Skip to content

DoD-Platform-One/Kiali

Repository files navigation

kiali

Version: 2.12.0-bb.2 AppVersion: 2.12.0 Maintenance Track: bb_integrated

Kiali is an open source project for service mesh observability, refer to https://www.kiali.io for details.

Upstream References

Upstream Release Notes

Learn More

Pre-Requisites

  • Kubernetes Cluster deployed
  • Kubernetes config installed in ~/.kube/config
  • Helm installed

Install Helm

https://helm.sh/docs/intro/install/

Deployment

  • Clone down the repository
  • cd into directory
helm install kiali chart/

Values

Key Type Default Description
domain string "bigbang.dev"
sso.enabled bool false
istio.enabled bool false
istio.hardened.enabled bool false
istio.hardened.customAuthorizationPolicies list []
istio.hardened.outboundTrafficPolicyMode string "REGISTRY_ONLY"
istio.hardened.customServiceEntries list []
istio.kiali.gateways[0] string "istio-system/main"
istio.kiali.hosts[0] string "kiali.{{ .Values.domain }}"
istio.mtls.mode string "STRICT"
tracing.enabled bool true
monitoring.enabled bool true
networkPolicies.enabled bool false
networkPolicies.prependReleaseName bool true
networkPolicies.ingress.to.kiali.from.definition.gateway bool true
networkPolicies.egress.from.*.to.definition.kubeAPI bool true
networkPolicies.egress.from.kiali.to.k8s.monitoring/prometheus:9090 bool true
networkPolicies.egress.from.kiali.to.k8s.monitoring/grafana:3000 bool true
networkPolicies.egress.from.kiali.to.k8s.tempo/tempo:3100 bool true
networkPolicies.egress.from.helm-test.podSelector.matchLabels.helm-test string "enabled"
networkPolicies.egress.from.helm-test.to.cidr."0.0.0.0/0" bool true
networkPolicies.ingressLabels.app string "istio-ingressgateway"
networkPolicies.ingressLabels.istio string "ingressgateway"
networkPolicies.bundled.base.enabled bool true
networkPolicies.bundled.conditional.enabled bool true
networkPolicies.bundled.kubeApiAccess.enabled bool true
networkPolicies.bundled.kubeApiAccess.controlPlaneCidrs[0] string "10.0.0.0/8"
networkPolicies.bundled.kubeApiAccess.controlPlaneCidrs[1] string "172.16.0.0/12"
networkPolicies.bundled.kubeApiAccess.controlPlaneCidrs[2] string "192.168.0.0/16"
networkPolicies.bundled.dynamic.enabled bool true
networkPolicies.bundled.dynamic.ingress.kiali.ports[0].port int 20001
networkPolicies.bundled.dynamic.ingress.kiali.ports[0].protocol string "TCP"
networkPolicies.bundled.dynamic.ssoCidrs[0] string "0.0.0.0/0"
networkPolicies.additionalPolicies list []
bbtests.enabled bool false
bbtests.cypress.artifacts bool true
bbtests.cypress.envs.cypress_url string "http://kiali:20001"
waitJob.enabled bool true
waitJob.scripts.image string "registry1.dso.mil/ironbank/opensource/kubernetes/kubectl:v1.32.5"
waitJob.permissions.apiGroups[0] string "apps"
waitJob.permissions.apiGroups[1] string "kiali.io"
waitJob.permissions.apiGroups[2] string "kiali.io/v1alpha1"
waitJob.permissions.resources[0] string "deployments"
waitJob.permissions.resources[1] string "kialis"
upstream.nameOverride string "kiali-operator"
upstream.image.repo string "registry1.dso.mil/ironbank/opensource/kiali/kiali-operator"
upstream.image.tag string "v2.12.0"
upstream.image.pullPolicy string "IfNotPresent"
upstream.image.pullSecrets[0] string "private-registry"
upstream.securityContext.capabilities.drop[0] string "ALL"
upstream.securityContext.allowPrivilegeEscalation bool false
upstream.securityContext.privileged bool false
upstream.securityContext.runAsNonRoot bool true
upstream.securityContext.readOnlyRootFilesystem bool true
upstream.securityContext.runAsGroup int 2001
upstream.securityContext.runAsUser int 2001
upstream.allowAdHocKialiImage bool true
upstream.allowSecurityContextOverride bool true
upstream.cr.create bool true
upstream.cr.spec.server.port int 20001
upstream.cr.spec.istio_namespace string "istio-system"
upstream.cr.spec.auth.strategy string "anonymous"
upstream.cr.spec.deployment.image_name string "registry1.dso.mil/ironbank/opensource/kiali/kiali"
upstream.cr.spec.deployment.image_version string "v2.12.0"
upstream.cr.spec.deployment.image_pull_secrets[0] string "private-registry"
upstream.cr.spec.deployment.resources.requests.cpu string "100m"
upstream.cr.spec.deployment.resources.requests.memory string "128Mi"
upstream.cr.spec.deployment.resources.limits.memory string "1Gi"
upstream.cr.spec.deployment.security_context.capabilities.drop[0] string "ALL"
upstream.cr.spec.deployment.security_context.allowPrivilegeEscalation bool false
upstream.cr.spec.deployment.security_context.privileged bool false
upstream.cr.spec.deployment.security_context.runAsNonRoot bool true
upstream.cr.spec.deployment.security_context.readOnlyRootFilesystem bool true
upstream.cr.spec.deployment.security_context.runAsGroup int 1001
upstream.cr.spec.deployment.security_context.runAsUser int 1001
upstream.cr.spec.external_services.prometheus.url string "http://monitoring-monitoring-kube-prometheus.monitoring.svc.cluster.local:9090"
upstream.cr.spec.external_services.grafana.internal_url string "http://monitoring-grafana.monitoring.svc.cluster.local:80"
upstream.cr.spec.external_services.grafana.url string "https://grafana.bigbang.dev"
upstream.cr.spec.external_services.grafana.auth.username string "admin"
upstream.cr.spec.external_services.grafana.auth.password string "prom-operator"
upstream.cr.spec.external_services.grafana.auth.type string "basic"
upstream.cr.spec.external_services.tracing.enabled bool true
upstream.cr.spec.external_services.tracing.url string "https://tracing.bigbang.dev"
upstream.cr.spec.external_services.tracing.internal_url string "http://jaeger-query.jaeger.svc.cluster.local:16686"
upstream.cr.spec.external_services.tracing.use_grpc bool false
upstream.cr.spec.external_services.tracing.whitelist_istio_system[0] string "istio"

Contributing

Please see the contributing guide if you are interested in contributing.


This file is programatically generated using helm-docs and some BigBang-specific templates. The gluon repository has instructions for regenerating package READMEs.

Releases

No releases published

Packages

No packages published

Contributors 26