-
Notifications
You must be signed in to change notification settings - Fork 1
/
values.yaml
112 lines (95 loc) · 4.2 KB
/
values.yaml
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
deployment:
name: crane
namespace: "bm"
# This is the name of roles and clusterroles created by the chart.
matches:
crane: "ready"
role: "roleCrane"
clusterrole: "cluster-roleCrane"
serviceAccount:
# Specifies whether a ServiceAccount should be created, currently BM OPLs in Kubernetes only supports default service account.
create: false
# The name of the ServiceAccount to enable, keep empty to enable default account.
name:
env:
authToken:
# if you want to pass the AUTH_TOKEN through secret in the crane ENV variables set secret to yes and add secret name and key
secret:
enable: no
secretName: "your-secretName"
secretKey: "auth-token"
# if secret is not enabled, please enter the AUTH_TOKEN below directly.
token: "MY_SAMPLE_TOKEN-shfowh243owijoidh243o2nosIOIJONo2414"
harbour_id: "MY_SAMPLE_HARBOURID-302870vdr9237"
ship_id: "MY_SAMPLE_SHIPID-dfwe3423535"
docker_regirstry: "gcr.io/verdant-bulwark-278"
auto_update: "'true'"
image: "gcr.io/verdant-bulwark-278/blazemeter/crane:latest-master"
pullPolicy: "Always"
# Proxy configurations here, change enable to yes, followed by http/https configuration
proxy:
enable: no
# If you have authentication required for your proxy, then you will need to add username:password@server:port
http_proxy: yes
http_path: "http://server:port"
https_proxy: yes
https_path: "https://server:port"
# The NO_PROXY settings for 127.0.0.1 and localhost (provided below) are required for the Service Virtualization integration and
# Transaction-based Mock Services to work. If you do not enable any HTTP_PROXY or HTTPS_PROXY settings, you can skip the NO_PROXY setting.
no_proxy: "kubernetes.default,127.0.0.1,localhost,myHostname.com"
# Configure CA Bundle here - Change enable: yes
ca_bundle:
enable: no
ca_subpath: "certificate.crt"
aws_subpath: "certificate.crt"
volume:
volume_name: "volume-cm"
mount_path: "/var/cm"
# If you plan to enable non-privileged containers, please enable the below configuration, change enable:yes
# This will run all pods/containers (related to private location installation) within the cluster as non_root.
non_privilege_container:
enable: no
runAsGroup: 1337
runAsUser: 1337
restartPolicy: "Always"
# enable Istio-Ingress if this Private location is going to run mock-services
# Follow this guide till you have created a secret in istio-system namespace called wildcard-credential.
# https://guide.blazemeter.com/hc/en-us/articles/20206158935953-Installing-a-BlazeMeter-Agent-for-Kubernetes-Mock-Services#h_01F68B8GZSBKE9A9G7TMK105F7
istio_ingress:
enable: no
credentialName: "wildcard-credential"
web_expose_subdomain: "mydomain.local"
pre_pulling: "true"
istio_gateway_name: "bzm-gateway"
# We can enable nginx-ingress instead of istio-ingress, currently, the chart expects nginx-ingress to be pre-installed in the cluster.
# Follow Blazemeter guide for more information on installing nginx-ingress.
nginx_ingress:
enable: no
# pre-installed: yes
credentialName: "wildcard-credential"
web_expose_subdomain: "mydomain.local"
# Labels to add to resources created by Crane, must be in JSON format.
labels:
enable: no
syntax: {"label_1": "label_1_value", "label_2": "label2value"}
#Set to specify that the crane container passes tolerations and node selector elements to child containers.
toleration:
enable: no
syntax: [{ "effect": "NoSchedule", "key": "lifecycle", "operator": "Equal", "value": "spot" }]
#Used to configure the k8s nodeSelector field to match specific node labels for the Crane engine deployment. Must be in JSON format.
nodeSelector:
enable: no
syntax: {"label_1": "label_1_value", "label_2": "label_2_value"}
#For functional test only
# The user-defined port where to run Doduo (BlazeMeter Grid Proxy). By default, Doduo listens on port 8000.
#doduoPort:
# The public certificate for the domain used to run the BlazeMeter Grid proxy over HTTPS. Value in string format.
#tlsCertGrid:
#The private key for the domain used to run the BlazeMeter Grid proxy over HTTPS. Value in string format.
#tlsKeyGrid:
# CPU limits for resources created by agent.
# Memory limits for resources created by agent.
resourceLimit:
enable: no
CPU: "800m"
MEM: "4Gi"