sonarqube values.yaml📜
replicaCount📜
Type: int
1
sso.enabled📜
Type: bool
false
sso.name📜
Type: string
""
sso.applicationid📜
Type: string
""
sso.providerid📜
Type: string
""
sso.loginUrl📜
Type: string
""
sso.secured📜
Type: string
""
sso.serverBaseURL📜
Type: string
""
sso.idpmetadataurl📜
Type: string
""
sso.image📜
Type: string
""
sso.resources.limits.cpu📜
Type: string
"100m"
sso.resources.limits.memory📜
Type: string
"256Mi"
sso.resources.requests.cpu📜
Type: string
"100m"
sso.resources.requests.memory📜
Type: string
"256Mi"
sso.containerSecurityContext.enabled📜
Type: bool
true
sso.containerSecurityContext.fsGroup📜
Type: int
26
sso.containerSecurityContext.runAsUser📜
Type: int
26
sso.containerSecurityContext.runAsGroup📜
Type: int
26
sso.containerSecurityContext.capabilities.drop[0]📜
Type: string
"ALL"
curlContainerImage📜
Type: string
"registry1.dso.mil/ironbank/redhat/ubi/ubi9:9.7"
domain📜
Type: string
"dev.bigbang.mil"
istio.enabled📜
Type: bool
false
istio.hardened.enabled📜
Type: bool
false
istio.hardened.customAuthorizationPolicies📜
Type: list
[]
istio.hardened.outboundTrafficPolicyMode📜
Type: string
"REGISTRY_ONLY"
istio.hardened.customServiceEntries📜
Type: list
[]
istio.hardened.tempo.enabled📜
Type: bool
true
istio.hardened.tempo.namespaces[0]📜
Type: string
"tempo"
istio.hardened.tempo.principals[0]📜
Type: string
"cluster.local/ns/tempo/sa/tempo-tempo"
istio.hardened.monitoring.enabled📜
Type: bool
true
istio.hardened.monitoring.namespaces[0]📜
Type: string
"monitoring"
istio.hardened.monitoring.principals[0]📜
Type: string
"cluster.local/ns/monitoring/sa/monitoring-grafana"
istio.hardened.monitoring.principals[1]📜
Type: string
"cluster.local/ns/monitoring/sa/monitoring-monitoring-kube-alertmanager"
istio.hardened.monitoring.principals[2]📜
Type: string
"cluster.local/ns/monitoring/sa/monitoring-monitoring-kube-operator"
istio.hardened.monitoring.principals[3]📜
Type: string
"cluster.local/ns/monitoring/sa/monitoring-monitoring-kube-prometheus"
istio.hardened.monitoring.principals[4]📜
Type: string
"cluster.local/ns/monitoring/sa/monitoring-monitoring-kube-state-metrics"
istio.hardened.monitoring.principals[5]📜
Type: string
"cluster.local/ns/monitoring/sa/monitoring-monitoring-prometheus-node-exporter"
istio.mtls📜
Type: object
mode: STRICT
Description: Default argocd peer authentication
istio.mtls.mode📜
Type: string
"STRICT"
Description: STRICT = Allow only mutual TLS traffic, PERMISSIVE = Allow both plain text and mutual TLS traffic
istio.sonarqube.enabled📜
Type: bool
true
istio.sonarqube.annotations📜
Type: object
{}
istio.sonarqube.labels📜
Type: object
{}
istio.sonarqube.gateways[0]📜
Type: string
"istio-system/main"
istio.sonarqube.hosts[0]📜
Type: string
"sonarqube.{{ .Values.domain }}"
istio.injection📜
Type: string
"disabled"
monitoring.enabled📜
Type: bool
false
networkPolicies.enabled📜
Type: bool
false
networkPolicies.ingressLabels.app📜
Type: string
"istio-ingressgateway"
networkPolicies.ingressLabels.istio📜
Type: string
"ingressgateway"
networkPolicies.egressHttps.enabled📜
Type: bool
true
networkPolicies.additionalPolicies📜
Type: list
[]
bbtests.enabled📜
Type: bool
false
bbtests.cypress.artifacts📜
Type: bool
true
bbtests.cypress.envs.cypress_url📜
Type: string
"http://sonarqube-sonarqube:9000"
bbtests.cypress.envs.cypress_url_setup📜
Type: string
"http://sonarqube-sonarqube:9000/setup"
bbtests.cypress.envs.cypress_user📜
Type: string
"admin"
bbtests.cypress.envs.cypress_password📜
Type: string
"admin"
bbtests.cypress.envs.cypress_new_password📜
Type: string
"New_admin_password!2"
bbtests.cypress.envs.cypress_timeout📜
Type: string
"10000"