2022-11-30 19:11:32 +00:00
## Argo CD configuration
## Ref: https://github.com/argoproj/argo-cd
##
# -- Provide a name in place of `argocd`
nameOverride : argocd
# -- String to fully override `"argo-cd.fullname"`
fullnameOverride : ""
# -- Override the Kubernetes version, which is used to evaluate certain manifests
kubeVersionOverride : ""
# Override APIVersions
# If you want to template helm charts but cannot access k8s API server
# you can set api versions here
apiVersionOverrides :
# -- String to override apiVersion of GKE resources rendered by this helm chart
cloudgoogle : "" # cloud.google.com/v1
2023-01-12 21:32:12 +00:00
# -- Create aggregated roles that extend existing cluster roles to interact with argo-cd resources
2022-11-30 19:11:32 +00:00
## Ref: https://kubernetes.io/docs/reference/access-authn-authz/rbac/#aggregated-clusterroles
createAggregateRoles : false
2023-01-12 21:32:12 +00:00
# -- Create cluster roles for cluster-wide installation.
## Used when you manage applications in the same cluster where Argo CD runs
createClusterRoles : true
2022-11-30 19:11:32 +00:00
openshift :
# -- enables using arbitrary uid for argo repo server
enabled : false
## Custom resource configuration
crds :
# -- Install and upgrade CRDs
install : true
# -- Keep CRDs on chart uninstall
keep : true
# -- Annotations to be added to all CRDs
annotations : {}
2023-05-12 13:19:04 +00:00
# -- Addtional labels to be added to all CRDs
additionalLabels : {}
2022-11-30 19:11:32 +00:00
## Globally shared configuration
global :
# -- Common labels for the all resources
additionalLabels : {}
# app: argo-cd
# -- Number of old deployment ReplicaSets to retain. The rest will be garbage collected.
revisionHistoryLimit : 3
# Default image used by all components
image :
# -- If defined, a repository applied to all Argo CD deployments
repository : quay.io/argoproj/argocd
# -- Overrides the global Argo CD image tag whose default is the chart appVersion
tag : ""
# -- If defined, a imagePullPolicy applied to all Argo CD deployments
imagePullPolicy : IfNotPresent
# -- Secrets with credentials to pull images from a private registry
imagePullSecrets : [ ]
# Default logging options used by all components
logging :
# -- Set the global logging format. Either: `text` or `json`
format : text
# -- Set the global logging level. One of: `debug`, `info`, `warn` or `error`
level : info
2022-12-02 06:33:44 +00:00
# -- Annotations for the all deployed Statefulsets
statefulsetAnnotations : {}
# -- Annotations for the all deployed Deployments
deploymentAnnotations : {}
2022-11-30 19:11:32 +00:00
# -- Annotations for the all deployed pods
podAnnotations : {}
# -- Labels for the all deployed pods
podLabels : {}
2023-05-12 13:19:04 +00:00
# -- Add Prometheus scrape annotations to all metrics services. This can be used as an alternative to the ServiceMonitors.
addPrometheusAnnotations : false
2022-11-30 19:11:32 +00:00
# -- Toggle and define pod-level security context.
# @default -- `{}` (See [values.yaml])
securityContext : {}
# runAsUser: 999
# runAsGroup: 999
# fsGroup: 999
# -- Mapping between IP and hostnames that will be injected as entries in the pod's hosts files
hostAliases : [ ]
# - ip: 10.20.30.40
# hostnames:
# - git.myhostname
2023-02-22 15:04:28 +00:00
# Default network policy rules used by all components
2022-11-30 19:11:32 +00:00
networkPolicy :
# -- Create NetworkPolicy objects for all components
create : false
# -- Default deny all ingress traffic
defaultDenyIngress : false
2023-03-02 16:00:02 +00:00
# -- Default priority class for all components
priorityClassName : ""
# -- Default node selector for all components
nodeSelector : {}
# -- Default tolerations for all components
2023-04-10 13:14:24 +00:00
tolerations : [ ]
2023-03-02 16:00:02 +00:00
2023-02-22 15:04:28 +00:00
# Default affinity preset for all components
affinity :
2023-03-02 16:00:02 +00:00
# -- Default pod anti-affinity rules. Either: `none`, `soft` or `hard`
2023-02-22 15:04:28 +00:00
podAntiAffinity : soft
# Node affinity rules
nodeAffinity :
2023-03-02 16:00:02 +00:00
# -- Default node affinity rules. Either: `none`, `soft` or `hard`
2023-02-22 15:04:28 +00:00
type : hard
# -- Default match expressions for node affinity
matchExpressions : [ ]
# - key: topology.kubernetes.io/zone
# operator: In
# values:
# - antarctica-east1
# - antarctica-west1
2023-03-02 16:00:02 +00:00
# -- Default [TopologySpreadConstraints] rules for all components
## Ref: https://kubernetes.io/docs/concepts/workloads/pods/pod-topology-spread-constraints/
## If labelSelector is left out, it will default to the labelSelector of the component
topologySpreadConstraints : [ ]
# - maxSkew: 1
# topologyKey: topology.kubernetes.io/zone
# whenUnsatisfiable: DoNotSchedule
2023-04-04 14:10:50 +00:00
# -- Deployment strategy for the all deployed Deployments
deploymentStrategy : {}
# type: RollingUpdate
# rollingUpdate:
# maxSurge: 25%
# maxUnavailable: 25%
2023-03-02 16:00:02 +00:00
2023-06-08 14:17:55 +00:00
# -- Environment variables to pass to all deployed Deployments
env : [ ]
2023-07-11 21:23:57 +00:00
# -- Annotations for the all deployed Certificates
certificateAnnotations : {}
2022-11-30 19:11:32 +00:00
## Argo Configs
configs :
# General Argo CD configuration
## Ref: https://github.com/argoproj/argo-cd/blob/master/docs/operator-manual/argocd-cm.yaml
cm :
# -- Create the argocd-cm configmap for [declarative setup]
create : true
# -- Annotations to be added to argocd-cm configmap
annotations : {}
# -- Argo CD's externally facing base URL (optional). Required when configuring SSO
url : ""
# -- The name of tracking label used by Argo CD for resource pruning
# @default -- Defaults to app.kubernetes.io/instance
application.instanceLabelKey : argocd.argoproj.io/instance
# -- Enable logs RBAC enforcement
## Ref: https://argo-cd.readthedocs.io/en/latest/operator-manual/upgrading/2.3-2.4/#enable-logs-rbac-enforcement
server.rbac.log.enforce.enable : false
# -- Enable exec feature in Argo UI
## Ref: https://argo-cd.readthedocs.io/en/latest/operator-manual/rbac/#exec-resource
exec.enabled : false
# -- Enable local admin user
## Ref: https://argo-cd.readthedocs.io/en/latest/faq/#how-to-disable-admin-user
admin.enabled : true
# -- Timeout to discover if a new manifests version got published to the repository
timeout.reconciliation : 180s
# -- Timeout to refresh application data as well as target manifests cache
2022-12-15 17:25:29 +00:00
timeout.hard.reconciliation : 0s
2022-11-30 19:11:32 +00:00
# Dex configuration
# dex.config: |
# connectors:
# # GitHub example
# - type: github
# id: github
# name: GitHub
# config:
# clientID: aabbccddeeff00112233
# clientSecret: $dex.github.clientSecret # Alternatively $<some_K8S_secret>:dex.github.clientSecret
# orgs:
# - name: your-github-org
# OIDC configuration as an alternative to dex (optional).
# oidc.config: |
# name: AzureAD
# issuer: https://login.microsoftonline.com/TENANT_ID/v2.0
# clientID: CLIENT_ID
# clientSecret: $oidc.azuread.clientSecret
# rootCA: |
# -----BEGIN CERTIFICATE-----
# ... encoded certificate data here ...
# -----END CERTIFICATE-----
# requestedIDTokenClaims:
# groups:
# essential: true
# requestedScopes:
# - openid
# - profile
# - email
# Argo CD configuration parameters
## Ref: https://github.com/argoproj/argo-cd/blob/master/docs/operator-manual/argocd-cmd-params-cm.yaml
params :
2023-06-26 15:58:13 +00:00
# -- Create the argocd-cmd-params-cm configmap
# If false, it is expected the configmap will be created by something else.
create : true
2022-11-30 19:11:32 +00:00
# -- Annotations to be added to the argocd-cmd-params-cm ConfigMap
annotations : {}
## Generic parameters
# -- Open-Telemetry collector address: (e.g. "otel-collector:4317")
otlp.address : ''
## Controller Properties
# -- Number of application status processors
controller.status.processors : 20
# -- Number of application operation processors
controller.operation.processors : 10
# -- Specifies timeout between application self heal attempts
controller.self.heal.timeout.seconds : 5
# -- Repo server RPC call timeout seconds.
controller.repo.server.timeout.seconds : 60
## Server properties
# -- Run server without TLS
server.insecure : false
# -- Value for base href in index.html. Used if Argo CD is running behind reverse proxy under subpath different from /
server.basehref : /
# -- Used if Argo CD is running behind reverse proxy under subpath different from /
server.rootpath : ''
# -- Directory path that contains additional static assets
server.staticassets : /shared/app
# -- Disable Argo CD RBAC for user authentication
server.disable.auth : false
# -- Enable GZIP compression
2023-08-09 20:00:55 +00:00
server.enable.gzip : true
2022-11-30 19:11:32 +00:00
# -- Set X-Frame-Options header in HTTP responses to value. To disable, set to "".
server.x.frame.options : sameorigin
## Repo-server properties
# -- Limit on number of concurrent manifests generate requests. Any value less the 1 means no limit.
reposerver.parallelism.limit : 0
2023-02-07 20:34:08 +00:00
## ApplicationSet Properties
# -- Modify how application is synced between the generator and the cluster. One of: `sync`, `create-only`, `create-update`, `create-delete`
applicationsetcontroller.policy : sync
# -- Enables use of the Progressive Syncs capability
applicationsetcontroller.enable.progressive.syncs : false
2023-11-13 12:59:22 +00:00
# -- Enables [Applications in any namespace]
## List of additional namespaces where applications may be created in and reconciled from.
## The namespace where Argo CD is installed to will always be allowed.
## Set comma-separated list. (e.g. app-team-one, app-team-two)
application.namespaces : ""
2022-11-30 19:11:32 +00:00
# Argo CD RBAC policy configuration
## Ref: https://github.com/argoproj/argo-cd/blob/master/docs/operator-manual/rbac.md
rbac :
# -- Create the argocd-rbac-cm configmap with ([Argo CD RBAC policy]) definitions.
# If false, it is expected the configmap will be created by something else.
# Argo CD will not work if there is no configmap created with the name above.
create : true
# -- Annotations to be added to argocd-rbac-cm configmap
annotations : {}
# -- The name of the default role which Argo CD will falls back to, when authorizing API requests (optional).
# If omitted or empty, users may be still be able to login, but will see no apps, projects, etc...
policy.default : ''
# -- File containing user-defined policies and role definitions.
# @default -- `''` (See [values.yaml])
policy.csv : ''
# Policy rules are in the form:
# p, subject, resource, action, object, effect
# Role definitions and bindings are in the form:
# g, subject, inherited-subject
# policy.csv |
# p, role:org-admin, applications, *, */*, allow
# p, role:org-admin, clusters, get, *, allow
# p, role:org-admin, repositories, *, *, allow
# p, role:org-admin, logs, get, *, allow
# p, role:org-admin, exec, create, */*, allow
# g, your-github-org:your-team, role:org-admin
# -- OIDC scopes to examine during rbac enforcement (in addition to `sub` scope).
# The scope value can be a string, or a list of strings.
scopes : "[groups]"
# GnuPG public keys for commit verification
## Ref: https://argo-cd.readthedocs.io/en/stable/user-guide/gpg-verification/
gpg :
# -- Annotations to be added to argocd-gpg-keys-cm configmap
annotations : {}
# -- [GnuPG] public keys to add to the keyring
# @default -- `{}` (See [values.yaml])
## Note: Public keys should be exported with `gpg --export --armor <KEY>`
keys : {}
# 4AEE18F83AFDEB23: |
# -----BEGIN PGP PUBLIC KEY BLOCK-----
# ...
# -----END PGP PUBLIC KEY BLOCK-----
2023-01-24 15:10:05 +00:00
# SSH known hosts for Git repositories
## Ref: https://argo-cd.readthedocs.io/en/stable/operator-manual/declarative-setup/#ssh-known-host-public-keys
ssh :
# -- Annotations to be added to argocd-ssh-known-hosts-cm configmap
annotations : {}
# -- Known hosts to be added to the known host list by default.
# @default -- See [values.yaml]
knownHosts : |
2023-06-06 17:24:40 +00:00
[ ssh.github.com]:443 ecdsa-sha2-nistp256 AAAAE2VjZHNhLXNoYTItbmlzdHAyNTYAAAAIbmlzdHAyNTYAAABBBEmKSENjQEezOmxkZMy7opKgwFB9nkt5YRrYMjNuG5N87uRgg6CLrbo5wAdT/y6v0mKV0U2w0WZ2YB/++Tpockg=
[ ssh.github.com]:443 ssh-ed25519 AAAAC3NzaC1lZDI1NTE5AAAAIOMqqnkVzrm0SdG6UOoqKLsabgH5C9okWi0dh2l9GKJl
[ ssh.github.com]:443 ssh-rsa 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
2023-05-18 13:50:46 +00:00
bitbucket.org ecdsa-sha2-nistp256 AAAAE2VjZHNhLXNoYTItbmlzdHAyNTYAAAAIbmlzdHAyNTYAAABBBPIQmuzMBuKdWeF4+a2sjSSpBK0iqitSQ+5BM9KhpexuGt20JpTVM7u5BDZngncgrqDMbWdxMWWOGtZ9UgbqgZE=
2023-06-06 17:24:40 +00:00
bitbucket.org ssh-ed25519 AAAAC3NzaC1lZDI1NTE5AAAAIIazEu89wgQZ4bqs3d63QSMzYVa0MuJ2e2gKTKqu+UUO
2023-10-31 13:41:58 +00:00
bitbucket.org ssh-rsa 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
2023-01-24 15:10:05 +00:00
github.com ecdsa-sha2-nistp256 AAAAE2VjZHNhLXNoYTItbmlzdHAyNTYAAAAIbmlzdHAyNTYAAABBBEmKSENjQEezOmxkZMy7opKgwFB9nkt5YRrYMjNuG5N87uRgg6CLrbo5wAdT/y6v0mKV0U2w0WZ2YB/++Tpockg=
github.com ssh-ed25519 AAAAC3NzaC1lZDI1NTE5AAAAIOMqqnkVzrm0SdG6UOoqKLsabgH5C9okWi0dh2l9GKJl
2023-03-28 14:02:53 +00:00
github.com ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABgQCj7ndNxQowgcQnjshcLrqPEiiphnt+VTTvDP6mHBL9j1aNUkY4Ue1gvwnGLVlOhGeYrnZaMgRK6+PKCUXaDbC7qtbW8gIkhL7aGCsOr/C56SJMy/BCZfxd1nWzAOxSDPgVsmerOBYfNqltV9/hWCqBywINIR+5dIg6JTJ72pcEpEjcYgXkE2YEFXV1JHnsKgbLWNlhScqb2UmyRkQyytRLtL+38TGxkxCflmO+5Z8CSSNY7GidjMIZ7Q4zMjA2n1nGrlTDkzwDCsw+wqFPGQA179cnfGWOWRVruj16z6XyvxvjJwbz0wQZ75XK5tKSb7FNyeIEs4TT4jk+S4dhPeAUC5y+bDYirYgM4GC7uEnztnZyaVWQ7B381AK4Qdrwt51ZqExKbQpTUNn+EjqoTwvqNj4kqx5QUCI0ThS/YkOxJCXmPUWZbhjpCg56i+2aB6CmK2JGhn57K5mj0MNdBXA4/WnwH6XoPWJzK5Nyu2zB3nAZp+S5hpQs+p1vN1/wsjk=
2023-01-24 15:10:05 +00:00
gitlab.com ecdsa-sha2-nistp256 AAAAE2VjZHNhLXNoYTItbmlzdHAyNTYAAAAIbmlzdHAyNTYAAABBBFSMqzJeV9rUzU4kWitGjeR4PWSa29SPqJ1fVkhtj3Hw9xjLVXVYrU9QlYWrOLXBpQ6KWjbjTDTdDkoohFzgbEY=
gitlab.com ssh-ed25519 AAAAC3NzaC1lZDI1NTE5AAAAIAfuCHKVTjquxvt6CM6tdG4SLp1Btn/nOeHHE5UOzRdf
gitlab.com ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQCsj2bNKTBSpIYDEGk9KxsGh3mySTRgMtXL583qmBpzeQ+jqCMRgBqB98u3z++J1sKlXHWfM9dyhSevkMwSbhoR8XIq/U0tCNyokEi/ueaBMCvbcTHhO7FcwzY92WK4Yt0aGROY5qX2UKSeOvuP4D6TPqKF1onrSzH9bx9XUf2lEdWT/ia1NEKjunUqu1xOB/StKDHMoX4/OKyIzuS0q/T1zOATthvasJFoPrAjkohTyaDUz2LN5JoH839hViyEG82yB+MjcFV5MU3N1l1QL3cVUCh93xSaua1N85qivl+siMkPGbO5xR/En4iEY6K2XPASUEMaieWVNTRCtJ4S8H+9
ssh.dev.azure.com ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQC7Hr1oTWqNqOlzGJOfGJ4NakVyIzf1rXYd4d7wo6jBlkLvCA4odBlL0mDUyZ0/QUfTTqeu+tm22gOsv+VrVTMk6vwRU75gY/y9ut5Mb3bR5BV58dKXyq9A9UeB5Cakehn5Zgm6x1mKoVyf+FFn26iYqXJRgzIZZcZ5V6hrE0Qg39kZm4az48o0AUbf6Sp4SLdvnuMa2sVNwHBboS7EJkm57XQPVU3/QpyNLHbWDdzwtrlS+ez30S3AdYhLKEOxAG8weOnyrtLJAUen9mTkol8oII1edf7mWWbWVf0nBmly21+nZcmCTISQBtdcyPaEno7fFQMDD26/s0lfKob4Kw8H
vs-ssh.visualstudio.com ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQC7Hr1oTWqNqOlzGJOfGJ4NakVyIzf1rXYd4d7wo6jBlkLvCA4odBlL0mDUyZ0/QUfTTqeu+tm22gOsv+VrVTMk6vwRU75gY/y9ut5Mb3bR5BV58dKXyq9A9UeB5Cakehn5Zgm6x1mKoVyf+FFn26iYqXJRgzIZZcZ5V6hrE0Qg39kZm4az48o0AUbf6Sp4SLdvnuMa2sVNwHBboS7EJkm57XQPVU3/QpyNLHbWDdzwtrlS+ez30S3AdYhLKEOxAG8weOnyrtLJAUen9mTkol8oII1edf7mWWbWVf0nBmly21+nZcmCTISQBtdcyPaEno7fFQMDD26/s0lfKob4Kw8H
# -- Additional known hosts for private repositories
extraHosts : ''
# Repository TLS certificates
# Ref: https://argo-cd.readthedocs.io/en/stable/operator-manual/declarative-setup/#repositories-using-self-signed-tls-certificates-or-are-signed-by-custom-ca
tls :
# -- Annotations to be added to argocd-tls-certs-cm configmap
annotations : {}
# -- TLS certificates for Git repositories
# @default -- `{}` (See [values.yaml])
certificates : {}
# server.example.com: |
# -----BEGIN CERTIFICATE-----
# ...
# -----END CERTIFICATE-----
2022-11-30 19:11:32 +00:00
2023-03-14 21:10:14 +00:00
# ConfigMap for Config Management Plugins
# Ref: https://argo-cd.readthedocs.io/en/stable/operator-manual/config-management-plugins/
cmp :
# -- Create the argocd-cmp-cm configmap
create : false
# -- Annotations to be added to argocd-cmp-cm configmap
annotations : {}
# -- Plugin yaml files to be added to argocd-cmp-cm
plugins : {}
# --- First plugin
# my-plugin:
# init:
# command: [sh]
# args: [-c, 'echo "Initializing..."']
# generate:
# command: [sh, -c]
# args:
# - |
# echo "{\"kind\": \"ConfigMap\", \"apiVersion\": \"v1\", \"metadata\": { \"name\": \"$ARGOCD_APP_NAME\", \"namespace\": \"$ARGOCD_APP_NAMESPACE\", \"annotations\": {\"Foo\": \"$ARGOCD_ENV_FOO\", \"KubeVersion\": \"$KUBE_VERSION\", \"KubeApiVersion\": \"$KUBE_API_VERSIONS\",\"Bar\": \"baz\"}}}"
# discover:
# fileName: "./subdir/s*.yaml"
# find:
# glob: "**/Chart.yaml"
# command: [sh, -c, find . -name env.yaml]
# --- Second plugin
# my-plugin2:
# init:
# command: [sh]
# args: [-c, 'echo "Initializing..."']
# generate:
# command: [sh, -c]
# args:
# - |
# echo "{\"kind\": \"ConfigMap\", \"apiVersion\": \"v1\", \"metadata\": { \"name\": \"$ARGOCD_APP_NAME\", \"namespace\": \"$ARGOCD_APP_NAMESPACE\", \"annotations\": {\"Foo\": \"$ARGOCD_ENV_FOO\", \"KubeVersion\": \"$KUBE_VERSION\", \"KubeApiVersion\": \"$KUBE_API_VERSIONS\",\"Bar\": \"baz\"}}}"
# discover:
# fileName: "./subdir/s*.yaml"
# find:
# glob: "**/Chart.yaml"
# command: [sh, -c, find . -name env.yaml]
2022-11-30 19:11:32 +00:00
# -- Provide one or multiple [external cluster credentials]
# @default -- `[]` (See [values.yaml])
## Ref:
## - https://argo-cd.readthedocs.io/en/stable/operator-manual/declarative-setup/#clusters
## - https://argo-cd.readthedocs.io/en/stable/operator-manual/security/#external-cluster-credentials
2023-03-16 00:29:51 +00:00
## - https://argo-cd.readthedocs.io/en/stable/user-guide/projects/#project-scoped-repositories-and-clusters
2022-11-30 19:11:32 +00:00
clusterCredentials : [ ]
# - name: mycluster
2023-11-20 13:19:36 +00:00
# server: https://mycluster.example.com
2022-11-30 19:11:32 +00:00
# labels: {}
# annotations: {}
# config:
# bearerToken: "<authentication token>"
# tlsClientConfig:
# insecure: false
# caData: "<base64 encoded certificate>"
# - name: mycluster2
2023-11-20 13:19:36 +00:00
# server: https://mycluster2.example.com
2022-11-30 19:11:32 +00:00
# labels: {}
# annotations: {}
# namespaces: namespace1,namespace2
# clusterResources: true
# config:
# bearerToken: "<authentication token>"
# tlsClientConfig:
# insecure: false
# caData: "<base64 encoded certificate>"
2023-03-16 00:29:51 +00:00
# - name: mycluster3-project-scoped
2023-11-20 13:19:36 +00:00
# server: https://mycluster3.example.com
2023-03-16 00:29:51 +00:00
# labels: {}
# annotations: {}
# project: my-project1
# config:
# bearerToken: "<authentication token>"
# tlsClientConfig:
# insecure: false
# caData: "<base64 encoded certificate>"
2022-11-30 19:11:32 +00:00
2023-01-24 15:10:05 +00:00
# DEPRECATED - Moved to configs.ssh.annotations
# knownHostsAnnotations: {}
# DEPRECATED - Moved to configs.ssh.knownHosts
# knownHosts: {}
# DEPRECATED - Moved to configs.tls.annotations
# tlsCertsAnnotations: {}
# DEPRECATED - Moved to configs.tls.certificates
# tlsCerts: {}
2022-11-30 19:11:32 +00:00
# -- Repository credentials to be used as Templates for other repos
## Creates a secret for each key/value specified below to create repository credentials
credentialTemplates : {}
# github-enterprise-creds-1:
# url: https://github.com/argoproj
# githubAppID: 1
# githubAppInstallationID: 2
# githubAppEnterpriseBaseUrl: https://ghe.example.com/api/v3
# githubAppPrivateKey: |
# -----BEGIN OPENSSH PRIVATE KEY-----
# ...
# -----END OPENSSH PRIVATE KEY-----
# https-creds:
# url: https://github.com/argoproj
# password: my-password
# username: my-username
# ssh-creds:
# url: git@github.com:argoproj-labs
# sshPrivateKey: |
# -----BEGIN OPENSSH PRIVATE KEY-----
# ...
# -----END OPENSSH PRIVATE KEY-----
# -- Annotations to be added to `configs.credentialTemplates` Secret
credentialTemplatesAnnotations : {}
# -- Repositories list to be used by applications
## Creates a secret for each key/value specified below to create repositories
2023-08-16 17:43:32 +00:00
## Note: the last example in the list would use a repository credential template, configured under "configs.credentialTemplates".
2022-11-30 19:11:32 +00:00
repositories : {}
# istio-helm-repo:
# url: https://storage.googleapis.com/istio-prerelease/daily-build/master-latest-daily/charts
# name: istio.io
# type: helm
# private-helm-repo:
# url: https://my-private-chart-repo.internal
# name: private-repo
# type: helm
# password: my-password
# username: my-username
# private-repo:
# url: https://github.com/argoproj/private-repo
# -- Annotations to be added to `configs.repositories` Secret
repositoriesAnnotations : {}
# Argo CD sensitive data
# Ref: https://argo-cd.readthedocs.io/en/stable/operator-manual/user-management/#sensitive-data-and-sso-client-secrets
secret :
# -- Create the argocd-secret
createSecret : true
2023-01-24 15:10:05 +00:00
# -- Labels to be added to argocd-secret
labels : {}
2022-11-30 19:11:32 +00:00
# -- Annotations to be added to argocd-secret
annotations : {}
# -- Shared secret for authenticating GitHub webhook events
githubSecret : ""
# -- Shared secret for authenticating GitLab webhook events
gitlabSecret : ""
# -- Shared secret for authenticating BitbucketServer webhook events
bitbucketServerSecret : ""
# -- UUID for authenticating Bitbucket webhook events
bitbucketUUID : ""
# -- Shared secret for authenticating Gogs webhook events
gogsSecret : ""
# -- add additional secrets to be added to argocd-secret
## Custom secrets. Useful for injecting SSO secrets into environment variables.
## Ref: https://argo-cd.readthedocs.io/en/stable/operator-manual/user-management/#sensitive-data-and-sso-client-secrets
## Note that all values must be non-empty.
extra :
{}
# LDAP_PASSWORD: "mypassword"
# -- Argo TLS Data
# DEPRECATED - Use server.certificate or server.certificateSecret
# argocdServerTlsConfig:
# key: ''
# crt: ''
# -- Bcrypt hashed admin password
## Argo expects the password in the secret to be bcrypt hashed. You can create this hash with
## `htpasswd -nbBC 10 "" $ARGO_PWD | tr -d ':\n' | sed 's/$2y/$2a/'`
argocdServerAdminPassword : ""
# -- Admin password modification time. Eg. `"2006-01-02T15:04:05Z"`
# @default -- `""` (defaults to current time)
argocdServerAdminPasswordMtime : ""
# -- Define custom [CSS styles] for your argo instance.
# This setting will automatically mount the provided CSS and reference it in the argo configuration.
# @default -- `""` (See [values.yaml])
## Ref: https://argo-cd.readthedocs.io/en/stable/operator-manual/custom-styles/
styles : ""
# styles: |
2023-09-05 12:51:54 +00:00
# .sidebar {
2022-11-30 19:11:32 +00:00
# background: linear-gradient(to bottom, #999, #777, #333, #222, #111);
# }
# -- Array of extra K8s manifests to deploy
2023-01-12 21:32:12 +00:00
## Note: Supports use of custom Helm templates
2022-11-30 19:11:32 +00:00
extraObjects : [ ]
# - apiVersion: secrets-store.csi.x-k8s.io/v1
# kind: SecretProviderClass
# metadata:
# name: argocd-secrets-store
# spec:
# provider: aws
# parameters:
# objects: |
# - objectName: "argocd"
# objectType: "secretsmanager"
# jmesPath:
# - path: "client_id"
# objectAlias: "client_id"
# - path: "client_secret"
# objectAlias: "client_secret"
# secretObjects:
# - data:
# - key: client_id
# objectName: client_id
# - key: client_secret
# objectName: client_secret
# secretName: argocd-secrets-store
# type: Opaque
# labels:
# app.kubernetes.io/part-of: argocd
## Application controller
controller :
# -- Application controller name string
name : application-controller
# -- The number of application controller pods to run.
# Additional replicas will cause sharding of managed clusters across number of replicas.
replicas : 1
## Application controller Pod Disruption Budget
## Ref: https://kubernetes.io/docs/tasks/run-application/configure-pdb/
pdb :
# -- Deploy a [PodDisruptionBudget] for the application controller
enabled : false
# -- Labels to be added to application controller pdb
labels : {}
# -- Annotations to be added to application controller pdb
annotations : {}
# -- Number of pods that are available after eviction as number or percentage (eg.: 50%)
# @default -- `""` (defaults to 0 if not specified)
minAvailable : ""
2023-02-28 16:02:48 +00:00
# -- Number of pods that are unavailable after eviction as number or percentage (eg.: 50%).
2022-11-30 19:11:32 +00:00
## Has higher precedence over `controller.pdb.minAvailable`
maxUnavailable : ""
## Application controller image
image :
# -- Repository to use for the application controller
# @default -- `""` (defaults to global.image.repository)
repository : ""
# -- Tag to use for the application controller
# @default -- `""` (defaults to global.image.tag)
tag : ""
# -- Image pull policy for the application controller
# @default -- `""` (defaults to global.image.imagePullPolicy)
imagePullPolicy : ""
# -- Secrets with credentials to pull images from a private registry
# @default -- `[]` (defaults to global.imagePullSecrets)
imagePullSecrets : [ ]
# -- DEPRECATED - Application controller commandline flags
args : {}
# DEPRECATED - Use configs.params to override
# # -- define the application controller `--status-processors`
# statusProcessors: "20"
# # -- define the application controller `--operation-processors`
# operationProcessors: "10"
# # -- define the application controller `--app-hard-resync`
# appHardResyncPeriod: "0"
# # -- define the application controller `--app-resync`
# appResyncPeriod: "180"
# # -- define the application controller `--self-heal-timeout-seconds`
# selfHealTimeout: "5"
# # -- define the application controller `--repo-server-timeout-seconds`
# repoServerTimeoutSeconds: "60"
# -- Additional command line arguments to pass to application controller
extraArgs : [ ]
# -- Environment variables to pass to application controller
env : [ ]
# -- envFrom to pass to application controller
# @default -- `[]` (See [values.yaml])
envFrom : [ ]
# - configMapRef:
# name: config-map-name
# - secretRef:
# name: secret-name
2023-01-05 15:42:23 +00:00
# -- Additional containers to be added to the application controller pod
2023-01-12 21:32:12 +00:00
## Note: Supports use of custom Helm templates
2023-01-05 15:42:23 +00:00
extraContainers : [ ]
# -- Init containers to add to the application controller pod
## If your target Kubernetes cluster(s) require a custom credential (exec) plugin
## you could use this (and the same in the server pod) to provide such executable
## Ref: https://kubernetes.io/docs/reference/access-authn-authz/authentication/#client-go-credential-plugins
2023-01-12 21:32:12 +00:00
## Note: Supports use of custom Helm templates
2023-01-05 15:42:23 +00:00
initContainers : [ ]
# - name: download-tools
# image: alpine:3
# command: [sh, -c]
# args:
# - wget -qO kubelogin.zip https://github.com/Azure/kubelogin/releases/download/v0.0.25/kubelogin-linux-amd64.zip &&
# unzip kubelogin.zip && mv bin/linux_amd64/kubelogin /custom-tools/
# volumeMounts:
# - mountPath: /custom-tools
# name: custom-tools
# -- Additional volumeMounts to the application controller main container
volumeMounts : [ ]
# - mountPath: /usr/local/bin/kubelogin
# name: custom-tools
# subPath: kubelogin
# -- Additional volumes to the application controller pod
volumes : [ ]
# - name: custom-tools
# emptyDir: {}
2022-12-02 06:33:44 +00:00
# -- Annotations for the application controller StatefulSet
statefulsetAnnotations : {}
2022-11-30 19:11:32 +00:00
# -- Annotations to be added to application controller pods
podAnnotations : {}
# -- Labels to be added to application controller pods
podLabels : {}
2023-01-05 15:42:23 +00:00
# -- Resource limits and requests for the application controller pods
resources : {}
# limits:
# cpu: 500m
# memory: 512Mi
# requests:
# cpu: 250m
# memory: 256Mi
2023-01-24 15:10:05 +00:00
# Application controller container ports
containerPorts :
# -- Metrics container port
metrics : 8082
2023-02-07 14:35:29 +00:00
# -- Host Network for application controller pods
hostNetwork : false
2023-02-16 16:33:45 +00:00
# -- [DNS configuration]
dnsConfig : {}
2023-02-07 14:35:29 +00:00
# -- Alternative DNS policy for application controller pods
dnsPolicy : "ClusterFirst"
2022-11-30 19:11:32 +00:00
# -- Application controller container-level security context
# @default -- See [values.yaml]
containerSecurityContext :
runAsNonRoot : true
readOnlyRootFilesystem : true
allowPrivilegeEscalation : false
seccompProfile :
type : RuntimeDefault
capabilities :
drop :
- ALL
2023-02-28 16:02:48 +00:00
# Readiness probe for application controller
2022-11-30 19:11:32 +00:00
## Ref: https://kubernetes.io/docs/tasks/configure-pod-container/configure-liveness-readiness-probes/
readinessProbe :
# -- Minimum consecutive failures for the [probe] to be considered failed after having succeeded
failureThreshold : 3
# -- Number of seconds after the container has started before [probe] is initiated
initialDelaySeconds : 10
# -- How often (in seconds) to perform the [probe]
periodSeconds : 10
# -- Minimum consecutive successes for the [probe] to be considered successful after having failed
successThreshold : 1
# -- Number of seconds after which the [probe] times out
timeoutSeconds : 1
2023-10-27 19:54:27 +00:00
# -- terminationGracePeriodSeconds for container lifecycle hook
terminationGracePeriodSeconds : 30
2023-03-02 16:00:02 +00:00
# -- Priority class for the application controller pods
# @default -- `""` (defaults to global.priorityClassName)
priorityClassName : ""
2022-11-30 19:11:32 +00:00
# -- [Node selector]
2023-03-02 16:00:02 +00:00
# @default -- `{}` (defaults to global.nodeSelector)
2022-11-30 19:11:32 +00:00
nodeSelector : {}
# -- [Tolerations] for use with node taints
2023-03-02 16:00:02 +00:00
# @default -- `[]` (defaults to global.tolerations)
2022-11-30 19:11:32 +00:00
tolerations : [ ]
# -- Assign custom [affinity] rules to the deployment
2023-02-22 15:04:28 +00:00
# @default -- `{}` (defaults to global.affinity preset)
2022-11-30 19:11:32 +00:00
affinity : {}
# -- Assign custom [TopologySpreadConstraints] rules to the application controller
2023-03-02 16:00:02 +00:00
# @default -- `[]` (defaults to global.topologySpreadConstraints)
2022-11-30 19:11:32 +00:00
## Ref: https://kubernetes.io/docs/concepts/workloads/pods/pod-topology-spread-constraints/
## If labelSelector is left out, it will default to the labelSelector configuration of the deployment
topologySpreadConstraints : [ ]
2023-03-02 16:00:02 +00:00
# - maxSkew: 1
# topologyKey: topology.kubernetes.io/zone
# whenUnsatisfiable: DoNotSchedule
2022-11-30 19:11:32 +00:00
serviceAccount :
# -- Create a service account for the application controller
create : true
# -- Service account name
name : argocd-application-controller
# -- Annotations applied to created service account
annotations : {}
# -- Labels applied to created service account
labels : {}
# -- Automount API credentials for the Service Account
automountServiceAccountToken : true
## Application controller metrics configuration
metrics :
# -- Deploy metrics service
enabled : false
applicationLabels :
# -- Enables additional labels in argocd_app_labels metric
enabled : false
# -- Additional labels
labels : [ ]
service :
2023-05-12 13:19:04 +00:00
# -- Metrics service type
type : ClusterIP
# -- Metrics service clusterIP. `None` makes a "headless service" (no virtual IP)
clusterIP : ""
2022-11-30 19:11:32 +00:00
# -- Metrics service annotations
annotations : {}
# -- Metrics service labels
labels : {}
# -- Metrics service port
servicePort : 8082
# -- Metrics service port name
portName : http-metrics
serviceMonitor :
# -- Enable a prometheus ServiceMonitor
enabled : false
# -- Prometheus ServiceMonitor interval
interval : 30s
# -- Prometheus [RelabelConfigs] to apply to samples before scraping
relabelings : [ ]
# -- Prometheus [MetricRelabelConfigs] to apply to samples before ingestion
metricRelabelings : [ ]
# -- Prometheus ServiceMonitor selector
selector : {}
# prometheus: kube-prometheus
# -- Prometheus ServiceMonitor scheme
scheme : ""
# -- Prometheus ServiceMonitor tlsConfig
tlsConfig : {}
# -- Prometheus ServiceMonitor namespace
namespace : "" # "monitoring"
# -- Prometheus ServiceMonitor labels
additionalLabels : {}
# -- Prometheus ServiceMonitor annotations
annotations : {}
rules :
# -- Deploy a PrometheusRule for the application controller
enabled : false
2023-03-10 23:07:57 +00:00
# -- PrometheusRule namespace
namespace : "" # "monitoring"
# -- PrometheusRule selector
selector : {}
# prometheus: kube-prometheus
# -- PrometheusRule labels
additionalLabels : {}
# -- PrometheusRule annotations
annotations : {}
2022-11-30 19:11:32 +00:00
# -- PrometheusRule.Spec for the application controller
spec : [ ]
# - alert: ArgoAppMissing
# expr: |
# absent(argocd_app_info) == 1
# for: 15m
# labels:
# severity: critical
# annotations:
# summary: "[Argo CD] No reported applications"
# description: >
# Argo CD has not reported any applications data for the past 15 minutes which
# means that it must be down or not functioning properly. This needs to be
# resolved for this cloud to continue to maintain state.
# - alert: ArgoAppNotSynced
# expr: |
# argocd_app_info{sync_status!="Synced"} == 1
# for: 12h
# labels:
# severity: warning
# annotations:
# summary: "[{{`{{$labels.name}}`}}] Application not synchronized"
# description: >
# The application [{{`{{$labels.name}}`}} has not been synchronized for over
# 12 hours which means that the state of this cloud has drifted away from the
# state inside Git.
## Enable this and set the rules: to whatever custom rules you want for the Cluster Role resource.
## Defaults to off
clusterRoleRules :
# -- Enable custom rules for the application controller's ClusterRole resource
enabled : false
# -- List of custom rules for the application controller's ClusterRole resource
rules : [ ]
## Dex
dex :
# -- Enable dex
enabled : true
# -- Dex name
name : dex-server
# -- Additional command line arguments to pass to the Dex server
extraArgs : [ ]
metrics :
# -- Deploy metrics service
enabled : false
service :
# -- Metrics service annotations
annotations : {}
# -- Metrics service labels
labels : {}
# -- Metrics service port name
portName : http-metrics
serviceMonitor :
# -- Enable a prometheus ServiceMonitor
enabled : false
# -- Prometheus ServiceMonitor interval
interval : 30s
# -- Prometheus [RelabelConfigs] to apply to samples before scraping
relabelings : [ ]
# -- Prometheus [MetricRelabelConfigs] to apply to samples before ingestion
metricRelabelings : [ ]
# -- Prometheus ServiceMonitor selector
selector : {}
# prometheus: kube-prometheus
# -- Prometheus ServiceMonitor scheme
scheme : ""
# -- Prometheus ServiceMonitor tlsConfig
tlsConfig : {}
# -- Prometheus ServiceMonitor namespace
namespace : "" # "monitoring"
# -- Prometheus ServiceMonitor labels
additionalLabels : {}
# -- Prometheus ServiceMonitor annotations
annotations : {}
## Dex Pod Disruption Budget
## Ref: https://kubernetes.io/docs/tasks/run-application/configure-pdb/
pdb :
# -- Deploy a [PodDisruptionBudget] for the Dex server
enabled : false
# -- Labels to be added to Dex server pdb
labels : {}
# -- Annotations to be added to Dex server pdb
annotations : {}
# -- Number of pods that are available after eviction as number or percentage (eg.: 50%)
# @default -- `""` (defaults to 0 if not specified)
minAvailable : ""
# -- Number of pods that are unavailble after eviction as number or percentage (eg.: 50%).
## Has higher precedence over `dex.pdb.minAvailable`
maxUnavailable : ""
## Dex image
image :
# -- Dex image repository
repository : ghcr.io/dexidp/dex
# -- Dex image tag
2023-07-10 14:02:28 +00:00
tag : v2.37.0
2022-11-30 19:11:32 +00:00
# -- Dex imagePullPolicy
# @default -- `""` (defaults to global.image.imagePullPolicy)
imagePullPolicy : ""
# -- Secrets with credentials to pull images from a private registry
# @default -- `[]` (defaults to global.imagePullSecrets)
imagePullSecrets : [ ]
# Argo CD init image that creates Dex config
initImage :
# -- Argo CD init image repository
# @default -- `""` (defaults to global.image.repository)
repository : ""
# -- Argo CD init image tag
# @default -- `""` (defaults to global.image.tag)
tag : ""
# -- Argo CD init image imagePullPolicy
# @default -- `""` (defaults to global.image.imagePullPolicy)
imagePullPolicy : ""
2023-07-14 17:11:00 +00:00
# -- Argo CD init image resources
# @default -- `{}` (defaults to dex.resources)
resources : {}
# requests:
# cpu: 5m
# memory: 96Mi
# limits:
# cpu: 10m
# memory: 144Mi
2022-11-30 19:11:32 +00:00
# -- Environment variables to pass to the Dex server
env : [ ]
# -- envFrom to pass to the Dex server
# @default -- `[]` (See [values.yaml])
envFrom : [ ]
# - configMapRef:
# name: config-map-name
# - secretRef:
# name: secret-name
2023-01-05 15:42:23 +00:00
# -- Additional containers to be added to the dex pod
2023-01-12 21:32:12 +00:00
## Note: Supports use of custom Helm templates
2023-01-05 15:42:23 +00:00
extraContainers : [ ]
# -- Init containers to add to the dex pod
2023-01-12 21:32:12 +00:00
## Note: Supports use of custom Helm templates
2023-01-05 15:42:23 +00:00
initContainers : [ ]
# -- Additional volumeMounts to the dex main container
volumeMounts : [ ]
# -- Additional volumes to the dex pod
volumes : [ ]
2022-11-30 19:11:32 +00:00
# TLS certificate configuration via Secret
## Ref: https://argo-cd.readthedocs.io/en/stable/operator-manual/tls/#configuring-tls-to-argocd-dex-server
## Note: Issuing certificates via cert-manager in not supported right now because it's not possible to restart Dex automatically without extra controllers.
certificateSecret :
# -- Create argocd-dex-server-tls secret
enabled : false
# -- Labels to be added to argocd-dex-server-tls secret
labels : {}
# -- Annotations to be added to argocd-dex-server-tls secret
annotations : {}
# -- Certificate authority. Required for self-signed certificates.
ca : ''
# -- Certificate private key
key : ''
# -- Certificate data. Must contain SANs of Dex service (ie: argocd-dex-server, argocd-dex-server.argo-cd.svc)
crt : ''
2022-12-02 06:33:44 +00:00
# -- Annotations to be added to the Dex server Deployment
deploymentAnnotations : {}
2022-11-30 19:11:32 +00:00
# -- Annotations to be added to the Dex server pods
podAnnotations : {}
# -- Labels to be added to the Dex server pods
podLabels : {}
2023-01-05 15:42:23 +00:00
# -- Resource limits and requests for dex
resources : {}
# limits:
# cpu: 50m
# memory: 64Mi
# requests:
# cpu: 10m
# memory: 32Mi
2023-01-24 15:10:05 +00:00
# Dex container ports
# NOTE: These ports are currently hardcoded and cannot be changed
containerPorts :
# -- HTTP container port
http : 5556
# -- gRPC container port
grpc : 5557
# -- Metrics container port
metrics : 5558
2023-02-16 16:33:45 +00:00
# -- [DNS configuration]
dnsConfig : {}
# -- Alternative DNS policy for Dex server pods
dnsPolicy : "ClusterFirst"
2022-11-30 19:11:32 +00:00
# -- Dex container-level security context
# @default -- See [values.yaml]
containerSecurityContext :
runAsNonRoot : true
readOnlyRootFilesystem : true
allowPrivilegeEscalation : false
seccompProfile :
type : RuntimeDefault
capabilities :
drop :
- ALL
## Probes for Dex server
## Supported from Dex >= 2.28.0
livenessProbe :
# -- Enable Kubernetes liveness probe for Dex >= 2.28.0
enabled : false
# -- Minimum consecutive failures for the [probe] to be considered failed after having succeeded
failureThreshold : 3
# -- Number of seconds after the container has started before [probe] is initiated
initialDelaySeconds : 10
# -- How often (in seconds) to perform the [probe]
periodSeconds : 10
# -- Minimum consecutive successes for the [probe] to be considered successful after having failed
successThreshold : 1
# -- Number of seconds after which the [probe] times out
timeoutSeconds : 1
2023-01-24 15:10:05 +00:00
2022-11-30 19:11:32 +00:00
readinessProbe :
# -- Enable Kubernetes readiness probe for Dex >= 2.28.0
enabled : false
# -- Minimum consecutive failures for the [probe] to be considered failed after having succeeded
failureThreshold : 3
# -- Number of seconds after the container has started before [probe] is initiated
initialDelaySeconds : 10
# -- How often (in seconds) to perform the [probe]
periodSeconds : 10
# -- Minimum consecutive successes for the [probe] to be considered successful after having failed
successThreshold : 1
# -- Number of seconds after which the [probe] times out
timeoutSeconds : 1
2023-10-27 19:54:27 +00:00
# -- terminationGracePeriodSeconds for container lifecycle hook
terminationGracePeriodSeconds : 30
2022-11-30 19:11:32 +00:00
serviceAccount :
# -- Create dex service account
create : true
# -- Dex service account name
name : argocd-dex-server
# -- Annotations applied to created service account
annotations : {}
# -- Automount API credentials for the Service Account
automountServiceAccountToken : true
# -- Service port for HTTP access
servicePortHttp : 5556
# -- Service port name for HTTP access
servicePortHttpName : http
# -- Service port for gRPC access
servicePortGrpc : 5557
# -- Service port name for gRPC access
servicePortGrpcName : grpc
# -- Service port for metrics access
servicePortMetrics : 5558
2023-03-02 16:00:02 +00:00
# -- Priority class for the dex pods
# @default -- `""` (defaults to global.priorityClassName)
priorityClassName : ""
2022-11-30 19:11:32 +00:00
# -- [Node selector]
2023-03-02 16:00:02 +00:00
# @default -- `{}` (defaults to global.nodeSelector)
2022-11-30 19:11:32 +00:00
nodeSelector : {}
2023-03-02 16:00:02 +00:00
2022-11-30 19:11:32 +00:00
# -- [Tolerations] for use with node taints
2023-03-02 16:00:02 +00:00
# @default -- `[]` (defaults to global.tolerations)
2022-11-30 19:11:32 +00:00
tolerations : [ ]
2023-03-02 16:00:02 +00:00
2022-11-30 19:11:32 +00:00
# -- Assign custom [affinity] rules to the deployment
2023-02-22 15:04:28 +00:00
# @default -- `{}` (defaults to global.affinity preset)
2022-11-30 19:11:32 +00:00
affinity : {}
# -- Assign custom [TopologySpreadConstraints] rules to dex
2023-03-02 16:00:02 +00:00
# @default -- `[]` (defaults to global.topologySpreadConstraints)
2022-11-30 19:11:32 +00:00
## Ref: https://kubernetes.io/docs/concepts/workloads/pods/pod-topology-spread-constraints/
## If labelSelector is left out, it will default to the labelSelector configuration of the deployment
topologySpreadConstraints : [ ]
2023-03-02 16:00:02 +00:00
# - maxSkew: 1
# topologyKey: topology.kubernetes.io/zone
# whenUnsatisfiable: DoNotSchedule
2022-11-30 19:11:32 +00:00
2023-04-04 14:10:50 +00:00
# -- Deployment strategy to be added to the Dex server Deployment
deploymentStrategy : {}
# type: RollingUpdate
# rollingUpdate:
# maxSurge: 25%
# maxUnavailable: 25%
2023-04-11 13:41:46 +00:00
# -- Dex log format. Either `text` or `json`
# @default -- `""` (defaults to global.logging.format)
logFormat : ""
# -- Dex log level. One of: `debug`, `info`, `warn`, `error`
# @default -- `""` (defaults to global.logging.level)
logLevel : ""
2022-11-30 19:11:32 +00:00
## Redis
redis :
# -- Enable redis
enabled : true
# -- Redis name
name : redis
## Redis Pod Disruption Budget
## Ref: https://kubernetes.io/docs/tasks/run-application/configure-pdb/
pdb :
# -- Deploy a [PodDisruptionBudget] for the Redis
enabled : false
# -- Labels to be added to Redis pdb
labels : {}
# -- Annotations to be added to Redis pdb
annotations : {}
# -- Number of pods that are available after eviction as number or percentage (eg.: 50%)
# @default -- `""` (defaults to 0 if not specified)
minAvailable : ""
# -- Number of pods that are unavailble after eviction as number or percentage (eg.: 50%).
## Has higher precedence over `redis.pdb.minAvailable`
maxUnavailable : ""
## Redis image
image :
# -- Redis repository
repository : public.ecr.aws/docker/library/redis
# -- Redis tag
2023-09-25 17:25:40 +00:00
tag : 7.0 .13 -alpine
2023-01-26 17:16:07 +00:00
# -- Redis image pull policy
# @default -- `""` (defaults to global.image.imagePullPolicy)
imagePullPolicy : ""
2022-11-30 19:11:32 +00:00
2023-01-26 17:16:07 +00:00
## Prometheus redis-exporter sidecar
2023-01-24 15:10:05 +00:00
exporter :
# -- Enable Prometheus redis-exporter sidecar
2023-01-26 17:16:07 +00:00
enabled : false
2023-03-10 23:07:57 +00:00
# -- Environment variables to pass to the Redis exporter
env : [ ]
2023-01-26 17:16:07 +00:00
## Prometheus redis-exporter image
2023-01-24 15:10:05 +00:00
image :
2023-01-26 17:16:07 +00:00
# -- Repository to use for the redis-exporter
2023-01-24 15:10:05 +00:00
repository : public.ecr.aws/bitnami/redis-exporter
2023-01-26 17:16:07 +00:00
# -- Tag to use for the redis-exporter
2023-08-28 19:01:22 +00:00
tag : 1.53 .0
2023-01-26 17:16:07 +00:00
# -- Image pull policy for the redis-exporter
2023-01-24 15:10:05 +00:00
# @default -- `""` (defaults to global.image.imagePullPolicy)
imagePullPolicy : ""
# -- Redis exporter security context
# @default -- See [values.yaml]
containerSecurityContext :
runAsNonRoot : true
readOnlyRootFilesystem : true
allowPrivilegeEscalation : false
seccompProfile :
type : RuntimeDefault
capabilities :
drop :
- ALL
# -- Resource limits and requests for redis-exporter sidecar
resources : {}
# limits:
# cpu: 50m
# memory: 64Mi
# requests:
# cpu: 10m
# memory: 32Mi
2022-11-30 19:11:32 +00:00
# -- Secrets with credentials to pull images from a private registry
# @default -- `[]` (defaults to global.imagePullSecrets)
imagePullSecrets : [ ]
# -- Additional command line arguments to pass to redis-server
extraArgs : [ ]
# - --bind
# - "0.0.0.0"
# -- Environment variables to pass to the Redis server
env : [ ]
# -- envFrom to pass to the Redis server
# @default -- `[]` (See [values.yaml])
envFrom : [ ]
# - configMapRef:
# name: config-map-name
# - secretRef:
# name: secret-name
2023-01-05 15:42:23 +00:00
# -- Additional containers to be added to the redis pod
2023-01-12 21:32:12 +00:00
## Note: Supports use of custom Helm templates
2023-01-05 15:42:23 +00:00
extraContainers : [ ]
# -- Init containers to add to the redis pod
2023-01-12 21:32:12 +00:00
## Note: Supports use of custom Helm templates
2023-01-05 15:42:23 +00:00
initContainers : [ ]
# -- Additional volumeMounts to the redis container
volumeMounts : [ ]
# -- Additional volumes to the redis pod
volumes : [ ]
2022-12-02 06:33:44 +00:00
# -- Annotations to be added to the Redis server Deployment
deploymentAnnotations : {}
2022-11-30 19:11:32 +00:00
# -- Annotations to be added to the Redis server pods
podAnnotations : {}
# -- Labels to be added to the Redis server pods
podLabels : {}
2023-01-05 15:42:23 +00:00
# -- Resource limits and requests for redis
resources : {}
# limits:
# cpu: 200m
# memory: 128Mi
# requests:
# cpu: 100m
# memory: 64Mi
2022-11-30 19:11:32 +00:00
# -- Redis pod-level security context
# @default -- See [values.yaml]
securityContext :
runAsNonRoot : true
runAsUser : 999
seccompProfile :
type : RuntimeDefault
2023-01-24 15:10:05 +00:00
# Redis container ports
containerPorts :
# -- Redis container port
redis : 6379
# -- Metrics container port
metrics : 9121
2023-02-16 16:33:45 +00:00
# -- [DNS configuration]
dnsConfig : {}
# -- Alternative DNS policy for Redis server pods
dnsPolicy : "ClusterFirst"
2022-11-30 19:11:32 +00:00
# -- Redis container-level security context
# @default -- See [values.yaml]
containerSecurityContext :
2023-10-16 14:41:26 +00:00
readOnlyRootFilesystem : true
2022-11-30 19:11:32 +00:00
allowPrivilegeEscalation : false
capabilities :
drop :
- ALL
2023-01-05 15:42:23 +00:00
# -- Redis service port
servicePort : 6379
2023-03-02 16:00:02 +00:00
# -- Priority class for redis pods
# @default -- `""` (defaults to global.priorityClassName)
priorityClassName : ""
2022-11-30 19:11:32 +00:00
# -- [Node selector]
2023-03-02 16:00:02 +00:00
# @default -- `{}` (defaults to global.nodeSelector)
2022-11-30 19:11:32 +00:00
nodeSelector : {}
2023-01-05 15:42:23 +00:00
2022-11-30 19:11:32 +00:00
# -- [Tolerations] for use with node taints
2023-03-02 16:00:02 +00:00
# @default -- `[]` (defaults to global.tolerations)
2022-11-30 19:11:32 +00:00
tolerations : [ ]
2023-01-05 15:42:23 +00:00
2022-11-30 19:11:32 +00:00
# -- Assign custom [affinity] rules to the deployment
2023-02-22 15:04:28 +00:00
# @default -- `{}` (defaults to global.affinity preset)
2022-11-30 19:11:32 +00:00
affinity : {}
# -- Assign custom [TopologySpreadConstraints] rules to redis
2023-03-02 16:00:02 +00:00
# @default -- `[]` (defaults to global.topologySpreadConstraints)
2022-11-30 19:11:32 +00:00
## Ref: https://kubernetes.io/docs/concepts/workloads/pods/pod-topology-spread-constraints/
## If labelSelector is left out, it will default to the labelSelector configuration of the deployment
topologySpreadConstraints : [ ]
2023-03-02 16:00:02 +00:00
# - maxSkew: 1
# topologyKey: topology.kubernetes.io/zone
# whenUnsatisfiable: DoNotSchedule
2022-11-30 19:11:32 +00:00
2023-10-27 19:54:27 +00:00
# -- terminationGracePeriodSeconds for container lifecycle hook
terminationGracePeriodSeconds : 30
2022-11-30 19:11:32 +00:00
serviceAccount :
# -- Create a service account for the redis pod
create : false
# -- Service account name for redis pod
name : ""
# -- Annotations applied to created service account
annotations : {}
# -- Automount API credentials for the Service Account
automountServiceAccountToken : false
service :
# -- Redis service annotations
annotations : {}
# -- Additional redis service labels
labels : {}
metrics :
2023-01-24 15:10:05 +00:00
# -- Deploy metrics service
2022-11-30 19:11:32 +00:00
enabled : false
2023-01-24 15:10:05 +00:00
# Redis metrics service configuration
2022-11-30 19:11:32 +00:00
service :
# -- Metrics service type
type : ClusterIP
# -- Metrics service clusterIP. `None` makes a "headless service" (no virtual IP)
clusterIP : None
# -- Metrics service annotations
annotations : {}
# -- Metrics service labels
labels : {}
# -- Metrics service port
servicePort : 9121
# -- Metrics service port name
portName : http-metrics
2023-01-24 15:10:05 +00:00
2022-11-30 19:11:32 +00:00
serviceMonitor :
# -- Enable a prometheus ServiceMonitor
enabled : false
# -- Interval at which metrics should be scraped
interval : 30s
# -- Prometheus [RelabelConfigs] to apply to samples before scraping
relabelings : [ ]
# -- Prometheus [MetricRelabelConfigs] to apply to samples before ingestion
metricRelabelings : [ ]
# -- Prometheus ServiceMonitor selector
selector : {}
# prometheus: kube-prometheus
# -- Prometheus ServiceMonitor scheme
scheme : ""
# -- Prometheus ServiceMonitor tlsConfig
tlsConfig : {}
# -- Prometheus ServiceMonitor namespace
namespace : "" # "monitoring"
# -- Prometheus ServiceMonitor labels
additionalLabels : {}
# -- Prometheus ServiceMonitor annotations
annotations : {}
2023-09-11 12:18:22 +00:00
## Redis-HA subchart replaces custom redis deployment when `redis-ha.enabled=true`
# Ref: https://github.com/DandyDeveloper/charts/blob/master/charts/redis-ha/values.yaml
2022-11-30 19:11:32 +00:00
redis-ha :
# -- Enables the Redis HA subchart and disables the custom Redis single node deployment
enabled : false
2023-09-11 12:18:22 +00:00
## Redis image
image :
# -- Redis repository
repository : redis
# -- Redis tag
2023-09-25 17:25:40 +00:00
tag : 7.0 .13 -alpine
2023-01-26 17:16:07 +00:00
## Prometheus redis-exporter sidecar
2022-11-30 19:11:32 +00:00
exporter :
2023-01-26 17:16:07 +00:00
# -- Enable Prometheus redis-exporter sidecar
enabled : false
# -- Repository to use for the redis-exporter
image : public.ecr.aws/bitnami/redis-exporter
# -- Tag to use for the redis-exporter
2023-08-28 19:01:22 +00:00
tag : 1.53 .0
2022-11-30 19:11:32 +00:00
persistentVolume :
2023-02-28 16:02:48 +00:00
# -- Configures persistence on Redis nodes
2022-11-30 19:11:32 +00:00
enabled : false
2023-09-11 12:18:22 +00:00
## Redis specific configuration options
2022-11-30 19:11:32 +00:00
redis :
# -- Redis convention for naming the cluster group: must match `^[\\w-\\.]+$` and can be templated
masterGroupName : argocd
# -- Any valid redis config options in this section will be applied to each server (see `redis-ha` chart)
# @default -- See [values.yaml]
config :
# -- Will save the DB if both the given number of seconds and the given number of write operations against the DB occurred. `""` is disabled
# @default -- `'""'`
save : '""'
2023-09-11 12:18:22 +00:00
## Enables a HA Proxy for better LoadBalancing / Sentinel Master support. Automatically proxies to Redis master.
2022-11-30 19:11:32 +00:00
haproxy :
# -- Enabled HAProxy LoadBalancing/Proxy
enabled : true
metrics :
# -- HAProxy enable prometheus metric scraping
enabled : true
2023-09-11 12:18:22 +00:00
# -- Whether the haproxy pods should be forced to run on separate nodes.
hardAntiAffinity : true
# -- Additional affinities to add to the haproxy pods.
additionalAffinities : {}
# -- Assign custom [affinity] rules to the haproxy pods.
2023-09-15 16:00:18 +00:00
affinity : |
2023-10-16 14:41:26 +00:00
2023-09-11 12:18:22 +00:00
# -- [Tolerations] for use with node taints for haproxy pods.
tolerations : [ ]
2023-10-16 14:41:26 +00:00
# -- HAProxy container-level security context
# @default -- See [values.yaml]
containerSecurityContext :
readOnlyRootFilesystem : true
2023-09-11 12:18:22 +00:00
# -- Whether the Redis server pods should be forced to run on separate nodes.
hardAntiAffinity : true
# -- Additional affinities to add to the Redis server pods.
additionalAffinities : {}
# -- Assign custom [affinity] rules to the Redis pods.
2023-09-15 16:00:18 +00:00
affinity : |
2022-11-30 19:11:32 +00:00
2023-09-11 12:18:22 +00:00
# -- [Tolerations] for use with node taints for Redis pods.
tolerations : [ ]
# -- Assign custom [TopologySpreadConstraints] rules to the Redis pods.
2022-11-30 19:11:32 +00:00
## https://kubernetes.io/docs/concepts/workloads/pods/pod-topology-spread-constraints/
topologySpreadConstraints :
# -- Enable Redis HA topology spread constraints
enabled : false
# -- Max skew of pods tolerated
# @default -- `""` (defaults to `1`)
maxSkew : ""
# -- Topology key for spread
# @default -- `""` (defaults to `topology.kubernetes.io/zone`)
topologyKey : ""
# -- Enforcement policy, hard or soft
# @default -- `""` (defaults to `ScheduleAnyway`)
whenUnsatisfiable : ""
2023-10-16 14:41:26 +00:00
# -- Redis HA statefulset container-level security context
# @default -- See [values.yaml]
containerSecurityContext :
readOnlyRootFilesystem : true
2022-11-30 19:11:32 +00:00
# External Redis parameters
externalRedis :
# -- External Redis server host
host : ""
# -- External Redis username
username : ""
# -- External Redis password
password : ""
# -- External Redis server port
port : 6379
# -- The name of an existing secret with Redis credentials (must contain key `redis-password`).
# When it's set, the `externalRedis.password` parameter is ignored
existingSecret : ""
# -- External Redis Secret annotations
secretAnnotations : {}
## Server
server :
# -- Argo CD server name
name : server
# -- The number of server pods to run
replicas : 1
## Argo CD server Horizontal Pod Autoscaler
autoscaling :
# -- Enable Horizontal Pod Autoscaler ([HPA]) for the Argo CD server
enabled : false
# -- Minimum number of replicas for the Argo CD server [HPA]
minReplicas : 1
# -- Maximum number of replicas for the Argo CD server [HPA]
maxReplicas : 5
# -- Average CPU utilization percentage for the Argo CD server [HPA]
targetCPUUtilizationPercentage : 50
# -- Average memory utilization percentage for the Argo CD server [HPA]
targetMemoryUtilizationPercentage : 50
# -- Configures the scaling behavior of the target in both Up and Down directions.
behavior : {}
# scaleDown:
# stabilizationWindowSeconds: 300
# policies:
# - type: Pods
# value: 1
# periodSeconds: 180
# scaleUp:
# stabilizationWindowSeconds: 300
# policies:
# - type: Pods
# value: 2
# periodSeconds: 60
2023-07-17 16:53:41 +00:00
# -- Configures custom HPA metrics for the Argo CD server
# Ref: https://kubernetes.io/docs/tasks/run-application/horizontal-pod-autoscale/
metrics : [ ]
2022-11-30 19:11:32 +00:00
## Argo CD server Pod Disruption Budget
## Ref: https://kubernetes.io/docs/tasks/run-application/configure-pdb/
pdb :
# -- Deploy a [PodDisruptionBudget] for the Argo CD server
enabled : false
# -- Labels to be added to Argo CD server pdb
labels : {}
# -- Annotations to be added to Argo CD server pdb
annotations : {}
# -- Number of pods that are available after eviction as number or percentage (eg.: 50%)
# @default -- `""` (defaults to 0 if not specified)
minAvailable : ""
2023-02-28 16:02:48 +00:00
# -- Number of pods that are unavailable after eviction as number or percentage (eg.: 50%).
2022-11-30 19:11:32 +00:00
## Has higher precedence over `server.pdb.minAvailable`
maxUnavailable : ""
## Argo CD server image
image :
# -- Repository to use for the Argo CD server
# @default -- `""` (defaults to global.image.repository)
repository : "" # defaults to global.image.repository
# -- Tag to use for the Argo CD server
# @default -- `""` (defaults to global.image.tag)
tag : "" # defaults to global.image.tag
# -- Image pull policy for the Argo CD server
# @default -- `""` (defaults to global.image.imagePullPolicy)
imagePullPolicy : "" # IfNotPresent
# -- Secrets with credentials to pull images from a private registry
# @default -- `[]` (defaults to global.imagePullSecrets)
imagePullSecrets : [ ]
# -- Additional command line arguments to pass to Argo CD server
extraArgs : [ ]
# -- Environment variables to pass to Argo CD server
env : [ ]
# -- envFrom to pass to Argo CD server
# @default -- `[]` (See [values.yaml])
envFrom : [ ]
# - configMapRef:
# name: config-map-name
# - secretRef:
# name: secret-name
# -- Specify postStart and preStop lifecycle hooks for your argo-cd-server container
lifecycle : {}
2023-01-05 15:42:23 +00:00
## Argo UI extensions
2023-02-28 16:02:48 +00:00
## This function in tech preview stage, do expect instability or breaking changes in newer versions.
2023-01-05 15:42:23 +00:00
## Ref: https://github.com/argoproj-labs/argocd-extensions
extensions :
# -- Enable support for Argo UI extensions
enabled : false
## Argo UI extensions image
image :
# -- Repository to use for extensions image
repository : "ghcr.io/argoproj-labs/argocd-extensions"
# -- Tag to use for extensions image
2023-01-19 17:30:16 +00:00
tag : "v0.2.1"
2023-01-05 15:42:23 +00:00
# -- Image pull policy for extensions
# @default -- `""` (defaults to global.image.imagePullPolicy)
imagePullPolicy : ""
# -- Server UI extensions container-level security context
# @default -- See [values.yaml]
containerSecurityContext :
runAsNonRoot : true
readOnlyRootFilesystem : true
allowPrivilegeEscalation : false
seccompProfile :
type : RuntimeDefault
capabilities :
drop :
- ALL
# -- Resource limits and requests for the argocd-extensions container
resources : {}
# limits:
# cpu: 50m
# memory: 128Mi
# requests:
# cpu: 10m
# memory: 64Mi
# -- Additional containers to be added to the server pod
2023-01-12 21:32:12 +00:00
## Note: Supports use of custom Helm templates
2023-01-05 15:42:23 +00:00
extraContainers : [ ]
# - name: my-sidecar
# image: nginx:latest
# - name: lemonldap-ng-controller
# image: lemonldapng/lemonldap-ng-controller:0.2.0
# args:
# - /lemonldap-ng-controller
# - --alsologtostderr
# - --configmap=$(POD_NAMESPACE)/lemonldap-ng-configuration
# env:
# - name: POD_NAME
# valueFrom:
# fieldRef:
# fieldPath: metadata.name
# - name: POD_NAMESPACE
# valueFrom:
# fieldRef:
# fieldPath: metadata.namespace
# volumeMounts:
# - name: copy-portal-skins
# mountPath: /srv/var/lib/lemonldap-ng/portal/skins
# -- Init containers to add to the server pod
## If your target Kubernetes cluster(s) require a custom credential (exec) plugin
## you could use this (and the same in the application controller pod) to provide such executable
## Ref: https://kubernetes.io/docs/reference/access-authn-authz/authentication/#client-go-credential-plugins
initContainers : [ ]
# - name: download-tools
# image: alpine:3
# command: [sh, -c]
# args:
# - wget -qO kubelogin.zip https://github.com/Azure/kubelogin/releases/download/v0.0.25/kubelogin-linux-amd64.zip &&
# unzip kubelogin.zip && mv bin/linux_amd64/kubelogin /custom-tools/
# volumeMounts:
# - mountPath: /custom-tools
# name: custom-tools
# -- Additional volumeMounts to the server main container
volumeMounts : [ ]
# - mountPath: /usr/local/bin/kubelogin
# name: custom-tools
# subPath: kubelogin
# -- Additional volumes to the server pod
volumes : [ ]
# - name: custom-tools
# emptyDir: {}
2022-11-30 19:11:32 +00:00
2022-12-02 06:33:44 +00:00
# -- Annotations to be added to server Deployment
deploymentAnnotations : {}
2022-11-30 19:11:32 +00:00
# -- Annotations to be added to server pods
podAnnotations : {}
# -- Labels to be added to server pods
podLabels : {}
2023-01-05 15:42:23 +00:00
# -- Resource limits and requests for the Argo CD server
resources : {}
# limits:
# cpu: 100m
# memory: 128Mi
# requests:
# cpu: 50m
# memory: 64Mi
2023-01-24 15:10:05 +00:00
# Server container ports
containerPorts :
# -- Server container port
server : 8080
# -- Metrics container port
2023-03-16 00:29:51 +00:00
metrics : 8083
2023-01-24 15:10:05 +00:00
2023-02-07 14:35:29 +00:00
# -- Host Network for Server pods
hostNetwork : false
2023-02-16 16:33:45 +00:00
# -- [DNS configuration]
dnsConfig : {}
2023-02-07 14:35:29 +00:00
# -- Alternative DNS policy for Server pods
dnsPolicy : "ClusterFirst"
2023-01-24 15:10:05 +00:00
# -- Server container-level security context
# @default -- See [values.yaml]
containerSecurityContext :
runAsNonRoot : true
readOnlyRootFilesystem : true
allowPrivilegeEscalation : false
seccompProfile :
type : RuntimeDefault
capabilities :
drop :
- ALL
2022-11-30 19:11:32 +00:00
## Readiness and liveness probes for default backend
## Ref: https://kubernetes.io/docs/tasks/configure-pod-container/configure-liveness-readiness-probes/
readinessProbe :
# -- Minimum consecutive failures for the [probe] to be considered failed after having succeeded
failureThreshold : 3
# -- Number of seconds after the container has started before [probe] is initiated
initialDelaySeconds : 10
# -- How often (in seconds) to perform the [probe]
periodSeconds : 10
# -- Minimum consecutive successes for the [probe] to be considered successful after having failed
successThreshold : 1
# -- Number of seconds after which the [probe] times out
timeoutSeconds : 1
2023-01-24 15:10:05 +00:00
2022-11-30 19:11:32 +00:00
livenessProbe :
# -- Minimum consecutive failures for the [probe] to be considered failed after having succeeded
failureThreshold : 3
# -- Number of seconds after the container has started before [probe] is initiated
initialDelaySeconds : 10
# -- How often (in seconds) to perform the [probe]
periodSeconds : 10
# -- Minimum consecutive successes for the [probe] to be considered successful after having failed
successThreshold : 1
# -- Number of seconds after which the [probe] times out
timeoutSeconds : 1
2023-10-27 19:54:27 +00:00
# -- terminationGracePeriodSeconds for container lifecycle hook
terminationGracePeriodSeconds : 30
2023-03-02 16:00:02 +00:00
# -- Priority class for the Argo CD server pods
# @default -- `""` (defaults to global.priorityClassName)
priorityClassName : ""
2022-11-30 19:11:32 +00:00
# -- [Node selector]
2023-03-02 16:00:02 +00:00
# @default -- `{}` (defaults to global.nodeSelector)
2022-11-30 19:11:32 +00:00
nodeSelector : {}
2023-03-02 16:00:02 +00:00
2022-11-30 19:11:32 +00:00
# -- [Tolerations] for use with node taints
2023-03-02 16:00:02 +00:00
# @default -- `[]` (defaults to global.tolerations)
2022-11-30 19:11:32 +00:00
tolerations : [ ]
2023-03-02 16:00:02 +00:00
2022-11-30 19:11:32 +00:00
# -- Assign custom [affinity] rules to the deployment
2023-02-22 15:04:28 +00:00
# @default -- `{}` (defaults to global.affinity preset)
2022-11-30 19:11:32 +00:00
affinity : {}
# -- Assign custom [TopologySpreadConstraints] rules to the Argo CD server
2023-03-02 16:00:02 +00:00
# @default -- `[]` (defaults to global.topologySpreadConstraints)
2022-11-30 19:11:32 +00:00
## Ref: https://kubernetes.io/docs/concepts/workloads/pods/pod-topology-spread-constraints/
## If labelSelector is left out, it will default to the labelSelector configuration of the deployment
topologySpreadConstraints : [ ]
2023-03-02 16:00:02 +00:00
# - maxSkew: 1
# topologyKey: topology.kubernetes.io/zone
# whenUnsatisfiable: DoNotSchedule
2022-11-30 19:11:32 +00:00
2023-04-04 14:10:50 +00:00
# -- Deployment strategy to be added to the server Deployment
deploymentStrategy : {}
# type: RollingUpdate
# rollingUpdate:
# maxSurge: 25%
# maxUnavailable: 25%
2022-11-30 19:11:32 +00:00
# TLS certificate configuration via cert-manager
## Ref: https://argo-cd.readthedocs.io/en/stable/operator-manual/tls/#tls-certificates-used-by-argocd-server
certificate :
# -- Deploy a Certificate resource (requires cert-manager)
enabled : false
# -- The name of the Secret that will be automatically created and managed by this Certificate resource
secretName : argocd-server-tls
# -- Certificate primary domain (commonName)
domain : argocd.example.com
# -- Certificate Subject Alternate Names (SANs)
additionalHosts : [ ]
# -- The requested 'duration' (i.e. lifetime) of the certificate.
# @default -- `""` (defaults to 2160h = 90d if not specified)
## Ref: https://cert-manager.io/docs/usage/certificate/#renewal
duration : ""
# -- How long before the expiry a certificate should be renewed.
# @default -- `""` (defaults to 360h = 15d if not specified)
## Ref: https://cert-manager.io/docs/usage/certificate/#renewal
renewBefore : ""
# Certificate issuer
## Ref: https://cert-manager.io/docs/concepts/issuer
issuer :
# -- Certificate issuer group. Set if using an external issuer. Eg. `cert-manager.io`
group : ""
# -- Certificate issuer kind. Either `Issuer` or `ClusterIssuer`
kind : ""
2023-02-28 16:02:48 +00:00
# -- Certificate issuer name. Eg. `letsencrypt`
2022-11-30 19:11:32 +00:00
name : ""
# Private key of the certificate
privateKey :
# -- Rotation policy of private key when certificate is re-issued. Either: `Never` or `Always`
rotationPolicy : Never
# -- The private key cryptography standards (PKCS) encoding for private key. Either: `PCKS1` or `PKCS8`
encoding : PKCS1
# -- Algorithm used to generate certificate private key. One of: `RSA`, `Ed25519` or `ECDSA`
algorithm : RSA
# -- Key bit size of the private key. If algorithm is set to `Ed25519`, size is ignored.
size : 2048
2023-07-11 21:23:57 +00:00
# -- Annotations to be applied to the Server Certificate
annotations : {}
2023-07-03 14:24:29 +00:00
# -- Usages for the certificate
### Ref: https://cert-manager.io/docs/reference/api-docs/#cert-manager.io/v1.KeyUsage
usages : [ ]
2022-11-30 19:11:32 +00:00
# TLS certificate configuration via Secret
## Ref: https://argo-cd.readthedocs.io/en/stable/operator-manual/tls/#tls-certificates-used-by-argocd-server
certificateSecret :
# -- Create argocd-server-tls secret
enabled : false
# -- Annotations to be added to argocd-server-tls secret
annotations : {}
# -- Labels to be added to argocd-server-tls secret
labels : {}
# -- Private Key of the certificate
key : ''
# -- Certificate data
crt : ''
## Server service configuration
service :
# -- Server service annotations
annotations : {}
# -- Server service labels
labels : {}
# -- Server service type
type : ClusterIP
# -- Server service http port for NodePort service type (only if `server.service.type` is set to "NodePort")
nodePortHttp : 30080
# -- Server service https port for NodePort service type (only if `server.service.type` is set to "NodePort")
nodePortHttps : 30443
# -- Server service http port
servicePortHttp : 80
# -- Server service https port
servicePortHttps : 443
# -- Server service http port name, can be used to route traffic via istio
servicePortHttpName : http
# -- Server service https port name, can be used to route traffic via istio
servicePortHttpsName : https
2023-05-30 11:33:49 +00:00
# -- Server service https port appProtocol. (should be upper case - i.e. HTTPS)
# servicePortHttpsAppProtocol: HTTPS
2022-11-30 19:11:32 +00:00
# -- LoadBalancer will get created with the IP specified in this field
loadBalancerIP : ""
# -- Source IP ranges to allow access to service from
loadBalancerSourceRanges : [ ]
# -- Server service external IPs
externalIPs : [ ]
# -- Denotes if this Service desires to route external traffic to node-local or cluster-wide endpoints
externalTrafficPolicy : ""
# -- Used to maintain session affinity. Supports `ClientIP` and `None`
sessionAffinity : ""
## Server metrics service configuration
metrics :
# -- Deploy metrics service
enabled : false
service :
2023-05-12 13:19:04 +00:00
# -- Metrics service type
type : ClusterIP
# -- Metrics service clusterIP. `None` makes a "headless service" (no virtual IP)
clusterIP : ""
2022-11-30 19:11:32 +00:00
# -- Metrics service annotations
annotations : {}
# -- Metrics service labels
labels : {}
# -- Metrics service port
servicePort : 8083
# -- Metrics service port name
portName : http-metrics
serviceMonitor :
# -- Enable a prometheus ServiceMonitor
enabled : false
# -- Prometheus ServiceMonitor interval
interval : 30s
# -- Prometheus [RelabelConfigs] to apply to samples before scraping
relabelings : [ ]
# -- Prometheus [MetricRelabelConfigs] to apply to samples before ingestion
metricRelabelings : [ ]
# -- Prometheus ServiceMonitor selector
selector : {}
# prometheus: kube-prometheus
# -- Prometheus ServiceMonitor scheme
scheme : ""
# -- Prometheus ServiceMonitor tlsConfig
tlsConfig : {}
# -- Prometheus ServiceMonitor namespace
namespace : "" # monitoring
# -- Prometheus ServiceMonitor labels
additionalLabels : {}
# -- Prometheus ServiceMonitor annotations
annotations : {}
serviceAccount :
# -- Create server service account
create : true
# -- Server service account name
name : argocd-server
# -- Annotations applied to created service account
annotations : {}
# -- Labels applied to created service account
labels : {}
# -- Automount API credentials for the Service Account
automountServiceAccountToken : true
ingress :
# -- Enable an ingress resource for the Argo CD server
enabled : false
# -- Additional ingress annotations
annotations : {}
# -- Additional ingress labels
labels : {}
# -- Defines which ingress controller will implement the resource
ingressClassName : ""
# -- List of ingress hosts
## Argo Ingress.
## Hostnames must be provided if Ingress is enabled.
## Secrets must be manually created in the namespace
2023-01-05 15:42:23 +00:00
hosts : [ ]
2022-11-30 19:11:32 +00:00
# - argocd.example.com
# -- List of ingress paths
paths :
- /
# -- Ingress path type. One of `Exact`, `Prefix` or `ImplementationSpecific`
pathType : Prefix
# -- Additional ingress paths
2023-01-05 15:42:23 +00:00
extraPaths : [ ]
2022-11-30 19:11:32 +00:00
# - path: /*
# pathType: Prefix
# backend:
# service:
# name: ssl-redirect
# port:
# name: use-annotation
# -- Ingress TLS configuration
2023-01-05 15:42:23 +00:00
tls : [ ]
2022-11-30 19:11:32 +00:00
# - secretName: your-certificate-name
# hosts:
# - argocd.example.com
# -- Uses `server.service.servicePortHttps` instead `server.service.servicePortHttp`
https : false
# dedicated ingress for gRPC as documented at
# Ref: https://argo-cd.readthedocs.io/en/stable/operator-manual/ingress/
ingressGrpc :
# -- Enable an ingress resource for the Argo CD server for dedicated [gRPC-ingress]
enabled : false
# -- Setup up gRPC ingress to work with an AWS ALB
isAWSALB : false
# -- Additional ingress annotations for dedicated [gRPC-ingress]
annotations : {}
# -- Additional ingress labels for dedicated [gRPC-ingress]
labels : {}
# -- Defines which ingress controller will implement the resource [gRPC-ingress]
ingressClassName : ""
awsALB :
# -- Service type for the AWS ALB gRPC service
## Service Type if isAWSALB is set to true
## Can be of type NodePort or ClusterIP depending on which mode you are
## are running. Instance mode needs type NodePort, IP mode needs type
## ClusterIP
## Ref: https://kubernetes-sigs.github.io/aws-load-balancer-controller/v2.2/how-it-works/#ingress-traffic
serviceType : NodePort
# -- Backend protocol version for the AWS ALB gRPC service
## This tells AWS to send traffic from the ALB using HTTP2. Can use gRPC as well if you want to leverage gRPC specific features
backendProtocolVersion : HTTP2
# -- List of ingress hosts for dedicated [gRPC-ingress]
## Argo Ingress.
## Hostnames must be provided if Ingress is enabled.
## Secrets must be manually created in the namespace
##
2023-01-05 15:42:23 +00:00
hosts : [ ]
2022-11-30 19:11:32 +00:00
# - argocd.example.com
# -- List of ingress paths for dedicated [gRPC-ingress]
paths :
- /
# -- Ingress path type for dedicated [gRPC-ingress]. One of `Exact`, `Prefix` or `ImplementationSpecific`
pathType : Prefix
# -- Additional ingress paths for dedicated [gRPC-ingress]
2023-01-05 15:42:23 +00:00
extraPaths : [ ]
2022-11-30 19:11:32 +00:00
# - path: /*
# pathType: Prefix
# backend:
# service:
# name: ssl-redirect
# port:
# name: use-annotation
# -- Ingress TLS configuration for dedicated [gRPC-ingress]
2023-01-05 15:42:23 +00:00
tls : [ ]
2022-11-30 19:11:32 +00:00
# - secretName: your-certificate-name
# hosts:
# - argocd.example.com
# -- Uses `server.service.servicePortHttps` instead `server.service.servicePortHttp`
https : false
# Create a OpenShift Route with SSL passthrough for UI and CLI
# Consider setting 'hostname' e.g. https://argocd.apps-crc.testing/ using your Default Ingress Controller Domain
# Find your domain with: kubectl describe --namespace=openshift-ingress-operator ingresscontroller/default | grep Domain:
# If 'hostname' is an empty string "" OpenShift will create a hostname for you.
route :
# -- Enable an OpenShift Route for the Argo CD server
enabled : false
# -- Openshift Route annotations
annotations : {}
# -- Hostname of OpenShift Route
hostname : ""
# -- Termination type of Openshift Route
termination_type : passthrough
# -- Termination policy of Openshift Route
termination_policy : None
GKEbackendConfig :
# -- Enable BackendConfig custom resource for Google Kubernetes Engine
enabled : false
# -- [BackendConfigSpec]
spec : {}
2023-01-05 15:42:23 +00:00
# spec:
# iap:
# enabled: true
# oauthclientCredentials:
# secretName: argocd-secret
2022-11-30 19:11:32 +00:00
2023-01-05 15:42:23 +00:00
## Create a Google Managed Certificate for use with the GKE Ingress Controller
## https://cloud.google.com/kubernetes-engine/docs/how-to/managed-certs
GKEmanagedCertificate :
# -- Enable ManagedCertificate custom resource for Google Kubernetes Engine.
enabled : false
# -- Domains for the Google Managed Certificate
domains :
- argocd.example.com
## Create a Google FrontendConfig Custom Resource, for use with the GKE Ingress Controller
## https://cloud.google.com/kubernetes-engine/docs/how-to/ingress-features#configuring_ingress_features_through_frontendconfig_parameters
GKEfrontendConfig :
# -- Enable FrontConfig custom resource for Google Kubernetes Engine
enabled : false
# -- [FrontendConfigSpec]
spec : {}
# spec:
# redirectToHttps:
# enabled: true
# responseCodeName: RESPONSE_CODE
2022-11-30 19:11:32 +00:00
## Repo Server
repoServer :
# -- Repo server name
name : repo-server
# -- The number of repo server pods to run
replicas : 1
## Repo server Horizontal Pod Autoscaler
autoscaling :
# -- Enable Horizontal Pod Autoscaler ([HPA]) for the repo server
enabled : false
# -- Minimum number of replicas for the repo server [HPA]
minReplicas : 1
# -- Maximum number of replicas for the repo server [HPA]
maxReplicas : 5
# -- Average CPU utilization percentage for the repo server [HPA]
targetCPUUtilizationPercentage : 50
# -- Average memory utilization percentage for the repo server [HPA]
targetMemoryUtilizationPercentage : 50
# -- Configures the scaling behavior of the target in both Up and Down directions.
behavior : {}
# scaleDown:
# stabilizationWindowSeconds: 300
# policies:
# - type: Pods
# value: 1
# periodSeconds: 180
# scaleUp:
# stabilizationWindowSeconds: 300
# policies:
# - type: Pods
# value: 2
# periodSeconds: 60
2023-07-17 16:53:41 +00:00
# -- Configures custom HPA metrics for the Argo CD repo server
# Ref: https://kubernetes.io/docs/tasks/run-application/horizontal-pod-autoscale/
metrics : [ ]
2022-11-30 19:11:32 +00:00
## Repo server Pod Disruption Budget
## Ref: https://kubernetes.io/docs/tasks/run-application/configure-pdb/
pdb :
# -- Deploy a [PodDisruptionBudget] for the repo server
enabled : false
# -- Labels to be added to repo server pdb
labels : {}
# -- Annotations to be added to repo server pdb
annotations : {}
# -- Number of pods that are available after eviction as number or percentage (eg.: 50%)
# @default -- `""` (defaults to 0 if not specified)
minAvailable : ""
2023-02-28 16:02:48 +00:00
# -- Number of pods that are unavailable after eviction as number or percentage (eg.: 50%).
2022-11-30 19:11:32 +00:00
## Has higher precedence over `repoServer.pdb.minAvailable`
maxUnavailable : ""
## Repo server image
image :
# -- Repository to use for the repo server
# @default -- `""` (defaults to global.image.repository)
2023-01-05 15:42:23 +00:00
repository : ""
2022-11-30 19:11:32 +00:00
# -- Tag to use for the repo server
# @default -- `""` (defaults to global.image.tag)
2023-01-05 15:42:23 +00:00
tag : ""
2022-11-30 19:11:32 +00:00
# -- Image pull policy for the repo server
# @default -- `""` (defaults to global.image.imagePullPolicy)
2023-01-05 15:42:23 +00:00
imagePullPolicy : ""
2022-11-30 19:11:32 +00:00
# -- Secrets with credentials to pull images from a private registry
# @default -- `[]` (defaults to global.imagePullSecrets)
imagePullSecrets : [ ]
# -- Additional command line arguments to pass to repo server
extraArgs : [ ]
# -- Environment variables to pass to repo server
env : [ ]
# -- envFrom to pass to repo server
# @default -- `[]` (See [values.yaml])
envFrom : [ ]
# - configMapRef:
# name: config-map-name
# - secretRef:
# name: secret-name
2023-05-18 13:50:46 +00:00
# -- Specify postStart and preStop lifecycle hooks for your argo-repo-server container
lifecycle : {}
2023-01-05 15:42:23 +00:00
# -- Additional containers to be added to the repo server pod
## Ref: https://argo-cd.readthedocs.io/en/stable/user-guide/config-management-plugins/
2023-01-12 21:32:12 +00:00
## Note: Supports use of custom Helm templates
2023-01-05 15:42:23 +00:00
extraContainers : [ ]
2023-03-14 21:10:14 +00:00
# - name: cmp-my-plugin
# command:
# - "/var/run/argocd/argocd-cmp-server"
# image: busybox
# securityContext:
# runAsNonRoot: true
# runAsUser: 999
# volumeMounts:
# - mountPath: /var/run/argocd
# name: var-files
# - mountPath: /home/argocd/cmp-server/plugins
# name: plugins
# # Remove this volumeMount if you've chosen to bake the config file into the sidecar image.
# - mountPath: /home/argocd/cmp-server/config/plugin.yaml
# subPath: my-plugin.yaml
# name: argocd-cmp-cm
# # Starting with v2.4, do NOT mount the same tmp volume as the repo-server container. The filesystem separation helps
# # mitigate path traversal attacks.
# - mountPath: /tmp
# name: cmp-tmp
# - name: cmp-my-plugin2
# command:
# - "/var/run/argocd/argocd-cmp-server"
# image: busybox
# securityContext:
# runAsNonRoot: true
# runAsUser: 999
# volumeMounts:
# - mountPath: /var/run/argocd
# name: var-files
# # Remove this volumeMount if you've chosen to bake the config file into the sidecar image.
# - mountPath: /home/argocd/cmp-server/plugins
# name: plugins
# - mountPath: /home/argocd/cmp-server/config/plugin.yaml
# subPath: my-plugin2.yaml
# name: argocd-cmp-cm
# # Starting with v2.4, do NOT mount the same tmp volume as the repo-server container. The filesystem separation helps
# # mitigate path traversal attacks.
# - mountPath: /tmp
# name: cmp-tmp
2023-01-05 15:42:23 +00:00
# -- Init containers to add to the repo server pods
initContainers : [ ]
# -- Additional volumeMounts to the repo server main container
volumeMounts : [ ]
# -- Additional volumes to the repo server pod
volumes : [ ]
2023-03-14 21:10:14 +00:00
# - name: argocd-cmp-cm
2023-01-05 15:42:23 +00:00
# configMap:
2023-03-14 21:10:14 +00:00
# name: argocd-cmp-cm
2023-01-05 15:42:23 +00:00
# - name: cmp-tmp
# emptyDir: {}
2022-11-30 19:11:32 +00:00
2023-09-11 12:18:22 +00:00
# -- Toggle the usage of a ephemeral Helm working directory
useEphemeralHelmWorkingDir : true
2022-12-02 06:33:44 +00:00
# -- Annotations to be added to repo server Deployment
deploymentAnnotations : {}
2022-11-30 19:11:32 +00:00
# -- Annotations to be added to repo server pods
podAnnotations : {}
# -- Labels to be added to repo server pods
podLabels : {}
2023-01-05 15:42:23 +00:00
# -- Resource limits and requests for the repo server pods
resources : {}
# limits:
# cpu: 50m
# memory: 128Mi
# requests:
# cpu: 10m
# memory: 64Mi
2023-01-24 15:10:05 +00:00
# Repo server container ports
containerPorts :
# -- Repo server container port
server : 8081
# -- Metrics container port
metrics : 8084
2023-02-07 14:35:29 +00:00
# -- Host Network for Repo server pods
hostNetwork : false
2023-02-16 16:33:45 +00:00
# -- [DNS configuration]
dnsConfig : {}
2023-02-07 14:35:29 +00:00
# -- Alternative DNS policy for Repo server pods
dnsPolicy : "ClusterFirst"
2023-01-24 15:10:05 +00:00
# -- Repo server container-level security context
# @default -- See [values.yaml]
containerSecurityContext :
runAsNonRoot : true
readOnlyRootFilesystem : true
allowPrivilegeEscalation : false
seccompProfile :
type : RuntimeDefault
capabilities :
drop :
- ALL
2022-11-30 19:11:32 +00:00
## Readiness and liveness probes for default backend
## Ref: https://kubernetes.io/docs/tasks/configure-pod-container/configure-liveness-readiness-probes/
readinessProbe :
# -- Minimum consecutive failures for the [probe] to be considered failed after having succeeded
failureThreshold : 3
# -- Number of seconds after the container has started before [probe] is initiated
initialDelaySeconds : 10
# -- How often (in seconds) to perform the [probe]
periodSeconds : 10
# -- Minimum consecutive successes for the [probe] to be considered successful after having failed
successThreshold : 1
# -- Number of seconds after which the [probe] times out
timeoutSeconds : 1
2023-01-24 15:10:05 +00:00
2022-11-30 19:11:32 +00:00
livenessProbe :
# -- Minimum consecutive failures for the [probe] to be considered failed after having succeeded
failureThreshold : 3
# -- Number of seconds after the container has started before [probe] is initiated
initialDelaySeconds : 10
# -- How often (in seconds) to perform the [probe]
periodSeconds : 10
# -- Minimum consecutive successes for the [probe] to be considered successful after having failed
successThreshold : 1
# -- Number of seconds after which the [probe] times out
timeoutSeconds : 1
2023-10-27 19:54:27 +00:00
# -- terminationGracePeriodSeconds for container lifecycle hook
terminationGracePeriodSeconds : 30
2022-11-30 19:11:32 +00:00
# -- [Node selector]
2023-03-02 16:00:02 +00:00
# @default -- `{}` (defaults to global.nodeSelector)
2022-11-30 19:11:32 +00:00
nodeSelector : {}
2023-03-02 16:00:02 +00:00
2022-11-30 19:11:32 +00:00
# -- [Tolerations] for use with node taints
2023-03-02 16:00:02 +00:00
# @default -- `[]` (defaults to global.tolerations)
2022-11-30 19:11:32 +00:00
tolerations : [ ]
2023-03-02 16:00:02 +00:00
2022-11-30 19:11:32 +00:00
# -- Assign custom [affinity] rules to the deployment
2023-02-22 15:04:28 +00:00
# @default -- `{}` (defaults to global.affinity preset)
2022-11-30 19:11:32 +00:00
affinity : {}
# -- Assign custom [TopologySpreadConstraints] rules to the repo server
2023-03-02 16:00:02 +00:00
# @default -- `[]` (defaults to global.topologySpreadConstraints)
2022-11-30 19:11:32 +00:00
## Ref: https://kubernetes.io/docs/concepts/workloads/pods/pod-topology-spread-constraints/
## If labelSelector is left out, it will default to the labelSelector configuration of the deployment
topologySpreadConstraints : [ ]
2023-03-02 16:00:02 +00:00
# - maxSkew: 1
# topologyKey: topology.kubernetes.io/zone
# whenUnsatisfiable: DoNotSchedule
2022-11-30 19:11:32 +00:00
2023-04-04 14:10:50 +00:00
# -- Deployment strategy to be added to the repo server Deployment
deploymentStrategy : {}
# type: RollingUpdate
# rollingUpdate:
# maxSurge: 25%
# maxUnavailable: 25%
2023-03-02 16:00:02 +00:00
# -- Priority class for the repo server pods
# @default -- `""` (defaults to global.priorityClassName)
2022-11-30 19:11:32 +00:00
priorityClassName : ""
# TLS certificate configuration via Secret
## Ref: https://argo-cd.readthedocs.io/en/stable/operator-manual/tls/#configuring-tls-to-argocd-repo-server
## Note: Issuing certificates via cert-manager in not supported right now because it's not possible to restart repo server automatically without extra controllers.
certificateSecret :
# -- Create argocd-repo-server-tls secret
enabled : false
# -- Annotations to be added to argocd-repo-server-tls secret
annotations : {}
# -- Labels to be added to argocd-repo-server-tls secret
labels : {}
# -- Certificate authority. Required for self-signed certificates.
ca : ''
# -- Certificate private key
key : ''
# -- Certificate data. Must contain SANs of Repo service (ie: argocd-repo-server, argocd-repo-server.argo-cd.svc)
crt : ''
## Repo server service configuration
service :
# -- Repo server service annotations
annotations : {}
# -- Repo server service labels
labels : {}
# -- Repo server service port
port : 8081
# -- Repo server service port name
portName : https-repo-server
## Repo server metrics service configuration
metrics :
# -- Deploy metrics service
enabled : false
service :
2023-05-12 13:19:04 +00:00
# -- Metrics service type
type : ClusterIP
# -- Metrics service clusterIP. `None` makes a "headless service" (no virtual IP)
clusterIP : ""
2022-11-30 19:11:32 +00:00
# -- Metrics service annotations
annotations : {}
# -- Metrics service labels
labels : {}
# -- Metrics service port
servicePort : 8084
# -- Metrics service port name
portName : http-metrics
serviceMonitor :
# -- Enable a prometheus ServiceMonitor
enabled : false
# -- Prometheus ServiceMonitor interval
interval : 30s
# -- Prometheus [RelabelConfigs] to apply to samples before scraping
relabelings : [ ]
# -- Prometheus [MetricRelabelConfigs] to apply to samples before ingestion
metricRelabelings : [ ]
# -- Prometheus ServiceMonitor selector
selector : {}
# prometheus: kube-prometheus
# -- Prometheus ServiceMonitor scheme
scheme : ""
# -- Prometheus ServiceMonitor tlsConfig
tlsConfig : {}
# -- Prometheus ServiceMonitor namespace
namespace : "" # "monitoring"
# -- Prometheus ServiceMonitor labels
additionalLabels : {}
# -- Prometheus ServiceMonitor annotations
annotations : {}
## Enable Custom Rules for the Repo server's Cluster Role resource
## Enable this and set the rules: to whatever custom rules you want for the Cluster Role resource.
## Defaults to off
clusterRoleRules :
# -- Enable custom rules for the Repo server's Cluster Role resource
enabled : false
# -- List of custom rules for the Repo server's Cluster Role resource
rules : [ ]
## Repo server service account
## If create is set to true, make sure to uncomment the name and update the rbac section below
serviceAccount :
# -- Create repo server service account
create : true
# -- Repo server service account name
name : "" # "argocd-repo-server"
# -- Annotations applied to created service account
annotations : {}
# -- Labels applied to created service account
labels : {}
# -- Automount API credentials for the Service Account
automountServiceAccountToken : true
# -- Repo server rbac rules
rbac : [ ]
# - apiGroups:
# - argoproj.io
# resources:
# - applications
# verbs:
# - get
# - list
# - watch
## ApplicationSet controller
applicationSet :
# -- Enable ApplicationSet controller
enabled : true
2022-12-15 17:25:29 +00:00
# -- ApplicationSet controller name string
2022-11-30 19:11:32 +00:00
name : applicationset-controller
# -- The number of ApplicationSet controller pods to run
2023-08-09 20:00:55 +00:00
replicas : 1
2022-11-30 19:11:32 +00:00
## ApplicationSet controller Pod Disruption Budget
## Ref: https://kubernetes.io/docs/tasks/run-application/configure-pdb/
pdb :
# -- Deploy a [PodDisruptionBudget] for the ApplicationSet controller
enabled : false
# -- Labels to be added to ApplicationSet controller pdb
labels : {}
# -- Annotations to be added to ApplicationSet controller pdb
annotations : {}
# -- Number of pods that are available after eviction as number or percentage (eg.: 50%)
# @default -- `""` (defaults to 0 if not specified)
minAvailable : ""
2023-02-28 16:02:48 +00:00
# -- Number of pods that are unavailable after eviction as number or percentage (eg.: 50%).
2022-11-30 19:11:32 +00:00
## Has higher precedence over `applicationSet.pdb.minAvailable`
maxUnavailable : ""
## ApplicationSet controller image
image :
2022-12-15 17:25:29 +00:00
# -- Repository to use for the ApplicationSet controller
2022-11-30 19:11:32 +00:00
# @default -- `""` (defaults to global.image.repository)
repository : ""
2022-12-15 17:25:29 +00:00
# -- Tag to use for the ApplicationSet controller
2022-11-30 19:11:32 +00:00
# @default -- `""` (defaults to global.image.tag)
tag : ""
2022-12-15 17:25:29 +00:00
# -- Image pull policy for the ApplicationSet controller
2022-11-30 19:11:32 +00:00
# @default -- `""` (defaults to global.image.imagePullPolicy)
imagePullPolicy : ""
# -- If defined, uses a Secret to pull an image from a private Docker registry or repository.
# @default -- `[]` (defaults to global.imagePullSecrets)
imagePullSecrets : [ ]
2023-02-07 20:34:08 +00:00
# -- DEPRECATED - ApplicationSet controller command line flags
args : {}
# DEPRECATED - Use configs.params.applicationsetcontroller.policy to override
2022-11-30 19:11:32 +00:00
# -- How application is synced between the generator and the cluster
2023-02-07 20:34:08 +00:00
# policy: sync
# DEPRECATED - Use configs.params.applicationsetcontroller.dryrun to override
2022-11-30 19:11:32 +00:00
# -- Enable dry run mode
2023-02-07 20:34:08 +00:00
# dryRun: false
2022-11-30 19:11:32 +00:00
2023-01-05 15:42:23 +00:00
# -- List of extra cli args to add
extraArgs : [ ]
# -- Environment variables to pass to the ApplicationSet controller
extraEnv : [ ]
# - name: "MY_VAR"
# value: "value"
# -- envFrom to pass to the ApplicationSet controller
# @default -- `[]` (See [values.yaml])
extraEnvFrom : [ ]
# - configMapRef:
# name: config-map-name
# - secretRef:
# name: secret-name
2022-11-30 19:11:32 +00:00
2022-12-15 17:25:29 +00:00
# -- Additional containers to be added to the ApplicationSet controller pod
2023-01-12 21:32:12 +00:00
## Note: Supports use of custom Helm templates
2022-11-30 19:11:32 +00:00
extraContainers : [ ]
2023-01-12 21:32:12 +00:00
# -- Init containers to add to the ApplicationSet controller pod
## Note: Supports use of custom Helm templates
initContainers : [ ]
2023-01-05 15:42:23 +00:00
# -- List of extra mounts to add (normally used with extraVolumes)
extraVolumeMounts : [ ]
# -- List of extra volumes to add
extraVolumes : [ ]
2022-11-30 19:11:32 +00:00
## Metrics service configuration
metrics :
# -- Deploy metrics service
enabled : false
service :
2023-05-12 13:19:04 +00:00
# -- Metrics service type
type : ClusterIP
# -- Metrics service clusterIP. `None` makes a "headless service" (no virtual IP)
clusterIP : ""
2022-11-30 19:11:32 +00:00
# -- Metrics service annotations
annotations : {}
# -- Metrics service labels
labels : {}
# -- Metrics service port
2023-06-26 15:58:13 +00:00
servicePort : 8080
2022-11-30 19:11:32 +00:00
# -- Metrics service port name
portName : http-metrics
serviceMonitor :
# -- Enable a prometheus ServiceMonitor
enabled : false
# -- Prometheus ServiceMonitor interval
interval : 30s
# -- Prometheus [RelabelConfigs] to apply to samples before scraping
relabelings : [ ]
# -- Prometheus [MetricRelabelConfigs] to apply to samples before ingestion
metricRelabelings : [ ]
# -- Prometheus ServiceMonitor selector
selector : {}
# prometheus: kube-prometheus
# -- Prometheus ServiceMonitor scheme
scheme : ""
# -- Prometheus ServiceMonitor tlsConfig
tlsConfig : {}
# -- Prometheus ServiceMonitor namespace
namespace : "" # monitoring
# -- Prometheus ServiceMonitor labels
additionalLabels : {}
# -- Prometheus ServiceMonitor annotations
annotations : {}
2022-12-15 17:25:29 +00:00
## ApplicationSet service configuration
2022-11-30 19:11:32 +00:00
service :
2022-12-15 17:25:29 +00:00
# -- ApplicationSet service annotations
2022-11-30 19:11:32 +00:00
annotations : {}
2022-12-15 17:25:29 +00:00
# -- ApplicationSet service labels
2022-11-30 19:11:32 +00:00
labels : {}
2023-05-08 19:57:58 +00:00
# -- ApplicationSet service type
type : ClusterIP
2022-12-15 17:25:29 +00:00
# -- ApplicationSet service port
2022-11-30 19:11:32 +00:00
port : 7000
2022-12-15 17:25:29 +00:00
# -- ApplicationSet service port name
2022-11-30 19:11:32 +00:00
portName : webhook
serviceAccount :
2023-01-24 15:10:05 +00:00
# -- Create ApplicationSet controller service account
2022-11-30 19:11:32 +00:00
create : true
2023-01-24 15:10:05 +00:00
# -- ApplicationSet controller service account name
name : argocd-applicationset-controller
# -- Annotations applied to created service account
2022-11-30 19:11:32 +00:00
annotations : {}
# -- Labels applied to created service account
labels : {}
2023-01-24 15:10:05 +00:00
# -- Automount API credentials for the Service Account
automountServiceAccountToken : true
2022-11-30 19:11:32 +00:00
2022-12-02 06:33:44 +00:00
# -- Annotations to be added to ApplicationSet controller Deployment
deploymentAnnotations : {}
2022-12-15 17:25:29 +00:00
# -- Annotations for the ApplicationSet controller pods
2022-11-30 19:11:32 +00:00
podAnnotations : {}
2022-12-15 17:25:29 +00:00
# -- Labels for the ApplicationSet controller pods
2022-11-30 19:11:32 +00:00
podLabels : {}
2023-01-05 15:42:23 +00:00
# -- Resource limits and requests for the ApplicationSet controller pods.
resources : {}
# limits:
# cpu: 100m
# memory: 128Mi
# requests:
# cpu: 100m
# memory: 128Mi
2023-01-24 15:10:05 +00:00
# ApplicationSet controller container ports
containerPorts :
# -- Metrics container port
2023-06-26 15:58:13 +00:00
metrics : 8080
2023-01-24 15:10:05 +00:00
# -- Probe container port
probe : 8081
# -- Webhook container port
webhook : 7000
2023-02-16 16:33:45 +00:00
# -- [DNS configuration]
dnsConfig : {}
# -- Alternative DNS policy for ApplicationSet controller pods
dnsPolicy : "ClusterFirst"
2022-11-30 19:11:32 +00:00
# -- ApplicationSet controller container-level security context
# @default -- See [values.yaml]
containerSecurityContext :
runAsNonRoot : true
readOnlyRootFilesystem : true
allowPrivilegeEscalation : false
seccompProfile :
type : RuntimeDefault
capabilities :
drop :
- ALL
## Probes for ApplicationSet controller (optional)
## Ref: https://kubernetes.io/docs/tasks/configure-pod-container/configure-liveness-readiness-probes/
readinessProbe :
# -- Enable Kubernetes liveness probe for ApplicationSet controller
enabled : false
# -- Number of seconds after the container has started before [probe] is initiated
initialDelaySeconds : 10
# -- How often (in seconds) to perform the [probe]
periodSeconds : 10
# -- Number of seconds after which the [probe] times out
timeoutSeconds : 1
# -- Minimum consecutive successes for the [probe] to be considered successful after having failed
successThreshold : 1
# -- Minimum consecutive failures for the [probe] to be considered failed after having succeeded
failureThreshold : 3
livenessProbe :
# -- Enable Kubernetes liveness probe for ApplicationSet controller
enabled : false
# -- Number of seconds after the container has started before [probe] is initiated
initialDelaySeconds : 10
# -- How often (in seconds) to perform the [probe]
periodSeconds : 10
# -- Number of seconds after which the [probe] times out
timeoutSeconds : 1
# -- Minimum consecutive successes for the [probe] to be considered successful after having failed
successThreshold : 1
# -- Minimum consecutive failures for the [probe] to be considered failed after having succeeded
failureThreshold : 3
2023-10-27 19:54:27 +00:00
# -- terminationGracePeriodSeconds for container lifecycle hook
terminationGracePeriodSeconds : 30
2022-11-30 19:11:32 +00:00
# -- [Node selector]
2023-03-02 16:00:02 +00:00
# @default -- `{}` (defaults to global.nodeSelector)
2022-11-30 19:11:32 +00:00
nodeSelector : {}
# -- [Tolerations] for use with node taints
2023-03-02 16:00:02 +00:00
# @default -- `[]` (defaults to global.tolerations)
2022-11-30 19:11:32 +00:00
tolerations : [ ]
# -- Assign custom [affinity] rules
2023-02-22 15:04:28 +00:00
# @default -- `{}` (defaults to global.affinity preset)
2022-11-30 19:11:32 +00:00
affinity : {}
2023-03-02 16:00:02 +00:00
# -- Assign custom [TopologySpreadConstraints] rules to the ApplicationSet controller
# @default -- `[]` (defaults to global.topologySpreadConstraints)
## Ref: https://kubernetes.io/docs/concepts/workloads/pods/pod-topology-spread-constraints/
## If labelSelector is left out, it will default to the labelSelector configuration of the deployment
topologySpreadConstraints : [ ]
# - maxSkew: 1
# topologyKey: topology.kubernetes.io/zone
# whenUnsatisfiable: DoNotSchedule
2023-04-04 14:10:50 +00:00
# -- Deployment strategy to be added to the ApplicationSet controller Deployment
deploymentStrategy : {}
# type: RollingUpdate
# rollingUpdate:
# maxSurge: 25%
# maxUnavailable: 25%
2023-03-02 16:00:02 +00:00
# -- Priority class for the ApplicationSet controller pods
# @default -- `""` (defaults to global.priorityClassName)
2022-11-30 19:11:32 +00:00
priorityClassName : ""
## Webhook for the Git Generator
## Ref: https://argocd-applicationset.readthedocs.io/en/master/Generators-Git/#webhook-configuration)
webhook :
ingress :
# -- Enable an ingress resource for Webhooks
enabled : false
# -- Additional ingress annotations
annotations : {}
# -- Additional ingress labels
labels : {}
2022-12-15 17:25:29 +00:00
# -- Defines which ingress ApplicationSet controller will implement the resource
2022-11-30 19:11:32 +00:00
ingressClassName : ""
# -- List of ingress hosts
## Hostnames must be provided if Ingress is enabled.
## Secrets must be manually created in the namespace
hosts : [ ]
# - argocd-applicationset.example.com
# -- List of ingress paths
paths :
- /api/webhook
# -- Ingress path type. One of `Exact`, `Prefix` or `ImplementationSpecific`
pathType : Prefix
# -- Additional ingress paths
extraPaths : [ ]
# - path: /*
# backend:
# serviceName: ssl-redirect
# servicePort: use-annotation
## for Kubernetes >=1.19 (when "networking.k8s.io/v1" is used)
# - path: /*
# pathType: Prefix
# backend:
# service:
# name: ssl-redirect
# port:
# name: use-annotation
# -- Ingress TLS configuration
tls : [ ]
# - secretName: argocd-applicationset-tls
# hosts:
# - argocd-applicationset.example.com
2023-05-16 14:17:24 +00:00
# TLS certificate configuration via cert-manager
## Ref: https://argo-cd.readthedocs.io/en/stable/operator-manual/tls/#tls-configuration
certificate :
# -- Deploy a Certificate resource (requires cert-manager)
enabled : false
# -- The name of the Secret that will be automatically created and managed by this Certificate resource
secretName : argocd-application-controller-tls
# -- Certificate primary domain (commonName)
domain : argocd.example.com
# -- Certificate Subject Alternate Names (SANs)
additionalHosts : [ ]
# -- The requested 'duration' (i.e. lifetime) of the certificate.
# @default -- `""` (defaults to 2160h = 90d if not specified)
## Ref: https://cert-manager.io/docs/usage/certificate/#renewal
duration : ""
# -- How long before the expiry a certificate should be renewed.
# @default -- `""` (defaults to 360h = 15d if not specified)
## Ref: https://cert-manager.io/docs/usage/certificate/#renewal
renewBefore : ""
# Certificate issuer
## Ref: https://cert-manager.io/docs/concepts/issuer
issuer :
# -- Certificate issuer group. Set if using an external issuer. Eg. `cert-manager.io`
group : ""
# -- Certificate issuer kind. Either `Issuer` or `ClusterIssuer`
kind : ""
# -- Certificate issuer name. Eg. `letsencrypt`
name : ""
# Private key of the certificate
privateKey :
# -- Rotation policy of private key when certificate is re-issued. Either: `Never` or `Always`
rotationPolicy : Never
# -- The private key cryptography standards (PKCS) encoding for private key. Either: `PCKS1` or `PKCS8`
encoding : PKCS1
# -- Algorithm used to generate certificate private key. One of: `RSA`, `Ed25519` or `ECDSA`
algorithm : RSA
# -- Key bit size of the private key. If algorithm is set to `Ed25519`, size is ignored.
size : 2048
2023-07-11 21:23:57 +00:00
# -- Annotations to be applied to the ApplicationSet Certificate
annotations : {}
2023-05-16 14:17:24 +00:00
2022-11-30 19:11:32 +00:00
## Notifications controller
notifications :
# -- Enable notifications controller
enabled : true
# -- Notifications controller name string
name : notifications-controller
# -- Argo CD dashboard url; used in place of {{.context.argocdUrl}} in templates
argocdUrl :
## Notifications controller Pod Disruption Budget
## Ref: https://kubernetes.io/docs/tasks/run-application/configure-pdb/
pdb :
# -- Deploy a [PodDisruptionBudget] for the notifications controller
enabled : false
# -- Labels to be added to notifications controller pdb
labels : {}
# -- Annotations to be added to notifications controller pdb
annotations : {}
# -- Number of pods that are available after eviction as number or percentage (eg.: 50%)
# @default -- `""` (defaults to 0 if not specified)
minAvailable : ""
2023-02-28 16:02:48 +00:00
# -- Number of pods that are unavailable after eviction as number or percentage (eg.: 50%).
2022-11-30 19:11:32 +00:00
## Has higher precedence over `notifications.pdb.minAvailable`
maxUnavailable : ""
## Notifications controller image
image :
# -- Repository to use for the notifications controller
# @default -- `""` (defaults to global.image.repository)
repository : ""
# -- Tag to use for the notifications controller
# @default -- `""` (defaults to global.image.tag)
tag : ""
# -- Image pull policy for the notifications controller
# @default -- `""` (defaults to global.image.imagePullPolicy)
imagePullPolicy : ""
# -- Secrets with credentials to pull images from a private registry
# @default -- `[]` (defaults to global.imagePullSecrets)
imagePullSecrets : [ ]
2023-01-05 15:42:23 +00:00
# -- Notifications controller log format. Either `text` or `json`
# @default -- `""` (defaults to global.logging.format)
logFormat : ""
# -- Notifications controller log level. One of: `debug`, `info`, `warn`, `error`
# @default -- `""` (defaults to global.logging.level)
logLevel : ""
# -- Extra arguments to provide to the notifications controller
extraArgs : [ ]
# -- Additional container environment variables
extraEnv : [ ]
# -- envFrom to pass to the notifications controller
# @default -- `[]` (See [values.yaml])
extraEnvFrom : [ ]
# - configMapRef:
# name: config-map-name
# - secretRef:
# name: secret-name
2023-01-12 21:32:12 +00:00
# -- Additional containers to be added to the notifications controller pod
## Note: Supports use of custom Helm templates
extraContainers : [ ]
# -- Init containers to add to the notifications controller pod
## Note: Supports use of custom Helm templates
initContainers : [ ]
2023-01-05 15:42:23 +00:00
# -- List of extra mounts to add (normally used with extraVolumes)
extraVolumeMounts : [ ]
# -- List of extra volumes to add
extraVolumes : [ ]
2022-11-30 19:11:32 +00:00
# -- Define user-defined context
## For more information: https://argocd-notifications.readthedocs.io/en/stable/templates/#defining-user-defined-context
context : {}
# region: east
# environmentName: staging
secret :
2022-12-15 17:25:29 +00:00
# -- Whether helm chart creates notifications controller secret
2022-11-30 19:11:32 +00:00
create : true
# -- key:value pairs of annotations to be added to the secret
annotations : {}
2023-07-31 11:47:01 +00:00
# -- key:value pairs of labels to be added to the secret
labels : {}
2022-11-30 19:11:32 +00:00
# -- Generic key:value pairs to be inserted into the secret
## Can be used for templates, notification services etc. Some examples given below.
## For more information: https://argocd-notifications.readthedocs.io/en/stable/services/overview/
items : {}
# slack-token:
# # For more information: https://argocd-notifications.readthedocs.io/en/stable/services/slack/
# grafana-apiKey:
# # For more information: https://argocd-notifications.readthedocs.io/en/stable/services/grafana/
# webhooks-github-token:
# email-username:
# email-password:
# For more information: https://argocd-notifications.readthedocs.io/en/stable/services/email/
metrics :
# -- Enables prometheus metrics server
enabled : false
# -- Metrics port
port : 9001
service :
2023-05-12 13:19:04 +00:00
# -- Metrics service type
type : ClusterIP
# -- Metrics service clusterIP. `None` makes a "headless service" (no virtual IP)
clusterIP : ""
2022-11-30 19:11:32 +00:00
# -- Metrics service annotations
annotations : {}
# -- Metrics service labels
labels : {}
# -- Metrics service port name
portName : http-metrics
serviceMonitor :
# -- Enable a prometheus ServiceMonitor
enabled : false
# -- Prometheus ServiceMonitor selector
selector : {}
# prometheus: kube-prometheus
# -- Prometheus ServiceMonitor labels
additionalLabels : {}
# -- Prometheus ServiceMonitor annotations
annotations : {}
# namespace: monitoring
# interval: 30s
# scrapeTimeout: 10s
# -- Prometheus ServiceMonitor scheme
scheme : ""
# -- Prometheus ServiceMonitor tlsConfig
tlsConfig : {}
2022-12-20 17:25:17 +00:00
# -- Prometheus [RelabelConfigs] to apply to samples before scraping
relabelings : [ ]
# -- Prometheus [MetricRelabelConfigs] to apply to samples before ingestion
metricRelabelings : [ ]
2022-11-30 19:11:32 +00:00
# -- Configures notification services such as slack, email or custom webhook
# @default -- See [values.yaml]
## For more information: https://argocd-notifications.readthedocs.io/en/stable/services/overview/
notifiers : {}
# service.slack: |
# token: $slack-token
2022-12-02 06:33:44 +00:00
# -- Annotations to be applied to the notifications controller Deployment
deploymentAnnotations : {}
2022-12-15 17:25:29 +00:00
# -- Annotations to be applied to the notifications controller Pods
2022-11-30 19:11:32 +00:00
podAnnotations : {}
2022-12-15 17:25:29 +00:00
# -- Labels to be applied to the notifications controller Pods
2022-11-30 19:11:32 +00:00
podLabels : {}
2023-01-05 15:42:23 +00:00
# -- Resource limits and requests for the notifications controller
resources : {}
# limits:
# cpu: 100m
# memory: 128Mi
# requests:
# cpu: 100m
# memory: 128Mi
2023-01-24 15:10:05 +00:00
# Notification controller container ports
containerPorts :
# -- Metrics container port
metrics : 9001
2023-02-16 16:33:45 +00:00
# -- [DNS configuration]
dnsConfig : {}
# -- Alternative DNS policy for notifications controller Pods
dnsPolicy : "ClusterFirst"
2022-11-30 19:11:32 +00:00
# -- Notification controller container-level security Context
# @default -- See [values.yaml]
containerSecurityContext :
runAsNonRoot : true
readOnlyRootFilesystem : true
allowPrivilegeEscalation : false
seccompProfile :
type : RuntimeDefault
capabilities :
drop :
- ALL
2023-10-27 19:54:27 +00:00
# -- terminationGracePeriodSeconds for container lifecycle hook
terminationGracePeriodSeconds : 30
2023-01-05 15:42:23 +00:00
# -- [Node selector]
2023-03-02 16:00:02 +00:00
# @default -- `{}` (defaults to global.nodeSelector)
2023-01-05 15:42:23 +00:00
nodeSelector : {}
# -- [Tolerations] for use with node taints
2023-03-02 16:00:02 +00:00
# @default -- `[]` (defaults to global.tolerations)
2023-01-05 15:42:23 +00:00
tolerations : [ ]
# -- Assign custom [affinity] rules
2023-02-22 15:04:28 +00:00
# @default -- `{}` (defaults to global.affinity preset)
2023-01-05 15:42:23 +00:00
affinity : {}
2023-03-02 16:00:02 +00:00
# -- Assign custom [TopologySpreadConstraints] rules to the application controller
# @default -- `[]` (defaults to global.topologySpreadConstraints)
## Ref: https://kubernetes.io/docs/concepts/workloads/pods/pod-topology-spread-constraints/
## If labelSelector is left out, it will default to the labelSelector configuration of the deployment
topologySpreadConstraints : [ ]
# - maxSkew: 1
# topologyKey: topology.kubernetes.io/zone
# whenUnsatisfiable: DoNotSchedule
2023-04-04 14:10:50 +00:00
# -- Deployment strategy to be added to the notifications controller Deployment
deploymentStrategy :
type : Recreate
2022-12-15 17:25:29 +00:00
# -- Priority class for the notifications controller pods
2023-03-02 16:00:02 +00:00
# @default -- `""` (defaults to global.priorityClassName)
2022-11-30 19:11:32 +00:00
priorityClassName : ""
serviceAccount :
2023-01-24 15:10:05 +00:00
# -- Create notifications controller service account
2022-11-30 19:11:32 +00:00
create : true
2023-01-24 15:10:05 +00:00
# -- Notification controller service account name
2022-11-30 19:11:32 +00:00
name : argocd-notifications-controller
# -- Annotations applied to created service account
annotations : {}
# -- Labels applied to created service account
labels : {}
2023-01-24 15:10:05 +00:00
# -- Automount API credentials for the Service Account
automountServiceAccountToken : true
2022-11-30 19:11:32 +00:00
cm :
2022-12-15 17:25:29 +00:00
# -- Whether helm chart creates notifications controller config map
2022-11-30 19:11:32 +00:00
create : true
2023-10-31 13:41:58 +00:00
## Enable this and set the rules: to whatever custom rules you want for the Cluster Role resource.
## Defaults to off
clusterRoleRules :
# -- List of custom rules for the notifications controller's ClusterRole resource
rules : [ ]
2022-11-30 19:11:32 +00:00
# -- Contains centrally managed global application subscriptions
## For more information: https://argocd-notifications.readthedocs.io/en/stable/subscriptions/
subscriptions : [ ]
# # subscription for on-sync-status-unknown trigger notifications
# - recipients:
# - slack:test2
# - email:test@gmail.com
# triggers:
# - on-sync-status-unknown
# # subscription restricted to applications with matching labels only
# - recipients:
# - slack:test3
# selector: test=true
# triggers:
# - on-sync-status-unknown
# -- The notification template is used to generate the notification content
## For more information: https://argocd-notifications.readthedocs.io/en/stable/templates/
templates : {}
# template.app-deployed: |
# email:
# subject: New version of an application {{.app.metadata.name}} is up and running.
# message: |
# {{if eq .serviceType "slack"}}:white_check_mark:{{end}} Application {{.app.metadata.name}} is now running new version of deployments manifests.
# slack:
# attachments: |
# [{
# "title": "{{ .app.metadata.name}}",
# "title_link":"{{.context.argocdUrl}}/applications/{{.app.metadata.name}}",
# "color": "#18be52",
# "fields": [
# {
# "title": "Sync Status",
# "value": "{{.app.status.sync.status}}",
# "short": true
# },
# {
# "title": "Repository",
# "value": "{{.app.spec.source.repoURL}}",
# "short": true
# },
# {
# "title": "Revision",
# "value": "{{.app.status.sync.revision}}",
# "short": true
# }
# {{range $index, $c := .app.status.conditions}}
# {{if not $index}},{{end}}
# {{if $index}},{{end}}
# {
# "title": "{{$c.type}}",
# "value": "{{$c.message}}",
# "short": true
# }
# {{end}}
# ]
# }]
# template.app-health-degraded: |
# email:
# subject: Application {{.app.metadata.name}} has degraded.
# message: |
# {{if eq .serviceType "slack"}}:exclamation:{{end}} Application {{.app.metadata.name}} has degraded.
# Application details: {{.context.argocdUrl}}/applications/{{.app.metadata.name}}.
# slack:
# attachments: |-
# [{
# "title": "{{ .app.metadata.name}}",
# "title_link": "{{.context.argocdUrl}}/applications/{{.app.metadata.name}}",
# "color": "#f4c030",
# "fields": [
# {
# "title": "Sync Status",
# "value": "{{.app.status.sync.status}}",
# "short": true
# },
# {
# "title": "Repository",
# "value": "{{.app.spec.source.repoURL}}",
# "short": true
# }
# {{range $index, $c := .app.status.conditions}}
# {{if not $index}},{{end}}
# {{if $index}},{{end}}
# {
# "title": "{{$c.type}}",
# "value": "{{$c.message}}",
# "short": true
# }
# {{end}}
# ]
# }]
# template.app-sync-failed: |
# email:
# subject: Failed to sync application {{.app.metadata.name}}.
# message: |
# {{if eq .serviceType "slack"}}:exclamation:{{end}} The sync operation of application {{.app.metadata.name}} has failed at {{.app.status.operationState.finishedAt}} with the following error: {{.app.status.operationState.message}}
# Sync operation details are available at: {{.context.argocdUrl}}/applications/{{.app.metadata.name}}?operation=true .
# slack:
# attachments: |-
# [{
# "title": "{{ .app.metadata.name}}",
# "title_link":"{{.context.argocdUrl}}/applications/{{.app.metadata.name}}",
# "color": "#E96D76",
# "fields": [
# {
# "title": "Sync Status",
# "value": "{{.app.status.sync.status}}",
# "short": true
# },
# {
# "title": "Repository",
# "value": "{{.app.spec.source.repoURL}}",
# "short": true
# }
# {{range $index, $c := .app.status.conditions}}
# {{if not $index}},{{end}}
# {{if $index}},{{end}}
# {
# "title": "{{$c.type}}",
# "value": "{{$c.message}}",
# "short": true
# }
# {{end}}
# ]
# }]
# template.app-sync-running: |
# email:
# subject: Start syncing application {{.app.metadata.name}}.
# message: |
# The sync operation of application {{.app.metadata.name}} has started at {{.app.status.operationState.startedAt}}.
# Sync operation details are available at: {{.context.argocdUrl}}/applications/{{.app.metadata.name}}?operation=true .
# slack:
# attachments: |-
# [{
# "title": "{{ .app.metadata.name}}",
# "title_link":"{{.context.argocdUrl}}/applications/{{.app.metadata.name}}",
# "color": "#0DADEA",
# "fields": [
# {
# "title": "Sync Status",
# "value": "{{.app.status.sync.status}}",
# "short": true
# },
# {
# "title": "Repository",
# "value": "{{.app.spec.source.repoURL}}",
# "short": true
# }
# {{range $index, $c := .app.status.conditions}}
# {{if not $index}},{{end}}
# {{if $index}},{{end}}
# {
# "title": "{{$c.type}}",
# "value": "{{$c.message}}",
# "short": true
# }
# {{end}}
# ]
# }]
# template.app-sync-status-unknown: |
# email:
# subject: Application {{.app.metadata.name}} sync status is 'Unknown'
# message: |
# {{if eq .serviceType "slack"}}:exclamation:{{end}} Application {{.app.metadata.name}} sync is 'Unknown'.
# Application details: {{.context.argocdUrl}}/applications/{{.app.metadata.name}}.
# {{if ne .serviceType "slack"}}
# {{range $c := .app.status.conditions}}
# * {{$c.message}}
# {{end}}
# {{end}}
# slack:
# attachments: |-
# [{
# "title": "{{ .app.metadata.name}}",
# "title_link":"{{.context.argocdUrl}}/applications/{{.app.metadata.name}}",
# "color": "#E96D76",
# "fields": [
# {
# "title": "Sync Status",
# "value": "{{.app.status.sync.status}}",
# "short": true
# },
# {
# "title": "Repository",
# "value": "{{.app.spec.source.repoURL}}",
# "short": true
# }
# {{range $index, $c := .app.status.conditions}}
# {{if not $index}},{{end}}
# {{if $index}},{{end}}
# {
# "title": "{{$c.type}}",
# "value": "{{$c.message}}",
# "short": true
# }
# {{end}}
# ]
# }]
# template.app-sync-succeeded: |
# email:
# subject: Application {{.app.metadata.name}} has been successfully synced.
# message: |
# {{if eq .serviceType "slack"}}:white_check_mark:{{end}} Application {{.app.metadata.name}} has been successfully synced at {{.app.status.operationState.finishedAt}}.
# Sync operation details are available at: {{.context.argocdUrl}}/applications/{{.app.metadata.name}}?operation=true .
# slack:
# attachments: |-
# [{
# "title": "{{ .app.metadata.name}}",
# "title_link":"{{.context.argocdUrl}}/applications/{{.app.metadata.name}}",
# "color": "#18be52",
# "fields": [
# {
# "title": "Sync Status",
# "value": "{{.app.status.sync.status}}",
# "short": true
# },
# {
# "title": "Repository",
# "value": "{{.app.spec.source.repoURL}}",
# "short": true
# }
# {{range $index, $c := .app.status.conditions}}
# {{if not $index}},{{end}}
# {{if $index}},{{end}}
# {
# "title": "{{$c.type}}",
# "value": "{{$c.message}}",
# "short": true
# }
# {{end}}
# ]
# }]
# -- The trigger defines the condition when the notification should be sent
## For more information: https://argocd-notifications.readthedocs.io/en/stable/triggers/
triggers : {}
# trigger.on-deployed: |
# - description: Application is synced and healthy. Triggered once per commit.
# oncePer: app.status.sync.revision
# send:
# - app-deployed
# when: app.status.operationState.phase in ['Succeeded'] and app.status.health.status == 'Healthy'
# trigger.on-health-degraded: |
# - description: Application has degraded
# send:
# - app-health-degraded
# when: app.status.health.status == 'Degraded'
# trigger.on-sync-failed: |
# - description: Application syncing has failed
# send:
# - app-sync-failed
# when: app.status.operationState.phase in ['Error', 'Failed']
# trigger.on-sync-running: |
# - description: Application is being synced
# send:
# - app-sync-running
# when: app.status.operationState.phase in ['Running']
# trigger.on-sync-status-unknown: |
# - description: Application status is 'Unknown'
# send:
# - app-sync-status-unknown
# when: app.status.sync.status == 'Unknown'
# trigger.on-sync-succeeded: |
# - description: Application syncing has succeeded
# send:
# - app-sync-succeeded
# when: app.status.operationState.phase in ['Succeeded']
#
# For more information: https://argocd-notifications.readthedocs.io/en/stable/triggers/#default-triggers
# defaultTriggers: |
# - on-sync-status-unknown