A Helm chart for the Tractus-X Remoting Agent which is a container to Bridge Agent-Enabled Connector and REST APIs.
This chart has no prerequisites.
Homepage: https://github.com/eclipse-tractusx/knowledge-agents/
$ helm repo add eclipse-tractusx https://eclipse-tractusx.github.io/charts/dev
$ helm install my-release eclipse-tractusx/remoting-agent --version 1.14.24-SNAPSHOT
Name | Url | |
---|---|---|
Tractus-X Knowledge Agents Team |
Key | Type | Default | Description |
---|---|---|---|
affinity | object | {} |
Affinity constrains which nodes the Pod can be scheduled on based on node labels. |
agent.endpoints.default.auth | object | {} |
An auth object for default security |
agent.endpoints.default.path | string | "" |
The path mapping the "default" api is going to be exposed by |
agent.endpoints.default.port | string | "8081" |
The network port, which the "default" api is going to be exposed by the container, pod and service |
agent.endpoints.default.regex | string | "/(.*)" |
An optional regex path match (whose match groups could be used in an nginx-annotation of the ingress) |
automountServiceAccountToken | bool | false |
Whether to automount kubernetes API credentials into the pod |
autoscaling.enabled | bool | false |
Enables horizontal pod autoscaling |
autoscaling.maxReplicas | int | 100 |
Maximum replicas if resource consumption exceeds resource threshholds |
autoscaling.minReplicas | int | 1 |
Minimal replicas if resource consumption falls below resource threshholds |
autoscaling.targetCPUUtilizationPercentage | int | 80 |
targetAverageUtilization of cpu provided to a pod |
autoscaling.targetMemoryUtilizationPercentage | int | 80 |
targetAverageUtilization of memory provided to a pod |
customLabels | object | {} |
Additional custom Labels to add |
env | object | {} |
Container environment variables e.g. for configuring JAVA_TOOL_OPTIONS Ex.: JAVA_TOOL_OPTIONS: > -Dhttp.proxyHost=proxy -Dhttp.proxyPort=80 -Dhttp.nonProxyHosts="localhost |
envSecretName | string | nil |
Kubernetes Secret Resource name to load environment variables from |
fullnameOverride | string | "" |
Overrides the releases full name |
image.digest | string | "" |
Overrides the image digest |
image.pullPolicy | string | "IfNotPresent" |
|
image.pullSecrets | list | [] |
|
image.registry | string | "docker.io/" |
target registry |
image.repository | string | "tractusx/remoting-agent" |
Which derivate of agent to use |
image.tag | string | "" |
Overrides the image tag whose default is the chart appVersion |
ingresses[0].annotations | string | nil |
Additional ingress annotations to add, for example when implementing more complex routings you may set { nginx.ingress.kubernetes.io/rewrite-target: /$1, nginx.ingress.kubernetes.io/use-regex: "true" } |
ingresses[0].certManager.clusterIssuer | string | "" |
If preset enables certificate generation via cert-manager cluster-wide issuer |
ingresses[0].certManager.issuer | string | "" |
If preset enables certificate generation via cert-manager namespace scoped issuer |
ingresses[0].className | string | "" |
Defines the ingress class to use |
ingresses[0].enabled | bool | false |
|
ingresses[0].endpoints | list | ["default"] |
Agent endpoints exposed by this ingress resource |
ingresses[0].hostname | string | "remoting-agent.local" |
The hostname to be used to precisely map incoming traffic onto the underlying network service |
ingresses[0].prefix | string | "" |
Optional prefix that will be prepended to the paths of the endpoints |
ingresses[0].tls | object | {"enabled":false,"secretName":""} |
TLS tls class applied to the ingress resource |
ingresses[0].tls.enabled | bool | false |
Enables TLS on the ingress resource |
ingresses[0].tls.secretName | string | "" |
If present overwrites the default secret name |
livenessProbe.enabled | bool | true |
Whether to enable kubernetes liveness-probe |
livenessProbe.failureThreshold | int | 3 |
Minimum consecutive failures for the probe to be considered failed after having succeeded |
livenessProbe.periodSeconds | int | 60 |
Number of seconds each period lasts. |
livenessProbe.timeoutSeconds | int | 5 |
number of seconds until a timeout is assumed |
logging.configuration | string | "<?xml version=\"1.0\" encoding=\"UTF-8\"?>\n<configuration debug=\"false\" scan=\"true\" scanPeriod=\"30 seconds\">\n <appender name=\"STDOUT\" class=\"ch.qos.logback.core.ConsoleAppender\">\n <encoder>\n <pattern>%d{HH:mm:ss.SSS} [%thread] %-5level %logger{36} - %msg%n</pattern>\n </encoder>\n </appender>\n <root>\n <level value=\"FINEST\"/>\n <appender-ref ref=\"STDOUT\" />\n </root>\n</configuration>" |
Logback Xml |
nameOverride | string | "" |
Overrides the charts name |
nodeSelector | object | {} |
Node-Selector to constrain the Pod to nodes with specific labels. |
podAnnotations | object | {} |
Annotations added to deployed pods |
podSecurityContext.fsGroup | int | 30000 |
The owner for volumes and any files created within volumes will belong to this guid |
podSecurityContext.runAsGroup | int | 30000 |
Processes within a pod will belong to this guid |
podSecurityContext.runAsUser | int | 10001 |
Runs all processes within a pod with a special uid |
podSecurityContext.seccompProfile.type | string | "RuntimeDefault" |
Restrict a Container's Syscalls with seccomp |
readinessProbe.enabled | bool | true |
Whether to enable kubernetes readiness-probes |
readinessProbe.failureThreshold | int | 3 |
Minimum consecutive failures for the probe to be considered failed after having succeeded |
readinessProbe.periodSeconds | int | 300 |
Number of seconds each period lasts. |
readinessProbe.timeoutSeconds | int | 5 |
number of seconds until a timeout is assumed |
replicaCount | int | 1 |
Specifies how many replicas of a deployed pod shall be created during the deployment Note: If horizontal pod autoscaling is enabled this setting has no effect |
repositories | object | {} |
A map of repository names to configuration ttl files |
resources | object | {"limits":{"cpu":"250m","memory":"768Mi"},"requests":{"cpu":"250m","memory":"768Mi"}} |
Resource management applied to the deployed pod We recommend 25% of a cpu, 512MB per server and 256MB per endpoint |
securityContext.allowPrivilegeEscalation | bool | false |
Controls Privilege Escalation enabling setuid binaries changing the effective user ID |
securityContext.capabilities.add | list | ["NET_BIND_SERVICE"] |
Specifies which capabilities to add to issue specialized syscalls |
securityContext.capabilities.drop | list | ["ALL"] |
Specifies which capabilities to drop to reduce syscall attack surface |
securityContext.readOnlyRootFilesystem | bool | true |
Whether the root filesystem is mounted in read-only mode |
securityContext.runAsGroup | int | 30000 |
Processes within a pod will belong to this guid |
securityContext.runAsNonRoot | bool | true |
Requires the container to run without root privileges |
securityContext.runAsUser | int | 10001 |
The container's process will run with the specified uid |
service.type | string | "ClusterIP" |
Service type to expose the running application on a set of Pods as a network service. |
serviceAccount.annotations | object | {} |
Annotations to add to the service account |
serviceAccount.create | bool | true |
Specifies whether a service account should be created per release |
serviceAccount.name | string | "" |
The name of the service account to use. If not set and create is true, a name is generated using the release's fullname template |
startupProbe.enabled | bool | true |
Whether to enable kubernetes startup-probes |
startupProbe.failureThreshold | int | 18 |
Minimum consecutive failures for the probe to be considered failed after having succeeded |
startupProbe.initialDelaySeconds | int | 60 |
Number of seconds after the container has started before liveness probes are initiated. |
startupProbe.periodSeconds | int | 30 |
Number of seconds each period lasts. |
startupProbe.timeoutSeconds | int | 5 |
number of seconds until a timeout is assumed |
tolerations | list | [] |
Tolerations are applied to Pods to schedule onto nodes with matching taints. |
Autogenerated from chart metadata using helm-docs v1.14.2