jaeger values.yaml
💣
nameOverride💣
Type: string
"jaeger-operator"
Description: Chart name override
openshift💣
Type: object
{"enabled":false}
Default value (formatted)
{
"enabled": false
}
Description: Openshift toggle, only affects networkPolicies
sso💣
Type: object
{"enabled":false}
Default value (formatted)
{
"enabled": false
}
Description: SSO toggle, only affects auth policies
monitoring💣
Type: object
{"enabled":false,"serviceMonitor":{"scheme":"","tlsConfig":{}}}
Default value (formatted)
{
"enabled": false,
"serviceMonitor": {
"scheme": "",
"tlsConfig": {}
}
}
Description: Monitoring toggle, affects servicemonitor and networkPolicies
domain💣
Type: string
"bigbang.dev"
Description: Domain to service Jaeger virtualService
istio.enabled💣
Type: bool
false
Description: Toggle istio integration
istio.jaeger.enabled💣
Type: bool
true
Description: Toggle vs creation
istio.jaeger.annotations💣
Type: object
{}
Default value (formatted)
{}
istio.jaeger.labels💣
Type: object
{}
Default value (formatted)
{}
istio.jaeger.gateways[0]💣
Type: string
"istio-system/main"
istio.jaeger.hosts[0]💣
Type: string
"tracing.{{ .Values.domain }}"
istio.mtls💣
Type: object
{"mode":"STRICT"}
Default value (formatted)
{
"mode": "STRICT"
}
Description: Default jaeger peer authentication
istio.mtls.mode💣
Type: string
"STRICT"
Description: STRICT = Allow only mutual TLS traffic, PERMISSIVE = Allow both plain text and mutual TLS traffic
cleanSvcMonitor💣
Type: object
{"enabled":false,"image":{"repository":"registry1.dso.mil/ironbank/big-bang/base","tag":"2.0.0"}}
Default value (formatted)
{
"enabled": false,
"image": {
"repository": "registry1.dso.mil/ironbank/big-bang/base",
"tag": "2.0.0"
}
}
Description: Only needed for upgrade from pre-1.29.x, Deletes the servicemonitor that targetted deprecated metrics endpoints
webhookCertGen💣
Type: object
{"affinity":{},"cleanupProxy":{"image":{"pullPolicy":"IfNotPresent","repository":"registry1.dso.mil/ironbank/big-bang/base","tag":"2.0.0"}},"containerSecurityContext":{"capabilities":{"drop":["ALL"]}},"enabled":true,"image":{"pullPolicy":"IfNotPresent","repository":"registry1.dso.mil/ironbank/opensource/ingress-nginx/kube-webhook-certgen","tag":"v1.3.0"},"nodeSelector":{},"resources":{"limits":{"cpu":"50m","memory":"50Mi"},"requests":{"cpu":"50m","memory":"50Mi"}},"securityContext":{"runAsGroup":65532,"runAsNonRoot":true,"runAsUser":65532},"tolerations":{}}
Default value (formatted)
{
"affinity": {},
"cleanupProxy": {
"image": {
"pullPolicy": "IfNotPresent",
"repository": "registry1.dso.mil/ironbank/big-bang/base",
"tag": "2.0.0"
}
},
"containerSecurityContext": {
"capabilities": {
"drop": [
"ALL"
]
}
},
"enabled": true,
"image": {
"pullPolicy": "IfNotPresent",
"repository": "registry1.dso.mil/ironbank/opensource/ingress-nginx/kube-webhook-certgen",
"tag": "v1.3.0"
},
"nodeSelector": {},
"resources": {
"limits": {
"cpu": "50m",
"memory": "50Mi"
},
"requests": {
"cpu": "50m",
"memory": "50Mi"
}
},
"securityContext": {
"runAsGroup": 65532,
"runAsNonRoot": true,
"runAsUser": 65532
},
"tolerations": {}
}
Description: Job to generate and patch webhooks with certificate
webhookCertGen.enabled💣
Type: bool
true
Description: If disabled must use cert manager and manually patch webhook
elasticsearch.enabled💣
Type: bool
false
elasticsearch.indexTemplateCreation💣
Type: object
{"containerSecurityContext":{"capabilities":{"drop":["ALL"]}},"enabled":true,"image":{"repository":"registry1.dso.mil/ironbank/big-bang/base","tag":"2.0.0"},"securityContext":{"runAsGroup":1001,"runAsNonRoot":true,"runAsUser":1001},"servicePriority":10,"spanPriority":11}
Default value (formatted)
{
"containerSecurityContext": {
"capabilities": {
"drop": [
"ALL"
]
}
},
"enabled": true,
"image": {
"repository": "registry1.dso.mil/ironbank/big-bang/base",
"tag": "2.0.0"
},
"securityContext": {
"runAsGroup": 1001,
"runAsNonRoot": true,
"runAsUser": 1001
},
"servicePriority": 10,
"spanPriority": 11
}
Description: Custom BB job to create required index templates for ES 8.x
elasticsearch.indexTemplateCreation.servicePriority💣
Type: int
10
Description: Priority to add to the service index template, cannot conflict with existing templates
elasticsearch.indexTemplateCreation.spanPriority💣
Type: int
11
Description: Priority to add to the span index template, cannot conflict with existing templates
elasticsearch.username💣
Type: string
"elastic"
elasticsearch.name💣
Type: string
"logging-ek"
elasticsearch.namespace💣
Type: string
"logging"
elasticsearch.storage.options.es.server-urls💣
Type: string
"https://{{ $.Values.elasticsearch.name }}-es-http.{{ $.Values.elasticsearch.namespace }}.svc:9200"
elasticsearch.storage.options.es.tls.enabled💣
Type: string
"true"
elasticsearch.storage.options.es.tls.ca💣
Type: string
"/es/certificates/ca.crt"
elasticsearch.storage.options.es.version💣
Type: int
7
elasticsearch.storage.options.es.create-index-templates💣
Type: bool
false
retention.enabled💣
Type: bool
false
retention.schedule💣
Type: string
"0 * * * *"
retention.days💣
Type: int
5
retention.image💣
Type: string
"registry1.dso.mil/ironbank/opensource/jaegertracing/jaeger-es-index-cleaner:1.46.0"
operatorUpdateStrategy.type💣
Type: string
"RollingUpdate"
image.repository💣
Type: string
"registry1.dso.mil/ironbank/opensource/jaegertracing/jaeger-operator"
image.tag💣
Type: string
"1.46.0"
image.pullPolicy💣
Type: string
"Always"
image.imagePullSecrets[0]💣
Type: string
"private-registry"
certs.issuer.create💣
Type: bool
false
certs.issuer.name💣
Type: string
""
certs.certificate.create💣
Type: bool
false
certs.certificate.namespace💣
Type: string
""
certs.certificate.secretName💣
Type: string
"jaeger-operator-webhook-cert"
certs.certificate.issuerKind💣
Type: string
"Issuer"
webhooks.mutatingWebhook.create💣
Type: bool
true
webhooks.validatingWebhook.create💣
Type: bool
true
webhooks.port💣
Type: int
9443
webhooks.service.annotations💣
Type: object
{}
Default value (formatted)
{}
webhooks.service.create💣
Type: bool
true
webhooks.service.name💣
Type: string
""
jaeger.create💣
Type: bool
true
jaeger.namespace💣
Type: string
nil
jaeger.spec.strategy💣
Type: string
"allInOne"
jaeger.spec.ingress.enabled💣
Type: bool
false
jaeger.spec.annotations💣
Type: object
{}
Default value (formatted)
{}
jaeger.spec.labels💣
Type: object
{}
Default value (formatted)
{}
jaeger.spec.allInOne.image💣
Type: string
"registry1.dso.mil/ironbank/opensource/jaegertracing/all-in-one:1.46.0"
jaeger.spec.allInOne.options.log-level💣
Type: string
"info"
jaeger.spec.allInOne.options.collector.zipkin.host-port💣
Type: string
":9411"
jaeger.spec.allInOne.annotations.”sidecar.istio.io/inject”💣
Type: string
"true"
jaeger.spec.allInOne.annotations.”traffic.sidecar.istio.io/includeInboundPorts”💣
Type: string
"16686"
jaeger.spec.allInOne.resources.requests.cpu💣
Type: string
"200m"
jaeger.spec.allInOne.resources.requests.memory💣
Type: string
"128Mi"
jaeger.spec.allInOne.resources.limits.cpu💣
Type: string
"200m"
jaeger.spec.allInOne.resources.limits.memory💣
Type: string
"128Mi"
jaeger.spec.allInOne.securityContext.runAsNonRoot💣
Type: bool
true
jaeger.spec.allInOne.securityContext.runAsUser💣
Type: int
1001
jaeger.spec.allInOne.securityContext.runAsGroup💣
Type: int
1001
jaeger.spec.allInOne.containerSecurityContext.capabilities.drop[0]💣
Type: string
"ALL"
jaeger.spec.allInOne.strategy.type💣
Type: string
"RollingUpdate"
jaeger.spec.agent.maxReplicas💣
Type: int
5
jaeger.spec.agent.image💣
Type: string
"registry1.dso.mil/ironbank/opensource/jaegertracing/jaeger-agent:1.46.0"
jaeger.spec.agent.options.log-level💣
Type: string
"info"
jaeger.spec.agent.imagePullSecrets[0]💣
Type: string
"private-registry"
jaeger.spec.agent.securityContext.runAsNonRoot💣
Type: bool
true
jaeger.spec.agent.securityContext.runAsUser💣
Type: int
1001
jaeger.spec.agent.securityContext.runAsGroup💣
Type: int
1001
jaeger.spec.agent.containerSecurityContext.capabilities.drop[0]💣
Type: string
"ALL"
jaeger.spec.agent.strategy.type💣
Type: string
"RollingUpdate"
jaeger.spec.ingester.maxReplicas💣
Type: int
5
jaeger.spec.ingester.image💣
Type: string
"registry1.dso.mil/ironbank/opensource/jaegertracing/jaeger-ingester:1.46.0"
jaeger.spec.ingester.options.log-level💣
Type: string
"info"
jaeger.spec.ingester.securityContext.runAsNonRoot💣
Type: bool
true
jaeger.spec.ingester.securityContext.runAsUser💣
Type: int
1001
jaeger.spec.ingester.securityContext.runAsGroup💣
Type: int
1001
jaeger.spec.ingester.containerSecurityContext.capabilities.drop[0]💣
Type: string
"ALL"
jaeger.spec.ingester.strategy.type💣
Type: string
"RollingUpdate"
jaeger.spec.query.replicas💣
Type: int
5
jaeger.spec.query.image💣
Type: string
"registry1.dso.mil/ironbank/opensource/jaegertracing/jaeger-query:1.46.0"
jaeger.spec.query.options.log-level💣
Type: string
"info"
jaeger.spec.query.securityContext.runAsNonRoot💣
Type: bool
true
jaeger.spec.query.securityContext.runAsUser💣
Type: int
1001
jaeger.spec.query.securityContext.runAsGroup💣
Type: int
1001
jaeger.spec.query.containerSecurityContext.capabilities.drop[0]💣
Type: string
"ALL"
jaeger.spec.query.strategy.type💣
Type: string
"RollingUpdate"
jaeger.spec.collector.maxReplicas💣
Type: int
5
jaeger.spec.collector.image💣
Type: string
"registry1.dso.mil/ironbank/opensource/jaegertracing/jaeger-collector:1.46.0"
jaeger.spec.collector.options.log-level💣
Type: string
"info"
jaeger.spec.collector.resources.requests.cpu💣
Type: string
"200m"
jaeger.spec.collector.resources.requests.memory💣
Type: string
"128Mi"
jaeger.spec.collector.resources.limits.cpu💣
Type: string
"200m"
jaeger.spec.collector.resources.limits.memory💣
Type: string
"128Mi"
jaeger.spec.collector.securityContext.runAsNonRoot💣
Type: bool
true
jaeger.spec.collector.securityContext.runAsUser💣
Type: int
1001
jaeger.spec.collector.securityContext.runAsGroup💣
Type: int
1001
jaeger.spec.collector.containerSecurityContext.capabilities.drop[0]💣
Type: string
"ALL"
jaeger.spec.collector.strategy.type💣
Type: string
"RollingUpdate"
jaeger.spec.volumeMounts[0].name💣
Type: string
"certificates"
jaeger.spec.volumeMounts[0].mountPath💣
Type: string
"/es/certificates/"
jaeger.spec.volumeMounts[0].readOnly💣
Type: bool
true
jaeger.spec.volumes[0].name💣
Type: string
"certificates"
jaeger.spec.volumes[0].secret.secretName💣
Type: string
"elasticsearch-certificates"
rbac.create💣
Type: bool
true
rbac.pspEnabled💣
Type: bool
false
rbac.clusterRole💣
Type: bool
true
service.type💣
Type: string
"ClusterIP"
service.annotations💣
Type: object
{}
Default value (formatted)
{}
serviceAccount.create💣
Type: bool
true
serviceAccount.name💣
Type: string
"jaeger-instance"
serviceAccount.annotations💣
Type: object
{}
Default value (formatted)
{}
extraEnv💣
Type: list
[]
Default value (formatted)
[]
serviceExtraLabels💣
Type: object
{}
Default value (formatted)
{}
extraLabels💣
Type: object
{}
Default value (formatted)
{}
resources.limits.cpu💣
Type: string
"100m"
resources.limits.memory💣
Type: string
"128Mi"
resources.requests.cpu💣
Type: string
"100m"
resources.requests.memory💣
Type: string
"128Mi"
nodeSelector💣
Type: object
{}
Default value (formatted)
{}
tolerations💣
Type: list
[]
Default value (formatted)
[]
affinity💣
Type: object
{}
Default value (formatted)
{}
securityContext.runAsNonRoot💣
Type: bool
true
securityContext.runAsUser💣
Type: int
1001
securityContext.runAsGroup💣
Type: int
1001
containerSecurityContext💣
Type: object
{}
Default value (formatted)
{}
priorityClassName💣
Type: string
nil
hostNetwork💣
Type: bool
false
metricsPort💣
Type: int
8383
annotations💣
Type: object
{}
Default value (formatted)
{}
networkPolicies.enabled💣
Type: bool
false
networkPolicies.ingressLabels.app💣
Type: string
"istio-ingressgateway"
networkPolicies.ingressLabels.istio💣
Type: string
"ingressgateway"
networkPolicies.controlPlaneCidr💣
Type: string
"0.0.0.0/0"
bbtests.enabled💣
Type: bool
false
bbtests.cypress.artifacts💣
Type: bool
true
bbtests.cypress.envs.cypress_url💣
Type: string
"http://jaeger-query:16686"