Skip to content

mimir values.yaml📜

minio-tenant📜

Type: object

Default value
address: minio.mimir.svc.cluster.local
enabled: false
tenant:
  buckets:
  - name: mimir
  configSecret:
    accessKey: minio
    name: mimir-objstore-creds
    secretKey: minio123
  defaultUserCredentials:
    password: supersecret
    username: mimir-user
  metrics:
    enabled: false
    memory: 128M
    port: 9000
  pools:
  - containerSecurityContext:
      capabilities:
        drop:
        - ALL
    labels:
      app: minio
      app.kubernetes.io/name: minio
    name: pool-0
    securityContext:
      fsGroup: 1001
      runAsGroup: 1001
      runAsUser: 1001
    servers: 4
    size: 750Mi
    volumesPerServer: 4
  users:
  - name: mimir-user-credentials
waitJob:
  enabled: false

Description: Configuration for the Big Bang MinIO tenant subchart. See repo https://repo1.dso.mil/big-bang/product/packages/minio for configuring values.yaml

minio-tenant.enabled📜

Type: bool

Default value
false

Description: Enable MinIO instance support, must have minio-operator installed

minio-tenant.tenant.configSecret📜

Type: object

Default value
accessKey: minio
name: mimir-objstore-creds
secretKey: minio123

Description: MinIO root credentials

minio-tenant.tenant.buckets📜

Type: list

Default value
- name: mimir

Description: Buckets to be provisioned to for tenant

minio-tenant.tenant.users📜

Type: list

Default value
- name: mimir-user-credentials

Description: Name of the Secret that will contain the defaultUserCredentials generated for Tenant User

minio-tenant.tenant.defaultUserCredentials📜

Type: object

Default value
password: supersecret
username: mimir-user

Description: User credentials to create as a secret for above user. Otherwise password is randomly generated. This auth is not required to be set or reclaimed for minio use with mimir

networkPolicies.enabled📜

Type: bool

Default value
true

Description: Toggle networkPolicies

networkPolicies.controlPlaneCidr📜

Type: string

Default value
"0.0.0.0/0"

Description: Control Plane CIDR, defaults to 0.0.0.0/0, use kubectl get endpoints -n default kubernetes to get the CIDR range needed for your cluster Must be an IP CIDR range (x.x.x.x/x - ideally with /32 for the specific IP of a single endpoint, broader range for multiple masters/endpoints) Used by package NetworkPolicies to allow Kube API access

networkPolicies.additionalPolicies📜

Type: list

Default value
[]

networkPolicies.egress📜

Type: object

Default value
{}

istio.enabled📜

Type: bool

Default value
false

Description: Toggle istio configuration

istio.hardened📜

Type: object

Default value
alloy:
  enabled: true
  namespaces:
  - monitoring
  principals:
  - cluster.local/ns/monitoring/sa/monitoring-alloy
customAuthorizationPolicies: []
customServiceEntries: []
enabled: false
grafana:
  enabled: true
  namespaces:
  - monitoring
  principals:
  - cluster.local/ns/monitoring/sa/monitoring-grafana
minio:
  enabled: true
minioOperator:
  enabled: true
  namespaces:
  - minio-operator
  principals:
  - cluster.local/ns/minio-operator/sa/minio-operator
outboundTrafficPolicyMode: REGISTRY_ONLY
prometheus:
  enabled: true
  namespaces:
  - monitoring
  principals:
  - cluster.local/ns/monitoring/sa/monitoring-monitoring-kube-prometheus

Description: Default peer authentication values

istio.mtls.mode📜

Type: string

Default value
"STRICT"

Description: STRICT = Allow only mutual TLS traffic, PERMISSIVE = Allow both plain text and mutual TLS traffic

bbtests.enabled📜

Type: bool

Default value
false

bbtests.cypress.enabled📜

Type: bool

Default value
true

bbtests.cypress.artifacts📜

Type: bool

Default value
true

bbtests.cypress.envs.cypress_grafana_url📜

Type: string

Default value
"http://monitoring-grafana.monitoring.svc.cluster.local"

bbtests.cypress.scripts.image📜

Type: string

Default value
"registry1.dso.mil/ironbank/big-bang/base:2.1.0"

bbtests.cypress.scripts.envs.MIMIR_URL📜

Type: string

Default value
"http://mimir-mimir-distributor.mimir.svc:8080"