UNCLASSIFIED - NO CUI

Skip to content
Snippets Groups Projects
values.yaml 74.7 KiB
Newer Older
# -- Domain used for BigBang created exposed services, can be overridden by individual packages.
domain: dev.bigbang.mil
joshwolf's avatar
joshwolf committed

# -- (experimental) Toggle sourcing from external repos.
# All this does right now is toggle GitRepositories, it is _not_ fully functional
joshwolf's avatar
joshwolf committed

Micah Nagel's avatar
Micah Nagel committed
# -- List of Helm repositories/credentials to pull helm charts from.
# OCI Type: Must specify username/password or existingSecret if repository requires auth. Using "private-registry" for existingSecret will reuse credentials from registryCredentials above.
# Default Type: Must specify existingSecret with auth - see https://fluxcd.io/flux/components/source/helmrepositories/#secret-reference for details on secret data required.
helmRepositories: []
  # - name: "registry1"
  #   repository: "oci://registry1.dso.mil/bigbang"
  #   existingSecret: "private-registry"
  #   type: "oci"
  #   username: ""
  #   password: ""
  #   email: ""
  #   # This is an array/list of public keys to be used. Template will append `.pub` to the key as required by Flux
  #   cosignPublicKeys: []
  #     key1: |
  #       -----BEGIN PUBLIC KEY-----
  #       MFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAEIE7v9J6ttQus6itUoyfMCqMjaIqm
  #       R8XrntaedsdEhPPchOQuFzqTyyAPGifV1SaEu8medVRi6mVICWbVwOteNg==
  #       -----END PUBLIC KEY-----

Micah Nagel's avatar
Micah Nagel committed

# -- Single set of registry credentials used to pull all images deployed by BigBang.
registryCredentials:
  registry: registry1.dso.mil
  username: ""
  password: ""
  email: ""
# -- Multiple sets of registry credentials used to pull all images deployed by BigBang.
# Credentials will only be created when a valid combination exists, registry, username, and password (email is optional)
# Or a list of registires:
#  - registry: registry1.dso.mil
#    username: ""
#    password: ""
#    email: ""
#  - registry: registry.dso.mil
#    username: ""
#    password: ""
#    email: ""
# Openshift Container Platform Feature Toggle
openshift: false

# -- Git credential settings for accessing private repositories
# Order of precedence is:
#   1. existingSecret
#   2. http credentials (username/password/caFile)
#   3. ssh credentials (privateKey/publicKey/knownHosts)
git:
  # -- Existing secret to use for git credentials, must be in the appropriate format: https://toolkit.fluxcd.io/components/source/gitrepositories/#https-authentication
  # -- Chart created secrets with user defined values
    # -- HTTP git credentials, both username and password must be provided
    username: ""
    password: ""
Michael Martin's avatar
Michael Martin committed
    # -- HTTPS certificate authority file.  Required for any repo with a self signed certificate
    caFile: ""
    # -- SSH git credentials, privateKey, publicKey, and knownHosts must be provided
    privateKey: ""
    publicKey: ""
    knownHosts: ""

# -- Global SSO values used for BigBang deployments when sso is enabled
  # -- Name of the identity provider.  This is used by some packages as the SSO login label.
  name: SSO
  # -- Base URL for the identity provider. For OIDC, this is the issuer.  For SAML this is the entityID.
  url: https://login.dso.mil/auth/realms/baby-yoda

  # -- Certificate authority for the identity provider's certificates
  certificateAuthority:
    # -- The certificate authority public certificate in .pem format.  Populating this will create a secret in each namespace that enables SSO.
    cert: "" # See docs/assets/configs/example/dev-sso-values.yaml for an example
    # -- The secret name to use for the certificate authority.  Can be manually populated if cert is blank.
    secretName: tls-ca-sso

  saml:
    # -- SAML entityDescriptor (metadata) path
    entityDescriptor: "{{ .Values.sso.url }}/protocol/saml/descriptor"
    # -- SAML SSO Service path
    service: "{{ .Values.sso.url }}/protocol/saml"
    # -- Literal SAML XML metadata retrieved from `{{ .Values.sso.saml.entityDescriptor }}`.  Required for SSO in Nexus, Twistlock, or Sonarqube.
    metadata: "" # See docs/assets/configs/example/dev-sso-values.yaml for an example
    # NOTE: SAML attribute names may vary by package.  Use the package values to setup attribute names

  # -- OIDC endpoints can be retrieved from `{{ .Values.sso.url }}/.well-known/openid-configuration`
    # -- OIDC authorization path
    authorization: "{{ .Values.sso.url }}/protocol/openid-connect/auth"
    # -- OIDC logout / end session path
    endSession: "{{ .Values.sso.url }}/protocol/openid-connect/logout"
    # -- OIDC JSON Web Key Set (JWKS) path
    jwksUri: "{{ .Values.sso.url }}/protocol/openid-connect/certs"
    # -- OIDC token path
    token: "{{ .Values.sso.url }}/protocol/openid-connect/token"
    # -- OIDC user information path
    userinfo: "{{ .Values.sso.url }}/protocol/openid-connect/userinfo"
    # -- Literal OIDC JWKS data retrieved from JWKS Uri.  Only needed if `jwsksUri` is not defined.
    jwks: ""
    # -- Identity provider claim names that store metadata about the authenticated user.
    claims:
      # -- IdP's claim name used for the user's email address.
      email: email
      # -- IdP's claim name used for the user's full name
      name: name
      # -- IdP's claim name used for the username
      username: preferred_username
      # -- IdP's claim name used for the user's groups or roles
      groups: groups
# -- (Advanced) Flux reconciliation parameters.
# The default values provided will be sufficient for the majority of workloads.
joshwolf's avatar
joshwolf committed
  interval: 2m
joshwolf's avatar
joshwolf committed
  install:
joshwolf's avatar
joshwolf committed
  upgrade:
    remediation:
      retries: 3
      remediateLastFailure: true
    cleanupOnFail: true
joshwolf's avatar
joshwolf committed
  rollback:
joshwolf's avatar
joshwolf committed
    cleanupOnFail: true

# -- Global NetworkPolicies settings
networkPolicies:
Noah Costello's avatar
Noah Costello committed
  # -- Toggle all package NetworkPolicies, can disable specific packages with `package.values.networkPolicies.enabled`
  enabled: true
Micah Nagel's avatar
Micah Nagel committed
  # -- Control Plane CIDR, defaults to 0.0.0.0/0, use `kubectl get endpoints -n default kubernetes` to get the CIDR range needed for your cluster
  # Must be an IP CIDR range (x.x.x.x/x - ideally with /32 for the specific IP of a single endpoint, broader range for multiple masters/endpoints)
  # Used by package NetworkPolicies to allow Kube API access
  controlPlaneCidr: 0.0.0.0/0
  # -- Node CIDR, defaults to allowing "10.0.0.0/8" "172.16.0.0/12" "192.168.0.0/16" "100.64.0.0/10" networks.
  # use `kubectl get nodes -owide` and review the `INTERNAL-IP` column to derive CIDR range.
  # Must be an IP CIDR range (x.x.x.x/x - ideally a /16 or /24 to include multiple IPs)
  nodeCidr: ""
  # -- VPC CIDR, defaults to 0.0.0.0/0
Ronnie Webb's avatar
Ronnie Webb committed
  # In a production environment, it is recommended to setup a Private Endpoint for your AWS services like KMS or S3.
  # Please review https://docs.aws.amazon.com/kms/latest/developerguide/kms-vpc-endpoint.html to setup routing to AWS services that never leave the AWS network.
  # Once created update `networkPolicies.vpcCidr` to match the CIDR of your VPC so Vault will be able to reach your VPCs DNS and new KMS endpoint.
  vpcCidr: 0.0.0.0/0
# -- Global ImagePullPolicy value for all packages
# Permitted values are: None, Always, IfNotPresent
# ----------------------------------------------------------------------------------------------------------------------
# Istio
#
joshwolf's avatar
joshwolf committed
istio:
  # -- Toggle deployment of Istio.
joshwolf's avatar
joshwolf committed
  enabled: true
  mtls:
    # -- STRICT = Allow only mutual TLS traffic,
    # PERMISSIVE = Allow both plain text and mutual TLS traffic
    mode: STRICT
Micah Nagel's avatar
Micah Nagel committed
  # -- Choose source type of "git" or "helmRepo"
  sourceType: "git"

joshwolf's avatar
joshwolf committed
  git:
Micah Nagel's avatar
Micah Nagel committed
    repo: https://repo1.dso.mil/big-bang/product/packages/istio-controlplane.git
    tag: "1.23.5-bb.0"
Micah Nagel's avatar
Micah Nagel committed
  helmRepo:
    repoName: "registry1"
    chartName: "istio"
    tag: "1.23.5-bb.0"
    # -- If the HelmRelease should verify the cosign signature of the HelmRepo (only relevant if Repo is OCI).  Set to 'false' to disable verification.
    # cosignVerify:
Stanislav Bondarenko's avatar
Stanislav Bondarenko committed

  # -- Tetrate Istio Distribution - Tetrate provides FIPs verified Istio and Envoy software and support,
  # validated through the FIPs Boring Crypto module. Find out more from Tetrate - https://www.tetrate.io/tetrate-istio-subscription
  enterprise: false

  # Ingress gateways are created based on the key name.  Adding more keys will add ingress gateways.
  # Ingress gateways are setup in a Horizontal Pod Autoscaler with 1 to 5 replicas
  # Besides some ports needed by Istio, only ports 80 and 443 are opened
  # Ingress gateways that require more configuration can be completed using `istio.values`
  ingressGateways:
    public-ingressgateway:
      type: "LoadBalancer" # or "NodePort"
      kubernetesResourceSpec: {} # https://istio.io/latest/docs/reference/config/istio.operator.v1alpha1/#KubernetesResourcesSpec

    # private-ingressgateway:
    #   type: "LoadBalancer" # or "NodePort"
    #   kubernetesResourceSpec: # https://istio.io/latest/docs/reference/config/istio.operator.v1alpha1/#KubernetesResourcesSpec
    #     serviceAnnotations: # Example for AWS internal load balancer
    #       service.beta.kubernetes.io/aws-load-balancer-type: nlb
    #       service.beta.kubernetes.io/aws-load-balancer-internal: "true"

    # passthrough-ingressgateway:
    #   type: "NodePort" # or "LoadBalancer"
    #   # Node ports are assigned starting from nodePortBase.  The nodePortBase specifies the start of a range of 4 unused node ports.
    #   # Node port will be assigned as follows: Port 15021 (Status) = nodePortBase, Port 80 = nodePortBase+1, Port 443 = nodePortBase+2, Port 15443 (SNI) = nodePortBase+3
    #   # Node port base should be in the range from 30000 to 32764
    #   nodePortBase: 32000  # Alternatively, the kubernetesResourceSpec can be used to configure all port parameters

  gateways:
    public:
      ingressGateway: "public-ingressgateway"
      hosts:
Ronnie Webb's avatar
Ronnie Webb committed
        - "*.{{ .Values.domain }}"
      # -- Controls default HTTP/8080 server entry with HTTP to HTTPS Redirect.
      autoHttpRedirect:
        enabled: true
        minProtocolVersion: ""
    # private:
    #   ingressGateway: "private-ingressgateway"
    #   hosts:
    #   - "example.bigbang.dev"
    #   ports:
    #     - name: tls-2
    #       number: 1234
    #       protocol: TCP
    #     - name: tls
    #       number: 5678
    #       protocol: TCP
    #   # -- Controls default HTTP/8080 server entry with HTTP to HTTPS Redirect.
    #   autoHttpRedirect:
    #     minProtocolVersion: ""
    # passthrough:
    #   ingressGateway: "passthrough-ingressgateway"
    #   hosts:
Tim Seagren's avatar
Tim Seagren committed

    ####
    # Alternate multi-server configuration method
    ####
    # private:
    #   ingressGateway: "private-ingressgateway"
    #   servers:
    #   - hosts:
    #     - "example.bigbang.dev"
    #     port:
    #       name: tls-1
    #       number: 1234
    #       protocol: TCP
    #   # -- Controls default HTTP/8080 server entry with HTTP to HTTPS Redirect.
    #     autoHttpRedirect:
    #       enabled: false
    #     tls:
    #       key: ""
    #       cert: ""
    #       minProtocolVersion: ""
Tim Seagren's avatar
Tim Seagren committed
    #   - hosts:
    #     - "example.bigbang.dev"
    #     port:
    #       name: tls-2
    #       number: 5678
    #       protocol: TCP
    #   # -- Controls default HTTP/8080 server entry with HTTP to HTTPS Redirect.
    #     autoHttpRedirect:
    #       enabled: false
    #     tls:
    #       key: ""
    #       cert: ""
    #       minProtocolVersion: ""
Tim Seagren's avatar
Tim Seagren committed
    # passthrough:
    #   ingressGateway: "passthrough-ingressgateway"
    #   hosts:
    #   - "*.{{ .Values.domain }}"
    #   # -- Controls default HTTP/8080 server entry with HTTP to HTTPS Redirect.
    #   autoHttpRedirect:
    #     enabled: true
    #   tls:
    #     mode: "PASSTHROUGH"
    # mutual:
    #   ingressGateway: "mutual-ingressgateway"
    #   hosts:
    #   - "*.{{ .Values.domain }}"
    #   # -- Controls default HTTP/8080 server entry with HTTP to HTTPS Redirect.
    #   autoHttpRedirect:
    #     enabled: true
    #   tls:
    #     mode: MUTUAL
    #     cert: ""
    #     key: ""
    #     ca: ""
  # -- Flux reconciliation overrides specifically for the Istio Package
  flux: {}

Micah Nagel's avatar
Micah Nagel committed
  # -- Values to passthrough to the istio-controlplane chart: https://repo1.dso.mil/big-bang/product/packages/istio-controlplane.git
  # -- Post Renderers.  See docs/postrenders.md
  postRenderers: []

Micah Nagel's avatar
Micah Nagel committed
istioOperator:
  # -- Toggle deployment of Istio Operator.
Micah Nagel's avatar
Micah Nagel committed

  # -- Choose source type of "git" or "helmRepo"
  sourceType: "git"

Micah Nagel's avatar
Micah Nagel committed
    repo: https://repo1.dso.mil/big-bang/product/packages/istio-operator.git
    tag: "1.23.5-bb.0"
Micah Nagel's avatar
Micah Nagel committed
  helmRepo:
    repoName: "registry1"
    chartName: "istio-operator"
    tag: "1.23.5-bb.0"
  # -- Flux reconciliation overrides specifically for the Istio Operator Package
  flux: {}

Micah Nagel's avatar
Micah Nagel committed
  # -- Values to passthrough to the istio-operator chart: https://repo1.dso.mil/big-bang/product/packages/istio-operator.git
  # -- Post Renderers.  See docs/postrenders.md
  postRenderers: []

jaeger:
  # -- Toggle deployment of Jaeger.
Micah Nagel's avatar
Micah Nagel committed
  enabled: false

  # -- Choose source type of "git" or "helmRepo"
  sourceType: "git"

Micah Nagel's avatar
Micah Nagel committed
    repo: https://repo1.dso.mil/big-bang/product/packages/jaeger.git
    tag: "2.57.0-bb.2"
Micah Nagel's avatar
Micah Nagel committed
  helmRepo:
    repoName: "registry1"
    chartName: "jaeger"
    tag: "2.57.0-bb.2"

  # -- Flux reconciliation overrides specifically for the Jaeger Package
Micah Nagel's avatar
Micah Nagel committed
  flux:
    install:
      crds: CreateReplace
    upgrade:
      crds: CreateReplace
  # -- Redirect the package ingress to a specific Istio Gateway (listed in `istio.gateways`).  The default is "public".
  sso:
    # -- Toggle SSO for Jaeger on and off
    enabled: false

    # -- OIDC Client ID to use for Jaeger
    client_id: ""

    # -- OIDC Client Secret to use for Jaeger
    client_secret: ""

Micah Nagel's avatar
Micah Nagel committed
  # -- Values to pass through to Jaeger chart: https://repo1.dso.mil/big-bang/product/packages/jaeger.git
  # -- Post Renderers.  See docs/postrenders.md
  postRenderers: []

kiali:
  # -- Toggle deployment of Kiali.
  enabled: true
Micah Nagel's avatar
Micah Nagel committed

  # -- Choose source type of "git" or "helmRepo"
  sourceType: "git"

Micah Nagel's avatar
Micah Nagel committed
    repo: https://repo1.dso.mil/big-bang/product/packages/kiali.git
    tag: "2.5.0-bb.0"
Micah Nagel's avatar
Micah Nagel committed
  helmRepo:
    repoName: "registry1"
    chartName: "kiali"
    tag: "2.5.0-bb.0"

  # -- Flux reconciliation overrides specifically for the Kiali Package
  flux: {}

  # -- Redirect the package ingress to a specific Istio Gateway (listed in `istio.gateways`).  The default is "public".
  sso:
    # -- Toggle SSO for Kiali on and off
    enabled: false

    # -- OIDC Client ID to use for Kiali
    client_id: ""

    # -- OIDC Client Secret to use for Kiali
    client_secret: ""

Micah Nagel's avatar
Micah Nagel committed
  # -- Values to pass through to Kiali chart: https://repo1.dso.mil/big-bang/product/packages/kiali

  # -- Post Renderers.  See docs/postrenders.md
  postRenderers: []

# ----------------------------------------------------------------------------------------------------------------------

# ----------------------------------------------------------------------------------------------------------------------
# Cluster Auditor
#
clusterAuditor:
  # -- Toggle deployment of Cluster Auditor.
Micah Nagel's avatar
Micah Nagel committed
  enabled: false

  # -- Choose source type of "git" or "helmRepo"
  sourceType: "git"

Micah Nagel's avatar
Micah Nagel committed
    repo: https://repo1.dso.mil/big-bang/product/packages/cluster-auditor.git
    tag: "1.5.0-bb.22"
Micah Nagel's avatar
Micah Nagel committed
  helmRepo:
    repoName: "registry1"
    chartName: "cluster-auditor"
    tag: "1.5.0-bb.22"
  # -- Flux reconciliation overrides specifically for the Cluster Auditor Package
  flux: {}

Micah Nagel's avatar
Micah Nagel committed
  # -- Values to passthrough to the cluster auditor chart: https://repo1.dso.mil/big-bang/product/packages/cluster-auditor.git
  values: {}

  # -- Post Renderers.  See docs/postrenders.md
  postRenderers: []
# ----------------------------------------------------------------------------------------------------------------------
# ----------------------------------------------------------------------------------------------------------------------
# OPA Gatekeeper
#
joshwolf's avatar
joshwolf committed
gatekeeper:
  # -- Toggle deployment of OPA Gatekeeper.
Micah Nagel's avatar
Micah Nagel committed
  enabled: false

  # -- Choose source type of "git" or "helmRepo"
  sourceType: "git"

joshwolf's avatar
joshwolf committed
  git:
Micah Nagel's avatar
Micah Nagel committed
    repo: https://repo1.dso.mil/big-bang/product/packages/policy.git
    tag: "3.18.2-bb.0"
Micah Nagel's avatar
Micah Nagel committed
  helmRepo:
    repoName: "registry1"
    chartName: "gatekeeper"
    tag: "3.18.2-bb.0"
  # -- Flux reconciliation overrides specifically for the OPA Gatekeeper Package
  flux:
    install:
      crds: CreateReplace
    upgrade:
      crds: CreateReplace
Loading
Loading full blame...