Skip to content

bigbang📜

Version: 2.24.0 Type: application

Big Bang is a declarative, continuous delivery tool for core DoD hardened and approved packages into a Kubernetes cluster.

Getting Started📜

To start using Big Bang, you will need to create your own Big Bang environment tailored to your needs. The Big Bang customer template is provided for you to copy into your own Git repository and begin modifications.

Maintainers📜

Name Email Url
Ryan Garcia ryan.garcia@sigmadefense.com
Chris O’Connell coconnell@bridgephase.com

Source Code📜

Values📜

Key Type Default Description
domain string "dev.bigbang.mil" Domain used for BigBang created exposed services, can be overridden by individual packages.
offline bool false (experimental) Toggle sourcing from external repos. All this does right now is toggle GitRepositories, it is not fully functional
helmRepositories list [] List of Helm repositories/credentials to pull helm charts from. OCI Type: Must specify username/password or existingSecret if repository requires auth. Using “private-registry” for existingSecret will reuse credentials from registryCredentials above. Default Type: Must specify existingSecret with auth - see https://fluxcd.io/flux/components/source/helmrepositories/#secret-reference for details on secret data required.
registryCredentials object {"email":"","password":"","registry":"registry1.dso.mil","username":""} Single set of registry credentials used to pull all images deployed by BigBang.
openshift bool false Multiple sets of registry credentials used to pull all images deployed by BigBang. Credentials will only be created when a valid combination exists, registry, username, and password (email is optional) Or a list of registires: - registry: registry1.dso.mil username: “” password: “” email: “” - registry: registry.dso.mil username: “” password: “” email: “” Openshift Container Platform Feature Toggle
git object {"credentials":{"caFile":"","knownHosts":"","password":"","privateKey":"","publicKey":"","username":""},"existingSecret":""} Git credential settings for accessing private repositories Order of precedence is: 1. existingSecret 2. http credentials (username/password/caFile) 3. ssh credentials (privateKey/publicKey/knownHosts)
git.existingSecret string "" Existing secret to use for git credentials, must be in the appropriate format: https://toolkit.fluxcd.io/components/source/gitrepositories/#https-authentication
git.credentials object {"caFile":"","knownHosts":"","password":"","privateKey":"","publicKey":"","username":""} Chart created secrets with user defined values
git.credentials.username string "" HTTP git credentials, both username and password must be provided
git.credentials.caFile string "" HTTPS certificate authority file. Required for any repo with a self signed certificate
git.credentials.privateKey string "" SSH git credentials, privateKey, publicKey, and knownHosts must be provided
sso object {"certificateAuthority":{"cert":"","secretName":"tls-ca-sso"},"name":"SSO","oidc":{"authorization":"{{ .Values.sso.url }}/protocol/openid-connect/auth","claims":{"email":"email","groups":"groups","name":"name","username":"preferred_username"},"endSession":"{{ .Values.sso.url }}/protocol/openid-connect/logout","jwks":"","jwksUri":"{{ .Values.sso.url }}/protocol/openid-connect/certs","token":"{{ .Values.sso.url }}/protocol/openid-connect/token","userinfo":"{{ .Values.sso.url }}/protocol/openid-connect/userinfo"},"saml":{"entityDescriptor":"{{ .Values.sso.url }}/protocol/saml/descriptor","metadata":"","service":"{{ .Values.sso.url }}/protocol/saml"},"url":"https://login.dso.mil/auth/realms/baby-yoda"} Global SSO values used for BigBang deployments when sso is enabled
sso.name string "SSO" Name of the identity provider. This is used by some packages as the SSO login label.
sso.url string "https://login.dso.mil/auth/realms/baby-yoda" Base URL for the identity provider. For OIDC, this is the issuer. For SAML this is the entityID.
sso.certificateAuthority object {"cert":"","secretName":"tls-ca-sso"} Certificate authority for the identity provider’s certificates
sso.certificateAuthority.cert string "" The certificate authority public certificate in .pem format. Populating this will create a secret in each namespace that enables SSO.
sso.certificateAuthority.secretName string "tls-ca-sso" The secret name to use for the certificate authority. Can be manually populated if cert is blank.
sso.saml.entityDescriptor string "{{ .Values.sso.url }}/protocol/saml/descriptor" SAML entityDescriptor (metadata) path
sso.saml.service string "{{ .Values.sso.url }}/protocol/saml" SAML SSO Service path
sso.saml.metadata string "" Literal SAML XML metadata retrieved from {{ .Values.sso.saml.entityDescriptor }}. Required for SSO in Nexus, Twistlock, or Sonarqube.
sso.oidc object {"authorization":"{{ .Values.sso.url }}/protocol/openid-connect/auth","claims":{"email":"email","groups":"groups","name":"name","username":"preferred_username"},"endSession":"{{ .Values.sso.url }}/protocol/openid-connect/logout","jwks":"","jwksUri":"{{ .Values.sso.url }}/protocol/openid-connect/certs","token":"{{ .Values.sso.url }}/protocol/openid-connect/token","userinfo":"{{ .Values.sso.url }}/protocol/openid-connect/userinfo"} OIDC endpoints can be retrieved from {{ .Values.sso.url }}/.well-known/openid-configuration
sso.oidc.authorization string "{{ .Values.sso.url }}/protocol/openid-connect/auth" OIDC authorization path
sso.oidc.endSession string "{{ .Values.sso.url }}/protocol/openid-connect/logout" OIDC logout / end session path
sso.oidc.jwksUri string "{{ .Values.sso.url }}/protocol/openid-connect/certs" OIDC JSON Web Key Set (JWKS) path
sso.oidc.token string "{{ .Values.sso.url }}/protocol/openid-connect/token" OIDC token path
sso.oidc.userinfo string "{{ .Values.sso.url }}/protocol/openid-connect/userinfo" OIDC user information path
sso.oidc.jwks string "" Literal OIDC JWKS data retrieved from JWKS Uri. Only needed if jwsksUri is not defined.
sso.oidc.claims object {"email":"email","groups":"groups","name":"name","username":"preferred_username"} Identity provider claim names that store metadata about the authenticated user.
sso.oidc.claims.email string "email" IdP’s claim name used for the user’s email address.
sso.oidc.claims.name string "name" IdP’s claim name used for the user’s full name
sso.oidc.claims.username string "preferred_username" IdP’s claim name used for the username
sso.oidc.claims.groups string "groups" IdP’s claim name used for the user’s groups or roles
flux object {"install":{"remediation":{"retries":-1}},"interval":"2m","rollback":{"cleanupOnFail":true,"timeout":"10m"},"test":{"enable":false},"timeout":"10m","upgrade":{"cleanupOnFail":true,"remediation":{"remediateLastFailure":true,"retries":3}}} (Advanced) Flux reconciliation parameters. The default values provided will be sufficient for the majority of workloads.
networkPolicies object {"controlPlaneCidr":"0.0.0.0/0","enabled":true,"nodeCidr":"","vpcCidr":"0.0.0.0/0"} Global NetworkPolicies settings
networkPolicies.enabled bool true Toggle all package NetworkPolicies, can disable specific packages with package.values.networkPolicies.enabled
networkPolicies.controlPlaneCidr string "0.0.0.0/0" Control Plane CIDR, defaults to 0.0.0.0/0, use kubectl get endpoints -n default kubernetes to get the CIDR range needed for your cluster Must be an IP CIDR range (x.x.x.x/x - ideally with /32 for the specific IP of a single endpoint, broader range for multiple masters/endpoints) Used by package NetworkPolicies to allow Kube API access
networkPolicies.nodeCidr string "" Node CIDR, defaults to allowing “10.0.0.0/8” “172.16.0.0/12” “192.168.0.0/16” “100.64.0.0/10” networks. use kubectl get nodes -owide and review the INTERNAL-IP column to derive CIDR range. Must be an IP CIDR range (x.x.x.x/x - ideally a /16 or /24 to include multiple IPs)
networkPolicies.vpcCidr string "0.0.0.0/0" VPC CIDR, defaults to 0.0.0.0/0 In a production environment, it is recommended to setup a Private Endpoint for your AWS services like KMS or S3. Please review https://docs.aws.amazon.com/kms/latest/developerguide/kms-vpc-endpoint.html to setup routing to AWS services that never leave the AWS network. Once created update networkPolicies.vpcCidr to match the CIDR of your VPC so Vault will be able to reach your VPCs DNS and new KMS endpoint.
imagePullPolicy string "IfNotPresent" Global ImagePullPolicy value for all packages Permitted values are: None, Always, IfNotPresent
istio.enabled bool true Toggle deployment of Istio.
istio.mtls.mode string "STRICT" STRICT = Allow only mutual TLS traffic, PERMISSIVE = Allow both plain text and mutual TLS traffic
istio.sourceType string "git" Choose source type of “git” or “helmRepo”
istio.git.repo string "https://repo1.dso.mil/big-bang/product/packages/istio-controlplane.git"
istio.git.path string "./chart"
istio.git.tag string "1.20.4-bb.1"
istio.helmRepo.repoName string "registry1"
istio.helmRepo.chartName string "istio"
istio.helmRepo.tag string "1.20.4-bb.1"
istio.enterprise bool false Tetrate Istio Distribution - Tetrate provides FIPs verified Istio and Envoy software and support, validated through the FIPs Boring Crypto module. Find out more from Tetrate - https://www.tetrate.io/tetrate-istio-subscription
istio.ingressGateways.public-ingressgateway.type string "LoadBalancer"
istio.ingressGateways.public-ingressgateway.kubernetesResourceSpec object {}
istio.gateways.public.ingressGateway string "public-ingressgateway"
istio.gateways.public.hosts[0] string "*.{{ .Values.domain }}"
istio.gateways.public.autoHttpRedirect object {"enabled":true} Controls default HTTP/8080 server entry with HTTP to HTTPS Redirect.
istio.gateways.public.tls.key string ""
istio.gateways.public.tls.cert string ""
istio.gateways.public.tls.minProtocolVersion string ""
istio.flux object {} Flux reconciliation overrides specifically for the Istio Package
istio.values object {} Values to passthrough to the istio-controlplane chart: https://repo1.dso.mil/big-bang/product/packages/istio-controlplane.git
istio.postRenderers list [] Post Renderers. See docs/postrenders.md
istioOperator.enabled bool true Toggle deployment of Istio Operator.
istioOperator.sourceType string "git" Choose source type of “git” or “helmRepo”
istioOperator.git.repo string "https://repo1.dso.mil/big-bang/product/packages/istio-operator.git"
istioOperator.git.path string "./chart"
istioOperator.git.tag string "1.20.4-bb.0"
istioOperator.helmRepo.repoName string "registry1"
istioOperator.helmRepo.chartName string "istio-operator"
istioOperator.helmRepo.tag string "1.20.4-bb.0"
istioOperator.flux object {} Flux reconciliation overrides specifically for the Istio Operator Package
istioOperator.values object {} Values to passthrough to the istio-operator chart: https://repo1.dso.mil/big-bang/product/packages/istio-operator.git
istioOperator.postRenderers list [] Post Renderers. See docs/postrenders.md
jaeger.enabled bool false Toggle deployment of Jaeger.
jaeger.sourceType string "git" Choose source type of “git” or “helmRepo”
jaeger.git.repo string "https://repo1.dso.mil/big-bang/product/packages/jaeger.git"
jaeger.git.path string "./chart"
jaeger.git.tag string "2.50.1-bb.0"
jaeger.helmRepo.repoName string "registry1"
jaeger.helmRepo.chartName string "jaeger"
jaeger.helmRepo.tag string "2.50.1-bb.0"
jaeger.flux object {"install":{"crds":"CreateReplace"},"upgrade":{"crds":"CreateReplace"}} Flux reconciliation overrides specifically for the Jaeger Package
jaeger.ingress object {"gateway":""} Redirect the package ingress to a specific Istio Gateway (listed in istio.gateways). The default is “public”.
jaeger.sso.enabled bool false Toggle SSO for Jaeger on and off
jaeger.sso.client_id string "" OIDC Client ID to use for Jaeger
jaeger.sso.client_secret string "" OIDC Client Secret to use for Jaeger
jaeger.values object {} Values to pass through to Jaeger chart: https://repo1.dso.mil/big-bang/product/packages/jaeger.git
jaeger.postRenderers list [] Post Renderers. See docs/postrenders.md
kiali.enabled bool true Toggle deployment of Kiali.
kiali.sourceType string "git" Choose source type of “git” or “helmRepo”
kiali.git.repo string "https://repo1.dso.mil/big-bang/product/packages/kiali.git"
kiali.git.path string "./chart"
kiali.git.tag string "1.82.0-bb.0"
kiali.helmRepo.repoName string "registry1"
kiali.helmRepo.chartName string "kiali"
kiali.helmRepo.tag string "1.82.0-bb.0"
kiali.flux object {} Flux reconciliation overrides specifically for the Kiali Package
kiali.ingress object {"gateway":""} Redirect the package ingress to a specific Istio Gateway (listed in istio.gateways). The default is “public”.
kiali.sso.enabled bool false Toggle SSO for Kiali on and off
kiali.sso.client_id string "" OIDC Client ID to use for Kiali
kiali.sso.client_secret string "" OIDC Client Secret to use for Kiali
kiali.values object {} Values to pass through to Kiali chart: https://repo1.dso.mil/big-bang/product/packages/kiali
kiali.postRenderers list [] Post Renderers. See docs/postrenders.md
clusterAuditor.enabled bool false Toggle deployment of Cluster Auditor.
clusterAuditor.sourceType string "git" Choose source type of “git” or “helmRepo”
clusterAuditor.git.repo string "https://repo1.dso.mil/big-bang/product/packages/cluster-auditor.git"
clusterAuditor.git.path string "./chart"
clusterAuditor.git.tag string "1.5.0-bb.14"
clusterAuditor.helmRepo.repoName string "registry1"
clusterAuditor.helmRepo.chartName string "cluster-auditor"
clusterAuditor.helmRepo.tag string "1.5.0-bb.14"
clusterAuditor.flux object {} Flux reconciliation overrides specifically for the Cluster Auditor Package
clusterAuditor.values object {} Values to passthrough to the cluster auditor chart: https://repo1.dso.mil/big-bang/product/packages/cluster-auditor.git
clusterAuditor.postRenderers list [] Post Renderers. See docs/postrenders.md
gatekeeper.enabled bool false Toggle deployment of OPA Gatekeeper.
gatekeeper.sourceType string "git" Choose source type of “git” or “helmRepo”
gatekeeper.git.repo string "https://repo1.dso.mil/big-bang/product/packages/policy.git"
gatekeeper.git.path string "./chart"
gatekeeper.git.tag string "3.15.0-bb.0"
gatekeeper.helmRepo.repoName string "registry1"
gatekeeper.helmRepo.chartName string "gatekeeper"
gatekeeper.helmRepo.tag string "3.15.0-bb.0"
gatekeeper.flux object {"install":{"crds":"CreateReplace"},"upgrade":{"crds":"CreateReplace"}} Flux reconciliation overrides specifically for the OPA Gatekeeper Package
gatekeeper.values object {} Values to passthrough to the gatekeeper chart: https://repo1.dso.mil/big-bang/product/packages/policy.git
gatekeeper.postRenderers list [] Post Renderers. See docs/postrenders.md
kyverno.enabled bool true Toggle deployment of Kyverno.
kyverno.sourceType string "git" Choose source type of “git” or “helmRepo”
kyverno.git.repo string "https://repo1.dso.mil/big-bang/product/packages/kyverno.git"
kyverno.git.path string "./chart"
kyverno.git.tag string "3.1.4-bb.4"
kyverno.helmRepo.repoName string "registry1"
kyverno.helmRepo.chartName string "kyverno"
kyverno.helmRepo.tag string "3.1.4-bb.4"
kyverno.flux object {} Flux reconciliation overrides specifically for the Kyverno Package
kyverno.values object {} Values to passthrough to the kyverno chart: https://repo1.dso.mil/big-bang/product/packages/kyverno.git
kyverno.postRenderers list [] Post Renderers. See docs/postrenders.md
kyvernoPolicies.enabled bool true Toggle deployment of Kyverno policies
kyvernoPolicies.sourceType string "git" Choose source type of “git” or “helmRepo”
kyvernoPolicies.git.repo string "https://repo1.dso.mil/big-bang/product/packages/kyverno-policies.git"
kyvernoPolicies.git.path string "./chart"
kyvernoPolicies.git.tag string "3.0.4-bb.28"
kyvernoPolicies.helmRepo.repoName string "registry1"
kyvernoPolicies.helmRepo.chartName string "kyverno-policies"
kyvernoPolicies.helmRepo.tag string "3.0.4-bb.28"
kyvernoPolicies.flux object {} Flux reconciliation overrides specifically for the Kyverno Package
kyvernoPolicies.values object {} Values to passthrough to the kyverno policies chart: https://repo1.dso.mil/big-bang/product/packages/kyverno-policies.git
kyvernoPolicies.postRenderers list [] Post Renderers. See docs/postrenders.md
kyvernoReporter.enabled bool true Toggle deployment of Kyverno Reporter
kyvernoReporter.sourceType string "git" Choose source type of “git” or “helmRepo”
kyvernoReporter.git.repo string "https://repo1.dso.mil/big-bang/product/packages/kyverno-reporter.git"
kyvernoReporter.git.path string "./chart"
kyvernoReporter.git.tag string "2.22.4-bb.1"
kyvernoReporter.helmRepo.repoName string "registry1"
kyvernoReporter.helmRepo.chartName string "kyverno-reporter"
kyvernoReporter.helmRepo.tag string "2.22.4-bb.1"
kyvernoReporter.flux object {} Flux reconciliation overrides specifically for the Kyverno Reporter Package
kyvernoReporter.values object {} Values to passthrough to the kyverno reporter chart: https://repo1.dso.mil/big-bang/product/packages/kyverno-reporter.git
kyvernoReporter.postRenderers list [] Post Renderers. See docs/postrenders.md
elasticsearchKibana.enabled bool false Toggle deployment of Logging (EFK).
elasticsearchKibana.sourceType string "git" Choose source type of “git” or “helmRepo”
elasticsearchKibana.git.repo string "https://repo1.dso.mil/big-bang/product/packages/elasticsearch-kibana.git"
elasticsearchKibana.git.path string "./chart"
elasticsearchKibana.git.tag string "1.11.0-bb.1"
elasticsearchKibana.helmRepo.repoName string "registry1"
elasticsearchKibana.helmRepo.chartName string "elasticsearch-kibana"
elasticsearchKibana.helmRepo.tag string "1.11.0-bb.1"
elasticsearchKibana.flux object {"timeout":"20m"} Flux reconciliation overrides specifically for the Logging (EFK) Package
elasticsearchKibana.ingress object {"gateway":""} Redirect the package ingress to a specific Istio Gateway (listed in istio.gateways). The default is “public”.
elasticsearchKibana.sso.enabled bool false Toggle OIDC SSO for Kibana/Elasticsearch on and off. Enabling this option will auto-create any required secrets.
elasticsearchKibana.sso.client_id string "" Elasticsearch/Kibana OIDC client ID
elasticsearchKibana.sso.client_secret string "" Elasticsearch/Kibana OIDC client secret
elasticsearchKibana.license.trial bool false Toggle trial license installation of elasticsearch. Note that enterprise (non trial) is required for SSO to work.
elasticsearchKibana.license.keyJSON string "" Elasticsearch license in json format seen here: https://repo1.dso.mil/big-bang/product/packages/elasticsearch-kibana#enterprise-license
elasticsearchKibana.values object {} Values to passthrough to the elasticsearch-kibana chart: https://repo1.dso.mil/big-bang/product/packages/elasticsearch-kibana.git
elasticsearchKibana.postRenderers list [] Post Renderers. See docs/postrenders.md
eckOperator.enabled bool false Toggle deployment of ECK Operator.
eckOperator.sourceType string "git" Choose source type of “git” or “helmRepo”
eckOperator.git.repo string "https://repo1.dso.mil/big-bang/product/packages/eck-operator.git"
eckOperator.git.path string "./chart"
eckOperator.git.tag string "2.12.1-bb.0"
eckOperator.helmRepo.repoName string "registry1"
eckOperator.helmRepo.chartName string "eck-operator"
eckOperator.helmRepo.tag string "2.12.1-bb.0"
eckOperator.flux object {} Flux reconciliation overrides specifically for the ECK Operator Package
eckOperator.values object {} Values to passthrough to the eck-operator chart: https://repo1.dso.mil/big-bang/product/packages/eck-operator.git
eckOperator.postRenderers list [] Post Renderers. See docs/postrenders.md
fluentbit.enabled bool false Toggle deployment of Fluent-Bit.
fluentbit.sourceType string "git" Choose source type of “git” or “helmRepo”
fluentbit.git.repo string "https://repo1.dso.mil/big-bang/product/packages/fluentbit.git"
fluentbit.git.path string "./chart"
fluentbit.git.tag string "0.43.0-bb.4"
fluentbit.helmRepo.repoName string "registry1"
fluentbit.helmRepo.chartName string "fluentbit"
fluentbit.helmRepo.tag string "0.43.0-bb.4"
fluentbit.flux object {} Flux reconciliation overrides specifically for the Fluent-Bit Package
fluentbit.values object {} Values to passthrough to the fluentbit chart: https://repo1.dso.mil/big-bang/product/packages/fluentbit.git
fluentbit.postRenderers list [] Post Renderers. See docs/postrenders.md
promtail.enabled bool true Toggle deployment of Promtail.
promtail.sourceType string "git" Choose source type of “git” or “helmRepo”
promtail.git.repo string "https://repo1.dso.mil/big-bang/product/packages/promtail.git"
promtail.git.path string "./chart"
promtail.git.tag string "6.15.5-bb.3"
promtail.helmRepo.repoName string "registry1"
promtail.helmRepo.chartName string "promtail"
promtail.helmRepo.tag string "6.15.5-bb.3"
promtail.flux object {} Flux reconciliation overrides specifically for the Promtail Package
promtail.values object {} Values to passthrough to the promtail chart: https://repo1.dso.mil/big-bang/product/packages/fluentbit.git
promtail.postRenderers list [] Post Renderers. See docs/postrenders.md
loki.enabled bool true Toggle deployment of Loki.
loki.sourceType string "git" Choose source type of “git” or “helmRepo”
loki.git.repo string "https://repo1.dso.mil/big-bang/product/packages/loki.git"
loki.git.path string "./chart"
loki.git.tag string "5.42.0-bb.11"
loki.helmRepo.repoName string "registry1"
loki.helmRepo.chartName string "loki"
loki.helmRepo.tag string "5.42.0-bb.11"
loki.flux object {} Flux reconciliation overrides specifically for the Loki Package
loki.strategy string "monolith" Loki architecture. Options are monolith and scalable
loki.objectStorage.endpoint string "" S3 compatible endpoint to use for connection information. examples: “https://s3.amazonaws.com” “https://s3.us-gov-west-1.amazonaws.com” “http://minio.minio.svc.cluster.local:9000”
loki.objectStorage.region string "" S3 compatible region to use for connection information.
loki.objectStorage.accessKey string "" Access key for connecting to object storage endpoint.
loki.objectStorage.accessSecret string "" Secret key for connecting to object storage endpoint. Unencoded string data. This should be placed in the secret values and then encrypted
loki.objectStorage.bucketNames object {} Bucket Names for the Loki buckets as YAML chunks: loki-logs ruler: loki-ruler admin: loki-admin
loki.values object {} Values to passthrough to the Loki chart: https://repo1.dso.mil/big-bang/product/packages/loki.git
loki.postRenderers list [] Post Renderers. See docs/postrenders.md
neuvector.enabled bool true Toggle deployment of Neuvector.
neuvector.sourceType string "git" Choose source type of “git” or “helmRepo”
neuvector.git.repo string "https://repo1.dso.mil/big-bang/product/packages/neuvector.git"
neuvector.git.path string "./chart"
neuvector.git.tag string "2.6.3-bb.17"
neuvector.helmRepo.repoName string "registry1"
neuvector.helmRepo.chartName string "neuvector"
neuvector.helmRepo.tag string "2.6.3-bb.17"
neuvector.ingress object {"gateway":""} Redirect the package ingress to a specific Istio Gateway (listed in istio.gateways). The default is “public”.
neuvector.sso.enabled bool false Toggle SSO for Neuvector on and off
neuvector.sso.client_id string "" OIDC Client ID to use for Neuvector
neuvector.sso.client_secret string "" OIDC Client Secret to use for Neuvector
neuvector.sso.default_role string "" Default role to use for Neuvector OIDC users. Supports admin, reader, or no default
neuvector.sso.group_claim string "" Default role to use for Neuvector OIDC users. Supports admin, reader, or no default
neuvector.sso.group_mapped_roles list [] Default role to use for Neuvector OIDC users. Supports admin, reader, or no default
neuvector.flux object {} Flux reconciliation overrides specifically for the Neuvector Package
neuvector.values object {} Values to passthrough to the Neuvector chart: https://repo1.dso.mil/big-bang/product/packages/neuvector.git
neuvector.postRenderers list [] Post Renderers. See docs/postrenders.md
tempo.enabled bool true Toggle deployment of Tempo.
tempo.sourceType string "git" Choose source type of “git” or “helmRepo”
tempo.git.repo string "https://repo1.dso.mil/big-bang/product/packages/tempo.git"
tempo.git.path string "./chart"
tempo.git.tag string "1.7.1-bb.3"
tempo.helmRepo.repoName string "registry1"
tempo.helmRepo.chartName string "tempo"
tempo.helmRepo.tag string "1.7.1-bb.3"
tempo.ingress object {"gateway":""} Redirect the package ingress to a specific Istio Gateway (listed in istio.gateways). The default is “public”.
tempo.flux object {} Flux reconciliation overrides specifically for the Tempo Package
tempo.sso.enabled bool false Toggle SSO for Tempo on and off
tempo.sso.client_id string "" OIDC Client ID to use for Tempo
tempo.sso.client_secret string "" OIDC Client Secret to use for Tempo
tempo.objectStorage.endpoint string "" S3 compatible endpoint to use for connection information. examples: “s3.amazonaws.com” “s3.us-gov-west-1.amazonaws.com” “minio.minio.svc.cluster.local:9000” Note: tempo does not require protocol prefix for URL.
tempo.objectStorage.region string "" S3 compatible region to use for connection information.
tempo.objectStorage.accessKey string "" Access key for connecting to object storage endpoint.
tempo.objectStorage.accessSecret string "" Secret key for connecting to object storage endpoint. Unencoded string data. This should be placed in the secret values and then encrypted
tempo.objectStorage.bucket string "" Bucket Name for Tempo examples: “tempo-traces”
tempo.objectStorage.insecure bool false Whether or not objectStorage connection should require HTTPS, if connecting to in-cluster object storage on port 80/9000 set this value to true.
tempo.values object {} Values to passthrough to the Tempo chart: https://repo1.dso.mil/big-bang/product/packages/tempo.git
tempo.postRenderers list [] Post Renderers. See docs/postrenders.md
monitoring.enabled bool true Toggle deployment of Monitoring (Prometheus, Grafana, and Alertmanager).
monitoring.sourceType string "git" Choose source type of “git” or “helmRepo”
monitoring.git.repo string "https://repo1.dso.mil/big-bang/product/packages/monitoring.git"
monitoring.git.path string "./chart"
monitoring.git.tag string "57.0.3-bb.2"
monitoring.helmRepo.repoName string "registry1"
monitoring.helmRepo.chartName string "monitoring"
monitoring.helmRepo.tag string "57.0.3-bb.2"
monitoring.flux object {"install":{"crds":"CreateReplace"},"upgrade":{"crds":"CreateReplace"}} Flux reconciliation overrides specifically for the Monitoring Package
monitoring.ingress object {"gateway":""} Redirect the package ingress to a specific Istio Gateway (listed in istio.gateways). The default is “public”.
monitoring.sso.enabled bool false Toggle SSO for monitoring components on and off
monitoring.sso.prometheus.client_id string "" Prometheus OIDC client ID
monitoring.sso.prometheus.client_secret string "" Prometheus OIDC client secret
monitoring.sso.alertmanager.client_id string "" Alertmanager OIDC client ID
monitoring.sso.alertmanager.client_secret string "" Alertmanager OIDC client secret
monitoring.values object {} Values to passthrough to the monitoring chart: https://repo1.dso.mil/big-bang/product/packages/monitoring.git
monitoring.postRenderers list [] Post Renderers. See docs/postrenders.md
grafana.enabled bool true Toggle deployment of Grafana
grafana.sourceType string "git" Choose source type of “git” or “helmRepo”
grafana.git.repo string "https://repo1.dso.mil/big-bang/product/packages/grafana.git"
grafana.git.path string "./chart"
grafana.git.tag string "7.3.7-bb.1"
grafana.helmRepo.repoName string "registry1"
grafana.helmRepo.chartName string "grafana"
grafana.helmRepo.tag string "7.3.7-bb.1"
grafana.flux object {} Flux reconciliation overrides specifically for the Monitoring Package
grafana.ingress object {"gateway":""} Redirect the package ingress to a specific Istio Gateway (listed in istio.gateways). The default is “public”.
grafana.sso.enabled bool false Toggle SSO for grafana components on and off
grafana.sso.grafana.client_id string "" Grafana OIDC client ID
grafana.sso.grafana.client_secret string "" Grafana OIDC client secret
grafana.sso.grafana.scopes string "" Grafana OIDC client scopes, comma separated, see https://grafana.com/docs/grafana/latest/auth/generic-oauth/
grafana.sso.grafana.allow_sign_up bool true
grafana.sso.grafana.role_attribute_path string "Viewer"
grafana.values object {} Values to passthrough to the grafana chart: https://repo1.dso.mil/big-bang/product/packages/grafana.git
grafana.postRenderers list [] Post Renderers. See docs/postrenders.md
twistlock.enabled bool false Toggle deployment of Twistlock.
twistlock.sourceType string "git" Choose source type of “git” or “helmRepo”
twistlock.git.repo string "https://repo1.dso.mil/big-bang/product/packages/twistlock.git"
twistlock.git.path string "./chart"
twistlock.git.tag string "0.15.0-bb.4"
twistlock.helmRepo.repoName string "registry1"
twistlock.helmRepo.chartName string "twistlock"
twistlock.helmRepo.tag string "0.15.0-bb.4"
twistlock.flux object {} Flux reconciliation overrides specifically for the Twistlock Package
twistlock.ingress object {"gateway":""} Redirect the package ingress to a specific Istio Gateway (listed in istio.gateways). The default is “public”.
twistlock.sso.enabled bool false Toggle SAML SSO, requires a license and enabling the init job - see https://repo1.dso.mil/big-bang/product/packages/initialization.md
twistlock.sso.client_id string "" SAML client ID
twistlock.sso.provider_type string "shibboleth" SAML Identity Provider. shibboleth is recommended by Twistlock support for Keycloak Possible values: okta, gsuite, ping, shibboleth, azure, adfs
twistlock.sso.groups string "" Groups attribute (optional)
twistlock.values object {} Values to passthrough to the twistlock chart: https://repo1.dso.mil/big-bang/product/packages/twistlock.git
twistlock.postRenderers list [] Post Renderers. See docs/postrenders.md
addons.argocd.enabled bool false Toggle deployment of ArgoCD.
addons.argocd.sourceType string "git" Choose source type of “git” or “helmRepo”
addons.argocd.git.repo string "https://repo1.dso.mil/big-bang/product/packages/argocd.git"
addons.argocd.git.path string "./chart"
addons.argocd.git.tag string "6.7.2-bb.1"
addons.argocd.helmRepo.repoName string "registry1"
addons.argocd.helmRepo.chartName string "argocd"
addons.argocd.helmRepo.tag string "6.7.2-bb.1"
addons.argocd.flux object {} Flux reconciliation overrides specifically for the ArgoCD Package
addons.argocd.ingress object {"gateway":""} Redirect the package ingress to a specific Istio Gateway (listed in istio.gateways). The default is “public”.
addons.argocd.redis.host string "" Hostname of a pre-existing Redis to use for ArgoCD. Entering connection info will enable external Redis and will auto-create any required secrets.
addons.argocd.redis.port string "" Port of a pre-existing Redis to use for ArgoCD.
addons.argocd.sso.enabled bool false Toggle SSO for ArgoCD on and off
addons.argocd.sso.client_id string "" ArgoCD OIDC client ID
addons.argocd.sso.client_secret string "" ArgoCD OIDC client secret
addons.argocd.sso.groups string "g, Impact Level 2 Authorized, role:admin\n" ArgoCD SSO group roles, see docs for more details: https://argo-cd.readthedocs.io/en/stable/operator-manual/rbac/
addons.argocd.values object {} Values to passthrough to the argocd chart: https://repo1.dso.mil/big-bang/product/packages/argocd.git
addons.argocd.postRenderers list [] Post Renderers. See docs/postrenders.md
addons.authservice.enabled bool false Toggle deployment of Authservice. if enabling authservice, a filter needs to be provided by either enabling sso for monitoring or istio, or manually adding a filter chain in the values here: values: chain: minimal: callback_uri: “https://somecallback”
addons.authservice.sourceType string "git" Choose source type of “git” or “helmRepo”
addons.authservice.git.repo string "https://repo1.dso.mil/big-bang/product/packages/authservice.git"
addons.authservice.git.path string "./chart"
addons.authservice.git.tag string "1.0.0-bb.0"
addons.authservice.helmRepo.repoName string "registry1"
addons.authservice.helmRepo.chartName string "authservice"
addons.authservice.helmRepo.tag string "1.0.0-bb.0"
addons.authservice.flux object {} Flux reconciliation overrides specifically for the Authservice Package
addons.authservice.values object {} Values to passthrough to the authservice chart: https://repo1.dso.mil/big-bang/product/packages/authservice.git
addons.authservice.postRenderers list [] Post Renderers. See docs/postrenders.md
addons.authservice.chains object {} Additional authservice chain configurations.
addons.minioOperator.enabled bool false Toggle deployment of minio operator and instance.
addons.minioOperator.sourceType string "git" Choose source type of “git” or “helmRepo”
addons.minioOperator.git.repo string "https://repo1.dso.mil/big-bang/product/packages/minio-operator.git"
addons.minioOperator.git.path string "./chart"
addons.minioOperator.git.tag string "5.0.14-bb.0"
addons.minioOperator.helmRepo.repoName string "registry1"
addons.minioOperator.helmRepo.chartName string "minio-operator"
addons.minioOperator.helmRepo.tag string "5.0.14-bb.0"
addons.minioOperator.flux object {} Flux reconciliation overrides specifically for the Minio Operator Package
addons.minioOperator.ingress object {"gateway":""} Redirect the package ingress to a specific Istio Gateway (listed in istio.gateways). The default is “public”.
addons.minioOperator.values object {} Values to passthrough to the minio operator chart: https://repo1.dso.mil/big-bang/product/packages/minio-operator.git
addons.minioOperator.postRenderers list [] Post Renderers. See docs/postrenders.md
addons.minio.enabled bool false Toggle deployment of minio.
addons.minio.sourceType string "git" Choose source type of “git” or “helmRepo”
addons.minio.git.repo string "https://repo1.dso.mil/big-bang/product/packages/minio.git"
addons.minio.git.path string "./chart"
addons.minio.git.tag string "5.0.12-bb.8"
addons.minio.helmRepo.repoName string "registry1"
addons.minio.helmRepo.chartName string "minio-instance"
addons.minio.helmRepo.tag string "5.0.12-bb.8"
addons.minio.flux object {} Flux reconciliation overrides specifically for the Minio Package
addons.minio.ingress object {"gateway":""} Redirect the package ingress to a specific Istio Gateway (listed in istio.gateways). The default is “public”.
addons.minio.accesskey string "" Default access key to use for minio.
addons.minio.secretkey string "" Default secret key to intstantiate with minio, you should change/delete this after installation.
addons.minio.values object {} Values to passthrough to the minio instance chart: https://repo1.dso.mil/big-bang/product/packages/minio.git
addons.minio.postRenderers list [] Post Renderers. See docs/postrenders.md
addons.gitlab.enabled bool false Toggle deployment of Gitlab
addons.gitlab.hostnames.gitlab string "gitlab"
addons.gitlab.hostnames.registry string "registry"
addons.gitlab.sourceType string "git" Choose source type of “git” or “helmRepo”
addons.gitlab.git.repo string "https://repo1.dso.mil/big-bang/product/packages/gitlab.git"
addons.gitlab.git.path string "./chart"
addons.gitlab.git.tag string "7.10.1-bb.0"
addons.gitlab.helmRepo.repoName string "registry1"
addons.gitlab.helmRepo.chartName string "gitlab"
addons.gitlab.helmRepo.tag string "7.10.1-bb.0"
addons.gitlab.flux object {} Flux reconciliation overrides specifically for the Gitlab Package
addons.gitlab.ingress object {"gateway":""} Redirect the package ingress to a specific Istio Gateway (listed in istio.gateways). The default is “public”.
addons.gitlab.sso.enabled bool false Toggle OIDC SSO for Gitlab on and off. Enabling this option will auto-create any required secrets.
addons.gitlab.sso.client_id string "" Gitlab OIDC client ID
addons.gitlab.sso.client_secret string "" Gitlab OIDC client secret
addons.gitlab.sso.scopes list ["Gitlab"] Gitlab SSO Scopes, default is [“Gitlab”]
addons.gitlab.sso.groups list [] Fill out the groups block below and populate with Keycloak groups according to your desired Gitlab membership requirements. The default groupsAttribute is “groups”. Full documentation: https://docs.gitlab.com/ee/administration/auth/oidc.html?tab=Linux+package+%28Omnibus%29#configure-users-based-on-oidc-group-membership
addons.gitlab.database.host string "" Hostname of a pre-existing PostgreSQL database to use for Gitlab. Entering connection info will disable the deployment of an internal database and will auto-create any required secrets.
addons.gitlab.database.port int 5432 Port of a pre-existing PostgreSQL database to use for Gitlab.
addons.gitlab.database.database string "" Database name to connect to on host.
addons.gitlab.database.username string "" Username to connect as to external database, the user must have all privileges on the database.
addons.gitlab.database.password string "" Database password for the username used to connect to the existing database.
addons.gitlab.objectStorage.type string "" Type of object storage to use for Gitlab, setting to s3 will assume an external, pre-existing object storage is to be used. Entering connection info will enable this option and will auto-create any required secrets
addons.gitlab.objectStorage.endpoint string "" S3 compatible endpoint to use for connection information. examples: “https://s3.amazonaws.com” “https://s3.us-gov-west-1.amazonaws.com” “http://minio.minio.svc.cluster.local:9000”
addons.gitlab.objectStorage.region string "" S3 compatible region to use for connection information.
addons.gitlab.objectStorage.accessKey string "" Access key for connecting to object storage endpoint. – If using accessKey and accessSecret, the iamProfile must be left as an empty string: “”
addons.gitlab.objectStorage.accessSecret string "" Secret key for connecting to object storage endpoint. Unencoded string data. This should be placed in the secret values and then encrypted
addons.gitlab.objectStorage.bucketPrefix string "" Bucket prefix to use for identifying buckets. Example: “prod” will produce “prod-gitlab-bucket”
addons.gitlab.objectStorage.iamProfile string "" NOTE: Current bug with AWS IAM Profiles and Object Storage where only artifacts are stored. Fixed in Gitlab 14.5 – Name of AWS IAM profile to use. – If using an AWS IAM profile, the accessKey and accessSecret values must be left as empty strings eg: “”
addons.gitlab.smtp.password string "" Passwords should be placed in an encrypted file. Example: environment-bb-secret.enc.yaml If a value is provided BigBang will create a k8s secret named gitlab-smtp-password in the gitlab namespace
addons.gitlab.redis.password string "" Redis plain text password to connect to the redis server. If empty (“”), the gitlab charts will create the gitlab-redis-secret with a random password. – This needs to be set to a non-empty value in order for the Grafana Redis Datasource and Dashboards to be installed.
addons.gitlab.railsSecret string "" Rails plain text secret to define. If empty (“”), the gitlab charts will create the gitlab-rails-secret with randomized data. Read the following for more information on setting Gitlab rails secrets: https://docs.gitlab.com/charts/installation/secrets#gitlab-rails-secret
addons.gitlab.values object {} Values to passthrough to the gitlab chart: https://repo1.dso.mil/big-bang/product/packages/gitlab.git
addons.gitlab.postRenderers list [] Post Renderers. See docs/postrenders.md
addons.gitlabRunner.enabled bool false Toggle deployment of Gitlab Runner
addons.gitlabRunner.sourceType string "git" Choose source type of “git” or “helmRepo”
addons.gitlabRunner.git.repo string "https://repo1.dso.mil/big-bang/product/packages/gitlab-runner.git"
addons.gitlabRunner.git.path string "./chart"
addons.gitlabRunner.git.tag string "0.62.0-bb.0"
addons.gitlabRunner.helmRepo.repoName string "registry1"
addons.gitlabRunner.helmRepo.chartName string "gitlab-runner"
addons.gitlabRunner.helmRepo.tag string "0.62.0-bb.0"
addons.gitlabRunner.flux object {} Flux reconciliation overrides specifically for the Gitlab Runner Package
addons.gitlabRunner.values object {} Values to passthrough to the gitlab runner chart: https://repo1.dso.mil/big-bang/product/packages/gitlab-runner.git
addons.gitlabRunner.postRenderers list [] Post Renderers. See docs/postrenders.md
addons.nexusRepositoryManager.enabled bool false Toggle deployment of Nexus Repository Manager.
addons.nexusRepositoryManager.sourceType string "git" Choose source type of “git” or “helmRepo”
addons.nexusRepositoryManager.git.repo string "https://repo1.dso.mil/big-bang/product/packages/nexus.git"
addons.nexusRepositoryManager.git.path string "./chart"
addons.nexusRepositoryManager.git.tag string "66.0.0-bb.0"
addons.nexusRepositoryManager.helmRepo.repoName string "registry1"
addons.nexusRepositoryManager.helmRepo.chartName string "nexus-repository-manager"
addons.nexusRepositoryManager.helmRepo.tag string "66.0.0-bb.0"
addons.nexusRepositoryManager.license_key string "" Base64 encoded license file.
addons.nexusRepositoryManager.ingress object {"gateway":""} Redirect the package ingress to a specific Istio Gateway (listed in istio.gateways). The default is “public”.
addons.nexusRepositoryManager.sso.enabled bool false Toggle SAML SSO for NXRM. – handles SAML SSO, a Client must be configured in Keycloak or IdP – to complete setup. – https://support.sonatype.com/hc/en-us/articles/1500000976522-SAML-integration-for-Nexus-Repository-Manager-Pro-3-and-Nexus-IQ-Server-with-Keycloak#h_01EV7CWCYH3YKAPMAHG8XMQ599
addons.nexusRepositoryManager.sso.idp_data object {"email":"","entityId":"","firstName":"","groups":"","lastName":"","username":""} NXRM SAML SSO Integration data
addons.nexusRepositoryManager.sso.idp_data.username string "" IdP Field Mappings – NXRM username attribute
addons.nexusRepositoryManager.sso.idp_data.firstName string "" NXRM firstname attribute (optional)
addons.nexusRepositoryManager.sso.idp_data.lastName string "" NXRM lastname attribute (optional)
addons.nexusRepositoryManager.sso.idp_data.email string "" NXRM email attribute (optional)
addons.nexusRepositoryManager.sso.idp_data.groups string "" NXRM groups attribute (optional)
addons.nexusRepositoryManager.sso.role list [{"description":"","id":"","name":"","privileges":[],"roles":[]}] NXRM Role
addons.nexusRepositoryManager.flux object {} Flux reconciliation overrides specifically for the Nexus Repository Manager Package
addons.nexusRepositoryManager.values object {} Values to passthrough to the nxrm chart: https://repo1.dso.mil/big-bang/product/packages/nexus.git
addons.nexusRepositoryManager.postRenderers list [] Post Renderers. See docs/postrenders.md
addons.sonarqube.enabled bool false Toggle deployment of SonarQube.
addons.sonarqube.sourceType string "git" Choose source type of “git” or “helmRepo”
addons.sonarqube.git.repo string "https://repo1.dso.mil/big-bang/product/packages/sonarqube.git"
addons.sonarqube.git.path string "./chart"
addons.sonarqube.git.tag string "8.0.4-bb.0"
addons.sonarqube.helmRepo.repoName string "registry1"
addons.sonarqube.helmRepo.chartName string "sonarqube"
addons.sonarqube.helmRepo.tag string "8.0.4-bb.0"
addons.sonarqube.flux object {} Flux reconciliation overrides specifically for the Sonarqube Package
addons.sonarqube.ingress object {"gateway":""} Redirect the package ingress to a specific Istio Gateway (listed in istio.gateways). The default is “public”.
addons.sonarqube.sso.enabled bool false Toggle SAML SSO for SonarQube. Enabling this option will auto-create any required secrets.
addons.sonarqube.sso.client_id string "" SonarQube SAML client ID
addons.sonarqube.sso.login string "login" SonarQube login sso attribute.
addons.sonarqube.sso.name string "name" SonarQube name sso attribute.
addons.sonarqube.sso.email string "email" SonarQube email sso attribute.
addons.sonarqube.sso.group string "group" (optional) SonarQube group sso attribute.
addons.sonarqube.database.host string "" Hostname of a pre-existing PostgreSQL database to use for SonarQube.
addons.sonarqube.database.port int 5432 Port of a pre-existing PostgreSQL database to use for SonarQube.
addons.sonarqube.database.database string "" Database name to connect to on host.
addons.sonarqube.database.username string "" Username to connect as to external database, the user must have all privileges on the database.
addons.sonarqube.database.password string "" Database password for the username used to connect to the existing database.
addons.sonarqube.values object {} Values to passthrough to the sonarqube chart: https://repo1.dso.mil/big-bang/product/packages/sonarqube.git
addons.sonarqube.postRenderers list [] Post Renderers. See docs/postrenders.md
addons.fortify.enabled bool false Toggle deployment of Fortify.
addons.fortify.sourceType string "git" Choose source type of “git” or “helmRepo”
addons.fortify.git.repo string "https://repo1.dso.mil/big-bang/product/packages/fortify.git"
addons.fortify.git.path string "./chart"
addons.fortify.git.tag string "1.1.2320154-bb.3"
addons.fortify.helmRepo.repoName string "registry1"
addons.fortify.helmRepo.chartName string "fortify-ssc"
addons.fortify.helmRepo.tag string "1.1.2320154-bb.3"
addons.fortify.flux object {} Flux reconciliation overrides specifically for the Fortify Package
addons.fortify.ingress object {"gateway":""} Redirect the package ingress to a specific Istio Gateway (listed in istio.gateways). The default is “public”.
addons.fortify.sso.enabled bool false Toggle SSO for Fortify on and off
addons.fortify.sso.client_id string "" SAML Client ID to use for Fortify
addons.fortify.sso.client_secret string "" SAML Client Secret to use for Fortify
addons.fortify.values object {} Values to passthrough to the fortify chart: https://repo1.dso.mil/big-bang/product/packages/fortify.git
addons.fortify.postRenderers list [] Post Renderers. See docs/postrenders.md
addons.haproxy.sourceType string "git" Choose source type of “git” or “helmRepo”
addons.haproxy.git.repo string "https://repo1.dso.mil/big-bang/product/packages/haproxy.git"
addons.haproxy.git.path string "./chart"
addons.haproxy.git.tag string "1.19.3-bb.4"
addons.haproxy.helmRepo.repoName string "registry1"
addons.haproxy.helmRepo.chartName string "haproxy"
addons.haproxy.helmRepo.tag string "1.19.3-bb.4"
addons.haproxy.flux object {} Flux reconciliation overrides specifically for the HAProxy Package
addons.haproxy.ingress object {"gateway":""} Redirect the package ingress to a specific Istio Gateway (listed in istio.gateways). The default is “public”.
addons.haproxy.values object {} Values to passthrough to the haproxy chart: https://repo1.dso.mil/big-bang/product/packages/haproxy.git
addons.haproxy.postRenderers list [] Post Renderers. See docs/postrenders.md
addons.anchore.enabled bool false Toggle deployment of Anchore.
addons.anchore.sourceType string "git" Choose source type of “git” or “helmRepo”
addons.anchore.git.repo string "https://repo1.dso.mil/big-bang/product/packages/anchore-enterprise.git"
addons.anchore.git.path string "./chart"
addons.anchore.git.tag string "2.0.2-bb.1"
addons.anchore.helmRepo.repoName string "registry1"
addons.anchore.helmRepo.chartName string "anchore"
addons.anchore.helmRepo.tag string "2.0.2-bb.1"
addons.anchore.flux object {"upgrade":{"disableWait":true}} Flux reconciliation overrides specifically for the Anchore Package
addons.anchore.adminPassword string "" Initial admin password used to authenticate to Anchore.
addons.anchore.enterprise object {"licenseYaml":"FULL LICENSE\n"} Anchore Enterprise functionality.
addons.anchore.enterprise.licenseYaml string "FULL LICENSE\n" License for Anchore Enterprise. Enterprise is the only option available for the chart starting with chart major version 2.X. For formatting examples see https://repo1.dso.mil/big-bang/product/packages/CHART.md#enabling-enterprise-services
addons.anchore.ingress object {"gateway":""} Redirect the package ingress to a specific Istio Gateway (listed in istio.gateways). The default is “public”.
addons.anchore.sso.enabled bool false Toggle SAML SSO for Anchore on and off. Enabling this option will auto-create any required secrets (Note: SSO requires an Enterprise license).
addons.anchore.sso.client_id string "" Anchore SAML client ID
addons.anchore.sso.role_attribute string "" Anchore SAML client role attribute
addons.anchore.database.host string "" Hostname of a pre-existing PostgreSQL database to use for Anchore. Entering connection info will disable the deployment of an internal database and will auto-create any required secrets.
addons.anchore.database.port string "" Port of a pre-existing PostgreSQL database to use for Anchore.
addons.anchore.database.username string "" Username to connect as to external database, the user must have all privileges on the database.
addons.anchore.database.password string "" Database password for the username used to connect to the existing database.
addons.anchore.database.database string "" Database name to connect to on host (Note: database name CANNOT contain hyphens).
addons.anchore.database.feeds_database string "" Feeds database name to connect to on host (Note: feeds database name CANNOT contain hyphens). Only required for enterprise edition of anchore. By default, feeds database will be configured with the same username and password as the main database. For formatting examples on how to use a separate username and password for the feeds database see https://repo1.dso.mil/big-bang/product/packages/CHART.md#handling-dependencies
addons.anchore.redis.host string "" Hostname of a pre-existing Redis to use for Anchore Enterprise. Entering connection info will enable external redis and will auto-create any required secrets. Anchore only requires redis for enterprise deployments and will not provision an instance if using external
addons.anchore.redis.port string "" Port of a pre-existing Redis to use for Anchore Enterprise.
addons.anchore.redis.username string "" OPTIONAL: Username to connect to a pre-existing Redis (for password-only auth leave empty)
addons.anchore.redis.password string "" Password to connect to pre-existing Redis.
addons.anchore.values object {} Values to passthrough to the anchore chart: https://repo1.dso.mil/big-bang/product/packages/anchore-enterprise.git
addons.anchore.postRenderers list [] Post Renderers. See docs/postrenders.md
addons.mattermostOperator.enabled bool false Toggle deployment of Mattermost Operator.
addons.mattermostOperator.sourceType string "git" Choose source type of “git” or “helmRepo”
addons.mattermostOperator.git.repo string "https://repo1.dso.mil/big-bang/product/packages/mattermost-operator.git"
addons.mattermostOperator.git.path string "./chart"
addons.mattermostOperator.git.tag string "1.21.0-bb.0"
addons.mattermostOperator.helmRepo.repoName string "registry1"
addons.mattermostOperator.helmRepo.chartName string "mattermost-operator"
addons.mattermostOperator.helmRepo.tag string "1.21.0-bb.0"
addons.mattermostOperator.flux object {} Flux reconciliation overrides specifically for the Mattermost Operator Package
addons.mattermostOperator.values object {} Values to passthrough to the mattermost operator chart: https://repo1.dso.mil/big-bang/product/packages/values.yaml
addons.mattermostOperator.postRenderers list [] Post Renderers. See docs/postrenders.md
addons.mattermost.enabled bool false Toggle deployment of Mattermost.
addons.mattermost.sourceType string "git" Choose source type of “git” or “helmRepo”
addons.mattermost.git.repo string "https://repo1.dso.mil/big-bang/product/packages/mattermost.git"
addons.mattermost.git.path string "./chart"
addons.mattermost.git.tag string "9.6.0-bb.0"
addons.mattermost.helmRepo.repoName string "registry1"
addons.mattermost.helmRepo.chartName string "mattermost"
addons.mattermost.helmRepo.tag string "9.6.0-bb.0"
addons.mattermost.flux object {} Flux reconciliation overrides specifically for the Mattermost Package
addons.mattermost.enterprise object {"enabled":false,"license":""} Mattermost Enterprise functionality.
addons.mattermost.enterprise.enabled bool false Toggle the Mattermost Enterprise. This must be accompanied by a valid license unless you plan to start a trial post-install.
addons.mattermost.enterprise.license string "" License for Mattermost. This should be the entire contents of the license file from Mattermost (should be one line), example below license: “eyJpZCI6InIxM205bjR3eTdkYjludG95Z3RiOD—REST—IS—HIDDEN
addons.mattermost.ingress object {"gateway":""} Redirect the package ingress to a specific Istio Gateway (listed in istio.gateways). The default is “public”.
addons.mattermost.sso.enabled bool false Toggle OIDC SSO for Mattermost on and off. Enabling this option will auto-create any required secrets.
addons.mattermost.sso.client_id string "" Mattermost OIDC client ID
addons.mattermost.sso.client_secret string "" Mattermost OIDC client secret
addons.mattermost.database.host string "" Hostname of a pre-existing PostgreSQL database to use for Mattermost. Entering connection info will disable the deployment of an internal database and will auto-create any required secrets.
addons.mattermost.database.port string "" Port of a pre-existing PostgreSQL database to use for Mattermost.
addons.mattermost.database.username string "" Username to connect as to external database, the user must have all privileges on the database.
addons.mattermost.database.password string "" Database password for the username used to connect to the existing database.
addons.mattermost.database.database string "" Database name to connect to on host.
addons.mattermost.database.ssl_mode string "" SSL Mode to use when connecting to the database. Allowable values for this are viewable in the postgres documentation: https://www.postgresql.org/docs/current/libpq-ssl.html#LIBPQ-SSL-SSLMODE-STATEMENTS
addons.mattermost.objectStorage.endpoint string "" S3 compatible endpoint to use for connection information. Entering connection info will enable this option and will auto-create any required secrets. examples: “s3.amazonaws.com” “s3.us-gov-west-1.amazonaws.com” “minio.minio.svc.cluster.local:9000”
addons.mattermost.objectStorage.accessKey string "" Access key for connecting to object storage endpoint.
addons.mattermost.objectStorage.accessSecret string "" Secret key for connecting to object storage endpoint. Unencoded string data. This should be placed in the secret values and then encrypted
addons.mattermost.objectStorage.bucket string "" Bucket name to use for Mattermost - will be auto-created.
addons.mattermost.elasticsearch object {"enabled":false} Mattermost Elasticsearch integration - requires enterprise E20 license - https://docs.mattermost.com/deployment/elasticsearch.html Connection info defaults to the BB deployed Elastic, all values can be overridden via the “values” passthrough for other connections. See values spec in MM chart “elasticsearch” yaml block - https://repo1.dso.mil/big-bang/product/packages/values.yaml
addons.mattermost.elasticsearch.enabled bool false Toggle interaction with Elastic for optimized search indexing
addons.mattermost.values object {} Values to passthrough to the Mattermost chart: https://repo1.dso.mil/big-bang/product/packages/values.yaml
addons.mattermost.postRenderers list [] Post Renderers. See docs/postrenders.md
addons.velero.enabled bool false Toggle deployment of Velero.
addons.velero.sourceType string "git" Choose source type of “git” or “helmRepo”
addons.velero.git.repo string "https://repo1.dso.mil/big-bang/product/packages/velero.git"
addons.velero.git.path string "./chart"
addons.velero.git.tag string "6.0.0-bb.1"
addons.velero.helmRepo.repoName string "registry1"
addons.velero.helmRepo.chartName string "velero"
addons.velero.helmRepo.tag string "6.0.0-bb.1"
addons.velero.flux object {} Flux reconciliation overrides specifically for the Velero Package
addons.velero.plugins list [] Plugin provider for Velero - requires at least one plugin installed. Current supported values: aws, azure, csi
addons.velero.values object {} Values to passthrough to the Velero chart: https://repo1.dso.mil/big-bang/product/packages/values.yaml
addons.velero.postRenderers list [] Post Renderers. See docs/postrenders.md
addons.keycloak.enabled bool false Toggle deployment of Keycloak. if you enable Keycloak you should uncomment the istio passthrough configurations above istio.ingressGateways.passthrough-ingressgateway and istio.gateways.passthrough
addons.keycloak.sourceType string "git" Choose source type of “git” or “helmRepo”
addons.keycloak.git.repo string "https://repo1.dso.mil/big-bang/product/packages/keycloak.git"
addons.keycloak.git.path string "./chart"
addons.keycloak.git.tag string "23.0.7-bb.2"
addons.keycloak.helmRepo.repoName string "registry1"
addons.keycloak.helmRepo.chartName string "keycloak"
addons.keycloak.helmRepo.tag string "23.0.7-bb.2"
addons.keycloak.database.host string "" Hostname of a pre-existing database to use for Keycloak. Entering connection info will disable the deployment of an internal database and will auto-create any required secrets.
addons.keycloak.database.type string "postgres" Pre-existing database type (e.g. postgres) to use for Keycloak.
addons.keycloak.database.port int 5432 Port of a pre-existing database to use for Keycloak.
addons.keycloak.database.database string "" Database name to connect to on host.
addons.keycloak.database.username string "" Username to connect as to external database, the user must have all privileges on the database.
addons.keycloak.database.password string "" Database password for the username used to connect to the existing database.
addons.keycloak.flux object {} Flux reconciliation overrides specifically for the OPA Gatekeeper Package
addons.keycloak.ingress object {"cert":"","gateway":"passthrough","key":""} Redirect the package ingress to a specific Istio Gateway (listed in istio.gateways). The default is “public”.
addons.keycloak.ingress.key string "" Certificate/Key pair to use as the certificate for exposing Keycloak Setting the ingress cert here will automatically create the volume and volumemounts in the Keycloak Package chart
addons.keycloak.values object {} Values to passthrough to the keycloak chart: https://repo1.dso.mil/big-bang/product/packages/keycloak.git
addons.keycloak.postRenderers list [] Post Renderers. See docs/postrenders.md
addons.vault.enabled bool false Toggle deployment of Vault.
addons.vault.sourceType string "git" Choose source type of “git” or “helmRepo”
addons.vault.git.repo string "https://repo1.dso.mil/big-bang/product/packages/vault.git"
addons.vault.git.path string "./chart"
addons.vault.git.tag string "0.25.0-bb.20"
addons.vault.helmRepo.repoName string "registry1"
addons.vault.helmRepo.chartName string "vault"
addons.vault.helmRepo.tag string "0.25.0-bb.20"
addons.vault.flux object {} Flux reconciliation overrides specifically for the Vault Package
addons.vault.ingress object {"cert":"","gateway":"","key":""} Redirect the package ingress to a specific Istio Gateway (listed in istio.gateways). The default is “public”.
addons.vault.ingress.key string "" Certificate/Key pair to use as the certificate for exposing Vault Setting the ingress cert here will automatically create the volume and volumemounts in the Vault package chart
addons.vault.values object {} Values to passthrough to the vault chart: https://repo1.dso.mil/big-bang/product/packages/vault.git
addons.vault.postRenderers list [] Post Renderers. See docs/postrenders.md
addons.metricsServer.enabled string "auto" Toggle deployment of metrics server Acceptable options are enabled: true, enabled: false, enabled: auto true = enabled / false = disabled / auto = automatic (Installs only if metrics API endpoint is not present)
addons.metricsServer.sourceType string "git" Choose source type of “git” or “helmRepo”
addons.metricsServer.git.repo string "https://repo1.dso.mil/big-bang/product/packages/metrics-server.git"
addons.metricsServer.git.path string "./chart"
addons.metricsServer.git.tag string "3.12.0-bb.1"
addons.metricsServer.helmRepo.repoName string "registry1"
addons.metricsServer.helmRepo.chartName string "metrics-server"
addons.metricsServer.helmRepo.tag string "3.12.0-bb.1"
addons.metricsServer.flux object {} Flux reconciliation overrides specifically for the metrics server Package
addons.metricsServer.values object {} Values to passthrough to the metrics server chart: https://repo1.dso.mil/big-bang/product/packages/metrics-server.git
addons.metricsServer.postRenderers list [] Post Renderers. See docs/postrenders.md
addons.harbor.enabled bool false Toggle deployment of harbor
addons.harbor.sourceType string "git" Choose source type of “git” or “helmRepo”
addons.harbor.git.repo string "https://repo1.dso.mil/platform-one/big-bang/apps/sandbox/harbor.git"
addons.harbor.git.tag string "1.14.0-bb.6"
addons.harbor.git.path string "./chart"
addons.harbor.helmRepo.repoName string "registry1"
addons.harbor.helmRepo.chartName string "harbor"
addons.harbor.helmRepo.tag string "1.14.0-bb.6"
addons.harbor.flux object {} Flux reconciliation overrides specifically for the Jaeger Package
addons.harbor.ingress object {"gateway":""} Redirect the package ingress to a specific Istio Gateway (listed in istio.gateways). The default is “public”.
addons.harbor.sso.enabled bool false Toggle SSO for Harbor on and off
addons.harbor.sso.client_id string "" OIDC Client ID to use for Harbor
addons.harbor.sso.client_secret string "" OIDC Client Secret to use for Harbor
addons.harbor.values object {} Values to pass through to Habor chart: https://repo1.dso.mil/big-bang/product/packages/harbor.git
addons.harbor.postRenderers list [] Post Renderers. See docs/postrenders.md
addons.holocron.enabled bool false Toggle deployment of Holocron.
addons.holocron.sourceType string "git" Choose source type of “git” or “helmRepo”
addons.holocron.git.repo string "https://repo1.dso.mil/big-bang/product/packages/holocron.git"
addons.holocron.git.tag string "1.0.2"
addons.holocron.git.path string "./chart"
addons.holocron.helmRepo.repoName string "registry1"
addons.holocron.helmRepo.chartName string "holocron"
addons.holocron.helmRepo.tag string "1.0.2"
addons.holocron.collectorAuth.existingSecret string "" Name of existing secret with auth tokens for collector services: https://repo1.dso.mil/groups/big-bang/apps/sandbox/holocron/-/wikis/Administrator-Guide – Default keys for secret are: – gitlab-scm-0, gitlab-workflow-0, gitlab-build-0, jira-workflow-0, sonarqube-project-analysis-0 – If not provided, one will be created
addons.holocron.collectorAuth.gitlabToken string "mygitlabtoken" Tokens for the secret to be created
addons.holocron.collectorAuth.jiraToken string "myjiratoken"
addons.holocron.collectorAuth.sonarToken string "mysonartoken"
addons.holocron.jira.enabled bool false If there is a Jira deployment, enable a collector for it
addons.holocron.jira.service.name string "" The service name to communicate with
addons.holocron.jira.service.label object {"key":"value"} If network policies are enabled, a label to match the namespace for egress policy
addons.holocron.flux object {} Flux reconciliation overrides specifically for the Holocron Package
addons.holocron.ingress object {"gateway":""} Redirect the package ingress to a specific Istio Gateway (listed in istio.gateways). The default is “public”.
addons.holocron.sso.enabled bool false Toggle SSO for Holocron on and off
addons.holocron.sso.groups object {"admin":"","leadership":""} Holocron SSO group roles: https://repo1.dso.mil/groups/big-bang/apps/sandbox/holocron/-/wikis/Administrator-Guide
addons.holocron.database.host string "" Hostname of a pre-existing PostgreSQL database to use for Gitlab. – Entering connection info will disable the deployment of an internal database and will auto-create any required secrets.
addons.holocron.database.port int 5432 Port of a pre-existing PostgreSQL database to use for Gitlab.
addons.holocron.database.database string "holocron" Database name to connect to on host.
addons.holocron.database.username string "holocron" Username to connect as to external database, the user must have all privileges on the database.
addons.holocron.database.password string "holocron" Database password for the username used to connect to the existing database.
addons.holocron.postRenderers list [] Post Renderers. See docs/postrenders.md
addons.holocron.values object {} Values to passthrough to the Holocron chart: https://repo1.dso.mil/big-bang/product/packages/holocron.git
addons.thanos.enabled bool false Toggle deployment of thanos
addons.thanos.sourceType string "git" Choose source type of “git” or “helmRepo”
addons.thanos.git.repo string "https://repo1.dso.mil/big-bang/product/packages/thanos.git"
addons.thanos.git.tag string "13.2.2-bb.2"
addons.thanos.git.path string "./chart"
addons.thanos.helmRepo.repoName string "registry1"
addons.thanos.helmRepo.chartName string "thanos"
addons.thanos.helmRepo.tag string "13.2.2-bb.2"
addons.thanos.flux object {} Flux reconciliation overrides specifically for the Jaeger Package
addons.thanos.ingress object {"gateway":""} Redirect the package ingress to a specific Istio Gateway (listed in istio.gateways). The default is “public”.
addons.thanos.values object {}
addons.thanos.postRenderers list []
wrapper object {"git":{"path":"chart","repo":"https://repo1.dso.mil/big-bang/product/packages/wrapper.git","tag":"0.4.6"},"helmRepo":{"chartName":"wrapper","repoName":"registry1","tag":"0.4.6"},"sourceType":"git"} Wrapper chart for integrating Big Bang components alongside a package
wrapper.sourceType string "git" Choose source type of “git” or “helmRepo”
wrapper.helmRepo.repoName string "registry1" Repository holding OCI chart, corresponding to helmRepositories name
wrapper.helmRepo.chartName string "wrapper" Name of the OCI chart in repo
wrapper.helmRepo.tag string "0.4.6" Tag of the OCI chart in repo
wrapper.git.repo string "https://repo1.dso.mil/big-bang/product/packages/wrapper.git" Git repo holding the wrapper helm chart, example: https://repo1.dso.mil/big-bang/product/packages/wrapper
wrapper.git.path string "chart" Path inside of the git repo to find the helm chart, example: chart
wrapper.git.tag string "0.4.6" Git tag to check out. Takes precedence over branch. More info, example: 0.0.2
packages object {"sample":{"configMaps":{},"dependsOn":[],"enabled":false,"flux":{},"git":{"branch":null,"commit":null,"credentials":{"caFile":"","knownHosts":"","password":"","privateKey":"","publicKey":"","username":""},"existingSecret":"","path":null,"repo":null,"semver":null,"tag":null},"helmRepo":{"chartName":null,"repoName":null,"tag":null},"istio":{},"kustomize":false,"monitor":{},"network":{},"postRenderers":[],"secrets":{},"sourceType":"git","values":{},"wrapper":{"enabled":false}}} Packages to deploy with Big Bang @default - ‘{}’
packages.sample object Uses defaults/<package name>.yaml for defaults. See package Helm chart for additional values that can be set. Package name. Each package will be independently wrapped for Big Bang integration.
packages.sample.enabled bool true Toggle deployment of this package
packages.sample.sourceType string "git" Choose source type of “git” (“helmRepo” not supported yet)
packages.sample.wrapper object false Toggle wrapper functionality. See https://docs-bigbang.dso.mil/latest/docs/guides/deployment-scenarios/extra-package-deployment/#Wrapper-Deployment for more details.
packages.sample.kustomize bool false Use a kustomize deployment rather than Helm
packages.sample.helmRepo object {"chartName":null,"repoName":null,"tag":null} HelmRepo source is supported as an option for Helm deployments. If both git and helmRepo are provided git will take precedence.
packages.sample.helmRepo.repoName string nil Name of the HelmRepo specified in helmRepositories
packages.sample.helmRepo.chartName string nil Name of the chart stored in the Helm repository
packages.sample.helmRepo.tag string nil Tag of the chart in the Helm repo, required
packages.sample.git object {"branch":null,"commit":null,"credentials":{"caFile":"","knownHosts":"","password":"","privateKey":"","publicKey":"","username":""},"existingSecret":"","path":null,"repo":null,"semver":null,"tag":null} Git source is supported for both Helm and Kustomize deployments. If both git and helmRepo are provided git will take precedence.
packages.sample.git.repo string nil Git repo URL holding the helm chart for this package, required if using git
packages.sample.git.commit string nil Git commit to check out. Takes precedence over semver, tag, and branch. More info
packages.sample.git.semver string nil Git semVer tag expression to check out. Takes precedence over tag. More info
packages.sample.git.tag string nil Git tag to check out. Takes precedence over branch. More info
packages.sample.git.branch string nil Git branch to check out. More info.
packages.sample.git.path string nil Path inside of the git repo to find the helm chart or kustomize
packages.sample.git.existingSecret string "" Optional, alternative existing secret to use for git credentials, must be in the appropriate format: https://toolkit.fluxcd.io/components/source/gitrepositories/#https-authentication
packages.sample.git.credentials object {"caFile":"","knownHosts":"","password":"","privateKey":"","publicKey":"","username":""} Optional, alternative Chart created secrets with user defined values
packages.sample.git.credentials.username string "" HTTP git credentials, both username and password must be provided
packages.sample.git.credentials.caFile string "" HTTPS certificate authority file. Required for any repo with a self signed certificate
packages.sample.git.credentials.privateKey string "" SSH git credentials, privateKey, publicKey, and knownHosts must be provided
packages.sample.flux object {} Override flux settings for this package
packages.sample.postRenderers list [] After deployment, patch resources. More info
packages.sample.dependsOn list [] Specify dependencies for the package. Only used for HelmRelease, does not effect Kustomization. See here for a reference.
packages.sample.istio object {} Package details for Istio. See wrapper values for settings.
packages.sample.monitor object {} Package details for monitoring. See wrapper values for settings.
packages.sample.network object {} Package details for network policies. See wrapper values for settings.
packages.sample.secrets object {} Secrets that should be created prior to package installation. See wrapper values for settings.
packages.sample.configMaps object {} ConfigMaps that should be created prior to package installation. See wrapper values for settings.
packages.sample.values object {} Values to pass through to package Helm chart

Last update: 2024-04-05 by Christopher O'Connell