clusters/core/addons/report-portal/values.yaml (85 lines of code) (raw):

reportportal: serviceindex: resources: requests: cpu: 50m uat: resources: requests: cpu: 50m serviceui: resources: requests: cpu: 50m serviceapi: resources: requests: cpu: 50m serviceanalyzer: resources: requests: cpu: 50m serviceanalyzertrain: resources: requests: cpu: 50m rabbitmq: SecretName: "reportportal-rabbitmq-creds" endpoint: address: report-portal-rabbitmq.report-portal.svc.cluster.local user: user apiuser: user postgresql: SecretName: "reportportal-postgresql-creds" endpoint: address: reportportal-primary.report-portal.svc.cluster.local elasticsearch: endpoint: opensearch-cluster-master.report-portal.svc.cluster.local:9200 storage: type: minio secretName: "reportportal-minio-creds" accesskeyName: "root-user" secretkeyName: "root-password" endpoint: http://report-portal-minio.report-portal.svc.cluster.local:9000 endpointshort: report-portal-minio.report-portal.svc.cluster.local:9000 ingress: # IF YOU HAVE SOME DOMAIN NAME SET INGRESS.USEDOMAINNAME to true and redefine url usedomainname: true hosts: - report-portal.example.com minio: auth: existingSecret: reportportal-minio-creds persistence: size: 1Gi rabbitmq: auth: existingPasswordSecret: reportportal-rabbitmq-creds existingErlangSecret: reportportal-rabbitmq-creds persistence: size: 1Gi opensearch: singleNode: true startupProbe: initialDelaySeconds: 45 extraEnvs: - name: DISABLE_INSTALL_DEMO_CONFIG value: "true" - name: DISABLE_SECURITY_PLUGIN value: "true" resources: requests: cpu: "100m" memory: "2Gi" persistence: size: 3Gi # Enable SAML authentication via Keycloak. # Note: Enabling SAML authentication also requires the keycloak-operator to process Keycloak resources. # For detailed instructions on setting up SAML authentication for report-portal, refer to: # https://docs.kuberocketci.io/docs/operator-guide/project-management-and-reporting/reportportal-keycloak saml: enabled: false # This section enables configuration for using External Secrets Operator (ESO) as the secret manager. # Prerequisite: Ensure that ESO is installed in the cluster. # Refer to the EDP cluster add-on for ESO installation and setup: # https://github.com/epam/edp-cluster-add-ons/tree/main/clusters/core/addons/external-secrets # # Ensure that you have created the necessary roles for ESO integration. # Follow the detailed instructions here: # https://docs.kuberocketci.io/docs/operator-guide/secrets-management/external-secrets-operator-integration#aws-parameter-store-scenario-in-kuberocketci eso: # -- Install components of the ESO. enabled: true # -- Defines provider type. One of `aws` or `generic`. type: "aws" # -- Defines Secret Store name. secretStoreName: "aws-parameterstore" # -- Value name in AWS ParameterStore, AWS SecretsManager or other Secret Store. secretName: "/infra/core/addons/reportportal" # -- Role ARN for the ExternalSecretOperator to assume. roleArn: arn:aws:iam::012345678910:role/AWSIRSA_Shared_ExternalSecretOperatorAccess # Defines Secret Store configuration. Used when eso.type is set to "generic". generic: secretStore: # -- Defines SecretStore provider configuration. providerConfig: {} # gcpsm: # projectID: "alphabet-123"