A Helm chart for Tractus-X Eclipse Data Space Connector. This chart is a test mock that can be used as edc provider for the DPP applicatiton.
Homepage: https://github.com/eclipse-tractusx/tractusx-edc/tree/main/charts/tractusx-connector
Repository | Name | Version |
---|---|---|
https://charts.bitnami.com/bitnami | postgresql(postgresql) | 15.2.1 |
https://eclipse-tractusx.github.io/charts/dev | tractusx-connector | 0.7.3 |
Key | Type | Default | Description |
---|---|---|---|
postgresql.auth.database | string | "edc" |
|
postgresql.auth.password | string | "<insert your database password>" |
|
postgresql.auth.username | string | "<insert your database username>" |
|
postgresql.enabled | bool | true |
|
postgresql.fullnameOverride | string | "" |
|
postgresql.jdbcUrl | string | "jdbc:postgresql://{{ .Release.Name }}-postgresql:5432/edc" |
|
postgresql.nameOverride | string | "" |
|
postgresql.primary.persistence.enabled | bool | true |
|
postgresql.readReplicas.persistence.enabled | bool | true |
|
tractusx-connector.controlplane.affinity | object | {} |
|
tractusx-connector.controlplane.autoscaling.enabled | bool | false |
Enables horizontal pod autoscaling |
tractusx-connector.controlplane.autoscaling.maxReplicas | int | 100 |
Maximum replicas if resource consumption exceeds resource threshholds |
tractusx-connector.controlplane.autoscaling.minReplicas | int | 1 |
Minimal replicas if resource consumption falls below resource threshholds |
tractusx-connector.controlplane.autoscaling.targetCPUUtilizationPercentage | int | 80 |
targetAverageUtilization of cpu provided to a pod |
tractusx-connector.controlplane.autoscaling.targetMemoryUtilizationPercentage | int | 80 |
targetAverageUtilization of memory provided to a pod |
tractusx-connector.controlplane.bdrs.cache_validity_seconds | int | 600 |
|
tractusx-connector.controlplane.bdrs.server.url | string | "https://bpn-did-resolution-service.int.catena-x.net/api/directory" |
|
tractusx-connector.controlplane.debug.enabled | bool | false |
|
tractusx-connector.controlplane.debug.port | int | 1044 |
|
tractusx-connector.controlplane.debug.suspendOnStart | bool | false |
|
tractusx-connector.controlplane.enabled | bool | true |
|
tractusx-connector.controlplane.endpoints | object | {"control":{"path":"/BPNL000000000000/control","port":8083},"default":{"path":"/BPNL000000000000/api","port":8080},"management":{"authKey":"<insert your auth key>","path":"/BPNL000000000000/management","port":8081},"metrics":{"path":"/BPNL000000000000/metrics","port":9090},"protocol":{"path":"/BPNL000000000000/api/v1/dsp","port":8084}} |
endpoints of the control plane |
tractusx-connector.controlplane.endpoints.control | object | {"path":"/BPNL000000000000/control","port":8083} |
control api, used for internal control calls. can be added to the internal ingress, but should probably not |
tractusx-connector.controlplane.endpoints.control.path | string | "/BPNL000000000000/control" |
path for incoming api calls |
tractusx-connector.controlplane.endpoints.control.port | int | 8083 |
port for incoming api calls |
tractusx-connector.controlplane.endpoints.default | object | {"path":"/BPNL000000000000/api","port":8080} |
default api for health checks, should not be added to any ingress |
tractusx-connector.controlplane.endpoints.default.path | string | "/BPNL000000000000/api" |
path for incoming api calls |
tractusx-connector.controlplane.endpoints.default.port | int | 8080 |
port for incoming api calls |
tractusx-connector.controlplane.endpoints.management | object | {"authKey":"<insert your auth key>","path":"/BPNL000000000000/management","port":8081} |
data management api, used by internal users, can be added to an ingress and must not be internet facing |
tractusx-connector.controlplane.endpoints.management.authKey | string | "<insert your auth key>" |
authentication key, must be attached to each 'X-Api-Key' request header |
tractusx-connector.controlplane.endpoints.management.path | string | "/BPNL000000000000/management" |
path for incoming api calls |
tractusx-connector.controlplane.endpoints.management.port | int | 8081 |
port for incoming api calls |
tractusx-connector.controlplane.endpoints.metrics | object | {"path":"/BPNL000000000000/metrics","port":9090} |
metrics api, used for application metrics, must not be internet facing |
tractusx-connector.controlplane.endpoints.metrics.path | string | "/BPNL000000000000/metrics" |
path for incoming api calls |
tractusx-connector.controlplane.endpoints.metrics.port | int | 9090 |
port for incoming api calls |
tractusx-connector.controlplane.endpoints.protocol | object | {"path":"/BPNL000000000000/api/v1/dsp","port":8084} |
ids api, used for inter connector communication and must be internet facing |
tractusx-connector.controlplane.endpoints.protocol.path | string | "/BPNL000000000000/api/v1/dsp" |
path for incoming api calls |
tractusx-connector.controlplane.endpoints.protocol.port | int | 8084 |
port for incoming api calls |
tractusx-connector.controlplane.env | object | {} |
|
tractusx-connector.controlplane.envConfigMapNames | list | [] |
|
tractusx-connector.controlplane.envSecretNames | list | [] |
|
tractusx-connector.controlplane.envValueFrom | object | {} |
|
tractusx-connector.controlplane.image.pullPolicy | string | "IfNotPresent" |
Kubernetes image pull policy to use |
tractusx-connector.controlplane.image.repository | string | "tractusx/edc-controlplane-postgresql-hashicorp-vault" |
Which derivate of the control plane to use. when left empty the deployment will select the correct image automatically |
tractusx-connector.controlplane.ingresses[0].annotations | object | {} |
Additional ingress annotations to add |
tractusx-connector.controlplane.ingresses[0].certManager.clusterIssuer | string | "" |
If preset enables certificate generation via cert-manager cluster-wide issuer |
tractusx-connector.controlplane.ingresses[0].certManager.issuer | string | "" |
If preset enables certificate generation via cert-manager namespace scoped issuer |
tractusx-connector.controlplane.ingresses[0].className | string | "nginx" |
Defines the ingress class to use |
tractusx-connector.controlplane.ingresses[0].enabled | bool | true |
|
tractusx-connector.controlplane.ingresses[0].endpoints | list | ["default","management","control","protocol","metrics"] |
EDC endpoints exposed by this ingress resource |
tractusx-connector.controlplane.ingresses[0].hostname | string | "" |
The hostname to be used to precisely map incoming traffic onto the underlying network service |
tractusx-connector.controlplane.ingresses[0].tls | object | {"enabled":true,"secretName":"tls-secret"} |
TLS tls class applied to the ingress resource |
tractusx-connector.controlplane.ingresses[0].tls.enabled | bool | true |
Enables TLS on the ingress resource |
tractusx-connector.controlplane.ingresses[0].tls.secretName | string | "tls-secret" |
If present overwrites the default secret name |
tractusx-connector.controlplane.ingresses[1].annotations | object | {} |
Additional ingress annotations to add |
tractusx-connector.controlplane.ingresses[1].certManager.clusterIssuer | string | "" |
If preset enables certificate generation via cert-manager cluster-wide issuer |
tractusx-connector.controlplane.ingresses[1].certManager.issuer | string | "" |
If preset enables certificate generation via cert-manager namespace scoped issuer |
tractusx-connector.controlplane.ingresses[1].className | string | "nginx" |
Defines the ingress class to use |
tractusx-connector.controlplane.ingresses[1].enabled | bool | false |
|
tractusx-connector.controlplane.ingresses[1].endpoints | list | ["management","control"] |
EDC endpoints exposed by this ingress resource |
tractusx-connector.controlplane.ingresses[1].hostname | string | "edc-control.intranet" |
The hostname to be used to precisely map incoming traffic onto the underlying network service |
tractusx-connector.controlplane.ingresses[1].tls | object | {"enabled":true,"secretName":"tls-secret"} |
TLS tls class applied to the ingress resource |
tractusx-connector.controlplane.ingresses[1].tls.enabled | bool | true |
Enables TLS on the ingress resource |
tractusx-connector.controlplane.ingresses[1].tls.secretName | string | "tls-secret" |
If present overwrites the default secret name |
tractusx-connector.controlplane.initContainers | list | [] |
|
tractusx-connector.controlplane.livenessProbe.enabled | bool | true |
Whether to enable kubernetes liveness-probe |
tractusx-connector.controlplane.livenessProbe.failureThreshold | int | 6 |
when a probe fails kubernetes will try 6 times before giving up |
tractusx-connector.controlplane.livenessProbe.initialDelaySeconds | int | 30 |
seconds to wait before performing the first liveness check |
tractusx-connector.controlplane.livenessProbe.periodSeconds | int | 10 |
this fields specifies that kubernetes should perform a liveness check every 10 seconds |
tractusx-connector.controlplane.livenessProbe.successThreshold | int | 1 |
number of consecutive successes for the probe to be considered successful after having failed |
tractusx-connector.controlplane.livenessProbe.timeoutSeconds | int | 5 |
number of seconds after which the probe times out |
tractusx-connector.controlplane.logging | string | ".level=INFO\norg.eclipse.edc.level=ALL\nhandlers=java.util.logging.ConsoleHandler\njava.util.logging.ConsoleHandler.formatter=java.util.logging.SimpleFormatter\njava.util.logging.ConsoleHandler.level=ALL\njava.util.logging.SimpleFormatter.format=[%1$tY-%1$tm-%1$td %1$tH:%1$tM:%1$tS] [%4$-7s] %5$s%6$s%n" |
configuration of the Java Util Logging Facade |
tractusx-connector.controlplane.nodeSelector | object | {} |
|
tractusx-connector.controlplane.opentelemetry | string | "otel.javaagent.enabled=false\notel.javaagent.debug=false" |
configuration of the Open Telemetry Agent to collect and expose metrics |
tractusx-connector.controlplane.podAnnotations | object | {} |
additional annotations for the pod |
tractusx-connector.controlplane.podLabels | object | {} |
additional labels for the pod |
tractusx-connector.controlplane.podSecurityContext | object | {"fsGroup":10001,"runAsGroup":10001,"runAsUser":10001,"seccompProfile":{"type":"RuntimeDefault"}} |
The pod security context defines privilege and access control settings for a Pod within the deployment |
tractusx-connector.controlplane.podSecurityContext.fsGroup | int | 10001 |
The owner for volumes and any files created within volumes will belong to this guid |
tractusx-connector.controlplane.podSecurityContext.runAsGroup | int | 10001 |
Processes within a pod will belong to this guid |
tractusx-connector.controlplane.podSecurityContext.runAsUser | int | 10001 |
Runs all processes within a pod with a special uid |
tractusx-connector.controlplane.podSecurityContext.seccompProfile.type | string | "RuntimeDefault" |
Restrict a Container's Syscalls with seccomp |
tractusx-connector.controlplane.readinessProbe.enabled | bool | true |
Whether to enable kubernetes readiness-probes |
tractusx-connector.controlplane.readinessProbe.failureThreshold | int | 6 |
when a probe fails kubernetes will try 6 times before giving up |
tractusx-connector.controlplane.readinessProbe.initialDelaySeconds | int | 30 |
seconds to wait before performing the first readiness check |
tractusx-connector.controlplane.readinessProbe.periodSeconds | int | 10 |
this fields specifies that kubernetes should perform a readiness check every 10 seconds |
tractusx-connector.controlplane.readinessProbe.successThreshold | int | 1 |
number of consecutive successes for the probe to be considered successful after having failed |
tractusx-connector.controlplane.readinessProbe.timeoutSeconds | int | 5 |
number of seconds after which the probe times out |
tractusx-connector.controlplane.replicaCount | int | 1 |
|
tractusx-connector.controlplane.resources | object | {"limits":{"cpu":1.5,"memory":"1024Mi"},"requests":{"cpu":"500m","memory":"1024Mi"}} |
resource management for the container |
tractusx-connector.controlplane.resources.limits.cpu | float | 1.5 |
Maximum CPU limit |
tractusx-connector.controlplane.resources.limits.memory | string | "1024Mi" |
Maximum memory limit |
tractusx-connector.controlplane.resources.requests.cpu | string | "500m" |
Initial CPU request |
tractusx-connector.controlplane.resources.requests.memory | string | "1024Mi" |
Initial memory request |
tractusx-connector.controlplane.securityContext.allowPrivilegeEscalation | bool | false |
Controls Privilege Escalation enabling setuid binaries changing the effective user ID |
tractusx-connector.controlplane.securityContext.capabilities.add | list | [] |
Specifies which capabilities to add to issue specialized syscalls |
tractusx-connector.controlplane.securityContext.capabilities.drop | list | ["ALL"] |
Specifies which capabilities to drop to reduce syscall attack surface |
tractusx-connector.controlplane.securityContext.readOnlyRootFilesystem | bool | true |
Whether the root filesystem is mounted in read-only mode |
tractusx-connector.controlplane.securityContext.runAsNonRoot | bool | true |
Requires the container to run without root privileges |
tractusx-connector.controlplane.securityContext.runAsUser | int | 10001 |
The container's process will run with the specified uid |
tractusx-connector.controlplane.service.annotations | object | {} |
|
tractusx-connector.controlplane.service.type | string | "ClusterIP" |
Service type to expose the running application on a set of Pods as a network service. |
tractusx-connector.controlplane.tolerations | list | [] |
|
tractusx-connector.controlplane.url.protocol | string | "" |
Explicitly declared url for reaching the ids api (e.g. if ingresses not used) |
tractusx-connector.controlplane.volumeMounts | list | [] |
declare where to mount volumes into the container |
tractusx-connector.controlplane.volumes | list | [] |
volume directories |
tractusx-connector.customCaCerts | object | {} |
Add custom ca certificates to the truststore |
tractusx-connector.customLabels | object | {} |
|
tractusx-connector.dataplane.affinity | object | {} |
|
tractusx-connector.dataplane.autoscaling.enabled | bool | false |
Enables horizontal pod autoscaling |
tractusx-connector.dataplane.autoscaling.maxReplicas | int | 100 |
Maximum replicas if resource consumption exceeds resource threshholds |
tractusx-connector.dataplane.autoscaling.minReplicas | int | 1 |
Minimal replicas if resource consumption falls below resource threshholds |
tractusx-connector.dataplane.autoscaling.targetCPUUtilizationPercentage | int | 80 |
targetAverageUtilization of cpu provided to a pod |
tractusx-connector.dataplane.autoscaling.targetMemoryUtilizationPercentage | int | 80 |
targetAverageUtilization of memory provided to a pod |
tractusx-connector.dataplane.aws.accessKeyId | string | "" |
|
tractusx-connector.dataplane.aws.endpointOverride | string | "" |
|
tractusx-connector.dataplane.aws.secretAccessKey | string | "" |
|
tractusx-connector.dataplane.debug.enabled | bool | false |
|
tractusx-connector.dataplane.debug.port | int | 1044 |
|
tractusx-connector.dataplane.debug.suspendOnStart | bool | false |
|
tractusx-connector.dataplane.enabled | bool | true |
|
tractusx-connector.dataplane.endpoints.control.path | string | "/BPNL000000000000/api/dataplane/control" |
|
tractusx-connector.dataplane.endpoints.control.port | int | 8084 |
|
tractusx-connector.dataplane.endpoints.default.path | string | "/BPNL000000000000/api" |
|
tractusx-connector.dataplane.endpoints.default.port | int | 8080 |
|
tractusx-connector.dataplane.endpoints.metrics.path | string | "/BPNL000000000000/metrics" |
|
tractusx-connector.dataplane.endpoints.metrics.port | int | 9090 |
|
tractusx-connector.dataplane.endpoints.proxy.authKey | string | "<insert your auth key>" |
|
tractusx-connector.dataplane.endpoints.proxy.path | string | "/BPNL000000000000/proxy" |
|
tractusx-connector.dataplane.endpoints.proxy.port | int | 8186 |
|
tractusx-connector.dataplane.endpoints.public.path | string | "/BPNL000000000000/api/public" |
|
tractusx-connector.dataplane.endpoints.public.port | int | 8081 |
|
tractusx-connector.dataplane.env | object | {} |
|
tractusx-connector.dataplane.envConfigMapNames | list | [] |
|
tractusx-connector.dataplane.envSecretNames | list | [] |
|
tractusx-connector.dataplane.envValueFrom | object | {} |
|
tractusx-connector.dataplane.image.pullPolicy | string | "IfNotPresent" |
Kubernetes image pull policy to use |
tractusx-connector.dataplane.image.repository | string | "tractusx/edc-dataplane-hashicorp-vault" |
Which derivate of the data plane to use. when left empty the deployment will select the correct image automatically |
tractusx-connector.dataplane.ingresses[0].annotations | object | {} |
Additional ingress annotations to add |
tractusx-connector.dataplane.ingresses[0].certManager.clusterIssuer | string | "" |
If preset enables certificate generation via cert-manager cluster-wide issuer |
tractusx-connector.dataplane.ingresses[0].certManager.issuer | string | "" |
If preset enables certificate generation via cert-manager namespace scoped issuer |
tractusx-connector.dataplane.ingresses[0].className | string | "nginx" |
Defines the ingress class to use |
tractusx-connector.dataplane.ingresses[0].enabled | bool | true |
|
tractusx-connector.dataplane.ingresses[0].endpoints | list | ["public"] |
EDC endpoints exposed by this ingress resource |
tractusx-connector.dataplane.ingresses[0].hostname | string | "" |
The hostname to be used to precisely map incoming traffic onto the underlying network service |
tractusx-connector.dataplane.ingresses[0].tls | object | {"enabled":true,"secretName":"tls-secret"} |
TLS tls class applied to the ingress resource |
tractusx-connector.dataplane.ingresses[0].tls.enabled | bool | true |
Enables TLS on the ingress resource |
tractusx-connector.dataplane.ingresses[0].tls.secretName | string | "tls-secret" |
If present overwrites the default secret name |
tractusx-connector.dataplane.initContainers | list | [] |
|
tractusx-connector.dataplane.livenessProbe.enabled | bool | true |
Whether to enable kubernetes liveness-probe |
tractusx-connector.dataplane.livenessProbe.failureThreshold | int | 6 |
when a probe fails kubernetes will try 6 times before giving up |
tractusx-connector.dataplane.livenessProbe.initialDelaySeconds | int | 30 |
seconds to wait before performing the first liveness check |
tractusx-connector.dataplane.livenessProbe.periodSeconds | int | 10 |
this fields specifies that kubernetes should perform a liveness check every 10 seconds |
tractusx-connector.dataplane.livenessProbe.successThreshold | int | 1 |
number of consecutive successes for the probe to be considered successful after having failed |
tractusx-connector.dataplane.livenessProbe.timeoutSeconds | int | 5 |
number of seconds after which the probe times out |
tractusx-connector.dataplane.logging | string | ".level=INFO\norg.eclipse.edc.level=ALL\nhandlers=java.util.logging.ConsoleHandler\njava.util.logging.ConsoleHandler.formatter=java.util.logging.SimpleFormatter\njava.util.logging.ConsoleHandler.level=ALL\njava.util.logging.SimpleFormatter.format=[%1$tY-%1$tm-%1$td %1$tH:%1$tM:%1$tS] [%4$-7s] %5$s%6$s%n" |
configuration of the Java Util Logging Facade |
tractusx-connector.dataplane.nodeSelector | object | {} |
|
tractusx-connector.dataplane.opentelemetry | string | "otel.javaagent.enabled=false\notel.javaagent.debug=false" |
configuration of the Open Telemetry Agent to collect and expose metrics |
tractusx-connector.dataplane.podAnnotations | object | {} |
additional annotations for the pod |
tractusx-connector.dataplane.podLabels | object | {} |
additional labels for the pod |
tractusx-connector.dataplane.podSecurityContext | object | {"fsGroup":10001,"runAsGroup":10001,"runAsUser":10001,"seccompProfile":{"type":"RuntimeDefault"}} |
The pod security context defines privilege and access control settings for a Pod within the deployment |
tractusx-connector.dataplane.podSecurityContext.fsGroup | int | 10001 |
The owner for volumes and any files created within volumes will belong to this guid |
tractusx-connector.dataplane.podSecurityContext.runAsGroup | int | 10001 |
Processes within a pod will belong to this guid |
tractusx-connector.dataplane.podSecurityContext.runAsUser | int | 10001 |
Runs all processes within a pod with a special uid |
tractusx-connector.dataplane.podSecurityContext.seccompProfile.type | string | "RuntimeDefault" |
Restrict a Container's Syscalls with seccomp |
tractusx-connector.dataplane.readinessProbe.enabled | bool | true |
Whether to enable kubernetes readiness-probes |
tractusx-connector.dataplane.readinessProbe.failureThreshold | int | 6 |
when a probe fails kubernetes will try 6 times before giving up |
tractusx-connector.dataplane.readinessProbe.initialDelaySeconds | int | 30 |
seconds to wait before performing the first readiness check |
tractusx-connector.dataplane.readinessProbe.periodSeconds | int | 10 |
this fields specifies that kubernetes should perform a liveness check every 10 seconds |
tractusx-connector.dataplane.readinessProbe.successThreshold | int | 1 |
number of consecutive successes for the probe to be considered successful after having failed |
tractusx-connector.dataplane.readinessProbe.timeoutSeconds | int | 5 |
number of seconds after which the probe times out |
tractusx-connector.dataplane.replicaCount | int | 1 |
|
tractusx-connector.dataplane.resources | object | {"limits":{"cpu":1.5,"memory":"1024Mi"},"requests":{"cpu":"500m","memory":"1024Mi"}} |
resource management for the container |
tractusx-connector.dataplane.resources.limits.cpu | float | 1.5 |
Maximum CPU limit |
tractusx-connector.dataplane.resources.limits.memory | string | "1024Mi" |
Maximum memory limit |
tractusx-connector.dataplane.resources.requests.cpu | string | "500m" |
Initial CPU request |
tractusx-connector.dataplane.resources.requests.memory | string | "1024Mi" |
Initial memory request |
tractusx-connector.dataplane.securityContext.allowPrivilegeEscalation | bool | false |
Controls Privilege Escalation enabling setuid binaries changing the effective user ID |
tractusx-connector.dataplane.securityContext.capabilities.add | list | [] |
Specifies which capabilities to add to issue specialized syscalls |
tractusx-connector.dataplane.securityContext.capabilities.drop | list | ["ALL"] |
Specifies which capabilities to drop to reduce syscall attack surface |
tractusx-connector.dataplane.securityContext.readOnlyRootFilesystem | bool | true |
Whether the root filesystem is mounted in read-only mode |
tractusx-connector.dataplane.securityContext.runAsNonRoot | bool | true |
Requires the container to run without root privileges |
tractusx-connector.dataplane.securityContext.runAsUser | int | 10001 |
The container's process will run with the specified uid |
tractusx-connector.dataplane.service.port | int | 80 |
|
tractusx-connector.dataplane.service.type | string | "ClusterIP" |
Service type to expose the running application on a set of Pods as a network service. |
tractusx-connector.dataplane.token.refresh.expiry_seconds | int | 300 |
|
tractusx-connector.dataplane.token.refresh.expiry_tolerance_seconds | int | 10 |
|
tractusx-connector.dataplane.token.refresh.refresh_endpoint | string | nil |
|
tractusx-connector.dataplane.token.signer.privatekey_alias | string | "<insert your privatekey alias>" |
|
tractusx-connector.dataplane.token.verifier.publickey_alias | string | "<insert your publickey alias>" |
|
tractusx-connector.dataplane.tolerations | list | [] |
|
tractusx-connector.dataplane.url.public | string | "" |
Explicitly declared url for reaching the public api (e.g. if ingresses not used) |
tractusx-connector.dataplane.volumeMounts | list | [] |
declare where to mount volumes into the container |
tractusx-connector.dataplane.volumes | list | [] |
volume directories |
tractusx-connector.enabled | bool | true |
|
tractusx-connector.fullnameOverride | string | "dpp-edc-provider" |
|
tractusx-connector.iatp.id | string | "did:web:portal-backend.int.catena-x.net:api:administration:staticdata:did:BPNL000000000FV1" |
|
tractusx-connector.iatp.sts.dim.url | string | "https://dis-integration-service-prod.eu10.dim.cloud.sap/api/v2.0.0/iatp/catena-x-portal" |
|
tractusx-connector.iatp.sts.oauth.client.id | string | "<insert your client id>" |
|
tractusx-connector.iatp.sts.oauth.client.secret_alias | string | "<insert your client secret>" |
|
tractusx-connector.iatp.sts.oauth.token_url | string | "<insert your token url>" |
|
tractusx-connector.iatp.trustedIssuers[0] | string | "did:web:dim-static-prod.dis-cloud-prod.cfapps.eu10-004.hana.ondemand.com:dim-hosted:2f45795c-d6cc-4038-96c9-63cedc0cd266:holder-iatp" |
|
tractusx-connector.imagePullSecrets | list | [] |
|
tractusx-connector.install.daps | bool | false |
|
tractusx-connector.install.postgresql | bool | false |
|
tractusx-connector.install.vault | bool | false |
|
tractusx-connector.nameOverride | string | "" |
|
tractusx-connector.networkPolicy.controlplane | object | {"from":[{"namespaceSelector":{}}]} |
Configuration of the controlplane component |
tractusx-connector.networkPolicy.controlplane.from | list | [{"namespaceSelector":{}}] |
Specify from rule network policy for cp (defaults to all namespaces) |
tractusx-connector.networkPolicy.dataplane | object | {"from":[{"namespaceSelector":{}}]} |
Configuration of the dataplane component |
tractusx-connector.networkPolicy.dataplane.from | list | [{"namespaceSelector":{}}] |
Specify from rule network policy for dp (defaults to all namespaces) |
tractusx-connector.networkPolicy.enabled | bool | false |
If true network policy will be created to restrict access to control- and dataplane |
tractusx-connector.participant.id | string | "<insert your participant id>" |
|
tractusx-connector.postgresql.auth.database | string | "edc" |
|
tractusx-connector.postgresql.auth.password | string | "<insert your database password>" |
|
tractusx-connector.postgresql.auth.username | string | "<insert your database username>" |
|
tractusx-connector.postgresql.fullnameOverride | string | "" |
|
tractusx-connector.postgresql.jdbcUrl | string | "jdbc:postgresql://{{ .Release.Name }}-postgresql:5432/edc" |
|
tractusx-connector.postgresql.nameOverride | string | "" |
|
tractusx-connector.postgresql.primary.persistence.enabled | bool | false |
|
tractusx-connector.postgresql.readReplicas.persistence.enabled | bool | false |
|
tractusx-connector.serviceAccount.annotations | object | {} |
|
tractusx-connector.serviceAccount.create | bool | true |
|
tractusx-connector.serviceAccount.imagePullSecrets | list | [] |
Existing image pull secret bound to the service account to use to obtain the container image from private registries |
tractusx-connector.serviceAccount.name | string | "" |
|
tractusx-connector.vault.fullnameOverride | string | "vault" |
|
tractusx-connector.vault.hashicorp.healthCheck.enabled | bool | true |
|
tractusx-connector.vault.hashicorp.healthCheck.standbyOk | bool | true |
|
tractusx-connector.vault.hashicorp.paths.health | string | "/v1/sys/health" |
|
tractusx-connector.vault.hashicorp.paths.secret | string | "" |
|
tractusx-connector.vault.hashicorp.timeout | int | 30 |
|
tractusx-connector.vault.hashicorp.token | string | "<insert your vault token>" |
|
tractusx-connector.vault.hashicorp.url | string | "<insert your vault url>" |
|
tractusx-connector.vault.injector.enabled | bool | false |
|
tractusx-connector.vault.server.dev.devRootToken | string | "root" |
|
tractusx-connector.vault.server.dev.enabled | bool | true |
|
tractusx-connector.vault.server.postStart | string | nil |
Autogenerated from chart metadata using helm-docs v1.11.0