neuvector values.yaml
π£
openshiftπ£
Type: bool
false
registryπ£
Type: string
"registry1.dso.mil"
tagπ£
Type: string
"5.1.1"
oemπ£
Type: string
nil
imagePullSecretsπ£
Type: string
"private-registry"
pspπ£
Type: bool
false
rbacπ£
Type: bool
true
serviceAccountπ£
Type: string
"default"
controller.enabledπ£
Type: bool
true
controller.annotationsπ£
Type: object
{}
Default value (formatted)
{}
controller.strategy.typeπ£
Type: string
"RollingUpdate"
controller.strategy.rollingUpdate.maxSurgeπ£
Type: int
1
controller.strategy.rollingUpdate.maxUnavailableπ£
Type: int
0
controller.image.repositoryπ£
Type: string
"ironbank/neuvector/neuvector/controller"
controller.image.hashπ£
Type: string
nil
controller.replicasπ£
Type: int
3
controller.disruptionbudgetπ£
Type: int
0
controller.schedulerNameπ£
Type: string
nil
controller.priorityClassNameπ£
Type: string
nil
controller.podLabelsπ£
Type: object
{}
Default value (formatted)
{}
controller.podAnnotationsπ£
Type: object
{}
Default value (formatted)
{}
controller.envπ£
Type: list
[]
Default value (formatted)
[]
controller.affinity.podAntiAffinity.preferredDuringSchedulingIgnoredDuringExecution[0].weightπ£
Type: int
100
controller.affinity.podAntiAffinity.preferredDuringSchedulingIgnoredDuringExecution[0].podAffinityTerm.labelSelector.matchExpressions[0].keyπ£
Type: string
"app"
controller.affinity.podAntiAffinity.preferredDuringSchedulingIgnoredDuringExecution[0].podAffinityTerm.labelSelector.matchExpressions[0].operatorπ£
Type: string
"In"
controller.affinity.podAntiAffinity.preferredDuringSchedulingIgnoredDuringExecution[0].podAffinityTerm.labelSelector.matchExpressions[0].values[0]π£
Type: string
"neuvector-controller-pod"
controller.affinity.podAntiAffinity.preferredDuringSchedulingIgnoredDuringExecution[0].podAffinityTerm.topologyKeyπ£
Type: string
"kubernetes.io/hostname"
controller.tolerationsπ£
Type: list
[]
Default value (formatted)
[]
controller.nodeSelectorπ£
Type: object
{}
Default value (formatted)
{}
controller.apisvc.typeπ£
Type: string
nil
controller.apisvc.annotationsπ£
Type: object
{}
Default value (formatted)
{}
controller.apisvc.route.enabledπ£
Type: bool
false
controller.apisvc.route.terminationπ£
Type: string
"passthrough"
controller.apisvc.route.hostπ£
Type: string
nil
controller.apisvc.route.tlsπ£
Type: string
nil
controller.ranchersso.enabledπ£
Type: bool
false
controller.pvc.enabledπ£
Type: bool
false
controller.pvc.existingClaimπ£
Type: bool
false
controller.pvc.accessModes[0]π£
Type: string
"ReadWriteMany"
controller.pvc.storageClassπ£
Type: string
nil
controller.pvc.capacityπ£
Type: string
nil
controller.azureFileShare.enabledπ£
Type: bool
false
controller.azureFileShare.secretNameπ£
Type: string
nil
controller.azureFileShare.shareNameπ£
Type: string
nil
controller.certificate.secretπ£
Type: string
nil
controller.certificate.keyFileπ£
Type: string
"tls.key"
controller.certificate.pemFileπ£
Type: string
"tls.pem"
controller.internal.certificate.secretπ£
Type: string
nil
controller.internal.certificate.keyFileπ£
Type: string
"cert.key"
controller.internal.certificate.pemFileπ£
Type: string
"cert.pem"
controller.internal.certificate.caFileπ£
Type: string
"ca.cert"
controller.federation.mastersvc.typeπ£
Type: string
nil
controller.federation.mastersvc.ingress.enabledπ£
Type: bool
false
controller.federation.mastersvc.ingress.hostπ£
Type: string
nil
controller.federation.mastersvc.ingress.ingressClassNameπ£
Type: string
""
controller.federation.mastersvc.ingress.pathπ£
Type: string
"/"
controller.federation.mastersvc.ingress.annotations.βnginx.ingress.kubernetes.io/backend-protocolβπ£
Type: string
"HTTPS"
controller.federation.mastersvc.ingress.tlsπ£
Type: bool
false
controller.federation.mastersvc.ingress.secretNameπ£
Type: string
nil
controller.federation.mastersvc.annotationsπ£
Type: object
{}
Default value (formatted)
{}
controller.federation.mastersvc.route.enabledπ£
Type: bool
false
controller.federation.mastersvc.route.terminationπ£
Type: string
"passthrough"
controller.federation.mastersvc.route.hostπ£
Type: string
nil
controller.federation.mastersvc.route.tlsπ£
Type: string
nil
controller.federation.managedsvc.typeπ£
Type: string
nil
controller.federation.managedsvc.ingress.enabledπ£
Type: bool
false
controller.federation.managedsvc.ingress.hostπ£
Type: string
nil
controller.federation.managedsvc.ingress.ingressClassNameπ£
Type: string
""
controller.federation.managedsvc.ingress.pathπ£
Type: string
"/"
controller.federation.managedsvc.ingress.annotations.βnginx.ingress.kubernetes.io/backend-protocolβπ£
Type: string
"HTTPS"
controller.federation.managedsvc.ingress.tlsπ£
Type: bool
false
controller.federation.managedsvc.ingress.secretNameπ£
Type: string
nil
controller.federation.managedsvc.annotationsπ£
Type: object
{}
Default value (formatted)
{}
controller.federation.managedsvc.route.enabledπ£
Type: bool
false
controller.federation.managedsvc.route.terminationπ£
Type: string
"passthrough"
controller.federation.managedsvc.route.hostπ£
Type: string
nil
controller.federation.managedsvc.route.tlsπ£
Type: string
nil
controller.ingress.enabledπ£
Type: bool
false
controller.ingress.hostπ£
Type: string
nil
controller.ingress.ingressClassNameπ£
Type: string
""
controller.ingress.pathπ£
Type: string
"/"
controller.ingress.annotations.βnginx.ingress.kubernetes.io/backend-protocolβπ£
Type: string
"HTTPS"
controller.ingress.tlsπ£
Type: bool
false
controller.ingress.secretNameπ£
Type: string
nil
controller.resourcesπ£
Type: object
{}
Default value (formatted)
{}
controller.configmap.enabledπ£
Type: bool
false
controller.configmap.dataπ£
Type: string
nil
controller.secret.enabledπ£
Type: bool
false
controller.secret.dataπ£
Type: object
{}
Default value (formatted)
{}
enforcer.enabledπ£
Type: bool
true
enforcer.image.repositoryπ£
Type: string
"ironbank/neuvector/neuvector/enforcer"
enforcer.image.hashπ£
Type: string
nil
enforcer.updateStrategy.typeπ£
Type: string
"RollingUpdate"
enforcer.priorityClassNameπ£
Type: string
nil
enforcer.podLabelsπ£
Type: object
{}
Default value (formatted)
{}
enforcer.podAnnotationsπ£
Type: object
{}
Default value (formatted)
{}
enforcer.tolerations[0].effectπ£
Type: string
"NoSchedule"
enforcer.tolerations[0].keyπ£
Type: string
"node-role.kubernetes.io/master"
enforcer.tolerations[1].effectπ£
Type: string
"NoSchedule"
enforcer.tolerations[1].keyπ£
Type: string
"node-role.kubernetes.io/control-plane"
enforcer.resourcesπ£
Type: object
{}
Default value (formatted)
{}
enforcer.internal.certificate.secretπ£
Type: string
nil
enforcer.internal.certificate.keyFileπ£
Type: string
"cert.key"
enforcer.internal.certificate.pemFileπ£
Type: string
"cert.pem"
enforcer.internal.certificate.caFileπ£
Type: string
"ca.cert"
manager.enabledπ£
Type: bool
true
manager.image.repositoryπ£
Type: string
"ironbank/neuvector/neuvector/manager"
manager.image.hashπ£
Type: string
nil
manager.priorityClassNameπ£
Type: string
nil
manager.env.sslπ£
Type: bool
false
manager.env.disableFipsInJavaπ£
Type: bool
true
manager.svc.typeπ£
Type: string
"ClusterIP"
manager.svc.loadBalancerIPπ£
Type: string
nil
manager.svc.annotationsπ£
Type: object
{}
Default value (formatted)
{}
manager.route.enabledπ£
Type: bool
true
manager.route.terminationπ£
Type: string
"passthrough"
manager.route.hostπ£
Type: string
nil
manager.route.tlsπ£
Type: string
nil
manager.certificate.secretπ£
Type: string
nil
manager.certificate.keyFileπ£
Type: string
"tls.key"
manager.certificate.pemFileπ£
Type: string
"tls.pem"
manager.ingress.enabledπ£
Type: bool
false
manager.ingress.hostπ£
Type: string
nil
manager.ingress.ingressClassNameπ£
Type: string
""
manager.ingress.pathπ£
Type: string
"/"
manager.ingress.annotations.βnginx.ingress.kubernetes.io/backend-protocolβπ£
Type: string
"HTTPS"
manager.ingress.tlsπ£
Type: bool
false
manager.ingress.secretNameπ£
Type: string
nil
manager.resourcesπ£
Type: object
{}
Default value (formatted)
{}
manager.affinityπ£
Type: object
{}
Default value (formatted)
{}
manager.podLabelsπ£
Type: object
{}
Default value (formatted)
{}
manager.podAnnotationsπ£
Type: object
{}
Default value (formatted)
{}
manager.tolerationsπ£
Type: list
[]
Default value (formatted)
[]
manager.nodeSelectorπ£
Type: object
{}
Default value (formatted)
{}
manager.runAsUserπ£
Type: string
nil
cve.updater.enabledπ£
Type: bool
true
cve.updater.secureπ£
Type: bool
false
cve.updater.image.repositoryπ£
Type: string
"ironbank/big-bang/base"
cve.updater.image.tagπ£
Type: string
"2.0.0"
cve.updater.image.hashπ£
Type: string
nil
cve.updater.scheduleπ£
Type: string
"0 0 * * *"
cve.updater.priorityClassNameπ£
Type: string
nil
cve.updater.podLabelsπ£
Type: object
{}
Default value (formatted)
{}
cve.updater.podAnnotationsπ£
Type: object
{}
Default value (formatted)
{}
cve.updater.nodeSelectorπ£
Type: object
{}
Default value (formatted)
{}
cve.updater.runAsUserπ£
Type: string
nil
cve.scanner.enabledπ£
Type: bool
true
cve.scanner.replicasπ£
Type: int
3
cve.scanner.dockerPathπ£
Type: string
""
cve.scanner.strategy.typeπ£
Type: string
"RollingUpdate"
cve.scanner.strategy.rollingUpdate.maxSurgeπ£
Type: int
1
cve.scanner.strategy.rollingUpdate.maxUnavailableπ£
Type: int
0
cve.scanner.image.repositoryπ£
Type: string
"ironbank/neuvector/neuvector/scanner"
cve.scanner.image.tagπ£
Type: int
5
cve.scanner.image.hashπ£
Type: string
nil
cve.scanner.priorityClassNameπ£
Type: string
nil
cve.scanner.resourcesπ£
Type: object
{}
Default value (formatted)
{}
cve.scanner.affinityπ£
Type: object
{}
Default value (formatted)
{}
cve.scanner.podLabelsπ£
Type: object
{}
Default value (formatted)
{}
cve.scanner.podAnnotationsπ£
Type: object
{}
Default value (formatted)
{}
cve.scanner.tolerationsπ£
Type: list
[]
Default value (formatted)
[]
cve.scanner.nodeSelectorπ£
Type: object
{}
Default value (formatted)
{}
cve.scanner.runAsUserπ£
Type: string
nil
cve.scanner.internal.certificate.secretπ£
Type: string
nil
cve.scanner.internal.certificate.keyFileπ£
Type: string
"cert.key"
cve.scanner.internal.certificate.pemFileπ£
Type: string
"cert.pem"
cve.scanner.internal.certificate.caFileπ£
Type: string
"ca.cert"
docker.pathπ£
Type: string
"/var/run/docker.sock"
resourcesπ£
Type: object
{}
Default value (formatted)
{}
k3s.enabledπ£
Type: bool
false
k3s.runtimePathπ£
Type: string
"/run/k3s/containerd/containerd.sock"
bottlerocket.enabledπ£
Type: bool
false
bottlerocket.runtimePathπ£
Type: string
"/run/dockershim.sock"
containerd.enabledπ£
Type: bool
false
containerd.pathπ£
Type: string
"/var/run/containerd/containerd.sock"
crio.enabledπ£
Type: bool
false
crio.pathπ£
Type: string
"/var/run/crio/crio.sock"
admissionwebhook.typeπ£
Type: string
"ClusterIP"
crdwebhook.enabledπ£
Type: bool
true
crdwebhook.typeπ£
Type: string
"ClusterIP"
domainπ£
Type: string
"bigbang.dev"
istio.enabledπ£
Type: bool
false
istio.injectionπ£
Type: string
"disabled"
istio.neuvector.enabledπ£
Type: bool
true
istio.neuvector.annotationsπ£
Type: object
{}
Default value (formatted)
{}
istio.neuvector.labelsπ£
Type: object
{}
Default value (formatted)
{}
istio.neuvector.gateways[0]π£
Type: string
"istio-system/main"
istio.neuvector.hosts[0]π£
Type: string
"neuvector.{{ .Values.domain }}"
istio.mtlsπ£
Type: object
{"mode":"STRICT"}
Default value (formatted)
{
"mode": "STRICT"
}
Description: Default neuvector peer authentication
istio.mtls.modeπ£
Type: string
"STRICT"
Description: STRICT = Allow only mutual TLS traffic, PERMISSIVE = Allow both plain text and mutual TLS traffic
monitoring.enabledπ£
Type: bool
false
monitoring.namespaceπ£
Type: string
"monitoring"
networkPolicies.enabledπ£
Type: bool
false
networkPolicies.ingressLabels.appπ£
Type: string
"istio-ingressgateway"
networkPolicies.ingressLabels.istioπ£
Type: string
"ingressgateway"
networkPolicies.controlPlaneCidrπ£
Type: string
"0.0.0.0/0"
monitor.imagePullSecretsπ£
Type: string
"private-registry"
bbtests.enabledπ£
Type: bool
false
bbtests.cypress.artifactsπ£
Type: bool
true
bbtests.cypress.envs.cypress_urlπ£
Type: string
"http://neuvector-service-webui.{{ .Release.Namespace }}.svc.cluster.local:8443"
bbtests.scripts.envs.URLπ£
Type: string
"http://neuvector-service-webui.{{ .Release.Namespace }}.svc.cluster.local:8443"