Skip to main content
Version: DAI 7.3

Values

KeyTypeDescriptionDefault
asset-manager object
{"gitStorageLimit":"100Mi"}
asset-manager.gitStorageLimit string
"100Mi"
global.devLicense string The developer license provided by customer support for using Eggplant DAI.
nil
global.enableUsageReporting int
0
global.execLicense string The execution license provided by customer support for using Eggplant DAI.
nil
global.git.enabled string
"true"
global.ingress.className string
"nginx"
global.ingress.customCACert string
nil
global.ingress.enabled bool
true
global.ingress.host string
"dai.example.com"
global.ingress.tls list If you are enabling TLS by adding certificates to the ingress controller, then add a TLS block here. See Configuring TLS.
nil
global.keycloak.host string
"kc-dai.example.com"
global.keycloak.password string
"admin"
global.keycloak.tls.secretName string The name of an existing Kubernetes secret containing TLS certificates to be used on the Keycloak ingress rule.
nil
global.keycloak.user string
"admin"
global.objectStorage.assetBucketName string
"assets"
global.objectStorage.aws object
{"awsAccessKeyId":"eggplant","awsAccessKeyIdKey":"","awsSecretAccessKey":"eggplant","awsSecretAccessKeyKey":"","existingSecret":"","region":"eu-west-1"}
global.objectStorage.aws.existingSecret string
""
global.objectStorage.minio object
{"endpoint":"","existingSecret":"","rootPassword":"eggplant","rootPasswordKey":"","rootUser":"eggplant","rootUserKey":""}
global.objectStorage.minio.endpoint string
""
global.objectStorage.provider string
"minio"
global.objectStorage.screenshotBucketName string
"screenshots"
global.postgresql.auth.postgresPassword string
"postgres"
global.postgresql.host string
"postgres"
global.postgresql.ttdbName string
"ttdb"
global.postgresql.username string
"postgres"
global.rabbitmq.erlangCookie string The RabbitMQ Erlang cookie. It will either be set from the value of rabbitmq-erlang-cookie in the secret dai-rabbitmq or it will be set to a random string.
nil
global.rabbitmq.existingSecret string
""
global.rabbitmq.extraConfiguration string
"web_stomp.tcp.port = 15674\nweb_stomp.ws_frame = binary\nweb_stomp.ws_path = /mq/fedrive\n\nloopback_users.backend = false\n\nauth_backends.1 = internal\nauth_backends.2 = cache\nauth_cache.cached_backend = http\nauth_cache.cache_ttl = 5000\n\nauth_http.http_method = post\nauth_http.user_path = http://rabbitmq-auth:4649/rabbitmq_auth_service/api/v1/user\nauth_http.vhost_path = http://rabbitmq-auth:4649/rabbitmq_auth_service/api/v1/vhost\nauth_http.resource_path = http://rabbitmq-auth:4649/rabbitmq_auth_service/api/v1/resource\nauth_http.topic_path = http://rabbitmq-auth:4649/rabbitmq_auth_service/api/v1/topic"
global.rabbitmq.host string
"rabbitmq"
global.rabbitmq.password string Password for DAI to authenticate with RabbitMQ. If this is not set, it will either be set to the value of rabbitmq-password in the secret dai-rabbitmq or it will be set to a random string.
nil
global.rabbitmq.port int
5672
global.rabbitmq.username string
"rabbitmq"
global.restartEpfAfterSeconds int
1800
keycloak object
{"auth":{"adminPassword":"admin","adminUser":"admin"},"enabled":true,"externalDatabase":{"database":"keycloak","existingSecret":"","host":"postgres","password":"fake","user":"postgres"},"fullnameOverride":"keycloak","httpRelativePath":"/auth/","ingress":{"enabled":false},"initContainers":[{"command":["sh","-c","until timeout 2 printf \"\" 2>>/dev/null >>/dev/tcp/${KEYCLOAK_DATABASE_HOST}/${KEYCLOAK_DATABASE_PORT}; do echo \"waiting for PostgreSQL\"; sleep 5; done"],"envFrom":[{"configMapRef":{"name":"keycloak-env-vars"}}],"image":"quay.io/eggplantsoftware/keycloak-server:6.2.34","imagePullPolicy":"IfNotPresent","name":"wait-for-postgresql"}],"postgresql":{"enabled":false}}
keycloak-realm-provisioner.smtp.auth string
""
keycloak-realm-provisioner.smtp.enabled string
"no"
keycloak-realm-provisioner.smtp.existingSecret string
""
keycloak-realm-provisioner.smtp.from string
""
keycloak-realm-provisioner.smtp.host string
""
keycloak-realm-provisioner.smtp.password string
""
keycloak-realm-provisioner.smtp.port string
""
keycloak-realm-provisioner.smtp.ssl string
""
keycloak-realm-provisioner.smtp.tls string
""
keycloak-realm-provisioner.smtp.user string
""
keycloak-user-provisioner.adminUsers object
{"daiAdmin":{"email":null,"firstName":null,"lastName":null,"password":null,"username":null}}
keycloak-user-provisioner.adminUsers.daiAdmin.password string must be >= 12 characters long.
nil
keycloak.auth object
{"adminPassword":"admin","adminUser":"admin"}
keycloak.enabled bool
true
keycloak.externalDatabase object
{"database":"keycloak","existingSecret":"","host":"postgres","password":"fake","user":"postgres"}
keycloak.fullnameOverride string
"keycloak"
keycloak.httpRelativePath string
"/auth/"
keycloak.ingress.enabled bool
false
keycloak.initContainers list
[{"command":["sh","-c","until timeout 2 printf \"\" 2>>/dev/null >>/dev/tcp/${KEYCLOAK_DATABASE_HOST}/${KEYCLOAK_DATABASE_PORT}; do echo \"waiting for PostgreSQL\"; sleep 5; done"],"envFrom":[{"configMapRef":{"name":"keycloak-env-vars"}}],"image":"quay.io/eggplantsoftware/keycloak-server:6.2.34","imagePullPolicy":"IfNotPresent","name":"wait-for-postgresql"}]
keycloak.postgresql object
{"enabled":false}
minio object
{"auth":{"existingSecret":"dai-objectstorage"},"enabled":true,"extraEnvVars":[{"name":"MINIO_SKIP_CLIENT","value":"yes"}],"fullnameOverride":"minio","persistence":{"enabled":true}}
minio.auth.existingSecret string
"dai-objectstorage"
minio.enabled bool
true
minio.fullnameOverride string
"minio"
minio.persistence.enabled bool
true
postgresql object
{"enabled":true,"fullnameOverride":"postgres","image":{"tag":"14.11.0-debian-12-r12"},"primary":{"extraEnvVars":[{"name":"POSTGRESQL_DATABASE","value":"keycloak"}],"persistence":{"enabled":true}}}
postgresql.enabled bool
true
postgresql.fullnameOverride string
"postgres"
postgresql.primary.extraEnvVars[0] object
{"name":"POSTGRESQL_DATABASE","value":"keycloak"}
postgresql.primary.persistence.enabled bool
true
rabbitmq object
{"auth":{"existingErlangSecret":"dai-rabbitmq","existingPasswordSecret":"dai-rabbitmq","username":"rabbitmq"},"enabled":true,"fullnameOverride":"rabbitmq","persistence":{"enabled":true},"resources":{"limits":{"memory":"400Mi"},"requests":{"cpu":"400m","memory":"400Mi"}}}
rabbitmq.auth.existingErlangSecret string
"dai-rabbitmq"
rabbitmq.auth.existingPasswordSecret string
"dai-rabbitmq"
rabbitmq.auth.username string
"rabbitmq"
rabbitmq.fullnameOverride string
"rabbitmq"