mirror of
https://github.com/bitnami/charts.git
synced 2026-03-16 14:57:08 +08:00
[bitnami/contour] Envoy: add support for kind Deployment (#7293)
* [bitnami/contour] Envoy: add support for kind Deployment Signed-off-by: Timofey Titovets <nefelim4ag@gmail.com> Co-authored-by: Juan Ariza Toledano <juanariza@vmware.com> * Update values.yaml according to metadata standard Signed-off-by: juan131 <juanariza@vmware.com> * Include validations in NOTES.txt Signed-off-by: juan131 <juanariza@vmware.com> * Bump chart version Signed-off-by: juan131 <juanariza@vmware.com> * Fix validations * [bitnami/contour] Update components versions Signed-off-by: Bitnami Containers <containers@bitnami.com> Co-authored-by: Juan Ariza Toledano <juanariza@vmware.com> Co-authored-by: Bitnami Containers <containers@bitnami.com>
This commit is contained in:
@@ -66,76 +66,73 @@ $ helm uninstall my-release
|
||||
| `fullnameOverride` | String to fully override contour.fullname template | `""` |
|
||||
| `ingress.apiVersion` | Force Ingress API version (automatically detected if not set) | `""` |
|
||||
| `kubeVersion` | Force target Kubernetes version (using Helm capabilities if not set) | `""` |
|
||||
| `extraDeploy` | Array of extra objects to deploy with the release | `[]` |
|
||||
|
||||
|
||||
### Contour parameters
|
||||
|
||||
| Name | Description | Value |
|
||||
| ------------------------------------------------- | ---------------------------------------------------------------------------------------------------------------------------------- | ----------------------------------------------- |
|
||||
| `replicaCount` | Number of Contour Pod replicas | `2` |
|
||||
| `existingConfigMap` | Specifies the name of an externally-defined ConfigMap to use as the configuration (this is mutually exclusive with `configInline`) | `""` |
|
||||
| `configInline.disablePermitInsecure` | Disable ingressroute permitInsecure field | `false` |
|
||||
| `configInline.tls.fallback-certificate` | Defines the name/namespace matching a secret to use as the fallback certificate | `{}` |
|
||||
| `configInline.leaderelection.configmap-namespace` | This needs to be edited by when you deploy to a namespace other than `projectcontour` | `{{ .Release.Namespace }}` |
|
||||
| `configInline.envoy-service-name` | Envoy service name | `{{ include "common.names.fullname" . }}-envoy` |
|
||||
| `configInline.accesslog-format` | Access log format | `envoy` |
|
||||
| `contour.enabled` | Contour Deployment creation. | `true` |
|
||||
| `contour.image.registry` | Contour image registry | `docker.io` |
|
||||
| `contour.image.repository` | Contour image name | `bitnami/contour` |
|
||||
| `contour.image.tag` | Contour image tag | `1.18.0-debian-10-r27` |
|
||||
| `contour.image.pullPolicy` | Contour Image pull policy | `IfNotPresent` |
|
||||
| `contour.image.pullSecrets` | Contour Image pull secrets | `[]` |
|
||||
| `contour.hostAliases` | Add deployment host aliases | `[]` |
|
||||
| `contour.extraArgs` | Extra arguments passed to Contour container | `[]` |
|
||||
| `contour.resources.limits` | Specify resource limits which the container is not allowed to succeed. | `{}` |
|
||||
| `contour.resources.requests` | Specify resource requests which the container needs to spawn. | `{}` |
|
||||
| `contour.manageCRDs` | Manage the creation, upgrade and deletion of Contour CRDs. | `true` |
|
||||
| `contour.podAffinityPreset` | Contour Pod affinity preset. Ignored if `affinity` is set. Allowed values: `soft` or `hard` | `""` |
|
||||
| `contour.podAntiAffinityPreset` | Contour Pod anti-affinity preset. Ignored if `affinity` is set. Allowed values: `soft` or `hard` | `soft` |
|
||||
| `contour.nodeAffinityPreset.type` | Contour Node affinity preset type. Ignored if `affinity` is set. Allowed values: `soft` or `hard` | `""` |
|
||||
| `contour.nodeAffinityPreset.key` | Contour Node label key to match Ignored if `affinity` is set. | `""` |
|
||||
| `contour.nodeAffinityPreset.values` | Contour Node label values to match. Ignored if `affinity` is set. | `[]` |
|
||||
| `contour.affinity` | Affinity for Contour pod assignment | `{}` |
|
||||
| `contour.nodeSelector` | Node labels for Contour pod assignment | `{}` |
|
||||
| `contour.tolerations` | Tolerations for Contour pod assignment | `[]` |
|
||||
| `contour.podAnnotations` | Contour Pod annotations | `{}` |
|
||||
| `contour.serviceAccount.create` | Create a serviceAccount for the Contour pod | `true` |
|
||||
| `contour.serviceAccount.name` | Use the serviceAccount with the specified name, a name is generated using the fullname template | `""` |
|
||||
| `contour.livenessProbe.enabled` | Enable/disable the Liveness probe | `true` |
|
||||
| `contour.livenessProbe.initialDelaySeconds` | Delay before liveness probe is initiated | `120` |
|
||||
| `contour.livenessProbe.periodSeconds` | How often to perform the probe | `20` |
|
||||
| `contour.livenessProbe.timeoutSeconds` | When the probe times out | `5` |
|
||||
| `contour.livenessProbe.failureThreshold` | Minimum consecutive failures for the probe to be considered failed after having succeeded. | `6` |
|
||||
| `contour.livenessProbe.successThreshold` | Minimum consecutive successes for the probe to be considered successful after having failed. | `1` |
|
||||
| `contour.readinessProbe.enabled` | Enable/disable the readiness probe | `true` |
|
||||
| `contour.readinessProbe.initialDelaySeconds` | Delay before readiness probe is initiated | `15` |
|
||||
| `contour.readinessProbe.periodSeconds` | How often to perform the probe | `10` |
|
||||
| `contour.readinessProbe.timeoutSeconds` | When the probe times out | `5` |
|
||||
| `contour.readinessProbe.failureThreshold` | Minimum consecutive failures for the probe to be considered failed after having succeeded. | `3` |
|
||||
| `contour.readinessProbe.successThreshold` | Minimum consecutive successes for the probe to be considered successful after having failed. | `1` |
|
||||
| `contour.securityContext.enabled` | If the pod should run in a securityContext. | `true` |
|
||||
| `contour.securityContext.runAsNonRoot` | If the pod should run as a non root container. | `true` |
|
||||
| `contour.securityContext.runAsUser` | define the uid with which the pod will run | `1001` |
|
||||
| `contour.securityContext.runAsGroup` | define the gid with which the pod will run | `1001` |
|
||||
| `contour.certgen.serviceAccount.create` | Create a serviceAccount for the Contour pod | `true` |
|
||||
| `contour.certgen.serviceAccount.name` | Use the serviceAccount with the specified name, a name is generated using the fullname template | `""` |
|
||||
| `contour.tlsExistingSecret` | Name of the existingSecret to be use in Contour deployment. If it is not nil `contour.certgen` will be disabled. | `""` |
|
||||
| `contour.service.extraPorts` | Extra ports to expose (normally used with the `sidecar` value) | `[]` |
|
||||
| `contour.initContainers` | Attach additional init containers to Contour pods | `[]` |
|
||||
| `contour.sidecars` | Add additional sidecar containers to the Contour pods | `[]` |
|
||||
| `contour.extraVolumes` | Array to add extra volumes | `[]` |
|
||||
| `contour.extraVolumeMounts` | Array to add extra mounts (normally used with extraVolumes) | `[]` |
|
||||
| `contour.extraEnvVars` | Array containing extra env vars to be added to all Contour containers | `[]` |
|
||||
| `contour.extraEnvVarsConfigMap` | ConfigMap containing extra env vars to be added to all Contour containers | `""` |
|
||||
| `contour.extraEnvVarsSecret` | Secret containing extra env vars to be added to all Contour containers | `""` |
|
||||
| `contour.ingressClass` | Name of the ingress class to route through this controller | `contour` |
|
||||
| Name | Description | Value |
|
||||
| -------------------------------------------- | ---------------------------------------------------------------------------------------------------------------------------------- | ---------------------- |
|
||||
| `replicaCount` | Number of Contour Pod replicas | `2` |
|
||||
| `existingConfigMap` | Specifies the name of an externally-defined ConfigMap to use as the configuration (this is mutually exclusive with `configInline`) | `""` |
|
||||
| `configInline` | Specifies Contour's configuration directly in YAML format | `{}` |
|
||||
| `contour.enabled` | Contour Deployment creation. | `true` |
|
||||
| `contour.image.registry` | Contour image registry | `docker.io` |
|
||||
| `contour.image.repository` | Contour image name | `bitnami/contour` |
|
||||
| `contour.image.tag` | Contour image tag | `1.18.0-debian-10-r27` |
|
||||
| `contour.image.pullPolicy` | Contour Image pull policy | `IfNotPresent` |
|
||||
| `contour.image.pullSecrets` | Contour Image pull secrets | `[]` |
|
||||
| `contour.hostAliases` | Add deployment host aliases | `[]` |
|
||||
| `contour.extraArgs` | Extra arguments passed to Contour container | `[]` |
|
||||
| `contour.resources.limits` | Specify resource limits which the container is not allowed to succeed. | `{}` |
|
||||
| `contour.resources.requests` | Specify resource requests which the container needs to spawn. | `{}` |
|
||||
| `contour.manageCRDs` | Manage the creation, upgrade and deletion of Contour CRDs. | `true` |
|
||||
| `contour.podAffinityPreset` | Contour Pod affinity preset. Ignored if `affinity` is set. Allowed values: `soft` or `hard` | `""` |
|
||||
| `contour.podAntiAffinityPreset` | Contour Pod anti-affinity preset. Ignored if `affinity` is set. Allowed values: `soft` or `hard` | `soft` |
|
||||
| `contour.nodeAffinityPreset.type` | Contour Node affinity preset type. Ignored if `affinity` is set. Allowed values: `soft` or `hard` | `""` |
|
||||
| `contour.nodeAffinityPreset.key` | Contour Node label key to match Ignored if `affinity` is set. | `""` |
|
||||
| `contour.nodeAffinityPreset.values` | Contour Node label values to match. Ignored if `affinity` is set. | `[]` |
|
||||
| `contour.affinity` | Affinity for Contour pod assignment | `{}` |
|
||||
| `contour.nodeSelector` | Node labels for Contour pod assignment | `{}` |
|
||||
| `contour.tolerations` | Tolerations for Contour pod assignment | `[]` |
|
||||
| `contour.podAnnotations` | Contour Pod annotations | `{}` |
|
||||
| `contour.serviceAccount.create` | Create a serviceAccount for the Contour pod | `true` |
|
||||
| `contour.serviceAccount.name` | Use the serviceAccount with the specified name, a name is generated using the fullname template | `""` |
|
||||
| `contour.livenessProbe.enabled` | Enable/disable the Liveness probe | `true` |
|
||||
| `contour.livenessProbe.initialDelaySeconds` | Delay before liveness probe is initiated | `120` |
|
||||
| `contour.livenessProbe.periodSeconds` | How often to perform the probe | `20` |
|
||||
| `contour.livenessProbe.timeoutSeconds` | When the probe times out | `5` |
|
||||
| `contour.livenessProbe.failureThreshold` | Minimum consecutive failures for the probe to be considered failed after having succeeded. | `6` |
|
||||
| `contour.livenessProbe.successThreshold` | Minimum consecutive successes for the probe to be considered successful after having failed. | `1` |
|
||||
| `contour.readinessProbe.enabled` | Enable/disable the readiness probe | `true` |
|
||||
| `contour.readinessProbe.initialDelaySeconds` | Delay before readiness probe is initiated | `15` |
|
||||
| `contour.readinessProbe.periodSeconds` | How often to perform the probe | `10` |
|
||||
| `contour.readinessProbe.timeoutSeconds` | When the probe times out | `5` |
|
||||
| `contour.readinessProbe.failureThreshold` | Minimum consecutive failures for the probe to be considered failed after having succeeded. | `3` |
|
||||
| `contour.readinessProbe.successThreshold` | Minimum consecutive successes for the probe to be considered successful after having failed. | `1` |
|
||||
| `contour.securityContext.enabled` | If the pod should run in a securityContext. | `true` |
|
||||
| `contour.securityContext.runAsNonRoot` | If the pod should run as a non root container. | `true` |
|
||||
| `contour.securityContext.runAsUser` | define the uid with which the pod will run | `1001` |
|
||||
| `contour.securityContext.runAsGroup` | define the gid with which the pod will run | `1001` |
|
||||
| `contour.certgen.serviceAccount.create` | Create a serviceAccount for the Contour pod | `true` |
|
||||
| `contour.certgen.serviceAccount.name` | Use the serviceAccount with the specified name, a name is generated using the fullname template | `""` |
|
||||
| `contour.tlsExistingSecret` | Name of the existingSecret to be use in Contour deployment. If it is not nil `contour.certgen` will be disabled. | `""` |
|
||||
| `contour.service.extraPorts` | Extra ports to expose (normally used with the `sidecar` value) | `[]` |
|
||||
| `contour.initContainers` | Attach additional init containers to Contour pods | `[]` |
|
||||
| `contour.sidecars` | Add additional sidecar containers to the Contour pods | `[]` |
|
||||
| `contour.extraVolumes` | Array to add extra volumes | `[]` |
|
||||
| `contour.extraVolumeMounts` | Array to add extra mounts (normally used with extraVolumes) | `[]` |
|
||||
| `contour.extraEnvVars` | Array containing extra env vars to be added to all Contour containers | `[]` |
|
||||
| `contour.extraEnvVarsConfigMap` | ConfigMap containing extra env vars to be added to all Contour containers | `""` |
|
||||
| `contour.extraEnvVarsSecret` | Secret containing extra env vars to be added to all Contour containers | `""` |
|
||||
| `contour.ingressClass` | Name of the ingress class to route through this controller | `contour` |
|
||||
|
||||
|
||||
### Envoy parameters
|
||||
|
||||
| Name | Description | Value |
|
||||
| --------------------------------------------------- | --------------------------------------------------------------------------------------------------------------------- | ---------------------- |
|
||||
| `envoy.enabled` | Envoy Proxy Daemonset creation | `true` |
|
||||
| `envoy.enabled` | Envoy Proxy creation | `true` |
|
||||
| `envoy.image.registry` | Envoy Proxy image registry | `docker.io` |
|
||||
| `envoy.image.repository` | Envoy Proxy image repository | `bitnami/envoy` |
|
||||
| `envoy.image.tag` | Envoy Proxy image tag (immutable tags are recommended) | `1.19.0-debian-10-r14` |
|
||||
@@ -145,6 +142,15 @@ $ helm uninstall my-release
|
||||
| `envoy.hostAliases` | Add deployment host aliases | `[]` |
|
||||
| `envoy.resources.limits` | Specify resource limits which the container is not allowed to succeed. | `{}` |
|
||||
| `envoy.resources.requests` | Specify resource requests which the container needs to spawn. | `{}` |
|
||||
| `envoy.kind` | Install as deployment or daemonset | `daemonset` |
|
||||
| `envoy.replicaCount` | Desired number of Controller pods | `1` |
|
||||
| `envoy.updateStrategy` | Strategy to use to update Pods | `{}` |
|
||||
| `envoy.revisionHistoryLimit` | The number of old history to retain to allow rollback | `10` |
|
||||
| `envoy.autoscaling.enabled` | Enable autoscaling for Controller | `false` |
|
||||
| `envoy.autoscaling.minReplicas` | Minimum number of Controller replicas | `1` |
|
||||
| `envoy.autoscaling.maxReplicas` | Maximum number of Controller replicas | `11` |
|
||||
| `envoy.autoscaling.targetCPU` | Target CPU utilization percentage | `""` |
|
||||
| `envoy.autoscaling.targetMemory` | Target Memory utilization percentage | `""` |
|
||||
| `envoy.podAffinityPreset` | Envoy Pod affinity preset. Ignored if `affinity` is set. Allowed values: `soft` or `hard` | `""` |
|
||||
| `envoy.podAntiAffinityPreset` | Envoy Pod anti-affinity preset. Ignored if `affinity` is set. Allowed values: `soft` or `hard` | `""` |
|
||||
| `envoy.nodeAffinityPreset.type` | Envoy Node affinity preset type. Ignored if `affinity` is set. Allowed values: `soft` or `hard` | `""` |
|
||||
|
||||
Reference in New Issue
Block a user