-
Notifications
You must be signed in to change notification settings - Fork 0
/
Copy pathvalues.yaml
255 lines (246 loc) · 8.06 KB
/
values.yaml
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
122
123
124
125
126
127
128
129
130
131
132
133
134
135
136
137
138
139
140
141
142
143
144
145
146
147
148
149
150
151
152
153
154
155
156
157
158
159
160
161
162
163
164
165
166
167
168
169
170
171
172
173
174
175
176
177
178
179
180
181
182
183
184
185
186
187
188
189
190
191
192
193
194
195
196
197
198
199
200
201
202
203
204
205
206
207
208
209
210
211
212
213
214
215
216
217
218
219
220
221
222
223
224
225
226
227
228
229
230
231
232
233
234
235
236
237
238
239
240
241
242
243
244
245
246
247
248
249
250
251
252
253
254
255
# Default values for the tnlab chart.
# This is a YAML-formatted file.
# Declare variables to be passed into your templates.
# It's reccomended to edit the values only in this file.
# In case you don't find something you are looking for here, you are free to search for the value you need in the subcharts and add it to the values below.
grafana:
rbac:
pspEnabled: false
# Set the username for Grafana (password randomly generated)
adminUser: tnlab
admin:
# Name of the secret used by Grafana
existingSecret: grafana-creds
userKey: username
passwordKey: password
# Plugins to include in Grafana in list form. The format is 'plugin_package_url;plugin_alias'. You can check the example below for reference:
# plugins:
# - https://github.com/grafana/worldmap-panel/releases/download/v1.0.6/grafana-worldmap-panel-1.0.6.zip;grafana-world-map-travel-plugin
plugins: []
# Customize your Grafana application modifying the grafana.ini file, setting the parameters you need. Here is the documentation for reference: https://grafana.com/docs/grafana/latest/setup-grafana/configure-grafana/
# Example: allow unsiged plugins in Grafana
# grafana.ini:
# plugins:
# allow_loading_unsigned_plugins: grafana-world-map-travel-plugin
grafana.ini: {}
ingress:
enabled: true
# Set up annotations to customize your ingress exposition even further.
# Example: specify that the backend-protocol is https
# annotations:
# nginx.ingress.kubernetes.io/backend-protocol: "HTTPS"
annotations: {}
ingressClassName: nginx
labels: {}
path: /
pathType: Prefix
# Set up your host for the application.
hosts:
- grafana.local
extraPaths: []
# Set up your TLS with a secret like the example below:
# tls:
# - secretName: "your-tls-secret"
# hosts:
# - your.host
tls: []
dssSecret:
# Specify the secret name and the username that will be used for accessing DSS (password randomly generated)
name: dss-creds
username: tnlab
dss:
# If you want to use an external keystore for DSS, uncomment the following lines:
# externalKeystore:
# enabled: true
# WARNING: messing with the Keystore might lead to data loss for already configured certificates.
env:
# DSS_SERVER_URL should correspond to the link you use for accessing DSS. For example, if you expose it by ingress:
# DSS_SERVER_URL: https://your.host
DSS_SERVER_URL: https://localhost:9443
# DSS_REVERSEPROXY should correspond to your host
# DSS_REVERSEPROXY: your.host
DSS_REVERSEPROXY: localhost
ingress:
enabled: true
# Set up annotations to customize your ingress exposition even further.
# Example: specify that the backend-protocol is https
# annotations:
# nginx.ingress.kubernetes.io/backend-protocol: "HTTPS"
annotations: {}
# Set up your host for the application.
host: dss.local
# Set up your TLS with a secret like the example below:
# tls:
# - secretName: "your-tls-secret"
# hosts:
# - your.host
tls: []
ingressClassName: nginx
nifi:
# postStart, with this configuration, loads PostgreSql in NiFi, allowing to use the corresponding dialect.
postStart: /opt/nifi/; wget -P /opt/nifi/ https://jdbc.postgresql.org/download/postgresql-42.2.5.jar
# To whitelist your host for NiFi, uncomment the two rows below and set your host:
# properties:
# webProxyHost: your.host
# Set the memory assigned to NiFi
persistence:
enabled: true
subPath:
enabled: true
size: 128Gi
# Set limits to the amount of memory used
resources:
limits:
memory: "6Gi"
requests:
memory: "4Gi"
# Allows you to set up one or more zookeeper to use with NiFi.
# WARNING: setting this to true will require more memory than the one already assigned.
zookeeper:
enabled: false
auth:
singleUser:
# Set the username for NiFi
username: tnlab
# Set the password for NiFi
password: tnlabpassword # Must have at least 12 characters
ingress:
enabled: true
# Set up annotations to customize your ingress exposition even further.
# Example: specify that the backend-protocol is https
# annotations:
# nginx.ingress.kubernetes.io/backend-protocol: "HTTPS"
annotations: {}
# Set up your TLS with a secret like the example below:
# tls:
# - secretName: "your-tls-secret"
# hosts:
# - your.host
tls: []
# Set up your host for the application.
hosts:
- nifi.local
path: /
className: nginx
nuclio:
dashboard:
# If you install/update the chart in an environment without docker, use kaniko instead:
# containerBuilderKind: kaniko
ingress:
enabled: true
# Set up annotations to customize your ingress exposition even further.
# Example: specify that the backend-protocol is https
# annotations:
# nginx.ingress.kubernetes.io/backend-protocol: "HTTPS"
annotations:
kubernetes.io/ingress.class: nginx
path: /
# Set up your host for the application.
hosts:
- nuclio.local
# Set up your TLS with a secret like the example below:
# tls:
# - secretName: "your-tls-secret"
# hosts:
# - your.host
tls: []
# Create a basic auth secret (nuclio-auth-secret) that will be used to access Nuclio.
# The name of the secret and the auth type must be specified in the ingress annotations.
basicAuth:
# Set the username
username: ""
# Set the password
password: ""
# Set the registry that will be used by Nuclio with the registry secret name and the registry url.
# registry:
# secretName: ""
# pushPullUrl: ""
minio:
enabled: true
# Set the username for Minio (password randomly generated)
rootUser: tnlab
# Name of the secret with the minio credentials.
existingSecret: minio-creds-secret
mode: standalone
replicas: 1
ingress:
enabled: true
# Set up annotations to customize your ingress exposition even further.
# Example: specify that the backend-protocol is https
# annotations:
# nginx.ingress.kubernetes.io/backend-protocol: "HTTPS"
annotations: {}
# Set up your host for the Minio API.
hosts:
- minio-api.local
# Set up your TLS with a secret like the example below:
# tls:
# - secretName: "your-tls-secret"
# hosts:
# - your.host
tls: []
ingressClassName: nginx
consoleIngress:
enabled: true
# Set up annotations to customize your ingress exposition even further.
# Example: specify that the backend-protocol is https
# annotations:
# nginx.ingress.kubernetes.io/backend-protocol: "HTTPS"
annotations: {}
# Set up your host for the Minio Console.
hosts:
- minio.local
# Set up your TLS with a secret like the example below:
# tls:
# - secretName: "your-tls-secret"
# hosts:
# - your.host
tls: []
ingressClassName: nginx
# Set the memory assigned to Minio
persistence:
enabled: true
size: 128Gi
# Set limits to the amount of memory used
resources:
requests:
memory: 0.5Gi
limits:
memory: 4Gi
# Service and port used by Minio-api
service:
type: ClusterIP
port: 9000
# Service and port used by Minio-console
consoleService:
type: ClusterIP
port: 9001
dremio:
ingress:
enabled: true
# Set up your host for the application.
hosts:
- host: dremio.local
paths:
- path: /
pathType: ImplementationSpecific
# Set up your TLS with a secret like the example below:
# tls:
# - secretName: "your-tls-secret"
# hosts:
# - your.host
tls: []
className: nginx
# Set limits to the amount of memory used
resources:
limits:
memory: "6Gi"
requests:
memory: "4Gi"
mysqlchart:
dssCreds:
# Set the username for the DSS database
dssDbUsername: tnlab
# Set the password for the DSS database
dssDbPassword: tnlabpassword
# Postgres automatically generates a secret with the password for the user tnlab (database: tnlab)