hostname: bigbang.dev flux: interval: 1m rollback: cleanupOnFail: false networkPolicies: controlPlaneCidr: 172.16.0.0/12 logging: enabled: true values: elasticsearch: master: count: 1 persistence: size: 5Gi resources: requests: cpu: .5 limits: {} data: count: 2 persistence: size: 5Gi resources: requests: cpu: .5 limits: {} heap: min: 1g max: 1g min: 2Gi max: 2Gi kibana: count: 1 fluentbit: values: securityContext: privileged: true istio: enabled: true values: kiali: dashboard: auth: strategy: "anonymous" clusterAuditor: enabled: true values: resources: requests: cpu: 100m memory: .5Gi limits: {} monitoring: enabled: true values: prometheus: prometheusSpec: resources: requests: cpu: 100m memory: 200Mi limits: {} kube-state-metrics: resources: requests: cpu: 10m memory: 32Mi limits: {} prometheus-node-exporter: resources: requests: cpu: 100m memory: 30Mi limits: {} gatekeeper: enabled: true values: replicas: 1 resources: requests: cpu: 100m memory: 256Mi limits: {} violations: allowedDockerRegistries: match: excludedNamespaces: # Allows load balancer images for k3d from public repo - istio-system hostNetworking: match: excludedNamespaces: # Allows load balancer containers to map ports for k3d - istio-system twistlock: enabled: true values: console: persistence: size: 5Gi # Explicitly enable all addons for CI addons: argocd: enabled: false values: controller: resources: requests: cpu: 500m memory: 2Gi limits: {} dex: resources: requests: cpu: 10m memory: 128Mi limits: {} redis: resources: requests: cpu: 50m memory: 64Mi limits: {} server: resources: requests: cpu: 20m memory: 128Mi limits: {} repoServer: resources: requests: cpu: 50m memory: 128Mi limits: {} authservice: enabled: false chains: minimal: callback_uri: "https://minimal.bigbang.dev" values: resources: requests: cpu: 100m memory: 100Mi limits: {} gitlab: enabled: false sso: enabled: false values: global: rails: bootstrap: enabled: false gitlab-runner: resources: requests: cpu: 10m limits: {} gitlab: webservice: minReplicas: 1 maxReplicas: 1 sidekiq: minReplicas: 1 maxReplicas: 1 gitlab-shell: minReplicas: 1 maxReplicas: 1 gitaly: resources: requests: cpu: 50m limits: {} shared-secrets: resources: requests: cpu: 10m limits: {} migrations: resources: requests: cpu: 10m limits: {} task-runner: resources: requests: cpu: 10m limits: {} registry: hpa: minReplicas: 1 maxReplicas: 1 postgresql: metrics: resources: requests: cpu: 10m limits: {} minio: resources: requests: cpu: 50m limits: {} gitlabRunner: enabled: false values: resources: requests: memory: 64Mi cpu: 50m limits: {} anchore: enabled: false values: ensureDbJobs: resources: requests: cpu: 100m memory: 200Mi limits: {} sso: resources: requests: cpu: 100m memory: 200Mi limits: {} postgresql: resources: requests: cpu: 100m memory: 200Mi limits: {} metrics: resources: requests: cpu: 100m memory: 200Mi limits: {} anchoreAnalyzer: resources: requests: cpu: 100m memory: 200Mi limits: {} anchoreApi: resources: requests: cpu: 100m memory: 200Mi limits: {} anchoreCatalog: resources: requests: cpu: 100m memory: 200Mi limits: {} anchorePolicyEngine: resources: requests: cpu: 100m memory: 200Mi limits: {} anchoreSimpleQueue: resources: requests: cpu: 100m memory: 200Mi limits: {} anchoreEngineUpgradeJob: resources: requests: cpu: 100m memory: 200Mi limits: {} anchore-feeds-db: resources: requests: cpu: 100m memory: 200Mi limits: {} metrics: resources: requests: cpu: 100m memory: 200Mi limits: {} anchoreEnterpriseFeeds: resources: requests: cpu: 100m memory: 200Mi limits: {} anchoreEnterpriseFeedsUpgradeJob: resources: requests: cpu: 100m memory: 200Mi limits: {} anchoreEnterpriseRbac: authResources: resources: requests: cpu: 100m memory: 200Mi limits: {} managerResources: resources: requests: cpu: 100m memory: 200Mi limits: {} anchoreEnterpriseReports: resources: requests: cpu: 100m memory: 200Mi limits: {} anchoreEnterpriseNotifications: resources: requests: cpu: 100m memory: 200Mi limits: {} anchoreEntperpiseUi: resources: requests: cpu: 100m memory: 200Mi limits: {} anchoreEnterpriseEngineUpgradeJob: resources: requests: cpu: 100m memory: 200Mi limits: {} sonarqube: enabled: false values: plugins: install: [] resources: requests: cpu: 100m memory: 200Mi limits: {} persistence: enabled: false size: 5Gi postgresql: resources: requests: cpu: 100m memory: 200Mi limits: {} tests: enabled: false minioOperator: enabled: false minio: enabled: false values: upgradeTenants: enabled: true zones: servers: 1 volumesPerServer: 1 mattermostoperator: enabled: false mattermost: enabled: false elasticsearch: enabled: true values: replicaCount: 1 resources: requests: cpu: 100m memory: 128Mi limits: {} minio: upgradeTenants: enabled: true zones: servers: 1 volumesPerServer: 1 nexus: enabled: false values: persistence: # Do NOT set this below 4Gi, nexus will fail to boot storageSize: 10Gi nexus: # https://help.sonatype.com/repomanager3/installation/system-requirements#SystemRequirements-JVMDirectMemory env: - name: install4jAddVmParams value: "-Xms500M -Xmx500M -XX:MaxDirectMemorySize=500M -XX:+UnlockExperimentalVMOptions -XX:+UseCGroupMemoryLimitForHeap" resources: requests: cpu: 100m memory: 1500Mi velero: enabled: false plugins: - aws values: # Set provider name and backup storage location bucket name configuration: provider: aws # TODO: Bucket for this backupStorageLocation: bucket: bigbang-dogfood-velero prefix: ci # config: # region: us-west-1 # profile: test # volumeSnapshotLocation: # provider: aws # config: # bucket: velero # region: us-west-1 # schedules: # mybackup: # labels: # myenv: foo # schedule: "0 0 * * *" # template: # ttl: "240h" # includedNamespaces: # - foo # Set a service account so that the CRD clean up job has proper permissions to delete CRDs serviceAccount: server: name: velero keycloak: enabled: false ingress: gateway: "public" values: replicas: 1 resources: requests: cpu: 10m memory: 16Mi limits: {}