A Helm chart to run HA Netmaker on Kubernetes
[b]Chart source[/b]: github.com/small-hack/netmaker-helm
Name | Url | |
---|---|---|
jessebot | https://github.com/jessebot/ | |
cloudymax | https://github.com/cloudymax/ |
Repository | Name | Version |
---|---|---|
oci://registry-1.docker.io/bitnamicharts | postgresql | 15.1.2 |
Key | Type | Default | Description | |||
---|---|---|---|---|---|---|
affinity | object | {} |
optional affinity settings for netmaker | |||
api.ingress.annotations | object | {} |
annotations for the netmaker API ingress object | |||
api.ingress.className | string | "nginx" |
api ingress className | |||
api.ingress.enabled | bool | true |
attempts to configure ingress if true | |||
api.ingress.host | string | "api.cluster.local" |
api (REST) route subdomain | |||
api.ingress.tls | list | [] |
ingress api tls list | |||
api.service.port | int | 8081 |
port for API service | |||
api.service.targetPort | int | 8081 |
targetport for API service | |||
api.service.type | string | "ClusterIP" |
type for netmaker server services | |||
dns.enabled | bool | false |
whether or not to deploy coredns | |||
dns.persistence.accessMode | string | "ReadWriteOnce" |
||||
dns.persistence.existingClaim | string | "" |
existingClaim, if not set, defaults to HELM.RELEASE.NAME-dns | |||
dns.persistence.storage | string | "1Gi" |
||||
dns.persistence.storageClassName | string | "" |
||||
externalDatabase.database | string | "netmaker" |
postgress db | |||
externalDatabase.existingSecret | string | "" |
use existing secret for netmaker db credentials, must have the following keys: SQL_PASS, SQL_HOST, SQL_PORT, SQL_USER, SQL_DB | |||
externalDatabase.host | string | "external.postgres.url" |
postgres host | |||
externalDatabase.password | string | "" |
postgres pass for netmaker user. ignored if existingSecret is set | |||
externalDatabase.port | int | 5432 |
postgres hosts port | |||
externalDatabase.type | string | "postgresql" |
||||
externalDatabase.username | string | "netmaker" |
postgres username | |||
fullnameOverride | string | "" |
override the full name for netmaker objects | |||
image.pullPolicy | string | "IfNotPresent" |
Pull Policy for images | |||
image.repository | string | "gravitl/netmaker" |
The image repo to pull Netmaker image from | |||
mq.affinity | object | {} |
optional affinity settings for mqtt | |||
mq.existingSecret | string | "" |
name of an existing secret to use for mq password. If set, ignores mq.password, mq.username secret keys must be: MQ_PASSWORD, MQ_USERNAME | |||
mq.generateCert | bool | false |
||||
mq.ingress.annotations | object | {} |
annotations for the mqtt ingress object | |||
mq.ingress.className | string | "nginx" |
||||
mq.ingress.enabled | bool | true |
attempts to configure ingress if true | |||
mq.ingress.host | string | "broker.cluster.local" |
hostname for mqtt ingress | |||
mq.ingress.tls | list | [] |
ingress tls list | |||
mq.password | string | "" |
||||
mq.replicas | int | 1 |
how many MQTT replicas to create | |||
mq.service.port | int | 443 |
port for MQTT service | |||
mq.service.targetPort | int | 8883 |
Target port for MQTT service | |||
mq.service.type | string | "ClusterIP" |
type for netmaker server services | |||
mq.tolerations | object | {} |
optional tolerations settings for mqtt | |||
mq.username | string | "netmaker" |
||||
nameOverride | string | "" |
override the name for netmaker objects | |||
netmaker.enterprise | object | {"licenseKey":"","tenantId":""} |
if using enterprise edition fill out this section | |||
netmaker.enterprise.licenseKey | string | "" |
netmaker enterprise license key, ignored if netmaker.existingSecret set | |||
netmaker.enterprise.tenantId | string | "" |
netmaker enterprise tenant ID, ignored if netmaker.existingSecret set | |||
netmaker.existingSecret | string | "" |
if set ignores netmaker.masterKey and enterprise.* must have key called MASTER_KEY, optionally for enterprise must have key: LICENSE_KEY, NETMAKER_TENANT_ID | |||
netmaker.jwtDuration | int | 43200 |
Duration of JWT token validity in seconds | |||
netmaker.masterKey | string | "netmaker" |
ignored if netmaker.masterKeyExistingSecret is set | |||
netmaker.oauth.azureTenant | string | "" |
azureTenant if using azure for oauth - ignored if netmaker.oauth.existingSecret is set | |||
netmaker.oauth.clientID | string | "" |
client id if using oidc - ignored if netmaker.oauth.existingSecret is set | |||
netmaker.oauth.clientSecret | string | "" |
client secret if using oidc - ignored if netmaker.oauth.existingSecret is set | |||
netmaker.oauth.enabled | bool | false |
||||
netmaker.oauth.existingSecret | string | "" |
existing secret for oauth, must have the following keys: CLIENT_ID, CLIENT_SECRET, OIDC_ISSUER, and optionally AZURE_TENANT ignores plane text values if this is set | |||
netmaker.oauth.issuer | string | "" |
oidc issuer - ignored if netmaker.oauth.existingSecret is set | |||
netmaker.oauth.provider | string | "oidc" |
AUTH_PROVIDER: must be one of: azure-ad | github | oidc | |
netmaker.racAutoDisable | string | "true" |
Auto disable a user’s connecteds clients bassed on JWT token expiration | |||
netmaker.serverName | string | "cluster.local" |
||||
podAnnotations | object | {} |
pod annotations to add | |||
podSecurityContext | object | {} |
pod security contect to add | |||
postgresql.auth.database | string | "netmaker" |
||||
postgresql.auth.existingSecret | string | "" |
use existing secret for netmaker db credentials, must have the following keys: SQL_PASS, SQL_HOST, SQL_PORT, SQL_USER, SQL_DB | |||
postgresql.auth.password | string | "" |
||||
postgresql.auth.primary.persistence.enabled | bool | true |
||||
postgresql.auth.username | string | "netmaker" |
||||
postgresql.enabled | bool | true |
||||
replicas | int | 1 |
number of netmaker server replicas to create | |||
serviceAccount.annotations | object | {} |
Annotations to add to the service account | |||
serviceAccount.create | bool | true |
Specifies whether a service account should be created | |||
serviceAccount.name | string | "" |
Name of SA to use. If not set and create is true, a name is generated using the fullname template | |||
setIpForwarding.enabled | bool | true |
||||
shared_data.persistence.accessMode | string | "ReadWriteMany" |
||||
shared_data.persistence.existingClaim | string | "" |
name of existing PVC claim to use. if set, storageClassName is ignored | |||
shared_data.persistence.storage | string | "128Mi" |
||||
shared_data.persistence.storageClassName | string | "" |
||||
tolerations | object | {} |
optional tolerations settings for netmaker | |||
turn.apiHost | string | "" |
||||
turn.enabled | bool | false |
use an external turn server | |||
turn.existingSecret | string | "" |
existing secret with turn server info. Must have the following keys: TURN_SERVER_HOST, TURN_SERVER_API_HOST, TURN_PORT, TURN_USERNAME, TURN_PASSWORD | |||
turn.host | string | "" |
||||
turn.password | string | "" |
||||
turn.username | string | "" |
||||
ui.ingress.annotations | object | {} |
annotations for the netmaker UI ingress object | |||
ui.ingress.className | string | "nginx" |
UI ingress className | |||
ui.ingress.enabled | bool | true |
attempts to configure ingress if true | |||
ui.ingress.host | string | "dashboard.cluster.local" |
hostname for mqtt ingress | |||
ui.ingress.tls | list | [] |
ingress tls list | |||
ui.replicas | int | 1 |
how many UI replicas to create | |||
ui.service.port | int | 80 |
port for UI service | |||
ui.service.targetport | int | 80 |
target port for UI service | |||
ui.service.type | string | "ClusterIP" |
type for netmaker server services |
Autogenerated from chart metadata using helm-docs v1.13.1