This commit is contained in:
2025-09-30 11:44:12 +02:00
parent b983d23b14
commit 5b59e60006
2 changed files with 36 additions and 59 deletions

View File

@@ -1,14 +1,14 @@
# Chart.yaml
apiVersion: v2
name: kubernetes-dashboard
description: A Helm chart for deploying the Kubernetes Dashboard.
description: A minimal wrapper chart to deploy the Kubernetes Dashboard into the i-dashboard namespace
type: application
version: 1.0.0
appVersion: "v2.7.0"
version: 0.1.0
appVersion: "latest"
kubeVersion: ">=1.20.0"
keywords:
- kubernetes
- dashboard
- ui
home: "https://kubernetes.github.io/dashboard/"
sources:
- "https://github.com/kubernetes/dashboard"

View File

@@ -1,74 +1,51 @@
namespace: i-dashboard
image:
repository: kubernetesui/dashboard
tag: "v2.7.0"
tag: "v2.8.0" # reasonable default; change to desired version
pullPolicy: IfNotPresent
# -- Image settings for the metrics scraper
metricsScraper:
repository: kubernetesui/metrics-scraper
tag: "v1.0.8"
pullPolicy: IfNotPresent
# -- Kubernetes Service configuration
service:
type: ClusterIP
port: 443
targetPort: 8443
# For NodePort or LoadBalancer, you can specify nodePort or loadBalancerIP
# nodePort: 32000
# loadBalancerIP: "x.x.x.x"
annotations: {}
# kubernetes.io/tls-acme: "true"
# -- Resource requests and limits for the dashboard pod
# It's recommended to set resources to avoid resource starvation.
resources:
limits:
cpu: 100m
memory: 200Mi
requests:
cpu: 50m
memory: 100Mi
# -- Ingress configuration
# Enable this if you want to expose the dashboard via an Ingress controller.
ingress:
enabled: false
# className: "nginx" # Specify your ingress class
annotations: {}
# kubernetes.io/ingress.class: nginx
# cert-manager.io/cluster-issuer: "letsencrypt-prod"
hosts:
- host: dashboard.local
paths:
- path: /
pathType: Prefix
hosts: []
tls: []
# - secretName: dashboard-tls
# hosts:
# - dashboard.local
# -- RBAC (Role-Based Access Control) settings
# Creates a ServiceAccount and ClusterRoleBinding for the dashboard.
rbac:
create: true
# Set to true to give the dashboard admin privileges across the cluster.
# WARNING: This is a security risk. Use with caution in production.
clusterAdminRole: false
clusterAdmin: false
serviceAccountName: ""
# -- Name of the ServiceAccount to use.
# If not set and rbac.create is true, a name is generated using the fullname template
metrics:
enabled: false
extraArgs: []
enableInsecureLogin: true
createClusterRoleBinding: false
tls:
enabled: false
resources: {}
nodeSelector: {}
tolerations: []
affinity: {}
# Service account configuration (empty => auto-generated name when create=true)
serviceAccount:
create: true
name: ""
# -- Security Context for the pod and container
securityContext:
allowPrivilegeEscalation: false
readOnlyRootFilesystem: true
runAsUser: 1001
runAsGroup: 2001
extraObjects: []
# -- Additional labels to apply to all resources
extraLabels: {}
# app.kubernetes.io/instance: "my-dashboard"
readinessProbe: {}
livenessProbe: {}
fullnameOverride: kubernetes-dashboard