1# nameOverride is the short name for the deployment. Leave empty to let Helm generate a name using chart values.
2nameOverride: "elastic-operator"
3# fullnameOverride is the full name for the deployment. Leave empty to let Helm generate a name using chart values.
4fullnameOverride: "elastic-operator"
5# managedNamespaces is the set of namespaces that the operator manages. Leave empty to manage all namespaces.
7# installCRDs determines whether Custom Resource Definitions (CRD) are installed by the chart.
8# Note that CRDs are global resources and require cluster admin privileges to install.
9# If you are sharing a cluster with other users who may want to install ECK on their own namespaces, setting this to true can have unintended consequences.
10# 1. Upgrades will overwrite the global CRDs and could disrupt the other users of ECK who may be running a different version.
11# 2. Uninstalling the chart will delete the CRDs and potentially cause Elastic resources deployed by other users to be removed as well.
13# replicaCount is the number of operator pods to run.
16 # repository is the container image prefixed by the registry name.
17 repository: cgr.dev/chainguard-private/eck-operator
18 # pullPolicy is the container image pull policy.
19 pullPolicy: IfNotPresent
20 # tag is the container image tag. If not defined, defaults to chart appVersion.
21 tag: latest@sha256:363e7e2eced71f74f7d3381775ae6df478d6aac200c63889ffaa5b9fc57d6cae
22 # fips specifies whether the operator will use a FIPS compliant container image for its own StatefulSet image.
23 # This setting does not apply to Elastic Stack applications images.
24 # Can be combined with config.ubiOnly.
26# priorityClassName defines the PriorityClass to be used by the operator pods.
28# imagePullSecrets defines the secrets to use when pulling the operator container image.
30# resources define the container resource limits for the operator.
38# statefulsetAnnotations define the annotations that should be added to the operator StatefulSet.
39statefulsetAnnotations: {}
40# statefulsetLabels define additional labels that should be added to the operator StatefulSet.
42# podAnnotations define the annotations that should be added to the operator pod.
44## podLabels define additional labels that should be added to the operator pod.
46# podSecurityContext defines the pod security context for the operator pod.
49# securityContext defines the security context of the operator container.
51 allowPrivilegeEscalation: false
55 readOnlyRootFilesystem: true
57# nodeSelector defines the node selector for the operator pod.
59# tolerations defines the node tolerations for the operator pod.
61# affinity defines the node affinity rules for the operator pod.
63# podDisruptionBudget configures the minimum or the maxium available pods for voluntary disruptions,
64# set to either an integer (e.g. 1) or a percentage value (e.g. 25%).
69# additional environment variables for the operator container.
71# additional volume mounts for the operator container.
73# additional volumes to add to the operator pod.
75# createClusterScopedResources determines whether cluster-scoped resources (ClusterRoles, ClusterRoleBindings) should be created.
76createClusterScopedResources: true
77# Automount API credentials for the Service Account into the pod.
78automountServiceAccountToken: true
80 # create specifies whether a service account should be created for the operator.
82 # Specifies whether a service account should automount API credentials.
83 automountServiceAccountToken: true
84 # annotations to add to the service account
86 # name of the service account to use. If not set and create is true, a name is generated using the fullname template.
89 # enabled specifies whether APM tracing is enabled for the operator.
91 # config is a map of APM Server configuration variables that should be set in the environment.
93 ELASTIC_APM_SERVER_URL: http://localhost:8200
94 ELASTIC_APM_SERVER_TIMEOUT: 30s
96 # enforceRBAC specifies whether RBAC should be enforced for cross-namespace associations between resources.
99 # enabled determines whether the webhook is installed.
101 # caBundle is the PEM-encoded CA trust bundle for the webhook certificate. Only required if manageCerts is false and certManagerCert is null.
103 # certManagerCert is the name of the cert-manager certificate to use with the webhook.
104 certManagerCert: null
105 # certsDir is the directory to mount the certificates.
106 certsDir: "/tmp/k8s-webhook-server/serving-certs"
107 # failurePolicy of the webhook.
108 failurePolicy: Ignore
109 # manageCerts determines whether the operator manages the webhook certificates automatically.
111 # namespaceSelector corresponds to the namespaceSelector property of the webhook.
112 # Setting this restricts the webhook to act only on objects submitted to namespaces that match the selector.
113 namespaceSelector: {}
114 # objectSelector corresponds to the objectSelector property of the webhook.
115 # Setting this restricts the webhook to act only on objects that match the selector.
117 # port is the port that the validating webhook binds to.
119 # secret specifies the Kubernetes secret to be mounted into the path designated by the certsDir value to be used for webhook certificates.
121# hostNetwork allows a Pod to use the Node network namespace.
122# This is required to allow for communication with the kube API when using some alternate CNIs in conjunction with webhook enabled.
123# If hostNetwork is enabled, dnsPolicy defaults to ClusterFirstWithHostNet unless explicitly set.
124# CAUTION: Proceed at your own risk. This setting has security concerns such as allowing malicious users to access workloads running on the host.
126# dnsPolicy defines the DNS policy for the operator pod.
127# Check https://kubernetes.io/docs/concepts/services-networking/dns-pod-service/#pod-s-dns-policy for more details.
129# dnsConfig defines the DNS configuration for the operator pod.
130# Check https://kubernetes.io/docs/concepts/services-networking/dns-pod-service/#pod-dns-config for more details.
141 # enabled determines whether the operator is installed with soft multi-tenancy extensions.
142 # This requires network policies to be enabled on the Kubernetes cluster.
144# kubeAPIServerIP is required when softMultiTenancy is enabled.
147 # disabled determines whether the operator periodically updates ECK telemetry data for Kibana to consume.
149 # distributionChannel denotes which distribution channel was used to install the operator.
150 distributionChannel: "helm"
151# config values for the operator.
153 # logVerbosity defines the logging level. Valid values are as follows:
155 # -1: Errors and warnings
156 # 0: Errors, warnings, and information
157 # number greater than 0: Errors, warnings, information, and debug details.
159 # (Deprecated: use metrics.port: will be removed in v2.14.0) metricsPort defines the port to expose operator metrics. Set to 0 to disable metrics reporting.
162 # port defines the port to expose operator metrics. Set to 0 to disable metrics reporting.
164 # secureMode contains the options for enabling and configuring RBAC and TLS/HTTPs for the metrics endpoint.
166 # secureMode.enabled specifies whether to enable RBAC and TLS/HTTPs for the metrics endpoint.
167 # * This option makes most sense when using a ServiceMonitor to scrape the metrics and is therefore mutually exclusive with the podMonitor.enabled option.
168 # * This option also requires using cluster scoped resources (ClusterRole, ClusterRoleBinding) to
169 # grant access to the /metrics endpoint. (createClusterScopedResources: true is required)
173 # certificateSecret is the name of the tls secret containing the custom TLS certificate and key for the secure metrics endpoint.
175 # * This is an optional setting and is only required if you are using a custom TLS certificate. A self-signed certificate will be generated by default.
176 # * TLS secret key must be named tls.crt.
177 # * TLS key's secret key must be named tls.key.
178 # * It is assumed to be in the same namespace as the ServiceMonitor.
180 # example: kubectl create secret tls eck-metrics-tls-certificate -n elastic-system \
181 # --cert=/path/to/tls.crt --key=/path/to/tls.key
182 certificateSecret: ""
183 # containerRegistry to use for pulling Elasticsearch and other application container images.
184 containerRegistry: docker.elastic.co
185 # containerRepository to use for pulling Elasticsearch and other application container images.
186 # containerRepository: ""
188 # containerSuffix suffix to be appended to container images by default. Cannot be combined with -ubiOnly flag
189 # containerSuffix: ""
191 # maxConcurrentReconciles is the number of concurrent reconciliation operations to perform per controller.
192 maxConcurrentReconciles: "3"
193 # caValidity defines the validity period of the CA certificates generated by the operator.
195 # caRotateBefore defines when to rotate a CA certificate that is due to expire.
197 # caDir defines the directory containing a CA certificate (tls.crt) and its associated private key (tls.key) to be used for all managed resources.
198 # Setting this makes caRotateBefore and caValidity values ineffective.
200 # certificatesValidity defines the validity period of certificates generated by the operator.
201 certificatesValidity: 8760h
202 # certificatesRotateBefore defines when to rotate a certificate that is due to expire.
203 certificatesRotateBefore: 24h
204 # disableConfigWatch specifies whether the operator watches the configuration file for changes.
205 disableConfigWatch: false
206 # exposedNodeLabels is an array of regular expressions of node labels which are allowed to be copied as annotations on Elasticsearch Pods.
207 exposedNodeLabels: ["topology.kubernetes.io/.*", "failure-domain.beta.kubernetes.io/.*"]
208 # ipFamily specifies the IP family to use. Possible values: IPv4, IPv6 and "" (auto-detect)
210 # setDefaultSecurityContext determines whether a default security context is set on application containers created by the operator.
211 # *note* that the default option now is "auto-detect" to attempt to set this properly automatically when both running
212 # in an openshift cluster, and a standard kubernetes cluster. Valid values are as follows:
213 # "auto-detect" : auto detect
214 # "true" : set pod security context when creating resources.
215 # "false" : do not set pod security context when creating resources.
216 setDefaultSecurityContext: "auto-detect"
217 # kubeClientTimeout sets the request timeout for Kubernetes API calls made by the operator.
218 kubeClientTimeout: 60s
219 # elasticsearchClientTimeout sets the request timeout for Elasticsearch API calls made by the operator.
220 elasticsearchClientTimeout: 180s
221 # policies contains policies for the operator, currently only password generation policies are supported.
226 # validateStorageClass specifies whether storage classes volume expansion support should be verified.
227 # Can be disabled if cluster-wide storage class RBAC access is not available.
228 validateStorageClass: true
229 # enableLeaderElection specifies whether leader election should be enabled
230 enableLeaderElection: true
231 # Interval between observations of Elasticsearch health, non-positive values disable asynchronous observation.
232 elasticsearchObservationInterval: 10s
233 # ubiOnly specifies whether the operator will use only UBI container images to deploy Elastic Stack applications as well as for its own StatefulSet image. UBI images are only available from 7.10.0 onward.
234 # Cannot be combined with the containerSuffix value.
236# Prometheus PodMonitor configuration
237# Reference: https://github.com/prometheus-operator/prometheus-operator/blob/master/Documentation/api.md#podmonitor
239 # enabled determines whether a podMonitor should deployed to scrape the eck metrics.
240 # This requires the prometheus operator and the config.metrics.port not to be 0
242 # labels adds additional labels to the podMonitor
244 # annotations adds additional annotations to the podMonitor
246 # namespace determines in which namespace the podMonitor will be deployed.
247 # If not set the podMonitor will be created in the namespace where the Helm release is installed into
248 # namespace: monitoring
250 # interval specifies the interval at which metrics should be scraped
252 # scrapeTimeout specifies the timeout after which the scrape is ended
254 # podTargetLabels transfers labels on the Kubernetes Pod onto the target.
256 # podMetricsEndpointConfig allows to add an extended configuration to the podMonitor
257 podMetricsEndpointConfig: {}
258 # honorTimestamps: true
259# Prometheus ServiceMonitor configuration
260# Only used when config.enableSecureMetrics is true
261# Reference: https://github.com/prometheus-operator/prometheus-operator/blob/master/Documentation/api.md#servicemonitor
263 # This option requires the following settings within Prometheus to function:
264 # 1. RBAC settings for the Prometheus instance to access the metrics endpoint.
271 # 2. If using the Prometheus Operator and your Prometheus instance is not in the same namespace as the operator you will need
272 # the Prometheus Operator configured with the following Helm values:
276 # serviceMonitorNamespaceSelector: {}
277 # serviceMonitorSelectorNilUsesHelmValues: false
279 # allows to disable the serviceMonitor, enabled by default for backwards compatibility
281 # namespace determines in which namespace the serviceMonitor will be deployed.
282 # If not set the serviceMonitor will be created in the namespace where the Helm release is installed into
283 # namespace: monitoring
284 # caSecret is the name of the secret containing the custom CA certificate used to generate the custom TLS certificate for the secure metrics endpoint.
286 # * This *must* be the name of the secret containing the CA certificate used to sign the custom TLS certificate for the metrics endpoint.
287 # * This secret *must* be in the same namespace as the Prometheus instance that will scrape the metrics.
288 # * If using the Prometheus operator this secret must be within the `spec.secrets` field of the `Prometheus` custom resource such that it is mounted into the Prometheus pod at `caMountDirectory`, which defaults to /etc/prometheus/secrets/{secret-name}.
289 # * This is an optional setting and is only required if you are using a custom TLS certificate.
290 # * Key must be named ca.crt.
292 # example: kubectl create secret generic eck-metrics-tls-ca -n monitoring \
293 # --from-file=ca.crt=/path/to/ca.pem
295 # caMountDirectory is the directory at which the CA certificate is mounted within the Prometheus pod.
297 # * You should only need to adjust this if you are *not* using the Prometheus operator.
298 caMountDirectory: "/etc/prometheus/secrets/"
299 # insecureSkipVerify specifies whether to skip verification of the TLS certificate for the secure metrics endpoint.
301 # * If this setting is set to false, then the following settings are required:
302 # - certificateSecret
304 insecureSkipVerify: true
305# Globals meant for internal use only
307 # manifestGen specifies whether the chart is running under manifest generator.
308 # This is used for tasks specific to generating the all-in-one.yaml file.
310 # createOperatorNamespace defines whether the operator namespace manifest should be generated when in manifestGen mode.
311 # Usually we do want that to happen (e.g. all-in-one.yaml) but, sometimes we don't (e.g. E2E tests).
312 createOperatorNamespace: true
313 # kubeVersion is the effective Kubernetes version we target when generating the all-in-one.yaml.