-
Notifications
You must be signed in to change notification settings - Fork 191
/
values.yaml
85 lines (74 loc) · 2.14 KB
/
values.yaml
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
# Specifies the secret data for imagePullSecrets needed to fetch the private docker images
imageCredentials:
create: false
# When create is false please specify
name: aqua-registry-secret
# for dockerhub - "docker.io"
repositoryUriPrefix: "registry.aquasec.com"
##REQUIRED only if create is true, for dockerhub - "index.docker.io/v1/"
registry: "registry.aquasec.com"
username: ""
password: ""
serviceaccount:
# make it to true to create service-account
create: false
name:
annotations: {}
replicaCount: 1
image:
# for CC premium change repository to "cc-premium"
repository: "cc-standard"
tag: "latest"
pullPolicy: Always
service:
# change to respective service type
type: ClusterIP
annotations: {}
ports:
- name: https
port: 443
targetPort: 5000
nodePort:
protocol: TCP
resources: {}
# Note: For recommendations please check the official sizing guide.
# requests:
# cpu: 500m
# memory: 0.5Gi
# limits:
# cpu: 2000m
# memory: 2Gi
securityContext:
runAsUser: 11431
runAsGroup: 11433
fsGroup: 11433
tolerations: []
container_securityContext: {}
deploymentAnnotations: {}
# my-annotation-key: my value; more value
podAnnotations: {}
# my-annotation-key: my value; more value
nodeSelector: {}
affinity: {}
TLS:
# enable to true for secure communication
enabled: false
# provide certificates secret name created to enable tls/mtls communication between enforcer and gateway/envoy
secretName: "aqua-cc-certs"
# provide filename of the public key eg: aqua_web.crt
publicKey_fileName: ""
# provide filename of the private key eg: aqua_web.key
privateKey_fileName: ""
# provide filename of the rootCA, if using self-signed certificates eg: rootCA.crt
rootCA_fileName: ""
# extraEnvironmentVars is a list of extra environment variables to set in the Offline CyberCenter deployment.
extraEnvironmentVars: {}
# http_proxy: < >
# https_proxy: < >
# no_proxy: < >
# ENV_NAME: value
# These variables take value from existing Secret objects.
extraSecretEnvironmentVars: []
# - envName: ENV_NAME
# secretName: name
# secretKey: key