asset-manager | object | | {"gitStorageLimit":"100Mi"}
|
asset-manager.gitStorageLimit | string | | "100Mi"
|
global.devLicense | string | The developer license provided by customer support for using Eggplant DAI. | nil
|
global.enableUsageReporting | int | | 0
|
global.execLicense | string | The execution license provided by customer support for using Eggplant DAI. | nil
|
global.git.enabled | string | | "true"
|
global.ingress.className | string | | "nginx"
|
global.ingress.customCACert | string | | nil
|
global.ingress.enabled | bool | | true
|
global.ingress.host | string | | "dai.example.com"
|
global.ingress.tls | list | If you are enabling TLS by adding certificates to the ingress controller, then add a TLS block here. See Configuring TLS. | nil
|
global.keycloak.host | string | | "kc-dai.example.com"
|
global.keycloak.password | string | | "admin"
|
global.keycloak.tls.secretName | string | The name of an existing Kubernetes secret containing TLS certificates to be used on the Keycloak ingress rule. | nil
|
global.keycloak.user | string | | "admin"
|
global.objectStorage.assetBucketName | string | | "assets"
|
global.objectStorage.aws | object | | {"awsAccessKeyId":"eggplant","awsAccessKeyIdKey":"","awsSecretAccessKey":"eggplant","awsSecretAccessKeyKey":"","existingSecret":"","region":"eu-west-1"}
|
global.objectStorage.aws.existingSecret | string | | ""
|
global.objectStorage.minio | object | | {"endpoint":"","existingSecret":"","rootPassword":"eggplant","rootPasswordKey":"","rootUser":"eggplant","rootUserKey":""}
|
global.objectStorage.minio.endpoint | string | | ""
|
global.objectStorage.provider | string | | "minio"
|
global.objectStorage.screenshotBucketName | string | | "screenshots"
|
global.postgresql.auth.postgresPassword | string | | "postgres"
|
global.postgresql.host | string | | "postgres"
|
global.postgresql.ttdbName | string | | "ttdb"
|
global.postgresql.username | string | | "postgres"
|
global.rabbitmq.erlangCookie | string | The RabbitMQ Erlang cookie. It will either be set from the value of rabbitmq-erlang-cookie in the secret dai-rabbitmq or it will be set to a random string. | nil
|
global.rabbitmq.existingSecret | string | | ""
|
global.rabbitmq.extraConfiguration | string | | "web_stomp.tcp.port = 15674\nweb_stomp.ws_frame = binary\nweb_stomp.ws_path = /mq/fedrive\n\nloopback_users.backend = false\n\nauth_backends.1 = internal\nauth_backends.2 = cache\nauth_cache.cached_backend = http\nauth_cache.cache_ttl = 5000\n\nauth_http.http_method = post\nauth_http.user_path = http://rabbitmq-auth:4649/rabbitmq_auth_service/api/v1/user\nauth_http.vhost_path = http://rabbitmq-auth:4649/rabbitmq_auth_service/api/v1/vhost\nauth_http.resource_path = http://rabbitmq-auth:4649/rabbitmq_auth_service/api/v1/resource\nauth_http.topic_path = http://rabbitmq-auth:4649/rabbitmq_auth_service/api/v1/topic"
|
global.rabbitmq.host | string | | "rabbitmq"
|
global.rabbitmq.password | string | Password for DAI to authenticate with RabbitMQ. If this is not set, it will either be set to the value of rabbitmq-password in the secret dai-rabbitmq or it will be set to a random string. | nil
|
global.rabbitmq.port | int | | 5672
|
global.rabbitmq.username | string | | "rabbitmq"
|
global.restartEpfAfterSeconds | int | | 1800
|
keycloak | object | | {"auth":{"adminPassword":"admin","adminUser":"admin"},"enabled":true,"externalDatabase":{"database":"keycloak","existingSecret":"","host":"postgres","password":"fake","user":"postgres"},"fullnameOverride":"keycloak","httpRelativePath":"/auth/","ingress":{"enabled":false},"initContainers":[{"command":["sh","-c","until timeout 2 printf \"\" 2>>/dev/null >>/dev/tcp/${KEYCLOAK_DATABASE_HOST}/${KEYCLOAK_DATABASE_PORT}; do echo \"waiting for PostgreSQL\"; sleep 5; done"],"envFrom":[{"configMapRef":{"name":"keycloak-env-vars"}}],"image":"quay.io/eggplantsoftware/keycloak-server:6.2.34","imagePullPolicy":"IfNotPresent","name":"wait-for-postgresql"}],"postgresql":{"enabled":false}}
|
keycloak-realm-provisioner.smtp.auth | string | | ""
|
keycloak-realm-provisioner.smtp.enabled | string | | "no"
|
keycloak-realm-provisioner.smtp.existingSecret | string | | ""
|
keycloak-realm-provisioner.smtp.from | string | | ""
|
keycloak-realm-provisioner.smtp.host | string | | ""
|
keycloak-realm-provisioner.smtp.password | string | | ""
|
keycloak-realm-provisioner.smtp.port | string | | ""
|
keycloak-realm-provisioner.smtp.ssl | string | | ""
|
keycloak-realm-provisioner.smtp.tls | string | | ""
|
keycloak-realm-provisioner.smtp.user | string | | ""
|
keycloak-user-provisioner.adminUsers | object | | {"daiAdmin":{"email":null,"firstName":null,"lastName":null,"password":null,"username":null}}
|
keycloak-user-provisioner.adminUsers.daiAdmin.password | string | must be >= 12 characters long. | nil
|
keycloak.auth | object | | {"adminPassword":"admin","adminUser":"admin"}
|
keycloak.enabled | bool | | true
|
keycloak.externalDatabase | object | | {"database":"keycloak","existingSecret":"","host":"postgres","password":"fake","user":"postgres"}
|
keycloak.fullnameOverride | string | | "keycloak"
|
keycloak.httpRelativePath | string | | "/auth/"
|
keycloak.ingress.enabled | bool | | false
|
keycloak.initContainers | list | | [{"command":["sh","-c","until timeout 2 printf \"\" 2>>/dev/null >>/dev/tcp/${KEYCLOAK_DATABASE_HOST}/${KEYCLOAK_DATABASE_PORT}; do echo \"waiting for PostgreSQL\"; sleep 5; done"],"envFrom":[{"configMapRef":{"name":"keycloak-env-vars"}}],"image":"quay.io/eggplantsoftware/keycloak-server:6.2.34","imagePullPolicy":"IfNotPresent","name":"wait-for-postgresql"}]
|
keycloak.postgresql | object | | {"enabled":false}
|
minio | object | | {"auth":{"existingSecret":"dai-objectstorage"},"enabled":true,"extraEnvVars":[{"name":"MINIO_SKIP_CLIENT","value":"yes"}],"fullnameOverride":"minio","persistence":{"enabled":true}}
|
minio.auth.existingSecret | string | | "dai-objectstorage"
|
minio.enabled | bool | | true
|
minio.fullnameOverride | string | | "minio"
|
minio.persistence.enabled | bool | | true
|
postgresql | object | | {"enabled":true,"fullnameOverride":"postgres","image":{"tag":"14.11.0-debian-12-r12"},"primary":{"extraEnvVars":[{"name":"POSTGRESQL_DATABASE","value":"keycloak"}],"persistence":{"enabled":true}}}
|
postgresql.enabled | bool | | true
|
postgresql.fullnameOverride | string | | "postgres"
|
postgresql.primary.extraEnvVars[0] | object | | {"name":"POSTGRESQL_DATABASE","value":"keycloak"}
|
postgresql.primary.persistence.enabled | bool | | true
|
rabbitmq | object | | {"auth":{"existingErlangSecret":"dai-rabbitmq","existingPasswordSecret":"dai-rabbitmq","username":"rabbitmq"},"enabled":true,"fullnameOverride":"rabbitmq","persistence":{"enabled":true},"resources":{"limits":{"memory":"400Mi"},"requests":{"cpu":"400m","memory":"400Mi"}}}
|
rabbitmq.auth.existingErlangSecret | string | | "dai-rabbitmq"
|
rabbitmq.auth.existingPasswordSecret | string | | "dai-rabbitmq"
|
rabbitmq.auth.username | string | | "rabbitmq"
|
rabbitmq.fullnameOverride | string | | "rabbitmq"
|