auditor.affinity |
object |
{} |
the affinity/anti-affinity feature, greatly expands the types of constraints you can express |
auditor.auditorProperties |
string |
The default minimum necessary values of auditor.properties are set. You can overwrite it with your own auditor.properties. |
The auditor.properties is created based on the values of auditor.scalarAuditorConfiguration by default. If you want to customize auditor.properties, you can override this value with your auditor.properties. |
auditor.existingSecret |
string |
"" |
Name of existing secret to use for storing database username and password |
auditor.extraVolumeMounts |
list |
[] |
Defines additional volume mounts. |
auditor.extraVolumes |
list |
[] |
Defines additional volumes. |
auditor.grafanaDashboard.enabled |
bool |
false |
enable grafana dashboard |
auditor.grafanaDashboard.namespace |
string |
"monitoring" |
which namespace grafana dashboard is located. by default monitoring |
auditor.image.pullPolicy |
string |
"IfNotPresent" |
Specify a imagePullPolicy |
auditor.image.repository |
string |
"ghcr.io/scalar-labs/scalar-auditor" |
Docker image |
auditor.image.version |
string |
"4.0.0-SNAPSHOT" |
Docker tag |
auditor.imagePullSecrets |
list |
[{"name":"reg-docker-secrets"}] |
Optionally specify an array of imagePullSecrets. Secrets must be manually created in the namespace. |
auditor.nodeSelector |
object |
{} |
nodeSelector is form of node selection constraint |
auditor.podSecurityContext |
object |
{"seccompProfile":{"type":"RuntimeDefault"}} |
PodSecurityContext holds pod-level security attributes and common container settings |
auditor.prometheusRule.enabled |
bool |
false |
enable rules for prometheus |
auditor.prometheusRule.namespace |
string |
"monitoring" |
which namespace prometheus is located. by default monitoring |
auditor.replicaCount |
int |
3 |
number of replicas to deploy |
auditor.resources |
object |
{} |
resources allowed to the pod |
auditor.scalarAuditorConfiguration.auditorCertHolderId |
string |
"auditor" |
The holder ID of an Auditor certificate |
auditor.scalarAuditorConfiguration.auditorCertSecretKey |
string |
"certificate" |
The secret key of an Auditor certificate |
auditor.scalarAuditorConfiguration.auditorCertVersion |
int |
1 |
The version of an Auditor certificate |
auditor.scalarAuditorConfiguration.auditorLedgerHost |
string |
"" |
The host name of Ledger. The service endpoint of Ledger-side envoy should be specified |
auditor.scalarAuditorConfiguration.auditorLogLevel |
string |
"INFO" |
The log level of Scalar auditor |
auditor.scalarAuditorConfiguration.auditorPrivateKeySecretKey |
string |
"private-key" |
The secret key of an Auditor private key |
auditor.scalarAuditorConfiguration.auditorServerAdminPort |
int |
40053 |
The port number of Auditor Admin Server |
auditor.scalarAuditorConfiguration.auditorServerPort |
int |
40051 |
The port number of Auditor Server |
auditor.scalarAuditorConfiguration.auditorServerPrivilegedPort |
int |
40052 |
The port number of Auditor Privileged Server |
auditor.scalarAuditorConfiguration.dbContactPoints |
string |
"cassandra" |
The contact points of the database such as hostnames or URLs |
auditor.scalarAuditorConfiguration.dbContactPort |
int |
9042 |
The port number of the contact points |
auditor.scalarAuditorConfiguration.dbPassword |
string |
"cassandra" |
The password of the database |
auditor.scalarAuditorConfiguration.dbStorage |
string |
"cassandra" |
The storage of the database: cassandra or cosmos |
auditor.scalarAuditorConfiguration.dbUsername |
string |
"cassandra" |
The username of the database |
auditor.scalarAuditorConfiguration.secretName |
string |
"auditor-keys" |
The name of an Auditor secret |
auditor.secretName |
string |
"" |
Secret name that includes sensitive data such as credentials. Each secret key is passed to Pod as environment variables using envFrom. |
auditor.securityContext |
object |
{"allowPrivilegeEscalation":false,"capabilities":{"drop":["ALL"]},"runAsNonRoot":true} |
Setting security context at the pod applies those settings to all containers in the pod |
auditor.service.annotations |
object |
{} |
Service annotations |
auditor.service.ports.scalardl-auditor-admin.port |
int |
40053 |
scalardl-admin target port |
auditor.service.ports.scalardl-auditor-admin.protocol |
string |
"TCP" |
scalardl-admin protocol |
auditor.service.ports.scalardl-auditor-admin.targetPort |
int |
40053 |
scalardl-admin k8s internal name |
auditor.service.ports.scalardl-auditor-priv.port |
int |
40052 |
scalardl-priv target port |
auditor.service.ports.scalardl-auditor-priv.protocol |
string |
"TCP" |
scalardl-priv protocol |
auditor.service.ports.scalardl-auditor-priv.targetPort |
int |
40052 |
scalardl-priv k8s internal name |
auditor.service.ports.scalardl-auditor.port |
int |
40051 |
scalardl target port |
auditor.service.ports.scalardl-auditor.protocol |
string |
"TCP" |
scalardl protocol |
auditor.service.ports.scalardl-auditor.targetPort |
int |
40051 |
scalardl k8s internal name |
auditor.service.type |
string |
"ClusterIP" |
service types in kubernetes |
auditor.serviceAccount.automountServiceAccountToken |
bool |
false |
Specify to mount a service account token or not |
auditor.serviceAccount.serviceAccountName |
string |
"" |
Name of the existing service account resource |
auditor.serviceMonitor.enabled |
bool |
false |
enable metrics collect with prometheus |
auditor.serviceMonitor.interval |
string |
"15s" |
custom interval to retrieve the metrics |
auditor.serviceMonitor.namespace |
string |
"monitoring" |
which namespace prometheus is located. by default monitoring |
auditor.strategy.rollingUpdate.maxSurge |
string |
"25%" |
The number of pods that can be created above the desired amount of pods during an update |
auditor.strategy.rollingUpdate.maxUnavailable |
string |
"25%" |
The number of pods that can be unavailable during the update process |
auditor.strategy.type |
string |
"RollingUpdate" |
New pods are added gradually, and old pods are terminated gradually, e.g: Recreate or RollingUpdate |
auditor.tls.caRootCertForLedgerSecret |
string |
"" |
Name of the Secret containing the custom CA root certificate for TLS communication between Auditor and Ledger. |
auditor.tls.caRootCertSecret |
string |
"" |
Name of the Secret containing the custom CA root certificate for TLS communication. |
auditor.tls.caRootCertSecretForServiceMonitor |
string |
"" |
Name of the Secret containing the CA root certificate for TLS communication on the metrics endpoint. Prometheus Operator retrieves the CA root certificate file from this secret resource. You must create this secret resource in the same namespace as Prometheus. |
auditor.tls.certChainSecret |
string |
"" |
Name of the Secret containing the certificate chain file used for TLS communication. |
auditor.tls.certManager.dnsNames |
list |
["localhost"] |
Subject Alternative Name (SAN) of a certificate. |
auditor.tls.certManager.duration |
string |
"8760h0m0s" |
Duration of a certificate. |
auditor.tls.certManager.enabled |
bool |
false |
Use cert-manager to manage private key and certificate files. |
auditor.tls.certManager.issuerRef |
object |
{} |
Issuer references of cert-manager. |
auditor.tls.certManager.privateKey |
object |
{"algorithm":"ECDSA","encoding":"PKCS1","size":256} |
Configuration of a private key. |
auditor.tls.certManager.renewBefore |
string |
"360h0m0s" |
How long before expiry a certificate should be renewed. |
auditor.tls.certManager.selfSigned.caRootCert.duration |
string |
"8760h0m0s" |
Duration of a self-signed CA certificate. |
auditor.tls.certManager.selfSigned.caRootCert.renewBefore |
string |
"360h0m0s" |
How long before expiry a self-signed CA certificate should be renewed. |
auditor.tls.certManager.selfSigned.enabled |
bool |
false |
Use self-signed CA. |
auditor.tls.certManager.usages |
list |
["server auth","key encipherment","signing"] |
List of key usages. |
auditor.tls.enabled |
bool |
false |
Enable TLS. You need to enable TLS when you use wire encryption feature of ScalarDL Auditor. |
auditor.tls.overrideAuthority |
string |
"" |
The custom authority for TLS communication. This doesn't change what host is actually connected. This is intended for testing, but may safely be used outside of tests as an alternative to DNS overrides. For example, you can specify the hostname presented in the certificate chain file that you set by using auditor.tls.certChainSecret . This chart uses this value for startupProbe and livenessProbe. |
auditor.tls.privateKeySecret |
string |
"" |
Name of the Secret containing the private key file used for TLS communication. |
auditor.tolerations |
list |
[] |
Tolerations are applied to pods, and allow (but do not require) the pods to schedule onto nodes with matching taints. |
envoy.enabled |
bool |
true |
enable envoy |
envoy.envoyConfiguration.serviceListeners |
string |
"scalardl-audit-service:40051,scalardl-audit-privileged:40052" |
list of service name and port |
envoy.image.version |
string |
"2.0.0-SNAPSHOT" |
Docker tag |
envoy.nameOverride |
string |
"scalardl-audit" |
String to partially override envoy.fullname template |
envoy.service.annotations |
object |
{} |
Service annotations, e.g: prometheus, etc. |
envoy.service.ports.envoy-priv.port |
int |
40052 |
envoy public port |
envoy.service.ports.envoy-priv.protocol |
string |
"TCP" |
envoy protocol |
envoy.service.ports.envoy-priv.targetPort |
int |
40052 |
envoy k8s internal name |
envoy.service.ports.envoy.port |
int |
40051 |
envoy public port |
envoy.service.ports.envoy.protocol |
string |
"TCP" |
envoy protocol |
envoy.service.ports.envoy.targetPort |
int |
40051 |
envoy k8s internal name |
envoy.service.type |
string |
"ClusterIP" |
service types in kubernetes |
fullnameOverride |
string |
"" |
String to fully override scalardl-audit.fullname template |
nameOverride |
string |
"" |
String to partially override scalardl-audit.fullname template (will maintain the release name) |