jaeger values.yaml
📜
nameOverride📜
Type: string
"jaeger-operator"
Description: Chart name override
openshift📜
Type: object
{"enabled":false}
Default value (formatted)
{
"enabled": false
}
Description: Openshift toggle, only affects networkPolicies
sso📜
Type: object
{"enabled":false}
Default value (formatted)
{
"enabled": false
}
Description: SSO toggle, only affects auth policies
monitoring📜
Type: object
{"enabled":false,"serviceMonitor":{"scheme":"","tlsConfig":{}}}
Default value (formatted)
{
"enabled": false,
"serviceMonitor": {
"scheme": "",
"tlsConfig": {}
}
}
Description: Monitoring toggle, affects servicemonitor and networkPolicies
domain📜
Type: string
"bigbang.dev"
Description: Domain to service Jaeger virtualService
istio.enabled📜
Type: bool
false
Description: Toggle istio integration
istio.jaeger.enabled📜
Type: bool
true
Description: Toggle vs creation
istio.jaeger.annotations📜
Type: object
{}
Default value (formatted)
{}
istio.jaeger.labels📜
Type: object
{}
Default value (formatted)
{}
istio.jaeger.gateways[0]📜
Type: string
"istio-system/main"
istio.jaeger.hosts[0]📜
Type: string
"tracing.{{ .Values.domain }}"
istio.mtls📜
Type: object
{"mode":"STRICT"}
Default value (formatted)
{
"mode": "STRICT"
}
Description: Default jaeger peer authentication
istio.mtls.mode📜
Type: string
"STRICT"
Description: STRICT = Allow only mutual TLS traffic, PERMISSIVE = Allow both plain text and mutual TLS traffic
cleanSvcMonitor📜
Type: object
{"enabled":false,"image":{"repository":"registry1.dso.mil/ironbank/big-bang/base","tag":"2.0.0"}}
Default value (formatted)
{
"enabled": false,
"image": {
"repository": "registry1.dso.mil/ironbank/big-bang/base",
"tag": "2.0.0"
}
}
Description: Only needed for upgrade from pre-1.29.x, Deletes the servicemonitor that targetted deprecated metrics endpoints
webhookCertGen📜
Type: object
{"affinity":{},"cleanupProxy":{"image":{"pullPolicy":"IfNotPresent","repository":"registry1.dso.mil/ironbank/big-bang/base","tag":"2.0.0"}},"containerSecurityContext":{"capabilities":{"drop":["ALL"]}},"enabled":true,"image":{"pullPolicy":"IfNotPresent","repository":"registry1.dso.mil/ironbank/opensource/ingress-nginx/kube-webhook-certgen","tag":"v1.3.0"},"nodeSelector":{},"resources":{"limits":{"cpu":"50m","memory":"50Mi"},"requests":{"cpu":"50m","memory":"50Mi"}},"securityContext":{"runAsGroup":65532,"runAsNonRoot":true,"runAsUser":65532},"tolerations":{}}
Default value (formatted)
{
"affinity": {},
"cleanupProxy": {
"image": {
"pullPolicy": "IfNotPresent",
"repository": "registry1.dso.mil/ironbank/big-bang/base",
"tag": "2.0.0"
}
},
"containerSecurityContext": {
"capabilities": {
"drop": [
"ALL"
]
}
},
"enabled": true,
"image": {
"pullPolicy": "IfNotPresent",
"repository": "registry1.dso.mil/ironbank/opensource/ingress-nginx/kube-webhook-certgen",
"tag": "v1.3.0"
},
"nodeSelector": {},
"resources": {
"limits": {
"cpu": "50m",
"memory": "50Mi"
},
"requests": {
"cpu": "50m",
"memory": "50Mi"
}
},
"securityContext": {
"runAsGroup": 65532,
"runAsNonRoot": true,
"runAsUser": 65532
},
"tolerations": {}
}
Description: Job to generate and patch webhooks with certificate
webhookCertGen.enabled📜
Type: bool
true
Description: If disabled must use cert manager and manually patch webhook
elasticsearch.enabled📜
Type: bool
false
elasticsearch.indexTemplateCreation📜
Type: object
{"containerSecurityContext":{"capabilities":{"drop":["ALL"]}},"enabled":true,"image":{"repository":"registry1.dso.mil/ironbank/big-bang/base","tag":"2.0.0"},"securityContext":{"runAsGroup":1001,"runAsNonRoot":true,"runAsUser":1001},"servicePriority":10,"spanPriority":11}
Default value (formatted)
{
"containerSecurityContext": {
"capabilities": {
"drop": [
"ALL"
]
}
},
"enabled": true,
"image": {
"repository": "registry1.dso.mil/ironbank/big-bang/base",
"tag": "2.0.0"
},
"securityContext": {
"runAsGroup": 1001,
"runAsNonRoot": true,
"runAsUser": 1001
},
"servicePriority": 10,
"spanPriority": 11
}
Description: Custom BB job to create required index templates for ES 8.x
elasticsearch.indexTemplateCreation.servicePriority📜
Type: int
10
Description: Priority to add to the service index template, cannot conflict with existing templates
elasticsearch.indexTemplateCreation.spanPriority📜
Type: int
11
Description: Priority to add to the span index template, cannot conflict with existing templates
elasticsearch.username📜
Type: string
"elastic"
elasticsearch.name📜
Type: string
"logging-ek"
elasticsearch.namespace📜
Type: string
"logging"
elasticsearch.storage.options.es.server-urls📜
Type: string
"https://{{ $.Values.elasticsearch.name }}-es-http.{{ $.Values.elasticsearch.namespace }}.svc:9200"
elasticsearch.storage.options.es.tls.enabled📜
Type: string
"true"
elasticsearch.storage.options.es.tls.ca📜
Type: string
"/es/certificates/ca.crt"
elasticsearch.storage.options.es.version📜
Type: int
7
elasticsearch.storage.options.es.create-index-templates📜
Type: bool
false
retention.enabled📜
Type: bool
false
retention.schedule📜
Type: string
"0 * * * *"
retention.days📜
Type: int
5
retention.image📜
Type: string
"registry1.dso.mil/ironbank/opensource/jaegertracing/jaeger-es-index-cleaner:1.47.0"
operatorUpdateStrategy.type📜
Type: string
"RollingUpdate"
image.repository📜
Type: string
"registry1.dso.mil/ironbank/opensource/jaegertracing/jaeger-operator"
image.tag📜
Type: string
"1.47.0"
image.pullPolicy📜
Type: string
"Always"
image.imagePullSecrets[0]📜
Type: string
"private-registry"
certs.issuer.create📜
Type: bool
false
certs.issuer.name📜
Type: string
""
certs.certificate.create📜
Type: bool
false
certs.certificate.namespace📜
Type: string
""
certs.certificate.secretName📜
Type: string
"jaeger-operator-webhook-cert"
certs.certificate.issuerKind📜
Type: string
"Issuer"
webhooks.mutatingWebhook.create📜
Type: bool
true
webhooks.validatingWebhook.create📜
Type: bool
true
webhooks.port📜
Type: int
9443
webhooks.service.annotations📜
Type: object
{}
Default value (formatted)
{}
webhooks.service.create📜
Type: bool
true
webhooks.service.name📜
Type: string
""
jaeger.create📜
Type: bool
true
jaeger.namespace📜
Type: string
nil
jaeger.spec.strategy📜
Type: string
"allInOne"
jaeger.spec.ingress.enabled📜
Type: bool
false
jaeger.spec.annotations📜
Type: object
{}
Default value (formatted)
{}
jaeger.spec.labels📜
Type: object
{}
Default value (formatted)
{}
jaeger.spec.allInOne.image📜
Type: string
"registry1.dso.mil/ironbank/opensource/jaegertracing/all-in-one:1.47.0"
jaeger.spec.allInOne.options.log-level📜
Type: string
"info"
jaeger.spec.allInOne.options.collector.zipkin.host-port📜
Type: string
":9411"
jaeger.spec.allInOne.annotations.”sidecar.istio.io/inject”📜
Type: string
"true"
jaeger.spec.allInOne.annotations.”traffic.sidecar.istio.io/includeInboundPorts”📜
Type: string
"16686"
jaeger.spec.allInOne.resources.requests.cpu📜
Type: string
"200m"
jaeger.spec.allInOne.resources.requests.memory📜
Type: string
"128Mi"
jaeger.spec.allInOne.resources.limits.cpu📜
Type: string
"200m"
jaeger.spec.allInOne.resources.limits.memory📜
Type: string
"128Mi"
jaeger.spec.allInOne.securityContext.runAsNonRoot📜
Type: bool
true
jaeger.spec.allInOne.securityContext.runAsUser📜
Type: int
1001
jaeger.spec.allInOne.securityContext.runAsGroup📜
Type: int
1001
jaeger.spec.allInOne.containerSecurityContext.capabilities.drop[0]📜
Type: string
"ALL"
jaeger.spec.allInOne.strategy.type📜
Type: string
"RollingUpdate"
jaeger.spec.agent.maxReplicas📜
Type: int
5
jaeger.spec.agent.image📜
Type: string
"registry1.dso.mil/ironbank/opensource/jaegertracing/jaeger-agent:1.47.0"
jaeger.spec.agent.options.log-level📜
Type: string
"info"
jaeger.spec.agent.imagePullSecrets[0]📜
Type: string
"private-registry"
jaeger.spec.agent.securityContext.runAsNonRoot📜
Type: bool
true
jaeger.spec.agent.securityContext.runAsUser📜
Type: int
1001
jaeger.spec.agent.securityContext.runAsGroup📜
Type: int
1001
jaeger.spec.agent.containerSecurityContext.capabilities.drop[0]📜
Type: string
"ALL"
jaeger.spec.agent.strategy.type📜
Type: string
"RollingUpdate"
jaeger.spec.ingester.maxReplicas📜
Type: int
5
jaeger.spec.ingester.image📜
Type: string
"registry1.dso.mil/ironbank/opensource/jaegertracing/jaeger-ingester:1.47.0"
jaeger.spec.ingester.options.log-level📜
Type: string
"info"
jaeger.spec.ingester.securityContext.runAsNonRoot📜
Type: bool
true
jaeger.spec.ingester.securityContext.runAsUser📜
Type: int
1001
jaeger.spec.ingester.securityContext.runAsGroup📜
Type: int
1001
jaeger.spec.ingester.containerSecurityContext.capabilities.drop[0]📜
Type: string
"ALL"
jaeger.spec.ingester.strategy.type📜
Type: string
"RollingUpdate"
jaeger.spec.query.replicas📜
Type: int
5
jaeger.spec.query.image📜
Type: string
"registry1.dso.mil/ironbank/opensource/jaegertracing/jaeger-query:1.47.0"
jaeger.spec.query.options.log-level📜
Type: string
"info"
jaeger.spec.query.securityContext.runAsNonRoot📜
Type: bool
true
jaeger.spec.query.securityContext.runAsUser📜
Type: int
1001
jaeger.spec.query.securityContext.runAsGroup📜
Type: int
1001
jaeger.spec.query.containerSecurityContext.capabilities.drop[0]📜
Type: string
"ALL"
jaeger.spec.query.strategy.type📜
Type: string
"RollingUpdate"
jaeger.spec.collector.maxReplicas📜
Type: int
5
jaeger.spec.collector.image📜
Type: string
"registry1.dso.mil/ironbank/opensource/jaegertracing/jaeger-collector:1.47.0"
jaeger.spec.collector.options.log-level📜
Type: string
"info"
jaeger.spec.collector.resources.requests.cpu📜
Type: string
"200m"
jaeger.spec.collector.resources.requests.memory📜
Type: string
"128Mi"
jaeger.spec.collector.resources.limits.cpu📜
Type: string
"200m"
jaeger.spec.collector.resources.limits.memory📜
Type: string
"128Mi"
jaeger.spec.collector.securityContext.runAsNonRoot📜
Type: bool
true
jaeger.spec.collector.securityContext.runAsUser📜
Type: int
1001
jaeger.spec.collector.securityContext.runAsGroup📜
Type: int
1001
jaeger.spec.collector.containerSecurityContext.capabilities.drop[0]📜
Type: string
"ALL"
jaeger.spec.collector.strategy.type📜
Type: string
"RollingUpdate"
jaeger.spec.volumeMounts[0].name📜
Type: string
"certificates"
jaeger.spec.volumeMounts[0].mountPath📜
Type: string
"/es/certificates/"
jaeger.spec.volumeMounts[0].readOnly📜
Type: bool
true
jaeger.spec.volumes[0].name📜
Type: string
"certificates"
jaeger.spec.volumes[0].secret.secretName📜
Type: string
"elasticsearch-certificates"
rbac.create📜
Type: bool
true
rbac.pspEnabled📜
Type: bool
false
rbac.clusterRole📜
Type: bool
true
service.type📜
Type: string
"ClusterIP"
service.annotations📜
Type: object
{}
Default value (formatted)
{}
serviceAccount.create📜
Type: bool
true
serviceAccount.name📜
Type: string
"jaeger-instance"
serviceAccount.annotations📜
Type: object
{}
Default value (formatted)
{}
extraEnv📜
Type: list
[]
Default value (formatted)
[]
serviceExtraLabels📜
Type: object
{}
Default value (formatted)
{}
extraLabels📜
Type: object
{}
Default value (formatted)
{}
resources.limits.cpu📜
Type: string
"100m"
resources.limits.memory📜
Type: string
"128Mi"
resources.requests.cpu📜
Type: string
"100m"
resources.requests.memory📜
Type: string
"128Mi"
nodeSelector📜
Type: object
{}
Default value (formatted)
{}
tolerations📜
Type: list
[]
Default value (formatted)
[]
affinity📜
Type: object
{}
Default value (formatted)
{}
securityContext.runAsNonRoot📜
Type: bool
true
securityContext.runAsUser📜
Type: int
1001
securityContext.runAsGroup📜
Type: int
1001
containerSecurityContext📜
Type: object
{}
Default value (formatted)
{}
priorityClassName📜
Type: string
nil
hostNetwork📜
Type: bool
false
metricsPort📜
Type: int
8383
annotations📜
Type: object
{}
Default value (formatted)
{}
networkPolicies.enabled📜
Type: bool
false
networkPolicies.ingressLabels.app📜
Type: string
"istio-ingressgateway"
networkPolicies.ingressLabels.istio📜
Type: string
"ingressgateway"
networkPolicies.controlPlaneCidr📜
Type: string
"0.0.0.0/0"
bbtests.enabled📜
Type: bool
false
bbtests.cypress.artifacts📜
Type: bool
true
bbtests.cypress.envs.cypress_url📜
Type: string
"http://jaeger-query:16686"