DirectorySecurity AdvisoriesPricing
Sign in
Directory
argo-events logoHELM

argo-events

Helm chart
Last changed
Request a free trial

Contact our team to test out this Helm chart and related images for free. Please also indicate any other images you would like to evaluate.

Overview
Chart versions
Default values
Chart metadata
Images

Tag:

1
## Argo Events configuration
2
## Ref: https://github.com/argoproj/argo-events
3
##
4
5
# -- Provide a name in place of `argo-events`
6
nameOverride: argo-events
7
# -- String to fully override "argo-events.fullname" template
8
fullnameOverride: ""
9
# -- Override the namespace
10
# @default -- `.Release.Namespace`
11
namespaceOverride: ""
12
# -- Deploy on OpenShift
13
openshift: false
14
# -- Create clusterroles that extend existing clusterroles to interact with argo-events crds
15
# Only applies for cluster-wide installation (`controller.rbac.namespaced: false`)
16
## Ref: https://kubernetes.io/docs/reference/access-authn-authz/rbac/#aggregated-clusterroles
17
createAggregateRoles: false
18
## Custom resource configuration
19
crds:
20
# -- Install and upgrade CRDs
21
install: true
22
# -- Keep CRDs on chart uninstall
23
keep: true
24
# -- Annotations to be added to all CRDs
25
annotations: {}
26
global:
27
image:
28
# -- If defined, a repository applied to all Argo Events deployments
29
repository: cgr.dev/chainguard-private/argo-events
30
# -- Overrides the global Argo Events image tag whose default is the chart appVersion
31
tag: latest@sha256:79ede488b01e77e15a58d1f2b98f049a7517b6c692b88680f04b7ec8b5d79966
32
# -- If defined, a imagePullPolicy applied to all Argo Events deployments
33
imagePullPolicy: IfNotPresent
34
# -- If defined, uses a Secret to pull an image from a private Docker registry or repository
35
imagePullSecrets: []
36
# -- Annotations for the all deployed pods
37
podAnnotations: {}
38
# -- Labels for the all deployed pods
39
podLabels: {}
40
# -- Additional labels to add to all resources
41
additionalLabels: {}
42
# app: argo-events
43
44
# -- Toggle and define securityContext. See [values.yaml]
45
securityContext: {}
46
# runAsNonRoot: true
47
# runAsUser: 9731
48
# runAsGroup: 9731
49
# fsGroup: 9731
50
51
# -- Mapping between IP and hostnames that will be injected as entries in the pod's hosts files
52
hostAliases: []
53
# - ip: 10.20.30.40
54
# hostnames:
55
# - git.myhostname
56
## Event bus configuration
57
configs:
58
## NATS event bus
59
nats:
60
# -- Supported versions of NATS event bus
61
# @default -- See [values.yaml]
62
versions:
63
- version: latest
64
natsStreamingImage: nats-streaming:latest
65
metricsExporterImage: natsio/prometheus-nats-exporter:latest
66
- version: 0.22.1
67
natsStreamingImage: nats-streaming:0.22.1
68
metricsExporterImage: natsio/prometheus-nats-exporter:0.8.0
69
## JetStream event bus
70
jetstream:
71
# Default JetStream settings, could be overridden by EventBus JetStream spec
72
# Ref: https://docs.nats.io/running-a-nats-service/configuration#jetstream
73
settings:
74
# -- Maximum size of the memory storage (e.g. 1G)
75
maxMemoryStore: -1
76
# -- Maximum size of the file storage (e.g. 20G)
77
maxFileStore: -1
78
streamConfig:
79
# -- Maximum number of messages before expiring oldest message
80
maxMsgs: 1000000
81
# -- Maximum age of existing messages, i.e. “72h”, “4h35m”
82
maxAge: 72h
83
# Total size of messages before expiring oldest message, 0 means unlimited.
84
maxBytes: 1GB
85
# -- Number of replicas, defaults to 3 and requires minimal 3
86
replicas: 3
87
# -- Not documented at the moment
88
duplicates: 300s
89
# -- 0: Limits, 1: Interest, 2: WorkQueue
90
retention: 0
91
# -- 0: DiscardOld, 1: DiscardNew
92
discard: 0
93
# Supported versions of JetStream eventbus
94
versions:
95
- version: latest
96
natsImage: nats:2.10.10
97
metricsExporterImage: natsio/prometheus-nats-exporter:0.14.0
98
configReloaderImage: natsio/nats-server-config-reloader:0.14.0
99
startCommand: /nats-server
100
- version: 2.8.1
101
natsImage: nats:2.8.1
102
metricsExporterImage: natsio/prometheus-nats-exporter:0.9.1
103
configReloaderImage: natsio/nats-server-config-reloader:0.7.0
104
startCommand: /nats-server
105
- version: 2.8.1-alpine
106
natsImage: nats:2.8.1-alpine
107
metricsExporterImage: natsio/prometheus-nats-exporter:0.9.1
108
configReloaderImage: natsio/nats-server-config-reloader:0.7.0
109
startCommand: nats-server
110
- version: 2.8.2
111
natsImage: nats:2.8.2
112
metricsExporterImage: natsio/prometheus-nats-exporter:0.9.1
113
configReloaderImage: natsio/nats-server-config-reloader:0.7.0
114
startCommand: /nats-server
115
- version: 2.8.2-alpine
116
natsImage: nats:2.8.2-alpine
117
metricsExporterImage: natsio/prometheus-nats-exporter:0.9.1
118
configReloaderImage: natsio/nats-server-config-reloader:0.7.0
119
startCommand: nats-server
120
- version: 2.9.1
121
natsImage: nats:2.9.1
122
metricsExporterImage: natsio/prometheus-nats-exporter:0.9.1
123
configReloaderImage: natsio/nats-server-config-reloader:0.7.0
124
startCommand: /nats-server
125
- version: 2.9.12
126
natsImage: nats:2.9.12
127
metricsExporterImage: natsio/prometheus-nats-exporter:0.9.1
128
configReloaderImage: natsio/nats-server-config-reloader:0.7.0
129
startCommand: /nats-server
130
- version: 2.9.16
131
natsImage: nats:2.9.16
132
metricsExporterImage: natsio/prometheus-nats-exporter:0.9.1
133
configReloaderImage: natsio/nats-server-config-reloader:0.7.0
134
startCommand: /nats-server
135
- version: 2.10.10
136
natsImage: nats:2.10.10
137
metricsExporterImage: natsio/prometheus-nats-exporter:0.14.0
138
configReloaderImage: natsio/nats-server-config-reloader:0.14.0
139
startCommand: /nats-server
140
# -- Array of extra K8s manifests to deploy
141
## Note: Supports use of custom Helm templates
142
extraObjects: []
143
# - apiVersion: secrets-store.csi.x-k8s.io/v1
144
# kind: SecretProviderClass
145
# metadata:
146
# name: argo-events-secrets-store
147
# spec:
148
# provider: aws
149
# parameters:
150
# objects: |
151
# - objectName: "argo-events"
152
# objectType: "secretsmanager"
153
# jmesPath:
154
# - path: "client_id"
155
# objectAlias: "client_id"
156
# - path: "client_secret"
157
# objectAlias: "client_secret"
158
# secretObjects:
159
# - data:
160
# - key: client_id
161
# objectName: client_id
162
# - key: client_secret
163
# objectName: client_secret
164
# secretName: argo-events-secrets-store
165
# type: Opaque
166
# labels:
167
# app.kubernetes.io/part-of: argocd
168
169
## Argo Events controller
170
controller:
171
# -- Argo Events controller name string
172
name: controller-manager
173
rbac:
174
# -- Create events controller RBAC
175
enabled: true
176
# -- Restrict events controller to operate only in a single namespace instead of cluster-wide scope.
177
namespaced: false
178
# -- Additional namespace to be monitored by the controller
179
managedNamespace: ""
180
# -- Additional user rules for event controller's rbac
181
rules: []
182
image:
183
# -- Repository to use for the events controller
184
# @default -- `""` (defaults to global.image.repository)
185
repository: ""
186
# -- Tag to use for the events controller
187
# @default -- `""` (defaults to global.image.tag)
188
tag: ""
189
# -- Image pull policy for the events controller
190
# @default -- `""` (defaults to global.image.imagePullPolicy)
191
imagePullPolicy: ""
192
# -- The number of replicasets history to keep
193
revisionHistoryLimit: 5
194
# -- The number of events controller pods to run.
195
replicas: 1
196
# Pod disruption budget
197
pdb:
198
# -- Deploy a PodDisruptionBudget for the events controller
199
enabled: false
200
# minAvailable: 1
201
# maxUnavailable: 0
202
# -- Labels to be added to events controller pdb
203
labels: {}
204
# -- Annotations to be added to events controller pdb
205
annotations: {}
206
# -- Environment variables to pass to events controller
207
env: []
208
# - name: LOG_LEVEL
209
# value: "debug" # Options: debug, info, error (default: info)
210
211
# -- envFrom to pass to events controller
212
# @default -- `[]` (See [values.yaml])
213
envFrom: []
214
# - configMapRef:
215
# name: config-map-name
216
# - secretRef:
217
# name: secret-name
218
219
# -- Annotations to be added to events controller pods
220
podAnnotations: {}
221
# -- Labels to be added to events controller pods
222
podLabels: {}
223
# -- Events controller container-level security context
224
containerSecurityContext: {}
225
# capabilities:
226
# drop:
227
# - all
228
# readOnlyRootFilesystem: true
229
# runAsNonRoot: true
230
231
## Readiness and liveness probes for default backend
232
## Ref: https://kubernetes.io/docs/tasks/configure-pod-container/configure-liveness-readiness-startup-probes/
233
readinessProbe:
234
# -- Minimum consecutive failures for the [probe] to be considered failed after having succeeded
235
failureThreshold: 3
236
# -- Number of seconds after the container has started before [probe] is initiated
237
initialDelaySeconds: 10
238
# -- How often (in seconds) to perform the [probe]
239
periodSeconds: 10
240
# -- Minimum consecutive successes for the [probe] to be considered successful after having failed
241
successThreshold: 1
242
# -- Number of seconds after which the [probe] times out
243
timeoutSeconds: 1
244
livenessProbe:
245
# -- Minimum consecutive failures for the [probe] to be considered failed after having succeeded
246
failureThreshold: 3
247
# -- Number of seconds after the container has started before [probe] is initiated
248
initialDelaySeconds: 10
249
# -- How often (in seconds) to perform the [probe]
250
periodSeconds: 10
251
# -- Minimum consecutive successes for the [probe] to be considered successful after having failed
252
successThreshold: 1
253
# -- Number of seconds after which the [probe] times out
254
timeoutSeconds: 1
255
# -- Additional volumes to the events controller pod
256
volumes: []
257
# -- Additional volumeMounts to the events controller main container
258
volumeMounts: []
259
# -- [Node selector]
260
nodeSelector: {}
261
# -- [Tolerations] for use with node taints
262
tolerations: []
263
# -- Assign custom [affinity] rules to the deployment
264
affinity: {}
265
# -- Assign custom [TopologySpreadConstraints] rules to the events controller
266
## Ref: https://kubernetes.io/docs/concepts/scheduling-eviction/topology-spread-constraints/
267
## If labelSelector is left out, it will default to the labelSelector configuration of the deployment
268
topologySpreadConstraints: []
269
# - maxSkew: 1
270
# topologyKey: topology.kubernetes.io/zone
271
# whenUnsatisfiable: DoNotSchedule
272
273
# -- Priority class for the events controller pods
274
priorityClassName: ""
275
# -- Resource limits and requests for the events controller pods
276
resources: {}
277
# limits:
278
# cpu: 500m
279
# memory: 512Mi
280
# requests:
281
# cpu: 250m
282
# memory: 256Mi
283
284
# -- Additional containers to be added to the events controller pods
285
extraContainers: []
286
# -- Init containers to add to the events controller pods
287
initContainers: []
288
serviceAccount:
289
# -- Create a service account for the events controller
290
create: true
291
# -- Service account name
292
name: ""
293
# -- Annotations applied to created service account
294
annotations: {}
295
# -- Automount API credentials for the Service Account
296
automountServiceAccountToken: true
297
## Events controller metrics configuration
298
metrics:
299
# -- Deploy metrics service
300
enabled: false
301
service:
302
# -- Metrics service annotations
303
annotations: {}
304
# -- Metrics service labels
305
labels: {}
306
# -- Metrics service port
307
servicePort: 8082
308
serviceMonitor:
309
# -- Enable a prometheus ServiceMonitor
310
enabled: false
311
# -- Prometheus ServiceMonitor interval
312
interval: 30s
313
# -- Prometheus [RelabelConfigs] to apply to samples before scraping
314
relabelings: []
315
# -- Prometheus [MetricRelabelConfigs] to apply to samples before ingestion
316
metricRelabelings: []
317
# -- Prometheus ServiceMonitor selector
318
selector: {}
319
# prometheus: kube-prometheus
320
# -- Prometheus ServiceMonitor namespace
321
namespace: "" # "monitoring"
322
# -- Prometheus ServiceMonitor labels
323
additionalLabels: {}
324
## Argo Events admission webhook
325
webhook:
326
# -- Enable admission webhook. Applies only for cluster-wide installation
327
enabled: false
328
# -- Argo Events admission webhook name string
329
name: events-webhook
330
image:
331
# -- Repository to use for the event controller
332
# @default -- `""` (defaults to global.image.repository)
333
repository: ""
334
# -- Tag to use for the event controller
335
# @default -- `""` (defaults to global.image.tag)
336
tag: ""
337
# -- Image pull policy for the event controller
338
# @default -- `""` (defaults to global.image.imagePullPolicy)
339
imagePullPolicy: ""
340
# -- The number of replicasets history to keep
341
revisionHistoryLimit: 5
342
# -- The number of webhook pods to run.
343
replicas: 1
344
# Pod disruption budget
345
pdb:
346
# -- Deploy a PodDisruptionBudget for the admission webhook
347
enabled: false
348
# minAvailable: 1
349
# maxUnavailable: 0
350
# -- Labels to be added to admission webhook pdb
351
labels: {}
352
# -- Annotations to be added to admission webhook pdb
353
annotations: {}
354
# -- Environment variables to pass to event controller
355
# @default -- `[]` (See [values.yaml])
356
env: []
357
# - name: DEBUG_LOG
358
# value: "true"
359
360
# -- envFrom to pass to event controller
361
# @default -- `[]` (See [values.yaml])
362
envFrom: []
363
# - configMapRef:
364
# name: config-map-name
365
# - secretRef:
366
# name: secret-name
367
368
# -- Annotations to be added to event controller pods
369
podAnnotations: {}
370
# -- Labels to be added to event controller pods
371
podLabels: {}
372
# -- Port to listen on
373
port: 443
374
# -- Event controller container-level security context
375
containerSecurityContext: {}
376
# capabilities:
377
# drop:
378
# - all
379
# readOnlyRootFilesystem: true
380
# runAsNonRoot: true
381
382
## Readiness and liveness probes for default backend
383
## Ref: https://kubernetes.io/docs/tasks/configure-pod-container/configure-liveness-readiness-startup-probes/
384
readinessProbe:
385
# -- Minimum consecutive failures for the [probe] to be considered failed after having succeeded
386
failureThreshold: 3
387
# -- Number of seconds after the container has started before [probe] is initiated
388
initialDelaySeconds: 10
389
# -- How often (in seconds) to perform the [probe]
390
periodSeconds: 10
391
# -- Minimum consecutive successes for the [probe] to be considered successful after having failed
392
successThreshold: 1
393
# -- Number of seconds after which the [probe] times out
394
timeoutSeconds: 1
395
livenessProbe:
396
# -- Minimum consecutive failures for the [probe] to be considered failed after having succeeded
397
failureThreshold: 3
398
# -- Number of seconds after the container has started before [probe] is initiated
399
initialDelaySeconds: 10
400
# -- How often (in seconds) to perform the [probe]
401
periodSeconds: 10
402
# -- Minimum consecutive successes for the [probe] to be considered successful after having failed
403
successThreshold: 1
404
# -- Number of seconds after which the [probe] times out
405
timeoutSeconds: 1
406
# -- Additional volumeMounts to the event controller main container
407
volumeMounts: []
408
# -- Additional volumes to the event controller pod
409
volumes: []
410
# -- [Node selector]
411
nodeSelector: {}
412
# -- [Tolerations] for use with node taints
413
tolerations: []
414
# -- Assign custom [affinity] rules to the deployment
415
affinity: {}
416
# -- Assign custom [TopologySpreadConstraints] rules to the event controller
417
## Ref: https://kubernetes.io/docs/concepts/scheduling-eviction/topology-spread-constraints/
418
## If labelSelector is left out, it will default to the labelSelector configuration of the deployment
419
topologySpreadConstraints: []
420
# - maxSkew: 1
421
# topologyKey: topology.kubernetes.io/zone
422
# whenUnsatisfiable: DoNotSchedule
423
424
# -- Priority class for the event controller pods
425
priorityClassName: ""
426
# -- Resource limits and requests for the event controller pods
427
resources: {}
428
# limits:
429
# cpu: 500m
430
# memory: 512Mi
431
# requests:
432
# cpu: 250m
433
# memory: 256Mi
434
435
serviceAccount:
436
# -- Create a service account for the admission webhook
437
create: true
438
# -- Service account name
439
name: ""
440
# -- Annotations applied to created service account
441
annotations: {}
442
# -- Automount API credentials for the Service Account
443
automountServiceAccountToken: true
444

The trusted source for open source

Talk to an expert
PrivacyTerms

Product

Chainguard ContainersChainguard LibrariesChainguard VMsChainguard OS PackagesChainguard ActionsChainguard Agent SkillsIntegrationsPricing
© 2026 Chainguard, Inc. All Rights Reserved.
Chainguard® and the Chainguard logo are registered trademarks of Chainguard, Inc. in the United States and/or other countries.
The other respective trademarks mentioned on this page are owned by the respective companies and use of them does not imply any affiliation or endorsement.