Kiali is an open source project for service mesh observability, refer to https://www.kiali.io for details.
- https://github.com/kiali/kiali-operator
- https://github.com/kiali/kiali
- https://github.com/kiali/kiali-operator
- https://github.com/kiali/helm-charts
- Kubernetes Cluster deployed
- Kubernetes config installed in
~/.kube/config
- Helm installed
Install Helm
https://helm.sh/docs/intro/install/
- Clone down the repository
- cd into directory
helm install kiali chart/
Key | Type | Default | Description |
---|---|---|---|
domain | string | "bigbang.dev" |
|
sso.enabled | bool | false |
|
istio.enabled | bool | false |
|
istio.hardened.enabled | bool | false |
|
istio.hardened.customAuthorizationPolicies | list | [] |
|
istio.hardened.outboundTrafficPolicyMode | string | "REGISTRY_ONLY" |
|
istio.hardened.customServiceEntries | list | [] |
|
istio.kiali.gateways[0] | string | "istio-system/main" |
|
istio.kiali.hosts[0] | string | "kiali.{{ .Values.domain }}" |
|
istio.mtls.mode | string | "STRICT" |
|
tracing.enabled | bool | true |
|
monitoring.enabled | bool | true |
|
networkPolicies.enabled | bool | false |
|
networkPolicies.prependReleaseName | bool | true |
|
networkPolicies.ingress.to.kiali.from.definition.gateway | bool | true |
|
networkPolicies.egress.from.*.to.definition.kubeAPI | bool | true |
|
networkPolicies.egress.from.kiali.to.k8s.monitoring/prometheus:9090 | bool | true |
|
networkPolicies.egress.from.kiali.to.k8s.monitoring/grafana:3000 | bool | true |
|
networkPolicies.egress.from.kiali.to.k8s.tempo/tempo:3100 | bool | true |
|
networkPolicies.egress.from.helm-test.podSelector.matchLabels.helm-test | string | "enabled" |
|
networkPolicies.egress.from.helm-test.to.cidr."0.0.0.0/0" | bool | true |
|
networkPolicies.ingressLabels.app | string | "istio-ingressgateway" |
|
networkPolicies.ingressLabels.istio | string | "ingressgateway" |
|
networkPolicies.bundled.base.enabled | bool | true |
|
networkPolicies.bundled.conditional.enabled | bool | true |
|
networkPolicies.bundled.kubeApiAccess.enabled | bool | true |
|
networkPolicies.bundled.kubeApiAccess.controlPlaneCidrs[0] | string | "10.0.0.0/8" |
|
networkPolicies.bundled.kubeApiAccess.controlPlaneCidrs[1] | string | "172.16.0.0/12" |
|
networkPolicies.bundled.kubeApiAccess.controlPlaneCidrs[2] | string | "192.168.0.0/16" |
|
networkPolicies.bundled.dynamic.enabled | bool | true |
|
networkPolicies.bundled.dynamic.ingress.kiali.ports[0].port | int | 20001 |
|
networkPolicies.bundled.dynamic.ingress.kiali.ports[0].protocol | string | "TCP" |
|
networkPolicies.bundled.dynamic.ssoCidrs[0] | string | "0.0.0.0/0" |
|
networkPolicies.additionalPolicies | list | [] |
|
bbtests.enabled | bool | false |
|
bbtests.cypress.artifacts | bool | true |
|
bbtests.cypress.envs.cypress_url | string | "http://kiali:20001" |
|
waitJob.enabled | bool | true |
|
waitJob.scripts.image | string | "registry1.dso.mil/ironbank/opensource/kubernetes/kubectl:v1.32.5" |
|
waitJob.permissions.apiGroups[0] | string | "apps" |
|
waitJob.permissions.apiGroups[1] | string | "kiali.io" |
|
waitJob.permissions.apiGroups[2] | string | "kiali.io/v1alpha1" |
|
waitJob.permissions.resources[0] | string | "deployments" |
|
waitJob.permissions.resources[1] | string | "kialis" |
|
upstream.nameOverride | string | "kiali-operator" |
|
upstream.image.repo | string | "registry1.dso.mil/ironbank/opensource/kiali/kiali-operator" |
|
upstream.image.tag | string | "v2.12.0" |
|
upstream.image.pullPolicy | string | "IfNotPresent" |
|
upstream.image.pullSecrets[0] | string | "private-registry" |
|
upstream.securityContext.capabilities.drop[0] | string | "ALL" |
|
upstream.securityContext.allowPrivilegeEscalation | bool | false |
|
upstream.securityContext.privileged | bool | false |
|
upstream.securityContext.runAsNonRoot | bool | true |
|
upstream.securityContext.readOnlyRootFilesystem | bool | true |
|
upstream.securityContext.runAsGroup | int | 2001 |
|
upstream.securityContext.runAsUser | int | 2001 |
|
upstream.allowAdHocKialiImage | bool | true |
|
upstream.allowSecurityContextOverride | bool | true |
|
upstream.cr.create | bool | true |
|
upstream.cr.spec.server.port | int | 20001 |
|
upstream.cr.spec.istio_namespace | string | "istio-system" |
|
upstream.cr.spec.auth.strategy | string | "anonymous" |
|
upstream.cr.spec.deployment.image_name | string | "registry1.dso.mil/ironbank/opensource/kiali/kiali" |
|
upstream.cr.spec.deployment.image_version | string | "v2.12.0" |
|
upstream.cr.spec.deployment.image_pull_secrets[0] | string | "private-registry" |
|
upstream.cr.spec.deployment.resources.requests.cpu | string | "100m" |
|
upstream.cr.spec.deployment.resources.requests.memory | string | "128Mi" |
|
upstream.cr.spec.deployment.resources.limits.memory | string | "1Gi" |
|
upstream.cr.spec.deployment.security_context.capabilities.drop[0] | string | "ALL" |
|
upstream.cr.spec.deployment.security_context.allowPrivilegeEscalation | bool | false |
|
upstream.cr.spec.deployment.security_context.privileged | bool | false |
|
upstream.cr.spec.deployment.security_context.runAsNonRoot | bool | true |
|
upstream.cr.spec.deployment.security_context.readOnlyRootFilesystem | bool | true |
|
upstream.cr.spec.deployment.security_context.runAsGroup | int | 1001 |
|
upstream.cr.spec.deployment.security_context.runAsUser | int | 1001 |
|
upstream.cr.spec.external_services.prometheus.url | string | "http://monitoring-monitoring-kube-prometheus.monitoring.svc.cluster.local:9090" |
|
upstream.cr.spec.external_services.grafana.internal_url | string | "http://monitoring-grafana.monitoring.svc.cluster.local:80" |
|
upstream.cr.spec.external_services.grafana.url | string | "https://grafana.bigbang.dev" |
|
upstream.cr.spec.external_services.grafana.auth.username | string | "admin" |
|
upstream.cr.spec.external_services.grafana.auth.password | string | "prom-operator" |
|
upstream.cr.spec.external_services.grafana.auth.type | string | "basic" |
|
upstream.cr.spec.external_services.tracing.enabled | bool | true |
|
upstream.cr.spec.external_services.tracing.url | string | "https://tracing.bigbang.dev" |
|
upstream.cr.spec.external_services.tracing.internal_url | string | "http://jaeger-query.jaeger.svc.cluster.local:16686" |
|
upstream.cr.spec.external_services.tracing.use_grpc | bool | false |
|
upstream.cr.spec.external_services.tracing.whitelist_istio_system[0] | string | "istio" |
Please see the contributing guide if you are interested in contributing.
This file is programatically generated using helm-docs
and some BigBang-specific templates. The gluon
repository has instructions for regenerating package READMEs.