for-loadbalancer-service ## e.g: ## loadBalancerSourceRanges: ## - 10.10.10.0/24 ## loadBalancerSourceRanges: [] ## @param service.externalTrafficPolicy ASP.NET Core service external traffic policy ## ref https://kubernetes.io/docs/tasks/access-application-cluster/create-external-load-balancer/#preserving-the-client-source-ip ## externalTrafficPolicy: Cluster ## @param service.annotations Additional custom annotations for ASP.NET Core service ## annotations: {} ## Configure the ingress resource that allows you to access the ASP.NET Core app ## ref: https://kubernetes.io/docs/user-guide/ingress/ ## ingress: ## @param ingress.enabled Enable ingress record generation for ASP.NET Core ## enabled: false ## @param ingress.pathType Ingress path type ## pathType: ImplementationSpecific ## @param ingress.apiVersion Force Ingress API version (automatically detected if not set) ## apiVersion: "" ## @param ingress.hostname Default host for the ingress resource, a host pointing to this will be created ## hostname: aspnet-core.local ## @param ingress.path Default path for the ingress record ## path: / ## @param ingress.annotations Additional annotations for the Ingress resource. To enable certificate autogeneration, place here your cert-manager annotations. ## For a full list of possible ingress annotations, please see ## ref: https://github.com/kubernetes/ingress-nginx/blob/master/docs/user-guide/nginx-configuration/annotations.md ## Use this parameter to set the required annotations for cert-manager, see ## ref: https://cert-manager.io/docs/usage/ingress/#supported-annotations ## ## e.g: ## annotations: ## kubernetes.io/ingress.class: nginx ## cert-manager.io/cluster-issuer: cluster-issuer-name ## annotations: {} ## @param ingress.tls Enable TLS configuration for the host defined at `ingress.hostname` parameter ## TLS certificates will be retrieved from a TLS secret with name: `{{- printf "%s-tls" .Values.ingress.hostname }}` ## You can: ## - Use the `ingress.secrets` parameter to create this TLS secret ## - Relay on cert-manager to create it by setting the corresponding annotations ## tls: false ## @param ingress.extraPaths Any additional arbitrary paths that may need to be added to the ingress under the main host. ## For example: The ALB ingress controller requires a special rule for handling SSL redirection. ## extraPaths: ## - path: /* ## backend: ## serviceName: ssl-redirect ## servicePort: use-annotation ## extraPaths: [] ## @param ingress.selfSigned Create a TLS secret for this ingress record using self-signed certificates generated by Helm ## selfSigned: false ## @param ingress.ingressClassName IngressClass that will be be used to implement the Ingress (Kubernetes 1.18+) ## This is supported in Kubernetes 1.18+ and required if you have more than one IngressClass marked as the default for your cluster . ## ref: https://kubernetes.io/blog/2020/04/02/improvements-to-the-ingress-api-in-kubernetes-1.18/ ## ingressClassName: "" ## @param ingress.extraHosts An array with additional hostname(s) to be covered with the ingress record ## e.g: ## extraHosts: ## - name: aspnet-core.local ## path: / ## extraHosts: [] ## @param ingress.extraTls TLS configuration for additional hostname(s) to be covered with this ingress record ## ref: https://kubernetes.io/docs/concepts/services-networking/ingress/#tls ## e.g: ## extraTls: ## - hosts: ## - aspnet-core.local ## secretName: aspnet-core.local-tls ## extraTls: [] ## @param ingress.secrets Custom TLS certificates as secrets ## NOTE: 'key' and 'certificate' are expected in PEM format ## NOTE: 'name' should line up with a 'secretName' set further up ## If it is not set and you're using cert-manager, this is unneeded, as it will create a secret for you with valid certificates ## If it is not set and you're NOT using cert-manager either, self-signed certificates will be created ## It is also possible to create and manage the certificates outside of this helm chart ## Please see README.md for more information ## e.g: ## secrets: ## - name: aspnet-core.local-tls ## key: |- ## -----BEGIN RSA PRIVATE KEY----- ## ... ## -----END RSA PRIVATE KEY----- ## certificate: |- ## -----BEGIN CERTIFICATE----- ## ... ## -----END CERTIFICATE----- ## secrets: [] ## Health Ingress ## healthIngress: ## @param healthIngress.enabled Enable healthIngress record generation for ASP.NET Core ## enabled: false ## @param healthIngress.pathType Ingress path type ## pathType: ImplementationSpecific ## @param healthIngress.path Default path for the ingress record ## path: / ## @param healthIngress.hostname When the health ingress is enabled, a host pointing to this will be created ## hostname: aspnet-core.local ## @param healthIngress.annotations Additional annotations for the Ingress resource. To enable certificate autogeneration, place here your cert-manager annotations. ## For a full list of possible ingress annotations, please see ## ref: https://github.com/kubernetes/ingress-nginx/blob/master/docs/user-guide/nginx-configuration/annotations.md ## Use this parameter to set the required annotations for cert-manager, see ## ref: https://cert-manager.io/docs/usage/ingress/#supported-annotations ## ## e.g: ## annotations: ## kubernetes.io/ingress.class: nginx ## cert-manager.io/cluster-issuer: cluster-issuer-name ## annotations: {} ## @param healthIngress.tls Enable TLS configuration for the host defined at `ingress.hostname` parameter ## TLS certificates will be retrieved from a TLS secret with name: `{{- printf "%s-tls" .Values.ingress.hostname }}` ## You can: ## - Use the `ingress.secrets` parameter to create this TLS secret ## - Relay on cert-manager to create it by setting the corresponding annotations ## - Relay on Helm to create self-signed certificates ## tls: false ## DEPRECATED: Use healthIngress.annotations instead of healthIngress.certManager ## certManager: false ## ## @param healthIngress.ingressClassName IngressClass that will be be used to implement the Ingress (Kubernetes 1.18+) ## This is supported in Kubernetes 1.18+ and required if you have more than one IngressClass marked as the default for your cluster . ## ref: https://kubernetes.io/blog/2020/04/02/improvements-to-the-ingress-api-in-kubernetes-1.18/ ## ingressClassName: "" ## @param healthIngress.extraHosts n array with additional hostname(s) to be covered with the ingress record ## Most likely the hostname above will be enough, but in the event more hosts are needed, this is an array ## extraHosts: ## - name: aspnet-core.local ## path: / ## extraHosts: [] ## @param healthIngress.extraTls TLS configuration for additional hostname(s) to be covered with this ingress record ## see: https://kubernetes.io/docs/concepts/services-networking/ingress/#tls ## extraTls: ## - hosts: ## - aspnet-core.local ## secretName: aspnet-core.local-tls ## extraTls: [] ## @param healthIngress.secrets Custom TLS certificates as secrets ## NOTE: 'key' and 'certificate' are expected in PEM format ## NOTE: 'name' should line up with a 'secretName' set further up ## If it is not set and you're using cert-manager, this is unneeded, as it will create a secret for you with valid certificates ## If it is not set and you're NOT using cert-manager either, self-signed certificates will be created ## It is also possible to create and manage the certificates outside of this helm chart ## Please see README.md for more information ## e.g: ## secrets: ## - name: aspnet-core.local-tls ## key: |- ## -----BEGIN RSA PRIVATE KEY----- ## ... ## -----END RSA PRIVATE KEY----- ## certificate: |- ## -----BEGIN CERTIFICATE----- ## ... ## -----END CERTIFICATE----- ## secrets: [] ## @section RBAC parameters ## ## K8s Service Account. ## ref: https://kubernetes.io/docs/tasks/configure-pod-container/configure-service-account/ ## serviceAccount: ## @param serviceAccount.create Specifies whether a ServiceAccount should be created ## create: true ## @param serviceAccount.name The name of the ServiceAccount to use. ## If not set and create is true, a name is generated using the aspnet-core.fullname template ## name: "" ## @param serviceAccount.annotations Additional custom annotations for the ServiceAccount ## annotations: {} ## @param serviceAccount.automountServiceAccountToken Automount service account token ## automountServiceAccountToken: true
39.683358
166
0.732678
5103c105f624f57c0a4c4d1e3576650a0a31ba65
16,272
yaml
YAML
bitnami/contour-operator/values.yaml
00arthur00/charts
502aa1e64541669b732a4eda896e5937847b6c3c
[ "Apache-2.0" ]
null
null
null
bitnami/contour-operator/values.yaml
00arthur00/charts
502aa1e64541669b732a4eda896e5937847b6c3c
[ "Apache-2.0" ]
2
2022-01-26T01:14:30.000Z
2022-01-26T07:03:39.000Z
bitnami/contour-operator/values.yaml
00arthur00/charts
502aa1e64541669b732a4eda896e5937847b6c3c
[ "Apache-2.0" ]
null
null
null
## @section Global parameters ## Global Docker image parameters ## Please, note that this will override the image parameters, including dependencies, configured to use the global value ## Current available global Docker image parameters: imageRegistry, imagePullSecrets and storageClass ## ## @param global.imageRegistry Global Docker image registry ## @param global.imagePullSecrets Global Docker registry secret names as an array ## @param global.storageClass Global StorageClass for Persistent Volume(s) ## global: imageRegistry: "" ## E.g. ## imagePullSecrets: ## - myRegistryKeySecretName ## imagePullSecrets: [] storageClass: "" ## @section Common parameters ## ## @param kubeVersion Override Kubernetes version ## kubeVersion: "" ## @param nameOverride String to partially override common.names.fullname ## nameOverride: "" ## @param fullnameOverride String to fully override common.names.fullname ## fullnameOverride: "" ## @param commonLabels Labels to add to all deployed objects ## commonLabels: {} ## @param commonAnnotations Annotations to add to all deployed objects ## commonAnnotations: {} ## @param extraDeploy Array of extra objects to deploy with the release ## extraDeploy: [] ## @section Contour Operator Parameters ## ## Bitnami Contour Operator image ## ref: https://hub.docker.com/r/bitnami/contour-operator/tags/ ## @param image.registry Contour Operator image registry ## @param image.repository Contour Operator image repository ## @param image.tag Contour Operator image tag (immutable tags are recommended) ## @param image.pullPolicy Contour Operator image pull policy ## @param image.pullSecrets Contour Operator image pull secrets ## image: registry: docker.io repository: bitnami/contour-operator tag: 1.20.1-scratch-r1 ## Specify a imagePullPolicy ## Defaults to 'Always' if image tag is 'latest', else set to 'IfNotPresent' ## ref: https://kubernetes.io/docs/user-guide/images/#pre-pulling-images ## pullPolicy: IfNotPresent ## Optionally specify an array of imagePullSecrets. ## Secrets must be manually created in the namespace. ## ref: https://kubernetes.io/docs/tasks/configure-pod-container/pull-image-private-registry/ ## e.g: ## pullSecrets: ## - myRegistryKeySecretName ## pullSecrets: [] ## Bitnami Contour Image ## ref: https://hub.docker.com/r/bitnami/contour/tags/ ## @param contourImage.registry Contour Image registry ## @param contourImage.repository Contour Image repository ## @param contourImage.tag Contour Image tag (immutable tags are recommended) ## @param contourImage.pullSecrets Contour Image pull secrets ## contourImage: registry: docker.io repository: bitnami/contour tag: 1.20.1-debian-10-r19 ## Optionally specify an array of imagePullSecrets. ## Secrets must be manually created in the namespace. ## ref: https://kubernetes.io/docs/tasks/configure-pod-container/pull-contourImage-private-registry/ ## e.g: ## pullSecrets: ## - myRegistryKeySecretName ## pullSecrets: [] ## Bitnami Envoy Image ## ref: https://hub.docker.com/r/bitnami/envoy/tags/ ## @param envoyImage.registry Envoy Image registry ## @param envoyImage.repository Envoy Image repository ## @param envoyImage.tag Envoy Image tag (immutable tags are recommended) ## @param envoyImage.pullSecrets Envoy Image pull secrets ## envoyImage: registry: docker.io repository: bitnami/envoy tag: 1.21.1-debian-10-r20 ## Optionally specify an array of imagePullSecrets. ## Secrets must be manually created in the namespace. ## ref: https://kubernetes.io/docs/tasks/configure-pod-container/pull-envoyImage-private-registry/ ## e.g: ## pullSecrets: ## - myRegistryKeySecretName ## pullSecrets: [] ## @param replicaCount Number of Contour Operator replicas to deploy ## replicaCount: 1 ## Configure extra options for Contour Operator containers' liveness and readiness probes ## ref: https://kubernetes.io/docs/tasks/configure-pod-container/configure-liveness-readiness-probes/#configure-probes ## @param livenessProbe.enabled Enable livenessProbe on Contour Operator nodes ## @param livenessProbe.initialDelaySeconds Initial delay seconds for livenessProbe ## @param livenessProbe.periodSeconds Period seconds for livenessProbe ## @param livenessProbe.timeoutSeconds Timeout seconds for livenessProbe ## @param livenessProbe.failureThreshold Failure threshold for livenessProbe ## @param livenessProbe.successThreshold Success threshold for livenessProbe ## livenessProbe: enabled: true initialDelaySeconds: 5 periodSeconds: 30 timeoutSeconds: 5 successThreshold: 1 failureThreshold: 5 ## @param readinessProbe.enabled Enable readinessProbe on Contour Operator nodes ## @param readinessProbe.initialDelaySeconds Initial delay seconds for readinessProbe ## @param readinessProbe.periodSeconds Period seconds for readinessProbe ## @param readinessProbe.timeoutSeconds Timeout seconds for readinessProbe ## @param readinessProbe.failureThreshold Failure threshold for readinessProbe ## @param readinessProbe.successThreshold Success threshold for readinessProbe ## readinessProbe: enabled: true initialDelaySeconds: 5 periodSeconds: 30 timeoutSeconds: 5 successThreshold: 1 failureThreshold: 5 ## @param startupProbe.enabled Enable startupProbe on Contour Operator nodes ## @param startupProbe.initialDelaySeconds Initial delay seconds for startupProbe ## @param startupProbe.periodSeconds Period seconds for startupProbe ## @param startupProbe.timeoutSeconds Timeout seconds for startupProbe ## @param startupProbe.failureThreshold Failure threshold for startupProbe ## @param startupProbe.successThreshold Success threshold for startupProbe ## startupProbe: enabled: false initialDelaySeconds: 5 periodSeconds: 30 timeoutSeconds: 5 successThreshold: 1 failureThreshold: 5 ## @param customLivenessProbe Custom livenessProbe that overrides the default one ## customLivenessProbe: {} ## @param customReadinessProbe Custom readinessProbe that overrides the default one ## customReadinessProbe: {} ## @param customStartupProbe Custom startupProbe that overrides the default one ## customStartupProbe: {} ## Contour Operator resource requests and limits ## ref: https://kubernetes.io/docs/user-guide/compute-resources/ ## @param resources.limits The resources limits for the Contour Operator containers ## @param resources.requests The requested resources for the Contour Operator containers ## resources: limits: {} requests: {} ## Configure Pods Security Context ## ref: https://kubernetes.io/docs/tasks/configure-pod-container/security-context/#set-the-security-context-for-a-pod ## @param podSecurityContext.enabled Enabled Contour Operator pods' Security Context ## @param podSecurityContext.fsGroup Set Contour Operator pod's Security Context fsGroup ## podSecurityContext: enabled: true fsGroup: 1001 ## Configure Container Security Context ## ref: https://kubernetes.io/docs/tasks/configure-pod-container/security-context/#set-the-security-context-for-a-pod ## @param containerSecurityContext.enabled Enabled Contour Operator containers' Security Context ## @param containerSecurityContext.runAsUser Set Contour Operator containers' Security Context runAsUser ## @param containerSecurityContext.runAsNonRoot Set Contour Operator containers' Security Context runAsNonRoot ## containerSecurityContext: enabled: true runAsUser: 1001 runAsNonRoot: true ## @param command Override default container command (useful when using custom images) ## command: [] ## @param args Override default container args (useful when using custom images) ## args: [] ## @param hostAliases Contour Operator pods host aliases ## https://kubernetes.io/docs/concepts/services-networking/add-entries-to-pod-etc-hosts-with-host-aliases/ ## hostAliases: [] ## @param schedulerName Name of the Kubernetes scheduler (other than default) ## ref: https://kubernetes.io/docs/tasks/administer-cluster/configure-multiple-schedulers/ ## schedulerName: "" ## @param podLabels Extra labels for Contour Operator pods ## ref: https://kubernetes.io/docs/concepts/overview/working-with-objects/labels/ ## podLabels: {} ## @param podAnnotations Annotations for Contour Operator pods ## ref: https://kubernetes.io/docs/concepts/overview/working-with-objects/annotations/ ## podAnnotations: {} ## @param podAffinityPreset Pod affinity preset. Ignored if `affinity` is set. Allowed values: `soft` or `hard` ## ref: https://kubernetes.io/docs/concepts/scheduling-eviction/assign-pod-node/#inter-pod-affinity-and-anti-affinity ## podAffinityPreset: "" ## @param podAntiAffinityPreset Pod anti-affinity preset. Ignored if `affinity` is set. Allowed values: `soft` or `hard` ## ref: https://kubernetes.io/docs/concepts/scheduling-eviction/assign-pod-node/#inter-pod-affinity-and-anti-affinity ## podAntiAffinityPreset: soft ## Node affinity preset ## ref: https://kubernetes.io/docs/concepts/scheduling-eviction/assign-pod-node/#node-affinity ## nodeAffinityPreset: ## @param nodeAffinityPreset.type Node affinity preset type. Ignored if `affinity` is set. Allowed values: `soft` or `hard` ## type: "" ## @param nodeAffinityPreset.key Node label key to match. Ignored if `affinity` is set ## key: "" ## @param nodeAffinityPreset.values Node label values to match. Ignored if `affinity` is set ## E.g. ## values: ## - e2e-az1 ## - e2e-az2 ## values: [] ## @param affinity Affinity for Contour Operator pods assignment ## ref: https://kubernetes.io/docs/concepts/configuration/assign-pod-node/#affinity-and-anti-affinity ## NOTE: `podAffinityPreset`, `podAntiAffinityPreset`, and `nodeAffinityPreset` will be ignored when it's set ## affinity: {} ## @param nodeSelector Node labels for Contour Operator pods assignment ## ref: https://kubernetes.io/docs/user-guide/node-selection/ ## nodeSelector: {} ## @param tolerations Tolerations for Contour Operator pods assignment ## ref: https://kubernetes.io/docs/concepts/configuration/taint-and-toleration/ ## tolerations: [] ## @param updateStrategy.type Contour Operator deployment strategy type ## ref: https://kubernetes.io/docs/concepts/workloads/controllers/statefulset/#update-strategies ## updateStrategy: ## StrategyType ## Can be set to RollingUpdate or Recreate ## type: RollingUpdate ## @param priorityClassName Contour Operator pods' priorityClassName ## priorityClassName: "" ## @param lifecycleHooks for the Contour Operator container(s) to automate configuration before or after startup ## lifecycleHooks: {} ## @param terminationGracePeriodSeconds Termination grace period in seconds ## terminationGracePeriodSeconds: "" ## @param topologySpreadConstraints Topology Spread Constraints for pod assignment spread across your cluster among failure-domains. Evaluated as a template ## Ref: https://kubernetes.io/docs/concepts/workloads/pods/pod-topology-spread-constraints/#spread-constraints-for-pods ## topologySpreadConstraints: [] ## @param containerPorts.metrics Metrics port for the Contour Operator container ## containerPorts: metrics: 8080 ## @param extraEnvVars Array with extra environment variables to add to Contour Operator nodes ## e.g: ## extraEnvVars: ## - name: FOO ## value: "bar" ## extraEnvVars: [] ## @param extraEnvVarsCM Name of existing ConfigMap containing extra env vars for Contour Operator nodes ## extraEnvVarsCM: "" ## @param extraEnvVarsSecret Name of existing Secret containing extra env vars for Contour Operator nodes ## extraEnvVarsSecret: "" ## @param extraVolumes Optionally specify extra list of additional volumes for the Contour Operator pod(s) ## extraVolumes: [] ## @param extraVolumeMounts Optionally specify extra list of additional volumeMounts for the Contour Operator container(s) ## extraVolumeMounts: [] ## @param sidecars Add additional sidecar containers to the Contour Operator pod(s) ## e.g: ## sidecars: ## - name: your-image-name ## image: your-image ## imagePullPolicy: Always ## ports: ## - name: portname ## containerPort: 1234 ## sidecars: [] ## @param initContainers Add additional init containers to the Contour Operator pod(s) ## ref: https://kubernetes.io/docs/concepts/workloads/pods/init-containers/ ## e.g: ## initContainers: ## - name: your-image-name ## image: your-image ## imagePullPolicy: Always ## command: ['sh', '-c', 'echo "hello world"'] ## initContainers: [] ## @section Other Parameters ## ## RBAC configuration ## rbac: ## @param rbac.create Specifies whether RBAC resources should be created ## create: true ## ServiceAccount configuration ## serviceAccount: ## @param serviceAccount.create Specifies whether a ServiceAccount should be created ## create: true ## @param serviceAccount.name The name of the ServiceAccount to use. ## If not set and create is true, a name is generated using the common.names.fullname template ## name: "" ## @param serviceAccount.automountServiceAccountToken Automount service account token ## automountServiceAccountToken: true ## @section Metrics parameters ## metrics: ## @param metrics.enabled Create a service for accessing the metrics endpoint ## enabled: false ## Metrics service parameters ## service: ## @param metrics.service.type Contour Operator metrics service type ## type: ClusterIP ## @param metrics.service.ports.http Contour Operator metrics service HTTP port ## ports: http: 80 ## Node ports to expose ## @param metrics.service.nodePorts.http Node port for HTTP ## NOTE: choose port between <30000-32767> ## nodePorts: http: "" ## @param metrics.service.extraPorts [array] Extra ports to expose (normally used with the `sidecar` value) ## extraPorts: [] ## @param metrics.service.clusterIP Contour Operator metrics service Cluster IP ## e.g.: ## clusterIP: None ## clusterIP: "" ## @param metrics.service.loadBalancerIP Contour Operator metrics service Load Balancer IP ## ref: https://kubernetes.io/docs/concepts/services-networking/service/#type-loadbalancer ## loadBalancerIP: "" ## @param metrics.service.loadBalancerSourceRanges Contour Operator metrics service Load Balancer sources ## ref: https://kubernetes.io/docs/tasks/access-application-cluster/configure-cloud-provider-firewall/#restrict-access-for-loadbalancer-service ## e.g: ## loadBalancerSourceRanges: ## - 10.10.10.0/24 ## loadBalancerSourceRanges: [] ## @param metrics.service.externalTrafficPolicy Contour Operator metrics service external traffic policy ## ref https://kubernetes.io/docs/tasks/access-application-cluster/create-external-load-balancer/#preserving-the-client-source-ip ## externalTrafficPolicy: Cluster ## @param metrics.service.annotations [object] Additional custom annotations for Contour Operator metrics service ## annotations: prometheus.io/scrape: "true" prometheus.io/port: "{{ .Values.metrics.service.ports.http }}" serviceMonitor: ## @param metrics.serviceMonitor.enabled Specify if a servicemonitor will be deployed for prometheus-operator ## enabled: false ## @param metrics.serviceMonitor.namespace Namespace in which Prometheus is running ## namespace: "" ## @param metrics.serviceMonitor.labels Extra labels for the ServiceMonitor ## labels: {} ## @param metrics.serviceMonitor.jobLabel The name of the label on the target service to use as the job name in Prometheus ## jobLabel: "" ## @param metrics.serviceMonitor.interval Scrape interval. If not set, the Prometheus default scrape interval is used ## interval: "" ## @param metrics.serviceMonitor.scrapeTimeout Scrape Timeout duration for prometheus ## scrapeTimeout: "" ## @param metrics.serviceMonitor.metricRelabelings Specify additional relabeling of metrics ## metricRelabelings: [] ## @param metrics.serviceMonitor.relabelings Specify general relabeling ## relabelings: [] ## @param metrics.serviceMonitor.selector Prometheus instance selector labels ## ref: https://github.com/bitnami/charts/tree/master/bitnami/prometheus-operator#prometheus-configuration ## selector: []
37.321101
156
0.757498
510d7a3232ae87435c38395845353341112b6848
68,230
yaml
YAML
bitnami/spring-cloud-dataflow/values.yaml
00arthur00/charts
502aa1e64541669b732a4eda896e5937847b6c3c
[ "Apache-2.0" ]
null
null
null
bitnami/spring-cloud-dataflow/values.yaml
00arthur00/charts
502aa1e64541669b732a4eda896e5937847b6c3c
[ "Apache-2.0" ]
2
2022-01-26T01:14:30.000Z
2022-01-26T07:03:39.000Z
bitnami/spring-cloud-dataflow/values.yaml
00arthur00/charts
502aa1e64541669b732a4eda896e5937847b6c3c
[ "Apache-2.0" ]
null
null
null
## @section Global parameters ## Global Docker image parameters ## Please, note that this will override the image parameters, including dependencies, configured to use the global value ## Current available global Docker image parameters: imageRegistry, imagePullSecrets and storageClass ## @param global.imageRegistry Global Docker image registry ## @param global.imagePullSecrets Global Docker registry secret names as an array ## @param global.storageClass Global StorageClass for Persistent Volume(s) ## global: imageRegistry: "" ## E.g. ## imagePullSecrets: ## - myRegistryKeySecretName ## imagePullSecrets: [] storageClass: "" ## @section Common parameters ## @param nameOverride String to partially override scdf.fullname template (will maintain the release name). ## nameOverride: "" ## @param fullnameOverride String to fully override scdf.fullname template. ## fullnameOverride: "" ## @param commonAnnotations Annotations to add to all deployed objects ## commonAnnotations: {} ## @param commonLabels Labels to add to all deployed objects ## commonLabels: {} ## @param kubeVersion Force target Kubernetes version (using Helm capabilities if not set) ## kubeVersion: "" ## @param clusterDomain Default Kubernetes cluster domain ## clusterDomain: cluster.local ## @param extraDeploy Array of extra objects to deploy with the release ## extraDeploy: [] ## @section Dataflow Server parameters ## Spring Cloud Dataflow Server parameters. ## server: ## Bitnami Spring Cloud Dataflow Server image ## ref: https://hub.docker.com/r/bitnami/spring-cloud-dataflow/tags/ ## @param server.image.registry Spring Cloud Dataflow image registry ## @param server.image.repository Spring Cloud Dataflow image repository ## @param server.image.tag Spring Cloud Dataflow image tag (immutable tags are recommended) ## @param server.image.pullPolicy Spring Cloud Dataflow image pull policy ## @param server.image.pullSecrets Specify docker-registry secret names as an array ## @param server.image.debug Enable image debug mode ## image: registry: docker.io repository: bitnami/spring-cloud-dataflow tag: 2.9.2-debian-10-r51 ## Specify a imagePullPolicy. Defaults to 'Always' if image tag is 'latest', else set to 'IfNotPresent' ## ref: https://kubernetes.io/docs/user-guide/images/#pre-pulling-images ## pullPolicy: IfNotPresent ## Optionally specify an array of imagePullSecrets. ## Secrets must be manually created in the namespace. ## ref: https://kubernetes.io/docs/tasks/configure-pod-container/pull-image-private-registry/ ## e.g: ## pullSecrets: ## - myRegistryKeySecretName ## pullSecrets: [] ## Set to true if you would like to see extra information on logs ## debug: false ## @param server.hostAliases Deployment pod host aliases ## https://kubernetes.io/docs/concepts/services-networking/add-entries-to-pod-etc-hosts-with-host-aliases/ ## hostAliases: [] composedTaskRunner: ## Bitnami Spring Cloud Dataflow Composed Task Runner image ## ref: https://hub.docker.com/r/bitnami/spring-cloud-dataflow/tags/ ## @param server.composedTaskRunner.image.registry Spring Cloud Dataflow Composed Task Runner image registry ## @param server.composedTaskRunner.image.repository Spring Cloud Dataflow Composed Task Runner image repository ## @param server.composedTaskRunner.image.tag Spring Cloud Dataflow Composed Task Runner image tag (immutable tags are recommended) ## image: registry: docker.io repository: bitnami/spring-cloud-dataflow-composed-task-runner tag: 2.9.2-debian-10-r52 ## Spring Cloud Dataflow Server configuration parameters ## configuration: ## @param server.configuration.streamingEnabled Enables or disables streaming data processing ## streamingEnabled: true ## @param server.configuration.batchEnabled Enables or disables batch data (tasks and schedules) processing ## batchEnabled: true ## @param server.configuration.accountName The name of the account to configure for the Kubernetes platform ## accountName: default ## @param server.configuration.trustK8sCerts Trust K8s certificates when querying the Kubernetes API ## trustK8sCerts: false ## @param server.configuration.containerRegistries Container registries configuration ## Example: ## containerRegistries: ## default: ## registry-host: registry-1.docker.io ## authorization-type: dockeroauth2 ## containerRegistries: {} ## @param server.configuration.grafanaInfo Endpoint to the grafana instance (Deprecated: use the metricsDashboard instead) ## grafanaInfo: "" ## @param server.configuration.metricsDashboard Endpoint to the metricsDashboard instance ## metricsDashboard: "" ## @param server.configuration.defaultSpringApplicationJSON Injects default values for environment variable SPRING_APPLICATION_JSON ## { ## "maven": { ## "local-repository": null, ## "remote-repositories": { ## "repo1": { ## "url": "https://repo.spring.io/libs-snapshot" ## } ## } ## } ## } ## defaultSpringApplicationJSON: true ## @param server.existingConfigmap ConfigMap with Spring Cloud Dataflow Server Configuration ## NOTE: When it's set the server.configuration.* and deployer.* ## parameters are ignored, ## existingConfigmap: "" ## @param server.command Override default container command (useful when using custom images) ## command: [] ## @param server.args Override default container args (useful when using custom images) ## args: [] ## @param server.lifecycleHooks for the Dataflow server container(s) to automate configuration before or after startup ## lifecycleHooks: {} ## @param server.extraEnvVars Extra environment variables to be set on Dataflow server container ## E.g: ## extraEnvVars: ## - name: FOO ## value: BAR ## extraEnvVars: [] ## @param server.extraEnvVarsCM ConfigMap with extra environment variables ## extraEnvVarsCM: "" ## @param server.extraEnvVarsSecret Secret with extra environment variables ## extraEnvVarsSecret: "" ## @param server.replicaCount Number of Dataflow server replicas to deploy ## replicaCount: 1 ## @param server.podAffinityPreset Dataflow server pod affinity preset. Ignored if `server.affinity` is set. Allowed values: `soft` or `hard` ## ref: https://kubernetes.io/docs/concepts/scheduling-eviction/assign-pod-node/#inter-pod-affinity-and-anti-affinity ## podAffinityPreset: "" ## @param server.podAntiAffinityPreset Dataflow server pod anti-affinity preset. Ignored if `server.affinity` is set. Allowed values: `soft` or `hard` ## ref: https://kubernetes.io/docs/concepts/scheduling-eviction/assign-pod-node/#inter-pod-affinity-and-anti-affinity ## podAntiAffinityPreset: soft ## @param server.containerPort Dataflow server port ## containerPort: 8080 ## Dataflow Server node affinity preset ## ref: https://kubernetes.io/docs/concepts/scheduling-eviction/assign-pod-node/#node-affinity ## nodeAffinityPreset: ## @param server.nodeAffinityPreset.type Dataflow server node affinity preset type. Ignored if `server.affinity` is set. Allowed values: `soft` or `hard` ## type: "" ## @param server.nodeAffinityPreset.key Dataflow server node label key to match Ignored if `server.affinity` is set. ## E.g. ## key: "kubernetes.io/e2e-az-name" ## key: "" ## @param server.nodeAffinityPreset.values Dataflow server node label values to match. Ignored if `server.affinity` is set. ## E.g. ## values: ## - e2e-az1 ## - e2e-az2 ## values: [] ## @param server.affinity Dataflow server affinity for pod assignment ## ref: https://kubernetes.io/docs/concepts/configuration/assign-pod-node/#affinity-and-anti-affinity ## Note: server.podAffinityPreset, server.podAntiAffinityPreset, and server.nodeAffinityPreset will be ignored when it's set ## affinity: {} ## @param server.nodeSelector Dataflow server node labels for pod assignment ## ref: https://kubernetes.io/docs/user-guide/node-selection/ ## nodeSelector: {} ## @param server.tolerations Dataflow server tolerations for pod assignment ## ref: https://kubernetes.io/docs/concepts/configuration/taint-and-toleration/ ## tolerations: [] ## @param server.podAnnotations Annotations for Dataflow server pods ## ref: https://kubernetes.io/docs/concepts/overview/working-with-objects/annotations/ ## podAnnotations: {} ## @param server.updateStrategy.type Deployment strategy type for Dataflow server pods. ## ref: https://kubernetes.io/docs/concepts/workloads/controllers/deployment/#strategy ## e.g: ## updateStrategy: ## type: RollingUpdate ## rollingUpdate: ## maxSurge: 25% ## maxUnavailable: 25% ## updateStrategy: type: RollingUpdate ## @param server.podLabels Extra labels for Dataflow Server pods ## ref: https://kubernetes.io/docs/concepts/overview/working-with-objects/labels/ ## podLabels: {} ## @param server.priorityClassName Dataflow Server pods' priority ## ref: https://kubernetes.io/docs/concepts/configuration/pod-priority-preemption/ ## priorityClassName: "" ## @param server.schedulerName Name of the k8s scheduler (other than default) ## ref: https://kubernetes.io/docs/tasks/administer-cluster/configure-multiple-schedulers/ ## schedulerName: "" ## @param server.topologySpreadConstraints Topology Spread Constraints for pod assignment ## https://kubernetes.io/docs/concepts/workloads/pods/pod-topology-spread-constraints/ ## The value is evaluated as a template ## topologySpreadConstraints: [] ## Dataflow Server pods' Security Context. ## ref: https://kubernetes.io/docs/tasks/configure-pod-container/security-context/#set-the-security-context-for-a-pod ## @param server.podSecurityContext.enabled Enabled Dataflow Server pods' Security Context ## @param server.podSecurityContext.fsGroup Group ID for the volumes of the pod ## podSecurityContext: enabled: true fsGroup: 1001 ## Dataflow Server containers' Security Context (only main container). ## ref: https://kubernetes.io/docs/tasks/configure-pod-container/security-context/#set-the-security-context-for-a-container ## @param server.containerSecurityContext.enabled Enabled Dataflow Server containers' Security Context ## @param server.containerSecurityContext.runAsUser Set Dataflow Server container's Security Context runAsUser ## containerSecurityContext: enabled: true runAsUser: 1001 ## Dataflow Server containers' resource requests and limits. ## ref: https://kubernetes.io/docs/user-guide/compute-resources/ ## We usually recommend not to specify default resources and to leave this as a conscious ## choice for the user. This also increases chances charts run on environments with little ## resources, such as Minikube. If you do want to specify resources, uncomment the following ## lines, adjust them as necessary, and remove the curly braces after 'resources:'. ## @param server.resources.limits The resources limits for the Dataflow server container ## @param server.resources.requests The requested resources for the Dataflow server container ## resources: ## Example: ## limits: ## cpu: 100m ## memory: 128Mi limits: {} ## Examples: ## requests: ## cpu: 100m ## memory: 128Mi requests: {} ## Dataflow Server pods' startup probes. Evaluated as a template. ## ref: https://kubernetes.io/docs/tasks/configure-pod-container/configure-liveness-readiness-probes/#configure-probes ## @param server.startupProbe.enabled Enable startupProbe ## @param server.startupProbe.initialDelaySeconds Initial delay seconds for startupProbe ## @param server.startupProbe.periodSeconds Period seconds for startupProbe ## @param server.startupProbe.timeoutSeconds Timeout seconds for startupProbe ## @param server.startupProbe.failureThreshold Failure threshold for startupProbe ## @param server.startupProbe.successThreshold Success threshold for startupProbe ## startupProbe: enabled: false initialDelaySeconds: 120 timeoutSeconds: 1 periodSeconds: 20 failureThreshold: 6 successThreshold: 1 ## Dataflow Server pods' liveness probes. Evaluated as a template. ## ref: https://kubernetes.io/docs/tasks/configure-pod-container/configure-liveness-readiness-probes/#configure-probes ## @param server.livenessProbe.enabled Enable livenessProbe ## @param server.livenessProbe.initialDelaySeconds Initial delay seconds for livenessProbe ## @param server.livenessProbe.periodSeconds Period seconds for livenessProbe ## @param server.livenessProbe.timeoutSeconds Timeout seconds for livenessProbe ## @param server.livenessProbe.failureThreshold Failure threshold for livenessProbe ## @param server.livenessProbe.successThreshold Success threshold for livenessProbe ## livenessProbe: enabled: true initialDelaySeconds: 120 timeoutSeconds: 1 periodSeconds: 20 failureThreshold: 6 successThreshold: 1 ## Dataflow Server pods' readiness probes. Evaluated as a template. ## ref: https://kubernetes.io/docs/tasks/configure-pod-container/configure-liveness-readiness-probes/#configure-probes ## @param server.readinessProbe.enabled Enable readinessProbe ## @param server.readinessProbe.initialDelaySeconds Initial delay seconds for readinessProbe ## @param server.readinessProbe.periodSeconds Period seconds for readinessProbe ## @param server.readinessProbe.timeoutSeconds Timeout seconds for readinessProbe ## @param server.readinessProbe.failureThreshold Failure threshold for readinessProbe ## @param server.readinessProbe.successThreshold Success threshold for readinessProbe ## readinessProbe: enabled: true initialDelaySeconds: 120 timeoutSeconds: 1 periodSeconds: 20 failureThreshold: 6 successThreshold: 1 ## @param server.customStartupProbe Override default startup probe ## customStartupProbe: {} ## @param server.customLivenessProbe Override default liveness probe ## customLivenessProbe: {} ## @param server.customReadinessProbe Override default readiness probe ## customReadinessProbe: {} ## Dataflow Server Service parameters. ## service: ## @param server.service.type Kubernetes service type ## type: ClusterIP ## @param server.service.port Service HTTP port ## port: 8080 ## @param server.service.nodePort Specify the nodePort value for the LoadBalancer and NodePort service types ## ref: https://kubernetes.io/docs/concepts/services-networking/service/#type-nodeport ## nodePort: "" ## @param server.service.clusterIP Dataflow server service cluster IP ## e.g: ## clusterIP: None ## clusterIP: "" ## @param server.service.externalTrafficPolicy Enable client source IP preservation ## ref https://kubernetes.io/docs/tasks/access-application-cluster/create-external-load-balancer/#preserving-the-client-source-ip ## externalTrafficPolicy: Cluster ## @param server.service.loadBalancerIP Load balancer IP if service type is `LoadBalancer` ## Set the LoadBalancer service type to internal only ## ref: https://kubernetes.io/docs/concepts/services-networking/service/#internal-load-balancer ## loadBalancerIP: "" ## @param server.service.loadBalancerSourceRanges Addresses that are allowed when service is LoadBalancer ## https://kubernetes.io/docs/tasks/access-application-cluster/configure-cloud-provider-firewall/#restrict-access-for-loadbalancer-service ## e.g: ## loadBalancerSourceRanges: ## - 10.10.10.0/24 ## loadBalancerSourceRanges: [] ## @param server.service.extraPorts Extra ports to expose (normally used with the `sidecar` value) ## extraPorts: [] ## @param server.service.annotations Provide any additional annotations which may be required. Evaluated as a template. ## annotations: {} ## @param server.service.sessionAffinity Session Affinity for Kubernetes service, can be "None" or "ClientIP" ## If "ClientIP", consecutive client requests will be directed to the same Pod ## ref: https://kubernetes.io/docs/concepts/services-networking/service/#virtual-ips-and-service-proxies ## sessionAffinity: None ## @param server.service.sessionAffinityConfig Additional settings for the sessionAffinity ## sessionAffinityConfig: ## clientIP: ## timeoutSeconds: 300 sessionAffinityConfig: {} ## Configure the ingress resource that allows you to access Dataflow Server ## ingress: ## @param server.ingress.enabled Enable ingress controller resource ## enabled: false ## @param server.ingress.path The Path to WordPress. You may need to set this to '/*' in order to use this with ALB ingress controllers. ## path: / ## @param server.ingress.apiVersion Force Ingress API version (automatically detected if not set) ## apiVersion: "" ## @param server.ingress.pathType Ingress path type ## pathType: ImplementationSpecific ## DEPRECATED: Use server.ingress.annotations instead of server.ingress.certManager ## certManager: false ## ## @param server.ingress.hostname Default host for the ingress resource ## hostname: dataflow.local ## @param server.ingress.annotations Additional annotations for the Ingress resource. To enable certificate autogeneration, place here your cert-manager annotations. ## For a full list of possible ingress annotations, please see ## ref: https://github.com/kubernetes/ingress-nginx/blob/master/docs/user-guide/nginx-configuration/annotations.md ## Use this parameter to set the required annotations for cert-manager, see ## ref: https://cert-manager.io/docs/usage/ingress/#supported-annotations ## ## e.g: ## annotations: ## kubernetes.io/ingress.class: nginx ## cert-manager.io/cluster-issuer: cluster-issuer-name ## annotations: {} ## @param server.ingress.tls Enable TLS configuration for the hostname defined at ingress.hostname parameter ## TLS certificates will be retrieved from a TLS secret with name: {{- printf "%s-tls" .Values.ingress.hostname }} ## You can use the ingress.secrets parameter to create this TLS secret or relay on cert-manager to create it ## tls: false ## @param server.ingress.certManager Add the corresponding annotations for cert-manager integration ## certManager: false ## @param server.ingress.extraHosts The list of additional hostnames to be covered with this ingress record. ## Most likely the hostname above will be enough, but in the event more hosts are needed, this is an array ## extraHosts: ## - name: dataflow.local ## path: / ## extraHosts: [] ## @param server.ingress.extraPaths An array with additional arbitrary paths that may need to be added to the ingress under the main host ## e.g: ## extraPaths: ## - path: /* ## backend: ## serviceName: ssl-redirect ## servicePort: use-annotation ## extraPaths: [] ## @param server.ingress.extraTls The tls configuration for additional hostnames to be covered with this ingress record. ## see: https://kubernetes.io/docs/concepts/services-networking/ingress/#tls ## extraTls: ## - hosts: ## - dataflow.local ## secretName: dataflow.local-tls ## extraTls: [] ## @param server.ingress.secrets If you're providing your own certificates, please use this to add the certificates as secrets ## key and certificate should start with -----BEGIN CERTIFICATE----- or ## -----BEGIN RSA PRIVATE KEY----- ## ## name should line up with a tlsSecret set further up ## If you're using cert-manager, this is unneeded, as it will create the secret for you if it is not set ## ## It is also possible to create and manage the certificates outside of this helm chart ## Please see README.md for more information ## e.g: ## - name: dataflow.local-tls ## key: ## certificate: ## secrets: [] ## @param server.ingress.ingressClassName IngressClass that will be be used to implement the Ingress (Kubernetes 1.18+) ## This is supported in Kubernetes 1.18+ and required if you have more than one IngressClass marked as the default for your cluster . ## ref: https://kubernetes.io/blog/2020/04/02/improvements-to-the-ingress-api-in-kubernetes-1.18/ ## ingressClassName: "" ## @param server.initContainers Add init containers to the Dataflow Server pods ## Example: ## initContainers: ## - name: your-image-name ## image: your-image ## imagePullPolicy: Always ## ports: ## - name: portname ## containerPort: 1234 ## initContainers: [] ## @param server.sidecars Add sidecars to the Dataflow Server pods ## Example: ## sidecars: ## - name: your-image-name ## image: your-image ## imagePullPolicy: Always ## ports: ## - name: portname ## containerPort: 1234 ## sidecars: [] ## Dataflow Server Pod Disruption Budget configuration ## ref: https://kubernetes.io/docs/tasks/run-application/configure-pdb/ ## pdb: ## @param server.pdb.create Enable/disable a Pod Disruption Budget creation ## create: false ## @param server.pdb.minAvailable Minimum number/percentage of pods that should remain scheduled ## minAvailable: 1 ## @param server.pdb.maxUnavailable Maximum number/percentage of pods that may be made unavailable ## maxUnavailable: "" ## Dataflow Server Autoscaling parameters. ## autoscaling: ## @param server.autoscaling.enabled Enable autoscaling for Dataflow server ## @param server.autoscaling.minReplicas Minimum number of Dataflow server replicas ## @param server.autoscaling.maxReplicas Maximum number of Dataflow server replicas ## @param server.autoscaling.targetCPU Target CPU utilization percentage ## @param server.autoscaling.targetMemory Target Memory utilization percentage ## enabled: false minReplicas: "" maxReplicas: "" targetCPU: "" targetMemory: "" ## @param server.extraVolumes Extra Volumes to be set on the Dataflow Server Pod ## e.g: ## extraVolumes: ## - name: sample ## emptyDir: {} ## extraVolumes: [] ## @param server.extraVolumeMounts Extra VolumeMounts to be set on the Dataflow Container ## e.g: ## extraVolumeMounts: ## - name: sample ## mountPath: /temp/sample ## extraVolumeMounts: [] ## Java Debug Wire Protocol (JDWP) parameters. ## jdwp: ## @param server.jdwp.enabled Set to true to enable Java debugger ## enabled: false ## @param server.jdwp.port Specify port for remote debugging ## port: 5005 ## @param server.proxy Add proxy configuration for SCDF server ## Example: ## proxy: ## host: "myproxy.com" ## port: 8080 ## user: "" ## password: "" ## proxy: {} ## @param server.applicationProperties Specify common application properties added by SCDF server to streams and/or tasks ## ref: https://docs.spring.io/spring-cloud-dataflow/docs/current/reference/htmlsingle/#spring-cloud-dataflow-global-properties applicationProperties: {} ## @section Dataflow Skipper parameters ## Spring Cloud Skipper parameters. ## skipper: ## @param skipper.enabled Enable Spring Cloud Skipper component ## Note: it'll be also enabled if streams are enabled in Dataflow server configuration. ## enabled: true ## @param skipper.hostAliases Deployment pod host aliases ## https://kubernetes.io/docs/concepts/services-networking/add-entries-to-pod-etc-hosts-with-host-aliases/ ## hostAliases: [] ## Bitnami Spring Cloud Skipper image ## ref: https://hub.docker.com/r/bitnami/spring-cloud-skipper/tags/ ## @param skipper.image.registry Spring Cloud Skipper image registry ## @param skipper.image.repository Spring Cloud Skipper image repository ## @param skipper.image.tag Spring Cloud Skipper image tag (immutable tags are recommended) ## @param skipper.image.pullPolicy Spring Cloud Skipper image pull policy ## @param skipper.image.pullSecrets Specify docker-registry secret names as an array ## @param skipper.image.debug Enable image debug mode ## image: registry: docker.io repository: bitnami/spring-cloud-skipper tag: 2.8.2-debian-10-r58 ## Specify a imagePullPolicy. Defaults to 'Always' if image tag is 'latest', else set to 'IfNotPresent' ## ref: https://kubernetes.io/docs/user-guide/images/#pre-pulling-images ## pullPolicy: IfNotPresent ## Optionally specify an array of imagePullSecrets. ## Secrets must be manually created in the namespace. ## ref: https://kubernetes.io/docs/tasks/configure-pod-container/pull-image-private-registry/ ## e.g: ## pullSecrets: ## - myRegistryKeySecretName ## pullSecrets: [] ## Set to true if you would like to see extra information on logs ## debug: false ## Skipper Server configuration parameters ## configuration: ## @param skipper.configuration.accountName The name of the account to configure for the Kubernetes platform ## accountName: default ## @param skipper.configuration.trustK8sCerts Trust K8s certificates when querying the Kubernetes API ## trustK8sCerts: false ## @param skipper.existingConfigmap Name of existing ConfigMap with Skipper server configuration ## NOTE: When it's set the server.configuration.* and deployer.* ## parameters are ignored, ## existingConfigmap: "" ## @param skipper.command Override default container command (useful when using custom images) ## command: [] ## @param skipper.args Override default container args (useful when using custom images) ## args: [] ## @param skipper.lifecycleHooks for the Skipper container(s) to automate configuration before or after startup ## lifecycleHooks: {} ## @param skipper.extraEnvVars Extra environment variables to be set on Skipper server container ## E.g: ## extraEnvVars: ## - name: FOO ## value: BAR ## extraEnvVars: [] ## @param skipper.extraEnvVarsCM Name of existing ConfigMap containing extra environment variables ## extraEnvVarsCM: "" ## @param skipper.extraEnvVarsSecret Name of existing Secret containing extra environment variables ## extraEnvVarsSecret: "" ## @param skipper.replicaCount Number of Skipper server replicas to deploy ## replicaCount: 1 ## @param skipper.podAffinityPreset Skipper pod affinity preset. Ignored if `skipper.affinity` is set. Allowed values: `soft` or `hard` ## ref: https://kubernetes.io/docs/concepts/scheduling-eviction/assign-pod-node/#inter-pod-affinity-and-anti-affinity ## podAffinityPreset: "" ## @param skipper.podAntiAffinityPreset Skipper pod anti-affinity preset. Ignored if `skipper.affinity` is set. Allowed values: `soft` or `hard` ## ref: https://kubernetes.io/docs/concepts/scheduling-eviction/assign-pod-node/#inter-pod-affinity-and-anti-affinity ## podAntiAffinityPreset: soft ## Skipper node affinity preset ## ref: https://kubernetes.io/docs/concepts/scheduling-eviction/assign-pod-node/#node-affinity ## nodeAffinityPreset: ## @param skipper.nodeAffinityPreset.type Skipper node affinity preset type. Ignored if `skipper.affinity` is set. Allowed values: `soft` or `hard` ## type: "" ## @param skipper.nodeAffinityPreset.key Skipper node label key to match Ignored if `skipper.affinity` is set. ## E.g. ## key: "kubernetes.io/e2e-az-name" ## key: "" ## @param skipper.nodeAffinityPreset.values Skipper node label values to match. Ignored if `skipper.affinity` is set. ## E.g. ## values: ## - e2e-az1 ## - e2e-az2 ## values: [] ## @param skipper.affinity Skipper affinity for pod assignment ## ref: https://kubernetes.io/docs/concepts/configuration/assign-pod-node/#affinity-and-anti-affinity ## Note: skipper.podAffinityPreset, skipper.podAntiAffinityPreset, and skipper.nodeAffinityPreset will be ignored when it's set ## affinity: {} ## @param skipper.nodeSelector Skipper node labels for pod assignment ## ref: https://kubernetes.io/docs/user-guide/node-selection/ ## nodeSelector: {} ## @param skipper.tolerations Skipper tolerations for pod assignment ## ref: https://kubernetes.io/docs/concepts/configuration/taint-and-toleration/ ## tolerations: [] ## @param skipper.podAnnotations Annotations for Skipper server pods ## ref: https://kubernetes.io/docs/concepts/overview/working-with-objects/annotations/ ## podAnnotations: {} ## @param skipper.updateStrategy.type Deployment strategy type for Skipper server pods. ## ref: https://kubernetes.io/docs/concepts/workloads/controllers/deployment/#strategy ## e.g: ## updateStrategy: ## type: RollingUpdate ## rollingUpdate: ## maxSurge: 25% ## maxUnavailable: 25% ## updateStrategy: type: RollingUpdate ## @param skipper.podLabels Extra labels for Skipper pods ## ref: https://kubernetes.io/docs/concepts/overview/working-with-objects/labels/ ## podLabels: {} ## @param skipper.priorityClassName Controller priorityClassName ## ref: https://kubernetes.io/docs/concepts/configuration/pod-priority-preemption/ ## priorityClassName: "" ## @param skipper.schedulerName Name of the k8s scheduler (other than default) ## ref: https://kubernetes.io/docs/tasks/administer-cluster/configure-multiple-schedulers/ ## schedulerName: "" ## @param skipper.topologySpreadConstraints Topology Spread Constraints for pod assignment ## https://kubernetes.io/docs/concepts/workloads/pods/pod-topology-spread-constraints/ ## The value is evaluated as a template ## topologySpreadConstraints: [] ## Skipper pods' Security Context. ## ref: https://kubernetes.io/docs/tasks/configure-pod-container/security-context/#set-the-security-context-for-a-pod ## @param skipper.podSecurityContext.enabled Enabled Skipper pods' Security Context ## @param skipper.podSecurityContext.fsGroup Group ID for the volumes of the pod ## podSecurityContext: enabled: true fsGroup: 1001 ## Skipper containers' Security Context (only main container). ## ref: https://kubernetes.io/docs/tasks/configure-pod-container/security-context/#set-the-security-context-for-a-container ## @param skipper.containerSecurityContext.enabled Enabled Datafkiw Skipper containers' Security Context ## @param skipper.containerSecurityContext.runAsUser Set Dataflow Skipper container's Security Context runAsUser ## containerSecurityContext: enabled: true runAsUser: 1001 ## Skipper containers' resource requests and limits. ## ref: https://kubernetes.io/docs/user-guide/compute-resources/ ## We usually recommend not to specify default resources and to leave this as a conscious ## choice for the user. This also increases chances charts run on environments with little ## resources, such as Minikube. If you do want to specify resources, uncomment the following ## lines, adjust them as necessary, and remove the curly braces after 'resources:'. ## @param skipper.resources.limits The resources limits for the Skipper server container ## @param skipper.resources.requests The requested resources for the Skipper server container ## resources: ## Example: ## limits: ## cpu: 100m ## memory: 128Mi limits: {} ## Examples: ## requests: ## cpu: 100m ## memory: 128Mi requests: {} ## Configure extra options for startup probe ## ref: https://kubernetes.io/docs/tasks/configure-pod-container/configure-liveness-readiness-probes/#configure-probes ## @param skipper.startupProbe.enabled Enable startupProbe ## @param skipper.startupProbe.initialDelaySeconds Initial delay seconds for startupProbe ## @param skipper.startupProbe.periodSeconds Period seconds for startupProbe ## @param skipper.startupProbe.timeoutSeconds Timeout seconds for startupProbe ## @param skipper.startupProbe.failureThreshold Failure threshold for startupProbe ## @param skipper.startupProbe.successThreshold Success threshold for startupProbe ## startupProbe: enabled: false initialDelaySeconds: 120 timeoutSeconds: 1 periodSeconds: 20 failureThreshold: 6 successThreshold: 1 ## Configure extra options for liveness probe ## ref: https://kubernetes.io/docs/tasks/configure-pod-container/configure-liveness-readiness-probes/#configure-probes ## @param skipper.livenessProbe.enabled Enable livenessProbe ## @param skipper.livenessProbe.initialDelaySeconds Initial delay seconds for livenessProbe ## @param skipper.livenessProbe.periodSeconds Period seconds for livenessProbe ## @param skipper.livenessProbe.timeoutSeconds Timeout seconds for livenessProbe ## @param skipper.livenessProbe.failureThreshold Failure threshold for livenessProbe ## @param skipper.livenessProbe.successThreshold Success threshold for livenessProbe ## livenessProbe: enabled: true initialDelaySeconds: 120 timeoutSeconds: 1 periodSeconds: 20 failureThreshold: 6 successThreshold: 1 ## Configure extra options for readiness probe ## ref: https://kubernetes.io/docs/tasks/configure-pod-container/configure-liveness-readiness-probes/#configure-probes ## @param skipper.readinessProbe.enabled Enable readinessProbe ## @param skipper.readinessProbe.initialDelaySeconds Initial delay seconds for readinessProbe ## @param skipper.readinessProbe.periodSeconds Period seconds for readinessProbe ## @param skipper.readinessProbe.timeoutSeconds Timeout seconds for readinessProbe ## @param skipper.readinessProbe.failureThreshold Failure threshold for readinessProbe ## @param skipper.readinessProbe.successThreshold Success threshold for readinessProbe ## readinessProbe: enabled: true initialDelaySeconds: 120 timeoutSeconds: 1 periodSeconds: 20 failureThreshold: 6 successThreshold: 1 ## @param skipper.customStartupProbe Override default startup probe ## customStartupProbe: {} ## @param skipper.customLivenessProbe Override default liveness probe ## customLivenessProbe: {} ## @param skipper.customReadinessProbe Override default readiness probe ## customReadinessProbe: {} ## Skipper Service parameters. ## service: ## @param skipper.service.type Kubernetes service type ## type: ClusterIP ## @param skipper.service.port Service HTTP port ## port: 80 ## @param skipper.service.nodePort Service HTTP node port ## ref: https://kubernetes.io/docs/concepts/services-networking/service/#type-nodeport ## nodePort: "" ## @param skipper.service.clusterIP Skipper server service cluster IP ## e.g: ## clusterIP: None ## clusterIP: "" ## @param skipper.service.externalTrafficPolicy Enable client source IP preservation ## ref https://kubernetes.io/docs/tasks/access-application-cluster/create-external-load-balancer/#preserving-the-client-source-ip ## externalTrafficPolicy: Cluster ## @param skipper.service.loadBalancerIP Load balancer IP if service type is `LoadBalancer` ## ref: https://kubernetes.io/docs/concepts/services-networking/service/#internal-load-balancer ## loadBalancerIP: "" ## @param skipper.service.loadBalancerSourceRanges Address that are allowed when service is LoadBalancer ## Set the LoadBalancer service type to internal only ## https://kubernetes.io/docs/tasks/access-application-cluster/configure-cloud-provider-firewall/#restrict-access-for-loadbalancer-service ## e.g: ## loadBalancerSourceRanges: ## - 10.10.10.0/24 ## loadBalancerSourceRanges: [] ## @param skipper.service.extraPorts Extra ports to expose (normally used with the `sidecar` value) ## extraPorts: [] ## @param skipper.service.annotations Annotations for Skipper server service ## annotations: {} ## @param skipper.service.sessionAffinity Session Affinity for Kubernetes service, can be "None" or "ClientIP" ## If "ClientIP", consecutive client requests will be directed to the same Pod ## ref: https://kubernetes.io/docs/concepts/services-networking/service/#virtual-ips-and-service-proxies ## sessionAffinity: None ## @param skipper.service.sessionAffinityConfig Additional settings for the sessionAffinity ## sessionAffinityConfig: ## clientIP: ## timeoutSeconds: 300 sessionAffinityConfig: {} ## @param skipper.initContainers Add init containers to the Dataflow Skipper pods ## Example: ## initContainers: ## - name: your-image-name ## image: your-image ## imagePullPolicy: Always ## ports: ## - name: portname ## containerPort: 1234 ## initContainers: [] ## @param skipper.sidecars Add sidecars to the Skipper pods ## Example: ## sidecars: ## - name: your-image-name ## image: your-image ## imagePullPolicy: Always ## ports: ## - name: portname ## containerPort: 1234 ## sidecars: [] ## Skipper Pod Disruption Budget configuration ## ref: https://kubernetes.io/docs/tasks/run-application/configure-pdb/ ## pdb: ## @param skipper.pdb.create Enable/disable a Pod Disruption Budget creation ## create: false ## @param skipper.pdb.minAvailable Minimum number/percentage of pods that should remain scheduled ## minAvailable: 1 ## @param skipper.pdb.maxUnavailable Maximum number/percentage of pods that may be made unavailable ## maxUnavailable: "" ## Skipper Autoscaling parameters. ## autoscaling: ## @param skipper.autoscaling.enabled Enable autoscaling for Skipper server ## @param skipper.autoscaling.minReplicas Minimum number of Skipper server replicas ## @param skipper.autoscaling.maxReplicas Maximum number of Skipper server replicas ## @param skipper.autoscaling.targetCPU Target CPU utilization percentage ## @param skipper.autoscaling.targetMemory Target Memory utilization percentage ## enabled: false minReplicas: "" maxReplicas: "" targetCPU: "" targetMemory: "" ## @param skipper.extraVolumes Extra Volumes to be set on the Skipper Pod ## e.g: ## extraVolumes: ## - name: sample ## emptyDir: {} ## extraVolumes: [] ## @param skipper.extraVolumeMounts Extra VolumeMounts to be set on the Skipper Container ## e.g: ## extraVolumeMounts: ## - name: sample ## mountPath: /temp/sample ## extraVolumeMounts: [] ## Java Debug Wire Protocol (JDWP) parameters. ## jdwp: ## @param skipper.jdwp.enabled Enable Java Debug Wire Protocol (JDWP) ## enabled: false ## @param skipper.jdwp.port JDWP TCP port for remote debugging ## port: 5005 ## External Skipper Configuration ## All of these values are ignored when skipper.enabled is set to true ## externalSkipper: ## @param externalSkipper.host Host of a external Skipper Server ## host: localhost ## @param externalSkipper.port External Skipper Server port number ## port: 7577 ## @section Deployer parameters ## Spring Cloud Deployer for Kubernetes parameters. ## deployer: ## Streaming applications resource requests and limits. ## ref: https://kubernetes.io/docs/user-guide/compute-resources/ ## @param deployer.resources.limits [object] Streaming applications resource limits ## @param deployer.resources.requests Streaming applications resource requests ## resources: limits: cpu: 500m memory: 1024Mi ## Examples: ## requests: ## cpu: 100m ## memory: 128Mi requests: {} ## Configure extra options for readiness probe ## ref: https://kubernetes.io/docs/tasks/configure-pod-container/configure-liveness-readiness-probes/#configure-probes ## @param deployer.readinessProbe.initialDelaySeconds Initial delay seconds for readinessProbe ## readinessProbe: initialDelaySeconds: 120 ## Configure extra options for liveness probe ## ref: https://kubernetes.io/docs/tasks/configure-pod-container/configure-liveness-readiness-probes/#configure-probes ## @param deployer.livenessProbe.initialDelaySeconds Initial delay seconds for livenessProbe ## livenessProbe: initialDelaySeconds: 90 ## @param deployer.nodeSelector The node selectors to apply to the streaming applications deployments in "key:value" format ## Multiple node selectors are comma separated. ## nodeSelector: "" ## @param deployer.tolerations Streaming applications tolerations ## tolerations: {} ## @param deployer.volumeMounts Streaming applications extra volume mounts ## volumeMounts: {} ## @param deployer.volumes Streaming applications extra volumes ## volumes: {} ## @param deployer.environmentVariables Streaming applications environment variables ## RabbitMQ/Kafka envs. ## Example: ## environmentVariables: ## - JAVA_TOOL_OPTIONS=-Xmx1024m ## - SPRING_REDIS_HOST=redis ## - SPRING_REDIS_PORT=6379 ## environmentVariables: [] ## Streams containers' Security Context. This security context will be use in every deployed stream. ## ref: https://kubernetes.io/docs/tasks/configure-pod-container/security-context/#set-the-security-context-for-a-container ## @param deployer.podSecurityContext.enabled Enabled pods' Security Context of the deployed pods batch or stream pods ## @param deployer.podSecurityContext.runAsUser Set Dataflow Streams container's Security Context runAsUser podSecurityContext: enabled: true runAsUser: 1001 ## @param deployer.imagePullSecrets Streaming applications imagePullSecrets ## imagePullSecrets: [] ## @param deployer.secretRefs Streaming applications secretRefs ## secretRefs: [] ## @param deployer.entryPointStyle An entry point style affects how application properties are passed to the container to be deployed. Allowed values: exec (default), shell, boot ## ref: https://docs.spring.io/spring-cloud-dataflow/docs/current/reference/htmlsingle/#_entry_point_style entryPointStyle: exec ## @param deployer.imagePullPolicy An image pull policy defines when a Docker image should be pulled to the local registry. Allowed values: IfNotPresent (default), Always, Never ## ref: https://docs.spring.io/spring-cloud-dataflow/docs/current/reference/htmlsingle/#_image_pull_policy imagePullPolicy: IfNotPresent ## @section RBAC parameters ## K8s Service Account. ## ref: https://kubernetes.io/docs/tasks/configure-pod-container/configure-service-account/ ## @param serviceAccount.create Enable the creation of a ServiceAccount for Dataflow server and Skipper server pods ## @param serviceAccount.name Name of the created serviceAccount. If not set and create is true, a name is generated using the scdf.fullname template ## @param serviceAccount.automountServiceAccountToken Automount service account token for the server service account ## @param serviceAccount.annotations Annotations for service account. Evaluated as a template. Only used if `create` is `true`. ## serviceAccount: create: true name: "" automountServiceAccountToken: true annotations: {} ## Role Based Access ## ref: https://kubernetes.io/docs/admin/authorization/rbac/ ## rbac: ## @param rbac.create Whether to create and use RBAC resources or not ## binding Spring Cloud Dataflow ServiceAccount to a role ## that allows pods querying the K8s API ## create: true ## @section Metrics parameters ## Prometheus metrics ## metrics: ## @param metrics.enabled Enable Prometheus metrics ## enabled: false ## Bitnami Prometheus Rsocket Proxy image ## ref: https://hub.docker.com/r/bitnami/prometheus-rsocket-proxy/tags/ ## @param metrics.image.registry Prometheus Rsocket Proxy image registry ## @param metrics.image.repository Prometheus Rsocket Proxy image repository ## @param metrics.image.tag Prometheus Rsocket Proxy image tag (immutable tags are recommended) ## @param metrics.image.pullPolicy Prometheus Rsocket Proxy image pull policy ## @param metrics.image.pullSecrets Specify docker-registry secret names as an array ## image: registry: docker.io repository: bitnami/prometheus-rsocket-proxy tag: 1.4.0-debian-10-r18 ## Specify a imagePullPolicy. Defaults to 'Always' if image tag is 'latest', else set to 'IfNotPresent' ## ref: https://kubernetes.io/docs/user-guide/images/#pre-pulling-images ## pullPolicy: IfNotPresent ## Optionally specify an array of imagePullSecrets. ## Secrets must be manually created in the namespace. ## ref: https://kubernetes.io/docs/tasks/configure-pod-container/pull-image-private-registry/ ## e.g: ## pullSecrets: ## - myRegistryKeySecretName ## pullSecrets: [] ## Prometheus Rsocket Proxy containers' resource requests and limits. ## ref: https://kubernetes.io/docs/user-guide/compute-resources/ ## We usually recommend not to specify default resources and to leave this as a conscious ## choice for the user. This also increases chances charts run on environments with little ## resources, such as Minikube. If you do want to specify resources, uncomment the following ## lines, adjust them as necessary, and remove the curly braces after 'resources:'. ## @param metrics.resources.limits The resources limits for the Prometheus Rsocket Proxy container ## @param metrics.resources.requests The requested resources for the Prometheus Rsocket Proxy container ## resources: ## Example: ## limits: ## cpu: 100m ## memory: 128Mi limits: {} ## Examples: ## requests: ## cpu: 100m ## memory: 128Mi requests: {} ## @param metrics.replicaCount Number of Prometheus Rsocket Proxy replicas to deploy ## replicaCount: 1 ## @param metrics.podAffinityPreset Prometheus Rsocket Proxy pod affinity preset. Ignored if `metrics.affinity` is set. Allowed values: `soft` or `hard` ## ref: https://kubernetes.io/docs/concepts/scheduling-eviction/assign-pod-node/#inter-pod-affinity-and-anti-affinity ## podAffinityPreset: "" ## @param metrics.podAntiAffinityPreset Prometheus Rsocket Proxy pod anti-affinity preset. Ignored if `metrics.affinity` is set. Allowed values: `soft` or `hard` ## ref: https://kubernetes.io/docs/concepts/scheduling-eviction/assign-pod-node/#inter-pod-affinity-and-anti-affinity ## podAntiAffinityPreset: soft ## Prometheus Rsocket Proxy node affinity preset ## ref: https://kubernetes.io/docs/concepts/scheduling-eviction/assign-pod-node/#node-affinity ## nodeAffinityPreset: ## @param metrics.nodeAffinityPreset.type Prometheus Rsocket Proxy node affinity preset type. Ignored if `metrics.affinity` is set. Allowed values: `soft` or `hard` ## type: "" ## @param metrics.nodeAffinityPreset.key Prometheus Rsocket Proxy node label key to match Ignored if `metrics.affinity` is set. ## E.g. ## key: "kubernetes.io/e2e-az-name" ## key: "" ## @param metrics.nodeAffinityPreset.values Prometheus Rsocket Proxy node label values to match. Ignored if `metrics.affinity` is set. ## E.g. ## values: ## - e2e-az1 ## - e2e-az2 ## values: [] ## @param metrics.affinity Prometheus Rsocket Proxy affinity for pod assignment ## ref: https://kubernetes.io/docs/concepts/configuration/assign-pod-node/#affinity-and-anti-affinity ## Note: metrics.podAffinityPreset, metrics.podAntiAffinityPreset, and metrics.nodeAffinityPreset will be ignored when it's set ## affinity: {} ## @param metrics.nodeSelector Prometheus Rsocket Proxy node labels for pod assignment ## ref: https://kubernetes.io/docs/user-guide/node-selection/ ## nodeSelector: {} ## @param metrics.hostAliases Prometheus Proxy pods host aliases ## https://kubernetes.io/docs/concepts/services-networking/add-entries-to-pod-etc-hosts-with-host-aliases/ ## hostAliases: [] ## @param metrics.tolerations Prometheus Rsocket Proxy tolerations for pod assignment ## ref: https://kubernetes.io/docs/concepts/configuration/taint-and-toleration/ ## tolerations: [] ## @param metrics.podAnnotations Annotations for Prometheus Rsocket Proxy pods ## ref: https://kubernetes.io/docs/concepts/overview/working-with-objects/annotations/ ## podAnnotations: {} ## @param metrics.podLabels Extra labels for Prometheus Proxy pods ## ref: https://kubernetes.io/docs/concepts/overview/working-with-objects/labels/ ## podLabels: {} ## Configure Pods Security Context ## ref: https://kubernetes.io/docs/tasks/configure-pod-container/security-context/#set-the-security-context-for-a-pod ## @param metrics.podSecurityContext.enabled Enabled Prometheus Proxy pods' Security Context ## @param metrics.podSecurityContext.fsGroup Set Prometheus Proxy pod's Security Context fsGroup ## podSecurityContext: enabled: false fsGroup: 1001 ## Configure Container Security Context ## ref: https://kubernetes.io/docs/tasks/configure-pod-container/security-context/#set-the-security-context-for-a-pod ## @param metrics.containerSecurityContext.enabled Enabled Prometheus Proxy containers' Security Context ## @param metrics.containerSecurityContext.runAsUser Set Prometheus Proxy containers' Security Context runAsUser ## containerSecurityContext: enabled: false runAsUser: 1001 ## @param metrics.command Override default container command (useful when using custom images) ## command: [] ## @param metrics.args Override default container args (useful when using custom images) ## args: [] ## @param metrics.lifecycleHooks for the Prometheus Proxy container(s) to automate configuration before or after startup ## lifecycleHooks: {} ## @param metrics.extraEnvVars Array with extra environment variables to add to Prometheus Proxy nodes ## e.g: ## extraEnvVars: ## - name: FOO ## value: "bar" ## extraEnvVars: [] ## @param metrics.extraEnvVarsCM Name of existing ConfigMap containing extra env vars for Prometheus Proxy nodes ## extraEnvVarsCM: "" ## @param metrics.extraEnvVarsSecret Name of existing Secret containing extra env vars for Prometheus Proxy nodes ## extraEnvVarsSecret: "" ## @param metrics.extraVolumes Optionally specify extra list of additional volumes for the Prometheus Proxy pod(s) ## extraVolumes: [] ## @param metrics.extraVolumeMounts Optionally specify extra list of additional volumeMounts for the Prometheus Proxy container(s) ## extraVolumeMounts: [] ## Prometheus Proxy container ports ## @param metrics.containerPorts.http Prometheus Proxy HTTP container port ## @param metrics.containerPorts.rsocket Prometheus Proxy Rsocket container port ## containerPorts: http: 8080 rsocket: 7001 ## @param metrics.sidecars Add additional sidecar containers to the Prometheus Proxy pod(s) ## e.g: ## sidecars: ## - name: your-image-name ## image: your-image ## imagePullPolicy: Always ## ports: ## - name: portname ## containerPort: 1234 ## sidecars: [] ## @param metrics.initContainers Add additional init containers to the Prometheus Proxy pod(s) ## ref: https://kubernetes.io/docs/concepts/workloads/pods/init-containers/ ## e.g: ## initContainers: ## - name: your-image-name ## image: your-image ## imagePullPolicy: Always ## command: ['sh', '-c', 'echo "hello world"'] ## initContainers: [] ## @param metrics.updateStrategy.type Prometheus Proxy deployment strategy type. ## ref: https://kubernetes.io/docs/concepts/workloads/controllers/deployment/#strategy ## e.g: ## updateStrategy: ## type: RollingUpdate ## rollingUpdate: ## maxSurge: 25% ## maxUnavailable: 25% ## updateStrategy: type: RollingUpdate ## @param metrics.priorityClassName Prometheus Rsocket Proxy pods' priority. ## ref: https://kubernetes.io/docs/concepts/configuration/pod-priority-preemption/ ## priorityClassName: "" ## @param metrics.schedulerName Name of the k8s scheduler (other than default) ## ref: https://kubernetes.io/docs/tasks/administer-cluster/configure-multiple-schedulers/ ## schedulerName: "" ## @param metrics.topologySpreadConstraints Topology Spread Constraints for pod assignment ## https://kubernetes.io/docs/concepts/workloads/pods/pod-topology-spread-constraints/ ## The value is evaluated as a template ## topologySpreadConstraints: [] ## Prometheus Proxy service parameters ## service: ## @param metrics.service.type Prometheus Proxy service type ## type: ClusterIP ## @param metrics.service.ports.http Prometheus Rsocket Proxy HTTP port ## @param metrics.service.ports.rsocket Prometheus Rsocket Proxy Rsocket port ## ports: http: 8080 rsocket: 7001 ## Node ports to expose ## @param metrics.service.nodePorts.http Node port for HTTP ## @param metrics.service.nodePorts.rsocket Node port for Rsocket ## NOTE: choose port between <30000-32767> ## nodePorts: http: "" rsocket: "" ## @param metrics.service.clusterIP Prometheys Proxy service Cluster IP ## e.g.: ## clusterIP: None ## clusterIP: "" ## @param metrics.service.loadBalancerIP Prometheys Proxy service Load Balancer IP ## ref: https://kubernetes.io/docs/concepts/services-networking/service/#type-loadbalancer ## loadBalancerIP: "" ## @param metrics.service.loadBalancerSourceRanges Prometheys Proxy service Load Balancer sources ## ref: https://kubernetes.io/docs/tasks/access-application-cluster/configure-cloud-provider-firewall/#restrict-access-for-loadbalancer-service ## e.g: ## loadBalancerSourceRanges: ## - 10.10.10.0/24 ## loadBalancerSourceRanges: [] ## @param metrics.service.externalTrafficPolicy Prometheys Proxy service external traffic policy ## ref http://kubernetes.io/docs/tasks/access-application-cluster/create-external-load-balancer/#preserving-the-client-source-ip ## externalTrafficPolicy: Cluster ## @param metrics.service.extraPorts Extra ports to expose (normally used with the `sidecar` value) ## extraPorts: [] ## @param metrics.service.annotations [object] Annotations for the Prometheus Rsocket Proxy service ## annotations: prometheus.io/scrape: 'true' prometheus.io/port: '{{ .Values.metrics.service.ports.http }}' prometheus.io/path: '/metrics/proxy' ## @param metrics.service.sessionAffinity Session Affinity for Kubernetes service, can be "None" or "ClientIP" ## If "ClientIP", consecutive client requests will be directed to the same Pod ## ref: https://kubernetes.io/docs/concepts/services-networking/service/#virtual-ips-and-service-proxies ## sessionAffinity: None ## @param metrics.service.sessionAffinityConfig Additional settings for the sessionAffinity ## sessionAffinityConfig: ## clientIP: ## timeoutSeconds: 300 sessionAffinityConfig: {} ## Prometheus Operator ServiceMonitor configuration ## serviceMonitor: ## @param metrics.serviceMonitor.enabled if `true`, creates a Prometheus Operator ServiceMonitor (also requires `metrics.enabled` to be `true`) ## enabled: false ## @param metrics.serviceMonitor.namespace Namespace in which ServiceMonitor is created if different from release ## namespace: "" ## @param metrics.serviceMonitor.jobLabel The name of the label on the target service to use as the job name in prometheus. ## jobLabel: "" ## @param metrics.serviceMonitor.interval Interval at which metrics should be scraped. ## ref: https://github.com/coreos/prometheus-operator/blob/master/Documentation/api.md#endpoint ## e.g: ## interval: 10s ## interval: "" ## @param metrics.serviceMonitor.scrapeTimeout Timeout after which the scrape is ended ## ref: https://github.com/coreos/prometheus-operator/blob/master/Documentation/api.md#endpoint ## e.g: ## scrapeTimeout: 10s ## scrapeTimeout: "" ## @param metrics.serviceMonitor.relabelings RelabelConfigs to apply to samples before scraping ## ref: https://github.com/coreos/prometheus-operator/blob/master/Documentation/api.md#relabelconfig ## relabelings: [] ## @param metrics.serviceMonitor.metricRelabelings MetricRelabelConfigs to apply to samples before ingestion ## ref: https://github.com/coreos/prometheus-operator/blob/master/Documentation/api.md#relabelconfig ## metricRelabelings: [] ## @param metrics.serviceMonitor.selector ServiceMonitor selector labels ## ref: https://github.com/bitnami/charts/tree/master/bitnami/prometheus-operator#prometheus-configuration ## ## selector: ## prometheus: my-prometheus ## selector: {} ## @param metrics.serviceMonitor.labels Extra labels for the ServiceMonitor ## labels: {} ## @param metrics.serviceMonitor.honorLabels honorLabels chooses the metric's labels on collisions with target labels ## honorLabels: false ## Prometheus Rsocket Proxy Pod Disruption Budget configuration ## ref: https://kubernetes.io/docs/tasks/run-application/configure-pdb/ ## pdb: ## @param metrics.pdb.create Enable/disable a Pod Disruption Budget creation ## create: false ## @param metrics.pdb.minAvailable Minimum number/percentage of pods that should remain scheduled ## minAvailable: 1 ## @param metrics.pdb.maxUnavailable Maximum number/percentage of pods that may be made unavailable ## maxUnavailable: "" ## Prometheus Rsocket Proxy Autoscaling parameters. ## @param metrics.autoscaling.enabled Enable autoscaling for Prometheus Rsocket Proxy ## @param metrics.autoscaling.minReplicas Minimum number of Prometheus Rsocket Proxy replicas ## @param metrics.autoscaling.maxReplicas Maximum number of Prometheus Rsocket Proxy replicas ## @param metrics.autoscaling.targetCPU Target CPU utilization percentage ## @param metrics.autoscaling.targetMemory Target Memory utilization percentage ## autoscaling: enabled: false minReplicas: "" maxReplicas: "" targetCPU: "" targetMemory: "" ## @section Init Container parameters ## Init containers parameters: ## wait-for-backends: Wait for the database and other services (such as Kafka or RabbitMQ) used when enabling streaming ## waitForBackends: ## @param waitForBackends.enabled Wait for the database and other services (such as Kafka or RabbitMQ) used when enabling streaming ## enabled: true ## @param waitForBackends.image.registry Init container wait-for-backend image registry ## @param waitForBackends.image.repository Init container wait-for-backend image name ## @param waitForBackends.image.tag Init container wait-for-backend image tag ## @param waitForBackends.image.pullPolicy Init container wait-for-backend image pull policy ## @param waitForBackends.image.pullSecrets Specify docker-registry secret names as an array ## image: registry: docker.io repository: bitnami/kubectl tag: 1.23.4-debian-10-r23 ## Specify a imagePullPolicy ## Defaults to 'Always' if image tag is 'latest', else set to 'IfNotPresent' ## ref: https://kubernetes.io/docs/user-guide/images/#pre-pulling-images ## pullPolicy: IfNotPresent ## Optionally specify an array of imagePullSecrets (secrets must be manually created in the namespace) ## ref: https://kubernetes.io/docs/tasks/configure-pod-container/pull-image-private-registry/ ## Example: ## pullSecrets: ## - myRegistryKeySecretName ## pullSecrets: [] ## Init container resource requests and limits. ## ref: https://kubernetes.io/docs/user-guide/compute-resources/ ## We usually recommend not to specify default resources and to leave this as a conscious ## choice for the user. This also increases chances charts run on environments with little ## resources, such as Minikube. If you do want to specify resources, uncomment the following ## lines, adjust them as necessary, and remove the curly braces after 'resources:'. ## @param waitForBackends.resources.limits Init container wait-for-backend resource limits ## @param waitForBackends.resources.requests Init container wait-for-backend resource requests ## resources: ## Example: ## limits: ## cpu: 100m ## memory: 128Mi limits: {} ## Examples: ## requests: ## cpu: 100m ## memory: 128Mi requests: {} ## @section Database parameters ## MariaDB chart configuration ## https://github.com/bitnami/charts/blob/master/bitnami/mariadb/values.yaml ## mariadb: ## @param mariadb.enabled Enable/disable MariaDB chart installation ## enabled: true ## @param mariadb.architecture MariaDB architecture. Allowed values: `standalone` or `replication` ## architecture: standalone ## Custom user/db credentials ## auth: ## @param mariadb.auth.rootPassword Password for the MariaDB `root` user ## ref: https://github.com/bitnami/bitnami-docker-mariadb#setting-the-root-password-on-first-run ## rootPassword: "" ## @param mariadb.auth.username Username of new user to create ## ref: https://github.com/bitnami/bitnami-docker-mariadb/blob/master/README.md#creating-a-database-on-first-run ## username: dataflow ## @param mariadb.auth.password Password for the new user ## password: change-me ## @param mariadb.auth.database Database name to create ## ref: https://github.com/bitnami/bitnami-docker-mariadb#creating-a-database-on-first-run ## database: dataflow ## @param mariadb.auth.forcePassword Force users to specify required passwords in the database ## forcePassword: false ## @param mariadb.auth.usePasswordFiles Mount credentials as a file instead of using an environment variable ## usePasswordFiles: false ## @param mariadb.initdbScripts [object] Specify dictionary of scripts to be run at first boot ## We can only create one database on MariaDB using parameters. However, when streaming ## is enabled we need a second database for Skipper. ## Improvements: support creating N users/databases on MariaDB chart. ## initdbScripts: create_databases.sql: | CREATE OR REPLACE USER 'skipper'@'%' identified by 'change-me'; CREATE DATABASE IF NOT EXISTS `skipper`; GRANT ALL ON skipper.* to 'skipper'@'%'; FLUSH PRIVILEGES; ## Flyway Configuration ## @param flyway.enabled Enable/disable flyway running Dataflow and Skipper Database creation scripts on startup ## All database creation scripts are ignored on startup when flyway.enabled is set to false ## This feature can be used in scenario, where Database tables are already present in Mariadb or ExternalDatabase. ## flyway: enabled: true ## External Database Configuration ## All of these values are ignored when mariadb.enabled is set to true ## externalDatabase: ## @param externalDatabase.host Host of the external database ## host: localhost ## @param externalDatabase.port External database port number ## port: 3306 ## @param externalDatabase.driver The fully qualified name of the JDBC Driver class ## driver: "" ## @param externalDatabase.scheme The scheme is a vendor-specific or shared protocol string that follows the "jdbc:" of the URL ## scheme: "" ## @param externalDatabase.password Password for the above username ## password: "" ## @param externalDatabase.existingPasswordSecret Existing secret with database password ## existingPasswordSecret: "" ## @param externalDatabase.existingPasswordKey Key of the existing secret with database password, defaults to `datasource-password` ## existingPasswordKey: "" ## Data Flow user and database ## dataflow: ## @param externalDatabase.dataflow.url JDBC URL for dataflow server. Overrides external scheme, host, port, database, and jdbc parameters. ## This provides a mechanism to define a fully customized JDBC URL for the data flow server rather than having it ## derived from the common, individual attributes. This property, when defined, has precedence over the ## individual attributes (scheme, host, port, database) ## url: "" ## @param externalDatabase.dataflow.database Name of the existing database to be used by Dataflow server ## database: dataflow ## @param externalDatabase.dataflow.username Existing username in the external db to be used by Dataflow server ## username: dataflow ## Skipper and database ## skipper: ## @param externalDatabase.skipper.url JDBC URL for skipper. Overrides external scheme, host, port, database, and jdbc parameters. ## This provides a mechanism to define a fully customized JDBC URL for skipper rather than having it ## derived from the common, individual attributes. This property, when defined, has precedence over the ## individual attributes (scheme, host, port, database) ## url: "" ## @param externalDatabase.skipper.database Name of the existing database to be used by Skipper server ## database: skipper ## @param externalDatabase.skipper.username Existing username in the external db to be used by Skipper server ## username: skipper ## @param externalDatabase.hibernateDialect Hibernate Dialect used by Dataflow/Skipper servers ## e.g: org.hibernate.dialect.MariaDB102Dialect ## hibernateDialect: "" ## @section RabbitMQ chart parameters ## RabbitMQ chart configuration ## https://github.com/bitnami/charts/blob/master/bitnami/rabbitmq/values.yaml ## rabbitmq: ## @param rabbitmq.enabled Enable/disable RabbitMQ chart installation ## enabled: true ## @param rabbitmq.auth.username RabbitMQ username ## auth: username: user ## External RabbitMQ Configuration ## All of these values are ignored when rabbitmq.enabled is set to true ## externalRabbitmq: ## @param externalRabbitmq.enabled Enable/disable external RabbitMQ ## enabled: false ## @param externalRabbitmq.host Host of the external RabbitMQ ## host: localhost ## @param externalRabbitmq.port External RabbitMQ port number ## port: 5672 ## @param externalRabbitmq.username External RabbitMQ username ## username: guest ## @param externalRabbitmq.password External RabbitMQ password. It will be saved in a kubernetes secret ## password: guest ## @param externalRabbitmq.vhost External RabbitMQ virtual host. It will be saved in a kubernetes secret ## e.g: ## vhost: / ## vhost: "" ## @param externalRabbitmq.existingPasswordSecret Existing secret with RabbitMQ password. It will be saved in a kubernetes secret ## existingPasswordSecret: "" ## @section Kafka chart parameters ## Kafka chart configuration ## https://github.com/bitnami/charts/blob/master/bitnami/kafka/values.yaml ## kafka: ## @param kafka.enabled Enable/disable Kafka chart installation ## enabled: false ## @param kafka.replicaCount Number of Kafka brokers ## replicaCount: 1 ## @param kafka.offsetsTopicReplicationFactor Kafka Secret Key ## offsetsTopicReplicationFactor: 1 ## Zookeeper chart configuration ## https://github.com/bitnami/charts/blob/master/bitnami/zookeeper/values.yaml ## @param kafka.zookeeper.replicaCount Number of Zookeeper replicas ## zookeeper: replicaCount: 1 ## External Kafka Configuration ## All of these values are ignored when kafka.enabled is set to true ## externalKafka: ## @param externalKafka.enabled Enable/disable external Kafka ## enabled: false ## @param externalKafka.brokers External Kafka brokers ## Multiple brokers can be provided in a comma separated list, e.g. host1:port1,host2:port2 ## brokers: localhost:9092 ## @param externalKafka.zkNodes External Zookeeper nodes ## zkNodes: localhost:2181
42.563943
180
0.727906
f276b2e707c6433460073c7a748b48d0775e2690
1,181
yaml
YAML
bitnami/discourse/Chart.yaml
00arthur00/charts
502aa1e64541669b732a4eda896e5937847b6c3c
[ "Apache-2.0" ]
null
null
null
bitnami/discourse/Chart.yaml
00arthur00/charts
502aa1e64541669b732a4eda896e5937847b6c3c
[ "Apache-2.0" ]
2
2022-01-26T01:14:30.000Z
2022-01-26T07:03:39.000Z
bitnami/discourse/Chart.yaml
00arthur00/charts
502aa1e64541669b732a4eda896e5937847b6c3c
[ "Apache-2.0" ]
null
null
null
annotations: category: Forum apiVersion: v2 appVersion: 2.8.1 dependencies: - condition: redis.enabled name: redis repository: https://charts.bitnami.com/bitnami version: 16.X.X - condition: postgresql.enabled name: postgresql repository: https://charts.bitnami.com/bitnami version: 11.X.X - name: common repository: https://charts.bitnami.com/bitnami tags: - bitnami-common version: 1.x.x description: Discourse is an open source discussion platform with built-in moderation and governance systems that let discussion communities protect themselves from bad actors even without official moderators. engine: gotpl home: https://github.com/bitnami/charts/tree/master/bitnami/discourse icon: https://bitnami.com/assets/stacks/discourse/img/discourse-stack-220x234.png keywords: - community - forum maintainers: - email: [email protected] name: Bitnami - email: [email protected] name: paulczar - email: [email protected] name: lucaprete name: discourse sources: - https://github.com/bitnami/bitnami-docker-discourse - https://github.com/spinnaker - https://www.discourse.org/ version: 7.0.3
30.282051
209
0.742591
c913ac6cb4ae244d2358e64a331f819a78a56458
997
yaml
YAML
bitnami/mediawiki/Chart.yaml
00arthur00/charts
502aa1e64541669b732a4eda896e5937847b6c3c
[ "Apache-2.0" ]
null
null
null
bitnami/mediawiki/Chart.yaml
00arthur00/charts
502aa1e64541669b732a4eda896e5937847b6c3c
[ "Apache-2.0" ]
2
2022-01-26T01:14:30.000Z
2022-01-26T07:03:39.000Z
bitnami/mediawiki/Chart.yaml
00arthur00/charts
502aa1e64541669b732a4eda896e5937847b6c3c
[ "Apache-2.0" ]
null
null
null
annotations: category: Wiki apiVersion: v2 appVersion: 1.37.1 dependencies: - condition: mariadb.enabled name: mariadb repository: https://charts.bitnami.com/bitnami tags: - mediawiki-database version: 10.x.x - name: common repository: https://charts.bitnami.com/bitnami tags: - bitnami-common version: 1.x.x description: MediaWiki is the free and open source wiki software that powers Wikipedia. Used by thousands of organizations, it is extremely powerful, scalable software and a feature-rich wiki implementation. engine: gotpl home: https://github.com/bitnami/charts/tree/master/bitnami/mediawiki icon: https://bitnami.com/assets/stacks/mediawiki/img/mediawiki-stack-220x234.png keywords: - mediawiki - wiki - http - web - application - php maintainers: - email: [email protected] name: Bitnami name: mediawiki sources: - https://github.com/bitnami/bitnami-docker-mediawiki - https://www.mediawiki.org/ version: 13.0.10
27.694444
207
0.734203
c9b40a4bd13bde12700765e67013eaa09527c6fa
708
yaml
YAML
bitnami/consul/Chart.yaml
00arthur00/charts
502aa1e64541669b732a4eda896e5937847b6c3c
[ "Apache-2.0" ]
null
null
null
bitnami/consul/Chart.yaml
00arthur00/charts
502aa1e64541669b732a4eda896e5937847b6c3c
[ "Apache-2.0" ]
null
null
null
bitnami/consul/Chart.yaml
00arthur00/charts
502aa1e64541669b732a4eda896e5937847b6c3c
[ "Apache-2.0" ]
null
null
null
annotations: category: DeveloperTools apiVersion: v2 appVersion: 1.11.4 dependencies: - name: common repository: https://charts.bitnami.com/bitnami tags: - bitnami-common version: 1.x.x description: HashiCorp Consul is a tool for discovering and configuring services in your infrastructure. engine: gotpl home: https://github.com/bitnami/charts/tree/master/bitnami/consul icon: https://bitnami.com/assets/stacks/consul/img/consul-stack-220x234.png keywords: - discovering - configuring - services maintainers: - email: [email protected] name: Bitnami name: consul sources: - https://github.com/bitnami/bitnami-docker-consul - https://www.consul.io/ version: 10.3.0
26.222222
104
0.748588
b517c79f59328d6beafedb7064cfddcdc339b865
36,210
yaml
YAML
bitnami/moodle/values.yaml
00arthur00/charts
502aa1e64541669b732a4eda896e5937847b6c3c
[ "Apache-2.0" ]
null
null
null
bitnami/moodle/values.yaml
00arthur00/charts
502aa1e64541669b732a4eda896e5937847b6c3c
[ "Apache-2.0" ]
2
2022-01-26T01:14:30.000Z
2022-01-26T07:03:39.000Z
bitnami/moodle/values.yaml
00arthur00/charts
502aa1e64541669b732a4eda896e5937847b6c3c
[ "Apache-2.0" ]
null
null
null
## @section Global parameters ## Global Docker image parameters ## Please, note that this will override the image parameters, including dependencies, configured to use the global value ## Current available global Docker image parameters: imageRegistry, imagePullSecrets and storageClass ## @param global.imageRegistry Global Docker image registry ## @param global.imagePullSecrets Global Docker registry secret names as an array ## @param global.storageClass Global StorageClass for Persistent Volume(s) ## global: imageRegistry: "" ## E.g. ## imagePullSecrets: ## - myRegistryKeySecretName ## imagePullSecrets: [] storageClass: "" ## @section Common parameters ## @param kubeVersion Force target Kubernetes version (using Helm capabilities if not set) ## kubeVersion: "" ## @param nameOverride String to partially override moodle.fullname template ## nameOverride: "" ## @param fullnameOverride String to fully override moodle.fullname template ## fullnameOverride: "" ## @param commonAnnotations Common annotations to add to all Harbor resources (sub-charts are not considered). Evaluated as a template ## commonAnnotations: {} ## @param commonLabels Common labels to add to all Harbor resources (sub-charts are not considered). Evaluated as a template ## commonLabels: {} ## @param extraDeploy Array with extra yaml to deploy with the chart. Evaluated as a template ## extraDeploy: [] ## @section Moodle&trade; parameters ## Bitnami Moodle&trade; image version ## ref: https://hub.docker.com/r/bitnami/moodle/tags/ ## @param image.registry Moodle image registry ## @param image.repository Moodle image repository ## @param image.tag Moodle image tag (immutable tags are recommended) ## @param image.pullPolicy Moodle image pull policy ## @param image.pullSecrets Specify docker-registry secret names as an array ## @param image.debug Specify if debug logs should be enabled ## image: registry: docker.io repository: bitnami/moodle tag: 3.11.6-debian-10-r2 ## Specify a imagePullPolicy ## Defaults to 'Always' if image tag is 'latest', else set to 'IfNotPresent' ## ref: https://kubernetes.io/docs/user-guide/images/#pre-pulling-images ## pullPolicy: IfNotPresent ## Optionally specify an array of imagePullSecrets. ## Secrets must be manually created in the namespace. ## ref: https://kubernetes.io/docs/tasks/configure-pod-container/pull-image-private-registry/ ## e.g: ## pullSecrets: ## - myRegistryKeySecretName ## pullSecrets: [] ## Set to true if you would like to see extra information on logs ## debug: false ## @param replicaCount Number of Moodle replicas (requires ReadWriteMany PVC support) ## replicaCount: 1 ## @param moodleSkipInstall Skip Moodle&trade; installation wizard. Useful for migrations and restoring from SQL dump ## ref: https://github.com/bitnami/bitnami-docker-moodle#configuration ## moodleSkipInstall: false ## @param moodleSiteName Site name ## ref: https://github.com/bitnami/bitnami-docker-moodle#configuration ## moodleSiteName: "" ## @param moodleUsername User of the application ## ref: https://github.com/bitnami/bitnami-docker-moodle#configuration ## moodleUsername: user ## @param moodlePassword Application password ## Defaults to a random 10-character alphanumeric string if not set ## ref: https://github.com/bitnami/bitnami-docker-moodle#configuration ## moodlePassword: "" ## @param moodleEmail Admin email ## ref: https://github.com/bitnami/bitnami-docker-moodle#configuration ## moodleEmail: [email protected] ## @param allowEmptyPassword Allow DB blank passwords ## ref: https://github.com/bitnami/bitnami-docker-moodle#environment-variables ## allowEmptyPassword: true ## @param command Override default container command (useful when using custom images) ## command: [] ## @param args Override default container args (useful when using custom images) ## args: [] ## @param updateStrategy.type Update strategy - only really applicable for deployments with RWO PVs attached ## If replicas = 1, an update can get "stuck", as the previous pod remains attached to the ## PV, and the "incoming" pod can never start. Changing the strategy to "Recreate" will ## terminate the single previous pod, so that the new, incoming pod can attach to the PV ## updateStrategy: type: RollingUpdate ## @param extraEnvVars An array to add extra env vars ## For example: ## - name: BEARER_AUTH ## value: true ## extraEnvVars: [] ## @param extraEnvVarsCM ConfigMap with extra environment variables ## extraEnvVarsCM: "" ## @param extraEnvVarsSecret Secret with extra environment variables (in case of sensitive data) ## extraEnvVarsSecret: "" ## @param extraVolumes Array of extra volumes to be added to the deployment (evaluated as template). Requires setting `extraVolumeMounts` ## extraVolumes: [] ## @param extraVolumeMounts Array of extra volume mounts to be added to the container (evaluated as template). Normally used with `extraVolumes`. ## extraVolumeMounts: [] ## @param initContainers Extra init containers to add to the deployment ## initContainers: [] ## @param sidecars Extra sidecar containers to add to the deployment ## sidecars: [] ## @param hostAliases Moodle&trade; pods host aliases ## https://kubernetes.io/docs/concepts/services-networking/add-entries-to-pod-etc-hosts-with-host-aliases/ ## hostAliases: [] ## @param tolerations Tolerations for pod assignment ## Ref: https://kubernetes.io/docs/concepts/configuration/taint-and-toleration/ ## tolerations: [] ## @param priorityClassName Moodle&trade; pods' priorityClassName ## priorityClassName: "" ## @param schedulerName Name of the k8s scheduler (other than default) ## ref: https://kubernetes.io/docs/tasks/administer-cluster/configure-multiple-schedulers/ ## schedulerName: "" ## @param topologySpreadConstraints Topology Spread Constraints for pod assignment ## https://kubernetes.io/docs/concepts/workloads/pods/pod-topology-spread-constraints/ ## The value is evaluated as a template ## topologySpreadConstraints: [] ## @param existingSecret Name of a secret with the application password ## existingSecret: "" ## SMTP mail delivery configuration ## ref: https://github.com/bitnami/bitnami-docker-moodle/#smtp-configuration ## @param smtpHost SMTP host ## @param smtpPort SMTP port ## @param smtpUser SMTP user ## @param smtpPassword SMTP password ## @param smtpProtocol SMTP Protocol (options: ssl,tls, nil) ## smtpHost: "" smtpPort: "" smtpUser: "" smtpPassword: "" smtpProtocol: "" ## @param containerPorts [object] Container ports ## containerPorts: http: 8080 https: 8443 ## @param sessionAffinity Control where client requests go, to the same pod or round-robin ## Values: ClientIP or None ## ref: https://kubernetes.io/docs/user-guide/services/ ## sessionAffinity: "None" ## Enable persistence using Persistent Volume Claims ## ref: https://kubernetes.io/docs/user-guide/persistent-volumes/ ## persistence: ## @param persistence.enabled Enable persistence using PVC ## enabled: true ## @param persistence.customStorageClass Create a custom storage class ## Requires persistence.enabled: true ## Requires persistence.storageClass: name ## ref: https://kubernetes.io/docs/concepts/storage/storage-classes/ ## E.g. ## provisioner: efs.csi.aws.com ## parameters: ## provisioningMode: efs-ap ## fileSystemId: fs-12345678 ## directoryPerms: "700" ## gidRangeStart: "1000" # optional ## gidRangeEnd: "2000" # optional ## customStorageClass: {} ## @param persistence.storageClass PVC Storage Class for Moodle ## If defined, storageClassName: <storageClass> ## If set to "-", storageClassName: "", which disables dynamic provisioning ## If undefined (the default) or set to null, no storageClassName spec is ## set, choosing the default provisioner. (gp2 on AWS, standard on ## GKE, AWS & OpenStack) ## storageClass: "" ## @param persistence.accessModes PVC Access Mode for Moodle ## Requires persistence.enabled: true ## If defined, and no customStorageClass is defined, then ## PVC must be created manually before volume will be bound ## accessModes: - ReadWriteOnce ## @param persistence.size PVC Storage Request for Moodle ## size: 8Gi ## @param persistence.existingClaim An Existing PVC name ## Requires persistence.enabled: true ## If defined, PVC must be created manually before volume will be bound ## existingClaim: "" ## @param persistence.hostPath Host mount path for Moodle ## Requires persistence.enabled: true ## Requires persistence.existingClaim: nil|false ## Default: nil. ## hostPath: "" ## @param persistence.annotations Persistent Volume Claim annotations ## annotations: {} ## @param podAffinityPreset Pod affinity preset ## ref: https://kubernetes.io/docs/concepts/scheduling-eviction/assign-pod-node/#inter-pod-affinity-and-anti-affinity ## Allowed values: soft, hard ## podAffinityPreset: "" ## @param podAntiAffinityPreset Pod anti-affinity preset ## Ref: https://kubernetes.io/docs/concepts/scheduling-eviction/assign-pod-node/#inter-pod-affinity-and-anti-affinity ## Allowed values: soft, hard ## podAntiAffinityPreset: soft ## Node affinity preset ## Ref: https://kubernetes.io/docs/concepts/scheduling-eviction/assign-pod-node/#node-affinity ## Allowed values: soft, hard ## nodeAffinityPreset: ## @param nodeAffinityPreset.type Node affinity type ## Allowed values: soft, hard ## type: "" ## @param nodeAffinityPreset.key Node label key to match ## E.g. ## key: "kubernetes.io/e2e-az-name" ## key: "" ## @param nodeAffinityPreset.values Node label values to match ## E.g. ## values: ## - e2e-az1 ## - e2e-az2 ## values: [] ## @param affinity Map of node/pod affinities ## Ref: https://kubernetes.io/docs/concepts/configuration/assign-pod-node/#affinity-and-anti-affinity ## Note: podAffinityPreset, podAntiAffinityPreset, and nodeAffinityPreset will be ignored when it's set ## affinity: {} ## @param nodeSelector Node labels for pod assignment ## ref: https://kubernetes.io/docs/user-guide/node-selection/ ## nodeSelector: {} ## Configure resource requests and limits ## ref: http://kubernetes.io/docs/user-guide/compute-resources/ ## @param resources.requests [object] CPU/Memory resource requests ## @param resources.limits CPU/Memory resource limits ## resources: requests: memory: 512Mi cpu: 300m limits: {} ## Configure Pods Security Context ## ref: https://kubernetes.io/docs/tasks/configure-pod-container/security-context/#set-the-security-context-for-a-pod ## @param podSecurityContext.enabled Enable Moodle&trade; pods' Security Context ## @param podSecurityContext.fsGroup Moodle&trade; pods' group ID ## podSecurityContext: enabled: true fsGroup: 1001 ## Configure Container Security Context (only main container) ## ref: https://kubernetes.io/docs/tasks/configure-pod-container/security-context/#set-the-security-context-for-a-container ## @param containerSecurityContext.enabled Enable Moodle&trade; containers' Security Context ## @param containerSecurityContext.runAsUser Moodle&trade; containers' Security Context runAsUser ## @param containerSecurityContext.runAsNonRoot Moodle&trade; containers' Security Context runAsNonRoot ## containerSecurityContext: enabled: true runAsUser: 1001 runAsNonRoot: true ## Configure extra options for liveness and readiness probes ## Moodle&trade; core exposes /user/login to unauthenticated requests, making it a good ## default liveness and readiness path. However, that may not always be the ## case. For example, if the image value is overridden to an image containing a ## module that alters that route, or an image that does not auto-install Moodle&trade;. ## ref: https://kubernetes.io/docs/tasks/configure-pod-container/configure-liveness-readiness-probes/#configure-probes ## @param startupProbe.enabled Enable startupProbe ## @param startupProbe.path Request path for startupProbe ## @param startupProbe.initialDelaySeconds Initial delay seconds for startupProbe ## @param startupProbe.periodSeconds Period seconds for startupProbe ## @param startupProbe.timeoutSeconds Timeout seconds for startupProbe ## @param startupProbe.failureThreshold Failure threshold for startupProbe ## @param startupProbe.successThreshold Success threshold for startupProbe ## startupProbe: enabled: false path: /login/index.php initialDelaySeconds: 600 periodSeconds: 10 timeoutSeconds: 5 failureThreshold: 6 successThreshold: 1 ## @param livenessProbe.enabled Enable livenessProbe ## @param livenessProbe.path Request path for livenessProbe ## @param livenessProbe.initialDelaySeconds Initial delay seconds for livenessProbe ## @param livenessProbe.periodSeconds Period seconds for livenessProbe ## @param livenessProbe.timeoutSeconds Timeout seconds for livenessProbe ## @param livenessProbe.failureThreshold Failure threshold for livenessProbe ## @param livenessProbe.successThreshold Success threshold for livenessProbe ## livenessProbe: enabled: true path: /login/index.php initialDelaySeconds: 600 periodSeconds: 10 timeoutSeconds: 5 failureThreshold: 6 successThreshold: 1 ## Configure extra options for readiness probe ## ref: https://kubernetes.io/docs/tasks/configure-pod-container/configure-liveness-readiness-probes/#configure-probes ## @param readinessProbe.enabled Enable readinessProbe ## @param readinessProbe.path Request path for readinessProbe ## @param readinessProbe.initialDelaySeconds Initial delay seconds for readinessProbe ## @param readinessProbe.periodSeconds Period seconds for readinessProbe ## @param readinessProbe.timeoutSeconds Timeout seconds for readinessProbe ## @param readinessProbe.failureThreshold Failure threshold for readinessProbe ## @param readinessProbe.successThreshold Success threshold for readinessProbe ## readinessProbe: enabled: true path: /login/index.php initialDelaySeconds: 30 periodSeconds: 5 timeoutSeconds: 3 failureThreshold: 6 successThreshold: 1 ## @param customStartupProbe Override default startup probe ## customStartupProbe: {} ## @param customLivenessProbe Override default liveness probe ## customLivenessProbe: {} ## @param customReadinessProbe Override default readiness probe ## customReadinessProbe: {} ## @param lifecycleHooks LifecycleHook to set additional configuration at startup Evaluated as a template ## lifecycleHooks: "" ## @param podAnnotations Pod annotations ## ref: https://kubernetes.io/docs/concepts/overview/working-with-objects/annotations/ ## podAnnotations: {} ## @param podLabels Add additional labels to the pod (evaluated as a template) ## ref: https://kubernetes.io/docs/concepts/overview/working-with-objects/labels/ ## podLabels: {} ## @section Traffic Exposure Parameters ## Kubernetes configuration ## For minikube, set this to NodePort, for ingress ClusterIP, elsewhere use LoadBalancer ## service: ## @param service.type Service type ## type: LoadBalancer ## @param service.ports.http Service HTTP port ## @param service.ports.https Service HTTPS port ## ports: http: 80 https: 443 ## @param service.nodePorts.http Kubernetes HTTP node port ## @param service.nodePorts.https Kubernetes HTTPS node port ## nodePorts: ## http: <to set explicitly, choose port between 30000-32767> ## https: <to set explicitly, choose port between 30000-32767> ## nodePorts: http: "" https: "" ## @param service.clusterIP Service Cluster IP ## clusterIP: "" ## @param service.loadBalancerSourceRanges Service load balancer source ranges ## Control hosts connecting to "LoadBalancer" only ## loadBalancerSourceRanges: ## - 0.0.0.0/0 ## loadBalancerSourceRanges: [] ## @param service.loadBalancerIP loadBalancerIP for the Moodle&trade; Service (optional, cloud specific) ## ref: https://kubernetes.io/docs/user-guide/services/#type-loadbalancer ## loadBalancerIP: "" ## @param service.externalTrafficPolicy Enable client source IP preservation ## ref https://kubernetes.io/docs/tasks/access-application-cluster/create-external-load-balancer/#preserving-the-client-source-ip ## externalTrafficPolicy: Cluster ## @param service.extraPorts Extra ports to expose (normally used with the `sidecar` value) ## extraPorts: [] ## @param service.annotations Additional custom annotations for Moodle&trade; service ## annotations: {} ## @param service.sessionAffinity Session Affinity for Kubernetes service, can be "None" or "ClientIP" ## If "ClientIP", consecutive client requests will be directed to the same Pod ## ref: https://kubernetes.io/docs/concepts/services-networking/service/#virtual-ips-and-service-proxies ## sessionAffinity: None ## @param service.sessionAffinityConfig Additional settings for the sessionAffinity ## sessionAffinityConfig: ## clientIP: ## timeoutSeconds: 300 ## sessionAffinityConfig: {} ## Configure the ingress resource that allows you to access the ## Moodle&trade; installation. Set up the URL ## ref: https://kubernetes.io/docs/user-guide/ingress/ ## ingress: ## @param ingress.enabled Set to true to enable ingress record generation ## enabled: false ## DEPRECATED: Use ingress.annotations instead of ingress.certManager ## certManager: false ## ## @param ingress.pathType Ingress Path type ## pathType: ImplementationSpecific ## @param ingress.apiVersion Override API Version (automatically detected if not set) ## apiVersion: "" ## @param ingress.hostname When the ingress is enabled, a host pointing to this will be created ## hostname: moodle.local ## @param ingress.path The Path to Moodle&trade;. You may need to set this to '/*' in order to use this with ALB ingress controllers. ## path: / ## @param ingress.annotations Additional annotations for the Ingress resource. To enable certificate autogeneration, place here your cert-manager annotations. ## For a full list of possible ingress annotations, please see ## ref: https://github.com/kubernetes/ingress-nginx/blob/master/docs/user-guide/nginx-configuration/annotations.md ## Use this parameter to set the required annotations for cert-manager, see ## ref: https://cert-manager.io/docs/usage/ingress/#supported-annotations ## ## e.g: ## annotations: ## kubernetes.io/ingress.class: nginx ## cert-manager.io/cluster-issuer: cluster-issuer-name ## annotations: {} ## @param ingress.tls Enable TLS configuration for the hostname defined at ingress.hostname parameter ## TLS certificates will be retrieved from a TLS secret with name: {{- printf "%s-tls" .Values.ingress.hostname }} ## You can use the ingress.secrets parameter to create this TLS secret or relay on cert-manager to create it ## tls: false ## @param ingress.extraHosts The list of additional hostnames to be covered with this ingress record. ## Most likely the hostname above will be enough, but in the event more hosts are needed, this is an array ## extraHosts: ## - name: minio.local ## path: / ## extraHosts: [] ## @param ingress.extraPaths Any additional arbitrary paths that may need to be added to the ingress under the main host. ## For example: The ALB ingress controller requires a special rule for handling SSL redirection. ## extraPaths: ## - path: /* ## backend: ## serviceName: ssl-redirect ## servicePort: use-annotation ## extraPaths: [] ## @param ingress.extraTls The tls configuration for additional hostnames to be covered with this ingress record. ## see: https://kubernetes.io/docs/concepts/services-networking/ingress/#tls ## extraTls: ## - hosts: ## - minio.local ## secretName: minio.local-tls ## extraTls: [] ## @param ingress.secrets If you're providing your own certificates, please use this to add the certificates as secrets ## key and certificate should start with -----BEGIN CERTIFICATE----- or ## -----BEGIN RSA PRIVATE KEY----- ## ## name should line up with a tlsSecret set further up ## If you're using cert-manager, this is unneeded, as it will create the secret for you if it is not set ## ## It is also possible to create and manage the certificates outside of this helm chart ## Please see README.md for more information ## e.g: ## - name: minio.local-tls ## key: ## certificate: ## secrets: [] ## @param ingress.ingressClassName IngressClass that will be be used to implement the Ingress (Kubernetes 1.18+) ## This is supported in Kubernetes 1.18+ and required if you have more than one IngressClass marked as the default for your cluster . ## ref: https://kubernetes.io/blog/2020/04/02/improvements-to-the-ingress-api-in-kubernetes-1.18/ ## ingressClassName: "" ## @section Database parameters ## MariaDB chart configuration ## https://github.com/bitnami/charts/blob/master/bitnami/mariadb/values.yaml ## mariadb: ## @param mariadb.enabled Whether to deploy a mariadb server to satisfy the applications database requirements ## To use an external database set this to false and configure the externalDatabase parameters ## enabled: true ## @param mariadb.architecture MariaDB architecture (`standalone` or `replication`) ## architecture: standalone ## MariaDB Authentication parameters ## auth: ## @param mariadb.auth.rootPassword Password for the MariaDB `root` user ## ref: https://github.com/bitnami/bitnami-docker-mariadb#setting-the-root-password-on-first-run ## rootPassword: "" ## @param mariadb.auth.database Database name to create ## ref: https://github.com/bitnami/bitnami-docker-mariadb/blob/master/README.md#creating-a-database-on-first-run ## database: bitnami_moodle ## @param mariadb.auth.username Database user to create ## ref: https://github.com/bitnami/bitnami-docker-mariadb/blob/master/README.md#creating-a-database-user-on-first-run ## username: bn_moodle ## @param mariadb.auth.password Password for the database ## password: "" primary: ## Enable persistence using Persistent Volume Claims ## ref: https://kubernetes.io/docs/user-guide/persistent-volumes/ ## persistence: ## @param mariadb.primary.persistence.enabled Enable database persistence using PVC ## enabled: true ## @param mariadb.primary.persistence.storageClass MariaDB primary persistent volume storage Class ## If defined, storageClassName: <storageClass> ## If set to "-", storageClassName: "", which disables dynamic provisioning ## If undefined (the default) or set to null, no storageClassName spec is ## set, choosing the default provisioner. (gp2 on AWS, standard on ## GKE, AWS & OpenStack) ## storageClass: "" ## @param mariadb.primary.persistence.accessModes PVC Access Modes for Moodle&trade; volume ## accessModes: - ReadWriteOnce ## @param mariadb.primary.persistence.size Database Persistent Volume Size ## size: 8Gi ## @param mariadb.primary.persistence.hostPath Set path in case you want to use local host path volumes (not recommended in production) ## hostPath: "" ## @param mariadb.primary.persistence.existingClaim Name of an existing `PersistentVolumeClaim` for MariaDB primary replicas ## existingClaim: "" ## External database configuration ## externalDatabase: ## @param externalDatabase.type Type of the existing database ## type: "" ## @param externalDatabase.host Host of the existing database ## host: "" ## @param externalDatabase.port Port of the existing database ## port: 3306 ## @param externalDatabase.user Existing username in the external db ## user: bn_moodle ## @param externalDatabase.password Password for the above username ## password: "" ## @param externalDatabase.database Name of the existing database ## database: bitnami_moodle ## @param externalDatabase.existingSecret Name of an existing secret resource containing the DB password ## existingSecret: "" ## @section Volume Permissions parameters ## Init containers parameters: ## volumePermissions: Change the owner and group of the persistent volume mountpoint to runAsUser:fsGroup values from the securityContext section. ## volumePermissions: ## @param volumePermissions.enabled Enable init container that changes volume permissions in the data directory (for cases where the default k8s `runAsUser` and `fsUser` values do not work) ## enabled: false ## @param volumePermissions.image.registry Init container volume-permissions image registry ## @param volumePermissions.image.repository Init container volume-permissions image repository ## @param volumePermissions.image.tag Init container volume-permissions image tag (immutable tags are recommended) ## @param volumePermissions.image.pullPolicy Init container volume-permissions image pull policy ## @param volumePermissions.image.pullSecrets Specify docker-registry secret names as an array ## image: registry: docker.io repository: bitnami/bitnami-shell tag: 10-debian-10-r366 pullPolicy: IfNotPresent ## Optionally specify an array of imagePullSecrets. ## Secrets must be manually created in the namespace. ## ref: https://kubernetes.io/docs/tasks/configure-pod-container/pull-image-private-registry/ ## pullSecrets: [] ## - myRegistryKeySecretName ## Init containers' resource requests and limits ## ref: https://kubernetes.io/docs/user-guide/compute-resources/ ## We usually recommend not to specify default resources and to leave this as a conscious ## choice for the user. This also increases chances charts run on environments with little ## resources, such as Minikube. If you do want to specify resources, uncomment the following ## lines, adjust them as necessary, and remove the curly braces after 'resources:'. ## @param volumePermissions.resources.limits The resources limits for the container ## @param volumePermissions.resources.requests The requested resources for the container ## resources: ## Example: ## limits: ## cpu: 100m ## memory: 128Mi limits: {} ## Examples: ## requests: ## cpu: 100m ## memory: 128Mi requests: {} ## @section Metrics parameters metrics: ## @param metrics.enabled Start a side-car prometheus exporter ## enabled: false ## @param metrics.image.registry Apache exporter image registry ## @param metrics.image.repository Apache exporter image repository ## @param metrics.image.tag Apache exporter image tag (immutable tags are recommended) ## @param metrics.image.pullPolicy Image pull policy ## @param metrics.image.pullSecrets Specify docker-registry secret names as an array ## image: registry: docker.io repository: bitnami/apache-exporter tag: 0.11.0-debian-10-r85 pullPolicy: IfNotPresent ## Optionally specify an array of imagePullSecrets. ## Secrets must be manually created in the namespace. ## ref: https://kubernetes.io/docs/tasks/configure-pod-container/pull-image-private-registry/ ## e.g: ## pullSecrets: ## - myRegistryKeySecretName ## pullSecrets: [] ## Prometheus Exporter service configuration ## service: ## @param metrics.service.type Prometheus metrics service type ## type: LoadBalancer ## @param metrics.service.port Prometheus metrics service port ## port: 9117 ## @param metrics.service.loadBalancerIP Load Balancer IP if the Prometheus metrics server type is `LoadBalancer`, otherwise leave blank ## loadBalancerIP: "" ## @param metrics.service.loadBalancerSourceRanges Prometheus metrics service service Load Balancer sources ## ref: https://kubernetes.io/docs/tasks/access-application-cluster/configure-cloud-provider-firewall/#restrict-access-for-loadbalancer-service ## e.g: ## loadBalancerSourceRanges: ## - 10.10.10.0/24 ## loadBalancerSourceRanges: [] ## @param metrics.service.clusterIP Prometheus metrics service Cluster IP ## e.g.: ## clusterIP: None ## clusterIP: "" ## @param metrics.service.externalTrafficPolicy Prometheus metrics service service external traffic policy ## ref http://kubernetes.io/docs/tasks/access-application-cluster/create-external-load-balancer/#preserving-the-client-source-ip ## externalTrafficPolicy: Cluster ## @param metrics.service.annotations [object] Annotations for Prometheus Exporter pods. Evaluated as a template. ## ref: https://kubernetes.io/docs/concepts/overview/working-with-objects/annotations/ ## annotations: prometheus.io/scrape: "true" prometheus.io/port: "{{ .Values.metrics.service.port }}" ## @param metrics.service.sessionAffinity Session Affinity for Kubernetes service, can be "None" or "ClientIP" ## If "ClientIP", consecutive client requests will be directed to the same Pod ## ref: https://kubernetes.io/docs/concepts/services-networking/service/#virtual-ips-and-service-proxies ## sessionAffinity: None ## @param metrics.service.sessionAffinityConfig Additional settings for the sessionAffinity ## sessionAffinityConfig: ## clientIP: ## timeoutSeconds: 300 ## sessionAffinityConfig: {} ## @param metrics.resources Exporter resource requests/limit ## ref: https://kubernetes.io/docs/user-guide/compute-resources/ ## resources: {} ## @param metrics.podAnnotations [object] Metrics exporter pod Annotation and Labels ## podAnnotations: prometheus.io/scrape: "true" prometheus.io/port: "{{ .Values.metrics.service.port }}" ## @section Certificate injection parameters ## Add custom certificates and certificate authorities to Moodle&trade; container ## certificates: ## @param certificates.customCertificate.certificateSecret Secret containing the certificate and key to add ## @param certificates.customCertificate.chainSecret.name Name of the secret containing the certificate chain ## @param certificates.customCertificate.chainSecret.key Key of the certificate chain file inside the secret ## @param certificates.customCertificate.certificateLocation Location in the container to store the certificate ## @param certificates.customCertificate.keyLocation Location in the container to store the private key ## @param certificates.customCertificate.chainLocation Location in the container to store the certificate chain ## customCertificate: certificateSecret: "" chainSecret: name: "" key: "" certificateLocation: /etc/ssl/certs/ssl-cert-snakeoil.pem keyLocation: /etc/ssl/private/ssl-cert-snakeoil.key chainLocation: /etc/ssl/certs/mychain.pem ## @param certificates.customCAs Defines a list of secrets to import into the container trust store ## customCAs: [] ## @param certificates.command Override default container command (useful when using custom images) ## command: [] ## @param certificates.args Override default container args (useful when using custom images) ## e.g: ## - secret: custom-CA ## - secret: more-custom-CAs ## args: [] ## @param certificates.extraEnvVars Container sidecar extra environment variables (eg proxy) ## extraEnvVars: [] ## @param certificates.extraEnvVarsCM ConfigMap with extra environment variables ## extraEnvVarsCM: "" ## @param certificates.extraEnvVarsSecret Secret with extra environment variables ## extraEnvVarsSecret: "" ## @param certificates.image.registry Container sidecar registry ## @param certificates.image.repository Container sidecar image repository ## @param certificates.image.tag Container sidecar image tag (immutable tags are recommended) ## @param certificates.image.pullPolicy Container sidecar image pull policy ## @param certificates.image.pullSecrets Container sidecar image pull secrets ## image: registry: docker.io repository: bitnami/bitnami-shell tag: 10-debian-10-r366 ## Specify a imagePullPolicy ## Defaults to 'Always' if image tag is 'latest', else set to 'IfNotPresent' ## ref: https://kubernetes.io/docs/user-guide/images/#pre-pulling-images ## pullPolicy: IfNotPresent ## Optionally specify an array of imagePullSecrets. ## Secrets must be manually created in the namespace. ## ref: https://kubernetes.io/docs/tasks/configure-pod-container/pull-image-private-registry/ ## e.g: ## pullSecrets: ## - myRegistryKeySecretName ## pullSecrets: [] ## @section NetworkPolicy parameters ## Add networkpolicies ## networkPolicy: ## @param networkPolicy.enabled Enable network policies ## If ingress.enabled or metrics.enabled are true, configure networkPolicy.ingress and networkPolicy.metrics selectors respectively to allow communication ## enabled: false ## @param networkPolicy.metrics.enabled Enable network policy for metrics (prometheus) ## @param networkPolicy.metrics.namespaceSelector Monitoring namespace selector labels. These labels will be used to identify the prometheus' namespace. ## @param networkPolicy.metrics.podSelector Monitoring pod selector labels. These labels will be used to identify the Prometheus pods. ## metrics: enabled: false ## e.g: ## podSelector: ## label: monitoring ## podSelector: {} ## e.g: ## namespaceSelector: ## label: monitoring ## namespaceSelector: {} ## @param networkPolicy.ingress.enabled Enable network policy for Ingress Proxies ## @param networkPolicy.ingress.namespaceSelector Ingress Proxy namespace selector labels. These labels will be used to identify the Ingress Proxy's namespace. ## @param networkPolicy.ingress.podSelector Ingress Proxy pods selector labels. These labels will be used to identify the Ingress Proxy pods. ## ingress: enabled: false ## e.g: ## podSelector: ## label: ingress ## podSelector: {} ## e.g: ## namespaceSelector: ## label: ingress ## namespaceSelector: {} ## @param networkPolicy.ingressRules.backendOnlyAccessibleByFrontend Enable ingress rule that makes the backend (mariadb) only accessible by Moodle's pods. ## @param networkPolicy.ingressRules.customBackendSelector Backend selector labels. These labels will be used to identify the backend pods. ## @param networkPolicy.ingressRules.accessOnlyFrom.enabled Enable ingress rule that makes Moodle only accessible from a particular origin ## @param networkPolicy.ingressRules.accessOnlyFrom.namespaceSelector Namespace selector label that is allowed to access Moodle. This label will be used to identified the allowed namespace(s). ## @param networkPolicy.ingressRules.accessOnlyFrom.podSelector Pods selector label that is allowed to access Moodle. This label will be used to identified the allowed pod(s). ## @param networkPolicy.ingressRules.customRules Custom network policy ingress rule ## ingressRules: ## mariadb backend only can be accessed from Moodle ## backendOnlyAccessibleByFrontend: false customBackendSelector: {} ## Allow only from the indicated: ## accessOnlyFrom: enabled: false ## e.g: ## namespaceSelector: ## label: ingress ## namespaceSelector: {} ## e.g: ## podSelector: ## label: access ## podSelector: {} ## custom ingress rules ## e.g: ## customRules: ## - from: ## - namespaceSelector: ## matchLabels: ## label: example ## customRules: {} ## @param networkPolicy.egressRules.denyConnectionsToExternal Enable egress rule that denies outgoing traffic outside the cluster, except for DNS (port 53). ## @param networkPolicy.egressRules.customRules Custom network policy rule ## egressRules: ## Deny connections to external. This is not compatible with an external database. ## denyConnectionsToExternal: false ## Additional custom egress rules ## e.g: ## customRules: ## - to: ## - namespaceSelector: ## matchLabels: ## label: example ## customRules: {}
40.503356
194
0.738691
65635de6d8f1eea5bab48c0dde8c708ad2ad8363
878
yaml
YAML
bitnami/moodle/Chart.yaml
00arthur00/charts
502aa1e64541669b732a4eda896e5937847b6c3c
[ "Apache-2.0" ]
null
null
null
bitnami/moodle/Chart.yaml
00arthur00/charts
502aa1e64541669b732a4eda896e5937847b6c3c
[ "Apache-2.0" ]
2
2022-01-26T01:14:30.000Z
2022-01-26T07:03:39.000Z
bitnami/moodle/Chart.yaml
00arthur00/charts
502aa1e64541669b732a4eda896e5937847b6c3c
[ "Apache-2.0" ]
null
null
null
annotations: category: E-Learning apiVersion: v2 appVersion: 3.11.6 dependencies: - condition: mariadb.enabled name: mariadb repository: https://charts.bitnami.com/bitnami version: 10.x.x - name: common repository: https://charts.bitnami.com/bitnami version: 1.x.x description: Moodle(TM) LMS is an open source online Learning Management System widely used at universities, schools, and corporations. It is modular and highly adaptable to any type of online learning. engine: gotpl home: https://github.com/bitnami/charts/tree/master/bitnami/moodle icon: https://bitnami.com/assets/stacks/moodle/img/moodle-stack-220x234.png keywords: - moodle - learning - php maintainers: - email: [email protected] name: Bitnami name: moodle sources: - https://github.com/bitnami/bitnami-docker-moodle - https://www.moodle.org/ version: 12.1.12
30.275862
202
0.748292
5a3da1028462339ff5149afa80f3fb8e978dca90
84,266
yaml
YAML
bitnami/elasticsearch/values.yaml
00arthur00/charts
502aa1e64541669b732a4eda896e5937847b6c3c
[ "Apache-2.0" ]
null
null
null
bitnami/elasticsearch/values.yaml
00arthur00/charts
502aa1e64541669b732a4eda896e5937847b6c3c
[ "Apache-2.0" ]
2
2022-01-26T01:14:30.000Z
2022-01-26T07:03:39.000Z
bitnami/elasticsearch/values.yaml
00arthur00/charts
502aa1e64541669b732a4eda896e5937847b6c3c
[ "Apache-2.0" ]
null
null
null
## @section Global parameters ## Global Docker image parameters ## Please, note that this will override the image parameters, including dependencies, configured to use the global value ## Current available global Docker image parameters: imageRegistry, imagePullSecrets and storageClass ## @param global.imageRegistry Global Docker image registry ## @param global.imagePullSecrets Global Docker registry secret names as an array ## @param global.storageClass Global StorageClass for Persistent Volume(s) ## @param global.coordinating.name Coordinating name to be used in the Kibana subchart (service name) ## @param global.kibanaEnabled Whether or not to enable Kibana ## global: imageRegistry: "" ## E.g. ## imagePullSecrets: ## - myRegistryKeySecretName ## imagePullSecrets: [] storageClass: "" coordinating: name: coordinating-only kibanaEnabled: false ## @section Common parameters ## @param nameOverride String to partially override common.names.fullname template (will maintain the release name) ## nameOverride: "" ## @param fullnameOverride String to fully override common.names.fullname template ## fullnameOverride: "" ## @param clusterDomain Kubernetes cluster domain ## clusterDomain: cluster.local ## @param extraDeploy Array of extra objects to deploy with the release ## extraDeploy: [] ## Enable diagnostic mode in the deployment ## diagnosticMode: ## @param diagnosticMode.enabled Enable diagnostic mode (all probes will be disabled and the command will be overridden) ## enabled: false ## @param diagnosticMode.command Command to override all containers in the deployment ## command: - sleep ## @param diagnosticMode.args Args to override all containers in the deployment ## args: - infinity ## @section Elasticsearch parameters ## Bitnami Elasticsearch image version ## ref: https://hub.docker.com/r/bitnami/elasticsearch/tags/ ## @param image.registry Elasticsearch image registry ## @param image.repository Elasticsearch image repository ## @param image.tag Elasticsearch image tag (immutable tags are recommended) ## @param image.pullPolicy Elasticsearch image pull policy ## @param image.pullSecrets Elasticsearch image pull secrets ## @param image.debug Enable image debug mode ## image: registry: docker.io repository: bitnami/elasticsearch tag: 7.17.1-debian-10-r9 ## Specify a imagePullPolicy ## Defaults to 'Always' if image tag is 'latest', else set to 'IfNotPresent' ## ref: https://kubernetes.io/docs/user-guide/images/#pre-pulling-images ## pullPolicy: IfNotPresent ## Optionally specify an array of imagePullSecrets. ## Secrets must be manually created in the namespace. ## ref: https://kubernetes.io/docs/tasks/configure-pod-container/pull-image-private-registry/ ## e.g: ## pullSecrets: ## - myRegistryKeySecretName ## pullSecrets: [] ## Set to true if you would like to see extra information on logs ## debug: false ## X-Pack security parameters ## Note: TLS configuration is required in order to configure password authentication ## security: ## @param security.enabled Enable X-Pack Security settings ## enabled: false ## @param security.elasticPassword Password for 'elastic' user ## Ref: https://github.com/bitnami/bitnami-docker-elasticsearch#security ## elasticPassword: "" ## @param security.existingSecret Name of the existing secret containing the Elasticsearch password ## existingSecret: "" ## FIPS mode ## @param security.fipsMode Configure elasticsearch with FIPS 140 compliant mode ## Ref: https://www.elastic.co/guide/en/elasticsearch/reference/current/fips-140-compliance.html ## fipsMode: false ## TLS configuration ## tls: ## @param security.tls.restEncryption Enable SSL/TLS encryption for Elasticsearch REST API. ## restEncryption: true ## @param security.tls.autoGenerated Create self-signed TLS certificates. ## Note: Currently only supports PEM certificates. ## autoGenerated: false ## @param security.tls.verificationMode Verification mode for SSL communications. ## Supported values: full, certificate, none. ## Ref: https://www.elastic.co/guide/en/elasticsearch/reference/current/security-settings.html ## verificationMode: "full" ## @param security.tls.master.existingSecret Existing secret containing the certificates for the master nodes ## @param security.tls.data.existingSecret Existing secret containing the certificates for the data nodes ## @param security.tls.ingest.existingSecret Existing secret containing the certificates for the ingest nodes ## @param security.tls.coordinating.existingSecret Existing secret containing the certificates for the coordinating nodes ## master: existingSecret: "" data: existingSecret: "" ingest: existingSecret: "" coordinating: existingSecret: "" ## @param security.tls.keystorePassword Password to access the JKS/PKCS12 keystore or PEM key when they are password-protected. ## keystorePassword: "" ## @param security.tls.truststorePassword Password to access the JKS/PKCS12 truststore when they are password-protected. ## truststorePassword: "" ## @param security.tls.keystoreFilename Name of the keystore file ## keystoreFilename: elasticsearch.keystore.jks ## @param security.tls.truststoreFilename Name of the truststore ## truststoreFilename: elasticsearch.truststore.jks ## @param security.tls.usePemCerts Use this variable if your secrets contain PEM certificates instead of JKS/PKCS12 ## Ignored when using autoGenerated certs. ## usePemCerts: false ## @param security.tls.keyPassword Password to access the PEM key when they are password-protected. ## keyPassword: "" ## Elasticsearch cluster name ## @param name Elasticsearch cluster name ## name: elastic ## @param plugins Comma, semi-colon or space separated list of plugins to install at initialization ## ref: https://github.com/bitnami/bitnami-docker-elasticsearch#environment-variables ## plugins: "" ## @param snapshotRepoPath File System snapshot repository path ## ref: https://github.com/bitnami/bitnami-docker-elasticsearch#environment-variables ## snapshotRepoPath: "" ## @param config Override elasticsearch configuration ## config: {} ## @param extraConfig Append extra configuration to the elasticsearch node configuration ## Use this instead of `config` to add more configuration ## See below example: ## extraConfig: ## node: ## store: ## allow_mmap: false ## ref: https://www.elastic.co/guide/en/elasticsearch/reference/current/settings.html ## extraConfig: {} ## @param extraVolumes A list of volumes to be added to the pod ## Example Use Case: mount ssl certificates when elasticsearch has tls enabled ## extraVolumes: ## - name: es-certs ## secret: ## defaultMode: 420 ## secretName: es-certs extraVolumes: [] ## @param extraVolumeMounts A list of volume mounts to be added to the pod ## extraVolumeMounts: ## - name: es-certs ## mountPath: /certs ## readOnly: true extraVolumeMounts: [] ## @param initScripts Dictionary of init scripts. Evaluated as a template. ## Specify dictionary of scripts to be run at first boot ## Alternatively, you can put your scripts under the files/docker-entrypoint-initdb.d directory ## For example: ## initScripts: ## my_init_script.sh: | ## #!/bin/sh ## echo "Do something." ## initScripts: {} ## @param initScriptsCM ConfigMap with the init scripts. Evaluated as a template. ## Note: This will override initScripts ## initScriptsCM: "" ## @param initScriptsSecret Secret containing `/docker-entrypoint-initdb.d` scripts to be executed at initialization time that contain sensitive data. Evaluated as a template. ## initScriptsSecret: "" ## @param extraEnvVars Array containing extra env vars to be added to all pods (evaluated as a template) ## For example: ## extraEnvVars: ## - name: MY_ENV_VAR ## value: env_var_value ## extraEnvVars: [] ## @param extraEnvVarsConfigMap ConfigMap containing extra env vars to be added to all pods (evaluated as a template) ## extraEnvVarsConfigMap: "" ## @param extraEnvVarsSecret Secret containing extra env vars to be added to all pods (evaluated as a template) ## extraEnvVarsSecret: "" ## @section Master parameters ## Elasticsearch master-eligible node parameters ## master: ## @param master.name Master-eligible node pod name ## name: master ## @param master.fullnameOverride String to fully override elasticsearch.master.fullname template with a string ## fullnameOverride: "" ## @param master.replicas Desired number of Elasticsearch master-eligible nodes. Consider using an odd number of master nodes to prevent "split brain" situation. See: https://www.elastic.co/guide/en/elasticsearch/reference/7.x/modules-discovery-voting.html ## https://www.elastic.co/guide/en/elasticsearch/reference/7.x/modules-discovery-voting.html#_even_numbers_of_master_eligible_nodes ## https://www.elastic.co/guide/en/elasticsearch/reference/7.x/modules-discovery-quorums.html#modules-discovery-quorums ## replicas: 3 ## Update strategy for ElasticSearch master statefulset ## ref: https://kubernetes.io/docs/concepts/workloads/controllers/statefulset/#update-strategies ## @param master.updateStrategy.type Update strategy for Master statefulset ## updateStrategy: type: RollingUpdate ## @param master.hostAliases Add deployment host aliases ## https://kubernetes.io/docs/concepts/services-networking/add-entries-to-pod-etc-hosts-with-host-aliases/ ## hostAliases: [] ## @param master.schedulerName Name of the k8s scheduler (other than default) ## ref: https://kubernetes.io/docs/tasks/administer-cluster/configure-multiple-schedulers/ ## schedulerName: "" ## ## @param master.heapSize Master-eligible node heap size ## heapSize: 128m ## @param master.podAnnotations Annotations for master-eligible pods. ## podAnnotations: {} ## @param master.podLabels Extra labels to add to Pod ## podLabels: {} ## Pod Security Context for master-eligible pods. ## ref: https://kubernetes.io/docs/tasks/configure-pod-container/security-context/ ## @param master.securityContext.enabled Enable security context for master-eligible pods ## @param master.securityContext.fsGroup Group ID for the container for master-eligible pods ## @param master.securityContext.runAsUser User ID for the container for master-eligible pods ## securityContext: enabled: true fsGroup: 1001 runAsUser: 1001 ## Pod Security Context for master-eligible pods. ## ref: https://kubernetes.io/docs/tasks/configure-pod-container/security-context/ ## @param master.podSecurityContext.enabled Enable security context for master-eligible pods ## @param master.podSecurityContext.fsGroup Group ID for the container for master-eligible pods ## podSecurityContext: enabled: false fsGroup: 1001 ## Container Security Context for master-eligible pods. ## ref: https://kubernetes.io/docs/tasks/configure-pod-container/security-context/ ## @param master.containerSecurityContext.enabled Enable security context for master-eligible pods ## @param master.containerSecurityContext.runAsUser User ID for the container for master-eligible pods ## containerSecurityContext: enabled: false runAsUser: 1001 ## @param master.podAffinityPreset Master-eligible Pod affinity preset. Ignored if `affinity` is set. Allowed values: `soft` or `hard` ## ref: https://kubernetes.io/docs/concepts/scheduling-eviction/assign-pod-node/#inter-pod-affinity-and-anti-affinity ## podAffinityPreset: "" ## @param master.podAntiAffinityPreset Master-eligible Pod anti-affinity preset. Ignored if `affinity` is set. Allowed values: `soft` or `hard` ## Ref: https://kubernetes.io/docs/concepts/scheduling-eviction/assign-pod-node/#inter-pod-affinity-and-anti-affinity ## podAntiAffinityPreset: "" ## Node affinity preset. Allowed values: soft, hard ## Ref: https://kubernetes.io/docs/concepts/scheduling-eviction/assign-pod-node/#node-affinity ## @param master.nodeAffinityPreset.type Master-eligible Node affinity preset type. Ignored if `affinity` is set. Allowed values: `soft` or `hard` ## @param master.nodeAffinityPreset.key Master-eligible Node label key to match Ignored if `affinity` is set. ## @param master.nodeAffinityPreset.values Master-eligible Node label values to match. Ignored if `affinity` is set. ## nodeAffinityPreset: type: "" ## E.g. ## key: "kubernetes.io/e2e-az-name" ## key: "" ## E.g. ## values: ## - e2e-az1 ## - e2e-az2 ## values: [] ## @param master.affinity Master-eligible Affinity for pod assignment ## Ref: https://kubernetes.io/docs/concepts/configuration/assign-pod-node/#affinity-and-anti-affinity ## Note: podAffinityPreset, podAntiAffinityPreset, and nodeAffinityPreset will be ignored when it's set ## affinity: {} ## @param master.priorityClassName Master pods Priority Class Name ## ref: https://kubernetes.io/docs/concepts/configuration/pod-priority-preemption/#priorityclass ## priorityClassName: "" ## @param master.nodeSelector Master-eligible Node labels for pod assignment ## Ref: https://kubernetes.io/docs/user-guide/node-selection/ ## nodeSelector: {} ## @param master.tolerations Master-eligible Tolerations for pod assignment ## Ref: https://kubernetes.io/docs/concepts/configuration/taint-and-toleration/ ## tolerations: [] ## @param master.topologySpreadConstraints Topology Spread Constraints for pod assignment spread across your cluster among failure-domains. Evaluated as a template ## Ref: https://kubernetes.io/docs/concepts/workloads/pods/pod-topology-spread-constraints/#spread-constraints-for-pods ## topologySpreadConstraints: [] ## Elasticsearch master-eligible container's resource requests and limits ## ref: https://kubernetes.io/docs/user-guide/compute-resources/ ## We usually recommend not to specify default resources and to leave this as a conscious ## choice for the user. This also increases chances charts run on environments with little ## resources, such as Minikube. If you do want to specify resources, uncomment the following ## lines, adjust them as necessary, and remove the curly braces after 'resources:'. ## @param master.resources.limits The resources limits for the container ## @param master.resources.requests [object] The requested resources for the container ## resources: ## Example: ## limits: ## cpu: 100m ## memory: 128Mi limits: {} requests: cpu: 25m memory: 256Mi ## Elasticsearch master-eligible container's startup probe ## ref: https://kubernetes.io/docs/concepts/workloads/pods/pod-lifecycle/#container-probes ## @param master.startupProbe.enabled Enable/disable the startup probe (master nodes pod) ## @param master.startupProbe.initialDelaySeconds Delay before startup probe is initiated (master nodes pod) ## @param master.startupProbe.periodSeconds How often to perform the probe (master nodes pod) ## @param master.startupProbe.timeoutSeconds When the probe times out (master nodes pod) ## @param master.startupProbe.successThreshold Minimum consecutive successes for the probe to be considered successful after having failed (master nodes pod) ## @param master.startupProbe.failureThreshold Minimum consecutive failures for the probe to be considered failed after having succeeded ## startupProbe: enabled: false initialDelaySeconds: 90 periodSeconds: 10 timeoutSeconds: 5 successThreshold: 1 failureThreshold: 5 ## Elasticsearch master-eligible container's liveness probe ## ref: https://kubernetes.io/docs/concepts/workloads/pods/pod-lifecycle/#container-probes ## @param master.livenessProbe.enabled Enable/disable the liveness probe (master-eligible nodes pod) ## @param master.livenessProbe.initialDelaySeconds Delay before liveness probe is initiated (master-eligible nodes pod) ## @param master.livenessProbe.periodSeconds How often to perform the probe (master-eligible nodes pod) ## @param master.livenessProbe.timeoutSeconds When the probe times out (master-eligible nodes pod) ## @param master.livenessProbe.successThreshold Minimum consecutive successes for the probe to be considered successful after having failed (master-eligible nodes pod) ## @param master.livenessProbe.failureThreshold Minimum consecutive failures for the probe to be considered failed after having succeeded ## livenessProbe: enabled: true initialDelaySeconds: 90 periodSeconds: 10 timeoutSeconds: 5 successThreshold: 1 failureThreshold: 5 ## Elasticsearch master-eligible container's readiness probe ## ref: https://kubernetes.io/docs/concepts/workloads/pods/pod-lifecycle/#container-probes ## @param master.readinessProbe.enabled Enable/disable the readiness probe (master-eligible nodes pod) ## @param master.readinessProbe.initialDelaySeconds Delay before readiness probe is initiated (master-eligible nodes pod) ## @param master.readinessProbe.periodSeconds How often to perform the probe (master-eligible nodes pod) ## @param master.readinessProbe.timeoutSeconds When the probe times out (master-eligible nodes pod) ## @param master.readinessProbe.successThreshold Minimum consecutive successes for the probe to be considered successful after having failed (master-eligible nodes pod) ## @param master.readinessProbe.failureThreshold Minimum consecutive failures for the probe to be considered failed after having succeeded ## readinessProbe: enabled: true initialDelaySeconds: 90 periodSeconds: 10 timeoutSeconds: 5 successThreshold: 1 failureThreshold: 5 ## @param master.customStartupProbe Override default startup probe ## customStartupProbe: {} ## @param master.customLivenessProbe Override default liveness probe ## customLivenessProbe: {} ## @param master.customReadinessProbe Override default readiness probe ## customReadinessProbe: {} ## @param master.initContainers Extra init containers to add to the Elasticsearch master-eligible pod(s) ## initContainers: [] ## @param master.sidecars Extra sidecar containers to add to the Elasticsearch master-eligible pod(s) ## sidecars: [] ## Enable persistence using Persistent Volume Claims ## ref: https://kubernetes.io/docs/user-guide/persistent-volumes/ ## persistence: ## @param master.persistence.enabled Enable persistence using a `PersistentVolumeClaim` ## enabled: true ## @param master.persistence.storageClass Persistent Volume Storage Class ## If defined, storageClassName: <storageClass> ## If set to "-", storageClassName: "", which disables dynamic provisioning ## If undefined (the default) or set to null, no storageClassName spec is ## set, choosing the default provisioner. (gp2 on AWS, standard on ## GKE, AWS & OpenStack) ## storageClass: "" ## @param master.persistence.existingClaim Existing Persistent Volume Claim ## then accept the value as an existing Persistent Volume Claim to which ## the container should be bound ## existingClaim: "" ## @param master.persistence.existingVolume Existing Persistent Volume for use as volume match label selector to the `volumeClaimTemplate`. Ignored when `master.persistence.selector` is set. ## existingVolume: "" ## @param master.persistence.selector Configure custom selector for existing Persistent Volume. Overwrites `master.persistence.existingVolume` ## selector: ## matchLabels: ## volume: ## selector: {} ## @param master.persistence.annotations Persistent Volume Claim annotations ## annotations: {} ## @param master.persistence.accessModes Persistent Volume Access Modes ## accessModes: - ReadWriteOnce ## @param master.persistence.size Persistent Volume Size ## size: 8Gi ## Service parameters for master-eligible node(s) ## service: ## @param master.service.type Kubernetes Service type (master-eligible nodes) ## type: ClusterIP ## @param master.service.port Kubernetes Service port for Elasticsearch transport port (master-eligible nodes) ## port: 9300 ## @param master.service.nodePort Kubernetes Service nodePort (master-eligible nodes) ## ref: https://kubernetes.io/docs/concepts/services-networking/service/#type-nodeport ## nodePort: "" ## @param master.service.annotations Annotations for master-eligible nodes service ## ref: https://kubernetes.io/docs/concepts/services-networking/service/#internal-load-balancer ## annotations: {} ## @param master.service.loadBalancerIP loadBalancerIP if master-eligible nodes service type is `LoadBalancer` ## Set the LoadBalancer service type to internal only. ## ref: https://kubernetes.io/docs/concepts/services-networking/service/#internal-load-balancer ## loadBalancerIP: "" ## Configure the ingress resource that allows you to access the ## Set up the URL ## ref: https://kubernetes.io/docs/user-guide/ingress/ ## ingress: ## @param master.ingress.enabled Enable ingress controller resource ## enabled: false ## @param master.ingress.pathType Ingress Path type ## pathType: ImplementationSpecific ## @param master.ingress.apiVersion Override API Version (automatically detected if not set) ## apiVersion: "" ## @param master.ingress.hostname Default host for the ingress resource. If specified as "*" no host rule is configured ## hostname: master.local ## @param master.ingress.path The Path to Master. You may need to set this to '/*' in order to use this with ALB ingress controllers. ## path: / ## @param master.ingress.annotations Additional annotations for the Ingress resource. To enable certificate autogeneration, place here your cert-manager annotations. ## For a full list of possible ingress annotations, please see ## ref: https://github.com/kubernetes/ingress-nginx/blob/master/docs/user-guide/nginx-configuration/annotations.md ## Use this parameter to set the required annotations for cert-manager, see ## ref: https://cert-manager.io/docs/usage/ingress/#supported-annotations ## ## e.g: ## annotations: ## kubernetes.io/ingress.class: nginx ## cert-manager.io/cluster-issuer: cluster-issuer-name ## annotations: {} ## @param master.ingress.tls Enable TLS configuration for the hostname defined at master.ingress.hostname parameter ## TLS certificates will be retrieved from a TLS secret with name: {{- printf "%s-tls" .Values.master.ingress.hostname }} ## You can use the master.ingress.secrets parameter to create this TLS secret or relay on cert-manager to create it ## tls: false ## @param master.ingress.extraHosts The list of additional hostnames to be covered with this ingress record. ## Most likely the hostname above will be enough, but in the event more hosts are needed, this is an array ## extraHosts: ## - name: master.local ## path: / ## extraHosts: [] ## @param master.ingress.extraPaths Additional arbitrary path/backend objects ## For example: The ALB ingress controller requires a special rule for handling SSL redirection. ## extraPaths: ## - path: /* ## backend: ## serviceName: ssl-redirect ## servicePort: use-annotation ## extraPaths: [] ## @param master.ingress.extraTls The tls configuration for additional hostnames to be covered with this ingress record. ## see: https://kubernetes.io/docs/concepts/services-networking/ingress/#tls ## extraTls: ## - hosts: ## - master.local ## secretName: master.local-tls ## extraTls: [] ## @param master.ingress.secrets If you're providing your own certificates, please use this to add the certificates as secrets ## key and certificate should start with -----BEGIN CERTIFICATE----- or ## -----BEGIN RSA PRIVATE KEY----- ## ## name should line up with a tlsSecret set further up ## If you're using cert-manager, this is unneeded, as it will create the secret for you if it is not set ## ## It is also possible to create and manage the certificates outside of this helm chart ## Please see README.md for more information ## e.g: ## - name: master.local-tls ## key: ## certificate: ## secrets: [] ## Provide functionality to use RBAC ## serviceAccount: ## @param master.serviceAccount.create Enable creation of ServiceAccount for the master node ## create: false ## @param master.serviceAccount.name Name of the created serviceAccount ## If not set and create is true, a name is generated using the fullname template name: "" ## Autoscaling configuration ## @param master.autoscaling.enabled Enable autoscaling for master replicas ## @param master.autoscaling.minReplicas Minimum number of master replicas ## @param master.autoscaling.maxReplicas Maximum number of master replicas ## @param master.autoscaling.targetCPU Target CPU utilization percentage for master replica autoscaling ## @param master.autoscaling.targetMemory Target Memory utilization percentage for master replica autoscaling ## autoscaling: enabled: false minReplicas: 2 maxReplicas: 11 targetCPU: "" targetMemory: "" ## @section Coordinating parameters ## Elasticsearch coordinating-only node parameters ## coordinating: ## @param coordinating.fullnameOverride String to fully override elasticsearch.coordinating.fullname template with a string ## fullnameOverride: "" ## @param coordinating.replicas Desired number of Elasticsearch coordinating-only nodes ## replicas: 2 ## @param coordinating.hostAliases Add deployment host aliases ## https://kubernetes.io/docs/concepts/services-networking/add-entries-to-pod-etc-hosts-with-host-aliases/ ## hostAliases: [] ## @param coordinating.schedulerName Name of the k8s scheduler (other than default) ## ref: https://kubernetes.io/docs/tasks/administer-cluster/configure-multiple-schedulers/ ## schedulerName: "" ## Update strategy for ElasticSearch coordinating statefulset ## ref: https://kubernetes.io/docs/concepts/workloads/controllers/statefulset/#update-strategies ## @param coordinating.updateStrategy.type Update strategy for Coordinating Statefulset ## updateStrategy: type: RollingUpdate ## @param coordinating.heapSize Coordinating-only node heap size ## heapSize: 128m ## @param coordinating.podAnnotations Annotations for coordinating pods. ## podAnnotations: {} ## @param coordinating.podLabels Extra labels to add to Pod ## podLabels: {} ## Pod Security Context for coordinating-only pods. ## ref: https://kubernetes.io/docs/tasks/configure-pod-container/security-context/ ## @param coordinating.securityContext.enabled Enable security context for coordinating-only pods ## @param coordinating.securityContext.fsGroup Group ID for the container for coordinating-only pods ## @param coordinating.securityContext.runAsUser User ID for the container for coordinating-only pods ## securityContext: enabled: true fsGroup: 1001 runAsUser: 1001 ## Pod Security Context for coordinating-only pods. ## ref: https://kubernetes.io/docs/tasks/configure-pod-container/security-context/ ## @param coordinating.podSecurityContext.enabled Enable security context for coordinating-only pods ## @param coordinating.podSecurityContext.fsGroup Group ID for the container for coordinating-only pods ## podSecurityContext: enabled: false fsGroup: 1001 ## Container Security Context for coordinating-only pods. ## ref: https://kubernetes.io/docs/tasks/configure-pod-container/security-context/ ## @param coordinating.containerSecurityContext.enabled Enable security context for coordinating-only pods ## @param coordinating.containerSecurityContext.runAsUser User ID for the container for coordinating-only pods ## containerSecurityContext: enabled: false runAsUser: 1001 ## @param coordinating.podAffinityPreset Coordinating Pod affinity preset. Ignored if `affinity` is set. Allowed values: `soft` or `hard` ## ref: https://kubernetes.io/docs/concepts/scheduling-eviction/assign-pod-node/#inter-pod-affinity-and-anti-affinity ## podAffinityPreset: "" ## @param coordinating.podAntiAffinityPreset Coordinating Pod anti-affinity preset. Ignored if `affinity` is set. Allowed values: `soft` or `hard` ## Ref: https://kubernetes.io/docs/concepts/scheduling-eviction/assign-pod-node/#inter-pod-affinity-and-anti-affinity ## podAntiAffinityPreset: "" ## Node affinity preset ## Ref: https://kubernetes.io/docs/concepts/scheduling-eviction/assign-pod-node/#node-affinity ## @param coordinating.nodeAffinityPreset.type Coordinating Node affinity preset type. Ignored if `affinity` is set. Allowed values: `soft` or `hard` ## @param coordinating.nodeAffinityPreset.key Coordinating Node label key to match Ignored if `affinity` is set. ## @param coordinating.nodeAffinityPreset.values Coordinating Node label values to match. Ignored if `affinity` is set. ## nodeAffinityPreset: type: "" ## E.g. ## key: "kubernetes.io/e2e-az-name" ## key: "" ## E.g. ## values: ## - e2e-az1 ## - e2e-az2 ## values: [] ## @param coordinating.affinity Coordinating Affinity for pod assignment ## Ref: https://kubernetes.io/docs/concepts/configuration/assign-pod-node/#affinity-and-anti-affinity ## Note: podAffinityPreset, podAntiAffinityPreset, and nodeAffinityPreset will be ignored when it's set ## affinity: {} ## @param coordinating.priorityClassName Coordinating pods Priority Class Name ## ref: https://kubernetes.io/docs/concepts/configuration/pod-priority-preemption/#priorityclass ## priorityClassName: "" ## @param coordinating.nodeSelector Coordinating Node labels for pod assignment ## Ref: https://kubernetes.io/docs/user-guide/node-selection/ ## nodeSelector: {} ## @param coordinating.tolerations Coordinating Tolerations for pod assignment ## Ref: https://kubernetes.io/docs/concepts/configuration/taint-and-toleration/ ## tolerations: [] ## @param coordinating.topologySpreadConstraints Topology Spread Constraints for pod assignment spread across your cluster among failure-domains. Evaluated as a template ## Ref: https://kubernetes.io/docs/concepts/workloads/pods/pod-topology-spread-constraints/#spread-constraints-for-pods ## topologySpreadConstraints: [] ## Elasticsearch coordinating-only container's resource requests and limits ## ref: https://kubernetes.io/docs/user-guide/compute-resources/ ## We usually recommend not to specify default resources and to leave this as a conscious ## choice for the user. This also increases chances charts run on environments with little ## resources, such as Minikube. If you do want to specify resources, uncomment the following ## lines, adjust them as necessary, and remove the curly braces after 'resources:'. ## @param coordinating.resources.limits The resources limits for the container ## @param coordinating.resources.requests [object] The requested resources for the container ## resources: ## Example: ## limits: ## cpu: 100m ## memory: 384Mi limits: {} requests: cpu: 25m memory: 256Mi ## Elasticsearch coordinating-only container's startup probe ## ref: https://kubernetes.io/docs/concepts/workloads/pods/pod-lifecycle/#container-probes ## @param coordinating.startupProbe.enabled Enable/disable the startup probe (coordinating nodes pod) ## @param coordinating.startupProbe.initialDelaySeconds Delay before startup probe is initiated (coordinating nodes pod) ## @param coordinating.startupProbe.periodSeconds How often to perform the probe (coordinating nodes pod) ## @param coordinating.startupProbe.timeoutSeconds When the probe times out (coordinating nodes pod) ## @param coordinating.startupProbe.failureThreshold Minimum consecutive failures for the probe to be considered failed after having succeeded ## @param coordinating.startupProbe.successThreshold Minimum consecutive successes for the probe to be considered successful after having failed (coordinating nodes pod) ## startupProbe: enabled: false initialDelaySeconds: 90 periodSeconds: 10 timeoutSeconds: 5 successThreshold: 1 failureThreshold: 5 ## Elasticsearch coordinating-only container's liveness probe ## ref: https://kubernetes.io/docs/concepts/workloads/pods/pod-lifecycle/#container-probes ## @param coordinating.livenessProbe.enabled Enable/disable the liveness probe (coordinating-only nodes pod) ## @param coordinating.livenessProbe.initialDelaySeconds Delay before liveness probe is initiated (coordinating-only nodes pod) ## @param coordinating.livenessProbe.periodSeconds How often to perform the probe (coordinating-only nodes pod) ## @param coordinating.livenessProbe.timeoutSeconds When the probe times out (coordinating-only nodes pod) ## @param coordinating.livenessProbe.failureThreshold Minimum consecutive failures for the probe to be considered failed after having succeeded ## @param coordinating.livenessProbe.successThreshold Minimum consecutive successes for the probe to be considered successful after having failed (coordinating-only nodes pod) ## livenessProbe: enabled: true initialDelaySeconds: 90 periodSeconds: 10 timeoutSeconds: 5 successThreshold: 1 failureThreshold: 5 ## Elasticsearch coordinating-only container's readiness probe ## ref: https://kubernetes.io/docs/concepts/workloads/pods/pod-lifecycle/#container-probes ## @param coordinating.readinessProbe.enabled Enable/disable the readiness probe (coordinating-only nodes pod) ## @param coordinating.readinessProbe.initialDelaySeconds Delay before readiness probe is initiated (coordinating-only nodes pod) ## @param coordinating.readinessProbe.periodSeconds How often to perform the probe (coordinating-only nodes pod) ## @param coordinating.readinessProbe.timeoutSeconds When the probe times out (coordinating-only nodes pod) ## @param coordinating.readinessProbe.failureThreshold Minimum consecutive failures for the probe to be considered failed after having succeeded ## @param coordinating.readinessProbe.successThreshold Minimum consecutive successes for the probe to be considered successful after having failed (coordinating-only nodes pod) ## readinessProbe: enabled: true initialDelaySeconds: 90 periodSeconds: 10 timeoutSeconds: 5 successThreshold: 1 failureThreshold: 5 ## @param coordinating.customStartupProbe Override default startup probe ## customStartupProbe: {} ## @param coordinating.customLivenessProbe Override default liveness probe ## customLivenessProbe: {} ## @param coordinating.customReadinessProbe Override default readiness probe ## customReadinessProbe: {} ## @param coordinating.initContainers Extra init containers to add to the Elasticsearch coordinating-only pod(s) ## initContainers: [] ## @param coordinating.sidecars Extra sidecar containers to add to the Elasticsearch coordinating-only pod(s) ## sidecars: [] ## Service parameters for coordinating-only node(s) ## service: ## @param coordinating.service.type Kubernetes Service type (coordinating-only nodes) ## type: ClusterIP ## @param coordinating.service.port Kubernetes Service port for REST API (coordinating-only nodes) ## port: 9200 ## @param coordinating.service.nodePort Kubernetes Service nodePort (coordinating-only nodes) ## ref: https://kubernetes.io/docs/concepts/services-networking/service/#type-nodeport ## nodePort: "" ## @param coordinating.service.annotations Annotations for coordinating-only nodes service ## Set the LoadBalancer service type to internal only. ## ref: https://kubernetes.io/docs/concepts/services-networking/service/#internal-load-balancer ## annotations: {} ## @param coordinating.service.loadBalancerIP loadBalancerIP if coordinating-only nodes service type is `LoadBalancer` ## ref: https://kubernetes.io/docs/concepts/services-networking/service/#internal-load-balancer ## loadBalancerIP: "" ## @param coordinating.service.externalTrafficPolicy Enable client source IP preservation with externalTrafficPolicy: Local ## ref http://kubernetes.io/docs/tasks/access-application-cluster/create-external-load-balancer/#preserving-the-client-source-ip ## externalTrafficPolicy: Cluster ## Provide functionality to use RBAC ## serviceAccount: ## @param coordinating.serviceAccount.create Enable creation of ServiceAccount for the coordinating-only node ## create: false ## @param coordinating.serviceAccount.name Name of the created serviceAccount ## If not set and create is true, a name is generated using the fullname template ## name: "" ## Autoscaling configuration ## @param coordinating.autoscaling.enabled Enable autoscaling for coordinating replicas ## @param coordinating.autoscaling.minReplicas Minimum number of coordinating replicas ## @param coordinating.autoscaling.maxReplicas Maximum number of coordinating replicas ## @param coordinating.autoscaling.targetCPU Target CPU utilization percentage for coordinating replica autoscaling ## @param coordinating.autoscaling.targetMemory Target Memory utilization percentage for coordinating replica autoscaling ## autoscaling: enabled: false minReplicas: 2 maxReplicas: 11 targetCPU: "" targetMemory: "" ## @section Data parameters ## Elasticsearch data node parameters ## data: ## @param data.name Data node pod name ## name: data ## @param data.fullnameOverride String to fully override elasticsearch.data.fullname template with a string ## fullnameOverride: "" ## @param data.replicas Desired number of Elasticsearch data nodes ## replicas: 2 ## @param data.hostAliases Add deployment host aliases ## https://kubernetes.io/docs/concepts/services-networking/add-entries-to-pod-etc-hosts-with-host-aliases/ ## hostAliases: [] ## @param data.schedulerName Name of the k8s scheduler (other than default) ## ref: https://kubernetes.io/docs/tasks/administer-cluster/configure-multiple-schedulers/ ## schedulerName: "" ## Update strategy for ElasticSearch Data statefulset ## ref: https://kubernetes.io/docs/concepts/workloads/controllers/statefulset/#update-strategies ## @param data.updateStrategy.type Update strategy for Data statefulset ## @param data.updateStrategy.rollingUpdatePartition Partition update strategy for Data statefulset ## updateStrategy: type: RollingUpdate rollingUpdatePartition: "" ## @param data.heapSize Data node heap size ## heapSize: 1024m ## @param data.podAnnotations Annotations for data pods. ## podAnnotations: {} ## @param data.podLabels Extra labels to add to Pod ## podLabels: {} ## Pod Security Context for data pods. ## ref: https://kubernetes.io/docs/tasks/configure-pod-container/security-context/ ## @param data.securityContext.enabled Enable security context for data pods ## @param data.securityContext.fsGroup Group ID for the container for data pods ## @param data.securityContext.runAsUser User ID for the container for data pods ## securityContext: enabled: true fsGroup: 1001 runAsUser: 1001 ## Pod Security Context for data pods. ## ref: https://kubernetes.io/docs/tasks/configure-pod-container/security-context/ ## @param data.podSecurityContext.enabled Enable security context for data pods ## @param data.podSecurityContext.fsGroup Group ID for the container for data pods ## podSecurityContext: enabled: true fsGroup: 1001 ## Container Security Context for data pods. ## ref: https://kubernetes.io/docs/tasks/configure-pod-container/security-context/ ## @param data.containerSecurityContext.enabled Enable security context for data pods ## @param data.containerSecurityContext.runAsUser User ID for the container for data pods ## containerSecurityContext: enabled: true runAsUser: 1001 ## @param data.podAffinityPreset Data Pod affinity preset. Ignored if `affinity` is set. Allowed values: `soft` or `hard` ## ref: https://kubernetes.io/docs/concepts/scheduling-eviction/assign-pod-node/#inter-pod-affinity-and-anti-affinity ## podAffinityPreset: "" ## @param data.podAntiAffinityPreset Data Pod anti-affinity preset. Ignored if `affinity` is set. Allowed values: `soft` or `hard` ## Ref: https://kubernetes.io/docs/concepts/scheduling-eviction/assign-pod-node/#inter-pod-affinity-and-anti-affinity ## podAntiAffinityPreset: "" ## Node affinity preset. Allowed values: soft, hard ## Ref: https://kubernetes.io/docs/concepts/scheduling-eviction/assign-pod-node/#node-affinity ## @param data.nodeAffinityPreset.type Data Node affinity preset type. Ignored if `affinity` is set. Allowed values: `soft` or `hard` ## @param data.nodeAffinityPreset.key Data Node label key to match Ignored if `affinity` is set. ## @param data.nodeAffinityPreset.values Data Node label values to match. Ignored if `affinity` is set. ## nodeAffinityPreset: type: "" ## E.g. ## key: "kubernetes.io/e2e-az-name" ## key: "" ## E.g. ## values: ## - e2e-az1 ## - e2e-az2 ## values: [] ## @param data.affinity Data Affinity for pod assignment ## Ref: https://kubernetes.io/docs/concepts/configuration/assign-pod-node/#affinity-and-anti-affinity ## Note: podAffinityPreset, podAntiAffinityPreset, and nodeAffinityPreset will be ignored when it's set ## affinity: {} ## @param data.priorityClassName Data pods Priority Class Name ## ref: https://kubernetes.io/docs/concepts/configuration/pod-priority-preemption/#priorityclass ## priorityClassName: "" ## @param data.nodeSelector Data Node labels for pod assignment ## Ref: https://kubernetes.io/docs/user-guide/node-selection/ ## nodeSelector: {} ## @param data.tolerations Data Tolerations for pod assignment ## Ref: https://kubernetes.io/docs/concepts/configuration/taint-and-toleration/ ## tolerations: [] ## @param data.topologySpreadConstraints Topology Spread Constraints for pod assignment spread across your cluster among failure-domains. Evaluated as a template ## Ref: https://kubernetes.io/docs/concepts/workloads/pods/pod-topology-spread-constraints/#spread-constraints-for-pods ## topologySpreadConstraints: [] ## Elasticsearch data container's resource requests and limits ## ref: https://kubernetes.io/docs/user-guide/compute-resources/ ## We usually recommend not to specify default resources and to leave this as a conscious ## choice for the user. This also increases chances charts run on environments with little ## resources, such as Minikube. If you do want to specify resources, uncomment the following ## lines, adjust them as necessary, and remove the curly braces after 'resources:'. ## @param data.resources.limits The resources limits for the container ## @param data.resources.requests [object] The requested resources for the container ## resources: ## Example: ## limits: ## cpu: 100m ## memory: 2176Mi limits: {} requests: cpu: 25m memory: 2048Mi ## Elasticsearch data container's startup probe ## ref: https://kubernetes.io/docs/concepts/workloads/pods/pod-lifecycle/#container-probes ## @param data.startupProbe.enabled Enable/disable the startup probe (data nodes pod) ## @param data.startupProbe.initialDelaySeconds Delay before startup probe is initiated (data nodes pod) ## @param data.startupProbe.periodSeconds How often to perform the probe (data nodes pod) ## @param data.startupProbe.timeoutSeconds When the probe times out (data nodes pod) ## @param data.startupProbe.failureThreshold Minimum consecutive failures for the probe to be considered failed after having succeeded ## @param data.startupProbe.successThreshold Minimum consecutive successes for the probe to be considered successful after having failed (data nodes pod) ## startupProbe: enabled: false initialDelaySeconds: 90 periodSeconds: 10 timeoutSeconds: 5 successThreshold: 1 failureThreshold: 5 ## Elasticsearch data container's liveness probe ## ref: https://kubernetes.io/docs/concepts/workloads/pods/pod-lifecycle/#container-probes ## @param data.livenessProbe.enabled Enable/disable the liveness probe (data nodes pod) ## @param data.livenessProbe.initialDelaySeconds Delay before liveness probe is initiated (data nodes pod) ## @param data.livenessProbe.periodSeconds How often to perform the probe (data nodes pod) ## @param data.livenessProbe.timeoutSeconds When the probe times out (data nodes pod) ## @param data.livenessProbe.failureThreshold Minimum consecutive failures for the probe to be considered failed after having succeeded ## @param data.livenessProbe.successThreshold Minimum consecutive successes for the probe to be considered successful after having failed (data nodes pod) ## livenessProbe: enabled: true initialDelaySeconds: 90 periodSeconds: 10 timeoutSeconds: 5 successThreshold: 1 failureThreshold: 5 ## Elasticsearch data container's readiness probe ## ref: https://kubernetes.io/docs/concepts/workloads/pods/pod-lifecycle/#container-probes ## @param data.readinessProbe.enabled Enable/disable the readiness probe (data nodes pod) ## @param data.readinessProbe.initialDelaySeconds Delay before readiness probe is initiated (data nodes pod) ## @param data.readinessProbe.periodSeconds How often to perform the probe (data nodes pod) ## @param data.readinessProbe.timeoutSeconds When the probe times out (data nodes pod) ## @param data.readinessProbe.failureThreshold Minimum consecutive failures for the probe to be considered failed after having succeeded ## @param data.readinessProbe.successThreshold Minimum consecutive successes for the probe to be considered successful after having failed (data nodes pod) ## readinessProbe: enabled: true initialDelaySeconds: 90 periodSeconds: 10 timeoutSeconds: 5 successThreshold: 1 failureThreshold: 5 ## @param data.customStartupProbe Override default startup probe ## customStartupProbe: {} ## @param data.customLivenessProbe Override default liveness probe ## customLivenessProbe: {} ## @param data.customReadinessProbe Override default readiness probe ## customReadinessProbe: {} ## @param data.initContainers Extra init containers to add to the Elasticsearch data pod(s) ## initContainers: [] ## @param data.sidecars Extra sidecar containers to add to the Elasticsearch data pod(s) ## sidecars: [] ## Service parameters for data-eligible node(s) ## service: ## @param data.service.annotations Annotations for data-eligible nodes service ## ref: https://kubernetes.io/docs/concepts/services-networking/service/#internal-load-balancer ## annotations: {} ## Enable persistence using Persistent Volume Claims ## ref: https://kubernetes.io/docs/user-guide/persistent-volumes/ ## persistence: ## @param data.persistence.enabled Enable persistence using a `PersistentVolumeClaim` ## enabled: true ## @param data.persistence.storageClass Persistent Volume Storage Class ## If defined, storageClassName: <storageClass> ## If set to "-", storageClassName: "", which disables dynamic provisioning ## If undefined (the default) or set to null, no storageClassName spec is ## set, choosing the default provisioner. (gp2 on AWS, standard on ## GKE, AWS & OpenStack) ## storageClass: "" ## @param data.persistence.existingClaim Existing Persistent Volume Claim ## If persistence is enable, and this value is defined, ## then accept the value as an existing Persistent Volume Claim to which ## the container should be bound ## existingClaim: "" ## @param data.persistence.existingVolume Existing Persistent Volume for use as volume match label selector to the `volumeClaimTemplate`. Ignored when `data.persistence.selector` ist set. ## existingVolume: "" ## @param data.persistence.selector Configure custom selector for existing Persistent Volume. Overwrites `data.persistence.existingVolume` ## selector: ## matchLabels: ## volume: selector: {} ## @param data.persistence.annotations Persistent Volume Claim annotations ## annotations: {} ## @param data.persistence.accessModes Persistent Volume Access Modes ## accessModes: - ReadWriteOnce ## @param data.persistence.size Persistent Volume Size ## size: 8Gi ## Provide functionality to use RBAC ## serviceAccount: ## @param data.serviceAccount.create Enable creation of ServiceAccount for the data node ## create: false ## @param data.serviceAccount.name Name of the created serviceAccount ## If not set and create is true, a name is generated using the fullname template ## name: "" ## Autoscaling configuration ## @param data.autoscaling.enabled Enable autoscaling for data replicas ## @param data.autoscaling.minReplicas Minimum number of data replicas ## @param data.autoscaling.maxReplicas Maximum number of data replicas ## @param data.autoscaling.targetCPU Target CPU utilization percentage for data replica autoscaling ## @param data.autoscaling.targetMemory Target Memory utilization percentage for data replica autoscaling ## autoscaling: enabled: false minReplicas: 2 maxReplicas: 11 targetCPU: "" targetMemory: "" ## @section Ingest parameters ## Elasticsearch ingest node parameters ## ingest: ## @param ingest.enabled Enable ingest nodes ## enabled: false ## @param ingest.name Ingest node pod name ## name: ingest ## @param ingest.fullnameOverride String to fully override elasticsearch.ingest.fullname template with a string ## fullnameOverride: "" ## @param ingest.replicas Desired number of Elasticsearch ingest nodes ## replicas: 2 ## Update strategy for ElasticSearch ingest statefulset ## ref: https://kubernetes.io/docs/concepts/workloads/controllers/statefulset/#update-strategies ## @param ingest.updateStrategy.type Update strategy for Ingest statefulset ## updateStrategy: type: RollingUpdate ## @param ingest.heapSize Ingest node heap size ## heapSize: 128m ## @param ingest.podAnnotations Annotations for ingest pods. ## podAnnotations: {} ## @param ingest.hostAliases Add deployment host aliases ## https://kubernetes.io/docs/concepts/services-networking/add-entries-to-pod-etc-hosts-with-host-aliases/ ## hostAliases: [] ## @param ingest.schedulerName Name of the k8s scheduler (other than default) ## ref: https://kubernetes.io/docs/tasks/administer-cluster/configure-multiple-schedulers/ ## schedulerName: "" ## @param ingest.podLabels Extra labels to add to Pod ## podLabels: {} ## Pod Security Context for ingest pods. ## ref: https://kubernetes.io/docs/tasks/configure-pod-container/security-context/ ## @param ingest.securityContext.enabled Enable security context for ingest pods ## @param ingest.securityContext.fsGroup Group ID for the container for ingest pods ## @param ingest.securityContext.runAsUser User ID for the container for ingest pods ## securityContext: enabled: true fsGroup: 1001 runAsUser: 1001 ## Pod Security Context for ingest pods. ## ref: https://kubernetes.io/docs/tasks/configure-pod-container/security-context/ ## @param ingest.podSecurityContext.enabled Enable security context for ingest pods ## @param ingest.podSecurityContext.fsGroup Group ID for the container for ingest pods ## podSecurityContext: enabled: true fsGroup: 1001 ## Container Security Context for ingest pods. ## ref: https://kubernetes.io/docs/tasks/configure-pod-container/security-context/ ## @param ingest.containerSecurityContext.enabled Enable security context for ingest pods ## @param ingest.containerSecurityContext.runAsUser User ID for the container for ingest pods ## containerSecurityContext: enabled: true runAsUser: 1001 ## @param ingest.podAffinityPreset Ingest Pod affinity preset. Ignored if `affinity` is set. Allowed values: `soft` or `hard` ## ref: https://kubernetes.io/docs/concepts/scheduling-eviction/assign-pod-node/#inter-pod-affinity-and-anti-affinity ## podAffinityPreset: "" ## @param ingest.podAntiAffinityPreset Ingest Pod anti-affinity preset. Ignored if `affinity` is set. Allowed values: `soft` or `hard` ## Ref: https://kubernetes.io/docs/concepts/scheduling-eviction/assign-pod-node/#inter-pod-affinity-and-anti-affinity ## podAntiAffinityPreset: "" ## Node affinity preset ## Ref: https://kubernetes.io/docs/concepts/scheduling-eviction/assign-pod-node/#node-affinity ## Allowed values: soft, hard ## @param ingest.nodeAffinityPreset.type Ingest Node affinity preset type. Ignored if `affinity` is set. Allowed values: `soft` or `hard` ## @param ingest.nodeAffinityPreset.key Ingest Node label key to match Ignored if `affinity` is set. ## @param ingest.nodeAffinityPreset.values Ingest Node label values to match. Ignored if `affinity` is set. ## nodeAffinityPreset: type: "" ## E.g. ## key: "kubernetes.io/e2e-az-name" ## key: "" ## E.g. ## values: ## - e2e-az1 ## - e2e-az2 ## values: [] ## @param ingest.affinity Ingest Affinity for pod assignment ## Ref: https://kubernetes.io/docs/concepts/configuration/assign-pod-node/#affinity-and-anti-affinity ## Note: podAffinityPreset, podAntiAffinityPreset, and nodeAffinityPreset will be ignored when it's set ## affinity: {} ## @param ingest.priorityClassName Ingest pods Priority Class Name ## ref: https://kubernetes.io/docs/concepts/configuration/pod-priority-preemption/#priorityclass ## priorityClassName: "" ## @param ingest.nodeSelector Ingest Node labels for pod assignment ## Ref: https://kubernetes.io/docs/user-guide/node-selection/ ## nodeSelector: {} ## @param ingest.tolerations Ingest Tolerations for pod assignment ## Ref: https://kubernetes.io/docs/concepts/configuration/taint-and-toleration/ ## tolerations: [] ## @param ingest.topologySpreadConstraints Topology Spread Constraints for pod assignment spread across your cluster among failure-domains. Evaluated as a template ## Ref: https://kubernetes.io/docs/concepts/workloads/pods/pod-topology-spread-constraints/#spread-constraints-for-pods ## topologySpreadConstraints: [] ## Elasticsearch ingest container's resource requests and limits ## ref: https://kubernetes.io/docs/user-guide/compute-resources/ ## We usually recommend not to specify default resources and to leave this as a conscious ## choice for the user. This also increases chances charts run on environments with little ## resources, such as Minikube. If you do want to specify resources, uncomment the following ## lines, adjust them as necessary, and remove the curly braces after 'resources:'. ## @param ingest.resources.limits The resources limits for the container ## @param ingest.resources.requests [object] The requested resources for the container ## resources: ## Example: ## limits: ## cpu: 100m ## memory: 384Mi limits: {} requests: cpu: 25m memory: 256Mi ## Elasticsearch ingest container's startup probe ## ref: https://kubernetes.io/docs/concepts/workloads/pods/pod-lifecycle/#container-probes ## @param ingest.startupProbe.enabled Enable/disable the startup probe (ingest nodes pod) ## @param ingest.startupProbe.initialDelaySeconds Delay before startup probe is initiated (ingest nodes pod) ## @param ingest.startupProbe.periodSeconds How often to perform the probe (ingest nodes pod) ## @param ingest.startupProbe.timeoutSeconds When the probe times out (ingest nodes pod) ## @param ingest.startupProbe.failureThreshold Minimum consecutive failures for the probe to be considered failed after having succeeded ## @param ingest.startupProbe.successThreshold Minimum consecutive successes for the probe to be considered successful after having failed (ingest nodes pod) ## startupProbe: enabled: false initialDelaySeconds: 90 periodSeconds: 10 timeoutSeconds: 5 successThreshold: 1 failureThreshold: 5 ## Elasticsearch ingest container's liveness probe ## ref: https://kubernetes.io/docs/concepts/workloads/pods/pod-lifecycle/#container-probes ## @param ingest.livenessProbe.enabled Enable/disable the liveness probe (ingest nodes pod) ## @param ingest.livenessProbe.initialDelaySeconds Delay before liveness probe is initiated (ingest nodes pod) ## @param ingest.livenessProbe.periodSeconds How often to perform the probe (ingest nodes pod) ## @param ingest.livenessProbe.timeoutSeconds When the probe times out (ingest nodes pod) ## @param ingest.livenessProbe.failureThreshold Minimum consecutive failures for the probe to be considered failed after having succeeded ## @param ingest.livenessProbe.successThreshold Minimum consecutive successes for the probe to be considered successful after having failed (ingest nodes pod) ## livenessProbe: enabled: true initialDelaySeconds: 90 periodSeconds: 10 timeoutSeconds: 5 successThreshold: 1 failureThreshold: 5 ## Elasticsearch ingest container's readiness probe ## ref: https://kubernetes.io/docs/concepts/workloads/pods/pod-lifecycle/#container-probes ## @param ingest.readinessProbe.enabled Enable/disable the readiness probe (ingest nodes pod) ## @param ingest.readinessProbe.initialDelaySeconds Delay before readiness probe is initiated (ingest nodes pod) ## @param ingest.readinessProbe.periodSeconds How often to perform the probe (ingest nodes pod) ## @param ingest.readinessProbe.timeoutSeconds When the probe times out (ingest nodes pod) ## @param ingest.readinessProbe.failureThreshold Minimum consecutive failures for the probe to be considered failed after having succeeded ## @param ingest.readinessProbe.successThreshold Minimum consecutive successes for the probe to be considered successful after having failed (ingest nodes pod) ## readinessProbe: enabled: true initialDelaySeconds: 90 periodSeconds: 10 timeoutSeconds: 5 successThreshold: 1 failureThreshold: 5 ## @param ingest.customStartupProbe Override default startup probe ## customStartupProbe: {} ## @param ingest.customLivenessProbe Override default liveness probe ## customLivenessProbe: {} ## @param ingest.customReadinessProbe Override default readiness probe ## customReadinessProbe: {} ## @param ingest.initContainers Extra init containers to add to the Elasticsearch ingest pod(s) ## initContainers: [] ## @param ingest.sidecars Extra sidecar containers to add to the Elasticsearch ingest pod(s) ## sidecars: [] ## Service parameters for ingest node(s) ## service: ## @param ingest.service.type Kubernetes Service type (ingest nodes) ## type: ClusterIP ## @param ingest.service.port Kubernetes Service port Elasticsearch transport port (ingest nodes) ## port: 9300 ## @param ingest.service.nodePort Kubernetes Service nodePort (ingest nodes) ## ref: https://kubernetes.io/docs/concepts/services-networking/service/#type-nodeport ## nodePort: "" ## @param ingest.service.annotations Annotations for ingest nodes service ## set the LoadBalancer service type to internal only. ## ref: https://kubernetes.io/docs/concepts/services-networking/service/#internal-load-balancer ## annotations: {} ## @param ingest.service.loadBalancerIP loadBalancerIP if ingest nodes service type is `LoadBalancer` ## ref: https://kubernetes.io/docs/concepts/services-networking/service/#internal-load-balancer ## loadBalancerIP: "" ## Provide functionality to use RBAC ## serviceAccount: ## @param ingest.serviceAccount.create Create a default serviceaccount for elasticsearch curator ## create: false ## @param ingest.serviceAccount.name Name of the created serviceAccount ## If not set and create is true, a name is generated using the fullname template ## name: "" ## @section Curator parameters ## Elasticsearch curator parameters ## curator: ## @param curator.enabled Enable Elasticsearch Curator cron job enabled: false ## @param curator.name Elasticsearch Curator pod name ## name: curator ## @param curator.image.registry Elasticsearch Curator image registry ## @param curator.image.repository Elasticsearch Curator image repository ## @param curator.image.tag Elasticsearch Curator image tag ## @param curator.image.pullPolicy Elasticsearch Curator image pull policy ## @param curator.image.pullSecrets Elasticsearch Curator image pull secrets ## image: registry: docker.io repository: bitnami/elasticsearch-curator tag: 5.8.4-debian-10-r284 pullPolicy: IfNotPresent ## Optionally specify an array of imagePullSecrets. ## Secrets must be manually created in the namespace. ## ref: https://kubernetes.io/docs/tasks/configure-pod-container/pull-image-private-registry/ ## e.g: ## pullSecrets: ## - myRegistryKeySecretName ## pullSecrets: [] ## @param curator.cronjob.schedule Schedule for the CronJob ## @param curator.cronjob.annotations Annotations to add to the cronjob ## @param curator.cronjob.concurrencyPolicy `Allow,Forbid,Replace` concurrent jobs ## @param curator.cronjob.failedJobsHistoryLimit Specify the number of failed Jobs to keep ## @param curator.cronjob.successfulJobsHistoryLimit Specify the number of completed Jobs to keep ## @param curator.cronjob.jobRestartPolicy Control the Job restartPolicy ## cronjob: ## At 01:00 every day schedule: "0 1 * * *" annotations: {} concurrencyPolicy: "" failedJobsHistoryLimit: "" successfulJobsHistoryLimit: "" jobRestartPolicy: Never ## @param curator.schedulerName Name of the k8s scheduler (other than default) ## ref: https://kubernetes.io/docs/tasks/administer-cluster/configure-multiple-schedulers/ ## schedulerName: "" ## @param curator.podAnnotations Annotations to add to the pod ## podAnnotations: {} ## @param curator.podLabels Extra labels to add to Pod ## podLabels: {} ## @param curator.podAffinityPreset Curator Pod affinity preset. Ignored if `affinity` is set. Allowed values: `soft` or `hard` ## ref: https://kubernetes.io/docs/concepts/scheduling-eviction/assign-pod-node/#inter-pod-affinity-and-anti-affinity ## podAffinityPreset: "" ## @param curator.podAntiAffinityPreset Curator Pod anti-affinity preset. Ignored if `affinity` is set. Allowed values: `soft` or `hard` ## Ref: https://kubernetes.io/docs/concepts/scheduling-eviction/assign-pod-node/#inter-pod-affinity-and-anti-affinity ## podAntiAffinityPreset: "" ## Node affinity preset ## Ref: https://kubernetes.io/docs/concepts/scheduling-eviction/assign-pod-node/#node-affinity ## @param curator.nodeAffinityPreset.type Curator Node affinity preset type. Ignored if `affinity` is set. Allowed values: `soft` or `hard` ## @param curator.nodeAffinityPreset.key Curator Node label key to match Ignored if `affinity` is set. ## @param curator.nodeAffinityPreset.values Curator Node label values to match. Ignored if `affinity` is set. ## nodeAffinityPreset: type: "" ## E.g. ## key: "kubernetes.io/e2e-az-name" ## key: "" ## E.g. ## values: ## - e2e-az1 ## - e2e-az2 ## values: [] ## @param curator.initContainers Extra init containers to add to the Elasticsearch coordinating-only pod(s) ## initContainers: [] ## @param curator.sidecars Extra sidecar containers to add to the Elasticsearch ingest pod(s) ## sidecars: [] ## @param curator.affinity Curator Affinity for pod assignment ## Ref: https://kubernetes.io/docs/concepts/configuration/assign-pod-node/#affinity-and-anti-affinity ## Note: podAffinityPreset, podAntiAffinityPreset, and nodeAffinityPreset will be ignored when it's set ## affinity: {} ## @param curator.nodeSelector Curator Node labels for pod assignment ## Ref: https://kubernetes.io/docs/user-guide/node-selection/ ## nodeSelector: {} ## @param curator.tolerations Curator Tolerations for pod assignment ## Ref: https://kubernetes.io/docs/concepts/configuration/taint-and-toleration/ ## tolerations: [] ## @param curator.topologySpreadConstraints Topology Spread Constraints for pod assignment spread across your cluster among failure-domains. Evaluated as a template ## Ref: https://kubernetes.io/docs/concepts/workloads/pods/pod-topology-spread-constraints/#spread-constraints-for-pods ## topologySpreadConstraints: [] ## @param curator.rbac.enabled Enable RBAC resources ## rbac: enabled: false ## @param curator.serviceAccount.create Create a default serviceaccount for elasticsearch curator ## @param curator.serviceAccount.name Name for elasticsearch curator serviceaccount ## serviceAccount: create: true ## If not set and create is true, a name is generated using the fullname template ## name: "" ## @param curator.psp.create Whether to create a PodSecurityPolicy. WARNING: PodSecurityPolicy is deprecated in Kubernetes v1.21 or later, unavailable in v1.25 or later ## psp: create: false ## @param curator.hooks [object] Whether to run job on selected hooks ## hooks: install: false upgrade: false ## @param curator.dryrun Run Curator in dry-run mode ## dryrun: false ## @param curator.command Command to execute ## command: ["curator"] ## @param curator.env Environment variables to add to the cronjob container ## env: {} ## Curator configMaps configMaps: ## @param curator.configMaps.action_file_yml [string] Contents of the Curator action_file.yml ## Delete indices older than 90 days ## action_file_yml: |- --- actions: 1: action: delete_indices description: "Clean up ES by deleting old indices" options: timeout_override: continue_if_exception: False disable_action: False ignore_empty_list: True filters: - filtertype: age source: name direction: older timestring: '%Y.%m.%d' unit: days unit_count: 90 field: stats_result: epoch: exclude: False ## @param curator.configMaps.config_yml [string] Contents of the Curator config.yml (overrides config) ## Default config (this value is evaluated as a template) ## config_yml: |- --- client: hosts: - {{ template "elasticsearch.coordinating.fullname" . }}.{{ .Release.Namespace }}.svc.{{ .Values.clusterDomain }} port: {{ .Values.coordinating.service.port }} # url_prefix: # use_ssl: True # certificate: # client_cert: # client_key: # ssl_no_validate: True # http_auth: # timeout: 30 # master_only: False # logging: # loglevel: INFO # logfile: # logformat: default # blacklist: ['elasticsearch', 'urllib3'] ## Curator resources requests and limits ## ref: https://kubernetes.io/docs/user-guide/compute-resources/ ## We usually recommend not to specify default resources and to leave this as a conscious ## choice for the user. This also increases chances charts run on environments with little ## resources, such as Minikube. If you do want to specify resources, uncomment the following ## lines, adjust them as necessary, and remove the curly braces after 'resources:'. ## @param curator.resources.limits The resources limits for the container ## @param curator.resources.requests The requested resources for the container ## resources: ## Example: ## limits: ## cpu: 100m ## memory: 128Mi limits: {} ## Examples: ## requests: ## cpu: 100m ## memory: 128Mi requests: {} ## @param curator.priorityClassName Curator Pods Priority Class Name ## priorityClassName: "" ## @param curator.extraVolumes Extra volumes ## Example Use Case: mount ssl certificates when elasticsearch has tls enabled ## extraVolumes: ## - name: es-certs ## secret: ## defaultMode: 420 ## secretName: es-certs extraVolumes: [] ## @param curator.extraVolumeMounts Mount extra volume(s) ## extraVolumeMounts: ## - name: es-certs ## mountPath: /certs ## readOnly: true extraVolumeMounts: [] ## @param curator.extraInitContainers DEPRECATED. Use `curator.initContainers` instead. Init containers to add to the cronjob container ## Don't configure S3 repository till Elasticsearch is reachable. ## Ensure that it is available at http://elasticsearch:9200 ## ## elasticsearch-s3-repository: ## image: bitnami/minideb ## imagePullPolicy: "IfNotPresent" ## command: ## - "/bin/bash" ## - "-c" ## args: ## - | ## ES_HOST=elasticsearch ## ES_PORT=9200 ## ES_REPOSITORY=backup ## S3_REGION=us-east-1 ## S3_BUCKET=bucket ## S3_BASE_PATH=backup ## S3_COMPRESS=true ## S3_STORAGE_CLASS=standard ## install_packages curl && \ ## ( counter=0; while (( counter++ < 120 )); do curl -s http://${ES_HOST}:${ES_PORT} >/dev/null 2>&1 && break; echo "Waiting for elasticsearch $counter/120"; sleep 1; done ) && \ ## cat <<EOF | curl -sS -XPUT -H "Content-Type: application/json" -d @- http://${ES_HOST}:${ES_PORT}/_snapshot/${ES_REPOSITORY} \ ## { ## "type": "s3", ## "settings": { ## "bucket": "${S3_BUCKET}", ## "base_path": "${S3_BASE_PATH}", ## "region": "${S3_REGION}", ## "compress": "${S3_COMPRESS}", ## "storage_class": "${S3_STORAGE_CLASS}" ## } ## } ## extraInitContainers: [] ## @section Metrics parameters ## Elasticsearch Prometheus exporter configuration ## ref: https://hub.docker.com/r/bitnami/elasticsearch-exporter/tags/ ## metrics: ## @param metrics.enabled Enable prometheus exporter ## enabled: false ## @param metrics.name Metrics pod name ## name: metrics ## @param metrics.image.registry Metrics exporter image registry ## @param metrics.image.repository Metrics exporter image repository ## @param metrics.image.tag Metrics exporter image tag ## @param metrics.image.pullPolicy Metrics exporter image pull policy ## @param metrics.image.pullSecrets Metrics exporter image pull secrets ## image: registry: docker.io repository: bitnami/elasticsearch-exporter tag: 1.3.0-debian-10-r139 pullPolicy: IfNotPresent ## Optionally specify an array of imagePullSecrets. ## Secrets must be manually created in the namespace. ## ref: https://kubernetes.io/docs/tasks/configure-pod-container/pull-image-private-registry/ ## e.g: ## pullSecrets: ## - myRegistryKeySecretName ## pullSecrets: [] ## @param metrics.extraArgs Extra arguments to add to the default exporter command ## ref: https://github.com/justwatchcom/elasticsearch_exporter ## e.g ## extraArgs: ## - --es.snapshots ## - --es.indices ## extraArgs: [] ## @param metrics.hostAliases Add deployment host aliases ## https://kubernetes.io/docs/concepts/services-networking/add-entries-to-pod-etc-hosts-with-host-aliases/ ## hostAliases: [] ## @param metrics.schedulerName Name of the k8s scheduler (other than default) ## ref: https://kubernetes.io/docs/tasks/administer-cluster/configure-multiple-schedulers/ ## schedulerName: "" ## Elasticsearch Prometheus exporter service type ## service: ## @param metrics.service.type Metrics exporter endpoint service type ## type: ClusterIP ## @param metrics.service.annotations [object] Provide any additional annotations which may be required. ## This can be used to set the LoadBalancer service type to internal only. ## ref: https://kubernetes.io/docs/concepts/services-networking/service/#internal-load-balancer ## annotations: prometheus.io/scrape: "true" prometheus.io/port: "9114" ## @param metrics.podAffinityPreset Metrics Pod affinity preset. Ignored if `affinity` is set. Allowed values: `soft` or `hard` ## ref: https://kubernetes.io/docs/concepts/scheduling-eviction/assign-pod-node/#inter-pod-affinity-and-anti-affinity ## podAffinityPreset: "" ## @param metrics.podAntiAffinityPreset Metrics Pod anti-affinity preset. Ignored if `affinity` is set. Allowed values: `soft` or `hard` ## Ref: https://kubernetes.io/docs/concepts/scheduling-eviction/assign-pod-node/#inter-pod-affinity-and-anti-affinity ## podAntiAffinityPreset: "" ## Node affinity preset ## Ref: https://kubernetes.io/docs/concepts/scheduling-eviction/assign-pod-node/#node-affinity ## @param metrics.nodeAffinityPreset.type Metrics Node affinity preset type. Ignored if `affinity` is set. Allowed values: `soft` or `hard` ## @param metrics.nodeAffinityPreset.key Metrics Node label key to match Ignored if `affinity` is set. ## @param metrics.nodeAffinityPreset.values Metrics Node label values to match. Ignored if `affinity` is set. ## nodeAffinityPreset: type: "" ## E.g. ## key: "kubernetes.io/e2e-az-name" ## key: "" ## E.g. ## values: ## - e2e-az1 ## - e2e-az2 ## values: [] ## @param metrics.affinity Metrics Affinity for pod assignment ## Ref: https://kubernetes.io/docs/concepts/configuration/assign-pod-node/#affinity-and-anti-affinity ## Note: podAffinityPreset, podAntiAffinityPreset, and nodeAffinityPreset will be ignored when it's set ## affinity: {} ## @param metrics.nodeSelector Metrics Node labels for pod assignment ## Ref: https://kubernetes.io/docs/user-guide/node-selection/ ## nodeSelector: {} ## @param metrics.tolerations Metrics Tolerations for pod assignment ## Ref: https://kubernetes.io/docs/concepts/configuration/taint-and-toleration/ ## tolerations: [] ## @param metrics.topologySpreadConstraints Topology Spread Constraints for pod assignment spread across your cluster among failure-domains. Evaluated as a template ## Ref: https://kubernetes.io/docs/concepts/workloads/pods/pod-topology-spread-constraints/#spread-constraints-for-pods ## topologySpreadConstraints: [] ## Elasticsearch Prometheus exporter resource requests and limits ## ref: https://kubernetes.io/docs/user-guide/compute-resources/ ## We usually recommend not to specify default resources and to leave this as a conscious ## choice for the user. This also increases chances charts run on environments with little ## resources, such as Minikube. If you do want to specify resources, uncomment the following ## lines, adjust them as necessary, and remove the curly braces after 'resources:'. ## @param metrics.resources.limits The resources limits for the container ## @param metrics.resources.requests The requested resources for the container ## resources: ## Example: ## limits: ## cpu: 100m ## memory: 128Mi limits: {} ## Examples: ## requests: ## cpu: 100m ## memory: 128Mi requests: {} ## Elasticsearch metrics container's liveness probe ## ref: https://kubernetes.io/docs/concepts/workloads/pods/pod-lifecycle/#container-probes ## @param metrics.livenessProbe.enabled Enable/disable the liveness probe (metrics pod) ## @param metrics.livenessProbe.initialDelaySeconds Delay before liveness probe is initiated (metrics pod) ## @param metrics.livenessProbe.periodSeconds How often to perform the probe (metrics pod) ## @param metrics.livenessProbe.timeoutSeconds When the probe times out (metrics pod) ## @param metrics.livenessProbe.failureThreshold Minimum consecutive failures for the probe to be considered failed after having succeeded ## @param metrics.livenessProbe.successThreshold Minimum consecutive successes for the probe to be considered successful after having failed (metrics pod) ## livenessProbe: enabled: true initialDelaySeconds: 60 periodSeconds: 10 timeoutSeconds: 5 successThreshold: 1 failureThreshold: 5 ## Elasticsearch metrics container's readiness probe ## ref: https://kubernetes.io/docs/concepts/workloads/pods/pod-lifecycle/#container-probes ## @param metrics.readinessProbe.enabled Enable/disable the readiness probe (metrics pod) ## @param metrics.readinessProbe.initialDelaySeconds Delay before readiness probe is initiated (metrics pod) ## @param metrics.readinessProbe.periodSeconds How often to perform the probe (metrics pod) ## @param metrics.readinessProbe.timeoutSeconds When the probe times out (metrics pod) ## @param metrics.readinessProbe.failureThreshold Minimum consecutive failures for the probe to be considered failed after having succeeded ## @param metrics.readinessProbe.successThreshold Minimum consecutive successes for the probe to be considered successful after having failed (metrics pod) ## readinessProbe: enabled: true initialDelaySeconds: 5 periodSeconds: 10 timeoutSeconds: 1 successThreshold: 1 failureThreshold: 5 ## @param metrics.podAnnotations [object] Metrics exporter pod Annotation and Labels ## ref: https://kubernetes.io/docs/concepts/overview/working-with-objects/annotations/ ## podAnnotations: prometheus.io/scrape: "true" prometheus.io/port: "9114" ## @param metrics.podLabels Extra labels to add to Pod ## podLabels: {} ## Prometheus Operator ServiceMonitor configuration ## serviceMonitor: ## @param metrics.serviceMonitor.enabled if `true`, creates a Prometheus Operator ServiceMonitor (also requires `metrics.enabled` to be `true`) ## enabled: false ## @param metrics.serviceMonitor.namespace Namespace in which Prometheus is running ## namespace: "" ## @param metrics.serviceMonitor.labels Extra labels for the ServiceMonitor ## labels: {} ## @param metrics.serviceMonitor.interval Interval at which metrics should be scraped. ## ref: https://github.com/coreos/prometheus-operator/blob/master/Documentation/api.md#endpoint ## e.g: ## interval: 10s ## interval: "" ## @param metrics.serviceMonitor.scrapeTimeout Timeout after which the scrape is ended ## ref: https://github.com/coreos/prometheus-operator/blob/master/Documentation/api.md#endpoint ## e.g: ## scrapeTimeout: 10s ## scrapeTimeout: "" ## @param metrics.serviceMonitor.selector Prometheus instance selector labels ## ref: https://github.com/bitnami/charts/tree/master/bitnami/prometheus-operator#prometheus-configuration ## selector: ## prometheus: my-prometheus ## selector: {} ## @section Sysctl Image parameters ## Kernel settings modifier image ## sysctlImage: ## @param sysctlImage.enabled Enable kernel settings modifier image ## enabled: true ## @param sysctlImage.registry Kernel settings modifier image registry ## @param sysctlImage.repository Kernel settings modifier image repository ## @param sysctlImage.tag Kernel settings modifier image tag ## @param sysctlImage.pullPolicy Kernel settings modifier image pull policy ## @param sysctlImage.pullSecrets Kernel settings modifier image pull secrets ## registry: docker.io repository: bitnami/bitnami-shell tag: 10-debian-10-r366 ## Specify a imagePullPolicy ## Defaults to 'Always' if image tag is 'latest', else set to 'IfNotPresent' ## ref: https://kubernetes.io/docs/user-guide/images/#pre-pulling-images ## pullPolicy: IfNotPresent ## Optionally specify an array of imagePullSecrets. ## Secrets must be manually created in the namespace. ## ref: https://kubernetes.io/docs/tasks/configure-pod-container/pull-image-private-registry/ ## e.g: ## pullSecrets: ## - myRegistryKeySecretName ## pullSecrets: [] ## Init container' resource requests and limits ## ref: https://kubernetes.io/docs/user-guide/compute-resources/ ## We usually recommend not to specify default resources and to leave this as a conscious ## choice for the user. This also increases chances charts run on environments with little ## resources, such as Minikube. If you do want to specify resources, uncomment the following ## lines, adjust them as necessary, and remove the curly braces after 'resources:'. ## @param sysctlImage.resources.limits The resources limits for the container ## @param sysctlImage.resources.requests The requested resources for the container ## resources: ## Example: ## limits: ## cpu: 100m ## memory: 128Mi limits: {} ## Examples: ## requests: ## cpu: 100m ## memory: 128Mi requests: {} ## @section VolumePermissions parameters ## Init containers parameters: ## volumePermissions: Change the owner and group of the persistent volume mountpoint to runAsUser:fsGroup values from the securityContext section. ## volumePermissions: ## @param volumePermissions.enabled Enable init container that changes volume permissions in the data directory (for cases where the default k8s `runAsUser` and `fsUser` values do not work) ## enabled: false ## @param volumePermissions.image.registry Init container volume-permissions image registry ## @param volumePermissions.image.repository Init container volume-permissions image name ## @param volumePermissions.image.tag Init container volume-permissions image tag ## @param volumePermissions.image.pullPolicy Init container volume-permissions image pull policy ## @param volumePermissions.image.pullSecrets Init container volume-permissions image pull secrets ## image: registry: docker.io repository: bitnami/bitnami-shell tag: 10-debian-10-r366 pullPolicy: IfNotPresent ## Optionally specify an array of imagePullSecrets. ## Secrets must be manually created in the namespace. ## ref: https://kubernetes.io/docs/tasks/configure-pod-container/pull-image-private-registry/ ## e.g: ## pullSecrets: ## - myRegistryKeySecretName ## pullSecrets: [] ## Init container' resource requests and limits ## ref: https://kubernetes.io/docs/user-guide/compute-resources/ ## We usually recommend not to specify default resources and to leave this as a conscious ## choice for the user. This also increases chances charts run on environments with little ## resources, such as Minikube. If you do want to specify resources, uncomment the following ## lines, adjust them as necessary, and remove the curly braces after 'resources:'. ## @param volumePermissions.resources.limits The resources limits for the container ## @param volumePermissions.resources.requests The requested resources for the container ## resources: ## Example: ## limits: ## cpu: 100m ## memory: 128Mi limits: {} ## Examples: ## requests: ## cpu: 100m ## memory: 128Mi requests: {} ## @section Kibana Parameters ## Bundled Kibana parameters ## @param kibana.elasticsearch.hosts [array] Array containing hostnames for the ES instances. Used to generate the URL ## @param kibana.elasticsearch.port Port to connect Kibana and ES instance. Used to generate the URL ## kibana: elasticsearch: hosts: - '{{ include "elasticsearch.coordinating.fullname" . }}' port: 9200
45.037948
259
0.734567
5a8066dc7e50c1de4e0295252ad60186759c4ced
1,309
yaml
YAML
bitnami/spring-cloud-dataflow/Chart.yaml
00arthur00/charts
502aa1e64541669b732a4eda896e5937847b6c3c
[ "Apache-2.0" ]
null
null
null
bitnami/spring-cloud-dataflow/Chart.yaml
00arthur00/charts
502aa1e64541669b732a4eda896e5937847b6c3c
[ "Apache-2.0" ]
2
2022-01-26T01:14:30.000Z
2022-01-26T07:03:39.000Z
bitnami/spring-cloud-dataflow/Chart.yaml
00arthur00/charts
502aa1e64541669b732a4eda896e5937847b6c3c
[ "Apache-2.0" ]
null
null
null
annotations: category: DeveloperTools apiVersion: v2 appVersion: 2.9.2 dependencies: - condition: rabbitmq.enabled name: rabbitmq repository: https://charts.bitnami.com/bitnami version: 8.x.x - condition: mariadb.enabled name: mariadb repository: https://charts.bitnami.com/bitnami tags: - dataflow-database version: 10.x.x - condition: kafka.enabled name: kafka repository: https://charts.bitnami.com/bitnami version: 15.x.x - name: common repository: https://charts.bitnami.com/bitnami tags: - bitnami-common version: 1.x.x description: Spring Cloud Data Flow is a microservices-based toolkit for building streaming and batch data processing pipelines in Cloud Foundry and Kubernetes. engine: gotpl home: https://github.com/bitnami/charts/tree/master/bitnami/spring-cloud-dataflow icon: https://bitnami.com/assets/stacks/spring-cloud-dataflow/img/spring-cloud-dataflow-stack-220x234.png keywords: - spring-cloud - dataflow - skipper - spring maintainers: - email: [email protected] name: Bitnami name: spring-cloud-dataflow sources: - https://github.com/bitnami/bitnami-docker-spring-cloud-dataflow - https://github.com/bitnami/bitnami-docker-spring-cloud-skipper - https://dataflow.spring.io/ version: 6.0.3
31.166667
160
0.737204
8584a36e2ace7a7ddab4ac87389af3bb75b356f1
38,270
yaml
YAML
bitnami/solr/values.yaml
00arthur00/charts
502aa1e64541669b732a4eda896e5937847b6c3c
[ "Apache-2.0" ]
null
null
null
bitnami/solr/values.yaml
00arthur00/charts
502aa1e64541669b732a4eda896e5937847b6c3c
[ "Apache-2.0" ]
2
2022-01-26T01:14:30.000Z
2022-01-26T07:03:39.000Z
bitnami/solr/values.yaml
00arthur00/charts
502aa1e64541669b732a4eda896e5937847b6c3c
[ "Apache-2.0" ]
null
null
null
## @section Global parameters ## Global Docker image parameters ## Please, note that this will override the image parameters, including dependencies, configured to use the global value ## Current available global Docker image parameters: imageRegistry, imagePullSecrets and storageClass ## @param global.imageRegistry Global Docker image registry ## @param global.imagePullSecrets Global Docker registry secret names as an array ## @param global.storageClass Global StorageClass for Persistent Volume(s) ## global: imageRegistry: "" ## E.g. ## imagePullSecrets: ## - myRegistryKeySecretName ## imagePullSecrets: [] storageClass: "" ## @section Common parameters ## @param kubeVersion Override Kubernetes version ## kubeVersion: "" ## @param nameOverride String to partially override common.names.fullname template (will maintain the release name) ## nameOverride: "" ## @param fullnameOverride String to fully override common.names.fullname template ## fullnameOverride: "" ## @param clusterDomain Kubernetes cluster domain ## clusterDomain: cluster.local ## @param commonLabels Add labels to all the deployed resources ## commonLabels: {} ## @param commonAnnotations Add annotations to all the deployed resources ## commonAnnotations: {} ## @param extraDeploy Extra objects to deploy (value evaluated as a template) ## extraDeploy: [] ## Enable diagnostic mode in the statefulset ## diagnosticMode: ## @param diagnosticMode.enabled Enable diagnostic mode (all probes will be disabled and the command will be overridden) ## enabled: false ## @param diagnosticMode.command Command to override all containers in the statefulset ## command: - sleep ## @param diagnosticMode.args Args to override all containers in the statefulset ## args: - infinity ## @section Solr parameters ## Bitnami Solr image version ## ref: https://hub.docker.com/r/bitnami/solr/tags ## @param image.registry Solr image registry ## @param image.repository Solr image repository ## @param image.tag Solr image tag (immutable tags are recommended) ## @param image.pullPolicy image pull policy ## @param image.pullSecrets Specify docker-registry secret names as an array ## @param image.debug Specify if debug values should be set ## image: registry: docker.io repository: bitnami/solr tag: 8.11.1-debian-10-r84 ## Specify a imagePullPolicy ## Defaults to 'Always' if image tag is 'latest', else set to 'IfNotPresent' ## ref: https://kubernetes.io/docs/user-guide/images/#pre-pulling-images ## pullPolicy: IfNotPresent ## Optionally specify an array of imagePullSecrets. ## Secrets must be manually created in the namespace. ## ref: https://kubernetes.io/docs/tasks/configure-pod-container/pull-image-private-registry/ ## e.g: ## pullSecrets: ## - myRegistryKeySecretName ## pullSecrets: [] ## Set to true if you would like to see extra information on logs ## debug: false auth: ## @param auth.enabled Enable Solr authentication ## enabled: true ## @param auth.adminUsername Solr admin username ## adminUsername: admin ## @param auth.adminPassword Solr admin password. Autogenerated if not provided. ## adminPassword: "" ## @param auth.existingSecret Existing secret with Solr password ## existingSecret: "" ## @param auth.existingSecretPasswordKey Password key to be retrieved from existing secret ## NOTE: ignored unless `auth.existingSecret` parameter is set ## existingSecretPasswordKey: "solr-password" ## @param coreNames Solr core names to be created ## coreNames: - my-core ## @param cloudEnabled Enable Solr cloud mode ## cloudEnabled: true ## @param cloudBootstrap Enable cloud bootstrap. It will be performed from the node 0. ## cloudBootstrap: true ## @param collection Solr collection name ## collection: my-collection ## @param collectionShards Number of collection shards ## collectionShards: 1 ## @param collectionReplicas Number of collection replicas ## collectionReplicas: 2 ## @param serverDirectory Name of the created directory for the server ## serverDirectory: "server" ## @param javaMem Java memory options to pass to the Solr container ## javaMem: "" ## @param heap Java Heap options to pass to the Solr container ## heap: "" ## @param command Override Solr entrypoint string ## command: - /scripts/setup.sh ## @param args Arguments for the provided command if needed ## args: [] ## @param extraEnvVars Additional environment variables to set ## Example: ## extraEnvVars: ## - name: FOO ## value: "bar" ## extraEnvVars: [] ## @param extraEnvVarsCM ConfigMap with extra environment variables ## extraEnvVarsCM: "" ## @param extraEnvVarsSecret Secret with extra environment variables ## extraEnvVarsSecret: "" ## @section Solr statefulset parameters ## @param replicaCount Number of solr replicas ## replicaCount: 3 ## @param containerPorts.http Solr HTTP container port ## containerPorts: http: 8983 ## Configure extra options for Solr containers' liveness, readiness and startup probes ## ref: https://kubernetes.io/docs/tasks/configure-pod-container/configure-liveness-readiness-startup-probes/#configure-probes ## @param livenessProbe.enabled Enable livenessProbe on Solr containers ## @param livenessProbe.initialDelaySeconds Initial delay seconds for livenessProbe ## @param livenessProbe.periodSeconds Period seconds for livenessProbe ## @param livenessProbe.timeoutSeconds Timeout seconds for livenessProbe ## @param livenessProbe.failureThreshold Failure threshold for livenessProbe ## @param livenessProbe.successThreshold Success threshold for livenessProbe ## livenessProbe: enabled: true initialDelaySeconds: 30 periodSeconds: 10 timeoutSeconds: 5 failureThreshold: 6 successThreshold: 1 ## @param readinessProbe.enabled Enable readinessProbe on Solr containers ## @param readinessProbe.initialDelaySeconds Initial delay seconds for readinessProbe ## @param readinessProbe.periodSeconds Period seconds for readinessProbe ## @param readinessProbe.timeoutSeconds Timeout seconds for readinessProbe ## @param readinessProbe.failureThreshold Failure threshold for readinessProbe ## @param readinessProbe.successThreshold Success threshold for readinessProbe ## readinessProbe: enabled: true initialDelaySeconds: 5 periodSeconds: 10 timeoutSeconds: 5 failureThreshold: 6 successThreshold: 1 ## @param startupProbe.enabled Enable startupProbe on Solr containers ## @param startupProbe.initialDelaySeconds Initial delay seconds for startupProbe ## @param startupProbe.periodSeconds Period seconds for startupProbe ## @param startupProbe.timeoutSeconds Timeout seconds for startupProbe ## @param startupProbe.failureThreshold Failure threshold for startupProbe ## @param startupProbe.successThreshold Success threshold for startupProbe ## startupProbe: enabled: false initialDelaySeconds: 30 periodSeconds: 10 timeoutSeconds: 1 failureThreshold: 15 successThreshold: 1 ## @param customLivenessProbe Custom livenessProbe that overrides the default one ## customLivenessProbe: {} ## @param customReadinessProbe Custom readinessProbe that overrides the default one ## customReadinessProbe: {} ## @param customStartupProbe Custom startupProbe that overrides the default one ## customStartupProbe: {} ## @param lifecycleHooks lifecycleHooks for the Solr container to automate configuration before or after startup ## lifecycleHooks: {} ## Solr resource requests and limits ## ref: https://kubernetes.io/docs/user-guide/compute-resources/ ## @param resources.limits The resources limits for the container ## @param resources.requests The requested resources for the container ## resources: limits: {} requests: {} ## Solr pods' Security Context ## ref: https://kubernetes.io/docs/tasks/configure-pod-container/security-context/#set-the-security-context-for-a-pod ## @param podSecurityContext.enabled Enable Solr pods' Security Context ## @param podSecurityContext.fsGroup Set Solr pod's Security Context fsGroup ## podSecurityContext: enabled: true fsGroup: 1001 ## Solr containers' Security Context ## ref: https://kubernetes.io/docs/tasks/configure-pod-container/security-context/#set-the-security-context-for-a-container ## @param containerSecurityContext.enabled Enable Solr containers' Security Context ## @param containerSecurityContext.runAsUser Set Solr containers' Security Context runAsUser ## @param containerSecurityContext.runAsNonRoot Set Solr containers' Security Context runAsNonRoot ## containerSecurityContext: enabled: true runAsUser: 1001 runAsNonRoot: true ## @param hostAliases Solr pods host aliases ## https://kubernetes.io/docs/concepts/services-networking/add-entries-to-pod-etc-hosts-with-host-aliases/ ## hostAliases: [] ## @param podLabels Extra labels for Solr pods ## ref: https://kubernetes.io/docs/concepts/overview/working-with-objects/labels/ ## podLabels: {} ## @param podAnnotations Annotations for Solr pods ## ref: https://kubernetes.io/docs/concepts/overview/working-with-objects/annotations/ ## podAnnotations: {} ## @param podAffinityPreset Solr pod affinity preset. Ignored if `affinity` is set. Allowed values: `soft` or `hard` ## ref: https://kubernetes.io/docs/concepts/scheduling-eviction/assign-pod-node/#inter-pod-affinity-and-anti-affinity ## podAffinityPreset: "" ## @param podAntiAffinityPreset Solr pod anti-affinity preset. Ignored if `affinity` is set. Allowed values: `soft` or `hard` ## Ref: https://kubernetes.io/docs/concepts/scheduling-eviction/assign-pod-node/#inter-pod-affinity-and-anti-affinity ## podAntiAffinityPreset: soft ## Node affinity preset ## Ref: https://kubernetes.io/docs/concepts/scheduling-eviction/assign-pod-node/#node-affinity ## nodeAffinityPreset: ## @param nodeAffinityPreset.type Solr node affinity preset type. Ignored if `affinity` is set. Allowed values: `soft` or `hard` type: "" ## @param nodeAffinityPreset.key Solr node label key to match Ignored if `affinity` is set. ## E.g. ## key: "kubernetes.io/e2e-az-name" ## key: "" ## @param nodeAffinityPreset.values Solr node label values to match. Ignored if `affinity` is set. ## E.g. ## values: ## - e2e-az1 ## - e2e-az2 ## values: [] ## @param affinity Affinity settings for Solr pod assignment. Evaluated as a template ## Ref: https://kubernetes.io/docs/concepts/configuration/assign-pod-node/#affinity-and-anti-affinity ## affinity: {} ## @param nodeSelector Node labels for Solr pods assignment. Evaluated as a template ## ref: https://kubernetes.io/docs/user-guide/node-selection/ ## nodeSelector: {} ## @param tolerations Tolerations for Solr pods assignment. Evaluated as a template ## ref: https://kubernetes.io/docs/concepts/configuration/taint-and-toleration/ ## tolerations: [] ## @param topologySpreadConstraints Topology Spread Constraints for pod assignment spread across your cluster among failure-domains. Evaluated as a template ## Ref: https://kubernetes.io/docs/concepts/workloads/pods/pod-topology-spread-constraints/#spread-constraints-for-pods ## topologySpreadConstraints: {} ## @param podManagementPolicy Management Policy for Solr StatefulSet ## StatefulSet controller supports relaxing its ordering guarantees while preserving its uniqueness and identity guarantees ## There are two valid pod management policies: OrderedReady and Parallel ## ref: https://kubernetes.io/docs/tutorials/stateful-application/basic-stateful-set/#pod-management-policy ## podManagementPolicy: Parallel ## @param priorityClassName Solr pods' priority. ## ref: https://kubernetes.io/docs/concepts/configuration/pod-priority-preemption/ ## priorityClassName: "" ## @param schedulerName Kubernetes pod scheduler registry ## https://kubernetes.io/docs/tasks/administer-cluster/configure-multiple-schedulers/ ## schedulerName: "" ## @param updateStrategy.type Solr statefulset strategy type ## @param updateStrategy.rollingUpdate Solr statefulset rolling update configuration parameters ## ref: https://kubernetes.io/docs/concepts/workloads/controllers/statefulset/#update-strategies ## updateStrategy: type: RollingUpdate rollingUpdate: {} ## @param extraVolumes Optionally specify extra list of additional volumes for the Solr pod(s) ## extraVolumes: [] ## @param extraVolumeMounts Optionally specify extra list of additional volumeMounts for the Solr container(s) ## extraVolumeMounts: [] ## @param initContainers Add init containers to the Solr pod(s) ## Example: ## initContainers: ## - name: your-image-name ## image: your-image ## imagePullPolicy: Always ## ports: ## - name: portname ## containerPort: 1234 ## initContainers: [] ## @param sidecars Add sidecars to the Solr pod(s) ## Example: ## sidecars: ## - name: your-image-name ## image: your-image ## imagePullPolicy: Always ## ports: ## - name: portname ## containerPort: 1234 ## sidecars: [] ## @section Traffic Exposure parameters service: ## @param service.type Kubernetes Service type ## type: ClusterIP ## @param service.ports.http Solr HTTP service port ## ports: http: 8983 ## @param service.nodePorts.http Node port for the HTTP service ## NOTE: choose port between <30000-32767> ## nodePorts: http: "" ## @param service.sessionAffinity Control where client requests go, to the same pod or round-robin ## Values: ClientIP or None ## ref: https://kubernetes.io/docs/user-guide/services/ ## sessionAffinity: None ## @param service.clusterIP Solr service Cluster IP ## e.g.: ## clusterIP: None ## clusterIP: "" ## @param service.loadBalancerIP Solr service Load Balancer IP ## ref: https://kubernetes.io/docs/user-guide/services/#type-loadbalancer ## loadBalancerIP: "" ## @param service.loadBalancerSourceRanges Solr service Load Balancer sources ## ref: https://kubernetes.io/docs/tasks/access-application-cluster/configure-cloud-provider-firewall/#restrict-access-for-loadbalancer-service ## e.g: ## loadBalancerSourceRanges: ## - 10.10.10.0/24 ## loadBalancerSourceRanges: [] ## @param service.externalTrafficPolicy Solr service external traffic policy ## ref https://kubernetes.io/docs/tasks/access-application-cluster/create-external-load-balancer/#preserving-the-client-source-ip ## externalTrafficPolicy: Cluster ## @param service.annotations Additional custom annotations for Solr service ## annotations: {} ## @param service.extraPorts Extra ports to expose in the Solr service (normally used with the `sidecar` value) ## extraPorts: [] ## Solr ingress parameters ## ref: https://kubernetes.io/docs/user-guide/ingress/ ## ingress: ## @param ingress.enabled Enable ingress record generation for Apache Geode ## enabled: false ## @param ingress.ingressClassName IngressClass that will be be used to implement the Ingress (Kubernetes 1.18+) ## This is supported in Kubernetes 1.18+ and required if you have more than one IngressClass marked as the default for your cluster . ## ref: https://kubernetes.io/blog/2020/04/02/improvements-to-the-ingress-api-in-kubernetes-1.18/ ## ingressClassName: "" ## @param ingress.pathType Ingress path type ## pathType: ImplementationSpecific ## @param ingress.apiVersion Force Ingress API version (automatically detected if not set) ## apiVersion: "" ## @param ingress.hostname Default host for the ingress record ## hostname: solr.local ## @param ingress.path Default path for the ingress record ## NOTE: You may need to set this to '/*' in order to use this with ALB ingress controllers ## path: / ## @param ingress.annotations [object] Additional annotations for the Ingress resource. To enable certificate autogeneration, place here your cert-manager annotations. ## Use this parameter to set the required annotations for cert-manager, see ## ref: https://cert-manager.io/docs/usage/ingress/#supported-annotations ## e.g: ## annotations: ## kubernetes.io/ingress.class: nginx ## cert-manager.io/cluster-issuer: cluster-issuer-name ## annotations: {} ## @param ingress.tls Enable TLS configuration for the host defined at `ingress.hostname` parameter ## TLS certificates will be retrieved from a TLS secret with name: `{{- printf "%s-tls" .Values.ingress.hostname }}` ## You can: ## - Use the `ingress.secrets` parameter to create this TLS secret ## - Relay on cert-manager to create it by setting the corresponding annotations ## - Relay on Helm to create self-signed certificates by setting `ingress.selfSigned=true` ## tls: false ## @param ingress.selfSigned Create a TLS secret for this ingress record using self-signed certificates generated by Helm ## selfSigned: false ## @param ingress.extraHosts An array with additional hostname(s) to be covered with the ingress record ## e.g: ## extraHosts: ## - name: solr.local ## path: / ## extraHosts: [] ## @param ingress.extraPaths Any additional arbitrary paths that may need to be added to the ingress under the main host. ## For example: The ALB ingress controller requires a special rule for handling SSL redirection. ## extraPaths: ## - path: /* ## backend: ## serviceName: ssl-redirect ## servicePort: use-annotation ## extraPaths: [] ## @param ingress.extraTls The tls configuration for additional hostnames to be covered with this ingress record. ## see: https://kubernetes.io/docs/concepts/services-networking/ingress/#tls ## extraTls: ## - hosts: ## - solr.local ## secretName: solr.local-tls ## extraTls: [] ## @param ingress.secrets If you're providing your own certificates, please use this to add the certificates as secrets ## key and certificate should start with -----BEGIN CERTIFICATE----- or ## -----BEGIN RSA PRIVATE KEY----- ## ## name should line up with a tlsSecret set further up ## If you're using cert-manager, this is unneeded, as it will create the secret for you if it is not set ## ## It is also possible to create and manage the certificates outside of this helm chart ## Please see README.md for more information ## e.g: ## - name: solr.local-tls ## key: ## certificate: ## secrets: [] ## @section Persistence parameters ## Enable persistence using Persistent Volume Claims ## ref: https://kubernetes.io/docs/user-guide/persistent-volumes/ ## persistence: ## @param persistence.enabled Use a PVC to persist data. ## enabled: true ## @param persistence.existingClaim A manually managed Persistent Volume and Claim ## If defined, PVC must be created manually before volume will be bound ## The value is evaluated as a template ## existingClaim: "" ## @param persistence.storageClass Storage class of backing PVC ## If defined, storageClassName: <storageClass> ## If set to "-", storageClassName: "", which disables dynamic provisioning ## If undefined (the default) or set to null, no storageClassName spec is ## set, choosing the default provisioner. ## storageClass: "" ## @param persistence.accessModes Persistent Volume Access Modes ## accessModes: - ReadWriteOnce ## @param persistence.size Size of data volume ## size: 8Gi ## @param persistence.annotations Persistence annotations for Solr ## annotations: {} ## @param persistence.mountPath Persistence mount path for Solr ## mountPath: /bitnami/solr ## @section Volume Permissions parameters ## ## Init containers parameters: ## volumePermissions: Change the owner and group of the persistent volume(s) mountpoint(s) to 'runAsUser:fsGroup' on each node ## volumePermissions: ## @param volumePermissions.enabled Enable init container that changes the owner and group of the persistent volume ## enabled: false ## @param volumePermissions.image.registry Init container volume-permissions image registry ## @param volumePermissions.image.repository Init container volume-permissions image repository ## @param volumePermissions.image.tag Init container volume-permissions image tag (immutable tags are recommended) ## @param volumePermissions.image.pullPolicy Init container volume-permissions image pull policy ## @param volumePermissions.image.pullSecrets Init container volume-permissions image pull secrets ## image: registry: docker.io repository: bitnami/bitnami-shell tag: 10-debian-10-r366 pullPolicy: IfNotPresent ## Optionally specify an array of imagePullSecrets. ## Secrets must be manually created in the namespace. ## ref: https://kubernetes.io/docs/tasks/configure-pod-container/pull-image-private-registry/ ## Example: ## pullSecrets: ## - myRegistryKeySecretName ## pullSecrets: [] ## Init container resource requests and limits ## ref: https://kubernetes.io/docs/user-guide/compute-resources/ ## @param volumePermissions.resources.limits Init container volume-permissions resource limits ## @param volumePermissions.resources.requests Init container volume-permissions resource requests ## resources: limits: {} requests: {} ## Init container' Security Context ## Note: the chown of the data folder is done to containerSecurityContext.runAsUser ## and not the below volumePermissions.containerSecurityContext.runAsUser ## @param volumePermissions.containerSecurityContext.runAsUser User ID for the init container ## containerSecurityContext: runAsUser: 0 ## @section Other Parameters ## Service account for Solr to use. ## ref: https://kubernetes.io/docs/tasks/configure-pod-container/configure-service-account/ ## serviceAccount: ## @param serviceAccount.create Enable creation of ServiceAccount for Solr pod ## create: false ## @param serviceAccount.name The name of the ServiceAccount to use. ## If not set and create is true, a name is generated using the common.names.fullname template ## name: "" ## @param serviceAccount.automountServiceAccountToken Allows auto mount of ServiceAccountToken on the serviceAccount created ## Can be set to false if pods using this serviceAccount do not need to use K8s API ## automountServiceAccountToken: true ## @param serviceAccount.annotations Additional custom annotations for the ServiceAccount ## annotations: {} ## @section Solr TLS parameters ## TLS configuration ## tls: ## @param tls.enabled Enable the TLS/SSL configuration ## enabled: false ## @param tls.autoGenerated Create self-signed TLS certificates. Currently only supports PEM certificates ## autoGenerated: false ## @param tls.certificatesSecretName Name of the secret that contains the certificates ## It should contain two keys called "keystore.p12" and "trustore.p12" with the files in JKS or P12 format ## certificatesSecretName: cert-files ## certificatesSecretName: "" ## @param tls.passwordsSecretName Set the name of the secret that contains the passwords for the certificate files ## It should contain two keys called "tls-keystore-password" and "tls-truststore-password". ## e.g: ## passwordsSecretName: my-passwords ## passwordsSecretName: "" ## @param tls.keystorePassword Password to access the keystore when it's password-protected ## keystorePassword: "" ## @param tls.truststorePassword Password to access the truststore when it's password-protected ## truststorePassword: "" ## We usually recommend not to specify default resources and to leave this as a conscious ## choice for the user. This also increases chances charts run on environments with little ## resources, such as Minikube. If you do want to specify resources, uncomment the following ## lines, adjust them as necessary, and remove the curly braces after 'resources:'. ## @param tls.resources.limits The resources limits for the TLS init container ## @param tls.resources.requests The requested resources for the TLS init container ## resources: ## Example: ## limits: ## cpu: 100m ## memory: 128Mi limits: {} ## Examples: ## requests: ## cpu: 100m ## memory: 128Mi requests: {} ## @section Metrics parameters ## Configuration for the Solr Prometheus exporter ## metrics: ## @param metrics.enabled Deploy a Solr Prometheus exporter deployment to expose metrics ## enabled: false ## @param metrics.configFile Config file with metrics to export by the Solr prometheus metrics. To change it mount a different file using `extraConfigMaps` ## configFile: "/opt/bitnami/solr/contrib/prometheus-exporter/conf/solr-exporter-config.xml" ## @param metrics.threads Number of Solr exporter threads ## threads: 7 ## @param metrics.command Override Solr entrypoint string. ## command: [] ## @param metrics.args Arguments for the provided command if needed ## args: [] ## @param metrics.extraEnvVars Additional environment variables to set ## Example: ## extraEnvVars: ## - name: FOO ## value: "bar" ## extraEnvVars: [] ## @param metrics.extraEnvVarsCM ConfigMap with extra environment variables ## extraEnvVarsCM: "" ## @param metrics.extraEnvVarsSecret Secret with extra environment variables ## extraEnvVarsSecret: "" ## @param metrics.containerPorts.http Solr Prometheus exporter HTTP container port ## containerPorts: http: 9983 ## Configure extra options for liveness probe ## ref: https://kubernetes.io/docs/tasks/configure-pod-container/configure-liveness-readiness-probes/#configure-probes ## @param metrics.livenessProbe.enabled Enable livenessProbe on Solr Prometheus exporter containers ## @param metrics.livenessProbe.initialDelaySeconds Initial delay seconds for livenessProbe ## @param metrics.livenessProbe.periodSeconds Period seconds for livenessProbe ## @param metrics.livenessProbe.timeoutSeconds Timeout seconds for livenessProbe ## @param metrics.livenessProbe.failureThreshold Failure threshold for livenessProbe ## @param metrics.livenessProbe.successThreshold Success threshold for livenessProbe ## livenessProbe: enabled: true initialDelaySeconds: 10 periodSeconds: 5 timeoutSeconds: 15 failureThreshold: 15 successThreshold: 1 ## @param metrics.readinessProbe.enabled Enable readinessProbe on Solr Prometheus exporter containers ## @param metrics.readinessProbe.initialDelaySeconds Initial delay seconds for readinessProbe ## @param metrics.readinessProbe.periodSeconds Period seconds for readinessProbe ## @param metrics.readinessProbe.timeoutSeconds Timeout seconds for readinessProbe ## @param metrics.readinessProbe.failureThreshold Failure threshold for readinessProbe ## @param metrics.readinessProbe.successThreshold Success threshold for readinessProbe ## readinessProbe: enabled: true initialDelaySeconds: 10 periodSeconds: 5 timeoutSeconds: 15 failureThreshold: 15 successThreshold: 15 ## @param metrics.startupProbe.enabled Enable startupProbe on Solr Prometheus exporter containers ## @param metrics.startupProbe.initialDelaySeconds Initial delay seconds for startupProbe ## @param metrics.startupProbe.periodSeconds Period seconds for startupProbe ## @param metrics.startupProbe.timeoutSeconds Timeout seconds for startupProbe ## @param metrics.startupProbe.failureThreshold Failure threshold for startupProbe ## @param metrics.startupProbe.successThreshold Success threshold for startupProbe ## startupProbe: enabled: false initialDelaySeconds: 30 periodSeconds: 10 timeoutSeconds: 1 failureThreshold: 15 successThreshold: 1 ## @param metrics.customLivenessProbe Custom livenessProbe that overrides the default one ## customLivenessProbe: {} ## @param metrics.customReadinessProbe Custom readinessProbe that overrides the default one ## customReadinessProbe: {} ## @param metrics.customStartupProbe Custom startupProbe that overrides the default one ## customStartupProbe: {} ## Solr Prometheus exporter resource requests and limits ## ref: https://kubernetes.io/docs/user-guide/compute-resources/ ## @param metrics.resources.limits The resources limits for the container ## @param metrics.resources.requests The requested resources for the container ## resources: limits: {} requests: {} ## Solr Prometheus exporter containers' Security Context ## ref: https://kubernetes.io/docs/tasks/configure-pod-container/security-context/#set-the-security-context-for-a-container ## @param metrics.containerSecurityContext.enabled Enable Solr Prometheus exporter containers' Security Context ## @param metrics.containerSecurityContext.runAsUser User ID for the containers. ## @param metrics.containerSecurityContext.runAsNonRoot Enable Solr Prometheus exporter containers' Security Context runAsNonRoot ## containerSecurityContext: enabled: true runAsUser: 1001 runAsNonRoot: true ## Solr Prometheus exporter pods' Security Context ## ref: https://kubernetes.io/docs/tasks/configure-pod-container/security-context/#set-the-security-context-for-a-pod ## @param metrics.podSecurityContext.enabled Enable Solr Prometheus exporter pods' Security Context ## @param metrics.podSecurityContext.fsGroup Group ID for the pods. ## podSecurityContext: enabled: true fsGroup: 1001 ## @param metrics.podLabels Additional labels for Solr Prometheus exporter pod(s) ## ref: https://kubernetes.io/docs/concepts/overview/working-with-objects/labels/ ## podLabels: {} ## @param metrics.podAnnotations Additional annotations for Solr Prometheus exporter pod(s) ## ref: https://kubernetes.io/docs/concepts/overview/working-with-objects/annotations/ ## podAnnotations: {} ## @param metrics.podAffinityPreset Solr Prometheus exporter pod affinity preset. Ignored if `affinity` is set. Allowed values: `soft` or `hard` ## ref: https://kubernetes.io/docs/concepts/scheduling-eviction/assign-pod-node/#inter-pod-affinity-and-anti-affinity ## podAffinityPreset: "" ## @param metrics.podAntiAffinityPreset Solr Prometheus exporter pod anti-affinity preset. Ignored if `affinity` is set. Allowed values: `soft` or `hard` ## Ref: https://kubernetes.io/docs/concepts/scheduling-eviction/assign-pod-node/#inter-pod-affinity-and-anti-affinity ## podAntiAffinityPreset: soft ## Node affinity preset ## Ref: https://kubernetes.io/docs/concepts/scheduling-eviction/assign-pod-node/#node-affinity ## nodeAffinityPreset: ## @param metrics.nodeAffinityPreset.type Solr Prometheus exporter node affinity preset type. Ignored if `affinity` is set. Allowed values: `soft` or `hard` type: "" ## @param metrics.nodeAffinityPreset.key Solr Prometheus exporter node label key to match Ignored if `affinity` is set. ## E.g. ## key: "kubernetes.io/e2e-az-name" ## key: "" ## @param metrics.nodeAffinityPreset.values Solr Prometheus exporter node label values to match. Ignored if `affinity` is set. ## E.g. ## values: ## - e2e-az1 ## - e2e-az2 ## values: [] ## @param metrics.affinity Affinity settings for Solr Prometheus exporter pod assignment. Evaluated as a template ## Ref: https://kubernetes.io/docs/concepts/configuration/assign-pod-node/#affinity-and-anti-affinity ## affinity: {} ## @param metrics.nodeSelector Node labels for Solr Prometheus exporter pods assignment. Evaluated as a template ## ref: https://kubernetes.io/docs/user-guide/node-selection/ ## nodeSelector: {} ## @param metrics.tolerations Tolerations for Solr Prometheus exporter pods assignment. Evaluated as a template ## ref: https://kubernetes.io/docs/concepts/configuration/taint-and-toleration/ ## tolerations: [] ## @param metrics.topologySpreadConstraints Topology Spread Constraints for pod assignment spread across your cluster among failure-domains. Evaluated as a template ## Ref: https://kubernetes.io/docs/concepts/workloads/pods/pod-topology-spread-constraints/#spread-constraints-for-pods ## topologySpreadConstraints: {} ## @param metrics.podManagementPolicy Management Policy for Solr Prometheus exporter deployment ## StatefulSet controller supports relaxing its ordering guarantees while preserving its uniqueness and identity guarantees ## There are two valid pod management policies: OrderedReady and Parallel ## ref: https://kubernetes.io/docs/tutorials/stateful-application/basic-stateful-set/#pod-management-policy ## podManagementPolicy: Parallel ## @param metrics.priorityClassName Solr Prometheus exporter pods' priority. ## ref: https://kubernetes.io/docs/concepts/configuration/pod-priority-preemption/ ## priorityClassName: "" ## @param metrics.schedulerName Kubernetes pod scheduler registry ## https://kubernetes.io/docs/tasks/administer-cluster/configure-multiple-schedulers/ ## schedulerName: "" ## @param metrics.hostAliases Solr Prometheus exporter pod host aliases ## https://kubernetes.io/docs/concepts/services-networking/add-entries-to-pod-etc-hosts-with-host-aliases/ ## hostAliases: [] ## @param metrics.updateStrategy.type Solr Prometheus exporter deployment strategy type ## @param metrics.updateStrategy.rollingUpdate Solr Prometheus exporter deployment rolling update configuration parameters ## ref: https://kubernetes.io/docs/concepts/workloads/controllers/statefulset/#update-strategies ## updateStrategy: type: RollingUpdate rollingUpdate: {} ## @param metrics.extraVolumes Optionally specify extra list of additional volumes for the Solr Prometheus exporter pod(s) ## extraVolumes: [] ## @param metrics.extraVolumeMounts Optionally specify extra list of additional volumeMounts for the Solr Prometheus exporter container(s) ## extraVolumeMounts: [] ## @param metrics.initContainers Add init containers to the Solr Prometheus exporter pod(s) ## Example: ## initContainers: ## - name: your-image-name ## image: your-image ## imagePullPolicy: Always ## ports: ## - name: portname ## containerPort: 1234 ## initContainers: [] ## @param metrics.sidecars Add sidecars to the Solr Prometheus exporter pod(s) ## Example: ## sidecars: ## - name: your-image-name ## image: your-image ## imagePullPolicy: Always ## ports: ## - name: portname ## containerPort: 1234 ## sidecars: [] ## Service for the Solr Prometheus exporter deployment ## service: ## @param metrics.service.ports.http Solr Prometheus exporter HTTP service port ## ports: http: 8983 ## @param metrics.service.sessionAffinity Control where client requests go, to the same pod or round-robin ## Values: ClientIP or None ## ref: https://kubernetes.io/docs/user-guide/services/ ## sessionAffinity: None ## @param metrics.service.clusterIP Solr Prometheus exporter service Cluster IP ## e.g.: ## clusterIP: None ## clusterIP: "" ## @param metrics.service.annotations annotations for Solr Prometheus exporter service ## annotations: {} ## @param metrics.service.labels Additional labels for Solr Prometheus exporter service ## labels: {} ## Prometheus Operator ServiceMonitor configuration ## serviceMonitor: ## @param metrics.serviceMonitor.enabled Create ServiceMonitor Resource for scraping metrics using Prometheus Operator ## enabled: false ## @param metrics.serviceMonitor.namespace Namespace for the ServiceMonitor Resource (defaults to the Release Namespace) ## namespace: "" ## @param metrics.serviceMonitor.interval Interval at which metrics should be scraped. ## ref: https://github.com/coreos/prometheus-operator/blob/master/Documentation/api.md#endpoint ## interval: "" ## @param metrics.serviceMonitor.scrapeTimeout Timeout after which the scrape is ended ## ref: https://github.com/coreos/prometheus-operator/blob/master/Documentation/api.md#endpoint ## scrapeTimeout: "" ## @param metrics.serviceMonitor.additionalLabels Additional labels that can be used so ServiceMonitor will be discovered by Prometheus ## additionalLabels: {} ## @param metrics.serviceMonitor.selector Prometheus instance selector labels ## ref: https://github.com/bitnami/charts/tree/master/bitnami/prometheus-operator#prometheus-configuration ## selector: {} ## @param metrics.serviceMonitor.relabelings RelabelConfigs to apply to samples before scraping ## relabelings: [] ## @param metrics.serviceMonitor.metricRelabelings MetricRelabelConfigs to apply to samples before ingestion ## metricRelabelings: [] ## @param metrics.serviceMonitor.honorLabels Specify honorLabels parameter to add the scrape endpoint ## honorLabels: false ## @param metrics.serviceMonitor.jobLabel The name of the label on the target service to use as the job name in prometheus. ## jobLabel: "" ## @section ZooKeeper parameters ## ZooKeeper chart configuration ## ref: https://github.com/bitnami/charts/blob/master/bitnami/zookeeper/values.yaml ## zookeeper: ## @param zookeeper.enabled Enable ZooKeeper deployment. Needed for Solr cloud ## enabled: true ## @param zookeeper.fourlwCommandsWhitelist A list of comma separated Four Letter Words commands that can be executed ## fourlwCommandsWhitelist: srvr,mntr,conf,ruok ## @param zookeeper.containerPorts.client ZooKeeper client container port ## containerPorts: client: 2181 ## @param zookeeper.replicaCount Number of ZooKeeper nodes ## replicaCount: 3 ## ZooKeeper Persistence parameters ## ref: https://kubernetes.io/docs/user-guide/persistent-volumes/ ## @param zookeeper.persistence.enabled Enable persistence on ZooKeeper using PVC(s) ## @param zookeeper.persistence.storageClass Persistent Volume storage class ## @param zookeeper.persistence.accessModes Persistent Volume access modes ## @param zookeeper.persistence.size Persistent Volume size ## persistence: enabled: true storageClass: "" accessModes: - ReadWriteOnce size: 8Gi ## External Zookeeper Configuration ## All of these values are only used if `zookeeper.enabled=false` ## externalZookeeper: ## @param externalZookeeper.servers List of external zookeeper servers to use ## servers: []
40.454545
169
0.749203
85acc261b8d41d230236b7d0b5d537c1d42754d2
817
yaml
YAML
bitnami/cassandra/Chart.yaml
00arthur00/charts
502aa1e64541669b732a4eda896e5937847b6c3c
[ "Apache-2.0" ]
null
null
null
bitnami/cassandra/Chart.yaml
00arthur00/charts
502aa1e64541669b732a4eda896e5937847b6c3c
[ "Apache-2.0" ]
2
2022-01-26T01:14:30.000Z
2022-01-26T07:03:39.000Z
bitnami/cassandra/Chart.yaml
00arthur00/charts
502aa1e64541669b732a4eda896e5937847b6c3c
[ "Apache-2.0" ]
null
null
null
annotations: category: Database apiVersion: v2 appVersion: 4.0.3 dependencies: - name: common repository: https://charts.bitnami.com/bitnami tags: - bitnami-common version: 1.x.x description: Apache Cassandra is an open source distributed database management system designed to handle large amounts of data across many servers, providing high availability with no single point of failure. engine: gotpl home: https://github.com/bitnami/charts/tree/master/bitnami/cassandra icon: https://bitnami.com/assets/stacks/cassandra/img/cassandra-stack-220x234.png keywords: - cassandra - database - nosql maintainers: - email: [email protected] name: Bitnami name: cassandra sources: - https://github.com/bitnami/bitnami-docker-cassandra - http://cassandra.apache.org version: 9.1.9
30.259259
209
0.762546
85b9441f2ad0110b023ddd089c716778000c1890
891
yaml
YAML
bitnami/cert-manager/Chart.yaml
00arthur00/charts
502aa1e64541669b732a4eda896e5937847b6c3c
[ "Apache-2.0" ]
null
null
null
bitnami/cert-manager/Chart.yaml
00arthur00/charts
502aa1e64541669b732a4eda896e5937847b6c3c
[ "Apache-2.0" ]
2
2022-01-26T01:14:30.000Z
2022-01-26T07:03:39.000Z
bitnami/cert-manager/Chart.yaml
00arthur00/charts
502aa1e64541669b732a4eda896e5937847b6c3c
[ "Apache-2.0" ]
null
null
null
annotations: category: CertificateAuthority apiVersion: v2 appVersion: 1.7.1 dependencies: - name: common repository: https://charts.bitnami.com/bitnami tags: - bitnami-common version: 1.x.x description: Cert Manager is a Kubernetes add-on to automate the management and issuance of TLS certificates from various issuing sources. engine: gotpl home: https://github.com/jetstack/cert-manager icon: https://bitnami.com/assets/stacks/cert-manager/img/cert-manager-stack-220x234.png keywords: - go - security - tls - certificate maintainers: - email: [email protected] name: Bitnami name: cert-manager sources: - https://github.com/bitnami/bitnami-docker-cert-manager - https://github.com/bitnami/bitnami-docker-cert-manager-webhook - https://github.com/bitnami/bitnami-docker-cainjector - https://github.com/jetstack/cert-manager version: 0.4.7
29.7
138
0.753086