updating readme to be correct
Compare changes
+ 85
− 543
| helmRepositories | list | `[]` | List of Helm repositories/credentials to pull helm charts from. OCI Type: Must specify username/password or existingSecret if repository requires auth. Using "private-registry" for existingSecret will reuse credentials from registryCredentials above. Default Type: Must specify existingSecret with auth - see https://fluxcd.io/flux/components/source/helmrepositories/#secret-reference for details on secret data required. |
| openshift | bool | `false` | Multiple sets of registry credentials used to pull all images deployed by BigBang. Credentials will only be created when a valid combination exists, registry, username, and password (email is optional) Or a list of registires: - registry: registry1.dso.mil username: "" password: "" email: "" - registry: registry.dso.mil username: "" password: "" email: "" Openshift Container Platform Feature Toggle |
| git | object | `{"credentials":{"caFile":"","knownHosts":"","password":"","privateKey":"","publicKey":"","username":""},"existingSecret":""}` | Git credential settings for accessing private repositories Order of precedence is: 1. existingSecret 2. http credentials (username/password/caFile) 3. ssh credentials (privateKey/publicKey/knownHosts) |
| sso | object | `{"certificateAuthority":{"cert":"","secretName":"tls-ca-sso"},"name":"SSO","oidc":{"authorization":"{{ .Values.sso.url }}/protocol/openid-connect/auth","claims":{"email":"email","groups":"groups","name":"name","username":"preferred_username"},"endSession":"{{ .Values.sso.url }}/protocol/openid-connect/logout","jwks":"","jwksUri":"{{ .Values.sso.url }}/protocol/openid-connect/certs","token":"{{ .Values.sso.url }}/protocol/openid-connect/token","userinfo":"{{ .Values.sso.url }}/protocol/openid-connect/userinfo"},"saml":{"entityDescriptor":"{{ .Values.sso.url }}/protocol/saml/descriptor","metadata":"","service":"{{ .Values.sso.url }}/protocol/saml"},"url":"https://login.dso.mil/auth/realms/baby-yoda"}` | Global SSO values used for BigBang deployments when sso is enabled |
| sso.oidc | object | `{"authorization":"{{ .Values.sso.url }}/protocol/openid-connect/auth","claims":{"email":"email","groups":"groups","name":"name","username":"preferred_username"},"endSession":"{{ .Values.sso.url }}/protocol/openid-connect/logout","jwks":"","jwksUri":"{{ .Values.sso.url }}/protocol/openid-connect/certs","token":"{{ .Values.sso.url }}/protocol/openid-connect/token","userinfo":"{{ .Values.sso.url }}/protocol/openid-connect/userinfo"}` | OIDC endpoints can be retrieved from `{{ .Values.sso.url }}/.well-known/openid-configuration` |
| flux | Advanced | `{"install":{"remediation":{"retries":-1}},"interval":"2m","rollback":{"cleanupOnFail":true,"timeout":"10m"},"test":{"enable":false},"timeout":"10m","upgrade":{"cleanupOnFail":true,"remediation":{"remediateLastFailure":true,"retries":3}}}` | Flux reconciliation parameters. The default values provided will be sufficient for the majority of workloads. |
| networkPolicies.controlPlaneCidr | string | `"0.0.0.0/0"` | Control Plane CIDR, defaults to 0.0.0.0/0, use `kubectl get endpoints -n default kubernetes` to get the CIDR range needed for your cluster Must be an IP CIDR range (x.x.x.x/x - ideally with /32 for the specific IP of a single endpoint, broader range for multiple masters/endpoints) Used by package NetworkPolicies to allow Kube API access |
| networkPolicies.nodeCidr | string | `""` | Node CIDR, defaults to allowing "10.0.0.0/8" "172.16.0.0/12" "192.168.0.0/16" "100.64.0.0/10" networks. use `kubectl get nodes -owide` and review the `INTERNAL-IP` column to derive CIDR range. Must be an IP CIDR range (x.x.x.x/x - ideally a /16 or /24 to include multiple IPs) |
| networkPolicies.vpcCidr | string | `"0.0.0.0/0"` | VPC CIDR, defaults to 0.0.0.0/0 In a production environment, it is recommended to setup a Private Endpoint for your AWS services like KMS or S3. Please review https://docs.aws.amazon.com/kms/latest/developerguide/kms-vpc-endpoint.html to setup routing to AWS services that never leave the AWS network. Once created update `networkPolicies.vpcCidr` to match the CIDR of your VPC so Vault will be able to reach your VPCs DNS and new KMS endpoint. |
| istio | object | `{"enabled":true,"enterprise":false,"flux":{},"gateways":{"public":{"autoHttpRedirect":{"enabled":true},"hosts":["*.{{ .Values.domain }}"],"ingressGateway":"public-ingressgateway","tls":{"cert":"","key":"","minProtocolVersion":""}}},"git":{"path":"./chart","repo":"https://repo1.dso.mil/big-bang/product/packages/istio-controlplane.git","tag":"1.19.5-bb.2"},"helmRepo":{"chartName":"istio","repoName":"registry1","tag":"1.19.5-bb.2"},"ingressGateways":{"public-ingressgateway":{"kubernetesResourceSpec":{},"type":"LoadBalancer"}},"mtls":{"mode":"STRICT"},"postRenderers":[],"sourceType":"git","values":{}}` | -------------------------------------------------------------------------------------------------------------------- Istio |
| clusterAuditor | object | `{"enabled":false,"flux":{},"git":{"path":"./chart","repo":"https://repo1.dso.mil/big-bang/product/packages/cluster-auditor.git","tag":"1.5.0-bb.12"},"helmRepo":{"chartName":"cluster-auditor","repoName":"registry1","tag":"1.5.0-bb.12"},"postRenderers":[],"sourceType":"git","values":{}}` | -------------------------------------------------------------------------------------------------------------------- Cluster Auditor |
| gatekeeper | object | `{"enabled":false,"flux":{"install":{"crds":"CreateReplace"},"upgrade":{"crds":"CreateReplace"}},"git":{"path":"./chart","repo":"https://repo1.dso.mil/big-bang/product/packages/policy.git","tag":"3.14.0-bb.0"},"helmRepo":{"chartName":"gatekeeper","repoName":"registry1","tag":"3.14.0-bb.0"},"postRenderers":[],"sourceType":"git","values":{}}` | -------------------------------------------------------------------------------------------------------------------- OPA Gatekeeper |
| kyverno | object | `{"enabled":true,"flux":{},"git":{"path":"./chart","repo":"https://repo1.dso.mil/big-bang/product/packages/kyverno.git","tag":"3.1.1-bb.0"},"helmRepo":{"chartName":"kyverno","repoName":"registry1","tag":"3.1.1-bb.0"},"postRenderers":[],"sourceType":"git","values":{}}` | -------------------------------------------------------------------------------------------------------------------- Kyverno |
| elasticsearchKibana | object | `{"enabled":false,"flux":{"timeout":"20m"},"git":{"path":"./chart","repo":"https://repo1.dso.mil/big-bang/product/packages/elasticsearch-kibana.git","tag":"1.8.0-bb.0"},"helmRepo":{"chartName":"elasticsearch-kibana","repoName":"registry1","tag":"1.8.0-bb.0"},"ingress":{"gateway":""},"license":{"keyJSON":"","trial":false},"postRenderers":[],"sourceType":"git","sso":{"client_id":"","client_secret":"","enabled":false},"values":{}}` | -------------------------------------------------------------------------------------------------------------------- Elasticsearch, Kibana, Fluentbit Logging stack |
| promtail | object | `{"enabled":true,"flux":{},"git":{"path":"./chart","repo":"https://repo1.dso.mil/big-bang/product/packages/promtail.git","tag":"6.15.3-bb.1"},"helmRepo":{"chartName":"promtail","repoName":"registry1","tag":"6.15.3-bb.1"},"postRenderers":[],"sourceType":"git","values":{}}` | -------------------------------------------------------------------------------------------------------------------- Promtail / Loki Logging stack |
| neuvector | object | `{"enabled":true,"flux":{},"git":{"path":"./chart","repo":"https://repo1.dso.mil/big-bang/product/packages/neuvector.git","tag":"2.6.3-bb.8"},"helmRepo":{"chartName":"neuvector","repoName":"registry1","tag":"2.6.3-bb.8"},"ingress":{"gateway":""},"postRenderers":[],"sourceType":"git","sso":{"client_id":"","client_secret":"","default_role":"","enabled":false,"group_claim":"","group_mapped_roles":[]},"values":{}}` | -------------------------------------------------------------------------------------------------------------------- |
| tempo | object | `{"enabled":true,"flux":{},"git":{"path":"./chart","repo":"https://repo1.dso.mil/big-bang/product/packages/tempo.git","tag":"1.7.1-bb.1"},"helmRepo":{"chartName":"tempo","repoName":"registry1","tag":"1.7.1-bb.1"},"ingress":{"gateway":""},"objectStorage":{"accessKey":"","accessSecret":"","bucket":"","endpoint":"","insecure":false,"region":""},"postRenderers":[],"sourceType":"git","sso":{"client_id":"","client_secret":"","enabled":false},"values":{}}` | -------------------------------------------------------------------------------------------------------------------- |
| monitoring | object | `{"enabled":true,"flux":{"install":{"crds":"CreateReplace"},"upgrade":{"crds":"CreateReplace"}},"git":{"path":"./chart","repo":"https://repo1.dso.mil/big-bang/product/packages/monitoring.git","tag":"55.5.1-bb.0"},"helmRepo":{"chartName":"monitoring","repoName":"registry1","tag":"55.5.1-bb.0"},"ingress":{"gateway":""},"postRenderers":[],"sourceType":"git","sso":{"alertmanager":{"client_id":"","client_secret":""},"enabled":false,"prometheus":{"client_id":"","client_secret":""}},"values":{}}` | -------------------------------------------------------------------------------------------------------------------- Monitoring |
| grafana | object | `{"enabled":true,"flux":{},"git":{"path":"./chart","repo":"https://repo1.dso.mil/big-bang/product/packages/grafana.git","tag":"6.60.6-bb.5"},"helmRepo":{"chartName":"grafana","repoName":"registry1","tag":"6.60.6-bb.5"},"ingress":{"gateway":""},"postRenderers":[],"sourceType":"git","sso":{"enabled":false,"grafana":{"allow_sign_up":true,"client_id":"","client_secret":"","role_attribute_path":"Viewer","scopes":""}},"values":{}}` | -------------------------------------------------------------------------------------------------------------------- Grafana |
| twistlock | object | `{"enabled":false,"flux":{},"git":{"path":"./chart","repo":"https://repo1.dso.mil/big-bang/product/packages/twistlock.git","tag":"0.13.1-bb.0"},"helmRepo":{"chartName":"twistlock","repoName":"registry1","tag":"0.13.1-bb.0"},"ingress":{"gateway":""},"postRenderers":[],"sourceType":"git","sso":{"client_id":"","enabled":false,"groups":"","provider_type":"shibboleth"},"values":{}}` | -------------------------------------------------------------------------------------------------------------------- Twistlock |
| addons | object | `{"anchore":{"adminPassword":"","database":{"database":"","feeds_database":"","host":"","password":"","port":"","username":""},"enabled":false,"enterprise":{"enabled":false,"licenseYaml":"FULL LICENSE\n"},"flux":{"upgrade":{"disableWait":true}},"git":{"path":"./chart","repo":"https://repo1.dso.mil/big-bang/product/packages/anchore-enterprise.git","tag":"1.27.4-bb.7"},"helmRepo":{"chartName":"anchore","repoName":"registry1","tag":"1.27.4-bb.7"},"ingress":{"gateway":""},"postRenderers":[],"redis":{"host":"","password":"","port":"","username":""},"sourceType":"git","sso":{"client_id":"","enabled":false,"role_attribute":""},"values":{}},"argocd":{"enabled":false,"flux":{},"git":{"path":"./chart","repo":"https://repo1.dso.mil/big-bang/product/packages/argocd.git","tag":"5.46.7-bb.11"},"helmRepo":{"chartName":"argocd","repoName":"registry1","tag":"5.46.7-bb.11"},"ingress":{"gateway":""},"postRenderers":[],"redis":{"host":"","port":""},"sourceType":"git","sso":{"client_id":"","client_secret":"","enabled":false,"groups":"g, Impact Level 2 Authorized, role:admin\n"},"values":{}},"authservice":{"chains":{},"enabled":false,"flux":{},"git":{"path":"./chart","repo":"https://repo1.dso.mil/big-bang/product/packages/authservice.git","tag":"0.5.3-bb.23"},"helmRepo":{"chartName":"authservice","repoName":"registry1","tag":"0.5.3-bb.23"},"postRenderers":[],"sourceType":"git","values":{}},"fortify":{"enabled":false,"flux":{},"git":{"path":"./chart","repo":"https://repo1.dso.mil/big-bang/product/packages/fortify.git","tag":"1.1.2320154-bb.0"},"helmRepo":{"chartName":"fortify-ssc","repoName":"registry1","tag":"1.1.2320154-bb.0"},"ingress":{"gateway":""},"postRenderers":[],"sourceType":"git","sso":{"client_id":"","client_secret":"","enabled":false},"values":{}},"gitlab":{"database":{"database":"","host":"","password":"","port":5432,"username":""},"enabled":false,"flux":{},"git":{"path":"./chart","repo":"https://repo1.dso.mil/big-bang/product/packages/gitlab.git","tag":"7.6.1-bb.1"},"helmRepo":{"chartName":"gitlab","repoName":"registry1","tag":"7.6.1-bb.1"},"hostnames":{"gitlab":"gitlab","registry":"registry"},"ingress":{"gateway":""},"objectStorage":{"accessKey":"","accessSecret":"","bucketPrefix":"","endpoint":"","iamProfile":"","region":"","type":""},"postRenderers":[],"railsSecret":"","redis":{"password":""},"smtp":{"password":""},"sourceType":"git","sso":{"client_id":"","client_secret":"","enabled":false,"scopes":["Gitlab"]},"values":{}},"gitlabRunner":{"enabled":false,"flux":{},"git":{"path":"./chart","repo":"https://repo1.dso.mil/big-bang/product/packages/gitlab-runner.git","tag":"0.59.1-bb.1"},"helmRepo":{"chartName":"gitlab-runner","repoName":"registry1","tag":"0.59.1-bb.1"},"postRenderers":[],"sourceType":"git","values":{}},"haproxy":{"flux":{},"git":{"path":"./chart","repo":"https://repo1.dso.mil/big-bang/product/packages/haproxy.git","tag":"1.19.3-bb.1"},"helmRepo":{"chartName":"haproxy","repoName":"registry1","tag":"1.19.3-bb.1"},"ingress":{"gateway":""},"postRenderers":[],"sourceType":"git","values":{}},"harbor":{"enabled":false,"flux":{},"git":{"path":"./chart","repo":"https://repo1.dso.mil/platform-one/big-bang/apps/sandbox/harbor.git","tag":"1.13.1-bb.4"},"helmRepo":{"chartName":"harbor","repoName":"registry1","tag":"1.13.1-bb.4"},"ingress":{"gateway":""},"postRenderers":[],"sourceType":"git","sso":{"client_id":"","client_secret":"","enabled":false},"values":{}},"keycloak":{"database":{"database":"","host":"","password":"","port":5432,"type":"postgres","username":""},"enabled":false,"flux":{},"git":{"path":"./chart","repo":"https://repo1.dso.mil/big-bang/product/packages/keycloak.git","tag":"18.4.3-bb.11"},"helmRepo":{"chartName":"keycloak","repoName":"registry1","tag":"18.4.3-bb.11"},"ingress":{"cert":"","gateway":"passthrough","key":""},"postRenderers":[],"sourceType":"git","values":{}},"mattermost":{"database":{"database":"","host":"","password":"","port":"","ssl_mode":"","username":""},"elasticsearch":{"enabled":false},"enabled":false,"enterprise":{"enabled":false,"license":""},"flux":{},"git":{"path":"./chart","repo":"https://repo1.dso.mil/big-bang/product/packages/mattermost.git","tag":"v9.2.3-bb.2"},"helmRepo":{"chartName":"mattermost","repoName":"registry1","tag":"v9.2.3-bb.2"},"ingress":{"gateway":""},"objectStorage":{"accessKey":"","accessSecret":"","bucket":"","endpoint":""},"postRenderers":[],"sourceType":"git","sso":{"client_id":"","client_secret":"","enabled":false},"values":{}},"mattermostOperator":{"enabled":false,"flux":{},"git":{"path":"./chart","repo":"https://repo1.dso.mil/big-bang/product/packages/mattermost-operator.git","tag":"1.20.1-bb.0"},"helmRepo":{"chartName":"mattermost-operator","repoName":"registry1","tag":"1.20.1-bb.0"},"postRenderers":[],"sourceType":"git","values":{}},"metricsServer":{"enabled":"auto","flux":{},"git":{"path":"./chart","repo":"https://repo1.dso.mil/big-bang/product/packages/metrics-server.git","tag":"3.11.0-bb.2"},"helmRepo":{"chartName":"metrics-server","repoName":"registry1","tag":"3.11.0-bb.2"},"postRenderers":[],"sourceType":"git","values":{}},"minio":{"accesskey":"","enabled":false,"flux":{},"git":{"path":"./chart","repo":"https://repo1.dso.mil/big-bang/product/packages/minio.git","tag":"5.0.11-bb.0"},"helmRepo":{"chartName":"minio-instance","repoName":"registry1","tag":"5.0.11-bb.0"},"ingress":{"gateway":""},"postRenderers":[],"secretkey":"","sourceType":"git","values":{}},"minioOperator":{"enabled":false,"flux":{},"git":{"path":"./chart","repo":"https://repo1.dso.mil/big-bang/product/packages/minio-operator.git","tag":"5.0.11-bb.1"},"helmRepo":{"chartName":"minio-operator","repoName":"registry1","tag":"5.0.11-bb.1"},"ingress":{"gateway":""},"postRenderers":[],"sourceType":"git","values":{}},"nexusRepositoryManager":{"enabled":false,"flux":{},"git":{"path":"./chart","repo":"https://repo1.dso.mil/big-bang/product/packages/nexus.git","tag":"62.0.0-bb.2"},"helmRepo":{"chartName":"nexus-repository-manager","repoName":"registry1","tag":"62.0.0-bb.2"},"ingress":{"gateway":""},"license_key":"","postRenderers":[],"sourceType":"git","sso":{"enabled":false,"idp_data":{"email":"","entityId":"","firstName":"","groups":"","lastName":"","username":""},"role":[{"description":"","id":"","name":"","privileges":[],"roles":[]}]},"values":{}},"sonarqube":{"database":{"database":"","host":"","password":"","port":5432,"username":""},"enabled":false,"flux":{},"git":{"path":"./chart","repo":"https://repo1.dso.mil/big-bang/product/packages/sonarqube.git","tag":"8.0.3-bb.0"},"helmRepo":{"chartName":"sonarqube","repoName":"registry1","tag":"8.0.3-bb.0"},"ingress":{"gateway":""},"postRenderers":[],"sourceType":"git","sso":{"client_id":"","email":"email","enabled":false,"group":"group","login":"login","name":"name"},"values":{}},"thanos":{"enabled":false,"flux":{},"git":{"path":"./chart","repo":"https://repo1.dso.mil/big-bang/product/packages/thanos.git","tag":"12.16.1-bb.0"},"helmRepo":{"chartName":"thanos","repoName":"registry1","tag":"12.16.1-bb.0"},"ingress":{"gateway":""},"objstoreConfig":"","postRenderers":[],"sourceType":"git","values":{}},"vault":{"enabled":false,"flux":{},"git":{"path":"./chart","repo":"https://repo1.dso.mil/big-bang/product/packages/vault.git","tag":"0.25.0-bb.8"},"helmRepo":{"chartName":"vault","repoName":"registry1","tag":"0.25.0-bb.8"},"ingress":{"cert":"","gateway":"","key":""},"postRenderers":[],"sourceType":"git","values":{}},"velero":{"enabled":false,"flux":{},"git":{"path":"./chart","repo":"https://repo1.dso.mil/big-bang/product/packages/velero.git","tag":"5.1.3-bb.2"},"helmRepo":{"chartName":"velero","repoName":"registry1","tag":"5.1.3-bb.2"},"plugins":[],"postRenderers":[],"sourceType":"git","values":{}}}` | -------------------------------------------------------------------------------------------------------------------- |
| addons.authservice.enabled | bool | `false` | Toggle deployment of Authservice. if enabling authservice, a filter needs to be provided by either enabling sso for monitoring or istio, or manually adding a filter chain in the values here: values: chain: minimal: callback_uri: "https://somecallback" |
| addons.minioOperator | object | `{"enabled":false,"flux":{},"git":{"path":"./chart","repo":"https://repo1.dso.mil/big-bang/product/packages/minio-operator.git","tag":"5.0.11-bb.1"},"helmRepo":{"chartName":"minio-operator","repoName":"registry1","tag":"5.0.11-bb.1"},"ingress":{"gateway":""},"postRenderers":[],"sourceType":"git","values":{}}` | -------------------------------------------------------------------------------------------------------------------- Minio Operator and Instance |
| addons.gitlab.railsSecret | string | `""` | Rails plain text secret to define. If empty (""), the gitlab charts will create the gitlab-rails-secret with randomized data. Read the following for more information on setting Gitlab rails secrets: https://docs.gitlab.com/charts/installation/secrets#gitlab-rails-secret |
| addons.haproxy | object | `{"flux":{},"git":{"path":"./chart","repo":"https://repo1.dso.mil/big-bang/product/packages/haproxy.git","tag":"1.19.3-bb.1"},"helmRepo":{"chartName":"haproxy","repoName":"registry1","tag":"1.19.3-bb.1"},"ingress":{"gateway":""},"postRenderers":[],"sourceType":"git","values":{}}` | -------------------------------------------------------------------------------------------------------------------- Deployment of HAProxy is automatically toggled depending on Monitoring SSO and Monitoring Istio Injection |
| addons.anchore.database.feeds_database | string | `""` | Feeds database name to connect to on host (Note: feeds database name CANNOT contain hyphens). Only required for enterprise edition of anchore. By default, feeds database will be configured with the same username and password as the main database. For formatting examples on how to use a separate username and password for the feeds database see https://repo1.dso.mil/big-bang/product/packages/CHART.md#handling-dependencies |
| addons.anchore.redis.host | string | `""` | Hostname of a pre-existing Redis to use for Anchore Enterprise. Entering connection info will enable external redis and will auto-create any required secrets. Anchore only requires redis for enterprise deployments and will not provision an instance if using external |
| addons.mattermostOperator | object | `{"enabled":false,"flux":{},"git":{"path":"./chart","repo":"https://repo1.dso.mil/big-bang/product/packages/mattermost-operator.git","tag":"1.20.1-bb.0"},"helmRepo":{"chartName":"mattermost-operator","repoName":"registry1","tag":"1.20.1-bb.0"},"postRenderers":[],"sourceType":"git","values":{}}` | -------------------------------------------------------------------------------------------------------------------- Mattermost Operator and Instance |
| addons.mattermost.objectStorage.endpoint | string | `""` | S3 compatible endpoint to use for connection information. Entering connection info will enable this option and will auto-create any required secrets. examples: "s3.amazonaws.com" "s3.us-gov-west-1.amazonaws.com" "minio.minio.svc.cluster.local:9000" |
| addons.mattermost.elasticsearch | object | `{"enabled":false}` | Mattermost Elasticsearch integration - requires enterprise E20 license - https://docs.mattermost.com/deployment/elasticsearch.html Connection info defaults to the BB deployed Elastic, all values can be overridden via the "values" passthrough for other connections. See values spec in MM chart "elasticsearch" yaml block - https://repo1.dso.mil/big-bang/product/packages/values.yaml |
| addons.keycloak | object | `{"database":{"database":"","host":"","password":"","port":5432,"type":"postgres","username":""},"enabled":false,"flux":{},"git":{"path":"./chart","repo":"https://repo1.dso.mil/big-bang/product/packages/keycloak.git","tag":"18.4.3-bb.11"},"helmRepo":{"chartName":"keycloak","repoName":"registry1","tag":"18.4.3-bb.11"},"ingress":{"cert":"","gateway":"passthrough","key":""},"postRenderers":[],"sourceType":"git","values":{}}` | -------------------------------------------------------------------------------------------------------------------- Keycloak |
| addons.vault | object | `{"enabled":false,"flux":{},"git":{"path":"./chart","repo":"https://repo1.dso.mil/big-bang/product/packages/vault.git","tag":"0.25.0-bb.8"},"helmRepo":{"chartName":"vault","repoName":"registry1","tag":"0.25.0-bb.8"},"ingress":{"cert":"","gateway":"","key":""},"postRenderers":[],"sourceType":"git","values":{}}` | -------------------------------------------------------------------------------------------------------------------- Vault |
| addons.metricsServer | object | `{"enabled":"auto","flux":{},"git":{"path":"./chart","repo":"https://repo1.dso.mil/big-bang/product/packages/metrics-server.git","tag":"3.11.0-bb.2"},"helmRepo":{"chartName":"metrics-server","repoName":"registry1","tag":"3.11.0-bb.2"},"postRenderers":[],"sourceType":"git","values":{}}` | -------------------------------------------------------------------------------------------------------------------- Metrics Server |
| addons.harbor | object | `{"enabled":false,"flux":{},"git":{"path":"./chart","repo":"https://repo1.dso.mil/platform-one/big-bang/apps/sandbox/harbor.git","tag":"1.13.1-bb.4"},"helmRepo":{"chartName":"harbor","repoName":"registry1","tag":"1.13.1-bb.4"},"ingress":{"gateway":""},"postRenderers":[],"sourceType":"git","sso":{"client_id":"","client_secret":"","enabled":false},"values":{}}` | -------------------------------------------------------------------------------------------------------------------- Harbor |
| addons.thanos | object | `{"enabled":false,"flux":{},"git":{"path":"./chart","repo":"https://repo1.dso.mil/big-bang/product/packages/thanos.git","tag":"12.16.1-bb.0"},"helmRepo":{"chartName":"thanos","repoName":"registry1","tag":"12.16.1-bb.0"},"ingress":{"gateway":""},"objstoreConfig":"","postRenderers":[],"sourceType":"git","values":{}}` | -------------------------------------------------------------------------------------------------------------------- thanos |
| packages | object | `{"sample":{"configMaps":{},"dependsOn":[],"enabled":false,"flux":{},"git":{"branch":null,"commit":null,"credentials":{"caFile":"","knownHosts":"","password":"","privateKey":"","publicKey":"","username":""},"existingSecret":"","path":null,"repo":null,"semver":null,"tag":null},"helmRepo":{"chartName":null,"repoName":null,"tag":null},"istio":{},"kustomize":false,"monitor":{},"network":{},"postRenderers":[],"secrets":{},"sourceType":"git","values":{},"wrapper":{"enabled":false}}}` | Packages to deploy with Big Bang @default - '{}' |
| packages.sample.git | object | `{"branch":null,"commit":null,"credentials":{"caFile":"","knownHosts":"","password":"","privateKey":"","publicKey":"","username":""},"existingSecret":"","path":null,"repo":null,"semver":null,"tag":null}` | Git source is supported for both Helm and Kustomize deployments. If both `git` and `helmRepo` are provided `git` will take precedence. |
- Core: [Core packages](./docs/understanding-bigbang/package-architecture/README.md##Core) are a group of capabilities required by the DoD DevSecOps Reference Architecture, that are supported directly by the Big Bang development team. The specific capabilities that are considered core currently are Service Mesh, Policy Enforcement, Logging, Monitoring, and Runtime Security.
- Community: [Community packages](https://repo1.dso.mil/big-bang/product/community) are any packages that are maintained by the broader Big Bang community (users, vendors, etc). These packages could be alternatives to core or addon packages, or even entirely new packages to help extend usage/functionality of Big Bang.
Big Bang is intended to be used for deploying and maintaining a DoD hardened and approved set of packages into a Kubernetes cluster. Deployment and configuration of ingress/egress, load balancing, policy auditing, logging, monitoring, etc. are handled via Big Bang. Additional packages (e.g. ArgoCD, GitLab) can also be enabled and customized to extend Big Bang's baseline. Once deployed, the Kubernetes cluster can be used to add mission specific applications.
A patch version increment is performed when there is a change in the tag (version number) of a Big Bang core package or a bug fix for a Big Bang template or values files. A change in the patch version number should be backwards compatible with previous patch changes within a minor version. If there is a significant functionality change in the a core package that requires adjustments to Big Bang templates, this would require a change in the minor or major version depending on the impact to the values and secrets used to integrated the package with Big Bang.
A major version increment indicates a release that has significant changes, which could potentially break compatibility with previous versions. A major change is required when there are changes to the architecture of Big Bang or critical values file keys. For example removing a core package or changing significant values that propagate to all core and add-on packages are considered major version changes. As examples of major version changes: