webhooks/alloydb-mutating-wh/helm/omni-pod-mutator/values.yaml (93 lines of code) (raw):
# Default values for omni-pod-mutator.
# This is a YAML-formatted file.
# Declare variables to be passed into your templates.
# Replicas of the webhook server. Start with 1 if you would like then scale as needed, no HPA is supplied with this release.
replicaCount: 2
# You must label your AlloyDB Omni namespace where the DBCluster resource was deployed and update this with your own label name it's value.
# omniNamespaceLabel: "alloydb.google.com/omni-ns"
# omniNamespaceLabelValue: "true"
# certManager:
# issuer: "alloydb-omni-wh-self-signed"
deploymentName: "alloydb-tolerations-mutator"
# Mutating webhook configurations.
# webhookConfigs:
# name: "webhook.alloydb.google.com"
# Container image specific values go here.
image:
#repository: rmishragcp01/pod-tolerations-mutator-wh
repository: gcr.io/rmishra-kubernetes-playground/pod-tolerations-mutator-wh
pullPolicy: IfNotPresent
tag: "v1.1"
imagePullSecrets: []
nameOverride: ""
fullnameOverride: ""
# Name of the file which will be mounted on the container as a ConfigMap volume.
tolerationConfigFile: "tolerations"
# This must match the mountPath under volumeMounts for tolerations.
tolerationConfigFilePath: "/etc/tolerations"
# This must match the mountPath under volumeMounts for certificates.
tlsCertRoot: "/etc/certs"
# This must match the name of the secret created by the Certificate Manager. Program will use tls.crt and tls.key as cert and key file under this directory.
#tlsCeryDir: "alloydb-pod-mutator-tls-cert"
# Configure the ConfigMap data to be used by the mutator.
omniTolerations:
- key: cloud.google.com/alloydb-omni-nodes
operator: Exists
effect: NoSchedule
- key: cloud.google.com/gke-nodepool
operator: Equal
value: alloydb-omni-nodes
effect: NoSchedule
# The name of the ConfigMap object must match the name configMapName.
# Don't alter the secret name, the secret name here would match the secret created post the issuance of a tls cert via the Issuer when a CertificateResource is created.
# The secret auto-created by the CertManager is named as "{{{ .Values.deploymentName }}}-cert" per it's own Helm template. So you need to change the values.yaml and Certificate template if you want to use a different name.
volumes:
- name: tolerations
configMap:
name: alloydb-tolerations-mutator-cm
- name: certificates
secret:
secretName: alloydb-tolerations-mutator-tls-cert
# The name here must be same as the volumes[0].name.
# The mountPath should match tolerationConfigFilePath.
volumeMounts:
- name: tolerations
mountPath: "/etc/tolerations"
readOnly: true
- name: certificates
mountPath: "/etc/certs"
readOnly: true
# The name of the Secret object must match the name secretName.
serviceAccount:
create: true
automount: false
name: "omni-pod-mutator-sa"
podAnnotations:
alloydb.cloud.google.com/vendor: "cloud.google.com"
alloydb.cloud.google.com/author: "cloud.google.com"
alloydb.cloud.google.com/type: "tools"
# Port at which the webhook container will be listening for secured TCP connection, use the same port for service as well.
container:
port: 8443
# podLabels:
# app.kubernetes.io/name: pod-mutator-wh
podSecurityContext:
fsGroup: 2000
securityContext:
readOnlyRootFilesystem: true
runAsNonRoot: true
runAsUser: 1001
service:
type: ClusterIP
port: 8443
resources:
requests:
cpu: 100m
memory: 128Mi
limits:
cpu: 200m
memory: 256Mi
livenessProbe:
httpGet:
path: /mutate
port: https
scheme: HTTPS
httpHeaders:
- name: "User-Agent"
value: "Kubelet"
periodSeconds: 3
initialDelaySeconds: 3
readinessProbe:
httpGet:
path: /mutate
port: https
scheme: HTTPS
httpHeaders:
- name: "User-Agent"
value: "Kubelet"
initialDelaySeconds: 5
periodSeconds: 5
# This release will not have any HPA, manually spin up the replicas as needed, starting with 1.
autoscaling:
enabled: false
# minReplicas: 1
# maxReplicas: 4
# targetCPUUtilizationPercentage: 80
nodeSelector: {}
tolerations: []
affinity: {}
ingress:
enabled: false
# Values to be delegated to the subchart which contains the MutatingWebhookConfiguration.
webhook-config:
deploymentName: "alloydb-tolerations-mutator"
webhookConfigName: "webhook.alloydb.toleration.mutator.google.com"
omniNamespaceLabel: "kubernetes.io/metadata.name"
omniNamespaceLabelValue: "alloydb-pwrx"
servicePort: 8443