Files
infrastructure/helm/dashboard/values.yaml
2025-09-30 11:31:23 +02:00

75 lines
1.9 KiB
YAML

namespace: i-dashboard
image:
repository: kubernetesui/dashboard
tag: "v2.7.0"
pullPolicy: IfNotPresent
# -- Image settings for the metrics scraper
metricsScraper:
repository: kubernetesui/metrics-scraper
tag: "v1.0.8"
pullPolicy: IfNotPresent
# -- Kubernetes Service configuration
service:
type: ClusterIP
port: 443
targetPort: 8443
# For NodePort or LoadBalancer, you can specify nodePort or loadBalancerIP
# nodePort: 32000
# loadBalancerIP: "x.x.x.x"
annotations: {}
# kubernetes.io/tls-acme: "true"
# -- Resource requests and limits for the dashboard pod
# It's recommended to set resources to avoid resource starvation.
resources:
limits:
cpu: 100m
memory: 200Mi
requests:
cpu: 50m
memory: 100Mi
# -- Ingress configuration
# Enable this if you want to expose the dashboard via an Ingress controller.
ingress:
enabled: false
# className: "nginx" # Specify your ingress class
annotations: {}
# kubernetes.io/ingress.class: nginx
# cert-manager.io/cluster-issuer: "letsencrypt-prod"
hosts:
- host: dashboard.local
paths:
- path: /
pathType: Prefix
tls: []
# - secretName: dashboard-tls
# hosts:
# - dashboard.local
# -- RBAC (Role-Based Access Control) settings
# Creates a ServiceAccount and ClusterRoleBinding for the dashboard.
rbac:
create: true
# Set to true to give the dashboard admin privileges across the cluster.
# WARNING: This is a security risk. Use with caution in production.
clusterAdminRole: false
# -- Name of the ServiceAccount to use.
# If not set and rbac.create is true, a name is generated using the fullname template
serviceAccount:
name: ""
# -- Security Context for the pod and container
securityContext:
allowPrivilegeEscalation: false
readOnlyRootFilesystem: true
runAsUser: 1001
runAsGroup: 2001
# -- Additional labels to apply to all resources
extraLabels: {}
# app.kubernetes.io/instance: "my-dashboard"