values.yaml 21 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373374375376377378379380381382383384385386387388389390391392393394395396397398399400401402403404405406407408409410411412413414415416417418419420421422423424425426427428429430431432433434435436437438439440441442443444445446447448449450451452453454455456457458459460461462463464465466467468469470471472473474475476477478479480481482483484485486487488489490491492493494495496497498499500501502503504505506507508509510511512513514515516517518519520521522523524525526527528529530531532533534535536537538539540541542543544545546547548549550551552553554555556557558559560561562563564565566567568569570571572573574575576577578579580581582583584585586587588589590591592593594595596597598599600601602603604605606607608609610611612613614615616617618619620621622623624625626627628629630631632633634635636637638639640641642643644645646647648649650651652653654655656657658659660661662663664665666667668669670671672673674675676677678679680681682683684685686687688689690691692693694695696697698699700701
  1. ---
  2. global:
  3. nodeSelector: {}
  4. tolerations: []
  5. topologySpreadConstraints: []
  6. # - maxSkew: 1
  7. # topologyKey: topology.kubernetes.io/zone
  8. # whenUnsatisfiable: ScheduleAnyway
  9. # matchLabelKeys:
  10. # - pod-template-hash
  11. # - maxSkew: 1
  12. # topologyKey: kubernetes.io/hostname
  13. # whenUnsatisfiable: DoNotSchedule
  14. # matchLabelKeys:
  15. # - pod-template-hash
  16. affinity: {}
  17. compatibility:
  18. openshift:
  19. # -- Manages the securityContext properties to make them compatible with OpenShift.
  20. # Possible values:
  21. # auto - Apply configurations if it is detected that OpenShift is the target platform.
  22. # force - Always apply configurations.
  23. # disabled - No modification applied.
  24. adaptSecurityContext: auto
  25. replicaCount: 1
  26. bitwarden-sdk-server:
  27. enabled: false
  28. namespaceOverride: ""
  29. # -- Specifies the amount of historic ReplicaSets k8s should keep (see https://kubernetes.io/docs/concepts/workloads/controllers/deployment/#clean-up-policy)
  30. revisionHistoryLimit: 10
  31. image:
  32. repository: ghcr.io/external-secrets/external-secrets
  33. pullPolicy: IfNotPresent
  34. # -- The image tag to use. The default is the chart appVersion.
  35. tag: ""
  36. # -- The flavour of tag you want to use
  37. # There are different image flavours available, like distroless and ubi.
  38. # Please see GitHub release notes for image tags for these flavors.
  39. # By default, the distroless image is used.
  40. flavour: ""
  41. # -- If set, install and upgrade CRDs through helm chart.
  42. installCRDs: true
  43. crds:
  44. # -- If true, create CRDs for Cluster External Secret.
  45. createClusterExternalSecret: true
  46. # -- If true, create CRDs for Cluster Secret Store.
  47. createClusterSecretStore: true
  48. # -- If true, create CRDs for Secret Store.
  49. createSecretStore: true
  50. # -- If true, create CRDs for Cluster Generator.
  51. createClusterGenerator: true
  52. # -- If true, create CRDs for Cluster Push Secret.
  53. createClusterPushSecret: true
  54. # -- If true, create CRDs for Push Secret.
  55. createPushSecret: true
  56. annotations: {}
  57. conversion:
  58. # -- Conversion is disabled by default as we stopped supporting v1alpha1.
  59. enabled: false
  60. imagePullSecrets: []
  61. nameOverride: ""
  62. fullnameOverride: ""
  63. namespaceOverride: ""
  64. # -- Additional labels added to all helm chart resources.
  65. commonLabels: {}
  66. # -- If true, external-secrets will perform leader election between instances to ensure no more
  67. # than one instance of external-secrets operates at a time.
  68. leaderElect: false
  69. # -- If set external secrets will filter matching
  70. # Secret Stores with the appropriate controller values.
  71. controllerClass: ""
  72. # -- If true external secrets will use recommended kubernetes
  73. # annotations as prometheus metric labels.
  74. extendedMetricLabels: false
  75. # -- If set external secrets are only reconciled in the
  76. # provided namespace
  77. scopedNamespace: ""
  78. # -- Must be used with scopedNamespace. If true, create scoped RBAC roles under the scoped namespace
  79. # and implicitly disable cluster stores and cluster external secrets
  80. scopedRBAC: false
  81. # -- If true the OpenShift finalizer permissions will be added to RBAC
  82. openshiftFinalizers: true
  83. # -- If true the system:auth-delegator ClusterRole will be added to RBAC
  84. systemAuthDelegator: false
  85. # -- if true, the operator will process cluster external secret. Else, it will ignore them.
  86. # When enabled, this adds update/patch permissions on namespaces to handle finalizers for proper
  87. # cleanup during namespace deletion, preventing race conditions with ExternalSecrets.
  88. processClusterExternalSecret: true
  89. # -- if true, the operator will process cluster push secret. Else, it will ignore them.
  90. processClusterPushSecret: true
  91. # -- if true, the operator will process cluster store. Else, it will ignore them.
  92. processClusterStore: true
  93. # -- if true, the operator will process secret store. Else, it will ignore them.
  94. processSecretStore: true
  95. # -- if true, the operator will process cluster generator. Else, it will ignore them.
  96. processClusterGenerator: true
  97. # -- if true, the operator will process push secret. Else, it will ignore them.
  98. processPushSecret: true
  99. # -- Enable support for generic targets (ConfigMaps, Custom Resources).
  100. # Warning: Using generic target. Make sure access policies and encryption are properly configured.
  101. # When enabled, this grants the controller permissions to create/update/delete
  102. # ConfigMaps and optionally other resource types specified in generic.resources.
  103. genericTargets:
  104. # -- Enable generic target support
  105. enabled: false
  106. # -- List of additional resource types to grant permissions for.
  107. # Each entry should specify apiGroup, resources, and verbs.
  108. # Example:
  109. # resources:
  110. # - apiGroup: "argoproj.io"
  111. # resources: ["applications"]
  112. # verbs: ["get", "list", "watch", "create", "update", "patch", "delete"]
  113. resources: []
  114. # -- Specifies whether an external secret operator deployment be created.
  115. createOperator: true
  116. # -- if true, HTTP2 will be enabled for the services created by all controllers, curently metrics and webhook.
  117. enableHTTP2: false
  118. # -- Specifies the number of concurrent ExternalSecret Reconciles external-secret executes at
  119. # a time.
  120. concurrent: 1
  121. # -- Specifies Log Params to the External Secrets Operator
  122. log:
  123. level: info
  124. timeEncoding: epoch
  125. service:
  126. # -- Set the ip family policy to configure dual-stack see [Configure dual-stack](https://kubernetes.io/docs/concepts/services-networking/dual-stack/#services)
  127. ipFamilyPolicy: ""
  128. # -- Sets the families that should be supported and the order in which they should be applied to ClusterIP as well. Can be IPv4 and/or IPv6.
  129. ipFamilies: []
  130. serviceAccount:
  131. # -- Specifies whether a service account should be created.
  132. create: true
  133. # -- Automounts the service account token in all containers of the pod
  134. automount: true
  135. # -- Annotations to add to the service account.
  136. annotations: {}
  137. # -- Extra Labels to add to the service account.
  138. extraLabels: {}
  139. # -- The name of the service account to use.
  140. # If not set and create is true, a name is generated using the fullname template.
  141. name: ""
  142. rbac:
  143. # -- Specifies whether role and rolebinding resources should be created.
  144. create: true
  145. servicebindings:
  146. # -- Specifies whether a clusterrole to give servicebindings read access should be created.
  147. create: true
  148. # -- Specifies whether permissions are aggregated to the view ClusterRole
  149. aggregateToView: true
  150. # -- Specifies whether permissions are aggregated to the edit ClusterRole
  151. aggregateToEdit: true
  152. ## -- Extra environment variables to add to container.
  153. extraEnv: []
  154. ## -- Map of extra arguments to pass to container.
  155. extraArgs: {}
  156. ## -- Extra volumes to pass to pod.
  157. extraVolumes: []
  158. ## -- Extra Kubernetes objects to deploy with the helm chart
  159. extraObjects: []
  160. ## -- Extra volumes to mount to the container.
  161. extraVolumeMounts: []
  162. ## -- Extra init containers to add to the pod.
  163. extraInitContainers: []
  164. ## -- Extra containers to add to the pod.
  165. extraContainers: []
  166. # -- Annotations to add to Deployment
  167. deploymentAnnotations: {}
  168. # -- Set deployment strategy
  169. strategy: {}
  170. # -- Annotations to add to Pod
  171. podAnnotations: {}
  172. podLabels: {}
  173. podSecurityContext:
  174. enabled: true
  175. # fsGroup: 2000
  176. securityContext:
  177. allowPrivilegeEscalation: false
  178. capabilities:
  179. drop:
  180. - ALL
  181. enabled: true
  182. readOnlyRootFilesystem: true
  183. runAsNonRoot: true
  184. runAsUser: 1000
  185. seccompProfile:
  186. type: RuntimeDefault
  187. resources: {}
  188. # requests:
  189. # cpu: 10m
  190. # memory: 32Mi
  191. serviceMonitor:
  192. # -- Specifies whether to create a ServiceMonitor resource for collecting Prometheus metrics
  193. enabled: false
  194. # -- How should we react to missing CRD "`monitoring.coreos.com/v1/ServiceMonitor`"
  195. #
  196. # Possible values:
  197. # - `skipIfMissing`: Only render ServiceMonitor resources if CRD is present, skip if missing.
  198. # - `failIfMissing`: Fail Helm install if CRD is not present.
  199. # - `alwaysRender` : Always render ServiceMonitor resources, do not check for CRD.
  200. # @schema
  201. # enum:
  202. # - skipIfMissing
  203. # - failIfMissing
  204. # - alwaysRender
  205. # @schema
  206. renderMode: skipIfMissing # @schema enum: [skipIfMissing, failIfMissing, alwaysRender]
  207. # -- namespace where you want to install ServiceMonitors
  208. namespace: ""
  209. # -- Additional labels
  210. additionalLabels: {}
  211. # -- Interval to scrape metrics
  212. interval: 30s
  213. # -- Timeout if metrics can't be retrieved in given time interval
  214. scrapeTimeout: 25s
  215. # -- Let prometheus add an exported_ prefix to conflicting labels
  216. honorLabels: false
  217. # -- Metric relabel configs to apply to samples before ingestion. [Metric Relabeling](https://prometheus.io/docs/prometheus/latest/configuration/configuration/#metric_relabel_configs)
  218. metricRelabelings: []
  219. # - action: replace
  220. # regex: (.*)
  221. # replacement: $1
  222. # sourceLabels:
  223. # - exported_namespace
  224. # targetLabel: namespace
  225. # -- Relabel configs to apply to samples before ingestion. [Relabeling](https://prometheus.io/docs/prometheus/latest/configuration/configuration/#relabel_config)
  226. relabelings: []
  227. # - sourceLabels: [__meta_kubernetes_pod_node_name]
  228. # separator: ;
  229. # regex: ^(.*)$
  230. # targetLabel: nodename
  231. # replacement: $1
  232. # action: replace
  233. metrics:
  234. listen:
  235. port: 8080
  236. secure:
  237. enabled: false
  238. # -- if those are not set or invalid, self-signed certs will be generated
  239. # -- TLS cert directory path
  240. certDir: /etc/tls
  241. # -- TLS cert file path
  242. certFile: /etc/tls/tls.crt
  243. # -- TLS key file path
  244. keyFile: /etc/tls/tls.key
  245. service:
  246. # -- Enable if you use another monitoring tool than Prometheus to scrape the metrics
  247. enabled: false
  248. # -- Metrics service port to scrape
  249. port: 8080
  250. # -- Additional service annotations
  251. annotations: {}
  252. grafanaDashboard:
  253. # -- If true creates a Grafana dashboard.
  254. enabled: false
  255. # -- Label that ConfigMaps should have to be loaded as dashboards.
  256. sidecarLabel: "grafana_dashboard"
  257. # -- Label value that ConfigMaps should have to be loaded as dashboards.
  258. sidecarLabelValue: "1"
  259. # -- Annotations that ConfigMaps can have to get configured in Grafana,
  260. # See: sidecar.dashboards.folderAnnotation for specifying the dashboard folder.
  261. # https://github.com/grafana/helm-charts/tree/main/charts/grafana
  262. annotations: {}
  263. # -- Extra labels to add to the Grafana dashboard ConfigMap.
  264. extraLabels: {}
  265. livenessProbe:
  266. # -- Enabled determines if the liveness probe should be used or not. By default it's disabled.
  267. enabled: false
  268. # -- The body of the liveness probe settings.
  269. spec:
  270. # -- Address for liveness probe.
  271. address: ""
  272. # -- Specify the maximum amount of time to wait for a probe to respond before considering it fails.
  273. timeoutSeconds: 5
  274. # -- Number of consecutive probe failures that should occur before considering the probe as failed.
  275. failureThreshold: 5
  276. # -- Period in seconds for K8s to start performing probes.
  277. periodSeconds: 10
  278. # -- Number of successful probes to mark probe successful.
  279. successThreshold: 1
  280. # -- Delay in seconds for the container to start before performing the initial probe.
  281. initialDelaySeconds: 10
  282. # -- Handler for liveness probe.
  283. httpGet:
  284. # -- Set this value to 8082 to active liveness probes.
  285. # @schema type: [string, integer]
  286. port: 8082
  287. # -- Path for liveness probe.
  288. path: /healthz
  289. nodeSelector: {}
  290. tolerations: []
  291. topologySpreadConstraints: []
  292. affinity: {}
  293. # -- Pod priority class name.
  294. priorityClassName: ""
  295. # -- Pod disruption budget - for more details see https://kubernetes.io/docs/concepts/workloads/pods/disruptions/
  296. podDisruptionBudget:
  297. enabled: false
  298. minAvailable: 1 # @schema type:[integer, string]
  299. nameOverride: ""
  300. # maxUnavailable: "50%"
  301. # -- Run the controller on the host network
  302. hostNetwork: false
  303. webhook:
  304. # -- Annotations to place on validating webhook configuration.
  305. annotations: {}
  306. # -- Specifies whether a webhook deployment be created. If set to false, crds.conversion.enabled should also be set to false otherwise the kubeapi will be hammered because the conversion is looking for a webhook endpoint.
  307. create: true
  308. # -- Specifies the time to check if the cert is valid
  309. certCheckInterval: "5m"
  310. # -- Specifies the lookaheadInterval for certificate validity
  311. lookaheadInterval: ""
  312. replicaCount: 1
  313. # -- Specifies Log Params to the Webhook
  314. log:
  315. level: info
  316. timeEncoding: epoch
  317. # -- Specifies the amount of historic ReplicaSets k8s should keep (see https://kubernetes.io/docs/concepts/workloads/controllers/deployment/#clean-up-policy)
  318. revisionHistoryLimit: 10
  319. certDir: /tmp/certs
  320. # -- Specifies whether validating webhooks should be created with failurePolicy: Fail or Ignore
  321. failurePolicy: Fail
  322. # -- Specifies if webhook pod should use hostNetwork or not.
  323. hostNetwork: false
  324. image:
  325. repository: ghcr.io/external-secrets/external-secrets
  326. pullPolicy: IfNotPresent
  327. # -- The image tag to use. The default is the chart appVersion.
  328. tag: ""
  329. # -- The flavour of tag you want to use
  330. flavour: ""
  331. imagePullSecrets: []
  332. # -- The port the webhook will listen to
  333. port: 10250
  334. serviceAccount:
  335. # -- Specifies whether a service account should be created.
  336. create: true
  337. # -- Automounts the service account token in all containers of the pod
  338. automount: true
  339. # -- Annotations to add to the service account.
  340. annotations: {}
  341. # -- Extra Labels to add to the service account.
  342. extraLabels: {}
  343. # -- The name of the service account to use.
  344. # If not set and create is true, a name is generated using the fullname template.
  345. name: ""
  346. nodeSelector: {}
  347. certManager:
  348. # -- Enabling cert-manager support will disable the built in secret and
  349. # switch to using cert-manager (installed separately) to automatically issue
  350. # and renew the webhook certificate. This chart does not install
  351. # cert-manager for you, See https://cert-manager.io/docs/
  352. enabled: false
  353. # -- Automatically add the cert-manager.io/inject-ca-from annotation to the
  354. # webhooks and CRDs. As long as you have the cert-manager CA Injector
  355. # enabled, this will automatically setup your webhook's CA to the one used
  356. # by cert-manager. See https://cert-manager.io/docs/concepts/ca-injector
  357. addInjectorAnnotations: true
  358. cert:
  359. # -- Create a certificate resource within this chart. See
  360. # https://cert-manager.io/docs/usage/certificate/
  361. create: true
  362. # -- For the Certificate created by this chart, setup the issuer. See
  363. # https://cert-manager.io/docs/reference/api-docs/#cert-manager.io/v1.IssuerSpec
  364. issuerRef:
  365. group: cert-manager.io
  366. kind: "Issuer"
  367. name: "my-issuer"
  368. # -- Set the requested duration (i.e. lifetime) of the Certificate. See
  369. # https://cert-manager.io/docs/reference/api-docs/#cert-manager.io/v1.CertificateSpec
  370. # One year by default.
  371. duration: "8760h0m0s"
  372. # -- Set the revisionHistoryLimit on the Certificate. See
  373. # https://cert-manager.io/docs/reference/api-docs/#cert-manager.io/v1.CertificateSpec
  374. # Defaults to 0 (ignored).
  375. revisionHistoryLimit: 0
  376. # -- How long before the currently issued certificate’s expiry
  377. # cert-manager should renew the certificate. See
  378. # https://cert-manager.io/docs/reference/api-docs/#cert-manager.io/v1.CertificateSpec
  379. # Note that renewBefore should be greater than .webhook.lookaheadInterval
  380. # since the webhook will check this far in advance that the certificate is
  381. # valid.
  382. renewBefore: ""
  383. # -- Add extra annotations to the Certificate resource.
  384. annotations: {}
  385. tolerations: []
  386. topologySpreadConstraints: []
  387. affinity: {}
  388. # -- Set deployment strategy
  389. strategy: {}
  390. # -- Pod priority class name.
  391. priorityClassName: ""
  392. # -- Pod disruption budget - for more details see https://kubernetes.io/docs/concepts/workloads/pods/disruptions/
  393. podDisruptionBudget:
  394. enabled: false
  395. minAvailable: 1 # @schema type:[integer, string]
  396. nameOverride: ""
  397. # maxUnavailable: "50%"
  398. metrics:
  399. listen:
  400. port: 8080
  401. service:
  402. # -- Enable if you use another monitoring tool than Prometheus to scrape the metrics
  403. enabled: false
  404. # -- Metrics service port to scrape
  405. port: 8080
  406. # -- Additional service annotations
  407. annotations: {}
  408. readinessProbe:
  409. # -- Address for readiness probe
  410. address: ""
  411. # -- ReadinessProbe port for kubelet
  412. port: 8081
  413. ## -- Extra environment variables to add to container.
  414. extraEnv: []
  415. ## -- Map of extra arguments to pass to container.
  416. extraArgs: {}
  417. ## -- Extra init containers to add to the pod.
  418. extraInitContainers: []
  419. ## -- Extra volumes to pass to pod.
  420. extraVolumes: []
  421. ## -- Extra volumes to mount to the container.
  422. extraVolumeMounts: []
  423. # -- Annotations to add to Secret
  424. secretAnnotations: {}
  425. # -- Annotations to add to Deployment
  426. deploymentAnnotations: {}
  427. # -- Annotations to add to Pod
  428. podAnnotations: {}
  429. podLabels: {}
  430. podSecurityContext:
  431. enabled: true
  432. # fsGroup: 2000
  433. securityContext:
  434. allowPrivilegeEscalation: false
  435. capabilities:
  436. drop:
  437. - ALL
  438. enabled: true
  439. readOnlyRootFilesystem: true
  440. runAsNonRoot: true
  441. runAsUser: 1000
  442. seccompProfile:
  443. type: RuntimeDefault
  444. resources: {}
  445. # requests:
  446. # cpu: 10m
  447. # memory: 32Mi
  448. # -- Manage the service through which the webhook is reached.
  449. service:
  450. # -- Whether the service object should be enabled or not (it is expected to exist).
  451. enabled: true
  452. # -- Custom annotations for the webhook service.
  453. annotations: {}
  454. # -- Custom labels for the webhook service.
  455. labels: {}
  456. # -- The service type of the webhook service.
  457. type: ClusterIP
  458. # -- If the webhook service type is LoadBalancer, you can assign a specific load balancer IP here.
  459. # Check the documentation of your load balancer provider to see if/how this should be used.
  460. loadBalancerIP: ""
  461. certController:
  462. # -- Specifies whether a certificate controller deployment be created.
  463. create: true
  464. requeueInterval: "5m"
  465. replicaCount: 1
  466. # -- Specifies Log Params to the Certificate Controller
  467. log:
  468. level: info
  469. timeEncoding: epoch
  470. # -- Specifies the amount of historic ReplicaSets k8s should keep (see https://kubernetes.io/docs/concepts/workloads/controllers/deployment/#clean-up-policy)
  471. revisionHistoryLimit: 10
  472. image:
  473. repository: ghcr.io/external-secrets/external-secrets
  474. pullPolicy: IfNotPresent
  475. tag: ""
  476. flavour: ""
  477. imagePullSecrets: []
  478. rbac:
  479. # -- Specifies whether role and rolebinding resources should be created.
  480. create: true
  481. serviceAccount:
  482. # -- Specifies whether a service account should be created.
  483. create: true
  484. # -- Automounts the service account token in all containers of the pod
  485. automount: true
  486. # -- Annotations to add to the service account.
  487. annotations: {}
  488. # -- Extra Labels to add to the service account.
  489. extraLabels: {}
  490. # -- The name of the service account to use.
  491. # If not set and create is true, a name is generated using the fullname template.
  492. name: ""
  493. nodeSelector: {}
  494. tolerations: []
  495. topologySpreadConstraints: []
  496. affinity: {}
  497. # -- Set deployment strategy
  498. strategy: {}
  499. # -- Run the certController on the host network
  500. hostNetwork: false
  501. # -- Pod priority class name.
  502. priorityClassName: ""
  503. # -- Pod disruption budget - for more details see https://kubernetes.io/docs/concepts/workloads/pods/disruptions/
  504. podDisruptionBudget:
  505. enabled: false
  506. minAvailable: 1 # @schema type:[integer, string]
  507. nameOverride: ""
  508. # maxUnavailable: "50%"
  509. metrics:
  510. listen:
  511. port: 8080
  512. service:
  513. # -- Enable if you use another monitoring tool than Prometheus to scrape the metrics
  514. enabled: false
  515. # -- Metrics service port to scrape
  516. port: 8080
  517. # -- Additional service annotations
  518. annotations: {}
  519. readinessProbe:
  520. # -- Address for readiness probe
  521. address: ""
  522. # -- ReadinessProbe port for kubelet
  523. port: 8081
  524. startupProbe:
  525. # -- Enabled determines if the startup probe should be used or not. By default it's enabled
  526. enabled: false
  527. # -- whether to use the readiness probe port for startup probe.
  528. useReadinessProbePort: true
  529. # -- Port for startup probe.
  530. port: ""
  531. ## -- Extra environment variables to add to container.
  532. extraEnv: []
  533. ## -- Map of extra arguments to pass to container.
  534. extraArgs: {}
  535. ## -- Extra init containers to add to the pod.
  536. extraInitContainers: []
  537. ## -- Extra volumes to pass to pod.
  538. extraVolumes: []
  539. ## -- Extra volumes to mount to the container.
  540. extraVolumeMounts: []
  541. # -- Annotations to add to Deployment
  542. deploymentAnnotations: {}
  543. # -- Annotations to add to Pod
  544. podAnnotations: {}
  545. podLabels: {}
  546. podSecurityContext:
  547. enabled: true
  548. # fsGroup: 2000
  549. securityContext:
  550. allowPrivilegeEscalation: false
  551. capabilities:
  552. drop:
  553. - ALL
  554. enabled: true
  555. readOnlyRootFilesystem: true
  556. runAsNonRoot: true
  557. runAsUser: 1000
  558. seccompProfile:
  559. type: RuntimeDefault
  560. resources: {}
  561. # requests:
  562. # cpu: 10m
  563. # memory: 32Mi
  564. # -- Specifies `dnsPolicy` to deployment
  565. dnsPolicy: ClusterFirst
  566. # -- Specifies `dnsOptions` to deployment
  567. dnsConfig: {}
  568. # -- Any extra pod spec on the deployment
  569. podSpecExtra: {}