2022-03-16 21:01:30 +00:00
## Argo CD configuration
2019-11-05 00:17:25 +00:00
## Ref: https://github.com/argoproj/argo-cd
##
2021-10-21 11:33:45 +00:00
# -- Provide a name in place of `argocd`
2019-11-05 00:17:25 +00:00
nameOverride : argocd
2021-10-21 11:33:45 +00:00
# -- String to fully override `"argo-cd.fullname"`
2019-11-21 04:40:15 +00:00
fullnameOverride : ""
2021-10-21 11:33:45 +00:00
# -- Override the Kubernetes version, which is used to evaluate certain manifests
2021-05-23 12:25:26 +00:00
kubeVersionOverride : ""
2019-11-21 04:40:15 +00:00
2022-08-25 08:42:43 +00:00
## Custom resource configuration
crds :
# -- Install and upgrade CRDs
install : true
# -- Keep CRDs on chart uninstall
keep : true
# -- Annotations to be added to all CRDs
annotations : {}
2019-11-05 00:17:25 +00:00
global :
2019-02-13 22:22:11 +00:00
image :
2022-03-16 21:01:30 +00:00
# -- If defined, a repository applied to all Argo CD deployments
2021-04-24 10:50:25 +00:00
repository : quay.io/argoproj/argocd
2022-03-16 21:01:30 +00:00
# -- Overrides the global Argo CD image tag whose default is the chart appVersion
2021-10-21 20:55:34 +00:00
tag : ""
2022-03-16 21:01:30 +00:00
# -- If defined, a imagePullPolicy applied to all Argo CD deployments
2019-11-05 00:17:25 +00:00
imagePullPolicy : IfNotPresent
2022-08-25 10:41:43 +00:00
logging :
# -- Set the global logging format. Either: `text` or `json`
format : text
# -- Set the global logging level. One of: `debug`, `info`, `warn` or `error`
level : info
2021-10-21 11:33:45 +00:00
# -- Annotations for the all deployed pods
2021-08-24 12:48:03 +00:00
podAnnotations : {}
2021-10-21 11:33:45 +00:00
# -- Labels for the all deployed pods
2021-08-24 12:48:03 +00:00
podLabels : {}
2021-10-21 11:33:45 +00:00
# -- Toggle and define securityContext. See [values.yaml]
2019-12-16 02:55:09 +00:00
securityContext : {}
# runAsUser: 999
# runAsGroup: 999
# fsGroup: 999
2021-10-21 11:33:45 +00:00
# -- If defined, uses a Secret to pull an image from a private Docker registry or repository
2020-03-06 10:26:18 +00:00
imagePullSecrets : [ ]
2021-10-21 11:33:45 +00:00
# -- Mapping between IP and hostnames that will be injected as entries in the pod's hosts files
2020-03-27 13:49:47 +00:00
hostAliases : [ ]
# - ip: 10.20.30.40
# hostnames:
# - git.myhostname
2019-11-05 00:17:25 +00:00
2021-12-03 22:19:29 +00:00
# -- Additional labels to add to all resources
additionalLabels : {}
# app: argo-cd
2021-07-13 06:35:25 +00:00
networkPolicy :
2021-10-21 11:33:45 +00:00
# -- Create NetworkPolicy objects for all components
2021-07-13 06:35:25 +00:00
create : false
2021-10-21 11:33:45 +00:00
# -- Default deny all ingress traffic
2021-07-13 06:35:25 +00:00
defaultDenyIngress : false
2021-07-09 12:34:09 +00:00
# Override APIVersions
# If you want to template helm charts but cannot access k8s API server
# you can set api versions here
apiVersionOverrides :
2021-10-21 11:33:45 +00:00
# -- String to override apiVersion of certmanager resources rendered by this helm chart
2021-07-09 12:34:09 +00:00
certmanager : "" # cert-manager.io/v1
2021-10-21 11:33:45 +00:00
# -- String to override apiVersion of ingresses rendered by this helm chart
2021-07-09 12:34:09 +00:00
ingress : "" # networking.k8s.io/v1beta1
2022-07-14 13:02:52 +00:00
# -- String to override apiVersion of autoscaling rendered by this helm chart
autoscaling : "" # autoscaling/v2
2021-07-09 12:34:09 +00:00
2021-10-21 11:33:45 +00:00
# -- Create clusterroles that extend existing clusterroles to interact with argo-cd crds
2021-08-13 20:15:02 +00:00
## Ref: https://kubernetes.io/docs/reference/access-authn-authz/rbac/#aggregated-clusterroles
createAggregateRoles : false
2022-01-20 10:51:57 +00:00
# -- Array of extra K8s manifests to deploy
extraObjects : [ ]
# - apiVersion: secrets-store.csi.x-k8s.io/v1
# kind: SecretProviderClass
# metadata:
# name: argocd-secrets-store
# spec:
# provider: aws
# parameters:
# objects: |
# - objectName: "argocd"
# objectType: "secretsmanager"
# jmesPath:
# - path: "client_id"
# objectAlias: "client_id"
# - path: "client_secret"
# objectAlias: "client_secret"
# secretObjects:
# - data:
# - key: client_id
# objectName: client_id
# - key: client_secret
# objectName: client_secret
# secretName: argocd-secrets-store
# type: Opaque
# labels:
# app.kubernetes.io/part-of: argocd
2019-11-05 00:17:25 +00:00
## Controller
controller :
2021-10-21 11:33:45 +00:00
# -- Application controller name string
2019-11-05 00:17:25 +00:00
name : application-controller
2019-11-21 04:40:15 +00:00
image :
2021-10-21 11:33:45 +00:00
# -- Repository to use for the application controller
# @default -- `""` (defaults to global.image.repository)
repository : ""
# -- Tag to use for the application controller
# @default -- `""` (defaults to global.image.tag)
tag : ""
# -- Image pull policy for the application controller
# @default -- `""` (defaults to global.image.imagePullPolicy)
imagePullPolicy : ""
# -- The number of application controller pods to run.
2022-08-25 11:35:17 +00:00
# Additional replicas will cause sharding of managed clusters across number of replicas.
2020-11-24 01:29:19 +00:00
replicas : 1
2021-10-21 11:33:45 +00:00
## Application controller commandline flags
2019-11-05 00:17:25 +00:00
args :
2021-10-21 11:33:45 +00:00
# -- define the application controller `--status-processors`
2019-11-05 00:17:25 +00:00
statusProcessors : "20"
2021-10-21 11:33:45 +00:00
# -- define the application controller `--operation-processors`
2019-11-05 00:17:25 +00:00
operationProcessors : "10"
2022-08-26 16:15:34 +00:00
# -- define the application controller `--app-hard-resync`
appHardResyncPeriod : "0"
2021-10-21 11:33:45 +00:00
# -- define the application controller `--app-resync`
2020-07-12 16:49:45 +00:00
appResyncPeriod : "180"
2021-10-21 11:33:45 +00:00
# -- define the application controller `--self-heal-timeout-seconds`
2021-03-09 18:03:26 +00:00
selfHealTimeout : "5"
2021-10-21 11:33:45 +00:00
# -- define the application controller `--repo-server-timeout-seconds`
2021-08-26 13:42:47 +00:00
repoServerTimeoutSeconds : "60"
2019-11-05 00:17:25 +00:00
2021-10-21 11:33:45 +00:00
# -- Application controller log format. Either `text` or `json`
2022-08-25 10:41:43 +00:00
# @default -- `""` (defaults to global.logging.format)
logFormat : ""
# -- Application controller log level. One of: `debug`, `info`, `warn` or `error`
# @default -- `""` (defaults to global.logging.level)
logLevel : ""
2019-11-05 00:17:25 +00:00
2021-10-21 11:33:45 +00:00
# -- Additional command line arguments to pass to application controller
2020-03-25 16:54:54 +00:00
extraArgs : [ ]
2019-11-05 00:17:25 +00:00
2021-10-21 11:33:45 +00:00
# -- Environment variables to pass to application controller
2022-08-25 11:35:17 +00:00
env : [ ]
2019-12-05 23:50:47 +00:00
2021-10-21 11:33:45 +00:00
# -- envFrom to pass to application controller
# @default -- `[]` (See [values.yaml])
2021-05-21 16:43:24 +00:00
envFrom : [ ]
# - configMapRef:
# name: config-map-name
# - secretRef:
# name: secret-name
2021-10-21 11:33:45 +00:00
# -- Annotations to be added to application controller pods
2019-11-05 00:17:25 +00:00
podAnnotations : {}
2021-10-21 11:33:45 +00:00
# -- Labels to be added to application controller pods
2019-11-05 00:17:25 +00:00
podLabels : {}
2021-10-21 11:33:45 +00:00
# -- Application controller container-level security context
2020-12-15 06:15:13 +00:00
containerSecurityContext :
{}
2020-01-13 05:18:35 +00:00
# capabilities:
# drop:
# - all
2021-03-10 10:16:21 +00:00
# readOnlyRootFilesystem: true
2021-08-26 13:42:47 +00:00
# runAsNonRoot: true
2020-01-13 05:18:35 +00:00
2021-10-21 11:33:45 +00:00
# -- Application controller listening port
2019-11-05 00:17:25 +00:00
containerPort : 8082
## Readiness and liveness probes for default backend
## Ref: https://kubernetes.io/docs/tasks/configure-pod-container/configure-liveness-readiness-probes/
##
readinessProbe :
2021-10-21 11:33:45 +00:00
# -- Minimum consecutive failures for the [probe] to be considered failed after having succeeded
2019-11-05 00:17:25 +00:00
failureThreshold : 3
2021-10-21 11:33:45 +00:00
# -- Number of seconds after the container has started before [probe] is initiated
2019-11-05 00:17:25 +00:00
initialDelaySeconds : 10
2021-10-21 11:33:45 +00:00
# -- How often (in seconds) to perform the [probe]
2019-11-05 00:17:25 +00:00
periodSeconds : 10
2021-10-21 11:33:45 +00:00
# -- Minimum consecutive successes for the [probe] to be considered successful after having failed
2019-11-05 00:17:25 +00:00
successThreshold : 1
2021-10-21 11:33:45 +00:00
# -- Number of seconds after which the [probe] times out
2019-11-05 00:17:25 +00:00
timeoutSeconds : 1
livenessProbe :
2021-10-21 11:33:45 +00:00
# -- Minimum consecutive failures for the [probe] to be considered failed after having succeeded
2019-11-05 00:17:25 +00:00
failureThreshold : 3
2021-10-21 11:33:45 +00:00
# -- Number of seconds after the container has started before [probe] is initiated
2019-11-05 00:17:25 +00:00
initialDelaySeconds : 10
2021-10-21 11:33:45 +00:00
# -- How often (in seconds) to perform the [probe]
2019-11-05 00:17:25 +00:00
periodSeconds : 10
2021-10-21 11:33:45 +00:00
# -- Minimum consecutive successes for the [probe] to be considered successful after having failed
2019-11-05 00:17:25 +00:00
successThreshold : 1
2021-10-21 11:33:45 +00:00
# -- Number of seconds after which the [probe] times out
2019-11-05 00:17:25 +00:00
timeoutSeconds : 1
2021-10-21 11:33:45 +00:00
# -- Additional volumeMounts to the application controller main container
2019-04-30 14:55:14 +00:00
volumeMounts : [ ]
2019-11-05 00:17:25 +00:00
2021-10-21 11:33:45 +00:00
# -- Additional volumes to the application controller pod
2019-04-30 14:55:14 +00:00
volumes : [ ]
2019-11-05 00:17:25 +00:00
## Controller service configuration
service :
2021-10-21 11:33:45 +00:00
# -- Application controller service annotations
2019-11-05 00:17:25 +00:00
annotations : {}
2021-10-21 11:33:45 +00:00
# -- Application controller service labels
2019-11-05 00:17:25 +00:00
labels : {}
2021-10-21 11:33:45 +00:00
# -- Application controller service port
2019-11-05 00:17:25 +00:00
port : 8082
2021-10-21 11:33:45 +00:00
# -- Application controller service port name
2020-02-16 23:17:37 +00:00
portName : https-controller
2019-11-05 00:17:25 +00:00
2021-10-21 11:33:45 +00:00
# -- [Node selector]
2019-11-05 00:17:25 +00:00
nodeSelector : {}
2021-10-21 11:33:45 +00:00
# -- [Tolerations] for use with node taints
2019-11-07 10:06:22 +00:00
tolerations : [ ]
2021-10-21 11:33:45 +00:00
# -- Assign custom [affinity] rules to the deployment
2019-11-05 00:17:25 +00:00
affinity : {}
2021-10-21 11:33:45 +00:00
# -- Assign custom [TopologySpreadConstraints] rules to the application controller
## Ref: https://kubernetes.io/docs/concepts/workloads/pods/pod-topology-spread-constraints/
## If labelSelector is left out, it will default to the labelSelector configuration of the deployment
2021-09-17 13:57:26 +00:00
topologySpreadConstraints : [ ]
# - maxSkew: 1
# topologyKey: topology.kubernetes.io/zone
# whenUnsatisfiable: DoNotSchedule
2021-10-21 11:33:45 +00:00
# -- Priority class for the application controller pods
2019-11-05 00:17:25 +00:00
priorityClassName : ""
2021-10-21 11:33:45 +00:00
# -- Resource limits and requests for the application controller pods
2019-11-05 00:17:25 +00:00
resources : {}
# limits:
# cpu: 500m
# memory: 512Mi
# requests:
# cpu: 250m
# memory: 256Mi
serviceAccount :
2021-10-21 11:33:45 +00:00
# -- Create a service account for the application controller
2019-11-05 00:17:25 +00:00
create : true
2021-10-21 11:33:45 +00:00
# -- Service account name
2019-11-05 00:17:25 +00:00
name : argocd-application-controller
2021-10-21 11:33:45 +00:00
# -- Annotations applied to created service account
2020-06-24 13:48:41 +00:00
annotations : {}
2021-10-21 11:33:45 +00:00
# -- Automount API credentials for the Service Account
2021-03-18 22:04:52 +00:00
automountServiceAccountToken : true
2019-11-05 00:17:25 +00:00
2021-10-21 11:33:45 +00:00
## Application controller metrics configuration
2019-11-05 00:17:25 +00:00
metrics :
2021-10-21 11:33:45 +00:00
# -- Deploy metrics service
2019-11-05 00:17:25 +00:00
enabled : false
2021-11-24 16:30:09 +00:00
applicationLabels :
# -- Enables additional labels in argocd_app_labels metric
enabled : false
# -- Additional labels
2022-03-12 18:59:04 +00:00
labels : [ ]
2019-11-05 00:17:25 +00:00
service :
2021-10-21 11:33:45 +00:00
# -- Metrics service annotations
2019-11-05 00:17:25 +00:00
annotations : {}
2021-10-21 11:33:45 +00:00
# -- Metrics service labels
2019-11-05 00:17:25 +00:00
labels : {}
2021-10-21 11:33:45 +00:00
# -- Metrics service port
2019-11-05 00:17:25 +00:00
servicePort : 8082
2022-05-10 07:40:49 +00:00
# -- Metrics service port name
portName : http-metrics
2019-11-05 00:17:25 +00:00
serviceMonitor :
2021-10-21 11:33:45 +00:00
# -- Enable a prometheus ServiceMonitor
2019-11-05 00:17:25 +00:00
enabled : false
2021-10-21 11:33:45 +00:00
# -- Prometheus ServiceMonitor interval
2021-05-21 12:43:10 +00:00
interval : 30s
2021-10-21 11:33:45 +00:00
# -- Prometheus [RelabelConfigs] to apply to samples before scraping
2021-08-25 15:04:29 +00:00
relabelings : [ ]
2021-10-21 11:33:45 +00:00
# -- Prometheus [MetricRelabelConfigs] to apply to samples before ingestion
2021-08-25 15:04:29 +00:00
metricRelabelings : [ ]
2021-10-21 11:33:45 +00:00
# -- Prometheus ServiceMonitor selector
selector : {}
# prometheus: kube-prometheus
2022-05-10 07:40:49 +00:00
# -- Prometheus ServiceMonitor scheme
scheme : ""
# -- Prometheus ServiceMonitor tlsConfig
tlsConfig : {}
2021-10-21 11:33:45 +00:00
# -- Prometheus ServiceMonitor namespace
namespace : "" # "monitoring"
# -- Prometheus ServiceMonitor labels
additionalLabels : {}
2019-12-09 03:34:52 +00:00
rules :
2021-10-21 11:33:45 +00:00
# -- Deploy a PrometheusRule for the application controller
2019-12-09 03:34:52 +00:00
enabled : false
2021-10-21 11:33:45 +00:00
# -- PrometheusRule.Spec for the application controller
2019-12-09 03:34:52 +00:00
spec : [ ]
# - alert: ArgoAppMissing
# expr: |
# absent(argocd_app_info)
# for: 15m
# labels:
# severity: critical
# annotations:
2022-03-16 21:01:30 +00:00
# summary: "[Argo CD] No reported applications"
2019-12-09 03:34:52 +00:00
# description: >
2022-03-16 21:01:30 +00:00
# Argo CD has not reported any applications data for the past 15 minutes which
2019-12-09 03:34:52 +00:00
# means that it must be down or not functioning properly. This needs to be
# resolved for this cloud to continue to maintain state.
# - alert: ArgoAppNotSynced
# expr: |
2021-01-26 23:40:18 +00:00
# argocd_app_info{sync_status!="Synced"} == 1
2019-12-09 03:34:52 +00:00
# for: 12h
# labels:
# severity: warning
# annotations:
# summary: "[{{`{{$labels.name}}`}}] Application not synchronized"
# description: >
# The application [{{`{{$labels.name}}`}} has not been synchronized for over
# 12 hours which means that the state of this cloud has drifted away from the
# state inside Git.
# selector:
# prometheus: kube-prometheus
# namespace: monitoring
# additionalLabels: {}
2019-11-05 00:17:25 +00:00
2022-03-16 21:01:30 +00:00
## Enable if you would like to grant rights to Argo CD to deploy to the local Kubernetes cluster.
2019-11-05 00:17:25 +00:00
clusterAdminAccess :
2021-10-21 11:33:45 +00:00
# -- Enable RBAC for local cluster deployments
2019-11-05 00:17:25 +00:00
enabled : true
2021-10-21 11:33:45 +00:00
2021-05-13 05:36:13 +00:00
## Enable this and set the rules: to whatever custom rules you want for the Cluster Role resource.
## Defaults to off
clusterRoleRules :
2021-10-21 11:33:45 +00:00
# -- Enable custom rules for the application controller's ClusterRole resource
2021-05-13 05:36:13 +00:00
enabled : false
2021-10-21 11:33:45 +00:00
# -- List of custom rules for the application controller's ClusterRole resource
2021-05-13 05:36:13 +00:00
rules : [ ]
2021-10-21 11:33:45 +00:00
# -- Additional containers to be added to the application controller pod
2021-09-16 17:59:20 +00:00
extraContainers : [ ]
2019-11-05 00:17:25 +00:00
2021-11-29 10:50:39 +00:00
# -- Init containers to add to the application controller pod
## If your target Kubernetes cluster(s) require a custom auth provider executable
## you could use this (and the same in the server pod) to bootstrap
2022-03-16 21:01:30 +00:00
## that executable into your Argo CD container
2021-11-29 10:50:39 +00:00
initContainers : [ ]
# - name: download-tools
# image: alpine:3.8
# command: [sh, -c]
# args:
# - wget -qO- https://get.helm.sh/helm-v2.16.1-linux-amd64.tar.gz | tar -xvzf - &&
# mv linux-amd64/helm /custom-tools/
# volumeMounts:
# - mountPath: /custom-tools
# name: custom-tools
# volumeMounts:
# - mountPath: /usr/local/bin/helm
# name: custom-tools
# subPath: helm
2022-01-31 15:36:49 +00:00
pdb :
# -- Labels to be added to application controller pdb
labels : {}
# -- Annotations to be added to application controller pdb
annotations : {}
# -- Deploy a Poddisruptionbudget for the application controller
enabled : false
# minAvailable: 1
# maxUnavailable: 0
2022-06-02 12:26:08 +00:00
# -- Secrets with credentials to pull images from a private registry
imagePullSecrets : [ ]
2019-11-05 00:17:25 +00:00
## Dex
dex :
2021-10-21 11:33:45 +00:00
# -- Enable dex
2019-11-05 00:17:25 +00:00
enabled : true
2021-10-21 11:33:45 +00:00
# -- Dex name
2019-11-05 00:17:25 +00:00
name : dex-server
2022-02-23 11:02:22 +00:00
# -- Additional command line arguments to pass to the Dex server
extraArgs : [ ]
2020-09-22 01:50:19 +00:00
metrics :
2021-10-21 11:33:45 +00:00
# -- Deploy metrics service
2020-09-22 01:50:19 +00:00
enabled : false
service :
2021-10-21 11:33:45 +00:00
# -- Metrics service annotations
2020-09-22 01:50:19 +00:00
annotations : {}
2021-10-21 11:33:45 +00:00
# -- Metrics service labels
2020-09-22 01:50:19 +00:00
labels : {}
2022-05-10 07:40:49 +00:00
# -- Metrics service port name
portName : http-metrics
2020-09-22 01:50:19 +00:00
serviceMonitor :
2021-10-21 11:33:45 +00:00
# -- Enable a prometheus ServiceMonitor
2020-09-22 01:50:19 +00:00
enabled : false
2021-10-21 11:33:45 +00:00
# -- Prometheus ServiceMonitor interval
2021-05-21 12:43:10 +00:00
interval : 30s
2021-10-21 11:33:45 +00:00
# -- Prometheus [RelabelConfigs] to apply to samples before scraping
2021-08-25 15:04:29 +00:00
relabelings : [ ]
2021-10-21 11:33:45 +00:00
# -- Prometheus [MetricRelabelConfigs] to apply to samples before ingestion
2021-08-25 15:04:29 +00:00
metricRelabelings : [ ]
2021-10-21 11:33:45 +00:00
# -- Prometheus ServiceMonitor selector
selector : {}
# prometheus: kube-prometheus
2022-05-10 07:40:49 +00:00
# -- Prometheus ServiceMonitor scheme
scheme : ""
# -- Prometheus ServiceMonitor tlsConfig
tlsConfig : {}
2021-10-21 11:33:45 +00:00
# -- Prometheus ServiceMonitor namespace
namespace : "" # "monitoring"
# -- Prometheus ServiceMonitor labels
additionalLabels : {}
2020-09-22 01:50:19 +00:00
2019-02-13 22:22:11 +00:00
image :
2021-10-21 11:33:45 +00:00
# -- Dex image repository
2021-05-29 14:37:17 +00:00
repository : ghcr.io/dexidp/dex
2021-10-21 11:33:45 +00:00
# -- Dex image tag
2022-09-19 12:56:52 +00:00
tag : v2.32.0
2021-10-21 11:33:45 +00:00
# -- Dex imagePullPolicy
2022-05-05 21:59:18 +00:00
# @default -- `""` (defaults to global.image.imagePullPolicy)
imagePullPolicy : ""
2019-11-21 04:40:15 +00:00
initImage :
2021-10-21 11:33:45 +00:00
# -- Argo CD init image repository
# @default -- `""` (defaults to global.image.repository)
repository : ""
# -- Argo CD init image tag
# @default -- `""` (defaults to global.image.tag)
tag : ""
# -- Argo CD init image imagePullPolicy
# @default -- `""` (defaults to global.image.imagePullPolicy)
imagePullPolicy : ""
# -- Environment variables to pass to the Dex server
2019-12-05 23:50:47 +00:00
env : [ ]
2021-10-21 11:33:45 +00:00
# -- envFrom to pass to the Dex server
# @default -- `[]` (See [values.yaml])
2021-05-21 16:43:24 +00:00
envFrom : [ ]
# - configMapRef:
# name: config-map-name
# - secretRef:
# name: secret-name
2021-10-21 11:33:45 +00:00
# -- Annotations to be added to the Dex server pods
2020-03-09 10:39:21 +00:00
podAnnotations : {}
2021-10-21 11:33:45 +00:00
# -- Labels to be added to the Dex server pods
2020-03-09 10:39:21 +00:00
podLabels : {}
2021-08-24 12:37:34 +00:00
## Probes for Dex server
## Supported from Dex >= 2.28.0
livenessProbe :
2021-10-21 11:33:45 +00:00
# -- Enable Kubernetes liveness probe for Dex >= 2.28.0
2021-08-24 12:37:34 +00:00
enabled : false
2021-10-21 11:33:45 +00:00
# -- Minimum consecutive failures for the [probe] to be considered failed after having succeeded
2021-08-24 12:37:34 +00:00
failureThreshold : 3
2021-10-21 11:33:45 +00:00
# -- Number of seconds after the container has started before [probe] is initiated
2021-08-24 12:37:34 +00:00
initialDelaySeconds : 10
2021-10-21 11:33:45 +00:00
# -- How often (in seconds) to perform the [probe]
2021-08-24 12:37:34 +00:00
periodSeconds : 10
2021-10-21 11:33:45 +00:00
# -- Minimum consecutive successes for the [probe] to be considered successful after having failed
2021-08-24 12:37:34 +00:00
successThreshold : 1
2021-10-21 11:33:45 +00:00
# -- Number of seconds after which the [probe] times out
2021-08-24 12:37:34 +00:00
timeoutSeconds : 1
readinessProbe :
2021-10-21 11:33:45 +00:00
# -- Enable Kubernetes readiness probe for Dex >= 2.28.0
2021-08-24 12:37:34 +00:00
enabled : false
2021-10-21 11:33:45 +00:00
# -- Minimum consecutive failures for the [probe] to be considered failed after having succeeded
2021-08-24 12:37:34 +00:00
failureThreshold : 3
2021-10-21 11:33:45 +00:00
# -- Number of seconds after the container has started before [probe] is initiated
2021-08-24 12:37:34 +00:00
initialDelaySeconds : 10
2021-10-21 11:33:45 +00:00
# -- How often (in seconds) to perform the [probe]
2021-08-24 12:37:34 +00:00
periodSeconds : 10
2021-10-21 11:33:45 +00:00
# -- Minimum consecutive successes for the [probe] to be considered successful after having failed
2021-08-24 12:37:34 +00:00
successThreshold : 1
2021-10-21 11:33:45 +00:00
# -- Number of seconds after which the [probe] times out
2021-08-24 12:37:34 +00:00
timeoutSeconds : 1
2019-11-05 00:17:25 +00:00
serviceAccount :
2021-10-21 11:33:45 +00:00
# -- Create dex service account
2019-11-05 00:17:25 +00:00
create : true
2021-10-21 11:33:45 +00:00
# -- Dex service account name
2019-11-05 00:17:25 +00:00
name : argocd-dex-server
2021-10-21 11:33:45 +00:00
# -- Annotations applied to created service account
2021-02-16 23:21:58 +00:00
annotations : {}
2021-10-21 11:33:45 +00:00
# -- Automount API credentials for the Service Account
2021-03-18 22:04:52 +00:00
automountServiceAccountToken : true
2019-11-05 00:17:25 +00:00
2021-10-21 11:33:45 +00:00
# -- Additional volumeMounts to the dex main container
2019-11-05 00:17:25 +00:00
volumeMounts :
- name : static-files
mountPath : /shared
2021-10-21 11:33:45 +00:00
# -- Additional volumes to the dex pod
2019-11-05 00:17:25 +00:00
volumes :
- name : static-files
emptyDir : {}
2021-10-21 11:33:45 +00:00
# -- Extra volumes to the dex pod
2021-10-12 18:49:14 +00:00
extraVolumes : [ ]
2021-10-21 11:33:45 +00:00
# -- Extra volumeMounts to the dex pod
2021-10-12 18:49:14 +00:00
extraVolumeMounts : [ ]
2021-10-21 11:33:45 +00:00
# -- Container port for HTTP access
2019-02-13 22:22:11 +00:00
containerPortHttp : 5556
2021-10-21 11:33:45 +00:00
# -- Service port for HTTP access
2019-02-13 22:22:11 +00:00
servicePortHttp : 5556
2021-10-21 11:33:45 +00:00
# -- Service port name for HTTP access
2021-08-23 17:23:07 +00:00
servicePortHttpName : http
2021-10-21 11:33:45 +00:00
# -- Container port for gRPC access
2019-11-05 00:17:25 +00:00
containerPortGrpc : 5557
2021-10-21 11:33:45 +00:00
# -- Service port for gRPC access
2019-02-13 22:22:11 +00:00
servicePortGrpc : 5557
2021-10-21 11:33:45 +00:00
# -- Service port name for gRPC access
2021-08-23 17:23:07 +00:00
servicePortGrpcName : grpc
2021-10-21 11:33:45 +00:00
# -- Container port for metrics access
2020-09-22 01:50:19 +00:00
containerPortMetrics : 5558
2021-10-21 11:33:45 +00:00
# -- Service port for metrics access
2020-09-22 01:50:19 +00:00
servicePortMetrics : 5558
2019-02-13 22:22:11 +00:00
2021-10-21 11:33:45 +00:00
# -- [Node selector]
2019-11-05 00:17:25 +00:00
nodeSelector : {}
2021-10-21 11:33:45 +00:00
# -- [Tolerations] for use with node taints
2019-11-07 10:06:22 +00:00
tolerations : [ ]
2021-10-21 11:33:45 +00:00
# -- Assign custom [affinity] rules to the deployment
2019-11-05 00:17:25 +00:00
affinity : {}
2019-09-19 23:02:21 +00:00
2021-10-21 11:33:45 +00:00
# -- Assign custom [TopologySpreadConstraints] rules to dex
## Ref: https://kubernetes.io/docs/concepts/workloads/pods/pod-topology-spread-constraints/
## If labelSelector is left out, it will default to the labelSelector configuration of the deployment
2021-09-17 13:57:26 +00:00
topologySpreadConstraints : [ ]
# - maxSkew: 1
# topologyKey: topology.kubernetes.io/zone
# whenUnsatisfiable: DoNotSchedule
2021-10-21 11:33:45 +00:00
# -- Priority class for dex
2019-11-05 00:17:25 +00:00
priorityClassName : ""
2019-09-19 23:02:21 +00:00
2021-10-21 11:33:45 +00:00
# -- Dex container-level security context
2020-12-15 06:15:13 +00:00
containerSecurityContext :
{}
2020-01-13 05:18:35 +00:00
# capabilities:
# drop:
# - all
2021-03-10 10:16:21 +00:00
# readOnlyRootFilesystem: true
2020-01-13 05:18:35 +00:00
2021-10-21 11:33:45 +00:00
# -- Resource limits and requests for dex
2019-11-05 00:17:25 +00:00
resources : {}
# limits:
# cpu: 50m
# memory: 64Mi
# requests:
# cpu: 10m
# memory: 32Mi
2019-04-09 17:49:15 +00:00
2021-10-21 11:33:45 +00:00
# -- Additional containers to be added to the dex pod
2021-09-16 17:59:20 +00:00
extraContainers : [ ]
2021-11-29 10:50:39 +00:00
# -- Init containers to add to the dex pod
initContainers : [ ]
# - name: download-tools
# image: alpine:3.8
# command: [sh, -c]
# args:
# - wget -qO- https://get.helm.sh/helm-v2.16.1-linux-amd64.tar.gz | tar -xvzf - &&
# mv linux-amd64/helm /custom-tools/
# volumeMounts:
# - mountPath: /custom-tools
# name: custom-tools
# volumeMounts:
# - mountPath: /usr/local/bin/helm
# name: custom-tools
# subPath: helm
2022-01-31 15:36:49 +00:00
pdb :
# -- Labels to be added to Dex server pdb
labels : {}
# -- Annotations to be added to Dex server pdb
annotations : {}
# -- Deploy a Poddisruptionbudget for the Dex server
enabled : false
# minAvailable: 1
# maxUnavailable: 0
2022-06-02 12:26:08 +00:00
# -- Secrets with credentials to pull images from a private registry
imagePullSecrets : [ ]
2019-11-05 00:17:25 +00:00
## Redis
2019-04-09 17:49:15 +00:00
redis :
2021-10-21 11:33:45 +00:00
# -- Enable redis
2019-11-14 03:01:01 +00:00
enabled : true
2021-10-21 11:33:45 +00:00
# -- Redis name
2019-11-05 00:17:25 +00:00
name : redis
2019-04-09 17:49:15 +00:00
image :
2021-10-21 11:33:45 +00:00
# -- Redis repository
2022-07-29 14:40:11 +00:00
repository : public.ecr.aws/docker/library/redis
2021-10-21 11:33:45 +00:00
# -- Redis tag
2022-07-31 12:19:47 +00:00
tag : 7.0 .4 -alpine
2021-10-21 11:33:45 +00:00
# -- Redis imagePullPolicy
2019-11-05 00:17:25 +00:00
imagePullPolicy : IfNotPresent
2021-10-21 11:33:45 +00:00
# -- Additional command line arguments to pass to redis-server
2021-04-24 10:50:25 +00:00
extraArgs : [ ]
# - --bind
# - "0.0.0.0"
2021-10-21 11:33:45 +00:00
# -- Redis container port
2019-04-09 17:49:15 +00:00
containerPort : 6379
2021-10-21 11:33:45 +00:00
# -- Redis service port
2019-04-09 18:01:45 +00:00
servicePort : 6379
2019-11-05 00:17:25 +00:00
2021-10-21 11:33:45 +00:00
# -- Environment variables to pass to the Redis server
2019-12-05 23:50:47 +00:00
env : [ ]
2021-10-21 11:33:45 +00:00
# -- envFrom to pass to the Redis server
# @default -- `[]` (See [values.yaml])
2021-05-21 16:43:24 +00:00
envFrom : [ ]
# - configMapRef:
# name: config-map-name
# - secretRef:
# name: secret-name
2021-10-21 11:33:45 +00:00
# -- Annotations to be added to the Redis server pods
2020-03-09 10:39:21 +00:00
podAnnotations : {}
2021-10-21 11:33:45 +00:00
# -- Labels to be added to the Redis server pods
2020-03-09 10:39:21 +00:00
podLabels : {}
2021-10-21 11:33:45 +00:00
# -- [Node selector]
2019-11-05 00:17:25 +00:00
nodeSelector : {}
2021-10-21 11:33:45 +00:00
# -- [Tolerations] for use with node taints
2019-11-07 10:06:22 +00:00
tolerations : [ ]
2021-10-21 11:33:45 +00:00
# -- Assign custom [affinity] rules to the deployment
2019-11-05 00:17:25 +00:00
affinity : {}
2021-10-21 11:33:45 +00:00
# -- Assign custom [TopologySpreadConstraints] rules to redis
## Ref: https://kubernetes.io/docs/concepts/workloads/pods/pod-topology-spread-constraints/
## If labelSelector is left out, it will default to the labelSelector configuration of the deployment
2021-09-17 13:57:26 +00:00
topologySpreadConstraints : [ ]
# - maxSkew: 1
# topologyKey: topology.kubernetes.io/zone
# whenUnsatisfiable: DoNotSchedule
2021-10-21 11:33:45 +00:00
# -- Priority class for redis
2019-11-05 00:17:25 +00:00
priorityClassName : ""
2021-10-21 11:33:45 +00:00
# -- Redis container-level security context
2020-12-15 06:15:13 +00:00
containerSecurityContext :
{}
2020-01-13 05:18:35 +00:00
# capabilities:
# drop:
# - all
2021-03-10 10:16:21 +00:00
# readOnlyRootFilesystem: true
2020-01-13 05:18:35 +00:00
2021-10-21 11:33:45 +00:00
# -- Redis pod-level security context
2020-07-15 17:18:47 +00:00
securityContext :
runAsNonRoot : true
2021-08-26 13:42:47 +00:00
runAsUser : 999
2020-01-13 05:18:35 +00:00
2021-07-12 11:06:50 +00:00
serviceAccount :
2021-10-21 11:33:45 +00:00
# -- Create a service account for the redis pod
2021-07-12 11:06:50 +00:00
create : false
2021-10-21 11:33:45 +00:00
# -- Service account name for redis pod
2021-07-12 11:06:50 +00:00
name : ""
2021-10-21 11:33:45 +00:00
# -- Annotations applied to created service account
2021-07-12 11:06:50 +00:00
annotations : {}
2021-10-21 11:33:45 +00:00
# -- Automount API credentials for the Service Account
2021-07-12 11:06:50 +00:00
automountServiceAccountToken : false
2021-10-21 11:33:45 +00:00
# -- Resource limits and requests for redis
2019-11-05 00:17:25 +00:00
resources : {}
# limits:
# cpu: 200m
# memory: 128Mi
# requests:
# cpu: 100m
# memory: 64Mi
2021-10-21 11:33:45 +00:00
# -- Additional volumeMounts to the redis container
2019-11-21 04:40:15 +00:00
volumeMounts : [ ]
2021-10-21 11:33:45 +00:00
# -- Additional volumes to the redis pod
2019-11-21 04:40:15 +00:00
volumes : [ ]
2021-10-21 11:33:45 +00:00
# -- Additional containers to be added to the redis pod
2021-09-16 17:59:20 +00:00
extraContainers : [ ]
2021-11-29 10:50:39 +00:00
# -- Init containers to add to the redis pod
initContainers : [ ]
# - name: download-tools
# image: alpine:3.8
# command: [sh, -c]
# args:
# - wget -qO- https://get.helm.sh/helm-v2.16.1-linux-amd64.tar.gz | tar -xvzf - &&
# mv linux-amd64/helm /custom-tools/
# volumeMounts:
# - mountPath: /custom-tools
# name: custom-tools
# volumeMounts:
# - mountPath: /usr/local/bin/helm
# name: custom-tools
# subPath: helm
2021-10-04 22:19:30 +00:00
service :
2021-10-21 11:33:45 +00:00
# -- Redis service annotations
2021-10-04 22:19:30 +00:00
annotations : {}
2021-10-21 11:33:45 +00:00
# -- Additional redis service labels
2021-10-04 22:19:30 +00:00
labels : {}
2021-09-17 17:47:11 +00:00
metrics :
2021-10-21 11:33:45 +00:00
# -- Deploy metrics service and redis-exporter sidecar
2021-09-17 17:47:11 +00:00
enabled : false
image :
2021-10-21 11:33:45 +00:00
# -- redis-exporter image repository
2022-07-29 14:40:11 +00:00
repository : public.ecr.aws/bitnami/redis-exporter
2021-10-21 11:33:45 +00:00
# -- redis-exporter image tag
2021-09-17 17:47:11 +00:00
tag : 1.26 .0 -debian-10-r2
2021-10-21 11:33:45 +00:00
# -- redis-exporter image PullPolicy
2021-09-17 17:47:11 +00:00
imagePullPolicy : IfNotPresent
2021-10-21 11:33:45 +00:00
# -- Port to use for redis-exporter sidecar
2021-09-17 17:47:11 +00:00
containerPort : 9121
2021-10-21 11:33:45 +00:00
# -- Resource limits and requests for redis-exporter sidecar
2021-09-17 17:47:11 +00:00
resources : {}
# limits:
# cpu: 50m
# memory: 64Mi
# requests:
# cpu: 10m
# memory: 32Mi
service :
2021-10-21 11:33:45 +00:00
# -- Metrics service type
2021-09-17 17:47:11 +00:00
type : ClusterIP
2021-10-21 11:33:45 +00:00
# -- Metrics service clusterIP. `None` makes a "headless service" (no virtual IP)
2021-09-17 17:47:11 +00:00
clusterIP : None
2021-10-21 11:33:45 +00:00
# -- Metrics service annotations
2021-09-17 17:47:11 +00:00
annotations : {}
2021-10-21 11:33:45 +00:00
# -- Metrics service labels
2021-09-17 17:47:11 +00:00
labels : {}
2021-10-21 11:33:45 +00:00
# -- Metrics service port
2021-09-17 17:47:11 +00:00
servicePort : 9121
2021-10-21 11:33:45 +00:00
# -- Metrics service port name
2021-09-17 17:47:11 +00:00
portName : http-metrics
serviceMonitor :
2021-10-21 11:33:45 +00:00
# -- Enable a prometheus ServiceMonitor
2021-09-17 17:47:11 +00:00
enabled : false
2021-10-21 11:33:45 +00:00
# -- Interval at which metrics should be scraped
2021-09-17 17:47:11 +00:00
interval : 30s
2021-10-21 11:33:45 +00:00
# -- Prometheus [RelabelConfigs] to apply to samples before scraping
2021-09-17 17:47:11 +00:00
relabelings : [ ]
2021-10-21 11:33:45 +00:00
# -- Prometheus [MetricRelabelConfigs] to apply to samples before ingestion
2021-09-17 17:47:11 +00:00
metricRelabelings : [ ]
2021-10-21 11:33:45 +00:00
# -- Prometheus ServiceMonitor selector
2021-09-17 17:47:11 +00:00
selector : {}
# prometheus: kube-prometheus
2021-10-21 11:33:45 +00:00
2022-05-10 07:40:49 +00:00
# -- Prometheus ServiceMonitor scheme
scheme : ""
# -- Prometheus ServiceMonitor tlsConfig
tlsConfig : {}
2021-10-21 11:33:45 +00:00
# -- Prometheus ServiceMonitor namespace
namespace : "" # "monitoring"
# -- Prometheus ServiceMonitor labels
2021-09-17 17:47:11 +00:00
additionalLabels : {}
2022-01-31 15:36:49 +00:00
pdb :
# -- Labels to be added to Redis server pdb
labels : {}
# -- Annotations to be added to Redis server pdb
annotations : {}
# -- Deploy a Poddisruptionbudget for the Redis server
enabled : false
# minAvailable: 1
# maxUnavailable: 0
2022-06-02 12:26:08 +00:00
# -- Secrets with credentials to pull images from a private registry
imagePullSecrets : [ ]
2020-04-09 16:31:13 +00:00
# This key configures Redis-HA subchart and when enabled (redis-ha.enabled=true)
# the custom redis deployment is omitted
2021-10-21 11:33:45 +00:00
# Check the redis-ha chart for more properties
2020-04-09 16:31:13 +00:00
redis-ha :
2021-10-21 11:33:45 +00:00
# -- Enables the Redis HA subchart and disables the custom Redis single node deployment
2020-04-09 16:31:13 +00:00
enabled : false
exporter :
2021-10-21 11:33:45 +00:00
# -- If `true`, the prometheus exporter sidecar is enabled
2020-04-09 16:31:13 +00:00
enabled : true
persistentVolume :
2021-10-21 11:33:45 +00:00
# -- Configures persistency on Redis nodes
2020-04-09 16:31:13 +00:00
enabled : false
redis :
2021-10-21 11:33:45 +00:00
# -- Redis convention for naming the cluster group: must match `^[\\w-\\.]+$` and can be templated
2020-04-09 16:31:13 +00:00
masterGroupName : argocd
2021-10-21 11:33:45 +00:00
# -- Any valid redis config options in this section will be applied to each server (see `redis-ha` chart)
# @default -- See [values.yaml]
2020-04-09 16:31:13 +00:00
config :
2021-10-21 11:33:45 +00:00
# -- Will save the DB if both the given number of seconds and the given number of write operations against the DB occurred. `""` is disabled
2022-05-25 11:06:37 +00:00
# @default -- `'""'`
2020-12-15 06:15:13 +00:00
save : '""'
2020-04-09 16:31:13 +00:00
haproxy :
2021-10-21 11:33:45 +00:00
# -- Enabled HAProxy LoadBalancing/Proxy
2020-04-09 16:31:13 +00:00
enabled : true
metrics :
2021-10-21 11:33:45 +00:00
# -- HAProxy enable prometheus metric scraping
2020-04-09 16:31:13 +00:00
enabled : true
2020-06-24 15:01:53 +00:00
image :
2021-10-21 11:33:45 +00:00
# -- Redis tag
2022-07-31 12:19:47 +00:00
tag : 7.0 .4 -alpine
2020-04-09 16:31:13 +00:00
2022-05-25 11:06:37 +00:00
## https://kubernetes.io/docs/concepts/workloads/pods/pod-topology-spread-constraints/
topologySpreadConstraints :
# -- Enable Redis HA topology spread constraints
enabled : false
# -- Max skew of pods tolerated
# @default -- `""` (defaults to `1`)
maxSkew : ""
# -- Topology key for spread
# @default -- `""` (defaults to `topology.kubernetes.io/zone`)
topologyKey : ""
# -- Enforcement policy, hard or soft
# @default -- `""` (defaults to `ScheduleAnyway`)
whenUnsatisfiable : ""
2022-03-31 12:18:54 +00:00
# External Redis parameters
externalRedis :
# -- External Redis server host
host : ""
# -- External Redis password
password : ""
# -- External Redis server port
port : 6379
# -- The name of an existing secret with Redis credentials (must contain key `redis-password`).
# When it's set, the `externalRedis.password` parameter is ignored
existingSecret : ""
2022-06-08 06:03:58 +00:00
# -- External Redis Secret annotations
secretAnnotations : {}
2022-03-31 12:18:54 +00:00
2019-11-05 00:17:25 +00:00
## Server
server :
2021-10-21 11:33:45 +00:00
# -- Argo CD server name
2019-11-05 00:17:25 +00:00
name : server
2021-10-21 11:33:45 +00:00
# -- The number of server pods to run
2020-02-05 20:32:17 +00:00
replicas : 1
2020-02-17 00:14:39 +00:00
autoscaling :
2021-10-21 11:33:45 +00:00
# -- Enable Horizontal Pod Autoscaler ([HPA]) for the Argo CD server
2020-02-17 00:14:39 +00:00
enabled : false
2021-10-21 11:33:45 +00:00
# -- Minimum number of replicas for the Argo CD server [HPA]
2020-02-17 00:14:39 +00:00
minReplicas : 1
2021-10-21 11:33:45 +00:00
# -- Maximum number of replicas for the Argo CD server [HPA]
2020-02-17 00:14:39 +00:00
maxReplicas : 5
2021-10-21 11:33:45 +00:00
# -- Average CPU utilization percentage for the Argo CD server [HPA]
2020-02-17 00:14:39 +00:00
targetCPUUtilizationPercentage : 50
2021-10-21 11:33:45 +00:00
# -- Average memory utilization percentage for the Argo CD server [HPA]
2020-02-17 00:14:39 +00:00
targetMemoryUtilizationPercentage : 50
2022-08-25 06:40:50 +00:00
# -- Configures the scaling behavior of the target in both Up and Down directions.
# This is only available on HPA apiVersion `autoscaling/v2beta2` and newer
behavior : {}
# scaleDown:
# stabilizationWindowSeconds: 300
# policies:
# - type: Pods
# value: 1
# periodSeconds: 180
# scaleUp:
# stabilizationWindowSeconds: 300
# policies:
# - type: Pods
# value: 2
# periodSeconds: 60
2019-11-21 04:40:15 +00:00
image :
2021-10-21 11:33:45 +00:00
# -- Repository to use for the Argo CD server
# @default -- `""` (defaults to global.image.repository)
repository : "" # defaults to global.image.repository
# -- Tag to use for the Argo CD server
# @default -- `""` (defaults to global.image.tag)
tag : "" # defaults to global.image.tag
# -- Image pull policy for the Argo CD server
# @default -- `""` (defaults to global.image.imagePullPolicy)
imagePullPolicy : "" # IfNotPresent
# -- Additional command line arguments to pass to Argo CD server
2020-03-25 16:54:54 +00:00
extraArgs : [ ]
# - --insecure
2019-11-05 00:17:25 +00:00
2021-10-21 11:33:45 +00:00
# This flag is used to either remove or pass the CLI flag --staticassets /shared/app to the Argo CD server app
2021-08-26 14:21:58 +00:00
staticAssets :
2021-10-21 11:33:45 +00:00
# -- Disable deprecated flag `--staticassets`
2021-08-26 14:21:58 +00:00
enabled : true
2021-10-21 11:33:45 +00:00
# -- Environment variables to pass to Argo CD server
2019-12-05 23:50:47 +00:00
env : [ ]
2021-10-21 11:33:45 +00:00
# -- envFrom to pass to Argo CD server
# @default -- `[]` (See [values.yaml])
2021-05-21 16:43:24 +00:00
envFrom : [ ]
# - configMapRef:
# name: config-map-name
# - secretRef:
# name: secret-name
2021-10-21 11:33:45 +00:00
# -- Specify postStart and preStop lifecycle hooks for your argo-cd-server container
2021-02-03 13:51:58 +00:00
lifecycle : {}
2021-10-21 11:33:45 +00:00
# -- Argo CD server log format: Either `text` or `json`
2022-08-25 10:41:43 +00:00
# @default -- `""` (defaults to global.logging.format)
logFormat : ""
# -- Argo CD server log level. One of: `debug`, `info`, `warn` or `error`
# @default -- `""` (defaults to global.logging.level)
logLevel : ""
2019-11-05 00:17:25 +00:00
2021-10-21 11:33:45 +00:00
# -- Annotations to be added to server pods
2019-11-05 00:17:25 +00:00
podAnnotations : {}
2021-10-21 11:33:45 +00:00
# -- Labels to be added to server pods
2019-11-05 00:17:25 +00:00
podLabels : {}
2021-10-21 11:33:45 +00:00
# -- Configures the server port
2019-11-05 00:17:25 +00:00
containerPort : 8080
## Readiness and liveness probes for default backend
## Ref: https://kubernetes.io/docs/tasks/configure-pod-container/configure-liveness-readiness-probes/
##
readinessProbe :
2021-10-21 11:33:45 +00:00
# -- Minimum consecutive failures for the [probe] to be considered failed after having succeeded
2019-11-05 00:17:25 +00:00
failureThreshold : 3
2021-10-21 11:33:45 +00:00
# -- Number of seconds after the container has started before [probe] is initiated
2019-11-05 00:17:25 +00:00
initialDelaySeconds : 10
2021-10-21 11:33:45 +00:00
# -- How often (in seconds) to perform the [probe]
2019-11-05 00:17:25 +00:00
periodSeconds : 10
2021-10-21 11:33:45 +00:00
# -- Minimum consecutive successes for the [probe] to be considered successful after having failed
2019-11-05 00:17:25 +00:00
successThreshold : 1
2021-10-21 11:33:45 +00:00
# -- Number of seconds after which the [probe] times out
2019-11-05 00:17:25 +00:00
timeoutSeconds : 1
livenessProbe :
2021-10-21 11:33:45 +00:00
# -- Minimum consecutive failures for the [probe] to be considered failed after having succeeded
2019-11-05 00:17:25 +00:00
failureThreshold : 3
2021-10-21 11:33:45 +00:00
# -- Number of seconds after the container has started before [probe] is initiated
2019-11-05 00:17:25 +00:00
initialDelaySeconds : 10
2021-10-21 11:33:45 +00:00
# -- How often (in seconds) to perform the [probe]
2019-11-05 00:17:25 +00:00
periodSeconds : 10
2021-10-21 11:33:45 +00:00
# -- Minimum consecutive successes for the [probe] to be considered successful after having failed
2019-11-05 00:17:25 +00:00
successThreshold : 1
2021-10-21 11:33:45 +00:00
# -- Number of seconds after which the [probe] times out
2019-11-05 00:17:25 +00:00
timeoutSeconds : 1
2021-10-21 11:33:45 +00:00
# -- Additional volumeMounts to the server main container
2019-11-05 00:17:25 +00:00
volumeMounts : [ ]
2021-10-21 11:33:45 +00:00
# -- Additional volumes to the server pod
2019-11-05 00:17:25 +00:00
volumes : [ ]
2021-10-21 11:33:45 +00:00
# -- [Node selector]
2019-11-05 00:17:25 +00:00
nodeSelector : {}
2021-10-21 11:33:45 +00:00
# -- [Tolerations] for use with node taints
2019-11-07 10:06:22 +00:00
tolerations : [ ]
2021-10-21 11:33:45 +00:00
# -- Assign custom [affinity] rules to the deployment
2019-11-05 00:17:25 +00:00
affinity : {}
2021-10-21 11:33:45 +00:00
# -- Assign custom [TopologySpreadConstraints] rules to the Argo CD server
## Ref: https://kubernetes.io/docs/concepts/workloads/pods/pod-topology-spread-constraints/
## If labelSelector is left out, it will default to the labelSelector configuration of the deployment
2021-09-17 13:57:26 +00:00
topologySpreadConstraints : [ ]
# - maxSkew: 1
# topologyKey: topology.kubernetes.io/zone
# whenUnsatisfiable: DoNotSchedule
2021-10-21 11:33:45 +00:00
# -- Priority class for the Argo CD server
2019-11-05 00:17:25 +00:00
priorityClassName : ""
2021-10-21 11:33:45 +00:00
# -- Servers container-level security context
2020-12-15 06:15:13 +00:00
containerSecurityContext :
{}
2020-01-13 05:18:35 +00:00
# capabilities:
# drop:
# - all
2021-03-10 10:16:21 +00:00
# readOnlyRootFilesystem: true
2020-01-13 05:18:35 +00:00
2021-10-21 11:33:45 +00:00
# -- Resource limits and requests for the Argo CD server
2019-11-05 00:17:25 +00:00
resources : {}
# limits:
# cpu: 100m
# memory: 128Mi
# requests:
# cpu: 50m
# memory: 64Mi
## Certificate configuration
certificate :
2022-04-03 09:13:56 +00:00
# -- Deploy a Certificate resource (requires cert-manager)
2019-11-05 00:17:25 +00:00
enabled : false
2022-04-03 09:13:56 +00:00
# -- Certificate primary domain (commonName)
2019-11-05 00:17:25 +00:00
domain : argocd.example.com
2022-04-03 09:13:56 +00:00
# -- The requested 'duration' (i.e. lifetime) of the Certificate. Value must be in units accepted by Go time.ParseDuration
duration : ""
# -- How long before the currently issued certificate's expiry cert-manager should renew the certificate. Value must be in units accepted by Go time.ParseDuration
renewBefore : ""
2022-09-19 21:36:26 +00:00
# Private key of the certificate
privateKey :
# -- Rotation policy of private key when certificate is re-issued. Either: `Never` or `Always`
rotationPolicy : Never
# -- The private key cryptography standards (PKCS) encoding for private key. Either: `PCKS1` or `PKCS8`
encoding : PKCS1
# -- Algorithm used to generate certificate private key. One of: `RSA`, `Ed25519` or `ECDSA`
algorithm : RSA
# -- Key bit size of the private key. If algorithm is set to `Ed25519`, size is ignored.
size : 2048
2021-06-07 09:39:41 +00:00
issuer :
2022-05-20 18:10:35 +00:00
# -- Certificate issuer group. Set if using an external issuer. Eg. `cert-manager.io`
group : ""
2022-04-03 09:13:56 +00:00
# -- Certificate issuer kind. Either `Issuer` or `ClusterIssuer`
kind : ""
# -- Certificate isser name. Eg. `letsencrypt`
name : ""
2021-10-21 11:33:45 +00:00
# -- Certificate manager additional hosts
2019-11-05 00:17:25 +00:00
additionalHosts : [ ]
2022-04-03 09:13:56 +00:00
# -- The name of the Secret that will be automatically created and managed by this Certificate resource
2021-06-07 09:39:41 +00:00
secretName : argocd-server-tls
2019-11-05 00:17:25 +00:00
## Server service configuration
service :
2021-10-21 11:33:45 +00:00
# -- Server service annotations
2019-11-05 00:17:25 +00:00
annotations : {}
2021-10-21 11:33:45 +00:00
# -- Server service labels
2019-11-05 00:17:25 +00:00
labels : {}
2021-10-21 11:33:45 +00:00
# -- Server service type
2019-11-05 00:17:25 +00:00
type : ClusterIP
2021-10-21 11:33:45 +00:00
# -- Server service http port for NodePort service type (only if `server.service.type` is set to "NodePort")
2021-02-16 23:38:40 +00:00
nodePortHttp : 30080
2021-10-21 11:33:45 +00:00
# -- Server service https port for NodePort service type (only if `server.service.type` is set to "NodePort")
2021-02-16 23:38:40 +00:00
nodePortHttps : 30443
2021-10-21 11:33:45 +00:00
# -- Server service http port
2019-11-05 00:17:25 +00:00
servicePortHttp : 80
2021-10-21 11:33:45 +00:00
# -- Server service https port
2019-11-05 00:17:25 +00:00
servicePortHttps : 443
2021-10-21 11:33:45 +00:00
# -- Server service http port name, can be used to route traffic via istio
2020-05-04 19:18:56 +00:00
servicePortHttpName : http
2021-10-21 11:33:45 +00:00
# -- Server service https port name, can be used to route traffic via istio
2020-05-04 19:18:56 +00:00
servicePortHttpsName : https
2021-10-21 11:33:45 +00:00
# -- Use named target port for argocd
## Named target ports are not supported by GCE health checks, so when deploying argocd on GKE
## and exposing it via GCE ingress, the health checks fail and the load balancer returns a 502.
2020-10-27 02:27:36 +00:00
namedTargetPort : true
2021-10-21 11:33:45 +00:00
# -- LoadBalancer will get created with the IP specified in this field
2020-04-14 21:15:17 +00:00
loadBalancerIP : ""
2021-10-21 11:33:45 +00:00
# -- Source IP ranges to allow access to service from
2020-04-09 16:02:23 +00:00
loadBalancerSourceRanges : [ ]
2021-10-21 11:33:45 +00:00
# -- Server service external IPs
2021-02-15 14:11:15 +00:00
externalIPs : [ ]
2021-10-21 11:33:45 +00:00
# -- Denotes if this Service desires to route external traffic to node-local or cluster-wide endpoints
2021-05-18 07:24:45 +00:00
externalTrafficPolicy : ""
2021-10-21 11:33:45 +00:00
# -- Used to maintain session affinity. Supports `ClientIP` and `None`
2021-08-07 13:07:41 +00:00
sessionAffinity : ""
2019-11-05 00:17:25 +00:00
## Server metrics service configuration
metrics :
2021-10-21 11:33:45 +00:00
# -- Deploy metrics service
2019-11-05 00:17:25 +00:00
enabled : false
service :
2021-10-21 11:33:45 +00:00
# -- Metrics service annotations
2019-11-05 00:17:25 +00:00
annotations : {}
2021-10-21 11:33:45 +00:00
# -- Metrics service labels
2019-11-05 00:17:25 +00:00
labels : {}
2021-10-21 11:33:45 +00:00
# -- Metrics service port
2019-11-05 00:17:25 +00:00
servicePort : 8083
2022-05-10 07:40:49 +00:00
# -- Metrics service port name
portName : http-metrics
2019-11-05 00:17:25 +00:00
serviceMonitor :
2021-10-21 11:33:45 +00:00
# -- Enable a prometheus ServiceMonitor
2019-11-05 00:17:25 +00:00
enabled : false
2021-10-21 11:33:45 +00:00
# -- Prometheus ServiceMonitor interval
2021-05-21 12:43:10 +00:00
interval : 30s
2021-10-21 11:33:45 +00:00
# -- Prometheus [RelabelConfigs] to apply to samples before scraping
2021-08-25 15:04:29 +00:00
relabelings : [ ]
2021-10-21 11:33:45 +00:00
# -- Prometheus [MetricRelabelConfigs] to apply to samples before ingestion
2021-08-25 15:04:29 +00:00
metricRelabelings : [ ]
2021-10-21 11:33:45 +00:00
# -- Prometheus ServiceMonitor selector
selector : {}
# prometheus: kube-prometheus
2022-05-10 07:40:49 +00:00
# -- Prometheus ServiceMonitor scheme
scheme : ""
# -- Prometheus ServiceMonitor tlsConfig
tlsConfig : {}
2021-10-21 11:33:45 +00:00
# -- Prometheus ServiceMonitor namespace
namespace : "" # monitoring
# -- Prometheus ServiceMonitor labels
additionalLabels : {}
2019-11-05 00:17:25 +00:00
serviceAccount :
2021-10-21 11:33:45 +00:00
# -- Create server service account
2019-11-05 00:17:25 +00:00
create : true
2021-10-21 11:33:45 +00:00
# -- Server service account name
2019-11-05 00:17:25 +00:00
name : argocd-server
2021-10-21 11:33:45 +00:00
# -- Annotations applied to created service account
2020-06-24 13:48:41 +00:00
annotations : {}
2021-10-21 11:33:45 +00:00
# -- Automount API credentials for the Service Account
2021-03-18 22:04:52 +00:00
automountServiceAccountToken : true
2019-11-05 00:17:25 +00:00
ingress :
2021-10-21 11:33:45 +00:00
# -- Enable an ingress resource for the Argo CD server
2019-11-05 00:17:25 +00:00
enabled : false
2021-10-21 11:33:45 +00:00
# -- Additional ingress annotations
2019-11-05 00:17:25 +00:00
annotations : {}
2021-10-21 11:33:45 +00:00
# -- Additional ingress labels
2019-11-05 00:17:25 +00:00
labels : {}
2021-10-21 11:33:45 +00:00
# -- Defines which ingress controller will implement the resource
2021-04-21 19:31:16 +00:00
ingressClassName : ""
2019-11-05 00:17:25 +00:00
2021-10-21 11:33:45 +00:00
# -- List of ingress hosts
2019-11-05 00:17:25 +00:00
## Argo Ingress.
## Hostnames must be provided if Ingress is enabled.
## Secrets must be manually created in the namespace
2019-11-21 04:40:15 +00:00
hosts :
[ ]
2019-11-05 00:17:25 +00:00
# - argocd.example.com
2021-10-21 11:33:45 +00:00
# -- List of ingress paths
2019-11-05 00:17:25 +00:00
paths :
2019-11-21 04:40:15 +00:00
- /
2021-10-21 11:33:45 +00:00
# -- Ingress path type. One of `Exact`, `Prefix` or `ImplementationSpecific`
2021-07-05 09:52:59 +00:00
pathType : Prefix
2021-10-21 11:33:45 +00:00
# -- Additional ingress paths
2020-08-29 21:19:51 +00:00
extraPaths :
[ ]
# - path: /*
# backend:
# serviceName: ssl-redirect
# servicePort: use-annotation
2021-05-31 20:15:09 +00:00
## for Kubernetes >=1.19 (when "networking.k8s.io/v1" is used)
# - path: /*
# pathType: Prefix
# backend:
2021-06-25 06:06:59 +00:00
# service:
2021-05-31 20:15:09 +00:00
# name: ssl-redirect
# port:
# name: use-annotation
2021-10-21 11:33:45 +00:00
# -- Ingress TLS configuration
2019-11-21 04:40:15 +00:00
tls :
[ ]
2021-05-26 10:35:19 +00:00
# - secretName: argocd-tls-certificate
2019-11-05 00:17:25 +00:00
# hosts:
# - argocd.example.com
2021-10-21 11:33:45 +00:00
# -- Uses `server.service.servicePortHttps` instead `server.service.servicePortHttp`
2020-06-26 13:25:00 +00:00
https : false
2021-10-21 11:33:45 +00:00
2021-05-31 20:15:09 +00:00
# dedicated ingress for gRPC as documented at
2022-06-15 13:16:02 +00:00
# Ref: https://argo-cd.readthedocs.io/en/stable/operator-manual/ingress/
2020-06-26 13:25:00 +00:00
ingressGrpc :
2021-10-21 11:33:45 +00:00
# -- Enable an ingress resource for the Argo CD server for dedicated [gRPC-ingress]
2020-06-26 13:25:00 +00:00
enabled : false
2021-10-21 11:33:45 +00:00
# -- Setup up gRPC ingress to work with an AWS ALB
2021-07-20 11:40:54 +00:00
isAWSALB : false
2021-10-21 11:33:45 +00:00
# -- Additional ingress annotations for dedicated [gRPC-ingress]
2020-06-26 13:25:00 +00:00
annotations : {}
2021-10-21 11:33:45 +00:00
# -- Additional ingress labels for dedicated [gRPC-ingress]
2020-06-26 13:25:00 +00:00
labels : {}
2021-10-21 11:33:45 +00:00
# -- Defines which ingress controller will implement the resource [gRPC-ingress]
2021-04-21 19:31:16 +00:00
ingressClassName : ""
2020-06-26 13:25:00 +00:00
2021-08-11 15:44:18 +00:00
awsALB :
2021-10-21 11:33:45 +00:00
# -- Service type for the AWS ALB gRPC service
2021-08-27 13:47:01 +00:00
## Service Type if isAWSALB is set to true
## Can be of type NodePort or ClusterIP depending on which mode you are
## are running. Instance mode needs type NodePort, IP mode needs type
## ClusterIP
## Ref: https://kubernetes-sigs.github.io/aws-load-balancer-controller/v2.2/how-it-works/#ingress-traffic
2021-08-11 15:44:18 +00:00
serviceType : NodePort
2021-10-21 11:33:45 +00:00
# -- Backend protocol version for the AWS ALB gRPC service
## This tells AWS to send traffic from the ALB using HTTP2. Can use gRPC as well if you want to leverage gRPC specific features
2021-08-27 13:47:01 +00:00
backendProtocolVersion : HTTP2
2021-08-11 15:44:18 +00:00
2021-10-21 11:33:45 +00:00
# -- List of ingress hosts for dedicated [gRPC-ingress]
2020-06-26 13:25:00 +00:00
## Argo Ingress.
## Hostnames must be provided if Ingress is enabled.
## Secrets must be manually created in the namespace
##
hosts :
[ ]
# - argocd.example.com
2021-10-21 11:33:45 +00:00
# -- List of ingress paths for dedicated [gRPC-ingress]
2020-06-26 13:25:00 +00:00
paths :
- /
2021-10-21 11:33:45 +00:00
# -- Ingress path type for dedicated [gRPC-ingress]. One of `Exact`, `Prefix` or `ImplementationSpecific`
2021-07-05 09:52:59 +00:00
pathType : Prefix
2021-10-21 11:33:45 +00:00
# -- Additional ingress paths for dedicated [gRPC-ingress]
2020-08-29 21:19:51 +00:00
extraPaths :
[ ]
# - path: /*
# backend:
# serviceName: ssl-redirect
# servicePort: use-annotation
2021-05-31 20:15:09 +00:00
## for Kubernetes >=1.19 (when "networking.k8s.io/v1" is used)
# - path: /*
# pathType: Prefix
# backend:
2021-06-25 06:06:59 +00:00
# service:
2021-05-31 20:15:09 +00:00
# name: ssl-redirect
# port:
# name: use-annotation
2021-10-21 11:33:45 +00:00
# -- Ingress TLS configuration for dedicated [gRPC-ingress]
2020-06-26 13:25:00 +00:00
tls :
[ ]
2021-05-26 10:35:19 +00:00
# - secretName: argocd-tls-certificate
2020-06-26 13:25:00 +00:00
# hosts:
# - argocd.example.com
2021-10-21 11:33:45 +00:00
# -- Uses `server.service.servicePortHttps` instead `server.service.servicePortHttp`
2020-06-26 13:25:00 +00:00
https : false
2019-11-05 00:17:25 +00:00
2019-11-07 08:20:31 +00:00
# Create a OpenShift Route with SSL passthrough for UI and CLI
# Consider setting 'hostname' e.g. https://argocd.apps-crc.testing/ using your Default Ingress Controller Domain
# Find your domain with: kubectl describe --namespace=openshift-ingress-operator ingresscontroller/default | grep Domain:
# If 'hostname' is an empty string "" OpenShift will create a hostname for you.
route :
2021-11-10 17:18:13 +00:00
# -- Enable an OpenShift Route for the Argo CD server
2019-11-07 08:20:31 +00:00
enabled : false
2021-11-10 17:18:13 +00:00
# -- Openshift Route annotations
annotations : {}
# -- Hostname of OpenShift Route
2019-11-07 08:20:31 +00:00
hostname : ""
2021-11-10 17:18:13 +00:00
# -- Termination type of Openshift Route
termination_type : passthrough
# -- Termination policy of Openshift Route
termination_policy : None
2019-11-07 08:20:31 +00:00
2022-03-16 21:01:30 +00:00
# -- Manage Argo CD configmap (Declarative Setup)
2021-10-21 11:33:45 +00:00
## Ref: https://github.com/argoproj/argo-cd/blob/master/docs/operator-manual/argocd-cm.yaml
2021-03-08 19:30:24 +00:00
configEnabled : true
2021-10-21 11:33:45 +00:00
# -- [General Argo CD configuration]
# @default -- See [values.yaml]
2019-11-05 00:17:25 +00:00
config :
# Argo CD's externally facing base URL (optional). Required when configuring SSO
2022-04-02 18:44:48 +00:00
url : ""
2019-11-05 00:17:25 +00:00
# Argo CD instance label key
application.instanceLabelKey : argocd.argoproj.io/instance
2021-08-26 13:42:47 +00:00
2022-08-02 10:01:34 +00:00
# Enable logs RBAC enforcement
2022-06-14 10:10:08 +00:00
# Ref: https://argo-cd.readthedocs.io/en/latest/operator-manual/upgrading/2.3-2.4/#enable-logs-rbac-enforcement
server.rbac.log.enforce.enable : "false"
2022-06-14 12:31:39 +00:00
# exec.enabled indicates whether the UI exec feature is enabled. It is disabled by default.
# Ref: https://argo-cd.readthedocs.io/en/latest/operator-manual/rbac/#exec-resource
exec.enabled : "false"
2022-08-02 10:01:34 +00:00
# admin.enabled indicates whether the admin user is enabled. It is enabled by default.
# https://argo-cd.readthedocs.io/en/latest/faq/#how-to-disable-admin-user
admin.enabled : "true"
# dex.config: |
# connectors:
# # GitHub example
# - type: github
# id: github
# name: GitHub
# config:
# clientID: aabbccddeeff00112233
# clientSecret: $dex.github.clientSecret # Alternatively $<some_K8S_secret>:dex.github.clientSecret
# orgs:
# - name: your-github-org
2019-11-21 04:40:15 +00:00
# oidc.config: |
# name: AzureAD
# issuer: https://login.microsoftonline.com/TENANT_ID/v2.0
# clientID: CLIENT_ID
# clientSecret: $oidc.azuread.clientSecret
# requestedIDTokenClaims:
# groups:
# essential: true
# requestedScopes:
# - openid
# - profile
# - email
2019-11-05 00:17:25 +00:00
2022-03-16 21:01:30 +00:00
# -- Annotations to be added to Argo CD ConfigMap
2020-07-12 14:56:48 +00:00
configAnnotations : {}
2022-03-16 21:01:30 +00:00
# -- Argo CD rbac config ([Argo CD RBAC policy])
2021-10-21 11:33:45 +00:00
## Ref: https://github.com/argoproj/argo-cd/blob/master/docs/operator-manual/rbac.md
2019-11-21 04:40:15 +00:00
rbacConfig :
{}
2022-02-17 11:37:22 +00:00
# policy.csv is a file containing user-defined RBAC policies and role definitions (optional).
2019-11-05 00:17:25 +00:00
# Policy rules are in the form:
# p, subject, resource, action, object, effect
# Role definitions and bindings are in the form:
# g, subject, inherited-subject
# See https://github.com/argoproj/argo-cd/blob/master/docs/operator-manual/rbac.md for additional information.
2019-11-05 23:38:22 +00:00
# policy.csv: |
# # Grant all members of the group 'my-org:team-alpha; the ability to sync apps in 'my-project'
# p, my-org:team-alpha, applications, sync, my-project/*, allow
# # Grant all members of 'my-org:team-beta' admins
# g, my-org:team-beta, role:admin
2019-11-05 00:17:25 +00:00
# policy.default is the name of the default role which Argo CD will falls back to, when
# authorizing API requests (optional). If omitted or empty, users may be still be able to login,
# but will see no apps, projects, etc...
2019-11-05 23:38:22 +00:00
# policy.default: role:readonly
2019-11-05 00:17:25 +00:00
# scopes controls which OIDC scopes to examine during rbac enforcement (in addition to `sub` scope).
# If omitted, defaults to: '[groups]'. The scope value can be a string, or a list of strings.
2019-11-05 23:38:22 +00:00
# scopes: '[cognito:groups, email]'
2019-11-05 00:17:25 +00:00
2022-03-16 21:01:30 +00:00
# -- Annotations to be added to Argo CD rbac ConfigMap
2020-07-12 14:56:48 +00:00
rbacConfigAnnotations : {}
2021-10-21 11:33:45 +00:00
# -- Whether or not to create the configmap. If false, it is expected the configmap will be created
2022-03-16 21:01:30 +00:00
# by something else. Argo CD will not work if there is no configMap created with the name above.
2021-02-09 17:32:28 +00:00
rbacConfigCreate : true
2020-02-16 22:49:52 +00:00
## Enable Admin ClusterRole resources.
2022-03-16 21:01:30 +00:00
## Enable if you would like to grant rights to Argo CD to deploy to the local Kubernetes cluster.
2020-02-16 22:49:52 +00:00
clusterAdminAccess :
2021-10-21 11:33:45 +00:00
# -- Enable RBAC for local cluster deployments
2020-02-16 22:49:52 +00:00
enabled : true
2020-04-27 00:14:23 +00:00
GKEbackendConfig :
2021-10-21 11:33:45 +00:00
# -- Enable BackendConfig custom resource for Google Kubernetes Engine
2020-04-27 00:14:23 +00:00
enabled : false
2021-10-21 11:33:45 +00:00
# -- [BackendConfigSpec]
2020-04-27 00:14:23 +00:00
spec : {}
# spec:
# iap:
# enabled: true
# oauthclientCredentials:
# secretName: argocd-secret
2022-01-16 05:23:56 +00:00
## Create a Google Managed Certificate for use with the GKE Ingress Controller
## https://cloud.google.com/kubernetes-engine/docs/how-to/managed-certs
GKEmanagedCertificate :
# -- Enable ManagedCertificate custom resource for Google Kubernetes Engine.
enabled : false
# -- Domains for the Google Managed Certificate
domains :
- argocd.example.com
## Create a Google FrontendConfig Custom Resource, for use with the GKE Ingress Controller
## https://cloud.google.com/kubernetes-engine/docs/how-to/ingress-features#configuring_ingress_features_through_frontendconfig_parameters
GKEfrontendConfig :
# -- Enable FrontConfig custom resource for Google Kubernetes Engine
enabled : false
# -- [FrontendConfigSpec]
spec : {}
# spec:
# redirectToHttps:
# enabled: true
# responseCodeName: RESPONSE_CODE
2021-10-21 11:33:45 +00:00
# -- Additional containers to be added to the server pod
2020-10-08 22:11:01 +00:00
## See https://github.com/lemonldap-ng-controller/lemonldap-ng-controller as example.
2021-10-21 11:33:45 +00:00
extraContainers : [ ]
2020-10-08 22:11:01 +00:00
# - name: my-sidecar
# image: nginx:latest
# - name: lemonldap-ng-controller
# image: lemonldapng/lemonldap-ng-controller:0.2.0
# args:
# - /lemonldap-ng-controller
# - --alsologtostderr
# - --configmap=$(POD_NAMESPACE)/lemonldap-ng-configuration
# env:
# - name: POD_NAME
# valueFrom:
# fieldRef:
# fieldPath: metadata.name
# - name: POD_NAMESPACE
# valueFrom:
# fieldRef:
# fieldPath: metadata.namespace
# volumeMounts:
# - name: copy-portal-skins
# mountPath: /srv/var/lib/lemonldap-ng/portal/skins
2021-11-29 10:50:39 +00:00
# -- Init containers to add to the server pod
## If your target Kubernetes cluster(s) require a custom auth provider executable
## you could use this (and the same in the application controller pod) to bootstrap
2022-03-16 21:01:30 +00:00
## that executable into your Argo CD container
2021-11-29 10:50:39 +00:00
initContainers : [ ]
# - name: download-tools
# image: alpine:3.8
# command: [sh, -c]
# args:
# - wget -qO- https://get.helm.sh/helm-v2.16.1-linux-amd64.tar.gz | tar -xvzf - &&
# mv linux-amd64/helm /custom-tools/
# volumeMounts:
# - mountPath: /custom-tools
# name: custom-tools
# volumeMounts:
# - mountPath: /usr/local/bin/helm
# name: custom-tools
# subPath: helm
2021-12-10 15:22:37 +00:00
extensions :
# -- Enable support for extensions
## This function in tech preview stage, do expect unstability or breaking changes in newer versions. Bump image.tag if necessary.
enabled : false
image :
# -- Repository to use for extensions image
repository : "ghcr.io/argoproj-labs/argocd-extensions"
# -- Tag to use for extensions image
tag : "v0.1.0"
# -- Image pull policy for extensions
imagePullPolicy : IfNotPresent
2021-12-11 19:28:08 +00:00
# -- Resource limits and requests for the argocd-extensions container
resources : {}
# limits:
# cpu: 50m
# memory: 128Mi
# requests:
# cpu: 10m
# memory: 64Mi
2021-12-10 15:22:37 +00:00
# -- Extensions to be loaded into the server
contents : [ ]
# - name: argo-rollouts
# url: https://github.com/argoproj-labs/rollout-extension/releases/download/v0.1.0/extension.tar
2022-01-31 15:36:49 +00:00
pdb :
# -- Labels to be added to server pdb
labels : {}
# -- Annotations to be added to server pdb
annotations : {}
# -- Deploy a Poddisruptionbudget for the server
enabled : false
# minAvailable: 1
# maxUnavailable: 0
2022-06-02 12:26:08 +00:00
# -- Secrets with credentials to pull images from a private registry
imagePullSecrets : [ ]
2019-11-05 00:17:25 +00:00
## Repo Server
repoServer :
2021-10-21 11:33:45 +00:00
# -- Repo server name
2019-11-05 00:17:25 +00:00
name : repo-server
2021-10-21 11:33:45 +00:00
# -- The number of repo server pods to run
2020-02-05 20:32:17 +00:00
replicas : 1
2020-02-17 00:14:39 +00:00
autoscaling :
2021-10-21 11:33:45 +00:00
# -- Enable Horizontal Pod Autoscaler ([HPA]) for the repo server
2020-02-17 00:14:39 +00:00
enabled : false
2021-10-21 11:33:45 +00:00
# -- Minimum number of replicas for the repo server [HPA]
2020-02-17 00:14:39 +00:00
minReplicas : 1
2021-10-21 11:33:45 +00:00
# -- Maximum number of replicas for the repo server [HPA]
2020-02-17 00:14:39 +00:00
maxReplicas : 5
2021-10-21 11:33:45 +00:00
# -- Average CPU utilization percentage for the repo server [HPA]
2020-02-17 00:14:39 +00:00
targetCPUUtilizationPercentage : 50
2021-10-21 11:33:45 +00:00
# -- Average memory utilization percentage for the repo server [HPA]
2020-02-17 00:14:39 +00:00
targetMemoryUtilizationPercentage : 50
2022-08-25 06:40:50 +00:00
# -- Configures the scaling behavior of the target in both Up and Down directions.
# This is only available on HPA apiVersion `autoscaling/v2beta2` and newer
behavior : {}
# scaleDown:
# stabilizationWindowSeconds: 300
# policies:
# - type: Pods
# value: 1
# periodSeconds: 180
# scaleUp:
# stabilizationWindowSeconds: 300
# policies:
# - type: Pods
# value: 2
# periodSeconds: 60
2020-02-17 00:14:39 +00:00
2019-11-21 04:40:15 +00:00
image :
2021-10-21 11:33:45 +00:00
# -- Repository to use for the repo server
# @default -- `""` (defaults to global.image.repository)
repository : "" # defaults to global.image.repository
# -- Tag to use for the repo server
# @default -- `""` (defaults to global.image.tag)
tag : "" # defaults to global.image.tag
# -- Image pull policy for the repo server
# @default -- `""` (defaults to global.image.imagePullPolicy)
imagePullPolicy : "" # IfNotPresent
# -- Additional command line arguments to pass to repo server
2020-03-25 16:54:54 +00:00
extraArgs : [ ]
2019-11-05 00:17:25 +00:00
2021-10-21 11:33:45 +00:00
# -- Environment variables to pass to repo server
2019-12-05 23:50:47 +00:00
env : [ ]
2021-10-21 11:33:45 +00:00
# -- envFrom to pass to repo server
# @default -- `[]` (See [values.yaml])
2021-05-21 16:43:24 +00:00
envFrom : [ ]
# - configMapRef:
# name: config-map-name
# - secretRef:
# name: secret-name
2021-10-21 11:33:45 +00:00
# -- Repo server log format: Either `text` or `json`
2022-08-25 10:41:43 +00:00
# @default -- `""` (defaults to global.logging.level)
logFormat : ""
# -- Repo server log level. One of: `debug`, `info`, `warn` or `error`
# @default -- `""` (defaults to global.logging.format)
logLevel : ""
2019-11-05 00:17:25 +00:00
2021-10-21 11:33:45 +00:00
# -- Annotations to be added to repo server pods
2019-11-05 00:17:25 +00:00
podAnnotations : {}
2021-10-21 11:33:45 +00:00
# -- Labels to be added to repo server pods
2019-11-05 00:17:25 +00:00
podLabels : {}
2021-10-21 11:33:45 +00:00
# -- Configures the repo server port
2019-11-05 00:17:25 +00:00
containerPort : 8081
## Readiness and liveness probes for default backend
## Ref: https://kubernetes.io/docs/tasks/configure-pod-container/configure-liveness-readiness-probes/
##
readinessProbe :
2021-10-21 11:33:45 +00:00
# -- Minimum consecutive failures for the [probe] to be considered failed after having succeeded
2019-11-05 00:17:25 +00:00
failureThreshold : 3
2021-10-21 11:33:45 +00:00
# -- Number of seconds after the container has started before [probe] is initiated
2019-11-05 00:17:25 +00:00
initialDelaySeconds : 10
2021-10-21 11:33:45 +00:00
# -- How often (in seconds) to perform the [probe]
2019-11-05 00:17:25 +00:00
periodSeconds : 10
2021-10-21 11:33:45 +00:00
# -- Minimum consecutive successes for the [probe] to be considered successful after having failed
2019-11-05 00:17:25 +00:00
successThreshold : 1
2021-10-21 11:33:45 +00:00
# -- Number of seconds after which the [probe] times out
2019-11-05 00:17:25 +00:00
timeoutSeconds : 1
livenessProbe :
2021-10-21 11:33:45 +00:00
# -- Minimum consecutive failures for the [probe] to be considered failed after having succeeded
2019-11-05 00:17:25 +00:00
failureThreshold : 3
2021-10-21 11:33:45 +00:00
# -- Number of seconds after the container has started before [probe] is initiated
2019-11-05 00:17:25 +00:00
initialDelaySeconds : 10
2021-10-21 11:33:45 +00:00
# -- How often (in seconds) to perform the [probe]
2019-11-05 00:17:25 +00:00
periodSeconds : 10
2021-10-21 11:33:45 +00:00
# -- Minimum consecutive successes for the [probe] to be considered successful after having failed
2019-11-05 00:17:25 +00:00
successThreshold : 1
2021-10-21 11:33:45 +00:00
# -- Number of seconds after which the [probe] times out
2019-11-05 00:17:25 +00:00
timeoutSeconds : 1
2021-10-21 11:33:45 +00:00
# -- Additional volumeMounts to the repo server main container
2019-11-05 00:17:25 +00:00
volumeMounts : [ ]
2021-10-21 11:33:45 +00:00
# -- Additional volumes to the repo server pod
2019-11-05 00:17:25 +00:00
volumes : [ ]
2021-10-21 11:33:45 +00:00
## Use init containers to configure custom tooling
2022-06-15 13:16:02 +00:00
## https://argo-cd.readthedocs.io/en/stable/operator-manual/custom_tools/
2021-10-21 11:33:45 +00:00
## When using the volumes & volumeMounts section bellow, please comment out those above.
# - name: custom-tools
# emptyDir: {}
2019-11-05 00:17:25 +00:00
2021-10-21 11:33:45 +00:00
# -- [Node selector]
2019-11-05 00:17:25 +00:00
nodeSelector : {}
2021-10-21 11:33:45 +00:00
# -- [Tolerations] for use with node taints
2019-11-07 10:06:22 +00:00
tolerations : [ ]
2021-10-21 11:33:45 +00:00
# -- Assign custom [affinity] rules to the deployment
2019-11-05 00:17:25 +00:00
affinity : {}
2021-10-21 11:33:45 +00:00
# -- Assign custom [TopologySpreadConstraints] rules to the repo server
## Ref: https://kubernetes.io/docs/concepts/workloads/pods/pod-topology-spread-constraints/
## If labelSelector is left out, it will default to the labelSelector configuration of the deployment
2021-09-17 13:57:26 +00:00
topologySpreadConstraints : [ ]
# - maxSkew: 1
# topologyKey: topology.kubernetes.io/zone
# whenUnsatisfiable: DoNotSchedule
2021-10-21 11:33:45 +00:00
# -- Priority class for the repo server
2019-11-05 00:17:25 +00:00
priorityClassName : ""
2021-10-21 11:33:45 +00:00
# -- Repo server container-level security context
2020-12-15 06:15:13 +00:00
containerSecurityContext :
{}
2020-01-13 05:18:35 +00:00
# capabilities:
# drop:
# - all
2021-03-10 10:16:21 +00:00
# readOnlyRootFilesystem: true
2020-01-13 05:18:35 +00:00
2021-10-21 11:33:45 +00:00
# -- Resource limits and requests for the repo server pods
2019-11-05 00:17:25 +00:00
resources : {}
# limits:
# cpu: 50m
# memory: 128Mi
# requests:
# cpu: 10m
# memory: 64Mi
## Repo server service configuration
service :
2021-10-21 11:33:45 +00:00
# -- Repo server service annotations
2019-11-05 00:17:25 +00:00
annotations : {}
2021-10-21 11:33:45 +00:00
# -- Repo server service labels
2019-11-05 00:17:25 +00:00
labels : {}
2021-10-21 11:33:45 +00:00
# -- Repo server service port
2019-11-05 00:17:25 +00:00
port : 8081
2021-10-21 11:33:45 +00:00
# -- Repo server service port name
2020-02-16 23:17:37 +00:00
portName : https-repo-server
2019-11-05 00:17:25 +00:00
## Repo server metrics service configuration
metrics :
2021-10-21 11:33:45 +00:00
# -- Deploy metrics service
2019-11-05 00:17:25 +00:00
enabled : false
service :
2021-10-21 11:33:45 +00:00
# -- Metrics service annotations
2019-11-05 00:17:25 +00:00
annotations : {}
2021-10-21 11:33:45 +00:00
# -- Metrics service labels
2019-11-05 00:17:25 +00:00
labels : {}
2021-10-21 11:33:45 +00:00
# -- Metrics service port
2019-11-05 00:17:25 +00:00
servicePort : 8084
2022-05-10 07:40:49 +00:00
# -- Metrics service port name
portName : http-metrics
2019-11-05 00:17:25 +00:00
serviceMonitor :
2021-10-21 11:33:45 +00:00
# -- Enable a prometheus ServiceMonitor
2019-11-05 00:17:25 +00:00
enabled : false
2021-10-21 11:33:45 +00:00
# -- Prometheus ServiceMonitor interval
2021-05-21 12:43:10 +00:00
interval : 30s
2021-10-21 11:33:45 +00:00
# -- Prometheus [RelabelConfigs] to apply to samples before scraping
2021-08-25 15:04:29 +00:00
relabelings : [ ]
2021-10-21 11:33:45 +00:00
# -- Prometheus [MetricRelabelConfigs] to apply to samples before ingestion
2021-08-25 15:04:29 +00:00
metricRelabelings : [ ]
2021-10-21 11:33:45 +00:00
# -- Prometheus ServiceMonitor selector
selector : {}
# prometheus: kube-prometheus
2022-05-10 07:40:49 +00:00
# -- Prometheus ServiceMonitor scheme
scheme : ""
# -- Prometheus ServiceMonitor tlsConfig
tlsConfig : {}
2021-10-21 11:33:45 +00:00
# -- Prometheus ServiceMonitor namespace
namespace : "" # "monitoring"
# -- Prometheus ServiceMonitor labels
additionalLabels : {}
2019-11-05 00:17:25 +00:00
2021-09-17 20:14:31 +00:00
## Enable Admin ClusterRole resources.
2022-03-16 21:01:30 +00:00
## Enable if you would like to grant cluster rights to Argo CD repo server.
2021-09-17 20:14:31 +00:00
clusterAdminAccess :
2021-10-21 11:33:45 +00:00
# -- Enable RBAC for local cluster deployments
2021-09-17 20:14:31 +00:00
enabled : false
## Enable Custom Rules for the Repo server's Cluster Role resource
## Enable this and set the rules: to whatever custom rules you want for the Cluster Role resource.
## Defaults to off
clusterRoleRules :
2021-10-21 11:33:45 +00:00
# -- Enable custom rules for the Repo server's Cluster Role resource
2021-09-17 20:14:31 +00:00
enabled : false
2021-10-21 11:33:45 +00:00
# -- List of custom rules for the Repo server's Cluster Role resource
2021-09-17 20:14:31 +00:00
rules : [ ]
2019-11-19 23:27:12 +00:00
## Repo server service account
## If create is set to true, make sure to uncomment the name and update the rbac section below
serviceAccount :
2021-10-21 11:33:45 +00:00
# -- Create repo server service account
2022-03-10 10:45:15 +00:00
create : true
2021-10-21 11:33:45 +00:00
# -- Repo server service account name
name : "" # "argocd-repo-server"
# -- Annotations applied to created service account
2019-11-19 23:27:12 +00:00
annotations : {}
2021-10-21 11:33:45 +00:00
# -- Automount API credentials for the Service Account
2021-03-18 22:04:52 +00:00
automountServiceAccountToken : true
2019-11-19 23:27:12 +00:00
2021-10-21 11:33:45 +00:00
# -- Additional containers to be added to the repo server pod
2021-09-16 17:59:20 +00:00
extraContainers : [ ]
2021-10-21 11:33:45 +00:00
# -- Repo server rbac rules
rbac : [ ]
2019-12-09 23:03:02 +00:00
# - apiGroups:
# - argoproj.io
# resources:
# - applications
# verbs:
# - get
# - list
# - watch
2019-11-19 23:27:12 +00:00
2022-01-19 19:25:58 +00:00
# Init container to copy argocd binary
copyutil :
# -- Resource limits and requests for the copyutil initContainer
resources : {}
# limits:
# cpu: 50m
# memory: 64Mi
# requests:
# cpu: 10m
# memory: 32Mi
2021-10-21 11:33:45 +00:00
# -- Init containers to add to the repo server pods
initContainers : [ ]
2020-12-15 06:15:13 +00:00
# - name: download-tools
# image: alpine:3.8
# command: [sh, -c]
# args:
# - wget -qO- https://get.helm.sh/helm-v2.16.1-linux-amd64.tar.gz | tar -xvzf - &&
# mv linux-amd64/helm /custom-tools/
# volumeMounts:
# - mountPath: /custom-tools
# name: custom-tools
# volumeMounts:
# - mountPath: /usr/local/bin/helm
# name: custom-tools
# subPath: helm
2019-12-09 00:22:51 +00:00
2022-01-31 15:36:49 +00:00
pdb :
# -- Labels to be added to Repo server pdb
labels : {}
# -- Annotations to be added to Repo server pdb
annotations : {}
# -- Deploy a Poddisruptionbudget for the Repo server
enabled : false
# minAvailable: 1
# maxUnavailable: 0
2022-06-02 12:26:08 +00:00
# -- Secrets with credentials to pull images from a private registry
imagePullSecrets : [ ]
2019-11-05 00:17:25 +00:00
## Argo Configs
configs :
2021-10-21 11:33:45 +00:00
# -- Provide one or multiple [external cluster credentials]
# @default -- `[]` (See [values.yaml])
## Ref:
2022-06-15 13:16:02 +00:00
## - https://argo-cd.readthedocs.io/en/stable/operator-manual/declarative-setup/#clusters
## - https://argo-cd.readthedocs.io/en/stable/operator-manual/security/#external-cluster-credentials
2021-04-14 01:10:04 +00:00
clusterCredentials : [ ]
# - name: mycluster
# server: https://mycluster.com
2021-04-23 23:14:52 +00:00
# labels: {}
2021-04-14 01:10:04 +00:00
# annotations: {}
# config:
# bearerToken: "<authentication token>"
# tlsClientConfig:
# insecure: false
# caData: "<base64 encoded certificate>"
# - name: mycluster2
# server: https://mycluster2.com
2021-04-23 23:14:52 +00:00
# labels: {}
2021-04-14 01:10:04 +00:00
# annotations: {}
# namespaces: namespace1,namespace2
2022-03-01 21:57:52 +00:00
# clusterResources: true
2021-04-14 01:10:04 +00:00
# config:
# bearerToken: "<authentication token>"
# tlsClientConfig:
# insecure: false
# caData: "<base64 encoded certificate>"
2021-10-21 11:33:45 +00:00
# -- GnuPG key ring annotations
2021-07-05 09:41:55 +00:00
gpgKeysAnnotations : {}
2022-06-15 13:16:02 +00:00
# -- [GnuPG](https://argo-cd.readthedocs.io/en/stable/user-guide/gpg-verification/) keys to add to the key ring
2021-10-21 11:33:45 +00:00
# @default -- `{}` (See [values.yaml])
2021-07-05 09:41:55 +00:00
gpgKeys : {}
# 4AEE18F83AFDEB23: |
# -----BEGIN PGP PUBLIC KEY BLOCK-----
#
# mQENBFmUaEEBCACzXTDt6ZnyaVtueZASBzgnAmK13q9Urgch+sKYeIhdymjuMQta
# x15OklctmrZtqre5kwPUosG3/B2/ikuPYElcHgGPL4uL5Em6S5C/oozfkYzhwRrT
# SQzvYjsE4I34To4UdE9KA97wrQjGoz2Bx72WDLyWwctD3DKQtYeHXswXXtXwKfjQ
# 7Fy4+Bf5IPh76dA8NJ6UtjjLIDlKqdxLW4atHe6xWFaJ+XdLUtsAroZcXBeWDCPa
# buXCDscJcLJRKZVc62gOZXXtPfoHqvUPp3nuLA4YjH9bphbrMWMf810Wxz9JTd3v
# yWgGqNY0zbBqeZoGv+TuExlRHT8ASGFS9SVDABEBAAG0NUdpdEh1YiAod2ViLWZs
# b3cgY29tbWl0IHNpZ25pbmcpIDxub3JlcGx5QGdpdGh1Yi5jb20+iQEiBBMBCAAW
# BQJZlGhBCRBK7hj4Ov3rIwIbAwIZAQAAmQEH/iATWFmi2oxlBh3wAsySNCNV4IPf
# DDMeh6j80WT7cgoX7V7xqJOxrfrqPEthQ3hgHIm7b5MPQlUr2q+UPL22t/I+ESF6
# 9b0QWLFSMJbMSk+BXkvSjH9q8jAO0986/pShPV5DU2sMxnx4LfLfHNhTzjXKokws
# +8ptJ8uhMNIDXfXuzkZHIxoXk3rNcjDN5c5X+sK8UBRH092BIJWCOfaQt7v7wig5
# 4Ra28pM9GbHKXVNxmdLpCFyzvyMuCmINYYADsC848QQFFwnd4EQnupo6QvhEVx1O
# j7wDwvuH5dCrLuLwtwXaQh0onG4583p0LGms2Mf5F+Ick6o/4peOlBoZz48=
# =Bvzs
# -----END PGP PUBLIC KEY BLOCK-----
2021-10-21 11:33:45 +00:00
# -- Known Hosts configmap annotations
2020-07-12 14:56:48 +00:00
knownHostsAnnotations : {}
2019-11-05 00:17:25 +00:00
knownHosts :
data :
2021-10-21 11:33:45 +00:00
# -- Known Hosts
# @default -- See [values.yaml]
2019-11-05 00:17:25 +00:00
ssh_known_hosts : |
bitbucket.org ssh-rsa AAAAB3NzaC1yc2EAAAABIwAAAQEAubiN81eDcafrgMeLzaFPsw2kNvEcqTKl/VqLat/MaB33pZy0y3rJZtnqwR2qOOvbwKZYKiEO1O6VqNEBxKvJJelCq0dTXWT5pbO2gDXC6h6QDXCaHo6pOHGPUy+YBaGQRGuSusMEASYiWunYN0vCAI8QaXnWMXNMdFP3jHAJH0eDsoiGnLPBlBp4TNm6rYI74nMzgz3B9IikW4WVK+dc8KZJZWYjAuORU3jc1c/NPskD2ASinf8v3xnfXeukU0sJ5N6m5E8VLjObPEO+mN2t/FZTMZLiFqPWc/ALSqnMnnhwrNi2rbfg/rd/IpL8Le3pSBne8+seeFVBoGqzHM9yXw==
2021-11-17 07:42:35 +00:00
github.com ecdsa-sha2-nistp256 AAAAE2VjZHNhLXNoYTItbmlzdHAyNTYAAAAIbmlzdHAyNTYAAABBBEmKSENjQEezOmxkZMy7opKgwFB9nkt5YRrYMjNuG5N87uRgg6CLrbo5wAdT/y6v0mKV0U2w0WZ2YB/++Tpockg=
github.com ssh-ed25519 AAAAC3NzaC1lZDI1NTE5AAAAIOMqqnkVzrm0SdG6UOoqKLsabgH5C9okWi0dh2l9GKJl
2019-11-05 00:17:25 +00:00
github.com ssh-rsa AAAAB3NzaC1yc2EAAAABIwAAAQEAq2A7hRGmdnm9tUDbO9IDSwBK6TbQa+PXYPCPy6rbTrTtw7PHkccKrpp0yVhp5HdEIcKr6pLlVDBfOLX9QUsyCOV0wzfjIJNlGEYsdlLJizHhbn2mUjvSAHQqZETYP81eFzLQNnPHt4EVVUh7VfDESU84KezmD5QlWpXLmvU31/yMf+Se8xhHTvKSCZIFImWwoG6mbUoWf9nzpIoaSjB+weqqUUmpaaasXVal72J+UX2B+2RPW3RcT0eOzQgqlJL3RKrTJvdsjE3JEAvGq3lGHSZXy28G3skua2SmVi/w4yCE6gbODqnTWlg7+wC604ydGXA8VJiS5ap43JXiUFFAaQ==
gitlab.com ecdsa-sha2-nistp256 AAAAE2VjZHNhLXNoYTItbmlzdHAyNTYAAAAIbmlzdHAyNTYAAABBBFSMqzJeV9rUzU4kWitGjeR4PWSa29SPqJ1fVkhtj3Hw9xjLVXVYrU9QlYWrOLXBpQ6KWjbjTDTdDkoohFzgbEY=
gitlab.com ssh-ed25519 AAAAC3NzaC1lZDI1NTE5AAAAIAfuCHKVTjquxvt6CM6tdG4SLp1Btn/nOeHHE5UOzRdf
gitlab.com ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQCsj2bNKTBSpIYDEGk9KxsGh3mySTRgMtXL583qmBpzeQ+jqCMRgBqB98u3z++J1sKlXHWfM9dyhSevkMwSbhoR8XIq/U0tCNyokEi/ueaBMCvbcTHhO7FcwzY92WK4Yt0aGROY5qX2UKSeOvuP4D6TPqKF1onrSzH9bx9XUf2lEdWT/ia1NEKjunUqu1xOB/StKDHMoX4/OKyIzuS0q/T1zOATthvasJFoPrAjkohTyaDUz2LN5JoH839hViyEG82yB+MjcFV5MU3N1l1QL3cVUCh93xSaua1N85qivl+siMkPGbO5xR/En4iEY6K2XPASUEMaieWVNTRCtJ4S8H+9
ssh.dev.azure.com ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQC7Hr1oTWqNqOlzGJOfGJ4NakVyIzf1rXYd4d7wo6jBlkLvCA4odBlL0mDUyZ0/QUfTTqeu+tm22gOsv+VrVTMk6vwRU75gY/y9ut5Mb3bR5BV58dKXyq9A9UeB5Cakehn5Zgm6x1mKoVyf+FFn26iYqXJRgzIZZcZ5V6hrE0Qg39kZm4az48o0AUbf6Sp4SLdvnuMa2sVNwHBboS7EJkm57XQPVU3/QpyNLHbWDdzwtrlS+ez30S3AdYhLKEOxAG8weOnyrtLJAUen9mTkol8oII1edf7mWWbWVf0nBmly21+nZcmCTISQBtdcyPaEno7fFQMDD26/s0lfKob4Kw8H
vs-ssh.visualstudio.com ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQC7Hr1oTWqNqOlzGJOfGJ4NakVyIzf1rXYd4d7wo6jBlkLvCA4odBlL0mDUyZ0/QUfTTqeu+tm22gOsv+VrVTMk6vwRU75gY/y9ut5Mb3bR5BV58dKXyq9A9UeB5Cakehn5Zgm6x1mKoVyf+FFn26iYqXJRgzIZZcZ5V6hrE0Qg39kZm4az48o0AUbf6Sp4SLdvnuMa2sVNwHBboS7EJkm57XQPVU3/QpyNLHbWDdzwtrlS+ez30S3AdYhLKEOxAG8weOnyrtLJAUen9mTkol8oII1edf7mWWbWVf0nBmly21+nZcmCTISQBtdcyPaEno7fFQMDD26/s0lfKob4Kw8H
2021-10-21 11:33:45 +00:00
# -- TLS certificate configmap annotations
2020-07-12 14:56:48 +00:00
tlsCertsAnnotations : {}
2021-10-21 11:33:45 +00:00
# -- TLS certificate
# @default -- See [values.yaml]
2019-11-21 04:40:15 +00:00
tlsCerts :
{}
2019-11-05 00:17:25 +00:00
# data:
# argocd.example.com: |
# -----BEGIN CERTIFICATE-----
# MIIF1zCCA7+gAwIBAgIUQdTcSHY2Sxd3Tq/v1eIEZPCNbOowDQYJKoZIhvcNAQEL
# BQAwezELMAkGA1UEBhMCREUxFTATBgNVBAgMDExvd2VyIFNheG9ueTEQMA4GA1UE
# BwwHSGFub3ZlcjEVMBMGA1UECgwMVGVzdGluZyBDb3JwMRIwEAYDVQQLDAlUZXN0
# c3VpdGUxGDAWBgNVBAMMD2Jhci5leGFtcGxlLmNvbTAeFw0xOTA3MDgxMzU2MTda
# Fw0yMDA3MDcxMzU2MTdaMHsxCzAJBgNVBAYTAkRFMRUwEwYDVQQIDAxMb3dlciBT
# YXhvbnkxEDAOBgNVBAcMB0hhbm92ZXIxFTATBgNVBAoMDFRlc3RpbmcgQ29ycDES
# MBAGA1UECwwJVGVzdHN1aXRlMRgwFgYDVQQDDA9iYXIuZXhhbXBsZS5jb20wggIi
# MA0GCSqGSIb3DQEBAQUAA4ICDwAwggIKAoICAQCv4mHMdVUcafmaSHVpUM0zZWp5
# NFXfboxA4inuOkE8kZlbGSe7wiG9WqLirdr39Ts+WSAFA6oANvbzlu3JrEQ2CHPc
# CNQm6diPREFwcDPFCe/eMawbwkQAPVSHPts0UoRxnpZox5pn69ghncBR+jtvx+/u
# P6HdwW0qqTvfJnfAF1hBJ4oIk2AXiip5kkIznsAh9W6WRy6nTVCeetmIepDOGe0G
# ZJIRn/OfSz7NzKylfDCat2z3EAutyeT/5oXZoWOmGg/8T7pn/pR588GoYYKRQnp+
# YilqCPFX+az09EqqK/iHXnkdZ/Z2fCuU+9M/Zhrnlwlygl3RuVBI6xhm/ZsXtL2E
# Gxa61lNy6pyx5+hSxHEFEJshXLtioRd702VdLKxEOuYSXKeJDs1x9o6cJ75S6hko
# Ml1L4zCU+xEsMcvb1iQ2n7PZdacqhkFRUVVVmJ56th8aYyX7KNX6M9CD+kMpNm6J
# kKC1li/Iy+RI138bAvaFplajMF551kt44dSvIoJIbTr1LigudzWPqk31QaZXV/4u
# kD1n4p/XMc9HYU/was/CmQBFqmIZedTLTtK7clkuFN6wbwzdo1wmUNgnySQuMacO
# gxhHxxzRWxd24uLyk9Px+9U3BfVPaRLiOPaPoC58lyVOykjSgfpgbus7JS69fCq7
# bEH4Jatp/10zkco+UQIDAQABo1MwUTAdBgNVHQ4EFgQUjXH6PHi92y4C4hQpey86
# r6+x1ewwHwYDVR0jBBgwFoAUjXH6PHi92y4C4hQpey86r6+x1ewwDwYDVR0TAQH/
# BAUwAwEB/zANBgkqhkiG9w0BAQsFAAOCAgEAFE4SdKsX9UsLy+Z0xuHSxhTd0jfn
# Iih5mtzb8CDNO5oTw4z0aMeAvpsUvjJ/XjgxnkiRACXh7K9hsG2r+ageRWGevyvx
# CaRXFbherV1kTnZw4Y9/pgZTYVWs9jlqFOppz5sStkfjsDQ5lmPJGDii/StENAz2
# XmtiPOgfG9Upb0GAJBCuKnrU9bIcT4L20gd2F4Y14ccyjlf8UiUi192IX6yM9OjT
# +TuXwZgqnTOq6piVgr+FTSa24qSvaXb5z/mJDLlk23npecTouLg83TNSn3R6fYQr
# d/Y9eXuUJ8U7/qTh2Ulz071AO9KzPOmleYPTx4Xty4xAtWi1QE5NHW9/Ajlv5OtO
# OnMNWIs7ssDJBsB7VFC8hcwf79jz7kC0xmQqDfw51Xhhk04kla+v+HZcFW2AO9so
# 6ZdVHHQnIbJa7yQJKZ+hK49IOoBR6JgdB5kymoplLLiuqZSYTcwSBZ72FYTm3iAr
# jzvt1hxpxVDmXvRnkhRrIRhK4QgJL0jRmirBjDY+PYYd7bdRIjN7WNZLFsgplnS8
# 9w6CwG32pRlm0c8kkiQ7FXA6BYCqOsDI8f1VGQv331OpR2Ck+FTv+L7DAmg6l37W
# +LB9LGh4OAp68ImTjqf6ioGKG0RBSznwME+r4nXtT1S/qLR6ASWUS4ViWRhbRlNK
# XWyb96wrUlv+E8I=
# -----END CERTIFICATE-----
2021-10-21 11:33:45 +00:00
# -- Repository credentials to be used as Templates for other repos
## Creates a secret for each key/value specified below to create repository credentials
2021-08-26 13:42:47 +00:00
credentialTemplates : {}
# github-enterprise-creds-1:
# url: https://github.com/argoproj
# githubAppID: 1
# githubAppInstallationID: 2
# githubAppEnterpriseBaseUrl: https://ghe.example.com/api/v3
# githubAppPrivateKey: |
# -----BEGIN OPENSSH PRIVATE KEY-----
# ...
# -----END OPENSSH PRIVATE KEY-----
# https-creds:
# url: https://github.com/argoproj
# password: my-password
# username: my-username
# ssh-creds:
# url: git@github.com:argoproj-labs
# sshPrivateKey: |
# -----BEGIN OPENSSH PRIVATE KEY-----
# ...
# -----END OPENSSH PRIVATE KEY-----
2022-06-08 06:03:58 +00:00
# -- Annotations to be added to `configs.credentialTemplates` Secret
credentialTemplatesAnnotations : {}
2021-10-21 11:33:45 +00:00
# -- Repositories list to be used by applications
## Creates a secret for each key/value specified below to create repositories
## Note: the last example in the list would use a repository credential template, configured under "configs.repositoryCredentials".
2021-08-26 13:42:47 +00:00
repositories : {}
# istio-helm-repo:
# url: https://storage.googleapis.com/istio-prerelease/daily-build/master-latest-daily/charts
# name: istio.io
# type: helm
# private-helm-repo:
# url: https://my-private-chart-repo.internal
# name: private-repo
# type: helm
# password: my-password
# username: my-username
# private-repo:
# url: https://github.com/argoproj/private-repo
2022-06-08 06:03:58 +00:00
# -- Annotations to be added to `configs.repositories` Secret
repositoriesAnnotations : {}
2019-11-05 00:17:25 +00:00
secret :
2021-10-21 11:33:45 +00:00
# -- Create the argocd-secret
2019-11-05 00:17:25 +00:00
createSecret : true
2021-10-21 11:33:45 +00:00
# -- Annotations to be added to argocd-secret
2020-04-16 12:44:52 +00:00
annotations : {}
2019-12-05 02:52:22 +00:00
2021-10-21 11:33:45 +00:00
# -- Shared secret for authenticating GitHub webhook events
2019-11-05 00:17:25 +00:00
githubSecret : ""
2021-10-21 11:33:45 +00:00
# -- Shared secret for authenticating GitLab webhook events
2019-11-05 00:17:25 +00:00
gitlabSecret : ""
2021-10-21 11:33:45 +00:00
# -- Shared secret for authenticating BitbucketServer webhook events
2019-12-05 02:52:22 +00:00
bitbucketServerSecret : ""
2021-10-21 11:33:45 +00:00
# -- UUID for authenticating Bitbucket webhook events
2020-03-26 20:27:13 +00:00
bitbucketUUID : ""
2021-10-21 11:33:45 +00:00
# -- Shared secret for authenticating Gogs webhook events
2019-12-05 02:52:22 +00:00
gogsSecret : ""
2019-12-05 02:25:45 +00:00
2021-10-21 11:33:45 +00:00
# -- add additional secrets to be added to argocd-secret
## Custom secrets. Useful for injecting SSO secrets into environment variables.
2022-06-15 13:16:02 +00:00
## Ref: https://argo-cd.readthedocs.io/en/stable/operator-manual/user-management/#sensitive-data-and-sso-client-secrets
2021-10-21 11:33:45 +00:00
## Note that all values must be non-empty.
2020-12-15 06:15:13 +00:00
extra :
{}
2020-01-09 16:55:14 +00:00
# LDAP_PASSWORD: "mypassword"
2021-10-21 11:33:45 +00:00
# -- Argo TLS Data
2019-12-09 23:12:00 +00:00
argocdServerTlsConfig :
{}
# key:
# crt: |
# -----BEGIN CERTIFICATE-----
# <cert data>
# -----END CERTIFICATE-----
# -----BEGIN CERTIFICATE-----
# <ca cert data>
# -----END CERTIFICATE-----
2021-10-21 11:33:45 +00:00
# -- Bcrypt hashed admin password
## Argo expects the password in the secret to be bcrypt hashed. You can create this hash with
## `htpasswd -nbBC 10 "" $ARGO_PWD | tr -d ':\n' | sed 's/$2y/$2a/'`
argocdServerAdminPassword : ""
# -- Admin password modification time. Eg. `"2006-01-02T15:04:05Z"`
# @default -- `""` (defaults to current time)
argocdServerAdminPasswordMtime : ""
# -- Define custom [CSS styles] for your argo instance.
# This setting will automatically mount the provided CSS and reference it in the argo configuration.
# @default -- `""` (See [values.yaml])
## Ref: https://argo-cd.readthedocs.io/en/stable/operator-manual/custom-styles/
styles : ""
2021-05-16 15:32:19 +00:00
# styles: |
# .nav-bar {
# background: linear-gradient(to bottom, #999, #777, #333, #222, #111);
# }
2020-04-20 23:59:48 +00:00
openshift :
2021-10-21 11:33:45 +00:00
# -- enables using arbitrary uid for argo repo server
2020-04-20 23:59:48 +00:00
enabled : false
2022-03-16 21:01:30 +00:00
applicationSet :
2022-03-18 16:41:56 +00:00
# -- Enable Application Set controller
enabled : true
2022-03-16 21:01:30 +00:00
# -- Application Set controller name string
name : applicationset-controller
# -- The number of controller pods to run
replicaCount : 1
image :
# -- Repository to use for the application set controller
2022-06-14 10:10:08 +00:00
# @default -- `""` (defaults to global.image.repository)
repository : ""
2022-03-16 21:01:30 +00:00
# -- Tag to use for the application set controller
2022-06-14 10:10:08 +00:00
# @default -- `""` (defaults to global.image.tag)
tag : ""
2022-05-05 21:59:18 +00:00
# -- Image pull policy for the application set controller
# @default -- `""` (defaults to global.image.imagePullPolicy)
imagePullPolicy : ""
2022-03-16 21:01:30 +00:00
args :
# -- The default metric address
metricsAddr : : 8080
# -- The default health check port
probeBindAddr : : 8081
# -- The default leader election setting
enableLeaderElection : false
# -- How application is synced between the generator and the cluster
policy : sync
# -- Print debug logs
debug : false
# -- Enable dry run mode
dryRun : false
2022-08-25 10:41:43 +00:00
# -- ApplicationSet controller log format. Either `text` or `json`
# @default -- `""` (defaults to global.logging.format)
logFormat : ""
# -- ApplicationSet controller log level. One of: `debug`, `info`, `warn`, `error`
# @default -- `""` (defaults to global.logging.level)
logLevel : ""
2022-03-16 21:01:30 +00:00
# -- Additional containers to be added to the applicationset controller pod
extraContainers : [ ]
2022-03-28 21:01:54 +00:00
## Metrics service configuration
2022-03-16 21:01:30 +00:00
metrics :
# -- Deploy metrics service
enabled : false
service :
# -- Metrics service annotations
annotations : {}
# -- Metrics service labels
labels : {}
# -- Metrics service port
servicePort : 8085
2022-05-10 07:40:49 +00:00
# -- Metrics service port name
portName : http-metrics
2022-03-16 21:01:30 +00:00
serviceMonitor :
# -- Enable a prometheus ServiceMonitor
enabled : false
# -- Prometheus ServiceMonitor interval
interval : 30s
# -- Prometheus [RelabelConfigs] to apply to samples before scraping
relabelings : [ ]
# -- Prometheus [MetricRelabelConfigs] to apply to samples before ingestion
metricRelabelings : [ ]
# -- Prometheus ServiceMonitor selector
selector : {}
# prometheus: kube-prometheus
2022-05-10 07:40:49 +00:00
# -- Prometheus ServiceMonitor scheme
scheme : ""
# -- Prometheus ServiceMonitor tlsConfig
tlsConfig : {}
2022-03-16 21:01:30 +00:00
# -- Prometheus ServiceMonitor namespace
namespace : "" # monitoring
# -- Prometheus ServiceMonitor labels
additionalLabels : {}
# -- If defined, uses a Secret to pull an image from a private Docker registry or repository.
imagePullSecrets : [ ]
## Application set service configuration
service :
# -- Application set service annotations
annotations : {}
# -- Application set service labels
labels : {}
# -- Application set service port
port : 7000
# -- Application set service port name
portName : webhook
serviceAccount :
# -- Specifies whether a service account should be created
create : true
# -- Annotations to add to the service account
annotations : {}
# -- The name of the service account to use.
# If not set and create is true, a name is generated using the fullname template
name : ""
# -- Annotations for the controller pods
podAnnotations : {}
# -- Labels for the controller pods
podLabels : {}
# -- Pod Security Context
podSecurityContext : {}
# fsGroup: 2000
# -- Security Context
securityContext : {}
# capabilities:
# drop:
# - ALL
# readOnlyRootFilesystem: true
# runAsNonRoot: true
# runAsUser: 1000
# -- Resource limits and requests for the controller pods.
resources : {}
# We usually recommend not to specify default resources and to leave this as a conscious
# choice for the user. This also increases chances charts run on environments with little
# resources, such as Minikube. If you do want to specify resources, uncomment the following
# lines, adjust them as necessary, and remove the curly braces after 'resources:'.
# limits:
# cpu: 100m
# memory: 128Mi
# requests:
# cpu: 100m
# memory: 128Mi
# -- [Node selector]
nodeSelector : {}
# -- [Tolerations] for use with node taints
tolerations : [ ]
# -- Assign custom [affinity] rules
affinity : {}
# -- If specified, indicates the pod's priority. If not specified, the pod priority will be default or zero if there is no default.
priorityClassName : ""
# -- List of extra mounts to add (normally used with extraVolumes)
extraVolumeMounts : [ ]
# - mountPath: /tmp/foobar
# name: foobar
# -- List of extra volumes to add
extraVolumes : [ ]
# - name: foobar
# emptyDir: {}
# -- List of extra cli args to add
extraArgs : [ ]
# -- Environment variables to pass to the controller
extraEnv : [ ]
# - name: "MY_VAR"
# value: "value"
# -- envFrom to pass to the controller
# @default -- `[]` (See [values.yaml])
extraEnvFrom : [ ]
# - configMapRef:
# name: config-map-name
# - secretRef:
# name: secret-name
## Webhook for the Git Generator
## Ref: https://argocd-applicationset.readthedocs.io/en/master/Generators-Git/#webhook-configuration)
webhook :
ingress :
# -- Enable an ingress resource for Webhooks
enabled : false
# -- Additional ingress annotations
annotations : {}
# -- Additional ingress labels
labels : {}
# -- Defines which ingress controller will implement the resource
ingressClassName : ""
# -- List of ingress hosts
## Hostnames must be provided if Ingress is enabled.
## Secrets must be manually created in the namespace
hosts : [ ]
# - argocd-applicationset.example.com
# -- List of ingress paths
paths :
- /api/webhook
# -- Ingress path type. One of `Exact`, `Prefix` or `ImplementationSpecific`
pathType : Prefix
# -- Additional ingress paths
extraPaths : [ ]
# - path: /*
# backend:
# serviceName: ssl-redirect
# servicePort: use-annotation
## for Kubernetes >=1.19 (when "networking.k8s.io/v1" is used)
# - path: /*
# pathType: Prefix
# backend:
# service:
# name: ssl-redirect
# port:
# name: use-annotation
# -- Ingress TLS configuration
tls : [ ]
# - secretName: argocd-applicationset-tls
# hosts:
# - argocd-applicationset.example.com
notifications :
2022-03-18 16:41:56 +00:00
# -- Enable Notifications controller
enabled : true
2022-03-16 21:01:30 +00:00
# -- Notifications controller name string
name : notifications-controller
# -- Assign custom [affinity] rules
affinity : {}
# -- Argo CD dashboard url; used in place of {{.context.argocdUrl}} in templates
argocdUrl :
image :
# -- Repository to use for the notifications controller
# @default -- `""` (defaults to global.image.repository)
repository : ""
# -- Tag to use for the notifications controller
# @default -- `""` (defaults to global.image.tag)
tag : ""
# -- Image pull policy for the notifications controller
# @default -- `""` (defaults to global.image.imagePullPolicy)
imagePullPolicy : ""
# -- Secrets with credentials to pull images from a private registry
imagePullSecrets : [ ]
# -- [Node selector]
nodeSelector : {}
# -- The deployment strategy to use to replace existing pods with new ones
updateStrategy :
type : Recreate
# -- Define user-defined context
## For more information: https://argocd-notifications.readthedocs.io/en/stable/templates/#defining-user-defined-context
context : {}
# region: east
# environmentName: staging
secret :
# -- Whether helm chart creates controller secret
create : true
# -- key:value pairs of annotations to be added to the secret
annotations : {}
# -- Generic key:value pairs to be inserted into the secret
## Can be used for templates, notification services etc. Some examples given below.
## For more information: https://argocd-notifications.readthedocs.io/en/stable/services/overview/
items : {}
# slack-token:
# # For more information: https://argocd-notifications.readthedocs.io/en/stable/services/slack/
# grafana-apiKey:
# # For more information: https://argocd-notifications.readthedocs.io/en/stable/services/grafana/
# webhooks-github-token:
# email-username:
# email-password:
# For more information: https://argocd-notifications.readthedocs.io/en/stable/services/email/
2022-05-30 16:19:38 +00:00
# -- Application controller log format. Either `text` or `json`
2022-08-25 10:41:43 +00:00
# @default -- `""` (defaults to global.logging.format)
logFormat : ""
# -- Application controller log level. One of: `debug`, `info`, `warn`, `error`
# @default -- `""` (defaults to global.logging.level)
logLevel : ""
2022-03-16 21:01:30 +00:00
# -- Extra arguments to provide to the controller
extraArgs : [ ]
# -- Additional container environment variables
extraEnv : [ ]
# -- List of extra mounts to add (normally used with extraVolumes)
extraVolumeMounts : [ ]
# - mountPath: /tmp/foobar
# name: foobar
# -- List of extra volumes to add
extraVolumes : [ ]
# - name: foobar
# emptyDir: {}
metrics :
# -- Enables prometheus metrics server
enabled : false
# -- Metrics port
port : 9001
service :
# -- Metrics service annotations
annotations : {}
# -- Metrics service labels
labels : {}
2022-05-10 07:40:49 +00:00
# -- Metrics service port name
portName : http-metrics
2022-03-16 21:01:30 +00:00
serviceMonitor :
# -- Enable a prometheus ServiceMonitor
enabled : false
2022-03-17 17:15:20 +00:00
# -- Prometheus ServiceMonitor selector
selector : {}
# prometheus: kube-prometheus
2022-03-16 21:01:30 +00:00
# -- Prometheus ServiceMonitor labels
additionalLabels : {}
# namespace: monitoring
# interval: 30s
# scrapeTimeout: 10s
2022-05-10 07:40:49 +00:00
# -- Prometheus ServiceMonitor scheme
scheme : ""
# -- Prometheus ServiceMonitor tlsConfig
tlsConfig : {}
2022-03-16 21:01:30 +00:00
2022-04-12 14:28:04 +00:00
# -- Configures notification services such as slack, email or custom webhook
2022-03-16 21:01:30 +00:00
# @default -- See [values.yaml]
## For more information: https://argocd-notifications.readthedocs.io/en/stable/services/overview/
2022-03-29 11:24:04 +00:00
notifiers : {}
# service.slack: |
# token: $slack-token
2022-03-16 21:01:30 +00:00
# -- Annotations to be applied to the controller Pods
podAnnotations : {}
# -- Labels to be applied to the controller Pods
podLabels : {}
# -- Pod Security Context
securityContext :
runAsNonRoot : true
# -- Container Security Context
containerSecurityContext : {}
2022-09-06 10:13:28 +00:00
# -- Priority class for the controller pods
priorityClassName : ""
2022-03-16 21:01:30 +00:00
# -- Resource limits and requests for the controller
resources : {}
# limits:
# cpu: 100m
# memory: 128Mi
# requests:
# cpu: 100m
# memory: 128Mi
serviceAccount :
# -- Specifies whether a service account should be created
create : true
# -- The name of the service account to use.
## If not set and create is true, a name is generated using the fullname template
name : argocd-notifications-controller
# -- Annotations applied to created service account
annotations : {}
cm :
# -- Whether helm chart creates controller config map
create : true
# -- Contains centrally managed global application subscriptions
## For more information: https://argocd-notifications.readthedocs.io/en/stable/subscriptions/
2022-03-28 13:17:43 +00:00
subscriptions : [ ]
2022-03-16 21:01:30 +00:00
# # subscription for on-sync-status-unknown trigger notifications
# - recipients:
# - slack:test2
# - email:test@gmail.com
# triggers:
# - on-sync-status-unknown
# # subscription restricted to applications with matching labels only
# - recipients:
# - slack:test3
# selector: test=true
# triggers:
# - on-sync-status-unknown
# -- The notification template is used to generate the notification content
## For more information: https://argocd-notifications.readthedocs.io/en/stable/templates/
templates : {}
# template.app-deployed: |
# email:
# subject: New version of an application {{.app.metadata.name}} is up and running.
# message: |
# {{if eq .serviceType "slack"}}:white_check_mark:{{end}} Application {{.app.metadata.name}} is now running new version of deployments manifests.
# slack:
# attachments: |
# [{
# "title": "{{ .app.metadata.name}}",
# "title_link":"{{.context.argocdUrl}}/applications/{{.app.metadata.name}}",
# "color": "#18be52",
# "fields": [
# {
# "title": "Sync Status",
# "value": "{{.app.status.sync.status}}",
# "short": true
# },
# {
# "title": "Repository",
# "value": "{{.app.spec.source.repoURL}}",
# "short": true
# },
# {
# "title": "Revision",
# "value": "{{.app.status.sync.revision}}",
# "short": true
# }
# {{range $index, $c := .app.status.conditions}}
# {{if not $index}},{{end}}
# {{if $index}},{{end}}
# {
# "title": "{{$c.type}}",
# "value": "{{$c.message}}",
# "short": true
# }
# {{end}}
# ]
# }]
# template.app-health-degraded: |
# email:
# subject: Application {{.app.metadata.name}} has degraded.
# message: |
# {{if eq .serviceType "slack"}}:exclamation:{{end}} Application {{.app.metadata.name}} has degraded.
# Application details: {{.context.argocdUrl}}/applications/{{.app.metadata.name}}.
# slack:
# attachments: |-
# [{
# "title": "{{ .app.metadata.name}}",
# "title_link": "{{.context.argocdUrl}}/applications/{{.app.metadata.name}}",
# "color": "#f4c030",
# "fields": [
# {
# "title": "Sync Status",
# "value": "{{.app.status.sync.status}}",
# "short": true
# },
# {
# "title": "Repository",
# "value": "{{.app.spec.source.repoURL}}",
# "short": true
# }
# {{range $index, $c := .app.status.conditions}}
# {{if not $index}},{{end}}
# {{if $index}},{{end}}
# {
# "title": "{{$c.type}}",
# "value": "{{$c.message}}",
# "short": true
# }
# {{end}}
# ]
# }]
# template.app-sync-failed: |
# email:
# subject: Failed to sync application {{.app.metadata.name}}.
# message: |
# {{if eq .serviceType "slack"}}:exclamation:{{end}} The sync operation of application {{.app.metadata.name}} has failed at {{.app.status.operationState.finishedAt}} with the following error: {{.app.status.operationState.message}}
# Sync operation details are available at: {{.context.argocdUrl}}/applications/{{.app.metadata.name}}?operation=true .
# slack:
# attachments: |-
# [{
# "title": "{{ .app.metadata.name}}",
# "title_link":"{{.context.argocdUrl}}/applications/{{.app.metadata.name}}",
# "color": "#E96D76",
# "fields": [
# {
# "title": "Sync Status",
# "value": "{{.app.status.sync.status}}",
# "short": true
# },
# {
# "title": "Repository",
# "value": "{{.app.spec.source.repoURL}}",
# "short": true
# }
# {{range $index, $c := .app.status.conditions}}
# {{if not $index}},{{end}}
# {{if $index}},{{end}}
# {
# "title": "{{$c.type}}",
# "value": "{{$c.message}}",
# "short": true
# }
# {{end}}
# ]
# }]
# template.app-sync-running: |
# email:
# subject: Start syncing application {{.app.metadata.name}}.
# message: |
# The sync operation of application {{.app.metadata.name}} has started at {{.app.status.operationState.startedAt}}.
# Sync operation details are available at: {{.context.argocdUrl}}/applications/{{.app.metadata.name}}?operation=true .
# slack:
# attachments: |-
# [{
# "title": "{{ .app.metadata.name}}",
# "title_link":"{{.context.argocdUrl}}/applications/{{.app.metadata.name}}",
# "color": "#0DADEA",
# "fields": [
# {
# "title": "Sync Status",
# "value": "{{.app.status.sync.status}}",
# "short": true
# },
# {
# "title": "Repository",
# "value": "{{.app.spec.source.repoURL}}",
# "short": true
# }
# {{range $index, $c := .app.status.conditions}}
# {{if not $index}},{{end}}
# {{if $index}},{{end}}
# {
# "title": "{{$c.type}}",
# "value": "{{$c.message}}",
# "short": true
# }
# {{end}}
# ]
# }]
# template.app-sync-status-unknown: |
# email:
# subject: Application {{.app.metadata.name}} sync status is 'Unknown'
# message: |
# {{if eq .serviceType "slack"}}:exclamation:{{end}} Application {{.app.metadata.name}} sync is 'Unknown'.
# Application details: {{.context.argocdUrl}}/applications/{{.app.metadata.name}}.
# {{if ne .serviceType "slack"}}
# {{range $c := .app.status.conditions}}
# * {{$c.message}}
# {{end}}
# {{end}}
# slack:
# attachments: |-
# [{
# "title": "{{ .app.metadata.name}}",
# "title_link":"{{.context.argocdUrl}}/applications/{{.app.metadata.name}}",
# "color": "#E96D76",
# "fields": [
# {
# "title": "Sync Status",
# "value": "{{.app.status.sync.status}}",
# "short": true
# },
# {
# "title": "Repository",
# "value": "{{.app.spec.source.repoURL}}",
# "short": true
# }
# {{range $index, $c := .app.status.conditions}}
# {{if not $index}},{{end}}
# {{if $index}},{{end}}
# {
# "title": "{{$c.type}}",
# "value": "{{$c.message}}",
# "short": true
# }
# {{end}}
# ]
# }]
# template.app-sync-succeeded: |
# email:
# subject: Application {{.app.metadata.name}} has been successfully synced.
# message: |
# {{if eq .serviceType "slack"}}:white_check_mark:{{end}} Application {{.app.metadata.name}} has been successfully synced at {{.app.status.operationState.finishedAt}}.
# Sync operation details are available at: {{.context.argocdUrl}}/applications/{{.app.metadata.name}}?operation=true .
# slack:
2022-03-29 11:24:04 +00:00
# attachments: |-
# [{
# "title": "{{ .app.metadata.name}}",
# "title_link":"{{.context.argocdUrl}}/applications/{{.app.metadata.name}}",
# "color": "#18be52",
# "fields": [
# {
# "title": "Sync Status",
# "value": "{{.app.status.sync.status}}",
# "short": true
# },
# {
# "title": "Repository",
# "value": "{{.app.spec.source.repoURL}}",
# "short": true
# }
# {{range $index, $c := .app.status.conditions}}
# {{if not $index}},{{end}}
# {{if $index}},{{end}}
# {
# "title": "{{$c.type}}",
# "value": "{{$c.message}}",
# "short": true
# }
# {{end}}
# ]
# }]
2022-03-16 21:01:30 +00:00
# -- [Tolerations] for use with node taints
tolerations : [ ]
# -- The trigger defines the condition when the notification should be sent
## For more information: https://argocd-notifications.readthedocs.io/en/stable/triggers/
triggers : {}
# trigger.on-deployed: |
# - description: Application is synced and healthy. Triggered once per commit.
# oncePer: app.status.sync.revision
# send:
# - app-deployed
# when: app.status.operationState.phase in ['Succeeded'] and app.status.health.status == 'Healthy'
# trigger.on-health-degraded: |
# - description: Application has degraded
# send:
# - app-health-degraded
# when: app.status.health.status == 'Degraded'
# trigger.on-sync-failed: |
# - description: Application syncing has failed
# send:
# - app-sync-failed
# when: app.status.operationState.phase in ['Error', 'Failed']
# trigger.on-sync-running: |
# - description: Application is being synced
# send:
# - app-sync-running
# when: app.status.operationState.phase in ['Running']
# trigger.on-sync-status-unknown: |
# - description: Application status is 'Unknown'
# send:
# - app-sync-status-unknown
# when: app.status.sync.status == 'Unknown'
# trigger.on-sync-succeeded: |
# - description: Application syncing has succeeded
# send:
# - app-sync-succeeded
# when: app.status.operationState.phase in ['Succeeded']
#
# For more information: https://argocd-notifications.readthedocs.io/en/stable/triggers/#default-triggers
# defaultTriggers: |
# - on-sync-status-unknown
## The optional bot component simplifies managing subscriptions
## For more information: https://argocd-notifications.readthedocs.io/en/stable/bots/overview/
bots :
slack :
# -- Enable slack bot
## You have to set secret.notifiers.slack.signingSecret
enabled : false
# -- The deployment strategy to use to replace existing pods with new ones
updateStrategy :
type : Recreate
image :
# -- Repository to use for the Slack bot
# @default -- `""` (defaults to global.image.repository)
repository : ""
# -- Tag to use for the Slack bot
# @default -- `""` (defaults to global.image.tag)
tag : ""
# -- Image pull policy for the Slack bot
# @default -- `""` (defaults to global.image.imagePullPolicy)
imagePullPolicy : ""
# -- Secrets with credentials to pull images from a private registry
imagePullSecrets : [ ]
service :
# -- Service annotations for Slack bot
annotations : {}
# -- Service port for Slack bot
port : 80
# -- Service type for Slack bot
type : LoadBalancer
serviceAccount :
# -- Specifies whether a service account should be created
create : true
# -- The name of the service account to use.
## If not set and create is true, a name is generated using the fullname template
name : argocd-notifications-bot
# -- Annotations applied to created service account
annotations : {}
# -- Pod Security Context
securityContext :
runAsNonRoot : true
# -- Container Security Context
containerSecurityContext : {}
# -- Resource limits and requests for the Slack bot
resources : {}
# limits:
# cpu: 100m
# memory: 128Mi
# requests:
# cpu: 100m
# memory: 128Mi
# -- Assign custom [affinity] rules
affinity : {}
# -- [Tolerations] for use with node taints
tolerations : [ ]
# -- [Node selector]
nodeSelector : {}