deploy-templates/values-no-ingress.yaml (94 lines of code) (raw):
# This configuration file is designed for deploying and configuring the EPAM Delivery Platform (EDP) on Kubernetes.
# It includes settings for global properties, CD pipeline operator, Portal (a UI component), and Tekton for CI/CD.
# The configuration demonstrates a use-case where ingress is disabled, preferring alternative traffic routing solutions.
# Consult the EDP documentation (https://epam.github.io/edp-install/) for more information on configuration options and deployment strategies.
global:
# Specifies the version of EDP to be installed.
version: "3.8.1"
# The target platform for the EDP installation. In this case, Kubernetes.
platform: "kubernetes"
# The wildcard DNS to be used for all EDP services.
dnsWildCard: "example.com"
# List of supported Git providers. Additional providers can be added as needed.
gitProviders:
- gitlab
# Configuration for the Docker registry to be used with EDP.
dockerRegistry:
url: "registry.example.com"
type: "harbor"
# Defines the namespace or "space" within the Docker registry where EDP-related images are stored.
space: "edp"
# Configuration for the CD pipeline operator, responsible for managing CD pipelines within EDP.
cd-pipeline-operator:
# Specifies the tenancy engine to be used. In this case, "capsule" for Kubernetes namespace management.
tenancyEngine: "capsule"
# Determines whether the operator should manage Kubernetes namespaces.
manageNamespace: true
# Defines the secret manager to be used. Here, "own" indicates CDPipeline Operator will perform this action.
secretManager: "own"
# Configuration for EDP Headlamp, the user interface component of EDP.
edp-headlamp:
# Enables the EDP Headlamp component.
enabled: true
ingress:
# Disables the default ingress for EDP Headlamp, allowing for alternative traffic routing methods.
enabled: false
config:
# Configuration for OpenID Connect (OIDC) authentication.
oidc:
enabled: true
# -- OIDC Issuer URL for authentication.
# -- This URL identifies the OpenID Connect provider endpoint. Examples:
# -- Keycloak: https://keycloak.example.com/auth/realms/<realm-name>
# -- Azure Entra: https://sts.windows.net/<tenant-id>/
issuerUrl: "https://keycloak.example.com/auth/realms/broker"
# The client ID for EDP Headlamp registered in Keycloak.
clientID: "edp"
# The Kubernetes secret containing the OIDC client secret.
clientSecretName: "keycloak-client-headlamp-secret"
# The key within the Kubernetes secret where the client secret is stored.
clientSecretKey: "clientSecret"
# Configuration for Tekton, used for continuous integration and delivery within EDP.
edp-tekton:
dashboard:
ingress:
# Disables the default ingress for the Tekton Dashboard, again allowing for alternative traffic routing methods.
enabled: false
gitServers:
gitlab:
gitProvider: gitlab
host: git.example.com
webhook:
# The URL where GitLab webhooks should be sent. This should be routed appropriately in your environment.
url: https://event-listener-gitlab.example.com
# Determines whether SSL verification should be skipped for webhooks. For production, it's recommended to enable verification.
skipWebhookSSLVerification: false
eventListener:
# Enables the Tekton EventListener, which triggers pipelines based on GitLab webhook events.
enabled: true
resources:
# Specifies the resource requests and limits for the EventListener pod.
requests:
memory: "64Mi"
cpu: "50m"
limits:
memory: "128Mi"
cpu: "500m"
ingress:
# Disables default ingress for the EventListener, necessitating alternative routing strategies.
enabled: false
# -- Array of extra K8s manifests to deploy
extraObjects:
- apiVersion: gateway.networking.k8s.io/v1beta1
kind: HTTPRoute
metadata:
name: event-listener-gitlab
spec:
hostnames:
- event-listener-gitlab.example.com
parentRefs:
- group: gateway.networking.k8s.io
kind: Gateway
name: internal
namespace: your-gateway-ns
rules:
- backendRefs:
- group: ''
kind: Service
name: el-edp-gitlab
port: 8080
weight: 1
matches:
- path:
type: PathPrefix
value: "/"
- apiVersion: gateway.networking.k8s.io/v1beta1
kind: HTTPRoute
metadata:
name: portal
spec:
hostnames:
- portal.example.com
parentRefs:
- group: gateway.networking.k8s.io
kind: Gateway
name: internal
namespace: your-gateway-ns
rules:
- backendRefs:
- group: ''
kind: Service
name: portal
port: 80
weight: 1
matches:
- path:
type: PathPrefix
value: "/"