rancher-partner-charts/charts/stackstate/stackstate-k8s-agent/charts/http-header-injector
github-actions[bot] f7edd01e49 Charts CI
```
Updated:
  argo/argo-cd:
    - 5.52.1
  bitnami/airflow:
    - 16.1.11
  bitnami/cassandra:
    - 10.6.9
  bitnami/kafka:
    - 26.6.3
  bitnami/mariadb:
    - 15.0.1
  bitnami/mysql:
    - 9.16.1
  bitnami/postgresql:
    - 13.2.29
  bitnami/redis:
    - 18.6.3
  bitnami/spark:
    - 8.1.8
  bitnami/tomcat:
    - 10.11.11
  bitnami/wordpress:
    - 19.0.5
  bitnami/zookeeper:
    - 12.4.4
  cert-manager/cert-manager:
    - v1.13.3
  clastix/kamaji:
    - 0.14.0
  cockroach-labs/cockroachdb:
    - 11.2.3
  confluent/confluent-for-kubernetes:
    - 0.824.40
  crowdstrike/falcon-sensor:
    - 1.24.1
  datadog/datadog:
    - 3.50.5
  datadog/datadog-operator:
    - 1.4.1
  dell/csi-isilon:
    - 2.9.0
  dell/csi-powermax:
    - 2.9.0
  dell/csi-powerstore:
    - 2.9.0
  dell/csi-unity:
    - 2.9.0
  dell/csi-vxflexos:
    - 2.9.0
  digitalis/vals-operator:
    - 0.7.8
  dynatrace/dynatrace-operator:
    - 0.15.0
  external-secrets/external-secrets:
    - 0.9.11
  f5/nginx-ingress:
    - 1.1.0
  fairwinds/polaris:
    - 5.17.0
  gluu/gluu:
    - 5.0.24
  haproxy/haproxy:
    - 1.35.5
  harbor/harbor:
    - 1.14.0
  hashicorp/consul:
    - 1.3.1
  instana/instana-agent:
    - 1.2.66
  intel/intel-device-plugins-operator:
    - 0.29.0
  intel/intel-device-plugins-qat:
    - 0.29.0
  intel/intel-device-plugins-sgx:
    - 0.29.0
  jenkins/jenkins:
    - 4.11.2
  jfrog/artifactory-ha:
    - 107.71.11
  jfrog/artifactory-jcr:
    - 107.71.11
  kong/kong:
    - 2.33.3
  kubecost/cost-analyzer:
    - 1.108.1
  kuma/kuma:
    - 2.5.1
  linkerd/linkerd-control-plane:
    - 1.16.9
  mongodb/community-operator:
    - 0.9.0
  nats/nats:
    - 1.1.6
  new-relic/nri-bundle:
    - 5.0.58
  nutanix/nutanix-csi-snapshot:
    - 6.3.2
  nutanix/nutanix-csi-storage:
    - 2.6.6
  openebs/openebs:
    - 3.10.0
  percona/psmdb-db:
    - 1.15.1
  percona/pxc-db:
    - 1.13.4
  redpanda/redpanda:
    - 5.7.7
  speedscale/speedscale-operator:
    - 2.0.2
  stackstate/stackstate-k8s-agent:
    - 1.0.66
  sysdig/sysdig:
    - 1.16.24
  traefik/traefik:
    - 26.0.0
  trilio/k8s-triliovault-operator:
    - 4.0.0
  weka/csi-wekafsplugin:
    - 2.3.2
  yugabyte/yugabyte:
    - 2.18.5
  yugabyte/yugaware:
    - 2.18.5
```
2024-01-12 17:13:39 +00:00
..
templates Charts CI 2024-01-12 17:13:39 +00:00
.helmignore Charts CI 2023-10-04 15:50:49 +00:00
Chart.yaml Charts CI 2024-01-12 17:13:39 +00:00
README.md Charts CI 2024-01-12 17:13:39 +00:00
Readme.md.gotpl Charts CI 2023-10-04 15:50:49 +00:00
values.yaml Charts CI 2024-01-12 17:13:39 +00:00

README.md

http-header-injector

Version: 0.0.7 AppVersion: 0.0.1

Helm chart for deploying the http-header-injector sidecar, which automatically injects x-request-id into http traffic going through the cluster for pods which have the annotation http-header-injector.stackstate.io/inject: enabled is set.

Homepage: https://github.com/StackVista/http-header-injector

Maintainers

Name Email Url
Stackstate Lupulus Team ops@stackstate.com

Values

Key Type Default Description
certificatePrehook object {"image":{"pullPolicy":"IfNotPresent","registry":null,"repository":"stackstate/container-tools","tag":"1.2.0"}} Helm prehook to setup/remove a certificate for the sidecarInjector mutationwebhook
certificatePrehook.image.pullPolicy string "IfNotPresent" Policy when pulling an image
certificatePrehook.image.registry string nil Registry for the docker image.
certificatePrehook.image.tag string "1.2.0" The tag for the docker image
debug bool false Enable debugging. This will leave leave artifacts around like the prehook jobs for further inspection
enabled bool true Enable/disable the mutationwebhook
global.imagePullCredentials object {} Globally define credentials for pulling images.
global.imagePullSecrets list [] Globally add image pull secrets that are used.
global.imageRegistry string nil Globally override the image registry that is used. Can be overridden by specific containers. Defaults to quay.io
images.pullSecretName string nil
proxy object {"image":{"pullPolicy":"IfNotPresent","registry":null,"repository":"stackstate/http-header-injector-proxy","tag":"sha-5ff79451"},"resources":{"limits":{"memory":"40Mi"},"requests":{"memory":"25Mi"}}} Proxy being injected into pods for rewriting http headers
proxy.image.pullPolicy string "IfNotPresent" Policy when pulling an image
proxy.image.registry string nil Registry for the docker image.
proxy.image.tag string "sha-5ff79451" The tag for the docker image
proxy.resources.limits.memory string "40Mi" Memory resource limits.
proxy.resources.requests.memory string "25Mi" Memory resource requests.
proxyInit object {"image":{"pullPolicy":"IfNotPresent","registry":null,"repository":"stackstate/http-header-injector-proxy-init","tag":"sha-5ff79451"}} InitContainer within pod which redirects traffic to the proxy container.
proxyInit.image.pullPolicy string "IfNotPresent" Policy when pulling an image
proxyInit.image.registry string nil Registry for the docker image
proxyInit.image.tag string "sha-5ff79451" The tag for the docker image
sidecarInjector object {"image":{"pullPolicy":"IfNotPresent","registry":null,"repository":"stackstate/generic-sidecar-injector","tag":"sha-9c852245"}} Service for injecting the proxy sidecar into pods
sidecarInjector.image.pullPolicy string "IfNotPresent" Policy when pulling an image
sidecarInjector.image.registry string nil Registry for the docker image.
sidecarInjector.image.tag string "sha-9c852245" The tag for the docker image
webhook object {"failurePolicy":"Ignore","tls":{"certManager":{"issuer":"","issuerKind":"ClusterIssuer","issuerNamespace":""},"mode":"generated","provided":{"caBundle":"","crt":"","key":""},"secret":{"name":""}}} MutationWebhook that will be installed to inject a sidecar into pods
webhook.failurePolicy string "Ignore" How should the webhook fail? Best is to use Ignore, because there is a brief moment at initialization when the hook s there but the service not. Also, putting this to fail can cause the control plane be unresponsive.
webhook.tls.certManager.issuer string "" The issuer that is used for the webhook. Only used if you set webhook.tls.mode to "cert-manager".
webhook.tls.certManager.issuerKind string "ClusterIssuer" The issuer kind that is used for the webhook, valid values are "Issuer" or "ClusterIssuer". Only used if you set webhook.tls.mode to "cert-manager".
webhook.tls.certManager.issuerNamespace string "" The namespace the cert-manager issuer is located in. If left empty defaults to the release's namespace that is used for the webhook. Only used if you set webhook.tls.mode to "cert-manager".
webhook.tls.mode string "generated" The mode for the webhook. Can be "provided", "generated", "secret" or "cert-manager". If you want to use cert-manager, you need to install it first. NOTE: If you choose "generated", additional privileges are required to create the certificate and webhook at runtime.
webhook.tls.provided.caBundle string "" The caBundle that is used for the webhook. This is the certificate that is used to sign the webhook. Only used if you set webhook.tls.mode to "provided".
webhook.tls.provided.crt string "" The certificate that is used for the webhook. Only used if you set webhook.tls.mode to "provided".
webhook.tls.provided.key string "" The key that is used for the webhook. Only used if you set webhook.tls.mode to "provided".
webhook.tls.secret.name string "" The name of the secret containing the pre-provisioned certificate data that is used for the webhook. Only used if you set webhook.tls.mode to "secret".