values.yaml 22 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373374375376377378379380381382383384385386387388389390391392393394395396397398399400401402403404405406407408409410411412413414415416417418419420421422423424425426427428429430431432433434435436437438439440441442443444445446447448449450451452453454455456457458459460461462463464465466467468469470471472473474475476477478479480481482483484485486487488489490491492493494495496497498499500501502503504505506507508509510511512513514515516517518519520521522523524525526527528529530531532533534535536537538539540541542543544545546547548549550551552553554555556557558559560561562563564565566567568569570571572573574575576577578579580581582583584585586587588589590591592593594595596597598599600601602603604605606607608609610611612613614615616617618619620621622623624625626627628629630631632633634635636637638639640641642643644645646647648649650651652653654655656657658659660661662663664665666667668669670671672673674675676677678679680681682683684685686687688689690691692693694695696697698699700701702703704705706707708709
  1. ---
  2. global:
  3. nodeSelector: {}
  4. tolerations: []
  5. topologySpreadConstraints: []
  6. # - maxSkew: 1
  7. # topologyKey: topology.kubernetes.io/zone
  8. # whenUnsatisfiable: ScheduleAnyway
  9. # matchLabelKeys:
  10. # - pod-template-hash
  11. # - maxSkew: 1
  12. # topologyKey: kubernetes.io/hostname
  13. # whenUnsatisfiable: DoNotSchedule
  14. # matchLabelKeys:
  15. # - pod-template-hash
  16. affinity: {}
  17. # -- Global pod labels to be applied to all deployments
  18. podLabels: {}
  19. # -- Global pod annotations to be applied to all deployments
  20. podAnnotations: {}
  21. # -- Global imagePullSecrets to be applied to all deployments
  22. imagePullSecrets: []
  23. # -- Global image repository to be applied to all deployments
  24. repository: ""
  25. compatibility:
  26. openshift:
  27. # -- Manages the securityContext properties to make them compatible with OpenShift.
  28. # Possible values:
  29. # auto - Apply configurations if it is detected that OpenShift is the target platform.
  30. # force - Always apply configurations.
  31. # disabled - No modification applied.
  32. adaptSecurityContext: auto
  33. replicaCount: 1
  34. bitwarden-sdk-server:
  35. enabled: false
  36. namespaceOverride: ""
  37. # -- Specifies the amount of historic ReplicaSets k8s should keep (see https://kubernetes.io/docs/concepts/workloads/controllers/deployment/#clean-up-policy)
  38. revisionHistoryLimit: 10
  39. image:
  40. repository: ghcr.io/external-secrets/external-secrets
  41. pullPolicy: IfNotPresent
  42. # -- The image tag to use. The default is the chart appVersion.
  43. tag: ""
  44. # -- The flavour of tag you want to use
  45. # There are different image flavours available, like distroless and ubi.
  46. # Please see GitHub release notes for image tags for these flavors.
  47. # By default, the distroless image is used.
  48. flavour: ""
  49. # -- If set, install and upgrade CRDs through helm chart.
  50. installCRDs: true
  51. crds:
  52. # -- If true, create CRDs for Cluster External Secret. If set to false you must also set processClusterExternalSecret: false.
  53. createClusterExternalSecret: true
  54. # -- If true, create CRDs for Cluster Secret Store. If set to false you must also set processClusterStore: false.
  55. createClusterSecretStore: true
  56. # -- If true, create CRDs for Secret Store. If set to false you must also set processSecretStore: false.
  57. createSecretStore: true
  58. # -- If true, create CRDs for Cluster Generator. If set to false you must also set processClusterGenerator: false.
  59. createClusterGenerator: true
  60. # -- If true, create CRDs for Cluster Push Secret. If set to false you must also set processClusterPushSecret: false.
  61. createClusterPushSecret: true
  62. # -- If true, create CRDs for Push Secret. If set to false you must also set processPushSecret: false.
  63. createPushSecret: true
  64. annotations: {}
  65. conversion:
  66. # -- Conversion is disabled by default as we stopped supporting v1alpha1.
  67. enabled: false
  68. imagePullSecrets: []
  69. nameOverride: ""
  70. fullnameOverride: ""
  71. namespaceOverride: ""
  72. # -- Additional labels added to all helm chart resources.
  73. commonLabels: {}
  74. # -- If true, external-secrets will perform leader election between instances to ensure no more
  75. # than one instance of external-secrets operates at a time.
  76. leaderElect: false
  77. # -- If set external secrets will filter matching
  78. # Secret Stores with the appropriate controller values.
  79. controllerClass: ""
  80. # -- If true external secrets will use recommended kubernetes
  81. # annotations as prometheus metric labels.
  82. extendedMetricLabels: false
  83. # -- If set external secrets are only reconciled in the
  84. # provided namespace
  85. scopedNamespace: ""
  86. # -- Must be used with scopedNamespace. If true, create scoped RBAC roles under the scoped namespace
  87. # and implicitly disable cluster stores and cluster external secrets
  88. scopedRBAC: false
  89. # -- If true the OpenShift finalizer permissions will be added to RBAC
  90. openshiftFinalizers: true
  91. # -- If true the system:auth-delegator ClusterRole will be added to RBAC
  92. systemAuthDelegator: false
  93. # -- if true, the operator will process cluster external secret. Else, it will ignore them.
  94. # When enabled, this adds update/patch permissions on namespaces to handle finalizers for proper
  95. # cleanup during namespace deletion, preventing race conditions with ExternalSecrets.
  96. processClusterExternalSecret: true
  97. # -- if true, the operator will process cluster push secret. Else, it will ignore them.
  98. processClusterPushSecret: true
  99. # -- if true, the operator will process cluster store. Else, it will ignore them.
  100. processClusterStore: true
  101. # -- if true, the operator will process secret store. Else, it will ignore them.
  102. processSecretStore: true
  103. # -- if true, the operator will process cluster generator. Else, it will ignore them.
  104. processClusterGenerator: true
  105. # -- if true, the operator will process push secret. Else, it will ignore them.
  106. processPushSecret: true
  107. # -- Enable support for generic targets (ConfigMaps, Custom Resources).
  108. # Warning: Using generic target. Make sure access policies and encryption are properly configured.
  109. # When enabled, this grants the controller permissions to create/update/delete
  110. # ConfigMaps and optionally other resource types specified in generic.resources.
  111. genericTargets:
  112. # -- Enable generic target support
  113. enabled: false
  114. # -- List of additional resource types to grant permissions for.
  115. # Each entry should specify apiGroup, resources, and verbs.
  116. # Example:
  117. # resources:
  118. # - apiGroup: "argoproj.io"
  119. # resources: ["applications"]
  120. # verbs: ["get", "list", "watch", "create", "update", "patch", "delete"]
  121. resources: []
  122. # -- Specifies whether an external secret operator deployment be created.
  123. createOperator: true
  124. # -- if true, HTTP2 will be enabled for the services created by all controllers, curently metrics and webhook.
  125. enableHTTP2: false
  126. # -- Specifies the number of concurrent ExternalSecret Reconciles external-secret executes at
  127. # a time.
  128. concurrent: 1
  129. # -- Specifies Log Params to the External Secrets Operator
  130. log:
  131. level: info
  132. timeEncoding: epoch
  133. service:
  134. # -- Set the ip family policy to configure dual-stack see [Configure dual-stack](https://kubernetes.io/docs/concepts/services-networking/dual-stack/#services)
  135. ipFamilyPolicy: ""
  136. # -- Sets the families that should be supported and the order in which they should be applied to ClusterIP as well. Can be IPv4 and/or IPv6.
  137. ipFamilies: []
  138. serviceAccount:
  139. # -- Specifies whether a service account should be created.
  140. create: true
  141. # -- Automounts the service account token in all containers of the pod
  142. automount: true
  143. # -- Annotations to add to the service account.
  144. annotations: {}
  145. # -- Extra Labels to add to the service account.
  146. extraLabels: {}
  147. # -- The name of the service account to use.
  148. # If not set and create is true, a name is generated using the fullname template.
  149. name: ""
  150. rbac:
  151. # -- Specifies whether role and rolebinding resources should be created.
  152. create: true
  153. servicebindings:
  154. # -- Specifies whether a clusterrole to give servicebindings read access should be created.
  155. create: true
  156. # -- Specifies whether permissions are aggregated to the view ClusterRole
  157. aggregateToView: true
  158. # -- Specifies whether permissions are aggregated to the edit ClusterRole
  159. aggregateToEdit: true
  160. ## -- Extra environment variables to add to container.
  161. extraEnv: []
  162. ## -- Map of extra arguments to pass to container.
  163. extraArgs: {}
  164. ## -- Extra volumes to pass to pod.
  165. extraVolumes: []
  166. ## -- Extra Kubernetes objects to deploy with the helm chart
  167. extraObjects: []
  168. ## -- Extra volumes to mount to the container.
  169. extraVolumeMounts: []
  170. ## -- Extra init containers to add to the pod.
  171. extraInitContainers: []
  172. ## -- Extra containers to add to the pod.
  173. extraContainers: []
  174. # -- Annotations to add to Deployment
  175. deploymentAnnotations: {}
  176. # -- Set deployment strategy
  177. strategy: {}
  178. # -- Annotations to add to Pod
  179. podAnnotations: {}
  180. podLabels: {}
  181. podSecurityContext:
  182. enabled: true
  183. # fsGroup: 2000
  184. securityContext:
  185. allowPrivilegeEscalation: false
  186. capabilities:
  187. drop:
  188. - ALL
  189. enabled: true
  190. readOnlyRootFilesystem: true
  191. runAsNonRoot: true
  192. runAsUser: 1000
  193. seccompProfile:
  194. type: RuntimeDefault
  195. resources: {}
  196. # requests:
  197. # cpu: 10m
  198. # memory: 32Mi
  199. serviceMonitor:
  200. # -- Specifies whether to create a ServiceMonitor resource for collecting Prometheus metrics
  201. enabled: false
  202. # -- How should we react to missing CRD "`monitoring.coreos.com/v1/ServiceMonitor`"
  203. #
  204. # Possible values:
  205. # - `skipIfMissing`: Only render ServiceMonitor resources if CRD is present, skip if missing.
  206. # - `failIfMissing`: Fail Helm install if CRD is not present.
  207. # - `alwaysRender` : Always render ServiceMonitor resources, do not check for CRD.
  208. # @schema
  209. # enum:
  210. # - skipIfMissing
  211. # - failIfMissing
  212. # - alwaysRender
  213. # @schema
  214. renderMode: skipIfMissing # @schema enum: [skipIfMissing, failIfMissing, alwaysRender]
  215. # -- namespace where you want to install ServiceMonitors
  216. namespace: ""
  217. # -- Additional labels
  218. additionalLabels: {}
  219. # -- Interval to scrape metrics
  220. interval: 30s
  221. # -- Timeout if metrics can't be retrieved in given time interval
  222. scrapeTimeout: 25s
  223. # -- Let prometheus add an exported_ prefix to conflicting labels
  224. honorLabels: false
  225. # -- Metric relabel configs to apply to samples before ingestion. [Metric Relabeling](https://prometheus.io/docs/prometheus/latest/configuration/configuration/#metric_relabel_configs)
  226. metricRelabelings: []
  227. # - action: replace
  228. # regex: (.*)
  229. # replacement: $1
  230. # sourceLabels:
  231. # - exported_namespace
  232. # targetLabel: namespace
  233. # -- Relabel configs to apply to samples before ingestion. [Relabeling](https://prometheus.io/docs/prometheus/latest/configuration/configuration/#relabel_config)
  234. relabelings: []
  235. # - sourceLabels: [__meta_kubernetes_pod_node_name]
  236. # separator: ;
  237. # regex: ^(.*)$
  238. # targetLabel: nodename
  239. # replacement: $1
  240. # action: replace
  241. metrics:
  242. listen:
  243. port: 8080
  244. secure:
  245. enabled: false
  246. # -- if those are not set or invalid, self-signed certs will be generated
  247. # -- TLS cert directory path
  248. certDir: /etc/tls
  249. # -- TLS cert file path
  250. certFile: /etc/tls/tls.crt
  251. # -- TLS key file path
  252. keyFile: /etc/tls/tls.key
  253. service:
  254. # -- Enable if you use another monitoring tool than Prometheus to scrape the metrics
  255. enabled: false
  256. # -- Metrics service port to scrape
  257. port: 8080
  258. # -- Additional service annotations
  259. annotations: {}
  260. grafanaDashboard:
  261. # -- If true creates a Grafana dashboard.
  262. enabled: false
  263. # -- Label that ConfigMaps should have to be loaded as dashboards.
  264. sidecarLabel: "grafana_dashboard"
  265. # -- Label value that ConfigMaps should have to be loaded as dashboards.
  266. sidecarLabelValue: "1"
  267. # -- Annotations that ConfigMaps can have to get configured in Grafana,
  268. # See: sidecar.dashboards.folderAnnotation for specifying the dashboard folder.
  269. # https://github.com/grafana/helm-charts/tree/main/charts/grafana
  270. annotations: {}
  271. # -- Extra labels to add to the Grafana dashboard ConfigMap.
  272. extraLabels: {}
  273. livenessProbe:
  274. # -- Enabled determines if the liveness probe should be used or not. By default it's disabled.
  275. enabled: false
  276. # -- The body of the liveness probe settings.
  277. spec:
  278. # -- Address for liveness probe.
  279. address: ""
  280. # -- Specify the maximum amount of time to wait for a probe to respond before considering it fails.
  281. timeoutSeconds: 5
  282. # -- Number of consecutive probe failures that should occur before considering the probe as failed.
  283. failureThreshold: 5
  284. # -- Period in seconds for K8s to start performing probes.
  285. periodSeconds: 10
  286. # -- Number of successful probes to mark probe successful.
  287. successThreshold: 1
  288. # -- Delay in seconds for the container to start before performing the initial probe.
  289. initialDelaySeconds: 10
  290. # -- Handler for liveness probe.
  291. httpGet:
  292. # -- Set this value to 8082 to active liveness probes.
  293. # @schema type: [string, integer]
  294. port: 8082
  295. # -- Path for liveness probe.
  296. path: /healthz
  297. nodeSelector: {}
  298. tolerations: []
  299. topologySpreadConstraints: []
  300. affinity: {}
  301. # -- Pod priority class name.
  302. priorityClassName: ""
  303. # -- Pod disruption budget - for more details see https://kubernetes.io/docs/concepts/workloads/pods/disruptions/
  304. podDisruptionBudget:
  305. enabled: false
  306. minAvailable: 1 # @schema type:[integer, string]
  307. nameOverride: ""
  308. # maxUnavailable: "50%"
  309. # -- Run the controller on the host network
  310. hostNetwork: false
  311. webhook:
  312. # -- Annotations to place on validating webhook configuration.
  313. annotations: {}
  314. # -- Specifies whether a webhook deployment be created. If set to false, crds.conversion.enabled should also be set to false otherwise the kubeapi will be hammered because the conversion is looking for a webhook endpoint.
  315. create: true
  316. # -- Specifies the time to check if the cert is valid
  317. certCheckInterval: "5m"
  318. # -- Specifies the lookaheadInterval for certificate validity
  319. lookaheadInterval: ""
  320. replicaCount: 1
  321. # -- Specifies Log Params to the Webhook
  322. log:
  323. level: info
  324. timeEncoding: epoch
  325. # -- Specifies the amount of historic ReplicaSets k8s should keep (see https://kubernetes.io/docs/concepts/workloads/controllers/deployment/#clean-up-policy)
  326. revisionHistoryLimit: 10
  327. certDir: /tmp/certs
  328. # -- Specifies whether validating webhooks should be created with failurePolicy: Fail or Ignore
  329. failurePolicy: Fail
  330. # -- Specifies if webhook pod should use hostNetwork or not.
  331. hostNetwork: false
  332. image:
  333. repository: ghcr.io/external-secrets/external-secrets
  334. pullPolicy: IfNotPresent
  335. # -- The image tag to use. The default is the chart appVersion.
  336. tag: ""
  337. # -- The flavour of tag you want to use
  338. flavour: ""
  339. imagePullSecrets: []
  340. # -- The port the webhook will listen to
  341. port: 10250
  342. serviceAccount:
  343. # -- Specifies whether a service account should be created.
  344. create: true
  345. # -- Automounts the service account token in all containers of the pod
  346. automount: true
  347. # -- Annotations to add to the service account.
  348. annotations: {}
  349. # -- Extra Labels to add to the service account.
  350. extraLabels: {}
  351. # -- The name of the service account to use.
  352. # If not set and create is true, a name is generated using the fullname template.
  353. name: ""
  354. nodeSelector: {}
  355. certManager:
  356. # -- Enabling cert-manager support will disable the built in secret and
  357. # switch to using cert-manager (installed separately) to automatically issue
  358. # and renew the webhook certificate. This chart does not install
  359. # cert-manager for you, See https://cert-manager.io/docs/
  360. enabled: false
  361. # -- Automatically add the cert-manager.io/inject-ca-from annotation to the
  362. # webhooks and CRDs. As long as you have the cert-manager CA Injector
  363. # enabled, this will automatically setup your webhook's CA to the one used
  364. # by cert-manager. See https://cert-manager.io/docs/concepts/ca-injector
  365. addInjectorAnnotations: true
  366. cert:
  367. # -- Create a certificate resource within this chart. See
  368. # https://cert-manager.io/docs/usage/certificate/
  369. create: true
  370. # -- For the Certificate created by this chart, setup the issuer. See
  371. # https://cert-manager.io/docs/reference/api-docs/#cert-manager.io/v1.IssuerSpec
  372. issuerRef:
  373. group: cert-manager.io
  374. kind: "Issuer"
  375. name: "my-issuer"
  376. # -- Set the requested duration (i.e. lifetime) of the Certificate. See
  377. # https://cert-manager.io/docs/reference/api-docs/#cert-manager.io/v1.CertificateSpec
  378. # One year by default.
  379. duration: "8760h0m0s"
  380. # -- Set the revisionHistoryLimit on the Certificate. See
  381. # https://cert-manager.io/docs/reference/api-docs/#cert-manager.io/v1.CertificateSpec
  382. # Defaults to 0 (ignored).
  383. revisionHistoryLimit: 0
  384. # -- How long before the currently issued certificate’s expiry
  385. # cert-manager should renew the certificate. See
  386. # https://cert-manager.io/docs/reference/api-docs/#cert-manager.io/v1.CertificateSpec
  387. # Note that renewBefore should be greater than .webhook.lookaheadInterval
  388. # since the webhook will check this far in advance that the certificate is
  389. # valid.
  390. renewBefore: ""
  391. # -- Add extra annotations to the Certificate resource.
  392. annotations: {}
  393. tolerations: []
  394. topologySpreadConstraints: []
  395. affinity: {}
  396. # -- Set deployment strategy
  397. strategy: {}
  398. # -- Pod priority class name.
  399. priorityClassName: ""
  400. # -- Pod disruption budget - for more details see https://kubernetes.io/docs/concepts/workloads/pods/disruptions/
  401. podDisruptionBudget:
  402. enabled: false
  403. minAvailable: 1 # @schema type:[integer, string]
  404. nameOverride: ""
  405. # maxUnavailable: "50%"
  406. metrics:
  407. listen:
  408. port: 8080
  409. service:
  410. # -- Enable if you use another monitoring tool than Prometheus to scrape the metrics
  411. enabled: false
  412. # -- Metrics service port to scrape
  413. port: 8080
  414. # -- Additional service annotations
  415. annotations: {}
  416. readinessProbe:
  417. # -- Address for readiness probe
  418. address: ""
  419. # -- ReadinessProbe port for kubelet
  420. port: 8081
  421. ## -- Extra environment variables to add to container.
  422. extraEnv: []
  423. ## -- Map of extra arguments to pass to container.
  424. extraArgs: {}
  425. ## -- Extra init containers to add to the pod.
  426. extraInitContainers: []
  427. ## -- Extra volumes to pass to pod.
  428. extraVolumes: []
  429. ## -- Extra volumes to mount to the container.
  430. extraVolumeMounts: []
  431. # -- Annotations to add to Secret
  432. secretAnnotations: {}
  433. # -- Annotations to add to Deployment
  434. deploymentAnnotations: {}
  435. # -- Annotations to add to Pod
  436. podAnnotations: {}
  437. podLabels: {}
  438. podSecurityContext:
  439. enabled: true
  440. # fsGroup: 2000
  441. securityContext:
  442. allowPrivilegeEscalation: false
  443. capabilities:
  444. drop:
  445. - ALL
  446. enabled: true
  447. readOnlyRootFilesystem: true
  448. runAsNonRoot: true
  449. runAsUser: 1000
  450. seccompProfile:
  451. type: RuntimeDefault
  452. resources: {}
  453. # requests:
  454. # cpu: 10m
  455. # memory: 32Mi
  456. # -- Manage the service through which the webhook is reached.
  457. service:
  458. # -- Whether the service object should be enabled or not (it is expected to exist).
  459. enabled: true
  460. # -- Custom annotations for the webhook service.
  461. annotations: {}
  462. # -- Custom labels for the webhook service.
  463. labels: {}
  464. # -- The service type of the webhook service.
  465. type: ClusterIP
  466. # -- If the webhook service type is LoadBalancer, you can assign a specific load balancer IP here.
  467. # Check the documentation of your load balancer provider to see if/how this should be used.
  468. loadBalancerIP: ""
  469. certController:
  470. # -- Specifies whether a certificate controller deployment be created.
  471. create: true
  472. requeueInterval: "5m"
  473. replicaCount: 1
  474. # -- Specifies Log Params to the Certificate Controller
  475. log:
  476. level: info
  477. timeEncoding: epoch
  478. # -- Specifies the amount of historic ReplicaSets k8s should keep (see https://kubernetes.io/docs/concepts/workloads/controllers/deployment/#clean-up-policy)
  479. revisionHistoryLimit: 10
  480. image:
  481. repository: ghcr.io/external-secrets/external-secrets
  482. pullPolicy: IfNotPresent
  483. tag: ""
  484. flavour: ""
  485. imagePullSecrets: []
  486. rbac:
  487. # -- Specifies whether role and rolebinding resources should be created.
  488. create: true
  489. serviceAccount:
  490. # -- Specifies whether a service account should be created.
  491. create: true
  492. # -- Automounts the service account token in all containers of the pod
  493. automount: true
  494. # -- Annotations to add to the service account.
  495. annotations: {}
  496. # -- Extra Labels to add to the service account.
  497. extraLabels: {}
  498. # -- The name of the service account to use.
  499. # If not set and create is true, a name is generated using the fullname template.
  500. name: ""
  501. nodeSelector: {}
  502. tolerations: []
  503. topologySpreadConstraints: []
  504. affinity: {}
  505. # -- Set deployment strategy
  506. strategy: {}
  507. # -- Run the certController on the host network
  508. hostNetwork: false
  509. # -- Pod priority class name.
  510. priorityClassName: ""
  511. # -- Pod disruption budget - for more details see https://kubernetes.io/docs/concepts/workloads/pods/disruptions/
  512. podDisruptionBudget:
  513. enabled: false
  514. minAvailable: 1 # @schema type:[integer, string]
  515. nameOverride: ""
  516. # maxUnavailable: "50%"
  517. metrics:
  518. listen:
  519. port: 8080
  520. service:
  521. # -- Enable if you use another monitoring tool than Prometheus to scrape the metrics
  522. enabled: false
  523. # -- Metrics service port to scrape
  524. port: 8080
  525. # -- Additional service annotations
  526. annotations: {}
  527. readinessProbe:
  528. # -- Address for readiness probe
  529. address: ""
  530. # -- ReadinessProbe port for kubelet
  531. port: 8081
  532. startupProbe:
  533. # -- Enabled determines if the startup probe should be used or not. By default it's enabled
  534. enabled: false
  535. # -- whether to use the readiness probe port for startup probe.
  536. useReadinessProbePort: true
  537. # -- Port for startup probe.
  538. port: ""
  539. ## -- Extra environment variables to add to container.
  540. extraEnv: []
  541. ## -- Map of extra arguments to pass to container.
  542. extraArgs: {}
  543. ## -- Extra init containers to add to the pod.
  544. extraInitContainers: []
  545. ## -- Extra volumes to pass to pod.
  546. extraVolumes: []
  547. ## -- Extra volumes to mount to the container.
  548. extraVolumeMounts: []
  549. # -- Annotations to add to Deployment
  550. deploymentAnnotations: {}
  551. # -- Annotations to add to Pod
  552. podAnnotations: {}
  553. podLabels: {}
  554. podSecurityContext:
  555. enabled: true
  556. # fsGroup: 2000
  557. securityContext:
  558. allowPrivilegeEscalation: false
  559. capabilities:
  560. drop:
  561. - ALL
  562. enabled: true
  563. readOnlyRootFilesystem: true
  564. runAsNonRoot: true
  565. runAsUser: 1000
  566. seccompProfile:
  567. type: RuntimeDefault
  568. resources: {}
  569. # requests:
  570. # cpu: 10m
  571. # memory: 32Mi
  572. # -- Specifies `dnsPolicy` to deployment
  573. dnsPolicy: ClusterFirst
  574. # -- Specifies `dnsOptions` to deployment
  575. dnsConfig: {}
  576. # -- Any extra pod spec on the deployment
  577. podSpecExtra: {}