jaeger values.yaml
π£
openshiftπ£
Type: object
{"enabled":false}
Default value (formatted)
{
"enabled": false
}
Description: Openshift toggle, only affects networkPolicies
ssoπ£
Type: object
{"enabled":false}
Default value (formatted)
{
"enabled": false
}
Description: SSO toggle, only affects auth policies
monitoringπ£
Type: object
{"enabled":false,"serviceMonitor":{"scheme":"","tlsConfig":{}}}
Default value (formatted)
{
"enabled": false,
"serviceMonitor": {
"scheme": "",
"tlsConfig": {}
}
}
Description: Monitoring toggle, affects servicemonitor and networkPolicies
hostnameπ£
Type: string
"bigbang.dev"
Description: Hostname to service Jaeger virtualService
istio.enabledπ£
Type: bool
false
Description: Toggle istio integration
istio.jaeger.enabledπ£
Type: bool
true
Description: Toggle vs creation
istio.jaeger.annotationsπ£
Type: object
{}
Default value (formatted)
{}
istio.jaeger.labelsπ£
Type: object
{}
Default value (formatted)
{}
istio.jaeger.gateways[0]π£
Type: string
"istio-system/main"
istio.jaeger.hosts[0]π£
Type: string
"tracing.{{ .Values.hostname }}"
istio.mtlsπ£
Type: object
{"mode":"STRICT"}
Default value (formatted)
{
"mode": "STRICT"
}
Description: Default jaeger peer authentication
istio.mtls.modeπ£
Type: string
"STRICT"
Description: STRICT = Allow only mutual TLS traffic, PERMISSIVE = Allow both plain text and mutual TLS traffic
cleanSvcMonitorπ£
Type: object
{"enabled":false,"image":{"repository":"registry1.dso.mil/ironbank/big-bang/base","tag":"2.0.0"}}
Default value (formatted)
{
"enabled": false,
"image": {
"repository": "registry1.dso.mil/ironbank/big-bang/base",
"tag": "2.0.0"
}
}
Description: Only needed for upgrade from pre-1.29.x, Deletes the servicemonitor that targetted deprecated metrics endpoints
webhookCertGenπ£
Type: object
{"affinity":{},"cleanupProxy":{"image":{"pullPolicy":"IfNotPresent","repository":"registry1.dso.mil/ironbank/big-bang/base","tag":"2.0.0"}},"containerSecurityContext":{"capabilities":{"drop":["ALL"]}},"enabled":true,"image":{"pullPolicy":"IfNotPresent","repository":"registry1.dso.mil/ironbank/opensource/ingress-nginx/kube-webhook-certgen","tag":"v1.3.0"},"nodeSelector":{},"resources":{"limits":{"cpu":"50m","memory":"50Mi"},"requests":{"cpu":"50m","memory":"50Mi"}},"securityContext":{"runAsGroup":65532,"runAsNonRoot":true,"runAsUser":65532},"tolerations":{}}
Default value (formatted)
{
"affinity": {},
"cleanupProxy": {
"image": {
"pullPolicy": "IfNotPresent",
"repository": "registry1.dso.mil/ironbank/big-bang/base",
"tag": "2.0.0"
}
},
"containerSecurityContext": {
"capabilities": {
"drop": [
"ALL"
]
}
},
"enabled": true,
"image": {
"pullPolicy": "IfNotPresent",
"repository": "registry1.dso.mil/ironbank/opensource/ingress-nginx/kube-webhook-certgen",
"tag": "v1.3.0"
},
"nodeSelector": {},
"resources": {
"limits": {
"cpu": "50m",
"memory": "50Mi"
},
"requests": {
"cpu": "50m",
"memory": "50Mi"
}
},
"securityContext": {
"runAsGroup": 65532,
"runAsNonRoot": true,
"runAsUser": 65532
},
"tolerations": {}
}
Description: Job to generate and patch webhooks with certificate
webhookCertGen.enabledπ£
Type: bool
true
Description: If disabled must use cert manager and manually patch webhook
elasticsearch.enabledπ£
Type: bool
false
elasticsearch.indexTemplateCreationπ£
Type: object
{"containerSecurityContext":{"capabilities":{"drop":["ALL"]}},"enabled":true,"image":{"repository":"registry1.dso.mil/ironbank/big-bang/base","tag":"2.0.0"},"servicePriority":10,"spanPriority":11}
Default value (formatted)
{
"containerSecurityContext": {
"capabilities": {
"drop": [
"ALL"
]
}
},
"enabled": true,
"image": {
"repository": "registry1.dso.mil/ironbank/big-bang/base",
"tag": "2.0.0"
},
"servicePriority": 10,
"spanPriority": 11
}
Description: Custom BB job to create required index templates for ES 8.x
elasticsearch.indexTemplateCreation.servicePriorityπ£
Type: int
10
Description: Priority to add to the service index template, cannot conflict with existing templates
elasticsearch.indexTemplateCreation.spanPriorityπ£
Type: int
11
Description: Priority to add to the span index template, cannot conflict with existing templates
elasticsearch.usernameπ£
Type: string
"elastic"
elasticsearch.nameπ£
Type: string
"logging-ek"
elasticsearch.namespaceπ£
Type: string
"logging"
elasticsearch.storage.options.es.server-urlsπ£
Type: string
"https://{{ $.Values.elasticsearch.name }}-es-http.{{ $.Values.elasticsearch.namespace }}.svc:9200"
elasticsearch.storage.options.es.tls.enabledπ£
Type: string
"true"
elasticsearch.storage.options.es.tls.caπ£
Type: string
"/es/certificates/ca.crt"
elasticsearch.storage.options.es.versionπ£
Type: int
7
elasticsearch.storage.options.es.create-index-templatesπ£
Type: bool
false
retention.enabledπ£
Type: bool
false
retention.scheduleπ£
Type: string
"0 * * * *"
retention.daysπ£
Type: int
5
retention.imageπ£
Type: string
"registry1.dso.mil/ironbank/opensource/jaegertracing/jaeger-es-index-cleaner:1.41.0"
operatorUpdateStrategy.typeπ£
Type: string
"RollingUpdate"
image.repositoryπ£
Type: string
"registry1.dso.mil/ironbank/opensource/jaegertracing/jaeger-operator"
image.tagπ£
Type: string
"1.41.0"
image.pullPolicyπ£
Type: string
"Always"
image.imagePullSecrets[0]π£
Type: string
"private-registry"
certs.issuer.createπ£
Type: bool
false
certs.issuer.nameπ£
Type: string
""
certs.certificate.createπ£
Type: bool
false
certs.certificate.namespaceπ£
Type: string
""
certs.certificate.secretNameπ£
Type: string
"jaeger-operator-webhook-cert"
webhooks.mutatingWebhook.createπ£
Type: bool
true
webhooks.validatingWebhook.createπ£
Type: bool
true
webhooks.portπ£
Type: int
9443
webhooks.service.annotationsπ£
Type: object
{}
Default value (formatted)
{}
webhooks.service.createπ£
Type: bool
true
webhooks.service.nameπ£
Type: string
""
jaeger.createπ£
Type: bool
true
jaeger.namespaceπ£
Type: string
nil
jaeger.spec.strategyπ£
Type: string
"allInOne"
jaeger.spec.ingress.enabledπ£
Type: bool
false
jaeger.spec.annotationsπ£
Type: object
{}
Default value (formatted)
{}
jaeger.spec.labelsπ£
Type: object
{}
Default value (formatted)
{}
jaeger.spec.allInOne.imageπ£
Type: string
"registry1.dso.mil/ironbank/opensource/jaegertracing/all-in-one:1.41.0"
jaeger.spec.allInOne.options.log-levelπ£
Type: string
"info"
jaeger.spec.allInOne.options.collector.zipkin.host-portπ£
Type: string
":9411"
jaeger.spec.allInOne.annotations.βsidecar.istio.io/injectβπ£
Type: string
"true"
jaeger.spec.allInOne.annotations.βtraffic.sidecar.istio.io/includeInboundPortsβπ£
Type: string
"16686"
jaeger.spec.allInOne.resources.requests.cpuπ£
Type: string
"200m"
jaeger.spec.allInOne.resources.requests.memoryπ£
Type: string
"128Mi"
jaeger.spec.allInOne.resources.limits.cpuπ£
Type: string
"200m"
jaeger.spec.allInOne.resources.limits.memoryπ£
Type: string
"128Mi"
jaeger.spec.allInOne.securityContext.runAsNonRootπ£
Type: bool
true
jaeger.spec.allInOne.securityContext.runAsUserπ£
Type: int
1001
jaeger.spec.allInOne.securityContext.runAsGroupπ£
Type: int
1001
jaeger.spec.allInOne.containerSecurityContext.capabilities.drop[0]π£
Type: string
"ALL"
jaeger.spec.allInOne.strategy.typeπ£
Type: string
"RollingUpdate"
jaeger.spec.agent.maxReplicasπ£
Type: int
5
jaeger.spec.agent.imageπ£
Type: string
"registry1.dso.mil/ironbank/opensource/jaegertracing/jaeger-agent:1.41.0"
jaeger.spec.agent.options.log-levelπ£
Type: string
"info"
jaeger.spec.agent.imagePullSecrets[0]π£
Type: string
"private-registry"
jaeger.spec.agent.securityContext.runAsNonRootπ£
Type: bool
true
jaeger.spec.agent.securityContext.runAsUserπ£
Type: int
1001
jaeger.spec.agent.securityContext.runAsGroupπ£
Type: int
1001
jaeger.spec.agent.containerSecurityContext.capabilities.drop[0]π£
Type: string
"ALL"
jaeger.spec.agent.strategy.typeπ£
Type: string
"RollingUpdate"
jaeger.spec.ingester.maxReplicasπ£
Type: int
5
jaeger.spec.ingester.imageπ£
Type: string
"registry1.dso.mil/ironbank/opensource/jaegertracing/jaeger-ingester:1.41.0"
jaeger.spec.ingester.options.log-levelπ£
Type: string
"info"
jaeger.spec.ingester.securityContext.runAsNonRootπ£
Type: bool
true
jaeger.spec.ingester.securityContext.runAsUserπ£
Type: int
1001
jaeger.spec.ingester.securityContext.runAsGroupπ£
Type: int
1001
jaeger.spec.ingester.containerSecurityContext.capabilities.drop[0]π£
Type: string
"ALL"
jaeger.spec.ingester.strategy.typeπ£
Type: string
"RollingUpdate"
jaeger.spec.query.replicasπ£
Type: int
5
jaeger.spec.query.imageπ£
Type: string
"registry1.dso.mil/ironbank/opensource/jaegertracing/jaeger-query:1.41.0"
jaeger.spec.query.options.log-levelπ£
Type: string
"info"
jaeger.spec.query.securityContext.runAsNonRootπ£
Type: bool
true
jaeger.spec.query.securityContext.runAsUserπ£
Type: int
1001
jaeger.spec.query.securityContext.runAsGroupπ£
Type: int
1001
jaeger.spec.query.containerSecurityContext.capabilities.drop[0]π£
Type: string
"ALL"
jaeger.spec.query.strategy.typeπ£
Type: string
"RollingUpdate"
jaeger.spec.collector.maxReplicasπ£
Type: int
5
jaeger.spec.collector.imageπ£
Type: string
"registry1.dso.mil/ironbank/opensource/jaegertracing/jaeger-collector:1.41.0"
jaeger.spec.collector.options.log-levelπ£
Type: string
"info"
jaeger.spec.collector.resources.requests.cpuπ£
Type: string
"200m"
jaeger.spec.collector.resources.requests.memoryπ£
Type: string
"128Mi"
jaeger.spec.collector.resources.limits.cpuπ£
Type: string
"200m"
jaeger.spec.collector.resources.limits.memoryπ£
Type: string
"128Mi"
jaeger.spec.collector.securityContext.runAsNonRootπ£
Type: bool
true
jaeger.spec.collector.securityContext.runAsUserπ£
Type: int
1001
jaeger.spec.collector.securityContext.runAsGroupπ£
Type: int
1001
jaeger.spec.collector.containerSecurityContext.capabilities.drop[0]π£
Type: string
"ALL"
jaeger.spec.collector.strategy.typeπ£
Type: string
"RollingUpdate"
jaeger.spec.volumeMounts[0].nameπ£
Type: string
"certificates"
jaeger.spec.volumeMounts[0].mountPathπ£
Type: string
"/es/certificates/"
jaeger.spec.volumeMounts[0].readOnlyπ£
Type: bool
true
jaeger.spec.volumes[0].nameπ£
Type: string
"certificates"
jaeger.spec.volumes[0].secret.secretNameπ£
Type: string
"elasticsearch-certificates"
rbac.createπ£
Type: bool
true
rbac.pspEnabledπ£
Type: bool
false
rbac.clusterRoleπ£
Type: bool
true
service.typeπ£
Type: string
"ClusterIP"
service.annotationsπ£
Type: object
{}
Default value (formatted)
{}
serviceAccount.createπ£
Type: bool
true
serviceAccount.nameπ£
Type: string
"jaeger-instance"
serviceAccount.annotationsπ£
Type: object
{}
Default value (formatted)
{}
extraEnvπ£
Type: list
[]
Default value (formatted)
[]
extraLabelsπ£
Type: object
{}
Default value (formatted)
{}
resources.limits.cpuπ£
Type: string
"100m"
resources.limits.memoryπ£
Type: string
"128Mi"
resources.requests.cpuπ£
Type: string
"100m"
resources.requests.memoryπ£
Type: string
"128Mi"
nodeSelectorπ£
Type: object
{}
Default value (formatted)
{}
tolerationsπ£
Type: list
[]
Default value (formatted)
[]
affinityπ£
Type: object
{}
Default value (formatted)
{}
securityContext.runAsNonRootπ£
Type: bool
true
securityContext.runAsUserπ£
Type: int
1001
securityContext.runAsGroupπ£
Type: int
1001
priorityClassNameπ£
Type: string
nil
hostNetworkπ£
Type: bool
false
metricsPortπ£
Type: int
8383
annotationsπ£
Type: object
{}
Default value (formatted)
{}
networkPolicies.enabledπ£
Type: bool
false
networkPolicies.ingressLabels.appπ£
Type: string
"istio-ingressgateway"
networkPolicies.ingressLabels.istioπ£
Type: string
"ingressgateway"
networkPolicies.controlPlaneCidrπ£
Type: string
"0.0.0.0/0"
bbtests.enabledπ£
Type: bool
false
bbtests.cypress.artifactsπ£
Type: bool
true
bbtests.cypress.envs.cypress_urlπ£
Type: string
"http://jaeger-query:16686"