deploy-templates/values.yaml (60 lines of code) (raw):
# Default values for headlamp.
# This is a YAML-formatted file.
# Declare variables to be passed into your templates.
# -- Number of desired pods
replicaCount: 1
global:
# -- a cluster DNS wildcard name
dnsWildCard:
# -- platform type that can be "kubernetes" or "openshift"
platform: "kubernetes"
image:
# -- KubeRocketCI headlamp Docker image name. The released image can be found on [Dockerhub](https://hub.docker.com/r/epamedp/edp-headlamp)
repository: epamedp/edp-headlamp
# -- If not defined then .Chart.AppVersion is used
# -- KubeRocketCI headlamp Docker image tag. The released image can be found on [Dockerhub](https://hub.docker.com/r/epamedp/edp-headlamp/tags)
tag:
# -- An optional list of references to secrets in the same namespace to use for pulling any of the images used
imagePullSecrets: []
# -- Overrides the name of the chart
nameOverride: "portal"
# -- Overrides the full name of the chart
fullnameOverride: ""
config:
# -- base url path at which headlamp should run
baseURL: ""
# -- Ensure that the specified client is associated with cluster OIDC integration.
# -- For detailed instructions, refer to: https://docs.kuberocketci.io/docs/operator-guide/auth/configure-keycloak-oidc-eks, https://docs.kuberocketci.io/docs/operator-guide/auth/ui-portal-oidc
oidc:
enabled: false
# -- OIDC Issuer URL for authentication.
# -- This URL identifies the OpenID Connect provider endpoint. Examples:
# -- Keycloak: https://keycloak.example.com/auth/realms/<realm-name>
# -- Microsoft Entra: https://sts.windows.net/<tenant-id>/
issuerUrl: ""
# -- OIDC client ID
clientID: ""
# -- OIDC client secret name
clientSecretName: ""
# -- OIDC client secret key
clientSecretKey: ""
# -- OIDC scopes to be used
scopes: ""
serviceAccount:
# -- Specifies whether a service account should be created
create: true
# -- Annotations to add to the service account
annotations: {}
# -- The name of the service account to use.(If not set and create is true, a name is generated using the fullname template)
name: ""
livenessProbe:
tcpSocket:
port: 4466
initialDelaySeconds: 5
timeoutSeconds: 1
periodSeconds: 20
successThreshold: 1
failureThreshold: 5
readinessProbe:
tcpSocket:
port: 4466
initialDelaySeconds: 5
timeoutSeconds: 1
periodSeconds: 20
successThreshold: 1
failureThreshold: 5
# -- Annotations to add to the pod
podAnnotations: {}
# -- Headlamp pods' Security Context
podSecurityContext:
{}
# fsGroup: 2000
# -- Headlamp containers Security Context
securityContext:
{}
# capabilities:
# drop:
# - ALL
# readOnlyRootFilesystem: true
# runAsNonRoot: true
# runAsUser: 1000
service:
# -- Kubernetes Service type
type: ClusterIP
# -- Kubernetes Service port
port: 80
ingress:
# -- Enable external endpoint access. Default Ingress/Route host pattern: portal-{{ .Release.Namespace }}.{{ .Values.global.dnsWildCard }}
enabled: true
# -- Annotations for Ingress resource
annotations:
nginx.ingress.kubernetes.io/proxy-read-timeout: '1800'
# kubernetes.io/ingress.class: nginx
# kubernetes.io/tls-acme: "true"
# -- Ingress TLS configuration
# -- If hosts not defined the will create by pattern "portal-[namespace].[global DNS wildcard]"
tls: []
# - secretName: chart-example-tls
# hosts:
# - portal-edp.example.com
# -- Defines the base URL for the portal.
# -- If hosts not defined the will create by pattern "portal-[namespace].[global DNS wildcard]"
host: ""
# -- CPU/Memory resource requests/limits
resources:
{}
# We usually recommend not to specify default resources and to leave this as a conscious
# choice for the user. This also increases chances charts run on environments with little
# resources, such as Minikube. If you do want to specify resources, uncomment the following
# lines, adjust them as necessary, and remove the curly braces after 'resources:'.
# limits:
# cpu: 100m
# memory: 128Mi
# requests:
# cpu: 100m
# memory: 128Mi
# -- Node labels for pod assignment
nodeSelector: {}
# -- Toleration labels for pod assignment
tolerations: []
# -- Affinity settings for pod assignment
affinity: {}
# -- Additional volumes to be added to the pod
extraVolumes: []
# - name: custom-ca
# secret:
# defaultMode: 420
# secretName: custom-ca
# -- Additional volumeMounts to be added to the container
extraVolumeMounts: []
# - name: custom-ca
# mountPath: /etc/ssl/certs/CA.crt
# readOnly: true
# subPath: CA.crt