forked from tchiotludo/akhq
-
Notifications
You must be signed in to change notification settings - Fork 0
/
values.yaml
132 lines (114 loc) · 3.23 KB
/
values.yaml
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
122
123
124
125
126
127
128
129
130
131
132
# imagePullSecrets:
# - name: my-repository-secret
image:
repository: tchiotludo/akhq
tag: "" # uses Chart.AppVersion by default
# custom annotations (example: for prometheus)
annotations: {}
#prometheus.io/scrape: 'true'
#prometheus.io/port: '8080'
#prometheus.io/path: '/prometheus'
## You can put directly your configuration here... or add java opts or any other env vars
extraEnv: []
# - name: AKHQ_CONFIGURATION
# value: |
# akhq:
# secrets:
# docker-kafka-server:
# properties:
# bootstrap.servers: "kafka:9092"
# - name: JAVA_OPTS
# value: "-Djavax.net.ssl.trustStore=/usr/local/openjdk-11/lib/security/cacerts -Djavax.net.ssl.trustStorePassword=password"
# - name: CLASSPATH
# value: "/any/additional/jars/desired.jar:/go/here.jar"
## Or you can also use configmap for the configuration...
configuration:
akhq:
server:
access-log:
enabled: false
name: org.akhq.log.access
##... and secret for connection information
existingSecrets: ""
# name of the existingSecret
secrets: {}
# akhq:
# connections:
# my-cluster-plain-text:
# properties:
# bootstrap.servers: "kafka:9092"
# schema-registry:
# url: "http://schema-registry:8085"
# type: "confluent"
# basic-auth-username: basic-auth-user
# basic-auth-password: basic-auth-pass
# connect:
# - name: "my-connect"
# url: "http://connect:8083"
# basic-auth-username: basic-auth-user
# basic-auth-password: basic-auth-pass
kafkaSecrets: []
#Provide extra base64 encoded kubernetes secrets (keystore/truststore)
# Any extra volumes to define for the pod (like keystore/truststore)
extraVolumes: []
# Any extra volume mounts to define for the akhq container
extraVolumeMounts: []
# Specify ServiceAccount for pod
serviceAccountName: null
# Add your own init container or uncomment and modify the example.
initContainers: {}
# create-keystore:
# image: "openjdk:11-slim"
# command: ['sh', '-c', 'keytool']
# volumeMounts:
# - mountPath: /tmp
# name: certs
# Configure the Pod Security Context
# ref: https://kubernetes.io/docs/tasks/configure-pod-container/security-context/
securityContext: {}
# runAsNonRoot: true
# runAsUser: 1000
# Configure the Container Security Context
# ref: https://kubernetes.io/docs/tasks/configure-pod-container/security-context/
containerSecurityContext: {}
# allowPrivilegeEscalation: false
# privileged: false
# capabilities:
# drop:
# - ALL
# runAsNonRoot: true
# runAsUser: 1001
# readOnlyRootFilesystem: true
service:
enabled: true
type: ClusterIP
port: 80
#httpNodePort: 32551
labels: {}
annotations:
# cloud.google.com/load-balancer-type: "Internal"
ingress:
enabled: false
annotations: {}
# kubernetes.io/ingress.class: nginx
# kubernetes.io/tls-acme: "true"
paths:
- /
hosts:
- akhq.demo.com
tls: []
# - secretName: akhq-tls
# hosts:
# - akhq.demo.com
readinessProbe:
prefix: "" # set same as `micronaut.server.context-path`
resources: {}
# limits:
# cpu: 100m
# memory: 128Mi
# requests:
# cpu: 100m
# memory: 128Mi
nodeSelector: {}
tolerations: []
affinity: {}