anchore-enterprise values.yaml📜
domain📜
Type: string
"dev.bigbang.mil"
istio.enabled📜
Type: bool
false
istio.hardened.enabled📜
Type: bool
false
istio.hardened.outboundTrafficPolicyMode📜
Type: string
"REGISTRY_ONLY"
istio.hardened.customServiceEntries📜
Type: list
[]
istio.hardened.customAuthorizationPolicies📜
Type: list
[]
istio.injection📜
Type: string
"disabled"
istio.ui.enabled📜
Type: bool
true
istio.ui.annotations📜
Type: object
{}
istio.ui.labels📜
Type: object
{}
istio.ui.gateways[0]📜
Type: string
"istio-system/main"
istio.ui.hosts[0]📜
Type: string
"anchore.{{ .Values.domain }}"
istio.api.enabled📜
Type: bool
true
istio.api.annotations📜
Type: object
{}
istio.api.labels📜
Type: object
{}
istio.api.gateways[0]📜
Type: string
"istio-system/main"
istio.api.hosts[0]📜
Type: string
"anchore-api.{{ .Values.domain }}"
istio.api.service.apiVersion📜
Type: string
"v2"
istio.mtls📜
Type: object
mode: STRICT
Description: Default peer authentication
istio.mtls.mode📜
Type: string
"STRICT"
Description: STRICT = Allow only mutual TLS traffic, PERMISSIVE = Allow both plain text and mutual TLS traffic
networkPolicies.enabled📜
Type: bool
false
networkPolicies.ingressLabels.app📜
Type: string
"istio-ingressgateway"
networkPolicies.ingressLabels.istio📜
Type: string
"ingressgateway"
networkPolicies.additionalPolicies📜
Type: list
[]
sso.enabled📜
Type: bool
false
sso.name📜
Type: string
"keycloak"
sso.acsHttpsPort📜
Type: int
-1
sso.spEntityId📜
Type: string
"platform1_a8604cc9-f5e9-4656-802d-d05624370245_bb8-anchore"
sso.acsUrl📜
Type: string
"https://anchore.bigbang.dev/service/sso/auth/keycloak"
sso.defaultAccount📜
Type: string
"user"
sso.defaultRole📜
Type: string
"read-write"
sso.roleAttribute📜
Type: string
""
sso.requireSignedAssertions📜
Type: bool
false
sso.requireSignedResponse📜
Type: bool
true
sso.idpMetadataUrl📜
Type: string
"https://login.dso.mil/auth/realms/baby-yoda/protocol/saml/descriptor"
sso.host📜
Type: string
"login.dso.mil"
sso.realm📜
Type: string
"baby-yoda"
sso.resources.limits.cpu📜
Type: string
"100m"
sso.resources.limits.memory📜
Type: string
"256Mi"
sso.resources.requests.cpu📜
Type: string
"100m"
sso.resources.requests.memory📜
Type: string
"256Mi"
sso.containerSecurityContext.runAsUser📜
Type: int
1001
sso.containerSecurityContext.runAsGroup📜
Type: int
1001
sso.containerSecurityContext.capabilities.drop[0]📜
Type: string
"ALL"
monitoring.enabled📜
Type: bool
false
monitoring.namespace📜
Type: string
"monitoring"
monitoring.serviceMonitor.scheme📜
Type: string
""
monitoring.serviceMonitor.tlsConfig📜
Type: object
{}
bbtests.enabled📜
Type: bool
false
bbtests.scripts.image📜
Type: string
"registry1.dso.mil/ironbank/anchore/cli/cli:0.9.4"
bbtests.scripts.envs.ANCHORE_CLI_URL📜
Type: string
"http://{{ include \"enterprise.api.fullname\" . }}:{{ .Values.api.service.port }}/v2"
bbtests.scripts.envs.ANCHORE_CLI_USER📜
Type: string
"admin"
bbtests.scripts.envs.ANCHORE_SCAN_IMAGE📜
Type: string
"quay.io/prometheus/node-exporter:latest"
bbtests.scripts.secretEnvs[0].name📜
Type: string
"ANCHORE_CLI_PASS"
bbtests.scripts.secretEnvs[0].valueFrom.secretKeyRef.name📜
Type: string
"{{ include \"enterprise.fullname\" . }}"
bbtests.scripts.secretEnvs[0].valueFrom.secretKeyRef.key📜
Type: string
"ANCHORE_ADMIN_PASSWORD"
bbtests.cypress.resources.requests.cpu📜
Type: string
"2"
bbtests.cypress.resources.requests.memory📜
Type: string
"4Gi"
bbtests.cypress.resources.limits.cpu📜
Type: string
"2"
bbtests.cypress.resources.limits.memory📜
Type: string
"4Gi"
bbtests.cypress.artifacts📜
Type: bool
true
bbtests.cypress.envs.cypress_url📜
Type: string
"http://{{ include \"enterprise.ui.fullname\" . }}:{{ .Values.ui.service.port }}"
bbtests.cypress.envs.cypress_user📜
Type: string
"admin"
bbtests.cypress.envs.cypress_registry📜
Type: string
"docker.io"
bbtests.cypress.envs.cypress_repository📜
Type: string
"anchore/grype"
bbtests.cypress.envs.cypress_tag📜
Type: string
"latest"
bbtests.cypress.secretEnvs[0].name📜
Type: string
"cypress_password"
bbtests.cypress.secretEnvs[0].valueFrom.secretKeyRef.name📜
Type: string
"{{ include \"enterprise.fullname\" . }}"
bbtests.cypress.secretEnvs[0].valueFrom.secretKeyRef.key📜
Type: string
"ANCHORE_ADMIN_PASSWORD"
global.fullnameOverride📜
Type: string
""
global.nameOverride📜
Type: string
"anchore-enterprise"
ui-redis.enabled📜
Type: bool
true
ui-redis.istio.enabled📜
Type: string
"{{ .Values.istio.enabled }}"
ui-redis.externalEndpoint📜
Type: string
""
ui-redis.upstream.nameOverride📜
Type: string
"ui-redis"
ui-redis.upstream.fullnameOverride📜
Type: string
"anchore-enterprise-ui-redis"
ui-redis.upstream.auth.password📜
Type: string
"anchore-redis,123"
ui-redis.upstream.architecture📜
Type: string
"standalone"
ui-redis.upstream.master.persistence.enabled📜
Type: bool
false
ui-redis.upstream.commonConfiguration📜
Type: string
"maxmemory 200mb\nsave \"\""
ui-redis.cleanUpgrade.enabled📜
Type: bool
false
ui-redis.cleanUpgrade.redisLabel📜
Type: string
"app.kubernetes.io/name: ui-redis"
postgresql.enabled📜
Type: bool
true
postgresql.externalDBCheckEnabled📜
Type: bool
false
postgresql.primary.podSecurityContext.enabled📜
Type: bool
true
postgresql.primary.podSecurityContext.fsGroup📜
Type: int
1001
postgresql.primary.podSecurityContext.runAsUser📜
Type: int
1001
postgresql.primary.podSecurityContext.runAsGroup📜
Type: int
1001
postgresql.primary.containerSecurityContext.enabled📜
Type: bool
true
postgresql.primary.containerSecurityContext.runAsUser📜
Type: int
1001
postgresql.primary.containerSecurityContext.runAsGroup📜
Type: int
1001
postgresql.primary.containerSecurityContext.capabilities.drop[0]📜
Type: string
"ALL"
postgresql.primary.persistence.resourcePolicy📜
Type: string
"keep"
postgresql.primary.persistence.subPath📜
Type: string
"data/pgdata"
postgresql.primary.persistence.mountPath📜
Type: string
"/var/lib/postgresql"
postgresql.primary.postgresqlDataDir📜
Type: string
"/var/lib/postgresql/data"
postgresql.primary.service.ports.postgresql📜
Type: int
5432
postgresql.image.registry📜
Type: string
"registry1.dso.mil"
postgresql.image.repository📜
Type: string
"ironbank/opensource/postgres/postgresql"
postgresql.image.tag📜
Type: string
"18.1"
postgresql.global.imagePullSecrets[0]📜
Type: string
"private-registry"
postgresql.postgresqlConfiguration.listen_addresses📜
Type: string
"*"
postgresql.pgHbaConfiguration📜
Type: string
"local all all scram-sha-256\nhost all all all scram-sha-256"
postgresql.postgresUser📜
Type: string
"anchore"
postgresql.postgresPassword📜
Type: string
"anchore-postgres,123"
postgresql.postgresDatabase📜
Type: string
"anchore"
postgresql.resources.limits.cpu📜
Type: string
"1000m"
postgresql.resources.limits.memory📜
Type: string
"4096Mi"
postgresql.resources.requests.cpu📜
Type: string
"1000m"
postgresql.resources.requests.memory📜
Type: string
"4096Mi"
postgresql.metrics.resources.limits.cpu📜
Type: string
"200m"
postgresql.metrics.resources.limits.memory📜
Type: string
"256Mi"
postgresql.metrics.resources.requests.cpu📜
Type: string
"200m"
postgresql.metrics.resources.requests.memory📜
Type: string
"256Mi"
postgresql.securityContext.enabled📜
Type: bool
true
postgresql.securityContext.fsGroup📜
Type: int
1001
postgresql.securityContext.runAsUser📜
Type: int
1001
postgresql.securityContext.runAsGroup📜
Type: int
1001
postgresql.containerSecurityContext.enabled📜
Type: bool
true
postgresql.containerSecurityContext.runAsUser📜
Type: int
1001
postgresql.containerSecurityContext.runAsGroup📜
Type: int
1001
postgresql.containerSecurityContext.capabilities.drop[0]📜
Type: string
"ALL"
postgresqlSuperUser.postgresUsername📜
Type: string
""
postgresqlSuperUser.postgresPassword📜
Type: string
""
postgresqlSuperUser.existingSecret📜
Type: string
nil
ensureDbJobs.resources.limits.cpu📜
Type: int
2
ensureDbJobs.resources.limits.memory📜
Type: string
"2G"
ensureDbJobs.resources.requests.cpu📜
Type: int
2
ensureDbJobs.resources.requests.memory📜
Type: string
"2G"