Helm chart reference
This is a reference of all the configurable values in Weave GitOps's Helm chart. This is intended for customizing your installation after you've gone through the getting started guide.
This reference was generated for the chart version 4.0.26 which installs weave gitops v0.28.0.
Values
Key | Type | Default | Description |
---|---|---|---|
adminUser.create | bool | false | Whether the local admin user should be created. If you use this make sure you add it to rbac.impersonationResourceNames . |
adminUser.createClusterRole | bool | true | Specifies whether the clusterRole & binding to the admin user should be created. Will be created only if adminUser.create is enabled. Without this, the adminUser will only be able to see resources in the target namespace. |
adminUser.createSecret | bool | true | Whether we should create the secret for the local adminUser. Will be created only if adminUser.create is enabled. Without this, we'll still set up the roles and permissions, but the secret with username and password has to be provided separately. |
adminUser.passwordHash | string | nil | Set the password for local admin user. Requires adminUser.create and adminUser.createSecret This needs to have been hashed using bcrypt. You can do this via our CLI with gitops get bcrypt-hash . |
adminUser.username | string | "gitops-test-user" | Set username for local admin user, this should match the value in the secret cluster-user-auth which can be created with adminUser.createSecret . Requires adminUser.create . |
affinity | object | {} | |
annotations | object | {} | Annotations to add to the deployment |
envVars[0].name | string | "WEAVE_GITOPS_FEATURE_TENANCY" | |
envVars[0].value | string | "true" | |
envVars[1].name | string | "WEAVE_GITOPS_FEATURE_CLUSTER" | |
envVars[1].value | string | "false" | |
extraVolumeMounts | list | [] | |
extraVolumes | list | [] | |
fullnameOverride | string | "" | |
image.pullPolicy | string | "IfNotPresent" | |
image.repository | string | "ghcr.io/weaveworks/wego-app" | |
image.tag | string | "v0.28.0" | |
imagePullSecrets | list | [] | |
ingress.annotations | object | {} | |
ingress.className | string | "" | |
ingress.enabled | bool | false | |
ingress.hosts | string | nil | |
ingress.tls | list | [] | |
logLevel | string | "info" | What log level to output. Valid levels are 'debug', 'info', 'warn' and 'error' |
metrics.enabled | bool | false | Start the metrics exporter |
metrics.service.annotations | object | {"prometheus.io/path":"/metrics","prometheus.io/port":"{{ .Values.metrics.service.port }}","prometheus.io/scrape":"true"} | Annotations to set on the service |
metrics.service.port | int | 2112 | Port to start the metrics exporter on |
nameOverride | string | "" | |
networkPolicy.create | bool | true | Specifies whether default network policies should be created. |
nodeSelector | object | {} | |
oidcSecret.create | bool | false | |
podAnnotations | object | {} | |
podLabels | object | {} | |
podSecurityContext | object | {} | |
rbac.additionalRules | list | [] | If non-empty, these additional rules will be appended to the RBAC role and the cluster role. for example, additionalRules: - apiGroups: ["infra.contrib.fluxcd.io"] resources: ["terraforms"] verbs: [ "get", "list", "patch" ] |
rbac.create | bool | true | Specifies whether the clusterRole & binding to the service account should be created |
rbac.impersonationResourceNames | list | [] | If non-empty, this limits the resources that the service account can impersonate. This applies to both users and groups, e.g. ['user1@corporation.com', 'user2@corporation.com', 'operations'] |
rbac.impersonationResources | list | ["users","groups"] | Limit the type of principal that can be impersonated |
rbac.viewSecretsResourceNames | list | ["cluster-user-auth","oidc-auth"] | If non-empty, this limits the secrets that can be accessed by the service account to the specified ones, e.g. ['weave-gitops-enterprise-credentials'] |
replicaCount | int | 1 | |
resources | object | {} | |
securityContext.allowPrivilegeEscalation | bool | false | |
securityContext.capabilities.drop[0] | string | "ALL" | |
securityContext.readOnlyRootFilesystem | bool | true | |
securityContext.runAsNonRoot | bool | true | |
securityContext.runAsUser | int | 1000 | |
securityContext.seccompProfile.type | string | "RuntimeDefault" | |
serverTLS.enable | bool | false | Enable TLS termination in gitops itself. If you enable this, you need to create a secret, and specify the secretName. Another option is to create an ingress. |
serverTLS.secretName | string | "my-secret-tls" | Specify the tls secret name. This type of secrets have a key called tls.crt and tls.key containing their corresponding values in base64 format. See https://kubernetes.io/docs/concepts/configuration/secret/#tls-secrets for more details and examples |
service.annotations | object | {} | |
service.create | bool | true | |
service.port | int | 9001 | |
service.type | string | "ClusterIP" | |
serviceAccount.annotations | object | {} | Annotations to add to the service account |
serviceAccount.create | bool | true | Specifies whether a service account should be created |
serviceAccount.name | string | "" | The name of the service account to use. If not set and create is true, a name is generated using the fullname template |
tolerations | list | [] |