Skip to content

Latest commit

 

History

History
355 lines (346 loc) · 32.8 KB

File metadata and controls

355 lines (346 loc) · 32.8 KB

activiti-cloud-full-example

Version: 8.7.0-SNAPSHOT

A Helm chart for Activiti Cloud Full Example

Source Code

Requirements

Kubernetes: >=1.15.0-0

Repository Name Version
https://activiti.github.io/activiti-cloud-helm-charts activiti-cloud-identity-adapter(common) 8.7.0-alpha.2
https://activiti.github.io/activiti-cloud-helm-charts runtime-bundle(common) 8.7.0-alpha.2
https://activiti.github.io/activiti-cloud-helm-charts activiti-cloud-query(common) 8.7.0-alpha.2
https://activiti.github.io/activiti-cloud-helm-charts activiti-cloud-connector(common) 8.7.0-alpha.2
https://activiti.github.io/activiti-cloud-helm-charts activiti-cloud-consumer(common) 8.7.0-alpha.2
https://codecentric.github.io/helm-charts activiti-cloud-identity(keycloak) 11.0.1
https://raw.githubusercontent.com/bitnami/charts/archive-full-index/bitnami/ kafka 12.x.x
https://raw.githubusercontent.com/bitnami/charts/archive-full-index/bitnami/ postgresql 9.1.1
https://raw.githubusercontent.com/bitnami/charts/archive-full-index/bitnami/ rabbitmq 7.8.0

Values

Key Type Default Description
activiti-cloud-connector.enabled bool true
activiti-cloud-connector.extraEnv string "- name: SERVER_SERVLET_CONTEXTPATH\n value: \"{{ tpl .Values.ingress.path . }}\"\n- name: SERVER_USEFORWARDHEADERS\n value: \"true\"\n- name: SERVER_TOMCAT_INTERNALPROXIES\n value: \".*\""
activiti-cloud-connector.image.pullPolicy string "Always"
activiti-cloud-connector.image.repository string "activiti/example-cloud-connector"
activiti-cloud-connector.image.tag string "8.7.0-alpha.66"
activiti-cloud-connector.ingress.annotations."kubernetes.io/ingress.class" string "nginx"
activiti-cloud-connector.ingress.annotations."nginx.ingress.kubernetes.io/cors-allow-headers" string "Authorization, Content-Type, Accept"
activiti-cloud-connector.ingress.annotations."nginx.ingress.kubernetes.io/enable-cors" string "true"
activiti-cloud-connector.ingress.enabled bool false
activiti-cloud-connector.ingress.path string "/example-cloud-connector"
activiti-cloud-connector.livenessProbe.path string `"{{ tpl .Values.ingress.path . trimSuffix "/" }}/actuator/health/liveness"`
activiti-cloud-connector.messaging.enabled bool true
activiti-cloud-connector.nameOverride string "activiti-cloud-connector"
activiti-cloud-connector.readinessProbe.path string `"{{ tpl .Values.ingress.path . trimSuffix "/" }}/actuator/health/readiness"`
activiti-cloud-connector.resources.limits.cpu string "1"
activiti-cloud-connector.resources.limits.memory string "1024Mi"
activiti-cloud-connector.resources.requests.cpu string "150m"
activiti-cloud-connector.resources.requests.memory string "256Mi"
activiti-cloud-connector.service.name string "example-cloud-connector"
activiti-cloud-consumer.args[0] string "-jar"
activiti-cloud-consumer.args[1] string "consumer.jar"
activiti-cloud-consumer.db.ddlAuto string "none"
activiti-cloud-consumer.enabled bool false
activiti-cloud-consumer.extraEnv string "- name: SERVER_SERVLET_CONTEXTPATH\n value: \"{{ tpl .Values.ingress.path . }}\"\n- name: SERVER_USEFORWARDHEADERS\n value: \"true\"\n- name: SERVER_TOMCAT_INTERNALPROXIES\n value: \".*\""
activiti-cloud-consumer.image.pullPolicy string "Always"
activiti-cloud-consumer.image.repository string "activiti/activiti-cloud-query"
activiti-cloud-consumer.image.tag string "8.7.0-alpha.66"
activiti-cloud-consumer.ingress.annotations."kubernetes.io/ingress.class" string "nginx"
activiti-cloud-consumer.ingress.annotations."nginx.ingress.kubernetes.io/cors-allow-headers" string "Authorization, Content-Type, Accept"
activiti-cloud-consumer.ingress.annotations."nginx.ingress.kubernetes.io/enable-cors" string "true"
activiti-cloud-consumer.ingress.path string "/"
activiti-cloud-consumer.javaOpts.xms string "512m"
activiti-cloud-consumer.javaOpts.xmx string "2048m"
activiti-cloud-consumer.liquibase.enabled bool true
activiti-cloud-consumer.livenessProbe.path string `"{{ tpl .Values.ingress.path . trimSuffix "/" }}/actuator/health/liveness"`
activiti-cloud-consumer.messaging.enabled bool true
activiti-cloud-consumer.messaging.role string "consumer"
activiti-cloud-consumer.nameOverride string "activiti-cloud-consumer"
activiti-cloud-consumer.postgresql.enabled bool true
activiti-cloud-consumer.readinessProbe.path string `"{{ tpl .Values.ingress.path . trimSuffix "/" }}/actuator/health/readiness"`
activiti-cloud-consumer.resources.limits.cpu string "1"
activiti-cloud-consumer.resources.limits.memory string "2048Mi"
activiti-cloud-consumer.resources.requests.cpu string "200m"
activiti-cloud-consumer.resources.requests.memory string "512Mi"
activiti-cloud-consumer.service.name string "consumer"
activiti-cloud-identity-adapter.enabled bool true
activiti-cloud-identity-adapter.extraEnv string "- name: SERVER_SERVLET_CONTEXTPATH\n value: \"{{ tpl .Values.ingress.path . }}\"\n- name: SERVER_USEFORWARDHEADERS\n value: \"true\"\n- name: SERVER_TOMCAT_INTERNALPROXIES\n value: \".*\""
activiti-cloud-identity-adapter.image.pullPolicy string "Always"
activiti-cloud-identity-adapter.image.repository string "activiti/activiti-cloud-identity-adapter"
activiti-cloud-identity-adapter.image.tag string "8.7.0-alpha.66"
activiti-cloud-identity-adapter.ingress.annotations."kubernetes.io/ingress.class" string "nginx"
activiti-cloud-identity-adapter.ingress.annotations."nginx.ingress.kubernetes.io/cors-allow-headers" string "Authorization, Content-Type, Accept"
activiti-cloud-identity-adapter.ingress.annotations."nginx.ingress.kubernetes.io/enable-cors" string "true"
activiti-cloud-identity-adapter.ingress.path string "/identity-adapter-service"
activiti-cloud-identity-adapter.liquibase.enabled bool false
activiti-cloud-identity-adapter.livenessProbe.path string `"{{ tpl .Values.ingress.path . trimSuffix "/" }}/actuator/health/liveness"`
activiti-cloud-identity-adapter.nameOverride string "activiti-cloud-identity-adapter"
activiti-cloud-identity-adapter.postgresql.enabled bool false
activiti-cloud-identity-adapter.readinessProbe.path string `"{{ tpl .Values.ingress.path . trimSuffix "/" }}/actuator/health/readiness"`
activiti-cloud-identity-adapter.resources.limits.cpu string "1"
activiti-cloud-identity-adapter.resources.limits.memory string "1024Mi"
activiti-cloud-identity-adapter.resources.requests.cpu string "400m"
activiti-cloud-identity-adapter.resources.requests.memory string "512Mi"
activiti-cloud-identity-adapter.service.name string "identity-adapter"
activiti-cloud-identity.enabled bool true
activiti-cloud-identity.extraEnv string "- name: KEYCLOAK_USER\n value: {{ .Values.username }}\n- name: KEYCLOAK_PASSWORD\n value: {{ .Values.password }}\n- name: PROXY_ADDRESS_FORWARDING\n value: \"true\"\n- name: KEYCLOAK_IMPORT\n value: /realm/realm.json"
activiti-cloud-identity.extraVolumeMounts string "- name: realm-secret\n mountPath: \"/realm/\"\n readOnly: true\n"
activiti-cloud-identity.extraVolumes string "- name: realm-secret\n secret:\n secretName: realm-secret\n"
activiti-cloud-identity.image.pullPolicy string "IfNotPresent"
activiti-cloud-identity.image.repository string "alfresco/alfresco-identity-service"
activiti-cloud-identity.image.tag string "1.6.0"
activiti-cloud-identity.ingress.annotations."kubernetes.io/ingress.class" string "nginx"
activiti-cloud-identity.ingress.annotations."nginx.ingress.kubernetes.io/affinity" string "cookie"
activiti-cloud-identity.ingress.annotations."nginx.ingress.kubernetes.io/enable-cors" string "false"
activiti-cloud-identity.ingress.annotations."nginx.ingress.kubernetes.io/proxy-buffer-size" string "128k"
activiti-cloud-identity.ingress.annotations."nginx.ingress.kubernetes.io/session-cookie-hash" string "sha1"
activiti-cloud-identity.ingress.annotations."nginx.ingress.kubernetes.io/session-cookie-name" string "identity_affinity_route"
activiti-cloud-identity.ingress.enabled bool true
activiti-cloud-identity.ingress.rules[0].host string "{{ include \"common.keycloak-host\" . }}"
activiti-cloud-identity.ingress.rules[0].paths[0] string "/auth"
activiti-cloud-identity.ingress.tls list []
activiti-cloud-identity.nameOverride string "keycloak"
activiti-cloud-identity.password string "admin"
activiti-cloud-identity.persistence.dbPassword string "keycloak"
activiti-cloud-identity.persistence.dbVendor string "postgres"
activiti-cloud-identity.persistence.deployPostgres bool true
activiti-cloud-identity.postgresql.commonAnnotations.application string "keycloak"
activiti-cloud-identity.postgresql.nameOverride string "postgresql-id"
activiti-cloud-identity.postgresql.persistence.enabled bool true
activiti-cloud-identity.postgresql.postgresqlPassword string "keycloak"
activiti-cloud-identity.postgresql.resources.limits.cpu string "1"
activiti-cloud-identity.postgresql.resources.limits.memory string "500Mi"
activiti-cloud-identity.postgresql.resources.requests.cpu string "300m"
activiti-cloud-identity.postgresql.resources.requests.memory string "250Mi"
activiti-cloud-identity.rbac.create bool false
activiti-cloud-identity.realm.extraClientRoles list []
activiti-cloud-identity.realm.extraClients list []
activiti-cloud-identity.realm.extraGroups[0].name string "hr"
activiti-cloud-identity.realm.extraGroups[0].realmRoles[0] string "ACTIVITI_USER"
activiti-cloud-identity.realm.extraGroups[1].name string "sales"
activiti-cloud-identity.realm.extraGroups[1].realmRoles[0] string "ACTIVITI_USER"
activiti-cloud-identity.realm.extraGroups[2].name string "testgroup"
activiti-cloud-identity.realm.extraGroups[3].name string "processadmin"
activiti-cloud-identity.realm.extraGroups[3].realmRoles[0] string "ACTIVITI_ADMIN"
activiti-cloud-identity.realm.extraRealmRoles list []
activiti-cloud-identity.realm.extraUsers[0].clientRoles.account[0] string "manage-account"
activiti-cloud-identity.realm.extraUsers[0].clientRoles.account[1] string "view-profile"
activiti-cloud-identity.realm.extraUsers[0].clientRoles.broker[0] string "read-token"
activiti-cloud-identity.realm.extraUsers[0].clientRoles.realm-management[0] string "manage-users"
activiti-cloud-identity.realm.extraUsers[0].clientRoles.realm-management[1] string "manage-clients"
activiti-cloud-identity.realm.extraUsers[0].clientRoles.realm-management[2] string "manage-authorization"
activiti-cloud-identity.realm.extraUsers[0].clientRoles.realm-management[3] string "manage-events"
activiti-cloud-identity.realm.extraUsers[0].clientRoles.realm-management[4] string "manage-realm"
activiti-cloud-identity.realm.extraUsers[0].clientRoles.realm-management[5] string "create-client"
activiti-cloud-identity.realm.extraUsers[0].clientRoles.realm-management[6] string "impersonation"
activiti-cloud-identity.realm.extraUsers[0].clientRoles.realm-management[7] string "realm-admin"
activiti-cloud-identity.realm.extraUsers[0].credentials[0].type string "password"
activiti-cloud-identity.realm.extraUsers[0].credentials[0].value string "password"
activiti-cloud-identity.realm.extraUsers[0].email string "[email protected]"
activiti-cloud-identity.realm.extraUsers[0].enabled bool true
activiti-cloud-identity.realm.extraUsers[0].firstName string "admin"
activiti-cloud-identity.realm.extraUsers[0].lastName string "admin"
activiti-cloud-identity.realm.extraUsers[0].realmRoles[0] string "offline_access"
activiti-cloud-identity.realm.extraUsers[0].realmRoles[1] string "uma_authorization"
activiti-cloud-identity.realm.extraUsers[0].username string "admin"
activiti-cloud-identity.realm.extraUsers[1].clientRoles.account[0] string "manage-account"
activiti-cloud-identity.realm.extraUsers[1].clientRoles.account[1] string "view-profile"
activiti-cloud-identity.realm.extraUsers[1].clientRoles.broker[0] string "read-token"
activiti-cloud-identity.realm.extraUsers[1].clientRoles.realm-management[0] string "manage-users"
activiti-cloud-identity.realm.extraUsers[1].clientRoles.realm-management[1] string "manage-clients"
activiti-cloud-identity.realm.extraUsers[1].clientRoles.realm-management[2] string "manage-authorization"
activiti-cloud-identity.realm.extraUsers[1].clientRoles.realm-management[3] string "manage-events"
activiti-cloud-identity.realm.extraUsers[1].clientRoles.realm-management[4] string "manage-realm"
activiti-cloud-identity.realm.extraUsers[1].clientRoles.realm-management[5] string "create-client"
activiti-cloud-identity.realm.extraUsers[1].clientRoles.realm-management[6] string "impersonation"
activiti-cloud-identity.realm.extraUsers[1].clientRoles.realm-management[7] string "realm-admin"
activiti-cloud-identity.realm.extraUsers[1].credentials[0].type string "password"
activiti-cloud-identity.realm.extraUsers[1].credentials[0].value string "password"
activiti-cloud-identity.realm.extraUsers[1].email string "[email protected]"
activiti-cloud-identity.realm.extraUsers[1].enabled bool true
activiti-cloud-identity.realm.extraUsers[1].firstName string "Super Admin"
activiti-cloud-identity.realm.extraUsers[1].lastName string "User"
activiti-cloud-identity.realm.extraUsers[1].realmRoles[0] string "ACTIVITI_USER"
activiti-cloud-identity.realm.extraUsers[1].realmRoles[1] string "ACTIVITI_ADMIN"
activiti-cloud-identity.realm.extraUsers[1].realmRoles[2] string "offline_access"
activiti-cloud-identity.realm.extraUsers[1].realmRoles[3] string "uma_authorization"
activiti-cloud-identity.realm.extraUsers[1].username string "superadminuser"
activiti-cloud-identity.realm.extraUsers[2].clientRoles.account[0] string "manage-account"
activiti-cloud-identity.realm.extraUsers[2].clientRoles.account[1] string "view-profile"
activiti-cloud-identity.realm.extraUsers[2].credentials[0].type string "password"
activiti-cloud-identity.realm.extraUsers[2].credentials[0].value string "password"
activiti-cloud-identity.realm.extraUsers[2].email string "[email protected]"
activiti-cloud-identity.realm.extraUsers[2].enabled bool true
activiti-cloud-identity.realm.extraUsers[2].firstName string "HR"
activiti-cloud-identity.realm.extraUsers[2].groups[0] string "/hr"
activiti-cloud-identity.realm.extraUsers[2].lastName string "User"
activiti-cloud-identity.realm.extraUsers[2].realmRoles[0] string "offline_access"
activiti-cloud-identity.realm.extraUsers[2].realmRoles[1] string "uma_authorization"
activiti-cloud-identity.realm.extraUsers[2].realmRoles[2] string "ACTIVITI_USER"
activiti-cloud-identity.realm.extraUsers[2].username string "hruser"
activiti-cloud-identity.realm.extraUsers[3].clientRoles.account[0] string "manage-account"
activiti-cloud-identity.realm.extraUsers[3].clientRoles.account[1] string "view-profile"
activiti-cloud-identity.realm.extraUsers[3].credentials[0].type string "password"
activiti-cloud-identity.realm.extraUsers[3].credentials[0].value string "password"
activiti-cloud-identity.realm.extraUsers[3].email string "[email protected]"
activiti-cloud-identity.realm.extraUsers[3].enabled bool true
activiti-cloud-identity.realm.extraUsers[3].firstName string "Process Admin"
activiti-cloud-identity.realm.extraUsers[3].groups[0] string "/processadmin"
activiti-cloud-identity.realm.extraUsers[3].lastName string "User"
activiti-cloud-identity.realm.extraUsers[3].realmRoles[0] string "offline_access"
activiti-cloud-identity.realm.extraUsers[3].realmRoles[1] string "uma_authorization"
activiti-cloud-identity.realm.extraUsers[3].realmRoles[2] string "ACTIVITI_ADMIN"
activiti-cloud-identity.realm.extraUsers[3].username string "processadminuser"
activiti-cloud-identity.realm.extraUsers[4].clientRoles.account[0] string "manage-account"
activiti-cloud-identity.realm.extraUsers[4].clientRoles.account[1] string "view-profile"
activiti-cloud-identity.realm.extraUsers[4].credentials[0].type string "password"
activiti-cloud-identity.realm.extraUsers[4].credentials[0].value string "password"
activiti-cloud-identity.realm.extraUsers[4].email string "[email protected]"
activiti-cloud-identity.realm.extraUsers[4].enabled bool true
activiti-cloud-identity.realm.extraUsers[4].firstName string "Sales"
activiti-cloud-identity.realm.extraUsers[4].groups[0] string "/sales"
activiti-cloud-identity.realm.extraUsers[4].lastName string "User"
activiti-cloud-identity.realm.extraUsers[4].realmRoles[0] string "offline_access"
activiti-cloud-identity.realm.extraUsers[4].realmRoles[1] string "uma_authorization"
activiti-cloud-identity.realm.extraUsers[4].realmRoles[2] string "ACTIVITI_USER"
activiti-cloud-identity.realm.extraUsers[4].username string "salesuser"
activiti-cloud-identity.realm.extraUsers[5].clientRoles.account[0] string "manage-account"
activiti-cloud-identity.realm.extraUsers[5].clientRoles.account[1] string "view-profile"
activiti-cloud-identity.realm.extraUsers[5].credentials[0].type string "password"
activiti-cloud-identity.realm.extraUsers[5].credentials[0].value string "password"
activiti-cloud-identity.realm.extraUsers[5].email string "[email protected]"
activiti-cloud-identity.realm.extraUsers[5].enabled bool true
activiti-cloud-identity.realm.extraUsers[5].firstName string "Test"
activiti-cloud-identity.realm.extraUsers[5].groups[0] string "/testgroup"
activiti-cloud-identity.realm.extraUsers[5].lastName string "User"
activiti-cloud-identity.realm.extraUsers[5].realmRoles[0] string "offline_access"
activiti-cloud-identity.realm.extraUsers[5].realmRoles[1] string "uma_authorization"
activiti-cloud-identity.realm.extraUsers[5].realmRoles[2] string "ACTIVITI_USER"
activiti-cloud-identity.realm.extraUsers[5].username string "testuser"
activiti-cloud-identity.realm.extraUsers[6].clientRoles.account[0] string "manage-account"
activiti-cloud-identity.realm.extraUsers[6].clientRoles.account[1] string "view-profile"
activiti-cloud-identity.realm.extraUsers[6].credentials[0].type string "password"
activiti-cloud-identity.realm.extraUsers[6].credentials[0].value string "password"
activiti-cloud-identity.realm.extraUsers[6].email string "[email protected]"
activiti-cloud-identity.realm.extraUsers[6].enabled bool true
activiti-cloud-identity.realm.extraUsers[6].firstName string "HR"
activiti-cloud-identity.realm.extraUsers[6].groups[0] string "/hr"
activiti-cloud-identity.realm.extraUsers[6].lastName string "Admin"
activiti-cloud-identity.realm.extraUsers[6].realmRoles[0] string "offline_access"
activiti-cloud-identity.realm.extraUsers[6].realmRoles[1] string "uma_authorization"
activiti-cloud-identity.realm.extraUsers[6].realmRoles[2] string "ACTIVITI_USER"
activiti-cloud-identity.realm.extraUsers[6].realmRoles[3] string "ACTIVITI_ADMIN"
activiti-cloud-identity.realm.extraUsers[6].username string "hradmin"
activiti-cloud-identity.realm.extraUsers[7].clientRoles.account[0] string "manage-account"
activiti-cloud-identity.realm.extraUsers[7].clientRoles.account[1] string "view-profile"
activiti-cloud-identity.realm.extraUsers[7].credentials[0].type string "password"
activiti-cloud-identity.realm.extraUsers[7].credentials[0].value string "password"
activiti-cloud-identity.realm.extraUsers[7].email string "[email protected]"
activiti-cloud-identity.realm.extraUsers[7].enabled bool true
activiti-cloud-identity.realm.extraUsers[7].firstName string "Test"
activiti-cloud-identity.realm.extraUsers[7].groups[0] string "/testgroup"
activiti-cloud-identity.realm.extraUsers[7].lastName string "Admin"
activiti-cloud-identity.realm.extraUsers[7].realmRoles[0] string "offline_access"
activiti-cloud-identity.realm.extraUsers[7].realmRoles[1] string "uma_authorization"
activiti-cloud-identity.realm.extraUsers[7].realmRoles[2] string "ACTIVITI_USER"
activiti-cloud-identity.realm.extraUsers[7].realmRoles[3] string "ACTIVITI_ADMIN"
activiti-cloud-identity.realm.extraUsers[7].username string "testadmin"
activiti-cloud-identity.resources.limits.memory string "1024Mi"
activiti-cloud-identity.resources.requests.memory string "750Mi"
activiti-cloud-identity.serviceAccount.create bool false
activiti-cloud-identity.username string "admin"
activiti-cloud-query.db.ddlAuto string "none" set to 'none' temporarily rather than default 'validate' that breaks
activiti-cloud-query.enabled bool true
activiti-cloud-query.extraEnv string `"- name: GRAPHIQL_GRAPHQL_WEB_PATH\n value: '{{ tpl .Values.ingress.path . trimSuffix "/" }}/notifications/graphql'\n- name: GRAPHIQL_GRAPHQL_WS_PATH\n value: '{{ tpl .Values.ingress.path .
activiti-cloud-query.image.pullPolicy string "Always"
activiti-cloud-query.image.repository string "activiti/activiti-cloud-query"
activiti-cloud-query.image.tag string "8.7.0-alpha.66"
activiti-cloud-query.ingress.annotations."kubernetes.io/ingress.class" string "nginx"
activiti-cloud-query.ingress.annotations."nginx.ingress.kubernetes.io/affinity" string "cookie"
activiti-cloud-query.ingress.annotations."nginx.ingress.kubernetes.io/cors-allow-headers" string "Authorization, Content-Type, Accept"
activiti-cloud-query.ingress.annotations."nginx.ingress.kubernetes.io/enable-cors" string "true"
activiti-cloud-query.ingress.annotations."nginx.ingress.kubernetes.io/rewrite-target" string "/$1"
activiti-cloud-query.ingress.annotations."nginx.ingress.kubernetes.io/session-cookie-change-on-failure" string "true"
activiti-cloud-query.ingress.annotations."nginx.ingress.kubernetes.io/session-cookie-name" string "activiti-cloud-query-session"
activiti-cloud-query.ingress.path string "/"
activiti-cloud-query.ingress.subPaths[0] string "/query/?(.*)"
activiti-cloud-query.ingress.subPaths[1] string "/audit/?(.*)"
activiti-cloud-query.ingress.subPaths[2] string "/notifications/?(.*)"
activiti-cloud-query.javaOpts.xms string "512m"
activiti-cloud-query.javaOpts.xmx string "2048m"
activiti-cloud-query.liquibase.enabled bool true
activiti-cloud-query.livenessProbe.path string `"{{ tpl .Values.ingress.path . trimSuffix "/" }}/actuator/health/liveness"`
activiti-cloud-query.messaging.enabled bool true
activiti-cloud-query.messaging.role string "consumer"
activiti-cloud-query.nameOverride string "activiti-cloud-query"
activiti-cloud-query.postgresql.enabled bool true
activiti-cloud-query.readinessProbe.path string `"{{ tpl .Values.ingress.path . trimSuffix "/" }}/actuator/health/readiness"`
activiti-cloud-query.resources.limits.cpu string "1.5"
activiti-cloud-query.resources.limits.memory string "2048Mi"
activiti-cloud-query.resources.requests.cpu string "200m"
activiti-cloud-query.resources.requests.memory string "512Mi"
activiti-cloud-query.service.name string "query"
global object `{"application":{"name":"{{ .Release.Name }}"},"extraEnv":"- name: ACTIVITI_CLOUD_APPLICATION_NAME\n value: "{{ tpl .Values.global.application.name $ required "global.application.name is required" }}"\n- name: ACTIVITI_KEYCLOAK_CLIENT_ID\n valueFrom:\n secretKeyRef:\n name: {{ tpl .Values.global.keycloak.clientSecretName $ }}\n key: clientId\n- name: ACTIVITI_KEYCLOAK_CLIENT_SECRET\n valueFrom:\n secretKeyRef:\n name: {{ tpl .Values.global.keycloak.clientSecretName $ }}\n key: clientSecret\n","gateway":{"annotations":null,"domain":"DOMAIN","host":"gateway-{{ .Release.Namespace }}.{{ template "common.gateway-domain" . }}","http":"true","tlsacme":"false"},"kafka":{"brokers":"kafka","extraEnv":"- name: ACT_AUDIT_PRODUCER_TRANSACTION_ID_PREFIX\n value: ""\n"},"keycloak":{"clientId":"activiti-keycloak","clientSecret":"","clientSecretName":"activiti-keycloak-client","host":"identity-{{ .Release.Namespace }}.{{ template "common.gateway-domain" . }}","realm":"activiti","resource":"activiti","url":"","useExistingClientSecret":false},"messaging":{"broker":"rabbitmq","partitionCount":2,"partitioned":false},"rabbitmq":{"extraEnv":"","host":"rabbitmq","password":"guest","username":"guest"},"registryPullSecrets":[]}`
global.application.name string "{{ .Release.Name }}" configure application name for deployment
global.extraEnv string `"- name: ACTIVITI_CLOUD_APPLICATION_NAME\n value: "{{ tpl .Values.global.application.name $ required "global.application.name is required" }}"\n- name: ACTIVITI_KEYCLOAK_CLIENT_ID\n valueFrom:\n secretKeyRef:\n name: {{ tpl .Values.global.keycloak.clientSecretName $ }}\n key: clientId\n- name: ACTIVITI_KEYCLOAK_CLIENT_SECRET\n valueFrom:\n secretKeyRef:\n name: {{ tpl .Values.global.keycloak.clientSecretName $ }}\n key: clientSecret\n"`
global.gateway.annotations string nil Configure global annotations for all service ingresses
global.gateway.domain string "DOMAIN" Set to configure gateway domain template, i.e. {{ .Release.Namespace }}.1.3.4.5.nip.io $ helm upgrade aae . --install --set global.gateway.domain=1.2.3.4.nip.io
global.gateway.host string "gateway-{{ .Release.Namespace }}.{{ template \"common.gateway-domain\" . }}" Set to configure single host domain name for all services
global.gateway.http string "true" Set to false enables HTTPS configuration on all urls
global.gateway.tlsacme string "false" Set to enable automatic TLS for ingress if https is enabled
global.keycloak.clientId string "activiti-keycloak" Configure Keycloak Client Id
global.keycloak.clientSecret string "" Configure Keycloak Client Secret. Required if useExistingClientSecret set to false
global.keycloak.clientSecretName string "activiti-keycloak-client" Configure Keycloak Client Secret Name. Secret will be created if useExistingClientSecret set to false
global.keycloak.host string "identity-{{ .Release.Namespace }}.{{ template \"common.gateway-domain\" . }}" Configure Keycloak host template
global.keycloak.realm string "activiti" Configure Keycloak realm
global.keycloak.resource string "activiti" Configure Keycloak resource
global.keycloak.url string "" Set full url to configure external Keycloak, otherwise will be generated based on host
global.keycloak.useExistingClientSecret bool false Configure to use existing Keycloak clientId and clientSecret from Kubernetes Secret
global.messaging.broker string "rabbitmq" required messaging broker, rabbitmq or kafka
global.messaging.partitionCount int 2 configures number of partitioned consumers
global.messaging.partitioned bool false enables partitioned messaging in combination with common chart values messaging.enabled=true and messaging.role=producer
global.registryPullSecrets list [] Configure pull secrets for all deployments
kafka.enabled bool false
kafka.fullnameOverride string "kafka"
kafka.offsetsTopicReplicationFactor int 1
kafka.replicaCount int 1
kafka.zookeeper.fullnameOverride string "zookeeper"
kafka.zookeeper.replicaCount int 1
postgresql.commonAnnotations.application string "activiti"
postgresql.enabled bool true
postgresql.postgresqlPassword string "password"
postgresql.resources.requests.cpu string "350m"
postgresql.resources.requests.memory string "512Mi"
rabbitmq.auth.erlangCookie string "ylY79lOdNUWsJEwAGdVQnhjSazV4QZKO="
rabbitmq.auth.password string "guest"
rabbitmq.auth.username string "guest"
rabbitmq.enabled bool true
rabbitmq.extraPlugins string ""
rabbitmq.fullnameOverride string "rabbitmq"
rabbitmq.livenessProbe.timeoutSeconds int 90
rabbitmq.readinessProbe.timeoutSeconds int 90
rabbitmq.resources.limits.memory string "1500Mi"
rabbitmq.resources.requests.memory string "1500Mi"
runtime-bundle.enabled bool true
runtime-bundle.extraEnv string "- name: SERVER_SERVLET_CONTEXTPATH\n value: \"{{ tpl .Values.ingress.path . }}\"\n- name: SERVER_USEFORWARDHEADERS\n value: \"true\"\n- name: SERVER_TOMCAT_INTERNALPROXIES\n value: \".*\""
runtime-bundle.image.pullPolicy string "Always"
runtime-bundle.image.repository string "activiti/example-runtime-bundle"
runtime-bundle.image.tag string "8.7.0-alpha.66"
runtime-bundle.ingress.annotations."kubernetes.io/ingress.class" string "nginx"
runtime-bundle.ingress.annotations."nginx.ingress.kubernetes.io/cors-allow-headers" string "Authorization, Content-Type, Accept"
runtime-bundle.ingress.annotations."nginx.ingress.kubernetes.io/enable-cors" string "true"
runtime-bundle.ingress.path string "/rb"
runtime-bundle.javaOpts.xms string "512m"
runtime-bundle.javaOpts.xmx string "2048m"
runtime-bundle.livenessProbe.path string `"{{ tpl .Values.ingress.path . trimSuffix "/" }}/actuator/health/liveness"`
runtime-bundle.messaging.enabled bool true
runtime-bundle.messaging.role string "producer"
runtime-bundle.nameOverride string "runtime-bundle"
runtime-bundle.postgresql.enabled bool true
runtime-bundle.readinessProbe.path string `"{{ tpl .Values.ingress.path . trimSuffix "/" }}/actuator/health/readiness"`
runtime-bundle.resources.limits.cpu string "2"
runtime-bundle.resources.limits.memory string "2048Mi"
runtime-bundle.resources.requests.cpu string "200m"
runtime-bundle.resources.requests.memory string "512Mi"
runtime-bundle.service.name string "rb"