[bitnami/contour] Release 10.0.0 (#13355)

* [bitnami/contour] Release 10.0.0 updating components versions

Signed-off-by: Bitnami Containers <bitnami-bot@vmware.com>

* Update README.md with readme-generator-for-helm

Signed-off-by: Bitnami Containers <bitnami-bot@vmware.com>

Signed-off-by: Bitnami Containers <bitnami-bot@vmware.com>
This commit is contained in:
Bitnami Bot
2022-11-07 16:18:05 +01:00
committed by GitHub
parent 8dd964ad5f
commit 5e56ca86f9
4 changed files with 221 additions and 221 deletions

View File

@@ -1,6 +1,6 @@
dependencies:
- name: common
repository: https://charts.bitnami.com/bitnami
version: 2.0.3
digest: sha256:7d4a98a9fabc3be62a3898cc530d0979b6a0a4d29c87ed2d128821f21c89ba40
generated: "2022-10-06T23:09:33.730654727Z"
version: 2.1.2
digest: sha256:1c365a4551a2f4098e9584dc176b289c10437c679c7c3e2ec6153cabf863e1a4
generated: "2022-11-04T14:17:15.534316747Z"

View File

@@ -1,7 +1,7 @@
annotations:
category: Infrastructure
apiVersion: v2
appVersion: 1.22.1
appVersion: 1.23.0
dependencies:
- name: common
repository: https://charts.bitnami.com/bitnami
@@ -25,4 +25,4 @@ sources:
- https://github.com/envoyproxy/envoy
- https://github.com/bitnami/containers/tree/main/bitnami/contour
- https://projectcontour.io
version: 9.2.0
version: 10.0.0

View File

@@ -7,7 +7,7 @@ Contour is an open source Kubernetes ingress controller that works by deploying
[Overview of Contour](https://github.com/projectcontour/contour)
Trademarks: This software listing is packaged by Bitnami. The respective trademarks mentioned in the offering are owned by the respective companies, and use of them does not imply any affiliation or endorsement.
## TL;DR
```console
@@ -85,221 +85,221 @@ $ helm uninstall my-release
### Contour parameters
| Name | Description | Value |
| ------------------------------------------------------------- | ---------------------------------------------------------------------------------------------------------------------------------- | ---------------------- |
| `existingConfigMap` | Specifies the name of an externally-defined ConfigMap to use as the configuration (this is mutually exclusive with `configInline`) | `""` |
| `configInline` | Specifies Contour's configuration directly in YAML format | `{}` |
| `contour.enabled` | Contour Deployment creation. | `true` |
| `contour.image.registry` | Contour image registry | `docker.io` |
| `contour.image.repository` | Contour image name | `bitnami/contour` |
| `contour.image.tag` | Contour image tag | `1.22.1-debian-11-r11` |
| `contour.image.digest` | Contour image digest in the way sha256:aa.... Please note this parameter, if set, will override the tag | `""` |
| `contour.image.pullPolicy` | Contour Image pull policy | `IfNotPresent` |
| `contour.image.pullSecrets` | Contour Image pull secrets | `[]` |
| `contour.image.debug` | Enable image debug mode | `false` |
| `contour.replicaCount` | Number of Contour Pod replicas | `1` |
| `contour.priorityClassName` | Priority class assigned to the pods | `""` |
| `contour.schedulerName` | Name of the k8s scheduler (other than default) | `""` |
| `contour.terminationGracePeriodSeconds` | In seconds, time the given to the Contour pod needs to terminate gracefully | `""` |
| `contour.topologySpreadConstraints` | Topology Spread Constraints for pod assignment | `[]` |
| `contour.containerPorts.xds` | Set xds port inside Contour pod | `8001` |
| `contour.containerPorts.metrics` | Set metrics port inside Contour pod | `8000` |
| `contour.hostAliases` | Add deployment host aliases | `[]` |
| `contour.updateStrategy` | Strategy to use to update Pods | `{}` |
| `contour.extraArgs` | Extra arguments passed to Contour container | `[]` |
| `contour.resources.limits` | Specify resource limits which the container is not allowed to succeed. | `{}` |
| `contour.resources.requests` | Specify resource requests which the container needs to spawn. | `{}` |
| `contour.manageCRDs` | Manage the creation, upgrade and deletion of Contour CRDs. | `true` |
| `contour.podAffinityPreset` | Contour Pod affinity preset. Ignored if `affinity` is set. Allowed values: `soft` or `hard` | `""` |
| `contour.podAntiAffinityPreset` | Contour Pod anti-affinity preset. Ignored if `affinity` is set. Allowed values: `soft` or `hard` | `soft` |
| `contour.podLabels` | Extra labels for Contour pods | `{}` |
| `contour.lifecycleHooks` | lifecycleHooks for the container to automate configuration before or after startup. | `{}` |
| `contour.customLivenessProbe` | Override default liveness probe | `{}` |
| `contour.customReadinessProbe` | Override default readiness probe | `{}` |
| `contour.customStartupProbe` | Override default startup probe | `{}` |
| `contour.nodeAffinityPreset.type` | Contour Node affinity preset type. Ignored if `affinity` is set. Allowed values: `soft` or `hard` | `""` |
| `contour.nodeAffinityPreset.key` | Contour Node label key to match Ignored if `affinity` is set. | `""` |
| `contour.nodeAffinityPreset.values` | Contour Node label values to match. Ignored if `affinity` is set. | `[]` |
| `contour.command` | Override default command | `[]` |
| `contour.args` | Override default args | `[]` |
| `contour.affinity` | Affinity for Contour pod assignment | `{}` |
| `contour.nodeSelector` | Node labels for Contour pod assignment | `{}` |
| `contour.tolerations` | Tolerations for Contour pod assignment | `[]` |
| `contour.podAnnotations` | Contour Pod annotations | `{}` |
| `contour.serviceAccount.create` | Create a serviceAccount for the Contour pod | `true` |
| `contour.serviceAccount.name` | Use the serviceAccount with the specified name, a name is generated using the fullname template | `""` |
| `contour.serviceAccount.automountServiceAccountToken` | Automount service account token for the server service account | `true` |
| `contour.serviceAccount.annotations` | Annotations for service account. Evaluated as a template. Only used if `create` is `true`. | `{}` |
| `contour.podSecurityContext.enabled` | Default backend Pod securityContext | `true` |
| `contour.podSecurityContext.fsGroup` | Set Default backend Pod's Security Context fsGroup | `1001` |
| `contour.containerSecurityContext.enabled` | Envoy Container securityContext | `true` |
| `contour.containerSecurityContext.runAsUser` | User ID for the Contour container (to change this, http and https containerPorts must be set to >1024) | `1001` |
| `contour.containerSecurityContext.runAsNonRoot` | Run as non root | `true` |
| `contour.livenessProbe.enabled` | Enable/disable the Liveness probe | `true` |
| `contour.livenessProbe.initialDelaySeconds` | Delay before liveness probe is initiated | `120` |
| `contour.livenessProbe.periodSeconds` | How often to perform the probe | `20` |
| `contour.livenessProbe.timeoutSeconds` | When the probe times out | `5` |
| `contour.livenessProbe.failureThreshold` | Minimum consecutive failures for the probe to be considered failed after having succeeded. | `6` |
| `contour.livenessProbe.successThreshold` | Minimum consecutive successes for the probe to be considered successful after having failed. | `1` |
| `contour.readinessProbe.enabled` | Enable/disable the readiness probe | `true` |
| `contour.readinessProbe.initialDelaySeconds` | Delay before readiness probe is initiated | `15` |
| `contour.readinessProbe.periodSeconds` | How often to perform the probe | `10` |
| `contour.readinessProbe.timeoutSeconds` | When the probe times out | `5` |
| `contour.readinessProbe.failureThreshold` | Minimum consecutive failures for the probe to be considered failed after having succeeded. | `3` |
| `contour.readinessProbe.successThreshold` | Minimum consecutive successes for the probe to be considered successful after having failed. | `1` |
| `contour.startupProbe.enabled` | Enable/disable the startup probe | `false` |
| `contour.startupProbe.initialDelaySeconds` | Delay before startup probe is initiated | `15` |
| `contour.startupProbe.periodSeconds` | How often to perform the probe | `10` |
| `contour.startupProbe.timeoutSeconds` | When the probe times out | `5` |
| `contour.startupProbe.failureThreshold` | Minimum consecutive failures for the probe to be considered failed after having succeeded. | `3` |
| `contour.startupProbe.successThreshold` | Minimum consecutive successes for the probe to be considered successful after having failed. | `1` |
| `contour.certgen.serviceAccount.create` | Create a serviceAccount for the Contour pod | `true` |
| `contour.certgen.serviceAccount.name` | Use the serviceAccount with the specified name, a name is generated using the fullname template | `""` |
| `contour.certgen.serviceAccount.automountServiceAccountToken` | Automount service account token for the server service account | `true` |
| `contour.certgen.serviceAccount.annotations` | Annotations for service account. Evaluated as a template. Only used if `create` is `true`. | `{}` |
| `contour.certgen.certificateLifetime` | Generated certificate lifetime (in days). | `365` |
| `contour.tlsExistingSecret` | Name of the existingSecret to be use in Contour deployment. If it is not nil `contour.certgen` will be disabled. | `""` |
| `contour.service.type` | Service type | `ClusterIP` |
| `contour.service.ports.xds` | Contour service xds port | `8001` |
| `contour.service.ports.metrics` | Contour service xds port | `8000` |
| `contour.service.nodePorts.xds` | Node port for HTTP | `""` |
| `contour.service.clusterIP` | Contour service Cluster IP | `""` |
| `contour.service.loadBalancerIP` | Contour service Load Balancer IP | `""` |
| `contour.service.loadBalancerSourceRanges` | Contour service Load Balancer sources | `[]` |
| `contour.service.loadBalancerClass` | Contour service Load Balancer Class | `""` |
| `contour.service.externalTrafficPolicy` | Contour service external traffic policy | `Cluster` |
| `contour.service.annotations` | Additional custom annotations for Contour service | `{}` |
| `contour.service.extraPorts` | Extra port to expose on Contour service | `[]` |
| `contour.service.sessionAffinity` | Session Affinity for Kubernetes service, can be "None" or "ClientIP" | `None` |
| `contour.service.sessionAffinityConfig` | Additional settings for the sessionAffinity | `{}` |
| `contour.initContainers` | Attach additional init containers to Contour pods | `[]` |
| `contour.sidecars` | Add additional sidecar containers to the Contour pods | `[]` |
| `contour.extraVolumes` | Array to add extra volumes | `[]` |
| `contour.extraVolumeMounts` | Array to add extra mounts (normally used with extraVolumes) | `[]` |
| `contour.extraEnvVars` | Array containing extra env vars to be added to all Contour containers | `[]` |
| `contour.extraEnvVarsCM` | ConfigMap containing extra env vars to be added to all Contour containers | `""` |
| `contour.extraEnvVarsSecret` | Secret containing extra env vars to be added to all Contour containers | `""` |
| `contour.ingressClass.name` | Name of the ingress class to route through this controller. | `""` |
| `contour.ingressClass.create` | Whether to create or not the IngressClass resource | `true` |
| `contour.ingressClass.default` | Mark IngressClass resource as default for cluster | `true` |
| `contour.debug` | Enable Contour debug log level | `false` |
| `contour.kubernetesDebug` | Contour kubernetes debug log level, Default 0, minimum 0, maximum 9. | `0` |
| `contour.rootNamespaces` | Restrict Contour to searching these namespaces for root ingress routes. | `""` |
| Name | Description | Value |
| ------------------------------------------------------------- | ---------------------------------------------------------------------------------------------------------------------------------- | --------------------- |
| `existingConfigMap` | Specifies the name of an externally-defined ConfigMap to use as the configuration (this is mutually exclusive with `configInline`) | `""` |
| `configInline` | Specifies Contour's configuration directly in YAML format | `{}` |
| `contour.enabled` | Contour Deployment creation. | `true` |
| `contour.image.registry` | Contour image registry | `docker.io` |
| `contour.image.repository` | Contour image name | `bitnami/contour` |
| `contour.image.tag` | Contour image tag | `1.23.0-debian-11-r0` |
| `contour.image.digest` | Contour image digest in the way sha256:aa.... Please note this parameter, if set, will override the tag | `""` |
| `contour.image.pullPolicy` | Contour Image pull policy | `IfNotPresent` |
| `contour.image.pullSecrets` | Contour Image pull secrets | `[]` |
| `contour.image.debug` | Enable image debug mode | `false` |
| `contour.replicaCount` | Number of Contour Pod replicas | `1` |
| `contour.priorityClassName` | Priority class assigned to the pods | `""` |
| `contour.schedulerName` | Name of the k8s scheduler (other than default) | `""` |
| `contour.terminationGracePeriodSeconds` | In seconds, time the given to the Contour pod needs to terminate gracefully | `""` |
| `contour.topologySpreadConstraints` | Topology Spread Constraints for pod assignment | `[]` |
| `contour.containerPorts.xds` | Set xds port inside Contour pod | `8001` |
| `contour.containerPorts.metrics` | Set metrics port inside Contour pod | `8000` |
| `contour.hostAliases` | Add deployment host aliases | `[]` |
| `contour.updateStrategy` | Strategy to use to update Pods | `{}` |
| `contour.extraArgs` | Extra arguments passed to Contour container | `[]` |
| `contour.resources.limits` | Specify resource limits which the container is not allowed to succeed. | `{}` |
| `contour.resources.requests` | Specify resource requests which the container needs to spawn. | `{}` |
| `contour.manageCRDs` | Manage the creation, upgrade and deletion of Contour CRDs. | `true` |
| `contour.podAffinityPreset` | Contour Pod affinity preset. Ignored if `affinity` is set. Allowed values: `soft` or `hard` | `""` |
| `contour.podAntiAffinityPreset` | Contour Pod anti-affinity preset. Ignored if `affinity` is set. Allowed values: `soft` or `hard` | `soft` |
| `contour.podLabels` | Extra labels for Contour pods | `{}` |
| `contour.lifecycleHooks` | lifecycleHooks for the container to automate configuration before or after startup. | `{}` |
| `contour.customLivenessProbe` | Override default liveness probe | `{}` |
| `contour.customReadinessProbe` | Override default readiness probe | `{}` |
| `contour.customStartupProbe` | Override default startup probe | `{}` |
| `contour.nodeAffinityPreset.type` | Contour Node affinity preset type. Ignored if `affinity` is set. Allowed values: `soft` or `hard` | `""` |
| `contour.nodeAffinityPreset.key` | Contour Node label key to match Ignored if `affinity` is set. | `""` |
| `contour.nodeAffinityPreset.values` | Contour Node label values to match. Ignored if `affinity` is set. | `[]` |
| `contour.command` | Override default command | `[]` |
| `contour.args` | Override default args | `[]` |
| `contour.affinity` | Affinity for Contour pod assignment | `{}` |
| `contour.nodeSelector` | Node labels for Contour pod assignment | `{}` |
| `contour.tolerations` | Tolerations for Contour pod assignment | `[]` |
| `contour.podAnnotations` | Contour Pod annotations | `{}` |
| `contour.serviceAccount.create` | Create a serviceAccount for the Contour pod | `true` |
| `contour.serviceAccount.name` | Use the serviceAccount with the specified name, a name is generated using the fullname template | `""` |
| `contour.serviceAccount.automountServiceAccountToken` | Automount service account token for the server service account | `true` |
| `contour.serviceAccount.annotations` | Annotations for service account. Evaluated as a template. Only used if `create` is `true`. | `{}` |
| `contour.podSecurityContext.enabled` | Default backend Pod securityContext | `true` |
| `contour.podSecurityContext.fsGroup` | Set Default backend Pod's Security Context fsGroup | `1001` |
| `contour.containerSecurityContext.enabled` | Envoy Container securityContext | `true` |
| `contour.containerSecurityContext.runAsUser` | User ID for the Contour container (to change this, http and https containerPorts must be set to >1024) | `1001` |
| `contour.containerSecurityContext.runAsNonRoot` | Run as non root | `true` |
| `contour.livenessProbe.enabled` | Enable/disable the Liveness probe | `true` |
| `contour.livenessProbe.initialDelaySeconds` | Delay before liveness probe is initiated | `120` |
| `contour.livenessProbe.periodSeconds` | How often to perform the probe | `20` |
| `contour.livenessProbe.timeoutSeconds` | When the probe times out | `5` |
| `contour.livenessProbe.failureThreshold` | Minimum consecutive failures for the probe to be considered failed after having succeeded. | `6` |
| `contour.livenessProbe.successThreshold` | Minimum consecutive successes for the probe to be considered successful after having failed. | `1` |
| `contour.readinessProbe.enabled` | Enable/disable the readiness probe | `true` |
| `contour.readinessProbe.initialDelaySeconds` | Delay before readiness probe is initiated | `15` |
| `contour.readinessProbe.periodSeconds` | How often to perform the probe | `10` |
| `contour.readinessProbe.timeoutSeconds` | When the probe times out | `5` |
| `contour.readinessProbe.failureThreshold` | Minimum consecutive failures for the probe to be considered failed after having succeeded. | `3` |
| `contour.readinessProbe.successThreshold` | Minimum consecutive successes for the probe to be considered successful after having failed. | `1` |
| `contour.startupProbe.enabled` | Enable/disable the startup probe | `false` |
| `contour.startupProbe.initialDelaySeconds` | Delay before startup probe is initiated | `15` |
| `contour.startupProbe.periodSeconds` | How often to perform the probe | `10` |
| `contour.startupProbe.timeoutSeconds` | When the probe times out | `5` |
| `contour.startupProbe.failureThreshold` | Minimum consecutive failures for the probe to be considered failed after having succeeded. | `3` |
| `contour.startupProbe.successThreshold` | Minimum consecutive successes for the probe to be considered successful after having failed. | `1` |
| `contour.certgen.serviceAccount.create` | Create a serviceAccount for the Contour pod | `true` |
| `contour.certgen.serviceAccount.name` | Use the serviceAccount with the specified name, a name is generated using the fullname template | `""` |
| `contour.certgen.serviceAccount.automountServiceAccountToken` | Automount service account token for the server service account | `true` |
| `contour.certgen.serviceAccount.annotations` | Annotations for service account. Evaluated as a template. Only used if `create` is `true`. | `{}` |
| `contour.certgen.certificateLifetime` | Generated certificate lifetime (in days). | `365` |
| `contour.tlsExistingSecret` | Name of the existingSecret to be use in Contour deployment. If it is not nil `contour.certgen` will be disabled. | `""` |
| `contour.service.type` | Service type | `ClusterIP` |
| `contour.service.ports.xds` | Contour service xds port | `8001` |
| `contour.service.ports.metrics` | Contour service xds port | `8000` |
| `contour.service.nodePorts.xds` | Node port for HTTP | `""` |
| `contour.service.clusterIP` | Contour service Cluster IP | `""` |
| `contour.service.loadBalancerIP` | Contour service Load Balancer IP | `""` |
| `contour.service.loadBalancerSourceRanges` | Contour service Load Balancer sources | `[]` |
| `contour.service.loadBalancerClass` | Contour service Load Balancer Class | `""` |
| `contour.service.externalTrafficPolicy` | Contour service external traffic policy | `Cluster` |
| `contour.service.annotations` | Additional custom annotations for Contour service | `{}` |
| `contour.service.extraPorts` | Extra port to expose on Contour service | `[]` |
| `contour.service.sessionAffinity` | Session Affinity for Kubernetes service, can be "None" or "ClientIP" | `None` |
| `contour.service.sessionAffinityConfig` | Additional settings for the sessionAffinity | `{}` |
| `contour.initContainers` | Attach additional init containers to Contour pods | `[]` |
| `contour.sidecars` | Add additional sidecar containers to the Contour pods | `[]` |
| `contour.extraVolumes` | Array to add extra volumes | `[]` |
| `contour.extraVolumeMounts` | Array to add extra mounts (normally used with extraVolumes) | `[]` |
| `contour.extraEnvVars` | Array containing extra env vars to be added to all Contour containers | `[]` |
| `contour.extraEnvVarsCM` | ConfigMap containing extra env vars to be added to all Contour containers | `""` |
| `contour.extraEnvVarsSecret` | Secret containing extra env vars to be added to all Contour containers | `""` |
| `contour.ingressClass.name` | Name of the ingress class to route through this controller. | `""` |
| `contour.ingressClass.create` | Whether to create or not the IngressClass resource | `true` |
| `contour.ingressClass.default` | Mark IngressClass resource as default for cluster | `true` |
| `contour.debug` | Enable Contour debug log level | `false` |
| `contour.kubernetesDebug` | Contour kubernetes debug log level, Default 0, minimum 0, maximum 9. | `0` |
| `contour.rootNamespaces` | Restrict Contour to searching these namespaces for root ingress routes. | `""` |
### Envoy parameters
| Name | Description | Value |
| --------------------------------------------------- | --------------------------------------------------------------------------------------------------------------------- | ---------------------- |
| `envoy.enabled` | Envoy Proxy creation | `true` |
| `envoy.image.registry` | Envoy Proxy image registry | `docker.io` |
| `envoy.image.repository` | Envoy Proxy image repository | `bitnami/envoy` |
| `envoy.image.tag` | Envoy Proxy image tag (immutable tags are recommended) | `1.23.1-debian-11-r14` |
| `envoy.image.digest` | Envoy Proxy image digest in the way sha256:aa.... Please note this parameter, if set, will override the tag | `""` |
| `envoy.image.pullPolicy` | Envoy image pull policy | `IfNotPresent` |
| `envoy.image.pullSecrets` | Envoy image pull secrets | `[]` |
| `envoy.priorityClassName` | Priority class assigned to the pods | `""` |
| `envoy.schedulerName` | Name of the k8s scheduler (other than default) | `""` |
| `envoy.topologySpreadConstraints` | Topology Spread Constraints for pod assignment | `[]` |
| `envoy.extraArgs` | Extra arguments passed to Envoy container | `[]` |
| `envoy.hostAliases` | Add deployment host aliases | `[]` |
| `envoy.resources.limits` | Specify resource limits which the container is not allowed to succeed. | `{}` |
| `envoy.resources.requests` | Specify resource requests which the container needs to spawn. | `{}` |
| `envoy.command` | Override default command | `[]` |
| `envoy.args` | Override default args | `[]` |
| `envoy.shutdownManager.enabled` | Contour shutdownManager sidecar | `true` |
| `envoy.shutdownManager.resources.limits` | Specify resource limits which the container is not allowed to succeed. | `{}` |
| `envoy.shutdownManager.resources.requests` | Specify resource requests which the container needs to spawn. | `{}` |
| `envoy.kind` | Install as deployment or daemonset | `daemonset` |
| `envoy.replicaCount` | Desired number of Controller pods | `1` |
| `envoy.lifecycleHooks` | lifecycleHooks for the container to automate configuration before or after startup. | `{}` |
| `envoy.updateStrategy` | Strategy to use to update Pods | `{}` |
| `envoy.minReadySeconds` | The minimum number of seconds for which a newly created Pod should be ready | `0` |
| `envoy.revisionHistoryLimit` | The number of old history to retain to allow rollback | `10` |
| `envoy.autoscaling.enabled` | Enable autoscaling for Controller | `false` |
| `envoy.autoscaling.minReplicas` | Minimum number of Controller replicas | `1` |
| `envoy.autoscaling.maxReplicas` | Maximum number of Controller replicas | `11` |
| `envoy.autoscaling.targetCPU` | Target CPU utilization percentage | `""` |
| `envoy.autoscaling.targetMemory` | Target Memory utilization percentage | `""` |
| `envoy.podAffinityPreset` | Envoy Pod affinity preset. Ignored if `affinity` is set. Allowed values: `soft` or `hard` | `""` |
| `envoy.podAntiAffinityPreset` | Envoy Pod anti-affinity preset. Ignored if `affinity` is set. Allowed values: `soft` or `hard` | `""` |
| `envoy.nodeAffinityPreset.type` | Envoy Node affinity preset type. Ignored if `affinity` is set. Allowed values: `soft` or `hard` | `""` |
| `envoy.nodeAffinityPreset.key` | Envoy Node label key to match Ignored if `affinity` is set. | `""` |
| `envoy.nodeAffinityPreset.values` | Envoy Node label values to match. Ignored if `affinity` is set. | `[]` |
| `envoy.affinity` | Affinity for Envoy pod assignment | `{}` |
| `envoy.nodeSelector` | Node labels for Envoy pod assignment | `{}` |
| `envoy.tolerations` | Tolerations for Envoy pod assignment | `[]` |
| `envoy.podAnnotations` | Envoy Pod annotations | `{}` |
| `envoy.podLabels` | Extra labels for Envoy pods | `{}` |
| `envoy.podSecurityContext.enabled` | Envoy Pod securityContext | `false` |
| `envoy.podSecurityContext.fsGroup` | User ID for the for the mounted volumes | `0` |
| `envoy.podSecurityContext.sysctls` | Array of sysctl options to allow | `[]` |
| `envoy.containerSecurityContext.enabled` | Envoy Container securityContext | `true` |
| `envoy.containerSecurityContext.runAsUser` | User ID for the Envoy container (to change this, http and https containerPorts must be set to >1024) | `1001` |
| `envoy.containerSecurityContext.runAsNonRoot` | Run as non root | `true` |
| `envoy.hostNetwork` | Envoy Pod host network access | `false` |
| `envoy.dnsPolicy` | Envoy Pod Dns Policy's DNS Policy | `ClusterFirst` |
| `envoy.tlsExistingSecret` | Name of the existingSecret to be use in Envoy deployment | `""` |
| `envoy.serviceAccount.create` | Specifies whether a ServiceAccount should be created | `true` |
| `envoy.serviceAccount.name` | The name of the ServiceAccount to use. If not set and create is true, a name is generated using the fullname template | `""` |
| `envoy.serviceAccount.automountServiceAccountToken` | Whether to auto mount API credentials for a service account | `false` |
| `envoy.serviceAccount.annotations` | Annotations for service account. Evaluated as a template. Only used if `create` is `true`. | `{}` |
| `envoy.livenessProbe.enabled` | Enable livenessProbe | `true` |
| `envoy.livenessProbe.initialDelaySeconds` | Initial delay seconds for livenessProbe | `120` |
| `envoy.livenessProbe.periodSeconds` | Period seconds for livenessProbe | `20` |
| `envoy.livenessProbe.timeoutSeconds` | Timeout seconds for livenessProbe | `5` |
| `envoy.livenessProbe.failureThreshold` | Failure threshold for livenessProbe | `6` |
| `envoy.livenessProbe.successThreshold` | Success threshold for livenessProbe | `1` |
| `envoy.readinessProbe.enabled` | Enable/disable the readiness probe | `true` |
| `envoy.readinessProbe.initialDelaySeconds` | Delay before readiness probe is initiated | `10` |
| `envoy.readinessProbe.periodSeconds` | How often to perform the probe | `3` |
| `envoy.readinessProbe.timeoutSeconds` | When the probe times out | `1` |
| `envoy.readinessProbe.failureThreshold` | Minimum consecutive failures for the probe to be considered failed after having succeeded. | `3` |
| `envoy.readinessProbe.successThreshold` | Minimum consecutive successes for the probe to be considered successful after having failed. | `1` |
| `envoy.startupProbe.enabled` | Enable/disable the startup probe | `false` |
| `envoy.startupProbe.initialDelaySeconds` | Delay before startup probe is initiated | `15` |
| `envoy.startupProbe.periodSeconds` | How often to perform the probe | `10` |
| `envoy.startupProbe.timeoutSeconds` | When the probe times out | `5` |
| `envoy.startupProbe.failureThreshold` | Minimum consecutive failures for the probe to be considered failed after having succeeded. | `3` |
| `envoy.startupProbe.successThreshold` | Minimum consecutive successes for the probe to be considered successful after having failed. | `1` |
| `envoy.customLivenessProbe` | Override default liveness probe | `{}` |
| `envoy.customReadinessProbe` | Override default readiness probe | `{}` |
| `envoy.customStartupProbe` | Override default startup probe | `{}` |
| `envoy.terminationGracePeriodSeconds` | Envoy termination grace period in seconds | `300` |
| `envoy.logLevel` | Envoy log level | `info` |
| `envoy.service.targetPorts` | Map the controller service HTTP/HTTPS port | `{}` |
| `envoy.service.type` | Type of Envoy service to create | `LoadBalancer` |
| `envoy.service.externalTrafficPolicy` | Envoy Service external cluster policy. If `envoy.service.type` is NodePort or LoadBalancer | `Local` |
| `envoy.service.labels` | Labels to add to te envoy service | `{}` |
| `envoy.service.clusterIP` | Internal envoy cluster service IP | `""` |
| `envoy.service.externalIPs` | Envoy service external IP addresses | `[]` |
| `envoy.service.loadBalancerIP` | IP address to assign to load balancer (if supported) | `""` |
| `envoy.service.loadBalancerSourceRanges` | List of IP CIDRs allowed access to load balancer (if supported) | `[]` |
| `envoy.service.loadBalancerClass` | Envoy service Load Balancer Class | `""` |
| `envoy.service.ipFamilyPolicy` | , support SingleStack, PreferDualStack and RequireDualStack | `""` |
| `envoy.service.annotations` | Annotations for Envoy service | `{}` |
| `envoy.service.ports.http` | Sets service http port | `80` |
| `envoy.service.ports.https` | Sets service https port | `443` |
| `envoy.service.nodePorts.http` | HTTP Port. If `envoy.service.type` is NodePort and this is non-empty | `""` |
| `envoy.service.nodePorts.https` | HTTPS Port. If `envoy.service.type` is NodePort and this is non-empty | `""` |
| `envoy.service.extraPorts` | Extra ports to expose (normally used with the `sidecar` value) | `[]` |
| `envoy.service.sessionAffinity` | Session Affinity for Kubernetes service, can be "None" or "ClientIP" | `None` |
| `envoy.service.sessionAffinityConfig` | Additional settings for the sessionAffinity | `{}` |
| `envoy.useHostPort` | Enable/disable `hostPort` for TCP/80 and TCP/443 | `true` |
| `envoy.useHostIP` | Enable/disable `hostIP` | `false` |
| `envoy.hostPorts.http` | Sets `hostPort` http port | `80` |
| `envoy.hostPorts.https` | Sets `hostPort` https port | `443` |
| `envoy.hostIPs.http` | Sets `hostIP` http IP | `127.0.0.1` |
| `envoy.hostIPs.https` | Sets `hostIP` https IP | `127.0.0.1` |
| `envoy.containerPorts.http` | Sets http port inside Envoy pod (change this to >1024 to run envoy as a non-root user) | `8080` |
| `envoy.containerPorts.https` | Sets https port inside Envoy pod (change this to >1024 to run envoy as a non-root user) | `8443` |
| `envoy.initContainers` | Attach additional init containers to Envoy pods | `[]` |
| `envoy.sidecars` | Add additional sidecar containers to the Envoy pods | `[]` |
| `envoy.extraVolumes` | Array to add extra volumes | `[]` |
| `envoy.extraVolumeMounts` | Array to add extra mounts (normally used with extraVolumes) | `[]` |
| `envoy.extraEnvVars` | Array containing extra env vars to be added to all Envoy containers | `[]` |
| `envoy.extraEnvVarsCM` | ConfigMap containing extra env vars to be added to all Envoy containers | `""` |
| `envoy.extraEnvVarsSecret` | Secret containing extra env vars to be added to all Envoy containers | `""` |
| Name | Description | Value |
| --------------------------------------------------- | --------------------------------------------------------------------------------------------------------------------- | --------------------- |
| `envoy.enabled` | Envoy Proxy creation | `true` |
| `envoy.image.registry` | Envoy Proxy image registry | `docker.io` |
| `envoy.image.repository` | Envoy Proxy image repository | `bitnami/envoy` |
| `envoy.image.tag` | Envoy Proxy image tag (immutable tags are recommended) | `1.24.0-debian-11-r2` |
| `envoy.image.digest` | Envoy Proxy image digest in the way sha256:aa.... Please note this parameter, if set, will override the tag | `""` |
| `envoy.image.pullPolicy` | Envoy image pull policy | `IfNotPresent` |
| `envoy.image.pullSecrets` | Envoy image pull secrets | `[]` |
| `envoy.priorityClassName` | Priority class assigned to the pods | `""` |
| `envoy.schedulerName` | Name of the k8s scheduler (other than default) | `""` |
| `envoy.topologySpreadConstraints` | Topology Spread Constraints for pod assignment | `[]` |
| `envoy.extraArgs` | Extra arguments passed to Envoy container | `[]` |
| `envoy.hostAliases` | Add deployment host aliases | `[]` |
| `envoy.resources.limits` | Specify resource limits which the container is not allowed to succeed. | `{}` |
| `envoy.resources.requests` | Specify resource requests which the container needs to spawn. | `{}` |
| `envoy.command` | Override default command | `[]` |
| `envoy.args` | Override default args | `[]` |
| `envoy.shutdownManager.enabled` | Contour shutdownManager sidecar | `true` |
| `envoy.shutdownManager.resources.limits` | Specify resource limits which the container is not allowed to succeed. | `{}` |
| `envoy.shutdownManager.resources.requests` | Specify resource requests which the container needs to spawn. | `{}` |
| `envoy.kind` | Install as deployment or daemonset | `daemonset` |
| `envoy.replicaCount` | Desired number of Controller pods | `1` |
| `envoy.lifecycleHooks` | lifecycleHooks for the container to automate configuration before or after startup. | `{}` |
| `envoy.updateStrategy` | Strategy to use to update Pods | `{}` |
| `envoy.minReadySeconds` | The minimum number of seconds for which a newly created Pod should be ready | `0` |
| `envoy.revisionHistoryLimit` | The number of old history to retain to allow rollback | `10` |
| `envoy.autoscaling.enabled` | Enable autoscaling for Controller | `false` |
| `envoy.autoscaling.minReplicas` | Minimum number of Controller replicas | `1` |
| `envoy.autoscaling.maxReplicas` | Maximum number of Controller replicas | `11` |
| `envoy.autoscaling.targetCPU` | Target CPU utilization percentage | `""` |
| `envoy.autoscaling.targetMemory` | Target Memory utilization percentage | `""` |
| `envoy.podAffinityPreset` | Envoy Pod affinity preset. Ignored if `affinity` is set. Allowed values: `soft` or `hard` | `""` |
| `envoy.podAntiAffinityPreset` | Envoy Pod anti-affinity preset. Ignored if `affinity` is set. Allowed values: `soft` or `hard` | `""` |
| `envoy.nodeAffinityPreset.type` | Envoy Node affinity preset type. Ignored if `affinity` is set. Allowed values: `soft` or `hard` | `""` |
| `envoy.nodeAffinityPreset.key` | Envoy Node label key to match Ignored if `affinity` is set. | `""` |
| `envoy.nodeAffinityPreset.values` | Envoy Node label values to match. Ignored if `affinity` is set. | `[]` |
| `envoy.affinity` | Affinity for Envoy pod assignment | `{}` |
| `envoy.nodeSelector` | Node labels for Envoy pod assignment | `{}` |
| `envoy.tolerations` | Tolerations for Envoy pod assignment | `[]` |
| `envoy.podAnnotations` | Envoy Pod annotations | `{}` |
| `envoy.podLabels` | Extra labels for Envoy pods | `{}` |
| `envoy.podSecurityContext.enabled` | Envoy Pod securityContext | `false` |
| `envoy.podSecurityContext.fsGroup` | User ID for the for the mounted volumes | `0` |
| `envoy.podSecurityContext.sysctls` | Array of sysctl options to allow | `[]` |
| `envoy.containerSecurityContext.enabled` | Envoy Container securityContext | `true` |
| `envoy.containerSecurityContext.runAsUser` | User ID for the Envoy container (to change this, http and https containerPorts must be set to >1024) | `1001` |
| `envoy.containerSecurityContext.runAsNonRoot` | Run as non root | `true` |
| `envoy.hostNetwork` | Envoy Pod host network access | `false` |
| `envoy.dnsPolicy` | Envoy Pod Dns Policy's DNS Policy | `ClusterFirst` |
| `envoy.tlsExistingSecret` | Name of the existingSecret to be use in Envoy deployment | `""` |
| `envoy.serviceAccount.create` | Specifies whether a ServiceAccount should be created | `true` |
| `envoy.serviceAccount.name` | The name of the ServiceAccount to use. If not set and create is true, a name is generated using the fullname template | `""` |
| `envoy.serviceAccount.automountServiceAccountToken` | Whether to auto mount API credentials for a service account | `false` |
| `envoy.serviceAccount.annotations` | Annotations for service account. Evaluated as a template. Only used if `create` is `true`. | `{}` |
| `envoy.livenessProbe.enabled` | Enable livenessProbe | `true` |
| `envoy.livenessProbe.initialDelaySeconds` | Initial delay seconds for livenessProbe | `120` |
| `envoy.livenessProbe.periodSeconds` | Period seconds for livenessProbe | `20` |
| `envoy.livenessProbe.timeoutSeconds` | Timeout seconds for livenessProbe | `5` |
| `envoy.livenessProbe.failureThreshold` | Failure threshold for livenessProbe | `6` |
| `envoy.livenessProbe.successThreshold` | Success threshold for livenessProbe | `1` |
| `envoy.readinessProbe.enabled` | Enable/disable the readiness probe | `true` |
| `envoy.readinessProbe.initialDelaySeconds` | Delay before readiness probe is initiated | `10` |
| `envoy.readinessProbe.periodSeconds` | How often to perform the probe | `3` |
| `envoy.readinessProbe.timeoutSeconds` | When the probe times out | `1` |
| `envoy.readinessProbe.failureThreshold` | Minimum consecutive failures for the probe to be considered failed after having succeeded. | `3` |
| `envoy.readinessProbe.successThreshold` | Minimum consecutive successes for the probe to be considered successful after having failed. | `1` |
| `envoy.startupProbe.enabled` | Enable/disable the startup probe | `false` |
| `envoy.startupProbe.initialDelaySeconds` | Delay before startup probe is initiated | `15` |
| `envoy.startupProbe.periodSeconds` | How often to perform the probe | `10` |
| `envoy.startupProbe.timeoutSeconds` | When the probe times out | `5` |
| `envoy.startupProbe.failureThreshold` | Minimum consecutive failures for the probe to be considered failed after having succeeded. | `3` |
| `envoy.startupProbe.successThreshold` | Minimum consecutive successes for the probe to be considered successful after having failed. | `1` |
| `envoy.customLivenessProbe` | Override default liveness probe | `{}` |
| `envoy.customReadinessProbe` | Override default readiness probe | `{}` |
| `envoy.customStartupProbe` | Override default startup probe | `{}` |
| `envoy.terminationGracePeriodSeconds` | Envoy termination grace period in seconds | `300` |
| `envoy.logLevel` | Envoy log level | `info` |
| `envoy.service.targetPorts` | Map the controller service HTTP/HTTPS port | `{}` |
| `envoy.service.type` | Type of Envoy service to create | `LoadBalancer` |
| `envoy.service.externalTrafficPolicy` | Envoy Service external cluster policy. If `envoy.service.type` is NodePort or LoadBalancer | `Local` |
| `envoy.service.labels` | Labels to add to te envoy service | `{}` |
| `envoy.service.clusterIP` | Internal envoy cluster service IP | `""` |
| `envoy.service.externalIPs` | Envoy service external IP addresses | `[]` |
| `envoy.service.loadBalancerIP` | IP address to assign to load balancer (if supported) | `""` |
| `envoy.service.loadBalancerSourceRanges` | List of IP CIDRs allowed access to load balancer (if supported) | `[]` |
| `envoy.service.loadBalancerClass` | Envoy service Load Balancer Class | `""` |
| `envoy.service.ipFamilyPolicy` | , support SingleStack, PreferDualStack and RequireDualStack | `""` |
| `envoy.service.annotations` | Annotations for Envoy service | `{}` |
| `envoy.service.ports.http` | Sets service http port | `80` |
| `envoy.service.ports.https` | Sets service https port | `443` |
| `envoy.service.nodePorts.http` | HTTP Port. If `envoy.service.type` is NodePort and this is non-empty | `""` |
| `envoy.service.nodePorts.https` | HTTPS Port. If `envoy.service.type` is NodePort and this is non-empty | `""` |
| `envoy.service.extraPorts` | Extra ports to expose (normally used with the `sidecar` value) | `[]` |
| `envoy.service.sessionAffinity` | Session Affinity for Kubernetes service, can be "None" or "ClientIP" | `None` |
| `envoy.service.sessionAffinityConfig` | Additional settings for the sessionAffinity | `{}` |
| `envoy.useHostPort` | Enable/disable `hostPort` for TCP/80 and TCP/443 | `true` |
| `envoy.useHostIP` | Enable/disable `hostIP` | `false` |
| `envoy.hostPorts.http` | Sets `hostPort` http port | `80` |
| `envoy.hostPorts.https` | Sets `hostPort` https port | `443` |
| `envoy.hostIPs.http` | Sets `hostIP` http IP | `127.0.0.1` |
| `envoy.hostIPs.https` | Sets `hostIP` https IP | `127.0.0.1` |
| `envoy.containerPorts.http` | Sets http port inside Envoy pod (change this to >1024 to run envoy as a non-root user) | `8080` |
| `envoy.containerPorts.https` | Sets https port inside Envoy pod (change this to >1024 to run envoy as a non-root user) | `8443` |
| `envoy.initContainers` | Attach additional init containers to Envoy pods | `[]` |
| `envoy.sidecars` | Add additional sidecar containers to the Envoy pods | `[]` |
| `envoy.extraVolumes` | Array to add extra volumes | `[]` |
| `envoy.extraVolumeMounts` | Array to add extra mounts (normally used with extraVolumes) | `[]` |
| `envoy.extraEnvVars` | Array containing extra env vars to be added to all Envoy containers | `[]` |
| `envoy.extraEnvVarsCM` | ConfigMap containing extra env vars to be added to all Envoy containers | `""` |
| `envoy.extraEnvVarsSecret` | Secret containing extra env vars to be added to all Envoy containers | `""` |
### Default backend parameters
@@ -309,7 +309,7 @@ $ helm uninstall my-release
| `defaultBackend.enabled` | Enable a default backend based on NGINX | `false` |
| `defaultBackend.image.registry` | Default backend image registry | `docker.io` |
| `defaultBackend.image.repository` | Default backend image name | `bitnami/nginx` |
| `defaultBackend.image.tag` | Default backend image tag | `1.23.1-debian-11-r30` |
| `defaultBackend.image.tag` | Default backend image tag | `1.23.2-debian-11-r5` |
| `defaultBackend.image.digest` | Default backend image digest in the way sha256:aa.... Please note this parameter, if set, will override the tag | `""` |
| `defaultBackend.image.pullPolicy` | Image pull policy | `IfNotPresent` |
| `defaultBackend.image.pullSecrets` | Specify docker-registry secret names as an array | `[]` |

View File

@@ -93,7 +93,7 @@ contour:
image:
registry: docker.io
repository: bitnami/contour
tag: 1.22.1-debian-11-r11
tag: 1.23.0-debian-11-r0
digest: ""
## Specify a imagePullPolicy
## Defaults to 'Always' if image tag is 'latest', else set to 'IfNotPresent'
@@ -472,7 +472,7 @@ envoy:
image:
registry: docker.io
repository: bitnami/envoy
tag: 1.23.1-debian-11-r14
tag: 1.24.0-debian-11-r2
digest: ""
## Specify a imagePullPolicy
## Defaults to 'Always' if image tag is 'latest', else set to 'IfNotPresent'
@@ -895,7 +895,7 @@ defaultBackend:
image:
registry: docker.io
repository: bitnami/nginx
tag: 1.23.1-debian-11-r30
tag: 1.23.2-debian-11-r5
digest: ""
## Specify a imagePullPolicy
## Defaults to 'Always' if image tag is 'latest', else set to 'IfNotPresent'