values.yaml 20 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373374375376377378379380381382383384385386387388389390391392393394395396397398399400401402403404405406407408409410411412413414415416417418419420421422423424425426427428429430431432433434435436437438439440441442443444445446447448449450451452453454455456457458459460461462463464465466467468469470471472473474475476477478479480481482483484485486487488489490491492493494495496497498499500501502503504505506507508509510511512513514515516517518519520521522523524525526527528529530531532533534535536537538539540541542543544545546547548549550551552553554555556557558559560561562563564565566567568569570571572573574575576577578579580581582583584585586587588589590591592593594595596597598599600601602603604605606607608609610611612613614615616617618619620621622623624625626627628629630631632633634635636637638639640641642643644645646647648649650651652653654655656657658659660661662663664665666667668669
  1. global:
  2. nodeSelector: {}
  3. tolerations: []
  4. topologySpreadConstraints: []
  5. affinity: {}
  6. compatibility:
  7. openshift:
  8. # -- Manages the securityContext properties to make them compatible with OpenShift.
  9. # Possible values:
  10. # auto - Apply configurations if it is detected that OpenShift is the target platform.
  11. # force - Always apply configurations.
  12. # disabled - No modification applied.
  13. adaptSecurityContext: auto
  14. replicaCount: 1
  15. bitwarden-sdk-server:
  16. enabled: false
  17. namespaceOverride: ""
  18. # -- Specifies the amount of historic ReplicaSets k8s should keep (see https://kubernetes.io/docs/concepts/workloads/controllers/deployment/#clean-up-policy)
  19. revisionHistoryLimit: 10
  20. image:
  21. repository: oci.external-secrets.io/external-secrets/external-secrets
  22. pullPolicy: IfNotPresent
  23. # -- The image tag to use. The default is the chart appVersion.
  24. tag: ""
  25. # -- The flavour of tag you want to use
  26. # There are different image flavours available, like distroless and ubi.
  27. # Please see GitHub release notes for image tags for these flavors.
  28. # By default, the distroless image is used.
  29. flavour: ""
  30. # -- If set, install and upgrade CRDs through helm chart.
  31. installCRDs: true
  32. crds:
  33. # -- If true, create CRDs for Cluster External Secret.
  34. createClusterExternalSecret: true
  35. # -- If true, create CRDs for Cluster Secret Store.
  36. createClusterSecretStore: true
  37. # -- If true, create CRDs for Cluster Generator.
  38. createClusterGenerator: true
  39. # -- If true, create CRDs for Cluster Push Secret.
  40. createClusterPushSecret: true
  41. # -- If true, create CRDs for Push Secret.
  42. createPushSecret: true
  43. annotations: {}
  44. conversion:
  45. # -- Conversion is disabled by default as we stopped supporting v1alpha1.
  46. enabled: false
  47. imagePullSecrets: []
  48. nameOverride: ""
  49. fullnameOverride: ""
  50. namespaceOverride: ""
  51. # -- Additional labels added to all helm chart resources.
  52. commonLabels: {}
  53. # -- If true, external-secrets will perform leader election between instances to ensure no more
  54. # than one instance of external-secrets operates at a time.
  55. leaderElect: false
  56. # -- If set external secrets will filter matching
  57. # Secret Stores with the appropriate controller values.
  58. controllerClass: ""
  59. # -- If true external secrets will use recommended kubernetes
  60. # annotations as prometheus metric labels.
  61. extendedMetricLabels: false
  62. # -- If set external secrets are only reconciled in the
  63. # provided namespace
  64. scopedNamespace: ""
  65. # -- Must be used with scopedNamespace. If true, create scoped RBAC roles under the scoped namespace
  66. # and implicitly disable cluster stores and cluster external secrets
  67. scopedRBAC: false
  68. # -- If true the OpenShift finalizer permissions will be added to RBAC
  69. openshiftFinalizers: true
  70. # -- If true the system:auth-delegator ClusterRole will be added to RBAC
  71. systemAuthDelegator: false
  72. # -- if true, the operator will process cluster external secret. Else, it will ignore them.
  73. # When enabled, this adds update/patch permissions on namespaces to handle finalizers for proper
  74. # cleanup during namespace deletion, preventing race conditions with ExternalSecrets.
  75. processClusterExternalSecret: true
  76. # -- if true, the operator will process cluster push secret. Else, it will ignore them.
  77. processClusterPushSecret: true
  78. # -- if true, the operator will process cluster store. Else, it will ignore them.
  79. processClusterStore: true
  80. # -- if true, the operator will process cluster generator. Else, it will ignore them.
  81. processClusterGenerator: true
  82. # -- if true, the operator will process push secret. Else, it will ignore them.
  83. processPushSecret: true
  84. # -- Specifies whether an external secret operator deployment be created.
  85. createOperator: true
  86. # -- if true, HTTP2 will be enabled for the services created by all controllers, curently metrics and webhook.
  87. enableHTTP2: false
  88. # -- Specifies the number of concurrent ExternalSecret Reconciles external-secret executes at
  89. # a time.
  90. concurrent: 1
  91. # -- Specifies Log Params to the External Secrets Operator
  92. log:
  93. level: info
  94. timeEncoding: epoch
  95. service:
  96. # -- Set the ip family policy to configure dual-stack see [Configure dual-stack](https://kubernetes.io/docs/concepts/services-networking/dual-stack/#services)
  97. ipFamilyPolicy: ""
  98. # -- Sets the families that should be supported and the order in which they should be applied to ClusterIP as well. Can be IPv4 and/or IPv6.
  99. ipFamilies: []
  100. serviceAccount:
  101. # -- Specifies whether a service account should be created.
  102. create: true
  103. # -- Automounts the service account token in all containers of the pod
  104. automount: true
  105. # -- Annotations to add to the service account.
  106. annotations: {}
  107. # -- Extra Labels to add to the service account.
  108. extraLabels: {}
  109. # -- The name of the service account to use.
  110. # If not set and create is true, a name is generated using the fullname template.
  111. name: ""
  112. rbac:
  113. # -- Specifies whether role and rolebinding resources should be created.
  114. create: true
  115. servicebindings:
  116. # -- Specifies whether a clusterrole to give servicebindings read access should be created.
  117. create: true
  118. # -- Specifies whether permissions are aggregated to the view ClusterRole
  119. aggregateToView: true
  120. # -- Specifies whether permissions are aggregated to the edit ClusterRole
  121. aggregateToEdit: true
  122. ## -- Extra environment variables to add to container.
  123. extraEnv: []
  124. ## -- Map of extra arguments to pass to container.
  125. extraArgs: {}
  126. ## -- Extra volumes to pass to pod.
  127. extraVolumes: []
  128. ## -- Extra Kubernetes objects to deploy with the helm chart
  129. extraObjects: []
  130. ## -- Extra volumes to mount to the container.
  131. extraVolumeMounts: []
  132. ## -- Extra init containers to add to the pod.
  133. extraInitContainers: []
  134. ## -- Extra containers to add to the pod.
  135. extraContainers: []
  136. # -- Annotations to add to Deployment
  137. deploymentAnnotations: {}
  138. # -- Set deployment strategy
  139. strategy: {}
  140. # -- Annotations to add to Pod
  141. podAnnotations: {}
  142. podLabels: {}
  143. podSecurityContext:
  144. enabled: true
  145. # fsGroup: 2000
  146. securityContext:
  147. allowPrivilegeEscalation: false
  148. capabilities:
  149. drop:
  150. - ALL
  151. enabled: true
  152. readOnlyRootFilesystem: true
  153. runAsNonRoot: true
  154. runAsUser: 1000
  155. seccompProfile:
  156. type: RuntimeDefault
  157. resources: {}
  158. # requests:
  159. # cpu: 10m
  160. # memory: 32Mi
  161. serviceMonitor:
  162. # -- Specifies whether to create a ServiceMonitor resource for collecting Prometheus metrics
  163. enabled: false
  164. # -- How should we react to missing CRD "`monitoring.coreos.com/v1/ServiceMonitor`"
  165. #
  166. # Possible values:
  167. # - `skipIfMissing`: Only render ServiceMonitor resources if CRD is present, skip if missing.
  168. # - `failIfMissing`: Fail Helm install if CRD is not present.
  169. # - `alwaysRender` : Always render ServiceMonitor resources, do not check for CRD.
  170. # @schema
  171. # enum:
  172. # - skipIfMissing
  173. # - failIfMissing
  174. # - alwaysRender
  175. # @schema
  176. renderMode: skipIfMissing # @schema enum: [skipIfMissing, failIfMissing, alwaysRender]
  177. # -- namespace where you want to install ServiceMonitors
  178. namespace: ""
  179. # -- Additional labels
  180. additionalLabels: {}
  181. # -- Interval to scrape metrics
  182. interval: 30s
  183. # -- Timeout if metrics can't be retrieved in given time interval
  184. scrapeTimeout: 25s
  185. # -- Let prometheus add an exported_ prefix to conflicting labels
  186. honorLabels: false
  187. # -- Metric relabel configs to apply to samples before ingestion. [Metric Relabeling](https://prometheus.io/docs/prometheus/latest/configuration/configuration/#metric_relabel_configs)
  188. metricRelabelings: []
  189. # - action: replace
  190. # regex: (.*)
  191. # replacement: $1
  192. # sourceLabels:
  193. # - exported_namespace
  194. # targetLabel: namespace
  195. # -- Relabel configs to apply to samples before ingestion. [Relabeling](https://prometheus.io/docs/prometheus/latest/configuration/configuration/#relabel_config)
  196. relabelings: []
  197. # - sourceLabels: [__meta_kubernetes_pod_node_name]
  198. # separator: ;
  199. # regex: ^(.*)$
  200. # targetLabel: nodename
  201. # replacement: $1
  202. # action: replace
  203. metrics:
  204. listen:
  205. port: 8080
  206. secure:
  207. enabled: false
  208. # -- if those are not set or invalid, self-signed certs will be generated
  209. # -- TLS cert directory path
  210. certDir: /etc/tls
  211. # -- TLS cert file path
  212. certFile: /etc/tls/tls.crt
  213. # -- TLS key file path
  214. keyFile: /etc/tls/tls.key
  215. service:
  216. # -- Enable if you use another monitoring tool than Prometheus to scrape the metrics
  217. enabled: false
  218. # -- Metrics service port to scrape
  219. port: 8080
  220. # -- Additional service annotations
  221. annotations: {}
  222. grafanaDashboard:
  223. # -- If true creates a Grafana dashboard.
  224. enabled: false
  225. # -- Label that ConfigMaps should have to be loaded as dashboards.
  226. sidecarLabel: "grafana_dashboard"
  227. # -- Label value that ConfigMaps should have to be loaded as dashboards.
  228. sidecarLabelValue: "1"
  229. # -- Annotations that ConfigMaps can have to get configured in Grafana,
  230. # See: sidecar.dashboards.folderAnnotation for specifying the dashboard folder.
  231. # https://github.com/grafana/helm-charts/tree/main/charts/grafana
  232. annotations: {}
  233. # -- Extra labels to add to the Grafana dashboard ConfigMap.
  234. extraLabels: {}
  235. livenessProbe:
  236. # -- Enabled determines if the liveness probe should be used or not. By default it's disabled.
  237. enabled: false
  238. # -- The body of the liveness probe settings.
  239. spec:
  240. # -- Address for liveness probe.
  241. address: ""
  242. # -- Specify the maximum amount of time to wait for a probe to respond before considering it fails.
  243. timeoutSeconds: 5
  244. # -- Number of consecutive probe failures that should occur before considering the probe as failed.
  245. failureThreshold: 5
  246. # -- Period in seconds for K8s to start performing probes.
  247. periodSeconds: 10
  248. # -- Number of successful probes to mark probe successful.
  249. successThreshold: 1
  250. # -- Delay in seconds for the container to start before performing the initial probe.
  251. initialDelaySeconds: 10
  252. # -- Handler for liveness probe.
  253. httpGet:
  254. # -- Set this value to 8082 to active liveness probes.
  255. # @schema type: [string, integer]
  256. port: 8082
  257. # -- Path for liveness probe.
  258. path: /healthz
  259. nodeSelector: {}
  260. tolerations: []
  261. topologySpreadConstraints: []
  262. affinity: {}
  263. # -- Pod priority class name.
  264. priorityClassName: ""
  265. # -- Pod disruption budget - for more details see https://kubernetes.io/docs/concepts/workloads/pods/disruptions/
  266. podDisruptionBudget:
  267. enabled: false
  268. minAvailable: 1 # @schema type:[integer, string]
  269. nameOverride: ""
  270. # maxUnavailable: "50%"
  271. # -- Run the controller on the host network
  272. hostNetwork: false
  273. webhook:
  274. # -- Annotations to place on validating webhook configuration.
  275. annotations: {}
  276. # -- Specifies whether a webhook deployment be created. If set to false, crds.conversion.enabled should also be set to false otherwise the kubeapi will be hammered because the conversion is looking for a webhook endpoint.
  277. create: true
  278. # -- Specifies the time to check if the cert is valid
  279. certCheckInterval: "5m"
  280. # -- Specifies the lookaheadInterval for certificate validity
  281. lookaheadInterval: ""
  282. replicaCount: 1
  283. # -- Specifies Log Params to the Webhook
  284. log:
  285. level: info
  286. timeEncoding: epoch
  287. # -- Specifies the amount of historic ReplicaSets k8s should keep (see https://kubernetes.io/docs/concepts/workloads/controllers/deployment/#clean-up-policy)
  288. revisionHistoryLimit: 10
  289. certDir: /tmp/certs
  290. # -- Specifies whether validating webhooks should be created with failurePolicy: Fail or Ignore
  291. failurePolicy: Fail
  292. # -- Specifies if webhook pod should use hostNetwork or not.
  293. hostNetwork: false
  294. image:
  295. repository: oci.external-secrets.io/external-secrets/external-secrets
  296. pullPolicy: IfNotPresent
  297. # -- The image tag to use. The default is the chart appVersion.
  298. tag: ""
  299. # -- The flavour of tag you want to use
  300. flavour: ""
  301. imagePullSecrets: []
  302. # -- The port the webhook will listen to
  303. port: 10250
  304. serviceAccount:
  305. # -- Specifies whether a service account should be created.
  306. create: true
  307. # -- Automounts the service account token in all containers of the pod
  308. automount: true
  309. # -- Annotations to add to the service account.
  310. annotations: {}
  311. # -- Extra Labels to add to the service account.
  312. extraLabels: {}
  313. # -- The name of the service account to use.
  314. # If not set and create is true, a name is generated using the fullname template.
  315. name: ""
  316. nodeSelector: {}
  317. certManager:
  318. # -- Enabling cert-manager support will disable the built in secret and
  319. # switch to using cert-manager (installed separately) to automatically issue
  320. # and renew the webhook certificate. This chart does not install
  321. # cert-manager for you, See https://cert-manager.io/docs/
  322. enabled: false
  323. # -- Automatically add the cert-manager.io/inject-ca-from annotation to the
  324. # webhooks and CRDs. As long as you have the cert-manager CA Injector
  325. # enabled, this will automatically setup your webhook's CA to the one used
  326. # by cert-manager. See https://cert-manager.io/docs/concepts/ca-injector
  327. addInjectorAnnotations: true
  328. cert:
  329. # -- Create a certificate resource within this chart. See
  330. # https://cert-manager.io/docs/usage/certificate/
  331. create: true
  332. # -- For the Certificate created by this chart, setup the issuer. See
  333. # https://cert-manager.io/docs/reference/api-docs/#cert-manager.io/v1.IssuerSpec
  334. issuerRef:
  335. group: cert-manager.io
  336. kind: "Issuer"
  337. name: "my-issuer"
  338. # -- Set the requested duration (i.e. lifetime) of the Certificate. See
  339. # https://cert-manager.io/docs/reference/api-docs/#cert-manager.io/v1.CertificateSpec
  340. # One year by default.
  341. duration: "8760h"
  342. # -- Set the revisionHistoryLimit on the Certificate. See
  343. # https://cert-manager.io/docs/reference/api-docs/#cert-manager.io/v1.CertificateSpec
  344. # Defaults to 0 (ignored).
  345. revisionHistoryLimit: 0
  346. # -- How long before the currently issued certificate’s expiry
  347. # cert-manager should renew the certificate. See
  348. # https://cert-manager.io/docs/reference/api-docs/#cert-manager.io/v1.CertificateSpec
  349. # Note that renewBefore should be greater than .webhook.lookaheadInterval
  350. # since the webhook will check this far in advance that the certificate is
  351. # valid.
  352. renewBefore: ""
  353. # -- Add extra annotations to the Certificate resource.
  354. annotations: {}
  355. tolerations: []
  356. topologySpreadConstraints: []
  357. affinity: {}
  358. # -- Set deployment strategy
  359. strategy: {}
  360. # -- Pod priority class name.
  361. priorityClassName: ""
  362. # -- Pod disruption budget - for more details see https://kubernetes.io/docs/concepts/workloads/pods/disruptions/
  363. podDisruptionBudget:
  364. enabled: false
  365. minAvailable: 1 # @schema type:[integer, string]
  366. nameOverride: ""
  367. # maxUnavailable: "50%"
  368. metrics:
  369. listen:
  370. port: 8080
  371. service:
  372. # -- Enable if you use another monitoring tool than Prometheus to scrape the metrics
  373. enabled: false
  374. # -- Metrics service port to scrape
  375. port: 8080
  376. # -- Additional service annotations
  377. annotations: {}
  378. readinessProbe:
  379. # -- Address for readiness probe
  380. address: ""
  381. # -- ReadinessProbe port for kubelet
  382. port: 8081
  383. ## -- Extra environment variables to add to container.
  384. extraEnv: []
  385. ## -- Map of extra arguments to pass to container.
  386. extraArgs: {}
  387. ## -- Extra init containers to add to the pod.
  388. extraInitContainers: []
  389. ## -- Extra volumes to pass to pod.
  390. extraVolumes: []
  391. ## -- Extra volumes to mount to the container.
  392. extraVolumeMounts: []
  393. # -- Annotations to add to Secret
  394. secretAnnotations: {}
  395. # -- Annotations to add to Deployment
  396. deploymentAnnotations: {}
  397. # -- Annotations to add to Pod
  398. podAnnotations: {}
  399. podLabels: {}
  400. podSecurityContext:
  401. enabled: true
  402. # fsGroup: 2000
  403. securityContext:
  404. allowPrivilegeEscalation: false
  405. capabilities:
  406. drop:
  407. - ALL
  408. enabled: true
  409. readOnlyRootFilesystem: true
  410. runAsNonRoot: true
  411. runAsUser: 1000
  412. seccompProfile:
  413. type: RuntimeDefault
  414. resources: {}
  415. # requests:
  416. # cpu: 10m
  417. # memory: 32Mi
  418. # -- Manage the service through which the webhook is reached.
  419. service:
  420. # -- Whether the service object should be enabled or not (it is expected to exist).
  421. enabled: true
  422. # -- Custom annotations for the webhook service.
  423. annotations: {}
  424. # -- Custom labels for the webhook service.
  425. labels: {}
  426. # -- The service type of the webhook service.
  427. type: ClusterIP
  428. # -- If the webhook service type is LoadBalancer, you can assign a specific load balancer IP here.
  429. # Check the documentation of your load balancer provider to see if/how this should be used.
  430. loadBalancerIP: ""
  431. certController:
  432. # -- Specifies whether a certificate controller deployment be created.
  433. create: true
  434. requeueInterval: "5m"
  435. replicaCount: 1
  436. # -- Specifies Log Params to the Certificate Controller
  437. log:
  438. level: info
  439. timeEncoding: epoch
  440. # -- Specifies the amount of historic ReplicaSets k8s should keep (see https://kubernetes.io/docs/concepts/workloads/controllers/deployment/#clean-up-policy)
  441. revisionHistoryLimit: 10
  442. image:
  443. repository: oci.external-secrets.io/external-secrets/external-secrets
  444. pullPolicy: IfNotPresent
  445. tag: ""
  446. flavour: ""
  447. imagePullSecrets: []
  448. rbac:
  449. # -- Specifies whether role and rolebinding resources should be created.
  450. create: true
  451. serviceAccount:
  452. # -- Specifies whether a service account should be created.
  453. create: true
  454. # -- Automounts the service account token in all containers of the pod
  455. automount: true
  456. # -- Annotations to add to the service account.
  457. annotations: {}
  458. # -- Extra Labels to add to the service account.
  459. extraLabels: {}
  460. # -- The name of the service account to use.
  461. # If not set and create is true, a name is generated using the fullname template.
  462. name: ""
  463. nodeSelector: {}
  464. tolerations: []
  465. topologySpreadConstraints: []
  466. affinity: {}
  467. # -- Set deployment strategy
  468. strategy: {}
  469. # -- Run the certController on the host network
  470. hostNetwork: false
  471. # -- Pod priority class name.
  472. priorityClassName: ""
  473. # -- Pod disruption budget - for more details see https://kubernetes.io/docs/concepts/workloads/pods/disruptions/
  474. podDisruptionBudget:
  475. enabled: false
  476. minAvailable: 1 # @schema type:[integer, string]
  477. nameOverride: ""
  478. # maxUnavailable: "50%"
  479. metrics:
  480. listen:
  481. port: 8080
  482. service:
  483. # -- Enable if you use another monitoring tool than Prometheus to scrape the metrics
  484. enabled: false
  485. # -- Metrics service port to scrape
  486. port: 8080
  487. # -- Additional service annotations
  488. annotations: {}
  489. readinessProbe:
  490. # -- Address for readiness probe
  491. address: ""
  492. # -- ReadinessProbe port for kubelet
  493. port: 8081
  494. startupProbe:
  495. # -- Enabled determines if the startup probe should be used or not. By default it's enabled
  496. enabled: false
  497. # -- whether to use the readiness probe port for startup probe.
  498. useReadinessProbePort: true
  499. # -- Port for startup probe.
  500. port: ""
  501. ## -- Extra environment variables to add to container.
  502. extraEnv: []
  503. ## -- Map of extra arguments to pass to container.
  504. extraArgs: {}
  505. ## -- Extra init containers to add to the pod.
  506. extraInitContainers: []
  507. ## -- Extra volumes to pass to pod.
  508. extraVolumes: []
  509. ## -- Extra volumes to mount to the container.
  510. extraVolumeMounts: []
  511. # -- Annotations to add to Deployment
  512. deploymentAnnotations: {}
  513. # -- Annotations to add to Pod
  514. podAnnotations: {}
  515. podLabels: {}
  516. podSecurityContext:
  517. enabled: true
  518. # fsGroup: 2000
  519. securityContext:
  520. allowPrivilegeEscalation: false
  521. capabilities:
  522. drop:
  523. - ALL
  524. enabled: true
  525. readOnlyRootFilesystem: true
  526. runAsNonRoot: true
  527. runAsUser: 1000
  528. seccompProfile:
  529. type: RuntimeDefault
  530. resources: {}
  531. # requests:
  532. # cpu: 10m
  533. # memory: 32Mi
  534. # -- Specifies `dnsPolicy` to deployment
  535. dnsPolicy: ClusterFirst
  536. # -- Specifies `dnsOptions` to deployment
  537. dnsConfig: {}
  538. # -- Any extra pod spec on the deployment
  539. podSpecExtra: {}