2022-12-19 16:26:07 +01:00
# -- Internal settings used with `helm template` to generate install manifest
# @ignored
templating :
enabled : false
debug : false
2023-01-20 17:28:34 +01:00
version : ~
2022-12-19 16:26:07 +01:00
2023-01-20 17:28:34 +01:00
# -- (string) Override the name of the chart
nameOverride : ~
2022-02-25 19:25:21 +01:00
2023-01-20 17:28:34 +01:00
# -- (string) Override the expanded name of the chart
fullnameOverride : ~
2022-02-25 19:25:21 +01:00
2023-01-20 17:28:34 +01:00
# -- (string) Override the namespace the chart deploys to
namespaceOverride : ~
2022-02-25 19:25:21 +01:00
2023-05-03 09:37:20 +02:00
upgrade :
# -- Upgrading from v2 to v3 is not allowed by default, set this to true once changes have been reviewed.
fromV2 : false
2023-03-28 16:09:47 +02:00
apiVersionOverride :
# -- (string) Override api version used to create `PodDisruptionBudget`` resources.
# When not specified the chart will check if `policy/v1/PodDisruptionBudget` is available to
# determine the api version automatically.
podDisruptionBudget : ~
2023-01-23 14:31:22 +01:00
# CRDs configuration
2023-01-20 22:01:33 +01:00
crds :
2023-01-23 14:31:22 +01:00
2023-01-20 22:01:33 +01:00
# -- Whether to have Helm install the Kyverno CRDs, if the CRDs are not installed by Helm, they must be added before policies can be created
install : true
# -- Additional CRDs annotations
annotations : {}
# argocd.argoproj.io/sync-options: Replace=true
# strategy.spinnaker.io/replace: 'true'
2023-01-23 14:31:22 +01:00
# Configuration
2023-01-20 15:36:54 +01:00
config :
# -- Create the configmap.
create : true
# -- (string) The configmap name (required if `create` is `false`).
name : ~
# -- Additional annotations to add to the configmap.
annotations : {}
# -- Enable registry mutation for container images. Enabled by default.
enableDefaultRegistryMutation : true
# -- The registry hostname used for the image mutation.
defaultRegistry : docker.io
2023-04-04 13:59:02 +02:00
# -- Exclude groups
2023-04-05 15:05:04 +02:00
excludeGroups :
- system:nodes
2023-01-20 15:36:54 +01:00
2023-04-04 13:59:02 +02:00
# -- Exclude usernames
2023-05-18 00:23:30 +02:00
excludeUsernames : [ ]
# - '!system:kube-scheduler'
2023-04-05 15:05:04 +02:00
# -- Exclude roles
excludeRoles : [ ]
# -- Exclude roles
excludeClusterRoles : [ ]
2023-01-20 15:36:54 +01:00
# -- Generate success events.
generateSuccessEvents : false
# -- Resource types to be skipped by the Kyverno policy engine.
# Make sure to surround each entry in quotes so that it doesn't get parsed as a nested YAML list.
# These are joined together without spaces, run through `tpl`, and the result is set in the config map.
# @default -- See [values.yaml](values.yaml)
resourceFilters :
- '[Event,*,*]'
2023-04-05 15:51:07 +02:00
- '[*/*,kube-system,*]'
- '[*/*,kube-public,*]'
- '[*/*,kube-node-lease,*]'
2023-01-20 15:36:54 +01:00
- '[Node,*,*]'
2023-04-05 15:51:07 +02:00
- '[Node/*,*,*]'
2023-01-20 15:36:54 +01:00
- '[APIService,*,*]'
2023-04-05 15:51:07 +02:00
- '[APIService/*,*,*]'
2023-01-20 15:36:54 +01:00
- '[TokenReview,*,*]'
- '[SubjectAccessReview,*,*]'
- '[SelfSubjectAccessReview,*,*]'
- '[Binding,*,*]'
2023-04-05 15:51:07 +02:00
- '[Pod/binding,*,*]'
2023-01-20 15:36:54 +01:00
- '[ReplicaSet,*,*]'
2023-04-05 15:51:07 +02:00
- '[ReplicaSet/*,*,*]'
2023-01-20 15:36:54 +01:00
- '[AdmissionReport,*,*]'
2023-04-05 15:51:07 +02:00
- '[AdmissionReport/*,*,*]'
2023-01-20 15:36:54 +01:00
- '[ClusterAdmissionReport,*,*]'
2023-04-05 15:51:07 +02:00
- '[ClusterAdmissionReport/*,*,*]'
2023-01-20 15:36:54 +01:00
- '[BackgroundScanReport,*,*]'
2023-04-05 15:51:07 +02:00
- '[BackgroundScanReport/*,*,*]'
2023-01-20 15:36:54 +01:00
- '[ClusterBackgroundScanReport,*,*]'
2023-04-05 15:51:07 +02:00
- '[ClusterBackgroundScanReport/*,*,*]'
2023-01-20 15:36:54 +01:00
# exclude resources from the chart
2023-04-04 08:25:52 +02:00
- '[ClusterRole,*,{{ template "kyverno.admission-controller.roleName" . }}]'
- '[ClusterRole,*,{{ template "kyverno.admission-controller.roleName" . }}:core]'
- '[ClusterRole,*,{{ template "kyverno.admission-controller.roleName" . }}:additional]'
- '[ClusterRole,*,{{ template "kyverno.background-controller.roleName" . }}]'
- '[ClusterRole,*,{{ template "kyverno.background-controller.roleName" . }}:core]'
- '[ClusterRole,*,{{ template "kyverno.background-controller.roleName" . }}:additional]'
- '[ClusterRole,*,{{ template "kyverno.cleanup-controller.roleName" . }}]'
- '[ClusterRole,*,{{ template "kyverno.cleanup-controller.roleName" . }}:core]'
- '[ClusterRole,*,{{ template "kyverno.cleanup-controller.roleName" . }}:additional]'
- '[ClusterRole,*,{{ template "kyverno.reports-controller.roleName" . }}]'
- '[ClusterRole,*,{{ template "kyverno.reports-controller.roleName" . }}:core]'
- '[ClusterRole,*,{{ template "kyverno.reports-controller.roleName" . }}:additional]'
- '[ClusterRoleBinding,*,{{ template "kyverno.admission-controller.roleName" . }}]'
- '[ClusterRoleBinding,*,{{ template "kyverno.background-controller.roleName" . }}]'
- '[ClusterRoleBinding,*,{{ template "kyverno.cleanup-controller.roleName" . }}]'
- '[ClusterRoleBinding,*,{{ template "kyverno.reports-controller.roleName" . }}]'
2023-01-26 17:41:39 +01:00
- '[ServiceAccount,{{ include "kyverno.namespace" . }},{{ template "kyverno.admission-controller.serviceAccountName" . }}]'
2023-04-05 15:51:07 +02:00
- '[ServiceAccount/*,{{ include "kyverno.namespace" . }},{{ template "kyverno.admission-controller.serviceAccountName" . }}]'
2023-04-04 08:25:52 +02:00
- '[ServiceAccount,{{ include "kyverno.namespace" . }},{{ template "kyverno.background-controller.serviceAccountName" . }}]'
2023-04-05 15:51:07 +02:00
- '[ServiceAccount/*,{{ include "kyverno.namespace" . }},{{ template "kyverno.background-controller.serviceAccountName" . }}]'
2023-04-04 08:25:52 +02:00
- '[ServiceAccount,{{ include "kyverno.namespace" . }},{{ template "kyverno.cleanup-controller.serviceAccountName" . }}]'
2023-04-05 15:51:07 +02:00
- '[ServiceAccount/*,{{ include "kyverno.namespace" . }},{{ template "kyverno.cleanup-controller.serviceAccountName" . }}]'
2023-04-04 08:25:52 +02:00
- '[ServiceAccount,{{ include "kyverno.namespace" . }},{{ template "kyverno.reports-controller.serviceAccountName" . }}]'
2023-04-05 15:51:07 +02:00
- '[ServiceAccount/*,{{ include "kyverno.namespace" . }},{{ template "kyverno.reports-controller.serviceAccountName" . }}]'
2023-04-04 08:25:52 +02:00
- '[Role,{{ include "kyverno.namespace" . }},{{ template "kyverno.admission-controller.roleName" . }}]'
- '[Role,{{ include "kyverno.namespace" . }},{{ template "kyverno.background-controller.roleName" . }}]'
- '[Role,{{ include "kyverno.namespace" . }},{{ template "kyverno.cleanup-controller.roleName" . }}]'
- '[Role,{{ include "kyverno.namespace" . }},{{ template "kyverno.reports-controller.roleName" . }}]'
- '[RoleBinding,{{ include "kyverno.namespace" . }},{{ template "kyverno.admission-controller.roleName" . }}]'
- '[RoleBinding,{{ include "kyverno.namespace" . }},{{ template "kyverno.background-controller.roleName" . }}]'
- '[RoleBinding,{{ include "kyverno.namespace" . }},{{ template "kyverno.cleanup-controller.roleName" . }}]'
- '[RoleBinding,{{ include "kyverno.namespace" . }},{{ template "kyverno.reports-controller.roleName" . }}]'
2023-01-20 15:36:54 +01:00
- '[ConfigMap,{{ include "kyverno.namespace" . }},{{ template "kyverno.config.configMapName" . }}]'
- '[ConfigMap,{{ include "kyverno.namespace" . }},{{ template "kyverno.config.metricsConfigMapName" . }}]'
2023-04-04 08:25:52 +02:00
- '[Deployment,{{ include "kyverno.namespace" . }},{{ template "kyverno.admission-controller.name" . }}]'
2023-04-05 15:51:07 +02:00
- '[Deployment/*,{{ include "kyverno.namespace" . }},{{ template "kyverno.admission-controller.name" . }}]'
2023-04-04 08:25:52 +02:00
- '[Deployment,{{ include "kyverno.namespace" . }},{{ template "kyverno.background-controller.name" . }}]'
2023-04-05 15:51:07 +02:00
- '[Deployment/*,{{ include "kyverno.namespace" . }},{{ template "kyverno.background-controller.name" . }}]'
2023-04-04 08:25:52 +02:00
- '[Deployment,{{ include "kyverno.namespace" . }},{{ template "kyverno.cleanup-controller.name" . }}]'
2023-04-05 15:51:07 +02:00
- '[Deployment/*,{{ include "kyverno.namespace" . }},{{ template "kyverno.cleanup-controller.name" . }}]'
2023-04-04 08:25:52 +02:00
- '[Deployment,{{ include "kyverno.namespace" . }},{{ template "kyverno.reports-controller.name" . }}]'
2023-04-05 15:51:07 +02:00
- '[Deployment/*,{{ include "kyverno.namespace" . }},{{ template "kyverno.reports-controller.name" . }}]'
2023-04-04 08:25:52 +02:00
- '[Pod,{{ include "kyverno.namespace" . }},{{ template "kyverno.admission-controller.name" . }}-*]'
2023-04-05 15:51:07 +02:00
- '[Pod/*,{{ include "kyverno.namespace" . }},{{ template "kyverno.admission-controller.name" . }}-*]'
2023-04-04 08:25:52 +02:00
- '[Pod,{{ include "kyverno.namespace" . }},{{ template "kyverno.background-controller.name" . }}-*]'
2023-04-05 15:51:07 +02:00
- '[Pod/*,{{ include "kyverno.namespace" . }},{{ template "kyverno.background-controller.name" . }}-*]'
2023-04-04 08:25:52 +02:00
- '[Pod,{{ include "kyverno.namespace" . }},{{ template "kyverno.cleanup-controller.name" . }}-*]'
2023-04-05 15:51:07 +02:00
- '[Pod/*,{{ include "kyverno.namespace" . }},{{ template "kyverno.cleanup-controller.name" . }}-*]'
2023-04-04 08:25:52 +02:00
- '[Pod,{{ include "kyverno.namespace" . }},{{ template "kyverno.reports-controller.name" . }}-*]'
2023-04-05 15:51:07 +02:00
- '[Pod/*,{{ include "kyverno.namespace" . }},{{ template "kyverno.reports-controller.name" . }}-*]'
2023-01-20 15:36:54 +01:00
- '[Job,{{ include "kyverno.namespace" . }},{{ template "kyverno.fullname" . }}-hook-pre-delete]'
2023-04-05 15:51:07 +02:00
- '[Job/*,{{ include "kyverno.namespace" . }},{{ template "kyverno.fullname" . }}-hook-pre-delete]'
2023-04-04 08:25:52 +02:00
- '[NetworkPolicy,{{ include "kyverno.namespace" . }},{{ template "kyverno.admission-controller.name" . }}]'
2023-04-05 15:51:07 +02:00
- '[NetworkPolicy/*,{{ include "kyverno.namespace" . }},{{ template "kyverno.admission-controller.name" . }}]'
2023-04-04 08:25:52 +02:00
- '[NetworkPolicy,{{ include "kyverno.namespace" . }},{{ template "kyverno.background-controller.name" . }}]'
2023-04-05 15:51:07 +02:00
- '[NetworkPolicy/*,{{ include "kyverno.namespace" . }},{{ template "kyverno.background-controller.name" . }}]'
2023-04-04 08:25:52 +02:00
- '[NetworkPolicy,{{ include "kyverno.namespace" . }},{{ template "kyverno.cleanup-controller.name" . }}]'
2023-04-05 15:51:07 +02:00
- '[NetworkPolicy/*,{{ include "kyverno.namespace" . }},{{ template "kyverno.cleanup-controller.name" . }}]'
2023-04-04 08:25:52 +02:00
- '[NetworkPolicy,{{ include "kyverno.namespace" . }},{{ template "kyverno.reports-controller.name" . }}]'
2023-04-05 15:51:07 +02:00
- '[NetworkPolicy/*,{{ include "kyverno.namespace" . }},{{ template "kyverno.reports-controller.name" . }}]'
2023-04-04 08:25:52 +02:00
- '[PodDisruptionBudget,{{ include "kyverno.namespace" . }},{{ template "kyverno.admission-controller.name" . }}]'
2023-04-05 15:51:07 +02:00
- '[PodDisruptionBudget/*,{{ include "kyverno.namespace" . }},{{ template "kyverno.admission-controller.name" . }}]'
2023-04-04 08:25:52 +02:00
- '[PodDisruptionBudget,{{ include "kyverno.namespace" . }},{{ template "kyverno.background-controller.name" . }}]'
2023-04-05 15:51:07 +02:00
- '[PodDisruptionBudget/*,{{ include "kyverno.namespace" . }},{{ template "kyverno.background-controller.name" . }}]'
2023-04-04 08:25:52 +02:00
- '[PodDisruptionBudget,{{ include "kyverno.namespace" . }},{{ template "kyverno.cleanup-controller.name" . }}]'
2023-04-05 15:51:07 +02:00
- '[PodDisruptionBudget/*,{{ include "kyverno.namespace" . }},{{ template "kyverno.cleanup-controller.name" . }}]'
2023-04-04 08:25:52 +02:00
- '[PodDisruptionBudget,{{ include "kyverno.namespace" . }},{{ template "kyverno.reports-controller.name" . }}]'
2023-04-05 15:51:07 +02:00
- '[PodDisruptionBudget/*,{{ include "kyverno.namespace" . }},{{ template "kyverno.reports-controller.name" . }}]'
2023-01-27 14:52:26 +01:00
- '[Service,{{ include "kyverno.namespace" . }},{{ template "kyverno.admission-controller.serviceName" . }}]'
2023-04-05 15:51:07 +02:00
- '[Service/*,{{ include "kyverno.namespace" . }},{{ template "kyverno.admission-controller.serviceName" . }}]'
2023-01-27 14:52:26 +01:00
- '[Service,{{ include "kyverno.namespace" . }},{{ template "kyverno.admission-controller.serviceName" . }}-metrics]'
2023-04-05 15:51:07 +02:00
- '[Service/*,{{ include "kyverno.namespace" . }},{{ template "kyverno.admission-controller.serviceName" . }}-metrics]'
2023-04-04 08:25:52 +02:00
- '[Service,{{ include "kyverno.namespace" . }},{{ template "kyverno.background-controller.name" . }}-metrics]'
2023-04-05 15:51:07 +02:00
- '[Service/*,{{ include "kyverno.namespace" . }},{{ template "kyverno.background-controller.name" . }}-metrics]'
2023-04-04 08:25:52 +02:00
- '[Service,{{ include "kyverno.namespace" . }},{{ template "kyverno.cleanup-controller.name" . }}]'
2023-04-05 15:51:07 +02:00
- '[Service/*,{{ include "kyverno.namespace" . }},{{ template "kyverno.cleanup-controller.name" . }}]'
2023-04-04 08:25:52 +02:00
- '[Service,{{ include "kyverno.namespace" . }},{{ template "kyverno.cleanup-controller.name" . }}-metrics]'
2023-04-05 15:51:07 +02:00
- '[Service/*,{{ include "kyverno.namespace" . }},{{ template "kyverno.cleanup-controller.name" . }}-metrics]'
2023-04-04 08:25:52 +02:00
- '[Service,{{ include "kyverno.namespace" . }},{{ template "kyverno.reports-controller.name" . }}-metrics]'
2023-04-05 15:51:07 +02:00
- '[Service/*,{{ include "kyverno.namespace" . }},{{ template "kyverno.reports-controller.name" . }}-metrics]'
2023-04-04 08:25:52 +02:00
- '[ServiceMonitor,{{ if .Values.admissionController.serviceMonitor.namespace }}{{ .Values.admissionController.serviceMonitor.namespace }}{{ else }}{{ template "kyverno.namespace" . }}{{ end }},{{ template "kyverno.admission-controller.name" . }}]'
- '[ServiceMonitor,{{ if .Values.admissionController.serviceMonitor.namespace }}{{ .Values.admissionController.serviceMonitor.namespace }}{{ else }}{{ template "kyverno.namespace" . }}{{ end }},{{ template "kyverno.background-controller.name" . }}]'
- '[ServiceMonitor,{{ if .Values.admissionController.serviceMonitor.namespace }}{{ .Values.admissionController.serviceMonitor.namespace }}{{ else }}{{ template "kyverno.namespace" . }}{{ end }},{{ template "kyverno.cleanup-controller.name" . }}]'
- '[ServiceMonitor,{{ if .Values.admissionController.serviceMonitor.namespace }}{{ .Values.admissionController.serviceMonitor.namespace }}{{ else }}{{ template "kyverno.namespace" . }}{{ end }},{{ template "kyverno.reports-controller.name" . }}]'
- '[Secret,{{ include "kyverno.namespace" . }},{{ template "kyverno.admission-controller.serviceName" . }}.{{ template "kyverno.namespace" . }}.svc.*]'
- '[Secret,{{ include "kyverno.namespace" . }},{{ template "kyverno.cleanup-controller.name" . }}.{{ template "kyverno.namespace" . }}.svc.*]'
2023-01-20 15:36:54 +01:00
# -- Defines the `namespaceSelector` in the webhook configurations.
# Note that it takes a list of `namespaceSelector` and/or `objectSelector` in the JSON format, and only the first element
# will be forwarded to the webhook configurations.
# The Kyverno namespace is excluded if `excludeKyvernoNamespace` is `true` (default)
2023-01-23 14:31:22 +01:00
webhooks : [ ]
2023-01-20 15:36:54 +01:00
# Exclude namespaces
# - namespaceSelector:
# matchExpressions:
# - key: kubernetes.io/metadata.name
# operator: NotIn
# values:
# - kube-system
# - kyverno
# Exclude objects
# - objectSelector:
# matchExpressions:
# - key: webhooks.kyverno.io/exclude
# operator: DoesNotExist
2023-03-15 14:17:37 +01:00
# -- Defines annotations to set on webhook configurations.
webhookAnnotations : {}
# Example to disable admission enforcer on AKS:
# 'admissions.enforcer/disabled': 'true'
2023-08-18 10:32:15 +02:00
# -- Defines match conditions to set on webhook configurations (requires Kubernetes 1.27+).
matchConditions : [ ]
2023-03-17 02:38:45 +01:00
# -- Exclude Kyverno namespace
# Determines if default Kyverno namespace exclusion is enabled for webhooks and resourceFilters
excludeKyvernoNamespace : true
# -- resourceFilter namespace exclude
# Namespaces to exclude from the default resourceFilters
resourceFiltersExcludeNamespaces : [ ]
2023-01-23 14:31:22 +01:00
# Metrics configuration
2023-01-20 15:36:54 +01:00
metricsConfig :
# -- Create the configmap.
create : true
# -- (string) The configmap name (required if `create` is `false`).
name : ~
# -- Additional annotations to add to the configmap.
annotations : {}
namespaces :
# -- List of namespaces to capture metrics for.
include : [ ]
# -- list of namespaces to NOT capture metrics for.
exclude : [ ]
# -- (string) Rate at which metrics should reset so as to clean up the memory footprint of kyverno metrics, if you might be expecting high memory footprint of Kyverno's metrics. Default: 0, no refresh of metrics
metricsRefreshInterval : ~
2023-01-23 14:31:22 +01:00
# metricsRefreshInterval: 24h
2023-01-20 15:36:54 +01:00
2023-01-20 21:04:25 +01:00
# -- Image pull secrets for image verification policies, this will define the `--imagePullSecrets` argument
imagePullSecrets : {}
# regcred:
# registry: foo.example.com
# username: foobar
# password: secret
# regcred2:
# registry: bar.example.com
# username: barbaz
# password: secret2
# -- Existing Image pull secrets for image verification policies, this will define the `--imagePullSecrets` argument
existingImagePullSecrets : [ ]
# - test-registry
# - other-test-registry
2023-01-23 14:31:22 +01:00
# Tests configuration
test :
image :
2023-01-27 14:52:26 +01:00
# -- (string) Image registry
registry : ~
2023-01-23 14:31:22 +01:00
# -- Image repository
repository : busybox
# -- Image tag
# Defaults to `latest` if omitted
2023-01-27 14:52:26 +01:00
tag : '1.35'
# -- (string) Image pull policy
2023-01-23 14:31:22 +01:00
# Defaults to image.pullPolicy if omitted
2023-01-27 14:52:26 +01:00
pullPolicy : ~
2023-01-23 14:31:22 +01:00
resources :
# -- Pod resource limits
limits :
cpu : 100m
memory : 256Mi
# -- Pod resource requests
requests :
cpu : 10m
memory : 64Mi
# -- Security context for the test containers
securityContext :
runAsUser : 65534
runAsGroup : 65534
runAsNonRoot : true
privileged : false
allowPrivilegeEscalation : false
readOnlyRootFilesystem : true
capabilities :
drop :
- ALL
seccompProfile :
type : RuntimeDefault
2021-06-01 20:54:33 +02:00
# -- Additional labels
customLabels : {}
2022-02-16 21:46:51 +05:30
webhooksCleanup :
2022-02-25 19:25:21 +01:00
# -- Create a helm pre-delete hook to cleanup webhooks.
2023-06-22 17:14:41 +08:00
enabled : true
2023-08-18 17:01:04 +02:00
2022-02-25 19:25:21 +01:00
# -- `kubectl` image to run commands for deleting webhooks.
image : bitnami/kubectl:latest
2023-08-18 17:01:04 +02:00
2023-04-03 16:09:56 +02:00
# -- Image pull secrets
imagePullSecrets : [ ]
2022-05-11 19:55:14 -07:00
2023-08-07 08:24:53 -04:00
# -- Security context for the pod
podSecurityContext : {}
2023-07-20 23:30:44 -04:00
# -- Node labels for pod assignment
nodeSelector : {}
# -- List of node taints to tolerate
tolerations : [ ]
# -- Pod anti affinity constraints.
podAntiAffinity : {}
# -- Pod affinity constraints.
podAffinity : {}
# -- Node affinity constraints.
nodeAffinity : {}
2023-08-07 08:24:53 -04:00
# -- Security context for the hook containers
securityContext :
runAsUser : 65534
runAsGroup : 65534
runAsNonRoot : true
privileged : false
allowPrivilegeEscalation : false
readOnlyRootFilesystem : true
capabilities :
drop :
- ALL
seccompProfile :
type : RuntimeDefault
2022-11-04 17:38:05 +01:00
grafana :
# -- Enable grafana dashboard creation.
enabled : false
2023-01-28 10:47:23 +01:00
# -- Configmap name template.
configMapName : '{{ include "kyverno.fullname" . }}-grafana'
# -- (string) Namespace to create the grafana dashboard configmap.
2022-11-04 17:38:05 +01:00
# If not set, it will be created in the same namespace where the chart is deployed.
2023-01-28 10:47:23 +01:00
namespace : ~
2022-11-04 17:38:05 +01:00
# -- Grafana dashboard configmap annotations.
annotations : {}
2022-11-14 18:30:12 +01:00
2023-06-26 16:24:15 +02:00
# -- Grafana dashboard configmap labels
labels :
grafana_dashboard : "1"
2023-08-15 18:38:19 +02:00
# -- create GrafanaDashboard custom resource referencing to the configMap.
# according to https://grafana-operator.github.io/grafana-operator/docs/examples/dashboard_from_configmap/readme/
grafanaDashboard :
create : false
matchLabels :
dashboards : "grafana"
2023-04-25 13:23:01 +02:00
# Features configuration
features :
admissionReports :
# -- Enables the feature
enabled : true
2023-06-16 17:19:22 +02:00
aggregateReports :
# -- Enables the feature
enabled : true
2023-07-25 21:22:51 -07:00
policyReports :
# -- Enables the feature
enabled : true
2023-09-05 14:42:17 +03:00
validatingAdmissionPolicyReports :
# -- Enables the feature
enabled : false
2023-04-25 13:23:01 +02:00
autoUpdateWebhooks :
# -- Enables the feature
enabled : true
backgroundScan :
# -- Enables the feature
enabled : true
# -- Number of background scan workers
backgroundScanWorkers : 2
# -- Background scan interval
backgroundScanInterval : 1h
# -- Skips resource filters in background scan
skipResourceFilters : true
configMapCaching :
# -- Enables the feature
enabled : true
2023-06-27 07:44:15 +02:00
deferredLoading :
# -- Enables the feature
enabled : true
2023-04-25 13:23:01 +02:00
dumpPayload :
# -- Enables the feature
enabled : false
forceFailurePolicyIgnore :
# -- Enables the feature
enabled : false
2023-08-31 13:25:21 +03:00
generateValidatingAdmissionPolicy :
# -- Enables the feature
enabled : false
2023-05-12 14:09:01 +02:00
logging :
# -- Logging format
format : text
# -- Logging verbosity
verbosity : 2
2023-05-12 17:11:20 +02:00
omitEvents :
# -- Events which should not be emitted (possible values `PolicyViolation`, `PolicyApplied`, `PolicyError`, and `PolicySkipped`)
eventTypes : [ ]
# - PolicyViolation
# - PolicyApplied
# - PolicyError
# - PolicySkipped
2023-04-25 13:23:01 +02:00
policyExceptions :
# -- Enables the feature
enabled : false
# -- Restrict policy exceptions to a single namespace
namespace : ''
protectManagedResources :
# -- Enables the feature
enabled : false
2023-04-25 16:41:04 +02:00
registryClient :
# -- Allow insecure registry
allowInsecure : false
# -- Enable registry client helpers
credentialHelpers :
- default
- google
- amazon
- azure
- github
2023-04-25 13:23:01 +02:00
reports :
# -- Reports chunk size
chunkSize : 1000
2023-08-02 20:17:40 +05:30
ttlController :
# -- Reconciliation interval for the label based cleanup manager
reconciliationInterval : 1m
2023-09-18 18:46:08 +05:30
tuf :
2023-09-22 14:32:57 +05:30
# -- Enable tuf
enable : false
2023-09-27 12:04:16 +02:00
# -- (string) Tuf root
root : ~
# -- (string) Tuf mirror
mirror : ~
2023-04-25 13:23:01 +02:00
2023-04-25 14:47:52 +02:00
# Cleanup cronjobs to prevent internal resources from stacking up in the cluster
cleanupJobs :
admissionReports :
# -- Enable cleanup cronjob
enabled : true
image :
# -- (string) Image registry
registry : ~
# -- Image repository
repository : bitnami/kubectl
# -- Image tag
# Defaults to `latest` if omitted
tag : '1.26.4'
# -- (string) Image pull policy
# Defaults to image.pullPolicy if omitted
pullPolicy : ~
2023-07-02 00:16:18 +02:00
# -- Image pull secrets
imagePullSecrets : [ ]
# - name: secretName
2023-04-25 14:47:52 +02:00
# -- Cronjob schedule
schedule : '*/10 * * * *'
# -- Reports threshold, if number of reports are above this value the cronjob will start deleting them
threshold : 10000
# -- Cronjob history
history :
success : 1
failure : 1
# -- Security context for the pod
podSecurityContext : {}
# -- Security context for the containers
securityContext :
runAsNonRoot : true
privileged : false
allowPrivilegeEscalation : false
readOnlyRootFilesystem : true
capabilities :
drop :
- ALL
seccompProfile :
type : RuntimeDefault
2023-05-31 12:09:13 +02:00
# -- Job resources
resources : {}
2023-05-31 09:29:38 +01:00
# -- List of node taints to tolerate
tolerations : [ ]
2023-07-19 09:40:31 -04:00
# -- Node labels for pod assignment
nodeSelector : {}
2023-05-31 14:48:07 -04:00
# -- Pod Annotations
podAnnotations : {}
2023-07-11 17:11:13 +02:00
# -- Pod labels
podLabels : {}
2023-07-20 23:30:44 -04:00
# -- Pod anti affinity constraints.
podAntiAffinity : {}
# -- Pod affinity constraints.
podAffinity : {}
# -- Node affinity constraints.
nodeAffinity : {}
2023-04-25 14:47:52 +02:00
clusterAdmissionReports :
# -- Enable cleanup cronjob
enabled : true
image :
# -- (string) Image registry
registry : ~
# -- Image repository
repository : bitnami/kubectl
# -- Image tag
# Defaults to `latest` if omitted
tag : '1.26.4'
# -- (string) Image pull policy
# Defaults to image.pullPolicy if omitted
pullPolicy : ~
2023-07-02 00:16:18 +02:00
# -- Image pull secrets
imagePullSecrets : [ ]
# - name: secretName
2023-04-25 14:47:52 +02:00
# -- Cronjob schedule
schedule : '*/10 * * * *'
# -- Reports threshold, if number of reports are above this value the cronjob will start deleting them
threshold : 10000
# -- Cronjob history
history :
success : 1
failure : 1
# -- Security context for the pod
podSecurityContext : {}
# -- Security context for the containers
securityContext :
runAsNonRoot : true
privileged : false
allowPrivilegeEscalation : false
readOnlyRootFilesystem : true
capabilities :
drop :
- ALL
seccompProfile :
type : RuntimeDefault
2023-05-31 12:09:13 +02:00
# -- Job resources
resources : {}
2023-05-31 09:29:38 +01:00
# -- List of node taints to tolerate
tolerations : [ ]
2023-07-19 09:40:31 -04:00
# -- Node labels for pod assignment
nodeSelector : {}
2023-05-31 14:48:07 -04:00
# -- Pod Annotations
podAnnotations : {}
2023-07-11 17:11:13 +02:00
# -- Pod Labels
podLabels : {}
2023-07-20 23:30:44 -04:00
# -- Pod anti affinity constraints.
podAntiAffinity : {}
# -- Pod affinity constraints.
podAffinity : {}
# -- Node affinity constraints.
nodeAffinity : {}
2023-03-02 13:01:06 +01:00
# Admission controller configuration
admissionController :
2023-04-25 13:23:01 +02:00
# -- Overrides features defined at the root level
featuresOverride : {}
2023-03-15 16:55:06 +01:00
rbac :
# -- Create RBAC resources
create : true
serviceAccount :
# -- The ServiceAccount name
name :
# -- Annotations for the ServiceAccount
annotations : {}
# example.com/annotation: value
clusterRole :
# -- Extra resource permissions to add in the cluster role
extraResources : [ ]
# - apiGroups:
# - ''
# resources:
# - pods
# verbs:
# - create
# - update
# - delete
2023-03-02 17:23:22 +01:00
# -- Create self-signed certificates at deployment time.
# The certificates won't be automatically renewed if this is set to `true`.
createSelfSignedCert : false
2023-03-02 13:01:06 +01:00
# -- (int) Desired number of pods
replicas : ~
2023-03-06 15:39:07 +01:00
# -- Additional labels to add to each pod
podLabels : {}
# example.com/label: foo
# -- Additional annotations to add to each pod
podAnnotations : {}
# example.com/annotation: foo
2023-03-02 15:56:13 +01:00
# -- Deployment update strategy.
# Ref: https://kubernetes.io/docs/concepts/workloads/controllers/deployment/#strategy
# @default -- See [values.yaml](values.yaml)
updateStrategy :
rollingUpdate :
maxSurge : 1
maxUnavailable : 40 %
type : RollingUpdate
# -- Optional priority class
priorityClassName : ''
2023-06-14 16:19:36 +03:00
# -- Change `apiPriorityAndFairness` to `true` if you want to insulate the API calls made by Kyverno admission controller activities.
# This will help ensure Kyverno stability in busy clusters.
# Ref: https://kubernetes.io/docs/concepts/cluster-administration/flow-control/
apiPriorityAndFairness : false
# -- Priority level configuration.
# The block is directly forwarded into the priorityLevelConfiguration, so you can use whatever specification you want.
# ref: https://kubernetes.io/docs/concepts/cluster-administration/flow-control/#prioritylevelconfiguration
# @default -- See [values.yaml](values.yaml)
priorityLevelConfigurationSpec :
type : Limited
limited :
nominalConcurrencyShares : 10
limitResponse :
queuing :
queueLengthLimit : 50
type : Queue
2023-03-02 15:56:13 +01:00
# -- Change `hostNetwork` to `true` when you want the pod to share its host's network namespace.
# Useful for situations like when you end up dealing with a custom CNI over Amazon EKS.
# Update the `dnsPolicy` accordingly as well to suit the host network mode.
hostNetwork : false
# -- `dnsPolicy` determines the manner in which DNS resolution happens in the cluster.
# In case of `hostNetwork: true`, usually, the `dnsPolicy` is suitable to be `ClusterFirstWithHostNet`.
# For further reference: https://kubernetes.io/docs/concepts/services-networking/dns-pod-service/#pod-s-dns-policy.
dnsPolicy : ClusterFirst
2023-03-02 17:23:22 +01:00
# -- Startup probe.
# The block is directly forwarded into the deployment, so you can use whatever startupProbes configuration you want.
# ref: https://kubernetes.io/docs/tasks/configure-pod-container/configure-liveness-readiness-probes/
# @default -- See [values.yaml](values.yaml)
startupProbe :
httpGet :
path : /health/liveness
port : 9443
scheme : HTTPS
failureThreshold : 20
initialDelaySeconds : 2
periodSeconds : 6
# -- Liveness probe.
# The block is directly forwarded into the deployment, so you can use whatever livenessProbe configuration you want.
# ref: https://kubernetes.io/docs/tasks/configure-pod-container/configure-liveness-readiness-probes/
# @default -- See [values.yaml](values.yaml)
livenessProbe :
httpGet :
path : /health/liveness
port : 9443
scheme : HTTPS
initialDelaySeconds : 15
periodSeconds : 30
timeoutSeconds : 5
failureThreshold : 2
successThreshold : 1
# -- Readiness Probe.
# The block is directly forwarded into the deployment, so you can use whatever readinessProbe configuration you want.
# ref: https://kubernetes.io/docs/tasks/configure-pod-container/configure-liveness-readiness-probes/
# @default -- See [values.yaml](values.yaml)
readinessProbe :
httpGet :
path : /health/readiness
port : 9443
scheme : HTTPS
initialDelaySeconds : 5
periodSeconds : 10
timeoutSeconds : 5
failureThreshold : 6
successThreshold : 1
2023-03-02 15:56:13 +01:00
# -- Node labels for pod assignment
nodeSelector : {}
# -- List of node taints to tolerate
tolerations : [ ]
2023-03-02 17:23:22 +01:00
antiAffinity :
# -- Pod antiAffinities toggle.
# Enabled by default but can be disabled if you want to schedule pods to the same node.
enabled : true
# -- Pod anti affinity constraints.
# @default -- See [values.yaml](values.yaml)
podAntiAffinity :
preferredDuringSchedulingIgnoredDuringExecution :
- weight : 1
podAffinityTerm :
labelSelector :
matchExpressions :
- key : app.kubernetes.io/component
operator : In
values :
- admission-controller
topologyKey : kubernetes.io/hostname
# -- Pod affinity constraints.
podAffinity : {}
# -- Node affinity constraints.
nodeAffinity : {}
2023-03-02 15:56:13 +01:00
# -- Topology spread constraints.
topologySpreadConstraints : [ ]
2023-03-03 05:24:32 +01:00
# -- Security context for the pod
podSecurityContext : {}
2023-03-02 15:56:13 +01:00
podDisruptionBudget :
# -- Configures the minimum available pods for disruptions.
# Cannot be used if `maxUnavailable` is set.
minAvailable : 1
# -- Configures the maximum unavailable pods for disruptions.
# Cannot be used if `minAvailable` is set.
maxUnavailable :
2023-03-03 05:24:32 +01:00
# -- A writable volume to use for the TUF root initialization.
tufRootMountPath : /.sigstore
# -- Volume to be mounted in pods for TUF/cosign work.
sigstoreVolume :
emptyDir : {}
2023-03-06 09:25:28 +01:00
# -- Image pull secrets
2023-04-03 16:09:56 +02:00
imagePullSecrets : [ ]
2023-03-06 09:25:28 +01:00
# - secretName
2023-03-03 15:38:33 +01:00
initContainer :
image :
# -- Image registry
registry : ghcr.io
# -- Image repository
repository : kyverno/kyvernopre
# -- (string) Image tag
# If missing, defaults to image.tag
tag : ~
# -- (string) Image pull policy
# If missing, defaults to image.pullPolicy
pullPolicy : ~
resources :
# -- Pod resource limits
limits :
cpu : 100m
memory : 256Mi
# -- Pod resource requests
requests :
cpu : 10m
memory : 64Mi
2023-03-07 08:29:49 +01:00
# -- Container security context
securityContext :
runAsNonRoot : true
privileged : false
allowPrivilegeEscalation : false
readOnlyRootFilesystem : true
capabilities :
drop :
- ALL
seccompProfile :
type : RuntimeDefault
2023-03-06 15:39:07 +01:00
# -- Additional container args.
2023-03-20 06:42:34 +01:00
extraArgs : {}
2023-03-06 15:39:07 +01:00
# -- Additional container environment variables.
extraEnvVars : [ ]
2023-03-06 09:25:28 +01:00
container :
image :
# -- Image registry
registry : ghcr.io
# -- Image repository
repository : kyverno/kyverno
# -- (string) Image tag
# Defaults to appVersion in Chart.yaml if omitted
tag : ~
# -- Image pull policy
pullPolicy : IfNotPresent
resources :
# -- Pod resource limits
limits :
memory : 384Mi
# -- Pod resource requests
requests :
cpu : 100m
memory : 128Mi
2023-03-07 08:29:49 +01:00
# -- Container security context
securityContext :
runAsNonRoot : true
privileged : false
allowPrivilegeEscalation : false
readOnlyRootFilesystem : true
capabilities :
drop :
- ALL
seccompProfile :
type : RuntimeDefault
2023-03-06 15:39:07 +01:00
# -- Additional container args.
2023-03-20 06:42:34 +01:00
extraArgs : {}
2023-03-06 15:39:07 +01:00
# -- Additional container environment variables.
extraEnvVars : [ ]
# -- Array of extra init containers
extraInitContainers : [ ]
# - name: init-container
# image: busybox
# command: ['sh', '-c', 'echo Hello']
# -- Array of extra containers to run alongside kyverno
extraContainers : [ ]
# - name: myapp-container
# image: busybox
# command: ['sh', '-c', 'echo Hello && sleep 3600']
2023-03-06 09:25:28 +01:00
service :
# -- Service port.
port : 443
# -- Service type.
type : ClusterIP
# -- Service node port.
# Only used if `type` is `NodePort`.
nodePort :
# -- Service annotations.
annotations : {}
metricsService :
# -- Create service.
create : true
# -- Service port.
# Kyverno's metrics server will be exposed at this port.
port : 8000
# -- Service type.
type : ClusterIP
# -- Service node port.
# Only used if `type` is `NodePort`.
nodePort :
# -- Service annotations.
annotations : {}
2023-03-16 15:14:39 +01:00
networkPolicy :
# -- When true, use a NetworkPolicy to allow ingress to the webhook
# This is useful on clusters using Calico and/or native k8s network policies in a default-deny setup.
enabled : false
# -- A list of valid from selectors according to https://kubernetes.io/docs/concepts/services-networking/network-policies.
ingressFrom : [ ]
2023-03-20 06:42:34 +01:00
serviceMonitor :
# -- Create a `ServiceMonitor` to collect Prometheus metrics.
enabled : false
# -- Additional labels
additionalLabels : {}
# -- (string) Override namespace
namespace : ~
# -- Interval to scrape metrics
interval : 30s
# -- Timeout if metrics can't be retrieved in given time interval
scrapeTimeout : 25s
# -- Is TLS required for endpoint
secure : false
# -- TLS Configuration for endpoint
tlsConfig : {}
2023-06-26 16:24:15 +02:00
# -- RelabelConfigs to apply to samples before scraping
relabelings : [ ]
# -- MetricRelabelConfigs to apply to samples before ingestion.
metricRelabelings : [ ]
2023-03-20 06:42:34 +01:00
tracing :
# -- Enable tracing
enabled : false
# -- Traces receiver address
address :
# -- Traces receiver port
port :
# -- Traces receiver credentials
creds : ''
metering :
# -- Disable metrics export
disabled : false
# -- Otel configuration, can be `prometheus` or `grpc`
config : prometheus
# -- Prometheus endpoint port
port : 8000
# -- Otel collector endpoint
collector : ''
# -- Otel collector credentials
creds : ''
2023-04-25 13:23:01 +02:00
# Background controller configuration
backgroundController :
2022-12-09 18:12:37 +01:00
2023-04-25 13:23:01 +02:00
# -- Overrides features defined at the root level
featuresOverride : {}
# -- Enable background controller.
2022-12-09 18:12:37 +01:00
enabled : true
2022-12-05 18:37:44 +01:00
rbac :
# -- Create RBAC resources
create : true
serviceAccount :
# -- Service account name
name :
2023-03-16 08:50:12 +01:00
# -- Annotations for the ServiceAccount
annotations : {}
# example.com/annotation: value
2023-08-23 14:29:56 +02:00
coreClusterRole :
# -- Extra resource permissions to add in the core cluster role.
# This was introduced to avoid breaking change in the chart but should ideally be moved in `clusterRole.extraResources`.
# @default -- See [values.yaml](values.yaml)
extraResources :
- apiGroups :
- '*'
resources :
- '*'
verbs :
- get
- list
- watch
- apiGroups :
- networking.k8s.io
resources :
- ingresses
- ingressclasses
- networkpolicies
verbs :
- create
- update
- patch
- delete
- apiGroups :
- rbac.authorization.k8s.io
resources :
- rolebindings
- roles
verbs :
- create
- update
- patch
- delete
- apiGroups :
- ''
resources :
- configmaps
- secrets
- resourcequotas
- limitranges
verbs :
- create
- update
- patch
- delete
2022-12-05 18:37:44 +01:00
clusterRole :
# -- Extra resource permissions to add in the cluster role
extraResources : [ ]
2022-12-07 11:30:47 +01:00
# - apiGroups:
# - ''
# resources:
# - pods
2023-06-02 11:47:38 +02:00
# verbs:
# - create
# - update
# - delete
# - patch
2022-12-07 11:30:47 +01:00
2022-11-14 18:30:12 +01:00
image :
2023-05-25 11:50:50 -05:00
# -- Image registry
registry : ghcr.io
2022-11-14 18:30:12 +01:00
# -- Image repository
2023-05-25 11:50:50 -05:00
repository : kyverno/background-controller
2023-04-25 13:23:01 +02:00
# -- Image tag
2022-11-14 18:30:12 +01:00
# Defaults to appVersion in Chart.yaml if omitted
2023-08-28 22:35:08 +02:00
tag : ~
2022-11-14 18:30:12 +01:00
# -- Image pull policy
pullPolicy : IfNotPresent
2023-04-03 16:09:56 +02:00
# -- Image pull secrets
imagePullSecrets : [ ]
2022-11-14 18:30:12 +01:00
# - secretName
2022-12-09 18:12:37 +01:00
# -- (int) Desired number of pods
replicas : ~
2023-05-29 04:03:26 -05:00
# -- Additional labels to add to each pod
podLabels : {}
# example.com/label: foo
# -- Additional annotations to add to each pod
podAnnotations : {}
# example.com/annotation: foo
2022-12-09 18:12:37 +01:00
# -- Deployment update strategy.
# Ref: https://kubernetes.io/docs/concepts/workloads/controllers/deployment/#strategy
# @default -- See [values.yaml](values.yaml)
updateStrategy :
rollingUpdate :
maxSurge : 1
maxUnavailable : 40 %
type : RollingUpdate
# -- Optional priority class
priorityClassName : ''
# -- Change `hostNetwork` to `true` when you want the pod to share its host's network namespace.
# Useful for situations like when you end up dealing with a custom CNI over Amazon EKS.
# Update the `dnsPolicy` accordingly as well to suit the host network mode.
hostNetwork : false
# -- `dnsPolicy` determines the manner in which DNS resolution happens in the cluster.
# In case of `hostNetwork: true`, usually, the `dnsPolicy` is suitable to be `ClusterFirstWithHostNet`.
# For further reference: https://kubernetes.io/docs/concepts/services-networking/dns-pod-service/#pod-s-dns-policy.
dnsPolicy : ClusterFirst
2022-12-12 19:39:29 +01:00
# -- Extra arguments passed to the container on the command line
2023-03-17 13:43:05 +01:00
extraArgs : {}
2022-12-07 11:30:47 +01:00
2023-06-03 14:47:34 +02:00
# -- Additional container environment variables.
extraEnvVars : [ ]
2022-12-09 18:12:37 +01:00
resources :
# -- Pod resource limits
limits :
memory : 128Mi
# -- Pod resource requests
requests :
cpu : 100m
memory : 64Mi
2022-11-15 15:05:32 +01:00
# -- Node labels for pod assignment
nodeSelector : {}
# -- List of node taints to tolerate
tolerations : [ ]
2022-12-09 18:12:37 +01:00
antiAffinity :
# -- Pod antiAffinities toggle.
# Enabled by default but can be disabled if you want to schedule pods to the same node.
enabled : true
# -- Pod anti affinity constraints.
# @default -- See [values.yaml](values.yaml)
podAntiAffinity :
preferredDuringSchedulingIgnoredDuringExecution :
- weight : 1
podAffinityTerm :
labelSelector :
matchExpressions :
- key : app.kubernetes.io/component
operator : In
values :
2023-04-25 13:23:01 +02:00
- background-controller
2022-12-09 18:12:37 +01:00
topologyKey : kubernetes.io/hostname
# -- Pod affinity constraints.
podAffinity : {}
# -- Node affinity constraints.
nodeAffinity : {}
2022-11-15 15:05:32 +01:00
# -- Topology spread constraints.
topologySpreadConstraints : [ ]
2022-12-09 18:12:37 +01:00
# -- Security context for the pod
podSecurityContext : {}
# -- Security context for the containers
securityContext :
runAsNonRoot : true
privileged : false
allowPrivilegeEscalation : false
readOnlyRootFilesystem : true
capabilities :
drop :
- ALL
seccompProfile :
type : RuntimeDefault
podDisruptionBudget :
# -- Configures the minimum available pods for disruptions.
# Cannot be used if `maxUnavailable` is set.
minAvailable : 1
# -- Configures the maximum unavailable pods for disruptions.
# Cannot be used if `minAvailable` is set.
maxUnavailable :
2022-12-12 19:39:29 +01:00
metricsService :
# -- Create service.
create : true
# -- Service port.
# Metrics server will be exposed at this port.
port : 8000
# -- Service type.
type : ClusterIP
# -- Service node port.
# Only used if `metricsService.type` is `NodePort`.
nodePort :
# -- Service annotations.
annotations : {}
2023-03-16 15:14:39 +01:00
networkPolicy :
# -- When true, use a NetworkPolicy to allow ingress to the webhook
# This is useful on clusters using Calico and/or native k8s network policies in a default-deny setup.
enabled : false
# -- A list of valid from selectors according to https://kubernetes.io/docs/concepts/services-networking/network-policies.
ingressFrom : [ ]
2022-12-12 19:39:29 +01:00
serviceMonitor :
# -- Create a `ServiceMonitor` to collect Prometheus metrics.
2023-01-19 14:28:28 +01:00
enabled : false
# -- Additional labels
2023-03-03 05:24:32 +01:00
additionalLabels : {}
# -- (string) Override namespace
namespace : ~
2023-01-19 14:28:28 +01:00
# -- Interval to scrape metrics
interval : 30s
# -- Timeout if metrics can't be retrieved in given time interval
scrapeTimeout : 25s
# -- Is TLS required for endpoint
secure : false
# -- TLS Configuration for endpoint
tlsConfig : {}
2023-06-26 16:24:15 +02:00
# -- RelabelConfigs to apply to samples before scraping
relabelings : [ ]
# -- MetricRelabelConfigs to apply to samples before ingestion.
metricRelabelings : [ ]
2023-01-19 14:28:28 +01:00
tracing :
# -- Enable tracing
enabled : false
# -- Traces receiver address
address :
# -- Traces receiver port
port :
# -- Traces receiver credentials
creds : ''
metering :
# -- Disable metrics export
disabled : false
# -- Otel configuration, can be `prometheus` or `grpc`
config : prometheus
# -- Prometheus endpoint port
port : 8000
# -- Otel collector endpoint
collector : ''
# -- Otel collector credentials
creds : ''
2023-04-25 13:23:01 +02:00
# Cleanup controller configuration
cleanupController :
2023-01-19 14:28:28 +01:00
2023-04-25 13:23:01 +02:00
# -- Overrides features defined at the root level
featuresOverride : {}
# -- Enable cleanup controller.
2023-01-19 14:28:28 +01:00
enabled : true
rbac :
# -- Create RBAC resources
create : true
serviceAccount :
# -- Service account name
name :
2023-03-16 08:50:12 +01:00
# -- Annotations for the ServiceAccount
annotations : {}
# example.com/annotation: value
2023-01-19 14:28:28 +01:00
clusterRole :
# -- Extra resource permissions to add in the cluster role
extraResources : [ ]
# - apiGroups:
# - ''
# resources:
# - pods
2023-08-02 20:17:40 +05:30
# verbs:
# - delete
# - list
# - watch
2023-01-19 14:28:28 +01:00
2023-04-25 13:23:01 +02:00
# -- Create self-signed certificates at deployment time.
# The certificates won't be automatically renewed if this is set to `true`.
createSelfSignedCert : false
2023-01-19 14:28:28 +01:00
image :
2023-01-30 17:58:46 +01:00
# -- Image registry
registry : ghcr.io
2023-01-19 14:28:28 +01:00
# -- Image repository
2023-04-25 13:23:01 +02:00
repository : kyverno/cleanup-controller
2023-01-30 17:58:46 +01:00
# -- (string) Image tag
2023-01-19 14:28:28 +01:00
# Defaults to appVersion in Chart.yaml if omitted
2023-01-30 17:58:46 +01:00
tag : ~
2023-01-19 14:28:28 +01:00
# -- Image pull policy
pullPolicy : IfNotPresent
2023-04-03 16:09:56 +02:00
# -- Image pull secrets
imagePullSecrets : [ ]
2023-01-19 14:28:28 +01:00
# - secretName
# -- (int) Desired number of pods
replicas : ~
2023-05-29 04:03:26 -05:00
# -- Additional labels to add to each pod
podLabels : {}
# example.com/label: foo
# -- Additional annotations to add to each pod
podAnnotations : {}
# example.com/annotation: foo
2023-01-19 14:28:28 +01:00
# -- Deployment update strategy.
# Ref: https://kubernetes.io/docs/concepts/workloads/controllers/deployment/#strategy
# @default -- See [values.yaml](values.yaml)
updateStrategy :
rollingUpdate :
maxSurge : 1
maxUnavailable : 40 %
type : RollingUpdate
# -- Optional priority class
priorityClassName : ''
# -- Change `hostNetwork` to `true` when you want the pod to share its host's network namespace.
# Useful for situations like when you end up dealing with a custom CNI over Amazon EKS.
# Update the `dnsPolicy` accordingly as well to suit the host network mode.
hostNetwork : false
# -- `dnsPolicy` determines the manner in which DNS resolution happens in the cluster.
# In case of `hostNetwork: true`, usually, the `dnsPolicy` is suitable to be `ClusterFirstWithHostNet`.
# For further reference: https://kubernetes.io/docs/concepts/services-networking/dns-pod-service/#pod-s-dns-policy.
dnsPolicy : ClusterFirst
# -- Extra arguments passed to the container on the command line
2023-04-25 13:23:01 +02:00
extraArgs : {}
2023-01-19 14:28:28 +01:00
2023-06-03 14:47:34 +02:00
# -- Additional container environment variables.
extraEnvVars : [ ]
2023-01-19 14:28:28 +01:00
resources :
# -- Pod resource limits
limits :
memory : 128Mi
# -- Pod resource requests
requests :
cpu : 100m
memory : 64Mi
2023-04-25 13:23:01 +02:00
# -- Startup probe.
# The block is directly forwarded into the deployment, so you can use whatever startupProbes configuration you want.
# ref: https://kubernetes.io/docs/tasks/configure-pod-container/configure-liveness-readiness-probes/
# @default -- See [values.yaml](values.yaml)
startupProbe :
httpGet :
path : /health/liveness
port : 9443
scheme : HTTPS
failureThreshold : 20
initialDelaySeconds : 2
periodSeconds : 6
# -- Liveness probe.
# The block is directly forwarded into the deployment, so you can use whatever livenessProbe configuration you want.
# ref: https://kubernetes.io/docs/tasks/configure-pod-container/configure-liveness-readiness-probes/
# @default -- See [values.yaml](values.yaml)
livenessProbe :
httpGet :
path : /health/liveness
port : 9443
scheme : HTTPS
initialDelaySeconds : 15
periodSeconds : 30
timeoutSeconds : 5
failureThreshold : 2
successThreshold : 1
# -- Readiness Probe.
# The block is directly forwarded into the deployment, so you can use whatever readinessProbe configuration you want.
# ref: https://kubernetes.io/docs/tasks/configure-pod-container/configure-liveness-readiness-probes/
# @default -- See [values.yaml](values.yaml)
readinessProbe :
httpGet :
path : /health/readiness
port : 9443
scheme : HTTPS
initialDelaySeconds : 5
periodSeconds : 10
timeoutSeconds : 5
failureThreshold : 6
successThreshold : 1
2023-01-19 14:28:28 +01:00
# -- Node labels for pod assignment
nodeSelector : {}
# -- List of node taints to tolerate
tolerations : [ ]
antiAffinity :
# -- Pod antiAffinities toggle.
# Enabled by default but can be disabled if you want to schedule pods to the same node.
enabled : true
# -- Pod anti affinity constraints.
# @default -- See [values.yaml](values.yaml)
podAntiAffinity :
preferredDuringSchedulingIgnoredDuringExecution :
- weight : 1
podAffinityTerm :
labelSelector :
matchExpressions :
- key : app.kubernetes.io/component
operator : In
values :
2023-04-25 13:23:01 +02:00
- cleanup-controller
2023-01-19 14:28:28 +01:00
topologyKey : kubernetes.io/hostname
# -- Pod affinity constraints.
podAffinity : {}
# -- Node affinity constraints.
nodeAffinity : {}
# -- Topology spread constraints.
2023-02-01 00:12:34 +08:00
topologySpreadConstraints : [ ]
# -- Security context for the pod
podSecurityContext : {}
# -- Security context for the containers
securityContext :
runAsNonRoot : true
privileged : false
allowPrivilegeEscalation : false
readOnlyRootFilesystem : true
capabilities :
drop :
- ALL
seccompProfile :
type : RuntimeDefault
podDisruptionBudget :
# -- Configures the minimum available pods for disruptions.
# Cannot be used if `maxUnavailable` is set.
minAvailable : 1
# -- Configures the maximum unavailable pods for disruptions.
# Cannot be used if `minAvailable` is set.
maxUnavailable :
2023-04-25 13:23:01 +02:00
service :
# -- Service port.
port : 443
# -- Service type.
type : ClusterIP
# -- Service node port.
# Only used if `service.type` is `NodePort`.
nodePort :
# -- Service annotations.
annotations : {}
2023-03-29 22:55:46 +02:00
2023-02-01 00:12:34 +08:00
metricsService :
# -- Create service.
create : true
# -- Service port.
# Metrics server will be exposed at this port.
port : 8000
# -- Service type.
type : ClusterIP
2023-04-25 13:23:01 +02:00
# -- Service node port.
# Only used if `metricsService.type` is `NodePort`.
nodePort :
2023-02-01 00:12:34 +08:00
# -- Service annotations.
annotations : {}
2023-03-16 15:14:39 +01:00
networkPolicy :
# -- When true, use a NetworkPolicy to allow ingress to the webhook
# This is useful on clusters using Calico and/or native k8s network policies in a default-deny setup.
enabled : false
# -- A list of valid from selectors according to https://kubernetes.io/docs/concepts/services-networking/network-policies.
ingressFrom : [ ]
2023-02-01 00:12:34 +08:00
serviceMonitor :
# -- Create a `ServiceMonitor` to collect Prometheus metrics.
enabled : false
# -- Additional labels
2023-03-03 05:24:32 +01:00
additionalLabels : {}
# -- (string) Override namespace
namespace : ~
2023-04-25 13:23:01 +02:00
# -- Interval to scrape metrics
2023-02-01 00:12:34 +08:00
interval : 30s
# -- Timeout if metrics can't be retrieved in given time interval
scrapeTimeout : 25s
# -- Is TLS required for endpoint
secure : false
# -- TLS Configuration for endpoint
tlsConfig : {}
2023-06-26 16:24:15 +02:00
# -- RelabelConfigs to apply to samples before scraping
relabelings : [ ]
# -- MetricRelabelConfigs to apply to samples before ingestion.
metricRelabelings : [ ]
2023-02-01 00:12:34 +08:00
tracing :
# -- Enable tracing
enabled : false
2023-04-25 13:23:01 +02:00
# -- Traces receiver address
address :
# -- Traces receiver port
port :
# -- Traces receiver credentials
creds : ''
2023-02-01 00:12:34 +08:00
metering :
# -- Disable metrics export
disabled : false
# -- Otel configuration, can be `prometheus` or `grpc`
config : prometheus
# -- Prometheus endpoint port
port : 8000
2023-04-25 13:23:01 +02:00
# -- Otel collector endpoint
collector : ''
# -- Otel collector credentials
creds : ''
2023-02-01 00:12:34 +08:00
2023-04-25 13:23:01 +02:00
# Reports controller configuration
reportsController :
2023-02-01 00:12:34 +08:00
2023-04-25 13:23:01 +02:00
# -- Overrides features defined at the root level
featuresOverride : {}
# -- Enable reports controller.
2023-02-01 00:12:34 +08:00
enabled : true
rbac :
# -- Create RBAC resources
create : true
serviceAccount :
# -- Service account name
name :
2023-03-16 08:50:12 +01:00
# -- Annotations for the ServiceAccount
annotations : {}
# example.com/annotation: value
2023-02-01 00:12:34 +08:00
clusterRole :
# -- Extra resource permissions to add in the cluster role
extraResources : [ ]
# - apiGroups:
# - ''
# resources:
# - pods
image :
2023-04-25 13:23:01 +02:00
# -- Image registry
registry : ghcr.io
2023-02-01 00:12:34 +08:00
# -- Image repository
2023-04-25 13:23:01 +02:00
repository : kyverno/reports-controller
# -- (string) Image tag
2023-02-01 00:12:34 +08:00
# Defaults to appVersion in Chart.yaml if omitted
2023-04-25 13:23:01 +02:00
tag : ~
2023-02-01 00:12:34 +08:00
# -- Image pull policy
pullPolicy : IfNotPresent
2023-04-03 16:09:56 +02:00
# -- Image pull secrets
imagePullSecrets : [ ]
2023-02-01 00:12:34 +08:00
# - secretName
# -- (int) Desired number of pods
replicas : ~
2023-05-29 04:03:26 -05:00
# -- Additional labels to add to each pod
podLabels : {}
# example.com/label: foo
# -- Additional annotations to add to each pod
podAnnotations : {}
# example.com/annotation: foo
2023-02-01 00:12:34 +08:00
# -- Deployment update strategy.
# Ref: https://kubernetes.io/docs/concepts/workloads/controllers/deployment/#strategy
# @default -- See [values.yaml](values.yaml)
updateStrategy :
rollingUpdate :
maxSurge : 1
maxUnavailable : 40 %
type : RollingUpdate
# -- Optional priority class
priorityClassName : ''
2023-06-14 16:19:36 +03:00
# -- Change `apiPriorityAndFairness` to `true` if you want to insulate the API calls made by Kyverno reports controller activities.
# This will help ensure Kyverno reports stability in busy clusters.
# Ref: https://kubernetes.io/docs/concepts/cluster-administration/flow-control/
apiPriorityAndFairness : false
# -- Priority level configuration.
# The block is directly forwarded into the priorityLevelConfiguration, so you can use whatever specification you want.
# ref: https://kubernetes.io/docs/concepts/cluster-administration/flow-control/#prioritylevelconfiguration
# @default -- See [values.yaml](values.yaml)
priorityLevelConfigurationSpec :
type : Limited
limited :
nominalConcurrencyShares : 10
limitResponse :
queuing :
queueLengthLimit : 50
type : Queue
2023-02-01 00:12:34 +08:00
# -- Change `hostNetwork` to `true` when you want the pod to share its host's network namespace.
# Useful for situations like when you end up dealing with a custom CNI over Amazon EKS.
# Update the `dnsPolicy` accordingly as well to suit the host network mode.
hostNetwork : false
# -- `dnsPolicy` determines the manner in which DNS resolution happens in the cluster.
# In case of `hostNetwork: true`, usually, the `dnsPolicy` is suitable to be `ClusterFirstWithHostNet`.
# For further reference: https://kubernetes.io/docs/concepts/services-networking/dns-pod-service/#pod-s-dns-policy.
dnsPolicy : ClusterFirst
# -- Extra arguments passed to the container on the command line
2023-03-17 13:43:05 +01:00
extraArgs : {}
2023-02-01 00:12:34 +08:00
2023-06-03 14:47:34 +02:00
# -- Additional container environment variables.
extraEnvVars : [ ]
2023-02-01 00:12:34 +08:00
resources :
# -- Pod resource limits
limits :
memory : 128Mi
# -- Pod resource requests
requests :
cpu : 100m
memory : 64Mi
# -- Node labels for pod assignment
nodeSelector : {}
# -- List of node taints to tolerate
tolerations : [ ]
antiAffinity :
# -- Pod antiAffinities toggle.
# Enabled by default but can be disabled if you want to schedule pods to the same node.
enabled : true
# -- Pod anti affinity constraints.
# @default -- See [values.yaml](values.yaml)
podAntiAffinity :
preferredDuringSchedulingIgnoredDuringExecution :
- weight : 1
podAffinityTerm :
labelSelector :
matchExpressions :
- key : app.kubernetes.io/component
operator : In
values :
2023-04-25 13:23:01 +02:00
- reports-controller
2023-02-01 00:12:34 +08:00
topologyKey : kubernetes.io/hostname
# -- Pod affinity constraints.
podAffinity : {}
# -- Node affinity constraints.
nodeAffinity : {}
# -- Topology spread constraints.
2023-01-19 14:28:28 +01:00
topologySpreadConstraints : [ ]
# -- Security context for the pod
podSecurityContext : {}
# -- Security context for the containers
securityContext :
runAsNonRoot : true
privileged : false
allowPrivilegeEscalation : false
readOnlyRootFilesystem : true
capabilities :
drop :
- ALL
seccompProfile :
type : RuntimeDefault
podDisruptionBudget :
# -- Configures the minimum available pods for disruptions.
# Cannot be used if `maxUnavailable` is set.
minAvailable : 1
# -- Configures the maximum unavailable pods for disruptions.
# Cannot be used if `minAvailable` is set.
maxUnavailable :
2023-04-25 13:23:01 +02:00
# -- A writable volume to use for the TUF root initialization.
tufRootMountPath : /.sigstore
# -- Volume to be mounted in pods for TUF/cosign work.
sigstoreVolume :
emptyDir : {}
2023-01-19 14:28:28 +01:00
metricsService :
# -- Create service.
create : true
# -- Service port.
# Metrics server will be exposed at this port.
port : 8000
# -- Service type.
type : ClusterIP
2023-04-25 13:23:01 +02:00
# -- (string) Service node port.
# Only used if `type` is `NodePort`.
nodePort : ~
2023-01-19 14:28:28 +01:00
# -- Service annotations.
annotations : {}
2023-03-16 15:14:39 +01:00
networkPolicy :
# -- When true, use a NetworkPolicy to allow ingress to the webhook
# This is useful on clusters using Calico and/or native k8s network policies in a default-deny setup.
enabled : false
# -- A list of valid from selectors according to https://kubernetes.io/docs/concepts/services-networking/network-policies.
ingressFrom : [ ]
2023-01-19 14:28:28 +01:00
serviceMonitor :
# -- Create a `ServiceMonitor` to collect Prometheus metrics.
2022-12-12 19:39:29 +01:00
enabled : false
# -- Additional labels
2023-03-03 05:24:32 +01:00
additionalLabels : {}
# -- (string) Override namespace
namespace : ~
2023-04-25 13:23:01 +02:00
# -- Interval to scrape metrics
2022-12-12 19:39:29 +01:00
interval : 30s
# -- Timeout if metrics can't be retrieved in given time interval
scrapeTimeout : 25s
# -- Is TLS required for endpoint
secure : false
# -- TLS Configuration for endpoint
tlsConfig : {}
2023-06-26 16:24:15 +02:00
# -- RelabelConfigs to apply to samples before scraping
relabelings : [ ]
# -- MetricRelabelConfigs to apply to samples before ingestion.
metricRelabelings : [ ]
2022-12-12 19:39:29 +01:00
tracing :
# -- Enable tracing
enabled : false
2023-04-25 13:23:01 +02:00
# -- (string) Traces receiver address
address : ~
# -- (string) Traces receiver port
port : ~
# -- (string) Traces receiver credentials
creds : ~
2022-12-12 19:39:29 +01:00
metering :
# -- Disable metrics export
disabled : false
# -- Otel configuration, can be `prometheus` or `grpc`
config : prometheus
# -- Prometheus endpoint port
port : 8000
2023-04-25 13:23:01 +02:00
# -- (string) Otel collector endpoint
collector : ~
# -- (string) Otel collector credentials
creds : ~