headlamp values.yaml📜
routes📜
Type: object
{}
Description: Routes configuration; see bb-common routes docs for details: https://repo1.dso.mil/big-bang/product/packages/bb-common/-/tree/main/docs/routes?ref_type=heads
domain📜
Type: string
"dev.bigbang.mil"
Description: Domain used for BigBang created exposed services
global.imagePullSecrets[0].name📜
Type: string
"private-registry"
openshift📜
Type: bool
false
monitoring📜
Type: object
enabled: false
serviceMonitor:
scheme: ''
tlsConfig: {}
Description: Monitoring toggle, affects servicemonitor and networkPolicies
bbtests.enabled📜
Type: bool
false
bbtests.cypress.artifacts📜
Type: bool
true
bbtests.cypress.envs.cypress_url📜
Type: string
"http://headlamp.headlamp.svc.cluster.local:4466"
bbtests.cypress.resources.requests.cpu📜
Type: string
"1"
bbtests.cypress.resources.requests.memory📜
Type: string
"2Gi"
bbtests.cypress.resources.limits.cpu📜
Type: string
"1"
bbtests.cypress.resources.limits.memory📜
Type: string
"2Gi"
waitJob.enabled📜
Type: bool
true
waitJob.permissions.apiGroups[0]📜
Type: string
"apps"
waitJob.permissions.resources[0]📜
Type: string
"deployments"
waitJob.permissions.verbs[0]📜
Type: string
"get"
waitJob.permissions.verbs[1]📜
Type: string
"list"
waitJob.permissions.verbs[2]📜
Type: string
"watch"
bigbang.rbac.enabled📜
Type: bool
false
bigbang.rbac.clusterRoles[0].name📜
Type: string
"read-1"
bigbang.rbac.clusterRoles[0].create📜
Type: bool
true
bigbang.rbac.clusterRoles[0].rules[0].apiGroups[0]📜
Type: string
""
bigbang.rbac.clusterRoles[0].rules[0].resources[0]📜
Type: string
"namespaces"
bigbang.rbac.clusterRoles[0].rules[0].resources[1]📜
Type: string
"pods"
bigbang.rbac.clusterRoles[0].rules[0].resources[2]📜
Type: string
"nodes"
bigbang.rbac.clusterRoles[0].rules[0].verbs[0]📜
Type: string
"get"
bigbang.rbac.clusterRoles[0].rules[0].verbs[1]📜
Type: string
"list"
bigbang.rbac.clusterRoles[0].rules[0].verbs[2]📜
Type: string
"watch"
bigbang.rbac.clusterRoleBindings[0].name📜
Type: string
"read-1"
bigbang.rbac.clusterRoleBindings[0].roleRef📜
Type: string
"read-1"
bigbang.rbac.clusterRoleBindings[0].subjects[0].kind📜
Type: string
"ServiceAccount"
bigbang.rbac.clusterRoleBindings[0].subjects[0].name📜
Type: string
"dev-sa"
bigbang.rbac.clusterRoleBindings[0].subjects[0].namespace📜
Type: string
nil
upstream.image.registry📜
Type: string
"registry1.dso.mil"
upstream.image.repository📜
Type: string
"ironbank/opensource/headlamp-k8s/headlamp"
upstream.image.pullPolicy📜
Type: string
"Always"
upstream.image.tag📜
Type: string
"v0.39.0"
upstream.image.pullSecrets[0]📜
Type: string
"private-registry"
upstream.imagePullSecrets[0].name📜
Type: string
"private-registry"
upstream.nameOverride📜
Type: string
"headlamp"
upstream.config.baseURL📜
Type: string
""
upstream.config.oidc.clientID📜
Type: string
""
upstream.securityContext.capabilities.drop[0]📜
Type: string
"ALL"
upstream.service.port📜
Type: int
4466
upstream.clusterRoleBinding.create📜
Type: bool
true
Description: Specified whether a cluster role binding should be created
upstream.clusterRoleBinding.clusterRoleName📜
Type: string
"cluster-admin"
Description: Set name of the Cluster Role with limited permissions from you cluster for example - clusterRoleName: user-ro
upstream.clusterRoleBinding.annotations📜
Type: object
{}
Description: Annotations to add to the cluster role binding