Tractus-X Remoting Agent - Knowledge-Agents Compatible API Binding Layer
Homepage: https://github.com/eclipse-tractusx/knowledge-agents/
$ helm repo add eclipse-tractusx https://eclipse-tractusx.github.io/charts/dev
$ helm install my-release eclipse-tractusx/remoting-agent --version 1.9.6-SNAPSHOT
Name | Url | |
---|---|---|
Tractus-X Knowledge Agents Team |
Key | Type | Default | Description | ||
---|---|---|---|---|---|
affinity | object | {} |
Affinity constrains which nodes the Pod can be scheduled on based on node labels. | ||
agent.endpoints.default.auth | object | {} |
An auth object for default security | ||
agent.endpoints.default.path | string | "" |
The path mapping the “default” api is going to be exposed by | ||
agent.endpoints.default.port | string | "8081" |
The network port, which the “default” api is going to be exposed by the container, pod and service | ||
agent.endpoints.default.regex | string | "/(.*)" |
An optional regex path match (whose match groups could be used in an nginx-annotation of the ingress) | ||
automountServiceAccountToken | bool | false |
Whether to automount kubernetes API credentials into the pod | ||
autoscaling.enabled | bool | false |
Enables horizontal pod autoscaling | ||
autoscaling.maxReplicas | int | 100 |
Maximum replicas if resource consumption exceeds resource threshholds | ||
autoscaling.minReplicas | int | 1 |
Minimal replicas if resource consumption falls below resource threshholds | ||
autoscaling.targetCPUUtilizationPercentage | int | 80 |
targetAverageUtilization of cpu provided to a pod | ||
autoscaling.targetMemoryUtilizationPercentage | int | 80 |
targetAverageUtilization of memory provided to a pod | ||
customLabels | object | {} |
Additional custom Labels to add | ||
env | object | {} |
Container environment variables e.g. for configuring JAVA_TOOL_OPTIONS Ex.: JAVA_TOOL_OPTIONS: > -Dhttp.proxyHost=proxy -Dhttp.proxyPort=80 -Dhttp.nonProxyHosts=”localhost | 127.* | [::1]” -Dhttps.proxyHost=proxy -Dhttps.proxyPort=443 |
envSecretName | string | nil |
Kubernetes Secret Resource name to load environment variables from | ||
fullnameOverride | string | "" |
Overrides the releases full name | ||
image.digest | string | "" |
Overrides the image digest | ||
image.pullPolicy | string | "IfNotPresent" |
|||
image.pullSecrets | list | [] |
|||
image.registry | string | "docker.io" |
target regirtry | ||
image.repository | string | "tractusx/remoting-agent" |
Which derivate of agent to use | ||
image.tag | string | "" |
Overrides the image tag whose default is the chart appVersion | ||
ingresses[0].annotations | string | nil |
Additional ingress annotations to add, for example when implementing more complex routings you may set { nginx.ingress.kubernetes.io/rewrite-target: /$1, nginx.ingress.kubernetes.io/use-regex: “true” } | ||
ingresses[0].certManager.clusterIssuer | string | "" |
If preset enables certificate generation via cert-manager cluster-wide issuer | ||
ingresses[0].certManager.issuer | string | "" |
If preset enables certificate generation via cert-manager namespace scoped issuer | ||
ingresses[0].className | string | "" |
Defines the ingress class to use | ||
ingresses[0].enabled | bool | false |
|||
ingresses[0].endpoints | list | ["default"] |
Agent endpoints exposed by this ingress resource | ||
ingresses[0].hostname | string | "remoting-agent.local" |
The hostname to be used to precisely map incoming traffic onto the underlying network service | ||
ingresses[0].prefix | string | "" |
Optional prefix that will be prepended to the paths of the endpoints | ||
ingresses[0].tls | object | {"enabled":false,"secretName":""} |
TLS tls class applied to the ingress resource | ||
ingresses[0].tls.enabled | bool | false |
Enables TLS on the ingress resource | ||
ingresses[0].tls.secretName | string | "" |
If present overwrites the default secret name | ||
livenessProbe.enabled | bool | true |
Whether to enable kubernetes liveness-probe | ||
livenessProbe.failureThreshold | int | 3 |
Minimum consecutive failures for the probe to be considered failed after having succeeded | ||
livenessProbe.periodSeconds | int | 60 |
Number of seconds each period lasts. | ||
livenessProbe.timeoutSeconds | int | 5 |
number of seconds until a timeout is assumed | ||
logging.configuration | string | "<?xml version=\"1.0\" encoding=\"UTF-8\"?>\n<configuration debug=\"false\" scan=\"true\" scanPeriod=\"30 seconds\">\n <appender name=\"STDOUT\" class=\"ch.qos.logback.core.ConsoleAppender\">\n <encoder>\n <pattern>%d{HH:mm:ss.SSS} [%thread] %-5level %logger{36} - %msg%n</pattern>\n </encoder>\n </appender>\n <root>\n <level value=\"FINEST\"/>\n <appender-ref ref=\"STDOUT\" />\n </root>\n</configuration>" |
Logback Xml | ||
nameOverride | string | "" |
Overrides the charts name | ||
nodeSelector | object | {} |
Node-Selector to constrain the Pod to nodes with specific labels. | ||
podAnnotations | object | {} |
Annotations added to deployed pods | ||
podSecurityContext.fsGroup | int | 30000 |
The owner for volumes and any files created within volumes will belong to this guid | ||
podSecurityContext.runAsGroup | int | 30000 |
Processes within a pod will belong to this guid | ||
podSecurityContext.runAsUser | int | 10001 |
Runs all processes within a pod with a special uid | ||
podSecurityContext.seccompProfile.type | string | "RuntimeDefault" |
Restrict a Container’s Syscalls with seccomp | ||
readinessProbe.enabled | bool | true |
Whether to enable kubernetes readiness-probes | ||
readinessProbe.failureThreshold | int | 3 |
Minimum consecutive failures for the probe to be considered failed after having succeeded | ||
readinessProbe.periodSeconds | int | 300 |
Number of seconds each period lasts. | ||
readinessProbe.timeoutSeconds | int | 5 |
number of seconds until a timeout is assumed | ||
replicaCount | int | 1 |
Specifies how many replicas of a deployed pod shall be created during the deployment Note: If horizontal pod autoscaling is enabled this setting has no effect | ||
repositories | object | {} |
A map of repository names to configuration ttl files | ||
resources | object | {"limits":{"cpu":"500m","memory":"768Mi"},"requests":{"cpu":"250m","memory":"768Mi"}} |
Resource management applied to the deployed pod We recommend 25% of a cpu, 512MB per server and 256MB per endpoint | ||
securityContext.allowPrivilegeEscalation | bool | false |
Controls Privilege Escalation enabling setuid binaries changing the effective user ID | ||
securityContext.capabilities.add | list | ["NET_BIND_SERVICE"] |
Specifies which capabilities to add to issue specialized syscalls | ||
securityContext.capabilities.drop | list | ["ALL"] |
Specifies which capabilities to drop to reduce syscall attack surface | ||
securityContext.readOnlyRootFilesystem | bool | true |
Whether the root filesystem is mounted in read-only mode | ||
securityContext.runAsGroup | int | 30000 |
Processes within a pod will belong to this guid | ||
securityContext.runAsNonRoot | bool | true |
Requires the container to run without root privileges | ||
securityContext.runAsUser | int | 10001 |
The container’s process will run with the specified uid | ||
service.type | string | "ClusterIP" |
Service type to expose the running application on a set of Pods as a network service. | ||
serviceAccount.annotations | object | {} |
Annotations to add to the service account | ||
serviceAccount.create | bool | true |
Specifies whether a service account should be created per release | ||
serviceAccount.name | string | "" |
The name of the service account to use. If not set and create is true, a name is generated using the release’s fullname template | ||
startupProbe.enabled | bool | true |
Whether to enable kubernetes startup-probes | ||
startupProbe.failureThreshold | int | 18 |
Minimum consecutive failures for the probe to be considered failed after having succeeded | ||
startupProbe.initialDelaySeconds | int | 60 |
Number of seconds after the container has started before liveness probes are initiated. | ||
startupProbe.periodSeconds | int | 30 |
Number of seconds each period lasts. | ||
startupProbe.timeoutSeconds | int | 5 |
number of seconds until a timeout is assumed | ||
tolerations | list | [] |
Tolerations are applied to Pods to schedule onto nodes with matching taints. |
Autogenerated from chart metadata using helm-docs v1.11.0