Skip to content
This repository has been archived by the owner on Jan 19, 2024. It is now read-only.

Latest commit

 

History

History
58 lines (48 loc) · 11.5 KB

README.md

File metadata and controls

58 lines (48 loc) · 11.5 KB

job-executor-service

Helm Chart for the keptn job-executor-service

Configuration

The following table lists the configurable parameters of the job-executor-service chart and their default values.

Parameter Description Default
image.repository Container image name "docker.io/keptncontrib/job-executor-service"
image.pullPolicy Kubernetes image pull policy "IfNotPresent"
image.tag Container tag ""
distributor.stageFilter Sets the stage this helm service belongs to ""
distributor.serviceFilter Sets the service this helm service belongs to ""
distributor.projectFilter Sets the project this helm service belongs to ""
distributor.image.repository Container image name "docker.io/keptn/distributor"
distributor.image.pullPolicy Kubernetes image pull policy "IfNotPresent"
distributor.image.tag Container tag ""
jobConfig.allowedImageList A comma separated list of images that are allowed in job workloads ""
jobConfig.allowPrivilegedJobs Allows privileged job workloads. Allowing privileged job workloads can be considered dangerous! false
jobConfig.podSecurityContext The default pod security context for job workloads See values.yaml
jobConfig.jobSecurityContext The default security context for job workloads See values.yaml
jobConfig.serviceAccount.create Enables the creation of the default service account used for job workloads true
jobConfig.serviceAccount.name The name of the default service account used for job workloads default-job-account
jobConfig.serviceAccount.annotations Additional annotations for the default service account used for job workloads {}
jobConfig.taskDeadlineSeconds Maximum duration for a kubernetes job run in seconds (0 means no limit, set it to an integer > 0 to enforce it) 0
jobConfig.labels Additional labels that are added to all kubernetes jobs {}
jobConfig.networkPolicy.enabled Enable a network policy for jobs such that they can not access blocked networks defined in blockCIDRS false
jobConfig.networkPolicy.blockCIDRs A list of networks that should not be accessible from jobs false
remoteControlPlane.autoDetect.enabled Enables auto detection of a Keptn installation false
remoteControlPlane.autoDetect.namespace Namespace which should be used by the auto-detection ""
remoteControlPlane.api.protocol Used protocol (http, https "https"
remoteControlPlane.api.hostname Hostname of the control plane cluster (and port) "api-gateway-nginx.keptn"
remoteControlPlane.api.apiValidateTls Defines if the control plane certificate should be validated true
remoteControlPlane.api.token Keptn api token ""
imagePullSecrets Secrets to use for container registry credentials []
serviceAccount.create Enables the service account creation true
serviceAccount.annotations Annotations to add to the service account {}
serviceAccount.name The name of the service account to use. ""
podAnnotations Annotations to add to the created pods {}
podSecurityContext Set the pod security context. For security purposes the podSecurityContext value should not be changed! See values.yaml
securityContext Set the security context. For security purposes the securityContext value should not be changed! See values.yaml
resources Resource limits and requests {}
nodeSelector Node selector configuration {}
tolerations Tolerations for the pods []
affinity Affinity rules {}
networkPolicy.ingress.enabled Enable job-executor-service ingress network policy (no ingress traffic allowed) false
networkPolicy.egress.enabled Enable job-executor-service egress network policy: only egress allowed to OAuth provider, k8s master and Keptn API (may not work in case of dynamic/elastic IP addresses) false
networkPolicy.egress.k8sMasterCIDR Define kubernetes master(s) CIDR, if left empty we'll try to autodetect the master(s) IP address by looking up the endpoints of kubernetes.default service ""
networkPolicy.egress.k8sMasterPort Define kubernetes master(s) https port, if set to 0 we'll try to autodetect the port by looking up the endpoints of kubernetes.default service ""