Files
kubernetes/dev/argocd/values.org
2025-11-23 18:58:51 +01:00

155 KiB
Raw Permalink Blame History

## Argo CD configuration ## Ref: https://github.com/argoproj/argo-cd ##

nameOverride: argocd

fullnameOverride: ""

namespaceOverride: ""

kubeVersionOverride: ""

apiVersionOverrides: {}

## Ref: https://kubernetes.io/docs/reference/access-authn-authz/rbac/#aggregated-clusterroles createAggregateRoles: false

## Used when you manage applications in the same cluster where Argo CD runs createClusterRoles: true

openshift:

enabled: false

## Custom resource configuration crds:

install: true

keep: true

annotations: {}

additionalLabels: {}

## Globally shared configuration global:

## Used for ingresses, certificates, SSO, notifications, etc. domain: argocd.example.com

runtimeClassName: ""

additionalLabels: {}

revisionHistoryLimit: 3

image:

repository: quay.io/argoproj/argocd

tag: ""

imagePullPolicy: IfNotPresent

imagePullSecrets: []

logging:

format: text

level: info

statefulsetAnnotations: {}

deploymentAnnotations: {}

deploymentLabels: {}

podAnnotations: {}

podLabels: {}

addPrometheusAnnotations: false

securityContext: {}

hostAliases: []

dualStack:

ipFamilyPolicy: ""

ipFamilies: []

networkPolicy:

create: false

defaultDenyIngress: false

priorityClassName: ""

nodeSelector: kubernetes.io/os: linux

tolerations: []

affinity:

podAntiAffinity: soft

nodeAffinity:

type: hard

matchExpressions: []

## Ref: https://kubernetes.io/docs/concepts/scheduling-eviction/topology-spread-constraints/ ## If labelSelector is left out, it will default to the labelSelector of the component topologySpreadConstraints: []

deploymentStrategy: {}

env: []

certificateAnnotations: {}

## Argo Configs configs:

## Ref: https://github.com/argoproj/argo-cd/blob/master/docs/operator-manual/argocd-cm.yaml cm:

create: true

annotations: {}

application.instanceLabelKey: argocd.argoproj.io/instance

## Ref: https://argo-cd.readthedocs.io/en/stable/operator-manual/app-sync-using-impersonation/ application.sync.impersonation.enabled: false

## Ref: https://argo-cd.readthedocs.io/en/latest/operator-manual/rbac/#exec-resource exec.enabled: false

## Ref: https://argo-cd.readthedocs.io/en/latest/faq/#how-to-disable-admin-user admin.enabled: true

timeout.reconciliation: 180s

timeout.hard.reconciliation: 0s

## Ref: https://argo-cd.readthedocs.io/en/stable/user-guide/status-badge/ statusbadge.enabled: false

## Ref: https://argo-cd.readthedocs.io/en/latest/developer-guide/extensions/proxy-extensions/

## Default configuration for ignoreResourceUpdates. ## The ignoreResourceUpdates list contains K8s resource's properties that are known to be frequently updated ## by controllers and operators. These resources, when watched by argo, will cause many unnecessary updates.

resource.customizations.ignoreResourceUpdates.all: | jsonPointers:

  • /status

## The Application itself is already watched by the controller lister, but this configuration is applied for apps of apps

resource.customizations.ignoreResourceUpdates.argoproj.io_Application: | jqPathExpressions:

  • '.metadata.annotations."notified.notifications.argoproj.io"'
  • '.metadata.annotations."argocd.argoproj.io/refresh"'
  • '.metadata.annotations."argocd.argoproj.io/hydrate"'
  • '.operation'

resource.customizations.ignoreResourceUpdates.argoproj.io_Rollout: | jqPathExpressions:

  • '.metadata.annotations."notified.notifications.argoproj.io"'

resource.customizations.ignoreResourceUpdates.autoscaling_HorizontalPodAutoscaler: | jqPathExpressions:

  • '.metadata.annotations."autoscaling.alpha.kubernetes.io/behavior"'
  • '.metadata.annotations."autoscaling.alpha.kubernetes.io/conditions"'
  • '.metadata.annotations."autoscaling.alpha.kubernetes.io/metrics"'
  • '.metadata.annotations."autoscaling.alpha.kubernetes.io/current-metrics"'

resource.customizations.ignoreResourceUpdates.ConfigMap: | jqPathExpressions:

  • '.metadata.annotations."cluster-autoscaler.kubernetes.io/last-updated"'
  • '.metadata.annotations."control-plane.alpha.kubernetes.io/leader"'

resource.customizations.ignoreResourceUpdates.apps_ReplicaSet: | jqPathExpressions:

  • '.metadata.annotations."deployment.kubernetes.io/desired-replicas"'
  • '.metadata.annotations."deployment.kubernetes.io/max-replicas"'
  • '.metadata.annotations."rollout.argoproj.io/desired-replicas"'

resource.customizations.ignoreResourceUpdates.discovery.k8s.io_EndpointSlice: | jsonPointers:

  • /metadata
  • /endpoints
  • /ports

resource.customizations.ignoreResourceUpdates.Endpoints: | jsonPointers:

  • /metadata
  • /subsets

## Default configuration for exclusions. ## The exclusion list are K8s resources that we assume will never be declared in Git, ## and are never child objects of managed resources that need to be presented in the resource tree. ## This list contains high volume and high churn metadata objects which we exclude for performance ## reasons, reducing connections and load to the K8s API servers of managed clusters.

resource.exclusions: | ### Network resources created by the Kubernetes control plane and excluded to reduce the number of watched events and UI clutter

  • apiGroups:

    • ''
    • discovery.k8s.io

    kinds:

    • Endpoints
    • EndpointSlice

### Internal Kubernetes resources excluded reduce the number of watched events

  • apiGroups:

    • coordination.k8s.io

    kinds:

    • Lease

### Internal Kubernetes Authz/Authn resources excluded reduce the number of watched events

  • apiGroups:

    • authentication.k8s.io
    • authorization.k8s.io

    kinds:

    • SelfSubjectReview
    • TokenReview
    • LocalSubjectAccessReview
    • SelfSubjectAccessReview
    • SelfSubjectRulesReview
    • SubjectAccessReview

### Intermediate Certificate Request excluded reduce the number of watched events

  • apiGroups:

    • certificates.k8s.io

    kinds:

    • CertificateSigningRequest
  • apiGroups:

    • cert-manager.io

    kinds:

    • CertificateRequest

### Cilium internal resources excluded reduce the number of watched events and UI Clutter

  • apiGroups:

    • cilium.io

    kinds:

    • CiliumIdentity
    • CiliumEndpoint
    • CiliumEndpointSlice

### Kyverno intermediate and reporting resources excluded reduce the number of watched events and improve performance

  • apiGroups:

    • kyverno.io
    • reports.kyverno.io
    • wgpolicyk8s.io

    kinds:

    • PolicyReport
    • ClusterPolicyReport
    • EphemeralReport
    • ClusterEphemeralReport
    • AdmissionReport
    • ClusterAdmissionReport
    • BackgroundScanReport
    • ClusterBackgroundScanReport
    • UpdateRequest

## Ref: https://github.com/argoproj/argo-cd/blob/master/docs/operator-manual/argocd-cmd-params-cm.yaml params:

create: true

annotations: {}

## Ref: https://github.com/argoproj/argo-cd/blob/master/docs/operator-manual/rbac.md rbac:

create: true

annotations: {}

policy.default: ''

policy.csv: ''

scopes: "[groups]"

policy.matchMode: "glob"

## Ref: https://argo-cd.readthedocs.io/en/stable/user-guide/gpg-verification/ gpg:

annotations: {}

## Note: Public keys should be exported with `gpg export armor <KEY>` keys: {}

## Ref: https://argo-cd.readthedocs.io/en/stable/operator-manual/declarative-setup/#ssh-known-host-public-keys ssh:

create: true

annotations: {}

knownHosts: | [ssh.github.com]:443 ecdsa-sha2-nistp256 AAAAE2VjZHNhLXNoYTItbmlzdHAyNTYAAAAIbmlzdHAyNTYAAABBBEmKSENjQEezOmxkZMy7opKgwFB9nkt5YRrYMjNuG5N87uRgg6CLrbo5wAdT/y6v0mKV0U2w0WZ2YB/++Tpockg= [ssh.github.com]:443 ssh-ed25519 AAAAC3NzaC1lZDI1NTE5AAAAIOMqqnkVzrm0SdG6UOoqKLsabgH5C9okWi0dh2l9GKJl [ssh.github.com]:443 ssh-rsa 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 bitbucket.org ecdsa-sha2-nistp256 AAAAE2VjZHNhLXNoYTItbmlzdHAyNTYAAAAIbmlzdHAyNTYAAABBBPIQmuzMBuKdWeF4+a2sjSSpBK0iqitSQ+5BM9KhpexuGt20JpTVM7u5BDZngncgrqDMbWdxMWWOGtZ9UgbqgZE= bitbucket.org ssh-ed25519 AAAAC3NzaC1lZDI1NTE5AAAAIIazEu89wgQZ4bqs3d63QSMzYVa0MuJ2e2gKTKqu+UUO bitbucket.org ssh-rsa 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 github.com ecdsa-sha2-nistp256 AAAAE2VjZHNhLXNoYTItbmlzdHAyNTYAAAAIbmlzdHAyNTYAAABBBEmKSENjQEezOmxkZMy7opKgwFB9nkt5YRrYMjNuG5N87uRgg6CLrbo5wAdT/y6v0mKV0U2w0WZ2YB/++Tpockg= github.com ssh-ed25519 AAAAC3NzaC1lZDI1NTE5AAAAIOMqqnkVzrm0SdG6UOoqKLsabgH5C9okWi0dh2l9GKJl github.com ssh-rsa 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 gitlab.com ecdsa-sha2-nistp256 AAAAE2VjZHNhLXNoYTItbmlzdHAyNTYAAAAIbmlzdHAyNTYAAABBBFSMqzJeV9rUzU4kWitGjeR4PWSa29SPqJ1fVkhtj3Hw9xjLVXVYrU9QlYWrOLXBpQ6KWjbjTDTdDkoohFzgbEY= gitlab.com ssh-ed25519 AAAAC3NzaC1lZDI1NTE5AAAAIAfuCHKVTjquxvt6CM6tdG4SLp1Btn/nOeHHE5UOzRdf gitlab.com ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQCsj2bNKTBSpIYDEGk9KxsGh3mySTRgMtXL583qmBpzeQ+jqCMRgBqB98u3z++J1sKlXHWfM9dyhSevkMwSbhoR8XIq/U0tCNyokEi/ueaBMCvbcTHhO7FcwzY92WK4Yt0aGROY5qX2UKSeOvuP4D6TPqKF1onrSzH9bx9XUf2lEdWT/ia1NEKjunUqu1xOB/StKDHMoX4/OKyIzuS0q/T1zOATthvasJFoPrAjkohTyaDUz2LN5JoH839hViyEG82yB+MjcFV5MU3N1l1QL3cVUCh93xSaua1N85qivl+siMkPGbO5xR/En4iEY6K2XPASUEMaieWVNTRCtJ4S8H+9 ssh.dev.azure.com ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQC7Hr1oTWqNqOlzGJOfGJ4NakVyIzf1rXYd4d7wo6jBlkLvCA4odBlL0mDUyZ0/QUfTTqeu+tm22gOsv+VrVTMk6vwRU75gY/y9ut5Mb3bR5BV58dKXyq9A9UeB5Cakehn5Zgm6x1mKoVyf+FFn26iYqXJRgzIZZcZ5V6hrE0Qg39kZm4az48o0AUbf6Sp4SLdvnuMa2sVNwHBboS7EJkm57XQPVU3/QpyNLHbWDdzwtrlS+ez30S3AdYhLKEOxAG8weOnyrtLJAUen9mTkol8oII1edf7mWWbWVf0nBmly21+nZcmCTISQBtdcyPaEno7fFQMDD26/s0lfKob4Kw8H vs-ssh.visualstudio.com ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQC7Hr1oTWqNqOlzGJOfGJ4NakVyIzf1rXYd4d7wo6jBlkLvCA4odBlL0mDUyZ0/QUfTTqeu+tm22gOsv+VrVTMk6vwRU75gY/y9ut5Mb3bR5BV58dKXyq9A9UeB5Cakehn5Zgm6x1mKoVyf+FFn26iYqXJRgzIZZcZ5V6hrE0Qg39kZm4az48o0AUbf6Sp4SLdvnuMa2sVNwHBboS7EJkm57XQPVU3/QpyNLHbWDdzwtrlS+ez30S3AdYhLKEOxAG8weOnyrtLJAUen9mTkol8oII1edf7mWWbWVf0nBmly21+nZcmCTISQBtdcyPaEno7fFQMDD26/s0lfKob4Kw8H

extraHosts: ''

tls:

annotations: {}

certificates: {}

create: true

cmp:

create: false

annotations: {}

plugins: {}

## Ref: ## - https://argo-cd.readthedocs.io/en/stable/operator-manual/declarative-setup/#clusters ## - https://argo-cd.readthedocs.io/en/stable/operator-manual/security/#external-cluster-credentials ## - https://argo-cd.readthedocs.io/en/stable/user-guide/projects/#project-scoped-repositories-and-clusters clusterCredentials: {}

## Creates a secret for each key/value specified below to create repository credentials credentialTemplates: {}

credentialTemplatesAnnotations: {}

## Creates a secret for each key/value specified below to create repositories ## Note: the last example in the list would use a repository credential template, configured under "configs.credentialTemplates". repositories: {}

repositoriesAnnotations: {}

secret:

createSecret: true

labels: {}

annotations: {}

githubSecret: ""

gitlabSecret: ""

bitbucketServerSecret: ""

bitbucketUUID: ""

gogsSecret: "" ## Azure DevOps azureDevops:

username: ""

password: ""

## Custom secrets. Useful for injecting SSO secrets into environment variables. ## Ref: https://argo-cd.readthedocs.io/en/stable/operator-manual/user-management/#sensitive-data-and-sso-client-secrets ## Note that all values must be non-empty. extra: {}

## Argo expects the password in the secret to be bcrypt hashed. You can create this hash with ## `htpasswd -nbBC 10 "" $ARGO_PWD | tr -d ':\n' | sed 's/$2y/$2a/'` argocdServerAdminPassword: ""

argocdServerAdminPasswordMtime: ""

## Ref: https://argo-cd.readthedocs.io/en/stable/operator-manual/custom-styles/ styles: ""

## Note: Supports use of custom Helm templates extraObjects: []

## Application controller controller:

name: application-controller

## With dynamic cluster distribution turned on, sharding of the clusters will gracefully ## rebalance if the number of replica's changes or one becomes unhealthy. (alpha) replicas: 1

## This is done using a deployment instead of a statefulSet ## When replicas are added or removed, the sharding algorithm is re-run to ensure that the ## clusters are distributed according to the algorithm. If the algorithm is well-balanced, ## like round-robin, then the shards will be well-balanced. dynamicClusterDistribution: false

runtimeClassName: ""

heartbeatTime: 10

revisionHistoryLimit: 5

## Application controller Pod Disruption Budget ## Ref: https://kubernetes.io/docs/tasks/run-application/configure-pdb/ pdb:

enabled: false

labels: {}

annotations: {}

minAvailable: ""

## Has higher precedence over `controller.pdb.minAvailable` maxUnavailable: ""

## Application controller Vertical Pod Autoscaler ## Ref: https://kubernetes.io/docs/concepts/workloads/autoscaling/#scaling-workloads-vertically/ vpa:

enabled: false

labels: {}

annotations: {}

## Ref: https://kubernetes.io/docs/concepts/workloads/autoscaling/#scaling-workloads-vertically ## Note: Recreate update mode requires more than one replica unless the min-replicas VPA controller flag is overridden updateMode: Initial

## Ref: https://github.com/kubernetes/autoscaler/blob/master/vertical-pod-autoscaler/examples/hamster.yaml containerPolicy: {}

## Application controller image image:

repository: ""

tag: ""

imagePullPolicy: ""

imagePullSecrets: []

extraArgs: []

env: []

envFrom: []

## Note: Supports use of custom Helm templates extraContainers: []

## If your target Kubernetes cluster(s) require a custom credential (exec) plugin ## you could use this (and the same in the server pod) to provide such executable ## Ref: https://kubernetes.io/docs/reference/access-authn-authz/authentication/#client-go-credential-plugins ## Note: Supports use of custom Helm templates initContainers: []

volumeMounts: []

volumes: []

## Application controller emptyDir volumes emptyDir:

sizeLimit: ""

statefulsetAnnotations: {}

deploymentAnnotations: {}

deploymentLabels: {}

podAnnotations: {}

podLabels: {}

resources: {}

containerPorts:

metrics: 8082

hostNetwork: false

dnsConfig: {}

dnsPolicy: "ClusterFirst"

containerSecurityContext: runAsNonRoot: true readOnlyRootFilesystem: true allowPrivilegeEscalation: false seccompProfile: type: RuntimeDefault capabilities: drop:

  • ALL

## Ref: https://kubernetes.io/docs/tasks/configure-pod-container/configure-liveness-readiness-startup-probes/ readinessProbe:

failureThreshold: 3

initialDelaySeconds: 10

periodSeconds: 10

successThreshold: 1

timeoutSeconds: 1

terminationGracePeriodSeconds: 30

priorityClassName: ""

nodeSelector: {}

tolerations: []

affinity: {}

## Ref: https://kubernetes.io/docs/concepts/scheduling-eviction/topology-spread-constraints/ ## If labelSelector is left out, it will default to the labelSelector configuration of the deployment topologySpreadConstraints: []

automountServiceAccountToken: true

serviceAccount:

create: true

name: argocd-application-controller

annotations: {}

labels: {}

automountServiceAccountToken: true

## Application controller metrics configuration metrics:

enabled: false

scrapeTimeout: "" applicationLabels:

enabled: false

labels: [] service:

type: ClusterIP

clusterIP: ""

annotations: {}

labels: {}

servicePort: 8082

portName: http-metrics serviceMonitor:

enabled: false

interval: 30s

honorLabels: false

relabelings: []

metricRelabelings: []

selector: {}

scheme: ""

tlsConfig: {}

namespace: "" # "monitoring"

additionalLabels: {}

annotations: {} rules:

enabled: false

namespace: "" # "monitoring"

selector: {}

additionalLabels: {}

annotations: {}

spec: []

## Enable this and set the rules: to whatever custom rules you want for the Cluster Role resource. ## Defaults to off clusterRoleRules:

enabled: false

rules: []

## Enable this and set the rules: to whatever custom rules you want for the Role resource. ## Defaults to off

roleRules: []

networkPolicy:

create: false

## Dex dex:

enabled: true

name: dex-server

extraArgs: []

runtimeClassName: ""

metrics:

enabled: false service:

annotations: {}

labels: {}

portName: http-metrics serviceMonitor:

enabled: false

interval: 30s

honorLabels: false

relabelings: []

metricRelabelings: []

selector: {}

scheme: ""

tlsConfig: {}

namespace: "" # "monitoring"

additionalLabels: {}

annotations: {}

## Dex Pod Disruption Budget ## Ref: https://kubernetes.io/docs/tasks/run-application/configure-pdb/ pdb:

enabled: false

labels: {}

annotations: {}

minAvailable: ""

## Has higher precedence over `dex.pdb.minAvailable` maxUnavailable: ""

## Dex image image:

repository: ghcr.io/dexidp/dex

tag: v2.44.0

imagePullPolicy: ""

imagePullSecrets: []

initImage:

repository: ""

tag: ""

imagePullPolicy: ""

resources: {}

env: []

envFrom: []

## Note: Supports use of custom Helm templates extraContainers: []

## Note: Supports use of custom Helm templates initContainers: []

volumeMounts: []

volumes: []

## Dex server emptyDir volumes emptyDir:

sizeLimit: ""

## Ref: https://argo-cd.readthedocs.io/en/stable/operator-manual/tls/#configuring-tls-to-argocd-dex-server ## Note: Issuing certificates via cert-manager in not supported right now because it's not possible to restart Dex automatically without extra controllers. certificateSecret:

enabled: false

labels: {}

annotations: {}

ca: ''

key: ''

crt: ''

deploymentAnnotations: {}

deploymentLabels: {}

podAnnotations: {}

podLabels: {}

resources: {}

containerPorts:

http: 5556

grpc: 5557

metrics: 5558

dnsConfig: {}

dnsPolicy: "ClusterFirst"

containerSecurityContext: runAsNonRoot: true readOnlyRootFilesystem: true allowPrivilegeEscalation: false seccompProfile: type: RuntimeDefault capabilities: drop:

  • ALL

## Probes for Dex server ## Supported from Dex >= 2.28.0 livenessProbe:

enabled: false

httpPath: /healthz/live

httpPort: metrics

httpScheme: HTTP

failureThreshold: 3

initialDelaySeconds: 10

periodSeconds: 10

successThreshold: 1

timeoutSeconds: 1

readinessProbe:

enabled: false

httpPath: /healthz/ready

httpPort: metrics

httpScheme: HTTP

failureThreshold: 3

initialDelaySeconds: 10

periodSeconds: 10

successThreshold: 1

timeoutSeconds: 1

terminationGracePeriodSeconds: 30

automountServiceAccountToken: true

serviceAccount:

create: true

name: argocd-dex-server

annotations: {}

automountServiceAccountToken: true

servicePortHttp: 5556

servicePortHttpName: http

servicePortGrpc: 5557

servicePortGrpcName: grpc

servicePortMetrics: 5558

priorityClassName: ""

nodeSelector: {}

tolerations: []

affinity: {}

## Ref: https://kubernetes.io/docs/concepts/scheduling-eviction/topology-spread-constraints/ ## If labelSelector is left out, it will default to the labelSelector configuration of the deployment topologySpreadConstraints: []

deploymentStrategy: {}

networkPolicy:

create: false

## Redis redis:

enabled: true

name: redis

runtimeClassName: ""

## Redis Pod Disruption Budget ## Ref: https://kubernetes.io/docs/tasks/run-application/configure-pdb/ pdb:

enabled: false

labels: {}

annotations: {}

minAvailable: ""

## Has higher precedence over `redis.pdb.minAvailable` maxUnavailable: ""

## Redis image image:

repository: ecr-public.aws.com/docker/library/redis

## Do not upgrade to >= 7.4.0, otherwise you are no longer using an open source version of Redis tag: 8.2.2-alpine

imagePullPolicy: ""

## Prometheus redis-exporter sidecar exporter:

enabled: false

env: [] ## Prometheus redis-exporter image image:

repository: ghcr.io/oliver006/redis_exporter

tag: v1.80.0

imagePullPolicy: ""

containerSecurityContext: runAsNonRoot: true readOnlyRootFilesystem: true allowPrivilegeEscalation: false seccompProfile: type: RuntimeDefault capabilities: drop:

  • ALL

## Probes for Redis exporter (optional) ## Ref: https://kubernetes.io/docs/tasks/configure-pod-container/configure-liveness-readiness-startup-probes/ readinessProbe:

enabled: false

initialDelaySeconds: 30

periodSeconds: 15

timeoutSeconds: 15

successThreshold: 1

failureThreshold: 5 livenessProbe:

enabled: false

initialDelaySeconds: 30

periodSeconds: 15

timeoutSeconds: 15

successThreshold: 1

failureThreshold: 5

resources: {}

imagePullSecrets: []

extraArgs: []

env: []

envFrom: []

## Probes for Redis server (optional) ## Ref: https://kubernetes.io/docs/tasks/configure-pod-container/configure-liveness-readiness-startup-probes/ readinessProbe:

enabled: false

initialDelaySeconds: 30

periodSeconds: 15

timeoutSeconds: 15

successThreshold: 1

failureThreshold: 5 livenessProbe:

enabled: false

initialDelaySeconds: 30

periodSeconds: 15

timeoutSeconds: 15

successThreshold: 1

failureThreshold: 5

## Note: Supports use of custom Helm templates extraContainers: []

## Note: Supports use of custom Helm templates initContainers: []

volumeMounts: []

volumes: []

deploymentAnnotations: {}

deploymentLabels: {}

podAnnotations: {}

podLabels: {}

resources: {}

securityContext: runAsNonRoot: true runAsUser: 999 seccompProfile: type: RuntimeDefault

containerPorts:

redis: 6379

metrics: 9121

dnsConfig: {}

dnsPolicy: "ClusterFirst"

containerSecurityContext: readOnlyRootFilesystem: true allowPrivilegeEscalation: false capabilities: drop:

  • ALL

servicePort: 6379

priorityClassName: ""

nodeSelector: {}

tolerations: []

affinity: {}

## Ref: https://kubernetes.io/docs/concepts/scheduling-eviction/topology-spread-constraints/ ## If labelSelector is left out, it will default to the labelSelector configuration of the deployment topologySpreadConstraints: []

terminationGracePeriodSeconds: 30

automountServiceAccountToken: true

serviceAccount:

create: false

name: ""

annotations: {}

automountServiceAccountToken: false

service:

annotations: {}

labels: {}

metrics:

enabled: false

service:

type: ClusterIP

clusterIP: None

annotations: {}

labels: {}

servicePort: 9121

portName: http-metrics

serviceMonitor:

enabled: false

interval: 30s

honorLabels: false

relabelings: []

metricRelabelings: []

selector: {}

scheme: ""

tlsConfig: {}

namespace: "" # "monitoring"

additionalLabels: {}

annotations: {}

networkPolicy:

create: false

## Redis-HA subchart replaces custom redis deployment when `redis-ha.enabled=true`

redis-ha:

enabled: false ## Redis image image:

repository: ecr-public.aws.com/docker/library/redis

## Do not upgrade to >= 7.4.0, otherwise you are no longer using an open source version of Redis tag: 8.2.2-alpine ## Prometheus redis-exporter sidecar exporter:

enabled: false

image: ghcr.io/oliver006/redis_exporter

tag: v1.75.0 persistentVolume:

enabled: false ## Redis specific configuration options redis:

masterGroupName: argocd

config:

save: '""' ## Enables a HA Proxy for better LoadBalancing / Sentinel Master support. Automatically proxies to Redis master. haproxy:

enabled: true

labels: app.kubernetes.io/name: argocd-redis-ha-haproxy image:

repository: ecr-public.aws.com/docker/library/haproxy metrics:

enabled: true

hardAntiAffinity: true

additionalAffinities: {}

affinity: |

tolerations: []

containerSecurityContext: readOnlyRootFilesystem: true

auth: true

existingSecret: argocd-redis

hardAntiAffinity: true

additionalAffinities: {}

affinity: |

tolerations: []

## https://kubernetes.io/docs/concepts/scheduling-eviction/topology-spread-constraints/ topologySpreadConstraints:

enabled: false

maxSkew: ""

topologyKey: ""

whenUnsatisfiable: ""

containerSecurityContext: readOnlyRootFilesystem: true

externalRedis:

host: ""

username: ""

password: ""

port: 6379

existingSecret: ""

secretAnnotations: {}

redisSecretInit:

enabled: true

name: redis-secret-init

image:

repository: "" # defaults to global.image.repository

tag: "" # defaults to global.image.tag

imagePullPolicy: "" # IfNotPresent

extraArgs: []

imagePullSecrets: []

runtimeClassName: ""

jobAnnotations: {}

podAnnotations: {}

podLabels: {}

resources: {}

containerSecurityContext: allowPrivilegeEscalation: false capabilities: drop:

  • ALL

readOnlyRootFilesystem: true runAsNonRoot: true seccompProfile: type: RuntimeDefault

securityContext: {}

serviceAccount:

create: true

name: ""

annotations: {}

automountServiceAccountToken: true

priorityClassName: ""

affinity: {}

nodeSelector: {}

tolerations: []

## Server server:

name: server

replicas: 1

runtimeClassName: ""

## Argo CD server Horizontal Pod Autoscaler autoscaling:

enabled: false

minReplicas: 1

maxReplicas: 5

targetCPUUtilizationPercentage: 50

targetMemoryUtilizationPercentage: 50

behavior: {}

metrics: []

## Argo CD server Pod Disruption Budget ## Ref: https://kubernetes.io/docs/tasks/run-application/configure-pdb/ pdb:

enabled: false

labels: {}

annotations: {}

minAvailable: ""

## Has higher precedence over `server.pdb.minAvailable` maxUnavailable: ""

## Argo CD server image image:

repository: "" # defaults to global.image.repository

tag: "" # defaults to global.image.tag

imagePullPolicy: "" # IfNotPresent

imagePullSecrets: []

extraArgs: []

env: []

envFrom: []

lifecycle: {}

## Argo CD extensions ## This function in tech preview stage, do expect instability or breaking changes in newer versions. ## Ref: https://github.com/argoproj-labs/argocd-extension-installer ## When you enable extensions, you need to configure RBAC of logged in Argo CD user. ## Ref: https://argo-cd.readthedocs.io/en/stable/operator-manual/rbac/#the-extensions-resource extensions:

enabled: false

## Argo CD extension installer image image:

repository: "quay.io/argoprojlabs/argocd-extension-installer"

tag: "v0.0.8"

imagePullPolicy: ""

## Ref: https://github.com/argoproj-labs/argocd-extension-metrics#install-ui-extension extensionList: []

containerSecurityContext: runAsNonRoot: true readOnlyRootFilesystem: true allowPrivilegeEscalation: false runAsUser: 1000 seccompProfile: type: RuntimeDefault capabilities: drop:

  • ALL

resources: {}

## Note: Supports use of custom Helm templates extraContainers: []

## If your target Kubernetes cluster(s) require a custom credential (exec) plugin ## you could use this (and the same in the application controller pod) to provide such executable ## Ref: https://kubernetes.io/docs/reference/access-authn-authz/authentication/#client-go-credential-plugins initContainers: []

volumeMounts: []

volumes: []

## Argo CD server emptyDir volumes emptyDir:

sizeLimit: ""

deploymentAnnotations: {}

deploymentLabels: {}

podAnnotations: {}

podLabels: {}

resources: {}

containerPorts:

server: 8080

metrics: 8083

hostNetwork: false

dnsConfig: {}

dnsPolicy: "ClusterFirst"

containerSecurityContext: runAsNonRoot: true readOnlyRootFilesystem: true allowPrivilegeEscalation: false seccompProfile: type: RuntimeDefault capabilities: drop:

  • ALL

## Readiness and liveness probes for default backend ## Ref: https://kubernetes.io/docs/tasks/configure-pod-container/configure-liveness-readiness-startup-probes/ readinessProbe:

failureThreshold: 3

initialDelaySeconds: 10

periodSeconds: 10

successThreshold: 1

timeoutSeconds: 1

livenessProbe:

failureThreshold: 3

initialDelaySeconds: 10

periodSeconds: 10

successThreshold: 1

timeoutSeconds: 1

terminationGracePeriodSeconds: 30

priorityClassName: ""

nodeSelector: {}

tolerations: []

affinity: {}

## Ref: https://kubernetes.io/docs/concepts/scheduling-eviction/topology-spread-constraints/ ## If labelSelector is left out, it will default to the labelSelector configuration of the deployment topologySpreadConstraints: []

deploymentStrategy: {}

## Ref: https://argo-cd.readthedocs.io/en/stable/operator-manual/tls/#tls-certificates-used-by-argocd-server certificate:

enabled: false

domain: ""

additionalHosts: []

## Ref: https://cert-manager.io/docs/usage/certificate/#renewal duration: ""

## Ref: https://cert-manager.io/docs/usage/certificate/#renewal renewBefore: ""

## Ref: https://cert-manager.io/docs/concepts/issuer issuer:

group: ""

kind: ""

name: ""

privateKey:

rotationPolicy: Never

encoding: PKCS1

algorithm: RSA

size: 2048

annotations: {}

### Ref: https://cert-manager.io/docs/reference/api-docs/#cert-manager.io/v1.KeyUsage usages: []

secretTemplateAnnotations: {}

## Ref: https://argo-cd.readthedocs.io/en/stable/operator-manual/tls/#tls-certificates-used-by-argocd-server certificateSecret:

enabled: false

annotations: {}

labels: {}

key: ''

crt: ''

## Server service configuration service:

annotations: {}

labels: {}

type: ClusterIP

nodePortHttp: 30080

nodePortHttps: 30443

servicePortHttp: 80

servicePortHttps: 443

servicePortHttpName: http

servicePortHttpsName: https

## Ref: https://kubernetes.io/docs/concepts/services-networking/service/#application-protocol servicePortHttpsAppProtocol: ""

loadBalancerClass: ""

loadBalancerIP: ""

## EKS Ref: https://repost.aws/knowledge-center/eks-cidr-ip-address-loadbalancer ## GKE Ref: https://cloud.google.com/kubernetes-engine/docs/concepts/network-overview#limit-connectivity-ext-lb loadBalancerSourceRanges: []

externalIPs: []

## Ref: https://kubernetes.io/docs/tasks/access-application-cluster/create-external-load-balancer/#preserving-the-client-source-ip externalTrafficPolicy: Cluster

## Ref: https://kubernetes.io/docs/concepts/services-networking/service/#virtual-ips-and-service-proxies sessionAffinity: None

## Server metrics service configuration metrics:

enabled: false service:

type: ClusterIP

clusterIP: ""

annotations: {}

labels: {}

servicePort: 8083

portName: http-metrics serviceMonitor:

enabled: false

interval: 30s

scrapeTimeout: ""

honorLabels: false

relabelings: []

metricRelabelings: []

selector: {}

scheme: ""

tlsConfig: {}

namespace: "" # monitoring

additionalLabels: {}

annotations: {}

automountServiceAccountToken: true

serviceAccount:

create: true

name: argocd-server

annotations: {}

labels: {}

automountServiceAccountToken: true

ingress:

enabled: false

## Additional configuration might be required in related configuration sections controller: generic

labels: {}

## Ref: https://argo-cd.readthedocs.io/en/stable/operator-manual/ingress/#option-1-ssl-passthrough annotations: {}

ingressClassName: ""

hostname: ""

path: /

pathType: Prefix

## TLS certificate will be retrieved from a TLS secret `argocd-server-tls` ## You can create this secret via `certificate` or `certificateSecret` option tls: false

extraHosts: []

## Note: Supports use of custom Helm templates extraPaths: []

## Note: Supports use of custom Helm templates extraRules: []

extraTls: []

## Ref: https://argo-cd.readthedocs.io/en/stable/operator-manual/ingress/#aws-application-load-balancers-albs-and-classic-elb-http-mode aws:

## This tells AWS to send traffic from the ALB using gRPC. ## For more information: https://docs.aws.amazon.com/elasticloadbalancing/latest/application/target-group-health-checks.html#health-check-settings backendProtocolVersion: GRPC

## Can be of type NodePort or ClusterIP depending on which mode you are running. ## Instance mode needs type NodePort, IP mode needs type ClusterIP ## Ref: https://kubernetes-sigs.github.io/aws-load-balancer-controller/v2.2/how-it-works/#ingress-traffic serviceType: NodePort

## Allows adding custom annotations to the gRPC service for integrations like DataDog, Prometheus, etc. serviceAnnotations: {}

## Ref: https://argo-cd.readthedocs.io/en/stable/operator-manual/ingress/#google-cloud-load-balancers-with-kubernetes-ingress gke:

## Ref: https://cloud.google.com/kubernetes-engine/docs/how-to/ingress-features#configuring_ingress_features_through_frontendconfig_parameters backendConfig: {}

## Ref: https://cloud.google.com/kubernetes-engine/docs/how-to/ingress-features#configuring_ingress_features_through_frontendconfig_parameters frontendConfig: {}

managedCertificate:

## Ref: https://cloud.google.com/kubernetes-engine/docs/how-to/managed-certs create: true

extraDomains: []

ingressGrpc:

enabled: false

annotations: {}

labels: {}

ingressClassName: ""

hostname: ""

path: /

pathType: Prefix

## TLS certificate will be retrieved from a TLS secret with name: `argocd-server-grpc-tls` tls: false

extraHosts: []

## Note: Supports use of custom Helm templates extraPaths: []

## Note: Supports use of custom Helm templates extraRules: []

extraTls: []

route:

enabled: false

annotations: {}

hostname: ""

termination_type: passthrough

termination_policy: None

httproute:

enabled: false

labels: {}

annotations: {}

## Must reference an existing Gateway

parentRefs: []

hostnames: []

rules:

  • matches:

    • path: type: PathPrefix value: /

grpcroute:

enabled: false

labels: {}

annotations: {}

## Must reference an existing Gateway

parentRefs: []

hostnames: []

rules:

  • matches:

    • method: type: Exact

backendTLSPolicy:

enabled: false

labels: {}

annotations: {}

targetRefs: []

validation: {}

## Enable this and set the rules: to whatever custom rules you want for the Cluster Role resource. ## Defaults to off clusterRoleRules:

enabled: false

rules: []

networkPolicy:

create: false

## Repo Server repoServer:

name: repo-server

replicas: 1

runtimeClassName: ""

## Repo server Horizontal Pod Autoscaler autoscaling:

enabled: false

minReplicas: 1

maxReplicas: 5

targetCPUUtilizationPercentage: 50

targetMemoryUtilizationPercentage: 50

behavior: {}

metrics: []

## Repo server Pod Disruption Budget ## Ref: https://kubernetes.io/docs/tasks/run-application/configure-pdb/ pdb:

enabled: false

labels: {}

annotations: {}

minAvailable: ""

## Has higher precedence over `repoServer.pdb.minAvailable` maxUnavailable: ""

## Repo server image image:

repository: ""

tag: ""

imagePullPolicy: ""

imagePullSecrets: []

extraArgs: []

env: []

envFrom: []

lifecycle: {}

## Ref: https://argo-cd.readthedocs.io/en/stable/user-guide/config-management-plugins/ ## Note: Supports use of custom Helm templates extraContainers: []

initContainers: []

copyutil:

resources: {}

volumeMounts: []

volumes: []

existingVolumes: {}

## RepoServer emptyDir volumes emptyDir:

sizeLimit: ""

useEphemeralHelmWorkingDir: true

deploymentAnnotations: {}

deploymentLabels: {}

podAnnotations: {}

podLabels: {}

resources: {}

containerPorts:

server: 8081

metrics: 8084

hostNetwork: false

dnsConfig: {}

dnsPolicy: "ClusterFirst"

containerSecurityContext: runAsNonRoot: true readOnlyRootFilesystem: true allowPrivilegeEscalation: false seccompProfile: type: RuntimeDefault capabilities: drop:

  • ALL

## Readiness and liveness probes for default backend ## Ref: https://kubernetes.io/docs/tasks/configure-pod-container/configure-liveness-readiness-startup-probes/ readinessProbe:

failureThreshold: 3

initialDelaySeconds: 10

periodSeconds: 10

successThreshold: 1

timeoutSeconds: 1

livenessProbe:

failureThreshold: 3

initialDelaySeconds: 10

periodSeconds: 10

successThreshold: 1

timeoutSeconds: 1

terminationGracePeriodSeconds: 30

nodeSelector: {}

tolerations: []

affinity: {}

## Ref: https://kubernetes.io/docs/concepts/scheduling-eviction/topology-spread-constraints/ ## If labelSelector is left out, it will default to the labelSelector configuration of the deployment topologySpreadConstraints: []

deploymentStrategy: {}

priorityClassName: ""

## Ref: https://argo-cd.readthedocs.io/en/stable/operator-manual/tls/#configuring-tls-to-argocd-repo-server ## Note: Issuing certificates via cert-manager in not supported right now because it's not possible to restart repo server automatically without extra controllers. certificateSecret:

enabled: false

annotations: {}

labels: {}

ca: ''

key: ''

crt: ''

## Repo server service configuration service:

annotations: {}

labels: {}

port: 8081

portName: tcp-repo-server

trafficDistribution: ""

## Repo server metrics service configuration metrics:

enabled: false service:

type: ClusterIP

clusterIP: ""

annotations: {}

labels: {}

servicePort: 8084

portName: http-metrics serviceMonitor:

enabled: false

interval: 30s

scrapeTimeout: ""

honorLabels: false

relabelings: []

metricRelabelings: []

selector: {}

scheme: ""

tlsConfig: {}

namespace: "" # "monitoring"

additionalLabels: {}

annotations: {}

## Enable Custom Rules for the Repo server's Cluster Role resource ## Enable this and set the rules: to whatever custom rules you want for the Cluster Role resource. ## Defaults to off clusterRoleRules:

enabled: false

rules: []

automountServiceAccountToken: true

## Repo server service account ## If create is set to true, make sure to uncomment the name and update the rbac section below serviceAccount:

create: true

name: "" # "argocd-repo-server"

annotations: {}

labels: {}

automountServiceAccountToken: true

rbac: []

networkPolicy:

create: false

## ApplicationSet controller applicationSet:

name: applicationset-controller

replicas: 1

runtimeClassName: ""

## ApplicationSet controller Pod Disruption Budget ## Ref: https://kubernetes.io/docs/tasks/run-application/configure-pdb/ pdb:

enabled: false

labels: {}

annotations: {}

minAvailable: ""

## Has higher precedence over `applicationSet.pdb.minAvailable` maxUnavailable: ""

## ApplicationSet controller image image:

repository: ""

tag: ""

imagePullPolicy: ""

imagePullSecrets: []

extraArgs: []

extraEnv: []

extraEnvFrom: []

## Note: Supports use of custom Helm templates extraContainers: []

## Note: Supports use of custom Helm templates initContainers: []

extraVolumeMounts: []

extraVolumes: []

## ApplicationSet controller emptyDir volumes emptyDir:

sizeLimit: ""

## Metrics service configuration metrics:

enabled: false service:

type: ClusterIP

clusterIP: ""

annotations: {}

labels: {}

servicePort: 8080

portName: http-metrics serviceMonitor:

enabled: false

interval: 30s

scrapeTimeout: ""

honorLabels: false

relabelings: []

metricRelabelings: []

selector: {}

scheme: ""

tlsConfig: {}

namespace: "" # monitoring

additionalLabels: {}

annotations: {}

## ApplicationSet service configuration service:

annotations: {}

labels: {}

type: ClusterIP

port: 7000

portName: http-webhook

automountServiceAccountToken: true

serviceAccount:

create: true

name: argocd-applicationset-controller

annotations: {}

labels: {}

automountServiceAccountToken: true

deploymentAnnotations: {}

deploymentLabels: {}

podAnnotations: {}

podLabels: {}

resources: {}

containerPorts:

metrics: 8080

probe: 8081

webhook: 7000

dnsConfig: {}

dnsPolicy: "ClusterFirst"

containerSecurityContext: runAsNonRoot: true readOnlyRootFilesystem: true allowPrivilegeEscalation: false seccompProfile: type: RuntimeDefault capabilities: drop:

  • ALL

## Probes for ApplicationSet controller (optional) ## Ref: https://kubernetes.io/docs/tasks/configure-pod-container/configure-liveness-readiness-startup-probes/ readinessProbe:

enabled: false

initialDelaySeconds: 10

periodSeconds: 10

timeoutSeconds: 1

successThreshold: 1

failureThreshold: 3

livenessProbe:

enabled: false

initialDelaySeconds: 10

periodSeconds: 10

timeoutSeconds: 1

successThreshold: 1

failureThreshold: 3

terminationGracePeriodSeconds: 30

nodeSelector: {}

tolerations: []

affinity: {}

## Ref: https://kubernetes.io/docs/concepts/workloads/pods/pod-topology-spread-constraints/ ## If labelSelector is left out, it will default to the labelSelector configuration of the deployment topologySpreadConstraints: []

deploymentStrategy: {}

priorityClassName: ""

## Ref: https://argo-cd.readthedocs.io/en/stable/operator-manual/tls/#tls-configuration certificate:

enabled: false

domain: ""

additionalHosts: []

## Ref: https://cert-manager.io/docs/usage/certificate/#renewal duration: ""

## Ref: https://cert-manager.io/docs/usage/certificate/#renewal renewBefore: ""

## Ref: https://cert-manager.io/docs/concepts/issuer issuer:

group: ""

kind: ""

name: ""

privateKey:

rotationPolicy: Never

encoding: PKCS1

algorithm: RSA

size: 2048

annotations: {}

## Ingress for the Git Generator webhook ## Ref: https://argocd-applicationset.readthedocs.io/en/master/Generators-Git/#webhook-configuration) ingress:

enabled: false

labels: {}

annotations: {}

ingressClassName: ""

hostname: ""

path: /api/webhook

pathType: Prefix

## TLS certificate will be retrieved from a TLS secret with name:`argocd-applicationset-controller-tls` tls: false

extraHosts: []

extraPaths: []

## Note: Supports use of custom Helm templates extraRules: []

extraTls: []

allowAnyNamespace: false

networkPolicy:

create: false

## Notifications controller notifications:

enabled: true

name: notifications-controller

argocdUrl: ""

runtimeClassName: ""

## Notifications controller Pod Disruption Budget ## Ref: https://kubernetes.io/docs/tasks/run-application/configure-pdb/ pdb:

enabled: false

labels: {}

annotations: {}

minAvailable: ""

## Has higher precedence over `notifications.pdb.minAvailable` maxUnavailable: ""

## Notifications controller image image:

repository: ""

tag: ""

imagePullPolicy: ""

imagePullSecrets: []

extraArgs: []

extraEnv: []

extraEnvFrom: []

## Note: Supports use of custom Helm templates extraContainers: []

## Note: Supports use of custom Helm templates initContainers: []

extraVolumeMounts: []

extraVolumes: []

## For more information: https://argo-cd.readthedocs.io/en/stable/operator-manual/notifications/templates/#defining-user-defined-context context: {}

secret:

## If true, will create a secret with the name below. Otherwise, will assume existence of a secret with that name. create: true

name: "argocd-notifications-secret"

annotations: {}

labels: {}

## Can be used for templates, notification services etc. Some examples given below. ## For more information: https://argo-cd.readthedocs.io/en/stable/operator-manual/notifications/services/overview/ items: {}

metrics:

enabled: false

port: 9001 service:

type: ClusterIP

clusterIP: ""

annotations: {}

labels: {}

portName: http-metrics serviceMonitor:

enabled: false

selector: {}

additionalLabels: {}

annotations: {}

scheme: ""

tlsConfig: {}

honorLabels: false

relabelings: []

metricRelabelings: []

## For more information: https://argo-cd.readthedocs.io/en/stable/operator-manual/notifications/services/overview/ notifiers: {}

deploymentAnnotations: {}

deploymentLabels: {}

podAnnotations: {}

podLabels: {}

resources: {}

containerPorts:

metrics: 9001

dnsConfig: {}

dnsPolicy: "ClusterFirst"

containerSecurityContext: runAsNonRoot: true readOnlyRootFilesystem: true allowPrivilegeEscalation: false seccompProfile: type: RuntimeDefault capabilities: drop:

  • ALL

## Probes for notifications controller Pods (optional) ## Ref: https://kubernetes.io/docs/tasks/configure-pod-container/configure-liveness-readiness-startup-probes/ readinessProbe:

enabled: false

initialDelaySeconds: 10

periodSeconds: 10

timeoutSeconds: 1

successThreshold: 1

failureThreshold: 3

livenessProbe:

enabled: false

initialDelaySeconds: 10

periodSeconds: 10

timeoutSeconds: 1

successThreshold: 1

failureThreshold: 3

terminationGracePeriodSeconds: 30

nodeSelector: {}

tolerations: []

affinity: {}

## Ref: https://kubernetes.io/docs/concepts/scheduling-eviction/topology-spread-constraints/ ## If labelSelector is left out, it will default to the labelSelector configuration of the deployment topologySpreadConstraints: []

deploymentStrategy: type: Recreate

priorityClassName: ""

automountServiceAccountToken: true

serviceAccount:

create: true

name: argocd-notifications-controller

annotations: {}

labels: {}

automountServiceAccountToken: true

cm:

create: true

## Enable this and set the rules: to whatever custom rules you want for the Cluster Role resource. ## Defaults to off clusterRoleRules:

rules: []

## For more information: https://argo-cd.readthedocs.io/en/stable/operator-manual/notifications/subscriptions/ subscriptions: []

## For more information: https://argo-cd.readthedocs.io/en/stable/operator-manual/notifications/templates/ templates: {}

## For more information: https://argo-cd.readthedocs.io/en/stable/operator-manual/notifications/triggers/ triggers: {}

#

networkPolicy:

create: false

commitServer:

enabled: false

name: commit-server

runtimeClassName: ""

## commit server controller image image:

repository: ""

tag: ""

imagePullPolicy: ""

extraArgs: []

extraEnv: []

extraEnvFrom: []

extraVolumeMounts: []

extraVolumes: []

metrics:

enabled: false service:

type: ClusterIP

clusterIP: ""

annotations: {}

labels: {}

servicePort: 8087

portName: metrics

## commit server service configuration service:

annotations: {}

labels: {}

port: 8086

portName: server

automountServiceAccountToken: false

serviceAccount:

create: true

name: argocd-commit-server

annotations: {}

labels: {}

automountServiceAccountToken: true

deploymentAnnotations: {}

deploymentLabels: {}

podAnnotations: {}

podLabels: {}

resources: {}

dnsConfig: {}

dnsPolicy: "ClusterFirst"

containerSecurityContext: runAsNonRoot: true readOnlyRootFilesystem: true allowPrivilegeEscalation: false capabilities: drop:

  • ALL

seccompProfile: type: RuntimeDefault

## Probes for commit server (optional) ## Ref: https://kubernetes.io/docs/tasks/configure-pod-container/configure-liveness-readiness-startup-probes/ readinessProbe:

enabled: true

initialDelaySeconds: 5

periodSeconds: 10

timeoutSeconds: 1

failureThreshold: 3

livenessProbe:

enabled: true

initialDelaySeconds: 30

periodSeconds: 30

timeoutSeconds: 5

failureThreshold: 3

terminationGracePeriodSeconds: 30

nodeSelector: {}

tolerations: []

affinity: {}

## Ref: https://kubernetes.io/docs/concepts/workloads/pods/pod-topology-spread-constraints/ ## If labelSelector is left out, it will default to the labelSelector configuration of the deployment topologySpreadConstraints: []

deploymentStrategy: {}

priorityClassName: ""

networkPolicy:

create: false