wrapper values.yaml
π
bigbangπ
Type: object
addons:
authservice:
enabled: false
values:
selector:
key: protect
value: keycloak
domain: bigbang.dev
istio:
enabled: false
hardened:
enabled: false
monitoring:
enabled: false
networkPolicies:
controlPlaneCidr: 0.0.0.0/0
controlPlaneNode: null
enabled: false
openshift: false
Description: Passdown values from Big Bang
packageπ
Type: object
configMaps: []
istio:
hardened:
customAuthorizationPolicies: []
enabled: '{{ .Values.bigbang.istio.values.hardened.enabled }}'
matchLabels: {}
hosts: []
injection: enabled
peerAuthentications: []
monitor:
alerts: null
dashboards: {}
encryptedMetrics: true
services: []
name: ''
namespace:
name: null
network:
additionalPolicies: []
allowControlPlaneEgress: false
allowDnsEgress: true
allowHttpsEgress: []
allowIntraNamespace: true
defaultDeny: true
policies: true
secrets: []
sso:
enabled: false
values: {}
Description: Passdown values from package
package.nameπ
Type: Required
""
Description: Name of the package
package.istio.injectionπ
Type: string
"enabled"
Description: Toggles sidecar injection into the package. Enabling this allows mTLS. Options are βenabledβ or βdisabledβ.
package.monitor.encryptedMetricsπ
Type: bool
true
Description: Toggle automatic setup of encrypted metrics via https. Requires Istio injection. Strict mTLS relies on this being enabled.
package.monitor.servicesπ
Type: list
[]
Description: Services to monitor using Prometheus. Each service is specified as name: "", [spec: {}](https://github.com/prometheus-operator/prometheus-operator/blob/main/Documentation/api.md#monitoring.coreos.com/v1.ServiceMonitorSpec)
package.monitor.alertsπ
Type: string
nil
Description: Prometheus alerting rules, list of Prometheus RuleGroups
package.monitor.dashboardsπ
Type: object
{}
Description: Custom Grafana dashboards. Each dashboard is specified with a unique name key and dashboard contents value. Dashboard contents are a key-value pair where key is dashboard format (βjsonβ) and value is dashboard contents. Adds to existing bigbang grafana configuration, so no provider required, but otherwise follows Grafana conventions. More Info
package.network.policiesπ
Type: bool
true
Description: Toggle all policies on or off
package.network.defaultDenyπ
Type: bool
true
Description: Deny all traffic in the namespace by default
package.network.allowIntraNamespaceπ
Type: bool
true
Description: Allow traffic between pods inside the namespace
package.network.allowControlPlaneEgressπ
Type: bool
false
Description: Allow egress traffic from the namespace to the Kubernetes control plane for API calls
package.network.allowDnsEgressπ
Type: bool
true
Description: Allow egress traffic from the namespace to the DNS port
package.network.allowHttpsEgressπ
Type: list
[]
Description: Allow https egress to internet from specific pods
package.network.additionalPoliciesπ
Type: list
[]
Description: Custom egress/ingress policies to deploy. More info
package.secretsπ
Type: list
[]
Description: Secrets that should be created prior to Helm install
package.configMapsπ
Type: list
[]
Description: ConfigMaps that should be created prior to Helm install
package.sso.enabledπ
Type: bool
false
Description: Toggle AuthService SSO for package; Chain must be setup in Authservice & workload must be appropriately labeled for this to work
package.valuesπ
Type: object
{}
Description: Pass through values to this packageβs upstream Helm chart