values.yaml 25 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373374375376377378379380381382383384385386387388389390391392393394395396397398399400401402403404405406407408409410411412413414415416417418419420421422423424425426427428429430431432433434435436437438439440441442443444445446447448449450451452453454455456457458459460461462463464465466467468469470471472473474475476477478479480481482483484485486487488489490491492493494495496497498499500501502503504505506507508509510511512513514515516517518519520521522523524525526527528529530531532533534535536537538539540541542543544545546547548549550551552553554555556557558559560561562563564565566567568569570571572573574575576577578579580581582583584585586587588589590591592593594595596597598599600601602603604605606607608609610611612613614615616617618619620621622623624625626627628629630631632633634635636637638639640641642643644645646647648649650651652653654655656657658659660661662663664665666667668669670671672673674675676677678679680681682683684685686687688689690691692693694695696697698699700701702703704705706707708709710711712713714715716717718719720721722723724725726727728729730731732733734735736737738739740741742743744745746747748749750751752753754755756757758759760761762763764765766767768769770771772773774
  1. ---
  2. global:
  3. nodeSelector: {}
  4. tolerations: []
  5. topologySpreadConstraints: []
  6. # - maxSkew: 1
  7. # topologyKey: topology.kubernetes.io/zone
  8. # whenUnsatisfiable: ScheduleAnyway
  9. # matchLabelKeys:
  10. # - pod-template-hash
  11. # - maxSkew: 1
  12. # topologyKey: kubernetes.io/hostname
  13. # whenUnsatisfiable: DoNotSchedule
  14. # matchLabelKeys:
  15. # - pod-template-hash
  16. affinity: {}
  17. # -- Global hostAliases to be applied to all deployments
  18. hostAliases: []
  19. # -- Global pod labels to be applied to all deployments
  20. podLabels: {}
  21. # -- Global pod annotations to be applied to all deployments
  22. podAnnotations: {}
  23. # -- Global imagePullSecrets to be applied to all deployments
  24. imagePullSecrets: []
  25. # -- Global image repository to be applied to all deployments
  26. repository: ""
  27. compatibility:
  28. openshift:
  29. # -- Manages the securityContext properties to make them compatible with OpenShift.
  30. # Possible values:
  31. # auto - Apply configurations if it is detected that OpenShift is the target platform.
  32. # force - Always apply configurations.
  33. # disabled - No modification applied.
  34. adaptSecurityContext: auto
  35. replicaCount: 1
  36. bitwarden-sdk-server:
  37. enabled: false
  38. namespaceOverride: ""
  39. # -- Specifies the amount of historic ReplicaSets k8s should keep (see https://kubernetes.io/docs/concepts/workloads/controllers/deployment/#clean-up-policy)
  40. revisionHistoryLimit: 10
  41. image:
  42. repository: ghcr.io/external-secrets/external-secrets
  43. pullPolicy: IfNotPresent
  44. # -- The image tag to use. The default is the chart appVersion.
  45. tag: ""
  46. # -- The flavour of tag you want to use
  47. # There are different image flavours available, like distroless and ubi.
  48. # Please see GitHub release notes for image tags for these flavors.
  49. # By default, the distroless image is used.
  50. flavour: ""
  51. # -- If set, install and upgrade CRDs through helm chart.
  52. installCRDs: true
  53. crds:
  54. # -- If true, create CRDs for Cluster External Secret. If set to false you must also set processClusterExternalSecret: false.
  55. createClusterExternalSecret: true
  56. # -- If true, create CRDs for Cluster Secret Store. If set to false you must also set processClusterStore: false.
  57. createClusterSecretStore: true
  58. # -- If true, create CRDs for Secret Store. If set to false you must also set processSecretStore: false.
  59. createSecretStore: true
  60. # -- If true, create CRDs for Cluster Generator. If set to false you must also set processClusterGenerator: false.
  61. createClusterGenerator: true
  62. # -- If true, create CRDs for Cluster Push Secret. If set to false you must also set processClusterPushSecret: false.
  63. createClusterPushSecret: true
  64. # -- If true, create CRDs for Push Secret. If set to false you must also set processPushSecret: false.
  65. createPushSecret: true
  66. annotations: {}
  67. conversion:
  68. # -- Conversion is disabled by default as we stopped supporting v1alpha1.
  69. enabled: false
  70. # -- If true, enable v1beta1 API version serving for ExternalSecret, ClusterExternalSecret, SecretStore, and ClusterSecretStore CRDs.
  71. # v1beta1 is deprecated. Only enable this for backward compatibility if you have existing v1beta1 resources.
  72. # Warning: This flag will be removed on 2026.05.01.
  73. unsafeServeV1Beta1: false
  74. imagePullSecrets: []
  75. nameOverride: ""
  76. fullnameOverride: ""
  77. namespaceOverride: ""
  78. # -- Additional labels added to all helm chart resources.
  79. commonLabels: {}
  80. # -- If true, external-secrets will perform leader election between instances to ensure no more
  81. # than one instance of external-secrets operates at a time.
  82. leaderElect: false
  83. # -- If set external secrets will filter matching
  84. # Secret Stores with the appropriate controller values.
  85. controllerClass: ""
  86. # -- If true external secrets will use recommended kubernetes
  87. # annotations as prometheus metric labels.
  88. extendedMetricLabels: false
  89. # -- If set external secrets are only reconciled in the
  90. # provided namespace
  91. scopedNamespace: ""
  92. # -- Must be used with scopedNamespace. If true, create scoped RBAC roles under the scoped namespace
  93. # and implicitly disable cluster stores and cluster external secrets
  94. scopedRBAC: false
  95. # -- If true the OpenShift finalizer permissions will be added to RBAC
  96. openshiftFinalizers: true
  97. # -- If true the system:auth-delegator ClusterRole will be added to RBAC
  98. systemAuthDelegator: false
  99. # -- if true, the operator will process cluster external secret. Else, it will ignore them.
  100. # When enabled, this adds update/patch permissions on namespaces to handle finalizers for proper
  101. # cleanup during namespace deletion, preventing race conditions with ExternalSecrets.
  102. processClusterExternalSecret: true
  103. # -- if true, the operator will process cluster push secret. Else, it will ignore them.
  104. processClusterPushSecret: true
  105. # -- if true, the operator will process cluster store. Else, it will ignore them.
  106. processClusterStore: true
  107. # -- if true, the operator will process secret store. Else, it will ignore them.
  108. processSecretStore: true
  109. # -- if true, the operator will process cluster generator. Else, it will ignore them.
  110. processClusterGenerator: true
  111. # -- if true, the operator will process push secret. Else, it will ignore them.
  112. processPushSecret: true
  113. # -- Enable support for generic targets (ConfigMaps, Custom Resources).
  114. # Warning: Using generic target. Make sure access policies and encryption are properly configured.
  115. # When enabled, this grants the controller permissions to create/update/delete
  116. # ConfigMaps and optionally other resource types specified in generic.resources.
  117. genericTargets:
  118. # -- Enable generic target support
  119. enabled: false
  120. # -- List of additional resource types to grant permissions for.
  121. # Each entry should specify apiGroup, resources, and verbs.
  122. # Example:
  123. # resources:
  124. # - apiGroup: "argoproj.io"
  125. # resources: ["applications"]
  126. # verbs: ["get", "list", "watch", "create", "update", "patch", "delete"]
  127. resources: []
  128. # -- Specifies whether an external secret operator deployment be created.
  129. createOperator: true
  130. # -- if true, HTTP2 will be enabled for the services created by all controllers, curently metrics and webhook.
  131. enableHTTP2: false
  132. # -- Vault token cache configuration
  133. vault:
  134. # -- Enable Vault token cache. External secrets will reuse the Vault token without creating a new one on each request.
  135. enableTokenCache: false
  136. # -- Maximum size of Vault token cache. Only used if enableTokenCache is true.
  137. tokenCacheSize: 262144
  138. # -- Specifies the number of concurrent ExternalSecret Reconciles external-secret executes at
  139. # a time.
  140. concurrent: 1
  141. # -- Specifies Log Params to the External Secrets Operator
  142. log:
  143. level: info
  144. timeEncoding: epoch
  145. service:
  146. # -- Set the ip family policy to configure dual-stack see [Configure dual-stack](https://kubernetes.io/docs/concepts/services-networking/dual-stack/#services)
  147. ipFamilyPolicy: ""
  148. # -- Sets the families that should be supported and the order in which they should be applied to ClusterIP as well. Can be IPv4 and/or IPv6.
  149. ipFamilies: []
  150. serviceAccount:
  151. # -- Specifies whether a service account should be created.
  152. create: true
  153. # -- Automounts the service account token in all containers of the pod
  154. automount: true
  155. # -- Annotations to add to the service account.
  156. annotations: {}
  157. # -- Extra Labels to add to the service account.
  158. extraLabels: {}
  159. # -- The name of the service account to use.
  160. # If not set and create is true, a name is generated using the fullname template.
  161. name: ""
  162. rbac:
  163. # -- Specifies whether role and rolebinding resources should be created.
  164. create: true
  165. servicebindings:
  166. # -- Specifies whether a clusterrole to give servicebindings read access should be created.
  167. create: true
  168. # -- Specifies whether permissions are aggregated to the view ClusterRole
  169. aggregateToView: true
  170. # -- Specifies whether permissions are aggregated to the edit ClusterRole
  171. aggregateToEdit: true
  172. ## -- Extra environment variables to add to container.
  173. extraEnv: []
  174. ## -- Map of extra arguments to pass to container.
  175. extraArgs: {}
  176. ## -- Extra volumes to pass to pod.
  177. extraVolumes: []
  178. ## -- Extra Kubernetes objects to deploy with the helm chart
  179. extraObjects: []
  180. ## -- Extra volumes to mount to the container.
  181. extraVolumeMounts: []
  182. ## -- Extra init containers to add to the pod.
  183. extraInitContainers: []
  184. ## -- Extra containers to add to the pod.
  185. extraContainers: []
  186. # -- Annotations to add to Deployment
  187. deploymentAnnotations: {}
  188. # -- Set deployment strategy
  189. strategy: {}
  190. # -- Annotations to add to Pod
  191. podAnnotations: {}
  192. podLabels: {}
  193. podSecurityContext:
  194. enabled: true
  195. # fsGroup: 2000
  196. securityContext:
  197. allowPrivilegeEscalation: false
  198. capabilities:
  199. drop:
  200. - ALL
  201. enabled: true
  202. readOnlyRootFilesystem: true
  203. runAsNonRoot: true
  204. runAsUser: 1000
  205. seccompProfile:
  206. type: RuntimeDefault
  207. resources: {}
  208. # requests:
  209. # cpu: 10m
  210. # memory: 32Mi
  211. serviceMonitor:
  212. # -- Specifies whether to create a ServiceMonitor resource for collecting Prometheus metrics
  213. enabled: false
  214. # -- How should we react to missing CRD "`monitoring.coreos.com/v1/ServiceMonitor`"
  215. #
  216. # Possible values:
  217. # - `skipIfMissing`: Only render ServiceMonitor resources if CRD is present, skip if missing.
  218. # - `failIfMissing`: Fail Helm install if CRD is not present.
  219. # - `alwaysRender` : Always render ServiceMonitor resources, do not check for CRD.
  220. # @schema
  221. # enum:
  222. # - skipIfMissing
  223. # - failIfMissing
  224. # - alwaysRender
  225. # @schema
  226. renderMode: skipIfMissing # @schema enum: [skipIfMissing, failIfMissing, alwaysRender]
  227. # -- namespace where you want to install ServiceMonitors
  228. namespace: ""
  229. # -- Additional labels
  230. additionalLabels: {}
  231. # -- Interval to scrape metrics
  232. interval: 30s
  233. # -- Timeout if metrics can't be retrieved in given time interval
  234. scrapeTimeout: 25s
  235. # -- Let prometheus add an exported_ prefix to conflicting labels
  236. honorLabels: false
  237. # -- Metric relabel configs to apply to samples before ingestion. [Metric Relabeling](https://prometheus.io/docs/prometheus/latest/configuration/configuration/#metric_relabel_configs)
  238. metricRelabelings: []
  239. # - action: replace
  240. # regex: (.*)
  241. # replacement: $1
  242. # sourceLabels:
  243. # - exported_namespace
  244. # targetLabel: namespace
  245. # -- Relabel configs to apply to samples before ingestion. [Relabeling](https://prometheus.io/docs/prometheus/latest/configuration/configuration/#relabel_config)
  246. relabelings: []
  247. # - sourceLabels: [__meta_kubernetes_pod_node_name]
  248. # separator: ;
  249. # regex: ^(.*)$
  250. # targetLabel: nodename
  251. # replacement: $1
  252. # action: replace
  253. metrics:
  254. listen:
  255. port: 8080
  256. secure:
  257. enabled: false
  258. # -- if those are not set or invalid, self-signed certs will be generated
  259. # -- TLS cert directory path
  260. certDir: /etc/tls
  261. # -- TLS cert file path
  262. certFile: /etc/tls/tls.crt
  263. # -- TLS key file path
  264. keyFile: /etc/tls/tls.key
  265. service:
  266. # -- Enable if you use another monitoring tool than Prometheus to scrape the metrics
  267. enabled: false
  268. # -- Metrics service port to scrape
  269. port: 8080
  270. # -- Additional service annotations
  271. annotations: {}
  272. grafanaDashboard:
  273. # -- If true creates a Grafana dashboard.
  274. enabled: false
  275. # -- Label that ConfigMaps should have to be loaded as dashboards.
  276. sidecarLabel: "grafana_dashboard"
  277. # -- Label value that ConfigMaps should have to be loaded as dashboards.
  278. sidecarLabelValue: "1"
  279. # -- Annotations that ConfigMaps can have to get configured in Grafana,
  280. # See: sidecar.dashboards.folderAnnotation for specifying the dashboard folder.
  281. # https://github.com/grafana/helm-charts/tree/main/charts/grafana
  282. annotations: {}
  283. # -- Extra labels to add to the Grafana dashboard ConfigMap.
  284. extraLabels: {}
  285. livenessProbe:
  286. # -- Enabled determines if the liveness probe should be used or not. By default it's disabled.
  287. enabled: false
  288. # -- The body of the liveness probe settings.
  289. spec:
  290. # -- Bind address for the health server used by both liveness and readiness probes (--live-addr flag).
  291. address: ""
  292. # -- Port for the health server used by both liveness and readiness probes (--live-addr flag).
  293. port: 8082
  294. # -- Specify the maximum amount of time to wait for a probe to respond before considering it fails.
  295. timeoutSeconds: 5
  296. # -- Number of consecutive probe failures that should occur before considering the probe as failed.
  297. failureThreshold: 5
  298. # -- Period in seconds for K8s to start performing probes.
  299. periodSeconds: 10
  300. # -- Number of successful probes to mark probe successful.
  301. successThreshold: 1
  302. # -- Delay in seconds for the container to start before performing the initial probe.
  303. initialDelaySeconds: 10
  304. # -- Handler for liveness probe.
  305. httpGet:
  306. # -- Set this value to 'live' (for named port) or an an integer for liveness probes.
  307. # @schema type: [string, integer]
  308. port: live
  309. # -- Path for liveness probe.
  310. path: /healthz
  311. readinessProbe:
  312. # -- Determines whether the readiness probe is enabled. Disabled by default. Enabling this will auto-start the health server (--live-addr) even if livenessProbe is disabled. Health server address/port are configured via livenessProbe.spec.address and livenessProbe.spec.port.
  313. enabled: false
  314. # -- The body of the readiness probe settings (standard Kubernetes probe spec).
  315. spec:
  316. # -- Specify the maximum amount of time to wait for a probe to respond before considering it fails.
  317. timeoutSeconds: 5
  318. # -- Number of consecutive probe failures that should occur before considering the probe as failed.
  319. failureThreshold: 3
  320. # -- Period in seconds for K8s to start performing probes.
  321. periodSeconds: 10
  322. # -- Number of successful probes to mark probe successful.
  323. successThreshold: 1
  324. # -- Delay in seconds for the container to start before performing the initial probe.
  325. initialDelaySeconds: 10
  326. # -- Handler for readiness probe.
  327. httpGet:
  328. # -- Set this value to 'live' (for named port) or an integer for readiness probes.
  329. # @schema type: [string, integer]
  330. port: live
  331. # -- Path for readiness probe.
  332. path: /readyz
  333. nodeSelector: {}
  334. tolerations: []
  335. topologySpreadConstraints: []
  336. affinity: {}
  337. # -- Pod priority class name.
  338. priorityClassName: ""
  339. # -- Pod disruption budget - for more details see https://kubernetes.io/docs/concepts/workloads/pods/disruptions/
  340. podDisruptionBudget:
  341. enabled: false
  342. minAvailable: 1 # @schema type:[integer, string]
  343. nameOverride: ""
  344. # maxUnavailable: "50%"
  345. # -- Run the controller on the host network
  346. hostNetwork: false
  347. # -- (bool) Specifies if controller pod should use hostUsers or not. If hostNetwork is true, hostUsers should be too. Only available in Kubernetes ≥ 1.33.
  348. # @schema type: [boolean, null]
  349. hostUsers:
  350. webhook:
  351. # -- Annotations to place on validating webhook configuration.
  352. annotations: {}
  353. # -- Specifies whether a webhook deployment be created. If set to false, crds.conversion.enabled should also be set to false otherwise the kubeapi will be hammered because the conversion is looking for a webhook endpoint.
  354. create: true
  355. # -- Specifies the time to check if the cert is valid
  356. certCheckInterval: "5m"
  357. # -- Specifies the lookaheadInterval for certificate validity
  358. lookaheadInterval: ""
  359. replicaCount: 1
  360. # -- Specifies Log Params to the Webhook
  361. log:
  362. level: info
  363. timeEncoding: epoch
  364. # -- Specifies the amount of historic ReplicaSets k8s should keep (see https://kubernetes.io/docs/concepts/workloads/controllers/deployment/#clean-up-policy)
  365. revisionHistoryLimit: 10
  366. certDir: /tmp/certs
  367. # -- Specifies whether validating webhooks should be created with failurePolicy: Fail or Ignore
  368. failurePolicy: Fail
  369. # -- Specifies if webhook pod should use hostNetwork or not.
  370. hostNetwork: false
  371. # -- (bool) Specifies if webhook pod should use hostUsers or not. If hostNetwork is true, hostUsers should be too. Only available in Kubernetes ≥ 1.33.
  372. # @schema type: [boolean, null]
  373. hostUsers:
  374. image:
  375. repository: ghcr.io/external-secrets/external-secrets
  376. pullPolicy: IfNotPresent
  377. # -- The image tag to use. The default is the chart appVersion.
  378. tag: ""
  379. # -- The flavour of tag you want to use
  380. flavour: ""
  381. imagePullSecrets: []
  382. # -- The port the webhook will listen to
  383. port: 10250
  384. serviceAccount:
  385. # -- Specifies whether a service account should be created.
  386. create: true
  387. # -- Automounts the service account token in all containers of the pod
  388. automount: true
  389. # -- Annotations to add to the service account.
  390. annotations: {}
  391. # -- Extra Labels to add to the service account.
  392. extraLabels: {}
  393. # -- The name of the service account to use.
  394. # If not set and create is true, a name is generated using the fullname template.
  395. name: ""
  396. nodeSelector: {}
  397. # -- Specifies `hostAliases` to webhook deployment
  398. hostAliases: []
  399. certManager:
  400. # -- Enabling cert-manager support will disable the built in secret and
  401. # switch to using cert-manager (installed separately) to automatically issue
  402. # and renew the webhook certificate. This chart does not install
  403. # cert-manager for you, See https://cert-manager.io/docs/
  404. enabled: false
  405. # -- Automatically add the cert-manager.io/inject-ca-from annotation to the
  406. # webhooks and CRDs. As long as you have the cert-manager CA Injector
  407. # enabled, this will automatically setup your webhook's CA to the one used
  408. # by cert-manager. See https://cert-manager.io/docs/concepts/ca-injector
  409. addInjectorAnnotations: true
  410. cert:
  411. # -- Create a certificate resource within this chart. See
  412. # https://cert-manager.io/docs/usage/certificate/
  413. create: true
  414. # -- For the Certificate created by this chart, setup the issuer. See
  415. # https://cert-manager.io/docs/reference/api-docs/#cert-manager.io/v1.IssuerSpec
  416. issuerRef:
  417. group: cert-manager.io
  418. kind: "Issuer"
  419. name: "my-issuer"
  420. # -- Set the requested duration (i.e. lifetime) of the Certificate. See
  421. # https://cert-manager.io/docs/reference/api-docs/#cert-manager.io/v1.CertificateSpec
  422. # One year by default.
  423. duration: "8760h0m0s"
  424. # -- Set the revisionHistoryLimit on the Certificate. See
  425. # https://cert-manager.io/docs/reference/api-docs/#cert-manager.io/v1.CertificateSpec
  426. # Defaults to 0 (ignored).
  427. revisionHistoryLimit: 0
  428. # -- How long before the currently issued certificate’s expiry
  429. # cert-manager should renew the certificate. See
  430. # https://cert-manager.io/docs/reference/api-docs/#cert-manager.io/v1.CertificateSpec
  431. # Note that renewBefore should be greater than .webhook.lookaheadInterval
  432. # since the webhook will check this far in advance that the certificate is
  433. # valid.
  434. renewBefore: ""
  435. # -- Specific settings on the privateKey and its generation
  436. privateKey: {}
  437. # rotationPolicy: Always
  438. # algorithm: RSA
  439. # size: 2048
  440. # -- Specific settings on the signatureAlgorithm used on the cert.
  441. # signatureAlgorithm is only valid for cert-manager v1.18.0+
  442. signatureAlgorithm: ""
  443. # -- Add extra annotations to the Certificate resource.
  444. annotations: {}
  445. tolerations: []
  446. topologySpreadConstraints: []
  447. affinity: {}
  448. # -- Set deployment strategy
  449. strategy: {}
  450. # -- Pod priority class name.
  451. priorityClassName: ""
  452. # -- Pod disruption budget - for more details see https://kubernetes.io/docs/concepts/workloads/pods/disruptions/
  453. podDisruptionBudget:
  454. enabled: false
  455. minAvailable: 1 # @schema type:[integer, string]
  456. nameOverride: ""
  457. # maxUnavailable: "50%"
  458. metrics:
  459. listen:
  460. port: 8080
  461. service:
  462. # -- Enable if you use another monitoring tool than Prometheus to scrape the metrics
  463. enabled: false
  464. # -- Metrics service port to scrape
  465. port: 8080
  466. # -- Additional service annotations
  467. annotations: {}
  468. readinessProbe:
  469. # -- Address for readiness probe
  470. address: ""
  471. # -- ReadinessProbe port for kubelet
  472. port: 8081
  473. ## -- Extra environment variables to add to container.
  474. extraEnv: []
  475. ## -- Map of extra arguments to pass to container.
  476. extraArgs: {}
  477. ## -- Extra init containers to add to the pod.
  478. extraInitContainers: []
  479. ## -- Extra volumes to pass to pod.
  480. extraVolumes: []
  481. ## -- Extra volumes to mount to the container.
  482. extraVolumeMounts: []
  483. # -- Annotations to add to Secret
  484. secretAnnotations: {}
  485. # -- Annotations to add to Deployment
  486. deploymentAnnotations: {}
  487. # -- Annotations to add to Pod
  488. podAnnotations: {}
  489. podLabels: {}
  490. podSecurityContext:
  491. enabled: true
  492. # fsGroup: 2000
  493. securityContext:
  494. allowPrivilegeEscalation: false
  495. capabilities:
  496. drop:
  497. - ALL
  498. enabled: true
  499. readOnlyRootFilesystem: true
  500. runAsNonRoot: true
  501. runAsUser: 1000
  502. seccompProfile:
  503. type: RuntimeDefault
  504. resources: {}
  505. # requests:
  506. # cpu: 10m
  507. # memory: 32Mi
  508. # -- Manage the service through which the webhook is reached.
  509. service:
  510. # -- Whether the service object should be enabled or not (it is expected to exist).
  511. enabled: true
  512. # -- Custom annotations for the webhook service.
  513. annotations: {}
  514. # -- Custom labels for the webhook service.
  515. labels: {}
  516. # -- The service type of the webhook service.
  517. type: ClusterIP
  518. # -- If the webhook service type is LoadBalancer, you can assign a specific load balancer IP here.
  519. # Check the documentation of your load balancer provider to see if/how this should be used.
  520. loadBalancerIP: ""
  521. certController:
  522. # -- Specifies whether a certificate controller deployment be created.
  523. create: true
  524. requeueInterval: "5m"
  525. replicaCount: 1
  526. # -- Specifies Log Params to the Certificate Controller
  527. log:
  528. level: info
  529. timeEncoding: epoch
  530. # -- Specifies the amount of historic ReplicaSets k8s should keep (see https://kubernetes.io/docs/concepts/workloads/controllers/deployment/#clean-up-policy)
  531. revisionHistoryLimit: 10
  532. image:
  533. repository: ghcr.io/external-secrets/external-secrets
  534. pullPolicy: IfNotPresent
  535. tag: ""
  536. flavour: ""
  537. imagePullSecrets: []
  538. rbac:
  539. # -- Specifies whether role and rolebinding resources should be created.
  540. create: true
  541. serviceAccount:
  542. # -- Specifies whether a service account should be created.
  543. create: true
  544. # -- Automounts the service account token in all containers of the pod
  545. automount: true
  546. # -- Annotations to add to the service account.
  547. annotations: {}
  548. # -- Extra Labels to add to the service account.
  549. extraLabels: {}
  550. # -- The name of the service account to use.
  551. # If not set and create is true, a name is generated using the fullname template.
  552. name: ""
  553. nodeSelector: {}
  554. # -- Specifies `hostAliases` to cert-controller deployment
  555. hostAliases: []
  556. tolerations: []
  557. topologySpreadConstraints: []
  558. affinity: {}
  559. # -- Set deployment strategy
  560. strategy: {}
  561. # -- Run the certController on the host network
  562. hostNetwork: false
  563. # -- (bool) Specifies if certController pod should use hostUsers or not. If hostNetwork is true, hostUsers should be too. Only available in Kubernetes ≥ 1.33.
  564. # @schema type: [boolean, null]
  565. hostUsers:
  566. # -- Pod priority class name.
  567. priorityClassName: ""
  568. # -- Pod disruption budget - for more details see https://kubernetes.io/docs/concepts/workloads/pods/disruptions/
  569. podDisruptionBudget:
  570. enabled: false
  571. minAvailable: 1 # @schema type:[integer, string]
  572. nameOverride: ""
  573. # maxUnavailable: "50%"
  574. metrics:
  575. listen:
  576. port: 8080
  577. service:
  578. # -- Enable if you use another monitoring tool than Prometheus to scrape the metrics
  579. enabled: false
  580. # -- Metrics service port to scrape
  581. port: 8080
  582. # -- Additional service annotations
  583. annotations: {}
  584. readinessProbe:
  585. # -- Address for readiness probe
  586. address: ""
  587. # -- ReadinessProbe port for kubelet
  588. port: 8081
  589. startupProbe:
  590. # -- Enabled determines if the startup probe should be used or not. By default it's enabled
  591. enabled: false
  592. # -- whether to use the readiness probe port for startup probe.
  593. useReadinessProbePort: true
  594. # -- Port for startup probe.
  595. port: ""
  596. ## -- Extra environment variables to add to container.
  597. extraEnv: []
  598. ## -- Map of extra arguments to pass to container.
  599. extraArgs: {}
  600. ## -- Extra init containers to add to the pod.
  601. extraInitContainers: []
  602. ## -- Extra volumes to pass to pod.
  603. extraVolumes: []
  604. ## -- Extra volumes to mount to the container.
  605. extraVolumeMounts: []
  606. # -- Annotations to add to Deployment
  607. deploymentAnnotations: {}
  608. # -- Annotations to add to Pod
  609. podAnnotations: {}
  610. podLabels: {}
  611. podSecurityContext:
  612. enabled: true
  613. # fsGroup: 2000
  614. securityContext:
  615. allowPrivilegeEscalation: false
  616. capabilities:
  617. drop:
  618. - ALL
  619. enabled: true
  620. readOnlyRootFilesystem: true
  621. runAsNonRoot: true
  622. runAsUser: 1000
  623. seccompProfile:
  624. type: RuntimeDefault
  625. resources: {}
  626. # requests:
  627. # cpu: 10m
  628. # memory: 32Mi
  629. # -- Specifies `dnsPolicy` to deployment
  630. dnsPolicy: ClusterFirst
  631. # -- Specifies `dnsOptions` to deployment
  632. dnsConfig: {}
  633. # -- Specifies `hostAliases` to deployment
  634. hostAliases: []
  635. # -- Any extra pod spec on the deployment
  636. podSpecExtra: {}