mirror of
https://github.com/bitnami/charts.git
synced 2026-03-12 06:47:32 +08:00
432 lines
13 KiB
YAML
432 lines
13 KiB
YAML
## Global Docker image parameters
|
|
## Please, note that this will override the image parameters, including dependencies, configured to use the global value
|
|
## Current available global Docker image parameters: imageRegistry and imagePullSecrets
|
|
##
|
|
# global:
|
|
# imageRegistry: myRegistryName
|
|
# imagePullSecrets:
|
|
# - myRegistryKeySecretName
|
|
# storageClass: myStorageClass
|
|
|
|
## Bitnami SuiteCRM image version
|
|
## ref: https://hub.docker.com/r/bitnami/suitecrm/tags/
|
|
##
|
|
image:
|
|
registry: docker.io
|
|
repository: bitnami/suitecrm
|
|
tag: 7.11.18-debian-10-r17
|
|
## Specify a imagePullPolicy
|
|
## Defaults to 'Always' if image tag is 'latest', else set to 'IfNotPresent'
|
|
## ref: http://kubernetes.io/docs/user-guide/images/#pre-pulling-images
|
|
##
|
|
pullPolicy: IfNotPresent
|
|
## Optionally specify an array of imagePullSecrets.
|
|
## Secrets must be manually created in the namespace.
|
|
## ref: https://kubernetes.io/docs/tasks/configure-pod-container/pull-image-private-registry/
|
|
##
|
|
# pullSecrets:
|
|
# - myRegistryKeySecretName
|
|
|
|
## String to partially override suitecrm.fullname template (will maintain the release name)
|
|
##
|
|
# nameOverride:
|
|
|
|
## String to fully override suitecrm.fullname template
|
|
##
|
|
# fullnameOverride:
|
|
|
|
replicaCount: 1
|
|
|
|
## SuiteCRM host to create application URLs
|
|
## ref: https://github.com/bitnami/bitnami-docker-suitecrm#configuration
|
|
##
|
|
# suitecrmHost:
|
|
|
|
## SuiteCRM validate user IP
|
|
## ref: https://github.com/bitnami/bitnami-docker-suitecrm#configuration
|
|
##
|
|
suitecrmValidateUserIP: false
|
|
|
|
## User of the application
|
|
## ref: https://github.com/bitnami/bitnami-docker-suitecrm#configuration
|
|
##
|
|
suitecrmUsername: user
|
|
|
|
## Application password
|
|
## Defaults to a random 10-character alphanumeric string if not set
|
|
## ref: https://github.com/bitnami/bitnami-docker-suitecrm#configuration
|
|
##
|
|
# suitecrmPassword:
|
|
|
|
## Admin email
|
|
## ref: https://github.com/bitnami/bitnami-docker-suitecrm#configuration
|
|
##
|
|
suitecrmEmail: user@example.com
|
|
|
|
## Set to `yes` to allow the container to be started with blank passwords
|
|
## ref: https://github.com/bitnami/bitnami-docker-suitecrm#environment-variables
|
|
allowEmptyPassword: "no"
|
|
|
|
##
|
|
## External database configuration
|
|
##
|
|
externalDatabase:
|
|
## Use existing secret (ignores previous password)
|
|
## must contain key `mariadb-password`
|
|
## NOTE: When it's set, the `externalDatabase.password` parameter is ignored
|
|
# existingSecret:
|
|
|
|
## Database host
|
|
host:
|
|
|
|
## Database host
|
|
port: 3306
|
|
|
|
## Database user
|
|
user: bn_suitecrm
|
|
|
|
## Database password
|
|
password:
|
|
|
|
## Database name
|
|
database: bitnami_suitecrm
|
|
|
|
|
|
## SMTP mail delivery configuration
|
|
## ref: https://github.com/bitnami/bitnami-docker-suitecrm/#smtp-configuration
|
|
##
|
|
# suitecrmSmtpHost:
|
|
# suitecrmSmtpPort:
|
|
# suitecrmSmtpUser:
|
|
# suitecrmSmtpPassword:
|
|
# suitecrmSmtpProtocol:
|
|
# suitecrmNotifyAddress: user@example.com
|
|
# suitecrmNotifyName: UserName
|
|
|
|
## MariaDB chart configuration
|
|
##
|
|
## https://github.com/bitnami/charts/blob/master/bitnami/mariadb/values.yaml
|
|
##
|
|
mariadb:
|
|
## Whether to deploy a mariadb server to satisfy the applications database requirements. To use an external database set this to false and configure the externalDatabase parameters
|
|
##
|
|
enabled: true
|
|
|
|
## MariaDB architecture. Allowed values: standalone or replication
|
|
##
|
|
architecture: standalone
|
|
|
|
## MariaDB Authentication parameters
|
|
##
|
|
auth:
|
|
## MariaDB root password
|
|
## ref: https://github.com/bitnami/bitnami-docker-mariadb#setting-the-root-password-on-first-run
|
|
##
|
|
rootPassword: ""
|
|
## MariaDB custom user and database
|
|
## ref: https://github.com/bitnami/bitnami-docker-mariadb/blob/master/README.md#creating-a-database-on-first-run
|
|
## ref: https://github.com/bitnami/bitnami-docker-mariadb/blob/master/README.md#creating-a-database-user-on-first-run
|
|
##
|
|
database: bitnami_suitecrm
|
|
username: bn_suitecrm
|
|
password: ""
|
|
|
|
primary:
|
|
## Enable persistence using Persistent Volume Claims
|
|
## ref: http://kubernetes.io/docs/user-guide/persistent-volumes/
|
|
##
|
|
persistence:
|
|
enabled: true
|
|
## mariadb data Persistent Volume Storage Class
|
|
## If defined, storageClassName: <storageClass>
|
|
## If set to "-", storageClassName: "", which disables dynamic provisioning
|
|
## If undefined (the default) or set to null, no storageClassName spec is
|
|
## set, choosing the default provisioner. (gp2 on AWS, standard on
|
|
## GKE, AWS & OpenStack)
|
|
##
|
|
storageClass:
|
|
accessModes:
|
|
- ReadWriteOnce
|
|
size: 8Gi
|
|
## Set path in case you want to use local host path volumes (not recommended in production)
|
|
##
|
|
hostPath:
|
|
## Use an existing PVC
|
|
##
|
|
existingClaim:
|
|
|
|
service:
|
|
type: LoadBalancer
|
|
# HTTP Port
|
|
port: 8080
|
|
# HTTPS Port
|
|
httpsPort: 8443
|
|
## loadBalancerIP for the SuiteCRM Service (optional, cloud specific)
|
|
## ref: http://kubernetes.io/docs/user-guide/services/#type-loadbalancer
|
|
##
|
|
## loadBalancerIP:
|
|
##
|
|
## nodePorts:
|
|
## http: <to set explicitly, choose port between 30000-32767>
|
|
## https: <to set explicitly, choose port between 30000-32767>
|
|
nodePorts:
|
|
http: ""
|
|
https: ""
|
|
## Enable client source IP preservation
|
|
## ref http://kubernetes.io/docs/tasks/access-application-cluster/create-external-load-balancer/#preserving-the-client-source-ip
|
|
##
|
|
externalTrafficPolicy: Cluster
|
|
|
|
## Enable persistence using Persistent Volume Claims
|
|
## ref: http://kubernetes.io/docs/user-guide/persistent-volumes/
|
|
##
|
|
persistence:
|
|
enabled: true
|
|
## suitecrm data Persistent Volume Storage Class
|
|
## If defined, storageClassName: <storageClass>
|
|
## If set to "-", storageClassName: "", which disables dynamic provisioning
|
|
## If undefined (the default) or set to null, no storageClassName spec is
|
|
## set, choosing the default provisioner. (gp2 on AWS, standard on
|
|
## GKE, AWS & OpenStack)
|
|
##
|
|
# storageClass: "-"
|
|
|
|
## A manually managed Persistent Volume and Claim
|
|
## Requires persistence.enabled: true
|
|
## If defined, PVC must be created manually before volume will be bound
|
|
# existingClaim:
|
|
|
|
accessMode: ReadWriteOnce
|
|
size: 8Gi
|
|
|
|
## Configure resource requests and limits
|
|
## ref: http://kubernetes.io/docs/user-guide/compute-resources/
|
|
##
|
|
resources: {}
|
|
# requests:
|
|
# memory: 512Mi
|
|
# cpu: 300m
|
|
|
|
## Configure the ingress resource that allows you to access the
|
|
## SuiteCRM installation. Set up the URL
|
|
## ref: http://kubernetes.io/docs/user-guide/ingress/
|
|
##
|
|
ingress:
|
|
## Set to true to enable ingress record generation
|
|
enabled: false
|
|
|
|
## Set this to true in order to add the corresponding annotations for cert-manager
|
|
certManager: false
|
|
|
|
## Ingress annotations done as key:value pairs
|
|
## For a full list of possible ingress annotations, please see
|
|
## ref: https://github.com/kubernetes/ingress-nginx/blob/master/docs/user-guide/nginx-configuration/annotations.md
|
|
##
|
|
## If tls is set to true, annotation ingress.kubernetes.io/secure-backends: "true" will automatically be set
|
|
## If certManager is set to true, annotation kubernetes.io/tls-acme: "true" will automatically be set
|
|
annotations:
|
|
# kubernetes.io/ingress.class: nginx
|
|
|
|
## The list of hostnames to be covered with this ingress record.
|
|
## Most likely this will be just one host, but in the event more hosts are needed, this is an array
|
|
hosts:
|
|
- name: suitecrm.local
|
|
path: /
|
|
|
|
## Set this to true in order to enable TLS on the ingress record
|
|
tls: false
|
|
|
|
## Optionally specify the TLS hosts for the ingress record
|
|
## Useful when the Ingress controller supports www-redirection
|
|
## If not specified, the above host name will be used
|
|
# tlsHosts:
|
|
# - www.suitecrm.local
|
|
# - suitecrm.local
|
|
|
|
## If TLS is set to true, you must declare what secret will store the key/certificate for TLS
|
|
tlsSecret: suitecrm.local-tls
|
|
|
|
secrets:
|
|
## If you're providing your own certificates, please use this to add the certificates as secrets
|
|
## key and certificate should start with -----BEGIN CERTIFICATE----- or
|
|
## -----BEGIN RSA PRIVATE KEY-----
|
|
##
|
|
## name should line up with a tlsSecret set further up
|
|
## If you're using cert-manager, this is unneeded, as it will create the secret for you if it is not set
|
|
##
|
|
## It is also possible to create and manage the certificates outside of this helm chart
|
|
## Please see README.md for more information
|
|
# - name: suitecrm.local-tls
|
|
# key:
|
|
# certificate:
|
|
|
|
|
|
## Pod annotations
|
|
## ref: https://kubernetes.io/docs/concepts/overview/working-with-objects/annotations/
|
|
##
|
|
podAnnotations: {}
|
|
|
|
## Pod affinity preset
|
|
## ref: https://kubernetes.io/docs/concepts/scheduling-eviction/assign-pod-node/#inter-pod-affinity-and-anti-affinity
|
|
## Allowed values: soft, hard
|
|
##
|
|
podAffinityPreset: ''
|
|
|
|
## Pod anti-affinity preset
|
|
## Ref: https://kubernetes.io/docs/concepts/scheduling-eviction/assign-pod-node/#inter-pod-affinity-and-anti-affinity
|
|
## Allowed values: soft, hard
|
|
##
|
|
podAntiAffinityPreset: soft
|
|
|
|
## Node affinity preset
|
|
## Ref: https://kubernetes.io/docs/concepts/scheduling-eviction/assign-pod-node/#node-affinity
|
|
## Allowed values: soft, hard
|
|
##
|
|
nodeAffinityPreset:
|
|
## Node affinity type
|
|
## Allowed values: soft, hard
|
|
type: ''
|
|
## Node label key to match
|
|
## E.g.
|
|
## key: "kubernetes.io/e2e-az-name"
|
|
##
|
|
key: ''
|
|
## Node label values to match
|
|
## E.g.
|
|
## values:
|
|
## - e2e-az1
|
|
## - e2e-az2
|
|
##
|
|
values: []
|
|
|
|
## Affinity for pod assignment
|
|
## Ref: https://kubernetes.io/docs/concepts/configuration/assign-pod-node/#affinity-and-anti-affinity
|
|
##
|
|
affinity: {}
|
|
|
|
## SecurityContext configuration for the pods
|
|
##
|
|
podSecurityContext:
|
|
enabled: true
|
|
fsGroup: 1001
|
|
|
|
## SecurityContext configuration for the container
|
|
##
|
|
containerSecurityContext:
|
|
enabled: true
|
|
runAsUser: 1001
|
|
|
|
## Extra objects to deploy (value evaluated as a template)
|
|
##
|
|
extraDeploy: []
|
|
|
|
|
|
## Configure extra options for Redis liveness and readiness probes
|
|
## ref: https://kubernetes.io/docs/tasks/configure-pod-container/configure-liveness-readiness-probes/#configure-probes)
|
|
##
|
|
livenessProbe:
|
|
enabled: true
|
|
initialDelaySeconds: 5
|
|
periodSeconds: 5
|
|
timeoutSeconds: 5
|
|
successThreshold: 1
|
|
failureThreshold: 5
|
|
readinessProbe:
|
|
enabled: true
|
|
initialDelaySeconds: 5
|
|
periodSeconds: 5
|
|
timeoutSeconds: 1
|
|
successThreshold: 1
|
|
failureThreshold: 5
|
|
|
|
## Init containers parameters:
|
|
## volumePermissions: Change the owner and group of the persistent volume mountpoint to runAsUser:fsGroup values from the securityContext section.
|
|
##
|
|
volumePermissions:
|
|
enabled: false
|
|
image:
|
|
registry: docker.io
|
|
repository: bitnami/minideb
|
|
tag: buster
|
|
pullPolicy: Always
|
|
## Optionally specify an array of imagePullSecrets.
|
|
## Secrets must be manually created in the namespace.
|
|
## ref: https://kubernetes.io/docs/tasks/configure-pod-container/pull-image-private-registry/
|
|
##
|
|
pullSecrets: []
|
|
## - myRegistryKeySecretName
|
|
## Init containers' resource requests and limits
|
|
## ref: http://kubernetes.io/docs/user-guide/compute-resources/
|
|
##
|
|
resources:
|
|
## We usually recommend not to specify default resources and to leave this as a conscious
|
|
## choice for the user. This also increases chances charts run on environments with little
|
|
## resources, such as Minikube. If you do want to specify resources, uncomment the following
|
|
## lines, adjust them as necessary, and remove the curly braces after 'resources:'.
|
|
##
|
|
limits: {}
|
|
## cpu: 100m
|
|
## memory: 128Mi
|
|
##
|
|
requests: {}
|
|
## cpu: 100m
|
|
## memory: 128Mi
|
|
##
|
|
|
|
## An array to add extra env vars
|
|
## For example:
|
|
##
|
|
extraEnvVars: []
|
|
# - name: BEARER_AUTH
|
|
# value: true
|
|
|
|
## ConfigMap with extra environment variables
|
|
##
|
|
extraEnvVarsCM:
|
|
|
|
## Secret with extra environment variables
|
|
##
|
|
extraEnvVarsSecret:
|
|
|
|
## Extra volumes to add to the deployment
|
|
##
|
|
extraVolumes: []
|
|
|
|
## Extra volume mounts to add to the container
|
|
##
|
|
extraVolumeMounts: []
|
|
|
|
## Extra init containers to add to the deployment
|
|
##
|
|
initContainers: []
|
|
|
|
## Extra sidecar containers to add to the deployment
|
|
##
|
|
sidecars: []
|
|
|
|
## Prometheus Exporter / Metrics
|
|
##
|
|
metrics:
|
|
enabled: false
|
|
image:
|
|
registry: docker.io
|
|
repository: bitnami/apache-exporter
|
|
tag: 0.8.0-debian-10-r219
|
|
pullPolicy: IfNotPresent
|
|
## Optionally specify an array of imagePullSecrets.
|
|
## Secrets must be manually created in the namespace.
|
|
## ref: https://kubernetes.io/docs/tasks/configure-pod-container/pull-image-private-registry/
|
|
##
|
|
# pullSecrets:
|
|
# - myRegistryKeySecretName
|
|
|
|
## Metrics exporter pod Annotation and Labels
|
|
podAnnotations:
|
|
prometheus.io/scrape: "true"
|
|
prometheus.io/port: "9117"
|
|
|
|
## Metrics exporter resource requests and limits
|
|
## ref: http://kubernetes.io/docs/user-guide/compute-resources/
|
|
##
|
|
resources: {}
|