This repository has been archived by the owner on Jan 19, 2024. It is now read-only.
/
values.yaml
79 lines (66 loc) · 3.23 KB
/
values.yaml
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
nameOverride:
helmservice:
image:
repository: "ghcr.io/keptn-contrib/helm-service" # Container Image Name
pullPolicy: IfNotPresent # Kubernetes Image Pull Policy
tag: "" # Container Tag
service:
enabled: true # Creates a Kubernetes Service for the helm-service
gracePeriod: 60
preStopHookTime: 5
resources: # Resource limits and requests
limits:
cpu: "1000m"
memory: "512Mi"
requests:
cpu: "50m"
memory: "128Mi"
distributor:
stageFilter: "" # Stage to which this helm service belongs; default=all; comma-separated list to filter for set of stages
serviceFilter: "" # Service to which this helm service belongs; default=all; comma-separated list to filter for set of services
projectFilter: "" # Project to which this helm service belongs; default=all; comma-separated list to filter for set of projects
image:
repository: "docker.io/keptn/distributor" # Container Image Name
tag: "0.18.0" # Container Tag
pullPolicy: IfNotPresent # Kubernetes Image Pull Policy
config:
queueGroup:
enabled: true # Enable connection via Nats queue group to support exactly-once message processing
oauth:
clientID: ""
clientSecret: ""
discovery: ""
tokenURL: ""
scopes: ""
resources:
requests:
memory: "16Mi"
cpu: "25m"
limits:
memory: "32Mi"
cpu: "100m"
remoteControlPlane:
enabled: false # Enables remote execution plane mode
api:
protocol: "https" # Used Protocol (http, https)
hostname: "" # Hostname of the control plane cluster (and Port)
apiValidateTls: true # Defines if the control plane certificate should be validated
token: "" # Keptn API Token
tokenSecretName: # Use a predefined secret ie: from sealed-secrets. Must have a config key of keptn-api-token inside the secret
imagePullSecrets: [] # Secrets to use for container registry credentials
serviceAccount:
create: true # Enables the service account creation
annotations: {} # Annotations to add to the service account
name: "" # The name of the service account to use.
podAnnotations: {} # Annotations to add to the created pods
podSecurityContext: {} # Set the pod security context (e.g. fsGroups)
# fsGroup: 2000
securityContext: {} # Set the security context (e.g. runAsUser)
# readOnlyRootFilesystem: true
# runAsNonRoot: true
# runAsUser: 1000
nodeSelector: {} # Node selector configuration
tolerations: [] # Tolerations for the pods
affinity: {} # Affinity rules
logLevel: info
useCommitID: "false"