blob: cfd80ffb453a6ed370bcb45359dab781b6aa3326 [file] [log] [blame]
global:
# To help compatibility with other charts which use global.imagePullSecrets.
# Allow either an array of {name: pullSecret} maps (k8s-style), or an array of strings (more common helm-style).
# Can be tempalted.
# global:
# imagePullSecrets:
# - name: pullSecret1
# - name: pullSecret2
# or
# global:
# imagePullSecrets:
# - pullSecret1
# - pullSecret2
imagePullSecrets: []
fullnameOverride: {}
nameOverride: {}
namespaceOverride: {}
labels: {}
annotations: {}
volumes:
name: application-properties
volumeMounts:
mountPath: /config
name: application-properties
readOnly: true
rbac:
create: true
# Use an existing ClusterRole/Role (depending on rbac.namespaced false/true)
pspEnabled: true
pspUseAppArmor: true
namespaced: false
extraRoleRules: []
useExistingRole: []
# - apiGroups: []
# resources: []
# verbs: []
extraClusterRoleRules: []
# - apiGroups: []
# resources: []
# verbs: []
## serviceAccount
serviceAccount:
create: true
name:
## ServiceAccount labels.
labels: {}
annotations: {}
## Number of copies
replicas: 1
# -- Optional array of imagePullSecrets containing private registry credentials
## Ref: https://kubernetes.io/docs/tasks/configure-pod-container/pull-image-private-registry/
imagePullSecrets: []
# - name: secretName
## Create a headless service for the deployment
headlessService: false
## Create HorizontalPodAutoscaler object for deployment type
autoscaling:
enabled: false
minReplicas: 1
maxReplicas: 5
targetCPU: "60"
targetMemory: ""
behavior: {}
## Number of old ReplicaSets to retain
##
revisionHistoryLimit: 10
## See `kubectl explain poddisruptionbudget.spec` for more
## ref: https://kubernetes.io/docs/tasks/run-application/configure-pdb/
podDisruptionBudget: {}
# minAvailable: 1
# maxUnavailable: 1
## See `kubectl explain deployment.spec.strategy` for more
## ref: https://kubernetes.io/docs/concepts/workloads/controllers/deployment/#strategy
deploymentStrategy:
type: RollingUpdate
readinessProbe:
httpGet:
path: /
port: 8080
initialDelaySeconds: 60
timeoutSeconds: 30
periodSeconds: 10
successThreshold: 1
failureThreshold: 3
livenessProbe:
httpGet:
path: /
port: 8080
initialDelaySeconds: 60
timeoutSeconds: 30
periodSeconds: 10
successThreshold: 1
failureThreshold: 3
image:
repository: apache/dubbo-admin
tag: "0.5.0"
pullPolicy: IfNotPresent
## Optionally specify an array of imagePullSecrets.
## Secrets must be manually created in the namespace.
## ref: https://kubernetes.io/docs/tasks/configure-pod-container/pull-image-private-registry/
## Can be templated.
##
pullSecrets: []
# - RegisterKeySecretName
securityContext:
# runAsUser: 570
# runAsGroup: 570
# fsGroup: 570
testFramework:
enabled: true
image: busybox
tag: ""
imagePullPolicy: IfNotPresent
securityContext: {}
containerSecurityContext: {}
## Sensible environment variables that will be rendered as new secret object
## This can be useful for auth tokens, etc
envRenderSecret: {}
# -- `minReadySeconds` to avoid killing pods before we are ready
##
minReadySeconds: 0
# -- Node tolerations for server scheduling to nodes with taints
## Ref: https://kubernetes.io/docs/concepts/configuration/assign-pod-node/
##
createConfigmap: true
ConfigmapMounts: []
# - name: configMap-file
# mountPath: /config
# configMap: configMap-file
# readOnly: true
SecretMounts:
# - name: secret-file
# secret:
# secretName: secret-file
##
extraSecretMounts: []
# - name: secret-files
# mountPath: /etc/secrets
# secretName: secret-files
# readOnly: true
# subPath: ""
##
EmptyDirMounts: []
# - name: ""
# mountPath: /
##
# Apply extra labels to common labels.
extraLabels: {}
## Assign a PriorityClassName to pods if set
# priorityClassName:
## Pod Annotations
# podAnnotations: {}
## Pod Labels
# podLabels: {}
## Expose the dubbo-admin service to be accessed from outside the cluster (LoadBalancer service).
## or access it from within the cluster (ClusterIP service). Set the service type and the port to serve it.
## ref: http://kubernetes.io/docs/user-guide/services/
##
service:
name: http
##
##
##
enabled: true
##
##
##
type: ClusterIP
##
##
##
clusterIP: []
##
##
##
loadBalancerIP: []
##
##
##
loadBalancerSourceRanges: []
##
##
##
externalIPs: []
##
##
##
nodePort: []
##
##
##
path: /
##
##
##
port: 38080
##
##
##
targetPort: http
##
##
##
containerPort: 8080
##
##
##
protocol: TCP
##
##
##
## Service annotations. Can be templated.
annotations: {}
labels: {}
portName: service
appProtocol: ""
ingress:
enabled: false
# For Kubernetes >= 1.18 you should specify the ingress-controller via the field ingressClassName
# See https://kubernetes.io/blog/2020/04/02/improvements-to-the-ingress-api-in-kubernetes-1.18/#specifying-the-class-of-an-ingress
# ingressClassName: nginx
# Values can be templated
annotations: {}
# kubernetes.io/ingress.class: nginx
# kubernetes.io/tls-acme: "true"
labels: {}
path: /
# pathType is only for k8s >= 1.1=
pathType: Prefix
hosts:
- chart-example.local
## Extra paths to prepend to every host configuration. This is useful when working with annotation based services.
extraPaths: []
# - path: /*
# backend:
# serviceName: ssl-redirect
# servicePort: use-annotation
## Or for k8s > 1.19
# - path: /*
# pathType: Prefix
# backend:
# service:
# name: ssl-redirect
# port:
# name: use-annotation
tls: []
# - secretName: chart-example-tls
# hosts:
# - chart-example.local
resources: {}
# limits:
# cpu: 100m
# memory: 128Mi
# requests:
# cpu: 100m
# memory: 128Mi
## Node labels for pod assignment
## ref: https://kubernetes.io/docs/user-guide/node-selection/
#
nodeSelector: {}
## Tolerations for pod assignment
## ref: https://kubernetes.io/docs/concepts/configuration/taint-and-toleration/
##
tolerations: []
## Affinity for pod assignment (evaluated as template)
## ref: https://kubernetes.io/docs/concepts/configuration/assign-pod-node/#affinity-and-anti-affinity
##
affinity: {}
## Topology Spread Constraints
## ref: https://kubernetes.io/docs/concepts/workloads/pods/pod-topology-spread-constraints/
##
topologySpreadConstraints: []
## Additional init containers (evaluated as template)
## ref: https://kubernetes.io/docs/concepts/workloads/pods/init-containers/
##
InitContainers: []
## Enable persistence using Persistent Volume Claims
## ref: http://kubernetes.io/docs/user-guide/persistent-volumes/
##
persistence:
enabled: false
type: pvc
# storageClassName: default
accessModes:
- ReadWriteOnce
size: 10Gi
# annotations: {}
finalizers:
- kubernetes.io/pvc-protection
# selectorLabels: {}
## Sub-directory of the PV to mount. Can be templated.
# subPath: ""
## Name of an existing PVC. Can be templated.
# existingClaim:
## Extra labels to apply to a PVC.
extraPvcLabels: {}
## If persistence is not enabled, this allows to mount the
## local storage in-memory to improve performance
##
inMemory:
enabled: false
## The maximum usage on memory medium EmptyDir would be
## the minimum value between the SizeLimit specified
## here and the sum of memory limits of all containers in a pod
##
# sizeLimit: 300Mi
initChownData:
## If false, data ownership will not be reset at startup
## This allows the dubbo-admin-server to be run with an arbitrary user
##
##
##
enabled: true
##
##
## initChownData container image
##
##
image:
repository: busybox
tag: "1.31.1"
sha: ""
pullPolicy: IfNotPresent
##
##
##
##
## initChownData resource requests and limits
## Ref: http://kubernetes.io/docs/user-guide/compute-resources/
##
resources: {}
# limits:
# cpu: 100m
# memory: 128Mi
# requests:
# cpu: 100m
# memory: 128Mi
securityContext:
runAsNonRoot: false
runAsUser: 0
## Container Lifecycle Hooks. Execute a specific bash command or make an HTTP request
lifecycleHooks: {}
# postStart:
# exec:
# command: []
networkPolicy:
## @param networkPolicy.enabled Enable creation of NetworkPolicy resources. Only Ingress traffic is filtered for now.
##
enabled: false
## @param networkPolicy.allowExternal Don't require client label for connections
## The Policy model to apply. When set to false, only pods with the correct
## client label will have network access to dubbo-admin port defined.
## When true, dubbo-admin will accept connections from any source
## (with the correct destination port).
##
ingress: true
## @param networkPolicy.ingress When true enables the creation
## an ingress network policy
##
allowExternal: true
## @param networkPolicy.explicitNamespacesSelector A Kubernetes LabelSelector to explicitly select namespaces from which traffic could be allowed
## If explicitNamespacesSelector is missing or set to {}, only client Pods that are in the networkPolicy's namespace
## and that match other criteria, the ones that have the good label, can reach the dubbo-admin.
## But sometimes, we want the dubbo-admin to be accessible to clients from other namespaces, in this case, we can use this
## LabelSelector to select these namespaces, note that the networkPolicy's namespace should also be explicitly added.
##
## Example:
## explicitNamespacesSelector:
## matchLabels:
## role: frontend
## matchExpressions:
## - {key: role, operator: In, values: [frontend]}
##
explicitNamespacesSelector: {}
##
##
##
##
##
##
egress:
## @param networkPolicy.egress.enabled When enabled, an egress network policy will be
## created allowing dubbo-admin to connect to external data sources from kubernetes cluster.
enabled: false
##
## @param networkPolicy.egress.ports Add individual ports to be allowed by the egress
ports: []
## Add ports to the egress by specifying - port: <port number>
## E.X.
## ports:
## - port: 80
## - port: 443
properties:
admin.registry.address: zookeeper://zookeeper:2181
admin.config-center: zookeeper://zookeeper:2181
admin.metadata-report.address: zookeeper://zookeeper:2181
admin.root.user.name: root
admin.root.user.password: root
admin.check.sessionTimeoutMilli: 3600000
server.compression.enabled: true
server.compression.mime-types: text/css,text/javascript,application/javascript
server.compression.min-response-size: 10240
admin.check.tokenTimeoutMilli: 3600000
admin.check.signSecret: 86295dd0c4ef69a1036b0b0c15158d77
dubbo.application.name: dubbo-admin
dubbo.registry.address: ${admin.registry.address}
spring.datasource.url: jdbc:h2:mem:~/dubbo-admin;MODE=MYSQL;
spring.datasource.username: sa
spring.datasource.password:
mybatis-plus.global-config.db-config.id-type: none
dubbo.application.logger: slf4j
# nacos config, add parameters to url like username=nacos&password=nacos
# admin.registry.address: nacos://127.0.0.1:8848?group=DEFAULT_GROUP&namespace=public
# admin.config-center: nacos://127.0.0.1:8848?group=dubbo
# admin.metadata-report.address: nacos://127.0.0.1:8848?group=dubbo
# group (Deprecated it is recommended to use URL to add parameters,will be removed in the future)
# admin.registry.group: dubbo
# admin.config-center.group: dubbo
# admin.metadata-report.group: dubbo
# namespace used by nacos.(Deprecated it is recommended to use URL to add parameters,will be removed in the future)
# admin.registry.namespace: public
# admin.config-center.namespace: public
# admin.metadata-report.namespace: public
# apollo config
# admin.config-center: apollo://localhost:8070?token=e16e5cd903fd0c97a116c873b448544b9d086de9&app.id=test&env=dev&cluster=default&namespace=dubbo
# admin.apollo.token: e16e5cd903fd0c97a116c873b448544b9d086de9
# admin.apollo.appId: test
# admin.apollo.env: dev
# admin.apollo.cluster: default
# mysql
# spring.datasource.driver-class-name: com.mysql.jdbc.Driver
# spring.datasource.url: jdbc:mysql://localhost:3306/dubbo-admin?characterEncoding=utf8&connectTimeout=1000&socketTimeout=10000&autoReconnect=true
# spring.datasource.username: root
# spring.datasource.password: mysql