bigbang💣
Big Bang is a declarative, continuous delivery tool for core DoD hardened and approved packages into a Kubernetes cluster.
Getting Started💣
To start using Big Bang, you will need to create your own Big Bang environment tailored to your needs. The Big Bang customer template is provided for you to copy into your own Git repository and begin modifications.
Maintainers💣
Name | Url | |
---|---|---|
Ryan Garcia | garcia.ryan@solute.us | |
Micah Nagel | micah.nagel@defenseunicorns.com | |
Rob Ferguson | rob.ferguson@defenseunicorns.com |
Source Code💣
Values💣
Key | Type | Default | Description |
---|---|---|---|
domain | string | "bigbang.dev" |
Domain used for BigBang created exposed services, can be overridden by individual packages. |
offline | bool | false |
(experimental) Toggle sourcing from external repos. All this does right now is toggle GitRepositories, it is not fully functional |
registryCredentials | object | {"email":"","password":"","registry":"registry1.dso.mil","username":""} |
Single set of registry credentials used to pull all images deployed by BigBang. |
openshift | bool | false |
Multiple sets of registry credentials used to pull all images deployed by BigBang. Credentials will only be created when a valid combination exists, registry, username, and password (email is optional) Or a list of registires: - registry: registry1.dso.mil username: “” password: “” email: “” - registry: registry.dso.mil username: “” password: “” email: “” Openshift Container Platform Feature Toggle |
git | object | {"credentials":{"caFile":"","knownHosts":"","password":"","privateKey":"","publicKey":"","username":""},"existingSecret":""} |
Git credential settings for accessing private repositories Order of precedence is: 1. existingSecret 2. http credentials (username/password/caFile) 3. ssh credentials (privateKey/publicKey/knownHosts) |
git.existingSecret | string | "" |
Existing secret to use for git credentials, must be in the appropriate format: https://toolkit.fluxcd.io/components/source/gitrepositories/#https-authentication |
git.credentials | object | {"caFile":"","knownHosts":"","password":"","privateKey":"","publicKey":"","username":""} |
Chart created secrets with user defined values |
git.credentials.username | string | "" |
HTTP git credentials, both username and password must be provided |
git.credentials.caFile | string | "" |
HTTPS certificate authority file. Required for any repo with a self signed certificate |
git.credentials.privateKey | string | "" |
SSH git credentials, privateKey, publicKey, and knownHosts must be provided |
sso | object | {"certificateAuthority":{"cert":"","secretName":"tls-ca-sso"},"name":"SSO","oidc":{"authorization":"{{ .Values.sso.url }}/protocol/openid-connect/auth","claims":{"email":"email","groups":"groups","name":"name","username":"preferred_username"},"endSession":"{{ .Values.sso.url }}/protocol/openid-connect/logout","jwks":"","jwksUri":"{{ .Values.sso.url }}/protocol/openid-connect/certs","token":"{{ .Values.sso.url }}/protocol/openid-connect/token","userinfo":"{{ .Values.sso.url }}/protocol/openid-connect/userinfo"},"saml":{"entityDescriptor":"{{ .Values.sso.url }}/protocol/saml/descriptor","metadata":"","service":"{{ .Values.sso.url }}/protocol/saml"},"url":"https://login.dso.mil/auth/realms/baby-yoda"} |
Global SSO values used for BigBang deployments when sso is enabled |
sso.name | string | "SSO" |
Name of the identity provider. This is used by some packages as the SSO login label. |
sso.url | string | "https://login.dso.mil/auth/realms/baby-yoda" |
Base URL for the identity provider. For OIDC, this is the issuer. For SAML this is the entityID. |
sso.certificateAuthority | object | {"cert":"","secretName":"tls-ca-sso"} |
Certificate authority for the identity provider’s certificates |
sso.certificateAuthority.cert | string | "" |
The certificate authority public certificate in .pem format. Populating this will create a secret in each namespace that enables SSO. |
sso.certificateAuthority.secretName | string | "tls-ca-sso" |
The secret name to use for the certificate authority. Can be manually populated if cert is blank. |
sso.saml.entityDescriptor | string | "{{ .Values.sso.url }}/protocol/saml/descriptor" |
SAML entityDescriptor (metadata) path |
sso.saml.service | string | "{{ .Values.sso.url }}/protocol/saml" |
SAML SSO Service path |
sso.saml.metadata | string | "" |
Literal SAML XML metadata retrieved from {{ .Values.sso.saml.entityDescriptor }} . Required for SSO in Nexus, Twistlock, or Sonarqube. |
sso.oidc | object | {"authorization":"{{ .Values.sso.url }}/protocol/openid-connect/auth","claims":{"email":"email","groups":"groups","name":"name","username":"preferred_username"},"endSession":"{{ .Values.sso.url }}/protocol/openid-connect/logout","jwks":"","jwksUri":"{{ .Values.sso.url }}/protocol/openid-connect/certs","token":"{{ .Values.sso.url }}/protocol/openid-connect/token","userinfo":"{{ .Values.sso.url }}/protocol/openid-connect/userinfo"} |
OIDC endpoints can be retrieved from {{ .Values.sso.url }}/.well-known/openid-configuration |
sso.oidc.authorization | string | "{{ .Values.sso.url }}/protocol/openid-connect/auth" |
OIDC authorization path |
sso.oidc.endSession | string | "{{ .Values.sso.url }}/protocol/openid-connect/logout" |
OIDC logout / end session path |
sso.oidc.jwksUri | string | "{{ .Values.sso.url }}/protocol/openid-connect/certs" |
OIDC JSON Web Key Set (JWKS) path |
sso.oidc.token | string | "{{ .Values.sso.url }}/protocol/openid-connect/token" |
OIDC token path |
sso.oidc.userinfo | string | "{{ .Values.sso.url }}/protocol/openid-connect/userinfo" |
OIDC user information path |
sso.oidc.jwks | string | "" |
Literal OIDC JWKS data retrieved from JWKS Uri. Only needed if jwsksUri is not defined. |
sso.oidc.claims | object | {"email":"email","groups":"groups","name":"name","username":"preferred_username"} |
Identity provider claim names that store metadata about the authenticated user. |
sso.oidc.claims.email | string | "email" |
IdP’s claim name used for the user’s email address. |
sso.oidc.claims.name | string | "name" |
IdP’s claim name used for the user’s full name |
sso.oidc.claims.username | string | "preferred_username" |
IdP’s claim name used for the username |
sso.oidc.claims.groups | string | "groups" |
IdP’s claim name used for the user’s groups or roles |
flux | object | {"install":{"remediation":{"retries":-1}},"interval":"2m","rollback":{"cleanupOnFail":true,"timeout":"10m"},"test":{"enable":false},"timeout":"10m","upgrade":{"cleanupOnFail":true,"remediation":{"remediateLastFailure":true,"retries":3}}} |
(Advanced) Flux reconciliation parameters. The default values provided will be sufficient for the majority of workloads. |
networkPolicies | object | {"controlPlaneCidr":"0.0.0.0/0","enabled":true,"nodeCidr":"","vpcCidr":"0.0.0.0/0"} |
Global NetworkPolicies settings |
networkPolicies.enabled | bool | true |
Toggle all package NetworkPolicies, can disable specific packages with package.values.networkPolicies.enabled |
networkPolicies.controlPlaneCidr | string | "0.0.0.0/0" |
Control Plane CIDR, defaults to 0.0.0.0/0, use kubectl get endpoints -n default kubernetes to get the CIDR range needed for your cluster Must be an IP CIDR range (x.x.x.x/x - ideally with /32 for the specific IP of a single endpoint, broader range for multiple masters/endpoints) Used by package NetworkPolicies to allow Kube API access |
networkPolicies.nodeCidr | string | "" |
Node CIDR, defaults to allowing “10.0.0.0/8” “172.16.0.0/12” “192.168.0.0/16” “100.64.0.0/10” networks. use kubectl get nodes -owide and review the INTERNAL-IP column to derive CIDR range. Must be an IP CIDR range (x.x.x.x/x - ideally a /16 or /24 to include multiple IPs) |
networkPolicies.vpcCidr | string | "0.0.0.0/0" |
VPC CIDR, defaults to 0.0.0.0/0 In a production environment, it is recommended to setup a Private Endpoint for your AWS services like KMS or S3. Please review https://docs.aws.amazon.com/kms/latest/developerguide/kms-vpc-endpoint.html to setup routing to AWS services that never leave the AWS network. Once created update networkPolicies.vpcCidr to match the CIDR of your VPC so Vault will be able to reach your VPCs DNS and new KMS endpoint. |
imagePullPolicy | string | "IfNotPresent" |
Global ImagePullPolicy value for all packages Permitted values are: None, Always, IfNotPresent |
istio.enabled | bool | true |
Toggle deployment of Istio. |
istio.git.repo | string | "https://repo1.dso.mil/platform-one/big-bang/apps/core/istio-controlplane.git" |
|
istio.git.path | string | "./chart" |
|
istio.git.tag | string | "1.17.1-bb.0" |
|
istio.enterprise | bool | false |
Tetrate Istio Distribution - Tetrate provides FIPs verified Istio and Envoy software and support, validated through the FIPs Boring Crypto module. Find out more from Tetrate - https://www.tetrate.io/tetrate-istio-subscription |
istio.ingressGateways.public-ingressgateway.type | string | "LoadBalancer" |
|
istio.ingressGateways.public-ingressgateway.kubernetesResourceSpec | object | {} |
|
istio.gateways.public.ingressGateway | string | "public-ingressgateway" |
|
istio.gateways.public.hosts[0] | string | "*.{{ .Values.domain }}" |
|
istio.gateways.public.autoHttpRedirect | object | {"enabled":true} |
Controls default HTTP/8080 server entry with HTTP to HTTPS Redirect. |
istio.gateways.public.tls.key | string | "" |
|
istio.gateways.public.tls.cert | string | "" |
|
istio.flux | object | {} |
Flux reconciliation overrides specifically for the Istio Package |
istio.values | object | {} |
Values to passthrough to the istio-controlplane chart: https://repo1.dso.mil/platform-one/big-bang/apps/core/istio-controlplane.git |
istio.postRenderers | list | [] |
Post Renderers. See docs/postrenders.md |
istiooperator.enabled | bool | true |
Toggle deployment of Istio Operator. |
istiooperator.git.repo | string | "https://repo1.dso.mil/platform-one/big-bang/apps/core/istio-operator.git" |
|
istiooperator.git.path | string | "./chart" |
|
istiooperator.git.tag | string | "1.17.1-bb.0" |
|
istiooperator.flux | object | {} |
Flux reconciliation overrides specifically for the Istio Operator Package |
istiooperator.values | object | {} |
Values to passthrough to the istio-operator chart: https://repo1.dso.mil/platform-one/big-bang/apps/core/istio-operator.git |
istiooperator.postRenderers | list | [] |
Post Renderers. See docs/postrenders.md |
jaeger.enabled | bool | true |
Toggle deployment of Jaeger. |
jaeger.git.repo | string | "https://repo1.dso.mil/platform-one/big-bang/apps/core/jaeger.git" |
|
jaeger.git.path | string | "./chart" |
|
jaeger.git.tag | string | "2.41.0-bb.0" |
|
jaeger.flux | object | {"install":{"crds":"CreateReplace"},"upgrade":{"crds":"CreateReplace"}} |
Flux reconciliation overrides specifically for the Jaeger Package |
jaeger.ingress | object | {"gateway":""} |
Redirect the package ingress to a specific Istio Gateway (listed in istio.gateways ). The default is “public”. |
jaeger.sso.enabled | bool | false |
Toggle SSO for Jaeger on and off |
jaeger.sso.client_id | string | "" |
OIDC Client ID to use for Jaeger |
jaeger.sso.client_secret | string | "" |
OIDC Client Secret to use for Jaeger |
jaeger.values | object | {} |
Values to pass through to Jaeger chart: https://repo1.dso.mil/platform-one/big-bang/apps/core/jaeger.git |
jaeger.postRenderers | list | [] |
Post Renderers. See docs/postrenders.md |
kiali.enabled | bool | true |
Toggle deployment of Kiali. |
kiali.git.repo | string | "https://repo1.dso.mil/platform-one/big-bang/apps/core/kiali.git" |
|
kiali.git.path | string | "./chart" |
|
kiali.git.tag | string | "1.64.0-bb.0" |
|
kiali.flux | object | {} |
Flux reconciliation overrides specifically for the Kiali Package |
kiali.ingress | object | {"gateway":""} |
Redirect the package ingress to a specific Istio Gateway (listed in istio.gateways ). The default is “public”. |
kiali.sso.enabled | bool | false |
Toggle SSO for Kiali on and off |
kiali.sso.client_id | string | "" |
OIDC Client ID to use for Kiali |
kiali.sso.client_secret | string | "" |
OIDC Client Secret to use for Kiali |
kiali.values | object | {} |
Values to pass through to Kiali chart: https://repo1.dso.mil/platform-one/big-bang/apps/core/kiali |
kiali.postRenderers | list | [] |
Post Renderers. See docs/postrenders.md |
clusterAuditor.enabled | bool | true |
Toggle deployment of Cluster Auditor. |
clusterAuditor.git.repo | string | "https://repo1.dso.mil/platform-one/big-bang/apps/core/cluster-auditor.git" |
|
clusterAuditor.git.path | string | "./chart" |
|
clusterAuditor.git.tag | string | "1.5.0-bb.2" |
|
clusterAuditor.flux | object | {} |
Flux reconciliation overrides specifically for the Cluster Auditor Package |
clusterAuditor.values | object | {} |
Values to passthrough to the cluster auditor chart: https://repo1.dso.mil/platform-one/big-bang/apps/core/cluster-auditor.git |
clusterAuditor.postRenderers | list | [] |
Post Renderers. See docs/postrenders.md |
gatekeeper.enabled | bool | true |
Toggle deployment of OPA Gatekeeper. |
gatekeeper.git.repo | string | "https://repo1.dso.mil/platform-one/big-bang/apps/core/policy.git" |
|
gatekeeper.git.path | string | "./chart" |
|
gatekeeper.git.tag | string | "3.11.0-bb.2" |
|
gatekeeper.flux | object | {"install":{"crds":"CreateReplace"},"upgrade":{"crds":"CreateReplace"}} |
Flux reconciliation overrides specifically for the OPA Gatekeeper Package |
gatekeeper.values | object | {} |
Values to passthrough to the gatekeeper chart: https://repo1.dso.mil/platform-one/big-bang/apps/core/policy.git |
gatekeeper.postRenderers | list | [] |
Post Renderers. See docs/postrenders.md |
kyverno.enabled | bool | false |
Toggle deployment of Kyverno. |
kyverno.git.repo | string | "https://repo1.dso.mil/platform-one/big-bang/apps/sandbox/kyverno.git" |
|
kyverno.git.path | string | "./chart" |
|
kyverno.git.tag | string | "2.6.5-bb.3" |
|
kyverno.flux | object | {} |
Flux reconciliation overrides specifically for the Kyverno Package |
kyverno.values | object | {} |
Values to passthrough to the kyverno chart: https://repo1.dso.mil/platform-one/big-bang/apps/sandbox/kyverno.git |
kyverno.postRenderers | list | [] |
Post Renderers. See docs/postrenders.md |
kyvernopolicies.enabled | bool | false |
Toggle deployment of Kyverno policies |
kyvernopolicies.git.repo | string | "https://repo1.dso.mil/platform-one/big-bang/apps/sandbox/kyverno-policies.git" |
|
kyvernopolicies.git.path | string | "./chart" |
|
kyvernopolicies.git.tag | string | "1.1.0-bb.3" |
|
kyvernopolicies.flux | object | {} |
Flux reconciliation overrides specifically for the Kyverno Package |
kyvernopolicies.values | object | {} |
Values to passthrough to the kyverno policies chart: https://repo1.dso.mil/platform-one/big-bang/apps/sandbox/kyverno-policies.git |
kyvernopolicies.postRenderers | list | [] |
Post Renderers. See docs/postrenders.md |
kyvernoreporter.enabled | bool | false |
Toggle deployment of Kyverno Reporter |
kyvernoreporter.git.repo | string | "https://repo1.dso.mil/platform-one/big-bang/apps/sandbox/kyverno-reporter.git" |
|
kyvernoreporter.git.path | string | "./chart" |
|
kyvernoreporter.git.tag | string | "2.16.0-bb.0" |
|
kyvernoreporter.flux | object | {} |
Flux reconciliation overrides specifically for the Kyverno Reporter Package |
kyvernoreporter.values | object | {} |
Values to passthrough to the kyverno reporter chart: https://repo1.dso.mil/platform-one/big-bang/apps/sandbox/kyverno-reporter.git |
kyvernoreporter.postRenderers | list | [] |
Post Renderers. See docs/postrenders.md |
logging.enabled | bool | true |
Toggle deployment of Logging (EFK). |
logging.git.repo | string | "https://repo1.dso.mil/platform-one/big-bang/apps/core/elasticsearch-kibana.git" |
|
logging.git.path | string | "./chart" |
|
logging.git.tag | string | "1.1.0-bb.1" |
|
logging.flux | object | {"timeout":"20m"} |
Flux reconciliation overrides specifically for the Logging (EFK) Package |
logging.ingress | object | {"gateway":""} |
Redirect the package ingress to a specific Istio Gateway (listed in istio.gateways ). The default is “public”. |
logging.sso.enabled | bool | false |
Toggle OIDC SSO for Kibana/Elasticsearch on and off. Enabling this option will auto-create any required secrets. |
logging.sso.client_id | string | "" |
Elasticsearch/Kibana OIDC client ID |
logging.sso.client_secret | string | "" |
Elasticsearch/Kibana OIDC client secret |
logging.license.trial | bool | false |
Toggle trial license installation of elasticsearch. Note that enterprise (non trial) is required for SSO to work. |
logging.license.keyJSON | string | "" |
Elasticsearch license in json format seen here: https://repo1.dso.mil/platform-one/big-bang/apps/core/elasticsearch-kibana#enterprise-license |
logging.values | object | {} |
Values to passthrough to the elasticsearch-kibana chart: https://repo1.dso.mil/platform-one/big-bang/apps/core/elasticsearch-kibana.git |
logging.postRenderers | list | [] |
Post Renderers. See docs/postrenders.md |
eckoperator.enabled | bool | true |
Toggle deployment of ECK Operator. |
eckoperator.git.repo | string | "https://repo1.dso.mil/platform-one/big-bang/apps/core/eck-operator.git" |
|
eckoperator.git.path | string | "./chart" |
|
eckoperator.git.tag | string | "2.6.1-bb.0" |
|
eckoperator.flux | object | {} |
Flux reconciliation overrides specifically for the ECK Operator Package |
eckoperator.values | object | {} |
Values to passthrough to the eck-operator chart: https://repo1.dso.mil/platform-one/big-bang/apps/core/eck-operator.git |
fluentbit.enabled | bool | true |
Toggle deployment of Fluent-Bit. |
fluentbit.git.repo | string | "https://repo1.dso.mil/platform-one/big-bang/apps/core/fluentbit.git" |
|
fluentbit.git.path | string | "./chart" |
|
fluentbit.git.tag | string | "0.24.0-bb.0" |
|
fluentbit.flux | object | {} |
Flux reconciliation overrides specifically for the Fluent-Bit Package |
fluentbit.values | object | {} |
Values to passthrough to the fluentbit chart: https://repo1.dso.mil/platform-one/big-bang/apps/core/fluentbit.git |
fluentbit.postRenderers | list | [] |
Post Renderers. See docs/postrenders.md |
promtail.enabled | bool | false |
Toggle deployment of Promtail. |
promtail.git.repo | string | "https://repo1.dso.mil/platform-one/big-bang/apps/sandbox/promtail.git" |
|
promtail.git.path | string | "./chart" |
|
promtail.git.tag | string | "6.8.1-bb.1" |
|
promtail.flux | object | {} |
Flux reconciliation overrides specifically for the Promtail Package |
promtail.values | object | {} |
Values to passthrough to the promtail chart: https://repo1.dso.mil/platform-one/big-bang/apps/core/fluentbit.git |
promtail.postRenderers | list | [] |
Post Renderers. See docs/postrenders.md |
loki.enabled | bool | false |
Toggle deployment of Loki. |
loki.git.repo | string | "https://repo1.dso.mil/platform-one/big-bang/apps/sandbox/loki.git" |
|
loki.git.path | string | "./chart" |
|
loki.git.tag | string | "4.8.0-bb.0" |
|
loki.flux | object | {} |
Flux reconciliation overrides specifically for the Loki Package |
loki.strategy | string | "monolith" |
Loki architecture. Options are monolith and scalable |
loki.objectStorage.endpoint | string | "" |
S3 compatible endpoint to use for connection information. examples: “https://s3.amazonaws.com” “https://s3.us-gov-west-1.amazonaws.com” “http://minio.minio.svc.cluster.local:9000” |
loki.objectStorage.region | string | "" |
S3 compatible region to use for connection information. |
loki.objectStorage.accessKey | string | "" |
Access key for connecting to object storage endpoint. |
loki.objectStorage.accessSecret | string | "" |
Secret key for connecting to object storage endpoint. Unencoded string data. This should be placed in the secret values and then encrypted |
loki.objectStorage.bucketNames | object | {} |
Bucket Names for the Loki buckets as YAML chunks: loki-logs ruler: loki-ruler admin: loki-admin |
loki.values | object | {} |
Values to passthrough to the Loki chart: https://repo1.dso.mil/platform-one/big-bang/apps/sandbox/loki.git |
loki.postRenderers | list | [] |
Post Renderers. See docs/postrenders.md |
neuvector.enabled | bool | false |
Toggle deployment of Neuvector. |
neuvector.git.repo | string | "https://repo1.dso.mil/platform-one/big-bang/apps/sandbox/neuvector.git" |
|
neuvector.git.path | string | "./chart" |
|
neuvector.git.tag | string | "2.4.2-bb.5" |
|
neuvector.ingress | object | {"gateway":""} |
Redirect the package ingress to a specific Istio Gateway (listed in istio.gateways ). The default is “public”. |
neuvector.sso.enabled | bool | true |
Toggle SSO for Neuvector on and off |
neuvector.sso.client_id | string | "" |
OIDC Client ID to use for Neuvector |
neuvector.sso.client_secret | string | "" |
OIDC Client Secret to use for Neuvector |
neuvector.sso.default_role | string | "" |
Default role to use for Neuvector OIDC users. Supports admin, reader, or no default |
neuvector.flux | object | {} |
Flux reconciliation overrides specifically for the Neuvector Package |
neuvector.values | object | {} |
Values to passthrough to the Neuvector chart: https://repo1.dso.mil/platform-one/big-bang/apps/sandbox/neuvector.git |
neuvector.postRenderers | list | [] |
Post Renderers. See docs/postrenders.md |
tempo.enabled | bool | false |
Toggle deployment of Tempo. |
tempo.git.repo | string | "https://repo1.dso.mil/platform-one/big-bang/apps/sandbox/tempo.git" |
|
tempo.git.path | string | "./chart" |
|
tempo.git.tag | string | "1.0.0-bb.3" |
|
tempo.ingress | object | {"gateway":""} |
Redirect the package ingress to a specific Istio Gateway (listed in istio.gateways ). The default is “public”. |
tempo.flux | object | {} |
Flux reconciliation overrides specifically for the Tempo Package |
tempo.sso.enabled | bool | false |
Toggle SSO for Tempo on and off |
tempo.sso.client_id | string | "" |
OIDC Client ID to use for Tempo |
tempo.sso.client_secret | string | "" |
OIDC Client Secret to use for Tempo |
tempo.objectStorage.endpoint | string | "" |
S3 compatible endpoint to use for connection information. examples: “s3.amazonaws.com” “s3.us-gov-west-1.amazonaws.com” “minio.minio.svc.cluster.local:9000” Note: tempo does not require protocol prefix for URL. |
tempo.objectStorage.region | string | "" |
S3 compatible region to use for connection information. |
tempo.objectStorage.accessKey | string | "" |
Access key for connecting to object storage endpoint. |
tempo.objectStorage.accessSecret | string | "" |
Secret key for connecting to object storage endpoint. Unencoded string data. This should be placed in the secret values and then encrypted |
tempo.objectStorage.bucket | string | "" |
Bucket Name for Tempo examples: “tempo-traces” |
tempo.objectStorage.insecure | bool | false |
Whether or not objectStorage connection should require HTTPS, if connecting to in-cluster object storage on port 80/9000 set this value to true. |
tempo.values | object | {} |
Values to passthrough to the Tempo chart: https://repo1.dso.mil/platform-one/big-bang/apps/sandbox/tempo.git |
tempo.postRenderers | list | [] |
Post Renderers. See docs/postrenders.md |
monitoring.enabled | bool | true |
Toggle deployment of Monitoring (Prometheus, Grafana, and Alertmanager). |
monitoring.git.repo | string | "https://repo1.dso.mil/platform-one/big-bang/apps/core/monitoring.git" |
|
monitoring.git.path | string | "./chart" |
|
monitoring.git.tag | string | "43.1.2-bb.4" |
|
monitoring.flux | object | {"install":{"crds":"CreateReplace"},"upgrade":{"crds":"CreateReplace"}} |
Flux reconciliation overrides specifically for the Monitoring Package |
monitoring.ingress | object | {"gateway":""} |
Redirect the package ingress to a specific Istio Gateway (listed in istio.gateways ). The default is “public”. |
monitoring.sso.enabled | bool | false |
Toggle SSO for monitoring components on and off |
monitoring.sso.prometheus.client_id | string | "" |
Prometheus OIDC client ID |
monitoring.sso.prometheus.client_secret | string | "" |
Prometheus OIDC client secret |
monitoring.sso.alertmanager.client_id | string | "" |
Alertmanager OIDC client ID |
monitoring.sso.alertmanager.client_secret | string | "" |
Alertmanager OIDC client secret |
monitoring.sso.grafana.client_id | string | "" |
Grafana OIDC client ID |
monitoring.sso.grafana.client_secret | string | "" |
Grafana OIDC client secret |
monitoring.sso.grafana.scopes | string | "" |
Grafana OIDC client scopes, comma separated, see https://grafana.com/docs/grafana/latest/auth/generic-oauth/ |
monitoring.sso.grafana.allow_sign_up | string | "true" |
|
monitoring.sso.grafana.role_attribute_path | string | "Viewer" |
|
monitoring.values | object | {} |
Values to passthrough to the monitoring chart: https://repo1.dso.mil/platform-one/big-bang/apps/core/monitoring.git |
monitoring.postRenderers | list | [] |
Post Renderers. See docs/postrenders.md |
twistlock.enabled | bool | true |
Toggle deployment of Twistlock. |
twistlock.git.repo | string | "https://repo1.dso.mil/platform-one/big-bang/apps/security-tools/twistlock.git" |
|
twistlock.git.path | string | "./chart" |
|
twistlock.git.tag | string | "0.11.4-bb.3" |
|
twistlock.flux | object | {} |
Flux reconciliation overrides specifically for the Twistlock Package |
twistlock.ingress | object | {"gateway":""} |
Redirect the package ingress to a specific Istio Gateway (listed in istio.gateways ). The default is “public”. |
twistlock.sso.enabled | bool | false |
Toggle SAML SSO, requires a license and enabling the init job - see https://repo1.dso.mil/platform-one/big-bang/apps/security-tools/twistlock/-/blob/main/docs/initialization.md |
twistlock.sso.client_id | string | "" |
SAML client ID |
twistlock.sso.provider_type | string | "shibboleth" |
SAML Identity Provider. shibboleth is recommended by Twistlock support for Keycloak Possible values: okta, gsuite, ping, shibboleth, azure, adfs |
twistlock.sso.groups | string | "" |
Groups attribute (optional) |
twistlock.values | object | {} |
Values to passthrough to the twistlock chart: https://repo1.dso.mil/platform-one/big-bang/apps/security-tools/twistlock.git |
twistlock.postRenderers | list | [] |
Post Renderers. See docs/postrenders.md |
addons.argocd.enabled | bool | false |
Toggle deployment of ArgoCD. |
addons.argocd.git.repo | string | "https://repo1.dso.mil/platform-one/big-bang/apps/core/argocd.git" |
|
addons.argocd.git.path | string | "./chart" |
|
addons.argocd.git.tag | string | "5.22.1-bb.2" |
|
addons.argocd.flux | object | {} |
Flux reconciliation overrides specifically for the ArgoCD Package |
addons.argocd.ingress | object | {"gateway":""} |
Redirect the package ingress to a specific Istio Gateway (listed in istio.gateways ). The default is “public”. |
addons.argocd.redis.host | string | "" |
Hostname of a pre-existing Redis to use for ArgoCD. Entering connection info will enable external Redis and will auto-create any required secrets. |
addons.argocd.redis.port | string | "" |
Port of a pre-existing Redis to use for ArgoCD. |
addons.argocd.sso.enabled | bool | false |
Toggle SSO for ArgoCD on and off |
addons.argocd.sso.client_id | string | "" |
ArgoCD OIDC client ID |
addons.argocd.sso.client_secret | string | "" |
ArgoCD OIDC client secret |
addons.argocd.sso.groups | string | "g, Impact Level 2 Authorized, role:admin\n" |
ArgoCD SSO group roles, see docs for more details: https://argo-cd.readthedocs.io/en/stable/operator-manual/rbac/ |
addons.argocd.values | object | {} |
Values to passthrough to the argocd chart: https://repo1.dso.mil/platform-one/big-bang/apps/core/argocd.git |
addons.argocd.postRenderers | list | [] |
Post Renderers. See docs/postrenders.md |
addons.authservice.enabled | bool | false |
Toggle deployment of Authservice. if enabling authservice, a filter needs to be provided by either enabling sso for monitoring or istio, or manually adding a filter chain in the values here: values: chain: minimal: callback_uri: “https://somecallback” |
addons.authservice.git.repo | string | "https://repo1.dso.mil/platform-one/big-bang/apps/core/authservice.git" |
|
addons.authservice.git.path | string | "./chart" |
|
addons.authservice.git.tag | string | "0.5.3-bb.5" |
|
addons.authservice.flux | object | {} |
Flux reconciliation overrides specifically for the Authservice Package |
addons.authservice.values | object | {} |
Values to passthrough to the authservice chart: https://repo1.dso.mil/platform-one/big-bang/apps/core/authservice.git |
addons.authservice.postRenderers | list | [] |
Post Renderers. See docs/postrenders.md |
addons.authservice.chains | object | {} |
Additional authservice chain configurations. |
addons.minioOperator.enabled | bool | false |
Toggle deployment of minio operator and instance. |
addons.minioOperator.git.repo | string | "https://repo1.dso.mil/platform-one/big-bang/apps/application-utilities/minio-operator.git" |
|
addons.minioOperator.git.path | string | "./chart" |
|
addons.minioOperator.git.tag | string | "4.5.4-bb.0" |
|
addons.minioOperator.flux | object | {} |
Flux reconciliation overrides specifically for the Minio Operator Package |
addons.minioOperator.values | object | {} |
Values to passthrough to the minio operator chart: https://repo1.dso.mil/platform-one/big-bang/apps/application-utilities/minio-operator.git |
addons.minioOperator.postRenderers | list | [] |
Post Renderers. See docs/postrenders.md |
addons.minio.enabled | bool | false |
Toggle deployment of minio. |
addons.minio.git.repo | string | "https://repo1.dso.mil/platform-one/big-bang/apps/application-utilities/minio.git" |
|
addons.minio.git.path | string | "./chart" |
|
addons.minio.git.tag | string | "4.5.4-bb.3" |
|
addons.minio.flux | object | {} |
Flux reconciliation overrides specifically for the Minio Package |
addons.minio.ingress | object | {"gateway":""} |
Redirect the package ingress to a specific Istio Gateway (listed in istio.gateways ). The default is “public”. |
addons.minio.accesskey | string | "" |
Default access key to use for minio. |
addons.minio.secretkey | string | "" |
Default secret key to intstantiate with minio, you should change/delete this after installation. |
addons.minio.values | object | {} |
Values to passthrough to the minio instance chart: https://repo1.dso.mil/platform-one/big-bang/apps/application-utilities/minio.git |
addons.minio.postRenderers | list | [] |
Post Renderers. See docs/postrenders.md |
addons.gitlab.enabled | bool | false |
Toggle deployment of Gitlab |
addons.gitlab.hostnames.gitlab | string | "gitlab" |
|
addons.gitlab.hostnames.registry | string | "registry" |
|
addons.gitlab.git.repo | string | "https://repo1.dso.mil/platform-one/big-bang/apps/developer-tools/gitlab.git" |
|
addons.gitlab.git.path | string | "./chart" |
|
addons.gitlab.git.tag | string | "6.9.2-bb.1" |
|
addons.gitlab.flux | object | {} |
Flux reconciliation overrides specifically for the Gitlab Package |
addons.gitlab.ingress | object | {"gateway":""} |
Redirect the package ingress to a specific Istio Gateway (listed in istio.gateways ). The default is “public”. |
addons.gitlab.sso.enabled | bool | false |
Toggle OIDC SSO for Gitlab on and off. Enabling this option will auto-create any required secrets. |
addons.gitlab.sso.client_id | string | "" |
Gitlab OIDC client ID |
addons.gitlab.sso.client_secret | string | "" |
Gitlab OIDC client secret |
addons.gitlab.sso.scopes | list | ["Gitlab"] |
Gitlab SSO Scopes, default is [“Gitlab”] |
addons.gitlab.database.host | string | "" |
Hostname of a pre-existing PostgreSQL database to use for Gitlab. Entering connection info will disable the deployment of an internal database and will auto-create any required secrets. |
addons.gitlab.database.port | int | 5432 |
Port of a pre-existing PostgreSQL database to use for Gitlab. |
addons.gitlab.database.database | string | "" |
Database name to connect to on host. |
addons.gitlab.database.username | string | "" |
Username to connect as to external database, the user must have all privileges on the database. |
addons.gitlab.database.password | string | "" |
Database password for the username used to connect to the existing database. |
addons.gitlab.objectStorage.type | string | "" |
Type of object storage to use for Gitlab, setting to s3 will assume an external, pre-existing object storage is to be used. Entering connection info will enable this option and will auto-create any required secrets |
addons.gitlab.objectStorage.endpoint | string | "" |
S3 compatible endpoint to use for connection information. examples: “https://s3.amazonaws.com” “https://s3.us-gov-west-1.amazonaws.com” “http://minio.minio.svc.cluster.local:9000” |
addons.gitlab.objectStorage.region | string | "" |
S3 compatible region to use for connection information. |
addons.gitlab.objectStorage.accessKey | string | "" |
Access key for connecting to object storage endpoint. – If using accessKey and accessSecret, the iamProfile must be left as an empty string: “” |
addons.gitlab.objectStorage.accessSecret | string | "" |
Secret key for connecting to object storage endpoint. Unencoded string data. This should be placed in the secret values and then encrypted |
addons.gitlab.objectStorage.bucketPrefix | string | "" |
Bucket prefix to use for identifying buckets. Example: “prod” will produce “prod-gitlab-bucket” |
addons.gitlab.objectStorage.iamProfile | string | "" |
NOTE: Current bug with AWS IAM Profiles and Object Storage where only artifacts are stored. Fixed in Gitlab 14.5 – Name of AWS IAM profile to use. – If using an AWS IAM profile, the accessKey and accessSecret values must be left as empty strings eg: “” |
addons.gitlab.smtp.password | string | "" |
Passwords should be placed in an encrypted file. Example: environment-bb-secret.enc.yaml If a value is provided BigBang will create a k8s secret named gitlab-smtp-password in the gitlab namespace |
addons.gitlab.redis.password | string | "" |
Redis plain text password to connect to the redis server. If empty (“”), the gitlab charts will create the gitlab-redis-secret with a random password. – This needs to be set to a non-empty value in order for the Grafana Redis Datasource and Dashboards to be installed. |
addons.gitlab.values | object | {} |
Values to passthrough to the gitlab chart: https://repo1.dso.mil/platform-one/big-bang/apps/developer-tools/gitlab.git |
addons.gitlab.postRenderers | list | [] |
Post Renderers. See docs/postrenders.md |
addons.gitlabRunner.enabled | bool | false |
Toggle deployment of Gitlab Runner |
addons.gitlabRunner.git.repo | string | "https://repo1.dso.mil/platform-one/big-bang/apps/developer-tools/gitlab-runner.git" |
|
addons.gitlabRunner.git.path | string | "./chart" |
|
addons.gitlabRunner.git.tag | string | "0.49.1-bb.0" |
|
addons.gitlabRunner.flux | object | {} |
Flux reconciliation overrides specifically for the Gitlab Runner Package |
addons.gitlabRunner.values | object | {} |
Values to passthrough to the gitlab runner chart: https://repo1.dso.mil/platform-one/big-bang/apps/developer-tools/gitlab-runner.git |
addons.gitlabRunner.postRenderers | list | [] |
Post Renderers. See docs/postrenders.md |
addons.nexusRepositoryManager.enabled | bool | false |
Toggle deployment of Nexus Repository Manager. |
addons.nexusRepositoryManager.git.repo | string | "https://repo1.dso.mil/platform-one/big-bang/apps/developer-tools/nexus.git" |
|
addons.nexusRepositoryManager.git.path | string | "./chart" |
|
addons.nexusRepositoryManager.git.tag | string | "47.1.0-bb.0" |
|
addons.nexusRepositoryManager.license_key | string | "" |
Base64 encoded license file. |
addons.nexusRepositoryManager.ingress | object | {"gateway":""} |
Redirect the package ingress to a specific Istio Gateway (listed in istio.gateways ). The default is “public”. |
addons.nexusRepositoryManager.sso.enabled | bool | false |
Toggle SAML SSO for NXRM. – handles SAML SSO, a Client must be configured in Keycloak or IdP – to complete setup. – https://support.sonatype.com/hc/en-us/articles/1500000976522-SAML-integration-for-Nexus-Repository-Manager-Pro-3-and-Nexus-IQ-Server-with-Keycloak#h_01EV7CWCYH3YKAPMAHG8XMQ599 |
addons.nexusRepositoryManager.sso.idp_data | object | {"email":"","entityId":"","firstName":"","groups":"","lastName":"","username":""} |
NXRM SAML SSO Integration data |
addons.nexusRepositoryManager.sso.idp_data.username | string | "" |
IdP Field Mappings – NXRM username attribute |
addons.nexusRepositoryManager.sso.idp_data.firstName | string | "" |
NXRM firstname attribute (optional) |
addons.nexusRepositoryManager.sso.idp_data.lastName | string | "" |
NXRM lastname attribute (optional) |
addons.nexusRepositoryManager.sso.idp_data.email | string | "" |
NXRM email attribute (optional) |
addons.nexusRepositoryManager.sso.idp_data.groups | string | "" |
NXRM groups attribute (optional) |
addons.nexusRepositoryManager.sso.role | list | [{"description":"","id":"","name":"","privileges":[],"roles":[]}] |
NXRM Role |
addons.nexusRepositoryManager.flux | object | {} |
Flux reconciliation overrides specifically for the Nexus Repository Manager Package |
addons.nexusRepositoryManager.values | object | {} |
Values to passthrough to the nxrm chart: https://repo1.dso.mil/platform-one/big-bang/apps/sandbox/nexus.git |
addons.nexusRepositoryManager.postRenderers | list | [] |
Post Renderers. See docs/postrenders.md |
addons.sonarqube.enabled | bool | false |
Toggle deployment of SonarQube. |
addons.sonarqube.git.repo | string | "https://repo1.dso.mil/platform-one/big-bang/apps/developer-tools/sonarqube.git" |
|
addons.sonarqube.git.path | string | "./chart" |
|
addons.sonarqube.git.tag | string | "8.0.0-bb.1" |
|
addons.sonarqube.flux | object | {} |
Flux reconciliation overrides specifically for the Sonarqube Package |
addons.sonarqube.ingress | object | {"gateway":""} |
Redirect the package ingress to a specific Istio Gateway (listed in istio.gateways ). The default is “public”. |
addons.sonarqube.sso.enabled | bool | false |
Toggle SAML SSO for SonarQube. Enabling this option will auto-create any required secrets. |
addons.sonarqube.sso.client_id | string | "" |
SonarQube SAML client ID |
addons.sonarqube.sso.login | string | "login" |
SonarQube login sso attribute. |
addons.sonarqube.sso.name | string | "name" |
SonarQube name sso attribute. |
addons.sonarqube.sso.email | string | "email" |
SonarQube email sso attribute. |
addons.sonarqube.sso.group | string | "group" |
(optional) SonarQube group sso attribute. |
addons.sonarqube.database.host | string | "" |
Hostname of a pre-existing PostgreSQL database to use for SonarQube. |
addons.sonarqube.database.port | int | 5432 |
Port of a pre-existing PostgreSQL database to use for SonarQube. |
addons.sonarqube.database.database | string | "" |
Database name to connect to on host. |
addons.sonarqube.database.username | string | "" |
Username to connect as to external database, the user must have all privileges on the database. |
addons.sonarqube.database.password | string | "" |
Database password for the username used to connect to the existing database. |
addons.sonarqube.values | object | {} |
Values to passthrough to the sonarqube chart: https://repo1.dso.mil/platform-one/big-bang/apps/developer-tools/sonarqube.git |
addons.sonarqube.postRenderers | list | [] |
Post Renderers. See docs/postrenders.md |
addons.haproxy.git.repo | string | "https://repo1.dso.mil/platform-one/big-bang/apps/developer-tools/haproxy.git" |
|
addons.haproxy.git.path | string | "./chart" |
|
addons.haproxy.git.tag | string | "1.12.0-bb.0" |
|
addons.haproxy.flux | object | {} |
Flux reconciliation overrides specifically for the HAProxy Package |
addons.haproxy.ingress | object | {"gateway":""} |
Redirect the package ingress to a specific Istio Gateway (listed in istio.gateways ). The default is “public”. |
addons.haproxy.values | object | {} |
Values to passthrough to the haproxy chart: https://repo1.dso.mil/platform-one/big-bang/apps/developer-tools/haproxy.git |
addons.haproxy.postRenderers | list | [] |
Post Renderers. See docs/postrenders.md |
addons.anchore.enabled | bool | false |
Toggle deployment of Anchore. |
addons.anchore.git.repo | string | "https://repo1.dso.mil/platform-one/big-bang/apps/security-tools/anchore-enterprise.git" |
|
addons.anchore.git.path | string | "./chart" |
|
addons.anchore.git.tag | string | "1.22.3-bb.0" |
|
addons.anchore.flux | object | {"upgrade":{"disableWait":true}} |
Flux reconciliation overrides specifically for the Anchore Package |
addons.anchore.adminPassword | string | "" |
Initial admin password used to authenticate to Anchore. |
addons.anchore.enterprise | object | {"enabled":false,"licenseYaml":"FULL LICENSE\n"} |
Anchore Enterprise functionality. |
addons.anchore.enterprise.enabled | bool | false |
Toggle the installation of Anchore Enterprise. This must be accompanied by a valid license. |
addons.anchore.enterprise.licenseYaml | string | "FULL LICENSE\n" |
License for Anchore Enterprise. For formatting examples see https://repo1.dso.mil/platform-one/big-bang/apps/security-tools/anchore-enterprise/-/blob/main/docs/CHART.md#enabling-enterprise-services |
addons.anchore.ingress | object | {"gateway":""} |
Redirect the package ingress to a specific Istio Gateway (listed in istio.gateways ). The default is “public”. |
addons.anchore.sso.enabled | bool | false |
Toggle SAML SSO for Anchore on and off. Enabling this option will auto-create any required secrets (Note: SSO requires an Enterprise license). |
addons.anchore.sso.client_id | string | "" |
Anchore SAML client ID |
addons.anchore.sso.role_attribute | string | "" |
Anchore SAML client role attribute |
addons.anchore.database.host | string | "" |
Hostname of a pre-existing PostgreSQL database to use for Anchore. Entering connection info will disable the deployment of an internal database and will auto-create any required secrets. |
addons.anchore.database.port | string | "" |
Port of a pre-existing PostgreSQL database to use for Anchore. |
addons.anchore.database.username | string | "" |
Username to connect as to external database, the user must have all privileges on the database. |
addons.anchore.database.password | string | "" |
Database password for the username used to connect to the existing database. |
addons.anchore.database.database | string | "" |
Database name to connect to on host (Note: database name CANNOT contain hyphens). |
addons.anchore.database.feeds_database | string | "" |
Feeds database name to connect to on host (Note: feeds database name CANNOT contain hyphens). Only required for enterprise edition of anchore. By default, feeds database will be configured with the same username and password as the main database. For formatting examples on how to use a separate username and password for the feeds database see https://repo1.dso.mil/platform-one/big-bang/apps/security-tools/anchore-enterprise/-/blob/main/docs/CHART.md#handling-dependencies |
addons.anchore.redis.host | string | "" |
Hostname of a pre-existing Redis to use for Anchore Enterprise. Entering connection info will enable external redis and will auto-create any required secrets. Anchore only requires redis for enterprise deployments and will not provision an instance if using external |
addons.anchore.redis.port | string | "" |
Port of a pre-existing Redis to use for Anchore Enterprise. |
addons.anchore.redis.username | string | "" |
OPTIONAL: Username to connect to a pre-existing Redis (for password-only auth leave empty) |
addons.anchore.redis.password | string | "" |
Password to connect to pre-existing Redis. |
addons.anchore.values | object | {} |
Values to passthrough to the anchore chart: https://repo1.dso.mil/platform-one/big-bang/apps/security-tools/anchore-enterprise.git |
addons.anchore.postRenderers | list | [] |
Post Renderers. See docs/postrenders.md |
addons.mattermostOperator.enabled | bool | false |
|
addons.mattermostOperator.git.repo | string | "https://repo1.dso.mil/platform-one/big-bang/apps/collaboration-tools/mattermost-operator.git" |
|
addons.mattermostOperator.git.path | string | "./chart" |
|
addons.mattermostOperator.git.tag | string | "1.19.0-bb.0" |
|
addons.mattermostOperator.flux | object | {} |
Flux reconciliation overrides specifically for the Mattermost Operator Package |
addons.mattermostOperator.values | object | {} |
Values to passthrough to the mattermost operator chart: https://repo1.dso.mil/platform-one/big-bang/apps/collaboration-tools/mattermost-operator/-/blob/main/chart/values.yaml |
addons.mattermostOperator.postRenderers | list | [] |
Post Renderers. See docs/postrenders.md |
addons.mattermost.enabled | bool | false |
Toggle deployment of Mattermost. |
addons.mattermost.git.repo | string | "https://repo1.dso.mil/platform-one/big-bang/apps/collaboration-tools/mattermost.git" |
|
addons.mattermost.git.path | string | "./chart" |
|
addons.mattermost.git.tag | string | "7.8.1-bb.0" |
|
addons.mattermost.flux | object | {} |
Flux reconciliation overrides specifically for the Mattermost Package |
addons.mattermost.enterprise | object | {"enabled":false,"license":""} |
Mattermost Enterprise functionality. |
addons.mattermost.enterprise.enabled | bool | false |
Toggle the Mattermost Enterprise. This must be accompanied by a valid license unless you plan to start a trial post-install. |
addons.mattermost.enterprise.license | string | "" |
License for Mattermost. This should be the entire contents of the license file from Mattermost (should be one line), example below license: “eyJpZCI6InIxM205bjR3eTdkYjludG95Z3RiOD—REST—IS—HIDDEN |
addons.mattermost.ingress | object | {"gateway":""} |
Redirect the package ingress to a specific Istio Gateway (listed in istio.gateways ). The default is “public”. |
addons.mattermost.sso.enabled | bool | false |
Toggle OIDC SSO for Mattermost on and off. Enabling this option will auto-create any required secrets. |
addons.mattermost.sso.client_id | string | "" |
Mattermost OIDC client ID |
addons.mattermost.sso.client_secret | string | "" |
Mattermost OIDC client secret |
addons.mattermost.database.host | string | "" |
Hostname of a pre-existing PostgreSQL database to use for Mattermost. Entering connection info will disable the deployment of an internal database and will auto-create any required secrets. |
addons.mattermost.database.port | string | "" |
Port of a pre-existing PostgreSQL database to use for Mattermost. |
addons.mattermost.database.username | string | "" |
Username to connect as to external database, the user must have all privileges on the database. |
addons.mattermost.database.password | string | "" |
Database password for the username used to connect to the existing database. |
addons.mattermost.database.database | string | "" |
Database name to connect to on host. |
addons.mattermost.database.ssl_mode | string | "" |
SSL Mode to use when connecting to the database. Allowable values for this are viewable in the postgres documentation: https://www.postgresql.org/docs/current/libpq-ssl.html#LIBPQ-SSL-SSLMODE-STATEMENTS |
addons.mattermost.objectStorage.endpoint | string | "" |
S3 compatible endpoint to use for connection information. Entering connection info will enable this option and will auto-create any required secrets. examples: “s3.amazonaws.com” “s3.us-gov-west-1.amazonaws.com” “minio.minio.svc.cluster.local:9000” |
addons.mattermost.objectStorage.accessKey | string | "" |
Access key for connecting to object storage endpoint. |
addons.mattermost.objectStorage.accessSecret | string | "" |
Secret key for connecting to object storage endpoint. Unencoded string data. This should be placed in the secret values and then encrypted |
addons.mattermost.objectStorage.bucket | string | "" |
Bucket name to use for Mattermost - will be auto-created. |
addons.mattermost.elasticsearch | object | {"enabled":false} |
Mattermost Elasticsearch integration - requires enterprise E20 license - https://docs.mattermost.com/deployment/elasticsearch.html Connection info defaults to the BB deployed Elastic, all values can be overridden via the “values” passthrough for other connections. See values spec in MM chart “elasticsearch” yaml block - https://repo1.dso.mil/platform-one/big-bang/apps/collaboration-tools/mattermost/-/blob/main/chart/values.yaml |
addons.mattermost.elasticsearch.enabled | bool | false |
Toggle interaction with Elastic for optimized search indexing |
addons.mattermost.values | object | {} |
Values to passthrough to the Mattermost chart: https://repo1.dso.mil/platform-one/big-bang/apps/collaboration-tools/mattermost/-/blob/main/chart/values.yaml |
addons.mattermost.postRenderers | list | [] |
Post Renderers. See docs/postrenders.md |
addons.velero.enabled | bool | false |
Toggle deployment of Velero. |
addons.velero.git.repo | string | "https://repo1.dso.mil/platform-one/big-bang/apps/cluster-utilities/velero.git" |
|
addons.velero.git.path | string | "./chart" |
|
addons.velero.git.tag | string | "3.1.2-bb.2" |
|
addons.velero.flux | object | {} |
Flux reconciliation overrides specifically for the Velero Package |
addons.velero.plugins | list | [] |
Plugin provider for Velero - requires at least one plugin installed. Current supported values: aws, azure, csi |
addons.velero.values | object | {} |
Values to passthrough to the Velero chart: https://repo1.dso.mil/platform-one/big-bang/apps/cluster-utilities/velero/-/blob/main/chart/values.yaml |
addons.velero.postRenderers | list | [] |
Post Renderers. See docs/postrenders.md |
addons.keycloak.enabled | bool | false |
Toggle deployment of Keycloak. if you enable Keycloak you should uncomment the istio passthrough configurations above istio.ingressGateways.passthrough-ingressgateway and istio.gateways.passthrough |
addons.keycloak.git.repo | string | "https://repo1.dso.mil/platform-one/big-bang/apps/security-tools/keycloak.git" |
|
addons.keycloak.git.path | string | "./chart" |
|
addons.keycloak.git.tag | string | "18.4.0-bb.1" |
|
addons.keycloak.database.host | string | "" |
Hostname of a pre-existing database to use for Keycloak. Entering connection info will disable the deployment of an internal database and will auto-create any required secrets. |
addons.keycloak.database.type | string | "postgres" |
Pre-existing database type (e.g. postgres) to use for Keycloak. |
addons.keycloak.database.port | int | 5432 |
Port of a pre-existing database to use for Keycloak. |
addons.keycloak.database.database | string | "" |
Database name to connect to on host. |
addons.keycloak.database.username | string | "" |
Username to connect as to external database, the user must have all privileges on the database. |
addons.keycloak.database.password | string | "" |
Database password for the username used to connect to the existing database. |
addons.keycloak.flux | object | {} |
Flux reconciliation overrides specifically for the OPA Gatekeeper Package |
addons.keycloak.ingress | object | {"cert":"","gateway":"passthrough","key":""} |
Redirect the package ingress to a specific Istio Gateway (listed in istio.gateways ). The default is “public”. |
addons.keycloak.ingress.key | string | "" |
Certificate/Key pair to use as the certificate for exposing Keycloak Setting the ingress cert here will automatically create the volume and volumemounts in the Keycloak Package chart |
addons.keycloak.values | object | {} |
Values to passthrough to the keycloak chart: https://repo1.dso.mil/platform-one/big-bang/apps/security-tools/keycloak.git |
addons.keycloak.postRenderers | list | [] |
Post Renderers. See docs/postrenders.md |
addons.vault.enabled | bool | false |
Toggle deployment of Vault. |
addons.vault.git.repo | string | "https://repo1.dso.mil/platform-one/big-bang/apps/sandbox/vault.git" |
|
addons.vault.git.path | string | "./chart" |
|
addons.vault.git.tag | string | "0.23.0-bb.2" |
|
addons.vault.flux | object | {} |
Flux reconciliation overrides specifically for the Vault Package |
addons.vault.ingress | object | {"cert":"","gateway":"","key":""} |
Redirect the package ingress to a specific Istio Gateway (listed in istio.gateways ). The default is “public”. |
addons.vault.ingress.key | string | "" |
Certificate/Key pair to use as the certificate for exposing Vault Setting the ingress cert here will automatically create the volume and volumemounts in the Vault package chart |
addons.vault.values | object | {} |
Values to passthrough to the vault chart: https://repo1.dso.mil/platform-one/big-bang/apps/sandbox/vault.git |
addons.vault.postRenderers | list | [] |
Post Renderers. See docs/postrenders.md |
addons.metricsServer.enabled | string | "auto" |
Toggle deployment of metrics server Acceptable options are enabled: true, enabled: false, enabled: auto true = enabled / false = disabled / auto = automatic (Installs only if metrics API endpoint is not present) |
addons.metricsServer.git.repo | string | "https://repo1.dso.mil/platform-one/big-bang/apps/sandbox/metrics-server.git" |
|
addons.metricsServer.git.path | string | "./chart" |
|
addons.metricsServer.git.tag | string | "3.8.4-bb.0" |
|
addons.metricsServer.flux | object | {} |
Flux reconciliation overrides specifically for the metrics server Package |
addons.metricsServer.values | object | {} |
Values to passthrough to the metrics server chart: https://repo1.dso.mil/platform-one/big-bang/apps/sandbox/metrics-server.git |
addons.metricsServer.postRenderers | list | [] |
Post Renderers. See docs/postrenders.md |
Last update:
2023-03-24 by garcia.ryan